garage/src/rpc/membership.rs

745 lines
18 KiB
Rust
Raw Normal View History

use std::collections::HashMap;
2020-04-07 15:00:48 +00:00
use std::hash::Hash as StdHash;
use std::hash::Hasher;
2020-04-23 17:05:46 +00:00
use std::io::{Read, Write};
use std::net::{IpAddr, SocketAddr};
use std::path::PathBuf;
use std::sync::atomic::{AtomicUsize, Ordering};
use std::sync::Arc;
2020-04-06 17:55:39 +00:00
use std::time::Duration;
2020-04-06 19:02:15 +00:00
use futures::future::join_all;
use futures::select;
use futures_util::future::*;
2020-04-18 17:21:34 +00:00
use serde::{Deserialize, Serialize};
use sha2::{Digest, Sha256};
use tokio::prelude::*;
use tokio::sync::watch;
use tokio::sync::Mutex;
2020-04-06 17:55:39 +00:00
2020-04-24 10:10:01 +00:00
use garage_util::background::BackgroundRunner;
use garage_util::data::*;
use garage_util::error::Error;
2020-04-23 17:05:46 +00:00
use crate::consul::get_consul_nodes;
2020-04-24 10:10:01 +00:00
use crate::rpc_client::*;
use crate::rpc_server::*;
2020-04-06 17:55:39 +00:00
const PING_INTERVAL: Duration = Duration::from_secs(10);
const CONSUL_INTERVAL: Duration = Duration::from_secs(60);
2020-04-06 17:55:39 +00:00
const PING_TIMEOUT: Duration = Duration::from_secs(2);
const MAX_FAILURES_BEFORE_CONSIDERED_DOWN: usize = 5;
2020-04-06 17:55:39 +00:00
pub const MEMBERSHIP_RPC_PATH: &str = "_membership";
2020-04-18 17:21:34 +00:00
#[derive(Debug, Serialize, Deserialize)]
pub enum Message {
Ok,
Ping(PingMessage),
PullStatus,
PullConfig,
AdvertiseNodesUp(Vec<AdvertisedNode>),
AdvertiseConfig(NetworkConfig),
}
impl RpcMessage for Message {}
#[derive(Debug, Serialize, Deserialize)]
pub struct PingMessage {
2020-12-12 16:58:19 +00:00
id: UUID,
rpc_port: u16,
2020-12-12 16:58:19 +00:00
status_hash: Hash,
config_version: u64,
2020-04-19 17:08:48 +00:00
2020-12-12 16:58:19 +00:00
state_info: StateInfo,
}
#[derive(Clone, Debug, Serialize, Deserialize)]
pub struct AdvertisedNode {
pub id: UUID,
pub addr: SocketAddr,
pub is_up: bool,
pub last_seen: u64,
2020-04-19 17:08:48 +00:00
pub state_info: StateInfo,
}
#[derive(Clone, Debug, Serialize, Deserialize)]
pub struct NetworkConfig {
pub members: HashMap<UUID, NetworkConfigEntry>,
pub version: u64,
}
#[derive(Clone, Debug, Serialize, Deserialize)]
pub struct NetworkConfigEntry {
pub datacenter: String,
pub n_tokens: u32,
2020-04-21 14:07:15 +00:00
pub tag: String,
}
2020-04-06 17:55:39 +00:00
pub struct System {
pub id: UUID,
2020-12-12 16:58:19 +00:00
metadata_dir: PathBuf,
rpc_local_port: u16,
state_info: StateInfo,
2020-04-19 17:08:48 +00:00
2020-12-12 16:58:19 +00:00
rpc_http_client: Arc<RpcHttpClient>,
2020-04-18 17:21:34 +00:00
rpc_client: Arc<RpcClient<Message>>,
2020-04-06 17:55:39 +00:00
pub status: watch::Receiver<Arc<Status>>,
pub ring: watch::Receiver<Arc<Ring>>,
