 574af7762d
			
		
	
	574af7762d
	
	
	
		
			
			MXS-1545: handling of slave file EOF refactoring. Some slave/router state are now checked before any WARN/ERROR messages about slave file EOF. The missing “next_file” is always logged with warn.
		
			
				
	
	
		
			3375 lines
		
	
	
		
			110 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			3375 lines
		
	
	
		
			110 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2016 MariaDB Corporation Ab
 | |
|  *
 | |
|  * Use of this software is governed by the Business Source License included
 | |
|  * in the LICENSE.TXT file and at www.mariadb.com/bsl11.
 | |
|  *
 | |
|  * Change Date: 2020-01-01
 | |
|  *
 | |
|  * On the date above, in accordance with the Business Source License, use
 | |
|  * of this software will be governed by version 2 or later of the General
 | |
|  * Public License.
 | |
|  */
 | |
| 
 | |
| /**
 | |
|  * @file blr.c - binlog router, allows MaxScale to act as an intermediatory for replication
 | |
|  *
 | |
|  * The binlog router is designed to be used in replication environments to
 | |
|  * increase the replication fanout of a master server. It provides a transparant
 | |
|  * mechanism to read the binlog entries for multiple slaves while requiring
 | |
|  * only a single connection to the actual master to support the slaves.
 | |
|  *
 | |
|  * The current prototype implement is designed to support MySQL 5.6 and has
 | |
|  * a number of limitations. This prototype is merely a proof of concept and
 | |
|  * should not be considered production ready.
 | |
|  */
 | |
| 
 | |
| #include "blr.h"
 | |
| 
 | |
| #include <ctype.h>
 | |
| #include <ini.h>
 | |
| #include <inttypes.h>
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <string.h>
 | |
| #include <sys/stat.h>
 | |
| #include <time.h>
 | |
| #include <uuid/uuid.h>
 | |
| 
 | |
| #include <maxscale/alloc.h>
 | |
| #include <maxscale/atomic.h>
 | |
| #include <maxscale/dcb.h>
 | |
| #include <maxscale/housekeeper.h>
 | |
| #include <maxscale/log_manager.h>
 | |
| #include <maxscale/protocol/mysql.h>
 | |
| #include <maxscale/router.h>
 | |
| #include <maxscale/secrets.h>
 | |
| #include <maxscale/server.h>
 | |
| #include <maxscale/service.h>
 | |
| #include <maxscale/spinlock.h>
 | |
| #include <maxscale/users.h>
 | |
| #include <maxscale/utils.h>
 | |
| #include <maxscale/worker.h>
 | |
| #include <maxscale/paths.h>
 | |
| 
 | |
| /* The router entry points */
 | |
| static  MXS_ROUTER  *createInstance(SERVICE *service, char **options);
 | |
| static void free_instance(ROUTER_INSTANCE *instance);
 | |
| static  MXS_ROUTER_SESSION *newSession(MXS_ROUTER *instance,
 | |
|                                        MXS_SESSION *session);
 | |
| static  void closeSession(MXS_ROUTER *instance,
 | |
|                           MXS_ROUTER_SESSION *router_session);
 | |
| static  void freeSession(MXS_ROUTER *instance,
 | |
|                          MXS_ROUTER_SESSION *router_session);
 | |
| static  int routeQuery(MXS_ROUTER *instance,
 | |
|                        MXS_ROUTER_SESSION *router_session,
 | |
|                        GWBUF *queue);
 | |
| static  void diagnostics(MXS_ROUTER *instance, DCB *dcb);
 | |
| static  json_t* diagnostics_json(const MXS_ROUTER *instance);
 | |
| static  void clientReply(MXS_ROUTER *instance,
 | |
|                          MXS_ROUTER_SESSION *router_session,
 | |
|                          GWBUF *queue,
 | |
|                          DCB *backend_dcb);
 | |
| static  void errorReply(MXS_ROUTER *instance,
 | |
|                         MXS_ROUTER_SESSION *router_session,
 | |
|                         GWBUF *message,
 | |
|                         DCB *backend_dcb,
 | |
|                         mxs_error_action_t action,
 | |
|                         bool *succp);
 | |
| 
 | |
| static uint64_t getCapabilities(MXS_ROUTER* instance);
 | |
| static int blr_handler_config(void *userdata,
 | |
|                               const char *section,
 | |
|                               const char *name,
 | |
|                               const char *value);
 | |
| static int blr_handle_config_item(const char *name,
 | |
|                                   const char *value,
 | |
|                                   ROUTER_INSTANCE *inst);
 | |
| static int blr_load_dbusers(const ROUTER_INSTANCE *router);
 | |
| static int blr_check_binlog(ROUTER_INSTANCE *router);
 | |
| void blr_master_close(ROUTER_INSTANCE *);
 | |
| void blr_free_ssl_data(ROUTER_INSTANCE *inst);
 | |
| static void destroyInstance(MXS_ROUTER *instance);
 | |
| bool blr_extract_key(const char *linebuf,
 | |
|                      int nline,
 | |
|                      ROUTER_INSTANCE *router);
 | |
| bool blr_get_encryption_key(ROUTER_INSTANCE *router);
 | |
| int blr_parse_key_file(ROUTER_INSTANCE *router);
 | |
| static bool blr_open_gtid_maps_storage(ROUTER_INSTANCE *inst);
 | |
| 
 | |
| static void stats_func(void *);
 | |
| 
 | |
| static bool rses_begin_locked_router_action(ROUTER_SLAVE *);
 | |
| static void rses_end_locked_router_action(ROUTER_SLAVE *);
 | |
| GWBUF *blr_cache_read_response(ROUTER_INSTANCE *router,
 | |
|                                char *response);
 | |
| extern bool blr_load_last_mariadb_gtid(ROUTER_INSTANCE *router,
 | |
|                                        MARIADB_GTID_INFO *result);
 | |
| 
 | |
| void blr_log_disabled_heartbeat(const ROUTER_INSTANCE *inst);
 | |
| 
 | |
| static SPINLOCK instlock;
 | |
| static ROUTER_INSTANCE *instances;
 | |
| 
 | |
| static const MXS_ENUM_VALUE enc_algo_values[] =
 | |
| {
 | |
|     {"aes_cbc", BLR_AES_CBC},
 | |
| #if OPENSSL_VERSION_NUMBER > 0x10000000L
 | |
|     {"aes_ctr", BLR_AES_CTR},
 | |
| #endif
 | |
|     {NULL}
 | |
| };
 | |
| 
 | |
| static const MXS_ENUM_VALUE binlog_storage_values[] =
 | |
| {
 | |
|     {"flat", BLR_BINLOG_STORAGE_FLAT},
 | |
|     {"tree", BLR_BINLOG_STORAGE_TREE},
 | |
|     {NULL}
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * The module entry point routine. It is this routine that
 | |
|  * must populate the structure that is referred to as the
 | |
|  * "module object", this is a structure with the set of
 | |
|  * external entry points for this module.
 | |
|  *
 | |
|  * @return The module object
 | |
|  */
 | |
| MXS_MODULE* MXS_CREATE_MODULE()
 | |
| {
 | |
|     MXS_NOTICE("Initialise binlog router module.");
 | |
|     spinlock_init(&instlock);
 | |
|     instances = NULL;
 | |
| 
 | |
|     static MXS_ROUTER_OBJECT MyObject =
 | |
|     {
 | |
|         createInstance,
 | |
|         newSession,
 | |
|         closeSession,
 | |
|         freeSession,
 | |
|         routeQuery,
 | |
|         diagnostics,
 | |
|         diagnostics_json,
 | |
|         clientReply,
 | |
|         errorReply,
 | |
|         getCapabilities,
 | |
|         destroyInstance
 | |
|     };
 | |
| 
 | |
|     static MXS_MODULE info =
 | |
|     {
 | |
|         MXS_MODULE_API_ROUTER,
 | |
|         MXS_MODULE_GA,
 | |
|         MXS_ROUTER_VERSION,
 | |
|         "Binlogrouter",
 | |
|         "V2.1.0",
 | |
|         RCAP_TYPE_NO_RSESSION | RCAP_TYPE_CONTIGUOUS_OUTPUT |
 | |
|         RCAP_TYPE_RESULTSET_OUTPUT | RCAP_TYPE_NO_AUTH,
 | |
|         &MyObject,
 | |
|         NULL, /* Process init. */
 | |
|         NULL, /* Process finish. */
 | |
|         NULL, /* Thread init. */
 | |
|         NULL, /* Thread finish. */
 | |
|         {
 | |
|             {"uuid", MXS_MODULE_PARAM_STRING},
 | |
|             {"server_id", MXS_MODULE_PARAM_COUNT},
 | |
|             {"master_id", MXS_MODULE_PARAM_COUNT, "0"},
 | |
|             {"master_uuid", MXS_MODULE_PARAM_STRING},
 | |
|             {"master_version", MXS_MODULE_PARAM_STRING},
 | |
|             {"master_hostname", MXS_MODULE_PARAM_STRING},
 | |
|             {"slave_hostname", MXS_MODULE_PARAM_STRING},
 | |
|             {"mariadb10-compatibility", MXS_MODULE_PARAM_BOOL, "true"},
 | |
|             {"maxwell-compatibility", MXS_MODULE_PARAM_BOOL, "false"},
 | |
|             {"filestem", MXS_MODULE_PARAM_STRING, BINLOG_NAME_ROOT},
 | |
|             {"file", MXS_MODULE_PARAM_COUNT, "1"},
 | |
|             {"transaction_safety", MXS_MODULE_PARAM_BOOL, "false"},
 | |
|             {"semisync", MXS_MODULE_PARAM_BOOL, "false"},
 | |
|             {"encrypt_binlog", MXS_MODULE_PARAM_BOOL, "false"},
 | |
|             {
 | |
|                 "encryption_algorithm", MXS_MODULE_PARAM_ENUM, "aes_cbc",
 | |
|                 MXS_MODULE_OPT_NONE, enc_algo_values
 | |
|             },
 | |
|             {"encryption_key_file", MXS_MODULE_PARAM_PATH, NULL, MXS_MODULE_OPT_PATH_R_OK},
 | |
|             {"mariadb10_master_gtid", MXS_MODULE_PARAM_BOOL, "false"},
 | |
|             {
 | |
|                 "binlog_structure", MXS_MODULE_PARAM_ENUM, "flat",
 | |
|                 MXS_MODULE_OPT_NONE, binlog_storage_values
 | |
|             },
 | |
|             {"shortburst", MXS_MODULE_PARAM_COUNT, DEF_SHORT_BURST},
 | |
|             {"longburst", MXS_MODULE_PARAM_COUNT, DEF_LONG_BURST},
 | |
|             {"burstsize", MXS_MODULE_PARAM_SIZE, DEF_BURST_SIZE},
 | |
|             {"heartbeat", MXS_MODULE_PARAM_COUNT, BLR_HEARTBEAT_DEFAULT_INTERVAL},
 | |
|             {"connect_retry", MXS_MODULE_PARAM_COUNT, BLR_MASTER_CONNECT_RETRY},
 | |
|             {"master_retry_count", MXS_MODULE_PARAM_COUNT, BLR_MASTER_RETRY_COUNT},
 | |
|             {"send_slave_heartbeat", MXS_MODULE_PARAM_BOOL, "false"},
 | |
|             {
 | |
|                 "binlogdir",
 | |
|                 MXS_MODULE_PARAM_PATH,
 | |
|                 MXS_DEFAULT_DATADIR,
 | |
|                 MXS_MODULE_OPT_PATH_R_OK |
 | |
|                 MXS_MODULE_OPT_PATH_W_OK |
 | |
|                 MXS_MODULE_OPT_PATH_CREAT
 | |
|             },
 | |
|             {"ssl_cert_verification_depth", MXS_MODULE_PARAM_COUNT, "9"},
 | |
|             {MXS_END_MODULE_PARAMS}
 | |
|         }
 | |
|     };
 | |
| 
 | |
|     return &info;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Create an instance of the router for a particular service
 | |
|  * within MaxScale.
 | |
|  *
 | |
|  * The process of creating the instance causes the router to register
 | |
|  * with the master server and begin replication of the binlogs from
 | |
|  * the master server to MaxScale.
 | |
|  *
 | |
|  * @param service   The service this router is being create for
 | |
|  * @param options   An array of options for this query router
 | |
|  *
 | |
|  * @return The instance data for this new instance
 | |
|  */
 | |
| static  MXS_ROUTER  *
 | |
| createInstance(SERVICE *service, char **options)
 | |
| {
 | |
|     ROUTER_INSTANCE *inst;
 | |
|     char *value;
 | |
|     int i;
 | |
|     uuid_t defuuid;
 | |
|     int rc = 0;
 | |
|     char task_name[BLRM_TASK_NAME_LEN + 1] = "";
 | |
| 
 | |
|     if (!service->credentials.name[0] ||
 | |
|         !service->credentials.authdata[0])
 | |
|     {
 | |
|         MXS_ERROR("%s: Error: Service is missing user credentials."
 | |
|                   " Add the missing username or passwd parameter to the service.",
 | |
|                   service->name);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * We only support one server behind this router, since the server is
 | |
|      * the master from which we replicate binlog records. Therefore check
 | |
|      * that only one server has been defined.
 | |
|      */
 | |
|     if (service->dbref != NULL)
 | |
|     {
 | |
|         MXS_WARNING("%s: backend database server is provided by master.ini file "
 | |
|                     "for use with the binlog router."
 | |
|                     " Server section is no longer required.",
 | |
|                     service->name);
 | |
| 
 | |
|         server_free(service->dbref->server);
 | |
|         MXS_FREE(service->dbref);
 | |
|         service->dbref = NULL;
 | |
|     }
 | |
| 
 | |
|     if ((inst = (ROUTER_INSTANCE *)MXS_CALLOC(1, sizeof(ROUTER_INSTANCE))) == NULL)
 | |
|     {
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     memset(&inst->stats, 0, sizeof(ROUTER_STATS));
 | |
|     memset(&inst->saved_master, 0, sizeof(MASTER_RESPONSES));
 | |
| 
 | |
|     inst->service = service;
 | |
|     spinlock_init(&inst->lock);
 | |
|     inst->files = NULL;
 | |
|     spinlock_init(&inst->fileslock);
 | |
|     spinlock_init(&inst->binlog_lock);
 | |
| 
 | |
|     inst->binlog_fd = -1;
 | |
|     inst->master_chksum = true;
 | |
| 
 | |
|     inst->master_state = BLRM_UNCONFIGURED;
 | |
|     inst->master = NULL;
 | |
|     inst->client = NULL;
 | |
| 
 | |
|     inst->user = MXS_STRDUP_A(service->credentials.name);
 | |
|     inst->password = MXS_STRDUP_A(service->credentials.authdata);
 | |
|     inst->retry_count = 0;
 | |
|     inst->m_errno = 0;
 | |
|     inst->m_errmsg = NULL;
 | |
| 
 | |
|     memset(&inst->pending_transaction, '\0', sizeof(PENDING_TRANSACTION));
 | |
|     inst->last_safe_pos = 0;
 | |
|     inst->last_event_pos = 0;
 | |
| 
 | |
|     /* SSL replication is disabled by default */
 | |
|     inst->ssl_enabled = 0;
 | |
|     /* SSL config options */
 | |
|     inst->ssl_ca = NULL;
 | |
|     inst->ssl_cert = NULL;
 | |
|     inst->ssl_key = NULL;
 | |
|     inst->ssl_version = NULL;
 | |
| 
 | |
|     inst->active_logs = 0;
 | |
|     inst->reconnect_pending = 0;
 | |
|     inst->handling_threads = 0;
 | |
|     inst->rotating = 0;
 | |
|     inst->slaves = NULL;
 | |
|     inst->next = NULL;
 | |
|     inst->lastEventTimestamp = 0;
 | |
|     inst->binlog_position = 0;
 | |
|     inst->current_pos = 0;
 | |
|     inst->current_safe_event = 0;
 | |
|     inst->master_event_state = BLR_EVENT_DONE;
 | |
|     inst->last_mariadb_gtid[0] = '\0';
 | |
| 
 | |
|     strcpy(inst->binlog_name, "");
 | |
|     strcpy(inst->prevbinlog, "");
 | |
| 
 | |
|     MXS_CONFIG_PARAMETER *params = service->svc_config_param;
 | |
| 
 | |
|     inst->initbinlog = config_get_integer(params, "file");
 | |
| 
 | |
|     inst->short_burst = config_get_integer(params, "shortburst");
 | |
|     inst->long_burst = config_get_integer(params, "longburst");
 | |
|     inst->burst_size = config_get_size(params, "burstsize");
 | |
|     inst->binlogdir = config_copy_string(params, "binlogdir");
 | |
|     inst->heartbeat = config_get_integer(params, "heartbeat");
 | |
|     inst->retry_interval = config_get_integer(params, "connect_retry");
 | |
|     inst->retry_limit = config_get_integer(params, "master_retry_count");
 | |
|     inst->ssl_cert_verification_depth = config_get_integer(params, "ssl_cert_verification_depth");
 | |
|     inst->mariadb10_compat = config_get_bool(params, "mariadb10-compatibility");
 | |
|     inst->maxwell_compat = config_get_bool(params, "maxwell-compatibility");
 | |
|     inst->trx_safe = config_get_bool(params, "transaction_safety");
 | |
|     inst->fileroot = config_copy_string(params, "filestem");
 | |
| 
 | |
|     /* Server id */
 | |
|     inst->serverid = config_get_integer(params, "server_id");
 | |
| 
 | |
|     /* Identity options */
 | |
|     inst->set_master_version = config_copy_string(params, "master_version");
 | |
|     inst->set_master_hostname = config_copy_string(params, "master_hostname");
 | |
|     inst->set_slave_hostname = config_copy_string(params, "slave_hostname");
 | |
|     inst->masterid = config_get_integer(params, "master_id");
 | |
|     inst->set_master_server_id = inst->masterid != 0;
 | |
|     inst->master_uuid = config_copy_string(params, "master_uuid");
 | |
|     inst->set_master_uuid = inst->master_uuid != NULL;
 | |
| 
 | |
|     /* Slave Heartbeat */
 | |
|     inst->send_slave_heartbeat = config_get_bool(params, "send_slave_heartbeat");
 | |
| 
 | |
|     /* Semi-Sync support */
 | |
|     inst->request_semi_sync = config_get_bool(params, "semisync");
 | |
|     inst->master_semi_sync = 0;
 | |
| 
 | |
|     /* Enable MariaDB GTID tracking for slaves if MariaDB 10 compat is set */
 | |
|     inst->mariadb10_gtid = inst->mariadb10_compat;
 | |
| 
 | |
|     /* Enable MariaDB GTID registration to master */
 | |
|     inst->mariadb10_master_gtid = config_get_bool(params, "mariadb10_master_gtid");
 | |
| 
 | |
|     /* Binlog encryption */
 | |
|     inst->encryption.enabled = config_get_bool(params, "encrypt_binlog");
 | |
|     inst->encryption.encryption_algorithm = config_get_enum(params,
 | |
|                                                             "encryption_algorithm",
 | |
|                                                             enc_algo_values);
 | |
|     inst->encryption.key_management_filename = config_copy_string(params,
 | |
|                                                                   "encryption_key_file");
 | |
| 
 | |
|     /* Encryption CTX */
 | |
|     inst->encryption_ctx = NULL;
 | |
| 
 | |
|     /* Set router uuid */
 | |
|     inst->uuid = config_copy_string(params, "uuid");
 | |
| 
 | |
|     /* Set Flat storage of binlog files as default */
 | |
|     inst->storage_type = BLR_BINLOG_STORAGE_FLAT;
 | |
| 
 | |
|     if (inst->uuid == NULL)
 | |
|     {
 | |
|         /* Generate UUID for the router instance */
 | |
|         uuid_generate_time(defuuid);
 | |
| 
 | |
|         if ((inst->uuid = (char *)MXS_CALLOC(38, 1)) != NULL)
 | |
|         {
 | |
|             sprintf(inst->uuid,
 | |
|                     "%02hhx%02hhx%02hhx%02hhx-"
 | |
|                     "%02hhx%02hhx-"
 | |
|                     "%02hhx%02hhx-"
 | |
|                     "%02hhx%02hhx-"
 | |
|                     "%02hhx%02hhx%02hhx%02hhx%02hhx%02hhx",
 | |
|                     defuuid[0], defuuid[1], defuuid[2], defuuid[3],
 | |
|                     defuuid[4], defuuid[5], defuuid[6], defuuid[7],
 | |
|                     defuuid[8], defuuid[9], defuuid[10], defuuid[11],
 | |
|                     defuuid[12], defuuid[13], defuuid[14], defuuid[15]);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             free_instance(inst);
 | |
|             return NULL;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * Process the options.
