2018-03-07 12:03:19 +08:00
|
|
|
#include "Maat_command.h"
|
|
|
|
|
#include "Maat_rule.h"
|
|
|
|
|
#include "Maat_rule_internal.h"
|
2018-09-24 18:49:18 +08:00
|
|
|
#include "Maat_utils.h"
|
2018-03-07 12:03:19 +08:00
|
|
|
#include "config_monitor.h"
|
|
|
|
|
#include "map_str2int.h"
|
|
|
|
|
#include "hiredis.h"
|
|
|
|
|
#include <MESA/MESA_handle_logger.h>
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
#include <pthread.h>
|
|
|
|
|
#include <assert.h>
|
2018-08-01 19:42:36 +08:00
|
|
|
#include <unistd.h>
|
2018-03-07 12:03:19 +08:00
|
|
|
|
|
|
|
|
#define maat_redis_monitor (module_name_str("MAAT_REDIS_MONITOR"))
|
|
|
|
|
#define maat_command (module_name_str("MAAT_COMMAND"))
|
|
|
|
|
|
|
|
|
|
const char* rm_key_prefix[2]={"OBSOLETE_RULE","EFFECTIVE_RULE"};
|
|
|
|
|
const char* rm_status_sset="MAAT_UPDATE_STATUS";
|
|
|
|
|
const char* rm_expire_sset="MAAT_EXPIRE_TIMER";
|
|
|
|
|
const char* rm_label_sset="MAAT_LABEL_INDEX";
|
|
|
|
|
const char* rm_version_sset="MAAT_VERSION_TIMER";
|
2018-05-24 15:45:46 +08:00
|
|
|
const char* rm_expire_lock="EXPIRE_OP_LOCK";
|
2018-08-01 19:42:36 +08:00
|
|
|
const long rm_expire_lock_timeout=300*1000;
|
2018-03-07 12:03:19 +08:00
|
|
|
const static int MAAT_REDIS_SYNC_TIME=30*60;
|
2018-08-01 19:42:36 +08:00
|
|
|
const char* rm_op_str[]={"DEL","ADD","RENEW_TIMEOUT"};
|
2018-09-25 17:56:09 +08:00
|
|
|
const char* foreign_source_prefix="redis://";
|
|
|
|
|
const char* foreign_key_prefix="__FILE_";
|
2018-03-07 12:03:19 +08:00
|
|
|
|
|
|
|
|
|
|
|
|
|
struct _Maat_cmd_inner_t
|
|
|
|
|
{
|
|
|
|
|
struct Maat_cmd_t cmd;
|
|
|
|
|
enum MAAT_OPERATION op;
|
|
|
|
|
int ref_cnt;
|
|
|
|
|
int region_size[MAX_EXPR_ITEM_NUM];
|
2018-07-27 17:08:45 +08:00
|
|
|
char* huge_service_defined; //max to 4KB
|
2018-03-07 12:03:19 +08:00
|
|
|
struct _Maat_cmd_inner_t* next;
|
|
|
|
|
};
|
|
|
|
|
int _wrap_redisGetReply(redisContext *c, redisReply **reply)
|
|
|
|
|
{
|
|
|
|
|
return redisGetReply(c, (void **)reply);
|
|
|
|
|
}
|
|
|
|
|
redisReply *_wrap_redisCommand(redisContext *c, const char *format, ...)
|
|
|
|
|
{
|
|
|
|
|
va_list ap;
|
|
|
|
|
void *reply = NULL;
|
|
|
|
|
int ret=0,retry=0;
|
|
|
|
|
while(reply==NULL&&retry<2)
|
|
|
|
|
{
|
|
|
|
|
va_start(ap,format);
|
|
|
|
|
reply = redisvCommand(c,format,ap);
|
|
|
|
|
va_end(ap);
|
|
|
|
|
if(reply==NULL)
|
|
|
|
|
{
|
|
|
|
|
ret=redisReconnect(c);
|
|
|
|
|
retry++;
|
|
|
|
|
if(ret==REDIS_OK)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return (redisReply *)reply;
|
|
|
|
|
}
|
|
|
|
|
int connect_redis_for_write(_Maat_feather_t * feather)
|
|
|
|
|
{
|
|
|
|
|
int ret=0;
|
|
|
|
|
redisReply* reply=NULL;
|
|
|
|
|
assert(feather->redis_write_ctx==NULL);
|
|
|
|
|
feather->redis_write_ctx=redisConnectWithTimeout(feather->redis_ip, feather->redis_port,feather->connect_timeout);
|
2018-05-23 22:38:27 +08:00
|
|
|
if(feather->redis_write_ctx==NULL||feather->redis_write_ctx->err)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(feather->logger,RLOG_LV_FATAL,maat_module
|
2018-05-23 22:38:27 +08:00
|
|
|
,"Redis connect %s:%d for write failed: %s."
|
|
|
|
|
,feather->redis_ip,feather->redis_port,feather->redis_write_ctx==NULL?"Unkown":feather->redis_write_ctx->errstr);
|
|
|
|
|
if(feather->redis_write_ctx!=NULL)
|
|
|
|
|
{
|
|
|
|
|
redisFree(feather->redis_write_ctx);
|
|
|
|
|
feather->redis_write_ctx=NULL;
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
ret=-1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
reply=_wrap_redisCommand(feather->redis_write_ctx, "select %d",feather->redis_index);
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
}
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
long long read_redis_integer(const redisReply* reply)
|
|
|
|
|
{
|
|
|
|
|
switch(reply->type)
|
|
|
|
|
{
|
|
|
|
|
case REDIS_REPLY_INTEGER:
|
|
|
|
|
return reply->integer;
|
|
|
|
|
break;
|
|
|
|
|
case REDIS_REPLY_ARRAY:
|
|
|
|
|
assert(reply->element[0]->type==REDIS_REPLY_INTEGER);
|
|
|
|
|
return reply->element[0]->integer;
|
|
|
|
|
break;
|
|
|
|
|
case REDIS_REPLY_STRING:
|
|
|
|
|
return atoll(reply->str);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
assert(0);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
long long redis_server_time(redisContext* ctx)
|
|
|
|
|
{
|
|
|
|
|
long long server_time=0;
|
|
|
|
|
redisReply* data_reply=NULL;
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx,"TIME");
|
|
|
|
|
assert(data_reply->type==REDIS_REPLY_ARRAY);
|
|
|
|
|
server_time=atoll(data_reply->element[0]->str);
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
return server_time;
|
|
|
|
|
}
|
|
|
|
|
enum MAAT_TABLE_TYPE type_region2table(const struct Maat_region_t* p)
|
|
|
|
|
{
|
|
|
|
|
enum MAAT_TABLE_TYPE ret=TABLE_TYPE_IP;
|
|
|
|
|
switch(p->region_type)
|
|
|
|
|
{
|
|
|
|
|
case REGION_IP:
|
|
|
|
|
ret=TABLE_TYPE_IP;
|
|
|
|
|
break;
|
|
|
|
|
case REGION_EXPR:
|
|
|
|
|
if(p->expr_rule.district==NULL)
|
|
|
|
|
{
|
|
|
|
|
ret=TABLE_TYPE_EXPR;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
ret=TABLE_TYPE_EXPR_PLUS;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case REGION_INTERVAL:
|
|
|
|
|
ret=TABLE_TYPE_INTERVAL;
|
|
|
|
|
break;
|
|
|
|
|
case REGION_DIGEST:
|
|
|
|
|
ret=TABLE_TYPE_DIGEST;
|
|
|
|
|
break;
|
|
|
|
|
case REGION_SIMILARITY:
|
|
|
|
|
ret=TABLE_TYPE_SIMILARITY;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
assert(0);
|
|
|
|
|
}
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
int get_valid_flag_offset(const char* line, enum MAAT_TABLE_TYPE type,int valid_column_seq)
|
|
|
|
|
{
|
|
|
|
|
unsigned int offset=0;
|
|
|
|
|
unsigned int i=0,j=0;
|
|
|
|
|
switch(type)
|
|
|
|
|
{
|
|
|
|
|
case TABLE_TYPE_EXPR:
|
|
|
|
|
offset=7;
|
|
|
|
|
break;
|
|
|
|
|
case TABLE_TYPE_IP:
|
|
|
|
|
offset=14;
|
|
|
|
|
break;
|
|
|
|
|
case TABLE_TYPE_COMPILE:
|
|
|
|
|
offset=8;
|
|
|
|
|
break;
|
|
|
|
|
case TABLE_TYPE_PLUGIN:
|
|
|
|
|
if(valid_column_seq<0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
offset=(unsigned int)valid_column_seq;
|
|
|
|
|
break;
|
|
|
|
|
case TABLE_TYPE_INTERVAL:
|
|
|
|
|
offset=5;
|
|
|
|
|
break;
|
|
|
|
|
case TABLE_TYPE_DIGEST:
|
|
|
|
|
offset=6;
|
|
|
|
|
break;
|
|
|
|
|
case TABLE_TYPE_SIMILARITY:
|
|
|
|
|
offset=5;
|
|
|
|
|
break;
|
|
|
|
|
case TABLE_TYPE_EXPR_PLUS:
|
|
|
|
|
offset=8;
|
|
|
|
|
break;
|
|
|
|
|
case TABLE_TYPE_GROUP:
|
|
|
|
|
offset=3;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
assert(0);
|
|
|
|
|
}
|
|
|
|
|
for(i=0;i<strlen(line);i++)
|
|
|
|
|
{
|
|
|
|
|
if(line[i]==' '||line[i]=='\t')
|
|
|
|
|
{
|
|
|
|
|
j++;
|
|
|
|
|
}
|
|
|
|
|
if(j==offset-1)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
i++;
|
2018-07-19 20:29:33 +08:00
|
|
|
if(i>=strlen(line)||(line[i]!='1'&&line[i]!='0'))// 0 is also a valid value for some non-MAAT producer.
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
return i;
|
|
|
|
|
}
|
|
|
|
|
int invalidate_line(char* line, enum MAAT_TABLE_TYPE type,int valid_column_seq)
|
|
|
|
|
{
|
|
|
|
|
int i=0;
|
|
|
|
|
i=get_valid_flag_offset(line, type,valid_column_seq);
|
|
|
|
|
if(i<0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
line[i]='0';
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
void serialize_region(const struct Maat_region_t* p,int group_id, char* buff,int size)
|
|
|
|
|
{
|
|
|
|
|
int ret=0;
|
|
|
|
|
switch(p->region_type)
|
|
|
|
|
{
|
|
|
|
|
case REGION_IP:
|
|
|
|
|
ret=snprintf(buff,size,"%d\t%d\t%d\t%s\t%s\t%hu\t%hu\t%s\t%s\t%hu\t%hu\t%d\t%d\t1"
|
|
|
|
|
,p->region_id
|
|
|
|
|
,group_id
|
|
|
|
|
,p->ip_rule.addr_type
|
|
|
|
|
,p->ip_rule.src_ip
|
|
|
|
|
,p->ip_rule.mask_src_ip
|
|
|
|
|
,p->ip_rule.src_port
|
|
|
|
|
,p->ip_rule.mask_src_port
|
|
|
|
|
,p->ip_rule.dst_ip
|
|
|
|
|
,p->ip_rule.mask_dst_ip
|
|
|
|
|
,p->ip_rule.dst_port
|
|
|
|
|
,p->ip_rule.mask_dst_port
|
|
|
|
|
,p->ip_rule.protocol
|
|
|
|
|
,p->ip_rule.direction);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_EXPR:
|
|
|
|
|
if(p->expr_rule.district==NULL)
|
|
|
|
|
{
|
|
|
|
|
ret=snprintf(buff,size,"%d\t%d\t%s\t%d\t%d\t%d\t1"
|
|
|
|
|
,p->region_id
|
|
|
|
|
,group_id
|
|
|
|
|
,p->expr_rule.keywords
|
|
|
|
|
,p->expr_rule.expr_type
|
|
|
|
|
,p->expr_rule.match_method
|
|
|
|
|
,p->expr_rule.hex_bin);
|
|
|
|
|
}
|
|
|
|
|
else //expr_plus
|
|
|
|
|
{
|
|
|
|
|
ret=snprintf(buff,size,"%d\t%d\t%s\t%s\t%d\t%d\t%d\t1"
|
|
|
|
|
,p->region_id
|
|
|
|
|
,group_id
|
|
|
|
|
,p->expr_rule.keywords
|
|
|
|
|
,p->expr_rule.district
|
|
|
|
|
,p->expr_rule.expr_type
|
|
|
|
|
,p->expr_rule.match_method
|
|
|
|
|
,p->expr_rule.hex_bin);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case REGION_INTERVAL:
|
|
|
|
|
ret=snprintf(buff,size,"%d\t%d\t%u\t%u\t1"
|
|
|
|
|
,p->region_id
|
|
|
|
|
,group_id
|
|
|
|
|
,p->interval_rule.low_boundary
|
|
|
|
|
,p->interval_rule.up_boundary);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_DIGEST:
|
|
|
|
|
ret=snprintf(buff,size,"%d\t%d\t%llu\t%s\t%hd\t1"
|
|
|
|
|
,p->region_id
|
|
|
|
|
,group_id
|
|
|
|
|
,p->digest_rule.orgin_len
|
|
|
|
|
,p->digest_rule.digest_string
|
|
|
|
|
,p->digest_rule.confidence_degree);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_SIMILARITY:
|
|
|
|
|
ret=snprintf(buff,size,"%d\t%d\t%s\t%hd\t1"
|
|
|
|
|
,p->region_id
|
|
|
|
|
,group_id
|
|
|
|
|
,p->similarity_rule.target
|
|
|
|
|
,p->similarity_rule.threshold);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
assert(0);
|
|
|
|
|
}
|
|
|
|
|
assert(ret<size);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
void empty_serial_rules(struct serial_rule_t* rule)
|
|
|
|
|
{
|
|
|
|
|
if(rule->table_line!=NULL)
|
|
|
|
|
{
|
|
|
|
|
free(rule->table_line);
|
2018-09-24 18:49:18 +08:00
|
|
|
}
|
|
|
|
|
if(rule->n_foreign>0)
|
|
|
|
|
{
|
|
|
|
|
for(int i=0; i<rule->n_foreign; i++)
|
|
|
|
|
{
|
|
|
|
|
free(rule->f_keys[i].filename);
|
|
|
|
|
free(rule->f_keys[i].key);
|
|
|
|
|
}
|
|
|
|
|
free(rule->f_keys);
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
memset(rule,0,sizeof(struct serial_rule_t));
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
void set_serial_rule(struct serial_rule_t* rule,enum MAAT_OPERATION op,int rule_id,int label_id,const char* table_name,const char* line, long long timeout)
|
|
|
|
|
{
|
|
|
|
|
rule->op=op;
|
|
|
|
|
rule->rule_id=rule_id;
|
|
|
|
|
rule->label_id=label_id;
|
|
|
|
|
rule->timeout=timeout;
|
|
|
|
|
assert(strlen(table_name)<sizeof(rule->table_name));
|
|
|
|
|
memset(rule->table_name, 0, sizeof(rule->table_name));
|
|
|
|
|
memcpy(rule->table_name,table_name,strlen(table_name));
|
|
|
|
|
if(line!=NULL)
|
|
|
|
|
{
|
|
|
|
|
rule->table_line=_maat_strdup(line);
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
int _wrap_redisReconnect(redisContext* c, void*logger)
|
|
|
|
|
{
|
|
|
|
|
int ret=0;
|
|
|
|
|
ret=redisReconnect(c);
|
|
|
|
|
if(ret==REDIS_OK)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,"Reconnect success.");
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,"Reconnect failed.");
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-06-03 20:31:22 +08:00
|
|
|
int get_inc_key_list(long long instance_version, long long target_version, redisContext *c, struct serial_rule_t** list,void* logger)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-06-03 20:31:22 +08:00
|
|
|
redisReply* reply=NULL,*tmp_reply=NULL;
|
|
|
|
|
char err_buff[256], op_str[4];
|
|
|
|
|
int rule_num=0,ret=0;
|
|
|
|
|
unsigned int i=0;
|
|
|
|
|
long long nearest_rule_version;
|
|
|
|
|
struct serial_rule_t *s_rule=NULL;
|
|
|
|
|
|
|
|
|
|
//Returns all the elements in the sorted set at key with a score that instance_version < score <= redis_version.
