totemconfig.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761
  1. /*
  2. * Copyright (c) 2002-2005 MontaVista Software, Inc.
  3. * Copyright (c) 2006-2011 Red Hat, Inc.
  4. *
  5. * All rights reserved.
  6. *
  7. * Author: Steven Dake (sdake@redhat.com)
  8. * Jan Friesse (jfriesse@redhat.com)
  9. *
  10. * This software licensed under BSD license, the text of which follows:
  11. *
  12. * Redistribution and use in source and binary forms, with or without
  13. * modification, are permitted provided that the following conditions are met:
  14. *
  15. * - Redistributions of source code must retain the above copyright notice,
  16. * this list of conditions and the following disclaimer.
  17. * - Redistributions in binary form must reproduce the above copyright notice,
  18. * this list of conditions and the following disclaimer in the documentation
  19. * and/or other materials provided with the distribution.
  20. * - Neither the name of the MontaVista Software, Inc. nor the names of its
  21. * contributors may be used to endorse or promote products derived from this
  22. * software without specific prior written permission.
  23. *
  24. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  25. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  26. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  27. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
  28. * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  29. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  30. * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  31. * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  32. * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  33. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
  34. * THE POSSIBILITY OF SUCH DAMAGE.
  35. */
  36. #include <config.h>
  37. #include <stdio.h>
  38. #include <string.h>
  39. #include <stdlib.h>
  40. #include <errno.h>
  41. #include <unistd.h>
  42. #include <sys/socket.h>
  43. #include <sys/types.h>
  44. #include <sys/stat.h>
  45. #include <fcntl.h>
  46. #include <netinet/in.h>
  47. #include <arpa/inet.h>
  48. #include <sys/param.h>
  49. #include <corosync/swab.h>
  50. #include <corosync/list.h>
  51. #include <qb/qbdefs.h>
  52. #include <corosync/totem/totem.h>
  53. #include <corosync/engine/config.h>
  54. #include <corosync/engine/logsys.h>
  55. #include <corosync/engine/icmap.h>
  56. #ifdef HAVE_LIBNSS
  57. #include <nss.h>
  58. #include <pk11pub.h>
  59. #include <pkcs11.h>
  60. #include <prerror.h>
  61. #endif
  62. #include "util.h"
  63. #include "totemconfig.h"
  64. #define TOKEN_RETRANSMITS_BEFORE_LOSS_CONST 4
  65. #define TOKEN_TIMEOUT 1000
  66. #define TOKEN_RETRANSMIT_TIMEOUT (int)(TOKEN_TIMEOUT / (TOKEN_RETRANSMITS_BEFORE_LOSS_CONST + 0.2))
  67. #define TOKEN_HOLD_TIMEOUT (int)(TOKEN_RETRANSMIT_TIMEOUT * 0.8 - (1000/(int)HZ))
  68. #define JOIN_TIMEOUT 50
  69. #define MERGE_TIMEOUT 200
  70. #define DOWNCHECK_TIMEOUT 1000
  71. #define FAIL_TO_RECV_CONST 2500
  72. #define SEQNO_UNCHANGED_CONST 30
