#[cfg(test)]
mod tests;
use std::cmp::max;
use std::collections::{BTreeMap, VecDeque};
use std::fmt::Debug;
use std::str::FromStr;
use std::sync::atomic::Ordering;
use std::sync::Arc;
use std::time::Duration;
use async_trait::async_trait;
use differential_dataflow::lattice::Lattice;
use futures::{FutureExt, StreamExt};
use itertools::Itertools;
use mz_audit_log::VersionedEvent;
use mz_ore::assert::SOFT_ASSERTIONS;
use mz_ore::metrics::MetricsFutureExt;
use mz_ore::now::EpochMillis;
use mz_ore::{
soft_assert_eq_no_log, soft_assert_eq_or_log, soft_assert_ne_or_log, soft_assert_no_log,
soft_assert_or_log, soft_panic_or_log,
};
use mz_persist_client::cfg::USE_CRITICAL_SINCE_CATALOG;
use mz_persist_client::cli::admin::{CATALOG_FORCE_COMPACTION_FUEL, CATALOG_FORCE_COMPACTION_WAIT};
use mz_persist_client::critical::SinceHandle;
use mz_persist_client::error::UpperMismatch;
use mz_persist_client::read::{Listen, ListenEvent, ReadHandle};
use mz_persist_client::write::WriteHandle;
use mz_persist_client::{Diagnostics, PersistClient, ShardId};
use mz_persist_types::codec_impls::UnitSchema;
use mz_proto::{RustType, TryFromProtoError};
use mz_repr::{Diff, RelationDesc, ScalarType};
use mz_storage_types::sources::SourceData;
use sha2::Digest;
use timely::progress::{Antichain, Timestamp as TimelyTimestamp};
use timely::Container;
use tracing::{debug, warn};
use uuid::Uuid;
use crate::durable::debug::{Collection, DebugCatalogState, Trace};
use crate::durable::error::FenceError;
use crate::durable::initialize::{
ENABLE_0DT_DEPLOYMENT, ENABLE_0DT_DEPLOYMENT_PANIC_AFTER_TIMEOUT, SYSTEM_CONFIG_SYNCED_KEY,
USER_VERSION_KEY, WITH_0DT_DEPLOYMENT_MAX_WAIT,
};
use crate::durable::metrics::Metrics;
use crate::durable::objects::state_update::{
IntoStateUpdateKindJson, StateUpdate, StateUpdateKind, StateUpdateKindJson,
TryIntoStateUpdateKind,
};
use crate::durable::objects::{AuditLogKey, FenceToken, Snapshot};
use crate::durable::transaction::TransactionBatch;
use crate::durable::upgrade::upgrade;
use crate::durable::{
initialize, BootstrapArgs, CatalogError, DurableCatalogError, DurableCatalogState, Epoch,
OpenableDurableCatalogState, ReadOnlyDurableCatalogState, Transaction,
CATALOG_CONTENT_VERSION_KEY,
};
use crate::memory;
pub(crate) type Timestamp = mz_repr::Timestamp;
const MIN_EPOCH: Epoch = unsafe { Epoch::new_unchecked(1) };
const CATALOG_SHARD_NAME: &str = "catalog";
const UPGRADE_SHARD_NAME: &str = "catalog_upgrade";
const CATALOG_SEED: usize = 1;
const UPGRADE_SEED: usize = 2;
const BUILTIN_MIGRATION_SEED: usize = 3;
const EXPRESSION_CACHE_SEED: usize = 4;
#[derive(Debug, Copy, Clone, Eq, PartialEq)]
pub(crate) enum Mode {
Readonly,
Savepoint,
Writable,
}
#[derive(Debug)]
pub(crate) enum FenceableToken {
Initializing {
durable_token: Option<FenceToken>,
current_deploy_generation: Option<u64>,
},
Unfenced { current_token: FenceToken },
Fenced {
current_token: FenceToken,
fence_token: FenceToken,
},
}
impl FenceableToken {
fn new(current_deploy_generation: Option<u64>) -> Self {
Self::Initializing {
durable_token: None,
current_deploy_generation,
}
}
fn validate(&self) -> Result<Option<FenceToken>, FenceError> {
match self {
FenceableToken::Initializing { durable_token, .. } => Ok(durable_token.clone()),
FenceableToken::Unfenced { current_token, .. } => Ok(Some(current_token.clone())),
FenceableToken::Fenced {
current_token,
fence_token,
} => {
assert!(
fence_token > current_token,
"must be fenced by higher token; current={current_token:?}, fence={fence_token:?}"
);
if fence_token.deploy_generation > current_token.deploy_generation {
Err(FenceError::DeployGeneration {
current_generation: current_token.deploy_generation,
fence_generation: fence_token.deploy_generation,
})
} else {
assert!(
fence_token.epoch > current_token.epoch,
"must be fenced by higher token; current={current_token:?}, fence={fence_token:?}"
);
Err(FenceError::Epoch {
current_epoch: current_token.epoch,
fence_epoch: fence_token.epoch,
})
}
}
}
}
fn token(&self) -> Option<FenceToken> {
match self {
FenceableToken::Initializing { durable_token, .. } => durable_token.clone(),
FenceableToken::Unfenced { current_token, .. } => Some(current_token.clone()),
FenceableToken::Fenced { current_token, .. } => Some(current_token.clone()),
}
}
fn maybe_fence(&mut self, token: FenceToken) -> Result<(), FenceError> {
match self {
FenceableToken::Initializing {
durable_token,
current_deploy_generation,
..
