##// END OF EJS Templates
packages: synced with CE/Tools
packages: synced with CE/Tools

File last commit:

r1016:7e19e5bc default
r1034:07d248e8 default
Show More
backends.py
329 lines | 9.4 KiB | text/x-python | PythonLexer
caches: replaced beaker with dogpile cache.
r483 # RhodeCode VCSServer provides access to different vcs backends via network.
code: update copyrights to 2020
r850 # Copyright (C) 2014-2020 RhodeCode GmbH
caches: replaced beaker with dogpile cache.
r483 #
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software Foundation,
# Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
caches: added redis backend as an option
r733 import time
import errno
caches: replaced beaker with dogpile cache.
r483 import logging
caches: don't use key_manglers instead prefix keys based on backend.
r734 import msgpack
caches: added redis pool for redis cache backend
r781 import redis
caches: don't use key_manglers instead prefix keys based on backend.
r734 from dogpile.cache.api import CachedValue
caches: replaced beaker with dogpile cache.
r483 from dogpile.cache.backends import memory as memory_backend
caches: added redis backend as an option
r733 from dogpile.cache.backends import file as file_backend
from dogpile.cache.backends import redis as redis_backend
from dogpile.cache.backends.file import NO_VALUE, compat, FileLock
from dogpile.cache.util import memoized_property
caches: optimized defaults for safer more reliable behaviour
r951 from pyramid.settings import asbool
caches: use repo.lru based Dict cache. This LRUDict uses Timing Algo to not have to use locking...
r497 from vcsserver.lib.memory_lru_dict import LRUDict, LRUDictDebug
caches: fixed unicode error on non-ascii cache key
r1015 from vcsserver.utils import safe_str, safe_unicode
caches: replaced beaker with dogpile cache.
r483
_default_max_size = 1024
log = logging.getLogger(__name__)
class LRUMemoryBackend(memory_backend.MemoryBackend):
caches: don't use key_manglers instead prefix keys based on backend.
r734 key_prefix = 'lru_mem_backend'
caches: replaced beaker with dogpile cache.
r483 pickle_values = False
def __init__(self, arguments):
max_size = arguments.pop('max_size', _default_max_size)
caches: use repo.lru based Dict cache. This LRUDict uses Timing Algo to not have to use locking...
r497 LRUDictClass = LRUDict
if arguments.pop('log_key_count', None):
LRUDictClass = LRUDictDebug
arguments['cache_dict'] = LRUDictClass(max_size)
caches: replaced beaker with dogpile cache.
r483 super(LRUMemoryBackend, self).__init__(arguments)
def delete(self, key):
caches: use repo.lru based Dict cache. This LRUDict uses Timing Algo to not have to use locking...
r497 try:
caches: replaced beaker with dogpile cache.
r483 del self._cache[key]
caches: use repo.lru based Dict cache. This LRUDict uses Timing Algo to not have to use locking...
r497 except KeyError:
# we don't care if key isn't there at deletion
pass
caches: replaced beaker with dogpile cache.
r483
def delete_multi(self, keys):
for key in keys:
caches: use repo.lru based Dict cache. This LRUDict uses Timing Algo to not have to use locking...
r497 self.delete(key)
caches: added redis backend as an option
r733
caches: don't use key_manglers instead prefix keys based on backend.
r734 class PickleSerializer(object):
caches: added redis backend as an option
r733 def _dumps(self, value, safe=False):
try:
return compat.pickle.dumps(value)
except Exception:
if safe:
return NO_VALUE
else:
raise
def _loads(self, value, safe=True):
try:
return compat.pickle.loads(value)
except Exception:
if safe:
return NO_VALUE
else:
raise
caches: don't use key_manglers instead prefix keys based on backend.
r734 class MsgPackSerializer(object):
def _dumps(self, value, safe=False):
try:
return msgpack.packb(value)
except Exception:
if safe:
return NO_VALUE
else:
raise
def _loads(self, value, safe=True):
"""
pickle maintained the `CachedValue` wrapper of the tuple
msgpack does not, so it must be added back in.