update_lock: Mutex<(watch::Sender<Arc<Status>>, watch::Sender<Arc<Ring>>)>,
pub background: Arc<BackgroundRunner>,
2020-04-06 17:55:39 +00:00
}
#[derive(Debug, Clone)]
pub struct Status {
pub nodes: HashMap<UUID, Arc<StatusEntry>>,
pub hash: Hash,
2020-04-07 15:00:48 +00:00
}
#[derive(Debug)]
2020-04-19 17:08:48 +00:00
pub struct StatusEntry {
2020-04-07 15:00:48 +00:00
pub addr: SocketAddr,
pub last_seen: u64,
pub num_failures: AtomicUsize,
2020-04-19 17:08:48 +00:00
pub state_info: StateInfo,
}
impl StatusEntry {
pub fn is_up(&self) -> bool {
self.num_failures.load(Ordering::SeqCst) < MAX_FAILURES_BEFORE_CONSIDERED_DOWN
}
}
2020-04-19 17:08:48 +00:00
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct StateInfo {
pub hostname: String,
2020-04-07 15:00:48 +00:00
}
#[derive(Clone)]
pub struct Ring {
pub config: NetworkConfig,
pub ring: Vec<RingEntry>,
pub n_datacenters: usize,
}
#[derive(Clone, Debug)]
2020-04-07 15:00:48 +00:00
pub struct RingEntry {
pub location: Hash,
pub node: UUID,
pub datacenter: u64,
2020-04-06 17:55:39 +00:00
}
impl Status {
2020-04-06 20:27:51 +00:00
fn handle_ping(&mut self, ip: IpAddr, info: &PingMessage) -> bool {
2020-04-06 20:54:03 +00:00
let addr = SocketAddr::new(ip, info.rpc_port);
let old_status = self.nodes.insert(
info.id,
Arc::new(StatusEntry {
addr,
last_seen: now_msec(),
num_failures: AtomicUsize::from(0),
2020-04-19 17:08:48 +00:00
state_info: info.state_info.clone(),
}),
);
2020-04-06 20:54:03 +00:00
match old_status {
None => {
2020-04-21 12:54:55 +00:00
info!("Newly pingable node: {}", hex::encode(&info.id));
2020-04-06 20:54:03 +00:00
true
}
Some(x) => x.addr != addr,
}
2020-04-06 20:27:51 +00:00
}
fn recalculate_hash(&mut self) {
let mut nodes = self.nodes.iter().collect::<Vec<_>>();
nodes.sort_unstable_by_key(|(id, _status)| *id);
2020-04-06 20:27:51 +00:00
2020-04-06 19:02:15 +00:00
let mut hasher = Sha256::new();
2020-04-21 12:54:55 +00:00
debug!("Current set of pingable nodes: --");
2020-04-06 20:27:51 +00:00
for (id, status) in nodes {
2020-04-21 12:54:55 +00:00
debug!("{} {}", hex::encode(&id), status.addr);
hasher.input(format!("{} {}\n", hex::encode(&id), status.addr));
2020-04-06 19:02:15 +00:00
}
2020-04-21 12:54:55 +00:00
debug!("END --");
self.hash
.as_slice_mut()
.copy_from_slice(&hasher.result()[..]);
2020-04-06 19:02:15 +00:00
}
}
2020-04-06 19:02:15 +00:00
impl Ring {
fn rebuild_ring(&mut self) {
let mut new_ring = vec![];
let mut datacenters = vec![];
2020-04-07 15:00:48 +00:00
for (id, config) in self.config.members.iter() {
let mut dc_hasher = std::collections::hash_map::DefaultHasher::new();
config.datacenter.hash(&mut dc_hasher);
let datacenter = dc_hasher.finish();
2020-04-07 15:00:48 +00:00
if !datacenters.contains(&datacenter) {
datacenters.push(datacenter);
}
