-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathlock.rs
262 lines (234 loc) · 7.58 KB
/
lock.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
use crate::redis::Generic;
use serde::de::DeserializeOwned;
use serde::Serialize;
use std::fmt::Display;
use std::ops::{Deref, DerefMut};
use thiserror::Error;
#[derive(Error, Debug)]
pub enum LockError {
#[error("Locking failed")]
LockFailed,
#[error("Unlocking failed")]
UnlockFailed,
#[error("No connection to Redis available")]
NoConnection,
#[error("Error by Redis")]
Redis(#[from] redis::RedisError),
}
#[derive(Debug, PartialEq)]
enum LockNum {
Success,
Fail,
}
impl From<i8> for LockNum {
fn from(value: i8) -> Self {
match value {
0 => Self::Fail,
1 => Self::Success,
_ => panic!("Unexpected value"),
}
}
}
/// The lock script.
/// It is used to lock a value in Redis, so that only one instance can access it at a time.
/// Takes 3 Arguments:
/// 1. The key of the value to lock,
/// 2. The timeout in seconds,
/// 3. The value to store.
const LOCK_SCRIPT: &str = r#"
local val = redis.call("get", ARGV[1])
if redis.call("exists", ARGV[1]) or val == false or val == ARGV[3] then
redis.call("setex", ARGV[1], ARGV[2], ARGV[3])
return 1
end
return 0"#;
/// The drop script.
/// It is used to drop a value in Redis, so that only the instance that locked it can drop it.
/// Takes 2 Arguments:
/// 1. The key of the value to drop,
/// 2. The value to check.
const DROP_SCRIPT: &str = r#"
local val = redis.call("get", ARGV[1])
if val == ARGV[2] then
redis.call("del", ARGV[1])
return 1
end
return 0"#;
/// The uuid script.
/// It is used to generate a uuid for the lock.
/// It is a very simple counter that is stored in Redis and returns all numbers only once.
///
/// Takes 1 Argument:
/// 1. The key of the field to increment and return.
const UUID_SCRIPT: &str = r#"
redis.call("incr", ARGV[1])
local val = redis.call("get", ARGV[1])
return val"#;
/// The RedisMutex struct.
/// It is used to lock a value in Redis, so that only one instance can access it at a time.
/// You have to use RedisGeneric as the data type.
/// It is a wrapper around the data type you want to store like the Mutex in std.
///
/// The lock is released when the guard is dropped or it expires.
/// The default expiration time is 1000ms. If you need more time, use the [Guard::expand()] function.
pub struct Mutex<T> {
client: redis::Client,
conn: Option<redis::Connection>,
data: Generic<T>,
key: String,
uuid: usize,
}
impl<T> Mutex<T> {
pub fn new(client: redis::Client, data: Generic<T>) -> Self {
let mut conn = client
.get_connection()
.expect("Failed to get connection to Redis");
let uuid = redis::Script::new(UUID_SCRIPT)
.arg(format!("uuid_{}", data.key))
.invoke::<usize>(&mut conn)
.expect("Failed to get uuid");
Self {
client,
key: format!("lock_{}", data.key),
data,
conn: Some(conn),
uuid,
}
}
/// Locks the value in Redis.
/// This function blocks until the lock is acquired.
/// It returns a guard that can be used to access the value.
/// The guard will unlock the value when it is dropped.
///
/// Beware that the value is not locked in the Rust sense and can be set by other instances,
/// if they skip the locking process and its LOCK_SCRIPT.
///
/// If you try to lock a value that is already locked by another instance in the same scope,
/// this function will block until the lock is released, which will be happen after the lock
/// expires (1000ms).
/// If you need to extend this time, you can use the [Guard::expand()] function.
pub fn lock(&mut self) -> Result<Guard<T>, LockError> {
let mut conn = match self.conn.take() {
Some(conn) => conn,
None => self
.client
.get_connection()
.map_err(|_| LockError::LockFailed)?,
};
let lock_cmd = redis::Script::new(LOCK_SCRIPT);
while LockNum::from(
lock_cmd
.arg(&self.key)
.arg(1000)
.arg(&self.uuid.to_string())
.invoke::<i8>(&mut conn)
.expect("Failed to lock. You should not see this!"),
) == LockNum::Fail
{
println!("waiting for lock");
std::hint::spin_loop();
}
// store the connection for later use
self.conn = Some(conn);
let lock = Guard::new(self)?;
Ok(lock)
}
}
impl<T> DerefMut for Mutex<T> {
fn deref_mut(&mut self) -> &mut Self::Target {
&mut self.data
}
}
impl<T> Deref for Mutex<T> {
type Target = Generic<T>;
fn deref(&self) -> &Self::Target {
&self.data
}
}
/// The guard struct for the Mutex.
/// It is used to access the value and not for you to initialize it by your own.
pub struct Guard<'a, T> {
lock: &'a mut Mutex<T>,
expanded: bool,
}
impl<'a, T> Guard<'a, T> {
fn new(lock: &'a mut Mutex<T>) -> Result<Self, LockError> {
Ok(Self {
lock,
expanded: false,
})
}
/// Expands the lock time by 2000ms from the point on its called.
/// This is useful if you need to access the value for a longer time.
///
/// But use it with caution, because it can lead to deadlocks.
/// To avoid deadlocks, we only allow one extension per lock.
pub fn expand(&mut self) {
if self.expanded {
return;
}
let conn = self.lock.conn.as_mut().expect("Connection should be there");
let expand = redis::Cmd::expire(&self.lock.key, 2000);
expand.execute(conn);
self.expanded = true;
}
}
impl<T> Deref for Guard<'_, T>
where
T: DeserializeOwned + Serialize + Display,
{
type Target = Generic<T>;
fn deref(&self) -> &Self::Target {
// Safety: The very existence of this Guard guarantees that we have exclusive access to the data.
&self.lock.data
}
}
impl<T> DerefMut for Guard<'_, T>
where
T: DeserializeOwned + Serialize + Display,
{
fn deref_mut(&mut self) -> &mut Self::Target {
// Safety: The very existence of this Guard guarantees that we have exclusive access to the data.
&mut self.lock.data
}
}
impl<T> Drop for Guard<'_, T> {
fn drop(&mut self) {
let conn = self.lock.conn.as_mut().expect("Connection should be there");
let script = redis::Script::new(DROP_SCRIPT);
let key = &self.lock.key;
let uuid = &self.lock.uuid;
script
.arg(key)
.arg(uuid.to_string())
.invoke::<()>(conn)
.expect("Failed to drop lock. You should not see this!");
}
}
#[cfg(test)]
mod tests {
use super::Mutex;
use crate::redis::Di32;
use std::thread;
#[test]
fn test_create_lock() {
let client = redis::Client::open("redis://localhost:6379").unwrap();
let i32 = Di32::new("test_add_locking", client.clone());
let i32_2 = Di32::new("test_add_locking", client.clone());
let mut lock: Mutex<i32> = Mutex::new(client.clone(), i32);
let mut lock2: Mutex<i32> = Mutex::new(client, i32_2);
thread::scope(|s| {
let t1 = s.spawn(move || {
let mut guard = lock2.lock().unwrap();
guard.store(2);
assert_eq!(*guard, 2);
});
{
let mut guard = lock.lock().unwrap();
guard.store(1);
assert_eq!(*guard, 1);
}
t1.join().expect("Failed to join thread1");
});
}
}