| // Licensed to the Apache Software Foundation (ASF) under one |
| // or more contributor license agreements. See the NOTICE file |
| // distributed with this work for additional information |
| // regarding copyright ownership. The ASF licenses this file |
| // to you under the Apache License, Version 2.0 (the |
| // "License"); you may not use this file except in compliance |
| // with the License. You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, |
| // software distributed under the License is distributed on an |
| // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| // KIND, either express or implied. See the License for the |
| // specific language governing permissions and limitations |
| // under the License. |
| |
| #include "meta_service_http.h" |
| |
| #include <brpc/controller.h> |
| #include <brpc/http_status_code.h> |
| #include <brpc/uri.h> |
| #include <fmt/core.h> |
| #include <fmt/format.h> |
| #include <gen_cpp/cloud.pb.h> |
| #include <glog/logging.h> |
| #include <google/protobuf/message.h> |
| #include <google/protobuf/service.h> |
| #include <google/protobuf/util/json_util.h> |
| #include <rapidjson/document.h> |
| #include <rapidjson/error/en.h> |
| #include <rapidjson/prettywriter.h> |
| #include <rapidjson/stringbuffer.h> |
| |
| #include <algorithm> |
| #include <array> |
| #include <cstdint> |
| #include <functional> |
| #include <memory> |
| #include <optional> |
| #include <string> |
| #include <string_view> |
| #include <type_traits> |
| #include <variant> |
| #include <vector> |
| |
| #include "common/config.h" |
| #include "common/configbase.h" |
| #include "common/logging.h" |
| #include "common/string_util.h" |
| #include "meta-service/keys.h" |
| #include "meta-service/txn_kv.h" |
| #include "meta-service/txn_kv_error.h" |
| #include "meta_service.h" |
| #include "rate-limiter/rate_limiter.h" |
| |
| namespace doris::cloud { |
| |
| #define PARSE_MESSAGE_OR_RETURN(ctrl, req) \ |
| do { \ |
| std::string body = ctrl->request_attachment().to_string(); \ |
| auto& unresolved_path = ctrl->http_request().unresolved_path(); \ |
| auto st = parse_json_message(unresolved_path, body, &req); \ |
| if (!st.ok()) { \ |
| std::string msg = "parse http request '" + unresolved_path + "': " + st.ToString(); \ |
| LOG_WARNING(msg).tag("body", body); \ |
| return http_json_reply(MetaServiceCode::PROTOBUF_PARSE_ERR, msg); \ |
| } \ |
| } while (0) |
| |
| extern std::string get_instance_id(const std::shared_ptr<ResourceManager>& rc_mgr, |
| const std::string& cloud_unique_id); |
| |
| extern int decrypt_instance_info(InstanceInfoPB& instance, const std::string& instance_id, |
| MetaServiceCode& code, std::string& msg, |
| std::shared_ptr<Transaction>& txn); |
| |
| template <typename Message> |
| static google::protobuf::util::Status parse_json_message(const std::string& unresolved_path, |
| const std::string& body, Message* req) { |
| static_assert(std::is_base_of_v<google::protobuf::Message, Message>); |
| auto st = google::protobuf::util::JsonStringToMessage(body, req); |
| if (!st.ok()) { |
| std::string msg = "failed to strictly parse http request for '" + unresolved_path + |
| "' error: " + st.ToString(); |
| LOG_WARNING(msg).tag("body", body); |
| |
| // ignore unknown fields |
| google::protobuf::util::JsonParseOptions json_parse_options; |
| json_parse_options.ignore_unknown_fields = true; |
| return google::protobuf::util::JsonStringToMessage(body, req, json_parse_options); |
| } |
| return {}; |
| } |
| |
| std::tuple<int, std::string_view> convert_ms_code_to_http_code(MetaServiceCode ret) { |
| switch (ret) { |
| case OK: |
| return {200, "OK"}; |
| case INVALID_ARGUMENT: |
| case PROTOBUF_PARSE_ERR: |
| return {400, "INVALID_ARGUMENT"}; |
| case CLUSTER_NOT_FOUND: |
| return {404, "NOT_FOUND"}; |
| case ALREADY_EXISTED: |
| return {409, "ALREADY_EXISTED"}; |
| case KV_TXN_CREATE_ERR: |
| case KV_TXN_GET_ERR: |
| case KV_TXN_COMMIT_ERR: |
| case PROTOBUF_SERIALIZE_ERR: |
| case TXN_GEN_ID_ERR: |
| case TXN_DUPLICATED_REQ: |
| case TXN_LABEL_ALREADY_USED: |
| case TXN_INVALID_STATUS: |
| case TXN_LABEL_NOT_FOUND: |
| case TXN_ID_NOT_FOUND: |
| case TXN_ALREADY_ABORTED: |
| case TXN_ALREADY_VISIBLE: |
| case TXN_ALREADY_PRECOMMITED: |
| case VERSION_NOT_FOUND: |
| case UNDEFINED_ERR: |
| default: |
| return {500, "INTERNAL_ERROR"}; |
| } |
| } |
| |
| HttpResponse http_json_reply(MetaServiceCode code, const std::string& msg, |
| std::optional<std::string> body) { |
| auto [status_code, status_msg] = convert_ms_code_to_http_code(code); |
| rapidjson::Document d; |
| d.SetObject(); |
| if (code == MetaServiceCode::OK) { |
| d.AddMember("code", "OK", d.GetAllocator()); |
| d.AddMember("msg", "", d.GetAllocator()); |
| } else { |
| d.AddMember("code", rapidjson::StringRef(status_msg.data(), status_msg.size()), |
| d.GetAllocator()); |
| d.AddMember("msg", rapidjson::StringRef(msg.data(), msg.size()), d.GetAllocator()); |
| } |
| |
| rapidjson::Document result; |
| if (body.has_value()) { |
| rapidjson::ParseResult ok = result.Parse(body->c_str()); |
| if (!ok) { |
| LOG_WARNING("JSON parse error") |
| .tag("code", rapidjson::GetParseError_En(ok.Code())) |
| .tag("offset", ok.Offset()); |
| d.AddMember("code", "INTERNAL_ERROR", d.GetAllocator()); |
| d.AddMember("msg", "JSON parse error", d.GetAllocator()); |
| } else { |
| d.AddMember("result", result, d.GetAllocator()); |
| } |
| } |
| |
| rapidjson::StringBuffer sb; |
| rapidjson::PrettyWriter<rapidjson::StringBuffer> writer(sb); |
| d.Accept(writer); |
| return {status_code, msg, sb.GetString()}; |
| } |
| |
| static std::string format_http_request(brpc::Controller* cntl) { |
| const brpc::HttpHeader& request = cntl->http_request(); |
| auto& unresolved_path = request.unresolved_path(); |
| auto& uri = request.uri(); |
| std::stringstream ss; |
| ss << "\nuri_path=" << uri.path(); |
| ss << "\nunresolved_path=" << unresolved_path; |
| ss << "\nmethod=" << brpc::HttpMethod2Str(request.method()); |
| ss << "\nquery strings:"; |
| for (auto it = uri.QueryBegin(); it != uri.QueryEnd(); ++it) { |
| ss << "\n" << it->first << "=" << it->second; |
| } |
| ss << "\nheaders:"; |
| for (auto it = request.HeaderBegin(); it != request.HeaderEnd(); ++it) { |
| ss << "\n" << it->first << ":" << it->second; |
| } |
| std::string body = cntl->request_attachment().to_string(); |
| ss << "\nbody=" << (body.empty() ? "(empty)" : body); |
| return ss.str(); |
| } |
| |
| static std::string_view remove_version_prefix(std::string_view path) { |
| if (path.size() > 3 && path.substr(0, 3) == "v1/") path.remove_prefix(3); |
| return path; |
| } |
| |
| HttpResponse process_injection_point(MetaServiceImpl* service, brpc::Controller* ctrl); |
| |
| static HttpResponse process_alter_cluster(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| static std::unordered_map<std::string_view, AlterClusterRequest::Operation> operations { |
| {"add_cluster", AlterClusterRequest::ADD_CLUSTER}, |
| {"drop_cluster", AlterClusterRequest::DROP_CLUSTER}, |
| {"rename_cluster", AlterClusterRequest::RENAME_CLUSTER}, |
| {"update_cluster_endpoint", AlterClusterRequest::UPDATE_CLUSTER_ENDPOINT}, |
| {"update_cluster_mysql_user_name", AlterClusterRequest::UPDATE_CLUSTER_MYSQL_USER_NAME}, |
| {"add_node", AlterClusterRequest::ADD_NODE}, |
| {"drop_node", AlterClusterRequest::DROP_NODE}, |
| {"decommission_node", AlterClusterRequest::DECOMMISSION_NODE}, |
| {"set_cluster_status", AlterClusterRequest::SET_CLUSTER_STATUS}, |
| {"notify_decommissioned", AlterClusterRequest::NOTIFY_DECOMMISSIONED}, |
| }; |
| |
| auto& path = ctrl->http_request().unresolved_path(); |
| auto body = ctrl->request_attachment().to_string(); |
| auto it = operations.find(remove_version_prefix(path)); |
| if (it == operations.end()) { |
| std::string msg = "not supportted alter cluster operation: " + path; |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, msg); |
| } |
| |
| AlterClusterRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| |
| req.set_op(it->second); |
| AlterClusterResponse resp; |
| service->alter_cluster(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_get_obj_store_info(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| GetObjStoreInfoRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| |
| GetObjStoreInfoResponse resp; |
| service->get_obj_store_info(ctrl, &req, &resp, nullptr); |
| return http_json_reply_message(resp.status(), resp); |
| } |
| |
| static HttpResponse process_alter_obj_store_info(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| static std::unordered_map<std::string_view, AlterObjStoreInfoRequest::Operation> operations { |
| {"add_obj_info", AlterObjStoreInfoRequest::ADD_OBJ_INFO}, |
| {"legacy_update_ak_sk", AlterObjStoreInfoRequest::LEGACY_UPDATE_AK_SK}}; |
| |
| auto& path = ctrl->http_request().unresolved_path(); |
| auto it = operations.find(remove_version_prefix(path)); |
| if (it == operations.end()) { |
| std::string msg = "not supportted alter obj store info operation: " + path; |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, msg); |
| } |
| |
| AlterObjStoreInfoRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| req.set_op(it->second); |
| |
| AlterObjStoreInfoResponse resp; |
| service->alter_obj_store_info(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_alter_storage_vault(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| static std::unordered_map<std::string_view, AlterObjStoreInfoRequest::Operation> operations { |
| {"drop_s3_vault", AlterObjStoreInfoRequest::DROP_S3_VAULT}, |
| {"add_s3_vault", AlterObjStoreInfoRequest::ADD_S3_VAULT}, |
| {"drop_hdfs_vault", AlterObjStoreInfoRequest::DROP_HDFS_INFO}, |
| {"add_hdfs_vault", AlterObjStoreInfoRequest::ADD_HDFS_INFO}}; |
| |
| auto& path = ctrl->http_request().unresolved_path(); |
| auto it = operations.find(remove_version_prefix(path)); |
| if (it == operations.end()) { |
| std::string msg = "not supportted alter storage vault operation: " + path; |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, msg); |
| } |
| |
| AlterObjStoreInfoRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| req.set_op(it->second); |
| |
| AlterObjStoreInfoResponse resp; |
| service->alter_storage_vault(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_update_ak_sk(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| UpdateAkSkRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| UpdateAkSkResponse resp; |
| service->update_ak_sk(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_create_instance(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| CreateInstanceRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| CreateInstanceResponse resp; |
| service->create_instance(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_alter_instance(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| static std::unordered_map<std::string_view, std::vector<AlterInstanceRequest::Operation>> |
| operations {{"rename_instance", {AlterInstanceRequest::RENAME}}, |
| {"enable_instance_sse", {AlterInstanceRequest::ENABLE_SSE}}, |
| {"disable_instance_sse", {AlterInstanceRequest::DISABLE_SSE}}, |
| {"drop_instance", {AlterInstanceRequest::DROP}}, |
| {"set_instance_status", |
| {AlterInstanceRequest::SET_NORMAL, AlterInstanceRequest::SET_OVERDUE}}}; |
| |
| auto& path = ctrl->http_request().unresolved_path(); |
| auto it = operations.find(remove_version_prefix(path)); |
| if (it == operations.end()) { |
| std::string msg = "not supportted alter instance operation: '" + path + |
| "', remove version prefix=" + std::string(remove_version_prefix(path)); |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, msg); |
| } |
| |
| AlterInstanceRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| // for unresolved path whose corresponding operation is signal, we need set operation by ourselves. |
| if ((it->second).size() == 1) { |
| req.set_op((it->second)[0]); |
| } |
| AlterInstanceResponse resp; |
| service->alter_instance(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_abort_txn(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| AbortTxnRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| AbortTxnResponse resp; |
| service->abort_txn(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_abort_tablet_job(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| FinishTabletJobRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| req.set_action(FinishTabletJobRequest::ABORT); |
| FinishTabletJobResponse resp; |
| service->finish_tablet_job(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_alter_ram_user(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| AlterRamUserRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| AlterRamUserResponse resp; |
| service->alter_ram_user(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_alter_iam(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| AlterIamRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| AlterIamResponse resp; |
| service->alter_iam(ctrl, &req, &resp, nullptr); |
| return http_json_reply(resp.status()); |
| } |
| |
| static HttpResponse process_adjust_rate_limit(MetaServiceImpl* service, brpc::Controller* cntl) { |
| const auto& uri = cntl->http_request().uri(); |
| auto qps_limit_str = std::string {http_query(uri, "qps_limit")}; |
| auto rpc_name = std::string {http_query(uri, "rpc_name")}; |
| auto instance_id = std::string {http_query(uri, "instance_id")}; |
| |
| auto process_set_qps_limit = [&](std::function<bool(int64_t)> cb) -> HttpResponse { |
| DCHECK(!qps_limit_str.empty()); |
| int64_t qps_limit = -1; |
| try { |
| qps_limit = std::stoll(qps_limit_str); |
| } catch (const std::exception& ex) { |
| return http_json_reply( |
| MetaServiceCode::INVALID_ARGUMENT, |
| fmt::format("param `qps_limit` is not a legal int64 type:{}", ex.what())); |
| } |
| if (qps_limit < 0) { |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, |
| "`qps_limit` should not be less than 0"); |
| } |
| if (cb(qps_limit)) { |
| return http_json_reply(MetaServiceCode::OK, "sucess to adjust rate limit"); |
| } |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, |
| fmt::format("failed to adjust rate limit for qps_limit={}, " |
| "rpc_name={}, instance_id={}, plz ensure correct " |
| "rpc/instance name", |
| qps_limit_str, rpc_name, instance_id)); |
| }; |
| |
| auto set_global_qps_limit = [process_set_qps_limit, service]() { |
| return process_set_qps_limit([service](int64_t qps_limit) { |
| return service->rate_limiter()->set_rate_limit(qps_limit); |
| }); |
| }; |
| |
| auto set_rpc_qps_limit = [&]() { |
| return process_set_qps_limit([&](int64_t qps_limit) { |
| return service->rate_limiter()->set_rate_limit(qps_limit, rpc_name); |
| }); |
| }; |
| |
| auto set_instance_qps_limit = [&]() { |
| return process_set_qps_limit([&](int64_t qps_limit) { |
| return service->rate_limiter()->set_instance_rate_limit(qps_limit, instance_id); |
| }); |
| }; |
| |
| auto set_instance_rpc_qps_limit = [&]() { |
| return process_set_qps_limit([&](int64_t qps_limit) { |
| return service->rate_limiter()->set_rate_limit(qps_limit, rpc_name, instance_id); |
| }); |
| }; |
| |
| auto process_invalid_arguments = [&]() -> HttpResponse { |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, |
| fmt::format("invalid argument: qps_limit(required)={}, " |
| "rpc_name(optional)={}, instance_id(optional)={}", |
| qps_limit_str, rpc_name, instance_id)); |
| }; |
| |
| // We have 3 optional params and 2^3 combination, and 4 of them are illegal. |
| // We register callbacks for them in porcessors accordings to the level, represented by 3 bits. |
| std::array<std::function<HttpResponse()>, 8> processors; |
| std::fill_n(processors.begin(), 8, std::move(process_invalid_arguments)); |
| processors[0b001] = std::move(set_global_qps_limit); |
| processors[0b011] = std::move(set_rpc_qps_limit); |
| processors[0b101] = std::move(set_instance_qps_limit); |
| processors[0b111] = std::move(set_instance_rpc_qps_limit); |
| |
| uint8_t level = (0x01 & !qps_limit_str.empty()) | ((0x01 & !rpc_name.empty()) << 1) | |
| ((0x01 & !instance_id.empty()) << 2); |
| |
| DCHECK_LT(level, 8); |
| |
| return processors[level](); |
| } |
| |
| static HttpResponse process_query_rate_limit(MetaServiceImpl* service, brpc::Controller* cntl) { |
| auto rate_limiter = service->rate_limiter(); |
| rapidjson::Document d; |
| d.SetObject(); |
| auto get_qps_limit = [&d](std::string_view rpc_name, |
| std::shared_ptr<RpcRateLimiter> rpc_limiter) { |
| rapidjson::Document node; |
| node.SetObject(); |
| rapidjson::Document sub; |
| sub.SetObject(); |
| auto get_qps_token_limit = [&](std::string_view instance_id, |
| std::shared_ptr<RpcRateLimiter::QpsToken> qps_token) { |
| sub.AddMember(rapidjson::StringRef(instance_id.data(), instance_id.size()), |
| qps_token->max_qps_limit(), d.GetAllocator()); |
| }; |
| rpc_limiter->for_each_qps_token(std::move(get_qps_token_limit)); |
| |
| node.AddMember("RPC qps limit", rpc_limiter->max_qps_limit(), d.GetAllocator()); |
| node.AddMember("instance specific qps limit", sub, d.GetAllocator()); |
| d.AddMember(rapidjson::StringRef(rpc_name.data(), rpc_name.size()), node, d.GetAllocator()); |
| }; |
| rate_limiter->for_each_rpc_limiter(std::move(get_qps_limit)); |
| |
| rapidjson::StringBuffer sb; |
| rapidjson::PrettyWriter<rapidjson::StringBuffer> writer(sb); |
| d.Accept(writer); |
| return http_json_reply(MetaServiceCode::OK, "", sb.GetString()); |
| } |
| |
| static HttpResponse process_update_config(MetaServiceImpl* service, brpc::Controller* cntl) { |
| const auto& uri = cntl->http_request().uri(); |
| bool persist = (http_query(uri, "persist") == "true"); |
| auto configs = std::string {http_query(uri, "configs")}; |
| auto reason = std::string {http_query(uri, "reason")}; |
| LOG(INFO) << "modify configs for reason=" << reason << ", configs=" << configs |
| << ", persist=" << http_query(uri, "persist"); |
| if (configs.empty()) [[unlikely]] { |
| LOG(WARNING) << "query param `config` should not be empty"; |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, |
| "query param `config` should not be empty"); |
| } |
| std::unordered_map<std::string, std::string> conf_map; |
| auto conf_list = split(configs, ','); |
| for (const auto& conf : conf_list) { |
| auto conf_pair = split(conf, '='); |
| if (conf_pair.size() != 2) [[unlikely]] { |
| LOG(WARNING) << "failed to split config=[{}] from `k=v` pattern" << conf; |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, |
| fmt::format("config {} is invalid", configs)); |
| } |
| trim(conf_pair[0]); |
| trim(conf_pair[1]); |
| conf_map.emplace(std::move(conf_pair[0]), std::move(conf_pair[1])); |
| } |
| if (auto [succ, cause] = |
| config::set_config(std::move(conf_map), persist, config::custom_conf_path); |
| !succ) { |
| LOG(WARNING) << cause; |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, cause); |
| } |
| return http_json_reply(MetaServiceCode::OK, ""); |
| } |
| |
| static HttpResponse process_decode_key(MetaServiceImpl*, brpc::Controller* ctrl) { |
| auto& uri = ctrl->http_request().uri(); |
| std::string_view key = http_query(uri, "key"); |
| if (key.empty()) { |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, "no key to decode"); |
| } |
| |
| bool unicode = http_query(uri, "unicode") != "false"; |
| std::string body = prettify_key(key, unicode); |
| if (body.empty()) { |
| std::string msg = "failed to decode key, key=" + std::string(key); |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, msg); |
| } |
| return http_text_reply(MetaServiceCode::OK, "", body); |
| } |
| |
| static HttpResponse process_encode_key(MetaServiceImpl*, brpc::Controller* ctrl) { |
| return process_http_encode_key(ctrl->http_request().uri()); |
| } |
| |
| static HttpResponse process_get_value(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| return process_http_get_value(service->txn_kv().get(), ctrl->http_request().uri()); |
| } |
| |
| static HttpResponse process_set_value(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| return process_http_set_value(service->txn_kv().get(), ctrl); |
| } |
| |
| // show all key ranges and their count. |
| static HttpResponse process_show_meta_ranges(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| auto txn_kv = std::dynamic_pointer_cast<FdbTxnKv>(service->txn_kv()); |
| if (!txn_kv) { |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, |
| "this method only support fdb txn kv"); |
| } |
| |
| std::vector<std::string> partition_boundaries; |
| TxnErrorCode code = txn_kv->get_partition_boundaries(&partition_boundaries); |
| if (code != TxnErrorCode::TXN_OK) { |
| auto msg = fmt::format("failed to get boundaries, code={}", code); |