2020-04-07 15:00:48 +00:00
for i in 0..config.n_tokens {
let location = hash(format!("{} {}", hex::encode(&id), i).as_bytes());
2020-04-07 15:00:48 +00:00
new_ring.push(RingEntry {
location: location.into(),
node: *id,
datacenter,
})
}
}
2020-04-07 15:00:48 +00:00
new_ring.sort_unstable_by(|x, y| x.location.cmp(&y.location));
self.ring = new_ring;
self.n_datacenters = datacenters.len();
2020-04-09 16:43:53 +00:00
2020-04-16 17:28:02 +00:00
// eprintln!("RING: --");
// for e in self.ring.iter() {
// eprintln!("{:?}", e);
// }
// eprintln!("END --");
}
pub fn walk_ring(&self, from: &Hash, n: usize) -> Vec<UUID> {
if n >= self.config.members.len() {
return self.config.members.keys().cloned().collect::<Vec<_>>();
}
let start = match self.ring.binary_search_by(|x| x.location.cmp(from)) {
Ok(i) => i,
Err(i) => {
if i == 0 {
self.ring.len() - 1
} else {
i - 1
}
}
};
2020-04-08 20:00:41 +00:00
self.walk_ring_from_pos(start, n)
}
2020-04-08 20:00:41 +00:00
fn walk_ring_from_pos(&self, start: usize, n: usize) -> Vec<UUID> {
2020-04-17 19:08:43 +00:00
if n >= self.config.members.len() {
return self.config.members.keys().cloned().collect::<Vec<_>>();
}
let mut ret = vec![];
let mut datacenters = vec![];
2020-04-07 15:00:48 +00:00
2020-04-17 19:08:43 +00:00
let mut delta = 0;
while ret.len() < n {
let i = (start + delta) % self.ring.len();
2020-04-17 19:08:43 +00:00
delta += 1;
2020-04-07 15:00:48 +00:00
2020-04-17 19:08:43 +00:00
if !datacenters.contains(&self.ring[i].datacenter) {
ret.push(self.ring[i].node);
datacenters.push(self.ring[i].datacenter);
2020-04-17 19:08:43 +00:00
} else if datacenters.len() == self.n_datacenters && !ret.contains(&self.ring[i].node) {
ret.push(self.ring[i].node);
}
}
2020-04-07 15:00:48 +00:00
ret
2020-04-08 20:00:41 +00:00
}
2020-04-06 17:55:39 +00:00
}
2020-04-23 17:05:46 +00:00
fn gen_node_id(metadata_dir: &PathBuf) -> Result<UUID, Error> {
let mut id_file = metadata_dir.clone();
id_file.push("node_id");
if id_file.as_path().exists() {
let mut f = std::fs::File::open(id_file.as_path())?;
let mut d = vec![];
f.read_to_end(&mut d)?;
if d.len() != 32 {
return Err(Error::Message(format!("Corrupt node_id file")));
}
let mut id = [0u8; 32];
id.copy_from_slice(&d[..]);
Ok(id.into())
} else {
let id = gen_uuid();
let mut f = std::fs::File::create(id_file.as_path())?;
f.write_all(id.as_slice())?;
Ok(id)
}
}
fn read_network_config(metadata_dir: &PathBuf) -> Result<NetworkConfig, Error> {
let mut path = metadata_dir.clone();
path.push("network_config");
let mut file = std::fs::OpenOptions::new()
.read(true)
.open(path.as_path())?;
let mut net_config_bytes = vec![];
2020-04-09 21:45:07 +00:00
file.read_to_end(&mut net_config_bytes)?;
2020-04-21 14:07:15 +00:00
let net_config = rmp_serde::decode::from_read_ref(&net_config_bytes[..])
