totemconfig.c 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374
  1. /*
  2. * Copyright (c) 2002-2005 MontaVista Software, Inc.
  3. * Copyright (c) 2006-2013 Red Hat, Inc.
  4. *
  5. * All rights reserved.
  6. *
  7. * Author: Steven Dake (sdake@redhat.com)
  8. * Jan Friesse (jfriesse@redhat.com)
  9. *
  10. * This software licensed under BSD license, the text of which follows:
  11. *
  12. * Redistribution and use in source and binary forms, with or without
  13. * modification, are permitted provided that the following conditions are met:
  14. *
  15. * - Redistributions of source code must retain the above copyright notice,
  16. * this list of conditions and the following disclaimer.
  17. * - Redistributions in binary form must reproduce the above copyright notice,
  18. * this list of conditions and the following disclaimer in the documentation
  19. * and/or other materials provided with the distribution.
  20. * - Neither the name of the MontaVista Software, Inc. nor the names of its
  21. * contributors may be used to endorse or promote products derived from this
  22. * software without specific prior written permission.
  23. *
  24. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  25. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  26. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  27. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
  28. * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  29. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  30. * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  31. * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  32. * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  33. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
  34. * THE POSSIBILITY OF SUCH DAMAGE.
  35. */
  36. #include <config.h>
  37. #include <stdio.h>
  38. #include <string.h>
  39. #include <stdlib.h>
  40. #include <errno.h>
  41. #include <unistd.h>
  42. #include <sys/socket.h>
  43. #include <sys/types.h>
  44. #include <sys/stat.h>
  45. #include <fcntl.h>
  46. #include <netinet/in.h>
  47. #include <arpa/inet.h>
  48. #include <sys/param.h>
  49. #include <corosync/swab.h>
  50. #include <corosync/list.h>
  51. #include <qb/qbdefs.h>
  52. #include <corosync/totem/totem.h>
  53. #include <corosync/config.h>
  54. #include <corosync/logsys.h>
  55. #include <corosync/icmap.h>
  56. #include "util.h"
  57. #include "totemconfig.h"
  58. #define TOKEN_RETRANSMITS_BEFORE_LOSS_CONST 4
  59. #define TOKEN_TIMEOUT 1000
  60. #define TOKEN_COEFFICIENT 650
  61. #define JOIN_TIMEOUT 50
  62. #define MERGE_TIMEOUT 200
  63. #define DOWNCHECK_TIMEOUT 1000
  64. #define FAIL_TO_RECV_CONST 2500
  65. #define SEQNO_UNCHANGED_CONST 30
  66. #define MINIMUM_TIMEOUT (int)(1000/HZ)*3
  67. #define MAX_NETWORK_DELAY 50
  68. #define WINDOW_SIZE 50
  69. #define MAX_MESSAGES 17
  70. #define MISS_COUNT_CONST 5
  71. #define RRP_PROBLEM_COUNT_TIMEOUT 2000
  72. #define RRP_PROBLEM_COUNT_THRESHOLD_DEFAULT 10
  73. #define RRP_PROBLEM_COUNT_THRESHOLD_MIN 2
  74. #define RRP_AUTORECOVERY_CHECK_TIMEOUT 1000
  75. #define DEFAULT_PORT 5405
  76. static char error_string_response[512];
  77. static void add_totem_config_notification(struct totem_config *totem_config);
  78. /* All the volatile parameters are uint32s, luckily */
  79. static uint32_t *totem_get_param_by_name(struct totem_config *totem_config, const char *param_name)
  80. {
  81. if (strcmp(param_name, "totem.token") == 0)
  82. return &totem_config->token_timeout;
  83. if (strcmp(param_name, "totem.token_retransmit") == 0)
  84. return &totem_config->token_retransmit_timeout;
  85. if (strcmp(param_name, "totem.hold") == 0)
  86. return &totem_config->token_hold_timeout;
  87. if (strcmp(param_name, "totem.token_retransmits_before_loss_const") == 0)
  88. return &totem_config->token_retransmits_before_loss_const;
  89. if (strcmp(param_name, "totem.join") == 0)
  90. return &totem_config->join_timeout;
  91. if (strcmp(param_name, "totem.send_join") == 0)
  92. return &totem_config->send_join_timeout;
  93. if (strcmp(param_name, "totem.consensus") == 0)
  94. return &totem_config->consensus_timeout;
  95. if (strcmp(param_name, "totem.merge") == 0)
  96. return &totem_config->merge_timeout;
  97. if (strcmp(param_name, "totem.downcheck") == 0)
  98. return &totem_config->downcheck_timeout;
  99. if (strcmp(param_name, "totem.fail_recv_const") == 0)
  100. return &totem_config->fail_to_recv_const;
  101. if (strcmp(param_name, "totem.seqno_unchanged_const") == 0)
  102. return &totem_config->seqno_unchanged_const;
  103. if (strcmp(param_name, "totem.rrp_token_expired_timeout") == 0)
  104. return &totem_config->rrp_token_expired_timeout;
  105. if (strcmp(param_name, "totem.rrp_problem_count_timeout") == 0)
  106. return &totem_config->rrp_problem_count_timeout;
  107. if (strcmp(param_name, "totem.rrp_problem_count_threshold") == 0)
  108. return &totem_config->rrp_problem_count_threshold;
  109. if (strcmp(param_name, "totem.rrp_problem_count_mcast_threshold") == 0)
  110. return &totem_config->rrp_problem_count_mcast_threshold;
  111. if (strcmp(param_name, "totem.rrp_autorecovery_check_timeout") == 0)
  112. return &totem_config->rrp_autorecovery_check_timeout;
  113. if (strcmp(param_name, "totem.heartbeat_failures_allowed") == 0)
  114. return &totem_config->heartbeat_failures_allowed;
  115. if (strcmp(param_name, "totem.max_network_delay") == 0)
  116. return &totem_config->max_network_delay;
  117. if (strcmp(param_name, "totem.window_size") == 0)
  118. return &totem_config->window_size;
  119. if (strcmp(param_name, "totem.max_messages") == 0)
  120. return &totem_config->max_messages;
  121. if (strcmp(param_name, "totem.miss_count_const") == 0)
  122. return &totem_config->miss_count_const;
  123. return NULL;
  124. }
  125. /*
  126. * Read key_name from icmap. If key is not found or key_name == delete_key or if allow_zero is false
  127. * and readed value is zero, default value is used and stored into totem_config.
