diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-04 12:15:05 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-04 12:15:05 +0000 |
commit | 46651ce6fe013220ed397add242004d764fc0153 (patch) | |
tree | 6e5299f990f88e60174a1d3ae6e48eedd2688b2b /src/bin/initdb/initdb.c | |
parent | Initial commit. (diff) | |
download | postgresql-14-46651ce6fe013220ed397add242004d764fc0153.tar.xz postgresql-14-46651ce6fe013220ed397add242004d764fc0153.zip |
Adding upstream version 14.5.upstream/14.5upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/bin/initdb/initdb.c')
-rw-r--r-- | src/bin/initdb/initdb.c | 3282 |
1 files changed, 3282 insertions, 0 deletions
diff --git a/src/bin/initdb/initdb.c b/src/bin/initdb/initdb.c new file mode 100644 index 0000000..77e621a --- /dev/null +++ b/src/bin/initdb/initdb.c @@ -0,0 +1,3282 @@ +/*------------------------------------------------------------------------- + * + * initdb --- initialize a PostgreSQL installation + * + * initdb creates (initializes) a PostgreSQL database cluster (site, + * instance, installation, whatever). A database cluster is a + * collection of PostgreSQL databases all managed by the same server. + * + * To create the database cluster, we create the directory that contains + * all its data, create the files that hold the global tables, create + * a few other control files for it, and create three databases: the + * template databases "template0" and "template1", and a default user + * database "postgres". + * + * The template databases are ordinary PostgreSQL databases. template0 + * is never supposed to change after initdb, whereas template1 can be + * changed to add site-local standard data. Either one can be copied + * to produce a new database. + * + * For largely-historical reasons, the template1 database is the one built + * by the basic bootstrap process. After it is complete, template0 and + * the default database, postgres, are made just by copying template1. + * + * To create template1, we run the postgres (backend) program in bootstrap + * mode and feed it data from the postgres.bki library file. After this + * initial bootstrap phase, some additional stuff is created by normal + * SQL commands fed to a standalone backend. Some of those commands are + * just embedded into this program (yeah, it's ugly), but larger chunks + * are taken from script files. + * + * + * Note: + * The program has some memory leakage - it isn't worth cleaning it up. + * + * This is a C implementation of the previous shell script for setting up a + * PostgreSQL cluster location, and should be highly compatible with it. + * author of C translation: Andrew Dunstan mailto:andrew@dunslane.net + * + * This code is released under the terms of the PostgreSQL License. + * + * Portions Copyright (c) 1996-2021, PostgreSQL Global Development Group + * Portions Copyright (c) 1994, Regents of the University of California + * + * src/bin/initdb/initdb.c + * + *------------------------------------------------------------------------- + */ + +#include "postgres_fe.h" + +#include <dirent.h> +#include <fcntl.h> +#include <sys/stat.h> +#include <unistd.h> +#include <signal.h> +#include <time.h> + +#ifdef HAVE_SHM_OPEN +#include "sys/mman.h" +#endif + +#include "access/xlog_internal.h" +#include "catalog/pg_authid_d.h" +#include "catalog/pg_class_d.h" /* pgrminclude ignore */ +#include "catalog/pg_collation_d.h" +#include "common/file_perm.h" +#include "common/file_utils.h" +#include "common/logging.h" +#include "common/restricted_token.h" +#include "common/string.h" +#include "common/username.h" +#include "fe_utils/string_utils.h" +#include "getaddrinfo.h" +#include "getopt_long.h" +#include "mb/pg_wchar.h" +#include "miscadmin.h" + + +/* Ideally this would be in a .h file, but it hardly seems worth the trouble */ +extern const char *select_default_timezone(const char *share_path); + +static const char *const auth_methods_host[] = { + "trust", "reject", "scram-sha-256", "md5", "password", "ident", "radius", +#ifdef ENABLE_GSS + "gss", +#endif +#ifdef ENABLE_SSPI + "sspi", +#endif +#ifdef USE_PAM + "pam", "pam ", +#endif +#ifdef USE_BSD_AUTH + "bsd", +#endif +#ifdef USE_LDAP + "ldap", +#endif +#ifdef USE_SSL + "cert", +#endif + NULL +}; +static const char *const auth_methods_local[] = { + "trust", "reject", "scram-sha-256", "md5", "password", "peer", "radius", +#ifdef USE_PAM + "pam", "pam ", +#endif +#ifdef USE_BSD_AUTH + "bsd", +#endif +#ifdef USE_LDAP + "ldap", +#endif + NULL +}; + +/* + * these values are passed in by makefile defines + */ +static char *share_path = NULL; + +/* values to be obtained from arguments */ +static char *pg_data = NULL; +static char *encoding = NULL; +static char *locale = NULL; +static char *lc_collate = NULL; +static char *lc_ctype = NULL; +static char *lc_monetary = NULL; +static char *lc_numeric = NULL; +static char *lc_time = NULL; +static char *lc_messages = NULL; +static const char *default_text_search_config = NULL; +static char *username = NULL; +static bool pwprompt = false; +static char *pwfilename = NULL; +static char *superuser_password = NULL; +static const char *authmethodhost = NULL; +static const char *authmethodlocal = NULL; +static bool debug = false; +static bool noclean = false; +static bool noinstructions = false; +static bool do_sync = true; +static bool sync_only = false; +static bool show_setting = false; +static bool data_checksums = false; +static char *xlog_dir = NULL; +static char *str_wal_segment_size_mb = NULL; +static int wal_segment_size_mb; + + +/* internal vars */ +static const char *progname; +static int encodingid; +static char *bki_file; +static char *hba_file; +static char *ident_file; +static char *conf_file; +static char *dictionary_file; +static char *info_schema_file; +static char *features_file; +static char *system_constraints_file; +static char *system_functions_file; +static char *system_views_file; +static bool success = false; +static bool made_new_pgdata = false; +static bool found_existing_pgdata = false; +static bool made_new_xlogdir = false; +static bool found_existing_xlogdir = false; +static char infoversion[100]; +static bool caught_signal = false; +static bool output_failed = false; +static int output_errno = 0; +static char *pgdata_native; + +/* defaults */ +static int n_connections = 10; +static int n_buffers = 50; +static const char *dynamic_shared_memory_type = NULL; +static const char *default_timezone = NULL; + +/* + * Warning messages for authentication methods + */ +#define AUTHTRUST_WARNING \ +"# CAUTION: Configuring the system for local \"trust\" authentication\n" \ +"# allows any local user to connect as any PostgreSQL user, including\n" \ +"# the database superuser. If you do not trust all your local users,\n" \ +"# use another authentication method.\n" +static bool authwarning = false; + +/* + * Centralized knowledge of switches to pass to backend + * + * Note: we run the backend with -F (fsync disabled) and then do a single + * pass of fsync'ing at the end. This is faster than fsync'ing each step. + * + * Note: in the shell-script version, we also passed PGDATA as a -D switch, + * but here it is more convenient to pass it as an environment variable + * (no quoting to worry about). + */ +static const char *boot_options = "-F"; +static const char *backend_options = "--single -F -O -j -c search_path=pg_catalog -c exit_on_error=true"; + +/* Additional switches to pass to backend (either boot or standalone) */ +static char *extra_options = ""; + +static const char *const subdirs[] = { + "global", + "pg_wal/archive_status", + "pg_commit_ts", + "pg_dynshmem", + "pg_notify", + "pg_serial", + "pg_snapshots", + "pg_subtrans", + "pg_twophase", + "pg_multixact", + "pg_multixact/members", + "pg_multixact/offsets", + "base", + "base/1", + "pg_replslot", + "pg_tblspc", + "pg_stat", + "pg_stat_tmp", + "pg_xact", + "pg_logical", + "pg_logical/snapshots", + "pg_logical/mappings" +}; + + +/* path to 'initdb' binary directory */ +static char bin_path[MAXPGPATH]; +static char backend_exec[MAXPGPATH]; + +static char **replace_token(char **lines, + const char *token, const char *replacement); + +#ifndef HAVE_UNIX_SOCKETS +static char **filter_lines_with_token(char **lines, const char *token); +#endif +static char **readfile(const char *path); +static void writefile(char *path, char **lines); +static FILE *popen_check(const char *command, const char *mode); +static char *get_id(void); +static int get_encoding_id(const char *encoding_name); +static void set_input(char **dest, const char *filename); +static void check_input(char *path); +static void write_version_file(const char *extrapath); +static void set_null_conf(void); +static void test_config_settings(void); +static void setup_config(void); +static void bootstrap_template1(void); +static void setup_auth(FILE *cmdfd); +static void get_su_pwd(void); +static void setup_depend(FILE *cmdfd); +static void setup_run_file(FILE *cmdfd, const char *filename); +static void setup_description(FILE *cmdfd); +static void setup_collation(FILE *cmdfd); +static void setup_privileges(FILE *cmdfd); +static void set_info_version(void); +static void setup_schema(FILE *cmdfd); +static void load_plpgsql(FILE *cmdfd); +static void vacuum_db(FILE *cmdfd); +static void make_template0(FILE *cmdfd); +static void make_postgres(FILE *cmdfd); +static void trapsig(int signum); +static void check_ok(void); +static char *escape_quotes(const char *src); +static char *escape_quotes_bki(const char *src); +static int locale_date_order(const char *locale); +static void check_locale_name(int category, const char *locale, + char **canonname); +static bool check_locale_encoding(const char *locale, int encoding); +static void setlocales(void); +static void usage(const char *progname); +void setup_pgdata(void); +void setup_bin_paths(const char *argv0); +void setup_data_file_paths(void); +void setup_locale_encoding(void); +void setup_signals(void); +void setup_text_search(void); +void create_data_directory(void); +void create_xlog_or_symlink(void); +void warn_on_mount_point(int error); +void initialize_data_directory(void); + +/* + * macros for running pipes to postgres + */ +#define PG_CMD_DECL char cmd[MAXPGPATH]; FILE *cmdfd + +#define PG_CMD_OPEN \ +do { \ + cmdfd = popen_check(cmd, "w"); \ + if (cmdfd == NULL) \ + exit(1); /* message already printed by popen_check */ \ +} while (0) + +#define PG_CMD_CLOSE \ +do { \ + if (pclose_check(cmdfd)) \ + exit(1); /* message already printed by pclose_check */ \ +} while (0) + +#define PG_CMD_PUTS(line) \ +do { \ + if (fputs(line, cmdfd) < 0 || fflush(cmdfd) < 0) \ + output_failed = true, output_errno = errno; \ +} while (0) + +#define PG_CMD_PRINTF(fmt, ...) \ +do { \ + if (fprintf(cmdfd, fmt, __VA_ARGS__) < 0 || fflush(cmdfd) < 0) \ + output_failed = true, output_errno = errno; \ +} while (0) + +/* + * Escape single quotes and backslashes, suitably for insertions into + * configuration files or SQL E'' strings. + */ +static char * +escape_quotes(const char *src) +{ + char *result = escape_single_quotes_ascii(src); + + if (!result) + { + pg_log_error("out of memory"); + exit(1); + } + return result; +} + +/* + * Escape a field value to be inserted into the BKI data. + * Run the value through escape_quotes (which will be inverted + * by the backend's DeescapeQuotedString() function), then wrap + * the value in single quotes, even if that isn't strictly necessary. + */ +static char * +escape_quotes_bki(const char *src) +{ + char *result; + char *data = escape_quotes(src); + char *resultp; + char *datap; + + result = (char *) pg_malloc(strlen(data) + 3); + resultp = result; + *resultp++ = '\''; + for (datap = data; *datap; datap++) + *resultp++ = *datap; + *resultp++ = '\''; + *resultp = '\0'; + + free(data); + return result; +} + +/* + * make a copy of the array of lines, with token replaced by replacement + * the first time it occurs on each line. + * + * This does most of what sed was used for in the shell script, but + * doesn't need any regexp stuff. + */ +static char ** +replace_token(char **lines, const char *token, const char *replacement) +{ + int numlines = 1; + int i; + char **result; + int toklen, + replen, + diff; + + for (i = 0; lines[i]; i++) + numlines++; + + result = (char **) pg_malloc(numlines * sizeof(char *)); + + toklen = strlen(token); + replen = strlen(replacement); + diff = replen - toklen; + + for (i = 0; i < numlines; i++) + { + char *where; + char *newline; + int pre; + + /* just copy pointer if NULL or no change needed */ + if (lines[i] == NULL || (where = strstr(lines[i], token)) == NULL) + { + result[i] = lines[i]; + continue; + } + + /* if we get here a change is needed - set up new line */ + + newline = (char *) pg_malloc(strlen(lines[i]) + diff + 1); + + pre = where - lines[i]; + + memcpy(newline, lines[i], pre); + + memcpy(newline + pre, replacement, replen); + + strcpy(newline + pre + replen, lines[i] + pre + toklen); + + result[i] = newline; + } + + return result; +} + +/* + * make a copy of lines without any that contain the token + * + * a sort of poor man's grep -v + */ +#ifndef HAVE_UNIX_SOCKETS +static char ** +filter_lines_with_token(char **lines, const char *token) +{ + int numlines = 1; + int i, + src, + dst; + char **result; + + for (i = 0; lines[i]; i++) + numlines++; + + result = (char **) pg_malloc(numlines * sizeof(char *)); + + for (src = 0, dst = 0; src < numlines; src++) + { + if (lines[src] == NULL || strstr(lines[src], token) == NULL) + result[dst++] = lines[src]; + } + + return result; +} +#endif + +/* + * get the lines from a text file + */ +static char ** +readfile(const char *path) +{ + char **result; + FILE *infile; + StringInfoData line; + int maxlines; + int n; + + if ((infile = fopen(path, "r")) == NULL) + { + pg_log_error("could not open file \"%s\" for reading: %m", path); + exit(1); + } + + initStringInfo(&line); + + maxlines = 1024; + result = (char **) pg_malloc(maxlines * sizeof(char *)); + + n = 0; + while (pg_get_line_buf(infile, &line)) + { + /* make sure there will be room for a trailing NULL pointer */ + if (n >= maxlines - 1) + { + maxlines *= 2; + result = (char **) pg_realloc(result, maxlines * sizeof(char *)); + } + + result[n++] = pg_strdup(line.data); + } + result[n] = NULL; + + pfree(line.data); + + fclose(infile); + + return result; +} + +/* + * write an array of lines to a file + * + * This is only used to write text files. Use fopen "w" not PG_BINARY_W + * so that the resulting configuration files are nicely editable on Windows. + */ +static void +writefile(char *path, char **lines) +{ + FILE *out_file; + char **line; + + if ((out_file = fopen(path, "w")) == NULL) + { + pg_log_error("could not open file \"%s\" for writing: %m", path); + exit(1); + } + for (line = lines; *line != NULL; line++) + { + if (fputs(*line, out_file) < 0) + { + pg_log_error("could not write file \"%s\": %m", path); + exit(1); + } + free(*line); + } + if (fclose(out_file)) + { + pg_log_error("could not write file \"%s\": %m", path); + exit(1); + } +} + +/* + * Open a subcommand with suitable error messaging + */ +static FILE * +popen_check(const char *command, const char *mode) +{ + FILE *cmdfd; + + fflush(stdout); + fflush(stderr); + errno = 0; + cmdfd = popen(command, mode); + if (cmdfd == NULL) + pg_log_error("could not execute command \"%s\": %m", command); + return cmdfd; +} + +/* + * clean up any files we created on failure + * if we created the data directory remove it too + */ +static void +cleanup_directories_atexit(void) +{ + if (success) + return; + + if (!noclean) + { + if (made_new_pgdata) + { + pg_log_info("removing data directory \"%s\"", pg_data); + if (!rmtree(pg_data, true)) + pg_log_error("failed to remove data directory"); + } + else if (found_existing_pgdata) + { + pg_log_info("removing contents of data directory \"%s\"", + pg_data); + if (!rmtree(pg_data, false)) + pg_log_error("failed to remove contents of data directory"); + } + + if (made_new_xlogdir) + { + pg_log_info("removing WAL directory \"%s\"", xlog_dir); + if (!rmtree(xlog_dir, true)) + pg_log_error("failed to remove WAL directory"); + } + else if (found_existing_xlogdir) + { + pg_log_info("removing contents of WAL directory \"%s\"", xlog_dir); + if (!rmtree(xlog_dir, false)) + pg_log_error("failed to remove contents of WAL directory"); + } + /* otherwise died during startup, do nothing! */ + } + else + { + if (made_new_pgdata || found_existing_pgdata) + pg_log_info("data directory \"%s\" not removed at user's request", + pg_data); + + if (made_new_xlogdir || found_existing_xlogdir) + pg_log_info("WAL directory \"%s\" not removed at user's request", + xlog_dir); + } +} + +/* + * find the current user + * + * on unix make sure it isn't root + */ +static char * +get_id(void) +{ + const char *username; + +#ifndef WIN32 + if (geteuid() == 0) /* 0 is root's uid */ + { + pg_log_error("cannot be run as root"); + fprintf(stderr, + _("Please log in (using, e.g., \"su\") as the (unprivileged) user that will\n" + "own the server process.\n")); + exit(1); + } +#endif + + username = get_user_name_or_exit(progname); + + return pg_strdup(username); +} + +static char * +encodingid_to_string(int enc) +{ + char result[20]; + + sprintf(result, "%d", enc); + return pg_strdup(result); +} + +/* + * get the encoding id for a given encoding name + */ +static int +get_encoding_id(const char *encoding_name) +{ + int enc; + + if (encoding_name && *encoding_name) + { + if ((enc = pg_valid_server_encoding(encoding_name)) >= 0) + return enc; + } + pg_log_error("\"%s\" is not a valid server encoding name", + encoding_name ? encoding_name : "(null)"); + exit(1); +} + +/* + * Support for determining the best default text search configuration. + * We key this off the first part of LC_CTYPE (ie, the language name). + */ +struct tsearch_config_match +{ + const char *tsconfname; + const char *langname; +}; + +static const struct tsearch_config_match tsearch_config_languages[] = +{ + {"arabic", "ar"}, + {"arabic", "Arabic"}, + {"armenian", "hy"}, + {"armenian", "Armenian"}, + {"basque", "eu"}, + {"basque", "Basque"}, + {"catalan", "ca"}, + {"catalan", "Catalan"}, + {"danish", "da"}, + {"danish", "Danish"}, + {"dutch", "nl"}, + {"dutch", "Dutch"}, + {"english", "C"}, + {"english", "POSIX"}, + {"english", "en"}, + {"english", "English"}, + {"finnish", "fi"}, + {"finnish", "Finnish"}, + {"french", "fr"}, + {"french", "French"}, + {"german", "de"}, + {"german", "German"}, + {"greek", "el"}, + {"greek", "Greek"}, + {"hindi", "hi"}, + {"hindi", "Hindi"}, + {"hungarian", "hu"}, + {"hungarian", "Hungarian"}, + {"indonesian", "id"}, + {"indonesian", "Indonesian"}, + {"irish", "ga"}, + {"irish", "Irish"}, + {"italian", "it"}, + {"italian", "Italian"}, + {"lithuanian", "lt"}, + {"lithuanian", "Lithuanian"}, + {"nepali", "ne"}, + {"nepali", "Nepali"}, + {"norwegian", "no"}, + {"norwegian", "Norwegian"}, + {"portuguese", "pt"}, + {"portuguese", "Portuguese"}, + {"romanian", "ro"}, + {"russian", "ru"}, + {"russian", "Russian"}, + {"serbian", "sr"}, + {"serbian", "Serbian"}, + {"spanish", "es"}, + {"spanish", "Spanish"}, + {"swedish", "sv"}, + {"swedish", "Swedish"}, + {"tamil", "ta"}, + {"tamil", "Tamil"}, + {"turkish", "tr"}, + {"turkish", "Turkish"}, + {"yiddish", "yi"}, + {"yiddish", "Yiddish"}, + {NULL, NULL} /* end marker */ +}; + +/* + * Look for a text search configuration matching lc_ctype, and return its + * name; return NULL if no match. + */ +static const char * +find_matching_ts_config(const char *lc_type) +{ + int i; + char *langname, + *ptr; + + /* + * Convert lc_ctype to a language name by stripping everything after an + * underscore (usual case) or a hyphen (Windows "locale name"; see + * comments at IsoLocaleName()). + * + * XXX Should ' ' be a stop character? This would select "norwegian" for + * the Windows locale "Norwegian (Nynorsk)_Norway.1252". If we do so, we + * should also accept the "nn" and "nb" Unix locales. + * + * Just for paranoia, we also stop at '.' or '@'. + */ + if (lc_type == NULL) + langname = pg_strdup(""); + else + { + ptr = langname = pg_strdup(lc_type); + while (*ptr && + *ptr != '_' && *ptr != '-' && *ptr != '.' && *ptr != '@') + ptr++; + *ptr = '\0'; + } + + for (i = 0; tsearch_config_languages[i].tsconfname; i++) + { + if (pg_strcasecmp(tsearch_config_languages[i].langname, langname) == 0) + { + free(langname); + return tsearch_config_languages[i].tsconfname; + } + } + + free(langname); + return NULL; +} + + +/* + * set name of given input file variable under data directory + */ +static void +set_input(char **dest, const char *filename) +{ + *dest = psprintf("%s/%s", share_path, filename); +} + +/* + * check that given input file exists + */ +static void +check_input(char *path) +{ + struct stat statbuf; + + if (stat(path, &statbuf) != 0) + { + if (errno == ENOENT) + { + pg_log_error("file \"%s\" does not exist", path); + fprintf(stderr, + _("This might mean you have a corrupted installation or identified\n" + "the wrong directory with the invocation option -L.\n")); + } + else + { + pg_log_error("could not access file \"%s\": %m", path); + fprintf(stderr, + _("This might mean you have a corrupted installation or identified\n" + "the wrong directory with the invocation option -L.