2014-03-25 15:51:23 -07:00
|
|
|
|
/* Copyright (c) 2009, 2010, 2011, 2012, 2013, 2014 Nicira, Inc.
|
2009-11-04 15:11:44 -08:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
#include <getopt.h>
|
2013-04-18 16:37:05 -07:00
|
|
|
|
#include <inttypes.h>
|
2009-11-04 15:11:44 -08:00
|
|
|
|
#include <signal.h>
|
2014-03-25 15:51:23 -07:00
|
|
|
|
#include <sys/stat.h>
|
2009-11-16 15:09:50 -08:00
|
|
|
|
#include <unistd.h>
|
2009-11-04 15:11:44 -08:00
|
|
|
|
|
2010-01-04 10:05:51 -08:00
|
|
|
|
#include "column.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
|
#include "command-line.h"
|
|
|
|
|
#include "daemon.h"
|
2011-07-26 09:53:49 -07:00
|
|
|
|
#include "dirs.h"
|
2012-09-07 10:07:03 -07:00
|
|
|
|
#include "dynamic-string.h"
|
2014-02-26 10:44:46 -08:00
|
|
|
|
#include "fatal-signal.h"
|
2009-11-13 13:37:55 -08:00
|
|
|
|
#include "file.h"
|
2011-07-26 10:24:17 -07:00
|
|
|
|
#include "hash.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
|
#include "json.h"
|
|
|
|
|
#include "jsonrpc.h"
|
|
|
|
|
#include "jsonrpc-server.h"
|
|
|
|
|
#include "list.h"
|
2012-05-08 15:44:21 -07:00
|
|
|
|
#include "memory.h"
|
2011-07-26 10:24:17 -07:00
|
|
|
|
#include "ovsdb.h"
|
2010-01-04 10:05:51 -08:00
|
|
|
|
#include "ovsdb-data.h"
|
|
|
|
|
#include "ovsdb-types.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
|
#include "ovsdb-error.h"
|
|
|
|
|
#include "poll-loop.h"
|
|
|
|
|
#include "process.h"
|
2010-01-04 10:05:51 -08:00
|
|
|
|
#include "row.h"
|
2012-05-08 15:44:21 -07:00
|
|
|
|
#include "simap.h"
|
2013-06-13 04:30:32 -07:00
|
|
|
|
#include "shash.h"
|
2009-12-21 13:13:48 -08:00
|
|
|
|
#include "stream-ssl.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
|
#include "stream.h"
|
2011-03-25 15:26:30 -07:00
|
|
|
|
#include "sset.h"
|
2010-01-04 10:05:51 -08:00
|
|
|
|
#include "table.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
|
#include "timeval.h"
|
2011-01-28 15:39:55 -08:00
|
|
|
|
#include "transaction.h"
|
2009-11-04 15:11:44 -08:00
|
|
|
|
#include "trigger.h"
|
|
|
|
|
#include "util.h"
|
|
|
|
|
#include "unixctl.h"
|
2015-03-21 00:00:49 -07:00
|
|
|
|
#include "perf-counter.h"
|
2014-12-15 14:10:38 +01:00
|
|
|
|
#include "openvswitch/vlog.h"
|
2010-07-16 11:02:49 -07:00
|
|
|
|
|
2010-10-19 14:47:01 -07:00
|
|
|
|
VLOG_DEFINE_THIS_MODULE(ovsdb_server);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
|
2012-09-07 10:07:03 -07:00
|
|
|
|
struct db {
|
|
|
|
|
/* Initialized in main(). */
|
|
|
|
|
char *filename;
|
|
|
|
|
struct ovsdb_file *file;
|
|
|
|
|
struct ovsdb *db;
|
|
|
|
|
|
|
|
|
|
/* Only used by update_remote_status(). */
|
|
|
|
|
struct ovsdb_txn *txn;
|
|
|
|
|
};
|
|
|
|
|
|
2010-03-18 17:12:02 -07:00
|
|
|
|
/* SSL configuration. */
|
|
|
|
|
static char *private_key_file;
|
|
|
|
|
static char *certificate_file;
|
|
|
|
|
static char *ca_cert_file;
|
|
|
|
|
static bool bootstrap_ca_cert;
|
|
|
|
|
|
2009-11-17 16:02:38 -08:00
|
|
|
|
static unixctl_cb_func ovsdb_server_exit;
|
2010-03-18 11:24:55 -07:00
|
|
|
|
static unixctl_cb_func ovsdb_server_compact;
|
2010-06-24 12:56:30 -07:00
|
|
|
|
static unixctl_cb_func ovsdb_server_reconnect;
|
2015-03-21 00:00:49 -07:00
|
|
|
|
static unixctl_cb_func ovsdb_server_perf_counters_clear;
|
|
|
|
|
static unixctl_cb_func ovsdb_server_perf_counters_show;
|
2009-11-17 16:02:38 -08:00
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct server_config {
|
2013-04-10 09:34:49 -07:00
|
|
|
|
struct sset *remotes;
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct shash *all_dbs;
|
2013-06-13 12:25:39 -07:00
|
|
|
|
FILE *config_tmpfile;
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct ovsdb_jsonrpc_server *jsonrpc;
|
2013-04-10 09:34:49 -07:00
|
|
|
|
};
|
|
|
|
|
static unixctl_cb_func ovsdb_server_add_remote;
|
|
|
|
|
static unixctl_cb_func ovsdb_server_remove_remote;
|
|
|
|
|
static unixctl_cb_func ovsdb_server_list_remotes;
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
static unixctl_cb_func ovsdb_server_add_database;
|
|
|
|
|
static unixctl_cb_func ovsdb_server_remove_database;
|
|
|
|
|
static unixctl_cb_func ovsdb_server_list_databases;
|
|
|
|
|
|
|
|
|
|
static char *open_db(struct server_config *config, const char *filename);
|
2014-07-02 15:00:16 -07:00
|
|
|
|
static void close_db(struct db *db);
|
2013-06-13 04:30:32 -07:00
|
|
|
|
|
2012-09-07 10:07:03 -07:00
|
|
|
|
static void parse_options(int *argc, char **argvp[],
|
2011-03-25 15:26:30 -07:00
|
|
|
|
struct sset *remotes, char **unixctl_pathp,
|
2010-02-12 11:17:17 -08:00
|
|
|
|
char **run_command);
|
2014-12-15 14:10:38 +01:00
|
|
|
|
OVS_NO_RETURN static void usage(void);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
static char *reconfigure_remotes(struct ovsdb_jsonrpc_server *,
|
|
|
|
|
const struct shash *all_dbs,
|
|
|
|
|
struct sset *remotes);
|
|
|
|
|
static char *reconfigure_ssl(const struct shash *all_dbs);
|
|
|
|
|
static void report_error_if_changed(char *error, char **last_errorp);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
2011-01-28 15:39:55 -08:00
|
|
|
|
static void update_remote_status(const struct ovsdb_jsonrpc_server *jsonrpc,
|
2011-03-25 15:26:30 -07:00
|
|
|
|
const struct sset *remotes,
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct shash *all_dbs);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
static void save_config__(FILE *config_file, const struct sset *remotes,
|
|
|
|
|
const struct sset *db_filenames);
|
|
|
|
|
static void save_config(struct server_config *);
|
|
|
|
|
static void load_config(FILE *config_file, struct sset *remotes,
|
|
|
|
|
struct sset *db_filenames);
|
2013-06-13 12:25:39 -07:00
|
|
|
|
|
2014-07-11 13:24:06 +02:00
|
|
|
|
static void
|
|
|
|
|
main_loop(struct ovsdb_jsonrpc_server *jsonrpc, struct shash *all_dbs,
|
|
|
|
|
struct unixctl_server *unixctl, struct sset *remotes,
|
|
|
|
|
struct process *run_process, bool *exiting)
|
|
|
|
|
{
|
|
|
|
|
char *remotes_error, *ssl_error;
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
long long int status_timer = LLONG_MIN;
|
|
|
|
|
|
|
|
|
|
*exiting = false;
|
|
|
|
|
ssl_error = NULL;
|
|
|
|
|
remotes_error = NULL;
|
|
|
|
|
while (!*exiting) {
|
|
|
|
|
memory_run();
|
|
|
|
|
if (memory_should_report()) {
|
|
|
|
|
struct simap usage;
|
|
|
|
|
|
|
|
|
|
simap_init(&usage);
|
|
|
|
|
ovsdb_jsonrpc_server_get_memory_usage(jsonrpc, &usage);
|
|
|
|
|
SHASH_FOR_EACH(node, all_dbs) {
|
|
|
|
|
struct db *db = node->data;
|
|
|
|
|
ovsdb_get_memory_usage(db->db, &usage);
|
|
|
|
|
}
|
|
|
|
|
memory_report(&usage);
|
|
|
|
|
simap_destroy(&usage);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Run unixctl_server_run() before reconfigure_remotes() because
|
|
|
|
|
* ovsdb-server/add-remote and ovsdb-server/remove-remote can change
|
|
|
|
|
* the set of remotes that reconfigure_remotes() uses. */
|
|
|
|
|
unixctl_server_run(unixctl);
|
|
|
|
|
|
|
|
|
|
report_error_if_changed(
|
|
|
|
|
reconfigure_remotes(jsonrpc, all_dbs, remotes),
|
|
|
|
|
&remotes_error);
|
|
|
|
|
report_error_if_changed(reconfigure_ssl(all_dbs), &ssl_error);
|
|
|
|
|
ovsdb_jsonrpc_server_run(jsonrpc);
|
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH(node, all_dbs) {
|
|
|
|
|
struct db *db = node->data;
|
|
|
|
|
ovsdb_trigger_run(db->db, time_msec());
|
|
|
|
|
}
|
|
|
|
|
if (run_process) {
|
|
|
|
|
process_run();
|
|
|
|
|
if (process_exited(run_process)) {
|
|
|
|
|
*exiting = true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* update Manager status(es) every 5 seconds */
|
|
|
|
|
if (time_msec() >= status_timer) {
|
|
|
|
|
status_timer = time_msec() + 5000;
|
|
|
|
|
update_remote_status(jsonrpc, remotes, all_dbs);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
memory_wait();
|
|
|
|
|
ovsdb_jsonrpc_server_wait(jsonrpc);
|
|
|
|
|
unixctl_server_wait(unixctl);
|
|
|
|
|
SHASH_FOR_EACH(node, all_dbs) {
|
|
|
|
|
struct db *db = node->data;
|
|
|
|
|
ovsdb_trigger_wait(db->db, time_msec());
|
|
|
|
|
}
|
|
|
|
|
if (run_process) {
|
|
|
|
|
process_wait(run_process);
|
|
|
|
|
}
|
|
|
|
|
if (*exiting) {
|
|
|
|
|
poll_immediate_wake();
|
|
|
|
|
}
|
|
|
|
|
poll_timer_wait_until(status_timer);
|
|
|
|
|
poll_block();
|
|
|
|
|
if (should_service_stop()) {
|
|
|
|
|
*exiting = true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
