blob: 0849d6a41ca96d67433f7111c38562a25d924c01 [file] [log] [blame]
Jiri Simsad7616c92015-03-24 23:44:30 -07001// Copyright 2015 The Vanadium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
Asim Shankarab75bc32015-02-12 21:52:04 -08005// Package starter provides a single function that starts up servers for a
6// mounttable and a device manager that is mounted on it.
7package starter
8
9import (
gauthamt1c6e04b2015-02-19 16:09:47 -080010 "encoding/base64"
Bogdan Caprita2250a3c2015-02-19 21:50:13 -080011 "net"
Bogdan Caprita4e663242015-02-15 15:23:14 -080012 "os"
13 "path/filepath"
Bogdan Caprita2250a3c2015-02-19 21:50:13 -080014 "strconv"
Asim Shankarab75bc32015-02-12 21:52:04 -080015 "time"
16
Jiri Simsa6ac95222015-02-23 16:11:49 -080017 "v.io/v23"
18 "v.io/v23/context"
Jiri Simsa6ac95222015-02-23 16:11:49 -080019 "v.io/v23/naming"
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070020 "v.io/v23/rpc"
Asim Shankar99b18a72015-04-25 23:19:28 -070021 "v.io/v23/security"
Mike Burrows39bbaaf2015-03-24 11:27:32 -070022 "v.io/v23/verror"
Matt Rosencrantze4a49f42015-09-03 17:08:51 -070023 displib "v.io/x/ref/lib/dispatcher"
Cosmos Nicolaou18489732015-06-29 16:01:38 -070024 "v.io/x/ref/runtime/factories/roaming"
25 "v.io/x/ref/services/debug/debuglib"
Bogdan Caprita1bba7362015-06-30 14:03:17 -070026 "v.io/x/ref/services/device/deviced/internal/impl"
Bogdan Caprita226d88e2015-06-30 17:34:57 -070027 "v.io/x/ref/services/device/deviced/internal/versioning"
Robin Thellendb01356d2015-08-18 10:23:14 -070028 "v.io/x/ref/services/device/internal/claim"
Cosmos Nicolaou18489732015-06-29 16:01:38 -070029 "v.io/x/ref/services/device/internal/config"
Cosmos Nicolaou18489732015-06-29 16:01:38 -070030 "v.io/x/ref/services/internal/pathperms"
31 "v.io/x/ref/services/mounttable/mounttablelib"
Asim Shankarab75bc32015-02-12 21:52:04 -080032)
33
Bogdan Caprita1bba7362015-06-30 14:03:17 -070034const pkgPath = "v.io/x/ref/services/device/deviced/internal/starter"
Mike Burrows39bbaaf2015-03-24 11:27:32 -070035
36var (
Bogdan Capritae8073682015-04-25 15:37:53 -070037 errCantSaveInfo = verror.Register(pkgPath+".errCantSaveInfo", verror.NoRetry, "{1:}{2:} failed to save info{:_}")
38 errBadPort = verror.Register(pkgPath+".errBadPort", verror.NoRetry, "{1:}{2:} invalid port{:_}")
39 errCantCreateProxy = verror.Register(pkgPath+".errCantCreateProxy", verror.NoRetry, "{1:}{2:} Failed to create proxy{:_}")
40 errNoEndpointToClaim = verror.Register(pkgPath+".errNoEndpointToClaim", verror.NoRetry, "{1:}{2:} failed to find an endpoint for claiming{:_}")
Mike Burrows39bbaaf2015-03-24 11:27:32 -070041)
42
Asim Shankarab75bc32015-02-12 21:52:04 -080043type NamespaceArgs struct {
Bogdan Capritae8073682015-04-25 15:37:53 -070044 Name string // Name to publish the mounttable service under (after claiming).
Adam Sadovskya4d4a692015-04-20 11:36:49 -070045 ListenSpec rpc.ListenSpec // ListenSpec for the server.
