Remove second database for `AbusiveHostRules`
This commit is contained in:
parent
dba1711e8d
commit
0ce87153e5
|
@ -221,12 +221,6 @@ abuseDatabase: # Postgresql database configuration
|
||||||
password: password
|
password: password
|
||||||
url: jdbc:postgresql://example.com:5432/abusedb
|
url: jdbc:postgresql://example.com:5432/abusedb
|
||||||
|
|
||||||
newAbuseDatabase: # Postgresql database configuration
|
|
||||||
driverClass: org.postgresql.Driver
|
|
||||||
user: example
|
|
||||||
password: password
|
|
||||||
url: jdbc:postgresql://new.example.com:5432/abusedb
|
|
||||||
|
|
||||||
accountDatabaseCrawler:
|
accountDatabaseCrawler:
|
||||||
chunkSize: 10 # accounts per run
|
chunkSize: 10 # accounts per run
|
||||||
chunkIntervalMs: 60000 # time per run
|
chunkIntervalMs: 60000 # time per run
|
||||||
|
|
|
@ -215,11 +215,6 @@ public class WhisperServerConfiguration extends Configuration {
|
||||||
@JsonProperty
|
@JsonProperty
|
||||||
private DatabaseConfiguration abuseDatabase;
|
private DatabaseConfiguration abuseDatabase;
|
||||||
|
|
||||||
@Valid
|
|
||||||
@NotNull
|
|
||||||
@JsonProperty
|
|
||||||
private DatabaseConfiguration newAbuseDatabase;
|
|
||||||
|
|
||||||
@Valid
|
@Valid
|
||||||
@NotNull
|
@NotNull
|
||||||
@JsonProperty
|
@JsonProperty
|
||||||
|
@ -461,10 +456,6 @@ public class WhisperServerConfiguration extends Configuration {
|
||||||
return abuseDatabase;
|
return abuseDatabase;
|
||||||
}
|
}
|
||||||
|
|
||||||
public DatabaseConfiguration getNewAbuseDatabaseConfiguration() {
|
|
||||||
return newAbuseDatabase;
|
|
||||||
}
|
|
||||||
|
|
||||||
public RateLimitsConfiguration getLimitsConfiguration() {
|
public RateLimitsConfiguration getLimitsConfiguration() {
|
||||||
return limits;
|
return limits;
|
||||||
}
|
}
|
||||||
|
|
|
@ -214,7 +214,6 @@ import org.whispersystems.textsecuregcm.websocket.WebSocketAccountAuthenticator;
|
||||||
import org.whispersystems.textsecuregcm.workers.CertificateCommand;
|
import org.whispersystems.textsecuregcm.workers.CertificateCommand;
|
||||||
import org.whispersystems.textsecuregcm.workers.CheckDynamicConfigurationCommand;
|
import org.whispersystems.textsecuregcm.workers.CheckDynamicConfigurationCommand;
|
||||||
import org.whispersystems.textsecuregcm.workers.DeleteUserCommand;
|
import org.whispersystems.textsecuregcm.workers.DeleteUserCommand;
|
||||||
import org.whispersystems.textsecuregcm.workers.MigrateAbusiveHostRulesCommand;
|
|
||||||
import org.whispersystems.textsecuregcm.workers.ReserveUsernameCommand;
|
import org.whispersystems.textsecuregcm.workers.ReserveUsernameCommand;
|
||||||
import org.whispersystems.textsecuregcm.workers.ServerVersionCommand;
|
import org.whispersystems.textsecuregcm.workers.ServerVersionCommand;
|
||||||
import org.whispersystems.textsecuregcm.workers.SetCrawlerAccelerationTask;
|
import org.whispersystems.textsecuregcm.workers.SetCrawlerAccelerationTask;
|
||||||
|
@ -243,7 +242,6 @@ public class WhisperServerService extends Application<WhisperServerConfiguration
|
||||||
bootstrap.addCommand(new CheckDynamicConfigurationCommand());
|
bootstrap.addCommand(new CheckDynamicConfigurationCommand());
|
||||||
bootstrap.addCommand(new SetUserDiscoverabilityCommand());
|
bootstrap.addCommand(new SetUserDiscoverabilityCommand());
|
