2017-05-26 04:48:44 +08:00
|
|
|
/*
|
|
|
|
* MonitorLeader.actor.cpp
|
|
|
|
*
|
|
|
|
* This source file is part of the FoundationDB open source project
|
|
|
|
*
|
|
|
|
* Copyright 2013-2018 Apple Inc. and the FoundationDB project authors
|
2018-02-22 02:25:11 +08:00
|
|
|
*
|
2017-05-26 04:48:44 +08:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
2018-02-22 02:25:11 +08:00
|
|
|
*
|
2017-05-26 04:48:44 +08:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2018-02-22 02:25:11 +08:00
|
|
|
*
|
2017-05-26 04:48:44 +08:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2018-10-20 01:30:13 +08:00
|
|
|
#include "fdbclient/MonitorLeader.h"
|
|
|
|
#include "fdbclient/CoordinationInterface.h"
|
2017-05-26 04:48:44 +08:00
|
|
|
#include "flow/ActorCollection.h"
|
|
|
|
#include "flow/UnitTest.h"
|
|
|
|
#include "fdbrpc/genericactors.actor.h"
|
|
|
|
#include "fdbrpc/Platform.h"
|
2019-02-18 06:55:47 +08:00
|
|
|
#include "flow/actorcompiler.h" // has to be last include
|
2017-05-26 04:48:44 +08:00
|
|
|
|
|
|
|
std::pair< std::string, bool > ClusterConnectionFile::lookupClusterFileName( std::string const& filename ) {
|
|
|
|
if (filename.length())
|
|
|
|
return std::make_pair(filename, false);
|
|
|
|
|
|
|
|
std::string f;
|
|
|
|
bool isDefaultFile = true;
|
|
|
|
if (platform::getEnvironmentVar(CLUSTER_FILE_ENV_VAR_NAME, f)) {
|
|
|
|
// If this is set but points to a file that does not
|
|
|
|
// exist, we will not fallback to any other methods
|
|
|
|
isDefaultFile = false;
|
|
|
|
} else if (fileExists("fdb.cluster"))
|
|
|
|
f = "fdb.cluster";
|
|
|
|
else
|
|
|
|
f = platform::getDefaultClusterFilePath();
|
|
|
|
|
|
|
|
return std::make_pair( f, isDefaultFile );
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string ClusterConnectionFile::getErrorString( std::pair<std::string, bool> const& resolvedClusterFile, Error const& e ) {
|
|
|
|
bool isDefault = resolvedClusterFile.second;
|
|
|
|
if( e.code() == error_code_connection_string_invalid ) {
|
|
|
|
return format("Invalid cluster file `%s': %d %s", resolvedClusterFile.first.c_str(), e.code(), e.what());
|
|
|
|
} else if( e.code() == error_code_no_cluster_file_found ) {
|
|
|
|
if( isDefault )
|
|
|
|
return format("Unable to read cluster file `./fdb.cluster' or `%s' and %s unset: %d %s",
|
|
|
|
platform::getDefaultClusterFilePath().c_str(), CLUSTER_FILE_ENV_VAR_NAME, e.code(), e.what());
|
|
|
|
else
|
|
|
|
return format("Unable to read cluster file `%s': %d %s", resolvedClusterFile.first.c_str(), e.code(), e.what());
|
|
|
|
} else {
|
|
|
|
return format("Unexpected error loading cluster file `%s': %d %s", resolvedClusterFile.first.c_str(), e.code(), e.what());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ClusterConnectionFile::ClusterConnectionFile( std::string const& filename ) {
|
2018-09-22 06:58:14 +08:00
|
|
|
if( !fileExists( filename ) ) {
|
2017-05-26 04:48:44 +08:00
|
|
|
throw no_cluster_file_found();
|
2018-09-22 06:58:14 +08:00
|
|
|
}
|
2017-05-26 04:48:44 +08:00
|
|
|
|
|
|
|
cs = ClusterConnectionString(readFileBytes(filename, MAX_CLUSTER_FILE_BYTES));
|
|
|
|
this->filename = filename;
|
|
|
|
setConn = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
ClusterConnectionFile::ClusterConnectionFile(std::string const& filename, ClusterConnectionString const& contents) {
|
|
|
|
this->filename = filename;
|
|
|
|
cs = contents;
|
|
|
|
setConn = true;
|
|
|
|
}
|
|
|
|
|
2018-10-23 08:57:09 +08:00
|
|
|
ClusterConnectionString const& ClusterConnectionFile::getConnectionString() const {
|
2017-05-26 04:48:44 +08:00
|
|
|
return cs;
|
|
|
|
}
|
|
|
|
|
|
|
|
void ClusterConnectionFile::notifyConnected() {
|
|
|
|
if (setConn){
|
2017-09-23 06:06:11 +08:00
|
|
|
this->writeFile();
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ClusterConnectionFile::fileContentsUpToDate() const {
|
|
|
|
ClusterConnectionString temp;
|
|
|
|
return fileContentsUpToDate(temp);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ClusterConnectionFile::fileContentsUpToDate(ClusterConnectionString &fileConnectionString) const {
|
|
|
|
try {
|
|
|
|
// the cluster file hasn't been created yet so there's nothing to check
|
|
|
|
if (setConn)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
ClusterConnectionFile temp( filename );
|
|
|
|
fileConnectionString = temp.getConnectionString();
|
|
|
|
return fileConnectionString.toString() == cs.toString();
|
|
|
|
}
|
|
|
|
catch (Error& e) {
|
2018-08-02 05:30:57 +08:00
|
|
|
TraceEvent(SevWarnAlways, "ClusterFileError").error(e).detail("Filename", filename);
|
2017-05-26 04:48:44 +08:00
|
|
|
return false; // Swallow the error and report that the file is out of date
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ClusterConnectionFile::writeFile() {
|
2017-09-23 06:06:11 +08:00
|
|
|
setConn = false;
|
2017-05-26 04:48:44 +08:00
|
|
|
if(filename.size()) {
|
|
|
|
try {
|
|
|
|
atomicReplace( filename, "# DO NOT EDIT!\n# This file is auto-generated, it is not to be edited by hand\n" + cs.toString().append("\n") );
|
|
|
|
if(!fileContentsUpToDate()) {
|
|
|
|
// This should only happen in rare scenarios where multiple processes are updating the same file to different values simultaneously
|
|
|
|
// In that case, we don't have any guarantees about which file will ultimately be written