  128. */
  129. static void totem_volatile_config_set_value (struct totem_config *totem_config,
  130. const char *key_name, const char *deleted_key, unsigned int default_value,
  131. int allow_zero_value)
  132. {
  133. char runtime_key_name[ICMAP_KEYNAME_MAXLEN];
  134. if (icmap_get_uint32(key_name, totem_get_param_by_name(totem_config, key_name)) != CS_OK ||
  135. (deleted_key != NULL && strcmp(deleted_key, key_name) == 0) ||
  136. (!allow_zero_value && *totem_get_param_by_name(totem_config, key_name) == 0)) {
  137. *totem_get_param_by_name(totem_config, key_name) = default_value;
  138. }
  139. /*
  140. * Store totem_config value to cmap runtime section
  141. */
  142. strcpy(runtime_key_name, "runtime.config.");
  143. strcat(runtime_key_name, key_name);
  144. icmap_set_uint32(runtime_key_name, *totem_get_param_by_name(totem_config, key_name));
  145. }
  146. /*
  147. * Read and validate config values from cmap and store them into totem_config. If key doesn't exists,
  148. * default value is stored. deleted_key is name of key beeing processed by delete operation
  149. * from cmap. It is considered as non existing even if it can be read. Can be NULL.
  150. */
  151. static void totem_volatile_config_read (struct totem_config *totem_config, const char *deleted_key)
  152. {
  153. uint32_t u32;
  154. totem_volatile_config_set_value(totem_config, "totem.token_retransmits_before_loss_const", deleted_key,
  155. TOKEN_RETRANSMITS_BEFORE_LOSS_CONST, 0);
  156. totem_volatile_config_set_value(totem_config, "totem.token", deleted_key, TOKEN_TIMEOUT, 0);
  157. if (totem_config->interface_count > 0 && totem_config->interfaces[0].member_count > 2) {
  158. u32 = TOKEN_COEFFICIENT;
  159. icmap_get_uint32("totem.token_coefficient", &u32);
  160. totem_config->token_timeout += (totem_config->interfaces[0].member_count - 2) * u32;
  161. /*
  162. * Store totem_config value to cmap runtime section
  163. */
  164. icmap_set_uint32("runtime.config.totem.token", totem_config->token_timeout);
  165. }
  166. totem_volatile_config_set_value(totem_config, "totem.max_network_delay", deleted_key, MAX_NETWORK_DELAY, 0);
  167. totem_volatile_config_set_value(totem_config, "totem.window_size", deleted_key, WINDOW_SIZE, 0);
  168. totem_volatile_config_set_value(totem_config, "totem.max_messages", deleted_key, MAX_MESSAGES, 0);
  169. totem_volatile_config_set_value(totem_config, "totem.miss_count_const", deleted_key, MISS_COUNT_CONST, 0);
  170. totem_volatile_config_set_value(totem_config, "totem.token_retransmit", deleted_key,
  171. (int)(totem_config->token_timeout / (totem_config->token_retransmits_before_loss_const + 0.2)), 0);
  172. totem_volatile_config_set_value(totem_config, "totem.hold", deleted_key,
  173. (int)(totem_config->token_retransmit_timeout * 0.8 - (1000/HZ)), 0);
  174. totem_volatile_config_set_value(totem_config, "totem.join", deleted_key, JOIN_TIMEOUT, 0);
  175. totem_volatile_config_set_value(totem_config, "totem.consensus", deleted_key,
  176. (int)(float)(1.2 * totem_config->token_timeout), 0);
  177. totem_volatile_config_set_value(totem_config, "totem.merge", deleted_key, MERGE_TIMEOUT, 0);
  178. totem_volatile_config_set_value(totem_config, "totem.downcheck", deleted_key, DOWNCHECK_TIMEOUT, 0);
  179. totem_volatile_config_set_value(totem_config, "totem.fail_recv_const", deleted_key, FAIL_TO_RECV_CONST, 0);
  180. totem_volatile_config_set_value(totem_config, "totem.seqno_unchanged_const", deleted_key,
  181. SEQNO_UNCHANGED_CONST, 0);
  182. totem_volatile_config_set_value(totem_config, "totem.send_join", deleted_key, 0, 1);
  183. totem_volatile_config_set_value(totem_config, "totem.rrp_problem_count_timeout", deleted_key,
  184. RRP_PROBLEM_COUNT_TIMEOUT, 0);
  185. totem_volatile_config_set_value(totem_config, "totem.rrp_problem_count_threshold", deleted_key,
  186. RRP_PROBLEM_COUNT_THRESHOLD_DEFAULT, 0);
  187. totem_volatile_config_set_value(totem_config, "totem.rrp_problem_count_mcast_threshold", deleted_key,
  188. totem_config->rrp_problem_count_threshold * 10, 0);
  189. totem_volatile_config_set_value(totem_config, "totem.rrp_token_expired_timeout", deleted_key,
  190. totem_config->token_retransmit_timeout, 0);
  191. totem_volatile_config_set_value(totem_config, "totem.rrp_autorecovery_check_timeout", deleted_key,
  192. RRP_AUTORECOVERY_CHECK_TIMEOUT, 0);
  193. totem_volatile_config_set_value(totem_config, "totem.heartbeat_failures_allowed", deleted_key, 0, 1);
  194. }
  195. static int totem_volatile_config_validate (
  196. struct totem_config *totem_config,
  197. const char **error_string)
  198. {
  199. static char local_error_reason[512];
  200. const char *error_reason = local_error_reason;
  201. if (totem_config->max_network_delay < MINIMUM_TIMEOUT) {
  202. snprintf (local_error_reason, sizeof(local_error_reason),
  203. "The max_network_delay parameter (%d ms) may not be less than (%d ms).",
  204. totem_config->max_network_delay, MINIMUM_TIMEOUT);
  205. goto parse_error;
  206. }
  207. if (totem_config->token_timeout < MINIMUM_TIMEOUT) {
  208. snprintf (local_error_reason, sizeof(local_error_reason),
  209. "The token timeout parameter (%d ms) may not be less than (%d ms).",
  210. totem_config->token_timeout, MINIMUM_TIMEOUT);
  211. goto parse_error;
  212. }
  213. if (totem_config->token_retransmit_timeout < MINIMUM_TIMEOUT) {
  214. snprintf (local_error_reason, sizeof(local_error_reason),
  215. "The token retransmit timeout parameter (%d ms) may not be less than (%d ms).",
  216. totem_config->token_retransmit_timeout, MINIMUM_TIMEOUT);
  217. goto parse_error;
  218. }
  219. if (totem_config->token_hold_timeout < MINIMUM_TIMEOUT) {
  220. snprintf (local_error_reason, sizeof(local_error_reason),
  221. "The token hold timeout parameter (%d ms) may not be less than (%d ms).",
  222. totem_config->token_hold_timeout, MINIMUM_TIMEOUT);
  223. goto parse_error;
  224. }
  225. if (totem_config->join_timeout < MINIMUM_TIMEOUT) {
  226. snprintf (local_error_reason, sizeof(local_error_reason),
  227. "The join timeout parameter (%d ms) may not be less than (%d ms).",
  228. totem_config->join_timeout, MINIMUM_TIMEOUT);
  229. goto parse_error;
  230. }
  231. if (totem_config->consensus_timeout < MINIMUM_TIMEOUT) {
  232. snprintf (local_error_reason, sizeof(local_error_reason),
  233. "The consensus timeout parameter (%d ms) may not be less than (%d ms).",
  234. totem_config->consensus_timeout, MINIMUM_TIMEOUT);
  235. goto parse_error;
  236. }
  237. if (totem_config->consensus_timeout < totem_config->join_timeout) {
  238. snprintf (local_error_reason, sizeof(local_error_reason),
  239. "The consensus timeout parameter (%d ms) may not be less than join timeout (%d ms).",
  240. totem_config->consensus_timeout, totem_config->join_timeout);
  241. goto parse_error;
  242. }
  243. if (totem_config->merge_timeout < MINIMUM_TIMEOUT) {
  244. snprintf (local_error_reason, sizeof(local_error_reason),
  245. "The merge timeout parameter (%d ms) may not be less than (%d ms).",
  246. totem_config->merge_timeout, MINIMUM_TIMEOUT);
  247. goto parse_error;
  248. }
  249. if (totem_config->downcheck_timeout < MINIMUM_TIMEOUT) {
  250. snprintf (local_error_reason, sizeof(local_error_reason),
  251. "The downcheck timeout parameter (%d ms) may not be less than (%d ms).",
  252. totem_config->downcheck_timeout, MINIMUM_TIMEOUT);
  253. goto parse_error;
  254. }
  255. if (totem_config->rrp_problem_count_timeout < MINIMUM_TIMEOUT) {
  256. snprintf (local_error_reason, sizeof(local_error_reason),
  257. "The RRP problem count timeout parameter (%d ms) may not be less than (%d ms).",
  258. totem_config->rrp_problem_count_timeout, MINIMUM_TIMEOUT);
  259. goto parse_error;
  260. }
  261. if (totem_config->rrp_problem_count_threshold < RRP_PROBLEM_COUNT_THRESHOLD_MIN) {
  262. snprintf (local_error_reason, sizeof(local_error_reason),
  263. "The RRP problem count threshold (%d problem count) may not be less than (%d problem count).",
  264. totem_config->rrp_problem_count_threshold, RRP_PROBLEM_COUNT_THRESHOLD_MIN);
  265. goto parse_error;
  266. }
  267. if (totem_config->rrp_problem_count_mcast_threshold < RRP_PROBLEM_COUNT_THRESHOLD_MIN) {
  268. snprintf (local_error_reason, sizeof(local_error_reason),
  269. "The RRP multicast problem count threshold (%d problem count) may not be less than (%d problem count).",
  270. totem_config->rrp_problem_count_mcast_threshold, RRP_PROBLEM_COUNT_THRESHOLD_MIN);
  271. goto parse_error;
  272. }
  273. if (totem_config->rrp_token_expired_timeout < MINIMUM_TIMEOUT) {
  274. snprintf (local_error_reason, sizeof(local_error_reason),
  275. "The RRP token expired timeout parameter (%d ms) may not be less than (%d ms).",
  276. totem_config->rrp_token_expired_timeout, MINIMUM_TIMEOUT);
  277. goto parse_error;
  278. }
  279. return 0;
  280. parse_error:
  281. snprintf (error_string_response, sizeof(error_string_response),
  282. "parse error in config: %s\n", error_reason);
  283. *error_string = error_string_response;
  284. return (-1);
  285. }
  286. static int totem_get_crypto(struct totem_config *totem_config)
  287. {
  288. char *str;
  289. const char *tmp_cipher;
  290. const char *tmp_hash;
  291. tmp_hash = "sha1";
  292. tmp_cipher = "aes256";
  293. if (icmap_get_string("totem.secauth", &str) == CS_OK) {
  294. if (strcmp (str, "off") == 0) {
  295. tmp_hash = "none";
  296. tmp_cipher = "none";
  297. }
  298. free(str);
  299. }
  300. if (icmap_get_string("totem.crypto_cipher", &str) == CS_OK) {
  301. if (strcmp(str, "none") == 0) {
  302. tmp_cipher = "none";
  303. }
  304. if (strcmp(str, "aes256") == 0) {
  305. tmp_cipher = "aes256";
  306. }
  307. if (strcmp(str, "aes192") == 0) {
  308. tmp_cipher = "aes192";
  309. }
  310. if (strcmp(str, "aes128") == 0) {
  311. tmp_cipher = "aes128";
  312. }
  313. if (strcmp(str, "3des") == 0) {
  314. tmp_cipher = "3des";
  315. }
  316. free(str);
  317. }
  318. if (icmap_get_string("totem.crypto_hash", &str) == CS_OK) {
  319. if (strcmp(str, "none") == 0) {
  320. tmp_hash = "none";
  321. }
  322. if (strcmp(str, "md5") == 0) {
  323. tmp_hash = "md5";
  324. }
  325. if (strcmp(str, "sha1") == 0) {
  326. tmp_hash = "sha1";
  327. }
  328. if (strcmp(str, "sha256") == 0) {
  329. tmp_hash = "sha256";
  330. }
  331. if (strcmp(str, "sha384") == 0) {
  332. tmp_hash = "sha384";
  333. }
  334. if (strcmp(str, "sha512") == 0) {
  335. tmp_hash = "sha512";
  336. }
  337. free(str);
  338. }
  339. if ((strcmp(tmp_cipher, "none") != 0) &&
  340. (strcmp(tmp_hash, "none") == 0)) {
  341. return -1;
  342. }
  343. free(totem_config->crypto_cipher_type);
  344. free(totem_config->crypto_hash_type);
  345. totem_config->crypto_cipher_type = strdup(tmp_cipher);
  346. totem_config->crypto_hash_type = strdup(tmp_hash);
  347. return 0;
  348. }
  349. static int totem_config_get_ip_version(void)
  350. {
  351. int res;
  352. char *str;
  353. res = AF_INET;
  354. if (icmap_get_string("totem.ip_version", &str) == CS_OK) {
  355. if (strcmp(str, "ipv4") == 0) {
  356. res = AF_INET;
  357. }
  358. if (strcmp(str, "ipv6") == 0) {
  359. res = AF_INET6;
  360. }
  361. free(str);
  362. }
  363. return (res);
  364. }
  365. static uint16_t generate_cluster_id (const char *cluster_name)
  366. {
  367. int i;
  368. int value = 0;
  369. for (i = 0; i < strlen(cluster_name); i++) {
  370. value <<= 1;
  371. value += cluster_name[i];
  372. }
  373. return (value & 0xFFFF);
  374. }
  375. static int get_cluster_mcast_addr (
  376. const char *cluster_name,
  377. const struct totem_ip_address *bindnet,
  378. unsigned int ringnumber,
  379. int ip_version,
  380. struct totem_ip_address *res)
  381. {
  382. uint16_t clusterid;
  383. char addr[INET6_ADDRSTRLEN + 1];
  384. int err;
  385. if (cluster_name == NULL) {
  386. return (-1);
  387. }
  388. clusterid = generate_cluster_id(cluster_name) + ringnumber;
  389. memset (res, 0, sizeof(*res));
  390. switch (bindnet->family) {
  391. case AF_INET:
  392. snprintf(addr, sizeof(addr), "239.192.%d.%d", clusterid >> 8, clusterid % 0xFF);
  393. break;
  394. case AF_INET6:
  395. snprintf(addr, sizeof(addr), "ff15::%x", clusterid);
  396. break;
  397. default:
  398. /*
  399. * Unknown family
  400. */
  401. return (-1);
  402. }
  403. err = totemip_parse (res, addr, ip_version);
  404. return (err);
  405. }
  406. static int find_local_node_in_nodelist(struct totem_config *totem_config)
  407. {
  408. icmap_iter_t iter;
  409. const char *iter_key;
  410. int res = 0;
  411. unsigned int node_pos;
  412. int local_node_pos = -1;
  413. struct totem_ip_address bind_addr;
  414. int interface_up, interface_num;
  415. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  416. char *node_addr_str;
  417. struct totem_ip_address node_addr;
  418. res = totemip_iface_check(&totem_config->interfaces[0].bindnet,
  419. &bind_addr, &interface_up, &interface_num,
  420. totem_config->clear_node_high_bit);
  421. if (res == -1) {
  422. return (-1);
  423. }
  424. iter = icmap_iter_init("nodelist.node.");
  425. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  426. res = sscanf(iter_key, "nodelist.node.%u.%s", &node_pos, tmp_key);
  427. if (res != 2) {
  428. continue;
  429. }
  430. if (strcmp(tmp_key, "ring0_addr") != 0) {
  431. continue;
  432. }
  433. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.ring0_addr", node_pos);
  434. if (icmap_get_string(tmp_key, &node_addr_str) != CS_OK) {
  435. continue;
  436. }
  437. res = totemip_parse (&node_addr, node_addr_str, totem_config->ip_version);
  438. free(node_addr_str);
  439. if (res == -1) {
  440. continue ;
  441. }
  442. if (totemip_equal(&bind_addr, &node_addr)) {
  443. local_node_pos = node_pos;
  444. }
  445. }
  446. icmap_iter_finalize(iter);
  447. return (local_node_pos);
  448. }
  449. static void put_nodelist_members_to_config(struct totem_config *totem_config)
  450. {
  451. icmap_iter_t iter, iter2;
  452. const char *iter_key, *iter_key2;
  453. int res = 0;
  454. unsigned int node_pos;
  455. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  456. char tmp_key2[ICMAP_KEYNAME_MAXLEN];
  457. char *node_addr_str;
  458. int member_count;
  459. unsigned int ringnumber = 0;
  460. int i, j;
  461. /* Clear out nodelist so we can put the new one in if needed */
  462. for (i = 0; i < totem_config->interface_count; i++) {
  463. for (j = 0; j < PROCESSOR_COUNT_MAX; j++) {
  464. memset(&totem_config->interfaces[i].member_list[j], 0, sizeof(struct totem_ip_address));
  465. }
  466. totem_config->interfaces[i].member_count = 0;
  467. }
  468. iter = icmap_iter_init("nodelist.node.");
  469. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  470. res = sscanf(iter_key, "nodelist.node.%u.%s", &node_pos, tmp_key);
  471. if (res != 2) {
  472. continue;
  473. }
  474. if (strcmp(tmp_key, "ring0_addr") != 0) {
  475. continue;
  476. }
  477. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.", node_pos);
  478. iter2 = icmap_iter_init(tmp_key);
  479. while ((iter_key2 = icmap_iter_next(iter2, NULL, NULL)) != NULL) {
  480. res = sscanf(iter_key2, "nodelist.node.%u.ring%u%s", &node_pos, &ringnumber, tmp_key2);
  481. if (res != 3 || strcmp(tmp_key2, "_addr") != 0) {
  482. continue;
  483. }
  484. if (icmap_get_string(iter_key2, &node_addr_str) != CS_OK) {
  485. continue;
  486. }
  487. member_count = totem_config->interfaces[ringnumber].member_count;
  488. res = totemip_parse(&totem_config->interfaces[ringnumber].member_list[member_count],
  489. node_addr_str, totem_config->ip_version);
  490. if (res != -1) {
  491. totem_config->interfaces[ringnumber].member_count++;
  492. }
  493. free(node_addr_str);
  494. }
  495. icmap_iter_finalize(iter2);
  496. }
  497. icmap_iter_finalize(iter);
  498. }
  499. /*
  500. * Tries to find node (node_pos) in config nodelist which address matches any
  501. * local interface. Address can be stored in ring0_addr or if ipaddr_key_prefix is not NULL
  502. * key with prefix ipaddr_key is used (there can be multiuple of them)
  503. * This function differs * from find_local_node_in_nodelist because it doesn't need bindnetaddr,
  504. * but doesn't work when bind addr is network address (so IP must be exact
  505. * match).
  506. *
  507. * Returns 1 on success (address was found, node_pos is then correctly set) or 0 on failure.
