watch.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458
  1. // Copyright 2015 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package v3rpc
  15. import (
  16. "context"
  17. "io"
  18. "math/rand"
  19. "sync"
  20. "time"
  21. "github.com/coreos/etcd/etcdserver"
  22. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  23. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  24. "github.com/coreos/etcd/internal/auth"
  25. "github.com/coreos/etcd/internal/mvcc"
  26. "github.com/coreos/etcd/internal/mvcc/mvccpb"
  27. )
  28. type watchServer struct {
  29. clusterID int64
  30. memberID int64
  31. raftTimer etcdserver.RaftTimer
  32. watchable mvcc.WatchableKV
  33. ag AuthGetter
  34. }
  35. func NewWatchServer(s *etcdserver.EtcdServer) pb.WatchServer {
  36. return &watchServer{
  37. clusterID: int64(s.Cluster().ID()),
  38. memberID: int64(s.ID()),
  39. raftTimer: s,
  40. watchable: s.Watchable(),
  41. ag: s,
  42. }
  43. }
  44. var (
  45. // External test can read this with GetProgressReportInterval()
  46. // and change this to a small value to finish fast with
  47. // SetProgressReportInterval().
  48. progressReportInterval = 10 * time.Minute
  49. progressReportIntervalMu sync.RWMutex
  50. )
  51. func GetProgressReportInterval() time.Duration {
  52. progressReportIntervalMu.RLock()
  53. interval := progressReportInterval
  54. progressReportIntervalMu.RUnlock()
  55. // add rand(1/10*progressReportInterval) as jitter so that etcdserver will not
  56. // send progress notifications to watchers around the same time even when watchers
  57. // are created around the same time (which is common when a client restarts itself).
  58. jitter := time.Duration(rand.Int63n(int64(interval) / 10))
  59. return interval + jitter
  60. }
  61. func SetProgressReportInterval(newTimeout time.Duration) {
  62. progressReportIntervalMu.Lock()
  63. defer progressReportIntervalMu.Unlock()
  64. progressReportInterval = newTimeout
  65. }
  66. const (
  67. // We send ctrl response inside the read loop. We do not want
  68. // send to block read, but we still want ctrl response we sent to
  69. // be serialized. Thus we use a buffered chan to solve the problem.
  70. // A small buffer should be OK for most cases, since we expect the
  71. // ctrl requests are infrequent.
  72. ctrlStreamBufLen = 16
  73. )
  74. // serverWatchStream is an etcd server side stream. It receives requests
  75. // from client side gRPC stream. It receives watch events from mvcc.WatchStream,
  76. // and creates responses that forwarded to gRPC stream.
  77. // It also forwards control message like watch created and canceled.
  78. type serverWatchStream struct {
  79. clusterID int64
  80. memberID int64
  81. raftTimer etcdserver.RaftTimer
  82. watchable mvcc.WatchableKV
  83. gRPCStream pb.Watch_WatchServer
  84. watchStream mvcc.WatchStream
  85. ctrlStream chan *pb.WatchResponse
  86. // mu protects progress, prevKV
  87. mu sync.Mutex
  88. // progress tracks the watchID that stream might need to send
  89. // progress to.
  90. // TODO: combine progress and prevKV into a single struct?
  91. progress map[mvcc.WatchID]bool
  92. prevKV map[mvcc.WatchID]bool
  93. // closec indicates the stream is closed.
  94. closec chan struct{}
  95. // wg waits for the send loop to complete
  96. wg sync.WaitGroup
  97. ag AuthGetter
  98. }
  99. func (ws *watchServer) Watch(stream pb.Watch_WatchServer) (err error) {
  100. sws := serverWatchStream{
  101. clusterID: ws.clusterID,
  102. memberID: ws.memberID,
  103. raftTimer: ws.raftTimer,
  104. watchable: ws.watchable,
  105. gRPCStream: stream,
  106. watchStream: ws.watchable.NewWatchStream(),
  107. // chan for sending control response like watcher created and canceled.
