mirror of
https://gitee.com/milvus-io/milvus.git
synced 2025-12-07 01:28:27 +08:00
issue: #43897, #44123 pr: #45266 also pick pr: #45237, #45264,#45244,#45275 fix: kafka should auto reset the offset from earliest to read (#45237) issue: #44172, #45210, #44851,#45244 kafka will auto reset the offset to "latest" if the offset is Out-of-range. the recovery of milvus wal cannot read any message from that. So once the offset is out-of-range, kafka should read from eariest to read the latest uncleared data. https://kafka.apache.org/documentation/#consumerconfigs_auto.offset.reset enhance: support alter collection/database with WAL-based DDL framework (#45266) issue: #43897 - Alter collection/database is implemented by WAL-based DDL framework now. - Support AlterCollection/AlterDatabase in wal now. - Alter operation can be synced by new CDC now. - Refactor some UT for alter DDL. fix: milvus role cannot stop at initializing state (#45244) issue: #45243 fix: support upgrading from 2.6.x -> 2.6.5 (#45264) issue: #43897 --------- Signed-off-by: chyezh <chyezh@outlook.com>
130 lines
4.4 KiB
Go
130 lines
4.4 KiB
Go
package rootcoord
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"google.golang.org/protobuf/types/known/fieldmaskpb"
|
|
|
|
"github.com/milvus-io/milvus-proto/go-api/v2/milvuspb"
|
|
"github.com/milvus-io/milvus/internal/distributed/streaming"
|
|
"github.com/milvus-io/milvus/internal/streamingcoord/server/broadcaster/broadcast"
|
|
"github.com/milvus-io/milvus/internal/util/hookutil"
|
|
"github.com/milvus-io/milvus/pkg/v2/streaming/util/message"
|
|
"github.com/milvus-io/milvus/pkg/v2/util"
|
|
"github.com/milvus-io/milvus/pkg/v2/util/merr"
|
|
"github.com/milvus-io/milvus/pkg/v2/util/typeutil"
|
|
)
|
|
|
|
func (c *Core) broadcastAlterCollectionForRenameCollection(ctx context.Context, req *milvuspb.RenameCollectionRequest) error {
|
|
if req.DbName == "" {
|
|
req.DbName = util.DefaultDBName
|
|
}
|
|
if req.NewDBName == "" {
|
|
req.NewDBName = req.DbName
|
|
}
|
|
if req.NewName == "" {
|
|
return merr.WrapErrParameterInvalidMsg("new collection name should not be empty")
|
|
}
|
|
if req.OldName == "" {
|
|
return merr.WrapErrParameterInvalidMsg("old collection name should not be empty")
|
|
}
|
|
if req.DbName == req.NewDBName && req.OldName == req.NewName {
|
|
// no-op here.
|
|
return merr.WrapErrParameterInvalidMsg("collection name or database name should be different")
|
|
}
|
|
|
|
// StartBroadcastWithResourceKeys will deduplicate the resource keys itself, so it's safe to add all the resource keys here.
|
|
rks := []message.ResourceKey{
|
|
message.NewSharedDBNameResourceKey(req.GetNewDBName()),
|
|
message.NewSharedDBNameResourceKey(req.GetDbName()),
|
|
message.NewExclusiveCollectionNameResourceKey(req.GetDbName(), req.GetOldName()),
|
|
message.NewExclusiveCollectionNameResourceKey(req.GetNewDBName(), req.GetNewName()),
|
|
}
|
|
broadcaster, err := broadcast.StartBroadcastWithResourceKeys(ctx, rks...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer broadcaster.Close()
|
|
|
|
if err := c.validateEncryption(ctx, req.GetDbName(), req.GetNewDBName()); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := c.meta.CheckIfCollectionRenamable(ctx, req.GetDbName(), req.GetOldName(), req.GetNewDBName(), req.GetNewName()); err != nil {
|
|
return err
|
|
}
|
|
|
|
newDB, err := c.meta.GetDatabaseByName(ctx, req.GetNewDBName(), typeutil.MaxTimestamp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
coll, err := c.meta.GetCollectionByName(ctx, req.GetDbName(), req.GetOldName(), typeutil.MaxTimestamp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
updateMask := &fieldmaskpb.FieldMask{
|
|
Paths: []string{},
|
|
}
|
|
updates := &message.AlterCollectionMessageUpdates{}
|
|
|
|
if req.GetNewDBName() != req.GetDbName() {
|
|
updates.DbName = newDB.Name
|
|
updates.DbId = newDB.ID
|
|
updateMask.Paths = append(updateMask.Paths, message.FieldMaskDB)
|
|
}
|
|
if req.GetNewName() != req.GetOldName() {
|
|
updates.CollectionName = req.GetNewName()
|
|
updateMask.Paths = append(updateMask.Paths, message.FieldMaskCollectionName)
|
|
}
|
|
|
|
channels := make([]string, 0, len(coll.VirtualChannelNames)+1)
|
|
channels = append(channels, streaming.WAL().ControlChannel())
|
|
channels = append(channels, coll.VirtualChannelNames...)
|
|
cacheExpirations, err := c.getCacheExpireForCollection(ctx, req.GetDbName(), req.GetOldName())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
msg := message.NewAlterCollectionMessageBuilderV2().
|
|
WithHeader(&message.AlterCollectionMessageHeader{
|
|
DbId: coll.DBID,
|
|
CollectionId: coll.CollectionID,
|
|
UpdateMask: updateMask,
|
|
CacheExpirations: cacheExpirations,
|
|
}).
|
|
WithBody(&message.AlterCollectionMessageBody{
|
|
Updates: updates,
|
|
}).
|
|
WithBroadcast(channels).
|
|
MustBuildBroadcast()
|
|
_, err = broadcaster.Broadcast(ctx, msg)
|
|
return err
|
|
}
|
|
|
|
func (c *Core) validateEncryption(ctx context.Context, oldDBName string, newDBName string) error {
|
|
if oldDBName == newDBName {
|
|
return nil
|
|
}
|
|
// Check if renaming across databases with encryption enabled
|
|
|
|
// old and new DB names are filled in Prepare, shouldn't be empty here
|
|
originalDB, err := c.meta.GetDatabaseByName(ctx, oldDBName, typeutil.MaxTimestamp)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get original database: %w", err)
|
|
}
|
|
|
|
targetDB, err := c.meta.GetDatabaseByName(ctx, newDBName, typeutil.MaxTimestamp)
|
|
if err != nil {
|
|
return fmt.Errorf("target database %s not found: %w", newDBName, err)
|
|
}
|
|
|
|
// Check if either database has encryption enabled
|
|
if hookutil.IsDBEncryptionEnabled(originalDB.Properties) || hookutil.IsDBEncryptionEnabled(targetDB.Properties) {
|
|
return fmt.Errorf("deny to change collection databases due to at least one database enabled encryption, original DB: %s, target DB: %s", oldDBName, newDBName)
|
|
}
|
|
|
|
return nil
|
|
}
|