watch.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499
  1. // Copyright 2015 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package v3rpc
  15. import (
  16. "context"
  17. "io"
  18. "math/rand"
  19. "sync"
  20. "time"
  21. "github.com/coreos/etcd/auth"
  22. "github.com/coreos/etcd/etcdserver"
  23. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  24. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  25. "github.com/coreos/etcd/mvcc"
  26. "github.com/coreos/etcd/mvcc/mvccpb"
  27. "go.uber.org/zap"
  28. )
  29. type watchServer struct {
  30. clusterID int64
  31. memberID int64
  32. sg etcdserver.RaftStatusGetter
  33. watchable mvcc.WatchableKV
  34. ag AuthGetter
  35. lg *zap.Logger
  36. }
  37. func NewWatchServer(s *etcdserver.EtcdServer) pb.WatchServer {
  38. return &watchServer{
  39. clusterID: int64(s.Cluster().ID()),
  40. memberID: int64(s.ID()),
  41. sg: s,
  42. watchable: s.Watchable(),
  43. ag: s,
  44. lg: s.Cfg.Logger,
  45. }
  46. }
  47. var (
  48. // External test can read this with GetProgressReportInterval()
  49. // and change this to a small value to finish fast with
  50. // SetProgressReportInterval().
  51. progressReportInterval = 10 * time.Minute
  52. progressReportIntervalMu sync.RWMutex
  53. )
  54. func GetProgressReportInterval() time.Duration {
  55. progressReportIntervalMu.RLock()
  56. interval := progressReportInterval
  57. progressReportIntervalMu.RUnlock()
  58. // add rand(1/10*progressReportInterval) as jitter so that etcdserver will not
  59. // send progress notifications to watchers around the same time even when watchers
  60. // are created around the same time (which is common when a client restarts itself).
  61. jitter := time.Duration(rand.Int63n(int64(interval) / 10))
  62. return interval + jitter
  63. }
  64. func SetProgressReportInterval(newTimeout time.Duration) {
  65. progressReportIntervalMu.Lock()
  66. defer progressReportIntervalMu.Unlock()
  67. progressReportInterval = newTimeout
  68. }
  69. const (
  70. // We send ctrl response inside the read loop. We do not want
  71. // send to block read, but we still want ctrl response we sent to
  72. // be serialized. Thus we use a buffered chan to solve the problem.
  73. // A small buffer should be OK for most cases, since we expect the
  74. // ctrl requests are infrequent.
  75. ctrlStreamBufLen = 16
  76. )
  77. // serverWatchStream is an etcd server side stream. It receives requests
  78. // from client side gRPC stream. It receives watch events from mvcc.WatchStream,
  79. // and creates responses that forwarded to gRPC stream.
  80. // It also forwards control message like watch created and canceled.
  81. type serverWatchStream struct {
  82. clusterID int64
  83. memberID int64
  84. sg etcdserver.RaftStatusGetter
  85. watchable mvcc.WatchableKV
  86. gRPCStream pb.Watch_WatchServer
  87. watchStream mvcc.WatchStream
  88. ctrlStream chan *pb.WatchResponse
  89. // mu protects progress, prevKV
  90. mu sync.Mutex
  91. // progress tracks the watchID that stream might need to send
  92. // progress to.
  93. // TODO: combine progress and prevKV into a single struct?
  94. progress map[mvcc.WatchID]bool
  95. prevKV map[mvcc.WatchID]bool
  96. // closec indicates the stream is closed.
  97. closec chan struct{}
  98. // wg waits for the send loop to complete
  99. wg sync.WaitGroup
  100. ag AuthGetter
  101. lg *zap.Logger
  102. }
  103. func (ws *watchServer) Watch(stream pb.Watch_WatchServer) (err error) {
  104. sws := serverWatchStream{
  105. clusterID: ws.clusterID,
  106. memberID: ws.memberID,
  107. sg: ws.sg,
  108. watchable: ws.watchable,
  109. gRPCStream: stream,
  110. watchStream: ws.watchable.NewWatchStream(),
  111. // chan for sending control response like watcher created and canceled.