\n")); + } + exit(1); + } + if (!S_ISREG(statbuf.st_mode)) + { + pg_log_error("file \"%s\" is not a regular file", path); + fprintf(stderr, + _("This might mean you have a corrupted installation or identified\n" + "the wrong directory with the invocation option -L.\n")); + exit(1); + } +} + +/* + * write out the PG_VERSION file in the data dir, or its subdirectory + * if extrapath is not NULL + */ +static void +write_version_file(const char *extrapath) +{ + FILE *version_file; + char *path; + + if (extrapath == NULL) + path = psprintf("%s/PG_VERSION", pg_data); + else + path = psprintf("%s/%s/PG_VERSION", pg_data, extrapath); + + if ((version_file = fopen(path, PG_BINARY_W)) == NULL) + { + pg_log_error("could not open file \"%s\" for writing: %m", path); + exit(1); + } + if (fprintf(version_file, "%s\n", PG_MAJORVERSION) < 0 || + fclose(version_file)) + { + pg_log_error("could not write file \"%s\": %m", path); + exit(1); + } + free(path); +} + +/* + * set up an empty config file so we can check config settings by launching + * a test backend + */ +static void +set_null_conf(void) +{ + FILE *conf_file; + char *path; + + path = psprintf("%s/postgresql.conf", pg_data); + conf_file = fopen(path, PG_BINARY_W); + if (conf_file == NULL) + { + pg_log_error("could not open file \"%s\" for writing: %m", path); + exit(1); + } + if (fclose(conf_file)) + { + pg_log_error("could not write file \"%s\": %m", path); + exit(1); + } + free(path); +} + +/* + * Determine which dynamic shared memory implementation should be used on + * this platform. POSIX shared memory is preferable because the default + * allocation limits are much higher than the limits for System V on most + * systems that support both, but the fact that a platform has shm_open + * doesn't guarantee that that call will succeed when attempted. So, we + * attempt to reproduce what the postmaster will do when allocating a POSIX + * segment in dsm_impl.c; if it doesn't work, we assume it won't work for + * the postmaster either, and configure the cluster for System V shared + * memory instead. + */ +static const char * +choose_dsm_implementation(void) +{ +#ifdef HAVE_SHM_OPEN + int ntries = 10; + + /* Initialize random(); this function is its only user in this program. */ + srandom((unsigned int) (getpid() ^ time(NULL))); + + while (ntries > 0) + { + uint32 handle; + char name[64]; + int fd; + + handle = random(); + snprintf(name, 64, "/PostgreSQL.%u", handle); + if ((fd = shm_open(name, O_CREAT | O_RDWR | O_EXCL, 0600)) != -1) + { + close(fd); + shm_unlink(name); + return "posix"; + } + if (errno != EEXIST) + break; + --ntries; + } +#endif + +#ifdef WIN32 + return "windows"; +#else + return "sysv"; +#endif +} + +/* + * Determine platform-specific config settings + * + * Use reasonable values if kernel will let us, else scale back. + */ +static void +test_config_settings(void) +{ + /* + * This macro defines the minimum shared_buffers we want for a given + * max_connections value. The arrays show the settings to try. + */ +#define MIN_BUFS_FOR_CONNS(nconns) ((nconns) * 10) + + static const int trial_conns[] = { + 100, 50, 40, 30, 20 + }; + static const int trial_bufs[] = { + 16384, 8192, 4096, 3584, 3072, 2560, 2048, 1536, + 1000, 900, 800, 700, 600, 500, + 400, 300, 200, 100, 50 + }; + + char cmd[MAXPGPATH]; + const int connslen = sizeof(trial_conns) / sizeof(int); + const int bufslen = sizeof(trial_bufs) / sizeof(int); + int i, + status, + test_conns, + test_buffs, + ok_buffers = 0; + + /* + * Need to determine working DSM implementation first so that subsequent + * tests don't fail because DSM setting doesn't work. + */ + printf(_("selecting dynamic shared memory implementation ... ")); + fflush(stdout); + dynamic_shared_memory_type = choose_dsm_implementation(); + printf("%s\n", dynamic_shared_memory_type); + + /* + * Probe for max_connections before shared_buffers, since it is subject to + * more constraints than shared_buffers. + */ + printf(_("selecting default max_connections ... ")); + fflush(stdout); + + for (i = 0; i < connslen; i++) + { + test_conns = trial_conns[i]; + test_buffs = MIN_BUFS_FOR_CONNS(test_conns); + + snprintf(cmd, sizeof(cmd), + "\"%s\" --boot -x0 %s %s " + "-c max_connections=%d " + "-c shared_buffers=%d " + "-c dynamic_shared_memory_type=%s " + "< \"%s\" > \"%s\" 2>&1", + backend_exec, boot_options, extra_options, + test_conns, test_buffs, + dynamic_shared_memory_type, + DEVNULL, DEVNULL); + status = system(cmd); + if (status == 0) + { + ok_buffers = test_buffs; + break; + } + } + if (i >= connslen) + i = connslen - 1; + n_connections = trial_conns[i]; + + printf("%d\n", n_connections); + + printf(_("selecting default shared_buffers ... ")); + fflush(stdout); + + for (i = 0; i < bufslen; i++) + { + /* Use same amount of memory, independent of BLCKSZ */ + test_buffs = (trial_bufs[i] * 8192) / BLCKSZ; + if (test_buffs <= ok_buffers) + { + test_buffs = ok_buffers; + break; + } + + snprintf(cmd, sizeof(cmd), + "\"%s\" --boot -x0 %s %s " + "-c max_connections=%d " + "-c shared_buffers=%d " + "-c dynamic_shared_memory_type=%s " + "< \"%s\" > \"%s\" 2>&1", + backend_exec, boot_options, extra_options, + n_connections, test_buffs, + dynamic_shared_memory_type, + DEVNULL, DEVNULL); + status = system(cmd); + if (status == 0) + break; + } + n_buffers = test_buffs; + + if ((n_buffers * (BLCKSZ / 1024)) % 1024 == 0) + printf("%dMB\n", (n_buffers * (BLCKSZ / 1024)) / 1024); + else + printf("%dkB\n", n_buffers * (BLCKSZ / 1024)); + + printf(_("selecting default time zone ... ")); + fflush(stdout); + default_timezone = select_default_timezone(share_path); + printf("%s\n", default_timezone ? default_timezone : "GMT"); +} + +/* + * Calculate the default wal_size with a "pretty" unit. + */ +static char * +pretty_wal_size(int segment_count) +{ + int sz = wal_segment_size_mb * segment_count; + char *result = pg_malloc(14); + + if ((sz % 1024) == 0) + snprintf(result, 14, "%dGB", sz / 1024); + else + snprintf(result, 14, "%dMB", sz); + + return result; +} + +/* + * set up all the config files + */ +static void +setup_config(void) +{ + char **conflines; + char repltok[MAXPGPATH]; + char path[MAXPGPATH]; + char *autoconflines[3]; + + fputs(_("creating configuration files ... "), stdout); + fflush(stdout); + + /* postgresql.conf */ + + conflines = readfile(conf_file); + + snprintf(repltok, sizeof(repltok), "max_connections = %d", n_connections); + conflines = replace_token(conflines, "#max_connections = 100", repltok); + + if ((n_buffers * (BLCKSZ / 1024)) % 1024 == 0) + snprintf(repltok, sizeof(repltok), "shared_buffers = %dMB", + (n_buffers * (BLCKSZ / 1024)) / 1024); + else + snprintf(repltok, sizeof(repltok), "shared_buffers = %dkB", + n_buffers * (BLCKSZ / 1024)); + conflines = replace_token(conflines, "#shared_buffers = 32MB", repltok); + +#ifdef HAVE_UNIX_SOCKETS + snprintf(repltok, sizeof(repltok), "#unix_socket_directories = '%s'", + DEFAULT_PGSOCKET_DIR); +#else + snprintf(repltok, sizeof(repltok), "#unix_socket_directories = ''"); +#endif + conflines = replace_token(conflines, "#unix_socket_directories = '/tmp'", + repltok); + +#if DEF_PGPORT != 5432 + snprintf(repltok, sizeof(repltok), "#port = %d", DEF_PGPORT); + conflines = replace_token(conflines, "#port = 5432", repltok); +#endif + + /* set default max_wal_size and min_wal_size */ + snprintf(repltok, sizeof(repltok), "min_wal_size = %s", + pretty_wal_size(DEFAULT_MIN_WAL_SEGS)); + conflines = replace_token(conflines, "#min_wal_size = 80MB", repltok); + + snprintf(repltok, sizeof(repltok), "max_wal_size = %s", + pretty_wal_size(DEFAULT_MAX_WAL_SEGS)); + conflines = replace_token(conflines, "#max_wal_size = 1GB", repltok); + + snprintf(repltok, sizeof(repltok), "lc_messages = '%s'", + escape_quotes(lc_messages)); + conflines = replace_token(conflines, "#lc_messages = 'C'", repltok); + + snprintf(repltok, sizeof(repltok), "lc_monetary = '%s'", + escape_quotes(lc_monetary)); + conflines = replace_token(conflines, "#lc_monetary = 'C'", repltok); + + snprintf(repltok, sizeof(repltok), "lc_numeric = '%s'", + escape_quotes(lc_numeric)); + conflines = replace_token(conflines, "#lc_numeric = 'C'", repltok); + + snprintf(repltok, sizeof(repltok), "lc_time = '%s'", + escape_quotes(lc_time)); + conflines = replace_token(conflines, "#lc_time = 'C'", repltok); + + switch (locale_date_order(lc_time)) + { + case DATEORDER_YMD: + strcpy(repltok, "datestyle = 'iso, ymd'"); + break; + case DATEORDER_DMY: + strcpy(repltok, "datestyle = 'iso, dmy'"); + break; + case DATEORDER_MDY: + default: + strcpy(repltok, "datestyle = 'iso, mdy'"); + break; + } + conflines = replace_token(conflines, "#datestyle = 'iso, mdy'", repltok); + + snprintf(repltok, sizeof(repltok), + "default_text_search_config = 'pg_catalog.%s'", + escape_quotes(default_text_search_config)); + conflines = replace_token(conflines, + "#default_text_search_config = 'pg_catalog.simple'", + repltok); + + if (default_timezone) + { + snprintf(repltok, sizeof(repltok), "timezone = '%s'", + escape_quotes(default_timezone)); + conflines = replace_token(conflines, "#timezone = 'GMT'", repltok); + snprintf(repltok, sizeof(repltok), "log_timezone = '%s'", + escape_quotes(default_timezone)); + conflines = replace_token(conflines, "#log_timezone = 'GMT'", repltok); + } + + snprintf(repltok, sizeof(repltok), "dynamic_shared_memory_type = %s", + dynamic_shared_memory_type); + conflines = replace_token(conflines, "#dynamic_shared_memory_type = posix", + repltok); + +#if DEFAULT_BACKEND_FLUSH_AFTER > 0 + snprintf(repltok, sizeof(repltok), "#backend_flush_after = %dkB", + DEFAULT_BACKEND_FLUSH_AFTER * (BLCKSZ / 1024)); + conflines = replace_token(conflines, "#backend_flush_after = 0", + repltok); +#endif + +#if DEFAULT_BGWRITER_FLUSH_AFTER > 0 + snprintf(repltok, sizeof(repltok), "#bgwriter_flush_after = %dkB", + DEFAULT_BGWRITER_FLUSH_AFTER * (BLCKSZ / 1024)); + conflines = replace_token(conflines, "#bgwriter_flush_after = 0", + repltok); +#endif + +#if DEFAULT_CHECKPOINT_FLUSH_AFTER > 0 + snprintf(repltok, sizeof(repltok), "#checkpoint_flush_after = %dkB", + DEFAULT_CHECKPOINT_FLUSH_AFTER * (BLCKSZ / 1024)); + conflines = replace_token(conflines, "#checkpoint_flush_after = 0", + repltok); +#endif + +#ifndef USE_PREFETCH + conflines = replace_token(conflines, + "#effective_io_concurrency = 1", + "#effective_io_concurrency = 0"); +#endif + +#ifdef WIN32 + conflines = replace_token(conflines, + "#update_process_title = on", + "#update_process_title = off"); +#endif + + /* + * Change password_encryption setting to md5 if md5 was chosen as an + * authentication method, unless scram-sha-256 was also chosen. + */ + if ((strcmp(authmethodlocal, "md5") == 0 && + strcmp(authmethodhost, "scram-sha-256") != 0) || + (strcmp(authmethodhost, "md5") == 0 && + strcmp(authmethodlocal, "scram-sha-256") != 0)) + { + conflines = replace_token(conflines, + "#password_encryption = scram-sha-256", + "password_encryption = md5"); + } + + /* + * If group access has been enabled for the cluster then it makes sense to + * ensure that the log files also allow group access. Otherwise a backup + * from a user in the group would fail if the log files were not + * relocated. + */ + if (pg_dir_create_mode == PG_DIR_MODE_GROUP) + { + conflines = replace_token(conflines, + "#log_file_mode = 0600", + "log_file_mode = 0640"); + } + + snprintf(path, sizeof(path), "%s/postgresql.conf", pg_data); + + writefile(path, conflines); + if (chmod(path, pg_file_create_mode) != 0) + { + pg_log_error("could not change permissions of \"%s\": %m", path); + exit(1); + } + + /* + * create the automatic configuration file to store the configuration + * parameters set by ALTER SYSTEM command. The parameters present in this + * file will override the value of parameters that exists before parse of + * this file. + */ + autoconflines[0] = pg_strdup("# Do not edit this file manually!