blob: e746444da988c457a7427d35465c8bd35413b9dc [file] [log] [blame]
khenaidoofffcc8a2019-03-13 11:54:41 -04001/*
2 * Copyright 2019-present Open Networking Foundation
3
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7
8 * http://www.apache.org/licenses/LICENSE-2.0
9
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package core
17
18import (
19 "context"
20 "fmt"
21 "github.com/opencord/voltha-go/common/log"
22 "github.com/opencord/voltha-go/db/kvstore"
khenaidoo1ce37ad2019-03-24 22:07:24 -040023 "github.com/opencord/voltha-go/rw_core/utils"
khenaidoo2c6a0992019-04-29 13:46:56 -040024 "github.com/opencord/voltha-protos/go/voltha"
khenaidoofffcc8a2019-03-13 11:54:41 -040025 "google.golang.org/grpc/codes"
26 "google.golang.org/grpc/status"
27 "sync"
28 "time"
29)
30
khenaidoo1ce37ad2019-03-24 22:07:24 -040031func init() {
32 log.AddPackage(log.JSON, log.WarnLevel, nil)
33}
34
khenaidoofffcc8a2019-03-13 11:54:41 -040035type ownership struct {
36 id string
37 owned bool
38 chnl chan int
39}
40
41type DeviceOwnership struct {
42 instanceId string
43 exitChannel chan int
44 kvClient kvstore.Client
45 reservationTimeout int64 // Duration in seconds
46 ownershipPrefix string
khenaidoo1ce37ad2019-03-24 22:07:24 -040047 deviceMgr *DeviceManager
48 logicalDeviceMgr *LogicalDeviceManager
khenaidoofffcc8a2019-03-13 11:54:41 -040049 deviceMap map[string]*ownership
50 deviceMapLock *sync.RWMutex
khenaidoo1ce37ad2019-03-24 22:07:24 -040051 deviceToKeyMap map[string]string
52 deviceToKeyMapLock *sync.RWMutex
khenaidoofffcc8a2019-03-13 11:54:41 -040053}
54
khenaidoo1ce37ad2019-03-24 22:07:24 -040055func NewDeviceOwnership(id string, kvClient kvstore.Client, deviceMgr *DeviceManager, logicalDeviceMgr *LogicalDeviceManager, ownershipPrefix string, reservationTimeout int64) *DeviceOwnership {
khenaidoofffcc8a2019-03-13 11:54:41 -040056 var deviceOwnership DeviceOwnership
57 deviceOwnership.instanceId = id
58 deviceOwnership.exitChannel = make(chan int, 1)
59 deviceOwnership.kvClient = kvClient
khenaidoo1ce37ad2019-03-24 22:07:24 -040060 deviceOwnership.deviceMgr = deviceMgr
61 deviceOwnership.logicalDeviceMgr = logicalDeviceMgr
khenaidoofffcc8a2019-03-13 11:54:41 -040062 deviceOwnership.ownershipPrefix = ownershipPrefix
63 deviceOwnership.reservationTimeout = reservationTimeout
64 deviceOwnership.deviceMap = make(map[string]*ownership)
65 deviceOwnership.deviceMapLock = &sync.RWMutex{}
khenaidoo1ce37ad2019-03-24 22:07:24 -040066 deviceOwnership.deviceToKeyMap = make(map[string]string)
67 deviceOwnership.deviceToKeyMapLock = &sync.RWMutex{}
khenaidoofffcc8a2019-03-13 11:54:41 -040068 return &deviceOwnership
69}
70
71func (da *DeviceOwnership) Start(ctx context.Context) {
72 log.Info("starting-deviceOwnership", log.Fields{"instanceId": da.instanceId})
73 log.Info("deviceOwnership-started")
74}
75
76func (da *DeviceOwnership) Stop(ctx context.Context) {
77 log.Info("stopping-deviceOwnership")
78 da.exitChannel <- 1
79 // Need to flush all device reservations
khenaidoo1ce37ad2019-03-24 22:07:24 -040080 da.abandonAllDevices()
khenaidoofffcc8a2019-03-13 11:54:41 -040081 log.Info("deviceOwnership-stopped")
82}
83
84func (da *DeviceOwnership) tryToReserveKey(id string) bool {
85 var currOwner string
khenaidoo1ce37ad2019-03-24 22:07:24 -040086 //Try to reserve the key
khenaidoofffcc8a2019-03-13 11:54:41 -040087 kvKey := fmt.Sprintf("%s_%s", da.ownershipPrefix, id)
88 value, err := da.kvClient.Reserve(kvKey, da.instanceId, da.reservationTimeout)
khenaidoo1ce37ad2019-03-24 22:07:24 -040089 if err != nil {
90 log.Errorw("error", log.Fields{"error": err, "id": id, "instanceId": da.instanceId})
91 }
khenaidoofffcc8a2019-03-13 11:54:41 -040092 if value != nil {
93 if currOwner, err = kvstore.ToString(value); err != nil {
94 log.Error("unexpected-owner-type")
95 }
96 return currOwner == da.instanceId
97 }
98 return false
99}
100
khenaidoo1ce37ad2019-03-24 22:07:24 -0400101func (da *DeviceOwnership) renewReservation(id string) bool {
102 // Try to reserve the key
103 kvKey := fmt.Sprintf("%s_%s", da.ownershipPrefix, id)
104 if err := da.kvClient.RenewReservation(kvKey); err != nil {
105 log.Errorw("reservation-renewal-error", log.Fields{"error": err, "instance": da.instanceId})
106 return false
107 }
108 return true
109}
Richard Jankowski199fd862019-03-18 14:49:51 -0400110
khenaidoo1ce37ad2019-03-24 22:07:24 -0400111func (da *DeviceOwnership) MonitorOwnership(id string, chnl chan int) {
112 op := "starting"
113 exit := false
114 ticker := time.NewTicker(time.Duration(da.reservationTimeout) / 3 * time.Second)
khenaidoofffcc8a2019-03-13 11:54:41 -0400115 for {
khenaidoo1ce37ad2019-03-24 22:07:24 -0400116 select {
117 case <-da.exitChannel:
118 log.Infow("closing-monitoring", log.Fields{"Id": id})
119 exit = true
120 case <-ticker.C:
121 log.Debugw(fmt.Sprintf("%s-reservation", op), log.Fields{"Id": id})
122 case <-chnl:
123 log.Infow("closing-device-monitoring", log.Fields{"Id": id})
124 exit = true
125 }
126 if exit {
127 ticker.Stop()
128 break
129 }
130 deviceOwned, ownedByMe := da.getOwnership(id)
131 if deviceOwned && ownedByMe {
Richard Jankowski199fd862019-03-18 14:49:51 -0400132 // Device owned; renew reservation
133 op = "renew"
khenaidoo1ce37ad2019-03-24 22:07:24 -0400134 if da.renewReservation(id) {
135 log.Debugw("reservation-renewed", log.Fields{"id": id, "instanceId": da.instanceId})
136 } else {
137 log.Debugw("reservation-not-renewed", log.Fields{"id": id, "instanceId": da.instanceId})
Richard Jankowski199fd862019-03-18 14:49:51 -0400138 }
139 } else {
khenaidoo1ce37ad2019-03-24 22:07:24 -0400140 // Device not owned or not owned by me; try to seize ownership
Richard Jankowski199fd862019-03-18 14:49:51 -0400141 op = "retry"
142 if err := da.setOwnership(id, da.tryToReserveKey(id)); err != nil {
143 log.Errorw("unexpected-error", log.Fields{"error": err})
144 }
