3304 lines
		
	
	
		
			91 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			3304 lines
		
	
	
		
			91 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2016 MariaDB Corporation Ab
 | |
|  *
 | |
|  * Use of this software is governed by the Business Source License included
 | |
|  * in the LICENSE.TXT file and at www.mariadb.com/bsl11.
 | |
|  *
 | |
|  * Change Date: 2020-01-01
 | |
|  *
 | |
|  * On the date above, in accordance with the Business Source License, use
 | |
|  * of this software will be governed by version 2 or later of the General
 | |
|  * Public License.
 | |
|  */
 | |
| 
 | |
| /**
 | |
|  * @file gateway.c - The entry point of MaxScale
 | |
|  */
 | |
| 
 | |
| #include <maxscale/cdefs.h>
 | |
| 
 | |
| #ifdef HAVE_GLIBC
 | |
| #include <execinfo.h>
 | |
| #endif
 | |
| #include <ftw.h>
 | |
| #include <getopt.h>
 | |
| #include <stdlib.h>
 | |
| #include <string.h>
 | |
| #include <strings.h>
 | |
| #include <time.h>
 | |
| #include <unistd.h>
 | |
| 
 | |
| #include <ini.h>
 | |
| #include <openssl/opensslconf.h>
 | |
| #include <pwd.h>
 | |
| #include <sys/file.h>
 | |
| #include <sys/prctl.h>
 | |
| #include <sys/stat.h>
 | |
| #include <sys/types.h>
 | |
| #include <sys/wait.h>
 | |
| 
 | |
| #include <maxscale/alloc.h>
 | |
| #include <maxscale/adminusers.h>
 | |
| #include <maxscale/dcb.h>
 | |
| #include <maxscale/housekeeper.h>
 | |
| #include <maxscale/log_manager.h>
 | |
| #include <maxscale/maxscale.h>
 | |
| #include <maxscale/paths.h>
 | |
| #include <maxscale/query_classifier.h>
 | |
| #include <maxscale/server.h>
 | |
| #include <maxscale/session.h>
 | |
| #include <maxscale/utils.h>
 | |
| #include <maxscale/version.h>
 | |
| #include <maxscale/random_jkiss.h>
 | |
| 
 | |
| #include "internal/config.h"
 | |
| #include "internal/maxscale.h"
 | |
| #include "internal/messagequeue.hh"
 | |
| #include "internal/modules.h"
 | |
| #include "internal/monitor.h"
 | |
| #include "internal/poll.h"
 | |
| #include "internal/service.h"
 | |
| #include "internal/statistics.h"
 | |
| #include "internal/admin.hh"
 | |
| #include "internal/worker.hh"
 | |
| 
 | |
| using namespace maxscale;
 | |
| 
 | |
| #define STRING_BUFFER_SIZE 1024
 | |
| #define PIDFD_CLOSED -1
 | |
| 
 | |
| /** for procname */
 | |
| #if !defined(_GNU_SOURCE)
 | |
| #  define _GNU_SOURCE
 | |
| #endif
 | |
| 
 | |
| #if defined(OPENSSL_THREADS)
 | |
| #define HAVE_OPENSSL_THREADS 1
 | |
| #else
 | |
| #define HAVE_OPENSSL_THREADS 0
 | |
| #endif
 | |
| 
 | |
| extern char *program_invocation_name;
 | |
| extern char *program_invocation_short_name;
 | |
| 
 | |
| /* The data directory we created for this gateway instance */
 | |
| static char     datadir[PATH_MAX + 1] = "";
 | |
| static bool     datadir_defined = false; /*< If the datadir was already set */
 | |
| /* The data directory we created for this gateway instance */
 | |
| static char     pidfile[PATH_MAX + 1] = "";
 | |
| static int pidfd = PIDFD_CLOSED;
 | |
| 
 | |
| /**
 | |
|  * exit flag for log flusher.
 | |
|  */
 | |
| static bool do_exit = false;
 | |
| 
 | |
| /**
 | |
|  * If MaxScale is started to run in daemon process the value is true.
 | |
|  */
 | |
| static bool     daemon_mode = true;
 | |
| 
 | |
| static const char* maxscale_commit = MAXSCALE_COMMIT;
 | |
| 
 | |
| const char *progname = NULL;
 | |
| 
 | |
| #ifdef HAVE_GLIBC
 | |
| // getopt_long is a GNU extension
 | |
| static struct option long_options[] =
 | |
| {
 | |
|     {"config-check",     no_argument,       0, 'c'},
 | |
|     {"daemon",           no_argument,       0, 'n'},
 | |
|     {"nodaemon",         no_argument,       0, 'd'},
 | |
|     {"config",           required_argument, 0, 'f'},
 | |
|     {"log",              required_argument, 0, 'l'},
 | |
|     {"logdir",           required_argument, 0, 'L'},
 | |
|     {"cachedir",         required_argument, 0, 'A'},
 | |
|     {"libdir",           required_argument, 0, 'B'},
 | |
|     {"configdir",        required_argument, 0, 'C'},
 | |
|     {"datadir",          required_argument, 0, 'D'},
 | |
|     {"execdir",          required_argument, 0, 'E'},
 | |
|     {"persistdir",       required_argument, 0, 'F'},
 | |
|     {"module_configdir", required_argument, 0, 'M'},
 | |
|     {"language",         required_argument, 0, 'N'},
 | |
|     {"piddir",           required_argument, 0, 'P'},
 | |
|     {"basedir",          required_argument, 0, 'R'},
 | |
|     {"user",             required_argument, 0, 'U'},
 | |
|     {"syslog",           required_argument, 0, 's'},
 | |
|     {"maxlog",           required_argument, 0, 'S'},
 | |
|     {"log_augmentation", required_argument, 0, 'G'},
 | |
|     {"version",          no_argument,       0, 'v'},
 | |
|     {"version-full",     no_argument,       0, 'V'},
 | |
|     {"help",             no_argument,       0, '?'},
 | |
|     {"connector_plugindir", required_argument, 0, 'H'},
 | |
|     {"passive",          no_argument,       0, 'p'},
 | |
|     {"debug",            required_argument, 0, 'g'},
 | |
|     {0, 0, 0, 0}
 | |
| };
 | |
| #endif
 | |
| 
 | |
| static bool syslog_configured = false;
 | |
| static bool maxlog_configured = false;
 | |
| static bool log_to_shm_configured = false;
 | |
| static volatile sig_atomic_t  last_signal = 0;
 | |
| static bool unload_modules_at_exit = true;
 | |
| static std::string redirect_output_to;
 | |
| 
 | |
| static int cnf_preparser(void* data, const char* section, const char* name, const char* value);
 | |
| static void log_flush_shutdown(void);
 | |
| static void log_flush_cb(void* arg);
 | |
| static int write_pid_file(); /* write MaxScale pidfile */
 | |
| static void unlink_pidfile(void); /* remove pidfile */
 | |
| static void unlock_pidfile();
 | |
| static bool file_write_header(FILE* outfile);
 | |
| static bool file_write_footer(FILE* outfile);
 | |
| static void write_footer(void);
 | |
| static int ntfw_cb(const char*, const struct stat*, int, struct FTW*);
 | |
| static bool is_file_and_readable(const char* absolute_pathname);
 | |
| static bool path_is_readable(const char* absolute_pathname);
 | |
| static bool path_is_writable(const char* absolute_pathname);
 | |
| bool handle_path_arg(char** dest, const char* path, const char* arg, bool rd, bool wr);
 | |
| static bool handle_debug_args(char* args);
 | |
| static void set_log_augmentation(const char* value);
 | |
| static void usage(void);
 | |
| static char* get_expanded_pathname(
 | |
|     char** abs_path,
 | |
|     const char* input_path,
 | |
|     const char* fname);
 | |
| static void print_log_n_stderr(
 | |
|     bool do_log,
 | |
|     bool do_stderr,
 | |
|     const char* logstr,
 | |
|     const char* fprstr,
 | |
|     int eno);
 | |
| static bool resolve_maxscale_conf_fname(
 | |
|     char** cnf_full_path,
 | |
|     const char* home_dir,
 | |
|     char* cnf_file_arg);
 | |
| 
 | |
| static char* check_dir_access(char* dirname, bool, bool);
 | |
| static int set_user(const char* user);
 | |
| bool pid_file_exists();
 | |
| void write_child_exit_code(int fd, int code);
 | |
| static bool change_cwd();
 | |
| static void log_exit_status();
 | |
| static bool daemonize();
 | |
| static bool sniff_configuration(const char* filepath);
 | |
| static bool modules_process_init();
 | |
| static void modules_process_finish();
 | |
| static void disable_module_unloading(const char* arg);
 | |
| static void enable_module_unloading(const char* arg);
 | |
| static void redirect_output_to_file(const char* arg);
 | |
| static bool user_is_acceptable(const char* specified_user);
 | |
| 
 | |
| struct DEBUG_ARGUMENT
 | |
| {
 | |
|     const char* name;                /**< The name of the debug argument */
 | |
|     void (*action)(const char* arg); /**< The function implementing the argument */
 | |
|     const char* description;         /**< Help text */
 | |
| };
 | |
| 
 | |
| #define SPACER "                              "
 | |
| 
 | |
| const DEBUG_ARGUMENT debug_arguments[] =
 | |
| {
 | |
|     {
 | |
|         "disable-module-unloading", disable_module_unloading,
 | |
|         "disable module unloading at exit. Will produce better\n"
 | |
|         SPACER "Valgring leak reports if leaked memory was allocated in\n"
 | |
|         SPACER "a shared library"
 | |
|     },
 | |
|     {
 | |
|         "enable-module-unloading", enable_module_unloading,
 | |
|         "cancels disable-module-unloading"
 | |
|     },
 | |
|     {
 | |
|         "redirect-output-to-file", redirect_output_to_file,
 | |
|         "redirect stdout and stderr to the file given as an argument"
 | |
|     },
 | |
|     {NULL, NULL, NULL}
 | |
| };
 | |
| 
 | |
| #ifndef OPENSSL_1_1
 | |
| /** SSL multi-threading functions and structures */
 | |
| 
 | |
| static SPINLOCK* ssl_locks;
 | |
| 
 | |
| static void ssl_locking_function(int mode, int n, const char* file, int line)
 | |
| {
 | |
|     if (mode & CRYPTO_LOCK)
 | |
|     {
 | |
|         spinlock_acquire(&ssl_locks[n]);
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         spinlock_release(&ssl_locks[n]);
 | |
|     }
 | |
| }
 | |
| /**
 | |
|  * OpenSSL requires this struct to be defined in order to use dynamic locks
 | |
|  */
 | |
| struct CRYPTO_dynlock_value
 | |
| {
 | |
|     SPINLOCK lock;
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * Create a dynamic OpenSSL lock. The dynamic lock is just a wrapper structure
 | |
|  * around a SPINLOCK structure.
 | |
|  * @param file File name
 | |
|  * @param line Line number
 | |
|  * @return Pointer to new lock or NULL of an error occurred
 | |
|  */
 | |
| static struct CRYPTO_dynlock_value *ssl_create_dynlock(const char* file, int line)
 | |
| {
 | |
|     struct CRYPTO_dynlock_value* lock =
 | |
|         (struct CRYPTO_dynlock_value*) MXS_MALLOC(sizeof(struct CRYPTO_dynlock_value));
 | |
|     if (lock)
 | |
|     {
 | |
|         spinlock_init(&lock->lock);
 | |
|     }
 | |
|     return lock;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Lock a dynamic lock for OpenSSL.
 | |
|  * @param mode
 | |
|  * @param n pointer to lock
 | |
|  * @param file File name
 | |
|  * @param line Line number
 | |
|  */
 | |
| static void ssl_lock_dynlock(int mode, struct CRYPTO_dynlock_value * n, const char* file, int line)
 | |
| {
 | |
|     if (mode & CRYPTO_LOCK)
 | |
|     {
 | |
|         spinlock_acquire(&n->lock);
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         spinlock_release(&n->lock);
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Free a dynamic OpenSSL lock.
 | |
|  * @param n Lock to free
 | |
|  * @param file File name
 | |
|  * @param line Line number
 | |
|  */
 | |
| static void ssl_free_dynlock(struct CRYPTO_dynlock_value * n, const char* file, int line)
 | |
| {
 | |
|     MXS_FREE(n);
 | |
| }
 | |
| 
 | |
| #ifdef OPENSSL_1_0
 | |
| /**
 | |
|  * The thread ID callback function for OpenSSL dynamic locks.
 | |
|  * @param id Id to modify
 | |
|  */
 | |
| static void maxscale_ssl_id(CRYPTO_THREADID* id)
 | |
| {
 | |
|     CRYPTO_THREADID_set_numeric(id, pthread_self());
 | |
| }
 | |
| #endif
 | |
| #endif
 | |
| 
 | |
| /**
 | |
|  * Handler for SIGHUP signal. Reload the configuration for the
 | |
|  * gateway.
 | |
|  */
 | |
| static void sighup_handler (int i)
 | |
| {
 | |
|     MXS_NOTICE("Refreshing configuration following SIGHUP\n");
 | |
|     config_reload();
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Handler for SIGUSR1 signal. A SIGUSR1 signal will cause
 | |
|  * maxscale to rotate all log files.
 | |
|  */
 | |
| static void sigusr1_handler (int i)
 | |
| {
 | |
|     MXS_NOTICE("Log file flush following reception of SIGUSR1\n");
 | |
|     mxs_log_rotate();
 | |
| }
 | |
| 
 | |
| static const char shutdown_msg[] = "\n\nShutting down MaxScale\n\n";
 | |
| static const char patience_msg[] =
 | |
|     "\n"
 | |
|     "Patience is a virtue...\n"
 | |
|     "Shutdown in progress, but one more Ctrl-C or SIGTERM and MaxScale goes down,\n"
 | |
|     "no questions asked.\n";
 | |
| 
 | |
| static void sigterm_handler(int i)
 | |
| {
 | |
|     last_signal = i;
 | |
|     int n_shutdowns = maxscale_shutdown();
 | |
| 
 | |
|     if (n_shutdowns == 1)
 | |
|     {
 | |
|         if (write(STDERR_FILENO, shutdown_msg, sizeof(shutdown_msg) - 1) == -1)
 | |
|         {
 | |
|             printf("Failed to write shutdown message!\n");
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         exit(EXIT_FAILURE);
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void
 | |
| sigint_handler(int i)
 | |
| {
 | |
|     last_signal = i;
 | |
|     int n_shutdowns = maxscale_shutdown();
 | |
| 
 | |
|     if (n_shutdowns == 1)
 | |
|     {
 | |
|         if (write(STDERR_FILENO, shutdown_msg, sizeof(shutdown_msg) - 1) == -1)
 | |
|         {
 | |
|             printf("Failed to write shutdown message!\n");
 | |
|         }
 | |
|     }
 | |
|     else if (n_shutdowns == 2)
 | |
|     {
 | |
|         if (write(STDERR_FILENO, patience_msg, sizeof(patience_msg) - 1) == -1)
 | |
|         {
 | |
|             printf("Failed to write shutdown message!\n");
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         exit(EXIT_FAILURE);
 | |
|     }
 | |
| }
 | |
| 
 | |
| volatile sig_atomic_t fatal_handling = 0;
 | |
| 
 | |
| static int signal_set(int sig, void (*handler)(int));
 | |
| 
 | |
| void get_command_output(char* output, size_t size, const char* format, ...)
