mariadb/storage/perfschema/table_replication_connection_configuration.cc
Sergei Golubchik 15f60c1a73 5.7.13
2016-07-28 15:52:12 +02:00

410 lines
11 KiB
C++

/*
Copyright (c) 2013, 2015, Oracle and/or its affiliates. All rights reserved.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; version 2 of the License.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
/**
@file storage/perfschema/table_replication_connection_configuration.cc
Table replication_connection_configuration (implementation).
*/
#define HAVE_REPLICATION
#include "my_global.h"
#include "table_replication_connection_configuration.h"
#include "pfs_instr_class.h"
#include "pfs_instr.h"
#include "rpl_slave.h"
#include "rpl_info.h"
#include "rpl_rli.h"
#include "rpl_mi.h"
#include "sql_parse.h"
#include "rpl_msr.h" /* Multisource replciation */
THR_LOCK table_replication_connection_configuration::m_table_lock;
/* Numbers in varchar count utf8 characters. */
static const TABLE_FIELD_TYPE field_types[]=
{
{
{C_STRING_WITH_LEN("CHANNEL_NAME")},
{C_STRING_WITH_LEN("char(64)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("HOST")},
{C_STRING_WITH_LEN("char(60)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("PORT")},
{C_STRING_WITH_LEN("int(11)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("USER")},
{C_STRING_WITH_LEN("char(" USERNAME_CHAR_LENGTH_STR ")")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("NETWORK_INTERFACE")},
{C_STRING_WITH_LEN("char(60)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("AUTO_POSITION")},
{C_STRING_WITH_LEN("enum('1','0')")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_ALLOWED")},
{C_STRING_WITH_LEN("enum('YES','NO','IGNORED')")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_CA_FILE")},
{C_STRING_WITH_LEN("varchar(512)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_CA_PATH")},
{C_STRING_WITH_LEN("varchar(512)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_CERTIFICATE")},
{C_STRING_WITH_LEN("varchar(512)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_CIPHER")},
{C_STRING_WITH_LEN("varchar(512)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_KEY")},
{C_STRING_WITH_LEN("varchar(512)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_VERIFY_SERVER_CERTIFICATE")},
{C_STRING_WITH_LEN("enum('YES','NO')")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_CRL_FILE")},
{C_STRING_WITH_LEN("varchar(255)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("SSL_CRL_PATH")},
{C_STRING_WITH_LEN("varchar(255)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("CONNECTION_RETRY_INTERVAL")},
{C_STRING_WITH_LEN("int(11)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("CONNECTION_RETRY_COUNT")},
{C_STRING_WITH_LEN("bigint")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("HEARTBEAT_INTERVAL")},
{C_STRING_WITH_LEN("double(10,3)")},
{NULL, 0}
},
{
{C_STRING_WITH_LEN("TLS_VERSION")},
{C_STRING_WITH_LEN("varchar(255)")},
{NULL, 0}
}
};
TABLE_FIELD_DEF
table_replication_connection_configuration::m_field_def=
{ 19, field_types };
PFS_engine_table_share
table_replication_connection_configuration::m_share=
{
{ C_STRING_WITH_LEN("replication_connection_configuration") },
&pfs_readonly_acl,
table_replication_connection_configuration::create,
NULL, /* write_row */
NULL, /* delete_all_rows */
table_replication_connection_configuration::get_row_count, /* records */
sizeof(PFS_simple_index), /* ref length */
&m_table_lock,
&m_field_def,
false, /* checked */
false /* perpetual */
};
PFS_engine_table* table_replication_connection_configuration::create(void)
{
return new table_replication_connection_configuration();
}
table_replication_connection_configuration
::table_replication_connection_configuration()
: PFS_engine_table(&m_share, &m_pos),
m_row_exists(false), m_pos(0), m_next_pos(0)
{}
table_replication_connection_configuration
::~table_replication_connection_configuration()
{}
void table_replication_connection_configuration::reset_position(void)
{
m_pos.m_index= 0;
m_next_pos.m_index= 0;
}
ha_rows table_replication_connection_configuration::get_row_count()
{
/*
We actually give the MAX_CHANNELS rather than the current
number of channels
*/
return channel_map.get_max_channels();
}
int table_replication_connection_configuration::rnd_next(void)
{
Master_info *mi;
int res= HA_ERR_END_OF_FILE;
channel_map.rdlock();
for (m_pos.set_at(&m_next_pos);
m_pos.m_index < channel_map.get_max_channels() && res != 0;
m_pos.next())
{
mi= channel_map.get_mi_at_pos(m_pos.m_index);
if (mi && mi->host[0])
{
make_row(mi);
m_next_pos.set_after(&m_pos);
res= 0;
}
}
channel_map.unlock();
return res;
}
int table_replication_connection_configuration::rnd_pos(const void *pos)
{
Master_info *mi;
int res= HA_ERR_RECORD_DELETED;
channel_map.rdlock();
set_position(pos);
if ((mi= channel_map.get_mi_at_pos(m_pos.m_index)))
{
make_row(mi);
res= 0;
}
channel_map.unlock();
return res;
}