  73. #define MINIMUM_TIMEOUT (int)(1000/HZ)*3
  74. #define MAX_NETWORK_DELAY 50
  75. #define WINDOW_SIZE 50
  76. #define MAX_MESSAGES 17
  77. #define MISS_COUNT_CONST 5
  78. #define RRP_PROBLEM_COUNT_TIMEOUT 2000
  79. #define RRP_PROBLEM_COUNT_THRESHOLD_DEFAULT 10
  80. #define RRP_PROBLEM_COUNT_THRESHOLD_MIN 2
  81. #define RRP_AUTORECOVERY_CHECK_TIMEOUT 1000
  82. static char error_string_response[512];
  83. static void add_totem_config_notification(struct totem_config *totem_config);
  84. static void totem_volatile_config_read (struct totem_config *totem_config)
  85. {
  86. char *str;
  87. icmap_get_uint32("totem.token", &totem_config->token_timeout);
  88. icmap_get_uint32("totem.token_retransmit", &totem_config->token_retransmit_timeout);
  89. icmap_get_uint32("totem.hold", &totem_config->token_hold_timeout);
  90. icmap_get_uint32("totem.token_retransmits_before_loss_const", &totem_config->token_retransmits_before_loss_const);
  91. icmap_get_uint32("totem.join", &totem_config->join_timeout);
  92. icmap_get_uint32("totem.send_join", &totem_config->send_join_timeout);
  93. icmap_get_uint32("totem.consensus", &totem_config->consensus_timeout);
  94. icmap_get_uint32("totem.merge", &totem_config->merge_timeout);
  95. icmap_get_uint32("totem.downcheck", &totem_config->downcheck_timeout);
  96. icmap_get_uint32("totem.fail_recv_const", &totem_config->fail_to_recv_const);
  97. icmap_get_uint32("totem.seqno_unchanged_const", &totem_config->seqno_unchanged_const);
  98. icmap_get_uint32("totem.rrp_token_expired_timeout", &totem_config->rrp_token_expired_timeout);
  99. icmap_get_uint32("totem.rrp_problem_count_timeout", &totem_config->rrp_problem_count_timeout);
  100. icmap_get_uint32("totem.rrp_problem_count_threshold", &totem_config->rrp_problem_count_threshold);
  101. icmap_get_uint32("totem.rrp_problem_count_mcast_threshold", &totem_config->rrp_problem_count_mcast_threshold);
  102. icmap_get_uint32("totem.rrp_autorecovery_check_timeout", &totem_config->rrp_autorecovery_check_timeout);
  103. icmap_get_uint32("totem.heartbeat_failures_allowed", &totem_config->heartbeat_failures_allowed);
  104. icmap_get_uint32("totem.max_network_delay", &totem_config->max_network_delay);
  105. icmap_get_uint32("totem.window_size", &totem_config->window_size);
  106. icmap_get_uint32("totem.max_messages", &totem_config->max_messages);
  107. icmap_get_uint32("totem.miss_count_const", &totem_config->miss_count_const);
  108. if (icmap_get_string("totem.vsftype", &str) == CS_OK) {
  109. totem_config->vsf_type = str;
  110. }
  111. }
  112. static void totem_get_crypto_type(struct totem_config *totem_config)
  113. {
  114. char *str;
  115. totem_config->crypto_accept = TOTEM_CRYPTO_ACCEPT_OLD;
  116. if (icmap_get_string("totem.crypto_accept", &str) == CS_OK) {
  117. if (strcmp(str, "new") == 0) {
  118. totem_config->crypto_accept = TOTEM_CRYPTO_ACCEPT_NEW;
  119. }
  120. free(str);
  121. }
  122. totem_config->crypto_type = TOTEM_CRYPTO_SOBER;
  123. #ifdef HAVE_LIBNSS
  124. /*
  125. * We must set these even if the key does not exist.