 | |
| {
 | |
|     va_list valist;
 | |
|     va_start(valist, format);
 | |
|     int cmd_len = vsnprintf(NULL, 0, format, valist);
 | |
|     va_end(valist);
 | |
| 
 | |
|     va_start(valist, format);
 | |
|     char cmd[cmd_len + 1];
 | |
|     vsnprintf(cmd, cmd_len + 1, format, valist);
 | |
|     va_end(valist);
 | |
| 
 | |
|     *output = '\0';
 | |
|     FILE* file = popen(cmd, "r");
 | |
| 
 | |
|     if (file)
 | |
|     {
 | |
|         size_t nread = fread(output, 1, size, file);
 | |
|         nread = nread < size ? nread : size - 1;
 | |
|         output[nread--] = '\0';
 | |
| 
 | |
|         // Trim trailing newlines
 | |
|         while (output + nread > output && output[nread] == '\n')
 | |
|         {
 | |
|             output[nread--] = '\0';
 | |
|         }
 | |
| 
 | |
|         pclose(file);
 | |
|     }
 | |
| }
 | |
| 
 | |
| void extract_file_and_line(const char* symbols, char* cmd, size_t size)
 | |
| {
 | |
|     const char* filename_end = strchr(symbols, '(');
 | |
|     const char* symname_end = strchr(symbols, ')');
 | |
| 
 | |
|     if (filename_end && symname_end)
 | |
|     {
 | |
|         // This appears to be a symbol in a library
 | |
|         char filename[PATH_MAX + 1];
 | |
|         char symname[512];
 | |
|         char offset[512];
 | |
|         snprintf(filename, sizeof(filename), "%.*s", (int)(filename_end - symbols), symbols);
 | |
| 
 | |
|         const char* symname_start = filename_end + 1;
 | |
| 
 | |
|         if (*symname_start != '+')
 | |
|         {
 | |
|             // We have a string form symbol name and an offset, we need to
 | |
|             // extract the symbol address
 | |
| 
 | |
|             const char* addr_offset = symname_start;
 | |
| 
 | |
|             while (addr_offset < symname_end && *addr_offset != '+')
 | |
|             {
 | |
|                 addr_offset++;
 | |
|             }
 | |
| 
 | |
|             snprintf(symname, sizeof(symname), "%.*s", (int)(addr_offset - symname_start), symname_start);
 | |
| 
 | |
|             if (addr_offset < symname_end && *addr_offset == '+')
 | |
|             {
 | |
|                 addr_offset++;
 | |
|             }
 | |
| 
 | |
|             snprintf(offset, sizeof(offset), "%.*s", (int)(symname_end - addr_offset), addr_offset);
 | |
| 
 | |
|             // Get the hexadecimal address of the symbol
 | |
|             get_command_output(cmd, size,
 | |
|                                "nm %s |grep ' %s$'|sed -e 's/ .*//' -e 's/^/0x/'",
 | |
|                                filename, symname);
 | |
|             long long symaddr = strtoll(cmd, NULL, 16);
 | |
|             long long offsetaddr = strtoll(offset, NULL, 16);
 | |
| 
 | |
|             // Calculate the file and line now that we have the raw offset into
 | |
|             // the library
 | |
|             get_command_output(cmd, size,
 | |
|                                "addr2line -e %s 0x%x",
 | |
|                                filename, symaddr + offsetaddr);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             // Raw offset into library
 | |
|             symname_start++;
 | |
|             snprintf(symname, sizeof(symname), "%.*s", (int)(symname_end - symname_start), symname_start);
 | |
|             get_command_output(cmd, size, "addr2line -e %s %s", filename, symname);
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void
 | |
| sigfatal_handler(int i)
 | |
| {
 | |
|     if (fatal_handling)
 | |
|     {
 | |
|         fprintf(stderr, "Fatal signal %d while backtracing\n", i);
 | |
|         _exit(1);
 | |
|     }
 | |
|     fatal_handling = 1;
 | |
|     MXS_CONFIG* cnf = config_get_global_options();
 | |
|     fprintf(stderr, "Fatal: MaxScale " MAXSCALE_VERSION " received fatal signal %d. "
 | |
|             "Attempting backtrace.\n", i);
 | |
|     fprintf(stderr, "Commit ID: %s System name: %s Release string: %s\n\n",
 | |
|             maxscale_commit, cnf->sysname, cnf->release_string);
 | |
| #ifdef HAVE_GLIBC
 | |
| 
 | |
|     void *addrs[128];
 | |
|     int count = backtrace(addrs, 128);
 | |
| 
 | |
|     // First print the stack trace to stderr as malloc is likely broken
 | |
|     backtrace_symbols_fd(addrs, count, STDERR_FILENO);
 | |
| 
 | |
|     MXS_ALERT("Fatal: MaxScale " MAXSCALE_VERSION " received fatal signal %d. "
 | |
|               "Attempting backtrace.", i);
 | |
|     MXS_ALERT("Commit ID: %s System name: %s "
 | |
|               "Release string: %s",
 | |
|               maxscale_commit, cnf->sysname, cnf->release_string);
 | |
|     // Then see if we can log them
 | |
|     char** symbols = backtrace_symbols(addrs, count);
 | |
| 
 | |
|     if (symbols)
 | |
|     {
 | |
|         for (int n = 0; n < count; n++)
 | |
|         {
 | |
|             char cmd[PATH_MAX + 1024] = "<not found>";
 | |
|             extract_file_and_line(symbols[n], cmd, sizeof(cmd));
 | |
|             MXS_ALERT("  %s: %s", symbols[n], cmd);
 | |
|         }
 | |
|         MXS_FREE(symbols);
 | |
|     }
 | |
| #endif
 | |
| 
 | |
|     mxs_log_flush_sync();
 | |
| 
 | |
|     /* re-raise signal to enforce core dump */
 | |
|     fprintf(stderr, "\n\nWriting core dump\n");
 | |
|     signal_set(i, SIG_DFL);
 | |
|     raise(i);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * @node Wraps sigaction calls
 | |
|  *
 | |
|  * Parameters:
 | |
|  * @param sig Signal to set
 | |
|  * @param void Handler function for signal *
 | |
|  *
 | |
|  * @return 0 in success, 1 otherwise
 | |
|  *
 | |
|  *
 | |
|  * @details (write detailed description here)
 | |
|  *
 | |
|  */
 | |
| static int signal_set(int sig, void (*handler)(int))
 | |
| {
 | |
|     int rc = 0;
 | |
| 
 | |
|     struct sigaction sigact = {};
 | |
|     sigact.sa_handler = handler;
 | |
| 
 | |
|     int err;
 | |
| 
 | |
|     do
 | |
|     {
 | |
|         errno = 0;
 | |
|         err = sigaction(sig, &sigact, NULL);
 | |
|     }
 | |
|     while (errno == EINTR);
 | |
| 
 | |
|     if (err < 0)
 | |
|     {
 | |
|         MXS_ERROR("Failed call sigaction() in %s due to %d, %s.",
 | |
|                   program_invocation_short_name,
 | |
|                   errno,
 | |
|                   mxs_strerror(errno));
 | |
|         rc = 1;
 | |
|     }
 | |
| 
 | |
|     return rc;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * @brief Create the data directory for this process
 | |
|  *
 | |
|  * This will prevent conflicts when multiple MaxScale instances are run on the
 | |
|  * same machine.
 | |
|  * @param base Base datadir path
 | |
|  * @param datadir The result where the process specific datadir is stored
 | |
|  * @return True if creation was successful and false on error
 | |
|  */
 | |
| static bool create_datadir(const char* base, char* datadir)
 | |
| {
 | |
|     bool created = false;
 | |
|     int len = 0;
 | |
| 
 | |
|     if ((len = snprintf(datadir, PATH_MAX, "%s", base)) < PATH_MAX &&
 | |
|         (mkdir(datadir, 0777) == 0 || errno == EEXIST))
 | |
|     {
 | |
|         if ((len = snprintf(datadir, PATH_MAX, "%s/data%d", base, getpid())) < PATH_MAX)
 | |
|         {
 | |
|             if ((mkdir(datadir, 0777) == 0) || (errno == EEXIST))
 | |
|             {
 | |
|                 created = true;
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 MXS_ERROR("Cannot create data directory '%s': %d %s\n",
 | |
|                           datadir, errno, mxs_strerror(errno));
 | |
|             }
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         if (len < PATH_MAX)
 | |
|         {
 | |
|             fprintf(stderr, "Error: Cannot create data directory '%s': %d %s\n",
 | |
|                     datadir, errno, mxs_strerror(errno));
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             MXS_ERROR("Data directory pathname exceeds the maximum allowed pathname "
 | |
|                       "length: %s/data%d.", base, getpid());
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return created;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Cleanup the temporary data directory we created for the gateway
 | |
|  */
 | |
| int ntfw_cb(const char*        filename,
 | |
|             const struct stat* filestat,
 | |
|             int                fileflags,
 | |
|             struct FTW*        pfwt)
 | |
| {
 | |
|     int rc = remove(filename);
 | |
| 
 | |
|     if (rc != 0)
 | |
|     {
 | |
|         int eno = errno;
 | |
|         errno = 0;
 | |
|         MXS_ERROR("Failed to remove the data directory %s of MaxScale due to %d, %s.",
 | |
|                   datadir, eno, mxs_strerror(eno));
 | |
|     }
 | |
|     return rc;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * @brief Clean up the data directory
 | |
|  *
 | |
|  * This removes the process specific datadir which is currently only used by
 | |
|  * the embedded library. In the future this directory could contain other
 | |
|  * temporary files and relocating this to to, for example, /tmp/ could make sense.
 | |
|  */
 | |
| void cleanup_process_datadir()
 | |
| {
 | |
|     int depth = 1;
 | |
|     int flags = FTW_CHDIR | FTW_DEPTH | FTW_MOUNT;
 | |
|     const char *proc_datadir = get_process_datadir();
 | |
| 
 | |
|     if (strcmp(proc_datadir, get_datadir()) != 0 && access(proc_datadir, F_OK) == 0)
 | |
|     {
 | |
|         nftw(proc_datadir, ntfw_cb, depth, flags);
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void write_footer(void)
 | |
| {
 | |
|     file_write_footer(stdout);
 | |
| }
 | |
| 
 | |
| static bool file_write_footer(FILE* outfile)
 | |
| {
 | |
|     bool        succp = false;
 | |
|     size_t      len1;
 | |
|     const char* header_buf1;
 | |
| 
 | |
|     header_buf1 = "------------------------------------------------------"
 | |
|                   "\n\n";
 | |
|     len1 = strlen(header_buf1);
 | |
|     fwrite((void*)header_buf1, len1, 1, outfile);
 | |
| 
 | |
|     succp = true;
 | |
| 
 | |
|     return succp;
 | |
| }
 | |
| 
 | |
| // Documentation says 26 bytes is enough, but 32 is a nice round number.
 | |
| #define ASCTIME_BUF_LEN 32
 | |
| static bool file_write_header(FILE* outfile)
 | |
| {
 | |
|     bool        succp = false;
 | |
|     size_t      len1;
 | |
|     size_t      len2;
 | |
|     size_t      len3;
 | |
|     const char* header_buf1;
 | |
|     char        header_buf2[ASCTIME_BUF_LEN];
 | |
|     const char* header_buf3;
 | |
|     time_t      t;
 | |
|     struct tm   tm;
 | |
| #if defined(LAPTOP_TEST)
 | |
|     struct timespec ts1;
 | |
|     ts1.tv_sec = 0;
 | |
|     ts1.tv_nsec = DISKWRITE_LATENCY * 1000000;
 | |
| #endif
 | |
| 
 | |
| #if !defined(SS_DEBUG)
 | |
|     return true;
 | |
| #endif
 | |
| 
 | |
|     t = time(NULL);
 | |
|     localtime_r(&t, &tm);
 | |
| 
 | |
|     header_buf1 = "\n\nMariaDB Corporation MaxScale " MAXSCALE_VERSION "\t";
 | |
|     asctime_r(&tm, header_buf2);
 | |
|     header_buf3 = "------------------------------------------------------\n";
 | |
| 
 | |
|     len1 = strlen(header_buf1);
 | |
|     len2 = strlen(header_buf2);
 | |
|     len3 = strlen(header_buf3);
 | |
| #if defined(LAPTOP_TEST)
 | |
|     nanosleep(&ts1, NULL);
 | |
| #else
 | |
|     fwrite((void*)header_buf1, len1, 1, outfile);
 | |
|     fwrite((void*)header_buf2, len2, 1, outfile);
 | |
|     fwrite((void*)header_buf3, len3, 1, outfile);
 | |
| #endif
 | |
| 
 | |
|     succp = true;
 | |
| 
 | |
|     return succp;
 | |
| }
 | |
| 
 | |
| static bool resolve_maxscale_conf_fname(char** cnf_full_path,
 | |
|                                         const char* home_dir,
 | |
|                                         char* cnf_file_arg)
 | |
| {
 | |
|     if (cnf_file_arg)
 | |
|     {
 | |
|         *cnf_full_path = (char *)MXS_MALLOC(PATH_MAX + 1);
 | |
|         MXS_ABORT_IF_NULL(*cnf_full_path);
 | |
| 
 | |
|         if (!realpath(cnf_file_arg, *cnf_full_path))
 | |
|         {
 | |
|             const char* logstr = "Failed to open read access to configuration file.";
 | |
|             int eno = errno;
 | |
|             print_log_n_stderr(true, true, logstr, logstr, eno);
 | |
|             MXS_FREE(*cnf_full_path);
 | |
|             *cnf_full_path = NULL;
 | |
|         }
 | |
|     }
 | |
|     else /*< default config file name is used */
 | |
|     {
 | |
|         *cnf_full_path = get_expanded_pathname(NULL, home_dir, default_cnf_fname);
 | |
|     }
 | |
| 
 | |
|     return *cnf_full_path && is_file_and_readable(*cnf_full_path);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Check read and write accessibility to a directory.
