3 * Bacula Director daemon -- this is the main program
5 * Kern Sibbald, March MM
10 Copyright (C) 2000-2006 Kern Sibbald
12 This program is free software; you can redistribute it and/or
13 modify it under the terms of the GNU General Public License
14 version 2 as amended with additional clauses defined in the
15 file LICENSE in the main source directory.
17 This program is distributed in the hope that it will be useful,
18 but WITHOUT ANY WARRANTY; without even the implied warranty of
19 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 the file LICENSE for additional details.
27 /* Forward referenced subroutines */
28 static void terminate_dird(int sig);
29 static int check_resources();
31 /* Exported subroutines */
33 extern "C" void reload_config(int sig);
36 /* Imported subroutines */
37 JCR *wait_for_next_job(char *runjob);
38 void term_scheduler();
39 void term_ua_server();
40 void start_UA_server(dlist *addrs);
41 void init_job_server(int max_workers);
42 void term_job_server();
43 void store_jobtype(LEX *lc, RES_ITEM *item, int index, int pass);
44 void store_level(LEX *lc, RES_ITEM *item, int index, int pass);
45 void store_replace(LEX *lc, RES_ITEM *item, int index, int pass);
46 void init_device_resources();
48 static char *runjob = NULL;
49 static int background = 1;
50 static void init_reload(void);
52 /* Globals Exported */
53 DIRRES *director; /* Director resource */
56 char *configfile = NULL;
58 /* Globals Imported */
59 extern int r_first, r_last; /* first and last resources */
60 extern RES_TABLE resources[];
61 extern RES **res_head;
62 extern RES_ITEM job_items[];
66 #define CONFIG_FILE "./bacula-dir.conf" /* default configuration file */
71 "Copyright (C) 2000-2005 Kern Sibbald.\n"
72 "\nVersion: %s (%s)\n\n"
73 "Usage: dird [-f -s] [-c config_file] [-d debug_level] [config_file]\n"
74 " -c <file> set configuration file to file\n"
75 " -dnn set debug level to nn\n"
76 " -f run in foreground (for debugging)\n"
78 " -r <job> run <job> now\n"
80 " -t test - read configuration and exit\n"
82 " -v verbose user messages\n"
83 " -? print this message.\n"
84 "\n"), VERSION, BDATE);
90 /*********************************************************************
92 * Main Bacula Server program
95 int main (int argc, char *argv[])
99 int no_signals = FALSE;
100 int test_config = FALSE;
104 setlocale(LC_ALL, "");
105 bindtextdomain("bacula", LOCALEDIR);
106 textdomain("bacula");
109 my_name_is(argc, argv, "bacula-dir");
110 init_msg(NULL, NULL); /* initialize message handler */
112 daemon_start_time = time(NULL);
114 while ((ch = getopt(argc, argv, "c:d:fg:r:stu:v?")) != -1) {
116 case 'c': /* specify config file */
117 if (configfile != NULL) {
120 configfile = bstrdup(optarg);
123 case 'd': /* set debug level */
124 debug_level = atoi(optarg);
125 if (debug_level <= 0) {
128 Dmsg1(0, "Debug level = %d\n", debug_level);
131 case 'f': /* run in foreground */
135 case 'g': /* set group id */
139 case 'r': /* run job */
140 if (runjob != NULL) {
144 runjob = bstrdup(optarg);
148 case 's': /* turn off signals */
152 case 't': /* test config */
156 case 'u': /* set uid */
160 case 'v': /* verbose */
174 init_signals(terminate_dird);
178 if (configfile != NULL) {
181 configfile = bstrdup(*argv);
189 if (configfile == NULL) {
190 configfile = bstrdup(CONFIG_FILE);
193 parse_config(configfile);
195 if (init_crypto() != 0) {
196 Jmsg((JCR *)NULL, M_ERROR_TERM, 0, _("Cryptography library initialization failed.\n"));
199 if (!check_resources()) {
200 Jmsg((JCR *)NULL, M_ERROR_TERM, 0, _("Please correct configuration file: %s\n"), configfile);
207 my_name_is(0, NULL, director->hdr.name); /* set user defined name */
209 FDConnectTimeout = (int)director->FDConnectTimeout;
210 SDConnectTimeout = (int)director->SDConnectTimeout;
214 init_stack_dump(); /* grab new pid */
217 /* Create pid must come after we are a daemon -- so we have our final pid */
218 create_pid_file(director->pid_directory, "bacula-dir", get_first_port_host_order(director->DIRaddrs));
