mirror of
https://github.com/samba-team/samba.git
synced 2024-12-22 13:34:15 +03:00
672e06f438
If we break, we avoid cut & paste code inside the loop. Need to initialize ret to 0 for the "no scripts" case. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au> (This used to be ctdb commit ec36ced9446da7e3bf866466d265ee8e18f606c1)
1168 lines
31 KiB
C
1168 lines
31 KiB
C
/*
|
|
event script handling
|
|
|
|
Copyright (C) Andrew Tridgell 2007
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include <time.h>
|
|
#include "system/filesys.h"
|
|
#include "system/wait.h"
|
|
#include "system/dir.h"
|
|
#include "system/locale.h"
|
|
#include "../include/ctdb_private.h"
|
|
#include "lib/events/events.h"
|
|
#include "../common/rb_tree.h"
|
|
|
|
static struct {
|
|
struct timeval start;
|
|
const char *script_running;
|
|
} child_state;
|
|
|
|
static const char *call_names[] = {
|
|
"startup",
|
|
"startrecovery",
|
|
"recovered",
|
|
"takeip",
|
|
"releaseip",
|
|
"stopped",
|
|
"monitor",
|
|
"status",
|
|
"shutdown",
|
|
"reload"
|
|
};
|
|
|
|
static void ctdb_event_script_timeout(struct event_context *ev, struct timed_event *te, struct timeval t, void *p);
|
|
|
|
/*
|
|
ctdbd sends us a SIGTERM when we should time out the current script
|
|
*/
|
|
static void sigterm(int sig)
|
|
{
|
|
char tbuf[100], buf[200];
|
|
time_t t;
|
|
|
|
DEBUG(DEBUG_ERR,("Timed out running script '%s' after %.1f seconds pid :%d\n",
|
|
child_state.script_running, timeval_elapsed(&child_state.start), getpid()));
|
|
|
|
t = time(NULL);
|
|
|
|
strftime(tbuf, sizeof(tbuf)-1, "%Y%m%d%H%M%S", localtime(&t));
|
|
sprintf(buf, "pstree -p >/tmp/ctdb.event.%s.%d", tbuf, getpid());
|
|
system(buf);
|
|
|
|
DEBUG(DEBUG_ERR,("Logged timedout eventscript : %s\n", buf));
|
|
|
|
/* all the child processes will be running in the same process group */
|
|
kill(-getpgrp(), SIGKILL);
|
|
_exit(1);
|
|
}
|
|
|
|
struct ctdb_event_script_state {
|
|
struct ctdb_context *ctdb;
|
|
pid_t child;
|
|
/* Warning: this can free us! */
|
|
void (*callback)(struct ctdb_context *, int, void *);
|
|
int cb_status;
|
|
int fd[2];
|
|
void *private_data;
|
|
enum ctdb_eventscript_call call;
|
|
const char *options;
|
|
struct timeval timeout;
|
|
};
|
|
|
|
|
|
struct ctdb_monitor_script_status {
|
|
struct ctdb_monitor_script_status *next;
|
|
const char *name;
|
|
struct timeval start;
|
|
struct timeval finished;
|
|
int32_t status;
|
|
char *output;
|
|
};
|
|
|
|
struct ctdb_monitor_script_status_ctx {
|
|
struct ctdb_monitor_script_status *scripts;
|
|
};
|
|
|
|
/* called from ctdb_logging when we have received output on STDERR from
|
|
* one of the eventscripts
|
|
*/
|
|
int ctdb_log_event_script_output(struct ctdb_context *ctdb, char *str, uint16_t len)
|
|
{
|
|
struct ctdb_monitor_script_status *script;
|
|
|
|
if (ctdb->current_monitor_status_ctx == NULL) {
|
|
return -1;
|
|
}
|
|
|
|
script = ctdb->current_monitor_status_ctx->scripts;
|
|
if (script == NULL) {
|
|
return -1;
|
|
}
|
|
|
|
if (script->output == NULL) {
|
|
script->output = talloc_asprintf(script, "%*.*s", len, len, str);
|
|
} else {
|
|
script->output = talloc_asprintf_append(script->output, "%*.*s", len, len, str);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* called from the event script child process when we are starting a new
|
|
* monitor event
|
|
*/
|
|
int32_t ctdb_control_event_script_init(struct ctdb_context *ctdb)
|
|
{
|
|
DEBUG(DEBUG_INFO, ("event script init called\n"));
|
|
|
|
if (ctdb->current_monitor_status_ctx == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " current_monitor_status_ctx is NULL when initing script\n"));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* called from the event script child process when we are star running
|
|
* an eventscript
|
|
*/
|
|
int32_t ctdb_control_event_script_start(struct ctdb_context *ctdb, TDB_DATA indata)
|
|
{
|
|
const char *name = (const char *)indata.dptr;
|
|
struct ctdb_monitor_script_status *script;
|
|
|
|
DEBUG(DEBUG_INFO, ("event script start called : %s\n", name));
|
|
|
|
if (ctdb->current_monitor_status_ctx == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " current_monitor_status_ctx is NULL when starting script\n"));
|
|
return -1;
|
|
}
|
|
|
|
script = talloc_zero(ctdb->current_monitor_status_ctx, struct ctdb_monitor_script_status);
|
|