  508. */
  509. int totem_config_find_local_addr_in_nodelist(const char *ipaddr_key_prefix, unsigned int *node_pos)
  510. {
  511. struct list_head addrs;
  512. struct totem_ip_if_address *if_addr;
  513. icmap_iter_t iter, iter2;
  514. const char *iter_key, *iter_key2;
  515. struct list_head *list;
  516. const char *ipaddr_key;
  517. int ip_version;
  518. struct totem_ip_address node_addr;
  519. char *node_addr_str;
  520. int node_found = 0;
  521. int res = 0;
  522. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  523. if (totemip_getifaddrs(&addrs) == -1) {
  524. return 0;
  525. }
  526. ip_version = totem_config_get_ip_version();
  527. iter = icmap_iter_init("nodelist.node.");
  528. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  529. res = sscanf(iter_key, "nodelist.node.%u.%s", node_pos, tmp_key);
  530. if (res != 2) {
  531. continue;
  532. }
  533. if (strcmp(tmp_key, "ring0_addr") != 0) {
  534. continue;
  535. }
  536. if (icmap_get_string(iter_key, &node_addr_str) != CS_OK) {
  537. continue ;
  538. }
  539. free(node_addr_str);
  540. /*
  541. * ring0_addr found -> let's iterate thru ipaddr_key_prefix
  542. */
  543. snprintf(tmp_key, sizeof(tmp_key), "nodelist.node.%u.%s", *node_pos,
  544. (ipaddr_key_prefix != NULL ? ipaddr_key_prefix : "ring0_addr"));
  545. iter2 = icmap_iter_init(tmp_key);
  546. while ((iter_key2 = icmap_iter_next(iter2, NULL, NULL)) != NULL) {
  547. /*
  548. * ring0_addr must be exact match, not prefix
  549. */
  550. ipaddr_key = (ipaddr_key_prefix != NULL ? iter_key2 : tmp_key);
  551. if (icmap_get_string(ipaddr_key, &node_addr_str) != CS_OK) {
  552. continue ;
  553. }
  554. if (totemip_parse(&node_addr, node_addr_str, ip_version) == -1) {
  555. free(node_addr_str);
  556. continue ;
  557. }
  558. free(node_addr_str);
  559. /*
  560. * Try to match ip with if_addrs
  561. */
  562. node_found = 0;
  563. for (list = addrs.next; list != &addrs; list = list->next) {
  564. if_addr = list_entry(list, struct totem_ip_if_address, list);
  565. if (totemip_equal(&node_addr, &if_addr->ip_addr)) {
  566. node_found = 1;
  567. break;
  568. }
  569. }
  570. if (node_found) {
  571. break ;
  572. }
  573. }
  574. icmap_iter_finalize(iter2);
  575. if (node_found) {
  576. break ;
  577. }
  578. }
  579. icmap_iter_finalize(iter);
  580. totemip_freeifaddrs(&addrs);
  581. return (node_found);
  582. }
  583. static void config_convert_nodelist_to_interface(struct totem_config *totem_config)
  584. {
  585. int res = 0;
  586. unsigned int node_pos;
  587. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  588. char tmp_key2[ICMAP_KEYNAME_MAXLEN];
  589. char *node_addr_str;
  590. unsigned int ringnumber = 0;
  591. icmap_iter_t iter;
  592. const char *iter_key;
  593. if (totem_config_find_local_addr_in_nodelist(NULL, &node_pos)) {
  594. /*
  595. * We found node, so create interface section
  596. */
  597. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.", node_pos);
  598. iter = icmap_iter_init(tmp_key);
  599. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  600. res = sscanf(iter_key, "nodelist.node.%u.ring%u%s", &node_pos, &ringnumber, tmp_key2);
  601. if (res != 3 || strcmp(tmp_key2, "_addr") != 0) {
  602. continue ;
  603. }
  604. if (icmap_get_string(iter_key, &node_addr_str) != CS_OK) {
  605. continue;
  606. }
  607. snprintf(tmp_key2, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.bindnetaddr", ringnumber);
  608. icmap_set_string(tmp_key2, node_addr_str);
  609. free(node_addr_str);
  610. }
  611. icmap_iter_finalize(iter);
  612. }
  613. }
  614. extern int totem_config_read (
  615. struct totem_config *totem_config,
  616. const char **error_string,
  617. uint64_t *warnings)
  618. {
  619. int res = 0;
  620. char *str;
  621. unsigned int ringnumber = 0;
  622. int member_count = 0;
  623. icmap_iter_t iter, member_iter;
  624. const char *iter_key;
  625. const char *member_iter_key;
  626. char ringnumber_key[ICMAP_KEYNAME_MAXLEN];
  627. char tmp_key[ICMAP_KEYNAME_MAXLEN];
  628. uint8_t u8;
  629. uint16_t u16;
  630. char *cluster_name = NULL;
  631. int i;
  632. int local_node_pos;
  633. int nodeid_set;
  634. *warnings = 0;
  635. memset (totem_config, 0, sizeof (struct totem_config));
  636. totem_config->interfaces = malloc (sizeof (struct totem_interface) * INTERFACE_MAX);
  637. if (totem_config->interfaces == 0) {
  638. *error_string = "Out of memory trying to allocate ethernet interface storage area";
  639. return -1;
  640. }
  641. memset (totem_config->interfaces, 0,
  642. sizeof (struct totem_interface) * INTERFACE_MAX);
  643. strcpy (totem_config->rrp_mode, "none");
  644. icmap_get_uint32("totem.version", (uint32_t *)&totem_config->version);
  645. if (totem_get_crypto(totem_config) != 0) {
  646. *error_string = "crypto_cipher requires crypto_hash with value other than none";
  647. return -1;
  648. }
  649. if (icmap_get_string("totem.rrp_mode", &str) == CS_OK) {
  650. if (strlen(str) >= TOTEM_RRP_MODE_BYTES) {
  651. *error_string = "totem.rrp_mode is too long";
  652. free(str);
  653. return -1;
  654. }
  655. strcpy (totem_config->rrp_mode, str);
  656. free(str);
  657. }
  658. icmap_get_uint32("totem.nodeid", &totem_config->node_id);
  659. totem_config->clear_node_high_bit = 0;
  660. if (icmap_get_string("totem.clear_node_high_bit", &str) == CS_OK) {
  661. if (strcmp (str, "yes") == 0) {
  662. totem_config->clear_node_high_bit = 1;
  663. }
  664. free(str);
  665. }
  666. icmap_get_uint32("totem.threads", &totem_config->threads);
  667. icmap_get_uint32("totem.netmtu", &totem_config->net_mtu);
  668. if (icmap_get_string("totem.cluster_name", &cluster_name) != CS_OK) {
  669. cluster_name = NULL;
  670. }
  671. totem_config->ip_version = totem_config_get_ip_version();
  672. if (icmap_get_string("totem.interface.0.bindnetaddr", &str) != CS_OK) {
  673. /*
  674. * We were not able to find ring 0 bindnet addr. Try to use nodelist informations
  675. */
  676. config_convert_nodelist_to_interface(totem_config);
  677. } else {
  678. free(str);
  679. }
  680. iter = icmap_iter_init("totem.interface.");
  681. while ((iter_key = icmap_iter_next(iter, NULL, NULL)) != NULL) {
  682. res = sscanf(iter_key, "totem.interface.%[^.].%s", ringnumber_key, tmp_key);
  683. if (res != 2) {
  684. continue;
  685. }
  686. if (strcmp(tmp_key, "bindnetaddr") != 0) {
  687. continue;