\n"); + autoconflines[1] = pg_strdup("# It will be overwritten by the ALTER SYSTEM command.\n"); + autoconflines[2] = NULL; + + sprintf(path, "%s/postgresql.auto.conf", pg_data); + + writefile(path, autoconflines); + if (chmod(path, pg_file_create_mode) != 0) + { + pg_log_error("could not change permissions of \"%s\": %m", path); + exit(1); + } + + free(conflines); + + + /* pg_hba.conf */ + + conflines = readfile(hba_file); + +#ifndef HAVE_UNIX_SOCKETS + conflines = filter_lines_with_token(conflines, "@remove-line-for-nolocal@"); +#else + conflines = replace_token(conflines, "@remove-line-for-nolocal@", ""); +#endif + +#ifdef HAVE_IPV6 + + /* + * Probe to see if there is really any platform support for IPv6, and + * comment out the relevant pg_hba line if not. This avoids runtime + * warnings if getaddrinfo doesn't actually cope with IPv6. Particularly + * useful on Windows, where executables built on a machine with IPv6 may + * have to run on a machine without. + */ + { + struct addrinfo *gai_result; + struct addrinfo hints; + int err = 0; + +#ifdef WIN32 + /* need to call WSAStartup before calling getaddrinfo */ + WSADATA wsaData; + + err = WSAStartup(MAKEWORD(2, 2), &wsaData); +#endif + + /* for best results, this code should match parse_hba_line() */ + hints.ai_flags = AI_NUMERICHOST; + hints.ai_family = AF_UNSPEC; + hints.ai_socktype = 0; + hints.ai_protocol = 0; + hints.ai_addrlen = 0; + hints.ai_canonname = NULL; + hints.ai_addr = NULL; + hints.ai_next = NULL; + + if (err != 0 || + getaddrinfo("::1", NULL, &hints, &gai_result) != 0) + { + conflines = replace_token(conflines, + "host all all ::1", + "#host all all ::1"); + conflines = replace_token(conflines, + "host replication all ::1", + "#host replication all ::1"); + } + } +#else /* !HAVE_IPV6 */ + /* If we didn't compile IPV6 support at all, always comment it out */ + conflines = replace_token(conflines, + "host all all ::1", + "#host all all ::1"); + conflines = replace_token(conflines, + "host replication all ::1", + "#host replication all ::1"); +#endif /* HAVE_IPV6 */ + + /* Replace default authentication methods */ + conflines = replace_token(conflines, + "@authmethodhost@", + authmethodhost); + conflines = replace_token(conflines, + "@authmethodlocal@", + authmethodlocal); + + conflines = replace_token(conflines, + "@authcomment@", + (strcmp(authmethodlocal, "trust") == 0 || strcmp(authmethodhost, "trust") == 0) ? AUTHTRUST_WARNING : ""); + + snprintf(path, sizeof(path), "%s/pg_hba.conf", pg_data); + + writefile(path, conflines); + if (chmod(path, pg_file_create_mode) != 0) + { + pg_log_error("could not change permissions of \"%s\": %m", path); + exit(1); + } + + free(conflines); + + /* pg_ident.conf */ + + conflines = readfile(ident_file); + + snprintf(path, sizeof(path), "%s/pg_ident.conf", pg_data); + + writefile(path, conflines); + if (chmod(path, pg_file_create_mode) != 0) + { + pg_log_error("could not change permissions of \"%s\": %m", path); + exit(1); + } + + free(conflines); + + check_ok(); +} + + +/* + * run the BKI script in bootstrap mode to create template1 + */ +static void +bootstrap_template1(void) +{ + PG_CMD_DECL; + char **line; + char **bki_lines; + char headerline[MAXPGPATH]; + char buf[64]; + + printf(_("running bootstrap script ... ")); + fflush(stdout); + + bki_lines = readfile(bki_file); + + /* Check that bki file appears to be of the right version */ + + snprintf(headerline, sizeof(headerline), "# PostgreSQL %s\n", + PG_MAJORVERSION); + + if (strcmp(headerline, *bki_lines) != 0) + { + pg_log_error("input file \"%s\" does not belong to PostgreSQL %s", + bki_file, PG_VERSION); + fprintf(stderr, + _("Check your installation or specify the correct path " + "using the option -L.\n")); + exit(1); + } + + /* Substitute for various symbols used in the BKI file */ + + sprintf(buf, "%d", NAMEDATALEN); + bki_lines = replace_token(bki_lines, "NAMEDATALEN", buf); + + sprintf(buf, "%d", (int) sizeof(Pointer)); + bki_lines = replace_token(bki_lines, "SIZEOF_POINTER", buf); + + bki_lines = replace_token(bki_lines, "ALIGNOF_POINTER", + (sizeof(Pointer) == 4) ? "i" : "d"); + + bki_lines = replace_token(bki_lines, "FLOAT8PASSBYVAL", + FLOAT8PASSBYVAL ? "true" : "false"); + + bki_lines = replace_token(bki_lines, "POSTGRES", + escape_quotes_bki(username)); + + bki_lines = replace_token(bki_lines, "ENCODING", + encodingid_to_string(encodingid)); + + bki_lines = replace_token(bki_lines, "LC_COLLATE", + escape_quotes_bki(lc_collate)); + + bki_lines = replace_token(bki_lines, "LC_CTYPE", + escape_quotes_bki(lc_ctype)); + + /* Also ensure backend isn't confused by this environment var: */ + unsetenv("PGCLIENTENCODING"); + + snprintf(cmd, sizeof(cmd), + "\"%s\" --boot -x1 -X %u %s %s %s %s", + backend_exec, + wal_segment_size_mb * (1024 * 1024), + data_checksums ? "-k" : "", + boot_options, extra_options, + debug ? "-d 5" : ""); + + + PG_CMD_OPEN; + + for (line = bki_lines; *line != NULL; line++) + { + PG_CMD_PUTS(*line); + free(*line); + } + + PG_CMD_CLOSE; + + free(bki_lines); + + check_ok(); +} + +/* + * set up the shadow password table + */ +static void +setup_auth(FILE *cmdfd) +{ + const char *const *line; + static const char *const pg_authid_setup[] = { + /* + * The authid table shouldn't be readable except through views, to + * ensure passwords are not publicly visible. + */ + "REVOKE ALL ON pg_authid FROM public;\n\n", + NULL + }; + + for (line = pg_authid_setup; *line != NULL; line++) + PG_CMD_PUTS(*line); + + if (superuser_password) + PG_CMD_PRINTF("ALTER USER \"%s\" WITH PASSWORD E'%s';\n\n", + username, escape_quotes(superuser_password)); +} + +/* + * get the superuser password if required + */ +static void +get_su_pwd(void) +{ + char *pwd1; + + if (pwprompt) + { + /* + * Read password from terminal + */ + char *pwd2; + + printf("\n"); + fflush(stdout); + pwd1 = simple_prompt("Enter new superuser password: ", false); + pwd2 = simple_prompt("Enter it again: ", false); + if (strcmp(pwd1, pwd2) != 0) + { + fprintf(stderr, _("Passwords didn't match.\n")); + exit(1); + } + free(pwd2); + } + else + { + /* + * Read password from file + * + * Ideally this should insist that the file not be world-readable. + * However, this option is mainly intended for use on Windows where + * file permissions may not exist at all, so we'll skip the paranoia + * for now. + */ + FILE *pwf = fopen(pwfilename, "r"); + + if (!pwf) + { + pg_log_error("could not open file \"%s\" for reading: %m", + pwfilename); + exit(1); + } + pwd1 = pg_get_line(pwf); + if (!pwd1) + { + if (ferror(pwf)) + pg_log_error("could not read password from file \"%s\": %m", + pwfilename); + else + pg_log_error("password file \"%s\" is empty", + pwfilename); + exit(1); + } + fclose(pwf); + + (void) pg_strip_crlf(pwd1); + } + + superuser_password = pwd1; +} + +/* + * set up pg_depend + */ +static void +setup_depend(FILE *cmdfd) +{ + const char *const *line; + static const char *const pg_depend_setup[] = { + /* + * Make PIN entries in pg_depend for all objects made so far in the + * tables that the dependency code handles. This is overkill (the + * system doesn't really depend on having every last weird datatype, + * for instance) but generating only the minimum required set of + * dependencies seems hard. + * + * Catalogs that are intentionally not scanned here are: + * + * pg_database: it's a feature, not a bug, that template1 is not + * pinned. + * + * pg_extension: a pinned extension isn't really an extension, hmm? + * + * pg_tablespace: tablespaces don't participate in the dependency + * code, and DropTableSpace() explicitly protects the built-in + * tablespaces. + * + * First delete any already-made entries; PINs override all else, and + * must be the only entries for their objects. + */ + "DELETE FROM pg_depend;\n\n", + "VACUUM pg_depend;\n\n", + "DELETE FROM pg_shdepend;\n\n", + "VACUUM pg_shdepend;\n\n", + + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_class;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_proc;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_type;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_cast;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_constraint;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_conversion;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_attrdef;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_language;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_operator;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_opclass;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_opfamily;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_am;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_amop;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_amproc;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_rewrite;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_trigger;\n\n", + + /* + * restriction here to avoid pinning the public namespace + */ + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_namespace " + " WHERE nspname LIKE 'pg%';\n\n", + + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_ts_parser;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_ts_dict;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_ts_template;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_ts_config;\n\n", + "INSERT INTO pg_depend SELECT 0,0,0, tableoid,oid,0, 'p' " + " FROM pg_collation;\n\n", + "INSERT INTO pg_shdepend SELECT 0,0,0,0, tableoid,oid, 'p' " + " FROM pg_authid;\n\n", + NULL + }; + + for (line = pg_depend_setup; *line != NULL; line++) + PG_CMD_PUTS(*line); +} + +/* + * Run external file + */ +static void +setup_run_file(FILE *cmdfd, const char *filename) +{ + char **lines; + + lines = readfile(filename); + + for (char **line = lines; *line != NULL; line++) + { + PG_CMD_PUTS(*line); + free(*line); + } + + PG_CMD_PUTS("\n\n"); + + free(lines); +} + +/* + * fill in extra description data + */ +static void +setup_description(FILE *cmdfd) +{ + /* Create default descriptions for operator implementation functions */ + PG_CMD_PUTS("WITH funcdescs AS ( " + "SELECT p.oid as p_oid, o.oid as o_oid, oprname " + "FROM pg_proc p JOIN pg_operator o ON oprcode = p.oid ) " + "INSERT INTO pg_description " + " SELECT p_oid, 'pg_proc'::regclass, 0, " + " 'implementation of ' || oprname || ' operator' " + " FROM funcdescs " + " WHERE NOT EXISTS (SELECT 1 FROM pg_description " + " WHERE objoid = p_oid AND classoid = 'pg_proc'::regclass) " + " AND NOT EXISTS (SELECT 1 FROM pg_description " + " WHERE objoid = o_oid AND classoid = 'pg_operator'::regclass" + " AND description LIKE 'deprecated%');\n\n"); +} + +/* + * populate pg_collation + */ +static void +setup_collation(FILE *cmdfd) +{ + /* + * Add an SQL-standard name. We don't want to pin this, so it doesn't go + * in pg_collation.h. But add it before reading system collations, so + * that it wins if libc defines a locale named ucs_basic. + */ + PG_CMD_PRINTF("INSERT INTO pg_collation (oid, collname, collnamespace, collowner, collprovider, collisdeterministic, collencoding, collcollate, collctype)" + "VALUES (pg_nextoid('pg_catalog.pg_collation', 'oid', 'pg_catalog.pg_collation_oid_index'), 'ucs_basic', 'pg_catalog'::regnamespace, %u, '%c', true, %d, 'C', 'C');\n\n", + BOOTSTRAP_SUPERUSERID, COLLPROVIDER_LIBC, PG_UTF8); + + /* Now import all collations we can find in the operating system */ + PG_CMD_PUTS("SELECT pg_import_system_collations('pg_catalog');\n\n"); +} + +/* + * Set up privileges + * + * We mark most system catalogs as world-readable. We don't currently have + * to touch functions, languages, or databases, because their default + * permissions are OK. + * + * Some objects may require different permissions by default, so we + * make sure we don't overwrite privilege sets that have already been + * set (NOT NULL). + * + * Also populate pg_init_privs to save what the privileges are at init + * time. This is used by pg_dump to allow users to change privileges + * on catalog objects and to have those privilege changes preserved + * across dump/reload and pg_upgrade. + * + * Note that pg_init_privs is only for per-database objects and therefore + * we don't include databases or tablespaces. + */ +static void +setup_privileges(FILE *cmdfd) +{ + char **line; + char **priv_lines; + static char *privileges_setup[] = { + "UPDATE pg_class " + " SET relacl = (SELECT array_agg(a.acl) FROM " + " (SELECT E'=r/\"$POSTGRES_SUPERUSERNAME\"' as acl " + " UNION SELECT unnest(pg_catalog.acldefault(" + " CASE WHEN relkind = " CppAsString2(RELKIND_SEQUENCE) " THEN 's' " + " ELSE 'r' END::\"char\"," CppAsString2(BOOTSTRAP_SUPERUSERID) "::oid))" + " ) as a) " + " WHERE relkind IN (" CppAsString2(RELKIND_RELATION) ", " + CppAsString2(RELKIND_VIEW) ", " CppAsString2(RELKIND_MATVIEW) ", " + CppAsString2(RELKIND_SEQUENCE) ")" + " AND relacl IS NULL;\n\n", + "GRANT USAGE ON SCHEMA pg_catalog TO PUBLIC;\n\n", + "GRANT CREATE, USAGE ON SCHEMA public TO PUBLIC;\n\n", + "REVOKE ALL ON pg_largeobject FROM PUBLIC;\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " oid," + " (SELECT oid FROM pg_class WHERE relname = 'pg_class')," + " 0," + " relacl," + " 'i'" + " FROM" + " pg_class" + " WHERE" + " relacl IS NOT NULL" + " AND relkind IN (" CppAsString2(RELKIND_RELATION) ", " + CppAsString2(RELKIND_VIEW) ", " CppAsString2(RELKIND_MATVIEW) ", " + CppAsString2(RELKIND_SEQUENCE) ");\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " pg_class.oid," + " (SELECT oid FROM pg_class WHERE relname = 'pg_class')," + " pg_attribute.attnum," + " pg_attribute.attacl," + " 'i'" + " FROM" + " pg_class" + " JOIN pg_attribute ON (pg_class.oid = pg_attribute.attrelid)" + " WHERE" + " pg_attribute.attacl IS NOT NULL" + " AND pg_class.relkind IN (" CppAsString2(RELKIND_RELATION) ", " + CppAsString2(RELKIND_VIEW) ", " CppAsString2(RELKIND_MATVIEW) ", " + CppAsString2(RELKIND_SEQUENCE) ");\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " oid," + " (SELECT oid FROM pg_class WHERE relname = 'pg_proc')," + " 0," + " proacl," + " 'i'" + " FROM" + " pg_proc" + " WHERE" + " proacl IS NOT NULL;\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " oid," + " (SELECT oid FROM pg_class WHERE relname = 'pg_type')," + " 0," + " typacl," + " 'i'" + " FROM" + " pg_type" + " WHERE" + " typacl IS NOT NULL;\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " oid," + " (SELECT oid FROM pg_class WHERE relname = 'pg_language')," + " 0," + " lanacl," + " 'i'" + " FROM" + " pg_language" + " WHERE" + " lanacl IS NOT NULL;\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " oid," + " (SELECT oid FROM pg_class WHERE " + " relname = 'pg_largeobject_metadata')," + " 0," + " lomacl," + " 'i'" + " FROM" + " pg_largeobject_metadata" + " WHERE" + " lomacl IS NOT NULL;\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " oid," + " (SELECT oid FROM pg_class WHERE relname = 'pg_namespace')," + " 0," + " nspacl," + " 'i'" + " FROM" + " pg_namespace" + " WHERE" + " nspacl IS NOT NULL;\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " oid," + " (SELECT oid FROM pg_class WHERE " + " relname = 'pg_foreign_data_wrapper')," + " 0," + " fdwacl," + " 'i'" + " FROM" + " pg_foreign_data_wrapper" + " WHERE" + " fdwacl IS NOT NULL;\n\n", + "INSERT INTO pg_init_privs " + " (objoid, classoid, objsubid, initprivs, privtype)" + " SELECT" + " oid," + " (SELECT oid FROM pg_class " + " WHERE relname = 'pg_foreign_server')," + " 0," + " srvacl," + " 'i'" + " FROM" + " pg_foreign_server" + " WHERE" + " srvacl IS NOT NULL;\n\n", + NULL + }; + + priv_lines = replace_token(privileges_setup, "$POSTGRES_SUPERUSERNAME", + escape_quotes(username)); + for (line = priv_lines; *line != NULL; line++) + PG_CMD_PUTS(*line); +} + +/* + * extract the strange version of version required for information schema + * (09.08.0007abc) + */ +static void +set_info_version(void) +{ + char *letterversion; + long major = 0, + minor = 0, + micro = 0; + char *endptr; + char *vstr = pg_strdup(PG_VERSION); + char *ptr; + + ptr = vstr + (strlen(vstr) - 1); + while (ptr != vstr && (*ptr < '0' || *ptr > '9')) + ptr--; + letterversion = ptr + 1; + major = strtol(vstr, &endptr, 10); + if (*endptr) + minor = strtol(endptr + 1, &endptr, 10); + if (*endptr) + micro = strtol(endptr + 1, &endptr, 10); + snprintf(infoversion, sizeof(infoversion), "%02ld.%02ld.%04ld%s", + major, minor, micro, letterversion); +} + +/* + * load info schema and populate from features file + */ +static void +setup_schema(FILE *cmdfd) +{ + setup_run_file(cmdfd, info_schema_file); + + PG_CMD_PRINTF("UPDATE information_schema.sql_implementation_info " + " SET character_value = '%s' " + " WHERE implementation_info_name = 'DBMS VERSION';\n\n", + infoversion); + + PG_CMD_PRINTF("COPY information_schema.sql_features " + " (feature_id, feature_name, sub_feature_id, " + " sub_feature_name, is_supported, comments) " + " FROM E'%s';\n\n", + escape_quotes(features_file)); +} + +/* + * load PL/pgSQL server-side language + */ +static void +load_plpgsql(FILE *cmdfd) +{ + PG_CMD_PUTS("CREATE EXTENSION plpgsql;\n\n"); +} + +/* + * clean everything up in template1 + */ +static void +vacuum_db(FILE *cmdfd) +{ + /* Run analyze before VACUUM so the statistics are frozen. */ + PG_CMD_PUTS("ANALYZE;\n\nVACUUM FREEZE;\n\n"); +} + +/* + * copy template1 to template0 + */ +static void +make_template0(FILE *cmdfd) +{ + const char *const *line; + static const char *const template0_setup[] = { + "CREATE DATABASE template0 IS_TEMPLATE = true ALLOW_CONNECTIONS = false;\n\n", + + /* + * We use the OID of template0 to determine datlastsysoid + */ + "UPDATE pg_database SET datlastsysoid = " + " (SELECT oid FROM pg_database " + " WHERE datname = 'template0');\n\n", + + /* + * Explicitly revoke public create-schema and create-temp-table + * privileges in template1 and template0; else the latter would be on + * by default + */ + "REVOKE CREATE,TEMPORARY ON DATABASE template1 FROM public;\n\n", + "REVOKE CREATE,TEMPORARY ON DATABASE template0 FROM public;\n\n", + + "COMMENT ON DATABASE template0 IS 'unmodifiable empty database';\n\n", + + /* + * Finally vacuum to clean up dead rows in pg_database + */ + "VACUUM pg_database;\n\n", + NULL + }; + + for (line = template0_setup; *line; line++) + PG_CMD_PUTS(*line); +} + +/* + * copy template1 to postgres + */ +static void +make_postgres(FILE *cmdfd) +{ + const char *const *line; + static const char *const postgres_setup[] = { + "CREATE DATABASE postgres;\n\n", + "COMMENT ON DATABASE postgres IS 'default administrative connection database';\n\n", + NULL + }; + + for (line = postgres_setup; *line; line++) + PG_CMD_PUTS(*line); +} + +/* + * signal handler in case we are interrupted. + * + * The Windows runtime docs at + * https://docs.microsoft.com/en-us/cpp/c-runtime-library/reference/signal + * specifically forbid a number of things being done from a signal handler, + * including IO, memory allocation and system calls, and only allow jmpbuf + * if you are handling SIGFPE. + * + * I avoided doing the forbidden things by setting a flag instead of calling + * exit() directly. + * + * Also note the behaviour of Windows with SIGINT, which says this: + * SIGINT is not supported for any Win32 application. When a CTRL+C interrupt + * occurs, Win32 operating systems generate a new thread to specifically + * handle that interrupt. This can cause a single-thread application, such as + * one in UNIX, to become multithreaded and cause unexpected behavior. + * + * I have no idea how to handle this. (Strange they call UNIX an application!) + * So this will need some testing on Windows. + */ +static void +trapsig(int signum) +{ + /* handle systems that reset the handler, like Windows (grr) */ + pqsignal(signum, trapsig); + caught_signal = true; +} + +/* + * call exit() if we got a signal, or else output "ok". + */ +static void +check_ok(void) +{ + if (caught_signal) + { + printf(_("caught signal\n")); + fflush(stdout); + exit(1); + } + else if (output_failed) + { + printf(_("could not write to child process: %s\n"), + strerror(output_errno)); + fflush(stdout); + exit(1); + } + else + { + /* all seems well */ + printf(_("ok\n")); + fflush(stdout); + } +} + +/* Hack to suppress a warning about %x from some versions