  108. ctrlStream: make(chan *pb.WatchResponse, ctrlStreamBufLen),
  109. progress: make(map[mvcc.WatchID]bool),
  110. prevKV: make(map[mvcc.WatchID]bool),
  111. closec: make(chan struct{}),
  112. ag: ws.ag,
  113. }
  114. sws.wg.Add(1)
  115. go func() {
  116. sws.sendLoop()
  117. sws.wg.Done()
  118. }()
  119. errc := make(chan error, 1)
  120. // Ideally recvLoop would also use sws.wg to signal its completion
  121. // but when stream.Context().Done() is closed, the stream's recv
  122. // may continue to block since it uses a different context, leading to
  123. // deadlock when calling sws.close().
  124. go func() {
  125. if rerr := sws.recvLoop(); rerr != nil {
  126. if isClientCtxErr(stream.Context().Err(), rerr) {
  127. plog.Debugf("failed to receive watch request from gRPC stream (%q)", rerr.Error())
  128. } else {
  129. plog.Warningf("failed to receive watch request from gRPC stream (%q)", rerr.Error())
  130. }
  131. errc <- rerr
  132. }
  133. }()
  134. select {
  135. case err = <-errc:
  136. close(sws.ctrlStream)
  137. case <-stream.Context().Done():
  138. err = stream.Context().Err()
  139. // the only server-side cancellation is noleader for now.
  140. if err == context.Canceled {
  141. err = rpctypes.ErrGRPCNoLeader
  142. }
  143. }
  144. sws.close()
  145. return err
  146. }
  147. func (sws *serverWatchStream) isWatchPermitted(wcr *pb.WatchCreateRequest) bool {
  148. authInfo, err := sws.ag.AuthInfoFromCtx(sws.gRPCStream.Context())
  149. if err != nil {
  150. return false
  151. }
  152. if authInfo == nil {
  153. // if auth is enabled, IsRangePermitted() can cause an error
  154. authInfo = &auth.AuthInfo{}
  155. }
  156. return sws.ag.AuthStore().IsRangePermitted(authInfo, wcr.Key, wcr.RangeEnd) == nil
  157. }
  158. func (sws *serverWatchStream) recvLoop() error {
  159. for {
  160. req, err := sws.gRPCStream.Recv()
  161. if err == io.EOF {
  162. return nil
  163. }
  164. if err != nil {
  165. return err
  166. }
  167. switch uv := req.RequestUnion.(type) {
  168. case *pb.WatchRequest_CreateRequest:
  169. if uv.CreateRequest == nil {
  170. break
  171. }
  172. creq := uv.CreateRequest
  173. if len(creq.Key) == 0 {
  174. // \x00 is the smallest key
  175. creq.Key = []byte{0}
  176. }
  177. if len(creq.RangeEnd) == 0 {
  178. // force nil since watchstream.Watch distinguishes
  179. // between nil and []byte{} for single key / >=
  180. creq.RangeEnd = nil
  181. }
  182. if len(creq.RangeEnd) == 1 && creq.RangeEnd[0] == 0 {
  183. // support >= key queries
  184. creq.RangeEnd = []byte{}
  185. }
  186. if !sws.isWatchPermitted(creq) {
  187. wr := &pb.WatchResponse{
  188. Header: sws.newResponseHeader(sws.watchStream.Rev()),
  189. WatchId: creq.WatchId,
  190. Canceled: true,
  191. Created: true,
  192. CancelReason: rpctypes.ErrGRPCPermissionDenied.Error(),
  193. }
  194. select {
  195. case sws.ctrlStream <- wr:
  196. case <-sws.closec:
  197. }
  198. return nil
  199. }
  200. filters := FiltersFromRequest(creq)
  201. wsrev := sws.watchStream.Rev()
  202. rev := creq.StartRevision
  203. if rev == 0 {
  204. rev = wsrev + 1
  205. }
  206. id, err := sws.watchStream.Watch(mvcc.WatchID(creq.WatchId), creq.Key, creq.RangeEnd, rev, filters...)