if (script == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to talloc ctdb_monitor_script_status for script %s\n", name));
|
|
return -1;
|
|
}
|
|
|
|
script->next = ctdb->current_monitor_status_ctx->scripts;
|
|
script->name = talloc_strdup(script, name);
|
|
CTDB_NO_MEMORY(ctdb, script->name);
|
|
script->start = timeval_current();
|
|
ctdb->current_monitor_status_ctx->scripts = script;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* called from the event script child process when we have finished running
|
|
* an eventscript
|
|
*/
|
|
int32_t ctdb_control_event_script_stop(struct ctdb_context *ctdb, TDB_DATA indata)
|
|
{
|
|
int32_t res = *((int32_t *)indata.dptr);
|
|
struct ctdb_monitor_script_status *script;
|
|
|
|
if (ctdb->current_monitor_status_ctx == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " current_monitor_status_ctx is NULL when script finished\n"));
|
|
return -1;
|
|
}
|
|
|
|
script = ctdb->current_monitor_status_ctx->scripts;
|
|
if (script == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " script is NULL when the script had finished\n"));
|
|
return -1;
|
|
}
|
|
|
|
script->finished = timeval_current();
|
|
script->status = res;
|
|
|
|
DEBUG(DEBUG_INFO, ("event script stop called for script:%s duration:%.1f status:%d\n", script->name, timeval_elapsed(&script->start), (int)res));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static struct ctdb_monitoring_wire *marshall_monitoring_scripts(TALLOC_CTX *mem_ctx, struct ctdb_monitoring_wire *monitoring_scripts, struct ctdb_monitor_script_status *script)
|
|
{
|
|
struct ctdb_monitoring_script_wire script_wire;
|
|
size_t size;
|
|
|
|
if (script == NULL) {
|
|
return monitoring_scripts;
|
|
}
|
|
monitoring_scripts = marshall_monitoring_scripts(mem_ctx, monitoring_scripts, script->next);
|
|
if (monitoring_scripts == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
bzero(&script_wire, sizeof(struct ctdb_monitoring_script_wire));
|
|
strncpy(script_wire.name, script->name, MAX_SCRIPT_NAME);
|
|
script_wire.start = script->start;
|
|
script_wire.finished = script->finished;
|
|
script_wire.status = script->status;
|
|
if (script->output != NULL) {
|
|
strncpy(script_wire.output, script->output, MAX_SCRIPT_OUTPUT);
|
|
}
|
|
|
|
size = talloc_get_size(monitoring_scripts);
|
|
monitoring_scripts = talloc_realloc_size(mem_ctx, monitoring_scripts, size + sizeof(struct ctdb_monitoring_script_wire));
|
|
if (monitoring_scripts == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to talloc_resize monitoring_scripts blob\n"));
|
|
return NULL;
|
|
}
|
|
|
|
memcpy(&monitoring_scripts->scripts[monitoring_scripts->num_scripts], &script_wire, sizeof(script_wire));
|
|
monitoring_scripts->num_scripts++;
|
|
|
|
return monitoring_scripts;
|
|
}
|
|
|
|
/* called from the event script child process when we have completed a
|
|
* monitor event
|
|
*/
|
|
int32_t ctdb_control_event_script_finished(struct ctdb_context *ctdb)
|
|
{
|
|
DEBUG(DEBUG_INFO, ("event script finished called\n"));
|
|
|
|
if (ctdb->current_monitor_status_ctx == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " script_status is NULL when monitoring event finished\n"));
|
|
return -1;
|
|
}
|
|
|
|
talloc_free(ctdb->last_status);
|
|
ctdb->last_status = talloc_size(ctdb, offsetof(struct ctdb_monitoring_wire, scripts));
|
|
if (ctdb->last_status == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " failed to talloc last_status\n"));
|
|
return -1;
|
|
}
|
|
|
|
ctdb->last_status->num_scripts = 0;
|
|
ctdb->last_status = marshall_monitoring_scripts(ctdb, ctdb->last_status, ctdb->current_monitor_status_ctx->scripts);
|
|
talloc_free(ctdb->current_monitor_status_ctx);
|
|
ctdb->current_monitor_status_ctx = NULL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int32_t ctdb_control_get_event_script_status(struct ctdb_context *ctdb, TDB_DATA *outdata)
|
|
{
|
|
struct ctdb_monitoring_wire *monitoring_scripts = ctdb->last_status;
|
|
|
|
if (monitoring_scripts == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " last_monitor_status_ctx is NULL when reading status\n"));
|
|
return -1;
|
|
}
|
|
|
|
outdata->dsize = talloc_get_size(monitoring_scripts);
|
|
outdata->dptr = (uint8_t *)monitoring_scripts;
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct ctdb_script_tree_item {
|
|
const char *name;
|
|
int error;
|
|
};
|
|
|
|
struct ctdb_script_list {
|
|
struct ctdb_script_list *next;
|
|
const char *name;
|
|
int error;
|
|
};
|
|
|
|
/* Return true if OK, otherwise set errno. */
|
|
static bool check_executable(const char *dir, const char *name)
|
|
{
|
|
char *full;
|
|
struct stat st;
|
|
|
|
full = talloc_asprintf(NULL, "%s/%s", dir, name);
|
|
if (!full)
|
|
return false;
|
|
|
|
if (stat(full, &st) != 0) {
|
|
DEBUG(DEBUG_ERR,("Could not stat event script %s: %s\n",
|
|
full, strerror(errno)));
|
|
talloc_free(full);
|
|
return false;
|
|
}
|
|
|
|
if (!(st.st_mode & S_IXUSR)) {
|
|
DEBUG(DEBUG_INFO,("Event script %s is not executable. Ignoring this event script\n", full));
|
|
errno = ENOEXEC;
|
|
talloc_free(full);
|
|
return false;
|
|
}
|
|
|
|
talloc_free(full);
|
|
return true;
|
|
}
|
|
|
|
static struct ctdb_script_list *ctdb_get_script_list(struct ctdb_context *ctdb, TALLOC_CTX *mem_ctx)
|
|
{
|
|
DIR *dir;
|
|
struct dirent *de;
|
|
struct stat st;
|
|
trbt_tree_t *tree;
|
|
struct ctdb_script_list *head, *tail, *new_item;
|
|
TALLOC_CTX *tmp_ctx = talloc_new(ctdb);
|
|
struct ctdb_script_tree_item *tree_item;
|
|
int count;
|
|
|
|
/*
|
|
the service specific event scripts
|
|
*/
|
|
if (stat(ctdb->event_script_dir, &st) != 0 &&
|
|
errno == ENOENT) {
|
|
DEBUG(DEBUG_CRIT,("No event script directory found at '%s'\n", ctdb->event_script_dir));
|
|
talloc_free(tmp_ctx);
|
|
return NULL;
|
|
}
|
|
|
|
/* create a tree to store all the script names in */
|
|
tree = trbt_create(tmp_ctx, 0);
|
|
|
|
/* scan all directory entries and insert all valid scripts into the
|
|
tree
|
|
*/
|
|
dir = opendir(ctdb->event_script_dir);
|
|
if (dir == NULL) {
|
|
DEBUG(DEBUG_CRIT,("Failed to open event script directory '%s'\n", ctdb->event_script_dir));
|
|
talloc_free(tmp_ctx);
|
|
return NULL;
|
|
}
|
|
|
|
count = 0;
|
|
while ((de=readdir(dir)) != NULL) {
|
|
int namlen;
|
|
unsigned num;
|
|
|
|
namlen = strlen(de->d_name);
|
|
|
|
if (namlen < 3) {
|
|
continue;
|
|
}
|
|
|
|
if (de->d_name[namlen-1] == '~') {
|
|
/* skip files emacs left behind */
|
|
continue;
|
|
}
|
|
|
|
if (de->d_name[2] != '.') {
|
|
continue;
|
|
}
|
|
|
|
if (sscanf(de->d_name, "%02u.", &num) != 1) {
|
|
continue;
|
|
}
|
|
|
|
tree_item = talloc(tree, struct ctdb_script_tree_item);
|
|
if (tree_item == NULL) {
|
|
DEBUG(DEBUG_ERR, (__location__ " Failed to allocate new tree item\n"));
|
|
talloc_free(tmp_ctx);
|
|
return NULL;
|
|
}
|
|
|
|
tree_item->error = 0;
|
|
if (!check_executable(ctdb->event_script_dir, de->d_name)) {
|
|
tree_item->error = errno;
|
|
}
|
|
|
|
tree_item->name = talloc_strdup(tree_item, de->d_name);
|
|
if (tree_item->name == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to allocate script name.\n"));
|
|
talloc_free(tmp_ctx);
|
|
return NULL;
|
|
}
|
|
|
|
/* store the event script in the tree */
|
|
trbt_insert32(tree, (num<<16)|count++, tree_item);
|
|
}
|
|
closedir(dir);
|
|
|
|
|
|
head = NULL;
|
|
tail = NULL;
|
|
|
|
/* fetch the scripts from the tree one by one and add them to the linked
|
|
list
|
|
*/
|
|
while ((tree_item=trbt_findfirstarray32(tree, 1)) != NULL) {
|
|
|
|
new_item = talloc(tmp_ctx, struct ctdb_script_list);
|
|
if (new_item == NULL) {
|
|
DEBUG(DEBUG_ERR, (__location__ " Failed to allocate new list item\n"));
|
|
talloc_free(tmp_ctx);
|
|
return NULL;
|
|
}
|
|
|
|
new_item->next = NULL;
|
|
new_item->name = talloc_steal(new_item, tree_item->name);
|
|
new_item->error = tree_item->error;
|
|
|
|
if (head == NULL) {
|
|
head = new_item;
|
|
tail = new_item;
|
|
} else {
|
|
tail->next = new_item;
|
|
tail = new_item;
|
|
}
|
|
|
|
talloc_steal(mem_ctx, new_item);
|
|
|
|
/* remove this script from the tree */
|
|
talloc_free(tree_item);
|
|
}
|
|
|
|
talloc_free(tmp_ctx);
|
|
return head;
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
Actually run the event script
|
|
this function is called and run in the context of a forked child
|
|
which allows it to do blocking calls such as system()
|
|
*/
|
|
static int ctdb_run_event_script(struct ctdb_context *ctdb,
|
|
bool from_user,
|
|
enum ctdb_eventscript_call call,
|
|
const char *options)
|
|
{
|
|
char *cmdstr;
|
|
int ret = 0;
|
|
TALLOC_CTX *tmp_ctx = talloc_new(ctdb);
|
|
struct ctdb_script_list *scripts, *current;
|
|
|
|
if (!from_user && call == CTDB_EVENT_MONITOR) {
|
|
/* This is running in the forked child process. At this stage
|
|
* we want to switch from being a ctdb daemon into being a
|
|
* client and connect to the real local daemon.
|
|
*/
|
|
if (switch_from_server_to_client(ctdb) != 0) {
|
|
DEBUG(DEBUG_CRIT, (__location__ "ERROR: failed to switch eventscript child into client mode. shutting down.\n"));
|
|
_exit(1);
|
|
}
|
|
|
|
if (ctdb_ctrl_event_script_init(ctdb) != 0) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to init event script monitoring\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (ctdb->recovery_mode != CTDB_RECOVERY_NORMAL) {
|
|
/* we guarantee that only some specifically allowed event scripts are run
|
|
while in recovery */
|
|
const enum ctdb_eventscript_call allowed_calls[] = {
|
|
CTDB_EVENT_START_RECOVERY, CTDB_EVENT_SHUTDOWN, CTDB_EVENT_RELEASE_IP, CTDB_EVENT_STOPPED };
|
|
int i;
|
|
for (i=0;i<ARRAY_SIZE(allowed_calls);i++) {
|
|
if (call == allowed_calls[i]) break;
|
|
}
|
|
if (i == ARRAY_SIZE(allowed_calls)) {
|
|
DEBUG(DEBUG_ERR,("Refusing to run event scripts call '%s' while in recovery\n",
|
|
call_names[call]));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (setpgid(0,0) != 0) {
|
|
DEBUG(DEBUG_ERR,("Failed to create process group for event scripts - %s\n",
|
|
strerror(errno)));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
signal(SIGTERM, sigterm);
|
|
|
|
child_state.start = timeval_current();
|
|
child_state.script_running = "startup";
|
|
|
|
scripts = ctdb_get_script_list(ctdb, tmp_ctx);
|
|
|
|
/* fetch the scripts from the tree one by one and execute
|
|
them
|
|
*/
|
|
for (current=scripts; current; current=current->next) {
|
|
const char *str = from_user ? "CTDB_CALLED_BY_USER=1 " : "";
|
|
|
|
/* Allow a setting where we run the actual monitor event
|
|
from an external source and replace it with
|
|
a "status" event that just picks up the actual
|
|
status of the event asynchronously.
|
|
*/
|
|
if ((ctdb->tunable.use_status_events_for_monitoring != 0)
|
|
&& (call == CTDB_EVENT_MONITOR)
|
|
&& !from_user) {
|
|
cmdstr = talloc_asprintf(tmp_ctx, "%s%s/%s %s",
|
|
str,
|
|
ctdb->event_script_dir,
|
|
current->name, "status");
|
|
} else {
|
|
cmdstr = talloc_asprintf(tmp_ctx, "%s%s/%s %s %s",
|
|
str,
|
|
ctdb->event_script_dir,
|
|
current->name, call_names[call], options);
|
|
}
|
|
CTDB_NO_MEMORY(ctdb, cmdstr);
|
|
|
|
DEBUG(DEBUG_INFO,("Executing event script %s\n",cmdstr));
|
|
|
|
child_state.start = timeval_current();
|
|
child_state.script_running = cmdstr;
|
|
|
|
if (!from_user && call == CTDB_EVENT_MONITOR) {
|
|
if (ctdb_ctrl_event_script_start(ctdb, current->name) != 0) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to start event script monitoring\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
if (current->error) {
|
|
if (ctdb_ctrl_event_script_stop(ctdb, -current->error) != 0) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to report disabled eventscript\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (current->error) {
|
|
continue;
|
|
}
|
|
|
|
ret = system(cmdstr);
|
|
/* if the system() call was successful, translate ret into the
|
|
return code from the command
|
|
*/
|
|
if (ret != -1) {
|
|
ret = WEXITSTATUS(ret);
|
|
} else {
|
|
ret = -errno;
|
|
}
|
|
|
|
/* 127 could mean it does not exist, 126 non-executable. */
|
|
if (ret == 127 || ret == 126) {
|
|
/* Re-check it... */
|
|
if (!check_executable(ctdb->event_script_dir,
|
|
current->name)) {
|
|
DEBUG(DEBUG_ERR,("Script %s returned status %u. Someone just deleted it?\n",
|
|
cmdstr, ret));
|
|
ret = -errno;
|
|
}
|
|
}
|
|
|
|
if (!from_user && call == CTDB_EVENT_MONITOR) {
|
|
if (ctdb_ctrl_event_script_stop(ctdb, ret) != 0) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to stop event script monitoring\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
/* now we've reported the per-script error, don't exit the loop
|
|
* just because it vanished or was disabled. */
|
|
if (ret == -ENOENT || ret == -ENOEXEC) {
|
|
ret = 0;
|
|
}
|
|
|
|
/* return an error if the script failed */
|
|
if (ret != 0) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
child_state.start = timeval_current();
|
|
child_state.script_running = "finished";
|
|
|
|
if (!from_user && call == CTDB_EVENT_MONITOR) {
|
|
if (ctdb_ctrl_event_script_finished(ctdb) != 0) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to finish event script monitoring\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
talloc_free(tmp_ctx);
|
|
return ret;
|
|
}
|
|
|
|
/* called when child is finished */
|
|
static void ctdb_event_script_handler(struct event_context *ev, struct fd_event *fde,
|
|
uint16_t flags, void *p)
|
|
{
|
|
struct ctdb_event_script_state *state =
|
|
talloc_get_type(p, struct ctdb_event_script_state);
|
|
struct ctdb_context *ctdb = state->ctdb;
|
|
|
|
if (read(state->fd[0], &state->cb_status, sizeof(state->cb_status)) !=
|
|
sizeof(state->cb_status)) {
|
|
state->cb_status = -2;
|
|
}
|
|
|
|
DEBUG(DEBUG_INFO,(__location__ " Eventscript %s %s finished with state %d\n",
|
|
call_names[state->call], state->options, state->cb_status));
|
|
|
|
state->child = 0;
|
|
ctdb->event_script_timeouts = 0;
|
|
talloc_free(state);
|
|
}
|
|
|
|
static void ctdb_ban_self(struct ctdb_context *ctdb, uint32_t ban_period)
|
|
{
|
|
TDB_DATA data;
|
|
struct ctdb_ban_time bantime;
|
|
|
|
bantime.pnn = ctdb->pnn;
|
|
bantime.time = ban_period;
|
|
|
|
data.dsize = sizeof(bantime);
|
|
data.dptr = (uint8_t *)&bantime;
|
|
|
|
ctdb_control_set_ban_state(ctdb, data);
|
|
}
|
|
|
|
|
|
/* called when child times out */
|
|
static void ctdb_event_script_timeout(struct event_context *ev, struct timed_event *te,
|
|
struct timeval t, void *p)
|
|
{
|
|
struct ctdb_event_script_state *state = talloc_get_type(p, struct ctdb_event_script_state);
|
|
struct ctdb_context *ctdb = state->ctdb;
|
|
|
|
DEBUG(DEBUG_ERR,("Event script timed out : %s %s count : %u pid : %d\n",
|
|
call_names[state->call], state->options, ctdb->event_script_timeouts, state->child));
|
|
|
|
if (kill(state->child, 0) != 0) {
|
|
DEBUG(DEBUG_ERR,("Event script child process already dead, errno %s(%d)\n", strerror(errno), errno));
|
|
state->child = 0;
|
|
talloc_free(state);
|
|
return;
|
|
}
|
|
|
|
if (state->call == CTDB_EVENT_MONITOR) {
|
|
/* if it is a monitor event, we allow it to "hang" a few times
|
|
before we declare it a failure and ban ourself (and make
|
|
ourself unhealthy)
|
|
*/
|
|
DEBUG(DEBUG_ERR, (__location__ " eventscript for monitor event timedout.\n"));
|
|
|
|
ctdb->event_script_timeouts++;
|
|
|
|
if (ctdb->event_script_timeouts > ctdb->tunable.script_ban_count) {
|
|
DEBUG(DEBUG_ERR, ("Maximum timeout count %u reached for eventscript. Making node unhealthy\n", ctdb->tunable.script_ban_count));
|
|
state->cb_status = -ETIME;
|
|
} else {
|
|
state->cb_status = 0;
|
|
}
|
|
} else if (state->call == CTDB_EVENT_STARTUP) {
|
|
DEBUG(DEBUG_ERR, (__location__ " eventscript for startup event timedout.\n"));
|
|
state->cb_status = -ETIME;
|
|
} else {
|
|
/* if it is not a monitor or a startup event we ban ourself
|
|
immediately
|
|
*/
|
|
DEBUG(DEBUG_ERR, (__location__ " eventscript for NON-monitor/NON-startup event timedout. Immediately banning ourself for %d seconds\n", ctdb->tunable.recovery_ban_period));
|
|
|
|
ctdb_ban_self(ctdb, ctdb->tunable.recovery_ban_period);
|
|
|
|
state->cb_status = -ETIME;
|
|
}
|
|
|
|
if (state->call == CTDB_EVENT_MONITOR || state->call == CTDB_EVENT_STATUS) {
|
|
struct ctdb_monitor_script_status *script;
|
|
|
|
if (ctdb->current_monitor_status_ctx == NULL) {
|
|
talloc_free(state);
|
|
return;
|
|
}
|
|
|
|
script = ctdb->current_monitor_status_ctx->scripts;
|
|
if (script != NULL) {
|
|
script->status = state->cb_status;
|
|
}
|
|
|
|
ctdb_control_event_script_finished(ctdb);
|
|
}
|
|
|
|
talloc_free(state);
|
|
}
|
|
|
|
/*
|
|
destroy an event script: kill it if ->child != 0.