  112. ctrlStream: make(chan *pb.WatchResponse, ctrlStreamBufLen),
  113. progress: make(map[mvcc.WatchID]bool),
  114. prevKV: make(map[mvcc.WatchID]bool),
  115. closec: make(chan struct{}),
  116. ag: ws.ag,
  117. lg: ws.lg,
  118. }
  119. sws.wg.Add(1)
  120. go func() {
  121. sws.sendLoop()
  122. sws.wg.Done()
  123. }()
  124. errc := make(chan error, 1)
  125. // Ideally recvLoop would also use sws.wg to signal its completion
  126. // but when stream.Context().Done() is closed, the stream's recv
  127. // may continue to block since it uses a different context, leading to
  128. // deadlock when calling sws.close().
  129. go func() {
  130. if rerr := sws.recvLoop(); rerr != nil {
  131. if isClientCtxErr(stream.Context().Err(), rerr) {
  132. if sws.lg != nil {
  133. sws.lg.Debug("failed to receive watch request from gRPC stream", zap.Error(rerr))
  134. } else {
  135. plog.Debugf("failed to receive watch request from gRPC stream (%q)", rerr.Error())
  136. }
  137. } else {
  138. if sws.lg != nil {
  139. sws.lg.Warn("failed to receive watch request from gRPC stream", zap.Error(err))
  140. } else {
  141. plog.Warningf("failed to receive watch request from gRPC stream (%q)", rerr.Error())
  142. }
  143. }
  144. errc <- rerr
  145. }
  146. }()
  147. select {
  148. case err = <-errc:
  149. close(sws.ctrlStream)
  150. case <-stream.Context().Done():
  151. err = stream.Context().Err()
  152. // the only server-side cancellation is noleader for now.
  153. if err == context.Canceled {
  154. err = rpctypes.ErrGRPCNoLeader
  155. }
  156. }
  157. sws.close()
  158. return err
  159. }
  160. func (sws *serverWatchStream) isWatchPermitted(wcr *pb.WatchCreateRequest) bool {
  161. authInfo, err := sws.ag.AuthInfoFromCtx(sws.gRPCStream.Context())
  162. if err != nil {
  163. return false
  164. }
  165. if authInfo == nil {
  166. // if auth is enabled, IsRangePermitted() can cause an error
  167. authInfo = &auth.AuthInfo{}
  168. }
  169. return sws.ag.AuthStore().IsRangePermitted(authInfo, wcr.Key, wcr.RangeEnd) == nil
  170. }
  171. func (sws *serverWatchStream) recvLoop() error {
  172. for {
  173. req, err := sws.gRPCStream.Recv()
  174. if err == io.EOF {
  175. return nil
  176. }
  177. if err != nil {
  178. return err
  179. }
  180. switch uv := req.RequestUnion.(type) {
  181. case *pb.WatchRequest_CreateRequest:
  182. if uv.CreateRequest == nil {
  183. break
  184. }
  185. creq := uv.CreateRequest
  186. if len(creq.Key) == 0 {
  187. // \x00 is the smallest key
  188. creq.Key = []byte{0}
  189. }
  190. if len(creq.RangeEnd) == 0 {
  191. // force nil since watchstream.Watch distinguishes
  192. // between nil and []byte{} for single key / >=
  193. creq.RangeEnd = nil
  194. }
  195. if len(creq.RangeEnd) == 1 && creq.RangeEnd[0] == 0 {
  196. // support >= key queries
  197. creq.RangeEnd = []byte{}
  198. }
  199. if !sws.isWatchPermitted(creq) {
  200. wr := &pb.WatchResponse{
  201. Header: sws.newResponseHeader(sws.watchStream.Rev()),
  202. WatchId: creq.WatchId,
  203. Canceled: true,
  204. Created: true,
  205. CancelReason: rpctypes.ErrGRPCPermissionDenied.Error(),
  206. }
  207. select {
  208. case sws.ctrlStream <- wr:
  209. case <-sws.closec:
  210. }
  211. return nil
  212. }
  213. filters := FiltersFromRequest(creq)
  214. wsrev := sws.watchStream.Rev()
  215. rev := creq.StartRevision
  216. if rev == 0 {
  217. rev = wsrev + 1
  218. }
  219. id, err := sws.watchStream.Watch(mvcc.WatchID(creq.WatchId), creq.Key, creq.RangeEnd, rev, filters...)
