totemconfig.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763
  1. /*
  2. * Copyright (c) 2002-2005 MontaVista Software, Inc.
  3. * Copyright (c) 2006-2011 Red Hat, Inc.
  4. *
  5. * All rights reserved.
  6. *
  7. * Author: Steven Dake (sdake@redhat.com)
  8. * Jan Friesse (jfriesse@redhat.com)
  9. *
  10. * This software licensed under BSD license, the text of which follows:
  11. *
  12. * Redistribution and use in source and binary forms, with or without
  13. * modification, are permitted provided that the following conditions are met:
  14. *
  15. * - Redistributions of source code must retain the above copyright notice,
  16. * this list of conditions and the following disclaimer.
  17. * - Redistributions in binary form must reproduce the above copyright notice,
  18. * this list of conditions and the following disclaimer in the documentation
  19. * and/or other materials provided with the distribution.
  20. * - Neither the name of the MontaVista Software, Inc. nor the names of its
  21. * contributors may be used to endorse or promote products derived from this
  22. * software without specific prior written permission.
  23. *
  24. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  25. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  26. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  27. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
  28. * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  29. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  30. * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  31. * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  32. * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  33. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
  34. * THE POSSIBILITY OF SUCH DAMAGE.
  35. */
  36. #include <config.h>
  37. #include <stdio.h>
  38. #include <string.h>
  39. #include <stdlib.h>
  40. #include <errno.h>
  41. #include <unistd.h>
  42. #include <sys/socket.h>
  43. #include <sys/types.h>
  44. #include <sys/stat.h>
  45. #include <fcntl.h>
  46. #include <netinet/in.h>
  47. #include <arpa/inet.h>
  48. #include <sys/param.h>
  49. #include <corosync/swab.h>
  50. #include <corosync/list.h>
  51. #include <qb/qbdefs.h>
  52. #include <corosync/totem/totem.h>
  53. #include <corosync/config.h>
  54. #include <corosync/logsys.h>
  55. #include <corosync/engine/icmap.h>
  56. #ifdef HAVE_LIBNSS
  57. #include <nss.h>
  58. #include <pk11pub.h>
  59. #include <pkcs11.h>
  60. #include <prerror.h>
  61. #endif
  62. #include "util.h"
  63. #include "totemconfig.h"
  64. #define TOKEN_RETRANSMITS_BEFORE_LOSS_CONST 4
  65. #define TOKEN_TIMEOUT 1000
  66. #define TOKEN_RETRANSMIT_TIMEOUT (int)(TOKEN_TIMEOUT / (TOKEN_RETRANSMITS_BEFORE_LOSS_CONST + 0.2))
  67. #define TOKEN_HOLD_TIMEOUT (int)(TOKEN_RETRANSMIT_TIMEOUT * 0.8 - (1000/(int)HZ))
  68. #define JOIN_TIMEOUT 50
  69. #define MERGE_TIMEOUT 200
  70. #define DOWNCHECK_TIMEOUT 1000
  71. #define FAIL_TO_RECV_CONST 2500
  72. #define SEQNO_UNCHANGED_CONST 30
