-/*
- *
- * Configuration parser for Director Run Configuration
- * directives, which are part of the Schedule Resource
- *
- * Kern Sibbald, May MM
- *
- * Version $Id$
- */
/*
Bacula® - The Network Backup Solution
- Copyright (C) 2000-2006 Free Software Foundation Europe e.V.
+ Copyright (C) 2000-2007 Free Software Foundation Europe e.V.
The main author of Bacula is Kern Sibbald, with contributions from
many others, a complete list can be found in the file AUTHORS.
(FSFE), Fiduciary Program, Sumatrastrasse 25, 8006 Zürich,
Switzerland, email:ftf@fsfeurope.org.
*/
+/*
+ *
+ * Configuration parser for Director Run Configuration
+ * directives, which are part of the Schedule Resource
+ *
+ * Kern Sibbald, May MM
+ *
+ * Version $Id$
+ */
#include "bacula.h"
#include "dird.h"
};
struct s_keyw {
- const char *name; /* keyword */
+ const char *name; /* keyword */
enum e_state state; /* parser state */
int code; /* state value */
};
set_defaults();
for ( ; token != T_EOL; (token = lex_get_token(lc, T_ALL))) {
- int len, pm = 0;
+ int len;
+ bool pm = false;
switch (token) {
case T_NUMBER:
state = s_mday;
code = atoi(lc->str+1);
if (code < 0 || code > 53) {
scan_err0(lc, _("Week number out of range (0-53)"));
+ /* NOT REACHED */
}
state = s_woy; /* week of year */
break;
len = strlen(p);
if (len > 2 && p[len-1] == 'm') {
if (p[len-2] == 'a') {
- pm = 0;
+ pm = false;
} else if (p[len-2] == 'p') {
- pm = 1;
+ pm = true;
} else {
scan_err0(lc, _("Bad time specification."));
/* NOT REACHED */
}
} else {
- pm = 0;
+ pm = false;
}
code2 = atoi(p); /* pick up minutes */
+ /*
+ * Note, according to NIST, 12am and 12pm are ambiguous and
+ * can be defined to anything. However, 12:01am is the same
+ * as 00:01 and 12:01pm is the same as 12:01, so we define
+ * 12am as 00:00 and 12pm as 12:00.
+ */
if (pm) {
/* Convert to 24 hour time */
- if (code == 12) {
- code -= 12;
- } else {
+ if (code != 12) {
code += 12;
}
+ /* am */
+ } else if (code == 12) {
+ code -= 12;
}
if (code < 0 || code > 23 || code2 < 0 || code2 > 59) {
scan_err0(lc, _("Bad time specification."));
/* Get the session data size */
if (crypto_session_encode(jcr->pki_session, (uint8_t *)0, &size) == false) {
- Jmsg(jcr, M_FATAL, 0, _("An error occured while encrypting the stream.\n"));
+ Jmsg(jcr, M_FATAL, 0, _("An error occurred while encrypting the stream.\n"));
return 0;
}
/* Encode session data */
if (crypto_session_encode(jcr->pki_session, jcr->pki_session_encoded, &size) == false) {
- Jmsg(jcr, M_FATAL, 0, _("An error occured while encrypting the stream.\n"));
+ Jmsg(jcr, M_FATAL, 0, _("An error occurred while encrypting the stream.\n"));
return 0;
}
if (jcr->pki_sign) {
signing_digest = crypto_digest_new(signing_algorithm);
- /* Full-stop if a failure occured initializing the signature digest */
+ /* Full-stop if a failure occurred initializing the signature digest */
if (signing_digest == NULL) {
Jmsg(jcr, M_NOTSAVED, 0, _("%s signature digest initialization failed\n"),
stream_to_ascii(signing_algorithm));
/* Set up the encryption context, send the session data to the SD */
if (jcr->pki_encrypt) {
/* Send our header */
