2 * Bacula File Daemon Job processing
4 * Kern Sibbald, October MM
10 Copyright (C) 2000-2004 Kern Sibbald and John Walker
12 This program is free software; you can redistribute it and/or
13 modify it under the terms of the GNU General Public License as
14 published by the Free Software Foundation; either version 2 of
15 the License, or (at your option) any later version.
17 This program is distributed in the hope that it will be useful,
18 but WITHOUT ANY WARRANTY; without even the implied warranty of
19 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
20 General Public License for more details.
22 You should have received a copy of the GNU General Public
23 License along with this program; if not, write to the Free
24 Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
32 extern char my_name[];
33 extern CLIENT *me; /* our client resource */
35 /* Imported functions */
36 extern int status_cmd(JCR *jcr);
37 extern int qstatus_cmd(JCR *jcr);
39 /* Forward referenced functions */
40 static int backup_cmd(JCR *jcr);
41 static int bootstrap_cmd(JCR *jcr);
42 static int cancel_cmd(JCR *jcr);
43 static int setdebug_cmd(JCR *jcr);
44 static int estimate_cmd(JCR *jcr);
45 static int exclude_cmd(JCR *jcr);
46 static int hello_cmd(JCR *jcr);
47 static int job_cmd(JCR *jcr);
48 static int include_cmd(JCR *jcr);
49 static int fileset_cmd(JCR *jcr);
50 static int level_cmd(JCR *jcr);
51 static int verify_cmd(JCR *jcr);
52 static int restore_cmd(JCR *jcr);
53 static int storage_cmd(JCR *jcr);
54 static int session_cmd(JCR *jcr);
55 static int response(JCR *jcr, BSOCK *sd, char *resp, const char *cmd);
56 static void filed_free_jcr(JCR *jcr);
57 static int open_sd_read_session(JCR *jcr);
58 static int send_bootstrap_file(JCR *jcr);
59 static int runbefore_cmd(JCR *jcr);
60 static int runafter_cmd(JCR *jcr);
61 static int run_cmd(JCR *jcr, char *cmd, const char *name);
62 static void set_options(findFOPTS *fo, const char *opts);
65 /* Exported functions */
70 int monitoraccess; /* specify if monitors have access to this function */
74 * The following are the recognized commands from the Director.
76 static struct s_cmds cmds[] = {
77 {"backup", backup_cmd, 0},
78 {"cancel", cancel_cmd, 0},
79 {"setdebug=", setdebug_cmd, 0},
80 {"estimate", estimate_cmd, 0},
81 {"exclude", exclude_cmd, 0},
82 {"Hello", hello_cmd, 1},
83 {"include", include_cmd, 0},
84 {"fileset", fileset_cmd, 0},
85 {"JobId=", job_cmd, 0},
86 {"level = ", level_cmd, 0},
87 {"restore", restore_cmd, 0},
88 {"session", session_cmd, 0},
89 {"status", status_cmd, 1},
90 {".status", qstatus_cmd, 1},
91 {"storage ", storage_cmd, 0},
92 {"verify", verify_cmd, 0},
93 {"bootstrap", bootstrap_cmd, 0},
94 {"RunBeforeJob", runbefore_cmd, 0},
95 {"RunAfterJob", runafter_cmd, 0},
96 {NULL, NULL} /* list terminator */
99 /* Commands received from director that need scanning */
100 static char jobcmd[] = "JobId=%d Job=%127s SDid=%d SDtime=%d Authorization=%100s";
101 static char storaddr[] = "storage address=%s port=%d ssl=%d\n";
102 static char sessioncmd[] = "session %127s %ld %ld %ld %ld %ld %ld\n";
103 static char restorecmd[] = "restore replace=%c prelinks=%d where=%s\n";
104 static char restorecmd1[] = "restore replace=%c prelinks=%d where=\n";
105 static char verifycmd[] = "verify level=%30s\n";
106 static char estimatecmd[] = "estimate listing=%d\n";
107 static char runbefore[] = "RunBeforeJob %s\n";
108 static char runafter[] = "RunAfterJob %s\n";
110 /* Responses sent to Director */
111 static char errmsg[] = "2999 Invalid command\n";
112 static char no_auth[] = "2998 No Authorization\n";
113 static char illegal_cmd[] = "2997 Illegal command for a Director with Monitor directive enabled\n";
114 static char OKinc[] = "2000 OK include\n";
115 static char OKest[] = "2000 OK estimate files=%u bytes=%s\n";
116 static char OKexc[] = "2000 OK exclude\n";
117 static char OKlevel[] = "2000 OK level\n";
118 static char OKbackup[] = "2000 OK backup\n";
119 static char OKbootstrap[] = "2000 OK bootstrap\n";
120 static char OKverify[] = "2000 OK verify\n";
121 static char OKrestore[] = "2000 OK restore\n";
122 static char OKsession[] = "2000 OK session\n";
123 static char OKstore[] = "2000 OK storage\n";
124 static char OKjob[] = "2000 OK Job %s,%s,%s";
125 static char OKsetdebug[] = "2000 OK setdebug=%d\n";
126 static char BADjob[] = "2901 Bad Job\n";
127 static char EndJob[] = "2800 End Job TermCode=%d JobFiles=%u ReadBytes=%s JobBytes=%s Errors=%u\n";
128 static char OKRunBefore[] = "2000 OK RunBefore\n";
129 static char OKRunAfter[] = "2000 OK RunAfter\n";
131 /* Responses received from Storage Daemon */
132 static char OK_end[] = "3000 OK end\n";
133 static char OK_close[] = "3000 OK close Status = %d\n";
134 static char OK_open[] = "3000 OK open ticket = %d\n";
135 static char OK_data[] = "3000 OK data\n";
136 static char OK_append[] = "3000 OK append data\n";
137 static char OKSDbootstrap[] = "3000 OK bootstrap\n";
140 /* Commands sent to Storage Daemon */
141 static char append_open[] = "append open session\n";
142 static char append_data[] = "append data %d\n";
143 static char append_end[] = "append end session %d\n";
144 static char append_close[] = "append close session %d\n";
145 static char read_open[] = "read open session = %s %ld %ld %ld %ld %ld %ld\n";
146 static char read_data[] = "read data %d\n";
147 static char read_close[] = "read close session %d\n";
150 * Accept requests from a Director
152 * NOTE! We are running as a separate thread
154 * Send output one line
155 * at a time followed by a zero length transmission.
157 * Return when the connection is terminated or there
160 * Basic task here is:
161 * Authenticate Director (during Hello command).