  73. #define MINIMUM_TIMEOUT (int)(1000/HZ)*3
  74. #define MAX_NETWORK_DELAY 50
  75. #define WINDOW_SIZE 50
  76. #define MAX_MESSAGES 17
  77. #define MISS_COUNT_CONST 5
  78. #define RRP_PROBLEM_COUNT_TIMEOUT 2000
  79. #define RRP_PROBLEM_COUNT_THRESHOLD_DEFAULT 10
  80. #define RRP_PROBLEM_COUNT_THRESHOLD_MIN 2
  81. #define RRP_AUTORECOVERY_CHECK_TIMEOUT 1000
  82. static char error_string_response[512];
  83. static void add_totem_config_notification(struct totem_config *totem_config);
  84. static void totem_volatile_config_read (struct totem_config *totem_config)
  85. {
  86. char *str;
  87. icmap_get_uint32("totem.token", &totem_config->token_timeout);
  88. icmap_get_uint32("totem.token_retransmit", &totem_config->token_retransmit_timeout);
  89. icmap_get_uint32("totem.hold", &totem_config->token_hold_timeout);
  90. icmap_get_uint32("totem.token_retransmits_before_loss_const", &totem_config->token_retransmits_before_loss_const);
  91. icmap_get_uint32("totem.join", &totem_config->join_timeout);
  92. icmap_get_uint32("totem.send_join", &totem_config->send_join_timeout);
  93. icmap_get_uint32("totem.consensus", &totem_config->consensus_timeout);
  94. icmap_get_uint32("totem.merge", &totem_config->merge_timeout);
  95. icmap_get_uint32("totem.downcheck", &totem_config->downcheck_timeout);
  96. icmap_get_uint32("totem.fail_recv_const", &totem_config->fail_to_recv_const);
  97. icmap_get_uint32("totem.seqno_unchanged_const", &totem_config->seqno_unchanged_const);
  98. icmap_get_uint32("totem.rrp_token_expired_timeout", &totem_config->rrp_token_expired_timeout);
  99. icmap_get_uint32("totem.rrp_problem_count_timeout", &totem_config->rrp_problem_count_timeout);
  100. icmap_get_uint32("totem.rrp_problem_count_threshold", &totem_config->rrp_problem_count_threshold);
  101. icmap_get_uint32("totem.rrp_problem_count_mcast_threshold", &totem_config->rrp_problem_count_mcast_threshold);
  102. icmap_get_uint32("totem.rrp_autorecovery_check_timeout", &totem_config->rrp_autorecovery_check_timeout);
  103. icmap_get_uint32("totem.heartbeat_failures_allowed", &totem_config->heartbeat_failures_allowed);
  104. icmap_get_uint32("totem.max_network_delay", &totem_config->max_network_delay);
  105. icmap_get_uint32("totem.window_size", &totem_config->window_size);
  106. icmap_get_uint32("totem.max_messages", &totem_config->max_messages);
  107. icmap_get_uint32("totem.miss_count_const", &totem_config->miss_count_const);
  108. if (icmap_get_string("totem.vsftype", &str) == CS_OK) {
  109. totem_config->vsf_type = str;
  110. }
  111. }
  112. static void totem_get_crypto_type(struct totem_config *totem_config)
  113. {
  114. char *str;
  115. totem_config->crypto_accept = TOTEM_CRYPTO_ACCEPT_OLD;
  116. if (icmap_get_string("totem.crypto_accept", &str) == CS_OK) {
  117. if (strcmp(str, "new") == 0) {
  118. totem_config->crypto_accept = TOTEM_CRYPTO_ACCEPT_NEW;
  119. }
  120. free(str);
  121. }
  122. totem_config->crypto_type = TOTEM_CRYPTO_SOBER;
  123. #ifdef HAVE_LIBNSS
  124. /*
  125. * We must set these even if the key does not exist.