.expect("Unable to parse network configuration file (has version format changed?).");
Ok(net_config)
}
2020-04-06 17:55:39 +00:00
impl System {
2020-04-18 17:21:34 +00:00
pub fn new(
2020-12-12 16:58:19 +00:00
metadata_dir: PathBuf,
2020-04-23 17:05:46 +00:00
rpc_http_client: Arc<RpcHttpClient>,
2020-04-18 17:21:34 +00:00
background: Arc<BackgroundRunner>,
rpc_server: &mut RpcServer,
) -> Arc<Self> {
2020-12-12 16:58:19 +00:00
let id = gen_node_id(&metadata_dir).expect("Unable to read or generate node ID");
2020-04-23 17:05:46 +00:00
info!("Node ID: {}", hex::encode(&id));
2020-12-12 16:58:19 +00:00
let net_config = match read_network_config(&metadata_dir) {
Ok(x) => x,
Err(e) => {
2020-04-21 12:54:55 +00:00
info!(
"No valid previous network configuration stored ({}), starting fresh.",
e
);
NetworkConfig {
2020-04-09 21:45:07 +00:00
members: HashMap::new(),
version: 0,
}
}
};
let mut status = Status {
nodes: HashMap::new(),
hash: Hash::default(),
};
status.recalculate_hash();
let (update_status, status) = watch::channel(Arc::new(status));
2020-04-19 17:08:48 +00:00
let state_info = StateInfo {
hostname: gethostname::gethostname()
.into_string()
.unwrap_or("<invalid utf-8>".to_string()),
};
let mut ring = Ring {
config: net_config,
ring: Vec::new(),
n_datacenters: 0,
};
ring.rebuild_ring();
let (update_ring, ring) = watch::channel(Arc::new(ring));
let rpc_path = MEMBERSHIP_RPC_PATH.to_string();
2020-04-18 17:21:34 +00:00
let rpc_client = RpcClient::new(
RpcAddrClient::<Message>::new(rpc_http_client.clone(), rpc_path.clone()),
2020-04-18 17:21:34 +00:00
background.clone(),
status.clone(),
);
2020-04-12 13:51:19 +00:00
2020-04-18 17:21:34 +00:00
let sys = Arc::new(System {
id,
2020-12-12 16:58:19 +00:00
metadata_dir,
2020-04-23 17:05:46 +00:00
rpc_local_port: rpc_server.bind_addr.port(),
2020-04-19 17:08:48 +00:00
state_info,
2020-04-18 17:21:34 +00:00
rpc_http_client,
2020-04-12 13:51:19 +00:00
rpc_client,
status,
ring,
update_lock: Mutex::new((update_status, update_ring)),
background,
2020-04-18 17:21:34 +00:00
});
sys.clone().register_handler(rpc_server, rpc_path);
2020-04-18 17:21:34 +00:00
sys
}
fn register_handler(self: Arc<Self>, rpc_server: &mut RpcServer, path: String) {
rpc_server.add_handler::<Message, _, _>(path, move |msg, addr| {
let self2 = self.clone();
async move {
match msg {
Message::Ping(ping) => self2.handle_ping(&addr, &ping).await,
Message::PullStatus => self2.handle_pull_status(),
Message::PullConfig => self2.handle_pull_config(),
Message::AdvertiseNodesUp(adv) => self2.handle_advertise_nodes_up(&adv).await,
Message::AdvertiseConfig(adv) => self2.handle_advertise_config(&adv).await,
2020-11-08 14:04:30 +00:00
_ => Err(Error::BadRPC(format!("Unexpected RPC message"))),
2020-04-18 17:21:34 +00:00
}
}
});
}
pub fn rpc_client<M: RpcMessage + 'static>(self: &Arc<Self>, path: &str) -> Arc<RpcClient<M>> {
RpcClient::new(
RpcAddrClient::new(self.rpc_http_client.clone(), path.to_string()),
self.background.clone(),
self.status.clone(),
)
2020-04-06 17:55:39 +00:00
}
async fn save_network_config(self: Arc<Self>) -> Result<(), Error> {
2020-12-12 16:58:19 +00:00
let mut path = self.metadata_dir.clone();
path.push("network_config");
let ring = self.ring.borrow().clone();
let data = rmp_to_vec_all_named(&ring.config)?;
let mut f = tokio::fs::File::create(path.as_path()).await?;
f.write_all(&data[..]).await?;