162 * Accept commands one at a time from the Director
166 void *handle_client_request(void *dirp)
171 BSOCK *dir = (BSOCK *)dirp;
173 jcr = new_jcr(sizeof(JCR), filed_free_jcr); /* create JCR */
174 jcr->dir_bsock = dir;
175 jcr->ff = init_find_files();
176 jcr->start_time = time(NULL);
177 jcr->last_fname = get_pool_memory(PM_FNAME);
178 jcr->last_fname[0] = 0;
179 jcr->client_name = get_memory(strlen(my_name) + 1);
180 pm_strcpy(jcr->client_name, my_name);
182 enable_backup_privileges(NULL, 1 /* ignore_errors */);
184 /**********FIXME******* add command handler error code */
186 for (quit=false; !quit;) {
189 if (bnet_recv(dir) < 0) {
190 break; /* connection terminated */
192 dir->msg[dir->msglen] = 0;
193 Dmsg1(100, "<dird: %s", dir->msg);
195 for (i=0; cmds[i].cmd; i++) {
196 if (strncmp(cmds[i].cmd, dir->msg, strlen(cmds[i].cmd)) == 0) {
197 found = true; /* indicate command found */
198 if (!jcr->authenticated && cmds[i].func != hello_cmd) {
199 bnet_fsend(dir, no_auth);
200 bnet_sig(dir, BNET_EOD);
203 if ((jcr->authenticated) && (!cmds[i].monitoraccess) && (jcr->director->monitor)) {
204 Dmsg1(100, "Command %s illegal.\n", cmds[i].cmd);
205 bnet_fsend(dir, illegal_cmd);
206 bnet_sig(dir, BNET_EOD);
209 Dmsg1(100, "Executing %s command.\n", cmds[i].cmd);
210 if (!cmds[i].func(jcr)) { /* do command */
211 quit = true; /* error or fully terminated, get out */
212 Dmsg0(20, "Quit command loop due to command error or Job done.\n");
217 if (!found) { /* command not found */
218 bnet_fsend(dir, errmsg);
224 /* Inform Storage daemon that we are done */
225 if (jcr->store_bsock) {
226 bnet_sig(jcr->store_bsock, BNET_TERMINATE);
229 if (jcr->RunAfterJob && !job_canceled(jcr)) {
230 run_cmd(jcr, jcr->RunAfterJob, "ClientRunAfterJob");
232 dequeue_messages(jcr); /* send any queued messages */
234 /* Inform Director that we are done */
235 bnet_sig(dir, BNET_TERMINATE);
237 /* Clean up fileset */
238 FF_PKT *ff = (FF_PKT *)jcr->ff;
239 findFILESET *fileset = ff->fileset;
242 /* Delete FileSet Include lists */
243 for (i=0; i<fileset->include_list.size(); i++) {
244 findINCEXE *incexe = (findINCEXE *)fileset->include_list.get(i);
245 for (j=0; j<incexe->opts_list.size(); j++) {
246 findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j);
247 for (k=0; k<fo->regex.size(); k++) {
248 regfree((regex_t *)fo->regex.get(k));
253 fo->fstype.destroy();
261 incexe->opts_list.destroy();
262 incexe->name_list.destroy();
264 fileset->include_list.destroy();
266 /* Delete FileSet Exclude lists */
267 for (i=0; i<fileset->exclude_list.size(); i++) {
268 findINCEXE *incexe = (findINCEXE *)fileset->exclude_list.get(i);
269 for (j=0; j<incexe->opts_list.size(); j++) {
270 findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j);
274 fo->fstype.destroy();
276 incexe->opts_list.destroy();
277 incexe->name_list.destroy();
279 fileset->exclude_list.destroy();
282 Dmsg0(100, "Calling term_find_files\n");
283 term_find_files((FF_PKT *)jcr->ff);
284 Dmsg0(100, "Done with term_find_files\n");
285 free_jcr(jcr); /* destroy JCR record */
286 Dmsg0(100, "Done with free_jcr\n");
291 * Hello from Director he must identify himself and provide his
294 static int hello_cmd(JCR *jcr)
296 Dmsg0(120, "Calling Authenticate\n");
297 if (!authenticate_director(jcr)) {
300 Dmsg0(120, "OK Authenticate\n");
301 jcr->authenticated = true;
308 static int cancel_cmd(JCR *jcr)
310 BSOCK *dir = jcr->dir_bsock;
311 char Job[MAX_NAME_LENGTH];
314 if (sscanf(dir->msg, "cancel Job=%127s", Job) == 1) {
315 if (!(cjcr=get_jcr_by_full_name(Job))) {
316 bnet_fsend(dir, "2901 Job %s not found.\n", Job);
318 if (cjcr->store_bsock) {
320 cjcr->store_bsock->timed_out = 1;
321 cjcr->store_bsock->terminated = 1;
323 * #if !defined(HAVE_CYGWIN) && !defined(HAVE_WIN32)
325 #if !defined(HAVE_CYGWIN)
326 pthread_kill(cjcr->my_thread_id, TIMEOUT_SIGNAL);
330 set_jcr_job_status(cjcr, JS_Canceled);
332 bnet_fsend(dir, _("2001 Job %s marked to be canceled.\n"), Job);
335 bnet_fsend(dir, _("2902 Error scanning cancel command.\n"));
337 bnet_sig(dir, BNET_EOD);
343 * Set debug level as requested by the Director
346 static int setdebug_cmd(JCR *jcr)
348 BSOCK *dir = jcr->dir_bsock;
349 int level, trace_flag;
351 Dmsg1(110, "setdebug_cmd: %s", dir->msg);
352 if (sscanf(dir->msg, "setdebug=%d trace=%d", &level, &trace_flag) != 2 || level < 0) {
353 pm_strcpy(jcr->errmsg, dir->msg);
354 bnet_fsend(dir, "2991 Bad setdebug command: %s\n", jcr->errmsg);
358 set_trace(trace_flag);
359 return bnet_fsend(dir, OKsetdebug, level);
363 static int estimate_cmd(JCR *jcr)
365 BSOCK *dir = jcr->dir_bsock;
368 if (sscanf(dir->msg, estimatecmd, &jcr->listing) != 1) {
369 pm_strcpy(jcr->errmsg, dir->msg);
370 Jmsg(jcr, M_FATAL, 0, _("Bad estimate command: %s"), jcr->errmsg);
371 bnet_fsend(dir, "2992 Bad estimate command.\n");
375 bnet_fsend(dir, OKest, jcr->num_files_examined,
376 edit_uint64_with_commas(jcr->JobBytes, ed2));
377 bnet_sig(dir, BNET_EOD);
382 * Get JobId and Storage Daemon Authorization key from Director
384 static int job_cmd(JCR *jcr)
386 BSOCK *dir = jcr->dir_bsock;
387 POOLMEM *sd_auth_key;
389 sd_auth_key = get_memory(dir->msglen);
390 if (sscanf(dir->msg, jobcmd, &jcr->JobId, jcr->Job,
