totemconfig.c 57 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899
  1. /*
  2. * Copyright (c) 2002-2005 MontaVista Software, Inc.
  3. * Copyright (c) 2006-2013 Red Hat, Inc.
  4. *
  5. * All rights reserved.
  6. *
  7. * Author: Steven Dake (sdake@redhat.com)
  8. * Jan Friesse (jfriesse@redhat.com)
  9. *
  10. * This software licensed under BSD license, the text of which follows:
  11. *
  12. * Redistribution and use in source and binary forms, with or without
  13. * modification, are permitted provided that the following conditions are met:
  14. *
  15. * - Redistributions of source code must retain the above copyright notice,
  16. * this list of conditions and the following disclaimer.
  17. * - Redistributions in binary form must reproduce the above copyright notice,
  18. * this list of conditions and the following disclaimer in the documentation
  19. * and/or other materials provided with the distribution.
  20. * - Neither the name of the MontaVista Software, Inc. nor the names of its
  21. * contributors may be used to endorse or promote products derived from this
  22. * software without specific prior written permission.
  23. *
  24. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  25. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  26. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  27. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
  28. * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  29. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  30. * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  31. * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  32. * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  33. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
  34. * THE POSSIBILITY OF SUCH DAMAGE.
  35. */
  36. #include <config.h>
  37. #include <stdio.h>
  38. #include <string.h>
  39. #include <stdlib.h>
  40. #include <errno.h>
  41. #include <unistd.h>
  42. #include <sys/socket.h>
  43. #include <sys/types.h>
  44. #include <sys/stat.h>
  45. #include <fcntl.h>
  46. #include <netinet/in.h>
  47. #include <arpa/inet.h>
  48. #include <sys/param.h>
  49. #include <corosync/swab.h>
  50. #include <qb/qblist.h>
  51. #include <qb/qbdefs.h>
  52. #include <libknet.h>
  53. #include <corosync/totem/totem.h>
  54. #include <corosync/config.h>
  55. #include <corosync/logsys.h>
  56. #include <corosync/icmap.h>
  57. #include "util.h"
  58. #include "totemconfig.h"
  59. #define TOKEN_RETRANSMITS_BEFORE_LOSS_CONST 4
  60. #define TOKEN_TIMEOUT 1000
  61. #define TOKEN_COEFFICIENT 650
  62. #define JOIN_TIMEOUT 50
  63. #define MERGE_TIMEOUT 200
  64. #define DOWNCHECK_TIMEOUT 1000
  65. #define FAIL_TO_RECV_CONST 2500
  66. #define SEQNO_UNCHANGED_CONST 30
  67. #define MINIMUM_TIMEOUT (int)(1000/HZ)*3
  68. #define MAX_NETWORK_DELAY 50
  69. #define WINDOW_SIZE 50
  70. #define MAX_MESSAGES 17
  71. #define MISS_COUNT_CONST 5
  72. /* These currently match the defaults in libknet.h */
  73. #define KNET_PING_INTERVAL 1000
  74. #define KNET_PING_TIMEOUT 2000
  75. #define KNET_PING_PRECISION 2048
  76. #define KNET_PONG_COUNT 2
  77. #define KNET_PMTUD_INTERVAL 30
  78. #define KNET_DEFAULT_TRANSPORT KNET_TRANSPORT_UDP
  79. #define DEFAULT_PORT 5405
  80. static char error_string_response[512];
  81. static void add_totem_config_notification(struct totem_config *totem_config);
  82. static void *totem_get_param_by_name(struct totem_config *totem_config, const char *param_name)
  83. {
  84. if (strcmp(param_name, "totem.token") == 0)
  85. return &totem_config->token_timeout;
  86. if (strcmp(param_name, "totem.token_retransmit") == 0)
  87. return &totem_config->token_retransmit_timeout;
  88. if (strcmp(param_name, "totem.hold") == 0)
  89. return &totem_config->token_hold_timeout;
  90. if (strcmp(param_name, "totem.token_retransmits_before_loss_const") == 0)
  91. return &totem_config->token_retransmits_before_loss_const;
  92. if (strcmp(param_name, "totem.join") == 0)
  93. return &totem_config->join_timeout;
  94. if (strcmp(param_name, "totem.send_join") == 0)
  95. return &totem_config->send_join_timeout;
  96. if (strcmp(param_name, "totem.consensus") == 0)
  97. return &totem_config->consensus_timeout;
  98. if (strcmp(param_name, "totem.merge") == 0)
  99. return &totem_config->merge_timeout;
  100. if (strcmp(param_name, "totem.downcheck") == 0)
  101. return &totem_config->downcheck_timeout;
  102. if (strcmp(param_name, "totem.fail_recv_const") == 0)
  103. return &totem_config->fail_to_recv_const;
  104. if (strcmp(param_name, "totem.seqno_unchanged_const") == 0)
  105. return &totem_config->seqno_unchanged_const;
  106. if (strcmp(param_name, "totem.heartbeat_failures_allowed") == 0)
  107. return &totem_config->heartbeat_failures_allowed;
  108. if (strcmp(param_name, "totem.max_network_delay") == 0)
  109. return &totem_config->max_network_delay;
  110. if (strcmp(param_name, "totem.window_size") == 0)
  111. return &totem_config->window_size;
  112. if (strcmp(param_name, "totem.max_messages") == 0)
  113. return &totem_config->max_messages;
  114. if (strcmp(param_name, "totem.miss_count_const") == 0)
  115. return &totem_config->miss_count_const;
  116. if (strcmp(param_name, "totem.knet_pmtud_interval") == 0)
  117. return &totem_config->knet_pmtud_interval;
  118. if (strcmp(param_name, "totem.knet_compression_threshold") == 0)
  119. return &totem_config->knet_compression_threshold;
  120. if (strcmp(param_name, "totem.knet_compression_level") == 0)
  121. return &totem_config->knet_compression_level;
  122. if (strcmp(param_name, "totem.knet_compression_model") == 0)
  123. return &totem_config->knet_compression_model;
  124. return NULL;
  125. }
  126. /*
  127. * Read key_name from icmap. If key is not found or key_name == delete_key or if allow_zero is false
  128. * and readed value is zero, default value is used and stored into totem_config.
  129. */
  130. static void totem_volatile_config_set_uint32_value (struct totem_config *totem_config,
  131. const char *key_name, const char *deleted_key, unsigned int default_value,
  132. int allow_zero_value)
  133. {
  134. char runtime_key_name[ICMAP_KEYNAME_MAXLEN];
  135. if (icmap_get_uint32(key_name, totem_get_param_by_name(totem_config, key_name)) != CS_OK ||
  136. (deleted_key != NULL && strcmp(deleted_key, key_name) == 0) ||
  137. (!allow_zero_value && *(uint32_t *)totem_get_param_by_name(totem_config, key_name) == 0)) {
  138. *(uint32_t *)totem_get_param_by_name(totem_config, key_name) = default_value;
  139. }
  140. /*
  141. * Store totem_config value to cmap runtime section
  142. */
  143. if (strlen("runtime.config.") + strlen(key_name) >= ICMAP_KEYNAME_MAXLEN) {
  144. /*
  145. * This shouldn't happen
  146. */
  147. return ;
  148. }
  149. strcpy(runtime_key_name, "runtime.config.");
  150. strcat(runtime_key_name, key_name);
  151. icmap_set_uint32(runtime_key_name, *(uint32_t *)totem_get_param_by_name(totem_config, key_name));
  152. }
  153. static void totem_volatile_config_set_int32_value (struct totem_config *totem_config,
  154. const char *key_name, const char *deleted_key, int default_value,
  155. int allow_zero_value)
  156. {
  157. char runtime_key_name[ICMAP_KEYNAME_MAXLEN];
  158. if (icmap_get_int32(key_name, totem_get_param_by_name(totem_config, key_name)) != CS_OK ||
  159. (deleted_key != NULL && strcmp(deleted_key, key_name) == 0) ||
  160. (!allow_zero_value && *(int32_t *)totem_get_param_by_name(totem_config, key_name) == 0)) {
  161. *(int32_t *)totem_get_param_by_name(totem_config, key_name) = default_value;
  162. }
  163. /*
  164. * Store totem_config value to cmap runtime section
  165. */
  166. if (strlen("runtime.config.") + strlen(key_name) >= ICMAP_KEYNAME_MAXLEN) {
  167. /*
  168. * This shouldn't happen
  169. */
  170. return ;
  171. }
  172. strcpy(runtime_key_name, "runtime.config.");
  173. strcat(runtime_key_name, key_name);
  174. icmap_set_int32(runtime_key_name, *(int32_t *)totem_get_param_by_name(totem_config, key_name));
  175. }
  176. static void totem_volatile_config_set_string_value (struct totem_config *totem_config,
  177. const char *key_name, const char *deleted_key, const char *default_value)
  178. {
  179. char runtime_key_name[ICMAP_KEYNAME_MAXLEN];
  180. void **config_value;
  181. void *old_config_ptr;
  182. config_value = totem_get_param_by_name(totem_config, key_name);
  183. old_config_ptr = *config_value;
  184. if (icmap_get_string(key_name, totem_get_param_by_name(totem_config, key_name)) != CS_OK ||
  185. (deleted_key != NULL && strcmp(deleted_key, key_name) == 0)) {
  186. /* Need to strdup() here so that the free() below works for a default and a configured value */
  187. *config_value = strdup(default_value);
  188. }
  189. free(old_config_ptr);
  190. /*
  191. * Store totem_config value to cmap runtime section
  192. */
  193. if (strlen("runtime.config.") + strlen(key_name) >= ICMAP_KEYNAME_MAXLEN) {
  194. /*
  195. * This shouldn't happen
  196. */
  197. return ;
  198. }
  199. strcpy(runtime_key_name, "runtime.config.");
  200. strcat(runtime_key_name, key_name);
  201. icmap_set_string(runtime_key_name, (char *)*config_value);
  202. }
  203. /*
  204. * Read and validate config values from cmap and store them into totem_config. If key doesn't exists,
  205. * default value is stored. deleted_key is name of key beeing processed by delete operation
  206. * from cmap. It is considered as non existing even if it can be read. Can be NULL.