 | |
|      * We have an array of attribute values passed to us that we must
 | |
|      * examine. Supported attributes are:
 | |
|      *  uuid=
 | |
|      *  server-id=
 | |
|      *  user=
 | |
|      *  password=
 | |
|      *  master-id=
 | |
|      *  filestem=
 | |
|      */
 | |
|     if (options)
 | |
|     {
 | |
|         for (i = 0; options[i]; i++)
 | |
|         {
 | |
|             if ((value = strchr(options[i], '=')) == NULL)
 | |
|             {
 | |
|                 MXS_WARNING("Unsupported router "
 | |
|                             "option %s for binlog router.",
 | |
|                             options[i]);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 *value = 0;
 | |
|                 value++;
 | |
|                 if (strcmp(options[i], "uuid") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->uuid);
 | |
|                     inst->uuid = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if ((strcmp(options[i], "server_id") == 0) || (strcmp(options[i], "server-id") == 0))
 | |
|                 {
 | |
|                     inst->serverid = atoi(value);
 | |
|                     if (strcmp(options[i], "server-id") == 0)
 | |
|                     {
 | |
|                         MXS_WARNING("Configuration setting '%s' in router_options is deprecated"
 | |
|                                     " and will be removed in a later version of MaxScale. "
 | |
|                                     "Please use the new setting '%s' instead.",
 | |
|                                     "server-id", "server_id");
 | |
|                     }
 | |
| 
 | |
|                     if (inst->serverid <= 0)
 | |
|                     {
 | |
|                         MXS_ERROR("Service %s, invalid server-id '%s'. "
 | |
|                                   "Please configure it with a unique positive integer value (1..2^32-1)",
 | |
|                                   service->name, value);
 | |
| 
 | |
|                         free_instance(inst);
 | |
|                         return NULL;
 | |
|                     }
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "user") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->user);
 | |
|                     inst->user = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "password") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->password);
 | |
|                     inst->password = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "passwd") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->password);
 | |
|                     inst->password = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if ((strcmp(options[i], "master_id") == 0) || (strcmp(options[i], "master-id") == 0))
 | |
|                 {
 | |
|                     int master_id = atoi(value);
 | |
|                     if (master_id > 0)
 | |
|                     {
 | |
|                         inst->masterid = master_id;
 | |
|                         inst->set_master_server_id = true;
 | |
|                     }
 | |
|                     if (strcmp(options[i], "master-id") == 0)
 | |
|                     {
 | |
|                         MXS_WARNING("Configuration setting '%s' in router_options is deprecated"
 | |
|                                     " and will be removed in a later version of MaxScale. "
 | |
|                                     "Please use the new setting '%s' instead.",
 | |
|                                     "master-id", "master_id");
 | |
|                     }
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "master_uuid") == 0)
 | |
|                 {
 | |
|                     inst->set_master_uuid = true;
 | |
|                     MXS_FREE(inst->master_uuid);
 | |
|                     inst->master_uuid = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "master_version") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->set_master_version);
 | |
|                     inst->set_master_version = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "master_hostname") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->set_master_hostname);
 | |
|                     inst->set_master_hostname = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "slave_hostname") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->set_slave_hostname);
 | |
|                     inst->set_slave_hostname = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "mariadb10-compatibility") == 0)
 | |
|                 {
 | |
|                     inst->mariadb10_compat = config_truth_value(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "maxwell-compatibility") == 0)
 | |
|                 {
 | |
|                     inst->maxwell_compat = config_truth_value(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "filestem") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->fileroot);
 | |
|                     inst->fileroot = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "file") == 0)
 | |
|                 {
 | |
|                     inst->initbinlog = atoi(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "transaction_safety") == 0)
 | |
|                 {
 | |
|                     inst->trx_safe = config_truth_value(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "semisync") == 0)
 | |
|                 {
 | |
|                     inst->request_semi_sync = config_truth_value(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "encrypt_binlog") == 0)
 | |
|                 {
 | |
|                     inst->encryption.enabled = config_truth_value(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "mariadb10_master_gtid") == 0)
 | |
|                 {
 | |
|                     inst->mariadb10_master_gtid = config_truth_value(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "encryption_algorithm") == 0)
 | |
|                 {
 | |
|                     int ret = blr_check_encryption_algorithm(value);
 | |
|                     if (ret > -1)
 | |
|                     {
 | |
|                         inst->encryption.encryption_algorithm = ret;
 | |
|                     }
 | |
|                     else
 | |
|                     {
 | |
|                         MXS_ERROR("Service %s, invalid encryption_algorithm '%s'. "
 | |
|                                   "Supported algorithms: %s",
 | |
|                                   service->name, value, blr_encryption_algorithm_list());
 | |
| 
 | |
|                         free_instance(inst);
 | |
|                         return NULL;
 | |
|                     }
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "encryption_key_file") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->encryption.key_management_filename);
 | |
|                     inst->encryption.key_management_filename = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "shortburst") == 0)
 | |
|                 {
 | |
|                     inst->short_burst = atoi(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "longburst") == 0)
 | |
|                 {
 | |
|                     inst->long_burst = atoi(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "burstsize") == 0)
 | |
|                 {
 | |
|                     unsigned long size = atoi(value);
 | |
|                     char    *ptr = value;
 | |
|                     while (*ptr && isdigit(*ptr))
 | |
|                     {
 | |
|                         ptr++;
 | |
|                     }
 | |
|                     switch (*ptr)
 | |
|                     {
 | |
|                     case 'G':
 | |
|                     case 'g':
 | |
|                         size = size * 1024 * 1000 * 1000;
 | |
|                         break;
 | |
|                     case 'M':
 | |
|                     case 'm':
 | |
|                         size = size * 1024 * 1000;
 | |
|                         break;
 | |
|                     case 'K':
 | |
|                     case 'k':
 | |
|                         size = size * 1024;
 | |
|                         break;
 | |
|                     }
 | |
|                     inst->burst_size = size;
 | |
| 
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "heartbeat") == 0)
 | |
|                 {
 | |
|                     int h_val = (int)strtol(value, NULL, 10);
 | |
| 
 | |
|                     if (h_val < 0 ||
 | |
|                         (errno == ERANGE) ||
 | |
|                         h_val > BLR_HEARTBEAT_MAX_INTERVAL)
 | |
|                     {
 | |
|                         MXS_WARNING("Invalid heartbeat period %s."
 | |
|                                     " Setting it to default value %ld.",
 | |
|                                     value,
 | |
|                                     inst->heartbeat);
 | |
|                     }
 | |
|                     else
 | |
|                     {
 | |
|                         inst->heartbeat = h_val;
 | |
|                     }
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "connect_retry") == 0)
 | |
|                 {
 | |
|                     inst->retry_interval = atoi(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "master_retry_count") == 0)
 | |
|                 {
 | |
|                     inst->retry_limit = atoi(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "send_slave_heartbeat") == 0)
 | |
|                 {
 | |
|                     inst->send_slave_heartbeat = config_truth_value(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "binlogdir") == 0)
 | |
|                 {
 | |
|                     MXS_FREE(inst->binlogdir);
 | |
|                     inst->binlogdir = MXS_STRDUP_A(value);
 | |
|                 }
 | |
|                 else if (strcmp(options[i], "ssl_cert_verification_depth") == 0)
 | |
|                 {
 | |
|                     inst->ssl_cert_verification_depth = atoi(value);
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     MXS_WARNING("%s: unsupported router option %s for binlog router.",
 | |
|                                 service->name,
 | |
|                                 options[i]);
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     inst->orig_masterid = 0;
 | |
|     inst->mariadb10_gtid_domain = BLR_DEFAULT_GTID_DOMAIN_ID;
 | |
| 
 | |
|     /* Override master_id */
 | |
|     if (inst->masterid)
 | |
|     {
 | |
|         inst->set_master_server_id = true;
 | |
|     }
 | |
| 
 | |
|     /* Check ssl_cert_verification_depth option */
 | |
|     if (inst->ssl_cert_verification_depth < 0)
 | |
|     {
 | |
|         MXS_ERROR("%s: invalid Master ssl_cert_verification_depth %s."
 | |
|                   " Setting it to default value %i.",
 | |
|                   service->name,
 | |
|                   value,
 | |
|                   inst->ssl_cert_verification_depth);
 | |
|         free_instance(inst);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     /* Check master connect options */
 | |
|     if (inst->heartbeat < 0)
 | |
|     {
 | |
|         MXS_ERROR("%s: invalid 'heartbeat' value.",
 | |
|                   service->name);
 | |
|         free_instance(inst);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     if (inst->heartbeat == 0)
 | |
|     {
 | |
|         blr_log_disabled_heartbeat(inst);
 | |
|     }
 | |
| 
 | |
|     if (inst->retry_interval <= 0)
 | |
|     {
 | |
|         MXS_ERROR("%s: invalid 'connect_retry' value.",
 | |
|                   service->name);
 | |
|         free_instance(inst);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     if (inst->retry_limit <= 0)
 | |
|     {
 | |
|         MXS_ERROR("%s: invalid 'master_retry_count' value.",
 | |
|                   service->name);
 | |
|         free_instance(inst);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     /* Check BinlogDir option */
 | |
|     if ((inst->binlogdir == NULL) ||
 | |
|         (inst->binlogdir != NULL &&
 | |
|          !strlen(inst->binlogdir)))
 | |
|     {
 | |
|         MXS_ERROR("Service %s, binlog directory is not specified",
 | |
|                   service->name);
 | |
|         free_instance(inst);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     if (inst->serverid <= 0)
 | |
|     {
 | |
|         MXS_ERROR("Service %s, server_id is not configured. "
 | |
|                   "Please configure it with a unique positive "
 | |
|                   "integer value (1..2^32-1)",
 | |
|                   service->name);
 | |
|         free_instance(inst);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     /* Get the Encryption key */
 | |
|     if (inst->encryption.enabled && !blr_get_encryption_key(inst))
 | |
|     {
 | |
|         free_instance(inst);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * If binlogdir is not found create it
 | |
|      * On failure don't start the instance
 | |
|      */
 | |
|     if (access(inst->binlogdir, R_OK) == -1)
 | |
|     {
 | |
|         int mkdir_rval;
 | |
|         mkdir_rval = mkdir(inst->binlogdir, 0700);
 | |
|         if (mkdir_rval == -1)
 | |
|         {
 | |
|             MXS_ERROR("Service %s, Failed to create binlog directory '%s': [%d] %s",
 | |
|                       service->name,
 | |
|                       inst->binlogdir,
 | |
|                       errno,
 | |
|                       mxs_strerror(errno));
 | |
| 
 | |
|             free_instance(inst);
 | |
|             return NULL;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Check mariadb10_compat option before any other mariadb10 option.
 | |
|      */
 | |
|     if (!inst->mariadb10_compat &&
 | |
|         inst->mariadb10_master_gtid)
 | |
|     {
 | |
|         MXS_WARNING("MariaDB Master GTID registration needs"
 | |
|                     " MariaDB compatibilty option. The 'mariadb10-compatibility'"
 | |
|                     " has been turned on. Please permanently enable it with option"
 | |
|                     " 'mariadb10-compatibility=On'");
 | |
| 
 | |
|         inst->mariadb10_compat = true;
 | |
|     }
 | |
| 
 | |
|     if (inst->mariadb10_master_gtid)
 | |
|     {
 | |
|         /* Force GTID slave request handling */
 | |
|         inst->mariadb10_gtid = true;
 | |
|         /* Force transaction safety */
 | |
|         inst->trx_safe = true;
 | |
|         /* Force binlog storage as tree */
 | |
|         inst->storage_type = BLR_BINLOG_STORAGE_TREE;
 | |
|     }
 | |
| 
 | |
|     /* Log binlog structure storage mode */
 | |
|     MXS_NOTICE("%s: storing binlog files in %s",
 | |
|                service->name,
 | |
|                inst->storage_type == BLR_BINLOG_STORAGE_FLAT ?
 | |
|                "'flat' mode" :
 | |
|                "'tree' mode using GTID domain_id and server_id");
 | |
| 
 | |
|     /* Enable MariaDB the GTID maps store */
 | |
|     if (inst->mariadb10_compat)
 | |
|     {
 | |
|         /* Create/Open R/W GTID sqlite3 storage */
 | |
|         if (!blr_open_gtid_maps_storage(inst))
 | |
|         {
 | |
|             free_instance(inst);
 | |
|             return NULL;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /* Dynamically allocate master_host server struct, not written in any cnf file */
 | |
|     if (service->dbref == NULL)
 | |
|     {
 | |
|         SERVER *server;
 | |
|         SSL_LISTENER *ssl_cfg;
 | |
|         server = server_alloc("binlog_router_master_host",
 | |
|                               "_none_", 3306,
 | |
|                               "MySQLBackend",
 | |
|                               "MySQLBackendAuth",
 | |
|                               NULL);
 | |
|         if (server == NULL)
 | |
|         {
 | |
|             MXS_ERROR("%s: Error for server_alloc in createInstance",
 | |
|                       inst->service->name);
 | |
| 
 | |
|             sqlite3_close_v2(inst->gtid_maps);
 | |
|             free_instance(inst);
 | |
|             return NULL;
 | |
|         }
 | |
| 
 | |
|         /* Allocate SSL struct for backend connection */
 | |
|         if ((ssl_cfg = MXS_CALLOC(1, sizeof(SSL_LISTENER))) == NULL)
 | |
|         {
 | |
|             MXS_ERROR("%s: Error allocating memory for SSL struct in createInstance",
 | |
|                       inst->service->name);
 | |
| 
 | |
|             server_free(service->dbref->server);
 | |
|             MXS_FREE(service->dbref);
 | |
|             sqlite3_close_v2(inst->gtid_maps);
 | |
|             free_instance(inst);
 | |
|             return NULL;
 | |
|         }
 | |
| 
 | |
|         /* Set some SSL defaults */
 | |
|         ssl_cfg->ssl_init_done = false;
 | |
|         ssl_cfg->ssl_method_type = SERVICE_SSL_TLS_MAX;
 | |
|         ssl_cfg->ssl_cert_verify_depth = 9;
 | |
|         ssl_cfg->ssl_verify_peer_certificate = true;
 | |
| 
 | |
|         /** Set SSL pointer in in server struct */
 | |
|         server->server_ssl = ssl_cfg;
 | |
| 
 | |
|         /* Add server to service backend list */
 | |
|         serviceAddBackend(inst->service, server);
 | |
| 
 | |
|         /* Hide backend server struct */
 | |
|         service->dbref->server->is_active = false;
 | |
|         service->dbref->active = false;
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * Check for master.ini file with master connection details
 | |
|      * If not found a CHANGE MASTER TO is required via mysqsl client.
