2023-06-23 20:56:09 -06:00
package graphvent
import (
"fmt"
"encoding/json"
)
2023-06-28 00:48:49 -06:00
// LockableState is the interface that any node that wants to posses locks must implement
2023-06-23 21:57:26 -06:00
//
2023-06-24 19:48:59 -06:00
// ReturnLock returns the node that held the lockable pointed to by ID before this node and
// removes the mapping from it's state, or nil if the lockable was unlocked previously
2023-06-23 21:57:26 -06:00
//
// AllowedToTakeLock returns true if the node pointed to by ID is allowed to take a lock from this node
2023-06-23 22:19:43 -06:00
//
2023-06-28 00:48:49 -06:00
type LockableState interface {
2023-06-25 20:20:59 -06:00
NodeState
2023-06-28 00:48:49 -06:00
ReturnLock ( lockable_id NodeID ) Lockable
2023-06-24 19:48:59 -06:00
AllowedToTakeLock ( node_id NodeID , lockable_id NodeID ) bool
2023-06-28 00:48:49 -06:00
RecordLockHolder ( lockable_id NodeID , lock_holder Lockable )
2023-06-23 20:56:09 -06:00
Requirements ( ) [ ] Lockable
AddRequirement ( requirement Lockable )
Dependencies ( ) [ ] Lockable
AddDependency ( dependency Lockable )
2023-06-28 00:48:49 -06:00
Owner ( ) Lockable
SetOwner ( owner Lockable )
2023-06-23 22:19:43 -06:00
}
// BaseLockableStates are a minimum collection of variables for a basic implementation of a LockHolder
// Include in any state structs that should be lockable
2023-06-23 20:56:09 -06:00
type BaseLockableState struct {
2023-06-28 21:49:23 -06:00
_type string
2023-06-23 20:56:09 -06:00
name string
2023-06-28 00:48:49 -06:00
owner Lockable
2023-06-23 20:56:09 -06:00
requirements [ ] Lockable
dependencies [ ] Lockable
2023-06-28 00:48:49 -06:00
locks_held map [ NodeID ] Lockable
2023-06-23 22:19:43 -06:00
}
type BaseLockableStateJSON struct {
2023-06-28 21:49:23 -06:00
Type string ` json:"type" `
2023-06-23 22:19:43 -06:00
Name string ` json:"name" `
Owner * NodeID ` json:"owner" `
Dependencies [ ] NodeID ` json:"dependencies" `
Requirements [ ] NodeID ` json:"requirements" `
2023-06-28 00:48:49 -06:00
LocksHeld map [ NodeID ] * NodeID ` json:"locks_held" `
2023-06-23 20:56:09 -06:00
}
2023-06-28 21:49:23 -06:00
func ( state * BaseLockableState ) Type ( ) string {
return state . _type
}
2023-06-23 20:56:09 -06:00
func ( state * BaseLockableState ) MarshalJSON ( ) ( [ ] byte , error ) {
requirement_ids := make ( [ ] NodeID , len ( state . requirements ) )
for i , requirement := range ( state . requirements ) {
requirement_ids [ i ] = requirement . ID ( )
}
dependency_ids := make ( [ ] NodeID , len ( state . dependencies ) )
for i , dependency := range ( state . dependencies ) {
dependency_ids [ i ] = dependency . ID ( )
}
var owner_id * NodeID = nil
if state . owner != nil {
new_str := state . owner . ID ( )
owner_id = & new_str
}
2023-06-28 00:48:49 -06:00
locks_held := map [ NodeID ] * NodeID { }
for lockable_id , node := range ( state . locks_held ) {
if node == nil {
locks_held [ lockable_id ] = nil
} else {
str := node . ID ( )
locks_held [ lockable_id ] = & str
}
}
2023-06-23 22:19:43 -06:00
return json . Marshal ( & BaseLockableStateJSON {
2023-06-28 21:49:23 -06:00
Type : state . _type ,
2023-06-23 20:56:09 -06:00
Name : state . name ,
Owner : owner_id ,
Dependencies : dependency_ids ,
Requirements : requirement_ids ,
2023-06-28 00:48:49 -06:00
LocksHeld : locks_held ,
2023-06-23 20:56:09 -06:00
} )
}
func ( state * BaseLockableState ) Name ( ) string {
return state . name
}
// Locks cannot be passed between base lockables, so the answer to
// "who used to own this lock held by a base lockable" is always "nobody"
