pid_t encryptpid; /* valid if fd is pipe to encrypt */
};
+struct databuf *g_databuf = NULL;
+
typedef struct filter_s {
int fd;
char *name;
static char *dle_str = NULL;
static char *errfname = NULL;
static int errf_lines = 0;
+static int max_warnings = 0;
static dumpfile_t file;
char *cfg_opt = NULL;
int dumper_setuid;
+ if (argc > 1 && argv && argv[1] && g_str_equal(argv[1], "--version")) {
+ printf("dumper-%s\n", VERSION);
+ return (0);
+ }
+
/*
* Configure program for internationalization:
* 1) Only set the message locale for now.
}
dataport_list = newstralloc(dataport_list, cmdargs->argv[a++]);
+ if(a >= cmdargs->argc) {
+ error(_("error [dumper PORT-DUMP: not enough args: max_warnings]"));
+ }
+ max_warnings = atoi(cmdargs->argv[a++]);
+
if(a >= cmdargs->argc) {
error(_("error [dumper PORT-DUMP: not enough args: options]"));
}
break;
}
databuf_init(&db, outfd);
+ g_databuf = &db;
if (am_has_feature(their_features, fe_req_xml))
xml_check_options(options); /* note: modifies globals */
{
char *line;
int count = 0;
+ int to_unlink = 1;
fflush(errf);
if (fseeko(errf, 0L, SEEK_SET) < 0) {
dbprintf(_("log_msgout: warning - seek failed: %s\n"), strerror(errno));
}
while ((line = agets(errf)) != NULL) {
- if (errf_lines >= 100 && count >= 20)
+ if (max_warnings > 0 && errf_lines >= max_warnings && count >= max_warnings) {
+ log_add(typ, "Look in the '%s' file for full error messages", errfname);
+ to_unlink = 0;
break;
+ }
if (line[0] != '\0') {
log_add(typ, "%s", line);
}
}
amfree(line);
- if (errf_lines >= 100) {
- log_add(typ, "Look in the '%s' file for full error messages", errfname);
- }
-
- return errf_lines < 100;
+ return to_unlink;
}
/* ------------- */
if (!errstr) errstr = stralloc(_("got no data"));
}
+ if (indexfile_tmp) {
+ amwait_t index_status;
+
+ /*@i@*/ aclose(indexout);
+ waitpid(indexpid,&index_status,0);
+ log_add(L_INFO, "pid-done %ld", (long)indexpid);
+ if (rename(indexfile_tmp, indexfile_real) != 0) {
+ log_add(L_WARNING, _("could not rename \"%s\" to \"%s\": %s"),
+ indexfile_tmp, indexfile_real, strerror(errno));
+ }
+ amfree(indexfile_tmp);
+ amfree(indexfile_real);
+ }
+
+ /* copy the header in a file on the index dir */
+ {
+ FILE *a;
+ char *s;
+ char *f = getheaderfname(hostname, diskname, dumper_timestamp, level);
+ a = fopen(f,"w");
+ if (a) {
+ s = build_header(&file, NULL, DISK_BLOCK_BYTES);
+ fprintf(a,"%s", s);
+ g_free(s);
+ fclose(a);
+ }
+ g_free(f);
+ }
+
+ if (db->compresspid != -1 && dump_result < 2) {
+ amwait_t wait_status;
+ char *errmsg = NULL;
+
+ waitpid(db->compresspid, &wait_status, 0);
+ if (WIFSIGNALED(wait_status)) {
+ errmsg = g_strdup_printf(_("%s terminated with signal %d"),
+ "compress", WTERMSIG(wait_status));
+ } else if (WIFEXITED(wait_status)) {
+ if (WEXITSTATUS(wait_status) != 0) {
+ errmsg = g_strdup_printf(_("%s exited with status %d"),
+ "compress", WEXITSTATUS(wait_status));
+ }
+ } else {
+ errmsg = g_strdup_printf(_("%s got bad exit"),
+ "compress");
+ }
+ if (errmsg) {
+ g_fprintf(errf, _("? %s\n"), errmsg);
+ g_debug("%s", errmsg);
+ dump_result = max(dump_result, 2);
+ if (!errstr)
+ errstr = errmsg;
+ else
+ g_free(errmsg);
+ }
+ log_add(L_INFO, "pid-done %ld", (long)db->compresspid);
+ db->compresspid = -1;
+ }
+
+ if (db->encryptpid != -1 && dump_result < 2) {
+ amwait_t wait_status;
+ char *errmsg = NULL;
+
+ waitpid(db->encryptpid, &wait_status, 0);
+ if (WIFSIGNALED(wait_status)) {
+ errmsg = g_strdup_printf(_("%s terminated with signal %d"),
+ "encrypt", WTERMSIG(wait_status));
+ } else if (WIFEXITED(wait_status)) {
+ if (WEXITSTATUS(wait_status) != 0) {
+ errmsg = g_strdup_printf(_("%s exited with status %d"),
+ "encrypt", WEXITSTATUS(wait_status));
+ }
+ } else {
+ errmsg = g_strdup_printf(_("%s got bad exit"),
+ "encrypt");
+ }
+ if (errmsg) {
+ g_fprintf(errf, _("? %s\n"), errmsg);
+ g_debug("%s", errmsg);
