2
0
mirror of https://github.com/openvswitch/ovs synced 2025-08-30 05:47:55 +00:00
ovs/ovsdb/ovsdb-server.c

1092 lines
32 KiB
C
Raw Normal View History

/* Copyright (c) 2009, 2010, 2011, 2012, 2013 Nicira, Inc.
2009-11-04 15:11:44 -08:00
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <config.h>
#include <errno.h>
#include <getopt.h>
#include <inttypes.h>
2009-11-04 15:11:44 -08:00
#include <signal.h>
#include <unistd.h>
2009-11-04 15:11:44 -08:00
#include "column.h"
2009-11-04 15:11:44 -08:00
#include "command-line.h"
#include "daemon.h"
#include "dirs.h"
#include "dummy.h"
#include "dynamic-string.h"
#include "file.h"
#include "hash.h"
2009-11-04 15:11:44 -08:00
#include "json.h"
#include "jsonrpc.h"
#include "jsonrpc-server.h"
#include "leak-checker.h"
#include "list.h"
#include "memory.h"
#include "ovsdb.h"
#include "ovsdb-data.h"
#include "ovsdb-types.h"
2009-11-04 15:11:44 -08:00
#include "ovsdb-error.h"
#include "poll-loop.h"
#include "process.h"
#include "row.h"
#include "simap.h"
#include "stream-ssl.h"
2009-11-04 15:11:44 -08:00
#include "stream.h"
#include "stress.h"
#include "sset.h"
#include "table.h"
2009-11-04 15:11:44 -08:00
#include "timeval.h"
#include "transaction.h"
2009-11-04 15:11:44 -08:00
#include "trigger.h"
#include "util.h"
#include "unixctl.h"
#include "vlog.h"
VLOG_DEFINE_THIS_MODULE(ovsdb_server);
2009-11-04 15:11:44 -08:00
struct db {
/* Initialized in main(). */
char *filename;
struct ovsdb_file *file;
struct ovsdb *db;
/* Only used by update_remote_status(). */
struct ovsdb_txn *txn;
};
/* SSL configuration. */
static char *private_key_file;
static char *certificate_file;
static char *ca_cert_file;
static bool bootstrap_ca_cert;
static unixctl_cb_func ovsdb_server_exit;
static unixctl_cb_func ovsdb_server_compact;
static unixctl_cb_func ovsdb_server_reconnect;
struct add_remote_aux {
struct sset *remotes;
struct db *dbs;
size_t n_dbs;
};
static unixctl_cb_func ovsdb_server_add_remote;
static unixctl_cb_func ovsdb_server_remove_remote;
static unixctl_cb_func ovsdb_server_list_remotes;
static void parse_options(int *argc, char **argvp[],
struct sset *remotes, char **unixctl_pathp,
char **run_command);
2009-11-04 15:11:44 -08:00
static void usage(void) NO_RETURN;
static void reconfigure_from_db(struct ovsdb_jsonrpc_server *jsonrpc,
const struct db dbs[], size_t n_dbs,
struct sset *remotes);
static void update_remote_status(const struct ovsdb_jsonrpc_server *jsonrpc,
const struct sset *remotes,
struct db dbs[], size_t n_dbs);
2009-11-04 15:11:44 -08:00
int
main(int argc, char *argv[])
{
char *unixctl_path = NULL;
char *run_command = NULL;
2009-11-04 15:11:44 -08:00
struct unixctl_server *unixctl;
struct ovsdb_jsonrpc_server *jsonrpc;
struct sset remotes;
struct process *run_process;
bool exiting;
2009-11-04 15:11:44 -08:00
int retval;
long long int status_timer = LLONG_MIN;
struct add_remote_aux add_remote_aux;
2009-11-04 15:11:44 -08:00
struct db *dbs;
int n_dbs;
int i;
proctitle_init(argc, argv);
2009-11-04 15:11:44 -08:00
set_program_name(argv[0]);
stress_init_command();
2009-11-04 15:11:44 -08:00
signal(SIGPIPE, SIG_IGN);
process_init();
parse_options(&argc, &argv, &remotes, &unixctl_path, &run_command);
2009-11-04 15:11:44 -08:00
daemonize_start();
n_dbs = MAX(1, argc);
dbs = xcalloc(n_dbs + 1, sizeof *dbs);
if (argc > 0) {
for (i = 0; i < argc; i++) {
dbs[i].filename = argv[i];
}
} else {