2023-06-28 00:48:49 -06:00
func ( state * BaseLockableState ) ReturnLock ( lockable_id NodeID ) Lockable {
2023-06-26 23:18:54 -06:00
node , exists := state . locks_held [ lockable_id ]
2023-06-23 21:57:26 -06:00
if exists == false {
2023-06-24 19:48:59 -06:00
panic ( "Attempted to take a get the original lock holder of a lockable we don't own" )
2023-06-23 21:57:26 -06:00
}
2023-06-26 23:18:54 -06:00
delete ( state . locks_held , lockable_id )
2023-06-23 21:57:26 -06:00
return node
2023-06-23 20:56:09 -06:00
}
// Nothing can take a lock from a base lockable either
2023-06-28 00:48:49 -06:00
func ( state * BaseLockableState ) AllowedToTakeLock ( node_id NodeID , lockable_id NodeID ) bool {
2023-06-26 23:18:54 -06:00
_ , exists := state . locks_held [ lockable_id ]
2023-06-23 21:57:26 -06:00
if exists == false {
panic ( "Trying to give away lock we don't own" )
}
2023-06-23 20:56:09 -06:00
return false
}
2023-06-28 00:48:49 -06:00
func ( state * BaseLockableState ) RecordLockHolder ( lockable_id NodeID , lock_holder Lockable ) {
2023-06-26 23:18:54 -06:00
_ , exists := state . locks_held [ lockable_id ]
2023-06-23 21:57:26 -06:00
if exists == true {
2023-06-24 19:48:59 -06:00
panic ( "Attempted to lock a lockable we're already holding(lock cycle)" )
2023-06-23 20:56:09 -06:00
}
2023-06-23 21:57:26 -06:00
2023-06-26 23:18:54 -06:00
state . locks_held [ lockable_id ] = lock_holder
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
func ( state * BaseLockableState ) Owner ( ) Lockable {
2023-06-23 20:56:09 -06:00
return state . owner
}
2023-06-28 00:48:49 -06:00
func ( state * BaseLockableState ) SetOwner ( owner Lockable ) {
2023-06-23 20:56:09 -06:00
state . owner = owner
}
func ( state * BaseLockableState ) Requirements ( ) [ ] Lockable {
return state . requirements
}
func ( state * BaseLockableState ) AddRequirement ( requirement Lockable ) {
if requirement == nil {
panic ( "Will not connect nil to the DAG" )
}
state . requirements = append ( state . requirements , requirement )
}
func ( state * BaseLockableState ) Dependencies ( ) [ ] Lockable {
return state . dependencies
}
func ( state * BaseLockableState ) AddDependency ( dependency Lockable ) {
if dependency == nil {
panic ( "Will not connect nil to the DAG" )
}
state . dependencies = append ( state . dependencies , dependency )
}
2023-06-25 13:39:00 -06:00
func LinkLockables ( ctx * GraphContext , lockable Lockable , requirements [ ] Lockable ) error {
if lockable == nil {
return fmt . Errorf ( "LOCKABLE_LINK_ERR: Will not link Lockables to nil as requirements" )
2023-06-23 20:56:09 -06:00
}
2023-06-28 21:49:23 -06:00
if len ( requirements ) == 0 {
return nil
}
2023-06-25 13:39:00 -06:00
for _ , requirement := range ( requirements ) {
if requirement == nil {
return fmt . Errorf ( "LOCKABLE_LINK_ERR: Will not link nil to a Lockable as a requirement" )
}
2023-06-23 20:56:09 -06:00
2023-06-25 13:39:00 -06:00
if lockable . ID ( ) == requirement . ID ( ) {
return fmt . Errorf ( "LOCKABLE_LINK_ERR: cannot link %s to itself" , lockable . ID ( ) )
}
2023-06-23 20:56:09 -06:00
}
2023-06-25 13:39:00 -06:00
nodes := make ( [ ] GraphNode , len ( requirements ) + 1 )
nodes [ 0 ] = lockable
for i , node := range ( requirements ) {
nodes [ i + 1 ] = node
}
2023-06-28 21:49:23 -06:00
err := UpdateStates ( ctx , nodes , func ( states NodeStateMap ) error {
2023-06-25 13:39:00 -06:00
// Check that all the requirements can be added
2023-06-28 21:49:23 -06:00
lockable_state := states [ lockable . ID ( ) ] . ( LockableState )
2023-06-28 00:48:49 -06:00