  220. if err == nil {
  221. sws.mu.Lock()
  222. if creq.ProgressNotify {
  223. sws.progress[id] = true
  224. }
  225. if creq.PrevKv {
  226. sws.prevKV[id] = true
  227. }
  228. sws.mu.Unlock()
  229. }
  230. wr := &pb.WatchResponse{
  231. Header: sws.newResponseHeader(wsrev),
  232. WatchId: int64(id),
  233. Created: true,
  234. Canceled: err != nil,
  235. }
  236. if err != nil {
  237. wr.CancelReason = err.Error()
  238. }
  239. select {
  240. case sws.ctrlStream <- wr:
  241. case <-sws.closec:
  242. return nil
  243. }
  244. case *pb.WatchRequest_CancelRequest:
  245. if uv.CancelRequest != nil {
  246. id := uv.CancelRequest.WatchId
  247. err := sws.watchStream.Cancel(mvcc.WatchID(id))
  248. if err == nil {
  249. sws.ctrlStream <- &pb.WatchResponse{
  250. Header: sws.newResponseHeader(sws.watchStream.Rev()),
  251. WatchId: id,
  252. Canceled: true,
  253. }
  254. sws.mu.Lock()
  255. delete(sws.progress, mvcc.WatchID(id))
  256. delete(sws.prevKV, mvcc.WatchID(id))
  257. sws.mu.Unlock()
  258. }
  259. }
  260. default:
  261. // we probably should not shutdown the entire stream when
  262. // receive an valid command.
  263. // so just do nothing instead.
  264. continue
  265. }
  266. }
  267. }
  268. func (sws *serverWatchStream) sendLoop() {
  269. // watch ids that are currently active
  270. ids := make(map[mvcc.WatchID]struct{})
  271. // watch responses pending on a watch id creation message
  272. pending := make(map[mvcc.WatchID][]*pb.WatchResponse)
  273. interval := GetProgressReportInterval()
  274. progressTicker := time.NewTicker(interval)
  275. defer func() {
  276. progressTicker.Stop()
  277. // drain the chan to clean up pending events
  278. for ws := range sws.watchStream.Chan() {
  279. mvcc.ReportEventReceived(len(ws.Events))
  280. }
  281. for _, wrs := range pending {
  282. for _, ws := range wrs {
  283. mvcc.ReportEventReceived(len(ws.Events))
  284. }
  285. }
  286. }()
  287. for {
  288. select {
  289. case wresp, ok := <-sws.watchStream.Chan():
  290. if !ok {
  291. return
  292. }
  293. // TODO: evs is []mvccpb.Event type
  294. // either return []*mvccpb.Event from the mvcc package
  295. // or define protocol buffer with []mvccpb.Event.
  296. evs := wresp.Events
  297. events := make([]*mvccpb.Event, len(evs))
  298. sws.mu.Lock()
  299. needPrevKV := sws.prevKV[wresp.WatchID]
  300. sws.mu.Unlock()
  301. for i := range evs {
  302. events[i] = &evs[i]
  303. if needPrevKV {
  304. opt := mvcc.RangeOptions{Rev: evs[i].Kv.ModRevision - 1}
  305. r, err := sws.watchable.Range(evs[i].Kv.Key, nil, opt)
  306. if err == nil && len(r.KVs) != 0 {
  307. events[i].PrevKv = &(r.KVs[0])
  308. }
  309. }
  310. }
  311. canceled := wresp.CompactRevision != 0
  312. wr := &pb.WatchResponse{
  313. Header: sws.newResponseHeader(wresp.Revision),
  314. WatchId: int64(wresp.WatchID),
  315. Events: events,
  316. CompactRevision: wresp.CompactRevision,
  317. Canceled: canceled,
  318. }
  319. if _, hasId := ids[wresp.WatchID]; !hasId {
  320. // buffer if id not yet announced
  321. wrs := append(pending[wresp.WatchID], wr)
  322. pending[wresp.WatchID] = wrs
  323. continue
  324. }
  325. mvcc.ReportEventReceived(len(evs))
  326. if err := sws.gRPCStream.Send(wr); err != nil {
  327. if isClientCtxErr(sws.gRPCStream.Context().Err(), err) {
  328. if sws.lg != nil {
  329. sws.lg.Debug("failed to send watch response to gRPC stream", zap.Error(err))
  330. } else {
  331. plog.Debugf("failed to send watch response to gRPC stream (%q)", err.Error())