||||||
bootstrap.addCommand(new ReserveUsernameCommand());
|
bootstrap.addCommand(new ReserveUsernameCommand());
|
||||||
bootstrap.addCommand(new MigrateAbusiveHostRulesCommand());
|
|
||||||
|
|
||||||
bootstrap.addBundle(new NameableMigrationsBundle<WhisperServerConfiguration>("abusedb", "abusedb.xml") {
|
bootstrap.addBundle(new NameableMigrationsBundle<WhisperServerConfiguration>("abusedb", "abusedb.xml") {
|
||||||
@Override
|
@Override
|
||||||
|
@ -312,10 +310,6 @@ public class WhisperServerService extends Application<WhisperServerConfiguration
|
||||||
FaultTolerantDatabase abuseDatabase = new FaultTolerantDatabase("abuse_database", abuseJdbi,
|
FaultTolerantDatabase abuseDatabase = new FaultTolerantDatabase("abuse_database", abuseJdbi,
|
||||||
config.getAbuseDatabaseConfiguration().getCircuitBreakerConfiguration());
|
config.getAbuseDatabaseConfiguration().getCircuitBreakerConfiguration());
|
||||||
|
|
||||||
Jdbi newAbuseJdbi = jdbiFactory.build(environment, config.getAbuseDatabaseConfiguration(), "abusedb2");
|
|
||||||
FaultTolerantDatabase newAbuseDatabase = new FaultTolerantDatabase("abuse_database2", newAbuseJdbi,
|
|
||||||
config.getAbuseDatabaseConfiguration().getCircuitBreakerConfiguration());
|
|
||||||
|
|
||||||
DynamoDbAsyncClient dynamoDbAsyncClient = DynamoDbFromConfig.asyncClient(
|
DynamoDbAsyncClient dynamoDbAsyncClient = DynamoDbFromConfig.asyncClient(
|
||||||
config.getDynamoDbClientConfiguration(),
|
config.getDynamoDbClientConfiguration(),
|
||||||
software.amazon.awssdk.auth.credentials.InstanceProfileCredentialsProvider.create());
|
software.amazon.awssdk.auth.credentials.InstanceProfileCredentialsProvider.create());
|
||||||
|
@ -394,8 +388,7 @@ public class WhisperServerService extends Application<WhisperServerConfiguration
|
||||||
MessagesDynamoDb messagesDynamoDb = new MessagesDynamoDb(messageDynamoDb,
|
MessagesDynamoDb messagesDynamoDb = new MessagesDynamoDb(messageDynamoDb,
|
||||||
config.getMessageDynamoDbConfiguration().getTableName(),
|
config.getMessageDynamoDbConfiguration().getTableName(),
|
||||||
config.getMessageDynamoDbConfiguration().getTimeToLive());
|
config.getMessageDynamoDbConfiguration().getTimeToLive());
|
||||||
AbusiveHostRules abusiveHostRules = new AbusiveHostRules(abuseDatabase, newAbuseDatabase,
|
AbusiveHostRules abusiveHostRules = new AbusiveHostRules(abuseDatabase);
|
||||||
dynamicConfigurationManager);
|
|
||||||
RemoteConfigs remoteConfigs = new RemoteConfigs(dynamoDbClient,
|
RemoteConfigs remoteConfigs = new RemoteConfigs(dynamoDbClient,
|
||||||
config.getDynamoDbTables().getRemoteConfig().getTableName());
|
config.getDynamoDbTables().getRemoteConfig().getTableName());
|
||||||
PushChallengeDynamoDb pushChallengeDynamoDb = new PushChallengeDynamoDb(pushChallengeDynamoDbClient,
|
PushChallengeDynamoDb pushChallengeDynamoDb = new PushChallengeDynamoDb(pushChallengeDynamoDbClient,
|
||||||
|
|
|
@ -1,32 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2013-2021 Signal Messenger, LLC
|
|
||||||
* SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.whispersystems.textsecuregcm.configuration.dynamic;
|
|
||||||
|
|
||||||
import com.fasterxml.jackson.annotation.JsonProperty;
|
|
||||||
|
|
||||||
public class DynamicAbusiveHostRulesMigrationConfiguration {