+ Dmsg2(100, "Send hdr fi=%ld stream=%d\n", jcr->JobFiles, STREAM_ENCRYPTED_SESSION_DATA);
bnet_fsend(sd, "%ld %d 0", jcr->JobFiles, STREAM_ENCRYPTED_SESSION_DATA);
/* Grow the bsock buffer to fit our message if necessary */
sd->msglen = jcr->pki_session_encoded_size;
jcr->JobBytes += sd->msglen;
+ Dmsg1(100, "Send data len=%d\n", sd->msglen);
bnet_send(sd);
bnet_sig(sd, BNET_EOD);
}
}
if (crypto_sign_add_signer(sig, signing_digest, jcr->pki_keypair) == false) {
- Jmsg(jcr, M_FATAL, 0, _("An error occured while signing the stream.\n"));
+ Jmsg(jcr, M_FATAL, 0, _("An error occurred while signing the stream.\n"));
return 0;
}
/* Get signature size */
if (crypto_sign_encode(sig, NULL, &size) == false) {
- Jmsg(jcr, M_FATAL, 0, _("An error occured while signing the stream.\n"));
+ Jmsg(jcr, M_FATAL, 0, _("An error occurred while signing the stream.\n"));
return 0;
}
/* Encode signature data */
if (crypto_sign_encode(sig, buf, &size) == false) {
- Jmsg(jcr, M_FATAL, 0, _("An error occured while signing the stream.\n"));
+ Jmsg(jcr, M_FATAL, 0, _("An error occurred while signing the stream.\n"));
return 0;
}
-/*
- * Bacula File Daemon Job processing
- *
- * Kern Sibbald, October MM
- *
- * Version $Id$
- *
- */
/*
Bacula® - The Network Backup Solution
(FSFE), Fiduciary Program, Sumatrastrasse 25, 8006 Zürich,
Switzerland, email:ftf@fsfeurope.org.
*/
+/*
+ * Bacula File Daemon Job processing
+ *
+ * Kern Sibbald, October MM
+ *
+ * Version $Id$
+ *
+ */
#include "bacula.h"
#include "filed.h"
* Accept commands one at a time from the Director
* and execute them.
*
+ * Concerning ClientRunBefore/After, the sequence of events
+ * is rather critical. If they are not done in the right
+ * order one can easily get FD->SD timeouts if the script
+ * runs a long time.
+ *
+ * The current sequence of events is:
+ * 1. Dir starts job with FD
+ * 2. Dir connects to SD
+ * 3. Dir connects to FD
+ * 4. FD connects to SD
+ * 5. FD gets/runs ClientRunBeforeJob and sends ClientRunAfterJob
+ * 6. Dir sends include/exclude
+ * 7. FD sends data to SD
+ * 8. SD/FD disconnects while SD despools data and attributes (optionnal)
+ * 9. FD runs ClientRunAfterJob
*/
+
void *handle_client_request(void *dirp)
{
int i;
break;
default:
/* Shouldn't happen */
- Jmsg1(jcr, M_ERROR, 0, _("An error occured while decoding encrypted session data stream: %s\n"), crypto_strerror(cryptoerr));
+ Jmsg1(jcr, M_ERROR, 0, _("An error occurred while decoding encrypted session data stream: %s\n"), crypto_strerror(cryptoerr));
break;
}
#undef VERSION
#define VERSION "2.1.4"
-#define BDATE "12 February 2007"
-#define LSMDATE "12Feb07"
+#define BDATE "16 February 2007"
+#define LSMDATE "16Feb07"
#define PROG_COPYRIGHT "Copyright (C) %d-2007 Free Software Foundation Europe e.V.\n"
#define BYEAR "2007" /* year for copyright messages in progs */
Technical notes on version 2.1
General:
+16Feb07
+kes Add FD event sequence order prepared by Eric -- for RunScripts.
+kes Fix 12am/pm bug as reported in bug #782.
13Feb07
kes Apply Eric's ClientRunScriptAfter patch to 2.0 and 2.1.
ebl Use btime_t instead of uint64_t in media patch.