  207. */
  208. static void totem_volatile_config_read (struct totem_config *totem_config, const char *deleted_key)
  209. {
  210. uint32_t u32;
  211. totem_volatile_config_set_uint32_value(totem_config, "totem.token_retransmits_before_loss_const", deleted_key,
  212. TOKEN_RETRANSMITS_BEFORE_LOSS_CONST, 0);
  213. totem_volatile_config_set_uint32_value(totem_config, "totem.token", deleted_key, TOKEN_TIMEOUT, 0);
  214. if (totem_config->interfaces[0].member_count > 2) {
  215. u32 = TOKEN_COEFFICIENT;
  216. icmap_get_uint32("totem.token_coefficient", &u32);
  217. totem_config->token_timeout += (totem_config->interfaces[0].member_count - 2) * u32;
  218. /*
  219. * Store totem_config value to cmap runtime section
  220. */
  221. icmap_set_uint32("runtime.config.totem.token", totem_config->token_timeout);
  222. }
  223. totem_volatile_config_set_uint32_value(totem_config, "totem.max_network_delay", deleted_key, MAX_NETWORK_DELAY, 0);
  224. totem_volatile_config_set_uint32_value(totem_config, "totem.window_size", deleted_key, WINDOW_SIZE, 0);
  225. totem_volatile_config_set_uint32_value(totem_config, "totem.max_messages", deleted_key, MAX_MESSAGES, 0);
  226. totem_volatile_config_set_uint32_value(totem_config, "totem.miss_count_const", deleted_key, MISS_COUNT_CONST, 0);
  227. totem_volatile_config_set_uint32_value(totem_config, "totem.knet_pmtud_interval", deleted_key, KNET_PMTUD_INTERVAL, 0);
  228. totem_volatile_config_set_uint32_value(totem_config, "totem.token_retransmit", deleted_key,
  229. (int)(totem_config->token_timeout / (totem_config->token_retransmits_before_loss_const + 0.2)), 0);
  230. totem_volatile_config_set_uint32_value(totem_config, "totem.hold", deleted_key,
  231. (int)(totem_config->token_retransmit_timeout * 0.8 - (1000/HZ)), 0);
  232. totem_volatile_config_set_uint32_value(totem_config, "totem.join", deleted_key, JOIN_TIMEOUT, 0);
  233. totem_volatile_config_set_uint32_value(totem_config, "totem.consensus", deleted_key,
  234. (int)(float)(1.2 * totem_config->token_timeout), 0);
  235. totem_volatile_config_set_uint32_value(totem_config, "totem.merge", deleted_key, MERGE_TIMEOUT, 0);
  236. totem_volatile_config_set_uint32_value(totem_config, "totem.downcheck", deleted_key, DOWNCHECK_TIMEOUT, 0);
  237. totem_volatile_config_set_uint32_value(totem_config, "totem.fail_recv_const", deleted_key, FAIL_TO_RECV_CONST, 0);
  238. totem_volatile_config_set_uint32_value(totem_config, "totem.seqno_unchanged_const", deleted_key,
  239. SEQNO_UNCHANGED_CONST, 0);
  240. totem_volatile_config_set_uint32_value(totem_config, "totem.send_join", deleted_key, 0, 1);
  241. totem_volatile_config_set_uint32_value(totem_config, "totem.heartbeat_failures_allowed", deleted_key, 0, 1);
  242. totem_volatile_config_set_uint32_value(totem_config, "totem.knet_compression_threshold", deleted_key, 0, 1);
  243. totem_volatile_config_set_int32_value(totem_config, "totem.knet_compression_level", deleted_key, 0, 1);
  244. totem_volatile_config_set_string_value(totem_config, "totem.knet_compression_model", deleted_key, "none");
  245. }
  246. static int totem_volatile_config_validate (
  247. struct totem_config *totem_config,
  248. const char **error_string)
  249. {
  250. static char local_error_reason[512];
  251. const char *error_reason = local_error_reason;
  252. if (totem_config->max_network_delay < MINIMUM_TIMEOUT) {
  253. snprintf (local_error_reason, sizeof(local_error_reason),
  254. "The max_network_delay parameter (%d ms) may not be less than (%d ms).",
  255. totem_config->max_network_delay, MINIMUM_TIMEOUT);
  256. goto parse_error;
  257. }
  258. if (totem_config->token_timeout < MINIMUM_TIMEOUT) {
  259. snprintf (local_error_reason, sizeof(local_error_reason),
  260. "The token timeout parameter (%d ms) may not be less than (%d ms).",
  261. totem_config->token_timeout, MINIMUM_TIMEOUT);
  262. goto parse_error;
  263. }
  264. if (totem_config->token_retransmit_timeout < MINIMUM_TIMEOUT) {
  265. snprintf (local_error_reason, sizeof(local_error_reason),
  266. "The token retransmit timeout parameter (%d ms) may not be less than (%d ms).",
  267. totem_config->token_retransmit_timeout, MINIMUM_TIMEOUT);
  268. goto parse_error;
  269. }
  270. if (totem_config->token_hold_timeout < MINIMUM_TIMEOUT) {
  271. snprintf (local_error_reason, sizeof(local_error_reason),
  272. "The token hold timeout parameter (%d ms) may not be less than (%d ms).",
  273. totem_config->token_hold_timeout, MINIMUM_TIMEOUT);
  274. goto parse_error;
  275. }
  276. if (totem_config->join_timeout < MINIMUM_TIMEOUT) {
  277. snprintf (local_error_reason, sizeof(local_error_reason),
  278. "The join timeout parameter (%d ms) may not be less than (%d ms).",
  279. totem_config->join_timeout, MINIMUM_TIMEOUT);
  280. goto parse_error;
  281. }
  282. if (totem_config->consensus_timeout < MINIMUM_TIMEOUT) {
  283. snprintf (local_error_reason, sizeof(local_error_reason),
  284. "The consensus timeout parameter (%d ms) may not be less than (%d ms).",
  285. totem_config->consensus_timeout, MINIMUM_TIMEOUT);
  286. goto parse_error;
  287. }
  288. if (totem_config->consensus_timeout < totem_config->join_timeout) {
  289. snprintf (local_error_reason, sizeof(local_error_reason),
  290. "The consensus timeout parameter (%d ms) may not be less than join timeout (%d ms).",
  291. totem_config->consensus_timeout, totem_config->join_timeout);
  292. goto parse_error;
  293. }
  294. if (totem_config->merge_timeout < MINIMUM_TIMEOUT) {
  295. snprintf (local_error_reason, sizeof(local_error_reason),
  296. "The merge timeout parameter (%d ms) may not be less than (%d ms).",
  297. totem_config->merge_timeout, MINIMUM_TIMEOUT);
  298. goto parse_error;
  299. }
  300. if (totem_config->downcheck_timeout < MINIMUM_TIMEOUT) {
  301. snprintf (local_error_reason, sizeof(local_error_reason),
  302. "The downcheck timeout parameter (%d ms) may not be less than (%d ms).",
  303. totem_config->downcheck_timeout, MINIMUM_TIMEOUT);
  304. goto parse_error;
  305. }
  306. return 0;
  307. parse_error:
  308. snprintf (error_string_response, sizeof(error_string_response),
  309. "parse error in config: %s\n", error_reason);
  310. *error_string = error_string_response;
  311. return (-1);
  312. }
  313. static int totem_get_crypto(struct totem_config *totem_config, const char **error_string)
  314. {
  315. char *str;
  316. const char *tmp_cipher;
  317. const char *tmp_hash;
  318. const char *tmp_model;
  319. tmp_hash = "none";
  320. tmp_cipher = "none";
  321. tmp_model = "none";
  322. if (icmap_get_string("totem.crypto_model", &str) == CS_OK) {
  323. if (strcmp(str, "nss") == 0) {
  324. tmp_model = "nss";
  325. }
  326. if (strcmp(str, "openssl") == 0) {
  327. tmp_model = "openssl";
  328. }
  329. free(str);
  330. } else {
  331. tmp_model = "nss";
  332. }
  333. if (icmap_get_string("totem.crypto_cipher", &str) == CS_OK) {
  334. if (strcmp(str, "none") == 0) {
  335. tmp_cipher = "none";
  336. }
  337. if (strcmp(str, "aes256") == 0) {
  338. tmp_cipher = "aes256";
  339. }
  340. if (strcmp(str, "aes192") == 0) {
  341. tmp_cipher = "aes192";
  342. }
  343. if (strcmp(str, "aes128") == 0) {
  344. tmp_cipher = "aes128";
  345. }
  346. if (strcmp(str, "3des") == 0) {
  347. tmp_cipher = "3des";
  348. }
  349. free(str);
  350. }
  351. if (icmap_get_string("totem.crypto_hash", &str) == CS_OK) {
  352. if (strcmp(str, "none") == 0) {
  353. tmp_hash = "none";
  354. }
  355. if (strcmp(str, "md5") == 0) {
  356. tmp_hash = "md5";
  357. }
  358. if (strcmp(str, "sha1") == 0) {
  359. tmp_hash = "sha1";
  360. }
  361. if (strcmp(str, "sha256") == 0) {
  362. tmp_hash = "sha256";
