mirror of
https://github.com/MariaDB/server.git
synced 2025-01-16 03:52:35 +01:00
e6b3e38d62
The new option --log-innodb-page-corruption is introduced. When this option is set, backup is not interrupted if innodb corrupted page is detected. Instead it logs all found corrupted pages in innodb_corrupted_pages file in backup directory and finishes with error. For incremental backup corrupted pages are also copied to .delta file, because we can't do LSN check for such pages during backup, innodb_corrupted_pages will also be created in incremental backup directory. During --prepare, corrupted pages list is read from the file just after redo log is applied, and each page from the list is checked if it is allocated in it's tablespace or not. If it is not allocated, then it is zeroed out, flushed to the tablespace and removed from the list. If all pages are removed from the list, then --prepare is finished successfully and innodb_corrupted_pages file is removed from backup directory. Otherwise --prepare is finished with error message and innodb_corrupted_pages contains the list of the pages, which are detected as corrupted during backup, and are allocated in their tablespaces, what means backup directory contains corrupted innodb pages, and backup can not be considered as consistent. For incremental --prepare corrupted pages from .delta files are applied to the base backup, innodb_corrupted_pages is read from both base in incremental directories, and the same action is proceded for corrupted pages list as for full --prepare. innodb_corrupted_pages file is modified or removed only in base directory. If DDL happens during backup, it is also processed at the end of backup to have correct tablespace names in innodb_corrupted_pages.
203 lines
4.9 KiB
C++
203 lines
4.9 KiB
C++
#include <mysqld.h>
|
|
#include <mysql.h>
|
|
#include <xtrabackup.h>
|
|
#include <encryption_plugin.h>
|
|
#include <sql_plugin.h>
|
|
#include <sstream>
|
|
#include <vector>
|
|
#include <common.h>
|
|
#include <backup_mysql.h>
|
|
#include <log0crypt.h>
|
|
|
|
|
|
extern struct st_maria_plugin *mysql_optional_plugins[];
|
|
extern struct st_maria_plugin *mysql_mandatory_plugins[];
|
|
static void encryption_plugin_init(int argc, char **argv);
|
|
|
|
extern char *xb_plugin_load;
|
|
extern char *xb_plugin_dir;
|
|
|
|
const int PLUGIN_MAX_ARGS = 1024;
|
|
std::vector<std::string> backup_plugins_args;
|
|
|
|
const char *QUERY_PLUGIN =
|
|
"SELECT plugin_name, plugin_library, @@plugin_dir"
|
|
" FROM information_schema.plugins WHERE plugin_type='ENCRYPTION'"
|
|
" AND plugin_status='ACTIVE'";
|
|
|
|
std::string encryption_plugin_config;
|
|
|
|
static void add_to_plugin_load_list(const char *plugin_def)
|
|
{
|
|
opt_plugin_load_list_ptr->push_back(new i_string(plugin_def));
|
|
}
|
|
|
|
static char XTRABACKUP_EXE[] = "xtrabackup";
|
|
|
|
/*
|
|
Read "plugin-load" value (encryption plugin) from backup-my.cnf during
|
|
prepare phase.
|
|
The value is stored during backup phase.
|
|
*/
|
|
static std::string get_encryption_plugin_from_cnf()
|
|
{
|
|
FILE *f = fopen("backup-my.cnf", "r");
|
|
if (!f)
|
|
{
|
|
die("Can't open backup-my.cnf for reading");
|
|
}
|
|
char line[512];
|
|
std::string plugin_load;
|
|
while (fgets(line, sizeof(line), f))
|
|
{
|
|
if (strncmp(line, "plugin_load=", 12) == 0)
|
|
{
|
|
plugin_load = line + 12;
|
|
// remote \n at the end of string
|
|
plugin_load.resize(plugin_load.size() - 1);
|
|
break;
|
|
}
|
|
}
|
|
fclose(f);
|
|
return plugin_load;
|
|
}
|
|
|
|
|
|
void encryption_plugin_backup_init(MYSQL *mysql)
|
|
{
|
|
MYSQL_RES *result;
|
|
MYSQL_ROW row;
|
|
std::ostringstream oss;
|
|
char *argv[PLUGIN_MAX_ARGS];
|
|
int argc;
|
|
|
|
result = xb_mysql_query(mysql, QUERY_PLUGIN, true, true);
|
|
row = mysql_fetch_row(result);
|
|
if (!row)
|
|
{
|
|
mysql_free_result(result);
|
|
return;
|
|
}
|
|
|
|
char *name= row[0];
|
|
char *library= row[1];
|
|
char *dir= row[2];
|
|
|
|
#ifdef _WIN32
|
|
for (char *p = dir; *p; p++)
|
|
if (*p == '\\') *p = '/';
|
|
#endif
|
|
|
|
std::string plugin_load(name);
|
|
if (library)
|
|
{
|
|
/* Remove shared library suffixes, in case we'll prepare on different OS.*/
|
|
const char *extensions[] = { ".dll", ".so", 0 };
|
|
for (size_t i = 0; extensions[i]; i++)
|
|
{
|
|
const char *ext = extensions[i];
|
|
if (ends_with(library, ext))
|
|
library[strlen(library) - strlen(ext)] = 0;
|
|
}
|
|
plugin_load += std::string("=") + library;
|
|
}
|
|
|
|
oss << "plugin_load=" << plugin_load << std::endl;
|
|
|
|
/* Required to load the plugin later.*/
|
|
add_to_plugin_load_list(plugin_load.c_str());
|
|
strncpy(opt_plugin_dir, dir, FN_REFLEN - 1);
|
|
opt_plugin_dir[FN_REFLEN - 1] = '\0';
|
|
|
|
oss << "plugin_dir=" << '"' << dir << '"' << std::endl;
|
|
|
|
|
|
/* Read plugin variables. */
|
|
char query[1024];
|
|
snprintf(query, 1024, "SHOW variables like '%s_%%'", name);
|
|
mysql_free_result(result);
|
|
|
|
result = xb_mysql_query(mysql, query, true, true);
|
|
while ((row = mysql_fetch_row(result)))
|
|
{
|
|
std::string arg("--");
|
|
arg += row[0];
|
|
arg += "=";
|
|
arg += row[1];
|
|
backup_plugins_args.push_back(arg);
|
|
oss << row[0] << "=" << row[1] << std::endl;
|
|
}
|
|
|
|
mysql_free_result(result);
|
|
|
|
/* Check whether to encrypt logs. */
|
|
result = xb_mysql_query(mysql, "select @@innodb_encrypt_log", true, true);
|
|
row = mysql_fetch_row(result);
|
|
srv_encrypt_log = (row != 0 && row[0][0] == '1');
|
|
oss << "innodb_encrypt_log=" << row[0] << std::endl;
|
|
|
|
mysql_free_result(result);
|
|
|
|
encryption_plugin_config = oss.str();
|
|
|
|
argc = 0;
|
|
argv[argc++] = XTRABACKUP_EXE;
|
|
for(size_t i = 0; i < backup_plugins_args.size(); i++)
|
|
{
|
|
argv[argc++] = (char *)backup_plugins_args[i].c_str();
|
|
if (argc == PLUGIN_MAX_ARGS - 2)
|
|
break;
|
|
}
|
|
argv[argc] = 0;
|
|
|
|
encryption_plugin_init(argc, argv);
|
|
}
|
|
|
|
const char *encryption_plugin_get_config()
|
|
{
|
|
return encryption_plugin_config.c_str();
|
|
}
|
|
|
|
extern int finalize_encryption_plugin(st_plugin_int *plugin);
|
|
|
|
|
|
void encryption_plugin_prepare_init(int argc, char **argv)
|
|
{
|
|
std::string plugin_load= get_encryption_plugin_from_cnf();
|
|
if (plugin_load.size())
|
|
{
|
|
msg("Loading encryption plugin from %s", plugin_load.c_str());
|
|
}
|
|
else
|
|
{
|
|
finalize_encryption_plugin(0);
|
|
return;
|
|
}
|
|
|
|
add_to_plugin_load_list(plugin_load.c_str());
|
|
|
|
if (xb_plugin_dir)
|
|
{
|
|
strncpy(opt_plugin_dir, xb_plugin_dir, FN_REFLEN - 1);
|
|
opt_plugin_dir[FN_REFLEN - 1] = '\0';
|
|
}
|
|
|
|
char **new_argv = new char *[argc + 1];
|
|
new_argv[0] = XTRABACKUP_EXE;
|
|
memcpy(&new_argv[1], argv, argc*sizeof(char *));
|
|
|
|
encryption_plugin_init(argc+1, new_argv);
|
|
|
|
delete[] new_argv;
|
|
}
|
|
|
|
static void encryption_plugin_init(int argc, char **argv)
|
|
{
|
|
/* Patch optional and mandatory plugins, we only need to load the one in xb_plugin_load. */
|
|
mysql_optional_plugins[0] = mysql_mandatory_plugins[0] = 0;
|
|
msg("Loading encryption plugin");
|
|
for (int i= 1; i < argc; i++)
|
|
msg("\t Encryption plugin parameter : '%s'", argv[i]);
|
|
plugin_init(&argc, argv, PLUGIN_INIT_SKIP_PLUGIN_TABLE);
|
|
}
|
|
|