88
88
>>> t = MemoryTransport()
89
89
>>> l = LockDir(t, 'sample-lock')
91
>>> token = l.wait_lock()
92
92
>>> # do something here
98
# TODO: We sometimes have the problem that our attempt to rename '1234' to
99
# 'held' fails because the transport server moves into an existing directory,
100
# rather than failing the rename. If we made the info file name the same as
101
# the locked directory name we would avoid this problem because moving into
102
# the held directory would implicitly clash. However this would not mesh with
103
# the existing locking code and needs a new format of the containing object.
104
# -- robertc, mbp 20070628
99
from cStringIO import StringIO
109
101
from bzrlib import (
115
104
import bzrlib.config
116
from bzrlib.decorators import only_raises
117
105
from bzrlib.errors import (
118
106
DirectoryNotEmpty,
120
108
LockBreakMismatch,
130
117
from bzrlib.trace import mutter, note
131
from bzrlib.osutils import format_delta, rand_chars, get_host_name
118
from bzrlib.transport import Transport
119
from bzrlib.osutils import rand_chars, format_delta
120
from bzrlib.rio import read_stanza, Stanza
134
from bzrlib.lazy_import import lazy_import
135
lazy_import(globals(), """
136
from bzrlib import rio
139
124
# XXX: At the moment there is no consideration of thread safety on LockDir
140
125
# objects. This should perhaps be updated - e.g. if two threads try to take a
193
179
def create(self, mode=None):
194
180
"""Create the on-disk lock.
196
This is typically only called when the object/directory containing the
182
This is typically only called when the object/directory containing the
197
183
directory is first created. The lock is not held when it's created.
199
self._trace("create lock directory")
201
self.transport.mkdir(self.path, mode=mode)
202
except (TransportError, PathError), e:
203
raise LockFailed(self, e)
206
def _attempt_lock(self):
207
"""Make the pending directory and attempt to rename into place.
209
If the rename succeeds, we read back the info file to check that we
212
If we fail to acquire the lock, this method is responsible for
213
cleaning up the pending directory if possible. (But it doesn't do
216
:returns: The nonce of the lock, if it was successfully acquired.
218
:raises LockContention: If the lock is held by someone else. The exception
219
contains the info of the current holder of the lock.
185
if self.transport.is_readonly():
186
raise UnlockableTransport(self.transport)
187
self.transport.mkdir(self.path, mode=mode)
189
def attempt_lock(self):
190
"""Take the lock; fail if it's already held.
192
If you wish to block until the lock can be obtained, call wait_lock()
221
self._trace("lock_write...")
222
start_time = time.time()
224
tmpname = self._create_pending_dir()
225
except (errors.TransportError, PathError), e:
226
self._trace("... failed to create pending dir, %s", e)
227
raise LockFailed(self, e)
195
if self._fake_read_lock:
196
raise LockContention(self)
197
if self.transport.is_readonly():
198
raise UnlockableTransport(self.transport)
200
tmpname = '%s/pending.%s.tmp' % (self.path, rand_chars(20))
202
self.transport.mkdir(tmpname)
204
# This may raise a FileExists exception
205
# which is okay, it will be caught later and determined
206
# to be a LockContention.
207
self.create(mode=self._dir_modebits)
209
# After creating the lock directory, try again
210
self.transport.mkdir(tmpname)
212
info_bytes = self._prepare_info()
213
# We use put_file_non_atomic because we just created a new unique
214
# directory so we don't have to worry about files existing there.
215
# We'll rename the whole directory into place to get atomic
217
self.transport.put_bytes_non_atomic(tmpname + self.__INFO_NAME,
229
220
self.transport.rename(tmpname, self._held_dir)
230
except (errors.TransportError, PathError, DirectoryNotEmpty,
231
FileExists, ResourceBusy), e:
232
self._trace("... contention, %s", e)
233
self._remove_pending_dir(tmpname)
234
raise LockContention(self)
236
self._trace("... lock failed, %s", e)
237
self._remove_pending_dir(tmpname)
