130
158
# TODO: Make sure to pass the right file and directory mode bits to all
131
159
# files/dirs created.
133
_DEFAULT_TIMEOUT_SECONDS = 300
134
_DEFAULT_POLL_SECONDS = 0.5
136
class LockDir(object):
137
"""Write-lock guarding access to data."""
162
_DEFAULT_TIMEOUT_SECONDS = 30
163
_DEFAULT_POLL_SECONDS = 1.0
166
class LockDir(lock.Lock):
167
"""Write-lock guarding access to data.
139
170
__INFO_NAME = '/info'
141
def __init__(self, transport, path, file_modebits=0644, dir_modebits=0755):
172
def __init__(self, transport, path, file_modebits=0644, dir_modebits=0755,
173
extra_holder_info=None):
142
174
"""Create a new LockDir object.
144
176
The LockDir is initially unlocked - this just creates the object.
146
178
:param transport: Transport which will contain the lock
148
:param path: Path to the lock within the base directory of the
180
:param path: Path to the lock within the base directory of the
183
:param extra_holder_info: If passed, {str:str} dict of extra or
184
updated information to insert into the info file when the lock is
151
assert isinstance(transport, Transport), \
152
("not a transport: %r" % transport)
153
187
self.transport = transport
155
189
self._lock_held = False
190
self._locked_via_token = False
156
191
self._fake_read_lock = False
157
192
self._held_dir = path + '/held'
158
193
self._held_info_path = self._held_dir + self.__INFO_NAME
159
194
self._file_modebits = file_modebits
160
195
self._dir_modebits = dir_modebits
161
self.nonce = rand_chars(20)
196
self._report_function = note
197
self.extra_holder_info = extra_holder_info
198
self._warned_about_lock_holder = None
163
200
def __repr__(self):
164
201
return '%s(%s%s)' % (self.__class__.__name__,
170
207
def create(self, mode=None):
171
208
"""Create the on-disk lock.
173
This is typically only called when the object/directory containing the
210
This is typically only called when the object/directory containing the
174
211
directory is first created. The lock is not held when it's created.
176
if self.transport.is_readonly():
177
raise UnlockableTransport(self.transport)
178
self.transport.mkdir(self.path, mode=mode)
180
def attempt_lock(self):
181
"""Take the lock; fail if it's already held.
183
If you wish to block until the lock can be obtained, call wait_lock()
186
if self._fake_read_lock:
187
raise LockContention(self)
188
if self.transport.is_readonly():
189
raise UnlockableTransport(self.transport)
191
tmpname = '%s/pending.%s.tmp' % (self.path, rand_chars(20))
192
self.transport.mkdir(tmpname)
194
self._prepare_info(sio)
196
# append will create a new file; we use append rather than put
197
# because we don't want to write to a temporary file and rename
198
# into place, because that's going to happen to the whole
200
self.transport.append(tmpname + self.__INFO_NAME, sio)
201
self.transport.rename(tmpname, self._held_dir)
202
self._lock_held = True
204
except (PathError, DirectoryNotEmpty, FileExists, ResourceBusy), e:
205
mutter("contention on %r: %s", self, e)
206
raise LockContention(self)
213
self._trace("create lock directory")
215
self.transport.mkdir(self.path, mode=mode)
216
except (TransportError, PathError), e:
217
raise LockFailed(self, e)
219
def _attempt_lock(self):
220
"""Make the pending directory and attempt to rename into place.
222
If the rename succeeds, we read back the info file to check that we
225
If we fail to acquire the lock, this method is responsible for
226
cleaning up the pending directory if possible. (But it doesn't do
229
:returns: The nonce of the lock, if it was successfully acquired.
231
:raises LockContention: If the lock is held by someone else. The
232
exception contains the info of the current holder of the lock.
234
self._trace("lock_write...")
235
start_time = time.time()
237
tmpname = self._create_pending_dir()
238
except (errors.TransportError, PathError), e:
239
self._trace("... failed to create pending dir, %s", e)
240
raise LockFailed(self, e)
243
self.transport.rename(tmpname, self._held_dir)
245
except (errors.TransportError, PathError, DirectoryNotEmpty,
246
FileExists, ResourceBusy), e:
247
self._trace("... contention, %s", e)
248
other_holder = self.peek()
249
self._trace("other holder is %r" % other_holder)
251
self._handle_lock_contention(other_holder)
253
self._remove_pending_dir(tmpname)
256
self._trace("... lock failed, %s", e)
257
self._remove_pending_dir(tmpname)