  207. if err == nil {
  208. sws.mu.Lock()
  209. if creq.ProgressNotify {
  210. sws.progress[id] = true
  211. }
  212. if creq.PrevKv {
  213. sws.prevKV[id] = true
  214. }
  215. sws.mu.Unlock()
  216. }
  217. wr := &pb.WatchResponse{
  218. Header: sws.newResponseHeader(wsrev),
  219. WatchId: int64(id),
  220. Created: true,
  221. Canceled: err != nil,
  222. }
  223. if err != nil {
  224. wr.CancelReason = err.Error()
  225. }
  226. select {
  227. case sws.ctrlStream <- wr:
  228. case <-sws.closec:
  229. return nil
  230. }
  231. case *pb.WatchRequest_CancelRequest:
  232. if uv.CancelRequest != nil {
  233. id := uv.CancelRequest.WatchId
  234. err := sws.watchStream.Cancel(mvcc.WatchID(id))
  235. if err == nil {
  236. sws.ctrlStream <- &pb.WatchResponse{
  237. Header: sws.newResponseHeader(sws.watchStream.Rev()),
  238. WatchId: id,
  239. Canceled: true,
  240. }
  241. sws.mu.Lock()
  242. delete(sws.progress, mvcc.WatchID(id))
  243. delete(sws.prevKV, mvcc.WatchID(id))
  244. sws.mu.Unlock()
  245. }
  246. }
  247. default:
  248. // we probably should not shutdown the entire stream when
  249. // receive an valid command.
  250. // so just do nothing instead.
  251. continue
  252. }
  253. }
  254. }
  255. func (sws *serverWatchStream) sendLoop() {
  256. // watch ids that are currently active
  257. ids := make(map[mvcc.WatchID]struct{})
  258. // watch responses pending on a watch id creation message
  259. pending := make(map[mvcc.WatchID][]*pb.WatchResponse)
  260. interval := GetProgressReportInterval()
  261. progressTicker := time.NewTicker(interval)
  262. defer func() {
  263. progressTicker.Stop()
  264. // drain the chan to clean up pending events
  265. for ws := range sws.watchStream.Chan() {
  266. mvcc.ReportEventReceived(len(ws.Events))
  267. }
  268. for _, wrs := range pending {
  269. for _, ws := range wrs {
  270. mvcc.ReportEventReceived(len(ws.Events))
  271. }
  272. }
  273. }()
  274. for {
  275. select {
  276. case wresp, ok := <-sws.watchStream.Chan():
  277. if !ok {
  278. return
  279. }
  280. // TODO: evs is []mvccpb.Event type
  281. // either return []*mvccpb.Event from the mvcc package
  282. // or define protocol buffer with []mvccpb.Event.
