mirror of
https://github.com/postgresml/pgcat.git
synced 2026-03-23 09:26:30 +00:00
Compare commits
1 Commits
dependabot
...
levkk-bump
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
9b41cc2639 |
@@ -59,7 +59,6 @@ admin_password = "admin_pass"
|
|||||||
# session: one server connection per connected client
|
# session: one server connection per connected client
|
||||||
# transaction: one server connection per client transaction
|
# transaction: one server connection per client transaction
|
||||||
pool_mode = "transaction"
|
pool_mode = "transaction"
|
||||||
prepared_statements_cache_size = 500
|
|
||||||
|
|
||||||
# If the client doesn't specify, route traffic to
|
# If the client doesn't specify, route traffic to
|
||||||
# this role by default.
|
# this role by default.
|
||||||
@@ -142,7 +141,6 @@ query_parser_enabled = true
|
|||||||
query_parser_read_write_splitting = true
|
query_parser_read_write_splitting = true
|
||||||
primary_reads_enabled = true
|
primary_reads_enabled = true
|
||||||
sharding_function = "pg_bigint_hash"
|
sharding_function = "pg_bigint_hash"
|
||||||
prepared_statements_cache_size = 500
|
|
||||||
|
|
||||||
[pools.simple_db.users.0]
|
[pools.simple_db.users.0]
|
||||||
username = "simple_user"
|
username = "simple_user"
|
||||||
|
|||||||
@@ -26,7 +26,6 @@ PGPASSWORD=sharding_user pgbench -h 127.0.0.1 -U sharding_user shard1 -i
|
|||||||
PGPASSWORD=sharding_user pgbench -h 127.0.0.1 -U sharding_user shard2 -i
|
PGPASSWORD=sharding_user pgbench -h 127.0.0.1 -U sharding_user shard2 -i
|
||||||
|
|
||||||
# Start Toxiproxy
|
# Start Toxiproxy
|
||||||
kill -9 $(pgrep toxiproxy) || true
|
|
||||||
LOG_LEVEL=error toxiproxy-server &
|
LOG_LEVEL=error toxiproxy-server &
|
||||||
sleep 1
|
sleep 1
|
||||||
|
|
||||||
@@ -107,26 +106,10 @@ cd ../..
|
|||||||
# These tests will start and stop the pgcat server so it will need to be restarted after the tests
|
# These tests will start and stop the pgcat server so it will need to be restarted after the tests
|
||||||
#
|
#
|
||||||
pip3 install -r tests/python/requirements.txt
|
pip3 install -r tests/python/requirements.txt
|
||||||
pytest || exit 1
|
python3 tests/python/tests.py || exit 1
|
||||||
|
|
||||||
|
|
||||||
#
|
|
||||||
# Go tests
|
|
||||||
# Starts its own pgcat server
|
|
||||||
#
|
|
||||||
pushd tests/go
|
|
||||||
/usr/local/go/bin/go test || exit 1
|
|
||||||
popd
|
|
||||||
|
|
||||||
start_pgcat "info"
|
start_pgcat "info"
|
||||||
|
|
||||||
#
|
|
||||||
# Rust tests
|
|
||||||
#
|
|
||||||
cd tests/rust
|
|
||||||
cargo run
|
|
||||||
cd ../../
|
|
||||||
|
|
||||||
# Admin tests
|
# Admin tests
|
||||||
export PGPASSWORD=admin_pass
|
export PGPASSWORD=admin_pass
|
||||||
psql -U admin_user -e -h 127.0.0.1 -p 6432 -d pgbouncer -c 'SHOW STATS' > /dev/null
|
psql -U admin_user -e -h 127.0.0.1 -p 6432 -d pgbouncer -c 'SHOW STATS' > /dev/null
|
||||||
@@ -178,6 +161,3 @@ killall pgcat -s SIGINT
|
|||||||
|
|
||||||
# Allow for graceful shutdown
|
# Allow for graceful shutdown
|
||||||
sleep 1
|
sleep 1
|
||||||
|
|
||||||
kill -9 $(pgrep toxiproxy)
|
|
||||||
sleep 1
|
|
||||||
|
|||||||
4
.github/dependabot.yml
vendored
4
.github/dependabot.yml
vendored
@@ -10,7 +10,3 @@ updates:
|
|||||||
commit-message:
|
commit-message:
|
||||||
prefix: "chore(deps)"
|
prefix: "chore(deps)"
|
||||||
open-pull-requests-limit: 10
|
open-pull-requests-limit: 10
|
||||||
- package-ecosystem: "github-actions"
|
|
||||||
directory: "/"
|
|
||||||
schedule:
|
|
||||||
interval: "weekly"
|
|
||||||
|
|||||||
18
.github/workflows/build-and-push.yaml
vendored
18
.github/workflows/build-and-push.yaml
vendored
@@ -2,8 +2,6 @@ name: Build and Push
|
|||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
paths:
|
|
||||||
- '!charts/**.md'
|
|
||||||
branches:
|
branches:
|
||||||
- main
|
- main
|
||||||
tags:
|
tags:
|
||||||
@@ -23,17 +21,14 @@ jobs:
|
|||||||
|
|
||||||
steps:
|
steps:
|
||||||
- name: Checkout Repository
|
- name: Checkout Repository
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v3
|
||||||
|
|
||||||
- name: Set up QEMU
|
|
||||||
uses: docker/setup-qemu-action@v3
|
|
||||||
|
|
||||||
- name: Set up Docker Buildx
|
- name: Set up Docker Buildx
|
||||||
uses: docker/setup-buildx-action@v3
|
uses: docker/setup-buildx-action@v2
|
||||||
|
|
||||||
- name: Determine tags
|
- name: Determine tags
|
||||||
id: metadata
|
id: metadata
|
||||||
uses: docker/metadata-action@v5
|
uses: docker/metadata-action@v4
|
||||||
with:
|
with:
|
||||||
images: ${{ env.registry }}/${{ env.image-name }}
|
images: ${{ env.registry }}/${{ env.image-name }}
|
||||||
tags: |
|
tags: |
|
||||||
@@ -45,18 +40,15 @@ jobs:
|
|||||||
type=raw,value=latest,enable={{ is_default_branch }}
|
type=raw,value=latest,enable={{ is_default_branch }}
|
||||||
|
|
||||||
- name: Log in to the Container registry
|
- name: Log in to the Container registry
|
||||||
uses: docker/login-action@v3
|
uses: docker/login-action@v2.1.0
|
||||||
with:
|
with:
|
||||||
registry: ${{ env.registry }}
|
registry: ${{ env.registry }}
|
||||||
username: ${{ github.actor }}
|
username: ${{ github.actor }}
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
- name: Build and push ${{ env.image-name }}
|
- name: Build and push ${{ env.image-name }}
|
||||||
uses: docker/build-push-action@v6
|
uses: docker/build-push-action@v3
|
||||||
with:
|
with:
|
||||||
context: .
|
|
||||||
platforms: linux/amd64,linux/arm64
|
|
||||||
provenance: false
|
|
||||||
push: true
|
push: true
|
||||||
tags: ${{ steps.metadata.outputs.tags }}
|
tags: ${{ steps.metadata.outputs.tags }}
|
||||||
labels: ${{ steps.metadata.outputs.labels }}
|
labels: ${{ steps.metadata.outputs.labels }}
|
||||||
|
|||||||
50
.github/workflows/chart-lint-test.yaml
vendored
50
.github/workflows/chart-lint-test.yaml
vendored
@@ -1,50 +0,0 @@
|
|||||||
name: Lint and Test Charts
|
|
||||||
|
|
||||||
on:
|
|
||||||
pull_request:
|
|
||||||
paths:
|
|
||||||
- charts/**
|
|
||||||
- '!charts/**.md'
|
|
||||||
jobs:
|
|
||||||
lint-test:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v3.1.0
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
|
|
||||||
- name: Set up Helm
|
|
||||||
uses: azure/setup-helm@v3
|
|
||||||
with:
|
|
||||||
version: v3.8.1
|
|
||||||
|
|
||||||
# Python is required because `ct lint` runs Yamale (https://github.com/23andMe/Yamale) and
|
|
||||||
# yamllint (https://github.com/adrienverge/yamllint) which require Python
|
|
||||||
- name: Set up Python
|
|
||||||
uses: actions/setup-python@v5.3.0
|
|
||||||
with:
|
|
||||||
python-version: 3.7
|
|
||||||
|
|
||||||
- name: Set up chart-testing
|
|
||||||
uses: helm/chart-testing-action@v2.2.1
|
|
||||||
with:
|
|
||||||
version: v3.5.1
|
|
||||||
|
|
||||||
- name: Run chart-testing (list-changed)
|
|
||||||
id: list-changed
|
|
||||||
run: |
|
|
||||||
changed=$(ct list-changed --config ct.yaml)
|
|
||||||
if [[ -n "$changed" ]]; then
|
|
||||||
echo "changed=true" >> $GITHUB_OUTPUT
|
|
||||||
fi
|
|
||||||
|
|
||||||
- name: Run chart-testing (lint)
|
|
||||||
run: ct lint --config ct.yaml
|
|
||||||
|
|
||||||
- name: Create kind cluster
|
|
||||||
uses: helm/kind-action@v1.10.0
|
|
||||||
if: steps.list-changed.outputs.changed == 'true'
|
|
||||||
|
|
||||||
- name: Run chart-testing (install)
|
|
||||||
run: ct install --config ct.yaml
|
|
||||||
40
.github/workflows/chart-release.yaml
vendored
40
.github/workflows/chart-release.yaml
vendored
@@ -1,40 +0,0 @@
|
|||||||
name: Release Charts
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
paths:
|
|
||||||
- charts/**
|
|
||||||
- '!**.md'
|
|
||||||
branches:
|
|
||||||
- main
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
release:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: write
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
|
|
||||||
- name: Configure Git
|
|
||||||
run: |
|
|
||||||
git config user.name "$GITHUB_ACTOR"
|
|
||||||
git config user.email "$GITHUB_ACTOR@users.noreply.github.com"
|
|
||||||
|
|
||||||
- name: Install Helm
|
|
||||||
uses: azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
|
|
||||||
with:
|
|
||||||
version: v3.13.0
|
|
||||||
|
|
||||||
- name: Run chart-releaser
|
|
||||||
uses: helm/chart-releaser-action@a917fd15b20e8b64b94d9158ad54cd6345335584 # v1.6.0
|
|
||||||
with:
|
|
||||||
charts_dir: charts
|
|
||||||
config: cr.yaml
|
|
||||||
env:
|
|
||||||
CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}"
|
|
||||||
48
.github/workflows/generate-chart-readme.yaml
vendored
48
.github/workflows/generate-chart-readme.yaml
vendored
@@ -1,48 +0,0 @@
|
|||||||
name: '[CI/CD] Update README metadata'
|
|
||||||
|
|
||||||
on:
|
|
||||||
pull_request_target:
|
|
||||||
branches:
|
|
||||||
- main
|
|
||||||
paths:
|
|
||||||
- 'charts/*/values.yaml'
|
|
||||||
# Remove all permissions by default
|
|
||||||
permissions: {}
|
|
||||||
jobs:
|
|
||||||
update-readme-metadata:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
permissions:
|
|
||||||
contents: write
|
|
||||||
steps:
|
|
||||||
- name: Install readme-generator-for-helm
|
|
||||||
run: npm install -g @bitnami/readme-generator-for-helm
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608
|
|
||||||
with:
|
|
||||||
path: charts
|
|
||||||
ref: ${{github.event.pull_request.head.ref}}
|
|
||||||
repository: ${{github.event.pull_request.head.repo.full_name}}
|
|
||||||
token: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
- name: Execute readme-generator-for-helm
|
|
||||||
env:
|
|
||||||
DIFF_URL: "${{github.event.pull_request.diff_url}}"
|
|
||||||
TEMP_FILE: "${{runner.temp}}/pr-${{github.event.number}}.diff"
|
|
||||||
run: |
|
|
||||||
# This request doesn't consume API calls.
|
|
||||||
curl -Lkso $TEMP_FILE $DIFF_URL
|
|
||||||
files_changed="$(sed -nr 's/[\-\+]{3} [ab]\/(.*)/\1/p' $TEMP_FILE | sort | uniq)"
|
|
||||||
# Adding || true to avoid "Process exited with code 1" errors
|
|
||||||
charts_dirs_changed="$(echo "$files_changed" | xargs dirname | grep -o "pgcat/[^/]*" | sort | uniq || true)"
|
|
||||||
for chart in ${charts_dirs_changed}; do
|
|
||||||
echo "Updating README.md for ${chart}"
|
|
||||||
readme-generator --values "charts/${chart}/values.yaml" --readme "charts/${chart}/README.md" --schema "/tmp/schema.json"
|
|
||||||
done
|
|
||||||
- name: Push changes
|
|
||||||
run: |
|
|
||||||
# Push all the changes
|
|
||||||
cd charts
|
|
||||||
if git status -s | grep pgcat; then
|
|
||||||
git config user.name "$GITHUB_ACTOR"
|
|
||||||
git config user.email "$GITHUB_ACTOR@users.noreply.github.com"
|
|
||||||
git add . && git commit -am "Update README.md with readme-generator-for-helm" --signoff && git push
|
|
||||||
fi
|
|
||||||
15
.github/workflows/publish-deb-package.yml
vendored
15
.github/workflows/publish-deb-package.yml
vendored
@@ -1,9 +1,6 @@
|
|||||||
name: pgcat package (deb)
|
name: pgcat package (deb)
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
|
||||||
tags:
|
|
||||||
- v*
|
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
inputs:
|
inputs:
|
||||||
packageVersion:
|
packageVersion:
|
||||||
@@ -19,14 +16,6 @@ jobs:
|
|||||||
runs-on: ${{ matrix.os }}
|
runs-on: ${{ matrix.os }}
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- name: Set package version
|
|
||||||
if: github.event_name == 'push' # For push event
|
|
||||||
run: |
|
|
||||||
TAG=${{ github.ref_name }}
|
|
||||||
echo "packageVersion=${TAG#v}" >> "$GITHUB_ENV"
|
|
||||||
- name: Set package version (manual dispatch)
|
|
||||||
if: github.event_name == 'workflow_dispatch' # For manual dispatch
|
|
||||||
run: echo "packageVersion=${{ github.event.inputs.packageVersion }}" >> "$GITHUB_ENV"
|
|
||||||
- uses: actions-rs/toolchain@v1
|
- uses: actions-rs/toolchain@v1
|
||||||
with:
|
with:
|
||||||
toolchain: stable
|
toolchain: stable
|
||||||
@@ -50,10 +39,10 @@ jobs:
|
|||||||
export ARCH=arm64
|
export ARCH=arm64
|
||||||
fi
|
fi
|
||||||
|
|
||||||
bash utilities/deb.sh ${{ env.packageVersion }}
|
bash utilities/deb.sh ${{ inputs.packageVersion }}
|
||||||
|
|
||||||
deb-s3 upload \
|
deb-s3 upload \
|
||||||
--lock \
|
--lock \
|
||||||
--bucket apt.postgresml.org \
|
--bucket apt.postgresml.org \
|
||||||
pgcat-${{ env.packageVersion }}-ubuntu22.04-${ARCH}.deb \
|
pgcat-${{ inputs.packageVersion }}-ubuntu22.04-${ARCH}.deb \
|
||||||
--codename $(lsb_release -cs)
|
--codename $(lsb_release -cs)
|
||||||
|
|||||||
2
.gitignore
vendored
2
.gitignore
vendored
@@ -11,5 +11,3 @@ dev/.bash_history
|
|||||||
dev/cache
|
dev/cache
|
||||||
!dev/cache/.keepme
|
!dev/cache/.keepme
|
||||||
.venv
|
.venv
|
||||||
**/__pycache__
|
|
||||||
.bundle
|
|
||||||
26
CONFIG.md
26
CONFIG.md
@@ -36,11 +36,10 @@ Port at which prometheus exporter listens on.
|
|||||||
### connect_timeout
|
### connect_timeout
|
||||||
```
|
```
|
||||||
path: general.connect_timeout
|
path: general.connect_timeout
|
||||||
default: 1000 # milliseconds
|
default: 5000 # milliseconds
|
||||||
```
|
```
|
||||||
|
|
||||||
How long the client waits to obtain a server connection before aborting (ms).
|
How long to wait before aborting a server connection (ms).
|
||||||
This is similar to PgBouncer's `query_wait_timeout`.
|
|
||||||
|
|
||||||
### idle_timeout
|
### idle_timeout
|
||||||
```
|
```
|
||||||
@@ -463,18 +462,10 @@ path: pools.<pool_name>.users.<user_index>.pool_size
|
|||||||
default: 9
|
default: 9
|
||||||
```
|
```
|
||||||
|
|
||||||
Maximum number of server connections that can be established for this user.
|
Maximum number of server connections that can be established for this user
|
||||||
The maximum number of connection from a single Pgcat process to any database in the cluster
|
The maximum number of connection from a single Pgcat process to any database in the cluster
|
||||||
is the sum of pool_size across all users.
|
is the sum of pool_size across all users.
|
||||||
|
|
||||||
### min_pool_size
|
|
||||||
```
|
|
||||||
path: pools.<pool_name>.users.<user_index>.min_pool_size
|
|
||||||
default: 0
|
|
||||||
```
|
|
||||||
|
|
||||||
Minimum number of idle server connections to retain for this pool.
|
|
||||||
|
|
||||||
### statement_timeout
|
### statement_timeout
|
||||||
```
|
```
|
||||||
path: pools.<pool_name>.users.<user_index>.statement_timeout
|
path: pools.<pool_name>.users.<user_index>.statement_timeout
|
||||||
@@ -484,16 +475,6 @@ default: 0
|
|||||||
Maximum query duration. Dangerous, but protects against DBs that died in a non-obvious way.
|
Maximum query duration. Dangerous, but protects against DBs that died in a non-obvious way.
|
||||||
0 means it is disabled.
|
0 means it is disabled.
|
||||||
|
|
||||||
### connect_timeout
|
|
||||||
```
|
|
||||||
path: pools.<pool_name>.users.<user_index>.connect_timeout
|
|
||||||
default: <UNSET> # milliseconds
|
|
||||||
```
|
|
||||||
|
|
||||||
How long the client waits to obtain a server connection before aborting (ms).
|
|
||||||
This is similar to PgBouncer's `query_wait_timeout`.
|
|
||||||
If unset, uses the `connect_timeout` defined globally.
|
|
||||||
|
|
||||||
## `pools.<pool_name>.shards.<shard_index>` Section
|
## `pools.<pool_name>.shards.<shard_index>` Section
|
||||||
|
|
||||||
### servers
|
### servers
|
||||||
@@ -521,3 +502,4 @@ default: "shard0"
|
|||||||
```
|
```
|
||||||
|
|
||||||
Database name (e.g. "postgres")
|
Database name (e.g. "postgres")
|
||||||
|
|
||||||
|
|||||||
@@ -6,32 +6,6 @@ Thank you for contributing! Just a few tips here:
|
|||||||
2. Run the test suite (e.g. `pgbench`) to make sure everything still works. The tests are in `.circleci/run_tests.sh`.
|
2. Run the test suite (e.g. `pgbench`) to make sure everything still works. The tests are in `.circleci/run_tests.sh`.
|
||||||
3. Performance is important, make sure there are no regressions in your branch vs. `main`.
|
3. Performance is important, make sure there are no regressions in your branch vs. `main`.
|
||||||
|
|
||||||
## How to run the integration tests locally and iterate on them
|
|
||||||
We have integration tests written in Ruby, Python, Go and Rust.
|
|
||||||
Below are the steps to run them in a developer-friendly way that allows iterating and quick turnaround.
|
|
||||||
Hear me out, this should be easy, it will involve opening a shell into a container with all the necessary dependancies available for you and you can modify the test code and immediately rerun your test in the interactive shell.
|
|
||||||
|
|
||||||
|
|
||||||
Quite simply, make sure you have docker installed and then run
|
|
||||||
`./start_test_env.sh`
|
|
||||||
|
|
||||||
That is it!
|
|
||||||
|
|
||||||
Within this test environment you can modify the file in your favorite IDE and rerun the tests without having to bootstrap the entire environment again.
|
|
||||||
|
|
||||||
Once the environment is ready, you can run the tests by running
|
|
||||||
Ruby: `cd /app/tests/ruby && bundle exec ruby <test_name>.rb --format documentation`
|
|
||||||
Python: `cd /app/ && pytest`
|
|
||||||
Rust: `cd /app/tests/rust && cargo run`
|
|
||||||
Go: `cd /app/tests/go && /usr/local/go/bin/go test`
|
|
||||||
|
|
||||||
You can also rebuild PgCat directly within the environment and the tests will run against the newly built binary
|
|
||||||
To rebuild PgCat, just run `cargo build` within the container under `/app`
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Happy hacking!
|
Happy hacking!