259
# We must check we really got the lock, because Launchpad's sftp
260
# server at one time had a bug were the rename would successfully
261
# move the new directory into the existing directory, which was
262
# incorrect. It's possible some other servers or filesystems will
263
# have a similar bug allowing someone to think they got the lock
264
# when it's already held.
266
# See <https://bugs.launchpad.net/bzr/+bug/498378> for one case.
268
# Strictly the check is unnecessary and a waste of time for most
269
# people, but probably worth trapping if something is wrong.
271
self._trace("after locking, info=%r", info)
273
raise LockFailed(self, "lock was renamed into place, but "
275
if info.get('nonce') != self.nonce:
276
self._trace("rename succeeded, "
277
"but lock is still held by someone else")
278
raise LockContention(self)
279
self._lock_held = True
280
self._trace("... lock succeeded after %dms",
281
(time.time() - start_time) * 1000)
284
def _handle_lock_contention(self, other_holder):
285
"""A lock we want to take is held by someone else.
287
This function can: tell the user about it; possibly detect that it's
288
safe or appropriate to steal the lock, or just raise an exception.
290
If this function returns (without raising an exception) the lock will
293
:param other_holder: A LockHeldInfo for the current holder; note that
294
it might be None if the lock can be seen to be held but the info
297
if (other_holder is not None):
298
if other_holder.is_lock_holder_known_dead():
299
if self.get_config().get('locks.steal_dead'):
300
ui.ui_factory.show_user_warning(
302
lock_url=urlutils.join(self.transport.base, self.path),
303
other_holder_info=unicode(other_holder))
304
self.force_break(other_holder)
305
self._trace("stole lock from dead holder")
307
raise LockContention(self)
309
def _remove_pending_dir(self, tmpname):
310
"""Remove the pending directory
312
This is called if we failed to rename into place, so that the pending
313
dirs don't clutter up the lockdir.
315
self._trace("remove %s", tmpname)
317
self.transport.delete(tmpname + self.__INFO_NAME)
318
self.transport.rmdir(tmpname)
320
note(gettext("error removing pending lock: %s"), e)
322
def _create_pending_dir(self):
323
tmpname = '%s/%s.tmp' % (self.path, rand_chars(10))
325
self.transport.mkdir(tmpname)
327
# This may raise a FileExists exception
328
# which is okay, it will be caught later and determined
329
# to be a LockContention.
330
self._trace("lock directory does not exist, creating it")
331
self.create(mode=self._dir_modebits)
332
# After creating the lock directory, try again
333
self.transport.mkdir(tmpname)
334
info = LockHeldInfo.for_this_process(self.extra_holder_info)
335
self.nonce = info.get('nonce')
336
# We use put_file_non_atomic because we just created a new unique
337
# directory so we don't have to worry about files existing there.
338
# We'll rename the whole directory into place to get atomic
340
self.transport.put_bytes_non_atomic(tmpname + self.__INFO_NAME,
344
@only_raises(LockNotHeld, LockBroken)
208
345
def unlock(self):
209
346
"""Release a held lock
212
349
self._fake_read_lock = False
214
351
if not self._lock_held:
215
raise LockNotHeld(self)
216
# rename before deleting, because we can't atomically remove the whole
218
tmpname = '%s/releasing.%s.tmp' % (self.path, rand_chars(20))
219
# gotta own it to unlock
221
self.transport.rename(self._held_dir, tmpname)
222
self._lock_held = False
223
self.transport.delete(tmpname + self.__INFO_NAME)
224
self.transport.rmdir(tmpname)
352
return lock.cant_unlock_not_held(self)
353
if self._locked_via_token:
354
self._locked_via_token = False
355
self._lock_held = False
357
old_nonce = self.nonce
358
# rename before deleting, because we can't atomically remove the
360
start_time = time.time()
361
self._trace("unlocking")
362
tmpname = '%s/releasing.%s.tmp' % (self.path, rand_chars(20))
363
# gotta own it to unlock
365
self.transport.rename(self._held_dir, tmpname)
366
self._lock_held = False
367
self.transport.delete(tmpname + self.__INFO_NAME)
369
self.transport.rmdir(tmpname)
370
except DirectoryNotEmpty, e:
371
# There might have been junk left over by a rename that moved
372
# another locker within the 'held' directory. do a slower
373
# deletion where we list the directory and remove everything
376
# Maybe this should be broader to allow for ftp servers with
377
# non-specific error messages?
378
self._trace("doing recursive deletion of non-empty directory "
380
self.transport.delete_tree(tmpname)
381
self._trace("... unlock succeeded after %dms",
382
(time.time() - start_time) * 1000)
383
result = lock.LockResult(self.transport.abspath(self.path),
385
for hook in self.hooks['lock_released']:
226
388
def break_lock(self):
227
389
"""Break a lock not held by this instance of LockDir.