  332. }
  333. } else {
  334. if sws.lg != nil {
  335. sws.lg.Warn("failed to send watch response to gRPC stream", zap.Error(err))
  336. } else {
  337. plog.Warningf("failed to send watch response to gRPC stream (%q)", err.Error())
  338. }
  339. }
  340. return
  341. }
  342. sws.mu.Lock()
  343. if len(evs) > 0 && sws.progress[wresp.WatchID] {
  344. // elide next progress update if sent a key update
  345. sws.progress[wresp.WatchID] = false
  346. }
  347. sws.mu.Unlock()
  348. case c, ok := <-sws.ctrlStream:
  349. if !ok {
  350. return
  351. }
  352. if err := sws.gRPCStream.Send(c); err != nil {
  353. if isClientCtxErr(sws.gRPCStream.Context().Err(), err) {
  354. if sws.lg != nil {
  355. sws.lg.Debug("failed to send watch control response to gRPC stream", zap.Error(err))
  356. } else {
  357. plog.Debugf("failed to send watch control response to gRPC stream (%q)", err.Error())
  358. }
  359. } else {
  360. if sws.lg != nil {
  361. sws.lg.Warn("failed to send watch control response to gRPC stream", zap.Error(err))
  362. } else {
  363. plog.Warningf("failed to send watch control response to gRPC stream (%q)", err.Error())
  364. }
  365. }
  366. return
  367. }
  368. // track id creation
  369. wid := mvcc.WatchID(c.WatchId)
  370. if c.Canceled {
  371. delete(ids, wid)
  372. continue
  373. }
  374. if c.Created {
  375. // flush buffered events
  376. ids[wid] = struct{}{}
  377. for _, v := range pending[wid] {
  378. mvcc.ReportEventReceived(len(v.Events))
  379. if err := sws.gRPCStream.Send(v); err != nil {
  380. if isClientCtxErr(sws.gRPCStream.Context().Err(), err) {
  381. if sws.lg != nil {
  382. sws.lg.Debug("failed to send pending watch response to gRPC stream", zap.Error(err))
  383. } else {
  384. plog.Debugf("failed to send pending watch response to gRPC stream (%q)", err.Error())
  385. }
  386. } else {
  387. if sws.lg != nil {
  388. sws.lg.Warn("failed to send pending watch response to gRPC stream", zap.Error(err))
  389. } else {
  390. plog.Warningf("failed to send pending watch response to gRPC stream (%q)", err.Error())
  391. }
  392. }
  393. return
  394. }
  395. }
  396. delete(pending, wid)
  397. }
  398. case <-progressTicker.C:
  399. sws.mu.Lock()
  400. for id, ok := range sws.progress {
  401. if ok {
  402. sws.watchStream.RequestProgress(id)
  403. }
  404. sws.progress[id] = true
  405. }
  406. sws.mu.Unlock()
  407. case <-sws.closec:
  408. return
  409. }
  410. }
  411. }
  412. func (sws *serverWatchStream) close() {
  413. sws.watchStream.Close()
  414. close(sws.closec)
  415. sws.wg.Wait()
  416. }
  417. func (sws *serverWatchStream) newResponseHeader(rev int64) *pb.ResponseHeader {
  418. return &pb.ResponseHeader{
  419. ClusterId: uint64(sws.clusterID),
  420. MemberId: uint64(sws.memberID),
  421. Revision: rev,
  422. RaftTerm: sws.sg.Term(),
  423. }
  424. }
  425. func filterNoDelete(e mvccpb.Event) bool {
  426. return e.Type == mvccpb.DELETE
  427. }
  428. func filterNoPut(e mvccpb.Event) bool {
  429. return e.Type == mvccpb.PUT
  430. }
  431. func FiltersFromRequest(creq *pb.WatchCreateRequest) []mvcc.FilterFunc {
  432. filters := make([]mvcc.FilterFunc, 0, len(creq.Filters))
  433. for _, ft := range creq.Filters {
  434. switch ft {
  435. case pb.WatchCreateRequest_NOPUT:
  436. filters = append(filters, filterNoPut)
  437. case pb.WatchCreateRequest_NODELETE:
  438. filters = append(filters, filterNoDelete)
  439. default:
  440. }
  441. }
  442. return filters
  443. }