// client.cpp /** * Copyright (C) 2009 10gen Inc. * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License, version 3, * as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see . */ /* Client represents a connection to the database (the server-side) and corresponds to an open socket (or logical connection if pooling on sockets) from a client. */ #include "pch.h" #include "db.h" #include "client.h" #include "curop.h" #include "json.h" #include "security.h" #include "commands.h" #include "instance.h" #include "../s/d_logic.h" #include "dbwebserver.h" #include "../util/mongoutils/html.h" #include "../util/mongoutils/checksum.h" namespace mongo { mongo::mutex Client::clientsMutex("clientsMutex"); set Client::clients; // always be in clientsMutex when manipulating this boost::thread_specific_ptr currentClient; Client::Client(const char *desc) : _context(0), _shutdown(false), _desc(desc), _god(0), _lastOp(0) { _curOp = new CurOp( this ); scoped_lock bl(clientsMutex); clients.insert(this); } Client::~Client() { delete _curOp; _god = 0; if ( _context ) cout << "ERROR: Client::~Client _context should be NULL: " << _desc << endl; if ( !_shutdown ) cout << "ERROR: Client::shutdown not called: " << _desc << endl; } void Client::_dropns( const string& ns ){ Top::global.collectionDropped( ns ); dblock l; Client::Context ctx( ns ); if ( ! nsdetails( ns.c_str() ) ) return; try { string err; BSONObjBuilder b; dropCollection( ns , err , b ); } catch ( ... ){ log() << "error dropping temp collection: " << ns << endl; } } void Client::_invalidateDB( const string& db ) { assert( db.find( '.' ) == string::npos ); set::iterator min = _tempCollections.lower_bound( db + "." ); set::iterator max = _tempCollections.lower_bound( db + "|" ); _tempCollections.erase( min , max ); } void Client::invalidateDB(const string& db) { scoped_lock bl(clientsMutex); for ( set::iterator i = clients.begin(); i!=clients.end(); i++ ){ Client* cli = *i; cli->_invalidateDB(db); } } void Client::invalidateNS( const string& ns ){ scoped_lock bl(clientsMutex); for ( set::iterator i = clients.begin(); i!=clients.end(); i++ ){ Client* cli = *i; cli->_tempCollections.erase( ns ); } } void Client::addTempCollection( const string& ns ) { _tempCollections.insert( ns ); } bool Client::shutdown(){ _shutdown = true; if ( inShutdown() ) return false; { scoped_lock bl(clientsMutex); clients.erase(this); } bool didAnything = false; if ( _tempCollections.size() ){ didAnything = true; for ( set::iterator i = _tempCollections.begin(); i!=_tempCollections.end(); i++ ){ _dropns( *i ); } _tempCollections.clear(); } return didAnything; } BSONObj CurOp::_tooBig = fromjson("{\"$msg\":\"query not recording (too large)\"}"); AtomicUInt CurOp::_nextOpNum; Client::Context::Context( string ns , Database * db, bool doauth ) : _client( currentClient.get() ) , _oldContext( _client->_context ) , _path( dbpath ) , _lock(0) , _justCreated(false) { assert( db && db->isOk() ); _ns = ns; _db = db; _client->_context = this; if ( doauth ) _auth(); } void Client::Context::_finishInit( bool doauth ){ int lockState = dbMutex.getState(); assert( lockState ); _db = dbHolder.get( _ns , _path ); if ( _db ){ _justCreated = false; } else if ( dbMutex.getState() > 0 ){ // already in a write lock _db = dbHolder.getOrCreate( _ns , _path , _justCreated ); assert( _db ); } else if ( dbMutex.getState() < -1 ){ // nested read lock :( assert( _lock ); _lock->releaseAndWriteLock(); _db = dbHolder.getOrCreate( _ns , _path , _justCreated ); assert( _db ); } else { // we have a read lock, but need to get a write lock for a bit // we need to be in a write lock since we're going to create the DB object // to do that, we're going to unlock, then get a write lock // this is so that if this is the first query and its long doesn't block db // we just have to check that the db wasn't closed in the interim where we unlock for ( int x=0; x<2; x++ ){ { dbtemprelease unlock; writelock lk( _ns ); dbHolder.getOrCreate( _ns , _path , _justCreated ); } _db = dbHolder.get( _ns , _path ); if ( _db ) break; log() << "db was closed on us right after we opened it: " << _ns << endl; } uassert( 13005 , "can't create db, keeps getting closed" , _db ); } _client->_context = this; _client->_curOp->enter( this ); if ( doauth ) _auth( lockState ); if ( _client->_curOp->getOp() != dbGetMore ){ // getMore's are special and should be handled else where string errmsg; if ( ! shardVersionOk( _ns , errmsg ) ){ msgasserted( StaleConfigInContextCode , (string)"[" + _ns + "] shard version not ok in Client::Context: " + errmsg ); } } } void Client::Context::_auth( int lockState ){ if ( _client->_ai.isAuthorizedForLock( _db->name , lockState ) ) return; // before we assert, do a little cleanup _client->_context = _oldContext; // note: _oldContext may be null stringstream ss; ss << "unauthorized db:" << _db->name << " lock type:" << lockState << " client:" << _client->clientAddress(); uasserted( 10057 , ss.str() ); } Client::Context::~Context() { DEV assert( _client == currentClient.get() ); _client->_curOp->leave( this ); _client->_context = _oldContext; // note: _oldContext may be null } string Client::clientAddress() const { if( _curOp ) return _curOp->getRemoteString(false); return ""; } string Client::toString() const { stringstream ss; if ( _curOp ) ss << _curOp->infoNoauth().jsonString(); return ss.str(); } string sayClientState(){ Client* c = currentClient.get(); if ( ! c ) return "no client"; return c->toString(); } void curopWaitingForLock( int type ){ Client * c = currentClient.get(); assert( c ); CurOp * co = c->curop(); if ( co ){ co->waitingForLock( type ); } } void curopGotLock(){ Client * c = currentClient.get(); assert(c); CurOp * co = c->curop(); if ( co ){ co->gotLock(); } } BSONObj CurOp::infoNoauth( int attempt ) { BSONObjBuilder b; b.append("opid", _opNum); bool a = _active && _start; b.append("active", a); if ( _lockType ) b.append("lockType" , _lockType > 0 ? "write" : "read" ); b.append("waitingForLock" , _waitingForLock ); if( a ){ b.append("secs_running", elapsedSeconds() ); } b.append( "op" , opToString( _op ) ); b.append("ns", _ns); { int size = querySize(); if ( size == 0 ){ // do nothing } else if ( size == 1 ){ b.append( "query" , _tooBig ); } else if ( attempt > 2 ){ b.append( "query" , BSON( "err" << "can't get a clean object" ) ); log( LL_WARNING ) << "CurOp changing too much to get reading" << endl; } else { int before = checksum( _queryBuf , size ); b.appendObject( "query" , _queryBuf , size ); int after = checksum( _queryBuf , size ); if ( after != before ){ // this means something changed // going to retry return infoNoauth( attempt + 1 ); } } } // b.append("inLock", ?? stringstream clientStr; clientStr << _remote.toString(); b.append("client", clientStr.str()); if ( _client ) b.append( "desc" , _client->desc() ); if ( ! _message.empty() ){ if ( _progressMeter.isActive() ){ StringBuilder buf(128); buf << _message.toString() << " " << _progressMeter.toString(); b.append( "msg" , buf.str() ); } else { b.append( "msg" , _message.toString() ); } } return b.obj(); } void Client::gotHandshake( const BSONObj& o ){ BSONObjIterator i(o); { BSONElement id = i.next(); assert( id.type() ); _remoteId = id.wrap( "_id" ); } BSONObjBuilder b; while ( i.more() ) b.append( i.next() ); _handshake = b.obj(); } class HandshakeCmd : public Command { public: void help(stringstream& h) const { h << "internal"; } HandshakeCmd() : Command( "handshake" ){} virtual LockType locktype() const { return NONE; } virtual bool slaveOk() const { return true; } virtual bool adminOnly() const { return false; } virtual bool run(const string& , BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result, bool fromRepl) { Client& c = cc(); c.gotHandshake( cmdObj ); return 1; } } handshakeCmd; class ClientListPlugin : public WebStatusPlugin { public: ClientListPlugin() : WebStatusPlugin( "clients" , 20 ){} virtual void init(){} virtual void run( stringstream& ss ){ using namespace mongoutils::html; ss << "\n"; ss << "" << th( a("", "Connections to the database, both internal and external.", "Client") ) << th( a("http://www.mongodb.org/display/DOCS/Viewing+and+Terminating+Current+Operation", "", "OpId") ) << "" << "" << "" << "" << "" << th( a("http://www.mongodb.org/display/DOCS/Developer+FAQ#DeveloperFAQ-What%27sa%22namespace%22%3F", "", "Namespace") ) << "" << "" << "" << "" << "\n"; { scoped_lock bl(Client::clientsMutex); for( set::iterator i = Client::clients.begin(); i != Client::clients.end(); i++ ) { Client *c = *i; CurOp& co = *(c->curop()); ss << ""; tablecell( ss , co.opNum() ); tablecell( ss , co.active() ); { int lt = co.getLockType(); if( lt == -1 ) tablecell(ss, "R"); else if( lt == 1 ) tablecell(ss, "W"); else tablecell( ss , lt); } tablecell( ss , co.isWaitingForLock() ); if ( co.active() ) tablecell( ss , co.elapsedSeconds() ); else tablecell( ss , "" ); tablecell( ss , co.getOp() ); tablecell( ss , co.getNS() ); if ( co.haveQuery() ) tablecell( ss , co.query() ); else tablecell( ss , "" ); tablecell( ss , co.getRemoteString() ); tablecell( ss , co.getMessage() ); tablecell( ss , co.getProgressMeter().toString() ); ss << "\n"; } } ss << "
ActiveLockTypeWaitingSecsRunningOpQueryclientmsgprogress
" << c->desc() << "
\n"; } } clientListPlugin; int Client::recommendedYieldMicros( int * writers , int * readers ){ int num = 0; int w = 0; int r = 0; { scoped_lock bl(clientsMutex); for ( set::iterator i=clients.begin(); i!=clients.end(); ++i ){ Client* c = *i; if ( c->curop()->isWaitingForLock() ){ num++; if ( c->curop()->getLockType() > 0 ) w++; else r++; } } } if ( writers ) *writers = w; if ( readers ) *readers = r; if ( num > 50 ) num = 50; return num * 100; } }