/** * Copyright (C) 2008-2015 MongoDB Inc. * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License, version 3, * as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see . * * As a special exception, the copyright holders give permission to link the * code of portions of this program with the OpenSSL library under certain * conditions as described in each individual source file and distribute * linked combinations including the program with the OpenSSL library. You * must comply with the GNU Affero General Public License in all respects for * all of the code used other than as permitted herein. If you modify file(s) * with this exception, you may extend this exception to your version of the * file(s), but you are not obligated to do so. If you do not wish to do so, * delete this exception statement from your version. If you delete this * exception statement from all source files in the program, then also delete * it in the license file. */ #define MONGO_LOG_DEFAULT_COMPONENT ::mongo::logger::LogComponent::kCommand #include "mongo/platform/basic.h" #include "mongo/bson/bsonobj_comparator.h" #include "mongo/bson/simple_bsonobj_comparator.h" #include "mongo/bson/util/bson_extract.h" #include "mongo/client/connpool.h" #include "mongo/db/auth/action_set.h" #include "mongo/db/auth/action_type.h" #include "mongo/db/auth/authorization_manager.h" #include "mongo/db/auth/authorization_manager_global.h" #include "mongo/db/auth/authorization_session.h" #include "mongo/db/auth/privilege.h" #include "mongo/db/commands.h" #include "mongo/db/commands/copydb.h" #include "mongo/db/commands/rename_collection.h" #include "mongo/db/lasterror.h" #include "mongo/db/matcher/extensions_callback_noop.h" #include "mongo/db/operation_context.h" #include "mongo/db/query/collation/collator_factory_interface.h" #include "mongo/db/query/parsed_distinct.h" #include "mongo/db/query/view_response_formatter.h" #include "mongo/db/views/resolved_view.h" #include "mongo/executor/task_executor_pool.h" #include "mongo/rpc/get_status_from_command_result.h" #include "mongo/rpc/metadata/server_selection_metadata.h" #include "mongo/s/async_requests_sender.h" #include "mongo/s/catalog/sharding_catalog_client.h" #include "mongo/s/catalog_cache.h" #include "mongo/s/client/shard_connection.h" #include "mongo/s/client/shard_registry.h" #include "mongo/s/commands/cluster_aggregate.h" #include "mongo/s/commands/cluster_commands_common.h" #include "mongo/s/commands/cluster_explain.h" #include "mongo/s/commands/sharded_command_processing.h" #include "mongo/s/grid.h" #include "mongo/s/query/store_possible_cursor.h" #include "mongo/s/stale_exception.h" #include "mongo/scripting/engine.h" #include "mongo/util/log.h" #include "mongo/util/timer.h" namespace mongo { using std::unique_ptr; using std::shared_ptr; using std::list; using std::make_pair; using std::map; using std::multimap; using std::set; using std::string; using std::stringstream; using std::vector; namespace { bool cursorCommandPassthrough(OperationContext* opCtx, StringData dbName, const ShardId& shardId, const BSONObj& cmdObj, const NamespaceString& nss, BSONObjBuilder* out) { const auto shardStatus = Grid::get(opCtx)->shardRegistry()->getShard(opCtx, shardId); if (!shardStatus.isOK()) { return Command::appendCommandStatus(*out, shardStatus.getStatus()); } const auto shard = shardStatus.getValue(); ScopedDbConnection conn(shard->getConnString()); auto cursor = conn->query(str::stream() << dbName << ".$cmd", cmdObj, /* nToReturn=*/-1); if (!cursor || !cursor->more()) { return Command::appendCommandStatus( *out, {ErrorCodes::OperationFailed, "failed to read command response from shard"}); } BSONObj response = cursor->nextSafe().getOwned(); conn.done(); Status status = getStatusFromCommandResult(response); if (ErrorCodes::SendStaleConfig == status || ErrorCodes::RecvStaleConfig == status) { throw RecvStaleConfigException("command failed because of stale config", response); } if (!status.isOK()) { return Command::appendCommandStatus(*out, status); } StatusWith transformedResponse = storePossibleCursor(opCtx, HostAndPort(cursor->originalHost()), response, nss, Grid::get(opCtx)->getExecutorPool()->getArbitraryExecutor(), Grid::get(opCtx)->getCursorManager()); if (!transformedResponse.isOK()) { return Command::appendCommandStatus(*out, transformedResponse.getStatus()); } out->appendElements(transformedResponse.getValue()); return true; } BSONObj getQuery(const BSONObj& cmdObj) { if (cmdObj["query"].type() == Object) return cmdObj["query"].embeddedObject(); if (cmdObj["q"].type() == Object) return cmdObj["q"].embeddedObject(); return BSONObj(); } StatusWith getCollation(const BSONObj& cmdObj) { BSONElement collationElement; auto status = bsonExtractTypedField(cmdObj, "collation", BSONType::Object, &collationElement); if (status.isOK()) { return collationElement.Obj(); } if (status != ErrorCodes::NoSuchKey) { return status; } return BSONObj(); } class PublicGridCommand : public Command { protected: PublicGridCommand(const char* n, const char* oldname = NULL) : Command(n, false, oldname) {} virtual bool slaveOk() const { return true; } virtual bool adminOnly() const { return false; } bool adminPassthrough(OperationContext* opCtx, const ShardId& shardId, const BSONObj& cmdObj, BSONObjBuilder& result) { return passthrough(opCtx, "admin", shardId, cmdObj, result); } bool passthrough(OperationContext* opCtx, const std::string& db, const ShardId& shardId, const BSONObj& cmdObj, BSONObjBuilder& result) { const auto shard = uassertStatusOK(Grid::get(opCtx)->shardRegistry()->getShard(opCtx, shardId)); ShardConnection