391 &jcr->VolSessionId, &jcr->VolSessionTime,
393 pm_strcpy(jcr->errmsg, dir->msg);
394 Jmsg(jcr, M_FATAL, 0, _("Bad Job Command: %s"), jcr->errmsg);
395 bnet_fsend(dir, BADjob);
396 free_pool_memory(sd_auth_key);
399 jcr->sd_auth_key = bstrdup(sd_auth_key);
400 free_pool_memory(sd_auth_key);
401 Dmsg2(120, "JobId=%d Auth=%s\n", jcr->JobId, jcr->sd_auth_key);
402 return bnet_fsend(dir, OKjob, HOST_OS, DISTNAME, DISTVER);
405 static int runbefore_cmd(JCR *jcr)
408 BSOCK *dir = jcr->dir_bsock;
409 POOLMEM *cmd = get_memory(dir->msglen+1);
411 Dmsg1(100, "runbefore_cmd: %s", dir->msg);
412 if (sscanf(dir->msg, runbefore, cmd) != 1) {
413 pm_strcpy(jcr->errmsg, dir->msg);
414 Jmsg1(jcr, M_FATAL, 0, _("Bad RunBeforeJob command: %s\n"), jcr->errmsg);
415 bnet_fsend(dir, "2905 Bad RunBeforeJob command.\n");
421 /* Run the command now */
422 stat = run_cmd(jcr, cmd, "ClientRunBeforeJob");
425 bnet_fsend(dir, OKRunBefore);
428 bnet_fsend(dir, "2905 Bad RunBeforeJob command.\n");
433 static int runafter_cmd(JCR *jcr)
435 BSOCK *dir = jcr->dir_bsock;
436 POOLMEM *msg = get_memory(dir->msglen+1);
438 Dmsg1(100, "runafter_cmd: %s", dir->msg);
439 if (sscanf(dir->msg, runafter, msg) != 1) {
440 pm_strcpy(jcr->errmsg, dir->msg);
441 Jmsg1(jcr, M_FATAL, 0, _("Bad RunAfter command: %s\n"), jcr->errmsg);
442 bnet_fsend(dir, "2905 Bad RunAfterJob command.\n");
447 if (jcr->RunAfterJob) {
448 free_pool_memory(jcr->RunAfterJob);
450 jcr->RunAfterJob = get_pool_memory(PM_FNAME);
451 pm_strcpy(jcr->RunAfterJob, msg);
452 free_pool_memory(msg);
453 return bnet_fsend(dir, OKRunAfter);
456 static int run_cmd(JCR *jcr, char *cmd, const char *name)
458 POOLMEM *ecmd = get_pool_memory(PM_FNAME);
461 char line[MAXSTRING];
463 ecmd = edit_job_codes(jcr, ecmd, cmd, "");
464 bpipe = open_bpipe(ecmd, 0, "r");
465 free_pool_memory(ecmd);
467 Jmsg(jcr, M_FATAL, 0, _("%s could not execute\n"), name);
468 set_jcr_job_status(jcr, JS_FatalError);
471 while (fgets(line, sizeof(line), bpipe->rfd)) {
472 Jmsg(jcr, M_INFO, 0, _("%s: %s"), name, line);
474 status = close_bpipe(bpipe);
476 Jmsg(jcr, M_FATAL, 0, _("%s returned non-zero status=%d\n"), name,
478 set_jcr_job_status(jcr, JS_FatalError);
488 static void add_fname_to_list(JCR *jcr, char *fname, int list)
498 /* Skip leading options -- currently ignored */
499 for (p=fname; *p && *p != ' '; p++)
501 /* Skip spaces, and q points to first space */
502 for (q=NULL; *p && *p == ' '; p++) {
510 p++; /* skip over | */
511 fn = get_pool_memory(PM_FNAME);
512 fn = edit_job_codes(jcr, fn, p, "");
513 bpipe = open_bpipe(fn, 0, "r");
514 free_pool_memory(fn);
516 Jmsg(jcr, M_FATAL, 0, _("Cannot run program: %s. ERR=%s\n"),
520 /* Copy File options */
521 if (list == INC_LIST) {
522 *q = 0; /* terminate options */
525 optlen = strlen(buf);
529 while (fgets(buf+optlen, sizeof(buf)-optlen, bpipe->rfd)) {
530 strip_trailing_junk(buf);
531 if (list == INC_LIST) {
532 add_fname_to_include_list((FF_PKT *)jcr->ff, 1, buf);
534 add_fname_to_exclude_list((FF_PKT *)jcr->ff, buf);
537 if ((stat=close_bpipe(bpipe)) != 0) {
538 Jmsg(jcr, M_FATAL, 0, _("Error running program: %s. RtnStat=%d ERR=%s\n"),
539 p, stat, strerror(errno));
544 p++; /* skip over < */
545 if ((ffd = fopen(p, "r")) == NULL) {
547 Jmsg(jcr, M_FATAL, 0, _("Cannot open %s file: %s. ERR=%s\n"),
548 list==INC_LIST?"included":"excluded", p, be.strerror());
551 /* Copy File options */
552 if (list == INC_LIST) {
553 *q = 0; /* terminate options */
556 optlen = strlen(buf);
560 while (fgets(buf+optlen, sizeof(buf)-optlen, ffd)) {
561 strip_trailing_junk(buf);
562 if (list == INC_LIST) {
563 add_fname_to_include_list((FF_PKT *)jcr->ff, 1, buf);
565 add_fname_to_exclude_list((FF_PKT *)jcr->ff, buf);
571 if (list == INC_LIST) {
572 add_fname_to_include_list((FF_PKT *)jcr->ff, 1, fname);
574 add_fname_to_exclude_list((FF_PKT *)jcr->ff, p);
582 * Get list of files/directories to include from Director
585 static int include_cmd(JCR *jcr)
587 BSOCK *dir = jcr->dir_bsock;
589 while (bnet_recv(dir) >= 0) {
590 dir->msg[dir->msglen] = 0;
591 strip_trailing_junk(dir->msg);
592 Dmsg1(010, "include file: %s\n", dir->msg);
593 add_fname_to_list(jcr, dir->msg, INC_LIST);
596 return bnet_fsend(dir, OKinc);
599 static bool init_fileset(JCR *jcr)
602 findFILESET *fileset;
607 ff = (FF_PKT *)jcr->ff;
611 fileset = (findFILESET *)malloc(sizeof(findFILESET));
612 memset(fileset, 0, sizeof(findFILESET));
613 ff->fileset = fileset;
614 fileset->state = state_none;
615 fileset->include_list.init(1, true);
616 fileset->exclude_list.init(1, true);
620 static findFOPTS *start_options(FF_PKT *ff)
622 int state = ff->fileset->state;
623 findINCEXE *incexe = ff->fileset->incexe;
625 if (state != state_options) {
626 ff->fileset->state = state_options;
627 findFOPTS *fo = (findFOPTS *)malloc(sizeof(findFOPTS));
628 memset(fo, 0, sizeof(findFOPTS));
629 fo->regex.init(1, true);
630 fo->wild.init(1, true);
631 fo->base.init(1, true);
632 fo->fstype.init(1, true);
633 incexe->current_opts = fo;
634 incexe->opts_list.append(fo);
636 return incexe->current_opts;
641 * Add fname to include/exclude fileset list. First check for
642 * | and < and if necessary perform command.