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
private boolean newReadEnabled = false;
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
private boolean newWriteEnabled = false;
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
private boolean newPrimary = false;
|
|
||||||
|
|
||||||
public boolean isNewReadEnabled() {
|
|
||||||
return newReadEnabled;
|
|
||||||
}
|
|
||||||
|
|
||||||
public boolean isNewWriteEnabled() {
|
|
||||||
return newWriteEnabled;
|
|
||||||
}
|
|
||||||
|
|
||||||
public boolean isNewPrimary() {
|
|
||||||
return newPrimary;
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -55,14 +55,6 @@ public class DynamicConfiguration {
|
||||||
@Valid
|
@Valid
|
||||||
private DynamicPushLatencyConfiguration pushLatency = new DynamicPushLatencyConfiguration(Collections.emptyMap());
|
private DynamicPushLatencyConfiguration pushLatency = new DynamicPushLatencyConfiguration(Collections.emptyMap());
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
@Valid
|
|
||||||
private DynamicProfileMigrationConfiguration profileMigration = new DynamicProfileMigrationConfiguration();
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
@Valid
|
|
||||||
private DynamicAbusiveHostRulesMigrationConfiguration abusiveHostRulesMigration = new DynamicAbusiveHostRulesMigrationConfiguration();
|
|
||||||
|
|
||||||
public Optional<DynamicExperimentEnrollmentConfiguration> getExperimentEnrollmentConfiguration(
|
public Optional<DynamicExperimentEnrollmentConfiguration> getExperimentEnrollmentConfiguration(
|
||||||
final String experimentName) {
|
final String experimentName) {
|
||||||
return Optional.ofNullable(experiments.get(experimentName));
|
return Optional.ofNullable(experiments.get(experimentName));
|
||||||
|
@ -118,11 +110,4 @@ public class DynamicConfiguration {
|
||||||
return pushLatency;
|
return pushLatency;
|
||||||
}
|
}
|
||||||
|
|
||||||
public DynamicProfileMigrationConfiguration getProfileMigrationConfiguration() {
|
|
||||||
return profileMigration;
|
|
||||||
}
|
|
||||||
|
|
||||||
public DynamicAbusiveHostRulesMigrationConfiguration getAbusiveHostRulesMigrationConfiguration() {
|
|
||||||
return abusiveHostRulesMigration;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,46 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2013-2021 Signal Messenger, LLC
|
|
||||||
* SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.whispersystems.textsecuregcm.configuration.dynamic;
|
|
||||||
|
|
||||||
import com.fasterxml.jackson.annotation.JsonProperty;
|
|
||||||
|
|
||||||
public class DynamicProfileMigrationConfiguration {
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
private boolean dynamoDbDeleteEnabled = false;
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
private boolean dynamoDbWriteEnabled = false;
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
private boolean dynamoDbReadForComparisonEnabled = false;
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
private boolean dynamoDbReadPrimary = false;
|
|
||||||
|
|
||||||
@JsonProperty
|
|
||||||
private boolean logMismatches = false;
|
|
||||||
|
|
||||||
public boolean isDynamoDbDeleteEnabled() {
|
|
||||||
return dynamoDbDeleteEnabled;
|
|
||||||
}
|
|
||||||
|
|
||||||
public boolean isDynamoDbWriteEnabled() {
|
|
||||||