|
|
|
|
TraceEvent(SevWarnAlways, "ClusterFileChangedAfterReplace").detail("Filename", filename).detail("ConnStr", cs.toString());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
} catch( Error &e ) {
|
2018-08-02 05:30:57 +08:00
|
|
|
TraceEvent(SevWarnAlways, "UnableToChangeConnectionFile").error(e).detail("Filename", filename).detail("ConnStr", cs.toString());
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
void ClusterConnectionFile::setConnectionString( ClusterConnectionString const& conn ) {
|
|
|
|
ASSERT( filename.size() );
|
|
|
|
cs = conn;
|
|
|
|
writeFile();
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string ClusterConnectionString::getErrorString( std::string const& source, Error const& e ) {
|
|
|
|
if( e.code() == error_code_connection_string_invalid ) {
|
|
|
|
return format("Invalid connection string `%s: %d %s", source.c_str(), e.code(), e.what());
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
return format("Unexpected error parsing connection string `%s: %d %s", source.c_str(), e.code(), e.what());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string trim( std::string const& connectionString ) {
|
|
|
|
// Strip out whitespace
|
|
|
|
// Strip out characters between a # and a newline
|
|
|
|
std::string trimmed;
|
|
|
|
auto end = connectionString.end();
|
|
|
|
for(auto c=connectionString.begin(); c!=end; ++c) {
|
|
|
|
if (*c == '#') {
|
|
|
|
++c;
|
|
|
|
while(c!=end && *c != '\n' && *c != '\r')
|
|
|
|
++c;
|
|
|
|
if(c == end)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else if (*c != ' ' && *c != '\n' && *c != '\r' && *c != '\t')
|
|
|
|
trimmed += *c;
|
|
|
|
}
|
|
|
|
return trimmed;
|
|
|
|
}
|
|
|
|
|
|
|
|
ClusterConnectionString::ClusterConnectionString( std::string const& connectionString ) {
|
|
|
|
auto trimmed = trim(connectionString);
|
|
|
|
|
|
|
|
// Split on '@' into key@addrs
|
|
|
|
int pAt = trimmed.find_first_of('@');
|
|
|
|
if (pAt == trimmed.npos)
|
|
|
|
throw connection_string_invalid();
|
|
|
|
std::string key = trimmed.substr(0, pAt);
|
|
|
|
std::string addrs = trimmed.substr(pAt+1);
|
|
|
|
|
|
|
|
parseKey(key);
|
|
|
|
|
|
|
|
coord = NetworkAddress::parseList(addrs);
|
|
|
|
ASSERT( coord.size() > 0 ); // parseList() always returns at least one address if it doesn't throw
|
|
|
|
|
|
|
|
std::sort( coord.begin(), coord.end() );
|
|
|
|
// Check that there are no duplicate addresses
|
|
|
|
if ( std::unique( coord.begin(), coord.end() ) != coord.end() )
|
|
|
|
throw connection_string_invalid();
|
|
|
|
}
|
|
|
|
|
2018-10-06 13:09:58 +08:00
|
|
|
TEST_CASE("/fdbclient/MonitorLeader/parseConnectionString/basic") {
|
2017-05-26 04:48:44 +08:00
|
|
|
std::string input;
|
|
|
|
|
|
|
|
{
|
|
|
|
input = "asdf:2345@1.1.1.1:345";
|
|
|
|
ClusterConnectionString cs(input);
|
|
|
|
ASSERT( input == cs.toString() );
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
input = "0xxdeadbeef:100100100@1.1.1.1:34534,5.1.5.3:23443";
|
|
|
|
ClusterConnectionString cs(input);
|
|
|
|
ASSERT( input == cs.toString() );
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
input = "0xxdeadbeef:100100100@1.1.1.1:34534,5.1.5.3:23443";
|
|
|
|
std::string commented("#start of comment\n");
|
|
|
|
commented += input;
|
|
|
|
commented += "\n";
|
|
|
|
commented += "# asdfasdf ##";
|
|
|
|
|
|
|
|
ClusterConnectionString cs(commented);
|
|
|
|
ASSERT( input == cs.toString() );
|
|
|
|
}
|
|
|
|
|
2019-02-27 10:04:03 +08:00
|
|
|
{
|
|
|
|
input = "0xxdeadbeef:100100100@[::1]:1234,[::1]:1235";
|
|
|
|
std::string commented("#start of comment\n");
|
|
|
|
commented += input;
|
|
|
|
commented += "\n";
|
|
|
|
commented += "# asdfasdf ##";
|
|
|
|
|
|
|
|
ClusterConnectionString cs(commented);
|
|
|
|
ASSERT(input == cs.toString());
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
input = "0xxdeadbeef:100100100@[abcd:dcba::1]:1234,[abcd:dcba::abcd:1]:1234";
|
|
|
|
std::string commented("#start of comment\n");
|
|
|
|
commented += input;
|
|
|
|
commented += "\n";
|
|
|
|
commented += "# asdfasdf ##";
|
|
|
|
|
|
|
|
ClusterConnectionString cs(commented);
|
|
|
|
ASSERT(input == cs.toString());
|
|
|
|
}
|
|
|
|
|
2017-05-26 04:48:44 +08:00
|
|
|
return Void();
|
|
|
|
}
|
|
|
|
|
2019-02-01 04:23:12 +08:00
|
|
|
TEST_CASE("/flow/FlatBuffers/LeaderInfo") {
|
2019-02-01 06:45:42 +08:00
|
|
|
{
|
|
|
|
LeaderInfo in;
|
|
|
|
LeaderInfo out;
|
2019-05-24 00:23:27 +08:00
|
|
|
in.forward = deterministicRandom()->coinflip();
|
|
|
|
in.changeID = deterministicRandom()->randomUniqueID();
|
2019-02-01 06:45:42 +08:00
|
|
|
{
|
2019-05-24 00:23:27 +08:00
|
|
|
std::string rndString(deterministicRandom()->randomInt(10, 400), 'x');
|
2019-02-01 06:45:42 +08:00
|
|
|
for (auto& c : rndString) {
|
2019-05-24 00:23:27 +08:00
|
|
|
c = deterministicRandom()->randomAlphaNumeric();
|
2019-02-01 06:45:42 +08:00
|
|
|
}
|
|
|
|
in.serializedInfo = rndString;
|
|
|
|
}
|
2019-07-17 04:28:29 +08:00
|
|
|
ObjectWriter writer(IncludeVersion());
|
2019-02-01 06:45:42 +08:00
|
|
|
writer.serialize(in);
|
|
|
|
Standalone<StringRef> copy = writer.toStringRef();
|
2019-07-17 04:28:29 +08:00
|
|
|
ArenaObjectReader reader(copy.arena(), copy, IncludeVersion());
|
2019-02-01 06:45:42 +08:00
|
|
|
