X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=bacula%2Fsrc%2Ffiled%2Fjob.c;h=9e1f8d2de4f9027db78c1577a9cdf5ed2837a1c0;hb=334b701e895a6ec517b26d05cf1266c25d518025;hp=1d06cad6e2ea3960934de26a0d11cc942de7b032;hpb=e1187372073c4190d58582372c26400b69af3b6f;p=bacula%2Fbacula diff --git a/bacula/src/filed/job.c b/bacula/src/filed/job.c index 1d06cad6e2..9e1f8d2de4 100644 --- a/bacula/src/filed/job.c +++ b/bacula/src/filed/job.c @@ -1,3 +1,30 @@ +/* + Bacula® - The Network Backup Solution + + Copyright (C) 2000-2008 Free Software Foundation Europe e.V. + + The main author of Bacula is Kern Sibbald, with contributions from + many others, a complete list can be found in the file AUTHORS. + This program is Free Software; you can redistribute it and/or + modify it under the terms of version two of the GNU General Public + License as published by the Free Software Foundation and included + in the file LICENSE. + + This program is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA + 02110-1301, USA. + + Bacula® is a registered trademark of John Walker. + The licensor of Bacula is the Free Software Foundation Europe + (FSFE), Fiduciary Program, Sumatrastrasse 25, 8006 Zürich, + Switzerland, email:ftf@fsfeurope.org. +*/ /* * Bacula File Daemon Job processing * @@ -6,100 +33,103 @@ * Version $Id$ * */ -/* - Copyright (C) 2000-2003 Kern Sibbald and John Walker - This program is free software; you can redistribute it and/or - modify it under the terms of the GNU General Public License as - published by the Free Software Foundation; either version 2 of - the License, or (at your option) any later version. +#include "bacula.h" +#include "filed.h" - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - General Public License for more details. +#if defined(WIN32_VSS) +#include "vss.h" - You should have received a copy of the GNU General Public - License along with this program; if not, write to the Free - Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, - MA 02111-1307, USA. +static pthread_mutex_t vss_mutex = PTHREAD_MUTEX_INITIALIZER; +static int enable_vss; +#endif - */ +extern CLIENT *me; /* our client resource */ -#include "bacula.h" -#include "filed.h" -#include "host.h" - -extern char my_name[]; -extern CLIENT *me; /* our client resource */ - /* Imported functions */ extern int status_cmd(JCR *jcr); - +extern int qstatus_cmd(JCR *jcr); +extern int accurate_cmd(JCR *jcr); + /* Forward referenced functions */ static int backup_cmd(JCR *jcr); static int bootstrap_cmd(JCR *jcr); static int cancel_cmd(JCR *jcr); static int setdebug_cmd(JCR *jcr); static int estimate_cmd(JCR *jcr); -static int exclude_cmd(JCR *jcr); static int hello_cmd(JCR *jcr); static int job_cmd(JCR *jcr); -static int include_cmd(JCR *jcr); +static int fileset_cmd(JCR *jcr); static int level_cmd(JCR *jcr); static int verify_cmd(JCR *jcr); static int restore_cmd(JCR *jcr); static int storage_cmd(JCR *jcr); static int session_cmd(JCR *jcr); -static int response(JCR *jcr, BSOCK *sd, char *resp, char *cmd); +static int response(JCR *jcr, BSOCK *sd, char *resp, const char *cmd); static void filed_free_jcr(JCR *jcr); static int open_sd_read_session(JCR *jcr); static int send_bootstrap_file(JCR *jcr); +static int runscript_cmd(JCR *jcr); +static int runbefore_cmd(JCR *jcr); +static int runafter_cmd(JCR *jcr); +static int runbeforenow_cmd(JCR *jcr); +static void set_options(findFOPTS *fo, const char *opts); /* Exported functions */ struct s_cmds { - char *cmd; + const char *cmd; int (*func)(JCR *); + int monitoraccess; /* specify if monitors have access to this function */ }; -/* - * The following are the recognized commands from the Director. +/* + * The following are the recognized commands from the Director. */ static struct s_cmds cmds[] = { - {"backup", backup_cmd}, - {"cancel", cancel_cmd}, - {"setdebug=", setdebug_cmd}, - {"estimate", estimate_cmd}, - {"exclude", exclude_cmd}, - {"Hello", hello_cmd}, - {"include", include_cmd}, - {"JobId=", job_cmd}, - {"level = ", level_cmd}, - {"restore", restore_cmd}, - {"session", session_cmd}, - {"status", status_cmd}, - {"storage ", storage_cmd}, - {"verify", verify_cmd}, - {"bootstrap",bootstrap_cmd}, - {NULL, NULL} /* list terminator */ + {"backup", backup_cmd, 0}, + {"cancel", cancel_cmd, 0}, + {"setdebug=", setdebug_cmd, 0}, + {"estimate", estimate_cmd, 0}, + {"Hello", hello_cmd, 1}, + {"fileset", fileset_cmd, 0}, + {"JobId=", job_cmd, 0}, + {"level = ", level_cmd, 0}, + {"restore", restore_cmd, 0}, + {"session", session_cmd, 0}, + {"status", status_cmd, 1}, + {".status", qstatus_cmd, 1}, + {"storage ", storage_cmd, 0}, + {"verify", verify_cmd, 0}, + {"bootstrap", bootstrap_cmd, 0}, + {"RunBeforeNow", runbeforenow_cmd, 