return dynamoDbWriteEnabled;
|
|
||||||
}
|
|
||||||
|
|
||||||
public boolean isDynamoDbReadForComparisonEnabled() {
|
|
||||||
return dynamoDbReadForComparisonEnabled;
|
|
||||||
}
|
|
||||||
|
|
||||||
public boolean isDynamoDbReadPrimary() {
|
|
||||||
return dynamoDbReadPrimary;
|
|
||||||
}
|
|
||||||
|
|
||||||
public boolean isLogMismatches() {
|
|
||||||
return logMismatches;
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -10,17 +10,11 @@ import static com.codahale.metrics.MetricRegistry.name;
|
||||||
import com.codahale.metrics.MetricRegistry;
|
import com.codahale.metrics.MetricRegistry;
|
||||||
import com.codahale.metrics.SharedMetricRegistries;
|
import com.codahale.metrics.SharedMetricRegistries;
|
||||||
import com.codahale.metrics.Timer;
|
import com.codahale.metrics.Timer;
|
||||||
import com.google.common.base.Suppliers;
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.function.BiConsumer;
|
|
||||||
import java.util.function.Supplier;
|
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
import org.whispersystems.textsecuregcm.configuration.dynamic.DynamicConfiguration;
|
|
||||||
import org.whispersystems.textsecuregcm.experiment.Experiment;
|
|
||||||
import org.whispersystems.textsecuregcm.storage.mappers.AbusiveHostRuleRowMapper;
|
import org.whispersystems.textsecuregcm.storage.mappers.AbusiveHostRuleRowMapper;
|
||||||
import org.whispersystems.textsecuregcm.util.Constants;
|
import org.whispersystems.textsecuregcm.util.Constants;
|
||||||
import org.whispersystems.textsecuregcm.util.Pair;
|
|
||||||
|
|
||||||
public class AbusiveHostRules {
|
public class AbusiveHostRules {
|
||||||
|
|
||||||
|
@ -36,26 +30,16 @@ public class AbusiveHostRules {
|
||||||
private final Timer getTimer = metricRegistry.timer(name(AbusiveHostRules.class, "get"));
|
private final Timer getTimer = metricRegistry.timer(name(AbusiveHostRules.class, "get"));
|
||||||
private final Timer insertTimer = metricRegistry.timer(name(AbusiveHostRules.class, "setBlockedHost"));
|
private final Timer insertTimer = metricRegistry.timer(name(AbusiveHostRules.class, "setBlockedHost"));
|
||||||
|
|
||||||
private final FaultTolerantDatabase oldDatabase;
|
private final FaultTolerantDatabase database;
|
||||||
private final FaultTolerantDatabase newDatabase;
|
|
||||||
|
|
||||||
private final DynamicConfigurationManager<DynamicConfiguration> dynamicConfigurationManager;
|
public AbusiveHostRules(FaultTolerantDatabase database) {
|
||||||
private final Experiment migrationExperiment = new Experiment("abusiveHostRulesMigration");
|
|
||||||
|
|
||||||
public AbusiveHostRules(FaultTolerantDatabase oldDatabase, FaultTolerantDatabase newDatabase,
|
this.database = database;
|
||||||
DynamicConfigurationManager<DynamicConfiguration> dynamicConfigurationManager) {
|
this.database.getDatabase().registerRowMapper(new AbusiveHostRuleRowMapper());
|
||||||
|
|
||||||
this.oldDatabase = oldDatabase;
|
|
||||||
this.oldDatabase.getDatabase().registerRowMapper(new AbusiveHostRuleRowMapper());
|
|
||||||
|
|
||||||
this.newDatabase = newDatabase;
|
|
||||||
this.newDatabase.getDatabase().registerRowMapper(new AbusiveHostRuleRowMapper());
|
|
||||||
|
|
||||||
this.dynamicConfigurationManager = dynamicConfigurationManager;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public List<AbusiveHostRule> getAbusiveHostRulesFor(String host) {