219 read_state_file(director->working_directory, "bacula-dir", get_first_port_host_order(director->DIRaddrs));
221 drop(uid, gid); /* reduce priveleges if requested */
223 signal(SIGHUP, reload_config);
225 init_console_msg(working_directory);
227 init_python_interpreter(director->hdr.name, director->scripts_directory,
230 set_thread_concurrency(director->MaxConcurrentJobs * 2 +
231 4 /* UA */ + 4 /* sched+watchdog+jobsvr+misc */);
233 Dmsg0(200, "Start UA server\n");
234 start_UA_server(director->DIRaddrs);
236 start_watchdog(); /* start network watchdog thread */
238 init_jcr_subsystem(); /* start JCR watchdogs etc. */
240 init_job_server(director->MaxConcurrentJobs);
242 Dmsg0(200, "wait for next job\n");
243 /* Main loop -- call scheduler to get next job to run */
244 while ( (jcr = wait_for_next_job(runjob)) ) {
245 run_job(jcr); /* run job */
246 free_jcr(jcr); /* release jcr */
247 if (runjob) { /* command line, run a single job? */
248 break; /* yes, terminate */
255 /* Cleanup and then exit */
256 static void terminate_dird(int sig)
258 static bool already_here = false;
260 if (already_here) { /* avoid recursive temination problems */
264 generate_daemon_event(NULL, "Exit");
265 write_state_file(director->working_directory, "bacula-dir", get_first_port_host_order(director->DIRaddrs));
266 delete_pid_file(director->pid_directory, "bacula-dir", get_first_port_host_order(director->DIRaddrs));
267 // signal(SIGCHLD, SIG_IGN); /* don't worry about children now */
273 if (configfile != NULL) {
276 if (debug_level > 5) {
277 print_memory_pool_stats();
279 free_config_resources();
281 term_msg(); /* terminate message handler */
284 close_memory_pool(); /* release free memory in pool */
289 struct RELOAD_TABLE {
294 static const int max_reloads = 10;
295 static RELOAD_TABLE reload_table[max_reloads];
297 static void init_reload(void)
299 for (int i=0; i < max_reloads; i++) {
300 reload_table[i].job_count = 0;
301 reload_table[i].res_table = NULL;
305 static void free_saved_resources(int table)
307 int num = r_last - r_first + 1;
308 RES **res_tab = reload_table[table].res_table;
310 Dmsg1(100, "res_tab for table %d already released.\n", table);
313 Dmsg1(100, "Freeing resources for table %d\n", table);
314 for (int j=0; j<num; j++) {
315 free_resource(res_tab[j], r_first + j);
318 reload_table[table].job_count = 0;
319 reload_table[table].res_table = NULL;
323 * Called here at the end of every job that was
324 * hooked decrementing the active job_count. When
325 * it goes to zero, no one is using the associated
326 * resource table, so free it.
328 static void reload_job_end_cb(JCR *jcr, void *ctx)
330 int reload_id = (int)((long int)ctx);
331 Dmsg3(100, "reload job_end JobId=%d table=%d cnt=%d\n", jcr->JobId,
332 reload_id, reload_table[reload_id].job_count);
335 if (--reload_table[reload_id].job_count <= 0) {
336 free_saved_resources(reload_id);
342 static int find_free_reload_table_entry()
345 for (int i=0; i < max_reloads; i++) {
346 if (reload_table[i].res_table == NULL) {
355 * If we get here, we have received a SIGHUP, which means to
356 * reread our configuration file.
358 * The algorithm used is as follows: we count how many jobs are
359 * running and mark the running jobs to make a callback on
360 * exiting. The old config is saved with the reload table
361 * id in a reload table. The new config file is read. Now, as
362 * each job exits, it calls back to the reload_job_end_cb(), which
363 * decrements the count of open jobs for the given reload table.
364 * When the count goes to zero, we release those resources.
365 * This allows us to have pointers into the resource table (from
366 * jobs), and once they exit and all the pointers are released, we
367 * release the old table. Note, if no new jobs are running since the
368 * last reload, then the old resources will be immediately release.
369 * A console is considered a job because it may have pointers to
370 * resources, but a SYSTEM job is not since it *should* not have any
371 * permanent pointers to jobs.