  688. }
  689. member_count = 0;
  690. ringnumber = atoi(ringnumber_key);
  691. if (ringnumber >= INTERFACE_MAX) {
  692. free(cluster_name);
  693. snprintf (error_string_response, sizeof(error_string_response),
  694. "parse error in config: interface ring number %u is bigger than allowed maximum %u\n",
  695. ringnumber, INTERFACE_MAX - 1);
  696. *error_string = error_string_response;
  697. return -1;
  698. }
  699. /*
  700. * Get the bind net address
  701. */
  702. if (icmap_get_string(iter_key, &str) == CS_OK) {
  703. res = totemip_parse (&totem_config->interfaces[ringnumber].bindnet, str,
  704. totem_config->interfaces[ringnumber].mcast_addr.family);
  705. free(str);
  706. }
  707. /*
  708. * Get interface multicast address
  709. */
  710. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastaddr", ringnumber);
  711. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  712. res = totemip_parse (&totem_config->interfaces[ringnumber].mcast_addr, str, totem_config->ip_version);
  713. free(str);
  714. } else {
  715. /*
  716. * User not specified address -> autogenerate one from cluster_name key
  717. * (if available)
  718. */
  719. res = get_cluster_mcast_addr (cluster_name,
  720. &totem_config->interfaces[ringnumber].bindnet,
  721. ringnumber,
  722. totem_config->ip_version,
  723. &totem_config->interfaces[ringnumber].mcast_addr);
  724. }
  725. totem_config->broadcast_use = 0;
  726. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.broadcast", ringnumber);
  727. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  728. if (strcmp (str, "yes") == 0) {
  729. totem_config->broadcast_use = 1;
  730. totemip_parse (
  731. &totem_config->interfaces[ringnumber].mcast_addr,
  732. "255.255.255.255", totem_config->ip_version);
  733. }
  734. free(str);
  735. }
  736. /*
  737. * Get mcast port
  738. */
  739. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastport", ringnumber);
  740. if (icmap_get_uint16(tmp_key, &totem_config->interfaces[ringnumber].ip_port) != CS_OK) {
  741. if (totem_config->broadcast_use) {
  742. totem_config->interfaces[ringnumber].ip_port = DEFAULT_PORT + (2 * ringnumber);
  743. } else {
  744. totem_config->interfaces[ringnumber].ip_port = DEFAULT_PORT;
  745. }
  746. }
  747. /*
  748. * Get the TTL
  749. */
  750. totem_config->interfaces[ringnumber].ttl = 1;
  751. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.ttl", ringnumber);
  752. if (icmap_get_uint8(tmp_key, &u8) == CS_OK) {
  753. totem_config->interfaces[ringnumber].ttl = u8;
  754. }
  755. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.member.", ringnumber);
  756. member_iter = icmap_iter_init(tmp_key);
  757. while ((member_iter_key = icmap_iter_next(member_iter, NULL, NULL)) != NULL) {
  758. if (member_count == 0) {
  759. if (icmap_get_string("nodelist.node.0.ring0_addr", &str) == CS_OK) {
  760. free(str);
  761. *warnings |= TOTEM_CONFIG_WARNING_MEMBERS_IGNORED;
  762. break;
  763. } else {
  764. *warnings |= TOTEM_CONFIG_WARNING_MEMBERS_DEPRECATED;
  765. }
  766. }
  767. if (icmap_get_string(member_iter_key, &str) == CS_OK) {
  768. res = totemip_parse (&totem_config->interfaces[ringnumber].member_list[member_count++],
  769. str, totem_config->ip_version);
  770. }
  771. }
  772. icmap_iter_finalize(member_iter);
  773. totem_config->interfaces[ringnumber].member_count = member_count;
  774. totem_config->interface_count++;
  775. }
  776. icmap_iter_finalize(iter);
  777. /*
  778. * Store automatically generated items back to icmap
  779. */
  780. for (i = 0; i < totem_config->interface_count; i++) {
  781. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastaddr", i);
  782. if (icmap_get_string(tmp_key, &str) == CS_OK) {
  783. free(str);
  784. } else {
  785. str = (char *)totemip_print(&totem_config->interfaces[i].mcast_addr);
  786. icmap_set_string(tmp_key, str);
  787. }
  788. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastport", i);
  789. if (icmap_get_uint16(tmp_key, &u16) != CS_OK) {
  790. icmap_set_uint16(tmp_key, totem_config->interfaces[i].ip_port);
  791. }
  792. }
  793. totem_config->transport_number = TOTEM_TRANSPORT_UDP;
  794. if (icmap_get_string("totem.transport", &str) == CS_OK) {
  795. if (strcmp (str, "udpu") == 0) {
  796. totem_config->transport_number = TOTEM_TRANSPORT_UDPU;
  797. }
  798. if (strcmp (str, "iba") == 0) {
  799. totem_config->transport_number = TOTEM_TRANSPORT_RDMA;
  800. }
  801. free(str);
  802. }
  803. free(cluster_name);
  804. /*
  805. * Check existence of nodelist
  806. */
  807. if (icmap_get_string("nodelist.node.0.ring0_addr", &str) == CS_OK) {
  808. free(str);
  809. /*
  810. * find local node
  811. */
  812. local_node_pos = find_local_node_in_nodelist(totem_config);
  813. if (local_node_pos != -1) {
  814. icmap_set_uint32("nodelist.local_node_pos", local_node_pos);
  815. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.nodeid", local_node_pos);
  816. nodeid_set = (totem_config->node_id != 0);
  817. if (icmap_get_uint32(tmp_key, &totem_config->node_id) == CS_OK && nodeid_set) {
  818. *warnings |= TOTEM_CONFIG_WARNING_TOTEM_NODEID_IGNORED;
  819. }
  820. /*
  821. * Make localnode ring0_addr read only, so we can be sure that local
  822. * node never changes. If rebinding to other IP would be in future
  823. * supported, this must be changed and handled properly!
  824. */
  825. snprintf(tmp_key, ICMAP_KEYNAME_MAXLEN, "nodelist.node.%u.ring0_addr", local_node_pos);
  826. icmap_set_ro_access(tmp_key, 0, 1);
  827. icmap_set_ro_access("nodelist.local_node_pos", 0, 1);
  828. }
  829. put_nodelist_members_to_config(totem_config);
  830. }
  831. /*
  832. * Get things that might change in the future (and can depend on totem_config->interfaces);
  833. */
  834. totem_volatile_config_read(totem_config, NULL);
  835. icmap_set_uint8("config.totemconfig_reload_in_progress", 0);
  836. add_totem_config_notification(totem_config);
  837. return 0;
  838. }
  839. int totem_config_validate (
  840. struct totem_config *totem_config,
  841. const char **error_string)
  842. {
  843. static char local_error_reason[512];
  844. char parse_error[512];
  845. const char *error_reason = local_error_reason;
  846. int i;
  847. unsigned int interface_max = INTERFACE_MAX;
  848. if (totem_config->interface_count == 0) {
  849. error_reason = "No interfaces defined";
  850. goto parse_error;