+ dump_result = max(dump_result, 2);
+ if (!errstr)
+ errstr = errmsg;
+ else
+ g_free(errmsg);
+ }
+ log_add(L_INFO, "pid-done %ld", (long)db->encryptpid);
+ db->encryptpid = -1;
+ }
+
if (dump_result > 1)
goto failed;
if (data_path == DATA_PATH_AMANDA)
aclose(db->fd);
- if (indexfile_tmp) {
- amwait_t index_status;
-
- /*@i@*/ aclose(indexout);
- waitpid(indexpid,&index_status,0);
- log_add(L_INFO, "pid-done %ld", (long)indexpid);
- if (rename(indexfile_tmp, indexfile_real) != 0) {
- log_add(L_WARNING, _("could not rename \"%s\" to \"%s\": %s"),
- indexfile_tmp, indexfile_real, strerror(errno));
- }
- amfree(indexfile_tmp);
- amfree(indexfile_real);
- }
-
- if(db->compresspid != -1) {
- waitpid(db->compresspid,NULL,0);
- log_add(L_INFO, "pid-done %ld", (long)db->compresspid);
- }
- if(db->encryptpid != -1) {
- waitpid(db->encryptpid,NULL,0);
- log_add(L_INFO, "pid-done %ld", (long)db->encryptpid);
- }
-
amfree(errstr);
dumpfile_free_data(&file);
amfree(indexfile_real);
}
+ amfree(errstr);
+ dumpfile_free_data(&file);
+
return 0;
}
strerror(errno));
dump_result = 2;
stop_dump();
- dumpfile_free_data(&file);
return;
}
- dumpfile_free_data(&file);
aclose(db->fd);
if (data_path == DATA_PATH_AMANDA) {
g_debug(_("Sending data to %s:%d\n"), data_host, data_port);
nread = read(filter->fd, filter->buffer + filter->first + filter->size,
filter->allocated_size - filter->first - filter->size - 2);
- if (nread != 0) {
- dump_result = max(dump_result, 2);
- }
-
if (nread <= 0) {
aclose(filter->fd);
if (filter->size > 0 && filter->buffer[filter->first + filter->size - 1] != '\n') {
filter->first += len;
filter->size -= len;
b = p + 1;
+ dump_result = max(dump_result, 1);
}
if (nread <= 0) {
}
}
aclose(indexout);
+ aclose(g_databuf->fd);
timeout(0);
}
return (-1);
}
+ if (comptype != COMP_SERVER_CUST) {
+ g_debug("execute: %s %s", COMPRESS_PATH,
+ comptype == COMP_BEST ? COMPRESS_BEST_OPT : COMPRESS_FAST_OPT);
+ } else {
+ g_debug("execute: %s", srvcompprog);
+ }
switch (*pid = fork()) {
case -1:
errstr = newvstrallocf(errstr, _("couldn't fork: %s"), strerror(errno));
filter->allocated_size = 0;
filter->event = event_register((event_id_t)filter->fd, EV_READFD,
handle_filter_stderr, filter);
-g_debug("event register %s %d", name, filter->fd);
return (rval);
case 0:
close(outpipe[1]);
return (-1);
}
+ g_debug("execute: %s", srv_encrypt);
switch (*pid = fork()) {
case -1:
errstr = newvstrallocf(errstr, _("couldn't fork: %s"), strerror(errno));
aclose(errpipe[0]);
aclose(errpipe[1]);
return (-1);
- default:
+ default: {
+ char *base;
rval = dup2(outpipe[1], outfd);
if (rval < 0)
errstr = newvstrallocf(errstr, _("couldn't dup2: %s"), strerror(errno));
aclose(errpipe[1]);
filter = g_new0(filter_t, 1);
filter->fd = errpipe[0];
- filter->name = "encrypt";
+ base = g_strdup(srv_encrypt);
+ filter->name = g_strdup(basename(base));
+ amfree(base);
filter->buffer = NULL;
filter->size = 0;
filter->allocated_size = 0;
filter->event = event_register((event_id_t)filter->fd, EV_READFD,
handle_filter_stderr, filter);
-g_debug("event register %s %d", "encrypt data", filter->fd);
return (rval);
+ }
case 0: {
char *base;
if (dup2(outpipe[0], 0) < 0) {
*p++ = '\0';
if(strncmp_const_skip(tok, "features=", tok, ch) == 0) {
char *u = strchr(tok, ';');
+ ch = ch;
if (u)
*u = '\0';
am_release_feature_set(their_features);
{
char level_string[NUM_STR_SIZE];
char *req = NULL;
- char *authopt;
int response_error;
const security_driver_t *secdrv;
char *application_api;
}
vstrextend(&p, " <level>", level_string, "</level>\n", NULL);
vstrextend(&p, options+1, "</dle>\n", NULL);
- pclean = clean_dle_str_for_client(p);
+ pclean = clean_dle_str_for_client(p, their_features);
vstrextend(&req, pclean, NULL);
amfree(pclean);
dle_str = p;
amfree(req);
return 2;
} else {
- authopt = strstr(options, "auth=");
if (auth == NULL) {
auth = "BSD";
}