 | |
|      * Use START SLAVE for replication startup.
 | |
|      *
 | |
|      * If existent master.ini will be used for
 | |
|      * automatic master replication start phase
 | |
|      */
 | |
| 
 | |
|     static const char MASTER_INI[] = "/master.ini";
 | |
|     char filename[strlen(inst->binlogdir) + sizeof(MASTER_INI)]; // sizeof includes the NULL
 | |
|     sprintf(filename, "%s%s", inst->binlogdir, MASTER_INI);
 | |
| 
 | |
|     rc = ini_parse(filename, blr_handler_config, inst);
 | |
| 
 | |
|     MXS_INFO("%s: %s parse result is %d",
 | |
|              inst->service->name,
 | |
|              filename,
 | |
|              rc);
 | |
| 
 | |
|     /*
 | |
|      * retcode:
 | |
|      * -1 file not found, 0 parsing ok, > 0 error parsing the content
 | |
|      */
 | |
| 
 | |
|     if (rc != 0)
 | |
|     {
 | |
|         if (rc == -1)
 | |
|         {
 | |
|             MXS_WARNING("%s: master.ini file not found in %s."
 | |
|                         " Master registration cannot be started."
 | |
|                         " Configure with CHANGE MASTER TO ...",
 | |
|                         inst->service->name, inst->binlogdir);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             MXS_ERROR("%s: master.ini file with errors in %s."
 | |
|                       " Master registration cannot be started."
 | |
|                       " Fix errors in it or configure with CHANGE MASTER TO ...",
 | |
|                       inst->service->name, inst->binlogdir);
 | |
|         }
 | |
| 
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         inst->master_state = BLRM_UNCONNECTED;
 | |
|         /* Set backend server as active */
 | |
|         service->dbref->server->is_active = true;
 | |
|         service->dbref->active = true;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      *******************************
 | |
|      * Initialise the binlog router
 | |
|      *******************************
 | |
|      */
 | |
| 
 | |
|     /**
 | |
|      * Check first for SSL enabled replication.
 | |
|      * If not remove the SSL struct from server
 | |
|      */
 | |
| 
 | |
|     if (inst->ssl_enabled)
 | |
|     {
 | |
|         if (service->dbref &&
 | |
|             service->dbref->server &&
 | |
|             service->dbref->server->server_ssl)
 | |
|         {
 | |
|             /* Initialise SSL: exit on error */
 | |
|             if (listener_init_SSL(service->dbref->server->server_ssl) != 0)
 | |
|             {
 | |
|                 MXS_ERROR("%s: Unable to initialize SSL with backend server",
 | |
|                           service->name);
 | |
|                 /* Free SSL struct */
 | |
|                 /* Note: SSL struct in server should be freed by server_free() */
 | |
|                 blr_free_ssl_data(inst);
 | |
| 
 | |
|                 server_free(service->dbref->server);
 | |
|                 MXS_FREE(service->dbref);
 | |
|                 service->dbref = NULL;
 | |
|                 sqlite3_close_v2(inst->gtid_maps);
 | |
|                 free_instance(inst);
 | |
|                 return NULL;
 | |
|             }
 | |
|         }
 | |
|         MXS_INFO("%s: Replicating from master with SSL", service->name);
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         MXS_DEBUG("%s: Replicating from master without SSL", service->name);
 | |
|         /* Free the SSL struct because is not needed if MASTER_SSL = 0
 | |
|          * Provided options, if any, are kept in inst->ssl_* vars
 | |
|          * SHOW SLAVE STATUS can display those values
 | |
|          */
 | |
| 
 | |
|         /* Note: SSL struct in server should be freed by server_free() */
 | |
|         if (service->dbref && service->dbref->server)
 | |
|         {
 | |
|             blr_free_ssl_data(inst);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (inst->master_state == BLRM_UNCONNECTED)
 | |
|     {
 | |
| 
 | |
|         /* Read any cached response messages */
 | |
|         blr_cache_read_master_data(inst);
 | |
| 
 | |
|         /**
 | |
|          * The value of master checksum is known only at registration time, so
 | |
|          * as soon as replication succeds the value is updated.
 | |
|          * Set now the binlog checksum from the saved value.
 | |
|          * This is very useful in case of possible failure in the
 | |
|          * registration phase for any reason: master is down, wrong password etc.
 | |
|          * In this case a connecting slave will get the checksum value
 | |
|          * from previous registration instead of default one (CRC32)
 | |
|          * which can be wrong if slave has binlog_checksum = NONE.
 | |
|          */
 | |
|         blr_set_checksum(inst, inst->saved_master.chksum2);
 | |
| 
 | |
|         /*
 | |
|          * Find latest binlog file in binlogdir or GTID maps repo
 | |
|          */
 | |
|         if (blr_file_init(inst) == 0)
 | |
|         {
 | |
|             MXS_ERROR("%s: Service not started due to lack of binlog directory %s",
 | |
|                       service->name,
 | |
|                       inst->binlogdir);
 | |
| 
 | |
|             if (service->dbref && service->dbref->server)
 | |
|             {
 | |
|                 /* Free SSL data */
 | |
|                 blr_free_ssl_data(inst);
 | |
| 
 | |
|                 server_free(service->dbref->server);
 | |
|                 MXS_FREE(service->dbref);
 | |
|                 service->dbref = NULL;
 | |
|             }
 | |
| 
 | |
|             sqlite3_close_v2(inst->gtid_maps);
 | |
|             free_instance(inst);
 | |
|             return NULL;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * We have completed the creation of the instance data, so now
 | |
|      * insert this router instance into the linked list of routers
 | |
|      * that have been created with this module.
 | |
|      */
 | |
|     spinlock_acquire(&instlock);
 | |
|     inst->next = instances;
 | |
|     instances = inst;
 | |
|     spinlock_release(&instlock);
 | |
| 
 | |
|     /*
 | |
|      * Initialise the binlog cache for this router instance
 | |
|      */
 | |
|     blr_init_cache(inst);
 | |
| 
 | |
|     /*
 | |
|      * Add tasks for statistic computation
 | |
|      */
 | |
|     snprintf(task_name, BLRM_TASK_NAME_LEN, "%s stats", service->name);
 | |
|     hktask_add(task_name, stats_func, inst, BLR_STATS_FREQ);
 | |
| 
 | |
|     /* Log whether the transaction safety option value is on */
 | |
|     if (inst->trx_safe)
 | |
|     {
 | |
|         MXS_NOTICE("%s: Service has transaction safety option set to ON",
 | |
|                    service->name);
 | |
|     }
 | |
| 
 | |
|     /* Log whether the binlog encryption option value is on */
 | |
|     if (inst->encryption.enabled)
 | |
|     {
 | |
|         MXS_NOTICE("%s: Service has binlog encryption set to ON, algorithm: %s,"
 | |
|                    " KEY len %lu bits",
 | |
|                    service->name,
 | |
|                    blr_get_encryption_algorithm(inst->encryption.encryption_algorithm),
 | |
|                    8 * inst->encryption.key_len);
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Check whether replication can be started
 | |
|      */
 | |
|     if (inst->master_state == BLRM_UNCONNECTED)
 | |
|     {
 | |
|         char f_prefix[BINLOG_FILE_EXTRA_INFO] = "";
 | |
|         if (inst->storage_type == BLR_BINLOG_STORAGE_TREE)
 | |
|         {
 | |
|             sprintf(f_prefix,
 | |
|                     "%" PRIu32 "/%" PRIu32 "/",
 | |
|                     inst->mariadb10_gtid_domain,
 | |
|                     inst->orig_masterid);
 | |
|         }
 | |
| 
 | |
|         /* Log current binlog, possibly with tree prefix */
 | |
|         MXS_NOTICE("Validating last binlog file '%s%s' ...",
 | |
|                    f_prefix,
 | |
|                    inst->binlog_name);
 | |
| 
 | |
|         /* Check current binlog */
 | |
|         if (!blr_check_binlog(inst))
 | |
|         {
 | |
|             if (inst->trx_safe || inst->encryption.enabled)
 | |
|             {
 | |
|                 MXS_ERROR("The replication from master cannot be started"
 | |
|                           " due to errors in current binlog file");
 | |
|                 /* Don't start replication, just return */
 | |
|                 return (MXS_ROUTER *)inst;
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         /* Log current pos in binlog file and last seen transaction pos */
 | |
|         MXS_INFO("Current binlog file is %s, safe pos %lu, current pos is %lu",
 | |
|                  inst->binlog_name, inst->binlog_position, inst->current_pos);
 | |
| 
 | |
|         /**
 | |
|          *  Try loading last found GTID if the file size is <= 4 bytes
 | |
|          */
 | |
|         if (inst->mariadb10_master_gtid &&
 | |
|             inst->current_pos <= 4)
 | |
|         {
 | |
|             MARIADB_GTID_INFO last_gtid;
 | |
|             memset(&last_gtid, 0, sizeof(last_gtid));
 | |
| 
 | |
|             /* Get last MariaDB GTID from repo */
 | |
|             if (blr_load_last_mariadb_gtid(inst, &last_gtid) &&
 | |
|                 last_gtid.gtid[0])
 | |
|             {
 | |
|                 /* Set MariaDB GTID */
 | |
|                 strcpy(inst->last_mariadb_gtid, last_gtid.gtid);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 /**
 | |
|                  * In case of no GTID, inst->last_mariadb_gtid is empty.
 | |
|                  *
 | |
|                  * If connecting to master with GTID = "" the server
 | |
|                  * will send data from its first binlog and
 | |
|                  * this might overwrite existing data.
 | |
|                  *
 | |
|                  * Binlog server will not connect to master.
 | |
|                  *
 | |
|                  * It's needed to connect to MySQL admin interface
 | |
|                  * and explicitely issue:
 | |
|                  * SET @@GLOBAL.GTID_SLAVE_POS =''
 | |
|                  * and START SLAVE
 | |
|                  */
 | |
| 
 | |
|                 /* Force STOPPED state */
 | |
|                 inst->master_state = BLRM_SLAVE_STOPPED;
 | |
|                 /* Set current binlog file to empy value */
 | |
|                 *inst->binlog_name = 0;
 | |
|                 /* Set mysql_errno and error message */
 | |
|                 inst->m_errno = BINLOG_FATAL_ERROR_READING;
 | |
|                 inst->m_errmsg = MXS_STRDUP_A("HY000 Cannot find any GTID"
 | |
|                                               " in the GTID maps repo."
 | |
|                                               " Please issue SET @@GLOBAL.GTID_SLAVE_POS =''"
 | |
|                                               " and START SLAVE."
 | |
|                                               " Existing binlogs might be overwritten.");
 | |
|                 MXS_ERROR("%s: %s",
 | |
|                           inst->service->name,
 | |
|                           inst->m_errmsg);
 | |
| 
 | |
|                 return (MXS_ROUTER *)inst;
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         /**
 | |
|          *  Don't start replication if binlog has START_ENCRYPTION_EVENT
 | |
|          *  but binlog encryption is off
 | |
|          */
 | |
|         if (!inst->encryption.enabled && inst->encryption_ctx)
 | |
|         {
 | |
|             MXS_ERROR("Found START_ENCRYPTION_EVENT but "
 | |
|                       "binlog encryption option is currently Off. Replication can't start right now. "
 | |
|                       "Please restart MaxScale with option set to On");
 | |
| 
 | |
|             /* Force STOPPED state */
 | |
|             inst->master_state = BLRM_SLAVE_STOPPED;
 | |
|             /* Set mysql_errno and error message */
 | |
|             inst->m_errno = BINLOG_FATAL_ERROR_READING;
 | |
|             inst->m_errmsg = MXS_STRDUP_A("HY000 Binlog encryption is Off"
 | |
|                                           " but current binlog file has"
 | |
|                                           " the START_ENCRYPTION_EVENT");
 | |
| 
 | |
|             return (MXS_ROUTER *)inst;
 | |
|         }
 | |
| 
 | |
|         /* Start replication from master server */
 | |
|         blr_start_master_in_main(inst);
 | |
|     }
 | |
| 
 | |
|     return (MXS_ROUTER *)inst;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Free the router instance
 | |
|  *
 | |
|  * @param    instance    The router instance
 | |
|  */
 | |
| static void
 | |
| free_instance(ROUTER_INSTANCE *instance)
 | |
| {
 | |
|     for (SERV_LISTENER *port = instance->service->ports; port; port = port->next)
 | |
|     {
 | |
|         users_free(port->users);
 | |
|     }
 | |
| 
 | |
|     MXS_FREE(instance->uuid);
 | |
|     MXS_FREE(instance->user);
 | |
|     MXS_FREE(instance->password);
 | |
|     MXS_FREE(instance->set_master_version);
 | |
|     MXS_FREE(instance->set_master_hostname);
 | |
|     MXS_FREE(instance->set_slave_hostname);
 | |
|     MXS_FREE(instance->fileroot);
 | |
|     MXS_FREE(instance->binlogdir);
 | |
|     /* SSL options */
 | |
|     MXS_FREE(instance->ssl_ca);
 | |
|     MXS_FREE(instance->ssl_cert);
 | |
|     MXS_FREE(instance->ssl_key);
 | |
|     MXS_FREE(instance->ssl_version);
 | |
| 
 | |
|     MXS_FREE(instance);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Associate a new session with this instance of the router.
 | |
|  *
 | |
|  * In the case of the binlog router a new session equates to a new slave
 | |
|  * connecting to MaxScale and requesting binlog records. We need to go
 | |
|  * through the slave registration process for this new slave.
 | |
|  *
 | |
|  * @param instance  The router instance data
 | |
|  * @param session   The session itself
 | |
|  * @return Session specific data for this session
 | |
|  */
 | |
| static MXS_ROUTER_SESSION *
 | |
| newSession(MXS_ROUTER *instance, MXS_SESSION *session)
 | |
| {
 | |
|     ROUTER_INSTANCE *inst = (ROUTER_INSTANCE *)instance;
 | |
|     ROUTER_SLAVE *slave;
 | |
| 
 | |
|     MXS_DEBUG("binlog router: %lu [newSession] new router session with "
 | |
|               "session %p, and inst %p.",
 | |
|               pthread_self(),
 | |
|               session,
 | |
|               inst);
 | |
| 
 | |
|     if ((slave = (ROUTER_SLAVE *)MXS_CALLOC(1, sizeof(ROUTER_SLAVE))) == NULL)
 | |
|     {
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
| #if defined(SS_DEBUG)
 | |
|     slave->rses_chk_top = CHK_NUM_ROUTER_SES;
 | |
|     slave->rses_chk_tail = CHK_NUM_ROUTER_SES;
 | |
| #endif
 | |
| 
 | |
|     memset(&slave->stats, 0, sizeof(SLAVE_STATS));
 | |
|     atomic_add(&inst->stats.n_slaves, 1);
 | |
|     slave->state = BLRS_CREATED;        /* Set initial state of the slave */
 | |
|     slave->cstate = 0;
 | |
|     slave->pthread = 0;
 | |
|     slave->overrun = 0;
 | |
|     slave->uuid = NULL;
 | |
|     slave->hostname = NULL;
 | |
|     spinlock_init(&slave->catch_lock);
 | |
|     slave->dcb = session->client_dcb;
 | |
|     slave->router = inst;
 | |
| #ifdef BLFILE_IN_SLAVE
 | |
|     slave->file = NULL;
 | |
| #endif
 | |
|     strcpy(slave->binlogfile, "unassigned");
 | |
|     slave->connect_time = time(0);
 | |
|     slave->lastEventTimestamp = 0;
 | |
|     slave->mariadb10_compat = false;
 | |
|     slave->heartbeat = 0;
 | |
|     slave->lastEventReceived = 0;
 | |
|     slave->encryption_ctx = NULL;
 | |
|     slave->mariadb_gtid = NULL;
 | |
|     slave->gtid_maps = NULL;
 | |
|     memset(&slave->f_info, 0, sizeof (MARIADB_GTID_INFO));
 | |
|     slave->annotate_rows = false;
 | |
| 
 | |
|     /**
 | |
|      * Add this session to the list of active sessions.
 | |
|      */
 | |
|     spinlock_acquire(&inst->lock);
 | |
|     slave->next = inst->slaves;
 | |
|     inst->slaves = slave;
 | |
|     spinlock_release(&inst->lock);
 | |
| 
 | |
|     CHK_CLIENT_RSES(slave);
 | |
| 
 | |
|     return (void *)slave;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * The session is no longer required. Shutdown all operation and free memory
 | |
|  * associated with this session. In this case a single session is associated
 | |
|  * to a slave of MaxScale. Therefore this is called when that slave is no
 | |
|  * longer active and should remove of reference to that slave, free memory
 | |
|  * and prevent any further forwarding of binlog records to that slave.
 | |
|  *
 | |
|  * Parameters:
 | |
|  * @param router_instance   The instance of the router
 | |
|  * @param router_cli_ses    The particular session to free
 | |
|  *
 | |
|  */
 | |
| static void freeSession(MXS_ROUTER* router_instance,
 | |
|                         MXS_ROUTER_SESSION* router_client_ses)
 | |
| {
 | |
|     ROUTER_INSTANCE *router = (ROUTER_INSTANCE *)router_instance;
 | |
|     ROUTER_SLAVE *slave = (ROUTER_SLAVE *)router_client_ses;
 | |
| 
 | |
|     ss_debug(int prev_val = ) atomic_add(&router->stats.n_slaves, -1);
 | |
|     ss_dassert(prev_val > 0);
 | |
| 
 | |
|     /*
 | |
|      * Remove the slave session form the list of slaves that are using the
 | |
|      * router currently.
