/* * Copyright (c) 2015 Cisco Systems, Inc. and others. All rights reserved. * Copyright (c) 2015 Brocade Communications Systems, Inc. and others. All rights reserved. * * This program and the accompanying materials are made available under the * terms of the Eclipse Public License v1.0 which accompanies this distribution, * and is available at http://www.eclipse.org/legal/epl-v10.html */ package org.opendaylight.controller.cluster.datastore; import akka.actor.ActorSelection; import akka.dispatch.Futures; import akka.dispatch.OnComplete; import com.google.common.base.Preconditions; import com.google.common.util.concurrent.SettableFuture; import org.opendaylight.controller.cluster.access.concepts.TransactionIdentifier; import org.opendaylight.controller.cluster.datastore.messages.AbstractRead; import org.opendaylight.controller.cluster.datastore.messages.BatchedModifications; import org.opendaylight.controller.cluster.datastore.messages.CloseTransaction; import org.opendaylight.controller.cluster.datastore.modification.AbstractModification; import org.opendaylight.controller.cluster.datastore.modification.Modification; import org.opendaylight.controller.cluster.datastore.utils.ActorContext; import org.opendaylight.controller.md.sal.common.api.data.ReadFailedException; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import scala.concurrent.Future; /** * Redirects front-end transaction operations to a shard for processing. Instances of this class are used * when the destination shard is remote to the caller. * * @author Thomas Pantelis */ public class RemoteTransactionContext extends AbstractTransactionContext { private static final Logger LOG = LoggerFactory.getLogger(RemoteTransactionContext.class); private final ActorContext actorContext; private final ActorSelection actor; private final OperationLimiter limiter; private BatchedModifications batchedModifications; private int totalBatchedModificationsSent; private int batchPermits; /** * We have observed a failed modification batch. This transaction context is effectively doomed, as the backend * does not have a correct view of the world. If this happens, we do not limit operations but rather short-cut them * to a either a no-op (modifications) or a failure (reads). Once the transaction is ready, though, we send the * message to resynchronize with the backend, sharing a 'lost message' failure path. */ private volatile Throwable failedModification; protected RemoteTransactionContext(TransactionIdentifier identifier, ActorSelection actor, ActorContext actorContext, short remoteTransactionVersion, OperationLimiter limiter) { super(identifier, remoteTransactionVersion); this.limiter = Preconditions.checkNotNull(limiter); this.actor = actor; this.actorContext = actorContext; } private ActorSelection getActor() { return actor; } protected ActorContext getActorContext() { return actorContext; } @Override public void closeTransaction() { LOG.debug("Tx {} closeTransaction called", getIdentifier()); TransactionContextCleanup.untrack(this); actorContext.sendOperationAsync(getActor(), new CloseTransaction(getTransactionVersion()).toSerializable()); } @Override public Future directCommit() { LOG.debug("Tx {} directCommit called", getIdentifier()); // Send the remaining batched modifications, if any, with the ready flag set. return sendBatchedModifications(true, true); } @Override public Future readyTransaction() { logModificationCount(); LOG.debug("Tx {} readyTransaction called", getIdentifier()); // Send the remaining batched modifications, if any, with the ready flag set. Future lastModificationsFuture = sendBatchedModifications(true, false); return transformReadyReply(lastModificationsFuture); } protected Future transformReadyReply(final Future readyReplyFuture) { // Transform the last reply Future into a Future that returns the cohort actor path from // the last reply message. That's the end result of the ready operation. return TransactionReadyReplyMapper.transform(readyReplyFuture, actorContext, getIdentifier()); } private BatchedModifications newBatchedModifications() { return new BatchedModifications(getIdentifier(), getTransactionVersion()); } private void batchModification(Modification modification, boolean havePermit) { incrementModificationCount(); if (havePermit) { ++batchPermits; } if (batchedModifications == null) { batchedModifications = newBatchedModifications(); } batchedModifications.addModification(modification); if (batchedModifications.getModifications().size() >= actorContext.getDatastoreContext().getShardBatchedModificationCount()) { sendBatchedModifications(); } } protected