46 PermissionsFile string // Path to the Permissions file used by the mounttable.
David Why Use Two When One Will Do Presottoba9593f2015-04-22 12:29:26 -070047 PersistenceDir string // Path to the directory holding persistent acls.
Asim Shankarab75bc32015-02-12 21:52:04 -080048 // Name in the local neighborhood on which to make the mounttable
49 // visible. If empty, the mounttable will not be visible in the local
50 // neighborhood.
51 Neighborhood string
52}
53
54type DeviceArgs struct {
Bogdan Capritae8073682015-04-25 15:37:53 -070055 Name string // Name to publish the device service under (after claiming).
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070056 ListenSpec rpc.ListenSpec // ListenSpec for the device server.
Asim Shankarab75bc32015-02-12 21:52:04 -080057 ConfigState *config.State // Configuration for the device.
58 TestMode bool // Whether the device is running in test mode or not.
59 RestartCallback func() // Callback invoked when the device service is restarted.
gauthamt27f38ba2015-02-13 13:45:01 -080060 PairingToken string // PairingToken that a claimer needs to provide.
Asim Shankarab75bc32015-02-12 21:52:04 -080061}
62
Asim Shankar23dac322015-02-14 12:42:26 -080063func (d *DeviceArgs) name(mt string) string {
64 if d.Name != "" {
65 return d.Name
66 }
67 return naming.Join(mt, "devmgr")
68}
69
Bogdan Caprita2250a3c2015-02-19 21:50:13 -080070type ProxyArgs struct {
71 Port int
72}
73
Asim Shankarab75bc32015-02-12 21:52:04 -080074type Args struct {
75 Namespace NamespaceArgs
76 Device DeviceArgs
Bogdan Caprita2250a3c2015-02-19 21:50:13 -080077 Proxy ProxyArgs
Asim Shankarab75bc32015-02-12 21:52:04 -080078
79 // If true, the global namespace will be made available on the
80 // mounttable server under "global/".
81 MountGlobalNamespaceInLocalNamespace bool
82}
83
84// Start creates servers for the mounttable and device services and links them together.
85//
Bogdan Capritae8073682015-04-25 15:37:53 -070086// Returns the object name for the claimable service (empty if already claimed),
87// a callback to be invoked to shutdown the services on success, or an error on
88// failure.
89func Start(ctx *context.T, args Args) (string, func(), error) {
Arup Mukherjee31b77c82015-03-04 10:48:33 -080090 // Is this binary compatible with the state on disk?
Bogdan Caprita226d88e2015-06-30 17:34:57 -070091 if err := versioning.CheckCompatibility(ctx, args.Device.ConfigState.Root); err != nil {
Bogdan Capritae8073682015-04-25 15:37:53 -070092 return "", nil, err
Arup Mukherjee31b77c82015-03-04 10:48:33 -080093 }
Bogdan Caprita394af412015-03-04 16:45:13 -080094 // In test mode, we skip writing the info file to disk, and we skip
95 // attempting to start the claimable service: the device must have been
Adam Sadovskya4d4a692015-04-20 11:36:49 -070096 // claimed already to enable updates anyway, and checking for perms in
97 // NewClaimableDispatcher needlessly prints a perms signature
Bogdan Caprita394af412015-03-04 16:45:13 -080098 // verification error to the logs.
99 if args.Device.TestMode {
Bogdan Capritae8073682015-04-25 15:37:53 -0700100 cleanup, err := startClaimedDevice(ctx, args)
101 return "", cleanup, err
Bogdan Caprita394af412015-03-04 16:45:13 -0800102 }
Arup Mukherjee31b77c82015-03-04 10:48:33 -0800103
Bogdan Caprita4e663242015-02-15 15:23:14 -0800104 // TODO(caprita): use some mechanism (a file lock or presence of entry
105 // in mounttable) to ensure only one device manager is running in an
106 // installation?