  126. * Encryption type can be set on-the-fly using CFG
  127. */
  128. totem_config->crypto_crypt_type = CKM_AES_CBC_PAD;
  129. totem_config->crypto_sign_type = CKM_SHA256_RSA_PKCS;
  130. #endif
  131. if (icmap_get_string("totem.crypto_type", &str) == CS_OK) {
  132. if (strcmp(str, "sober") == 0) {
  133. free(str);
  134. return;
  135. }
  136. #ifdef HAVE_LIBNSS
  137. if (strcmp(str, "nss") == 0) {
  138. totem_config->crypto_type = TOTEM_CRYPTO_NSS;
  139. }
  140. free(str);
  141. #endif
  142. }
  143. }
  144. extern int totem_config_read (
  145. struct totem_config *totem_config,
  146. const char **error_string)
  147. {
  148. int res = 0;
  149. char *str;
  150. unsigned int ringnumber = 0;
  151. int member_count = 0;
  152. icmap_iter_t iter, member_iter;
  153. const char *iter_key;
  154. const char *member_iter_key;
  155. char ringnumber_key[ICMAP_KEYNAME_MAXLEN];
  156. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  157. uint8_t u8;
  158. memset (totem_config, 0, sizeof (struct totem_config));
  159. totem_config->interfaces = malloc (sizeof (struct totem_interface) * INTERFACE_MAX);
  160. if (totem_config->interfaces == 0) {
  161. *error_string = "Out of memory trying to allocate ethernet interface storage area";
  162. return -1;
  163. }
  164. memset (totem_config->interfaces, 0,
  165. sizeof (struct totem_interface) * INTERFACE_MAX);
  166. totem_config->secauth = 1;
  167. strcpy (totem_config->rrp_mode, "none");
  168. icmap_get_uint32("totem.version", (uint32_t *)&totem_config->version);
  169. if (icmap_get_string("totem.secauth", &str) == CS_OK) {
  170. if (strcmp (str, "on") == 0) {
  171. totem_config->secauth = 1;
  172. }
  173. if (strcmp (str, "off") == 0) {
  174. totem_config->secauth = 0;
  175. }
  176. free(str);
  177. }
  178. if (totem_config->secauth == 1) {
  179. totem_get_crypto_type(totem_config);
  180. }
  181. if (icmap_get_string("totem.rrp_mode", &str) == CS_OK) {
  182. strcpy (totem_config->rrp_mode, str);
  183. free(str);
  184. }
  185. /*
  186. * Get interface node id
  187. */
  188. icmap_get_uint32("totem.nodeid", &totem_config->node_id);
  189. totem_config->clear_node_high_bit = 0;
  190. if (icmap_get_string("totem.clear_node_high_bit", &str) == CS_OK) {
  191. if (strcmp (str, "yes") == 0) {
  192. totem_config->clear_node_high_bit = 1;
  193. }
  194. free(str);
  195. }
  196. icmap_get_uint32("totem.threads", &totem_config->threads);
  197. icmap_get_uint32("totem.netmtu", &totem_config->net_mtu);
  198. /*
  199. * Get things that might change in the future
  200. */
  201. totem_volatile_config_read(totem_config);
  202. iter = icmap_iter_init("totem.interface.");
  203. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  204. res = sscanf(iter_key, "totem.interface.%[^.].%s", ringnumber_key, tmp_key);
  205. if (res != 2) {
  206. continue;
  207. }
  208. if (strcmp(tmp_key, "bindnetaddr") != 0) {
  209. continue;
  210. }
  211. member_count = 0;
  212. ringnumber = atoi(ringnumber_key);
  213. /*
  214. * Get the bind net address
  215. */
  216. if (icmap_get_string(iter_key, &str) == CS_OK) {
  217. res = totemip_parse (&totem_config->interfaces[ringnumber].bindnet, str,
  218. totem_config->interfaces[ringnumber].mcast_addr.family);
  219. free(str);
  220. }
  221. /*
  222. * Get interface multicast address
  223. */
  224. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastaddr", ringnumber);
  225. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  226. res = totemip_parse (&totem_config->interfaces[ringnumber].mcast_addr, str, 0);
  227. free(str);
  228. }
  229. totem_config->broadcast_use = 0;
  230. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.broadcast", ringnumber);
  231. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  232. if (strcmp (str, "yes") == 0) {
  233. totem_config->broadcast_use = 1;
  234. totemip_parse (
  235. &totem_config->interfaces[ringnumber].mcast_addr,
  236. "255.255.255.255", 0);
  237. }
  238. free(str);
  239. }
  240. /*
  241. * Get mcast port
  242. */
  243. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastport", ringnumber);
  244. icmap_get_uint16(tmp_key, &totem_config->interfaces[ringnumber].ip_port);
  245. /*
  246. * Get the TTL
  247. */
  248. totem_config->interfaces[ringnumber].ttl = 1;
  249. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.ttl", ringnumber);
  250. if (icmap_get_uint8(tmp_key, &u8) == CS_OK) {
  251. totem_config->interfaces[ringnumber].ttl = u8;
  252. }
  253. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.member.", ringnumber);
  254. member_iter = icmap_iter_init(tmp_key);
  255. while ((member_iter_key = icmap_iter_next(member_iter, NULL, NULL)) != NULL) {
  256. if (icmap_get_string(member_iter_key, &str) == CS_OK) {
  257. res = totemip_parse (&totem_config->interfaces[ringnumber].member_list[member_count++],
  258. str, 0);
  259. }
  260. }
  261. icmap_iter_finalize(member_iter);
  262. totem_config->interfaces[ringnumber].member_count = member_count;
  263. totem_config->interface_count++;
  264. }
  265. icmap_iter_finalize(iter);
  266. totem_config->transport_number = TOTEM_TRANSPORT_UDP;
  267. if (icmap_get_string("totem.transport", &str) == CS_OK) {
  268. if (strcmp (str, "udpu") == 0) {
  269. totem_config->transport_number = TOTEM_TRANSPORT_UDPU;
  270. }
  271. if (strcmp (str, "iba") == 0) {
  272. totem_config->transport_number = TOTEM_TRANSPORT_RDMA;
  273. }
  274. free(str);
  275. }
  276. add_totem_config_notification(totem_config);
  277. return 0;
  278. }
  279. int totem_config_validate (
  280. struct totem_config *totem_config,
  281. const char **error_string)
  282. {
  283. static char local_error_reason[512];
  284. char parse_error[512];
  285. const char *error_reason = local_error_reason;
  286. int i;
  287. unsigned int interface_max = INTERFACE_MAX;
  288. if (totem_config->interface_count == 0) {
  289. error_reason = "No interfaces defined";
  290. goto parse_error;
  291. }
  292. for (i = 0; i < totem_config->interface_count; i++) {
  293. /*
  294. * Some error checking of parsed data to make sure its valid
  295. */
  296. struct totem_ip_address null_addr;
  297. memset (&null_addr, 0, sizeof (struct totem_ip_address));
  298. if ((totem_config->transport_number == 0) &&
  299. memcmp (&totem_config->interfaces[i].mcast_addr, &null_addr,
  300. sizeof (struct totem_ip_address)) == 0) {
  301. error_reason = "No multicast address specified";
  302. goto parse_error;
  303. }
  304. if (totem_config->interfaces[i].ip_port == 0) {
  305. error_reason = "No multicast port specified";
  306. goto parse_error;
  307. }
  308. if (totem_config->interfaces[i].ttl > 255) {
  309. error_reason = "Invalid TTL (should be 0..255)";
  310. goto parse_error;
  311. }
  312. if (totem_config->transport_number != TOTEM_TRANSPORT_UDP &&
  313. totem_config->interfaces[i].ttl != 1) {
  314. error_reason = "Can only set ttl on multicast transport types";
  315. goto parse_error;
