/* Copyright (c) 2013, 2015, Oracle and/or its affiliates. All rights reserved. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ /** @file storage/perfschema/table_replication_connection_configuration.cc Table replication_connection_configuration (implementation). */ #define HAVE_REPLICATION #include "my_global.h" #include "table_replication_connection_configuration.h" #include "pfs_instr_class.h" #include "pfs_instr.h" #include "rpl_slave.h" #include "rpl_info.h" #include "rpl_rli.h" #include "rpl_mi.h" #include "sql_parse.h" #include "rpl_msr.h" /* Multisource replciation */ THR_LOCK table_replication_connection_configuration::m_table_lock; /* Numbers in varchar count utf8 characters. */ static const TABLE_FIELD_TYPE field_types[]= { { {C_STRING_WITH_LEN("CHANNEL_NAME")}, {C_STRING_WITH_LEN("char(64)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("HOST")}, {C_STRING_WITH_LEN("char(60)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("PORT")}, {C_STRING_WITH_LEN("int(11)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("USER")}, {C_STRING_WITH_LEN("char(" USERNAME_CHAR_LENGTH_STR ")")}, {NULL, 0} }, { {C_STRING_WITH_LEN("NETWORK_INTERFACE")}, {C_STRING_WITH_LEN("char(60)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("AUTO_POSITION")}, {C_STRING_WITH_LEN("enum('1','0')")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_ALLOWED")}, {C_STRING_WITH_LEN("enum('YES','NO','IGNORED')")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_CA_FILE")}, {C_STRING_WITH_LEN("varchar(512)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_CA_PATH")}, {C_STRING_WITH_LEN("varchar(512)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_CERTIFICATE")}, {C_STRING_WITH_LEN("varchar(512)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_CIPHER")}, {C_STRING_WITH_LEN("varchar(512)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_KEY")}, {C_STRING_WITH_LEN("varchar(512)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_VERIFY_SERVER_CERTIFICATE")}, {C_STRING_WITH_LEN("enum('YES','NO')")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_CRL_FILE")}, {C_STRING_WITH_LEN("varchar(255)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("SSL_CRL_PATH")}, {C_STRING_WITH_LEN("varchar(255)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("CONNECTION_RETRY_INTERVAL")}, {C_STRING_WITH_LEN("int(11)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("CONNECTION_RETRY_COUNT")}, {C_STRING_WITH_LEN("bigint")}, {NULL, 0} }, { {C_STRING_WITH_LEN("HEARTBEAT_INTERVAL")}, {C_STRING_WITH_LEN("double(10,3)")}, {NULL, 0} }, { {C_STRING_WITH_LEN("TLS_VERSION")}, {C_STRING_WITH_LEN("varchar(255)")}, {NULL, 0} } }; TABLE_FIELD_DEF table_replication_connection_configuration::m_field_def= { 19, field_types }; PFS_engine_table_share table_replication_connection_configuration::m_share= { { C_STRING_WITH_LEN("replication_connection_configuration") }, &pfs_readonly_acl, table_replication_connection_configuration::create, NULL, /* write_row */ NULL, /* delete_all_rows */ table_replication_connection_configuration::get_row_count, /* records */ sizeof(PFS_simple_index), /* ref length */ &m_table_lock, &m_field_def, false, /* checked */ false /* perpetual */ }; PFS_engine_table* table_replication_connection_configuration::create(void) { return new table_replication_connection_configuration(); } table_replication_connection_configuration ::table_replication_connection_configuration() : PFS_engine_table(&m_share, &m_pos), m_row_exists(false), m_pos(0), m_next_pos(0) {} table_replication_connection_configuration ::~table_replication_connection_configuration() {} void table_replication_connection_configuration::reset_position(void) { m_pos.m_index= 0; m_next_pos.m_index= 0; } ha_rows table_replication_connection_configuration::get_row_count() { /* We actually give the MAX_CHANNELS rather than the current number of channels */ return channel_map.get_max_channels(); } int table_replication_connection_configuration::rnd_next(void) { Master_info *mi; int res= HA_ERR_END_OF_FILE; channel_map.rdlock(); for (m_pos.set_at(&m_next_pos); m_pos.m_index < channel_map.get_max_channels() && res != 0; m_pos.next()) { mi= channel_map.get_mi_at_pos(m_pos.m_index); if (mi && mi->host[0]) { make_row(mi); m_next_pos.set_after(&m_pos); res= 0; } } channel_map.unlock(); return res; } int table_replication_connection_configuration::rnd_pos(const void *pos) { Master_info *mi; int res= HA_ERR_RECORD_DELETED; channel_map.rdlock(); set_position(pos); if ((mi= channel_map.get_mi_at_pos(m_pos.m_index))) { make_row(mi); res= 0; } channel_map.unlock(); return res; } void table_replication_connection_configuration::make_row(Master_info *mi) { char * temp_store; m_row_exists= false; DBUG_ASSERT(mi != NULL); mysql_mutex_lock(&mi->data_lock); mysql_mutex_lock(&mi->rli->data_lock); m_row.channel_name_length= strlen(mi->get_channel()); memcpy(m_row.channel_name, (char*)mi->get_channel(), m_row.channel_name_length); m_row.host_length= strlen(mi->host); memcpy(m_row.host, mi->host, m_row.host_length); m_row.port= (unsigned int) mi->port; /* can't the user be NULL? */ temp_store= (char*)mi->get_user(); m_row.user_length= strlen(temp_store); memcpy(m_row.user, temp_store, m_row.user_length); temp_store= (char*)mi->bind_addr; m_row.network_interface_length= strlen(temp_store); memcpy(m_row.network_interface, temp_store, m_row.network_interface_length); if (mi->is_auto_position()) m_row.auto_position= PS_RPL_YES; else m_row.auto_position= PS_RPL_NO; #ifdef HAVE_OPENSSL m_row.ssl_allowed= mi->ssl? PS_SSL_ALLOWED_YES:PS_SSL_ALLOWED_NO; #else m_row.ssl_allowed= mi->ssl? PS_SSL_ALLOWED_IGNORED:PS_SSL_ALLOWED_NO; #endif temp_store= (char*)mi->ssl_ca; m_row.ssl_ca_file_length= strlen(temp_store); memcpy(m_row.ssl_ca_file, temp_store, m_row.ssl_ca_file_length); temp_store= (char*)mi->ssl_capath; m_row.ssl_ca_path_length= strlen(temp_store); memcpy(m_row.ssl_ca_path, temp_store, m_row.ssl_ca_path_length); temp_store= (char*)mi->ssl_cert; m_row.ssl_certificate_length= strlen(temp_store); memcpy(m_row.ssl_certificate, temp_store, m_row.ssl_certificate_length); temp_store= (char*)mi->ssl_cipher; m_row.ssl_cipher_length= strlen(temp_store); memcpy(m_row.ssl_cipher, temp_store, m_row.ssl_cipher_length); temp_store= (char*)mi->ssl_key; m_row.ssl_key_length= strlen(temp_store); memcpy(m_row.ssl_key, temp_store, m_row.ssl_key_length); if (mi->ssl_verify_server_cert) m_row.ssl_verify_server_certificate= PS_RPL_YES; else m_row.ssl_verify_server_certificate= PS_RPL_NO; temp_store= (char*)mi->ssl_crl; m_row.ssl_crl_file_length= strlen(temp_store); memcpy(m_row.ssl_crl_file, temp_store, m_row.ssl_crl_file_length); temp_store= (char*)mi->ssl_crlpath; m_row.ssl_crl_path_length= strlen(temp_store); memcpy(m_row.ssl_crl_path, temp_store, m_row.ssl_crl_path_length); m_row.connection_retry_interval= (unsigned int) mi->connect_retry; m_row.connection_retry_count= (ulong) mi->retry_count; m_row.heartbeat_interval= (double)mi->heartbeat_period; temp_store= (char*)mi->tls_version; m_row.tls_version_length= strlen(temp_store); memcpy(m_row.tls_version, temp_store, m_row.tls_version_length); mysql_mutex_unlock(&mi->rli->data_lock); mysql_mutex_unlock(&mi->data_lock); m_row_exists= true; } int table_replication_connection_configuration::read_row_values(TABLE *table, unsigned char *, Field **fields, bool read_all) { Field *f; if (unlikely(! m_row_exists)) return HA_ERR_RECORD_DELETED; DBUG_ASSERT(table->s->null_bytes == 0); for (; (f= *fields) ; fields++) { if (read_all || bitmap_is_set(table->read_set, f->field_index)) { switch(f->field_index) { case 0: /** channel_name */ set_field_char_utf8(f, m_row.channel_name, m_row.channel_name_length); break; case 1: /** host */ set_field_char_utf8(f, m_row.host, m_row.host_length); break; case 2: /** port */ set_field_ulong(f, m_row.port); break; case 3: /** user */ set_field_char_utf8(f, m_row.user, m_row.user_length); break; case 4: /** network_interface */ set_field_char_utf8(f, m_row.network_interface, m_row.network_interface_length); break; case 5: /** auto_position */ set_field_enum(f, m_row.auto_position); break; case 6: /** ssl_allowed */ set_field_enum(f, m_row. ssl_allowed); break; case 7: /**ssl_ca_file */ set_field_varchar_utf8(f, m_row.ssl_ca_file, m_row.ssl_ca_file_length); break; case 8: /** ssl_ca_path */ set_field_varchar_utf8(f, m_row.ssl_ca_path, m_row.ssl_ca_path_length); break; case 9: /** ssl_certificate */ set_field_varchar_utf8(f, m_row.ssl_certificate, m_row.ssl_certificate_length); break; case 10: /** ssl_cipher */ set_field_varchar_utf8(f, m_row.ssl_cipher, m_row.ssl_cipher_length); break; case 11: /** ssl_key */ set_field_varchar_utf8(f, m_row.ssl_key, m_row.ssl_key_length); break; case 12: /** ssl_verify_server_certificate */ set_field_enum(f, m_row.ssl_verify_server_certificate); break; case 13: /** ssl_crl_file */ set_field_varchar_utf8(f, m_row.ssl_crl_file, m_row.ssl_crl_file_length); break; case 14: /** ssl_crl_path */ set_field_varchar_utf8(f, m_row.ssl_crl_path, m_row.ssl_crl_path_length); break; case 15: /** connection_retry_interval */ set_field_ulong(f, m_row.connection_retry_interval); break; case 16: /** connect_retry_count */ set_field_ulonglong(f, m_row.connection_retry_count); break; case 17:/** number of seconds after which heartbeat will be sent */ set_field_double(f, m_row.heartbeat_interval); break; case 18: /** tls_version */ set_field_varchar_utf8(f, m_row.tls_version, m_row.tls_version_length); break; default: DBUG_ASSERT(false); } } } return 0; }