Skip to content

fix: sort record IDs in lockForeignRecords to prevent deadlocks#2676

Open
dkindlund wants to merge 1 commit intoteableio:developfrom
dkindlund:fix/sort-lock-foreign-record-ids
Open

fix: sort record IDs in lockForeignRecords to prevent deadlocks#2676
dkindlund wants to merge 1 commit intoteableio:developfrom
dkindlund:fix/sort-lock-foreign-record-ids

Conversation

@dkindlund
Copy link
Contributor

@dkindlund dkindlund commented Mar 3, 2026

Bug Description

lockForeignRecords in link.service.ts uses SELECT ... FOR UPDATE to acquire row-level locks on foreign records before modifying link data. However, it passes recordIds to whereIn without sorting, and PostgreSQL does not guarantee deterministic lock acquisition order for WHERE IN clauses.

When two concurrent operations lock overlapping sets of foreign records in different orders, a deadlock can occur. For example:

  • Request A needs to lock records [rec3, rec1, rec2]
  • Request B needs to lock records [rec2, rec3, rec1]
  • PostgreSQL may acquire locks in different orders for each, causing a deadlock

This is inconsistent with lockRecordsSql in postgres.provider.ts (line 536) which correctly sorts recordIds before forUpdate().

Steps to Reproduce

  1. Create two tables with a ManyOne link field
  2. Rapidly update link fields on multiple records that reference overlapping sets of foreign records from concurrent API clients
  3. Under sufficient concurrency, deadlocks occur because lock acquisition order is non-deterministic

Expected Behavior

Lock acquisition should follow a deterministic order to prevent deadlocks between concurrent operations.

What This Fix Does

  1. Sorts the recordIds array before passing to whereIn
  2. Adds orderBy('__id') to the lock query

This ensures deterministic lock acquisition order, matching the pattern already used by lockRecordsSql in postgres.provider.ts.

Client Information

  • OS: Linux (Docker container on Google Cloud Run)
  • Database: PostgreSQL 17 (Google Cloud SQL)

Platform

Docker standalone (Google Cloud Run)

Additional Context

Discovered during a deep stability audit of the Teable codebase focused on concurrency issues under high API load. The existing lockRecordsSql in the Postgres provider already implements correct sorted locking — this fix brings lockForeignRecords into alignment with that pattern.

lockForeignRecords uses SELECT ... FOR UPDATE to acquire row-level locks
on foreign records before modifying link data. However, it passes
recordIds to whereIn without sorting, and PostgreSQL does not guarantee
deterministic lock acquisition order for WHERE IN clauses.

When two concurrent operations lock overlapping sets of foreign records
in different orders, a deadlock can occur. This is inconsistent with
lockRecordsSql in postgres.provider.ts (line 536) which correctly sorts
recordIds before forUpdate().

This fix sorts the record IDs and adds ORDER BY __id to ensure
deterministic lock acquisition order, matching the pattern used
elsewhere in the codebase.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
dkindlund added a commit to dkindlund/teable that referenced this pull request Mar 9, 2026
## Problem

The /link-fix endpoint's InvalidLinkReference repair has a race condition
under concurrent write load. The current two-step approach:

1. checkLinks() — SELECT to detect desynced record IDs
2. fixLinks(recordIds) — UPDATE only those specific records

Between steps 1 and 2, concurrent writes can:
- Create NEW desyncs not in the recordIds list (missed until next run)
- Worsen existing desyncs (JSONB changes between detection and fix)
- Overwrite the fix immediately after it's applied

In production under sustained concurrent API load (200-800 writes/hr),
we've observed full JSONB array wipes (e.g., 9,781 entries reduced to 0)
caused by the read-modify-write race in Teable's link update path. The
integrity fix endpoint, meant to repair these desyncs, is vulnerable to
the same concurrent writes because of this detection-fix gap.

## Solution

Add atomicFixLinks() to IntegrityQueryPostgres that combines detection
and fix into a single UPDATE ... WHERE __id IN (SELECT ...) statement.
Detection and fix execute under the same MVCC snapshot, eliminating the
application-level gap entirely.

The service (LinkFieldIntegrityService.checkAndFix) tries the atomic
method first. If the database engine doesn't support it (e.g., SQLite),
it falls back to the existing two-step approach. This is a safe,
backwards-compatible change — SQLite behavior is completely unchanged.

## What the /link-fix endpoint covers

For context, the endpoint handles 10 integrity issue types. This PR
improves only InvalidLinkReference. Here is the full list:

| Issue Type | What it detects | Fix applied |
|---|---|---|
| InvalidLinkReference | JSONB link column diverged from junction/FK source of truth | Rebuilds JSONB from junction/FK data (THIS PR) |
| MissingRecordReference | Junction table has rows pointing to deleted records | Deletes orphaned junction rows |
| ForeignTableNotFound | Link field references a deleted table | No auto-fix (requires manual intervention) |
| ForeignKeyHostTableNotFound | Junction table is missing | No auto-fix |
| ForeignKeyNotFound | Missing FK columns in junction table | Recreates columns, backfills from JSONB |
| SelfKeyNotFound | Missing self-reference key in junction | No auto-fix |
| SymmetricFieldNotFound | Bidirectional link missing its counterpart | Converts to one-way link |
| ReferenceFieldNotFound | Referenced record was deleted | Deletes orphaned reference |
| UniqueIndexNotFound | Missing unique constraint for OneOne links | Creates the index |
| EmptyString | Text fields have empty strings instead of NULL | Converts to NULL |

## Relationship types handled

The atomic fix handles all four relationship types:
- ManyMany (isMultiValue=true): Rebuilds JSONB array from junction table
- OneMany (isMultiValue=true): Same as ManyMany
- ManyOne (isMultiValue=false, FK in same table): Rebuilds single JSONB object from FK column
- OneOne (isMultiValue=false, FK in host table): Rebuilds via cross-table join

## Files changed

- abstract.ts: Added atomicFixLinks() with default null return
- integrity-query.postgres.ts: PostgreSQL implementation of atomicFixLinks()
- link-field.service.ts: checkAndFix() tries atomic first, falls back to two-step

## Related issues

- teableio#2680 (DataLoader cache invalidation under concurrency)
- teableio#2676 (Sort record IDs in lockForeignRecords)
- teableio#2677 (Wrap simpleUpdateRecords with transaction/timeout/retry)
- teableio#2679 (Add foreign record locking to ManyMany, OneMany, OneOne)

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant