LCOV - code coverage report
Current view: top level - control_plane/src - safekeeper.rs (source / functions) Coverage Total Hit
Test: 322b88762cba8ea666f63cda880cccab6936bf37.info Lines: 0.0 % 152 0
Test Date: 2024-02-29 11:57:12 Functions: 0.0 % 23 0

            Line data    Source code
       1              : //! Code to manage safekeepers
       2              : //!
       3              : //! In the local test environment, the data for each safekeeper is stored in
       4              : //!
       5              : //! ```text
       6              : //!   .neon/safekeepers/<safekeeper id>
       7              : //! ```
       8              : use std::io::Write;
       9              : use std::path::PathBuf;
      10              : use std::{io, result};
      11              : 
      12              : use anyhow::Context;
      13              : use camino::Utf8PathBuf;
      14              : use postgres_connection::PgConnectionConfig;
      15              : use reqwest::{IntoUrl, Method};
      16              : use thiserror::Error;
      17              : use utils::{http::error::HttpErrorBody, id::NodeId};
      18              : 
      19              : use crate::{
      20              :     background_process,
      21              :     local_env::{LocalEnv, SafekeeperConf},
      22              : };
      23              : 
      24            0 : #[derive(Error, Debug)]
      25              : pub enum SafekeeperHttpError {
      26              :     #[error("Reqwest error: {0}")]
      27              :     Transport(#[from] reqwest::Error),
      28              : 
      29              :     #[error("Error: {0}")]
      30              :     Response(String),
      31              : }
      32              : 
      33              : type Result<T> = result::Result<T, SafekeeperHttpError>;
      34              : 
      35              : #[async_trait::async_trait]
      36              : pub trait ResponseErrorMessageExt: Sized {
      37              :     async fn error_from_body(self) -> Result<Self>;
      38              : }
      39              : 
      40              : #[async_trait::async_trait]
      41              : impl ResponseErrorMessageExt for reqwest::Response {
      42            0 :     async fn error_from_body(self) -> Result<Self> {
      43            0 :         let status = self.status();
      44            0 :         if !(status.is_client_error() || status.is_server_error()) {
      45            0 :             return Ok(self);
      46            0 :         }
      47            0 : 
      48            0 :         // reqwest does not export its error construction utility functions, so let's craft the message ourselves
      49            0 :         let url = self.url().to_owned();
      50            0 :         Err(SafekeeperHttpError::Response(
      51            0 :             match self.json::<HttpErrorBody>().await {
      52            0 :                 Ok(err_body) => format!("Error: {}", err_body.msg),
      53            0 :                 Err(_) => format!("Http error ({}) at {}.", status.as_u16(), url),
      54              :             },
      55              :         ))
      56            0 :     }
      57              : }
      58              : 
      59              : //
      60              : // Control routines for safekeeper.
      61              : //
      62              : // Used in CLI and tests.
      63              : //
      64            0 : #[derive(Debug)]
      65              : pub struct SafekeeperNode {
      66              :     pub id: NodeId,
      67              : 
      68              :     pub conf: SafekeeperConf,
      69              : 
      70              :     pub pg_connection_config: PgConnectionConfig,
      71              :     pub env: LocalEnv,
      72              :     pub http_client: reqwest::Client,
      73              :     pub http_base_url: String,
      74              : }
      75              : 
      76              : impl SafekeeperNode {
      77            0 :     pub fn from_env(env: &LocalEnv, conf: &SafekeeperConf) -> SafekeeperNode {
      78            0 :         SafekeeperNode {
      79            0 :             id: conf.id,
      80            0 :             conf: conf.clone(),
      81            0 :             pg_connection_config: Self::safekeeper_connection_config(conf.pg_port),
      82            0 :             env: env.clone(),
      83            0 :             http_client: reqwest::Client::new(),
      84            0 :             http_base_url: format!("http://127.0.0.1:{}/v1", conf.http_port),
      85            0 :         }
      86            0 :     }
      87              : 
      88              :     /// Construct libpq connection string for connecting to this safekeeper.
      89            0 :     fn safekeeper_connection_config(port: u16) -> PgConnectionConfig {
      90            0 :         PgConnectionConfig::new_host_port(url::Host::parse("127.0.0.1").unwrap(), port)
      91            0 :     }
      92              : 
      93            0 :     pub fn datadir_path_by_id(env: &LocalEnv, sk_id: NodeId) -> PathBuf {
      94            0 :         env.safekeeper_data_dir(&format!("sk{sk_id}"))
      95            0 :     }
      96              : 
      97            0 :     pub fn datadir_path(&self) -> PathBuf {
      98            0 :         SafekeeperNode::datadir_path_by_id(&self.env, self.id)
      99            0 :     }
     100              : 
     101            0 :     pub fn pid_file(&self) -> Utf8PathBuf {
     102            0 :         Utf8PathBuf::from_path_buf(self.datadir_path().join("safekeeper.pid"))
     103            0 :             .expect("non-Unicode path")
     104            0 :     }
     105              : 
     106            0 :     pub async fn start(&self, extra_opts: Vec<String>) -> anyhow::Result<()> {
     107            0 :         print!(
     108            0 :             "Starting safekeeper at '{}' in '{}'",
     109            0 :             self.pg_connection_config.raw_address(),
     110            0 :             self.datadir_path().display()
     111            0 :         );
     112            0 :         io::stdout().flush().unwrap();
     113            0 : 
     114            0 :         let listen_pg = format!("127.0.0.1:{}", self.conf.pg_port);
     115            0 :         let listen_http = format!("127.0.0.1:{}", self.conf.http_port);
     116            0 :         let id = self.id;
     117            0 :         let datadir = self.datadir_path();
     118            0 : 
     119            0 :         let id_string = id.to_string();
     120            0 :         // TODO: add availability_zone to the config.
     121            0 :         // Right now we just specify any value here and use it to check metrics in tests.
     122            0 :         let availability_zone = format!("sk-{}", id_string);
     123              : 
     124            0 :         let mut args = vec![
     125            0 :             "-D".to_owned(),
     126            0 :             datadir
     127            0 :                 .to_str()
     128            0 :                 .with_context(|| {
     129            0 :                     format!("Datadir path {datadir:?} cannot be represented as a unicode string")
     130            0 :                 })?
     131            0 :                 .to_owned(),
     132            0 :             "--id".to_owned(),
     133            0 :             id_string,
     134            0 :             "--listen-pg".to_owned(),
     135            0 :             listen_pg,
     136            0 :             "--listen-http".to_owned(),
     137            0 :             listen_http,
     138            0 :             "--availability-zone".to_owned(),
     139            0 :             availability_zone,
     140              :         ];
     141            0 :         if let Some(pg_tenant_only_port) = self.conf.pg_tenant_only_port {
     142            0 :             let listen_pg_tenant_only = format!("127.0.0.1:{}", pg_tenant_only_port);
     143            0 :             args.extend(["--listen-pg-tenant-only".to_owned(), listen_pg_tenant_only]);
     144            0 :         }
     145            0 :         if !self.conf.sync {
     146            0 :             args.push("--no-sync".to_owned());
     147            0 :         }
     148              : 
     149            0 :         let broker_endpoint = format!("{}", self.env.broker.client_url());
     150            0 :         args.extend(["--broker-endpoint".to_owned(), broker_endpoint]);
     151            0 : 
     152            0 :         let mut backup_threads = String::new();
     153            0 :         if let Some(threads) = self.conf.backup_threads {
     154            0 :             backup_threads = threads.to_string();
     155            0 :             args.extend(["--backup-threads".to_owned(), backup_threads]);
     156            0 :         } else {
     157            0 :             drop(backup_threads);
     158            0 :         }
     159              : 
     160            0 :         if let Some(ref remote_storage) = self.conf.remote_storage {
     161            0 :             args.extend(["--remote-storage".to_owned(), remote_storage.clone()]);
     162            0 :         }
     163              : 
     164            0 :         let key_path = self.env.base_data_dir.join("auth_public_key.pem");
     165            0 :         if self.conf.auth_enabled {
     166            0 :             let key_path_string = key_path
     167            0 :                 .to_str()
     168            0 :                 .with_context(|| {
     169            0 :                     format!("Key path {key_path:?} cannot be represented as a unicode string")
     170            0 :                 })?
     171            0 :                 .to_owned();
     172            0 :             args.extend([
     173            0 :                 "--pg-auth-public-key-path".to_owned(),
     174            0 :                 key_path_string.clone(),
     175            0 :             ]);
     176            0 :             args.extend([
     177            0 :                 "--pg-tenant-only-auth-public-key-path".to_owned(),
     178            0 :                 key_path_string.clone(),
     179            0 :             ]);
     180            0 :             args.extend([
     181            0 :                 "--http-auth-public-key-path".to_owned(),
     182            0 :                 key_path_string.clone(),
     183            0 :             ]);
     184            0 :         }
     185              : 
     186            0 :         args.extend(extra_opts);
     187            0 : 
     188            0 :         background_process::start_process(
     189            0 :             &format!("safekeeper-{id}"),
     190            0 :             &datadir,
     191            0 :             &self.env.safekeeper_bin(),
     192            0 :             &args,
     193            0 :             [],
     194            0 :             background_process::InitialPidFile::Expect(self.pid_file()),
     195            0 :             || async {
     196            0 :                 match self.check_status().await {
     197            0 :                     Ok(()) => Ok(true),
     198            0 :                     Err(SafekeeperHttpError::Transport(_)) => Ok(false),
     199            0 :                     Err(e) => Err(anyhow::anyhow!("Failed to check node status: {e}")),
     200              :                 }
     201            0 :             },
     202            0 :         )
     203            0 :         .await
     204            0 :     }
     205              : 
     206              :     ///
     207              :     /// Stop the server.
     208              :     ///
     209              :     /// If 'immediate' is true, we use SIGQUIT, killing the process immediately.
     210              :     /// Otherwise we use SIGTERM, triggering a clean shutdown
     211              :     ///
     212              :     /// If the server is not running, returns success
     213              :     ///
     214            0 :     pub fn stop(&self, immediate: bool) -> anyhow::Result<()> {
     215            0 :         background_process::stop_process(
     216            0 :             immediate,
     217            0 :             &format!("safekeeper {}", self.id),
     218            0 :             &self.pid_file(),
     219            0 :         )
     220            0 :     }
     221              : 
     222            0 :     fn http_request<U: IntoUrl>(&self, method: Method, url: U) -> reqwest::RequestBuilder {
     223            0 :         // TODO: authentication
     224            0 :         //if self.env.auth_type == AuthType::NeonJWT {
     225            0 :         //    builder = builder.bearer_auth(&self.env.safekeeper_auth_token)
     226            0 :         //}
     227            0 :         self.http_client.request(method, url)
     228            0 :     }
     229              : 
     230            0 :     pub async fn check_status(&self) -> Result<()> {
     231            0 :         self.http_request(Method::GET, format!("{}/{}", self.http_base_url, "status"))
     232            0 :             .send()
     233            0 :             .await?
     234            0 :             .error_from_body()
     235            0 :             .await?;
     236            0 :         Ok(())
     237            0 :     }
     238              : }
        

Generated by: LCOV version 2.1-beta