107 mi := &impl.ManagerInfo{
108 Pid: os.Getpid(),
109 }
Bogdan Caprita394af412015-03-04 16:45:13 -0800110 if err := impl.SaveManagerInfo(filepath.Join(args.Device.ConfigState.Root, "device-manager"), mi); err != nil {
Bogdan Capritae8073682015-04-25 15:37:53 -0700111 return "", nil, verror.New(errCantSaveInfo, ctx, err)
Bogdan Caprita4e663242015-02-15 15:23:14 -0800112 }
113
Asim Shankar23dac322015-02-14 12:42:26 -0800114 // If the device has not yet been claimed, start the mounttable and
115 // claimable service and wait for it to be claimed.
116 // Once a device is claimed, close any previously running servers and
117 // start a new mounttable and device service.
Robin Thellendb01356d2015-08-18 10:23:14 -0700118 claimable, claimed := claim.NewClaimableDispatcher(ctx, impl.PermsDir(args.Device.ConfigState), args.Device.PairingToken, security.AllowEveryone())
Bogdan Caprita394af412015-03-04 16:45:13 -0800119 if claimable == nil {
120 // Device has already been claimed, bypass claimable service
121 // stage.
Bogdan Capritae8073682015-04-25 15:37:53 -0700122 cleanup, err := startClaimedDevice(ctx, args)
123 return "", cleanup, err
Asim Shankar23dac322015-02-14 12:42:26 -0800124 }
Bogdan Capritae8073682015-04-25 15:37:53 -0700125 epName, stopClaimable, err := startClaimableDevice(ctx, claimable, args)
Bogdan Caprita394af412015-03-04 16:45:13 -0800126 if err != nil {
Bogdan Capritae8073682015-04-25 15:37:53 -0700127 return "", nil, err
Bogdan Caprita394af412015-03-04 16:45:13 -0800128 }
129 stop := make(chan struct{})
130 stopped := make(chan struct{})
131 go waitToBeClaimedAndStartClaimedDevice(ctx, stopClaimable, claimed, stop, stopped, args)
Bogdan Capritae8073682015-04-25 15:37:53 -0700132 return epName, func() {
Bogdan Caprita394af412015-03-04 16:45:13 -0800133 close(stop)
134 <-stopped
135 }, nil
Asim Shankar23dac322015-02-14 12:42:26 -0800136}
137
Bogdan Capritae8073682015-04-25 15:37:53 -0700138func startClaimableDevice(ctx *context.T, dispatcher rpc.Dispatcher, args Args) (string, func(), error) {
Bogdan Caprita9032e742015-02-27 15:10:25 -0800139 // TODO(caprita,ashankar): We create a context with a new stream manager
140 // that we can cancel once the device has been claimed. This gets around
141 // the following issue: if we publish the claimable server to the local
142 // mounttable, and then (following claim) we restart the mounttable
143 // server on the same port, we fail to publish the device service to the
144 // (new) mounttable server (Mount fails with "VC handshake failed:
145 // remote end closed VC(VCs not accepted)". Presumably, something to do
146 // with caching connections (following the claim, the mounttable comes
147 // back on the same port as before, and the client-side of the mount
148 // gets confused trying to reuse the old connection and doesn't attempt
149 // to create a new connection). We should get to the bottom of it.
