X-Git-Url: https://git.opendaylight.org/gerrit/gitweb?p=controller.git;a=blobdiff_plain;f=opendaylight%2Fmd-sal%2Fsal-distributed-datastore%2Fsrc%2Fmain%2Fjava%2Forg%2Fopendaylight%2Fcontroller%2Fcluster%2Fdatabroker%2Factors%2Fdds%2FAbstractClientHistory.java;h=d445d3c2f6f9e542ec031c2737653317e3952a73;hp=593944f08133d6706d30cdec605d389f8dc3f167;hb=d502ae8e1529b69af55a59c3e664a02457c05ec6;hpb=dea3effede98cfb561c44d66b24c2d71a44b10a3 diff --git a/opendaylight/md-sal/sal-distributed-datastore/src/main/java/org/opendaylight/controller/cluster/databroker/actors/dds/AbstractClientHistory.java b/opendaylight/md-sal/sal-distributed-datastore/src/main/java/org/opendaylight/controller/cluster/databroker/actors/dds/AbstractClientHistory.java index 593944f081..d445d3c2f6 100644 --- a/opendaylight/md-sal/sal-distributed-datastore/src/main/java/org/opendaylight/controller/cluster/databroker/actors/dds/AbstractClientHistory.java +++ b/opendaylight/md-sal/sal-distributed-datastore/src/main/java/org/opendaylight/controller/cluster/databroker/actors/dds/AbstractClientHistory.java @@ -7,13 +7,32 @@ */ package org.opendaylight.controller.cluster.databroker.actors.dds; -import com.google.common.base.Preconditions; +import static com.google.common.base.Preconditions.checkArgument; +import static com.google.common.base.Preconditions.checkState; +import static com.google.common.base.Verify.verifyNotNull; +import static java.util.Objects.requireNonNull; + +import java.util.Collection; +import java.util.HashMap; import java.util.Map; import java.util.concurrent.ConcurrentHashMap; +import java.util.concurrent.atomic.AtomicLongFieldUpdater; import java.util.concurrent.atomic.AtomicReferenceFieldUpdater; +import java.util.concurrent.locks.StampedLock; +import org.checkerframework.checker.lock.qual.GuardedBy; +import org.checkerframework.checker.lock.qual.Holding; +import org.eclipse.jdt.annotation.NonNull; +import org.opendaylight.controller.cluster.access.client.AbstractClientConnection; +import org.opendaylight.controller.cluster.access.client.ConnectedClientConnection; +import org.opendaylight.controller.cluster.access.client.ConnectionEntry; +import org.opendaylight.controller.cluster.access.client.InversibleLockException; +import org.opendaylight.controller.cluster.access.commands.CreateLocalHistoryRequest; import org.opendaylight.controller.cluster.access.concepts.LocalHistoryIdentifier; +import org.opendaylight.controller.cluster.access.concepts.Response; import org.opendaylight.controller.cluster.access.concepts.TransactionIdentifier; +import org.opendaylight.mdsal.dom.api.DOMTransactionChainClosedException; import org.opendaylight.yangtools.concepts.Identifiable; +import org.opendaylight.yangtools.yang.data.api.YangInstanceIdentifier; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -23,7 +42,7 @@ import org.slf4j.LoggerFactory; * * @author Robert Varga */ -abstract class AbstractClientHistory extends LocalAbortable implements Identifiable { +public abstract class AbstractClientHistory extends LocalAbortable implements Identifiable { enum State { IDLE, TX_OPEN, @@ -31,19 +50,33 @@ abstract class AbstractClientHistory extends LocalAbortable implements Identifia } private static final Logger LOG = LoggerFactory.getLogger(AbstractClientHistory.class); + private static final AtomicLongFieldUpdater NEXT_TX_UPDATER = + AtomicLongFieldUpdater.newUpdater(AbstractClientHistory.class, "nextTx"); private static final AtomicReferenceFieldUpdater STATE_UPDATER = AtomicReferenceFieldUpdater.newUpdater(AbstractClientHistory.class, State.class, "state"); - private final Map histories = new ConcurrentHashMap<>(); - private final DistributedDataStoreClientBehavior client; - private final LocalHistoryIdentifier identifier; + @GuardedBy("this") + private final Map> openTransactions = new HashMap<>(); + @GuardedBy("this") + private final Map readyTransactions = new HashMap<>(); + + @GuardedBy("lock") + private final Map histories = new ConcurrentHashMap<>(); + private final StampedLock lock = new StampedLock(); + + private final @NonNull AbstractDataStoreClientBehavior client; + private final @NonNull LocalHistoryIdentifier identifier; + + // Used via NEXT_TX_UPDATER + @SuppressWarnings("unused") + private volatile long nextTx = 0; private volatile State state = State.IDLE; - AbstractClientHistory(final DistributedDataStoreClientBehavior client, final LocalHistoryIdentifier identifier) { - this.client = Preconditions.checkNotNull(client); - this.identifier = Preconditions.checkNotNull(identifier); - Preconditions.checkArgument(identifier.getCookie() == 0); + AbstractClientHistory(final AbstractDataStoreClientBehavior client, final LocalHistoryIdentifier identifier) { + this.client = requireNonNull(client); + this.identifier = requireNonNull(identifier); + checkArgument(identifier.getCookie() == 