| 1 | /* Copyright 2008-2015 Codership Oy <http://www.codership.com> |
| 2 | |
| 3 | This program is free software; you can redistribute it and/or modify |
| 4 | it under the terms of the GNU General Public License as published by |
| 5 | the Free Software Foundation; version 2 of the License. |
| 6 | |
| 7 | This program is distributed in the hope that it will be useful, |
| 8 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 9 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 10 | GNU General Public License for more details. |
| 11 | |
| 12 | You should have received a copy of the GNU General Public License |
| 13 | along with this program; if not, write to the Free Software |
| 14 | Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA */ |
| 15 | |
| 16 | #include "mariadb.h" |
| 17 | #include "wsrep_sst.h" |
| 18 | #include <mysqld.h> |
| 19 | #include <m_ctype.h> |
| 20 | #include <strfunc.h> |
| 21 | #include <sql_class.h> |
| 22 | #include <set_var.h> |
| 23 | #include <sql_acl.h> |
| 24 | #include <sql_reload.h> |
| 25 | #include <sql_parse.h> |
| 26 | #include "wsrep_priv.h" |
| 27 | #include "wsrep_utils.h" |
| 28 | #include "wsrep_xid.h" |
| 29 | #include <cstdio> |
| 30 | #include <cstdlib> |
| 31 | |
| 32 | static char wsrep_defaults_file[FN_REFLEN * 2 + 10 + 30 + |
| 33 | sizeof(WSREP_SST_OPT_CONF) + |
| 34 | sizeof(WSREP_SST_OPT_CONF_SUFFIX) + |
| 35 | sizeof(WSREP_SST_OPT_CONF_EXTRA)] = {0}; |
| 36 | |
| 37 | // container for real auth string |
| 38 | static const char* sst_auth_real = NULL; |
| 39 | |
| 40 | bool wsrep_sst_method_check (sys_var *self, THD* thd, set_var* var) |
| 41 | { |
| 42 | if ((! var->save_result.string_value.str) || |
| 43 | (var->save_result.string_value.length == 0 )) |
| 44 | { |
| 45 | my_error(ER_WRONG_VALUE_FOR_VAR, MYF(0), var->var->name.str, |
| 46 | var->save_result.string_value.str ? |
| 47 | var->save_result.string_value.str : "NULL" ); |
| 48 | return 1; |
| 49 | } |
| 50 | |
| 51 | return 0; |
| 52 | } |
| 53 | |
| 54 | bool wsrep_sst_method_update (sys_var *self, THD* thd, enum_var_type type) |
| 55 | { |
| 56 | return 0; |
| 57 | } |
| 58 | |
| 59 | |
| 60 | static void make_wsrep_defaults_file() |
| 61 | { |
| 62 | if (!wsrep_defaults_file[0]) |
| 63 | { |
| 64 | char *ptr= wsrep_defaults_file; |
| 65 | char *end= ptr + sizeof(wsrep_defaults_file); |
| 66 | if (my_defaults_file) |
| 67 | ptr= strxnmov(ptr, end - ptr, |
| 68 | WSREP_SST_OPT_CONF, " '" , my_defaults_file, "' " , NULL); |
| 69 | |
| 70 | if (my_defaults_extra_file) |
| 71 | ptr= strxnmov(ptr, end - ptr, |
| 72 | WSREP_SST_OPT_CONF_EXTRA, " '" , my_defaults_extra_file, "' " , NULL); |
| 73 | |
| 74 | if (my_defaults_group_suffix) |
| 75 | ptr= strxnmov(ptr, end - ptr, |
| 76 | WSREP_SST_OPT_CONF_SUFFIX, " '" , my_defaults_group_suffix, "' " , NULL); |
| 77 | } |
| 78 | } |
| 79 | |
| 80 | |
| 81 | bool wsrep_sst_receive_address_check (sys_var *self, THD* thd, set_var* var) |
| 82 | { |
| 83 | if ((! var->save_result.string_value.str) || |
| 84 | (var->save_result.string_value.length > (FN_REFLEN - 1))) // safety |
| 85 | { |
| 86 | goto err; |
| 87 | } |
| 88 | |
| 89 | return 0; |
| 90 | |
| 91 | err: |
| 92 | my_error(ER_WRONG_VALUE_FOR_VAR, MYF(0), var->var->name.str, |
| 93 | var->save_result.string_value.str ? |
| 94 | var->save_result.string_value.str : "NULL" ); |
| 95 | return 1; |
| 96 | } |
| 97 | |
| 98 | bool wsrep_sst_receive_address_update (sys_var *self, THD* thd, |
| 99 | enum_var_type type) |
| 100 | { |
| 101 | return 0; |
| 102 | } |
| 103 | |
| 104 | bool wsrep_sst_auth_check (sys_var *self, THD* thd, set_var* var) |
| 105 | { |
| 106 | return 0; |
| 107 | } |
| 108 | |
| 109 | static bool sst_auth_real_set (const char* value) |
| 110 | { |
| 111 | const char* v= NULL; |
| 112 | |
| 113 | if (value) |
| 114 | { |
| 115 | v= my_strdup(value, MYF(0)); |
| 116 | } |
| 117 | else // its NULL |
| 118 | { |
| 119 | wsrep_sst_auth_free(); |
| 120 | return 0; |
| 121 | } |
| 122 | |
| 123 | if (v) |
| 124 | { |
| 125 | // set sst_auth_real |
| 126 | if (sst_auth_real) { my_free((void *) sst_auth_real); } |
| 127 | sst_auth_real = v; |
| 128 | |
| 129 | // mask wsrep_sst_auth |
| 130 | if (strlen(sst_auth_real)) |
| 131 | { |
| 132 | if (wsrep_sst_auth) { my_free((void*) wsrep_sst_auth); } |
| 133 | wsrep_sst_auth= my_strdup(WSREP_SST_AUTH_MASK, MYF(0)); |
| 134 | } |
| 135 | return 0; |
| 136 | } |
| 137 | return 1; |
| 138 | } |
| 139 | |
| 140 | void wsrep_sst_auth_free() |
| 141 | { |
| 142 | if (wsrep_sst_auth) { my_free((void *) wsrep_sst_auth); } |
| 143 | if (sst_auth_real) { my_free((void *) sst_auth_real); } |
| 144 | wsrep_sst_auth= NULL; |
| 145 | sst_auth_real= NULL; |
| 146 | } |
| 147 | |
| 148 | bool wsrep_sst_auth_update (sys_var *self, THD* thd, enum_var_type type) |
| 149 | { |
| 150 | return sst_auth_real_set (wsrep_sst_auth); |
| 151 | } |
| 152 | |
| 153 | void wsrep_sst_auth_init () |
| 154 | { |
| 155 | sst_auth_real_set(wsrep_sst_auth); |
| 156 | } |
| 157 | |
| 158 | bool wsrep_sst_donor_check (sys_var *self, THD* thd, set_var* var) |
| 159 | { |
| 160 | return 0; |
| 161 | } |
| 162 | |
| 163 | bool wsrep_sst_donor_update (sys_var *self, THD* thd, enum_var_type type) |
| 164 | { |
| 165 | return 0; |
| 166 | } |
| 167 | |
| 168 | bool wsrep_before_SE() |
| 169 | { |
| 170 | return (wsrep_provider != NULL |
| 171 | && strcmp (wsrep_provider, WSREP_NONE) |
| 172 | && strcmp (wsrep_sst_method, WSREP_SST_SKIP) |
| 173 | && strcmp (wsrep_sst_method, WSREP_SST_MYSQLDUMP)); |
| 174 | } |
| 175 | |
| 176 | static bool sst_complete = false; |
| 177 | static bool sst_needed = false; |
| 178 | |
| 179 | void wsrep_sst_grab () |
| 180 | { |
| 181 | WSREP_INFO("wsrep_sst_grab()" ); |
| 182 | if (mysql_mutex_lock (&LOCK_wsrep_sst)) abort(); |
| 183 | sst_complete = false; |
| 184 | mysql_mutex_unlock (&LOCK_wsrep_sst); |
| 185 | } |
| 186 | |
| 187 | // Wait for end of SST |
| 188 | bool wsrep_sst_wait () |
| 189 | { |
| 190 | if (mysql_mutex_lock (&LOCK_wsrep_sst)) abort(); |
| 191 | while (!sst_complete) |
| 192 | { |
| 193 | WSREP_INFO("Waiting for SST to complete." ); |
| 194 | mysql_cond_wait (&COND_wsrep_sst, &LOCK_wsrep_sst); |
| 195 | } |
| 196 | |
| 197 | if (local_seqno >= 0) |
| 198 | { |
| 199 | WSREP_INFO("SST complete, seqno: %lld" , (long long) local_seqno); |
| 200 | } |
| 201 | else |
| 202 | { |
| 203 | WSREP_ERROR("SST failed: %d (%s)" , |
| 204 | int(-local_seqno), strerror(-local_seqno)); |
| 205 | } |
| 206 | |
| 207 | mysql_mutex_unlock (&LOCK_wsrep_sst); |
| 208 | |
| 209 | return (local_seqno >= 0); |
| 210 | } |
| 211 | |
| 212 | // Signal end of SST |
| 213 | void wsrep_sst_complete (const wsrep_uuid_t* sst_uuid, |
| 214 | wsrep_seqno_t sst_seqno, |
| 215 | bool needed) |
| 216 | { |
| 217 | if (mysql_mutex_lock (&LOCK_wsrep_sst)) abort(); |
| 218 | if (!sst_complete) |
| 219 | { |
| 220 | sst_complete = true; |
| 221 | sst_needed = needed; |
| 222 | local_uuid = *sst_uuid; |
| 223 | local_seqno = sst_seqno; |
| 224 | mysql_cond_signal (&COND_wsrep_sst); |
| 225 | } |
| 226 | else |
| 227 | { |
| 228 | /* This can happen when called from wsrep_synced_cb(). |
| 229 | At the moment there is no way to check there |
| 230 | if main thread is still waiting for signal, |
| 231 | so wsrep_sst_complete() is called from there |
| 232 | each time wsrep_ready changes from FALSE -> TRUE. |
| 233 | */ |
| 234 | WSREP_DEBUG("Nobody is waiting for SST." ); |
| 235 | } |
| 236 | mysql_mutex_unlock (&LOCK_wsrep_sst); |
| 237 | } |
| 238 | |
| 239 | /* |
| 240 | If wsrep provider is loaded, inform that the new state snapshot |
| 241 | has been received. Also update the local checkpoint. |
| 242 | |
| 243 | @param wsrep [IN] wsrep handle |
| 244 | @param uuid [IN] Initial state UUID |
| 245 | @param seqno [IN] Initial state sequence number |
| 246 | @param state [IN] Always NULL, also ignored by wsrep provider (?) |
| 247 | @param state_len [IN] Always 0, also ignored by wsrep provider (?) |
| 248 | @param implicit [IN] Whether invoked implicitly due to SST |
| 249 | (true) or explicitly because if change |
| 250 | in wsrep_start_position by user (false). |
| 251 | @return false Success |
| 252 | true Error |
| 253 | |
| 254 | */ |
| 255 | bool wsrep_sst_received (wsrep_t* const wsrep, |
| 256 | const wsrep_uuid_t& uuid, |
| 257 | const wsrep_seqno_t seqno, |
| 258 | const void* const state, |
| 259 | const size_t state_len, |
| 260 | const bool implicit) |
| 261 | { |
| 262 | /* |
| 263 | To keep track of whether the local uuid:seqno should be updated. Also, note |
| 264 | that local state (uuid:seqno) is updated/checkpointed only after we get an |
| 265 | OK from wsrep provider. By doing so, the values remain consistent across |
| 266 | the server & wsrep provider. |
| 267 | */ |
| 268 | bool do_update= false; |
| 269 | |
| 270 | // Get the locally stored uuid:seqno. |
| 271 | if (wsrep_get_SE_checkpoint(local_uuid, local_seqno)) |
| 272 | { |
| 273 | return true; |
| 274 | } |
| 275 | |
| 276 | if (memcmp(&local_uuid, &uuid, sizeof(wsrep_uuid_t)) || |
| 277 | local_seqno < seqno) |
| 278 | { |
| 279 | do_update= true; |
| 280 | } |
| 281 | else if (local_seqno > seqno) |
| 282 | { |
| 283 | WSREP_WARN("SST position can't be set in past. Requested: %lld, Current: " |
| 284 | " %lld." , (long long)seqno, (long long)local_seqno); |
| 285 | /* |
| 286 | If we are here because of SET command, simply return true (error) instead of |
| 287 | aborting. |
| 288 | */ |
| 289 | if (implicit) |
| 290 | { |
| 291 | WSREP_WARN("Can't continue." ); |
| 292 | unireg_abort(1); |
| 293 | } |
| 294 | else |
| 295 | { |
| 296 | return true; |
| 297 | } |
| 298 | } |
| 299 | |
| 300 | #ifdef GTID_SUPPORT |
| 301 | wsrep_init_sidno(uuid); |
| 302 | #endif /* GTID_SUPPORT */ |
| 303 | |
| 304 | if (wsrep) |
| 305 | { |
| 306 | int const rcode(seqno < 0 ? seqno : 0); |
| 307 | wsrep_gtid_t const state_id= {uuid, |
| 308 | (rcode ? WSREP_SEQNO_UNDEFINED : seqno)}; |
| 309 | |
| 310 | wsrep_status_t ret= wsrep->sst_received(wsrep, &state_id, state, |
| 311 | state_len, rcode); |
| 312 | |
| 313 | if (ret != WSREP_OK) |
| 314 | { |
| 315 | return true; |
| 316 | } |
| 317 | } |
| 318 | |
| 319 | // Now is the good time to update the local state and checkpoint. |
| 320 | if (do_update) |
| 321 | { |
| 322 | if (wsrep_set_SE_checkpoint(uuid, seqno)) |
| 323 | { |
| 324 | return true; |
| 325 | } |
| 326 | |
| 327 | local_uuid= uuid; |
| 328 | local_seqno= seqno; |
| 329 | } |
| 330 | |
| 331 | return false; |
| 332 | } |
| 333 | |
| 334 | // Let applier threads to continue |
| 335 | bool wsrep_sst_continue () |
| 336 | { |
| 337 | if (sst_needed) |
| 338 | { |
| 339 | WSREP_INFO("Signalling provider to continue." ); |
| 340 | return wsrep_sst_received (wsrep, local_uuid, local_seqno, NULL, 0, true); |
| 341 | } |
| 342 | return false; |
| 343 | } |
| 344 | |
| 345 | struct sst_thread_arg |
| 346 | { |
| 347 | const char* cmd; |
| 348 | char** env; |
| 349 | char* ret_str; |
| 350 | int err; |
| 351 | mysql_mutex_t lock; |
| 352 | mysql_cond_t cond; |
| 353 | |
| 354 | sst_thread_arg (const char* c, char** e) |
| 355 | : cmd(c), env(e), ret_str(0), err(-1) |
| 356 | { |
| 357 | mysql_mutex_init(key_LOCK_wsrep_sst_thread, &lock, MY_MUTEX_INIT_FAST); |
| 358 | mysql_cond_init(key_COND_wsrep_sst_thread, &cond, NULL); |
| 359 | } |
| 360 | |
| 361 | ~sst_thread_arg() |
| 362 | { |
| 363 | mysql_cond_destroy (&cond); |
| 364 | mysql_mutex_unlock (&lock); |
| 365 | mysql_mutex_destroy (&lock); |
| 366 | } |
| 367 | }; |
| 368 | |
| 369 | static int sst_scan_uuid_seqno (const char* str, |
| 370 | wsrep_uuid_t* uuid, wsrep_seqno_t* seqno) |
| 371 | { |
| 372 | int offt = wsrep_uuid_scan (str, strlen(str), uuid); |
| 373 | errno= 0; /* Reset the errno */ |
| 374 | if (offt > 0 && strlen(str) > (unsigned int)offt && ':' == str[offt]) |
| 375 | { |
| 376 | *seqno = strtoll (str + offt + 1, NULL, 10); |
| 377 | if (*seqno != LLONG_MAX || errno != ERANGE) |
| 378 | { |
| 379 | return 0; |
| 380 | } |
| 381 | } |
| 382 | |
| 383 | WSREP_ERROR("Failed to parse uuid:seqno pair: '%s'" , str); |
| 384 | return EINVAL; |
| 385 | } |
| 386 | |
| 387 | // get rid of trailing \n |
| 388 | static char* my_fgets (char* buf, size_t buf_len, FILE* stream) |
| 389 | { |
| 390 | char* ret= fgets (buf, buf_len, stream); |
| 391 | |
| 392 | if (ret) |
| 393 | { |
| 394 | size_t len = strlen(ret); |
| 395 | if (len > 0 && ret[len - 1] == '\n') ret[len - 1] = '\0'; |
| 396 | } |
| 397 | |
| 398 | return ret; |
| 399 | } |
| 400 | |
| 401 | /* |
| 402 | Generate opt_binlog_opt_val for sst_donate_other(), sst_prepare_other(). |
| 403 | |
| 404 | Returns zero on success, negative error code otherwise. |
| 405 | |
| 406 | String containing binlog name is stored in param ret if binlog is enabled |
| 407 | and GTID mode is on, otherwise empty string. Returned string should be |
| 408 | freed with my_free(). |
| 409 | */ |
| 410 | static int generate_binlog_opt_val(char** ret) |
| 411 | { |
| 412 | DBUG_ASSERT(ret); |
| 413 | *ret= NULL; |
| 414 | if (opt_bin_log) |
| 415 | { |
| 416 | assert(opt_bin_logname); |
| 417 | *ret= strcmp(opt_bin_logname, "0" ) ? |
| 418 | my_strdup(opt_bin_logname, MYF(0)) : my_strdup("" , MYF(0)); |
| 419 | } |
| 420 | else |
| 421 | { |
| 422 | *ret= my_strdup("" , MYF(0)); |
| 423 | } |
| 424 | if (!*ret) return -ENOMEM; |
| 425 | return 0; |
| 426 | } |
| 427 | |
| 428 | static void* sst_joiner_thread (void* a) |
| 429 | { |
| 430 | sst_thread_arg* arg= (sst_thread_arg*) a; |
| 431 | int err= 1; |
| 432 | |
| 433 | { |
| 434 | const char magic[] = "ready" ; |
| 435 | const size_t magic_len = sizeof(magic) - 1; |
| 436 | const size_t out_len = 512; |
| 437 | char out[out_len]; |
| 438 | |
| 439 | WSREP_INFO("Running: '%s'" , arg->cmd); |
| 440 | |
| 441 | wsp::process proc (arg->cmd, "r" , arg->env); |
| 442 | |
| 443 | if (proc.pipe() && !proc.error()) |
| 444 | { |
| 445 | const char* tmp= my_fgets (out, out_len, proc.pipe()); |
| 446 | |
| 447 | if (!tmp || strlen(tmp) < (magic_len + 2) || |
| 448 | strncasecmp (tmp, magic, magic_len)) |
| 449 | { |
| 450 | WSREP_ERROR("Failed to read '%s <addr>' from: %s\n\tRead: '%s'" , |
| 451 | magic, arg->cmd, tmp); |
| 452 | proc.wait(); |
| 453 | if (proc.error()) err = proc.error(); |
| 454 | } |
| 455 | else |
| 456 | { |
| 457 | err = 0; |
| 458 | } |
| 459 | } |
| 460 | else |
| 461 | { |
| 462 | err = proc.error(); |
| 463 | WSREP_ERROR("Failed to execute: %s : %d (%s)" , |
| 464 | arg->cmd, err, strerror(err)); |
| 465 | } |
| 466 | |
| 467 | // signal sst_prepare thread with ret code, |
| 468 | // it will go on sending SST request |
| 469 | mysql_mutex_lock (&arg->lock); |
| 470 | if (!err) |
| 471 | { |
| 472 | arg->ret_str = strdup (out + magic_len + 1); |
| 473 | if (!arg->ret_str) err = ENOMEM; |
| 474 | } |
| 475 | arg->err = -err; |
| 476 | mysql_cond_signal (&arg->cond); |
| 477 | mysql_mutex_unlock (&arg->lock); //! @note arg is unusable after that. |
| 478 | |
| 479 | if (err) return NULL; /* lp:808417 - return immediately, don't signal |
| 480 | * initializer thread to ensure single thread of |
| 481 | * shutdown. */ |
| 482 | |
| 483 | wsrep_uuid_t ret_uuid = WSREP_UUID_UNDEFINED; |
| 484 | wsrep_seqno_t ret_seqno = WSREP_SEQNO_UNDEFINED; |
| 485 | |
| 486 | // in case of successfull receiver start, wait for SST completion/end |
| 487 | char* tmp = my_fgets (out, out_len, proc.pipe()); |
| 488 | |
| 489 | proc.wait(); |
| 490 | err= EINVAL; |
| 491 | |
| 492 | if (!tmp) |
| 493 | { |
| 494 | WSREP_ERROR("Failed to read uuid:seqno and wsrep_gtid_domain_id from " |
| 495 | "joiner script." ); |
| 496 | if (proc.error()) err = proc.error(); |
| 497 | } |
| 498 | else |
| 499 | { |
| 500 | // Read state ID (UUID:SEQNO) followed by wsrep_gtid_domain_id (if any). |
| 501 | const char *pos= strchr(out, ' '); |
| 502 | |
| 503 | if (!pos) { |
| 504 | // There is no wsrep_gtid_domain_id (some older version SST script?). |
| 505 | err= sst_scan_uuid_seqno (out, &ret_uuid, &ret_seqno); |
| 506 | |
| 507 | } else { |
| 508 | // Scan state ID first followed by wsrep_gtid_domain_id. |
| 509 | unsigned long int domain_id; |
| 510 | |
| 511 | // Null-terminate the state-id. |
| 512 | out[pos - out]= 0; |
| 513 | err= sst_scan_uuid_seqno (out, &ret_uuid, &ret_seqno); |
| 514 | |
| 515 | if (err) |
| 516 | { |
| 517 | goto err; |
| 518 | } |
| 519 | else if (wsrep_gtid_mode) |
| 520 | { |
| 521 | errno= 0; /* Reset the errno */ |
| 522 | domain_id= strtoul(pos + 1, NULL, 10); |
| 523 | err= errno; |
| 524 | |
| 525 | /* Check if we received a valid gtid_domain_id. */ |
| 526 | if (err == EINVAL || err == ERANGE) |
| 527 | { |
| 528 | WSREP_ERROR("Failed to get donor wsrep_gtid_domain_id." ); |
| 529 | err= EINVAL; |
| 530 | goto err; |
| 531 | } else { |
| 532 | wsrep_gtid_domain_id= (uint32) domain_id; |
| 533 | } |
| 534 | } |
| 535 | } |
| 536 | } |
| 537 | |
| 538 | err: |
| 539 | |
| 540 | if (err) |
| 541 | { |
| 542 | ret_uuid= WSREP_UUID_UNDEFINED; |
| 543 | ret_seqno= -err; |
| 544 | } |
| 545 | |
| 546 | // Tell initializer thread that SST is complete |
| 547 | wsrep_sst_complete (&ret_uuid, ret_seqno, true); |
| 548 | } |
| 549 | |
| 550 | return NULL; |
| 551 | } |
| 552 | |
| 553 | #define WSREP_SST_AUTH_ENV "WSREP_SST_OPT_AUTH" |
| 554 | |
| 555 | static int sst_append_auth_env(wsp::env& env, const char* sst_auth) |
| 556 | { |
| 557 | int const sst_auth_size= strlen(WSREP_SST_AUTH_ENV) + 1 /* = */ |
| 558 | + (sst_auth ? strlen(sst_auth) : 0) + 1 /* \0 */; |
| 559 | |
| 560 | wsp::string sst_auth_str(sst_auth_size); // for automatic cleanup on return |
| 561 | if (!sst_auth_str()) return -ENOMEM; |
| 562 | |
| 563 | int ret= snprintf(sst_auth_str(), sst_auth_size, "%s=%s" , |
| 564 | WSREP_SST_AUTH_ENV, sst_auth ? sst_auth : "" ); |
| 565 | |
| 566 | if (ret < 0 || ret >= sst_auth_size) |
| 567 | { |
| 568 | WSREP_ERROR("sst_append_auth_env(): snprintf() failed: %d" , ret); |
| 569 | return (ret < 0 ? ret : -EMSGSIZE); |
| 570 | } |
| 571 | |
| 572 | env.append(sst_auth_str()); |
| 573 | return -env.error(); |
| 574 | } |
| 575 | |
| 576 | static ssize_t sst_prepare_other (const char* method, |
| 577 | const char* sst_auth, |
| 578 | const char* addr_in, |
| 579 | const char** addr_out) |
| 580 | { |
| 581 | int const cmd_len= 4096; |
| 582 | wsp::string cmd_str(cmd_len); |
| 583 | |
| 584 | if (!cmd_str()) |
| 585 | { |
| 586 | WSREP_ERROR("sst_prepare_other(): could not allocate cmd buffer of %d bytes" , |
| 587 | cmd_len); |
| 588 | return -ENOMEM; |
| 589 | } |
| 590 | |
| 591 | const char* binlog_opt= "" ; |
| 592 | char* binlog_opt_val= NULL; |
| 593 | |
| 594 | int ret; |
| 595 | if ((ret= generate_binlog_opt_val(&binlog_opt_val))) |
| 596 | { |
| 597 | WSREP_ERROR("sst_prepare_other(): generate_binlog_opt_val() failed: %d" , |
| 598 | ret); |
| 599 | return ret; |
| 600 | } |
| 601 | if (strlen(binlog_opt_val)) binlog_opt= WSREP_SST_OPT_BINLOG; |
| 602 | |
| 603 | make_wsrep_defaults_file(); |
| 604 | |
| 605 | ret= snprintf (cmd_str(), cmd_len, |
| 606 | "wsrep_sst_%s " |
| 607 | WSREP_SST_OPT_ROLE" 'joiner' " |
| 608 | WSREP_SST_OPT_ADDR" '%s' " |
| 609 | WSREP_SST_OPT_DATA" '%s' " |
| 610 | " %s " |
| 611 | WSREP_SST_OPT_PARENT" '%d'" |
| 612 | " %s '%s' " , |
| 613 | method, addr_in, mysql_real_data_home, |
| 614 | wsrep_defaults_file, |
| 615 | (int)getpid(), binlog_opt, binlog_opt_val); |
| 616 | my_free(binlog_opt_val); |
| 617 | |
| 618 | if (ret < 0 || ret >= cmd_len) |
| 619 | { |
| 620 | WSREP_ERROR("sst_prepare_other(): snprintf() failed: %d" , ret); |
| 621 | return (ret < 0 ? ret : -EMSGSIZE); |
| 622 | } |
| 623 | |
| 624 | wsp::env env(NULL); |
| 625 | if (env.error()) |
| 626 | { |
| 627 | WSREP_ERROR("sst_prepare_other(): env. var ctor failed: %d" , -env.error()); |
| 628 | return -env.error(); |
| 629 | } |
| 630 | |
| 631 | if ((ret= sst_append_auth_env(env, sst_auth))) |
| 632 | { |
| 633 | WSREP_ERROR("sst_prepare_other(): appending auth failed: %d" , ret); |
| 634 | return ret; |
| 635 | } |
| 636 | |
| 637 | pthread_t tmp; |
| 638 | sst_thread_arg arg(cmd_str(), env()); |
| 639 | mysql_mutex_lock (&arg.lock); |
| 640 | ret = pthread_create (&tmp, NULL, sst_joiner_thread, &arg); |
| 641 | if (ret) |
| 642 | { |
| 643 | WSREP_ERROR("sst_prepare_other(): pthread_create() failed: %d (%s)" , |
| 644 | ret, strerror(ret)); |
| 645 | return -ret; |
| 646 | } |
| 647 | mysql_cond_wait (&arg.cond, &arg.lock); |
| 648 | |
| 649 | *addr_out= arg.ret_str; |
| 650 | |
| 651 | if (!arg.err) |
| 652 | ret = strlen(*addr_out); |
| 653 | else |
| 654 | { |
| 655 | assert (arg.err < 0); |
| 656 | ret = arg.err; |
| 657 | } |
| 658 | |
| 659 | pthread_detach (tmp); |
| 660 | |
| 661 | return ret; |
| 662 | } |
| 663 | |
| 664 | extern uint mysqld_port; |
| 665 | |
| 666 | /*! Just tells donor where to send mysqldump */ |
| 667 | static ssize_t sst_prepare_mysqldump (const char* addr_in, |
| 668 | const char** addr_out) |
| 669 | { |
| 670 | ssize_t ret = strlen (addr_in); |
| 671 | |
| 672 | if (!strrchr(addr_in, ':')) |
| 673 | { |
| 674 | ssize_t s = ret + 7; |
| 675 | char* tmp = (char*) malloc (s); |
| 676 | |
| 677 | if (tmp) |
| 678 | { |
| 679 | ret= snprintf (tmp, s, "%s:%u" , addr_in, mysqld_port); |
| 680 | |
| 681 | if (ret > 0 && ret < s) |
| 682 | { |
| 683 | *addr_out= tmp; |
| 684 | return ret; |
| 685 | } |
| 686 | if (ret > 0) /* buffer too short */ ret = -EMSGSIZE; |
| 687 | free (tmp); |
| 688 | } |
| 689 | else { |
| 690 | ret= -ENOMEM; |
| 691 | } |
| 692 | |
| 693 | WSREP_ERROR ("Could not prepare state transfer request: " |
| 694 | "adding default port failed: %zd." , ret); |
| 695 | } |
| 696 | else { |
| 697 | *addr_out= addr_in; |
| 698 | } |
| 699 | |
| 700 | return ret; |
| 701 | } |
| 702 | |
| 703 | static bool SE_initialized = false; |
| 704 | |
| 705 | ssize_t wsrep_sst_prepare (void** msg) |
| 706 | { |
| 707 | const char* addr_in= NULL; |
| 708 | const char* addr_out= NULL; |
| 709 | |
| 710 | if (!strcmp(wsrep_sst_method, WSREP_SST_SKIP)) |
| 711 | { |
| 712 | ssize_t ret = strlen(WSREP_STATE_TRANSFER_TRIVIAL) + 1; |
| 713 | *msg = strdup(WSREP_STATE_TRANSFER_TRIVIAL); |
| 714 | if (!msg) |
| 715 | { |
| 716 | WSREP_ERROR("Could not allocate %zd bytes for state request" , ret); |
| 717 | unireg_abort(1); |
| 718 | } |
| 719 | return ret; |
| 720 | } |
| 721 | |
| 722 | /* |
| 723 | Figure out SST receive address. Common for all SST methods. |
| 724 | */ |
| 725 | char ip_buf[256]; |
| 726 | const ssize_t ip_max= sizeof(ip_buf); |
| 727 | |
| 728 | // Attempt 1: wsrep_sst_receive_address |
| 729 | if (wsrep_sst_receive_address && |
| 730 | strcmp (wsrep_sst_receive_address, WSREP_SST_ADDRESS_AUTO)) |
| 731 | { |
| 732 | addr_in= wsrep_sst_receive_address; |
| 733 | } |
| 734 | |
| 735 | //Attempt 2: wsrep_node_address |
| 736 | else if (wsrep_node_address && strlen(wsrep_node_address)) |
| 737 | { |
| 738 | wsp::Address addr(wsrep_node_address); |
| 739 | |
| 740 | if (!addr.is_valid()) |
| 741 | { |
| 742 | WSREP_ERROR("Could not parse wsrep_node_address : %s" , |
| 743 | wsrep_node_address); |
| 744 | unireg_abort(1); |
| 745 | } |
| 746 | memcpy(ip_buf, addr.get_address(), addr.get_address_len()); |
| 747 | addr_in= ip_buf; |
| 748 | } |
| 749 | // Attempt 3: Try to get the IP from the list of available interfaces. |
| 750 | else |
| 751 | { |
| 752 | ssize_t ret= wsrep_guess_ip (ip_buf, ip_max); |
| 753 | |
| 754 | if (ret && ret < ip_max) |
| 755 | { |
| 756 | addr_in= ip_buf; |
| 757 | } |
| 758 | else |
| 759 | { |
| 760 | WSREP_ERROR("Failed to guess address to accept state transfer. " |
| 761 | "wsrep_sst_receive_address must be set manually." ); |
| 762 | unireg_abort(1); |
| 763 | } |
| 764 | } |
| 765 | |
| 766 | ssize_t addr_len= -ENOSYS; |
| 767 | if (!strcmp(wsrep_sst_method, WSREP_SST_MYSQLDUMP)) |
| 768 | { |
| 769 | addr_len= sst_prepare_mysqldump (addr_in, &addr_out); |
| 770 | if (addr_len < 0) unireg_abort(1); |
| 771 | } |
| 772 | else |
| 773 | { |
| 774 | /*! A heuristic workaround until we learn how to stop and start engines */ |
| 775 | if (SE_initialized) |
| 776 | { |
| 777 | // we already did SST at initializaiton, now engines are running |
| 778 | // sql_print_information() is here because the message is too long |
| 779 | // for WSREP_INFO. |
| 780 | sql_print_information ("WSREP: " |
| 781 | "You have configured '%s' state snapshot transfer method " |
| 782 | "which cannot be performed on a running server. " |
| 783 | "Wsrep provider won't be able to fall back to it " |
| 784 | "if other means of state transfer are unavailable. " |
| 785 | "In that case you will need to restart the server." , |
| 786 | wsrep_sst_method); |
| 787 | *msg = 0; |
| 788 | return 0; |
| 789 | } |
| 790 | |
| 791 | addr_len = sst_prepare_other (wsrep_sst_method, sst_auth_real, |
| 792 | addr_in, &addr_out); |
| 793 | if (addr_len < 0) |
| 794 | { |
| 795 | WSREP_ERROR("Failed to prepare for '%s' SST. Unrecoverable." , |
| 796 | wsrep_sst_method); |
| 797 | unireg_abort(1); |
| 798 | } |
| 799 | } |
| 800 | |
| 801 | size_t const method_len(strlen(wsrep_sst_method)); |
| 802 | size_t const msg_len (method_len + addr_len + 2 /* + auth_len + 1*/); |
| 803 | |
| 804 | *msg = malloc (msg_len); |
| 805 | if (NULL != *msg) { |
| 806 | char* const method_ptr(reinterpret_cast<char*>(*msg)); |
| 807 | strcpy (method_ptr, wsrep_sst_method); |
| 808 | char* const addr_ptr(method_ptr + method_len + 1); |
| 809 | strcpy (addr_ptr, addr_out); |
| 810 | |
| 811 | WSREP_INFO ("Prepared SST request: %s|%s" , method_ptr, addr_ptr); |
| 812 | } |
| 813 | else { |
| 814 | WSREP_ERROR("Failed to allocate SST request of size %zu. Can't continue." , |
| 815 | msg_len); |
| 816 | unireg_abort(1); |
| 817 | } |
| 818 | |
| 819 | if (addr_out != addr_in) /* malloc'ed */ free ((char*)addr_out); |
| 820 | |
| 821 | return msg_len; |
| 822 | } |
| 823 | |
| 824 | // helper method for donors |
| 825 | static int sst_run_shell (const char* cmd_str, char** env, int max_tries) |
| 826 | { |
| 827 | int ret = 0; |
| 828 | |
| 829 | for (int tries=1; tries <= max_tries; tries++) |
| 830 | { |
| 831 | wsp::process proc (cmd_str, "r" , env); |
| 832 | |
| 833 | if (NULL != proc.pipe()) |
| 834 | { |
| 835 | proc.wait(); |
| 836 | } |
| 837 | |
| 838 | if ((ret = proc.error())) |
| 839 | { |
| 840 | WSREP_ERROR("Try %d/%d: '%s' failed: %d (%s)" , |
| 841 | tries, max_tries, proc.cmd(), ret, strerror(ret)); |
| 842 | sleep (1); |
| 843 | } |
| 844 | else |
| 845 | { |
| 846 | WSREP_DEBUG("SST script successfully completed." ); |
| 847 | break; |
| 848 | } |
| 849 | } |
| 850 | |
| 851 | return -ret; |
| 852 | } |
| 853 | |
| 854 | static void sst_reject_queries(my_bool close_conn) |
| 855 | { |
| 856 | wsrep_ready_set (FALSE); // this will be resotred when donor becomes synced |
| 857 | WSREP_INFO("Rejecting client queries for the duration of SST." ); |
| 858 | if (TRUE == close_conn) wsrep_close_client_connections(FALSE); |
| 859 | } |
| 860 | |
| 861 | static int sst_donate_mysqldump (const char* addr, |
| 862 | const wsrep_uuid_t* uuid, |
| 863 | const char* uuid_str, |
| 864 | wsrep_seqno_t seqno, |
| 865 | bool bypass, |
| 866 | char** env) // carries auth info |
| 867 | { |
| 868 | char host[256]; |
| 869 | wsp::Address address(addr); |
| 870 | if (!address.is_valid()) |
| 871 | { |
| 872 | WSREP_ERROR("Could not parse SST address : %s" , addr); |
| 873 | return 0; |
| 874 | } |
| 875 | memcpy(host, address.get_address(), address.get_address_len()); |
| 876 | int port= address.get_port(); |
| 877 | int const cmd_len= 4096; |
| 878 | wsp::string cmd_str(cmd_len); |
| 879 | |
| 880 | if (!cmd_str()) |
| 881 | { |
| 882 | WSREP_ERROR("sst_donate_mysqldump(): " |
| 883 | "could not allocate cmd buffer of %d bytes" , cmd_len); |
| 884 | return -ENOMEM; |
| 885 | } |
| 886 | |
| 887 | if (!bypass && wsrep_sst_donor_rejects_queries) sst_reject_queries(TRUE); |
| 888 | |
| 889 | make_wsrep_defaults_file(); |
| 890 | |
| 891 | int ret= snprintf (cmd_str(), cmd_len, |
| 892 | "wsrep_sst_mysqldump " |
| 893 | WSREP_SST_OPT_ADDR" '%s' " |
| 894 | WSREP_SST_OPT_PORT" '%d' " |
| 895 | WSREP_SST_OPT_LPORT" '%u' " |
| 896 | WSREP_SST_OPT_SOCKET" '%s' " |
| 897 | " '%s' " |
| 898 | WSREP_SST_OPT_GTID" '%s:%lld' " |
| 899 | WSREP_SST_OPT_GTID_DOMAIN_ID" '%d'" |
| 900 | "%s" , |
| 901 | addr, port, mysqld_port, mysqld_unix_port, |
| 902 | wsrep_defaults_file, uuid_str, |
| 903 | (long long)seqno, wsrep_gtid_domain_id, |
| 904 | bypass ? " " WSREP_SST_OPT_BYPASS : "" ); |
| 905 | |
| 906 | if (ret < 0 || ret >= cmd_len) |
| 907 | { |
| 908 | WSREP_ERROR("sst_donate_mysqldump(): snprintf() failed: %d" , ret); |
| 909 | return (ret < 0 ? ret : -EMSGSIZE); |
| 910 | } |
| 911 | |
| 912 | WSREP_DEBUG("Running: '%s'" , cmd_str()); |
| 913 | |
| 914 | ret= sst_run_shell (cmd_str(), env, 3); |
| 915 | |
| 916 | wsrep_gtid_t const state_id = { *uuid, (ret ? WSREP_SEQNO_UNDEFINED : seqno)}; |
| 917 | |
| 918 | wsrep->sst_sent (wsrep, &state_id, ret); |
| 919 | |
| 920 | return ret; |
| 921 | } |
| 922 | |
| 923 | wsrep_seqno_t wsrep_locked_seqno= WSREP_SEQNO_UNDEFINED; |
| 924 | |
| 925 | |
| 926 | /* |
| 927 | Create a file under data directory. |
| 928 | */ |
| 929 | static int sst_create_file(const char *name, const char *content) |
| 930 | { |
| 931 | int err= 0; |
| 932 | char *real_name; |
| 933 | char *tmp_name; |
| 934 | ssize_t len; |
| 935 | FILE *file; |
| 936 | |
| 937 | len= strlen(mysql_real_data_home) + strlen(name) + 2; |
| 938 | real_name= (char *) alloca(len); |
| 939 | |
| 940 | snprintf(real_name, (size_t) len, "%s/%s" , mysql_real_data_home, name); |
| 941 | |
| 942 | tmp_name= (char *) alloca(len + 4); |
| 943 | snprintf(tmp_name, (size_t) len + 4, "%s.tmp" , real_name); |
| 944 | |
| 945 | file= fopen(tmp_name, "w+" ); |
| 946 | |
| 947 | if (0 == file) |
| 948 | { |
| 949 | err= errno; |
| 950 | WSREP_ERROR("Failed to open '%s': %d (%s)" , tmp_name, err, strerror(err)); |
| 951 | } |
| 952 | else |
| 953 | { |
| 954 | // Write the specified content into the file. |
| 955 | if (content != NULL) |
| 956 | { |
| 957 | fprintf(file, "%s\n" , content); |
| 958 | fsync(fileno(file)); |
| 959 | } |
| 960 | |
| 961 | fclose(file); |
| 962 | |
| 963 | if (rename(tmp_name, real_name) == -1) |
| 964 | { |
| 965 | err= errno; |
| 966 | WSREP_ERROR("Failed to rename '%s' to '%s': %d (%s)" , tmp_name, |
| 967 | real_name, err, strerror(err)); |
| 968 | } |
| 969 | } |
| 970 | |
| 971 | return err; |
| 972 | } |
| 973 | |
| 974 | |
| 975 | static int run_sql_command(THD *thd, const char *query) |
| 976 | { |
| 977 | thd->set_query((char *)query, strlen(query)); |
| 978 | |
| 979 | Parser_state ps; |
| 980 | if (ps.init(thd, thd->query(), thd->query_length())) |
| 981 | { |
| 982 | WSREP_ERROR("SST query: %s failed" , query); |
| 983 | return -1; |
| 984 | } |
| 985 | |
| 986 | mysql_parse(thd, thd->query(), thd->query_length(), &ps, FALSE, FALSE); |
| 987 | if (thd->is_error()) |
| 988 | { |
| 989 | int const err= thd->get_stmt_da()->sql_errno(); |
| 990 | WSREP_WARN ("Error executing '%s': %d (%s)%s" , |
| 991 | query, err, thd->get_stmt_da()->message(), |
| 992 | err == ER_UNKNOWN_SYSTEM_VARIABLE ? |
| 993 | ". Was mysqld built with --with-innodb-disallow-writes ?" : "" ); |
| 994 | thd->clear_error(); |
| 995 | return -1; |
| 996 | } |
| 997 | return 0; |
| 998 | } |
| 999 | |
| 1000 | |
| 1001 | static int sst_flush_tables(THD* thd) |
| 1002 | { |
| 1003 | WSREP_INFO("Flushing tables for SST..." ); |
| 1004 | |
| 1005 | int err= 0; |
| 1006 | int not_used; |
| 1007 | /* |
| 1008 | Files created to notify the SST script about the outcome of table flush |
| 1009 | operation. |
| 1010 | */ |
| 1011 | const char *flush_success= "tables_flushed" ; |
| 1012 | const char *flush_error= "sst_error" ; |
| 1013 | |
| 1014 | CHARSET_INFO *current_charset= thd->variables.character_set_client; |
| 1015 | |
| 1016 | if (!is_supported_parser_charset(current_charset)) |
| 1017 | { |
| 1018 | /* Do not use non-supported parser character sets */ |
| 1019 | WSREP_WARN("Current client character set is non-supported parser character set: %s" , current_charset->csname); |
| 1020 | thd->variables.character_set_client = &my_charset_latin1; |
| 1021 | WSREP_WARN("For SST temporally setting character set to : %s" , |
| 1022 | my_charset_latin1.csname); |
| 1023 | } |
| 1024 | |
| 1025 | if (run_sql_command(thd, "FLUSH TABLES WITH READ LOCK" )) |
| 1026 | { |
| 1027 | err= -1; |
| 1028 | } |
| 1029 | else |
| 1030 | { |
| 1031 | /* |
| 1032 | Make sure logs are flushed after global read lock acquired. In case |
| 1033 | reload fails, we must also release the acquired FTWRL. |
| 1034 | */ |
| 1035 | if (reload_acl_and_cache(thd, REFRESH_ENGINE_LOG | REFRESH_BINARY_LOG, |
| 1036 | (TABLE_LIST*) 0, ¬_used)) |
| 1037 | { |
| 1038 | thd->global_read_lock.unlock_global_read_lock(thd); |
| 1039 | err= -1; |
| 1040 | } |
| 1041 | } |
| 1042 | |
| 1043 | thd->variables.character_set_client = current_charset; |
| 1044 | |
| 1045 | if (err) |
| 1046 | { |
| 1047 | WSREP_ERROR("Failed to flush and lock tables" ); |
| 1048 | |
| 1049 | /* |
| 1050 | The SST must be aborted as the flush tables failed. Notify this to SST |
| 1051 | script by creating the error file. |
| 1052 | */ |
| 1053 | int tmp; |
| 1054 | if ((tmp= sst_create_file(flush_error, NULL))) { |
| 1055 | err= tmp; |
| 1056 | } |
| 1057 | } |
| 1058 | else |
| 1059 | { |
| 1060 | WSREP_INFO("Tables flushed." ); |
| 1061 | |
| 1062 | /* |
| 1063 | Tables have been flushed. Create a file with cluster state ID and |
| 1064 | wsrep_gtid_domain_id. |
| 1065 | */ |
| 1066 | char content[100]; |
| 1067 | snprintf(content, sizeof(content), "%s:%lld %d\n" , wsrep_cluster_state_uuid, |
| 1068 | (long long)wsrep_locked_seqno, wsrep_gtid_domain_id); |
| 1069 | err= sst_create_file(flush_success, content); |
| 1070 | } |
| 1071 | |
| 1072 | return err; |
| 1073 | } |
| 1074 | |
| 1075 | |
| 1076 | static void sst_disallow_writes (THD* thd, bool yes) |
| 1077 | { |
| 1078 | char query_str[64] = { 0, }; |
| 1079 | ssize_t const query_max = sizeof(query_str) - 1; |
| 1080 | CHARSET_INFO *current_charset; |
| 1081 | |
| 1082 | current_charset = thd->variables.character_set_client; |
| 1083 | |
| 1084 | if (!is_supported_parser_charset(current_charset)) |
| 1085 | { |
| 1086 | /* Do not use non-supported parser character sets */ |
| 1087 | WSREP_WARN("Current client character set is non-supported parser character set: %s" , current_charset->csname); |
| 1088 | thd->variables.character_set_client = &my_charset_latin1; |
| 1089 | WSREP_WARN("For SST temporally setting character set to : %s" , |
| 1090 | my_charset_latin1.csname); |
| 1091 | } |
| 1092 | |
| 1093 | snprintf (query_str, query_max, "SET GLOBAL innodb_disallow_writes=%d" , |
| 1094 | yes ? 1 : 0); |
| 1095 | |
| 1096 | if (run_sql_command(thd, query_str)) |
| 1097 | { |
| 1098 | WSREP_ERROR("Failed to disallow InnoDB writes" ); |
| 1099 | } |
| 1100 | thd->variables.character_set_client = current_charset; |
| 1101 | } |
| 1102 | |
| 1103 | static void* sst_donor_thread (void* a) |
| 1104 | { |
| 1105 | sst_thread_arg* arg= (sst_thread_arg*)a; |
| 1106 | |
| 1107 | WSREP_INFO("Running: '%s'" , arg->cmd); |
| 1108 | |
| 1109 | int err= 1; |
| 1110 | bool locked= false; |
| 1111 | |
| 1112 | const char* out= NULL; |
| 1113 | const size_t out_len= 128; |
| 1114 | char out_buf[out_len]; |
| 1115 | |
| 1116 | wsrep_uuid_t ret_uuid= WSREP_UUID_UNDEFINED; |
| 1117 | wsrep_seqno_t ret_seqno= WSREP_SEQNO_UNDEFINED; // seqno of complete SST |
| 1118 | |
| 1119 | wsp::thd thd(FALSE); // we turn off wsrep_on for this THD so that it can |
| 1120 | // operate with wsrep_ready == OFF |
| 1121 | wsp::process proc(arg->cmd, "r" , arg->env); |
| 1122 | |
| 1123 | err= proc.error(); |
| 1124 | |
| 1125 | /* Inform server about SST script startup and release TO isolation */ |
| 1126 | mysql_mutex_lock (&arg->lock); |
| 1127 | arg->err = -err; |
| 1128 | mysql_cond_signal (&arg->cond); |
| 1129 | mysql_mutex_unlock (&arg->lock); //! @note arg is unusable after that. |
| 1130 | |
| 1131 | if (proc.pipe() && !err) |
| 1132 | { |
| 1133 | wait_signal: |
| 1134 | out= my_fgets (out_buf, out_len, proc.pipe()); |
| 1135 | |
| 1136 | if (out) |
| 1137 | { |
| 1138 | const char magic_flush[]= "flush tables" ; |
| 1139 | const char magic_cont[]= "continue" ; |
| 1140 | const char magic_done[]= "done" ; |
| 1141 | |
| 1142 | if (!strcasecmp (out, magic_flush)) |
| 1143 | { |
| 1144 | err= sst_flush_tables (thd.ptr); |
| 1145 | if (!err) |
| 1146 | { |
| 1147 | sst_disallow_writes (thd.ptr, true); |
| 1148 | /* |
| 1149 | Lets also keep statements that modify binary logs (like RESET LOGS, |
| 1150 | RESET MASTER) from proceeding until the files have been transferred |
| 1151 | to the joiner node. |
| 1152 | */ |
| 1153 | if (mysql_bin_log.is_open()) |
| 1154 | { |
| 1155 | mysql_mutex_lock(mysql_bin_log.get_log_lock()); |
| 1156 | } |
| 1157 | |
| 1158 | locked= true; |
| 1159 | goto wait_signal; |
| 1160 | } |
| 1161 | } |
| 1162 | else if (!strcasecmp (out, magic_cont)) |
| 1163 | { |
| 1164 | if (locked) |
| 1165 | { |
| 1166 | if (mysql_bin_log.is_open()) |
| 1167 | { |
| 1168 | mysql_mutex_assert_owner(mysql_bin_log.get_log_lock()); |
| 1169 | mysql_mutex_unlock(mysql_bin_log.get_log_lock()); |
| 1170 | } |
| 1171 | sst_disallow_writes (thd.ptr, false); |
| 1172 | thd.ptr->global_read_lock.unlock_global_read_lock (thd.ptr); |
| 1173 | locked= false; |
| 1174 | } |
| 1175 | err= 0; |
| 1176 | goto wait_signal; |
| 1177 | } |
| 1178 | else if (!strncasecmp (out, magic_done, strlen(magic_done))) |
| 1179 | { |
| 1180 | err= sst_scan_uuid_seqno (out + strlen(magic_done) + 1, |
| 1181 | &ret_uuid, &ret_seqno); |
| 1182 | } |
| 1183 | else |
| 1184 | { |
| 1185 | WSREP_WARN("Received unknown signal: '%s'" , out); |
| 1186 | } |
| 1187 | } |
| 1188 | else |
| 1189 | { |
| 1190 | WSREP_ERROR("Failed to read from: %s" , proc.cmd()); |
| 1191 | proc.wait(); |
| 1192 | } |
| 1193 | if (!err && proc.error()) err= proc.error(); |
| 1194 | } |
| 1195 | else |
| 1196 | { |
| 1197 | WSREP_ERROR("Failed to execute: %s : %d (%s)" , |
| 1198 | proc.cmd(), err, strerror(err)); |
| 1199 | } |
| 1200 | |
| 1201 | if (locked) // don't forget to unlock server before return |
| 1202 | { |
| 1203 | if (mysql_bin_log.is_open()) |
| 1204 | { |
| 1205 | mysql_mutex_assert_owner(mysql_bin_log.get_log_lock()); |
| 1206 | mysql_mutex_unlock(mysql_bin_log.get_log_lock()); |
| 1207 | } |
| 1208 | sst_disallow_writes (thd.ptr, false); |
| 1209 | thd.ptr->global_read_lock.unlock_global_read_lock (thd.ptr); |
| 1210 | } |
| 1211 | |
| 1212 | // signal to donor that SST is over |
| 1213 | struct wsrep_gtid const state_id = { |
| 1214 | ret_uuid, err ? WSREP_SEQNO_UNDEFINED : ret_seqno |
| 1215 | }; |
| 1216 | wsrep->sst_sent (wsrep, &state_id, -err); |
| 1217 | proc.wait(); |
| 1218 | |
| 1219 | return NULL; |
| 1220 | } |
| 1221 | |
| 1222 | |
| 1223 | |
| 1224 | static int sst_donate_other (const char* method, |
| 1225 | const char* addr, |
| 1226 | const char* uuid, |
| 1227 | wsrep_seqno_t seqno, |
| 1228 | bool bypass, |
| 1229 | char** env) // carries auth info |
| 1230 | { |
| 1231 | int const cmd_len= 4096; |
| 1232 | wsp::string cmd_str(cmd_len); |
| 1233 | |
| 1234 | if (!cmd_str()) |
| 1235 | { |
| 1236 | WSREP_ERROR("sst_donate_other(): " |
| 1237 | "could not allocate cmd buffer of %d bytes" , cmd_len); |
| 1238 | return -ENOMEM; |
| 1239 | } |
| 1240 | |
| 1241 | const char* binlog_opt= "" ; |
| 1242 | char* binlog_opt_val= NULL; |
| 1243 | |
| 1244 | int ret; |
| 1245 | if ((ret= generate_binlog_opt_val(&binlog_opt_val))) |
| 1246 | { |
| 1247 | WSREP_ERROR("sst_donate_other(): generate_binlog_opt_val() failed: %d" ,ret); |
| 1248 | return ret; |
| 1249 | } |
| 1250 | if (strlen(binlog_opt_val)) binlog_opt= WSREP_SST_OPT_BINLOG; |
| 1251 | |
| 1252 | make_wsrep_defaults_file(); |
| 1253 | |
| 1254 | ret= snprintf (cmd_str(), cmd_len, |
| 1255 | "wsrep_sst_%s " |
| 1256 | WSREP_SST_OPT_ROLE" 'donor' " |
| 1257 | WSREP_SST_OPT_ADDR" '%s' " |
| 1258 | WSREP_SST_OPT_SOCKET" '%s' " |
| 1259 | WSREP_SST_OPT_DATA" '%s' " |
| 1260 | " %s " |
| 1261 | " %s '%s' " |
| 1262 | WSREP_SST_OPT_GTID" '%s:%lld' " |
| 1263 | WSREP_SST_OPT_GTID_DOMAIN_ID" '%d'" |
| 1264 | "%s" , |
| 1265 | method, addr, mysqld_unix_port, mysql_real_data_home, |
| 1266 | wsrep_defaults_file, |
| 1267 | binlog_opt, binlog_opt_val, |
| 1268 | uuid, (long long) seqno, wsrep_gtid_domain_id, |
| 1269 | bypass ? " " WSREP_SST_OPT_BYPASS : "" ); |
| 1270 | my_free(binlog_opt_val); |
| 1271 | |
| 1272 | if (ret < 0 || ret >= cmd_len) |
| 1273 | { |
| 1274 | WSREP_ERROR("sst_donate_other(): snprintf() failed: %d" , ret); |
| 1275 | return (ret < 0 ? ret : -EMSGSIZE); |
| 1276 | } |
| 1277 | |
| 1278 | if (!bypass && wsrep_sst_donor_rejects_queries) sst_reject_queries(FALSE); |
| 1279 | |
| 1280 | pthread_t tmp; |
| 1281 | sst_thread_arg arg(cmd_str(), env); |
| 1282 | mysql_mutex_lock (&arg.lock); |
| 1283 | ret = pthread_create (&tmp, NULL, sst_donor_thread, &arg); |
| 1284 | if (ret) |
| 1285 | { |
| 1286 | WSREP_ERROR("sst_donate_other(): pthread_create() failed: %d (%s)" , |
| 1287 | ret, strerror(ret)); |
| 1288 | return ret; |
| 1289 | } |
| 1290 | mysql_cond_wait (&arg.cond, &arg.lock); |
| 1291 | |
| 1292 | WSREP_INFO("sst_donor_thread signaled with %d" , arg.err); |
| 1293 | return arg.err; |
| 1294 | } |
| 1295 | |
| 1296 | wsrep_cb_status_t wsrep_sst_donate_cb (void* app_ctx, void* recv_ctx, |
| 1297 | const void* msg, size_t msg_len, |
| 1298 | const wsrep_gtid_t* current_gtid, |
| 1299 | const char* state, size_t state_len, |
| 1300 | bool bypass) |
| 1301 | { |
| 1302 | /* This will be reset when sync callback is called. |
| 1303 | * Should we set wsrep_ready to FALSE here too? */ |
| 1304 | |
| 1305 | wsrep_config_state->set(WSREP_MEMBER_DONOR); |
| 1306 | |
| 1307 | const char* method = (char*)msg; |
| 1308 | size_t method_len = strlen (method); |
| 1309 | const char* data = method + method_len + 1; |
| 1310 | |
| 1311 | char uuid_str[37]; |
| 1312 | wsrep_uuid_print (¤t_gtid->uuid, uuid_str, sizeof(uuid_str)); |
| 1313 | |
| 1314 | wsp::env env(NULL); |
| 1315 | if (env.error()) |
| 1316 | { |
| 1317 | WSREP_ERROR("wsrep_sst_donate_cb(): env var ctor failed: %d" , -env.error()); |
| 1318 | return WSREP_CB_FAILURE; |
| 1319 | } |
| 1320 | |
| 1321 | int ret; |
| 1322 | if ((ret= sst_append_auth_env(env, sst_auth_real))) |
| 1323 | { |
| 1324 | WSREP_ERROR("wsrep_sst_donate_cb(): appending auth env failed: %d" , ret); |
| 1325 | return WSREP_CB_FAILURE; |
| 1326 | } |
| 1327 | |
| 1328 | if (!strcmp (WSREP_SST_MYSQLDUMP, method)) |
| 1329 | { |
| 1330 | ret = sst_donate_mysqldump(data, ¤t_gtid->uuid, uuid_str, |
| 1331 | current_gtid->seqno, bypass, env()); |
| 1332 | } |
| 1333 | else |
| 1334 | { |
| 1335 | ret = sst_donate_other(method, data, uuid_str, |
| 1336 | current_gtid->seqno, bypass, env()); |
| 1337 | } |
| 1338 | |
| 1339 | return (ret >= 0 ? WSREP_CB_SUCCESS : WSREP_CB_FAILURE); |
| 1340 | } |
| 1341 | |
| 1342 | void wsrep_SE_init_grab() |
| 1343 | { |
| 1344 | if (mysql_mutex_lock (&LOCK_wsrep_sst_init)) abort(); |
| 1345 | } |
| 1346 | |
| 1347 | void wsrep_SE_init_wait() |
| 1348 | { |
| 1349 | while (SE_initialized == false) |
| 1350 | { |
| 1351 | mysql_cond_wait (&COND_wsrep_sst_init, &LOCK_wsrep_sst_init); |
| 1352 | } |
| 1353 | mysql_mutex_unlock (&LOCK_wsrep_sst_init); |
| 1354 | } |
| 1355 | |
| 1356 | void wsrep_SE_init_done() |
| 1357 | { |
| 1358 | mysql_cond_signal (&COND_wsrep_sst_init); |
| 1359 | mysql_mutex_unlock (&LOCK_wsrep_sst_init); |
| 1360 | } |
| 1361 | |
| 1362 | void wsrep_SE_initialized() |
| 1363 | { |
| 1364 | SE_initialized = true; |
| 1365 | } |
| 1366 | |