Ok(())
}
2020-12-12 16:58:19 +00:00
fn make_ping(&self) -> Message {
let status = self.status.borrow().clone();
let ring = self.ring.borrow().clone();
Message::Ping(PingMessage {
id: self.id,
2020-04-23 17:05:46 +00:00
rpc_port: self.rpc_local_port,
status_hash: status.hash,
config_version: ring.config.version,
2020-04-19 17:08:48 +00:00
state_info: self.state_info.clone(),
2020-04-06 19:02:15 +00:00
})
}
2020-12-12 16:58:19 +00:00
async fn broadcast(self: Arc<Self>, msg: Message, timeout: Duration) {
let status = self.status.borrow().clone();
let to = status
.nodes
.keys()
.filter(|x| **x != self.id)
.cloned()
.collect::<Vec<_>>();
2020-04-18 17:21:34 +00:00
self.rpc_client.call_many(&to[..], msg, timeout).await;
2020-04-06 17:55:39 +00:00
}
pub async fn bootstrap(
self: Arc<Self>,
peers: &[SocketAddr],
consul_host: Option<String>,
consul_service_name: Option<String>,
) {
2020-04-23 17:05:46 +00:00
let bootstrap_peers = peers.iter().map(|ip| (*ip, None)).collect::<Vec<_>>();
2020-04-06 22:00:43 +00:00
self.clone().ping_nodes(bootstrap_peers).await;
let self2 = self.clone();
2020-04-16 12:50:49 +00:00
self.clone()
.background
2020-04-19 21:33:38 +00:00
.spawn_worker(format!("ping loop"), |stop_signal| {
self2.ping_loop(stop_signal).map(Ok)
2020-04-19 21:33:38 +00:00
})
.await;
if let (Some(consul_host), Some(consul_service_name)) = (consul_host, consul_service_name) {
let self2 = self.clone();
self.clone()
.background
.spawn_worker(format!("Consul loop"), |stop_signal| {
self2
.consul_loop(stop_signal, consul_host, consul_service_name)
.map(Ok)
})
.await;
}
2020-04-06 22:00:43 +00:00
}
2020-04-16 12:50:49 +00:00
async fn ping_nodes(self: Arc<Self>, peers: Vec<(SocketAddr, Option<UUID>)>) {
let ping_msg = self.make_ping();
let ping_resps = join_all(peers.iter().map(|(addr, id_option)| {
let sys = self.clone();
let ping_msg_ref = &ping_msg;
async move {
(
id_option,
addr,
2020-04-18 17:21:34 +00:00
sys.rpc_client
.by_addr()
.call(&addr, ping_msg_ref, PING_TIMEOUT)
.await,
)
}
}))
.await;
let update_locked = self.update_lock.lock().await;
let mut status: Status = self.status.borrow().as_ref().clone();
let ring = self.ring.borrow().clone();
2020-04-06 22:00:43 +00:00
let mut has_changes = false;
let mut to_advertise = vec![];
for (id_option, addr, ping_resp) in ping_resps {
if let Ok(Ok(Message::Ping(info))) = ping_resp {
let is_new = status.handle_ping(addr.ip(), &info);
2020-04-06 22:00:43 +00:00
if is_new {
has_changes = true;
to_advertise.push(AdvertisedNode {
id: info.id,
addr: *addr,
is_up: true,
last_seen: now_msec(),
2020-04-19 17:08:48 +00:00
state_info: info.state_info.clone(),
2020-04-06 22:00:43 +00:00
});
}
if is_new || status.hash != info.status_hash {
self.background
.spawn_cancellable(self.clone().pull_status(info.id).map(Ok));
2020-04-06 22:00:43 +00:00
}
if is_new || ring.config.version < info.config_version {
self.background
.spawn_cancellable(self.clone().pull_config(info.id).map(Ok));
2020-04-06 22:00:43 +00:00
}
} else if let Some(id) = id_option {
if let Some(st) = status.nodes.get_mut(id) {
st.num_failures.fetch_add(1, Ordering::SeqCst);
if !st.is_up() {
warn!("Node {:?} seems to be down.", id);
if !ring.config.members.contains_key(id) {
info!("Removing node {:?} from status (not in config and not responding to pings anymore)", id);
drop(st);
status.nodes.remove(&id);
has_changes = true;
}