dbs[0].filename = xasprintf("%s/conf.db", ovs_dbdir());
2009-11-04 15:11:44 -08:00
}
for (i = 0; i < n_dbs; i++) {
struct ovsdb_error *error;
error = ovsdb_file_open(dbs[i].filename, false,
&dbs[i].db, &dbs[i].file);
if (error) {
ovs_fatal(0, "%s", ovsdb_error_to_string(error));
}
}
jsonrpc = ovsdb_jsonrpc_server_create();
for (i = 0; i < n_dbs; i++) {
if (!ovsdb_jsonrpc_server_add_db(jsonrpc, dbs[i].db)) {
ovs_fatal(0, "%s: duplicate database name",
dbs[i].db->schema->name);
}
}
reconfigure_from_db(jsonrpc, dbs, n_dbs, &remotes);
2009-11-04 15:11:44 -08:00
retval = unixctl_server_create(unixctl_path, &unixctl);
2009-11-04 15:11:44 -08:00
if (retval) {
exit(EXIT_FAILURE);
2009-11-04 15:11:44 -08:00
}
if (run_command) {
char *run_argv[4];
run_argv[0] = "/bin/sh";
run_argv[1] = "-c";
run_argv[2] = run_command;
run_argv[3] = NULL;
retval = process_start(run_argv, NULL, 0, NULL, 0, &run_process);
if (retval) {
ovs_fatal(retval, "%s: process failed to start", run_command);
}
} else {
run_process = NULL;
}
daemonize_complete();
if (!run_command) {
/* ovsdb-server is usually a long-running process, in which case it
* makes plenty of sense to log the version, but --run makes
* ovsdb-server more like a command-line tool, so skip it. */
VLOG_INFO("%s (Open vSwitch) %s", program_name, VERSION);
}
unixctl_command_register("exit", "", 0, 0, ovsdb_server_exit, &exiting);
unixctl_command_register("ovsdb-server/compact", "", 0, 1,
ovsdb_server_compact, dbs);
unixctl_command_register("ovsdb-server/reconnect", "", 0, 0,
ovsdb_server_reconnect, jsonrpc);
add_remote_aux.remotes = &remotes;
add_remote_aux.dbs = dbs;
add_remote_aux.n_dbs = n_dbs;
unixctl_command_register("ovsdb-server/add-remote", "REMOTE", 1, 1,
ovsdb_server_add_remote, &add_remote_aux);
unixctl_command_register("ovsdb-server/remove-remote", "REMOTE", 1, 1,
ovsdb_server_remove_remote, &remotes);
unixctl_command_register("ovsdb-server/list-remotes", "", 0, 0,
ovsdb_server_list_remotes, &remotes);
exiting = false;
while (!exiting) {
int i;
memory_run();
if (memory_should_report()) {
struct simap usage;
simap_init(&usage);
ovsdb_jsonrpc_server_get_memory_usage(jsonrpc, &usage);
for (i = 0; i < n_dbs; i++) {
ovsdb_get_memory_usage(dbs[i].db, &usage);
}
memory_report(&usage);
simap_destroy(&usage);
}
/* Run unixctl_server_run() before reconfigure_from_db() because
* ovsdb-server/add-remote and ovsdb-server/remove-remote can change
* the set of remotes that reconfigure_from_db() uses. */
unixctl_server_run(unixctl);
reconfigure_from_db(jsonrpc, dbs, n_dbs, &remotes);
2009-11-04 15:11:44 -08:00
ovsdb_jsonrpc_server_run(jsonrpc);
for (i = 0; i < n_dbs; i++) {
ovsdb_trigger_run(dbs[i].db, time_msec());
}
if (run_process && process_exited(run_process)) {
exiting = true;
}
2009-11-04 15:11:44 -08:00
/* update Manager status(es) every 5 seconds */
if (time_msec() >= status_timer) {
status_timer = time_msec() + 5000;
update_remote_status(jsonrpc, &remotes, dbs, n_dbs);
}
memory_wait();
2009-11-04 15:11:44 -08:00
ovsdb_jsonrpc_server_wait(jsonrpc);
unixctl_server_wait(unixctl);
for (i = 0; i < n_dbs; i++) {
ovsdb_trigger_wait(dbs[i].db, time_msec());
}
if (run_process) {
process_wait(run_process);
}
if (exiting) {
poll_immediate_wake();
}
poll_timer_wait_until(status_timer);
2009-11-04 15:11:44 -08:00
poll_block();
}
ovsdb_jsonrpc_server_destroy(jsonrpc);
for (i = 0; i < n_dbs; i++) {
ovsdb_destroy(dbs[i].db);