of gcc */ +static inline size_t +my_strftime(char *s, size_t max, const char *fmt, const struct tm *tm) +{ + return strftime(s, max, fmt, tm); +} + +/* + * Determine likely date order from locale + */ +static int +locale_date_order(const char *locale) +{ + struct tm testtime; + char buf[128]; + char *posD; + char *posM; + char *posY; + char *save; + size_t res; + int result; + + result = DATEORDER_MDY; /* default */ + + save = setlocale(LC_TIME, NULL); + if (!save) + return result; + save = pg_strdup(save); + + setlocale(LC_TIME, locale); + + memset(&testtime, 0, sizeof(testtime)); + testtime.tm_mday = 22; + testtime.tm_mon = 10; /* November, should come out as "11" */ + testtime.tm_year = 133; /* 2033 */ + + res = my_strftime(buf, sizeof(buf), "%x", &testtime); + + setlocale(LC_TIME, save); + free(save); + + if (res == 0) + return result; + + posM = strstr(buf, "11"); + posD = strstr(buf, "22"); + posY = strstr(buf, "33"); + + if (!posM || !posD || !posY) + return result; + + if (posY < posM && posM < posD) + result = DATEORDER_YMD; + else if (posD < posM) + result = DATEORDER_DMY; + else + result = DATEORDER_MDY; + + return result; +} + +/* + * Verify that locale name is valid for the locale category. + * + * If successful, and canonname isn't NULL, a malloc'd copy of the locale's + * canonical name is stored there. This is especially useful for figuring out + * what locale name "" means (ie, the environment value). (Actually, + * it seems that on most implementations that's the only thing it's good for; + * we could wish that setlocale gave back a canonically spelled version of + * the locale name, but typically it doesn't.) + * + * this should match the backend's check_locale() function + */ +static void +check_locale_name(int category, const char *locale, char **canonname) +{ + char *save; + char *res; + + if (canonname) + *canonname = NULL; /* in case of failure */ + + save = setlocale(category, NULL); + if (!save) + { + pg_log_error("setlocale() failed"); + exit(1); + } + + /* save may be pointing at a modifiable scratch variable, so copy it. */ + save = pg_strdup(save); + + /* for setlocale() call */ + if (!locale) + locale = ""; + + /* set the locale with setlocale, to see if it accepts it. */ + res = setlocale(category, locale); + + /* save canonical name if requested. */ + if (res && canonname) + *canonname = pg_strdup(res); + + /* restore old value. */ + if (!setlocale(category, save)) + { + pg_log_error("failed to restore old locale \"%s\"", save); + exit(1); + } + free(save); + + /* complain if locale wasn't valid */ + if (res == NULL) + { + if (*locale) + pg_log_error("invalid locale name \"%s\"", locale); + else + { + /* + * If no relevant switch was given on command line, locale is an + * empty string, which is not too helpful to report. Presumably + * setlocale() found something it did not like in the environment. + * Ideally we'd report the bad environment variable, but since + * setlocale's behavior is implementation-specific, it's hard to + * be sure what it didn't like. Print a safe generic message. + */ + pg_log_error("invalid locale settings; check LANG and LC_* environment variables"); + } + exit(1); + } +} + +/* + * check if the chosen encoding matches the encoding required by the locale + * + * this should match the similar check in the backend createdb() function + */ +static bool +check_locale_encoding(const char *locale, int user_enc) +{ + int locale_enc; + + locale_enc = pg_get_encoding_from_locale(locale, true); + + /* See notes in createdb() to understand these tests */ + if (!(locale_enc == user_enc || + locale_enc == PG_SQL_ASCII || + locale_enc == -1 || +#ifdef WIN32 + user_enc == PG_UTF8 || +#endif + user_enc == PG_SQL_ASCII)) + { + pg_log_error("encoding mismatch"); + fprintf(stderr, + _("The encoding you selected (%s) and the encoding that the\n" + "selected locale uses (%s) do not match. This would lead to\n" + "misbehavior in various character string processing functions.\n" + "Rerun %s and either do not specify an encoding explicitly,\n" + "or choose a matching combination.\n"), + pg_encoding_to_char(user_enc), + pg_encoding_to_char(locale_enc), + progname); + return false; + } + return true; +} + +/* + * set up the locale variables + * + * assumes we have called setlocale(LC_ALL, "") -- see set_pglocale_pgservice + */ +static void +setlocales(void) +{ + char *canonname; + + /* set empty lc_* values to locale config if set */ + + if (locale) + { + if (!lc_ctype) + lc_ctype = locale; + if (!lc_collate) + lc_collate = locale; + if (!lc_numeric) + lc_numeric = locale; + if (!lc_time) + lc_time = locale; + if (!lc_monetary) + lc_monetary = locale; + if (!lc_messages) + lc_messages = locale; + } + + /* + * canonicalize locale names, and obtain any missing values from our + * current environment + */ + + check_locale_name(LC_CTYPE, lc_ctype, &canonname); + lc_ctype = canonname; + check_locale_name(LC_COLLATE, lc_collate, &canonname); + lc_collate = canonname; + check_locale_name(LC_NUMERIC, lc_numeric, &canonname); + lc_numeric = canonname; + check_locale_name(LC_TIME, lc_time, &canonname); + lc_time = canonname; + check_locale_name(LC_MONETARY, lc_monetary, &canonname); + lc_monetary = canonname; +#if defined(LC_MESSAGES) && !defined(WIN32) + check_locale_name(LC_MESSAGES, lc_messages, &canonname); + lc_messages = canonname; +#else + /* when LC_MESSAGES is not available, use the LC_CTYPE setting */ + check_locale_name(LC_CTYPE, lc_messages, &canonname); + lc_messages = canonname; +#endif +} + +/* + * print help text + */ +static void +usage(const char *progname) +{ + printf(_("%s initializes a PostgreSQL database cluster.\n\n"), progname); + printf(_("Usage:\n")); + printf(_(" %s [OPTION]... [DATADIR]\n"), progname); + printf(_("\nOptions:\n")); + printf(_(" -A, --auth=METHOD default authentication method for local connections\n")); + printf(_(" --auth-host=METHOD default authentication method for local TCP/IP connections\n")); + printf(_(" --auth-local=METHOD default authentication method for local-socket connections\n")); + printf(_(" [-D, --pgdata=]DATADIR location for this database cluster\n")); + printf(_(" -E, --encoding=ENCODING set default encoding for new databases\n")); + printf(_(" -g, --allow-group-access allow group read/execute on data directory\n")); + printf(_(" -k, --data-checksums use data page checksums\n")); + printf(_(" --locale=LOCALE set default locale for new databases\n")); + printf(_(" --lc-collate=, --lc-ctype=, --lc-messages=LOCALE\n" + " --lc-monetary=, --lc-numeric=, --lc-time=LOCALE\n" + " set default locale in the respective category for\n" + " new databases (default taken from environment)\n")); + printf(_(" --no-locale equivalent to --locale=C\n")); + printf(_(" --pwfile=FILE read password for the new superuser from file\n")); + printf(_(" -T, --text-search-config=CFG\n" + " default text search configuration\n")); + printf(_(" -U, --username=NAME database superuser name\n")); + printf(_(" -W, --pwprompt prompt for a password for the new superuser\n")); + printf(_(" -X, --waldir=WALDIR location for the write-ahead log directory\n")); + printf(_(" --wal-segsize=SIZE size of WAL segments, in megabytes\n")); + printf(_("\nLess commonly used options:\n")); + printf(_(" -d, --debug generate lots of debugging output\n")); + printf(_(" --discard-caches set debug_discard_caches=1\n")); + printf(_(" -L DIRECTORY where to find the input files\n")); + printf(_(" -n, --no-clean do not clean up after errors\n")); + printf(_(" -N, --no-sync do not wait for changes to be written safely to disk\n")); + printf(_(" --no-instructions do not print instructions for next steps\n")); + printf(_(" -s, --show show internal settings\n")); + printf(_(" -S, --sync-only only sync data directory\n")); + printf(_("\nOther options:\n")); + printf(_(" -V, --version output version information, then exit\n")); + printf(_(" -?, --help show this help, then exit\n")); + printf(_("\nIf the data directory is not specified, the environment variable PGDATA\n" + "is used.\n")); + printf(_("\nReport bugs to <%s>.\n"), PACKAGE_BUGREPORT); + printf(_("%s home page: <%s>\n"), PACKAGE_NAME, PACKAGE_URL); +} + +static void +check_authmethod_unspecified(const char **authmethod) +{ + if (*authmethod == NULL) + { + authwarning = true; + *authmethod = "trust"; + } +} + +static void +check_authmethod_valid(const char *authmethod, const char *const *valid_methods, const char *conntype) +{ + const char *const *p; + + for (p = valid_methods; *p; p++) + { + if (strcmp(authmethod, *p) == 0) + return; + /* with space = param */ + if (strchr(authmethod, ' ')) + if (strncmp(authmethod, *p, (authmethod - strchr(authmethod, ' '))) == 0) + return; + } + + pg_log_error("invalid authentication method \"%s\" for \"%s\" connections", + authmethod, conntype); + exit(1); +} + +static void +check_need_password(const char *authmethodlocal, const char *authmethodhost) +{ + if ((strcmp(authmethodlocal, "md5") == 0 || + strcmp(authmethodlocal, "password") == 0 || + strcmp(authmethodlocal, "scram-sha-256") == 0) && + (strcmp(authmethodhost, "md5") == 0 || + strcmp(authmethodhost, "password") == 0 || + strcmp(authmethodhost, "scram-sha-256") == 0) && + !(pwprompt || pwfilename)) + { + pg_log_error("must specify a password for the superuser to enable password authentication"); + exit(1); + } +} + + +void +setup_pgdata(void) +{ + char *pgdata_get_env; + + if (!pg_data) + { + pgdata_get_env = getenv("PGDATA"); + if (pgdata_get_env && strlen(pgdata_get_env)) + { + /* PGDATA found */ + pg_data = pg_strdup(pgdata_get_env); + } + else + { + pg_log_error("no data directory specified"); + fprintf(stderr, + _("You must identify the directory where the data for this database system\n" + "will reside. Do this with either the invocation option -D or the\n" + "environment variable PGDATA.\n")); + exit(1); + } + } + + pgdata_native = pg_strdup(pg_data); + canonicalize_path(pg_data); + + /* + * we have to set PGDATA for postgres rather than pass it on the command + * line to avoid dumb quoting problems on Windows, and we would especially + * need quotes otherwise on Windows because paths there are most likely to + * have embedded spaces. + */ + if (setenv("PGDATA", pg_data, 1) != 0) + { + pg_log_error("could not set environment"); + exit(1); + } +} + + +void +setup_bin_paths(const char *argv0) +{ + int ret; + + if ((ret = find_other_exec(argv0, "postgres", PG_BACKEND_VERSIONSTR, + backend_exec)) < 0) + { + char full_path[MAXPGPATH]; + + if (find_my_exec(argv0, full_path) < 0) + strlcpy(full_path, progname, sizeof(full_path)); + + if (ret == -1) + pg_log_error("The program \"%s\" is needed by %s but was not found in the\n" + "same directory as \"%s\".