// client.cpp
/**
* Copyright (C) 2009 10gen Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see .
*/
/* Client represents a connection to the database (the server-side) and corresponds
to an open socket (or logical connection if pooling on sockets) from a client.
*/
#include "pch.h"
#include "db.h"
#include "client.h"
#include "curop.h"
#include "json.h"
#include "security.h"
#include "commands.h"
#include "instance.h"
#include "../s/d_logic.h"
#include "dbwebserver.h"
#include "../util/mongoutils/html.h"
#include "../util/mongoutils/checksum.h"
namespace mongo {
mongo::mutex Client::clientsMutex("clientsMutex");
set Client::clients; // always be in clientsMutex when manipulating this
boost::thread_specific_ptr currentClient;
Client::Client(const char *desc) :
_context(0),
_shutdown(false),
_desc(desc),
_god(0),
_lastOp(0)
{
_curOp = new CurOp( this );
scoped_lock bl(clientsMutex);
clients.insert(this);
}
Client::~Client() {
delete _curOp;
_god = 0;
if ( _context )
cout << "ERROR: Client::~Client _context should be NULL: " << _desc << endl;
if ( !_shutdown )
cout << "ERROR: Client::shutdown not called: " << _desc << endl;
}
void Client::_dropns( const string& ns ){
Top::global.collectionDropped( ns );
dblock l;
Client::Context ctx( ns );
if ( ! nsdetails( ns.c_str() ) )
return;
try {
string err;
BSONObjBuilder b;
dropCollection( ns , err , b );
}
catch ( ... ){
log() << "error dropping temp collection: " << ns << endl;
}
}
void Client::_invalidateDB( const string& db ) {
assert( db.find( '.' ) == string::npos );
set::iterator min = _tempCollections.lower_bound( db + "." );
set::iterator max = _tempCollections.lower_bound( db + "|" );
_tempCollections.erase( min , max );
}
void Client::invalidateDB(const string& db) {
scoped_lock bl(clientsMutex);
for ( set::iterator i = clients.begin(); i!=clients.end(); i++ ){
Client* cli = *i;
cli->_invalidateDB(db);
}
}
void Client::invalidateNS( const string& ns ){
scoped_lock bl(clientsMutex);
for ( set::iterator i = clients.begin(); i!=clients.end(); i++ ){
Client* cli = *i;
cli->_tempCollections.erase( ns );
}
}
void Client::addTempCollection( const string& ns ) {
_tempCollections.insert( ns );
}
bool Client::shutdown(){
_shutdown = true;
if ( inShutdown() )
return false;
{
scoped_lock bl(clientsMutex);
clients.erase(this);
}
bool didAnything = false;
if ( _tempCollections.size() ){
didAnything = true;
for ( set::iterator i = _tempCollections.begin(); i!=_tempCollections.end(); i++ ){
_dropns( *i );
}
_tempCollections.clear();
}
return didAnything;
}
BSONObj CurOp::_tooBig = fromjson("{\"$msg\":\"query not recording (too large)\"}");
AtomicUInt CurOp::_nextOpNum;
Client::Context::Context( string ns , Database * db, bool doauth )
: _client( currentClient.get() ) , _oldContext( _client->_context ) ,
_path( dbpath ) , _lock(0) , _justCreated(false) {
assert( db && db->isOk() );
_ns = ns;
_db = db;
_client->_context = this;
if ( doauth )
_auth();
}
void Client::Context::_finishInit( bool doauth ){
int lockState = dbMutex.getState();
assert( lockState );
_db = dbHolder.get( _ns , _path );
if ( _db ){
_justCreated = false;
}
else if ( dbMutex.getState() > 0 ){
// already in a write lock
_db = dbHolder.getOrCreate( _ns , _path , _justCreated );
assert( _db );
}
else if ( dbMutex.getState() < -1 ){
// nested read lock :(
assert( _lock );
_lock->releaseAndWriteLock();
_db = dbHolder.getOrCreate( _ns , _path , _justCreated );
assert( _db );
}
else {
// we have a read lock, but need to get a write lock for a bit
// we need to be in a write lock since we're going to create the DB object
// to do that, we're going to unlock, then get a write lock
// this is so that if this is the first query and its long doesn't block db
// we just have to check that the db wasn't closed in the interim where we unlock
for ( int x=0; x<2; x++ ){
{
dbtemprelease unlock;
writelock lk( _ns );
dbHolder.getOrCreate( _ns , _path , _justCreated );
}
_db = dbHolder.get( _ns , _path );
if ( _db )
break;
log() << "db was closed on us right after we opened it: " << _ns << endl;
}
uassert( 13005 , "can't create db, keeps getting closed" , _db );
}
_client->_context = this;
_client->_curOp->enter( this );
if ( doauth )
_auth( lockState );
if ( _client->_curOp->getOp() != dbGetMore ){ // getMore's are special and should be handled else where
string errmsg;
if ( ! shardVersionOk( _ns , errmsg ) ){
msgasserted( StaleConfigInContextCode , (string)"[" + _ns + "] shard version not ok in Client::Context: " + errmsg );
}
}
}
void Client::Context::_auth( int lockState ){
if ( _client->_ai.isAuthorizedForLock( _db->name , lockState ) )
return;
// before we assert, do a little cleanup
_client->_context = _oldContext; // note: _oldContext may be null
stringstream ss;
ss << "unauthorized db:" << _db->name << " lock type:" << lockState << " client:" << _client->clientAddress();