  126. * Encryption type can be set on-the-fly using CFG
  127. */
  128. totem_config->crypto_crypt_type = CKM_AES_CBC_PAD;
  129. totem_config->crypto_sign_type = CKM_SHA256_RSA_PKCS;
  130. #endif
  131. if (icmap_get_string("totem.crypto_type", &str) == CS_OK) {
  132. if (strcmp(str, "sober") == 0) {
  133. free(str);
  134. return;
  135. }
  136. #ifdef HAVE_LIBNSS
  137. if (strcmp(str, "nss") == 0) {
  138. totem_config->crypto_type = TOTEM_CRYPTO_NSS;
  139. }
  140. free(str);
  141. #endif
  142. }
  143. }
  144. extern int totem_config_read (
  145. struct totem_config *totem_config,
  146. const char **error_string)
  147. {
  148. int res = 0;
  149. char *str;
  150. unsigned int ringnumber = 0;
  151. int member_count = 0;
  152. icmap_iter_t iter, member_iter;
  153. const char *iter_key;
  154. const char *member_iter_key;
  155. char ringnumber_key[ICMAP_KEYNAME_MAXLEN];
  156. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  157. uint8_t u8;
  158. memset (totem_config, 0, sizeof (struct totem_config));
  159. totem_config->interfaces = malloc (sizeof (struct totem_interface) * INTERFACE_MAX);
  160. if (totem_config->interfaces == 0) {
  161. *error_string = "Out of memory trying to allocate ethernet interface storage area";
  162. return -1;
  163. }
  164. memset (totem_config->interfaces, 0,
  165. sizeof (struct totem_interface) * INTERFACE_MAX);
  166. totem_config->secauth = 1;
  167. strcpy (totem_config->rrp_mode, "none");
  168. icmap_get_uint32("totem.version", (uint32_t *)&totem_config->version);
  169. if (icmap_get_string("totem.secauth", &str) == CS_OK) {
  170. if (strcmp (str, "on") == 0) {
  171. totem_config->secauth = 1;
  172. }
  173. if (strcmp (str, "off") == 0) {
  174. totem_config->secauth = 0;
  175. }
  176. free(str);
  177. }
  178. if (totem_config->secauth == 1) {
  179. totem_get_crypto_type(totem_config);
  180. }
  181. if (icmap_get_string("totem.rrp_mode", &str) == CS_OK) {
  182. strcpy (totem_config->rrp_mode, str);
  183. free(str);
  184. }
  185. /*
  186. * Get interface node id
  187. */
  188. icmap_get_uint32("totem.nodeid", &totem_config->node_id);
  189. totem_config->clear_node_high_bit = 0;
  190. if (icmap_get_string("totem.clear_node_high_bit", &str) == CS_OK) {
  191. if (strcmp (str, "yes") == 0) {
  192. totem_config->clear_node_high_bit = 1;
  193. }
  194. free(str);
  195. }
  196. icmap_get_uint32("totem.threads", &totem_config->threads);
  197. icmap_get_uint32("totem.netmtu", &totem_config->net_mtu);
  198. /*
  199. * Get things that might change in the future
  200. */
  201. totem_volatile_config_read(totem_config);
  202. iter = icmap_iter_init("totem.interface.");
  203. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  204. res = sscanf(iter_key, "totem.interface.%[^.].%s", ringnumber_key, tmp_key);
  205. if (res != 2) {
  206. continue;
  207. }
  208. if (strcmp(tmp_key, "bindnetaddr") != 0) {
  209. continue;
  210. }
  211. member_count = 0;
  212. ringnumber = atoi(ringnumber_key);
  213. /*
  214. * Get the bind net address
  215. */
  216. if (icmap_get_string(iter_key, &str) == CS_OK) {
  217. res = totemip_parse (&totem_config->interfaces[ringnumber].bindnet, str,
  218. totem_config->interfaces[ringnumber].mcast_addr.family);
  219. free(str);
  220. }
  221. /*
  222. * Get interface multicast address
  223. */
  224. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastaddr", ringnumber);
  225. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  226. res = totemip_parse (&totem_config->interfaces[ringnumber].mcast_addr, str, 0);
  227. free(str);
  228. }
  229. totem_config->broadcast_use = 0;
  230. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.broadcast", ringnumber);
  231. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  232. if (strcmp (str, "yes") == 0) {
  233. totem_config->broadcast_use = 1;
  234. totemip_parse (
  235. &totem_config->interfaces[ringnumber].mcast_addr,
  236. "255.255.255.255", 0);
  237. }
  238. free(str);
  239. }
  240. /*
  241. * Get mcast port
  242. */
  243. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastport", ringnumber);
  244. icmap_get_uint16(tmp_key, &totem_config->interfaces[ringnumber].ip_port);
  245. /*
  246. * Get the TTL
  247. */
  248. totem_config->interfaces[ringnumber].ttl = 1;
  249. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.ttl", ringnumber);
  250. if (icmap_get_uint8(tmp_key, &u8) == CS_OK) {
  251. totem_config->interfaces[ringnumber].ttl = u8;
  252. }
  253. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.member.", ringnumber);
  254. member_iter = icmap_iter_init(tmp_key);
  255. while ((member_iter_key = icmap_iter_next(member_iter, NULL, NULL)) != NULL) {
  256. if (icmap_get_string(member_iter_key, &str) == CS_OK) {
  257. res = totemip_parse (&totem_config->interfaces[ringnumber].member_list[member_count++],
  258. str, 0);
  259. }
  260. }
  261. totem_config->interfaces[ringnumber].member_count = member_count;
  262. totem_config->interface_count++;
  263. }
  264. totem_config->transport_number = TOTEM_TRANSPORT_UDP;
  265. if (icmap_get_string("totem.transport", &str) == CS_OK) {
  266. if (strcmp (str, "udpu") == 0) {
  267. totem_config->transport_number = TOTEM_TRANSPORT_UDPU;
  268. }
  269. if (strcmp (str, "iba") == 0) {
  270. totem_config->transport_number = TOTEM_TRANSPORT_RDMA;
  271. }
  272. free(str);
  273. }
  274. add_totem_config_notification(totem_config);
  275. return 0;
  276. }
  277. int totem_config_validate (
  278. struct totem_config *totem_config,
  279. const char **error_string)
  280. {
  281. static char local_error_reason[512];
  282. char parse_error[512];
  283. const char *error_reason = local_error_reason;
  284. int i;
  285. unsigned int interface_max = INTERFACE_MAX;
  286. if (totem_config->interface_count == 0) {
  287. error_reason = "No interfaces defined";
  288. goto parse_error;
  289. }
  290. for (i = 0; i < totem_config->interface_count; i++) {
  291. /*
  292. * Some error checking of parsed data to make sure its valid
  293. */
  294. struct totem_ip_address null_addr;
  295. memset (&null_addr, 0, sizeof (struct totem_ip_address));
  296. if ((totem_config->transport_number == 0) &&
  297. memcmp (&totem_config->interfaces[i].mcast_addr, &null_addr,
  298. sizeof (struct totem_ip_address)) == 0) {
  299. error_reason = "No multicast address specified";
  300. goto parse_error;
  301. }
  302. if (totem_config->interfaces[i].ip_port == 0) {
  303. error_reason = "No multicast port specified";
  304. goto parse_error;
  305. }
  306. if (totem_config->interfaces[i].ttl > 255) {
  307. error_reason = "Invalid TTL (should be 0..255)";
  308. goto parse_error;
  309. }
  310. if (totem_config->transport_number != TOTEM_TRANSPORT_UDP &&
  311. totem_config->interfaces[i].ttl != 1) {
  312. error_reason = "Can only set ttl on multicast transport types";
  313. goto parse_error;
  314. }
  315. if (totem_config->interfaces[i].mcast_addr.family == AF_INET6 &&
  316. totem_config->node_id == 0) {
  317. error_reason = "An IPV6 network requires that a node ID be specified.";
  318. goto parse_error;
  319. }
  320. if (totem_config->broadcast_use == 0 && totem_config->transport_number == 0) {
  321. if (totem_config->interfaces[i].mcast_addr.family != totem_config->interfaces[i].bindnet.family) {
  322. error_reason = "Multicast address family does not match bind address family";
  323. goto parse_error;
  324. }
  325. if (totem_config->interfaces[i].mcast_addr.family != totem_config->interfaces[i].bindnet.family) {
  326. error_reason = "Not all bind address belong to the same IP family";
  327. goto parse_error;
  328. }
  329. if (totemip_is_mcast (&totem_config->interfaces[i].mcast_addr) != 0) {
  330. error_reason = "mcastaddr is not a correct multicast address.";
  331. goto parse_error;
  332. }
  333. }
  334. }
  335. if (totem_config->version != 2) {
  336. error_reason = "This totem parser can only parse version 2 configurations.";
  337. goto parse_error;
  338. }
  339. if (totem_config->token_retransmits_before_loss_const == 0) {
  340. totem_config->token_retransmits_before_loss_const =
  341. TOKEN_RETRANSMITS_BEFORE_LOSS_CONST;
  342. }
  343. /*
  344. * Setup timeout values that are not setup by user
  345. */
  346. if (totem_config->token_timeout == 0) {
  347. totem_config->token_timeout = TOKEN_TIMEOUT;
  348. if (totem_config->token_retransmits_before_loss_const == 0) {
  349. totem_config->token_retransmits_before_loss_const = TOKEN_RETRANSMITS_BEFORE_LOSS_CONST;
  350. }
  351. if (totem_config->token_retransmit_timeout == 0) {
  352. totem_config->token_retransmit_timeout =
  353. (int)(totem_config->token_timeout /
  354. (totem_config->token_retransmits_before_loss_const + 0.2));
  355. }
  356. if (totem_config->token_hold_timeout == 0) {
  357. totem_config->token_hold_timeout =
  358. (int)(totem_config->token_retransmit_timeout * 0.8 -
  359. (1000/HZ));
  360. }
  361. }
  362. if (totem_config->max_network_delay == 0) {
  363. totem_config->max_network_delay = MAX_NETWORK_DELAY;
  364. }
  365. if (totem_config->max_network_delay < MINIMUM_TIMEOUT) {
  366. snprintf (local_error_reason, sizeof(local_error_reason),
  367. "The max_network_delay parameter (%d ms) may not be less then (%d ms).",
  368. totem_config->max_network_delay, MINIMUM_TIMEOUT);
  369. goto parse_error;
  370. }
  371. if (totem_config->window_size == 0) {
  372. totem_config->window_size = WINDOW_SIZE;
  373. }
  374. if (totem_config->max_messages == 0) {
  375. totem_config->max_messages = MAX_MESSAGES;
  376. }
  377. if (totem_config->miss_count_const == 0) {
  378. totem_config->miss_count_const = MISS_COUNT_CONST;
  379. }
  380. if (totem_config->token_timeout < MINIMUM_TIMEOUT) {
  381. snprintf (local_error_reason, sizeof(local_error_reason),
  382. "The token timeout parameter (%d ms) may not be less then (%d ms).",
  383. totem_config->token_timeout, MINIMUM_TIMEOUT);
  384. goto parse_error;
  385. }
  386. if (totem_config->token_retransmit_timeout == 0) {
  387. totem_config->token_retransmit_timeout =
  388. (int)(totem_config->token_timeout /
  389. (totem_config->token_retransmits_before_loss_const + 0.2));
  390. }
  391. if (totem_config->token_hold_timeout == 0) {
  392. totem_config->token_hold_timeout =
  393. (int)(totem_config->token_retransmit_timeout * 0.8 -
  394. (1000/HZ));
  395. }
  396. if (totem_config->token_retransmit_timeout < MINIMUM_TIMEOUT) {
  397. snprintf (local_error_reason, sizeof(local_error_reason),
  398. "The token retransmit timeout parameter (%d ms) may not be less then (%d ms).",
  399. totem_config->token_retransmit_timeout, MINIMUM_TIMEOUT);
  400. goto parse_error;
  401. }
  402. if (totem_config->token_hold_timeout == 0) {
  403. totem_config->token_hold_timeout = TOKEN_HOLD_TIMEOUT;
  404. }
  405. if (totem_config->token_hold_timeout < MINIMUM_TIMEOUT) {
  406. snprintf (local_error_reason, sizeof(local_error_reason),
  407. "The token hold timeout parameter (%d ms) may not be less then (%d ms).",
  408. totem_config->token_hold_timeout, MINIMUM_TIMEOUT);
  409. goto parse_error;
  410. }
  411. if (totem_config->join_timeout == 0) {
  412. totem_config->join_timeout = JOIN_TIMEOUT;
  413. }
  414. if (totem_config->join_timeout < MINIMUM_TIMEOUT) {
  415. snprintf (local_error_reason, sizeof(local_error_reason),
  416. "The join timeout parameter (%d ms) may not be less then (%d ms).",
  417. totem_config->join_timeout, MINIMUM_TIMEOUT);
  418. goto parse_error;
  419. }
  420. if (totem_config->consensus_timeout == 0) {
  421. totem_config->consensus_timeout = (int)(float)(1.2 * totem_config->token_timeout);
  422. }
  423. if (totem_config->consensus_timeout < MINIMUM_TIMEOUT) {
  424. snprintf (local_error_reason, sizeof(local_error_reason),
  425. "The consensus timeout parameter (%d ms) may not be less then (%d ms).",
  426. totem_config->consensus_timeout, MINIMUM_TIMEOUT);
  427. goto parse_error;
  428. }
  429. if (totem_config->merge_timeout == 0) {
  430. totem_config->merge_timeout = MERGE_TIMEOUT;
  431. }
  432. if (totem_config->merge_timeout < MINIMUM_TIMEOUT) {
  433. snprintf (local_error_reason, sizeof(local_error_reason),
  434. "The merge timeout parameter (%d ms) may not be less then (%d ms).",
  435. totem_config->merge_timeout, MINIMUM_TIMEOUT);
  436. goto parse_error;
  437. }
  438. if (totem_config->downcheck_timeout == 0) {
  439. totem_config->downcheck_timeout = DOWNCHECK_TIMEOUT;
  440. }
  441. if (totem_config->downcheck_timeout < MINIMUM_TIMEOUT) {
  442. snprintf (local_error_reason, sizeof(local_error_reason),
  443. "The downcheck timeout parameter (%d ms) may not be less then (%d ms).",
  444. totem_config->downcheck_timeout, MINIMUM_TIMEOUT);
  445. goto parse_error;
  446. }
  447. /*
  448. * RRP values validation
  449. */
  450. if (strcmp (totem_config->rrp_mode, "none") &&
  451. strcmp (totem_config->rrp_mode, "active") &&
  452. strcmp (totem_config->rrp_mode, "passive")) {
  453. snprintf (local_error_reason, sizeof(local_error_reason),
  454. "The RRP mode \"%s\" specified is invalid. It must be none, active, or passive.\n", totem_config->rrp_mode);
  455. goto parse_error;
  456. }
  457. if (totem_config->rrp_problem_count_timeout == 0) {
  458. totem_config->rrp_problem_count_timeout = RRP_PROBLEM_COUNT_TIMEOUT;
  459. }
  460. if (totem_config->rrp_problem_count_timeout < MINIMUM_TIMEOUT) {
  461. snprintf (local_error_reason, sizeof(local_error_reason),
  462. "The RRP problem count timeout parameter (%d ms) may not be less then (%d ms).",
  463. totem_config->rrp_problem_count_timeout, MINIMUM_TIMEOUT);
  464. goto parse_error;
  465. }
  466. if (totem_config->rrp_problem_count_threshold == 0) {
  467. totem_config->rrp_problem_count_threshold = RRP_PROBLEM_COUNT_THRESHOLD_DEFAULT;
  468. }
  469. if (totem_config->rrp_problem_count_mcast_threshold == 0) {