|
|
|
|
|
//The elements are considered to be ordered from low to high scores(instance_version).
|
|
|
|
|
reply=(redisReply*)redisCommand(c, "ZRANGEBYSCORE %s (%lld %lld",rm_status_sset,instance_version,target_version);
|
|
|
|
|
|
|
|
|
|
if(reply==NULL)
|
|
|
|
|
{
|
|
|
|
|
__redis_strerror_r(errno,err_buff,sizeof(err_buff));
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,
|
|
|
|
|
"GET %s failed %s.",rm_status_sset,err_buff);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
assert(reply->type==REDIS_REPLY_ARRAY);
|
|
|
|
|
rule_num=reply->elements;
|
|
|
|
|
if(reply->elements==0)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
tmp_reply=_wrap_redisCommand(c, "ZSCORE %s %s",rm_status_sset,reply->element[0]->str);
|
|
|
|
|
if(tmp_reply->type!=REDIS_REPLY_STRING)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_INFO, maat_redis_monitor,
|
|
|
|
|
"ZSCORE %s %s failed Version: %lld->%lld",rm_status_sset,reply->element[0]->str,instance_version, target_version);
|
|
|
|
|
freeReplyObject(tmp_reply);
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
nearest_rule_version=read_redis_integer(tmp_reply);
|
|
|
|
|
freeReplyObject(tmp_reply);
|
|
|
|
|
tmp_reply=NULL;
|
|
|
|
|
if(nearest_rule_version!=instance_version+1)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_INFO, maat_redis_monitor,
|
|
|
|
|
"Noncontinuous VERSION Redis: %lld MAAT: %lld.",nearest_rule_version,instance_version);
|
|
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
s_rule=(struct serial_rule_t*)calloc(reply->elements,sizeof(struct serial_rule_t));
|
|
|
|
|
for(i=0;i<reply->elements;i++)
|
|
|
|
|
{
|
|
|
|
|
assert(reply->element[i]->type==REDIS_REPLY_STRING);
|
|
|
|
|
ret=sscanf(reply->element[i]->str,"%[^,],%[^,],%d",op_str,s_rule[i].table_name,&(s_rule[i].rule_id));
|
|
|
|
|
assert(ret==3);
|
|
|
|
|
if(strncmp(op_str,"ADD",strlen("ADD"))==0)
|
|
|
|
|
{
|
|
|
|
|
s_rule[i].op=MAAT_OP_ADD;
|
|
|
|
|
}
|
|
|
|
|
else if(strncmp(op_str,"DEL",strlen("DEL"))==0)
|
|
|
|
|
{
|
|
|
|
|
s_rule[i].op=MAAT_OP_DEL;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
assert(0);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
rule_num=reply->elements;
|
|
|
|
|
*list=s_rule;
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
return rule_num;
|
|
|
|
|
}
|
|
|
|
|
struct s_rule_array_t
|
|
|
|
|
{
|
|
|
|
|
int cnt;
|
|
|
|
|
int size;
|
|
|
|
|
struct serial_rule_t* array;
|
|
|
|
|
};
|
|
|
|
|
void save_serial_rule_cb(const uchar * key, uint size, void * data, void * user)
|
|
|
|
|
{
|
|
|
|
|
struct s_rule_array_t* array=(struct s_rule_array_t*)user;
|
|
|
|
|
int i=array->cnt;
|
|
|
|
|
memcpy(&(array->array[i]),data,sizeof(struct serial_rule_t));
|
|
|
|
|
array->array[i].op=MAAT_OP_ADD;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
int recovery_history_version(const struct serial_rule_t* current, int current_num, const struct serial_rule_t* changed, int changed_num, struct serial_rule_t** history_result)
|
|
|
|
|
{
|
|
|
|
|
int i=0,ret=0;
|
|
|
|
|
unsigned int history_num=0;
|
|
|
|
|
int hash_slot_size=1;
|
|
|
|
|
MESA_htable_handle htable=NULL;
|
|
|
|
|
MESA_htable_create_args_t hargs;
|
|
|
|
|
struct s_rule_array_t tmp_array;
|
|
|
|
|
char hkey[256+20];
|
|
|
|
|
int tmp=current_num+changed_num;
|
|
|
|
|
for(;tmp>0;tmp=tmp/2)
|
|
|
|
|
{
|
|
|
|
|
hash_slot_size*=2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
memset(&hargs,0,sizeof(hargs));
|
|
|
|
|
hargs.thread_safe=0;
|
|
|
|
|
hargs.hash_slot_size = hash_slot_size;
|
|
|
|
|
hargs.max_elem_num = 0;
|
|
|
|
|
hargs.eliminate_type = HASH_ELIMINATE_ALGO_FIFO;
|
|
|
|
|
hargs.expire_time = 0;
|
|
|
|
|
hargs.key_comp = NULL;
|
|
|
|
|
hargs.key2index = NULL;
|
|
|
|
|
hargs.recursive = 1;
|
|
|
|
|
hargs.data_free = NULL;//data is an reference, no need to free.
|
|
|
|
|
hargs.data_expire_with_condition = NULL;
|
|
|
|
|
htable=MESA_htable_create(&hargs, sizeof(hargs));
|
|
|
|
|
MESA_htable_print_crtl(htable, 0);
|
|
|
|
|
|
|
|
|
|
for(i=0;i<current_num;i++)
|
|
|
|
|
{
|
|
|
|
|
snprintf(hkey,sizeof(hkey),"%d,%s",current[i].rule_id,current[i].table_name);
|
|
|
|
|
ret=MESA_htable_add(htable, (uchar*)hkey, strlen(hkey), current+i);
|
|
|
|
|
assert(ret>0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for(i=changed_num-1;i>=0;i--)
|
|
|
|
|
{
|
|
|
|
|
snprintf(hkey,sizeof(hkey),"%d,%s",changed[i].rule_id,changed[i].table_name);
|
|
|
|
|
if(changed[i].op==MAAT_OP_ADD)//newly added rule is need to delete from current, so that history version can be recovered.
|
|
|
|
|
{
|
|
|
|
|
ret=MESA_htable_del(htable, (uchar*)hkey, strlen(hkey), NULL);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
ret=MESA_htable_add(htable, (uchar*)hkey, strlen(hkey),changed+i);
|
|
|
|
|
}
|
|
|
|
|
if(ret<0)//failed
|
|
|
|
|
{
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
history_num=MESA_htable_get_elem_num(htable);
|
|
|
|
|
tmp_array.cnt=0;
|
|
|
|
|
tmp_array.size=history_num;
|
|
|
|
|
tmp_array.array=(struct serial_rule_t*)calloc(history_num,sizeof(struct serial_rule_t));
|
|
|
|
|
MESA_htable_iterate(htable, save_serial_rule_cb, &tmp_array);
|
|
|
|
|
*history_result=tmp_array.array;
|
|
|
|
|
ret=history_num;
|
|
|
|
|
error_out:
|
|
|
|
|
MESA_htable_destroy(htable, NULL);
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
int get_rm_key_list(redisContext *c, long long instance_version, long long desired_version, long long* new_version, struct serial_rule_t** list,int *update_type, void* logger, int cumulative_off)
|
|
|
|
|
{
|
|
|
|
|
redisReply* reply=NULL,*sub_reply=NULL;
|
2018-03-07 12:03:19 +08:00
|
|
|
char err_buff[256];
|
2018-06-03 20:31:22 +08:00
|
|
|
long long redis_version=0,target_version=0;
|
|
|
|
|
int rule_num=0, changed_rule_num=0;
|
2018-03-07 12:03:19 +08:00
|
|
|
int ret=0;
|
|
|
|
|
unsigned int i=0,full_idx =0,append_cmd_cnt=0;
|
2018-06-03 20:31:22 +08:00
|
|
|
struct serial_rule_t *s_rule_array=NULL, *changed_rule_array=NULL, *history_rule_array=NULL;
|
2018-03-07 12:03:19 +08:00
|
|
|
|
|
|
|
|
reply=(redisReply*)redisCommand(c, "GET MAAT_VERSION");
|
|
|
|
|
if(reply!=NULL)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
if(reply->type==REDIS_REPLY_NIL||reply->type==REDIS_REPLY_ERROR)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,"GET MAAT_VERSION failed, maybe Redis is busy.");
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
reply=NULL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
memset(err_buff,0,sizeof(err_buff));
|
|
|
|
|
__redis_strerror_r(errno,err_buff,sizeof(err_buff));
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,
|
|
|
|
|
"GET MAAT_VERSION failed %s. Reconnecting...",err_buff);
|
|
|
|
|
_wrap_redisReconnect(c,logger);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2018-06-03 20:31:22 +08:00
|
|
|
redis_version=read_redis_integer(reply);
|
2018-03-07 12:03:19 +08:00
|
|
|
freeReplyObject(reply);
|
2018-06-03 20:31:22 +08:00
|
|
|
if(redis_version==instance_version)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-03 20:31:22 +08:00
|
|
|
if(instance_version==0||desired_version!=0)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
goto FULL_UPDATE;
|
|
|
|
|
}
|
2018-06-03 20:31:22 +08:00
|
|
|
if(redis_version<instance_version)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_INFO, maat_redis_monitor,
|
2018-06-03 20:31:22 +08:00
|
|
|
"VERSION roll back MAAT: %lld -> Redis: %lld.",instance_version,redis_version);
|
2018-03-07 12:03:19 +08:00
|
|
|
goto FULL_UPDATE;
|
|
|
|
|
}
|
2018-06-03 20:31:22 +08:00
|
|
|
if(redis_version>instance_version&&cumulative_off==1)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-06-03 20:31:22 +08:00
|
|
|
target_version=instance_version;
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2018-06-03 20:31:22 +08:00
|
|
|
target_version=redis_version-1;
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
do{
|
2018-03-22 21:23:33 +08:00
|
|
|
target_version++;
|
2018-06-03 20:31:22 +08:00
|
|
|
rule_num=get_inc_key_list(instance_version, target_version, c, &s_rule_array,logger);
|
2018-08-01 19:42:36 +08:00
|
|
|
if(rule_num>0)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-06-03 20:31:22 +08:00
|
|
|
break;
|
|
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
else if(rule_num<0)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-06-03 20:31:22 +08:00
|
|
|
goto FULL_UPDATE;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
//ret=0, nothing to do.
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
2018-03-22 21:23:33 +08:00
|
|
|
|
2018-06-03 20:31:22 +08:00
|
|
|
}while(rule_num==0&&target_version<=redis_version&&cumulative_off==1);
|
2018-03-07 12:03:19 +08:00
|
|
|
if(rule_num==0)
|
|
|
|
|
{
|
2018-03-22 21:23:33 +08:00
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,"Got nothing after ZRANGEBYSCORE %s (%lld %lld, cumulative %s"
|
2018-06-03 20:31:22 +08:00
|
|
|
,rm_status_sset,instance_version,target_version-1,cumulative_off==1?"OFF":"ON");
|
2018-03-07 12:03:19 +08:00
|
|
|
goto FULL_UPDATE;
|
|
|
|
|
}
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_INFO, maat_redis_monitor,
|
2018-06-17 20:03:17 +08:00
|
|
|
"Inc Update form instance_version %lld to %lld (%d entries).",instance_version,target_version,rule_num);
|
2018-06-03 20:31:22 +08:00
|
|
|
*list=s_rule_array;
|
2018-03-07 12:03:19 +08:00
|
|
|
*update_type=CM_UPDATE_TYPE_INC;
|
2018-03-22 21:23:33 +08:00
|
|
|
*new_version=target_version;
|
2018-06-03 20:31:22 +08:00
|
|
|
return rule_num;
|
|
|
|
|
|
2018-03-07 12:03:19 +08:00
|
|
|
FULL_UPDATE:
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_INFO, maat_redis_monitor,
|
2018-06-03 20:31:22 +08:00
|
|
|
"Initiate full udpate from instance_version %d to %lld.",instance_version,desired_version==0?redis_version:desired_version);
|
2018-03-07 12:03:19 +08:00
|
|
|
append_cmd_cnt=0;
|
|
|
|
|
ret=redisAppendCommand(c, "MULTI");
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
ret=redisAppendCommand(c, "GET MAAT_VERSION");
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
ret=redisAppendCommand(c, "KEYS EFFECTIVE_RULE:*");
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
//consume reply "OK" and "QUEUED".