} => {
match durable_token {
Some(durable_token) => {
*durable_token = max(durable_token.clone(), token.clone());
}
None => {
*durable_token = Some(token.clone());
}
}
if let Some(current_deploy_generation) = current_deploy_generation {
if *current_deploy_generation < token.deploy_generation {
*self = FenceableToken::Fenced {
current_token: FenceToken {
deploy_generation: *current_deploy_generation,
epoch: token.epoch,
},
fence_token: token,
};
self.validate()?;
}
}
}
FenceableToken::Unfenced { current_token } => {
if *current_token < token {
*self = FenceableToken::Fenced {
current_token: current_token.clone(),
fence_token: token,
};
self.validate()?;
}
}
FenceableToken::Fenced { .. } => {
self.validate()?;
}
}
Ok(())
}
fn generate_unfenced_token(
&self,
mode: Mode,
) -> Result<Option<(Vec<(StateUpdateKind, Diff)>, FenceableToken)>, DurableCatalogError> {
let (durable_token, current_deploy_generation) = match self {
FenceableToken::Initializing {
durable_token,
current_deploy_generation,
} => (durable_token.clone(), current_deploy_generation.clone()),
FenceableToken::Unfenced { .. } | FenceableToken::Fenced { .. } => return Ok(None),
};
let mut fence_updates = Vec::with_capacity(2);
if let Some(durable_token) = &durable_token {
fence_updates.push((StateUpdateKind::FenceToken(durable_token.clone()), -1));
}
let current_deploy_generation = current_deploy_generation
.or(durable_token.as_ref().map(|token| token.deploy_generation))
.ok_or(DurableCatalogError::Uninitialized)?;
let mut current_epoch = durable_token
.map(|token| token.epoch)
.unwrap_or(MIN_EPOCH)
.get();
if matches!(mode, Mode::Writable) {
current_epoch = current_epoch + 1;
}
let current_epoch = Epoch::new(current_epoch).expect("known to be non-zero");
let current_token = FenceToken {
deploy_generation: current_deploy_generation,
epoch: current_epoch,
};
fence_updates.push((StateUpdateKind::FenceToken(current_token.clone()), 1));
let current_fenceable_token = FenceableToken::Unfenced { current_token };
Ok(Some((fence_updates, current_fenceable_token)))
}
}
#[derive(Debug, thiserror::Error)]
pub(crate) enum CompareAndAppendError {
#[error(transparent)]
Fence(#[from] FenceError),
#[error(
"expected catalog upper {expected_upper:?} did not match actual catalog upper {actual_upper:?}"
)]
UpperMismatch {
expected_upper: Timestamp,
actual_upper: Timestamp,
},
}
impl CompareAndAppendError {
pub(crate) fn unwrap_fence_error(self) -> FenceError {
match self {
CompareAndAppendError::Fence(e) => e,
e @ CompareAndAppendError::UpperMismatch { .. } => {
panic!("unexpected upper mismatch: {e:?}")
}
}
}
}
impl From<UpperMismatch<Timestamp>> for CompareAndAppendError {
fn from(upper_mismatch: UpperMismatch<Timestamp>) -> Self {
Self::UpperMismatch {
expected_upper: antichain_to_timestamp(upper_mismatch.expected),
actual_upper: antichain_to_timestamp(upper_mismatch.current),
}
}
}
pub(crate) trait ApplyUpdate<T: IntoStateUpdateKindJson> {
fn apply_update(
&mut self,
update: StateUpdate<T>,
current_fence_token: &mut FenceableToken,
metrics: &Arc<Metrics>,
) -> Result<Option<StateUpdate<T>>, FenceError>;
}
#[derive(Debug)]
pub(crate) struct PersistHandle<T: TryIntoStateUpdateKind, U: ApplyUpdate<T>> {
pub(crate) mode: Mode,
since_handle: SinceHandle<SourceData, (), Timestamp, Diff, i64>,
write_handle: WriteHandle<SourceData, (), Timestamp, Diff>,
listen: Listen<SourceData, (), Timestamp, Diff>,
persist_client: PersistClient,
shard_id: ShardId,
pub(crate) snapshot: Vec<(T, Timestamp, Diff)>,
update_applier: U,
pub(crate) upper: Timestamp,
fenceable_token: FenceableToken,
catalog_content_version: semver::Version,
metrics: Arc<Metrics>,
}
impl<T: TryIntoStateUpdateKind, U: ApplyUpdate<T>> PersistHandle<T, U> {
async fn increment_catalog_upgrade_shard_version(&self, organization_id: Uuid) {
let upgrade_shard_id = shard_id(organization_id, UPGRADE_SEED);
let mut write_handle: WriteHandle<(), (), Timestamp, Diff> = self
.persist_client
.open_writer(
upgrade_shard_id,
Arc::new(UnitSchema::default()),
Arc::new(UnitSchema::default()),
Diagnostics {
shard_name: UPGRADE_SHARD_NAME.to_string(),
handle_purpose: "increment durable catalog upgrade shard version".to_string(),
},
)
.await
.expect("invalid usage");
const EMPTY_UPDATES: &[(((), ()), Timestamp, Diff)] = &[];
let mut upper = write_handle.fetch_recent_upper().await.clone();
loop {
let next_upper = upper
.iter()
.map(|timestamp| timestamp.step_forward())
.collect();
match write_handle
.compare_and_append(EMPTY_UPDATES, upper, next_upper)
.await
.expect("invalid usage")
{
Ok(()) => break,
Err(upper_mismatch) => {
upper = upper_mismatch.current;
}
}
}
}
#[mz_ore::instrument]
async fn current_upper(&mut self) -> Timestamp {
match self.mode {
Mode::Writable | Mode::Readonly => {
let upper = self.write_handle.fetch_recent_upper().await;
antichain_to_timestamp(upper.clone())
}
Mode::Savepoint => self.upper,
}
}
#[mz_ore::instrument]
pub(crate) async fn compare_and_append<S: IntoStateUpdateKindJson>(
&mut self,
updates: Vec<(S, Diff)>,
) -> Result<Timestamp, CompareAndAppendError> {
assert_eq!(self.mode, Mode::Writable);
let contains_fence = if SOFT_ASSERTIONS.load(Ordering::Relaxed) {
let updates: Vec<_> = updates.clone();
let parsed_updates: Vec<_> = updates
.clone()
.into_iter()
.map(|(update, diff)| {
let update: StateUpdateKindJson = update.into();
(update, diff)
})
.filter_map(|(update, diff)| {
<StateUpdateKindJson as TryIntoStateUpdateKind>::try_into(update)
.ok()
.map(|update| (update, diff))
})
.collect();
let contains_retraction = parsed_updates.iter().any(|(update, diff)| {
matches!(update, StateUpdateKind::FenceToken(..)) && *diff == -1
});
let contains_addition = parsed_updates.iter().any(|(update, diff)| {
matches!(update, StateUpdateKind::FenceToken(..)) && *diff == 1
});
let contains_fence = contains_retraction && contains_addition;
Some((contains_fence, updates))
} else {
None
};
let updates = updates.into_iter().map(|(kind, diff)| {
let kind: StateUpdateKindJson = kind.into();
((Into::<SourceData>::into(kind), ()), self.upper, diff)
});
let next_upper = self.upper.step_forward();
let res = self
.write_handle
.compare_and_append(
updates,
Antichain::from_elem(self.upper),
Antichain::from_elem(next_upper),
)
.await
.expect("invalid usage");
if let Err(e @ UpperMismatch { .. }) = res {
self.sync_to_current_upper().await?;
if let Some((contains_fence, updates)) = contains_fence {
assert!(
contains_fence,
"updates were neither fenced nor fencing and encountered an upper mismatch: {updates:#?}"
)
}
return Err(e.into());
}
let downgrade_to = Antichain::from_elem(next_upper.saturating_sub(1));
let opaque = *self.since_handle.opaque();
let downgrade = self
.since_handle
.maybe_compare_and_downgrade_since(&opaque, (&opaque, &downgrade_to))
.await;
match downgrade {
None => {}