239
# We must check we really got the lock, because Launchpad's sftp
240
# server at one time had a bug were the rename would successfully
241
# move the new directory into the existing directory, which was
242
# incorrect. It's possible some other servers or filesystems will
243
# have a similar bug allowing someone to think they got the lock
244
# when it's already held.
246
# See <https://bugs.edge.launchpad.net/bzr/+bug/498378> for one case.
248
# Strictly the check is unnecessary and a waste of time for most
249
# people, but probably worth trapping if something is wrong.
251
self._trace("after locking, info=%r", info)
253
raise LockFailed(self, "lock was renamed into place, but "
255
if info.get('nonce') != self.nonce:
256
self._trace("rename succeeded, "
257
"but lock is still held by someone else")
258
raise LockContention(self)
259
self._lock_held = True
260
self._trace("... lock succeeded after %dms",
261
(time.time() - start_time) * 1000)
264
def _remove_pending_dir(self, tmpname):
265
"""Remove the pending directory
267
This is called if we failed to rename into place, so that the pending
268
dirs don't clutter up the lockdir.
270
self._trace("remove %s", tmpname)
272
self.transport.delete(tmpname + self.__INFO_NAME)
273
self.transport.rmdir(tmpname)
275
note("error removing pending lock: %s", e)
277
def _create_pending_dir(self):
278
tmpname = '%s/%s.tmp' % (self.path, rand_chars(10))
280
self.transport.mkdir(tmpname)
282
# This may raise a FileExists exception
283
# which is okay, it will be caught later and determined
284
# to be a LockContention.
285
self._trace("lock directory does not exist, creating it")
286
self.create(mode=self._dir_modebits)
287
# After creating the lock directory, try again
288
self.transport.mkdir(tmpname)
289
self.nonce = rand_chars(20)
290
info_bytes = self._prepare_info()
291
# We use put_file_non_atomic because we just created a new unique
292
# directory so we don't have to worry about files existing there.
293
# We'll rename the whole directory into place to get atomic
295
self.transport.put_bytes_non_atomic(tmpname + self.__INFO_NAME,
299
@only_raises(LockNotHeld, LockBroken)
221
self._lock_held = True
223
except (PathError, DirectoryNotEmpty, FileExists, ResourceBusy), e:
224
mutter("contention on %r: %s", self, e)
225
raise LockContention(self)
300
227
def unlock(self):
301
228
"""Release a held lock
304
231
self._fake_read_lock = False
306
233
if not self._lock_held:
307
return lock.cant_unlock_not_held(self)
308
if self._locked_via_token:
309
self._locked_via_token = False
310
self._lock_held = False
312
old_nonce = self.nonce
313
# rename before deleting, because we can't atomically remove the
315
start_time = time.time()
316
self._trace("unlocking")
317
tmpname = '%s/releasing.%s.tmp' % (self.path, rand_chars(20))
318
# gotta own it to unlock
320
self.transport.rename(self._held_dir, tmpname)
321
self._lock_held = False
322
self.transport.delete(tmpname + self.__INFO_NAME)
324
self.transport.rmdir(tmpname)
325
except DirectoryNotEmpty, e:
326
# There might have been junk left over by a rename that moved
327
# another locker within the 'held' directory. do a slower
328
# deletion where we list the directory and remove everything
331
# Maybe this should be broader to allow for ftp servers with
332
# non-specific error messages?
333
self._trace("doing recursive deletion of non-empty directory "
335
self.transport.delete_tree(tmpname)
336
self._trace("... unlock succeeded after %dms",
337
(time.time() - start_time) * 1000)
338
result = lock.LockResult(self.transport.abspath(self.path),
340
for hook in self.hooks['lock_released']:
234
raise LockNotHeld(self)
235
# rename before deleting, because we can't atomically remove the whole
237
tmpname = '%s/releasing.%s.tmp' % (self.path, rand_chars(20))
238
# gotta own it to unlock
240
self.transport.rename(self._held_dir, tmpname)
241
self._lock_held = False
242
self.transport.delete(tmpname + self.__INFO_NAME)
243
self.transport.rmdir(tmpname)
343
245
def break_lock(self):
344
246
"""Break a lock not held by this instance of LockDir.