|
||||||
|
|
||||||
## TODOs
|
## TODOs
|
||||||
|
|||||||
109
Cargo.lock
generated
109
Cargo.lock
generated
@@ -146,12 +146,6 @@ dependencies = [
|
|||||||
"syn 2.0.26",
|
"syn 2.0.26",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
|
||||||
name = "atomic-waker"
|
|
||||||
version = "1.1.2"
|
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
|
||||||
checksum = "1505bd5d3d116872e7271a6d4e16d81d0c8570876c8de68093a09ac269d8aac0"
|
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "atomic_enum"
|
name = "atomic_enum"
|
||||||
version = "0.2.0"
|
version = "0.2.0"
|
||||||
@@ -192,11 +186,12 @@ checksum = "604178f6c5c21f02dc555784810edfb88d34ac2c73b2eae109655649ee73ce3d"
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "bb8"
|
name = "bb8"
|
||||||
version = "0.8.6"
|
version = "0.8.1"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "d89aabfae550a5c44b43ab941844ffcd2e993cb6900b342debf59e9ea74acdb8"
|
checksum = "98b4b0f25f18bcdc3ac72bdb486ed0acf7e185221fd4dc985bc15db5800b0ba2"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"async-trait",
|
"async-trait",
|
||||||
|
"futures-channel",
|
||||||
"futures-util",
|
"futures-util",
|
||||||
"parking_lot",
|
"parking_lot",
|
||||||
"tokio",
|
"tokio",
|
||||||
@@ -547,23 +542,29 @@ checksum = "b6c80984affa11d98d1b88b66ac8853f143217b399d3c74116778ff8fdb4ed2e"
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "h2"
|
name = "h2"
|
||||||
version = "0.4.6"
|
version = "0.3.20"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "524e8ac6999421f49a846c2d4411f337e53497d8ec55d67753beffa43c5d9205"
|
checksum = "97ec8491ebaf99c8eaa73058b045fe58073cd6be7f596ac993ced0b0a0c01049"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"atomic-waker",
|
|
||||||
"bytes",
|
"bytes",
|
||||||
"fnv",
|
"fnv",
|
||||||
"futures-core",
|
"futures-core",
|
||||||
"futures-sink",
|
"futures-sink",
|
||||||
|
"futures-util",
|
||||||
"http",
|
"http",
|
||||||
"indexmap",
|
"indexmap 1.9.3",
|
||||||
"slab",
|
"slab",
|
||||||
"tokio",
|
"tokio",
|
||||||
"tokio-util",
|
"tokio-util",
|
||||||
"tracing",
|
"tracing",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "hashbrown"
|
||||||
|
version = "0.12.3"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "8a9ee70c43aaf417c914396645a0fa852624801b24ebb7ae78fe8272889ac888"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "hashbrown"
|
name = "hashbrown"
|
||||||
version = "0.14.0"
|
version = "0.14.0"
|
||||||
@@ -608,9 +609,9 @@ dependencies = [
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "http"
|
name = "http"
|
||||||
version = "1.1.0"
|
version = "0.2.9"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "21b9ddb458710bc376481b842f5da65cdf31522de232c1ca8146abce2a358258"
|
checksum = "bd6effc99afb63425aff9b05836f029929e345a6148a14b7ecd5ab67af944482"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"bytes",
|
"bytes",
|
||||||
"fnv",
|
"fnv",
|
||||||
@@ -619,24 +620,12 @@ dependencies = [
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "http-body"
|
name = "http-body"
|
||||||
version = "1.0.1"
|
version = "0.4.5"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "1efedce1fb8e6913f23e0c92de8e62cd5b772a67e7b3946df930a62566c93184"
|
checksum = "d5f38f16d184e36f2408a55281cd658ecbd3ca05cce6d6510a176eca393e26d1"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"bytes",
|
"bytes",
|
||||||
"http",
|
"http",
|
||||||
]
|
|
||||||
|
|
||||||
[[package]]
|
|
||||||
name = "http-body-util"
|
|
||||||
version = "0.1.2"
|
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
|
||||||
checksum = "793429d76616a256bcb62c2a2ec2bed781c8307e797e2598c50010f2bee2544f"
|
|
||||||
dependencies = [
|
|
||||||
"bytes",
|
|
||||||
"futures-util",
|
|
||||||
"http",
|
|
||||||
"http-body",
|
|
||||||
"pin-project-lite",
|
"pin-project-lite",
|
||||||
]
|
]
|
||||||
|
|
||||||
@@ -654,12 +643,13 @@ checksum = "c4a1e36c821dbe04574f602848a19f742f4fb3c98d40449f11bcad18d6b17421"
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "hyper"
|
name = "hyper"
|
||||||
version = "1.4.1"
|
version = "0.14.27"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "50dfd22e0e76d0f662d429a5f80fcaf3855009297eab6a0a9f8543834744ba05"
|
checksum = "ffb1cfd654a8219eaef89881fdb3bb3b1cdc5fa75ded05d6933b2b382e395468"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"bytes",
|
"bytes",
|
||||||
"futures-channel",
|
"futures-channel",
|
||||||
|
"futures-core",
|
||||||
"futures-util",
|
"futures-util",
|
||||||
"h2",
|
"h2",
|
||||||
"http",
|
"http",
|
||||||
@@ -668,26 +658,13 @@ dependencies = [
|
|||||||
"httpdate",
|
"httpdate",
|
||||||
"itoa",
|
"itoa",
|
||||||
"pin-project-lite",
|
"pin-project-lite",
|
||||||
"smallvec",
|
"socket2 0.4.9",
|
||||||
"tokio",
|
"tokio",
|
||||||
|
"tower-service",
|
||||||
|
"tracing",
|
||||||
"want",
|
"want",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
|
||||||
name = "hyper-util"
|
|
||||||
version = "0.1.7"
|
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
|
||||||
checksum = "cde7055719c54e36e95e8719f95883f22072a48ede39db7fc17a4e1d5281e9b9"
|
|
||||||
dependencies = [
|
|
||||||
"bytes",
|
|
||||||
"futures-util",
|
|
||||||
"http",
|
|
||||||
"http-body",
|
|
||||||
"hyper",
|
|
||||||
"pin-project-lite",
|
|
||||||
"tokio",
|
|
||||||
]
|
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "iana-time-zone"
|
name = "iana-time-zone"
|
||||||
version = "0.1.57"
|
version = "0.1.57"
|
||||||
@@ -732,6 +709,16 @@ dependencies = [
|
|||||||
"unicode-normalization",
|
"unicode-normalization",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "indexmap"
|
||||||
|
version = "1.9.3"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "bd070e393353796e801d209ad339e89596eb4c8d430d18ede6a1cced8fafbd99"
|
||||||
|
dependencies = [
|
||||||
|
"autocfg",
|
||||||
|
"hashbrown 0.12.3",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "indexmap"
|
name = "indexmap"
|
||||||
version = "2.0.0"
|
version = "2.0.0"
|
||||||
@@ -739,7 +726,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
|
|||||||
checksum = "d5477fe2230a79769d8dc68e0eabf5437907c0457a5614a9e8dddb67f65eb65d"
|
checksum = "d5477fe2230a79769d8dc68e0eabf5437907c0457a5614a9e8dddb67f65eb65d"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"equivalent",
|
"equivalent",
|
||||||
"hashbrown",
|
"hashbrown 0.14.0",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
@@ -861,7 +848,7 @@ version = "0.12.0"
|
|||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "1efa59af2ddfad1854ae27d75009d538d0998b4b2fd47083e743ac1a10e46c60"
|
checksum = "1efa59af2ddfad1854ae27d75009d538d0998b4b2fd47083e743ac1a10e46c60"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"hashbrown",
|
"hashbrown 0.14.0",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
@@ -1033,7 +1020,7 @@ checksum = "9b2a4787296e9989611394c33f193f676704af1686e70b8f8033ab5ba9a35a94"
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "pgcat"
|
name = "pgcat"
|
||||||
version = "1.2.0"
|
version = "1.1.2-dev1"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"arc-swap",
|
"arc-swap",
|
||||||
"async-trait",
|
"async-trait",
|
||||||
@@ -1047,9 +1034,7 @@ dependencies = [
|
|||||||
"fallible-iterator",
|
"fallible-iterator",
|
||||||
"futures",
|
"futures",
|
||||||
"hmac",
|
"hmac",
|
||||||
"http-body-util",
|
|
||||||
"hyper",
|
"hyper",
|
||||||
"hyper-util",
|
|
||||||
"itertools",
|
"itertools",
|
||||||
"jemallocator",
|
"jemallocator",
|
||||||
"log",
|
"log",
|
||||||
@@ -1493,9 +1478,9 @@ dependencies = [
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "smallvec"
|
name = "smallvec"
|
||||||
version = "1.13.2"
|
version = "1.11.0"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "3c5e1a9a646d36c3599cd173a41282daf47c44583ad367b8e6837255952e5c67"
|
checksum = "62bb4feee49fdd9f707ef802e22365a35de4b7b299de4763d44bfea899442ff9"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "socket2"
|
name = "socket2"
|
||||||
@@ -1525,9 +1510,9 @@ checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "sqlparser"
|
name = "sqlparser"
|
||||||
version = "0.41.0"
|
version = "0.34.0"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "5cc2c25a6c66789625ef164b4c7d2e548d627902280c13710d33da8222169964"
|
checksum = "37d3706eefb17039056234df6b566b0014f303f867f2656108334a55b8096f59"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"log",
|
"log",
|
||||||
"sqlparser_derive",
|
"sqlparser_derive",
|
||||||
@@ -1535,13 +1520,13 @@ dependencies = [
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "sqlparser_derive"
|
name = "sqlparser_derive"
|
||||||
version = "0.2.2"
|
version = "0.1.1"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "01b2e185515564f15375f593fb966b5718bc624ba77fe49fa4616ad619690554"
|
checksum = "55fe75cb4a364c7f7ae06c7dbbc8d84bddd85d6cdf9975963c3935bc1991761e"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"proc-macro2",
|
"proc-macro2",
|
||||||
"quote",
|
"quote",
|
||||||
"syn 2.0.26",
|
"syn 1.0.109",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
@@ -1756,13 +1741,19 @@ version = "0.19.14"
|
|||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "f8123f27e969974a3dfba720fdb560be359f57b44302d280ba72e76a74480e8a"
|
checksum = "f8123f27e969974a3dfba720fdb560be359f57b44302d280ba72e76a74480e8a"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"indexmap",
|
"indexmap 2.0.0",
|
||||||
"serde",
|
"serde",
|
||||||
"serde_spanned",
|
"serde_spanned",
|
||||||
"toml_datetime",
|
"toml_datetime",
|
||||||
"winnow",
|
"winnow",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "tower-service"
|
||||||
|
version = "0.3.2"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "b6bc1c9ce2b5135ac7f93c72918fc37feb872bdc6a5533a8b85eb4b86bfdae52"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "tracing"
|
name = "tracing"
|
||||||
version = "0.1.37"
|
version = "0.1.37"
|
||||||
|
|||||||
17
Cargo.toml
17
Cargo.toml
@@ -1,6 +1,6 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "pgcat"
|
name = "pgcat"
|
||||||
version = "1.2.0"
|
version = "1.1.2-dev1"
|
||||||
edition = "2021"
|
edition = "2021"
|
||||||
|
|
||||||
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
||||||
@@ -8,7 +8,7 @@ edition = "2021"
|
|||||||
tokio = { version = "1", features = ["full"] }
|
tokio = { version = "1", features = ["full"] }
|
||||||
bytes = "1"
|
bytes = "1"
|
||||||
md-5 = "0.10"
|
md-5 = "0.10"
|
||||||
bb8 = "=0.8.6"
|
bb8 = "0.8.1"
|
||||||
async-trait = "0.1"
|
async-trait = "0.1"
|
||||||
rand = "0.8"
|
rand = "0.8"
|
||||||
chrono = "0.4"
|
chrono = "0.4"
|
||||||
@@ -19,7 +19,7 @@ serde_derive = "1"
|
|||||||
regex = "1"
|
regex = "1"
|
||||||
num_cpus = "1"
|
num_cpus = "1"
|
||||||
once_cell = "1"
|
once_cell = "1"
|
||||||
sqlparser = { version = "0.41", features = ["visitor"] }
|
sqlparser = {version = "0.34", features = ["visitor"] }
|
||||||
log = "0.4"
|
log = "0.4"
|
||||||
arc-swap = "1"
|
arc-swap = "1"
|
||||||
parking_lot = "0.12.1"
|
parking_lot = "0.12.1"
|
||||||
@@ -29,9 +29,7 @@ base64 = "0.21"
|
|||||||
stringprep = "0.1"
|
stringprep = "0.1"
|
||||||
tokio-rustls = "0.24"
|
tokio-rustls = "0.24"
|
||||||
rustls-pemfile = "1"
|
rustls-pemfile = "1"
|
||||||
http-body-util = "0.1.2"
|
hyper = { version = "0.14", features = ["full"] }
|
||||||
hyper = { version = "1.4.1", features = ["full"] }
|
|
||||||
hyper-util = { version = "0.1.7", features = ["tokio"] }
|
|
||||||
phf = { version = "0.11.1", features = ["macros"] }
|
phf = { version = "0.11.1", features = ["macros"] }
|
||||||
exitcode = "1.1.2"
|
exitcode = "1.1.2"
|
||||||
futures = "0.3"
|
futures = "0.3"
|
||||||
@@ -49,12 +47,9 @@ serde_json = "1"
|
|||||||
itertools = "0.10"
|
itertools = "0.10"
|
||||||
clap = { version = "4.3.1", features = ["derive", "env"] }
|
clap = { version = "4.3.1", features = ["derive", "env"] }
|
||||||
tracing = "0.1.37"
|
tracing = "0.1.37"
|
||||||
tracing-subscriber = { version = "0.3.17", features = [
|
tracing-subscriber = { version = "0.3.17", features = ["json", "env-filter", "std"]}
|
||||||
"json",
|
|
||||||
"env-filter",
|
|
||||||
"std",
|
|
||||||
] }
|
|
||||||
lru = "0.12.0"
|
lru = "0.12.0"
|
||||||
|
|
||||||
[target.'cfg(not(target_env = "msvc"))'.dependencies]
|
[target.'cfg(not(target_env = "msvc"))'.dependencies]
|
||||||
jemallocator = "0.5.0"
|
jemallocator = "0.5.0"
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
FROM rust:1.79.0-slim-bookworm AS builder
|
FROM rust:1-slim-bookworm AS builder
|
||||||
|
|
||||||
RUN apt-get update && \
|
RUN apt-get update && \
|
||||||
apt-get install -y build-essential
|
apt-get install -y build-essential
|
||||||
@@ -19,4 +19,3 @@ COPY --from=builder /app/pgcat.toml /etc/pgcat/pgcat.toml
|
|||||||
WORKDIR /etc/pgcat
|
WORKDIR /etc/pgcat
|
||||||
ENV RUST_LOG=info
|
ENV RUST_LOG=info
|
||||||
CMD ["pgcat"]
|
CMD ["pgcat"]
|
||||||
STOPSIGNAL SIGINT
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
FROM cimg/rust:1.79.0
|
FROM cimg/rust:1.67.1
|
||||||
COPY --from=sclevine/yj /bin/yj /bin/yj
|
COPY --from=sclevine/yj /bin/yj /bin/yj
|
||||||
RUN /bin/yj -h
|
RUN /bin/yj -h
|
||||||
RUN sudo apt-get update && \
|
RUN sudo apt-get update && \
|
||||||
@@ -12,6 +12,3 @@ RUN sudo apt-get update && \
|
|||||||
pip3 install psycopg2 && sudo gem install bundler && \
|
pip3 install psycopg2 && sudo gem install bundler && \
|
||||||
wget -O /tmp/toxiproxy-2.4.0.deb https://github.com/Shopify/toxiproxy/releases/download/v2.4.0/toxiproxy_2.4.0_linux_$(dpkg --print-architecture).deb && \
|
wget -O /tmp/toxiproxy-2.4.0.deb https://github.com/Shopify/toxiproxy/releases/download/v2.4.0/toxiproxy_2.4.0_linux_$(dpkg --print-architecture).deb && \
|
||||||
sudo dpkg -i /tmp/toxiproxy-2.4.0.deb
|
sudo dpkg -i /tmp/toxiproxy-2.4.0.deb
|
||||||
RUN wget -O /tmp/go1.21.3.linux-$(dpkg --print-architecture).tar.gz https://go.dev/dl/go1.21.3.linux-$(dpkg --print-architecture).tar.gz && \
|
|
||||||
sudo tar -C /usr/local -xzf /tmp/go1.21.3.linux-$(dpkg --print-architecture).tar.gz && \
|
|
||||||
rm /tmp/go1.21.3.linux-$(dpkg --print-architecture).tar.gz
|
|
||||||
|
|||||||
@@ -40,7 +40,7 @@ PgCat is stable and used in production to serve hundreds of thousands of queries
|
|||||||
</a>
|
</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://postgresml.org/blog/scaling-postgresml-to-1-million-requests-per-second">
|
<a href="https://postgresml.org/blog/scaling-postgresml-to-one-million-requests-per-second">
|
||||||
<img src="./images/postgresml.webp" height="70" width="auto">
|
<img src="./images/postgresml.webp" height="70" width="auto">
|
||||||
</a>
|
</a>
|
||||||
</td>
|
</td>
|
||||||
@@ -57,7 +57,7 @@ PgCat is stable and used in production to serve hundreds of thousands of queries
|
|||||||
</a>
|
</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://postgresml.org/blog/scaling-postgresml-to-1-million-requests-per-second">
|
<a href="https://postgresml.org/blog/scaling-postgresml-to-one-million-requests-per-second">
|
||||||
PostgresML
|
PostgresML
|
||||||
</a>
|
</a>
|
||||||
</td>
|
</td>
|
||||||
@@ -268,8 +268,6 @@ psql -h 127.0.0.1 -p 6432 -d pgbouncer -c 'SHOW DATABASES'
|
|||||||
|
|
||||||
Additionally, Prometheus statistics are available at `/metrics` via HTTP.
|
Additionally, Prometheus statistics are available at `/metrics` via HTTP.
|
||||||
|
|
||||||
We also have a [basic Grafana dashboard](https://github.com/postgresml/pgcat/blob/main/grafana_dashboard.json) based on Prometheus metrics that you can import into Grafana and build on it or use it for monitoring.
|
|
||||||
|
|
||||||
### Live configuration reloading
|
### Live configuration reloading
|
||||||
|
|
||||||
The config can be reloaded by sending a `kill -s SIGHUP` to the process or by querying `RELOAD` to the admin database. All settings except the `host` and `port` can be reloaded without restarting the pooler, including sharding and replicas configurations.
|
The config can be reloaded by sending a `kill -s SIGHUP` to the process or by querying `RELOAD` to the admin database. All settings except the `host` and `port` can be reloaded without restarting the pooler, including sharding and replicas configurations.
|
||||||
|
|||||||
@@ -1,23 +0,0 @@
|
|||||||
# Patterns to ignore when building packages.
|
|
||||||
# This supports shell glob matching, relative path matching, and
|
|
||||||
# negation (prefixed with !). Only one pattern per line.
|
|
||||||
.DS_Store
|
|
||||||
# Common VCS dirs
|
|
||||||
.git/
|
|
||||||
.gitignore
|
|
||||||
.bzr/
|
|
||||||
.bzrignore
|
|
||||||
.hg/
|
|
||||||
.hgignore
|
|
||||||
.svn/
|
|
||||||
# Common backup files
|
|
||||||
*.swp
|
|
||||||
*.bak
|
|
||||||
*.tmp
|
|
||||||
*.orig
|
|
||||||
*~
|
|
||||||
# Various IDEs
|
|
||||||
.project
|
|
||||||
.idea/
|
|
||||||
*.tmproj
|
|
||||||
.vscode/
|
|
||||||
@@ -1,8 +0,0 @@
|
|||||||
apiVersion: v2
|
|
||||||
name: pgcat
|
|
||||||
description: A Helm chart for PgCat a PostgreSQL pooler and proxy (like PgBouncer) with support for sharding, load balancing, failover and mirroring.
|
|
||||||
maintainers:
|
|
||||||
- name: Wildcard
|
|
||||||
email: support@w6d.io
|
|
||||||
appVersion: "1.2.0"
|
|
||||||
version: 0.2.1
|
|
||||||
@@ -1,22 +0,0 @@
|
|||||||
1. Get the application URL by running these commands:
|
|
||||||
{{- if .Values.ingress.enabled }}
|
|
||||||
{{- range $host := .Values.ingress.hosts }}
|
|
||||||
{{- range .paths }}
|
|
||||||
http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- else if contains "NodePort" .Values.service.type }}
|
|
||||||
export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ include "pgcat.fullname" . }})
|
|
||||||
export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}")
|
|
||||||
echo http://$NODE_IP:$NODE_PORT
|
|
||||||
{{- else if contains "LoadBalancer" .Values.service.type }}
|
|
||||||
NOTE: It may take a few minutes for the LoadBalancer IP to be available.
|
|
||||||
You can watch the status of by running 'kubectl get --namespace {{ .Release.Namespace }} svc -w {{ include "pgcat.fullname" . }}'
|
|
||||||
export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "pgcat.fullname" . }} --template "{{"{{ range (index .status.loadBalancer.ingress 0) }}{{.}}{{ end }}"}}")
|
|
||||||
echo http://$SERVICE_IP:{{ .Values.service.port }}
|
|
||||||
{{- else if contains "ClusterIP" .Values.service.type }}
|
|
||||||
export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app.kubernetes.io/name={{ include "pgcat.name" . }},app.kubernetes.io/instance={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}")
|
|
||||||
export CONTAINER_PORT=$(kubectl get pod --namespace {{ .Release.Namespace }} $POD_NAME -o jsonpath="{.spec.containers[0].ports[0].containerPort}")
|
|
||||||
echo "Visit http://127.0.0.1:8080 to use your application"
|
|
||||||
kubectl --namespace {{ .Release.Namespace }} port-forward $POD_NAME 8080:$CONTAINER_PORT
|
|
||||||
{{- end }}
|
|
||||||
@@ -1,3 +0,0 @@
|
|||||||
{{/*
|
|
||||||
Configuration template definition
|
|
||||||
*/}}
|
|
||||||
@@ -1,62 +0,0 @@
|
|||||||
{{/*
|
|
||||||
Expand the name of the chart.
|
|
||||||
*/}}
|
|
||||||
{{- define "pgcat.name" -}}
|
|
||||||
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
Create a default fully qualified app name.
|
|
||||||
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
|
||||||
If release name contains chart name it will be used as a full name.
|
|
||||||
*/}}
|
|
||||||
{{- define "pgcat.fullname" -}}
|
|
||||||
{{- if .Values.fullnameOverride }}
|
|
||||||
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }}
|
|
||||||
{{- else }}
|
|
||||||
{{- $name := default .Chart.Name .Values.nameOverride }}
|
|
||||||
{{- if contains $name .Release.Name }}
|
|
||||||
{{- .Release.Name | trunc 63 | trimSuffix "-" }}
|
|
||||||
{{- else }}
|
|
||||||
{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
Create chart name and version as used by the chart label.
|
|
||||||
*/}}
|
|
||||||
{{- define "pgcat.chart" -}}
|
|
||||||
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
Common labels
|
|
||||||
*/}}
|
|
||||||
{{- define "pgcat.labels" -}}
|
|
||||||
helm.sh/chart: {{ include "pgcat.chart" . }}
|
|
||||||
{{ include "pgcat.selectorLabels" . }}
|
|
||||||
{{- if .Chart.AppVersion }}
|
|
||||||
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
|
|
||||||
{{- end }}
|
|
||||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
Selector labels
|
|
||||||
*/}}
|
|
||||||
{{- define "pgcat.selectorLabels" -}}
|
|
||||||
app.kubernetes.io/name: {{ include "pgcat.name" . }}
|
|
||||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
Create the name of the service account to use
|
|
||||||
*/}}
|
|
||||||
{{- define "pgcat.serviceAccountName" -}}
|
|
||||||
{{- if .Values.serviceAccount.create }}
|
|
||||||
{{- default (include "pgcat.fullname" .) .Values.serviceAccount.name }}
|
|
||||||
{{- else }}
|
|
||||||
{{- default "default" .Values.serviceAccount.name }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
@@ -1,66 +0,0 @@
|
|||||||
apiVersion: apps/v1
|
|
||||||
kind: Deployment
|
|
||||||
metadata:
|
|
||||||
name: {{ include "pgcat.fullname" . }}
|
|
||||||
labels:
|
|
||||||
{{- include "pgcat.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
replicas: {{ .Values.replicaCount }}
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
{{- include "pgcat.selectorLabels" . | nindent 6 }}
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
annotations:
|
|
||||||
checksum/secret: {{ include (print $.Template.BasePath "/secret.yaml") . | sha256sum }}
|
|
||||||
{{- with .Values.podAnnotations }}
|
|
||||||
{{- toYaml . | nindent 8 }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "pgcat.selectorLabels" . | nindent 8 }}
|
|
||||||
spec:
|
|
||||||
{{- with .Values.image.pullSecrets }}
|
|
||||||
imagePullSecrets:
|
|
||||||
{{- toYaml . | nindent 8 }}
|
|
||||||
{{- end }}
|
|
||||||
serviceAccountName: {{ include "pgcat.serviceAccountName" . }}
|
|
||||||
securityContext:
|
|
||||||
{{- toYaml .Values.podSecurityContext | nindent 8 }}
|
|
||||||
containers:
|
|
||||||
- name: {{ .Chart.Name }}
|
|
||||||
securityContext:
|
|
||||||
{{- toYaml .Values.containerSecurityContext | nindent 12 }}
|
|
||||||
image: "{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}"
|
|
||||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
|
||||||
ports:
|
|
||||||
- name: pgcat
|
|
||||||
containerPort: {{ .Values.configuration.general.port }}
|
|
||||||
protocol: TCP
|
|
||||||
livenessProbe:
|
|
||||||
tcpSocket:
|
|
||||||
port: pgcat
|
|
||||||
readinessProbe:
|
|
||||||
tcpSocket:
|
|
||||||
port: pgcat
|
|
||||||
resources:
|
|
||||||
{{- toYaml .Values.resources | nindent 12 }}
|
|
||||||
volumeMounts:
|
|
||||||
- mountPath: /etc/pgcat
|
|
||||||
name: config
|
|
||||||
{{- with .Values.nodeSelector }}
|
|
||||||
nodeSelector:
|
|
||||||
{{- toYaml . | nindent 8 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with .Values.affinity }}
|
|
||||||
affinity:
|
|
||||||
{{- toYaml . | nindent 8 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with .Values.tolerations }}
|
|
||||||
tolerations:
|
|
||||||
{{- toYaml . | nindent 8 }}
|
|
||||||
{{- end }}
|
|
||||||
volumes:
|
|
||||||
- secret:
|
|
||||||
defaultMode: 420
|
|
||||||
secretName: {{ include "pgcat.fullname" . }}
|
|
||||||
name: config
|
|
||||||
@@ -1,61 +0,0 @@
|
|||||||
{{- if .Values.ingress.enabled -}}
|
|
||||||
{{- $fullName := include "pgcat.fullname" . -}}
|
|
||||||
{{- $svcPort := .Values.service.port -}}
|
|
||||||
{{- if and .Values.ingress.className (not (semverCompare ">=1.18-0" .Capabilities.KubeVersion.GitVersion)) }}
|
|
||||||
{{- if not (hasKey .Values.ingress.annotations "kubernetes.io/ingress.class") }}
|
|
||||||
{{- $_ := set .Values.ingress.annotations "kubernetes.io/ingress.class" .Values.ingress.className}}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if semverCompare ">=1.19-0" .Capabilities.KubeVersion.GitVersion -}}
|
|
||||||
apiVersion: networking.k8s.io/v1
|
|
||||||
{{- else if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}}
|
|
||||||
apiVersion: networking.k8s.io/v1beta1
|
|
||||||
{{- else -}}
|
|
||||||
apiVersion: extensions/v1beta1
|
|
||||||
{{- end }}
|
|
||||||
kind: Ingress
|
|
||||||
metadata:
|
|
||||||
name: {{ $fullName }}
|
|
||||||
labels:
|
|
||||||
{{- include "pgcat.labels" . | nindent 4 }}
|
|
||||||
{{- with .Values.ingress.annotations }}
|
|
||||||
annotations:
|
|
||||||
{{- toYaml . | nindent 4 }}
|
|
||||||
{{- end }}
|
|
||||||
spec:
|
|
||||||
{{- if and .Values.ingress.className (semverCompare ">=1.18-0" .Capabilities.KubeVersion.GitVersion) }}
|
|
||||||
ingressClassName: {{ .Values.ingress.className }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.ingress.tls }}
|
|
||||||
tls:
|
|
||||||
{{- range .Values.ingress.tls }}
|
|
||||||
- hosts:
|
|
||||||
{{- range .hosts }}
|
|
||||||
- {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
secretName: {{ .secretName }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
rules:
|
|
||||||
{{- range .Values.ingress.hosts }}
|
|
||||||
- host: {{ .host | quote }}
|
|
||||||
http:
|
|
||||||
paths:
|
|
||||||
{{- range .paths }}
|
|
||||||
- path: {{ .path }}
|
|
||||||
{{- if and .pathType (semverCompare ">=1.18-0" $.Capabilities.KubeVersion.GitVersion) }}
|
|
||||||
pathType: {{ .pathType }}
|
|
||||||
{{- end }}
|
|
||||||
backend:
|
|
||||||
{{- if semverCompare ">=1.19-0" $.Capabilities.KubeVersion.GitVersion }}
|
|
||||||
service:
|
|
||||||
name: {{ $fullName }}
|
|
||||||
port:
|
|
||||||
number: {{ $svcPort }}
|
|
||||||
{{- else }}
|
|
||||||
serviceName: {{ $fullName }}
|
|
||||||
servicePort: {{ $svcPort }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
@@ -1,97 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: Secret
|
|
||||||
metadata:
|
|
||||||
name: {{ include "pgcat.fullname" . }}
|
|
||||||
labels:
|
|
||||||
{{- include "pgcat.labels" . | nindent 4 }}
|
|
||||||
type: Opaque
|
|
||||||
stringData:
|
|
||||||
pgcat.toml: |
|
|
||||||
[general]
|
|
||||||
host = {{ .Values.configuration.general.host | quote }}
|
|
||||||
port = {{ .Values.configuration.general.port }}
|
|
||||||
enable_prometheus_exporter = {{ .Values.configuration.general.enable_prometheus_exporter }}
|
|
||||||
prometheus_exporter_port = {{ .Values.configuration.general.prometheus_exporter_port }}
|
|
||||||
connect_timeout = {{ .Values.configuration.general.connect_timeout }}
|
|
||||||
idle_timeout = {{ .Values.configuration.general.idle_timeout | int }}
|
|
||||||
server_lifetime = {{ .Values.configuration.general.server_lifetime | int }}
|
|
||||||
server_tls = {{ .Values.configuration.general.server_tls }}
|
|
||||||
idle_client_in_transaction_timeout = {{ .Values.configuration.general.idle_client_in_transaction_timeout | int }}
|
|
||||||
healthcheck_timeout = {{ .Values.configuration.general.healthcheck_timeout }}
|
|
||||||
healthcheck_delay = {{ .Values.configuration.general.healthcheck_delay }}
|
|
||||||
shutdown_timeout = {{ .Values.configuration.general.shutdown_timeout }}
|
|
||||||
ban_time = {{ .Values.configuration.general.ban_time }}
|
|
||||||
log_client_connections = {{ .Values.configuration.general.log_client_connections }}
|
|
||||||
log_client_disconnections = {{ .Values.configuration.general.log_client_disconnections }}
|
|
||||||
tcp_keepalives_idle = {{ .Values.configuration.general.tcp_keepalives_idle }}
|
|
||||||
tcp_keepalives_count = {{ .Values.configuration.general.tcp_keepalives_count }}
|
|
||||||
tcp_keepalives_interval = {{ .Values.configuration.general.tcp_keepalives_interval }}
|
|
||||||
{{- if and (ne .Values.configuration.general.tls_certificate "-") (ne .Values.configuration.general.tls_private_key "-") }}
|
|
||||||
tls_certificate = "{{ .Values.configuration.general.tls_certificate }}"
|
|
||||||
tls_private_key = "{{ .Values.configuration.general.tls_private_key }}"
|
|
||||||
{{- end }}
|
|
||||||
admin_username = {{ .Values.configuration.general.admin_username | quote }}
|
|
||||||
admin_password = {{ .Values.configuration.general.admin_password | quote }}
|
|
||||||
{{- if and .Values.configuration.general.auth_query_user .Values.configuration.general.auth_query_password .Values.configuration.general.auth_query }}
|
|
||||||
auth_query = {{ .Values.configuration.general.auth_query | quote }}
|
|
||||||
auth_query_user = {{ .Values.configuration.general.auth_query_user | quote }}
|
|
||||||
auth_query_password = {{ .Values.configuration.general.auth_query_password | quote }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- range $pool := .Values.configuration.pools }}
|
|
||||||
|
|
||||||
##
|
|
||||||
## pool for {{ $pool.name }}
|
|
||||||
##
|
|
||||||
[pools.{{ $pool.name | quote }}]
|
|
||||||
pool_mode = {{ default "transaction" $pool.pool_mode | quote }}
|
|
||||||
load_balancing_mode = {{ default "random" $pool.load_balancing_mode | quote }}
|
|
||||||
default_role = {{ default "any" $pool.default_role | quote }}
|
|
||||||
prepared_statements_cache_size = {{ default 500 $pool.prepared_statements_cache_size }}
|
|
||||||
query_parser_enabled = {{ default true $pool.query_parser_enabled }}
|
|
||||||
query_parser_read_write_splitting = {{ default true $pool.query_parser_read_write_splitting }}
|
|
||||||
primary_reads_enabled = {{ default true $pool.primary_reads_enabled }}
|
|
||||||
sharding_function = {{ default "pg_bigint_hash" $pool.sharding_function | quote }}
|
|
||||||
|
|
||||||
{{- range $index, $user := $pool.users }}
|
|
||||||
|
|
||||||
## pool {{ $pool.name }} user {{ $user.username | quote }}
|
|
||||||
##
|
|
||||||
[pools.{{ $pool.name | quote }}.users.{{ $index }}]
|
|
||||||
username = {{ $user.username | quote }}
|
|
||||||
{{- if $user.password }}
|
|
||||||
password = {{ $user.password | quote }}
|
|
||||||
{{- else if and $user.passwordSecret.name $user.passwordSecret.key }}
|
|
||||||
{{- $secret := (lookup "v1" "Secret" $.Release.Namespace $user.passwordSecret.name) }}
|
|
||||||
{{- if $secret }}
|
|
||||||
{{- $password := index $secret.data $user.passwordSecret.key | b64dec }}
|
|
||||||
password = {{ $password | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
pool_size = {{ $user.pool_size }}
|
|
||||||
statement_timeout = {{ default 0 $user.statement_timeout }}
|
|
||||||
min_pool_size = {{ default 3 $user.min_pool_size }}
|
|
||||||
{{- if $user.server_lifetime }}
|
|
||||||
server_lifetime = {{ $user.server_lifetime }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if and $user.server_username $user.server_password }}
|
|
||||||
server_username = {{ $user.server_username | quote }}
|
|
||||||
server_password = {{ $user.server_password | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- range $index, $shard := $pool.shards }}
|
|
||||||
|
|
||||||
## pool {{ $pool.name }} database {{ $shard.database }}
|
|
||||||
##
|
|
||||||
[pools.{{ $pool.name | quote }}.shards.{{ $index }}]
|
|
||||||
{{- if gt (len $shard.servers) 0}}
|
|
||||||
servers = [
|
|
||||||
{{- range $server := $shard.servers }}
|
|
||||||
[ {{ $server.host | quote }}, {{ $server.port }}, {{ $server.role | quote }} ],
|
|
||||||
{{- end }}
|
|
||||||
]
|
|
||||||
{{- end }}
|
|
||||||
database = {{ $shard.database | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
@@ -1,15 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
name: {{ include "pgcat.fullname" . }}
|
|
||||||
labels:
|
|
||||||
{{- include "pgcat.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
type: {{ .Values.service.type }}
|
|
||||||
ports:
|
|
||||||
- port: {{ .Values.service.port }}
|
|
||||||
targetPort: pgcat
|
|
||||||
protocol: TCP
|
|
||||||
name: pgcat
|
|
||||||
selector:
|
|
||||||
{{- include "pgcat.selectorLabels" . | nindent 4 }}
|
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
{{- if .Values.serviceAccount.create -}}
|
|
||||||
apiVersion: v1
|
|
||||||
kind: ServiceAccount
|
|
||||||
metadata:
|
|
||||||
name: {{ include "pgcat.serviceAccountName" . }}
|
|
||||||
labels:
|
|
||||||
{{- include "pgcat.labels" . | nindent 4 }}
|
|
||||||
{{- with .Values.serviceAccount.annotations }}
|
|
||||||
annotations:
|
|
||||||
{{- toYaml . | nindent 4 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
@@ -1,374 +0,0 @@
|
|||||||
## String to partially override aspnet-core.fullname template (will maintain the release name)
|
|
||||||
## @param nameOverride String to partially override common.names.fullname
|
|
||||||
##
|
|
||||||
nameOverride: ""
|
|
||||||
|
|
||||||
## String to fully override aspnet-core.fullname template
|
|
||||||
## @param fullnameOverride String to fully override common.names.fullname
|
|
||||||
##
|
|
||||||
fullnameOverride: ""
|
|
||||||
|
|
||||||
## Number of PgCat replicas to deploy
|
|
||||||
## @param replicaCount Number of PgCat replicas to deploy
|
|
||||||
replicaCount: 1
|
|
||||||
|
|
||||||
## Bitnami PgCat image version
|
|
||||||
## ref: https://hub.docker.com/r/bitnami/kubewatch/tags/
|
|
||||||
##
|
|
||||||
## @param image.registry PgCat image registry
|
|
||||||
## @param image.repository PgCat image name
|
|
||||||
## @param image.tag PgCat image tag
|
|
||||||
## @param image.pullPolicy PgCat image tag
|
|
||||||
## @param image.pullSecrets Specify docker-registry secret names as an array
|
|
||||||
image:
|
|
||||||
repository: ghcr.io/postgresml/pgcat
|
|
||||||
# Overrides the image tag whose default is the chart appVersion.
|
|
||||||
tag: "main"
|
|
||||||
## Specify a imagePullPolicy
|
|
||||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
|
||||||
## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
|
|
||||||
##
|
|
||||||
pullPolicy: IfNotPresent
|
|
||||||
## Optionally specify an array of imagePullSecrets.
|
|
||||||
## Secrets must be manually created in the namespace.
|
|
||||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
|
||||||
## Example:
|
|
||||||
## pullSecrets:
|
|
||||||
## - myRegistryKeySecretName
|
|
||||||
##
|
|
||||||
pullSecrets: []
|
|
||||||
|
|
||||||
## Specifies whether a ServiceAccount should be created
|
|
||||||
##
|
|
||||||
## @param serviceAccount.create Enable the creation of a ServiceAccount for PgCat pods
|
|
||||||
## @param serviceAccount.name Name of the created ServiceAccount
|
|
||||||
##
|
|
||||||
serviceAccount:
|
|
||||||
## Specifies whether a service account should be created
|
|
||||||
create: true
|
|
||||||
## Annotations to add to the service account
|
|
||||||
annotations: {}
|
|
||||||
## The name of the service account to use.
|
|
||||||
## If not set and create is true, a name is generated using the fullname template
|
|
||||||
name: ""
|
|
||||||
|
|
||||||
## Annotations for server pods.
|
|
||||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
|
||||||
##
|
|
||||||
## @param podAnnotations Annotations for PgCat pods
|
|
||||||
##
|
|
||||||
podAnnotations: {}
|
|
||||||
|
|
||||||
## PgCat containers' SecurityContext
|
|
||||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod
|
|
||||||
##
|
|
||||||
## @param podSecurityContext.enabled Enabled PgCat pods' Security Context
|
|
||||||
## @param podSecurityContext.fsGroup Set PgCat pod's Security Context fsGroup
|
|
||||||
##
|
|
||||||
podSecurityContext: {}
|
|
||||||
# fsGroup: 2000
|
|
||||||
|
|
||||||
## PgCat pods' Security Context
|
|
||||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
|
|
||||||
##
|
|
||||||
## @param containerSecurityContext.enabled Enabled PgCat containers' Security Context
|
|
||||||
## @param containerSecurityContext.runAsUser Set PgCat container's Security Context runAsUser
|
|
||||||
## @param containerSecurityContext.runAsNonRoot Set PgCat container's Security Context runAsNonRoot
|
|
||||||
##
|
|
||||||
containerSecurityContext: {}
|
|
||||||
# capabilities:
|
|
||||||
# drop:
|
|
||||||
# - ALL
|
|
||||||
# readOnlyRootFilesystem: true
|
|
||||||
# runAsNonRoot: true
|
|
||||||
# runAsUser: 1000
|
|
||||||
|
|
||||||
## PgCat service
|
|
||||||
##
|
|
||||||
## @param service.type PgCat service type
|
|
||||||
## @param service.port PgCat service port
|
|
||||||
service:
|
|
||||||
type: ClusterIP
|
|
||||||
port: 6432
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
enabled: false
|
|
||||||
className: ""
|
|
||||||
annotations: {}
|
|
||||||
# kubernetes.io/ingress.class: nginx
|
|
||||||
# kubernetes.io/tls-acme: "true"
|
|
||||||
hosts:
|
|
||||||
- host: chart-example.local
|
|
||||||
paths:
|
|
||||||
- path: /
|
|
||||||
pathType: ImplementationSpecific
|
|
||||||
tls: []
|
|
||||||
# - secretName: chart-example-tls
|
|
||||||
# hosts:
|
|
||||||
# - chart-example.local
|
|
||||||
|
|
||||||
## PgCat resource requests and limits
|
|
||||||
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
|
||||||
##
|
|
||||||
## @skip resources Optional description
|
|
||||||
## @disabled-param resources.limits The resources limits for the PgCat container
|
|
||||||
## @disabled-param resources.requests The requested resources for the PgCat container
|
|
||||||
##
|
|
||||||
resources:
|
|
||||||
# We usually recommend not to specify default resources and to leave this as a conscious
|
|
||||||
# choice for the user. This also increases chances charts run on environments with little
|
|
||||||
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
|
||||||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
|
||||||
limits: {}
|
|
||||||
# cpu: 100m
|
|
||||||
# memory: 128Mi
|
|
||||||
requests: {}
|
|
||||||
# cpu: 100m
|
|
||||||
# memory: 128Mi
|
|
||||||
|
|
||||||
## Node labels for pod assignment. Evaluated as a template.
|
|
||||||
## ref: https://kubernetes.io/docs/user-guide/node-selection/
|
|
||||||
##
|
|
||||||
## @param nodeSelector Node labels for pod assignment
|
|
||||||
##
|
|
||||||
nodeSelector: {}
|
|
||||||
|
|
||||||
## Tolerations for pod assignment. Evaluated as a template.
|
|
||||||
## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
|
||||||
##
|
|
||||||
## @param tolerations Tolerations for pod assignment
|
|
||||||
##
|
|
||||||
tolerations: []
|
|
||||||
|
|
||||||
## Affinity for pod assignment. Evaluated as a template.
|
|
||||||
## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
|
||||||
## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set
|
|
||||||
##
|
|
||||||
## @param affinity Affinity for pod assignment
|
|
||||||
##
|
|
||||||
affinity: {}
|
|
||||||
|
|
||||||
## PgCat configuration
|
|
||||||
## @param configuration [object]
|
|
||||||
configuration:
|
|
||||||
## General pooler settings
|
|
||||||
## @param [object]
|
|
||||||
general:
|
|
||||||
## @param configuration.general.host What IP to run on, 0.0.0.0 means accessible from everywhere.
|
|
||||||
host: "0.0.0.0"
|
|
||||||
|
|
||||||
## @param configuration.general.port Port to run on, same as PgBouncer used in this example.
|
|
||||||
port: 6432
|
|
||||||
|
|
||||||
## @param configuration.general.enable_prometheus_exporter Whether to enable prometheus exporter or not.
|
|
||||||
enable_prometheus_exporter: false
|
|
||||||
|
|
||||||
## @param configuration.general.prometheus_exporter_port Port at which prometheus exporter listens on.
|
|
||||||
prometheus_exporter_port: 9930
|
|
||||||
|
|
||||||
# @param configuration.general.connect_timeout How long to wait before aborting a server connection (ms).
|
|
||||||
connect_timeout: 5000
|
|
||||||
|
|
||||||
# How long an idle connection with a server is left open (ms).
|
|
||||||
idle_timeout: 30000 # milliseconds
|
|
||||||
|
|
||||||
# Max connection lifetime before it's closed, even if actively used.
|
|
||||||
server_lifetime: 86400000 # 24 hours
|
|
||||||
|
|
||||||
# Whether to use TLS for server connections or not.
|
|
||||||
server_tls: false
|
|
||||||
|
|
||||||
# How long a client is allowed to be idle while in a transaction (ms).
|
|
||||||
idle_client_in_transaction_timeout: 0 # milliseconds
|
|
||||||
|
|
||||||
# @param configuration.general.healthcheck_timeout How much time to give `SELECT 1` health check query to return with a result (ms).
|
|
||||||
healthcheck_timeout: 1000
|
|
||||||
|
|
||||||
# @param configuration.general.healthcheck_delay How long to keep connection available for immediate re-use, without running a healthcheck query on it
|
|
||||||
healthcheck_delay: 30000
|
|
||||||
|
|
||||||
# @param configuration.general.shutdown_timeout How much time to give clients during shutdown before forcibly killing client connections (ms).
|
|
||||||
shutdown_timeout: 60000
|
|
||||||
|
|
||||||
# @param configuration.general.ban_time For how long to ban a server if it fails a health check (seconds).
|
|
||||||
ban_time: 60 # seconds
|
|
||||||
|
|
||||||
# @param configuration.general.log_client_connections If we should log client connections
|
|
||||||
log_client_connections: false
|
|
||||||
|
|
||||||
# @param configuration.general.log_client_disconnections If we should log client disconnections
|
|
||||||
log_client_disconnections: false
|
|
||||||
|
|
||||||
# TLS
|
|
||||||
# tls_certificate: "server.cert"
|
|
||||||
# tls_private_key: "server.key"
|
|
||||||
tls_certificate: "-"
|
|
||||||
tls_private_key: "-"
|
|
||||||
|
|
||||||
# Credentials to access the virtual administrative database (pgbouncer or pgcat)
|
|
||||||
# Connecting to that database allows running commands like `SHOW POOLS`, `SHOW DATABASES`, etc..
|
|
||||||
admin_username: "postgres"
|
|
||||||
admin_password: "postgres"
|
|
||||||
|
|
||||||
# Query to be sent to servers to obtain the hash used for md5 authentication. The connection will be
|
|
||||||
# established using the database configured in the pool. This parameter is inherited by every pool and
|
|
||||||
# can be redefined in pool configuration.
|
|
||||||
auth_query: null
|
|
||||||
|
|
||||||
# User to be used for connecting to servers to obtain the hash used for md5 authentication by sending
|
|
||||||
# the query specified in auth_query_user. The connection will be established using the database configured
|
|
||||||
# in the pool. This parameter is inherited by every pool and can be redefined in pool configuration.
|
|
||||||
#
|
|
||||||
# @param configuration.general.auth_query_user
|
|
||||||
auth_query_user: null
|
|
||||||
|
|
||||||
# Password to be used for connecting to servers to obtain the hash used for md5 authentication by sending
|
|
||||||
# the query specified in auth_query_user. The connection will be established using the database configured
|
|
||||||
# in the pool. This parameter is inherited by every pool and can be redefined in pool configuration.
|
|
||||||
#
|
|
||||||
# @param configuration.general.auth_query_password
|
|
||||||
auth_query_password: null
|
|
||||||
|
|
||||||
# Number of seconds of connection idleness to wait before sending a keepalive packet to the server.
|
|
||||||
tcp_keepalives_idle: 5
|
|
||||||
|
|
||||||
# Number of unacknowledged keepalive packets allowed before giving up and closing the connection.
|
|
||||||
tcp_keepalives_count: 5
|
|
||||||
|
|
||||||
# Number of seconds between keepalive packets.
|
|
||||||
tcp_keepalives_interval: 5
|
|
||||||
|
|
||||||
## pool
|
|
||||||
## configs are structured as pool.<pool_name>
|
|
||||||
## the pool_name is what clients use as database name when connecting
|
|
||||||
## For the example below a client can connect using "postgres://sharding_user:sharding_user@pgcat_host:pgcat_port/sharded"
|
|
||||||
## @param [object]
|
|
||||||
pools:
|
|
||||||
[{
|
|
||||||
name: "simple", pool_mode: "transaction",
|
|
||||||
users: [{username: "user", password: "pass", pool_size: 5, statement_timeout: 0}],
|
|
||||||
shards: [{
|
|
||||||
servers: [{host: "postgres", port: 5432, role: "primary"}],
|
|
||||||
database: "postgres"
|
|
||||||
}]
|
|
||||||
}]
|
|
||||||
# - ## default values
|
|
||||||
# ##
|
|
||||||
# ##
|
|
||||||
# ##
|
|
||||||
# name: "db"
|
|
||||||
|
|
||||||
# ## Pool mode (see PgBouncer docs for more).
|
|
||||||
# ## session: one server connection per connected client
|
|
||||||
# ## transaction: one server connection per client transaction
|
|
||||||
# ## @param configuration.poolsPostgres.pool_mode
|
|
||||||
# pool_mode: "transaction"
|
|
||||||
|
|
||||||
# ## Load balancing mode
|
|
||||||
# ## `random` selects the server at random
|
|
||||||
# ## `loc` selects the server with the least outstanding busy connections
|
|
||||||
# ##
|
|
||||||
# ## @param configuration.poolsPostgres.load_balancing_mode
|
|
||||||
# load_balancing_mode: "random"
|
|
||||||
|
|
||||||
# ## Prepared statements cache size.
|
|
||||||
# ## TODO: update documentation
|
|
||||||
# ##
|
|
||||||
# ## @param configuration.poolsPostgres.prepared_statements_cache_size
|
|
||||||
# prepared_statements_cache_size: 500
|
|
||||||
|
|
||||||
# ## If the client doesn't specify, route traffic to
|
|
||||||
# ## this role by default.
|
|
||||||
# ##
|
|
||||||
# ## any: round-robin between primary and replicas,
|
|
||||||
# ## replica: round-robin between replicas only without touching the primary,
|
|
||||||
# ## primary: all queries go to the primary unless otherwise specified.
|
|
||||||
# ## @param configuration.poolsPostgres.default_role
|
|
||||||
# default_role: "any"
|
|
||||||
|
|
||||||
# ## Query parser. If enabled, we'll attempt to parse
|
|
||||||
# ## every incoming query to determine if it's a read or a write.
|
|
||||||
# ## If it's a read query, we'll direct it to a replica. Otherwise, if it's a write,
|
|
||||||
# ## we'll direct it to the primary.
|
|
||||||
# ## @param configuration.poolsPostgres.query_parser_enabled
|
|
||||||
# query_parser_enabled: true
|
|
||||||
|
|
||||||
# ## If the query parser is enabled and this setting is enabled, we'll attempt to
|
|
||||||
# ## infer the role from the query itself.
|
|
||||||
# ## @param configuration.poolsPostgres.query_parser_read_write_splitting
|
|
||||||
# query_parser_read_write_splitting: true
|
|
||||||
|
|
||||||
# ## If the query parser is enabled and this setting is enabled, the primary will be part of the pool of databases used for
|
|
||||||
# ## load balancing of read queries. Otherwise, the primary will only be used for write
|
|
||||||
# ## queries. The primary can always be explicitly selected with our custom protocol.
|
|
||||||
# ## @param configuration.poolsPostgres.primary_reads_enabled
|
|
||||||
# primary_reads_enabled: true
|
|
||||||
|
|
||||||
# ## So what if you wanted to implement a different hashing function,
|
|
||||||
# ## or you've already built one and you want this pooler to use it?
|
|
||||||
# ##
|
|
||||||
# ## Current options:
|
|
||||||
# ##
|
|
||||||
# ## pg_bigint_hash: PARTITION BY HASH (Postgres hashing function)
|
|
||||||
# ## sha1: A hashing function based on SHA1
|
|
||||||
# ##
|
|
||||||
# ## @param configuration.poolsPostgres.sharding_function
|
|
||||||
# sharding_function: "pg_bigint_hash"
|
|
||||||
|
|
||||||
# ## Credentials for users that may connect to this cluster
|
|
||||||
# ## @param users [array]
|
|
||||||
# ## @param users[0].username Name of the env var (required)
|
|
||||||
# ## @param users[0].password Value for the env var (required) leave empty to use existing secret see passwordSecret.name and passwordSecret.key
|
|
||||||
# ## @param users[0].passwordSecret.name Name of the secret containing the password
|
|
||||||
# ## @param users[0].passwordSecret.key Key in the secret containing the password
|
|
||||||
# ## @param users[0].pool_size Maximum number of server connections that can be established for this user
|
|
||||||
# ## @param users[0].statement_timeout Maximum query duration. Dangerous, but protects against DBs that died in a non-obvious way.
|
|
||||||
# users: []
|
|
||||||
# # - username: "user"
|
|
||||||
# # password: "pass"
|
|
||||||
# #
|
|
||||||
# # # The maximum number of connection from a single Pgcat process to any database in the cluster
|
|
||||||
# # # is the sum of pool_size across all users.
|
|
||||||
# # pool_size: 9
|
|
||||||
# #
|
|
||||||
# # # Maximum query duration. Dangerous, but protects against DBs that died in a non-obvious way.
|
|
||||||
# # statement_timeout: 0
|
|
||||||
# #
|
|
||||||
# # # PostgreSQL username used to connect to the server.
|
|
||||||
# # server_username: "postgres
|
|
||||||
# #
|
|
||||||
# # # PostgreSQL password used to connect to the server.
|
|
||||||
# # server_password: "postgres
|
|
||||||
|
|
||||||
# ## @param shards [array]
|
|
||||||
# ## @param shards[0].server[0].host Host for this shard
|
|
||||||
# ## @param shards[0].server[0].port Port for this shard
|
|
||||||
# ## @param shards[0].server[0].role Role for this shard
|
|
||||||
# shards: []
|
|
||||||
# # [ host, port, role ]
|
|
||||||
# # - servers:
|
|
||||||
# # - host: "postgres"
|
|
||||||
# # port: 5432
|
|
||||||
# # role: "primary"
|
|
||||||
# # - host: "postgres"
|
|
||||||
# # port: 5432
|
|
||||||
# # role: "replica"
|
|
||||||
# # database: "postgres"
|
|
||||||
# # # [ host, port, role ]
|
|
||||||
# # - servers:
|
|
||||||
# # - host: "postgres"
|
|
||||||
# # port: 5432
|
|
||||||
# # role: "primary"
|
|
||||||
# # - host: "postgres"
|
|
||||||
# # port: 5432
|
|
||||||
# # role: "replica"
|
|
||||||
# # database: "postgres"
|
|
||||||
# # # [ host, port, role ]
|
|
||||||
# # - servers:
|
|
||||||
# # - host: "postgres"
|
|
||||||
# # port: 5432
|
|
||||||
# # role: "primary"
|
|
||||||
# # - host: "postgres"
|
|
||||||
# # port: 5432
|
|
||||||
# # role: "replica"
|
|
||||||
# # database: "postgres"
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
FROM rust:bullseye
|
FROM rust:1.70-bullseye
|
||||||
|
|
||||||
# Dependencies
|
# Dependencies
|
||||||
COPY --from=sclevine/yj /bin/yj /bin/yj
|
COPY --from=sclevine/yj /bin/yj /bin/yj
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
@@ -11,7 +11,6 @@ RestartSec=1
|
|||||||
Environment=RUST_LOG=info
|
Environment=RUST_LOG=info
|
||||||
LimitNOFILE=65536
|
LimitNOFILE=65536
|
||||||
ExecStart=/usr/bin/pgcat /etc/pgcat.toml
|
ExecStart=/usr/bin/pgcat /etc/pgcat.toml
|
||||||
ExecReload=/bin/kill -SIGHUP $MAINPID
|
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
|
|||||||
@@ -301,8 +301,6 @@ username = "other_user"
|
|||||||
password = "other_user"
|
password = "other_user"
|
||||||
pool_size = 21
|
pool_size = 21
|
||||||
statement_timeout = 15000
|
statement_timeout = 15000
|
||||||
connect_timeout = 1000
|
|
||||||
idle_timeout = 1000
|
|
||||||
|
|
||||||
# Shard configs are structured as pool.<pool_name>.shards.<shard_id>
|
# Shard configs are structured as pool.<pool_name>.shards.<shard_id>
|
||||||
# Each shard config contains a list of servers that make up the shard
|
# Each shard config contains a list of servers that make up the shard
|
||||||
|
|||||||
4
postinst
4
postinst
@@ -7,7 +7,3 @@ systemctl enable pgcat
|
|||||||
if ! id pgcat 2> /dev/null; then
|
if ! id pgcat 2> /dev/null; then
|
||||||
useradd -s /usr/bin/false pgcat
|
useradd -s /usr/bin/false pgcat
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ -f /etc/pgcat.toml ]; then
|
|
||||||
systemctl start pgcat
|
|
||||||
fi
|
|
||||||
|
|||||||
19
src/admin.rs
19
src/admin.rs
@@ -55,12 +55,7 @@ where
|
|||||||
|
|
||||||
let query_parts: Vec<&str> = query.trim_end_matches(';').split_whitespace().collect();
|
let query_parts: Vec<&str> = query.trim_end_matches(';').split_whitespace().collect();
|
||||||
|
|
||||||
match query_parts
|
match query_parts[0].to_ascii_uppercase().as_str() {
|
||||||
.first()
|
|
||||||
.unwrap_or(&"")
|
|
||||||
.to_ascii_uppercase()
|
|
||||||
.as_str()
|
|
||||||
{
|
|
||||||
"BAN" => {
|
"BAN" => {
|
||||||
trace!("BAN");
|
trace!("BAN");
|
||||||
ban(stream, query_parts).await
|
ban(stream, query_parts).await
|
||||||
@@ -89,12 +84,7 @@ where
|
|||||||
trace!("SHUTDOWN");
|
trace!("SHUTDOWN");
|
||||||
shutdown(stream).await
|
shutdown(stream).await
|
||||||
}
|
}
|
||||||
"SHOW" => match query_parts
|
"SHOW" => match query_parts[1].to_ascii_uppercase().as_str() {
|
||||||
.get(1)
|
|
||||||
.unwrap_or(&"")
|
|
||||||
.to_ascii_uppercase()
|
|
||||||
.as_str()
|
|
||||||
{
|
|
||||||
"HELP" => {
|
"HELP" => {
|
||||||
trace!("SHOW HELP");
|
trace!("SHOW HELP");
|
||||||
show_help(stream).await
|
show_help(stream).await
|
||||||
@@ -700,8 +690,6 @@ where
|
|||||||
("query_count", DataType::Numeric),
|
("query_count", DataType::Numeric),
|
||||||
("error_count", DataType::Numeric),
|
("error_count", DataType::Numeric),
|
||||||
("age_seconds", DataType::Numeric),
|
("age_seconds", DataType::Numeric),
|
||||||
("maxwait", DataType::Numeric),
|
|
||||||
("maxwait_us", DataType::Numeric),
|
|
||||||
];
|
];
|
||||||
|
|
||||||
let new_map = get_client_stats();
|
let new_map = get_client_stats();
|
||||||
@@ -709,7 +697,6 @@ where
|
|||||||
res.put(row_description(&columns));
|
res.put(row_description(&columns));
|
||||||
|
|
||||||
for (_, client) in new_map {
|
for (_, client) in new_map {
|
||||||
let max_wait = client.max_wait_time.load(Ordering::Relaxed);
|
|
||||||
let row = vec![
|
let row = vec![
|
||||||
format!("{:#010X}", client.client_id()),
|
format!("{:#010X}", client.client_id()),
|
||||||
client.pool_name(),
|
client.pool_name(),
|
||||||
@@ -723,8 +710,6 @@ where
|
|||||||
.duration_since(client.connect_time())
|
.duration_since(client.connect_time())
|
||||||
.as_secs()
|
.as_secs()
|
||||||
.to_string(),
|
.to_string(),
|
||||||
(max_wait / 1_000_000).to_string(),
|
|
||||||
(max_wait % 1_000_000).to_string(),
|
|
||||||
];
|
];
|
||||||
|
|
||||||
res.put(data_row(&row));
|
res.put(data_row(&row));
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
use crate::config::AuthType;
|
|
||||||
use crate::errors::Error;
|
use crate::errors::Error;
|
||||||
use crate::pool::ConnectionPool;
|
use crate::pool::ConnectionPool;
|
||||||
use crate::server::Server;
|
use crate::server::Server;
|
||||||
@@ -72,7 +71,6 @@ impl AuthPassthrough {
|
|||||||
pub async fn fetch_hash(&self, address: &crate::config::Address) -> Result<String, Error> {
|
pub async fn fetch_hash(&self, address: &crate::config::Address) -> Result<String, Error> {
|
||||||
let auth_user = crate::config::User {
|
let auth_user = crate::config::User {
|
||||||
username: self.user.clone(),
|
username: self.user.clone(),
|
||||||
auth_type: AuthType::MD5,
|
|
||||||
password: Some(self.password.clone()),
|
password: Some(self.password.clone()),
|
||||||
server_username: None,
|
server_username: None,
|
||||||
server_password: None,
|
server_password: None,
|
||||||
@@ -81,8 +79,6 @@ impl AuthPassthrough {
|
|||||||
pool_mode: None,
|
pool_mode: None,
|
||||||
server_lifetime: None,
|
server_lifetime: None,
|
||||||
min_pool_size: None,
|
min_pool_size: None,
|
||||||
connect_timeout: None,
|
|
||||||
idle_timeout: None,
|
|
||||||
};
|
};
|
||||||
|
|
||||||
let user = &address.username;
|
let user = &address.username;
|
||||||
|
|||||||
161
src/client.rs
161
src/client.rs
@@ -14,9 +14,7 @@ use tokio::sync::mpsc::Sender;
|
|||||||
|
|
||||||
use crate::admin::{generate_server_parameters_for_admin, handle_admin};
|
use crate::admin::{generate_server_parameters_for_admin, handle_admin};
|
||||||
use crate::auth_passthrough::refetch_auth_hash;
|
use crate::auth_passthrough::refetch_auth_hash;
|
||||||
use crate::config::{
|
use crate::config::{get_config, get_idle_client_in_transaction_timeout, Address, PoolMode};
|
||||||
get_config, get_idle_client_in_transaction_timeout, Address, AuthType, PoolMode,
|
|
||||||
};
|
|
||||||
use crate::constants::*;
|
use crate::constants::*;
|
||||||
use crate::messages::*;
|
use crate::messages::*;
|
||||||
use crate::plugins::PluginOutput;
|
use crate::plugins::PluginOutput;
|
||||||
@@ -465,8 +463,8 @@ where
|
|||||||
.count()
|
.count()
|
||||||
== 1;
|
== 1;
|
||||||
|
|
||||||
if !admin && admin_only {
|
|
||||||
// Kick any client that's not admin while we're in admin-only mode.