  316. }
  317. if (totem_config->interfaces[i].mcast_addr.family == AF_INET6 &&
  318. totem_config->node_id == 0) {
  319. error_reason = "An IPV6 network requires that a node ID be specified.";
  320. goto parse_error;
  321. }
  322. if (totem_config->broadcast_use == 0 && totem_config->transport_number == 0) {
  323. if (totem_config->interfaces[i].mcast_addr.family != totem_config->interfaces[i].bindnet.family) {
  324. error_reason = "Multicast address family does not match bind address family";
  325. goto parse_error;
  326. }
  327. if (totem_config->interfaces[i].mcast_addr.family != totem_config->interfaces[i].bindnet.family) {
  328. error_reason = "Not all bind address belong to the same IP family";
  329. goto parse_error;
  330. }
  331. if (totemip_is_mcast (&totem_config->interfaces[i].mcast_addr) != 0) {
  332. error_reason = "mcastaddr is not a correct multicast address.";
  333. goto parse_error;
  334. }
  335. }
  336. }
  337. if (totem_config->version != 2) {
  338. error_reason = "This totem parser can only parse version 2 configurations.";
  339. goto parse_error;
  340. }
  341. if (totem_config->token_retransmits_before_loss_const == 0) {
  342. totem_config->token_retransmits_before_loss_const =
  343. TOKEN_RETRANSMITS_BEFORE_LOSS_CONST;
  344. }
  345. /*
  346. * Setup timeout values that are not setup by user
  347. */
  348. if (totem_config->token_timeout == 0) {
  349. totem_config->token_timeout = TOKEN_TIMEOUT;
  350. if (totem_config->token_retransmits_before_loss_const == 0) {
  351. totem_config->token_retransmits_before_loss_const = TOKEN_RETRANSMITS_BEFORE_LOSS_CONST;
  352. }
  353. if (totem_config->token_retransmit_timeout == 0) {
  354. totem_config->token_retransmit_timeout =
  355. (int)(totem_config->token_timeout /
  356. (totem_config->token_retransmits_before_loss_const + 0.2));
  357. }
  358. if (totem_config->token_hold_timeout == 0) {
  359. totem_config->token_hold_timeout =
  360. (int)(totem_config->token_retransmit_timeout * 0.8 -
  361. (1000/HZ));
  362. }
  363. }
  364. if (totem_config->max_network_delay == 0) {
  365. totem_config->max_network_delay = MAX_NETWORK_DELAY;
  366. }
  367. if (totem_config->max_network_delay < MINIMUM_TIMEOUT) {
  368. snprintf (local_error_reason, sizeof(local_error_reason),
  369. "The max_network_delay parameter (%d ms) may not be less then (%d ms).",
  370. totem_config->max_network_delay, MINIMUM_TIMEOUT);
  371. goto parse_error;
  372. }
  373. if (totem_config->window_size == 0) {
  374. totem_config->window_size = WINDOW_SIZE;
  375. }
  376. if (totem_config->max_messages == 0) {
  377. totem_config->max_messages = MAX_MESSAGES;
  378. }
  379. if (totem_config->miss_count_const == 0) {
  380. totem_config->miss_count_const = MISS_COUNT_CONST;
  381. }
  382. if (totem_config->token_timeout < MINIMUM_TIMEOUT) {
  383. snprintf (local_error_reason, sizeof(local_error_reason),
  384. "The token timeout parameter (%d ms) may not be less then (%d ms).",
  385. totem_config->token_timeout, MINIMUM_TIMEOUT);
  386. goto parse_error;
  387. }
  388. if (totem_config->token_retransmit_timeout == 0) {
  389. totem_config->token_retransmit_timeout =
  390. (int)(totem_config->token_timeout /
  391. (totem_config->token_retransmits_before_loss_const + 0.2));
  392. }
  393. if (totem_config->token_hold_timeout == 0) {
  394. totem_config->token_hold_timeout =
  395. (int)(totem_config->token_retransmit_timeout * 0.8 -
  396. (1000/HZ));
  397. }