khenaidoofffcc8a2019-03-13 11:54:41 -0400145 }
khenaidoofffcc8a2019-03-13 11:54:41 -0400146 }
147}
148
khenaidoo1ce37ad2019-03-24 22:07:24 -0400149func (da *DeviceOwnership) getOwnership(id string) (bool, bool) {
khenaidoofffcc8a2019-03-13 11:54:41 -0400150 da.deviceMapLock.RLock()
151 defer da.deviceMapLock.RUnlock()
152 if val, exist := da.deviceMap[id]; exist {
khenaidoo1ce37ad2019-03-24 22:07:24 -0400153 return true, val.owned
khenaidoofffcc8a2019-03-13 11:54:41 -0400154 }
khenaidoo1ce37ad2019-03-24 22:07:24 -0400155 return false, false
khenaidoofffcc8a2019-03-13 11:54:41 -0400156}
157
158func (da *DeviceOwnership) setOwnership(id string, owner bool) error {
159 da.deviceMapLock.Lock()
160 defer da.deviceMapLock.Unlock()
161 if _, exist := da.deviceMap[id]; exist {
162 if da.deviceMap[id].owned != owner {
163 log.Debugw("ownership-changed", log.Fields{"Id": id, "owner": owner})
164 }
165 da.deviceMap[id].owned = owner
166 return nil
167 }
168 return status.Error(codes.NotFound, fmt.Sprintf("id-inexistent-%s", id))
169}
170
171// OwnedByMe returns where this Core instance active owns this device. This function will automatically
172// trigger the process to monitor the device and update the device ownership regularly.
khenaidoo1ce37ad2019-03-24 22:07:24 -0400173func (da *DeviceOwnership) OwnedByMe(id interface{}) bool {
174 // Retrieve the ownership key based on the id
175 var ownershipKey string
176 var err error
khenaidoo6d62c002019-05-15 21:57:03 -0400177 var idStr string
178 var cache bool
179 if ownershipKey, idStr, cache, err = da.getOwnershipKey(id); err != nil {
khenaidoo1ce37ad2019-03-24 22:07:24 -0400180 log.Warnw("no-ownershipkey", log.Fields{"error": err})
181 return false
182 }
183
khenaidoo6d62c002019-05-15 21:57:03 -0400184 // Update the deviceToKey map, if not from cache
185 if !cache {
186 da.deviceToKeyMapLock.Lock()
187 da.deviceToKeyMap[idStr] = ownershipKey
188 da.deviceToKeyMapLock.Unlock()
189 }
190
khenaidoo1ce37ad2019-03-24 22:07:24 -0400191 deviceOwned, ownedByMe := da.getOwnership(ownershipKey)
192 if deviceOwned {
khenaidoo3d3b8c22019-05-22 18:10:39 -0400193 log.Debugw("ownership", log.Fields{"Id": ownershipKey, "owned": ownedByMe})
khenaidoo1ce37ad2019-03-24 22:07:24 -0400194 return ownedByMe
195 }
khenaidoo6d62c002019-05-15 21:57:03 -0400196 // Not owned by me or maybe nobody else. Try to reserve it
khenaidoo1ce37ad2019-03-24 22:07:24 -0400197 reservedByMe := da.tryToReserveKey(ownershipKey)
198 myChnl := make(chan int)
Stephane Barbarie40fd3b22019-04-23 21:50:47 -0400199
200 da.deviceMapLock.Lock()
khenaidoo6d62c002019-05-15 21:57:03 -0400201 da.deviceMap[ownershipKey] = &ownership{
202 id: ownershipKey,
203 owned: reservedByMe,
204 chnl: myChnl}
Stephane Barbarie40fd3b22019-04-23 21:50:47 -0400205 da.deviceMapLock.Unlock()
206
khenaidoo1ce37ad2019-03-24 22:07:24 -0400207 log.Debugw("set-new-ownership", log.Fields{"Id": ownershipKey, "owned": reservedByMe})
208 go da.MonitorOwnership(ownershipKey, myChnl)
209 return reservedByMe
khenaidoofffcc8a2019-03-13 11:54:41 -0400210}
211
212//AbandonDevice must be invoked whenever a device is deleted from the Core
213func (da *DeviceOwnership) AbandonDevice(id string) error {
khenaidoo6d62c002019-05-15 21:57:03 -0400214 if id == "" {
215 return status.Error(codes.FailedPrecondition, "id-nil")
216 }
khenaidoofffcc8a2019-03-13 11:54:41 -0400217 da.deviceMapLock.Lock()
218 defer da.deviceMapLock.Unlock()
khenaidoo0a822f92019-05-08 15:15:57 -0400219 if o, exist := da.deviceMap[id]; exist { // id is ownership key
220 // Need to clean up all deviceToKeyMap entries using this device as key
221 da.deviceToKeyMapLock.Lock()
222 defer da.deviceToKeyMapLock.Unlock()
223 for k, v := range da.deviceToKeyMap {
224 if id == v {
225 delete(da.deviceToKeyMap, k)
226 }
227 }
khenaidoo6d62c002019-05-15 21:57:03 -0400228 // Remove the device reference from the deviceMap
khenaidoo0a822f92019-05-08 15:15:57 -0400229 delete(da.deviceMap, id)
230
khenaidoofffcc8a2019-03-13 11:54:41 -0400231 // Stop the Go routine monitoring the device
232 close(o.chnl)
233 delete(da.deviceMap, id)
234 log.Debugw("abandoning-device", log.Fields{"Id": id})
235 return nil
khenaidoo0a822f92019-05-08 15:15:57 -0400236 } else { // id is not ownership key
khenaidoo6d62c002019-05-15 21:57:03 -0400237 da.deleteDeviceKey(id)
khenaidoofffcc8a2019-03-13 11:54:41 -0400238 }
khenaidoo0a822f92019-05-08 15:15:57 -0400239 return nil
Richard Jankowski199fd862019-03-18 14:49:51 -0400240}
khenaidoo1ce37ad2019-03-24 22:07:24 -0400241
242//abandonAllDevices must be invoked whenever a device is deleted from the Core
243func (da *DeviceOwnership) abandonAllDevices() {
244 da.deviceMapLock.Lock()
245 defer da.deviceMapLock.Unlock()
khenaidoo0a822f92019-05-08 15:15:57 -0400246 da.deviceToKeyMapLock.Lock()
247 defer da.deviceToKeyMapLock.Unlock()
248 for k, _ := range da.deviceToKeyMap {
249 delete(da.deviceToKeyMap, k)
250 }
khenaidoo1ce37ad2019-03-24 22:07:24 -0400251 for _, val := range da.deviceMap {
252 close(val.chnl)
253 }
254}
255
256func (da *DeviceOwnership) getDeviceKey(id string) (string, error) {
257 da.deviceToKeyMapLock.RLock()
258 defer da.deviceToKeyMapLock.RUnlock()
259 if val, exist := da.deviceToKeyMap[id]; exist {
260 return val, nil
261 }
262 return "", status.Error(codes.NotFound, fmt.Sprintf("not-present-%s", id))
263}
264
265func (da *DeviceOwnership) updateDeviceKey(id string, key string) error {
266 da.deviceToKeyMapLock.Lock()
267 defer da.deviceToKeyMapLock.Unlock()
268 if _, exist := da.deviceToKeyMap[id]; exist {
269 return status.Error(codes.AlreadyExists, fmt.Sprintf("already-present-%s", id))
270 }
271 da.deviceToKeyMap[id] = key
272 return nil
273}
274
khenaidoo6d62c002019-05-15 21:57:03 -0400275func (da *DeviceOwnership) deleteDeviceKey(id string) {
khenaidoo0a822f92019-05-08 15:15:57 -0400276 da.deviceToKeyMapLock.Lock()