  363. }
  364. if (strcmp(str, "sha384") == 0) {
  365. tmp_hash = "sha384";
  366. }
  367. if (strcmp(str, "sha512") == 0) {
  368. tmp_hash = "sha512";
  369. }
  370. free(str);
  371. }
  372. if ((strcmp(tmp_cipher, "none") != 0) &&
  373. (strcmp(tmp_hash, "none") == 0)) {
  374. *error_string = "crypto_cipher requires crypto_hash with value other than none";
  375. return -1;
  376. }
  377. if (strcmp(tmp_model, "none") == 0) {
  378. *error_string = "crypto_model should be 'nss' or 'openssl'";
  379. return -1;
  380. }
  381. free(totem_config->crypto_cipher_type);
  382. free(totem_config->crypto_hash_type);
  383. free(totem_config->crypto_model);
  384. totem_config->crypto_cipher_type = strdup(tmp_cipher);
  385. totem_config->crypto_hash_type = strdup(tmp_hash);
  386. totem_config->crypto_model = strdup(tmp_model);
  387. return 0;
  388. }
  389. static int totem_config_get_ip_version(struct totem_config *totem_config)
  390. {
  391. int res;
  392. char *str;
  393. res = AF_INET;
  394. if (totem_config->transport_number == TOTEM_TRANSPORT_KNET) {
  395. res = AF_UNSPEC;
  396. } else {
  397. if (icmap_get_string("totem.ip_version", &str) == CS_OK) {
  398. if (strcmp(str, "ipv4") == 0) {
  399. res = AF_INET;
  400. }
  401. if (strcmp(str, "ipv6") == 0) {
  402. res = AF_INET6;
  403. }
  404. free(str);
  405. }
  406. }
  407. return (res);
  408. }
  409. static uint16_t generate_cluster_id (const char *cluster_name)
  410. {
  411. int i;
  412. int value = 0;
  413. for (i = 0; i < strlen(cluster_name); i++) {
  414. value <<= 1;
  415. value += cluster_name[i];
  416. }
  417. return (value & 0xFFFF);
  418. }
  419. static int get_cluster_mcast_addr (
  420. const char *cluster_name,
  421. unsigned int linknumber,
  422. int ip_version,
  423. struct totem_ip_address *res)
  424. {
  425. uint16_t clusterid;
  426. char addr[INET6_ADDRSTRLEN + 1];
  427. int err;
  428. if (cluster_name == NULL) {
  429. return (-1);
  430. }
  431. clusterid = generate_cluster_id(cluster_name) + linknumber;
  432. memset (res, 0, sizeof(*res));
  433. switch (ip_version) {
  434. case AF_INET:
  435. snprintf(addr, sizeof(addr), "239.192.%d.%d", clusterid >> 8, clusterid % 0xFF);
  436. break;
  437. case AF_INET6:
  438. snprintf(addr, sizeof(addr), "ff15::%x", clusterid);
  439. break;
  440. default:
  441. /*
  442. * Unknown family
  443. */
  444. return (-1);
  445. }
  446. err = totemip_parse (res, addr, ip_version);
  447. return (err);
  448. }
  449. static unsigned int generate_nodeid_for_duplicate_test(
  450. struct totem_config *totem_config,
  451. char *addr)
  452. {
  453. unsigned int nodeid;
  454. struct totem_ip_address totemip;
  455. /* AF_INET hard-coded here because auto-generated nodeids
  456. are only for IPv4 */
  457. if (totemip_parse(&totemip, addr, AF_INET) != 0)
  458. return -1;
  459. memcpy (&nodeid, &totemip.addr, sizeof (unsigned int));
  460. #if __BYTE_ORDER == __LITTLE_ENDIAN
  461. nodeid = swab32 (nodeid);
  462. #endif
  463. if (totem_config->clear_node_high_bit) {
  464. nodeid &= 0x7FFFFFFF;
  465. }
  466. return nodeid;
  467. }
  468. static int check_for_duplicate_nodeids(
  469. struct totem_config *totem_config,
  470. const char **error_string)
  471. {
  472. icmap_iter_t iter;
  473. icmap_iter_t subiter;
  474. const char *iter_key;
  475. int res = 0;
  476. int retval = 0;
  477. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  478. char *ring0_addr=NULL;
  479. char *ring0_addr1=NULL;
  480. unsigned int node_pos;
  481. unsigned int node_pos1;
  482. unsigned int nodeid;
  483. unsigned int nodeid1;
  484. int autogenerated;
  485. iter = icmap_iter_init("nodelist.node.");
  486. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  487. res = sscanf(iter_key, "nodelist.node.%u.%s", &node_pos, tmp_key);
  488. if (res != 2) {
  489. continue;
  490. }
  491. if (strcmp(tmp_key, "ring0_addr") != 0) {
  492. continue;
  493. }
  494. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.nodeid", node_pos);
  495. autogenerated = 0;
  496. if (icmap_get_uint32(tmp_key, &nodeid) != CS_OK) {
  497. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.ring0_addr", node_pos);
  498. if (icmap_get_string(tmp_key, &ring0_addr) != CS_OK) {
  499. continue;
  500. }
  501. /* Generate nodeid so we can check that auto-generated nodeids don't clash either */
  502. nodeid = generate_nodeid_for_duplicate_test(totem_config, ring0_addr);
  503. if (nodeid == -1) {
  504. continue;
  505. }
  506. autogenerated = 1;
  507. }
  508. node_pos1 = 0;
  509. subiter = icmap_iter_init("nodelist.node.");
  510. while (((iter_key = icmap_iter_next(subiter, NULL, NULL)) != NULL) && (node_pos1 < node_pos)) {
  511. res = sscanf(iter_key, "nodelist.node.%u.%s", &node_pos1, tmp_key);
  512. if ((res != 2) || (node_pos1 >= node_pos)) {
  513. continue;
  514. }
  515. if (strcmp(tmp_key, "ring0_addr") != 0) {
  516. continue;
  517. }
  518. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.nodeid", node_pos1);
  519. if (icmap_get_uint32(tmp_key, &nodeid1) != CS_OK) {
  520. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.ring0_addr", node_pos1);
  521. if (icmap_get_string(tmp_key, &ring0_addr1) != CS_OK) {
  522. continue;
  523. }
  524. nodeid1 = generate_nodeid_for_duplicate_test(totem_config, ring0_addr1);
  525. if (nodeid1 == -1) {
  526. continue;
  527. }
  528. }
  529. if (nodeid == nodeid1) {
  530. retval = -1;
  531. snprintf (error_string_response, sizeof(error_string_response),
  532. "Nodeid %u%s%s%s appears twice in corosync.conf", nodeid,
  533. autogenerated?"(autogenerated from ":"",
  534. autogenerated?ring0_addr:"",
  535. autogenerated?")":"");
  536. log_printf (LOGSYS_LEVEL_ERROR, error_string_response);
  537. *error_string = error_string_response;
  538. break;
  539. }
  540. }
  541. icmap_iter_finalize(subiter);
  542. }
  543. icmap_iter_finalize(iter);
  544. return retval;
  545. }
  546. static int find_local_node_in_nodelist(struct totem_config *totem_config)
  547. {
  548. icmap_iter_t iter;
  549. const char *iter_key;
  550. int res = 0;
  551. unsigned int node_pos;
  552. int local_node_pos = -1;
  553. struct totem_ip_address bind_addr;
  554. int interface_up, interface_num;
  555. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  556. char *node_addr_str;
  557. struct totem_ip_address node_addr;
  558. res = totemip_iface_check(&totem_config->interfaces[0].bindnet,
  559. &bind_addr, &interface_up, &interface_num,
  560. totem_config->clear_node_high_bit);
  561. if (res == -1) {
  562. return (-1);
  563. }
  564. iter = icmap_iter_init("nodelist.node.");
  565. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  566. res = sscanf(iter_key, "nodelist.node.%u.%s", &node_pos, tmp_key);
  567. if (res != 2) {
  568. continue;
  569. }
  570. if (strcmp(tmp_key, "ring0_addr") != 0) {
  571. continue;
  572. }
  573. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.ring0_addr", node_pos);
  574. if (icmap_get_string(tmp_key, &node_addr_str) != CS_OK) {
  575. continue;
  576. }
  577. res = totemip_parse (&node_addr, node_addr_str, totem_config->ip_version);
  578. free(node_addr_str);
  579. if (res == -1) {
  580. continue ;
  581. }
  582. if (totemip_equal(&bind_addr, &node_addr)) {
  583. local_node_pos = node_pos;
  584. }
  585. }
  586. icmap_iter_finalize(iter);
  587. return (local_node_pos);
  588. }
  589. /*
  590. * Compute difference between two set of totem interface arrays. set1 and set2
  591. * are changed so for same ring, ip existing in both set1 and set2 are cleared
  592. * (set to 0), and ips which are only in set1 or set2 remains untouched.