|
// Kick any client that's not admin while we're in admin-only mode.
|
||||||
|
if !admin && admin_only {
|
||||||
debug!(
|
debug!(
|
||||||
"Rejecting non-admin connection to {} when in admin only mode",
|
"Rejecting non-admin connection to {} when in admin only mode",
|
||||||
pool_name
|
pool_name
|
||||||
@@ -483,16 +481,8 @@ where
|
|||||||
let process_id: i32 = rand::random();
|
let process_id: i32 = rand::random();
|
||||||
let secret_key: i32 = rand::random();
|
let secret_key: i32 = rand::random();
|
||||||
|
|
||||||
let mut prepared_statements_enabled = false;
|
|
||||||
|
|
||||||
// Authenticate admin user.
|
|
||||||
let (transaction_mode, mut server_parameters) = if admin {
|
|
||||||
let config = get_config();
|
|
||||||
// TODO: Add SASL support.
|
|
||||||
// Perform MD5 authentication.
|
// Perform MD5 authentication.
|
||||||
match config.general.admin_auth_type {
|
// TODO: Add SASL support.
|
||||||
AuthType::Trust => (),
|
|
||||||
AuthType::MD5 => {
|
|
||||||
let salt = md5_challenge(&mut write).await?;
|
let salt = md5_challenge(&mut write).await?;
|
||||||
|
|
||||||
let code = match read.read_u8().await {
|
let code = match read.read_u8().await {
|
||||||
@@ -535,6 +525,12 @@ where
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
let mut prepared_statements_enabled = false;
|
||||||
|
|
||||||
|
// Authenticate admin user.
|
||||||
|
let (transaction_mode, mut server_parameters) = if admin {
|
||||||
|
let config = get_config();
|
||||||
|
|
||||||
// Compare server and client hashes.
|
// Compare server and client hashes.
|
||||||
let password_hash = md5_hash_password(
|
let password_hash = md5_hash_password(
|
||||||
&config.general.admin_username,
|
&config.general.admin_username,
|
||||||
@@ -543,16 +539,14 @@ where
|
|||||||
);
|
);
|
||||||
|
|
||||||
if password_hash != password_response {
|
if password_hash != password_response {
|
||||||
let error =
|
let error = Error::ClientGeneralError("Invalid password".into(), client_identifier);
|
||||||
Error::ClientGeneralError("Invalid password".into(), client_identifier);
|
|
||||||
|
|
||||||
warn!("{}", error);
|
warn!("{}", error);
|
||||||
wrong_password(&mut write, username).await?;
|
wrong_password(&mut write, username).await?;
|
||||||
|
|
||||||
return Err(error);
|
return Err(error);
|
||||||
}
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
(false, generate_server_parameters_for_admin())
|
(false, generate_server_parameters_for_admin())
|
||||||
}
|
}
|
||||||
// Authenticate normal user.
|
// Authenticate normal user.
|
||||||
@@ -579,53 +573,6 @@ where
|
|||||||
// Obtain the hash to compare, we give preference to that written in cleartext in config
|
// Obtain the hash to compare, we give preference to that written in cleartext in config
|
||||||
// if there is nothing set in cleartext and auth passthrough (auth_query) is configured, we use the hash obtained
|
// if there is nothing set in cleartext and auth passthrough (auth_query) is configured, we use the hash obtained
|
||||||
// when the pool was created. If there is no hash there, we try to fetch it one more time.
|
// when the pool was created. If there is no hash there, we try to fetch it one more time.
|
||||||
match pool.settings.user.auth_type {
|
|
||||||
AuthType::Trust => (),
|
|
||||||
AuthType::MD5 => {
|
|
||||||
// Perform MD5 authentication.
|
|
||||||
// TODO: Add SASL support.
|
|
||||||
let salt = md5_challenge(&mut write).await?;
|
|
||||||
|
|
||||||
let code = match read.read_u8().await {
|
|
||||||
Ok(p) => p,
|
|
||||||
Err(_) => {
|
|
||||||
return Err(Error::ClientSocketError(
|
|
||||||
"password code".into(),
|
|
||||||
client_identifier,
|
|
||||||
))
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// PasswordMessage
|
|
||||||
if code as char != 'p' {
|
|
||||||
return Err(Error::ProtocolSyncError(format!(
|
|
||||||
"Expected p, got {}",
|
|
||||||
code as char
|
|
||||||
)));
|
|
||||||
}
|
|
||||||
|
|
||||||
let len = match read.read_i32().await {
|
|
||||||
Ok(len) => len,
|
|
||||||
Err(_) => {
|
|
||||||
return Err(Error::ClientSocketError(
|
|
||||||
"password message length".into(),
|
|
||||||
client_identifier,
|
|
||||||
))
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
let mut password_response = vec![0u8; (len - 4) as usize];
|
|
||||||
|
|
||||||
match read.read_exact(&mut password_response).await {
|
|
||||||
Ok(_) => (),
|
|
||||||
Err(_) => {
|
|
||||||
return Err(Error::ClientSocketError(
|
|
||||||
"password message".into(),
|
|
||||||
client_identifier,
|
|
||||||
))
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
let password_hash = if let Some(password) = &pool.settings.user.password {
|
let password_hash = if let Some(password) = &pool.settings.user.password {
|
||||||
Some(md5_hash_password(username, password, &salt))
|
Some(md5_hash_password(username, password, &salt))
|
||||||
} else {
|
} else {
|
||||||
@@ -646,10 +593,7 @@ where
|
|||||||
|
|
||||||
match refetch_auth_hash(&pool).await {
|
match refetch_auth_hash(&pool).await {
|
||||||
Ok(fetched_hash) => {
|
Ok(fetched_hash) => {
|
||||||
warn!(
|
warn!("Password for {}, obtained. Updating.", client_identifier);
|
||||||
"Password for {}, obtained. Updating.",
|
|
||||||
client_identifier
|
|
||||||
);
|
|
||||||
|
|
||||||
{
|
{
|
||||||
let mut pool_auth_hash = pool.auth_hash.write();
|
let mut pool_auth_hash = pool.auth_hash.write();
|
||||||
@@ -714,8 +658,7 @@ where
|
|||||||
));
|
));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
let transaction_mode = pool.settings.pool_mode == PoolMode::Transaction;
|
let transaction_mode = pool.settings.pool_mode == PoolMode::Transaction;
|
||||||
prepared_statements_enabled =
|
prepared_statements_enabled =
|
||||||
transaction_mode && pool.prepared_statement_cache.is_some();
|
transaction_mode && pool.prepared_statement_cache.is_some();
|
||||||
@@ -1206,7 +1149,7 @@ where
|
|||||||
// This reads the first byte without advancing the internal pointer and mutating the bytes
|
// This reads the first byte without advancing the internal pointer and mutating the bytes
|
||||||
let code = *message.first().unwrap() as char;
|
let code = *message.first().unwrap() as char;
|
||||||
|
|
||||||
trace!("Client message: {}", code);
|
trace!("Message: {}", code);
|
||||||
|
|
||||||
match code {
|
match code {
|
||||||
// Query
|
// Query
|
||||||
@@ -1245,7 +1188,6 @@ where
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
debug!("Sending query to server");
|
debug!("Sending query to server");
|
||||||
|
|
||||||
self.send_and_receive_loop(
|
self.send_and_receive_loop(
|
||||||
@@ -1378,7 +1320,6 @@ where
|
|||||||
{
|
{
|
||||||
match protocol_data {
|
match protocol_data {
|
||||||
ExtendedProtocolData::Parse { data, metadata } => {
|
ExtendedProtocolData::Parse { data, metadata } => {
|
||||||
debug!("Have parse in extended buffer");
|
|
||||||
let (parse, hash) = match metadata {
|
let (parse, hash) = match metadata {
|
||||||
Some(metadata) => metadata,
|
Some(metadata) => metadata,
|
||||||
None => {
|
None => {
|
||||||
@@ -1494,7 +1435,7 @@ where
|
|||||||
.await
|
.await
|
||||||
{
|
{
|
||||||
// We might be in some kind of error/in between protocol state
|
// We might be in some kind of error/in between protocol state
|
||||||
server.mark_bad(err.to_string().as_str());
|
server.mark_bad();
|
||||||
return Err(err);
|
return Err(err);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1561,7 +1502,7 @@ where
|
|||||||
match write_all_flush(&mut self.write, &response).await {
|
match write_all_flush(&mut self.write, &response).await {
|
||||||
Ok(_) => (),
|
Ok(_) => (),
|
||||||
Err(err) => {
|
Err(err) => {
|
||||||
server.mark_bad(err.to_string().as_str());
|
server.mark_bad();
|
||||||
return Err(err);
|
return Err(err);
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
@@ -1715,25 +1656,11 @@ where
|
|||||||
) -> Result<(), Error> {
|
) -> Result<(), Error> {
|
||||||
match self.prepared_statements.get(&client_name) {
|
match self.prepared_statements.get(&client_name) {
|
||||||
Some((parse, hash)) => {
|
Some((parse, hash)) => {
|
||||||
debug!("Prepared statement `{}` found in cache", client_name);
|
debug!("Prepared statement `{}` found in cache", parse.name);
|
||||||
// In this case we want to send the parse message to the server
|
// In this case we want to send the parse message to the server
|
||||||
// since pgcat is initiating the prepared statement on this specific server
|
// since pgcat is initiating the prepared statement on this specific server
|
||||||
match self
|
self.register_parse_to_server_cache(true, hash, parse, pool, server, address)
|
||||||
.register_parse_to_server_cache(true, hash, parse, pool, server, address)
|
.await?;
|
||||||
.await
|
|
||||||
{
|
|
||||||
Ok(_) => (),
|
|
||||||
Err(err) => match err {
|
|
||||||
Error::PreparedStatementError => {
|
|
||||||
debug!("Removed {} from client cache", client_name);
|
|
||||||
self.prepared_statements.remove(&client_name);
|
|
||||||
}
|
|
||||||
|
|
||||||
_ => {
|
|
||||||
return Err(err);
|
|
||||||
}
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
None => {
|
None => {
|
||||||
@@ -1762,20 +1689,11 @@ where
|
|||||||
// We want to promote this in the pool's LRU
|
// We want to promote this in the pool's LRU
|
||||||
pool.promote_prepared_statement_hash(hash);
|
pool.promote_prepared_statement_hash(hash);
|
||||||
|
|
||||||
debug!("Checking for prepared statement {}", parse.name);
|
|
||||||
|
|
||||||
if let Err(err) = server
|
if let Err(err) = server
|
||||||
.register_prepared_statement(parse, should_send_parse_to_server)
|
.register_prepared_statement(parse, should_send_parse_to_server)
|
||||||
.await
|
.await
|
||||||
{
|
{
|
||||||
match err {
|
|
||||||
// Don't ban for this.
|
|
||||||
Error::PreparedStatementError => (),
|
|
||||||
_ => {
|
|
||||||
pool.ban(address, BanReason::MessageSendFailed, Some(&self.stats));
|
pool.ban(address, BanReason::MessageSendFailed, Some(&self.stats));
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
return Err(err);
|
return Err(err);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1786,14 +1704,18 @@ where
|
|||||||
/// and also the pool's statement cache. Add it to extended protocol data.
|
/// and also the pool's statement cache. Add it to extended protocol data.
|
||||||
fn buffer_parse(&mut self, message: BytesMut, pool: &ConnectionPool) -> Result<(), Error> {
|
fn buffer_parse(&mut self, message: BytesMut, pool: &ConnectionPool) -> Result<(), Error> {
|
||||||
// Avoid parsing if prepared statements not enabled
|
// Avoid parsing if prepared statements not enabled
|
||||||
if !self.prepared_statements_enabled {
|
let client_given_name = match self.prepared_statements_enabled {
|
||||||
|
true => Parse::get_name(&message)?,
|
||||||
|
false => "".to_string(),
|
||||||
|
};
|
||||||
|
|
||||||
|
if client_given_name.is_empty() {
|
||||||
debug!("Anonymous parse message");
|
debug!("Anonymous parse message");
|
||||||
self.extended_protocol_data_buffer
|
self.extended_protocol_data_buffer
|
||||||
.push_back(ExtendedProtocolData::create_new_parse(message, None));
|
.push_back(ExtendedProtocolData::create_new_parse(message, None));
|
||||||
return Ok(());
|
return Ok(());
|
||||||
}
|
}
|
||||||
|
|
||||||
let client_given_name = Parse::get_name(&message)?;
|
|
||||||
let parse: Parse = (&message).try_into()?;
|
let parse: Parse = (&message).try_into()?;
|
||||||
|
|
||||||
// Compute the hash of the parse statement
|
// Compute the hash of the parse statement
|
||||||
@@ -1831,15 +1753,18 @@ where
|
|||||||
/// saved in the client cache.
|
/// saved in the client cache.
|
||||||
async fn buffer_bind(&mut self, message: BytesMut) -> Result<(), Error> {
|
async fn buffer_bind(&mut self, message: BytesMut) -> Result<(), Error> {
|
||||||
// Avoid parsing if prepared statements not enabled
|
// Avoid parsing if prepared statements not enabled
|
||||||
if !self.prepared_statements_enabled {
|
let client_given_name = match self.prepared_statements_enabled {
|
||||||
|
true => Bind::get_name(&message)?,
|
||||||
|
false => "".to_string(),
|
||||||
|
};
|
||||||
|
|
||||||
|
if client_given_name.is_empty() {
|
||||||
debug!("Anonymous bind message");
|
debug!("Anonymous bind message");
|
||||||
self.extended_protocol_data_buffer
|
self.extended_protocol_data_buffer
|
||||||
.push_back(ExtendedProtocolData::create_new_bind(message, None));
|
.push_back(ExtendedProtocolData::create_new_bind(message, None));
|
||||||
return Ok(());
|
return Ok(());
|
||||||
}
|
}
|
||||||
|
|
||||||
let client_given_name = Bind::get_name(&message)?;
|
|
||||||
|
|
||||||
match self.prepared_statements.get(&client_given_name) {
|
match self.prepared_statements.get(&client_given_name) {
|
||||||
Some((rewritten_parse, _)) => {
|
Some((rewritten_parse, _)) => {
|
||||||
let message = Bind::rename(message, &rewritten_parse.name)?;
|
let message = Bind::rename(message, &rewritten_parse.name)?;
|
||||||
@@ -1882,7 +1807,12 @@ where
|
|||||||
/// saved in the client cache.
|
/// saved in the client cache.
|
||||||
async fn buffer_describe(&mut self, message: BytesMut) -> Result<(), Error> {
|
async fn buffer_describe(&mut self, message: BytesMut) -> Result<(), Error> {
|
||||||
// Avoid parsing if prepared statements not enabled
|
// Avoid parsing if prepared statements not enabled
|
||||||
if !self.prepared_statements_enabled {
|
let describe: Describe = match self.prepared_statements_enabled {
|
||||||
|
true => (&message).try_into()?,
|
||||||
|
false => Describe::empty_new(),
|
||||||
|
};
|
||||||
|
|
||||||
|
if describe.anonymous() {
|
||||||
debug!("Anonymous describe message");
|
debug!("Anonymous describe message");
|
||||||
self.extended_protocol_data_buffer
|
self.extended_protocol_data_buffer
|
||||||
.push_back(ExtendedProtocolData::create_new_describe(message, None));
|
.push_back(ExtendedProtocolData::create_new_describe(message, None));
|
||||||
@@ -1890,15 +1820,6 @@ where
|
|||||||
return Ok(());
|
return Ok(());
|
||||||
}
|
}
|
||||||
|
|
||||||
let describe: Describe = (&message).try_into()?;
|
|
||||||
if describe.target == 'P' {
|
|
||||||
debug!("Portal describe message");
|
|
||||||
self.extended_protocol_data_buffer
|
|
||||||
.push_back(ExtendedProtocolData::create_new_describe(message, None));
|
|
||||||
|
|
||||||
return Ok(());
|
|
||||||
}
|
|
||||||
|
|
||||||
let client_given_name = describe.statement_name.clone();
|
let client_given_name = describe.statement_name.clone();
|
||||||
|
|
||||||
match self.prepared_statements.get(&client_given_name) {
|
match self.prepared_statements.get(&client_given_name) {
|
||||||
@@ -1983,7 +1904,7 @@ where
|
|||||||
Ok(_) => (),
|
Ok(_) => (),
|
||||||
Err(err) => {
|
Err(err) => {
|
||||||
// We might be in some kind of error/in between protocol state, better to just kill this server
|
// We might be in some kind of error/in between protocol state, better to just kill this server
|
||||||
server.mark_bad(err.to_string().as_str());
|
server.mark_bad();
|
||||||
return Err(err);
|
return Err(err);
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
@@ -2050,13 +1971,11 @@ where
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
Err(_) => {
|
Err(_) => {
|
||||||
server.mark_bad(
|
error!(
|
||||||
format!(
|
|
||||||
"Statement timeout while talking to {:?} with user {}",
|
"Statement timeout while talking to {:?} with user {}",
|
||||||
address, pool.settings.user.username
|
address, pool.settings.user.username
|
||||||
)
|
|
||||||
.as_str(),
|
|
||||||
);
|
);
|
||||||
|
server.mark_bad();
|
||||||
pool.ban(address, BanReason::StatementTimeout, Some(client_stats));
|
pool.ban(address, BanReason::StatementTimeout, Some(client_stats));
|
||||||
error_response_terminal(&mut self.write, "pool statement timeout").await?;
|
error_response_terminal(&mut self.write, "pool statement timeout").await?;
|
||||||
Err(Error::StatementTimeout)
|
Err(Error::StatementTimeout)
|
||||||
|
|||||||
@@ -38,12 +38,12 @@ pub enum Role {
|
|||||||
Mirror,
|
Mirror,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl std::fmt::Display for Role {
|
impl ToString for Role {
|
||||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
fn to_string(&self) -> String {
|
||||||
match self {
|
match *self {
|
||||||
Role::Primary => write!(f, "primary"),
|
Role::Primary => "primary".to_string(),
|
||||||
Role::Replica => write!(f, "replica"),
|
Role::Replica => "replica".to_string(),
|
||||||
Role::Mirror => write!(f, "mirror"),
|
Role::Mirror => "mirror".to_string(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -208,9 +208,6 @@ impl Address {
|
|||||||
pub struct User {
|
pub struct User {
|
||||||
pub username: String,
|
pub username: String,
|
||||||
pub password: Option<String>,
|
pub password: Option<String>,
|
||||||
|
|
||||||
#[serde(default = "User::default_auth_type")]
|
|
||||||
pub auth_type: AuthType,
|
|
||||||
pub server_username: Option<String>,
|
pub server_username: Option<String>,
|
||||||
pub server_password: Option<String>,
|
pub server_password: Option<String>,
|
||||||
pub pool_size: u32,
|
pub pool_size: u32,
|
||||||
@@ -219,8 +216,6 @@ pub struct User {
|
|||||||
pub server_lifetime: Option<u64>,
|
pub server_lifetime: Option<u64>,
|
||||||
#[serde(default)] // 0
|
#[serde(default)] // 0
|
||||||
pub statement_timeout: u64,
|
pub statement_timeout: u64,
|
||||||
pub connect_timeout: Option<u64>,
|
|
||||||
pub idle_timeout: Option<u64>,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Default for User {
|
impl Default for User {
|
||||||
@@ -228,7 +223,6 @@ impl Default for User {
|
|||||||
User {
|
User {
|
||||||
username: String::from("postgres"),
|
username: String::from("postgres"),
|
||||||
password: None,
|
password: None,
|
||||||
auth_type: AuthType::MD5,
|
|
||||||
server_username: None,
|
server_username: None,
|
||||||
server_password: None,
|
server_password: None,
|
||||||
pool_size: 15,
|
pool_size: 15,
|
||||||
@@ -236,17 +230,11 @@ impl Default for User {
|
|||||||
statement_timeout: 0,
|
statement_timeout: 0,
|
||||||
pool_mode: None,
|
pool_mode: None,
|
||||||
server_lifetime: None,
|
server_lifetime: None,
|
||||||
connect_timeout: None,
|
|
||||||
idle_timeout: None,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl User {
|
impl User {
|
||||||
pub fn default_auth_type() -> AuthType {
|
|
||||||
AuthType::MD5
|
|
||||||
}
|
|
||||||
|
|
||||||
fn validate(&self) -> Result<(), Error> {
|
fn validate(&self) -> Result<(), Error> {
|
||||||
if let Some(min_pool_size) = self.min_pool_size {
|
if let Some(min_pool_size) = self.min_pool_size {
|
||||||
if min_pool_size > self.pool_size {
|
if min_pool_size > self.pool_size {
|
||||||
@@ -342,9 +330,6 @@ pub struct General {
|
|||||||
pub admin_username: String,
|
pub admin_username: String,
|
||||||
pub admin_password: String,
|
pub admin_password: String,
|
||||||
|
|
||||||
#[serde(default = "General::default_admin_auth_type")]
|
|
||||||
pub admin_auth_type: AuthType,
|
|
||||||
|
|
||||||
#[serde(default = "General::default_validate_config")]
|
#[serde(default = "General::default_validate_config")]
|
||||||
pub validate_config: bool,
|
pub validate_config: bool,
|
||||||
|
|
||||||
@@ -359,10 +344,6 @@ impl General {
|
|||||||
"0.0.0.0".into()
|
"0.0.0.0".into()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn default_admin_auth_type() -> AuthType {
|
|
||||||
AuthType::MD5
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn default_port() -> u16 {
|
pub fn default_port() -> u16 {
|
||||||
5432
|
5432
|
||||||
}
|
}
|
||||||
@@ -471,7 +452,6 @@ impl Default for General {
|
|||||||
verify_server_certificate: false,
|
verify_server_certificate: false,
|
||||||
admin_username: String::from("admin"),
|
admin_username: String::from("admin"),
|
||||||
admin_password: String::from("admin"),
|
admin_password: String::from("admin"),
|
||||||
admin_auth_type: AuthType::MD5,
|
|
||||||
validate_config: true,
|
validate_config: true,
|
||||||
auth_query: None,
|
auth_query: None,
|
||||||
auth_query_user: None,
|
auth_query_user: None,
|
||||||
@@ -492,20 +472,11 @@ pub enum PoolMode {
|
|||||||
Session,
|
Session,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Serialize, Deserialize, Debug, Clone, PartialEq, Eq, Copy, Hash)]
|
impl ToString for PoolMode {
|
||||||
pub enum AuthType {
|
fn to_string(&self) -> String {
|
||||||
#[serde(alias = "trust", alias = "Trust")]
|
match *self {
|
||||||
Trust,
|
PoolMode::Transaction => "transaction".to_string(),
|
||||||
|
PoolMode::Session => "session".to_string(),
|
||||||
#[serde(alias = "md5", alias = "MD5")]
|
|
||||||
MD5,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl std::fmt::Display for PoolMode {
|
|
||||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
|
||||||
match self {
|
|
||||||
PoolMode::Transaction => write!(f, "transaction"),
|
|
||||||
PoolMode::Session => write!(f, "session"),
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -518,13 +489,12 @@ pub enum LoadBalancingMode {
|
|||||||
#[serde(alias = "loc", alias = "LOC", alias = "least_outstanding_connections")]
|
#[serde(alias = "loc", alias = "LOC", alias = "least_outstanding_connections")]
|
||||||
LeastOutstandingConnections,
|
LeastOutstandingConnections,
|
||||||
}
|
}
|
||||||
|
impl ToString for LoadBalancingMode {
|
||||||
impl std::fmt::Display for LoadBalancingMode {
|
fn to_string(&self) -> String {
|
||||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
match *self {
|
||||||
match self {
|
LoadBalancingMode::Random => "random".to_string(),
|
||||||
LoadBalancingMode::Random => write!(f, "random"),
|
|
||||||
LoadBalancingMode::LeastOutstandingConnections => {
|
LoadBalancingMode::LeastOutstandingConnections => {
|
||||||
write!(f, "least_outstanding_connections")
|
"least_outstanding_connections".to_string()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -1025,17 +995,15 @@ impl Config {
|
|||||||
pub fn fill_up_auth_query_config(&mut self) {
|
pub fn fill_up_auth_query_config(&mut self) {
|
||||||
for (_name, pool) in self.pools.iter_mut() {
|
for (_name, pool) in self.pools.iter_mut() {
|
||||||
if pool.auth_query.is_none() {
|
if pool.auth_query.is_none() {
|
||||||
pool.auth_query.clone_from(&self.general.auth_query);
|
pool.auth_query = self.general.auth_query.clone();
|
||||||
}
|
}
|
||||||
|
|
||||||
if pool.auth_query_user.is_none() {
|
if pool.auth_query_user.is_none() {
|
||||||
pool.auth_query_user
|
pool.auth_query_user = self.general.auth_query_user.clone();
|
||||||
.clone_from(&self.general.auth_query_user);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if pool.auth_query_password.is_none() {
|
if pool.auth_query_password.is_none() {
|
||||||
pool.auth_query_password
|
pool.auth_query_password = self.general.auth_query_password.clone();
|
||||||
.clone_from(&self.general.auth_query_password);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -1183,7 +1151,7 @@ impl Config {
|
|||||||
"Default max server lifetime: {}ms",
|
"Default max server lifetime: {}ms",
|
||||||
self.general.server_lifetime
|
self.general.server_lifetime
|
||||||
);
|
);
|
||||||
info!("Server round robin: {}", self.general.server_round_robin);
|
info!("Sever round robin: {}", self.general.server_round_robin);
|
||||||
match self.general.tls_certificate.clone() {
|
match self.general.tls_certificate.clone() {
|
||||||
Some(tls_certificate) => {
|
Some(tls_certificate) => {
|
||||||
info!("TLS certificate: {}", tls_certificate);
|
info!("TLS certificate: {}", tls_certificate);
|
||||||
@@ -1339,24 +1307,6 @@ impl Config {
|
|||||||
None => "default".to_string(),
|
None => "default".to_string(),
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
info!(
|
|
||||||
"[pool: {}][user: {}] Connection timeout: {}",
|
|
||||||
pool_name,
|
|
||||||
user.1.username,
|
|
||||||
match user.1.connect_timeout {
|
|
||||||
Some(connect_timeout) => format!("{}ms", connect_timeout),
|
|
||||||
None => "not set".to_string(),
|
|
||||||
}
|
|
||||||
);
|
|
||||||
info!(
|
|
||||||
"[pool: {}][user: {}] Idle timeout: {}",
|
|
||||||
pool_name,
|
|
||||||
user.1.username,
|
|
||||||
match user.1.idle_timeout {
|
|
||||||
Some(idle_timeout) => format!("{}ms", idle_timeout),
|
|
||||||
None => "not set".to_string(),
|
|
||||||
}
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -29,7 +29,6 @@ pub enum Error {
|
|||||||
QueryRouterParserError(String),
|
QueryRouterParserError(String),
|
||||||
QueryRouterError(String),
|
QueryRouterError(String),
|
||||||
InvalidShardId(usize),
|
InvalidShardId(usize),
|
||||||
PreparedStatementError,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Clone, PartialEq, Debug)]
|
#[derive(Clone, PartialEq, Debug)]
|
||||||
|
|||||||
@@ -733,10 +733,6 @@ pub fn configure_socket(stream: &TcpStream) {
|
|||||||
}
|
}
|
||||||
Err(err) => error!("Could not configure socket: {}", err),
|
Err(err) => error!("Could not configure socket: {}", err),
|
||||||
}
|
}
|
||||||
match sock_ref.set_nodelay(true) {
|
|
||||||
Ok(_) => (),
|
|
||||||
Err(err) => error!("Could not configure TCP_NODELAY for socket: {}", err),
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub trait BytesMutReader {
|
pub trait BytesMutReader {
|
||||||
@@ -1113,7 +1109,7 @@ pub struct Describe {
|
|||||||
|
|
||||||
#[allow(dead_code)]
|
#[allow(dead_code)]
|
||||||
len: i32,
|
len: i32,
|
||||||
pub target: char,
|
target: char,
|
||||||
pub statement_name: String,
|
pub statement_name: String,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -85,9 +85,8 @@ impl MirroredClient {
|
|||||||
match recv_result {
|
match recv_result {
|
||||||
Ok(message) => trace!("Received from mirror: {} {:?}", String::from_utf8_lossy(&message[..]), address.clone()),
|
Ok(message) => trace!("Received from mirror: {} {:?}", String::from_utf8_lossy(&message[..]), address.clone()),
|
||||||
Err(err) => {
|
Err(err) => {
|
||||||
server.mark_bad(
|
server.mark_bad();
|
||||||
format!("Failed to send to mirror, Discarding message {:?}, {:?}", err, address.clone()).as_str()
|
error!("Failed to receive from mirror {:?} {:?}", err, address.clone());
|
||||||
);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -99,9 +98,8 @@ impl MirroredClient {
|
|||||||
match server.send(&BytesMut::from(&bytes[..])).await {
|
match server.send(&BytesMut::from(&bytes[..])).await {
|
||||||
Ok(_) => trace!("Sent to mirror: {} {:?}", String::from_utf8_lossy(&bytes[..]), address.clone()),
|
Ok(_) => trace!("Sent to mirror: {} {:?}", String::from_utf8_lossy(&bytes[..]), address.clone()),
|
||||||
Err(err) => {
|
Err(err) => {
|
||||||
server.mark_bad(
|
server.mark_bad();
|
||||||
format!("Failed to receive from mirror {:?} {:?}", err, address.clone()).as_str()
|
error!("Failed to send to mirror, Discarding message {:?}, {:?}", err, address.clone())
|
||||||
);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
24
src/pool.rs
24
src/pool.rs
@@ -436,20 +436,14 @@ impl ConnectionPool {
|
|||||||
pool_config.prepared_statements_cache_size,
|
pool_config.prepared_statements_cache_size,
|
||||||
);
|
);
|
||||||
|
|
||||||
let connect_timeout = match user.connect_timeout {
|
let connect_timeout = match pool_config.connect_timeout {
|
||||||
Some(connect_timeout) => connect_timeout,
|
|
||||||
None => match pool_config.connect_timeout {
|
|
||||||
Some(connect_timeout) => connect_timeout,
|
Some(connect_timeout) => connect_timeout,
|
||||||
None => config.general.connect_timeout,
|
None => config.general.connect_timeout,
|
||||||
},
|
|
||||||
};
|
};
|
||||||
|
|
||||||
let idle_timeout = match user.idle_timeout {
|
let idle_timeout = match pool_config.idle_timeout {
|
||||||
Some(idle_timeout) => idle_timeout,
|
|
||||||
None => match pool_config.idle_timeout {
|
|
||||||
Some(idle_timeout) => idle_timeout,
|
Some(idle_timeout) => idle_timeout,
|
||||||
None => config.general.idle_timeout,
|
None => config.general.idle_timeout,
|
||||||
},
|
|
||||||
};
|
};
|
||||||
|
|
||||||
let server_lifetime = match user.server_lifetime {
|
let server_lifetime = match user.server_lifetime {
|
||||||
@@ -769,6 +763,7 @@ impl ConnectionPool {
|
|||||||
);
|
);
|
||||||
self.ban(address, BanReason::FailedCheckout, Some(client_stats));
|
self.ban(address, BanReason::FailedCheckout, Some(client_stats));
|
||||||
address.stats.error();
|
address.stats.error();
|
||||||
|
client_stats.idle();
|
||||||
client_stats.checkout_error();
|
client_stats.checkout_error();
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
@@ -787,7 +782,7 @@ impl ConnectionPool {
|
|||||||
// Health checks are pretty expensive.