|
public List<AbusiveHostRule> getAbusiveHostRulesFor(String host) {
|
||||||
final List<AbusiveHostRule> oldDbRules = oldDatabase.with(jdbi -> jdbi.withHandle(handle -> {
|
return database.with(jdbi -> jdbi.withHandle(handle -> {
|
||||||
try (Timer.Context timer = getTimer.time()) {
|
try (Timer.Context timer = getTimer.time()) {
|
||||||
return handle.createQuery("SELECT * FROM abusive_host_rules WHERE :host::inet <<= " + HOST)
|
return handle.createQuery("SELECT * FROM abusive_host_rules WHERE :host::inet <<= " + HOST)
|
||||||
.bind("host", host)
|
.bind("host", host)
|
||||||
|
@ -63,25 +47,10 @@ public class AbusiveHostRules {
|
||||||
.list();
|
.list();
|
||||||
}
|
}
|
||||||
}));
|
}));
|
||||||
|
|
||||||
final Supplier<List<AbusiveHostRule>> newDbRules = Suppliers.memoize(
|
|
||||||
() -> newDatabase.with(jdbi -> jdbi.withHandle(
|
|
||||||
handle -> handle.createQuery("SELECT * FROM abusive_host_rules WHERE :host::inet <<= " + HOST)
|
|
||||||
.bind("host", host)
|
|
||||||
.mapTo(AbusiveHostRule.class)
|
|
||||||
.list())));
|
|
||||||
|
|
||||||
if (dynamicConfigurationManager.getConfiguration().getAbusiveHostRulesMigrationConfiguration().isNewReadEnabled()) {
|
|
||||||
migrationExperiment.compareSupplierResult(oldDbRules, newDbRules);
|
|
||||||
}
|
|
||||||
|
|
||||||
return dynamicConfigurationManager.getConfiguration().getAbusiveHostRulesMigrationConfiguration().isNewPrimary()
|
|
||||||
? newDbRules.get()
|
|
||||||
: oldDbRules;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public void setBlockedHost(String host, String notes) {
|
public void setBlockedHost(String host, String notes) {
|
||||||
oldDatabase.use(jdbi -> jdbi.useHandle(handle -> {
|
database.use(jdbi -> jdbi.useHandle(handle -> {
|
||||||
try (Timer.Context timer = insertTimer.time()) {
|
try (Timer.Context timer = insertTimer.time()) {
|
||||||
handle.createUpdate(
|
handle.createUpdate(
|
||||||
"INSERT INTO abusive_host_rules(host, blocked, notes) VALUES(:host::inet, :blocked, :notes) ON CONFLICT DO NOTHING")
|
"INSERT INTO abusive_host_rules(host, blocked, notes) VALUES(:host::inet, :blocked, :notes) ON CONFLICT DO NOTHING")
|
||||||
|
@ -91,47 +60,6 @@ public class AbusiveHostRules {
|
||||||
.execute();
|
.execute();
|
||||||
}
|
}
|
||||||
}));
|
}));
|
||||||
|
|
||||||
if (dynamicConfigurationManager.getConfiguration().getAbusiveHostRulesMigrationConfiguration()
|
|
||||||
.isNewWriteEnabled()) {
|
|
||||||
try {
|
|
||||||
newDatabase.use(jdbi -> jdbi.useHandle(handle -> handle.createUpdate(
|
|
||||||
"INSERT INTO abusive_host_rules(host, blocked, notes) VALUES(:host::inet, :blocked, :notes) ON CONFLICT DO NOTHING")
|
|
||||||
.bind("host", host)
|
|
||||||
.bind("blocked", 1)
|
|
||||||
.bind("notes", notes)
|
|
||||||
.execute()));
|
|
||||||
} catch (final Exception e) {
|
|
||||||
logger.warn("Failed to insert rule in new database", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public int migrateAbusiveHostRule(AbusiveHostRule rule, String notes) {
|
|
||||||
return newDatabase.with(jdbi -> jdbi.withHandle(handle -> {
|
|
||||||
try (Timer.Context timer = insertTimer.time()) {
|
|
||||||
return handle.createUpdate(
|
|
||||||
