1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
|
/**
* Copyright (C) 2022-present MongoDB, Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the Server Side Public License, version 1,
* as published by MongoDB, Inc.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* Server Side Public License for more details.
*
* You should have received a copy of the Server Side Public License
* along with this program. If not, see
* <http://www.mongodb.com/licensing/server-side-public-license>.
*
* As a special exception, the copyright holders give permission to link the
* code of portions of this program with the OpenSSL library under certain
* conditions as described in each individual source file and distribute
* linked combinations including the program with the OpenSSL library. You
* must comply with the Server Side Public License in all respects for
* all of the code used other than as permitted herein. If you modify file(s)
* with this exception, you may extend this exception to your version of the
* file(s), but you are not obligated to do so. If you do not wish to do so,
* delete this exception statement from your version. If you delete this
* exception statement from all source files in the program, then also delete
* it in the license file.
*/
#define MONGO_LOGV2_DEFAULT_COMPONENT ::mongo::logv2::LogComponent::kSharding
#include "mongo/platform/basic.h"
#include "mongo/db/auth/authorization_session.h"
#include "mongo/db/cancelable_operation_context.h"
#include "mongo/db/commands.h"
#include "mongo/db/commands/set_cluster_parameter_invocation.h"
#include "mongo/db/commands/user_management_commands_gen.h"
#include "mongo/db/dbdirectclient.h"
#include "mongo/db/repl/repl_client_info.h"
#include "mongo/logv2/log.h"
#include "mongo/s/grid.h"
#include "mongo/s/request_types/sharded_ddl_commands_gen.h"
namespace mongo {
namespace {
const WriteConcernOptions kLocalWriteConcern{
1, WriteConcernOptions::SyncMode::UNSET, WriteConcernOptions::kNoTimeout};
class ShardsvrSetClusterParameterCommand final
: public TypedCommand<ShardsvrSetClusterParameterCommand> {
public:
using Request = ShardsvrSetClusterParameter;
class Invocation final : public InvocationBase {
public:
using InvocationBase::InvocationBase;
void typedRun(OperationContext* opCtx) {
uassert(ErrorCodes::IllegalOperation,
str::stream() << Request::kCommandName << " can only be run on shard servers",
serverGlobalParams.clusterRole == ClusterRole::ShardServer);
CommandHelpers::uassertCommandRunWithMajority(Request::kCommandName,
opCtx->getWriteConcern());
SetClusterParameter setClusterParameterRequest(request().getCommandParameter());
setClusterParameterRequest.setDbName(NamespaceString::kAdminDb);
std::unique_ptr<ServerParameterService> parameterService =
std::make_unique<ClusterParameterService>();
DBDirectClient client(opCtx);
ClusterParameterDBClientService dbService(client);
SetClusterParameterInvocation invocation{std::move(parameterService), dbService};
// Use local write concern for setClusterParameter, the idea is that the command is
// being called with majority write concern, so, we'll wait for majority after checking
// out the session.
bool writePerformed = invocation.invoke(opCtx,
setClusterParameterRequest,
request().getClusterParameterTime(),
kLocalWriteConcern);
if (!writePerformed) {
// Since no write happened on this txnNumber, we need to make a dummy write so
// that secondaries can be aware of this txn.
DBDirectClient client(opCtx);
client.update(NamespaceString::kServerConfigurationNamespace.ns(),
BSON("_id"
<< "SetClusterParameterStats"),
BSON("$inc" << BSON("count" << 1)),
true /* upsert */,
false /* multi */);
}
}
private:
NamespaceString ns() const override {
return NamespaceString();
}
bool supportsWriteConcern() const override {
return true;
}
void doCheckAuthorization(OperationContext* opCtx) const override {
uassert(ErrorCodes::Unauthorized,
"Unauthorized",
AuthorizationSession::get(opCtx->getClient())
->isAuthorizedForActionsOnResource(ResourcePattern::forClusterResource(),
ActionType::internal));
}
};
std::string help() const override {
return "Internal command, which is exported by the shard servers. Do not call "
"directly. Set's the cluster parameter in the node.";
}
bool adminOnly() const override {
return true;
}
AllowedOnSecondary secondaryAllowed(ServiceContext*) const override {
return AllowedOnSecondary::kNever;
}
} shardsvrSetClusterParameterCmd;
} // namespace
} // namespace mongo
|