229
This is a UI centric function: it uses the bzrlib.ui.ui_factory to
391
This is a UI centric function: it uses the ui.ui_factory to
230
392
prompt for input if a lock is detected and there is any doubt about
231
it possibly being still active.
393
it possibly being still active. force_break is the non-interactive
396
:returns: LockResult for the broken lock.
233
398
self._check_not_locked()
234
holder_info = self.peek()
400
holder_info = self.peek()
401
except LockCorrupt, e:
402
# The lock info is corrupt.
403
if ui.ui_factory.get_boolean(u"Break (corrupt %r)" % (self,)):
404
self.force_break_corrupt(e.file_data)
235
406
if holder_info is not None:
236
if bzrlib.ui.ui_factory.get_boolean(
237
"Break lock %s held by %s@%s [process #%s]" % (
240
holder_info["hostname"],
241
holder_info["pid"])):
242
self.force_break(holder_info)
407
if ui.ui_factory.confirm_action(
408
u"Break %(lock_info)s",
409
'bzrlib.lockdir.break',
410
dict(lock_info=unicode(holder_info))):
411
result = self.force_break(holder_info)
412
ui.ui_factory.show_message(
413
"Broke lock %s" % result.lock_url)
244
415
def force_break(self, dead_holder_info):
245
416
"""Release a lock held by another process.
302
510
if info.get('nonce') != self.nonce:
303
511
# there is a lock, but not ours
304
512
raise LockBroken(self)
306
514
def _read_info_file(self, path):
307
515
"""Read one given info file.
309
517
peek() reads the info file of the lock holder, if any.
311
return self._parse_info(self.transport.get(path))
519
return LockHeldInfo.from_info_file_bytes(
520
self.transport.get_bytes(path))
314
523
"""Check if the lock is held by anyone.
316
If it is held, this returns the lock info structure as a rio Stanza,
525
If it is held, this returns the lock info structure as a dict
317
526
which contains some information about the current lock holder.
318
527
Otherwise returns None.
321
530
info = self._read_info_file(self._held_info_path)
322
assert isinstance(info, dict), \
323
"bad parse result %r" % info
531
self._trace("peek -> held")
325
533
except NoSuchFile, e:
534
self._trace("peek -> not held")
328
def _prepare_info(self, outf):
536
def _prepare_info(self):
329
537
"""Write information about a pending lock to a temporary file.
332
# XXX: is creating this here inefficient?
333
config = bzrlib.config.GlobalConfig()
334
s = Stanza(hostname=socket.gethostname(),
335
pid=str(os.getpid()),
336
start_time=str(int(time.time())),
338
user=config.user_email(),
340
RioWriter(outf).write_stanza(s)
342
def _parse_info(self, info_file):
343
return read_stanza(info_file.readlines()).as_dict()
345
def wait_lock(self, timeout=_DEFAULT_TIMEOUT_SECONDS,
346
poll=_DEFAULT_POLL_SECONDS):
540
def attempt_lock(self):
541
"""Take the lock; fail if it's already held.
543
If you wish to block until the lock can be obtained, call wait_lock()
546
:return: The lock token.
547
:raises LockContention: if the lock is held by someone else.
549
if self._fake_read_lock:
550
raise LockContention(self)
551
result = self._attempt_lock()
552
hook_result = lock.LockResult(self.transport.abspath(self.path),
554
for hook in self.hooks['lock_acquired']:
558
def lock_url_for_display(self):
559
"""Give a nicely-printable representation of the URL of this lock."""
560
# As local lock urls are correct we display them.
561
# We avoid displaying remote lock urls.
562
lock_url = self.transport.abspath(self.path)
563
if lock_url.startswith('file://'):
564
lock_url = lock_url.split('.bzr/')[0]
569
def wait_lock(self, timeout=None, poll=None, max_attempts=None):
347
570
"""Wait a certain period for a lock.
349
572
If the lock can be acquired within the bounded time, it
351
574
is raised. Either way, this function should return within
352
575
approximately `timeout` seconds. (It may be a bit more if
353
576
a transport operation takes a long time to complete.)