}
sset_destroy(&remotes);
unixctl_server_destroy(unixctl);
2009-11-04 15:11:44 -08:00
if (run_process && process_exited(run_process)) {
int status = process_status(run_process);
if (status) {
ovs_fatal(0, "%s: child exited, %s",
run_command, process_status_msg(status));
}
}
2009-11-04 15:11:44 -08:00
return 0;
}
static const struct db *
find_db(const struct db dbs[], size_t n_dbs, const char *db_name)
{
size_t i;
for (i = 0; i < n_dbs; i++) {
if (!strcmp(dbs[i].db->schema->name, db_name)) {
return &dbs[i];
}
}
return NULL;
}
static char * WARN_UNUSED_RESULT
parse_db_column__(const struct db dbs[], size_t n_dbs,
const char *name_, char *name,
const struct db **dbp,
const struct ovsdb_table **tablep,
const struct ovsdb_column **columnp)
{
const char *table_name, *column_name;
const struct ovsdb_column *column;
const struct ovsdb_table *table;
const char *tokens[3];
char *save_ptr = NULL;
const struct db *db;
*dbp = NULL;
*tablep = NULL;
*columnp = NULL;
strtok_r(name, ":", &save_ptr); /* "db:" */
tokens[0] = strtok_r(NULL, ",", &save_ptr);
tokens[1] = strtok_r(NULL, ",", &save_ptr);
tokens[2] = strtok_r(NULL, ",", &save_ptr);
if (!tokens[0] || !tokens[1]) {
return xasprintf("\"%s\": invalid syntax", name_);
}
if (tokens[2]) {
const char *db_name = tokens[0];
table_name = tokens[1];
column_name = tokens[2];
db = find_db(dbs, n_dbs, tokens[0]);
if (!db) {
return xasprintf("\"%s\": no database named %s", name_, db_name);
}
} else {
if (n_dbs > 1) {
return xasprintf("\"%s\": database name must be specified "
"(because multiple databases are configured)",
name_);
}
table_name = tokens[0];
column_name = tokens[1];
db = &dbs[0];
}
table = ovsdb_get_table(db->db, table_name);
if (!table) {
return xasprintf("\"%s\": no table named %s", name_, table_name);
}
column = ovsdb_table_schema_get_column(table->schema, column_name);
if (!column) {
return xasprintf("\"%s\": table \"%s\" has no column \"%s\"",
name_, table_name, column_name);
}
*dbp = db;
*columnp = column;
*tablep = table;
return NULL;
}
/* Returns NULL if successful, otherwise a malloc()'d string describing the
* error. */
static char * WARN_UNUSED_RESULT
parse_db_column(const struct db dbs[], size_t n_dbs,
const char *name_,
const struct db **dbp,
const struct ovsdb_table **tablep,
const struct ovsdb_column **columnp)
{
char *name = xstrdup(name_);
char *retval = parse_db_column__(dbs, n_dbs, name_, name,
dbp, tablep, columnp);
free(name);
return retval;
}
/* Returns NULL if successful, otherwise a malloc()'d string describing the
* error. */
static char * WARN_UNUSED_RESULT
parse_db_string_column(const struct db dbs[], size_t n_dbs,
const char *name,
const struct db **dbp,
const struct ovsdb_table **tablep,
const struct ovsdb_column **columnp)
{
char *retval;
retval = parse_db_column(dbs, n_dbs, name, dbp, tablep, columnp);
if (retval) {
return retval;
}
if ((*columnp)->type.key.type != OVSDB_TYPE_STRING
|| (*columnp)->type.value.type != OVSDB_TYPE_VOID) {
return xasprintf("\"%s\": table \"%s\" column \"%s\" is "
"not string or set of strings",
name, (*tablep)->schema->name, (*columnp)->name);
}
return NULL;
}
static OVS_UNUSED const char *
query_db_string(const struct db dbs[], size_t n_dbs, const char *name)
{
if (!name || strncmp(name, "db:", 3)) {
return name;
} else {
const struct ovsdb_column *column;
const struct ovsdb_table *table;
const struct ovsdb_row *row;
const struct db *db;
