coroparse.c 25 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012
  1. /*
  2. * Copyright (c) 2006, 2011 Red Hat, Inc.
  3. *
  4. * All rights reserved.
  5. *
  6. * Author: Patrick Caulfield (pcaulfie@redhat.com)
  7. * Jan Friesse (jfriesse@redhat.com)
  8. *
  9. * This software licensed under BSD license, the text of which follows:
  10. *
  11. * Redistribution and use in source and binary forms, with or without
  12. * modification, are permitted provided that the following conditions are met:
  13. *
  14. * - Redistributions of source code must retain the above copyright notice,
  15. * this list of conditions and the following disclaimer.
  16. * - Redistributions in binary form must reproduce the above copyright notice,
  17. * this list of conditions and the following disclaimer in the documentation
  18. * and/or other materials provided with the distribution.
  19. * - Neither the name of the MontaVista Software, Inc. nor the names of its
  20. * contributors may be used to endorse or promote products derived from this
  21. * software without specific prior written permission.
  22. *
  23. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  24. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  25. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  26. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
  27. * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  28. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  29. * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  30. * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  31. * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  32. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
  33. * THE POSSIBILITY OF SUCH DAMAGE.
  34. */
  35. #include <config.h>
  36. #include <sys/types.h>
  37. #include <sys/uio.h>
  38. #include <sys/socket.h>
  39. #include <sys/stat.h>
  40. #include <sys/un.h>
  41. #include <netinet/in.h>
  42. #include <arpa/inet.h>
  43. #include <unistd.h>
  44. #include <fcntl.h>
  45. #include <stdlib.h>
  46. #include <stdio.h>
  47. #include <errno.h>
  48. #include <string.h>
  49. #include <dirent.h>
  50. #include <limits.h>
  51. #include <stddef.h>
  52. #include <grp.h>
  53. #include <pwd.h>
  54. #include <corosync/list.h>
  55. #include <corosync/lcr/lcr_comp.h>
  56. #include <qb/qbutil.h>
  57. #define LOGSYS_UTILS_ONLY 1
  58. #include <corosync/logsys.h>
  59. #include <corosync/icmap.h>
  60. #include <corosync/engine/config.h>
  61. #include "main.h"
  62. #include "util.h"
  63. enum parser_cb_type {
  64. PARSER_CB_START,
  65. PARSER_CB_END,
  66. PARSER_CB_SECTION_START,
  67. PARSER_CB_SECTION_END,
  68. PARSER_CB_ITEM,
  69. };
  70. typedef int (*parser_cb_f)(const char *path,
  71. char *key,
  72. char *value,
  73. enum parser_cb_type type,
  74. const char **error_string,
  75. void *user_data);
  76. enum main_cp_cb_data_state {
  77. MAIN_CP_CB_DATA_STATE_NORMAL,
  78. MAIN_CP_CB_DATA_STATE_TOTEM,
  79. MAIN_CP_CB_DATA_STATE_INTERFACE,
  80. MAIN_CP_CB_DATA_STATE_LOGGER_SUBSYS,
  81. MAIN_CP_CB_DATA_STATE_UIDGID,
  82. MAIN_CP_CB_DATA_STATE_LOGGING_DAEMON,
  83. MAIN_CP_CB_DATA_STATE_MEMBER,
  84. MAIN_CP_CB_DATA_STATE_QUORUM,
  85. };
  86. struct key_value_list_item {
  87. char *key;
  88. char *value;
  89. struct list_head list;
  90. };
  91. struct main_cp_cb_data {
  92. enum main_cp_cb_data_state state;
  93. int ringnumber;
  94. char *bindnetaddr;
  95. char *mcastaddr;
  96. char *broadcast;
  97. int mcastport;
  98. int ttl;
  99. struct list_head logger_subsys_items_head;
  100. char *subsys;
  101. char *logging_daemon_name;
  102. struct list_head member_items_head;
  103. };
  104. static int read_config_file_into_icmap(
  105. const char **error_string);
  106. static char error_string_response[512];
  107. static int uid_determine (const char *req_user)
  108. {
  109. int pw_uid = 0;
  110. struct passwd passwd;
  111. struct passwd* pwdptr = &passwd;
  112. struct passwd* temp_pwd_pt;
  113. char *pwdbuffer;
  114. int pwdlinelen;
  115. pwdlinelen = sysconf (_SC_GETPW_R_SIZE_MAX);
  116. if (pwdlinelen == -1) {
  117. pwdlinelen = 256;
  118. }
  119. pwdbuffer = malloc (pwdlinelen);
  120. if ((getpwnam_r (req_user, pwdptr, pwdbuffer, pwdlinelen, &temp_pwd_pt)) != 0) {
  121. sprintf (error_string_response,
  122. "The '%s' user is not found in /etc/passwd, please read the documentation.",
  123. req_user);
  124. return (-1);
  125. }
  126. pw_uid = passwd.pw_uid;
  127. free (pwdbuffer);
  128. return pw_uid;
  129. }
  130. static int gid_determine (const char *req_group)
  131. {
  132. int corosync_gid = 0;
  133. struct group group;
  134. struct group * grpptr = &group;
  135. struct group * temp_grp_pt;
  136. char *grpbuffer;
  137. int grplinelen;
  138. grplinelen = sysconf (_SC_GETGR_R_SIZE_MAX);
  139. if (grplinelen == -1) {
  140. grplinelen = 256;
  141. }
  142. grpbuffer = malloc (grplinelen);
  143. if ((getgrnam_r (req_group, grpptr, grpbuffer, grplinelen, &temp_grp_pt)) != 0) {
  144. sprintf (error_string_response,
  145. "The '%s' group is not found in /etc/group, please read the documentation.",
  146. req_group);
  147. return (-1);
  148. }
  149. corosync_gid = group.gr_gid;
  150. free (grpbuffer);
  151. return corosync_gid;
  152. }
  153. static char *strchr_rs (const char *haystack, int byte)
  154. {
  155. const char *end_address = strchr (haystack, byte);
  156. if (end_address) {
  157. end_address += 1; /* skip past { or = */
  158. while (*end_address == ' ' || *end_address == '\t')
  159. end_address++;
  160. }
  161. return ((char *) end_address);
  162. }
  163. int coroparse_configparse (const char **error_string)
  164. {
  165. if (read_config_file_into_icmap(error_string)) {
  166. return -1;
  167. }
  168. return 0;
  169. }
  170. static char *remove_whitespace(char *string)
  171. {
  172. char *start;
  173. char *end;
  174. start = string;
  175. while (*start == ' ' || *start == '\t')
  176. start++;
  177. end = start+(strlen(start))-1;
  178. while ((*end == ' ' || *end == '\t' || *end == ':' || *end == '{') && end > start)
  179. end--;
  180. if (end != start)
  181. *(end+1) = '\0';
  182. return start;
  183. }
  184. static int parse_section(FILE *fp,
  185. char *path,
  186. const char **error_string,
  187. parser_cb_f parser_cb,
  188. void *user_data)
  189. {
  190. char line[512];
  191. int i;
  192. char *loc;
  193. int ignore_line;
  194. char new_keyname[ICMAP_KEYNAME_MAXLEN];
  195. if (strcmp(path, "") == 0) {
  196. parser_cb("", NULL, NULL, PARSER_CB_START, error_string, user_data);
  197. }
  198. while (fgets (line, sizeof (line), fp)) {
  199. if (strlen(line) > 0) {
  200. if (line[strlen(line) - 1] == '\n')
  201. line[strlen(line) - 1] = '\0';
  202. if (strlen (line) > 0 && line[strlen(line) - 1] == '\r')
  203. line[strlen(line) - 1] = '\0';
  204. }
  205. /*
  206. * Clear out white space and tabs
  207. */
  208. for (i = strlen (line) - 1; i > -1; i--) {
  209. if (line[i] == '\t' || line[i] == ' ') {
  210. line[i] = '\0';
  211. } else {
  212. break;
  213. }
  214. }
  215. ignore_line = 1;
  216. for (i = 0; i < strlen (line); i++) {
  217. if (line[i] != '\t' && line[i] != ' ') {
  218. if (line[i] != '#')
