2022-09-21 11:53:54 +00:00
|
|
|
#include <Coordination/KeeperSnapshotManagerS3.h>
|
|
|
|
|
|
|
|
#if USE_AWS_S3
|
|
|
|
#include <Core/UUID.h>
|
|
|
|
|
|
|
|
#include <Common/Exception.h>
|
|
|
|
#include <Common/setThreadName.h>
|
|
|
|
|
|
|
|
#include <IO/S3Common.h>
|
|
|
|
#include <IO/WriteBufferFromS3.h>
|
|
|
|
#include <IO/ReadBufferFromS3.h>
|
|
|
|
#include <IO/ReadBufferFromFile.h>
|
|
|
|
#include <IO/ReadHelpers.h>
|
|
|
|
#include <IO/S3/PocoHTTPClient.h>
|
|
|
|
#include <IO/WriteHelpers.h>
|
|
|
|
#include <IO/copyData.h>
|
|
|
|
|
|
|
|
#include <aws/core/auth/AWSCredentials.h>
|
|
|
|
#include <aws/s3/S3Client.h>
|
|
|
|
#include <aws/s3/S3Errors.h>
|
|
|
|
#include <aws/s3/model/HeadObjectRequest.h>
|
|
|
|
#include <aws/s3/model/DeleteObjectRequest.h>
|
|
|
|
|
|
|
|
#include <filesystem>
|
|
|
|
|
|
|
|
namespace fs = std::filesystem;
|
|
|
|
|
|
|
|
namespace DB
|
|
|
|
{
|
|
|
|
|
|
|
|
struct KeeperSnapshotManagerS3::S3Configuration
|
|
|
|
{
|
|
|
|
S3Configuration(S3::URI uri_, S3::AuthSettings auth_settings_, std::shared_ptr<const Aws::S3::S3Client> client_)
|
|
|
|
: uri(std::move(uri_))
|
|
|
|
, auth_settings(std::move(auth_settings_))
|
|
|
|
, client(std::move(client_))
|
|
|
|
{}
|
|
|
|
|
|
|
|
S3::URI uri;
|
|
|
|
S3::AuthSettings auth_settings;
|
|
|
|
std::shared_ptr<const Aws::S3::S3Client> client;
|
|
|
|
};
|
|
|
|
|
|
|
|
KeeperSnapshotManagerS3::KeeperSnapshotManagerS3()
|
|
|
|
: snapshots_s3_queue(std::numeric_limits<size_t>::max())
|
|
|
|
, log(&Poco::Logger::get("KeeperSnapshotManagerS3"))
|
2022-10-17 11:02:36 +00:00
|
|
|
, uuid(UUIDHelpers::generateV4())
|
2022-09-21 11:53:54 +00:00
|
|
|
{}
|
|
|
|
|
|
|
|
void KeeperSnapshotManagerS3::updateS3Configuration(const Poco::Util::AbstractConfiguration & config)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
const std::string config_prefix = "keeper_server.s3_snapshot";
|
|
|
|
|
|
|
|
if (!config.has(config_prefix))
|
|
|
|
{
|
|
|
|
std::lock_guard client_lock{snapshot_s3_client_mutex};
|
|
|
|
if (snapshot_s3_client)
|
|
|
|
LOG_INFO(log, "S3 configuration was removed");
|
|
|
|
snapshot_s3_client = nullptr;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto auth_settings = S3::AuthSettings::loadFromConfig(config_prefix, config);
|
|
|
|
|
|
|
|
auto endpoint = config.getString(config_prefix + ".endpoint");
|
|
|
|
auto new_uri = S3::URI{Poco::URI(endpoint)};
|
|
|
|
|
2022-09-22 13:03:27 +00:00
|
|
|
{
|
|
|
|
std::lock_guard client_lock{snapshot_s3_client_mutex};
|
|
|
|
// if client is not changed (same auth settings, same endpoint) we don't need to update
|
|
|
|
if (snapshot_s3_client && snapshot_s3_client->client && auth_settings == snapshot_s3_client->auth_settings
|
|
|
|
&& snapshot_s3_client->uri.uri == new_uri.uri)
|
|
|
|
return;
|
|
|
|
}
|
2022-09-21 11:53:54 +00:00
|
|
|
|
|
|
|
LOG_INFO(log, "S3 configuration was updated");
|
|
|
|
|
|
|
|
auto credentials = Aws::Auth::AWSCredentials(auth_settings.access_key_id, auth_settings.secret_access_key);
|
|
|
|
HeaderCollection headers = auth_settings.headers;
|
|
|
|
|
|
|