char *retval;
retval = parse_db_string_column(dbs, n_dbs, name,
&db, &table, &column);
if (retval) {
ovs_fatal(0, "%s", retval);
}
HMAP_FOR_EACH (row, hmap_node, &table->rows) {
const struct ovsdb_datum *datum;
size_t i;
datum = &row->fields[column->index];
for (i = 0; i < datum->n; i++) {
if (datum->keys[i].string[0]) {
return datum->keys[i].string;
}
}
}
return NULL;
}
}
static struct ovsdb_jsonrpc_options *
add_remote(struct shash *remotes, const char *target)
{
struct ovsdb_jsonrpc_options *options;
options = shash_find_data(remotes, target);
if (!options) {
options = ovsdb_jsonrpc_default_options(target);
shash_add(remotes, target, options);
}
return options;
}
static struct ovsdb_datum *
get_datum(struct ovsdb_row *row, const char *column_name,
const enum ovsdb_atomic_type key_type,
const enum ovsdb_atomic_type value_type,
const size_t n_max)
{
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
const struct ovsdb_table_schema *schema = row->table->schema;
const struct ovsdb_column *column;
column = ovsdb_table_schema_get_column(schema, column_name);
if (!column) {
VLOG_DBG_RL(&rl, "Table `%s' has no `%s' column",
schema->name, column_name);
return NULL;
}
if (column->type.key.type != key_type
|| column->type.value.type != value_type
|| column->type.n_max != n_max) {
if (!VLOG_DROP_DBG(&rl)) {
char *type_name = ovsdb_type_to_english(&column->type);
VLOG_DBG("Table `%s' column `%s' has type %s, not expected "
"key type %s, value type %s, max elements %zd.",
schema->name, column_name, type_name,
ovsdb_atomic_type_to_string(key_type),
ovsdb_atomic_type_to_string(value_type),
n_max);
free(type_name);
}
return NULL;
}
return &row->fields[column->index];
}
/* Read string-string key-values from a map. Returns the value associated with
* 'key', if found, or NULL */
static const char *
read_map_string_column(const struct ovsdb_row *row, const char *column_name,
const char *key)
{
const struct ovsdb_datum *datum;
union ovsdb_atom *atom_key = NULL, *atom_value = NULL;
size_t i;
datum = get_datum(CONST_CAST(struct ovsdb_row *, row), column_name,
OVSDB_TYPE_STRING, OVSDB_TYPE_STRING, UINT_MAX);
if (!datum) {
return NULL;
}
for (i = 0; i < datum->n; i++) {
atom_key = &datum->keys[i];
if (!strcmp(atom_key->string, key)){
atom_value = &datum->values[i];
break;
}
}
return atom_value ? atom_value->string : NULL;
}
static const union ovsdb_atom *
read_column(const struct ovsdb_row *row, const char *column_name,
enum ovsdb_atomic_type type)
{
const struct ovsdb_datum *datum;
datum = get_datum(CONST_CAST(struct ovsdb_row *, row), column_name, type,
OVSDB_TYPE_VOID, 1);
return datum && datum->n ? datum->keys : NULL;
}
static bool
read_integer_column(const struct ovsdb_row *row, const char *column_name,
long long int *integerp)
{
const union ovsdb_atom *atom;
atom = read_column(row, column_name, OVSDB_TYPE_INTEGER);
*integerp = atom ? atom->integer : 0;
return atom != NULL;
}
static bool
read_string_column(const struct ovsdb_row *row, const char *column_name,
const char **stringp)
{
const union ovsdb_atom *atom;
atom = read_column(row, column_name, OVSDB_TYPE_STRING);
*stringp = atom ? atom->string : NULL;
return atom != NULL;
}
static void
write_bool_column(struct ovsdb_row *row, const char *column_name, bool value)
{
const struct ovsdb_column *column;
struct ovsdb_datum *datum;
column = ovsdb_table_schema_get_column(row->table->schema, column_name);