419
317
if info.get('nonce') != self.nonce:
420
318
# there is a lock, but not ours
421
319
raise LockBroken(self)
423
321
def _read_info_file(self, path):
424
322
"""Read one given info file.
426
324
peek() reads the info file of the lock holder, if any.
428
return self._parse_info(self.transport.get_bytes(path))
326
return self._parse_info(self.transport.get(path))
431
329
"""Check if the lock is held by anyone.
433
If it is held, this returns the lock info structure as a dict
331
If it is held, this returns the lock info structure as a rio Stanza,
434
332
which contains some information about the current lock holder.
435
333
Otherwise returns None.
438
336
info = self._read_info_file(self._held_info_path)
439
self._trace("peek -> held")
337
assert isinstance(info, dict), \
338
"bad parse result %r" % info
441
340
except NoSuchFile, e:
442
self._trace("peek -> not held")
444
343
def _prepare_info(self):
445
344
"""Write information about a pending lock to a temporary file.
447
347
# XXX: is creating this here inefficient?
448
348
config = bzrlib.config.GlobalConfig()
450
350
user = config.user_email()
451
351
except errors.NoEmailInUsername:
452
352
user = config.username()
453
s = rio.Stanza(hostname=get_host_name(),
353
s = Stanza(hostname=socket.gethostname(),
454
354
pid=str(os.getpid()),
455
355
start_time=str(int(time.time())),
456
356
nonce=self.nonce,
459
359
return s.to_string()
461
def _parse_info(self, info_bytes):
462
stanza = rio.read_stanza(osutils.split_lines(info_bytes))
464
# see bug 185013; we fairly often end up with the info file being
465
# empty after an interruption; we could log a message here but
466
# there may not be much we can say
469
return stanza.as_dict()
471
def attempt_lock(self):
472
"""Take the lock; fail if it's already held.
474
If you wish to block until the lock can be obtained, call wait_lock()
477
:return: The lock token.
478
:raises LockContention: if the lock is held by someone else.
480
if self._fake_read_lock:
481
raise LockContention(self)
482
result = self._attempt_lock()
483
hook_result = lock.LockResult(self.transport.abspath(self.path),
485
for hook in self.hooks['lock_acquired']:
489
def wait_lock(self, timeout=None, poll=None, max_attempts=None):
361
def _parse_info(self, info_file):
362
return read_stanza(info_file.readlines()).as_dict()
364
def wait_lock(self, timeout=None, poll=None):
490
365
"""Wait a certain period for a lock.
492
367
If the lock can be acquired within the bounded time, it
494
369
is raised. Either way, this function should return within
495
370
approximately `timeout` seconds. (It may be a bit more if
496
371
a transport operation takes a long time to complete.)
498
:param timeout: Approximate maximum amount of time to wait for the
501
:param poll: Delay in seconds between retrying the lock.
503
:param max_attempts: Maximum number of times to try to lock.
505
:return: The lock token.
507
373
if timeout is None:
508
374
timeout = _DEFAULT_TIMEOUT_SECONDS
510
376
poll = _DEFAULT_POLL_SECONDS
511
# XXX: the transport interface doesn't let us guard against operations
512
# there taking a long time, so the total elapsed time or poll interval
513
# may be more than was requested.
378
# XXX: the transport interface doesn't let us guard
379
# against operations there taking a long time.
514
380
deadline = time.time() + timeout
515
381
deadline_str = None
521
return self.attempt_lock()
522
387
except LockContention:
523
# possibly report the blockage, then try again
525
# TODO: In a few cases, we find out that there's contention by
526
# reading the held info and observing that it's not ours. In
527
# those cases it's a bit redundant to read it again. However,
528
# the normal case (??) is that the rename fails and so we
529
# don't know who holds the lock. For simplicity we peek
531
389
new_info = self.peek()
390
mutter('last_info: %s, new info: %s', last_info, new_info)
532
391
if new_info is not None and new_info != last_info:
533
392
if last_info is None:
534
393
start = 'Unable to obtain'
539
398
if deadline_str is None:
540
399
deadline_str = time.strftime('%H:%M:%S',
541
400
time.localtime(deadline))
542
lock_url = self.transport.abspath(self.path)