Bogdan Capritafa9341a2015-02-16 21:42:00 -0800150 ctx, cancel := context.WithCancel(ctx)
Bogdan Capritae8073682015-04-25 15:37:53 -0700151 var err error
Todd Wangad492042015-04-17 15:58:40 -0700152 if ctx, err = v23.WithNewStreamManager(ctx); err != nil {
Bogdan Caprita9032e742015-02-27 15:10:25 -0800153 cancel()
Bogdan Capritae8073682015-04-25 15:37:53 -0700154 return "", nil, err
Asim Shankarab75bc32015-02-12 21:52:04 -0800155 }
Matt Rosencrantza9fb36d2015-06-22 11:44:37 -0700156 ctx = v23.WithListenSpec(ctx, args.Device.ListenSpec)
Matt Rosencrantz53ac5852015-09-04 15:14:54 -0700157 ctx, server, err := v23.WithNewDispatchingServer(ctx, "", dispatcher)
Asim Shankar23dac322015-02-14 12:42:26 -0800158 if err != nil {
Bogdan Capritafa9341a2015-02-16 21:42:00 -0800159 cancel()
Bogdan Capritae8073682015-04-25 15:37:53 -0700160 return "", nil, err
Asim Shankarab75bc32015-02-12 21:52:04 -0800161 }
Asim Shankar23dac322015-02-14 12:42:26 -0800162 shutdown := func() {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700163 ctx.Infof("Stopping claimable server...")
Asim Shankar23dac322015-02-14 12:42:26 -0800164 server.Stop()
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700165 ctx.Infof("Stopped claimable server.")
Bogdan Capritafa9341a2015-02-16 21:42:00 -0800166 cancel()
Asim Shankar23dac322015-02-14 12:42:26 -0800167 }
Matt Rosencrantzbb6295d2015-06-19 15:13:58 -0700168 endpoints := server.Status().Endpoints
Jiri Simsa6ac95222015-02-23 16:11:49 -0800169 publicKey, err := v23.GetPrincipal(ctx).PublicKey().MarshalBinary()
gauthamt1c6e04b2015-02-19 16:09:47 -0800170 if err != nil {
171 shutdown()
Bogdan Capritae8073682015-04-25 15:37:53 -0700172 return "", nil, err
gauthamt1c6e04b2015-02-19 16:09:47 -0800173 }
Bogdan Capritae8073682015-04-25 15:37:53 -0700174 var epName string
Robin Thellend1ec18e22015-04-09 11:11:14 -0700175 if args.Device.ListenSpec.Proxy != "" {
Suharsh Sivakumarc1d9e042015-09-17 13:13:27 -0700176 if os.Getenv("V23_RPC_TRANSITION_STATE") == "xservers" {
177 for {
178 eps := server.Status().Endpoints
179 if len(eps) > 0 && len(eps[0].Addr().Network()) > 0 {
180 epName = eps[0].Name()
181 ctx.Infof("Proxied address: %s", epName)
182 break
183 }
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700184 ctx.Infof("Waiting for proxy address to appear...")
Robin Thellend1ec18e22015-04-09 11:11:14 -0700185 time.Sleep(time.Second)
Robin Thellend1ec18e22015-04-09 11:11:14 -0700186 }
Suharsh Sivakumarc1d9e042015-09-17 13:13:27 -0700187 } else {
188 // TODO(suharshs): Remove this else block once the transition is complete.
189 for {
190 p := server.Status().Proxies
191 if len(p) == 0 {
192 ctx.Infof("Waiting for proxy address to appear...")
193 time.Sleep(time.Second)
194 continue
195 }
196 epName = p[0].Endpoint.Name()
197 ctx.Infof("Proxied address: %s", epName)
198 break
199 }
Robin Thellend1ec18e22015-04-09 11:11:14 -0700200 }
Bogdan Capritae8073682015-04-25 15:37:53 -0700201 } else {
202 if len(endpoints) == 0 {
203 return "", nil, verror.New(errNoEndpointToClaim, ctx, err)
204 }
205 epName = endpoints[0].Name()
Robin Thellend1ec18e22015-04-09 11:11:14 -0700206 }
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700207 ctx.Infof("Unclaimed device manager (%v) with public_key: %s", epName, base64.URLEncoding.EncodeToString(publicKey))
208 ctx.FlushLog()
Bogdan Capritae8073682015-04-25 15:37:53 -0700209 return epName, shutdown, nil
Asim Shankar23dac322015-02-14 12:42:26 -0800210}
211
212func waitToBeClaimedAndStartClaimedDevice(ctx *context.T, stopClaimable func(), claimed, stop <-chan struct{}, stopped chan<- struct{}, args Args) {
213 // Wait for either the claimable service to complete, or be stopped
214 defer close(stopped)
215 select {
216 case <-claimed:
217 stopClaimable()
218 case <-stop:
219 stopClaimable()
220 return
221 }
222 shutdown, err := startClaimedDevice(ctx, args)
223 if err != nil {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700224 ctx.Errorf("Failed to start device service after it was claimed: %v", err)
Cosmos Nicolaoue9c622d2015-07-10 11:09:42 -0700225 v23.GetAppCycle(ctx).Stop(ctx)
Asim Shankar23dac322015-02-14 12:42:26 -0800226 return
227 }
228 defer shutdown()
229 <-stop // Wait to be stopped
230}
231
232func startClaimedDevice(ctx *context.T, args Args) (func(), error) {
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700233 ctx.Infof("Starting claimed device services...")