  593. * totempg_node_add/remove is called.
  594. */
  595. static void compute_interfaces_diff(struct totem_interface *set1,
  596. struct totem_interface *set2)
  597. {
  598. int ring_no, set1_pos, set2_pos;
  599. struct totem_ip_address empty_ip_address;
  600. memset(&empty_ip_address, 0, sizeof(empty_ip_address));
  601. for (ring_no = 0; ring_no < INTERFACE_MAX; ring_no++) {
  602. if (!set1[ring_no].configured && !set2[ring_no].configured) {
  603. continue;
  604. }
  605. for (set1_pos = 0; set1_pos < set1[ring_no].member_count; set1_pos++) {
  606. for (set2_pos = 0; set2_pos < set2[ring_no].member_count; set2_pos++) {
  607. /*
  608. * For current ring_no remove all set1 items existing
  609. * in set2
  610. */
  611. if (memcmp(&set1[ring_no].member_list[set1_pos],
  612. &set2[ring_no].member_list[set2_pos],
  613. sizeof(struct totem_ip_address)) == 0) {
  614. memset(&set1[ring_no].member_list[set1_pos], 0,
  615. sizeof(struct totem_ip_address));
  616. memset(&set2[ring_no].member_list[set2_pos], 0,
  617. sizeof(struct totem_ip_address));
  618. }
  619. }
  620. }
  621. }
  622. for (ring_no = 0; ring_no < INTERFACE_MAX; ring_no++) {
  623. for (set1_pos = 0; set1_pos < set1[ring_no].member_count; set1_pos++) {
  624. /*
  625. * All items which remained in set1 doesn't exists in set2 any longer so
  626. * node has to be removed.
  627. */
  628. if (memcmp(&set1[ring_no].member_list[set1_pos], &empty_ip_address, sizeof(empty_ip_address)) != 0) {
  629. log_printf(LOGSYS_LEVEL_DEBUG,
  630. "removing dynamic member %s for ring %u",
  631. totemip_print(&set1[ring_no].member_list[set1_pos]),
  632. ring_no);
  633. totempg_member_remove(&set1[ring_no].member_list[set1_pos], ring_no);
  634. }
  635. }
  636. if (!set2[ring_no].configured) {
  637. continue;
  638. }
  639. for (set2_pos = 0; set2_pos < set2[ring_no].member_count; set2_pos++) {
  640. /*
  641. * All items which remained in set2 doesn't existed in set1 so this is no node
  642. * and has to be added.
  643. */
  644. if (memcmp(&set2[ring_no].member_list[set2_pos], &empty_ip_address, sizeof(empty_ip_address)) != 0) {
  645. log_printf(LOGSYS_LEVEL_DEBUG,
  646. "adding dynamic member %s for ring %u",
  647. totemip_print(&set2[ring_no].member_list[set2_pos]),
  648. ring_no);
  649. totempg_member_add(&set2[ring_no].member_list[set2_pos], ring_no);
  650. }
  651. }
  652. }
  653. }
  654. /*
  655. * Reconfigure links in totempg. Sets new local IP address and adds params for new links.
  656. */
  657. static void reconfigure_links(struct totem_config *totem_config)
  658. {
  659. int i;
  660. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  661. char *addr_string;
  662. struct totem_ip_address local_ip;
  663. int err;
  664. unsigned int local_node_pos = find_local_node_in_nodelist(totem_config);
  665. for (i = 0; i<INTERFACE_MAX; i++) {
  666. if (!totem_config->interfaces[i].configured) {
  667. continue;
  668. }
  669. log_printf(LOGSYS_LEVEL_INFO, "Configuring link %d\n", i);
  670. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.ring%u_addr", local_node_pos, i);
  671. if (icmap_get_string(tmp_key, &addr_string) != CS_OK) {
  672. continue;
  673. }
  674. err = totemip_parse(&local_ip, addr_string, AF_UNSPEC);
  675. if (err != 0) {
  676. continue;
  677. }
  678. local_ip.nodeid = totem_config->node_id;
  679. /* In case this is a new link, fill in the defaults if there was no interface{} section for it */
  680. if (!totem_config->interfaces[i].knet_link_priority)
  681. totem_config->interfaces[i].knet_link_priority = 1;
  682. if (!totem_config->interfaces[i].knet_ping_interval)
  683. totem_config->interfaces[i].knet_ping_interval = KNET_PING_INTERVAL;
  684. if (!totem_config->interfaces[i].knet_ping_timeout)
  685. totem_config->interfaces[i].knet_ping_timeout = KNET_PING_TIMEOUT;
  686. if (!totem_config->interfaces[i].knet_ping_precision)
  687. totem_config->interfaces[i].knet_ping_precision = KNET_PING_PRECISION;
  688. if (!totem_config->interfaces[i].knet_pong_count)
  689. totem_config->interfaces[i].knet_pong_count = KNET_PONG_COUNT;
  690. if (!totem_config->interfaces[i].knet_transport)
  691. totem_config->interfaces[i].knet_transport = KNET_TRANSPORT_UDP;
  692. if (!totem_config->interfaces[i].ip_port)
  693. totem_config->interfaces[i].ip_port = DEFAULT_PORT;
  694. totempg_iface_set(&local_ip, totem_config->interfaces[i].ip_port, i);
  695. }
  696. }
  697. static void put_nodelist_members_to_config(struct totem_config *totem_config, int reload)
  698. {
  699. icmap_iter_t iter, iter2;
  700. const char *iter_key, *iter_key2;
  701. int res = 0;
  702. unsigned int node_pos;
  703. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  704. char tmp_key2[ICMAP_KEYNAME_MAXLEN];
  705. char *node_addr_str;
  706. int member_count;
  707. unsigned int linknumber = 0;
  708. int i, j;
  709. struct totem_interface *new_interfaces = NULL;
  710. if (reload) {
  711. /*
  712. * We need to compute diff only for reload. Also for initial configuration
  713. * not all totem structures are initialized so corosync will crash during
  714. * member_add/remove
  715. */
  716. new_interfaces = malloc (sizeof (struct totem_interface) * INTERFACE_MAX);
  717. assert(new_interfaces != NULL);
  718. }
  719. /* Clear out nodelist so we can put the new one in if needed */
  720. for (i = 0; i < INTERFACE_MAX; i++) {
  721. for (j = 0; j < PROCESSOR_COUNT_MAX; j++) {
  722. memset(&totem_config->interfaces[i].member_list[j], 0, sizeof(struct totem_ip_address));
  723. }
  724. totem_config->interfaces[i].member_count = 0;
  725. }
  726. iter = icmap_iter_init("nodelist.node.");
  727. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  728. res = sscanf(iter_key, "nodelist.node.%u.%s", &node_pos, tmp_key);
  729. if (res != 2) {
  730. continue;
  731. }
  732. if (strcmp(tmp_key, "ring0_addr") != 0) {
  733. continue;
  734. }
  735. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.", node_pos);
  736. iter2 = icmap_iter_init(tmp_key);
  737. while ((iter_key2 = icmap_iter_next(iter2, NULL, NULL)) != NULL) {
  738. unsigned int nodeid;
  739. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.nodeid", node_pos);
  740. if (icmap_get_uint32(tmp_key, &nodeid) != CS_OK) {
  741. }
  742. res = sscanf(iter_key2, "nodelist.node.%u.ring%u%s", &node_pos, &linknumber, tmp_key2);
  743. if (res != 3 || strcmp(tmp_key2, "_addr") != 0) {
  744. continue;
  745. }
  746. if (icmap_get_string(iter_key2, &node_addr_str) != CS_OK) {
  747. continue;
  748. }
  749. member_count = totem_config->interfaces[linknumber].member_count;
  750. res = totemip_parse(&totem_config->interfaces[linknumber].member_list[member_count],
  751. node_addr_str, totem_config->ip_version);
  752. if (res != -1) {
  753. totem_config->interfaces[linknumber].member_list[member_count].nodeid = nodeid;
  754. totem_config->interfaces[linknumber].member_count++;
  755. }
  756. totem_config->interfaces[linknumber].configured = 1;
  757. free(node_addr_str);
  758. }
  759. icmap_iter_finalize(iter2);
  760. }
  761. icmap_iter_finalize(iter);
  762. if (reload) {
  763. log_printf(LOGSYS_LEVEL_DEBUG, "About to reconfigure links from nodelist.\n");
  764. reconfigure_links(totem_config);
  765. memcpy(new_interfaces, totem_config->interfaces, sizeof (struct totem_interface) * INTERFACE_MAX);
  766. compute_interfaces_diff(totem_config->orig_interfaces, new_interfaces);
  767. free(new_interfaces);
  768. }
  769. }
  770. static void nodelist_dynamic_notify(
  771. int32_t event,
  772. const char *key_name,
  773. struct icmap_notify_value new_val,
  774. struct icmap_notify_value old_val,
  775. void *user_data)
  776. {
  777. int res;
  778. unsigned int ring_no;
  779. unsigned int member_no;
  780. char tmp_str[ICMAP_KEYNAME_MAXLEN];
  781. uint8_t reloading;
  782. struct totem_config *totem_config = (struct totem_config *)user_data;
  783. /*
  784. * If a full reload is in progress then don't do anything until it's done and
  785. * can reconfigure it all atomically
  786. */
  787. if (icmap_get_uint8("config.totemconfig_reload_in_progress", &reloading) == CS_OK && reloading) {
  788. return ;
  789. }
  790. res = sscanf(key_name, "nodelist.node.%u.ring%u%s", &member_no, &ring_no, tmp_str);
  791. if (res != 3)
  792. return ;
  793. if (strcmp(tmp_str, "_addr") != 0) {
  794. return;
  795. }
  796. put_nodelist_members_to_config(totem_config, 1);
  797. }
  798. /*
  799. * Tries to find node (node_pos) in config nodelist which address matches any
  800. * local interface. Address can be stored in ring0_addr or if ipaddr_key_prefix is not NULL
  801. * key with prefix ipaddr_key is used (there can be multiuple of them)
  802. * This function differs * from find_local_node_in_nodelist because it doesn't need bindnetaddr,
  803. * but doesn't work when bind addr is network address (so IP must be exact
  804. * match).
