DiskQueue 1.6.7
See the version list below for details.
dotnet add package DiskQueue --version 1.6.7
NuGet\Install-Package DiskQueue -Version 1.6.7
<PackageReference Include="DiskQueue" Version="1.6.7" />
paket add DiskQueue --version 1.6.7
#r "nuget: DiskQueue, 1.6.7"
// Install DiskQueue as a Cake Addin #addin nuget:?package=DiskQueue&version=1.6.7 // Install DiskQueue as a Cake Tool #tool nuget:?package=DiskQueue&version=1.6.7
DiskQueue
A robust, thread-safe, and multi-process persistent queue.
Based very heavily on http://ayende.com/blog/3479/rhino-queues-storage-disk
Requirements and Environment
Works on .Net 4+ and Mono 2.10.8+ (3.0.6+ recommended)
Requires access to filesystem storage.
The file system is used to hold locks, so any bug in your file system may cause issues with DiskQueue -- although it tries to work around them.
Basic Usage
PersistentQueue.WaitFor(...)
is the main entry point. This will attempt to gain an exclusive lock on the given storage location. On first use, a directory will be created with the required files inside it.- This queue object can be shared among threads. Each thread should call
OpenSession()
to get its own session object. - Both
IPersistentQueue
s andIPersistentQueueSession
s should be wrapped inusing()
clauses, or otherwise disposed of properly. Failure to do this will result in lock contention -- you will get errors that the queue is still in use.
Thanks to Tom Halter, there is also a generic-typed PersistentQueue<T>(...);
which will handle the serialisation and deserialization of
elements in the queue, as long at the type is decorated with [Serializable]
. You can also inject your own ISerializationStrategy<T>
into your PersistentQueueSession<T>
if you wish to have more granular control over Serialization/Deserialization, or if you wish to
use your own serializer (e.g Json.NET).
Use new PersistentQueue<T>(...)
in place of new PersistentQueue(...)
or PersistentQueue.WaitFor<T>(...)
in place of PersistentQueue.WaitFor(...)
in any of the examples below.
Note: BinaryFormatter
was removed from the default serializer. See https://learn.microsoft.com/en-us/dotnet/standard/serialization/binaryformatter-security-guide.
Thanks to https://github.com/nikryden for alerting me to this.
Example
Queue on one thread, consume on another; retry some exceptions.
Note this is one queue being shared between two sessions. You should not open two queue instances for one storage location at once.
IPersistentQueue queue = new PersistentQueue("queue_a");
var t1 = new Thread(() =>
{
while (HaveWork())
{
using (var session = queue.OpenSession())
{
session.Enqueue(NextWorkItem());
session.Flush();
}
}
});
var t2 = new Thread(()=> {
while (true) {
using (var session = queue.OpenSession()) {
var data = session.Dequeue();
if (data == null) {Thread.Sleep(100); continue;}
try {
MaybeDoWork(data)
session.Flush();
} catch (RetryException) {
continue;
} catch {
session.Flush();
}
}
}
});
t1.Start();
t2.Start();
Example
Batch up a load of work and have another thread work through it.
IPersistentQueue queue = new PersistentQueue("batchQueue");
var worker = new Thread(()=> {
using (var session = queue.OpenSession()) {
byte[] data;
while ((data = session.Dequeue()) != null) {
MaybeDoWork(data)
session.Flush();
}
}
});
using (var session = queue.OpenSession()) {
foreach (var item in LoadsOfStuff()) {
session.Enqueue(item);
}
session.Flush();
}
worker.IsBackground = true; // anything not complete when we close will be left on the queue for next time.
worker.Start();
Transactions
Each session is a transaction. Any Enqueues or Dequeues will be rolled back when the session is disposed unless
you call session.Flush()
. Data will only be visible between threads once it has been flushed.
Each flush incurs a performance penalty. By default, each flush is persisted to disk before continuing. You
can get more speed at a safety cost by setting queue.ParanoidFlushing = false;
Data loss and transaction truncation
By default, DiskQueue will silently discard transaction blocks that have been truncated; it will throw an InvalidOperationException
when transaction block markers are overwritten (this happens if more than one process is using the queue by mistake. It can also happen with some kinds of disk corruption).