0}, + {"RunBeforeJob", runbefore_cmd, 0}, + {"RunAfterJob", runafter_cmd, 0}, + {"Run", runscript_cmd, 0}, + {"accurate", accurate_cmd, 0}, + {NULL, NULL} /* list terminator */ }; /* Commands received from director that need scanning */ static char jobcmd[] = "JobId=%d Job=%127s SDid=%d SDtime=%d Authorization=%100s"; -static char storaddr[] = "storage address=%s port=%d\n"; +static char storaddr[] = "storage address=%s port=%d ssl=%d"; static char sessioncmd[] = "session %127s %ld %ld %ld %ld %ld %ld\n"; -static char restorecmd[] = "restore replace=%c where=%s\n"; -static char restorecmd1[] = "restore replace=%c where=\n"; -static char verifycmd[] = "verify level=%30s\n"; +static char restorecmd[] = "restore replace=%c prelinks=%d where=%s\n"; +static char restorecmd1[] = "restore replace=%c prelinks=%d where=\n"; +static char restorecmdR[] = "restore replace=%c prelinks=%d regexwhere=%s\n"; +static char verifycmd[] = "verify level=%30s"; +static char estimatecmd[] = "estimate listing=%d"; +static char runbefore[] = "RunBeforeJob %s"; +static char runafter[] = "RunAfterJob %s"; +static char runscript[] = "Run OnSuccess=%d OnFailure=%d AbortOnError=%d When=%d Command=%s"; /* Responses sent to Director */ static char errmsg[] = "2999 Invalid command\n"; static char no_auth[] = "2998 No Authorization\n"; +static char invalid_cmd[] = "2997 Invalid command for a Director with Monitor directive enabled.\n"; static char OKinc[] = "2000 OK include\n"; -static char OKest[] = "2000 OK estimate files=%ld bytes=%ld\n"; -static char OKexc[] = "2000 OK exclude\n"; +static char OKest[] = "2000 OK estimate files=%u bytes=%s\n"; static char OKlevel[] = "2000 OK level\n"; static char OKbackup[] = "2000 OK backup\n"; static char OKbootstrap[] = "2000 OK bootstrap\n"; @@ -107,11 +137,16 @@ static char OKverify[] = "2000 OK verify\n"; static char OKrestore[] = "2000 OK restore\n"; static char OKsession[] = "2000 OK session\n"; static char OKstore[] = "2000 OK storage\n"; -static char OKjob[] = "2000 OK Job " FDHOST "," DISTNAME "," DISTVER; +static char OKjob[] = "2000 OK Job %s (%s) %s,%s,%s"; static char OKsetdebug[] = "2000 OK setdebug=%d\n"; static char BADjob[] = "2901 Bad Job\n"; -static char EndRestore[] = "2800 End Job TermCode=%d JobFiles=%u JobBytes=%" lld "\n"; -static char EndBackup[] = "2801 End Backup Job TermCode=%d JobFiles=%u ReadBytes=%" lld " JobBytes=%" lld "\n"; +static char EndJob[] = "2800 End Job TermCode=%d JobFiles=%u ReadBytes=%s" + " JobBytes=%s Errors=%u VSS=%d Encrypt=%d\n"; +static char OKRunBefore[] = "2000 OK RunBefore\n"; +static char OKRunBeforeNow[] = "2000 OK RunBeforeNow\n"; +static char OKRunAfter[] = "2000 OK RunAfter\n"; +static char OKRunScript[] = "2000 OK RunScript\n"; + /* Responses received from Storage Daemon */ static char OK_end[] = "3000 OK end\n"; @@ -119,7 +154,7 @@ static char OK_close[] = "3000 OK close Status = %d\n"; static char OK_open[] = "3000 OK open ticket = %d\n"; static char OK_data[] = "3000 OK data\n"; static char OK_append[] = "3000 OK append data\n"; -static char OKSDbootstrap[] = "3000 OK bootstrap\n"; +static char OKSDbootstrap[]= "3000 OK bootstrap\n"; /* Commands sent to Storage Daemon */ @@ -131,7 +166,7 @@ static char read_open[] = "read open session = %s %ld %ld %ld %ld %ld %ld\n"; static char read_data[] = "read data %d\n"; static char read_close[] = "read close session %d\n"; -/* +/* * Accept requests from a Director * * NOTE! We are running as a separate thread @@ -147,10 +182,27 @@ static char read_close[] = "read close session %d\n"; * Accept commands one at a time from the Director * and execute them. * + * Concerning ClientRunBefore/After, the sequence of events + * is rather critical. If they are not done in the right + * order one can easily get FD->SD timeouts if the script + * runs a long time. + * + * The current sequence of events is: + * 1. Dir starts job with FD + * 2. Dir connects to SD + * 3. Dir connects to FD + * 4. FD connects to SD + * 5. FD gets/runs ClientRunBeforeJob and sends ClientRunAfterJob + * 6. Dir sends include/exclude + * 7. FD sends data to SD + * 8. SD/FD disconnects while SD despools data and attributes (optionnal) + * 9. FD runs ClientRunAfterJob */ + void *handle_client_request(void *dirp) { - int i, found, quit; + int i; + bool found, quit; JCR *jcr; BSOCK *dir = (BSOCK *)dirp; @@ -158,54 +210,154 @@ void *handle_client_request(void *dirp) jcr->dir_bsock = dir; jcr->ff = init_find_files(); jcr->start_time = time(NULL); + jcr->RunScripts = New(alist(10, not_owned_by_alist)); jcr->last_fname = get_pool_memory(PM_FNAME); jcr->last_fname[0] = 0; jcr->client_name = get_memory(strlen(my_name) + 1); - jcr->prefix_links = 