  805. *
  806. * Returns 1 on success (address was found, node_pos is then correctly set) or 0 on failure.
  807. */
  808. int totem_config_find_local_addr_in_nodelist(struct totem_config *totem_config, const char *ipaddr_key_prefix, unsigned int *node_pos)
  809. {
  810. struct qb_list_head addrs;
  811. struct totem_ip_if_address *if_addr;
  812. icmap_iter_t iter, iter2;
  813. const char *iter_key, *iter_key2;
  814. struct qb_list_head *list;
  815. const char *ipaddr_key;
  816. int ip_version;
  817. struct totem_ip_address node_addr;
  818. char *node_addr_str;
  819. int node_found = 0;
  820. int res = 0;
  821. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  822. if (totemip_getifaddrs(&addrs) == -1) {
  823. return 0;
  824. }
  825. ip_version = totem_config_get_ip_version(totem_config);
  826. iter = icmap_iter_init("nodelist.node.");
  827. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  828. res = sscanf(iter_key, "nodelist.node.%u.%s", node_pos, tmp_key);
  829. if (res != 2) {
  830. continue;
  831. }
  832. if (strcmp(tmp_key, "ring0_addr") != 0) {
  833. continue;
  834. }
  835. if (icmap_get_string(iter_key, &node_addr_str) != CS_OK) {
  836. continue ;
  837. }
  838. free(node_addr_str);
  839. /*
  840. * ring0_addr found -> let's iterate thru ipaddr_key_prefix
  841. */
  842. snprintf(tmp_key, sizeof(tmp_key), "nodelist.node.%u.%s", *node_pos,
  843. (ipaddr_key_prefix != NULL ? ipaddr_key_prefix : "ring0_addr"));
  844. iter2 = icmap_iter_init(tmp_key);
  845. while ((iter_key2 = icmap_iter_next(iter2, NULL, NULL)) != NULL) {
  846. /*
  847. * ring0_addr must be exact match, not prefix
  848. */
  849. ipaddr_key = (ipaddr_key_prefix != NULL ? iter_key2 : tmp_key);
  850. if (icmap_get_string(ipaddr_key, &node_addr_str) != CS_OK) {
  851. continue ;
  852. }
  853. if (totemip_parse(&node_addr, node_addr_str, ip_version) == -1) {
  854. free(node_addr_str);
  855. continue ;
  856. }
  857. free(node_addr_str);
  858. /*
  859. * Try to match ip with if_addrs
  860. */
  861. node_found = 0;
  862. qb_list_for_each(list, &(addrs)) {
  863. if_addr = qb_list_entry(list, struct totem_ip_if_address, list);
  864. if (totemip_equal(&node_addr, &if_addr->ip_addr)) {
  865. node_found = 1;
  866. break;
  867. }
  868. }
  869. if (node_found) {
  870. break ;
  871. }
  872. }
  873. icmap_iter_finalize(iter2);
  874. if (node_found) {
  875. break ;
  876. }
  877. }
  878. icmap_iter_finalize(iter);
  879. totemip_freeifaddrs(&addrs);
  880. return (node_found);
  881. }
  882. static void config_convert_nodelist_to_interface(struct totem_config *totem_config)
  883. {
  884. int res = 0;
  885. unsigned int node_pos;
  886. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  887. char tmp_key2[ICMAP_KEYNAME_MAXLEN];
  888. char *node_addr_str;
  889. unsigned int linknumber = 0;
  890. icmap_iter_t iter;
  891. const char *iter_key;
  892. if (totem_config_find_local_addr_in_nodelist(totem_config, NULL, &node_pos)) {
  893. /*
  894. * We found node, so create interface section
  895. */
  896. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.", node_pos);
  897. iter = icmap_iter_init(tmp_key);
  898. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  899. res = sscanf(iter_key, "nodelist.node.%u.ring%u%s", &node_pos, &linknumber, tmp_key2);
  900. if (res != 3 || strcmp(tmp_key2, "_addr") != 0) {
  901. continue ;
  902. }
  903. if (icmap_get_string(iter_key, &node_addr_str) != CS_OK) {
  904. continue;
  905. }
  906. snprintf(tmp_key2, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.bindnetaddr", linknumber);
  907. icmap_set_string(tmp_key2, node_addr_str);
  908. free(node_addr_str);
  909. }
  910. icmap_iter_finalize(iter);
  911. }
  912. }
  913. static int get_interface_params(struct totem_config *totem_config,
  914. const char **error_string, uint64_t *warnings,
  915. int reload)
  916. {
  917. int res = 0;
  918. unsigned int linknumber = 0;
  919. int member_count = 0;
  920. int i;
  921. icmap_iter_t iter, member_iter;
  922. const char *iter_key;
  923. const char *member_iter_key;
  924. char linknumber_key[ICMAP_KEYNAME_MAXLEN];
  925. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  926. uint8_t u8;
  927. uint32_t u32;
  928. char *str;
  929. char *cluster_name = NULL;
  930. if (reload) {
  931. for (i=0; i<INTERFACE_MAX; i++) {
  932. totem_config->interfaces[i].configured = 0;
  933. }
  934. }
  935. if (icmap_get_string("totem.cluster_name", &cluster_name) != CS_OK) {
  936. cluster_name = NULL;
  937. }
  938. iter = icmap_iter_init("totem.interface.");
  939. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  940. res = sscanf(iter_key, "totem.interface.%[^.].%s", linknumber_key, tmp_key);
  941. if (res != 2) {
  942. continue;
  943. }
  944. if (strcmp(tmp_key, "bindnetaddr") != 0 && totem_config->transport_number == TOTEM_TRANSPORT_UDP) {
  945. continue;
  946. }
  947. member_count = 0;
  948. linknumber = atoi(linknumber_key);
  949. if (linknumber >= INTERFACE_MAX) {
  950. free(cluster_name);
  951. snprintf (error_string_response, sizeof(error_string_response),
  952. "parse error in config: interface ring number %u is bigger than allowed maximum %u\n",
  953. linknumber, INTERFACE_MAX - 1);
  954. *error_string = error_string_response;
  955. return -1;
  956. }
  957. /* These things are only valid for the initial read */
  958. if (!reload) {
  959. /*
  960. * Get the bind net address
  961. */
  962. if (icmap_get_string(iter_key, &str) == CS_OK) {
  963. res = totemip_parse (&totem_config->interfaces[linknumber].bindnet, str,
  964. totem_config->ip_version);
  965. free(str);
  966. }
  967. /*
  968. * Get interface multicast address
  969. */
  970. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastaddr", linknumber);
  971. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  972. res = totemip_parse (&totem_config->interfaces[linknumber].mcast_addr, str, totem_config->ip_version);
  973. free(str);
  974. } else {
  975. /*
  976. * User not specified address -> autogenerate one from cluster_name key
  977. * (if available). Return code is intentionally ignored, because
  978. * udpu doesn't need mcastaddr and validity of mcastaddr for udp is
  979. * checked later anyway.
