Commit Graph

8400 Commits

Author SHA1 Message Date
Piotr Sarna
1392734609 Merge pull request #62 from tpisto/main
Row<T>
2023-07-12 10:11:08 +02:00
Tommi Pisto
5d240e731f Fixed bench build 2023-07-11 18:03:05 +03:00
Piotr Sarna
0a251b3b76 Merge pull request #61 from penberg/fix59
database: fix an unwrap() in tx_commit
2023-07-09 17:42:08 +02:00
Piotr Sarna
6d2a4150aa database: fix an unwrap() in tx_commit
It was a legit error -> the transaction doesn't have to be active
when commit() is called on it, and the right behavior in that case
is to return a TxTerminated error.

Fixes https://github.com/penberg/tihku/issues/59
2023-07-09 11:15:48 +02:00
Tommi Pisto
b42cbe52d0 Added 'static bounds to T 2023-07-08 12:28:27 +03:00
Tommi Pisto
ce6a6ceba2 Row<T> 2023-07-07 18:14:31 +03:00
Pekka Enberg
4888a0639c Mention libsql with MVCC 2023-06-19 11:15:20 +03:00
Pekka Enberg
31ee26d037 Merge pull request #58 from penberg/rename-project
Rename project to Tihku
2023-06-18 11:45:24 +03:00
Pekka Enberg
9bb09d005f Rename project to Tihku
The "mvcc-rs" name is not great for a lot of reasons. Let's rename the project to (Iku-)Tihku to give t a proper name
2023-06-18 11:17:01 +03:00
Piotr Sarna
6daaa79f63 database: actually implement upserts
Fixes #55 - it was the code that should have been there
in the first place, but I forgot to `git add`...
2023-06-13 19:33:22 +02:00
Pekka Enberg
a8af11a553 Merge pull request #55 from penberg/upsert_tests
database: change insert to upsert in concurrency tests
2023-06-13 16:55:44 +03:00
Piotr Sarna
0338e14814 database: change insert to upsert in concurrency tests
Using insert() was a violation of our API, kind of, because
inserts are not expected to be called twice on the same id.
Instead, update or upsert should delete the version first,
and that's what's done in this patch.

At the same time, write-write conflict detection needed to be
implemented, because we started hitting it with rollback().

Finally, garbage collection is modified to actually work
and garbage-collect row versions. Without it, the number of tracked
row versions very quickly goes out of hand.
2023-06-13 15:52:28 +02:00
Pekka Enberg
46e3f7e3c4 Merge pull request #54 from penberg/concurrency_no_shuttle
concurrency test: port to OS threads
2023-06-13 14:49:48 +03:00
Piotr Sarna
36d989babb database: properly compare row versions
Previous commit was incorrect in two manners:
 1. It *only* worked if the version was either pushed as the most
    recent or 1 behind the most recent - that's fixed.
 2. Comparing row versions incorrectly compared either timestamps
    or transaction ids, while we *need* to only compare timestamps.
    That's done by looking up the transaction and extracting its
    timestamp - potentially expensive, and maybe we need to rework
    the algorithm and/or consult the Hekaton paper.
2023-06-13 12:51:46 +02:00
Piotr Sarna
1a50e12102 tests: make concurrency test run 4 threads 2023-06-13 11:33:23 +02:00
Piotr Sarna
7a6ca27986 database: make sure row versions are inserted in a sorted order
For the time being, we still assume that the row versions vector
is *nearly* sorted, so we just perform a linear reverse search
and insert the version at an appropriate place.