|
int
|
|
|
|
|
main(int argc, char *argv[])
|
|
|
|
|
{
|
2009-11-17 16:02:38 -08:00
|
|
|
|
char *unixctl_path = NULL;
|
2010-02-12 11:17:17 -08:00
|
|
|
|
char *run_command = NULL;
|
2009-11-04 15:11:44 -08:00
|
|
|
|
struct unixctl_server *unixctl;
|
|
|
|
|
struct ovsdb_jsonrpc_server *jsonrpc;
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct sset remotes, db_filenames;
|
|
|
|
|
const char *db_filename;
|
2010-02-12 11:17:17 -08:00
|
|
|
|
struct process *run_process;
|
2009-11-17 16:02:38 -08:00
|
|
|
|
bool exiting;
|
2009-11-04 15:11:44 -08:00
|
|
|
|
int retval;
|
2013-06-13 12:25:39 -07:00
|
|
|
|
FILE *config_tmpfile;
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct server_config server_config;
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct shash all_dbs;
|
2014-07-02 15:00:16 -07:00
|
|
|
|
struct shash_node *node, *next;
|
2013-06-27 10:27:57 -07:00
|
|
|
|
char *error;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
int i;
|
|
|
|
|
|
2015-03-16 12:01:55 -04:00
|
|
|
|
ovs_cmdl_proctitle_init(argc, argv);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
set_program_name(argv[0]);
|
2014-01-17 10:43:03 -08:00
|
|
|
|
service_start(&argc, &argv);
|
2014-02-26 10:44:46 -08:00
|
|
|
|
fatal_ignore_sigpipe();
|
2009-11-04 15:11:44 -08:00
|
|
|
|
process_init();
|
|
|
|
|
|
2012-09-07 10:07:03 -07:00
|
|
|
|
parse_options(&argc, &argv, &remotes, &unixctl_path, &run_command);
|
2015-09-11 11:26:39 -07:00
|
|
|
|
daemon_become_new_user(false);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
|
2013-06-13 12:25:39 -07:00
|
|
|
|
/* Create and initialize 'config_tmpfile' as a temporary file to hold
|
|
|
|
|
* ovsdb-server's most basic configuration, and then save our initial
|
|
|
|
|
* configuration to it. When --monitor is used, this preserves the effects
|
|
|
|
|
* of ovs-appctl commands such as ovsdb-server/add-remote (which saves the
|
|
|
|
|
* new configuration) across crashes. */
|
|
|
|
|
config_tmpfile = tmpfile();
|
|
|
|
|
if (!config_tmpfile) {
|
|
|
|
|
ovs_fatal(errno, "failed to create temporary file");
|
|
|
|
|
}
|
2013-06-27 10:27:57 -07:00
|
|
|
|
|
|
|
|
|
sset_init(&db_filenames);
|
|
|
|
|
if (argc > 0) {
|
|
|
|
|
for (i = 0; i < argc; i++) {
|
|
|
|
|
sset_add(&db_filenames, argv[i]);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
char *default_db = xasprintf("%s/conf.db", ovs_dbdir());
|
|
|
|
|
sset_add(&db_filenames, default_db);
|
|
|
|
|
free(default_db);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
server_config.remotes = &remotes;
|
|
|
|
|
server_config.config_tmpfile = config_tmpfile;
|
|
|
|
|
|
|
|
|
|
save_config__(config_tmpfile, &remotes, &db_filenames);
|
2013-06-13 12:25:39 -07:00
|
|
|
|
|
2015-09-11 11:26:39 -07:00
|
|
|
|
daemonize_start(false);
|
2009-11-16 15:09:50 -08:00
|
|
|
|
|
2013-06-13 12:25:39 -07:00
|
|
|
|
/* Load the saved config. */
|
2013-06-27 10:27:57 -07:00
|
|
|
|
load_config(config_tmpfile, &remotes, &db_filenames);
|
2013-06-13 04:30:32 -07:00
|
|
|
|
jsonrpc = ovsdb_jsonrpc_server_create();
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
shash_init(&all_dbs);
|
|
|
|
|
server_config.all_dbs = &all_dbs;
|
|
|
|
|
server_config.jsonrpc = jsonrpc;
|
|
|
|
|
SSET_FOR_EACH (db_filename, &db_filenames) {
|
|
|
|
|
error = open_db(&server_config, db_filename);
|
|
|
|
|
if (error) {
|
|
|
|
|
ovs_fatal(0, "%s", error);
|
|
|
|
|
}
|
2012-09-07 10:07:03 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
error = reconfigure_remotes(jsonrpc, &all_dbs, &remotes);
|
|
|
|
|
if (!error) {
|
|
|
|
|
error = reconfigure_ssl(&all_dbs);
|
|
|
|
|
}
|
|
|
|
|
if (error) {
|
|
|
|
|
ovs_fatal(0, "%s", error);
|
|
|
|
|
}
|
2009-11-04 15:11:44 -08:00
|
|
|
|
|
2009-11-17 16:02:38 -08:00
|
|
|
|
retval = unixctl_server_create(unixctl_path, &unixctl);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
if (retval) {
|
2010-01-15 10:31:57 -08:00
|
|
|
|
exit(EXIT_FAILURE);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-02-12 11:17:17 -08:00
|
|
|
|
if (run_command) {
|
|
|
|
|
char *run_argv[4];
|
|
|
|
|
|
|
|
|
|
run_argv[0] = "/bin/sh";
|
|
|
|
|
run_argv[1] = "-c";
|
|
|
|
|
run_argv[2] = run_command;
|
|
|
|
|
run_argv[3] = NULL;
|
|
|
|
|
|
2013-05-08 14:31:55 -07:00
|
|
|
|
retval = process_start(run_argv, &run_process);
|
2010-02-12 11:17:17 -08:00
|
|
|
|
if (retval) {
|
|
|
|
|
ovs_fatal(retval, "%s: process failed to start", run_command);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
run_process = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-17 10:56:01 -08:00
|
|
|
|
daemonize_complete();
|
2009-11-17 16:02:38 -08:00
|
|
|
|
|
2015-03-21 00:00:49 -07:00
|
|
|
|
perf_counters_init();
|
|
|
|
|
|
2012-07-17 10:07:36 -07:00
|
|
|
|
if (!run_command) {
|
|
|
|
|
/* ovsdb-server is usually a long-running process, in which case it
|
|
|
|
|
* makes plenty of sense to log the version, but --run makes
|
|
|
|
|
* ovsdb-server more like a command-line tool, so skip it. */
|
|
|
|
|
VLOG_INFO("%s (Open vSwitch) %s", program_name, VERSION);
|
|
|
|
|
}
|
2012-07-17 09:28:08 -07:00
|
|
|
|
|
2011-12-02 15:29:19 -08:00
|
|
|
|
unixctl_command_register("exit", "", 0, 0, ovsdb_server_exit, &exiting);
|
2012-09-07 10:07:03 -07:00
|
|
|
|
unixctl_command_register("ovsdb-server/compact", "", 0, 1,
|
2013-06-13 04:30:32 -07:00
|
|
|
|
ovsdb_server_compact, &all_dbs);
|
2011-12-02 15:29:19 -08:00
|
|
|
|
unixctl_command_register("ovsdb-server/reconnect", "", 0, 0,
|
2011-09-26 14:59:35 -07:00
|
|
|
|
ovsdb_server_reconnect, jsonrpc);
|
2009-11-17 16:02:38 -08:00
|
|
|
|
|
2013-04-10 09:34:49 -07:00
|
|
|
|
unixctl_command_register("ovsdb-server/add-remote", "REMOTE", 1, 1,
|
2013-06-27 10:27:57 -07:00
|
|
|
|
ovsdb_server_add_remote, &server_config);
|
2013-04-10 09:34:49 -07:00
|
|
|
|
unixctl_command_register("ovsdb-server/remove-remote", "REMOTE", 1, 1,
|
2013-06-27 10:27:57 -07:00
|
|
|
|
ovsdb_server_remove_remote, &server_config);
|
2013-04-10 09:34:49 -07:00
|
|
|
|
unixctl_command_register("ovsdb-server/list-remotes", "", 0, 0,
|
|
|
|
|
ovsdb_server_list_remotes, &remotes);
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
unixctl_command_register("ovsdb-server/add-db", "DB", 1, 1,
|
|
|
|
|
ovsdb_server_add_database, &server_config);
|
|
|
|
|
unixctl_command_register("ovsdb-server/remove-db", "DB", 1, 1,
|
|
|
|
|
ovsdb_server_remove_database, &server_config);
|
|
|
|
|
unixctl_command_register("ovsdb-server/list-dbs", "", 0, 0,
|
|
|
|
|
ovsdb_server_list_databases, &all_dbs);
|
2015-03-21 00:00:49 -07:00
|
|
|
|
unixctl_command_register("ovsdb-server/perf-counters-show", "", 0, 0,
|
|
|
|
|
ovsdb_server_perf_counters_show, NULL);
|
|
|
|
|
unixctl_command_register("ovsdb-server/perf-counters-clear", "", 0, 0,
|
|
|
|
|
ovsdb_server_perf_counters_clear, NULL);
|
2013-06-27 10:27:57 -07:00
|
|
|
|
|
2014-07-11 13:24:06 +02:00
|
|
|
|
main_loop(jsonrpc, &all_dbs, unixctl, &remotes, run_process, &exiting);
|
2012-05-08 15:44:21 -07:00
|
|
|
|
|
2010-02-02 14:41:00 -08:00
|
|
|
|
ovsdb_jsonrpc_server_destroy(jsonrpc);
|
2014-07-02 15:00:16 -07:00
|
|
|
|
SHASH_FOR_EACH_SAFE(node, next, &all_dbs) {
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct db *db = node->data;
|
2014-07-02 15:00:16 -07:00
|
|
|
|
close_db(db);
|
|
|
|
|
shash_delete(&all_dbs, node);
|
2012-09-07 10:07:03 -07:00
|
|
|
|
}
|
2015-10-21 23:58:10 -07:00
|
|
|
|
shash_destroy(&all_dbs);
|
2011-03-25 15:26:30 -07:00
|
|
|
|
sset_destroy(&remotes);
|
2014-07-02 15:00:16 -07:00
|
|
|
|
sset_destroy(&db_filenames);
|
2010-02-02 14:41:00 -08:00
|
|
|
|
unixctl_server_destroy(unixctl);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
|
2010-02-12 11:17:17 -08:00
|
|
|
|
if (run_process && process_exited(run_process)) {
|
|
|
|
|
int status = process_status(run_process);
|
|
|
|
|
if (status) {
|
|
|
|
|
ovs_fatal(0, "%s: child exited, %s",
|
|
|
|
|
run_command, process_status_msg(status));
|
|
|
|
|
}
|
|
|
|
|
}
|
2015-03-21 00:00:49 -07:00
|
|
|
|
perf_counters_destroy();
|
2014-01-17 10:43:03 -08:00
|
|
|
|
service_stop();
|
2009-11-04 15:11:44 -08:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2014-03-25 15:51:23 -07:00
|
|
|
|
/* Returns true if 'filename' is known to be already open as a database,
|
|
|
|
|
* false if not.
|
|
|
|
|
*
|
|
|
|
|
* "False negatives" are possible. */
|
|
|
|
|
static bool
|
|
|
|
|
is_already_open(struct server_config *config OVS_UNUSED,
|
|
|
|
|
const char *filename OVS_UNUSED)
|
|
|
|
|
{
|
|
|
|
|
#ifndef _WIN32
|
|
|
|
|
struct stat s;
|
|
|
|
|
|
|
|
|
|
if (!stat(filename, &s)) {
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH (node, config->all_dbs) {
|
|
|
|
|
struct db *db = node->data;
|
|
|
|
|
struct stat s2;
|
|
|
|
|
|
|
|
|
|
if (!stat(db->filename, &s2)
|
|
|
|
|
&& s.st_dev == s2.st_dev
|
|
|
|
|
&& s.st_ino == s2.st_ino) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
#endif /* !_WIN32 */
|
|
|
|
|
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2014-07-02 15:00:16 -07:00
|
|
|
|
static void
|
|
|
|
|
close_db(struct db *db)
|
|
|
|
|
{
|
|
|
|
|
ovsdb_destroy(db->db);
|
|
|
|
|
free(db->filename);
|
|
|
|
|
free(db);
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
static char *
|
|
|
|
|
open_db(struct server_config *config, const char *filename)
|
2013-06-13 04:30:32 -07:00
|
|
|
|
{
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct ovsdb_error *db_error;
|
|
|
|
|
struct db *db;
|
|
|
|
|
char *error;
|
2013-06-13 04:30:32 -07:00
|
|
|
|
|
2014-03-25 15:51:23 -07:00
|
|
|
|
/* If we know that the file is already open, return a good error message.
|
|
|
|
|
* Otherwise, if the file is open, we'll fail later on with a harder to
|
|
|
|
|
* interpret file locking error. */
|
|
|
|
|
if (is_already_open(config, filename)) {
|
|
|
|
|
return xasprintf("%s: already open", filename);
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
db = xzalloc(sizeof *db);
|
|
|
|
|
db->filename = xstrdup(filename);
|
2013-06-13 04:30:32 -07:00
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
db_error = ovsdb_file_open(db->filename, false, &db->db, &db->file);
|
|
|
|
|
if (db_error) {
|
|
|
|
|
error = ovsdb_error_to_string(db_error);
|
|
|
|
|
} else if (!ovsdb_jsonrpc_server_add_db(config->jsonrpc, db->db)) {
|
|
|
|
|
error = xasprintf("%s: duplicate database name", db->db->schema->name);
|
|
|
|
|
} else {
|
|
|
|
|
shash_add_assert(config->all_dbs, db->db->schema->name, db);
|
|
|
|
|
return NULL;
|
2013-06-13 04:30:32 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
ovsdb_error_destroy(db_error);
|
2014-07-02 15:00:16 -07:00
|
|
|
|
close_db(db);
|
2013-06-27 10:27:57 -07:00
|
|
|
|
return error;
|
2013-06-13 04:30:32 -07:00
|
|
|
|
}
|
|
|
|
|
|
2012-09-07 10:07:03 -07:00
|
|
|
|
static const struct db *
|
2013-06-13 04:30:32 -07:00
|
|
|
|
find_db(const struct shash *all_dbs, const char *db_name)
|
2012-09-07 10:07:03 -07:00
|
|
|
|
{
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct shash_node *node;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
|
2013-06-13 04:30:32 -07:00
|
|
|
|
SHASH_FOR_EACH(node, all_dbs) {
|
|
|
|
|
struct db *db = node->data;
|
|
|
|
|
if (!strcmp(db->db->schema->name, db_name)) {
|
|
|
|
|
return db;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2014-12-15 14:10:38 +01:00
|
|
|
|
static char * OVS_WARN_UNUSED_RESULT
|
2013-06-13 04:30:32 -07:00
|
|
|
|
parse_db_column__(const struct shash *all_dbs,
|
2013-04-10 16:22:00 -07:00
|
|
|
|
const char *name_, char *name,
|
|
|
|
|
const struct db **dbp,
|
|
|
|
|
const struct ovsdb_table **tablep,
|
|
|
|
|
const struct ovsdb_column **columnp)
|
2010-01-04 10:05:51 -08:00
|
|
|
|
{
|
2013-06-24 08:38:22 -07:00
|
|
|
|
const char *db_name, *table_name, *column_name;
|
2010-01-04 10:05:51 -08:00
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
|
const struct ovsdb_table *table;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
const char *tokens[3];
|
2010-01-04 10:05:51 -08:00
|
|
|
|
char *save_ptr = NULL;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
const struct db *db;
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
2013-04-10 16:22:00 -07:00
|
|
|
|
*dbp = NULL;
|
|
|
|
|
*tablep = NULL;
|
|
|
|
|
*columnp = NULL;
|
|
|
|
|
|
2010-02-10 11:08:27 -08:00
|
|
|
|
strtok_r(name, ":", &save_ptr); /* "db:" */
|
2012-09-07 10:07:03 -07:00
|
|
|
|
tokens[0] = strtok_r(NULL, ",", &save_ptr);
|
|
|
|
|
tokens[1] = strtok_r(NULL, ",", &save_ptr);
|
|
|
|
|
tokens[2] = strtok_r(NULL, ",", &save_ptr);
|
2013-06-24 08:38:22 -07:00
|
|
|
|
if (!tokens[0] || !tokens[1] || !tokens[2]) {
|
2013-04-10 16:22:00 -07:00
|
|
|
|
return xasprintf("\"%s\": invalid syntax", name_);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
}
|
2012-09-07 10:07:03 -07:00
|
|
|
|
|
2013-06-24 08:38:22 -07:00
|
|
|
|
db_name = tokens[0];
|
|
|
|
|
table_name = tokens[1];
|
|
|
|
|
column_name = tokens[2];
|
|
|
|
|
|
|
|
|
|
db = find_db(all_dbs, tokens[0]);
|
|
|
|
|
if (!db) {
|
|
|
|
|
return xasprintf("\"%s\": no database named %s", name_, db_name);
|
2012-09-07 10:07:03 -07:00
|
|
|
|
}
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
2012-09-07 10:07:03 -07:00
|
|
|
|
table = ovsdb_get_table(db->db, table_name);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
if (!table) {
|
2013-04-10 16:22:00 -07:00
|
|
|
|
return xasprintf("\"%s\": no table named %s", name_, table_name);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
column = ovsdb_table_schema_get_column(table->schema, column_name);
|
|
|
|
|
if (!column) {
|
2013-04-10 16:22:00 -07:00
|
|
|
|
return xasprintf("\"%s\": table \"%s\" has no column \"%s\"",
|
|
|
|
|
name_, table_name, column_name);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-09-07 10:07:03 -07:00
|
|
|
|
*dbp = db;
|
2010-11-05 10:22:18 -07:00
|
|
|
|
*columnp = column;
|
|
|
|
|
*tablep = table;
|
2013-04-10 16:22:00 -07:00
|
|
|
|
return NULL;
|
2010-11-05 10:22:18 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-04-10 16:22:00 -07:00
|
|
|
|
/* Returns NULL if successful, otherwise a malloc()'d string describing the
|
|
|
|
|
* error. */
|
2014-12-15 14:10:38 +01:00
|
|
|
|
static char * OVS_WARN_UNUSED_RESULT
|
2013-06-13 04:30:32 -07:00
|
|
|
|
parse_db_column(const struct shash *all_dbs,
|
2013-04-10 16:22:00 -07:00
|
|
|
|
const char *name_,
|
|
|
|
|
const struct db **dbp,
|
|
|
|
|
const struct ovsdb_table **tablep,
|
|
|
|
|
const struct ovsdb_column **columnp)
|
|
|
|
|
{
|
|
|
|
|
char *name = xstrdup(name_);
|
2013-06-13 04:30:32 -07:00
|
|
|
|
char *retval = parse_db_column__(all_dbs, name_, name,
|
2013-04-10 16:22:00 -07:00
|
|
|
|
dbp, tablep, columnp);
|
|
|
|
|
free(name);
|
|
|
|
|
return retval;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Returns NULL if successful, otherwise a malloc()'d string describing the
|
|
|
|
|
* error. */
|
2014-12-15 14:10:38 +01:00
|
|
|
|
static char * OVS_WARN_UNUSED_RESULT
|
2013-06-13 04:30:32 -07:00
|
|
|
|
parse_db_string_column(const struct shash *all_dbs,
|
2010-11-05 10:22:18 -07:00
|
|
|
|
const char *name,
|
2012-09-07 10:07:03 -07:00
|
|
|
|
const struct db **dbp,
|
2010-11-05 10:22:18 -07:00
|
|
|
|
const struct ovsdb_table **tablep,
|
|
|
|
|
const struct ovsdb_column **columnp)
|
|
|
|
|
{
|
2013-04-10 16:22:00 -07:00
|
|
|
|
char *retval;
|
2010-11-05 10:22:18 -07:00
|
|
|
|
|
2013-06-13 04:30:32 -07:00
|
|
|
|
retval = parse_db_column(all_dbs, name, dbp, tablep, columnp);
|
2013-04-10 16:22:00 -07:00
|
|
|
|
if (retval) {
|
|
|
|
|
return retval;
|
|
|
|
|
}
|
2010-11-05 10:22:18 -07:00
|
|
|
|
|
2013-04-10 16:22:00 -07:00
|
|
|
|
if ((*columnp)->type.key.type != OVSDB_TYPE_STRING
|
|
|
|
|
|| (*columnp)->type.value.type != OVSDB_TYPE_VOID) {
|
|
|
|
|
return xasprintf("\"%s\": table \"%s\" column \"%s\" is "
|
|
|
|
|
"not string or set of strings",
|
|
|
|
|
name, (*tablep)->schema->name, (*columnp)->name);
|
2010-03-18 17:12:02 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-04-10 16:22:00 -07:00
|
|
|
|
return NULL;
|
2010-03-18 17:12:02 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
static const char *
|
|
|
|
|
query_db_string(const struct shash *all_dbs, const char *name,