|
static constexpr size_t s3_max_redirects = 10;
|
|
|
|
static constexpr bool enable_s3_requests_logging = false;
|
|
|
|
|
|
|
|
if (!new_uri.key.empty())
|
|
|
|
{
|
|
|
|
LOG_ERROR(log, "Invalid endpoint defined for S3, it shouldn't contain key, endpoint: {}", endpoint);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
S3::PocoHTTPClientConfiguration client_configuration = S3::ClientFactory::instance().createClientConfiguration(
|
|
|
|
auth_settings.region,
|
|
|
|
RemoteHostFilter(), s3_max_redirects,
|
|
|
|
enable_s3_requests_logging,
|
|
|
|
/* for_disk_s3 = */ false);
|
|
|
|
|
|
|
|
client_configuration.endpointOverride = new_uri.endpoint;
|
|
|
|
|
|
|
|
auto client = S3::ClientFactory::instance().create(
|
|
|
|
client_configuration,
|
|
|
|
new_uri.is_virtual_hosted_style,
|
|
|
|
credentials.GetAWSAccessKeyId(),
|
|
|
|
credentials.GetAWSSecretKey(),
|
|
|
|
auth_settings.server_side_encryption_customer_key_base64,
|
|
|
|
std::move(headers),
|
|
|
|
auth_settings.use_environment_credentials.value_or(false),
|
|
|
|
auth_settings.use_insecure_imds_request.value_or(false));
|
|
|
|
|
|
|
|
auto new_client = std::make_shared<KeeperSnapshotManagerS3::S3Configuration>(std::move(new_uri), std::move(auth_settings), std::move(client));
|
|
|
|
|
2022-09-22 13:03:27 +00:00
|
|
|
{
|
|
|
|
std::lock_guard client_lock{snapshot_s3_client_mutex};
|
|
|
|
snapshot_s3_client = std::move(new_client);
|
|
|
|
}
|
2022-09-21 11:53:54 +00:00
|
|
|
LOG_INFO(log, "S3 client was updated");
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
LOG_ERROR(log, "Failed to create an S3 client for snapshots");
|
|
|
|
tryLogCurrentException(__PRETTY_FUNCTION__);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
std::shared_ptr<KeeperSnapshotManagerS3::S3Configuration> KeeperSnapshotManagerS3::getSnapshotS3Client() const
|
|
|
|
{
|
|
|
|
std::lock_guard lock{snapshot_s3_client_mutex};
|
|
|
|
return snapshot_s3_client;
|
|
|
|
}
|
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
void KeeperSnapshotManagerS3::uploadSnapshotImpl(const std::string & snapshot_path)
|
2022-09-21 11:53:54 +00:00
|
|
|
{
|
2022-10-17 11:02:36 +00:00
|
|
|
try
|
2022-09-21 11:53:54 +00:00
|
|
|
{
|
2022-10-17 11:02:36 +00:00
|
|
|
auto s3_client = getSnapshotS3Client();
|
|
|
|
if (s3_client == nullptr)
|
|
|
|
return;
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
LOG_INFO(log, "Will try to upload snapshot on {} to S3", snapshot_path);
|
|
|
|
ReadBufferFromFile snapshot_file(snapshot_path);
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
S3Settings::ReadWriteSettings read_write_settings;
|
|
|
|
read_write_settings.upload_part_size_multiply_parts_count_threshold = 10000;
|
|
|
|
|
|
|
|
const auto create_writer = [&](const auto & key)
|
2022-09-21 11:53:54 +00:00
|
|
|
{
|
2022-10-17 11:02:36 +00:00
|
|
|
return WriteBufferFromS3
|
|
|
|
{
|
|
|
|
s3_client->client,
|
|
|
|
s3_client->uri.bucket,
|
|
|
|
key,
|
|
|
|
read_write_settings
|
|
|
|
};
|
|
|
|
};
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
auto snapshot_name = fs::path(snapshot_path).filename().string();
