mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
contrib/recipes: add election and double barrier recipes
these recipes rely on leases so they weren't included in the last batch
This commit is contained in:
@@ -23,8 +23,9 @@ import (
|
||||
)
|
||||
|
||||
var (
|
||||
ErrKeyExists = errors.New("key already exists")
|
||||
ErrWaitMismatch = errors.New("unexpected wait result")
|
||||
ErrKeyExists = errors.New("key already exists")
|
||||
ErrWaitMismatch = errors.New("unexpected wait result")
|
||||
ErrTooManyClients = errors.New("too many clients")
|
||||
)
|
||||
|
||||
// deleteRevKey deletes a key by revision, returning false if key is missing
|
||||
|
||||
126
contrib/recipes/double_barrier.go
Normal file
126
contrib/recipes/double_barrier.go
Normal file
@@ -0,0 +1,126 @@
|
||||
// Copyright 2016 CoreOS, Inc.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package recipe
|
||||
|
||||
import (
|
||||
"github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
|
||||
"github.com/coreos/etcd/clientv3"
|
||||
pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
|
||||
"github.com/coreos/etcd/storage/storagepb"
|
||||
)
|
||||
|
||||
// DoubleBarrier blocks processes on Enter until an expected count enters, then
|
||||
// blocks again on Leave until all processes have left.
|
||||
type DoubleBarrier struct {
|
||||
client *clientv3.Client
|
||||
key string // key for the collective barrier
|
||||
count int
|
||||
myKey *EphemeralKV // current key for this process on the barrier
|
||||
}
|
||||
|
||||
func NewDoubleBarrier(client *clientv3.Client, key string, count int) *DoubleBarrier {
|
||||
return &DoubleBarrier{client, key, count, nil}
|
||||
}
|
||||
|
||||
// Enter waits for "count" processes to enter the barrier then returns
|
||||
func (b *DoubleBarrier) Enter() error {
|
||||
ek, err := NewUniqueEphemeralKey(b.client, b.key+"/waiters")
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
b.myKey = ek
|
||||
|
||||
resp, err := NewRange(b.client, b.key+"/waiters").Prefix()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if len(resp.Kvs) > b.count {
|
||||
return ErrTooManyClients
|
||||
}
|
||||
|
||||
if len(resp.Kvs) == b.count {
|
||||
// unblock waiters
|
||||
_, err = putEmptyKey(b.client.KV, b.key+"/ready")
|
||||
return err
|
||||
}
|
||||
|
||||
_, err = WaitEvents(
|
||||
b.client,
|
||||
b.key+"/ready",
|
||||
resp.Header.Revision,
|
||||
[]storagepb.Event_EventType{storagepb.PUT})
|
||||
return err
|
||||
}
|
||||
|
||||
// Leave waits for "count" processes to leave the barrier then returns
|
||||
func (b *DoubleBarrier) Leave() error {
|
||||
resp, err := NewRange(b.client, b.key+"/waiters").Prefix()
|
||||
if len(resp.Kvs) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
lowest, highest := resp.Kvs[0], resp.Kvs[0]
|
||||
for _, k := range resp.Kvs {
|
||||
if k.ModRevision < lowest.ModRevision {
|
||||
lowest = k
|
||||
}
|
||||
if k.ModRevision > highest.ModRevision {
|
||||
highest = k
|
||||
}
|
||||
}
|
||||
isLowest := string(lowest.Key) == b.myKey.Key()
|
||||
|
||||
if len(resp.Kvs) == 1 {
|
||||
// this is the only node in the barrier; finish up
|
||||
req := &pb.DeleteRangeRequest{Key: []byte(b.key + "/ready")}
|
||||
if _, err = b.client.KV.DeleteRange(context.TODO(), req); err != nil {
|
||||
return err
|
||||
}
|
||||
return b.myKey.Delete()
|
||||
}
|
||||
|
||||
// this ensures that if a process fails, the ephemeral lease will be
|
||||
// revoked, its barrier key is removed, and the barrier can resume
|
||||
|
||||
// lowest process in node => wait on highest process
|
||||
if isLowest {
|
||||
_, err = WaitEvents(
|
||||
b.client,
|
||||
string(highest.Key),
|
||||
resp.Header.Revision,
|
||||
[]storagepb.Event_EventType{storagepb.DELETE})
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return b.Leave()
|
||||
}
|
||||
|
||||
// delete self and wait on lowest process
|
||||
if err := b.myKey.Delete(); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
key := string(lowest.Key)
|
||||
_, err = WaitEvents(
|
||||
b.client,
|
||||
key,
|
||||
resp.Header.Revision,
|
||||
[]storagepb.Event_EventType{storagepb.DELETE})
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return b.Leave()
|
||||
}
|
||||
108
contrib/recipes/election.go
Normal file
108
contrib/recipes/election.go
Normal file
@@ -0,0 +1,108 @@
|
||||
// Copyright 2016 CoreOS, Inc.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
package recipe
|
||||
|
||||
import (
|
||||
"github.com/coreos/etcd/clientv3"
|
||||
"github.com/coreos/etcd/etcdserver"
|
||||
"github.com/coreos/etcd/storage/storagepb"
|
||||
)
|
||||
|
||||
type Election struct {
|
||||
client *clientv3.Client
|
||||
keyPrefix string
|
||||
leaderKey *EphemeralKV
|
||||
}
|
||||
|
||||
// NewElection returns a new election on a given key prefix.