|
|
|
|
|
struct ds *errors)
|
2010-03-18 17:12:02 -07:00
|
|
|
|
{
|
|
|
|
|
if (!name || strncmp(name, "db:", 3)) {
|
|
|
|
|
return name;
|
|
|
|
|
} else {
|
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
|
const struct ovsdb_table *table;
|
|
|
|
|
const struct ovsdb_row *row;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
const struct db *db;
|
2013-04-10 16:22:00 -07:00
|
|
|
|
char *retval;
|
2010-03-18 17:12:02 -07:00
|
|
|
|
|
2013-06-13 04:30:32 -07:00
|
|
|
|
retval = parse_db_string_column(all_dbs, name,
|
2013-04-10 16:22:00 -07:00
|
|
|
|
&db, &table, &column);
|
|
|
|
|
if (retval) {
|
2013-06-27 10:27:57 -07:00
|
|
|
|
ds_put_format(errors, "%s\n", retval);
|
2014-07-28 15:21:17 +08:00
|
|
|
|
free(retval);
|
2013-06-27 10:27:57 -07:00
|
|
|
|
return NULL;
|
2013-04-10 16:22:00 -07:00
|
|
|
|
}
|
2010-03-18 17:12:02 -07:00
|
|
|
|
|
2010-09-17 10:33:10 -07:00
|
|
|
|
HMAP_FOR_EACH (row, hmap_node, &table->rows) {
|
2010-03-18 17:12:02 -07:00
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
datum = &row->fields[column->index];
|
|
|
|
|
for (i = 0; i < datum->n; i++) {
|
|
|
|
|
if (datum->keys[i].string[0]) {
|
|
|
|
|
return datum->keys[i].string;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
2010-01-04 10:05:51 -08:00
|
|
|
|
}
|
2010-03-18 17:12:02 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-11-05 10:22:18 -07:00
|
|
|
|
static struct ovsdb_jsonrpc_options *
|
|
|
|
|
add_remote(struct shash *remotes, const char *target)
|
|
|
|
|
{
|
|
|
|
|
struct ovsdb_jsonrpc_options *options;
|
|
|
|
|
|
|
|
|
|
options = shash_find_data(remotes, target);
|
|
|
|
|
if (!options) {
|
2012-04-11 20:18:34 -07:00
|
|
|
|
options = ovsdb_jsonrpc_default_options(target);
|
2010-11-05 10:22:18 -07:00
|
|
|
|
shash_add(remotes, target, options);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return options;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 15:39:55 -08:00
|
|
|
|
static struct ovsdb_datum *
|
|
|
|
|
get_datum(struct ovsdb_row *row, const char *column_name,
|
|
|
|
|
const enum ovsdb_atomic_type key_type,
|
|
|
|
|
const enum ovsdb_atomic_type value_type,
|
|
|
|
|
const size_t n_max)
|
2010-11-05 10:22:18 -07:00
|
|
|
|
{
|
|
|
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
|
|
|
|
|
const struct ovsdb_table_schema *schema = row->table->schema;
|
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
|
|
|
|
|
|
column = ovsdb_table_schema_get_column(schema, column_name);
|
|
|
|
|
if (!column) {
|
|
|
|
|
VLOG_DBG_RL(&rl, "Table `%s' has no `%s' column",
|
|
|
|
|
schema->name, column_name);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
return NULL;
|
2010-11-05 10:22:18 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 15:39:55 -08:00
|
|
|
|
if (column->type.key.type != key_type
|
|
|
|
|
|| column->type.value.type != value_type
|
|
|
|
|
|| column->type.n_max != n_max) {
|
2010-11-05 10:22:18 -07:00
|
|
|
|
if (!VLOG_DROP_DBG(&rl)) {
|
|
|
|
|
char *type_name = ovsdb_type_to_english(&column->type);
|
|
|
|
|
VLOG_DBG("Table `%s' column `%s' has type %s, not expected "
|
2013-11-25 23:38:48 -08:00
|
|
|
|
"key type %s, value type %s, max elements %"PRIuSIZE".",
|
2011-01-28 15:39:55 -08:00
|
|
|
|
schema->name, column_name, type_name,
|
|
|
|
|
ovsdb_atomic_type_to_string(key_type),
|
|
|
|
|
ovsdb_atomic_type_to_string(value_type),
|
|
|
|
|
n_max);
|
|
|
|
|
free(type_name);
|
2010-11-05 10:22:18 -07:00
|
|
|
|
}
|
2011-01-28 15:39:55 -08:00
|
|
|
|
return NULL;
|
2010-11-05 10:22:18 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 15:39:55 -08:00
|
|
|
|
return &row->fields[column->index];
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-16 12:09:49 -07:00
|
|
|
|
/* Read string-string key-values from a map. Returns the value associated with
|
|
|
|
|
* 'key', if found, or NULL */
|
|
|
|
|
static const char *
|
2012-03-10 15:58:10 -08:00
|
|
|
|
read_map_string_column(const struct ovsdb_row *row, const char *column_name,
|
2012-04-16 12:09:49 -07:00
|
|
|
|
const char *key)
|
2012-03-10 15:58:10 -08:00
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
|
union ovsdb_atom *atom_key = NULL, *atom_value = NULL;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
2012-07-13 16:00:29 -07:00
|
|
|
|
datum = get_datum(CONST_CAST(struct ovsdb_row *, row), column_name,
|
|
|
|
|
OVSDB_TYPE_STRING, OVSDB_TYPE_STRING, UINT_MAX);
|
2012-03-10 15:58:10 -08:00
|
|
|
|
|
|
|
|
|
if (!datum) {
|
2012-04-16 12:09:49 -07:00
|
|
|
|
return NULL;
|
2012-03-10 15:58:10 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < datum->n; i++) {
|
|
|
|
|
atom_key = &datum->keys[i];
|
|
|
|
|
if (!strcmp(atom_key->string, key)){
|
|
|
|
|
atom_value = &datum->values[i];
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-16 12:09:49 -07:00
|
|
|
|
return atom_value ? atom_value->string : NULL;
|
2012-03-10 15:58:10 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 15:39:55 -08:00
|
|
|
|
static const union ovsdb_atom *
|
|
|
|
|
read_column(const struct ovsdb_row *row, const char *column_name,
|
|
|
|
|
enum ovsdb_atomic_type type)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
|
|
2012-07-13 16:00:29 -07:00
|
|
|
|
datum = get_datum(CONST_CAST(struct ovsdb_row *, row), column_name, type,
|
|
|
|
|
OVSDB_TYPE_VOID, 1);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
return datum && datum->n ? datum->keys : NULL;
|
2010-11-05 10:22:18 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
|
read_integer_column(const struct ovsdb_row *row, const char *column_name,
|
|
|
|
|
long long int *integerp)
|
|
|
|
|
{
|
|
|
|
|
const union ovsdb_atom *atom;
|
|
|
|
|
|
|
|
|
|
atom = read_column(row, column_name, OVSDB_TYPE_INTEGER);
|
|
|
|
|
*integerp = atom ? atom->integer : 0;
|
|
|
|
|
return atom != NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
|
read_string_column(const struct ovsdb_row *row, const char *column_name,
|
|
|
|
|
const char **stringp)
|
|
|
|
|
{
|
|
|
|
|
const union ovsdb_atom *atom;
|
|
|
|
|
|
|
|
|
|
atom = read_column(row, column_name, OVSDB_TYPE_STRING);
|
2011-05-04 13:49:42 -07:00
|
|
|
|
*stringp = atom ? atom->string : NULL;
|
2010-11-05 10:22:18 -07:00
|
|
|
|
return atom != NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 15:39:55 -08:00
|
|
|
|
static void
|
|
|
|
|
write_bool_column(struct ovsdb_row *row, const char *column_name, bool value)
|
|
|
|
|
{
|
2012-09-21 11:12:39 -07:00
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
|
struct ovsdb_datum *datum;
|
2011-01-28 15:39:55 -08:00
|
|
|
|
|
2012-09-21 11:12:39 -07:00
|
|
|
|
column = ovsdb_table_schema_get_column(row->table->schema, column_name);
|
|
|
|
|
datum = get_datum(row, column_name, OVSDB_TYPE_BOOLEAN,
|
|
|
|
|
OVSDB_TYPE_VOID, 1);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
if (!datum) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
2012-09-21 11:12:39 -07:00
|
|
|
|
|
|
|
|
|
if (datum->n != 1) {
|
|
|
|
|
ovsdb_datum_destroy(datum, &column->type);
|
|
|
|
|
|
|
|
|
|
datum->n = 1;
|
|
|
|
|
datum->keys = xmalloc(sizeof *datum->keys);
|
|
|
|
|
datum->values = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 15:39:55 -08:00
|
|
|
|
datum->keys[0].boolean = value;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
write_string_string_column(struct ovsdb_row *row, const char *column_name,
|
|
|
|
|
char **keys, char **values, size_t n)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
|
struct ovsdb_datum *datum;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
column = ovsdb_table_schema_get_column(row->table->schema, column_name);
|
|
|
|
|
datum = get_datum(row, column_name, OVSDB_TYPE_STRING, OVSDB_TYPE_STRING,
|
|
|
|
|
UINT_MAX);
|
|
|
|
|
if (!datum) {
|
2012-12-26 09:43:51 -08:00
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
|
free(keys[i]);
|
|
|
|
|
free(values[i]);
|
|
|
|
|
}
|
2011-01-28 15:39:55 -08:00