conn(shard->getConnString(), ""); BSONObj res; bool ok = conn->runCommand(db, cmdObj, res); conn.done(); // First append the properly constructed writeConcernError. It will then be skipped // in appendElementsUnique. if (auto wcErrorElem = res["writeConcernError"]) { appendWriteConcernErrorToCmdResponse(shard->getId(), wcErrorElem, result); } result.appendElementsUnique(res); return ok; } }; class AllShardsCollectionCommand : public Command { protected: AllShardsCollectionCommand(const char* name, const char* oldname = NULL, bool implicitCreateDb = false) : Command(name, false, oldname), _implicitCreateDb(implicitCreateDb) {} bool slaveOk() const override { return true; } bool adminOnly() const override { return false; } BSONObj appendShardVersion(BSONObj cmdObj, ChunkVersion version) { BSONObjBuilder cmdWithVersionBob; cmdWithVersionBob.appendElements(cmdObj); version.appendForCommands(&cmdWithVersionBob); return cmdWithVersionBob.obj(); } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, std::string& errmsg, BSONObjBuilder& output) override { const NamespaceString nss(parseNsCollectionRequired(dbName, cmdObj)); LOG(1) << "AllShardsCollectionCommand: " << nss << " cmd:" << redact(cmdObj); if (_implicitCreateDb) { uassertStatusOK(createShardDatabase(opCtx, dbName)); } Status status = Status::OK(); int numAttempts = 0; while (numAttempts < kMaxNumStaleVersionRetries) { status = Status::OK(); output.resetToEmpty(); auto routingInfo = uassertStatusOK( Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); auto requests = buildRequestsForTargetedShards(opCtx, routingInfo, cmdObj); auto swResponses = gatherResponsesFromShards(opCtx, dbName, cmdObj, requests, &output); if (ErrorCodes::isStaleShardingError(swResponses.getStatus().code())) { Grid::get(opCtx)->catalogCache()->onStaleConfigError(std::move(routingInfo)); ++numAttempts; continue; } status = swResponses.getStatus(); break; } // We don't uassertStatusOK(), because that causes 'output' to be cleared, but we want to // report the raw results even if there was an error. if (!status.isOK()) { return appendCommandStatus(output, status); } return true; } private: // Whether the requested database should be created implicitly const bool _implicitCreateDb; }; class NotAllowedOnShardedCollectionCmd : public PublicGridCommand { protected: NotAllowedOnShardedCollectionCmd(const char* n) : PublicGridCommand(n) {} bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const NamespaceString nss(parseNs(dbName, cmdObj)); const auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); uassert(ErrorCodes::IllegalOperation, str::stream() << "can't do command: " << getName() << " on sharded collection", !routingInfo.cm()); return passthrough(opCtx, dbName, routingInfo.primaryId(), cmdObj, result); } }; // MongoS commands implementation class DropIndexesCmd : public AllShardsCollectionCommand { public: DropIndexesCmd() : AllShardsCollectionCommand("dropIndexes", "deleteIndexes") {} virtual void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) { ActionSet actions; actions.addAction(ActionType::dropIndex); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } virtual bool supportsWriteConcern(const BSONObj& cmd) const override { return true; } } dropIndexesCmd; class CreateIndexesCmd : public AllShardsCollectionCommand { public: CreateIndexesCmd() : AllShardsCollectionCommand("createIndexes", NULL, /* oldName */ true /* implicit create db */) {} virtual void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) { ActionSet actions; actions.addAction(ActionType::createIndex); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } virtual bool supportsWriteConcern(const BSONObj& cmd) const override { return true; } } createIndexesCmd; class ReIndexCmd : public AllShardsCollectionCommand { public: ReIndexCmd() : AllShardsCollectionCommand("reIndex") {} virtual void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) { ActionSet actions; actions.addAction(ActionType::reIndex); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } virtual bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } } reIndexCmd; class CollectionModCmd : public AllShardsCollectionCommand { public: CollectionModCmd() : AllShardsCollectionCommand("collMod") {} virtual Status checkAuthForCommand(Client* client, const std::string& dbname, const BSONObj& cmdObj) { const NamespaceString nss(parseNsCollectionRequired(dbname, cmdObj)); return AuthorizationSession::get(client)->checkAuthForCollMod(nss, cmdObj); } virtual bool supportsWriteConcern(const BSONObj& cmd) const override { return true; } } collectionModCmd; class ValidateCmd : public PublicGridCommand { public: ValidateCmd() : PublicGridCommand("validate") {} virtual void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) { ActionSet actions; actions.addAction(ActionType::validate); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } virtual bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& output) { const NamespaceString nss(parseNsCollectionRequired(dbName, cmdObj)); auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); if (!routingInfo.cm()) { return passthrough(opCtx, dbName, routingInfo.primaryId(), cmdObj, output); } const auto cm = routingInfo.cm(); vector results; const BSONObj query; Strategy::commandOp( opCtx, dbName, cmdObj, cm->getns(), query, CollationSpec::kSimpleSpec, &results); BSONObjBuilder rawResBuilder(output.subobjStart("raw")); bool isValid = true; bool errored = false; for (const auto& cmdResult : results) { const ShardId& shardName = cmdResult.shardTargetId; BSONObj result = cmdResult.result; const BSONElement valid = result["valid"]; if (!valid.trueValue()) { isValid = false; } if (!result["errmsg"].eoo()) { // errmsg indicates a user error, so returning the message from one shard is // sufficient. errmsg = result["errmsg"].toString(); errored = true; } rawResBuilder.append(shardName.toString(), result); } rawResBuilder.done(); output.appendBool("valid", isValid); int code = getUniqueCodeFromCommandResults(results); if (code != 0) { output.append("code", code); output.append("codeName", ErrorCodes::errorString(ErrorCodes::fromInt(code))); } if (errored) { return false; } return true; } } validateCmd; class CreateCmd : public PublicGridCommand { public: CreateCmd() : PublicGridCommand("create") {} Status checkAuthForCommand(Client* client, const std::string& dbname, const BSONObj& cmdObj) override { const NamespaceString nss(parseNsCollectionRequired(dbname, cmdObj)); return AuthorizationSession::get(client)->checkAuthForCreate(nss, cmdObj); } bool supportsWriteConcern(const BSONObj& cmd) const override { return true; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { uassertStatusOK(createShardDatabase(opCtx, dbName)); const auto dbInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getDatabase(opCtx, dbName)); return passthrough(opCtx, dbName, dbInfo.primaryId(), cmdObj, result); } } createCmd; class RenameCollectionCmd : public PublicGridCommand { public: RenameCollectionCmd() : PublicGridCommand("renameCollection") {} virtual Status checkAuthForCommand(Client* client, const std::string& dbname, const BSONObj& cmdObj) { return rename_collection::checkAuthForRenameCollectionCommand(client, dbname, cmdObj); } virtual bool adminOnly() const { return true; } virtual bool supportsWriteConcern(const BSONObj& cmd) const override { return true; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const auto fullNsFromElt = cmdObj.firstElement(); uassert(ErrorCodes::InvalidNamespace, "'renameCollection' must be of type String", fullNsFromElt.type() == BSONType::String); const NamespaceString fullnsFrom(fullNsFromElt.valueStringData()); uassert(ErrorCodes::InvalidNamespace, str::stream() << "Invalid source namespace: " << fullnsFrom.ns(), fullnsFrom.isValid()); const auto fullnsToElt = cmdObj["to"]; uassert(ErrorCodes::InvalidNamespace, "'to' must be of type String", fullnsToElt.type() == BSONType::String); const NamespaceString fullnsTo(fullnsToElt.valueStringData()); uassert(ErrorCodes::InvalidNamespace, str::stream() << "Invalid target namespace: " << fullnsTo.ns(), fullnsTo.isValid()); const auto fromRoutingInfo = uassertStatusOK( Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, fullnsFrom)); uassert(13138, "You can't rename a sharded collection", !fromRoutingInfo.cm()); const auto toRoutingInfo = uassertStatusOK( Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, fullnsTo)); uassert(13139, "You can't rename to a sharded collection", !toRoutingInfo.cm()); uassert(13137, "Source and destination collections must be on same shard", fromRoutingInfo.primaryId() == toRoutingInfo.primaryId()); return adminPassthrough(opCtx, fromRoutingInfo.primaryId(), cmdObj, result); } } renameCollectionCmd; class CopyDBCmd : public PublicGridCommand { public: CopyDBCmd() : PublicGridCommand("copydb") {} bool adminOnly() const override { return true; } Status checkAuthForCommand(Client* client, const std::string& dbname, const BSONObj& cmdObj) override { return copydb::checkAuthForCopydbCommand(client, dbname, cmdObj); } bool supportsWriteConcern(const BSONObj& cmd) const override { return true; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const auto todbElt = cmdObj["todb"]; uassert(ErrorCodes::InvalidNamespace, "'todb' must be of type String", todbElt.type() == BSONType::String); const std::string todb = todbElt.str(); uassert(ErrorCodes::InvalidNamespace, "Invalid todb argument", NamespaceString::validDBName(todb, NamespaceString::DollarInDbNameBehavior::Allow)); auto toDbInfo = uassertStatusOK(createShardDatabase(opCtx, todb)); uassert(ErrorCodes::IllegalOperation, "Cannot copy to a sharded database", !toDbInfo.shardingEnabled()); const std::string fromhost = cmdObj.getStringField("fromhost"); if (!fromhost.empty()) { return adminPassthrough(opCtx, toDbInfo.primaryId(), cmdObj, result); } const auto fromDbElt = cmdObj["fromdb"]; uassert(ErrorCodes::InvalidNamespace, "'fromdb' must be of type String", fromDbElt.type() == BSONType::String); const std::string fromdb = fromDbElt.str(); uassert( ErrorCodes::InvalidNamespace, "invalid fromdb argument", NamespaceString::validDBName(fromdb, NamespaceString::DollarInDbNameBehavior::Allow)); auto fromDbInfo = uassertStatusOK(createShardDatabase(opCtx, fromdb)); uassert(ErrorCodes::IllegalOperation, "Cannot copy from a sharded database", !fromDbInfo.shardingEnabled()); BSONObjBuilder b; BSONForEach(e, cmdObj) { if (strcmp(e.fieldName(), "fromhost") != 0) { b.append(e); } } { const auto shard = uassertStatusOK( Grid::get(opCtx)->shardRegistry()->getShard(opCtx, fromDbInfo.primaryId())); b.append("fromhost", shard->getConnString().toString()); } return adminPassthrough(opCtx, toDbInfo.primaryId(), b.obj(), result); } } clusterCopyDBCmd; class CollectionStats : public PublicGridCommand { public: CollectionStats() : PublicGridCommand("collStats", "collstats") {} void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) override { ActionSet actions; actions.addAction(ActionType::collStats); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const NamespaceString nss(parseNsCollectionRequired(dbName, cmdObj)); auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); if (!routingInfo.cm()) { result.appendBool("sharded", false); result.append("primary", routingInfo.primaryId().toString()); return passthrough(opCtx, dbName, routingInfo.primaryId(), cmdObj, result); } const auto cm = routingInfo.cm(); result.appendBool("sharded", true); BSONObjBuilder shardStats; map counts; map indexSizes; long long unscaledCollSize = 0; int nindexes = 0; bool warnedAboutIndexes = false; set shardIds; cm->getAllShardIds(&shardIds); for (const ShardId& shardId : shardIds) { const auto shardStatus = Grid::get(opCtx)->shardRegistry()->getShard(opCtx, shardId); if (!shardStatus.isOK()) { invariant(shardStatus.getStatus() == ErrorCodes::ShardNotFound); continue; } const auto shard = shardStatus.getValue(); BSONObj res; { ScopedDbConnection conn(shard->getConnString()); if (!conn->runCommand(dbName, cmdObj, res)) { if (!res["code"].eoo()) { result.append(res["code"]); } errmsg = "failed on shard: " + res.toString(); return false; } conn.done(); } BSONObjIterator j(res); // We don't know the order that we will encounter the count and size // So we save them until we've iterated through all the fields before // updating unscaledCollSize. long long shardObjCount; long long shardAvgObjSize; while (j.more()) { BSONElement e = j.next(); if (str::equals(e.fieldName(), "ns") || str::equals(e.fieldName(), "ok") || str::equals(e.fieldName(), "lastExtentSize") || str::equals(e.fieldName(), "paddingFactor")) { continue; } else if (str::equals(e.fieldName(), "count") || str::equals(e.fieldName(), "size") || str::equals(e.fieldName(), "storageSize") || str::equals(e.fieldName(), "numExtents") || str::equals(e.fieldName(), "totalIndexSize")) { counts[e.fieldName()] += e.numberLong(); if (str::equals(e.fieldName(), "count")) { shardObjCount = e.numberLong(); } } else if (str::equals(e.fieldName(), "avgObjSize")) { shardAvgObjSize = e.numberLong(); } else if (str::equals(e.fieldName(), "indexSizes")) { BSONObjIterator k(e.Obj()); while (k.more()) { BSONElement temp = k.next(); indexSizes[temp.fieldName()] += temp.numberLong(); } } // no longer used since 2.2 else if (str::equals(e.fieldName(), "flags")) { if (!result.hasField(e.fieldName())) result.append(e); } // flags broken out in 2.4+ else if (str::equals(e.fieldName(), "systemFlags")) { if (!result.hasField(e.fieldName())) result.append(e); } else if (str::equals(e.fieldName(), "userFlags")) { if (!result.hasField(e.fieldName())) result.append(e); } else if (str::equals(e.fieldName(), "capped")) { if (!result.hasField(e.fieldName())) result.append(e); } else if (str::equals(e.fieldName(), "paddingFactorNote")) { if (!result.hasField(e.fieldName())) result.append(e); } else if (str::equals(e.fieldName(), "indexDetails")) { // skip this field in the rollup } else if (str::equals(e.fieldName(), "wiredTiger")) { // skip this field in the rollup } else if (str::equals(e.fieldName(), "nindexes")) { int myIndexes = e.numberInt(); if (nindexes == 0) { nindexes = myIndexes; } else if (nindexes == myIndexes) { // no-op } else { // hopefully this means we're building an index if (myIndexes > nindexes) nindexes = myIndexes; if (!warnedAboutIndexes) { result.append("warning", "indexes don't all match - ok if ensureIndex is running"); warnedAboutIndexes = true; } } } else { warning() << "mongos collstats doesn't know about: " << e.fieldName(); } } shardStats.append(shardId.toString(), res); unscaledCollSize += shardAvgObjSize * shardObjCount; } result.append("ns", nss.ns()); for (map::iterator i = counts.begin(); i != counts.end(); ++i) result.appendNumber(i->first, i->second); { BSONObjBuilder ib(result.subobjStart("indexSizes")); for (map::iterator i = indexSizes.begin(); i != indexSizes.end(); ++i) ib.appendNumber(i->first, i->second); ib.done(); } // The unscaled avgObjSize for each shard is used to get the unscaledCollSize // because the raw size returned by the shard is affected by the command's // scale parameter. if (counts["count"] > 0) result.append("avgObjSize", (double)unscaledCollSize / (double)counts["count"]); else result.append("avgObjSize", 0.0); result.append("nindexes", nindexes); result.append("nchunks", cm->numChunks()); result.append("shards", shardStats.obj()); return true; } } collectionStatsCmd; class DataSizeCmd : public PublicGridCommand { public: DataSizeCmd() : PublicGridCommand("dataSize", "datasize") {} std::string parseNs(const std::string& dbname, const BSONObj& cmdObj) const override { return parseNsFullyQualified(dbname, cmdObj); } void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) override { ActionSet actions; actions.addAction(ActionType::find); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const NamespaceString nss(parseNs(dbName, cmdObj)); auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); if (!routingInfo.cm()) { return passthrough(opCtx, dbName, routingInfo.primaryId(), cmdObj, result); } const auto cm = routingInfo.cm(); BSONObj min = cmdObj.getObjectField("min"); BSONObj max = cmdObj.getObjectField("max"); BSONObj keyPattern = cmdObj.getObjectField("keyPattern"); uassert(13408, "keyPattern must equal shard key", SimpleBSONObjComparator::kInstance.evaluate(cm->getShardKeyPattern().toBSON() == keyPattern)); uassert(13405, str::stream() << "min value " << min << " does not have shard key", cm->getShardKeyPattern().isShardKey(min)); uassert(13406, str::stream() << "max value " << max << " does not have shard key", cm->getShardKeyPattern().isShardKey(max)); min = cm->getShardKeyPattern().normalizeShardKey(min); max = cm->getShardKeyPattern().normalizeShardKey(max); // yes these are doubles... double size = 0; double numObjects = 0; int millis = 0; std::set shardIds; cm->getShardIdsForRange(min, max, &shardIds); for (const ShardId& shardId : shardIds) { const auto shardStatus = Grid::get(opCtx)->shardRegistry()->getShard(opCtx, shardId); if (!shardStatus.isOK()) { continue; } ScopedDbConnection conn(shardStatus.getValue()->getConnString()); BSONObj res; bool ok = conn->runCommand(dbName, cmdObj, res); conn.done(); if (!ok) { result.appendElements(res); return false; } size += res["size"].number(); numObjects += res["numObjects"].number(); millis += res["millis"].numberInt(); } result.append("size", size); result.append("numObjects", numObjects); result.append("millis", millis); return true; } } DataSizeCmd; class ConvertToCappedCmd : public NotAllowedOnShardedCollectionCmd { public: ConvertToCappedCmd() : NotAllowedOnShardedCollectionCmd("convertToCapped") {} void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) override { ActionSet actions; actions.addAction(ActionType::convertToCapped); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } bool supportsWriteConcern(const BSONObj& cmd) const override { return true; } std::string parseNs(const std::string& dbname, const BSONObj& cmdObj) const override { return parseNsCollectionRequired(dbname, cmdObj).ns(); } } convertToCappedCmd; class GroupCmd : public NotAllowedOnShardedCollectionCmd { public: GroupCmd() : NotAllowedOnShardedCollectionCmd("group") {} void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) override { ActionSet actions; actions.addAction(ActionType::find); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } std::string parseNs(const std::string& dbname, const BSONObj& cmdObj) const override { const auto nsElt = cmdObj.firstElement().embeddedObjectUserCheck()["ns"]; uassert(ErrorCodes::InvalidNamespace, "'ns' must be of type String", nsElt.type() == BSONType::String); const NamespaceString nss(dbname, nsElt.valueStringData()); uassert(ErrorCodes::InvalidNamespace, str::stream() << "Invalid namespace: " << nss.ns(), nss.isValid()); return nss.ns(); } Status explain(OperationContext* opCtx, const std::string& dbname, const BSONObj& cmdObj, ExplainOptions::Verbosity verbosity, const rpc::ServerSelectionMetadata& serverSelectionMetadata, BSONObjBuilder* out) const override { // We will time how long it takes to run the commands on the shards. Timer timer; BSONObj command; int options = 0; { BSONObjBuilder explainCmdBob; ClusterExplain::wrapAsExplain( cmdObj, verbosity, serverSelectionMetadata, &explainCmdBob, &options); command = explainCmdBob.obj(); } const NamespaceString nss(parseNs(dbname, cmdObj)); auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); uassert(ErrorCodes::IllegalOperation, str::stream() << "Passthrough command failed: " << command.toString() << " on ns " << nss.ns() << ". Cannot run on sharded namespace.", !routingInfo.cm()); BSONObj shardResult; try { ShardConnection conn(routingInfo.primary()->getConnString(), ""); // TODO: this can throw a stale config when mongos is not up-to-date -- fix. if (!conn->runCommand(nss.db().toString(), command, shardResult, options)) { conn.done(); return Status(ErrorCodes::OperationFailed, str::stream() << "Passthrough command failed: " << command << " on ns " << nss.ns() << "; result: " << shardResult); } conn.done(); } catch (const DBException& ex) { return ex.toStatus(); } // Fill out the command result. Strategy::CommandResult cmdResult; cmdResult.shardTargetId = routingInfo.primaryId(); cmdResult.result = shardResult; cmdResult.target = routingInfo.primary()->getConnString(); return ClusterExplain::buildExplainResult( opCtx, {cmdResult}, ClusterExplain::kSingleShard, timer.millis(), out); } } groupCmd; class SplitVectorCmd : public NotAllowedOnShardedCollectionCmd { public: SplitVectorCmd() : NotAllowedOnShardedCollectionCmd("splitVector") {} bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } Status checkAuthForCommand(Client* client, const std::string& dbname, const BSONObj& cmdObj) override { if (!AuthorizationSession::get(client)->isAuthorizedForActionsOnResource( ResourcePattern::forExactNamespace(NamespaceString(parseNs(dbname, cmdObj))), ActionType::splitVector)) { return Status(ErrorCodes::Unauthorized, "Unauthorized"); } return Status::OK(); } std::string parseNs(const string& dbname, const BSONObj& cmdObj) const override { return parseNsFullyQualified(dbname, cmdObj); } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const std::string ns = parseNs(dbName, cmdObj); uassert(ErrorCodes::IllegalOperation, "Performing splitVector across dbs isn't supported via mongos", str::startsWith(ns, dbName)); return NotAllowedOnShardedCollectionCmd::run(opCtx, dbName, cmdObj, errmsg, result); } } splitVectorCmd; class DistinctCmd : public PublicGridCommand { public: DistinctCmd() : PublicGridCommand("distinct") {} void help(stringstream& help) const override { help << "{ distinct : 'collection name' , key : 'a.b' , query : {} }"; } void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) override { ActionSet actions; actions.addAction(ActionType::find); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const NamespaceString nss(parseNsCollectionRequired(dbName, cmdObj)); auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); if (!routingInfo.cm()) { if (passthrough(opCtx, dbName, routingInfo.primaryId(), cmdObj, result)) { return true; } BSONObj resultObj = result.asTempObj(); if (ResolvedView::isResolvedViewErrorResponse(resultObj)) { auto resolvedView = ResolvedView::fromBSON(resultObj); result.resetToEmpty(); auto parsedDistinct = ParsedDistinct::parse( opCtx, resolvedView.getNamespace(), cmdObj, ExtensionsCallbackNoop(), false); if (!parsedDistinct.isOK()) { return