  980. */
  981. (void)get_cluster_mcast_addr (cluster_name,
  982. linknumber,
  983. totem_config->ip_version,
  984. &totem_config->interfaces[linknumber].mcast_addr);
  985. }
  986. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.broadcast", linknumber);
  987. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  988. if (strcmp (str, "yes") == 0) {
  989. totem_config->broadcast_use = 1;
  990. }
  991. free(str);
  992. }
  993. }
  994. /* These things are only valid for the initial read OR a newly-defined link */
  995. if (!reload || (totem_config->interfaces[linknumber].configured == 0)) {
  996. /*
  997. * Get mcast port
  998. */
  999. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastport", linknumber);
  1000. if (icmap_get_uint16(tmp_key, &totem_config->interfaces[linknumber].ip_port) != CS_OK) {
  1001. if (totem_config->broadcast_use) {
  1002. totem_config->interfaces[linknumber].ip_port = DEFAULT_PORT + (2 * linknumber);
  1003. } else {
  1004. totem_config->interfaces[linknumber].ip_port = DEFAULT_PORT;
  1005. }
  1006. }
  1007. /*
  1008. * Get the TTL
  1009. */
  1010. totem_config->interfaces[linknumber].ttl = 1;
  1011. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.ttl", linknumber);
  1012. if (icmap_get_uint8(tmp_key, &u8) == CS_OK) {
  1013. totem_config->interfaces[linknumber].ttl = u8;
  1014. }
  1015. totem_config->interfaces[linknumber].knet_transport = KNET_DEFAULT_TRANSPORT;
  1016. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.knet_transport", linknumber);
  1017. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  1018. if (strcmp(str, "sctp") == 0) {
  1019. totem_config->interfaces[linknumber].knet_transport = KNET_TRANSPORT_SCTP;
  1020. }
  1021. else if (strcmp(str, "udp") == 0) {
  1022. totem_config->interfaces[linknumber].knet_transport = KNET_TRANSPORT_UDP;
  1023. }
  1024. else {
  1025. *error_string = "Unrecognised knet_transport. expected 'udp' or 'sctp'";
  1026. return -1;
  1027. }
  1028. }
  1029. }
  1030. totem_config->interfaces[linknumber].configured = 1;
  1031. /*
  1032. * Get the knet link params
  1033. */
  1034. totem_config->interfaces[linknumber].knet_link_priority = 1;
  1035. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.knet_link_priority", linknumber);
  1036. if (icmap_get_uint8(tmp_key, &u8) == CS_OK) {
  1037. totem_config->interfaces[linknumber].knet_link_priority = u8;
  1038. }
  1039. totem_config->interfaces[linknumber].knet_ping_interval = KNET_PING_INTERVAL;
  1040. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.knet_ping_interval", linknumber);
  1041. if (icmap_get_uint32(tmp_key, &u32) == CS_OK) {
  1042. totem_config->interfaces[linknumber].knet_ping_interval = u32;
  1043. }
  1044. totem_config->interfaces[linknumber].knet_ping_timeout = KNET_PING_TIMEOUT;
  1045. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.knet_ping_timeout", linknumber);
  1046. if (icmap_get_uint32(tmp_key, &u32) == CS_OK) {
  1047. totem_config->interfaces[linknumber].knet_ping_timeout = u32;
  1048. }
  1049. totem_config->interfaces[linknumber].knet_ping_precision = KNET_PING_PRECISION;
  1050. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.knet_ping_precision", linknumber);
  1051. if (icmap_get_uint32(tmp_key, &u32) == CS_OK) {
  1052. totem_config->interfaces[linknumber].knet_ping_precision = u32;
  1053. }
  1054. totem_config->interfaces[linknumber].knet_pong_count = KNET_PONG_COUNT;
  1055. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.knet_pong_count", linknumber);
  1056. if (icmap_get_uint32(tmp_key, &u32) == CS_OK) {
  1057. totem_config->interfaces[linknumber].knet_pong_count = u32;
  1058. }
  1059. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.member.", linknumber);
  1060. member_iter = icmap_iter_init(tmp_key);
  1061. while ((member_iter_key = icmap_iter_next(member_iter, NULL, NULL)) != NULL) {
  1062. if (member_count == 0) {
  1063. if (icmap_get_string("nodelist.node.0.ring0_addr", &str) == CS_OK) {
  1064. free(str);
  1065. *warnings |= TOTEM_CONFIG_WARNING_MEMBERS_IGNORED;
  1066. break;
  1067. } else {
  1068. *warnings |= TOTEM_CONFIG_WARNING_MEMBERS_DEPRECATED;
  1069. }
  1070. }
  1071. if (icmap_get_string(member_iter_key, &str) == CS_OK) {
  1072. res = totemip_parse (&totem_config->interfaces[linknumber].member_list[member_count++],
  1073. str, totem_config->ip_version);
  1074. }
  1075. }
  1076. icmap_iter_finalize(member_iter);
  1077. totem_config->interfaces[linknumber].member_count = member_count;
  1078. }
  1079. icmap_iter_finalize(iter);
  1080. return 0;
  1081. }
  1082. extern int totem_config_read (
  1083. struct totem_config *totem_config,
  1084. const char **error_string,
  1085. uint64_t *warnings)
  1086. {
  1087. int res = 0;
  1088. char *str, *ring0_addr_str;
  1089. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  1090. uint16_t u16;
  1091. int i;
  1092. int local_node_pos;
  1093. int nodeid_set;
  1094. *warnings = 0;
  1095. memset (totem_config, 0, sizeof (struct totem_config));
  1096. totem_config->interfaces = malloc (sizeof (struct totem_interface) * INTERFACE_MAX);
  1097. if (totem_config->interfaces == 0) {
  1098. *error_string = "Out of memory trying to allocate ethernet interface storage area";
  1099. return -1;
  1100. }
  1101. totem_config->transport_number = TOTEM_TRANSPORT_KNET;
  1102. if (icmap_get_string("totem.transport", &str) == CS_OK) {
  1103. if (strcmp (str, "udpu") == 0) {
  1104. totem_config->transport_number = TOTEM_TRANSPORT_UDPU;
  1105. }
  1106. if (strcmp (str, "udp") == 0) {
  1107. totem_config->transport_number = TOTEM_TRANSPORT_UDP;
  1108. }
  1109. if (strcmp (str, "knet") == 0) {
  1110. totem_config->transport_number = TOTEM_TRANSPORT_KNET;
  1111. }
  1112. free(str);
  1113. }
  1114. memset (totem_config->interfaces, 0,
  1115. sizeof (struct totem_interface) * INTERFACE_MAX);
  1116. strcpy (totem_config->link_mode, "passive");
  1117. icmap_get_uint32("totem.version", (uint32_t *)&totem_config->version);
  1118. if (totem_get_crypto(totem_config, error_string) != 0) {
  1119. return -1;
  1120. }
  1121. if (icmap_get_string("totem.link_mode", &str) == CS_OK) {
  1122. if (strlen(str) >= TOTEM_LINK_MODE_BYTES) {
  1123. *error_string = "totem.link_mode is too long";
  1124. free(str);
  1125. return -1;
  1126. }
  1127. strcpy (totem_config->link_mode, str);
  1128. free(str);
  1129. }
  1130. icmap_get_uint32("totem.nodeid", &totem_config->node_id);
  1131. totem_config->clear_node_high_bit = 0;
  1132. if (icmap_get_string("totem.clear_node_high_bit", &str) == CS_OK) {
  1133. if (strcmp (str, "yes") == 0) {
  1134. totem_config->clear_node_high_bit = 1;
  1135. }
  1136. free(str);
  1137. }
  1138. icmap_get_uint32("totem.threads", &totem_config->threads);
  1139. icmap_get_uint32("totem.netmtu", &totem_config->net_mtu);
  1140. totem_config->ip_version = totem_config_get_ip_version(totem_config);
  1141. if (icmap_get_string("totem.interface.0.bindnetaddr", &str) != CS_OK) {
  1142. /*
  1143. * We were not able to find ring 0 bindnet addr. Try to use nodelist informations
  1144. */
  1145. config_convert_nodelist_to_interface(totem_config);
  1146. } else {
  1147. if (icmap_get_string("nodelist.node.0.ring0_addr", &ring0_addr_str) == CS_OK) {
  1148. /*
  1149. * Both bindnetaddr and ring0_addr are set.
  1150. * Log warning information, and use nodelist instead
  1151. */
  1152. *warnings |= TOTEM_CONFIG_BINDNETADDR_NODELIST_SET;
  1153. config_convert_nodelist_to_interface(totem_config);
  1154. free(ring0_addr_str);
  1155. }
  1156. free(str);
  1157. }
  1158. /*
  1159. * Broadcast option is global but set in interface section,
  1160. * so reset before processing interfaces.
  1161. */
  1162. totem_config->broadcast_use = 0;
  1163. res = get_interface_params(totem_config, error_string, warnings, 0);
  1164. if (res < 0) {
  1165. return res;
  1166. }
  1167. /*
  1168. * Use broadcast is global, so if set, make sure to fill mcast addr correctly
  1169. * broadcast is only supported for UDP so just do interface 0;
  1170. */
  1171. if (totem_config->broadcast_use) {
  1172. totemip_parse (&totem_config->interfaces[0].mcast_addr,
  1173. "255.255.255.255", 0);
  1174. }
  1175. /*
  1176. * Store automatically generated items back to icmap only for UDP
  1177. */
  1178. if (totem_config->transport_number == TOTEM_TRANSPORT_UDP) {
  1179. for (i = 0; i < INTERFACE_MAX; i++) {
  1180. if (!totem_config->interfaces[i].configured) {
  1181. continue;
  1182. }
  1183. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastaddr", i);
  1184. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  1185. free(str);
  1186. } else {
  1187. str = (char *)totemip_print(&totem_config->interfaces[i].mcast_addr);
  1188. icmap_set_string(tmp_key, str);
  1189. }
  1190. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastport", i);
  1191. if (icmap_get_uint16(tmp_key, &u16) != CS_OK) {
  1192. icmap_set_uint16(tmp_key, totem_config->interfaces[i].ip_port);
  1193. }
  1194. }
  1195. }
  1196. /*
  1197. * Check existence of nodelist
  1198. */
  1199. if (icmap_get_string("nodelist.node.0.ring0_addr", &str) == CS_OK) {
  1200. free(str);
  1201. /*
  1202. * find local node
  1203. */
  1204. local_node_pos = find_local_node_in_nodelist(totem_config);
  1205. if (local_node_pos != -1) {
  1206. icmap_set_uint32("nodelist.local_node_pos", local_node_pos);
  1207. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.nodeid", local_node_pos);
  1208. nodeid_set = (totem_config->node_id != 0);
  1209. if (icmap_get_uint32(tmp_key, &totem_config->node_id) == CS_OK && nodeid_set) {
  1210. *warnings |= TOTEM_CONFIG_WARNING_TOTEM_NODEID_IGNORED;
  1211. }
  1212. if ((totem_config->transport_number == TOTEM_TRANSPORT_KNET) && (!totem_config->node_id)) {
  1213. *error_string = "With knet, you must specify nodeid for current node";
  1214. return -1;
  1215. }
  1216. /*
  1217. * Make localnode ring0_addr read only, so we can be sure that local
  1218. * node never changes. If rebinding to other IP would be in future
  1219. * supported, this must be changed and handled properly!