  219. ignore_line = 0;
  220. break;
  221. }
  222. }
  223. /*
  224. * Clear out comments and empty lines
  225. */
  226. if (ignore_line) {
  227. continue;
  228. }
  229. /* New section ? */
  230. if ((loc = strchr_rs (line, '{'))) {
  231. char *section = remove_whitespace(line);
  232. loc--;
  233. *loc = '\0';
  234. strcpy(new_keyname, path);
  235. if (strcmp(path, "") != 0) {
  236. strcat(new_keyname, ".");
  237. }
  238. strcat(new_keyname, section);
  239. if (!parser_cb(new_keyname, NULL, NULL, PARSER_CB_SECTION_START, error_string, user_data)) {
  240. return -1;
  241. }
  242. if (parse_section(fp, new_keyname, error_string, parser_cb, user_data))
  243. return -1;
  244. }
  245. /* New key/value */
  246. if ((loc = strchr_rs (line, ':'))) {
  247. char *key;
  248. char *value;
  249. *(loc-1) = '\0';
  250. key = remove_whitespace(line);
  251. value = remove_whitespace(loc);
  252. strcpy(new_keyname, path);
  253. if (strcmp(path, "") != 0) {
  254. strcat(new_keyname, ".");
  255. }
  256. strcat(new_keyname, key);
  257. if (!parser_cb(new_keyname, key, value, PARSER_CB_ITEM, error_string, user_data)) {
  258. return -1;
  259. }
  260. }
  261. if (strchr_rs (line, '}')) {
  262. if (!parser_cb(path, NULL, NULL, PARSER_CB_SECTION_END, error_string, user_data)) {
  263. return -1;
  264. }
  265. return 0;
  266. }
  267. }
  268. if (strcmp(path, "") != 0) {
  269. *error_string = "Missing closing brace";
  270. return -1;
  271. }
  272. if (strcmp(path, "") == 0) {
  273. parser_cb("", NULL, NULL, PARSER_CB_END, error_string, user_data);
  274. }
  275. return 0;
  276. }
  277. static int main_config_parser_cb(const char *path,
  278. char *key,
  279. char *value,
  280. enum parser_cb_type type,
  281. const char **error_string,
  282. void *user_data)
  283. {
  284. int i;
  285. int add_as_string;
  286. char key_name[ICMAP_KEYNAME_MAXLEN];
  287. struct main_cp_cb_data *data = (struct main_cp_cb_data *)user_data;
  288. struct key_value_list_item *kv_item;
  289. struct list_head *iter, *iter_next;
  290. int uid, gid;
  291. switch (type) {
  292. case PARSER_CB_START:
  293. memset(data, 0, sizeof(struct main_cp_cb_data));
  294. data->state = MAIN_CP_CB_DATA_STATE_NORMAL;
  295. break;
  296. case PARSER_CB_END:
  297. break;
  298. case PARSER_CB_ITEM:
  299. add_as_string = 1;
  300. switch (data->state) {
  301. case MAIN_CP_CB_DATA_STATE_NORMAL:
  302. break;
  303. case MAIN_CP_CB_DATA_STATE_QUORUM:
  304. if ((strcmp(path, "quorum.expected_votes") == 0) ||
  305. (strcmp(path, "quorum.votes") == 0) ||
  306. (strcmp(path, "quorum.quorumdev_poll") == 0) ||
  307. (strcmp(path, "quorum.last_man_standing_window") == 0) ||
  308. (strcmp(path, "quorum.leaving_timeout") == 0)) {
  309. i = atoi(value);
  310. icmap_set_uint32(path, i);
  311. add_as_string = 0;
  312. }
  313. if ((strcmp(path, "quorum.two_node") == 0) ||
  314. (strcmp(path, "quorum.wait_for_all") == 0) ||
  315. (strcmp(path, "quorum.auto_tie_breaker") == 0) ||
  316. (strcmp(path, "quorum.last_man_standing") == 0) ||
  317. (strcmp(path, "quorum.quorate") == 0)) {
  318. i = atoi(value);
  319. icmap_set_uint8(path, i);
  320. add_as_string = 0;
  321. }
  322. break;
  323. case MAIN_CP_CB_DATA_STATE_TOTEM:
  324. if ((strcmp(path, "totem.version") == 0) ||
  325. (strcmp(path, "totem.nodeid") == 0) ||
  326. (strcmp(path, "totem.threads") == 0) ||
  327. (strcmp(path, "totem.token") == 0) ||
  328. (strcmp(path, "totem.token_retransmit") == 0) ||
  329. (strcmp(path, "totem.hold") == 0) ||
  330. (strcmp(path, "totem.token_retransmits_before_loss_const") == 0) ||
  331. (strcmp(path, "totem.join") == 0) ||