datum = get_datum(row, column_name, OVSDB_TYPE_BOOLEAN,
OVSDB_TYPE_VOID, 1);
if (!datum) {
return;
}
if (datum->n != 1) {
ovsdb_datum_destroy(datum, &column->type);
datum->n = 1;
datum->keys = xmalloc(sizeof *datum->keys);
datum->values = NULL;
}
datum->keys[0].boolean = value;
}
static void
write_string_string_column(struct ovsdb_row *row, const char *column_name,
char **keys, char **values, size_t n)
{
const struct ovsdb_column *column;
struct ovsdb_datum *datum;
size_t i;
column = ovsdb_table_schema_get_column(row->table->schema, column_name);
datum = get_datum(row, column_name, OVSDB_TYPE_STRING, OVSDB_TYPE_STRING,
UINT_MAX);
if (!datum) {
for (i = 0; i < n; i++) {
free(keys[i]);
free(values[i]);
}
return;
}
/* Free existing data. */
ovsdb_datum_destroy(datum, &column->type);
/* Allocate space for new values. */
datum->n = n;
datum->keys = xmalloc(n * sizeof *datum->keys);
datum->values = xmalloc(n * sizeof *datum->values);
for (i = 0; i < n; ++i) {
datum->keys[i].string = keys[i];
datum->values[i].string = values[i];
}
/* Sort and check constraints. */
ovsdb_datum_sort_assert(datum, column->type.key.type);
}
/* Adds a remote and options to 'remotes', based on the Manager table row in
* 'row'. */
static void
add_manager_options(struct shash *remotes, const struct ovsdb_row *row)
{
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
struct ovsdb_jsonrpc_options *options;
long long int max_backoff, probe_interval;
const char *target, *dscp_string;
if (!read_string_column(row, "target", &target) || !target) {
VLOG_INFO_RL(&rl, "Table `%s' has missing or invalid `target' column",
row->table->schema->name);
return;
}
options = add_remote(remotes, target);
if (read_integer_column(row, "max_backoff", &max_backoff)) {
options->max_backoff = max_backoff;
}
if (read_integer_column(row, "inactivity_probe", &probe_interval)) {
options->probe_interval = probe_interval;
}
options->dscp = DSCP_DEFAULT;
dscp_string = read_map_string_column(row, "other_config", "dscp");
if (dscp_string) {
int dscp = atoi(dscp_string);
if (dscp >= 0 && dscp <= 63) {
options->dscp = dscp;
}
}
}
static void
query_db_remotes(const char *name, const struct db dbs[], size_t n_dbs,
struct shash *remotes)
{
const struct ovsdb_column *column;
const struct ovsdb_table *table;
const struct ovsdb_row *row;
const struct db *db;
char *retval;
retval = parse_db_column(dbs, n_dbs, name, &db, &table, &column);
if (retval) {
ovs_fatal(0, "%s", retval);
}
if (column->type.key.type == OVSDB_TYPE_STRING
&& column->type.value.type == OVSDB_TYPE_VOID) {
HMAP_FOR_EACH (row, hmap_node, &table->rows) {
const struct ovsdb_datum *datum;
size_t i;
datum = &row->fields[column->index];
for (i = 0; i < datum->n; i++) {
add_remote(remotes, datum->keys[i].string);
}
}
} else if (column->type.key.type == OVSDB_TYPE_UUID
&& column->type.key.u.uuid.refTable
&& column->type.value.type == OVSDB_TYPE_VOID) {
const struct ovsdb_table *ref_table = column->type.key.u.uuid.refTable;
HMAP_FOR_EACH (row, hmap_node, &table->rows) {
const struct ovsdb_datum *datum;
size_t i;
datum = &row->fields[column->index];
for (i = 0; i < datum->n; i++) {
const struct ovsdb_row *ref_row;
ref_row = ovsdb_table_get_row(ref_table, &datum->keys[i].uuid);
if (ref_row) {
add_manager_options(remotes, ref_row);
}
}
}
}
}
static void
update_remote_row(const struct ovsdb_row *row, struct ovsdb_txn *txn,
