mirror of https://github.com/mongodb/mongo
186 lines
7.1 KiB
JavaScript
186 lines
7.1 KiB
JavaScript
/**
|
|
* Tests for shard aware initialization during process startup (for standalone) and transition
|
|
* to primary (for replica set nodes).
|
|
* Note: test will deliberately cause a mongod instance to terminate abruptly and mongod instance
|
|
* without journaling will complain about unclean shutdown.
|
|
* @tags: [requires_persistence]
|
|
*/
|
|
|
|
import {ReplSetTest} from "jstests/libs/replsettest.js";
|
|
import {ShardingTest} from "jstests/libs/shardingtest.js";
|
|
|
|
let waitForPrimary = function (conn) {
|
|
assert.soon(function () {
|
|
let res = conn.getDB("admin").runCommand({hello: 1});
|
|
return res.isWritablePrimary;
|
|
});
|
|
};
|
|
|
|
/**
|
|
* Runs a series of test on the mongod instance mongodConn is pointing to. Notes that the
|
|
* test can restart the mongod instance several times so mongodConn can end up with a broken
|
|
* connection after.
|
|
*
|
|
* awaitVersionUpdate is used with the replset invocation of this test to ensure that our
|
|
* initial write to the admin.system.version collection is fully flushed out of the oplog before
|
|
* restarting. That allows our standalone corrupting update to see the write (and cause us to
|
|
* fail on startup).
|
|
*/
|
|
let runTest = function (mongodConn, configConnStr, awaitVersionUpdate) {
|
|
let shardIdentityDoc = {
|
|
_id: "shardIdentity",
|
|
configsvrConnectionString: configConnStr,
|
|
shardName: "newShard",
|
|
clusterId: ObjectId(),
|
|
};
|
|
|
|
/**
|
|
* Restarts the server without --shardsvr and replace the shardIdentity doc with a valid
|
|
* document. Then, restarts the server again with --shardsvr. This also returns a
|
|
* connection to the server after the last restart.
|
|
*/
|
|
let restartAndFixShardIdentityDoc = function (startOptions) {
|
|
let options = Object.extend({}, startOptions);
|
|
// With Recover to a Timestamp, writes to a replica set member may not be written to
|
|
// disk in the collection, but are instead re-applied from the oplog at startup. When
|
|
// restarting with `--shardsvr`, the update to the `shardIdentity` document is not
|
|
// processed. Turning off `--replSet` guarantees the update is written out to the
|
|
// collection and the test no longer relies on replication recovery from performing
|
|
// the update with `--shardsvr` on.
|
|
let rsName = options.replSet;
|
|
delete options.replSet;
|
|
delete options.shardsvr;
|
|
let mongodConn = MongoRunner.runMongod(options);
|
|
waitForPrimary(mongodConn);
|
|
|
|
let res = mongodConn.getDB("admin").system.version.update({_id: "shardIdentity"}, shardIdentityDoc);
|
|
assert.eq(1, res.nModified);
|
|
|
|
MongoRunner.stopMongod(mongodConn);
|
|
|
|
newMongodOptions.shardsvr = "";
|
|
newMongodOptions.replSet = rsName;
|
|
mongodConn = MongoRunner.runMongod(newMongodOptions);
|
|
waitForPrimary(mongodConn);
|
|
|
|
res = mongodConn.getDB("admin").runCommand({shardingState: 1});
|
|
|
|
assert(res.enabled);
|
|
assert.eq(shardIdentityDoc.shardName, res.shardName);
|
|
assert.eq(shardIdentityDoc.clusterId, res.clusterId);
|
|
assert.soon(
|
|
() =>
|
|
shardIdentityDoc.configsvrConnectionString == mongodConn.adminCommand({shardingState: 1}).configServer,
|
|
);
|
|
|
|
return mongodConn;
|
|
};
|
|
|
|
// Simulate the upsert that is performed by a config server on addShard.