"INSERT INTO abusive_host_rules(host, blocked, notes, regions) VALUES(:host::inet, :blocked, :notes, :regions) ON CONFLICT DO NOTHING")
|
|
||||||
.bind("host", rule.host())
|
|
||||||
.bind("blocked", rule.blocked() ? 1 : 0)
|
|
||||||
.bind("notes", notes)
|
|
||||||
.bind("regions", String.join(",", rule.regions()))
|
|
||||||
.execute();
|
|
||||||
}
|
|
||||||
}));
|
|
||||||
}
|
|
||||||
|
|
||||||
public void forEachInOldDatabase(final BiConsumer<AbusiveHostRule, String> consumer, final int fetchSize) {
|
|
||||||
final AbusiveHostRuleRowMapper rowMapper = new AbusiveHostRuleRowMapper();
|
|
||||||
|
|
||||||
oldDatabase.use(jdbi -> jdbi.useHandle(handle -> handle.useTransaction(transactionHandle ->
|
|
||||||
transactionHandle.createQuery("SELECT * FROM abusive_host_rules")
|
|
||||||
.setFetchSize(fetchSize)
|
|
||||||
.map((resultSet, ctx) -> {
|
|
||||||
AbusiveHostRule rule = rowMapper.map(resultSet, ctx);
|
|
||||||
String notes = resultSet.getString(NOTES);
|
|
||||||
return new Pair<>(rule, notes);
|
|
||||||
})
|
|
||||||
.forEach(pair -> consumer.accept(pair.first(), pair.second())))));
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,92 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2021 Signal Messenger, LLC
|
|
||||||
* SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.whispersystems.textsecuregcm.workers;
|
|
||||||
|
|
||||||
import com.codahale.metrics.jdbi3.strategies.DefaultNameStrategy;
|
|
||||||
import io.dropwizard.Application;
|
|
||||||
import io.dropwizard.cli.EnvironmentCommand;
|
|
||||||
import io.dropwizard.jdbi3.JdbiFactory;
|
|
||||||
import io.dropwizard.setup.Environment;
|
|
||||||
import net.sourceforge.argparse4j.inf.Namespace;
|
|
||||||
import net.sourceforge.argparse4j.inf.Subparser;
|
|
||||||
import org.jdbi.v3.core.Jdbi;
|
|
||||||
import org.slf4j.Logger;
|
|
||||||
import org.slf4j.LoggerFactory;
|
|
||||||
import org.whispersystems.textsecuregcm.WhisperServerConfiguration;
|
|
||||||
import org.whispersystems.textsecuregcm.configuration.dynamic.DynamicConfiguration;
|
|
||||||
import org.whispersystems.textsecuregcm.storage.AbusiveHostRules;
|
|
||||||
import org.whispersystems.textsecuregcm.storage.DynamicConfigurationManager;
|
|
||||||
import org.whispersystems.textsecuregcm.storage.FaultTolerantDatabase;
|
|
||||||
import java.util.concurrent.atomic.AtomicInteger;
|
|
||||||
|
|
||||||
public class MigrateAbusiveHostRulesCommand extends EnvironmentCommand<WhisperServerConfiguration> {
|
|
||||||
|
|
||||||
private static final Logger log = LoggerFactory.getLogger(MigrateAbusiveHostRulesCommand.class);
|
|
||||||
|
|
||||||
public MigrateAbusiveHostRulesCommand() {
|
|
||||||
super(new Application<>() {
|
|
||||||
@Override
|
|
||||||
public void run(WhisperServerConfiguration configuration, Environment environment) {
|
|
||||||
}
|
|
||||||
}, "migrate-abusive-host-rules", "Migrate abusive host rules from one Postgres to another");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void configure(Subparser subparser) {
|
|
||||||
super.configure(subparser);
|
|
||||||
|
|
||||||
subparser.addArgument("-s", "--fetch-size")
|
|
||||||
.dest("fetchSize")
|
|
||||||
.type(Integer.class)
|
|
||||||
.required(false)
|
|
||||||
.setDefault(512)
|
|
||||||