  332. (strcmp(path, "totem.send_join") == 0) ||
  333. (strcmp(path, "totem.consensus") == 0) ||
  334. (strcmp(path, "totem.merge") == 0) ||
  335. (strcmp(path, "totem.downcheck") == 0) ||
  336. (strcmp(path, "totem.fail_recv_const") == 0) ||
  337. (strcmp(path, "totem.seqno_unchanged_const") == 0) ||
  338. (strcmp(path, "totem.rrp_token_expired_timeout") == 0) ||
  339. (strcmp(path, "totem.rrp_problem_count_timeout") == 0) ||
  340. (strcmp(path, "totem.rrp_problem_count_threshold") == 0) ||
  341. (strcmp(path, "totem.rrp_problem_count_mcast_threshold") == 0) ||
  342. (strcmp(path, "totem.rrp_autorecovery_check_timeout") == 0) ||
  343. (strcmp(path, "totem.heartbeat_failures_allowed") == 0) ||
  344. (strcmp(path, "totem.max_network_delay") == 0) ||
  345. (strcmp(path, "totem.window_size") == 0) ||
  346. (strcmp(path, "totem.max_messages") == 0) ||
  347. (strcmp(path, "totem.miss_count_const") == 0) ||
  348. (strcmp(path, "totem.netmtu") == 0)) {
  349. i = atoi(value);
  350. icmap_set_uint32(path, i);
  351. add_as_string = 0;
  352. }
  353. case MAIN_CP_CB_DATA_STATE_INTERFACE:
  354. if (strcmp(path, "totem.interface.ringnumber") == 0) {
  355. data->ringnumber = atoi(value);
  356. add_as_string = 0;
  357. }
  358. if (strcmp(path, "totem.interface.bindnetaddr") == 0) {
  359. data->bindnetaddr = strdup(value);
  360. add_as_string = 0;
  361. }
  362. if (strcmp(path, "totem.interface.mcastaddr") == 0) {
  363. data->mcastaddr = strdup(value);
  364. add_as_string = 0;
  365. }
  366. if (strcmp(path, "totem.interface.broadcast") == 0) {
  367. data->broadcast = strdup(value);
  368. add_as_string = 0;
  369. }
  370. if (strcmp(path, "totem.interface.mcastport") == 0) {
  371. data->mcastport = atoi(value);
  372. if (data->mcastport < 0 || data->mcastport > 65535) {
  373. *error_string = "Invalid multicast port (should be 0..65535)";
  374. return (0);
  375. };
  376. add_as_string = 0;
  377. }
  378. if (strcmp(path, "totem.interface.ttl") == 0) {
  379. data->ttl = atoi(value);
  380. if (data->ttl < 0 || data->ttl > 255) {
  381. *error_string = "Invalid TTL (should be 0..255)";
  382. return (0);
  383. };
  384. add_as_string = 0;
  385. }
  386. break;
  387. case MAIN_CP_CB_DATA_STATE_LOGGER_SUBSYS:
  388. if (strcmp(key, "subsys") == 0) {
  389. data->subsys = strdup(value);
  390. if (data->subsys == NULL) {
  391. *error_string = "Can't alloc memory";
  392. return (0);
  393. }
  394. } else {
  395. kv_item = malloc(sizeof(*kv_item));
  396. if (kv_item == NULL) {
  397. *error_string = "Can't alloc memory";
  398. return (0);
  399. }
  400. memset(kv_item, 0, sizeof(*kv_item));
  401. kv_item->key = strdup(key);
  402. kv_item->value = strdup(value);
  403. if (kv_item->key == NULL || kv_item->value == NULL) {
  404. free(kv_item);
  405. *error_string = "Can't alloc memory";
  406. return (0);
  407. }
  408. list_init(&kv_item->list);
  409. list_add(&kv_item->list, &data->logger_subsys_items_head);
  410. }
  411. add_as_string = 0;
  412. break;
  413. case MAIN_CP_CB_DATA_STATE_LOGGING_DAEMON:
  414. if (strcmp(key, "subsys") == 0) {
  415. data->subsys = strdup(value);
  416. if (data->subsys == NULL) {
  417. *error_string = "Can't alloc memory";
  418. return (0);
  419. }
  420. } else if (strcmp(key, "name") == 0) {
  421. data->logging_daemon_name = strdup(value);
  422. if (data->logging_daemon_name == NULL) {
  423. *error_string = "Can't alloc memory";
  424. return (0);
  425. }
  426. } else {
  427. kv_item = malloc(sizeof(*kv_item));
  428. if (kv_item == NULL) {
  429. *error_string = "Can't alloc memory";
