2010-01-04 10:05:51 -08:00
|
|
|
/* Copyright (c) 2009, 2010 Nicira Networks
|
2009-11-04 15:11:44 -08:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
#include "ovsdb.h"
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
#include <getopt.h>
|
|
|
|
#include <signal.h>
|
2009-11-16 15:09:50 -08:00
|
|
|
#include <unistd.h>
|
2009-11-04 15:11:44 -08:00
|
|
|
|
2010-01-04 10:05:51 -08:00
|
|
|
#include "column.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
#include "command-line.h"
|
|
|
|
#include "daemon.h"
|
2009-11-13 13:37:55 -08:00
|
|
|
#include "file.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
#include "json.h"
|
|
|
|
#include "jsonrpc.h"
|
|
|
|
#include "jsonrpc-server.h"
|
|
|
|
#include "leak-checker.h"
|
|
|
|
#include "list.h"
|
2010-01-04 10:05:51 -08:00
|
|
|
#include "ovsdb-data.h"
|
|
|
|
#include "ovsdb-types.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
#include "ovsdb-error.h"
|
|
|
|
#include "poll-loop.h"
|
|
|
|
#include "process.h"
|
2010-01-04 10:05:51 -08:00
|
|
|
#include "row.h"
|
2009-12-21 13:13:48 -08:00
|
|
|
#include "stream-ssl.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
#include "stream.h"
|
|
|
|
#include "svec.h"
|
2010-01-04 10:05:51 -08:00
|
|
|
#include "table.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
#include "timeval.h"
|
|
|
|
#include "trigger.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "unixctl.h"
|
|
|
|
|
|
|
|
#include "vlog.h"
|
|
|
|
#define THIS_MODULE VLM_ovsdb_server
|
|
|
|
|
2010-03-22 09:40:13 -07:00
|
|
|
#if HAVE_OPENSSL
|
2010-03-18 17:12:02 -07:00
|
|
|
/* SSL configuration. */
|
|
|
|
static char *private_key_file;
|
|
|
|
static char *certificate_file;
|
|
|
|
static char *ca_cert_file;
|
|
|
|
static bool bootstrap_ca_cert;
|
2010-03-22 09:40:13 -07:00
|
|
|
#endif
|
2010-03-18 17:12:02 -07:00
|
|
|
|
2009-11-17 16:02:38 -08:00
|
|
|
static unixctl_cb_func ovsdb_server_exit;
|
2010-03-18 11:24:55 -07:00
|
|
|
static unixctl_cb_func ovsdb_server_compact;
|
2010-06-24 12:56:30 -07:00
|
|
|
static unixctl_cb_func ovsdb_server_reconnect;
|
2009-11-17 16:02:38 -08:00
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
static void parse_options(int argc, char *argv[], char **file_namep,
|
2010-02-12 11:17:17 -08:00
|
|
|
struct shash *remotes, char **unixctl_pathp,
|
|
|
|
char **run_command);
|
2009-11-04 15:11:44 -08:00
|
|
|
static void usage(void) NO_RETURN;
|
|
|
|
|
2010-03-18 17:12:02 -07:00
|
|
|
static void reconfigure_from_db(struct ovsdb_jsonrpc_server *jsonrpc,
|
|
|
|
const struct ovsdb *db, struct shash *remotes);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
int
|
|
|
|
main(int argc, char *argv[])
|
|
|
|
{
|
2009-11-17 16:02:38 -08:00
|
|
|
char *unixctl_path = NULL;
|
2010-02-12 11:17:17 -08:00
|
|
|
char *run_command = NULL;
|
2009-11-04 15:11:44 -08:00
|
|
|
struct unixctl_server *unixctl;
|
|
|
|
struct ovsdb_jsonrpc_server *jsonrpc;
|
2010-01-04 10:05:51 -08:00
|
|
|
struct shash remotes;
|
2009-11-04 15:11:44 -08:00