| return http_json_reply(MetaServiceCode::UNDEFINED_ERR, msg); |
| } |
| |
| std::unordered_map<std::string, size_t> partition_count; |
| size_t prefix_size = FdbTxnKv::fdb_partition_key_prefix().size(); |
| for (auto&& boundary : partition_boundaries) { |
| if (boundary.size() < prefix_size + 1 || boundary[prefix_size] != CLOUD_USER_KEY_SPACE01) { |
| continue; |
| } |
| |
| std::string_view user_key(boundary); |
| user_key.remove_prefix(prefix_size + 1); // Skip the KEY_SPACE prefix. |
| std::vector<std::tuple<std::variant<int64_t, std::string>, int, int>> out; |
| decode_key(&user_key, &out); // ignore any error, since the boundary key might be truncated. |
| |
| auto visitor = [](auto&& arg) -> std::string { |
| using T = std::decay_t<decltype(arg)>; |
| if constexpr (std::is_same_v<T, std::string>) { |
| return arg; |
| } else { |
| return std::to_string(arg); |
| } |
| }; |
| |
| if (!out.empty()) { |
| std::string key; |
| for (size_t i = 0; i < 3 && i < out.size(); ++i) { |
| key += std::visit(visitor, std::get<0>(out[i])); |
| key += '|'; |
| } |
| key.pop_back(); // omit the last '|' |
| partition_count[key]++; |
| } |
| } |
| |
| // sort ranges by count |
| std::vector<std::pair<std::string, size_t>> meta_ranges; |
| meta_ranges.reserve(partition_count.size()); |
| for (auto&& [key, count] : partition_count) { |
| meta_ranges.emplace_back(key, count); |
| } |
| |
| std::sort(meta_ranges.begin(), meta_ranges.end(), |
| [](const auto& lhs, const auto& rhs) { return lhs.second > rhs.second; }); |
| |
| std::string body = fmt::format("total partitions: {}\n", partition_boundaries.size()); |
| for (auto&& [key, count] : meta_ranges) { |
| body += fmt::format("{}: {}\n", key, count); |
| } |
| return http_text_reply(MetaServiceCode::OK, "", body); |
| } |
| |
| static HttpResponse process_get_instance_info(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| auto& uri = ctrl->http_request().uri(); |
| std::string_view instance_id = http_query(uri, "instance_id"); |
| std::string_view cloud_unique_id = http_query(uri, "cloud_unique_id"); |
| |
| InstanceInfoPB instance; |
| auto [code, msg] = service->get_instance_info(std::string(instance_id), |
| std::string(cloud_unique_id), &instance); |
| return http_json_reply_message(code, msg, instance); |
| } |
| |
| static HttpResponse process_get_cluster(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| GetClusterRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| |
| bool get_all_cluster_info = false; |
| // if cluster_id、cluster_name、mysql_user_name all empty, get this instance's all cluster info. |
| if (req.cluster_id().empty() && req.cluster_name().empty() && req.mysql_user_name().empty()) { |
| get_all_cluster_info = true; |
| } |
| |
| GetClusterResponse resp; |
| service->get_cluster(ctrl, &req, &resp, nullptr); |
| |
| if (resp.status().code() == MetaServiceCode::OK) { |
| if (get_all_cluster_info) { |
| return http_json_reply_message(resp.status(), resp); |
| } else { |
| // ATTN: only returns the first cluster pb. |
| return http_json_reply_message(resp.status(), resp.cluster(0)); |
| } |
| } else { |
| return http_json_reply(resp.status()); |
| } |
| } |
| |
| static HttpResponse process_get_tablet_stats(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| GetTabletStatsRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| GetTabletStatsResponse resp; |
| service->get_tablet_stats(ctrl, &req, &resp, nullptr); |
| |
| std::string body; |
| if (resp.status().code() == MetaServiceCode::OK) { |
| body = resp.DebugString(); |
| } |
| return http_text_reply(resp.status(), body); |
| } |
| |
| static HttpResponse process_fix_tablet_stats(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| auto& uri = ctrl->http_request().uri(); |
| std::string_view cloud_unique_id = http_query(uri, "cloud_unique_id"); |
| std::string_view table_id = http_query(uri, "table_id"); |
| |
| MetaServiceResponseStatus st = |
| service->fix_tablet_stats(std::string(cloud_unique_id), std::string(table_id)); |
| return http_text_reply(st, st.DebugString()); |
| } |
| |