\n" + "Check your installation.", + "postgres", progname, full_path); + else + pg_log_error("The program \"%s\" was found by \"%s\"\n" + "but was not the same version as %s.\n" + "Check your installation.", + "postgres", full_path, progname); + exit(1); + } + + /* store binary directory */ + strcpy(bin_path, backend_exec); + *last_dir_separator(bin_path) = '\0'; + canonicalize_path(bin_path); + + if (!share_path) + { + share_path = pg_malloc(MAXPGPATH); + get_share_path(backend_exec, share_path); + } + else if (!is_absolute_path(share_path)) + { + pg_log_error("input file location must be an absolute path"); + exit(1); + } + + canonicalize_path(share_path); +} + +void +setup_locale_encoding(void) +{ + setlocales(); + + if (strcmp(lc_ctype, lc_collate) == 0 && + strcmp(lc_ctype, lc_time) == 0 && + strcmp(lc_ctype, lc_numeric) == 0 && + strcmp(lc_ctype, lc_monetary) == 0 && + strcmp(lc_ctype, lc_messages) == 0) + printf(_("The database cluster will be initialized with locale \"%s\".\n"), lc_ctype); + else + { + printf(_("The database cluster will be initialized with locales\n" + " COLLATE: %s\n" + " CTYPE: %s\n" + " MESSAGES: %s\n" + " MONETARY: %s\n" + " NUMERIC: %s\n" + " TIME: %s\n"), + lc_collate, + lc_ctype, + lc_messages, + lc_monetary, + lc_numeric, + lc_time); + } + + if (!encoding) + { + int ctype_enc; + + ctype_enc = pg_get_encoding_from_locale(lc_ctype, true); + + if (ctype_enc == -1) + { + /* Couldn't recognize the locale's codeset */ + pg_log_error("could not find suitable encoding for locale \"%s\"", + lc_ctype); + fprintf(stderr, _("Rerun %s with the -E option.\n"), progname); + fprintf(stderr, _("Try \"%s --help\" for more information.\n"), + progname); + exit(1); + } + else if (!pg_valid_server_encoding_id(ctype_enc)) + { + /* + * We recognized it, but it's not a legal server encoding. On + * Windows, UTF-8 works with any locale, so we can fall back to + * UTF-8. + */ +#ifdef WIN32 + encodingid = PG_UTF8; + printf(_("Encoding \"%s\" implied by locale is not allowed as a server-side encoding.\n" + "The default database encoding will be set to \"%s\" instead.\n"), + pg_encoding_to_char(ctype_enc), + pg_encoding_to_char(encodingid)); +#else + pg_log_error("locale \"%s\" requires unsupported encoding \"%s\"", + lc_ctype, pg_encoding_to_char(ctype_enc)); + fprintf(stderr, + _("Encoding \"%s\" is not allowed as a server-side encoding.\n" + "Rerun %s with a different locale selection.\n"), + pg_encoding_to_char(ctype_enc), progname); + exit(1); +#endif + } + else + { + encodingid = ctype_enc; + printf(_("The default database encoding has accordingly been set to \"%s\".\n"), + pg_encoding_to_char(encodingid)); + } + } + else + encodingid = get_encoding_id(encoding); + + if (!check_locale_encoding(lc_ctype, encodingid) || + !check_locale_encoding(lc_collate, encodingid)) + exit(1); /* check_locale_encoding printed the error */ + +} + + +void +setup_data_file_paths(void) +{ + set_input(&bki_file, "postgres.bki"); + set_input(&hba_file, "pg_hba.conf.sample"); + set_input(&ident_file, "pg_ident.conf.sample"); + set_input(&conf_file, "postgresql.conf.sample"); + set_input(&dictionary_file, "snowball_create.sql"); + set_input(&info_schema_file, "information_schema.sql"); + set_input(&features_file, "sql_features.txt"); + set_input(&system_constraints_file, "system_constraints.sql"); + set_input(&system_functions_file, "system_functions.sql"); + set_input(&system_views_file, "system_views.sql"); + + if (show_setting || debug) + { + fprintf(stderr, + "VERSION=%s\n" + "PGDATA=%s\nshare_path=%s\nPGPATH=%s\n" + "POSTGRES_SUPERUSERNAME=%s\nPOSTGRES_BKI=%s\n" + "POSTGRESQL_CONF_SAMPLE=%s\n" + "PG_HBA_SAMPLE=%s\nPG_IDENT_SAMPLE=%s\n", + PG_VERSION, + pg_data, share_path, bin_path, + username, bki_file, + conf_file, + hba_file, ident_file); + if (show_setting) + exit(0); + } + + check_input(bki_file); + check_input(hba_file); + check_input(ident_file); + check_input(conf_file); + check_input(dictionary_file); + check_input(info_schema_file); + check_input(features_file); + check_input(system_constraints_file); + check_input(system_functions_file); + check_input(system_views_file); +} + + +void +setup_text_search(void) +{ + if (!default_text_search_config) + { + default_text_search_config = find_matching_ts_config(lc_ctype); + if (!default_text_search_config) + { + pg_log_info("could not find suitable text search configuration for locale \"%s\"", + lc_ctype); + default_text_search_config = "simple"; + } + } + else + { + const char *checkmatch = find_matching_ts_config(lc_ctype); + + if (checkmatch == NULL) + { + pg_log_warning("suitable text search configuration for locale \"%s\" is unknown", + lc_ctype); + } + else if (strcmp(checkmatch, default_text_search_config) != 0) + { + pg_log_warning("specified text search configuration \"%s\" might not match locale \"%s\"", + default_text_search_config, lc_ctype); + } + } + + printf(_("The default text search configuration will be set to \"%s\".\n"), + default_text_search_config); + +} + + +void +setup_signals(void) +{ + /* some of these are not valid on Windows */ +#ifdef SIGHUP + pqsignal(SIGHUP, trapsig); +#endif +#ifdef SIGINT + pqsignal(SIGINT, trapsig); +#endif +#ifdef SIGQUIT + pqsignal(SIGQUIT, trapsig); +#endif +#ifdef SIGTERM + pqsignal(SIGTERM, trapsig); +#endif + + /* Ignore SIGPIPE when writing to backend, so we can clean up */ +#ifdef SIGPIPE + pqsignal(SIGPIPE, SIG_IGN); +#endif + + /* Prevent SIGSYS so we can probe for kernel calls that might not work */ +#ifdef SIGSYS + pqsignal(SIGSYS, SIG_IGN); +#endif +} + + +void +create_data_directory(void) +{ + int ret; + + switch ((ret = pg_check_dir(pg_data))) + { + case 0: + /* PGDATA not there, must create it */ + printf(_("creating directory %s ... "), + pg_data); + fflush(stdout); + + if (pg_mkdir_p(pg_data, pg_dir_create_mode) != 0) + { + pg_log_error("could not create directory \"%s\": %m", pg_data); + exit(1); + } + else + check_ok(); + + made_new_pgdata = true; + break; + + case 1: + /* Present but empty, fix permissions and use it */ + printf(_("fixing permissions on existing directory %s ... "), + pg_data); + fflush(stdout); + + if (chmod(pg_data, pg_dir_create_mode) != 0) + { + pg_log_error("could not change permissions of directory \"%s\": %m", + pg_data); + exit(1); + } + else + check_ok(); + + found_existing_pgdata = true; + break; + + case 2: + case 3: + case 4: + /* Present and not empty */ + pg_log_error("directory \"%s\" exists but is not empty", pg_data); + if (ret != 4) + warn_on_mount_point(ret); + else + fprintf(stderr, + _("If you want to create a new database system, either remove or empty\n" + "the directory \"%s\" or run %s\n" + "with an argument other than \"%s\".\n"), + pg_data, progname, pg_data); + exit(1); /* no further message needed */ + + default: + /* Trouble accessing directory */ + pg_log_error("could not access directory \"%s\": %m", pg_data); + exit(1); + } +} + + +/* Create WAL directory, and symlink if required */ +void +create_xlog_or_symlink(void) +{ + char *subdirloc; + + /* form name of the place for the subdirectory or symlink */ + subdirloc = psprintf("%s/pg_wal", pg_data); + + if (xlog_dir) + { + int ret; + + /* clean up xlog directory name, check it's absolute */ + canonicalize_path(xlog_dir); + if (!is_absolute_path(xlog_dir)) + { + pg_log_error("WAL directory location must be an absolute path"); + exit(1); + } + + /* check if the specified xlog directory exists/is empty */ + switch ((ret = pg_check_dir(xlog_dir))) + { + case 0: + /* xlog directory not there, must create it */ + printf(_("creating directory %s ... "), + xlog_dir); + fflush(stdout); + + if (pg_mkdir_p(xlog_dir, pg_dir_create_mode) != 0) + { + pg_log_error("could not create directory \"%s\": %m", + xlog_dir); + exit(1); + } + else + check_ok(); + + made_new_xlogdir = true; + break; + + case 1: + /* Present but empty, fix permissions and use it */ + printf(_("fixing permissions on existing directory %s ... "), + xlog_dir); + fflush(stdout); + + if (chmod(xlog_dir, pg_dir_create_mode) != 0) + { + pg_log_error("could not change permissions of directory \"%s\": %m", + xlog_dir); + exit(1); + } + else + check_ok(); + + found_existing_xlogdir = true; + break; + + case 2: + case 3: + case 4: + /* Present and not empty */ + pg_log_error("directory \"%s\" exists but is not empty", xlog_dir); + if (ret != 4) + warn_on_mount_point(ret); + else + fprintf(stderr, + _("If you want to store the WAL there, either remove or empty the directory\n" + "\"%s\".\n"), + xlog_dir); + exit(1); + + default: + /* Trouble accessing directory */ + pg_log_error("could not access directory \"%s\": %m", xlog_dir); + exit(1); + } + +#ifdef HAVE_SYMLINK + if (symlink(xlog_dir, subdirloc) != 0) + { + pg_log_error("could not create symbolic link \"%s\": %m", + subdirloc); + exit(1); + } +#else + pg_log_error("symlinks are not supported on this platform"); + exit(1); +#endif + } + else + { + /* Without -X option, just make the subdirectory normally */ + if (mkdir(subdirloc, pg_dir_create_mode) < 0) + { + pg_log_error("could not create directory \"%s\": %m", + subdirloc); + exit(1); + } + } + + free(subdirloc); +} + + +void +warn_on_mount_point(int error) +{ + if (error == 2) + fprintf(stderr, + _("It contains a dot-prefixed/invisible file, perhaps due to it being a mount point.\n")); + else if (error == 3) + fprintf(stderr, + _("It contains a lost+found directory, perhaps due to it being a mount point.\n")); + + fprintf(stderr, + _("Using a mount point directly as the data directory is not recommended.\n" + "Create a subdirectory under the mount point.