You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
376 lines
15 KiB
376 lines
15 KiB
3 months ago
|
"use strict";
|
||
|
Object.defineProperty(exports, "__esModule", { value: true });
|
||
|
exports.Server = void 0;
|
||
|
const connection_1 = require("../cmap/connection");
|
||
|
const connection_pool_1 = require("../cmap/connection_pool");
|
||
|
const errors_1 = require("../cmap/errors");
|
||
|
const constants_1 = require("../constants");
|
||
|
const error_1 = require("../error");
|
||
|
const mongo_types_1 = require("../mongo_types");
|
||
|
const transactions_1 = require("../transactions");
|
||
|
const utils_1 = require("../utils");
|
||
|
const write_concern_1 = require("../write_concern");
|
||
|
const common_1 = require("./common");
|
||
|
const monitor_1 = require("./monitor");
|
||
|
const server_description_1 = require("./server_description");
|
||
|
const stateTransition = (0, utils_1.makeStateMachine)({
|
||
|
[common_1.STATE_CLOSED]: [common_1.STATE_CLOSED, common_1.STATE_CONNECTING],
|
||
|
[common_1.STATE_CONNECTING]: [common_1.STATE_CONNECTING, common_1.STATE_CLOSING, common_1.STATE_CONNECTED, common_1.STATE_CLOSED],
|
||
|
[common_1.STATE_CONNECTED]: [common_1.STATE_CONNECTED, common_1.STATE_CLOSING, common_1.STATE_CLOSED],
|
||
|
[common_1.STATE_CLOSING]: [common_1.STATE_CLOSING, common_1.STATE_CLOSED]
|
||
|
});
|
||
|
/** @internal */
|
||
|
class Server extends mongo_types_1.TypedEventEmitter {
|
||
|
/**
|
||
|
* Create a server
|
||
|
*/
|
||
|
constructor(topology, description, options) {
|
||
|
super();
|
||
|
this.on('error', utils_1.noop);
|
||
|
this.serverApi = options.serverApi;
|
||
|
const poolOptions = { hostAddress: description.hostAddress, ...options };
|
||
|
this.topology = topology;
|
||
|
this.pool = new connection_pool_1.ConnectionPool(this, poolOptions);
|
||
|
this.s = {
|
||
|
description,
|
||
|
options,
|
||
|
state: common_1.STATE_CLOSED,
|
||
|
operationCount: 0
|
||
|
};
|
||
|
for (const event of [...constants_1.CMAP_EVENTS, ...constants_1.APM_EVENTS]) {
|
||
|
this.pool.on(event, (e) => this.emit(event, e));
|
||
|
}
|
||
|
this.pool.on(connection_1.Connection.CLUSTER_TIME_RECEIVED, (clusterTime) => {
|
||
|
this.clusterTime = clusterTime;
|
||
|
});
|
||
|
if (this.loadBalanced) {
|
||
|
this.monitor = null;
|
||
|
// monitoring is disabled in load balancing mode
|
||
|
return;
|
||
|
}
|
||
|
// create the monitor
|
||
|
this.monitor = new monitor_1.Monitor(this, this.s.options);
|
||
|
for (const event of constants_1.HEARTBEAT_EVENTS) {
|
||
|
this.monitor.on(event, (e) => this.emit(event, e));
|
||
|
}
|
||
|
this.monitor.on('resetServer', (error) => markServerUnknown(this, error));
|
||
|
this.monitor.on(Server.SERVER_HEARTBEAT_SUCCEEDED, (event) => {
|
||
|
this.emit(Server.DESCRIPTION_RECEIVED, new server_description_1.ServerDescription(this.description.hostAddress, event.reply, {
|
||
|
roundTripTime: this.monitor?.roundTripTime,
|
||
|
minRoundTripTime: this.monitor?.minRoundTripTime
|
||
|
}));
|
||
|
if (this.s.state === common_1.STATE_CONNECTING) {
|
||
|
stateTransition(this, common_1.STATE_CONNECTED);
|
||
|
this.emit(Server.CONNECT, this);
|
||
|
}
|
||
|
});
|
||
|
}
|
||
|
get clusterTime() {
|
||
|
return this.topology.clusterTime;
|
||
|
}
|
||
|
set clusterTime(clusterTime) {
|
||
|
this.topology.clusterTime = clusterTime;
|
||
|
}
|
||
|
get description() {
|
||
|
return this.s.description;
|
||
|
}
|
||
|
get name() {
|
||
|
return this.s.description.address;
|
||
|
}
|
||
|
get autoEncrypter() {
|
||
|
if (this.s.options && this.s.options.autoEncrypter) {
|
||
|
return this.s.options.autoEncrypter;
|
||
|
}
|
||
|
return;
|
||
|
}
|
||
|
get loadBalanced() {
|
||
|
return this.topology.description.type === common_1.TopologyType.LoadBalanced;
|
||
|
}
|
||
|
/**
|
||
|
* Initiate server connect
|
||
|
*/
|
||
|
connect() {
|
||
|
if (this.s.state !== common_1.STATE_CLOSED) {
|
||
|
return;
|
||
|
}
|
||
|
stateTransition(this, common_1.STATE_CONNECTING);
|
||
|
// If in load balancer mode we automatically set the server to
|
||
|
// a load balancer. It never transitions out of this state and
|
||
|
// has no monitor.