  430. return (0);
  431. }
  432. memset(kv_item, 0, sizeof(*kv_item));
  433. kv_item->key = strdup(key);
  434. kv_item->value = strdup(value);
  435. if (kv_item->key == NULL || kv_item->value == NULL) {
  436. free(kv_item);
  437. *error_string = "Can't alloc memory";
  438. return (0);
  439. }
  440. list_init(&kv_item->list);
  441. list_add(&kv_item->list, &data->logger_subsys_items_head);
  442. }
  443. add_as_string = 0;
  444. break;
  445. case MAIN_CP_CB_DATA_STATE_UIDGID:
  446. if (strcmp(key, "uid") == 0) {
  447. uid = uid_determine(value);
  448. if (uid == -1) {
  449. *error_string = error_string_response;
  450. return (0);
  451. }
  452. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "uidgid.uid.%u",
  453. uid);
  454. icmap_set_uint8(key_name, 1);
  455. add_as_string = 0;
  456. } else if (strcmp(key, "gid") == 0) {
  457. gid = gid_determine(value);
  458. if (gid == -1) {
  459. *error_string = error_string_response;
  460. return (0);
  461. }
  462. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "uidgid.gid.%u",
  463. gid);
  464. icmap_set_uint8(key_name, 1);
  465. add_as_string = 0;
  466. } else {
  467. *error_string = "uidgid: Only uid and gid are allowed items";
  468. return (0);
  469. }
  470. break;
  471. case MAIN_CP_CB_DATA_STATE_MEMBER:
  472. if (strcmp(key, "memberaddr") != 0) {
  473. *error_string = "Only memberaddr is allowed in member section";
  474. return (0);
  475. }
  476. kv_item = malloc(sizeof(*kv_item));
  477. if (kv_item == NULL) {
  478. *error_string = "Can't alloc memory";
  479. return (0);
  480. }
  481. memset(kv_item, 0, sizeof(*kv_item));
  482. kv_item->key = strdup(key);
  483. kv_item->value = strdup(value);
  484. if (kv_item->key == NULL || kv_item->value == NULL) {
  485. free(kv_item);
  486. *error_string = "Can't alloc memory";
  487. return (0);
  488. }
  489. list_init(&kv_item->list);
  490. list_add(&kv_item->list, &data->member_items_head);
  491. add_as_string = 0;
  492. break;
  493. }
  494. if (add_as_string) {
  495. icmap_set_string(path, value);
  496. }
  497. break;
  498. case PARSER_CB_SECTION_START:
  499. if (strcmp(path, "totem.interface") == 0) {
  500. data->state = MAIN_CP_CB_DATA_STATE_INTERFACE;
  501. data->ringnumber = 0;
  502. data->mcastport = -1;
  503. data->ttl = -1;
  504. list_init(&data->member_items_head);
  505. };
  506. if (strcmp(path, "totem") == 0) {
  507. data->state = MAIN_CP_CB_DATA_STATE_TOTEM;
  508. };
  509. if (strcmp(path, "logging.logger_subsys") == 0) {
  510. data->state = MAIN_CP_CB_DATA_STATE_LOGGER_SUBSYS;
  511. list_init(&data->logger_subsys_items_head);
  512. data->subsys = NULL;
  513. }
  514. if (strcmp(path, "logging.logging_daemon") == 0) {
  515. data->state = MAIN_CP_CB_DATA_STATE_LOGGING_DAEMON;
  516. list_init(&data->logger_subsys_items_head);
  517. data->subsys = NULL;
  518. data->logging_daemon_name = NULL;
  519. }
  520. if (strcmp(path, "uidgid") == 0) {
  521. data->state = MAIN_CP_CB_DATA_STATE_UIDGID;
  522. }
  523. if (strcmp(path, "totem.interface.member") == 0) {
  524. data->state = MAIN_CP_CB_DATA_STATE_MEMBER;
  525. }
  526. if (strcmp(path, "quorum") == 0) {
  527. data->state = MAIN_CP_CB_DATA_STATE_QUORUM;
  528. }
  529. break;
  530. case PARSER_CB_SECTION_END:
  531. switch (data->state) {
  532. case MAIN_CP_CB_DATA_STATE_NORMAL:
  533. break;
  534. case MAIN_CP_CB_DATA_STATE_INTERFACE:
  535. /*
  536. * Create new interface section
  537. */
  538. if (data->bindnetaddr != NULL) {
  539. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.bindnetaddr",
  540. data->ringnumber);
  541. icmap_set_string(key_name, data->bindnetaddr);