If you construct your queue with throwOnConflict: false
, all recoverable transaction errors will be silently truncated. This should only be used when
uptime is more important than data consistency.
using (var queue = new PersistentQueue(path, Constants._32Megabytes, throwOnConflict: false)) {
. . .
}
Global default settings
Each instance of a PersistentQueue
has it's own settings for flush levels and corruption behaviour. You can set these individually after creating an instance,
or globally with PersistentQueue.DefaultSettings
. Default settings are applied to all queue instances in the same process created after the setting is changed.
For example, if performance is more important than crash safety:
PersistentQueue.DefaultSettings.ParanoidFlushing = false;
PersistentQueue.DefaultSettings.TrimTransactionLogOnDispose = false;
Or if up-time is more important than detecting corruption early (often the case for embedded systems):
PersistentQueue.DefaultSettings.AllowTruncatedEntries = true;
PersistentQueue.DefaultSettings.ParanoidFlushing = true;
Removing or resetting queues
Queues create a directory and set of files for storage. You can remove all files for a queue with the HardDelete
method.
If you give true as the reset parameter, the directory will be written again.
This WILL delete ANY AND ALL files inside the queue directory. You should not call this method in normal use. If you start a queue with the same path as an existing directory, this method will delete the entire directory, not just the queue files.
var subject = new PersistentQueue("queue_a");
subject.HardDelete(true); // wipe any existing data and start again
Multi-Process Usage
Each IPersistentQueue
gives exclusive access to the storage until it is disposed.
There is a static helper method PersistentQueue.WaitFor("path", TimeSpan...)
which will wait to gain access until
other processes release the lock or the timeout expires.
If each process uses the lock for a short time and wait long enough, they can share a storage location.
E.g.
...
void AddToQueue(byte[] data) {
Thread.Sleep(150);
using (var queue = PersistentQueue.WaitFor(SharedStorage, TimeSpan.FromSeconds(30)))
using (var session = queue.OpenSession()) {
session.Enqueue(data);
session.Flush();
}
}
byte[] ReadQueue() {
Thread.Sleep(150);
using (var queue = PersistentQueue.WaitFor(SharedStorage, TimeSpan.FromSeconds(30)))
using (var session = queue.OpenSession()) {
var data = session.Dequeue();
session.Flush();
return data;
}
}
...
Cross-process Locking
DiskQueue tries very hard to make sure the lock files are managed correctly. You can use this as an inter-process lock if required. Simply open a session to acquire the lock, and dispose of the session to release it.
If you need the transaction semantics of sessions across multiple processes, try a more robust solution like https://github.com/i-e-b/SevenDigital.Messaging
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 was computed. |
.NET Framework | net461 was computed. net462 was computed. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
This package has no dependencies.
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
1.7.1 | 35,240 | 12/13/2023 |
1.7.0 | 11,911 | 8/24/2023 |
1.6.8 | 7,978 | 4/18/2023 |
1.6.7 | 1,879 | 3/15/2023 |
1.6.6 | 243 | 3/14/2023 |
1.6.5 | 7,995 | 1/13/2023 |
1.6.4 | 427 | 12/19/2022 |
1.6.3 | 383 | 12/7/2022 |
1.6.2 | 366 | 12/5/2022 |
1.6.1 | 327 | 12/5/2022 |
1.6.0 | 2,880 | 7/22/2022 |
1.5.0 | 7,302 | 4/6/2022 |
1.4.0 | 2,638 | 3/16/2022 |
1.3.2 | 10,684 | 7/16/2021 |
1.3.1 | 7,004 | 2/10/2021 |
1.3.0 | 2,853 | 9/14/2020 |
1.2.0 | 38,419 | 8/6/2018 |
1.1.0 | 3,329 | 2/22/2018 |
1.0.0 | 21,020 | 9/3/2015 |
Turning off "everyone" permissions by default