0); } final State state() { @@ -52,41 +85,248 @@ abstract class AbstractClientHistory extends LocalAbortable implements Identifia final void updateState(final State expected, final State next) { final boolean success = STATE_UPDATER.compareAndSet(this, expected, next); - Preconditions.checkState(success, "Race condition detected, state changed from %s to %s", expected, state); + checkState(success, "Race condition detected, state changed from %s to %s", expected, state); + LOG.debug("Client history {} changed state from {} to {}", this, expected, next); + } + + final synchronized void doClose() { + final State local = state; + if (local != State.CLOSED) { + checkState(local == State.IDLE, "Local history %s has an open transaction", this); + histories.values().forEach(ProxyHistory::close); + updateState(local, State.CLOSED); + } + } + + final synchronized void onProxyDestroyed(final ProxyHistory proxyHistory) { + histories.remove(proxyHistory.getIdentifier().getCookie()); + LOG.debug("{}: removed destroyed proxy {}", this, proxyHistory); } @Override - public final LocalHistoryIdentifier getIdentifier() { + public LocalHistoryIdentifier getIdentifier() { return identifier; } - final DistributedDataStoreClientBehavior getClient() { - return client; + final long nextTx() { + return NEXT_TX_UPDATER.getAndIncrement(this); + } + + final Long resolveShardForPath(final YangInstanceIdentifier path) { + return client.resolveShardForPath(path); } @Override final void localAbort(final Throwable cause) { - LOG.debug("Force-closing history {}", getIdentifier(), cause); - state = State.CLOSED; + final State oldState = STATE_UPDATER.getAndSet(this, State.CLOSED); + if (oldState != State.CLOSED) { + LOG.debug("Force-closing history {}", getIdentifier(), cause); + + synchronized (this) { + for (AbstractClientHandle t : openTransactions.values()) { + t.localAbort(cause); + } + openTransactions.clear(); + readyTransactions.clear(); + } + } } - private AbstractProxyHistory createHistoryProxy(final Long shard) { - final LocalHistoryIdentifier historyId = new LocalHistoryIdentifier(identifier.getClientId(), + /** + * Create a new history proxy for a given shard. + * + * @throws InversibleLockException if the shard is being reconnected + */ + @Holding("lock") + private ProxyHistory createHistoryProxy(final Long shard) { + final AbstractClientConnection connection = client.getConnection(shard); + final LocalHistoryIdentifier proxyId = new LocalHistoryIdentifier(identifier.getClientId(), identifier.getHistoryId(), shard); - return AbstractProxyHistory.create(client, client.resolver().getFutureBackendInfo(shard), historyId); + LOG.debug("Created proxyId {} for history {} shard {}", proxyId, identifier, shard); + + final ProxyHistory ret = createHistoryProxy(proxyId, connection); + + // Request creation of the history, if it is not the single history + if (ret.getIdentifier().getHistoryId() != 0) { + connection.sendRequest(new CreateLocalHistoryRequest(ret.getIdentifier(), connection.localActor()), + this::createHistoryCallback); + } + return ret; + } + + abstract ProxyHistory createHistoryProxy(LocalHistoryIdentifier historyId, + AbstractClientConnection connection); + + private void createHistoryCallback(final Response response) { + LOG.debug("Create history response {}", response); + } + + private @NonNull ProxyHistory ensureHistoryProxy(final TransactionIdentifier transactionId, final Long shard) { + while (true) { + try { + // Short-lived lock to ensure exclusion of createHistoryProxy and the lookup phase in startReconnect, + // see comments in startReconnect() for details. + final long stamp = lock.readLock(); + try { + return histories.computeIfAbsent(shard, this::createHistoryProxy); + } finally { + lock.unlockRead(stamp); + } + } catch (InversibleLockException e) { + LOG.trace("Waiting for transaction {} shard {} connection to resolve", transactionId, shard); + e.awaitResolution(); + LOG.trace("Retrying transaction {} shard {} connection", transactionId, shard); + } + } + } + + final @NonNull AbstractProxyTransaction createSnapshotProxy(final TransactionIdentifier transactionId, + final Long shard) { + return ensureHistoryProxy(transactionId, shard).createTransactionProxy(transactionId, true); + } + + final @NonNull AbstractProxyTransaction createTransactionProxy(final TransactionIdentifier transactionId, + final Long shard) { + return ensureHistoryProxy(transactionId, shard).createTransactionProxy(transactionId, false); + } + + private void checkNotClosed() { + if (state == State.CLOSED) { + throw new DOMTransactionChainClosedException(String.format("Local history %s is closed", identifier)); + } + } + + /** + * Allocate a new {@link ClientTransaction}. + * + * @return A new {@link ClientTransaction} + * @throws DOMTransactionChainClosedException if this history is closed + * @throws