// If the lockable is already locked, need to lock this resource as well before we can add it
2023-06-28 21:49:23 -06:00
for _ , requirement := range ( requirements ) {
requirement_state := states [ requirement . ID ( ) ] . ( LockableState )
for _ , req := range ( requirements ) {
if req . ID ( ) == requirement . ID ( ) {
continue
}
if checkIfRequirement ( ctx , req . ID ( ) , requirement_state , requirement . ID ( ) , states ) == true {
return fmt . Errorf ( "LOCKABLE_LINK_ERR: %s is a dependenyc of %s so cannot add the same dependency" , req . ID ( ) , requirement . ID ( ) )
}
}
if checkIfRequirement ( ctx , lockable . ID ( ) , requirement_state , requirement . ID ( ) , states ) == true {
return fmt . Errorf ( "LOCKABLE_LINK_ERR: %s is a dependency of %s so cannot link as requirement" , requirement . ID ( ) , lockable . ID ( ) )
2023-06-25 13:39:00 -06:00
}
2023-06-28 21:49:23 -06:00
if checkIfRequirement ( ctx , requirement . ID ( ) , lockable_state , lockable . ID ( ) , states ) == true {
return fmt . Errorf ( "LOCKABLE_LINK_ERR: %s is a dependency of %s so cannot link as dependency again" , lockable . ID ( ) , requirement . ID ( ) )
2023-06-28 00:48:49 -06:00
}
if lockable_state . Owner ( ) == nil {
// If the new owner isn't locked, we can add the requirement
} else if requirement_state . Owner ( ) == nil {
2023-06-28 01:02:43 -06:00
// if the new requirement isn't already locked but the owner is, the requirement needs to be locked first
2023-06-28 21:49:23 -06:00
return fmt . Errorf ( "LOCKABLE_LINK_ERR: %s is locked, %s must be locked to add" , lockable . ID ( ) , requirement . ID ( ) )
2023-06-28 01:02:43 -06:00
} else {
// If the new requirement is already locked and the owner is already locked, their owners need to match
if requirement_state . Owner ( ) . ID ( ) != lockable_state . Owner ( ) . ID ( ) {
2023-06-28 21:49:23 -06:00
return fmt . Errorf ( "LOCKABLE_LINK_ERR: %s is not locked by the same owner as %s, can't link as requirement" , requirement . ID ( ) , lockable . ID ( ) )
2023-06-28 01:02:43 -06:00
}
2023-06-25 13:39:00 -06:00
}
}
// Update the states of the requirements
2023-06-28 21:49:23 -06:00
for _ , requirement := range ( requirements ) {
requirement_state := states [ requirement . ID ( ) ] . ( LockableState )
2023-06-25 13:39:00 -06:00
requirement_state . AddDependency ( lockable )
lockable_state . AddRequirement ( requirement )
2023-06-28 21:49:23 -06:00
ctx . Log . Logf ( "lockable" , "LOCKABLE_LINK: linked %s to %s as a requirement" , requirement . ID ( ) , lockable . ID ( ) )
2023-06-23 20:56:09 -06:00
}
2023-06-25 13:39:00 -06:00
// Return no error
2023-06-28 21:49:23 -06:00
return nil
2023-06-23 20:56:09 -06:00
} )
2023-06-25 13:39:00 -06:00
2023-06-28 21:49:23 -06:00
2023-06-23 20:56:09 -06:00
return err
}
2023-06-28 21:49:23 -06:00
func NewBaseLockableState ( name string , _type string ) BaseLockableState {
2023-06-25 13:39:00 -06:00
state := BaseLockableState {
2023-06-28 00:48:49 -06:00
locks_held : map [ NodeID ] Lockable { } ,
2023-06-28 21:49:23 -06:00
_type : _type ,
2023-06-25 13:39:00 -06:00
name : name ,
owner : nil ,
requirements : [ ] Lockable { } ,
dependencies : [ ] Lockable { } ,
}
return state
}
2023-06-23 20:56:09 -06:00
type Lockable interface {
GraphNode
// Called when locking the node to allow for custom lock behaviour
2023-06-28 00:48:49 -06:00
Lock ( node GraphNode , state LockableState )
// Called to check if the node can lock
CanLock ( node GraphNode , state LockableState ) error
2023-06-23 20:56:09 -06:00