644 static void add_file_to_fileset(JCR *jcr, const char *fname, findFILESET *fileset)
656 p++; /* skip over | */
657 fn = get_pool_memory(PM_FNAME);
658 fn = edit_job_codes(jcr, fn, p, "");
659 bpipe = open_bpipe(fn, 0, "r");
660 free_pool_memory(fn);
662 Jmsg(jcr, M_FATAL, 0, _("Cannot run program: %s. ERR=%s\n"),
666 while (fgets(buf, sizeof(buf), bpipe->rfd)) {
667 strip_trailing_junk(buf);
668 fileset->incexe->name_list.append(bstrdup(buf));
670 if ((stat=close_bpipe(bpipe)) != 0) {
671 Jmsg(jcr, M_FATAL, 0, _("Error running program: %s. RtnStat=%d ERR=%s\n"),
672 p, stat, strerror(errno));
677 p++; /* skip over < */
678 if ((ffd = fopen(p, "r")) == NULL) {
680 Jmsg(jcr, M_FATAL, 0, _("Cannot open FileSet input file: %s. ERR=%s\n"),
684 while (fgets(buf, sizeof(buf), ffd)) {
685 strip_trailing_junk(buf);
686 fileset->incexe->name_list.append(bstrdup(buf));
691 fileset->incexe->name_list.append(bstrdup(fname));
697 static void add_fileset(JCR *jcr, const char *item)
699 FF_PKT *ff = (FF_PKT *)jcr->ff;
700 findFILESET *fileset = ff->fileset;
701 int state = fileset->state;
702 findFOPTS *current_opts;
704 Dmsg1(100, "%s\n", item);
706 if (item[1] == ' ') { /* If string follows */
707 item += 2; /* point to string */
710 if (state == state_error) {
716 fileset->incexe = (findINCEXE *)malloc(sizeof(findINCEXE));
717 memset(fileset->incexe, 0, sizeof(findINCEXE));
718 fileset->incexe->opts_list.init(1, true);
719 fileset->incexe->name_list.init(1, true);
720 fileset->include_list.append(fileset->incexe);
724 fileset->incexe = (findINCEXE *)malloc(sizeof(findINCEXE));
725 memset(fileset->incexe, 0, sizeof(findINCEXE));
726 fileset->incexe->opts_list.init(1, true);
727 fileset->incexe->name_list.init(1, true);
728 fileset->exclude_list.append(fileset->incexe);
734 /* File item to either include/include list */
735 state = state_include;
736 add_file_to_fileset(jcr, item, fileset);
739 current_opts = start_options(ff);
743 preg = (regex_t *)malloc(sizeof(regex_t));
744 if (current_opts->flags & FO_IGNORECASE) {
745 rc = regcomp(preg, item, REG_EXTENDED|REG_ICASE);
747 rc = regcomp(preg, item, REG_EXTENDED);
750 regerror(rc, preg, prbuf, sizeof(prbuf));
753 Jmsg(jcr, M_FATAL, 0, "REGEX %s compile error. ERR=%s\n", item, prbuf);
757 current_opts->regex.append(preg);
758 state = state_options;
761 current_opts = start_options(ff);
762 current_opts->base.append(bstrdup(item));
763 state = state_options;
766 current_opts = start_options(ff);
767 current_opts->fstype.append(bstrdup(item));
768 state = state_options;
771 current_opts = start_options(ff);
772 current_opts->wild.append(bstrdup(item));
773 state = state_options;
776 current_opts = start_options(ff);
777 set_options(current_opts, item);
778 state = state_options;
781 current_opts = start_options(ff);
782 current_opts->reader = bstrdup(item);
783 state = state_options;
786 current_opts = start_options(ff);
787 current_opts->writer = bstrdup(item);
788 state = state_options;
791 Jmsg(jcr, M_FATAL, 0, "Invalid FileSet command: %s\n", item);
795 ff->fileset->state = state;
798 static bool term_fileset(JCR *jcr)
800 FF_PKT *ff = (FF_PKT *)jcr->ff;
801 findFILESET *fileset = ff->fileset;
804 for (i=0; i<fileset->include_list.size(); i++) {
805 findINCEXE *incexe = (findINCEXE *)fileset->include_list.get(i);
807 for (j=0; j<incexe->opts_list.size(); j++) {
808 findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j);
809 for (k=0; k<fo->regex.size(); k++) {
810 Dmsg1(400, "R %s\n", (char *)fo->regex.get(k));
812 for (k=0; k<fo->wild.size(); k++) {
813 Dmsg1(400, "W %s\n", (char *)fo->wild.get(k));
815 for (k=0; k<fo->base.size(); k++) {
816 Dmsg1(400, "B %s\n", (char *)fo->base.get(k));
818 for (k=0; k<fo->fstype.size(); k++) {
819 Dmsg1(400, "X %s\n", (char *)fo->fstype.get(k));
822 Dmsg1(400, "D %s\n", fo->reader);
825 Dmsg1(400, "T %s\n", fo->writer);
828 for (j=0; j<incexe->name_list.size(); j++) {
829 Dmsg1(400, "F %s\n", (char *)incexe->name_list.get(j));
832 for (i=0; i<fileset->exclude_list.size(); i++) {
833 findINCEXE *incexe = (findINCEXE *)fileset->exclude_list.get(i);
835 for (j=0; j<incexe->opts_list.size(); j++) {
836 findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j);
837 for (k=0; k<fo->regex.size(); k++) {
838 Dmsg1(400, "R %s\n", (char *)fo->regex.get(k));
840 for (k=0; k<fo->wild.size(); k++) {
841 Dmsg1(400, "W %s\n", (char *)fo->wild.get(k));
843 for (k=0; k<fo->base.size(); k++) {
844 Dmsg1(400, "B %s\n", (char *)fo->base.get(k));
846 for (k=0; k<fo->fstype.size(); k++) {
847 Dmsg1(400, "X %s\n", (char *)fo->fstype.get(k));
850 for (j=0; j<incexe->name_list.size(); j++) {
851 Dmsg1(400, "F %s\n", (char *)incexe->name_list.get(j));
854 return ff->fileset->state != state_error;
859 * As an optimization, we should do this during
860 * "compile" time in filed/job.c, and keep only a bit mask
861 * and the Verify options.