Cosmos Nicolaou7a4221f2015-06-21 08:02:23 -0700234 permStore := pathperms.NewPathStore(ctx)
Bogdan Capritae90bcfd2015-08-07 13:31:55 -0700235 permsDir := impl.PermsDir(args.Device.ConfigState)
236 debugAuth, err := pathperms.NewHierarchicalAuthorizer(permsDir, permsDir, permStore, nil)
Robert Kroeger3bbf3c72015-03-25 13:04:55 -0700237 if err != nil {
238 return nil, err
239 }
240
Cosmos Nicolaou64d573d2015-07-13 16:22:18 -0700241 debugDisp := debuglib.NewDispatcher(debugAuth)
Robert Kroeger3bbf3c72015-03-25 13:04:55 -0700242
Todd Wangad492042015-04-17 15:58:40 -0700243 ctx = v23.WithReservedNameDispatcher(ctx, debugDisp)
Robert Kroeger3bbf3c72015-03-25 13:04:55 -0700244
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700245 ctx.Infof("Starting mount table...")
Asim Shankar23dac322015-02-14 12:42:26 -0800246 mtName, stopMT, err := startMounttable(ctx, args.Namespace)
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800247 if err != nil {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700248 ctx.Errorf("Failed to start mounttable service: %v", err)
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800249 return nil, err
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700250 } else {
251 ctx.Infof("Started mount table.")
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800252 }
Todd Wangcd4b3cc2015-04-06 16:42:02 -0700253 // TODO(caprita): We link in a proxy server into the device manager so that we
254 // can bootstrap with install-local before we can install an actual proxy app.
255 // Once support is added to the RPC layer to allow install-local to serve on
256 // the same connection it established to the device manager (see TODO in
257 // v.io/x/ref/services/device/device/local_install.go), we can get rid of this
258 // local proxy altogether.
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700259 ctx.Infof("Starting proxy service...")
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800260 stopProxy, err := startProxyServer(ctx, args.Proxy, mtName)
261 if err != nil {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700262 ctx.Errorf("Failed to start proxy service: %v", err)
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800263 stopMT()
264 return nil, err
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700265 } else {
266 ctx.Infof("Started proxy service.")
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800267 }
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700268 ctx.Infof("Starting device service...")
Robert Kroeger3bbf3c72015-03-25 13:04:55 -0700269 stopDevice, err := startDeviceServer(ctx, args.Device, mtName, permStore)
Asim Shankarab75bc32015-02-12 21:52:04 -0800270 if err != nil {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700271 ctx.Errorf("Failed to start device service: %v", err)
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800272 stopProxy()
273 stopMT()
Asim Shankarab75bc32015-02-12 21:52:04 -0800274 return nil, err
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700275 } else {
276 ctx.Infof("Started device service.")