  398. if (totem_config->token_retransmit_timeout < MINIMUM_TIMEOUT) {
  399. snprintf (local_error_reason, sizeof(local_error_reason),
  400. "The token retransmit timeout parameter (%d ms) may not be less then (%d ms).",
  401. totem_config->token_retransmit_timeout, MINIMUM_TIMEOUT);
  402. goto parse_error;
  403. }
  404. if (totem_config->token_hold_timeout == 0) {
  405. totem_config->token_hold_timeout = TOKEN_HOLD_TIMEOUT;
  406. }
  407. if (totem_config->token_hold_timeout < MINIMUM_TIMEOUT) {
  408. snprintf (local_error_reason, sizeof(local_error_reason),
  409. "The token hold timeout parameter (%d ms) may not be less then (%d ms).",
  410. totem_config->token_hold_timeout, MINIMUM_TIMEOUT);
  411. goto parse_error;
  412. }
  413. if (totem_config->join_timeout == 0) {
  414. totem_config->join_timeout = JOIN_TIMEOUT;
  415. }
  416. if (totem_config->join_timeout < MINIMUM_TIMEOUT) {
  417. snprintf (local_error_reason, sizeof(local_error_reason),
  418. "The join timeout parameter (%d ms) may not be less then (%d ms).",
  419. totem_config->join_timeout, MINIMUM_TIMEOUT);
  420. goto parse_error;
  421. }
  422. if (totem_config->consensus_timeout == 0) {
  423. totem_config->consensus_timeout = (int)(float)(1.2 * totem_config->token_timeout);
  424. }
  425. if (totem_config->consensus_timeout < MINIMUM_TIMEOUT) {
  426. snprintf (local_error_reason, sizeof(local_error_reason),
  427. "The consensus timeout parameter (%d ms) may not be less then (%d ms).",
  428. totem_config->consensus_timeout, MINIMUM_TIMEOUT);
  429. goto parse_error;
  430. }
  431. if (totem_config->merge_timeout == 0) {
  432. totem_config->merge_timeout = MERGE_TIMEOUT;
  433. }
  434. if (totem_config->merge_timeout < MINIMUM_TIMEOUT) {
  435. snprintf (local_error_reason, sizeof(local_error_reason),
  436. "The merge timeout parameter (%d ms) may not be less then (%d ms).",
  437. totem_config->merge_timeout, MINIMUM_TIMEOUT);
  438. goto parse_error;
  439. }
  440. if (totem_config->downcheck_timeout == 0) {
  441. totem_config->downcheck_timeout = DOWNCHECK_TIMEOUT;
  442. }
  443. if (totem_config->downcheck_timeout < MINIMUM_TIMEOUT) {
  444. snprintf (local_error_reason, sizeof(local_error_reason),
  445. "The downcheck timeout parameter (%d ms) may not be less then (%d ms).",
  446. totem_config->downcheck_timeout, MINIMUM_TIMEOUT);
  447. goto parse_error;
  448. }
  449. /*
  450. * RRP values validation
  451. */
  452. if (strcmp (totem_config->rrp_mode, "none") &&
  453. strcmp (totem_config->rrp_mode, "active") &&
  454. strcmp (totem_config->rrp_mode, "passive")) {
  455. snprintf (local_error_reason, sizeof(local_error_reason),
  456. "The RRP mode \"%s\" specified is invalid. It must be none, active, or passive.\n", totem_config->rrp_mode);
  457. goto parse_error;
  458. }
  459. if (totem_config->rrp_problem_count_timeout == 0) {
  460. totem_config->rrp_problem_count_timeout = RRP_PROBLEM_COUNT_TIMEOUT;
  461. }
  462. if (totem_config->rrp_problem_count_timeout < MINIMUM_TIMEOUT) {
  463. snprintf (local_error_reason, sizeof(local_error_reason),
  464. "The RRP problem count timeout parameter (%d ms) may not be less then (%d ms).",
  465. totem_config->rrp_problem_count_timeout, MINIMUM_TIMEOUT);
  466. goto parse_error;
  467. }
  468. if (totem_config->rrp_problem_count_threshold == 0) {
  469. totem_config->rrp_problem_count_threshold = RRP_PROBLEM_COUNT_THRESHOLD_DEFAULT;
  470. }
  471. if (totem_config->rrp_problem_count_mcast_threshold == 0) {