Future sendBatchedModifications() { return sendBatchedModifications(false, false); } protected Future sendBatchedModifications(boolean ready, boolean doCommitOnReady) { Future sent = null; if (ready || batchedModifications != null && !batchedModifications.getModifications().isEmpty()) { if (batchedModifications == null) { batchedModifications = newBatchedModifications(); } LOG.debug("Tx {} sending {} batched modifications, ready: {}", getIdentifier(), batchedModifications.getModifications().size(), ready); batchedModifications.setReady(ready); batchedModifications.setDoCommitOnReady(doCommitOnReady); batchedModifications.setTotalMessagesSent(++totalBatchedModificationsSent); final BatchedModifications toSend = batchedModifications; final int permitsToRelease = batchPermits; batchPermits = 0; if (ready) { batchedModifications = null; } else { batchedModifications = newBatchedModifications(); final Throwable failure = failedModification; if (failure != null) { // We have observed a modification failure, it does not make sense to send this batch. This speeds // up the time when the application could be blocked due to messages timing out and operation // limiter kicking in. LOG.debug("Tx {} modifications previously failed, not sending a non-ready batch", getIdentifier()); limiter.release(permitsToRelease); return Futures.failed(failure); } } sent = actorContext.executeOperationAsync(getActor(), toSend.toSerializable(), actorContext.getTransactionCommitOperationTimeout()); sent.onComplete(new OnComplete() { @Override public void onComplete(Throwable failure, Object success) { if (failure != null) { LOG.debug("Tx {} modifications failed", getIdentifier(), failure); failedModification = failure; } else { LOG.debug("Tx {} modifications completed with {}", getIdentifier(), success); } limiter.release(permitsToRelease); } }, actorContext.getClientDispatcher()); } return sent; } @Override public void executeModification(AbstractModification modification) { LOG.debug("Tx {} executeModification {} called path = {}", getIdentifier(), modification.getClass().getSimpleName(), modification.getPath()); final boolean havePermit = failedModification == null && acquireOperation(); batchModification(modification, havePermit); } @Override public void executeRead(final AbstractRead readCmd, final SettableFuture returnFuture) { LOG.debug("Tx {} executeRead {} called path = {}", getIdentifier(), readCmd.getClass().getSimpleName(), readCmd.getPath()); final Throwable failure = failedModification; if (failure != null) { // If we know there was a previous modification failure, we must not send a read request, as it risks // returning incorrect data. We check this before acquiring an operation simply because we want the app // to complete this transaction as soon as possible. returnFuture.setException(new ReadFailedException("Previous modification failed, cannot " + readCmd.getClass().getSimpleName() + " for path " + readCmd.getPath(), failure)); return; } // Send any batched modifications. This is necessary to honor the read uncommitted semantics of the // public API contract. final boolean havePermit = acquireOperation(); sendBatchedModifications(); OnComplete onComplete = new OnComplete() { @Override public void onComplete(Throwable failure, Object response) { // We have previously acquired an operation, now release it, no matter what happened if (havePermit) { limiter.release(); } if (failure != null) { LOG.debug("Tx {} {} operation failed: {}", getIdentifier(), readCmd.getClass().getSimpleName(), failure); returnFuture.setException(new ReadFailedException("Error checking " + readCmd.getClass().getSimpleName() + " for path " + readCmd.getPath(), failure)); } else { LOG.debug("Tx {} {} operation succeeded", getIdentifier(), readCmd.getClass().getSimpleName()); readCmd.processResponse(response, returnFuture); } } }; final Future future = actorContext.executeOperationAsync(getActor(), readCmd.asVersion(getTransactionVersion()).toSerializable(), actorContext.getOperationTimeout()); future.onComplete(onComplete, actorContext.getClientDispatcher()); } /** * Acquire operation from the limiter if the hand-off has completed. If the hand-off is still ongoing, this method * does nothing. * * @return True if a permit was successfully acquired, false otherwise */ private boolean acquireOperation() { if (isOperationHandOffComplete()) { if (limiter.acquire()) { return true; } LOG.warn("Failed to acquire execute operation permit for transaction {} on actor {}", getIdentifier(), actor); } return false; } @Override public boolean usesOperationLimiting() { return true; } }