 | |
|  * @param dirname       directory to be checked
 | |
|  *
 | |
|  * @return NULL if directory can be read and written, an error message if either
 | |
|  *      read or write is not permitted.
 | |
|  */
 | |
| static char* check_dir_access(char* dirname, bool rd, bool wr)
 | |
| {
 | |
|     char errbuf[PATH_MAX * 2];
 | |
|     char* errstr = NULL;
 | |
| 
 | |
|     if (dirname == NULL)
 | |
|     {
 | |
|         errstr = MXS_STRDUP_A("Directory argument is NULL");
 | |
|         goto retblock;
 | |
|     }
 | |
| 
 | |
|     if (access(dirname, F_OK) != 0)
 | |
|     {
 | |
|         snprintf(errbuf, PATH_MAX * 2 - 1, "Can't access '%s'.", dirname);
 | |
|         errbuf[PATH_MAX * 2 - 1] = '\0';
 | |
|         errstr = MXS_STRDUP_A(errbuf);
 | |
|         goto retblock;
 | |
|     }
 | |
| 
 | |
|     if (rd && !path_is_readable(dirname))
 | |
|     {
 | |
|         snprintf(errbuf, PATH_MAX * 2 - 1, "MaxScale doesn't have read permission "
 | |
|                  "to '%s'.", dirname);
 | |
|         errbuf[PATH_MAX * 2 - 1] = '\0';
 | |
|         errstr = MXS_STRDUP_A(errbuf);
 | |
|         goto retblock;
 | |
|     }
 | |
| 
 | |
|     if (wr && !path_is_writable(dirname))
 | |
|     {
 | |
|         snprintf(errbuf, PATH_MAX * 2 - 1, "MaxScale doesn't have write permission "
 | |
|                  "to '%s'.", dirname);
 | |
|         errbuf[PATH_MAX * 2 - 1] = '\0';
 | |
|         errstr = MXS_STRDUP_A(errbuf);
 | |
|         goto retblock;
 | |
|     }
 | |
| 
 | |
| retblock:
 | |
|     return errstr;
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|  * @node Provides error printing for non-formatted error strings.
 | |
|  *
 | |
|  * @param do_log Specifies whether printing to log is enabled
 | |
|  *
 | |
|  * @param do_stderr Specifies whether printing to stderr is enabled
 | |
|  *
 | |
|  * @param logstr String to be printed to log
 | |
|  *
 | |
|  * @param fprstr String to be printed to stderr
 | |
|  *
 | |
|  * @param eno Errno, if it is set, zero, otherwise
 | |
|  */
 | |
| static void print_log_n_stderr(
 | |
|     bool        do_log,   /*< is printing to log enabled */
 | |
|     bool        do_stderr,/*< is printing to stderr enabled */
 | |
|     const char* logstr,   /*< string to be printed to log */
 | |
|     const char* fprstr,   /*< string to be printed to stderr */
 | |
|     int         eno)      /*< errno, if it is set, zero, otherwise */
 | |
| {
 | |
|     if (do_log)
 | |
|     {
 | |
|         if (mxs_log_init(NULL, get_logdir(), MXS_LOG_TARGET_FS))
 | |
|         {
 | |
|             MXS_ERROR("%s%s%s%s",
 | |
|                       logstr,
 | |
|                       eno == 0 ? "" : " (",
 | |
|                       eno == 0 ? "" : mxs_strerror(eno),
 | |
|                       eno == 0 ? "" : ")");
 | |
|         }
 | |
|     }
 | |
|     if (do_stderr)
 | |
|     {
 | |
|         fprintf(stderr,
 | |
|                 "* Error: %s%s%s%s\n",
 | |
|                 fprstr,
 | |
|                 eno == 0 ? "" : " (",
 | |
|                 eno == 0 ? "" : mxs_strerror(eno),
 | |
|                 eno == 0 ? "" : ")");
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Check that a path refers to a readable file.
 | |
|  *
 | |
|  * @param absolute_pathname The path to check.
 | |
|  * @return True if the path refers to a readable file. is readable
 | |
|  */
 | |
| static bool is_file_and_readable(const char* absolute_pathname)
 | |
| {
 | |
|     bool rv = false;
 | |
| 
 | |
|     struct stat info;
 | |
| 
 | |
|     if (stat(absolute_pathname, &info) == 0)
 | |
|     {
 | |
|         if ((info.st_mode & S_IFMT) == S_IFREG)
 | |
|         {
 | |
|             // There is a race here as the file can be deleted and a directory
 | |
|             // created in its stead between the stat() call here and the access()
 | |
|             // call in file_is_readable().
 | |
|             rv = path_is_readable(absolute_pathname);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             const char FORMAT[] = "'%s' does not refer to a regular file.";
 | |
|             char buff[sizeof(FORMAT) + strlen(absolute_pathname)];
 | |
|             snprintf(buff, sizeof(buff), FORMAT, absolute_pathname);
 | |
|             print_log_n_stderr(true, true, buff, buff, 0);
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         int eno = errno;
 | |
|         errno = 0;
 | |
|         const char FORMAT[] = "Could not access '%s'.";
 | |
|         char buff[sizeof(FORMAT) + strlen(absolute_pathname)];
 | |
|         snprintf(buff, sizeof(buff), FORMAT, absolute_pathname);
 | |
|         print_log_n_stderr(true, true, buff, buff, eno);
 | |
|     }
 | |
| 
 | |
|     return rv;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Check if the file or directory is readable
 | |
|  * @param absolute_pathname Path of the file or directory to check
 | |
|  * @return True if file is readable
 | |
|  */
 | |
| static bool path_is_readable(const char* absolute_pathname)
 | |
| {
 | |
|     bool succp = true;
 | |
| 
 | |
|     if (access(absolute_pathname, R_OK) != 0)
 | |
|     {
 | |
|         int eno = errno;
 | |
|         errno = 0;
 | |
|         char buff[PATH_MAX + 100];
 | |
|         snprintf(buff, sizeof(buff), "Opening file '%s' for reading failed.", absolute_pathname);
 | |
|         print_log_n_stderr(true, true, buff, buff, eno);
 | |
|         succp = false;
 | |
|     }
 | |
|     return succp;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Check if the file or directory is writable
 | |
|  * @param absolute_pathname Path of the file or directory to check
 | |
|  * @return True if file is writable
 | |
|  */
 | |
| static bool path_is_writable(const char* absolute_pathname)
 | |
| {
 | |
|     bool succp = true;
 | |
| 
 | |
|     if (access(absolute_pathname, W_OK) != 0)
 | |
|     {
 | |
|         int eno = errno;
 | |
|         errno = 0;
 | |
|         char buff[PATH_MAX + 100];
 | |
|         snprintf(buff, sizeof(buff), "Opening file '%s' for writing failed.", absolute_pathname);
 | |
|         print_log_n_stderr(true, true, buff, buff, eno);
 | |
|         succp = false;
 | |
|     }
 | |
|     return succp;
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|  * @node Expand path expression and if fname is provided, concatenate
 | |
|  * it to path to for an absolute pathname. If fname is provided
 | |
|  * its readability is tested.
 | |
|  *
 | |
|  * Parameters:
 | |
|  * @param output_path memory address where expanded path is stored,
 | |
|  * if output_path != NULL
 | |
|  *
 | |
|  * @param relative_path path to be expanded
 | |
|  *
 | |
|  * @param fname file name to be concatenated to the path, may be NULL
 | |
|  *
 | |
|  * @return expanded path and if fname was NULL, absolute pathname of it.
 | |
|  * Both return value and *output_path are NULL in case of failure.
 | |
|  *
 | |
|  *
 | |
|  */
 | |
| static char* get_expanded_pathname(char** output_path,
 | |
|                                    const char* relative_path,
 | |
|                                    const char* fname)
 | |
| {
 | |
|     char* cnf_file_buf = NULL;
 | |
|     char* expanded_path;
 | |
| 
 | |
|     if (relative_path == NULL)
 | |
|     {
 | |
|         goto return_cnf_file_buf;
 | |
|     }
 | |
| 
 | |
|     expanded_path = (char*)MXS_MALLOC(PATH_MAX);
 | |
| 
 | |
|     if (!expanded_path)
 | |
|     {
 | |
|         if (output_path)
 | |
|         {
 | |
|             *output_path = NULL;
 | |
|         }
 | |
|         goto return_cnf_file_buf;
 | |
|     }
 | |
| 
 | |
|     /*<
 | |
|      * Expand possible relative pathname to absolute path
 | |
|      */
 | |
|     if (realpath(relative_path, expanded_path) == NULL)
 | |
|     {
 | |
|         int eno = errno;
 | |
|         errno = 0;
 | |
|         char buff[PATH_MAX + 100];
 | |
| 
 | |
|         snprintf(buff, sizeof(buff), "Failed to read the directory '%s'.",  relative_path);
 | |
|         print_log_n_stderr(true, true, buff, buff, eno);
 | |
| 
 | |
|         MXS_FREE(expanded_path);
 | |
|         if (output_path)
 | |
|         {
 | |
|             *output_path = NULL;
 | |
|         }
 | |
|         goto return_cnf_file_buf;
 | |
|     }
 | |
| 
 | |
|     if (fname != NULL)
 | |
|     {
 | |
|         /*<
 | |
|          * Concatenate an absolute filename and test its existence and
 | |
|          * readability.
 | |
|          */
 | |
|         size_t pathlen = strnlen(expanded_path, PATH_MAX) +
 | |
|                          1 + strnlen(fname, PATH_MAX) + 1;
 | |
|         cnf_file_buf = (char*)MXS_MALLOC(pathlen);
 | |
| 
 | |
|         if (cnf_file_buf == NULL)
 | |
|         {
 | |
|             MXS_FREE(expanded_path);
 | |
|             expanded_path = NULL;
 | |
|             goto return_cnf_file_buf;
 | |
|         }
 | |
|         snprintf(cnf_file_buf, pathlen, "%s/%s", expanded_path, fname);
 | |
| 
 | |
|         if (!path_is_readable(cnf_file_buf))
 | |
|         {
 | |
|             MXS_FREE(expanded_path);
 | |
|             MXS_FREE(cnf_file_buf);
 | |
|             expanded_path = NULL;
 | |
|             cnf_file_buf = NULL;
 | |
|             goto return_cnf_file_buf;
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         /*<
 | |
|          * If only directory was provided, check that it is
 | |
|          * readable.
 | |
|          */
 | |
|         if (!path_is_readable(expanded_path))
 | |
|         {
 | |
|             MXS_FREE(expanded_path);
 | |
|             expanded_path = NULL;
 | |
|             goto return_cnf_file_buf;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (output_path == NULL)
 | |
|     {
 | |
|         MXS_FREE(expanded_path);
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         *output_path = expanded_path;
 | |
|     }
 | |
| 
 | |
| return_cnf_file_buf:
 | |
| 
 | |
|     return cnf_file_buf;
 | |
| }
 | |
| 
 | |
| static void usage(void)
 | |
| {
 | |
|     fprintf(stderr,
 | |
|             "\nUsage : %s [OPTION]...\n\n"
 | |
|             "  -c, --config-check          validate configuration file and exit\n"
 | |
|             "  -d, --nodaemon              enable running in terminal process\n"
 | |
|             "  -f, --config=FILE           relative or absolute pathname of config file\n"
 | |
|             "  -l, --log=[file|shm|stdout] log to file, shared memory or stdout\n"
 | |
|             "                              (default: file)\n"
 | |
|             "  -L, --logdir=PATH           path to log file directory\n"
 | |
|             "  -A, --cachedir=PATH         path to cache directory\n"
 | |
|             "  -B, --libdir=PATH           path to module directory\n"
 | |
|             "  -C, --configdir=PATH        path to configuration file directory\n"
 | |
|             "  -D, --datadir=PATH          path to data directory,\n"
 | |
|             "                              stores internal MaxScale data\n"
 | |
|             "  -E, --execdir=PATH          path to the maxscale and other executable files\n"
 | |
|             "  -F, --persistdir=PATH       path to persisted configuration directory\n"
 | |
|             "  -M, --module_configdir=PATH path to module configuration directory\n"
 | |
|             "  -H, --connector_plugindir=PATH\n"
 | |
|             "                              path to MariaDB Connector-C plugin directory\n"
 | |
|             "  -N, --language=PATH         path to errmsg.sys file\n"
 | |
|             "  -P, --piddir=PATH           path to PID file directory\n"
 | |
|             "  -R, --basedir=PATH          base path for all other paths\n"
 | |
|             "  -U, --user=USER             user ID and group ID of specified user are used to\n"
 | |
|             "                              run MaxScale\n"
 | |
|             "  -s, --syslog=[yes|no]       log messages to syslog (default:yes)\n"
 | |
|             "  -S, --maxlog=[yes|no]       log messages to MaxScale log (default: yes)\n"
 | |
|             "  -G, --log_augmentation=0|1  augment messages with the name of the function\n"
 | |
|             "                              where the message was logged (default: 0)\n"
 | |
|             "  -p, --passive               start MaxScale as a passive standby\n"
 | |
|             "  -g, --debug=arg1,arg2,...   enable or disable debug features. Supported arguments:\n",
 | |
|             progname);
 | |
|     for (int i = 0; debug_arguments[i].action != NULL; i++)
 | |
|     {
 | |
|         fprintf(stderr,
 | |
|                 "   %-24s   %s\n", debug_arguments[i].name, debug_arguments[i].description);
 | |
|     }
 | |
|     fprintf(stderr,
 | |
|             "  -v, --version               print version info and exit\n"
 | |
|             "  -V, --version-full          print full version info and exit\n"
 | |
|             "  -?, --help                  show this help\n"
 | |
|             "\n"
 | |
|             "Defaults paths:\n"
 | |
|             "  config file       : %s/%s\n"
 | |
|             "  configdir         : %s\n"
 | |
|             "  logdir            : %s\n"
 | |
|             "  cachedir          : %s\n"
 | |
|             "  libdir            : %s\n"
 | |
|             "  datadir           : %s\n"
 | |
|             "  execdir           : %s\n"
 | |
|             "  language          : %s\n"
 | |
|             "  piddir            : %s\n"
 | |
|             "  persistdir        : %s\n"
 | |
|             "  module configdir  : %s\n"
 | |
|             "  connector plugins : %s\n"
 | |
|             "\n"
 | |
|             "If '--basedir' is provided then all other paths, including the default\n"
 | |
|             "configuration file path, are defined relative to that. As an example,\n"
 | |
|             "if '--basedir /path/maxscale' is specified, then, for instance, the log\n"
 | |
|             "dir will be '/path/maxscale/var/log/maxscale', the config dir will be\n"
 | |
|             "'/path/maxscale/etc' and the default config file will be\n"
 | |
|             "'/path/maxscale/etc/maxscale.cnf'.\n\n"
 | |
|             "MaxScale documentation: https://mariadb.com/kb/en/mariadb-enterprise/mariadb-maxscale-21/ \n",
 | |
|             get_configdir(), default_cnf_fname,
 | |
|             get_configdir(), get_logdir(), get_cachedir(), get_libdir(),
 | |
|             get_datadir(), get_execdir(), get_langdir(), get_piddir(),
 | |
|             get_config_persistdir(), get_module_configdir(), get_connector_plugindir());
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Deletes a particular signal from a provided signal set.
