mirror of
https://git.postgresql.org/git/postgresql.git
synced 2024-12-21 08:29:39 +08:00
88c803457a
Don't insist on pg_dumpall and psql being present in the old cluster, since they are not needed. Do insist on pg_resetxlog being present (in both old and new), since we need it. Also check for pg_config, but only in the new cluster. Remove the useless attempt to call pg_config in the old cluster; we don't need to know the old value of --pkglibdir. (In the case of a stripped-down migration installation there might be nothing there to look at anyway, so any future change that might reintroduce that need would have to be considered carefully.) Per my attempts to build a minimal previous-version installation to support pg_upgrade.
255 lines
6.1 KiB
C
255 lines
6.1 KiB
C
/*
|
|
* exec.c
|
|
*
|
|
* execution functions
|
|
*
|
|
* Copyright (c) 2010, PostgreSQL Global Development Group
|
|
* contrib/pg_upgrade/exec.c
|
|
*/
|
|
|
|
#include "pg_upgrade.h"
|
|
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
|
|
|
|
static void check_data_dir(const char *pg_data);
|
|
static void check_bin_dir(ClusterInfo *cluster, Cluster whichCluster);
|
|
static int check_exec(const char *dir, const char *cmdName);
|
|
static const char *validate_exec(const char *path);
|
|
|
|
|
|
/*
|
|
* exec_prog()
|
|
*
|
|
* Formats a command from the given argument list and executes that
|
|
* command. If the command executes, exec_prog() returns 1 otherwise
|
|
* exec_prog() logs an error message and returns 0.
|
|
*
|
|
* If throw_error is TRUE, this function will throw a PG_FATAL error
|
|
* instead of returning should an error occur.
|
|
*/
|
|
int
|
|
exec_prog(bool throw_error, const char *fmt,...)
|
|
{
|
|
va_list args;
|
|
int result;
|
|
char cmd[MAXPGPATH];
|
|
|
|
va_start(args, fmt);
|
|
vsnprintf(cmd, MAXPGPATH, fmt, args);
|
|
va_end(args);
|
|
|
|
pg_log(PG_INFO, "%s\n", cmd);
|
|
|
|
result = system(cmd);
|
|
|
|
if (result != 0)
|
|
{
|
|
pg_log(throw_error ? PG_FATAL : PG_INFO,
|
|
"\nThere were problems executing %s\n", cmd);
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
* is_server_running()
|
|
*
|
|
* checks whether postmaster on the given data directory is running or not.
|
|
* The check is performed by looking for the existence of postmaster.pid file.
|
|
*/
|
|
bool
|
|
is_server_running(const char *datadir)
|
|
{
|
|
char path[MAXPGPATH];
|
|
int fd;
|
|
|
|
snprintf(path, sizeof(path), "%s/postmaster.pid", datadir);
|
|
|
|
if ((fd = open(path, O_RDONLY, 0)) < 0)
|
|
{
|
|
if (errno != ENOENT)
|
|
pg_log(PG_FATAL, "\ncould not open file \"%s\" for reading\n",
|
|
path);
|
|
|
|
return false;
|
|
}
|
|
|
|
close(fd);
|
|
return true;
|
|
}
|
|
|
|
|
|
/*
|
|
* verify_directories()
|
|
*
|
|
* does all the hectic work of verifying directories and executables
|
|
* of old and new server.
|
|
*
|
|
* NOTE: May update the values of all parameters
|
|
*/
|
|
void
|
|
verify_directories(void)
|
|
{
|
|
prep_status("Checking old data directory (%s)", old_cluster.pgdata);
|
|
check_data_dir(old_cluster.pgdata);
|
|
check_ok();
|
|
|
|
prep_status("Checking old bin directory (%s)", old_cluster.bindir);
|
|
check_bin_dir(&old_cluster, CLUSTER_OLD);
|
|
check_ok();
|
|
|
|
prep_status("Checking new data directory (%s)", new_cluster.pgdata);
|
|
check_data_dir(new_cluster.pgdata);
|
|
check_ok();
|
|
|
|
prep_status("Checking new bin directory (%s)", new_cluster.bindir);
|
|
check_bin_dir(&new_cluster, CLUSTER_NEW);
|
|
check_ok();
|
|
}
|
|
|
|
|
|
/*
|
|
* check_data_dir()
|
|
*
|
|
* This function validates the given cluster directory - we search for a
|
|
* small set of subdirectories that we expect to find in a valid $PGDATA
|
|
* directory. If any of the subdirectories are missing (or secured against
|
|
* us) we display an error message and exit()
|
|
*
|
|
*/
|
|
static void
|
|
check_data_dir(const char *pg_data)
|
|
{
|
|
char subDirName[MAXPGPATH];
|
|
int subdirnum;
|
|
const char *requiredSubdirs[] = {"base", "global", "pg_clog",
|
|
"pg_multixact", "pg_subtrans", "pg_tblspc", "pg_twophase",
|
|
"pg_xlog"};
|
|
|
|
for (subdirnum = 0;
|
|
subdirnum < sizeof(requiredSubdirs) / sizeof(requiredSubdirs[0]);
|
|
++subdirnum)
|
|
{
|
|
struct stat statBuf;
|
|
|
|
snprintf(subDirName, sizeof(subDirName), "%s/%s", pg_data,
|
|
requiredSubdirs[subdirnum]);
|
|
|
|
if (stat(subDirName, &statBuf) != 0)
|
|
report_status(PG_FATAL, "check for %s failed: %s",
|
|
requiredSubdirs[subdirnum], getErrorText(errno));
|
|
else if (!S_ISDIR(statBuf.st_mode))
|
|
report_status(PG_FATAL, "%s is not a directory",
|
|
requiredSubdirs[subdirnum]);
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
* check_bin_dir()
|
|
*
|
|
* This function searches for the executables that we expect to find
|
|
* in the binaries directory. If we find that a required executable
|
|
* is missing (or secured against us), we display an error message and
|
|
* exit().