void table_replication_connection_configuration::make_row(Master_info *mi)
{
char * temp_store;
m_row_exists= false;
DBUG_ASSERT(mi != NULL);
mysql_mutex_lock(&mi->data_lock);
mysql_mutex_lock(&mi->rli->data_lock);
m_row.channel_name_length= strlen(mi->get_channel());
memcpy(m_row.channel_name, (char*)mi->get_channel(), m_row.channel_name_length);
m_row.host_length= strlen(mi->host);
memcpy(m_row.host, mi->host, m_row.host_length);
m_row.port= (unsigned int) mi->port;
/* can't the user be NULL? */
temp_store= (char*)mi->get_user();
m_row.user_length= strlen(temp_store);
memcpy(m_row.user, temp_store, m_row.user_length);
temp_store= (char*)mi->bind_addr;
m_row.network_interface_length= strlen(temp_store);
memcpy(m_row.network_interface, temp_store, m_row.network_interface_length);
if (mi->is_auto_position())
m_row.auto_position= PS_RPL_YES;
else
m_row.auto_position= PS_RPL_NO;
#ifdef HAVE_OPENSSL
m_row.ssl_allowed= mi->ssl? PS_SSL_ALLOWED_YES:PS_SSL_ALLOWED_NO;
#else
m_row.ssl_allowed= mi->ssl? PS_SSL_ALLOWED_IGNORED:PS_SSL_ALLOWED_NO;
#endif
temp_store= (char*)mi->ssl_ca;
m_row.ssl_ca_file_length= strlen(temp_store);
memcpy(m_row.ssl_ca_file, temp_store, m_row.ssl_ca_file_length);
temp_store= (char*)mi->ssl_capath;
m_row.ssl_ca_path_length= strlen(temp_store);
memcpy(m_row.ssl_ca_path, temp_store, m_row.ssl_ca_path_length);
temp_store= (char*)mi->ssl_cert;
m_row.ssl_certificate_length= strlen(temp_store);
memcpy(m_row.ssl_certificate, temp_store, m_row.ssl_certificate_length);
temp_store= (char*)mi->ssl_cipher;
m_row.ssl_cipher_length= strlen(temp_store);
memcpy(m_row.ssl_cipher, temp_store, m_row.ssl_cipher_length);
temp_store= (char*)mi->ssl_key;
m_row.ssl_key_length= strlen(temp_store);
memcpy(m_row.ssl_key, temp_store, m_row.ssl_key_length);
if (mi->ssl_verify_server_cert)
m_row.ssl_verify_server_certificate= PS_RPL_YES;
else
m_row.ssl_verify_server_certificate= PS_RPL_NO;
temp_store= (char*)mi->ssl_crl;
m_row.ssl_crl_file_length= strlen(temp_store);
memcpy(m_row.ssl_crl_file, temp_store, m_row.ssl_crl_file_length);
temp_store= (char*)mi->ssl_crlpath;
m_row.ssl_crl_path_length= strlen(temp_store);
memcpy(m_row.ssl_crl_path, temp_store, m_row.ssl_crl_path_length);
m_row.connection_retry_interval= (unsigned int) mi->connect_retry;
m_row.connection_retry_count= (ulong) mi->retry_count;
m_row.heartbeat_interval= (double)mi->heartbeat_period;
temp_store= (char*)mi->tls_version;
m_row.tls_version_length= strlen(temp_store);
memcpy(m_row.tls_version, temp_store, m_row.tls_version_length);
mysql_mutex_unlock(&mi->rli->data_lock);
mysql_mutex_unlock(&mi->data_lock);
m_row_exists= true;
}
int table_replication_connection_configuration::read_row_values(TABLE *table,
unsigned char *,
Field **fields,
bool read_all)
{
Field *f;
if (unlikely(! m_row_exists))
return HA_ERR_RECORD_DELETED;
DBUG_ASSERT(table->s->null_bytes == 0);
for (; (f= *fields) ; fields++)
{
if (read_all || bitmap_is_set(table->read_set, f->field_index))
{
switch(f->field_index)
{
case 0: /** channel_name */
set_field_char_utf8(f, m_row.channel_name, m_row.channel_name_length);
break;
case 1: /** host */
set_field_char_utf8(f, m_row.host, m_row.host_length);
break;
case 2: /** port */
set_field_ulong(f, m_row.port);
break;
case 3: /** user */
set_field_char_utf8(f, m_row.user, m_row.user_length);
break;
case 4: /** network_interface */
set_field_char_utf8(f, m_row.network_interface,
m_row.network_interface_length);
break;
case 5: /** auto_position */
set_field_enum(f, m_row.auto_position);
break;
case 6: /** ssl_allowed */
set_field_enum(f, m_row. ssl_allowed);
break;
case 7: /**ssl_ca_file */
set_field_varchar_utf8(f, m_row.ssl_ca_file,
m_row.ssl_ca_file_length);
break;
case 8: /** ssl_ca_path */
set_field_varchar_utf8(f, m_row.ssl_ca_path,
m_row.ssl_ca_path_length);
break;
case 9: /** ssl_certificate */
set_field_varchar_utf8(f, m_row.ssl_certificate,
m_row.ssl_certificate_length);
break;
case 10: /** ssl_cipher */
set_field_varchar_utf8(f, m_row.ssl_cipher, m_row.ssl_cipher_length);
break;
case 11: /** ssl_key */
set_field_varchar_utf8(f, m_row.ssl_key, m_row.ssl_key_length);
break;
case 12: /** ssl_verify_server_certificate */
set_field_enum(f, m_row.ssl_verify_server_certificate);
break;
case 13: /** ssl_crl_file */
set_field_varchar_utf8(f, m_row.ssl_crl_file,
m_row.ssl_crl_file_length);
break;
case 14: /** ssl_crl_path */
set_field_varchar_utf8(f, m_row.ssl_crl_path,
m_row.ssl_crl_path_length);
break;
case 15: /** connection_retry_interval */
set_field_ulong(f, m_row.connection_retry_interval);
break;
case 16: /** connect_retry_count */
set_field_ulonglong(f, m_row.connection_retry_count);
break;
case 17:/** number of seconds after which heartbeat will be sent */
set_field_double(f, m_row.heartbeat_interval);
break;
case 18: /** tls_version */
set_field_varchar_utf8(f, m_row.tls_version,
m_row.tls_version_length);
break;
default:
DBUG_ASSERT(false);
}
}
}
return 0;
}