 | |
|  *
 | |
|  * @param sigset  The signal set to be manipulated.
 | |
|  * @param signum  The signal to be deleted.
 | |
|  * @param signame The name of the signal.
 | |
|  *
 | |
|  * @return True, if the signal could be deleted from the set, false otherwise.
 | |
|  */
 | |
| static bool delete_signal(sigset_t* sigset, int signum, const char* signame)
 | |
| {
 | |
|     int rc = sigdelset(sigset, signum);
 | |
| 
 | |
|     if (rc != 0)
 | |
|     {
 | |
|         int e = errno;
 | |
|         errno = 0;
 | |
| 
 | |
|         static const char FORMAT[] = "Failed to delete signal %s from the signal set of MaxScale. Exiting.";
 | |
|         char message[sizeof(FORMAT) + 16]; // Enough for any "SIG..." string.
 | |
| 
 | |
|         sprintf(message, FORMAT, signame);
 | |
| 
 | |
|         print_log_n_stderr(true, true, message, message, e);
 | |
|     }
 | |
| 
 | |
|     return rc == 0;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Disables all signals.
 | |
|  *
 | |
|  * @return True, if all signals could be disabled, false otherwise.
 | |
|  */
 | |
| bool disable_signals(void)
 | |
| {
 | |
|     sigset_t sigset;
 | |
| 
 | |
|     if (sigfillset(&sigset) != 0)
 | |
|     {
 | |
|         int e = errno;
 | |
|         errno = 0;
 | |
|         static const char message[] = "Failed to initialize set the signal set for MaxScale. Exiting.";
 | |
|         print_log_n_stderr(true, true, message, message, e);
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!delete_signal(&sigset, SIGHUP, "SIGHUP"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!delete_signal(&sigset, SIGUSR1, "SIGUSR1"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!delete_signal(&sigset, SIGTERM, "SIGTERM"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!delete_signal(&sigset, SIGSEGV, "SIGSEGV"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!delete_signal(&sigset, SIGABRT, "SIGABRT"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!delete_signal(&sigset, SIGILL, "SIGILL"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!delete_signal(&sigset, SIGFPE, "SIGFPE"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!delete_signal(&sigset, SIGCHLD, "SIGCHLD"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
| #ifdef SIGBUS
 | |
|     if (!delete_signal(&sigset, SIGBUS, "SIGBUS"))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| #endif
 | |
| 
 | |
|     if (sigprocmask(SIG_SETMASK, &sigset, NULL) != 0)
 | |
|     {
 | |
|         int e = errno;
 | |
|         errno = 0;
 | |
|         static const char message[] = "Failed to set the signal set for MaxScale. Exiting";
 | |
|         print_log_n_stderr(true, true, message, message, e);
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Configures the handling of a particular signal.
 | |
|  *
 | |
|  * @param signum  The signal number.
 | |
|  * @param signame The name of the signal.
 | |
|  * @param handler The handler function for the signal.
 | |
|  *
 | |
|  * @return True, if the signal could be configured, false otherwise.
 | |
|  */
 | |
| static bool configure_signal(int signum, const char* signame, void (*handler)(int))
 | |
| {
 | |
|     int rc = signal_set(signum, handler);
 | |
| 
 | |
|     if (rc != 0)
 | |
|     {
 | |
|         static const char FORMAT[] = "Failed to set signal handler for %s. Exiting.";
 | |
|         char message[sizeof(FORMAT) + 16]; // Enough for any "SIG..." string.
 | |
| 
 | |
|         sprintf(message, FORMAT, signame);
 | |
| 
 | |
|         print_log_n_stderr(true, true, message, message, 0);
 | |
|     }
 | |
| 
 | |
|     return rc == 0;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Configures signal handling of MaxScale.
 | |
|  *
 | |
|  * @return True, if all signals could be configured, false otherwise.
 | |
|  */
 | |
| bool configure_signals(void)
 | |
| {
 | |
|     if (!configure_signal(SIGHUP, "SIGHUP", sighup_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!configure_signal(SIGUSR1, "SIGUSR1", sigusr1_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!configure_signal(SIGTERM, "SIGTERM", sigterm_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!configure_signal(SIGINT, "SIGINT", sigint_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!configure_signal(SIGSEGV, "SIGSEGV", sigfatal_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!configure_signal(SIGABRT, "SIGABRT", sigfatal_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!configure_signal(SIGILL, "SIGILL", sigfatal_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (!configure_signal(SIGFPE, "SIGFPE", sigfatal_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
| #ifdef SIGBUS
 | |
|     if (!configure_signal(SIGBUS, "SIGBUS", sigfatal_handler))
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| #endif
 | |
| 
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Set the directories of MaxScale relative to a basedir
 | |
|  *
 | |
|  * @param basedir The base directory relative to which the other are set.
 | |
|  *
 | |
|  * @return True if the directories could be set, false otherwise.
 | |
|  */
 | |
| bool set_dirs(const char *basedir)
 | |
| {
 | |
|     bool rv = true;
 | |
|     char *path;
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, "var/" MXS_DEFAULT_LOG_SUBPATH, true, false)))
 | |
|     {
 | |
|         set_logdir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, "var/" MXS_DEFAULT_CACHE_SUBPATH, true, true)))
 | |
|     {
 | |
|         set_cachedir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, MXS_DEFAULT_LIB_SUBPATH, true, false)))
 | |
|     {
 | |
|         set_libdir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, MXS_DEFAULT_CONFIG_SUBPATH, true, false)))
 | |
|     {
 | |
|         set_configdir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, MXS_DEFAULT_MODULE_CONFIG_SUBPATH, true, false)))
 | |
|     {
 | |
|         set_module_configdir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, "var/" MXS_DEFAULT_DATA_SUBPATH, true, false)))
 | |
|     {
 | |
|         set_datadir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, MXS_DEFAULT_EXEC_SUBPATH, true, false)))
 | |
|     {
 | |
|         set_execdir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, "var/" MXS_DEFAULT_LANG_SUBPATH, true, false)))
 | |
|     {
 | |
|         set_langdir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, "var/" MXS_DEFAULT_PID_SUBPATH, true, true)))
 | |
|     {
 | |
|         set_piddir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir, MXS_DEFAULT_DATA_SUBPATH "/"
 | |
|                                     MXS_DEFAULT_CONFIG_PERSIST_SUBPATH, true, true)))
 | |
|     {
 | |
|         set_config_persistdir(path);
 | |
|     }
 | |
| 
 | |
|     if (rv && (rv = handle_path_arg(&path, basedir,
 | |
|                                     "var/" MXS_DEFAULT_CONNECTOR_PLUGIN_SUBPATH, true, true)))
 | |
|     {
 | |
|         set_connector_plugindir(path);
 | |
|     }
 | |
| 
 | |
|     return rv;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * @mainpage
 | |
|  * The main entry point into MaxScale
 | |
|  *
 | |
|  * Logging and error printing
 | |
|  * ---
 | |
|  * What is printed to the terminal is something that the user can understand,
 | |
|  * and/or something what the user can do for. For example, fix configuration.
 | |
|  * More detailed messages are printed to error log, and optionally to trace
 | |
|  * and debug log.
 | |
|  *
 | |
|  * As soon as process switches to daemon process, stderr printing is stopped -
 | |
|  * except when it comes to command-line argument processing.
 | |
|  * This is not an obvious solution because stderr is often directed to somewhere,
 | |
|  * but currently this is the case.
 | |
|  *
 | |
|  * The configuration file is by default /etc/maxscale.cnf
 | |
|  * The name of configuration file and its location can also be specified with a
 | |
|  * command-line argument.
 | |
|  *
 | |
|  * @param argc The argument count
 | |
|  * @param argv The array of arguments themselves
 | |
|  * @return 0 if process exited normally, otherwise a non-zero value is returned
 | |
|  */
 | |
| int main(int argc, char **argv)
 | |
| {
 | |
|     int      rc = MAXSCALE_SHUTDOWN;
 | |
|     int      n_threads; /*< number of epoll listener threads */
 | |
|     size_t   thread_stack_size;
 | |
|     int      n_services;
 | |
|     int      eno = 0;   /*< local variable for errno */
 | |
|     int      opt;
 | |
|     int      daemon_pipe[2] = { -1, -1};
 | |
|     bool     parent_process;
 | |
|     int      child_status;
 | |
|     char*    cnf_file_path = NULL;        /*< conf file, to be freed */
 | |
|     char*    cnf_file_arg = NULL;         /*< conf filename from cmd-line arg */
 | |
|     THREAD    log_flush_thr;
 | |
|     char*    tmp_path;
 | |
|     char*    tmp_var;
 | |
|     int      option_index;
 | |
|     int      *syslog_enabled = &config_get_global_options()->syslog; /** Log to syslog */
 | |
|     int      *maxlog_enabled = &config_get_global_options()->maxlog; /** Log with MaxScale */
 | |
|     int      *log_to_shm = &config_get_global_options()->log_to_shm; /** Log to shared memory */
 | |
|     ssize_t  log_flush_timeout_ms = 0;
 | |
|     sigset_t sigpipe_mask;
 | |
|     sigset_t saved_mask;
 | |
|     bool config_check = false;
 | |
|     bool to_stdout = false;
 | |
|     void   (*exitfunp[4])(void) = { mxs_log_finish, cleanup_process_datadir, write_footer, NULL };
 | |
|     int numlocks = 0;
 | |
|     bool pid_file_created = false;
 | |
|     Worker* worker;
 | |
|     const char* specified_user = NULL;
 | |
| 
 | |
|     config_set_global_defaults();
 | |
|     MXS_CONFIG* cnf = config_get_global_options();
 | |
|     ss_dassert(cnf);
 | |
| 
 | |
|     maxscale_reset_starttime();
 | |
| 
 | |
|     sigemptyset(&sigpipe_mask);
 | |
|     sigaddset(&sigpipe_mask, SIGPIPE);
 | |
|     progname = *argv;
 | |
|     snprintf(datadir, PATH_MAX, "%s", default_datadir);
 | |
|     datadir[PATH_MAX] = '\0';
 | |
|     file_write_header(stderr);
 | |
| 
 | |
|     // Option string for getopt
 | |
|     const char accepted_opts[] = "dncf:g:l:vVs:S:?L:D:C:B:U:A:P:G:N:E:F:M:H:p";
 | |
| 
 | |
|     /*<
 | |
|      * Register functions which are called at exit.
 | |
|      */
 | |
|     for (int i = 0; exitfunp[i] != NULL; i++)
 | |
|     {
 | |
|         int l = atexit(*exitfunp);
 | |
| 
 | |
|         if (l != 0)
 | |
|         {
 | |
|             const char* fprerr = "Failed to register exit functions for MaxScale";
 | |
|             print_log_n_stderr(false, true, NULL, fprerr, 0);
 | |
|             rc = MAXSCALE_INTERNALERROR;
 | |
|             goto return_main;
 | |
|         }
 | |
|     }
 | |
| 
 | |
| #ifdef HAVE_GLIBC
 | |
|     while ((opt = getopt_long(argc, argv, accepted_opts,
 | |
|                               long_options, &option_index)) != -1)
 | |
| #else
 | |
|     while ((opt = getopt(argc, argv, accepted_opts)) != -1)
 | |
| #endif
 | |
|     {
 | |
|         bool succp = true;
 | |
| 
 | |
|         switch (opt)
 | |
|         {
 | |
|         case 'n':
 | |
|             /*< Daemon mode, MaxScale forks and parent exits. */
 | |
|             daemon_mode = true;
 | |
|             break;
 | |
| 
 | |
|         case 'd':
 | |
|             /*< Non-daemon mode, MaxScale does not fork. */
 | |
|             daemon_mode = false;
 | |
|             break;
 | |
| 
 | |
|         case 'f':
 | |
|             /*<
 | |
|              * Simply copy the conf file argument. Expand or validate
 | |
|              * it when MaxScale home directory is resolved.
 | |
|              */
 | |
|             if (optarg[0] != '-')
 | |
|             {
 | |
|                 cnf_file_arg = strndup(optarg, PATH_MAX);
 | |
|             }
 | |
|             if (cnf_file_arg == NULL)
 | |
|             {
 | |
|                 const char* logerr =
 | |
|                     "Configuration file argument "
 | |
|                     "identifier \'-f\' was specified but "
 | |
|                     "the argument didn't specify\n  a valid "
 | |
|                     "configuration file or the argument "
 | |
|                     "was missing.";
 | |
|                 print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|                 usage();
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
| 
 | |
|         case 'v':
 | |
|             rc = EXIT_SUCCESS;
 | |
|             printf("MaxScale %s\n", MAXSCALE_VERSION);
 | |
|             goto return_main;
 | |
| 
 | |
|         case 'V':
 | |
|             rc = EXIT_SUCCESS;
 | |
|             printf("MaxScale %s - %s\n", MAXSCALE_VERSION, maxscale_commit);
 | |
| 
 | |
|             // MAXSCALE_SOURCE is two values separated by a space, see CMakeLists.txt
 | |
|             if (strcmp(MAXSCALE_SOURCE, " ") != 0)
 | |
|             {
 | |
|                 printf("Source:        %s\n", MAXSCALE_SOURCE);
 | |
|             }
 | |
|             if (strcmp(MAXSCALE_CMAKE_FLAGS, "") != 0)
 | |
|             {
 | |
|                 printf("CMake flags:   %s\n", MAXSCALE_CMAKE_FLAGS);
 | |
|             }
 | |
|             if (strcmp(MAXSCALE_JENKINS_BUILD_TAG, "") != 0)
 | |
|             {
 | |
|                 printf("Jenkins build: %s\n", MAXSCALE_JENKINS_BUILD_TAG);
 | |
|             }
 | |
|             goto return_main;
 | |
| 
 | |
|         case 'l':
 | |
|             if (strncasecmp(optarg, "file", PATH_MAX) == 0)
 | |
|             {
 | |
|                 *log_to_shm = false;
 | |
|                 log_to_shm_configured = true;
 | |
|             }
 | |
|             else if (strncasecmp(optarg, "shm", PATH_MAX) == 0)
 | |
|             {
 | |
|                 *log_to_shm = true;
 | |
|                 log_to_shm_configured = true;
 | |
|             }
 | |
|             else if (strncasecmp(optarg, "stdout", PATH_MAX) == 0)
 | |
|             {
 | |
|                 to_stdout = true;
 | |
|                 *log_to_shm = false;
 | |
|                 log_to_shm_configured = true;
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 const char* logerr =
 | |
|                     "Configuration file argument "
 | |
|                     "identifier \'-l\' was specified but "
 | |
|                     "the argument didn't specify\n  a valid "
 | |
|                     "configuration file or the argument "
 | |
|                     "was missing.";
 | |
|                 print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|                 usage();
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'L':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, false))
 | |
|             {
 | |
|                 set_logdir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'N':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, false))
 | |
|             {
 | |
|                 set_langdir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'P':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, true))
 | |
|             {
 | |
|                 set_piddir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'D':
 | |
|             snprintf(datadir, PATH_MAX, "%s", optarg);
 | |
|             datadir[PATH_MAX] = '\0';
 | |
|             set_datadir(MXS_STRDUP_A(optarg));
 | |
|             datadir_defined = true;
 | |
|             break;
 | |
|         case 'C':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, false))
 | |
|             {
 | |
|                 set_configdir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'B':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, false))
 | |
|             {
 | |
|                 set_libdir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'A':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, true))
 | |
|             {
 | |
|                 set_cachedir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
| 
 | |
|         case 'E':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, false))
 | |
|             {
 | |
|                 set_execdir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'H':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, false))
 | |
|             {
 | |
|                 set_connector_plugindir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'F':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, true))
 | |
|             {
 | |
|                 set_config_persistdir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
| 
 | |
|         case 'M':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, true))
 | |
|             {
 | |
|                 set_module_configdir(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
| 
 | |
|         case 'R':
 | |
|             if (handle_path_arg(&tmp_path, optarg, NULL, true, false))
 | |
|             {
 | |
|                 succp = set_dirs(tmp_path);
 | |
|                 free(tmp_path);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
| 
 | |
|         case 'S':
 | |
|             {
 | |
|                 char* tok = strstr(optarg, "=");
 | |
|                 if (tok)
 | |
|                 {
 | |
|                     tok++;
 | |
|                     if (tok)
 | |
|                     {
 | |
|                         *maxlog_enabled = config_truth_value(tok);
 | |
|                         maxlog_configured = true;
 | |
|                     }
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     *maxlog_enabled = config_truth_value(optarg);
 | |
|                     maxlog_configured = true;
 | |
|                 }
 | |
|             }
 | |
|             break;
 | |
|         case 's':
 | |
|             {
 | |
|                 char* tok = strstr(optarg, "=");
 | |
|                 if (tok)
 | |
|                 {
 | |
|                     tok++;
 | |
|                     if (tok)
 | |
|                     {
 | |
|                         *syslog_enabled = config_truth_value(tok);
 | |
|                         syslog_configured = true;
 | |
|                     }
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     *syslog_enabled = config_truth_value(optarg);
 | |
|                     syslog_configured = true;
 | |
|                 }
 | |
|             }
 | |
|             break;
 | |
|         case 'U':
 | |
|             specified_user = optarg;
 | |
|             if (set_user(specified_user) != 0)
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
|         case 'G':
 | |
|             set_log_augmentation(optarg);
 | |
|             break;
 | |
|         case '?':
 | |
|             usage();
 | |
|             rc = EXIT_SUCCESS;
 | |
|             goto return_main;
 | |
| 
 | |
|         case 'c':
 | |
|             config_check = true;
 | |
|             break;
 | |
| 
 | |
|         case 'p':
 | |
|             cnf->passive = true;
 | |
|             break;
 | |
| 
 | |
|         case 'g':
 | |
|             if (!handle_debug_args(optarg))
 | |
|             {
 | |
|                 succp = false;
 | |
|             }
 | |
|             break;
 | |
| 
 | |
|         default:
 | |
|             usage();
 | |
|             succp = false;
 | |
|             break;
 | |
|         }
 | |
| 
 | |
|         if (!succp)
 | |
|         {
 | |
|             rc = MAXSCALE_BADARG;
 | |
|             goto return_main;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (!user_is_acceptable(specified_user))
 | |
|     {
 | |
|         // Error was logged in user_is_acceptable().
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     if (config_check)
 | |
|     {
 | |
|         daemon_mode = false;
 | |
|         to_stdout = true;
 | |
|     }
 | |
| 
 | |
|     if (!daemon_mode)
 | |
|     {
 | |
|         fprintf(stderr,
 | |
|                 "Info : MaxScale will be run in the terminal process.\n");
 | |
| #if defined(SS_DEBUG)
 | |
|         fprintf(stderr,
 | |
|                 "\tSee "
 | |
|                 "the log from the following log files : \n\n");
 | |
| #endif
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         if (pipe(daemon_pipe) == -1)
 | |
|         {
 | |
|             fprintf(stderr, "Error: Failed to create pipe for inter-process communication: %d %s",
 | |
|                     errno, strerror(errno));
 | |
|             rc = MAXSCALE_INTERNALERROR;
 | |
|             goto return_main;
 | |
|         }
 | |
| 
 | |
|         /*<
 | |
|          * Maxscale must be daemonized before opening files, initializing
 | |
|          * embedded MariaDB and in general, as early as possible.
 | |
|          */
 | |
| 
 | |
|         if (!disable_signals())
 | |
|         {
 | |
|             rc = MAXSCALE_INTERNALERROR;
 | |
|             goto return_main;
 | |
|         }
 | |
| 
 | |
|         /** Daemonize the process and wait for the child process to notify
 | |
|          * the parent process of its exit status. */
 | |
|         parent_process = daemonize();
 | |
| 
 | |
|         if (parent_process)
 | |
|         {
 | |
|             close(daemon_pipe[1]);
 | |
|             int nread = read(daemon_pipe[0], (void*)&child_status, sizeof(int));
 | |
|             close(daemon_pipe[0]);
 | |
| 
 | |
|             if (nread == -1)
 | |
|             {
 | |
|                 const char* logerr = "Failed to read data from child process pipe.";
 | |
|                 print_log_n_stderr(true, true, logerr, logerr, errno);
 | |
|                 exit(MAXSCALE_INTERNALERROR);
 | |
|             }
 | |
|             else if (nread == 0)
 | |
|             {
 | |
|                 /** Child process has exited or closed write pipe */
 | |
|                 const char* logerr = "No data read from child process pipe.";
 | |
|                 print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|                 exit(MAXSCALE_INTERNALERROR);
 | |
|             }
 | |
| 
 | |
|             _exit(child_status);
 | |
|         }
 | |
| 
 | |
|         /** This is the child process and we can close the read end of
 | |
|          * the pipe. */
 | |
|         close(daemon_pipe[0]);
 | |
|     }
 | |
|     /*<
 | |
|      * Set signal handlers for SIGHUP, SIGTERM, SIGINT and critical signals like SIGSEGV.
 | |
|      */
 | |
|     if (!configure_signals())
 | |
|     {
 | |
|         static const char* logerr = "Failed to configure signal handlers. Exiting.";
 | |
| 
 | |
|         print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
|     eno = pthread_sigmask(SIG_BLOCK, &sigpipe_mask, &saved_mask);
 | |
| 
 | |
|     if (eno != 0)
 | |
|     {
 | |
|         const char* logerr = "Failed to initialise signal mask for MaxScale. Exiting.";
 | |
|         print_log_n_stderr(true, true, logerr, logerr, eno);
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     /** Initialize the random number generator */
 | |
|     random_jkiss_init();
 | |
| 
 | |
|     if (!utils_init())
 | |
|     {
 | |
|         const char* logerr = "Failed to initialise utility library.";
 | |
|         print_log_n_stderr(true, true, logerr, logerr, eno);
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     /** OpenSSL initialization */
 | |
|     if (!HAVE_OPENSSL_THREADS)
 | |
|     {
 | |
|         const char* logerr = "OpenSSL library does not support multi-threading";
 | |
|         print_log_n_stderr(true, true, logerr, logerr, eno);
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
|     SSL_library_init();
 | |
|     SSL_load_error_strings();
 | |
|     OPENSSL_add_all_algorithms_noconf();
 | |
| 
 | |
| #ifndef OPENSSL_1_1
 | |
|     numlocks = CRYPTO_num_locks();
 | |
|     if ((ssl_locks = (SPINLOCK*)MXS_MALLOC(sizeof(SPINLOCK) * (numlocks + 1))) == NULL)
 | |
|     {
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     for (int i = 0; i < numlocks + 1; i++)
 | |
|     {
 | |
|         spinlock_init(&ssl_locks[i]);
 | |
|     }
 | |
|     CRYPTO_set_locking_callback(ssl_locking_function);
 | |
|     CRYPTO_set_dynlock_create_callback(ssl_create_dynlock);
 | |
|     CRYPTO_set_dynlock_destroy_callback(ssl_free_dynlock);
 | |
|     CRYPTO_set_dynlock_lock_callback(ssl_lock_dynlock);
 | |
| #ifdef OPENSSL_1_0
 | |
|     CRYPTO_THREADID_set_callback(maxscale_ssl_id);
 | |
| #else
 | |
|     CRYPTO_set_id_callback(pthread_self);
 | |
| #endif
 | |
| #endif
 | |
| 
 | |
|     /**
 | |
|      * Resolve the full pathname for configuration file and check for
 | |
|      * read accessibility.
 | |
|      */
 | |
|     char pathbuf[PATH_MAX + 1];
 | |
|     snprintf(pathbuf, PATH_MAX, "%s", get_configdir());
 | |
|     pathbuf[PATH_MAX] = '\0';
 | |
|     if (pathbuf[strlen(pathbuf) - 1] != '/')
 | |
|     {
 | |
|         strcat(pathbuf, "/");
 | |
|     }
 | |
| 
 | |
|     if (!resolve_maxscale_conf_fname(&cnf_file_path, pathbuf, cnf_file_arg))
 | |
|     {
 | |
|         rc = MAXSCALE_BADCONFIG;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     if (!sniff_configuration(cnf_file_path))
 | |
|     {
 | |
|         rc = MAXSCALE_BADCONFIG;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Init Log Manager for MaxScale.
 | |
|      */
 | |
|     {
 | |
|         bool succp;
 | |
| 
 | |
|         if (mkdir(get_logdir(), 0777) != 0 && errno != EEXIST)
 | |
|         {
 | |
|             fprintf(stderr,
 | |
|                     "Error: Cannot create log directory: %s\n",
 | |
|                     default_logdir);
 | |
|             goto return_main;
 | |
|         }
 | |
| 
 | |
|         mxs_log_set_syslog_enabled(*syslog_enabled);
 | |
|         mxs_log_set_maxlog_enabled(*maxlog_enabled);
 | |
| 
 | |
|         mxs_log_target_t log_target = MXS_LOG_TARGET_FS;
 | |
| 
 | |
|         if (to_stdout)
 | |
|         {
 | |
|             log_target = MXS_LOG_TARGET_STDOUT;
 | |
|         }
 | |
|         else if (*log_to_shm)
 | |
|         {
 | |
|             log_target = MXS_LOG_TARGET_SHMEM;
 | |
|         }
 | |
| 
 | |
|         succp = mxs_log_init(NULL, get_logdir(), log_target);
 | |
| 
 | |
|         if (!succp)
 | |
|         {
 | |
|             rc = MAXSCALE_BADCONFIG;
 | |
|             goto return_main;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (daemon_mode)
 | |
|     {
 | |
|         if (!change_cwd())
 | |
|         {
 | |
|             rc = MAXSCALE_INTERNALERROR;
 | |
|             goto return_main;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     MXS_NOTICE("MariaDB MaxScale %s started", MAXSCALE_VERSION);
 | |
|     MXS_NOTICE("MaxScale is running in process %i", getpid());
 | |
| 
 | |
| #ifdef SS_DEBUG
 | |
|     MXS_NOTICE("Commit: %s", MAXSCALE_COMMIT);
 | |
| #endif
 | |
| 
 | |
|     /*
 | |
|      * Set the data directory. We use a unique directory name to avoid conflicts
 | |
|      * if multiple instances of MaxScale are being run on the same machine.
 | |
|      */
 | |
|     if (create_datadir(get_datadir(), datadir))
 | |
|     {
 | |
|         set_process_datadir(datadir);
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         MXS_ERROR("Cannot create data directory '%s': %d %s\n",
 | |
|                   datadir, errno, mxs_strerror(errno));
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     if (!daemon_mode)
 | |
|     {
 | |
|         fprintf(stderr,
 | |
|                 "Configuration file : %s\n"
 | |
|                 "Log directory      : %s\n"
 | |
|                 "Data directory     : %s\n"
 | |
|                 "Module directory   : %s\n"
 | |
|                 "Service cache      : %s\n\n",
 | |
|                 cnf_file_path,
 | |
|                 get_logdir(),
 | |
|                 get_datadir(),
 | |
|                 get_libdir(),
 | |
|                 get_cachedir());
 | |
|     }
 | |
| 
 | |
|     if (!(*syslog_enabled) && !(*maxlog_enabled))
 | |
|     {
 | |
|         fprintf(stderr, "warning: Both MaxScale and Syslog logging disabled.\n");
 | |
|     }
 | |
| 
 | |
|     MXS_NOTICE("Configuration file: %s", cnf_file_path);
 | |
|     MXS_NOTICE("Log directory: %s", get_logdir());
 | |
|     MXS_NOTICE("Data directory: %s", get_datadir());
 | |
|     MXS_NOTICE("Module directory: %s", get_libdir());
 | |
|     MXS_NOTICE("Service cache: %s", get_cachedir());
 | |
| 
 | |
|     if (!config_load(cnf_file_path))
 | |
|     {
 | |
|         const char* fprerr =
 | |
|             "Failed to open, read or process the MaxScale configuration "
 | |
|             "file. Exiting. See the error log for details.";
 | |
|         print_log_n_stderr(false, true, fprerr, fprerr, 0);
 | |
|         MXS_ERROR("Failed to open, read or process the MaxScale configuration file %s. "
 | |
|                   "Exiting.",
 | |
|                   cnf_file_path);
 | |
|         rc = MAXSCALE_BADCONFIG;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     if (!qc_setup(cnf->qc_name, cnf->qc_sql_mode, cnf->qc_args))
 | |
|     {
 | |
|         const char* logerr = "Failed to initialise query classifier library.";
 | |
|         print_log_n_stderr(true, true, logerr, logerr, eno);
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     cnf->config_check = config_check;
 | |
| 
 | |
|     if (!config_check)
 | |
|     {
 | |
|         /** Check if a MaxScale process is already running */
 | |
|         if (pid_file_exists())
 | |
|         {
 | |
|             /** There is a process with the PID of the maxscale.pid file running.
 | |
|              * Assuming that this is an already running MaxScale process, we
 | |
|              * should exit with an error code.  */
 | |
|             rc = MAXSCALE_ALREADYRUNNING;
 | |
|             goto return_main;
 | |
|         }
 | |
| 
 | |
|         /* Write process pid into MaxScale pidfile */
 | |
|         if (write_pid_file() != 0)
 | |
|         {
 | |
|             rc = MAXSCALE_ALREADYRUNNING;
 | |
|             goto return_main;
 | |
|         }
 | |
| 
 | |
|         pid_file_created = true;
 | |
|     }
 | |
| 
 | |
|     if (!redirect_output_to.empty())
 | |
|     {
 | |
|         if (freopen(redirect_output_to.c_str(), "a", stdout))
 | |
|         {
 | |
|             if (!freopen(redirect_output_to.c_str(), "a", stderr))
 | |
|             {
 | |
|                 const char* logstr = "Failed to redirect stderr to file.";
 | |
|                 // No point logging to stderr as its state is now not known.
 | |
|                 print_log_n_stderr(true, false, logstr, logstr, errno);
 | |
|                 rc = MAXSCALE_INTERNALERROR;
 | |
|                 goto return_main;
 | |
|             }
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             const char* logstr = "Failed to redirect stdout to file.";
 | |
|             print_log_n_stderr(true, true, logstr, logstr, errno);
 | |
|             rc = MAXSCALE_INTERNALERROR;
 | |
|             goto return_main;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /** Initialize statistics */
 | |
|     ts_stats_init();
 | |
| 
 | |
|     /* Init MaxScale poll system */
 | |
|     poll_init();
 | |
| 
 | |
|     dcb_global_init();
 | |
| 
 | |
|     /** Load the admin users */
 | |
|     admin_users_init();
 | |
| 
 | |
|     /* Initialize the internal query classifier. The plugin will be initialized
 | |
|      * via the module initialization below.
 | |
|      */
 | |
|     if (!qc_process_init(QC_INIT_SELF))
 | |
|     {
 | |
|         MXS_ERROR("Failed to initialize the internal query classifier.");
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     if (!MessageQueue::init())
 | |
|     {
 | |
|         MXS_ERROR("Failed to initialize message queue.");
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     if (!Worker::init())
 | |
|     {
 | |
|         MXS_ERROR("Failed to initialize workers.");
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     /* Init MaxScale modules */
 | |
|     if (!modules_process_init())
 | |
|     {
 | |
|         MXS_ERROR("Failed to initialize all modules at startup. Exiting.");
 | |
|         rc = MAXSCALE_BADCONFIG;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     /** Start all monitors */
 | |
|     monitorStartAll();
 | |
| 
 | |
|     /** Start the services that were created above */
 | |
|     n_services = service_launch_all();
 | |
| 
 | |
|     if (n_services == 0)
 | |
|     {
 | |
|         const char* logerr = "Failed to start all MaxScale services. Exiting.";
 | |
|         print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|         rc = MAXSCALE_NOSERVICES;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     if (config_check)
 | |
|     {
 | |
|         MXS_NOTICE("Configuration was successfully verified.");
 | |
|         rc = MAXSCALE_SHUTDOWN;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     /*<
 | |
|      * Start periodic log flusher thread.
 | |
|      */
 | |
|     log_flush_timeout_ms = 1000;
 | |
| 
 | |
|     if (thread_start(&log_flush_thr, log_flush_cb, (void *) &log_flush_timeout_ms, 0) == NULL)
 | |
|     {
 | |
|         const char* logerr = "Failed to start log flushing thread.";
 | |
|         print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * Start the housekeeper thread
 | |
|      */
 | |
|     if (!hkinit())
 | |
|     {
 | |
|         const char* logerr = "Failed to start housekeeper thread.";
 | |
|         print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|         rc = MAXSCALE_INTERNALERROR;
 | |
|         goto return_main;
 | |
|     }
 | |
| 
 | |
|     /*<
 | |
|      * Start the polling threads, note this is one less than is
 | |
|      * configured as the main thread will also poll.
 | |
|      */
 | |
|     n_threads = config_threadcount();
 | |
| 
 | |
|     /*<
 | |
|      * Start workers. We start from 1, worker 0 will be running in the main thread.
 | |
|      */
 | |
|     thread_stack_size = config_thread_stack_size();
 | |
|     for (int i = 1; i < n_threads; i++)
 | |
|     {
 | |
|         worker = Worker::get(i);
 | |
|         ss_dassert(worker);
 | |
| 
 | |
|         if (!worker->start(thread_stack_size))
 | |
|         {
 | |
|             const char* logerr = "Failed to start worker thread.";
 | |
|             print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|             rc = MAXSCALE_INTERNALERROR;
 | |
|             goto return_main;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (cnf->admin_enabled)
 | |
|     {
 | |
|         bool success = mxs_admin_init();
 | |
| 
 | |
|         if (!success && strcmp(cnf->admin_host, "::") == 0)
 | |
|         {
 | |
|             MXS_WARNING("Failed to bind on address '::', attempting to "
 | |
|                         "bind on IPv4 address '0.0.0.0'.");
 | |
|             strcpy(cnf->admin_host, "0.0.0.0");
 | |
|             success = mxs_admin_init();
 | |
|         }
 | |
| 
 | |
|         if (success)
 | |
|         {
 | |
|             MXS_NOTICE("Started REST API on [%s]:%u", cnf->admin_host, cnf->admin_port);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             const char* logerr = "Failed to initialize admin interface";
 | |
|             print_log_n_stderr(true, true, logerr, logerr, 0);
 | |
|             rc = MAXSCALE_INTERNALERROR;
 | |
|             goto return_main;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     MXS_NOTICE("MaxScale started with %d worker threads, each with a stack size of %lu bytes.",
 | |
|                n_threads, thread_stack_size);
 | |
| 
 | |
|     /**
 | |
|      * Successful start, notify the parent process that it can exit.
 | |
|      */
 | |
|     ss_dassert(rc == MAXSCALE_SHUTDOWN);
 | |
|     if (daemon_mode)
 | |
|     {
 | |
|         write_child_exit_code(daemon_pipe[1], rc);
 | |
|     }
 | |
| 
 | |
|     /*<
 | |
|      * Run worker 0 in the main thread.
 | |
|      */
 | |
|     worker = Worker::get(0);
 | |
|     ss_dassert(worker);
 | |
|     worker->run();
 | |
| 
 | |
|     /*< Stop all the monitors */
 | |
|     monitorStopAll();
 | |
| 
 | |
|     /** Stop administrative interface */
 | |
|     mxs_admin_shutdown();
 | |
| 
 | |
|     /*< Stop all the monitors */
 | |
|     monitorStopAll();
 | |
| 
 | |
|     /*<
 | |
|      * Wait for the housekeeper to finish.
 | |
|      */
 | |
|     hkfinish();
 | |
| 
 | |
|     /*<
 | |
|      * Wait for worker threads to exit.
 | |
|      */
 | |
|     for (int i = 1; i < n_threads; i++)
 | |
|     {
 | |
|         worker = Worker::get(i);
 | |
|         ss_dassert(worker);
 | |
| 
 | |
|         worker->join();
 | |
|     }
 | |
| 
 | |
|     /*<
 | |
|      * Destroy the router and filter instances of all services.
 | |
|      */
 | |
|     service_destroy_instances();
 | |
| 
 | |
|     Worker::finish();
 | |
|     MessageQueue::finish();
 | |
| 
 | |
|     /*<
 | |
|      * Wait the flush thread.
 | |
|      */
 | |
|     thread_wait(log_flush_thr);
 | |
| 
 | |
|     /*< Call finish on all modules. */
 | |
|     modules_process_finish();
 | |
| 
 | |
|     /* Finalize the internal query classifier. The plugin was finalized
 | |
|      * via the module finalizarion above.
 | |
|      */
 | |
|     qc_process_end(QC_INIT_SELF);
 | |
| 
 | |
|     log_exit_status();
 | |
|     MXS_NOTICE("MaxScale is shutting down.");
 | |
| 
 | |
|     utils_end();
 | |
|     cleanup_process_datadir();
 | |
|     MXS_NOTICE("MaxScale shutdown completed.");
 | |
| 
 | |
|     if (unload_modules_at_exit)
 | |
|     {
 | |
|         unload_all_modules();
 | |
|     }
 | |
| 
 | |
|     ERR_free_strings();
 | |
|     EVP_cleanup();
 | |
| 
 | |
| return_main:
 | |
|     if (pid_file_created)
 | |
|     {
 | |
|         unlock_pidfile();
 | |
|         unlink_pidfile();
 | |
|     }
 | |
| 
 | |
|     mxs_log_flush_sync();
 | |
| 
 | |
|     if (daemon_mode && rc != MAXSCALE_SHUTDOWN)
 | |
|     {
 | |
|         /** Notify the parent process that an error has occurred */
 | |
|         write_child_exit_code(daemon_pipe[1], rc);
 | |
|     }
 | |
| 
 | |
|     MXS_FREE(cnf_file_arg);
 | |
| 
 | |
|     if (cnf_file_path)
 | |
|     {
 | |
|         MXS_FREE(cnf_file_path);
 | |
|     }
 | |
| 
 | |
|     return rc;
 | |
| } /*< End of main */
 | |
| 
 | |
| /*<
 | |
|  * Shutdown MaxScale server
 | |
|  */
 | |
| int maxscale_shutdown()
 | |
| {
 | |
|     static int n_shutdowns = 0;
 | |
| 
 | |
|     int n = atomic_add(&n_shutdowns, 1);
 | |
| 
 | |
|     if (n == 0)
 | |
|     {
 | |
|         service_shutdown();
 | |
|         Worker::shutdown_all();
 | |
|         hkshutdown();
 | |
|         log_flush_shutdown();
 | |
|     }
 | |
| 
 | |
|     return n + 1;
 | |
| }
 | |
| 
 | |
| static void log_flush_shutdown(void)
 | |
| {
 | |
|     do_exit = true;
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|  * Periodic log flusher to ensure that log buffers are
 | |
|  * written to log even if block buffer used for temporarily
 | |
|  * storing log contents are not full.
 | |
|  *
 | |
|  * @param arg - Flush frequency in milliseconds
 | |
|  *
 | |
|  *
 | |
|  */
 | |
| static void log_flush_cb(void* arg)
 | |
| {
 | |
|     ssize_t timeout_ms = *(ssize_t *)arg;
 | |
|     struct timespec ts1;
 | |
| 
 | |
|     ts1.tv_sec = timeout_ms / 1000;
 | |
|     ts1.tv_nsec = (timeout_ms % 1000) * 1000000;
 | |
| 
 | |
|     MXS_NOTICE("Started MaxScale log flusher.");
 | |
|     while (!do_exit)
 | |
|     {
 | |
|         mxs_log_flush();
 | |
|         nanosleep(&ts1, NULL);
 | |
|     }
 | |
|     MXS_NOTICE("Finished MaxScale log flusher.");
 | |
| }
 | |
| 
 | |
| static void unlock_pidfile()
 | |
| {
 | |
|     if (pidfd != PIDFD_CLOSED)
 | |
|     {
 | |
|         if (flock(pidfd, LOCK_UN | LOCK_NB) != 0)
 | |
|         {
 | |
|             char logbuf[STRING_BUFFER_SIZE + PATH_MAX];
 | |
|             const char* logerr = "Failed to unlock PID file '%s'.";
 | |
|             snprintf(logbuf, sizeof(logbuf), logerr, pidfile);
 | |
|             print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|         }
 | |
|         close(pidfd);
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Unlink pid file, called at program exit
 | |
|  */
 | |
| static void unlink_pidfile(void)
 | |
| {
 | |
|     if (strlen(pidfile))
 | |
|     {
 | |
|         if (unlink(pidfile))
 | |
|         {
 | |
|             fprintf(stderr,
 | |
|                     "MaxScale failed to remove pidfile %s: error %d, %s\n",
 | |
|                     pidfile,
 | |
|                     errno,
 | |
|                     mxs_strerror(errno));
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Check if the maxscale.pid file exists and has a valid PID in it. If one has already been
 | |
|  * written and a MaxScale process is running, this instance of MaxScale should shut down.
 | |
|  * @return True if the conditions for starting MaxScale are not met and false if
 | |
|  * no PID file was found or there is no process running with the PID of the maxscale.pid
 | |
|  * file. If false is returned, this process should continue normally.
 | |
|  */
 | |
| bool pid_file_exists()
 | |
| {
 | |
|     char pathbuf[PATH_MAX + 1];
 | |
|     char logbuf[STRING_BUFFER_SIZE + PATH_MAX];
 | |
|     char pidbuf[STRING_BUFFER_SIZE];
 | |
|     pid_t pid;
 | |
|     bool lock_failed = false;
 | |
| 
 | |
|     snprintf(pathbuf, PATH_MAX, "%s/maxscale.pid", get_piddir());
 | |
|     pathbuf[PATH_MAX] = '\0';
 | |
| 
 | |
|     if (access(pathbuf, F_OK) != 0)
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     if (access(pathbuf, R_OK) == 0)
 | |
|     {
 | |
|         int fd, b;
 | |
| 
 | |
|         if ((fd = open(pathbuf, O_RDWR)) == -1)
 | |
|         {
 | |
|             const char* logerr = "Failed to open PID file '%s'.";
 | |
|             snprintf(logbuf, sizeof(logbuf), logerr, pathbuf);
 | |
|             print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|             return true;
 | |
|         }
 | |
|         if (flock(fd, LOCK_EX | LOCK_NB))
 | |
|         {
 | |
|             if (errno != EWOULDBLOCK)
 | |
|             {
 | |
|                 const char* logerr = "Failed to lock PID file '%s'.";
 | |
|                 snprintf(logbuf, sizeof(logbuf), logerr, pathbuf);
 | |
|                 print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|                 close(fd);
 | |
|                 return true;
 | |
|             }
 | |
|             lock_failed = true;
 | |
|         }
 | |
| 
 | |
|         pidfd = fd;
 | |
|         b = read(fd, pidbuf, sizeof(pidbuf));
 | |
| 
 | |
|         if (b == -1)
 | |
|         {
 | |
|             const char* logerr = "Failed to read from PID file '%s'.";
 | |
|             snprintf(logbuf, sizeof(logbuf), logerr, pathbuf);
 | |
|             print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|             unlock_pidfile();
 | |
|             return true;
 | |
|         }
 | |
|         else if (b == 0)
 | |
|         {
 | |
|             /** Empty file */
 | |
|             const char* logerr =
 | |
|                 "PID file read from '%s'. File was empty.\n"
 | |
|                 "If the file is the correct PID file and no other MaxScale processes "
 | |
|                 "are running, please remove it manually and start MaxScale again.";
 | |
|             snprintf(logbuf, sizeof(logbuf), logerr, pathbuf);
 | |
|             print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|             unlock_pidfile();
 | |
|             return true;
 | |
|         }
 | |
| 
 | |
|         pidbuf[(size_t)b < sizeof(pidbuf) ? (size_t)b : sizeof(pidbuf) - 1] = '\0';
 | |
|         pid = strtol(pidbuf, NULL, 0);
 | |
| 
 | |
|         if (pid < 1)
 | |
|         {
 | |
|             /** Bad PID */
 | |
|             const char* logerr =
 | |
|                 "PID file read from '%s'. File contents not valid.\n"
 | |
|                 "If the file is the correct PID file and no other MaxScale processes "
 | |
|                 "are running, please remove it manually and start MaxScale again.";
 | |
|             snprintf(logbuf, sizeof(logbuf), logerr, pathbuf);
 | |
|             print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|             unlock_pidfile();
 | |
|             return true;
 | |
|         }
 | |
| 
 | |
|         if (kill(pid, 0) == -1)
 | |
|         {
 | |
|             if (errno == ESRCH)
 | |
|             {
 | |
|                 /** no such process, old PID file */
 | |
|                 if (lock_failed)
 | |
|                 {
 | |
|                     const char* logerr =
 | |
|                         "Locking the PID file '%s' failed. "
 | |
|                         "Read PID from file and no process found with PID %d. "
 | |
|                         "Confirm that no other process holds the lock on the PID file.";
 | |
|                     snprintf(logbuf, sizeof(logbuf), logerr, pathbuf, pid);
 | |
|                     print_log_n_stderr(true, true, logbuf, logbuf, 0);
 | |
|                     close(fd);
 | |
|                 }
 | |
|                 return lock_failed;
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 const char* logerr = "Failed to check the existence of process %d read from file '%s'";
 | |
|                 snprintf(logbuf, sizeof(logbuf), logerr, pid, pathbuf);
 | |
|                 print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|                 unlock_pidfile();
 | |
|             }
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             const char* logerr =
 | |
|                 "MaxScale is already running. Process id: %d. "
 | |
|                 "Use another location for the PID file to run multiple "
 | |
|                 "instances of MaxScale on the same machine.";
 | |
|             snprintf(logbuf, sizeof(logbuf), logerr, pid);
 | |
|             print_log_n_stderr(true, true, logbuf, logbuf, 0);
 | |
|             unlock_pidfile();
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         const char* logerr =
 | |
|             "Cannot open PID file '%s', no read permissions. "
 | |
|             "Please confirm that the user running MaxScale has read permissions on the file.";
 | |
|         snprintf(logbuf, sizeof(logbuf), logerr, pathbuf);
 | |
|         print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|     }
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Write process pid into pidfile anc close it
 | |
|  * Parameters:
 | |
|  * @param home_dir The MaxScale home dir
 | |
|  * @return 0 on success, 1 on failure
 | |
|  *
 | |
|  */
 | |
| 
 | |
| static int write_pid_file()
 | |
| {
 | |
|     if (!mxs_mkdir_all(get_piddir(), S_IRWXU | S_IRWXG | S_IROTH | S_IXOTH))
 | |
|     {
 | |
|         MXS_ERROR("Failed to create PID directory.");
 | |
|         return 1;
 | |
|     }
 | |
| 
 | |
|     char logbuf[STRING_BUFFER_SIZE + PATH_MAX];
 | |
|     char pidstr[STRING_BUFFER_SIZE];
 | |
| 
 | |
|     snprintf(pidfile, PATH_MAX, "%s/maxscale.pid", get_piddir());
 | |
| 
 | |
|     if (pidfd == PIDFD_CLOSED)
 | |
|     {
 | |
|         int fd = -1;
 | |
| 
 | |
|         fd = open(pidfile, O_WRONLY | O_CREAT, 0777);
 | |
|         if (fd == -1)
 | |
|         {
 | |
|             const char* logerr = "Failed to open PID file '%s'.";
 | |
|             snprintf(logbuf, sizeof(logbuf), logerr, pidfile);
 | |
|             print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|             return -1;
 | |
|         }
 | |
| 
 | |
|         if (flock(fd, LOCK_EX | LOCK_NB))
 | |
|         {
 | |
|             if (errno == EWOULDBLOCK)
 | |
|             {
 | |
|                 snprintf(logbuf, sizeof(logbuf),
 | |
|                          "Failed to lock PID file '%s', another process is holding a lock on it. "
 | |
|                          "Please confirm that no other MaxScale process is using the same "
 | |
|                          "PID file location.", pidfile);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 snprintf(logbuf, sizeof(logbuf), "Failed to lock PID file '%s'.", pidfile);
 | |
|             }
 | |
|             print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|             close(fd);
 | |
|             return -1;
 | |
|         }
 | |
|         pidfd = fd;
 | |
|     }
 | |
| 
 | |
|     /* truncate pidfile content */
 | |
|     if (ftruncate(pidfd, 0))
 | |
|     {
 | |
|         const char* logerr = "MaxScale failed to truncate PID file '%s'.";
 | |
|         snprintf(logbuf, sizeof(logbuf), logerr, pidfile);
 | |
|         print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|         unlock_pidfile();
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     snprintf(pidstr, sizeof(pidstr) - 1, "%d", getpid());
 | |
| 
 | |
|     if (pwrite(pidfd, pidstr, strlen(pidstr), 0) != (ssize_t)strlen(pidstr))
 | |
|     {
 | |
|         const char* logerr = "MaxScale failed to write into PID file '%s'.";
 | |
|         snprintf(logbuf, sizeof(logbuf), logerr, pidfile);
 | |
|         print_log_n_stderr(true, true, logbuf, logbuf, errno);
 | |
|         unlock_pidfile();
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     /* success */
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| bool handle_path_arg(char** dest, const char* path, const char* arg, bool rd, bool wr)
 | |
| {
 | |
|     char pathbuffer[PATH_MAX + 2];
 | |
|     char* errstr;
 | |
|     bool rval = false;
 | |
| 
 | |
|     if (path == NULL && arg == NULL)
 | |
|     {
 | |
|         return rval;
 | |
|     }
 | |
| 
 | |
|     if (path)
 | |
|     {
 | |
|         snprintf(pathbuffer, PATH_MAX, "%s", path);
 | |
|         if (pathbuffer[strlen(path) - 1] != '/')
 | |
|         {
 | |
|             strcat(pathbuffer, "/");
 | |
|         }
 | |
|         if (arg && strlen(pathbuffer) + strlen(arg) + 1 < PATH_MAX)
 | |
|         {
 | |
|             strcat(pathbuffer, arg);
 | |
|         }
 | |
| 
 | |
|         if ((errstr = check_dir_access(pathbuffer, rd, wr)) == NULL)
 | |
|         {
 | |
|             *dest = MXS_STRDUP_A(pathbuffer);
 | |
|             rval = true;
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             print_log_n_stderr(true, true, errstr, errstr, 0);
 | |
|             MXS_FREE(errstr);
 | |
|             errstr = NULL;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return rval;
 | |
| }
 | |
| 
 | |
| void set_log_augmentation(const char* value)
 | |
| {
 | |
|     // Command line arguments are handled first, thus command line argument
 | |
|     // has priority.
 | |
| 
 | |
|     static bool augmentation_set = false;
 | |
| 
 | |
|     if (!augmentation_set)
 | |
|     {
 | |
|         mxs_log_set_augmentation(atoi(value));
 | |
| 
 | |
|         augmentation_set = true;
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Pre-parse the configuration file for various directory paths.
 | |
|  * @param data    Pointer to variable where custom dynamically allocated
 | |
|  *                error message can be stored.
 | |
|  * @param section Section name
 | |
|  * @param name    Parameter name
 | |
|  * @param value   Parameter value
 | |
|  * @return 0 on error, 1 when successful
 | |
|  */
 | |
| static int cnf_preparser(void* data, const char* section, const char* name, const char* value)
 | |
| {
 | |
|     MXS_CONFIG* cnf = config_get_global_options();
 | |
| 
 | |
|     char *tmp;
 | |
|     /** These are read from the configuration file. These will not override
 | |
|      * command line parameters but will override default values. */
 | |
|     if (strcasecmp(section, "maxscale") == 0)
 | |
|     {
 | |
|         if (cnf->substitute_variables)
 | |
|         {
 | |
|             if (*value == '$')
 | |
|             {
 | |
|                 char* env_value = getenv(value + 1);
 | |
| 
 | |
|                 if (!env_value)
 | |
|                 {
 | |
|                     char** s = (char**)data;
 | |
| 
 | |
|                     static const char FORMAT[] = "The environment variable %s does not exist.";
 | |
|                     *s = (char*)MXS_MALLOC(sizeof(FORMAT) + strlen(value));
 | |
| 
 | |
|                     if (*s)
 | |
|                     {
 | |
|                         sprintf(*s, FORMAT, value + 1);
 | |
|                     }
 | |
| 
 | |
|                     return 0;
 | |
|                 }
 | |
| 
 | |
|                 value = env_value;
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         if (strcmp(name, "logdir") == 0)
 | |
|         {
 | |
|             if (strcmp(get_logdir(), default_logdir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg(&tmp, (char*)value, NULL, true, true))
 | |
|                 {
 | |
|                     set_logdir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "libdir") == 0)
 | |
|         {
 | |
|             if (strcmp(get_libdir(), default_libdir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg(&tmp, (char*)value, NULL, true, false))
 | |
|                 {
 | |
|                     set_libdir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "piddir") == 0)
 | |
|         {
 | |
|             if (strcmp(get_piddir(), default_piddir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg(&tmp, (char*)value, NULL, true, true))
 | |
|                 {
 | |
|                     set_piddir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "datadir") == 0)
 | |
|         {
 | |
|             if (!datadir_defined)
 | |
|             {
 | |
|                 if (handle_path_arg(&tmp, (char*)value, NULL, true, false))
 | |
|                 {
 | |
|                     snprintf(datadir, PATH_MAX, "%s", tmp);
 | |
|                     datadir[PATH_MAX] = '\0';
 | |
|                     set_datadir(tmp);
 | |
|                     datadir_defined = true;
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "cachedir") == 0)
 | |
|         {
 | |
|             if (strcmp(get_cachedir(), default_cachedir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg((char**)&tmp, (char*)value, NULL, true, false))
 | |
|                 {
 | |
|                     set_cachedir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "language") == 0)
 | |
|         {
 | |
|             if (strcmp(get_langdir(), default_langdir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg((char**)&tmp, (char*)value, NULL, true, false))
 | |
|                 {
 | |
|                     set_langdir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "execdir") == 0)
 | |
|         {
 | |
|             if (strcmp(get_execdir(), default_execdir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg((char**)&tmp, (char*)value, NULL, true, false))
 | |
|                 {
 | |
|                     set_execdir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "connector_plugindir") == 0)
 | |
|         {
 | |
|             if (strcmp(get_connector_plugindir(), default_connector_plugindir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg((char**)&tmp, (char*)value, NULL, true, false))
 | |
|                 {
 | |
|                     set_connector_plugindir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "persistdir") == 0)
 | |
|         {
 | |
|             if (strcmp(get_config_persistdir(), default_config_persistdir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg((char**)&tmp, (char*)value, NULL, true, false))
 | |
|                 {
 | |
|                     set_config_persistdir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "module_configdir") == 0)
 | |
|         {
 | |
|             if (strcmp(get_module_configdir(), default_module_configdir) == 0)
 | |
|             {
 | |
|                 if (handle_path_arg((char**)&tmp, (char*)value, NULL, true, false))
 | |
|                 {
 | |
|                     set_module_configdir(tmp);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     return 0;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "syslog") == 0)
 | |
|         {
 | |
|             if (!syslog_configured)
 | |
|             {
 | |
|                 cnf->syslog = config_truth_value((char*)value);
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "maxlog") == 0)
 | |
|         {
 | |
|             if (!maxlog_configured)
 | |
|             {
 | |
|                 cnf->maxlog = config_truth_value((char*)value);
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, "log_augmentation") == 0)
 | |
|         {
 | |
|             set_log_augmentation(value);
 | |
|         }
 | |
|         else if (strcmp(name, "log_to_shm") == 0)
 | |
|         {
 | |
|             if (!log_to_shm_configured)
 | |
|             {
 | |
|                 cnf->log_to_shm = config_truth_value((char*)value);
 | |
|             }
 | |
|         }
 | |
|         else if (strcmp(name, CN_SUBSTITUTE_VARIABLES) == 0)
 | |
|         {
 | |
|             cnf->substitute_variables = config_truth_value(value);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| static int set_user(const char* user)
 | |
| {
 | |
|     errno = 0;
 | |
|     struct passwd *pwname;
 | |
|     int rval;
 | |
| 
 | |
|     pwname = getpwnam(user);
 | |
|     if (pwname == NULL)
 | |
|     {
 | |
|         printf("Error: Failed to retrieve user information for '%s': %d %s\n",
 | |
|                user, errno, errno == 0 ? "User not found" : mxs_strerror(errno));
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     rval = setgid(pwname->pw_gid);
 | |
|     if (rval != 0)
 | |
|     {
 | |
|         printf("Error: Failed to change group to '%d': %d %s\n",
 | |
|                pwname->pw_gid, errno, mxs_strerror(errno));
 | |
|         return rval;
 | |
|     }
 | |
| 
 | |
|     rval = setuid(pwname->pw_uid);
 | |
|     if (rval != 0)
 | |
|     {
 | |
|         printf("Error: Failed to change user to '%s': %d %s\n",
 | |
|                pwname->pw_name, errno, mxs_strerror(errno));
 | |
|         return rval;
 | |
|     }
 | |
|     if (prctl(PR_GET_DUMPABLE) == 0)
 | |
|     {
 | |
|         if (prctl(PR_SET_DUMPABLE, 1) == -1)
 | |
|         {
 | |
|             printf("Error: Failed to set dumpable flag on for the process '%s': %d %s\n",
 | |
|                    pwname->pw_name, errno, mxs_strerror(errno));
 | |
|             return -1;
 | |
|         }
 | |
|     }
 | |
| #ifdef SS_DEBUG
 | |
|     else
 | |
|     {
 | |
|         printf("Running MaxScale as: %s %d:%d\n", pwname->pw_name, pwname->pw_uid, pwname->pw_gid);
 | |
|     }
 | |
| #endif
 | |
| 
 | |
| 
 | |
|     return rval;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Write the exit status of the child process to the parent process.
 | |
|  * @param fd File descriptor to write to
 | |
|  * @param code Exit status of the child process
 | |
|  */
 | |
| void write_child_exit_code(int fd, int code)
 | |
| {
 | |
|     /** Notify the parent process that an error has occurred */
 | |
|     if (write(fd, &code, sizeof (int)) == -1)
 | |
|     {
 | |
|         printf("Failed to write child process message!\n");
 | |
|     }
 | |
|     close(fd);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Change the current working directory
 | |
|  *
 | |
|  * Change the current working directory to the log directory. If this is not
 | |
|  * possible, try to change location to the file system root. If this also fails,
 | |
|  * return with an error.
 | |
|  * @return True if changing the current working directory was successful.
 | |
|  */
 | |
| static bool change_cwd()
 | |
| {
 | |
|     bool rval = true;
 | |
| 
 | |
|     if (chdir(get_logdir()) != 0)
 | |
|     {
 | |
|         MXS_ERROR("Failed to change working directory to '%s': %d, %s. "
 | |
|                   "Trying to change working directory to '/'.",
 | |
|                   get_logdir(), errno, mxs_strerror(errno));
 | |
|         if (chdir("/") != 0)
 | |
|         {
 | |
|             MXS_ERROR("Failed to change working directory to '/': %d, %s",
 | |
|                       errno, mxs_strerror(errno));
 | |
|             rval = false;
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             MXS_WARNING("Using '/' instead of '%s' as the current working directory.",
 | |
|                         get_logdir());
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         MXS_NOTICE("Working directory: %s", get_logdir());
 | |
|     }
 | |
| 
 | |
|     return rval;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * @brief Log a message about the last received signal
 | |
|  */
 | |
| static void log_exit_status()
 | |
| {
 | |
|     switch (last_signal)
 | |
|     {
 | |
|     case SIGTERM:
 | |
|         MXS_NOTICE("MaxScale received signal SIGTERM. Exiting.");
 | |
|         break;
 | |
| 
 | |
|     case SIGINT:
 | |
|         MXS_NOTICE("MaxScale received signal SIGINT. Exiting.");
 | |
|         break;
 | |
| 
 | |
|     default:
 | |
|         break;
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Daemonize the process by forking and putting the process into the
 | |
|  * background.
 | |
|  *
 | |
|  * @return True if context is that of the parent process, false if that of the
 | |
|  *         child process.
 | |
|  */
 | |
| static bool daemonize(void)
 | |
| {
 | |
|     pid_t pid;
 | |
| 
 | |
|     pid = fork();
 | |
| 
 | |
|     if (pid < 0)
 | |
|     {
 | |
|         fprintf(stderr, "fork() error %s\n", mxs_strerror(errno));
 | |
|         exit(1);
 | |
|     }
 | |
| 
 | |
|     if (pid != 0)
 | |
|     {
 | |
|         /* exit from main */
 | |
|         return true;
 | |
|     }
 | |
| 
 | |
|     if (setsid() < 0)
 | |
|     {
 | |
|         fprintf(stderr, "setsid() error %s\n", mxs_strerror(errno));
 | |
|         exit(1);
 | |
|     }
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Sniffs the configuration file, primarily for various directory paths,
 | |
|  * so that certain settings take effect immediately.
 | |
|  *
 | |
|  * @param filepath The path of the configuration file.
 | |
|  *
 | |
|  * @return True, if the sniffing succeeded, false otherwise.
 | |
|  */
 | |
| static bool sniff_configuration(const char* filepath)
 | |
| {
 | |
|     char* s = NULL;
 | |
| 
 | |
|     int rv = ini_parse(filepath, cnf_preparser, &s);
 | |
| 
 | |
|     if (rv != 0)
 | |
|     {
 | |
|         const char FORMAT_CUSTOM[] =
 | |
|             "Failed to pre-parse configuration file %s. Error on line %d. %s";
 | |
|         const char FORMAT_SYNTAX[] =
 | |
|             "Failed to pre-parse configuration file %s. Error on line %d.";
 | |
|         const char FORMAT_OPEN[] =
 | |
|             "Failed to pre-parse configuration file %s. Failed to open file.";
 | |
|         const char FORMAT_MALLOC[] =
 | |
|             "Failed to pre-parse configuration file %s. Memory allocation failed.";
 | |
| 
 | |
|         size_t extra = strlen(filepath) + UINTLEN(abs(rv)) + (s ? strlen(s) : 0);
 | |
|         // We just use the largest one.
 | |
|         char errorbuffer[sizeof(FORMAT_MALLOC) + extra];
 | |
| 
 | |
|         if (rv > 0)
 | |
|         {
 | |
|             if (s)
 | |
|             {
 | |
|                 snprintf(errorbuffer, sizeof(errorbuffer), FORMAT_CUSTOM, filepath, rv, s);
 | |
|                 MXS_FREE(s);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 snprintf(errorbuffer, sizeof(errorbuffer), FORMAT_SYNTAX, filepath, rv);
 | |
|             }
 | |
|         }
 | |
|         else if (rv == -1)
 | |
|         {
 | |
|             snprintf(errorbuffer, sizeof(errorbuffer), FORMAT_OPEN, filepath);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             snprintf(errorbuffer, sizeof(errorbuffer), FORMAT_MALLOC, filepath);
 | |
|         }
 | |
| 
 | |
|         print_log_n_stderr(true, true, errorbuffer, errorbuffer, 0);
 | |
|     }
 | |
| 
 | |
|     return rv == 0;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Calls init on all loaded modules.
 | |
|  *
 | |
|  * @return True, if all modules were successfully initialized.
 | |
|  */
 | |
| static bool modules_process_init()
 | |
| {
 | |
|     bool initialized = false;
 | |
| 
 | |
|     MXS_MODULE_ITERATOR i = mxs_module_iterator_get(NULL);
 | |
|     MXS_MODULE* module = NULL;
 | |
| 
 | |
|     while ((module = mxs_module_iterator_get_next(&i)) != NULL)
 | |
|     {
 | |
|         if (module->process_init)
 | |
|         {
 | |
|             int rc = (module->process_init)();
 | |
| 
 | |
|             if (rc != 0)
 | |
|             {
 | |
|                 break;
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (module)
 | |
|     {
 | |
|         // If module is non-NULL it means that the initialization failed for
 | |
|         // that module. We now need to call finish on all modules that were
 | |
|         // successfully initialized.
 | |
|         MXS_MODULE* failed_module = module;
 | |
|         i = mxs_module_iterator_get(NULL);
 | |
| 
 | |
|         while ((module = mxs_module_iterator_get_next(&i)) != failed_module)
 | |
|         {
 | |
|             if (module->process_finish)
 | |
|             {
 | |
|                 (module->process_finish)();
 | |
|             }
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         initialized = true;
 | |
|     }
 | |
| 
 | |
|     return initialized;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Calls process_finish on all loaded modules.
 | |
|  */
 | |
| static void modules_process_finish()
 | |
| {
 | |
|     MXS_MODULE_ITERATOR i = mxs_module_iterator_get(NULL);
 | |
|     MXS_MODULE* module = NULL;
 | |
| 
 | |
|     while ((module = mxs_module_iterator_get_next(&i)) != NULL)
 | |
|     {
 | |
|         if (module->process_finish)
 | |
|         {
 | |
|             (module->process_finish)();
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void enable_module_unloading(const char* arg)
 | |
| {
 | |
|     unload_modules_at_exit = true;
 | |
| }
 | |
| 
 | |
| static void disable_module_unloading(const char* arg)
 | |
| {
 | |
|     unload_modules_at_exit = false;
 | |
| }
 | |
| 
 | |
| static void redirect_output_to_file(const char* arg)
 | |
| {
 | |
|     if (arg)
 | |
|     {
 | |
|         redirect_output_to = arg;
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Process command line debug arguments
 | |
|  *
 | |
|  * @param args The debug argument list
 | |
|  * @return True on success, false on error
 | |
|  */
 | |
| static bool handle_debug_args(char* args)
 | |
| {
 | |
|     bool arg_error = false;
 | |
|     int args_found = 0;
 | |
|     char *endptr = NULL;
 | |
|     char* token = strtok_r(args, ",", &endptr);
 | |
|     while (token)
 | |
|     {
 | |
|         char* value = strchr(token, '=');
 | |
| 
 | |
|         if (value)
 | |
|         {
 | |
|             *value++ = '\0';
 | |
|         }
 | |
| 
 | |
|         bool found = false;
 | |
|         for (int i = 0; debug_arguments[i].action != NULL; i++)
 | |
|         {
 | |
| 
 | |
|             // Debug features are activated by running functions in the struct-array.
 | |
|             if (strcmp(token, debug_arguments[i].name) == 0)
 | |
|             {
 | |
|                 found = true;
 | |
|                 args_found++;
 | |
|                 debug_arguments[i].action(value);
 | |
|                 break;
 | |
|             }
 | |
|         }
 | |
|         if (!found)
 | |
|         {
 | |
|             const char UNRECOG_P1[] = "Unrecognized debug setting: '";
 | |
|             const char UNRECOG_P2[] = "'.";
 | |
|             size_t unrecog_msg_len = sizeof(UNRECOG_P1) + strlen(token) + sizeof(UNRECOG_P2);
 | |
|             char unrecog_msg[unrecog_msg_len];
 | |
|             snprintf(unrecog_msg, unrecog_msg_len, "%s%s%s", UNRECOG_P1, token, UNRECOG_P2);
 | |
|             print_log_n_stderr(true, true, unrecog_msg, unrecog_msg, 0);
 | |
|             arg_error = true;
 | |
|         }
 | |
|         token = strtok_r(NULL, ",", &endptr);
 | |
|     }
 | |
|     if (args_found == 0)
 | |
|     {
 | |
|         arg_error = true;
 | |
|     }
 | |
|     if (arg_error)
 | |
|     {
 | |
|         // Form a string with all debug argument names listed.
 | |
|         size_t total_len = 1;
 | |
|         for (int i = 0; debug_arguments[i].action != NULL; i++)
 | |
|         {
 | |
|             total_len += strlen(debug_arguments[i].name) + 1;
 | |
|         }
 | |
|         char arglist[total_len];
 | |
|         arglist[0] = '\0';
 | |
|         for (int i = 0; debug_arguments[i].action != NULL; i++)
 | |
|         {
 | |
|             strcat(arglist, debug_arguments[i].name);
 | |
|             // If not the last element, add a comma
 | |
|             if (debug_arguments[i + 1].action != NULL)
 | |
|             {
 | |
|                 strcat(arglist, ", ");
 | |
|             }
 | |
|         }
 | |
|         const char DEBUG_ERROR_P1[] =
 | |
|             "Debug argument identifier '-g' or '--debug' was specified "
 | |
|             "but no arguments were found or one of them was invalid. Supported "
 | |
|             "arguments are: ";
 | |
|         const char DEBUG_ERROR_P2[] = ".";
 | |
|         size_t arg_error_msg_len = sizeof(DEBUG_ERROR_P1) + total_len + sizeof(DEBUG_ERROR_P2);
 | |
|         char arg_error_msg[arg_error_msg_len];
 | |
|         snprintf(arg_error_msg, arg_error_msg_len, "%s%s%s", DEBUG_ERROR_P1, arglist,
 | |
|                  DEBUG_ERROR_P2);
 | |
|         print_log_n_stderr(true, true, arg_error_msg, arg_error_msg, 0);
 | |
|     }
 | |
|     return !arg_error;
 | |
| }
 | |
| 
 | |
| static bool user_is_acceptable(const char* specified_user)
 | |
| {
 | |
|     bool acceptable = false;
 | |
| 
 | |
|     // This is very early, so we do not have logging available, but write to stderr.
 | |
|     // As this is security related, we want to do as little as possible.
 | |
| 
 | |
|     uid_t uid = getuid(); // Always succeeds
 | |
|     errno = 0;
 | |
|     struct passwd *pw = getpwuid(uid);
 | |
|     if (pw)
 | |
|     {
 | |
|         if (strcmp(pw->pw_name, "root") == 0)
 | |
|         {
 | |
|             if (specified_user && (strcmp(specified_user, "root") == 0))
 | |
|             {
 | |
|                 // MaxScale was invoked as root and with --user=root.
 | |
|                 acceptable = true;
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 fprintf(stderr, "Error: MaxScale cannot be run as root.\n");
 | |
|             }
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             acceptable = true;
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         fprintf(stderr, "Error: Could not obtain user information, MaxScale will not run: %s",
 | |
|                 strerror(errno));
 | |
|     }
 | |
| 
 | |
|     return acceptable;
 | |
| }
 | 