reader.deserialize(out);
|
|
|
|
ASSERT(in.forward == out.forward);
|
|
|
|
ASSERT(in.changeID == out.changeID);
|
|
|
|
ASSERT(in.serializedInfo == out.serializedInfo);
|
|
|
|
}
|
2019-02-01 04:23:12 +08:00
|
|
|
LeaderInfo leaderInfo;
|
2019-05-24 00:23:27 +08:00
|
|
|
leaderInfo.forward = deterministicRandom()->coinflip();
|
|
|
|
leaderInfo.changeID = deterministicRandom()->randomUniqueID();
|
2019-02-01 04:23:12 +08:00
|
|
|
{
|
2019-05-24 00:23:27 +08:00
|
|
|
std::string rndString(deterministicRandom()->randomInt(10, 400), 'x');
|
2019-02-01 04:23:12 +08:00
|
|
|
for (auto& c : rndString) {
|
2019-05-24 00:23:27 +08:00
|
|
|
c = deterministicRandom()->randomAlphaNumeric();
|
2019-02-01 04:23:12 +08:00
|
|
|
}
|
|
|
|
leaderInfo.serializedInfo = rndString;
|
|
|
|
}
|
2019-02-01 07:07:27 +08:00
|
|
|
ErrorOr<EnsureTable<Optional<LeaderInfo>>> objIn(leaderInfo);
|
|
|
|
ErrorOr<EnsureTable<Optional<LeaderInfo>>> objOut;
|
2019-02-01 04:23:12 +08:00
|
|
|
Standalone<StringRef> copy;
|
2019-07-17 04:28:29 +08:00
|
|
|
ObjectWriter writer(IncludeVersion());
|
2019-02-01 06:45:42 +08:00
|
|
|
writer.serialize(objIn);
|
|
|
|
copy = writer.toStringRef();
|
2019-07-17 04:28:29 +08:00
|
|
|
ArenaObjectReader reader(copy.arena(), copy, IncludeVersion());
|
2019-02-01 04:23:12 +08:00
|
|
|
reader.deserialize(objOut);
|
|
|
|
|
|
|
|
ASSERT(!objOut.isError());
|
2019-02-01 07:07:27 +08:00
|
|
|
ASSERT(objOut.get().asUnderlyingType().present());
|
|
|
|
LeaderInfo outLeader = objOut.get().asUnderlyingType().get();
|
2019-02-01 04:23:12 +08:00
|
|
|
ASSERT(outLeader.changeID == leaderInfo.changeID);
|
|
|
|
ASSERT(outLeader.forward == leaderInfo.forward);
|
|
|
|
ASSERT(outLeader.serializedInfo == leaderInfo.serializedInfo);
|
|
|
|
return Void();
|
|
|
|
}
|
|
|
|
|
2018-10-06 13:09:58 +08:00
|
|
|
TEST_CASE("/fdbclient/MonitorLeader/parseConnectionString/fuzz") {
|
2017-05-26 04:48:44 +08:00
|
|
|
// For a static connection string, add in fuzzed comments and whitespace
|
|
|
|
// SOMEDAY: create a series of random connection strings, rather than the one we started with
|
|
|
|
std::string connectionString = "0xxdeadbeef:100100100@1.1.1.1:34534,5.1.5.3:23443";
|
|
|
|
for(int i=0; i<10000; i++)
|
|
|
|
{
|
|
|
|
std::string output("");
|
|
|
|
auto c=connectionString.begin();
|
|
|
|
while(c!=connectionString.end()) {
|
2019-05-11 05:01:52 +08:00
|
|
|
if(deterministicRandom()->random01() < 0.1) // Add whitespace character
|
|
|
|
output += deterministicRandom()->randomChoice(LiteralStringRef(" \t\n\r"));
|
|
|
|
if(deterministicRandom()->random01() < 0.5) { // Add one of the input characters
|
2017-05-26 04:48:44 +08:00
|
|
|
output += *c;
|
|
|
|
++c;
|
|
|
|
}
|
2019-05-11 05:01:52 +08:00
|
|
|
if(deterministicRandom()->random01() < 0.1) { // Add a comment block
|
2017-05-26 04:48:44 +08:00
|
|
|
output += "#";
|
2019-05-11 05:01:52 +08:00
|
|
|
int charCount = deterministicRandom()->randomInt(0, 20);
|
2017-05-26 04:48:44 +08:00
|
|
|
for(int i = 0; i < charCount; i++) {
|
2019-05-11 05:01:52 +08:00
|
|
|
output += deterministicRandom()->randomChoice(LiteralStringRef("asdfzxcv123345:!@#$#$&()<\"\' \t"));
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
2019-05-11 05:01:52 +08:00
|
|
|
output += deterministicRandom()->randomChoice(LiteralStringRef("\n\r"));
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ClusterConnectionString cs(output);
|
|
|
|
ASSERT( connectionString == cs.toString() );
|
|
|
|
}
|
|
|
|
return Void();
|
|
|
|
}
|
|
|
|
|
|
|
|
ClusterConnectionString::ClusterConnectionString( vector<NetworkAddress> servers, Key key )
|
|
|
|
: coord(servers)
|
|
|
|
{
|
|
|
|
parseKey(key.toString());
|
|
|
|
}
|
|
|
|
|
|
|
|
void ClusterConnectionString::parseKey( std::string const& key ) {
|
|
|
|
// Check the structure of the given key, and fill in this->key and this->keyDesc
|
|
|
|
|
|
|
|
// The key must contain one (and only one) : character
|
|
|
|
int colon = key.find_first_of(':');
|
|
|
|
if (colon == key.npos)
|
|
|
|
throw connection_string_invalid();
|
|
|
|
std::string desc = key.substr(0, colon);
|
|
|
|
std::string id = key.substr(colon+1);
|
|
|
|
|
|
|
|
// Check that description contains only allowed characters (a-z, A-Z, 0-9, _)
|
|
|
|
for(auto c=desc.begin(); c!=desc.end(); ++c)
|
|
|
|
if (!(isalnum(*c) || *c == '_'))
|
|
|
|
throw connection_string_invalid();
|
|
|
|
|
|
|
|
// Check that ID contains only allowed characters (a-z, A-Z, 0-9)
|
|
|
|
for(auto c=id.begin(); c!=id.end(); ++c)
|
|
|
|
if (!isalnum(*c))
|
|
|
|
throw connection_string_invalid();
|
|
|
|
|
|
|
|
this->key = StringRef(key);
|
|
|
|
this->keyDesc = StringRef(desc);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string ClusterConnectionString::toString() const {
|
|
|
|
std::string s = key.toString();
|
|
|
|
s += '@';
|
|
|
|
for(int i=0; i<coord.size(); i++) {
|
|
|
|
if (i) s += ',';
|
|
|
|
s += coord[i].toString();
|
|
|
|
}
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
ClientCoordinators::ClientCoordinators( Reference<ClusterConnectionFile> ccf )
|
|
|
|
: ccf(ccf)
|
|
|
|
{
|
|
|
|
ClusterConnectionString cs = ccf->getConnectionString();
|
|
|
|
for(auto s = cs.coordinators().begin(); s != cs.coordinators().end(); ++s)
|
|
|
|
clientLeaderServers.push_back( ClientLeaderRegInterface( *s ) );