  283. evs := wresp.Events
  284. events := make([]*mvccpb.Event, len(evs))
  285. sws.mu.Lock()
  286. needPrevKV := sws.prevKV[wresp.WatchID]
  287. sws.mu.Unlock()
  288. for i := range evs {
  289. events[i] = &evs[i]
  290. if needPrevKV {
  291. opt := mvcc.RangeOptions{Rev: evs[i].Kv.ModRevision - 1}
  292. r, err := sws.watchable.Range(evs[i].Kv.Key, nil, opt)
  293. if err == nil && len(r.KVs) != 0 {
  294. events[i].PrevKv = &(r.KVs[0])
  295. }
  296. }
  297. }
  298. canceled := wresp.CompactRevision != 0
  299. wr := &pb.WatchResponse{
  300. Header: sws.newResponseHeader(wresp.Revision),
  301. WatchId: int64(wresp.WatchID),
  302. Events: events,
  303. CompactRevision: wresp.CompactRevision,
  304. Canceled: canceled,
  305. }
  306. if _, hasId := ids[wresp.WatchID]; !hasId {
  307. // buffer if id not yet announced
  308. wrs := append(pending[wresp.WatchID], wr)
  309. pending[wresp.WatchID] = wrs
  310. continue
  311. }
  312. mvcc.ReportEventReceived(len(evs))
  313. if err := sws.gRPCStream.Send(wr); err != nil {
  314. if isClientCtxErr(sws.gRPCStream.Context().Err(), err) {
  315. plog.Debugf("failed to send watch response to gRPC stream (%q)", err.Error())
  316. } else {
  317. plog.Warningf("failed to send watch response to gRPC stream (%q)", err.Error())
  318. }
  319. return
  320. }
  321. sws.mu.Lock()
  322. if len(evs) > 0 && sws.progress[wresp.WatchID] {
  323. // elide next progress update if sent a key update
  324. sws.progress[wresp.WatchID] = false
  325. }
  326. sws.mu.Unlock()
  327. case c, ok := <-sws.ctrlStream:
  328. if !ok {
  329. return
  330. }
  331. if err := sws.gRPCStream.Send(c); err != nil {
  332. if isClientCtxErr(sws.gRPCStream.Context().Err(), err) {
  333. plog.Debugf("failed to send watch control response to gRPC stream (%q)", err.Error())
  334. } else {
  335. plog.Warningf("failed to send watch control response to gRPC stream (%q)", err.Error())
  336. }
  337. return
  338. }
  339. // track id creation
  340. wid := mvcc.WatchID(c.WatchId)
  341. if c.Canceled {
  342. delete(ids, wid)
  343. continue
  344. }
  345. if c.Created {
  346. // flush buffered events
  347. ids[wid] = struct{}{}
  348. for _, v := range pending[wid] {
  349. mvcc.ReportEventReceived(len(v.Events))
  350. if err := sws.gRPCStream.Send(v); err != nil {
  351. if isClientCtxErr(sws.gRPCStream.Context().Err(), err) {
  352. plog.Debugf("failed to send pending watch response to gRPC stream (%q)", err.Error())
  353. } else {
  354. plog.Warningf("failed to send pending watch response to gRPC stream (%q)", err.Error())
  355. }
  356. return
  357. }
  358. }
  359. delete(pending, wid)
  360. }
  361. case <-progressTicker.C:
  362. sws.mu.Lock()
  363. for id, ok := range sws.progress {
  364. if ok {
  365. sws.watchStream.RequestProgress(id)
  366. }
  367. sws.progress[id] = true
  368. }
  369. sws.mu.Unlock()
  370. case <-sws.closec:
  371. return
  372. }
  373. }
  374. }
  375. func (sws *serverWatchStream) close() {
  376. sws.watchStream.Close()
  377. close(sws.closec)
  378. sws.wg.Wait()
  379. }
  380. func (sws *serverWatchStream) newResponseHeader(rev int64) *pb.ResponseHeader {
  381. return &pb.ResponseHeader{
  382. ClusterId: uint64(sws.clusterID),
  383. MemberId: uint64(sws.memberID),
  384. Revision: rev,
  385. RaftTerm: sws.raftTimer.Term(),
  386. }
  387. }
  388. func filterNoDelete(e mvccpb.Event) bool {
  389. return e.Type == mvccpb.DELETE
  390. }
  391. func filterNoPut(e mvccpb.Event) bool {
  392. return e.Type == mvccpb.PUT
  393. }
  394. func FiltersFromRequest(creq *pb.WatchCreateRequest) []mvcc.FilterFunc {
  395. filters := make([]mvcc.FilterFunc, 0, len(creq.Filters))
  396. for _, ft := range creq.Filters {
  397. switch ft {
  398. case pb.WatchCreateRequest_NOPUT:
  399. filters = append(filters, filterNoPut)
  400. case pb.WatchCreateRequest_NODELETE:
  401. filters = append(filters, filterNoDelete)
  402. default:
  403. }
  404. }
  405. return filters
  406. }