374 void reload_config(int sig)
376 static bool already_here = false;
379 int njobs = 0; /* number of running jobs */
384 abort(); /* Oops, recursion -> die */
388 sigaddset(&set, SIGHUP);
389 sigprocmask(SIG_BLOCK, &set, NULL);
394 table = find_free_reload_table_entry();
396 Jmsg(NULL, M_ERROR, 0, _("Too many open reload requests. Request ignored.\n"));
400 Dmsg1(100, "Reload_config njobs=%d\n", njobs);
401 reload_table[table].res_table = save_config_resources();
402 Dmsg1(100, "Saved old config in table %d\n", table);
404 ok = parse_config(configfile, 0); /* no exit on error */
406 Dmsg0(100, "Reloaded config file\n");
407 if (!ok || !check_resources()) {
408 rtable = find_free_reload_table_entry(); /* save new, bad table */
410 Jmsg(NULL, M_ERROR, 0, _("Please correct configuration file: %s\n"), configfile);
411 Jmsg(NULL, M_ERROR_TERM, 0, _("Out of reload table entries. Giving up.\n"));
413 Jmsg(NULL, M_ERROR, 0, _("Please correct configuration file: %s\n"), configfile);
414 Jmsg(NULL, M_ERROR, 0, _("Resetting previous configuration.\n"));
416 reload_table[rtable].res_table = save_config_resources();
417 /* Now restore old resoure values */
418 int num = r_last - r_first + 1;
419 RES **res_tab = reload_table[table].res_table;
420 for (int i=0; i<num; i++) {
421 res_head[i] = res_tab[i];
423 table = rtable; /* release new, bad, saved table below */
426 * Hook all active jobs so that they release this table
429 if (jcr->JobType != JT_SYSTEM) {
430 reload_table[table].job_count++;
431 job_end_push(jcr, reload_job_end_cb, (void *)((long int)table));
439 set_working_directory(director->working_directory);
440 FDConnectTimeout = director->FDConnectTimeout;
441 SDConnectTimeout = director->SDConnectTimeout;
442 Dmsg0(0, "Director's configuration file reread.\n");
444 /* Now release saved resources, if no jobs using the resources */
446 free_saved_resources(table);
452 sigprocmask(SIG_UNBLOCK, &set, NULL);
453 signal(SIGHUP, reload_config);
454 already_here = false;
458 * Make a quick check to see that we have all the
461 * **** FIXME **** this routine could be a lot more
462 * intelligent and comprehensive.
464 static int check_resources()
471 job = (JOB *)GetNextRes(R_JOB, NULL);
472 director = (DIRRES *)GetNextRes(R_DIRECTOR, NULL);
474 Jmsg(NULL, M_FATAL, 0, _("No Director resource defined in %s\n"
475 "Without that I don't know who I am :-(\n"), configfile);
478 set_working_directory(director->working_directory);
479 if (!director->messages) { /* If message resource not specified */
480 director->messages = (MSGS *)GetNextRes(R_MSGS, NULL);
481 if (!director->messages) {
482 Jmsg(NULL, M_FATAL, 0, _("No Messages resource defined in %s\n"), configfile);
486 if (GetNextRes(R_DIRECTOR, (RES *)director) != NULL) {
487 Jmsg(NULL, M_FATAL, 0, _("Only one Director resource permitted in %s\n"),
491 /* tls_require implies tls_enable */
492 if (director->tls_require) {
494 director->tls_enable = true;
496 Jmsg(NULL, M_FATAL, 0, _("TLS required but not configured in Bacula.\n"));
501 if (!director->tls_certfile && director->tls_enable) {
502 Jmsg(NULL, M_FATAL, 0, _("\"TLS Certificate\" file not defined for Director \"%s\" in %s.\n"),
503 director->hdr.name, configfile);
507 if (!director->tls_keyfile && director->tls_enable) {
508 Jmsg(NULL, M_FATAL, 0, _("\"TLS Key\" file not defined for Director \"%s\" in %s.\n"),
509 director->hdr.name, configfile);
513 if ((!director->tls_ca_certfile && !director->tls_ca_certdir) && director->tls_enable && director->tls_verify_peer) {
514 Jmsg(NULL, M_FATAL, 0, _("Neither \"TLS CA Certificate\" or \"TLS CA"
515 " Certificate Dir\" are defined for Director \"%s\" in %s."