\n")); +} + + +void +initialize_data_directory(void) +{ + PG_CMD_DECL; + int i; + + setup_signals(); + + /* + * Set mask based on requested PGDATA permissions. pg_mode_mask, and + * friends like pg_dir_create_mode, are set to owner-only by default and + * then updated if -g is passed in by calling SetDataDirectoryCreatePerm() + * when parsing our options (see above). + */ + umask(pg_mode_mask); + + create_data_directory(); + + create_xlog_or_symlink(); + + /* Create required subdirectories (other than pg_wal) */ + printf(_("creating subdirectories ... ")); + fflush(stdout); + + for (i = 0; i < lengthof(subdirs); i++) + { + char *path; + + path = psprintf("%s/%s", pg_data, subdirs[i]); + + /* + * The parent directory already exists, so we only need mkdir() not + * pg_mkdir_p() here, which avoids some failure modes; cf bug #13853. + */ + if (mkdir(path, pg_dir_create_mode) < 0) + { + pg_log_error("could not create directory \"%s\": %m", path); + exit(1); + } + + free(path); + } + + check_ok(); + + /* Top level PG_VERSION is checked by bootstrapper, so make it first */ + write_version_file(NULL); + + /* Select suitable configuration settings */ + set_null_conf(); + test_config_settings(); + + /* Now create all the text config files */ + setup_config(); + + /* Bootstrap template1 */ + bootstrap_template1(); + + /* + * Make the per-database PG_VERSION for template1 only after init'ing it + */ + write_version_file("base/1"); + + /* + * Create the stuff we don't need to use bootstrap mode for, using a + * backend running in simple standalone mode. + */ + fputs(_("performing post-bootstrap initialization ... "), stdout); + fflush(stdout); + + snprintf(cmd, sizeof(cmd), + "\"%s\" %s %s template1 >%s", + backend_exec, backend_options, extra_options, + DEVNULL); + + PG_CMD_OPEN; + + setup_auth(cmdfd); + + setup_run_file(cmdfd, system_constraints_file); + + setup_run_file(cmdfd, system_functions_file); + + setup_depend(cmdfd); + + /* + * Note that no objects created after setup_depend() will be "pinned". + * They are all droppable at the whim of the DBA. + */ + + setup_run_file(cmdfd, system_views_file); + + setup_description(cmdfd); + + setup_collation(cmdfd); + + setup_run_file(cmdfd, dictionary_file); + + setup_privileges(cmdfd); + + setup_schema(cmdfd); + + load_plpgsql(cmdfd); + + vacuum_db(cmdfd); + + make_template0(cmdfd); + + make_postgres(cmdfd); + + PG_CMD_CLOSE; + + check_ok(); +} + + +int +main(int argc, char *argv[]) +{ + static struct option long_options[] = { + {"pgdata", required_argument, NULL, 'D'}, + {"encoding", required_argument, NULL, 'E'}, + {"locale", required_argument, NULL, 1}, + {"lc-collate", required_argument, NULL, 2}, + {"lc-ctype", required_argument, NULL, 3}, + {"lc-monetary", required_argument, NULL, 4}, + {"lc-numeric", required_argument, NULL, 5}, + {"lc-time", required_argument, NULL, 6}, + {"lc-messages", required_argument, NULL, 7}, + {"no-locale", no_argument, NULL, 8}, + {"text-search-config", required_argument, NULL, 'T'}, + {"auth", required_argument, NULL, 'A'}, + {"auth-local", required_argument, NULL, 10}, + {"auth-host", required_argument, NULL, 11}, + {"pwprompt", no_argument, NULL, 'W'}, + {"pwfile", required_argument, NULL, 9}, + {"username", required_argument, NULL, 'U'}, + {"help", no_argument, NULL, '?'}, + {"version", no_argument, NULL, 'V'}, + {"debug", no_argument, NULL, 'd'}, + {"show", no_argument, NULL, 's'}, + {"noclean", no_argument, NULL, 'n'}, /* for backwards compatibility */ + {"no-clean", no_argument, NULL, 'n'}, + {"nosync", no_argument, NULL, 'N'}, /* for backwards compatibility */ + {"no-sync", no_argument, NULL, 'N'}, + {"no-instructions", no_argument, NULL, 13}, + {"sync-only", no_argument, NULL, 'S'}, + {"waldir", required_argument, NULL, 'X'}, + {"wal-segsize", required_argument, NULL, 12}, + {"data-checksums", no_argument, NULL, 'k'}, + {"allow-group-access", no_argument, NULL, 'g'}, + {"discard-caches", no_argument, NULL, 14}, + {NULL, 0, NULL, 0} + }; + + /* + * options with no short version return a low integer, the rest return + * their short version value + */ + int c; + int option_index; + char *effective_user; + PQExpBuffer start_db_cmd; + char pg_ctl_path[MAXPGPATH]; + + /* + * Ensure that buffering behavior of stdout matches what it is in + * interactive usage (at least on most platforms). This prevents + * unexpected output ordering when, eg, output is redirected to a file. + * POSIX says we must do this before any other usage of these files. + */ + setvbuf(stdout, NULL, PG_IOLBF, 0); + + pg_logging_init(argv[0]); + progname = get_progname(argv[0]); + set_pglocale_pgservice(argv[0], PG_TEXTDOMAIN("initdb")); + + if (argc > 1) + { + if (strcmp(argv[1], "--help") == 0 || strcmp(argv[1], "-?") == 0) + { + usage(progname); + exit(0); + } + if (strcmp(argv[1], "--version") == 0 || strcmp(argv[1], "-V") == 0) + { + puts("initdb (PostgreSQL) " PG_VERSION); + exit(0); + } + } + + /* process command-line options */ + + while ((c = getopt_long(argc, argv, "A:dD:E:gkL:nNsST:U:WX:", long_options, &option_index)) != -1) + { + switch (c) + { + case 'A': + authmethodlocal = authmethodhost = pg_strdup(optarg); + + /* + * When ident is specified, use peer for local connections. + * Mirrored, when peer is specified, use ident for TCP/IP + * connections. + */ + if (strcmp(authmethodhost, "ident") == 0) + authmethodlocal = "peer"; + else if (strcmp(authmethodlocal, "peer") == 0) + authmethodhost = "ident"; + break; + case 10: + authmethodlocal = pg_strdup(optarg); + break; + case 11: + authmethodhost = pg_strdup(optarg); + break; + case 'D': + pg_data = pg_strdup(optarg); + break; + case 'E': + encoding = pg_strdup(optarg); + break; + case 'W': + pwprompt = true; + break; + case 'U': + username = pg_strdup(optarg); + break; + case 'd': + debug = true; + printf(_("Running in debug mode.\n")); + break; + case 'n': + noclean = true; + printf(_("Running in no-clean mode. Mistakes will not be cleaned up.\n")); + break; + case 'N': + do_sync = false; + break; + case 'S': + sync_only = true; + break; + case 'k': + data_checksums = true; + break; + case 'L': + share_path = pg_strdup(optarg); + break; + case 1: + locale = pg_strdup(optarg); + break; + case 2: + lc_collate = pg_strdup(optarg); + break; + case 3: + lc_ctype = pg_strdup(optarg); + break; + case 4: + lc_monetary = pg_strdup(optarg); + break; + case 5: + lc_numeric = pg_strdup(optarg); + break; + case 6: + lc_time = pg_strdup(optarg); + break; + case 7: + lc_messages = pg_strdup(optarg); + break; + case 8: + locale = "C"; + break; + case 9: + pwfilename = pg_strdup(optarg); + break; + case 's': + show_setting = true; + break; + case 'T': + default_text_search_config = pg_strdup(optarg); + break; + case 'X': + xlog_dir = pg_strdup(optarg); + break; + case 12: + str_wal_segment_size_mb = pg_strdup(optarg); + break; + case 13: + noinstructions = true; + break; + case 'g': + SetDataDirectoryCreatePerm(PG_DIR_MODE_GROUP); + break; + case 14: + extra_options = psprintf("%s %s", + extra_options, + "-c debug_discard_caches=1"); + break; + default: + /* getopt_long already emitted a complaint */ + fprintf(stderr, _("Try \"%s --help\" for more information.\n"), + progname); + exit(1); + } + } + + + /* + * Non-option argument specifies data directory as long as it wasn't + * already specified with -D / --pgdata + */ + if (optind < argc && !pg_data) + { + pg_data = pg_strdup(argv[optind]); + optind++; + } + + if (optind < argc) + { + pg_log_error("too many command-line arguments (first is \"%s\")", + argv[optind]); + fprintf(stderr, _("Try \"%s --help\" for more information.\n"), + progname); + exit(1); + } + + atexit(cleanup_directories_atexit); + + /* If we only need to fsync, just do it and exit */ + if (sync_only) + { + setup_pgdata(); + + /* must check that directory is readable */ + if (pg_check_dir(pg_data) <= 0) + { + pg_log_error("could not access directory \"%s\": %m", pg_data); + exit(1); + } + + fputs(_("syncing data to disk ... "), stdout); + fflush(stdout); + fsync_pgdata(pg_data, PG_VERSION_NUM); + check_ok(); + return 0; + } + + if (pwprompt && pwfilename) + { + pg_log_error("password prompt and password file cannot be specified together"); + exit(1); + } + + check_authmethod_unspecified(&authmethodlocal); + check_authmethod_unspecified(&authmethodhost); + + check_authmethod_valid(authmethodlocal, auth_methods_local, "local"); + check_authmethod_valid(authmethodhost, auth_methods_host, "host"); + + check_need_password(authmethodlocal, authmethodhost); + + /* set wal segment size */ + if (str_wal_segment_size_mb == NULL) + wal_segment_size_mb = (DEFAULT_XLOG_SEG_SIZE) / (1024 * 1024); + else + { + char *endptr; + + /* check that the argument is a number */ + wal_segment_size_mb = strtol(str_wal_segment_size_mb, &endptr, 10); + + /* verify that wal segment size is valid */ + if (endptr == str_wal_segment_size_mb || *endptr != '\0') + { + pg_log_error("argument of --wal-segsize must be a number"); + exit(1); + } + if (!IsValidWalSegSize(wal_segment_size_mb * 1024 * 1024)) + { + pg_log_error("argument of --wal-segsize must be a power of 2 between 1 and 1024"); + exit(1); + } + } + + get_restricted_token(); + + setup_pgdata(); + + setup_bin_paths(argv[0]); + + effective_user = get_id(); + if (!username) + username = effective_user; + + if (strncmp(username, "pg_", 3) == 0) + { + pg_log_error("superuser name \"%s\" is disallowed; role names cannot begin with \"pg_\"", username); + exit(1); + } + + printf(_("The files belonging to this database system will be owned " + "by user \"%s\".\n" + "This user must also own the server process.\n\n"), + effective_user); + + set_info_version(); + + setup_data_file_paths(); + + setup_locale_encoding(); + + setup_text_search(); + + printf("\n"); + + if (data_checksums) + printf(_("Data page checksums are enabled.\n")); + else + printf(_("Data page checksums are disabled.\n")); + + if (pwprompt || pwfilename) + get_su_pwd(); + + printf("\n"); + + initialize_data_directory(); + + if (do_sync) + { + fputs(_("syncing data to disk ... "), stdout); + fflush(stdout); + fsync_pgdata(pg_data, PG_VERSION_NUM); + check_ok(); + } + else + printf(_("\nSync to disk skipped.\nThe data directory might become corrupt if the operating system crashes.\n")); + + if (authwarning) + { + printf("\n"); + pg_log_warning("enabling \"trust\" authentication for local connections"); + fprintf(stderr, _("You can change this by editing pg_hba.conf or using the option -A, or\n" + "--auth-local and --auth-host, the next time you run initdb.\n")); + } + + if (!noinstructions) + { + /* + * Build up a shell command to tell the user how to start the server + */ + start_db_cmd = createPQExpBuffer(); + + /* Get directory specification used to start initdb ... */ + strlcpy(pg_ctl_path, argv[0], sizeof(pg_ctl_path)); + canonicalize_path(pg_ctl_path); + get_parent_directory(pg_ctl_path); + /* ... and tag on pg_ctl instead */ + join_path_components(pg_ctl_path, pg_ctl_path, "pg_ctl"); + + /* Convert the path to use native separators */ + make_native_path(pg_ctl_path); + + /* path to pg_ctl, properly quoted */ + appendShellString(start_db_cmd, pg_ctl_path); + + /* add -D switch, with properly quoted data directory */ + appendPQExpBufferStr(start_db_cmd, " -D "); + appendShellString(start_db_cmd, pgdata_native); + + /* add suggested -l switch and "start" command */ + /* translator: This is a placeholder in a shell command. */ + appendPQExpBuffer(start_db_cmd, " -l %s start", _("logfile")); + + printf(_("\nSuccess. You can now start the database server using:\n\n" + " %s\n\n"), + start_db_cmd->data); + + destroyPQExpBuffer(start_db_cmd); + } + + + success = true; + return 0; +} |