 | |
|      */
 | |
|     spinlock_acquire(&router->lock);
 | |
|     if (router->slaves == slave)
 | |
|     {
 | |
|         router->slaves = slave->next;
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         ROUTER_SLAVE *ptr = router->slaves;
 | |
| 
 | |
|         while (ptr != NULL && ptr->next != slave)
 | |
|         {
 | |
|             ptr = ptr->next;
 | |
|         }
 | |
| 
 | |
|         if (ptr != NULL)
 | |
|         {
 | |
|             ptr->next = slave->next;
 | |
|         }
 | |
|     }
 | |
|     spinlock_release(&router->lock);
 | |
| 
 | |
|     MXS_DEBUG("%lu [freeSession] Unlinked router_client_session %p from "
 | |
|               "router %p. Connections : %d. ",
 | |
|               pthread_self(),
 | |
|               slave,
 | |
|               router,
 | |
|               prev_val - 1);
 | |
| 
 | |
|     if (slave->hostname)
 | |
|     {
 | |
|         MXS_FREE(slave->hostname);
 | |
|     }
 | |
|     if (slave->user)
 | |
|     {
 | |
|         MXS_FREE(slave->user);
 | |
|     }
 | |
|     if (slave->passwd)
 | |
|     {
 | |
|         MXS_FREE(slave->passwd);
 | |
|     }
 | |
|     if (slave->encryption_ctx)
 | |
|     {
 | |
|         MXS_FREE(slave->encryption_ctx);
 | |
|     }
 | |
|     if (slave->mariadb_gtid)
 | |
|     {
 | |
|         MXS_FREE(slave->mariadb_gtid);
 | |
|     }
 | |
|     MXS_FREE(slave);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Close a session with the router, this is the mechanism
 | |
|  * by which a router may cleanup data structure etc.
 | |
|  *
 | |
|  * @param instance      The router instance data
 | |
|  * @param router_session    The session being closed
 | |
|  */
 | |
| static void
 | |
| closeSession(MXS_ROUTER *instance, MXS_ROUTER_SESSION *router_session)
 | |
| {
 | |
|     ROUTER_INSTANCE *router = (ROUTER_INSTANCE *)instance;
 | |
|     ROUTER_SLAVE *slave = (ROUTER_SLAVE *)router_session;
 | |
| 
 | |
|     if (slave == NULL)
 | |
|     {
 | |
|         /*
 | |
|          * We must be closing the master session.
 | |
|          */
 | |
|         MXS_NOTICE("%s: Master %s disconnected after %ld seconds. "
 | |
|                    "%lu events read,",
 | |
|                    router->service->name, router->service->dbref->server->name,
 | |
|                    time(0) - router->connect_time, router->stats.n_binlogs_ses);
 | |
|         MXS_ERROR("Binlog router close session with master server %s",
 | |
|                   router->service->dbref->server->unique_name);
 | |
|         blr_master_reconnect(router);
 | |
|         return;
 | |
|     }
 | |
|     CHK_CLIENT_RSES(slave);
 | |
| 
 | |
|     /**
 | |
|      * Lock router client session for secure read and update.
 | |
|      */
 | |
|     if (rses_begin_locked_router_action(slave))
 | |
|     {
 | |
|         /* decrease server registered slaves counter */
 | |
|         atomic_add(&router->stats.n_registered, -1);
 | |
| 
 | |
|         if (slave->state > 0)
 | |
|         {
 | |
|             MXS_NOTICE("%s: Slave [%s]:%d, server id %d, disconnected after %ld seconds. "
 | |
|                        "%d SQL commands, %d events sent (%lu bytes), binlog '%s', "
 | |
|                        "last position %lu",
 | |
|                        router->service->name, slave->dcb->remote, dcb_get_port(slave->dcb),
 | |
|                        slave->serverid,
 | |
|                        time(0) - slave->connect_time,
 | |
|                        slave->stats.n_queries,
 | |
|                        slave->stats.n_events,
 | |
|                        slave->stats.n_bytes,
 | |
|                        slave->binlogfile,
 | |
|                        (unsigned long)slave->binlog_pos);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             MXS_NOTICE("%s: Slave %s, server id %d, disconnected after %ld seconds. "
 | |
|                        "%d SQL commands",
 | |
|                        router->service->name, slave->dcb->remote,
 | |
|                        slave->serverid,
 | |
|                        time(0) - slave->connect_time,
 | |
|                        slave->stats.n_queries);
 | |
|         }
 | |
| 
 | |
|         /*
 | |
|          * Mark the slave as unregistered to prevent the forwarding
 | |
|          * of any more binlog records to this slave.
 | |
|          */
 | |
|         slave->state = BLRS_UNREGISTERED;
 | |
| 
 | |
| #ifdef BLFILE_IN_SLAVE
 | |
|         // TODO: Is it really certain the file can be closed here? If other
 | |
|         // TODO: threads are using the slave instance, bag things will happen. [JWi].
 | |
|         if (slave->file)
 | |
|         {
 | |
|             blr_close_binlog(router, slave->file);
 | |
|         }
 | |
| #endif
 | |
| 
 | |
|         /* Unlock */
 | |
|         rses_end_locked_router_action(slave);
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * We have data from the client, this is likely to be packets related to
 | |
|  * the registration of the slave to receive binlog records. Unlike most
 | |
|  * MaxScale routers there is no forwarding to the backend database, merely
 | |
|  * the return of either predefined server responses that have been cached
 | |
|  * or binlog records.
 | |
|  *
 | |
|  * @param instance       The router instance
 | |
|  * @param router_session The router session returned from the newSession call
 | |
|  * @param queue          The queue of data buffers to route
 | |
|  * @return The number of bytes sent
 | |
|  */
 | |
| static int
 | |
| routeQuery(MXS_ROUTER *instance, MXS_ROUTER_SESSION *router_session, GWBUF *queue)
 | |
| {
 | |
|     ROUTER_INSTANCE *router = (ROUTER_INSTANCE *)instance;
 | |
|     ROUTER_SLAVE *slave = (ROUTER_SLAVE *)router_session;
 | |
| 
 | |
|     return blr_slave_request(router, slave, queue);
 | |
| }
 | |
| 
 | |
| static char *event_names[] =
 | |
| {
 | |
|     "Invalid", "Start Event V3", "Query Event", "Stop Event", "Rotate Event",
 | |
|     "Integer Session Variable", "Load Event", "Slave Event", "Create File Event",
 | |
|     "Append Block Event", "Exec Load Event", "Delete File Event",
 | |
|     "New Load Event", "Rand Event", "User Variable Event", "Format Description Event",
 | |
|     "Transaction ID Event (2 Phase Commit)", "Begin Load Query Event",
 | |
|     "Execute Load Query Event", "Table Map Event", "Write Rows Event (v0)",
 | |
|     "Update Rows Event (v0)", "Delete Rows Event (v0)", "Write Rows Event (v1)",
 | |
|     "Update Rows Event (v1)", "Delete Rows Event (v1)", "Incident Event",
 | |
|     "Heartbeat Event", "Ignorable Event", "Rows Query Event", "Write Rows Event (v2)",
 | |
|     "Update Rows Event (v2)", "Delete Rows Event (v2)", "GTID Event",
 | |
|     "Anonymous GTID Event", "Previous GTIDS Event"
 | |
| };
 | |
| 
 | |
| /* New MariaDB event numbers starts from 0xa0 */
 | |
| static char *event_names_mariadb10[] =
 | |
| {
 | |
|     "Annotate Rows Event",
 | |
|     /* New MariaDB 10.x event numbers */
 | |
|     "Binlog Checkpoint Event",
 | |
|     "GTID Event",
 | |
|     "GTID List Event",
 | |
|     "Start Encryption Event"
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * Display an entry from the spinlock statistics data
 | |
|  *
 | |
|  * @param   dcb The DCB to print to
 | |
|  * @param   desc    Description of the statistic
 | |
|  * @param   value   The statistic value
 | |
|  */
 | |
| #if SPINLOCK_PROFILE
 | |
| static void
 | |
| spin_reporter(void *dcb, char *desc, int value)
 | |
| {
 | |
|     dcb_printf((DCB *)dcb, "\t\t%-35s	%d\n", desc, value);
 | |
| }
 | |
| #endif
 | |
| 
 | |
| /**
 | |
|  * Display router diagnostics
 | |
|  *
 | |
|  * @param instance  Instance of the router
 | |
|  * @param dcb       DCB to send diagnostics to
 | |
|  */
 | |
| static void
 | |
| diagnostics(MXS_ROUTER *router, DCB *dcb)
 | |
| {
 | |
|     ROUTER_INSTANCE *router_inst = (ROUTER_INSTANCE *)router;
 | |
|     ROUTER_SLAVE *session;
 | |
|     int i = 0, j;
 | |
|     int minno = 0;
 | |
|     double min5, min10, min15, min30;
 | |
|     char buf[40];
 | |
|     struct tm tm;
 | |
| 
 | |
|     spinlock_acquire(&router_inst->lock);
 | |
|     session = router_inst->slaves;
 | |
|     while (session)
 | |
|     {
 | |
|         i++;
 | |
|         session = session->next;
 | |
|     }
 | |
|     spinlock_release(&router_inst->lock);
 | |
| 
 | |
|     minno = router_inst->stats.minno;
 | |
|     min30 = 0.0;
 | |
|     min15 = 0.0;
 | |
|     min10 = 0.0;
 | |
|     min5 = 0.0;
 | |
|     for (j = 0; j < BLR_NSTATS_MINUTES; j++)
 | |
|     {
 | |
|         minno--;
 | |
|         if (minno < 0)
 | |
|         {
 | |
|             minno += BLR_NSTATS_MINUTES;
 | |
|         }
 | |
|         min30 += router_inst->stats.minavgs[minno];
 | |
|         if (j < 15)
 | |
|         {
 | |
|             min15 += router_inst->stats.minavgs[minno];
 | |
|         }
 | |
|         if (j < 10)
 | |
|         {
 | |
|             min10 += router_inst->stats.minavgs[minno];
 | |
|         }
 | |
|         if (j < 5)
 | |
|         {
 | |
|             min5 += router_inst->stats.minavgs[minno];
 | |
|         }
 | |
|     }
 | |
|     min30 /= 30.0;
 | |
|     min15 /= 15.0;
 | |
|     min10 /= 10.0;
 | |
|     min5 /= 5.0;
 | |
| 
 | |
|     if (router_inst->master)
 | |
|     {
 | |
|         dcb_printf(dcb, "\tMaster connection DCB:               %p\n",
 | |
|                    router_inst->master);
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         dcb_printf(dcb, "\tMaster connection DCB:               0x0\n");
 | |
|     }
 | |
| 
 | |
|     /* SSL options */
 | |
|     if (router_inst->ssl_enabled)
 | |
|     {
 | |
|         dcb_printf(dcb, "\tMaster SSL is ON:\n");
 | |
|         if (router_inst->service->dbref->server && router_inst->service->dbref->server->server_ssl)
 | |
|         {
 | |
|             dcb_printf(dcb, "\t\tMaster SSL CA cert: %s\n",
 | |
|                        router_inst->service->dbref->server->server_ssl->ssl_ca_cert);
 | |
|             dcb_printf(dcb, "\t\tMaster SSL Cert:    %s\n",
 | |
|                        router_inst->service->dbref->server->server_ssl->ssl_cert);
 | |
|             dcb_printf(dcb, "\t\tMaster SSL Key:     %s\n",
 | |
|                        router_inst->service->dbref->server->server_ssl->ssl_key);
 | |
|             dcb_printf(dcb, "\t\tMaster SSL tls_ver: %s\n",
 | |
|                        router_inst->ssl_version ? router_inst->ssl_version : "MAX");
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /* Binlog Encryption options */
 | |
|     if (router_inst->encryption.enabled)
 | |
|     {
 | |
|         dcb_printf(dcb, "\tBinlog Encryption is ON:\n");
 | |
|         dcb_printf(dcb, "\t\tEncryption Key File:      %s\n",
 | |
|                    router_inst->encryption.key_management_filename);
 | |
|         dcb_printf(dcb, "\t\tEncryption Key Algorithm: %s\n",
 | |
|                    blr_get_encryption_algorithm(router_inst->encryption.encryption_algorithm));
 | |
|         dcb_printf(dcb, "\t\tEncryption Key length:    %lu bits\n",
 | |
|                    8 * router_inst->encryption.key_len);
 | |
|     }
 | |
| 
 | |
|     dcb_printf(dcb, "\tMaster connection state:                     %s\n",
 | |
|                blrm_states[router_inst->master_state]);
 | |
| 
 | |
|     localtime_r(&router_inst->stats.lastReply, &tm);
 | |
|     asctime_r(&tm, buf);
 | |
| 
 | |
|     dcb_printf(dcb, "\tBinlog directory:                            %s\n",
 | |
|                router_inst->binlogdir);
 | |
|     dcb_printf(dcb, "\tHeartbeat period (seconds):                  %lu%s\n",
 | |
|                router_inst->heartbeat,
 | |
|                router_inst->heartbeat ? "" : " (disabled)");
 | |
|     dcb_printf(dcb, "\tNumber of master connects:                   %d\n",
 | |
|                router_inst->stats.n_masterstarts);
 | |
|     dcb_printf(dcb, "\tNumber of delayed reconnects:                %d\n",
 | |
|                router_inst->stats.n_delayedreconnects);
 | |
|     dcb_printf(dcb, "\tNumber of connect retries:                   %d\n",
 | |
|                router_inst->retry_count);
 | |
|     dcb_printf(dcb, "\tConnect retry interval:                      %d\n",
 | |
|                router_inst->retry_interval);
 | |
|     dcb_printf(dcb, "\tConnect retry count limit:                   %d\n",
 | |
|                router_inst->retry_limit);
 | |
|     dcb_printf(dcb, "\tCurrent binlog file:                         %s\n",
 | |
|                router_inst->binlog_name);
 | |
|     dcb_printf(dcb, "\tCurrent binlog position:                     %lu\n",
 | |
|                router_inst->current_pos);
 | |
|     if (router_inst->trx_safe)
 | |
|     {
 | |
|         if (router_inst->pending_transaction.state != BLRM_NO_TRANSACTION)
 | |
|         {
 | |
|             dcb_printf(dcb, "\tCurrent open transaction pos:                %lu\n",
 | |
|                        router_inst->binlog_position);
 | |
|         }
 | |
|     }
 | |
|     dcb_printf(dcb, "\tNumber of slave servers:                     %u\n",
 | |
|                router_inst->stats.n_slaves);
 | |
|     dcb_printf(dcb, "\tNo. of binlog events received this session:  %lu\n",
 | |
|                router_inst->stats.n_binlogs_ses);
 | |
|     dcb_printf(dcb, "\tTotal no. of binlog events received:         %lu\n",
 | |
|                router_inst->stats.n_binlogs);
 | |
|     dcb_printf(dcb, "\tNo. of bad CRC received from master:         %u\n",
 | |
|                router_inst->stats.n_badcrc);
 | |
|     minno = router_inst->stats.minno - 1;
 | |
|     if (minno == -1)
 | |
|     {
 | |
|         minno += BLR_NSTATS_MINUTES;
 | |
|     }
 | |
|     dcb_printf(dcb, "\tNumber of binlog events per minute\n");
 | |
|     dcb_printf(dcb, "\tCurrent        5        10       15       30 Min Avg\n");
 | |
|     dcb_printf(dcb, "\t %6d  %8.1f %8.1f %8.1f %8.1f\n",
 | |
|                router_inst->stats.minavgs[minno], min5, min10, min15, min30);
 | |
|     dcb_printf(dcb, "\tNumber of fake binlog events:                %lu\n",
 | |
|                router_inst->stats.n_fakeevents);
 | |
|     dcb_printf(dcb, "\tNumber of artificial binlog events:          %lu\n",
 | |
|                router_inst->stats.n_artificial);
 | |
|     dcb_printf(dcb, "\tNumber of binlog events in error:            %lu\n",
 | |
|                router_inst->stats.n_binlog_errors);
 | |
|     dcb_printf(dcb, "\tNumber of binlog rotate events:              %lu\n",
 | |
|                router_inst->stats.n_rotates);
 | |
|     dcb_printf(dcb, "\tNumber of heartbeat events:                  %u\n",
 | |
|                router_inst->stats.n_heartbeats);
 | |
|     dcb_printf(dcb, "\tNumber of packets received:                  %u\n",
 | |
|                router_inst->stats.n_reads);
 | |
|     dcb_printf(dcb, "\tNumber of residual data packets:             %u\n",
 | |
|                router_inst->stats.n_residuals);
 | |
|     dcb_printf(dcb, "\tAverage events per packet:                   %.1f\n",
 | |
|                router_inst->stats.n_reads != 0 ?
 | |
|                ((double)router_inst->stats.n_binlogs / router_inst->stats.n_reads) : 0);
 | |
| 
 | |
|     spinlock_acquire(&router_inst->lock);
 | |
|     if (router_inst->stats.lastReply)
 | |
|     {
 | |
|         if (buf[strlen(buf) - 1] == '\n')
 | |
|         {
 | |
|             buf[strlen(buf) - 1] = '\0';
 | |
|         }
 | |
|         dcb_printf(dcb, "\tLast event from master at:                   %s (%ld seconds ago)\n",
 | |
|                    buf, time(0) - router_inst->stats.lastReply);
 | |
| 
 | |
|         if (!router_inst->mariadb10_compat)
 | |
|         {
 | |
|             dcb_printf(dcb, "\tLast event from master:                      0x%x, %s\n",
 | |
|                        router_inst->lastEventReceived,
 | |
|                        (router_inst->lastEventReceived <= MAX_EVENT_TYPE) ?