|
|
|
struct ovsdb_error *error;
|
2010-03-18 11:24:55 -07:00
|
|
|
struct ovsdb_file *file;
|
2009-11-04 15:11:44 -08:00
|
|
|
struct ovsdb *db;
|
2010-02-12 11:17:17 -08:00
|
|
|
struct process *run_process;
|
2009-11-04 15:11:44 -08:00
|
|
|
char *file_name;
|
2009-11-17 16:02:38 -08:00
|
|
|
bool exiting;
|
2009-11-04 15:11:44 -08:00
|
|
|
int retval;
|
|
|
|
|
2010-01-19 15:00:56 -08:00
|
|
|
proctitle_init(argc, argv);
|
2009-11-04 15:11:44 -08:00
|
|
|
set_program_name(argv[0]);
|
|
|
|
signal(SIGPIPE, SIG_IGN);
|
|
|
|
process_init();
|
|
|
|
|
2010-02-12 11:17:17 -08:00
|
|
|
parse_options(argc, argv, &file_name, &remotes, &unixctl_path,
|
|
|
|
&run_command);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
2009-11-16 15:09:50 -08:00
|
|
|
die_if_already_running();
|
2009-12-17 10:56:01 -08:00
|
|
|
daemonize_start();
|
2009-11-16 15:09:50 -08:00
|
|
|
|
2010-03-18 11:24:55 -07:00
|
|
|
error = ovsdb_file_open(file_name, false, &db, &file);
|
2009-11-04 15:11:44 -08:00
|
|
|
if (error) {
|
|
|
|
ovs_fatal(0, "%s", ovsdb_error_to_string(error));
|
|
|
|
}
|
|
|
|
|
2009-11-13 14:47:25 -08:00
|
|
|
jsonrpc = ovsdb_jsonrpc_server_create(db);
|
2010-03-18 17:12:02 -07:00
|
|
|
reconfigure_from_db(jsonrpc, db, &remotes);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
2009-11-17 16:02:38 -08:00
|
|
|
retval = unixctl_server_create(unixctl_path, &unixctl);
|
2009-11-04 15:11:44 -08:00
|
|
|
if (retval) {
|
2010-01-15 10:31:57 -08:00
|
|
|
exit(EXIT_FAILURE);
|
2009-11-04 15:11:44 -08:00
|
|
|
}
|
|
|
|
|
2010-02-12 11:17:17 -08:00
|
|
|
if (run_command) {
|
|
|
|
char *run_argv[4];
|
|
|
|
|
|
|
|
run_argv[0] = "/bin/sh";
|
|
|
|
run_argv[1] = "-c";
|
|
|
|
run_argv[2] = run_command;
|
|
|
|
run_argv[3] = NULL;
|
|
|
|
|
|
|
|
retval = process_start(run_argv, NULL, 0, NULL, 0, &run_process);
|
|
|
|
if (retval) {
|
|
|
|
ovs_fatal(retval, "%s: process failed to start", run_command);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
run_process = NULL;
|
|
|
|
}
|
|
|
|
|
2009-12-17 10:56:01 -08:00
|
|
|
daemonize_complete();
|
2009-11-17 16:02:38 -08:00
|
|
|
|
2009-12-17 10:56:01 -08:00
|
|
|
unixctl_command_register("exit", ovsdb_server_exit, &exiting);
|
2010-03-18 11:24:55 -07:00
|
|
|
unixctl_command_register("ovsdb-server/compact", ovsdb_server_compact,
|
|
|
|
file);
|
2010-06-24 12:56:30 -07:00
|
|
|
unixctl_command_register("ovsdb-server/reconnect", ovsdb_server_reconnect,
|
|
|
|
jsonrpc);
|
2009-11-17 16:02:38 -08:00
|
|
|
|
|
|
|
exiting = false;
|
|
|
|
while (!exiting) {
|
2010-03-18 17:12:02 -07:00
|
|
|
reconfigure_from_db(jsonrpc, db, &remotes);
|
2009-11-04 15:11:44 -08:00
|
|
|
ovsdb_jsonrpc_server_run(jsonrpc);
|
|
|
|
unixctl_server_run(unixctl);
|
|
|
|
ovsdb_trigger_run(db, time_msec());
|
2010-02-12 11:17:17 -08:00
|
|
|
if (run_process && process_exited(run_process)) {
|
|
|
|
exiting = true;
|
|
|
|
}
|
2009-11-04 15:11:44 -08:00
|
|
|
|
|
|
|
ovsdb_jsonrpc_server_wait(jsonrpc);
|
|
|
|
unixctl_server_wait(unixctl);