  851. }
  852. for (i = 0; i < totem_config->interface_count; i++) {
  853. /*
  854. * Some error checking of parsed data to make sure its valid
  855. */
  856. struct totem_ip_address null_addr;
  857. memset (&null_addr, 0, sizeof (struct totem_ip_address));
  858. if ((totem_config->transport_number == 0) &&
  859. memcmp (&totem_config->interfaces[i].mcast_addr, &null_addr,
  860. sizeof (struct totem_ip_address)) == 0) {
  861. error_reason = "No multicast address specified";
  862. goto parse_error;
  863. }
  864. if (totem_config->interfaces[i].ip_port == 0) {
  865. error_reason = "No multicast port specified";
  866. goto parse_error;
  867. }
  868. if (totem_config->interfaces[i].ttl > 255) {
  869. error_reason = "Invalid TTL (should be 0..255)";
  870. goto parse_error;
  871. }
  872. if (totem_config->transport_number != TOTEM_TRANSPORT_UDP &&
  873. totem_config->interfaces[i].ttl != 1) {
  874. error_reason = "Can only set ttl on multicast transport types";
  875. goto parse_error;
  876. }
  877. if (totem_config->interfaces[i].mcast_addr.family == AF_INET6 &&
  878. totem_config->node_id == 0) {
  879. error_reason = "An IPV6 network requires that a node ID be specified.";
  880. goto parse_error;
  881. }
  882. if (totem_config->broadcast_use == 0 && totem_config->transport_number == 0) {
  883. if (totem_config->interfaces[i].mcast_addr.family != totem_config->interfaces[i].bindnet.family) {
  884. error_reason = "Multicast address family does not match bind address family";
  885. goto parse_error;
  886. }
  887. if (totem_config->interfaces[i].mcast_addr.family != totem_config->interfaces[i].bindnet.family) {
  888. error_reason = "Not all bind address belong to the same IP family";
  889. goto parse_error;
  890. }
  891. if (totemip_is_mcast (&totem_config->interfaces[i].mcast_addr) != 0) {
  892. error_reason = "mcastaddr is not a correct multicast address.";
  893. goto parse_error;
  894. }
  895. }
  896. }
  897. if (totem_config->version != 2) {
  898. error_reason = "This totem parser can only parse version 2 configurations.";
  899. goto parse_error;
  900. }
  901. if (totem_volatile_config_validate(totem_config, error_string) == -1) {
  902. return (-1);
  903. }
  904. /*
  905. * RRP values validation
  906. */
  907. if (strcmp (totem_config->rrp_mode, "none") &&
  908. strcmp (totem_config->rrp_mode, "active") &&
  909. strcmp (totem_config->rrp_mode, "passive")) {
  910. snprintf (local_error_reason, sizeof(local_error_reason),
  911. "The RRP mode \"%s\" specified is invalid. It must be none, active, or passive.\n", totem_config->rrp_mode);
  912. goto parse_error;
  913. }
  914. if (strcmp (totem_config->rrp_mode, "none") == 0) {
  915. interface_max = 1;
  916. }
  917. if (interface_max < totem_config->interface_count) {
  918. snprintf (parse_error, sizeof(parse_error),
  919. "%d is too many configured interfaces for the rrp_mode setting %s.",
  920. totem_config->interface_count,
  921. totem_config->rrp_mode);
  922. error_reason = parse_error;
  923. goto parse_error;
  924. }
  925. if (totem_config->net_mtu == 0) {
  926. totem_config->net_mtu = 1500;
  927. }
  928. return 0;
  929. parse_error:
  930. snprintf (error_string_response, sizeof(error_string_response),
  931. "parse error in config: %s\n", error_reason);
  932. *error_string = error_string_response;
  933. return (-1);
  934. }
  935. static int read_keyfile (
  936. const char *key_location,
  937. struct totem_config *totem_config,
  938. const char **error_string)
  939. {
  940. int fd;
  941. int res;
  942. ssize_t expected_key_len = sizeof (totem_config->private_key);
  943. int saved_errno;
  944. char error_str[100];
  945. const char *error_ptr;
  946. fd = open (key_location, O_RDONLY);
  947. if (fd == -1) {
  948. error_ptr = qb_strerror_r(errno, error_str, sizeof(error_str));
  949. snprintf (error_string_response, sizeof(error_string_response),
  950. "Could not open %s: %s\n",
  951. key_location, error_ptr);
  952. goto parse_error;
  953. }
  954. res = read (fd, totem_config->private_key, expected_key_len);
  955. saved_errno = errno;
  956. close (fd);
  957. if (res == -1) {
  958. error_ptr = qb_strerror_r (saved_errno, error_str, sizeof(error_str));
  959. snprintf (error_string_response, sizeof(error_string_response),
  960. "Could not read %s: %s\n",
  961. key_location, error_ptr);
  962. goto parse_error;
  963. }
  964. totem_config->private_key_len = expected_key_len;
  965. if (res != expected_key_len) {
  966. snprintf (error_string_response, sizeof(error_string_response),
  967. "Could only read %d bits of 1024 bits from %s.\n",
  968. res * 8, key_location);
  969. goto parse_error;
  970. }
  971. return 0;
  972. parse_error:
  973. *error_string = error_string_response;
  974. return (-1);
  975. }
  976. int totem_config_keyread (
  977. struct totem_config *totem_config,
  978. const char **error_string)
  979. {
  980. int got_key = 0;
  981. char *key_location = NULL;
  982. int res;
  983. size_t key_len;
  984. memset (totem_config->private_key, 0, 128);
  985. totem_config->private_key_len = 128;
  986. if (strcmp(totem_config->crypto_cipher_type, "none") == 0 &&
  987. strcmp(totem_config->crypto_hash_type, "none") == 0) {
  988. return (0);
  989. }
  990. /* cmap may store the location of the key file */
  991. if (icmap_get_string("totem.keyfile", &key_location) == CS_OK) {
  992. res = read_keyfile(key_location, totem_config, error_string);
  993. free(key_location);
  994. if (res) {
  995. goto key_error;
  996. }
  997. got_key = 1;
  998. } else { /* Or the key itself may be in the cmap */
  999. if (icmap_get("totem.key", NULL, &key_len, NULL) == CS_OK) {
  1000. if (key_len > sizeof (totem_config->private_key)) {
  1001. sprintf(error_string_response, "key is too long");
  1002. goto key_error;
  1003. }
  1004. if (icmap_get("totem.key", totem_config->private_key, &key_len, NULL) == CS_OK) {
  1005. totem_config->private_key_len = key_len;
  1006. got_key = 1;
  1007. } else {
  1008. sprintf(error_string_response, "can't store private key");
  1009. goto key_error;
  1010. }
  1011. }
  1012. }
  1013. /* In desperation we read the default filename */
  1014. if (!got_key) {
  1015. const char *filename = getenv("COROSYNC_TOTEM_AUTHKEY_FILE");
  1016. if (!filename)
  1017. filename = COROSYSCONFDIR "/authkey";
  1018. res = read_keyfile(filename, totem_config, error_string);