"""
try:
value = msgpack.unpackb(value, use_list=False)
return CachedValue(*value)
except Exception:
if safe:
return NO_VALUE
else:
raise
caches: added redis backend as an option
r733 import fcntl
flock_org = fcntl.flock
class CustomLockFactory(FileLock):
pass
caches: don't use key_manglers instead prefix keys based on backend.
r734 class FileNamespaceBackend(PickleSerializer, file_backend.DBMBackend):
key_prefix = 'file_backend'
caches: added redis backend as an option
r733
def __init__(self, arguments):
arguments['lock_factory'] = CustomLockFactory
caches: improved locking problems with distributed lock new cache backend
r946 db_file = arguments.get('filename')
log.debug('initialing %s DB in %s', self.__class__.__name__, db_file)
try:
super(FileNamespaceBackend, self).__init__(arguments)
except Exception:
caches: fixed unicode error on non-ascii cache key
r1015 log.exception('Failed to initialize db at: %s', db_file)
caches: improved locking problems with distributed lock new cache backend
r946 raise
caches: added redis backend as an option
r733
caches: added redis pool for redis cache backend
r781 def __repr__(self):
return '{} `{}`'.format(self.__class__, self.filename)
caches: added redis backend as an option
r733 def list_keys(self, prefix=''):
caches: don't use key_manglers instead prefix keys based on backend.
r734 prefix = '{}:{}'.format(self.key_prefix, prefix)
caches: added redis backend as an option
r733 def cond(v):
if not prefix:
return True
if v.startswith(prefix):
return True
return False
with self._dbm_file(True) as dbm:
caches: improved locking problems with distributed lock new cache backend
r946 try:
return filter(cond, dbm.keys())
except Exception:
log.error('Failed to fetch DBM keys from DB: %s', self.get_store())
raise
caches: added redis backend as an option
r733
def get_store(self):
return self.filename
caches: improved locking problems with distributed lock new cache backend
r946 def _dbm_get(self, key):
caches: added redis backend as an option
r733 with self._dbm_file(False) as dbm:
if hasattr(dbm, 'get'):
value = dbm.get(key, NO_VALUE)
else:
# gdbm objects lack a .get method
try:
value = dbm[key]
except KeyError:
value = NO_VALUE
if value is not NO_VALUE:
value = self._loads(value)
return value
caches: improved locking problems with distributed lock new cache backend
r946 def get(self, key):
try:
return self._dbm_get(key)
except Exception:
log.error('Failed to fetch DBM key %s from DB: %s', key, self.get_store())
raise
caches: added redis backend as an option
r733 def set(self, key, value):
with self._dbm_file(True) as dbm:
dbm[key] = self._dumps(value)
def set_multi(self, mapping):
with self._dbm_file(True) as dbm:
for key, value in mapping.items():
dbm[key] = self._dumps(value)
caches: don't use key_manglers instead prefix keys based on backend.
r734 class BaseRedisBackend(redis_backend.RedisBackend):
cache: allow controlling lock_auto_renewal via .ini config
r949 key_prefix = ''
def __init__(self, arguments):
super(BaseRedisBackend, self).__init__(arguments)
self._lock_timeout = self.lock_timeout
caches: optimized defaults for safer more reliable behaviour
r951 self._lock_auto_renewal = asbool(arguments.pop("lock_auto_renewal", True))
cache: allow controlling lock_auto_renewal via .ini config
r949
if self._lock_auto_renewal and not self._lock_timeout:
# set default timeout for auto_renewal
caches: optimized defaults for safer more reliable behaviour
r951 self._lock_timeout = 30
caches: added redis pool for redis cache backend
r781
def _create_client(self):
args = {}
if self.url is not None:
args.update(url=self.url)
else:
args.update(
host=self.host, password=self.password,
port=self.port, db=self.db
)
connection_pool = redis.ConnectionPool(**args)
return redis.StrictRedis(connection_pool=connection_pool)
caches: added redis backend as an option
r733 def list_keys(self, prefix=''):
caches: don't use key_manglers instead prefix keys based on backend.