|
||||
func NewElection(client *clientv3.Client, keyPrefix string) *Election {
|
||||
return &Election{client, keyPrefix, nil}
|
||||
}
|
||||
|
||||
// Volunteer puts a value as elegible for the election. It blocks until
|
||||
// it is elected or an error occurs (cannot withdraw candidacy)
|
||||
func (e *Election) Volunteer(val string) error {
|
||||
if e.leaderKey != nil {
|
||||
return e.leaderKey.Put(val)
|
||||
}
|
||||
myKey, err := NewUniqueEphemeralKV(e.client, e.keyPrefix, val)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if err = e.waitLeadership(myKey); err != nil {
|
||||
return err
|
||||
}
|
||||
e.leaderKey = myKey
|
||||
return nil
|
||||
}
|
||||
|
||||
// Resign lets a leader start a new election.
|
||||
func (e *Election) Resign() (err error) {
|
||||
if e.leaderKey != nil {
|
||||
err = e.leaderKey.Delete()
|
||||
e.leaderKey = nil
|
||||
}
|
||||
return err
|
||||
}
|
||||
|
||||
// Leader returns the leader value for the current election.
|
||||
func (e *Election) Leader() (string, error) {
|
||||
resp, err := NewRange(e.client, e.keyPrefix).FirstCreate()
|
||||
if err != nil {
|
||||
return "", err
|
||||
} else if len(resp.Kvs) == 0 {
|
||||
// no leader currently elected
|
||||
return "", etcdserver.ErrNoLeader
|
||||
}
|
||||
return string(resp.Kvs[0].Value), nil
|
||||
}
|
||||
|
||||
// Wait waits for a leader to be elected, returning the leader value.
|
||||
func (e *Election) Wait() (string, error) {
|
||||
resp, err := NewRange(e.client, e.keyPrefix).FirstCreate()
|
||||
if err != nil {
|
||||
return "", err
|
||||
} else if len(resp.Kvs) != 0 {
|
||||
// leader already exists
|
||||
return string(resp.Kvs[0].Value), nil
|
||||
}
|
||||
_, err = WaitPrefixEvents(
|
||||
e.client,
|
||||
e.keyPrefix,
|
||||
resp.Header.Revision,
|
||||
[]storagepb.Event_EventType{storagepb.PUT})
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
return e.Wait()
|
||||
}
|
||||
|
||||
func (e *Election) waitLeadership(tryKey *EphemeralKV) error {
|
||||
resp, err := NewRangeRev(
|
||||
e.client,
|
||||
e.keyPrefix,
|
||||
tryKey.Revision()-1).LastCreate()
|
||||
if err != nil {
|
||||
return err
|
||||
} else if len(resp.Kvs) == 0 {
|
||||
// nothing before tryKey => have leadership
|
||||
return nil
|
||||
}
|
||||
_, err = WaitEvents(
|
||||
e.client,
|
||||
string(resp.Kvs[0].Key),
|
||||
tryKey.Revision(),
|
||||
[]storagepb.Event_EventType{storagepb.DELETE})
|
||||
return err
|
||||
}
|
||||
@@ -197,3 +197,36 @@ func (rk *RemoteKV) Put(val string) error {
|
||||
_, err := rk.client.KV.Put(context.TODO(), req)
|
||||
return err
|
||||
}
|
||||
|
||||
// EphemeralKV is a new key associated with a session lease
|
||||
type EphemeralKV struct{ RemoteKV }
|
||||
|
||||
// NewEphemeralKV creates a new key/value pair associated with a session lease
|
||||
func NewEphemeralKV(client *clientv3.Client, key, val string) (*EphemeralKV, error) {
|
||||
leaseID, err := SessionLease(client)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
k, err := NewKV(client, key, val, leaseID)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return &EphemeralKV{*k}, nil
|
||||
}
|
||||
|
||||
// NewEphemeralKey creates a new unique valueless key associated with a session lease
|
||||
func NewUniqueEphemeralKey(client *clientv3.Client, prefix string) (*EphemeralKV, error) {
|
||||
return NewUniqueEphemeralKV(client, prefix, "")
|
||||
}
|
||||
|
||||
// NewEphemeralKV creates a new unique key/value pair associated with a session lease
|
||||
func NewUniqueEphemeralKV(client *clientv3.Client, prefix, val string) (ek *EphemeralKV, err error) {
|
||||
for {
|
||||
newKey := fmt.Sprintf("%s/%v", prefix, time.Now().UnixNano())
|
||||
ek, err = NewEphemeralKV(client, newKey, val)
|
||||