|
|
|
|
clusterKey = cs.clusterKey();
|
|
|
|
}
|
|
|
|
|
|
|
|
UID WLTOKEN_CLIENTLEADERREG_GETLEADER( -1, 2 );
|
2019-07-24 10:22:44 +08:00
|
|
|
UID WLTOKEN_CLIENTLEADERREG_OPENDATABASE( -1, 3 );
|
2017-05-26 04:48:44 +08:00
|
|
|
|
|
|
|
ClientLeaderRegInterface::ClientLeaderRegInterface( NetworkAddress remote )
|
2019-07-24 10:22:44 +08:00
|
|
|
: getLeader( Endpoint({remote}, WLTOKEN_CLIENTLEADERREG_GETLEADER) ),
|
|
|
|
openDatabase( Endpoint({remote}, WLTOKEN_CLIENTLEADERREG_OPENDATABASE) )
|
2017-05-26 04:48:44 +08:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
ClientLeaderRegInterface::ClientLeaderRegInterface( INetwork* local ) {
|
2019-06-25 17:47:35 +08:00
|
|
|
getLeader.makeWellKnownEndpoint( WLTOKEN_CLIENTLEADERREG_GETLEADER, TaskPriority::Coordination );
|
2019-07-24 10:22:44 +08:00
|
|
|
openDatabase.makeWellKnownEndpoint( WLTOKEN_CLIENTLEADERREG_OPENDATABASE, TaskPriority::Coordination );
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
|
|
|
|
2019-03-06 13:00:19 +08:00
|
|
|
// Nominee is the worker among all workers that are considered as leader by a coordinator
|
|
|
|
// This function contacts a coordinator coord to ask if the worker is considered as a leader (i.e., if the worker
|
|
|
|
// is a nominee)
|
2019-07-24 10:22:44 +08:00
|
|
|
ACTOR Future<Void> monitorNominee( Key key, ClientLeaderRegInterface coord, AsyncTrigger* nomineeChange, Optional<LeaderInfo> *info ) {
|
2017-05-26 04:48:44 +08:00
|
|
|
loop {
|
2019-06-25 17:47:35 +08:00
|
|
|
state Optional<LeaderInfo> li = wait( retryBrokenPromise( coord.getLeader, GetLeaderRequest( key, info->present() ? info->get().changeID : UID() ), TaskPriority::CoordinationReply ) );
|
2018-08-11 04:57:10 +08:00
|
|
|
wait( Future<Void>(Void()) ); // Make sure we weren't cancelled
|
2017-09-23 06:06:11 +08:00
|
|
|
|
2019-07-27 04:23:56 +08:00
|
|
|
TraceEvent("GetLeaderReply").suppressFor(1.0).detail("Coordinator", coord.getLeader.getEndpoint().getPrimaryAddress()).detail("Nominee", li.present() ? li.get().changeID : UID()).detail("ClusterKey", key.printable());
|
2017-05-26 04:48:44 +08:00
|
|
|
|
2017-09-21 08:42:12 +08:00
|
|
|
if (li != *info) {
|
|
|
|
*info = li;
|
|
|
|
nomineeChange->trigger();
|
2017-05-26 04:48:44 +08:00
|
|
|
|
|
|
|
if( li.present() && li.get().forward )
|
2018-08-11 04:57:10 +08:00
|
|
|
wait( Future<Void>(Never()) );
|
|
|
|
wait( Future<Void>(Void()) );
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Also used in fdbserver/LeaderElection.actor.cpp!
|
2018-05-31 07:48:04 +08:00
|
|
|
// bool represents if the LeaderInfo is a majority answer or not.
|
2018-06-02 09:23:24 +08:00
|
|
|
// This function also masks the first 7 bits of changeId of the nominees and returns the Leader with masked changeId
|
|
|
|
Optional<std::pair<LeaderInfo, bool>> getLeader( const vector<Optional<LeaderInfo>>& nominees ) {
|
|
|
|
vector<LeaderInfo> maskedNominees;
|
|
|
|
maskedNominees.reserve(nominees.size());
|
|
|
|
for (auto &nominee : nominees) {
|
|
|
|
if (nominee.present()) {
|
|
|
|
maskedNominees.push_back(nominee.get());
|
|
|
|
maskedNominees.back().changeID = UID(maskedNominees.back().changeID.first() & LeaderInfo::mask, maskedNominees.back().changeID.second());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-26 04:48:44 +08:00
|
|
|
// If any coordinator says that the quorum is forwarded, then it is
|
2018-06-02 09:23:24 +08:00
|
|
|
for(int i=0; i<maskedNominees.size(); i++)
|
|
|
|
if (maskedNominees[i].forward)
|
|
|
|
return std::pair<LeaderInfo, bool>(maskedNominees[i], true);
|
2017-05-26 04:48:44 +08:00
|
|
|
|
2018-06-02 09:23:24 +08:00
|
|
|
if(!maskedNominees.size())
|
2018-05-31 07:48:04 +08:00
|
|
|
return Optional<std::pair<LeaderInfo, bool>>();
|
|
|
|
|
2018-06-02 09:23:24 +08:00
|
|
|
std::sort(maskedNominees.begin(), maskedNominees.end(),
|
|
|
|
[](const LeaderInfo& l, const LeaderInfo& r) { return l.changeID < r.changeID; });
|
2018-05-31 07:48:04 +08:00
|
|
|
|
2017-11-28 07:08:03 +08:00
|
|
|
int bestCount = 0;
|
2018-06-02 09:23:24 +08:00
|
|
|
LeaderInfo bestNominee;
|
|
|
|
LeaderInfo currentNominee;
|
2018-05-31 07:48:04 +08:00
|
|
|
int curCount = 0;
|
2018-06-02 09:23:24 +08:00
|
|
|
for (int i = 0; i < maskedNominees.size(); i++) {
|
2018-06-02 09:33:29 +08:00
|
|
|
if (currentNominee == maskedNominees[i]) {
|
2018-06-02 09:23:24 +08:00
|
|
|
curCount++;
|
|
|
|
}
|
|
|
|
else {
|
2018-05-31 07:48:04 +08:00
|
|
|
if (curCount > bestCount) {
|
|
|
|
bestNominee = currentNominee;
|
|
|
|
bestCount = curCount;
|
2017-11-28 07:08:03 +08:00
|
|
|
}
|
2018-06-02 09:23:24 +08:00
|
|
|
currentNominee = maskedNominees[i];
|
|
|
|
curCount = 1;
|
2017-11-28 07:08:03 +08:00
|
|
|
}
|
|
|
|
}
|
2018-06-02 09:23:24 +08:00
|
|
|
if (curCount > bestCount) {
|
|
|
|
bestNominee = currentNominee;
|
|
|
|
bestCount = curCount;
|
|
|
|
}
|
2017-11-28 07:08:03 +08:00
|
|
|
|
2018-06-02 09:33:29 +08:00
|
|
|
bool majority = bestCount >= nominees.size() / 2 + 1;
|
|
|
|
return std::pair<LeaderInfo, bool>(bestNominee, majority);
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
|
|
|
|
2017-09-23 06:06:11 +08:00
|
|
|
struct MonitorLeaderInfo {
|
|
|
|
bool hasConnected;
|
|
|
|
Reference<ClusterConnectionFile> intermediateConnFile;
|
2017-05-26 04:48:44 +08:00