// Called when unlocking the node to allow for custom lock behaviour
2023-06-28 00:48:49 -06:00
Unlock ( node GraphNode , state LockableState )
// Called to check if the node can unlock
CanUnlock ( node GraphNode , state LockableState ) error
2023-06-23 20:56:09 -06:00
}
func ( lockable * BaseLockable ) PropagateUpdate ( ctx * GraphContext , signal GraphSignal ) {
2023-06-28 21:49:23 -06:00
UseStates ( ctx , [ ] GraphNode { lockable } , func ( states NodeStateMap ) error {
lockable_state := states [ lockable . ID ( ) ] . ( LockableState )
2023-06-23 20:56:09 -06:00
if signal . Direction ( ) == Up {
// Child->Parent, lockable updates dependency lockables
2023-06-24 19:48:59 -06:00
owner_sent := false
2023-06-23 20:56:09 -06:00
for _ , dependency := range lockable_state . Dependencies ( ) {
SendUpdate ( ctx , dependency , signal )
2023-06-24 19:48:59 -06:00
if lockable_state . Owner ( ) != nil {
if dependency . ID ( ) != lockable_state . Owner ( ) . ID ( ) {
owner_sent = true
}
}
2023-06-23 20:56:09 -06:00
}
2023-06-24 19:48:59 -06:00
if lockable_state . Owner ( ) != nil && owner_sent == false {
2023-06-23 20:56:09 -06:00
SendUpdate ( ctx , lockable_state . Owner ( ) , signal )
}
2023-06-24 19:48:59 -06:00
} else if signal . Direction ( ) == Down {
// Parent->Child, lockable updates lock holder
2023-06-23 20:56:09 -06:00
for _ , requirement := range ( lockable_state . Requirements ( ) ) {
SendUpdate ( ctx , requirement , signal )
}
2023-06-24 19:48:59 -06:00
2023-06-23 20:56:09 -06:00
} else if signal . Direction ( ) == Direct {
} else {
panic ( fmt . Sprintf ( "Invalid signal direction: %d" , signal . Direction ( ) ) )
}
2023-06-28 00:48:49 -06:00
return nil
2023-06-23 20:56:09 -06:00
} )
}
2023-06-28 21:49:23 -06:00
func checkIfRequirement ( ctx * GraphContext , r_id NodeID , cur LockableState , cur_id NodeID , states NodeStateMap ) bool {
2023-06-23 20:56:09 -06:00
for _ , c := range ( cur . Requirements ( ) ) {
if c . ID ( ) == r_id {
return true
}
2023-06-28 00:48:49 -06:00
is_requirement := false
2023-06-28 21:49:23 -06:00
UpdateMoreStates ( ctx , [ ] GraphNode { c } , states , func ( states NodeStateMap ) ( error ) {
requirement_state := states [ c . ID ( ) ] . ( LockableState )
is_requirement = checkIfRequirement ( ctx , cur_id , requirement_state , c . ID ( ) , states )
2023-06-28 00:48:49 -06:00
return nil
2023-06-23 20:56:09 -06:00
} )
if is_requirement {
return true
}
}
return false
}
2023-06-28 21:49:23 -06:00
func LockLockables ( ctx * GraphContext , to_lock [ ] Lockable , holder Lockable , holder_state LockableState , states NodeStateMap ) error {
2023-06-28 00:48:49 -06:00
if to_lock == nil {
return fmt . Errorf ( "LOCKABLE_LOCK_ERR: no list provided" )
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
for _ , l := range ( to_lock ) {
if l == nil {
return fmt . Errorf ( "LOCKABLE_LOCK_ERR: Can not lock nil" )
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
}
if holder == nil {
return fmt . Errorf ( "LOCKABLE_LOCK_ERR: nil cannot hold locks" )
}
2023-06-23 20:56:09 -06:00
2023-06-28 00:48:49 -06:00
// Called with no requirements to lock, success
if len ( to_lock ) == 0 {
return nil
}
2023-06-23 20:56:09 -06:00
2023-06-28 00:48:49 -06:00
if holder_state == nil {
if len ( to_lock ) != 1 {
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: if holder_state is nil, can only self-lock" )
} else if holder . ID ( ) != to_lock [ 0 ] . ID ( ) {
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: if holder_state is nil, can only self-lock" )
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
}