516 " At least one CA certificate store is required"
517 " when using \"TLS Verify Peer\".\n"),
518 director->hdr.name, configfile);
522 /* If everything is well, attempt to initialize our per-resource TLS context */
523 if (OK && (director->tls_enable || director->tls_require)) {
524 /* Initialize TLS context:
525 * Args: CA certfile, CA certdir, Certfile, Keyfile,
526 * Keyfile PEM Callback, Keyfile CB Userdata, DHfile, Verify Peer */
527 director->tls_ctx = new_tls_context(director->tls_ca_certfile,
528 director->tls_ca_certdir, director->tls_certfile,
529 director->tls_keyfile, NULL, NULL, director->tls_dhfile,
530 director->tls_verify_peer);
532 if (!director->tls_ctx) {
533 Jmsg(NULL, M_FATAL, 0, _("Failed to initialize TLS context for Director \"%s\" in %s.\n"),
534 director->hdr.name, configfile);
541 Jmsg(NULL, M_FATAL, 0, _("No Job records defined in %s\n"), configfile);
544 foreach_res(job, R_JOB) {
548 /* Handle Storage alists specifically */
549 JOB *jobdefs = job->jobdefs;
550 if (jobdefs->storage && !job->storage) {
552 job->storage = New(alist(10, not_owned_by_alist));
553 foreach_alist(st, jobdefs->storage) {
554 job->storage->append(st);
558 /* Transfer default items from JobDefs Resource */
559 for (i=0; job_items[i].name; i++) {
560 char **def_svalue, **svalue; /* string value */
561 int *def_ivalue, *ivalue; /* integer value */
562 bool *def_bvalue, *bvalue; /* bool value */
563 int64_t *def_lvalue, *lvalue; /* 64 bit values */
566 Dmsg4(1400, "Job \"%s\", field \"%s\" bit=%d def=%d\n",
567 job->hdr.name, job_items[i].name,
568 bit_is_set(i, job->hdr.item_present),
569 bit_is_set(i, job->jobdefs->hdr.item_present));
571 if (!bit_is_set(i, job->hdr.item_present) &&
572 bit_is_set(i, job->jobdefs->hdr.item_present)) {
573 Dmsg2(400, "Job \"%s\", field \"%s\": getting default.\n",
574 job->hdr.name, job_items[i].name);
575 offset = (char *)(job_items[i].value) - (char *)&res_all;
577 * Handle strings and directory strings
579 if (job_items[i].handler == store_str ||
580 job_items[i].handler == store_dir) {
581 def_svalue = (char **)((char *)(job->jobdefs) + offset);
582 Dmsg5(400, "Job \"%s\", field \"%s\" def_svalue=%s item %d offset=%u\n",
583 job->hdr.name, job_items[i].name, *def_svalue, i, offset);
584 svalue = (char **)((char *)job + offset);
586 Pmsg1(000, _("Hey something is wrong. p=0x%lu\n"), *svalue);
588 *svalue = bstrdup(*def_svalue);
589 set_bit(i, job->hdr.item_present);
593 } else if (job_items[i].handler == store_res) {
594 def_svalue = (char **)((char *)(job->jobdefs) + offset);
595 Dmsg4(400, "Job \"%s\", field \"%s\" item %d offset=%u\n",
596 job->hdr.name, job_items[i].name, i, offset);
597 svalue = (char **)((char *)job + offset);
599 Pmsg1(000, _("Hey something is wrong. p=0x%lu\n"), *svalue);
601 *svalue = *def_svalue;
602 set_bit(i, job->hdr.item_present);
604 * Handle alist resources
606 } else if (job_items[i].handler == store_alist_res) {
607 if (bit_is_set(i, job->jobdefs->hdr.item_present)) {
608 set_bit(i, job->hdr.item_present);
611 * Handle integer fields
612 * Note, our store_bit does not handle bitmaped fields
614 } else if (job_items[i].handler == store_bit ||
615 job_items[i].handler == store_pint ||
616 job_items[i].handler == store_jobtype ||
617 job_items[i].handler == store_level ||
618 job_items[i].handler == store_pint ||
619 job_items[i].handler == store_replace) {
620 def_ivalue = (int *)((char *)(job->jobdefs) + offset);
621 Dmsg5(400, "Job \"%s\", field \"%s\" def_ivalue=%d item %d offset=%u\n",
622 job->hdr.name, job_items[i].name, *def_ivalue, i, offset);
623 ivalue = (int *)((char *)job + offset);
624 *ivalue = *def_ivalue;
625 set_bit(i, job->hdr.item_present);