|
||
|
if (!this.loadBalanced) {
|
||
|
this.monitor?.connect();
|
||
|
}
|
||
|
else {
|
||
|
stateTransition(this, common_1.STATE_CONNECTED);
|
||
|
this.emit(Server.CONNECT, this);
|
||
|
}
|
||
|
}
|
||
|
/** Destroy the server connection */
|
||
|
destroy() {
|
||
|
if (this.s.state === common_1.STATE_CLOSED) {
|
||
|
return;
|
||
|
}
|
||
|
stateTransition(this, common_1.STATE_CLOSING);
|
||
|
if (!this.loadBalanced) {
|
||
|
this.monitor?.close();
|
||
|
}
|
||
|
this.pool.close();
|
||
|
stateTransition(this, common_1.STATE_CLOSED);
|
||
|
this.emit('closed');
|
||
|
}
|
||
|
/**
|
||
|
* Immediately schedule monitoring of this server. If there already an attempt being made
|
||
|
* this will be a no-op.
|
||
|
*/
|
||
|
requestCheck() {
|
||
|
if (!this.loadBalanced) {
|
||
|
this.monitor?.requestCheck();
|
||
|
}
|
||
|
}
|
||
|
async command(ns, cmd, { ...options }, responseType) {
|
||
|
if (ns.db == null || typeof ns === 'string') {
|
||
|
throw new error_1.MongoInvalidArgumentError('Namespace must not be a string');
|
||
|
}
|
||
|
if (this.s.state === common_1.STATE_CLOSING || this.s.state === common_1.STATE_CLOSED) {
|
||
|
throw new error_1.MongoServerClosedError();
|
||
|
}
|
||
|
options.directConnection = this.topology.s.options.directConnection;
|
||
|
// There are cases where we need to flag the read preference not to get sent in
|
||
|
// the command, such as pre-5.0 servers attempting to perform an aggregate write
|
||
|
// with a non-primary read preference. In this case the effective read preference
|
||
|
// (primary) is not the same as the provided and must be removed completely.
|
||
|
if (options.omitReadPreference) {
|
||
|
delete options.readPreference;
|
||
|
}
|
||
|
if (this.description.iscryptd) {
|
||
|
options.omitMaxTimeMS = true;
|
||
|
}
|
||
|
const session = options.session;
|
||
|
let conn = session?.pinnedConnection;
|
||
|
this.incrementOperationCount();
|
||
|
if (conn == null) {
|
||
|
try {
|
||
|
conn = await this.pool.checkOut(options);
|
||
|
if (this.loadBalanced && isPinnableCommand(cmd, session)) {
|
||
|
session?.pin(conn);
|
||
|
}
|
||
|
}
|
||
|
catch (checkoutError) {
|
||
|
this.decrementOperationCount();
|
||
|
if (!(checkoutError instanceof errors_1.PoolClearedError))
|
||
|
this.handleError(checkoutError);
|
||
|
throw checkoutError;
|
||
|
}
|
||
|
}
|
||
|
let reauthPromise = null;
|
||
|
try {
|
||
|
try {
|
||
|
const res = await conn.command(ns, cmd, options, responseType);
|
||
|
(0, write_concern_1.throwIfWriteConcernError)(res);
|
||
|
return res;
|
||
|
}
|
||
|
catch (commandError) {
|
||
|
throw this.decorateCommandError(conn, cmd, options, commandError);
|
||
|
}
|
||
|
}
|
||
|
catch (operationError) {
|
||
|
if (operationError instanceof error_1.MongoError &&
|
||
|
operationError.code === error_1.MONGODB_ERROR_CODES.Reauthenticate) {
|
||
|
reauthPromise = this.pool.reauthenticate(conn).catch(error => {
|
||
|
reauthPromise = null;
|
||
|
throw error;
|
||
|
});
|
||
|
await (0, utils_1.abortable)(reauthPromise, options);
|
||
|
reauthPromise = null; // only reachable if reauth succeeds
|
||
|
try {
|
||
|
const res = await conn.command(ns, cmd, options, responseType);
|
||
|
(0, write_concern_1.throwIfWriteConcernError)(res);
|
||
|
return res;
|
||
|
}
|
||
|
catch (commandError) {
|
||
|
throw this.decorateCommandError(conn, cmd, options, commandError);
|
||
|
}
|
||
|
}
|
||
|
else {
|
||
|
throw operationError;
|
||
|
}
|
||
|
}
|
||
|
finally {
|
||
|
this.decrementOperationCount();
|
||
|
if (session?.pinnedConnection !== conn) {
|
||
|
if (reauthPromise != null) {
|
||
|
// The reauth promise only exists if it hasn't thrown.