  542. free(data->bindnetaddr);
  543. data->bindnetaddr = NULL;
  544. } else {
  545. *error_string = "No bindnetaddr for interface";
  546. return (0);
  547. }
  548. if (data->mcastaddr != NULL) {
  549. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastaddr",
  550. data->ringnumber);
  551. icmap_set_string(key_name, data->mcastaddr);
  552. free(data->mcastaddr);
  553. data->mcastaddr = NULL;
  554. }
  555. if (data->broadcast != NULL) {
  556. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.broadcast",
  557. data->ringnumber);
  558. icmap_set_string(key_name, data->broadcast);
  559. free(data->broadcast);
  560. data->broadcast = NULL;
  561. }
  562. if (data->mcastport > -1) {
  563. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.mcastport",
  564. data->ringnumber);
  565. icmap_set_uint16(key_name, data->mcastport);
  566. }
  567. if (data->ttl > -1) {
  568. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.ttl",
  569. data->ringnumber);
  570. icmap_set_uint8(key_name, data->ttl);
  571. }
  572. i = 0;
  573. for (iter = data->member_items_head.next;
  574. iter != &data->member_items_head; iter = iter_next) {
  575. kv_item = list_entry(iter, struct key_value_list_item, list);
  576. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "totem.interface.%u.member.%u",
  577. data->ringnumber, i);
  578. icmap_set_string(key_name, kv_item->value);
  579. iter_next = iter->next;
  580. free(kv_item->value);
  581. free(kv_item->key);
  582. free(kv_item);
  583. i++;
  584. }
  585. data->state = MAIN_CP_CB_DATA_STATE_TOTEM;
  586. break;
  587. case MAIN_CP_CB_DATA_STATE_TOTEM:
  588. data->state = MAIN_CP_CB_DATA_STATE_NORMAL;
  589. break;
  590. case MAIN_CP_CB_DATA_STATE_LOGGER_SUBSYS:
  591. if (data->subsys == NULL) {
  592. *error_string = "No subsys key in logger_subsys directive";
  593. return (0);
  594. }
  595. for (iter = data->logger_subsys_items_head.next;
  596. iter != &data->logger_subsys_items_head; iter = iter_next) {
  597. kv_item = list_entry(iter, struct key_value_list_item, list);
  598. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "logging.logger_subsys.%s.%s",
  599. data->subsys, kv_item->key);
  600. icmap_set_string(key_name, kv_item->value);
  601. iter_next = iter->next;
  602. free(kv_item->value);
  603. free(kv_item->key);
  604. free(kv_item);
  605. }
  606. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "logging.logger_subsys.%s.subsys",
  607. data->subsys);
  608. icmap_set_string(key_name, data->subsys);
  609. free(data->subsys);
  610. data->state = MAIN_CP_CB_DATA_STATE_NORMAL;
  611. break;
  612. case MAIN_CP_CB_DATA_STATE_LOGGING_DAEMON:
  613. if (data->logging_daemon_name == NULL) {
  614. *error_string = "No name key in logging_daemon directive";
  615. return (0);
  616. }
  617. for (iter = data->logger_subsys_items_head.next;
  618. iter != &data->logger_subsys_items_head; iter = iter_next) {
  619. kv_item = list_entry(iter, struct key_value_list_item, list);
  620. if (data->subsys == NULL) {
  621. if (strcmp(data->logging_daemon_name, "corosync") == 0) {
  622. snprintf(key_name, ICMAP_KEYNAME_MAXLEN,
  623. "logging.%s",
  624. kv_item->key);
  625. } else {
  626. snprintf(key_name, ICMAP_KEYNAME_MAXLEN,
  627. "logging.logging_daemon.%s.%s",
  628. data->logging_daemon_name, kv_item->key);
  629. }
  630. } else {
  631. if (strcmp(data->logging_daemon_name, "corosync") == 0) {
  632. snprintf(key_name, ICMAP_KEYNAME_MAXLEN,
  633. "logging.logger_subsys.%s.%s",
  634. data->subsys,
  635. kv_item->key);
  636. } else {
  637. snprintf(key_name, ICMAP_KEYNAME_MAXLEN,
