diff options
Diffstat (limited to 'src/mongo/s/commands/cluster_repair_sharded_collection_chunks_history_cmd.cpp')
-rw-r--r-- | src/mongo/s/commands/cluster_repair_sharded_collection_chunks_history_cmd.cpp | 122 |
1 files changed, 122 insertions, 0 deletions
diff --git a/src/mongo/s/commands/cluster_repair_sharded_collection_chunks_history_cmd.cpp b/src/mongo/s/commands/cluster_repair_sharded_collection_chunks_history_cmd.cpp new file mode 100644 index 00000000000..22f9ccf7525 --- /dev/null +++ b/src/mongo/s/commands/cluster_repair_sharded_collection_chunks_history_cmd.cpp @@ -0,0 +1,122 @@ + +/** + * Copyright (C) 2021 MongoDB, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the Server Side Public License, version 1, + * as published by MongoDB, Inc. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * Server Side Public License for more details. + * + * You should have received a copy of the Server Side Public License + * along with this program. If not, see + * <http://www.mongodb.com/licensing/server-side-public-license>. + * + * As a special exception, the copyright holders give permission to link the + * code of portions of this program with the OpenSSL library under certain + * conditions as described in each individual source file and distribute + * linked combinations including the program with the OpenSSL library. You + * must comply with the Server Side Public License in all respects for + * all of the code used other than as permitted herein. If you modify file(s) + * with this exception, you may extend this exception to your version of the + * file(s), but you are not obligated to do so. If you do not wish to do so, + * delete this exception statement from your version. If you delete this + * exception statement from all source files in the program, then also delete + * it in the license file. + */ + +#define MONGO_LOG_DEFAULT_COMPONENT ::mongo::logger::LogComponent::kSharding + +#include "mongo/platform/basic.h" + +#include "mongo/db/audit.h" +#include "mongo/db/auth/action_set.h" +#include "mongo/db/auth/action_type.h" +#include "mongo/db/auth/authorization_manager.h" +#include "mongo/db/auth/authorization_session.h" +#include "mongo/db/client.h" +#include "mongo/db/commands.h" +#include "mongo/s/grid.h" + +namespace mongo { +namespace { + +class RepairShardedCollectionChunksHistoryCommand : public BasicCommand { +public: + RepairShardedCollectionChunksHistoryCommand() + : BasicCommand("repairShardedCollectionChunksHistory") {} + + AllowedOnSecondary secondaryAllowed(ServiceContext*) const override { + return AllowedOnSecondary::kAlways; + } + + bool adminOnly() const override { + return true; + } + + bool supportsWriteConcern(const BSONObj& cmd) const override { + return false; + } + + std::string help() const override { + return "Administrative command to repair the effects of SERVER-62065. If the collection " + "has been upgraded through a cluster comprised of binaries which do not contain " + "this command, the chunks cache collections on the shards will miss history " + "entries. This command will correct that and will mark such collections as " + "correctly repaired, so that a subsequent invocation will not cause any changes to " + "the routing information. In rare cases where the history entries are missing due " + "to corrupted restore, the 'force:true' parameter can be passed which will force " + "all history entries to be re-added."; + } + + // The command intentionally uses the permission control of split/mergeChunks since it only + // modifies the contents of chunk entries and increments the collection/shard versions without + // causing any data placement changes + Status checkAuthForCommand(Client* client, + const std::string& dbname, + const BSONObj& cmdObj) const override { + if (!AuthorizationSession::get(client)->isAuthorizedForActionsOnResource( + ResourcePattern::forExactNamespace(NamespaceString(parseNs(dbname, cmdObj))), + ActionType::splitChunk)) { + return Status(ErrorCodes::Unauthorized, "Unauthorized"); + } + return Status::OK(); + } + + std::string parseNs(const std::string& unusedDbName, const BSONObj& cmdObj) const override { + return CommandHelpers::parseNsFullyQualified(cmdObj); + } + + bool run(OperationContext* opCtx, + const std::string& unusedDbName, + const BSONObj& cmdObj, + BSONObjBuilder& result) override { + const NamespaceString nss{parseNs(unusedDbName, cmdObj)}; + + BSONObjBuilder cmdBuilder( + BSON("_configsvrRepairShardedCollectionChunksHistory" << nss.ns())); + if (cmdObj["force"].booleanSafe()) + cmdBuilder.appendBool("force", true); + + auto configShard = Grid::get(opCtx)->shardRegistry()->getConfigShard(); + auto cmdResponse = uassertStatusOK(configShard->runCommandWithFixedRetryAttempts( + opCtx, + ReadPreferenceSetting{ReadPreference::PrimaryOnly}, + "admin", + cmdBuilder.obj(), + Shard::RetryPolicy::kIdempotent)); + uassertStatusOK(cmdResponse.commandStatus); + + // Append any return value from the response, which the config server returned + CommandHelpers::filterCommandReplyForPassthrough(cmdResponse.response, &result); + + return true; + } + +} repairShardedCollectionChunksHistoryCommand; + +} // namespace +} // namespace mongo |