  1220. */
  1221. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.ring0_addr", local_node_pos);
  1222. icmap_set_ro_access(tmp_key, 0, 1);
  1223. icmap_set_ro_access("nodelist.local_node_pos", 0, 1);
  1224. }
  1225. put_nodelist_members_to_config(totem_config, 0);
  1226. }
  1227. /*
  1228. * Get things that might change in the future (and can depend on totem_config->interfaces);
  1229. */
  1230. totem_volatile_config_read(totem_config, NULL);
  1231. icmap_set_uint8("config.totemconfig_reload_in_progress", 0);
  1232. add_totem_config_notification(totem_config);
  1233. return 0;
  1234. }
  1235. int totem_config_validate (
  1236. struct totem_config *totem_config,
  1237. const char **error_string)
  1238. {
  1239. static char local_error_reason[512];
  1240. char parse_error[512];
  1241. const char *error_reason = local_error_reason;
  1242. int i,j;
  1243. int num_configured = 0;
  1244. unsigned int interface_max = INTERFACE_MAX;
  1245. for (i = 0; i < INTERFACE_MAX; i++) {
  1246. if (totem_config->interfaces[i].configured) {
  1247. num_configured++;
  1248. }
  1249. }
  1250. if (num_configured == 0) {
  1251. error_reason = "No interfaces defined";
  1252. goto parse_error;
  1253. }
  1254. for (i = 0; i < INTERFACE_MAX; i++) {
  1255. /*
  1256. * Some error checking of parsed data to make sure its valid
  1257. */
  1258. struct totem_ip_address null_addr;
  1259. if (!totem_config->interfaces[i].configured) {
  1260. continue;
  1261. }
  1262. memset (&null_addr, 0, sizeof (struct totem_ip_address));
  1263. if ((totem_config->transport_number == TOTEM_TRANSPORT_UDP) &&
  1264. memcmp (&totem_config->interfaces[i].mcast_addr, &null_addr,
  1265. sizeof (struct totem_ip_address)) == 0) {
  1266. error_reason = "No multicast address specified";
  1267. goto parse_error;
  1268. }
  1269. if (totem_config->interfaces[i].ip_port == 0) {
  1270. error_reason = "No multicast port specified";
  1271. goto parse_error;
  1272. }
  1273. if (totem_config->interfaces[i].ttl > 255) {
  1274. error_reason = "Invalid TTL (should be 0..255)";
  1275. goto parse_error;
  1276. }
  1277. if (totem_config->transport_number != TOTEM_TRANSPORT_UDP &&
  1278. totem_config->interfaces[i].ttl != 1) {
  1279. error_reason = "Can only set ttl on multicast transport types";
  1280. goto parse_error;
  1281. }
  1282. if (totem_config->interfaces[i].knet_link_priority > 255) {
  1283. error_reason = "Invalid link priority (should be 0..255)";
  1284. goto parse_error;
  1285. }
  1286. if (totem_config->transport_number != TOTEM_TRANSPORT_KNET &&
  1287. totem_config->interfaces[i].knet_link_priority != 1) {
  1288. error_reason = "Can only set link priority on knet transport type";
  1289. goto parse_error;
  1290. }
  1291. if (totem_config->interfaces[i].mcast_addr.family == AF_INET6 &&
  1292. totem_config->node_id == 0) {
  1293. error_reason = "An IPV6 network requires that a node ID be specified.";
  1294. goto parse_error;
  1295. }
  1296. if (totem_config->broadcast_use == 0 && totem_config->transport_number == TOTEM_TRANSPORT_UDP) {
  1297. if (totem_config->interfaces[i].mcast_addr.family != totem_config->interfaces[i].bindnet.family) {
  1298. error_reason = "Multicast address family does not match bind address family";
  1299. goto parse_error;
  1300. }
  1301. if (totemip_is_mcast (&totem_config->interfaces[i].mcast_addr) != 0) {
  1302. error_reason = "mcastaddr is not a correct multicast address.";
  1303. goto parse_error;
  1304. }
  1305. }
  1306. /* Verify that all nodes on the same knet link have the same IP family */
  1307. for (j=1; j<totem_config->interfaces[i].member_count; j++) {
  1308. if (totem_config->interfaces[i].configured) {
  1309. if (totem_config->interfaces[i].member_list[j].family !=
  1310. totem_config->interfaces[i].member_list[0].family) {
  1311. snprintf (local_error_reason, sizeof(local_error_reason),
  1312. "Nodes for link %d have different IP families", i);
  1313. goto parse_error;
  1314. }
  1315. }
  1316. }
  1317. }
  1318. if (totem_config->version != 2) {
  1319. error_reason = "This totem parser can only parse version 2 configurations.";
  1320. goto parse_error;
  1321. }
  1322. if (totem_volatile_config_validate(totem_config, error_string) == -1) {
  1323. return (-1);
  1324. }
  1325. if (check_for_duplicate_nodeids(totem_config, error_string) == -1) {
  1326. return (-1);
  1327. }
  1328. /*
  1329. * KNET Link values validation
  1330. */
  1331. if (strcmp (totem_config->link_mode, "active") &&
  1332. strcmp (totem_config->link_mode, "rr") &&
  1333. strcmp (totem_config->link_mode, "passive")) {
  1334. snprintf (local_error_reason, sizeof(local_error_reason),
  1335. "The Knet link mode \"%s\" specified is invalid. It must be active, passive or rr.\n", totem_config->link_mode);
  1336. goto parse_error;
  1337. }
  1338. /* Only Knet does multiple interfaces */
  1339. if (totem_config->transport_number != TOTEM_TRANSPORT_KNET) {
  1340. interface_max = 1;
  1341. }
  1342. if (interface_max < num_configured) {
  1343. snprintf (parse_error, sizeof(parse_error),
  1344. "%d is too many configured interfaces for non-Knet transport.",
  1345. num_configured);
  1346. error_reason = parse_error;
  1347. goto parse_error;
  1348. }
  1349. /* Only knet allows crypto */
  1350. if (totem_config->transport_number != TOTEM_TRANSPORT_KNET) {
  1351. if ((strcmp(totem_config->crypto_cipher_type, "none") != 0) ||
  1352. (strcmp(totem_config->crypto_hash_type, "none") != 0)) {
  1353. snprintf (parse_error, sizeof(parse_error),
  1354. "crypto_cipher & crypto_hash are only valid for the Knet transport.");
  1355. error_reason = parse_error;
  1356. goto parse_error;
  1357. }
  1358. }
  1359. if (totem_config->net_mtu == 0) {
  1360. if (totem_config->transport_number == TOTEM_TRANSPORT_KNET) {
  1361. totem_config->net_mtu = KNET_MAX_PACKET_SIZE;
  1362. }
  1363. else {
  1364. totem_config->net_mtu = 1500;
  1365. }
  1366. }
  1367. return 0;
  1368. parse_error:
  1369. snprintf (error_string_response, sizeof(error_string_response),
  1370. "parse error in config: %s\n", error_reason);
  1371. *error_string = error_string_response;
  1372. return (-1);
  1373. }
  1374. static int read_keyfile (
  1375. const char *key_location,
  1376. struct totem_config *totem_config,
  1377. const char **error_string)
  1378. {
  1379. int fd;
  1380. int res;
  1381. int saved_errno;
  1382. char error_str[100];
  1383. const char *error_ptr;
  1384. fd = open (key_location, O_RDONLY);
  1385. if (fd == -1) {
  1386. error_ptr = qb_strerror_r(errno, error_str, sizeof(error_str));
  1387. snprintf (error_string_response, sizeof(error_string_response),
  1388. "Could not open %s: %s\n",
  1389. key_location, error_ptr);
  1390. goto parse_error;
  1391. }
  1392. res = read (fd, totem_config->private_key, TOTEM_PRIVATE_KEY_LEN_MAX);
  1393. saved_errno = errno;
  1394. close (fd);
  1395. if (res == -1) {
  1396. error_ptr = qb_strerror_r (saved_errno, error_str, sizeof(error_str));
  1397. snprintf (error_string_response, sizeof(error_string_response),
  1398. "Could not read %s: %s\n",
  1399. key_location, error_ptr);
  1400. goto parse_error;
  1401. }
  1402. if (res < TOTEM_PRIVATE_KEY_LEN_MIN) {
  1403. snprintf (error_string_response, sizeof(error_string_response),
  1404. "Could only read %d bits of minimum %u bits from %s.\n",
  1405. res * 8, TOTEM_PRIVATE_KEY_LEN_MIN * 8, key_location);
  1406. goto parse_error;
  1407. }
  1408. totem_config->private_key_len = res;
  1409. return 0;
  1410. parse_error:
  1411. *error_string = error_string_response;
  1412. return (-1);
  1413. }
  1414. int totem_config_keyread (
  1415. struct totem_config *totem_config,
  1416. const char **error_string)
  1417. {
  1418. int got_key = 0;
  1419. char *key_location = NULL;
  1420. int res;
  1421. size_t key_len;