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Free existing data. */
|
|
|
|
|
ovsdb_datum_destroy(datum, &column->type);
|
|
|
|
|
|
|
|
|
|
/* Allocate space for new values. */
|
|
|
|
|
datum->n = n;
|
|
|
|
|
datum->keys = xmalloc(n * sizeof *datum->keys);
|
|
|
|
|
datum->values = xmalloc(n * sizeof *datum->values);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n; ++i) {
|
|
|
|
|
datum->keys[i].string = keys[i];
|
|
|
|
|
datum->values[i].string = values[i];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Sort and check constraints. */
|
|
|
|
|
ovsdb_datum_sort_assert(datum, column->type.key.type);
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-05 10:22:18 -07:00
|
|
|
|
/* Adds a remote and options to 'remotes', based on the Manager table row in
|
|
|
|
|
* 'row'. */
|
|
|
|
|
static void
|
|
|
|
|
add_manager_options(struct shash *remotes, const struct ovsdb_row *row)
|
|
|
|
|
{
|
|
|
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
|
|
|
|
|
struct ovsdb_jsonrpc_options *options;
|
|
|
|
|
long long int max_backoff, probe_interval;
|
2012-04-16 12:09:49 -07:00
|
|
|
|
const char *target, *dscp_string;
|
2010-11-05 10:22:18 -07:00
|
|
|
|
|
|
|
|
|
if (!read_string_column(row, "target", &target) || !target) {
|
|
|
|
|
VLOG_INFO_RL(&rl, "Table `%s' has missing or invalid `target' column",
|
|
|
|
|
row->table->schema->name);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
options = add_remote(remotes, target);
|
|
|
|
|
if (read_integer_column(row, "max_backoff", &max_backoff)) {
|
|
|
|
|
options->max_backoff = max_backoff;
|
|
|
|
|
}
|
2011-01-27 17:47:30 -08:00
|
|
|
|
if (read_integer_column(row, "inactivity_probe", &probe_interval)) {
|
2010-11-05 10:22:18 -07:00
|
|
|
|
options->probe_interval = probe_interval;
|
|
|
|
|
}
|
2012-03-10 15:58:10 -08:00
|
|
|
|
|
2012-04-16 12:09:49 -07:00
|
|
|
|
options->dscp = DSCP_DEFAULT;
|
|
|
|
|
dscp_string = read_map_string_column(row, "other_config", "dscp");
|
|
|
|
|
if (dscp_string) {
|
|
|
|
|
int dscp = atoi(dscp_string);
|
|
|
|
|
if (dscp >= 0 && dscp <= 63) {
|
|
|
|
|
options->dscp = dscp;
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-11-05 10:22:18 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-03-18 17:12:02 -07:00
|
|
|
|
static void
|
2013-06-13 04:30:32 -07:00
|
|
|
|
query_db_remotes(const char *name, const struct shash *all_dbs,
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct shash *remotes, struct ds *errors)
|
2010-03-18 17:12:02 -07:00
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
|
const struct ovsdb_table *table;
|
|
|
|
|
const struct ovsdb_row *row;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
const struct db *db;
|
2013-04-10 16:22:00 -07:00
|
|
|
|
char *retval;
|
2010-03-18 17:12:02 -07:00
|
|
|
|
|
2013-06-13 04:30:32 -07:00
|
|
|
|
retval = parse_db_column(all_dbs, name, &db, &table, &column);
|
2013-04-10 16:22:00 -07:00
|
|
|
|
if (retval) {
|
2013-06-27 10:27:57 -07:00
|
|
|
|
ds_put_format(errors, "%s\n", retval);
|
|
|
|
|
free(retval);
|
|
|
|
|
return;
|
2013-04-10 16:22:00 -07:00
|
|
|
|
}
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
2010-11-05 10:22:18 -07:00
|
|
|
|
if (column->type.key.type == OVSDB_TYPE_STRING
|
|
|
|
|
&& column->type.value.type == OVSDB_TYPE_VOID) {
|
|
|
|
|
HMAP_FOR_EACH (row, hmap_node, &table->rows) {
|
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
datum = &row->fields[column->index];
|
|
|
|
|
for (i = 0; i < datum->n; i++) {
|
|
|
|
|
add_remote(remotes, datum->keys[i].string);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
} else if (column->type.key.type == OVSDB_TYPE_UUID
|
|
|
|
|
&& column->type.key.u.uuid.refTable
|
|
|
|
|
&& column->type.value.type == OVSDB_TYPE_VOID) {
|
|
|
|
|
const struct ovsdb_table *ref_table = column->type.key.u.uuid.refTable;
|
|
|
|
|
HMAP_FOR_EACH (row, hmap_node, &table->rows) {
|
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
datum = &row->fields[column->index];
|
|
|
|
|
for (i = 0; i < datum->n; i++) {
|
|
|
|
|
const struct ovsdb_row *ref_row;
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
2010-11-05 10:22:18 -07:00
|
|
|
|
ref_row = ovsdb_table_get_row(ref_table, &datum->keys[i].uuid);
|
|
|
|
|
if (ref_row) {
|
|
|
|
|
add_manager_options(remotes, ref_row);
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-04 10:05:51 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 15:39:55 -08:00
|
|
|
|
static void
|
|
|
|
|
update_remote_row(const struct ovsdb_row *row, struct ovsdb_txn *txn,
|
2011-07-13 16:15:22 -07:00
|
|
|
|
const struct ovsdb_jsonrpc_server *jsonrpc)
|
2011-01-28 15:39:55 -08:00
|
|
|
|
{
|
2011-07-13 16:15:22 -07:00
|
|
|
|
struct ovsdb_jsonrpc_remote_status status;
|
2011-01-28 15:39:55 -08:00
|
|
|
|
struct ovsdb_row *rw_row;
|
|
|
|
|
const char *target;
|
2013-04-18 16:37:05 -07:00
|
|
|
|
char *keys[9], *values[9];
|
2011-01-28 15:39:55 -08:00
|
|
|
|
size_t n = 0;
|
|
|
|
|
|
|
|
|
|
/* Get the "target" (protocol/host/port) spec. */
|
|
|
|
|
if (!read_string_column(row, "target", &target)) {
|
|
|
|
|
/* Bad remote spec or incorrect schema. */
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
rw_row = ovsdb_txn_row_modify(txn, row);
|
2011-07-13 16:15:22 -07:00
|
|
|
|
ovsdb_jsonrpc_server_get_remote_status(jsonrpc, target, &status);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
|
|
|
|
|
/* Update status information columns. */
|
2011-07-13 16:15:22 -07:00
|
|
|
|
write_bool_column(rw_row, "is_connected", status.is_connected);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
|
2011-07-13 16:15:22 -07:00
|
|
|
|
if (status.state) {
|
|
|
|
|
keys[n] = xstrdup("state");
|
|
|
|
|
values[n++] = xstrdup(status.state);
|
|
|
|
|
}
|
|
|
|
|
if (status.sec_since_connect != UINT_MAX) {
|
2011-03-14 13:10:02 -07:00
|
|
|
|
keys[n] = xstrdup("sec_since_connect");
|
2011-07-13 16:15:22 -07:00
|
|
|
|
values[n++] = xasprintf("%u", status.sec_since_connect);
|
2011-03-14 13:10:02 -07:00
|
|
|
|
}
|
2011-07-13 16:15:22 -07:00
|
|
|
|
if (status.sec_since_disconnect != UINT_MAX) {
|
2011-03-14 13:10:02 -07:00
|
|
|
|
keys[n] = xstrdup("sec_since_disconnect");
|
2011-07-13 16:15:22 -07:00
|
|
|
|
values[n++] = xasprintf("%u", status.sec_since_disconnect);
|
2011-03-14 13:10:02 -07:00
|
|
|
|
}
|
2011-07-13 16:15:22 -07:00
|
|
|
|
if (status.last_error) {
|
2011-01-28 15:39:55 -08:00
|
|
|
|
keys[n] = xstrdup("last_error");
|
|
|
|
|
values[n++] =
|
2011-07-13 16:15:22 -07:00
|
|
|
|
xstrdup(ovs_retval_to_string(status.last_error));
|
2011-01-28 15:39:55 -08:00
|
|
|
|
}
|
2011-07-26 10:24:17 -07:00
|
|
|
|
if (status.locks_held && status.locks_held[0]) {
|
|
|
|
|
keys[n] = xstrdup("locks_held");
|
|
|
|
|
values[n++] = xstrdup(status.locks_held);
|
|
|
|
|
}
|
|
|
|
|
if (status.locks_waiting && status.locks_waiting[0]) {
|
|
|
|
|
keys[n] = xstrdup("locks_waiting");
|
|
|
|
|
values[n++] = xstrdup(status.locks_waiting);
|
|
|
|
|
}
|
|
|
|
|
if (status.locks_lost && status.locks_lost[0]) {
|
|
|
|
|
keys[n] = xstrdup("locks_lost");
|
|
|
|
|
values[n++] = xstrdup(status.locks_lost);
|
|
|
|
|
}
|
2011-07-13 16:08:37 -07:00
|
|
|
|
if (status.n_connections > 1) {
|
|
|
|
|
keys[n] = xstrdup("n_connections");
|
|
|
|
|
values[n++] = xasprintf("%d", status.n_connections);
|
|
|
|
|
}
|
2013-04-18 16:37:05 -07:00
|
|
|
|
if (status.bound_port != htons(0)) {
|
|
|
|
|
keys[n] = xstrdup("bound_port");
|
|
|
|
|
values[n++] = xasprintf("%"PRIu16, ntohs(status.bound_port));
|
|
|
|
|
}
|
2011-01-28 15:39:55 -08:00
|
|
|
|
write_string_string_column(rw_row, "status", keys, values, n);
|
2011-07-26 10:24:17 -07:00
|
|
|
|
|
|
|
|
|
ovsdb_jsonrpc_server_free_remote_status(&status);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2013-06-13 04:30:32 -07:00
|
|
|
|
update_remote_rows(const struct shash *all_dbs,
|
2011-07-13 16:15:22 -07:00
|
|
|
|