863 static void set_options(findFOPTS *fo, const char *opts)
868 for (p=opts; *p; p++) {
870 case 'a': /* alway replace */
871 case '0': /* no option */
874 fo->flags |= FO_EXCLUDE;
877 fo->flags |= FO_MULTIFS;
879 case 'h': /* no recursion */
880 fo->flags |= FO_NO_RECURSION;
882 case 'H': /* no hard link handling */
883 fo->flags |= FO_NO_HARDLINK;
886 fo->flags |= FO_IGNORECASE;
892 fo->flags |= FO_NOREPLACE;
894 case 'p': /* use portable data format */
895 fo->flags |= FO_PORTABLE;
897 case 'R': /* Resource forks and Finder Info */
898 fo->flags |= FO_HFSPLUS;
899 case 'r': /* read fifo */
900 fo->flags |= FO_READFIFO;
903 fo->flags |= FO_SHA1;
906 fo->flags |= FO_SPARSE;
909 fo->flags |= FO_MTIMEONLY;
912 fo->flags |= FO_KEEPATIME;
917 case 'V': /* verify options */
918 /* Copy Verify Options */
919 for (j=0; *p && *p != ':'; p++) {
920 fo->VerifyOpts[j] = *p;
921 if (j < (int)sizeof(fo->VerifyOpts) - 1) {
925 fo->VerifyOpts[j] = 0;
928 fo->flags |= FO_IF_NEWER;
930 case 'Z': /* gzip compression */
931 fo->flags |= FO_GZIP;
932 fo->GZIP_level = *++p - '0';
933 Dmsg1(200, "Compression level=%d\n", fo->GZIP_level);
936 Emsg1(M_ERROR, 0, "Unknown include/exclude option: %c\n", *p);
944 * Director is passing his Fileset
946 static int fileset_cmd(JCR *jcr)
948 BSOCK *dir = jcr->dir_bsock;
950 if (!init_fileset(jcr)) {
953 while (bnet_recv(dir) >= 0) {
954 strip_trailing_junk(dir->msg);
955 Dmsg1(400, "Fileset: %s\n", dir->msg);
956 add_fileset(jcr, dir->msg);
958 if (!term_fileset(jcr)) {
961 return bnet_fsend(dir, OKinc);
966 * Get list of files to exclude from Director
969 static int exclude_cmd(JCR *jcr)
971 BSOCK *dir = jcr->dir_bsock;
973 while (bnet_recv(dir) >= 0) {
974 dir->msg[dir->msglen] = 0;
975 strip_trailing_junk(dir->msg);
976 add_fname_to_list(jcr, dir->msg, EXC_LIST);
977 Dmsg1(110, "<dird: exclude file %s\n", dir->msg);
980 return bnet_fsend(dir, OKexc);
984 static int bootstrap_cmd(JCR *jcr)
986 BSOCK *dir = jcr->dir_bsock;
987 POOLMEM *fname = get_pool_memory(PM_FNAME);
990 if (jcr->RestoreBootstrap) {
991 unlink(jcr->RestoreBootstrap);
992 free_pool_memory(jcr->RestoreBootstrap);
994 Mmsg(fname, "%s/%s.%s.bootstrap", me->working_directory, me->hdr.name,
996 Dmsg1(400, "bootstrap=%s\n", fname);
997 jcr->RestoreBootstrap = fname;
998 bs = fopen(fname, "a+"); /* create file */
1002 * Suck up what he is sending to us so that he will then
1003 * read our error message.
1005 while (bnet_recv(dir) >= 0)
1008 Jmsg(jcr, M_FATAL, 0, _("Could not create bootstrap file %s: ERR=%s\n"),
1009 jcr->RestoreBootstrap, be.strerror());
1010 free_pool_memory(jcr->RestoreBootstrap);
1011 jcr->RestoreBootstrap = NULL;
1012 set_jcr_job_status(jcr, JS_ErrorTerminated);
1016 while (bnet_recv(dir) >= 0) {
1017 Dmsg1(200, "filed<dird: bootstrap file %s\n", dir->msg);
1018 fputs(dir->msg, bs);
1022 return bnet_fsend(dir, OKbootstrap);
1027 * Get backup level from Director
1030 static int level_cmd(JCR *jcr)
1032 BSOCK *dir = jcr->dir_bsock;
1033 POOLMEM *level, *buf = NULL;
1038 level = get_memory(dir->msglen+1);
1039 Dmsg1(110, "level_cmd: %s", dir->msg);
1040 if (sscanf(dir->msg, "level = %s ", level) != 1) {
1043 /* Base backup requested? */
1044 if (strcmp(level, "base") == 0) {
1045 jcr->JobLevel = L_BASE;
1046 /* Full backup requested? */
1047 } else if (strcmp(level, "full") == 0) {
1048 jcr->JobLevel = L_FULL;
1050 * Backup requested since <date> <time>
1051 * This form is also used for incremental and differential
1052 * This code is deprecated. See since_utime for new code.
1054 } else if (strcmp(level, "since") == 0) {
1055 jcr->JobLevel = L_SINCE;
1056 if (sscanf(dir->msg, "level = since %d-%d-%d %d:%d:%d mtime_only=%d",
1057 &tm.tm_year, &tm.tm_mon, &tm.tm_mday,
1058 &tm.tm_hour, &tm.tm_min, &tm.tm_sec, &mtime_only) != 7) {
1063 tm.tm_wday = tm.tm_yday = 0;
1065 mtime = mktime(&tm);
1066 Dmsg2(100, "Got since time: %s mtime_only=%d\n", ctime(&mtime), mtime_only);
1067 jcr->incremental = 1; /* set incremental or decremental backup */
1068 jcr->mtime = mtime; /* set since time */
1070 * We get his UTC since time, then sync the clocks and correct it
1071 * to agree with our clock.