  638. "logging.logging_daemon.%s.%s.%s",
  639. data->logging_daemon_name, data->subsys,
  640. kv_item->key);
  641. }
  642. }
  643. icmap_set_string(key_name, kv_item->value);
  644. iter_next = iter->next;
  645. free(kv_item->value);
  646. free(kv_item->key);
  647. free(kv_item);
  648. }
  649. if (data->subsys == NULL) {
  650. if (strcmp(data->logging_daemon_name, "corosync") != 0) {
  651. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "logging.logging_daemon.%s.name",
  652. data->logging_daemon_name);
  653. icmap_set_string(key_name, data->logging_daemon_name);
  654. }
  655. } else {
  656. if (strcmp(data->logging_daemon_name, "corosync") == 0) {
  657. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "logging.logger_subsys.%s.subsys",
  658. data->subsys);
  659. icmap_set_string(key_name, data->subsys);
  660. } else {
  661. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "logging.logging_daemon.%s.%s.subsys",
  662. data->logging_daemon_name, data->subsys);
  663. icmap_set_string(key_name, data->subsys);
  664. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "logging.logging_daemon.%s.%s.name",
  665. data->logging_daemon_name, data->subsys);
  666. icmap_set_string(key_name, data->logging_daemon_name);
  667. }
  668. }
  669. free(data->subsys);
  670. free(data->logging_daemon_name);
  671. data->state = MAIN_CP_CB_DATA_STATE_NORMAL;
  672. break;
  673. case MAIN_CP_CB_DATA_STATE_UIDGID:
  674. data->state = MAIN_CP_CB_DATA_STATE_UIDGID;
  675. break;
  676. case MAIN_CP_CB_DATA_STATE_MEMBER:
  677. data->state = MAIN_CP_CB_DATA_STATE_INTERFACE;
  678. break;
  679. case MAIN_CP_CB_DATA_STATE_QUORUM:
  680. data->state = MAIN_CP_CB_DATA_STATE_NORMAL;
  681. break;
  682. }
  683. break;
  684. }
  685. return (1);
  686. }
  687. static int uidgid_config_parser_cb(const char *path,
  688. char *key,
  689. char *value,
  690. enum parser_cb_type type,
  691. const char **error_string,
  692. void *user_data)
  693. {
  694. char key_name[ICMAP_KEYNAME_MAXLEN];
  695. int uid, gid;
  696. switch (type) {
  697. case PARSER_CB_START:
  698. break;
  699. case PARSER_CB_END:
  700. break;
  701. case PARSER_CB_ITEM:
  702. if (strcmp(path, "uidgid.uid") == 0) {
  703. uid = uid_determine(value);
  704. if (uid == -1) {
  705. *error_string = error_string_response;
  706. return (0);
  707. }
  708. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "uidgid.uid.%u",
  709. uid);
  710. icmap_set_uint8(key_name, 1);
  711. } else if (strcmp(key, "uidgid.gid") == 0) {
  712. gid = gid_determine(value);
  713. if (gid == -1) {
  714. *error_string = error_string_response;
  715. return (0);
  716. }
  717. snprintf(key_name, ICMAP_KEYNAME_MAXLEN, "uidgid.gid.%u",
  718. gid);
  719. icmap_set_uint8(key_name, 1);
  720. } else {
  721. *error_string = "uidgid: Only uid and gid are allowed items";
  722. return (0);
  723. }
  724. break;
  725. case PARSER_CB_SECTION_START:
  726. if (strcmp(path, "uidgid") != 0) {
  727. *error_string = "uidgid: Can't add subsection different then uidgid";
  728. return (0);
  729. };
  730. break;
  731. case PARSER_CB_SECTION_END:
  732. break;
  733. }
  734. return (1);
  735. }
  736. static int read_uidgid_files_into_icmap(
  737. const char **error_string)
  738. {
  739. FILE *fp;
  740. const char *dirname;
  741. DIR *dp;
  742. struct dirent *dirent;
  743. struct dirent *entry;
  744. char filename[PATH_MAX + FILENAME_MAX + 1];
  745. int res = 0;
  746. size_t len;
  747. int return_code;
  748. struct stat stat_buf;
  749. char key_name[ICMAP_KEYNAME_MAXLEN];
  750. dirname = COROSYSCONFDIR "/uidgid.d";
