1 | /*------------------------------------------------------------------------- |
2 | * |
3 | * initdb --- initialize a PostgreSQL installation |
4 | * |
5 | * initdb creates (initializes) a PostgreSQL database cluster (site, |
6 | * instance, installation, whatever). A database cluster is a |
7 | * collection of PostgreSQL databases all managed by the same server. |
8 | * |
9 | * To create the database cluster, we create the directory that contains |
10 | * all its data, create the files that hold the global tables, create |
11 | * a few other control files for it, and create three databases: the |
12 | * template databases "template0" and "template1", and a default user |
13 | * database "postgres". |
14 | * |
15 | * The template databases are ordinary PostgreSQL databases. template0 |
16 | * is never supposed to change after initdb, whereas template1 can be |
17 | * changed to add site-local standard data. Either one can be copied |
18 | * to produce a new database. |
19 | * |
20 | * For largely-historical reasons, the template1 database is the one built |
21 | * by the basic bootstrap process. After it is complete, template0 and |
22 | * the default database, postgres, are made just by copying template1. |
23 | * |
24 | * To create template1, we run the postgres (backend) program in bootstrap |
25 | * mode and feed it data from the postgres.bki library file. After this |
26 | * initial bootstrap phase, some additional stuff is created by normal |
27 | * SQL commands fed to a standalone backend. Some of those commands are |
28 | * just embedded into this program (yeah, it's ugly), but larger chunks |
29 | * are taken from script files. |
30 | * |
31 | * |
32 | * Note: |
33 | * The program has some memory leakage - it isn't worth cleaning it up. |
34 | * |
35 | * This is a C implementation of the previous shell script for setting up a |
36 | * PostgreSQL cluster location, and should be highly compatible with it. |
37 | * author of C translation: Andrew Dunstan mailto:andrew@dunslane.net |
38 | * |
39 | * This code is released under the terms of the PostgreSQL License. |
40 | * |
41 | * Portions Copyright (c) 1996-2019, PostgreSQL Global Development Group |
42 | * Portions Copyright (c) 1994, Regents of the University of California |
43 | * |
44 | * src/bin/initdb/initdb.c |
45 | * |
46 | *------------------------------------------------------------------------- |
47 | */ |
48 | |
49 | #include "postgres_fe.h" |
50 | |
51 | #include <dirent.h> |
52 | #include <fcntl.h> |
53 | #include <sys/stat.h> |
54 | #include <unistd.h> |
55 | #include <signal.h> |
56 | #include <time.h> |
57 | |
58 | #ifdef HAVE_SHM_OPEN |
59 | #include "sys/mman.h" |
60 | #endif |
61 | |
62 | #include "access/xlog_internal.h" |
63 | #include "catalog/pg_authid_d.h" |
64 | #include "catalog/pg_class_d.h" /* pgrminclude ignore */ |
65 | #include "catalog/pg_collation_d.h" |
66 | #include "common/file_perm.h" |
67 | #include "common/file_utils.h" |
68 | #include "common/logging.h" |
69 | #include "common/restricted_token.h" |
70 | #include "common/username.h" |
71 | #include "fe_utils/string_utils.h" |
72 | #include "getaddrinfo.h" |
73 | #include "getopt_long.h" |
74 | #include "mb/pg_wchar.h" |
75 | #include "miscadmin.h" |
76 | |
77 | |
78 | /* Ideally this would be in a .h file, but it hardly seems worth the trouble */ |
79 | extern const char *select_default_timezone(const char *share_path); |
80 | |
81 | static const char *const auth_methods_host[] = { |
82 | "trust" , "reject" , "scram-sha-256" , "md5" , "password" , "ident" , "radius" , |
83 | #ifdef ENABLE_GSS |
84 | "gss" , |
85 | #endif |
86 | #ifdef ENABLE_SSPI |
87 | "sspi" , |
88 | #endif |
89 | #ifdef USE_PAM |
90 | "pam" , "pam " , |
91 | #endif |
92 | #ifdef USE_BSD_AUTH |
93 | "bsd" , |
94 | #endif |
95 | #ifdef USE_LDAP |
96 | "ldap" , |
97 | #endif |
98 | #ifdef USE_SSL |
99 | "cert" , |
100 | #endif |
101 | NULL |
102 | }; |
103 | static const char *const auth_methods_local[] = { |
104 | "trust" , "reject" , "scram-sha-256" , "md5" , "password" , "peer" , "radius" , |
105 | #ifdef USE_PAM |
106 | "pam" , "pam " , |
107 | #endif |
108 | #ifdef USE_BSD_AUTH |
109 | "bsd" , |
110 | #endif |
111 | #ifdef USE_LDAP |
112 | "ldap" , |
113 | #endif |
114 | NULL |
115 | }; |
116 | |
117 | /* |
118 | * these values are passed in by makefile defines |
119 | */ |
120 | static char *share_path = NULL; |
121 | |
122 | /* values to be obtained from arguments */ |
123 | static char *pg_data = NULL; |
124 | static char *encoding = NULL; |
125 | static char *locale = NULL; |
126 | static char *lc_collate = NULL; |
127 | static char *lc_ctype = NULL; |
128 | static char *lc_monetary = NULL; |
129 | static char *lc_numeric = NULL; |
130 | static char *lc_time = NULL; |
131 | static char *lc_messages = NULL; |
132 | static const char *default_text_search_config = NULL; |
133 | static char *username = NULL; |
134 | static bool pwprompt = false; |
135 | static char *pwfilename = NULL; |
136 | static char *superuser_password = NULL; |
137 | static const char *authmethodhost = NULL; |
138 | static const char *authmethodlocal = NULL; |
139 | static bool debug = false; |
140 | static bool noclean = false; |
141 | static bool do_sync = true; |
142 | static bool sync_only = false; |
143 | static bool show_setting = false; |
144 | static bool data_checksums = false; |
145 | static char *xlog_dir = NULL; |
146 | static char *str_wal_segment_size_mb = NULL; |
147 | static int wal_segment_size_mb; |
148 | |
149 | |
150 | /* internal vars */ |
151 | static const char *progname; |
152 | static int encodingid; |
153 | static char *bki_file; |
154 | static char *desc_file; |
155 | static char *shdesc_file; |
156 | static char *hba_file; |
157 | static char *ident_file; |
158 | static char *conf_file; |
159 | static char *dictionary_file; |
160 | static char *info_schema_file; |
161 | static char *features_file; |
162 | static char *system_views_file; |
163 | static bool success = false; |
164 | static bool made_new_pgdata = false; |
165 | static bool found_existing_pgdata = false; |
166 | static bool made_new_xlogdir = false; |
167 | static bool found_existing_xlogdir = false; |
168 | static char infoversion[100]; |
169 | static bool caught_signal = false; |
170 | static bool output_failed = false; |
171 | static int output_errno = 0; |
172 | static char *pgdata_native; |
173 | |
174 | /* defaults */ |
175 | static int n_connections = 10; |
176 | static int n_buffers = 50; |
177 | static const char *dynamic_shared_memory_type = NULL; |
178 | static const char *default_timezone = NULL; |
179 | |
180 | /* |
181 | * Warning messages for authentication methods |
182 | */ |
183 | #define AUTHTRUST_WARNING \ |
184 | "# CAUTION: Configuring the system for local \"trust\" authentication\n" \ |
185 | "# allows any local user to connect as any PostgreSQL user, including\n" \ |
186 | "# the database superuser. If you do not trust all your local users,\n" \ |
187 | "# use another authentication method.\n" |
188 | static bool authwarning = false; |
189 | |
190 | /* |
191 | * Centralized knowledge of switches to pass to backend |
192 | * |
193 | * Note: we run the backend with -F (fsync disabled) and then do a single |
194 | * pass of fsync'ing at the end. This is faster than fsync'ing each step. |
195 | * |
196 | * Note: in the shell-script version, we also passed PGDATA as a -D switch, |
197 | * but here it is more convenient to pass it as an environment variable |
198 | * (no quoting to worry about). |
199 | */ |
200 | static const char *boot_options = "-F" ; |
201 | static const char *backend_options = "--single -F -O -j -c search_path=pg_catalog -c exit_on_error=true" ; |
202 | |
203 | static const char *const subdirs[] = { |
204 | "global" , |
205 | "pg_wal/archive_status" , |
206 | "pg_commit_ts" , |
207 | "pg_dynshmem" , |
208 | "pg_notify" , |
209 | "pg_serial" , |
210 | "pg_snapshots" , |
211 | "pg_subtrans" , |
212 | "pg_twophase" , |
213 | "pg_multixact" , |
214 | "pg_multixact/members" , |
215 | "pg_multixact/offsets" , |
216 | "base" , |
217 | "base/1" , |
218 | "pg_replslot" , |
219 | "pg_tblspc" , |
220 | "pg_stat" , |
221 | "pg_stat_tmp" , |
222 | "pg_xact" , |
223 | "pg_logical" , |
224 | "pg_logical/snapshots" , |
225 | "pg_logical/mappings" |
226 | }; |
227 | |
228 | |
229 | /* path to 'initdb' binary directory */ |
230 | static char bin_path[MAXPGPATH]; |
231 | static char backend_exec[MAXPGPATH]; |
232 | |
233 | static char **replace_token(char **lines, |
234 | const char *token, const char *replacement); |
235 | |
236 | #ifndef HAVE_UNIX_SOCKETS |
237 | static char **filter_lines_with_token(char **lines, const char *token); |
238 | #endif |
239 | static char **readfile(const char *path); |
240 | static void writefile(char *path, char **lines); |
241 | static FILE *popen_check(const char *command, const char *mode); |
242 | static char *get_id(void); |
243 | static int get_encoding_id(const char *encoding_name); |
244 | static void set_input(char **dest, const char *filename); |
245 | static void check_input(char *path); |
246 | static void write_version_file(const char *); |
247 | static void set_null_conf(void); |
248 | static void test_config_settings(void); |
249 | static void setup_config(void); |
250 | static void bootstrap_template1(void); |
251 | static void setup_auth(FILE *cmdfd); |
252 | static void get_su_pwd(void); |
253 | static void setup_depend(FILE *cmdfd); |
254 | static void setup_sysviews(FILE *cmdfd); |
255 | static void setup_description(FILE *cmdfd); |
256 | static void setup_collation(FILE *cmdfd); |
257 | static void setup_dictionary(FILE *cmdfd); |
258 | static void setup_privileges(FILE *cmdfd); |
259 | static void set_info_version(void); |
260 | static void setup_schema(FILE *cmdfd); |
261 | static void load_plpgsql(FILE *cmdfd); |
262 | static void vacuum_db(FILE *cmdfd); |
263 | static void make_template0(FILE *cmdfd); |
264 | static void make_postgres(FILE *cmdfd); |
265 | static void trapsig(int signum); |
266 | static void check_ok(void); |
267 | static char *escape_quotes(const char *src); |
268 | static char *escape_quotes_bki(const char *src); |
269 | static int locale_date_order(const char *locale); |
270 | static void check_locale_name(int category, const char *locale, |
271 | char **canonname); |
272 | static bool check_locale_encoding(const char *locale, int encoding); |
273 | static void setlocales(void); |
274 | static void usage(const char *progname); |
275 | void setup_pgdata(void); |
276 | void setup_bin_paths(const char *argv0); |
277 | void setup_data_file_paths(void); |
278 | void setup_locale_encoding(void); |
279 | void setup_signals(void); |
280 | void setup_text_search(void); |
281 | void create_data_directory(void); |
282 | void create_xlog_or_symlink(void); |
283 | void warn_on_mount_point(int error); |
284 | void initialize_data_directory(void); |
285 | |
286 | /* |
287 | * macros for running pipes to postgres |
288 | */ |
289 | #define PG_CMD_DECL char cmd[MAXPGPATH]; FILE *cmdfd |
290 | |
291 | #define PG_CMD_OPEN \ |
292 | do { \ |
293 | cmdfd = popen_check(cmd, "w"); \ |
294 | if (cmdfd == NULL) \ |
295 | exit(1); /* message already printed by popen_check */ \ |
296 | } while (0) |
297 | |
298 | #define PG_CMD_CLOSE \ |
299 | do { \ |
300 | if (pclose_check(cmdfd)) \ |
301 | exit(1); /* message already printed by pclose_check */ \ |
302 | } while (0) |
303 | |
304 | #define PG_CMD_PUTS(line) \ |
305 | do { \ |
306 | if (fputs(line, cmdfd) < 0 || fflush(cmdfd) < 0) \ |
307 | output_failed = true, output_errno = errno; \ |
308 | } while (0) |
309 | |
310 | #define PG_CMD_PRINTF1(fmt, arg1) \ |
311 | do { \ |
312 | if (fprintf(cmdfd, fmt, arg1) < 0 || fflush(cmdfd) < 0) \ |
313 | output_failed = true, output_errno = errno; \ |
314 | } while (0) |
315 | |
316 | #define PG_CMD_PRINTF2(fmt, arg1, arg2) \ |
317 | do { \ |
318 | if (fprintf(cmdfd, fmt, arg1, arg2) < 0 || fflush(cmdfd) < 0) \ |
319 | output_failed = true, output_errno = errno; \ |
320 | } while (0) |
321 | |
322 | #define PG_CMD_PRINTF3(fmt, arg1, arg2, arg3) \ |
323 | do { \ |
324 | if (fprintf(cmdfd, fmt, arg1, arg2, arg3) < 0 || fflush(cmdfd) < 0) \ |
325 | output_failed = true, output_errno = errno; \ |
326 | } while (0) |
327 | |
328 | /* |
329 | * Escape single quotes and backslashes, suitably for insertions into |
330 | * configuration files or SQL E'' strings. |
331 | */ |
332 | static char * |
333 | escape_quotes(const char *src) |
334 | { |
335 | char *result = escape_single_quotes_ascii(src); |
336 | |
337 | if (!result) |
338 | { |
339 | pg_log_error("out of memory" ); |
340 | exit(1); |
341 | } |
342 | return result; |
343 | } |
344 | |
345 | /* |
346 | * Escape a field value to be inserted into the BKI data. |
347 | * Here, we first run the value through escape_quotes (which |
348 | * will be inverted by the backend's scanstr() function) and |
349 | * then overlay special processing of double quotes, which |
350 | * bootscanner.l will only accept as data if converted to octal |
351 | * representation ("\042"). We always wrap the value in double |
352 | * quotes, even if that isn't strictly necessary. |
353 | */ |
354 | static char * |
355 | escape_quotes_bki(const char *src) |
356 | { |
357 | char *result; |
358 | char *data = escape_quotes(src); |
359 | char *resultp; |
360 | char *datap; |
361 | int nquotes = 0; |
362 | |
363 | /* count double quotes in data */ |
364 | datap = data; |
365 | while ((datap = strchr(datap, '"')) != NULL) |
366 | { |
367 | nquotes++; |
368 | datap++; |
369 | } |
370 | |
371 | result = (char *) pg_malloc(strlen(data) + 3 + nquotes * 3); |
372 | resultp = result; |
373 | *resultp++ = '"'; |
374 | for (datap = data; *datap; datap++) |
375 | { |
376 | if (*datap == '"') |
377 | { |
378 | strcpy(resultp, "\\042" ); |
379 | resultp += 4; |
380 | } |
381 | else |
382 | *resultp++ = *datap; |
383 | } |
384 | *resultp++ = '"'; |
385 | *resultp = '\0'; |
386 | |
387 | free(data); |
388 | return result; |
389 | } |
390 | |
391 | /* |
392 | * make a copy of the array of lines, with token replaced by replacement |
393 | * the first time it occurs on each line. |
394 | * |
395 | * This does most of what sed was used for in the shell script, but |
396 | * doesn't need any regexp stuff. |
397 | */ |
398 | static char ** |
399 | replace_token(char **lines, const char *token, const char *replacement) |
400 | { |
401 | int numlines = 1; |
402 | int i; |
403 | char **result; |
404 | int toklen, |
405 | replen, |
406 | diff; |
407 | |
408 | for (i = 0; lines[i]; i++) |
409 | numlines++; |
410 | |
411 | result = (char **) pg_malloc(numlines * sizeof(char *)); |
412 | |
413 | toklen = strlen(token); |
414 | replen = strlen(replacement); |
415 | diff = replen - toklen; |
416 | |
417 | for (i = 0; i < numlines; i++) |
418 | { |
419 | char *where; |
420 | char *newline; |
421 | int pre; |
422 | |
423 | /* just copy pointer if NULL or no change needed */ |
424 | if (lines[i] == NULL || (where = strstr(lines[i], token)) == NULL) |
425 | { |
426 | result[i] = lines[i]; |
427 | continue; |
428 | } |
429 | |
430 | /* if we get here a change is needed - set up new line */ |
431 | |
432 | newline = (char *) pg_malloc(strlen(lines[i]) + diff + 1); |
433 | |
434 | pre = where - lines[i]; |
435 | |
436 | memcpy(newline, lines[i], pre); |
437 | |
438 | memcpy(newline + pre, replacement, replen); |
439 | |
440 | strcpy(newline + pre + replen, lines[i] + pre + toklen); |
441 | |
442 | result[i] = newline; |
443 | } |
444 | |
445 | return result; |
446 | } |
447 | |
448 | /* |
449 | * make a copy of lines without any that contain the token |
450 | * |
451 | * a sort of poor man's grep -v |
452 | */ |
453 | #ifndef HAVE_UNIX_SOCKETS |
454 | static char ** |
455 | filter_lines_with_token(char **lines, const char *token) |
456 | { |
457 | int numlines = 1; |
458 | int i, |
459 | src, |
460 | dst; |
461 | char **result; |
462 | |
463 | for (i = 0; lines[i]; i++) |
464 | numlines++; |
465 | |
466 | result = (char **) pg_malloc(numlines * sizeof(char *)); |
467 | |
468 | for (src = 0, dst = 0; src < numlines; src++) |
469 | { |
470 | if (lines[src] == NULL || strstr(lines[src], token) == NULL) |
471 | result[dst++] = lines[src]; |
472 | } |
473 | |
474 | return result; |
475 | } |
476 | #endif |
477 | |
478 | /* |
479 | * get the lines from a text file |
480 | */ |
481 | static char ** |
482 | readfile(const char *path) |
483 | { |
484 | FILE *infile; |
485 | int maxlength = 1, |
486 | linelen = 0; |
487 | int nlines = 0; |
488 | int n; |
489 | char **result; |
490 | char *buffer; |
491 | int c; |
492 | |
493 | if ((infile = fopen(path, "r" )) == NULL) |
494 | { |
495 | pg_log_error("could not open file \"%s\" for reading: %m" , path); |
496 | exit(1); |
497 | } |
498 | |
499 | /* pass over the file twice - the first time to size the result */ |
500 | |
501 | while ((c = fgetc(infile)) != EOF) |
502 | { |
503 | linelen++; |
504 | if (c == '\n') |
505 | { |
506 | nlines++; |
507 | if (linelen > maxlength) |
508 | maxlength = linelen; |
509 | linelen = 0; |
510 | } |
511 | } |
512 | |
513 | /* handle last line without a terminating newline (yuck) */ |
514 | if (linelen) |
515 | nlines++; |
516 | if (linelen > maxlength) |
517 | maxlength = linelen; |
518 | |
519 | /* set up the result and the line buffer */ |
520 | result = (char **) pg_malloc((nlines + 1) * sizeof(char *)); |
521 | buffer = (char *) pg_malloc(maxlength + 1); |
522 | |
523 | /* now reprocess the file and store the lines */ |
524 | rewind(infile); |
525 | n = 0; |
526 | while (fgets(buffer, maxlength + 1, infile) != NULL && n < nlines) |
527 | result[n++] = pg_strdup(buffer); |
528 | |
529 | fclose(infile); |
530 | free(buffer); |
531 | result[n] = NULL; |
532 | |
533 | return result; |
534 | } |
535 | |
536 | /* |
537 | * write an array of lines to a file |
538 | * |
539 | * This is only used to write text files. Use fopen "w" not PG_BINARY_W |
540 | * so that the resulting configuration files are nicely editable on Windows. |
541 | */ |
542 | static void |
543 | writefile(char *path, char **lines) |
544 | { |
545 | FILE *out_file; |
546 | char **line; |
547 | |
548 | if ((out_file = fopen(path, "w" )) == NULL) |
549 | { |
550 | pg_log_error("could not open file \"%s\" for writing: %m" , path); |
551 | exit(1); |
552 | } |
553 | for (line = lines; *line != NULL; line++) |
554 | { |
555 | if (fputs(*line, out_file) < 0) |
556 | { |
557 | pg_log_error("could not write file \"%s\": %m" , path); |
558 | exit(1); |
559 | } |
560 | free(*line); |
561 | } |
562 | if (fclose(out_file)) |
563 | { |
564 | pg_log_error("could not write file \"%s\": %m" , path); |
565 | exit(1); |
566 | } |
567 | } |
568 | |
569 | /* |
570 | * Open a subcommand with suitable error messaging |
571 | */ |
572 | static FILE * |
573 | popen_check(const char *command, const char *mode) |
574 | { |
575 | FILE *cmdfd; |
576 | |
577 | fflush(stdout); |
578 | fflush(stderr); |
579 | errno = 0; |
580 | cmdfd = popen(command, mode); |
581 | if (cmdfd == NULL) |
582 | pg_log_error("could not execute command \"%s\": %m" , command); |
583 | return cmdfd; |
584 | } |
585 | |
586 | /* |
587 | * clean up any files we created on failure |
588 | * if we created the data directory remove it too |
589 | */ |
590 | static void |
591 | cleanup_directories_atexit(void) |
592 | { |
593 | if (success) |
594 | return; |
595 | |
596 | if (!noclean) |
597 | { |
598 | if (made_new_pgdata) |
599 | { |
600 | pg_log_info("removing data directory \"%s\"" , pg_data); |
601 | if (!rmtree(pg_data, true)) |
602 | pg_log_error("failed to remove data directory" ); |
603 | } |
604 | else if (found_existing_pgdata) |
605 | { |
606 | pg_log_info("removing contents of data directory \"%s\"" , |
607 | pg_data); |
608 | if (!rmtree(pg_data, false)) |
609 | pg_log_error("failed to remove contents of data directory" ); |
610 | } |
611 | |
612 | if (made_new_xlogdir) |
613 | { |
614 | pg_log_info("removing WAL directory \"%s\"" , xlog_dir); |
615 | if (!rmtree(xlog_dir, true)) |
616 | pg_log_error("failed to remove WAL directory" ); |
617 | } |
618 | else if (found_existing_xlogdir) |
619 | { |
620 | pg_log_info("removing contents of WAL directory \"%s\"" , xlog_dir); |
621 | if (!rmtree(xlog_dir, false)) |
622 | pg_log_error("failed to remove contents of WAL directory" ); |
623 | } |
624 | /* otherwise died during startup, do nothing! */ |
625 | } |
626 | else |
627 | { |
628 | if (made_new_pgdata || found_existing_pgdata) |
629 | pg_log_info("data directory \"%s\" not removed at user's request" , |
630 | pg_data); |
631 | |
632 | if (made_new_xlogdir || found_existing_xlogdir) |
633 | pg_log_info("WAL directory \"%s\" not removed at user's request" , |
634 | xlog_dir); |
635 | } |
636 | } |
637 | |
638 | /* |
639 | * find the current user |
640 | * |
641 | * on unix make sure it isn't root |
642 | */ |
643 | static char * |
644 | get_id(void) |
645 | { |
646 | const char *username; |
647 | |
648 | #ifndef WIN32 |
649 | if (geteuid() == 0) /* 0 is root's uid */ |
650 | { |
651 | pg_log_error("cannot be run as root" ); |
652 | fprintf(stderr, |
653 | _("Please log in (using, e.g., \"su\") as the (unprivileged) user that will\n" |
654 | "own the server process.\n" )); |
655 | exit(1); |
656 | } |
657 | #endif |
658 | |
659 | username = get_user_name_or_exit(progname); |
660 | |
661 | return pg_strdup(username); |
662 | } |
663 | |
664 | static char * |
665 | encodingid_to_string(int enc) |
666 | { |
667 | char result[20]; |
668 | |
669 | sprintf(result, "%d" , enc); |
670 | return pg_strdup(result); |
671 | } |
672 | |
673 | /* |
674 | * get the encoding id for a given encoding name |
675 | */ |
676 | static int |
677 | get_encoding_id(const char *encoding_name) |
678 | { |
679 | int enc; |
680 | |
681 | if (encoding_name && *encoding_name) |
682 | { |
683 | if ((enc = pg_valid_server_encoding(encoding_name)) >= 0) |
684 | return enc; |
685 | } |
686 | pg_log_error("\"%s\" is not a valid server encoding name" , |
687 | encoding_name ? encoding_name : "(null)" ); |
688 | exit(1); |
689 | } |
690 | |
691 | /* |
692 | * Support for determining the best default text search configuration. |
693 | * We key this off the first part of LC_CTYPE (ie, the language name). |
694 | */ |
695 | struct tsearch_config_match |
696 | { |
697 | const char *tsconfname; |
698 | const char *langname; |
699 | }; |
700 | |
701 | static const struct tsearch_config_match tsearch_config_languages[] = |
702 | { |
703 | {"arabic" , "ar" }, |
704 | {"arabic" , "Arabic" }, |
705 | {"danish" , "da" }, |
706 | {"danish" , "Danish" }, |
707 | {"dutch" , "nl" }, |
708 | {"dutch" , "Dutch" }, |
709 | {"english" , "C" }, |
710 | {"english" , "POSIX" }, |
711 | {"english" , "en" }, |
712 | {"english" , "English" }, |
713 | {"finnish" , "fi" }, |
714 | {"finnish" , "Finnish" }, |
715 | {"french" , "fr" }, |
716 | {"french" , "French" }, |
717 | {"german" , "de" }, |
718 | {"german" , "German" }, |
719 | {"hungarian" , "hu" }, |
720 | {"hungarian" , "Hungarian" }, |
721 | {"indonesian" , "id" }, |
722 | {"indonesian" , "Indonesian" }, |
723 | {"irish" , "ga" }, |
724 | {"irish" , "Irish" }, |
725 | {"italian" , "it" }, |
726 | {"italian" , "Italian" }, |
727 | {"lithuanian" , "lt" }, |
728 | {"lithuanian" , "Lithuanian" }, |
729 | {"nepali" , "ne" }, |
730 | {"nepali" , "Nepali" }, |
731 | {"norwegian" , "no" }, |
732 | {"norwegian" , "Norwegian" }, |
733 | {"portuguese" , "pt" }, |
734 | {"portuguese" , "Portuguese" }, |
735 | {"romanian" , "ro" }, |
736 | {"russian" , "ru" }, |
737 | {"russian" , "Russian" }, |
738 | {"spanish" , "es" }, |
739 | {"spanish" , "Spanish" }, |
740 | {"swedish" , "sv" }, |
741 | {"swedish" , "Swedish" }, |
742 | {"tamil" , "ta" }, |
743 | {"tamil" , "Tamil" }, |
744 | {"turkish" , "tr" }, |
745 | {"turkish" , "Turkish" }, |
746 | {NULL, NULL} /* end marker */ |
747 | }; |
748 | |
749 | /* |
750 | * Look for a text search configuration matching lc_ctype, and return its |
751 | * name; return NULL if no match. |
752 | */ |
753 | static const char * |
754 | find_matching_ts_config(const char *lc_type) |
755 | { |
756 | int i; |
757 | char *langname, |
758 | *ptr; |
759 | |
760 | /* |
761 | * Convert lc_ctype to a language name by stripping everything after an |
762 | * underscore (usual case) or a hyphen (Windows "locale name"; see |
763 | * comments at IsoLocaleName()). |
764 | * |
765 | * XXX Should ' ' be a stop character? This would select "norwegian" for |
766 | * the Windows locale "Norwegian (Nynorsk)_Norway.1252". If we do so, we |
767 | * should also accept the "nn" and "nb" Unix locales. |
768 | * |
769 | * Just for paranoia, we also stop at '.' or '@'. |
770 | */ |
771 | if (lc_type == NULL) |
772 | langname = pg_strdup("" ); |
773 | else |
774 | { |
775 | ptr = langname = pg_strdup(lc_type); |
776 | while (*ptr && |
777 | *ptr != '_' && *ptr != '-' && *ptr != '.' && *ptr != '@') |
778 | ptr++; |
779 | *ptr = '\0'; |
780 | } |
781 | |
782 | for (i = 0; tsearch_config_languages[i].tsconfname; i++) |
783 | { |
784 | if (pg_strcasecmp(tsearch_config_languages[i].langname, langname) == 0) |
785 | { |
786 | free(langname); |
787 | return tsearch_config_languages[i].tsconfname; |
788 | } |
789 | } |
790 | |
791 | free(langname); |
792 | return NULL; |
793 | } |
794 | |
795 | |
796 | /* |
797 | * set name of given input file variable under data directory |
798 | */ |
799 | static void |
800 | set_input(char **dest, const char *filename) |
801 | { |
802 | *dest = psprintf("%s/%s" , share_path, filename); |
803 | } |
804 | |
805 | /* |
806 | * check that given input file exists |
807 | */ |
808 | static void |
809 | check_input(char *path) |
810 | { |
811 | struct stat statbuf; |
812 | |
813 | if (stat(path, &statbuf) != 0) |
814 | { |
815 | if (errno == ENOENT) |
816 | { |
817 | pg_log_error("file \"%s\" does not exist" , path); |
818 | fprintf(stderr, |
819 | _("This might mean you have a corrupted installation or identified\n" |
820 | "the wrong directory with the invocation option -L.\n" )); |
821 | } |
822 | else |
823 | { |
824 | pg_log_error("could not access file \"%s\": %m" , path); |
825 | fprintf(stderr, |
826 | _("This might mean you have a corrupted installation or identified\n" |
827 | "the wrong directory with the invocation option -L.\n" )); |
828 | } |
829 | exit(1); |
830 | } |
831 | if (!S_ISREG(statbuf.st_mode)) |
832 | { |
833 | pg_log_error("file \"%s\" is not a regular file" , path); |
834 | fprintf(stderr, |
835 | _("This might mean you have a corrupted installation or identified\n" |
836 | "the wrong directory with the invocation option -L.\n" )); |
837 | exit(1); |
838 | } |
839 | } |
840 | |
841 | /* |
842 | * write out the PG_VERSION file in the data dir, or its subdirectory |
843 | * if extrapath is not NULL |
844 | */ |
845 | static void |
846 | write_version_file(const char *) |
847 | { |
848 | FILE *version_file; |
849 | char *path; |
850 | |
851 | if (extrapath == NULL) |
852 | path = psprintf("%s/PG_VERSION" , pg_data); |
853 | else |
854 | path = psprintf("%s/%s/PG_VERSION" , pg_data, extrapath); |
855 | |
856 | if ((version_file = fopen(path, PG_BINARY_W)) == NULL) |
857 | { |
858 | pg_log_error("could not open file \"%s\" for writing: %m" , path); |
859 | exit(1); |
860 | } |
861 | if (fprintf(version_file, "%s\n" , PG_MAJORVERSION) < 0 || |
862 | fclose(version_file)) |
863 | { |
864 | pg_log_error("could not write file \"%s\": %m" , path); |
865 | exit(1); |
866 | } |
867 | free(path); |
868 | } |
869 | |
870 | /* |
871 | * set up an empty config file so we can check config settings by launching |
872 | * a test backend |
873 | */ |
874 | static void |
875 | set_null_conf(void) |
876 | { |
877 | FILE *conf_file; |
878 | char *path; |
879 | |
880 | path = psprintf("%s/postgresql.conf" , pg_data); |
881 | conf_file = fopen(path, PG_BINARY_W); |
882 | if (conf_file == NULL) |
883 | { |
884 | pg_log_error("could not open file \"%s\" for writing: %m" , path); |
885 | exit(1); |
886 | } |
887 | if (fclose(conf_file)) |
888 | { |
889 | pg_log_error("could not write file \"%s\": %m" , path); |
890 | exit(1); |
891 | } |
892 | free(path); |
893 | } |
894 | |
895 | /* |
896 | * Determine which dynamic shared memory implementation should be used on |
897 | * this platform. POSIX shared memory is preferable because the default |
898 | * allocation limits are much higher than the limits for System V on most |
899 | * systems that support both, but the fact that a platform has shm_open |
900 | * doesn't guarantee that that call will succeed when attempted. So, we |
901 | * attempt to reproduce what the postmaster will do when allocating a POSIX |
902 | * segment in dsm_impl.c; if it doesn't work, we assume it won't work for |
903 | * the postmaster either, and configure the cluster for System V shared |
904 | * memory instead. |
905 | */ |
906 | static const char * |
907 | choose_dsm_implementation(void) |
908 | { |
909 | #ifdef HAVE_SHM_OPEN |
910 | int ntries = 10; |
911 | |
912 | /* Initialize random(); this function is its only user in this program. */ |
913 | srandom((unsigned int) (getpid() ^ time(NULL))); |
914 | |
915 | while (ntries > 0) |
916 | { |
917 | uint32 handle; |
918 | char name[64]; |
919 | int fd; |
920 | |
921 | handle = random(); |
922 | snprintf(name, 64, "/PostgreSQL.%u" , handle); |
923 | if ((fd = shm_open(name, O_CREAT | O_RDWR | O_EXCL, 0600)) != -1) |
924 | { |
925 | close(fd); |
926 | shm_unlink(name); |
927 | return "posix" ; |
928 | } |
929 | if (errno != EEXIST) |
930 | break; |
931 | --ntries; |
932 | } |
933 | #endif |
934 | |
935 | #ifdef WIN32 |
936 | return "windows" ; |
937 | #else |
938 | return "sysv" ; |
939 | #endif |
940 | } |
941 | |
942 | /* |
943 | * Determine platform-specific config settings |
944 | * |
945 | * Use reasonable values if kernel will let us, else scale back. |
946 | */ |
947 | static void |
948 | test_config_settings(void) |
949 | { |
950 | /* |
951 | * This macro defines the minimum shared_buffers we want for a given |
952 | * max_connections value. The arrays show the settings to try. |
953 | */ |
954 | #define MIN_BUFS_FOR_CONNS(nconns) ((nconns) * 10) |
955 | |
956 | static const int trial_conns[] = { |
957 | 100, 50, 40, 30, 20 |
958 | }; |
959 | static const int trial_bufs[] = { |
960 | 16384, 8192, 4096, 3584, 3072, 2560, 2048, 1536, |
961 | 1000, 900, 800, 700, 600, 500, |
962 | 400, 300, 200, 100, 50 |
963 | }; |
964 | |
965 | char cmd[MAXPGPATH]; |
966 | const int connslen = sizeof(trial_conns) / sizeof(int); |
967 | const int bufslen = sizeof(trial_bufs) / sizeof(int); |
968 | int i, |
969 | status, |
970 | test_conns, |
971 | test_buffs, |
972 | ok_buffers = 0; |
973 | |
974 | /* |
975 | * Need to determine working DSM implementation first so that subsequent |
976 | * tests don't fail because DSM setting doesn't work. |
977 | */ |
978 | printf(_("selecting dynamic shared memory implementation ... " )); |
979 | fflush(stdout); |
980 | dynamic_shared_memory_type = choose_dsm_implementation(); |
981 | printf("%s\n" , dynamic_shared_memory_type); |
982 | |
983 | /* |
984 | * Probe for max_connections before shared_buffers, since it is subject to |
985 | * more constraints than shared_buffers. |
986 | */ |
987 | printf(_("selecting default max_connections ... " )); |
988 | fflush(stdout); |
989 | |
990 | for (i = 0; i < connslen; i++) |
991 | { |
992 | test_conns = trial_conns[i]; |
993 | test_buffs = MIN_BUFS_FOR_CONNS(test_conns); |
994 | |
995 | snprintf(cmd, sizeof(cmd), |
996 | "\"%s\" --boot -x0 %s " |
997 | "-c max_connections=%d " |
998 | "-c shared_buffers=%d " |
999 | "-c dynamic_shared_memory_type=%s " |
1000 | "< \"%s\" > \"%s\" 2>&1" , |
1001 | backend_exec, boot_options, |
1002 | test_conns, test_buffs, |
1003 | dynamic_shared_memory_type, |
1004 | DEVNULL, DEVNULL); |
1005 | status = system(cmd); |
1006 | if (status == 0) |
1007 | { |
1008 | ok_buffers = test_buffs; |
1009 | break; |
1010 | } |
1011 | } |
1012 | if (i >= connslen) |
1013 | i = connslen - 1; |
1014 | n_connections = trial_conns[i]; |
1015 | |
1016 | printf("%d\n" , n_connections); |
1017 | |
1018 | printf(_("selecting default shared_buffers ... " )); |
1019 | fflush(stdout); |
1020 | |
1021 | for (i = 0; i < bufslen; i++) |
1022 | { |
1023 | /* Use same amount of memory, independent of BLCKSZ */ |
1024 | test_buffs = (trial_bufs[i] * 8192) / BLCKSZ; |
1025 | if (test_buffs <= ok_buffers) |
1026 | { |
1027 | test_buffs = ok_buffers; |
1028 | break; |
1029 | } |
1030 | |
1031 | snprintf(cmd, sizeof(cmd), |
1032 | "\"%s\" --boot -x0 %s " |
1033 | "-c max_connections=%d " |
1034 | "-c shared_buffers=%d " |
1035 | "-c dynamic_shared_memory_type=%s " |
1036 | "< \"%s\" > \"%s\" 2>&1" , |
1037 | backend_exec, boot_options, |
1038 | n_connections, test_buffs, |
1039 | dynamic_shared_memory_type, |
1040 | DEVNULL, DEVNULL); |
1041 | status = system(cmd); |
1042 | if (status == 0) |
1043 | break; |
1044 | } |
1045 | n_buffers = test_buffs; |
1046 | |
1047 | if ((n_buffers * (BLCKSZ / 1024)) % 1024 == 0) |
1048 | printf("%dMB\n" , (n_buffers * (BLCKSZ / 1024)) / 1024); |
1049 | else |
1050 | printf("%dkB\n" , n_buffers * (BLCKSZ / 1024)); |
1051 | |
1052 | printf(_("selecting default time zone ... " )); |
1053 | fflush(stdout); |
1054 | default_timezone = select_default_timezone(share_path); |
1055 | printf("%s\n" , default_timezone ? default_timezone : "GMT" ); |
1056 | } |
1057 | |
1058 | /* |
1059 | * Calculate the default wal_size with a "pretty" unit. |
1060 | */ |
1061 | static char * |
1062 | pretty_wal_size(int segment_count) |
1063 | { |
1064 | int sz = wal_segment_size_mb * segment_count; |
1065 | char *result = pg_malloc(14); |
1066 | |
1067 | if ((sz % 1024) == 0) |
1068 | snprintf(result, 14, "%dGB" , sz / 1024); |
1069 | else |
1070 | snprintf(result, 14, "%dMB" , sz); |
1071 | |
1072 | return result; |
1073 | } |
1074 | |
1075 | /* |
1076 | * set up all the config files |
1077 | */ |
1078 | static void |
1079 | setup_config(void) |
1080 | { |
1081 | char **conflines; |
1082 | char repltok[MAXPGPATH]; |
1083 | char path[MAXPGPATH]; |
1084 | char *autoconflines[3]; |
1085 | |
1086 | fputs(_("creating configuration files ... " ), stdout); |
1087 | fflush(stdout); |
1088 | |
1089 | /* postgresql.conf */ |
1090 | |
1091 | conflines = readfile(conf_file); |
1092 | |
1093 | snprintf(repltok, sizeof(repltok), "max_connections = %d" , n_connections); |
1094 | conflines = replace_token(conflines, "#max_connections = 100" , repltok); |
1095 | |
1096 | if ((n_buffers * (BLCKSZ / 1024)) % 1024 == 0) |
1097 | snprintf(repltok, sizeof(repltok), "shared_buffers = %dMB" , |
1098 | (n_buffers * (BLCKSZ / 1024)) / 1024); |
1099 | else |
1100 | snprintf(repltok, sizeof(repltok), "shared_buffers = %dkB" , |
1101 | n_buffers * (BLCKSZ / 1024)); |
1102 | conflines = replace_token(conflines, "#shared_buffers = 32MB" , repltok); |
1103 | |
1104 | #ifdef HAVE_UNIX_SOCKETS |
1105 | snprintf(repltok, sizeof(repltok), "#unix_socket_directories = '%s'" , |
1106 | DEFAULT_PGSOCKET_DIR); |
1107 | #else |
1108 | snprintf(repltok, sizeof(repltok), "#unix_socket_directories = ''" ); |
1109 | #endif |
1110 | conflines = replace_token(conflines, "#unix_socket_directories = '/tmp'" , |
1111 | repltok); |
1112 | |
1113 | #if DEF_PGPORT != 5432 |
1114 | snprintf(repltok, sizeof(repltok), "#port = %d" , DEF_PGPORT); |
1115 | conflines = replace_token(conflines, "#port = 5432" , repltok); |
1116 | #endif |
1117 | |
1118 | /* set default max_wal_size and min_wal_size */ |
1119 | snprintf(repltok, sizeof(repltok), "min_wal_size = %s" , |
1120 | pretty_wal_size(DEFAULT_MIN_WAL_SEGS)); |
1121 | conflines = replace_token(conflines, "#min_wal_size = 80MB" , repltok); |
1122 | |
1123 | snprintf(repltok, sizeof(repltok), "max_wal_size = %s" , |
1124 | pretty_wal_size(DEFAULT_MAX_WAL_SEGS)); |
1125 | conflines = replace_token(conflines, "#max_wal_size = 1GB" , repltok); |
1126 | |
1127 | snprintf(repltok, sizeof(repltok), "lc_messages = '%s'" , |
1128 | escape_quotes(lc_messages)); |
1129 | conflines = replace_token(conflines, "#lc_messages = 'C'" , repltok); |
1130 | |
1131 | snprintf(repltok, sizeof(repltok), "lc_monetary = '%s'" , |
1132 | escape_quotes(lc_monetary)); |
1133 | conflines = replace_token(conflines, "#lc_monetary = 'C'" , repltok); |
1134 | |
1135 | snprintf(repltok, sizeof(repltok), "lc_numeric = '%s'" , |
1136 | escape_quotes(lc_numeric)); |
1137 | conflines = replace_token(conflines, "#lc_numeric = 'C'" , repltok); |
1138 | |
1139 | snprintf(repltok, sizeof(repltok), "lc_time = '%s'" , |
1140 | escape_quotes(lc_time)); |
1141 | conflines = replace_token(conflines, "#lc_time = 'C'" , repltok); |
1142 | |
1143 | switch (locale_date_order(lc_time)) |
1144 | { |
1145 | case DATEORDER_YMD: |
1146 | strcpy(repltok, "datestyle = 'iso, ymd'" ); |
1147 | break; |
1148 | case DATEORDER_DMY: |
1149 | strcpy(repltok, "datestyle = 'iso, dmy'" ); |
1150 | break; |
1151 | case DATEORDER_MDY: |
1152 | default: |
1153 | strcpy(repltok, "datestyle = 'iso, mdy'" ); |
1154 | break; |
1155 | } |
1156 | conflines = replace_token(conflines, "#datestyle = 'iso, mdy'" , repltok); |
1157 | |
1158 | snprintf(repltok, sizeof(repltok), |
1159 | "default_text_search_config = 'pg_catalog.%s'" , |
1160 | escape_quotes(default_text_search_config)); |
1161 | conflines = replace_token(conflines, |
1162 | "#default_text_search_config = 'pg_catalog.simple'" , |
1163 | repltok); |
1164 | |
1165 | if (default_timezone) |
1166 | { |
1167 | snprintf(repltok, sizeof(repltok), "timezone = '%s'" , |
1168 | escape_quotes(default_timezone)); |
1169 | conflines = replace_token(conflines, "#timezone = 'GMT'" , repltok); |
1170 | snprintf(repltok, sizeof(repltok), "log_timezone = '%s'" , |
1171 | escape_quotes(default_timezone)); |
1172 | conflines = replace_token(conflines, "#log_timezone = 'GMT'" , repltok); |
1173 | } |
1174 | |
1175 | snprintf(repltok, sizeof(repltok), "dynamic_shared_memory_type = %s" , |
1176 | dynamic_shared_memory_type); |
1177 | conflines = replace_token(conflines, "#dynamic_shared_memory_type = posix" , |
1178 | repltok); |
1179 | |
1180 | #if DEFAULT_BACKEND_FLUSH_AFTER > 0 |
1181 | snprintf(repltok, sizeof(repltok), "#backend_flush_after = %dkB" , |
1182 | DEFAULT_BACKEND_FLUSH_AFTER * (BLCKSZ / 1024)); |
1183 | conflines = replace_token(conflines, "#backend_flush_after = 0" , |
1184 | repltok); |
1185 | #endif |
1186 | |
1187 | #if DEFAULT_BGWRITER_FLUSH_AFTER > 0 |
1188 | snprintf(repltok, sizeof(repltok), "#bgwriter_flush_after = %dkB" , |
1189 | DEFAULT_BGWRITER_FLUSH_AFTER * (BLCKSZ / 1024)); |
1190 | conflines = replace_token(conflines, "#bgwriter_flush_after = 0" , |
1191 | repltok); |
1192 | #endif |
1193 | |
1194 | #if DEFAULT_CHECKPOINT_FLUSH_AFTER > 0 |
1195 | snprintf(repltok, sizeof(repltok), "#checkpoint_flush_after = %dkB" , |
1196 | DEFAULT_CHECKPOINT_FLUSH_AFTER * (BLCKSZ / 1024)); |
1197 | conflines = replace_token(conflines, "#checkpoint_flush_after = 0" , |
1198 | repltok); |
1199 | #endif |
1200 | |
1201 | #ifndef USE_PREFETCH |
1202 | conflines = replace_token(conflines, |
1203 | "#effective_io_concurrency = 1" , |
1204 | "#effective_io_concurrency = 0" ); |
1205 | #endif |
1206 | |
1207 | #ifdef WIN32 |
1208 | conflines = replace_token(conflines, |
1209 | "#update_process_title = on" , |
1210 | "#update_process_title = off" ); |
1211 | #endif |
1212 | |
1213 | if (strcmp(authmethodlocal, "scram-sha-256" ) == 0 || |
1214 | strcmp(authmethodhost, "scram-sha-256" ) == 0) |
1215 | { |
1216 | conflines = replace_token(conflines, |
1217 | "#password_encryption = md5" , |
1218 | "password_encryption = scram-sha-256" ); |
1219 | } |
1220 | |
1221 | /* |
1222 | * If group access has been enabled for the cluster then it makes sense to |
1223 | * ensure that the log files also allow group access. Otherwise a backup |
1224 | * from a user in the group would fail if the log files were not |
1225 | * relocated. |
1226 | */ |
1227 | if (pg_dir_create_mode == PG_DIR_MODE_GROUP) |
1228 | { |
1229 | conflines = replace_token(conflines, |
1230 | "#log_file_mode = 0600" , |
1231 | "log_file_mode = 0640" ); |
1232 | } |
1233 | |
1234 | snprintf(path, sizeof(path), "%s/postgresql.conf" , pg_data); |
1235 | |
1236 | writefile(path, conflines); |
1237 | if (chmod(path, pg_file_create_mode) != 0) |
1238 | { |
1239 | pg_log_error("could not change permissions of \"%s\": %m" , path); |
1240 | exit(1); |
1241 | } |
1242 | |
1243 | /* |
1244 | * create the automatic configuration file to store the configuration |
1245 | * parameters set by ALTER SYSTEM command. The parameters present in this |
1246 | * file will override the value of parameters that exists before parse of |
1247 | * this file. |
1248 | */ |
1249 | autoconflines[0] = pg_strdup("# Do not edit this file manually!\n" ); |
1250 | autoconflines[1] = pg_strdup("# It will be overwritten by the ALTER SYSTEM command.\n" ); |
1251 | autoconflines[2] = NULL; |
1252 | |
1253 | sprintf(path, "%s/postgresql.auto.conf" , pg_data); |
1254 | |
1255 | writefile(path, autoconflines); |
1256 | if (chmod(path, pg_file_create_mode) != 0) |
1257 | { |
1258 | pg_log_error("could not change permissions of \"%s\": %m" , path); |
1259 | exit(1); |
1260 | } |
1261 | |
1262 | free(conflines); |
1263 | |
1264 | |
1265 | /* pg_hba.conf */ |
1266 | |
1267 | conflines = readfile(hba_file); |
1268 | |
1269 | #ifndef HAVE_UNIX_SOCKETS |
1270 | conflines = filter_lines_with_token(conflines, "@remove-line-for-nolocal@" ); |
1271 | #else |
1272 | conflines = replace_token(conflines, "@remove-line-for-nolocal@" , "" ); |
1273 | #endif |
1274 | |
1275 | #ifdef HAVE_IPV6 |
1276 | |
1277 | /* |
1278 | * Probe to see if there is really any platform support for IPv6, and |
1279 | * comment out the relevant pg_hba line if not. This avoids runtime |
1280 | * warnings if getaddrinfo doesn't actually cope with IPv6. Particularly |
1281 | * useful on Windows, where executables built on a machine with IPv6 may |
1282 | * have to run on a machine without. |
1283 | */ |
1284 | { |
1285 | struct addrinfo *gai_result; |
1286 | struct addrinfo hints; |
1287 | int err = 0; |
1288 | |
1289 | #ifdef WIN32 |
1290 | /* need to call WSAStartup before calling getaddrinfo */ |
1291 | WSADATA wsaData; |
1292 | |
1293 | err = WSAStartup(MAKEWORD(2, 2), &wsaData); |
1294 | #endif |
1295 | |
1296 | /* for best results, this code should match parse_hba() */ |
1297 | hints.ai_flags = AI_NUMERICHOST; |
1298 | hints.ai_family = AF_UNSPEC; |
1299 | hints.ai_socktype = 0; |
1300 | hints.ai_protocol = 0; |
1301 | hints.ai_addrlen = 0; |
1302 | hints.ai_canonname = NULL; |
1303 | hints.ai_addr = NULL; |
1304 | hints.ai_next = NULL; |
1305 | |
1306 | if (err != 0 || |
1307 | getaddrinfo("::1" , NULL, &hints, &gai_result) != 0) |
1308 | { |
1309 | conflines = replace_token(conflines, |
1310 | "host all all ::1" , |
1311 | "#host all all ::1" ); |
1312 | conflines = replace_token(conflines, |
1313 | "host replication all ::1" , |
1314 | "#host replication all ::1" ); |
1315 | } |
1316 | } |
1317 | #else /* !HAVE_IPV6 */ |
1318 | /* If we didn't compile IPV6 support at all, always comment it out */ |
1319 | conflines = replace_token(conflines, |
1320 | "host all all ::1" , |
1321 | "#host all all ::1" ); |
1322 | conflines = replace_token(conflines, |
1323 | "host replication all ::1" , |
1324 | "#host replication all ::1" ); |
1325 | #endif /* HAVE_IPV6 */ |
1326 | |
1327 | /* Replace default authentication methods */ |
1328 | conflines = replace_token(conflines, |
1329 | "@authmethodhost@" , |
1330 | authmethodhost); |
1331 | conflines = replace_token(conflines, |
1332 | "@authmethodlocal@" , |
1333 | authmethodlocal); |
1334 | |
1335 | conflines = replace_token(conflines, |
1336 | "@authcomment@" , |
1337 | (strcmp(authmethodlocal, "trust" ) == 0 || strcmp(authmethodhost, "trust" ) == 0) ? AUTHTRUST_WARNING : "" ); |
1338 | |
1339 | snprintf(path, sizeof(path), "%s/pg_hba.conf" , pg_data); |
1340 | |
1341 | writefile(path, conflines); |
1342 | if (chmod(path, pg_file_create_mode) != 0) |
1343 | { |
1344 | pg_log_error("could not change permissions of \"%s\": %m" , path); |
1345 | exit(1); |
1346 | } |
1347 | |
1348 | free(conflines); |
1349 | |
1350 | /* pg_ident.conf */ |
1351 | |
1352 | conflines = readfile(ident_file); |
1353 | |
1354 | snprintf(path, sizeof(path), "%s/pg_ident.conf" , pg_data); |
1355 | |
1356 | writefile(path, conflines); |
1357 | if (chmod(path, pg_file_create_mode) != 0) |
1358 | { |
1359 | pg_log_error("could not change permissions of \"%s\": %m" , path); |
1360 | exit(1); |
1361 | } |
1362 | |
1363 | free(conflines); |
1364 | |
1365 | check_ok(); |
1366 | } |
1367 | |
1368 | |
1369 | /* |
1370 | * run the BKI script in bootstrap mode to create template1 |
1371 | */ |
1372 | static void |
1373 | bootstrap_template1(void) |
1374 | { |
1375 | PG_CMD_DECL; |
1376 | char **line; |
1377 | char **bki_lines; |
1378 | char [MAXPGPATH]; |
1379 | char buf[64]; |
1380 | |
1381 | printf(_("running bootstrap script ... " )); |
1382 | fflush(stdout); |
1383 | |
1384 | bki_lines = readfile(bki_file); |
1385 | |
1386 | /* Check that bki file appears to be of the right version */ |
1387 | |
1388 | snprintf(headerline, sizeof(headerline), "# PostgreSQL %s\n" , |
1389 | PG_MAJORVERSION); |
1390 | |
1391 | if (strcmp(headerline, *bki_lines) != 0) |
1392 | { |
1393 | pg_log_error("input file \"%s\" does not belong to PostgreSQL %s" , |
1394 | bki_file, PG_VERSION); |
1395 | fprintf(stderr, |
1396 | _("Check your installation or specify the correct path " |
1397 | "using the option -L.\n" )); |
1398 | exit(1); |
1399 | } |
1400 | |
1401 | /* Substitute for various symbols used in the BKI file */ |
1402 | |
1403 | sprintf(buf, "%d" , NAMEDATALEN); |
1404 | bki_lines = replace_token(bki_lines, "NAMEDATALEN" , buf); |
1405 | |
1406 | sprintf(buf, "%d" , (int) sizeof(Pointer)); |
1407 | bki_lines = replace_token(bki_lines, "SIZEOF_POINTER" , buf); |
1408 | |
1409 | bki_lines = replace_token(bki_lines, "ALIGNOF_POINTER" , |
1410 | (sizeof(Pointer) == 4) ? "i" : "d" ); |
1411 | |
1412 | bki_lines = replace_token(bki_lines, "FLOAT4PASSBYVAL" , |
1413 | FLOAT4PASSBYVAL ? "true" : "false" ); |
1414 | |
1415 | bki_lines = replace_token(bki_lines, "FLOAT8PASSBYVAL" , |
1416 | FLOAT8PASSBYVAL ? "true" : "false" ); |
1417 | |
1418 | bki_lines = replace_token(bki_lines, "POSTGRES" , |
1419 | escape_quotes_bki(username)); |
1420 | |
1421 | bki_lines = replace_token(bki_lines, "ENCODING" , |
1422 | encodingid_to_string(encodingid)); |
1423 | |
1424 | bki_lines = replace_token(bki_lines, "LC_COLLATE" , |
1425 | escape_quotes_bki(lc_collate)); |
1426 | |
1427 | bki_lines = replace_token(bki_lines, "LC_CTYPE" , |
1428 | escape_quotes_bki(lc_ctype)); |
1429 | |
1430 | /* |
1431 | * Pass correct LC_xxx environment to bootstrap. |
1432 | * |
1433 | * The shell script arranged to restore the LC settings afterwards, but |
1434 | * there doesn't seem to be any compelling reason to do that. |
1435 | */ |
1436 | snprintf(cmd, sizeof(cmd), "LC_COLLATE=%s" , lc_collate); |
1437 | putenv(pg_strdup(cmd)); |
1438 | |
1439 | snprintf(cmd, sizeof(cmd), "LC_CTYPE=%s" , lc_ctype); |
1440 | putenv(pg_strdup(cmd)); |
1441 | |
1442 | unsetenv("LC_ALL" ); |
1443 | |
1444 | /* Also ensure backend isn't confused by this environment var: */ |
1445 | unsetenv("PGCLIENTENCODING" ); |
1446 | |
1447 | snprintf(cmd, sizeof(cmd), |
1448 | "\"%s\" --boot -x1 -X %u %s %s %s" , |
1449 | backend_exec, |
1450 | wal_segment_size_mb * (1024 * 1024), |
1451 | data_checksums ? "-k" : "" , |
1452 | boot_options, |
1453 | debug ? "-d 5" : "" ); |
1454 | |
1455 | |
1456 | PG_CMD_OPEN; |
1457 | |
1458 | for (line = bki_lines; *line != NULL; line++) |
1459 | { |
1460 | PG_CMD_PUTS(*line); |
1461 | free(*line); |
1462 | } |
1463 | |
1464 | PG_CMD_CLOSE; |
1465 | |
1466 | free(bki_lines); |
1467 | |
1468 | check_ok(); |
1469 | } |
1470 | |
1471 | /* |
1472 | * set up the shadow password table |
1473 | */ |
1474 | static void |
1475 | setup_auth(FILE *cmdfd) |
1476 | { |
1477 | const char *const *line; |
1478 | static const char *const pg_authid_setup[] = { |
1479 | /* |
1480 | * The authid table shouldn't be readable except through views, to |
1481 | * ensure passwords are not publicly visible. |
1482 | */ |
1483 | "REVOKE ALL on pg_authid FROM public;\n\n" , |
1484 | NULL |
1485 | }; |
1486 | |
1487 | for (line = pg_authid_setup; *line != NULL; line++) |
1488 | PG_CMD_PUTS(*line); |
1489 | |
1490 | if (superuser_password) |
1491 | PG_CMD_PRINTF2("ALTER USER \"%s\" WITH PASSWORD E'%s';\n\n" , |
1492 | username, escape_quotes(superuser_password)); |
1493 | } |
1494 | |
1495 | /* |
1496 | * get the superuser password if required |
1497 | */ |
1498 | static void |
1499 | get_su_pwd(void) |
1500 | { |
1501 | char pwd1[100]; |
1502 | char pwd2[100]; |
1503 | |
1504 | if (pwprompt) |
1505 | { |
1506 | /* |
1507 | * Read password from terminal |
1508 | */ |
1509 | printf("\n" ); |
1510 | fflush(stdout); |
1511 | simple_prompt("Enter new superuser password: " , pwd1, sizeof(pwd1), false); |
1512 | simple_prompt("Enter it again: " , pwd2, sizeof(pwd2), false); |
1513 | if (strcmp(pwd1, pwd2) != 0) |
1514 | { |
1515 | fprintf(stderr, _("Passwords didn't match.\n" )); |
1516 | exit(1); |
1517 | } |
1518 | } |
1519 | else |
1520 | { |
1521 | /* |
1522 | * Read password from file |
1523 | * |
1524 | * Ideally this should insist that the file not be world-readable. |
1525 | * However, this option is mainly intended for use on Windows where |
1526 | * file permissions may not exist at all, so we'll skip the paranoia |
1527 | * for now. |
1528 | */ |
1529 | FILE *pwf = fopen(pwfilename, "r" ); |
1530 | int i; |
1531 | |
1532 | if (!pwf) |
1533 | { |
1534 | pg_log_error("could not open file \"%s\" for reading: %m" , |
1535 | pwfilename); |
1536 | exit(1); |
1537 | } |
1538 | if (!fgets(pwd1, sizeof(pwd1), pwf)) |
1539 | { |
1540 | if (ferror(pwf)) |
1541 | pg_log_error("could not read password from file \"%s\": %m" , |
1542 | pwfilename); |
1543 | else |
1544 | pg_log_error("password file \"%s\" is empty" , |
1545 | pwfilename); |
1546 | exit(1); |
1547 | } |
1548 | fclose(pwf); |
1549 | |
1550 | i = strlen(pwd1); |
1551 | while (i > 0 && (pwd1[i - 1] == '\r' || pwd1[i - 1] == '\n')) |
1552 | pwd1[--i] = '\0'; |
1553 | } |
1554 | |
1555 | superuser_password = pg_strdup(pwd1); |
1556 | } |
1557 | |
1558 | /* |
1559 | * set up pg_depend |
1560 | */ |
1561 | static void |
1562 | setup_depend(FILE *cmdfd) |
1563 | { |
1564 | const char *const *line; |
1565 | static const char *const pg_depend_setup[] = { |
1566 | /* |
1567 | * Make PIN entries in pg_depend for all objects made so far in the |
1568 | * tables that the dependency code handles. This is overkill (the |
1569 | * system doesn't really depend on having every last weird datatype, |
1570 | * for instance) but generating only the minimum required set of |
1571 | * dependencies seems hard. |
1572 | * |
1573 | * Catalogs that are intentionally not scanned here are: |
1574 | * |
1575 | * pg_database: it's a feature, not a bug, that template1 is not |
1576 | * pinned. |
1577 | * |
1578 | * pg_extension: a pinned extension isn't really an extension, hmm? |
1579 | * |
1580 | * pg_tablespace: tablespaces don't participate in the dependency |
1581 | * code, and DropTableSpace() explicitly protects the built-in |
1582 | * tablespaces. |
1583 | * |
1584 | * First delete any already-made entries; PINs override all else, and |
1585 | * must be the only entries for their objects. |
1586 | */ |
1587 | "DELETE FROM pg_depend;\n\n" , |
1588 | "VACUUM pg_depend;\n\n" , |
1589 | "DELETE FROM pg_shdepend;\n\n" , |
1590 | "VACUUM pg_shdepend;\n\n" , |
1591 | |
1592 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1593 | " FROM pg_class;\n\n" , |
1594 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1595 | " FROM pg_proc;\n\n" , |
1596 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1597 | " FROM pg_type;\n\n" , |
1598 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1599 | " FROM pg_cast;\n\n" , |
1600 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1601 | " FROM pg_constraint;\n\n" , |
1602 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1603 | " FROM pg_conversion;\n\n" , |
1604 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1605 | " FROM pg_attrdef;\n\n" , |
1606 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1607 | " FROM pg_language;\n\n" , |
1608 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1609 | " FROM pg_operator;\n\n" , |
1610 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1611 | " FROM pg_opclass;\n\n" , |
1612 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1613 | " FROM pg_opfamily;\n\n" , |
1614 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1615 | " FROM pg_am;\n\n" , |
1616 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1617 | " FROM pg_amop;\n\n" , |
1618 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1619 | " FROM pg_amproc;\n\n" , |
1620 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1621 | " FROM pg_rewrite;\n\n" , |
1622 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1623 | " FROM pg_trigger;\n\n" , |
1624 | |
1625 | /* |
1626 | * restriction here to avoid pinning the public namespace |
1627 | */ |
1628 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1629 | " FROM pg_namespace " |
1630 | " WHERE nspname LIKE 'pg%';\n\n" , |
1631 | |
1632 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1633 | " FROM pg_ts_parser;\n\n" , |
1634 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1635 | " FROM pg_ts_dict;\n\n" , |
1636 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1637 | " FROM pg_ts_template;\n\n" , |
1638 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1639 | " FROM pg_ts_config;\n\n" , |
1640 | "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " |
1641 | " FROM pg_collation;\n\n" , |
1642 | "INSERT INTO pg_shdepend SELECT 0,0,0,0, tableoid,oid, 'p' " |
1643 | " FROM pg_authid;\n\n" , |
1644 | NULL |
1645 | }; |
1646 | |
1647 | for (line = pg_depend_setup; *line != NULL; line++) |
1648 | PG_CMD_PUTS(*line); |
1649 | } |
1650 | |
1651 | /* |
1652 | * set up system views |
1653 | */ |
1654 | static void |
1655 | setup_sysviews(FILE *cmdfd) |
1656 | { |
1657 | char **line; |
1658 | char **sysviews_setup; |
1659 | |
1660 | sysviews_setup = readfile(system_views_file); |
1661 | |
1662 | for (line = sysviews_setup; *line != NULL; line++) |
1663 | { |
1664 | PG_CMD_PUTS(*line); |
1665 | free(*line); |
1666 | } |
1667 | |
1668 | PG_CMD_PUTS("\n\n" ); |
1669 | |
1670 | free(sysviews_setup); |
1671 | } |
1672 | |
1673 | /* |
1674 | * load description data |
1675 | */ |
1676 | static void |
1677 | setup_description(FILE *cmdfd) |
1678 | { |
1679 | PG_CMD_PUTS("CREATE TEMP TABLE tmp_pg_description ( " |
1680 | " objoid oid, " |
1681 | " classname name, " |
1682 | " objsubid int4, " |
1683 | " description text);\n\n" ); |
1684 | |
1685 | PG_CMD_PRINTF1("COPY tmp_pg_description FROM E'%s';\n\n" , |
1686 | escape_quotes(desc_file)); |
1687 | |
1688 | PG_CMD_PUTS("INSERT INTO pg_description " |
1689 | " SELECT t.objoid, c.oid, t.objsubid, t.description " |
1690 | " FROM tmp_pg_description t, pg_class c " |
1691 | " WHERE c.relname = t.classname;\n\n" ); |
1692 | |
1693 | PG_CMD_PUTS("CREATE TEMP TABLE tmp_pg_shdescription ( " |
1694 | " objoid oid, " |
1695 | " classname name, " |
1696 | " description text);\n\n" ); |
1697 | |
1698 | PG_CMD_PRINTF1("COPY tmp_pg_shdescription FROM E'%s';\n\n" , |
1699 | escape_quotes(shdesc_file)); |
1700 | |
1701 | PG_CMD_PUTS("INSERT INTO pg_shdescription " |
1702 | " SELECT t.objoid, c.oid, t.description " |
1703 | " FROM tmp_pg_shdescription t, pg_class c " |
1704 | " WHERE c.relname = t.classname;\n\n" ); |
1705 | |
1706 | /* Create default descriptions for operator implementation functions */ |
1707 | PG_CMD_PUTS("WITH funcdescs AS ( " |
1708 | "SELECT p.oid as p_oid, o.oid as o_oid, oprname " |
1709 | "FROM pg_proc p JOIN pg_operator o ON oprcode = p.oid ) " |
1710 | "INSERT INTO pg_description " |
1711 | " SELECT p_oid, 'pg_proc'::regclass, 0, " |
1712 | " 'implementation of ' || oprname || ' operator' " |
1713 | " FROM funcdescs " |
1714 | " WHERE NOT EXISTS (SELECT 1 FROM pg_description " |
1715 | " WHERE objoid = p_oid AND classoid = 'pg_proc'::regclass) " |
1716 | " AND NOT EXISTS (SELECT 1 FROM pg_description " |
1717 | " WHERE objoid = o_oid AND classoid = 'pg_operator'::regclass" |
1718 | " AND description LIKE 'deprecated%');\n\n" ); |
1719 | |
1720 | /* |
1721 | * Even though the tables are temp, drop them explicitly so they don't get |
1722 | * copied into template0/postgres databases. |
1723 | */ |
1724 | PG_CMD_PUTS("DROP TABLE tmp_pg_description;\n\n" ); |
1725 | PG_CMD_PUTS("DROP TABLE tmp_pg_shdescription;\n\n" ); |
1726 | } |
1727 | |
1728 | /* |
1729 | * populate pg_collation |
1730 | */ |
1731 | static void |
1732 | setup_collation(FILE *cmdfd) |
1733 | { |
1734 | /* |
1735 | * Add an SQL-standard name. We don't want to pin this, so it doesn't go |
1736 | * in pg_collation.h. But add it before reading system collations, so |
1737 | * that it wins if libc defines a locale named ucs_basic. |
1738 | */ |
1739 | PG_CMD_PRINTF3("INSERT INTO pg_collation (oid, collname, collnamespace, collowner, collprovider, collisdeterministic, collencoding, collcollate, collctype)" |
1740 | "VALUES (pg_nextoid('pg_catalog.pg_collation', 'oid', 'pg_catalog.pg_collation_oid_index'), 'ucs_basic', 'pg_catalog'::regnamespace, %u, '%c', true, %d, 'C', 'C');\n\n" , |
1741 | BOOTSTRAP_SUPERUSERID, COLLPROVIDER_LIBC, PG_UTF8); |
1742 | |
1743 | /* Now import all collations we can find in the operating system */ |
1744 | PG_CMD_PUTS("SELECT pg_import_system_collations('pg_catalog');\n\n" ); |
1745 | } |
1746 | |
1747 | /* |
1748 | * load extra dictionaries (Snowball stemmers) |
1749 | */ |
1750 | static void |
1751 | setup_dictionary(FILE *cmdfd) |
1752 | { |
1753 | char **line; |
1754 | char **conv_lines; |
1755 | |
1756 | conv_lines = readfile(dictionary_file); |
1757 | for (line = conv_lines; *line != NULL; line++) |
1758 | { |
1759 | PG_CMD_PUTS(*line); |
1760 | free(*line); |
1761 | } |
1762 | |
1763 | PG_CMD_PUTS("\n\n" ); |
1764 | |
1765 | free(conv_lines); |
1766 | } |
1767 | |
1768 | /* |
1769 | * Set up privileges |
1770 | * |
1771 | * We mark most system catalogs as world-readable. We don't currently have |
1772 | * to touch functions, languages, or databases, because their default |
1773 | * permissions are OK. |
1774 | * |
1775 | * Some objects may require different permissions by default, so we |
1776 | * make sure we don't overwrite privilege sets that have already been |
1777 | * set (NOT NULL). |
1778 | * |
1779 | * Also populate pg_init_privs to save what the privileges are at init |
1780 | * time. This is used by pg_dump to allow users to change privileges |
1781 | * on catalog objects and to have those privilege changes preserved |
1782 | * across dump/reload and pg_upgrade. |
1783 | * |
1784 | * Note that pg_init_privs is only for per-database objects and therefore |
1785 | * we don't include databases or tablespaces. |
1786 | */ |
1787 | static void |
1788 | setup_privileges(FILE *cmdfd) |
1789 | { |
1790 | char **line; |
1791 | char **priv_lines; |
1792 | static char *privileges_setup[] = { |
1793 | "UPDATE pg_class " |
1794 | " SET relacl = (SELECT array_agg(a.acl) FROM " |
1795 | " (SELECT E'=r/\"$POSTGRES_SUPERUSERNAME\"' as acl " |
1796 | " UNION SELECT unnest(pg_catalog.acldefault(" |
1797 | " CASE WHEN relkind = " CppAsString2(RELKIND_SEQUENCE) " THEN 's' " |
1798 | " ELSE 'r' END::\"char\"," CppAsString2(BOOTSTRAP_SUPERUSERID) "::oid))" |
1799 | " ) as a) " |
1800 | " WHERE relkind IN (" CppAsString2(RELKIND_RELATION) ", " |
1801 | CppAsString2(RELKIND_VIEW) ", " CppAsString2(RELKIND_MATVIEW) ", " |
1802 | CppAsString2(RELKIND_SEQUENCE) ")" |
1803 | " AND relacl IS NULL;\n\n" , |
1804 | "GRANT USAGE ON SCHEMA pg_catalog TO PUBLIC;\n\n" , |
1805 | "GRANT CREATE, USAGE ON SCHEMA public TO PUBLIC;\n\n" , |
1806 | "REVOKE ALL ON pg_largeobject FROM PUBLIC;\n\n" , |
1807 | "INSERT INTO pg_init_privs " |
1808 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1809 | " SELECT" |
1810 | " oid," |
1811 | " (SELECT oid FROM pg_class WHERE relname = 'pg_class')," |
1812 | " 0," |
1813 | " relacl," |
1814 | " 'i'" |
1815 | " FROM" |
1816 | " pg_class" |
1817 | " WHERE" |
1818 | " relacl IS NOT NULL" |
1819 | " AND relkind IN (" CppAsString2(RELKIND_RELATION) ", " |
1820 | CppAsString2(RELKIND_VIEW) ", " CppAsString2(RELKIND_MATVIEW) ", " |
1821 | CppAsString2(RELKIND_SEQUENCE) ");\n\n" , |
1822 | "INSERT INTO pg_init_privs " |
1823 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1824 | " SELECT" |
1825 | " pg_class.oid," |
1826 | " (SELECT oid FROM pg_class WHERE relname = 'pg_class')," |
1827 | " pg_attribute.attnum," |
1828 | " pg_attribute.attacl," |
1829 | " 'i'" |
1830 | " FROM" |
1831 | " pg_class" |
1832 | " JOIN pg_attribute ON (pg_class.oid = pg_attribute.attrelid)" |
1833 | " WHERE" |
1834 | " pg_attribute.attacl IS NOT NULL" |
1835 | " AND pg_class.relkind IN (" CppAsString2(RELKIND_RELATION) ", " |
1836 | CppAsString2(RELKIND_VIEW) ", " CppAsString2(RELKIND_MATVIEW) ", " |
1837 | CppAsString2(RELKIND_SEQUENCE) ");\n\n" , |
1838 | "INSERT INTO pg_init_privs " |
1839 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1840 | " SELECT" |
1841 | " oid," |
1842 | " (SELECT oid FROM pg_class WHERE relname = 'pg_proc')," |
1843 | " 0," |
1844 | " proacl," |
1845 | " 'i'" |
1846 | " FROM" |
1847 | " pg_proc" |
1848 | " WHERE" |
1849 | " proacl IS NOT NULL;\n\n" , |
1850 | "INSERT INTO pg_init_privs " |
1851 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1852 | " SELECT" |
1853 | " oid," |
1854 | " (SELECT oid FROM pg_class WHERE relname = 'pg_type')," |
1855 | " 0," |
1856 | " typacl," |
1857 | " 'i'" |
1858 | " FROM" |
1859 | " pg_type" |
1860 | " WHERE" |
1861 | " typacl IS NOT NULL;\n\n" , |
1862 | "INSERT INTO pg_init_privs " |
1863 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1864 | " SELECT" |
1865 | " oid," |
1866 | " (SELECT oid FROM pg_class WHERE relname = 'pg_language')," |
1867 | " 0," |
1868 | " lanacl," |
1869 | " 'i'" |
1870 | " FROM" |
1871 | " pg_language" |
1872 | " WHERE" |
1873 | " lanacl IS NOT NULL;\n\n" , |
1874 | "INSERT INTO pg_init_privs " |
1875 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1876 | " SELECT" |
1877 | " oid," |
1878 | " (SELECT oid FROM pg_class WHERE " |
1879 | " relname = 'pg_largeobject_metadata')," |
1880 | " 0," |
1881 | " lomacl," |
1882 | " 'i'" |
1883 | " FROM" |
1884 | " pg_largeobject_metadata" |
1885 | " WHERE" |
1886 | " lomacl IS NOT NULL;\n\n" , |
1887 | "INSERT INTO pg_init_privs " |
1888 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1889 | " SELECT" |
1890 | " oid," |
1891 | " (SELECT oid FROM pg_class WHERE relname = 'pg_namespace')," |
1892 | " 0," |
1893 | " nspacl," |
1894 | " 'i'" |
1895 | " FROM" |
1896 | " pg_namespace" |
1897 | " WHERE" |
1898 | " nspacl IS NOT NULL;\n\n" , |
1899 | "INSERT INTO pg_init_privs " |
1900 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1901 | " SELECT" |
1902 | " oid," |
1903 | " (SELECT oid FROM pg_class WHERE " |
1904 | " relname = 'pg_foreign_data_wrapper')," |
1905 | " 0," |
1906 | " fdwacl," |
1907 | " 'i'" |
1908 | " FROM" |
1909 | " pg_foreign_data_wrapper" |
1910 | " WHERE" |
1911 | " fdwacl IS NOT NULL;\n\n" , |
1912 | "INSERT INTO pg_init_privs " |
1913 | " (objoid, classoid, objsubid, initprivs, privtype)" |
1914 | " SELECT" |
1915 | " oid," |
1916 | " (SELECT oid FROM pg_class " |
1917 | " WHERE relname = 'pg_foreign_server')," |
1918 | " 0," |
1919 | " srvacl," |
1920 | " 'i'" |
1921 | " FROM" |
1922 | " pg_foreign_server" |
1923 | " WHERE" |
1924 | " srvacl IS NOT NULL;\n\n" , |
1925 | NULL |
1926 | }; |
1927 | |
1928 | priv_lines = replace_token(privileges_setup, "$POSTGRES_SUPERUSERNAME" , |
1929 | escape_quotes(username)); |
1930 | for (line = priv_lines; *line != NULL; line++) |
1931 | PG_CMD_PUTS(*line); |
1932 | } |
1933 | |
1934 | /* |
1935 | * extract the strange version of version required for information schema |
1936 | * (09.08.0007abc) |
1937 | */ |
1938 | static void |
1939 | set_info_version(void) |
1940 | { |
1941 | char *letterversion; |
1942 | long major = 0, |
1943 | minor = 0, |
1944 | micro = 0; |
1945 | char *endptr; |
1946 | char *vstr = pg_strdup(PG_VERSION); |
1947 | char *ptr; |
1948 | |
1949 | ptr = vstr + (strlen(vstr) - 1); |
1950 | while (ptr != vstr && (*ptr < '0' || *ptr > '9')) |
1951 | ptr--; |
1952 | letterversion = ptr + 1; |
1953 | major = strtol(vstr, &endptr, 10); |
1954 | if (*endptr) |
1955 | minor = strtol(endptr + 1, &endptr, 10); |
1956 | if (*endptr) |
1957 | micro = strtol(endptr + 1, &endptr, 10); |
1958 | snprintf(infoversion, sizeof(infoversion), "%02ld.%02ld.%04ld%s" , |
1959 | major, minor, micro, letterversion); |
1960 | } |
1961 | |
1962 | /* |
1963 | * load info schema and populate from features file |
1964 | */ |
1965 | static void |
1966 | setup_schema(FILE *cmdfd) |
1967 | { |
1968 | char **line; |
1969 | char **lines; |
1970 | |
1971 | lines = readfile(info_schema_file); |
1972 | |
1973 | for (line = lines; *line != NULL; line++) |
1974 | { |
1975 | PG_CMD_PUTS(*line); |
1976 | free(*line); |
1977 | } |
1978 | |
1979 | PG_CMD_PUTS("\n\n" ); |
1980 | |
1981 | free(lines); |
1982 | |
1983 | PG_CMD_PRINTF1("UPDATE information_schema.sql_implementation_info " |
1984 | " SET character_value = '%s' " |
1985 | " WHERE implementation_info_name = 'DBMS VERSION';\n\n" , |
1986 | infoversion); |
1987 | |
1988 | PG_CMD_PRINTF1("COPY information_schema.sql_features " |
1989 | " (feature_id, feature_name, sub_feature_id, " |
1990 | " sub_feature_name, is_supported, comments) " |
1991 | " FROM E'%s';\n\n" , |
1992 | escape_quotes(features_file)); |
1993 | } |
1994 | |
1995 | /* |
1996 | * load PL/pgSQL server-side language |
1997 | */ |
1998 | static void |
1999 | load_plpgsql(FILE *cmdfd) |
2000 | { |
2001 | PG_CMD_PUTS("CREATE EXTENSION plpgsql;\n\n" ); |
2002 | } |
2003 | |
2004 | /* |
2005 | * clean everything up in template1 |
2006 | */ |
2007 | static void |
2008 | vacuum_db(FILE *cmdfd) |
2009 | { |
2010 | /* Run analyze before VACUUM so the statistics are frozen. */ |
2011 | PG_CMD_PUTS("ANALYZE;\n\nVACUUM FREEZE;\n\n" ); |
2012 | } |
2013 | |
2014 | /* |
2015 | * copy template1 to template0 |
2016 | */ |
2017 | static void |
2018 | make_template0(FILE *cmdfd) |
2019 | { |
2020 | const char *const *line; |
2021 | static const char *const template0_setup[] = { |
2022 | "CREATE DATABASE template0 IS_TEMPLATE = true ALLOW_CONNECTIONS = false;\n\n" , |
2023 | |
2024 | /* |
2025 | * We use the OID of template0 to determine lastsysoid |
2026 | */ |
2027 | "UPDATE pg_database SET datlastsysoid = " |
2028 | " (SELECT oid FROM pg_database " |
2029 | " WHERE datname = 'template0');\n\n" , |
2030 | |
2031 | /* |
2032 | * Explicitly revoke public create-schema and create-temp-table |
2033 | * privileges in template1 and template0; else the latter would be on |
2034 | * by default |
2035 | */ |
2036 | "REVOKE CREATE,TEMPORARY ON DATABASE template1 FROM public;\n\n" , |
2037 | "REVOKE CREATE,TEMPORARY ON DATABASE template0 FROM public;\n\n" , |
2038 | |
2039 | "COMMENT ON DATABASE template0 IS 'unmodifiable empty database';\n\n" , |
2040 | |
2041 | /* |
2042 | * Finally vacuum to clean up dead rows in pg_database |
2043 | */ |
2044 | "VACUUM pg_database;\n\n" , |
2045 | NULL |
2046 | }; |
2047 | |
2048 | for (line = template0_setup; *line; line++) |
2049 | PG_CMD_PUTS(*line); |
2050 | } |
2051 | |
2052 | /* |
2053 | * copy template1 to postgres |
2054 | */ |
2055 | static void |
2056 | make_postgres(FILE *cmdfd) |
2057 | { |
2058 | const char *const *line; |
2059 | static const char *const postgres_setup[] = { |
2060 | "CREATE DATABASE postgres;\n\n" , |
2061 | "COMMENT ON DATABASE postgres IS 'default administrative connection database';\n\n" , |
2062 | NULL |
2063 | }; |
2064 | |
2065 | for (line = postgres_setup; *line; line++) |
2066 | PG_CMD_PUTS(*line); |
2067 | } |
2068 | |
2069 | /* |
2070 | * signal handler in case we are interrupted. |
2071 | * |
2072 | * The Windows runtime docs at |
2073 | * http://msdn.microsoft.com/library/en-us/vclib/html/_crt_signal.asp |
2074 | * specifically forbid a number of things being done from a signal handler, |
2075 | * including IO, memory allocation and system calls, and only allow jmpbuf |
2076 | * if you are handling SIGFPE. |
2077 | * |
2078 | * I avoided doing the forbidden things by setting a flag instead of calling |
2079 | * exit() directly. |
2080 | * |
2081 | * Also note the behaviour of Windows with SIGINT, which says this: |
2082 | * Note SIGINT is not supported for any Win32 application, including |
2083 | * Windows 98/Me and Windows NT/2000/XP. When a CTRL+C interrupt occurs, |
2084 | * Win32 operating systems generate a new thread to specifically handle |
2085 | * that interrupt. This can cause a single-thread application such as UNIX, |
2086 | * to become multithreaded, resulting in unexpected behavior. |
2087 | * |
2088 | * I have no idea how to handle this. (Strange they call UNIX an application!) |
2089 | * So this will need some testing on Windows. |
2090 | */ |
2091 | static void |
2092 | trapsig(int signum) |
2093 | { |
2094 | /* handle systems that reset the handler, like Windows (grr) */ |
2095 | pqsignal(signum, trapsig); |
2096 | caught_signal = true; |
2097 | } |
2098 | |
2099 | /* |
2100 | * call exit() if we got a signal, or else output "ok". |
2101 | */ |
2102 | static void |
2103 | check_ok(void) |
2104 | { |
2105 | if (caught_signal) |
2106 | { |
2107 | printf(_("caught signal\n" )); |
2108 | fflush(stdout); |
2109 | exit(1); |
2110 | } |
2111 | else if (output_failed) |
2112 | { |
2113 | printf(_("could not write to child process: %s\n" ), |
2114 | strerror(output_errno)); |
2115 | fflush(stdout); |
2116 | exit(1); |
2117 | } |
2118 | else |
2119 | { |
2120 | /* all seems well */ |
2121 | printf(_("ok\n" )); |
2122 | fflush(stdout); |
2123 | } |
2124 | } |
2125 | |
2126 | /* Hack to suppress a warning about %x from some versions of gcc */ |
2127 | static inline size_t |
2128 | my_strftime(char *s, size_t max, const char *fmt, const struct tm *tm) |
2129 | { |
2130 | return strftime(s, max, fmt, tm); |
2131 | } |
2132 | |
2133 | /* |
2134 | * Determine likely date order from locale |
2135 | */ |
2136 | static int |
2137 | locale_date_order(const char *locale) |
2138 | { |
2139 | struct tm testtime; |
2140 | char buf[128]; |
2141 | char *posD; |
2142 | char *posM; |
2143 | char *posY; |
2144 | char *save; |
2145 | size_t res; |
2146 | int result; |
2147 | |
2148 | result = DATEORDER_MDY; /* default */ |
2149 | |
2150 | save = setlocale(LC_TIME, NULL); |
2151 | if (!save) |
2152 | return result; |
2153 | save = pg_strdup(save); |
2154 | |
2155 | setlocale(LC_TIME, locale); |
2156 | |
2157 | memset(&testtime, 0, sizeof(testtime)); |
2158 | testtime.tm_mday = 22; |
2159 | testtime.tm_mon = 10; /* November, should come out as "11" */ |
2160 | testtime.tm_year = 133; /* 2033 */ |
2161 | |
2162 | res = my_strftime(buf, sizeof(buf), "%x" , &testtime); |
2163 | |
2164 | setlocale(LC_TIME, save); |
2165 | free(save); |
2166 | |
2167 | if (res == 0) |
2168 | return result; |
2169 | |
2170 | posM = strstr(buf, "11" ); |
2171 | posD = strstr(buf, "22" ); |
2172 | posY = strstr(buf, "33" ); |
2173 | |
2174 | if (!posM || !posD || !posY) |
2175 | return result; |
2176 | |
2177 | if (posY < posM && posM < posD) |
2178 | result = DATEORDER_YMD; |
2179 | else if (posD < posM) |
2180 | result = DATEORDER_DMY; |
2181 | else |
2182 | result = DATEORDER_MDY; |
2183 | |
2184 | return result; |
2185 | } |
2186 | |
2187 | /* |
2188 | * Verify that locale name is valid for the locale category. |
2189 | * |
2190 | * If successful, and canonname isn't NULL, a malloc'd copy of the locale's |
2191 | * canonical name is stored there. This is especially useful for figuring out |
2192 | * what locale name "" means (ie, the environment value). (Actually, |
2193 | * it seems that on most implementations that's the only thing it's good for; |
2194 | * we could wish that setlocale gave back a canonically spelled version of |
2195 | * the locale name, but typically it doesn't.) |
2196 | * |
2197 | * this should match the backend's check_locale() function |
2198 | */ |
2199 | static void |
2200 | check_locale_name(int category, const char *locale, char **canonname) |
2201 | { |
2202 | char *save; |
2203 | char *res; |
2204 | |
2205 | if (canonname) |
2206 | *canonname = NULL; /* in case of failure */ |
2207 | |
2208 | save = setlocale(category, NULL); |
2209 | if (!save) |
2210 | { |
2211 | pg_log_error("setlocale() failed" ); |
2212 | exit(1); |
2213 | } |
2214 | |
2215 | /* save may be pointing at a modifiable scratch variable, so copy it. */ |
2216 | save = pg_strdup(save); |
2217 | |
2218 | /* for setlocale() call */ |
2219 | if (!locale) |
2220 | locale = "" ; |
2221 | |
2222 | /* set the locale with setlocale, to see if it accepts it. */ |
2223 | res = setlocale(category, locale); |
2224 | |
2225 | /* save canonical name if requested. */ |
2226 | if (res && canonname) |
2227 | *canonname = pg_strdup(res); |
2228 | |
2229 | /* restore old value. */ |
2230 | if (!setlocale(category, save)) |
2231 | { |
2232 | pg_log_error("failed to restore old locale \"%s\"" , save); |
2233 | exit(1); |
2234 | } |
2235 | free(save); |
2236 | |
2237 | /* complain if locale wasn't valid */ |
2238 | if (res == NULL) |
2239 | { |
2240 | if (*locale) |
2241 | pg_log_error("invalid locale name \"%s\"" , locale); |
2242 | else |
2243 | { |
2244 | /* |
2245 | * If no relevant switch was given on command line, locale is an |
2246 | * empty string, which is not too helpful to report. Presumably |
2247 | * setlocale() found something it did not like in the environment. |
2248 | * Ideally we'd report the bad environment variable, but since |
2249 | * setlocale's behavior is implementation-specific, it's hard to |
2250 | * be sure what it didn't like. Print a safe generic message. |
2251 | */ |
2252 | pg_log_error("invalid locale settings; check LANG and LC_* environment variables" ); |
2253 | } |
2254 | exit(1); |
2255 | } |
2256 | } |
2257 | |
2258 | /* |
2259 | * check if the chosen encoding matches the encoding required by the locale |
2260 | * |
2261 | * this should match the similar check in the backend createdb() function |
2262 | */ |
2263 | static bool |
2264 | check_locale_encoding(const char *locale, int user_enc) |
2265 | { |
2266 | int locale_enc; |
2267 | |
2268 | locale_enc = pg_get_encoding_from_locale(locale, true); |
2269 | |
2270 | /* See notes in createdb() to understand these tests */ |
2271 | if (!(locale_enc == user_enc || |
2272 | locale_enc == PG_SQL_ASCII || |
2273 | locale_enc == -1 || |
2274 | #ifdef WIN32 |
2275 | user_enc == PG_UTF8 || |
2276 | #endif |
2277 | user_enc == PG_SQL_ASCII)) |
2278 | { |
2279 | pg_log_error("encoding mismatch" ); |
2280 | fprintf(stderr, |
2281 | _("The encoding you selected (%s) and the encoding that the\n" |
2282 | "selected locale uses (%s) do not match. This would lead to\n" |
2283 | "misbehavior in various character string processing functions.\n" |
2284 | "Rerun %s and either do not specify an encoding explicitly,\n" |
2285 | "or choose a matching combination.\n" ), |
2286 | pg_encoding_to_char(user_enc), |
2287 | pg_encoding_to_char(locale_enc), |
2288 | progname); |
2289 | return false; |
2290 | } |
2291 | return true; |
2292 | } |
2293 | |
2294 | /* |
2295 | * set up the locale variables |
2296 | * |
2297 | * assumes we have called setlocale(LC_ALL, "") -- see set_pglocale_pgservice |
2298 | */ |
2299 | static void |
2300 | setlocales(void) |
2301 | { |
2302 | char *canonname; |
2303 | |
2304 | /* set empty lc_* values to locale config if set */ |
2305 | |
2306 | if (locale) |
2307 | { |
2308 | if (!lc_ctype) |
2309 | lc_ctype = locale; |
2310 | if (!lc_collate) |
2311 | lc_collate = locale; |
2312 | if (!lc_numeric) |
2313 | lc_numeric = locale; |
2314 | if (!lc_time) |
2315 | lc_time = locale; |
2316 | if (!lc_monetary) |
2317 | lc_monetary = locale; |
2318 | if (!lc_messages) |
2319 | lc_messages = locale; |
2320 | } |
2321 | |
2322 | /* |
2323 | * canonicalize locale names, and obtain any missing values from our |
2324 | * current environment |
2325 | */ |
2326 | |
2327 | check_locale_name(LC_CTYPE, lc_ctype, &canonname); |
2328 | lc_ctype = canonname; |
2329 | check_locale_name(LC_COLLATE, lc_collate, &canonname); |
2330 | lc_collate = canonname; |
2331 | check_locale_name(LC_NUMERIC, lc_numeric, &canonname); |
2332 | lc_numeric = canonname; |
2333 | check_locale_name(LC_TIME, lc_time, &canonname); |
2334 | lc_time = canonname; |
2335 | check_locale_name(LC_MONETARY, lc_monetary, &canonname); |
2336 | lc_monetary = canonname; |
2337 | #if defined(LC_MESSAGES) && !defined(WIN32) |
2338 | check_locale_name(LC_MESSAGES, lc_messages, &canonname); |
2339 | lc_messages = canonname; |
2340 | #else |
2341 | /* when LC_MESSAGES is not available, use the LC_CTYPE setting */ |
2342 | check_locale_name(LC_CTYPE, lc_messages, &canonname); |
2343 | lc_messages = canonname; |
2344 | #endif |
2345 | } |
2346 | |
2347 | /* |
2348 | * print help text |
2349 | */ |
2350 | static void |
2351 | usage(const char *progname) |
2352 | { |
2353 | printf(_("%s initializes a PostgreSQL database cluster.\n\n" ), progname); |
2354 | printf(_("Usage:\n" )); |
2355 | printf(_(" %s [OPTION]... [DATADIR]\n" ), progname); |
2356 | printf(_("\nOptions:\n" )); |
2357 | printf(_(" -A, --auth=METHOD default authentication method for local connections\n" )); |
2358 | printf(_(" --auth-host=METHOD default authentication method for local TCP/IP connections\n" )); |
2359 | printf(_(" --auth-local=METHOD default authentication method for local-socket connections\n" )); |
2360 | printf(_(" [-D, --pgdata=]DATADIR location for this database cluster\n" )); |
2361 | printf(_(" -E, --encoding=ENCODING set default encoding for new databases\n" )); |
2362 | printf(_(" -g, --allow-group-access allow group read/execute on data directory\n" )); |
2363 | printf(_(" --locale=LOCALE set default locale for new databases\n" )); |
2364 | printf(_(" --lc-collate=, --lc-ctype=, --lc-messages=LOCALE\n" |
2365 | " --lc-monetary=, --lc-numeric=, --lc-time=LOCALE\n" |
2366 | " set default locale in the respective category for\n" |
2367 | " new databases (default taken from environment)\n" )); |
2368 | printf(_(" --no-locale equivalent to --locale=C\n" )); |
2369 | printf(_(" --pwfile=FILE read password for the new superuser from file\n" )); |
2370 | printf(_(" -T, --text-search-config=CFG\n" |
2371 | " default text search configuration\n" )); |
2372 | printf(_(" -U, --username=NAME database superuser name\n" )); |
2373 | printf(_(" -W, --pwprompt prompt for a password for the new superuser\n" )); |
2374 | printf(_(" -X, --waldir=WALDIR location for the write-ahead log directory\n" )); |
2375 | printf(_(" --wal-segsize=SIZE size of WAL segments, in megabytes\n" )); |
2376 | printf(_("\nLess commonly used options:\n" )); |
2377 | printf(_(" -d, --debug generate lots of debugging output\n" )); |
2378 | printf(_(" -k, --data-checksums use data page checksums\n" )); |
2379 | printf(_(" -L DIRECTORY where to find the input files\n" )); |
2380 | printf(_(" -n, --no-clean do not clean up after errors\n" )); |
2381 | printf(_(" -N, --no-sync do not wait for changes to be written safely to disk\n" )); |
2382 | printf(_(" -s, --show show internal settings\n" )); |
2383 | printf(_(" -S, --sync-only only sync data directory\n" )); |
2384 | printf(_("\nOther options:\n" )); |
2385 | printf(_(" -V, --version output version information, then exit\n" )); |
2386 | printf(_(" -?, --help show this help, then exit\n" )); |
2387 | printf(_("\nIf the data directory is not specified, the environment variable PGDATA\n" |
2388 | "is used.\n" )); |
2389 | printf(_("\nReport bugs to <pgsql-bugs@lists.postgresql.org>.\n" )); |
2390 | } |
2391 | |
2392 | static void |
2393 | check_authmethod_unspecified(const char **authmethod) |
2394 | { |
2395 | if (*authmethod == NULL) |
2396 | { |
2397 | authwarning = true; |
2398 | *authmethod = "trust" ; |
2399 | } |
2400 | } |
2401 | |
2402 | static void |
2403 | check_authmethod_valid(const char *authmethod, const char *const *valid_methods, const char *conntype) |
2404 | { |
2405 | const char *const *p; |
2406 | |
2407 | for (p = valid_methods; *p; p++) |
2408 | { |
2409 | if (strcmp(authmethod, *p) == 0) |
2410 | return; |
2411 | /* with space = param */ |
2412 | if (strchr(authmethod, ' ')) |
2413 | if (strncmp(authmethod, *p, (authmethod - strchr(authmethod, ' '))) == 0) |
2414 | return; |
2415 | } |
2416 | |
2417 | pg_log_error("invalid authentication method \"%s\" for \"%s\" connections" , |
2418 | authmethod, conntype); |
2419 | exit(1); |
2420 | } |
2421 | |
2422 | static void |
2423 | check_need_password(const char *authmethodlocal, const char *authmethodhost) |
2424 | { |
2425 | if ((strcmp(authmethodlocal, "md5" ) == 0 || |
2426 | strcmp(authmethodlocal, "password" ) == 0 || |
2427 | strcmp(authmethodlocal, "scram-sha-256" ) == 0) && |
2428 | (strcmp(authmethodhost, "md5" ) == 0 || |
2429 | strcmp(authmethodhost, "password" ) == 0 || |
2430 | strcmp(authmethodhost, "scram-sha-256" ) == 0) && |
2431 | !(pwprompt || pwfilename)) |
2432 | { |
2433 | pg_log_error("must specify a password for the superuser to enable %s authentication" , |
2434 | (strcmp(authmethodlocal, "md5" ) == 0 || |
2435 | strcmp(authmethodlocal, "password" ) == 0 || |
2436 | strcmp(authmethodlocal, "scram-sha-256" ) == 0) |
2437 | ? authmethodlocal |
2438 | : authmethodhost); |
2439 | exit(1); |
2440 | } |
2441 | } |
2442 | |
2443 | |
2444 | void |
2445 | setup_pgdata(void) |
2446 | { |
2447 | char *pgdata_get_env, |
2448 | *pgdata_set_env; |
2449 | |
2450 | if (!pg_data) |
2451 | { |
2452 | pgdata_get_env = getenv("PGDATA" ); |
2453 | if (pgdata_get_env && strlen(pgdata_get_env)) |
2454 | { |
2455 | /* PGDATA found */ |
2456 | pg_data = pg_strdup(pgdata_get_env); |
2457 | } |
2458 | else |
2459 | { |
2460 | pg_log_error("no data directory specified" ); |
2461 | fprintf(stderr, |
2462 | _("You must identify the directory where the data for this database system\n" |
2463 | "will reside. Do this with either the invocation option -D or the\n" |
2464 | "environment variable PGDATA.\n" )); |
2465 | exit(1); |
2466 | } |
2467 | } |
2468 | |
2469 | pgdata_native = pg_strdup(pg_data); |
2470 | canonicalize_path(pg_data); |
2471 | |
2472 | /* |
2473 | * we have to set PGDATA for postgres rather than pass it on the command |
2474 | * line to avoid dumb quoting problems on Windows, and we would especially |
2475 | * need quotes otherwise on Windows because paths there are most likely to |
2476 | * have embedded spaces. |
2477 | */ |
2478 | pgdata_set_env = psprintf("PGDATA=%s" , pg_data); |
2479 | putenv(pgdata_set_env); |
2480 | } |
2481 | |
2482 | |
2483 | void |
2484 | setup_bin_paths(const char *argv0) |
2485 | { |
2486 | int ret; |
2487 | |
2488 | if ((ret = find_other_exec(argv0, "postgres" , PG_BACKEND_VERSIONSTR, |
2489 | backend_exec)) < 0) |
2490 | { |
2491 | char full_path[MAXPGPATH]; |
2492 | |
2493 | if (find_my_exec(argv0, full_path) < 0) |
2494 | strlcpy(full_path, progname, sizeof(full_path)); |
2495 | |
2496 | if (ret == -1) |
2497 | pg_log_error("The program \"postgres\" is needed by %s but was not found in the\n" |
2498 | "same directory as \"%s\".\n" |
2499 | "Check your installation." , |
2500 | progname, full_path); |
2501 | else |
2502 | pg_log_error("The program \"postgres\" was found by \"%s\"\n" |
2503 | "but was not the same version as %s.\n" |
2504 | "Check your installation." , |
2505 | full_path, progname); |
2506 | exit(1); |
2507 | } |
2508 | |
2509 | /* store binary directory */ |
2510 | strcpy(bin_path, backend_exec); |
2511 | *last_dir_separator(bin_path) = '\0'; |
2512 | canonicalize_path(bin_path); |
2513 | |
2514 | if (!share_path) |
2515 | { |
2516 | share_path = pg_malloc(MAXPGPATH); |
2517 | get_share_path(backend_exec, share_path); |
2518 | } |
2519 | else if (!is_absolute_path(share_path)) |
2520 | { |
2521 | pg_log_error("input file location must be an absolute path" ); |
2522 | exit(1); |
2523 | } |
2524 | |
2525 | canonicalize_path(share_path); |
2526 | } |
2527 | |
2528 | void |
2529 | setup_locale_encoding(void) |
2530 | { |
2531 | setlocales(); |
2532 | |
2533 | if (strcmp(lc_ctype, lc_collate) == 0 && |
2534 | strcmp(lc_ctype, lc_time) == 0 && |
2535 | strcmp(lc_ctype, lc_numeric) == 0 && |
2536 | strcmp(lc_ctype, lc_monetary) == 0 && |
2537 | strcmp(lc_ctype, lc_messages) == 0) |
2538 | printf(_("The database cluster will be initialized with locale \"%s\".\n" ), lc_ctype); |
2539 | else |
2540 | { |
2541 | printf(_("The database cluster will be initialized with locales\n" |
2542 | " COLLATE: %s\n" |
2543 | " CTYPE: %s\n" |
2544 | " MESSAGES: %s\n" |
2545 | " MONETARY: %s\n" |
2546 | " NUMERIC: %s\n" |
2547 | " TIME: %s\n" ), |
2548 | lc_collate, |
2549 | lc_ctype, |
2550 | lc_messages, |
2551 | lc_monetary, |
2552 | lc_numeric, |
2553 | lc_time); |
2554 | } |
2555 | |
2556 | if (!encoding) |
2557 | { |
2558 | int ctype_enc; |
2559 | |
2560 | ctype_enc = pg_get_encoding_from_locale(lc_ctype, true); |
2561 | |
2562 | if (ctype_enc == -1) |
2563 | { |
2564 | /* Couldn't recognize the locale's codeset */ |
2565 | pg_log_error("could not find suitable encoding for locale \"%s\"" , |
2566 | lc_ctype); |
2567 | fprintf(stderr, _("Rerun %s with the -E option.\n" ), progname); |
2568 | fprintf(stderr, _("Try \"%s --help\" for more information.\n" ), |
2569 | progname); |
2570 | exit(1); |
2571 | } |
2572 | else if (!pg_valid_server_encoding_id(ctype_enc)) |
2573 | { |
2574 | /* |
2575 | * We recognized it, but it's not a legal server encoding. On |
2576 | * Windows, UTF-8 works with any locale, so we can fall back to |
2577 | * UTF-8. |
2578 | */ |
2579 | #ifdef WIN32 |
2580 | encodingid = PG_UTF8; |
2581 | printf(_("Encoding \"%s\" implied by locale is not allowed as a server-side encoding.\n" |
2582 | "The default database encoding will be set to \"%s\" instead.\n" ), |
2583 | pg_encoding_to_char(ctype_enc), |
2584 | pg_encoding_to_char(encodingid)); |
2585 | #else |
2586 | pg_log_error("locale \"%s\" requires unsupported encoding \"%s\"" , |
2587 | lc_ctype, pg_encoding_to_char(ctype_enc)); |
2588 | fprintf(stderr, |
2589 | _("Encoding \"%s\" is not allowed as a server-side encoding.\n" |
2590 | "Rerun %s with a different locale selection.\n" ), |
2591 | pg_encoding_to_char(ctype_enc), progname); |
2592 | exit(1); |
2593 | #endif |
2594 | } |
2595 | else |
2596 | { |
2597 | encodingid = ctype_enc; |
2598 | printf(_("The default database encoding has accordingly been set to \"%s\".\n" ), |
2599 | pg_encoding_to_char(encodingid)); |
2600 | } |
2601 | } |
2602 | else |
2603 | encodingid = get_encoding_id(encoding); |
2604 | |
2605 | if (!check_locale_encoding(lc_ctype, encodingid) || |
2606 | !check_locale_encoding(lc_collate, encodingid)) |
2607 | exit(1); /* check_locale_encoding printed the error */ |
2608 | |
2609 | } |
2610 | |
2611 | |
2612 | void |
2613 | setup_data_file_paths(void) |
2614 | { |
2615 | set_input(&bki_file, "postgres.bki" ); |
2616 | set_input(&desc_file, "postgres.description" ); |
2617 | set_input(&shdesc_file, "postgres.shdescription" ); |
2618 | set_input(&hba_file, "pg_hba.conf.sample" ); |
2619 | set_input(&ident_file, "pg_ident.conf.sample" ); |
2620 | set_input(&conf_file, "postgresql.conf.sample" ); |
2621 | set_input(&dictionary_file, "snowball_create.sql" ); |
2622 | set_input(&info_schema_file, "information_schema.sql" ); |
2623 | set_input(&features_file, "sql_features.txt" ); |
2624 | set_input(&system_views_file, "system_views.sql" ); |
2625 | |
2626 | if (show_setting || debug) |
2627 | { |
2628 | fprintf(stderr, |
2629 | "VERSION=%s\n" |
2630 | "PGDATA=%s\nshare_path=%s\nPGPATH=%s\n" |
2631 | "POSTGRES_SUPERUSERNAME=%s\nPOSTGRES_BKI=%s\n" |
2632 | "POSTGRES_DESCR=%s\nPOSTGRES_SHDESCR=%s\n" |
2633 | "POSTGRESQL_CONF_SAMPLE=%s\n" |
2634 | "PG_HBA_SAMPLE=%s\nPG_IDENT_SAMPLE=%s\n" , |
2635 | PG_VERSION, |
2636 | pg_data, share_path, bin_path, |
2637 | username, bki_file, |
2638 | desc_file, shdesc_file, |
2639 | conf_file, |
2640 | hba_file, ident_file); |
2641 | if (show_setting) |
2642 | exit(0); |
2643 | } |
2644 | |
2645 | check_input(bki_file); |
2646 | check_input(desc_file); |
2647 | check_input(shdesc_file); |
2648 | check_input(hba_file); |
2649 | check_input(ident_file); |
2650 | check_input(conf_file); |
2651 | check_input(dictionary_file); |
2652 | check_input(info_schema_file); |
2653 | check_input(features_file); |
2654 | check_input(system_views_file); |
2655 | } |
2656 | |
2657 | |
2658 | void |
2659 | setup_text_search(void) |
2660 | { |
2661 | if (!default_text_search_config) |
2662 | { |
2663 | default_text_search_config = find_matching_ts_config(lc_ctype); |
2664 | if (!default_text_search_config) |
2665 | { |
2666 | pg_log_info("could not find suitable text search configuration for locale \"%s\"" , |
2667 | lc_ctype); |
2668 | default_text_search_config = "simple" ; |
2669 | } |
2670 | } |
2671 | else |
2672 | { |
2673 | const char *checkmatch = find_matching_ts_config(lc_ctype); |
2674 | |
2675 | if (checkmatch == NULL) |
2676 | { |
2677 | pg_log_warning("suitable text search configuration for locale \"%s\" is unknown" , |
2678 | lc_ctype); |
2679 | } |
2680 | else if (strcmp(checkmatch, default_text_search_config) != 0) |
2681 | { |
2682 | pg_log_warning("specified text search configuration \"%s\" might not match locale \"%s\"" , |
2683 | default_text_search_config, lc_ctype); |
2684 | } |
2685 | } |
2686 | |
2687 | printf(_("The default text search configuration will be set to \"%s\".\n" ), |
2688 | default_text_search_config); |
2689 | |
2690 | } |
2691 | |
2692 | |
2693 | void |
2694 | setup_signals(void) |
2695 | { |
2696 | /* some of these are not valid on Windows */ |
2697 | #ifdef SIGHUP |
2698 | pqsignal(SIGHUP, trapsig); |
2699 | #endif |
2700 | #ifdef SIGINT |
2701 | pqsignal(SIGINT, trapsig); |
2702 | #endif |
2703 | #ifdef SIGQUIT |
2704 | pqsignal(SIGQUIT, trapsig); |
2705 | #endif |
2706 | #ifdef SIGTERM |
2707 | pqsignal(SIGTERM, trapsig); |
2708 | #endif |
2709 | |
2710 | /* Ignore SIGPIPE when writing to backend, so we can clean up */ |
2711 | #ifdef SIGPIPE |
2712 | pqsignal(SIGPIPE, SIG_IGN); |
2713 | #endif |
2714 | |
2715 | /* Prevent SIGSYS so we can probe for kernel calls that might not work */ |
2716 | #ifdef SIGSYS |
2717 | pqsignal(SIGSYS, SIG_IGN); |
2718 | #endif |
2719 | } |
2720 | |
2721 | |
2722 | void |
2723 | create_data_directory(void) |
2724 | { |
2725 | int ret; |
2726 | |
2727 | switch ((ret = pg_check_dir(pg_data))) |
2728 | { |
2729 | case 0: |
2730 | /* PGDATA not there, must create it */ |
2731 | printf(_("creating directory %s ... " ), |
2732 | pg_data); |
2733 | fflush(stdout); |
2734 | |
2735 | if (pg_mkdir_p(pg_data, pg_dir_create_mode) != 0) |
2736 | { |
2737 | pg_log_error("could not create directory \"%s\": %m" , pg_data); |
2738 | exit(1); |
2739 | } |
2740 | else |
2741 | check_ok(); |
2742 | |
2743 | made_new_pgdata = true; |
2744 | break; |
2745 | |
2746 | case 1: |
2747 | /* Present but empty, fix permissions and use it */ |
2748 | printf(_("fixing permissions on existing directory %s ... " ), |
2749 | pg_data); |
2750 | fflush(stdout); |
2751 | |
2752 | if (chmod(pg_data, pg_dir_create_mode) != 0) |
2753 | { |
2754 | pg_log_error("could not change permissions of directory \"%s\": %m" , |
2755 | pg_data); |
2756 | exit(1); |
2757 | } |
2758 | else |
2759 | check_ok(); |
2760 | |
2761 | found_existing_pgdata = true; |
2762 | break; |
2763 | |
2764 | case 2: |
2765 | case 3: |
2766 | case 4: |
2767 | /* Present and not empty */ |
2768 | pg_log_error("directory \"%s\" exists but is not empty" , pg_data); |
2769 | if (ret != 4) |
2770 | warn_on_mount_point(ret); |
2771 | else |
2772 | fprintf(stderr, |
2773 | _("If you want to create a new database system, either remove or empty\n" |
2774 | "the directory \"%s\" or run %s\n" |
2775 | "with an argument other than \"%s\".\n" ), |
2776 | pg_data, progname, pg_data); |
2777 | exit(1); /* no further message needed */ |
2778 | |
2779 | default: |
2780 | /* Trouble accessing directory */ |
2781 | pg_log_error("could not access directory \"%s\": %m" , pg_data); |
2782 | exit(1); |
2783 | } |
2784 | } |
2785 | |
2786 | |
2787 | /* Create WAL directory, and symlink if required */ |
2788 | void |
2789 | create_xlog_or_symlink(void) |
2790 | { |
2791 | char *subdirloc; |
2792 | |
2793 | /* form name of the place for the subdirectory or symlink */ |
2794 | subdirloc = psprintf("%s/pg_wal" , pg_data); |
2795 | |
2796 | if (xlog_dir) |
2797 | { |
2798 | int ret; |
2799 | |
2800 | /* clean up xlog directory name, check it's absolute */ |
2801 | canonicalize_path(xlog_dir); |
2802 | if (!is_absolute_path(xlog_dir)) |
2803 | { |
2804 | pg_log_error("WAL directory location must be an absolute path" ); |
2805 | exit(1); |
2806 | } |
2807 | |
2808 | /* check if the specified xlog directory exists/is empty */ |
2809 | switch ((ret = pg_check_dir(xlog_dir))) |
2810 | { |
2811 | case 0: |
2812 | /* xlog directory not there, must create it */ |
2813 | printf(_("creating directory %s ... " ), |
2814 | xlog_dir); |
2815 | fflush(stdout); |
2816 | |
2817 | if (pg_mkdir_p(xlog_dir, pg_dir_create_mode) != 0) |
2818 | { |
2819 | pg_log_error("could not create directory \"%s\": %m" , |
2820 | xlog_dir); |
2821 | exit(1); |
2822 | } |
2823 | else |
2824 | check_ok(); |
2825 | |
2826 | made_new_xlogdir = true; |
2827 | break; |
2828 | |
2829 | case 1: |
2830 | /* Present but empty, fix permissions and use it */ |
2831 | printf(_("fixing permissions on existing directory %s ... " ), |
2832 | xlog_dir); |
2833 | fflush(stdout); |
2834 | |
2835 | if (chmod(xlog_dir, pg_dir_create_mode) != 0) |
2836 | { |
2837 | pg_log_error("could not change permissions of directory \"%s\": %m" , |
2838 | xlog_dir); |
2839 | exit(1); |
2840 | } |
2841 | else |
2842 | check_ok(); |
2843 | |
2844 | found_existing_xlogdir = true; |
2845 | break; |
2846 | |
2847 | case 2: |
2848 | case 3: |
2849 | case 4: |
2850 | /* Present and not empty */ |
2851 | pg_log_error("directory \"%s\" exists but is not empty" , xlog_dir); |
2852 | if (ret != 4) |
2853 | warn_on_mount_point(ret); |
2854 | else |
2855 | fprintf(stderr, |
2856 | _("If you want to store the WAL there, either remove or empty the directory\n" |
2857 | "\"%s\".\n" ), |
2858 | xlog_dir); |
2859 | exit(1); |
2860 | |
2861 | default: |
2862 | /* Trouble accessing directory */ |
2863 | pg_log_error("could not access directory \"%s\": %m" , xlog_dir); |
2864 | exit(1); |
2865 | } |
2866 | |
2867 | #ifdef HAVE_SYMLINK |
2868 | if (symlink(xlog_dir, subdirloc) != 0) |
2869 | { |
2870 | pg_log_error("could not create symbolic link \"%s\": %m" , |
2871 | subdirloc); |
2872 | exit(1); |
2873 | } |
2874 | #else |
2875 | pg_log_error("symlinks are not supported on this platform" ); |
2876 | exit(1); |
2877 | #endif |
2878 | } |
2879 | else |
2880 | { |
2881 | /* Without -X option, just make the subdirectory normally */ |
2882 | if (mkdir(subdirloc, pg_dir_create_mode) < 0) |
2883 | { |
2884 | pg_log_error("could not create directory \"%s\": %m" , |
2885 | subdirloc); |
2886 | exit(1); |
2887 | } |
2888 | } |
2889 | |
2890 | free(subdirloc); |
2891 | } |
2892 | |
2893 | |
2894 | void |
2895 | warn_on_mount_point(int error) |
2896 | { |
2897 | if (error == 2) |
2898 | fprintf(stderr, |
2899 | _("It contains a dot-prefixed/invisible file, perhaps due to it being a mount point.\n" )); |
2900 | else if (error == 3) |
2901 | fprintf(stderr, |
2902 | _("It contains a lost+found directory, perhaps due to it being a mount point.\n" )); |
2903 | |
2904 | fprintf(stderr, |
2905 | _("Using a mount point directly as the data directory is not recommended.\n" |
2906 | "Create a subdirectory under the mount point.\n" )); |
2907 | } |
2908 | |
2909 | |
2910 | void |
2911 | initialize_data_directory(void) |
2912 | { |
2913 | PG_CMD_DECL; |
2914 | int i; |
2915 | |
2916 | setup_signals(); |
2917 | |
2918 | /* |
2919 | * Set mask based on requested PGDATA permissions. pg_mode_mask, and |
2920 | * friends like pg_dir_create_mode, are set to owner-only by default and |
2921 | * then updated if -g is passed in by calling SetDataDirectoryCreatePerm() |
2922 | * when parsing our options (see above). |
2923 | */ |
2924 | umask(pg_mode_mask); |
2925 | |
2926 | create_data_directory(); |
2927 | |
2928 | create_xlog_or_symlink(); |
2929 | |
2930 | /* Create required subdirectories (other than pg_wal) */ |
2931 | printf(_("creating subdirectories ... " )); |
2932 | fflush(stdout); |
2933 | |
2934 | for (i = 0; i < lengthof(subdirs); i++) |
2935 | { |
2936 | char *path; |
2937 | |
2938 | path = psprintf("%s/%s" , pg_data, subdirs[i]); |
2939 | |
2940 | /* |
2941 | * The parent directory already exists, so we only need mkdir() not |
2942 | * pg_mkdir_p() here, which avoids some failure modes; cf bug #13853. |
2943 | */ |
2944 | if (mkdir(path, pg_dir_create_mode) < 0) |
2945 | { |
2946 | pg_log_error("could not create directory \"%s\": %m" , path); |
2947 | exit(1); |
2948 | } |
2949 | |
2950 | free(path); |
2951 | } |
2952 | |
2953 | check_ok(); |
2954 | |
2955 | /* Top level PG_VERSION is checked by bootstrapper, so make it first */ |
2956 | write_version_file(NULL); |
2957 | |
2958 | /* Select suitable configuration settings */ |
2959 | set_null_conf(); |
2960 | test_config_settings(); |
2961 | |
2962 | /* Now create all the text config files */ |
2963 | setup_config(); |
2964 | |
2965 | /* Bootstrap template1 */ |
2966 | bootstrap_template1(); |
2967 | |
2968 | /* |
2969 | * Make the per-database PG_VERSION for template1 only after init'ing it |
2970 | */ |
2971 | write_version_file("base/1" ); |
2972 | |
2973 | /* |
2974 | * Create the stuff we don't need to use bootstrap mode for, using a |
2975 | * backend running in simple standalone mode. |
2976 | */ |
2977 | fputs(_("performing post-bootstrap initialization ... " ), stdout); |
2978 | fflush(stdout); |
2979 | |
2980 | snprintf(cmd, sizeof(cmd), |
2981 | "\"%s\" %s template1 >%s" , |
2982 | backend_exec, backend_options, |
2983 | DEVNULL); |
2984 | |
2985 | PG_CMD_OPEN; |
2986 | |
2987 | setup_auth(cmdfd); |
2988 | |
2989 | setup_depend(cmdfd); |
2990 | |
2991 | /* |
2992 | * Note that no objects created after setup_depend() will be "pinned". |
2993 | * They are all droppable at the whim of the DBA. |
2994 | */ |
2995 | |
2996 | setup_sysviews(cmdfd); |
2997 | |
2998 | setup_description(cmdfd); |
2999 | |
3000 | setup_collation(cmdfd); |
3001 | |
3002 | setup_dictionary(cmdfd); |
3003 | |
3004 | setup_privileges(cmdfd); |
3005 | |
3006 | setup_schema(cmdfd); |
3007 | |
3008 | load_plpgsql(cmdfd); |
3009 | |
3010 | vacuum_db(cmdfd); |
3011 | |
3012 | make_template0(cmdfd); |
3013 | |
3014 | make_postgres(cmdfd); |
3015 | |
3016 | PG_CMD_CLOSE; |
3017 | |
3018 | check_ok(); |
3019 | } |
3020 | |
3021 | |
3022 | int |
3023 | main(int argc, char *argv[]) |
3024 | { |
3025 | static struct option long_options[] = { |
3026 | {"pgdata" , required_argument, NULL, 'D'}, |
3027 | {"encoding" , required_argument, NULL, 'E'}, |
3028 | {"locale" , required_argument, NULL, 1}, |
3029 | {"lc-collate" , required_argument, NULL, 2}, |
3030 | {"lc-ctype" , required_argument, NULL, 3}, |
3031 | {"lc-monetary" , required_argument, NULL, 4}, |
3032 | {"lc-numeric" , required_argument, NULL, 5}, |
3033 | {"lc-time" , required_argument, NULL, 6}, |
3034 | {"lc-messages" , required_argument, NULL, 7}, |
3035 | {"no-locale" , no_argument, NULL, 8}, |
3036 | {"text-search-config" , required_argument, NULL, 'T'}, |
3037 | {"auth" , required_argument, NULL, 'A'}, |
3038 | {"auth-local" , required_argument, NULL, 10}, |
3039 | {"auth-host" , required_argument, NULL, 11}, |
3040 | {"pwprompt" , no_argument, NULL, 'W'}, |
3041 | {"pwfile" , required_argument, NULL, 9}, |
3042 | {"username" , required_argument, NULL, 'U'}, |
3043 | {"help" , no_argument, NULL, '?'}, |
3044 | {"version" , no_argument, NULL, 'V'}, |
3045 | {"debug" , no_argument, NULL, 'd'}, |
3046 | {"show" , no_argument, NULL, 's'}, |
3047 | {"noclean" , no_argument, NULL, 'n'}, /* for backwards compatibility */ |
3048 | {"no-clean" , no_argument, NULL, 'n'}, |
3049 | {"nosync" , no_argument, NULL, 'N'}, /* for backwards compatibility */ |
3050 | {"no-sync" , no_argument, NULL, 'N'}, |
3051 | {"sync-only" , no_argument, NULL, 'S'}, |
3052 | {"waldir" , required_argument, NULL, 'X'}, |
3053 | {"wal-segsize" , required_argument, NULL, 12}, |
3054 | {"data-checksums" , no_argument, NULL, 'k'}, |
3055 | {"allow-group-access" , no_argument, NULL, 'g'}, |
3056 | {NULL, 0, NULL, 0} |
3057 | }; |
3058 | |
3059 | /* |
3060 | * options with no short version return a low integer, the rest return |
3061 | * their short version value |
3062 | */ |
3063 | int c; |
3064 | int option_index; |
3065 | char *effective_user; |
3066 | PQExpBuffer start_db_cmd; |
3067 | char pg_ctl_path[MAXPGPATH]; |
3068 | |
3069 | /* |
3070 | * Ensure that buffering behavior of stdout matches what it is in |
3071 | * interactive usage (at least on most platforms). This prevents |
3072 | * unexpected output ordering when, eg, output is redirected to a file. |
3073 | * POSIX says we must do this before any other usage of these files. |
3074 | */ |
3075 | setvbuf(stdout, NULL, PG_IOLBF, 0); |
3076 | |
3077 | pg_logging_init(argv[0]); |
3078 | progname = get_progname(argv[0]); |
3079 | set_pglocale_pgservice(argv[0], PG_TEXTDOMAIN("initdb" )); |
3080 | |
3081 | if (argc > 1) |
3082 | { |
3083 | if (strcmp(argv[1], "--help" ) == 0 || strcmp(argv[1], "-?" ) == 0) |
3084 | { |
3085 | usage(progname); |
3086 | exit(0); |
3087 | } |
3088 | if (strcmp(argv[1], "--version" ) == 0 || strcmp(argv[1], "-V" ) == 0) |
3089 | { |
3090 | puts("initdb (PostgreSQL) " PG_VERSION); |
3091 | exit(0); |
3092 | } |
3093 | } |
3094 | |
3095 | /* process command-line options */ |
3096 | |
3097 | while ((c = getopt_long(argc, argv, "dD:E:kL:nNU:WA:sST:X:g" , long_options, &option_index)) != -1) |
3098 | { |
3099 | switch (c) |
3100 | { |
3101 | case 'A': |
3102 | authmethodlocal = authmethodhost = pg_strdup(optarg); |
3103 | |
3104 | /* |
3105 | * When ident is specified, use peer for local connections. |
3106 | * Mirrored, when peer is specified, use ident for TCP/IP |
3107 | * connections. |
3108 | */ |
3109 | if (strcmp(authmethodhost, "ident" ) == 0) |
3110 | authmethodlocal = "peer" ; |
3111 | else if (strcmp(authmethodlocal, "peer" ) == 0) |
3112 | authmethodhost = "ident" ; |
3113 | break; |
3114 | case 10: |
3115 | authmethodlocal = pg_strdup(optarg); |
3116 | break; |
3117 | case 11: |
3118 | authmethodhost = pg_strdup(optarg); |
3119 | break; |
3120 | case 'D': |
3121 | pg_data = pg_strdup(optarg); |
3122 | break; |
3123 | case 'E': |
3124 | encoding = pg_strdup(optarg); |
3125 | break; |
3126 | case 'W': |
3127 | pwprompt = true; |
3128 | break; |
3129 | case 'U': |
3130 | username = pg_strdup(optarg); |
3131 | break; |
3132 | case 'd': |
3133 | debug = true; |
3134 | printf(_("Running in debug mode.\n" )); |
3135 | break; |
3136 | case 'n': |
3137 | noclean = true; |
3138 | printf(_("Running in no-clean mode. Mistakes will not be cleaned up.\n" )); |
3139 | break; |
3140 | case 'N': |
3141 | do_sync = false; |
3142 | break; |
3143 | case 'S': |
3144 | sync_only = true; |
3145 | break; |
3146 | case 'k': |
3147 | data_checksums = true; |
3148 | break; |
3149 | case 'L': |
3150 | share_path = pg_strdup(optarg); |
3151 | break; |
3152 | case 1: |
3153 | locale = pg_strdup(optarg); |
3154 | break; |
3155 | case 2: |
3156 | lc_collate = pg_strdup(optarg); |
3157 | break; |
3158 | case 3: |
3159 | lc_ctype = pg_strdup(optarg); |
3160 | break; |
3161 | case 4: |
3162 | lc_monetary = pg_strdup(optarg); |
3163 | break; |
3164 | case 5: |
3165 | lc_numeric = pg_strdup(optarg); |
3166 | break; |
3167 | case 6: |
3168 | lc_time = pg_strdup(optarg); |
3169 | break; |
3170 | case 7: |
3171 | lc_messages = pg_strdup(optarg); |
3172 | break; |
3173 | case 8: |
3174 | locale = "C" ; |
3175 | break; |
3176 | case 9: |
3177 | pwfilename = pg_strdup(optarg); |
3178 | break; |
3179 | case 's': |
3180 | show_setting = true; |
3181 | break; |
3182 | case 'T': |
3183 | default_text_search_config = pg_strdup(optarg); |
3184 | break; |
3185 | case 'X': |
3186 | xlog_dir = pg_strdup(optarg); |
3187 | break; |
3188 | case 12: |
3189 | str_wal_segment_size_mb = pg_strdup(optarg); |
3190 | break; |
3191 | case 'g': |
3192 | SetDataDirectoryCreatePerm(PG_DIR_MODE_GROUP); |
3193 | break; |
3194 | default: |
3195 | /* getopt_long already emitted a complaint */ |
3196 | fprintf(stderr, _("Try \"%s --help\" for more information.\n" ), |
3197 | progname); |
3198 | exit(1); |
3199 | } |
3200 | } |
3201 | |
3202 | |
3203 | /* |
3204 | * Non-option argument specifies data directory as long as it wasn't |
3205 | * already specified with -D / --pgdata |
3206 | */ |
3207 | if (optind < argc && !pg_data) |
3208 | { |
3209 | pg_data = pg_strdup(argv[optind]); |
3210 | optind++; |
3211 | } |
3212 | |
3213 | if (optind < argc) |
3214 | { |
3215 | pg_log_error("too many command-line arguments (first is \"%s\")" , |
3216 | argv[optind]); |
3217 | fprintf(stderr, _("Try \"%s --help\" for more information.\n" ), |
3218 | progname); |
3219 | exit(1); |
3220 | } |
3221 | |
3222 | atexit(cleanup_directories_atexit); |
3223 | |
3224 | /* If we only need to fsync, just do it and exit */ |
3225 | if (sync_only) |
3226 | { |
3227 | setup_pgdata(); |
3228 | |
3229 | /* must check that directory is readable */ |
3230 | if (pg_check_dir(pg_data) <= 0) |
3231 | { |
3232 | pg_log_error("could not access directory \"%s\": %m" , pg_data); |
3233 | exit(1); |
3234 | } |
3235 | |
3236 | fputs(_("syncing data to disk ... " ), stdout); |
3237 | fflush(stdout); |
3238 | fsync_pgdata(pg_data, PG_VERSION_NUM); |
3239 | check_ok(); |
3240 | return 0; |
3241 | } |
3242 | |
3243 | if (pwprompt && pwfilename) |
3244 | { |
3245 | pg_log_error("password prompt and password file cannot be specified together" ); |
3246 | exit(1); |
3247 | } |
3248 | |
3249 | check_authmethod_unspecified(&authmethodlocal); |
3250 | check_authmethod_unspecified(&authmethodhost); |
3251 | |
3252 | check_authmethod_valid(authmethodlocal, auth_methods_local, "local" ); |
3253 | check_authmethod_valid(authmethodhost, auth_methods_host, "host" ); |
3254 | |
3255 | check_need_password(authmethodlocal, authmethodhost); |
3256 | |
3257 | /* set wal segment size */ |
3258 | if (str_wal_segment_size_mb == NULL) |
3259 | wal_segment_size_mb = (DEFAULT_XLOG_SEG_SIZE) / (1024 * 1024); |
3260 | else |
3261 | { |
3262 | char *endptr; |
3263 | |
3264 | /* check that the argument is a number */ |
3265 | wal_segment_size_mb = strtol(str_wal_segment_size_mb, &endptr, 10); |
3266 | |
3267 | /* verify that wal segment size is valid */ |
3268 | if (endptr == str_wal_segment_size_mb || *endptr != '\0') |
3269 | { |
3270 | pg_log_error("argument of --wal-segsize must be a number" ); |
3271 | exit(1); |
3272 | } |
3273 | if (!IsValidWalSegSize(wal_segment_size_mb * 1024 * 1024)) |
3274 | { |
3275 | pg_log_error("argument of --wal-segsize must be a power of 2 between 1 and 1024" ); |
3276 | exit(1); |
3277 | } |
3278 | } |
3279 | |
3280 | get_restricted_token(); |
3281 | |
3282 | setup_pgdata(); |
3283 | |
3284 | setup_bin_paths(argv[0]); |
3285 | |
3286 | effective_user = get_id(); |
3287 | if (!username) |
3288 | username = effective_user; |
3289 | |
3290 | if (strncmp(username, "pg_" , 3) == 0) |
3291 | { |
3292 | pg_log_error("superuser name \"%s\" is disallowed; role names cannot begin with \"pg_\"" , username); |
3293 | exit(1); |
3294 | } |
3295 | |
3296 | printf(_("The files belonging to this database system will be owned " |
3297 | "by user \"%s\".\n" |
3298 | "This user must also own the server process.\n\n" ), |
3299 | effective_user); |
3300 | |
3301 | set_info_version(); |
3302 | |
3303 | setup_data_file_paths(); |
3304 | |
3305 | setup_locale_encoding(); |
3306 | |
3307 | setup_text_search(); |
3308 | |
3309 | printf("\n" ); |
3310 | |
3311 | if (data_checksums) |
3312 | printf(_("Data page checksums are enabled.\n" )); |
3313 | else |
3314 | printf(_("Data page checksums are disabled.\n" )); |
3315 | |
3316 | if (pwprompt || pwfilename) |
3317 | get_su_pwd(); |
3318 | |
3319 | printf("\n" ); |
3320 | |
3321 | initialize_data_directory(); |
3322 | |
3323 | if (do_sync) |
3324 | { |
3325 | fputs(_("syncing data to disk ... " ), stdout); |
3326 | fflush(stdout); |
3327 | fsync_pgdata(pg_data, PG_VERSION_NUM); |
3328 | check_ok(); |
3329 | } |
3330 | else |
3331 | printf(_("\nSync to disk skipped.\nThe data directory might become corrupt if the operating system crashes.\n" )); |
3332 | |
3333 | if (authwarning) |
3334 | { |
3335 | printf("\n" ); |
3336 | pg_log_warning("enabling \"trust\" authentication for local connections" ); |
3337 | fprintf(stderr, _("You can change this by editing pg_hba.conf or using the option -A, or\n" |
3338 | "--auth-local and --auth-host, the next time you run initdb.\n" )); |
3339 | } |
3340 | |
3341 | /* |
3342 | * Build up a shell command to tell the user how to start the server |
3343 | */ |
3344 | start_db_cmd = createPQExpBuffer(); |
3345 | |
3346 | /* Get directory specification used to start initdb ... */ |
3347 | strlcpy(pg_ctl_path, argv[0], sizeof(pg_ctl_path)); |
3348 | canonicalize_path(pg_ctl_path); |
3349 | get_parent_directory(pg_ctl_path); |
3350 | /* ... and tag on pg_ctl instead */ |
3351 | join_path_components(pg_ctl_path, pg_ctl_path, "pg_ctl" ); |
3352 | |
3353 | /* path to pg_ctl, properly quoted */ |
3354 | appendShellString(start_db_cmd, pg_ctl_path); |
3355 | |
3356 | /* add -D switch, with properly quoted data directory */ |
3357 | appendPQExpBufferStr(start_db_cmd, " -D " ); |
3358 | appendShellString(start_db_cmd, pgdata_native); |
3359 | |
3360 | /* add suggested -l switch and "start" command */ |
3361 | /* translator: This is a placeholder in a shell command. */ |
3362 | appendPQExpBuffer(start_db_cmd, " -l %s start" , _("logfile" )); |
3363 | |
3364 | printf(_("\nSuccess. You can now start the database server using:\n\n" |
3365 | " %s\n\n" ), |
3366 | start_db_cmd->data); |
3367 | |
3368 | destroyPQExpBuffer(start_db_cmd); |
3369 | |
3370 | success = true; |
3371 | return 0; |
3372 | } |
3373 | |