const char *remote_name,
|
|
|
|
|
const struct ovsdb_jsonrpc_server *jsonrpc)
|
2011-01-28 15:39:55 -08:00
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_table *table, *ref_table;
|
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
|
const struct ovsdb_row *row;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
const struct db *db;
|
2013-04-10 16:22:00 -07:00
|
|
|
|
char *retval;
|
2011-01-28 15:39:55 -08:00
|
|
|
|
|
|
|
|
|
if (strncmp("db:", remote_name, 3)) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-13 04:30:32 -07:00
|
|
|
|
retval = parse_db_column(all_dbs, remote_name, &db, &table, &column);
|
2013-04-10 16:22:00 -07:00
|
|
|
|
if (retval) {
|
2013-06-27 10:27:57 -07:00
|
|
|
|
free(retval);
|
|
|
|
|
return;
|
2013-04-10 16:22:00 -07:00
|
|
|
|
}
|
2011-01-28 15:39:55 -08:00
|
|
|
|
|
|
|
|
|
if (column->type.key.type != OVSDB_TYPE_UUID
|
|
|
|
|
|| !column->type.key.u.uuid.refTable
|
|
|
|
|
|| column->type.value.type != OVSDB_TYPE_VOID) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ref_table = column->type.key.u.uuid.refTable;
|
|
|
|
|
|
|
|
|
|
HMAP_FOR_EACH (row, hmap_node, &table->rows) {
|
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
datum = &row->fields[column->index];
|
|
|
|
|
for (i = 0; i < datum->n; i++) {
|
|
|
|
|
const struct ovsdb_row *ref_row;
|
|
|
|
|
|
|
|
|
|
ref_row = ovsdb_table_get_row(ref_table, &datum->keys[i].uuid);
|
|
|
|
|
if (ref_row) {
|
2012-09-07 10:07:03 -07:00
|
|
|
|
update_remote_row(ref_row, db->txn, jsonrpc);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
update_remote_status(const struct ovsdb_jsonrpc_server *jsonrpc,
|
2012-09-07 10:07:03 -07:00
|
|
|
|
const struct sset *remotes,
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct shash *all_dbs)
|
2011-01-28 15:39:55 -08:00
|
|
|
|
{
|
|
|
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
|
2011-03-25 15:26:30 -07:00
|
|
|
|
const char *remote;
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct db *db;
|
|
|
|
|
struct shash_node *node;
|
2011-01-28 15:39:55 -08:00
|
|
|
|
|
2013-06-13 04:30:32 -07:00
|
|
|
|
SHASH_FOR_EACH(node, all_dbs) {
|
|
|
|
|
db = node->data;
|
|
|
|
|
db->txn = ovsdb_txn_create(db->db);
|
2012-09-07 10:07:03 -07:00
|
|
|
|
}
|
2011-01-28 15:39:55 -08:00
|
|
|
|
|
|
|
|
|
/* Iterate over --remote arguments given on command line. */
|
2011-03-25 15:26:30 -07:00
|
|
|
|
SSET_FOR_EACH (remote, remotes) {
|
2013-06-13 04:30:32 -07:00
|
|
|
|
update_remote_rows(all_dbs, remote, jsonrpc);
|
2011-01-28 15:39:55 -08:00
|
|
|
|
}
|
|
|
|
|
|
2013-06-13 04:30:32 -07:00
|
|
|
|
SHASH_FOR_EACH(node, all_dbs) {
|
|
|
|
|
struct ovsdb_error *error;
|
|
|
|
|
db = node->data;
|
|
|
|
|
error = ovsdb_txn_commit(db->txn, false);
|
2012-09-07 10:07:03 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
VLOG_ERR_RL(&rl, "Failed to update remote status: %s",
|
|
|
|
|
ovsdb_error_to_string(error));
|
|
|
|
|
ovsdb_error_destroy(error);
|
|
|
|
|
}
|
2011-01-28 15:39:55 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
/* Reconfigures ovsdb-server's remotes based on information in the database. */
|
|
|
|
|
static char *
|
|
|
|
|
reconfigure_remotes(struct ovsdb_jsonrpc_server *jsonrpc,
|
2013-06-13 04:30:32 -07:00
|
|
|
|
const struct shash *all_dbs, struct sset *remotes)
|
2010-01-04 10:05:51 -08:00
|
|
|
|
{
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct ds errors = DS_EMPTY_INITIALIZER;
|
2010-01-04 10:05:51 -08:00
|
|
|
|
struct shash resolved_remotes;
|
2011-03-25 15:26:30 -07:00
|
|
|
|
const char *name;
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
2010-03-18 17:12:02 -07:00
|
|
|
|
/* Configure remotes. */
|
2010-01-04 10:05:51 -08:00
|
|
|
|
shash_init(&resolved_remotes);
|
2011-03-25 15:26:30 -07:00
|
|
|
|
SSET_FOR_EACH (name, remotes) {
|
2010-01-04 10:05:51 -08:00
|
|
|
|
if (!strncmp(name, "db:", 3)) {
|
2013-06-27 10:27:57 -07:00
|
|
|
|
query_db_remotes(name, all_dbs, &resolved_remotes, &errors);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
} else {
|
2010-11-05 10:22:18 -07:00
|
|
|
|
add_remote(&resolved_remotes, name);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ovsdb_jsonrpc_server_set_remotes(jsonrpc, &resolved_remotes);
|
2011-02-17 12:52:48 -08:00
|
|
|
|
shash_destroy_free_data(&resolved_remotes);
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
return errors.string;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static char *
|
|
|
|
|
reconfigure_ssl(const struct shash *all_dbs)
|
|
|
|
|
{
|
|
|
|
|
struct ds errors = DS_EMPTY_INITIALIZER;
|
|
|
|
|
const char *resolved_private_key;
|
|
|
|
|
const char *resolved_certificate;
|
|
|
|
|
const char *resolved_ca_cert;
|
|
|
|
|
|
|
|
|
|
resolved_private_key = query_db_string(all_dbs, private_key_file, &errors);
|
|
|
|
|
resolved_certificate = query_db_string(all_dbs, certificate_file, &errors);
|
|
|
|
|
resolved_ca_cert = query_db_string(all_dbs, ca_cert_file, &errors);
|
|
|
|
|
|
|
|
|
|
stream_ssl_set_key_and_cert(resolved_private_key, resolved_certificate);
|
|
|
|
|
stream_ssl_set_ca_cert_file(resolved_ca_cert, bootstrap_ca_cert);
|
|
|
|
|
|
|
|
|
|
return errors.string;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
report_error_if_changed(char *error, char **last_errorp)
|
|
|
|
|
{
|
|
|
|
|
if (error) {
|
|
|
|
|
if (!*last_errorp || strcmp(error, *last_errorp)) {
|
|
|
|
|
VLOG_WARN("%s", error);
|
|
|
|
|
free(*last_errorp);
|
|
|
|
|
*last_errorp = error;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
free(error);
|
|
|
|
|
} else {
|
|
|
|
|
free(*last_errorp);
|
|
|
|
|
*last_errorp = NULL;
|
|
|
|
|
}
|
2010-03-18 17:12:02 -07:00
|
|
|
|
}
|
2010-01-04 10:05:51 -08:00
|
|
|
|
|
2009-11-17 16:02:38 -08:00
|
|
|
|
static void
|
2011-12-02 15:29:19 -08:00
|
|
|
|
ovsdb_server_exit(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
|
|
|
|
const char *argv[] OVS_UNUSED,
|
2009-11-17 16:02:38 -08:00
|
|
|
|
void *exiting_)
|
|
|
|
|
{
|
|
|
|
|
bool *exiting = exiting_;
|
|
|
|
|
*exiting = true;
|
2012-02-14 20:53:59 -08:00
|
|
|
|
unixctl_command_reply(conn, NULL);
|
2015-03-21 00:00:49 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovsdb_server_perf_counters_show(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
|
|
|
|
const char *argv[] OVS_UNUSED,
|
|
|
|
|
void *arg_ OVS_UNUSED)
|
|
|
|
|
{
|
|
|
|
|
char *s = perf_counters_to_string();
|
|
|
|
|
|
|
|
|
|
unixctl_command_reply(conn, s);
|
|
|
|
|
free(s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovsdb_server_perf_counters_clear(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
|
|
|
|
const char *argv[] OVS_UNUSED,
|
|
|
|
|
void *arg_ OVS_UNUSED)
|
|
|
|
|
{
|
|
|
|
|
perf_counters_clear();
|
|
|
|
|
unixctl_command_reply(conn, NULL);
|
2009-11-17 16:02:38 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-03-18 11:24:55 -07:00
|
|
|
|
static void
|
2012-09-07 10:07:03 -07:00
|
|
|
|
ovsdb_server_compact(struct unixctl_conn *conn, int argc,
|
|
|
|
|
const char *argv[], void *dbs_)
|
2010-03-18 11:24:55 -07:00
|
|
|
|
{
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct shash *all_dbs = dbs_;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
struct ds reply;
|
|
|
|
|
struct db *db;
|
2013-06-13 04:30:32 -07:00
|
|
|
|
struct shash_node *node;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
int n = 0;
|
2010-03-18 11:24:55 -07:00
|
|
|
|
|
2012-09-07 10:07:03 -07:00
|
|
|
|
ds_init(&reply);
|
2013-06-13 04:30:32 -07:00
|
|
|
|
SHASH_FOR_EACH(node, all_dbs) {
|
|
|
|
|
const char *name;
|
|
|
|
|
|
|
|
|
|
db = node->data;
|
|
|
|
|
name = db->db->schema->name;
|
2012-09-07 10:07:03 -07:00
|
|
|
|
|
|
|
|
|
if (argc < 2 || !strcmp(argv[1], name)) {
|
|
|
|
|
struct ovsdb_error *error;
|
|
|
|
|
|
|
|
|
|
VLOG_INFO("compacting %s database by user request", name);
|
|
|
|
|
|
|
|
|
|
error = ovsdb_file_compact(db->file);
|
|
|
|
|
if (error) {