  1019. if (res)
  1020. goto key_error;
  1021. }
  1022. return (0);
  1023. key_error:
  1024. *error_string = error_string_response;
  1025. return (-1);
  1026. }
  1027. static void debug_dump_totem_config(const struct totem_config *totem_config)
  1028. {
  1029. log_printf(LOGSYS_LEVEL_DEBUG, "Token Timeout (%d ms) retransmit timeout (%d ms)",
  1030. totem_config->token_timeout, totem_config->token_retransmit_timeout);
  1031. log_printf(LOGSYS_LEVEL_DEBUG, "token hold (%d ms) retransmits before loss (%d retrans)",
  1032. totem_config->token_hold_timeout, totem_config->token_retransmits_before_loss_const);
  1033. log_printf(LOGSYS_LEVEL_DEBUG, "join (%d ms) send_join (%d ms) consensus (%d ms) merge (%d ms)",
  1034. totem_config->join_timeout, totem_config->send_join_timeout, totem_config->consensus_timeout,
  1035. totem_config->merge_timeout);
  1036. log_printf(LOGSYS_LEVEL_DEBUG, "downcheck (%d ms) fail to recv const (%d msgs)",
  1037. totem_config->downcheck_timeout, totem_config->fail_to_recv_const);
  1038. log_printf(LOGSYS_LEVEL_DEBUG,
  1039. "seqno unchanged const (%d rotations) Maximum network MTU %d",
  1040. totem_config->seqno_unchanged_const, totem_config->net_mtu);
  1041. log_printf(LOGSYS_LEVEL_DEBUG,
  1042. "window size per rotation (%d messages) maximum messages per rotation (%d messages)",
  1043. totem_config->window_size, totem_config->max_messages);
  1044. log_printf(LOGSYS_LEVEL_DEBUG, "missed count const (%d messages)", totem_config->miss_count_const);
  1045. log_printf(LOGSYS_LEVEL_DEBUG, "RRP token expired timeout (%d ms)",
  1046. totem_config->rrp_token_expired_timeout);
  1047. log_printf(LOGSYS_LEVEL_DEBUG, "RRP token problem counter (%d ms)",
  1048. totem_config->rrp_problem_count_timeout);
  1049. log_printf(LOGSYS_LEVEL_DEBUG, "RRP threshold (%d problem count)",
  1050. totem_config->rrp_problem_count_threshold);
  1051. log_printf(LOGSYS_LEVEL_DEBUG, "RRP multicast threshold (%d problem count)",
  1052. totem_config->rrp_problem_count_mcast_threshold);
  1053. log_printf(LOGSYS_LEVEL_DEBUG, "RRP automatic recovery check timeout (%d ms)",
  1054. totem_config->rrp_autorecovery_check_timeout);
  1055. log_printf(LOGSYS_LEVEL_DEBUG, "RRP mode set to %s.",
  1056. totem_config->rrp_mode);
  1057. log_printf(LOGSYS_LEVEL_DEBUG, "heartbeat_failures_allowed (%d)",
  1058. totem_config->heartbeat_failures_allowed);
  1059. log_printf(LOGSYS_LEVEL_DEBUG, "max_network_delay (%d ms)", totem_config->max_network_delay);
  1060. }
  1061. static void totem_change_notify(
  1062. int32_t event,
  1063. const char *key_name,
  1064. struct icmap_notify_value new_val,
  1065. struct icmap_notify_value old_val,
  1066. void *user_data)
  1067. {
  1068. struct totem_config *totem_config = (struct totem_config *)user_data;
  1069. uint32_t *param;
  1070. uint8_t reloading;
  1071. const char *deleted_key = NULL;
  1072. const char *error_string;
  1073. /*
  1074. * If a full reload is in progress then don't do anything until it's done and
  1075. * can reconfigure it all atomically
  1076. */
  1077. if (icmap_get_uint8("config.reload_in_progress", &reloading) == CS_OK && reloading)
  1078. return;
  1079. param = totem_get_param_by_name((struct totem_config *)user_data, key_name);
  1080. /*
  1081. * Process change only if changed key is found in totem_config (-> param is not NULL)
  1082. * or for special key token_coefficient. token_coefficient key is not stored in
  1083. * totem_config, but it is used for computation of token timeout.
  1084. */
  1085. if (!param && strcmp(key_name, "totem.token_coefficient") != 0)
  1086. return;
  1087. /*
  1088. * Values other than UINT32 are not supported, or needed (yet)
  1089. */
  1090. switch (event) {
  1091. case ICMAP_TRACK_DELETE:
  1092. deleted_key = key_name;
  1093. break;
  1094. case ICMAP_TRACK_ADD:
  1095. case ICMAP_TRACK_MODIFY:
  1096. deleted_key = NULL;
  1097. break;
  1098. default:
  1099. break;
  1100. }
  1101. totem_volatile_config_read (totem_config, deleted_key);
  1102. log_printf(LOGSYS_LEVEL_DEBUG, "Totem related config key changed. Dumping actual totem config.");
  1103. debug_dump_totem_config(totem_config);
  1104. if (totem_volatile_config_validate(totem_config, &error_string) == -1) {
  1105. log_printf (LOGSYS_LEVEL_ERROR, "%s", error_string);
  1106. /*
  1107. * TODO: Consider corosync exit and/or load defaults for volatile
  1108. * values. For now, log error seems to be enough
  1109. */
  1110. }
  1111. }
  1112. static void totem_reload_notify(
  1113. int32_t event,
  1114. const char *key_name,
  1115. struct icmap_notify_value new_val,
  1116. struct icmap_notify_value old_val,
  1117. void *user_data)
  1118. {
  1119. struct totem_config *totem_config = (struct totem_config *)user_data;
  1120. uint32_t local_node_pos;
  1121. const char *error_string;
  1122. /* Reload has completed */
  1123. if (*(uint8_t *)new_val.data == 0) {
  1124. put_nodelist_members_to_config (totem_config);
  1125. totem_volatile_config_read (totem_config, NULL);
  1126. log_printf(LOGSYS_LEVEL_DEBUG, "Configuration reloaded. Dumping actual totem config.");
  1127. debug_dump_totem_config(totem_config);
  1128. if (totem_volatile_config_validate(totem_config, &error_string) == -1) {
  1129. log_printf (LOGSYS_LEVEL_ERROR, "%s", error_string);
  1130. /*
  1131. * TODO: Consider corosync exit and/or load defaults for volatile
  1132. * values. For now, log error seems to be enough
  1133. */
  1134. }
  1135. /* Reinstate the local_node_pos */
  1136. local_node_pos = find_local_node_in_nodelist(totem_config);
  1137. if (local_node_pos != -1) {
  1138. icmap_set_uint32("nodelist.local_node_pos", local_node_pos);
  1139. }
  1140. icmap_set_uint8("config.totemconfig_reload_in_progress", 0);
  1141. } else {
  1142. icmap_set_uint8("config.totemconfig_reload_in_progress", 1);
  1143. }
  1144. }
  1145. static void add_totem_config_notification(struct totem_config *totem_config)
  1146. {
  1147. icmap_track_t icmap_track;
  1148. icmap_track_add("totem.",
  1149. ICMAP_TRACK_ADD | ICMAP_TRACK_DELETE | ICMAP_TRACK_MODIFY | ICMAP_TRACK_PREFIX,
  1150. totem_change_notify,
  1151. totem_config,
  1152. &icmap_track);
  1153. icmap_track_add("config.reload_in_progress",
  1154. ICMAP_TRACK_ADD | ICMAP_TRACK_MODIFY,
  1155. totem_reload_notify,
  1156. totem_config,
  1157. &icmap_track);
  1158. }