  472. totem_config->rrp_problem_count_mcast_threshold = totem_config->rrp_problem_count_threshold * 10;
  473. }
  474. if (totem_config->rrp_problem_count_threshold < RRP_PROBLEM_COUNT_THRESHOLD_MIN) {
  475. snprintf (local_error_reason, sizeof(local_error_reason),
  476. "The RRP problem count threshold (%d problem count) may not be less then (%d problem count).",
  477. totem_config->rrp_problem_count_threshold, RRP_PROBLEM_COUNT_THRESHOLD_MIN);
  478. goto parse_error;
  479. }
  480. if (totem_config->rrp_problem_count_mcast_threshold < RRP_PROBLEM_COUNT_THRESHOLD_MIN) {
  481. snprintf (local_error_reason, sizeof(local_error_reason),
  482. "The RRP multicast problem count threshold (%d problem count) may not be less then (%d problem count).",
  483. totem_config->rrp_problem_count_mcast_threshold, RRP_PROBLEM_COUNT_THRESHOLD_MIN);
  484. goto parse_error;
  485. }
  486. if (totem_config->rrp_token_expired_timeout == 0) {
  487. totem_config->rrp_token_expired_timeout =
  488. totem_config->token_retransmit_timeout;
  489. }
  490. if (totem_config->rrp_token_expired_timeout < MINIMUM_TIMEOUT) {
  491. snprintf (local_error_reason, sizeof(local_error_reason),
  492. "The RRP token expired timeout parameter (%d ms) may not be less then (%d ms).",
  493. totem_config->rrp_token_expired_timeout, MINIMUM_TIMEOUT);
  494. goto parse_error;
  495. }
  496. if (totem_config->rrp_autorecovery_check_timeout == 0) {
  497. totem_config->rrp_autorecovery_check_timeout = RRP_AUTORECOVERY_CHECK_TIMEOUT;
  498. }
  499. if (strcmp (totem_config->rrp_mode, "none") == 0) {
  500. interface_max = 1;
  501. }
  502. if (interface_max < totem_config->interface_count) {
  503. snprintf (parse_error, sizeof(parse_error),
  504. "%d is too many configured interfaces for the rrp_mode setting %s.",
  505. totem_config->interface_count,
  506. totem_config->rrp_mode);
  507. error_reason = parse_error;
  508. goto parse_error;
  509. }
  510. if (totem_config->fail_to_recv_const == 0) {
  511. totem_config->fail_to_recv_const = FAIL_TO_RECV_CONST;
  512. }
  513. if (totem_config->seqno_unchanged_const == 0) {
  514. totem_config->seqno_unchanged_const = SEQNO_UNCHANGED_CONST;
  515. }
  516. if (totem_config->net_mtu == 0) {
  517. totem_config->net_mtu = 1500;
  518. }
  519. if ((MESSAGE_QUEUE_MAX) < totem_config->max_messages) {
  520. snprintf (local_error_reason, sizeof(local_error_reason),
  521. "The max_messages parameter (%d messages) may not be greater then (%d messages).",
  522. totem_config->max_messages, MESSAGE_QUEUE_MAX);
  523. goto parse_error;
  524. }
  525. if (totem_config->threads > SEND_THREADS_MAX) {
  526. totem_config->threads = SEND_THREADS_MAX;
  527. }
  528. if (totem_config->secauth == 0) {
  529. totem_config->threads = 0;
  530. }
  531. if (totem_config->net_mtu > FRAME_SIZE_MAX) {
  532. error_reason = "This net_mtu parameter is greater then the maximum frame size";
  533. goto parse_error;
  534. }
  535. if (totem_config->vsf_type == NULL) {
  536. totem_config->vsf_type = "none";
  537. }
  538. return (0);
  539. parse_error:
  540. snprintf (error_string_response, sizeof(error_string_response),
  541. "parse error in config: %s\n", error_reason);
  542. *error_string = error_string_response;
  543. return (-1);
  544. }
  545. static int read_keyfile (
  546. const char *key_location,
  547. struct totem_config *totem_config,
  548. const char **error_string)
  549. {
  550. int fd;
  551. int res;