|
|
|
|
|
char *s = ovsdb_error_to_string(error);
|
|
|
|
|
ds_put_format(&reply, "%s\n", s);
|
|
|
|
|
free(s);
|
2013-11-01 17:44:52 +01:00
|
|
|
|
ovsdb_error_destroy(error);
|
2012-09-07 10:07:03 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
n++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!n) {
|
|
|
|
|
unixctl_command_reply_error(conn, "no database by that name");
|
|
|
|
|
} else if (reply.length) {
|
|
|
|
|
unixctl_command_reply_error(conn, ds_cstr(&reply));
|
2010-03-18 11:24:55 -07:00
|
|
|
|
} else {
|
2012-09-07 10:07:03 -07:00
|
|
|
|
unixctl_command_reply(conn, NULL);
|
2010-03-18 11:24:55 -07:00
|
|
|
|
}
|
2012-09-07 10:07:03 -07:00
|
|
|
|
ds_destroy(&reply);
|
2010-03-18 11:24:55 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-06-24 12:56:30 -07:00
|
|
|
|
/* "ovsdb-server/reconnect": makes ovsdb-server drop all of its JSON-RPC
|
|
|
|
|
* connections and reconnect. */
|
|
|
|
|
static void
|
2011-12-02 15:29:19 -08:00
|
|
|
|
ovsdb_server_reconnect(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
|
|
|
|
const char *argv[] OVS_UNUSED, void *jsonrpc_)
|
2010-06-24 12:56:30 -07:00
|
|
|
|
{
|
|
|
|
|
struct ovsdb_jsonrpc_server *jsonrpc = jsonrpc_;
|
|
|
|
|
|
|
|
|
|
ovsdb_jsonrpc_server_reconnect(jsonrpc);
|
2012-02-14 20:53:59 -08:00
|
|
|
|
unixctl_command_reply(conn, NULL);
|
2010-06-24 12:56:30 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-04-10 09:34:49 -07:00
|
|
|
|
/* "ovsdb-server/add-remote REMOTE": adds REMOTE to the set of remotes that
|
|
|
|
|
* ovsdb-server services. */
|
|
|
|
|
static void
|
|
|
|
|
ovsdb_server_add_remote(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
2013-06-27 10:27:57 -07:00
|
|
|
|
const char *argv[], void *config_)
|
2013-04-10 09:34:49 -07:00
|
|
|
|
{
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct server_config *config = config_;
|
2013-04-10 09:34:49 -07:00
|
|
|
|
const char *remote = argv[1];
|
|
|
|
|
|
|
|
|
|
const struct ovsdb_column *column;
|
|
|
|
|
const struct ovsdb_table *table;
|
|
|
|
|
const struct db *db;
|
|
|
|
|
char *retval;
|
|
|
|
|
|
|
|
|
|
retval = (strncmp("db:", remote, 3)
|
|
|
|
|
? NULL
|
2013-06-27 10:27:57 -07:00
|
|
|
|
: parse_db_column(config->all_dbs, remote,
|
2013-04-10 09:34:49 -07:00
|
|
|
|
&db, &table, &column));
|
|
|
|
|
if (!retval) {
|
2013-06-27 10:27:57 -07:00
|
|
|
|
if (sset_add(config->remotes, remote)) {
|
|
|
|
|
save_config(config);
|
2013-06-13 12:25:39 -07:00
|
|
|
|
}
|
2013-04-10 09:34:49 -07:00
|
|
|
|
unixctl_command_reply(conn, NULL);
|
|
|
|
|
} else {
|
|
|
|
|
unixctl_command_reply_error(conn, retval);
|
|
|
|
|
free(retval);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* "ovsdb-server/remove-remote REMOTE": removes REMOTE frmo the set of remotes
|
|
|
|
|
* that ovsdb-server services. */
|
|
|
|
|
static void
|
|
|
|
|
ovsdb_server_remove_remote(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
2013-06-27 10:27:57 -07:00
|
|
|
|
const char *argv[], void *config_)
|
2013-04-10 09:34:49 -07:00
|
|
|
|
{
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct server_config *config = config_;
|
2013-04-10 09:34:49 -07:00
|
|
|
|
struct sset_node *node;
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
node = sset_find(config->remotes, argv[1]);
|
2013-04-10 09:34:49 -07:00
|
|
|
|
if (node) {
|
2013-06-27 10:27:57 -07:00
|
|
|
|
sset_delete(config->remotes, node);
|
|
|
|
|
save_config(config);
|
2013-04-10 09:34:49 -07:00
|
|
|
|
unixctl_command_reply(conn, NULL);
|
|
|
|
|
} else {
|
|
|
|
|
unixctl_command_reply_error(conn, "no such remote");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* "ovsdb-server/list-remotes": outputs a list of configured rmeotes. */
|
|
|
|
|
static void
|
|
|
|
|
ovsdb_server_list_remotes(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
|
|
|
|
const char *argv[] OVS_UNUSED, void *remotes_)
|
|
|
|
|
{
|
|
|
|
|
struct sset *remotes = remotes_;
|
|
|
|
|
const char **list, **p;
|
|
|
|
|
struct ds s;
|
|
|
|
|
|
|
|
|
|
ds_init(&s);
|
|
|
|
|
|
|
|
|
|
list = sset_sort(remotes);
|
|
|
|
|
for (p = list; *p; p++) {
|
|
|
|
|
ds_put_format(&s, "%s\n", *p);
|
|
|
|
|
}
|
|
|
|
|
free(list);
|
|
|
|
|
|
|
|
|
|
unixctl_command_reply(conn, ds_cstr(&s));
|
|
|
|
|
ds_destroy(&s);
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
|
|
|
|
|
/* "ovsdb-server/add-db DB": adds the DB to ovsdb-server. */
|
|
|
|
|
static void
|
|
|
|
|
ovsdb_server_add_database(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
|
|
|
|
const char *argv[], void *config_)
|
|
|
|
|
{
|
|
|
|
|
struct server_config *config = config_;
|
|
|
|
|
const char *filename = argv[1];
|
|
|
|
|
char *error;
|
|
|
|
|
|
|
|
|
|
error = open_db(config, filename);
|
|
|
|
|
if (!error) {
|
|
|
|
|
save_config(config);
|
|
|
|
|
unixctl_command_reply(conn, NULL);
|
|
|
|
|
} else {
|
|
|
|
|
unixctl_command_reply_error(conn, error);
|
|
|
|
|
free(error);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovsdb_server_remove_database(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
|
|
|
|
const char *argv[], void *config_)
|
|
|
|
|
{
|
|
|
|
|
struct server_config *config = config_;
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
struct db *db;
|
|
|
|
|
bool ok;
|
|
|
|
|
|
|
|
|
|
node = shash_find(config->all_dbs, argv[1]);
|
|
|
|
|
if (!node) {
|
|
|
|
|
unixctl_command_reply_error(conn, "Failed to find the database.");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
db = node->data;
|
|
|
|
|
|
|
|
|
|
ok = ovsdb_jsonrpc_server_remove_db(config->jsonrpc, db->db);
|
|
|
|
|
ovs_assert(ok);
|
|
|
|
|
|
2014-07-02 15:00:16 -07:00
|
|
|
|
close_db(db);
|
2013-06-27 10:27:57 -07:00
|
|
|
|
shash_delete(config->all_dbs, node);
|
|
|
|
|
|
|
|
|
|
save_config(config);
|
|
|
|
|
unixctl_command_reply(conn, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovsdb_server_list_databases(struct unixctl_conn *conn, int argc OVS_UNUSED,
|
|
|
|
|
const char *argv[] OVS_UNUSED, void *all_dbs_)
|
|
|
|
|
{
|
|
|
|
|
struct shash *all_dbs = all_dbs_;
|
|
|
|
|
const struct shash_node **nodes;
|
|
|
|
|
struct ds s;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
ds_init(&s);
|
|
|
|
|
|
|
|
|
|
nodes = shash_sort(all_dbs);
|
|
|
|
|
for (i = 0; i < shash_count(all_dbs); i++) {
|
|
|
|
|
struct db *db = nodes[i]->data;
|
|
|
|
|
ds_put_format(&s, "%s\n", db->db->schema->name);
|
|
|
|
|
}
|
|
|
|
|
free(nodes);
|
|
|
|
|
|
|
|
|
|
unixctl_command_reply(conn, ds_cstr(&s));
|
|
|
|
|
ds_destroy(&s);
|
|
|
|
|
}
|
|
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
|
static void
|
2012-09-07 10:07:03 -07:00
|
|
|
|
parse_options(int *argcp, char **argvp[],
|
|
|
|
|
struct sset *remotes, char **unixctl_pathp, char **run_command)
|
2009-11-04 15:11:44 -08:00
|
|
|
|
{
|
|
|
|
|
enum {
|
2012-09-21 11:16:34 -07:00
|
|
|
|
OPT_REMOTE = UCHAR_MAX + 1,
|
2009-11-17 16:02:38 -08:00
|
|
|
|
OPT_UNIXCTL,
|
2010-02-12 11:17:17 -08:00
|
|
|
|
OPT_RUN,
|
2009-12-21 13:13:48 -08:00
|
|
|
|
OPT_BOOTSTRAP_CA_CERT,
|
2015-08-19 15:42:07 -07:00
|
|
|
|
OPT_PEER_CA_CERT,
|
2009-11-04 15:11:44 -08:00
|
|
|
|
VLOG_OPTION_ENUMS,
|
2011-01-28 12:39:15 -08:00
|
|
|
|
DAEMON_OPTION_ENUMS
|
2009-11-04 15:11:44 -08:00
|
|
|
|
};
|
2013-04-23 16:40:56 -07:00
|
|
|
|
static const struct option long_options[] = {
|
2011-05-04 13:49:42 -07:00
|
|
|
|
{"remote", required_argument, NULL, OPT_REMOTE},
|
|
|
|
|
{"unixctl", required_argument, NULL, OPT_UNIXCTL},
|
2014-02-14 14:07:34 -08:00
|
|
|
|
#ifndef _WIN32
|
2011-05-04 13:49:42 -07:00
|
|
|
|
{"run", required_argument, NULL, OPT_RUN},
|
2014-02-14 14:07:34 -08:00
|
|
|
|
#endif
|
2011-05-04 13:49:42 -07:00
|
|
|
|
{"help", no_argument, NULL, 'h'},
|
|
|
|
|
{"version", no_argument, NULL, 'V'},
|
2009-11-04 15:11:44 -08:00
|
|
|
|
DAEMON_LONG_OPTIONS,
|
|
|
|
|
VLOG_LONG_OPTIONS,
|
2011-05-04 13:49:42 -07:00
|
|
|
|