627 * Handle 64 bit integer fields
629 } else if (job_items[i].handler == store_time ||
630 job_items[i].handler == store_size ||
631 job_items[i].handler == store_int64) {
632 def_lvalue = (int64_t *)((char *)(job->jobdefs) + offset);
633 Dmsg5(400, "Job \"%s\", field \"%s\" def_lvalue=%" lld " item %d offset=%u\n",
634 job->hdr.name, job_items[i].name, *def_lvalue, i, offset);
635 lvalue = (int64_t *)((char *)job + offset);
636 *lvalue = *def_lvalue;
637 set_bit(i, job->hdr.item_present);
641 } else if (job_items[i].handler == store_bool) {
642 def_bvalue = (bool *)((char *)(job->jobdefs) + offset);
643 Dmsg5(400, "Job \"%s\", field \"%s\" def_bvalue=%d item %d offset=%u\n",
644 job->hdr.name, job_items[i].name, *def_bvalue, i, offset);
645 bvalue = (bool *)((char *)job + offset);
646 *bvalue = *def_bvalue;
647 set_bit(i, job->hdr.item_present);
653 * Ensure that all required items are present
655 for (i=0; job_items[i].name; i++) {
656 if (job_items[i].flags & ITEM_REQUIRED) {
657 if (!bit_is_set(i, job->hdr.item_present)) {
658 Jmsg(NULL, M_FATAL, 0, _("\"%s\" directive in Job \"%s\" resource is required, but not found.\n"),
659 job_items[i].name, job->hdr.name);
663 /* If this triggers, take a look at lib/parse_conf.h */
664 if (i >= MAX_RES_ITEMS) {
665 Emsg0(M_ERROR_TERM, 0, _("Too many items in Job resource\n"));
668 } /* End loop over Job res */
670 /* Loop over databases */
672 foreach_res(catalog, R_CATALOG) {
675 * Make sure we can open catalog, otherwise print a warning
676 * message because the server is probably not running.
678 db = db_init_database(NULL, catalog->db_name, catalog->db_user,
679 catalog->db_password, catalog->db_address,
680 catalog->db_port, catalog->db_socket,
681 catalog->mult_db_connections);
682 if (!db || !db_open_database(NULL, db)) {
683 Jmsg(NULL, M_FATAL, 0, _("Could not open database \"%s\".\n"),
686 Jmsg(NULL, M_FATAL, 0, _("%s"), db_strerror(db));
692 /* Loop over all pools, defining/updating them in each database */
694 foreach_res(pool, R_POOL) {
695 create_pool(NULL, db, pool, POOL_OP_UPDATE); /* update request */
699 foreach_res(store, R_STORAGE) {
702 if (store->media_type) {
703 bstrncpy(mr.MediaType, store->media_type, sizeof(mr.MediaType));
705 db_create_mediatype_record(NULL, db, &mr);
709 bstrncpy(sr.Name, store->name(), sizeof(sr.Name));
710 sr.AutoChanger = store->autochanger;
711 db_create_storage_record(NULL, db, &sr);
712 store->StorageId = sr.StorageId; /* set storage Id */
713 if (!sr.created) { /* if not created, update it */
714 db_update_storage_record(NULL, db, &sr);
717 /* tls_require implies tls_enable */
718 if (store->tls_require) {
720 store->tls_enable = true;
722 Jmsg(NULL, M_FATAL, 0, _("TLS required but not configured in Bacula.\n"));
727 if ((!store->tls_ca_certfile && !store->tls_ca_certdir) && store->tls_enable) {
728 Jmsg(NULL, M_FATAL, 0, _("Neither \"TLS CA Certificate\""
729 " or \"TLS CA Certificate Dir\" are defined for Storage \"%s\" in %s.\n"),
730 store->hdr.name, configfile);
734 /* If everything is well, attempt to initialize our per-resource TLS context */
735 if (OK && (store->tls_enable || store->tls_require)) {
736 /* Initialize TLS context:
737 * Args: CA certfile, CA certdir, Certfile, Keyfile,
738 * Keyfile PEM Callback, Keyfile CB Userdata, DHfile, Verify Peer */
739 store->tls_ctx = new_tls_context(store->tls_ca_certfile,
740 store->tls_ca_certdir, store->tls_certfile,
741 store->tls_keyfile, NULL, NULL, NULL, true);
743 if (!store->tls_ctx) {
744 Jmsg(NULL, M_FATAL, 0, _("Failed to initialize TLS context for Storage \"%s\" in %s.\n"),
745 store->hdr.name, configfile);
751 /* Loop over all counters, defining them in each database */