Asim Shankarab75bc32015-02-12 21:52:04 -0800277 }
278 if args.MountGlobalNamespaceInLocalNamespace {
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700279 ctx.Infof("Mounting %v ...", mtName)
Asim Shankarab75bc32015-02-12 21:52:04 -0800280 mountGlobalNamespaceInLocalNamespace(ctx, mtName)
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700281 ctx.Infof("Mounted %v", mtName)
Asim Shankarab75bc32015-02-12 21:52:04 -0800282 }
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800283
Asim Shankarab75bc32015-02-12 21:52:04 -0800284 impl.InvokeCallback(ctx, args.Device.ConfigState.Name)
285
Bogdan Capritaf18888c2015-08-12 09:53:31 -0700286 ctx.Infof("Started claimed device services.")
Asim Shankarab75bc32015-02-12 21:52:04 -0800287 return func() {
288 stopDevice()
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800289 stopProxy()
Asim Shankarab75bc32015-02-12 21:52:04 -0800290 stopMT()
291 }, nil
292}
293
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800294func startProxyServer(ctx *context.T, p ProxyArgs, localMT string) (func(), error) {
295 switch port := p.Port; {
296 case port == 0:
297 return func() {}, nil
298 case port < 0:
Mike Burrows39bbaaf2015-03-24 11:27:32 -0700299 return nil, verror.New(errBadPort, ctx, port)
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800300 }
301 port := strconv.Itoa(p.Port)
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800302 protocol, addr := "tcp", net.JoinHostPort("", port)
303 // Attempt to get a publicly accessible address for the proxy to publish
304 // under.
Jiri Simsa6ac95222015-02-23 16:11:49 -0800305 ls := v23.GetListenSpec(ctx)
Cosmos Nicolaouaa87e292015-04-21 22:15:50 -0700306 ls.Addrs = rpc.ListenAddrs{{protocol, addr}}
Asim Shankar99b18a72015-04-25 23:19:28 -0700307 // TODO(ashankar): Revisit this choice of security.AllowEveryone
308 // See: https://v.io/i/387
309 shutdown, ep, err := roaming.NewProxy(ctx, ls, security.AllowEveryone())
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800310 if err != nil {
Mike Burrows39bbaaf2015-03-24 11:27:32 -0700311 return nil, verror.New(errCantCreateProxy, ctx, err)
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800312 }
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700313 ctx.Infof("Local proxy (%v)", ep.Name())
Bogdan Caprita394af412015-03-04 16:45:13 -0800314 return func() {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700315 ctx.Infof("Stopping proxy...")
Matt Rosencrantz2b675f92015-03-05 12:52:50 -0800316 shutdown()
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700317 ctx.Infof("Stopped proxy.")
Bogdan Caprita394af412015-03-04 16:45:13 -0800318 }, nil
Bogdan Caprita2250a3c2015-02-19 21:50:13 -0800319}
320
Asim Shankar23dac322015-02-14 12:42:26 -0800321func startMounttable(ctx *context.T, n NamespaceArgs) (string, func(), error) {
David Why Use Two When One Will Do Presottoba9593f2015-04-22 12:29:26 -0700322 mtName, stopMT, err := mounttablelib.StartServers(ctx, n.ListenSpec, n.Name, n.Neighborhood, n.PermissionsFile, n.PersistenceDir, "mounttable")
Asim Shankar23dac322015-02-14 12:42:26 -0800323 if err != nil {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700324 ctx.Errorf("mounttablelib.StartServers(%#v) failed: %v", n, err)
Asim Shankar23dac322015-02-14 12:42:26 -0800325 } else {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700326 ctx.Infof("Local mounttable (%v) published as %q", mtName, n.Name)
Asim Shankar23dac322015-02-14 12:42:26 -0800327 }
Bogdan Caprita394af412015-03-04 16:45:13 -0800328 return mtName, func() {
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700329 ctx.Infof("Stopping mounttable...")
Bogdan Caprita394af412015-03-04 16:45:13 -0800330 stopMT()
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700331 ctx.Infof("Stopped mounttable.")
Bogdan Caprita394af412015-03-04 16:45:13 -0800332 }, err
Asim Shankar23dac322015-02-14 12:42:26 -0800333}
334
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700335// startDeviceServer creates an rpc.Server and sets it up to server the Device service.