.help("The number of rules to fetch from Postgres at once");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected void run(final Environment environment, final Namespace namespace,
|
|
||||||
final WhisperServerConfiguration config) throws Exception {
|
|
||||||
|
|
||||||
DynamicConfigurationManager<DynamicConfiguration> dynamicConfigurationManager =
|
|
||||||
new DynamicConfigurationManager<>(config.getAppConfig().getApplication(),
|
|
||||||
config.getAppConfig().getEnvironment(),
|
|
||||||
config.getAppConfig().getConfigurationName(),
|
|
||||||
DynamicConfiguration.class);
|
|
||||||
|
|
||||||
JdbiFactory jdbiFactory = new JdbiFactory(DefaultNameStrategy.CHECK_EMPTY);
|
|
||||||
Jdbi abuseJdbi = jdbiFactory.build(environment, config.getAbuseDatabaseConfiguration(), "abusedb");
|
|
||||||
|
|
||||||
FaultTolerantDatabase abuseDatabase = new FaultTolerantDatabase("abuse_database", abuseJdbi,
|
|
||||||
config.getAbuseDatabaseConfiguration().getCircuitBreakerConfiguration());
|
|
||||||
|
|
||||||
Jdbi newAbuseJdbi = jdbiFactory.build(environment, config.getNewAbuseDatabaseConfiguration(), "abusedb2");
|
|
||||||
FaultTolerantDatabase newAbuseDatabase = new FaultTolerantDatabase("abuse_database2", newAbuseJdbi,
|
|
||||||
config.getNewAbuseDatabaseConfiguration().getCircuitBreakerConfiguration());
|
|
||||||
|
|
||||||
log.info("Beginning migration");
|
|
||||||
|
|
||||||
AbusiveHostRules abusiveHostRules = new AbusiveHostRules(abuseDatabase, newAbuseDatabase,
|
|
||||||
dynamicConfigurationManager);
|
|
||||||
|
|
||||||
final int fetchSize = namespace.getInt("fetchSize");
|
|
||||||
|
|
||||||
final AtomicInteger rulesMigrated = new AtomicInteger(0);
|
|
||||||
|
|
||||||
abusiveHostRules.forEachInOldDatabase((rule, notes) -> {
|
|
||||||
|
|
||||||
abusiveHostRules.migrateAbusiveHostRule(rule, notes);
|
|
||||||
|
|
||||||
int migrated = rulesMigrated.incrementAndGet();
|
|
||||||
|
|
||||||
if (migrated % 1_000 == 0) {
|
|
||||||
log.info("Migrated {} rules", migrated);
|
|
||||||
}
|
|
||||||
}, fetchSize);
|
|
||||||
|
|
||||||
log.info("Migration complete ({} total rules)", rulesMigrated.get());
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
|
@ -6,8 +6,6 @@
|
||||||
package org.whispersystems.textsecuregcm.tests.storage;
|
package org.whispersystems.textsecuregcm.tests.storage;
|
||||||
|
|
||||||
import static org.assertj.core.api.AssertionsForClassTypes.assertThat;
|
import static org.assertj.core.api.AssertionsForClassTypes.assertThat;
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.when;
|
|
||||||
|
|
||||||
import io.zonky.test.db.postgres.embedded.LiquibasePreparer;
|
import io.zonky.test.db.postgres.embedded.LiquibasePreparer;
|
||||||
import io.zonky.test.db.postgres.junit5.EmbeddedPostgresExtension;
|
import io.zonky.test.db.postgres.junit5.EmbeddedPostgresExtension;
|
||||||
|
@ -22,11 +20,8 @@ import org.junit.jupiter.api.BeforeEach;
|
||||||
import org.junit.jupiter.api.Test;
|
import org.junit.jupiter.api.Test;
|
||||||
import org.junit.jupiter.api.extension.RegisterExtension;
|
import org.junit.jupiter.api.extension.RegisterExtension;
|
||||||
import org.whispersystems.textsecuregcm.configuration.CircuitBreakerConfiguration;
|
import org.whispersystems.textsecuregcm.configuration.CircuitBreakerConfiguration;
|
||||||