| static HttpResponse process_get_stage(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| GetStageRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| GetStageResponse resp; |
| service->get_stage(ctrl, &req, &resp, nullptr); |
| return http_json_reply_message(resp.status(), resp); |
| } |
| |
| static HttpResponse process_get_cluster_status(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| GetClusterStatusRequest req; |
| PARSE_MESSAGE_OR_RETURN(ctrl, req); |
| GetClusterStatusResponse resp; |
| service->get_cluster_status(ctrl, &req, &resp, nullptr); |
| return http_json_reply_message(resp.status(), resp); |
| } |
| |
| static HttpResponse process_txn_lazy_commit(MetaServiceImpl* service, brpc::Controller* ctrl) { |
| auto& uri = ctrl->http_request().uri(); |
| std::string instance_id(http_query(uri, "instance_id")); |
| std::string txn_id_str(http_query(uri, "txn_id")); |
| if (instance_id.empty() || txn_id_str.empty()) { |
| return http_json_reply(MetaServiceCode::INVALID_ARGUMENT, "instance_id or txn_id is empty"); |
| } |
| |
| int64_t txn_id = 0; |
| try { |
| txn_id = std::stol(txn_id_str); |
| } catch (const std::exception& e) { |
| auto msg = fmt::format("txn_id {} must be a number, meet error={}", txn_id_str, e.what()); |
| LOG(WARNING) << msg; |
| return http_json_reply(MetaServiceCode::UNDEFINED_ERR, msg); |
| } |
| |
| DCHECK_GT(txn_id, 0); |
| |
| auto txn_lazy_committer = service->txn_lazy_committer(); |
| if (!txn_lazy_committer) { |
| return http_json_reply(MetaServiceCode::UNDEFINED_ERR, "txn lazy committer is nullptr"); |
| } |
| |
| std::shared_ptr<TxnLazyCommitTask> task = txn_lazy_committer->submit(instance_id, txn_id); |
| auto [code, msg] = task->wait(); |
| return http_json_reply(code, msg); |
| } |
| |
| static HttpResponse process_unknown(MetaServiceImpl*, brpc::Controller*) { |
| // ATTN: To be compatible with cloud manager versions higher than this MS |
| return http_json_reply(MetaServiceCode::OK, ""); |
| } |
| |
| void MetaServiceImpl::http(::google::protobuf::RpcController* controller, |
| const MetaServiceHttpRequest*, MetaServiceHttpResponse*, |
| ::google::protobuf::Closure* done) { |
| using HttpHandler = HttpResponse (*)(MetaServiceImpl*, brpc::Controller*); |
| static std::unordered_map<std::string_view, HttpHandler> http_handlers { |
| // for alter cluster. |
| {"add_cluster", process_alter_cluster}, |
| {"drop_cluster", process_alter_cluster}, |
| {"rename_cluster", process_alter_cluster}, |
| {"update_cluster_endpoint", process_alter_cluster}, |
| {"update_cluster_mysql_user_name", process_alter_cluster}, |
| {"add_node", process_alter_cluster}, |
| {"drop_node", process_alter_cluster}, |
| {"decommission_node", process_alter_cluster}, |
| {"set_cluster_status", process_alter_cluster}, |
| {"notify_decommissioned", process_alter_cluster}, |
| {"v1/add_cluster", process_alter_cluster}, |
| {"v1/drop_cluster", process_alter_cluster}, |
| {"v1/rename_cluster", process_alter_cluster}, |
| {"v1/update_cluster_endpoint", process_alter_cluster}, |
| {"v1/update_cluster_mysql_user_name", process_alter_cluster}, |
| {"v1/add_node", process_alter_cluster}, |
| {"v1/drop_node", process_alter_cluster}, |
| {"v1/decommission_node", process_alter_cluster}, |
| {"v1/set_cluster_status", process_alter_cluster}, |
| // for alter instance |
| {"create_instance", process_create_instance}, |
| {"drop_instance", process_alter_instance}, |
| {"rename_instance", process_alter_instance}, |
| {"enable_instance_sse", process_alter_instance}, |
| {"disable_instance_sse", process_alter_instance}, |
| {"set_instance_status", process_alter_instance}, |
| {"v1/create_instance", process_create_instance}, |
| {"v1/drop_instance", process_alter_instance}, |
| {"v1/rename_instance", process_alter_instance}, |
| {"v1/enable_instance_sse", process_alter_instance}, |
| {"v1/disable_instance_sse", process_alter_instance}, |
| {"v1/set_instance_status", process_alter_instance}, |
| // for alter obj store info |
| {"add_obj_info", process_alter_obj_store_info}, |
| {"legacy_update_ak_sk", process_alter_obj_store_info}, |
| {"update_ak_sk", process_update_ak_sk}, |