Some(Err(e)) => soft_panic_or_log!("found opaque value {e}, but expected {opaque}"),
Some(Ok(updated)) => soft_assert_or_log!(
updated == downgrade_to,
"updated bound should match expected"
),
}
self.sync(next_upper).await?;
Ok(next_upper)
}
#[mz_ore::instrument]
async fn snapshot_unconsolidated(&mut self) -> Vec<StateUpdate<StateUpdateKind>> {
let current_upper = self.current_upper().await;
let mut snapshot = Vec::new();
let mut read_handle = self.read_handle().await;
let as_of = as_of(&read_handle, current_upper);
let mut stream = Box::pin(
read_handle
.snapshot_and_stream(Antichain::from_elem(as_of))
.await
.expect("we have advanced the restart_as_of by the since"),
);
while let Some(update) = stream.next().await {
snapshot.push(update)
}
read_handle.expire().await;
snapshot
.into_iter()
.map(Into::<StateUpdate<StateUpdateKindJson>>::into)
.map(|state_update| state_update.try_into().expect("kind decoding error"))
.collect()
}
#[mz_ore::instrument]
pub(crate) async fn sync_to_current_upper(&mut self) -> Result<(), FenceError> {
let upper = self.current_upper().await;
self.sync(upper).await
}
#[mz_ore::instrument(level = "debug")]
pub(crate) async fn sync(&mut self, target_upper: Timestamp) -> Result<(), FenceError> {
self.metrics.syncs.inc();
let counter = self.metrics.sync_latency_seconds.clone();
self.sync_inner(target_upper)
.wall_time()
.inc_by(counter)
.await
}
#[mz_ore::instrument(level = "debug")]
async fn sync_inner(&mut self, target_upper: Timestamp) -> Result<(), FenceError> {
self.fenceable_token.validate()?;
if self.mode == Mode::Savepoint {
self.upper = max(self.upper, target_upper);
return Ok(());
}
let mut updates: BTreeMap<_, Vec<_>> = BTreeMap::new();
while self.upper < target_upper {
let listen_events = self.listen.fetch_next().await;
for listen_event in listen_events {
match listen_event {
ListenEvent::Progress(upper) => {
debug!("synced up to {upper:?}");
self.upper = antichain_to_timestamp(upper);
while let Some((ts, updates)) = updates.pop_first() {
assert!(ts < self.upper, "expected {} < {}", ts, self.upper);
let updates = updates.into_iter().map(
|update: StateUpdate<StateUpdateKindJson>| {
let kind =
T::try_from(update.kind).expect("kind decoding error");
StateUpdate {
kind,
ts: update.ts,
diff: update.diff,
}
},
);
self.apply_updates(updates)?;
}
}
ListenEvent::Updates(batch_updates) => {
debug!("syncing updates {batch_updates:?}");
for update in batch_updates {
let update: StateUpdate<StateUpdateKindJson> = update.into();
updates.entry(update.ts).or_default().push(update);
}
}
}
}
}
assert_eq!(updates, BTreeMap::new(), "all updates should be applied");
Ok(())
}
#[mz_ore::instrument(level = "debug")]
pub(crate) fn apply_updates(
&mut self,
updates: impl IntoIterator<Item = StateUpdate<T>>,
) -> Result<(), FenceError> {
let mut updates: Vec<_> = updates
.into_iter()
.map(|StateUpdate { kind, ts, diff }| (kind, ts, diff))
.collect();
differential_dataflow::consolidation::consolidate_updates(&mut updates);
updates.sort_by(|(_, ts1, diff1), (_, ts2, diff2)| ts1.cmp(ts2).then(diff1.cmp(diff2)));
let mut errors = Vec::new();
for (kind, ts, diff) in updates {
if diff != 1 && diff != -1 {
panic!("invalid update in consolidated trace: ({kind:?}, {ts:?}, {diff:?})");
}
match self.update_applier.apply_update(
StateUpdate { kind, ts, diff },
&mut self.fenceable_token,
&self.metrics,
) {
Ok(Some(StateUpdate { kind, ts, diff })) => self.snapshot.push((kind, ts, diff)),
Ok(None) => {}
Err(err) => errors.push(err),
}
}
errors.sort();
if let Some(err) = errors.into_iter().next() {
return Err(err);
}
self.consolidate();
Ok(())
}
#[mz_ore::instrument]
pub(crate) fn consolidate(&mut self) {
soft_assert_no_log!(
self.snapshot
.windows(2)
.all(|updates| updates[0].1 <= updates[1].1),
"snapshot should be sorted by timestamp, {:#?}",
self.snapshot
);
let new_ts = self
.snapshot
.last()
.map(|(_, ts, _)| *ts)
.unwrap_or_else(Timestamp::minimum);
for (_, ts, _) in &mut self.snapshot {
*ts = new_ts;
}
differential_dataflow::consolidation::consolidate_updates(&mut self.snapshot);
}
async fn with_trace<R>(
&mut self,
f: impl FnOnce(&Vec<(T, Timestamp, Diff)>) -> Result<R, CatalogError>,
) -> Result<R, CatalogError> {
self.sync_to_current_upper().await?;
f(&self.snapshot)
}
async fn read_handle(&self) -> ReadHandle<SourceData, (), Timestamp, Diff> {
self.persist_client
.open_leased_reader(
self.shard_id,
Arc::new(desc()),
Arc::new(UnitSchema::default()),
Diagnostics {
shard_name: CATALOG_SHARD_NAME.to_string(),
handle_purpose: "openable durable catalog state temporary reader".to_string(),
},
USE_CRITICAL_SINCE_CATALOG.get(self.persist_client.dyncfgs()),
)
.await
.expect("invalid usage")
}
async fn expire(self: Box<Self>) {
self.write_handle.expire().await;
self.listen.expire().await;
}
}
impl<U: ApplyUpdate<StateUpdateKind>> PersistHandle<StateUpdateKind, U> {
async fn with_snapshot<T>(
&mut self,
f: impl FnOnce(Snapshot) -> Result<T, CatalogError>,
) -> Result<T, CatalogError> {
fn apply<K, V>(map: &mut BTreeMap<K, V>, key: &K, value: &V, diff: Diff)
where
K: Ord + Clone,
V: Ord + Clone + Debug,
{
let key = key.clone();
let value = value.clone();
if diff == 1 {
let prev = map.insert(key, value);
assert_eq!(
prev, None,
"values must be explicitly retracted before inserting a new value"
);
} else if diff == -1 {
let prev = map.remove(&key);
assert_eq!(
prev,
Some(value),
"retraction does not match existing value"
);
}
}
self.with_trace(|trace| {
let mut snapshot = Snapshot::empty();
for (kind, ts, diff) in trace {
let diff = *diff;
if diff != 1 && diff != -1 {
panic!("invalid update in consolidated trace: ({kind:?}, {ts:?}, {diff:?})");
}
match kind {
StateUpdateKind::AuditLog(_key, ()) => {
}
StateUpdateKind::Cluster(key, value) => {
apply(&mut snapshot.clusters, key, value, diff);
}
StateUpdateKind::ClusterReplica(key, value) => {
apply(&mut snapshot.cluster_replicas, key, value, diff);
}
StateUpdateKind::Comment(key, value) => {
apply(&mut snapshot.comments, key, value, diff);
}
StateUpdateKind::Config(key, value) => {
apply(&mut snapshot.configs, key, value, diff);
}
StateUpdateKind::Database(key, value) => {
apply(&mut snapshot.databases, key, value, diff);
}
StateUpdateKind::DefaultPrivilege(key, value) => {
apply(&mut snapshot.default_privileges, key, value, diff);
}
StateUpdateKind::FenceToken(_token) => {
}
StateUpdateKind::IdAllocator(key, value) => {
apply(&mut snapshot.id_allocator, key, value, diff);
}
StateUpdateKind::IntrospectionSourceIndex(key, value) => {
apply(&mut snapshot.introspection_sources, key, value, diff);
}
StateUpdateKind::Item(key, value) => {
apply(&mut snapshot.items, key, value, diff);
}
StateUpdateKind::NetworkPolicy(key, value) => {
apply(&mut snapshot.network_policies, key, value, diff);
}
StateUpdateKind::Role(key, value) => {
apply(&mut snapshot.roles, key, value, diff);
}
StateUpdateKind::Schema(key, value) => {
apply(&mut snapshot.schemas, key, value, diff);
}
StateUpdateKind::Setting(key, value) => {
apply(&mut snapshot.settings, key, value, diff);
}
StateUpdateKind::SourceReferences(key, value) => {
apply(&mut snapshot.source_references, key, value, diff);
}
StateUpdateKind::SystemConfiguration(key, value) => {
apply(&mut snapshot.system_configurations, key, value, diff);
}
StateUpdateKind::SystemObjectMapping(key, value) => {
apply(&mut snapshot.system_object_mappings, key, value, diff);
}
StateUpdateKind::SystemPrivilege(key, value) => {
apply(&mut snapshot.system_privileges, key, value, diff);
}
StateUpdateKind::StorageCollectionMetadata(key, value) => {
apply(&mut snapshot.storage_collection_metadata, key, value, diff);
}
StateUpdateKind::UnfinalizedShard(key, ()) => {
apply(&mut snapshot.unfinalized_shards, key, &(), diff);
}
StateUpdateKind::TxnWalShard((), value) => {
apply(&mut snapshot.txn_wal_shard, &(), value, diff);
}
}
}
f(snapshot)
})
.await
}
#[mz_ore::instrument(level = "debug")]
async fn persist_snapshot(
&mut self,
) -> impl Iterator<Item = StateUpdate> + DoubleEndedIterator {
let mut read_handle = self.read_handle().await;
let as_of = as_of(&read_handle, self.upper);
let snapshot = snapshot_binary(&mut read_handle, as_of, &self.metrics)
.await
.map(|update| update.try_into().expect("kind decoding error"));
read_handle.expire().await;
snapshot
}
}
#[derive(Debug)]
pub(crate) struct UnopenedCatalogStateInner {
organization_id: Uuid,
configs: BTreeMap<String, u64>,
settings: BTreeMap<String, String>,
}
impl UnopenedCatalogStateInner {
fn new(organization_id: Uuid) -> UnopenedCatalogStateInner {
UnopenedCatalogStateInner {
organization_id,
configs: BTreeMap::new(),
settings: BTreeMap::new(),
}
}
}
impl ApplyUpdate<StateUpdateKindJson> for UnopenedCatalogStateInner {
fn apply_update(
&mut self,
update: StateUpdate<StateUpdateKindJson>,
current_fence_token: &mut FenceableToken,
_metrics: &Arc<Metrics>,
) -> Result<Option<StateUpdate<StateUpdateKindJson>>, FenceError> {
if let Ok(kind) =
<StateUpdateKindJson as TryIntoStateUpdateKind>::try_into(update.kind.clone())
{
match (kind, update.diff) {
(StateUpdateKind::Config(key, value), 1) => {
let prev = self.configs.insert(key.key, value.value);
assert_eq!(
prev, None,
"values must be explicitly retracted before inserting a new value"
);
}
(StateUpdateKind::Config(key, value), -1) => {
let prev = self.configs.remove(&key.key);
assert_eq!(
prev,
Some(value.value),
"retraction does not match existing value"
);
}
(StateUpdateKind::Setting(key, value), 1) => {
let prev = self.settings.insert(key.name, value.value);
assert_eq!(
prev, None,
"values must be explicitly retracted before inserting a new value"
);
}
(StateUpdateKind::Setting(key, value), -1) => {
let prev = self.settings.remove(&key.name);
assert_eq!(
prev,
Some(value.value),
"retraction does not match existing value"
);
}
(StateUpdateKind::FenceToken(fence_token), 1) => {
current_fence_token.maybe_fence(fence_token)?;
}
_ => {}
}
}
Ok(Some(update))
}
}
pub(crate) type UnopenedPersistCatalogState =
PersistHandle<StateUpdateKindJson, UnopenedCatalogStateInner>;
impl UnopenedPersistCatalogState {
#[mz_ore::instrument]
pub(crate) async fn new(
persist_client: PersistClient,
organization_id: Uuid,
version: semver::Version,
deploy_generation: Option<u64>,
metrics: Arc<Metrics>,
) -> Result<UnopenedPersistCatalogState, DurableCatalogError> {
let catalog_shard_id = shard_id(organization_id, CATALOG_SEED);
let upgrade_shard_id = shard_id(organization_id, UPGRADE_SEED);
debug!(
?catalog_shard_id,
?upgrade_shard_id,
"new persist backed catalog state"
);
let upgrade_version =
fetch_catalog_upgrade_shard_version(&persist_client, upgrade_shard_id).await;
if let Some(upgrade_version) = upgrade_version {
if mz_persist_client::cfg::check_data_version(&upgrade_version, &version).is_err() {
return Err(DurableCatalogError::IncompatiblePersistVersion {
found_version: upgrade_version,
catalog_version: version,
});
}
}
let since_handle = persist_client
.open_critical_since(
catalog_shard_id,
PersistClient::CONTROLLER_CRITICAL_SINCE,
Diagnostics {
shard_name: CATALOG_SHARD_NAME.to_string(),
handle_purpose: "durable catalog state critical since".to_string(),
},
)
.await
.expect("invalid usage");
let (mut write_handle, mut read_handle) = persist_client
.open(
catalog_shard_id,
Arc::new(desc()),
Arc::new(UnitSchema::default()),
Diagnostics {
shard_name: CATALOG_SHARD_NAME.to_string(),
handle_purpose: "durable catalog state handles".to_string(),
},
USE_CRITICAL_SINCE_CATALOG.get(persist_client.dyncfgs()),
)
.await
.expect("invalid usage");
let upper = {
const EMPTY_UPDATES: &[((SourceData, ()), Timestamp, Diff)] = &[];
let upper = Antichain::from_elem(Timestamp::minimum());
let next_upper = Timestamp::minimum().step_forward();
match write_handle
.compare_and_append(EMPTY_UPDATES, upper, Antichain::from_elem(next_upper))
.await
.expect("invalid usage")
{
Ok(()) => next_upper,
Err(mismatch) => antichain_to_timestamp(mismatch.current),
}
};
let as_of = as_of(&read_handle, upper);
let snapshot: Vec<_> = snapshot_binary(&mut read_handle, as_of, &metrics)
.await
.map(|StateUpdate { kind, ts, diff }| (kind, ts, diff))
.collect();
let listen = read_handle
.listen(Antichain::from_elem(as_of))
.await
.expect("invalid usage");
let mut handle = UnopenedPersistCatalogState {
mode: Mode::Writable,
since_handle,
write_handle,
listen,
persist_client,
shard_id: catalog_shard_id,
snapshot: Vec::new(),
update_applier: UnopenedCatalogStateInner::new(organization_id),
upper,
fenceable_token: FenceableToken::new(deploy_generation),
catalog_content_version: version,
metrics,
};
soft_assert_no_log!(
snapshot.iter().all(|(_, _, diff)| *diff == 1),
"snapshot should be consolidated: {snapshot:#?}"
);
let updates = snapshot
.into_iter()
.map(|(kind, ts, diff)| StateUpdate { kind, ts, diff });
handle.apply_updates(updates)?;
if let Some(found_version) = handle.get_catalog_content_version().await? {
if handle.catalog_content_version < found_version {
return Err(DurableCatalogError::IncompatiblePersistVersion {
found_version,
catalog_version: handle.catalog_content_version,
});
}
}
Ok(handle)
}
#[mz_ore::instrument]
async fn open_inner(
mut self,
mode: Mode,
initial_ts: EpochMillis,
bootstrap_args: &BootstrapArgs,
) -> Result<Box<dyn DurableCatalogState>, CatalogError> {
self.mode = mode;
match (&self.mode, &self.fenceable_token) {
(_, FenceableToken::Unfenced { .. } | FenceableToken::Fenced { .. }) => {
return Err(DurableCatalogError::Internal(
"catalog should not have fenced before opening".to_string(),
)
.into());
}
(
Mode::Writable | Mode::Savepoint,
FenceableToken::Initializing {
current_deploy_generation: None,
..
},
) => {
return Err(DurableCatalogError::Internal(format!(
"cannot open in mode '{:?}' without a deploy generation",
self.mode,
))
.into());
}
_ => {}
}
let read_only = matches!(self.mode, Mode::Readonly);
loop {
self.sync_to_current_upper().await?;
let (fence_updates, current_fenceable_token) = self
.fenceable_token
.generate_unfenced_token(self.mode)?
.ok_or_else(|| {
DurableCatalogError::Internal(
"catalog should not have fenced before opening".to_string(),
)
})?;
debug!(
?self.upper,
?self.fenceable_token,
?current_fenceable_token,
"fencing previous catalogs"
);
if matches!(self.mode, Mode::Writable) {
match self.compare_and_append(fence_updates.clone()).await {
Ok(_) => {}
Err(CompareAndAppendError::Fence(e)) => return Err(e.into()),
Err(e @ CompareAndAppendError::UpperMismatch { .. }) => {
warn!("catalog write failed due to upper mismatch, retrying: {e:?}");
continue;
}
}
}
self.fenceable_token = current_fenceable_token;
break;
}
let is_initialized = self.is_initialized_inner();
if !matches!(self.mode, Mode::Writable) && !is_initialized {
return Err(CatalogError::Durable(DurableCatalogError::NotWritable(
format!(
"catalog tables do not exist; will not create in {:?} mode",
self.mode
),
)));
}
soft_assert_ne_or_log!(self.upper, Timestamp::minimum());
if is_initialized && !read_only {
upgrade(&mut self).await?;
}
debug!(
?is_initialized,
?self.upper,
"initializing catalog state"
);
let mut catalog = PersistCatalogState {
mode: self.mode,
since_handle: self.since_handle,
write_handle: self.write_handle,
listen: self.listen,
persist_client: self.persist_client,
shard_id: self.shard_id,
upper: self.upper,
fenceable_token: self.fenceable_token,
snapshot: Vec::new(),
update_applier: CatalogStateInner::new(),
catalog_content_version: self.catalog_content_version,
metrics: self.metrics,
};
catalog.metrics.collection_entries.reset();
let updates = self.snapshot.into_iter().map(|(kind, ts, diff)| {
let kind = TryIntoStateUpdateKind::try_into(kind).expect("kind decoding error");
StateUpdate { kind, ts, diff }
});
catalog.apply_updates(updates)?;
let catalog_content_version = catalog.catalog_content_version.to_string();
let txn = if is_initialized {
let mut txn = catalog.transaction().await?;
txn.set_catalog_content_version(catalog_content_version)?;
txn
} else {
soft_assert_eq_no_log!(
catalog
.snapshot
.iter()
.filter(|(kind, _, _)| !matches!(kind, StateUpdateKind::FenceToken(_)))
.count(),
0,
"trace should not contain any updates for an uninitialized catalog: {:#?}",
catalog.snapshot
);
let mut txn = catalog.transaction().await?;
initialize::initialize(
&mut txn,
bootstrap_args,
initial_ts,
catalog_content_version,
)
.await?;
txn
};
if read_only {
let (txn_batch, _) = txn.into_parts();
let updates = StateUpdate::from_txn_batch_ts(txn_batch, catalog.upper);
catalog.apply_updates(updates)?;
} else {
txn.commit_internal().await?;
}
if matches!(catalog.mode, Mode::Writable) {
catalog
.increment_catalog_upgrade_shard_version(self.update_applier.organization_id)
.await;
let write_handle = catalog
.persist_client
.open_writer::<SourceData, (), Timestamp, i64>(
catalog.write_handle.shard_id(),
Arc::new(desc()),
Arc::new(UnitSchema::default()),
Diagnostics {
shard_name: CATALOG_SHARD_NAME.to_string(),
handle_purpose: "compact catalog".to_string(),
},
)
.await
.expect("invalid usage");
let fuel = CATALOG_FORCE_COMPACTION_FUEL.handle(catalog.persist_client.dyncfgs());
let wait = CATALOG_FORCE_COMPACTION_WAIT.handle(catalog.persist_client.dyncfgs());
let _task = mz_ore::task::spawn(|| "catalog::force_shard_compaction", async move {
let () =
mz_persist_client::cli::admin::dangerous_force_compaction_and_break_pushdown(
&write_handle,
|| fuel.get(),
|| wait.get(),
)
.await;
});
}
Ok(Box::new(catalog))
}
#[mz_ore::instrument]
fn is_initialized_inner(&self) -> bool {
!self.update_applier.configs.is_empty()
}
#[mz_ore::instrument]
async fn get_current_config(&mut self, key: &str) -> Result<Option<u64>, DurableCatalogError> {
self.sync_to_current_upper().await?;
Ok(self.update_applier.configs.get(key).cloned())
}
#[mz_ore::instrument]
pub(crate) async fn get_user_version(&mut self) -> Result<Option<u64>, DurableCatalogError> {
self.get_current_config(USER_VERSION_KEY).await
}
#[mz_ore::instrument]
async fn get_current_setting(
&mut self,
name: &str,
) -> Result<Option<String>, DurableCatalogError> {
self.sync_to_current_upper().await?;
Ok(self.update_applier.settings.get(name).cloned())
}
#[mz_ore::instrument]
async fn get_catalog_content_version(
&mut self,
) -> Result<Option<semver::Version>, DurableCatalogError> {
let version = self
.get_current_setting(CATALOG_CONTENT_VERSION_KEY)
.await?;
let version = version.map(|version| version.parse().expect("invalid version persisted"));
Ok(version)
}
}
#[async_trait]
impl OpenableDurableCatalogState for UnopenedPersistCatalogState {
#[mz_ore::instrument]
async fn open_savepoint(
mut self: Box<Self>,
initial_ts: EpochMillis,
bootstrap_args: &BootstrapArgs,
) -> Result<Box<dyn DurableCatalogState>, CatalogError> {
self.open_inner(Mode::Savepoint, initial_ts, bootstrap_args)
.boxed()
.await
}
#[mz_ore::instrument]
async fn open_read_only(
mut self: Box<Self>,
bootstrap_args: &BootstrapArgs,
) -> Result<Box<dyn DurableCatalogState>, CatalogError> {
self.open_inner(Mode::Readonly, EpochMillis::MIN, bootstrap_args)
.boxed()
.await
}
#[mz_ore::instrument]
async fn open(
mut self: Box<Self>,
initial_ts: EpochMillis,
bootstrap_args: &BootstrapArgs,
) -> Result<Box<dyn DurableCatalogState>, CatalogError> {
self.open_inner(Mode::Writable, initial_ts, bootstrap_args)
.boxed()
.await
}
#[mz_ore::instrument(level = "debug")]
async fn open_debug(mut self: Box<Self>) -> Result<DebugCatalogState, CatalogError> {
Ok(DebugCatalogState(*self))
}
#[mz_ore::instrument]
async fn is_initialized(&mut self) -> Result<bool, CatalogError> {
self.sync_to_current_upper().await?;
Ok(self.is_initialized_inner())
}
#[mz_ore::instrument]
async fn epoch(&mut self) -> Result<Epoch, CatalogError> {
self.sync_to_current_upper().await?;
self.fenceable_token
.validate()?