578
:param timeout: Approximate maximum amount of time to wait for the
581
:param poll: Delay in seconds between retrying the lock.
583
:param max_attempts: Maximum number of times to try to lock.
585
:return: The lock token.
355
# XXX: the transport interface doesn't let us guard
356
# against operations there taking a long time.
588
timeout = _DEFAULT_TIMEOUT_SECONDS
590
poll = _DEFAULT_POLL_SECONDS
591
# XXX: the transport interface doesn't let us guard against operations
592
# there taking a long time, so the total elapsed time or poll interval
593
# may be more than was requested.
357
594
deadline = time.time() + timeout
598
lock_url = self.lock_url_for_display()
602
return self.attempt_lock()
362
603
except LockContention:
604
# possibly report the blockage, then try again
606
# TODO: In a few cases, we find out that there's contention by
607
# reading the held info and observing that it's not ours. In
608
# those cases it's a bit redundant to read it again. However,
609
# the normal case (??) is that the rename fails and so we
610
# don't know who holds the lock. For simplicity we peek
612
new_info = self.peek()
613
if new_info is not None and new_info != last_info:
614
if last_info is None:
615
start = gettext('Unable to obtain')
617
start = gettext('Lock owner changed for')
619
msg = gettext('{0} lock {1} {2}.').format(start, lock_url,
621
if deadline_str is None:
622
deadline_str = time.strftime('%H:%M:%S',
623
time.localtime(deadline))
625
msg += '\n' + gettext(
626
'Will continue to try until %s, unless '
627
'you press Ctrl-C.') % deadline_str
628
msg += '\n' + gettext('See "bzr help break-lock" for more.')
629
self._report_function(msg)
630
if (max_attempts is not None) and (attempt_count >= max_attempts):
631
self._trace("exceeded %d attempts")
632
raise LockContention(self)
364
633
if time.time() + poll < deadline:
634
self._trace("waiting %ss", poll)
367
raise LockContention(self)
369
def lock_write(self):
370
"""Wait for and acquire the lock."""
637
# As timeout is always 0 for remote locks
638
# this block is applicable only for local
640
self._trace("timeout after waiting %ss", timeout)
641
raise LockContention('(local)', lock_url)
643
def leave_in_place(self):
644
self._locked_via_token = True
646
def dont_leave_in_place(self):
647
self._locked_via_token = False
649
def lock_write(self, token=None):
650
"""Wait for and acquire the lock.
652
:param token: if this is already locked, then lock_write will fail
653
unless the token matches the existing lock.
654
:returns: a token if this instance supports tokens, otherwise None.
655
:raises TokenLockingNotSupported: when a token is given but this
656
instance doesn't support using token locks.
657
:raises MismatchedToken: if the specified token doesn't match the token
658
of the existing lock.
660
A token should be passed in if you know that you have locked the object
661
some other way, and need to synchronise this object's state with that
664
XXX: docstring duplicated from LockableFiles.lock_write.
666
if token is not None:
667
self.validate_token(token)
669
self._lock_held = True
670
self._locked_via_token = True
673
return self.wait_lock()
373
675
def lock_read(self):
374
676
"""Compatibility-mode shared lock.
376
LockDir doesn't support shared read-only locks, so this
678
LockDir doesn't support shared read-only locks, so this
377
679
just pretends that the lock is taken but really does nothing.
379
# At the moment Branches are commonly locked for read, but
681
# At the moment Branches are commonly locked for read, but
380
682
# we can't rely on that remotely. Once this is cleaned up,
381
# reenable this warning to prevent it coming back in
683
# reenable this warning to prevent it coming back in
382
684
# -- mbp 20060303
383
685
## warn("LockDir.lock_read falls back to write lock")
384
686
if self._lock_held or self._fake_read_lock:
385
687
raise LockContention(self)
386
688
self._fake_read_lock = True
388
def wait(self, timeout=20, poll=0.5):
389
"""Wait a certain period for a lock to be released."""
390
# XXX: the transport interface doesn't let us guard
391
# against operations there taking a long time.
392
deadline = time.time() + timeout
396
if time.time() + poll < deadline:
399
raise LockContention(self)
690
def validate_token(self, token):
691
if token is not None:
697
lock_token = info.get('nonce')
698
if token != lock_token:
699
raise errors.TokenMismatch(token, lock_token)
701
self._trace("revalidated by token %r", token)
703
def _trace(self, format, *args):
704
if 'lock' not in debug.debug_flags:
706
mutter(str(self) + ": " + (format % args))
708
def get_config(self):
709
"""Get the configuration that governs this lockdir."""