1; /* default to prefix links */ - pm_strcpy(&jcr->client_name, my_name); - dir->jcr = (void *)jcr; + new_plugins(jcr); /* instantiate plugins for this jcr */ + pm_strcpy(jcr->client_name, my_name); + jcr->crypto.pki_sign = me->pki_sign; + jcr->crypto.pki_encrypt = me->pki_encrypt; + jcr->crypto.pki_keypair = me->pki_keypair; + jcr->crypto.pki_signers = me->pki_signers; + jcr->crypto.pki_recipients = me->pki_recipients; + dir->set_jcr(jcr); + enable_backup_privileges(NULL, 1 /* ignore_errors */); /**********FIXME******* add command handler error code */ - for (quit=0; !quit;) { + for (quit=false; !quit;) { /* Read command */ if (bnet_recv(dir) < 0) { - break; /* connection terminated */ + break; /* connection terminated */ } dir->msg[dir->msglen] = 0; Dmsg1(100, "msg); - found = FALSE; + found = false; for (i=0; cmds[i].cmd; i++) { - if (strncmp(cmds[i].cmd, dir->msg, strlen(cmds[i].cmd)) == 0) { - if (!jcr->authenticated && cmds[i].func != hello_cmd) { - bnet_fsend(dir, no_auth); - break; - } - found = TRUE; /* indicate command found */ - if (!cmds[i].func(jcr)) { /* do command */ - quit = TRUE; /* error or fully terminated, get out */ - Pmsg0(20, "Command error\n"); - } - break; - } - } - if (!found) { /* command not found */ - bnet_fsend(dir, errmsg); - quit = TRUE; - break; + if (strncmp(cmds[i].cmd, dir->msg, strlen(cmds[i].cmd)) == 0) { + found = true; /* indicate command found */ + if (!jcr->authenticated && cmds[i].func != hello_cmd) { + bnet_fsend(dir, no_auth); + bnet_sig(dir, BNET_EOD); + break; + } + if ((jcr->authenticated) && (!cmds[i].monitoraccess) && (jcr->director->monitor)) { + Dmsg1(100, "Command \"%s\" is invalid.\n", cmds[i].cmd); + bnet_fsend(dir, invalid_cmd); + bnet_sig(dir, BNET_EOD); + break; + } + Dmsg1(100, "Executing %s command.\n", cmds[i].cmd); + if (!cmds[i].func(jcr)) { /* do command */ + quit = true; /* error or fully terminated, get out */ + Dmsg1(20, "Quit command loop. Canceled=%d\n", job_canceled(jcr)); + } + break; + } + } + if (!found) { /* command not found */ + bnet_fsend(dir, errmsg); + quit = true; + break; } } + + /* Inform Storage daemon that we are done */ + if (jcr->store_bsock) { + bnet_sig(jcr->store_bsock, BNET_TERMINATE); + } + + /* Run the after job */ + run_scripts(jcr, jcr->RunScripts, "ClientAfterJob"); + + if (jcr->JobId) { /* send EndJob if running a job */ + char ed1[50], ed2[50]; + /* Send termination status back to Dir */ + bnet_fsend(dir, EndJob, jcr->JobStatus, jcr->JobFiles, + edit_uint64(jcr->ReadBytes, ed1), + edit_uint64(jcr->JobBytes, ed2), jcr->Errors, jcr->VSS, + jcr->crypto.pki_encrypt); + Dmsg1(110, "End FD msg: %s\n", dir->msg); + } + + generate_daemon_event(jcr, "JobEnd"); + generate_plugin_event(jcr, bEventJobEnd); + + dequeue_messages(jcr); /* send any queued messages */ + + /* Inform Director that we are done */ + dir->signal(BNET_TERMINATE); + + free_plugins(jcr); /* release instantiated plugins */ + + /* Clean up fileset */ + FF_PKT *ff = jcr->ff; + findFILESET *fileset = ff->fileset; + if (fileset) { + int i, j, k; + /* Delete FileSet Include lists */ + for (i=0; iinclude_list.size(); i++) { + findINCEXE *incexe = (findINCEXE *)fileset->include_list.get(i); + for (j=0; jopts_list.size(); j++) { + findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j); + for (k=0; kregex.size(); k++) { + regfree((regex_t *)fo->regex.get(k)); + } + fo->regex.destroy(); + fo->regexdir.destroy(); + fo->regexfile.destroy(); + fo->wild.destroy(); + fo->wilddir.destroy(); + fo->wildfile.destroy(); + fo->wildbase.destroy(); + fo->base.destroy(); + fo->fstype.destroy(); + fo->drivetype.destroy(); + } + incexe->opts_list.destroy(); + incexe->name_list.destroy(); + incexe->plugin_list.destroy(); + } + fileset->include_list.destroy(); + + /* Delete FileSet Exclude lists */ + for (i=0; iexclude_list.size(); i++) { + findINCEXE *incexe = (findINCEXE *)fileset->exclude_list.get(i); + for (j=0; jopts_list.size(); j++) { + findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j); + fo->regex.destroy(); + fo->regexdir.destroy(); + fo->regexfile.destroy(); + fo->wild.destroy(); + fo->wilddir.destroy(); + fo->wildfile.destroy(); + fo->wildbase.destroy(); + fo->base.destroy(); + fo->fstype.destroy(); + fo->drivetype.destroy(); + } + incexe->opts_list.destroy(); + incexe->name_list.destroy(); + incexe->plugin_list.destroy(); + } + fileset->exclude_list.destroy(); + free(fileset); + } + ff->fileset = NULL; Dmsg0(100, "Calling term_find_files\n"); - term_find_files((FF_PKT *)jcr->ff); + term_find_files(jcr->ff); + jcr->ff = NULL; Dmsg0(100, "Done with term_find_files\n"); - free_jcr(jcr); /* destroy JCR record */ + free_jcr(jcr); /* destroy JCR record */ Dmsg0(100, "Done with free_jcr\n"); + Dsm_check(1); return NULL; } /* - * Hello from Director he must identify himself and provide his + * Hello from Director he must identify himself and provide his * password. */ static int hello_cmd(JCR *jcr) @@ -215,7 +367,7 @@ static int hello_cmd(JCR *jcr) return 0; } Dmsg0(120, "OK Authenticate\n"); - jcr->authenticated = TRUE; + jcr->authenticated = true; return 1; } @@ -230,16 +382,21 @@ static int cancel_cmd(JCR *jcr) if (sscanf(dir->msg, "cancel Job=%127s", Job) == 1) { if (!