summaryrefslogtreecommitdiffstats
path: root/storage/perfschema/table_replication_connection_configuration.cc
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-04 18:07:14 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-04 18:07:14 +0000
commita175314c3e5827eb193872241446f2f8f5c9d33c (patch)
treecd3d60ca99ae00829c52a6ca79150a5b6e62528b /storage/perfschema/table_replication_connection_configuration.cc
parentInitial commit. (diff)
downloadmariadb-10.5-a175314c3e5827eb193872241446f2f8f5c9d33c.tar.xz
mariadb-10.5-a175314c3e5827eb193872241446f2f8f5c9d33c.zip
Adding upstream version 1:10.5.12.upstream/1%10.5.12upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'storage/perfschema/table_replication_connection_configuration.cc')
-rw-r--r--storage/perfschema/table_replication_connection_configuration.cc333
1 files changed, 333 insertions, 0 deletions
diff --git a/storage/perfschema/table_replication_connection_configuration.cc b/storage/perfschema/table_replication_connection_configuration.cc
new file mode 100644
index 00000000..6d358240
--- /dev/null
+++ b/storage/perfschema/table_replication_connection_configuration.cc
@@ -0,0 +1,333 @@
+/*
+ Copyright (c) 2013, 2018, Oracle and/or its affiliates. All rights reserved.
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License, version 2.0,
+ as published by the Free Software Foundation.
+
+ This program is also distributed with certain software (including
+ but not limited to OpenSSL) that is licensed under separate terms,
+ as designated in a particular file or component or in included license
+ documentation. The authors of MySQL hereby grant you an additional
+ permission to link the program and your derivative works with the
+ separately licensed software that they have included with MySQL.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License, version 2.0, for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
+
+/**
+ @file storage/perfschema/table_replication_connection_configuration.cc
+ Table replication_connection_configuration (implementation).
+*/
+
+//#define HAVE_REPLICATION
+
+#include "my_global.h"
+#include "table_replication_connection_configuration.h"
+#include "pfs_instr_class.h"
+#include "pfs_instr.h"
+#include "slave.h"
+//#include "rpl_info.h"
+#include "rpl_rli.h"
+#include "rpl_mi.h"
+#include "sql_parse.h"
+//#include "rpl_msr.h" /* Multisource replciation */
+
+#ifdef HAVE_REPLICATION
+THR_LOCK table_replication_connection_configuration::m_table_lock;
+
+PFS_engine_table_share
+table_replication_connection_configuration::m_share=
+{
+ { C_STRING_WITH_LEN("replication_connection_configuration") },
+ &pfs_readonly_acl,
+ table_replication_connection_configuration::create,
+ NULL, /* write_row */
+ NULL, /* delete_all_rows */
+ table_replication_connection_configuration::get_row_count, /* records */
+ sizeof(pos_t), /* ref length */
+ &m_table_lock,
+ { C_STRING_WITH_LEN("CREATE TABLE replication_connection_configuration("
+ "CHANNEL_NAME CHAR(64) collate utf8_general_ci not null,"
+ "HOST CHAR(60) collate utf8_bin not null,"
+ "PORT INTEGER not null,"
+ "USER CHAR(32) collate utf8_bin not null,"
+ "NETWORK_INTERFACE CHAR(60) collate utf8_bin not null,"
+ "AUTO_POSITION ENUM('1','0') not null,"
+ "SSL_ALLOWED ENUM('YES','NO','IGNORED') not null,"
+ "SSL_CA_FILE VARCHAR(512) not null,"
+ "SSL_CA_PATH VARCHAR(512) not null,"
+ "SSL_CERTIFICATE VARCHAR(512) not null,"
+ "SSL_CIPHER VARCHAR(512) not null,"
+ "SSL_KEY VARCHAR(512) not null,"
+ "SSL_VERIFY_SERVER_CERTIFICATE ENUM('YES','NO') not null,"
+ "SSL_CRL_FILE VARCHAR(255) not null,"
+ "SSL_CRL_PATH VARCHAR(255) not null,"
+ "CONNECTION_RETRY_INTERVAL INTEGER not null,"