.map(|token| token.epoch)
.ok_or(CatalogError::Durable(DurableCatalogError::Uninitialized))
}
#[mz_ore::instrument]
async fn get_deployment_generation(&mut self) -> Result<u64, CatalogError> {
self.sync_to_current_upper().await?;
self.fenceable_token
.token()
.map(|token| token.deploy_generation)
.ok_or(CatalogError::Durable(DurableCatalogError::Uninitialized))
}
#[mz_ore::instrument(level = "debug")]
async fn get_enable_0dt_deployment(&mut self) -> Result<Option<bool>, CatalogError> {
let value = self.get_current_config(ENABLE_0DT_DEPLOYMENT).await?;
match value {
None => Ok(None),
Some(0) => Ok(Some(false)),
Some(1) => Ok(Some(true)),
Some(v) => Err(
DurableCatalogError::from(TryFromProtoError::UnknownEnumVariant(format!(
"{v} is not a valid boolean value"
)))
.into(),
),
}
}
#[mz_ore::instrument(level = "debug")]
async fn get_0dt_deployment_max_wait(&mut self) -> Result<Option<Duration>, CatalogError> {
let value = self
.get_current_config(WITH_0DT_DEPLOYMENT_MAX_WAIT)
.await?;
match value {
None => Ok(None),
Some(millis) => Ok(Some(Duration::from_millis(millis))),
}
}
#[mz_ore::instrument(level = "debug")]
async fn get_enable_0dt_deployment_panic_after_timeout(
&mut self,
) -> Result<Option<bool>, CatalogError> {
let value = self
.get_current_config(ENABLE_0DT_DEPLOYMENT_PANIC_AFTER_TIMEOUT)
.await?;
match value {
None => Ok(None),
Some(0) => Ok(Some(false)),
Some(1) => Ok(Some(true)),
Some(v) => Err(
DurableCatalogError::from(TryFromProtoError::UnknownEnumVariant(format!(
"{v} is not a valid boolean value"
)))
.into(),
),
}
}
#[mz_ore::instrument]
async fn has_system_config_synced_once(&mut self) -> Result<bool, DurableCatalogError> {
self.get_current_config(SYSTEM_CONFIG_SYNCED_KEY)
.await
.map(|value| value.map(|value| value > 0).unwrap_or(false))
}
#[mz_ore::instrument]
async fn trace_unconsolidated(&mut self) -> Result<Trace, CatalogError> {
self.sync_to_current_upper().await?;
if self.is_initialized_inner() {
let snapshot = self.snapshot_unconsolidated().await;
Ok(Trace::from_snapshot(snapshot))
} else {
Err(CatalogError::Durable(DurableCatalogError::Uninitialized))
}
}
#[mz_ore::instrument]
async fn trace_consolidated(&mut self) -> Result<Trace, CatalogError> {
self.sync_to_current_upper().await?;
if self.is_initialized_inner() {
let snapshot = self.current_snapshot().await?;
Ok(Trace::from_snapshot(snapshot))
} else {
Err(CatalogError::Durable(DurableCatalogError::Uninitialized))
}
}
#[mz_ore::instrument(level = "debug")]
async fn expire(self: Box<Self>) {
self.expire().await
}
}
#[derive(Debug)]
struct CatalogStateInner {
updates: VecDeque<memory::objects::StateUpdate>,
}
impl CatalogStateInner {
fn new() -> CatalogStateInner {
CatalogStateInner {
updates: VecDeque::new(),
}
}
}
impl ApplyUpdate<StateUpdateKind> for CatalogStateInner {
fn apply_update(
&mut self,
update: StateUpdate<StateUpdateKind>,
current_fence_token: &mut FenceableToken,
metrics: &Arc<Metrics>,
) -> Result<Option<StateUpdate<StateUpdateKind>>, FenceError> {
if let Some(collection_type) = update.kind.collection_type() {
metrics
.collection_entries
.with_label_values(&[&collection_type.to_string()])
.add(update.diff);
}
{
let update: Option<memory::objects::StateUpdate> = (&update)
.try_into()
.expect("invalid persisted update: {update:#?}");
if let Some(update) = update {
self.updates.push_back(update);
}
}
match (update.kind, update.diff) {
(StateUpdateKind::AuditLog(_, ()), _) => Ok(None),
(StateUpdateKind::FenceToken(_), -1) => Ok(None),
(StateUpdateKind::FenceToken(token), 1) => {
current_fence_token.maybe_fence(token)?;
Ok(None)
}
(kind, diff) => Ok(Some(StateUpdate {
kind,
ts: update.ts,
diff,
})),
}
}
}
type PersistCatalogState = PersistHandle<StateUpdateKind, CatalogStateInner>;
#[async_trait]
impl ReadOnlyDurableCatalogState for PersistCatalogState {
fn epoch(&self) -> Epoch {
self.fenceable_token
.token()
.expect("opened catalog state must have an epoch")
.epoch
}
#[mz_ore::instrument(level = "debug")]
async fn expire(self: Box<Self>) {
self.expire().await
}
async fn get_audit_logs(&mut self) -> Result<Vec<VersionedEvent>, CatalogError> {
self.sync_to_current_upper().await?;
let audit_logs: Vec<_> = self
.persist_snapshot()
.await
.filter_map(
|StateUpdate {
kind,
ts: _,
diff: _,
}| match kind {
StateUpdateKind::AuditLog(key, ()) => Some(key),
_ => None,
},
)
.collect();
let mut audit_logs: Vec<_> = audit_logs
.into_iter()
.map(RustType::from_proto)
.map_ok(|key: AuditLogKey| key.event)
.collect::<Result<_, _>>()?;
audit_logs.sort_by(|a, b| a.sortable_id().cmp(&b.sortable_id()));
Ok(audit_logs)
}
#[mz_ore::instrument(level = "debug")]
async fn get_next_id(&mut self, id_type: &str) -> Result<u64, CatalogError> {
self.with_trace(|trace| {
Ok(trace
.into_iter()
.rev()
.filter_map(|(kind, _, _)| match kind {
StateUpdateKind::IdAllocator(key, value) if key.name == id_type => {
Some(value.next_id)
}
_ => None,
})
.next()
.expect("must exist"))
})
.await
}
#[mz_ore::instrument(level = "debug")]
async fn snapshot(&mut self) -> Result<Snapshot, CatalogError> {
self.with_snapshot(Ok).await
}
#[mz_ore::instrument(level = "debug")]
async fn sync_to_current_updates(
&mut self,
) -> Result<Vec<memory::objects::StateUpdate>, CatalogError> {
let upper = self.current_upper().await;
self.sync_updates(upper).await
}
#[mz_ore::instrument(level = "debug")]
async fn sync_updates(