|
||
|
void reauthPromise.finally(() => {
|
||
|
this.pool.checkIn(conn);
|
||
|
});
|
||
|
}
|
||
|
else {
|
||
|
this.pool.checkIn(conn);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
/**
|
||
|
* Handle SDAM error
|
||
|
* @internal
|
||
|
*/
|
||
|
handleError(error, connection) {
|
||
|
if (!(error instanceof error_1.MongoError)) {
|
||
|
return;
|
||
|
}
|
||
|
const isStaleError = error.connectionGeneration && error.connectionGeneration < this.pool.generation;
|
||
|
if (isStaleError) {
|
||
|
return;
|
||
|
}
|
||
|
const isNetworkNonTimeoutError = error instanceof error_1.MongoNetworkError && !(error instanceof error_1.MongoNetworkTimeoutError);
|
||
|
const isNetworkTimeoutBeforeHandshakeError = error instanceof error_1.MongoNetworkError && error.beforeHandshake;
|
||
|
const isAuthHandshakeError = error.hasErrorLabel(error_1.MongoErrorLabel.HandshakeError);
|
||
|
if (isNetworkNonTimeoutError || isNetworkTimeoutBeforeHandshakeError || isAuthHandshakeError) {
|
||
|
// In load balanced mode we never mark the server as unknown and always
|
||
|
// clear for the specific service id.
|
||
|
if (!this.loadBalanced) {
|
||
|
error.addErrorLabel(error_1.MongoErrorLabel.ResetPool);
|
||
|
markServerUnknown(this, error);
|
||
|
}
|
||
|
else if (connection) {
|
||
|
this.pool.clear({ serviceId: connection.serviceId });
|
||
|
}
|
||
|
}
|
||
|
else {
|
||
|
if ((0, error_1.isSDAMUnrecoverableError)(error)) {
|
||
|
if (shouldHandleStateChangeError(this, error)) {
|
||
|
const shouldClearPool = (0, utils_1.maxWireVersion)(this) <= 7 || (0, error_1.isNodeShuttingDownError)(error);
|
||
|
if (this.loadBalanced && connection && shouldClearPool) {
|
||
|
this.pool.clear({ serviceId: connection.serviceId });
|
||
|
}
|
||
|
if (!this.loadBalanced) {
|
||
|
if (shouldClearPool) {
|
||
|
error.addErrorLabel(error_1.MongoErrorLabel.ResetPool);
|
||
|
}
|
||
|
markServerUnknown(this, error);
|
||
|
process.nextTick(() => this.requestCheck());
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
/**
|
||
|
* Ensure that error is properly decorated and internal state is updated before throwing
|
||
|
* @internal
|
||
|
*/
|
||
|
decorateCommandError(connection, cmd, options, error) {
|
||
|
if (typeof error !== 'object' || error == null || !('name' in error)) {
|
||
|
throw new error_1.MongoRuntimeError('An unexpected error type: ' + typeof error);
|
||
|
}
|
||
|
if (error.name === 'AbortError' && 'cause' in error && error.cause instanceof error_1.MongoError) {
|
||
|
error = error.cause;
|
||
|
}
|
||
|
if (!(error instanceof error_1.MongoError)) {
|
||
|
// Node.js or some other error we have not special handling for
|
||
|
return error;
|
||
|
}
|
||
|
if (connectionIsStale(this.pool, connection)) {
|
||
|
return error;
|
||
|
}
|
||
|
const session = options?.session;
|
||
|
if (error instanceof error_1.MongoNetworkError) {
|
||
|
if (session && !session.hasEnded && session.serverSession) {
|
||
|
session.serverSession.isDirty = true;
|
||
|
}
|
||
|
// inActiveTransaction check handles commit and abort.