710
# XXX: This really should also use the locationconfig at least, but
711
# that seems a bit hard to hook up at the moment. -- mbp 20110329
712
# FIXME: The above is still true ;) -- vila 20110811
713
return config.GlobalStack()
716
class LockHeldInfo(object):
717
"""The information recorded about a held lock.
719
This information is recorded into the lock when it's taken, and it can be
720
read back by any process with access to the lockdir. It can be used, for
721
example, to tell the user who holds the lock, or to try to detect whether
722
the lock holder is still alive.
724
Prior to bzr 2.4 a simple dict was used instead of an object.
727
def __init__(self, info_dict):
728
self.info_dict = info_dict
731
"""Return a debugging representation of this object."""
732
return "%s(%r)" % (self.__class__.__name__, self.info_dict)
734
def __unicode__(self):
735
"""Return a user-oriented description of this object."""
736
d = self.to_readable_dict()
738
u'held by %(user)s on %(hostname)s (process #%(pid)s), '
739
u'acquired %(time_ago)s') % d)
741
def to_readable_dict(self):
742
"""Turn the holder info into a dict of human-readable attributes.
744
For example, the start time is presented relative to the current time,
745
rather than as seconds since the epoch.
747
Returns a list of [user, hostname, pid, time_ago] all as readable
750
start_time = self.info_dict.get('start_time')
751
if start_time is None:
752
time_ago = '(unknown)'
754
time_ago = format_delta(
755
time.time() - int(self.info_dict['start_time']))
756
user = self.info_dict.get('user', '<unknown>')
757
hostname = self.info_dict.get('hostname', '<unknown>')
758
pid = self.info_dict.get('pid', '<unknown>')
765
def get(self, field_name):
766
"""Return the contents of a field from the lock info, or None."""
767
return self.info_dict.get(field_name)
770
def for_this_process(cls, extra_holder_info):
771
"""Return a new LockHeldInfo for a lock taken by this process.
774
hostname=get_host_name(),
775
pid=str(os.getpid()),
776
nonce=rand_chars(20),
777
start_time=str(int(time.time())),
778
user=get_username_for_lock_info(),
780
if extra_holder_info is not None:
781
info.update(extra_holder_info)
785
s = rio.Stanza(**self.info_dict)
789
def from_info_file_bytes(cls, info_file_bytes):
790
"""Construct from the contents of the held file."""
791
lines = osutils.split_lines(info_file_bytes)
793
stanza = rio.read_stanza(lines)
794
except ValueError, e:
795
mutter('Corrupt lock info file: %r', lines)
796
raise LockCorrupt("could not parse lock info file: " + str(e),
799
# see bug 185013; we fairly often end up with the info file being
800
# empty after an interruption; we could log a message here but
801
# there may not be much we can say
804
return cls(stanza.as_dict())
806
def __cmp__(self, other):
807
"""Value comparison of lock holders."""
809
cmp(type(self), type(other))
810
or cmp(self.info_dict, other.info_dict))
812
def is_locked_by_this_process(self):
813
"""True if this process seems to be the current lock holder."""
815
self.get('hostname') == get_host_name()
816
and self.get('pid') == str(os.getpid())
817
and self.get('user') == get_username_for_lock_info())
819
def is_lock_holder_known_dead(self):
820
"""True if the lock holder process is known to be dead.
822
False if it's either known to be still alive, or if we just can't tell.
824
We can be fairly sure the lock holder is dead if it declared the same
825
hostname and there is no process with the given pid alive. If people
826
have multiple machines with the same hostname this may cause trouble.
828
This doesn't check whether the lock holder is in fact the same process
829
calling this method. (In that case it will return true.)
831
if self.get('hostname') != get_host_name():
833
if self.get('hostname') == 'localhost':
836
if self.get('user') != get_username_for_lock_info():
837
# Could well be another local process by a different user, but
838
# just to be safe we won't conclude about this either.
840
pid_str = self.info_dict.get('pid', None)
842
mutter("no pid recorded in %r" % (self, ))
847
mutter("can't parse pid %r from %r"
850
return osutils.is_local_pid_dead(pid)
853
def get_username_for_lock_info():
854
"""Get a username suitable for putting into a lock.
856
It's ok if what's written here is not a proper email address as long
857
as it gives some clue who the user is.
860
return config.GlobalConfig().username()
861
except errors.NoWhoami:
862
return osutils.getuser_unicode()