uasserted( 10057 , ss.str() );
}
Client::Context::~Context() {
DEV assert( _client == currentClient.get() );
_client->_curOp->leave( this );
_client->_context = _oldContext; // note: _oldContext may be null
}
string Client::clientAddress() const {
if( _curOp )
return _curOp->getRemoteString(false);
return "";
}
string Client::toString() const {
stringstream ss;
if ( _curOp )
ss << _curOp->infoNoauth().jsonString();
return ss.str();
}
string sayClientState(){
Client* c = currentClient.get();
if ( ! c )
return "no client";
return c->toString();
}
void curopWaitingForLock( int type ){
Client * c = currentClient.get();
assert( c );
CurOp * co = c->curop();
if ( co ){
co->waitingForLock( type );
}
}
void curopGotLock(){
Client * c = currentClient.get();
assert(c);
CurOp * co = c->curop();
if ( co ){
co->gotLock();
}
}
BSONObj CurOp::infoNoauth( int attempt ) {
BSONObjBuilder b;
b.append("opid", _opNum);
bool a = _active && _start;
b.append("active", a);
if ( _lockType )
b.append("lockType" , _lockType > 0 ? "write" : "read" );
b.append("waitingForLock" , _waitingForLock );
if( a ){
b.append("secs_running", elapsedSeconds() );
}
b.append( "op" , opToString( _op ) );
b.append("ns", _ns);
{
int size = querySize();
if ( size == 0 ){
// do nothing
}
else if ( size == 1 ){
b.append( "query" , _tooBig );
}
else if ( attempt > 2 ){
b.append( "query" , BSON( "err" << "can't get a clean object" ) );
log( LL_WARNING ) << "CurOp changing too much to get reading" << endl;
}
else {
int before = checksum( _queryBuf , size );
b.appendObject( "query" , _queryBuf , size );
int after = checksum( _queryBuf , size );
if ( after != before ){
// this means something changed
// going to retry
return infoNoauth( attempt + 1 );
}
}
}
// b.append("inLock", ??
stringstream clientStr;
clientStr << _remote.toString();
b.append("client", clientStr.str());
if ( _client )
b.append( "desc" , _client->desc() );
if ( ! _message.empty() ){
if ( _progressMeter.isActive() ){
StringBuilder buf(128);
buf << _message.toString() << " " << _progressMeter.toString();
b.append( "msg" , buf.str() );
}
else {
b.append( "msg" , _message.toString() );
}
}
return b.obj();
}
void Client::gotHandshake( const BSONObj& o ){
BSONObjIterator i(o);
{
BSONElement id = i.next();
assert( id.type() );
_remoteId = id.wrap( "_id" );
}
BSONObjBuilder b;
while ( i.more() )
b.append( i.next() );
_handshake = b.obj();
}
class HandshakeCmd : public Command {
public:
void help(stringstream& h) const { h << "internal"; }
HandshakeCmd() : Command( "handshake" ){}
virtual LockType locktype() const { return NONE; }
virtual bool slaveOk() const { return true; }
virtual bool adminOnly() const { return false; }
virtual bool run(const string& , BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result, bool fromRepl) {
Client& c = cc();
c.gotHandshake( cmdObj );
return 1;
}
} handshakeCmd;
class ClientListPlugin : public WebStatusPlugin {
public:
ClientListPlugin() : WebStatusPlugin( "clients" , 20 ){}
virtual void init(){}
virtual void run( stringstream& ss ){
using namespace mongoutils::html;
ss << "\n";
ss << ""
<< th( a("", "Connections to the database, both internal and external.", "Client") )
<< th( a("http://www.mongodb.org/display/DOCS/Viewing+and+Terminating+Current+Operation", "", "OpId") )
<< "Active | "
<< "LockType | "
<< "Waiting | "
<< "SecsRunning | "
<< "Op | "
<< th( a("http://www.mongodb.org/display/DOCS/Developer+FAQ#DeveloperFAQ-What%27sa%22namespace%22%3F", "", "Namespace") )
<< "Query | "
<< "client | "
<< "msg | "
<< "progress | "
<< "
\n";
{
scoped_lock bl(Client::clientsMutex);
for( set::iterator i = Client::clients.begin(); i != Client::clients.end(); i++ ) {
Client *c = *i;
CurOp& co = *(c->curop());
ss << "" << c->desc() << " | ";
tablecell( ss , co.opNum() );
tablecell( ss , co.active() );
{
int lt = co.getLockType();
if( lt == -1 ) tablecell(ss, "R");
else if( lt == 1 ) tablecell(ss, "W");
else
tablecell( ss , lt);
}
tablecell( ss , co.isWaitingForLock() );
if ( co.active() )
tablecell( ss , co.elapsedSeconds() );
else
tablecell( ss , "" );
tablecell( ss , co.getOp() );
tablecell( ss , co.getNS() );
if ( co.haveQuery() )
tablecell( ss , co.query() );
else
tablecell( ss , "" );
tablecell( ss , co.getRemoteString() );
tablecell( ss , co.getMessage() );
tablecell( ss , co.getProgressMeter().toString() );
ss << "
\n";
}
}
ss << "
\n";
}
} clientListPlugin;
int Client::recommendedYieldMicros( int * writers , int * readers ){
int num = 0;
int w = 0;
int r = 0;
{
scoped_lock bl(clientsMutex);
for ( set::iterator i=clients.begin(); i!=clients.end(); ++i ){
Client* c = *i;
if ( c->curop()->isWaitingForLock() ){
num++;
if ( c->curop()->getLockType() > 0 )
w++;
else
r++;
}
}
}
if ( writers )
*writers = w;
if ( readers )
*readers = r;
if ( num > 50 )
num = 50;
return num * 100;
}
}