  1422. memset (totem_config->private_key, 0, sizeof(totem_config->private_key));
  1423. totem_config->private_key_len = 0;
  1424. if (strcmp(totem_config->crypto_cipher_type, "none") == 0 &&
  1425. strcmp(totem_config->crypto_hash_type, "none") == 0) {
  1426. return (0);
  1427. }
  1428. /* cmap may store the location of the key file */
  1429. if (icmap_get_string("totem.keyfile", &key_location) == CS_OK) {
  1430. res = read_keyfile(key_location, totem_config, error_string);
  1431. free(key_location);
  1432. if (res) {
  1433. goto key_error;
  1434. }
  1435. got_key = 1;
  1436. } else { /* Or the key itself may be in the cmap */
  1437. if (icmap_get("totem.key", NULL, &key_len, NULL) == CS_OK) {
  1438. if (key_len > sizeof(totem_config->private_key)) {
  1439. sprintf(error_string_response, "key is too long");
  1440. goto key_error;
  1441. }
  1442. if (key_len < TOTEM_PRIVATE_KEY_LEN_MIN) {
  1443. sprintf(error_string_response, "key is too short");
  1444. goto key_error;
  1445. }
  1446. if (icmap_get("totem.key", totem_config->private_key, &key_len, NULL) == CS_OK) {
  1447. totem_config->private_key_len = key_len;
  1448. got_key = 1;
  1449. } else {
  1450. sprintf(error_string_response, "can't load private key");
  1451. goto key_error;
  1452. }
  1453. }
  1454. }
  1455. /* In desperation we read the default filename */
  1456. if (!got_key) {
  1457. const char *filename = getenv("COROSYNC_TOTEM_AUTHKEY_FILE");
  1458. if (!filename)
  1459. filename = COROSYSCONFDIR "/authkey";
  1460. res = read_keyfile(filename, totem_config, error_string);
  1461. if (res)
  1462. goto key_error;
  1463. }
  1464. return (0);
  1465. key_error:
  1466. *error_string = error_string_response;
  1467. return (-1);
  1468. }
  1469. static void debug_dump_totem_config(const struct totem_config *totem_config)
  1470. {
  1471. log_printf(LOGSYS_LEVEL_DEBUG, "Token Timeout (%d ms) retransmit timeout (%d ms)",
  1472. totem_config->token_timeout, totem_config->token_retransmit_timeout);
  1473. log_printf(LOGSYS_LEVEL_DEBUG, "token hold (%d ms) retransmits before loss (%d retrans)",
  1474. totem_config->token_hold_timeout, totem_config->token_retransmits_before_loss_const);
  1475. log_printf(LOGSYS_LEVEL_DEBUG, "join (%d ms) send_join (%d ms) consensus (%d ms) merge (%d ms)",
  1476. totem_config->join_timeout, totem_config->send_join_timeout, totem_config->consensus_timeout,
  1477. totem_config->merge_timeout);
  1478. log_printf(LOGSYS_LEVEL_DEBUG, "downcheck (%d ms) fail to recv const (%d msgs)",
  1479. totem_config->downcheck_timeout, totem_config->fail_to_recv_const);
  1480. log_printf(LOGSYS_LEVEL_DEBUG,
  1481. "seqno unchanged const (%d rotations) Maximum network MTU %d",
  1482. totem_config->seqno_unchanged_const, totem_config->net_mtu);
  1483. log_printf(LOGSYS_LEVEL_DEBUG,
  1484. "window size per rotation (%d messages) maximum messages per rotation (%d messages)",
  1485. totem_config->window_size, totem_config->max_messages);
  1486. log_printf(LOGSYS_LEVEL_DEBUG, "missed count const (%d messages)", totem_config->miss_count_const);
  1487. log_printf(LOGSYS_LEVEL_DEBUG, "heartbeat_failures_allowed (%d)",
  1488. totem_config->heartbeat_failures_allowed);
  1489. log_printf(LOGSYS_LEVEL_DEBUG, "max_network_delay (%d ms)", totem_config->max_network_delay);
  1490. }
  1491. static void totem_change_notify(
  1492. int32_t event,
  1493. const char *key_name,
  1494. struct icmap_notify_value new_val,
  1495. struct icmap_notify_value old_val,
  1496. void *user_data)
  1497. {
  1498. struct totem_config *totem_config = (struct totem_config *)user_data;
  1499. uint32_t *param;
  1500. uint8_t reloading;
  1501. const char *deleted_key = NULL;
  1502. const char *error_string;
  1503. /*
  1504. * If a full reload is in progress then don't do anything until it's done and
  1505. * can reconfigure it all atomically
  1506. */
  1507. if (icmap_get_uint8("config.reload_in_progress", &reloading) == CS_OK && reloading)
  1508. return;
  1509. param = totem_get_param_by_name((struct totem_config *)user_data, key_name);
  1510. /*
  1511. * Process change only if changed key is found in totem_config (-> param is not NULL)
  1512. * or for special key token_coefficient. token_coefficient key is not stored in
  1513. * totem_config, but it is used for computation of token timeout.
  1514. */
  1515. if (!param && strcmp(key_name, "totem.token_coefficient") != 0)
  1516. return;
  1517. /*
  1518. * Values other than UINT32 are not supported, or needed (yet)
  1519. */
  1520. switch (event) {
  1521. case ICMAP_TRACK_DELETE:
  1522. deleted_key = key_name;
  1523. break;
  1524. case ICMAP_TRACK_ADD:
  1525. case ICMAP_TRACK_MODIFY:
  1526. deleted_key = NULL;
  1527. break;
  1528. default:
  1529. break;
  1530. }
  1531. totem_volatile_config_read (totem_config, deleted_key);
  1532. log_printf(LOGSYS_LEVEL_DEBUG, "Totem related config key changed. Dumping actual totem config.");
  1533. debug_dump_totem_config(totem_config);
  1534. if (totem_volatile_config_validate(totem_config, &error_string) == -1) {
  1535. log_printf (LOGSYS_LEVEL_ERROR, "%s", error_string);
  1536. /*
  1537. * TODO: Consider corosync exit and/or load defaults for volatile
  1538. * values. For now, log error seems to be enough
  1539. */
  1540. }
  1541. }
  1542. static void totem_reload_notify(
  1543. int32_t event,
  1544. const char *key_name,
  1545. struct icmap_notify_value new_val,
  1546. struct icmap_notify_value old_val,
  1547. void *user_data)
  1548. {
  1549. struct totem_config *totem_config = (struct totem_config *)user_data;
  1550. uint32_t local_node_pos;
  1551. const char *error_string;
  1552. uint64_t warnings;
  1553. /* Reload has completed */
  1554. if (*(uint8_t *)new_val.data == 0) {
  1555. totem_config->orig_interfaces = malloc (sizeof (struct totem_interface) * INTERFACE_MAX);
  1556. assert(totem_config->orig_interfaces != NULL);
  1557. memcpy(totem_config->orig_interfaces, totem_config->interfaces, sizeof (struct totem_interface) * INTERFACE_MAX);
  1558. get_interface_params(totem_config, &error_string, &warnings, 1);
  1559. put_nodelist_members_to_config (totem_config, 1);
  1560. totem_volatile_config_read (totem_config, NULL);
  1561. log_printf(LOGSYS_LEVEL_DEBUG, "Configuration reloaded. Dumping actual totem config.");
  1562. debug_dump_totem_config(totem_config);
  1563. if (totem_volatile_config_validate(totem_config, &error_string) == -1) {
  1564. log_printf (LOGSYS_LEVEL_ERROR, "%s", error_string);
  1565. /*
  1566. * TODO: Consider corosync exit and/or load defaults for volatile
  1567. * values. For now, log error seems to be enough
  1568. */
  1569. }
  1570. /* Reinstate the local_node_pos */
  1571. local_node_pos = find_local_node_in_nodelist(totem_config);
  1572. if (local_node_pos != -1) {
  1573. icmap_set_uint32("nodelist.local_node_pos", local_node_pos);
  1574. }
  1575. /* Reconfigure network params as appropriate */
  1576. totempg_reconfigure();
  1577. free(totem_config->orig_interfaces);
  1578. icmap_set_uint8("config.totemconfig_reload_in_progress", 0);
  1579. } else {
  1580. icmap_set_uint8("config.totemconfig_reload_in_progress", 1);
  1581. }
  1582. }
  1583. static void add_totem_config_notification(struct totem_config *totem_config)
  1584. {
  1585. icmap_track_t icmap_track;
  1586. icmap_track_add("totem.",
  1587. ICMAP_TRACK_ADD | ICMAP_TRACK_DELETE | ICMAP_TRACK_MODIFY | ICMAP_TRACK_PREFIX,
  1588. totem_change_notify,
  1589. totem_config,
  1590. &icmap_track);
  1591. icmap_track_add("config.reload_in_progress",
  1592. ICMAP_TRACK_ADD | ICMAP_TRACK_MODIFY,
  1593. totem_reload_notify,
  1594. totem_config,
  1595. &icmap_track);
  1596. icmap_track_add("nodelist.node.",
  1597. ICMAP_TRACK_ADD | ICMAP_TRACK_DELETE | ICMAP_TRACK_MODIFY | ICMAP_TRACK_PREFIX,
  1598. nodelist_dynamic_notify,
  1599. (void *)totem_config,
  1600. &icmap_track);
  1601. }