X-Git-Url: https://git.opendaylight.org/gerrit/gitweb?a=blobdiff_plain;f=opendaylight%2Fmd-sal%2Fcds-access-client%2Fsrc%2Fmain%2Fjava%2Forg%2Fopendaylight%2Fcontroller%2Fcluster%2Faccess%2Fclient%2FAbstractClientConnection.java;h=ac4ac785d6e28dcaf08de1a82a85bf2610020186;hb=refs%2Fchanges%2F53%2F49053%2F18;hp=170b1507a91254a6c7c13e2297158a6914e62b59;hpb=320a4e5cd2d9d80468a3f82798744f2035488218;p=controller.git diff --git a/opendaylight/md-sal/cds-access-client/src/main/java/org/opendaylight/controller/cluster/access/client/AbstractClientConnection.java b/opendaylight/md-sal/cds-access-client/src/main/java/org/opendaylight/controller/cluster/access/client/AbstractClientConnection.java index 170b1507a9..ac4ac785d6 100644 --- a/opendaylight/md-sal/cds-access-client/src/main/java/org/opendaylight/controller/cluster/access/client/AbstractClientConnection.java +++ b/opendaylight/md-sal/cds-access-client/src/main/java/org/opendaylight/controller/cluster/access/client/AbstractClientConnection.java @@ -10,12 +10,11 @@ package org.opendaylight.controller.cluster.access.client; import akka.actor.ActorRef; import com.google.common.annotations.VisibleForTesting; import com.google.common.base.Preconditions; -import com.google.common.base.Verify; import edu.umd.cs.findbugs.annotations.SuppressFBWarnings; -import java.util.ArrayDeque; import java.util.Optional; -import java.util.Queue; import java.util.concurrent.TimeUnit; +import java.util.concurrent.locks.Lock; +import java.util.concurrent.locks.ReentrantLock; import java.util.function.Consumer; import javax.annotation.Nonnull; import javax.annotation.concurrent.GuardedBy; @@ -45,30 +44,27 @@ public abstract class AbstractClientConnection { @VisibleForTesting static final long REQUEST_TIMEOUT_NANOS = TimeUnit.SECONDS.toNanos(30); - private final Queue pending; + private final Lock lock = new ReentrantLock(); private final ClientActorContext context; + @GuardedBy("lock") + private final TransmitQueue queue; private final Long cookie; - private volatile ReconnectForwarder successor; private volatile RequestException poisoned; - private long lastProgress; - private AbstractClientConnection(final ClientActorContext context, final Long cookie, - final Queue pending) { + // Do not allow subclassing outside of this package + AbstractClientConnection(final ClientActorContext context, final Long cookie, + final TransmitQueue queue) { this.context = Preconditions.checkNotNull(context); this.cookie = Preconditions.checkNotNull(cookie); - this.pending = Preconditions.checkNotNull(pending); - this.lastProgress = readTime(); - } - - // Do not allow subclassing outside of this package - AbstractClientConnection(final ClientActorContext context, final Long cookie) { - this(context, cookie, new ArrayDeque<>(1)); + this.queue = Preconditions.checkNotNull(queue); } // Do not allow subclassing outside of this package - AbstractClientConnection(final AbstractClientConnection oldConnection) { - this(oldConnection.context, oldConnection.cookie, oldConnection.pending); + AbstractClientConnection(final AbstractClientConnection oldConnection, final int targetQueueSize) { + this.context = oldConnection.context; + this.cookie = oldConnection.cookie; + this.queue = new TransmitQueue.Halted(targetQueueSize); } public final ClientActorContext context() { @@ -83,67 +79,67 @@ public abstract class AbstractClientConnection { return context.self(); } - final long readTime() { - return context.ticker().read(); - } - - final Queue pending() { - return pending; - } - /** * Send a request to the backend and invoke a specified callback when it finishes. This method is safe to invoke * from any thread. * + *