|
|
|
|
ovsdb_trigger_wait(db, time_msec());
|
2010-02-12 11:17:17 -08:00
|
|
|
if (run_process) {
|
|
|
|
process_wait(run_process);
|
|
|
|
}
|
2009-11-04 15:11:44 -08:00
|
|
|
poll_block();
|
|
|
|
}
|
2010-02-02 14:41:00 -08:00
|
|
|
ovsdb_jsonrpc_server_destroy(jsonrpc);
|
|
|
|
ovsdb_destroy(db);
|
|
|
|
shash_destroy(&remotes);
|
|
|
|
unixctl_server_destroy(unixctl);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
2010-02-12 11:17:17 -08:00
|
|
|
if (run_process && process_exited(run_process)) {
|
|
|
|
int status = process_status(run_process);
|
|
|
|
if (status) {
|
|
|
|
ovs_fatal(0, "%s: child exited, %s",
|
|
|
|
run_command, process_status_msg(status));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-01-04 10:05:51 -08:00
|
|
|
static void
|
2010-03-18 17:12:02 -07:00
|
|
|
parse_db_string_column(const struct ovsdb *db,
|
|
|
|
const char *name_,
|
|
|
|
const struct ovsdb_table **tablep,
|
|
|
|
const struct ovsdb_column **columnp)
|
2010-01-04 10:05:51 -08:00
|
|
|
{
|
2010-02-10 11:08:27 -08:00
|
|
|
char *name, *table_name, *column_name;
|
2010-01-04 10:05:51 -08:00
|
|
|
const struct ovsdb_column *column;
|
|
|
|
const struct ovsdb_table *table;
|
|
|
|
char *save_ptr = NULL;
|
|
|
|
|
|
|
|
name = xstrdup(name_);
|
2010-02-10 11:08:27 -08:00
|
|
|
strtok_r(name, ":", &save_ptr); /* "db:" */
|
2010-01-04 10:05:51 -08:00
|
|
|
table_name = strtok_r(NULL, ",", &save_ptr);
|
|
|
|
column_name = strtok_r(NULL, ",", &save_ptr);
|
|
|
|
if (!table_name || !column_name) {
|
2010-03-18 17:12:02 -07:00
|
|
|
ovs_fatal(0, "\"%s\": invalid syntax", name_);
|
2010-01-04 10:05:51 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
table = ovsdb_get_table(db, table_name);
|
|
|
|
if (!table) {
|
2010-03-18 17:12:02 -07:00
|
|
|
ovs_fatal(0, "\"%s\": no table named %s", name_, table_name);
|
2010-01-04 10:05:51 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
column = ovsdb_table_schema_get_column(table->schema, column_name);
|
|
|
|
if (!column) {
|
2010-03-18 17:12:02 -07:00
|
|
|
ovs_fatal(0, "\"%s\": table \"%s\" has no column \"%s\"",
|
2010-01-04 10:05:51 -08:00
|
|
|
name_, table_name, column_name);
|
|
|
|
}
|
2010-03-18 17:12:02 -07:00
|
|
|
free(name);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
if (column->type.key.type != OVSDB_TYPE_STRING
|
|
|
|
|| column->type.value.type != OVSDB_TYPE_VOID) {
|
2010-03-18 17:12:02 -07:00
|
|
|
ovs_fatal(0, "\"%s\": table \"%s\" column \"%s\" is "
|
2010-01-04 10:05:51 -08:00
|
|
|
"not string or set of strings",
|
2010-03-18 17:12:02 -07:00
|
|
|
name_, table->schema->name, column->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
*columnp = column;
|
|
|
|
*tablep = table;
|
|
|
|
}
|
|
|
|
|
2010-03-22 09:40:13 -07:00
|
|
|
#if HAVE_OPENSSL
|
2010-03-18 17:12:02 -07:00
|
|
|
static const char *
|
|
|
|
query_db_string(const struct ovsdb *db, const char *name)
|
|
|
|
{
|
|
|
|
if (!name || strncmp(name, "db:", 3)) {
|
|
|
|
return name;
|
|
|
|
} else {