  470. totem_config->rrp_problem_count_mcast_threshold = totem_config->rrp_problem_count_threshold * 10;
  471. }
  472. if (totem_config->rrp_problem_count_threshold < RRP_PROBLEM_COUNT_THRESHOLD_MIN) {
  473. snprintf (local_error_reason, sizeof(local_error_reason),
  474. "The RRP problem count threshold (%d problem count) may not be less then (%d problem count).",
  475. totem_config->rrp_problem_count_threshold, RRP_PROBLEM_COUNT_THRESHOLD_MIN);
  476. goto parse_error;
  477. }
  478. if (totem_config->rrp_problem_count_mcast_threshold < RRP_PROBLEM_COUNT_THRESHOLD_MIN) {
  479. snprintf (local_error_reason, sizeof(local_error_reason),
  480. "The RRP multicast problem count threshold (%d problem count) may not be less then (%d problem count).",
  481. totem_config->rrp_problem_count_mcast_threshold, RRP_PROBLEM_COUNT_THRESHOLD_MIN);
  482. goto parse_error;
  483. }
  484. if (totem_config->rrp_token_expired_timeout == 0) {
  485. totem_config->rrp_token_expired_timeout =
  486. totem_config->token_retransmit_timeout;
  487. }
  488. if (totem_config->rrp_token_expired_timeout < MINIMUM_TIMEOUT) {
  489. snprintf (local_error_reason, sizeof(local_error_reason),
  490. "The RRP token expired timeout parameter (%d ms) may not be less then (%d ms).",
  491. totem_config->rrp_token_expired_timeout, MINIMUM_TIMEOUT);
  492. goto parse_error;
  493. }
  494. if (totem_config->rrp_autorecovery_check_timeout == 0) {
  495. totem_config->rrp_autorecovery_check_timeout = RRP_AUTORECOVERY_CHECK_TIMEOUT;
  496. }
  497. if (strcmp (totem_config->rrp_mode, "none") == 0) {
  498. interface_max = 1;
  499. }
  500. if (interface_max < totem_config->interface_count) {
  501. snprintf (parse_error, sizeof(parse_error),
  502. "%d is too many configured interfaces for the rrp_mode setting %s.",
  503. totem_config->interface_count,
  504. totem_config->rrp_mode);
  505. error_reason = parse_error;
  506. goto parse_error;
  507. }
  508. if (totem_config->fail_to_recv_const == 0) {
  509. totem_config->fail_to_recv_const = FAIL_TO_RECV_CONST;
  510. }
  511. if (totem_config->seqno_unchanged_const == 0) {
  512. totem_config->seqno_unchanged_const = SEQNO_UNCHANGED_CONST;
  513. }
  514. if (totem_config->net_mtu == 0) {
  515. totem_config->net_mtu = 1500;
  516. }
  517. if ((MESSAGE_QUEUE_MAX) < totem_config->max_messages) {
  518. snprintf (local_error_reason, sizeof(local_error_reason),
  519. "The max_messages parameter (%d messages) may not be greater then (%d messages).",
  520. totem_config->max_messages, MESSAGE_QUEUE_MAX);
  521. goto parse_error;
  522. }
  523. if (totem_config->threads > SEND_THREADS_MAX) {
  524. totem_config->threads = SEND_THREADS_MAX;
  525. }
  526. if (totem_config->secauth == 0) {
  527. totem_config->threads = 0;
  528. }
  529. if (totem_config->net_mtu > FRAME_SIZE_MAX) {
  530. error_reason = "This net_mtu parameter is greater then the maximum frame size";
  531. goto parse_error;
  532. }
  533. if (totem_config->vsf_type == NULL) {
  534. totem_config->vsf_type = "none";
  535. }
  536. return (0);
  537. parse_error:
  538. snprintf (error_string_response, sizeof(error_string_response),
  539. "parse error in config: %s\n", error_reason);
  540. *error_string = error_string_response;
  541. return (-1);
  542. }
  543. static int read_keyfile (
  544. const char *key_location,
  545. struct totem_config *totem_config,
  546. const char **error_string)
  547. {
  548. int fd;
  549. int res;
  550. ssize_t expected_key_len = sizeof (totem_config->private_key);