752 /* Set default value in all counters */
754 foreach_res(counter, R_COUNTER) {
755 /* Write to catalog? */
756 if (!counter->created && counter->Catalog == catalog) {
758 bstrncpy(cr.Counter, counter->hdr.name, sizeof(cr.Counter));
759 cr.MinValue = counter->MinValue;
760 cr.MaxValue = counter->MaxValue;
761 cr.CurrentValue = counter->MinValue;
762 if (counter->WrapCounter) {
763 bstrncpy(cr.WrapCounter, counter->WrapCounter->hdr.name, sizeof(cr.WrapCounter));
765 cr.WrapCounter[0] = 0; /* empty string */
767 if (db_create_counter_record(NULL, db, &cr)) {
768 counter->CurrentValue = cr.CurrentValue;
769 counter->created = true;
770 Dmsg2(100, "Create counter %s val=%d\n", counter->hdr.name, counter->CurrentValue);
773 if (!counter->created) {
774 counter->CurrentValue = counter->MinValue; /* default value */
777 db_close_database(NULL, db);
780 /* Loop over Consoles */
782 foreach_res(cons, R_CONSOLE) {
783 /* tls_require implies tls_enable */
784 if (cons->tls_require) {
786 cons->tls_enable = true;
788 Jmsg(NULL, M_FATAL, 0, _("TLS required but not configured in Bacula.\n"));
794 if (!cons->tls_certfile && cons->tls_enable) {
795 Jmsg(NULL, M_FATAL, 0, _("\"TLS Certificate\" file not defined for Console \"%s\" in %s.\n"),
796 cons->hdr.name, configfile);
800 if (!cons->tls_keyfile && cons->tls_enable) {
801 Jmsg(NULL, M_FATAL, 0, _("\"TLS Key\" file not defined for Console \"%s\" in %s.\n"),
802 cons->hdr.name, configfile);
806 if ((!cons->tls_ca_certfile && !cons->tls_ca_certdir) && cons->tls_enable && cons->tls_verify_peer) {
807 Jmsg(NULL, M_FATAL, 0, _("Neither \"TLS CA Certificate\" or \"TLS CA"
808 " Certificate Dir\" are defined for Console \"%s\" in %s."
809 " At least one CA certificate store is required"
810 " when using \"TLS Verify Peer\".\n"),
811 cons->hdr.name, configfile);
814 /* If everything is well, attempt to initialize our per-resource TLS context */
815 if (OK && (cons->tls_enable || cons->tls_require)) {
816 /* Initialize TLS context:
817 * Args: CA certfile, CA certdir, Certfile, Keyfile,
818 * Keyfile PEM Callback, Keyfile CB Userdata, DHfile, Verify Peer */
819 cons->tls_ctx = new_tls_context(cons->tls_ca_certfile,
820 cons->tls_ca_certdir, cons->tls_certfile,
821 cons->tls_keyfile, NULL, NULL, cons->tls_dhfile, cons->tls_verify_peer);
823 if (!cons->tls_ctx) {
824 Jmsg(NULL, M_FATAL, 0, _("Failed to initialize TLS context for File daemon \"%s\" in %s.\n"),
825 cons->hdr.name, configfile);
832 /* Loop over Clients */
834 foreach_res(client, R_CLIENT) {
835 /* tls_require implies tls_enable */
836 if (client->tls_require) {
838 client->tls_enable = true;
840 Jmsg(NULL, M_FATAL, 0, _("TLS required but not configured in Bacula.\n"));
846 if ((!client->tls_ca_certfile && !client->tls_ca_certdir) && client->tls_enable) {
847 Jmsg(NULL, M_FATAL, 0, _("Neither \"TLS CA Certificate\""
848 " or \"TLS CA Certificate Dir\" are defined for File daemon \"%s\" in %s.\n"),
849 client->hdr.name, configfile);
853 /* If everything is well, attempt to initialize our per-resource TLS context */
854 if (OK && (client->tls_enable || client->tls_require)) {
855 /* Initialize TLS context:
856 * Args: CA certfile, CA certdir, Certfile, Keyfile,
857 * Keyfile PEM Callback, Keyfile CB Userdata, DHfile, Verify Peer */
858 client->tls_ctx = new_tls_context(client->tls_ca_certfile,
859 client->tls_ca_certdir, client->tls_certfile,
860 client->tls_keyfile, NULL, NULL, NULL,
863 if (!client->tls_ctx) {
864 Jmsg(NULL, M_FATAL, 0, _("Failed to initialize TLS context for File daemon \"%s\" in %s.\n"),
865 client->hdr.name, configfile);
873 close_msg(NULL); /* close temp message handler */
874 init_msg(NULL, director->messages); /* open daemon message handler */