+ "CONNECTION_RETRY_COUNT BIGINT unsigned not null,"
+ "HEARTBEAT_INTERVAL DOUBLE(10,3) unsigned not null COMMENT 'Number of seconds after which a heartbeat will be sent .',"
+ "TLS_VERSION VARCHAR(255) not null)") },
+ false /* perpetual */
+};
+
+
+PFS_engine_table* table_replication_connection_configuration::create(void)
+{
+ return new table_replication_connection_configuration();
+}
+
+table_replication_connection_configuration
+ ::table_replication_connection_configuration()
+ : PFS_engine_table(&m_share, &m_pos),
+ m_row_exists(false), m_pos(0), m_next_pos(0)
+{}
+
+table_replication_connection_configuration
+ ::~table_replication_connection_configuration()
+{}
+
+void table_replication_connection_configuration::reset_position(void)
+{
+ m_pos.m_index= 0;
+ m_next_pos.m_index= 0;
+}
+
+ha_rows table_replication_connection_configuration::get_row_count()
+{
+ /*
+ We actually give the MAX_CHANNELS rather than the current
+ number of channels
+ */
+
+ return master_info_index->master_info_hash.records;
+}
+
+int table_replication_connection_configuration::rnd_next(void)
+{
+ Master_info *mi;
+
+ mysql_mutex_lock(&LOCK_active_mi);
+
+ for (m_pos.set_at(&m_next_pos);
+ m_pos.m_index < master_info_index->master_info_hash.records;
+ m_pos.next())
+ {
+ mi= (Master_info *)my_hash_element(&master_info_index->master_info_hash, m_pos.m_index);
+
+ if (mi && mi->host[0])
+ {
+ make_row(mi);
+ m_next_pos.set_after(&m_pos);
+ mysql_mutex_unlock(&LOCK_active_mi);
+ return 0;
+ }
+ }
+
+ mysql_mutex_unlock(&LOCK_active_mi);
+ return HA_ERR_END_OF_FILE;
+}
+
+int table_replication_connection_configuration::rnd_pos(const void *pos)
+{
+ Master_info *mi;
+ int res= HA_ERR_RECORD_DELETED;
+
+ mysql_mutex_lock(&LOCK_active_mi);
+
+ set_position(pos);
+
+ if ((mi= (Master_info *)my_hash_element(&master_info_index->master_info_hash, m_pos.m_index)))
+ {
+ make_row(mi);
+ res= 0;
+ }
+
+ mysql_mutex_unlock(&LOCK_active_mi);
+ return res;
+}
+
+void table_replication_connection_configuration::make_row(Master_info *mi)
+{
+ char * temp_store;
+
+ m_row_exists= false;
+
+
+ DBUG_ASSERT(mi != NULL);
+
+ mysql_mutex_lock(&mi->data_lock);
+ mysql_mutex_lock(&mi->rli.data_lock);
+
+ m_row.channel_name_length= static_cast<uint>(mi->connection_name.length);
+ memcpy(m_row.channel_name, mi->connection_name.str, m_row.channel_name_length);
+
+ m_row.host_length= static_cast<uint>(strlen(mi->host));
+ memcpy(m_row.host, mi->host, m_row.host_length);
+
+ m_row.port= (unsigned int) mi->port;
+
+ /* can't the user be NULL? */
+ temp_store= (char*)mi->user;
+ m_row.user_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.user, temp_store, m_row.user_length);
+
+ temp_store= const_cast<char*>(""); //(char*)mi->bind_addr;
+ m_row.network_interface_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.network_interface, temp_store, m_row.network_interface_length);
+
+ if (mi->using_gtid)
+ m_row.auto_position= PS_RPL_YES;
+ else
+ m_row.auto_position= PS_RPL_NO;
+
+#ifdef HAVE_OPENSSL
+ m_row.ssl_allowed= mi->ssl? PS_SSL_ALLOWED_YES:PS_SSL_ALLOWED_NO;
+#else
+ m_row.ssl_allowed= mi->ssl? PS_SSL_ALLOWED_IGNORED:PS_SSL_ALLOWED_NO;
+#endif
+
+ temp_store= (char*)mi->ssl_ca;
+ m_row.ssl_ca_file_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.ssl_ca_file, temp_store, m_row.ssl_ca_file_length);
+
+ temp_store= (char*)mi->ssl_capath;
+ m_row.ssl_ca_path_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.ssl_ca_path, temp_store, m_row.ssl_ca_path_length);
+
+ temp_store= (char*)mi->ssl_cert;
+ m_row.ssl_certificate_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.ssl_certificate, temp_store, m_row.ssl_certificate_length);
+
+ temp_store= (char*)mi->ssl_cipher;