1073 } else if (strcmp(level, "since_utime") == 0) {
1074 buf = get_memory(dir->msglen+1);
1075 utime_t since_time, adj;
1076 btime_t his_time, bt_start, rt=0, bt_adj=0;
1077 jcr->JobLevel = L_SINCE;
1078 if (sscanf(dir->msg, "level = since_utime %s mtime_only=%d",
1079 buf, &mtime_only) != 2) {
1082 since_time = str_to_uint64(buf); /* this is the since time */
1083 char ed1[50], ed2[50];
1085 * Sync clocks by polling him for the time. We take
1086 * 10 samples of his time throwing out the first two.
1088 for (int i=0; i<10; i++) {
1089 bt_start = get_current_btime();
1090 bnet_sig(dir, BNET_BTIME); /* poll for time */
1091 if (bnet_recv(dir) <= 0) { /* get response */
1094 if (sscanf(dir->msg, "btime %s", buf) != 1) {
1097 if (i < 2) { /* toss first two results */
1100 his_time = str_to_uint64(buf);
1101 rt = get_current_btime() - bt_start; /* compute round trip time */
1102 bt_adj -= his_time - bt_start - rt/2;
1103 Dmsg2(200, "rt=%s adj=%s\n", edit_uint64(rt, ed1), edit_uint64(bt_adj, ed2));
1106 bt_adj = bt_adj / 8; /* compute average time */
1107 Dmsg2(100, "rt=%s adj=%s\n", edit_uint64(rt, ed1), edit_uint64(bt_adj, ed2));
1108 adj = btime_to_utime(bt_adj);
1109 since_time += adj; /* adjust for clock difference */
1111 Jmsg(jcr, M_INFO, 0, _("Since time adjusted by %d seconds.\n"), adj);
1113 bnet_sig(dir, BNET_EOD);
1115 Dmsg2(100, "adj = %d since_time=%d\n", (int)adj, (int)since_time);
1116 jcr->incremental = 1; /* set incremental or decremental backup */
1117 jcr->mtime = (time_t)since_time; /* set since time */
1119 Jmsg1(jcr, M_FATAL, 0, "Unknown backup level: %s\n", level);
1127 return bnet_fsend(dir, OKlevel);
1130 pm_strcpy(jcr->errmsg, dir->msg);
1131 Jmsg1(jcr, M_FATAL, 0, _("Bad level command: %s\n"), jcr->errmsg);
1140 * Get session parameters from Director -- this is for a Restore command
1142 static int session_cmd(JCR *jcr)
1144 BSOCK *dir = jcr->dir_bsock;
1146 Dmsg1(100, "SessionCmd: %s", dir->msg);
1147 if (sscanf(dir->msg, sessioncmd, jcr->VolumeName,
1148 &jcr->VolSessionId, &jcr->VolSessionTime,
1149 &jcr->StartFile, &jcr->EndFile,
1150 &jcr->StartBlock, &jcr->EndBlock) != 7) {
1151 pm_strcpy(jcr->errmsg, dir->msg);
1152 Jmsg(jcr, M_FATAL, 0, "Bad session command: %s", jcr->errmsg);
1156 return bnet_fsend(dir, OKsession);
1160 * Get address of storage daemon from Director
1163 static int storage_cmd(JCR *jcr)
1165 int stored_port; /* storage daemon port */
1166 int enable_ssl; /* enable ssl to sd */
1167 BSOCK *dir = jcr->dir_bsock;
1168 BSOCK *sd; /* storage daemon bsock */
1170 Dmsg1(100, "StorageCmd: %s", dir->msg);
1171 if (sscanf(dir->msg, storaddr, &jcr->stored_addr, &stored_port, &enable_ssl) != 3) {
1172 pm_strcpy(jcr->errmsg, dir->msg);
1173 Jmsg(jcr, M_FATAL, 0, _("Bad storage command: %s"), jcr->errmsg);
1176 Dmsg3(110, "Open storage: %s:%d ssl=%d\n", jcr->stored_addr, stored_port, enable_ssl);
1177 /* Open command communications with Storage daemon */
1178 /* Try to connect for 1 hour at 10 second intervals */
1179 sd = bnet_connect(jcr, 10, (int)me->SDConnectTimeout, _("Storage daemon"),
1180 jcr->stored_addr, NULL, stored_port, 1);
1182 Jmsg(jcr, M_FATAL, 0, _("Failed to connect to Storage daemon: %s:%d\n"),
1183 jcr->stored_addr, stored_port);
1184 Dmsg2(100, "Failed to connect to Storage daemon: %s:%d\n",
1185 jcr->stored_addr, stored_port);
1188 Dmsg0(110, "Connection OK to SD.\n");
1190 jcr->store_bsock = sd;
1192 bnet_fsend(sd, "Hello Start Job %s\n", jcr->Job);
1193 if (!authenticate_storagedaemon(jcr)) {
1194 Jmsg(jcr, M_FATAL, 0, _("Failed to authenticate Storage daemon.\n"));
1197 Dmsg0(110, "Authenticated with SD.\n");
1199 /* Send OK to Director */
1200 return bnet_fsend(dir, OKstore);
1205 * Do a backup. For now, we handle only Full and Incremental.