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
const struct ovsdb_table *table;
|
|
|
|
const struct ovsdb_row *row;
|
|
|
|
|
|
|
|
parse_db_string_column(db, name, &table, &column);
|
|
|
|
|
|
|
|
HMAP_FOR_EACH (row, struct ovsdb_row, hmap_node, &table->rows) {
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
datum = &row->fields[column->index];
|
|
|
|
for (i = 0; i < datum->n; i++) {
|
|
|
|
if (datum->keys[i].string[0]) {
|
|
|
|
return datum->keys[i].string;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return NULL;
|
2010-01-04 10:05:51 -08:00
|
|
|
}
|
2010-03-18 17:12:02 -07:00
|
|
|
}
|
2010-03-22 09:40:13 -07:00
|
|
|
#endif /* HAVE_OPENSSL */
|
2010-03-18 17:12:02 -07:00
|
|
|
|
|
|
|
static void
|
|
|
|
query_db_remotes(const char *name, const struct ovsdb *db,
|
|
|
|
struct shash *remotes)
|
|
|
|
{
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
const struct ovsdb_table *table;
|
|
|
|
const struct ovsdb_row *row;
|
|
|
|
|
|
|
|
parse_db_string_column(db, name, &table, &column);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
|
|
HMAP_FOR_EACH (row, struct ovsdb_row, hmap_node, &table->rows) {
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
datum = &row->fields[column->index];
|
|
|
|
for (i = 0; i < datum->n; i++) {
|
|
|
|
shash_add_once(remotes, datum->keys[i].string, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-03-18 17:12:02 -07:00
|
|
|
/* Reconfigures ovsdb-server based on information in the database. */
|
2010-01-04 10:05:51 -08:00
|
|
|
static void
|
2010-03-18 17:12:02 -07:00
|
|
|
reconfigure_from_db(struct ovsdb_jsonrpc_server *jsonrpc,
|
|
|
|
const struct ovsdb *db, struct shash *remotes)
|
2010-01-04 10:05:51 -08:00
|
|
|
{
|
|
|
|
struct shash resolved_remotes;
|
|
|
|
struct shash_node *node;
|
|
|
|
|
2010-03-18 17:12:02 -07:00
|
|
|
/* Configure remotes. */
|
2010-01-04 10:05:51 -08:00
|
|
|
shash_init(&resolved_remotes);
|
|
|
|
SHASH_FOR_EACH (node, remotes) {
|
|
|
|
const char *name = node->name;
|
|
|
|
|
|
|
|
if (!strncmp(name, "db:", 3)) {
|
|
|
|
query_db_remotes(name, db, &resolved_remotes);
|
|
|
|
} else {
|
|
|
|
shash_add_once(&resolved_remotes, name, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ovsdb_jsonrpc_server_set_remotes(jsonrpc, &resolved_remotes);
|
|
|
|
shash_destroy(&resolved_remotes);
|
|
|
|
|
2010-03-22 09:40:13 -07:00
|
|
|
#if HAVE_OPENSSL
|
2010-03-18 17:12:02 -07:00
|
|
|
/* Configure SSL. */
|
|
|
|
stream_ssl_set_private_key_file(query_db_string(db, private_key_file));
|
|
|
|
stream_ssl_set_certificate_file(query_db_string(db, certificate_file));
|
|
|
|
stream_ssl_set_ca_cert_file(query_db_string(db, ca_cert_file),
|
|
|
|
bootstrap_ca_cert);
|
2010-03-22 09:40:13 -07:00
|
|
|
#endif
|
2010-03-18 17:12:02 -07:00
|
|
|
}
|
2010-01-04 10:05:51 -08:00
|
|
|
|
2009-11-17 16:02:38 -08:00
|
|
|
static void
|
2010-02-11 11:11:23 -08:00
|
|
|
ovsdb_server_exit(struct unixctl_conn *conn, const char *args OVS_UNUSED,
|
2009-11-17 16:02:38 -08:00
|
|
