mirror of
https://github.com/MariaDB/server.git
synced 2025-01-16 12:02:42 +01:00
410 lines
11 KiB
C++
410 lines
11 KiB
C++
/*
|
|
Copyright (c) 2013, 2015, Oracle and/or its affiliates. All rights reserved.
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; version 2 of the License.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
|
|
|
|
/**
|
|
@file storage/perfschema/table_replication_connection_configuration.cc
|
|
Table replication_connection_configuration (implementation).
|
|
*/
|
|
|
|
#define HAVE_REPLICATION
|
|
|
|
#include "my_global.h"
|
|
#include "table_replication_connection_configuration.h"
|
|
#include "pfs_instr_class.h"
|
|
#include "pfs_instr.h"
|
|
#include "rpl_slave.h"
|
|
#include "rpl_info.h"
|
|
#include "rpl_rli.h"
|
|
#include "rpl_mi.h"
|
|
#include "sql_parse.h"
|
|
#include "rpl_msr.h" /* Multisource replciation */
|
|
|
|
THR_LOCK table_replication_connection_configuration::m_table_lock;
|
|
|
|
/* Numbers in varchar count utf8 characters. */
|
|
static const TABLE_FIELD_TYPE field_types[]=
|
|
{
|
|
{
|
|
{C_STRING_WITH_LEN("CHANNEL_NAME")},
|
|
{C_STRING_WITH_LEN("char(64)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("HOST")},
|
|
{C_STRING_WITH_LEN("char(60)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("PORT")},
|
|
{C_STRING_WITH_LEN("int(11)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("USER")},
|
|
{C_STRING_WITH_LEN("char(" USERNAME_CHAR_LENGTH_STR ")")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("NETWORK_INTERFACE")},
|
|
{C_STRING_WITH_LEN("char(60)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("AUTO_POSITION")},
|
|
{C_STRING_WITH_LEN("enum('1','0')")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_ALLOWED")},
|
|
{C_STRING_WITH_LEN("enum('YES','NO','IGNORED')")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_CA_FILE")},
|
|
{C_STRING_WITH_LEN("varchar(512)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_CA_PATH")},
|
|
{C_STRING_WITH_LEN("varchar(512)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_CERTIFICATE")},
|
|
{C_STRING_WITH_LEN("varchar(512)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_CIPHER")},
|
|
{C_STRING_WITH_LEN("varchar(512)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_KEY")},
|
|
{C_STRING_WITH_LEN("varchar(512)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_VERIFY_SERVER_CERTIFICATE")},
|
|
{C_STRING_WITH_LEN("enum('YES','NO')")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_CRL_FILE")},
|
|
{C_STRING_WITH_LEN("varchar(255)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("SSL_CRL_PATH")},
|
|
{C_STRING_WITH_LEN("varchar(255)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("CONNECTION_RETRY_INTERVAL")},
|
|
{C_STRING_WITH_LEN("int(11)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("CONNECTION_RETRY_COUNT")},
|
|
{C_STRING_WITH_LEN("bigint")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("HEARTBEAT_INTERVAL")},
|
|
{C_STRING_WITH_LEN("double(10,3)")},
|
|
{NULL, 0}
|
|
},
|
|
{
|
|
{C_STRING_WITH_LEN("TLS_VERSION")},
|
|
{C_STRING_WITH_LEN("varchar(255)")},
|
|
{NULL, 0}
|
|
}
|
|
};
|
|
|
|
TABLE_FIELD_DEF
|
|
table_replication_connection_configuration::m_field_def=
|
|
{ 19, field_types };
|
|
|
|
PFS_engine_table_share
|
|
table_replication_connection_configuration::m_share=
|
|
{
|
|
{ C_STRING_WITH_LEN("replication_connection_configuration") },
|
|
&pfs_readonly_acl,
|
|
table_replication_connection_configuration::create,
|
|
NULL, /* write_row */
|
|
NULL, /* delete_all_rows */
|
|
table_replication_connection_configuration::get_row_count, /* records */
|
|
sizeof(PFS_simple_index), /* ref length */
|
|
&m_table_lock,
|
|
&m_field_def,
|
|
false, /* checked */
|
|
false /* perpetual */
|
|
};
|
|
|
|
|
|
PFS_engine_table* table_replication_connection_configuration::create(void)
|
|
{
|
|
return new table_replication_connection_configuration();
|
|
}
|
|
|
|
table_replication_connection_configuration
|
|
::table_replication_connection_configuration()
|
|
: PFS_engine_table(&m_share, &m_pos),
|
|
m_row_exists(false), m_pos(0), m_next_pos(0)
|
|
{}
|
|
|
|
table_replication_connection_configuration
|
|
::~table_replication_connection_configuration()
|
|
{}
|
|
|
|
void table_replication_connection_configuration::reset_position(void)
|
|
{
|
|
m_pos.m_index= 0;
|
|
m_next_pos.m_index= 0;
|
|
}
|
|
|
|
ha_rows table_replication_connection_configuration::get_row_count()
|
|
{
|
|
/*
|
|
We actually give the MAX_CHANNELS rather than the current
|
|
number of channels
|
|
*/
|
|
|
|
return channel_map.get_max_channels();
|
|
}
|
|
|
|
int table_replication_connection_configuration::rnd_next(void)
|
|
{
|
|
Master_info *mi;
|
|
int res= HA_ERR_END_OF_FILE;
|
|
|
|
channel_map.rdlock();
|
|
|
|
for (m_pos.set_at(&m_next_pos);
|
|
m_pos.m_index < channel_map.get_max_channels() && res != 0;
|
|
m_pos.next())
|
|
{
|
|
mi= channel_map.get_mi_at_pos(m_pos.m_index);
|
|
|
|
if (mi && mi->host[0])
|
|
{
|
|
make_row(mi);
|
|
m_next_pos.set_after(&m_pos);
|
|
res= 0;
|
|
}
|
|
}
|
|
|
|
channel_map.unlock();
|
|
return res;
|
|
}
|
|
|
|
int table_replication_connection_configuration::rnd_pos(const void *pos)
|
|
{
|
|
Master_info *mi;
|
|
int res= HA_ERR_RECORD_DELETED;
|
|
|
|
channel_map.rdlock();
|
|
|
|
set_position(pos);
|
|
|
|
if ((mi= channel_map.get_mi_at_pos(m_pos.m_index)))
|
|
{
|
|
make_row(mi);
|
|
res= 0;
|
|
}
|
|
|
|
channel_map.unlock();
|
|
return res;
|
|
}
|
|
|
|
void table_replication_connection_configuration::make_row(Master_info *mi)
|
|
{
|
|
char * temp_store;
|
|
|
|
m_row_exists= false;
|
|
|
|
|
|
DBUG_ASSERT(mi != NULL);
|
|
|
|
mysql_mutex_lock(&mi->data_lock);
|
|
mysql_mutex_lock(&mi->rli->data_lock);
|
|
|
|
m_row.channel_name_length= strlen(mi->get_channel());
|
|
memcpy(m_row.channel_name, (char*)mi->get_channel(), m_row.channel_name_length);
|
|
|
|
m_row.host_length= strlen(mi->host);
|
|
memcpy(m_row.host, mi->host, m_row.host_length);
|
|
|
|
m_row.port= (unsigned int) mi->port;
|
|
|
|
/* can't the user be NULL? */
|
|
temp_store= (char*)mi->get_user();
|
|
m_row.user_length= strlen(temp_store);
|
|
memcpy(m_row.user, temp_store, m_row.user_length);
|
|
|
|
temp_store= (char*)mi->bind_addr;
|
|
m_row.network_interface_length= strlen(temp_store);
|
|
memcpy(m_row.network_interface, temp_store, m_row.network_interface_length);
|
|
|
|
if (mi->is_auto_position())
|
|
m_row.auto_position= PS_RPL_YES;
|
|
else
|
|
m_row.auto_position= PS_RPL_NO;
|
|
|
|
#ifdef HAVE_OPENSSL
|
|
m_row.ssl_allowed= mi->ssl? PS_SSL_ALLOWED_YES:PS_SSL_ALLOWED_NO;
|
|
#else
|
|
m_row.ssl_allowed= mi->ssl? PS_SSL_ALLOWED_IGNORED:PS_SSL_ALLOWED_NO;
|
|
#endif
|
|
|
|
temp_store= (char*)mi->ssl_ca;
|
|
m_row.ssl_ca_file_length= strlen(temp_store);
|
|
memcpy(m_row.ssl_ca_file, temp_store, m_row.ssl_ca_file_length);
|
|
|
|
temp_store= (char*)mi->ssl_capath;
|
|
m_row.ssl_ca_path_length= strlen(temp_store);
|
|
memcpy(m_row.ssl_ca_path, temp_store, m_row.ssl_ca_path_length);
|
|
|
|
temp_store= (char*)mi->ssl_cert;
|
|
m_row.ssl_certificate_length= strlen(temp_store);
|
|
memcpy(m_row.ssl_certificate, temp_store, m_row.ssl_certificate_length);
|
|
|
|
temp_store= (char*)mi->ssl_cipher;
|
|
m_row.ssl_cipher_length= strlen(temp_store);
|
|
memcpy(m_row.ssl_cipher, temp_store, m_row.ssl_cipher_length);
|
|
|
|
temp_store= (char*)mi->ssl_key;
|
|
m_row.ssl_key_length= strlen(temp_store);
|
|
memcpy(m_row.ssl_key, temp_store, m_row.ssl_key_length);
|
|
|
|
if (mi->ssl_verify_server_cert)
|
|
m_row.ssl_verify_server_certificate= PS_RPL_YES;
|
|
else
|
|
m_row.ssl_verify_server_certificate= PS_RPL_NO;
|
|
|
|
temp_store= (char*)mi->ssl_crl;
|
|
m_row.ssl_crl_file_length= strlen(temp_store);
|
|
memcpy(m_row.ssl_crl_file, temp_store, m_row.ssl_crl_file_length);
|
|
|
|
temp_store= (char*)mi->ssl_crlpath;
|
|
m_row.ssl_crl_path_length= strlen(temp_store);
|
|
memcpy(m_row.ssl_crl_path, temp_store, m_row.ssl_crl_path_length);
|
|
|
|
m_row.connection_retry_interval= (unsigned int) mi->connect_retry;
|
|
|
|
m_row.connection_retry_count= (ulong) mi->retry_count;
|
|
|
|
m_row.heartbeat_interval= (double)mi->heartbeat_period;
|
|
|
|
temp_store= (char*)mi->tls_version;
|
|
m_row.tls_version_length= strlen(temp_store);
|
|
memcpy(m_row.tls_version, temp_store, m_row.tls_version_length);
|
|
|
|
mysql_mutex_unlock(&mi->rli->data_lock);
|
|
mysql_mutex_unlock(&mi->data_lock);
|
|
|
|
m_row_exists= true;
|
|
}
|
|
|
|
int table_replication_connection_configuration::read_row_values(TABLE *table,
|
|
unsigned char *,
|
|
Field **fields,
|
|
bool read_all)
|
|
{
|
|
Field *f;
|
|
|
|
if (unlikely(! m_row_exists))
|
|
return HA_ERR_RECORD_DELETED;
|
|
|
|
DBUG_ASSERT(table->s->null_bytes == 0);
|
|
|
|
for (; (f= *fields) ; fields++)
|
|
{
|
|
if (read_all || bitmap_is_set(table->read_set, f->field_index))
|
|
{
|
|
switch(f->field_index)
|
|
{
|
|
case 0: /** channel_name */
|
|
set_field_char_utf8(f, m_row.channel_name, m_row.channel_name_length);
|
|
break;
|
|
case 1: /** host */
|
|
set_field_char_utf8(f, m_row.host, m_row.host_length);
|
|
break;
|
|
case 2: /** port */
|
|
set_field_ulong(f, m_row.port);
|
|
break;
|
|
case 3: /** user */
|
|
set_field_char_utf8(f, m_row.user, m_row.user_length);
|
|
break;
|
|
case 4: /** network_interface */
|
|
set_field_char_utf8(f, m_row.network_interface,
|
|
m_row.network_interface_length);
|
|
break;
|
|
case 5: /** auto_position */
|
|
set_field_enum(f, m_row.auto_position);
|
|
break;
|
|
case 6: /** ssl_allowed */
|
|
set_field_enum(f, m_row. ssl_allowed);
|
|
break;
|
|
case 7: /**ssl_ca_file */
|
|
set_field_varchar_utf8(f, m_row.ssl_ca_file,
|
|
m_row.ssl_ca_file_length);
|
|
break;
|
|
case 8: /** ssl_ca_path */
|
|
set_field_varchar_utf8(f, m_row.ssl_ca_path,
|
|
m_row.ssl_ca_path_length);
|
|
break;
|
|
case 9: /** ssl_certificate */
|
|
set_field_varchar_utf8(f, m_row.ssl_certificate,
|
|
m_row.ssl_certificate_length);
|
|
break;
|
|
case 10: /** ssl_cipher */
|
|
set_field_varchar_utf8(f, m_row.ssl_cipher, m_row.ssl_cipher_length);
|
|
break;
|
|
case 11: /** ssl_key */
|
|
set_field_varchar_utf8(f, m_row.ssl_key, m_row.ssl_key_length);
|
|
break;
|
|
case 12: /** ssl_verify_server_certificate */
|
|
set_field_enum(f, m_row.ssl_verify_server_certificate);
|
|
break;
|
|
case 13: /** ssl_crl_file */
|
|
set_field_varchar_utf8(f, m_row.ssl_crl_file,
|
|
m_row.ssl_crl_file_length);
|
|
break;
|
|
case 14: /** ssl_crl_path */
|
|
set_field_varchar_utf8(f, m_row.ssl_crl_path,
|
|
m_row.ssl_crl_path_length);
|
|
break;
|
|
case 15: /** connection_retry_interval */
|
|
set_field_ulong(f, m_row.connection_retry_interval);
|
|
break;
|
|
case 16: /** connect_retry_count */
|
|
set_field_ulonglong(f, m_row.connection_retry_count);
|
|
break;
|
|
case 17:/** number of seconds after which heartbeat will be sent */
|
|
set_field_double(f, m_row.heartbeat_interval);
|
|
break;
|
|
case 18: /** tls_version */
|
|
set_field_varchar_utf8(f, m_row.tls_version,
|
|
m_row.tls_version_length);
|
|
break;
|
|
default:
|
|
DBUG_ASSERT(false);
|
|
}
|
|
}
|
|
}
|
|
return 0;
|
|
}
|