
Now that we have most of the services required for use with containerd, it was found that common patterns were used throughout services. By defining a central `errdefs` package, we ensure that services will map errors to and from grpc consistently and cleanly. One can decorate an error with as much context as necessary, using `pkg/errors` and still have the error mapped correctly via grpc. We make a few sacrifices. At this point, the common errors we use across the repository all map directly to grpc error codes. While this seems positively crazy, it actually works out quite well. The error conditions that were specific weren't super necessary and the ones that were necessary now simply have better context information. We lose the ability to add new codes, but this constraint may not be a bad thing. Effectively, as long as one uses the errors defined in `errdefs`, the error class will be mapped correctly across the grpc boundary and everything will be good. If you don't use those definitions, the error maps to "unknown" and the error message is preserved. Signed-off-by: Stephen J Day <stephen.day@docker.com>
39 lines
609 B
Go
39 lines
609 B
Go
package content
|
|
|
|
import (
|
|
"sync"
|
|
|
|
"github.com/containerd/containerd/errdefs"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
// Handles locking references
|
|
// TODO: use boltdb for lock status
|
|
|
|
var (
|
|
// locks lets us lock in process
|
|
locks = map[string]struct{}{}
|
|
locksMu sync.Mutex
|
|
)
|
|
|
|
func tryLock(ref string) error {
|
|
locksMu.Lock()
|
|
defer locksMu.Unlock()
|
|
|
|
if _, ok := locks[ref]; ok {
|
|
return errors.Wrapf(errdefs.ErrUnavailable, "ref %s locked", ref)
|
|
}
|
|
|
|
locks[ref] = struct{}{}
|
|
return nil
|
|
}
|
|
|
|
func unlock(ref string) {
|
|
locksMu.Lock()
|
|
defer locksMu.Unlock()
|
|
|
|
if _, ok := locks[ref]; ok {
|
|
delete(locks, ref)
|
|
}
|
|
}
|