// client.h
/**
* Copyright (C) 2008 10gen Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see .
*/
/* Client represents a connection to the database (the server-side) and corresponds
to an open socket (or logical connection if pooling on sockets) from a client.
todo: switch to asio...this will fit nicely with that.
*/
#pragma once
#include "../pch.h"
#include "security.h"
#include "namespace.h"
#include "lasterror.h"
#include "stats/top.h"
namespace mongo {
class AuthenticationInfo;
class Database;
class CurOp;
class Command;
class Client;
extern boost::thread_specific_ptr currentClient;
class Client : boost::noncopyable {
public:
static mongo::mutex clientsMutex;
static set clients; // always be in clientsMutex when manipulating this
static int recommendedYieldMicros();
class GodScope {
bool _prev;
public:
GodScope();
~GodScope();
};
/* Set database we want to use, then, restores when we finish (are out of scope)
Note this is also helpful if an exception happens as the state if fixed up.
*/
class Context : boost::noncopyable{
Client * _client;
Context * _oldContext;
string _path;
mongolock * _lock;
bool _justCreated;
string _ns;
Database * _db;
/**
* at this point _client, _oldContext and _ns have to be set
* _db should not have been touched
* this will set _db and create if needed
* will also set _client->_context to this
*/
void _finishInit( bool doauth=true);
void _auth( int lockState = dbMutex.getState() );
public:
Context(const string& ns, string path=dbpath, mongolock * lock = 0 , bool doauth=true )
: _client( currentClient.get() ) , _oldContext( _client->_context ) ,
_path( path ) , _lock( lock ) ,
_ns( ns ){
_finishInit( doauth );
}
/* this version saves the context but doesn't yet set the new one: */
Context()
: _client( currentClient.get() ) , _oldContext( _client->_context ),
_path( dbpath ) , _lock(0) , _justCreated(false){
_client->_context = this;
clear();
}
/**
* if you are doing this after allowing a write there could be a race condition
* if someone closes that db. this checks that the DB is still valid
*/
Context( string ns , Database * db, bool doauth=true );
~Context();
Client* getClient() const { return _client; }
Database* db() const {
return _db;
}
const char * ns() const {
return _ns.c_str();
}
bool justCreated() const {
return _justCreated;
}
bool equals( const string& ns , const string& path=dbpath ) const {
return _ns == ns && _path == path;
}
bool inDB( const string& db , const string& path=dbpath ) const {
if ( _path != path )
return false;
if ( db == _ns )
return true;
string::size_type idx = _ns.find( db );
if ( idx != 0 )
return false;
return _ns[db.size()] == '.';
}
void clear(){
_ns = "";
_db = 0;
}
/**
* call before unlocking, so clear any non-thread safe state
*/
void unlocked(){
_db = 0;
}
/**
* call after going back into the lock, will re-establish non-thread safe stuff
*/
void relocked(){
_finishInit();
}
friend class CurOp;
};
private:
CurOp * _curOp;
Context * _context;
bool _shutdown;
list _tempCollections;
const char *_desc;
bool _god;
AuthenticationInfo _ai;
OpTime _lastOp;
BSONObj _handshake;
BSONObj _remoteId;
public:
AuthenticationInfo * getAuthenticationInfo(){ return &_ai; }
bool isAdmin() { return _ai.isAuthorized( "admin" ); }
CurOp* curop() { return _curOp; }
Context* getContext(){ return _context; }
Database* database() { return _context ? _context->db() : 0; }
const char *ns() { return _context->ns(); }
Client(const char *desc);
~Client();
const char *desc() const { return _desc; }
void addTempCollection( const string& ns ){
_tempCollections.push_back( ns );
}
void setLastOp( const OpTime& op ){
_lastOp = op;
}
OpTime getLastOp() const {
return _lastOp;
}
void appendLastOp( BSONObjBuilder& b ){
if ( ! _lastOp.isNull() )
b.appendTimestamp( "lastOp" , _lastOp.asDate() );
}
/* each thread which does db operations has a Client object in TLS.
call this when your thread starts.
*/
static void initThread(const char *desc);
/*
this has to be called as the client goes away, but before thread termination
@return true if anything was done
*/
bool shutdown();
bool isGod() const { return _god; }
friend class CurOp;
string toString() const;
void gotHandshake( const BSONObj& o );
BSONObj getRemoteID() const { return _remoteId; }
BSONObj getHandshake() const { return _handshake; }
};
inline Client& cc() {
return *currentClient.get();
}
/* each thread which does db operations has a Client object in TLS.
call this when your thread starts.
*/
inline void Client::initThread(const char *desc) {
assert( currentClient.get() == 0 );
currentClient.reset( new Client(desc) );
}
inline Client::GodScope::GodScope(){
_prev = cc()._god;
cc()._god = true;
}
inline Client::GodScope::~GodScope(){
cc()._god = _prev;
}
/* this unlocks, does NOT upgrade. that works for our current usage */
inline void mongolock::releaseAndWriteLock() {
if( !_writelock ) {
#if BOOST_VERSION >= 103500
int s = dbMutex.getState();
if( s != -1 ) {
log() << "error: releaseAndWriteLock() s == " << s << endl;
msgasserted( 12600, "releaseAndWriteLock: unlock_shared failed, probably recursive" );
}
#endif
_writelock = true;
dbMutex.unlock_shared();
dbMutex.lock();
if ( cc().getContext() )
cc().getContext()->unlocked();
}
}
string sayClientState();
inline bool haveClient(){
return currentClient.get() > 0;
}
};