  751. dp = opendir (dirname);
  752. if (dp == NULL)
  753. return 0;
  754. len = offsetof(struct dirent, d_name) + NAME_MAX + 1;
  755. entry = malloc(len);
  756. if (entry == NULL) {
  757. res = 0;
  758. goto error_exit;
  759. }
  760. for (return_code = readdir_r(dp, entry, &dirent);
  761. dirent != NULL && return_code == 0;
  762. return_code = readdir_r(dp, entry, &dirent)) {
  763. snprintf(filename, sizeof (filename), "%s/%s", dirname, dirent->d_name);
  764. stat (filename, &stat_buf);
  765. if (S_ISREG(stat_buf.st_mode)) {
  766. fp = fopen (filename, "r");
  767. if (fp == NULL) continue;
  768. key_name[0] = 0;
  769. res = parse_section(fp, key_name, error_string, uidgid_config_parser_cb, NULL);
  770. fclose (fp);
  771. if (res != 0) {
  772. goto error_exit;
  773. }
  774. }
  775. }
  776. error_exit:
  777. free (entry);
  778. closedir(dp);
  779. return res;
  780. }
  781. static int read_service_files_into_icmap(
  782. const char **error_string)
  783. {
  784. FILE *fp;
  785. const char *dirname;
  786. DIR *dp;
  787. struct dirent *dirent;
  788. struct dirent *entry;
  789. char filename[PATH_MAX + FILENAME_MAX + 1];
  790. int res = 0;
  791. struct stat stat_buf;
  792. size_t len;
  793. int return_code;
  794. char key_name[ICMAP_KEYNAME_MAXLEN];
  795. struct main_cp_cb_data data;
  796. dirname = COROSYSCONFDIR "/service.d";
  797. dp = opendir (dirname);
  798. if (dp == NULL)
  799. return 0;
  800. len = offsetof(struct dirent, d_name) + NAME_MAX + 1;
  801. entry = malloc(len);
  802. if (entry == NULL) {
  803. res = 0;
  804. goto error_exit;
  805. }
  806. for (return_code = readdir_r(dp, entry, &dirent);
  807. dirent != NULL && return_code == 0;
  808. return_code = readdir_r(dp, entry, &dirent)) {
  809. snprintf(filename, sizeof (filename), "%s/%s", dirname, dirent->d_name);
  810. stat (filename, &stat_buf);
  811. if (S_ISREG(stat_buf.st_mode)) {
  812. fp = fopen (filename, "r");
  813. if (fp == NULL) continue;
  814. key_name[0] = 0;
  815. res = parse_section(fp, key_name, error_string, main_config_parser_cb, &data);
  816. fclose (fp);
  817. if (res != 0) {
  818. goto error_exit;
  819. }
  820. }
  821. }
  822. error_exit:
  823. free (entry);
  824. closedir(dp);
  825. return res;
  826. }
  827. /* Read config file and load into icmap */
  828. static int read_config_file_into_icmap(
  829. const char **error_string)
  830. {
  831. FILE *fp;
  832. const char *filename;
  833. char *error_reason = error_string_response;
  834. int res;
  835. char key_name[ICMAP_KEYNAME_MAXLEN];
  836. struct main_cp_cb_data data;
  837. filename = getenv ("COROSYNC_MAIN_CONFIG_FILE");
  838. if (!filename)
  839. filename = COROSYSCONFDIR "/corosync.conf";
  840. fp = fopen (filename, "r");
  841. if (fp == NULL) {
  842. char error_str[100];
  843. const char *error_ptr = qb_strerror_r(errno, error_str, sizeof(error_str));
  844. snprintf (error_reason, sizeof(error_string_response),
  845. "Can't read file %s reason = (%s)\n",
  846. filename, error_ptr);
  847. *error_string = error_reason;
  848. return -1;
  849. }
  850. key_name[0] = 0;
  851. res = parse_section(fp, key_name, error_string, main_config_parser_cb, &data);
  852. fclose(fp);
  853. if (res == 0) {
  854. res = read_uidgid_files_into_icmap(error_string);
  855. }
  856. if (res == 0) {
  857. res = read_service_files_into_icmap(error_string);
  858. }
  859. if (res == 0) {
  860. snprintf (error_reason, sizeof(error_string_response),
  861. "Successfully read main configuration file '%s'.\n", filename);
  862. *error_string = error_reason;
  863. }
  864. return res;
  865. }