|
// Health checks are pretty expensive.
|
||||||
if !require_healthcheck {
|
if !require_healthcheck {
|
||||||
let checkout_time = now.elapsed().as_micros() as u64;
|
let checkout_time = now.elapsed().as_micros() as u64;
|
||||||
client_stats.checkout_success();
|
client_stats.checkout_time(checkout_time);
|
||||||
server
|
server
|
||||||
.stats()
|
.stats()
|
||||||
.checkout_time(checkout_time, client_stats.application_name());
|
.checkout_time(checkout_time, client_stats.application_name());
|
||||||
@@ -801,7 +796,7 @@ impl ConnectionPool {
|
|||||||
.await
|
.await
|
||||||
{
|
{
|
||||||
let checkout_time = now.elapsed().as_micros() as u64;
|
let checkout_time = now.elapsed().as_micros() as u64;
|
||||||
client_stats.checkout_success();
|
client_stats.checkout_time(checkout_time);
|
||||||
server
|
server
|
||||||
.stats()
|
.stats()
|
||||||
.checkout_time(checkout_time, client_stats.application_name());
|
.checkout_time(checkout_time, client_stats.application_name());
|
||||||
@@ -813,7 +808,10 @@ impl ConnectionPool {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
client_stats.checkout_error();
|
client_stats.idle();
|
||||||
|
|
||||||
|
let checkout_time = now.elapsed().as_micros() as u64;
|
||||||
|
client_stats.checkout_time(checkout_time);
|
||||||
|
|
||||||
Err(Error::AllServersDown)
|
Err(Error::AllServersDown)
|
||||||
}
|
}
|
||||||
@@ -839,7 +837,7 @@ impl ConnectionPool {
|
|||||||
Ok(res) => match res {
|
Ok(res) => match res {
|
||||||
Ok(_) => {
|
Ok(_) => {
|
||||||
let checkout_time: u64 = start.elapsed().as_micros() as u64;
|
let checkout_time: u64 = start.elapsed().as_micros() as u64;
|
||||||
client_info.checkout_success();
|
client_info.checkout_time(checkout_time);
|
||||||
server
|
server
|
||||||
.stats()
|
.stats()
|
||||||
.checkout_time(checkout_time, client_info.application_name());
|
.checkout_time(checkout_time, client_info.application_name());
|
||||||
@@ -867,7 +865,7 @@ impl ConnectionPool {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Don't leave a bad connection in the pool.
|
// Don't leave a bad connection in the pool.
|
||||||
server.mark_bad("failed health check");
|
server.mark_bad();
|
||||||
|
|
||||||
self.ban(address, BanReason::FailedHealthCheck, Some(client_info));
|
self.ban(address, BanReason::FailedHealthCheck, Some(client_info));
|
||||||
false
|
false
|
||||||
|
|||||||
@@ -1,41 +1,23 @@
|
|||||||
use http_body_util::Full;
|
use hyper::service::{make_service_fn, service_fn};
|
||||||
use hyper::body;
|
use hyper::{Body, Method, Request, Response, Server, StatusCode};
|
||||||
use hyper::body::Bytes;
|
|
||||||
|
|
||||||
use hyper::server::conn::http1;
|
|
||||||
use hyper::service::service_fn;
|
|
||||||
use hyper::{Method, Request, Response, StatusCode};
|
|
||||||
use hyper_util::rt::TokioIo;
|
|
||||||
use log::{debug, error, info};
|
use log::{debug, error, info};
|
||||||
use phf::phf_map;
|
use phf::phf_map;
|
||||||
use std::collections::HashMap;
|
use std::collections::HashMap;
|
||||||
use std::fmt;
|
use std::fmt;
|
||||||
use std::net::SocketAddr;
|
use std::net::SocketAddr;
|
||||||
use std::sync::atomic::Ordering;
|
use std::sync::atomic::Ordering;
|
||||||
use tokio::net::TcpListener;
|
use std::sync::Arc;
|
||||||
|
|
||||||
use crate::config::Address;
|
use crate::config::Address;
|
||||||
use crate::pool::{get_all_pools, PoolIdentifier};
|
use crate::pool::{get_all_pools, PoolIdentifier};
|
||||||
use crate::stats::get_server_stats;
|
|
||||||
use crate::stats::pool::PoolStats;
|
use crate::stats::pool::PoolStats;
|
||||||
|
use crate::stats::{get_server_stats, ServerStats};
|
||||||
|
|
||||||
struct MetricHelpType {
|
struct MetricHelpType {
|
||||||
help: &'static str,
|
help: &'static str,
|
||||||
ty: &'static str,
|
ty: &'static str,
|
||||||
}
|
}
|
||||||
|
|
||||||
struct ServerPrometheusStats {
|
|
||||||
bytes_received: u64,
|
|
||||||
bytes_sent: u64,
|
|
||||||
transaction_count: u64,
|
|
||||||
query_count: u64,
|
|
||||||
error_count: u64,
|
|
||||||
active_count: u64,
|
|
||||||
idle_count: u64,
|
|
||||||
login_count: u64,
|
|
||||||
tested_count: u64,
|
|
||||||
}
|
|
||||||
|
|
||||||
// reference for metric types: https://prometheus.io/docs/concepts/metric_types/
|
// reference for metric types: https://prometheus.io/docs/concepts/metric_types/
|
||||||
// counters only increase
|
// counters only increase
|
||||||
// gauges can arbitrarily increase or decrease
|
// gauges can arbitrarily increase or decrease
|
||||||
@@ -138,46 +120,22 @@ static METRIC_HELP_AND_TYPES_LOOKUP: phf::Map<&'static str, MetricHelpType> = ph
|
|||||||
},
|
},
|
||||||
"servers_bytes_received" => MetricHelpType {
|
"servers_bytes_received" => MetricHelpType {
|
||||||
help: "Volume in bytes of network traffic received by server",
|
help: "Volume in bytes of network traffic received by server",
|
||||||
ty: "counter",
|
ty: "gauge",
|
||||||
},
|
},
|
||||||
"servers_bytes_sent" => MetricHelpType {
|
"servers_bytes_sent" => MetricHelpType {
|
||||||
help: "Volume in bytes of network traffic sent by server",
|
help: "Volume in bytes of network traffic sent by server",
|
||||||
ty: "counter",
|
ty: "gauge",
|
||||||
},
|
},
|
||||||
"servers_transaction_count" => MetricHelpType {
|
"servers_transaction_count" => MetricHelpType {
|
||||||
help: "Number of transactions executed by server",
|
help: "Number of transactions executed by server",
|
||||||
ty: "counter",
|
ty: "gauge",
|
||||||
},
|
},
|
||||||
"servers_query_count" => MetricHelpType {
|
"servers_query_count" => MetricHelpType {
|
||||||
help: "Number of queries executed by server",
|
help: "Number of queries executed by server",
|
||||||
ty: "counter",
|
ty: "gauge",
|
||||||
},
|
},
|
||||||
"servers_error_count" => MetricHelpType {
|
"servers_error_count" => MetricHelpType {
|
||||||
help: "Number of errors",
|
help: "Number of errors",
|
||||||
ty: "counter",
|
|
||||||
},
|
|
||||||
"servers_idle_count" => MetricHelpType {
|
|
||||||
help: "Number of server connection in idle state",
|
|
||||||
ty: "gauge",
|
|
||||||
},
|
|
||||||
"servers_active_count" => MetricHelpType {
|
|
||||||
help: "Number of server connection in active state",
|
|
||||||
ty: "gauge",
|
|
||||||
},
|
|
||||||
"servers_tested_count" => MetricHelpType {
|
|
||||||
help: "Number of server connection in tested state",
|
|
||||||
ty: "gauge",
|
|
||||||
},
|
|
||||||
"servers_login_count" => MetricHelpType {
|
|
||||||
help: "Number of server connection in login state",
|
|
||||||
ty: "gauge",
|
|
||||||
},
|
|
||||||
"servers_is_banned" => MetricHelpType {
|
|
||||||
help: "0 if server is not banned, 1 if server is banned",
|
|
||||||
ty: "gauge",
|
|
||||||
},
|
|
||||||
"servers_is_paused" => MetricHelpType {
|
|
||||||
help: "0 if server is not paused, 1 if server is paused",
|
|
||||||
ty: "gauge",
|
ty: "gauge",
|
||||||
},
|
},
|
||||||
"databases_pool_size" => MetricHelpType {
|
"databases_pool_size" => MetricHelpType {
|
||||||
@@ -200,17 +158,18 @@ struct PrometheusMetric<Value: fmt::Display> {
|
|||||||
|
|
||||||
impl<Value: fmt::Display> fmt::Display for PrometheusMetric<Value> {
|
impl<Value: fmt::Display> fmt::Display for PrometheusMetric<Value> {
|
||||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
let mut sorted_labels: Vec<_> = self.labels.iter().collect();
|
let formatted_labels = self
|
||||||
sorted_labels.sort_by_key(|&(key, _)| key);
|
.labels
|
||||||
let formatted_labels = sorted_labels
|
|
||||||
.iter()
|
.iter()
|
||||||
.map(|(key, value)| format!("{}=\"{}\"", key, value))
|
.map(|(key, value)| format!("{}=\"{}\"", key, value))
|
||||||
.collect::<Vec<_>>()
|
.collect::<Vec<_>>()
|
||||||
.join(",");
|
.join(",");
|
||||||
write!(
|
write!(
|
||||||
f,
|
f,
|
||||||
"{name}{{{formatted_labels}}} {value}",
|
"# HELP {name} {help}\n# TYPE {name} {ty}\n{name}{{{formatted_labels}}} {value}\n",
|
||||||
name = format_args!("pgcat_{}", self.name),
|
name = format_args!("pgcat_{}", self.name),
|
||||||
|
help = self.help,
|
||||||
|
ty = self.ty,
|
||||||
formatted_labels = formatted_labels,
|
formatted_labels = formatted_labels,
|
||||||
value = self.value
|
value = self.value
|
||||||
)
|
)
|
||||||
@@ -244,9 +203,7 @@ impl<Value: fmt::Display> PrometheusMetric<Value> {
|
|||||||
labels.insert("shard", address.shard.to_string());
|
labels.insert("shard", address.shard.to_string());
|
||||||
labels.insert("role", address.role.to_string());
|
labels.insert("role", address.role.to_string());
|
||||||
labels.insert("pool", address.pool_name.clone());
|
labels.insert("pool", address.pool_name.clone());
|
||||||
labels.insert("index", address.address_index.to_string());
|
|
||||||
labels.insert("database", address.database.to_string());
|
labels.insert("database", address.database.to_string());
|
||||||
labels.insert("username", address.username.clone());
|
|
||||||
|
|
||||||
Self::from_name(&format!("databases_{}", name), value, labels)
|
Self::from_name(&format!("databases_{}", name), value, labels)
|
||||||
}
|
}
|
||||||
@@ -261,9 +218,7 @@ impl<Value: fmt::Display> PrometheusMetric<Value> {
|
|||||||
labels.insert("shard", address.shard.to_string());
|
labels.insert("shard", address.shard.to_string());
|
||||||
labels.insert("role", address.role.to_string());
|
labels.insert("role", address.role.to_string());
|
||||||
labels.insert("pool", address.pool_name.clone());
|
labels.insert("pool", address.pool_name.clone());
|
||||||
labels.insert("index", address.address_index.to_string());
|
|
||||||
labels.insert("database", address.database.to_string());
|
labels.insert("database", address.database.to_string());
|
||||||
labels.insert("username", address.username.clone());
|
|
||||||
|
|
||||||
Self::from_name(&format!("servers_{}", name), value, labels)
|
Self::from_name(&format!("servers_{}", name), value, labels)
|
||||||
}
|
}
|
||||||
@@ -274,9 +229,7 @@ impl<Value: fmt::Display> PrometheusMetric<Value> {
|
|||||||
labels.insert("shard", address.shard.to_string());
|
labels.insert("shard", address.shard.to_string());
|
||||||
labels.insert("pool", address.pool_name.clone());
|
labels.insert("pool", address.pool_name.clone());
|
||||||
labels.insert("role", address.role.to_string());
|
labels.insert("role", address.role.to_string());
|
||||||
labels.insert("index", address.address_index.to_string());
|
|
||||||
labels.insert("database", address.database.to_string());
|
labels.insert("database", address.database.to_string());
|
||||||
labels.insert("username", address.username.clone());
|
|
||||||
|
|
||||||
Self::from_name(&format!("stats_{}", name), value, labels)
|
Self::from_name(&format!("stats_{}", name), value, labels)
|
||||||
}
|
}
|
||||||
@@ -288,20 +241,9 @@ impl<Value: fmt::Display> PrometheusMetric<Value> {
|
|||||||
|
|
||||||
Self::from_name(&format!("pools_{}", name), value, labels)
|
Self::from_name(&format!("pools_{}", name), value, labels)
|
||||||
}
|
}
|
||||||
|
|
||||||
fn get_header(&self) -> String {
|
|
||||||
format!(
|
|
||||||
"\n# HELP {name} {help}\n# TYPE {name} {ty}",
|
|
||||||
name = format_args!("pgcat_{}", self.name),
|
|
||||||
help = self.help,
|
|
||||||
ty = self.ty,
|
|
||||||
)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn prometheus_stats(
|
async fn prometheus_stats(request: Request<Body>) -> Result<Response<Body>, hyper::http::Error> {
|
||||||
request: Request<body::Incoming>,
|
|
||||||
) -> Result<Response<Full<Bytes>>, hyper::http::Error> {
|
|
||||||
match (request.method(), request.uri().path()) {
|
match (request.method(), request.uri().path()) {
|
||||||
(&Method::GET, "/metrics") => {
|
(&Method::GET, "/metrics") => {
|
||||||
let mut lines = Vec::new();
|
let mut lines = Vec::new();
|
||||||
@@ -309,7 +251,6 @@ async fn prometheus_stats(
|
|||||||
push_pool_stats(&mut lines);
|
push_pool_stats(&mut lines);
|
||||||
push_server_stats(&mut lines);
|
push_server_stats(&mut lines);
|
||||||
push_database_stats(&mut lines);
|
push_database_stats(&mut lines);
|
||||||
lines.push("".to_string()); // Ensure to end the stats with a line terminator as required by the specification.
|
|
||||||
|
|
||||||
Response::builder()
|
Response::builder()
|
||||||
.header("content-type", "text/plain; version=0.0.4")
|
.header("content-type", "text/plain; version=0.0.4")
|
||||||
@@ -323,7 +264,6 @@ async fn prometheus_stats(
|
|||||||
|
|
||||||
// Adds metrics shown in a SHOW STATS admin command.
|
// Adds metrics shown in a SHOW STATS admin command.
|
||||||
fn push_address_stats(lines: &mut Vec<String>) {
|
fn push_address_stats(lines: &mut Vec<String>) {
|
||||||
let mut grouped_metrics: HashMap<String, Vec<PrometheusMetric<u64>>> = HashMap::new();
|
|
||||||
for (_, pool) in get_all_pools() {
|
for (_, pool) in get_all_pools() {
|
||||||
for shard in 0..pool.shards() {
|
for shard in 0..pool.shards() {
|
||||||
for server in 0..pool.servers(shard) {
|
for server in 0..pool.servers(shard) {
|
||||||
@@ -333,10 +273,7 @@ fn push_address_stats(lines: &mut Vec<String>) {
|
|||||||
if let Some(prometheus_metric) =
|
if let Some(prometheus_metric) =
|
||||||
PrometheusMetric::<u64>::from_address(address, &key, value)
|
PrometheusMetric::<u64>::from_address(address, &key, value)
|
||||||
{
|
{
|
||||||
grouped_metrics
|
lines.push(prometheus_metric.to_string());
|
||||||
.entry(key)
|
|
||||||
.or_default()
|
|
||||||
.push(prometheus_metric);
|
|
||||||
} else {
|
} else {
|
||||||
debug!("Metric {} not implemented for {}", key, address.name());
|
debug!("Metric {} not implemented for {}", key, address.name());
|
||||||
}
|
}
|
||||||
@@ -344,53 +281,33 @@ fn push_address_stats(lines: &mut Vec<String>) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
for (_key, metrics) in grouped_metrics {
|
|
||||||
if !metrics.is_empty() {
|
|
||||||
lines.push(metrics[0].get_header());
|
|
||||||
for metric in metrics {
|
|
||||||
lines.push(metric.to_string());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Adds relevant metrics shown in a SHOW POOLS admin command.
|
// Adds relevant metrics shown in a SHOW POOLS admin command.
|
||||||
fn push_pool_stats(lines: &mut Vec<String>) {
|
fn push_pool_stats(lines: &mut Vec<String>) {
|
||||||
let mut grouped_metrics: HashMap<String, Vec<PrometheusMetric<u64>>> = HashMap::new();
|
|
||||||
let pool_stats = PoolStats::construct_pool_lookup();
|
let pool_stats = PoolStats::construct_pool_lookup();
|
||||||
for (pool_id, stats) in pool_stats.iter() {
|
for (pool_id, stats) in pool_stats.iter() {
|
||||||
for (name, value) in stats.clone() {
|
for (name, value) in stats.clone() {
|
||||||
if let Some(prometheus_metric) =
|
if let Some(prometheus_metric) =
|
||||||
PrometheusMetric::<u64>::from_pool(pool_id.clone(), &name, value)
|
PrometheusMetric::<u64>::from_pool(pool_id.clone(), &name, value)
|
||||||
{
|
{
|
||||||
grouped_metrics
|
lines.push(prometheus_metric.to_string());
|
||||||
.entry(name)
|
|
||||||
.or_default()
|
|
||||||
.push(prometheus_metric);
|
|
||||||
} else {
|
} else {
|
||||||
debug!("Metric {} not implemented for ({})", name, *pool_id);
|
debug!("Metric {} not implemented for ({})", name, *pool_id);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
for (_key, metrics) in grouped_metrics {
|
|
||||||
if !metrics.is_empty() {
|
|
||||||
lines.push(metrics[0].get_header());
|
|
||||||
for metric in metrics {
|
|
||||||
lines.push(metric.to_string());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Adds relevant metrics shown in a SHOW DATABASES admin command.
|
// Adds relevant metrics shown in a SHOW DATABASES admin command.
|
||||||
fn push_database_stats(lines: &mut Vec<String>) {
|
fn push_database_stats(lines: &mut Vec<String>) {
|
||||||
let mut grouped_metrics: HashMap<String, Vec<PrometheusMetric<u32>>> = HashMap::new();
|
|
||||||
for (_, pool) in get_all_pools() {
|
for (_, pool) in get_all_pools() {
|
||||||
let pool_config = pool.settings.clone();
|
let pool_config = pool.settings.clone();
|
||||||
for shard in 0..pool.shards() {
|
for shard in 0..pool.shards() {
|
||||||
for server in 0..pool.servers(shard) {
|
for server in 0..pool.servers(shard) {
|
||||||
let address = pool.address(shard, server);
|
let address = pool.address(shard, server);
|
||||||
let pool_state = pool.pool_state(shard, server);
|
let pool_state = pool.pool_state(shard, server);
|
||||||
|
|
||||||
let metrics = vec![
|
let metrics = vec![
|
||||||
("pool_size", pool_config.user.pool_size),
|
("pool_size", pool_config.user.pool_size),
|
||||||
("current_connections", pool_state.connections),
|
("current_connections", pool_state.connections),
|
||||||
@@ -399,10 +316,7 @@ fn push_database_stats(lines: &mut Vec<String>) {
|
|||||||
if let Some(prometheus_metric) =
|
if let Some(prometheus_metric) =
|
||||||
PrometheusMetric::<u32>::from_database_info(address, key, value)
|
PrometheusMetric::<u32>::from_database_info(address, key, value)
|
||||||
{
|
{
|
||||||
grouped_metrics
|
lines.push(prometheus_metric.to_string());
|
||||||
.entry(key.to_string())
|
|
||||||
.or_default()
|
|
||||||
.push(prometheus_metric);
|
|
||||||
} else {
|
} else {
|
||||||
debug!("Metric {} not implemented for {}", key, address.name());
|
debug!("Metric {} not implemented for {}", key, address.name());
|
||||||
}
|
}
|
||||||
@@ -410,73 +324,45 @@ fn push_database_stats(lines: &mut Vec<String>) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
for (_key, metrics) in grouped_metrics {
|
|
||||||
if !metrics.is_empty() {
|
|
||||||
lines.push(metrics[0].get_header());
|
|
||||||
for metric in metrics {
|
|
||||||
lines.push(metric.to_string());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Adds relevant metrics shown in a SHOW SERVERS admin command.
|
// Adds relevant metrics shown in a SHOW SERVERS admin command.
|
||||||
fn push_server_stats(lines: &mut Vec<String>) {
|
fn push_server_stats(lines: &mut Vec<String>) {
|
||||||
let server_stats = get_server_stats();
|
let server_stats = get_server_stats();
|
||||||
let mut prom_stats = HashMap::<String, ServerPrometheusStats>::new();
|
let mut server_stats_by_addresses = HashMap::<String, Arc<ServerStats>>::new();
|
||||||
for (_, stats) in server_stats {
|
for (_, stats) in server_stats {
|
||||||
let entry = prom_stats
|
server_stats_by_addresses.insert(stats.address_name(), stats);
|
||||||
.entry(stats.address_name())
|
|
||||||
.or_insert(ServerPrometheusStats {
|
|
||||||
bytes_received: 0,
|
|
||||||
bytes_sent: 0,
|
|
||||||
transaction_count: 0,
|
|
||||||
query_count: 0,
|
|
||||||
error_count: 0,
|
|
||||||
active_count: 0,
|
|
||||||
idle_count: 0,
|
|
||||||
login_count: 0,
|
|
||||||
tested_count: 0,
|
|
||||||
});
|
|
||||||
entry.bytes_received += stats.bytes_received.load(Ordering::Relaxed);
|
|
||||||
entry.bytes_sent += stats.bytes_sent.load(Ordering::Relaxed);
|
|
||||||
entry.transaction_count += stats.transaction_count.load(Ordering::Relaxed);
|
|
||||||
entry.query_count += stats.query_count.load(Ordering::Relaxed);
|
|
||||||
entry.error_count += stats.error_count.load(Ordering::Relaxed);
|
|
||||||
match stats.state.load(Ordering::Relaxed) {
|
|
||||||
crate::stats::ServerState::Login => entry.login_count += 1,
|
|
||||||
crate::stats::ServerState::Active => entry.active_count += 1,
|
|
||||||
crate::stats::ServerState::Tested => entry.tested_count += 1,
|
|
||||||
crate::stats::ServerState::Idle => entry.idle_count += 1,
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
let mut grouped_metrics: HashMap<String, Vec<PrometheusMetric<u64>>> = HashMap::new();
|
|
||||||
for (_, pool) in get_all_pools() {
|
for (_, pool) in get_all_pools() {
|
||||||
for shard in 0..pool.shards() {
|
for shard in 0..pool.shards() {
|
||||||
for server in 0..pool.servers(shard) {
|
for server in 0..pool.servers(shard) {
|
||||||
let address = pool.address(shard, server);
|
let address = pool.address(shard, server);
|
||||||
if let Some(server_info) = prom_stats.get(&address.name()) {
|
if let Some(server_info) = server_stats_by_addresses.get(&address.name()) {
|
||||||
let metrics = [
|
let metrics = [
|
||||||
("bytes_received", server_info.bytes_received),
|
(
|
||||||
("bytes_sent", server_info.bytes_sent),
|
"bytes_received",
|
||||||
("transaction_count", server_info.transaction_count),
|
server_info.bytes_received.load(Ordering::Relaxed),
|
||||||
("query_count", server_info.query_count),
|
),
|
||||||
("error_count", server_info.error_count),
|
("bytes_sent", server_info.bytes_sent.load(Ordering::Relaxed)),
|
||||||
("idle_count", server_info.idle_count),
|
(
|
||||||
("active_count", server_info.active_count),
|
"transaction_count",
|
||||||
("login_count", server_info.login_count),
|
server_info.transaction_count.load(Ordering::Relaxed),
|
||||||
("tested_count", server_info.tested_count),
|
),
|
||||||
("is_banned", if pool.is_banned(address) { 1 } else { 0 }),
|
(
|
||||||
("is_paused", if pool.paused() { 1 } else { 0 }),
|
"query_count",
|
||||||
|
server_info.query_count.load(Ordering::Relaxed),
|
||||||
|
),
|
||||||
|
(
|
||||||
|
"error_count",
|
||||||
|
server_info.error_count.load(Ordering::Relaxed),
|
||||||
|
),
|
||||||
];
|
];
|
||||||
for (key, value) in metrics {
|
for (key, value) in metrics {
|
||||||
if let Some(prometheus_metric) =
|
if let Some(prometheus_metric) =
|
||||||
PrometheusMetric::<u64>::from_server_info(address, key, value)
|
PrometheusMetric::<u64>::from_server_info(address, key, value)
|
||||||
{
|
{
|
||||||
grouped_metrics
|
lines.push(prometheus_metric.to_string());
|
||||||
.entry(key.to_string())
|
|
||||||
.or_default()
|
|
||||||
.push(prometheus_metric);
|
|
||||||
} else {
|
} else {
|
||||||
debug!("Metric {} not implemented for {}", key, address.name());
|
debug!("Metric {} not implemented for {}", key, address.name());
|
||||||
}
|
}
|
||||||
@@ -485,46 +371,17 @@ fn push_server_stats(lines: &mut Vec<String>) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
for (_key, metrics) in grouped_metrics {
|
|
||||||
if !metrics.is_empty() {
|
|
||||||
lines.push(metrics[0].get_header());
|
|
||||||
for metric in metrics {
|
|
||||||
lines.push(metric.to_string());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub async fn start_metric_server(http_addr: SocketAddr) {
|
pub async fn start_metric_server(http_addr: SocketAddr) {
|
||||||
let listener = TcpListener::bind(http_addr);
|
let http_service_factory =
|
||||||
let listener = match listener.await {
|
make_service_fn(|_conn| async { Ok::<_, hyper::Error>(service_fn(prometheus_stats)) });
|
||||||
Ok(listener) => listener,
|
let server = Server::bind(&http_addr).serve(http_service_factory);
|
||||||
Err(e) => {
|
|
||||||
error!("Failed to bind prometheus server to HTTP address: {}.", e);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
info!(
|
info!(
|
||||||
"Exposing prometheus metrics on http://{}/metrics.",
|
"Exposing prometheus metrics on http://{}/metrics.",
|
||||||
http_addr
|
http_addr
|
||||||
);
|
);
|
||||||
loop {
|
if let Err(e) = server.await {
|
||||||
let stream = match listener.accept().await {
|
error!("Failed to run HTTP server: {}.", e);
|
||||||
Ok((stream, _)) => stream,
|
|
||||||
Err(e) => {
|
|
||||||
error!("Error accepting connection: {}", e);
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
let io = TokioIo::new(stream);
|
|
||||||
|
|
||||||
tokio::task::spawn(async move {
|
|
||||||
if let Err(err) = http1::Builder::new()
|
|
||||||
.serve_connection(io, service_fn(prometheus_stats))
|
|
||||||
.await
|
|
||||||
{
|
|
||||||
eprintln!("Error serving HTTP connection for metrics: {:?}", err);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -386,18 +386,6 @@ impl QueryRouter {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Determines if a query is a mutation or not.