This method may put the caller thread to sleep in order to throttle the request rate. + * The callback may be called before the sleep finishes. + * * @param request Request to send * @param callback Callback to invoke */ public final void sendRequest(final Request request, final Consumer> callback) { - Preconditions.checkState(poisoned == null, "Connection %s has been poisoned", this); + final RequestException maybePoison = poisoned; + if (maybePoison != null) { + throw new IllegalStateException("Connection " + this + " has been poisoned", maybePoison); + } - final ReconnectForwarder beforeQueue = successor; final ConnectionEntry entry = new ConnectionEntry(request, callback, readTime()); - if (beforeQueue != null) { - LOG.trace("Forwarding entry {} from {} to {}", entry, this, beforeQueue); - beforeQueue.forwardEntry(entry); - return; - } + enqueueAndWait(entry, entry.getEnqueuedTicks()); + } - enqueueEntry(entry); + public abstract Optional getBackendInfo(); - final ReconnectForwarder afterQueue = successor; - if (afterQueue != null) { - synchronized (this) { - spliceToSuccessor(afterQueue); - } - } + final Iterable startReplay() { + lock.lock(); + return queue.asIterable(); } - public final synchronized void setForwarder(final ReconnectForwarder forwarder) { - Verify.verify(successor == null, "Successor {} already set on connection {}", successor, this); - successor = Preconditions.checkNotNull(forwarder); - LOG.debug("Connection {} superseded by {}, splicing queue", this, successor); - spliceToSuccessor(forwarder); + @GuardedBy("lock") + final void finishReplay(final ReconnectForwarder forwarder) { + queue.setForwarder(forwarder, readTime()); + lock.unlock(); } - public abstract Optional getBackendInfo(); + @GuardedBy("lock") + final void setForwarder(final ReconnectForwarder forwarder) { + queue.setForwarder(forwarder, readTime()); + } - @GuardedBy("this") - void spliceToSuccessor(final ReconnectForwarder successor) { - ConnectionEntry entry = pending.poll(); - while (entry != null) { - successor.forwardEntry(entry); - entry = pending.poll(); - } + @GuardedBy("lock") + abstract ClientActorBehavior reconnectConnection(ClientActorBehavior current); + + private long readTime() { + return context.ticker().read(); } - final ConnectionEntry dequeEntry() { - lastProgress = readTime(); - return pending.poll(); + final long enqueueEntry(final ConnectionEntry entry, final long now) { + lock.lock(); + try { + return queue.enqueue(entry, now); + } finally { + lock.unlock(); + } } - void enqueueEntry(final ConnectionEntry entry) { - pending.add(entry); + final void enqueueAndWait(final ConnectionEntry entry, final long now) { + final long delay = enqueueEntry(entry, now); + try { + TimeUnit.NANOSECONDS.sleep(delay); + } catch (InterruptedException e) { + LOG.debug("Interrupted while sleeping"); + } } /** @@ -157,35 +153,40 @@ public abstract class AbstractClientConnection { } /** - * Check queue timeouts and return true if a timeout has occurred. + * Check this queue for timeout and initiate reconnection if that happened. If the queue has not made progress + * in {@link #NO_PROGRESS_TIMEOUT_NANOS} nanoseconds, it will be aborted. * - * @return True if a timeout occurred - * @throws NoProgressException if the queue failed to make progress for an extended - * time. + * @param current Current behavior + * @return Next behavior to use */ @VisibleForTesting final ClientActorBehavior runTimer(final ClientActorBehavior current) { - final long now = readTime(); + final Optional delay; - if (!isEmpty()) { - final long ticksSinceProgress = now - lastProgress; + lock.lock(); + try { + final long now = readTime(); + // The following line is only reliable when queue is not forwarding, but such state should not last long. + final long ticksSinceProgress = queue.ticksStalling(now); if (ticksSinceProgress >= NO_PROGRESS_TIMEOUT_NANOS) { LOG.error("Queue {} has not seen progress in {} seconds, failing all requests", this, TimeUnit.NANOSECONDS.toSeconds(ticksSinceProgress)); - poison(new NoProgressException(ticksSinceProgress)); + lockedPoison(new NoProgressException(ticksSinceProgress)); current.removeConnection(this); return current; } - } - // Requests