 | |
|                        event_names[router_inst->lastEventReceived] : "unknown");
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             char *ptr = NULL;
 | |
|             if (router_inst->lastEventReceived <= MAX_EVENT_TYPE)
 | |
|             {
 | |
|                 ptr = event_names[router_inst->lastEventReceived];
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 /* Check MariaDB 10 new events */
 | |
|                 if (router_inst->lastEventReceived >= MARIADB_NEW_EVENTS_BEGIN &&
 | |
|                     router_inst->lastEventReceived <= MAX_EVENT_TYPE_MARIADB10)
 | |
|                 {
 | |
|                     ptr = event_names_mariadb10[(router_inst->lastEventReceived - MARIADB_NEW_EVENTS_BEGIN)];
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|             dcb_printf(dcb, "\tLast event from master:                      0x%x, %s\n",
 | |
|                        router_inst->lastEventReceived, (ptr != NULL) ? ptr : "unknown");
 | |
| 
 | |
|             if (router_inst->mariadb10_gtid &&
 | |
|                 router_inst->last_mariadb_gtid[0])
 | |
|             {
 | |
|                 dcb_printf(dcb, "\tLast seen MariaDB GTID:                      %s\n",
 | |
|                            router_inst->last_mariadb_gtid);
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         if (router_inst->lastEventTimestamp)
 | |
|         {
 | |
|             time_t  last_event = (time_t)router_inst->lastEventTimestamp;
 | |
|             localtime_r(&last_event, &tm);
 | |
|             asctime_r(&tm, buf);
 | |
|             if (buf[strlen(buf) - 1] == '\n')
 | |
|             {
 | |
|                 buf[strlen(buf) - 1] = '\0';
 | |
|             }
 | |
|             dcb_printf(dcb, "\tLast binlog event timestamp:                 %u (%s)\n",
 | |
|                        router_inst->lastEventTimestamp, buf);
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         dcb_printf(dcb, "\tNo events received from master yet\n");
 | |
|     }
 | |
|     spinlock_release(&router_inst->lock);
 | |
| 
 | |
|     if (router_inst->active_logs)
 | |
|     {
 | |
|         dcb_printf(dcb, "\tRouter processing binlog records\n");
 | |
|     }
 | |
|     if (router_inst->reconnect_pending)
 | |
|     {
 | |
|         dcb_printf(dcb, "\tRouter pending reconnect to master\n");
 | |
|     }
 | |
|     dcb_printf(dcb, "\tEvents received:\n");
 | |
|     for (i = 0; i <= MAX_EVENT_TYPE; i++)
 | |
|     {
 | |
|         dcb_printf(dcb, "\t\t%-38s   %lu\n", event_names[i], router_inst->stats.events[i]);
 | |
|     }
 | |
| 
 | |
|     if (router_inst->mariadb10_compat)
 | |
|     {
 | |
|         /* Display MariaDB 10 new events */
 | |
|         for (i = MARIADB_NEW_EVENTS_BEGIN; i <= MAX_EVENT_TYPE_MARIADB10; i++)
 | |
|         {
 | |
|             dcb_printf(dcb, "\t\tMariaDB 10 %-38s   %lu\n",
 | |
|                        event_names_mariadb10[(i - MARIADB_NEW_EVENTS_BEGIN)],
 | |
|                        router_inst->stats.events[i]);
 | |
|         }
 | |
|     }
 | |
| 
 | |
| #if SPINLOCK_PROFILE
 | |
|     dcb_printf(dcb, "\tSpinlock statistics (instlock):\n");
 | |
|     spinlock_stats(&instlock, spin_reporter, dcb);
 | |
|     dcb_printf(dcb, "\tSpinlock statistics (instance lock):\n");
 | |
|     spinlock_stats(&router_inst->lock, spin_reporter, dcb);
 | |
|     dcb_printf(dcb, "\tSpinlock statistics (binlog position lock):\n");
 | |
|     spinlock_stats(&router_inst->binlog_lock, spin_reporter, dcb);
 | |
| #endif
 | |
| 
 | |
|     if (router_inst->slaves)
 | |
|     {
 | |
|         dcb_printf(dcb, "\tSlaves:\n");
 | |
|         spinlock_acquire(&router_inst->lock);
 | |
|         session = router_inst->slaves;
 | |
|         while (session)
 | |
|         {
 | |
| 
 | |
|             minno = session->stats.minno;
 | |
|             min30 = 0.0;
 | |
|             min15 = 0.0;
 | |
|             min10 = 0.0;
 | |
|             min5 = 0.0;
 | |
|             for (j = 0; j < BLR_NSTATS_MINUTES; j++)
 | |
|             {
 | |
|                 minno--;
 | |
|                 if (minno < 0)
 | |
|                 {
 | |
|                     minno += BLR_NSTATS_MINUTES;
 | |
|                 }
 | |
|                 min30 += session->stats.minavgs[minno];
 | |
|                 if (j < 15)
 | |
|                 {
 | |
|                     min15 += session->stats.minavgs[minno];
 | |
|                 }
 | |
|                 if (j < 10)
 | |
|                 {
 | |
|                     min10 += session->stats.minavgs[minno];
 | |
|                 }
 | |
|                 if (j < 5)
 | |
|                 {
 | |
|                     min5 += session->stats.minavgs[minno];
 | |
|                 }
 | |
|             }
 | |
|             min30 /= 30.0;
 | |
|             min15 /= 15.0;
 | |
|             min10 /= 10.0;
 | |
|             min5 /= 5.0;
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tServer-id:                               %d\n",
 | |
|                        session->serverid);
 | |
|             if (session->hostname)
 | |
|             {
 | |
|                 dcb_printf(dcb,
 | |
|                            "\t\tHostname:                                %s\n", session->hostname);
 | |
|             }
 | |
|             if (session->uuid)
 | |
|             {
 | |
|                 dcb_printf(dcb, "\t\tSlave UUID:                              %s\n", session->uuid);
 | |
|             }
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tSlave_host_port:                         [%s]:%d\n",
 | |
|                        session->dcb->remote, dcb_get_port(session->dcb));
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tUsername:                                %s\n",
 | |
|                        session->dcb->user);
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tSlave DCB:                               %p\n",
 | |
|                        session->dcb);
 | |
|             if (session->dcb->ssl)
 | |
|             {
 | |
|                 dcb_printf(dcb,
 | |
|                            "\t\tSlave connected with SSL:                %s\n",
 | |
|                            session->dcb->ssl_state == SSL_ESTABLISHED ?
 | |
|                            "Established" : "Not connected yet");
 | |
|             }
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tNext Sequence No:                        %d\n",
 | |
|                        session->seqno);
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tState:                                   %s\n",
 | |
|                        blrs_states[session->state]);
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tBinlog file:                             %s\n",
 | |
|                        session->binlogfile);
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tBinlog position:                         %u\n",
 | |
|                        session->binlog_pos);
 | |
|             if (session->nocrc)
 | |
|             {
 | |
|                 dcb_printf(dcb,
 | |
|                            "\t\tMaster Binlog CRC:                       None\n");
 | |
|             }
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tNo. requests:                            %u\n",
 | |
|                        session->stats.n_requests);
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tNo. events sent:                         %u\n",
 | |
|                        session->stats.n_events);
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tNo. bytes sent:                          %lu\n",
 | |
|                        session->stats.n_bytes);
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tNo. bursts sent:                         %u\n",
 | |
|                        session->stats.n_bursts);
 | |
|             dcb_printf(dcb,
 | |
|                        "\t\tNo. transitions to follow mode:          %u\n",
 | |
|                        session->stats.n_bursts);
 | |
|             if (router_inst->send_slave_heartbeat)
 | |
|             {
 | |
|                 dcb_printf(dcb,
 | |
|                            "\t\tHeartbeat period (seconds):              %d\n",
 | |
|                            session->heartbeat);
 | |
|             }
 | |
| 
 | |
|             minno = session->stats.minno - 1;
 | |
|             if (minno == -1)
 | |
|             {
 | |
|                 minno += BLR_NSTATS_MINUTES;
 | |
|             }
 | |
|             dcb_printf(dcb, "\t\tNumber of binlog events per minute\n");
 | |
|             dcb_printf(dcb, "\t\tCurrent        5        10       15       30 Min Avg\n");
 | |
|             dcb_printf(dcb, "\t\t %6d  %8.1f %8.1f %8.1f %8.1f\n",
 | |
|                        session->stats.minavgs[minno], min5, min10,
 | |
|                        min15, min30);
 | |
|             dcb_printf(dcb, "\t\tNo. flow control:                        %u\n",
 | |
|                        session->stats.n_flows);
 | |
|             dcb_printf(dcb, "\t\tNo. up to date:                          %u\n",
 | |
|                        session->stats.n_upd);
 | |
|             dcb_printf(dcb, "\t\tNo. of drained cbs                       %u\n",
 | |
|                        session->stats.n_dcb);
 | |
|             dcb_printf(dcb, "\t\tNo. of failed reads                      %u\n",
 | |
|                        session->stats.n_failed_read);
 | |
| 
 | |
| #ifdef DETAILED_DIAG
 | |
|             dcb_printf(dcb, "\t\tNo. of nested distribute events          %u\n",
 | |
|                        session->stats.n_overrun);
 | |
|             dcb_printf(dcb, "\t\tNo. of distribute action 1               %u\n",
 | |
|                        session->stats.n_actions[0]);
 | |
|             dcb_printf(dcb, "\t\tNo. of distribute action 2               %u\n",
 | |
|                        session->stats.n_actions[1]);
 | |
|             dcb_printf(dcb, "\t\tNo. of distribute action 3               %u\n",
 | |
|                        session->stats.n_actions[2]);
 | |
| #endif
 | |
|             if (session->lastEventTimestamp
 | |
|                 && router_inst->lastEventTimestamp && session->lastEventReceived != HEARTBEAT_EVENT)
 | |
|             {
 | |
|                 unsigned long seconds_behind;
 | |
|                 time_t  session_last_event = (time_t)session->lastEventTimestamp;
 | |
| 
 | |
|                 if (router_inst->lastEventTimestamp > session->lastEventTimestamp)
 | |
|                 {
 | |
|                     seconds_behind  = router_inst->lastEventTimestamp - session->lastEventTimestamp;
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     seconds_behind = 0;
 | |
|                 }
 | |
| 
 | |
|                 localtime_r(&session_last_event, &tm);
 | |
|                 asctime_r(&tm, buf);
 | |
|                 dcb_printf(dcb, "\t\tLast binlog event timestamp              %u, %s",
 | |
|                            session->lastEventTimestamp, buf);
 | |
|                 dcb_printf(dcb, "\t\tSeconds behind master                    %lu\n",
 | |
|                            seconds_behind);
 | |
|             }
 | |
| 
 | |
|             if (session->state == 0)
 | |
|             {
 | |
|                 dcb_printf(dcb, "\t\tSlave_mode:                              connected\n");
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 if ((session->cstate & CS_WAIT_DATA) == CS_WAIT_DATA)
 | |
|                 {
 | |
|                     dcb_printf(dcb, "\t\tSlave_mode:                              wait-for-data\n");
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     dcb_printf(dcb, "\t\tSlave_mode:                              catchup. %s%s\n",
 | |
|                                ((session->cstate & CS_EXPECTCB) == 0 ? "" :
 | |
|                                 "Waiting for DCB queue to drain."),
 | |
|                                ((session->cstate & CS_BUSY) == 0 ? "" :
 | |
|                                 " Busy in slave catchup."));
 | |
|                 }
 | |
|             }
 | |
| #if SPINLOCK_PROFILE
 | |
|             dcb_printf(dcb, "\tSpinlock statistics (catch_lock):\n");
 | |
|             spinlock_stats(&session->catch_lock, spin_reporter, dcb);
 | |
|             dcb_printf(dcb, "\tSpinlock statistics (rses_lock):\n");
 | |
|             spinlock_stats(&session->rses_lock, spin_reporter, dcb);
 | |
| #endif
 | |
|             dcb_printf(dcb, "\t\t--------------------\n\n");
 | |
|             session = session->next;
 | |
|         }
 | |
|         spinlock_release(&router_inst->lock);
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Display router diagnostics
 | |
|  *
 | |
|  * @param instance  Instance of the router
 | |
|  */
 | |
| static json_t* diagnostics_json(const MXS_ROUTER *router)
 | |
| {
 | |
|     ROUTER_INSTANCE *router_inst = (ROUTER_INSTANCE *)router;
 | |
|     int minno = 0;
 | |
|     double min5, min10, min15, min30;
 | |
|     char buf[40];
 | |
|     struct tm tm;
 | |
| 
 | |
|     json_t* rval = json_object();
 | |
| 
 | |
|     minno = router_inst->stats.minno;
 | |
|     min30 = 0.0;
 | |
|     min15 = 0.0;
 | |
|     min10 = 0.0;
 | |
|     min5 = 0.0;
 | |
|     for (int j = 0; j < BLR_NSTATS_MINUTES; j++)
 | |
|     {
 | |
|         minno--;
 | |
|         if (minno < 0)
 | |
|         {
 | |
|             minno += BLR_NSTATS_MINUTES;
 | |
|         }
 | |
|         min30 += router_inst->stats.minavgs[minno];
 | |
|         if (j < 15)
 | |
|         {
 | |
|             min15 += router_inst->stats.minavgs[minno];
 | |
|         }
 | |
|         if (j < 10)
 | |
|         {
 | |
|             min10 += router_inst->stats.minavgs[minno];
 | |
|         }
 | |
|         if (j < 5)
 | |
|         {
 | |
|             min5 += router_inst->stats.minavgs[minno];
 | |
|         }
 | |
|     }
 | |
|     min30 /= 30.0;
 | |
|     min15 /= 15.0;
 | |
|     min10 /= 10.0;
 | |
|     min5 /= 5.0;
 | |
| 
 | |
|     /* SSL options */
 | |
|     if (router_inst->ssl_enabled)
 | |
|     {
 | |
|         json_t* obj = json_object();
 | |
| 
 | |
|         json_object_set_new(obj, "ssl_ca_cert",
 | |
|                             json_string(router_inst->service->dbref->server->server_ssl->ssl_ca_cert));
 | |
|         json_object_set_new(obj, "ssl_cert", json_string(router_inst->service->dbref->server->server_ssl->ssl_cert));
 | |
|         json_object_set_new(obj, "ssl_key", json_string(router_inst->service->dbref->server->server_ssl->ssl_key));
 | |
|         json_object_set_new(obj, "ssl_version",
 | |
|                             json_string(router_inst->ssl_version ? router_inst->ssl_version : "MAX"));
 | |
| 
 | |
|         json_object_set_new(rval, "master_ssl", obj);
 | |
|     }
 | |
| 
 | |
|     /* Binlog Encryption options */
 | |
|     if (router_inst->encryption.enabled)
 | |
|     {
 | |
|         json_t* obj = json_object();
 | |
| 
 | |
|         json_object_set_new(obj, "key", json_string(
 | |
|                                 router_inst->encryption.key_management_filename));
 | |
|         json_object_set_new(obj, "algorithm", json_string(
 | |
|                                 blr_get_encryption_algorithm(router_inst->encryption.encryption_algorithm)));
 | |
|         json_object_set_new(obj, "key_length",
 | |
|                             json_integer(8 * router_inst->encryption.key_len));
 | |
| 
 | |
|         json_object_set_new(rval, "master_encryption", obj);
 | |
|     }
 | |
| 
 | |
|     json_object_set_new(rval, "master_state", json_string(blrm_states[router_inst->master_state]));
 | |
| 
 | |
|     localtime_r(&router_inst->stats.lastReply, &tm);
 | |
|     asctime_r(&tm, buf);
 | |
| 
 | |
| 
 | |
|     json_object_set_new(rval, "binlogdir", json_string(router_inst->binlogdir));
 | |
|     json_object_set_new(rval, "heartbeat", json_integer(router_inst->heartbeat));
 | |
|     json_object_set_new(rval, "master_retry_interval", json_integer(router_inst->retry_interval));
 | |
|     json_object_set_new(rval, "master_retry_limit", json_integer(router_inst->retry_limit));
 | |
|     json_object_set_new(rval, "master_retries", json_integer(router_inst->retry_count));
 | |
|     json_object_set_new(rval, "master_starts", json_integer(router_inst->stats.n_masterstarts));
 | |
|     json_object_set_new(rval, "master_reconnects", json_integer(router_inst->stats.n_delayedreconnects));
 | |
|     json_object_set_new(rval, "binlog_name", json_string(router_inst->binlog_name));
 | |
|     json_object_set_new(rval, "binlog_position", json_integer(router_inst->current_pos));
 | |
| 
 | |
|     if (router_inst->trx_safe)
 | |
|     {
 | |
|         if (router_inst->pending_transaction.state != BLRM_NO_TRANSACTION)
 | |
|         {
 | |
|             json_object_set_new(rval, "current_trx_position", json_integer(router_inst->binlog_position));
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     json_object_set_new(rval, "slaves", json_integer(router_inst->stats.n_slaves));
 | |
|     json_object_set_new(rval, "session_events", json_integer(router_inst->stats.n_binlogs_ses));
 | |
|     json_object_set_new(rval, "total_events", json_integer(router_inst->stats.n_binlogs));
 | |
|     json_object_set_new(rval, "bad_crc_count", json_integer(router_inst->stats.n_badcrc));
 | |
| 
 | |
|     minno = router_inst->stats.minno - 1;
 | |
|     if (minno == -1)
 | |
|     {
 | |
|         minno += BLR_NSTATS_MINUTES;
 | |
|     }
 | |
| 
 | |
|     json_object_set_new(rval, "events_0", json_real(router_inst->stats.minavgs[minno]));
 | |
|     json_object_set_new(rval, "events_5", json_real(min5));
 | |
|     json_object_set_new(rval, "events_10", json_real(min10));
 | |
|     json_object_set_new(rval, "events_15", json_real(min15));
 | |
|     json_object_set_new(rval, "events_30", json_real(min30));
 | |
| 
 | |
|     json_object_set_new(rval, "fake_events", json_integer(router_inst->stats.n_fakeevents));
 | |
| 
 | |
|     json_object_set_new(rval, "artificial_events", json_integer(router_inst->stats.n_artificial));
 | |
| 
 | |
|     json_object_set_new(rval, "binlog_errors", json_integer(router_inst->stats.n_binlog_errors));
 | |
|     json_object_set_new(rval, "binlog_rotates", json_integer(router_inst->stats.n_rotates));
 | |
|     json_object_set_new(rval, "heartbeat_events", json_integer(router_inst->stats.n_heartbeats));
 | |
|     json_object_set_new(rval, "events_read", json_integer(router_inst->stats.n_reads));
 | |
|     json_object_set_new(rval, "residual_packets", json_integer(router_inst->stats.n_residuals));
 | |
| 
 | |
|     double average_packets = router_inst->stats.n_reads != 0 ?