(cjcr=get_jcr_by_full_name(Job))) { - bnet_fsend(dir, "2901 Job %s not found.\n", Job); + dir->fsend(_("2901 Job %s not found.\n"), Job); } else { - set_jcr_job_status(cjcr, JS_Canceled); - free_jcr(cjcr); - bnet_fsend(dir, "2001 Job %s marked to be canceled.\n", Job); + if (cjcr->store_bsock) { + cjcr->store_bsock->set_timed_out(); + cjcr->store_bsock->set_terminated(); + pthread_kill(cjcr->my_thread_id, TIMEOUT_SIGNAL); + } + set_jcr_job_status(cjcr, JS_Canceled); + free_jcr(cjcr); + dir->fsend(_("2001 Job %s marked to be canceled.\n"), Job); } } else { - bnet_fsend(dir, "2902 Error scanning cancel command.\n"); + dir->fsend(_("2902 Error scanning cancel command.\n")); } - bnet_sig(dir, BNET_EOD); + dir->signal(BNET_EOD); return 1; } @@ -251,23 +408,36 @@ static int cancel_cmd(JCR *jcr) static int setdebug_cmd(JCR *jcr) { BSOCK *dir = jcr->dir_bsock; - int level; + int level, trace_flag; Dmsg1(110, "setdebug_cmd: %s", dir->msg); - if (sscanf(dir->msg, "setdebug=%d", &level) != 1 || level < 0) { - bnet_fsend(dir, "2991 Bad setdebug command: %s\n", dir->msg); - return 0; + if (sscanf(dir->msg, "setdebug=%d trace=%d", &level, &trace_flag) != 2 || level < 0) { + pm_strcpy(jcr->errmsg, dir->msg); + dir->fsend(_("2991 Bad setdebug command: %s\n"), jcr->errmsg); + return 0; } debug_level = level; - return bnet_fsend(dir, OKsetdebug, level); + set_trace(trace_flag); + return dir->fsend(OKsetdebug, level); } static int estimate_cmd(JCR *jcr) { BSOCK *dir = jcr->dir_bsock; + char ed2[50]; + + if (sscanf(dir->msg, estimatecmd, &jcr->listing) != 1) { + pm_strcpy(jcr->errmsg, dir->msg); + Jmsg(jcr, M_FATAL, 0, _("Bad estimate command: %s"), jcr->errmsg); + dir->fsend(_("2992 Bad estimate command.\n")); + return 0; + } make_estimate(jcr); - return bnet_fsend(dir, OKest, jcr->num_files_examined, jcr->JobBytes); + dir->fsend(OKest, jcr->num_files_examined, + edit_uint64_with_commas(jcr->JobBytes, ed2)); + dir->signal(BNET_EOD); + return 1; } /* @@ -279,108 +449,749 @@ static int job_cmd(JCR *jcr) POOLMEM *sd_auth_key; sd_auth_key = get_memory(dir->msglen); - if (sscanf(dir->msg, jobcmd, &jcr->JobId, jcr->Job, - &jcr->VolSessionId, &jcr->VolSessionTime, - sd_auth_key) != 5) { - bnet_fsend(dir, BADjob); - Jmsg(jcr, M_FATAL, 0, _("Bad Job Command: %s\n"), dir->msg); + if (sscanf(dir->msg, jobcmd, &jcr->JobId, jcr->Job, + &jcr->VolSessionId, &jcr->VolSessionTime, + sd_auth_key) != 5) { + pm_strcpy(jcr->errmsg, dir->msg); + Jmsg(jcr, M_FATAL, 0, _("Bad Job Command: %s"), jcr->errmsg); + dir->fsend(BADjob); free_pool_memory(sd_auth_key); return 0; } jcr->sd_auth_key = bstrdup(sd_auth_key); free_pool_memory(sd_auth_key); Dmsg2(120, "JobId=%d Auth=%s\n", jcr->JobId, jcr->sd_auth_key); - return bnet_fsend(dir, OKjob); + Mmsg(jcr->errmsg, "JobId=%d Job=%s", jcr->JobId, jcr->Job); + generate_plugin_event(jcr, bEventJobStart, (void *)jcr->errmsg); + return dir->fsend(OKjob, VERSION, LSMDATE, HOST_OS, DISTNAME, DISTVER); } -#define INC_LIST 0 -#define EXC_LIST 1 +static int runbefore_cmd(JCR *jcr) +{ + bool ok; + BSOCK *dir = jcr->dir_bsock; + POOLMEM *cmd = get_memory(dir->msglen+1); + RUNSCRIPT *script; + + Dmsg1(100, "runbefore_cmd: %s", dir->msg); + if (sscanf(dir->msg, runbefore, cmd) != 1) { + pm_strcpy(jcr->errmsg, dir->msg); + Jmsg1(jcr, M_FATAL, 0, _("Bad RunBeforeJob command: %s\n"), jcr->errmsg); + dir->fsend(_("2905 Bad RunBeforeJob command.\n")); + free_memory(cmd); + return 0; + } + unbash_spaces(cmd); + + /* Run the command now */ + script = new_runscript(); + script->set_command(cmd); + script->when = SCRIPT_Before; + ok = script->run(jcr, "ClientRunBeforeJob"); + free_runscript(script); + + free_memory(cmd); + if (ok) { + dir->fsend(OKRunBefore); + return 1; + } else { + dir->fsend(_("2905 Bad RunBeforeJob command.\n")); + return 0; + } +} -static void add_fname_to_list(JCR *jcr, char *fname, int list) +static int runbeforenow_cmd(JCR *jcr) { - char *p; - if (list == INC_LIST) { - add_fname_to_include_list((FF_PKT *)jcr->ff, 1, fname); + BSOCK *dir = jcr->dir_bsock; + + run_scripts(jcr, jcr->RunScripts, "ClientBeforeJob"); + if (job_canceled(jcr)) { + dir->fsend(_("2905 Bad RunBeforeNow command.