|
|
|
|
|
for(i=0;i<append_cmd_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
_wrap_redisGetReply(c, &reply);
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
reply=NULL;
|
|
|
|
|
}
|
|
|
|
|
reply=_wrap_redisCommand(c,"EXEC");
|
|
|
|
|
if(reply==NULL)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,
|
|
|
|
|
"Redis Communication error: %s.",c->errstr);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
assert(reply->type==REDIS_REPLY_ARRAY);
|
|
|
|
|
*new_version=read_redis_integer(reply->element[0]);
|
|
|
|
|
sub_reply=reply->element[1];
|
|
|
|
|
assert(sub_reply->type==REDIS_REPLY_ARRAY);
|
2018-06-03 20:31:22 +08:00
|
|
|
rule_num=sub_reply->elements;
|
|
|
|
|
s_rule_array=(struct serial_rule_t*)calloc(rule_num,sizeof(struct serial_rule_t));
|
2018-03-07 12:03:19 +08:00
|
|
|
for(full_idx=0;full_idx<sub_reply->elements;full_idx++)
|
|
|
|
|
{
|
|
|
|
|
assert(sub_reply->element[full_idx]->type==REDIS_REPLY_STRING);
|
2018-06-03 20:31:22 +08:00
|
|
|
ret=sscanf(sub_reply->element[full_idx]->str,"%*[^:]:%[^,],%d",s_rule_array[full_idx].table_name,&(s_rule_array[full_idx].rule_id));
|
|
|
|
|
s_rule_array[full_idx].op=MAAT_OP_ADD;
|
2018-03-07 12:03:19 +08:00
|
|
|
assert(ret==2);
|
|
|
|
|
}
|
|
|
|
|
freeReplyObject(reply);
|
2018-06-03 20:31:22 +08:00
|
|
|
if(desired_version!=0)
|
|
|
|
|
{
|
|
|
|
|
changed_rule_num=get_inc_key_list(desired_version, redis_version, c, &changed_rule_array, logger);
|
|
|
|
|
if(changed_rule_num<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,
|
|
|
|
|
"Recover history version %lld faild where as redis version is %lld.", desired_version, redis_version);
|
|
|
|
|
}
|
|
|
|
|
else if(changed_rule_num==0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,
|
|
|
|
|
"Nothing to recover from history version %lld to redis version is %lld.", desired_version, redis_version);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
ret=recovery_history_version(s_rule_array, full_idx, changed_rule_array, changed_rule_num, &history_rule_array);
|
|
|
|
|
if(ret>0)
|
|
|
|
|
{
|
|
|
|
|
free(s_rule_array);
|
|
|
|
|
s_rule_array=history_rule_array;
|
|
|
|
|
rule_num=ret;
|
|
|
|
|
*new_version=desired_version;
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor,
|
|
|
|
|
"Successfully recovered from history version %lld to redis version is %lld.", desired_version, redis_version);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
free(changed_rule_array);
|
|
|
|
|
}
|
|
|
|
|
*list=s_rule_array;
|
2018-03-07 12:03:19 +08:00
|
|
|
*update_type=CM_UPDATE_TYPE_FULL;
|
|
|
|
|
|
2018-06-03 20:31:22 +08:00
|
|
|
return rule_num ;
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int _get_maat_redis_value(redisContext *c,struct serial_rule_t* rule_list,int rule_num,void* logger)
|
|
|
|
|
{
|
|
|
|
|
int i=0,ret=0,failed_cnt=0,idx=0;
|
|
|
|
|
int error_happened=0;
|
|
|
|
|
int *retry_ids=(int*)malloc(sizeof(int)*rule_num);
|
|
|
|
|
char redis_cmd[256];
|
|
|
|
|
redisReply* reply=NULL;
|
|
|
|
|
for(i=0;i<rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
snprintf(redis_cmd,sizeof(redis_cmd),"GET %s:%s,%d",rm_key_prefix[rule_list[i].op]
|
|
|
|
|
,rule_list[i].table_name
|
|
|
|
|
,rule_list[i].rule_id);
|
|
|
|
|
ret=redisAppendCommand(c, redis_cmd);
|
|
|
|
|
assert(ret==REDIS_OK);
|
|
|
|
|
}
|
|
|
|
|
for(i=0;i<rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
ret=_wrap_redisGetReply(c,&reply);
|
|
|
|
|
if(reply->type==REDIS_REPLY_STRING)
|
|
|
|
|
{
|
|
|
|
|
rule_list[i].table_line=_maat_strdup(reply->str);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if(reply->type==REDIS_REPLY_NIL)
|
|
|
|
|
{
|
|
|
|
|
retry_ids[failed_cnt]=i;
|
|
|
|
|
failed_cnt++;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_redis_monitor
|
|
|
|
|
,"Redis GET %s:%s,%d failed",rm_key_prefix[rule_list[i].op]
|
|
|
|
|
,rule_list[i].table_name
|
|
|
|
|
,rule_list[i].rule_id);
|
|
|
|
|
error_happened=1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
}
|
|
|
|
|
if(error_happened==1)
|
|
|
|
|
{
|
|
|
|
|
free(retry_ids);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for(i=0;i<failed_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
idx=retry_ids[i];
|
|
|
|
|
snprintf(redis_cmd,sizeof(redis_cmd),"GET %s:%s,%d",rm_key_prefix[MAAT_OP_DEL]
|
|
|
|
|
,rule_list[idx].table_name
|
|
|
|
|
,rule_list[idx].rule_id);
|
2018-05-24 15:45:46 +08:00
|
|
|
ret=redisAppendCommand(c, redis_cmd);
|
|
|
|
|
}
|
|
|
|
|
for(i=0;i<failed_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
idx=retry_ids[i];
|
|
|
|
|
ret=_wrap_redisGetReply(c,&reply);
|
2018-03-07 12:03:19 +08:00
|
|
|
if(reply->type==REDIS_REPLY_STRING)
|
|
|
|
|
{
|
|
|
|
|
rule_list[idx].table_line=_maat_strdup(reply->str);
|
|
|
|
|
}
|
2018-09-21 21:32:09 +08:00
|
|
|
else if(reply->type==REDIS_REPLY_ERROR)//Deal with Redis response: "Loading Redis is loading the database in memory"
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_redis_monitor
|
|
|
|
|
,"Redis cmd=%s Error, Reply type=%d, str=%s",redis_cmd, reply->type, reply->str);
|
|
|
|
|
}
|
|
|
|
|
else //Handle type "nil"
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_redis_monitor
|
|
|
|
|
,"Redis cmd=%s Failed, Reply type=%d",redis_cmd, reply->type);
|
|
|
|
|
}
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
}
|
|
|
|
|
free(retry_ids);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
int get_maat_redis_value(redisContext *c,struct serial_rule_t* rule_list,int rule_num,void* logger,int print_process)
|
|
|
|
|
{
|
|
|
|
|
int max_redis_batch=4*1024,batch_cnt=0;
|
|
|
|
|
int success_cnt=0,ret=0;
|
|
|
|
|
int next_print=10;
|
|
|
|
|
while(success_cnt<rule_num)
|
|
|
|
|
{
|
|
|
|
|
batch_cnt=MIN(rule_num-success_cnt,max_redis_batch);
|
|
|
|
|
ret=_get_maat_redis_value(c,rule_list+success_cnt,batch_cnt,logger);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
success_cnt+=batch_cnt;
|
|
|
|
|
}
|
|
|
|
|
if(print_process==1)
|
|
|
|
|
{
|
|
|
|
|
if((success_cnt*100)/rule_num>next_print)
|
|
|
|
|
{
|
|
|
|
|
printf(" >%d%%",next_print);
|
|
|
|
|
next_print+=10;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if(print_process==1)
|
|
|
|
|
{
|
|
|
|
|
printf(" >100%%\n");
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
int calculate_serial_rule_num(struct _Maat_cmd_inner_t* _cmd,int * new_region_cnt, int* new_group_cnt)
|
|
|
|
|
{
|
|
|
|
|
int serial_num=0;
|
|
|
|
|
int i=0;
|
|
|
|
|
struct Maat_cmd_t* cmd=&(_cmd->cmd);
|
|
|
|
|
serial_num++;//compile rule
|
|
|
|
|
for(i=0;i<cmd->group_num;i++)
|
|
|
|
|
{
|
|
|
|
|
serial_num++;
|
|
|
|
|
if(cmd->groups[i].regions==NULL)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
if(_cmd->op==MAAT_OP_ADD)
|
|
|
|
|
{
|
|
|
|
|
*new_region_cnt+=cmd->groups[i].region_num;
|
|
|
|
|
(*new_group_cnt)++;
|
|
|
|
|
}
|
|
|
|
|
//for MAAT_OP_DEL, if the group's refcnt>1, group->region_num=0.
|
|
|
|
|
//so it's OK to add.
|
|
|
|
|
serial_num+=cmd->groups[i].region_num;
|
|
|
|
|
}
|
|
|
|
|
return serial_num;
|
|
|
|
|
}
|
|
|
|
|
int reconstruct_cmd(struct _Maat_feather_t *feather, struct _Maat_cmd_inner_t* _cmd)
|
|
|
|
|
{
|
|
|
|
|
int i=0,j=0,grp_idx=0;
|
|
|
|
|
struct Maat_cmd_t* cmd=&(_cmd->cmd);
|
|
|
|
|
struct Maat_group_t* group_cmd=NULL;
|
|
|
|
|
struct Maat_region_t* region_cmd=NULL;
|
|
|
|
|
|
|
|
|
|
struct _Maat_compile_inner_t *compile_inner=NULL;
|
|
|
|
|
struct _Maat_group_inner_t* group_inner=NULL;
|
|
|
|
|
struct _Maat_region_inner_t* region_inner=NULL;
|
|
|
|
|
void* logger=feather->logger;
|
|
|
|
|
|
|
|
|
|
int config_id=cmd->compile.config_id;
|
|
|
|
|
if(feather->scanner==NULL)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_command
|
|
|
|
|
,"MAAT not ready.");
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
compile_inner=(struct _Maat_compile_inner_t *)HASH_fetch_by_id(feather->scanner->compile_hash, config_id);
|
2018-07-05 18:39:15 +08:00
|
|
|
//Operation on compile_inner is thread safe, no immediate memory free when delete a compile rule or a scanner.
|
|
|
|
|
//In another words, if the compile_inner is accessable from compile means, its was valid in at least 10 seconds (garbage bury).
|
2018-03-07 12:03:19 +08:00
|
|
|
if(compile_inner==NULL)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_command
|
|
|
|
|
,"config %d not exist."
|
|
|
|
|
,config_id);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2018-07-05 18:39:15 +08:00
|
|
|
pthread_rwlock_rdlock(&(compile_inner->rwlock));
|
2018-03-07 12:03:19 +08:00
|
|
|
cmd->group_num=compile_inner->group_cnt;
|
|
|
|
|
assert(cmd->groups==NULL);
|
|
|
|
|
cmd->groups=(struct Maat_group_t*)calloc(sizeof(struct Maat_group_t),cmd->group_num);
|
|
|
|
|
for(i=0;i<compile_inner->group_boundary;i++)
|
|
|
|
|
{
|
|
|
|
|
group_inner=(struct _Maat_group_inner_t*)dynamic_array_read(compile_inner->groups,i);
|
|
|
|
|
if(group_inner==NULL)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
group_cmd=&(cmd->groups[grp_idx]);
|
|
|
|
|
group_cmd->group_id=group_inner->group_id;
|
|
|
|
|
|
|
|
|
|
if(group_inner->ref_cnt>1)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
group_cmd->region_num=group_inner->region_cnt;
|
|
|
|
|
group_cmd->regions=(struct Maat_region_t*)calloc(sizeof(struct Maat_region_t),group_cmd->region_num);
|
|
|
|
|
for(j=0;j<group_inner->region_boundary;j++)
|
|
|
|
|
{
|
|
|
|
|
region_inner=(struct _Maat_region_inner_t*)dynamic_array_read(group_inner->regions,j);
|
|
|
|
|
if(region_inner==NULL)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
region_cmd=&(group_cmd->regions[j]);
|
|
|
|
|
region_cmd->table_name=_maat_strdup(feather->p_table_info[region_inner->table_id]->table_name[0]);
|
|
|
|
|
region_cmd->region_id=region_inner->region_id;
|
|
|
|
|
//NOTICE: region_type only avilable when OP_ADD,
|
|
|
|
|
region_cmd->region_type=REGION_EXPR;
|
|
|
|
|
}
|
|
|
|
|
grp_idx++;
|
|
|
|
|
}
|
2018-07-05 18:39:15 +08:00
|
|
|
pthread_rwlock_unlock(&(compile_inner->rwlock));
|
2018-03-07 12:03:19 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int build_serial_rule(_Maat_feather_t *feather,struct _Maat_cmd_inner_t* _cmd,struct serial_rule_t* list, int size)
|
|
|
|
|
{
|
|
|
|
|
struct Maat_group_t* p_group=NULL;
|
|
|
|
|
struct Maat_region_t* p_region=NULL;
|
|
|
|
|
struct Maat_rule_t* p_m_rule=NULL;
|
|
|
|
|
struct Maat_cmd_t* cmd=&(_cmd->cmd);
|
|
|
|
|
enum MAAT_OPERATION op=_cmd->op;
|
|
|
|
|
|
|
|
|
|
int rule_num=0,i=0,j=0;
|
|
|
|
|
p_m_rule=&(cmd->compile);
|
2018-07-05 17:34:06 +08:00
|
|
|
char line[MAX_TABLE_LINE_SIZE];
|
2018-03-07 12:03:19 +08:00
|
|
|
time_t timeout=0;
|
|
|
|
|
if(_cmd->cmd.expire_after>0)
|
|
|
|
|
{
|
|
|
|
|
timeout=feather->server_time+_cmd->cmd.expire_after;
|
|
|
|
|
}
|
|
|
|
|
if(op==MAAT_OP_ADD)
|
|
|
|
|
{
|
|
|
|
|
snprintf(line,sizeof(line),"%d\t%d\t%hhd\t%hhd\t%hhd\t0\t%s\t1\t%d",p_m_rule->config_id
|
|
|
|
|
,p_m_rule->service_id
|
|
|
|
|
,p_m_rule->action
|
|
|
|
|
,p_m_rule->do_blacklist
|
|
|
|
|
,p_m_rule->do_log
|
2018-07-27 17:08:45 +08:00
|
|
|
,(_cmd->huge_service_defined!=NULL)?(_cmd->huge_service_defined):(p_m_rule->service_defined)
|
2018-03-07 12:03:19 +08:00
|
|
|
,cmd->group_num);
|
|
|
|
|
set_serial_rule(list+rule_num,MAAT_OP_ADD,cmd->compile.config_id,cmd->label_id,feather->compile_tn,line,timeout);
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
set_serial_rule(list+rule_num,op,cmd->compile.config_id,cmd->label_id,feather->compile_tn,NULL,timeout);
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
rule_num++;
|
|
|
|
|
for(i=0;i<cmd->group_num;i++)
|
|
|
|
|
{
|
|
|
|
|
p_group=&(cmd->groups[i]);
|
|
|
|
|
if(op==MAAT_OP_ADD)
|
|
|
|
|
{
|
|
|
|
|
if(feather->AUTO_NUMBERING_ON==1)
|
|
|
|
|
{
|
|
|
|
|
p_group->group_id=feather->base_grp_seq;
|
|
|
|
|
feather->base_grp_seq++;
|
|
|
|
|
}
|
|
|
|
|
snprintf(line,sizeof(line),"%d\t%d\t1",p_group->group_id
|
|
|
|
|
,p_m_rule->config_id);
|
|
|
|
|
set_serial_rule(list+rule_num,MAAT_OP_ADD,p_group->group_id,0,feather->group_tn,line,timeout);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
set_serial_rule(list+rule_num,op,p_group->group_id,0,feather->group_tn,NULL,timeout);
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
rule_num++;
|
|
|
|
|
if(p_group->regions==NULL)//group reuse.
