1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
/**
* Copyright (C) 2021-present MongoDB, Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the Server Side Public License, version 1,
* as published by MongoDB, Inc.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* Server Side Public License for more details.
*
* You should have received a copy of the Server Side Public License
* along with this program. If not, see
* <http://www.mongodb.com/licensing/server-side-public-license>.
*
* As a special exception, the copyright holders give permission to link the
* code of portions of this program with the OpenSSL library under certain
* conditions as described in each individual source file and distribute
* linked combinations including the program with the OpenSSL library. You
* must comply with the Server Side Public License in all respects for
* all of the code used other than as permitted herein. If you modify file(s)
* with this exception, you may extend this exception to your version of the
* file(s), but you are not obligated to do so. If you do not wish to do so,
* delete this exception statement from your version. If you delete this
* exception statement from all source files in the program, then also delete
* it in the license file.
*/
#define MONGO_LOG_DEFAULT_COMPONENT ::mongo::logger::LogComponent::kSharding
#include "mongo/platform/basic.h"
#include "mongo/db/audit.h"
#include "mongo/db/auth/action_set.h"
#include "mongo/db/auth/action_type.h"
#include "mongo/db/auth/authorization_manager.h"
#include "mongo/db/auth/authorization_session.h"
#include "mongo/db/client.h"
#include "mongo/db/commands.h"
#include "mongo/s/grid.h"
namespace mongo {
namespace {
class RepairShardedCollectionChunksHistoryCommand : public BasicCommand {
public:
RepairShardedCollectionChunksHistoryCommand()
: BasicCommand("repairShardedCollectionChunksHistory") {}
AllowedOnSecondary secondaryAllowed(ServiceContext*) const override {
return AllowedOnSecondary::kAlways;
}
bool adminOnly() const override {
return true;
}
bool supportsWriteConcern(const BSONObj& cmd) const override {
return false;
}
std::string help() const override {
return "Administrative command to repair the effects of SERVER-62065. If the collection "
"has been upgraded through a cluster comprised of binaries which do not contain "
"this command, the chunks cache collections on the shards will miss history "
"entries. This command will correct that and will mark such collections as "
"correctly repaired, so that a subsequent invocation will not cause any changes to "
"the routing information. In rare cases where the history entries are missing due "
"to corrupted restore, the 'force:true' parameter can be passed which will force "
"all history entries to be re-added.";
}
// The command intentionally uses the permission control of split/mergeChunks since it only
// modifies the contents of chunk entries and increments the collection/shard placement versions
// without causing any data placement changes
Status checkAuthForOperation(OperationContext* opCtx,
const DatabaseName& dbName,
const BSONObj& cmdObj) const override {
if (!AuthorizationSession::get(opCtx->getClient())
->isAuthorizedForActionsOnResource(
ResourcePattern::forExactNamespace(parseNs(dbName, cmdObj)),
ActionType::splitChunk)) {
return Status(ErrorCodes::Unauthorized, "Unauthorized");
}
return Status::OK();
}
NamespaceString parseNs(const DatabaseName& dbName, const BSONObj& cmdObj) const override {
return NamespaceStringUtil::parseNamespaceFromRequest(
dbName.tenantId(), CommandHelpers::parseNsFullyQualified(cmdObj));
}
bool run(OperationContext* opCtx,
const DatabaseName& dbName,
const BSONObj& cmdObj,
BSONObjBuilder& result) override {
const NamespaceString nss{parseNs(dbName, cmdObj)};
BSONObjBuilder cmdBuilder(
BSON("_configsvrRepairShardedCollectionChunksHistory" << nss.ns()));
if (cmdObj["force"].booleanSafe())
cmdBuilder.appendBool("force", true);
auto configShard = Grid::get(opCtx)->shardRegistry()->getConfigShard();
auto cmdResponse = uassertStatusOK(configShard->runCommandWithFixedRetryAttempts(
opCtx,
ReadPreferenceSetting{ReadPreference::PrimaryOnly},
"admin",
CommandHelpers::appendMajorityWriteConcern(cmdBuilder.obj(), opCtx->getWriteConcern()),
Shard::RetryPolicy::kIdempotent));
uassertStatusOK(cmdResponse.commandStatus);
// Append any return value from the response, which the config server returned
CommandHelpers::filterCommandReplyForPassthrough(cmdResponse.response, &result);
return true;
}
} repairShardedCollectionChunksHistoryCommand;
} // namespace
} // namespace mongo
|