+ m_row.ssl_cipher_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.ssl_cipher, temp_store, m_row.ssl_cipher_length);
+
+ temp_store= (char*)mi->ssl_key;
+ m_row.ssl_key_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.ssl_key, temp_store, m_row.ssl_key_length);
+
+ if (mi->ssl_verify_server_cert)
+ m_row.ssl_verify_server_certificate= PS_RPL_YES;
+ else
+ m_row.ssl_verify_server_certificate= PS_RPL_NO;
+
+ temp_store= (char*)mi->ssl_crl;
+ m_row.ssl_crl_file_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.ssl_crl_file, temp_store, m_row.ssl_crl_file_length);
+
+ temp_store= (char*)mi->ssl_crlpath;
+ m_row.ssl_crl_path_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.ssl_crl_path, temp_store, m_row.ssl_crl_path_length);
+
+ m_row.connection_retry_interval= (unsigned int) mi->connect_retry;
+
+ m_row.connection_retry_count= 0; //(ulong) mi->retry_count;
+
+ m_row.heartbeat_interval= (double)mi->heartbeat_period;
+
+ temp_store= (char*)""; //mi->tls_version;
+ m_row.tls_version_length= static_cast<uint>(strlen(temp_store));
+ memcpy(m_row.tls_version, temp_store, m_row.tls_version_length);
+
+ mysql_mutex_unlock(&mi->rli.data_lock);
+ mysql_mutex_unlock(&mi->data_lock);
+
+ m_row_exists= true;
+}
+
+int table_replication_connection_configuration::read_row_values(TABLE *table,
+ unsigned char *,
+ Field **fields,
+ bool read_all)
+{
+ Field *f;
+
+ if (unlikely(! m_row_exists))
+ return HA_ERR_RECORD_DELETED;
+
+ DBUG_ASSERT(table->s->null_bytes == 0);
+
+ for (; (f= *fields) ; fields++)
+ {
+ if (read_all || bitmap_is_set(table->read_set, f->field_index))
+ {
+ switch(f->field_index)
+ {
+ case 0: /** channel_name */
+ set_field_char_utf8(f, m_row.channel_name, m_row.channel_name_length);
+ break;
+ case 1: /** host */
+ set_field_char_utf8(f, m_row.host, m_row.host_length);
+ break;
+ case 2: /** port */
+ set_field_ulong(f, m_row.port);
+ break;
+ case 3: /** user */
+ set_field_char_utf8(f, m_row.user, m_row.user_length);
+ break;
+ case 4: /** network_interface */
+ set_field_char_utf8(f, m_row.network_interface,
+ m_row.network_interface_length);
+ break;
+ case 5: /** auto_position */
+ set_field_enum(f, m_row.auto_position);
+ break;
+ case 6: /** ssl_allowed */
+ set_field_enum(f, m_row. ssl_allowed);
+ break;
+ case 7: /**ssl_ca_file */
+ set_field_varchar_utf8(f, m_row.ssl_ca_file,
+ m_row.ssl_ca_file_length);
+ break;
+ case 8: /** ssl_ca_path */
+ set_field_varchar_utf8(f, m_row.ssl_ca_path,
+ m_row.ssl_ca_path_length);
+ break;
+ case 9: /** ssl_certificate */
+ set_field_varchar_utf8(f, m_row.ssl_certificate,
+ m_row.ssl_certificate_length);
+ break;
+ case 10: /** ssl_cipher */
+ set_field_varchar_utf8(f, m_row.ssl_cipher, m_row.ssl_cipher_length);
+ break;
+ case 11: /** ssl_key */
+ set_field_varchar_utf8(f, m_row.ssl_key, m_row.ssl_key_length);
+ break;
+ case 12: /** ssl_verify_server_certificate */
+ set_field_enum(f, m_row.ssl_verify_server_certificate);
+ break;
+ case 13: /** ssl_crl_file */
+ set_field_varchar_utf8(f, m_row.ssl_crl_file,
+ m_row.ssl_crl_file_length);
+ break;
+ case 14: /** ssl_crl_path */
+ set_field_varchar_utf8(f, m_row.ssl_crl_path,
+ m_row.ssl_crl_path_length);
+ break;
+ case 15: /** connection_retry_interval */
+ set_field_ulong(f, m_row.connection_retry_interval);
+ break;
+ case 16: /** connect_retry_count */
+ set_field_ulonglong(f, m_row.connection_retry_count);
+ break;
+ case 17:/** number of seconds after which heartbeat will be sent */
+ set_field_double(f, m_row.heartbeat_interval);
+ break;
+ case 18: /** tls_version */
+ set_field_varchar_utf8(f, m_row.tls_version,
+ m_row.tls_version_length);
+ break;
+ default:
+ DBUG_ASSERT(false);
+ }
+ }
+ }
+ return 0;
+}
+#endif