-
-
Notifications
You must be signed in to change notification settings - Fork 771
/
secret_locks.go
54 lines (44 loc) · 1.38 KB
/
secret_locks.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
/*
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package locks
import (
"errors"
"fmt"
"sync"
)
var (
ErrConflict = errors.New("unable to access secret since it is locked")
sharedLocks = &secretLocks{}
)
func TryLock(providerName, secretName string) (func(), error) {
key := fmt.Sprintf("%s#%s", providerName, secretName)
unlockFunc, ok := sharedLocks.tryLock(key)
if !ok {
return nil, fmt.Errorf(
"failed to acquire lock: provider: %s, secret: %s: %w",
providerName,
secretName,
ErrConflict,
)
}
return unlockFunc, nil
}
// secretLocks is a collection of locks for secrets to prevent lost update.
type secretLocks struct {
locks sync.Map
}
// tryLock tries to hold lock for a given secret and returns true if succeeded.
func (s *secretLocks) tryLock(key string) (func(), bool) {
lock, _ := s.locks.LoadOrStore(key, &sync.Mutex{})
mu, _ := lock.(*sync.Mutex)
return mu.Unlock, mu.TryLock()
}