const struct ovsdb_jsonrpc_server *jsonrpc)
{
struct ovsdb_jsonrpc_remote_status status;
struct ovsdb_row *rw_row;
const char *target;
char *keys[9], *values[9];
size_t n = 0;
/* Get the "target" (protocol/host/port) spec. */
if (!read_string_column(row, "target", &target)) {
/* Bad remote spec or incorrect schema. */
return;
}
rw_row = ovsdb_txn_row_modify(txn, row);
ovsdb_jsonrpc_server_get_remote_status(jsonrpc, target, &status);
/* Update status information columns. */
write_bool_column(rw_row, "is_connected", status.is_connected);
if (status.state) {
keys[n] = xstrdup("state");
values[n++] = xstrdup(status.state);
}
if (status.sec_since_connect != UINT_MAX) {
keys[n] = xstrdup("sec_since_connect");
values[n++] = xasprintf("%u", status.sec_since_connect);
}
if (status.sec_since_disconnect != UINT_MAX) {
keys[n] = xstrdup("sec_since_disconnect");
values[n++] = xasprintf("%u", status.sec_since_disconnect);
}
if (status.last_error) {
keys[n] = xstrdup("last_error");
values[n++] =
xstrdup(ovs_retval_to_string(status.last_error));
}
if (status.locks_held && status.locks_held[0]) {
keys[n] = xstrdup("locks_held");
values[n++] = xstrdup(status.locks_held);
}
if (status.locks_waiting && status.locks_waiting[0]) {
keys[n] = xstrdup("locks_waiting");
values[n++] = xstrdup(status.locks_waiting);
}
if (status.locks_lost && status.locks_lost[0]) {
keys[n] = xstrdup("locks_lost");
values[n++] = xstrdup(status.locks_lost);
}
if (status.n_connections > 1) {
keys[n] = xstrdup("n_connections");
values[n++] = xasprintf("%d", status.n_connections);
}
if (status.bound_port != htons(0)) {
keys[n] = xstrdup("bound_port");
values[n++] = xasprintf("%"PRIu16, ntohs(status.bound_port));
}
write_string_string_column(rw_row, "status", keys, values, n);
ovsdb_jsonrpc_server_free_remote_status(&status);
}
static void
update_remote_rows(const struct db dbs[], size_t n_dbs,
const char *remote_name,
const struct ovsdb_jsonrpc_server *jsonrpc)
{
const struct ovsdb_table *table, *ref_table;
const struct ovsdb_column *column;
const struct ovsdb_row *row;
const struct db *db;
char *retval;
if (strncmp("db:", remote_name, 3)) {
return;
}
retval = parse_db_column(dbs, n_dbs, remote_name, &db, &table, &column);
if (retval) {
ovs_fatal(0, "%s", retval);
}
if (column->type.key.type != OVSDB_TYPE_UUID
|| !column->type.key.u.uuid.refTable
|| column->type.value.type != OVSDB_TYPE_VOID) {
return;
}
ref_table = column->type.key.u.uuid.refTable;
HMAP_FOR_EACH (row, hmap_node, &table->rows) {
const struct ovsdb_datum *datum;
size_t i;
datum = &row->fields[column->index];
for (i = 0; i < datum->n; i++) {
const struct ovsdb_row *ref_row;
ref_row = ovsdb_table_get_row(ref_table, &datum->keys[i].uuid);
if (ref_row) {
update_remote_row(ref_row, db->txn, jsonrpc);
}
}
}
}
static void
update_remote_status(const struct ovsdb_jsonrpc_server *jsonrpc,
const struct sset *remotes,
struct db dbs[], size_t n_dbs)
{
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
const char *remote;
size_t i;
for (i = 0; i < n_dbs; i++) {
dbs[i].txn = ovsdb_txn_create(dbs[i].db);
}
/* Iterate over --remote arguments given on command line. */
SSET_FOR_EACH (remote, remotes) {
update_remote_rows(dbs, n_dbs, remote, jsonrpc);
}
for (i = 0; i < n_dbs; i++) {
struct ovsdb_error *error = ovsdb_txn_commit(dbs[i].txn, false);
if (error) {
VLOG_ERR_RL(&rl, "Failed to update remote status: %s",
ovsdb_error_to_string(error));
ovsdb_error_destroy(error);
}
}
}
/* Reconfigures ovsdb-server based on information in the database. */
static void
reconfigure_from_db(struct ovsdb_jsonrpc_server *jsonrpc,
const struct db dbs[], size_t n_dbs, struct sset *remotes)
{
struct shash resolved_remotes;
const char *name;
/* Configure remotes. */
shash_init(&resolved_remotes);
SSET_FOR_EACH (name, remotes) {
if (!strncmp(name, "db:", 3)) {
query_db_remotes(name, dbs, n_dbs, &resolved_remotes);
} else {
add_remote(&resolved_remotes, name);
}
}
ovsdb_jsonrpc_server_set_remotes(jsonrpc, &resolved_remotes);
shash_destroy_free_data(&resolved_remotes);
/* Configure SSL. */
stream_ssl_set_key_and_cert(query_db_string(dbs, n_dbs, private_key_file),
query_db_string(dbs, n_dbs, certificate_file));
stream_ssl_set_ca_cert_file(query_db_string(dbs, n_dbs, ca_cert_file),
bootstrap_ca_cert);
}
static void
ovsdb_server_exit(struct unixctl_conn *conn, int argc OVS_UNUSED,
const char *argv[] OVS_UNUSED,
void *exiting_)
{
bool *exiting = exiting_;
*exiting = true;
unixctl_command_reply(conn, NULL);
}
static void
ovsdb_server_compact(struct unixctl_conn *conn, int argc,
const char *argv[], void *dbs_)
{
struct db *dbs = dbs_;
struct ds reply;
struct db *db;
int n = 0;
ds_init(&reply);
for (db = dbs; db->filename != NULL; db++) {
const char *name = db->db->schema->name;
if (argc < 2 || !strcmp(argv[1], name)) {
struct ovsdb_error *error;
VLOG_INFO("compacting %s database by user request", name);
error = ovsdb_file_compact(db->file);
if (error) {
char *s = ovsdb_error_to_string(error);
ds_put_format(&reply, "%s\n", s);
free(s);
}
n++;
}
}
if (!n) {
unixctl_command_reply_error(conn, "no database by that name");
} else if (reply.length) {
unixctl_command_reply_error(conn, ds_cstr(&reply));
} else {
unixctl_command_reply(conn, NULL);
}
ds_destroy(&reply);
}
/* "ovsdb-server/reconnect": makes ovsdb-server drop all of its JSON-RPC
* connections and reconnect. */
static void
ovsdb_server_reconnect(struct unixctl_conn *conn, int argc OVS_UNUSED,
const char *argv[] OVS_UNUSED, void *jsonrpc_)
{
struct ovsdb_jsonrpc_server *jsonrpc = jsonrpc_;
ovsdb_jsonrpc_server_reconnect(jsonrpc);
unixctl_command_reply(conn, NULL);
}
/* "ovsdb-server/add-remote REMOTE": adds REMOTE to the set of remotes that
* ovsdb-server services. */
static void
ovsdb_server_add_remote(struct unixctl_conn *conn, int argc OVS_UNUSED,
const char *argv[], void *aux_)
{
struct add_remote_aux *aux = aux_;
const char *remote = argv[1];
const struct ovsdb_column *column;
const struct ovsdb_table *table;
const struct db *db;
char *retval;
retval = (strncmp("db:", remote, 3)
? NULL
: parse_db_column(aux->dbs, aux->n_dbs, remote,
&db, &table, &column));
if (!retval) {
sset_add(aux->remotes, remote);
unixctl_command_reply(conn, NULL);
} else {
unixctl_command_reply_error(conn, retval);
free(retval);
}
}
/* "ovsdb-server/remove-remote REMOTE": removes REMOTE frmo the set of remotes
* that ovsdb-server services. */
static void
ovsdb_server_remove_remote(struct unixctl_conn *conn, int argc OVS_UNUSED,
const char *argv[], void *remotes_)
{
struct sset *remotes = remotes_;
struct sset_node *node;
node = sset_find(remotes, argv[1]);
if (node) {
sset_delete(remotes, node);
unixctl_command_reply(conn, NULL);
} else {
unixctl_command_reply_error(conn, "no such remote");
}
}
/* "ovsdb-server/list-remotes": outputs a list of configured rmeotes. */
static void