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
for(j=0;j<p_group->region_num;j++)
|
|
|
|
|
{
|
|
|
|
|
p_region=&(p_group->regions[j]);
|
|
|
|
|
if(op==MAAT_OP_ADD)
|
|
|
|
|
{
|
|
|
|
|
if(feather->AUTO_NUMBERING_ON==1)
|
|
|
|
|
{
|
|
|
|
|
p_region->region_id=feather->base_rgn_seq;
|
|
|
|
|
feather->base_rgn_seq++;
|
|
|
|
|
}
|
|
|
|
|
serialize_region(p_region, p_group->group_id, line, sizeof(line));
|
|
|
|
|
set_serial_rule(list+rule_num,MAAT_OP_ADD
|
|
|
|
|
,p_region->region_id,0,p_region->table_name,line,timeout);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
set_serial_rule(list+rule_num,op
|
|
|
|
|
,p_region->region_id,0,p_region->table_name,NULL,timeout);
|
2018-03-07 12:03:19 +08:00
|
|
|
|
|
|
|
|
}
|
|
|
|
|
rule_num++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
assert(rule_num<=size);
|
|
|
|
|
return rule_num;
|
|
|
|
|
}
|
|
|
|
|
int mr_transaction_success(redisReply* data_reply)
|
|
|
|
|
{
|
|
|
|
|
if(data_reply->type==REDIS_REPLY_NIL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
int mr_operation_success(redisReply* actual_reply, redisReply* expected_reply)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
if(expected_reply->type!=actual_reply->type)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
if(expected_reply->type==REDIS_REPLY_INTEGER&&expected_reply->integer!=actual_reply->integer)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
return 1;
|
2018-08-01 19:42:36 +08:00
|
|
|
|
|
|
|
|
}
|
|
|
|
|
int redlock_try_lock(redisContext *ctx, const char* lock_name, long long expire)
|
|
|
|
|
{
|
|
|
|
|
redisReply* reply=NULL;
|
|
|
|
|
int ret=0;
|
|
|
|
|
reply=_wrap_redisCommand(ctx,"SET %s locked NX PX %lld", lock_name, expire);
|
|
|
|
|
if(reply->type==REDIS_REPLY_NIL)
|
|
|
|
|
{
|
|
|
|
|
ret=0;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
ret=1;
|
|
|
|
|
}
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
return ret;
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
void redlock_unlock(redisContext * ctx, const char * lock_name)
|
|
|
|
|
{
|
|
|
|
|
redisReply* reply=NULL;
|
|
|
|
|
reply=_wrap_redisCommand(ctx,"DEL %s", lock_name);
|
|
|
|
|
freeReplyObject(reply);
|
2018-03-07 12:03:19 +08:00
|
|
|
|
2018-08-01 19:42:36 +08:00
|
|
|
}
|
|
|
|
|
struct expected_reply_t
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
int srule_seq;
|
|
|
|
|
redisReply reply;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
long long _exec_serial_rule_begin(redisContext* ctx,int rule_num, int renew_rule_num,int *renew_allowed, long long *maat_redis_version)
|
|
|
|
|
{
|
|
|
|
|
int ret=0;
|
2018-03-07 12:03:19 +08:00
|
|
|
redisReply* data_reply=NULL;
|
2018-08-01 19:42:36 +08:00
|
|
|
if(renew_rule_num>0)
|
|
|
|
|
{
|
|
|
|
|
while(0==redlock_try_lock(ctx, rm_expire_lock, rm_expire_lock_timeout))
|
|
|
|
|
{
|
|
|
|
|
usleep(1000);
|
|
|
|
|
}
|
|
|
|
|
*renew_allowed=1;
|
|
|
|
|
}
|
|
|
|
|
if(rule_num>renew_rule_num)
|
|
|
|
|
{
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx, "INCRBY MAAT_PRE_VER 1");
|
|
|
|
|
*maat_redis_version=read_redis_integer(data_reply);
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
}
|
|
|
|
|
if(*renew_allowed==1||rule_num>renew_rule_num)
|
|
|
|
|
{
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx,"MULTI");
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
ret=1;
|
|
|
|
|
}
|
|
|
|
|
return ret;
|
2018-03-22 21:23:33 +08:00
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
redisReply* _exec_serial_rule_end(redisContext* ctx,long long maat_redis_version, long long server_time, int renew_allowed)
|
2018-03-22 21:23:33 +08:00
|
|
|
{
|
|
|
|
|
redisReply* data_reply=NULL;
|
2018-08-01 19:42:36 +08:00
|
|
|
if(renew_allowed==1)
|
|
|
|
|
{
|
|
|
|
|
redlock_unlock(ctx, rm_expire_lock);
|
|
|
|
|
}
|
|
|
|
|
if(maat_redis_version>0)
|
|
|
|
|
{
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx,"ZADD %s NX %d %d",rm_version_sset,server_time,maat_redis_version);
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx,"INCRBY MAAT_VERSION 1");
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
}
|
2018-03-22 21:23:33 +08:00
|
|
|
data_reply=_wrap_redisCommand(ctx,"EXEC");
|
|
|
|
|
return data_reply;
|
|
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
void _exec_serial_rule(redisContext* ctx, long long version, struct serial_rule_t* s_rule, int rule_num, struct expected_reply_t* expect_reply, unsigned int *cnt, int offset,int renew_allowed)
|
2018-03-22 21:23:33 +08:00
|
|
|
{
|
2018-04-24 22:32:04 +08:00
|
|
|
int i=0;
|
2018-03-22 21:23:33 +08:00
|
|
|
redisReply* data_reply=NULL;
|
2018-03-07 12:03:19 +08:00
|
|
|
int append_cmd_cnt=0;
|
2018-03-22 21:23:33 +08:00
|
|
|
for(i=0;i<rule_num;i++)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
switch(s_rule[i].op)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
case MAAT_OP_ADD:
|
|
|
|
|
redisAppendCommand(ctx,"SET %s:%s,%d %s",rm_key_prefix[MAAT_OP_ADD]
|
|
|
|
|
,s_rule[i].table_name
|
|
|
|
|
,s_rule[i].rule_id
|
|
|
|
|
,s_rule[i].table_line);
|
|
|
|
|
expect_reply[*cnt].srule_seq=i+offset;
|
|
|
|
|
expect_reply[*cnt].reply.type=REDIS_REPLY_STATUS;
|
|
|
|
|
(*cnt)++;
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
//NX: Don't update already exisiting elements. Always add new elements.
|
|
|
|
|
redisAppendCommand(ctx,"ZADD %s NX %lld ADD,%s,%d",rm_status_sset
|
|
|
|
|
,version
|
2018-03-07 12:03:19 +08:00
|
|
|
,s_rule[i].table_name
|
|
|
|
|
,s_rule[i].rule_id);
|
2018-08-01 19:42:36 +08:00
|
|
|
expect_reply[*cnt].srule_seq=i+offset;
|
|
|
|
|
expect_reply[*cnt].reply.type=REDIS_REPLY_INTEGER;
|
|
|
|
|
expect_reply[*cnt].reply.integer=1;
|
|
|
|
|
(*cnt)++;
|
2018-03-07 12:03:19 +08:00
|
|
|
append_cmd_cnt++;
|
2018-08-01 19:42:36 +08:00
|
|
|
if(s_rule[i].timeout>0)
|
|
|
|
|
{
|
|
|
|
|
redisAppendCommand(ctx,"ZADD %s NX %lld %s,%d",rm_expire_sset
|
|
|
|
|
,s_rule[i].timeout
|
|
|
|
|
,s_rule[i].table_name
|
|
|
|
|
,s_rule[i].rule_id);
|
|
|
|
|
expect_reply[*cnt].srule_seq=i+offset;
|
|
|
|
|
expect_reply[*cnt].reply.type=REDIS_REPLY_INTEGER;
|
|
|
|
|
expect_reply[*cnt].reply.integer=1;
|
|
|
|
|
(*cnt)++;
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
}
|
|
|
|
|
if(s_rule[i].label_id>0)
|
|
|
|
|
{
|
|
|
|
|
redisAppendCommand(ctx,"ZADD %s NX %d %d",rm_label_sset
|
|
|
|
|
,s_rule[i].label_id
|
|
|
|
|
,s_rule[i].rule_id);
|
|
|
|
|
expect_reply[*cnt].srule_seq=i+offset;
|
|
|
|
|
expect_reply[*cnt].reply.type=REDIS_REPLY_INTEGER;
|
|
|
|
|
expect_reply[*cnt].reply.integer=1;
|
|
|
|
|
(*cnt)++;
|
|
|
|
|
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case MAAT_OP_DEL:
|
|
|
|
|
redisAppendCommand(ctx,"RENAME %s:%s,%d %s:%s,%d"
|
|
|
|
|
,rm_key_prefix[MAAT_OP_ADD]
|
|
|
|
|
,s_rule[i].table_name
|
|
|
|
|
,s_rule[i].rule_id
|
|
|
|
|
,rm_key_prefix[MAAT_OP_DEL]
|
|
|
|
|
,s_rule[i].table_name
|
|
|
|
|
,s_rule[i].rule_id
|
|
|
|
|
);
|
|
|
|
|
expect_reply[*cnt].srule_seq=i+offset;
|
|
|
|
|
expect_reply[*cnt].reply.type=REDIS_REPLY_STATUS;
|
|
|
|
|
(*cnt)++;
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
|
|
|
|
|
redisAppendCommand(ctx,"EXPIRE %s:%s,%d %d",rm_key_prefix[MAAT_OP_DEL]
|
|
|
|
|
,s_rule[i].table_name
|
|
|
|
|
,s_rule[i].rule_id
|
|
|
|
|
,MAAT_REDIS_SYNC_TIME);
|
|
|
|
|
expect_reply[*cnt].srule_seq=i+offset;
|
|
|
|
|
expect_reply[*cnt].reply.type=REDIS_REPLY_INTEGER;
|
|
|
|
|
expect_reply[*cnt].reply.integer=1;
|
|
|
|
|
(*cnt)++;
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
|
|
|
|
|
//NX: Don't update already exisiting elements. Always add new elements.
|
|
|
|
|
redisAppendCommand(ctx,"ZADD %s NX %d DEL,%s,%d",rm_status_sset
|
|
|
|
|
,version
|
|
|
|
|
,s_rule[i].table_name
|
2018-03-07 12:03:19 +08:00
|
|
|
,s_rule[i].rule_id);
|
2018-08-01 19:42:36 +08:00
|
|
|
expect_reply[*cnt].srule_seq=i+offset;
|
|
|
|
|
expect_reply[*cnt].reply.type=REDIS_REPLY_INTEGER;
|
|
|
|
|
expect_reply[*cnt].reply.integer=1;
|
|
|
|
|
(*cnt)++;
|
2018-03-07 12:03:19 +08:00
|
|
|
append_cmd_cnt++;
|
2018-08-01 19:42:36 +08:00
|
|
|
|
|
|
|
|
// Try to remove from expiration sorted set, no matter wheather it exists or not.
|
|
|
|
|
redisAppendCommand(ctx,"ZREM %s %s,%d",rm_expire_sset
|
|
|
|
|
,s_rule[i].table_name
|
|
|
|
|
,s_rule[i].rule_id);
|
|
|
|
|
expect_reply[*cnt].srule_seq=-1;
|
|
|
|
|
(*cnt)++;
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
|
|
|
|
|
redisAppendCommand(ctx,"ZREM %s %d",rm_label_sset
|
|
|
|
|
,s_rule[i].rule_id);
|
|
|
|
|
expect_reply[*cnt].srule_seq=-1;
|
|
|
|
|
(*cnt)++;
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
break;
|
|
|
|
|
case MAAT_OP_RENEW_TIMEOUT:
|
|
|
|
|
if(renew_allowed!=1)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
//s_rule[i].timeout>0 was checked by caller.
|
|
|
|
|
//XX: Only update elements that already exist. Never add elements.
|
|
|
|
|
redisAppendCommand(ctx,"ZADD %s XX %lld %s,%d",rm_expire_sset
|
|
|
|
|
,s_rule[i].timeout
|
|
|
|
|
,s_rule[i].table_name
|
|
|
|
|
,s_rule[i].rule_id);
|
|
|
|
|
expect_reply[*cnt].srule_seq=i+offset;
|
|
|
|
|
expect_reply[*cnt].reply.type=REDIS_REPLY_INTEGER;
|
|
|
|
|
expect_reply[*cnt].reply.integer=0;
|
|
|
|
|
(*cnt)++;
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
assert(0);
|
|
|
|
|
break;
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
for(i=0;i<append_cmd_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
_wrap_redisGetReply(ctx, &data_reply);
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
}
|
2018-03-22 21:23:33 +08:00
|
|
|
return;
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
|
2018-03-07 12:03:19 +08:00
|
|
|
int exec_serial_rule(redisContext* ctx,struct serial_rule_t* s_rule,int serial_rule_num, long long server_time, void* logger)
|
|
|
|
|
{
|
|
|
|
|
int max_redis_batch=1*1024,batch_cnt=0;
|
2018-08-01 19:42:36 +08:00
|
|
|
int success_cnt=0,j=0,renew_allowed=0,last_failed=-1;
|
2018-03-22 21:23:33 +08:00
|
|
|
redisReply*transaction_reply=NULL,*p=NULL;
|
|
|
|
|
unsigned int i=0;
|
|
|
|
|
|
|
|
|
|
unsigned int multi_cmd_cnt=0;
|
2018-09-24 18:49:18 +08:00
|
|
|
const int MAX_REDIS_OP_PER_SRULE=8;
|
2018-03-22 21:23:33 +08:00
|
|
|
unsigned int max_multi_cmd_num=MAX_REDIS_OP_PER_SRULE*serial_rule_num+2;// 2 for operation in _exec_serial_rule_end()
|
2018-08-01 19:42:36 +08:00
|
|
|
|
|
|
|
|
struct expected_reply_t *expected_reply=(struct expected_reply_t*)calloc(sizeof(struct expected_reply_t), max_multi_cmd_num);
|
2018-03-22 21:23:33 +08:00
|
|
|
long long new_version=0;
|
2018-08-01 19:42:36 +08:00
|
|
|
int renew_num=0,ret=0;
|
|
|
|
|
for(i=0;i<(unsigned int)serial_rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
if(s_rule[i].op==MAAT_OP_RENEW_TIMEOUT)
|
|
|
|
|
{
|
|
|
|
|
renew_num++;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-03-22 21:23:33 +08:00
|
|
|
|
2018-08-01 19:42:36 +08:00
|
|
|
ret=_exec_serial_rule_begin(ctx,serial_rule_num,renew_num, &renew_allowed, &new_version);
|
|
|
|
|
if(ret!=1)//Preconditions of transaction is not qualified.
|
|
|
|
|
{
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
2018-03-22 21:23:33 +08:00
|
|
|
while(success_cnt<serial_rule_num)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
batch_cnt=MIN(serial_rule_num-success_cnt,max_redis_batch);
|
2018-08-01 19:42:36 +08:00
|
|
|
_exec_serial_rule(ctx,new_version,s_rule+success_cnt,batch_cnt,expected_reply, &multi_cmd_cnt,success_cnt,renew_allowed);
|
2018-03-22 21:23:33 +08:00
|
|
|
assert(multi_cmd_cnt<max_multi_cmd_num);
|
|
|
|
|
success_cnt+=batch_cnt;
|
|
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
transaction_reply=_exec_serial_rule_end(ctx,new_version,server_time, renew_allowed);
|
2018-03-22 21:23:33 +08:00
|
|
|
if(1==mr_transaction_success(transaction_reply))
|
|
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
assert(transaction_reply->elements-2<=multi_cmd_cnt);
|
|
|
|
|
for(i=0;i<multi_cmd_cnt;i++)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-03-22 21:23:33 +08:00
|
|
|
p=transaction_reply->element[i];
|
2018-08-01 19:42:36 +08:00
|
|
|
//failed is acceptable
|
|
|
|
|
//or transaciton is success
|
|
|
|
|
//or continuation of last failed
|
|
|
|
|
if(expected_reply[i].srule_seq==-1||1==mr_operation_success(p,&(expected_reply[i].reply))||last_failed==expected_reply[i].srule_seq)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
2018-03-22 21:23:33 +08:00
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
assert(j<serial_rule_num);
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_command
|
|
|
|
|
,"%s %s %d failed, rule id maybe conflict or not exist."
