1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
use std::sync::Arc;

use sled::{Config, DbResult, Tree};

use super::*;

// persist the TS every TS_SAFETY_BUFFER / 2 txns.
// every time we start, bump TS by this much.
// 64 bits = 6 billion per second for 100 years,
// so, no big deal, unless...
const TS_SAFETY_BUFFER: u64 = 4294967296;

// where to store the TS every once in a while
const TS_PERSIST_KEY: &'static [u8] = b"tx_persist";

// @k -> Vec<(Wts, Version)>    // always of len 1 or 2
//      possibly pending version, current version
// !ts -> Vec<(Wts, Version)>
//      writeset of a transaction
// version -> Value
pub struct Db {
    pub(super) tree: sled::Tree,
    ts: AtomicUsize,
    mvcc: Mvcc,
}

impl Db {
    pub fn start(config: Config) -> DbResult<Db, ()> {
        let tree = Tree::start(config)?;
        let last_ts_v = tree.get(TS_PERSIST_KEY)?;
        let last_ts = if let Some(last_ts_bytes) = last_ts_v {
            assert_eq!(
                last_ts_bytes.len(),
                8,
                "last known transaction bytes are corrupted"
            );

            bytes_to_ts(&*last_ts_bytes)
        } else {
            0
        };

        let bumped_ts: u64 = last_ts + TS_SAFETY_BUFFER;

        tree.set(TS_PERSIST_KEY.to_vec(), ts_to_bytes(bumped_ts))?;

        let db = Db {
            tree: tree,
            ts: AtomicUsize::new(bumped_ts as usize),
            mvcc: Mvcc::default(),
        };

        db.recover()?;

        Ok(db)
    }

    // bump stored ts by TS_SAFETY_BUFFER
    // for (ts, writeset) in ts range:
    //   for Wts, Version in writeset:
    //     filter @k, remove (Wts, Version)
    // delete ts from sled
    fn recover(&self) -> DbResult<(), ()> {
        for res in self.tree.scan(b"!") {
            let (writeset_key, writeset_bytes) = res?;
            if writeset_key[0] != b'!' {
                return Ok(());
            }

            assert_eq!(
                writeset_key.len(),
                9,
                "transaction key must be 9 bytes long"
            );

            let wts = bytes_to_ts(&writeset_key[1..9]);

            let writeset: WriteSet = deserialize(&*writeset_bytes).expect(
                "corrupt transaction data found",
            );

            for key in writeset {
                self.purge_version_from_key(&key, wts)?;
            }

            self.tree.del(&writeset_key)?;
        }

        Ok(())
    }

    pub(super) fn purge_version_from_key(
        &self,
        key: &Key,
        wts: Ts,
    ) -> DbResult<(), ()> {
        let padded_key = key_safety_pad(key);
        let value_opt = self.tree.get(&padded_key)?;

        if let Some(value) = value_opt {
            let mut versions: Versions =
                deserialize(&*value).expect("corrupt Data found");

            let mut pruned = false;
            for &(ts, version) in &versions {
                if ts == wts {
                    self.tree.del(&*ts_to_bytes(version))?;
                    pruned = true;
                }
            }

            if pruned {
                versions.retain(|&(ts, _version)| ts != wts);
                let new_value = if versions.is_empty() {
                    None
                } else {
                    Some(serialize(&versions, Infinite).unwrap())
                };
                self.tree.cas(padded_key, Some(value), new_value).map_err(
                    |e| {
                        e.danger_cast()
                    },
                )?;
            }
        }

        Ok(())
    }

    pub(super) fn add_version_to_key(
        &self,
        key: &Key,
        ts: Ts,
        version: Version,
    ) -> DbResult<(), ()> {
        let padded_key = key_safety_pad(key);
        let value_opt = self.tree.get(&padded_key)?;

        let new_value = if let &Some(ref value) = &value_opt {
            let mut versions: Versions =
                deserialize(&*value).expect("corrupt Data found");
            versions.push((ts, version));
            versions
        } else {
            vec![(ts, version)]
        };

        let new_bytes = serialize(&new_value, Infinite).unwrap();

        self.tree
            .cas(padded_key, value_opt, Some(new_bytes))
            .map(|_| ())
            .map_err(|e| e.danger_cast())
    }

    // bump timestamp and possibly persist a boosted version
    pub(super) fn ts(&self, n: usize) -> Ts {
        let ret = self.ts.fetch_add(std::cmp::max(n, 1), SeqCst) as Ts;

        // if we need to boost the persisted TS, do it
        if ret % TS_SAFETY_BUFFER > (TS_SAFETY_BUFFER * 3 / 4) {
            let last = (ret / TS_SAFETY_BUFFER) * TS_SAFETY_BUFFER;
            let next = ((ret / TS_SAFETY_BUFFER) + 1) * TS_SAFETY_BUFFER;
            if self.ts.compare_and_swap(
                ret as usize + n,
                next as usize,
                SeqCst,
            ) == ret as usize + n
            {
                self.tree
                    .cas(
                        TS_PERSIST_KEY.to_vec(),
                        Some(ts_to_bytes(last)),
                        Some(ts_to_bytes(next)),
                    )
                    .unwrap();
            }
        }
        ret
    }

    /// create a new transaction
    pub fn tx<'a>(&'a self) -> Tx<'a> {
        Tx::new(&self)
    }

    // TODO ensure phantom handling:
    //     inserts
    //         install pending has old version point to None
    //     deletes
    //         install pending has new version point to None
    pub(super) fn get_chain(&self, k: &Key) -> DbResult<Arc<Chain>, ()> {
        if let Some(chain) = self.mvcc.get(k) {
            Ok(chain)
        } else {
            // pull a key out of the tree, or represent its absence
            let wrapped_key = key_safety_pad(k);

            if let Some(found) = self.tree.get(&wrapped_key)? {
                let versions: Versions =
                    deserialize(&*found).expect("corrupt Data found");

                assert!(!versions.is_empty());

                let mut chain: Vec<_> = versions
                    .into_iter()
                    .map(|(wts, version)| {
                        MemRecord {
                            rts: AtomicUsize::new(0),
                            wts: wts,
                            data: Some(version),
                            // we know this is committed because
                            // during recovery we deleted all pending
                            // versions.
                            status: Status::Committed,
                        }
                    })
                    .collect();

                chain.sort_unstable_by_key(|record| record.wts);

                self.mvcc.insert(k.clone(), Chain::new(chain));
                Ok(self.mvcc.get(k).unwrap())
            } else {
                self.mvcc.insert(k.clone(), Chain::default());
                Ok(self.mvcc.get(k).unwrap())
            }
        }
    }
}