2019-04-30 08:27:42 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2022-07-28 10:27:38 +08:00
|
|
|
RSpec.describe DistributedMutex do
|
2022-12-15 05:11:46 +08:00
|
|
|
before { DistributedMutex.any_instance.stubs(:sleep) }
|
|
|
|
|
2019-02-20 09:23:42 +08:00
|
|
|
let(:key) { "test_mutex_key" }
|
|
|
|
|
2019-12-03 17:05:53 +08:00
|
|
|
after { Discourse.redis.del(key) }
|
2019-02-20 09:23:42 +08:00
|
|
|
|
2014-04-11 13:43:33 +08:00
|
|
|
it "allows only one mutex object to have the lock at a time" do
|
2019-08-01 16:49:03 +08:00
|
|
|
mutexes = (1..10).map { DistributedMutex.new(key, redis: DiscourseRedis.new) }
|
2014-04-14 08:51:46 +08:00
|
|
|
|
|
|
|
x = 0
|
|
|
|
mutexes
|
|
|
|
.map do |m|
|
|
|
|
Thread.new do
|
|
|
|
m.synchronize do
|
|
|
|
y = x
|
|
|
|
sleep 0.001
|
|
|
|
x = y + 1
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
2014-04-14 08:51:46 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
.map(&:join)
|
|
|
|
|
2015-01-10 00:34:37 +08:00
|
|
|
expect(x).to eq(10)
|
2014-04-14 08:51:46 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "handles auto cleanup correctly" do
|
2019-02-20 09:23:42 +08:00
|
|
|
m = DistributedMutex.new(key)
|
2014-04-11 13:43:33 +08:00
|
|
|
|
2019-12-03 17:05:53 +08:00
|
|
|
Discourse.redis.setnx key, Time.now.to_i - 1
|
2014-04-11 13:43:33 +08:00
|
|
|
|
2022-07-11 20:16:37 +08:00
|
|
|
start = Time.now
|
2014-04-14 08:51:46 +08:00
|
|
|
m.synchronize { "nop" }
|
2014-04-11 13:43:33 +08:00
|
|
|
|
2014-04-14 08:51:46 +08:00
|
|
|
# no longer than a second
|
2022-07-11 20:16:37 +08:00
|
|
|
expect(Time.now).to be <= start + 1
|
2014-04-11 13:43:33 +08:00
|
|
|
end
|
|
|
|
|
2022-07-11 20:16:37 +08:00
|
|
|
it "allows the validity of the lock to be configured" do
|
2019-02-20 09:28:10 +08:00
|
|
|
mutex = DistributedMutex.new(key, validity: 2)
|
2019-02-20 09:23:42 +08:00
|
|
|
|
2019-02-20 09:28:10 +08:00
|
|
|
mutex.synchronize do
|
2022-07-11 20:16:37 +08:00
|
|
|
expect(Discourse.redis.ttl(key)).to be <= 3
|
|
|
|
expect(Discourse.redis.get(key).to_i).to be_within(1.second).of(Time.now.to_i + 2)
|
2019-02-20 09:23:42 +08:00
|
|
|
end
|
|
|
|
|
2019-02-20 09:28:10 +08:00
|
|
|
mutex = DistributedMutex.new(key)
|
|
|
|
|
2019-02-20 09:23:42 +08:00
|
|
|
mutex.synchronize do
|
2022-07-11 20:16:37 +08:00
|
|
|
expect(Discourse.redis.ttl(key)).to be <= DistributedMutex::DEFAULT_VALIDITY + 1
|
|
|
|
expect(Discourse.redis.get(key).to_i).to be_within(1.second).of(
|
|
|
|
Time.now.to_i + DistributedMutex::DEFAULT_VALIDITY,
|
|
|
|
)
|
2019-02-20 09:23:42 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-04-14 08:51:46 +08:00
|
|
|
it "maintains mutex semantics" do
|
2019-02-20 09:23:42 +08:00
|
|
|
m = DistributedMutex.new(key)
|
2014-04-14 08:51:46 +08:00
|
|
|
|
2015-01-10 00:34:37 +08:00
|
|
|
expect { m.synchronize { m.synchronize {} } }.to raise_error(ThreadError)
|
2014-04-11 13:43:33 +08:00
|
|
|
end
|
2014-04-14 08:51:46 +08:00
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
describe "readonly redis" do
|
2022-07-11 20:16:37 +08:00
|
|
|
before { Discourse.redis.slaveof "127.0.0.1", "65534" }
|
2018-09-19 13:49:18 +08:00
|
|
|
|
2019-12-03 17:05:53 +08:00
|
|
|
after { Discourse.redis.slaveof "no", "one" }
|
2018-09-19 13:49:18 +08:00
|
|
|
|
|
|
|
it "works even if redis is in readonly" do
|
2019-02-20 09:23:42 +08:00
|
|
|
m = DistributedMutex.new(key)
|
2018-09-19 13:49:18 +08:00
|
|
|
start = Time.now
|
|
|
|
done = false
|
|
|
|
|
|
|
|
expect { m.synchronize { done = true } }.to raise_error(Discourse::ReadOnly)
|
|
|
|
|
|
|
|
expect(done).to eq(false)
|
2022-07-11 20:16:37 +08:00
|
|
|
expect(Time.now).to be <= start + 1
|
2018-09-19 13:49:18 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
describe "executions" do
|
2019-08-01 16:12:05 +08:00
|
|
|
it "should not allow critical sections to overlap" do
|
2019-08-05 19:16:44 +08:00
|
|
|
connections = 3.times.map { DiscourseRedis.new }
|
2019-08-01 16:12:05 +08:00
|
|
|
|
|
|
|
scenario =
|
|
|
|
Concurrency::Scenario.new do |execution|
|
|
|
|
locked = false
|
|
|
|
|
2019-12-03 17:05:53 +08:00
|
|
|
Discourse.redis.del("mutex_key")
|
2019-08-01 16:12:05 +08:00
|
|
|
|
|
|
|
connections.each { |connection| connection.unwatch }
|
|
|
|
|
|
|
|
3.times do |i|
|
|
|
|
execution.spawn do
|
|
|
|
begin
|
|
|
|
redis = Concurrency::RedisWrapper.new(connections[i], execution)
|
|
|
|
|
|
|
|
2.times do
|
|
|
|
DistributedMutex.synchronize("mutex_key", redis: redis) do
|
|
|
|
raise "already locked #{execution.path}" if locked
|
|
|
|
locked = true
|
|
|
|
|
|
|
|
execution.yield
|
|
|
|
|
|
|
|
raise "already unlocked #{execution.path}" unless locked
|
|
|
|
locked = false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
rescue Redis::ConnectionError
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
scenario.run(runs: 10)
|
|
|
|
end
|
|
|
|
end
|
2014-04-11 13:43:33 +08:00
|
|
|
end
|