1207 static int backup_cmd(JCR *jcr)
1209 BSOCK *dir = jcr->dir_bsock;
1210 BSOCK *sd = jcr->store_bsock;
1213 char ed1[50], ed2[50];
1215 set_jcr_job_status(jcr, JS_Blocked);
1216 jcr->JobType = JT_BACKUP;
1217 Dmsg1(100, "begin backup ff=%p\n", (FF_PKT *)jcr->ff);
1220 Jmsg(jcr, M_FATAL, 0, _("Cannot contact Storage daemon\n"));
1224 bnet_fsend(dir, OKbackup);
1225 Dmsg1(110, "bfiled>dird: %s", dir->msg);
1228 * Send Append Open Session to Storage daemon
1230 bnet_fsend(sd, append_open);
1231 Dmsg1(110, ">stored: %s", sd->msg);
1233 * Expect to receive back the Ticket number
1235 if (bget_msg(sd) >= 0) {
1236 Dmsg1(110, "<stored: %s", sd->msg);
1237 if (sscanf(sd->msg, OK_open, &jcr->Ticket) != 1) {
1238 Jmsg(jcr, M_FATAL, 0, _("Bad response to append open: %s\n"), sd->msg);
1241 Dmsg1(110, "Got Ticket=%d\n", jcr->Ticket);
1243 Jmsg(jcr, M_FATAL, 0, _("Bad response from stored to open command\n"));
1248 * Send Append data command to Storage daemon
1250 bnet_fsend(sd, append_data, jcr->Ticket);
1251 Dmsg1(110, ">stored: %s", sd->msg);
1254 * Expect to get OK data
1256 Dmsg1(110, "<stored: %s", sd->msg);
1257 if (!response(jcr, sd, OK_data, "Append Data")) {
1262 * Send Files to Storage daemon
1264 Dmsg1(110, "begin blast ff=%p\n", (FF_PKT *)jcr->ff);
1265 if (!blast_data_to_storage_daemon(jcr, NULL)) {
1266 set_jcr_job_status(jcr, JS_ErrorTerminated);
1267 bnet_suppress_error_messages(sd, 1);
1268 Dmsg0(110, "Error in blast_data.\n");
1270 set_jcr_job_status(jcr, JS_Terminated);
1271 if (jcr->JobStatus != JS_Terminated) {
1272 bnet_suppress_error_messages(sd, 1);
1273 goto cleanup; /* bail out now */
1276 * Expect to get response to append_data from Storage daemon
1278 if (!response(jcr, sd, OK_append, "Append Data")) {
1279 set_jcr_job_status(jcr, JS_ErrorTerminated);
1284 * Send Append End Data to Storage daemon
1286 bnet_fsend(sd, append_end, jcr->Ticket);
1288 if (!response(jcr, sd, OK_end, "Append End")) {
1289 set_jcr_job_status(jcr, JS_ErrorTerminated);
1294 * Send Append Close to Storage daemon
1296 bnet_fsend(sd, append_close, jcr->Ticket);
1297 while (bget_msg(sd) >= 0) { /* stop on signal or error */
1298 if (sscanf(sd->msg, OK_close, &SDJobStatus) == 1) {
1300 Dmsg2(200, "SDJobStatus = %d %c\n", SDJobStatus, (char)SDJobStatus);
1304 Jmsg(jcr, M_FATAL, 0, _("Append Close with SD failed.\n"));
1307 if (SDJobStatus != JS_Terminated) {
1308 Jmsg(jcr, M_FATAL, 0, _("Bad status %d returned from Storage Daemon.\n"),
1314 bnet_fsend(dir, EndJob, jcr->JobStatus, jcr->JobFiles,
1315 edit_uint64(jcr->ReadBytes, ed1),
1316 edit_uint64(jcr->JobBytes, ed2), jcr->Errors);
1317 Dmsg1(110, "End FD msg: %s\n", dir->msg);
1319 return 0; /* return and stop command loop */
1323 * Do a Verify for Director
1326 static int verify_cmd(JCR *jcr)
1328 BSOCK *dir = jcr->dir_bsock;
1329 BSOCK *sd = jcr->store_bsock;
1330 char level[100], ed1[50], ed2[50];
1332 jcr->JobType = JT_VERIFY;
1333 if (sscanf(dir->msg, verifycmd, level) != 1) {
1334 bnet_fsend(dir, "2994 Bad verify command: %s\n", dir->msg);
1337 if (strcasecmp(level, "init") == 0) {
1338 jcr->JobLevel = L_VERIFY_INIT;
1339 } else if (strcasecmp(level, "catalog") == 0){
1340 jcr->JobLevel = L_VERIFY_CATALOG;
1341 } else if (strcasecmp(level, "volume") == 0){
1342 jcr->JobLevel = L_VERIFY_VOLUME_TO_CATALOG;
1343 } else if (strcasecmp(level, "data") == 0){
1344 jcr->JobLevel = L_VERIFY_DATA;
1345 } else if (strcasecmp(level, "disk_to_catalog") == 0) {
1346 jcr->JobLevel = L_VERIFY_DISK_TO_CATALOG;
1348 bnet_fsend(dir, "2994 Bad verify level: %s\n", dir->msg);
1352 bnet_fsend(dir, OKverify);
1353 Dmsg1(110, "bfiled>dird: %s", dir->msg);
1355 switch (jcr->JobLevel) {
1357 case L_VERIFY_CATALOG:
1360 case L_VERIFY_VOLUME_TO_CATALOG:
1361 if (!open_sd_read_session(jcr)) {
1364 start_dir_heartbeat(jcr);
1365 do_verify_volume(jcr);
1366 stop_dir_heartbeat(jcr);
1368 * Send Close session command to Storage daemon
1370 bnet_fsend(sd, read_close, jcr->Ticket);
1371 Dmsg1(130, "bfiled>stored: %s", sd->msg);
1373 /* ****FIXME**** check response */
1374 bget_msg(sd); /* get OK */
1376 /* Inform Storage daemon that we are done */
1377 bnet_sig(sd, BNET_TERMINATE);
1380 case L_VERIFY_DISK_TO_CATALOG:
1384 bnet_fsend(dir, "2994 Bad verify level: %s\n", dir->msg);
1388 bnet_sig(dir, BNET_EOD);
1390 /* Send termination status back to Dir */
1391 bnet_fsend(dir, EndJob, jcr->JobStatus, jcr->JobFiles,
1392 edit_uint64(jcr->ReadBytes, ed1),
1393 edit_uint64(jcr->JobBytes, ed2), jcr->Errors);
1395 /* Inform Director that we are done */
1396 bnet_sig(dir, BNET_TERMINATE);
1397 return 0; /* return and terminate command loop */
1401 * Do a Restore for Director
1404 static int restore_cmd(JCR *jcr)
1406 BSOCK *dir = jcr->dir_bsock;
1407 BSOCK *sd = jcr->store_bsock;
1411 char ed1[50], ed2[50];
1414 * Scan WHERE (base directory for restore) from command
1416 Dmsg0(150, "restore command\n");
1417 /* Pickup where string */