r734 prefix = '{}:{}*'.format(self.key_prefix, prefix)
caches: added redis backend as an option
r733 return self.client.keys(prefix)
def get_store(self):
return self.client.connection_pool
def get(self, key):
value = self.client.get(key)
if value is None:
return NO_VALUE
return self._loads(value)
caches: don't use key_manglers instead prefix keys based on backend.
r734 def get_multi(self, keys):
if not keys:
return []
values = self.client.mget(keys)
loads = self._loads
return [
loads(v) if v is not None else NO_VALUE
for v in values]
caches: added redis backend as an option
r733 def set(self, key, value):
if self.redis_expiration_time:
self.client.setex(key, self.redis_expiration_time,
self._dumps(value))
else:
self.client.set(key, self._dumps(value))
def set_multi(self, mapping):
caches: don't use key_manglers instead prefix keys based on backend.
r734 dumps = self._dumps
caches: added redis backend as an option
r733 mapping = dict(
caches: don't use key_manglers instead prefix keys based on backend.
r734 (k, dumps(v))
caches: added redis backend as an option
r733 for k, v in mapping.items()
)
if not self.redis_expiration_time:
self.client.mset(mapping)
else:
pipe = self.client.pipeline()
for key, value in mapping.items():
pipe.setex(key, self.redis_expiration_time, value)
pipe.execute()
def get_mutex(self, key):
if self.distributed_lock:
caches: fixed unicode mismatch with types
r1016 lock_key = u'_lock_{0}'.format(safe_unicode(key))
cache: allow controlling lock_auto_renewal via .ini config
r949 return get_mutex_lock(self.client, lock_key, self._lock_timeout,
auto_renewal=self._lock_auto_renewal)
caches: added redis backend as an option
r733 else:
return None
caches: don't use key_manglers instead prefix keys based on backend.
r734
class RedisPickleBackend(PickleSerializer, BaseRedisBackend):
key_prefix = 'redis_pickle_backend'
pass
class RedisMsgPackBackend(MsgPackSerializer, BaseRedisBackend):
key_prefix = 'redis_msgpack_backend'
pass
caches: improved locking problems with distributed lock new cache backend
r946
def get_mutex_lock(client, lock_key, lock_timeout, auto_renewal=False):
import redis_lock
class _RedisLockWrapper(object):
"""LockWrapper for redis_lock"""
caches: further improvements on the lock implementations
r952 @classmethod
def get_lock(cls):
caches: improved locking problems with distributed lock new cache backend
r946 return redis_lock.Lock(
redis_client=client,
name=lock_key,
expire=lock_timeout,
auto_renewal=auto_renewal,
strict=True,
)
caches: updated logging and some timings
r958 def __repr__(self):
return "{}:{}".format(self.__class__.__name__, lock_key)
def __str__(self):
return "{}:{}".format(self.__class__.__name__, lock_key)
caches: further improvements on the lock implementations
r952 def __init__(self):
self.lock = self.get_lock()
caches: updated logging and some timings
r958 self.lock_key = lock_key
caches: further improvements on the lock implementations
r952
caches: improved locking problems with distributed lock new cache backend
r946 def acquire(self, wait=True):
caches: updated logging and some timings
r958 log.debug('Trying to acquire Redis lock for key %s', self.lock_key)
caches: further improvements on the lock implementations
r952 try:
caches: updated logging and some timings
r958 acquired = self.lock.acquire(wait)
log.debug('Got lock for key %s, %s', self.lock_key, acquired)
return acquired
caches: fixed wrong except
r953 except redis_lock.AlreadyAcquired:
caches: further improvements on the lock implementations
r952 return False
lock: handle refresh thread already started
r954 except redis_lock.AlreadyStarted:
# refresh thread exists, but it also means we acquired the lock
return True
caches: improved locking problems with distributed lock new cache backend
r946
def release(self):
try:
self.lock.release()
except redis_lock.NotAcquired:
pass
return _RedisLockWrapper()