|
|
||||||
fn is_mutation_query(q: &sqlparser::ast::Query) -> bool {
|
|
||||||
use sqlparser::ast::*;
|
|
||||||
|
|
||||||
match q.body.as_ref() {
|
|
||||||
SetExpr::Insert(_) => true,
|
|
||||||
SetExpr::Update(_) => true,
|
|
||||||
SetExpr::Query(q) => Self::is_mutation_query(q),
|
|
||||||
_ => false,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Try to infer which server to connect to based on the contents of the query.
|
/// Try to infer which server to connect to based on the contents of the query.
|
||||||
pub fn infer(&mut self, ast: &Vec<sqlparser::ast::Statement>) -> Result<(), Error> {
|
pub fn infer(&mut self, ast: &Vec<sqlparser::ast::Statement>) -> Result<(), Error> {
|
||||||
if !self.pool_settings.query_parser_read_write_splitting {
|
if !self.pool_settings.query_parser_read_write_splitting {
|
||||||
@@ -439,13 +427,8 @@ impl QueryRouter {
|
|||||||
None => (),
|
None => (),
|
||||||
};
|
};
|
||||||
|
|
||||||
let has_locks = !query.locks.is_empty();
|
|
||||||
let has_mutation = Self::is_mutation_query(query);
|
|
||||||
|
|
||||||
if has_locks || has_mutation {
|
|
||||||
self.active_role = Some(Role::Primary);
|
|
||||||
} else if !visited_write_statement {
|
|
||||||
// If we already visited a write statement, we should be going to the primary.
|
// If we already visited a write statement, we should be going to the primary.
|
||||||
|
if !visited_write_statement {
|
||||||
self.active_role = match self.primary_reads_enabled() {
|
self.active_role = match self.primary_reads_enabled() {
|
||||||
false => Some(Role::Replica), // If primary should not be receiving reads, use a replica.
|
false => Some(Role::Replica), // If primary should not be receiving reads, use a replica.
|
||||||
true => None, // Any server role is fine in this case.
|
true => None, // Any server role is fine in this case.
|
||||||
@@ -516,7 +499,6 @@ impl QueryRouter {
|
|||||||
table: _,
|
table: _,
|
||||||
on: _,
|
on: _,
|
||||||
returning: _,
|
returning: _,
|
||||||
ignore: _,
|
|
||||||
} => {
|
} => {
|
||||||
// Not supported in postgres.
|
// Not supported in postgres.
|
||||||
assert!(or.is_none());
|
assert!(or.is_none());
|
||||||
@@ -524,18 +506,14 @@ impl QueryRouter {
|
|||||||
assert!(after_columns.is_empty());
|
assert!(after_columns.is_empty());
|
||||||
|
|
||||||
Self::process_table(table_name, &mut table_names);
|
Self::process_table(table_name, &mut table_names);
|
||||||
if let Some(source) = source {
|
|
||||||
Self::process_query(source, &mut exprs, &mut table_names, &Some(columns));
|
Self::process_query(source, &mut exprs, &mut table_names, &Some(columns));
|
||||||
}
|
}
|
||||||
}
|
|
||||||
Delete {
|
Delete {
|
||||||
tables,
|
tables,
|
||||||
from,
|
from,
|
||||||
using,
|
using,
|
||||||
selection,
|
selection,
|
||||||
returning: _,
|
returning: _,
|
||||||
order_by: _,
|
|
||||||
limit: _,
|
|
||||||
} => {
|
} => {
|
||||||
if let Some(expr) = selection {
|
if let Some(expr) = selection {
|
||||||
exprs.push(expr.clone());
|
exprs.push(expr.clone());
|
||||||
@@ -1126,26 +1104,6 @@ mod test {
|
|||||||
assert_eq!(qr.role(), None);
|
assert_eq!(qr.role(), None);
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn test_split_cte_queries() {
|
|
||||||
QueryRouter::setup();
|
|
||||||
let mut qr = QueryRouter::new();
|
|
||||||
qr.pool_settings.query_parser_read_write_splitting = true;
|
|
||||||
qr.pool_settings.query_parser_enabled = true;
|
|
||||||
|
|
||||||
let query = simple_query(
|
|
||||||
"WITH t AS (
|
|
||||||
SELECT id FROM users WHERE name ILIKE '%ja%'
|
|
||||||
)
|
|
||||||
UPDATE user_languages
|
|
||||||
SET settings = '{}'
|
|
||||||
FROM t WHERE t.id = user_id;",
|
|
||||||
);
|
|
||||||
let ast = qr.parse(&query).unwrap();
|
|
||||||
assert!(qr.infer(&ast).is_ok());
|
|
||||||
assert_eq!(qr.role(), Some(Role::Primary));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_infer_replica() {
|
fn test_infer_replica() {
|
||||||
QueryRouter::setup();
|
QueryRouter::setup();
|
||||||
@@ -1195,29 +1153,6 @@ mod test {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn test_select_for_update() {
|
|
||||||
QueryRouter::setup();
|
|
||||||
let mut qr = QueryRouter::new();
|
|
||||||
qr.pool_settings.query_parser_read_write_splitting = true;
|
|
||||||
|
|
||||||
let queries_in_primary_role = vec![
|
|
||||||
simple_query("BEGIN"), // Transaction start
|
|
||||||
simple_query("SELECT * FROM items WHERE id = 5 FOR UPDATE"),
|
|
||||||
simple_query("UPDATE items SET name = 'pumpkin' WHERE id = 5"),
|
|
||||||
];
|
|
||||||
|
|
||||||
for query in queries_in_primary_role {
|
|
||||||
assert!(qr.infer(&qr.parse(&query).unwrap()).is_ok());
|
|
||||||
assert_eq!(qr.role(), Some(Role::Primary));
|
|
||||||
}
|
|
||||||
|
|
||||||
// query without lock do not change role
|
|
||||||
let query = simple_query("SELECT * FROM items WHERE id = 5");
|
|
||||||
assert!(qr.infer(&qr.parse(&query).unwrap()).is_ok());
|
|
||||||
assert_eq!(qr.role(), None);
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_infer_primary_reads_enabled() {
|
fn test_infer_primary_reads_enabled() {
|
||||||
QueryRouter::setup();
|
QueryRouter::setup();
|
||||||
@@ -1432,19 +1367,6 @@ mod test {
|
|||||||
assert!(!qr.query_parser_enabled());
|
assert!(!qr.query_parser_enabled());
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn test_query_parser() {
|
|
||||||
QueryRouter::setup();
|
|
||||||
let mut qr = QueryRouter::new();
|
|
||||||
qr.pool_settings.query_parser_read_write_splitting = true;
|
|
||||||
|
|
||||||
let query = simple_query("SELECT req_tab_0.* FROM validation req_tab_0 WHERE array['http://www.w3.org/ns/shacl#ValidationResult'] && req_tab_0.type::text[] AND ( ( (req_tab_0.focusnode = 'DataSource_Credilogic_DataSourceAddress_144959227') ) )");
|
|
||||||
assert!(qr.infer(&qr.parse(&query).unwrap()).is_ok());
|
|
||||||
|
|
||||||
let query = simple_query("WITH EmployeeSalaries AS (SELECT Department, Salary FROM Employees) SELECT Department, AVG(Salary) AS AverageSalary FROM EmployeeSalaries GROUP BY Department;");
|
|
||||||
assert!(qr.infer(&qr.parse(&query).unwrap()).is_ok());
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_update_from_pool_settings() {
|
fn test_update_from_pool_settings() {
|
||||||
QueryRouter::setup();
|
QueryRouter::setup();
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ use lru::LruCache;
|
|||||||
use once_cell::sync::Lazy;
|
use once_cell::sync::Lazy;
|
||||||
use parking_lot::{Mutex, RwLock};
|
use parking_lot::{Mutex, RwLock};
|
||||||
use postgres_protocol::message;
|
use postgres_protocol::message;
|
||||||
use std::collections::{HashMap, HashSet, VecDeque};
|
use std::collections::{HashMap, HashSet};
|
||||||
use std::mem;
|
use std::mem;
|
||||||
use std::net::IpAddr;
|
use std::net::IpAddr;
|
||||||
use std::num::NonZeroUsize;
|
use std::num::NonZeroUsize;
|
||||||
@@ -325,9 +325,6 @@ pub struct Server {
|
|||||||
|
|
||||||
/// Prepared statements
|
/// Prepared statements
|
||||||
prepared_statement_cache: Option<LruCache<String, ()>>,
|
prepared_statement_cache: Option<LruCache<String, ()>>,
|
||||||
|
|
||||||
/// Prepared statement being currently registered on the server.
|
|
||||||
registering_prepared_statement: VecDeque<String>,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Server {
|
impl Server {
|
||||||
@@ -830,7 +827,6 @@ impl Server {
|
|||||||
NonZeroUsize::new(prepared_statement_cache_size).unwrap(),
|
NonZeroUsize::new(prepared_statement_cache_size).unwrap(),
|
||||||
)),
|
)),
|
||||||
},
|
},
|
||||||
registering_prepared_statement: VecDeque::new(),
|
|
||||||
};
|
};
|
||||||
|
|
||||||
return Ok(server);
|
return Ok(server);
|
||||||
@@ -960,6 +956,7 @@ impl Server {
|
|||||||
|
|
||||||
// There is no more data available from the server.
|
// There is no more data available from the server.
|
||||||
self.data_available = false;
|
self.data_available = false;
|
||||||
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -969,23 +966,6 @@ impl Server {
|
|||||||
self.in_copy_mode = false;
|
self.in_copy_mode = false;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Remove the prepared statement from the cache, it has a syntax error or something else bad happened.
|
|
||||||
if let Some(prepared_stmt_name) =
|
|
||||||
self.registering_prepared_statement.pop_front()
|
|
||||||
{
|
|
||||||
if let Some(ref mut cache) = self.prepared_statement_cache {
|
|
||||||
if let Some(_removed) = cache.pop(&prepared_stmt_name) {
|
|
||||||
debug!(
|
|
||||||
"Removed {} from prepared statement cache",
|
|
||||||
prepared_stmt_name
|
|
||||||
);
|
|
||||||
} else {
|
|
||||||
// Shouldn't happen.
|
|
||||||
debug!("Prepared statement {} was not cached", prepared_stmt_name);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if self.prepared_statement_cache.is_some() {
|
if self.prepared_statement_cache.is_some() {
|
||||||
let error_message = PgErrorMsg::parse(&message)?;
|
let error_message = PgErrorMsg::parse(&message)?;
|
||||||
if error_message.message == "cached plan must not change result type" {
|
if error_message.message == "cached plan must not change result type" {
|
||||||
@@ -1088,11 +1068,6 @@ impl Server {
|
|||||||
// Buffer until ReadyForQuery shows up, so don't exit the loop yet.
|
// Buffer until ReadyForQuery shows up, so don't exit the loop yet.
|
||||||
'c' => (),
|
'c' => (),
|
||||||
|
|
||||||
// Parse complete successfully
|
|
||||||
'1' => {
|
|
||||||
self.registering_prepared_statement.pop_front();
|
|
||||||
}
|
|
||||||
|
|
||||||
// Anything else, e.g. errors, notices, etc.
|
// Anything else, e.g. errors, notices, etc.
|
||||||
// Keep buffering until ReadyForQuery shows up.
|
// Keep buffering until ReadyForQuery shows up.
|
||||||
_ => (),
|
_ => (),
|
||||||
@@ -1132,7 +1107,7 @@ impl Server {
|
|||||||
has_it
|
has_it
|
||||||
}
|
}
|
||||||
|
|
||||||
fn add_prepared_statement_to_cache(&mut self, name: &str) -> Option<String> {
|
pub fn add_prepared_statement_to_cache(&mut self, name: &str) -> Option<String> {
|
||||||
let cache = match &mut self.prepared_statement_cache {
|
let cache = match &mut self.prepared_statement_cache {
|
||||||
Some(cache) => cache,
|
Some(cache) => cache,
|
||||||
None => return None,
|
None => return None,
|
||||||
@@ -1154,7 +1129,7 @@ impl Server {
|
|||||||
None
|
None
|
||||||
}
|
}
|
||||||
|
|
||||||
fn remove_prepared_statement_from_cache(&mut self, name: &str) {
|
pub fn remove_prepared_statement_from_cache(&mut self, name: &str) {
|
||||||
let cache = match &mut self.prepared_statement_cache {
|
let cache = match &mut self.prepared_statement_cache {
|
||||||
Some(cache) => cache,
|
Some(cache) => cache,
|
||||||
None => return,
|
None => return,
|
||||||
@@ -1170,9 +1145,6 @@ impl Server {
|
|||||||
should_send_parse_to_server: bool,
|
should_send_parse_to_server: bool,
|
||||||
) -> Result<(), Error> {
|
) -> Result<(), Error> {
|
||||||
if !self.has_prepared_statement(&parse.name) {
|
if !self.has_prepared_statement(&parse.name) {
|
||||||
self.registering_prepared_statement
|
|
||||||
.push_back(parse.name.clone());
|
|
||||||
|
|
||||||
let mut bytes = BytesMut::new();
|
let mut bytes = BytesMut::new();
|
||||||
|
|
||||||
if should_send_parse_to_server {
|
if should_send_parse_to_server {
|
||||||
@@ -1204,14 +1176,8 @@ impl Server {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
// If it's not there, something went bad, I'm guessing bad syntax or permissions error
|
|
||||||
// on the server.
|
|
||||||
if !self.has_prepared_statement(&parse.name) {
|
|
||||||
Err(Error::PreparedStatementError)
|
|
||||||
} else {
|
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
/// If the server is still inside a transaction.
|
/// If the server is still inside a transaction.
|
||||||
/// If the client disconnects while the server is in a transaction, we will clean it up.
|
/// If the client disconnects while the server is in a transaction, we will clean it up.
|
||||||
@@ -1220,7 +1186,6 @@ impl Server {
|
|||||||
self.in_transaction
|
self.in_transaction
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Currently copying data from client to server or vice-versa.
|
|
||||||
pub fn in_copy_mode(&self) -> bool {
|
pub fn in_copy_mode(&self) -> bool {
|
||||||
self.in_copy_mode
|
self.in_copy_mode
|
||||||
}
|
}
|
||||||
@@ -1279,8 +1244,8 @@ impl Server {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/// Indicate that this server connection cannot be re-used and must be discarded.
|
/// Indicate that this server connection cannot be re-used and must be discarded.
|
||||||
pub fn mark_bad(&mut self, reason: &str) {
|
pub fn mark_bad(&mut self) {
|
||||||
error!("Server {:?} marked bad, reason: {}", self.address, reason);
|
error!("Server {:?} marked bad", self.address);
|
||||||
self.bad = true;
|
self.bad = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -14,11 +14,11 @@ pub enum ShardingFunction {
|
|||||||
Sha1,
|
Sha1,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl std::fmt::Display for ShardingFunction {
|
impl ToString for ShardingFunction {
|
||||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
fn to_string(&self) -> String {
|
||||||
match self {
|
match *self {
|
||||||
ShardingFunction::PgBigintHash => write!(f, "pg_bigint_hash"),
|
ShardingFunction::PgBigintHash => "pg_bigint_hash".to_string(),
|
||||||
ShardingFunction::Sha1 => write!(f, "sha1"),
|
ShardingFunction::Sha1 => "sha1".to_string(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -41,11 +41,6 @@ pub struct ClientStats {
|
|||||||
/// Maximum time spent waiting for a connection from pool, measures in microseconds
|
/// Maximum time spent waiting for a connection from pool, measures in microseconds
|
||||||
pub max_wait_time: Arc<AtomicU64>,
|
pub max_wait_time: Arc<AtomicU64>,
|
||||||
|
|
||||||
// Time when the client started waiting for a connection from pool, measures in microseconds
|
|
||||||
// We use connect_time as the reference point for this value
|
|
||||||
// U64 can represent ~5850 centuries in microseconds, so we should be fine
|
|
||||||
pub wait_start_us: Arc<AtomicU64>,
|
|
||||||
|
|
||||||
/// Current state of the client
|
/// Current state of the client
|
||||||
pub state: Arc<AtomicClientState>,
|
pub state: Arc<AtomicClientState>,
|
||||||
|
|
||||||
@@ -69,7 +64,6 @@ impl Default for ClientStats {
|
|||||||
pool_name: String::new(),
|
pool_name: String::new(),
|
||||||
total_wait_time: Arc::new(AtomicU64::new(0)),
|
total_wait_time: Arc::new(AtomicU64::new(0)),
|
||||||
max_wait_time: Arc::new(AtomicU64::new(0)),
|
max_wait_time: Arc::new(AtomicU64::new(0)),
|
||||||
wait_start_us: Arc::new(AtomicU64::new(0)),
|
|
||||||
state: Arc::new(AtomicClientState::new(ClientState::Idle)),
|
state: Arc::new(AtomicClientState::new(ClientState::Idle)),
|
||||||
transaction_count: Arc::new(AtomicU64::new(0)),
|
transaction_count: Arc::new(AtomicU64::new(0)),
|
||||||
query_count: Arc::new(AtomicU64::new(0)),
|
query_count: Arc::new(AtomicU64::new(0)),
|
||||||
@@ -117,9 +111,6 @@ impl ClientStats {
|
|||||||
|
|
||||||
/// Reports a client is waiting for a connection
|
/// Reports a client is waiting for a connection
|
||||||
pub fn waiting(&self) {
|
pub fn waiting(&self) {
|
||||||
let wait_start = self.connect_time.elapsed().as_micros() as u64;
|
|
||||||
|
|
||||||
self.wait_start_us.store(wait_start, Ordering::Relaxed);
|
|
||||||
self.state.store(ClientState::Waiting, Ordering::Relaxed);
|
self.state.store(ClientState::Waiting, Ordering::Relaxed);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -131,13 +122,6 @@ impl ClientStats {
|
|||||||
/// Reports a client has failed to obtain a connection from a connection pool
|
/// Reports a client has failed to obtain a connection from a connection pool
|
||||||
pub fn checkout_error(&self) {
|
pub fn checkout_error(&self) {
|
||||||
self.state.store(ClientState::Idle, Ordering::Relaxed);
|
self.state.store(ClientState::Idle, Ordering::Relaxed);
|
||||||
self.update_wait_times();
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Reports a client has succeeded in obtaining a connection from a connection pool
|
|
||||||
pub fn checkout_success(&self) {
|
|
||||||
self.state.store(ClientState::Active, Ordering::Relaxed);
|
|
||||||
self.update_wait_times();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Reports a client has had the server assigned to it be banned
|
/// Reports a client has had the server assigned to it be banned
|
||||||
@@ -146,26 +130,12 @@ impl ClientStats {
|
|||||||
self.error_count.fetch_add(1, Ordering::Relaxed);
|
self.error_count.fetch_add(1, Ordering::Relaxed);
|
||||||
}
|
}
|
||||||
|
|
||||||
fn update_wait_times(&self) {
|
/// Reporters the time spent by a client waiting to get a healthy connection from the pool
|
||||||
if self.wait_start_us.load(Ordering::Relaxed) == 0 {
|
pub fn checkout_time(&self, microseconds: u64) {
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
let wait_time_us = self.get_current_wait_time_us();
|
|
||||||
self.total_wait_time
|
self.total_wait_time
|
||||||
.fetch_add(wait_time_us, Ordering::Relaxed);
|
.fetch_add(microseconds, Ordering::Relaxed);
|
||||||
self.max_wait_time
|
self.max_wait_time
|
||||||
.fetch_max(wait_time_us, Ordering::Relaxed);
|
.fetch_max(microseconds, Ordering::Relaxed);
|
||||||
self.wait_start_us.store(0, Ordering::Relaxed);
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn get_current_wait_time_us(&self) -> u64 {
|
|
||||||
let wait_start_us = self.wait_start_us.load(Ordering::Relaxed);
|
|
||||||
let microseconds_since_connection_epoch = self.connect_time.elapsed().as_micros() as u64;
|
|
||||||
if wait_start_us == 0 || microseconds_since_connection_epoch < wait_start_us {
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
microseconds_since_connection_epoch - wait_start_us
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Report a query executed by a client against a server
|
/// Report a query executed by a client against a server
|
||||||
|
|||||||
@@ -64,11 +64,8 @@ impl PoolStats {
|
|||||||
ClientState::Idle => pool_stats.cl_idle += 1,
|
ClientState::Idle => pool_stats.cl_idle += 1,
|
||||||
ClientState::Waiting => pool_stats.cl_waiting += 1,
|
ClientState::Waiting => pool_stats.cl_waiting += 1,
|
||||||
}
|
}
|
||||||
let wait_start_us = client.wait_start_us.load(Ordering::Relaxed);
|
let max_wait = client.max_wait_time.load(Ordering::Relaxed);
|
||||||
if wait_start_us > 0 {
|
pool_stats.maxwait = std::cmp::max(pool_stats.maxwait, max_wait);
|
||||||
let wait_time_us = client.get_current_wait_time_us();
|
|
||||||
pool_stats.maxwait = std::cmp::max(pool_stats.maxwait, wait_time_us);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
None => debug!("Client from an obselete pool"),
|
None => debug!("Client from an obselete pool"),
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,34 +0,0 @@
|
|||||||
GREEN="\033[0;32m"
|
|
||||||
RED="\033[0;31m"
|
|
||||||
BLUE="\033[0;34m"
|
|
||||||
RESET="\033[0m"
|
|
||||||
|
|
||||||
|
|
||||||
cd tests/docker/
|
|
||||||
docker compose kill main || true
|
|
||||||
docker compose build main
|
|
||||||
docker compose down
|
|
||||||
docker compose up -d
|
|
||||||
# wait for the container to start
|
|
||||||
while ! docker compose exec main ls; do
|
|
||||||
echo "Waiting for test environment to start"
|
|
||||||
sleep 1
|
|
||||||
done
|
|
||||||
echo "==================================="
|
|
||||||
docker compose exec -e LOG_LEVEL=error -d main toxiproxy-server
|
|
||||||
docker compose exec --workdir /app main cargo build
|
|
||||||
docker compose exec -d --workdir /app main ./target/debug/pgcat ./.circleci/pgcat.toml
|
|
||||||
docker compose exec --workdir /app/tests/ruby main bundle install
|
|
||||||
docker compose exec --workdir /app/tests/python main pip3 install -r requirements.txt
|
|
||||||
echo "Interactive test environment ready"
|
|
||||||
echo "To run integration tests, you can use the following commands:"
|
|
||||||
echo -e " ${BLUE}Ruby: ${RED}cd /app/tests/ruby && bundle exec ruby tests.rb --format documentation${RESET}"
|
|
||||||
echo -e " ${BLUE}Python: ${RED}cd /app/ && pytest ${RESET}"
|
|
||||||
echo -e " ${BLUE}Rust: ${RED}cd /app/tests/rust && cargo run ${RESET}"
|
|
||||||
echo -e " ${BLUE}Go: ${RED}cd /app/tests/go && /usr/local/go/bin/go test${RESET}"
|
|
||||||
echo "the source code for tests are directly linked to the source code in the container so you can modify the code and run the tests again"
|
|
||||||
echo "You can rebuild PgCat from within the container by running"
|
|
||||||
echo -e " ${GREEN}cargo build${RESET}"
|
|
||||||
echo "and then run the tests again"
|
|
||||||
echo "==================================="
|
|
||||||
docker compose exec --workdir /app/tests main bash
|
|
||||||
@@ -8,6 +8,3 @@ RUN rustup component add llvm-tools-preview
|
|||||||
RUN sudo gem install bundler
|
RUN sudo gem install bundler
|
||||||
RUN wget -O toxiproxy-2.4.0.deb https://github.com/Shopify/toxiproxy/releases/download/v2.4.0/toxiproxy_2.4.0_linux_$(dpkg --print-architecture).deb && \
|
RUN wget -O toxiproxy-2.4.0.deb https://github.com/Shopify/toxiproxy/releases/download/v2.4.0/toxiproxy_2.4.0_linux_$(dpkg --print-architecture).deb && \
|
||||||
sudo dpkg -i toxiproxy-2.4.0.deb
|
sudo dpkg -i toxiproxy-2.4.0.deb
|
||||||
RUN wget -O go1.21.3.linux-$(dpkg --print-architecture).tar.gz https://go.dev/dl/go1.21.3.linux-$(dpkg --print-architecture).tar.gz && \
|
|
||||||
sudo tar -C /usr/local -xzf go1.21.3.linux-$(dpkg --print-architecture).tar.gz && \
|
|
||||||
rm go1.21.3.linux-$(dpkg --print-architecture).tar.gz
|
|
||||||
|
|||||||
@@ -1,3 +1,4 @@
|
|||||||
|
version: "3"
|
||||||
services:
|
services:
|
||||||
pg1:
|
pg1:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
@@ -47,8 +48,6 @@ services:
|
|||||||
main:
|
main:
|
||||||
build: .
|
build: .