 | |
|                              ((double)router_inst->stats.n_binlogs / router_inst->stats.n_reads) : 0;
 | |
| 
 | |
|     json_object_set_new(rval, "average_events_per_packets", json_real(average_packets));
 | |
| 
 | |
|     spinlock_acquire(&router_inst->lock);
 | |
|     if (router_inst->stats.lastReply)
 | |
|     {
 | |
|         if (buf[strlen(buf) - 1] == '\n')
 | |
|         {
 | |
|             buf[strlen(buf) - 1] = '\0';
 | |
|         }
 | |
| 
 | |
|         json_object_set_new(rval, "latest_event", json_string(buf));
 | |
| 
 | |
|         if (!router_inst->mariadb10_compat)
 | |
|         {
 | |
|             json_object_set_new(rval,
 | |
|                                 "latest_event_type",
 | |
|                                 json_string((router_inst->lastEventReceived <= MAX_EVENT_TYPE) ?
 | |
|                                             event_names[router_inst->lastEventReceived] :
 | |
|                                             "unknown"));
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             char *ptr = NULL;
 | |
|             if (router_inst->lastEventReceived <= MAX_EVENT_TYPE)
 | |
|             {
 | |
|                 ptr = event_names[router_inst->lastEventReceived];
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 /* Check MariaDB 10 new events */
 | |
|                 if (router_inst->lastEventReceived >= MARIADB_NEW_EVENTS_BEGIN &&
 | |
|                     router_inst->lastEventReceived <= MAX_EVENT_TYPE_MARIADB10)
 | |
|                 {
 | |
|                     ptr = event_names_mariadb10[(router_inst->lastEventReceived - MARIADB_NEW_EVENTS_BEGIN)];
 | |
|                 }
 | |
|             }
 | |
| 
 | |
| 
 | |
|             json_object_set_new(rval, "latest_event_type", json_string((ptr != NULL) ? ptr : "unknown"));
 | |
| 
 | |
|             if (router_inst->mariadb10_gtid &&
 | |
|                 router_inst->last_mariadb_gtid[0])
 | |
|             {
 | |
|                 json_object_set_new(rval, "latest_gtid", json_string(router_inst->last_mariadb_gtid));
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         if (router_inst->lastEventTimestamp)
 | |
|         {
 | |
|             time_t last_event = (time_t)router_inst->lastEventTimestamp;
 | |
|             localtime_r(&last_event, &tm);
 | |
|             asctime_r(&tm, buf);
 | |
|             if (buf[strlen(buf) - 1] == '\n')
 | |
|             {
 | |
|                 buf[strlen(buf) - 1] = '\0';
 | |
|             }
 | |
| 
 | |
|             json_object_set_new(rval, "latest_event_timestamp", json_string(buf));
 | |
|         }
 | |
|     }
 | |
|     spinlock_release(&router_inst->lock);
 | |
| 
 | |
|     json_object_set_new(rval, "active_logs", json_boolean(router_inst->active_logs));
 | |
|     json_object_set_new(rval, "reconnect_pending", json_boolean(router_inst->reconnect_pending));
 | |
| 
 | |
|     json_t* ev = json_object();
 | |
| 
 | |
|     for (int i = 0; i <= MAX_EVENT_TYPE; i++)
 | |
|     {
 | |
|         json_object_set_new(ev, event_names[i], json_integer(router_inst->stats.events[i]));
 | |
|     }
 | |
| 
 | |
|     if (router_inst->mariadb10_compat)
 | |
|     {
 | |
|         /* Display MariaDB 10 new events */
 | |
|         for (int i = MARIADB_NEW_EVENTS_BEGIN; i <= MAX_EVENT_TYPE_MARIADB10; i++)
 | |
|         {
 | |
|             json_object_set_new(ev, event_names_mariadb10[(i - MARIADB_NEW_EVENTS_BEGIN)],
 | |
|                                 json_integer(router_inst->stats.events[i]));
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     json_object_set_new(rval, "event_types", ev);
 | |
| 
 | |
|     if (router_inst->slaves)
 | |
|     {
 | |
|         json_t* arr = json_array();
 | |
|         spinlock_acquire(&router_inst->lock);
 | |
| 
 | |
|         for (ROUTER_SLAVE *session = router_inst->slaves; session; session = session->next)
 | |
|         {
 | |
|             json_t* slave = json_object();
 | |
|             minno = session->stats.minno;
 | |
|             min30 = 0.0;
 | |
|             min15 = 0.0;
 | |
|             min10 = 0.0;
 | |
|             min5 = 0.0;
 | |
|             for (int j = 0; j < BLR_NSTATS_MINUTES; j++)
 | |
|             {
 | |
|                 minno--;
 | |
|                 if (minno < 0)
 | |
|                 {
 | |
|                     minno += BLR_NSTATS_MINUTES;
 | |
|                 }
 | |
|                 min30 += session->stats.minavgs[minno];
 | |
|                 if (j < 15)
 | |
|                 {
 | |
|                     min15 += session->stats.minavgs[minno];
 | |
|                 }
 | |
|                 if (j < 10)
 | |
|                 {
 | |
|                     min10 += session->stats.minavgs[minno];
 | |
|                 }
 | |
|                 if (j < 5)
 | |
|                 {
 | |
|                     min5 += session->stats.minavgs[minno];
 | |
|                 }
 | |
|             }
 | |
|             min30 /= 30.0;
 | |
|             min15 /= 15.0;
 | |
|             min10 /= 10.0;
 | |
|             min5 /= 5.0;
 | |
| 
 | |
|             json_object_set_new(rval, "server_id", json_integer(session->serverid));
 | |
| 
 | |
|             if (session->hostname)
 | |
|             {
 | |
|                 json_object_set_new(rval, "hostname", json_string(session->hostname));
 | |
|             }
 | |
|             if (session->uuid)
 | |
|             {
 | |
|                 json_object_set_new(rval, "uuid", json_string(session->uuid));
 | |
|             }
 | |
| 
 | |
|             json_object_set_new(rval, "address", json_string(session->dcb->remote));
 | |
|             json_object_set_new(rval, "port", json_integer(dcb_get_port(session->dcb)));
 | |
|             json_object_set_new(rval, "user", json_string(session->dcb->user));
 | |
|             json_object_set_new(rval, "ssl_enabled", json_boolean(session->dcb->ssl));
 | |
|             json_object_set_new(rval, "state", json_string(blrs_states[session->state]));
 | |
|             json_object_set_new(rval, "next_sequence", json_integer(session->seqno));
 | |
|             json_object_set_new(rval, "binlog_file", json_string(session->binlogfile));
 | |
|             json_object_set_new(rval, "binlog_pos", json_integer(session->binlog_pos));
 | |
|             json_object_set_new(rval, "crc", json_boolean(!session->nocrc));
 | |
| 
 | |
|             json_object_set_new(rval, "requests", json_integer(session->stats.n_requests));
 | |
|             json_object_set_new(rval, "events_sent", json_integer(session->stats.n_events));
 | |
|             json_object_set_new(rval, "bytes_sent", json_integer(session->stats.n_bytes));
 | |
|             json_object_set_new(rval, "data_bursts", json_integer(session->stats.n_bursts));
 | |
| 
 | |
|             if (router_inst->send_slave_heartbeat)
 | |
|             {
 | |
|                 json_object_set_new(rval, "heartbeat_period", json_integer(session->heartbeat));
 | |
|             }
 | |
| 
 | |
|             minno = session->stats.minno - 1;
 | |
|             if (minno == -1)
 | |
|             {
 | |
|                 minno += BLR_NSTATS_MINUTES;
 | |
|             }
 | |
| 
 | |
|             if (session->lastEventTimestamp
 | |
|                 && router_inst->lastEventTimestamp && session->lastEventReceived != HEARTBEAT_EVENT)
 | |
|             {
 | |
|                 unsigned long seconds_behind;
 | |
|                 time_t session_last_event = (time_t)session->lastEventTimestamp;
 | |
| 
 | |
|                 if (router_inst->lastEventTimestamp > session->lastEventTimestamp)
 | |
|                 {
 | |
|                     seconds_behind = router_inst->lastEventTimestamp - session->lastEventTimestamp;
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     seconds_behind = 0;
 | |
|                 }
 | |
| 
 | |
|                 localtime_r(&session_last_event, &tm);
 | |
|                 asctime_r(&tm, buf);
 | |
|                 trim(buf);
 | |
|                 json_object_set_new(rval, "last_binlog_event_timestamp", json_string(buf));
 | |
|                 json_object_set_new(rval, "seconds_behind_master", json_integer(seconds_behind));
 | |
|             }
 | |
| 
 | |
|             const char *mode = "connected";
 | |
| 
 | |
|             if (session->state)
 | |
|             {
 | |
|                 if ((session->cstate & CS_WAIT_DATA) == CS_WAIT_DATA)
 | |
|                 {
 | |
|                     mode = "wait-for-data";
 | |
|                 }
 | |
|                 else
 | |
|                 {
 | |
|                     mode = "catchup";
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|             json_object_set_new(slave, "mode", json_string(mode));
 | |
| 
 | |
|             json_array_append_new(arr, slave);
 | |
|         }
 | |
|         spinlock_release(&router_inst->lock);
 | |
| 
 | |
|         json_object_set_new(rval, "slaves", arr);
 | |
| 
 | |
|     }
 | |
| 
 | |
|     return rval;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Client Reply routine - in this case this is a message from the
 | |
|  * master server, It should be sent to the state machine that manages
 | |
|  * master packets as it may be binlog records or part of the registration
 | |
|  * handshake that takes part during connection establishment.
 | |
|  *
 | |
|  *
 | |
|  * @param       instance        The router instance
 | |
|  * @param       router_session  The router session
 | |
|  * @param       master_dcb      The DCB for the connection to the master
 | |
|  * @param       queue           The GWBUF with reply data
 | |
|  */
 | |
| static  void
 | |
| clientReply(MXS_ROUTER *instance, MXS_ROUTER_SESSION *router_session, GWBUF *queue, DCB *backend_dcb)
 | |
| {
 | |
|     ROUTER_INSTANCE *router = (ROUTER_INSTANCE *)instance;
 | |
| 
 | |
|     atomic_add(&router->stats.n_reads, 1);
 | |
|     blr_master_response(router, queue);
 | |
|     router->stats.lastReply = time(0);
 | |
| }
 | |
| 
 | |
| static char *
 | |
| extract_message(GWBUF *errpkt)
 | |
| {
 | |
|     char *rval;
 | |
|     int len;
 | |
| 
 | |
|     len = EXTRACT24(errpkt->start);
 | |
|     if ((rval = (char *)MXS_MALLOC(len)) == NULL)
 | |
|     {
 | |
|         return NULL;
 | |
|     }
 | |
|     memcpy(rval, (char *)(errpkt->start) + 7, 6);
 | |
|     rval[6] = ' ';
 | |
|     /* message size is len - (1 byte field count + 2 bytes errno + 6 bytes status) */
 | |
|     memcpy(&rval[7], (char *)(errpkt->start) + 13, len - 9);
 | |
|     rval[len - 2] = 0;
 | |
|     return rval;
 | |
| }
 | |
| 
 | |
| 
 | |
| 
 | |
| /**
 | |
|  * Error Reply routine
 | |
|  *
 | |
|  * The routine will reply to client errors and/or closing the session
 | |
|  * or try to open a new backend connection.
 | |
|  *
 | |
|  * @param       instance        The router instance
 | |
|  * @param       router_session  The router session
 | |
|  * @param       message         The error message to reply
 | |
|  * @param       backend_dcb     The backend DCB
 | |
|  * @param       action      The action: ERRACT_NEW_CONNECTION or ERRACT_REPLY_CLIENT
 | |
|  * @param   succp       Result of action: true iff router can continue
 | |
|  *
 | |
|  */
 | |
| static void
 | |
| errorReply(MXS_ROUTER *instance,
 | |
|            MXS_ROUTER_SESSION *router_session,
 | |
|            GWBUF *message,
 | |
|            DCB *backend_dcb,
 | |
|            mxs_error_action_t action,
 | |
|            bool *succp)
 | |
| {
 | |
|     ss_dassert(backend_dcb->dcb_role == DCB_ROLE_BACKEND_HANDLER);
 | |
|     ROUTER_INSTANCE *router = (ROUTER_INSTANCE *)instance;
 | |
|     int error;
 | |
|     socklen_t len;
 | |
|     char msg[MXS_STRERROR_BUFLEN + 1 + 5] = "";
 | |
|     char *errmsg;
 | |
|     unsigned long mysql_errno;
 | |
| 
 | |
|     mysql_errno = (unsigned long) extract_field(((uint8_t *)GWBUF_DATA(message) + 5), 16);
 | |
|     errmsg = extract_message(message);
 | |
| 
 | |
|     if (action == ERRACT_REPLY_CLIENT)
 | |
|     {
 | |
|         /** Check router state and set errno and message */
 | |
|         if (router->master_state != BLRM_SLAVE_STOPPED)
 | |
|         {
 | |
|             /* Authentication failed: stop replication */
 | |
|             if (router->master_state == BLRM_TIMESTAMP)
 | |
|             {
 | |
|                 spinlock_acquire(&router->lock);
 | |
|                 /* set io error message */
 | |
|                 if (router->m_errmsg)
 | |
|                 {
 | |
|                     free(router->m_errmsg);
 | |
|                 }
 | |
|                 router->m_errmsg = mxs_strdup("#28000 Authentication with master server failed");
 | |
|                 /* set mysql_errno */
 | |
|                 router->m_errno = 1045;
 | |
| 
 | |
|                 /* Stop replication */
 | |
|                 router->master_state = BLRM_SLAVE_STOPPED;
 | |
|                 spinlock_release(&router->lock);
 | |
| 
 | |
|                 /* Force backend DCB close */
 | |
|                 dcb_close(backend_dcb);
 | |
| 
 | |
|                 /* Force Fake Client DCB close */
 | |
|                 if (router->client)
 | |
|                 {
 | |
|                     dcb_close(router->client);
 | |
|                     router->client = NULL;
 | |
|                 }
 | |
| 
 | |
|                 MXS_ERROR("%s: Master connection error %lu '%s' in state '%s', "
 | |
|                           "%s while connecting to master [%s]:%d. Replication is stopped.",
 | |
|                           router->service->name, router->m_errno, router->m_errmsg,
 | |
|                           blrm_states[BLRM_TIMESTAMP], msg,
 | |
|                           router->service->dbref->server->name,
 | |
|                           router->service->dbref->server->port);
 | |
|             }
 | |
|         }
 | |
|         if (errmsg)
 | |
|         {
 | |
|             MXS_FREE(errmsg);
 | |
|         }
 | |
| 
 | |
|         *succp = true;
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     len = sizeof(error);
 | |
|     if (router->master &&
 | |
|         getsockopt(router->master->fd, SOL_SOCKET, SO_ERROR, &error, &len) == 0 &&
 | |
|         error != 0)
 | |
|     {
 | |
|         sprintf(msg, "%s, ", mxs_strerror(error));
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         strcpy(msg, "");
 | |
|     }
 | |
| 
 | |
|     /** Check router state and set errno and message */
 | |
|     if (router->master_state != BLRM_SLAVE_STOPPED)
 | |
|     {
 | |
|         spinlock_acquire(&router->lock);
 | |
|         /* set mysql_errno */
 | |
|         router->m_errno = mysql_errno;
 | |
| 
 | |
|         /* set io error message */
 | |
|         if (router->m_errmsg)
 | |
|         {
 | |
|             MXS_FREE(router->m_errmsg);
 | |
|         }
 | |
|         router->m_errmsg = MXS_STRDUP_A(errmsg);
 | |
|         spinlock_release(&router->lock);
 | |
| 
 | |
|         MXS_ERROR("%s: Master connection error %lu '%s' in state '%s', "
 | |
|                   "%sattempting reconnect to master [%s]:%d",
 | |
|                   router->service->name, mysql_errno, errmsg,
 | |
|                   blrm_states[router->master_state], msg,
 | |
|                   router->service->dbref->server->name,
 | |
|                   router->service->dbref->server->port);
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         /* Stopped state, no reconnection */
 | |
|         MXS_INFO("%s: Master connection has been closed. State is '%s', "
 | |
|                  "%snot retrying a new connection to master [%s]:%d",
 | |
|                  router->service->name,
 | |
|                  blrm_states[router->master_state], msg,
 | |
|                  router->service->dbref->server->name,
 | |
|                  router->service->dbref->server->port);
 | |
|     }
 | |
| 
 | |
|     if (errmsg)
 | |
|     {
 | |
|         MXS_FREE(errmsg);
 | |
|     }
 | |
|     *succp = true;
 | |
| 
 | |
|     /* Force Backend DCB close */
 | |
|     if (backend_dcb == router->master)
 | |
|     {
 | |
|         router->master = NULL;
 | |
|     }
 | |
|     dcb_close(backend_dcb);
 | |
| 
 | |
|     /* Force Fake Client DCB close */
 | |
|     if (router->client)
 | |
|     {
 | |
|         dcb_close(router->client);
 | |
|         router->client = NULL;
 | |
|     }
 | |
| 
 | |
|     MXS_NOTICE("%s: Master %s disconnected after %ld seconds. "
 | |
|                "%lu events read.",
 | |
|                router->service->name, router->service->dbref->server->name,
 | |
|                time(0) - router->connect_time, router->stats.n_binlogs_ses);
 | |
|     blr_master_reconnect(router);
 | |
| }
 | |
| 
 | |
| /** to be inline'd */
 | |
| /**
 | |
|  * @node Acquires lock to router client session if it is not closed.