&mut self,
target_upper: mz_repr::Timestamp,
) -> Result<Vec<memory::objects::StateUpdate>, CatalogError> {
self.sync(target_upper).await?;
let mut updates = Vec::new();
while let Some(update) = self.update_applier.updates.front() {
if update.ts >= target_upper {
break;
}
let update = self
.update_applier
.updates
.pop_front()
.expect("peeked above");
updates.push(update);
}
Ok(updates)
}
}
#[async_trait]
impl DurableCatalogState for PersistCatalogState {
fn is_read_only(&self) -> bool {
matches!(self.mode, Mode::Readonly)
}
fn is_savepoint(&self) -> bool {
matches!(self.mode, Mode::Savepoint)
}
#[mz_ore::instrument(level = "debug")]
async fn transaction(&mut self) -> Result<Transaction, CatalogError> {
self.metrics.transactions_started.inc();
let snapshot = self.snapshot().await?;
let commit_ts = self.upper.clone();
Transaction::new(self, snapshot, commit_ts)
}
#[mz_ore::instrument(level = "debug")]
async fn commit_transaction(
&mut self,
txn_batch: TransactionBatch,
) -> Result<Timestamp, CatalogError> {
async fn commit_transaction_inner(
catalog: &mut PersistCatalogState,
txn_batch: TransactionBatch,
) -> Result<Timestamp, CatalogError> {
if !txn_batch.is_empty() && catalog.is_read_only() {
return Err(DurableCatalogError::NotWritable(format!(
"cannot commit a transaction in a read-only catalog: {txn_batch:#?}"
))
.into());
}
assert_eq!(
catalog.upper, txn_batch.commit_ts,
"only one transaction at a time is supported"
);
let updates = StateUpdate::from_txn_batch(txn_batch).collect();
debug!("committing updates: {updates:?}");
let next_upper = match catalog.mode {
Mode::Writable => catalog
.compare_and_append(updates)
.await
.map_err(|e| e.unwrap_fence_error())?,
Mode::Savepoint => {
let ts = catalog.upper;
let updates =
updates
.into_iter()
.map(|(kind, diff)| StateUpdate { kind, ts, diff });
catalog.apply_updates(updates)?;
catalog.upper = catalog.upper.step_forward();
catalog.upper
}
Mode::Readonly => catalog.upper,
};
Ok(next_upper)
}
self.metrics.transaction_commits.inc();
let counter = self.metrics.transaction_commit_latency_seconds.clone();
commit_transaction_inner(self, txn_batch)
.wall_time()
.inc_by(counter)
.await
}
#[mz_ore::instrument(level = "debug")]
async fn confirm_leadership(&mut self) -> Result<(), CatalogError> {
if self.is_read_only() {
return Ok(());
}
self.sync_to_current_upper().await?;
Ok(())
}
}
pub fn builtin_migration_shard_id(organization_id: Uuid) -> ShardId {
shard_id(organization_id, BUILTIN_MIGRATION_SEED)
}
pub fn expression_cache_shard_id(organization_id: Uuid) -> ShardId {
shard_id(organization_id, EXPRESSION_CACHE_SEED)
}
fn shard_id(organization_id: Uuid, seed: usize) -> ShardId {
let hash = sha2::Sha256::digest(format!("{organization_id}{seed}")).to_vec();
soft_assert_eq_or_log!(hash.len(), 32, "SHA256 returns 32 bytes (256 bits)");
let uuid = Uuid::from_slice(&hash[0..16]).expect("from_slice accepts exactly 16 bytes");
ShardId::from_str(&format!("s{uuid}")).expect("known to be valid")
}
fn desc() -> RelationDesc {
RelationDesc::builder()
.with_column("data", ScalarType::Jsonb.nullable(false))
.finish()
}
fn as_of(read_handle: &ReadHandle<SourceData, (), Timestamp, Diff>, upper: Timestamp) -> Timestamp {
let since = read_handle.since().clone();
let mut as_of = upper.checked_sub(1).unwrap_or_else(|| {
panic!("catalog persist shard should be initialize, found upper: {upper:?}")
});
soft_assert_or_log!(
since.less_equal(&as_of),
"since={since:?}, as_of={as_of:?}; since must be less than or equal to as_of"
);
as_of.advance_by(since.borrow());
as_of
}
async fn fetch_catalog_upgrade_shard_version(
persist_client: &PersistClient,
upgrade_shard_id: ShardId,
) -> Option<semver::Version> {
let shard_state = persist_client
.inspect_shard::<Timestamp>(&upgrade_shard_id)
.await
.ok()?;
let json_state = serde_json::to_value(shard_state).expect("state serialization error");
let upgrade_version = json_state
.get("applier_version")
.cloned()
.expect("missing applier_version");
let upgrade_version =
serde_json::from_value(upgrade_version).expect("version deserialization error");
Some(upgrade_version)
}
#[mz_ore::instrument(level = "debug")]
async fn snapshot_binary(
read_handle: &mut ReadHandle<SourceData, (), Timestamp, Diff>,
as_of: Timestamp,
metrics: &Arc<Metrics>,
) -> impl Iterator<Item = StateUpdate<StateUpdateKindJson>> + DoubleEndedIterator {
metrics.snapshots_taken.inc();
let counter = metrics.snapshot_latency_seconds.clone();
snapshot_binary_inner(read_handle, as_of)
.wall_time()
.inc_by(counter)
.await
}
#[mz_ore::instrument(level = "debug")]
async fn snapshot_binary_inner(
read_handle: &mut ReadHandle<SourceData, (), Timestamp, Diff>,
as_of: Timestamp,
) -> impl Iterator<Item = StateUpdate<StateUpdateKindJson>> + DoubleEndedIterator {
let snapshot = read_handle
.snapshot_and_fetch(Antichain::from_elem(as_of))
.await
.expect("we have advanced the restart_as_of by the since");
soft_assert_no_log!(
snapshot.iter().all(|(_, _, diff)| *diff == 1),
"snapshot_and_fetch guarantees a consolidated result: {snapshot:#?}"
);
snapshot
.into_iter()
.map(Into::<StateUpdate<StateUpdateKindJson>>::into)
.sorted_by(|a, b| Ord::cmp(&b.ts, &a.ts))
}
pub(crate) fn antichain_to_timestamp(antichain: Antichain<Timestamp>) -> Timestamp {
antichain
.into_option()
.expect("we use a totally ordered time and never finalize the shard")
}