2023-06-23 20:56:09 -06:00
2023-06-28 00:48:49 -06:00
node_list := make ( [ ] GraphNode , len ( to_lock ) )
for i , l := range ( to_lock ) {
node_list [ i ] = l
}
2023-06-28 21:49:23 -06:00
err := UpdateMoreStates ( ctx , node_list , states , func ( states NodeStateMap ) error {
2023-06-28 00:48:49 -06:00
// First loop is to check that the states can be locked, and locks all requirements
2023-06-28 21:49:23 -06:00
for _ , req := range ( to_lock ) {
state := states [ req . ID ( ) ]
2023-06-28 00:48:49 -06:00
req_state , ok := state . ( LockableState )
ctx . Log . Logf ( "lockable" , "LOCKABLE_LOCKING: %s from %s" , req . ID ( ) , holder . ID ( ) )
if ok == false {
2023-06-28 21:49:23 -06:00
return fmt . Errorf ( "LOCKABLE_LOCK_ERR: %s(requirement of %s) does not have a LockableState" , req . ID ( ) , holder . ID ( ) )
2023-06-28 00:48:49 -06:00
}
// Check custom lock conditions
err := req . CanLock ( holder , req_state )
2023-06-23 20:56:09 -06:00
if err != nil {
2023-06-28 21:49:23 -06:00
return err
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
// If req is alreay locked, check that we can pass the lock
if req_state . Owner ( ) != nil {
owner := req_state . Owner ( )
// Check if reqs owner will let holder take the lock from it
// The owner is either the same node, a node higher up in the dependency tree, or node outside the dependency tree(must be enforeced when linking dependencies)
// If the owner is the same node, we already have all the states we need to check lock passing
// If the owner is higher up in the dependency tree, we've either already got it's state getting to this node, or we won't try to get it's state as a dependency to lock this node, so we can grab the state and add it to a map
// If the owner is outside the dependency tree, then we won't try to grab it's lock trying to lock this node recursively
// So if the owner is the same node we don't need a new state, but if the owner is a different node then we need to grab it's state and add it to the list
if owner . ID ( ) == req . ID ( ) {
if req_state . AllowedToTakeLock ( holder . ID ( ) , req . ID ( ) ) == false {
2023-06-28 21:49:23 -06:00
return fmt . Errorf ( "LOCKABLE_LOCK_ERR: %s is not allowed to take %s's lock from %s" , holder . ID ( ) , req . ID ( ) , owner . ID ( ) )
2023-06-28 00:48:49 -06:00
}
// RECURSE: At this point either:
// 1) req has no children and the next LockLockables will return instantly
// a) in this case, we're holding every state mutex up to the resource being locked
// and all the owners passing a lock, so we can start to change state
// 2) req has children, and we will recurse(checking that locking is allowed) until we reach a leaf and can release the locks as we change state. The call will either return nil if state has changed, on an error if no state has changed
2023-06-28 21:49:23 -06:00
err := LockLockables ( ctx , req_state . Requirements ( ) , req , req_state , states )
2023-06-28 00:48:49 -06:00
if err != nil {
2023-06-28 21:49:23 -06:00
return err
2023-06-28 00:48:49 -06:00
}
} else {
2023-06-28 21:49:23 -06:00
err := UpdateMoreStates ( ctx , [ ] GraphNode { owner } , states , func ( states NodeStateMap ) ( error ) {
owner_state , ok := states [ owner . ID ( ) ] . ( LockableState )
if ok == false {
return fmt . Errorf ( "LOCKABLE_LOCK_ERR: %s does not have a LockableState" , owner . ID ( ) )
2023-06-28 00:48:49 -06:00
}
2023-06-28 21:49:23 -06:00
2023-06-28 00:48:49 -06:00
if owner_state . AllowedToTakeLock ( holder . ID ( ) , req . ID ( ) ) == false {
2023-06-28 21:49:23 -06:00