|
|
|
|
|
,rm_op_str[s_rule[j].op]
|
|
|
|
|
,s_rule[j].table_name,s_rule[j].rule_id);
|
|
|
|
|
success_cnt--;
|
|
|
|
|
last_failed=expected_reply[i].srule_seq;
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
}
|
2018-03-22 21:23:33 +08:00
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
success_cnt=-1;
|
2018-08-01 19:42:36 +08:00
|
|
|
}
|
2018-03-22 21:23:33 +08:00
|
|
|
freeReplyObject(transaction_reply);
|
2018-08-01 19:42:36 +08:00
|
|
|
|
|
|
|
|
error_out:
|
|
|
|
|
if(renew_num>0&&renew_allowed!=1)
|
|
|
|
|
{
|
|
|
|
|
for(i=0;i<(unsigned int)serial_rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
if(s_rule[i].op==MAAT_OP_RENEW_TIMEOUT)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_command
|
|
|
|
|
,"%s %s %d is not allowed due to lock contention.",rm_op_str[MAAT_OP_RENEW_TIMEOUT]
|
|
|
|
|
, s_rule[i].table_name,s_rule[i].rule_id);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if(success_cnt>0)
|
|
|
|
|
{
|
|
|
|
|
success_cnt-=renew_num;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
free(expected_reply);
|
2018-03-07 12:03:19 +08:00
|
|
|
return success_cnt;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int fix_table_name(_Maat_feather_t* feather,struct Maat_cmd_t* cmd)
|
|
|
|
|
{
|
|
|
|
|
int i=0,j=0,ret=0;
|
|
|
|
|
const char *table_name=NULL;
|
|
|
|
|
int table_id=0;
|
|
|
|
|
struct Maat_group_t* p_group=NULL;
|
|
|
|
|
struct Maat_region_t* p_region=NULL;
|
|
|
|
|
enum MAAT_TABLE_TYPE table_type;
|
|
|
|
|
|
|
|
|
|
struct _Maat_compile_inner_t *compile_rule=NULL;
|
|
|
|
|
if(feather->scanner!=NULL)
|
|
|
|
|
{
|
|
|
|
|
compile_rule=(struct _Maat_compile_inner_t*)HASH_fetch_by_id(feather->scanner->compile_hash, cmd->compile.config_id);
|
|
|
|
|
if(compile_rule!=NULL)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(feather->logger,RLOG_LV_FATAL,maat_module
|
|
|
|
|
,"Maat rule %d already exisits.",cmd->compile.config_id);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
for(i=0;i<cmd->group_num;i++)
|
|
|
|
|
{
|
|
|
|
|
p_group=&(cmd->groups[i]);
|
|
|
|
|
for(j=0;j<p_group->region_num;j++)
|
|
|
|
|
{
|
|
|
|
|
p_region=&(p_group->regions[j]);
|
|
|
|
|
table_name=p_region->table_name;
|
|
|
|
|
ret=map_str2int(feather->map_tablename2id, table_name, &table_id);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(feather->logger,RLOG_LV_FATAL,maat_module
|
|
|
|
|
,"Unknown table %s of Maat_cmd_t[%d]->group[%d]->region[%d]."
|
|
|
|
|
,table_name,cmd->compile.config_id,i,j);
|
|
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
table_type=type_region2table(p_region);
|
|
|
|
|
if(table_type!=feather->p_table_info[table_id]->table_type)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(feather->logger,RLOG_LV_FATAL,maat_module
|
|
|
|
|
,"Table %s not support region type %d of Maat_cmd_t[%d]->group[%d]->region[%d]."
|
|
|
|
|
,table_name
|
|
|
|
|
,p_region->region_type
|
|
|
|
|
,cmd->compile.config_id,i,j);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
free((char*)p_region->table_name);
|
|
|
|
|
p_region->table_name=_maat_strdup(feather->p_table_info[table_id]->table_name[0]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
void check_maat_expiration(redisContext *ctx, void *logger)
|
|
|
|
|
{
|
|
|
|
|
unsigned int i=0,s_rule_num=0;
|
|
|
|
|
int ret=0;
|
|
|
|
|
int success_cnt=0;
|
|
|
|
|
redisReply* data_reply=NULL;
|
|
|
|
|
struct serial_rule_t* s_rule=NULL;
|
|
|
|
|
long long server_time=0;
|
|
|
|
|
|
|
|
|
|
server_time=redis_server_time(ctx);
|
|
|
|
|
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx, "ZRANGEBYSCORE %s -inf %lld",rm_expire_sset,server_time);
|
|
|
|
|
if(data_reply->type!=REDIS_REPLY_ARRAY||data_reply->elements==0)
|
|
|
|
|
{
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
s_rule_num=data_reply->elements;
|
|
|
|
|
s_rule=(struct serial_rule_t*)calloc(sizeof(struct serial_rule_t),s_rule_num);
|
|
|
|
|
for(i=0;i<s_rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
s_rule[i].op=MAAT_OP_DEL;
|
|
|
|
|
ret=sscanf(data_reply->element[i]->str,"%[^,],%d",s_rule[i].table_name,&(s_rule[i].rule_id));
|
|
|
|
|
assert(ret==2);
|
|
|
|
|
}
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
success_cnt=exec_serial_rule(ctx,s_rule, s_rule_num,server_time, logger);
|
|
|
|
|
|
|
|
|
|
if(success_cnt==(int)s_rule_num)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_redis_monitor
|
|
|
|
|
,"Succesfully expired %d rules in Redis.", s_rule_num);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_redis_monitor
|
2018-05-24 15:45:46 +08:00
|
|
|
,"Failed to expired %d of %d rules in Redis, try later.", s_rule_num-success_cnt,s_rule_num);
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(s_rule);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
void cleanup_update_status(redisContext *ctx, void *logger)
|
|
|
|
|
{
|
|
|
|
|
redisReply* reply=NULL,*sub_reply=NULL;
|
|
|
|
|
int append_cmd_cnt=0,i=0;
|
|
|
|
|
long long server_time=0, version_upper_bound=0,version_lower_bound=0,version_num=0,entry_num=0;
|
|
|
|
|
|
|
|
|
|
server_time=redis_server_time(ctx);
|
|
|
|
|
|
|
|
|
|
reply=_wrap_redisCommand(ctx,"MULTI");
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
redisAppendCommand(ctx, "ZRANGEBYSCORE %s -inf %lld",rm_version_sset,server_time-MAAT_REDIS_SYNC_TIME);
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
redisAppendCommand(ctx, "ZREMRANGEBYSCORE %s -inf %lld",rm_version_sset,server_time-MAAT_REDIS_SYNC_TIME);
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
//consume reply "OK" and "QUEUED".
|
|
|
|
|
for(i=0;i<append_cmd_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
_wrap_redisGetReply(ctx, &reply);
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
reply=NULL;
|
|
|
|
|
}
|
|
|
|
|
reply=_wrap_redisCommand(ctx,"EXEC");
|
|
|
|
|
assert(reply->type==REDIS_REPLY_ARRAY);
|
|
|
|
|
sub_reply=reply->element[0];
|
|
|
|
|
assert(sub_reply->type==REDIS_REPLY_ARRAY);
|
|
|
|
|
version_num=sub_reply->elements;
|
|
|
|
|
if(version_num==0)
|
|
|
|
|
{
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
version_lower_bound=read_redis_integer(sub_reply->element[0]);
|
|
|
|
|
version_upper_bound=read_redis_integer(sub_reply->element[sub_reply->elements-1]);
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
|
|
|
|
|
//To deal with maat_version reset to 0, do NOT use -inf as lower bound intentionally.
|
|
|
|
|
reply=_wrap_redisCommand(ctx,"ZREMRANGEBYSCORE %s %lld %lld",rm_status_sset,version_lower_bound,version_upper_bound);
|
|
|
|
|
entry_num=read_redis_integer(reply);
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_redis_monitor
|
|
|
|
|
,"Clean up update status from version %lld to %lld (%lld versions, %lld entries)."
|
|
|
|
|
,version_lower_bound
|
|
|
|
|
,version_upper_bound
|
|
|
|
|
,version_num
|
|
|
|
|
,entry_num);
|
|
|
|
|
|
2018-05-24 15:45:46 +08:00
|
|
|
}
|
2018-09-24 18:49:18 +08:00
|
|
|
const char* find_Nth_column(const char* line, int Nth, int* column_len)
|
|
|
|
|
{
|
|
|
|
|
int i=0, j=0;
|
|
|
|
|
int start=0, end=0;
|
|
|
|
|
for(i=0;i<(int)strlen(line);i++)
|
|
|
|
|
{
|
2018-09-25 17:56:09 +08:00
|
|
|
if(line[i]!=' '&&line[i]!='\t')
|
2018-09-24 18:49:18 +08:00
|
|
|
{
|
2018-09-25 17:56:09 +08:00
|
|
|
continue;
|
2018-09-24 18:49:18 +08:00
|
|
|
}
|
2018-09-25 17:56:09 +08:00
|
|
|
j++;
|
2018-09-24 18:49:18 +08:00
|
|
|
if(j==Nth-1)
|
|
|
|
|
{
|
|
|
|
|
start=i+1;
|
|
|
|
|
}
|
|
|
|
|
if(j==Nth)
|
|
|
|
|
{
|
2018-09-25 17:56:09 +08:00
|
|
|
end=i;
|
2018-09-24 18:49:18 +08:00
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-09-26 12:09:08 +08:00
|
|
|
if(start==end)
|
2018-09-24 18:49:18 +08:00
|
|
|
{
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
if(end==0)
|
|
|
|
|
{
|
|
|
|
|
end=i;
|
|
|
|
|
}
|
|
|
|
|
*column_len=end-start;
|
|
|
|
|
return line+start;
|
|
|
|
|
}
|
|
|
|
|
char* get_foreign_cont_filename(const char* table_name, int rule_id, const char* foreign_key, const char* dir)
|
|
|
|
|
{
|
|
|
|
|
char* filename=NULL;
|
|
|
|
|
char buffer[512];
|
2018-09-25 17:56:09 +08:00
|
|
|
snprintf(buffer, sizeof(buffer),"%s/%s-%d-%s",dir, table_name, rule_id, foreign_key);
|
2018-09-24 18:49:18 +08:00
|
|
|
filename=(char*)calloc(sizeof(char), strlen(buffer)+1);
|
|
|
|
|
memcpy(filename, buffer, strlen(buffer));
|
|
|
|
|
return filename;
|
|
|
|
|
}
|
|
|
|
|
void rewrite_table_line_with_foreign(struct serial_rule_t*p)
|
|
|
|
|
{
|
|
|
|
|
int origin_column_size=0;
|
|
|
|
|
const char* origin_column=NULL, *pos_origin_line=NULL;
|
|
|
|
|
char* pos_rewrite_line=NULL;
|
|
|
|
|
char* rewrite_line=NULL;
|
|
|
|
|
size_t fn_size=0;
|
|
|
|
|
int i=0;
|
|
|
|
|
for(i=0; i<p->n_foreign; i++)
|
|
|
|
|
{
|
|
|
|
|
fn_size+=strlen(p->f_keys[i].filename);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rewrite_line=(char*)calloc(sizeof(char), strlen(p->table_line)+fn_size);
|
|
|
|
|
pos_origin_line=p->table_line;
|
|
|
|
|
pos_rewrite_line=rewrite_line;
|
|
|
|
|
|
|
|
|
|
for(i=0; i<p->n_foreign; i++)
|
|
|
|
|
{
|
|
|
|
|
origin_column=find_Nth_column(p->table_line, p->f_keys[i].column, &origin_column_size);
|
|
|
|
|
strncat(pos_rewrite_line, pos_origin_line, origin_column-pos_origin_line);
|
|
|
|
|
pos_rewrite_line+=origin_column-pos_origin_line;
|
2018-09-25 17:56:09 +08:00
|
|
|
pos_origin_line=origin_column+origin_column_size;
|
2018-09-24 18:49:18 +08:00
|
|
|
|
|
|
|
|
strncat(pos_rewrite_line, p->f_keys[i].filename, strlen(p->f_keys[i].filename));
|
|
|
|
|
pos_rewrite_line+=strlen(p->f_keys[i].filename);
|
|
|
|
|
}
|
|
|
|
|
strncat(pos_rewrite_line, pos_origin_line, strlen(p->table_line)-(pos_origin_line-p->table_line));
|
|
|
|
|
|
|
|
|
|
free(p->table_line);
|
|
|
|
|
p->table_line=rewrite_line;
|
|
|
|
|
return;
|
|
|
|
|
}
|
2018-09-26 12:09:08 +08:00
|
|
|
void _get_foregin_keys(struct serial_rule_t* p_rule, int* foreign_columns, int n_foreign, const char* dir, void* logger)
|
2018-09-24 18:49:18 +08:00
|
|
|
{
|
2018-09-26 12:09:08 +08:00
|
|
|
int ret=0, i=0;
|
|
|
|
|
const char* p_foreign=NULL;
|
2018-09-25 17:56:09 +08:00
|
|
|
int foreign_key_size=0;
|
2018-09-26 12:09:08 +08:00
|
|
|
struct stat file_info;
|
|
|
|
|
p_rule->n_foreign=n_foreign;
|
|
|
|
|
p_rule->f_keys=(struct foreign_key*)calloc(sizeof(struct foreign_key),n_foreign);
|
|
|
|
|
for(i=0; i<n_foreign; i++)
|
|
|
|
|
{
|
|
|
|
|
p_foreign=find_Nth_column(p_rule->table_line, foreign_columns[i], &foreign_key_size);
|
|
|
|
|
if(p_foreign==NULL)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_redis_monitor
|
|
|
|
|
, "Get %s,%d foreign keys failed: No %dth column."
|
|
|
|
|
, p_rule->table_name, p_rule->rule_id, foreign_columns[i]);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
if(0!=strncmp(p_foreign, foreign_source_prefix, strlen(foreign_source_prefix)))
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_redis_monitor
|
|
|
|
|
,"Get %s,%d foreign key failed: Invalid source prefix %s."
|
|
|
|
|
, p_rule->table_name, p_rule->rule_id, foreign_columns[i]);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
p_rule->f_keys[i].column=foreign_columns[i];
|
|
|
|
|
foreign_key_size=foreign_key_size-strlen(foreign_source_prefix);
|
|
|
|
|
p_foreign+=strlen(foreign_source_prefix);
|
|
|
|
|
if(0!=strncmp(p_foreign, foreign_key_prefix, strlen(foreign_key_prefix)))
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_redis_monitor
|
|
|
|
|
,"%s,%d foreign key prefix %s is discouraged."