277 defer da.deviceToKeyMapLock.Unlock()
278 if _, exist := da.deviceToKeyMap[id]; exist {
279 delete(da.deviceToKeyMap, id)
khenaidoo0a822f92019-05-08 15:15:57 -0400280 }
khenaidoo0a822f92019-05-08 15:15:57 -0400281}
282
khenaidoo6d62c002019-05-15 21:57:03 -0400283// getOwnershipKey returns the ownership key that the id param uses. Ownership key is the parent
284// device Id of a child device or the rootdevice of a logical device. This function also returns the
285// id in string format of the id param via the ref output as well as if the data was retrieved from cache
286func (da *DeviceOwnership) getOwnershipKey(id interface{}) (ownershipKey string, ref string, cached bool, err error) {
khenaidoo3d3b8c22019-05-22 18:10:39 -0400287
khenaidoo1ce37ad2019-03-24 22:07:24 -0400288 if id == nil {
khenaidoo6d62c002019-05-15 21:57:03 -0400289 return "", "", false, status.Error(codes.InvalidArgument, "nil-id")
khenaidoo1ce37ad2019-03-24 22:07:24 -0400290 }
khenaidoo6d62c002019-05-15 21:57:03 -0400291 da.deviceToKeyMapLock.RLock()
292 defer da.deviceToKeyMapLock.RUnlock()
khenaidoo1ce37ad2019-03-24 22:07:24 -0400293 var device *voltha.Device
294 var lDevice *voltha.LogicalDevice
295 // The id can either be a device Id or a logical device id.
296 if dId, ok := id.(*utils.DeviceID); ok {
297 // Use cache if present
khenaidoo8f474192019-04-03 17:20:44 -0400298 if val, exist := da.deviceToKeyMap[dId.Id]; exist {
khenaidoo6d62c002019-05-15 21:57:03 -0400299 return val, dId.Id, true, nil
khenaidoo1ce37ad2019-03-24 22:07:24 -0400300 }
301 if device, _ = da.deviceMgr.GetDevice(dId.Id); device == nil {
khenaidoo6d62c002019-05-15 21:57:03 -0400302 return "", dId.Id, false, status.Errorf(codes.NotFound, "id-absent-%s", dId)
khenaidoo1ce37ad2019-03-24 22:07:24 -0400303 }
304 if device.Root {
khenaidoo6d62c002019-05-15 21:57:03 -0400305 return device.Id, dId.Id, false, nil
khenaidoo1ce37ad2019-03-24 22:07:24 -0400306 } else {
khenaidoo6d62c002019-05-15 21:57:03 -0400307 return device.ParentId, dId.Id, false, nil
khenaidoo1ce37ad2019-03-24 22:07:24 -0400308 }
309 } else if ldId, ok := id.(*utils.LogicalDeviceID); ok {
310 // Use cache if present
khenaidoo8f474192019-04-03 17:20:44 -0400311 if val, exist := da.deviceToKeyMap[ldId.Id]; exist {
khenaidoo6d62c002019-05-15 21:57:03 -0400312 return val, ldId.Id, true, nil
khenaidoo1ce37ad2019-03-24 22:07:24 -0400313 }
314 if lDevice, _ = da.logicalDeviceMgr.getLogicalDevice(ldId.Id); lDevice == nil {
khenaidoo6d62c002019-05-15 21:57:03 -0400315 return "", ldId.Id, false, status.Errorf(codes.NotFound, "id-absent-%s", dId)
khenaidoo1ce37ad2019-03-24 22:07:24 -0400316 }
khenaidoo6d62c002019-05-15 21:57:03 -0400317 return lDevice.RootDeviceId, ldId.Id, false, nil
khenaidoo1ce37ad2019-03-24 22:07:24 -0400318 }
khenaidoo6d62c002019-05-15 21:57:03 -0400319 return "", "", false, status.Error(codes.NotFound, fmt.Sprintf("id-%v", id))
khenaidoo1ce37ad2019-03-24 22:07:24 -0400320}