MongoDB
- Canonical
- Databases
Channel | Revision | Published | Runs on |
---|---|---|---|
6/stable | 199 | 04 Oct 2024 | |
6/candidate | 199 | 04 Oct 2024 | |
6/beta | 199 | 04 Oct 2024 | |
6/edge | 204 | 12 Nov 2024 | |
5/stable | 117 | 20 Apr 2023 | |
5/candidate | 117 | 20 Apr 2023 | |
5/edge | 139 | 21 Nov 2023 | |
5/edge | 109 | 06 Mar 2023 | |
3.6/stable | 100 | 28 Apr 2023 | |
3.6/candidate | 100 | 13 Apr 2023 | |
3.6/edge | 100 | 03 Feb 2023 |
juju deploy mongodb --channel 6/stable
Deploy universal operators easily with Juju, the Universal Operator Lifecycle Manager.
Platform:
22.04
20.04
18.04
charms.mongodb.v1.helpers
-
- Last updated 03 Oct 2024
- Revision Library version 1.12
"""Simple functions, which can be used in both K8s and VM charms."""
# Copyright 2024 Canonical Ltd.
# See LICENSE file for licensing details.
import json
import logging
import os
import secrets
import string
import subprocess
from typing import List, Mapping
from charms.mongodb.v1.mongodb import MongoConfiguration
from ops.model import ActiveStatus, MaintenanceStatus, StatusBase, WaitingStatus
from config import Config
# The unique Charmhub library identifier, never change it
LIBID = "b9a7fe0c38d8486a9d1ce94c27d4758e"
# Increment this major API version when introducing breaking changes
LIBAPI = 1
# Increment this PATCH version before using `charmcraft publish-lib` or reset
# to 0 if you are raising the major API version
LIBPATCH = 12
# path to store mongodb ketFile
KEY_FILE = "keyFile"
TLS_EXT_PEM_FILE = "external-cert.pem"
TLS_EXT_CA_FILE = "external-ca.crt"
TLS_INT_PEM_FILE = "internal-cert.pem"
TLS_INT_CA_FILE = "internal-ca.crt"
MONGODB_COMMON_DIR = "/var/snap/charmed-mongodb/common"
MONGODB_SNAP_DATA_DIR = "/var/snap/charmed-mongodb/current"
MONGO_SHELL = "charmed-mongodb.mongosh"
DATA_DIR = "/var/lib/mongodb"
LOG_DIR = "/var/log/mongodb"
CONF_DIR = "/etc/mongod"
MONGODB_LOG_FILENAME = "mongodb.log"
logger = logging.getLogger(__name__)
def _get_logging_options(snap_install: bool) -> str:
"""Returns config option for log path.
:param snap_install: indicate that charmed-mongodb was installed from snap (VM charms)
:return: a path to log file to be used
"""
log_path = f"{LOG_DIR}/{MONGODB_LOG_FILENAME}"
if snap_install:
log_path = f"{MONGODB_COMMON_DIR}{log_path}"
return f"--logpath={log_path}"
def _get_audit_log_settings(snap_install: bool) -> List[str]:
"""Return config options for audit log.
:param snap_install: indicate that charmed-mongodb was installed from snap (VM charms)
:return: a list of audit log settings for charmed MongoDB
"""
audit_log_path = f"{LOG_DIR}/{Config.AuditLog.FILE_NAME}"
if snap_install:
audit_log_path = f"{MONGODB_COMMON_DIR}{audit_log_path}"
return [
f"--auditDestination={Config.AuditLog.DESTINATION}",
f"--auditFormat={Config.AuditLog.FORMAT}",
f"--auditPath={audit_log_path}",
]
# noinspection GrazieInspection
def get_create_user_cmd(config: MongoConfiguration, mongo_path=MONGO_SHELL) -> List[str]:
"""Creates initial admin user for MongoDB.
Initial admin user can be created only through localhost connection.
see https://www.mongodb.com/docs/manual/core/localhost-exception/
unfortunately, pymongo not able to create connection which considered
as local connection by MongoDB, even if socket connection used.
As result where are only hackish ways to create initial user.
It is needed to install mongodb-clients inside charm container to make
this function work correctly
"""
return [
mongo_path,
"mongodb://localhost/admin",
"--quiet",
"--eval",
'"db.createUser({'
f" user: '{config.username}',"
" pwd: passwordPrompt(),"
" roles:["
" {'role': 'userAdminAnyDatabase', 'db': 'admin'}, "
" {'role': 'readWriteAnyDatabase', 'db': 'admin'}, "
" {'role': 'clusterAdmin', 'db': 'admin'}, "
" ],"
" mechanisms: ['SCRAM-SHA-256'],"
" passwordDigestor: 'server',"
'})"',
]
def get_mongos_args(
config,
snap_install: bool = False,
config_server_db: str = None,
external_connectivity: bool = True,
) -> str:
"""Returns the arguments used for starting mongos on a config-server side application.
Returns:
A string representing the arguments to be passed to mongos.
"""
# suborinate charm which provides its own config_server_db, should only use unix domain socket
binding_ips = (
"--bind_ip_all"
if external_connectivity
else f"--bind_ip {MONGODB_COMMON_DIR}/var/mongodb-27018.sock --filePermissions 0766"
)
# mongos running on the config server communicates through localhost
config_server_db = config_server_db or f"{config.replset}/localhost:{Config.MONGODB_PORT}"
full_conf_dir = f"{MONGODB_SNAP_DATA_DIR}{CONF_DIR}" if snap_install else CONF_DIR
cmd = [
# mongos on config server side should run on 0.0.0.0 so it can be accessed by other units
# in the sharded cluster
binding_ips,
f"--configdb {config_server_db}",
# config server is already using 27017
f"--port {Config.MONGOS_PORT}",
"--logRotate reopen",
"--logappend",
]
# TODO : generalise these into functions to be re-used
if config.tls_external:
cmd.extend(
[
f"--tlsCAFile={full_conf_dir}/{TLS_EXT_CA_FILE}",
f"--tlsCertificateKeyFile={full_conf_dir}/{TLS_EXT_PEM_FILE}",
# allow non-TLS connections
"--tlsMode=preferTLS",
"--tlsDisabledProtocols=TLS1_0,TLS1_1",
]
)
# internal TLS can be enabled only if external is enabled
if config.tls_internal and config.tls_external:
cmd.extend(
[
"--clusterAuthMode=x509",
"--tlsAllowInvalidCertificates",
f"--tlsClusterCAFile={full_conf_dir}/{TLS_INT_CA_FILE}",
f"--tlsClusterFile={full_conf_dir}/{TLS_INT_PEM_FILE}",
]
)
else:
# keyFile used for authentication replica set peers if no internal tls configured.
cmd.extend(
[
"--clusterAuthMode=keyFile",
f"--keyFile={full_conf_dir}/{KEY_FILE}",
]
)
cmd.append("\n")
return " ".join(cmd)
def get_mongod_args(
config: MongoConfiguration,
auth: bool = True,
snap_install: bool = False,
role: str = "replication",
) -> str:
"""Construct the MongoDB startup command line.
Returns:
A string representing the command used to start MongoDB.