|
|
|
|
auto lock_file = fmt::format(".{}_LOCK", snapshot_name);
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
const auto file_exists = [&](const auto & key)
|
|
|
|
{
|
|
|
|
Aws::S3::Model::HeadObjectRequest request;
|
|
|
|
request.SetBucket(s3_client->uri.bucket);
|
|
|
|
request.SetKey(key);
|
|
|
|
auto outcome = s3_client->client->HeadObject(request);
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
if (outcome.IsSuccess())
|
|
|
|
return true;
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
const auto & error = outcome.GetError();
|
|
|
|
if (error.GetErrorType() != Aws::S3::S3Errors::NO_SUCH_KEY && error.GetErrorType() != Aws::S3::S3Errors::RESOURCE_NOT_FOUND)
|
|
|
|
throw S3Exception(error.GetErrorType(), "Failed to verify existence of lock file: {}", error.GetMessage());
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
return false;
|
|
|
|
};
|
|
|
|
|
|
|
|
if (file_exists(snapshot_name))
|
|
|
|
{
|
|
|
|
LOG_ERROR(log, "Snapshot {} already exists", snapshot_name);
|
|
|
|
return;
|
|
|
|
}
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
// First we need to verify that there isn't already a lock file for the snapshot we want to upload
|
|
|
|
// Only leader uploads a snapshot, but there can be a rare case where we have 2 leaders in NuRaft
|
|
|
|
if (file_exists(lock_file))
|
|
|
|
{
|
|
|
|
LOG_ERROR(log, "Lock file for {} already, exists. Probably a different node is already uploading the snapshot", snapshot_name);
|
|
|
|
return;
|
|
|
|
}
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
// We write our UUID to lock file
|
|
|
|
LOG_DEBUG(log, "Trying to create a lock file");
|
|
|
|
WriteBufferFromS3 lock_writer = create_writer(lock_file);
|
|
|
|
writeUUIDText(uuid, lock_writer);
|
|
|
|
lock_writer.finalize();
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
// We read back the written UUID, if it's the same we can upload the file
|
|
|
|
std::string read_uuid;
|
|
|
|
{
|
|
|
|
ReadBufferFromS3 lock_reader
|
|
|
|
{
|
|
|
|
s3_client->client,
|
|
|
|
s3_client->uri.bucket,
|
|
|
|
lock_file,
|
|
|
|
"",
|
|
|
|
1,
|
|
|
|
{}
|
2022-09-21 11:53:54 +00:00
|
|
|
};
|
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
readStringUntilEOF(read_uuid, lock_reader);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (read_uuid != toString(uuid))
|
|
|
|
{
|
|
|
|
LOG_ERROR(log, "Failed to create a lock file");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
SCOPE_EXIT(
|
|
|
|
{
|
|
|
|
LOG_INFO(log, "Removing lock file");
|
|
|
|
try
|
2022-09-21 11:53:54 +00:00
|
|
|
{
|
2022-10-17 11:02:36 +00:00
|
|
|
Aws::S3::Model::DeleteObjectRequest delete_request;
|
|
|
|
delete_request.SetBucket(s3_client->uri.bucket);
|
|
|
|
delete_request.SetKey(lock_file);
|
|
|
|
auto delete_outcome = s3_client->client->DeleteObject(delete_request);
|
|
|
|
if (!delete_outcome.IsSuccess())
|
|
|
|
throw S3Exception(delete_outcome.GetError().GetMessage(), delete_outcome.GetError().GetErrorType());
|
2022-09-21 11:53:54 +00:00
|
|
|
}
|
2022-10-17 11:02:36 +00:00
|
|
|
catch (...)