are always scheduled in sequence, hence checking for timeout is relatively straightforward. - // Note we use also inquire about the delay, so we can re-schedule if needed, hence the unusual tri-state - // return convention. - final Optional delay = checkTimeout(now); - if (delay == null) { - // We have timed out. There is no point in scheduling a timer - return reconnectConnection(current); + // Requests are always scheduled in sequence, hence checking for timeout is relatively straightforward. + // Note we use also inquire about the delay, so we can re-schedule if needed, hence the unusual tri-state + // return convention. + delay = lockedCheckTimeout(now); + if (delay == null) { + // We have timed out. There is no point in scheduling a timer + return reconnectConnection(current); + } + } finally { + lock.unlock(); } if (delay.isPresent()) { @@ -196,8 +197,14 @@ public abstract class AbstractClientConnection { return current; } - boolean isEmpty() { - return pending.isEmpty(); + @VisibleForTesting + final Optional checkTimeout(final long now) { + lock.lock(); + try { + return lockedCheckTimeout(now); + } finally { + lock.unlock(); + } } /* @@ -208,44 +215,35 @@ public abstract class AbstractClientConnection { */ @SuppressFBWarnings(value = "NP_OPTIONAL_RETURN_NULL", justification = "Returning null Optional is documented in the API contract.") - final Optional checkTimeout(final ConnectionEntry head, final long now) { + @GuardedBy("lock") + private Optional lockedCheckTimeout(final long now) { + final ConnectionEntry head = queue.peek(); if (head == null) { return Optional.empty(); } - final long delay = head.getEnqueuedTicks() - now + REQUEST_TIMEOUT_NANOS; - if (delay <= 0) { - LOG.debug("Connection {} timed out", this); + final long beenOpen = now - head.getEnqueuedTicks(); + if (beenOpen >= REQUEST_TIMEOUT_NANOS) { + LOG.debug("Connection {} has a request not completed for {} nanoseconds, timing out", this, beenOpen); return null; } - return Optional.of(FiniteDuration.apply(delay, TimeUnit.NANOSECONDS)); - } - - /* - * We are using tri-state return here to indicate one of three conditions: - * - if there is no timeout to schedule, return Optional.empty() - * - if there is a timeout to schedule, return a non-empty optional - * - if this connections has timed out, return null - */ - @SuppressFBWarnings(value = "NP_OPTIONAL_RETURN_NULL", - justification = "Returning null Optional is documented in the API contract.") - Optional checkTimeout(final long now) { - return checkTimeout(pending.peek(), now); + return Optional.of(FiniteDuration.apply(REQUEST_TIMEOUT_NANOS - beenOpen, TimeUnit.NANOSECONDS)); } - static void poisonQueue(final Queue queue, final RequestException cause) { - for (ConnectionEntry e : queue) { - final Request request = e.getRequest(); - LOG.trace("Poisoning request {}", request, cause); - e.complete(request.toRequestFailure(cause)); + final void poison(final RequestException cause) { + lock.lock(); + try { + lockedPoison(cause); + } finally { + lock.unlock(); } - queue.clear(); } - void poison(final RequestException cause) { + @GuardedBy("lock") + private void lockedPoison(final RequestException cause) { poisoned = cause; - poisonQueue(pending, cause); + queue.poison(cause); } @VisibleForTesting @@ -253,7 +251,21 @@ public abstract class AbstractClientConnection { return poisoned; } - abstract ClientActorBehavior reconnectConnection(ClientActorBehavior current); + final void receiveResponse(final ResponseEnvelope envelope) { + final long now = readTime(); + + final Optional maybeEntry; + lock.lock(); + try { + maybeEntry = queue.complete(envelope, now); + } finally { + lock.unlock(); + } - abstract void receiveResponse(final ResponseEnvelope envelope); + if (maybeEntry.isPresent()) { + final TransmittedConnectionEntry entry = maybeEntry.get(); + LOG.debug("Completing {} with {}", entry, envelope); + entry.complete(envelope.getMessage()); + } + } }