| {"v1/add_obj_info", process_alter_obj_store_info}, |
| {"v1/legacy_update_ak_sk", process_alter_obj_store_info}, |
| {"v1/update_ak_sk", process_update_ak_sk}, |
| {"show_storage_vaults", process_get_obj_store_info}, |
| {"add_hdfs_vault", process_alter_storage_vault}, |
| {"add_s3_vault", process_alter_storage_vault}, |
| {"alter_s3_vault", process_alter_storage_vault}, |
| {"drop_s3_vault", process_alter_storage_vault}, |
| {"drop_hdfs_vault", process_alter_storage_vault}, |
| // for tools |
| {"decode_key", process_decode_key}, |
| {"encode_key", process_encode_key}, |
| {"get_value", process_get_value}, |
| {"set_value", process_set_value}, |
| {"show_meta_ranges", process_show_meta_ranges}, |
| {"txn_lazy_commit", process_txn_lazy_commit}, |
| {"injection_point", process_injection_point}, |
| {"fix_tablet_stats", process_fix_tablet_stats}, |
| {"v1/decode_key", process_decode_key}, |
| {"v1/encode_key", process_encode_key}, |
| {"v1/get_value", process_get_value}, |
| {"v1/set_value", process_set_value}, |
| {"v1/show_meta_ranges", process_show_meta_ranges}, |
| {"v1/txn_lazy_commit", process_txn_lazy_commit}, |
| {"v1/injection_point", process_injection_point}, |
| {"v1/fix_tablet_stats", process_fix_tablet_stats}, |
| // for get |
| {"get_instance", process_get_instance_info}, |
| {"get_obj_store_info", process_get_obj_store_info}, |
| {"get_cluster", process_get_cluster}, |
| {"get_tablet_stats", process_get_tablet_stats}, |
| {"get_stage", process_get_stage}, |
| {"get_cluster_status", process_get_cluster_status}, |
| {"v1/get_instance", process_get_instance_info}, |
| {"v1/get_obj_store_info", process_get_obj_store_info}, |
| {"v1/get_cluster", process_get_cluster}, |
| {"v1/get_tablet_stats", process_get_tablet_stats}, |
| {"v1/get_stage", process_get_stage}, |
| {"v1/get_cluster_status", process_get_cluster_status}, |
| // misc |
| {"abort_txn", process_abort_txn}, |
| {"abort_tablet_job", process_abort_tablet_job}, |
| {"alter_ram_user", process_alter_ram_user}, |
| {"alter_iam", process_alter_iam}, |
| {"adjust_rate_limit", process_adjust_rate_limit}, |
| {"list_rate_limit", process_query_rate_limit}, |
| {"update_config", process_update_config}, |
| {"v1/abort_txn", process_abort_txn}, |
| {"v1/abort_tablet_job", process_abort_tablet_job}, |
| {"v1/alter_ram_user", process_alter_ram_user}, |
| {"v1/alter_iam", process_alter_iam}, |
| {"v1/adjust_rate_limit", process_adjust_rate_limit}, |
| {"v1/list_rate_limit", process_query_rate_limit}, |
| {"v1/update_config", process_update_config}, |
| }; |
| |
| auto* cntl = static_cast<brpc::Controller*>(controller); |
| brpc::ClosureGuard closure_guard(done); |
| |
| // Prepare input request info |
| LOG(INFO) << "rpc from " << cntl->remote_side() |
| << " request: " << cntl->http_request().uri().path(); |
| std::string http_request = format_http_request(cntl); |
| |
| // Auth |
| auto token = http_query(cntl->http_request().uri(), "token"); |
| if (token != config::http_token) { |
| std::string body = fmt::format("incorrect token, token={}", |
| (token.empty() ? std::string_view("(not given)") : token)); |
| cntl->http_response().set_status_code(403); |
| cntl->response_attachment().append(body); |
| cntl->response_attachment().append("\n"); |
| LOG(WARNING) << "failed to handle http from " << cntl->remote_side() |
| << " request: " << http_request << " msg: " << body; |
| return; |
| } |
| |
| // Process http request |
| auto& unresolved_path = cntl->http_request().unresolved_path(); |
| HttpHandler handler = process_unknown; |
| auto it = http_handlers.find(unresolved_path); |
| if (it != http_handlers.end()) { |
| handler = it->second; |
| } |
| |
| auto [status_code, msg, body] = handler(this, cntl); |
| cntl->http_response().set_status_code(status_code); |
| cntl->response_attachment().append(body); |
| cntl->response_attachment().append("\n"); |
| |
| int ret = cntl->http_response().status_code(); |
| LOG(INFO) << (ret == 200 ? "succ to " : "failed to ") << __PRETTY_FUNCTION__ << " " |
| << cntl->remote_side() << " request=\n" |
| << http_request << "\n ret=" << ret << " msg=" << msg; |
| } |
| |
| } // namespace doris::cloud |