  552. ssize_t expected_key_len = sizeof (totem_config->private_key);
  553. int saved_errno;
  554. char error_str[100];
  555. const char *error_ptr;
  556. fd = open (key_location, O_RDONLY);
  557. if (fd == -1) {
  558. error_ptr = qb_strerror_r(errno, error_str, sizeof(error_str));
  559. snprintf (error_string_response, sizeof(error_string_response),
  560. "Could not open %s: %s\n",
  561. key_location, error_ptr);
  562. goto parse_error;
  563. }
  564. res = read (fd, totem_config->private_key, expected_key_len);
  565. saved_errno = errno;
  566. close (fd);
  567. if (res == -1) {
  568. error_ptr = qb_strerror_r (saved_errno, error_str, sizeof(error_str));
  569. snprintf (error_string_response, sizeof(error_string_response),
  570. "Could not read %s: %s\n",
  571. key_location, error_ptr);
  572. goto parse_error;
  573. }
  574. totem_config->private_key_len = expected_key_len;
  575. if (res != expected_key_len) {
  576. snprintf (error_string_response, sizeof(error_string_response),
  577. "Could only read %d bits of 1024 bits from %s.\n",
  578. res * 8, key_location);
  579. goto parse_error;
  580. }
  581. return 0;
  582. parse_error:
  583. *error_string = error_string_response;
  584. return (-1);
  585. }
  586. int totem_config_keyread (
  587. struct totem_config *totem_config,
  588. const char **error_string)
  589. {
  590. int got_key = 0;
  591. char *key_location = NULL;
  592. int res;
  593. size_t key_len;
  594. memset (totem_config->private_key, 0, 128);
  595. totem_config->private_key_len = 128;
  596. if (totem_config->secauth == 0) {
  597. return (0);
  598. }
  599. /* cmap may store the location of the key file */
  600. if (icmap_get_string("totem.keyfile", &key_location) == CS_OK) {
  601. res = read_keyfile(key_location, totem_config, error_string);
  602. free(key_location);
  603. if (res) {
  604. goto key_error;
  605. }
  606. got_key = 1;
  607. } else { /* Or the key itself may be in the cmap */
  608. if (icmap_get("totem.key", NULL, &key_len, NULL) == CS_OK) {
  609. if (key_len > sizeof (totem_config->private_key)) {
  610. sprintf(error_string_response, "key is too long");
  611. goto key_error;
  612. }
  613. if (icmap_get("totem.key", totem_config->private_key, &key_len, NULL) == CS_OK) {
  614. totem_config->private_key_len = key_len;
  615. got_key = 1;
  616. } else {
  617. sprintf(error_string_response, "can't store private key");
  618. goto key_error;
  619. }
  620. }
  621. }
  622. /* In desperation we read the default filename */
  623. if (!got_key) {
  624. const char *filename = getenv("COROSYNC_TOTEM_AUTHKEY_FILE");
  625. if (!filename)
  626. filename = COROSYSCONFDIR "/authkey";
  627. res = read_keyfile(filename, totem_config, error_string);
  628. if (res)
  629. goto key_error;
  630. }
  631. return (0);
  632. key_error:
  633. *error_string = error_string_response;
  634. return (-1);
  635. }
  636. static void totem_change_notify(
  637. int32_t event,
  638. const char *key_name,
  639. struct icmap_notify_value new_val,
  640. struct icmap_notify_value old_val,
  641. void *user_data)
  642. {
  643. totem_volatile_config_read((struct totem_config *)user_data);
  644. }
  645. static void add_totem_config_notification(struct totem_config *totem_config)
  646. {
  647. icmap_track_t icmap_track;
  648. icmap_track_add("totem.",
  649. ICMAP_TRACK_ADD | ICMAP_TRACK_DELETE | ICMAP_TRACK_MODIFY | ICMAP_TRACK_PREFIX,
  650. totem_change_notify,
  651. totem_config,
  652. &icmap_track);
  653. }