|
|
*/
|
|
static void
|
|
check_bin_dir(ClusterInfo *cluster, Cluster whichCluster)
|
|
{
|
|
check_exec(cluster->bindir, "postgres");
|
|
check_exec(cluster->bindir, "pg_ctl");
|
|
check_exec(cluster->bindir, "pg_resetxlog");
|
|
if (whichCluster == CLUSTER_NEW)
|
|
{
|
|
/* these are only needed in the new cluster */
|
|
check_exec(cluster->bindir, "pg_config");
|
|
check_exec(cluster->bindir, "psql");
|
|
check_exec(cluster->bindir, "pg_dumpall");
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
* check_exec()
|
|
*
|
|
* Checks whether either of the two command names (cmdName and alternative)
|
|
* appears to be an executable (in the given directory). If dir/cmdName is
|
|
* an executable, this function returns 1. If dir/alternative is an
|
|
* executable, this function returns 2. If neither of the given names is
|
|
* a valid executable, this function returns 0 to indicated failure.
|
|
*/
|
|
static int
|
|
check_exec(const char *dir, const char *cmdName)
|
|
{
|
|
char path[MAXPGPATH];
|
|
const char *errMsg;
|
|
|
|
snprintf(path, sizeof(path), "%s/%s", dir, cmdName);
|
|
|
|
if ((errMsg = validate_exec(path)) == NULL)
|
|
return 1; /* 1 -> first alternative OK */
|
|
else
|
|
pg_log(PG_FATAL, "check for %s failed - %s\n", cmdName, errMsg);
|
|
|
|
return 0; /* 0 -> neither alternative is acceptable */
|
|
}
|
|
|
|
|
|
/*
|
|
* validate_exec()
|
|
*
|
|
* validate "path" as an executable file
|
|
* returns 0 if the file is found and no error is encountered.
|
|
* -1 if the regular file "path" does not exist or cannot be executed.
|
|
* -2 if the file is otherwise valid but cannot be read.
|
|
*/
|
|
static const char *
|
|
validate_exec(const char *path)
|
|
{
|
|
struct stat buf;
|
|
|
|
#ifdef WIN32
|
|
/* Win32 requires a .exe suffix for stat() */
|
|
char path_exe[MAXPGPATH + sizeof(EXE_EXT) - 1];
|
|
|
|
if (strlen(path) >= strlen(EXE_EXT) &&
|
|
pg_strcasecmp(path + strlen(path) - strlen(EXE_EXT), EXE_EXT) != 0)
|
|
{
|
|
strcpy(path_exe, path);
|
|
strcat(path_exe, EXE_EXT);
|
|
path = path_exe;
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
* Ensure that the file exists and is a regular file.
|
|
*/
|
|
if (stat(path, &buf) < 0)
|
|
return getErrorText(errno);
|
|
|
|
if (!S_ISREG(buf.st_mode))
|
|
return "not an executable file";
|
|
|
|
/*
|
|
* Ensure that the file is both executable and readable (required for
|
|
* dynamic loading).
|
|
*/
|
|
#ifndef WIN32
|
|
if (access(path, R_OK) != 0)
|
|
return "can't read file (permission denied)";
|
|
if (access(path, X_OK) != 0)
|
|
return "can't execute (permission denied)";
|
|
return NULL;
|
|
#else
|
|
if ((buf.st_mode & S_IRUSR) == 0)
|
|
return "can't read file (permission denied)";
|
|
if ((buf.st_mode & S_IXUSR) == 0)
|
|
return "can't execute (permission denied)";
|
|
return NULL;
|
|
#endif
|
|
}
|