2020-04-06 22:00:43 +00:00
}
}
2020-04-06 19:02:15 +00:00
}
}
2020-04-06 22:00:43 +00:00
if has_changes {
status.recalculate_hash();
2020-04-06 22:00:43 +00:00
}
if let Err(e) = update_locked.0.broadcast(Arc::new(status)) {
2020-04-21 12:54:55 +00:00
error!("In ping_nodes: could not save status update ({})", e);
}
drop(update_locked);
2020-04-06 17:55:39 +00:00
2020-04-06 22:00:43 +00:00
if to_advertise.len() > 0 {
self.broadcast(Message::AdvertiseNodesUp(to_advertise), PING_TIMEOUT)
.await;
2020-04-06 22:00:43 +00:00
}
2020-04-06 19:02:15 +00:00
}
2020-12-12 16:58:19 +00:00
async fn handle_ping(
self: Arc<Self>,
from: &SocketAddr,
ping: &PingMessage,
) -> Result<Message, Error> {
let update_locked = self.update_lock.lock().await;
let mut status: Status = self.status.borrow().as_ref().clone();
let is_new = status.handle_ping(from.ip(), ping);
2020-04-06 20:54:03 +00:00
if is_new {
status.recalculate_hash();
2020-04-06 20:54:03 +00:00
}
let status_hash = status.hash;
let config_version = self.ring.borrow().config.version;
update_locked.0.broadcast(Arc::new(status))?;
drop(update_locked);
2020-04-06 19:02:15 +00:00
2020-04-06 20:27:51 +00:00
if is_new || status_hash != ping.status_hash {
self.background
.spawn_cancellable(self.clone().pull_status(ping.id).map(Ok));
2020-04-06 20:27:51 +00:00
}
if is_new || config_version < ping.config_version {
self.background
.spawn_cancellable(self.clone().pull_config(ping.id).map(Ok));
2020-04-06 20:27:51 +00:00
}
Ok(self.make_ping())
2020-04-06 19:02:15 +00:00
}
2020-12-12 16:58:19 +00:00
fn handle_pull_status(&self) -> Result<Message, Error> {
let status = self.status.borrow().clone();
2020-04-06 20:27:51 +00:00
let mut mem = vec![];
for (node, status) in status.nodes.iter() {
2020-04-19 17:08:48 +00:00
let state_info = if *node == self.id {
self.state_info.clone()
} else {
status.state_info.clone()
};
mem.push(AdvertisedNode {
id: *node,
addr: status.addr,
is_up: status.is_up(),
last_seen: status.last_seen,
2020-04-19 17:08:48 +00:00
state_info,
2020-04-06 20:27:51 +00:00
});
}
Ok(Message::AdvertiseNodesUp(mem))
}
2020-12-12 16:58:19 +00:00
fn handle_pull_config(&self) -> Result<Message, Error> {
let ring = self.ring.borrow().clone();
Ok(Message::AdvertiseConfig(ring.config.clone()))
2020-04-06 20:27:51 +00:00
}
2020-12-12 16:58:19 +00:00
async fn handle_advertise_nodes_up(
self: Arc<Self>,
adv: &[AdvertisedNode],
) -> Result<Message, Error> {
2020-04-06 22:00:43 +00:00
let mut to_ping = vec![];
2020-04-06 20:27:51 +00:00
let update_lock = self.update_lock.lock().await;
let mut status: Status = self.status.borrow().as_ref().clone();
2020-04-06 22:00:43 +00:00
let mut has_changed = false;
2020-04-06 20:27:51 +00:00
for node in adv.iter() {
2020-04-06 22:00:43 +00:00
if node.id == self.id {
// learn our own ip address
2020-04-23 17:05:46 +00:00
let self_addr = SocketAddr::new(node.addr.ip(), self.rpc_local_port);
let old_self = status.nodes.insert(
node.id,
Arc::new(StatusEntry {
2020-04-06 22:00:43 +00:00
addr: self_addr,
last_seen: now_msec(),
num_failures: AtomicUsize::from(0),
2020-04-19 17:08:48 +00:00
state_info: self.state_info.clone(),
}),
);
2020-04-06 22:00:43 +00:00
has_changed = match old_self {
None => true,
Some(x) => x.addr != self_addr,
};
} else {
let ping_them = match status.nodes.get(&node.id) {
// Case 1: new node
None => true,
// Case 2: the node might have changed address