import org.whispersystems.textsecuregcm.configuration.dynamic.DynamicAbusiveHostRulesMigrationConfiguration;
|
|
||||||
import org.whispersystems.textsecuregcm.configuration.dynamic.DynamicConfiguration;
|
|
||||||
import org.whispersystems.textsecuregcm.storage.AbusiveHostRule;
|
import org.whispersystems.textsecuregcm.storage.AbusiveHostRule;
|
||||||
import org.whispersystems.textsecuregcm.storage.AbusiveHostRules;
|
import org.whispersystems.textsecuregcm.storage.AbusiveHostRules;
|
||||||
import org.whispersystems.textsecuregcm.storage.DynamicConfigurationManager;
|
|
||||||
import org.whispersystems.textsecuregcm.storage.FaultTolerantDatabase;
|
import org.whispersystems.textsecuregcm.storage.FaultTolerantDatabase;
|
||||||
|
|
||||||
class AbusiveHostRulesTest {
|
class AbusiveHostRulesTest {
|
||||||
|
@ -43,20 +38,9 @@ class AbusiveHostRulesTest {
|
||||||
|
|
||||||
@BeforeEach
|
@BeforeEach
|
||||||
void setup() {
|
void setup() {
|
||||||
//noinspection unchecked
|
|
||||||
final DynamicConfigurationManager<DynamicConfiguration> dynamicConfigurationManager = mock(
|
|
||||||
DynamicConfigurationManager.class);
|
|
||||||
final DynamicConfiguration dynamicConfiguration = mock(DynamicConfiguration.class);
|
|
||||||
when(dynamicConfigurationManager.getConfiguration()).thenReturn(dynamicConfiguration);
|
|
||||||
when(dynamicConfiguration.getAbusiveHostRulesMigrationConfiguration()).thenReturn(
|
|
||||||
new DynamicAbusiveHostRulesMigrationConfiguration());
|
|
||||||
|
|
||||||
this.abusiveHostRules = new AbusiveHostRules(
|
this.abusiveHostRules = new AbusiveHostRules(
|
||||||
new FaultTolerantDatabase("abusive_hosts-test", Jdbi.create(db.getTestDatabase()),
|
new FaultTolerantDatabase("abusive_hosts-test", Jdbi.create(db.getTestDatabase()),
|
||||||
new CircuitBreakerConfiguration()),
|
new CircuitBreakerConfiguration()));
|
||||||
new FaultTolerantDatabase("abusive_hosts-test", Jdbi.create(newDb.getTestDatabase()),
|
|
||||||
new CircuitBreakerConfiguration()),
|
|
||||||
dynamicConfigurationManager);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -147,30 +131,4 @@ class AbusiveHostRulesTest {
|
||||||
assertThat(resultSet.getString("notes")).isEqualTo("Testing one two");
|
assertThat(resultSet.getString("notes")).isEqualTo("Testing one two");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
|
||||||
void testMigrate() throws Exception {
|
|
||||||
final int rules = 20;
|
|
||||||
for (int i = 1; i <= rules; i++) {
|
|
||||||
abusiveHostRules.setBlockedHost("172.17.0." + i, "Testing one two " + i);
|
|
||||||
}
|
|
||||||
|
|
||||||
PreparedStatement statement = newDb.getTestDatabase().getConnection()
|
|
||||||
.prepareStatement("SELECT * from abusive_host_rules");
|
|
||||||
|
|
||||||
assertThat(queryResultSize(statement.executeQuery())).isEqualTo(0);
|
|
||||||
|
|
||||||
abusiveHostRules.forEachInOldDatabase((rule, host) -> abusiveHostRules.migrateAbusiveHostRule(rule, host), 5);
|
|
||||||
|
|
||||||
assertThat(queryResultSize(statement.executeQuery())).isEqualTo(rules);
|
|
||||||
}
|
|
||||||
|
|
||||||
private int queryResultSize(ResultSet resultSet) throws SQLException {
|
|
||||||
int migrated = 0;
|
|
||||||
while (resultSet.next()) {
|
|
||||||
migrated++;
|
|
||||||
}
|
|
||||||
|
|
||||||
return migrated;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue