1 | /* |
2 | Copyright (c) 2001, 2011, Oracle and/or its affiliates. |
3 | |
4 | This program is free software; you can redistribute it and/or modify |
5 | it under the terms of the GNU General Public License as published by |
6 | the Free Software Foundation; version 2 of the License. |
7 | |
8 | This program is distributed in the hope that it will be useful, |
9 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
10 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
11 | GNU General Public License for more details. |
12 | |
13 | You should have received a copy of the GNU General Public License |
14 | along with this program; if not, write to the Free Software |
15 | Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ |
16 | |
17 | /** |
18 | @file |
19 | |
20 | All of the functions defined in this file which are not used (the ones to |
21 | handle failsafe) are not used; their code has not been updated for more |
22 | than one year now so should be considered as BADLY BROKEN. Do not enable |
23 | it. The used functions (to handle LOAD DATA FROM MASTER, plus some small |
24 | functions like register_slave()) are working. |
25 | */ |
26 | |
27 | #include "mariadb.h" |
28 | #include "sql_priv.h" |
29 | #include "sql_parse.h" // check_access |
30 | #ifdef HAVE_REPLICATION |
31 | |
32 | #include "repl_failsafe.h" |
33 | #include "sql_acl.h" // REPL_SLAVE_ACL |
34 | #include "sql_repl.h" |
35 | #include "slave.h" |
36 | #include "rpl_mi.h" |
37 | #include "rpl_filter.h" |
38 | #include "log_event.h" |
39 | #include <mysql.h> |
40 | |
41 | #define SLAVE_LIST_CHUNK 128 |
42 | #define SLAVE_ERRMSG_SIZE (FN_REFLEN+64) |
43 | |
44 | |
45 | ulong rpl_status=RPL_NULL; |
46 | mysql_mutex_t LOCK_rpl_status; |
47 | HASH slave_list; |
48 | |
49 | const char *rpl_role_type[] = {"MASTER" ,"SLAVE" ,NullS}; |
50 | TYPELIB rpl_role_typelib = {array_elements(rpl_role_type)-1,"" , |
51 | rpl_role_type, NULL}; |
52 | |
53 | const char* rpl_status_type[]= |
54 | { |
55 | "AUTH_MASTER" ,"IDLE_SLAVE" ,"ACTIVE_SLAVE" ,"LOST_SOLDIER" ,"TROOP_SOLDIER" , |
56 | "RECOVERY_CAPTAIN" ,"NULL" ,NullS |
57 | }; |
58 | |
59 | /* |
60 | All of the functions defined in this file which are not used (the ones to |
61 | handle failsafe) are not used; their code has not been updated for more than |
62 | one year now so should be considered as BADLY BROKEN. Do not enable it. |
63 | The used functions (to handle LOAD DATA FROM MASTER, plus some small |
64 | functions like register_slave()) are working. |
65 | */ |
66 | |
67 | void change_rpl_status(ulong from_status, ulong to_status) |
68 | { |
69 | mysql_mutex_lock(&LOCK_rpl_status); |
70 | if (rpl_status == from_status || rpl_status == RPL_ANY) |
71 | rpl_status = to_status; |
72 | mysql_mutex_unlock(&LOCK_rpl_status); |
73 | } |
74 | |
75 | |
76 | #define get_object(p, obj, msg) \ |
77 | {\ |
78 | uint len = (uint)*p++; \ |
79 | if (p + len > p_end || len >= sizeof(obj)) \ |
80 | {\ |
81 | errmsg= msg;\ |
82 | goto err; \ |
83 | }\ |
84 | strmake(obj,(char*) p,len); \ |
85 | p+= len; \ |
86 | }\ |
87 | |
88 | |
89 | void unregister_slave(THD* thd, bool only_mine, bool need_mutex) |
90 | { |
91 | uint32 thd_server_id= thd->variables.server_id; |
92 | if (thd_server_id) |
93 | { |
94 | if (need_mutex) |
95 | mysql_mutex_lock(&LOCK_slave_list); |
96 | |
97 | SLAVE_INFO* old_si; |
98 | if ((old_si = (SLAVE_INFO*)my_hash_search(&slave_list, |
99 | (uchar*)&thd_server_id, 4)) && |
100 | (!only_mine || old_si->thd == thd)) |
101 | my_hash_delete(&slave_list, (uchar*)old_si); |
102 | |
103 | if (need_mutex) |
104 | mysql_mutex_unlock(&LOCK_slave_list); |
105 | } |
106 | } |
107 | |
108 | |
109 | /** |
110 | Register slave in 'slave_list' hash table. |
111 | |
112 | @return |
113 | 0 ok |
114 | @return |
115 | 1 Error. Error message sent to client |
116 | */ |
117 | |
118 | int register_slave(THD* thd, uchar* packet, size_t packet_length) |
119 | { |
120 | int res; |
121 | SLAVE_INFO *si; |
122 | uchar *p= packet, *p_end= packet + packet_length; |
123 | const char *errmsg= "Wrong parameters to function register_slave" ; |
124 | |
125 | if (check_access(thd, REPL_SLAVE_ACL, any_db, NULL, NULL, 0, 0)) |
126 | return 1; |
127 | if (!(si = (SLAVE_INFO*)my_malloc(sizeof(SLAVE_INFO), MYF(MY_WME)))) |
128 | goto err2; |
129 | |
130 | thd->variables.server_id= si->server_id= uint4korr(p); |
131 | p+= 4; |
132 | get_object(p,si->host, "Failed to register slave: too long 'report-host'" ); |
133 | get_object(p,si->user, "Failed to register slave: too long 'report-user'" ); |
134 | get_object(p,si->password, "Failed to register slave; too long 'report-password'" ); |
135 | if (p+10 > p_end) |
136 | goto err; |
137 | si->port= uint2korr(p); |
138 | p += 2; |
139 | /* |
140 | We need to by pass the bytes used in the fake rpl_recovery_rank |
141 | variable. It was removed in patch for BUG#13963. But this would |
142 | make a server with that patch unable to connect to an old master. |
143 | See: BUG#49259 |
144 | */ |
145 | // si->rpl_recovery_rank= uint4korr(p); |
146 | p += 4; |
147 | if (!(si->master_id= uint4korr(p))) |
148 | si->master_id= global_system_variables.server_id; |
149 | si->thd= thd; |
150 | |
151 | mysql_mutex_lock(&LOCK_slave_list); |
152 | unregister_slave(thd,0,0); |
153 | res= my_hash_insert(&slave_list, (uchar*) si); |
154 | mysql_mutex_unlock(&LOCK_slave_list); |
155 | return res; |
156 | |
157 | err: |
158 | my_free(si); |
159 | my_message(ER_UNKNOWN_ERROR, errmsg, MYF(0)); /* purecov: inspected */ |
160 | err2: |
161 | return 1; |
162 | } |
163 | |
164 | extern "C" uint32 |
165 | *slave_list_key(SLAVE_INFO* si, size_t *len, |
166 | my_bool not_used __attribute__((unused))) |
167 | { |
168 | *len = 4; |
169 | return &si->server_id; |
170 | } |
171 | |
172 | extern "C" void slave_info_free(void *s) |
173 | { |
174 | my_free(s); |
175 | } |
176 | |
177 | #ifdef HAVE_PSI_INTERFACE |
178 | static PSI_mutex_key key_LOCK_slave_list; |
179 | |
180 | static PSI_mutex_info all_slave_list_mutexes[]= |
181 | { |
182 | { &key_LOCK_slave_list, "LOCK_slave_list" , PSI_FLAG_GLOBAL} |
183 | }; |
184 | |
185 | static void init_all_slave_list_mutexes(void) |
186 | { |
187 | const char* category= "sql" ; |
188 | int count; |
189 | |
190 | if (PSI_server == NULL) |
191 | return; |
192 | |
193 | count= array_elements(all_slave_list_mutexes); |
194 | PSI_server->register_mutex(category, all_slave_list_mutexes, count); |
195 | } |
196 | #endif /* HAVE_PSI_INTERFACE */ |
197 | |
198 | void init_slave_list() |
199 | { |
200 | #ifdef HAVE_PSI_INTERFACE |
201 | init_all_slave_list_mutexes(); |
202 | #endif |
203 | |
204 | my_hash_init(&slave_list, system_charset_info, SLAVE_LIST_CHUNK, 0, 0, |
205 | (my_hash_get_key) slave_list_key, |
206 | (my_hash_free_key) slave_info_free, 0); |
207 | mysql_mutex_init(key_LOCK_slave_list, &LOCK_slave_list, MY_MUTEX_INIT_FAST); |
208 | } |
209 | |
210 | void end_slave_list() |
211 | { |
212 | /* No protection by a mutex needed as we are only called at shutdown */ |
213 | if (my_hash_inited(&slave_list)) |
214 | { |
215 | my_hash_free(&slave_list); |
216 | mysql_mutex_destroy(&LOCK_slave_list); |
217 | } |
218 | } |
219 | |
220 | /** |
221 | Execute a SHOW SLAVE HOSTS statement. |
222 | |
223 | @param thd Pointer to THD object for the client thread executing the |
224 | statement. |
225 | |
226 | @retval FALSE success |
227 | @retval TRUE failure |
228 | */ |
229 | bool show_slave_hosts(THD* thd) |
230 | { |
231 | List<Item> field_list; |
232 | Protocol *protocol= thd->protocol; |
233 | MEM_ROOT *mem_root= thd->mem_root; |
234 | DBUG_ENTER("show_slave_hosts" ); |
235 | |
236 | field_list.push_back(new (mem_root) |
237 | Item_return_int(thd, "Server_id" , 10, |
238 | MYSQL_TYPE_LONG), |
239 | thd->mem_root); |
240 | field_list.push_back(new (mem_root) |
241 | Item_empty_string(thd, "Host" , 20), |
242 | thd->mem_root); |
243 | if (opt_show_slave_auth_info) |
244 | { |
245 | field_list.push_back(new (mem_root) Item_empty_string(thd, "User" , 20), |
246 | thd->mem_root); |
247 | field_list.push_back(new (mem_root) Item_empty_string(thd, "Password" , 20), |
248 | thd->mem_root); |
249 | } |
250 | field_list.push_back(new (mem_root) |
251 | Item_return_int(thd, "Port" , 7, MYSQL_TYPE_LONG), |
252 | thd->mem_root); |
253 | field_list.push_back(new (mem_root) |
254 | Item_return_int(thd, "Master_id" , 10, MYSQL_TYPE_LONG), |
255 | thd->mem_root); |
256 | |
257 | if (protocol->send_result_set_metadata(&field_list, |
258 | Protocol::SEND_NUM_ROWS | Protocol::SEND_EOF)) |
259 | DBUG_RETURN(TRUE); |
260 | |
261 | mysql_mutex_lock(&LOCK_slave_list); |
262 | |
263 | for (uint i = 0; i < slave_list.records; ++i) |
264 | { |
265 | SLAVE_INFO* si = (SLAVE_INFO*) my_hash_element(&slave_list, i); |
266 | protocol->prepare_for_resend(); |
267 | protocol->store((uint32) si->server_id); |
268 | protocol->store(si->host, &my_charset_bin); |
269 | if (opt_show_slave_auth_info) |
270 | { |
271 | protocol->store(si->user, &my_charset_bin); |
272 | protocol->store(si->password, &my_charset_bin); |
273 | } |
274 | protocol->store((uint32) si->port); |
275 | protocol->store((uint32) si->master_id); |
276 | if (protocol->write()) |
277 | { |
278 | mysql_mutex_unlock(&LOCK_slave_list); |
279 | DBUG_RETURN(TRUE); |
280 | } |
281 | } |
282 | mysql_mutex_unlock(&LOCK_slave_list); |
283 | my_eof(thd); |
284 | DBUG_RETURN(FALSE); |
285 | } |
286 | |
287 | #endif /* HAVE_REPLICATION */ |
288 | |
289 | |