 | |
|  *
 | |
|  * Parameters:
 | |
|  * @param rses - in, use
 | |
|  *
 | |
|  *
 | |
|  * @return true if router session was not closed. If return value is true
 | |
|  * it means that router is locked, and must be unlocked later. False, if
 | |
|  * router was closed before lock was acquired.
 | |
|  *
 | |
|  *
 | |
|  * @details (write detailed description here)
 | |
|  *
 | |
|  */
 | |
| static bool rses_begin_locked_router_action(ROUTER_SLAVE *rses)
 | |
| {
 | |
|     bool succp = false;
 | |
| 
 | |
|     CHK_CLIENT_RSES(rses);
 | |
| 
 | |
|     spinlock_acquire(&rses->rses_lock);
 | |
|     succp = true;
 | |
| 
 | |
|     return succp;
 | |
| }
 | |
| 
 | |
| /** to be inline'd */
 | |
| /**
 | |
|  * @node Releases router client session lock.
 | |
|  *
 | |
|  * Parameters:
 | |
|  * @param rses - <usage>
 | |
|  *          <description>
 | |
|  *
 | |
|  * @return void
 | |
|  *
 | |
|  *
 | |
|  * @details (write detailed description here)
 | |
|  *
 | |
|  */
 | |
| static void rses_end_locked_router_action(ROUTER_SLAVE *rses)
 | |
| {
 | |
|     CHK_CLIENT_RSES(rses);
 | |
|     spinlock_release(&rses->rses_lock);
 | |
| }
 | |
| 
 | |
| 
 | |
| static uint64_t getCapabilities(MXS_ROUTER* instance)
 | |
| {
 | |
|     return RCAP_TYPE_NONE;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * The stats gathering function called from the housekeeper so that we
 | |
|  * can get timed averages of binlog records shippped
 | |
|  *
 | |
|  * @param inst  The router instance
 | |
|  */
 | |
| static void
 | |
| stats_func(void *inst)
 | |
| {
 | |
|     ROUTER_INSTANCE *router = (ROUTER_INSTANCE *)inst;
 | |
|     ROUTER_SLAVE *slave;
 | |
| 
 | |
|     router->stats.minavgs[router->stats.minno++] = router->stats.n_binlogs - router->stats.lastsample;
 | |
|     router->stats.lastsample = router->stats.n_binlogs;
 | |
|     if (router->stats.minno == BLR_NSTATS_MINUTES)
 | |
|     {
 | |
|         router->stats.minno = 0;
 | |
|     }
 | |
| 
 | |
|     spinlock_acquire(&router->lock);
 | |
|     slave = router->slaves;
 | |
|     while (slave)
 | |
|     {
 | |
|         slave->stats.minavgs[slave->stats.minno++] = slave->stats.n_events - slave->stats.lastsample;
 | |
|         slave->stats.lastsample = slave->stats.n_events;
 | |
|         if (slave->stats.minno == BLR_NSTATS_MINUTES)
 | |
|         {
 | |
|             slave->stats.minno = 0;
 | |
|         }
 | |
|         slave = slave->next;
 | |
|     }
 | |
|     spinlock_release(&router->lock);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Return some basic statistics from the router in response to a COM_STATISTICS
 | |
|  * request.
 | |
|  *
 | |
|  * @param router    The router instance
 | |
|  * @param slave     The "slave" connection that requested the statistics
 | |
|  * @param queue     The statistics request
 | |
|  *
 | |
|  * @return non-zero on sucessful send
 | |
|  */
 | |
| int
 | |
| blr_statistics(ROUTER_INSTANCE *router, ROUTER_SLAVE *slave, GWBUF *queue)
 | |
| {
 | |
|     char result[BLRM_COM_STATISTICS_SIZE + 1] = "";
 | |
|     uint8_t *ptr;
 | |
|     GWBUF *ret;
 | |
|     unsigned long len;
 | |
| 
 | |
|     snprintf(result, BLRM_COM_STATISTICS_SIZE,
 | |
|              "Uptime: %u  Threads: %u  Events: %u  Slaves: %u  Master State: %s",
 | |
|              (unsigned int)(time(0) - router->connect_time),
 | |
|              (unsigned int)config_threadcount(),
 | |
|              (unsigned int)router->stats.n_binlogs_ses,
 | |
|              (unsigned int)router->stats.n_slaves,
 | |
|              blrm_states[router->master_state]);
 | |
|     if ((ret = gwbuf_alloc(4 + strlen(result))) == NULL)
 | |
|     {
 | |
|         return 0;
 | |
|     }
 | |
|     len = strlen(result);
 | |
|     ptr = GWBUF_DATA(ret);
 | |
|     *ptr++ = len & 0xff;
 | |
|     *ptr++ = (len & 0xff00) >> 8;
 | |
|     *ptr++ = (len & 0xff0000) >> 16;
 | |
|     *ptr++ = 1;
 | |
|     memcpy(ptr, result, len);
 | |
| 
 | |
|     return MXS_SESSION_ROUTE_REPLY(slave->dcb->session, ret);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Respond to a COM_PING command
 | |
|  *
 | |
|  * @param router    The router instance
 | |
|  * @param slave     The "slave" connection that requested the ping
 | |
|  * @param queue     The ping request
 | |
|  */
 | |
| int
 | |
| blr_ping(ROUTER_INSTANCE *router, ROUTER_SLAVE *slave, GWBUF *queue)
 | |
| {
 | |
|     uint8_t *ptr;
 | |
|     GWBUF *ret;
 | |
| 
 | |
|     if ((ret = gwbuf_alloc(5)) == NULL)
 | |
|     {
 | |
|         return 0;
 | |
|     }
 | |
|     ptr = GWBUF_DATA(ret);
 | |
|     *ptr++ = 0x01;
 | |
|     *ptr++ = 0;
 | |
|     *ptr++ = 0;
 | |
|     *ptr++ = 1;
 | |
|     *ptr = 0;       // OK
 | |
| 
 | |
|     return MXS_SESSION_ROUTE_REPLY(slave->dcb->session, ret);
 | |
| }
 | |
| 
 | |
| 
 | |
| 
 | |
| /**
 | |
|  * mysql_send_custom_error
 | |
|  *
 | |
|  * Send a MySQL protocol Generic ERR message, to the dcb
 | |
|  *
 | |
|  * @param dcb Owner_Dcb Control Block for the connection to which the error message is sent
 | |
|  * @param packet_number
 | |
|  * @param in_affected_rows
 | |
|  * @param msg       Message to send
 | |
|  * @param statemsg  MySQL State message
 | |
|  * @param errcode   MySQL Error code
 | |
|  * @return 1 Non-zero if data was sent
 | |
|  *
 | |
|  */
 | |
| int
 | |
| blr_send_custom_error(DCB *dcb,
 | |
|                       int packet_number,
 | |
|                       int affected_rows,
 | |
|                       const char *msg,
 | |
|                       char *statemsg,
 | |
|                       unsigned int errcode)
 | |
| {
 | |
|     uint8_t *outbuf = NULL;
 | |
|     uint32_t mysql_payload_size = 0;
 | |
|     uint8_t mysql_packet_header[4];
 | |
|     uint8_t *mysql_payload = NULL;
 | |
|     uint8_t field_count = 0;
 | |
|     uint8_t mysql_err[2];
 | |
|     uint8_t mysql_statemsg[6];
 | |
|     unsigned int mysql_errno = 0;
 | |
|     const char *mysql_error_msg = NULL;
 | |
|     const char *mysql_state = NULL;
 | |
|     GWBUF *errbuf = NULL;
 | |
| 
 | |
|     if (errcode == 0)
 | |
|     {
 | |
|         mysql_errno = 1064;
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         mysql_errno = errcode;
 | |
|     }
 | |
| 
 | |
|     mysql_error_msg = "An errorr occurred ...";
 | |
|     if (statemsg == NULL)
 | |
|     {
 | |
|         mysql_state = "42000";
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         mysql_state = statemsg;
 | |
|     }
 | |
| 
 | |
|     field_count = 0xff;
 | |
|     gw_mysql_set_byte2(mysql_err, mysql_errno);
 | |
|     mysql_statemsg[0] = '#';
 | |
|     memcpy(mysql_statemsg + 1, mysql_state, 5);
 | |
| 
 | |
|     if (msg != NULL)
 | |
|     {
 | |
|         mysql_error_msg = msg;
 | |
|     }
 | |
| 
 | |
|     mysql_payload_size = sizeof(field_count) +
 | |
|                          sizeof(mysql_err) +
 | |
|                          sizeof(mysql_statemsg) +
 | |
|                          strlen(mysql_error_msg);
 | |
| 
 | |
|     /** allocate memory for packet header + payload */
 | |
|     errbuf = gwbuf_alloc(sizeof(mysql_packet_header) + mysql_payload_size);
 | |
|     ss_dassert(errbuf != NULL);
 | |
| 
 | |
|     if (errbuf == NULL)
 | |
|     {
 | |
|         return 0;
 | |
|     }
 | |
|     outbuf = GWBUF_DATA(errbuf);
 | |
| 
 | |
|     /** write packet header and packet number */
 | |
|     gw_mysql_set_byte3(mysql_packet_header, mysql_payload_size);
 | |
|     mysql_packet_header[3] = packet_number;
 | |
| 
 | |
|     /** write header */
 | |
|     memcpy(outbuf, mysql_packet_header, sizeof(mysql_packet_header));
 | |
| 
 | |
|     mysql_payload = outbuf + sizeof(mysql_packet_header);
 | |
| 
 | |
|     /** write field */
 | |
|     memcpy(mysql_payload, &field_count, sizeof(field_count));
 | |
|     mysql_payload = mysql_payload + sizeof(field_count);
 | |
| 
 | |
|     /** write errno */
 | |
|     memcpy(mysql_payload, mysql_err, sizeof(mysql_err));
 | |
|     mysql_payload = mysql_payload + sizeof(mysql_err);
 | |
| 
 | |
|     /** write sqlstate */
 | |
|     memcpy(mysql_payload, mysql_statemsg, sizeof(mysql_statemsg));
 | |
|     mysql_payload = mysql_payload + sizeof(mysql_statemsg);
 | |
| 
 | |
|     /** write error message */
 | |
|     memcpy(mysql_payload, mysql_error_msg, strlen(mysql_error_msg));
 | |
| 
 | |
|     return MXS_SESSION_ROUTE_REPLY(dcb->session, errbuf);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Config item handler for the ini file reader
 | |
|  *
 | |
|  * @param userdata      The config context element
 | |
|  * @param section       The config file section
 | |
|  * @param name          The Parameter name
 | |
|  * @param value         The Parameter value
 | |
|  * @return zero on error
 | |
|  */
 | |
| 
 | |
| static int
 | |
| blr_handler_config(void *userdata, const char *section, const char *name, const char *value)
 | |
| {
 | |
|     ROUTER_INSTANCE *inst = (ROUTER_INSTANCE *) userdata;
 | |
|     SERVICE *service;
 | |
| 
 | |
|     service = inst->service;
 | |
| 
 | |
|     if (strcasecmp(section, "binlog_configuration") == 0)
 | |
|     {
 | |
|         return blr_handle_config_item(name, value, inst);
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         MXS_ERROR("master.ini has an invalid section [%s], it should be [binlog_configuration]. "
 | |
|                   "Service %s",
 | |
|                   section,
 | |
|                   service->name);
 | |
| 
 | |
|         return 0;
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Configuration handler for items in the [binlog_configuration] section
 | |
|  *
 | |
|  * @param name  The item name
 | |
|  * @param value The item value
 | |
|  * @param inst  The current router instance
 | |
|  * @return 0 on error
 | |
|  */
 | |
| static  int
 | |
| blr_handle_config_item(const char *name, const char *value, ROUTER_INSTANCE *inst)
 | |
| {
 | |
|     SERVICE *service;
 | |
|     char *ssl_cert;
 | |
|     char *ssl_key;
 | |
|     char *ssl_ca_cert;
 | |
|     SERVER *backend_server;
 | |
| 
 | |
|     service = inst->service;
 | |
| 
 | |
|     backend_server = service->dbref->server;
 | |
| 
 | |
|     if (strcmp(name, "master_host") == 0)
 | |
|     {
 | |
|         server_update_address(service->dbref->server, (char *)value);
 | |
|     }
 | |
|     else if (strcmp(name, "master_port") == 0)
 | |
|     {
 | |
|         server_update_port(service->dbref->server, (short)atoi(value));
 | |
|     }
 | |
|     else if (strcmp(name, "filestem") == 0)
 | |
|     {
 | |
|         MXS_FREE(inst->fileroot);
 | |
|         inst->fileroot = MXS_STRDUP_A(value);
 | |
|     }
 | |
|     else if (strcmp(name, "master_user") == 0)
 | |
|     {
 | |
|         if (inst->user)
 | |
|         {
 | |
|             MXS_FREE(inst->user);
 | |
|         }
 | |
|         inst->user = MXS_STRDUP_A(value);
 | |
|     }
 | |
|     else if (strcmp(name, "master_password") == 0)
 | |
|     {
 | |
|         if (inst->password)
 | |
|         {
 | |
|             MXS_FREE(inst->password);
 | |
|         }
 | |
|         inst->password = MXS_STRDUP_A(value);
 | |
|     }
 | |
|     /** Checl for SSL options */
 | |
|     else if (strcmp(name, "master_ssl") == 0)
 | |
|     {
 | |
|         inst->ssl_enabled = config_truth_value((char*)value);
 | |
|     }
 | |
|     else if (strcmp(name, "master_ssl_ca") == 0)
 | |
|     {
 | |
|         MXS_FREE(backend_server->server_ssl->ssl_ca_cert);
 | |
|         backend_server->server_ssl->ssl_ca_cert = value ? MXS_STRDUP_A(value) : NULL;
 | |
|         MXS_FREE(inst->ssl_ca);
 | |
|         inst->ssl_ca = value ? MXS_STRDUP_A(value) : NULL;
 | |
|     }
 | |
|     else if (strcmp(name, "master_ssl_cert") == 0)
 | |
|     {
 | |
|         MXS_FREE(backend_server->server_ssl->ssl_cert);
 | |
|         backend_server->server_ssl->ssl_cert = value ? MXS_STRDUP_A(value) : NULL;
 | |
|         MXS_FREE(inst->ssl_cert);
 | |
|         inst->ssl_cert = value ? MXS_STRDUP_A(value) : NULL;
 | |
|     }
 | |
|     else if (strcmp(name, "master_ssl_key") == 0)
 | |
|     {
 | |
|         MXS_FREE(backend_server->server_ssl->ssl_key);
 | |
|         backend_server->server_ssl->ssl_key = value ? MXS_STRDUP_A(value) : NULL;
 | |
|         MXS_FREE(inst->ssl_key);
 | |
|         inst->ssl_key = value ? MXS_STRDUP_A(value) : NULL;
 | |
|     }
 | |
|     else if (strcmp(name, "master_ssl_version") == 0 || strcmp(name, "master_tls_version") == 0)
 | |
|     {
 | |
|         if (value)
 | |
|         {
 | |
|             if (listener_set_ssl_version(backend_server->server_ssl, (char *)value) != 0)
 | |
|             {
 | |
|                 MXS_ERROR("Found unknown optional parameter value for 'ssl_version' for"
 | |
|                           " service '%s': %s, ignoring it.",
 | |
|                           inst->service->name,
 | |
|                           value);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 inst->ssl_version = MXS_STRDUP_A(value);
 | |
|             }
 | |
|         }
 | |
|     }
 | |
|     /* Connect options */
 | |
|     else if (strcmp(name, "master_heartbeat_period") == 0)
 | |
|     {
 | |
|         int new_val = atol((char *)value);
 | |
|         if (new_val < 0)
 | |
|         {
 | |
|             MXS_WARNING("Found invalid 'master_heartbeat_period' value"
 | |
|                         " for service '%s': %s, ignoring it.",
 | |
|                         inst->service->name,
 | |
|                         value);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             if (inst->heartbeat > 0 && new_val == 0)
 | |
|             {
 | |
|                 blr_log_disabled_heartbeat(inst);
 | |
|             }
 | |
|             inst->heartbeat = new_val;
 | |
|         }
 | |
|     }
 | |
|     else if (strcmp(name, "master_connect_retry") == 0)
 | |
|     {
 | |
|         int new_val = atol((char *)value);
 | |
|         if (new_val <= 0)
 | |
|         {
 | |
|             MXS_WARNING("Found invalid 'master_connect_retry' value"
 | |
|                         " for service '%s': %s, ignoring it.",
 | |
|                         inst->service->name,
 | |
|                         value);
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             inst->retry_interval = new_val;
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Extract a numeric field from a packet of the specified number of bits
 | |
|  *
 | |
|  * @param src   The raw packet source
 | |
|  * @param birs  The number of bits to extract (multiple of 8)
 | |
|  */
 | |
| uint32_t
 | |
| extract_field(uint8_t *src, int bits)
 | |
| {
 | |
|     uint32_t rval = 0, shift = 0;
 | |
| 
 | |
|     while (bits > 0)
 | |
|     {
 | |
|         rval |= (*src++) << shift;
 | |
|         shift += 8;
 | |
|         bits -= 8;
 | |
|     }
 | |
|     return rval;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Check whether current binlog is valid.