|
|
|
|
2019-07-24 10:22:44 +08:00
|
|
|
MonitorLeaderInfo() : hasConnected(false) {}
|
|
|
|
explicit MonitorLeaderInfo( Reference<ClusterConnectionFile> intermediateConnFile ) : intermediateConnFile(intermediateConnFile), hasConnected(false) {}
|
2017-09-23 06:06:11 +08:00
|
|
|
};
|
|
|
|
|
2019-03-06 13:00:19 +08:00
|
|
|
// Leader is the process that will be elected by coordinators as the cluster controller
|
2019-07-24 10:22:44 +08:00
|
|
|
ACTOR Future<MonitorLeaderInfo> monitorLeaderOneGeneration( Reference<ClusterConnectionFile> connFile, Reference<AsyncVar<Value>> outSerializedLeaderInfo, MonitorLeaderInfo info ) {
|
2017-09-23 06:06:11 +08:00
|
|
|
state ClientCoordinators coordinators( info.intermediateConnFile );
|
|
|
|
state AsyncTrigger nomineeChange;
|
|
|
|
state std::vector<Optional<LeaderInfo>> nominees;
|
|
|
|
state Future<Void> allActors;
|
|
|
|
|
|
|
|
nominees.resize(coordinators.clientLeaderServers.size());
|
2017-05-26 04:48:44 +08:00
|
|
|
|
2017-09-23 06:06:11 +08:00
|
|
|
std::vector<Future<Void>> actors;
|
2019-03-06 13:00:19 +08:00
|
|
|
// Ask all coordinators if the worker is considered as a leader (leader nominee) by the coordinator.
|
2017-09-23 06:06:11 +08:00
|
|
|
for(int i=0; i<coordinators.clientLeaderServers.size(); i++)
|
2019-07-24 10:22:44 +08:00
|
|
|
actors.push_back( monitorNominee( coordinators.clusterKey, coordinators.clientLeaderServers[i], &nomineeChange, &nominees[i] ) );
|
2017-09-23 06:06:11 +08:00
|
|
|
allActors = waitForAll(actors);
|
2017-05-26 04:48:44 +08:00
|
|
|
|
2017-09-23 06:06:11 +08:00
|
|
|
loop {
|
2018-05-31 07:48:04 +08:00
|
|
|
Optional<std::pair<LeaderInfo, bool>> leader = getLeader(nominees);
|
|
|
|
TraceEvent("MonitorLeaderChange").detail("NewLeader", leader.present() ? leader.get().first.changeID : UID(1,1));
|
2017-09-23 06:06:11 +08:00
|
|
|
if (leader.present()) {
|
2018-05-31 07:48:04 +08:00
|
|
|
if( leader.get().first.forward ) {
|
|
|
|
TraceEvent("MonitorLeaderForwarding").detail("NewConnStr", leader.get().first.serializedInfo.toString()).detail("OldConnStr", info.intermediateConnFile->getConnectionString().toString());
|
|
|
|
info.intermediateConnFile = Reference<ClusterConnectionFile>(new ClusterConnectionFile(connFile->getFilename(), ClusterConnectionString(leader.get().first.serializedInfo.toString())));
|
2017-09-23 06:06:11 +08:00
|
|
|
return info;
|
|
|
|
}
|
|
|
|
if(connFile != info.intermediateConnFile) {
|
|
|
|
if(!info.hasConnected) {
|
|
|
|
TraceEvent(SevWarnAlways, "IncorrectClusterFileContentsAtConnection").detail("Filename", connFile->getFilename())
|
|
|
|
.detail("ConnectionStringFromFile", connFile->getConnectionString().toString())
|
|
|
|
.detail("CurrentConnectionString", info.intermediateConnFile->getConnectionString().toString());
|
|
|
|
}
|
|
|
|
connFile->setConnectionString(info.intermediateConnFile->getConnectionString());
|
|
|
|
info.intermediateConnFile = connFile;
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
|
|
|
|
2017-09-23 06:06:11 +08:00
|
|
|
info.hasConnected = true;
|
|
|
|
connFile->notifyConnected();
|
|
|
|
|
2018-05-31 07:48:04 +08:00
|
|
|
outSerializedLeaderInfo->set( leader.get().first.serializedInfo );
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
2018-08-11 04:57:10 +08:00
|
|
|
wait( nomineeChange.onTrigger() || allActors );
|
2017-09-23 06:06:11 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-24 10:22:44 +08:00
|
|
|
ACTOR Future<Void> monitorLeaderInternal( Reference<ClusterConnectionFile> connFile, Reference<AsyncVar<Value>> outSerializedLeaderInfo ) {
|
2017-09-23 06:06:11 +08:00
|
|
|
state MonitorLeaderInfo info(connFile);
|
|
|
|
loop {
|
2019-07-24 10:22:44 +08:00
|
|
|
MonitorLeaderInfo _info = wait( monitorLeaderOneGeneration( connFile, outSerializedLeaderInfo, info ) );
|
2017-09-23 06:06:11 +08:00
|
|
|
info = _info;
|
2017-05-26 04:48:44 +08:00
|
|
|
}
|
|
|
|
}
|
2019-01-30 03:51:37 +08:00
|
|
|
|
|
|
|
ACTOR Future<Void> asyncDeserializeClusterInterface(Reference<AsyncVar<Value>> serializedInfo,
|
2019-04-12 04:24:00 +08:00
|
|
|
Reference<AsyncVar<Optional<ClusterInterface>>> outKnownLeader) {
|
2019-01-30 03:51:37 +08:00
|
|
|
state Reference<AsyncVar<Optional<ClusterControllerClientInterface>>> knownLeader(
|
2019-04-12 04:24:00 +08:00
|
|
|
new AsyncVar<Optional<ClusterControllerClientInterface>>{});
|
2019-08-07 00:25:40 +08:00
|
|
|
state Future<Void> deserializer = asyncDeserialize(serializedInfo, knownLeader, FLOW_KNOBS->USE_OBJECT_SERIALIZER);
|
2019-01-30 03:51:37 +08:00
|
|
|
loop {
|
|
|
|
choose {
|
|
|
|
when(wait(deserializer)) { UNSTOPPABLE_ASSERT(false); }
|
|
|
|
when(wait(knownLeader->onChange())) {
|
|
|
|
if (knownLeader->get().present()) {
|
|
|
|
outKnownLeader->set(knownLeader->get().get().clientInterface);
|
|
|
|
} else {
|
|
|
|
outKnownLeader->set(Optional<ClusterInterface>{});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-07-24 10:22:44 +08:00
|
|
|
|
2019-07-26 08:15:31 +08:00
|
|
|
struct ClientStatusStats {
|
|
|
|
int count;
|
|
|
|
std::vector<std::pair<NetworkAddress,Key>> examples;
|
|
|
|
|
|
|
|
ClientStatusStats() : count(0) {
|
|
|
|
examples.reserve(CLIENT_KNOBS->CLIENT_EXAMPLE_AMOUNT);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-07-24 10:22:44 +08:00
|
|
|
OpenDatabaseRequest ClientData::getRequest() {
|
|
|
|
OpenDatabaseRequest req;
|
2019-07-26 08:15:31 +08:00
|
|
|
|
|
|
|
std::map<StringRef, ClientStatusStats> issueMap;
|
|
|
|
std::map<ClientVersionRef, ClientStatusStats> versionMap;
|
|
|
|
std::map<StringRef, ClientStatusStats> maxProtocolMap;
|
2019-08-14 06:54:40 +08:00
|
|
|
int clientCount = 0;
|
2019-07-26 08:15:31 +08:00
|
|
|
|
2019-07-27 04:23:56 +08:00
|
|
|
//SOMEDAY: add a yield in this loop
|
2019-07-26 08:15:31 +08:00
|
|
|
for(auto& ci : clientStatusInfoMap) {
|
|
|
|
for(auto& it : ci.second.issues) {
|
|
|
|
auto& entry = issueMap[it];
|
|
|
|
entry.count++;
|
|
|
|
if(entry.examples.size() < CLIENT_KNOBS->CLIENT_EXAMPLE_AMOUNT) {
|
|
|
|
entry.examples.push_back(std::make_pair(ci.first, ci.second.traceLogGroup));
|
|
|
|
}
|
|
|
|
}
|
2019-08-14 06:54:40 +08:00
|
|
|
if(ci.second.versions.size()) {
|
|
|
|
clientCount++;
|
|
|
|
StringRef maxProtocol;
|
|
|
|
for(auto& it : ci.second.versions) {
|
|
|
|
maxProtocol = std::max(maxProtocol, it.protocolVersion);
|
|
|
|
auto& entry = versionMap[it];
|
|
|
|
entry.count++;
|
|
|
|
if(entry.examples.size() < CLIENT_KNOBS->CLIENT_EXAMPLE_AMOUNT) {
|
|
|
|
entry.examples.push_back(std::make_pair(ci.first, ci.second.traceLogGroup));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
auto& maxEntry = maxProtocolMap[maxProtocol];
|
|
|
|
maxEntry.count++;
|
|
|
|
if(maxEntry.examples.size() < CLIENT_KNOBS->CLIENT_EXAMPLE_AMOUNT) {
|
|
|
|
maxEntry.examples.push_back(std::make_pair(ci.first, ci.second.traceLogGroup));
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
auto& entry = versionMap[ClientVersionRef()];
|
2019-07-26 08:15:31 +08:00
|
|
|
entry.count++;
|
|
|
|
if(entry.examples.size() < CLIENT_KNOBS->CLIENT_EXAMPLE_AMOUNT) {
|
|
|
|
entry.examples.push_back(std::make_pair(ci.first, ci.second.traceLogGroup));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
req.issues.reserve(issueMap.size());
|
|
|
|
for(auto& it : issueMap) {
|
|
|
|
req.issues.push_back(ItemWithExamples<Key>(it.first, it.second.count, it.second.examples));
|
|
|
|
}
|
|
|
|
req.supportedVersions.reserve(versionMap.size());
|
|
|
|
for(auto& it : versionMap) {
|
|
|
|
req.supportedVersions.push_back(ItemWithExamples<Standalone<ClientVersionRef>>(it.first, it.second.count, it.second.examples));
|
|
|
|
}
|
|
|
|
req.maxProtocolSupported.reserve(maxProtocolMap.size());
|
|
|
|
for(auto& it : maxProtocolMap) {
|
|
|
|
req.maxProtocolSupported.push_back(ItemWithExamples<Key>(it.first, it.second.count, it.second.examples));
|
|
|
|
}
|
2019-08-14 06:54:40 +08:00
|
|
|
req.clientCount = clientCount;
|
2019-07-26 08:15:31 +08:00
|
|
|
|
2019-07-24 10:22:44 +08:00
|
|
|
return req;
|
|
|
|
}
|
|
|
|
|
|
|
|
ACTOR Future<Void> getClientInfoFromLeader( Reference<AsyncVar<Optional<ClusterControllerClientInterface>>> knownLeader, ClientData* clientData ) {
|
|
|
|
while( !knownLeader->get().present() ) {
|
|
|
|
wait( knownLeader->onChange() );
|
|
|
|
}
|
|
|
|
|
2019-07-26 08:15:31 +08:00
|
|
|
state double lastRequestTime = now();
|
|
|
|
state OpenDatabaseRequest req = clientData->getRequest();
|
|
|
|
|
2019-07-24 10:22:44 +08:00
|
|
|
loop {
|
2019-07-26 08:15:31 +08:00
|
|
|
if(now() - lastRequestTime > CLIENT_KNOBS->MAX_CLIENT_STATUS_AGE) {
|
2019-07-27 04:23:56 +08:00
|
|
|
lastRequestTime = now();
|
2019-07-26 08:15:31 +08:00
|
|
|
req = clientData->getRequest();
|
|
|
|
} else {
|
|
|
|
resetReply(req);
|
|
|
|
}
|
2019-09-12 06:19:42 +08:00
|
|
|
req.knownClientInfoID = clientData->clientInfo->get().read().id;
|
2019-07-24 10:22:44 +08:00
|
|
|
choose {
|
2019-07-31 08:19:33 +08:00
|
|
|
when( ClientDBInfo ni = wait( brokenPromiseToNever( knownLeader->get().get().clientInterface.openDatabase.getReply( req ) ) ) ) {
|
2019-07-25 06:07:41 +08:00
|
|
|
TraceEvent("MonitorLeaderForProxiesGotClientInfo", knownLeader->get().get().clientInterface.id()).detail("Proxy0", ni.proxies.size() ? ni.proxies[0].id() : UID()).detail("ClientID", ni.id);
|
2019-09-12 06:19:42 +08:00
|
|
|
clientData->clientInfo->set(CachedSerialization<ClientDBInfo>(ni));
|
2019-07-24 10:22:44 +08:00
|
|
|
}
|
|
|
|
when( wait( knownLeader->onChange() ) ) {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-26 08:15:31 +08:00
|
|
|
ACTOR Future<Void> monitorLeaderForProxies( Key clusterKey, vector<NetworkAddress> coordinators, ClientData* clientData ) {
|
2019-07-24 10:22:44 +08:00
|
|
|
state vector< ClientLeaderRegInterface > clientLeaderServers;
|
|
|
|
state AsyncTrigger nomineeChange;
|
|
|
|
state std::vector<Optional<LeaderInfo>> nominees;
|
|
|
|
state Future<Void> allActors;
|
|
|
|
state Reference<AsyncVar<Optional<ClusterControllerClientInterface>>> knownLeader(new AsyncVar<Optional<ClusterControllerClientInterface>>{});
|
|
|
|
|
2019-07-26 08:15:31 +08:00
|
|
|
for(auto s = coordinators.begin(); s != coordinators.end(); ++s) {
|
2019-07-25 06:07:41 +08:00
|
|
|
clientLeaderServers.push_back( ClientLeaderRegInterface( *s ) );
|
|
|
|
}
|
2019-07-24 10:22:44 +08:00
|
|
|
|
2019-07-25 06:07:41 +08:00
|
|
|
nominees.resize(clientLeaderServers.size());
|
|
|
|
|
|
|
|
std::vector<Future<Void>> actors;
|
|
|
|
// Ask all coordinators if the worker is considered as a leader (leader nominee) by the coordinator.
|
|
|
|
for(int i=0; i<clientLeaderServers.size(); i++) {
|
2019-07-26 08:15:31 +08:00
|
|
|
actors.push_back( monitorNominee( clusterKey, clientLeaderServers[i], &nomineeChange, &nominees[i] ) );
|
2019-07-25 06:07:41 +08:00
|
|
|
}
|
|
|
|
actors.push_back( getClientInfoFromLeader( knownLeader, clientData ) );
|
|
|
|
allActors = waitForAll(actors);
|
2019-07-24 10:22:44 +08:00
|
|
|
|
2019-07-25 06:07:41 +08:00
|
|
|
loop {
|
|
|
|
Optional<std::pair<LeaderInfo, bool>> leader = getLeader(nominees);
|
2019-07-26 08:15:31 +08:00
|
|
|
TraceEvent("MonitorLeaderForProxiesChange").detail("NewLeader", leader.present() ? leader.get().first.changeID : UID(1,1)).detail("Key", clusterKey.printable());
|
2019-07-25 06:07:41 +08:00
|
|
|
if (leader.present()) {
|
|
|
|
if( leader.get().first.forward ) {
|
|
|
|
ClientDBInfo outInfo;
|
|
|
|
outInfo.id = deterministicRandom()->randomUniqueID();
|
|
|
|
outInfo.forward = leader.get().first.serializedInfo;
|
2019-09-12 06:19:42 +08:00
|
|
|
clientData->clientInfo->set(CachedSerialization<ClientDBInfo>(outInfo));
|
2019-07-26 08:15:31 +08:00
|
|
|
TraceEvent("MonitorLeaderForProxiesForwarding").detail("NewConnStr", leader.get().first.serializedInfo.toString());
|
2019-07-25 06:07:41 +08:00
|
|
|
return Void();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (leader.get().first.serializedInfo.size()) {
|
2019-08-07 00:25:40 +08:00
|
|
|
if (FLOW_KNOBS->USE_OBJECT_SERIALIZER) {
|
2019-07-27 06:23:36 +08:00
|
|
|
ObjectReader reader(leader.get().first.serializedInfo.begin(), IncludeVersion());
|
2019-07-25 06:07:41 +08:00
|
|
|
ClusterControllerClientInterface res;
|
|
|
|
reader.deserialize(res);
|
|
|
|
knownLeader->set(res);
|
|
|
|
} else {
|
|
|
|
ClusterControllerClientInterface res = BinaryReader::fromStringRef<ClusterControllerClientInterface>( leader.get().first.serializedInfo, IncludeVersion() );
|
|
|
|
knownLeader->set(res);
|
2019-07-24 10:22:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-07-25 06:07:41 +08:00
|
|
|
wait( nomineeChange.onTrigger() || allActors );
|
2019-07-24 10:22:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-11 04:20:30 +08:00
|
|
|
void shrinkProxyList( ClientDBInfo& ni, std::vector<UID>& lastProxyUIDs, std::vector<MasterProxyInterface>& lastProxies ) {
|
2020-01-11 07:58:36 +08:00
|
|
|
if(ni.proxies.size() > CLIENT_KNOBS->MAX_PROXY_CONNECTIONS) {
|
2020-01-11 04:20:30 +08:00
|
|
|
std::vector<UID> proxyUIDs;
|
|
|
|
for(auto& proxy : ni.proxies) {
|
|
|
|
proxyUIDs.push_back(proxy.id());
|
|
|
|
}
|
|
|
|
if(proxyUIDs != lastProxyUIDs) {
|
|
|
|
lastProxyUIDs = proxyUIDs;
|
|
|
|
lastProxies = ni.proxies;
|
|
|
|
deterministicRandom()->randomShuffle(lastProxies);
|
2020-01-11 07:58:36 +08:00
|
|
|
lastProxies.resize(CLIENT_KNOBS->MAX_PROXY_CONNECTIONS);
|
2020-01-11 04:20:30 +08:00
|
|
|
for(int i = 0; i < lastProxies.size(); i++) {
|
2020-01-11 07:58:36 +08:00
|
|
|
TraceEvent("ConnectedProxy").detail("Proxy", lastProxies[i].id());
|
2020-01-11 04:20:30 +08:00
|
|
|
}
|
|
|
|
}
|
2020-02-26 04:34:31 +08:00
|
|
|
ni.firstProxy = ni.proxies[0];
|
2020-01-11 04:20:30 +08:00
|
|
|
ni.proxies = lastProxies;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-24 10:22:44 +08:00
|
|
|
// Leader is the process that will be elected by coordinators as the cluster controller
|
2019-07-26 08:15:31 +08:00
|
|
|
ACTOR Future<MonitorLeaderInfo> monitorProxiesOneGeneration( Reference<ClusterConnectionFile> connFile, Reference<AsyncVar<ClientDBInfo>> clientInfo, MonitorLeaderInfo info, Standalone<VectorRef<ClientVersionRef>> supportedVersions, Key traceLogGroup) {
|
2019-07-24 10:22:44 +08:00
|
|
|
state ClusterConnectionString cs = info.intermediateConnFile->getConnectionString();
|
|
|
|
state vector<NetworkAddress> addrs = cs.coordinators();
|
|
|
|
state int idx = 0;
|
|
|
|
state int successIdx = 0;
|
2019-07-26 08:15:31 +08:00
|
|
|
state Optional<double> incorrectTime;
|
2019-07-31 08:15:24 +08:00
|
|
|
state std::vector<UID> lastProxyUIDs;
|
2019-08-01 07:06:51 +08:00
|
|
|
state std::vector<MasterProxyInterface> lastProxies;
|
2019-07-31 08:15:24 +08:00
|
|
|
|
2019-07-24 10:22:44 +08:00
|
|
|
deterministicRandom()->randomShuffle(addrs);
|
2019-07-25 06:07:41 +08:00
|
|
|
loop {
|
|
|
|
state ClientLeaderRegInterface clientLeaderServer( addrs[idx] );
|
|
|
|
state OpenDatabaseCoordRequest req;
|
2019-07-27 04:23:56 +08:00
|
|
|
req.clusterKey = cs.clusterKey();
|
2019-07-26 08:15:31 +08:00
|
|
|
req.coordinators = cs.coordinators();
|
2019-07-25 06:07:41 +08:00
|
|
|
req.knownClientInfoID = clientInfo->get().id;
|
2019-07-26 08:15:31 +08:00
|
|
|
req.supportedVersions = supportedVersions;
|
|
|
|
req.traceLogGroup = traceLogGroup;
|
|
|
|
|
|
|
|
ClusterConnectionString fileConnectionString;
|
|
|
|
if (connFile && !connFile->fileContentsUpToDate(fileConnectionString)) {
|
|
|
|
req.issues.push_back_deep(req.issues.arena(), LiteralStringRef("incorrect_cluster_file_contents"));
|
|
|
|
std::string connectionString = connFile->getConnectionString().toString();
|
|
|
|
if(!incorrectTime.present()) {
|
|
|
|
incorrectTime = now();
|
|
|
|
}
|
|
|
|
if(connFile->canGetFilename()) {
|
|
|
|
// Don't log a SevWarnAlways initially to account for transient issues (e.g. someone else changing the file right before us)
|
|
|
|
TraceEvent(now() - incorrectTime.get() > 300 ? SevWarnAlways : SevWarn, "IncorrectClusterFileContents")
|
|
|
|
.detail("Filename", connFile->getFilename())
|
|
|
|
.detail("ConnectionStringFromFile", fileConnectionString.toString())
|
|
|
|
.detail("CurrentConnectionString", connectionString);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
incorrectTime = Optional<double>();
|
|
|
|
}
|
2019-07-25 06:07:41 +08:00
|
|
|
|
2019-09-12 06:19:42 +08:00
|
|
|
state ErrorOr<CachedSerialization<ClientDBInfo>> rep = wait( clientLeaderServer.openDatabase.tryGetReply( req, TaskPriority::CoordinationReply ) );
|
2019-07-25 06:07:41 +08:00
|
|
|
if (rep.present()) {
|
2019-09-12 06:19:42 +08:00
|
|
|
if( rep.get().read().forward.present() ) {
|
|
|
|
TraceEvent("MonitorProxiesForwarding").detail("NewConnStr", rep.get().read().forward.get().toString()).detail("OldConnStr", info.intermediateConnFile->getConnectionString().toString());
|
|
|
|
info.intermediateConnFile = Reference<ClusterConnectionFile>(new ClusterConnectionFile(connFile->getFilename(), ClusterConnectionString(rep.get().read().forward.get().toString())));
|
2019-07-25 06:07:41 +08:00
|
|
|
return info;
|
|
|
|
}
|
|
|
|
if(connFile != info.intermediateConnFile) {
|
|
|
|
if(!info.hasConnected) {
|
|
|
|
TraceEvent(SevWarnAlways, "IncorrectClusterFileContentsAtConnection").detail("Filename", connFile->getFilename())
|
|
|
|
.detail("ConnectionStringFromFile", connFile->getConnectionString().toString())
|
|
|
|
.detail("CurrentConnectionString", info.intermediateConnFile->getConnectionString().toString());
|
2019-07-24 10:22:44 +08:00
|
|
|
}
|
2019-07-25 06:07:41 +08:00
|
|
|
connFile->setConnectionString(info.intermediateConnFile->getConnectionString());
|
|
|
|
info.intermediateConnFile = connFile;
|
|
|
|
}
|
2019-07-24 10:22:44 +08:00
|
|
|
|
2019-07-25 06:07:41 +08:00
|
|
|
info.hasConnected = true;
|
|
|
|
connFile->notifyConnected();
|
2019-07-24 10:22:44 +08:00
|
|
|
|
2019-09-12 06:19:42 +08:00
|
|
|
auto& ni = rep.get().mutate();
|
2020-01-11 04:20:30 +08:00
|
|
|
shrinkProxyList(ni, lastProxyUIDs, lastProxies);
|
|
|
|
clientInfo->set( ni );
|
2019-07-25 06:07:41 +08:00
|
|
|
successIdx = idx;
|
|
|
|
} else if(idx == successIdx) {
|
|
|
|
wait(delay(CLIENT_KNOBS->COORDINATOR_RECONNECTION_DELAY));
|
2019-07-24 10:22:44 +08:00
|
|
|
}
|
2019-07-25 06:07:41 +08:00
|
|
|
idx = (idx+1)%addrs.size();
|
2019-07-24 10:22:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-27 06:05:02 +08:00
|
|
|
ACTOR Future<Void> monitorProxies( Reference<AsyncVar<Reference<ClusterConnectionFile>>> connFile, Reference<AsyncVar<ClientDBInfo>> clientInfo, Standalone<VectorRef<ClientVersionRef>> supportedVersions, Key traceLogGroup ) {
|
|
|
|
state MonitorLeaderInfo info(connFile->get());
|
2019-07-24 10:22:44 +08:00
|
|
|
loop {
|
2019-07-27 06:05:02 +08:00
|
|
|
choose {
|
|
|
|
when(MonitorLeaderInfo _info = wait( monitorProxiesOneGeneration( connFile->get(), clientInfo, info, supportedVersions, traceLogGroup ) )) {
|
|
|
|
info = _info;
|
|
|
|
}
|
|
|
|
when(wait(connFile->onChange())) {
|
|
|
|
info.hasConnected = false;
|
|
|
|
info.intermediateConnFile = connFile->get();
|
|
|
|
}
|
|
|
|
}
|
2019-07-24 10:22:44 +08:00
|
|
|
}
|
|
|
|
}
|