ovsdb_server_list_remotes(struct unixctl_conn *conn, int argc OVS_UNUSED,
const char *argv[] OVS_UNUSED, void *remotes_)
{
struct sset *remotes = remotes_;
const char **list, **p;
struct ds s;
ds_init(&s);
list = sset_sort(remotes);
for (p = list; *p; p++) {
ds_put_format(&s, "%s\n", *p);
}
free(list);
unixctl_command_reply(conn, ds_cstr(&s));
ds_destroy(&s);
}
2009-11-04 15:11:44 -08:00
static void
parse_options(int *argcp, char **argvp[],
struct sset *remotes, char **unixctl_pathp, char **run_command)
2009-11-04 15:11:44 -08:00
{
enum {
OPT_REMOTE = UCHAR_MAX + 1,
OPT_UNIXCTL,
OPT_RUN,
OPT_BOOTSTRAP_CA_CERT,
OPT_ENABLE_DUMMY,
2009-11-04 15:11:44 -08:00
VLOG_OPTION_ENUMS,
LEAK_CHECKER_OPTION_ENUMS,
DAEMON_OPTION_ENUMS
2009-11-04 15:11:44 -08:00
};
static const struct option long_options[] = {
{"remote", required_argument, NULL, OPT_REMOTE},
{"unixctl", required_argument, NULL, OPT_UNIXCTL},
{"run", required_argument, NULL, OPT_RUN},
{"help", no_argument, NULL, 'h'},
{"version", no_argument, NULL, 'V'},
2009-11-04 15:11:44 -08:00
DAEMON_LONG_OPTIONS,
VLOG_LONG_OPTIONS,
LEAK_CHECKER_LONG_OPTIONS,
{"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT},
{"private-key", required_argument, NULL, 'p'},
{"certificate", required_argument, NULL, 'c'},
{"ca-cert", required_argument, NULL, 'C'},
{"enable-dummy", optional_argument, NULL, OPT_ENABLE_DUMMY},
{NULL, 0, NULL, 0},
2009-11-04 15:11:44 -08:00
};
char *short_options = long_options_to_short_options(long_options);
int argc = *argcp;
char **argv = *argvp;
2009-11-04 15:11:44 -08:00
sset_init(remotes);
2009-11-04 15:11:44 -08:00
for (;;) {
int c;
c = getopt_long(argc, argv, short_options, long_options, NULL);
if (c == -1) {
break;
}
switch (c) {
case OPT_REMOTE:
sset_add(remotes, optarg);
2009-11-04 15:11:44 -08:00
break;
case OPT_UNIXCTL:
*unixctl_pathp = optarg;
break;
case OPT_RUN:
*run_command = optarg;
break;
2009-11-04 15:11:44 -08:00
case 'h':
usage();
case 'V':
ovs_print_version(0, 0);
2009-11-04 15:11:44 -08:00
exit(EXIT_SUCCESS);
VLOG_OPTION_HANDLERS
DAEMON_OPTION_HANDLERS
LEAK_CHECKER_OPTION_HANDLERS
case 'p':
private_key_file = optarg;
break;
case 'c':
certificate_file = optarg;
break;
case 'C':
ca_cert_file = optarg;
bootstrap_ca_cert = false;
break;
case OPT_BOOTSTRAP_CA_CERT:
ca_cert_file = optarg;
bootstrap_ca_cert = true;
break;
case OPT_ENABLE_DUMMY:
dummy_enable(optarg && !strcmp(optarg, "override"));
break;
2009-11-04 15:11:44 -08:00
case '?':
exit(EXIT_FAILURE);
default:
abort();
}
}
free(short_options);
*argcp -= optind;
*argvp += optind;
2009-11-04 15:11:44 -08:00
}
static void
usage(void)
{
printf("%s: Open vSwitch database server\n"
"usage: %s [OPTIONS] [DATABASE...]\n"
"where each DATABASE is a database file in ovsdb format.\n"
"The default DATABASE, if none is given, is\n%s/conf.db.\n",
program_name, program_name, ovs_dbdir());
2009-11-04 15:11:44 -08:00
printf("\nJSON-RPC options (may be specified any number of times):\n"
" --remote=REMOTE connect or listen to REMOTE\n");
stream_usage("JSON-RPC", true, true, true);
2009-11-04 15:11:44 -08:00
daemon_usage();
vlog_usage();
printf("\nOther options:\n"
" --run COMMAND run COMMAND as subprocess then exit\n"
" --unixctl=SOCKET override default control socket name\n"
2009-11-04 15:11:44 -08:00
" -h, --help display this help message\n"
" -V, --version display version information\n");
leak_checker_usage();
exit(EXIT_SUCCESS);
}