 | |
|  * In case of errors BLR_SLAVE_STOPPED state is set
 | |
|  * If a partial transaction is found
 | |
|  * inst->binlog_position is set the pos where it started
 | |
|  *
 | |
|  * @param router    The router instance
 | |
|  * @return      1 on success, 0 on failure
 | |
|  */
 | |
| /** 1 is succes, 0 is faulure */
 | |
| static int blr_check_binlog(ROUTER_INSTANCE *router)
 | |
| {
 | |
|     int n;
 | |
| 
 | |
|     /** blr_read_events_all() may set master_state
 | |
|      * to BLR_SLAVE_STOPPED state in case of found errors.
 | |
|      * In such conditions binlog file is NOT truncated and
 | |
|      * router state is set to BLR_SLAVE_STOPPED
 | |
|      * Last commited pos is set for both router->binlog_position
 | |
|      * and router->current_pos.
 | |
|      *
 | |
|      * If an open transaction is detected at pos XYZ
 | |
|      * inst->binlog_position will be set to XYZ while
 | |
|      * router->current_pos is the last event found.
 | |
|      */
 | |
| 
 | |
|     n = blr_read_events_all_events(router, NULL, 0);
 | |
| 
 | |
|     MXS_DEBUG("blr_read_events_all_events() ret = %i\n", n);
 | |
| 
 | |
|     if (n != 0)
 | |
|     {
 | |
|         char msg_err[BINLOG_ERROR_MSG_LEN + 1] = "";
 | |
|         router->master_state = BLRM_SLAVE_STOPPED;
 | |
| 
 | |
|         snprintf(msg_err, BINLOG_ERROR_MSG_LEN, "Error found in binlog %s. Safe pos is %lu",
 | |
|                  router->binlog_name,
 | |
|                  router->binlog_position);
 | |
|         /* set mysql_errno */
 | |
|         if (!router->m_errno)
 | |
|         {
 | |
|             router->m_errno = 2032;
 | |
|         }
 | |
| 
 | |
|         /* set io error message */
 | |
|         router->m_errmsg = MXS_STRDUP_A(msg_err);
 | |
| 
 | |
|         /* set last_safe_pos */
 | |
|         router->last_safe_pos = router->binlog_position;
 | |
| 
 | |
|         MXS_ERROR("Error found in binlog file %s. Safe starting pos is %lu",
 | |
|                   router->binlog_name,
 | |
|                   router->binlog_position);
 | |
| 
 | |
|         return 0;
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         return 1;
 | |
|     }
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|  * Return last event description
 | |
|  *
 | |
|  * @param router    The router instance
 | |
|  * @return      The event description or NULL
 | |
|  */
 | |
| char *
 | |
| blr_last_event_description(ROUTER_INSTANCE *router)
 | |
| {
 | |
|     char *event_desc = NULL;
 | |
| 
 | |
|     if (!router->mariadb10_compat)
 | |
|     {
 | |
|         if (router->lastEventReceived <= MAX_EVENT_TYPE)
 | |
|         {
 | |
|             event_desc = event_names[router->lastEventReceived];
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         if (router->lastEventReceived <= MAX_EVENT_TYPE)
 | |
|         {
 | |
|             event_desc = event_names[router->lastEventReceived];
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             /* Check MariaDB 10 new events */
 | |
|             if (router->lastEventReceived >= MARIADB_NEW_EVENTS_BEGIN &&
 | |
|                 router->lastEventReceived <= MAX_EVENT_TYPE_MARIADB10)
 | |
|             {
 | |
|                 event_desc = event_names_mariadb10[(router->lastEventReceived - MARIADB_NEW_EVENTS_BEGIN)];
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return event_desc;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Return the event description
 | |
|  *
 | |
|  * @param router    The router instance
 | |
|  * @param event     The current event
 | |
|  * @return      The event description or NULL
 | |
|  */
 | |
| char *
 | |
| blr_get_event_description(ROUTER_INSTANCE *router, uint8_t event)
 | |
| {
 | |
|     char *event_desc = NULL;
 | |
| 
 | |
|     if (!router->mariadb10_compat)
 | |
|     {
 | |
|         if (event <= MAX_EVENT_TYPE)
 | |
|         {
 | |
|             event_desc = event_names[event];
 | |
|         }
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         if (event <= MAX_EVENT_TYPE)
 | |
|         {
 | |
|             event_desc = event_names[event];
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             /* Check MariaDB 10 new events */
 | |
|             if (event >= MARIADB_NEW_EVENTS_BEGIN &&
 | |
|                 event <= MAX_EVENT_TYPE_MARIADB10)
 | |
|             {
 | |
|                 event_desc = event_names_mariadb10[(event - MARIADB_NEW_EVENTS_BEGIN)];
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return event_desc;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Free SSL struct in server struct
 | |
|  *
 | |
|  * @param inst   The router instance
 | |
|  */
 | |
| void
 | |
| blr_free_ssl_data(ROUTER_INSTANCE *inst)
 | |
| {
 | |
|     SSL_LISTENER *server_ssl;
 | |
| 
 | |
|     if (inst->service->dbref->server->server_ssl)
 | |
|     {
 | |
|         server_ssl = inst->service->dbref->server->server_ssl;
 | |
| 
 | |
|         /* Free SSL struct */
 | |
|         /* Note: SSL struct in server should be freed by server_free() */
 | |
|         MXS_FREE(server_ssl->ssl_key);
 | |
|         MXS_FREE(server_ssl->ssl_ca_cert);
 | |
|         MXS_FREE(server_ssl->ssl_cert);
 | |
|         MXS_FREE(inst->service->dbref->server->server_ssl);
 | |
|         inst->service->dbref->server->server_ssl = NULL;
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * destroy binlog server instance
 | |
|  *
 | |
|  * @param service   The service this router instance belongs to
 | |
|  */
 | |
| static void
 | |
| destroyInstance(MXS_ROUTER *instance)
 | |
| {
 | |
|     ROUTER_INSTANCE *inst = (ROUTER_INSTANCE *) instance;
 | |
| 
 | |
|     MXS_DEBUG("Destroying instance of router %s for service %s",
 | |
|               inst->service->routerModule, inst->service->name);
 | |
| 
 | |
|     /* Check whether master connection is active */
 | |
|     if (inst->master)
 | |
|     {
 | |
|         if (inst->master->fd != -1 && inst->master->state == DCB_STATE_POLLING)
 | |
|         {
 | |
|             blr_master_close(inst);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     spinlock_acquire(&inst->lock);
 | |
| 
 | |
|     if (inst->master_state != BLRM_UNCONFIGURED)
 | |
|     {
 | |
|         inst->master_state = BLRM_SLAVE_STOPPED;
 | |
|     }
 | |
| 
 | |
|     spinlock_release(&inst->lock);
 | |
| 
 | |
|     if (inst->client)
 | |
|     {
 | |
|         if (inst->client->state == DCB_STATE_POLLING)
 | |
|         {
 | |
|             dcb_close(inst->client);
 | |
|             inst->client = NULL;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     MXS_INFO("%s is being stopped by MaxScale shudown. Disconnecting from master [%s]:%d, "
 | |
|              "read up to log %s, pos %lu, transaction safe pos %lu",
 | |
|              inst->service->name,
 | |
|              inst->service->dbref->server->name,
 | |
|              inst->service->dbref->server->port,
 | |
|              inst->binlog_name, inst->current_pos, inst->binlog_position);
 | |
| 
 | |
|     if (inst->trx_safe &&
 | |
|         inst->pending_transaction.state > BLRM_NO_TRANSACTION)
 | |
|     {
 | |
|         MXS_WARNING("%s stopped by shutdown: detected mid-transaction in binlog file %s, "
 | |
|                     "pos %lu, incomplete transaction starts at pos %lu",
 | |
|                     inst->service->name, inst->binlog_name, inst->current_pos, inst->binlog_position);
 | |
|     }
 | |
| 
 | |
|     /* Close GTID maps database */
 | |
|     sqlite3_close_v2(inst->gtid_maps);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Return the the value from hexadecimal digit
 | |
|  *
 | |
|  * @param c    Then hex char
 | |
|  * @return     The numeric value
 | |
|  */
 | |
| unsigned int from_hex(char c)
 | |
| {
 | |
|     return c <= '9' ? c - '0' : tolower(c) - 'a' + 10;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Parse a buffer of HEX data
 | |
|  *
 | |
|  * An encryption Key and its len are stored
 | |
|  * in router->encryption struct
 | |
|  *
 | |
|  * @param buffer    A buffer of bytes, in hex format
 | |
|  * @param nline     The line number in the key file
 | |
|  * @param router    The router instance
 | |
|  * @return          true on success and false on error
 | |
|  */
 | |
| bool blr_extract_key(const char *buffer, int nline, ROUTER_INSTANCE *router)
 | |
| {
 | |
|     char *p = (char *)buffer;
 | |
|     int length = 0;
 | |
|     uint8_t *key = (uint8_t *)router->encryption.key_value;
 | |
| 
 | |
|     while (isspace(*p) && *p != '\n')
 | |
|     {
 | |
|         p++;
 | |
|     }
 | |
| 
 | |
|     /* Skip comments */
 | |
|     if (*p == '#')
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     unsigned int id = strtoll(p, &p, 10);
 | |
| 
 | |
|     /* key range is 1 .. 255 */
 | |
|     if (id < 1 || id > 255)
 | |
|     {
 | |
|         MXS_WARNING("Invalid Key Id (values 1..255) found in file %s. Line %d, index 0.",
 | |
|                     router->encryption.key_management_filename,
 | |
|                     nline);
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     /* Continue only if read id is BINLOG_SYSTEM_DATA_CRYPTO_SCHEME (value is 1) */
 | |
|     if (id != BINLOG_SYSTEM_DATA_CRYPTO_SCHEME)
 | |
|     {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     /* Look for ';' separator */
 | |
|     if (*p != ';')
 | |
|     {
 | |
|         MXS_ERROR("Syntax error in Encryption Key file at line %d, index %lu. File %s",
 | |
|                   nline,
 | |
|                   p - buffer,
 | |
|                   router->encryption.key_management_filename);
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     p++;
 | |
| 
 | |
|     /* Now read the hex data */
 | |
| 
 | |
|     while (isxdigit(p[0]) && isxdigit(p[1]) && length <= BINLOG_AES_MAX_KEY_LEN)
 | |
|     {
 | |
|         key[length++] =  from_hex(p[0]) * 16 + from_hex(p[1]);
 | |
|         p += 2;
 | |
|     }
 | |
| 
 | |
|     if (isxdigit(*p) ||
 | |
|         (length != 16 && length != 24 && length != 32))
 | |
|     {
 | |
|         MXS_ERROR("Found invalid Encryption Key at line %d, index %lu. File %s",
 | |
|                   nline,
 | |
|                   p - buffer,
 | |
|                   router->encryption.key_management_filename);
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     router->encryption.key_len = length;
 | |
| 
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Read the encryption key form a file
 | |
|  *
 | |
|  * The key must be written in HEX format
 | |
|  *
 | |
|  * @param router    The router instance
 | |
|  * @return          false on error and true on success
 | |
|  */
 | |
| bool blr_get_encryption_key(ROUTER_INSTANCE *router)
 | |
| {
 | |
|     if (router->encryption.key_management_filename == NULL)
 | |
|     {
 | |
|         MXS_ERROR("Service %s, encryption key is not set. "
 | |
|                   "Please specify key filename with 'encryption_key_file'",
 | |
|                   router->service->name);
 | |
|         return false;
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         int ret;
 | |
|         memset(router->encryption.key_value, '\0', sizeof(router->encryption.key_value));
 | |
| 
 | |
|         /* Parse key file */
 | |
|         if (blr_parse_key_file(router) == 0)
 | |
|         {
 | |
|             /* Success */
 | |
|             router->encryption.key_id = BINLOG_SYSTEM_DATA_CRYPTO_SCHEME;
 | |
|             return true;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Read encryotion key(s) from a file
 | |
|  *
 | |
|  * The file could be the MariaDB 10.1 file_key_management_filename
 | |
|  * where the keys are not encrypted or it could be a file
 | |
|  * with a single line containing the key id 1
 | |
|  *
 | |
|  * @param router    The router instance
 | |
|  * @return          0 on success (key id 1 found), -1 on errors
 | |
|  *                  or the number or read lines if key id was not found
 | |
|  */
 | |
| int blr_parse_key_file(ROUTER_INSTANCE *router)
 | |
| {
 | |
|     char *line = NULL;
 | |
|     size_t linesize = 0;
 | |
|     ssize_t linelen;
 | |
|     bool found_keyid = false;
 | |
|     int n_lines = 0;
 | |
|     FILE *file = fopen(router->encryption.key_management_filename, "r");
 | |
| 
 | |
|     if (!file)
 | |
|     {
 | |
|         MXS_ERROR("Failed to open KEY file '%s': %s",
 | |
|                   router->encryption.key_management_filename,
 | |
|                   mxs_strerror(errno));
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     /* Read all lines from the key_file */
 | |
|     while ((linelen = getline(&line, &linesize, file)) != -1)
 | |
|     {
 | |
|         n_lines++;
 | |
| 
 | |
|         /* Parse buffer for key id = 1*/
 | |
|         if (blr_extract_key(line, n_lines, router))
 | |
|         {
 | |
|             router->encryption.key_id = BINLOG_SYSTEM_DATA_CRYPTO_SCHEME;
 | |
|             found_keyid = true;
 | |
|             break;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     MXS_FREE(line);
 | |
| 
 | |
|     fclose(file);
 | |
| 
 | |
|     /* Check result */
 | |
|     if (n_lines == 0)
 | |
|     {
 | |
|         MXS_ERROR("KEY file '%s' has no lines.",
 | |
|                   router->encryption.key_management_filename);
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     if (!found_keyid)
 | |
|     {
 | |
|         MXS_ERROR("No Key with Id = 1 has been found in file %s. Read %d lines.",
 | |
|                   router->encryption.key_management_filename,
 | |
|                   n_lines);
 | |
|         return n_lines;
 | |
|     }
 | |
|     else
 | |
|     {
 | |
|         return 0;
 | |
|     }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Create / Open R/W GTID maps database
 | |
|  *
 | |
|  */
 | |
| static bool blr_open_gtid_maps_storage(ROUTER_INSTANCE *inst)
 | |
| {
 | |
|     char dbpath[PATH_MAX + 1];
 | |
|     snprintf(dbpath, sizeof(dbpath), "/%s/%s",
 | |
|              inst->binlogdir, GTID_MAPS_DB);
 | |
| 
 | |
|     /* Open/Create the GTID maps database */
 | |
|     if (sqlite3_open_v2(dbpath,
 | |
|                         &inst->gtid_maps,
 | |
|                         SQLITE_OPEN_READWRITE | SQLITE_OPEN_CREATE,
 | |
|                         NULL) != SQLITE_OK)
 | |
|     {
 | |
|         MXS_ERROR("Failed to open GTID maps SQLite database '%s': %s", dbpath,
 | |
|                   sqlite3_errmsg(inst->gtid_maps));
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     char* errmsg;
 | |
|     /* Create the gtid_maps table */
 | |
|     int rc = sqlite3_exec(inst->gtid_maps,
 | |
|                           "BEGIN;"
 | |
|                           "CREATE TABLE IF NOT EXISTS gtid_maps("
 | |
|                           "id INTEGER PRIMARY KEY AUTOINCREMENT, "
 | |
|                           "rep_domain INT, "
 | |
|                           "server_id INT, "
 | |
|                           "sequence BIGINT, "
 | |
|                           "binlog_file VARCHAR(255), "
 | |
|                           "start_pos BIGINT, "
 | |
|                           "end_pos BIGINT);"
 | |
|                           "CREATE UNIQUE INDEX IF NOT EXISTS gtid_index "
 | |
|                           "ON gtid_maps(rep_domain, server_id, sequence, binlog_file);"
 | |
|                           "COMMIT;",
 | |
|                           NULL, NULL, &errmsg);
 | |
|     if (rc != SQLITE_OK)
 | |
|     {
 | |
|         MXS_ERROR("Service %s, failed to create GTID index table 'gtid_maps': %s",
 | |
|                   inst->service->name,
 | |
|                   sqlite3_errmsg(inst->gtid_maps));
 | |
|         sqlite3_free(errmsg);
 | |
|         /* Close GTID maps database */
 | |
|         sqlite3_close_v2(inst->gtid_maps);
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     MXS_NOTICE("%s: Service has MariaDB GTID otion set to ON",
 | |
|                inst->service->name);
 | |
| 
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| void blr_log_disabled_heartbeat(const ROUTER_INSTANCE *inst)
 | |
| {
 | |
|     MXS_WARNING("%s: %s",
 | |
|                 inst->service->name,
 | |
|                 "MASTER_HEARTBEAT_PERIOD has been set to 0 (disabled): "
 | |
|                 "a master network inactivity will not be handled.");
 | |
| }
 |