appendCommandStatus(result, parsedDistinct.getStatus()); } auto aggCmdOnView = parsedDistinct.getValue().asAggregationCommand(); if (!aggCmdOnView.isOK()) { return appendCommandStatus(result, aggCmdOnView.getStatus()); } auto aggRequestOnView = AggregationRequest::parseFromBSON(nss, aggCmdOnView.getValue()); if (!aggRequestOnView.isOK()) { return appendCommandStatus(result, aggRequestOnView.getStatus()); } auto resolvedAggRequest = resolvedView.asExpandedViewAggregation(aggRequestOnView.getValue()); auto resolvedAggCmd = resolvedAggRequest.serializeToCommandObj().toBson(); BSONObjBuilder aggResult; Command::findCommand("aggregate") ->run(opCtx, dbName, resolvedAggCmd, errmsg, aggResult); ViewResponseFormatter formatter(aggResult.obj()); auto formatStatus = formatter.appendAsDistinctResponse(&result); if (!formatStatus.isOK()) { return appendCommandStatus(result, formatStatus); } return true; } return false; } const auto cm = routingInfo.cm(); auto query = getQuery(cmdObj); auto queryCollation = getCollation(cmdObj); if (!queryCollation.isOK()) { return appendEmptyResultSet(result, queryCollation.getStatus(), nss.ns()); } // Construct collator for deduping. std::unique_ptr collator; if (!queryCollation.getValue().isEmpty()) { auto statusWithCollator = CollatorFactoryInterface::get(opCtx->getServiceContext()) ->makeFromBSON(queryCollation.getValue()); if (!statusWithCollator.isOK()) { return appendEmptyResultSet(result, statusWithCollator.getStatus(), nss.ns()); } collator = std::move(statusWithCollator.getValue()); } set shardIds; cm->getShardIdsForQuery(opCtx, query, queryCollation.getValue(), &shardIds); BSONObjComparator bsonCmp(BSONObj(), BSONObjComparator::FieldNamesMode::kConsider, !queryCollation.getValue().isEmpty() ? collator.get() : cm->getDefaultCollator()); BSONObjSet all = bsonCmp.makeBSONObjSet(); for (const ShardId& shardId : shardIds) { const auto shardStatus = Grid::get(opCtx)->shardRegistry()->getShard(opCtx, shardId); if (!shardStatus.isOK()) { invariant(shardStatus.getStatus() == ErrorCodes::ShardNotFound); continue; } ShardConnection conn(shardStatus.getValue()->getConnString(), nss.ns()); BSONObj res; bool ok = conn->runCommand(nss.db().toString(), cmdObj, res); conn.done(); if (!ok) { result.appendElements(res); return false; } BSONObjIterator it(res["values"].embeddedObject()); while (it.more()) { BSONElement nxt = it.next(); BSONObjBuilder temp(32); temp.appendAs(nxt, ""); all.insert(temp.obj()); } } BSONObjBuilder b(32); int n = 0; for (auto&& obj : all) { b.appendAs(obj.firstElement(), b.numStr(n++)); } result.appendArray("values", b.obj()); return true; } Status explain(OperationContext* opCtx, const std::string& dbname, const BSONObj& cmdObj, ExplainOptions::Verbosity verbosity, const rpc::ServerSelectionMetadata& serverSelectionMetadata, BSONObjBuilder* out) const { const NamespaceString nss(parseNsCollectionRequired(dbname, cmdObj)); // Extract the targeting query. BSONObj targetingQuery; if (BSONElement queryElt = cmdObj["query"]) { if (queryElt.type() == BSONType::Object) { targetingQuery = queryElt.embeddedObject(); } else if (queryElt.type() != BSONType::jstNULL) { return Status(ErrorCodes::TypeMismatch, str::stream() << "\"query\" had the wrong type. Expected " << typeName(BSONType::Object) << " or " << typeName(BSONType::jstNULL) << ", found " << typeName(queryElt.type())); } } // Extract the targeting collation. auto targetingCollation = getCollation(cmdObj); if (!targetingCollation.isOK()) { return targetingCollation.getStatus(); } BSONObjBuilder explainCmdBob; int options = 0; ClusterExplain::wrapAsExplain( cmdObj, verbosity, serverSelectionMetadata, &explainCmdBob, &options); // We will time how long it takes to run the commands on the shards. Timer timer; vector shardResults; Strategy::commandOp(opCtx, dbname, explainCmdBob.obj(), nss.ns(), targetingQuery, targetingCollation.getValue(), &shardResults); long long millisElapsed = timer.millis(); if (shardResults.size() == 1 && ResolvedView::isResolvedViewErrorResponse(shardResults[0].result)) { auto resolvedView = ResolvedView::fromBSON(shardResults[0].result); auto parsedDistinct = ParsedDistinct::parse( opCtx, resolvedView.getNamespace(), cmdObj, ExtensionsCallbackNoop(), true); if (!parsedDistinct.isOK()) { return parsedDistinct.getStatus(); } auto aggCmdOnView = parsedDistinct.getValue().asAggregationCommand(); if (!aggCmdOnView.isOK()) { return aggCmdOnView.getStatus(); } auto aggRequestOnView = AggregationRequest::parseFromBSON(nss, aggCmdOnView.getValue(), verbosity); if (!aggRequestOnView.isOK()) { return aggRequestOnView.getStatus(); } auto resolvedAggRequest = resolvedView.asExpandedViewAggregation(aggRequestOnView.getValue()); auto resolvedAggCmd = resolvedAggRequest.serializeToCommandObj().toBson(); ClusterAggregate::Namespaces nsStruct; nsStruct.requestedNss = nss; nsStruct.executionNss = resolvedAggRequest.getNamespaceString(); return ClusterAggregate::runAggregate( opCtx, nsStruct, resolvedAggRequest, resolvedAggCmd, out); } const char* mongosStageName = ClusterExplain::getStageNameForReadOp(shardResults, cmdObj); return ClusterExplain::buildExplainResult( opCtx, shardResults, mongosStageName, millisElapsed, out); } } disinctCmd; class FileMD5Cmd : public PublicGridCommand { public: FileMD5Cmd() : PublicGridCommand("filemd5") {} void help(stringstream& help) const override { help << " example: { filemd5 : ObjectId(aaaaaaa) , root : \"fs\" }"; } std::string parseNs(const std::string& dbname, const BSONObj& cmdObj) const override { std::string collectionName; if (const auto rootElt = cmdObj["root"]) { uassert(ErrorCodes::InvalidNamespace, "'root' must