Some(our_node) => node.is_up && !our_node.is_up() && our_node.addr != node.addr,
};
if ping_them {
to_ping.push((node.addr, Some(node.id)));
}
2020-04-06 20:27:51 +00:00
}
}
2020-04-06 22:00:43 +00:00
if has_changed {
status.recalculate_hash();
2020-04-06 22:00:43 +00:00
}
update_lock.0.broadcast(Arc::new(status))?;
drop(update_lock);
2020-04-06 22:00:43 +00:00
if to_ping.len() > 0 {
self.background
.spawn_cancellable(self.clone().ping_nodes(to_ping).map(Ok));
2020-04-06 20:27:51 +00:00
}
Ok(Message::Ok)
}
2020-12-12 16:58:19 +00:00
async fn handle_advertise_config(
self: Arc<Self>,
adv: &NetworkConfig,
) -> Result<Message, Error> {
let update_lock = self.update_lock.lock().await;
let mut ring: Ring = self.ring.borrow().as_ref().clone();
if adv.version > ring.config.version {
ring.config = adv.clone();
ring.rebuild_ring();
update_lock.1.broadcast(Arc::new(ring))?;
drop(update_lock);
self.background.spawn_cancellable(
self.clone()
.broadcast(Message::AdvertiseConfig(adv.clone()), PING_TIMEOUT)
.map(Ok),
);
self.background.spawn(self.clone().save_network_config());
2020-04-06 20:27:51 +00:00
}
Ok(Message::Ok)
}
async fn ping_loop(self: Arc<Self>, mut stop_signal: watch::Receiver<bool>) {
2020-04-06 20:27:51 +00:00
loop {
let restart_at = tokio::time::delay_for(PING_INTERVAL);
let status = self.status.borrow().clone();
let ping_addrs = status
.nodes
.iter()
.filter(|(id, _)| **id != self.id)
.map(|(id, status)| (status.addr, Some(*id)))
.collect::<Vec<_>>();
2020-04-06 20:27:51 +00:00
2020-04-06 22:00:43 +00:00
self.clone().ping_nodes(ping_addrs).await;
2020-04-06 20:27:51 +00:00
select! {
_ = restart_at.fuse() => (),
must_exit = stop_signal.recv().fuse() => {
match must_exit {
None | Some(true) => return,
_ => (),
}
}
}
2020-04-06 20:27:51 +00:00
}
}
async fn consul_loop(
self: Arc<Self>,
mut stop_signal: watch::Receiver<bool>,
consul_host: String,
consul_service_name: String,
) {
loop {
let restart_at = tokio::time::delay_for(CONSUL_INTERVAL);
match get_consul_nodes(&consul_host, &consul_service_name).await {
Ok(mut node_list) => {
let ping_addrs = node_list.drain(..).map(|a| (a, None)).collect::<Vec<_>>();
self.clone().ping_nodes(ping_addrs).await;
}
Err(e) => {
warn!("Could not retrieve node list from Consul: {}", e);
}
}
select! {
_ = restart_at.fuse() => (),
must_exit = stop_signal.recv().fuse() => {
match must_exit {
None | Some(true) => return,
_ => (),
}
}
}
}
}
2020-12-12 16:58:19 +00:00
fn pull_status(
self: Arc<Self>,
peer: UUID,
) -> impl futures::future::Future<Output = ()> + Send + 'static {
2020-04-06 20:54:03 +00:00
async move {
2020-04-18 17:21:34 +00:00
let resp = self
.rpc_client
.call(peer, Message::PullStatus, PING_TIMEOUT)
2020-04-18 17:21:34 +00:00
.await;
2020-04-06 20:54:03 +00:00
if let Ok(Message::AdvertiseNodesUp(nodes)) = resp {
let _: Result<_, _> = self.handle_advertise_nodes_up(&nodes).await;
}
2020-04-06 20:27:51 +00:00
}
}
2020-12-12 16:58:19 +00:00
async fn pull_config(self: Arc<Self>, peer: UUID) {
2020-04-18 17:21:34 +00:00
let resp = self
.rpc_client
.call(peer, Message::PullConfig, PING_TIMEOUT)
2020-04-18 17:21:34 +00:00
.await;
2020-04-06 20:27:51 +00:00
if let Ok(Message::AdvertiseConfig(config)) = resp {
2020-04-06 20:54:03 +00:00
let _: Result<_, _> = self.handle_advertise_config(&config).await;
2020-04-06 20:27:51 +00:00
}
2020-04-06 19:02:15 +00:00
}
2020-04-06 17:55:39 +00:00
}