|
||||||
command: ["bash", "/app/tests/docker/run.sh"]
|
command: ["bash", "/app/tests/docker/run.sh"]
|
||||||
environment:
|
|
||||||
- INTERACTIVE_TEST_ENVIRONMENT=true
|
|
||||||
volumes:
|
volumes:
|
||||||
- ../../:/app/
|
- ../../:/app/
|
||||||
- /app/target/
|
- /app/target/
|
||||||
|
|||||||
@@ -5,38 +5,6 @@ rm /app/*.profraw || true
|
|||||||
rm /app/pgcat.profdata || true
|
rm /app/pgcat.profdata || true
|
||||||
rm -rf /app/cov || true
|
rm -rf /app/cov || true
|
||||||
|
|
||||||
# Prepares the interactive test environment
|
|
||||||
#
|
|
||||||
if [ -n "$INTERACTIVE_TEST_ENVIRONMENT" ]; then
|
|
||||||
ports=(5432 7432 8432 9432 10432)
|
|
||||||
for port in "${ports[@]}"; do
|
|
||||||
is_it_up=0
|
|
||||||
attempts=0
|
|
||||||
while [ $is_it_up -eq 0 ]; do
|
|
||||||
PGPASSWORD=postgres psql -h 127.0.0.1 -p $port -U postgres -c '\q' > /dev/null 2>&1
|
|
||||||
if [ $? -eq 0 ]; then
|
|
||||||
echo "PostgreSQL on port $port is up."
|
|
||||||
is_it_up=1
|
|
||||||
else
|
|
||||||
attempts=$((attempts+1))
|
|
||||||
if [ $attempts -gt 10 ]; then
|
|
||||||
echo "PostgreSQL on port $port is down, giving up."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
echo "PostgreSQL on port $port is down, waiting for it to start."
|
|
||||||
sleep 1
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
done
|
|
||||||
PGPASSWORD=postgres psql -e -h 127.0.0.1 -p 5432 -U postgres -f /app/tests/sharding/query_routing_setup.sql
|
|
||||||
PGPASSWORD=postgres psql -e -h 127.0.0.1 -p 7432 -U postgres -f /app/tests/sharding/query_routing_setup.sql
|
|
||||||
PGPASSWORD=postgres psql -e -h 127.0.0.1 -p 8432 -U postgres -f /app/tests/sharding/query_routing_setup.sql
|
|
||||||
PGPASSWORD=postgres psql -e -h 127.0.0.1 -p 9432 -U postgres -f /app/tests/sharding/query_routing_setup.sql
|
|
||||||
PGPASSWORD=postgres psql -e -h 127.0.0.1 -p 10432 -U postgres -f /app/tests/sharding/query_routing_setup.sql
|
|
||||||
sleep 100000000000000000
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
|
|
||||||
export LLVM_PROFILE_FILE="/app/pgcat-%m-%p.profraw"
|
export LLVM_PROFILE_FILE="/app/pgcat-%m-%p.profraw"
|
||||||
export RUSTC_BOOTSTRAP=1
|
export RUSTC_BOOTSTRAP=1
|
||||||
export CARGO_INCREMENTAL=0
|
export CARGO_INCREMENTAL=0
|
||||||
|
|||||||
@@ -1,5 +0,0 @@
|
|||||||
module pgcat
|
|
||||||
|
|
||||||
go 1.21
|
|
||||||
|
|
||||||
require github.com/lib/pq v1.10.9
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
github.com/lib/pq v1.10.9 h1:YXG7RB+JIjhP29X+OtkiDnYaXQwpS4JEWq7dtCCRUEw=
|
|
||||||
github.com/lib/pq v1.10.9/go.mod h1:AlVN5x4E4T544tWzH6hKfbfQvm3HdbOxrmggDNAPY9o=
|
|
||||||
@@ -1,162 +0,0 @@
|
|||||||
#
|
|
||||||
# PgCat config example.
|
|
||||||
#
|
|
||||||
|
|
||||||
#
|
|
||||||
# General pooler settings
|
|
||||||
[general]
|
|
||||||
# What IP to run on, 0.0.0.0 means accessible from everywhere.
|
|
||||||
host = "0.0.0.0"
|
|
||||||
|
|
||||||
# Port to run on, same as PgBouncer used in this example.
|
|
||||||
port = "${PORT}"
|
|
||||||
|
|
||||||
# Whether to enable prometheus exporter or not.
|
|
||||||
enable_prometheus_exporter = true
|
|
||||||
|
|
||||||
# Port at which prometheus exporter listens on.
|
|
||||||
prometheus_exporter_port = 9930
|
|
||||||
|
|
||||||
# How long to wait before aborting a server connection (ms).
|
|
||||||
connect_timeout = 1000
|
|
||||||
|
|
||||||
# How much time to give the health check query to return with a result (ms).
|
|
||||||
healthcheck_timeout = 1000
|
|
||||||
|
|
||||||
# How long to keep connection available for immediate re-use, without running a healthcheck query on it
|
|
||||||
healthcheck_delay = 30000
|
|
||||||
|
|
||||||
# How much time to give clients during shutdown before forcibly killing client connections (ms).
|
|
||||||
shutdown_timeout = 5000
|
|
||||||
|
|
||||||
# For how long to ban a server if it fails a health check (seconds).
|
|
||||||
ban_time = 60 # Seconds
|
|
||||||
|
|
||||||
# If we should log client connections
|
|
||||||
log_client_connections = false
|
|
||||||
|
|
||||||
# If we should log client disconnections
|
|
||||||
log_client_disconnections = false
|
|
||||||
|
|
||||||
# Reload config automatically if it changes.
|
|
||||||
autoreload = 15000
|
|
||||||
|
|
||||||
server_round_robin = false
|
|
||||||
|
|
||||||
# TLS
|
|
||||||
tls_certificate = "../../.circleci/server.cert"
|
|
||||||
tls_private_key = "../../.circleci/server.key"
|
|
||||||
|
|
||||||
# Credentials to access the virtual administrative database (pgbouncer or pgcat)
|
|
||||||
# Connecting to that database allows running commands like `SHOW POOLS`, `SHOW DATABASES`, etc..
|
|
||||||
admin_username = "admin_user"
|
|
||||||
admin_password = "admin_pass"
|
|
||||||
|
|
||||||
# pool
|
|
||||||
# configs are structured as pool.<pool_name>
|
|
||||||
# the pool_name is what clients use as database name when connecting
|
|
||||||
# For the example below a client can connect using "postgres://sharding_user:sharding_user@pgcat_host:pgcat_port/sharded_db"
|
|
||||||
[pools.sharded_db]
|
|
||||||
# Pool mode (see PgBouncer docs for more).
|
|
||||||
# session: one server connection per connected client
|
|
||||||
# transaction: one server connection per client transaction
|
|
||||||
pool_mode = "transaction"
|
|
||||||
|
|
||||||
# If the client doesn't specify, route traffic to
|
|
||||||
# this role by default.
|
|
||||||
#
|
|
||||||
# any: round-robin between primary and replicas,
|
|
||||||
# replica: round-robin between replicas only without touching the primary,
|
|
||||||
# primary: all queries go to the primary unless otherwise specified.
|
|
||||||
default_role = "any"
|
|
||||||
|
|
||||||
# Query parser. If enabled, we'll attempt to parse
|
|
||||||
# every incoming query to determine if it's a read or a write.
|
|
||||||
# If it's a read query, we'll direct it to a replica. Otherwise, if it's a write,
|
|
||||||
# we'll direct it to the primary.
|
|
||||||
query_parser_enabled = true
|
|
||||||
|
|
||||||
# If the query parser is enabled and this setting is enabled, we'll attempt to
|
|
||||||
# infer the role from the query itself.
|
|
||||||
query_parser_read_write_splitting = true
|
|
||||||
|
|
||||||
# If the query parser is enabled and this setting is enabled, the primary will be part of the pool of databases used for
|
|
||||||
# load balancing of read queries. Otherwise, the primary will only be used for write
|
|
||||||
# queries. The primary can always be explicitely selected with our custom protocol.
|
|
||||||
primary_reads_enabled = true
|
|
||||||
|
|
||||||
# So what if you wanted to implement a different hashing function,
|
|
||||||
# or you've already built one and you want this pooler to use it?
|
|
||||||
#
|
|
||||||
# Current options:
|
|
||||||
#
|
|
||||||
# pg_bigint_hash: PARTITION BY HASH (Postgres hashing function)
|
|
||||||
# sha1: A hashing function based on SHA1
|
|
||||||
#
|
|
||||||
sharding_function = "pg_bigint_hash"
|
|
||||||
|
|
||||||
# Prepared statements cache size.
|
|
||||||
prepared_statements_cache_size = 500
|
|
||||||
|
|
||||||
# Credentials for users that may connect to this cluster
|
|
||||||
[pools.sharded_db.users.0]
|
|
||||||
username = "sharding_user"
|
|
||||||
password = "sharding_user"
|
|
||||||
# Maximum number of server connections that can be established for this user
|
|
||||||
# The maximum number of connection from a single Pgcat process to any database in the cluster
|
|
||||||
# is the sum of pool_size across all users.
|
|
||||||
pool_size = 5
|
|
||||||
statement_timeout = 0
|
|
||||||
|
|
||||||
|
|
||||||
[pools.sharded_db.users.1]
|
|
||||||
username = "other_user"
|
|
||||||
password = "other_user"
|
|
||||||
pool_size = 21
|
|
||||||
statement_timeout = 30000
|
|
||||||
|
|
||||||
# Shard 0
|
|
||||||
[pools.sharded_db.shards.0]
|
|
||||||
# [ host, port, role ]
|
|
||||||
servers = [
|
|
||||||
[ "127.0.0.1", 5432, "primary" ],
|
|
||||||
[ "localhost", 5432, "replica" ]
|
|
||||||
]
|
|
||||||
# Database name (e.g. "postgres")
|
|
||||||
database = "shard0"
|
|
||||||
|
|
||||||
[pools.sharded_db.shards.1]
|
|
||||||
servers = [
|
|
||||||
[ "127.0.0.1", 5432, "primary" ],
|
|
||||||
[ "localhost", 5432, "replica" ],
|
|
||||||
]
|
|
||||||
database = "shard1"
|
|
||||||
|
|
||||||
[pools.sharded_db.shards.2]
|
|
||||||
servers = [
|
|
||||||
[ "127.0.0.1", 5432, "primary" ],
|
|
||||||
[ "localhost", 5432, "replica" ],
|
|
||||||
]
|
|
||||||
database = "shard2"
|
|
||||||
|
|
||||||
|
|
||||||
[pools.simple_db]
|
|
||||||
pool_mode = "session"
|
|
||||||
default_role = "primary"
|
|
||||||
query_parser_enabled = true
|
|
||||||
query_parser_read_write_splitting = true
|
|
||||||
primary_reads_enabled = true
|
|
||||||
sharding_function = "pg_bigint_hash"
|
|
||||||
|
|
||||||
[pools.simple_db.users.0]
|
|
||||||
username = "simple_user"
|
|
||||||
password = "simple_user"
|
|
||||||
pool_size = 5
|
|
||||||
statement_timeout = 30000
|
|
||||||
|
|
||||||
[pools.simple_db.shards.0]
|
|
||||||
servers = [
|
|
||||||
[ "127.0.0.1", 5432, "primary" ],
|
|
||||||
[ "localhost", 5432, "replica" ]
|
|
||||||
]
|
|
||||||
database = "some_db"
|
|
||||||
@@ -1,52 +0,0 @@
|
|||||||
package pgcat
|
|
||||||
|
|
||||||
import (
|
|
||||||
"context"
|
|
||||||
"database/sql"
|
|
||||||
"fmt"
|
|
||||||
_ "github.com/lib/pq"
|
|
||||||
"testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
func Test(t *testing.T) {
|
|
||||||
t.Cleanup(setup(t))
|
|
||||||
t.Run("Named parameterized prepared statement works", namedParameterizedPreparedStatement)
|
|
||||||
t.Run("Unnamed parameterized prepared statement works", unnamedParameterizedPreparedStatement)
|
|
||||||
}
|
|
||||||
|
|
||||||
func namedParameterizedPreparedStatement(t *testing.T) {
|
|
||||||
db, err := sql.Open("postgres", fmt.Sprintf("host=localhost port=%d database=sharded_db user=sharding_user password=sharding_user sslmode=disable", port))
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not open connection: %+v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
stmt, err := db.Prepare("SELECT $1")
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not prepare: %+v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
for i := 0; i < 100; i++ {
|
|
||||||
rows, err := stmt.Query(1)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not query: %+v", err)
|
|
||||||
}
|
|
||||||
_ = rows.Close()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func unnamedParameterizedPreparedStatement(t *testing.T) {
|
|
||||||
db, err := sql.Open("postgres", fmt.Sprintf("host=localhost port=%d database=sharded_db user=sharding_user password=sharding_user sslmode=disable", port))
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not open connection: %+v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
for i := 0; i < 100; i++ {
|
|
||||||
// Under the hood QueryContext generates an unnamed parameterized prepared statement
|
|
||||||
rows, err := db.QueryContext(context.Background(), "SELECT $1", 1)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not query: %+v", err)
|
|
||||||
}
|
|
||||||
_ = rows.Close()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,81 +0,0 @@
|
|||||||
package pgcat
|
|
||||||
|
|
||||||
import (
|
|
||||||
"context"
|
|
||||||
"database/sql"
|
|
||||||
_ "embed"
|
|
||||||
"fmt"
|
|
||||||
"math/rand"
|
|
||||||
"os"
|
|
||||||
"os/exec"
|
|
||||||
"strings"
|
|
||||||
"testing"
|
|
||||||
"time"
|
|
||||||
)
|
|
||||||
|
|
||||||
//go:embed pgcat.toml
|
|
||||||
var pgcatCfg string
|
|
||||||
|
|
||||||
var port = rand.Intn(32760-20000) + 20000
|
|
||||||
|
|
||||||
func setup(t *testing.T) func() {
|
|
||||||
cfg, err := os.CreateTemp("/tmp", "pgcat_cfg_*.toml")
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not create temp file: %+v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
pgcatCfg = strings.Replace(pgcatCfg, "\"${PORT}\"", fmt.Sprintf("%d", port), 1)
|
|
||||||
|
|
||||||
_, err = cfg.Write([]byte(pgcatCfg))
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not write temp file: %+v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
commandPath := "../../target/debug/pgcat"
|
|
||||||
if os.Getenv("CARGO_TARGET_DIR") != "" {
|
|
||||||
commandPath = os.Getenv("CARGO_TARGET_DIR") + "/debug/pgcat"
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd := exec.Command(commandPath, cfg.Name())
|
|
||||||
cmd.Stdout = os.Stdout
|
|
||||||
cmd.Stderr = os.Stderr
|
|
||||||
go func() {
|
|
||||||
err = cmd.Run()
|
|
||||||
if err != nil {
|
|
||||||
t.Errorf("could not run pgcat: %+v", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
deadline, cancelFunc := context.WithDeadline(context.Background(), time.Now().Add(5*time.Second))
|
|
||||||
defer cancelFunc()
|
|
||||||
for {
|
|
||||||
select {
|
|
||||||
case <-deadline.Done():
|
|
||||||
break
|
|
||||||
case <-time.After(50 * time.Millisecond):
|
|
||||||
db, err := sql.Open("postgres", fmt.Sprintf("host=localhost port=%d database=pgcat user=admin_user password=admin_pass sslmode=disable", port))
|
|
||||||
if err != nil {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
rows, err := db.QueryContext(deadline, "SHOW STATS")
|
|
||||||
if err != nil {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
_ = rows.Close()
|
|
||||||
_ = db.Close()
|
|
||||||
break
|
|
||||||
}
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
return func() {
|
|
||||||
err := cmd.Process.Signal(os.Interrupt)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not interrupt pgcat: %+v", err)
|
|
||||||
}
|
|
||||||
err = os.Remove(cfg.Name())
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("could not remove temp file: %+v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,3 +1,2 @@
|
|||||||
pytest
|
|
||||||
psycopg2==2.9.3
|
psycopg2==2.9.3
|
||||||
psutil==5.9.1
|
psutil==5.9.1
|
||||||
@@ -1,71 +0,0 @@
|
|||||||
import utils
|
|
||||||
import signal
|
|
||||||
|
|
||||||
class TestTrustAuth:
|
|
||||||
@classmethod
|
|
||||||
def setup_method(cls):
|
|
||||||
config= """
|
|
||||||
[general]
|
|
||||||
host = "0.0.0.0"
|
|
||||||
port = 6432
|
|
||||||
admin_username = "admin_user"
|
|
||||||
admin_password = ""
|
|
||||||
admin_auth_type = "trust"
|
|
||||||
|
|
||||||
[pools.sharded_db.users.0]
|
|
||||||
username = "sharding_user"
|
|
||||||
password = "sharding_user"
|
|
||||||
auth_type = "trust"
|
|
||||||
pool_size = 10
|
|
||||||
min_pool_size = 1
|
|
||||||
pool_mode = "transaction"
|
|
||||||
|
|
||||||
[pools.sharded_db.shards.0]
|
|
||||||
servers = [
|
|
||||||
[ "127.0.0.1", 5432, "primary" ],
|
|
||||||
]
|
|
||||||
database = "shard0"
|
|
||||||
"""
|
|
||||||
utils.pgcat_generic_start(config)
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def teardown_method(self):
|
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
|
||||||
|
|
||||||
def test_admin_trust_auth(self):
|
|
||||||
conn, cur = utils.connect_db_trust(admin=True)
|
|
||||||
cur.execute("SHOW POOLS")
|
|
||||||
res = cur.fetchall()
|
|
||||||
print(res)
|
|
||||||
utils.cleanup_conn(conn, cur)
|
|
||||||
|
|
||||||
def test_normal_trust_auth(self):
|
|
||||||
conn, cur = utils.connect_db_trust(autocommit=False)
|
|
||||||
cur.execute("SELECT 1")
|
|
||||||
res = cur.fetchall()
|
|
||||||
print(res)
|
|
||||||
utils.cleanup_conn(conn, cur)
|
|
||||||
|
|
||||||
class TestMD5Auth:
|
|
||||||
@classmethod
|
|
||||||
def setup_method(cls):
|
|
||||||
utils.pgcat_start()
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def teardown_method(self):
|
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
|
||||||
|
|
||||||
def test_normal_db_access(self):
|
|
||||||
conn, cur = utils.connect_db(autocommit=False)
|
|
||||||
cur.execute("SELECT 1")
|
|
||||||
res = cur.fetchall()
|
|
||||||
print(res)
|
|
||||||
utils.cleanup_conn(conn, cur)
|
|
||||||
|
|
||||||
def test_admin_db_access(self):
|
|
||||||
conn, cur = utils.connect_db(admin=True)
|
|
||||||
|
|
||||||
cur.execute("SHOW POOLS")
|
|
||||||
res = cur.fetchall()
|
|
||||||
print(res)
|
|
||||||
utils.cleanup_conn(conn, cur)
|
|
||||||
@@ -1,12 +1,84 @@
|
|||||||
|
from typing import Tuple
|
||||||
|
import psycopg2
|
||||||
|
import psutil
|
||||||
|
import os
|
||||||
import signal
|
import signal
|
||||||
import time
|
import time
|
||||||
|
|
||||||
import psycopg2
|
|
||||||
import utils
|
|
||||||
|
|
||||||
SHUTDOWN_TIMEOUT = 5
|
SHUTDOWN_TIMEOUT = 5
|
||||||
|
|
||||||
|
PGCAT_HOST = "127.0.0.1"
|
||||||
|
PGCAT_PORT = "6432"
|
||||||
|
|
||||||
|
|
||||||
|
def pgcat_start():
|
||||||
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
os.system("./target/debug/pgcat .circleci/pgcat.toml &")
|
||||||
|
time.sleep(2)
|
||||||
|
|
||||||
|
|
||||||
|
def pg_cat_send_signal(signal: signal.Signals):
|
||||||
|
try:
|
||||||
|
for proc in psutil.process_iter(["pid", "name"]):
|
||||||
|
if "pgcat" == proc.name():
|
||||||
|
os.kill(proc.pid, signal)
|
||||||
|
except Exception as e:
|
||||||
|
# The process can be gone when we send this signal
|
||||||
|
print(e)
|
||||||
|
|
||||||
|
if signal == signal.SIGTERM:
|
||||||
|
# Returns 0 if pgcat process exists
|
||||||
|
time.sleep(2)
|
||||||
|
if not os.system('pgrep pgcat'):
|
||||||
|
raise Exception("pgcat not closed after SIGTERM")
|
||||||
|
|
||||||
|
|
||||||
|
def connect_db(
|
||||||
|
autocommit: bool = True,
|
||||||
|
admin: bool = False,
|
||||||
|
) -> Tuple[psycopg2.extensions.connection, psycopg2.extensions.cursor]:
|
||||||
|
|
||||||
|
if admin:
|
||||||
|
user = "admin_user"
|
||||||
|
password = "admin_pass"
|
||||||
|
db = "pgcat"
|
||||||
|
else:
|
||||||
|
user = "sharding_user"
|
||||||
|
password = "sharding_user"
|
||||||
|
db = "sharded_db"
|
||||||
|
|
||||||
|
conn = psycopg2.connect(
|
||||||
|
f"postgres://{user}:{password}@{PGCAT_HOST}:{PGCAT_PORT}/{db}?application_name=testing_pgcat",
|
||||||
|
connect_timeout=2,
|
||||||
|
)
|
||||||
|
conn.autocommit = autocommit
|
||||||
|
cur = conn.cursor()
|
||||||
|
|
||||||
|
return (conn, cur)
|
||||||
|
|
||||||
|
|
||||||
|
def cleanup_conn(conn: psycopg2.extensions.connection, cur: psycopg2.extensions.cursor):
|
||||||
|
cur.close()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
|
||||||
|
def test_normal_db_access():
|
||||||
|
pgcat_start()
|
||||||
|
conn, cur = connect_db(autocommit=False)
|
||||||
|
cur.execute("SELECT 1")
|
||||||
|
res = cur.fetchall()
|
||||||
|
print(res)
|
||||||
|
cleanup_conn(conn, cur)
|
||||||
|
|
||||||
|
|
||||||
|
def test_admin_db_access():
|
||||||
|
conn, cur = connect_db(admin=True)
|
||||||
|
|
||||||
|
cur.execute("SHOW POOLS")
|
||||||
|
res = cur.fetchall()
|
||||||
|
print(res)
|
||||||
|
cleanup_conn(conn, cur)
|
||||||
|
|
||||||
|
|
||||||
def test_shutdown_logic():
|
def test_shutdown_logic():
|
||||||
|
|
||||||
@@ -14,17 +86,17 @@ def test_shutdown_logic():
|
|||||||
# NO ACTIVE QUERIES SIGINT HANDLING
|
# NO ACTIVE QUERIES SIGINT HANDLING
|
||||||
|
|
||||||
# Start pgcat
|
# Start pgcat
|
||||||
utils.pgcat_start()
|
pgcat_start()
|
||||||
|
|
||||||
# Create client connection and send query (not in transaction)
|
# Create client connection and send query (not in transaction)
|
||||||
conn, cur = utils.connect_db()
|
conn, cur = connect_db()
|
||||||
|
|
||||||
cur.execute("BEGIN;")
|
cur.execute("BEGIN;")
|
||||||
cur.execute("SELECT 1;")
|
cur.execute("SELECT 1;")
|
||||||
cur.execute("COMMIT;")
|
cur.execute("COMMIT;")
|
||||||
|
|
||||||
# Send sigint to pgcat
|
# Send sigint to pgcat
|
||||||
utils.pg_cat_send_signal(signal.SIGINT)
|
pg_cat_send_signal(signal.SIGINT)
|
||||||
time.sleep(1)
|
time.sleep(1)
|
||||||
|
|
||||||
# Check that any new queries fail after sigint since server should close with no active transactions
|
# Check that any new queries fail after sigint since server should close with no active transactions
|
||||||
@@ -36,18 +108,18 @@ def test_shutdown_logic():
|
|||||||
# Fail if query execution succeeded
|
# Fail if query execution succeeded
|
||||||
raise Exception("Server not closed after sigint")
|
raise Exception("Server not closed after sigint")
|
||||||
|
|
||||||
utils.cleanup_conn(conn, cur)
|
cleanup_conn(conn, cur)
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
|
||||||
# - - - - - - - - - - - - - - - - - -
|
# - - - - - - - - - - - - - - - - - -
|
||||||
# NO ACTIVE QUERIES ADMIN SHUTDOWN COMMAND
|
# NO ACTIVE QUERIES ADMIN SHUTDOWN COMMAND
|
||||||
|
|
||||||
# Start pgcat
|
# Start pgcat
|
||||||
utils.pgcat_start()
|
pgcat_start()
|
||||||
|
|
||||||
# Create client connection and begin transaction
|
# Create client connection and begin transaction
|
||||||
conn, cur = utils.connect_db()
|
conn, cur = connect_db()
|
||||||
admin_conn, admin_cur = utils.connect_db(admin=True)
|
admin_conn, admin_cur = connect_db(admin=True)
|
||||||
|
|
||||||
cur.execute("BEGIN;")
|
cur.execute("BEGIN;")
|
||||||
cur.execute("SELECT 1;")
|
cur.execute("SELECT 1;")
|
||||||
@@ -66,24 +138,24 @@ def test_shutdown_logic():
|
|||||||
# Fail if query execution succeeded
|
# Fail if query execution succeeded
|
||||||
raise Exception("Server not closed after sigint")
|
raise Exception("Server not closed after sigint")
|
||||||
|
|
||||||
utils.cleanup_conn(conn, cur)
|
cleanup_conn(conn, cur)
|
||||||
utils.cleanup_conn(admin_conn, admin_cur)
|
cleanup_conn(admin_conn, admin_cur)
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
|
||||||
# - - - - - - - - - - - - - - - - - -
|
# - - - - - - - - - - - - - - - - - -
|
||||||
# HANDLE TRANSACTION WITH SIGINT
|
# HANDLE TRANSACTION WITH SIGINT
|
||||||
|
|
||||||
# Start pgcat
|
# Start pgcat
|
||||||
utils.pgcat_start()
|
pgcat_start()
|
||||||
|
|
||||||
# Create client connection and begin transaction
|
# Create client connection and begin transaction
|
||||||
conn, cur = utils.connect_db()
|
conn, cur = connect_db()
|
||||||
|
|
||||||
cur.execute("BEGIN;")
|
cur.execute("BEGIN;")
|
||||||
cur.execute("SELECT 1;")
|
cur.execute("SELECT 1;")
|
||||||
|
|
||||||
# Send sigint to pgcat while still in transaction
|
# Send sigint to pgcat while still in transaction
|
||||||
utils.pg_cat_send_signal(signal.SIGINT)
|
pg_cat_send_signal(signal.SIGINT)
|
||||||
time.sleep(1)
|
time.sleep(1)
|
||||||
|
|
||||||
# Check that any new queries succeed after sigint since server should still allow transaction to complete
|
# Check that any new queries succeed after sigint since server should still allow transaction to complete
|