During concurrency tests, the error was at most 1 offset,
and as long as we empirically prove it to be below a reasonable
constant, we're fine. Otherwise we should consider switching
to either a data structure that keeps elements ordered,
or at least a list that gives us constant insertion.
2023-06-13 11:24:19 +02:00
Piotr Sarna
95ed29e6cb database: fix the locking order in transactions
Before this commit, deadlocks were possible (and detected),
because some functions took row_versions lock first, and then
individual transaction locks, while other functions took the locks
in opposite order.
2023-06-12 16:22:45 +02:00
Piotr Sarna
57249f2c94 concurrency test: port to OS threads
Without mutexes, it makes no sense anymore to use shuttle.
Instead, the test cases just spawn OS threads.
Also, a case with overlapping ids is added, to test whether
transactions read their own writes within the same transaction.
2023-06-12 14:27:40 +02:00
Piotr Sarna
3841adf482 Merge pull request #53 from penberg/atomicstate
database: make transaction state atomic
2023-06-12 14:00:44 +02:00
Piotr Sarna
a93fcdcbcf database: make transaction state atomic
Without atomic access, we're subject to races when inspecting
whether a transaction just changed its state, e.g. from Preparing
to Committed.
2023-06-12 13:14:46 +02:00
Pekka Enberg
3d804ece2a Merge pull request #52 from penberg/lockfree
database: drop the mutex
2023-06-12 13:09:12 +03:00
Piotr Sarna
983544dbfd database: implement missing cases for is_version_visible + tests
Following the Hekaton paper tables, but also taking into account
that in iteration 0 we're only interested in snapshot isolation,
not serializability.
2023-06-07 13:58:34 +02:00
Piotr Sarna
b4932340f4 database: add a juicy comment about serializability
And specifically, the amount of things we don't have implemented
to even think of that. It's mostly about tracking commit dependencies
which allow speculative reads/ignores of certain versions,
as well as making sure that in the commit phase, we validate
visibility of all versions read, as well as that our scans
took into account all data. If some version appeared after the transaction
began, and it was not taken into account during its scans, it is considered
a "phantom", and it invalidates the transaction if we strive for
serializability.
2023-06-07 11:20:00 +02:00
Piotr Sarna
6d82973359 database: restore a CRUCIAL comment about dropping a tx
... which stops being correct after lock-free!
2023-06-06 16:04:28 +02:00
Piotr Sarna
ddbcd9be79 database: bring back dropping unused row versions 2023-06-06 12:47:40 +02:00
Piotr Sarna
625394000e unignore test_dirty_read_deleted 2023-06-06 11:34:34 +02:00
Piotr Sarna
47eb149214 database: drop the mutex
Without a critical section, we naturally hit a few unimplemented
paths when handling concurrent transactions, which is great news!
Visiting previously impossible paths already proves that lock-free
is able to handle concurrency > 1.
Now, the easy part - fixing all the unimplemented paths and making
the Hekaton implementation 100% foolproof.
2023-06-06 11:28:27 +02:00
Piotr Sarna
57b2e031fb Merge pull request #51 from penberg/moreskipmap
database: migrate RefCell<HashMap> and RefCell<BTreeMap> to SkipMap
2023-06-06 09:58:37 +02:00
Piotr Sarna
a8faffa9f5 database: migrate txs to SkipMap 2023-06-06 09:43:00 +02:00
Piotr Sarna
fdfc4fd5b4 database: drop RefCell from SkipMap
not needed, the structure is already Send&Sync
2023-06-05 13:58:24 +02:00
Piotr Sarna
74a7628a0a mvcc-rs: move database tests to a separate file
That makes the file more human-readable
2023-06-05 12:50:35 +02:00
Piotr Sarna
77e88d3f04 fix clippy 2023-06-05 11:47:53 +02:00
Pekka Enberg
51f33919d3 Switch to concurrent SkipMap for row versions (#49)
Let's switch to concurrent SkipMap as the first small step towards
lockless index...
2023-05-17 15:31:16 +02:00
Pekka Enberg
3b9e235d09 Merge pull request #47 from penberg/resync
treewide: overhaul the API to be sync again
2023-05-17 13:59:46 +03:00
Piotr Sarna
ae4cc872b6 treewide: overhaul the API to be sync again
We dropped all occurrences of Tokio to avoid the cost of allocations
induced by async runtimes.
The only async part of the code is now S3 storage, which is just
wrapped in a futures::executor::block_on()
2023-05-17 12:39:08 +02:00
Pekka Enberg
09a16d33f3 Merge pull request #45 from penberg/s3stor
storage: add S3 storage
2023-05-16 16:59:24 +03:00
Piotr Sarna
a28c41f919 bindings: run recovery on MVCCDatabaseOpen 2023-05-16 14:55:16 +02:00
Piotr Sarna
34d21b0eb7 storage: add S3 storage
It's now possible to run with S3 persistent storage
if bindings are built with `s3_storage` feature.
Regular S3 credentials need to be set up locally,
and all customary env variables like AWS_SECRET_ACCESS_KEY
and AWS_ACCESS_KEY_ID work just fine.

For local development, one can set MVCCRS_ENDPOINT env variable.
For testing with MinIO, the following setup customarily works:
MVCCRS_ENDPOINT=http://localhost:9000 \
  AWS_SECRET_ACCESS_KEY=minioadmin \
  AWS_ACCESS_KEY_ID=minioadmin \
    ./libsql /tmp/testme.db
2023-05-16 14:36:58 +02:00
Pekka Enberg
d34f19fa9c Merge pull request #44 from penberg/splittx
bindings: split transcation begin from insert/read
2023-05-15 15:48:34 +03:00
Piotr Sarna
5da87739fa bindings: split transcation begin from insert/read
libSQL expects to be able to begin/commit a transaction
independently of reading or inserting data.
2023-05-15 14:33:25 +02:00
Pekka Enberg
57568981a4 Merge pull request #43 from penberg/detrait_storage
treewide: drop storage trait
2023-05-15 12:29:55 +03:00
Piotr Sarna
8b1ef20c08 treewide: drop storage trait
We're good with an enum, and async_trait has a runtime cost
we don't like.
2023-05-15 10:50:47 +02:00
Pekka Enberg
7772c65f8d Switch to Tokio's mutex (#40)
The async trait wrapper is very expensive because it's doing pin boxing
in the hot path. Switch to Tokio's mutex to get back performance.

Fixes #39
2023-05-12 19:25:08 +02:00
Pekka Enberg
df42771c63 Merge pull request #38 from penberg/tableid
mvcc: switch to (table_id, row_id) for row ids
2023-05-12 14:20:16 +03:00
Piotr Sarna
3236421f77 mvcc: switch to (table_id, row_id) for row ids
With that, we're able to easily distinguish rows from different
tables.
2023-05-12 12:15:19 +02:00
Piotr Sarna
a782ae5a0a cursor: add is_empty 2023-05-12 10:09:18 +02:00
Piotr Sarna
d5eec5d528 cursor: add MVCCScanCursorPosition 2023-05-11 14:11:10 +02:00
Piotr Sarna
582bf14934 database: keep rows in BTreeMap
We need ordering libSQL-side.
2023-05-11 13:38:38 +02:00
Piotr Sarna
e8bdfc8e7a cursor, read: update pointers to *mut u8 2023-05-11 13:35:19 +02:00
Piotr Sarna
54ee330912 cursor: add closing cursor
... which also terminates the read transaction open for scanning.
2023-05-11 12:13:27 +02:00