2019-04-30 08:27:42 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-10-11 17:41:23 +08:00
|
|
|
require 'rails_helper'
|
2014-04-11 13:43:33 +08:00
|
|
|
require_dependency 'distributed_mutex'
|
|
|
|
|
|
|
|
describe DistributedMutex do
|
2019-02-20 09:23:42 +08:00
|
|
|
let(:key) { "test_mutex_key" }
|
|
|
|
|
|
|
|
after do
|
|
|
|
$redis.del(key)
|
|
|
|
end
|
|
|
|
|
2014-04-11 13:43:33 +08:00
|
|
|
it "allows only one mutex object to have the lock at a time" do
|
2014-04-14 08:51:46 +08:00
|
|
|
mutexes = (1..10).map do
|
2019-02-20 09:23:42 +08:00
|
|
|
DistributedMutex.new(key)
|
2014-04-14 08:51:46 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
x = 0
|
|
|
|
mutexes.map do |m|
|
|
|
|
Thread.new do
|
|
|
|
m.synchronize do
|
|
|
|
y = x
|
|
|
|
sleep 0.001
|
|
|
|
x = y + 1
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end.map(&:join)
|
|
|
|
|
2015-01-10 00:34:37 +08:00
|
|
|
expect(x).to eq(10)
|
2014-04-14 08:51:46 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "handles auto cleanup correctly" do
|
2019-02-20 09:23:42 +08:00
|
|
|
m = DistributedMutex.new(key)
|
2014-04-11 13:43:33 +08:00
|
|
|
|
2019-02-20 09:23:42 +08:00
|
|
|
$redis.setnx key, Time.now.to_i - 1
|
2014-04-11 13:43:33 +08:00
|
|
|
|
2014-04-14 08:51:46 +08:00
|
|
|
start = Time.now.to_i
|
|
|
|
m.synchronize do
|
|
|
|
"nop"
|
2014-04-11 13:43:33 +08:00
|
|
|
end
|
|
|
|
|
2014-04-14 08:51:46 +08:00
|
|
|
# no longer than a second
|
2015-01-10 00:34:37 +08:00
|
|
|
expect(Time.now.to_i).to be <= start + 1
|
2014-04-11 13:43:33 +08:00
|
|
|
end
|
|
|
|
|
2019-02-20 09:23:42 +08:00
|
|
|
it 'allows the validity of the lock to be configured' do
|
|
|
|
freeze_time
|
|
|
|
|
2019-02-20 09:28:10 +08:00
|
|
|
mutex = DistributedMutex.new(key, validity: 2)
|
2019-02-20 09:23:42 +08:00
|
|
|
|
2019-02-20 09:28:10 +08:00
|
|
|
mutex.synchronize do
|
2019-02-20 09:23:42 +08:00
|
|
|
expect($redis.ttl(key)).to eq(2)
|
|
|
|
expect($redis.get(key).to_i).to eq(Time.now.to_i + 2)
|
|
|
|
end
|
|
|
|
|
2019-02-20 09:28:10 +08:00
|
|
|
mutex = DistributedMutex.new(key)
|
|
|
|
|
2019-02-20 09:23:42 +08:00
|
|
|
mutex.synchronize do
|
|
|
|
expect($redis.ttl(key)).to eq(DistributedMutex::DEFAULT_VALIDITY)
|
|
|
|
|
|
|
|
expect($redis.get(key).to_i)
|
|
|
|
.to eq(Time.now.to_i + DistributedMutex::DEFAULT_VALIDITY)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-04-14 08:51:46 +08:00
|
|
|
it "maintains mutex semantics" do
|
2019-02-20 09:23:42 +08:00
|
|
|
m = DistributedMutex.new(key)
|
2014-04-14 08:51:46 +08:00
|
|
|
|
2015-01-10 00:34:37 +08:00
|
|
|
expect {
|
2014-04-14 08:51:46 +08:00
|
|
|
m.synchronize do
|
2017-07-28 09:20:09 +08:00
|
|
|
m.synchronize {}
|
2014-04-11 13:43:33 +08:00
|
|
|
end
|
2015-01-10 00:34:37 +08:00
|
|
|
}.to raise_error(ThreadError)
|
2014-04-11 13:43:33 +08:00
|
|
|
end
|
2014-04-14 08:51:46 +08:00
|
|
|
|
2018-09-19 13:49:18 +08:00
|
|
|
context "readonly redis" do
|
|
|
|
before do
|
|
|
|
$redis.slaveof "127.0.0.1", "99991"
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
$redis.slaveof "no", "one"
|
|
|
|
end
|
|
|
|
|
|
|
|
it "works even if redis is in readonly" do
|
2019-02-20 09:23:42 +08:00
|
|
|
m = DistributedMutex.new(key)
|
2018-09-19 13:49:18 +08:00
|
|
|
start = Time.now
|
|
|
|
done = false
|
|
|
|
|
|
|
|
expect {
|
|
|
|
m.synchronize do
|
|
|
|
done = true
|
|
|
|
end
|
|
|
|
}.to raise_error(Discourse::ReadOnly)
|
|
|
|
|
|
|
|
expect(done).to eq(false)
|
|
|
|
expect(Time.now - start).to be < (1.second)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-04-11 13:43:33 +08:00
|
|
|
end
|