mirror of
https://github.com/MariaDB/server.git
synced 2025-01-16 20:12:31 +01:00
8c71c6aa8b
InnoDB I/O and buffer pool interfaces and the redo log format have been changed between MariaDB 10.1 and 10.2, and the backup code has to be adjusted accordingly. The code has been simplified, and many memory leaks have been fixed. Instead of the file name xtrabackup_logfile, the file name ib_logfile0 is being used for the copy of the redo log. Unnecessary InnoDB startup and shutdown and some unnecessary threads have been removed. Some help was provided by Vladislav Vaintroub. Parameters have been cleaned up and aligned with those of MariaDB 10.2. The --dbug option has been added, so that in debug builds, --dbug=d,ib_log can be specified to enable diagnostic messages for processing redo log entries. By default, innodb_doublewrite=OFF, so that --prepare works faster. If more crash-safety for --prepare is needed, double buffering can be enabled. The parameter innodb_log_checksums=OFF can be used to ignore redo log checksums in --backup. Some messages have been cleaned up. Unless --export is specified, Mariabackup will not deal with undo log. The InnoDB mini-transaction redo log is not only about user-level transactions; it is actually about mini-transactions. To avoid confusion, call it the redo log, not transaction log. We disable any undo log processing in --prepare. Because MariaDB 10.2 supports indexed virtual columns, the undo log processing would need to be able to evaluate virtual column expressions. To reduce the amount of code dependencies, we will not process any undo log in prepare. This means that the --export option must be disabled for now. This also means that the following options are redundant and have been removed: xtrabackup --apply-log-only innobackupex --redo-only In addition to disabling any undo log processing, we will disable any further changes to data pages during --prepare, including the change buffer merge. This means that restoring incremental backups should reliably work even when change buffering is being used on the server. Because of this, preparing a backup will not generate any further redo log, and the redo log file can be safely deleted. (If the --export option is enabled in the future, it must generate redo log when processing undo logs and buffered changes.) In --prepare, we cannot easily know if a partial backup was used, especially when restoring a series of incremental backups. So, we simply warn about any missing files, and ignore the redo log for them. FIXME: Enable the --export option. FIXME: Improve the handling of the MLOG_INDEX_LOAD record, and write a test that initiates a backup while an ALGORITHM=INPLACE operation is creating indexes or rebuilding a table. An error should be detected when preparing the backup. FIXME: In --incremental --prepare, xtrabackup_apply_delta() should ensure that if FSP_SIZE is modified, the file size will be adjusted accordingly.
157 lines
3.8 KiB
C++
157 lines
3.8 KiB
C++
#include <mysqld.h>
|
|
#include <mysql.h>
|
|
#include <xtrabackup.h>
|
|
#include <encryption_plugin.h>
|
|
#include <backup_copy.h>
|
|
#include <sql_plugin.h>
|
|
#include <sstream>
|
|
#include <vector>
|
|
#include <common.h>
|
|
#include <backup_mysql.h>
|
|
#include <log0crypt.h>
|
|
|
|
|
|
extern struct st_maria_plugin *mysql_optional_plugins[];
|
|
extern struct st_maria_plugin *mysql_mandatory_plugins[];
|
|
static void encryption_plugin_init(int argc, char **argv);
|
|
|
|
extern char *xb_plugin_load;
|
|
extern char *xb_plugin_dir;
|
|
|
|
const int PLUGIN_MAX_ARGS = 1024;
|
|
std::vector<std::string> backup_plugins_args;
|
|
|
|
const char *QUERY_PLUGIN =
|
|
"SELECT plugin_name, plugin_library, @@plugin_dir"
|
|
" FROM information_schema.plugins WHERE plugin_type='ENCRYPTION'"
|
|
" AND plugin_status='ACTIVE'";
|
|
|
|
std::string encryption_plugin_config;
|
|
|
|
static void add_to_plugin_load_list(const char *plugin_def)
|
|
{
|
|
opt_plugin_load_list_ptr->push_back(new i_string(plugin_def));
|
|
}
|
|
|
|
static char XTRABACKUP_EXE[] = "xtrabackup";
|
|
|
|
void encryption_plugin_backup_init(MYSQL *mysql)
|
|
{
|
|
MYSQL_RES *result;
|
|
MYSQL_ROW row;
|
|
std::ostringstream oss;
|
|
char *argv[PLUGIN_MAX_ARGS];
|
|
int argc;
|
|
|
|
result = xb_mysql_query(mysql, QUERY_PLUGIN, true, true);
|
|
row = mysql_fetch_row(result);
|
|
if (!row)
|
|
{
|
|
mysql_free_result(result);
|
|
return;
|
|
}
|
|
|
|
char *name= row[0];
|
|
char *library= row[1];
|
|
char *dir= row[2];
|
|
|
|
#ifdef _WIN32
|
|
for (char *p = dir; *p; p++)
|
|
if (*p == '\\') *p = '/';
|
|
#endif
|
|
|
|
std::string plugin_load(name);
|
|
if (library)
|
|
plugin_load += std::string("=") + library;
|
|
|
|
oss << "plugin_load=" << plugin_load << std::endl;
|
|
|
|
/* Required to load the plugin later.*/
|
|
add_to_plugin_load_list(plugin_load.c_str());
|
|
strncpy(opt_plugin_dir, dir, FN_REFLEN);
|
|
|
|
oss << "plugin_dir=" << '"' << dir << '"' << std::endl;
|
|
|
|
|
|
/* Read plugin variables. */
|
|
char query[1024];
|
|
snprintf(query, 1024, "SHOW variables like '%s_%%'", name);
|
|
mysql_free_result(result);
|
|
|
|
result = xb_mysql_query(mysql, query, true, true);
|
|
while ((row = mysql_fetch_row(result)))
|
|
{
|
|
std::string arg("--");
|
|
arg += row[0];
|
|
arg += "=";
|
|
arg += row[1];
|
|
backup_plugins_args.push_back(arg);
|
|
oss << row[0] << "=" << row[1] << std::endl;
|
|
}
|
|
|
|
mysql_free_result(result);
|
|
|
|
/* Check whether to encrypt logs. */
|
|
result = xb_mysql_query(mysql, "select @@innodb_encrypt_log", true, true);
|
|
row = mysql_fetch_row(result);
|
|
srv_encrypt_log = (row != 0 && row[0][0] == '1');
|
|
oss << "innodb_encrypt_log=" << row[0] << std::endl;
|
|
|
|
mysql_free_result(result);
|
|
|
|
encryption_plugin_config = oss.str();
|
|
|
|
argc = 0;
|
|
argv[argc++] = XTRABACKUP_EXE;
|
|
for(size_t i = 0; i < backup_plugins_args.size(); i++)
|
|
{
|
|
argv[argc++] = (char *)backup_plugins_args[i].c_str();
|
|
if (argc == PLUGIN_MAX_ARGS - 2)
|
|
break;
|
|
}
|
|
argv[argc] = 0;
|
|
|
|
encryption_plugin_init(argc, argv);
|
|
}
|
|
|
|
const char *encryption_plugin_get_config()
|
|
{
|
|
return encryption_plugin_config.c_str();
|
|
}
|
|
|
|
extern int finalize_encryption_plugin(st_plugin_int *plugin);
|
|
|
|
|
|
void encryption_plugin_prepare_init(int argc, char **argv)
|
|
{
|
|
|
|
if (!xb_plugin_load)
|
|
{
|
|
finalize_encryption_plugin(0);
|
|
return;
|
|
}
|
|
|
|
add_to_plugin_load_list(xb_plugin_load);
|
|
|
|
if (xb_plugin_dir)
|
|
strncpy(opt_plugin_dir, xb_plugin_dir, FN_REFLEN);
|
|
|
|
char **new_argv = new char *[argc + 1];
|
|
new_argv[0] = XTRABACKUP_EXE;
|
|
memcpy(&new_argv[1], argv, argc*sizeof(char *));
|
|
|
|
encryption_plugin_init(argc+1, new_argv);
|
|
|
|
delete[] new_argv;
|
|
}
|
|
|
|
static void encryption_plugin_init(int argc, char **argv)
|
|
{
|
|
/* Patch optional and mandatory plugins, we only need to load the one in xb_plugin_load. */
|
|
mysql_optional_plugins[0] = mysql_mandatory_plugins[0] = 0;
|
|
msg("Loading encryption plugin\n");
|
|
for (int i= 1; i < argc; i++)
|
|
msg("\t Encryption plugin parameter : '%s'\n", argv[i]);
|
|
plugin_init(&argc, argv, PLUGIN_INIT_SKIP_PLUGIN_TABLE);
|
|
}
|
|
|