543
# See <https://bugs.edge.launchpad.net/bzr/+bug/250451>
544
# the URL here is sometimes not one that is useful to the
545
# user, perhaps being wrapped in a lp-%d or chroot decorator,
546
# especially if this error is issued from the server.
547
401
self._report_function('%s %s\n'
549
'%s\n' # locked ... ago
550
'Will continue to try until %s, unless '
551
'you press Ctrl-C.\n'
552
'See "bzr help break-lock" for more.',
403
'%s\n' # locked ... ago
404
'Will continue to try until %s\n',
560
if (max_attempts is not None) and (attempt_count >= max_attempts):
561
self._trace("exceeded %d attempts")
562
raise LockContention(self)
563
411
if time.time() + poll < deadline:
564
self._trace("waiting %ss", poll)
567
self._trace("timeout after waiting %ss", timeout)
568
414
raise LockContention(self)
570
def leave_in_place(self):
571
self._locked_via_token = True
573
def dont_leave_in_place(self):
574
self._locked_via_token = False
576
def lock_write(self, token=None):
577
"""Wait for and acquire the lock.
579
:param token: if this is already locked, then lock_write will fail
580
unless the token matches the existing lock.
581
:returns: a token if this instance supports tokens, otherwise None.
582
:raises TokenLockingNotSupported: when a token is given but this
583
instance doesn't support using token locks.
584
:raises MismatchedToken: if the specified token doesn't match the token
585
of the existing lock.
587
A token should be passed in if you know that you have locked the object
588
some other way, and need to synchronise this object's state with that
591
XXX: docstring duplicated from LockableFiles.lock_write.
593
if token is not None:
594
self.validate_token(token)
596
self._lock_held = True
597
self._locked_via_token = True
600
return self.wait_lock()
416
def lock_write(self):
417
"""Wait for and acquire the lock."""
602
420
def lock_read(self):
603
421
"""Compatibility-mode shared lock.
605
LockDir doesn't support shared read-only locks, so this
423
LockDir doesn't support shared read-only locks, so this
606
424
just pretends that the lock is taken but really does nothing.
608
# At the moment Branches are commonly locked for read, but
426
# At the moment Branches are commonly locked for read, but
609
427
# we can't rely on that remotely. Once this is cleaned up,
610
# reenable this warning to prevent it coming back in
428
# reenable this warning to prevent it coming back in
611
429
# -- mbp 20060303
612
430
## warn("LockDir.lock_read falls back to write lock")
613
431
if self._lock_held or self._fake_read_lock:
614
432
raise LockContention(self)
615
433
self._fake_read_lock = True
435
def wait(self, timeout=20, poll=0.5):
436
"""Wait a certain period for a lock to be released."""
437
# XXX: the transport interface doesn't let us guard
438
# against operations there taking a long time.
439
deadline = time.time() + timeout
443
if time.time() + poll < deadline:
446
raise LockContention(self)
617
448
def _format_lock_info(self, info):
618
449
"""Turn the contents of peek() into something for the user"""
619
450
lock_url = self.transport.abspath(self.path)
620
start_time = info.get('start_time')
621
if start_time is None:
622
time_ago = '(unknown)'
624
time_ago = format_delta(time.time() - int(info['start_time']))
451
delta = time.time() - int(info['start_time'])
626
453
'lock %s' % (lock_url,),
627
'held by %s on host %s [process #%s]' %
628
tuple([info.get(x, '<unknown>') for x in ['user', 'hostname', 'pid']]),
629
'locked %s' % (time_ago,),
454
'held by %(user)s on host %(hostname)s [process #%(pid)s]' % info,
455
'locked %s' % (format_delta(delta),),
632
def validate_token(self, token):
633
if token is not None:
639
lock_token = info.get('nonce')
640
if token != lock_token:
641
raise errors.TokenMismatch(token, lock_token)
643
self._trace("revalidated by token %r", token)
645
def _trace(self, format, *args):
646
if 'lock' not in debug.debug_flags:
648
mutter(str(self) + ": " + (format % args))