|
|
|
|
|
,p_rule->table_name, p_rule->rule_id, foreign_columns[i]);
|
|
|
|
|
}
|
|
|
|
|
p_rule->f_keys[i].key=(char*)calloc(sizeof(char),foreign_key_size+1);
|
|
|
|
|
memcpy(p_rule->f_keys[i].key, p_foreign, foreign_key_size);
|
|
|
|
|
|
|
|
|
|
p_rule->f_keys[i].filename=get_foreign_cont_filename(p_rule->table_name, p_rule->rule_id, p_rule->f_keys[i].key, dir);
|
|
|
|
|
ret=stat(p_rule->f_keys[i].filename, &file_info);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
p_rule->f_keys[i].is_existed=1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
int get_foreign_keys_define(redisContext *ctx, struct serial_rule_t* rule_list, int rule_num, _Maat_feather_t* feather, const char* dir,void *logger)
|
|
|
|
|
{
|
|
|
|
|
int ret=0, table_id=0, i=0;
|
2018-09-24 18:49:18 +08:00
|
|
|
int rule_with_foreign_key=0;
|
|
|
|
|
struct _Maat_table_info_t* p_table=NULL;
|
|
|
|
|
for(i=0; i<rule_num; i++)
|
|
|
|
|
{
|
|
|
|
|
if(rule_list[i].table_line==NULL)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
ret=map_str2int(feather->map_tablename2id, rule_list[i].table_name, &table_id);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
p_table=feather->p_table_info[table_id];
|
|
|
|
|
if(p_table->table_type!=TABLE_TYPE_PLUGIN||p_table->n_foreign==0)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2018-09-26 12:09:08 +08:00
|
|
|
_get_foregin_keys(rule_list+i, p_table->foreign_columns, p_table->n_foreign, dir, logger);
|
|
|
|
|
rule_with_foreign_key++;
|
|
|
|
|
}
|
|
|
|
|
return rule_with_foreign_key;
|
|
|
|
|
}
|
|
|
|
|
int get_foreign_keys_by_prefix(redisContext *ctx, struct serial_rule_t* rule_list, int rule_num, const char* dir,void *logger)
|
|
|
|
|
{
|
|
|
|
|
int i=0, j=0, foreign_key_size=0;
|
|
|
|
|
int rule_with_foreign_key=0;
|
|
|
|
|
const char* p_foreign=NULL;
|
2018-09-24 18:49:18 +08:00
|
|
|
|
2018-09-26 12:09:08 +08:00
|
|
|
int n_foreign=0;
|
|
|
|
|
int foreign_columns[MAX_FOREIGN_CLMN_NUM];
|
|
|
|
|
for(i=0; i<rule_num; i++)
|
|
|
|
|
{
|
|
|
|
|
j=1;
|
|
|
|
|
n_foreign=0;
|
|
|
|
|
do{
|
|
|
|
|
p_foreign=find_Nth_column(rule_list[i].table_line, j, &foreign_key_size);
|
|
|
|
|
if(p_foreign!=NULL&&foreign_key_size>(int)strlen(foreign_source_prefix)&&0==strncmp(p_foreign,foreign_source_prefix, strlen(foreign_source_prefix)))
|
2018-09-24 19:48:18 +08:00
|
|
|
{
|
2018-09-26 12:09:08 +08:00
|
|
|
foreign_columns[n_foreign]=j;
|
|
|
|
|
n_foreign++;
|
2018-09-24 19:48:18 +08:00
|
|
|
}
|
2018-09-26 12:09:08 +08:00
|
|
|
j++;
|
|
|
|
|
}while(p_foreign!=NULL&&n_foreign<MAX_FOREIGN_CLMN_NUM);
|
|
|
|
|
if(n_foreign>0)
|
|
|
|
|
{
|
|
|
|
|
_get_foregin_keys(rule_list+i, foreign_columns, n_foreign,dir,logger);
|
|
|
|
|
rule_with_foreign_key++;
|
2018-09-24 18:49:18 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return rule_with_foreign_key;
|
|
|
|
|
}
|
2018-09-26 12:09:08 +08:00
|
|
|
|
2018-09-24 19:48:18 +08:00
|
|
|
struct foreign_conts_track
|
|
|
|
|
{
|
|
|
|
|
int rule_idx;
|
|
|
|
|
int foreign_idx;
|
|
|
|
|
};
|
|
|
|
|
void _get_foreign_conts(redisContext *ctx, struct serial_rule_t* rule_list, int rule_num, void *logger)
|
2018-09-24 18:49:18 +08:00
|
|
|
{
|
|
|
|
|
int i=0, j=0, ret=0;
|
|
|
|
|
int key_num=0;
|
2018-09-24 19:48:18 +08:00
|
|
|
struct foreign_conts_track* track=ALLOC(struct foreign_conts_track, rule_num*MAX_FOREIGN_CLMN_NUM);
|
2018-09-24 18:49:18 +08:00
|
|
|
char redis_cmd[256];
|
|
|
|
|
redisReply* reply=NULL;
|
|
|
|
|
struct serial_rule_t*p=NULL;
|
|
|
|
|
FILE* fp=NULL;
|
|
|
|
|
for(i=0;i<rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
p=rule_list+i;
|
|
|
|
|
if(p->op==MAAT_OP_DEL||p->n_foreign==0)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
for(j=0; j<p->n_foreign; j++)
|
|
|
|
|
{
|
2018-09-24 19:48:18 +08:00
|
|
|
if(p->f_keys[i].is_existed==1)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2018-09-24 18:49:18 +08:00
|
|
|
snprintf(redis_cmd,sizeof(redis_cmd),"GET %s", p->f_keys[j].key);
|
|
|
|
|
ret=redisAppendCommand(ctx, redis_cmd);
|
2018-09-24 19:48:18 +08:00
|
|
|
track[key_num].rule_idx=i;
|
|
|
|
|
track[key_num].foreign_idx=j;
|
2018-09-24 18:49:18 +08:00
|
|
|
key_num++;
|
|
|
|
|
assert(ret==REDIS_OK);
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-09-24 19:48:18 +08:00
|
|
|
for(i=0;i<key_num;i++)
|
2018-09-24 18:49:18 +08:00
|
|
|
{
|
2018-09-24 19:48:18 +08:00
|
|
|
ret=_wrap_redisGetReply(ctx,&reply);
|
|
|
|
|
if(reply->type!=REDIS_REPLY_STRING)
|
2018-09-24 18:49:18 +08:00
|
|
|
{
|
2018-09-24 19:48:18 +08:00
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor
|
|
|
|
|
,"Get %s,%d foreign key %s content failed."
|
|
|
|
|
,rule_list[track[i].rule_idx].table_name
|
|
|
|
|
,rule_list[track[i].rule_idx].rule_id
|
|
|
|
|
,rule_list[track[i].rule_idx].f_keys[track[i].foreign_idx].key);
|
2018-09-24 18:49:18 +08:00
|
|
|
continue;
|
|
|
|
|
}
|
2018-09-24 19:48:18 +08:00
|
|
|
else
|
2018-09-24 18:49:18 +08:00
|
|
|
{
|
2018-09-24 19:48:18 +08:00
|
|
|
p=rule_list+track[i].rule_idx;
|
|
|
|
|
fp=fopen(p->f_keys[track[i].foreign_idx].filename, "w");
|
|
|
|
|
if(fp==NULL)
|
2018-09-24 18:49:18 +08:00
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger, RLOG_LV_FATAL, maat_redis_monitor
|
2018-09-24 19:48:18 +08:00
|
|
|
, "Write foreign content failed: fopen %s error."
|
|
|
|
|
, p->f_keys[track[i].foreign_idx]);
|
2018-09-24 18:49:18 +08:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2018-09-24 19:48:18 +08:00
|
|
|
fwrite(reply->str, 1, reply->len, fp);
|
|
|
|
|
fclose(fp);
|
|
|
|
|
fp=NULL;
|
2018-09-24 18:49:18 +08:00
|
|
|
}
|
|
|
|
|
}
|
2018-09-24 19:48:18 +08:00
|
|
|
freeReplyObject(reply);
|
|
|
|
|
}
|
|
|
|
|
free(track);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
void get_foreign_conts(redisContext *ctx, struct serial_rule_t* rule_list, int rule_num, void *logger)
|
|
|
|
|
{
|
|
|
|
|
int max_redis_batch=4*1024,batch_cnt=0;
|
|
|
|
|
int success_cnt=0;
|
|
|
|
|
while(success_cnt<rule_num)
|
|
|
|
|
{
|
|
|
|
|
batch_cnt=MIN(rule_num-success_cnt,max_redis_batch);
|
|
|
|
|
_get_foreign_conts(ctx,rule_list+success_cnt,batch_cnt,logger);
|
|
|
|
|
success_cnt+=batch_cnt;
|
2018-09-24 18:49:18 +08:00
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
void redis_monitor_traverse(long long version,redisContext *c,
|
|
|
|
|
void (*start)(long long,int ,void*),//vesion,CM_UPDATE_TYPE_*,u_para
|
|
|
|
|
int (*update)(const char* ,const char*,void* ),//table name ,line ,u_para
|
|
|
|
|
void (*finish)(void*),//u_para
|
|
|
|
|
void* u_para,
|
|
|
|
|
const unsigned char* dec_key,
|
|
|
|
|
_Maat_feather_t* feather)
|
|
|
|
|
{
|
2018-09-24 18:49:18 +08:00
|
|
|
int table_id=0,i=0, j=0, rule_num=0,empty_value_num=0;
|
2018-03-07 12:03:19 +08:00
|
|
|
int ret=0;
|
|
|
|
|
struct serial_rule_t* rule_list=NULL;
|
|
|
|
|
int update_type=CM_UPDATE_TYPE_INC;
|
|
|
|
|
long long new_version=0;
|
|
|
|
|
enum MAAT_TABLE_TYPE table_type;
|
|
|
|
|
void* logger=feather->logger;
|
2018-05-23 22:38:27 +08:00
|
|
|
if(feather->redis_write_ctx!=NULL&&feather->redis_write_ctx->err==0)//authorized to write
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
//For thread safe, deliberately use redis_read_ctx but not redis_write_ctx.
|
2018-08-01 19:42:36 +08:00
|
|
|
if(1==redlock_try_lock(feather->redis_read_ctx, rm_expire_lock, rm_expire_lock_timeout))
|
2018-05-24 15:45:46 +08:00
|
|
|
{
|
|
|
|
|
check_maat_expiration(feather->redis_read_ctx, logger);
|
|
|
|
|
cleanup_update_status(feather->redis_read_ctx, logger);
|
|
|
|
|
redlock_unlock(feather->redis_read_ctx,rm_expire_lock);
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
2018-05-23 22:38:27 +08:00
|
|
|
if(c==NULL||c->err)
|
|
|
|
|
{
|
|
|
|
|
return;
|
|
|
|
|
}
|
2018-06-03 20:31:22 +08:00
|
|
|
|
2018-06-17 20:03:17 +08:00
|
|
|
rule_num=get_rm_key_list(c, version, feather->load_version_from, &new_version, &rule_list, &update_type, logger, feather->cumulative_update_off);
|
|
|
|
|
feather->load_version_from=0;//only valid for one time.
|
2018-03-07 12:03:19 +08:00
|
|
|
if(rule_num<0||(rule_num==0&&update_type==CM_UPDATE_TYPE_INC))//error or nothing changed
|
|
|
|
|
{
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
if(rule_num>0)
|
|
|
|
|
{
|
|
|
|
|
ret=get_maat_redis_value(c,rule_list,rule_num, logger,0);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_redis_monitor,"Get Redis value failed, abandon update.");
|
|
|
|
|
goto clean_up;
|
|
|
|
|
}
|
|
|
|
|
for(i=0;i<rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
if(rule_list[i].table_line==NULL)
|
|
|
|
|
{
|
|
|
|
|
empty_value_num++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if(empty_value_num==rule_num)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_redis_monitor,"All %d rules are empty, abandon update.",empty_value_num);
|
|
|
|
|
goto clean_up;
|
|
|
|
|
}
|
|
|
|
|
if(empty_value_num>0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_redis_monitor,"%d of %d rules are empty.",empty_value_num,rule_num);
|
|
|
|
|
}
|
2018-09-26 12:09:08 +08:00
|
|
|
ret=get_foreign_keys_define(c, rule_list, rule_num, feather, feather->foreign_cont_dir, logger);
|
2018-09-24 18:49:18 +08:00
|
|
|
if(ret>0)
|
|
|
|
|
{
|
|
|
|
|
get_foreign_conts(c, rule_list, rule_num, logger);
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
start(new_version,update_type,u_para);
|
2018-08-01 19:42:36 +08:00
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_redis_monitor,"Start %s update: %lld->%lld (%d entries).",
|
2018-06-17 20:03:17 +08:00
|
|
|
update_type==CM_UPDATE_TYPE_INC?"INC":"FULL",version,new_version,rule_num);
|
2018-03-07 12:03:19 +08:00
|
|
|
for(i=0;i<rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
if(rule_list[i].table_line==NULL)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
ret=map_str2int(feather->map_tablename2id,rule_list[i].table_name,&table_id);
|
|
|
|
|
if(ret<0)//Unrecognized table.
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
table_type=feather->p_table_info[table_id]->table_type;
|
|
|
|
|
if(rule_list[i].op==MAAT_OP_DEL)
|
|
|
|
|
{
|
|
|
|
|
ret=invalidate_line(rule_list[i].table_line,table_type,feather->p_table_info[table_id]->valid_flag_column);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_redis_monitor,"Invaid format %s ."
|
|
|
|
|
,rule_list[i].table_line);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-09-24 18:49:18 +08:00
|
|
|
if(rule_list[i].n_foreign>0)
|
|
|
|
|
{
|
|
|
|
|
rewrite_table_line_with_foreign(rule_list+i);
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
update(rule_list[i].table_name,rule_list[i].table_line,u_para);
|
2018-09-24 18:49:18 +08:00
|
|
|
if(rule_list[i].n_foreign&&rule_list[i].op==MAAT_OP_DEL)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
for(j=0; j<rule_list[i].n_foreign; j++)
|
|
|
|
|
{
|
|
|
|
|
if(feather->foreign_cont_linger==0)
|
|
|
|
|
{
|
|
|
|
|
ret=system_cmd_rm(rule_list[i].f_keys[j].filename);
|
|
|
|
|
if(ret==-1)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_module,
|
|
|
|
|
"Foreign content file %s remove failed.",
|
|
|
|
|
rule_list[i].f_keys[j].filename);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else if(feather->foreign_cont_linger>0)
|
|
|
|
|
{
|
|
|
|
|
garbage_bagging_with_timeout(GARBAGE_FOREIGN_FILE, rule_list[i].f_keys[j].filename, feather->foreign_cont_linger, feather->garbage_q);
|
|
|
|
|
rule_list[i].f_keys[j].filename=NULL;//transfer owner to garbage collection.
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
//Less than 0, don't delete.
