-
-
Notifications
You must be signed in to change notification settings - Fork 9.7k
[Semaphore] Add a semaphore store based on locks #59202
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: 7.4
Are you sure you want to change the base?
[Semaphore] Add a semaphore store based on locks #59202
Conversation
6921d4f
to
38cb65b
Compare
1fef9d7
to
84e0607
Compare
…aseLocks correctly on failing semphore acquired
@jderusse if you have some free time maybe you can have a relook at the changes we did since your last review as you are I think most familiar with semaphore component. |
@jderusse what I'm stuck of how we can make the framework bundle integration for this. |
@@ -24,7 +24,8 @@ | |||
"psr/log": "^1|^2|^3" | |||
}, | |||
"require-dev": { | |||
"predis/predis": "^1.1|^2.0" | |||
"predis/predis": "^1.1|^2.0", | |||
"symfony/lock": "^5.4 || ^6.0 || ^7.0" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
do we really want to allow those old versions here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can change to everything the core team wants. Currently it works on this versions and I started with the 5.4 as its still supported LTS until 2029.
I really like this proposal! Is @jderusse's feedback to #59202 (comment) the only blocker? |
Yes would be nice to get some feedback from @jderusse specially not sure how we can create the
And the new framework:
lock: '%env(LOCK_DSN)%'
semaphore: 'lock://' but doesn't work aslong as the factories are static methods. |
private function createLocks(Key $key, float $ttlInSecond): array | ||
{ | ||
$locks = []; | ||
$lockName = base64_encode($key->__toString()); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why encoding the key?
for ($i = 0; $i < $limit; ++$i) { | ||
$index = ($startPoint + $i) % $limit; | ||
|
||
$lock = $this->lockFactory->createLock($lockName.'_'.$index, $ttlInSecond, false); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if you disable the auto-release
feature, you should wrap this function in a try/catch to release locks in case of an exception (ie. network error)
private function releaseLocks(array $locks, Key $key): void | ||
{ | ||
foreach ($locks as $lock) { | ||
$lock->release(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
wrap in a try/catch in case one release fails?
|
||
$locks = $this->createLocks($key, $ttlInSecond); | ||
|
||
$key->setState(__CLASS__, $locks); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we might need to implement the markUnserializable
(like we do for LOck) to prevent people from serializing such key.
{ | ||
$locks = $this->getExistingLocks($key); | ||
|
||
if (\count($locks) === $key->getWeight()) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should we use ===
or >=
? I know the createLock method stops when the counters match, and this code is enough.
But what if by "chance" we acquire MORE lock than necessary? ie. for whatever reason, the value in getWeight
is dynamic.
IMHO, it doesn't hurt readability to use if (\count($locks) >= $key->getWeight())
(here and bellow,) but it makes the code stronger.
if ($lock->isExpired()) { | ||
$this->releaseLocks($locks, $key); | ||
|
||
throw new SemaphoreExpiredException($key, 'One or multiple locks are already expired.'); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The lock component doesn't throw in such situations, it just try to re-acquire the lock. 🤷
I really liked the idea of a semaphore component but not have the possibility to use it without Redis it did not get a lot a drive and usage in our projects and we workaround using Locks.
So this idea did come up to have a Semaphore store which can use the existing lock component for it.
@lyrixx @jderusse