return fmt . Errorf ( "LOCKABLE_LOCK_ERR: %s is not allowed to take %s's lock from %s" , holder . ID ( ) , req . ID ( ) , owner . ID ( ) )
2023-06-28 00:48:49 -06:00
}
2023-06-28 21:49:23 -06:00
err := LockLockables ( ctx , req_state . Requirements ( ) , req , req_state , states )
return err
} )
if err != nil {
return err
2023-06-28 00:48:49 -06:00
}
}
} else {
2023-06-28 21:49:23 -06:00
err := LockLockables ( ctx , req_state . Requirements ( ) , req , req_state , states )
2023-06-28 00:48:49 -06:00
if err != nil {
2023-06-28 21:49:23 -06:00
return err
2023-06-28 00:48:49 -06:00
}
}
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
// At this point state modification will be started, so no errors can be returned
2023-06-28 21:49:23 -06:00
for _ , req := range ( to_lock ) {
req_state := states [ req . ID ( ) ] . ( LockableState )
2023-06-28 00:48:49 -06:00
old_owner := req_state . Owner ( )
req_state . SetOwner ( holder )
if req . ID ( ) == holder . ID ( ) {
req_state . RecordLockHolder ( req . ID ( ) , old_owner )
} else {
holder_state . RecordLockHolder ( req . ID ( ) , old_owner )
}
req . Lock ( holder , req_state )
if old_owner == nil {
ctx . Log . Logf ( "lockable" , "LOCKABLE_LOCK: %s locked %s" , holder . ID ( ) , req . ID ( ) )
} else {
ctx . Log . Logf ( "lockable" , "LOCKABLE_LOCK: %s took lock of %s from %s" , holder . ID ( ) , req . ID ( ) , old_owner . ID ( ) )
}
2023-06-23 20:56:09 -06:00
}
2023-06-28 21:49:23 -06:00
return nil
2023-06-28 00:48:49 -06:00
} )
return err
}
2023-06-23 20:56:09 -06:00
2023-06-28 21:49:23 -06:00
func UnlockLockables ( ctx * GraphContext , to_unlock [ ] Lockable , holder Lockable , holder_state LockableState , states NodeStateMap ) error {
2023-06-28 00:48:49 -06:00
if to_unlock == nil {
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: no list provided" )
}
for _ , l := range ( to_unlock ) {
if l == nil {
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: Can not lock nil" )
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
}
if holder == nil {
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: nil cannot hold locks" )
}
2023-06-23 20:56:09 -06:00
2023-06-28 00:48:49 -06:00
// Called with no requirements to lock, success
if len ( to_unlock ) == 0 {
return nil
}
2023-06-23 20:56:09 -06:00
2023-06-28 00:48:49 -06:00
if holder_state == nil {
if len ( to_unlock ) != 1 {
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: if holder_state is nil, can only self-lock" )
} else if holder . ID ( ) != to_unlock [ 0 ] . ID ( ) {
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: if holder_state is nil, can only self-lock" )
}
}
2023-06-23 20:56:09 -06:00
2023-06-28 00:48:49 -06:00
node_list := make ( [ ] GraphNode , len ( to_unlock ) )
for i , l := range ( to_unlock ) {
node_list [ i ] = l
2023-06-23 20:56:09 -06:00
}
2023-06-28 21:49:23 -06:00
err := UpdateMoreStates ( ctx , node_list , states , func ( states NodeStateMap ) error {
2023-06-28 00:48:49 -06:00
// First loop is to check that the states can be locked, and locks all requirements
2023-06-28 21:49:23 -06:00
for _ , req := range ( to_unlock ) {
req_state , ok := states [ req . ID ( ) ] . ( LockableState )
2023-06-28 00:48:49 -06:00
ctx . Log . Logf ( "lockable" , "LOCKABLE_UNLOCKING: %s from %s" , req . ID ( ) , holder . ID ( ) )
if ok == false {
2023-06-28 21:49:23 -06:00
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: %s(requirement of %s) does not have a LockableState" , req . ID ( ) , holder . ID ( ) )
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
// Check if the owner is correct
