/** * Copyright (C) 2022-present MongoDB, Inc. * * This program is free software: you can redistribute it and/or modify * it under the terms of the Server Side Public License, version 1, * as published by MongoDB, Inc. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * Server Side Public License for more details. * * You should have received a copy of the Server Side Public License * along with this program. If not, see * . * * As a special exception, the copyright holders give permission to link the * code of portions of this program with the OpenSSL library under certain * conditions as described in each individual source file and distribute * linked combinations including the program with the OpenSSL library. You * must comply with the Server Side Public License in all respects for * all of the code used other than as permitted herein. If you modify file(s) * with this exception, you may extend this exception to your version of the * file(s), but you are not obligated to do so. If you do not wish to do so, * delete this exception statement from your version. If you delete this * exception statement from all source files in the program, then also delete * it in the license file. */ #include "mongo/db/auth/authorization_session.h" #include "mongo/db/catalog/collection_catalog.h" #include "mongo/db/commands.h" #include "mongo/db/curop.h" #include "mongo/db/s/database_sharding_state.h" #include "mongo/db/s/ddl_lock_manager.h" #include "mongo/db/s/sharding_state.h" #include "mongo/db/timeseries/catalog_helper.h" #include "mongo/db/timeseries/timeseries_commands_conversion_helper.h" #include "mongo/logv2/log.h" #include "mongo/s/cluster_commands_helpers.h" #include "mongo/s/grid.h" #include "mongo/s/request_types/sharded_ddl_commands_gen.h" #include "mongo/s/stale_shard_version_helpers.h" #define MONGO_LOGV2_DEFAULT_COMPONENT ::mongo::logv2::LogComponent::kSharding namespace mongo { namespace { struct StaleConfigRetryState { std::set shardsWithSuccessResponses; std::vector shardSuccessResponses; }; void updateStateForStaleConfigRetry(OperationContext* opCtx, const RawResponsesResult& response, StaleConfigRetryState* retryState) { std::set okShardIds; std::set_union(response.shardsWithSuccessResponses.begin(), response.shardsWithSuccessResponses.end(), retryState->shardsWithSuccessResponses.begin(), retryState->shardsWithSuccessResponses.end(), std::inserter(okShardIds, okShardIds.begin())); retryState->shardsWithSuccessResponses = std::move(okShardIds); retryState->shardSuccessResponses = std::move(response.successResponses); } class ShardsvrDropIndexesCommand final : public TypedCommand { public: using Request = ShardsvrDropIndexes; bool skipApiVersionCheck() const override { // Internal command (server to server). return true; } std::string help() const override { return "Internal command. Do not call directly. Drops indexes."; } bool adminOnly() const override { return false; } AllowedOnSecondary secondaryAllowed(ServiceContext*) const override { return AllowedOnSecondary::kNever; } class Invocation final : public InvocationBase { public: using InvocationBase::InvocationBase; /** * Intermediate wrapper to interface with ReplyBuilderInterface. */ class Response { public: Response(BSONObj obj) : _obj(std::move(obj)) {} void serialize(BSONObjBuilder* builder) const { builder->appendElements(_obj); } private: const BSONObj _obj; }; Response typedRun(OperationContext* opCtx); private: NamespaceString ns() const override { return request().getNamespace(); } bool supportsWriteConcern() const override { return true; } void doCheckAuthorization(OperationContext* opCtx) const override { uassert(ErrorCodes::Unauthorized, "Unauthorized", AuthorizationSession::get(opCtx->getClient()) ->isAuthorizedForActionsOnResource(ResourcePattern::forClusterResource(), ActionType::internal)); } }; } shardsvrDropIndexesCommand; ShardsvrDropIndexesCommand::Invocation::Response ShardsvrDropIndexesCommand::Invocation::typedRun( OperationContext* opCtx) { uassertStatusOK(ShardingState::get(opCtx)->canAcceptShardedCommands()); CommandHelpers::uassertCommandRunWithMajority(Request::kCommandName, opCtx->getWriteConcern()); // Since this operation is not directly writing locally we need to force its db profile level // increase in order to be logged in ".system.profile". CurOp::get(opCtx)->raiseDbProfileLevel( CollectionCatalog::get(opCtx)->getDatabaseProfileLevel(ns().dbName())); DropIndexes dropIdxCmd(ns()); dropIdxCmd.setDropIndexesRequest(request().getDropIndexesRequest()); const auto lockTimeout = [&]() -> Milliseconds { if (auto sfp = globalFailPointRegistry().find("overrideDDLLockTimeout")->scoped(); MONGO_unlikely(sfp.isActive())) { if (auto timeoutElem = sfp.getData()["timeoutMillisecs"]; timeoutElem.ok()) { const auto timeoutMillisecs = Milliseconds(timeoutElem.safeNumberLong()); LOGV2(649100, "Overriding DDL lock timeout", "timeout"_attr = timeoutMillisecs); return timeoutMillisecs; } } return DDLLockManager::kDefaultLockTimeout; }(); static constexpr StringData lockReason{"dropIndexes"_sd}; auto ddlLockManager = DDLLockManager::get(opCtx); auto dbDDLLock = ddlLockManager->lock(opCtx, ns().db(), lockReason, lockTimeout); // Check under the dbLock if this is still the primary shard for the database DatabaseShardingState::assertIsPrimaryShardForDb(opCtx, ns().db()); auto resolvedNs = ns(); auto dropIdxBSON = dropIdxCmd.toBSON({}); if (auto timeseriesOptions = timeseries::getTimeseriesOptions(opCtx, ns(), true)) { dropIdxBSON = timeseries::makeTimeseriesCommand(dropIdxBSON, ns(), DropIndexes::kCommandName, DropIndexes::kIsTimeseriesNamespaceFieldName); resolvedNs = ns().makeTimeseriesBucketsNamespace(); } auto collDDLLock = ddlLockManager->lock(opCtx, resolvedNs.ns(), lockReason, lockTimeout); StaleConfigRetryState retryState; return shardVersionRetry( opCtx, Grid::get(opCtx)->catalogCache(), resolvedNs, "dropIndexes", [&] { // If the collection is sharded, we target only the primary shard and the shards that // own chunks for the collection. const auto cri = uassertStatusOK( Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, resolvedNs)); auto cmdToBeSent = CommandHelpers::filterCommandRequestForPassthrough( CommandHelpers::appendMajorityWriteConcern(dropIdxBSON)); auto shardResponses = scatterGatherVersionedTargetByRoutingTableNoThrowOnStaleShardVersionErrors( opCtx, resolvedNs.db(), resolvedNs, cri, retryState.shardsWithSuccessResponses, applyReadWriteConcern( opCtx, this, CommandHelpers::filterCommandRequestForPassthrough(cmdToBeSent)), ReadPreferenceSetting::get(opCtx), Shard::RetryPolicy::kNotIdempotent, BSONObj() /* query */, BSONObj() /* collation */); // Append responses we've received from previous retries of this operation due to a // stale config error. shardResponses.insert(shardResponses.end(), retryState.shardSuccessResponses.begin(), retryState.shardSuccessResponses.end()); std::string errmsg; BSONObjBuilder output; const auto aggregateResponse = appendRawResponses(opCtx, &errmsg, &output, std::move(shardResponses)); // If we have a stale config error, update the success shards for the upcoming retry. if (!aggregateResponse.responseOK && aggregateResponse.firstStaleConfigError) { updateStateForStaleConfigRetry(opCtx, aggregateResponse, &retryState); uassertStatusOK(*aggregateResponse.firstStaleConfigError); } CommandHelpers::appendSimpleCommandStatus(output, aggregateResponse.responseOK, errmsg); return Response(output.obj()); }); } } // namespace } // namespace mongo