1418 where = get_memory(dir->msglen+1);
1421 if (sscanf(dir->msg, restorecmd, &replace, &prefix_links, where) != 3) {
1422 if (sscanf(dir->msg, restorecmd1, &replace, &prefix_links) != 2) {
1423 pm_strcpy(jcr->errmsg, dir->msg);
1424 Jmsg(jcr, M_FATAL, 0, _("Bad replace command. CMD=%s\n"), jcr->errmsg);
1429 /* Turn / into nothing */
1430 if (where[0] == '/' && where[1] == 0) {
1434 Dmsg2(150, "Got replace %c, where=%s\n", replace, where);
1435 unbash_spaces(where);
1436 jcr->where = bstrdup(where);
1437 free_pool_memory(where);
1438 jcr->replace = replace;
1439 jcr->prefix_links = prefix_links;
1441 bnet_fsend(dir, OKrestore);
1442 Dmsg1(110, "bfiled>dird: %s", dir->msg);
1444 jcr->JobType = JT_RESTORE;
1446 set_jcr_job_status(jcr, JS_Blocked);
1447 if (!open_sd_read_session(jcr)) {
1448 set_jcr_job_status(jcr, JS_ErrorTerminated);
1452 set_jcr_job_status(jcr, JS_Running);
1455 * Do restore of files and data
1457 start_dir_heartbeat(jcr);
1459 stop_dir_heartbeat(jcr);
1461 set_jcr_job_status(jcr, JS_Terminated);
1462 if (jcr->JobStatus != JS_Terminated) {
1463 bnet_suppress_error_messages(sd, 1);
1467 * Send Close session command to Storage daemon
1469 bnet_fsend(sd, read_close, jcr->Ticket);
1470 Dmsg1(130, "bfiled>stored: %s", sd->msg);
1472 bget_msg(sd); /* get OK */
1474 /* Inform Storage daemon that we are done */
1475 bnet_sig(sd, BNET_TERMINATE);
1480 set_jcr_job_status(jcr, JS_ErrorTerminated);
1482 /* Send termination status back to Dir */
1483 bnet_fsend(dir, EndJob, jcr->JobStatus, jcr->JobFiles,
1484 edit_uint64(jcr->ReadBytes, ed1),
1485 edit_uint64(jcr->JobBytes, ed2), jcr->Errors);
1487 /* Inform Director that we are done */
1488 bnet_sig(dir, BNET_TERMINATE);
1490 Dmsg0(130, "Done in job.c\n");
1491 return 0; /* return and terminate command loop */
1494 static int open_sd_read_session(JCR *jcr)
1496 BSOCK *sd = jcr->store_bsock;
1499 Jmsg(jcr, M_FATAL, 0, _("Improper calling sequence.\n"));
1502 Dmsg4(120, "VolSessId=%ld VolsessT=%ld SF=%ld EF=%ld\n",
1503 jcr->VolSessionId, jcr->VolSessionTime, jcr->StartFile, jcr->EndFile);
1504 Dmsg2(120, "JobId=%d vol=%s\n", jcr->JobId, "DummyVolume");
1506 * Open Read Session with Storage daemon
1508 bnet_fsend(sd, read_open, jcr->VolumeName,
1509 jcr->VolSessionId, jcr->VolSessionTime, jcr->StartFile, jcr->EndFile,
1510 jcr->StartBlock, jcr->EndBlock);
1511 Dmsg1(110, ">stored: %s", sd->msg);
1516 if (bget_msg(sd) >= 0) {
1517 Dmsg1(110, "bfiled<stored: %s", sd->msg);
1518 if (sscanf(sd->msg, OK_open, &jcr->Ticket) != 1) {
1519 Jmsg(jcr, M_FATAL, 0, _("Bad response to SD read open: %s\n"), sd->msg);
1522 Dmsg1(110, "bfiled: got Ticket=%d\n", jcr->Ticket);
1524 Jmsg(jcr, M_FATAL, 0, _("Bad response from stored to read open command\n"));
1528 if (!send_bootstrap_file(jcr)) {
1533 * Start read of data with Storage daemon
1535 bnet_fsend(sd, read_data, jcr->Ticket);
1536 Dmsg1(110, ">stored: %s", sd->msg);
1541 if (!response(jcr, sd, OK_data, "Read Data")) {
1548 * Destroy the Job Control Record and associated
1549 * resources (sockets).
1551 static void filed_free_jcr(JCR *jcr)
1553 if (jcr->store_bsock) {
1554 bnet_close(jcr->store_bsock);
1556 if (jcr->RestoreBootstrap) {
1557 unlink(jcr->RestoreBootstrap);
1558 free_pool_memory(jcr->RestoreBootstrap);
1559 jcr->RestoreBootstrap = NULL;
1561 if (jcr->last_fname) {
1562 free_pool_memory(jcr->last_fname);
1564 if (jcr->RunAfterJob) {
1565 free_pool_memory(jcr->RunAfterJob);
1573 * Get response from Storage daemon to a command we
1574 * sent. Check that the response is OK.
1576 * Returns: 0 on failure
1579 int response(JCR *jcr, BSOCK *sd, char *resp, const char *cmd)
1584 if (bget_msg(sd) > 0) {
1585 Dmsg0(110, sd->msg);
1586 if (strcmp(sd->msg, resp) == 0) {
1590 if (job_canceled(jcr)) {
1591 return 0; /* if canceled avoid useless error messages */
1593 if (is_bnet_error(sd)) {
1594 Jmsg2(jcr, M_FATAL, 0, _("Comm error with SD. bad response to %s. ERR=%s\n"),
1595 cmd, bnet_strerror(sd));
1597 Jmsg3(jcr, M_FATAL, 0, _("Bad response to %s command. Wanted %s, got %s\n"),
1598 cmd, resp, sd->msg);
1603 static int send_bootstrap_file(JCR *jcr)
1607 BSOCK *sd = jcr->store_bsock;
1608 const char *bootstrap = "bootstrap\n";
1611 Dmsg1(400, "send_bootstrap_file: %s\n", jcr->RestoreBootstrap);
1612 if (!jcr->RestoreBootstrap) {
1615 bs = fopen(jcr->RestoreBootstrap, "r");
1618 Jmsg(jcr, M_FATAL, 0, _("Could not open bootstrap file %s: ERR=%s\n"),
1619 jcr->RestoreBootstrap, be.strerror());
1620 set_jcr_job_status(jcr, JS_ErrorTerminated);
1623 sd->msglen = pm_strcpy(sd->msg, bootstrap);
1625 while (fgets(buf, sizeof(buf), bs)) {
1626 sd->msglen = Mmsg(sd->msg, "%s", buf);
1629 bnet_sig(sd, BNET_EOD);
1631 if (!response(jcr, sd, OKSDbootstrap, "Bootstrap")) {
1632 set_jcr_job_status(jcr, JS_ErrorTerminated);
1638 if (jcr->RestoreBootstrap) {
1639 unlink(jcr->RestoreBootstrap);
1640 free_pool_memory(jcr->RestoreBootstrap);
1641 jcr->RestoreBootstrap = NULL;