if req_state . Owner ( ) != nil {
if req_state . Owner ( ) . ID ( ) != holder . ID ( ) {
2023-06-28 21:49:23 -06:00
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: %s is not locked by %s" , req . ID ( ) , holder . ID ( ) )
2023-06-28 00:48:49 -06:00
}
2023-06-23 20:56:09 -06:00
} else {
2023-06-28 21:49:23 -06:00
return fmt . Errorf ( "LOCKABLE_UNLOCK_ERR: %s is not locked" , req . ID ( ) )
2023-06-23 20:56:09 -06:00
}
2023-06-28 00:48:49 -06:00
// Check custom unlock conditions
err := req . CanUnlock ( holder , req_state )
if err != nil {
2023-06-28 21:49:23 -06:00
return err
2023-06-23 20:56:09 -06:00
}
2023-06-28 21:49:23 -06:00
err = UnlockLockables ( ctx , req_state . Requirements ( ) , req , req_state , states )
2023-06-23 20:56:09 -06:00
if err != nil {
2023-06-28 21:49:23 -06:00
return err
2023-06-23 20:56:09 -06:00
}
}
2023-06-28 00:48:49 -06:00
// At this point state modification will be started, so no errors can be returned
2023-06-28 21:49:23 -06:00
for _ , req := range ( to_unlock ) {
req_state := states [ req . ID ( ) ] . ( LockableState )
2023-06-28 00:48:49 -06:00
var new_owner Lockable = nil
if holder_state == nil {
new_owner = req_state . ReturnLock ( req . ID ( ) )
} else {
new_owner = holder_state . ReturnLock ( req . ID ( ) )
}
req_state . SetOwner ( new_owner )
req . Unlock ( holder , req_state )
if new_owner == nil {
ctx . Log . Logf ( "lockable" , "LOCKABLE_UNLOCK: %s unlocked %s" , holder . ID ( ) , req . ID ( ) )
} else {
ctx . Log . Logf ( "lockable" , "LOCKABLE_UNLOCK: %s passed lock of %s back to %s" , holder . ID ( ) , req . ID ( ) , new_owner . ID ( ) )
2023-06-23 20:56:09 -06:00
}
}
2023-06-28 21:49:23 -06:00
return nil
2023-06-23 20:56:09 -06:00
} )
return err
}
// BaseLockables represent simple lockables in the DAG that can be used to create a hierarchy of locks that store names
type BaseLockable struct {
BaseNode
}
//BaseLockables don't check anything special when locking/unlocking
2023-06-28 00:48:49 -06:00
func ( lockable * BaseLockable ) CanLock ( node GraphNode , state LockableState ) error {
2023-06-23 20:56:09 -06:00
return nil
}
2023-06-28 00:48:49 -06:00
func ( lockable * BaseLockable ) CanUnlock ( node GraphNode , state LockableState ) error {
2023-06-23 20:56:09 -06:00
return nil
}
2023-06-28 00:48:49 -06:00
//BaseLockables don't check anything special when locking/unlocking
func ( lockable * BaseLockable ) Lock ( node GraphNode , state LockableState ) {
return
}
func ( lockable * BaseLockable ) Unlock ( node GraphNode , state LockableState ) {
return
}
2023-06-26 01:16:44 -06:00
func NewBaseLockable ( ctx * GraphContext , state LockableState ) ( BaseLockable , error ) {
base_node , err := NewNode ( ctx , state )
if err != nil {
return BaseLockable { } , err
}
lockable := BaseLockable {
BaseNode : base_node ,
2023-06-23 20:56:09 -06:00
}
2023-06-26 01:16:44 -06:00
return lockable , nil
}
2023-06-28 21:49:23 -06:00
func LoadBaseLockable ( ctx * GraphContext , id NodeID ) ( GraphNode , error ) {
// call LoadNodeRecurse on any connected nodes to ensure they're loaded and return the id
base_node := RestoreNode ( ctx , id )
lockable := BaseLockable {
BaseNode : base_node ,
}
return & lockable , nil
}
func LoadBaseLockableState ( ctx * GraphContext , id NodeID , data [ ] byte , loaded_nodes map [ NodeID ] GraphNode ) ( NodeState , error ) {
var j BaseLockableStateJSON
err := json . Unmarshal ( data , & j )
if err != nil {
return nil , err
}
var owner Lockable = nil
if j . Owner != nil {
o , err := LoadNodeRecurse ( ctx , * j . Owner , loaded_nodes )