|
void *exiting_)
|
|
|
|
{
|
|
|
|
bool *exiting = exiting_;
|
|
|
|
*exiting = true;
|
|
|
|
unixctl_command_reply(conn, 200, NULL);
|
|
|
|
}
|
|
|
|
|
2010-03-18 11:24:55 -07:00
|
|
|
static void
|
|
|
|
ovsdb_server_compact(struct unixctl_conn *conn, const char *args OVS_UNUSED,
|
|
|
|
void *file_)
|
|
|
|
{
|
|
|
|
struct ovsdb_file *file = file_;
|
|
|
|
struct ovsdb_error *error;
|
|
|
|
|
|
|
|
VLOG_INFO("compacting database by user request");
|
|
|
|
error = ovsdb_file_compact(file);
|
|
|
|
if (!error) {
|
|
|
|
unixctl_command_reply(conn, 200, NULL);
|
|
|
|
} else {
|
|
|
|
char *s = ovsdb_error_to_string(error);
|
|
|
|
ovsdb_error_destroy(error);
|
|
|
|
unixctl_command_reply(conn, 503, s);
|
|
|
|
free(s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-06-24 12:56:30 -07:00
|
|
|
/* "ovsdb-server/reconnect": makes ovsdb-server drop all of its JSON-RPC
|
|
|
|
* connections and reconnect. */
|
|
|
|
static void
|
|
|
|
ovsdb_server_reconnect(struct unixctl_conn *conn, const char *args OVS_UNUSED,
|
|
|
|
void *jsonrpc_)
|
|
|
|
{
|
|
|
|
struct ovsdb_jsonrpc_server *jsonrpc = jsonrpc_;
|
|
|
|
|
|
|
|
ovsdb_jsonrpc_server_reconnect(jsonrpc);
|
|
|
|
unixctl_command_reply(conn, 200, NULL);
|
|
|
|
}
|
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
static void
|
|
|
|
parse_options(int argc, char *argv[], char **file_namep,
|
2010-02-12 11:17:17 -08:00
|
|
|
struct shash *remotes, char **unixctl_pathp,
|
|
|
|
char **run_command)
|
2009-11-04 15:11:44 -08:00
|
|
|
{
|
|
|
|
enum {
|
|
|
|
OPT_DUMMY = UCHAR_MAX + 1,
|
2010-01-04 10:05:51 -08:00
|
|
|
OPT_REMOTE,
|
2009-11-17 16:02:38 -08:00
|
|
|
OPT_UNIXCTL,
|
2010-02-12 11:17:17 -08:00
|
|
|
OPT_RUN,
|
2009-12-21 13:13:48 -08:00
|
|
|
OPT_BOOTSTRAP_CA_CERT,
|
2009-11-04 15:11:44 -08:00
|
|
|
VLOG_OPTION_ENUMS,
|
|
|
|
LEAK_CHECKER_OPTION_ENUMS
|
|
|
|
};
|
|
|
|
static struct option long_options[] = {
|
2010-01-04 10:05:51 -08:00
|
|
|
{"remote", required_argument, 0, OPT_REMOTE},
|
2009-11-17 16:02:38 -08:00
|
|
|
{"unixctl", required_argument, 0, OPT_UNIXCTL},
|
2010-02-12 11:17:17 -08:00
|
|
|
{"run", required_argument, 0, OPT_RUN},
|
2009-11-04 15:11:44 -08:00
|
|
|
{"help", no_argument, 0, 'h'},
|
|
|
|
{"version", no_argument, 0, 'V'},
|
|
|
|
DAEMON_LONG_OPTIONS,
|
|
|
|
VLOG_LONG_OPTIONS,
|
|
|
|
LEAK_CHECKER_LONG_OPTIONS,
|
2009-12-21 13:13:48 -08:00
|
|
|
#ifdef HAVE_OPENSSL
|
|
|
|
{"bootstrap-ca-cert", required_argument, 0, OPT_BOOTSTRAP_CA_CERT},
|
2010-03-18 17:12:02 -07:00
|
|
|
{"private-key", required_argument, 0, 'p'},
|
|
|
|
{"certificate", required_argument, 0, 'c'},
|
|
|
|
{"ca-cert", required_argument, 0, 'C'},
|
2009-12-21 13:13:48 -08:00
|
|
|
#endif
|
2009-11-04 15:11:44 -08:00
|
|
|
{0, 0, 0, 0},
|
|
|
|
};
|
|
|
|
char *short_options = long_options_to_short_options(long_options);
|
|
|
|
|
2010-01-04 10:05:51 -08:00
|
|
|
shash_init(remotes);
|
2009-11-04 15:11:44 -08:00
|
|
|
for (;;) {
|
|
|
|
int c;
|
|
|
|
|
|
|
|
c = getopt_long(argc, argv, short_options, long_options, NULL);