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
finish(u_para);
|
2018-09-24 18:49:18 +08:00
|
|
|
|
2018-03-07 12:03:19 +08:00
|
|
|
clean_up:
|
|
|
|
|
for(i=0;i<rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
empty_serial_rules(rule_list+i);
|
|
|
|
|
}
|
|
|
|
|
free(rule_list);
|
|
|
|
|
rule_list=NULL;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void _maat_copy_region(struct Maat_region_t* dst,const struct Maat_region_t* src)
|
|
|
|
|
{
|
|
|
|
|
memcpy(dst,src,sizeof(struct Maat_region_t));
|
|
|
|
|
if(src->table_name!=NULL)
|
|
|
|
|
{
|
|
|
|
|
dst->table_name=_maat_strdup(src->table_name);
|
|
|
|
|
}
|
|
|
|
|
switch(dst->region_type)
|
|
|
|
|
{
|
|
|
|
|
case REGION_IP:
|
|
|
|
|
dst->ip_rule.src_ip=_maat_strdup(src->ip_rule.src_ip);
|
|
|
|
|
dst->ip_rule.mask_src_ip=_maat_strdup(src->ip_rule.mask_src_ip);
|
|
|
|
|
dst->ip_rule.dst_ip=_maat_strdup(src->ip_rule.dst_ip);
|
|
|
|
|
dst->ip_rule.mask_dst_ip=_maat_strdup(src->ip_rule.mask_dst_ip);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_EXPR:
|
|
|
|
|
dst->expr_rule.keywords=_maat_strdup(src->expr_rule.keywords);
|
|
|
|
|
dst->expr_rule.district=_maat_strdup(src->expr_rule.district);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_INTERVAL:
|
|
|
|
|
break;
|
|
|
|
|
case REGION_DIGEST:
|
|
|
|
|
dst->digest_rule.digest_string=_maat_strdup(src->digest_rule.digest_string);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_SIMILARITY:
|
|
|
|
|
dst->similarity_rule.target=_maat_strdup(src->similarity_rule.target);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
assert(0);
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
void _maat_empty_region(struct Maat_region_t* p)
|
|
|
|
|
{
|
|
|
|
|
free((char*)p->table_name);
|
|
|
|
|
p->table_name=NULL;
|
|
|
|
|
switch(p->region_type)
|
|
|
|
|
{
|
|
|
|
|
case REGION_IP:
|
|
|
|
|
free((char*)p->ip_rule.src_ip);
|
|
|
|
|
free((char*)p->ip_rule.mask_src_ip);
|
|
|
|
|
free((char*)p->ip_rule.dst_ip);
|
|
|
|
|
free((char*)p->ip_rule.mask_dst_ip);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_EXPR:
|
|
|
|
|
free((char*)p->expr_rule.keywords);
|
|
|
|
|
free((char*)p->expr_rule.district);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_INTERVAL:
|
|
|
|
|
break;
|
|
|
|
|
case REGION_DIGEST:
|
|
|
|
|
free((char*)p->digest_rule.digest_string);
|
|
|
|
|
break;
|
|
|
|
|
case REGION_SIMILARITY:
|
|
|
|
|
free((char*)p->similarity_rule.target);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
assert(0);
|
|
|
|
|
}
|
|
|
|
|
memset(p,0,sizeof(struct Maat_region_t));
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
struct Maat_cmd_t* Maat_create_cmd(const struct Maat_rule_t* rule, int group_num)
|
|
|
|
|
{
|
|
|
|
|
int i=0;
|
|
|
|
|
struct _Maat_cmd_inner_t* _cmd=(struct _Maat_cmd_inner_t*)calloc(sizeof(struct _Maat_cmd_inner_t),1);
|
|
|
|
|
memcpy(&(_cmd->cmd.compile),rule,sizeof(_cmd->cmd.compile));
|
|
|
|
|
_cmd->ref_cnt=1;
|
|
|
|
|
_cmd->cmd.group_num=group_num;
|
|
|
|
|
if(group_num>0)
|
|
|
|
|
{
|
|
|
|
|
_cmd->cmd.groups=(struct Maat_group_t*)calloc(sizeof(struct Maat_group_t),group_num);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
_cmd->cmd.groups=NULL;
|
|
|
|
|
}
|
|
|
|
|
for(i=0;i<group_num;i++)
|
|
|
|
|
{
|
|
|
|
|
_cmd->cmd.groups[i].regions=(struct Maat_region_t*)calloc(sizeof(struct Maat_region_t),1);
|
|
|
|
|
_cmd->region_size[i]=1;
|
|
|
|
|
}
|
|
|
|
|
return (struct Maat_cmd_t*)_cmd;
|
|
|
|
|
}
|
2018-07-27 17:08:45 +08:00
|
|
|
int Maat_cmd_set_opt(struct Maat_cmd_t* cmd, enum MAAT_RULE_OPT type, const char* val, int size)
|
|
|
|
|
{
|
|
|
|
|
struct _Maat_cmd_inner_t* _cmd=(struct _Maat_cmd_inner_t* )cmd;
|
|
|
|
|
int ret=-1;
|
|
|
|
|
switch(type)
|
|
|
|
|
{
|
|
|
|
|
case MAAT_RULE_SERV_DEFINE:
|
|
|
|
|
if(size>MAX_HUGE_SERVICE_DEFINE_LEN)
|
|
|
|
|
{
|
|
|
|
|
ret=-1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if(_cmd->huge_service_defined!=NULL)
|
|
|
|
|
{
|
|
|
|
|
free(_cmd->huge_service_defined);
|
|
|
|
|
}
|
|
|
|
|
_cmd->huge_service_defined=(char*)calloc(sizeof(char),size+1);
|
|
|
|
|
memcpy(_cmd->huge_service_defined,val, size);
|
|
|
|
|
ret=0;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
|
2018-03-07 12:03:19 +08:00
|
|
|
int Maat_cmd_set_group(Maat_feather_t feather,int group_id, const struct Maat_region_t* region, enum MAAT_OPERATION op)
|
|
|
|
|
{
|
|
|
|
|
_Maat_feather_t* _feather=(_Maat_feather_t*)feather;
|
|
|
|
|
if(_feather->AUTO_NUMBERING_ON==1)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
//struct _Maat_group_inner_t* group_inner=NULL;
|
|
|
|
|
//group_inner=(struct _Maat_group_inner_t*)HASH_fetch_by_id(_feather->scanner->group_hash, group_id);
|
|
|
|
|
//NOT implemented yet.
|
|
|
|
|
assert(0);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
int Maat_cmd_set_lines(Maat_feather_t feather,const struct Maat_line_t** line_rule, int line_num ,enum MAAT_OPERATION op)
|
|
|
|
|
{
|
2018-09-25 17:56:09 +08:00
|
|
|
int i=0, j=0;
|
2018-03-07 12:03:19 +08:00
|
|
|
_Maat_feather_t* _feather=(_Maat_feather_t*)feather;
|
2018-08-01 19:42:36 +08:00
|
|
|
int ret=0, table_id=0,success_cnt=0;
|
2018-03-07 12:03:19 +08:00
|
|
|
struct serial_rule_t *s_rule=NULL;
|
2018-09-25 17:56:09 +08:00
|
|
|
struct _Maat_table_info_t* p_table=NULL;
|
2018-03-07 12:03:19 +08:00
|
|
|
long long server_time=0,absolute_expire_time=0;
|
2018-09-25 17:56:09 +08:00
|
|
|
const char* p_foreign=NULL;
|
|
|
|
|
int foreign_key_size=0;
|
2018-03-07 12:03:19 +08:00
|
|
|
if(_feather->redis_write_ctx==NULL)
|
|
|
|
|
{
|
|
|
|
|
ret=connect_redis_for_write(_feather);
|
|
|
|
|
if(ret!=0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
server_time=redis_server_time(_feather->redis_write_ctx);
|
|
|
|
|
s_rule=(struct serial_rule_t *)calloc(sizeof(struct serial_rule_t),line_num);
|
|
|
|
|
for(i=0;i<line_num;i++)
|
|
|
|
|
{
|
|
|
|
|
ret=map_str2int(_feather->map_tablename2id, line_rule[i]->table_name, &table_id);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_feather->logger,RLOG_LV_FATAL,maat_command
|
|
|
|
|
,"Command set line id %d failed: unknown table %s."
|
|
|
|
|
, line_rule[i]->rule_id
|
|
|
|
|
, line_rule[i]->table_name);
|
|
|
|
|
ret=-1;
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
2018-09-25 17:56:09 +08:00
|
|
|
p_table=_feather->p_table_info[table_id];
|
|
|
|
|
if(TABLE_TYPE_PLUGIN!=p_table->table_type)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_feather->logger,RLOG_LV_FATAL,maat_command
|
|
|
|
|
,"Command set line id %d failed: table %s is not a plugin table."
|
|
|
|
|
, line_rule[i]->rule_id
|
|
|
|
|
, line_rule[i]->table_name);
|
|
|
|
|
ret=-1;
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
|
|
|
|
if(op==MAAT_OP_ADD)
|
|
|
|
|
{
|
|
|
|
|
ret=get_valid_flag_offset(line_rule[i]->table_line
|
2018-09-25 17:56:09 +08:00
|
|
|
, p_table->table_type
|
|
|
|
|
, p_table->valid_flag_column);
|
2018-03-07 12:03:19 +08:00
|
|
|
if(ret<0||
|
|
|
|
|
(op==MAAT_OP_ADD&&line_rule[i]->table_line[ret]!='1'))
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_feather->logger,RLOG_LV_FATAL,maat_command
|
2018-09-25 17:56:09 +08:00
|
|
|
,"Command set line %s %d failed: illegal valid flag."
|
|
|
|
|
, line_rule[i]->table_name, line_rule[i]->rule_id);
|
2018-03-07 12:03:19 +08:00
|
|
|
ret=-1;
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
if(op==MAAT_OP_RENEW_TIMEOUT)
|
|
|
|
|
{
|
|
|
|
|
assert(line_rule[i]->expire_after>0);
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
if(line_rule[i]->expire_after>0)
|
|
|
|
|
{
|
|
|
|
|
absolute_expire_time=server_time+line_rule[i]->expire_after;
|
|
|
|
|
}
|
2018-09-25 17:56:09 +08:00
|
|
|
if(p_table->n_foreign>0)
|
|
|
|
|
{
|
|
|
|
|
for(j=0;j<p_table->n_foreign;j++)
|
|
|
|
|
{
|
|
|
|
|
p_foreign=find_Nth_column(line_rule[i]->table_line, p_table->foreign_columns[j], &foreign_key_size);
|
|
|
|
|
if(p_foreign==NULL)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_feather->logger,RLOG_LV_FATAL, maat_command
|
|
|
|
|
, "Command set line %s %d failed: No %dth column."
|
|
|
|
|
, line_rule[i]->table_name, line_rule[i]->rule_id
|
|
|
|
|
, p_table->foreign_columns[j]);
|
|
|
|
|
ret=-1;
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
|
|
|
|
if(0!=strncmp(p_foreign, foreign_source_prefix, strlen(foreign_source_prefix)))
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_feather->logger,RLOG_LV_FATAL,maat_redis_monitor
|
|
|
|
|
,"Command set line %s %d failed: Source prefix %s is mandatory."
|
|
|
|
|
, line_rule[i]->table_name, line_rule[i]->rule_id, foreign_source_prefix);
|
|
|
|
|
ret=-1;
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
set_serial_rule(s_rule+i, op,line_rule[i]->rule_id,line_rule[i]->label_id,line_rule[i]->table_name,line_rule[i]->table_line, absolute_expire_time);
|
|
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
success_cnt=exec_serial_rule(_feather->redis_write_ctx,s_rule, line_num,server_time,_feather->logger);
|
|
|
|
|
assert(success_cnt==line_num);
|
|
|
|
|
ret=success_cnt;
|
2018-05-24 15:45:46 +08:00
|
|
|
_feather->line_cmd_acc_num+=success_cnt;
|
2018-08-01 19:42:36 +08:00
|
|
|
|
2018-03-07 12:03:19 +08:00
|
|
|
error_out:
|
|
|
|
|
for(i=0;i<line_num;i++)
|
|
|
|
|
{
|
|
|
|
|
empty_serial_rules(s_rule+i);
|
|
|
|
|
}
|
|
|
|
|
free(s_rule);
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int Maat_cmd_set_line(Maat_feather_t feather,const struct Maat_line_t* line_rule, enum MAAT_OPERATION op)
|
|
|
|
|
{
|
|
|
|
|
int ret=0;
|
|
|
|
|
ret=Maat_cmd_set_lines(feather,&line_rule, 1, op);
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
2018-09-25 17:56:09 +08:00
|
|
|
int Maat_cmd_set_file(Maat_feather_t feather,const char* key, const char* value, size_t size, enum MAAT_OPERATION op)
|
|
|
|
|
{
|
|
|
|
|
struct _Maat_feather_t* _feather=(struct _Maat_feather_t*)feather;
|
|
|
|
|
redisContext* ctx=_feather->redis_write_ctx;
|
|
|
|
|
const char *arg_vec[3];
|
|
|
|
|
size_t len_vec[3];
|
|
|
|
|
arg_vec[0] = "SET";
|
|
|
|
|
len_vec[0] = strlen("SET");
|
|
|
|
|
|
|
|
|
|
arg_vec[1] = key;
|
|
|
|
|
len_vec[1] = strlen(key);
|
|
|
|
|
|
|
|
|
|
arg_vec[2] = value;
|
|
|
|
|
len_vec[2] = size;
|
|
|
|
|
|
|
|
|
|
redisReply *reply=NULL;
|
|
|
|
|
if(0!=strncmp(key, foreign_key_prefix, strlen(foreign_key_prefix)))
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_feather->logger, RLOG_LV_FATAL, maat_command, "Invalid File key, prefix %s is mandatory.", foreign_key_prefix);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
switch(op)
|
|
|
|
|
{
|
|
|
|
|
case MAAT_OP_ADD:
|
|
|
|
|
reply= (redisReply *)redisCommandArgv(ctx, sizeof(arg_vec) / sizeof(arg_vec[0]), arg_vec, len_vec);
|
|
|
|
|
break;
|
|
|
|
|
case MAAT_OP_DEL:
|
|
|
|
|
reply=_wrap_redisCommand(ctx,"EXPIRE %s %d", key, MAAT_REDIS_SYNC_TIME);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return -1;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
if(reply==NULL||reply->type==REDIS_REPLY_NIL||reply->type==REDIS_REPLY_ERROR)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_feather->logger, RLOG_LV_FATAL, maat_command,"Set file failed, maybe Redis is busy.");
|
|
|
|
|
freeReplyObject(reply);
|
|
|
|
|
reply=NULL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
freeReplyObject(reply);
|
2018-09-26 19:30:15 +08:00
|
|
|
return 1;
|
2018-09-25 17:56:09 +08:00
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
void Maat_add_region2cmd(struct Maat_cmd_t* cmd,int which_group,const struct Maat_region_t* region)
|
|
|
|
|
{
|
|
|
|
|
struct _Maat_cmd_inner_t* _cmd=(struct _Maat_cmd_inner_t*)cmd;
|
|
|
|
|
struct Maat_region_t* dst=NULL;
|
|
|
|
|
struct Maat_group_t* p_group=NULL;
|
|
|
|
|
p_group=&(cmd->groups[which_group]);
|
|
|
|
|
assert(which_group<cmd->group_num);
|
|
|
|
|
assert(region->table_name!=NULL);
|
|
|
|
|
if(p_group->region_num==_cmd->region_size[which_group])
|
|
|
|
|
{
|
|
|
|
|
_cmd->region_size[which_group]*=2;
|
|
|
|
|
p_group->regions=(struct Maat_region_t*)realloc(p_group->regions,sizeof(struct Maat_region_t)*_cmd->region_size[which_group]);
|
|
|
|
|
}
|
|
|
|
|
dst=&(p_group->regions[p_group->region_num]);
|
|
|
|
|
p_group->region_num++;
|
|
|
|
|
_maat_copy_region(dst, region);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void Maat_free_cmd(struct Maat_cmd_t* cmd)
|
|
|
|
|
{
|
|
|
|
|
struct _Maat_cmd_inner_t* _cmd=(struct _Maat_cmd_inner_t*)cmd;
|
|
|
|
|
int i=0,j=0;
|
|
|
|
|
_cmd->ref_cnt--;
|
|
|
|
|
if(_cmd->ref_cnt>0)
|
|
|
|
|
{
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
for(i=0;i<cmd->group_num;i++)
|
|
|
|
|
{
|
|
|
|
|
for(j=0;j<cmd->groups[i].region_num;j++)
|
|
|
|
|
{
|
|
|
|
|
_maat_empty_region(&(cmd->groups[i].regions[j]));
|
|
|
|
|
}
|
|
|
|
|
free(cmd->groups[i].regions);
|
|
|
|
|
cmd->groups[i].regions=NULL;
|
|
|
|
|
}
|
|
|
|
|
free(cmd->groups);
|
|
|
|
|
cmd->groups=NULL;
|
2018-07-27 17:08:45 +08:00
|
|
|
if(_cmd->huge_service_defined!=NULL)
|
|
|
|
|
{
|
|
|
|
|
free(_cmd->huge_service_defined);
|
|
|
|
|
_cmd->huge_service_defined=NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-03-07 12:03:19 +08:00
|
|
|
_cmd->next=NULL;
|
|
|
|
|
free(_cmd);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
int Maat_format_cmd(struct Maat_cmd_t* rule, char* buffer, int size)
|
|
|
|
|
{
|
|
|
|
|
//TODO
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
int Maat_cmd(Maat_feather_t feather,struct Maat_cmd_t* raw_rule,enum MAAT_OPERATION op)
|
|
|
|
|
{
|
|
|
|
|
int ret=0;
|
|
|
|
|
ret=Maat_cmd_append(feather,raw_rule,op);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
ret=Maat_cmd_commit(feather);
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int Maat_cmd_append(Maat_feather_t feather,struct Maat_cmd_t* cmd,enum MAAT_OPERATION op)
|
|
|
|
|
{
|
|
|
|
|
_Maat_feather_t* _feather=(_Maat_feather_t*)feather;
|
|
|
|
|
struct _Maat_cmd_inner_t* _cmd=(struct _Maat_cmd_inner_t*)cmd;
|
|
|
|
|
int ret=0;
|
|
|
|
|
_cmd->op=op;
|
2018-08-01 19:42:36 +08:00
|
|
|
assert(op==MAAT_OP_DEL||op==MAAT_OP_ADD||op==MAAT_OP_RENEW_TIMEOUT);
|
2018-03-07 12:03:19 +08:00
|
|
|
assert(_cmd->next==NULL);
|
2018-08-01 19:42:36 +08:00
|
|
|
if(op==MAAT_OP_RENEW_TIMEOUT)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
assert(cmd->expire_after>0);
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
2018-08-01 19:42:36 +08:00
|
|
|
switch(op)
|
2018-03-07 12:03:19 +08:00
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
case MAAT_OP_DEL:
|
|
|
|
|
case MAAT_OP_RENEW_TIMEOUT:
|
|
|
|
|
ret=reconstruct_cmd(_feather, _cmd);
|
|
|
|
|
break;
|
|
|
|
|
case MAAT_OP_ADD:
|
|
|
|
|
ret=fix_table_name(_feather, cmd);
|
|
|
|
|
break;
|
2018-03-07 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
_cmd->ref_cnt++;
|
|
|
|
|
if(_feather->cmd_q_cnt==0)
|
|
|
|
|
{
|
|
|
|
|
assert(_feather->cmd_qtail==NULL);
|
|
|
|
|
assert(_feather->cmd_qtail==_feather->cmd_qhead);
|
|
|
|
|
_feather->cmd_qhead=_feather->cmd_qtail=_cmd;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
_feather->cmd_qtail->next=_cmd;
|
|
|
|
|
_feather->cmd_qtail=_cmd;
|
|
|
|
|
}
|
|
|
|
|
_feather->cmd_q_cnt++;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int Maat_cmd_commit(Maat_feather_t feather)
|
|
|
|
|
{
|
|
|
|
|
_Maat_feather_t* _feather=(_Maat_feather_t*)feather;
|
|
|
|
|
|
2018-08-01 19:42:36 +08:00
|
|
|
int ret=0,i=0;
|
2018-03-07 12:03:19 +08:00
|
|
|
int new_region_num=0,new_group_num=0;
|
|
|
|
|
int serial_rule_num=0,serial_rule_idx=0;
|
|
|
|
|
int transection_success=1;
|
|
|
|
|
struct _Maat_cmd_inner_t* p=NULL,*n=NULL;
|
|
|
|
|
|
|
|
|
|
redisContext* ctx=NULL;
|
|
|
|
|
redisReply* data_reply=NULL;
|
|
|
|
|
|
|
|
|
|
struct serial_rule_t* s_rule=NULL;
|
|
|
|
|
if(_feather->REDIS_MODE_ON==0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
if(_feather->cmd_q_cnt==0)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
if(_feather->redis_write_ctx==NULL)
|
|
|
|
|
{
|
|
|
|
|
ret=connect_redis_for_write(_feather);
|
|
|
|
|
if(ret!=0)
|
|
|
|
|
{
|
2018-08-01 19:42:36 +08:00
|
|
|
ret=-1;
|
2018-03-07 12:03:19 +08:00
|
|
|
goto error_out;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ctx=_feather->redis_write_ctx;
|
|
|
|
|
for(i=0,p=_feather->cmd_qhead;i<_feather->cmd_q_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
serial_rule_num+=calculate_serial_rule_num(p, &new_region_num, &new_group_num);
|
|
|
|
|
p=p->next;
|
|
|
|
|
}
|
|
|
|
|
_feather->server_time=redis_server_time(ctx);
|
|
|
|
|
|
|
|
|
|
if(_feather->AUTO_NUMBERING_ON==1)
|
|
|
|
|
{
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx,"INCRBY SEQUENCE_REGION %d",new_region_num);
|
|
|
|
|
assert(data_reply->type==REDIS_REPLY_INTEGER);
|
|
|
|
|
_feather->base_rgn_seq=data_reply->integer-new_region_num;
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx,"INCRBY SEQUENCE_GROUP %d",new_group_num);
|
|
|
|
|
assert(data_reply->type==REDIS_REPLY_INTEGER);
|
|
|
|
|
_feather->base_grp_seq=data_reply->integer-new_group_num;
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
}
|
|
|
|
|
s_rule=(struct serial_rule_t*)calloc(sizeof(struct serial_rule_t),serial_rule_num);
|
|
|
|
|
|
|
|
|
|
for(i=0,p=_feather->cmd_qhead;i<_feather->cmd_q_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
serial_rule_idx+=build_serial_rule(_feather,p,s_rule, serial_rule_num-serial_rule_idx);
|
|
|
|
|
p=p->next;
|
|
|
|
|
}
|
|
|
|
|
assert(serial_rule_idx==serial_rule_num);
|
|
|
|
|
transection_success=0;
|
2018-08-01 19:42:36 +08:00
|
|
|
transection_success=exec_serial_rule(ctx, s_rule,serial_rule_num,_feather->server_time,_feather->logger);
|
|
|
|
|
assert(transection_success==serial_rule_num);
|
|
|
|
|
ret=_feather->cmd_q_cnt;
|
2018-03-07 12:03:19 +08:00
|
|
|
_feather->cmd_acc_num+=_feather->cmd_q_cnt;
|
|
|
|
|
error_out:
|
|
|
|
|
p=_feather->cmd_qhead;
|
|
|
|
|
for(i=0;i<_feather->cmd_q_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
n=p->next;
|
|
|
|
|
Maat_free_cmd((struct Maat_cmd_t* )p);
|
|
|
|
|
p=n;
|
|
|
|
|
}
|
|
|
|
|
_feather->cmd_qhead=_feather->cmd_qtail=NULL;
|
|
|
|
|
_feather->cmd_q_cnt=0;
|
|
|
|
|
|
|
|
|
|
for(i=0;i<serial_rule_num;i++)
|
|
|
|
|
{
|
|
|
|
|
empty_serial_rules(s_rule+i);
|
|
|
|
|
}
|
|
|
|
|
free(s_rule);
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
long long Maat_cmd_incrby(Maat_feather_t feather,const char* key, int increment)
|
|
|
|
|
{
|
|
|
|
|
_Maat_feather_t* _feather=(_Maat_feather_t*)feather;
|
|
|
|
|
redisReply* data_reply=NULL;
|
|
|
|
|
long long result=0;
|
|
|
|
|
int ret=0;
|
|
|
|
|
if(_feather->redis_write_ctx==NULL)
|
|
|
|
|
{
|
|
|
|
|
ret=connect_redis_for_write(_feather);
|
|
|
|
|
if(ret!=0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
data_reply=_wrap_redisCommand(_feather->redis_write_ctx,"INCRBY %s %d", key, increment);
|
|
|
|
|
assert(data_reply->type==REDIS_REPLY_INTEGER);
|
|
|
|
|
result=data_reply->integer;
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
int Maat_cmd_select(Maat_feather_t feather, int label_id, int * output_ids, unsigned int size)
|
|
|
|
|
{
|
|
|
|
|
_Maat_feather_t* _feather=(_Maat_feather_t*)feather;
|
|
|
|
|
redisReply* data_reply=NULL;
|
|
|
|
|
unsigned int i=0;
|
|
|
|
|
int ret=0;
|
|
|
|
|
if(_feather->redis_write_ctx==NULL)
|
|
|
|
|
{
|
|
|
|
|
ret=connect_redis_for_write(_feather);
|
|
|
|
|
if(ret!=0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
data_reply=_wrap_redisCommand(_feather->redis_write_ctx,"ZRANGEBYSCORE %s %d %d"
|
|
|
|
|
,rm_label_sset
|
|
|
|
|
,label_id
|
|
|
|
|
,label_id);
|
|
|
|
|
for(i=0;i<data_reply->elements&&i<size;i++)
|
|
|
|
|
{
|
|
|
|
|
output_ids[i]=atoi(data_reply->element[i]->str);
|
|
|
|
|
}
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
return i;
|
|
|
|
|
}
|
2018-03-15 11:50:32 +08:00
|
|
|
int redis_flush_DB(redisContext* ctx, int db_index, void* logger)
|
|
|
|
|
{
|
|
|
|
|
redisReply* data_reply=NULL;
|
|
|
|
|
long long maat_redis_version=0, dbsize=0;
|
|
|
|
|
int append_cmd_cnt=0, i=0;
|
|
|
|
|
int redis_transaction_success=1;
|
|
|
|
|
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx, "WATCH MAAT_VERSION");
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx, "GET MAAT_VERSION");
|
2018-03-22 21:23:33 +08:00
|
|
|
if(data_reply->type==REDIS_REPLY_NIL)
|
|
|
|
|
{
|
|
|
|
|
maat_redis_version=0;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
maat_redis_version=read_redis_integer(data_reply);
|
|
|
|
|
maat_redis_version++;
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
}
|
2018-03-15 11:50:32 +08:00
|
|
|
data_reply=_wrap_redisCommand(ctx, "DBSIZE");
|
|
|
|
|
dbsize=read_redis_integer(data_reply);
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
|
|
|
|
|
data_reply=_wrap_redisCommand(ctx,"MULTI");
|
2018-03-16 15:23:58 +08:00
|
|
|
|
2018-03-15 11:50:32 +08:00
|
|
|
redisAppendCommand(ctx,"FLUSHDB");
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
redisAppendCommand(ctx,"SET MAAT_VERSION %lld",maat_redis_version);
|
|
|
|
|
append_cmd_cnt++;
|
2018-05-30 11:57:11 +08:00
|
|
|
redisAppendCommand(ctx,"SET MAAT_PRE_VER %lld",maat_redis_version);
|
|
|
|
|
append_cmd_cnt++;
|
2018-03-15 11:50:32 +08:00
|
|
|
redisAppendCommand(ctx,"SET SEQUENCE_REGION 1",maat_redis_version);
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
redisAppendCommand(ctx,"SET SEQUENCE_GROUP 1",maat_redis_version);
|
|
|
|
|
append_cmd_cnt++;
|
|
|
|
|
redisAppendCommand(ctx,"EXEC");
|
2018-03-16 15:23:58 +08:00
|
|
|
append_cmd_cnt++;
|
2018-03-15 11:50:32 +08:00
|
|
|
for(i=0;i<append_cmd_cnt;i++)
|
|
|
|
|
{
|
|
|
|
|
_wrap_redisGetReply(ctx, &data_reply);
|
|
|
|
|
if(0==mr_transaction_success(data_reply))
|
|
|
|
|
{
|
|
|
|
|
redis_transaction_success=0;
|
|
|
|
|
}
|
|
|
|
|
freeReplyObject(data_reply);
|
|
|
|
|
}
|
|
|
|
|
if(redis_transaction_success==1)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(logger,RLOG_LV_INFO,maat_command
|
|
|
|
|
,"FlushDB %d, MAAT_VERSION=%llu, DBSize=%llu."
|
2018-03-22 21:23:33 +08:00
|
|
|
,db_index, (maat_redis_version==0)?0:(maat_redis_version-1),dbsize
|
2018-03-15 11:50:32 +08:00
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
return redis_transaction_success;
|
|
|
|
|
}
|
|
|
|
|
int Maat_cmd_flushDB(Maat_feather_t feather)
|
|
|
|
|
{
|
|
|
|
|
_Maat_feather_t* _feather=(_Maat_feather_t*)feather;
|
|
|
|
|
int ret=0;
|
|
|
|
|
if(_feather->redis_write_ctx==NULL)
|
|
|
|
|
{
|
|
|
|
|
ret=connect_redis_for_write(_feather);
|
|
|
|
|
if(ret!=0)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
do
|
|
|
|
|
{
|
|
|
|
|
ret=redis_flush_DB(_feather->redis_write_ctx, _feather->redis_index, _feather->logger);
|
|
|
|
|
}while(ret==0);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2018-03-07 12:03:19 +08:00
|
|
|
|