|
||
|
if (inActiveTransaction(session, cmd) &&
|
||
|
!error.hasErrorLabel(error_1.MongoErrorLabel.TransientTransactionError)) {
|
||
|
error.addErrorLabel(error_1.MongoErrorLabel.TransientTransactionError);
|
||
|
}
|
||
|
if ((isRetryableWritesEnabled(this.topology) || (0, transactions_1.isTransactionCommand)(cmd)) &&
|
||
|
(0, utils_1.supportsRetryableWrites)(this) &&
|
||
|
!inActiveTransaction(session, cmd)) {
|
||
|
error.addErrorLabel(error_1.MongoErrorLabel.RetryableWriteError);
|
||
|
}
|
||
|
}
|
||
|
else {
|
||
|
if ((isRetryableWritesEnabled(this.topology) || (0, transactions_1.isTransactionCommand)(cmd)) &&
|
||
|
(0, error_1.needsRetryableWriteLabel)(error, (0, utils_1.maxWireVersion)(this), this.description.type) &&
|
||
|
!inActiveTransaction(session, cmd)) {
|
||
|
error.addErrorLabel(error_1.MongoErrorLabel.RetryableWriteError);
|
||
|
}
|
||
|
}
|
||
|
if (session &&
|
||
|
session.isPinned &&
|
||
|
error.hasErrorLabel(error_1.MongoErrorLabel.TransientTransactionError)) {
|
||
|
session.unpin({ force: true });
|
||
|
}
|
||
|
this.handleError(error, connection);
|
||
|
return error;
|
||
|
}
|
||
|
/**
|
||
|
* Decrement the operation count, returning the new count.
|
||
|
*/
|
||
|
decrementOperationCount() {
|
||
|
return (this.s.operationCount -= 1);
|
||
|
}
|
||
|
/**
|
||
|
* Increment the operation count, returning the new count.
|
||
|
*/
|
||
|
incrementOperationCount() {
|
||
|
return (this.s.operationCount += 1);
|
||
|
}
|
||
|
}
|
||
|
exports.Server = Server;
|
||
|
/** @event */
|
||
|
Server.SERVER_HEARTBEAT_STARTED = constants_1.SERVER_HEARTBEAT_STARTED;
|
||
|
/** @event */
|
||
|
Server.SERVER_HEARTBEAT_SUCCEEDED = constants_1.SERVER_HEARTBEAT_SUCCEEDED;
|
||
|
/** @event */
|
||
|
Server.SERVER_HEARTBEAT_FAILED = constants_1.SERVER_HEARTBEAT_FAILED;
|
||
|
/** @event */
|
||
|
Server.CONNECT = constants_1.CONNECT;
|
||
|
/** @event */
|
||
|
Server.DESCRIPTION_RECEIVED = constants_1.DESCRIPTION_RECEIVED;
|
||
|
/** @event */
|
||
|
Server.CLOSED = constants_1.CLOSED;
|
||
|
/** @event */
|
||
|
Server.ENDED = constants_1.ENDED;
|
||
|
function markServerUnknown(server, error) {
|
||
|
// Load balancer servers can never be marked unknown.
|
||
|
if (server.loadBalanced) {
|
||
|
return;
|
||
|
}
|
||
|
if (error instanceof error_1.MongoNetworkError && !(error instanceof error_1.MongoNetworkTimeoutError)) {
|
||
|
server.monitor?.reset();
|
||
|
}
|
||
|
server.emit(Server.DESCRIPTION_RECEIVED, new server_description_1.ServerDescription(server.description.hostAddress, undefined, { error }));
|
||
|
}
|
||
|
function isPinnableCommand(cmd, session) {
|
||
|
if (session) {
|
||
|
return (session.inTransaction() ||
|
||
|
(session.transaction.isCommitted && 'commitTransaction' in cmd) ||
|
||
|
'aggregate' in cmd ||
|
||
|
'find' in cmd ||
|
||
|
'getMore' in cmd ||
|
||
|
'listCollections' in cmd ||
|
||
|
'listIndexes' in cmd ||
|
||
|
'bulkWrite' in cmd);
|
||
|
}
|
||
|
return false;
|
||
|
}
|
||
|
function connectionIsStale(pool, connection) {
|
||
|
if (connection.serviceId) {
|
||
|
return (connection.generation !== pool.serviceGenerations.get(connection.serviceId.toHexString()));
|
||
|
}
|
||
|
return connection.generation !== pool.generation;
|
||
|
}
|
||
|
function shouldHandleStateChangeError(server, err) {
|
||
|
const etv = err.topologyVersion;
|
||
|
const stv = server.description.topologyVersion;
|
||
|
return (0, server_description_1.compareTopologyVersion)(stv, etv) < 0;
|
||
|
}
|
||
|
function inActiveTransaction(session, cmd) {
|
||
|
return session && session.inTransaction() && !(0, transactions_1.isTransactionCommand)(cmd);
|
||
|
}
|
||
|
/** this checks the retryWrites option passed down from the client options, it
|
||
|
* does not check if the server supports retryable writes */
|
||
|
function isRetryableWritesEnabled(topology) {
|
||
|
return topology.s.options.retryWrites !== false;
|
||
|
}
|
||
|
//# sourceMappingURL=server.js.map
|