  551. int saved_errno;
  552. char error_str[100];
  553. const char *error_ptr;
  554. fd = open (key_location, O_RDONLY);
  555. if (fd == -1) {
  556. error_ptr = qb_strerror_r(errno, error_str, sizeof(error_str));
  557. snprintf (error_string_response, sizeof(error_string_response),
  558. "Could not open %s: %s\n",
  559. key_location, error_ptr);
  560. goto parse_error;
  561. }
  562. res = read (fd, totem_config->private_key, expected_key_len);
  563. saved_errno = errno;
  564. close (fd);
  565. if (res == -1) {
  566. error_ptr = qb_strerror_r (saved_errno, error_str, sizeof(error_str));
  567. snprintf (error_string_response, sizeof(error_string_response),
  568. "Could not read %s: %s\n",
  569. key_location, error_ptr);
  570. goto parse_error;
  571. }
  572. totem_config->private_key_len = expected_key_len;
  573. if (res != expected_key_len) {
  574. snprintf (error_string_response, sizeof(error_string_response),
  575. "Could only read %d bits of 1024 bits from %s.\n",
  576. res * 8, key_location);
  577. goto parse_error;
  578. }
  579. return 0;
  580. parse_error:
  581. *error_string = error_string_response;
  582. return (-1);
  583. }
  584. int totem_config_keyread (
  585. struct totem_config *totem_config,
  586. const char **error_string)
  587. {
  588. int got_key = 0;
  589. char *key_location = NULL;
  590. int res;
  591. size_t key_len;
  592. memset (totem_config->private_key, 0, 128);
  593. totem_config->private_key_len = 128;
  594. if (totem_config->secauth == 0) {
  595. return (0);
  596. }
  597. /* cmap may store the location of the key file */
  598. if (icmap_get_string("totem.keyfile", &key_location) == CS_OK) {
  599. res = read_keyfile(key_location, totem_config, error_string);
  600. free(key_location);
  601. if (res) {
  602. goto key_error;
  603. }
  604. got_key = 1;
  605. } else { /* Or the key itself may be in the cmap */
  606. if (icmap_get("totem.key", NULL, &key_len, NULL) == CS_OK) {
  607. if (key_len > sizeof (totem_config->private_key)) {
  608. sprintf(error_string_response, "key is too long");
  609. goto key_error;
  610. }
  611. if (icmap_get("totem.key", totem_config->private_key, &key_len, NULL) == CS_OK) {
  612. totem_config->private_key_len = key_len;
  613. got_key = 1;
  614. } else {
  615. sprintf(error_string_response, "can't store private key");
  616. goto key_error;
  617. }
  618. }
  619. }
  620. /* In desperation we read the default filename */
  621. if (!got_key) {
  622. const char *filename = getenv("COROSYNC_TOTEM_AUTHKEY_FILE");
  623. if (!filename)
  624. filename = COROSYSCONFDIR "/authkey";
  625. res = read_keyfile(filename, totem_config, error_string);
  626. if (res)
  627. goto key_error;
  628. }
  629. return (0);
  630. key_error:
  631. *error_string = error_string_response;
  632. return (-1);
  633. }
  634. static void totem_change_notify(
  635. int32_t event,
  636. const char *key_name,
  637. struct icmap_notify_value new_val,
  638. struct icmap_notify_value old_val,
  639. void *user_data)
  640. {
  641. totem_volatile_config_read((struct totem_config *)user_data);
  642. }
  643. static void add_totem_config_notification(struct totem_config *totem_config)
  644. {
  645. icmap_track_t icmap_track;
  646. icmap_track_add("totem.",
  647. ICMAP_TRACK_ADD | ICMAP_TRACK_DELETE | ICMAP_TRACK_MODIFY | ICMAP_TRACK_PREFIX,
  648. totem_change_notify,
  649. totem_config,
  650. &icmap_track);
  651. }