-
Notifications
You must be signed in to change notification settings - Fork 1
/
mutex_test.go
85 lines (69 loc) · 2.19 KB
/
mutex_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
/* SPDX-License-Identifier: MPL-2.0
*
* Copyright (c) 2024 Damian Peckett <[email protected]>
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*/
package objsync_test
import (
"context"
"fmt"
"math/rand"
"os"
"sync/atomic"
"testing"
"time"
"github.com/dpeckett/objsync"
"github.com/dpeckett/objsync/provider/s3"
"github.com/stretchr/testify/require"
"golang.org/x/sync/errgroup"
)
func TestMutex(t *testing.T) {
endpointURL := os.Getenv("AWS_ENDPOINT_URL_S3")
accessKeyID := os.Getenv("AWS_ACCESS_KEY_ID")
secretAccessKey := os.Getenv("AWS_SECRET_ACCESS_KEY")
bucket := os.Getenv("BUCKET")
key := fmt.Sprintf("test-%d.lock", time.Now().UnixNano())
ctx := context.Background()
p, err := s3.NewProvider(ctx, endpointURL, "", accessKeyID, secretAccessKey)
require.NoError(t, err)
// Make sure the lock object exists.
_, err = p.AtomicUpdateObject(ctx, bucket, key, func(_ string, _ []byte) ([]byte, error) {
return []byte("{}"), nil
})
require.NoError(t, err)
// Two threads competing for the mutex.
var lockCounter int32
var lastFencingToken int64
g, ctx := errgroup.WithContext(ctx)
for i := 0; i < 3; i++ {
g.Go(func() error {
mu := objsync.NewMutex(p, bucket, key)
for j := 0; j < 5; j++ {
fencingToken, err := mu.Lock(ctx, 5*time.Second)
if err != nil {
return fmt.Errorf("lock: %w", err)
}
// Verify the mutex is held by only one goroutine.
if n := atomic.AddInt32(&lockCounter, 1); n > 1 {
return fmt.Errorf("lock is held by %d goroutines", n)
}
// Is the fencing token monotonically increasing?
if fencingToken <= lastFencingToken {
return fmt.Errorf("fencing token is not monotonically increasing: %d <= %d", fencingToken, lastFencingToken)
}
lastFencingToken = fencingToken
// Simulate some work.
time.Sleep(time.Millisecond*10 + time.Duration(rand.Intn(5))*time.Millisecond)
atomic.AddInt32(&lockCounter, -1)
if err := mu.Unlock(ctx); err != nil {
return fmt.Errorf("unlock: %w", err)
}
}
return nil
})
}
require.NoError(t, g.Wait())
}