\n")); + Dmsg0(100, "Back from run_scripts ClientBeforeJob now: FAILED\n"); + return 0; } else { - /* Skip leading options -- currently ignored */ - for (p=fname; *p && *p != ' '; p++) - { } - /* Skip spaces */ - for ( ; *p && *p == ' '; p++) - { } - add_fname_to_exclude_list((FF_PKT *)jcr->ff, p); + dir->fsend(OKRunBeforeNow); + Dmsg0(100, "Back from run_scripts ClientBeforeJob now: OK\n"); + return 1; } } -/* - * - * Get list of files/directories to include from Director - * - */ -static int include_cmd(JCR *jcr) +static int runafter_cmd(JCR *jcr) { BSOCK *dir = jcr->dir_bsock; + POOLMEM *msg = get_memory(dir->msglen+1); + RUNSCRIPT *cmd; + + Dmsg1(100, "runafter_cmd: %s", dir->msg); + if (sscanf(dir->msg, runafter, msg) != 1) { + pm_strcpy(jcr->errmsg, dir->msg); + Jmsg1(jcr, M_FATAL, 0, _("Bad RunAfter command: %s\n"), jcr->errmsg); + dir->fsend(_("2905 Bad RunAfterJob command.\n")); + free_memory(msg); + return 0; + } + unbash_spaces(msg); - while (bnet_recv(dir) >= 0) { - dir->msg[dir->msglen] = 0; - strip_trailing_junk(dir->msg); - Dmsg1(010, "include file: %s\n", dir->msg); - add_fname_to_list(jcr, dir->msg, INC_LIST); + cmd = new_runscript(); + cmd->set_command(msg); + cmd->on_success = true; + cmd->on_failure = false; + cmd->when = SCRIPT_After; + + jcr->RunScripts->append(cmd); + + free_pool_memory(msg); + return dir->fsend(OKRunAfter); +} + +static int runscript_cmd(JCR *jcr) +{ + BSOCK *dir = jcr->dir_bsock; + POOLMEM *msg = get_memory(dir->msglen+1); + int on_success, on_failure, fail_on_error; + + RUNSCRIPT *cmd = new_runscript() ; + + Dmsg1(100, "runscript_cmd: '%s'\n", dir->msg); + /* Note, we cannot sscanf into bools */ + if (sscanf(dir->msg, runscript, &on_success, + &on_failure, + &fail_on_error, + &cmd->when, + msg) != 5) { + pm_strcpy(jcr->errmsg, dir->msg); + Jmsg1(jcr, M_FATAL, 0, _("Bad RunScript command: %s\n"), jcr->errmsg); + dir->fsend(_("2905 Bad RunScript command.\n")); + free_runscript(cmd); + free_memory(msg); + return 0; + } + cmd->on_success = on_success; + cmd->on_failure = on_failure; + cmd->fail_on_error = fail_on_error; + unbash_spaces(msg); + + cmd->set_command(msg); + cmd->debug(); + jcr->RunScripts->append(cmd); + + free_pool_memory(msg); + return dir->fsend(OKRunScript); +} + + +static bool init_fileset(JCR *jcr) +{ + FF_PKT *ff; + findFILESET *fileset; + + if (!jcr->ff) { + return false; + } + ff = jcr->ff; + if (ff->fileset) { + return false; + } + fileset = (findFILESET *)malloc(sizeof(findFILESET)); + memset(fileset, 0, sizeof(findFILESET)); + ff->fileset = fileset; + fileset->state = state_none; + fileset->include_list.init(1, true); + fileset->exclude_list.init(1, true); + return true; +} + +static findFOPTS *start_options(FF_PKT *ff) +{ + int state = ff->fileset->state; + findINCEXE *incexe = ff->fileset->incexe; + + if (state != state_options) { + ff->fileset->state = state_options; + findFOPTS *fo = (findFOPTS *)malloc(sizeof(findFOPTS)); + memset(fo, 0, sizeof(findFOPTS)); + fo->regex.init(1, true); + fo->regexdir.init(1, true); + fo->regexfile.init(1, true); + fo->wild.init(1, true); + fo->wilddir.init(1, true); + fo->wildfile.init(1, true); + fo->wildbase.init(1, true); + fo->base.init(1, true); + fo->fstype.init(1, true); + fo->drivetype.init(1, true); + incexe->current_opts = fo; + incexe->opts_list.append(fo); } + return incexe->current_opts; - return bnet_fsend(dir, OKinc); } /* - * Get list of files to exclude from Director - * + * Add fname to include/exclude fileset list. First check for + * | and < and if necessary perform command. + */ +static void add_file_to_fileset(JCR *jcr, const char *fname, findFILESET *fileset, + bool is_file) +{ + char *p; + BPIPE *bpipe; + POOLMEM *fn; + FILE *ffd; + char buf[1000]; + int ch; + int stat; + + p = (char *)fname; + ch = (uint8_t)*p; + switch (ch) { + case '|': + p++; /* skip over | */ + fn = get_pool_memory(PM_FNAME); + fn = edit_job_codes(jcr, fn, p, ""); + bpipe = open_bpipe(fn, 0, "r"); + if (!bpipe) { + berrno be; + Jmsg(jcr, M_FATAL, 0, _("Cannot run program: %s. ERR=%s\n"), + p, be.bstrerror()); + free_pool_memory(fn); + return; + } + free_pool_memory(fn); + while (fgets(buf, sizeof(buf), bpipe->rfd)) { + strip_trailing_junk(buf); + if (is_file) { + fileset->incexe->name_list.append(new_dlistString(buf)); + } else { + fileset->incexe->plugin_list.append(new_dlistString(buf)); + } + } + if ((stat=close_bpipe(bpipe)) != 0) { + berrno be; + Jmsg(jcr, M_FATAL, 0, _("Error running program: %s. stat=%d: ERR=%s\n"), + p, be.code(stat), be.bstrerror(stat)); + return; + } + break; + case '<': + Dmsg0(100, "Doing < include on client.