IllegalStateException if a previous dependent transaction has not been closed + */ + public @NonNull ClientTransaction createTransaction() { + checkNotClosed(); + + synchronized (this) { + final ClientTransaction ret = doCreateTransaction(); + openTransactions.put(ret.getIdentifier(), ret); + return ret; + } } - final AbstractProxyTransaction createTransactionProxy(final TransactionIdentifier transactionId, final Long shard) { - final AbstractProxyHistory history = histories.computeIfAbsent(shard, this::createHistoryProxy); - return history.createTransactionProxy(transactionId); + /** + * Create a new {@link ClientSnapshot}. + * + * @return A new {@link ClientSnapshot} + * @throws DOMTransactionChainClosedException if this history is closed + * @throws IllegalStateException if a previous dependent transaction has not been closed + */ + public ClientSnapshot takeSnapshot() { + checkNotClosed(); + + synchronized (this) { + final ClientSnapshot ret = doCreateSnapshot(); + openTransactions.put(ret.getIdentifier(), ret); + return ret; + } } + @Holding("this") + abstract ClientSnapshot doCreateSnapshot(); + + @Holding("this") + abstract ClientTransaction doCreateTransaction(); + /** - * Callback invoked from {@link ClientTransaction} when a transaction has been sub + * Callback invoked from {@link ClientTransaction} when a child transaction readied for submission. * - * @param transaction Transaction handle + * @param txId Transaction identifier + * @param cohort Transaction commit cohort */ - void onTransactionReady(final ClientTransaction transaction) { - client.transactionComplete(transaction); + synchronized AbstractTransactionCommitCohort onTransactionReady(final ClientTransaction tx, + final AbstractTransactionCommitCohort cohort) { + final TransactionIdentifier txId = tx.getIdentifier(); + if (openTransactions.remove(txId) == null) { + LOG.warn("Transaction {} not recorded, proceeding with readiness", txId); + } + + final AbstractTransactionCommitCohort previous = readyTransactions.putIfAbsent(txId, cohort); + checkState(previous == null, "Duplicate cohort %s for transaction %s, already have %s", cohort, txId, previous); + + LOG.debug("Local history {} readied transaction {}", this, txId); + return cohort; } + + /** + * Callback invoked from {@link ClientTransaction} when a child transaction has been aborted without touching + * backend. + * + * @param snapshot transaction identifier + */ + synchronized void onTransactionAbort(final AbstractClientHandle snapshot) { + if (openTransactions.remove(snapshot.getIdentifier()) == null) { + LOG.warn("Could not find aborting transaction {}", snapshot.getIdentifier()); + } + } + + /** + * Callback invoked from {@link AbstractTransactionCommitCohort} when a child transaction has been completed + * and all its state can be removed. + * + * @param txId transaction identifier + */ + synchronized void onTransactionComplete(final TransactionIdentifier txId) { + if (readyTransactions.remove(txId) == null) { + LOG.warn("Could not find completed transaction {}", txId); + } + } + + HistoryReconnectCohort startReconnect(final ConnectedClientConnection newConn) { + /* + * This looks ugly and unusual and there is a reason for that, as the locking involved is in multiple places. + * + * We need to make sure that a new proxy is not created while we are reconnecting, which is partially satisfied + * by client.getConnection() throwing InversibleLockException by the time this method is invoked. That does + * not cover the case when createHistoryProxy() has already acquired the connection, but has not yet populated + * the history map. + * + * Hence we need to make sure no potential computation is happening concurrently with us looking at the history + * map. Once we have performed that lookup, though, we can release the lock immediately, as all creation + * requests are established to happen either before or after the reconnect attempt. + */ + final ProxyHistory oldProxy; + final long stamp = lock.writeLock(); + try { + oldProxy = histories.get(newConn.cookie()); + } finally { + lock.unlockWrite(stamp); + } + + if (oldProxy == null) { + return null; + } + + final ProxyReconnectCohort proxy = verifyNotNull(oldProxy.startReconnect(newConn)); + return new HistoryReconnectCohort() { + @Override + ProxyReconnectCohort getProxy() { + return proxy; + } + + @Override + void replayRequests(final Collection previousEntries) { + proxy.replayRequests(previousEntries); + } + + @Override + public void close() { + LOG.debug("Client history {} finishing reconnect to {}", AbstractClientHistory.this, newConn); + final ProxyHistory newProxy = proxy.finishReconnect(); + if (!histories.replace(newConn.cookie(), oldProxy, newProxy)) { + LOG.warn("Failed to replace proxy {} with {} in {}", oldProxy, newProxy, + AbstractClientHistory.this); + } + } + }; + } + }