|
|
*/
|
|
static int event_script_destructor(struct ctdb_event_script_state *state)
|
|
{
|
|
if (state->child) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Sending SIGTERM to child pid:%d\n", state->child));
|
|
|
|
if (kill(state->child, SIGTERM) != 0) {
|
|
DEBUG(DEBUG_ERR,("Failed to kill child process for eventscript, errno %s(%d)\n", strerror(errno), errno));
|
|
}
|
|
}
|
|
|
|
/* This is allowed to free us; talloc will prevent double free anyway,
|
|
* but beware if you call this outside the destructor! */
|
|
if (state->callback) {
|
|
state->callback(state->ctdb, state->cb_status, state->private_data);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static unsigned int count_words(const char *options)
|
|
{
|
|
unsigned int words = 0;
|
|
|
|
options += strspn(options, " \t");
|
|
while (*options) {
|
|
words++;
|
|
options += strcspn(options, " \t");
|
|
options += strspn(options, " \t");
|
|
}
|
|
return words;
|
|
}
|
|
|
|
static bool check_options(enum ctdb_eventscript_call call, const char *options)
|
|
{
|
|
switch (call) {
|
|
/* These all take no arguments. */
|
|
case CTDB_EVENT_STARTUP:
|
|
case CTDB_EVENT_START_RECOVERY:
|
|
case CTDB_EVENT_RECOVERED:
|
|
case CTDB_EVENT_STOPPED:
|
|
case CTDB_EVENT_MONITOR:
|
|
case CTDB_EVENT_STATUS:
|
|
case CTDB_EVENT_SHUTDOWN:
|
|
case CTDB_EVENT_RELOAD:
|
|
return count_words(options) == 0;
|
|
|
|
case CTDB_EVENT_TAKE_IP: /* interface, IP address, netmask bits. */
|
|
case CTDB_EVENT_RELEASE_IP:
|
|
return count_words(options) == 3;
|
|
|
|
default:
|
|
DEBUG(DEBUG_ERR,(__location__ "Unknown ctdb_eventscript_call %u\n", call));
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/*
|
|
run the event script in the background, calling the callback when
|
|
finished
|
|
*/
|
|
static int ctdb_event_script_callback_v(struct ctdb_context *ctdb,
|
|
void (*callback)(struct ctdb_context *, int, void *),
|
|
void *private_data,
|
|
bool from_user,
|
|
enum ctdb_eventscript_call call,
|
|
const char *fmt, va_list ap)
|
|
{
|
|
TALLOC_CTX *mem_ctx;
|
|
struct ctdb_event_script_state *state;
|
|
int ret;
|
|
|
|
if (!from_user && (call == CTDB_EVENT_MONITOR || call == CTDB_EVENT_STATUS)) {
|
|
/* if this was a "monitor" or a status event, we recycle the
|
|
context to start a new monitor event
|
|
*/
|
|
if (ctdb->monitor_event_script_ctx != NULL) {
|
|
talloc_free(ctdb->monitor_event_script_ctx);
|
|
ctdb->monitor_event_script_ctx = NULL;
|
|
}
|
|
ctdb->monitor_event_script_ctx = talloc_new(ctdb);
|
|
mem_ctx = ctdb->monitor_event_script_ctx;
|
|
|
|
if (ctdb->current_monitor_status_ctx != NULL) {
|
|
talloc_free(ctdb->current_monitor_status_ctx);
|
|
ctdb->current_monitor_status_ctx = NULL;
|
|
}
|
|
|
|
ctdb->current_monitor_status_ctx = talloc(ctdb, struct ctdb_monitor_script_status_ctx);
|
|
CTDB_NO_MEMORY(ctdb, ctdb->current_monitor_status_ctx);
|
|
ctdb->current_monitor_status_ctx->scripts = NULL;
|
|
} else {
|
|
/* any other script will first terminate any monitor event */
|
|
if (ctdb->monitor_event_script_ctx != NULL) {
|
|
talloc_free(ctdb->monitor_event_script_ctx);
|
|
ctdb->monitor_event_script_ctx = NULL;
|
|
}
|
|
/* and then use a context common for all non-monitor events */
|
|
if (ctdb->other_event_script_ctx == NULL) {
|
|
ctdb->other_event_script_ctx = talloc_new(ctdb);
|
|
}
|
|
mem_ctx = ctdb->other_event_script_ctx;
|
|
}
|
|
|
|
state = talloc(mem_ctx, struct ctdb_event_script_state);
|
|
CTDB_NO_MEMORY(ctdb, state);
|
|
|
|
state->ctdb = ctdb;
|
|
state->callback = callback;
|
|
state->private_data = private_data;
|
|
state->call = call;
|
|
state->options = talloc_vasprintf(state, fmt, ap);
|
|
state->timeout = timeval_set(ctdb->tunable.script_timeout, 0);
|
|
if (state->options == NULL) {
|
|
DEBUG(DEBUG_ERR, (__location__ " could not allocate state->options\n"));
|
|
talloc_free(state);
|
|
return -1;
|
|
}
|
|
if (!check_options(state->call, state->options)) {
|
|
DEBUG(DEBUG_ERR, ("Bad eventscript options '%s' for %s\n",
|
|
call_names[state->call], state->options));
|
|
talloc_free(state);
|
|
return -1;
|
|
}
|
|
|
|
DEBUG(DEBUG_INFO,(__location__ " Starting eventscript %s %s\n",
|
|
call_names[state->call], state->options));
|
|
|
|
ret = pipe(state->fd);
|
|
if (ret != 0) {
|
|
talloc_free(state);
|
|
return -1;
|
|
}
|
|
|
|
state->child = fork();
|
|
|
|
if (state->child == (pid_t)-1) {
|
|
close(state->fd[0]);
|
|
close(state->fd[1]);
|
|
talloc_free(state);
|
|
return -1;
|
|
}
|
|
|
|
if (state->child == 0) {
|
|
int rt;
|
|
|
|
close(state->fd[0]);