|
|
|
|
if (c == -1) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (c) {
|
2010-01-04 10:05:51 -08:00
|
|
|
case OPT_REMOTE:
|
|
|
|
shash_add_once(remotes, optarg, NULL);
|
2009-11-04 15:11:44 -08:00
|
|
|
break;
|
|
|
|
|
2009-11-17 16:02:38 -08:00
|
|
|
case OPT_UNIXCTL:
|
|
|
|
*unixctl_pathp = optarg;
|
|
|
|
break;
|
|
|
|
|
2010-02-12 11:17:17 -08:00
|
|
|
case OPT_RUN:
|
|
|
|
*run_command = optarg;
|
|
|
|
break;
|
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
case 'h':
|
|
|
|
usage();
|
|
|
|
|
|
|
|
case 'V':
|
|
|
|
OVS_PRINT_VERSION(0, 0);
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
|
|
|
|
VLOG_OPTION_HANDLERS
|
|
|
|
DAEMON_OPTION_HANDLERS
|
|
|
|
LEAK_CHECKER_OPTION_HANDLERS
|
|
|
|
|
2009-12-21 13:13:48 -08:00
|
|
|
#ifdef HAVE_OPENSSL
|
2010-03-18 17:12:02 -07:00
|
|
|
case 'p':
|
|
|
|
private_key_file = optarg;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'c':
|
|
|
|
certificate_file = optarg;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'C':
|
|
|
|
ca_cert_file = optarg;
|
|
|
|
bootstrap_ca_cert = false;
|
|
|
|
break;
|
2009-12-21 13:13:48 -08:00
|
|
|
|
|
|
|
case OPT_BOOTSTRAP_CA_CERT:
|
2010-03-18 17:12:02 -07:00
|
|
|
ca_cert_file = optarg;
|
|
|
|
bootstrap_ca_cert = true;
|
2009-12-21 13:13:48 -08:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
case '?':
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
|
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
free(short_options);
|
|
|
|
|
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
2009-12-15 13:10:16 -08:00
|
|
|
if (argc > 1) {
|
2009-11-04 15:11:44 -08:00
|
|
|
ovs_fatal(0, "database file is only non-option argument; "
|
|
|
|
"use --help for usage");
|
2009-12-15 13:10:16 -08:00
|
|
|
} else if (argc < 1) {
|
|
|
|
ovs_fatal(0, "missing database file argument; use --help for usage");
|
2009-11-04 15:11:44 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
*file_namep = argv[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
usage(void)
|
|
|
|
{
|
|
|
|
printf("%s: Open vSwitch database server\n"
|
|
|
|
"usage: %s [OPTIONS] DATABASE\n"
|
|
|
|
"where DATABASE is a database file in ovsdb format.\n",
|
|
|
|
program_name, program_name);
|
|
|
|
printf("\nJSON-RPC options (may be specified any number of times):\n"
|
2010-01-04 10:05:51 -08:00
|
|
|
" --remote=REMOTE connect or listen to REMOTE\n");
|
2009-12-21 13:13:48 -08:00
|
|
|
stream_usage("JSON-RPC", true, true, true);
|
2009-11-04 15:11:44 -08:00
|
|
|
daemon_usage();
|
|
|
|
vlog_usage();
|
|
|
|
printf("\nOther options:\n"
|
2010-02-12 11:17:17 -08:00
|
|
|
" --run COMMAND run COMMAND as subprocess then exit\n"
|
2010-03-23 11:22:42 -07:00
|
|
|
" --unixctl=SOCKET override default control socket name\n"
|
2009-11-04 15:11:44 -08:00
|
|
|
" -h, --help display this help message\n"
|
|
|
|
" -V, --version display version information\n");
|
|
|
|
leak_checker_usage();
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
}
|