impl Trace {
fn from_snapshot(snapshot: impl IntoIterator<Item = StateUpdate>) -> Trace {
let mut trace = Trace::new();
for StateUpdate { kind, ts, diff } in snapshot {
match kind {
StateUpdateKind::AuditLog(k, v) => trace.audit_log.values.push(((k, v), ts, diff)),
StateUpdateKind::Cluster(k, v) => trace.clusters.values.push(((k, v), ts, diff)),
StateUpdateKind::ClusterReplica(k, v) => {
trace.cluster_replicas.values.push(((k, v), ts, diff))
}
StateUpdateKind::Comment(k, v) => trace.comments.values.push(((k, v), ts, diff)),
StateUpdateKind::Config(k, v) => trace.configs.values.push(((k, v), ts, diff)),
StateUpdateKind::Database(k, v) => trace.databases.values.push(((k, v), ts, diff)),
StateUpdateKind::DefaultPrivilege(k, v) => {
trace.default_privileges.values.push(((k, v), ts, diff))
}
StateUpdateKind::FenceToken(_) => {
}
StateUpdateKind::IdAllocator(k, v) => {
trace.id_allocator.values.push(((k, v), ts, diff))
}
StateUpdateKind::IntrospectionSourceIndex(k, v) => {
trace.introspection_sources.values.push(((k, v), ts, diff))
}
StateUpdateKind::Item(k, v) => trace.items.values.push(((k, v), ts, diff)),
StateUpdateKind::NetworkPolicy(k, v) => {
trace.network_policies.values.push(((k, v), ts, diff))
}
StateUpdateKind::Role(k, v) => trace.roles.values.push(((k, v), ts, diff)),
StateUpdateKind::Schema(k, v) => trace.schemas.values.push(((k, v), ts, diff)),
StateUpdateKind::Setting(k, v) => trace.settings.values.push(((k, v), ts, diff)),
StateUpdateKind::SourceReferences(k, v) => {
trace.source_references.values.push(((k, v), ts, diff))
}
StateUpdateKind::SystemConfiguration(k, v) => {
trace.system_configurations.values.push(((k, v), ts, diff))
}
StateUpdateKind::SystemObjectMapping(k, v) => {
trace.system_object_mappings.values.push(((k, v), ts, diff))
}
StateUpdateKind::SystemPrivilege(k, v) => {
trace.system_privileges.values.push(((k, v), ts, diff))
}
StateUpdateKind::StorageCollectionMetadata(k, v) => trace
.storage_collection_metadata
.values
.push(((k, v), ts, diff)),
StateUpdateKind::UnfinalizedShard(k, ()) => {
trace.unfinalized_shards.values.push(((k, ()), ts, diff))
}
StateUpdateKind::TxnWalShard((), v) => {
trace.txn_wal_shard.values.push((((), v), ts, diff))
}
}
}
trace
}
}
impl UnopenedPersistCatalogState {
#[mz_ore::instrument]
pub(crate) async fn debug_edit<T: Collection>(
&mut self,
key: T::Key,
value: T::Value,
) -> Result<Option<T::Value>, CatalogError>
where
T::Key: PartialEq + Eq + Debug + Clone,
T::Value: Debug + Clone,
{
let prev_value = loop {
let key = key.clone();
let value = value.clone();
let snapshot = self.current_snapshot().await?;
let trace = Trace::from_snapshot(snapshot);
let collection_trace = T::collection_trace(trace);
let prev_values: Vec<_> = collection_trace
.values
.into_iter()
.filter(|((k, _), _, diff)| {
soft_assert_eq_or_log!(*diff, 1, "trace is consolidated");
&key == k
})
.collect();
let prev_value = match &prev_values[..] {
[] => None,
[((_, v), _, _)] => Some(v.clone()),
prev_values => panic!("multiple values found for key {key:?}: {prev_values:?}"),
};
let mut updates: Vec<_> = prev_values
.into_iter()
.map(|((k, v), _, _)| (T::update(k, v), -1))
.collect();
updates.push((T::update(key, value), 1));
match self.fenceable_token.generate_unfenced_token(self.mode)? {
Some((fence_updates, current_fenceable_token)) => {
updates.extend(fence_updates.clone());
match self.compare_and_append(updates).await {
Ok(_) => {
self.fenceable_token = current_fenceable_token;
break prev_value;
}
Err(CompareAndAppendError::Fence(e)) => return Err(e.into()),
Err(e @ CompareAndAppendError::UpperMismatch { .. }) => {
warn!("catalog write failed due to upper mismatch, retrying: {e:?}");
continue;
}
}
}
None => {
self.compare_and_append(updates)
.await
.map_err(|e| e.unwrap_fence_error())?;
break prev_value;
}
}
};
Ok(prev_value)
}
#[mz_ore::instrument]
pub(crate) async fn debug_delete<T: Collection>(
&mut self,
key: T::Key,
) -> Result<(), CatalogError>
where
T::Key: PartialEq + Eq + Debug + Clone,
T::Value: Debug,
{
loop {
let key = key.clone();
let snapshot = self.current_snapshot().await?;
let trace = Trace::from_snapshot(snapshot);
let collection_trace = T::collection_trace(trace);
let mut retractions: Vec<_> = collection_trace
.values
.into_iter()
.filter(|((k, _), _, diff)| {
soft_assert_eq_or_log!(*diff, 1, "trace is consolidated");
&key == k
})
.map(|((k, v), _, _)| (T::update(k, v), -1))
.collect();
match self.fenceable_token.generate_unfenced_token(self.mode)? {
Some((fence_updates, current_fenceable_token)) => {
retractions.extend(fence_updates.clone());
match self.compare_and_append(retractions).await {
Ok(_) => {
self.fenceable_token = current_fenceable_token;
break;
}
Err(CompareAndAppendError::Fence(e)) => return Err(e.into()),
Err(e @ CompareAndAppendError::UpperMismatch { .. }) => {
warn!("catalog write failed due to upper mismatch, retrying: {e:?}");
continue;
}
}
}
None => {
self.compare_and_append(retractions)
.await
.map_err(|e| e.unwrap_fence_error())?;
break;
}
}
}
Ok(())
}
async fn current_snapshot(
&mut self,
) -> Result<impl IntoIterator<Item = StateUpdate> + '_, CatalogError> {
self.sync_to_current_upper().await?;
self.consolidate();
Ok(self.snapshot.iter().cloned().map(|(kind, ts, diff)| {
let kind = TryIntoStateUpdateKind::try_into(kind).expect("kind decoding error");
StateUpdate { kind, ts, diff }
}))
}
}