|
|
set_close_on_exec(state->fd[1]);
|
|
|
|
rt = ctdb_run_event_script(ctdb, from_user, state->call, state->options);
|
|
/* We must be able to write PIPEBUF bytes at least; if this
|
|
somehow fails, the read above will be short. */
|
|
write(state->fd[1], &rt, sizeof(rt));
|
|
close(state->fd[1]);
|
|
_exit(rt);
|
|
}
|
|
|
|
close(state->fd[1]);
|
|
set_close_on_exec(state->fd[0]);
|
|
talloc_set_destructor(state, event_script_destructor);
|
|
|
|
DEBUG(DEBUG_DEBUG, (__location__ " Created PIPE FD:%d to child eventscript process\n", state->fd[0]));
|
|
|
|
event_add_fd(ctdb->ev, state, state->fd[0], EVENT_FD_READ|EVENT_FD_AUTOCLOSE,
|
|
ctdb_event_script_handler, state);
|
|
|
|
if (!timeval_is_zero(&state->timeout)) {
|
|
event_add_timed(ctdb->ev, state, timeval_current_ofs(state->timeout.tv_sec, state->timeout.tv_usec), ctdb_event_script_timeout, state);
|
|
} else {
|
|
DEBUG(DEBUG_ERR, (__location__ " eventscript %s %s called with no timeout\n",
|
|
call_names[state->call], state->options));
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
run the event script in the background, calling the callback when
|
|
finished
|
|
*/
|
|
int ctdb_event_script_callback(struct ctdb_context *ctdb,
|
|
TALLOC_CTX *mem_ctx,
|
|
void (*callback)(struct ctdb_context *, int, void *),
|
|
void *private_data,
|
|
bool from_user,
|
|
enum ctdb_eventscript_call call,
|
|
const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
int ret;
|
|
|
|
va_start(ap, fmt);
|
|
ret = ctdb_event_script_callback_v(ctdb, callback, private_data, from_user, call, fmt, ap);
|
|
va_end(ap);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
struct callback_status {
|
|
bool done;
|
|
int status;
|
|
};
|
|
|
|
/*
|
|
called when ctdb_event_script() finishes
|
|
*/
|
|
static void event_script_callback(struct ctdb_context *ctdb, int status, void *private_data)
|
|
{
|
|
struct callback_status *s = (struct callback_status *)private_data;
|
|
s->done = true;
|
|
s->status = status;
|
|
}
|
|
|
|
/*
|
|
run the event script, waiting for it to complete. Used when the caller
|
|
doesn't want to continue till the event script has finished.
|
|
*/
|
|
int ctdb_event_script_args(struct ctdb_context *ctdb, enum ctdb_eventscript_call call,
|
|
const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
int ret;
|
|
struct callback_status status;
|
|
|
|
va_start(ap, fmt);
|
|
ret = ctdb_event_script_callback_v(ctdb,
|
|
event_script_callback, &status, false, call, fmt, ap);
|
|
if (ret != 0) {
|
|
return ret;
|
|
}
|
|
va_end(ap);
|
|
|
|
status.status = -1;
|
|
status.done = false;
|
|
|
|
while (status.done == false && event_loop_once(ctdb->ev) == 0) /* noop */;
|
|
|
|
return status.status;
|
|
}
|
|
|
|
int ctdb_event_script(struct ctdb_context *ctdb, enum ctdb_eventscript_call call)
|
|
{
|
|
/* GCC complains about empty format string, so use %s and "". */
|
|
return ctdb_event_script_args(ctdb, call, "%s", "");
|
|
}
|
|
|
|
struct eventscript_callback_state {
|
|
struct ctdb_req_control *c;
|
|
};
|
|
|
|
/*
|
|
called when a forced eventscript run has finished
|
|
*/
|
|
static void run_eventscripts_callback(struct ctdb_context *ctdb, int status,
|
|
void *private_data)
|
|
{
|
|
struct eventscript_callback_state *state =
|
|
talloc_get_type(private_data, struct eventscript_callback_state);
|
|
|
|
ctdb_enable_monitoring(ctdb);
|
|
|
|
if (status != 0) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to forcibly run eventscripts\n"));
|
|
}
|
|
|
|
ctdb_request_control_reply(ctdb, state->c, NULL, status, NULL);
|
|
/* This will free the struct ctdb_event_script_state we are in! */
|
|
talloc_free(state);
|
|
return;
|
|
}
|
|
|
|
|
|
/* Returns rest of string, or NULL if no match. */
|
|
static const char *get_call(const char *p, enum ctdb_eventscript_call *call)
|
|
{
|
|
unsigned int len;
|
|
|
|
/* Skip any initial whitespace. */
|
|
p += strspn(p, " \t");
|
|
|
|
/* See if we match any. */
|
|
for (*call = 0; *call < ARRAY_SIZE(call_names); (*call)++) {
|
|
len = strlen(call_names[*call]);
|
|
if (strncmp(p, call_names[*call], len) == 0) {
|
|
/* If end of string or whitespace, we're done. */
|
|
if (strcspn(p + len, " \t") == 0) {
|
|
return p + len;
|
|
}
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
A control to force running of the eventscripts from the ctdb client tool
|
|
*/
|
|
int32_t ctdb_run_eventscripts(struct ctdb_context *ctdb,
|
|
struct ctdb_req_control *c,
|
|
TDB_DATA indata, bool *async_reply)
|
|
{
|
|
int ret;
|
|
struct eventscript_callback_state *state;