|
2022-09-21 11:53:54 +00:00
|
|
|
{
|
2022-10-17 11:02:36 +00:00
|
|
|
LOG_INFO(log, "Failed to delete lock file for {} from S3", snapshot_path);
|
|
|
|
tryLogCurrentException(__PRETTY_FUNCTION__);
|
2022-09-21 11:53:54 +00:00
|
|
|
}
|
2022-10-17 11:02:36 +00:00
|
|
|
});
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
WriteBufferFromS3 snapshot_writer = create_writer(snapshot_name);
|
|
|
|
copyData(snapshot_file, snapshot_writer);
|
|
|
|
snapshot_writer.finalize();
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
LOG_INFO(log, "Successfully uploaded {} to S3", snapshot_path);
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
LOG_INFO(log, "Failure during upload of {} to S3", snapshot_path);
|
|
|
|
tryLogCurrentException(__PRETTY_FUNCTION__);
|
|
|
|
}
|
|
|
|
}
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
void KeeperSnapshotManagerS3::snapshotS3Thread()
|
|
|
|
{
|
|
|
|
setThreadName("KeeperS3SnpT");
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
while (!shutdown_called)
|
|
|
|
{
|
|
|
|
std::string snapshot_path;
|
|
|
|
if (!snapshots_s3_queue.pop(snapshot_path))
|
|
|
|
break;
|
2022-09-21 11:53:54 +00:00
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
if (shutdown_called)
|
|
|
|
break;
|
|
|
|
|
|
|
|
uploadSnapshotImpl(snapshot_path);
|
2022-09-21 11:53:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
void KeeperSnapshotManagerS3::uploadSnapshot(const std::string & path, bool async_upload)
|
2022-09-21 11:53:54 +00:00
|
|
|
{
|
|
|
|
if (getSnapshotS3Client() == nullptr)
|
|
|
|
return;
|
|
|
|
|
2022-10-17 11:02:36 +00:00
|
|
|
if (async_upload)
|
|
|
|
{
|
|
|
|
if (!snapshots_s3_queue.push(path))
|
|
|
|
LOG_WARNING(log, "Failed to add snapshot {} to S3 queue", path);
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
uploadSnapshotImpl(path);
|
2022-09-21 11:53:54 +00:00
|
|
|
}
|
|
|
|
|
2022-09-22 13:03:27 +00:00
|
|
|
void KeeperSnapshotManagerS3::startup(const Poco::Util::AbstractConfiguration & config)
|
2022-09-21 11:53:54 +00:00
|
|
|
{
|
2022-09-22 13:03:27 +00:00
|
|
|
updateS3Configuration(config);
|
2022-09-21 11:53:54 +00:00
|
|
|
snapshot_s3_thread = ThreadFromGlobalPool([this] { snapshotS3Thread(); });
|
|
|
|
}
|
|
|
|
|
|
|
|
void KeeperSnapshotManagerS3::shutdown()
|
|
|
|
{
|
|
|
|
if (shutdown_called)
|
|
|
|
return;
|
|
|
|
|
|
|
|
LOG_DEBUG(log, "Shutting down KeeperSnapshotManagerS3");
|
|
|
|
shutdown_called = true;
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
snapshots_s3_queue.finish();
|
|
|
|
if (snapshot_s3_thread.joinable())
|
|
|
|
snapshot_s3_thread.join();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
tryLogCurrentException(__PRETTY_FUNCTION__);
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG_INFO(log, "KeeperSnapshotManagerS3 shut down");
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|