if err == nil || err != ErrKeyExists {
|
||||
break
|
||||
}
|
||||
}
|
||||
return ek, err
|
||||
}
|
||||
|
||||
129
contrib/recipes/lease.go
Normal file
129
contrib/recipes/lease.go
Normal file
@@ -0,0 +1,129 @@
|
||||
// Copyright 2016 CoreOS, Inc.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
package recipe
|
||||
|
||||
import (
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
|
||||
"github.com/coreos/etcd/clientv3"
|
||||
pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
|
||||
"github.com/coreos/etcd/lease"
|
||||
)
|
||||
|
||||
// only keep one ephemeral lease per clientection
|
||||
var clientLeases clientLeaseMgr = clientLeaseMgr{leases: make(map[*clientv3.Client]*leaseKeepAlive)}
|
||||
|
||||
type clientLeaseMgr struct {
|
||||
leases map[*clientv3.Client]*leaseKeepAlive
|
||||
mu sync.Mutex
|
||||
}
|
||||
|
||||
type leaseKeepAlive struct {
|
||||
id lease.LeaseID
|
||||
donec chan struct{}
|
||||
}
|
||||
|
||||
func SessionLease(client *clientv3.Client) (lease.LeaseID, error) {
|
||||
return clientLeases.sessionLease(client, 120)
|
||||
}
|
||||
|
||||
func SessionLeaseTTL(client *clientv3.Client, ttl int64) (lease.LeaseID, error) {
|
||||
return clientLeases.sessionLease(client, ttl)
|
||||
}
|
||||
|
||||
// StopSessionLease ends the refresh for the session lease. This is useful
|
||||
// in case the state of the client clientection is indeterminate (revoke
|
||||
// would fail) or if transferring lease ownership.
|
||||
func StopSessionLease(client *clientv3.Client) {
|
||||
clientLeases.mu.Lock()
|
||||
lka, ok := clientLeases.leases[client]
|
||||
if ok {
|
||||
delete(clientLeases.leases, client)
|
||||
}
|
||||
clientLeases.mu.Unlock()
|
||||
if lka != nil {
|
||||
lka.donec <- struct{}{}
|
||||
<-lka.donec
|
||||
}
|
||||
}
|
||||
|
||||
// RevokeSessionLease revokes the session lease.
|
||||
func RevokeSessionLease(client *clientv3.Client) (err error) {
|
||||
clientLeases.mu.Lock()
|
||||
lka := clientLeases.leases[client]
|
||||
clientLeases.mu.Unlock()
|
||||
StopSessionLease(client)
|
||||
if lka != nil {
|
||||
req := &pb.LeaseRevokeRequest{ID: int64(lka.id)}
|
||||
_, err = client.Lease.LeaseRevoke(context.TODO(), req)
|
||||
}
|
||||
return err
|
||||
}
|
||||
|
||||
func (clm *clientLeaseMgr) sessionLease(client *clientv3.Client, ttl int64) (lease.LeaseID, error) {
|
||||
clm.mu.Lock()
|
||||
defer clm.mu.Unlock()
|
||||
if lka, ok := clm.leases[client]; ok {
|
||||
return lka.id, nil
|
||||
}
|
||||
|
||||
resp, err := client.Lease.LeaseCreate(context.TODO(), &pb.LeaseCreateRequest{TTL: ttl})
|
||||
if err != nil {
|
||||
return lease.NoLease, err
|
||||
}
|
||||
id := lease.LeaseID(resp.ID)
|
||||
|
||||
ctx, cancel := context.WithCancel(context.Background())
|
||||
keepAlive, err := client.Lease.LeaseKeepAlive(ctx)
|
||||
if err != nil || keepAlive == nil {
|
||||
return lease.NoLease, err
|
||||
}
|
||||
|
||||
lka := &leaseKeepAlive{id: id, donec: make(chan struct{})}
|
||||
clm.leases[client] = lka
|
||||
|
||||
// keep the lease alive until clientection error
|
||||
go func() {
|
||||
defer func() {
|
||||
keepAlive.CloseSend()
|
||||
clm.mu.Lock()
|
||||
delete(clm.leases, client)
|
||||
clm.mu.Unlock()
|
||||
cancel()
|
||||
close(lka.donec)
|
||||
}()
|
||||
|
||||
ttl := resp.TTL
|
||||
for {
|
||||
lreq := &pb.LeaseKeepAliveRequest{ID: int64(id)}
|
||||
select {
|
||||
case <-lka.donec:
|
||||
return
|
||||
case <-time.After(time.Duration(ttl/2) * time.Second):
|
||||
}
|
||||
if err := keepAlive.Send(lreq); err != nil {
|
||||
break
|
||||
}
|
||||
resp, err := keepAlive.Recv()
|
||||
if err != nil {
|
||||
break
|
||||
}
|
||||
ttl = resp.TTL
|
||||
}
|
||||
}()
|
||||
|
||||
return id, nil
|
||||
}
|
||||
Reference in New Issue
Block a user