|
|
const char *options;
|
|
enum ctdb_eventscript_call call;
|
|
|
|
/* Figure out what call they want. */
|
|
options = get_call((const char *)indata.dptr, &call);
|
|
if (!options) {
|
|
DEBUG(DEBUG_ERR, (__location__ " Invalid forced \"%s\"\n", (const char *)indata.dptr));
|
|
return -1;
|
|
}
|
|
|
|
if (ctdb->recovery_mode != CTDB_RECOVERY_NORMAL) {
|
|
DEBUG(DEBUG_ERR, (__location__ " Aborted running eventscript \"%s\" while in RECOVERY mode\n", indata.dptr));
|
|
return -1;
|
|
}
|
|
|
|
state = talloc(ctdb->other_event_script_ctx, struct eventscript_callback_state);
|
|
CTDB_NO_MEMORY(ctdb, state);
|
|
|
|
state->c = talloc_steal(state, c);
|
|
|
|
DEBUG(DEBUG_NOTICE,("Forced running of eventscripts with arguments %s\n", indata.dptr));
|
|
|
|
ctdb_disable_monitoring(ctdb);
|
|
|
|
ret = ctdb_event_script_callback(ctdb,
|
|
state, run_eventscripts_callback, state,
|
|
true, call, "%s", options);
|
|
|
|
if (ret != 0) {
|
|
ctdb_enable_monitoring(ctdb);
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to run eventscripts with arguments %s\n", indata.dptr));
|
|
talloc_free(state);
|
|
return -1;
|
|
}
|
|
|
|
/* tell ctdb_control.c that we will be replying asynchronously */
|
|
*async_reply = true;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
|
|
int32_t ctdb_control_enable_script(struct ctdb_context *ctdb, TDB_DATA indata)
|
|
{
|
|
const char *script;
|
|
struct stat st;
|
|
char *filename;
|
|
TALLOC_CTX *tmp_ctx = talloc_new(ctdb);
|
|
|
|
script = (char *)indata.dptr;
|
|
if (indata.dsize == 0) {
|
|
DEBUG(DEBUG_ERR,(__location__ " No script specified.\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
if (indata.dptr[indata.dsize - 1] != '\0') {
|
|
DEBUG(DEBUG_ERR,(__location__ " String is not null terminated.\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
if (index(script,'/') != NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Script name contains '/'. Failed to enable script %s\n", script));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
|
|
if (stat(ctdb->event_script_dir, &st) != 0 &&
|
|
errno == ENOENT) {
|
|
DEBUG(DEBUG_CRIT,("No event script directory found at '%s'\n", ctdb->event_script_dir));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
|
|
filename = talloc_asprintf(tmp_ctx, "%s/%s", ctdb->event_script_dir, script);
|
|
if (filename == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to create script path\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
if (stat(filename, &st) != 0) {
|
|
DEBUG(DEBUG_ERR,("Could not stat event script %s. Failed to enable script.\n", filename));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
if (chmod(filename, st.st_mode | S_IXUSR) == -1) {
|
|
DEBUG(DEBUG_ERR,("Could not chmod %s. Failed to enable script.\n", filename));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
talloc_free(tmp_ctx);
|
|
return 0;
|
|
}
|
|
|
|
int32_t ctdb_control_disable_script(struct ctdb_context *ctdb, TDB_DATA indata)
|
|
{
|
|
const char *script;
|
|
struct stat st;
|
|
char *filename;
|
|
TALLOC_CTX *tmp_ctx = talloc_new(ctdb);
|
|
|
|
script = (char *)indata.dptr;
|
|
if (indata.dsize == 0) {
|
|
DEBUG(DEBUG_ERR,(__location__ " No script specified.\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
if (indata.dptr[indata.dsize - 1] != '\0') {
|
|
DEBUG(DEBUG_ERR,(__location__ " String is not null terminated.\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
if (index(script,'/') != NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Script name contains '/'. Failed to disable script %s\n", script));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
|
|
if (stat(ctdb->event_script_dir, &st) != 0 &&
|
|
errno == ENOENT) {
|
|
DEBUG(DEBUG_CRIT,("No event script directory found at '%s'\n", ctdb->event_script_dir));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
|
|
filename = talloc_asprintf(tmp_ctx, "%s/%s", ctdb->event_script_dir, script);
|
|
if (filename == NULL) {
|
|
DEBUG(DEBUG_ERR,(__location__ " Failed to create script path\n"));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
if (stat(filename, &st) != 0) {
|
|
DEBUG(DEBUG_ERR,("Could not stat event script %s. Failed to disable script.\n", filename));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
if (chmod(filename, st.st_mode & ~(S_IXUSR|S_IXGRP|S_IXOTH)) == -1) {
|
|
DEBUG(DEBUG_ERR,("Could not chmod %s. Failed to disable script.\n", filename));
|
|
talloc_free(tmp_ctx);
|
|
return -1;
|
|
}
|
|
|
|
talloc_free(tmp_ctx);
|
|
return 0;
|
|
}
|