if err != nil {
return nil , err
}
o_l , ok := o . ( Lockable )
if ok == false {
return nil , err
}
owner = o_l
}
state := BaseLockableState {
_type : "base_lockable" ,
name : j . Name ,
owner : owner ,
dependencies : make ( [ ] Lockable , len ( j . Dependencies ) ) ,
requirements : make ( [ ] Lockable , len ( j . Requirements ) ) ,
locks_held : map [ NodeID ] Lockable { } ,
}
for i , dep := range ( j . Dependencies ) {
dep_node , err := LoadNodeRecurse ( ctx , dep , loaded_nodes )
if err != nil {
return nil , err
}
dep_l , ok := dep_node . ( Lockable )
if ok == false {
return nil , fmt . Errorf ( "%+v is not a Lockable as expected" , dep_node )
}
state . dependencies [ i ] = dep_l
}
for i , req := range ( j . Requirements ) {
req_node , err := LoadNodeRecurse ( ctx , req , loaded_nodes )
if err != nil {
return nil , err
}
req_l , ok := req_node . ( Lockable )
if ok == false {
return nil , fmt . Errorf ( "%+v is not a Lockable as expected" , req_node )
}
state . requirements [ i ] = req_l
}
for l_id , h_id := range ( j . LocksHeld ) {
_ , err := LoadNodeRecurse ( ctx , l_id , loaded_nodes )
if err != nil {
return nil , err
}
var h_l Lockable = nil
if h_id != nil {
h_node , err := LoadNodeRecurse ( ctx , * h_id , loaded_nodes )
if err != nil {
return nil , err
}
h , ok := h_node . ( Lockable )
if ok == false {
return nil , err
}
h_l = h
}
state . locks_held [ l_id ] = h_l
}
return & state , nil
}
func LoadNode ( ctx * GraphContext , id NodeID ) ( GraphNode , error ) {
// Initialize an empty list of loaded nodes, then start loading them from id
loaded_nodes := map [ NodeID ] GraphNode { }
return LoadNodeRecurse ( ctx , id , loaded_nodes )
}
type DBJSONBase struct {
Type string ` json:"type" `
}
// Check if a node is already loaded, load it's state bytes from the DB and parse the type if it's not already loaded
// Call the node load function related to the type, which will call this parse function recusively as needed
func LoadNodeRecurse ( ctx * GraphContext , id NodeID , loaded_nodes map [ NodeID ] GraphNode ) ( GraphNode , error ) {
node , exists := loaded_nodes [ id ]
if exists == false {
state_bytes , err := ReadDBState ( ctx , id )
if err != nil {
return nil , err
}
var base DBJSONBase
err = json . Unmarshal ( state_bytes , & base )
if err != nil {
return nil , err
}
ctx . Log . Logf ( "graph" , "GRAPH_DB_LOAD: %s(%s)" , base . Type , id )
node_fn , exists := ctx . NodeLoadFuncs [ base . Type ]
if exists == false {
return nil , fmt . Errorf ( "%s is not a known node type" , base . Type )
}
node , err = node_fn ( ctx , id )
if err != nil {
return nil , err
}
loaded_nodes [ id ] = node
state_fn , exists := ctx . StateLoadFuncs [ base . Type ]
if exists == false {
return nil , fmt . Errorf ( "%s is not a known node state type" , base . Type )
}
state , err := state_fn ( ctx , id , state_bytes , loaded_nodes )
if err != nil {
return nil , err
}
node . SetState ( state )
}
return node , nil
}
2023-06-26 01:16:44 -06:00
func NewSimpleBaseLockable ( ctx * GraphContext , name string , requirements [ ] Lockable ) ( * BaseLockable , error ) {
2023-06-28 21:49:23 -06:00
state := NewBaseLockableState ( name , "base_lockable" )
2023-06-26 01:16:44 -06:00
lockable , err := NewBaseLockable ( ctx , & state )
if err != nil {
return nil , err
}
lockable_ptr := & lockable
err = LinkLockables ( ctx , lockable_ptr , requirements )
2023-06-25 13:39:00 -06:00
if err != nil {
return nil , err
2023-06-23 20:56:09 -06:00
}
2023-06-26 01:16:44 -06:00
return lockable_ptr , nil
2023-06-23 20:56:09 -06:00
}