2018-10-26 22:18:20 +08:00
|
|
|
#include <algorithm>
|
|
|
|
#include <chrono>
|
|
|
|
#include <cstdint>
|
|
|
|
#include <exception>
|
|
|
|
#include <functional>
|
|
|
|
#include <limits>
|
|
|
|
#include <thread>
|
|
|
|
|
|
|
|
#include <gflags/gflags.h>
|
|
|
|
#include <glog/logging.h>
|
|
|
|
|
|
|
|
#include "communication/server.hpp"
|
|
|
|
#include "database/single_node_ha/graph_db.hpp"
|
|
|
|
#include "integrations/kafka/exceptions.hpp"
|
|
|
|
#include "integrations/kafka/streams.hpp"
|
|
|
|
#include "memgraph_init.hpp"
|
|
|
|
#include "query/exceptions.hpp"
|
|
|
|
#include "utils/flag_validation.hpp"
|
|
|
|
|
|
|
|
// General purpose flags.
|
|
|
|
DEFINE_string(interface, "0.0.0.0",
|
|
|
|
"Communication interface on which to listen.");
|
|
|
|
DEFINE_VALIDATED_int32(port, 7687, "Communication port on which to listen.",
|
|
|
|
FLAG_IN_RANGE(0, std::numeric_limits<uint16_t>::max()));
|
|
|
|
DEFINE_VALIDATED_int32(num_workers,
|
|
|
|
std::max(std::thread::hardware_concurrency(), 1U),
|
|
|
|
"Number of workers (Bolt)", FLAG_IN_RANGE(1, INT32_MAX));
|
|
|
|
DEFINE_VALIDATED_int32(session_inactivity_timeout, 1800,
|
|
|
|
"Time in seconds after which inactive sessions will be "
|
|
|
|
"closed.",
|
|
|
|
FLAG_IN_RANGE(1, INT32_MAX));
|
|
|
|
DEFINE_string(cert_file, "", "Certificate file to use.");
|
|
|
|
DEFINE_string(key_file, "", "Key file to use.");
|
|
|
|
|
2019-02-19 20:50:46 +08:00
|
|
|
// Audit logging flags.
|
|
|
|
DEFINE_bool(audit_enabled, false, "Set to true to enable audit logging.");
|
|
|
|
DEFINE_VALIDATED_int32(audit_buffer_size, audit::kBufferSizeDefault,
|
|
|
|
"Maximum number of items in the audit log buffer.",
|
|
|
|
FLAG_IN_RANGE(1, INT32_MAX));
|
|
|
|
DEFINE_VALIDATED_int32(
|
|
|
|
audit_buffer_flush_interval_ms, audit::kBufferFlushIntervalMillisDefault,
|
|
|
|
"Interval (in milliseconds) used for flushing the audit log buffer.",
|
|
|
|
FLAG_IN_RANGE(10, INT32_MAX));
|
|
|
|
|
2018-10-26 22:18:20 +08:00
|
|
|
using ServerT = communication::Server<BoltSession, SessionData>;
|
|
|
|
using communication::ServerContext;
|
|
|
|
|
2018-11-19 23:46:30 +08:00
|
|
|
void SingleNodeHAMain() {
|
|
|
|
google::SetUsageMessage("Memgraph high availability single-node database server");
|
2019-02-19 20:50:46 +08:00
|
|
|
|
|
|
|
auto durability_directory =
|
|
|
|
std::experimental::filesystem::path(FLAGS_durability_directory);
|
|
|
|
|
|
|
|
auth::Auth auth{durability_directory / "auth"};
|
|
|
|
|
|
|
|
audit::Log audit_log{durability_directory / "audit", FLAGS_audit_buffer_size,
|
|
|
|
FLAGS_audit_buffer_flush_interval_ms};
|
|
|
|
if (FLAGS_audit_enabled) {
|
|
|
|
audit_log.Start();
|
|
|
|
}
|
|
|
|
CHECK(utils::SignalHandler::RegisterHandler(
|
|
|
|
utils::Signal::User2, [&audit_log]() { audit_log.ReopenLog(); }))
|
|
|
|
<< "Unable to register SIGUSR2 handler!";
|
|
|
|
|
2018-10-26 22:18:20 +08:00
|
|
|
database::GraphDb db;
|
|
|
|
query::Interpreter interpreter;
|
2019-02-19 20:50:46 +08:00
|
|
|
SessionData session_data{&db, &interpreter, &auth, &audit_log};
|
2018-10-26 22:18:20 +08:00
|
|
|
|
|
|
|
integrations::kafka::Streams kafka_streams{
|
2019-02-19 20:50:46 +08:00
|
|
|
durability_directory / "streams",
|
2018-10-26 22:18:20 +08:00
|
|
|
[&session_data](
|
|
|
|
const std::string &query,
|
|
|
|
const std::map<std::string, communication::bolt::Value> ¶ms) {
|
|
|
|
KafkaStreamWriter(session_data, query, params);
|
|
|
|
}};
|
|
|
|
|
|
|
|
try {
|
|
|
|
// Recover possible streams.
|
|
|
|
kafka_streams.Recover();
|
|
|
|
} catch (const integrations::kafka::KafkaStreamException &e) {
|
|
|
|
LOG(ERROR) << e.what();
|
|
|
|
}
|
|
|
|
|
2019-02-19 20:50:46 +08:00
|
|
|
session_data.interpreter->auth_ = &auth;
|
2018-10-26 22:18:20 +08:00
|
|
|
session_data.interpreter->kafka_streams_ = &kafka_streams;
|
|
|
|
|
|
|
|
ServerContext context;
|
|
|
|
std::string service_name = "Bolt";
|
|
|
|
if (FLAGS_key_file != "" && FLAGS_cert_file != "") {
|
|
|
|
context = ServerContext(FLAGS_key_file, FLAGS_cert_file);
|
|
|
|
service_name = "BoltS";
|
|
|
|
}
|
|
|
|
|
|
|
|
ServerT server({FLAGS_interface, static_cast<uint16_t>(FLAGS_port)},
|
|
|
|
&session_data, &context, FLAGS_session_inactivity_timeout,
|
|
|
|
service_name, FLAGS_num_workers);
|
|
|
|
|
|
|
|
// Handler for regular termination signals
|
2018-11-19 23:46:30 +08:00
|
|
|
auto shutdown = [&db] {
|
|
|
|
db.Shutdown();
|
2018-10-26 22:18:20 +08:00
|
|
|
};
|
2018-11-19 23:46:30 +08:00
|
|
|
|
2018-10-26 22:18:20 +08:00
|
|
|
InitSignalHandlers(shutdown);
|
|
|
|
|
2018-11-19 23:46:30 +08:00
|
|
|
// Start the database.
|
|
|
|
db.Start();
|
|
|
|
// Start the Bolt server.
|
2018-10-26 22:18:20 +08:00
|
|
|
CHECK(server.Start()) << "Couldn't start the Bolt server!";
|
2018-11-19 23:46:30 +08:00
|
|
|
|
|
|
|
db.AwaitShutdown([&server] {
|
|
|
|
server.Shutdown();
|
|
|
|
server.AwaitShutdown();
|
|
|
|
});
|
2018-10-26 22:18:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char **argv) {
|
2019-02-11 20:32:09 +08:00
|
|
|
return WithInit(argc, argv, SingleNodeHAMain);
|
2018-10-26 22:18:20 +08:00
|
|
|
}
|