|
|
assert.commandWorked(
|
|
mongodConn.getDB("admin").system.version.update(
|
|
{
|
|
_id: shardIdentityDoc._id,
|
|
shardName: shardIdentityDoc.shardName,
|
|
clusterId: shardIdentityDoc.clusterId,
|
|
},
|
|
{$set: {configsvrConnectionString: shardIdentityDoc.configsvrConnectionString}},
|
|
{upsert: true},
|
|
),
|
|
);
|
|
|
|
awaitVersionUpdate();
|
|
|
|
let res = mongodConn.getDB("admin").runCommand({shardingState: 1});
|
|
|
|
assert(res.enabled);
|
|
assert.eq(shardIdentityDoc.shardName, res.shardName);
|
|
assert.eq(shardIdentityDoc.clusterId, res.clusterId);
|
|
assert.soon(
|
|
() => shardIdentityDoc.configsvrConnectionString == mongodConn.adminCommand({shardingState: 1}).configServer,
|
|
);
|
|
// Should not be allowed to remove the shardIdentity document
|
|
assert.writeErrorWithCode(mongodConn.getDB("admin").system.version.remove({_id: "shardIdentity"}), 40070);
|
|
|
|
//
|
|
// Test normal startup
|
|
//
|
|
|
|
var newMongodOptions = Object.extend(mongodConn.savedOptions, {
|
|
restart: true,
|
|
// disable snapshotting to force the stable timestamp forward with or without the
|
|
// majority commit point. This simplifies forcing out our corrupted write to
|
|
// admin.system.version
|
|
setParameter: {"failpoint.disableSnapshotting": "{'mode':'alwaysOn'}"},
|
|
});
|
|
MongoRunner.stopMongod(mongodConn);
|
|
mongodConn = MongoRunner.runMongod(newMongodOptions);
|
|
waitForPrimary(mongodConn);
|
|
|
|
res = mongodConn.getDB("admin").runCommand({shardingState: 1});
|
|
|
|
assert(res.enabled);
|
|
assert.eq(shardIdentityDoc.shardName, res.shardName);
|
|
assert.eq(shardIdentityDoc.clusterId, res.clusterId);
|
|
assert.soon(
|
|
() => shardIdentityDoc.configsvrConnectionString == mongodConn.adminCommand({shardingState: 1}).configServer,
|
|
);
|
|
|
|
//
|
|
// Test shardIdentity doc without configsvrConnectionString, resulting into parse error
|
|
//
|
|
|
|
// Note: modification of the shardIdentity is allowed only when not running with --shardsvr
|
|
MongoRunner.stopMongod(mongodConn);
|
|
// The manipulation of `--replSet` is explained in `restartAndFixShardIdentityDoc`.
|
|
let rsName = newMongodOptions.replSet;
|
|
delete newMongodOptions.replSet;
|
|
delete newMongodOptions.shardsvr;
|
|
mongodConn = MongoRunner.runMongod(newMongodOptions);
|
|
waitForPrimary(mongodConn);
|
|
|
|
let writeResult = assert.commandWorked(
|
|
mongodConn
|
|
.getDB("admin")
|
|
.system.version.update(
|
|
{_id: "shardIdentity"},
|
|
{_id: "shardIdentity", shardName: "x", clusterId: ObjectId()},
|
|
),
|
|
);
|
|
assert.eq(writeResult.nModified, 1);
|
|
|
|
MongoRunner.stopMongod(mongodConn);
|
|
|
|
newMongodOptions.shardsvr = "";
|
|
newMongodOptions.replSet = rsName;
|
|
assert.throws(function () {
|
|
let connToCrashedMongod = MongoRunner.runMongod(newMongodOptions);
|
|
waitForPrimary(connToCrashedMongod);
|
|
});
|
|
|
|
// We call MongoRunner.stopMongod() using a former connection to the server that is
|
|
// configured with the same port in order to be able to assert on the server's exit code.
|
|
MongoRunner.stopMongod(mongodConn, undefined, {allowedExitCode: MongoRunner.EXIT_UNCAUGHT});
|
|
|
|
//
|
|
// Test that it is possible to fix the invalid shardIdentity doc by not passing --shardsvr
|
|
//
|
|
mongodConn = restartAndFixShardIdentityDoc(newMongodOptions);
|
|
res = mongodConn.getDB("admin").runCommand({shardingState: 1});
|
|
assert(res.enabled);
|
|
};
|
|
|
|
let st = new ShardingTest({shards: 1});
|
|
|
|
{
|
|
const replTest = new ReplSetTest({nodes: 1});
|
|
replTest.startSet({shardsvr: ""});
|
|
replTest.initiate();
|
|
runTest(replTest.getPrimary(), st.configRS.getURL(), function () {
|
|
replTest.awaitLastStableRecoveryTimestamp();
|
|
});
|
|
replTest.stopSet();
|
|
}
|
|
|
|
st.stop();
|