Asim Shankarab75bc32015-02-12 21:52:04 -0800336//
337// ls: ListenSpec for the server
338// configState: configuration for the Device service dispatcher
339// mt: Object address of the mounttable
340// dm: Name to publish the device service under
341// testMode: whether the service is to be run in test mode
342// restarted: callback invoked when the device manager is restarted.
343//
344// Returns:
345// (1) Function to be called to force the service to shutdown
346// (2) Any errors in starting the service (in which case, (1) will be nil)
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700347func startDeviceServer(ctx *context.T, args DeviceArgs, mt string, permStore *pathperms.PathStore) (shutdown func(), err error) {
Matt Rosencrantze4a49f42015-09-03 17:08:51 -0700348 ctx = v23.WithListenSpec(ctx, args.ListenSpec)
349 wrapper := displib.NewDispatcherWrapper()
Matt Rosencrantz53ac5852015-09-04 15:14:54 -0700350 ctx, server, err := v23.WithNewDispatchingServer(ctx, args.name(mt), wrapper)
Asim Shankarab75bc32015-02-12 21:52:04 -0800351 if err != nil {
352 return nil, err
353 }
Matt Rosencrantze4a49f42015-09-03 17:08:51 -0700354 args.ConfigState.Name = server.Status().Endpoints[0].Name()
Asim Shankarab75bc32015-02-12 21:52:04 -0800355
Bogdan Caprita24404f22015-06-30 18:56:33 -0700356 dispatcher, dShutdown, err := impl.NewDispatcher(ctx, args.ConfigState, mt, args.TestMode, args.RestartCallback, permStore)
Asim Shankarab75bc32015-02-12 21:52:04 -0800357 if err != nil {
Matt Rosencrantze4a49f42015-09-03 17:08:51 -0700358 server.Stop()
Asim Shankarab75bc32015-02-12 21:52:04 -0800359 return nil, err
360 }
361
362 shutdown = func() {
Bogdan Caprita019f0ad2015-05-21 10:45:10 -0700363 // TODO(caprita): Capture the Dying state by feeding it back to
364 // the dispatcher and exposing it in Status.
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700365 ctx.Infof("Stopping device server...")
Asim Shankarab75bc32015-02-12 21:52:04 -0800366 server.Stop()
Bogdan Caprita24404f22015-06-30 18:56:33 -0700367 dShutdown()
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700368 ctx.Infof("Stopped device.")
Asim Shankarab75bc32015-02-12 21:52:04 -0800369 }
Matt Rosencrantze4a49f42015-09-03 17:08:51 -0700370 wrapper.SetDispatcher(dispatcher)
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700371 ctx.Infof("Device manager (%v) published as %v", args.ConfigState.Name, args.name(mt))
Asim Shankarab75bc32015-02-12 21:52:04 -0800372 return shutdown, nil
373}
374
375func mountGlobalNamespaceInLocalNamespace(ctx *context.T, localMT string) {
Jiri Simsa6ac95222015-02-23 16:11:49 -0800376 ns := v23.GetNamespace(ctx)
Asim Shankarab75bc32015-02-12 21:52:04 -0800377 for _, root := range ns.Roots() {
378 go func(r string) {
379 for {
David Why Use Two When One Will Do Presotto38788d42015-03-31 17:13:54 -0700380 err := ns.Mount(ctx, naming.Join(localMT, "global"), r, 0 /* forever */, naming.ServesMountTable(true))
Asim Shankarab75bc32015-02-12 21:52:04 -0800381 if err == nil {
382 break
383 }
Cosmos Nicolaou18489732015-06-29 16:01:38 -0700384 ctx.Infof("Failed to Mount global namespace: %v", err)
Asim Shankarab75bc32015-02-12 21:52:04 -0800385 time.Sleep(time.Second)
386 }
387 }(root)
388 }
389}