python-uhashring 2.3-2 source package in Ubuntu
Changelog
python-uhashring (2.3-2) unstable; urgency=medium * Uploading to unstable. -- Thomas Goirand <email address hidden> Wed, 04 Oct 2023 23:02:04 +0200
Upload details
- Uploaded by:
- Debian OpenStack
- Uploaded to:
- Sid
- Original maintainer:
- Debian OpenStack
- Architectures:
- all
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Oracular | release | universe | misc | |
Noble | release | universe | misc |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
python-uhashring_2.3-2.dsc | 2.1 KiB | d34dee670ab30a3a4200d12926b8c73b2288fa7961feb35ef86c6af02009b7a9 |
python-uhashring_2.3.orig.tar.xz | 12.9 KiB | 1878a7ee941381ae0f081c43c2e6475bf6ec36c51d1e2ceeae748b7500c013bb |
python-uhashring_2.3-2.debian.tar.xz | 2.8 KiB | fd00f84269c046da01abe49303b0c07bc740435b69dc06ab309d55382ff9fbe1 |
Available diffs
- diff from 2.1-4 to 2.3-2 (6.4 KiB)
No changes file available.
Binary packages built by this source
- python3-uhashring: full featured consistent hashing python library compatible with ketama
Uhashring implements consistent hashing in pure Python.
.
Consistent hashing is mostly used on distributed systems/caches/ databases as
this avoid the total reshuffling of your key-node mappings when adding or
removing a node in your ring (called continuum on libketama). More information
and det ails about this can be found in the *literature* section.
.
This full featured implementation offers:
* a lot of convenient methods to use your consistent hash ring in real world
applications.
* simple integration with other libs such as memcache through monkey
patching.
* a full ketama compatibility if you need to use it.
* all the missing functions in the libketama C python binding (which is not
even available on pypi) for ketama users.
* possibility to use your own weight and hash functions if you don't care
about the ketama compatibility.
* Instance-oriented usage, so you can use your consistent hash ring object
directly in your code (see advanced usage).
* tests of implementation, key distribution and ketama compatibility.
.
Per node weight is also supported and will affect the nodes distribution on
the ring.