"""
full_data_dir = f"{MONGODB_COMMON_DIR}{DATA_DIR}" if snap_install else DATA_DIR
full_conf_dir = f"{MONGODB_SNAP_DATA_DIR}{CONF_DIR}" if snap_install else CONF_DIR
logging_options = _get_logging_options(snap_install)
audit_log_settings = _get_audit_log_settings(snap_install)
cmd = [
# bind to localhost and external interfaces
"--bind_ip_all",
# part of replicaset
f"--replSet={config.replset}",
# db must be located within the snap common directory since the snap is strictly confined
f"--dbpath={full_data_dir}",
# for simplicity we run the mongod daemon on shards, configsvrs, and replicas on the same
# port
f"--port={Config.MONGODB_PORT}",
"--setParameter processUmask=037", # required for log files perminission (g+r)
"--logRotate reopen",
"--logappend",
logging_options,
]
cmd.extend(audit_log_settings)
if auth:
cmd.extend(["--auth"])
if auth and not config.tls_internal:
# keyFile cannot be used without auth and cannot be used in tandem with internal TLS
cmd.extend(
[
"--clusterAuthMode=keyFile",
f"--keyFile={full_conf_dir}/{KEY_FILE}",
]
)
if config.tls_external:
cmd.extend(
[
f"--tlsCAFile={full_conf_dir}/{TLS_EXT_CA_FILE}",
f"--tlsCertificateKeyFile={full_conf_dir}/{TLS_EXT_PEM_FILE}",
# allow non-TLS connections
"--tlsMode=preferTLS",
"--tlsDisabledProtocols=TLS1_0,TLS1_1",
]
)
# internal TLS can be enabled only in external is enabled
if config.tls_internal and config.tls_external:
cmd.extend(
[
"--clusterAuthMode=x509",
"--tlsAllowInvalidCertificates",
f"--tlsClusterCAFile={full_conf_dir}/{TLS_INT_CA_FILE}",
f"--tlsClusterFile={full_conf_dir}/{TLS_INT_PEM_FILE}",
]
)
if role == Config.Role.CONFIG_SERVER:
cmd.append("--configsvr")
if role == Config.Role.SHARD:
cmd.append("--shardsvr")
cmd.append("\n")
return " ".join(cmd)
def generate_password() -> str:
"""Generate a random password string.
Returns:
A random password string.
"""
choices = string.ascii_letters + string.digits
return "".join([secrets.choice(choices) for _ in range(32)])
def generate_keyfile() -> str:
"""Key file used for authentication between replica set peers.
Returns:
A maximum allowed random string.
"""
choices = string.ascii_letters + string.digits
return "".join([secrets.choice(choices) for _ in range(1024)])
def copy_licenses_to_unit():
"""Copies licenses packaged in the snap to the charm's licenses directory."""
os.makedirs("src/licenses", exist_ok=True)
subprocess.check_output("cp LICENSE src/licenses/LICENSE-charm", shell=True)
subprocess.check_output(
"cp -r /snap/charmed-mongodb/current/licenses/* src/licenses", shell=True
)
def current_pbm_op(pbm_status: str) -> str:
"""Parses pbm status for the operation that pbm is running."""
pbm_status = json.loads(pbm_status)
return pbm_status["running"] if "running" in pbm_status else ""
def process_pbm_status(pbm_status: str) -> StatusBase:
"""Parses current pbm operation and returns unit status."""
current_op = current_pbm_op(pbm_status)
# no operations are currently running with pbm
if current_op == {}:
return ActiveStatus("")
if current_op["type"] == "backup":
backup_id = current_op["name"]
return MaintenanceStatus(f"backup started/running, backup id:'{backup_id}'")
if current_op["type"] == "restore":
backup_id = current_op["name"]
return MaintenanceStatus(f"restore started/running, backup id:'{backup_id}'")
if current_op["type"] == "resync":
return WaitingStatus("waiting to sync s3 configurations.")
return ActiveStatus()
def add_args_to_env(var: str, args: str):
"""Adds the provided arguments to the environment as the provided variable."""
with open(Config.ENV_VAR_PATH, "r") as env_var_file:
env_vars = env_var_file.readlines()
args_added = False
for index, line in enumerate(env_vars):
if var in line:
args_added = True
env_vars[index] = f"{var}={args}"
# if it is the first time adding these args to the file - will will need to append them to the
# file
if not args_added:
env_vars.append(f"{var}={args}")
with open(Config.ENV_VAR_PATH, "w") as service_file:
service_file.writelines(env_vars)
def safe_exec(
command: list[str] | str,
env: Mapping[str, str] | None = None,
working_dir: str | None = None,
) -> str:
"""Execs a command on the workload in a safe way."""
try:
output = subprocess.check_output(
command,
stderr=subprocess.PIPE,
universal_newlines=True,
shell=isinstance(command, str),
env=env,
cwd=working_dir,
)
logger.debug(f"{output=}")
return output
except subprocess.CalledProcessError as err:
logger.error(f"cmd failed - {err.cmd}, {err.stdout}, {err.stderr}")
raise