{"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT},
|
2015-08-19 15:42:07 -07:00
|
|
|
|
{"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
|
2011-05-04 13:49:42 -07:00
|
|
|
|
{"private-key", required_argument, NULL, 'p'},
|
|
|
|
|
{"certificate", required_argument, NULL, 'c'},
|
|
|
|
|
{"ca-cert", required_argument, NULL, 'C'},
|
|
|
|
|
{NULL, 0, NULL, 0},
|
2009-11-04 15:11:44 -08:00
|
|
|
|
};
|
2015-03-16 12:01:55 -04:00
|
|
|
|
char *short_options = ovs_cmdl_long_options_to_short_options(long_options);
|
2012-09-07 10:07:03 -07:00
|
|
|
|
int argc = *argcp;
|
|
|
|
|
char **argv = *argvp;
|
2009-11-04 15:11:44 -08:00
|
|
|
|
|
2011-03-25 15:26:30 -07:00
|
|
|
|
sset_init(remotes);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
for (;;) {
|
|
|
|
|
int c;
|
|
|
|
|
|
|
|
|
|
c = getopt_long(argc, argv, short_options, long_options, NULL);
|
|
|
|
|
if (c == -1) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch (c) {
|
2010-01-04 10:05:51 -08:00
|
|
|
|
case OPT_REMOTE:
|
2011-03-25 15:26:30 -07:00
|
|
|
|
sset_add(remotes, optarg);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
break;
|
|
|
|
|
|
2009-11-17 16:02:38 -08:00
|
|
|
|
case OPT_UNIXCTL:
|
|
|
|
|
*unixctl_pathp = optarg;
|
|
|
|
|
break;
|
|
|
|
|
|
2010-02-12 11:17:17 -08:00
|
|
|
|
case OPT_RUN:
|
|
|
|
|
*run_command = optarg;
|
|
|
|
|
break;
|
|
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
|
case 'h':
|
|
|
|
|
usage();
|
|
|
|
|
|
|
|
|
|
case 'V':
|
2011-08-02 12:16:44 -07:00
|
|
|
|
ovs_print_version(0, 0);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
|
|
|
|
|
|
VLOG_OPTION_HANDLERS
|
|
|
|
|
DAEMON_OPTION_HANDLERS
|
|
|
|
|
|
2010-03-18 17:12:02 -07:00
|
|
|
|
case 'p':
|
|
|
|
|
private_key_file = optarg;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case 'c':
|
|
|
|
|
certificate_file = optarg;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case 'C':
|
|
|
|
|
ca_cert_file = optarg;
|
|
|
|
|
bootstrap_ca_cert = false;
|
|
|
|
|
break;
|
2009-12-21 13:13:48 -08:00
|
|
|
|
|
|
|
|
|
case OPT_BOOTSTRAP_CA_CERT:
|
2010-03-18 17:12:02 -07:00
|
|
|
|
ca_cert_file = optarg;
|
|
|
|
|
bootstrap_ca_cert = true;
|
2009-12-21 13:13:48 -08:00
|
|
|
|
break;
|
|
|
|
|
|
2015-08-19 15:42:07 -07:00
|
|
|
|
case OPT_PEER_CA_CERT:
|
|
|
|
|
stream_ssl_set_peer_ca_cert_file(optarg);
|
|
|
|
|
break;
|
|
|
|
|
|
2009-11-04 15:11:44 -08:00
|
|
|
|
case '?':
|
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
abort();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
free(short_options);
|
|
|
|
|
|
2012-09-07 10:07:03 -07:00
|
|
|
|
*argcp -= optind;
|
|
|
|
|
*argvp += optind;
|
2009-11-04 15:11:44 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
usage(void)
|
|
|
|
|
{
|
|
|
|
|
printf("%s: Open vSwitch database server\n"
|
2012-09-07 10:07:03 -07:00
|
|
|
|
"usage: %s [OPTIONS] [DATABASE...]\n"
|
|
|
|
|
"where each DATABASE is a database file in ovsdb format.\n"
|
|
|
|
|
"The default DATABASE, if none is given, is\n%s/conf.db.\n",
|
|
|
|
|
program_name, program_name, ovs_dbdir());
|
2009-11-04 15:11:44 -08:00
|
|
|
|
printf("\nJSON-RPC options (may be specified any number of times):\n"
|
2010-01-04 10:05:51 -08:00
|
|
|
|
" --remote=REMOTE connect or listen to REMOTE\n");
|
2009-12-21 13:13:48 -08:00
|
|
|
|
stream_usage("JSON-RPC", true, true, true);
|
2009-11-04 15:11:44 -08:00
|
|
|
|
daemon_usage();
|
|
|
|
|
vlog_usage();
|
|
|
|
|
printf("\nOther options:\n"
|
2010-02-12 11:17:17 -08:00
|
|
|
|
" --run COMMAND run COMMAND as subprocess then exit\n"
|
2010-03-23 11:22:42 -07:00
|
|
|
|
" --unixctl=SOCKET override default control socket name\n"
|
2009-11-04 15:11:44 -08:00
|
|
|
|
" -h, --help display this help message\n"
|
|
|
|
|
" -V, --version display version information\n");
|
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
|
}
|
2013-06-13 12:25:39 -07:00
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
static struct json *
|
|
|
|
|
sset_to_json(const struct sset *sset)
|
|
|
|
|
{
|
|
|
|
|
struct json *array;
|
|
|
|
|
const char *s;
|
|
|
|
|
|
|
|
|
|
array = json_array_create_empty();
|
|
|
|
|
SSET_FOR_EACH (s, sset) {
|
|
|
|
|
json_array_add(array, json_string_create(s));
|
|
|
|
|
}
|
|
|
|
|
return array;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Truncates and replaces the contents of 'config_file' by a representation of
|
|
|
|
|
* 'remotes' and 'db_filenames'. */
|
2013-06-13 12:25:39 -07:00
|
|
|
|
static void
|
2013-06-27 10:27:57 -07:00
|
|
|
|
save_config__(FILE *config_file, const struct sset *remotes,
|
|
|
|
|
const struct sset *db_filenames)
|
2013-06-13 12:25:39 -07:00
|
|
|
|
{
|
2013-06-27 10:27:57 -07:00
|
|
|
|
struct json *obj;
|
2013-06-13 12:25:39 -07:00
|
|
|
|
char *s;
|
|
|
|
|
|
|
|
|
|
if (ftruncate(fileno(config_file), 0) == -1) {
|
2013-06-24 10:54:49 -07:00
|
|
|
|
VLOG_FATAL("failed to truncate temporary file (%s)",
|
|
|
|
|
ovs_strerror(errno));
|
2013-06-13 12:25:39 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
obj = json_object_create();
|
|
|
|
|
json_object_put(obj, "remotes", sset_to_json(remotes));
|
|
|
|
|
json_object_put(obj, "db_filenames", sset_to_json(db_filenames));
|
|
|
|
|
s = json_to_string(obj, 0);
|
|
|
|
|
json_destroy(obj);
|
2013-06-13 12:25:39 -07:00
|
|
|
|
|
|
|
|
|
if (fseek(config_file, 0, SEEK_SET) != 0
|
|
|
|
|
|| fputs(s, config_file) == EOF
|
|
|
|
|
|| fflush(config_file) == EOF) {
|
2013-06-24 10:54:49 -07:00
|
|
|
|
VLOG_FATAL("failed to write temporary file (%s)", ovs_strerror(errno));
|
2013-06-13 12:25:39 -07:00
|
|
|
|
}
|
|
|
|
|
free(s);
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
/* Truncates and replaces the contents of 'config_file' by a representation of
|
|
|
|
|
* 'config'. */
|
2013-06-13 12:25:39 -07:00
|
|
|
|
static void
|
2013-06-27 10:27:57 -07:00
|
|
|
|
save_config(struct server_config *config)
|
|
|
|
|
{
|
|
|
|
|
struct sset db_filenames;
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
|
|
|
|
|
sset_init(&db_filenames);
|
|
|
|
|
SHASH_FOR_EACH (node, config->all_dbs) {
|
|
|
|
|
struct db *db = node->data;
|
|
|
|
|
sset_add(&db_filenames, db->filename);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
save_config__(config->config_tmpfile, config->remotes, &db_filenames);
|
|
|
|
|
|
|
|
|
|
sset_destroy(&db_filenames);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
sset_from_json(struct sset *sset, const struct json *array)
|
2013-06-13 12:25:39 -07:00
|
|
|
|
{
|
|
|
|
|
size_t i;
|
|
|
|
|
|
2013-06-27 10:27:57 -07:00
|
|
|
|
sset_clear(sset);
|
|
|
|
|
|
|
|
|
|
ovs_assert(array->type == JSON_ARRAY);
|
|
|
|
|
for (i = 0; i < array->u.array.n; i++) {
|
|
|
|
|
const struct json *elem = array->u.array.elems[i];
|
|
|
|
|
sset_add(sset, json_string(elem));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Clears and replaces 'remotes' and 'dbnames' by a configuration read from
|
|
|
|
|
* 'config_file', which must have been previously written by save_config(). */
|
|
|
|
|
static void
|
|
|
|
|
load_config(FILE *config_file, struct sset *remotes, struct sset *db_filenames)
|
|
|
|
|
{
|
|
|
|
|
struct json *json;
|
2013-06-13 12:25:39 -07:00
|
|
|
|
|
|
|
|
|
if (fseek(config_file, 0, SEEK_SET) != 0) {
|
2013-06-24 10:54:49 -07:00
|
|
|
|
VLOG_FATAL("seek failed in temporary file (%s)", ovs_strerror(errno));
|
2013-06-13 12:25:39 -07:00
|
|
|
|
}
|
|
|
|
|
json = json_from_stream(config_file);
|
|
|
|
|
if (json->type == JSON_STRING) {
|
|
|
|
|
VLOG_FATAL("reading json failed (%s)", json_string(json));
|
|
|
|
|
}
|
2013-06-27 10:27:57 -07:00
|
|
|
|
ovs_assert(json->type == JSON_OBJECT);
|
|
|
|
|
|
|
|
|
|
sset_from_json(remotes, shash_find_data(json_object(json), "remotes"));
|
|
|
|
|
sset_from_json(db_filenames,
|
|
|
|
|
shash_find_data(json_object(json), "db_filenames"));
|
2013-06-13 12:25:39 -07:00
|
|
|
|
json_destroy(json);
|
|
|
|
|
}
|