||||||
@@ -93,18 +165,18 @@ def test_shutdown_logic():
|
|||||||
# Fail if query fails since server closed
|
# Fail if query fails since server closed
|
||||||
raise Exception("Server closed while in transaction", e.pgerror)
|
raise Exception("Server closed while in transaction", e.pgerror)
|
||||||
|
|
||||||
utils.cleanup_conn(conn, cur)
|
cleanup_conn(conn, cur)
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
|
||||||
# - - - - - - - - - - - - - - - - - -
|
# - - - - - - - - - - - - - - - - - -
|
||||||
# HANDLE TRANSACTION WITH ADMIN SHUTDOWN COMMAND
|
# HANDLE TRANSACTION WITH ADMIN SHUTDOWN COMMAND
|
||||||
|
|
||||||
# Start pgcat
|
# Start pgcat
|
||||||
utils.pgcat_start()
|
pgcat_start()
|
||||||
|
|
||||||
# Create client connection and begin transaction
|
# Create client connection and begin transaction
|
||||||
conn, cur = utils.connect_db()
|
conn, cur = connect_db()
|
||||||
admin_conn, admin_cur = utils.connect_db(admin=True)
|
admin_conn, admin_cur = connect_db(admin=True)
|
||||||
|
|
||||||
cur.execute("BEGIN;")
|
cur.execute("BEGIN;")
|
||||||
cur.execute("SELECT 1;")
|
cur.execute("SELECT 1;")
|
||||||
@@ -122,30 +194,30 @@ def test_shutdown_logic():
|
|||||||
# Fail if query fails since server closed
|
# Fail if query fails since server closed
|
||||||
raise Exception("Server closed while in transaction", e.pgerror)
|
raise Exception("Server closed while in transaction", e.pgerror)
|
||||||
|
|
||||||
utils.cleanup_conn(conn, cur)
|
cleanup_conn(conn, cur)
|
||||||
utils.cleanup_conn(admin_conn, admin_cur)
|
cleanup_conn(admin_conn, admin_cur)
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
|
||||||
# - - - - - - - - - - - - - - - - - -
|
# - - - - - - - - - - - - - - - - - -
|
||||||
# NO NEW NON-ADMIN CONNECTIONS DURING SHUTDOWN
|
# NO NEW NON-ADMIN CONNECTIONS DURING SHUTDOWN
|
||||||
# Start pgcat
|
# Start pgcat
|
||||||
utils.pgcat_start()
|
pgcat_start()
|
||||||
|
|
||||||
# Create client connection and begin transaction
|
# Create client connection and begin transaction
|
||||||
transaction_conn, transaction_cur = utils.connect_db()
|
transaction_conn, transaction_cur = connect_db()
|
||||||
|
|
||||||
transaction_cur.execute("BEGIN;")
|
transaction_cur.execute("BEGIN;")
|
||||||
transaction_cur.execute("SELECT 1;")
|
transaction_cur.execute("SELECT 1;")
|
||||||
|
|
||||||
# Send sigint to pgcat while still in transaction
|
# Send sigint to pgcat while still in transaction
|
||||||
utils.pg_cat_send_signal(signal.SIGINT)
|
pg_cat_send_signal(signal.SIGINT)
|
||||||
time.sleep(1)
|
time.sleep(1)
|
||||||
|
|
||||||
start = time.perf_counter()
|
start = time.perf_counter()
|
||||||
try:
|
try:
|
||||||
conn, cur = utils.connect_db()
|
conn, cur = connect_db()
|
||||||
cur.execute("SELECT 1;")
|
cur.execute("SELECT 1;")
|
||||||
utils.cleanup_conn(conn, cur)
|
cleanup_conn(conn, cur)
|
||||||
except psycopg2.OperationalError as e:
|
except psycopg2.OperationalError as e:
|
||||||
time_taken = time.perf_counter() - start
|
time_taken = time.perf_counter() - start
|
||||||
if time_taken > 0.1:
|
if time_taken > 0.1:
|
||||||
@@ -155,49 +227,49 @@ def test_shutdown_logic():
|
|||||||
else:
|
else:
|
||||||
raise Exception("Able connect to database during shutdown")
|
raise Exception("Able connect to database during shutdown")
|
||||||
|
|
||||||
utils.cleanup_conn(transaction_conn, transaction_cur)
|
cleanup_conn(transaction_conn, transaction_cur)
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
|
||||||
# - - - - - - - - - - - - - - - - - -
|
# - - - - - - - - - - - - - - - - - -
|
||||||
# ALLOW NEW ADMIN CONNECTIONS DURING SHUTDOWN
|
# ALLOW NEW ADMIN CONNECTIONS DURING SHUTDOWN
|
||||||
# Start pgcat
|
# Start pgcat
|
||||||
utils.pgcat_start()
|
pgcat_start()
|
||||||
|
|
||||||
# Create client connection and begin transaction
|
# Create client connection and begin transaction
|
||||||
transaction_conn, transaction_cur = utils.connect_db()
|
transaction_conn, transaction_cur = connect_db()
|
||||||
|
|
||||||
transaction_cur.execute("BEGIN;")
|
transaction_cur.execute("BEGIN;")
|
||||||
transaction_cur.execute("SELECT 1;")
|
transaction_cur.execute("SELECT 1;")
|
||||||
|
|
||||||
# Send sigint to pgcat while still in transaction
|
# Send sigint to pgcat while still in transaction
|
||||||
utils.pg_cat_send_signal(signal.SIGINT)
|
pg_cat_send_signal(signal.SIGINT)
|
||||||
time.sleep(1)
|
time.sleep(1)
|
||||||
|
|
||||||
try:
|
try:
|
||||||
conn, cur = utils.connect_db(admin=True)
|
conn, cur = connect_db(admin=True)
|
||||||
cur.execute("SHOW DATABASES;")
|
cur.execute("SHOW DATABASES;")
|
||||||
utils.cleanup_conn(conn, cur)
|
cleanup_conn(conn, cur)
|
||||||
except psycopg2.OperationalError as e:
|
except psycopg2.OperationalError as e:
|
||||||
raise Exception(e)
|
raise Exception(e)
|
||||||
|
|
||||||
utils.cleanup_conn(transaction_conn, transaction_cur)
|
cleanup_conn(transaction_conn, transaction_cur)
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
|
||||||
# - - - - - - - - - - - - - - - - - -
|
# - - - - - - - - - - - - - - - - - -
|
||||||
# ADMIN CONNECTIONS CONTINUING TO WORK AFTER SHUTDOWN
|
# ADMIN CONNECTIONS CONTINUING TO WORK AFTER SHUTDOWN
|
||||||
# Start pgcat
|
# Start pgcat
|
||||||
utils.pgcat_start()
|
pgcat_start()
|
||||||
|
|
||||||
# Create client connection and begin transaction
|
# Create client connection and begin transaction
|
||||||
transaction_conn, transaction_cur = utils.connect_db()
|
transaction_conn, transaction_cur = connect_db()
|
||||||
transaction_cur.execute("BEGIN;")
|
transaction_cur.execute("BEGIN;")
|
||||||
transaction_cur.execute("SELECT 1;")
|
transaction_cur.execute("SELECT 1;")
|
||||||
|
|
||||||
admin_conn, admin_cur = utils.connect_db(admin=True)
|
admin_conn, admin_cur = connect_db(admin=True)
|
||||||
admin_cur.execute("SHOW DATABASES;")
|
admin_cur.execute("SHOW DATABASES;")
|
||||||
|
|
||||||
# Send sigint to pgcat while still in transaction
|
# Send sigint to pgcat while still in transaction
|
||||||
utils.pg_cat_send_signal(signal.SIGINT)
|
pg_cat_send_signal(signal.SIGINT)
|
||||||
time.sleep(1)
|
time.sleep(1)
|
||||||
|
|
||||||
try:
|
try:
|
||||||
@@ -205,24 +277,24 @@ def test_shutdown_logic():
|
|||||||
except psycopg2.OperationalError as e:
|
except psycopg2.OperationalError as e:
|
||||||
raise Exception("Could not execute admin command:", e)
|
raise Exception("Could not execute admin command:", e)
|
||||||
|
|
||||||
utils.cleanup_conn(transaction_conn, transaction_cur)
|
cleanup_conn(transaction_conn, transaction_cur)
|
||||||
utils.cleanup_conn(admin_conn, admin_cur)
|
cleanup_conn(admin_conn, admin_cur)
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
|
||||||
# - - - - - - - - - - - - - - - - - -
|
# - - - - - - - - - - - - - - - - - -
|
||||||
# HANDLE SHUTDOWN TIMEOUT WITH SIGINT
|
# HANDLE SHUTDOWN TIMEOUT WITH SIGINT
|
||||||
|
|
||||||
# Start pgcat
|
# Start pgcat
|
||||||
utils.pgcat_start()
|
pgcat_start()
|
||||||
|
|
||||||
# Create client connection and begin transaction, which should prevent server shutdown unless shutdown timeout is reached
|
# Create client connection and begin transaction, which should prevent server shutdown unless shutdown timeout is reached
|
||||||
conn, cur = utils.connect_db()
|
conn, cur = connect_db()
|
||||||
|
|
||||||
cur.execute("BEGIN;")
|
cur.execute("BEGIN;")
|
||||||
cur.execute("SELECT 1;")
|
cur.execute("SELECT 1;")
|
||||||
|
|
||||||
# Send sigint to pgcat while still in transaction
|
# Send sigint to pgcat while still in transaction
|
||||||
utils.pg_cat_send_signal(signal.SIGINT)
|
pg_cat_send_signal(signal.SIGINT)
|
||||||
|
|
||||||
# pgcat shutdown timeout is set to SHUTDOWN_TIMEOUT seconds, so we sleep for SHUTDOWN_TIMEOUT + 1 seconds
|
# pgcat shutdown timeout is set to SHUTDOWN_TIMEOUT seconds, so we sleep for SHUTDOWN_TIMEOUT + 1 seconds
|
||||||
time.sleep(SHUTDOWN_TIMEOUT + 1)
|
time.sleep(SHUTDOWN_TIMEOUT + 1)
|
||||||
@@ -236,7 +308,12 @@ def test_shutdown_logic():
|
|||||||
# Fail if query execution succeeded
|
# Fail if query execution succeeded
|
||||||
raise Exception("Server not closed after sigint and expected timeout")
|
raise Exception("Server not closed after sigint and expected timeout")
|
||||||
|
|
||||||
utils.cleanup_conn(conn, cur)
|
cleanup_conn(conn, cur)
|
||||||
utils.pg_cat_send_signal(signal.SIGTERM)
|
pg_cat_send_signal(signal.SIGTERM)
|
||||||
|
|
||||||
# - - - - - - - - - - - - - - - - - -
|
# - - - - - - - - - - - - - - - - - -
|
||||||
|
|
||||||
|
|
||||||
|
test_normal_db_access()
|
||||||
|
test_admin_db_access()
|
||||||
|
test_shutdown_logic()
|
||||||
@@ -1,110 +0,0 @@
|
|||||||
import os
|
|
||||||
import signal
|
|
||||||
import time
|
|
||||||
from typing import Tuple
|
|
||||||
import tempfile
|
|
||||||
|
|
||||||
import psutil
|
|
||||||
import psycopg2
|
|
||||||
|
|
||||||
PGCAT_HOST = "127.0.0.1"
|
|
||||||
PGCAT_PORT = "6432"
|
|
||||||
|
|
||||||
|
|
||||||
def _pgcat_start(config_path: str):
|
|
||||||
pg_cat_send_signal(signal.SIGTERM)
|
|
||||||
os.system(f"./target/debug/pgcat {config_path} &")
|
|
||||||
time.sleep(2)
|
|
||||||
|
|
||||||
|
|
||||||
def pgcat_start():
|
|
||||||
_pgcat_start(config_path='.circleci/pgcat.toml')
|
|
||||||
|
|
||||||
|
|
||||||
def pgcat_generic_start(config: str):
|
|
||||||
tmp = tempfile.NamedTemporaryFile()
|
|
||||||
with open(tmp.name, 'w') as f:
|
|
||||||
f.write(config)
|
|
||||||
_pgcat_start(config_path=tmp.name)
|
|
||||||
|
|
||||||
|
|
||||||
def glauth_send_signal(signal: signal.Signals):
|
|
||||||
try:
|
|
||||||
for proc in psutil.process_iter(["pid", "name"]):
|
|
||||||
if proc.name() == "glauth":
|
|
||||||
os.kill(proc.pid, signal)
|
|
||||||
except Exception as e:
|
|
||||||
# The process can be gone when we send this signal
|
|
||||||
print(e)
|
|
||||||
|
|
||||||
if signal == signal.SIGTERM:
|
|
||||||
# Returns 0 if pgcat process exists
|
|
||||||
time.sleep(2)
|
|
||||||
if not os.system('pgrep glauth'):
|
|
||||||
raise Exception("glauth not closed after SIGTERM")
|
|
||||||
|
|
||||||
|
|
||||||
def pg_cat_send_signal(signal: signal.Signals):
|
|
||||||
try:
|
|
||||||
for proc in psutil.process_iter(["pid", "name"]):
|
|
||||||
if "pgcat" == proc.name():
|
|
||||||
os.kill(proc.pid, signal)
|
|
||||||
except Exception as e:
|
|
||||||
# The process can be gone when we send this signal
|
|
||||||
print(e)
|
|
||||||
|
|
||||||
if signal == signal.SIGTERM:
|
|
||||||
# Returns 0 if pgcat process exists
|
|
||||||
time.sleep(2)
|
|
||||||
if not os.system('pgrep pgcat'):
|
|
||||||
raise Exception("pgcat not closed after SIGTERM")
|
|
||||||
|
|
||||||
|
|
||||||
def connect_db(
|
|
||||||
autocommit: bool = True,
|
|
||||||
admin: bool = False,
|
|
||||||
) -> Tuple[psycopg2.extensions.connection, psycopg2.extensions.cursor]:
|
|
||||||
|
|
||||||
if admin:
|
|
||||||
user = "admin_user"
|
|
||||||
password = "admin_pass"
|
|
||||||
db = "pgcat"
|
|
||||||
else:
|
|
||||||
user = "sharding_user"
|
|
||||||
password = "sharding_user"
|
|
||||||
db = "sharded_db"
|
|
||||||
|
|
||||||
conn = psycopg2.connect(
|
|
||||||
f"postgres://{user}:{password}@{PGCAT_HOST}:{PGCAT_PORT}/{db}?application_name=testing_pgcat",
|
|
||||||
connect_timeout=2,
|
|
||||||
)
|
|
||||||
conn.autocommit = autocommit
|
|
||||||
cur = conn.cursor()
|
|
||||||
|
|
||||||
return (conn, cur)
|
|
||||||
|
|
||||||
def connect_db_trust(
|
|
||||||
autocommit: bool = True,
|
|
||||||
admin: bool = False,
|
|
||||||
) -> Tuple[psycopg2.extensions.connection, psycopg2.extensions.cursor]:
|
|
||||||
|
|
||||||
if admin:
|
|
||||||
user = "admin_user"
|
|
||||||
db = "pgcat"
|
|
||||||
else:
|
|
||||||
user = "sharding_user"
|
|
||||||
db = "sharded_db"
|
|
||||||
|
|
||||||
conn = psycopg2.connect(
|
|
||||||
f"postgres://{user}@{PGCAT_HOST}:{PGCAT_PORT}/{db}?application_name=testing_pgcat",
|
|
||||||
connect_timeout=2,
|
|
||||||
)
|
|
||||||
conn.autocommit = autocommit
|
|
||||||
cur = conn.cursor()
|
|
||||||
|
|
||||||
return (conn, cur)
|
|
||||||
|
|
||||||
|
|
||||||
def cleanup_conn(conn: psycopg2.extensions.connection, cur: psycopg2.extensions.cursor):
|
|
||||||
cur.close()
|
|
||||||
conn.close()
|
|
||||||
@@ -1,33 +1,22 @@
|
|||||||
GEM
|
GEM
|
||||||
remote: https://rubygems.org/
|
remote: https://rubygems.org/
|
||||||
specs:
|
specs:
|
||||||
activemodel (7.1.4)
|
activemodel (7.0.4.1)
|
||||||
activesupport (= 7.1.4)
|
activesupport (= 7.0.4.1)
|
||||||
activerecord (7.1.4)
|
activerecord (7.0.4.1)
|
||||||
activemodel (= 7.1.4)
|
activemodel (= 7.0.4.1)
|
||||||
activesupport (= 7.1.4)
|
activesupport (= 7.0.4.1)
|
||||||
timeout (>= 0.4.0)
|
activesupport (7.0.4.1)
|
||||||
activesupport (7.1.4)
|
|
||||||
base64
|
|
||||||
bigdecimal
|
|
||||||
concurrent-ruby (~> 1.0, >= 1.0.2)
|
concurrent-ruby (~> 1.0, >= 1.0.2)
|
||||||
connection_pool (>= 2.2.5)
|
|
||||||
drb
|
|
||||||
i18n (>= 1.6, < 2)
|
i18n (>= 1.6, < 2)
|
||||||
minitest (>= 5.1)
|
minitest (>= 5.1)
|
||||||
mutex_m
|
|
||||||
tzinfo (~> 2.0)
|
tzinfo (~> 2.0)
|
||||||
ast (2.4.2)
|
ast (2.4.2)
|
||||||
base64 (0.2.0)
|
concurrent-ruby (1.1.10)
|
||||||
bigdecimal (3.1.8)
|
|
||||||
concurrent-ruby (1.3.4)
|
|
||||||
connection_pool (2.4.1)
|
|
||||||
diff-lcs (1.5.0)
|
diff-lcs (1.5.0)
|
||||||
drb (2.2.1)
|
i18n (1.12.0)
|
||||||
i18n (1.14.5)
|
|
||||||
concurrent-ruby (~> 1.0)
|
concurrent-ruby (~> 1.0)
|
||||||
minitest (5.25.1)
|
minitest (5.17.0)
|
||||||
mutex_m (0.2.0)
|
|
||||||
parallel (1.22.1)
|
parallel (1.22.1)
|
||||||
parser (3.1.2.0)
|
parser (3.1.2.0)
|
||||||
ast (~> 2.4.1)
|
ast (~> 2.4.1)
|
||||||
@@ -35,8 +24,7 @@ GEM
|
|||||||
pg (1.3.2)
|
pg (1.3.2)
|
||||||
rainbow (3.1.1)
|
rainbow (3.1.1)
|
||||||
regexp_parser (2.3.1)
|
regexp_parser (2.3.1)
|
||||||
rexml (3.3.6)
|
rexml (3.2.5)
|
||||||
strscan
|
|
||||||
rspec (3.11.0)
|
rspec (3.11.0)
|
||||||
rspec-core (~> 3.11.0)
|
rspec-core (~> 3.11.0)
|
||||||
rspec-expectations (~> 3.11.0)
|
rspec-expectations (~> 3.11.0)
|
||||||
@@ -62,12 +50,10 @@ GEM
|
|||||||
rubocop-ast (1.17.0)
|
rubocop-ast (1.17.0)
|
||||||
parser (>= 3.1.1.0)
|
parser (>= 3.1.1.0)
|
||||||
ruby-progressbar (1.11.0)
|
ruby-progressbar (1.11.0)
|
||||||
strscan (3.1.0)
|
|
||||||
timeout (0.4.1)
|
|
||||||
toml (0.3.0)
|
toml (0.3.0)
|
||||||
parslet (>= 1.8.0, < 3.0.0)
|
parslet (>= 1.8.0, < 3.0.0)
|
||||||
toxiproxy (2.0.1)
|
toxiproxy (2.0.1)
|
||||||
tzinfo (2.0.6)
|
tzinfo (2.0.5)
|
||||||
concurrent-ruby (~> 1.0)
|
concurrent-ruby (~> 1.0)
|
||||||
unicode-display_width (2.1.0)
|
unicode-display_width (2.1.0)
|
||||||
|
|
||||||
|
|||||||
@@ -91,27 +91,6 @@ describe "Admin" do
|
|||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
[
|
|
||||||
"SHOW ME THE MONEY",
|
|
||||||
"SHOW ME THE WAY",
|
|
||||||
"SHOW UP",
|
|
||||||
"SHOWTIME",
|
|
||||||
"HAMMER TIME",
|
|
||||||
"SHOWN TO BE TRUE",
|
|
||||||
"SHOW ",
|
|
||||||
"SHOW ",
|
|
||||||
"SHOW 1",
|
|
||||||
";;;;;"
|
|
||||||
].each do |cmd|
|
|
||||||
describe "Bad command #{cmd}" do
|
|
||||||
it "does not panic and responds with PG::SystemError" do
|
|
||||||
admin_conn = PG::connect(processes.pgcat.admin_connection_string)
|
|
||||||
expect { admin_conn.async_exec(cmd) }.to raise_error(PG::SystemError).with_message(/Unsupported/)
|
|
||||||
admin_conn.close
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe "PAUSE" do
|
describe "PAUSE" do
|
||||||
it "pauses all pools" do
|
it "pauses all pools" do
|
||||||
admin_conn = PG::connect(processes.pgcat.admin_connection_string)
|
admin_conn = PG::connect(processes.pgcat.admin_connection_string)
|
||||||
|
|||||||
@@ -233,19 +233,17 @@ describe "Stats" do
|
|||||||
sleep(1.1) # Allow time for stats to update
|
sleep(1.1) # Allow time for stats to update
|
||||||
admin_conn = PG::connect(processes.pgcat.admin_connection_string)
|
admin_conn = PG::connect(processes.pgcat.admin_connection_string)
|
||||||
results = admin_conn.async_exec("SHOW POOLS")[0]
|
results = admin_conn.async_exec("SHOW POOLS")[0]
|
||||||
|
%w[cl_idle cl_cancel_req sv_idle sv_used sv_tested sv_login maxwait].each do |s|
|
||||||
%w[cl_idle cl_cancel_req sv_idle sv_used sv_tested sv_login].each do |s|
|
|
||||||
raise StandardError, "Field #{s} was expected to be 0 but found to be #{results[s]}" if results[s] != "0"
|
raise StandardError, "Field #{s} was expected to be 0 but found to be #{results[s]}" if results[s] != "0"
|
||||||
end
|
end
|
||||||
|
|
||||||
expect(results["maxwait"]).to eq("1")
|
|
||||||
expect(results["cl_waiting"]).to eq("2")
|
expect(results["cl_waiting"]).to eq("2")
|
||||||
expect(results["cl_active"]).to eq("2")
|
expect(results["cl_active"]).to eq("2")
|
||||||
expect(results["sv_active"]).to eq("2")
|
expect(results["sv_active"]).to eq("2")
|
||||||
|
|
||||||
sleep(2.5) # Allow time for stats to update
|
sleep(2.5) # Allow time for stats to update
|
||||||
results = admin_conn.async_exec("SHOW POOLS")[0]
|
results = admin_conn.async_exec("SHOW POOLS")[0]
|
||||||
%w[cl_active cl_waiting cl_cancel_req sv_active sv_used sv_tested sv_login maxwait].each do |s|
|
%w[cl_active cl_waiting cl_cancel_req sv_active sv_used sv_tested sv_login].each do |s|
|
||||||
raise StandardError, "Field #{s} was expected to be 0 but found to be #{results[s]}" if results[s] != "0"
|
raise StandardError, "Field #{s} was expected to be 0 but found to be #{results[s]}" if results[s] != "0"
|
||||||
end
|
end
|
||||||
expect(results["cl_idle"]).to eq("4")
|
expect(results["cl_idle"]).to eq("4")
|
||||||
@@ -257,24 +255,23 @@ describe "Stats" do
|
|||||||
|
|
||||||
it "show correct max_wait" do
|
it "show correct max_wait" do
|
||||||
threads = []
|
threads = []
|
||||||
admin_conn = PG::connect(processes.pgcat.admin_connection_string)
|
|
||||||
connections = Array.new(4) { PG::connect("#{pgcat_conn_str}?application_name=one_query") }
|
connections = Array.new(4) { PG::connect("#{pgcat_conn_str}?application_name=one_query") }
|
||||||
connections.each do |c|
|
connections.each do |c|
|
||||||
threads << Thread.new { c.async_exec("SELECT pg_sleep(1.5)") rescue nil }
|
threads << Thread.new { c.async_exec("SELECT pg_sleep(1.5)") rescue nil }
|
||||||
end
|
end
|
||||||
sleep(1.1)
|
|
||||||
results = admin_conn.async_exec("SHOW POOLS")[0]
|
|
||||||
# Value is only reported when there are clients waiting
|
|
||||||
expect(results["maxwait"]).to eq("1")
|
|
||||||
expect(results["maxwait_us"].to_i).to be_within(20_000).of(100_000)
|
|
||||||
|
|
||||||
sleep(2.5) # Allow time for stats to update
|
sleep(2.5) # Allow time for stats to update
|
||||||
|
admin_conn = PG::connect(processes.pgcat.admin_connection_string)
|
||||||
results = admin_conn.async_exec("SHOW POOLS")[0]
|
results = admin_conn.async_exec("SHOW POOLS")[0]
|
||||||
# no clients are waiting so value is 0
|
|
||||||
expect(results["maxwait"]).to eq("0")
|
expect(results["maxwait"]).to eq("1")
|
||||||
expect(results["maxwait_us"]).to eq("0")
|
expect(results["maxwait_us"].to_i).to be_within(200_000).of(500_000)
|
||||||
connections.map(&:close)
|
connections.map(&:close)
|
||||||
|
|
||||||
|
sleep(4.5) # Allow time for stats to update
|
||||||
|
results = admin_conn.async_exec("SHOW POOLS")[0]
|
||||||
|
expect(results["maxwait"]).to eq("0")
|
||||||
|
|
||||||
threads.map(&:join)
|
threads.map(&:join)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
@@ -332,40 +329,6 @@ describe "Stats" do
|
|||||||
admin_conn.close
|
admin_conn.close
|
||||||
connections.map(&:close)
|
connections.map(&:close)
|
||||||
end
|
end
|
||||||
|
|
||||||
context "when client has waited for a server" do
|
|
||||||
let(:processes) { Helpers::Pgcat.single_instance_setup("sharded_db", 2) }
|
|
||||||
|
|
||||||
it "shows correct maxwait" do
|
|
||||||
threads = []
|
|
||||||
connections = Array.new(3) { |i| PG::connect("#{pgcat_conn_str}?application_name=app#{i}") }
|
|
||||||
connections.each do |c|
|
|
||||||
threads << Thread.new { c.async_exec("SELECT pg_sleep(1.5)") rescue nil }
|
|
||||||
end
|
|
||||||
|
|
||||||
sleep(2.5) # Allow time for stats to update
|
|
||||||
admin_conn = PG::connect(processes.pgcat.admin_connection_string)
|
|
||||||
results = admin_conn.async_exec("SHOW CLIENTS")
|
|
||||||
|
|
||||||
normal_client_results = results.reject { |r| r["database"] == "pgcat" }
|
|
||||||
|
|
||||||
non_waiting_clients = normal_client_results.select { |c| c["maxwait"] == "0" }
|
|
||||||
waiting_clients = normal_client_results.select { |c| c["maxwait"].to_i > 0 }
|
|
||||||
|
|
||||||
expect(non_waiting_clients.count).to eq(2)
|
|
||||||
non_waiting_clients.each do |client|
|
|
||||||
expect(client["maxwait_us"].to_i).to be_between(0, 50_000)
|
|
||||||
end
|
|
||||||
|
|
||||||
expect(waiting_clients.count).to eq(1)
|
|
||||||
waiting_clients.each do |client|
|
|
||||||
expect(client["maxwait_us"].to_i).to be_within(200_000).of(500_000)
|
|
||||||
end
|
|
||||||
|
|
||||||
admin_conn.close
|
|
||||||
connections.map(&:close)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
664
tests/rust/Cargo.lock
generated
664
tests/rust/Cargo.lock
generated
File diff suppressed because it is too large
Load Diff
@@ -15,13 +15,8 @@ async fn test_prepared_statements() {
|
|||||||
for _ in 0..5 {
|
for _ in 0..5 {
|
||||||
let pool = pool.clone();
|
let pool = pool.clone();
|
||||||
let handle = tokio::task::spawn(async move {
|
let handle = tokio::task::spawn(async move {
|
||||||
for i in 0..1000 {
|
for _ in 0..1000 {
|
||||||
match sqlx::query(&format!("SELECT {:?}", i % 5)).fetch_all(&pool).await {
|
sqlx::query("SELECT 1").fetch_all(&pool).await.unwrap();
|
||||||
Ok(_) => (),
|
|
||||||
Err(err) => {
|
|
||||||
panic!("prepared statement error: {}", err);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|||||||
@@ -22,7 +22,7 @@ mkdir -p "$deb_dir/etc/systemd/system"
|
|||||||
cp target/release/pgcat "$deb_dir/usr/bin/pgcat"
|
cp target/release/pgcat "$deb_dir/usr/bin/pgcat"
|
||||||
chmod +x "$deb_dir/usr/bin/pgcat"
|
chmod +x "$deb_dir/usr/bin/pgcat"
|
||||||
|
|
||||||
cp pgcat.toml "$deb_dir/etc/pgcat.example.toml"
|
cp pgcat.toml "$deb_dir/etc/pgcat.toml"
|
||||||
cp pgcat.service "$deb_dir/etc/systemd/system/pgcat.service"
|
cp pgcat.service "$deb_dir/etc/systemd/system/pgcat.service"
|
||||||
|
|
||||||
(cat control | envsubst) > "$deb_dir/DEBIAN/control"
|
(cat control | envsubst) > "$deb_dir/DEBIAN/control"
|
||||||
|
|||||||
Reference in New Issue
Block a user