\n"); + p++; /* skip over < */ + if ((ffd = fopen(p, "rb")) == NULL) { + berrno be; + Jmsg(jcr, M_FATAL, 0, _("Cannot open FileSet input file: %s. ERR=%s\n"), + p, be.bstrerror()); + return; + } + while (fgets(buf, sizeof(buf), ffd)) { + strip_trailing_junk(buf); + Dmsg1(100, "%s\n", buf); + if (is_file) { + fileset->incexe->name_list.append(new_dlistString(buf)); + } else { + fileset->incexe->plugin_list.append(new_dlistString(buf)); + } + } + fclose(ffd); + break; + default: + if (is_file) { + fileset->incexe->name_list.append(new_dlistString(fname)); + } else { + fileset->incexe->plugin_list.append(new_dlistString(fname)); + } + break; + } +} + + +static void add_fileset(JCR *jcr, const char *item) +{ + FF_PKT *ff = jcr->ff; + findFILESET *fileset = ff->fileset; + int state = fileset->state; + findFOPTS *current_opts; + + /* Get code, optional subcode, and position item past the dividing space */ + Dmsg1(100, "%s\n", item); + int code = item[0]; + if (code != '\0') { + ++item; + } + int subcode = ' '; /* A space is always a valid subcode */ + if (item[0] != '\0' && item[0] != ' ') { + subcode = item[0]; + ++item; + } + if (*item == ' ') { + ++item; + } + + /* Skip all lines we receive after an error */ + if (state == state_error) { + Dmsg0(100, "State=error return\n"); + return; + } + + /* + * The switch tests the code for validity. + * The subcode is always good if it is a space, otherwise we must confirm. + * We set state to state_error first assuming the subcode is invalid, + * requiring state to be set in cases below that handle subcodes. + */ + if (subcode != ' ') { + state = state_error; + Dmsg0(100, "Set state=error\n"); + } + switch (code) { + case 'I': + /* New include */ + fileset->incexe = (findINCEXE *)malloc(sizeof(findINCEXE)); + memset(fileset->incexe, 0, sizeof(findINCEXE)); + fileset->incexe->opts_list.init(1, true); + fileset->incexe->name_list.init(); /* for dlist; was 1,true for alist */ + fileset->incexe->plugin_list.init(); + fileset->include_list.append(fileset->incexe); + break; + case 'E': + /* New exclude */ + fileset->incexe = (findINCEXE *)malloc(sizeof(findINCEXE)); + memset(fileset->incexe, 0, sizeof(findINCEXE)); + fileset->incexe->opts_list.init(1, true); + fileset->incexe->name_list.init(); + fileset->incexe->plugin_list.init(); + fileset->exclude_list.append(fileset->incexe); + break; + case 'N': + state = state_none; + break; + case 'F': + /* File item to include or exclude list */ + state = state_include; + add_file_to_fileset(jcr, item, fileset, true); + break; + case 'P': + /* Plugin item to include list */ + state = state_include; + add_file_to_fileset(jcr, item, fileset, false); + break; + case 'R': + current_opts = start_options(ff); + regex_t *preg; + int rc; + char prbuf[500]; + preg = (regex_t *)malloc(sizeof(regex_t)); + if (current_opts->flags & FO_IGNORECASE) { + rc = regcomp(preg, item, REG_EXTENDED|REG_ICASE); + } else { + rc = regcomp(preg, item, REG_EXTENDED); + } + if (rc != 0) { + regerror(rc, preg, prbuf, sizeof(prbuf)); + regfree(preg); + free(preg); + Jmsg(jcr, M_FATAL, 0, _("REGEX %s compile error. ERR=%s\n"), item, prbuf); + state = state_error; + break; + } + state = state_options; + if (subcode == ' ') { + current_opts->regex.append(preg); + } else if (subcode == 'D') { + current_opts->regexdir.append(preg); + } else if (subcode == 'F') { + current_opts->regexfile.append(preg); + } else { + state = state_error; + } + break; + case 'B': + current_opts = start_options(ff); + current_opts->base.append(bstrdup(item)); + state = state_options; + break; + case 'X': + current_opts = start_options(ff); + state = state_options; + if (subcode == ' ') { + current_opts->fstype.append(bstrdup(item)); + } else if (subcode == 'D') { + current_opts->drivetype.append(bstrdup(item)); + } else { + state = state_error; + } + break; + case 'W': + current_opts = start_options(ff); + state = state_options; + if (subcode == ' ') { + current_opts->wild.append(bstrdup(item)); + } else if (subcode == 'D') { + current_opts->wilddir.append(bstrdup(item)); + } else if (subcode == 'F') { + current_opts->wildfile.append(bstrdup(item)); + } else if (subcode == 'B') { + current_opts->wildbase.append(bstrdup(item)); + } else { + state = state_error; + } + break; + case 'O': + current_opts = start_options(ff); + set_options(current_opts, item); + state = state_options; + break; + case 'D': + current_opts = start_options(ff); +// current_opts->reader = bstrdup(item); + state = state_options; + break; + case 'T': + current_opts = start_options(ff); +// current_opts->writer = bstrdup(item); + state = state_options; + break; + default: + Jmsg(jcr, M_FATAL, 0, _("Invalid FileSet command: %s\n"), item); + state = state_error; + break; + } + ff->fileset->state = state; +} + +static bool term_fileset(JCR *jcr) +{ + FF_PKT *ff = jcr->ff; + +#ifdef xxx_DEBUG_CODE + findFILESET *fileset = ff->fileset; + int i, j, k; + + for (i=0; iinclude_list.size(); i++) { + findINCEXE *incexe = (findINCEXE *)fileset->include_list.get(i); + Dmsg0(400, "I\n"); + for (j=0; jopts_list.size(); j++) { + findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j); + for (k=0; kregex.size(); k++) { + Dmsg1(400, "R %s\n", (char *)fo->regex.get(k)); + } + for (k=0; kregexdir.size(); k++) { + Dmsg1(400, "RD %s\n", (char *)fo->regexdir.get(k)); + } + for (k=0; kregexfile.size(); k++) { + Dmsg1(400, "RF %s\n", (char *)fo->regexfile.get(k)); + } + for (k=0; kwild.size(); k++) { + Dmsg1(400, "W %s\n", (char *)fo->wild.get(k)); + } + for (k=0; kwilddir.size(); k++) { + Dmsg1(400, "WD %s\n", (char *)fo->wilddir.get(k)); + } + for (k=0; kwildfile.size(); k++) { + Dmsg1(400, "WF %s\n", (char *)fo->wildfile.get(k)); + } + for (k=0; kwildbase.size(); k++) { + Dmsg1(400, "WB %s\n", (char *)fo->wildbase.get(k)); + } + for (k=0; kbase.size(); k++) { + Dmsg1(400, "B %s\n", (char *)fo->base.get(k)); + } + for (k=0; kfstype.size(); k++) { + Dmsg1(400, "X %s\n", (char *)fo->fstype.get(k)); + } + for (k=0; kdrivetype.size(); k++) { + Dmsg1(400, "XD %s\n", (char *)fo->drivetype.get(k)); + } + } + dlistString *node; + foreach_dlist(node, &incexe->name_list) { + Dmsg1(400, "F %s\n", node->c_str()); + } + foreach_dlist(node, &incexe->plugin_list) { + Dmsg1(400, "P %s\n", node->c_str()); + } + } + for (i=0; iexclude_list.size(); i++) { + findINCEXE *incexe = (findINCEXE *)fileset->exclude_list.get(i); + Dmsg0(400, "E\n"); + for (j=0; jopts_list.size(); j++) { + findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j); + for (k=0; kregex.size(); k++) { + Dmsg1(400, "R %s\n", (char *)fo->regex.get(k)); + } + for (k=0; kregexdir.size(); k++) { + Dmsg1(400, "RD %s\n", (char *)fo->regexdir.get(k)); + } + for (k=0; kregexfile.size(); k++) { + Dmsg1(400, "RF %s\n", (char *)fo->regexfile.get(k)); + } + for (k=0; kwild.size(); k++) { + Dmsg1(400, "W %s\n", (char *)fo->wild.get(k)); + } + for (k=0; kwilddir.size(); k++) { + Dmsg1(400, "WD %s\n", (char *)fo->wilddir.get(k)); + } + for (k=0; kwildfile.size(); k++) { + Dmsg1(400, "WF %s\n", (char *)fo->wildfile.get(k)); + } + for (k=0; kwildbase.size(); k++) { + Dmsg1(400, "WB %s\n", (char *)fo->wildbase.get(k)); + } + for (k=0; kbase.size(); k++) { + Dmsg1(400, "B %s\n", (char *)fo->base.get(k)); + } + for (k=0; kfstype.size(); k++) { + Dmsg1(400, "X %s\n", (char *)fo->fstype.get(k)); + } + for (k=0; kdrivetype.size(); k++) { + Dmsg1(400, "XD %s\n", (char *)fo->drivetype.get(k)); + } + } + dlistString *node; + foreach_dlist(node, incexe->name_list) { + Dmsg1(400, "F %s\n", node->c_str()); + } + foreach_dlist(node, &incexe->plugin_list) { + Dmsg1(400, "P %s\n", node->c_str()); + } + } +#endif + return ff->fileset->state != state_error; +} + + +/* + * As an optimization, we should do this during + * "compile" time in filed/job.c, and keep only a bit mask + * and the Verify options. + */ +static void set_options(findFOPTS *fo, const char *opts) +{ + int j; + const char *p; + char strip[100]; + +// Commented out as it is not backward compatible - KES +#ifdef HAVE_WIN32 +// fo->flags |= FO_IGNORECASE; /* always ignorecase under windows */ +#endif + + for (p=opts; *p; p++) { + switch (*p) { + case 'a': /* alway replace */ + case '0': /* no option */ + break; + case 'e': + fo->flags |= FO_EXCLUDE; + break; + case 'f': + fo->flags |= FO_MULTIFS; + break; + case 'h': /* no recursion */ + fo->flags |= FO_NO_RECURSION; + break; + case 'H': /* no hard link handling */ + fo->flags |= FO_NO_HARDLINK; + break; + case 'i': + fo->flags |= FO_IGNORECASE; + break; + case 'M': /* MD5 */ + fo->flags |= FO_MD5; + break; + case 'n': + fo->flags |= FO_NOREPLACE; + break; + case 'p': /* use portable data format */ + fo->flags |= FO_PORTABLE; + break; + case 'R': /* Resource forks and Finder Info */ + fo->flags |= FO_HFSPLUS; + case 'r': /* read fifo */ + fo->flags |= FO_READFIFO; + break; + case 'S': + switch(*(p + 1)) { + case '1': + fo->flags |= FO_SHA1; + p++; + break; +#ifdef HAVE_SHA2 + case '2': + fo->flags |= FO_SHA256; + p++; + break; + case '3': + fo->flags |= FO_SHA512; + p++; + break; +#endif + default: + /* + * If 2 or 3 is seen here, SHA2 is not configured, so + * eat the option, and drop back to SHA-1. + */ + if (p[1] == '2' || p[1] == '3') { + p++; + } + fo->flags |= FO_SHA1; + break; + } + break; + case 's': + fo->flags |= FO_SPARSE; + break; + case 'm': + fo->flags |= FO_MTIMEONLY; + break; + case 'k': + fo->flags |= FO_KEEPATIME; + break; + case 'A': + fo->flags |= FO_ACL; + break; + case 'V': /* verify options */ + /* Copy Verify Options */ + for (j=0; *p && *p != ':'; p++) { + fo->VerifyOpts[j] = *p; + if (j < (int)sizeof(fo->VerifyOpts) - 1) { + j++; + } + } + fo->VerifyOpts[j] = 0; + break; + case 'C': /* accurate options */ + /* Copy Accurate Options */ + for (j=0; *p && *p != ':'; p++) { + fo->AccurateOpts[j] = *p; + if (j < (int)sizeof(fo->AccurateOpts) - 1) { + j++; + } + } + fo->AccurateOpts[j] = 0; + break; + case 'P': /* strip path */ + /* Get integer */ + p++; /* skip P */ + for (j=0; *p && *p != ':'; p++) { + strip[j] = *p; + if (j < (int)sizeof(strip) - 1) { + j++; + } + } + strip[j] = 0; + fo->strip_path = atoi(strip); + fo->flags |= FO_STRIPPATH; + Dmsg2(100, "strip=%s strip_path=%d\n", strip, fo->strip_path); + break; + case 'w': + fo->flags |= FO_IF_NEWER; + break; + case 'W': + fo->flags |= FO_ENHANCEDWILD; + break; + case 'Z': /* gzip compression */ + fo->flags |= FO_GZIP; + fo->GZIP_level = *++p - '0'; + break; + case 'K': + fo->flags |= FO_NOATIME; + break; + case 'c': + fo->flags |= FO_CHKCHANGES; + break; + default: + Emsg1(M_ERROR, 0, _("Unknown include/exclude option: %c\n"), *p); + break; + } + } +} + + +/* + * Director is passing his Fileset */ -static int exclude_cmd(JCR *jcr) +static int fileset_cmd(JCR *jcr) { BSOCK *dir = jcr->dir_bsock; - while (bnet_recv(dir) >= 0) { - dir->msg[dir->msglen] = 0; +#if defined(WIN32_VSS) + int vss = 0; + + sscanf(dir->msg, "fileset vss=%d", &vss); + enable_vss = vss; +#endif + + if (!init_fileset(jcr)) { + return 0; + } + while (dir->recv() >= 0) { strip_trailing_junk(dir->msg); - add_fname_to_list(jcr, dir->msg, EXC_LIST); - Dmsg1(110, "msg); + Dmsg1(500, "Fileset: %s\n", dir->msg); + add_fileset(jcr, dir->msg); + } + if (!term_fileset(jcr)) { + return 0; } + return dir->fsend(OKinc); +} - return bnet_fsend(dir, OKexc); +static void free_bootstrap(JCR *jcr) +{ + if (jcr->RestoreBootstrap) { + unlink(jcr->RestoreBootstrap); + free_pool_memory(jcr->RestoreBootstrap); + jcr->RestoreBootstrap = NULL; + } } +static pthread_mutex_t bsr_mutex = PTHREAD_MUTEX_INITIALIZER; +static uint32_t bsr_uniq = 0; + +/* + * The Director sends us the bootstrap file, which + * we will in turn pass to the SD. + */ static int bootstrap_cmd(JCR *jcr) { BSOCK *dir = jcr->dir_bsock; POOLMEM *fname = get_pool_memory(PM_FNAME); FILE *bs; - if (jcr->RestoreBootstrap) { - unlink(jcr->RestoreBootstrap); - free_pool_memory(jcr->RestoreBootstrap); - } - Mmsg(&fname, "%s/%s.%s.bootstrap", me->working_directory, me->hdr.name, - jcr->Job); + free_bootstrap(jcr); + P(bsr_mutex); + bsr_uniq++; + Mmsg(fname, "%s/%s.%s.%d.bootstrap", me->working_directory, me->hdr.name, + jcr->Job, bsr_uniq); + V(bsr_mutex); Dmsg1(400, "bootstrap=%s\n", fname); jcr->RestoreBootstrap = fname; - bs = fopen(fname, "a+"); /* create file */ + bs = fopen(fname, "a+b"); /* create file */ if (!bs) { + berrno be; Jmsg(jcr, M_FATAL, 0, _("Could not create bootstrap file %s: ERR=%s\n"), - jcr->RestoreBootstrap, strerror(errno)); - free_pool_memory(jcr->RestoreBootstrap); - jcr->RestoreBootstrap = NULL; + jcr->RestoreBootstrap, be.bstrerror()); + /* + * Suck up what he is sending to us so that he will then + * read our error message. + */ + while (dir->recv() >= 0) + { } + free_bootstrap(jcr); set_jcr_job_status(jcr, JS_ErrorTerminated); return 0; } - while (bnet_recv(dir) >= 0) { + while (dir->recv() >= 0) { Dmsg1(200, "filedmsg); fputs(dir->msg, bs); } fclose(bs); - - return bnet_fsend(dir, OKbootstrap); + /* + * Note, do not free the bootstrap yet -- it needs to be + * sent to the SD + */ + return dir->fsend(OKbootstrap); } @@ -391,50 +1202,113 @@ static int bootstrap_cmd(JCR *jcr) static int level_cmd(JCR *jcr) { BSOCK *dir = jcr->dir_bsock; - POOLMEM *level; - struct tm tm; - time_t mtime; + POOLMEM *level, *buf = NULL; + int mtime_only; level = get_memory(dir->msglen+1); Dmsg1(110, "level_cmd: %s", dir->msg); + if (strstr(dir->msg, "accurate")) { + jcr->accurate = true; + } if (sscanf(dir->msg, "level = %s ", level) != 1) { - Jmsg1(jcr, M_FATAL, 0, _("Bad level command: %s\n"), dir->msg); - free_memory(level); - return 0; + goto bail_out; } + /* Base backup requested? */ + if (strcmp(level, "base") == 0) { + jcr->JobLevel = L_BASE; + /* Full backup requested? */ + } else if (strcmp(level, "full") == 0) { + jcr->JobLevel = L_FULL; + } else if (strstr(level, "differential")) { + jcr->JobLevel = L_DIFFERENTIAL; + free_memory(level); + return 1; + } else if (strstr(level, "incremental")) { + jcr->JobLevel = L_INCREMENTAL; + free_memory(level); + return 1; /* - * Full backup requested + * We get his UTC since time, then sync the clocks and correct it + * to agree with our clock. */ - if (strcmp(level, "full") == 0) { - jcr->save_level = L_FULL; - /* - * Backup requested since