be of type String", rootElt.type() == BSONType::String); collectionName = rootElt.str(); } if (collectionName.empty()) collectionName = "fs"; collectionName += ".chunks"; return NamespaceString(dbname, collectionName).ns(); } void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) override { out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), ActionType::find)); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const NamespaceString nss(parseNs(dbName, cmdObj)); auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); if (!routingInfo.cm()) { return passthrough(opCtx, dbName, routingInfo.primaryId(), cmdObj, result); } const auto cm = routingInfo.cm(); if (SimpleBSONObjComparator::kInstance.evaluate(cm->getShardKeyPattern().toBSON() == BSON("files_id" << 1))) { BSONObj finder = BSON("files_id" << cmdObj.firstElement()); vector results; Strategy::commandOp( opCtx, dbName, cmdObj, nss.ns(), finder, CollationSpec::kSimpleSpec, &results); verify(results.size() == 1); // querying on shard key so should only talk to one shard BSONObj res = results.begin()->result; result.appendElements(res); return res["ok"].trueValue(); } else if (SimpleBSONObjComparator::kInstance.evaluate(cm->getShardKeyPattern().toBSON() == BSON("files_id" << 1 << "n" << 1))) { int n = 0; BSONObj lastResult; while (true) { // Theory of operation: Starting with n=0, send filemd5 command to shard // with that chunk (gridfs chunk not sharding chunk). That shard will then // compute a partial md5 state (passed in the "md5state" field) for all // contiguous chunks that it has. When it runs out or hits a discontinuity // (eg [1,2,7]) it returns what it has done so far. This is repeated as // long as we keep getting more chunks. The end condition is when we go to // look for chunk n and it doesn't exist. This means that the file's last // chunk is n-1, so we return the computed md5 results. BSONObjBuilder bb; bb.appendElements(cmdObj); bb.appendBool("partialOk", true); bb.append("startAt", n); if (!lastResult.isEmpty()) { bb.append(lastResult["md5state"]); } BSONObj shardCmd = bb.obj(); BSONObj finder = BSON("files_id" << cmdObj.firstElement() << "n" << n); vector results; try { Strategy::commandOp(opCtx, dbName, shardCmd, nss.ns(), finder, CollationSpec::kSimpleSpec, &results); } catch (DBException& e) { // This is handled below and logged Strategy::CommandResult errResult; errResult.shardTargetId = ShardId(); errResult.result = BSON("errmsg" << e.what() << "ok" << 0); results.push_back(errResult); } verify(results.size() == 1); // querying on shard key so should only talk to one shard BSONObj res = results.begin()->result; bool ok = res["ok"].trueValue(); if (!ok) { // Add extra info to make debugging easier result.append("failedAt", n); result.append("sentCommand", shardCmd); BSONForEach(e, res) { if (!str::equals(e.fieldName(), "errmsg")) result.append(e); } log() << "Sharded filemd5 failed: " << redact(result.asTempObj()); errmsg = string("sharded filemd5 failed because: ") + res["errmsg"].valuestrsafe(); return false; } uassert( 16246, str::stream() << "Shard for database " << nss.db() << " is too old to support GridFS sharded by {files_id:1, n:1}", res.hasField("md5state")); lastResult = res; int nNext = res["numChunks"].numberInt(); if (n == nNext) { // no new data means we've reached the end of the file result.appendElements(res); return true; } verify(nNext > n); n = nNext; } verify(0); } // We could support arbitrary shard keys by sending commands to all shards but I don't // think we should errmsg = "GridFS fs.chunks collection must be sharded on either {files_id:1} or " "{files_id:1, n:1}"; return false; } } fileMD5Cmd; class Geo2dFindNearCmd : public PublicGridCommand { public: Geo2dFindNearCmd() : PublicGridCommand("geoNear") {} void help(stringstream& h) const override { h << "http://dochub.mongodb.org/core/geo#GeospatialIndexing-geoNearCommand"; } void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) override { ActionSet actions; actions.addAction(ActionType::find); out->push_back(Privilege(parseResourcePattern(dbname, cmdObj), actions)); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { const NamespaceString nss(parseNsCollectionRequired(dbName, cmdObj)); auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); if (!routingInfo.cm()) { return passthrough(opCtx, dbName, routingInfo.primaryId(), cmdObj, result); } const auto cm = routingInfo.cm(); BSONObj query = getQuery(cmdObj); auto collation = getCollation(cmdObj); if (!collation.isOK()) { return appendEmptyResultSet(result, collation.getStatus(), nss.ns()); } set shardIds; cm->getShardIdsForQuery(opCtx, query, collation.getValue(), &shardIds); // We support both "num" and "limit" options to control limit int limit = 100; const char* limitName = cmdObj["num"].isNumber() ? "num" : "limit"; if (cmdObj[limitName].isNumber()) limit = cmdObj[limitName].numberInt(); // Construct the requests. vector requests; BSONArrayBuilder shardArray; for (const ShardId& shardId : shardIds) { requests.emplace_back(shardId, cmdObj); shardArray.append(shardId.toString()); } // Extract the readPreference from the command. const auto queryOptionsObj = cmdObj.getObjectField(QueryRequest::kUnwrappedReadPrefField); const auto readPrefObj = queryOptionsObj.getObjectField(QueryRequest::kWrappedReadPrefField); const auto readPref = readPrefObj.isEmpty() ? ReadPreferenceSetting(ReadPreference::PrimaryOnly, TagSet()) : uassertStatusOK(ReadPreferenceSetting::fromBSON(readPrefObj)); // Send the requests. AsyncRequestsSender ars(opCtx, Grid::get(opCtx)->getExecutorPool()->getArbitraryExecutor(), dbName, requests, readPref); // Receive the responses. multimap results; // TODO: maybe use merge-sort instead string nearStr; double time = 0; double btreelocs = 0; double nscanned = 0; double objectsLoaded = 0; while (!ars.done()) { // Block until a response is available. auto shardResponse = ars.next(); // Abandon processing responses on any error. if (!shardResponse.swResponse.isOK()) { auto errorStatus = std::move(shardResponse.swResponse.getStatus()); errmsg = errorStatus.reason(); result.append("code", errorStatus.code()); return false; } // Process a successful response. auto shardResult = std::move(shardResponse.swResponse.getValue().data); if (shardResult.hasField("near")) { nearStr = shardResult["near"].String(); } time += shardResult["stats"]["time"].Number(); if (!shardResult["stats"]["btreelocs"].eoo()) { btreelocs += shardResult["stats"]["btreelocs"].Number(); } nscanned += shardResult["stats"]["nscanned"].Number(); if (!shardResult["stats"]["objectsLoaded"].eoo()) { objectsLoaded += shardResult["stats"]["objectsLoaded"].Number(); } BSONForEach(obj, shardResult["results"].embeddedObject()) { results.insert(make_pair(obj["dis"].Number(), obj.embeddedObject().getOwned())); } // TODO: maybe shrink results if size() > limit } result.append("ns", nss.ns()); result.append("near", nearStr); int outCount = 0; double totalDistance = 0; double maxDistance = 0; { BSONArrayBuilder sub(result.subarrayStart("results")); for (multimap::const_iterator it(results.begin()), end(results.end()); it != end && outCount < limit; ++it, ++outCount) { totalDistance += it->first; maxDistance = it->first; // guaranteed to be highest so far sub.append(it->second); } sub.done(); } { BSONObjBuilder sub(result.subobjStart("stats")); sub.append("time", time); sub.append("btreelocs", btreelocs); sub.append("nscanned", nscanned); sub.append("objectsLoaded", objectsLoaded); sub.append("avgDistance", (outCount == 0) ? 0 : (totalDistance / outCount)); sub.append("maxDistance", maxDistance); sub.append("shards", shardArray.arr()); sub.done(); } return true; } } geo2dFindNearCmd; class EvalCmd : public PublicGridCommand { public: EvalCmd() : PublicGridCommand("eval", "$eval") {} virtual void addRequiredPrivileges(const std::string& dbname, const BSONObj& cmdObj, std::vector* out) { // $eval can do pretty much anything, so require all privileges. RoleGraph::generateUniversalPrivileges(out); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) override { RARELY { warning() << "the eval command is deprecated" << startupWarningsLog; } // $eval isn't allowed to access sharded collections, but we need to leave the shard to // detect that const auto dbInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getDatabase(opCtx, dbName)); return passthrough(opCtx, dbName, dbInfo.primaryId(), cmdObj, result); } } evalCmd; class CmdListCollections final : public PublicGridCommand { public: CmdListCollections() : PublicGridCommand("listCollections") {} Status checkAuthForCommand(Client* client, const std::string& dbname, const BSONObj& cmdObj) final { AuthorizationSession* authzSession = AuthorizationSession::get(client); // Check for the listCollections ActionType on the database // or find on system.namespaces for pre 3.0 systems. if (authzSession->isAuthorizedForActionsOnResource(ResourcePattern::forDatabaseName(dbname), ActionType::listCollections) || authzSession->isAuthorizedForActionsOnResource( ResourcePattern::forExactNamespace(NamespaceString(dbname, "system.namespaces")), ActionType::find)) { return Status::OK(); } return Status(ErrorCodes::Unauthorized, str::stream() << "Not authorized to create users on db: " << dbname); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) final { auto nss = NamespaceString::makeListCollectionsNSS(dbName); auto dbInfoStatus = Grid::get(opCtx)->catalogCache()->getDatabase(opCtx, dbName); if (!dbInfoStatus.isOK()) { return appendEmptyResultSet(result, dbInfoStatus.getStatus(), nss.ns()); } const auto& dbInfo = dbInfoStatus.getValue(); return cursorCommandPassthrough(opCtx, dbName, dbInfo.primaryId(), cmdObj, nss, &result); } } cmdListCollections; class CmdListIndexes final : public PublicGridCommand { public: CmdListIndexes() : PublicGridCommand("listIndexes") {} virtual Status checkAuthForCommand(Client* client, const std::string& dbname, const BSONObj& cmdObj) { AuthorizationSession* authzSession = AuthorizationSession::get(client); // Check for the listIndexes ActionType on the database, or find on system.indexes for pre // 3.0 systems. const NamespaceString ns(parseNsCollectionRequired(dbname, cmdObj)); if (authzSession->isAuthorizedForActionsOnResource(ResourcePattern::forExactNamespace(ns), ActionType::listIndexes) || authzSession->isAuthorizedForActionsOnResource( ResourcePattern::forExactNamespace(NamespaceString(dbname, "system.indexes")), ActionType::find)) { return Status::OK(); } return Status(ErrorCodes::Unauthorized, str::stream() << "Not authorized to list indexes on collection: " << ns.coll()); } bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool run(OperationContext* opCtx, const string& dbName, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result) final { const NamespaceString nss(parseNsCollectionRequired(dbName, cmdObj)); const auto routingInfo = uassertStatusOK(Grid::get(opCtx)->catalogCache()->getCollectionRoutingInfo(opCtx, nss)); const auto commandNss = NamespaceString::makeListIndexesNSS(nss.db(), nss.coll()); return cursorCommandPassthrough( opCtx, nss.db(), routingInfo.primaryId(), cmdObj, commandNss, &result); } } cmdListIndexes; } // namespace } // namespace mongo