diff options
author | Martin Schwenke <martin@meltin.net> | 2012-10-11 15:17:54 +1100 |
---|---|---|
committer | Martin Schwenke <martin@meltin.net> | 2012-10-18 20:05:42 +1100 |
commit | a884c8c453961a2064dc4df5fd71e62360185681 (patch) | |
tree | fbb776c5a5f029f8b337167acfe7cc2510a165a0 | |
parent | 66d0aba85be31643a8525faf80f8ad797d70b40d (diff) | |
download | samba-a884c8c453961a2064dc4df5fd71e62360185681.tar.gz samba-a884c8c453961a2064dc4df5fd71e62360185681.tar.xz samba-a884c8c453961a2064dc4df5fd71e62360185681.zip |
recoverd: Verifying local IPs should only check for unhosted available IPs
Currently it checks for unhosted IPs among the known IPs rather than
available IPs. This means that a takeover run can be flagged even
when that takeover run will be unable to assign a known, unhosted IP.
Pair-programmed-with: Amitay Isaacs <amitay@gmail.com>
Signed-off-by: Martin Schwenke <martin@meltin.net>
(This used to be ctdb commit 3cc878bc97fdac764a60ed805f64d649eaab06e8)
-rw-r--r-- | ctdb/server/ctdb_recoverd.c | 51 |
1 files changed, 34 insertions, 17 deletions
diff --git a/ctdb/server/ctdb_recoverd.c b/ctdb/server/ctdb_recoverd.c index 55d878bdd1..56afe4f47c 100644 --- a/ctdb/server/ctdb_recoverd.c +++ b/ctdb/server/ctdb_recoverd.c @@ -2778,7 +2778,6 @@ static int verify_local_ip_allocation(struct ctdb_context *ctdb, struct ctdb_rec { TALLOC_CTX *mem_ctx = talloc_new(NULL); struct ctdb_control_get_ifaces *ifaces = NULL; - struct ctdb_all_public_ips *ips = NULL; struct ctdb_uptime *uptime1 = NULL; struct ctdb_uptime *uptime2 = NULL; int ret, j; @@ -2820,14 +2819,6 @@ static int verify_local_ip_allocation(struct ctdb_context *ctdb, struct ctdb_rec need_takeover_run = true; } - /* read the ip allocation from the local node */ - ret = ctdb_ctrl_get_public_ips(ctdb, CONTROL_TIMEOUT(), CTDB_CURRENT_NODE, mem_ctx, &ips); - if (ret != 0) { - DEBUG(DEBUG_ERR, ("Unable to get public ips from local node %u\n", pnn)); - talloc_free(mem_ctx); - return -1; - } - ret = ctdb_ctrl_uptime(ctdb, mem_ctx, CONTROL_TIMEOUT(), CTDB_CURRENT_NODE, &uptime2); if (ret != 0) { @@ -2870,25 +2861,51 @@ static int verify_local_ip_allocation(struct ctdb_context *ctdb, struct ctdb_rec we also request a ip reallocation. */ if (ctdb->tunable.disable_ip_failover == 0) { + struct ctdb_all_public_ips *ips = NULL; + + /* read the *available* IPs from the local node */ + ret = ctdb_ctrl_get_public_ips_flags(ctdb, CONTROL_TIMEOUT(), CTDB_CURRENT_NODE, mem_ctx, CTDB_PUBLIC_IP_FLAGS_ONLY_AVAILABLE, &ips); + if (ret != 0) { + DEBUG(DEBUG_ERR, ("Unable to get available public IPs from local node %u\n", pnn)); + talloc_free(mem_ctx); + return -1; + } + for (j=0; j<ips->num; j++) { - if (ips->ips[j].pnn == -1 && nodemap->nodes[pnn].flags == 0) { - DEBUG(DEBUG_CRIT,("Public address '%s' is not assigned and we could serve this ip\n", - ctdb_addr_to_str(&ips->ips[j].addr))); + if (ips->ips[j].pnn == -1 && + nodemap->nodes[pnn].flags == 0) { + DEBUG(DEBUG_CRIT,("Public IP '%s' is not assigned and we could serve it\n", + ctdb_addr_to_str(&ips->ips[j].addr))); need_takeover_run = true; - } else if (ips->ips[j].pnn == pnn) { + } + } + + talloc_free(ips); + + /* read the *known* IPs from the local node */ + ret = ctdb_ctrl_get_public_ips_flags(ctdb, CONTROL_TIMEOUT(), CTDB_CURRENT_NODE, mem_ctx, 0, &ips); + if (ret != 0) { + DEBUG(DEBUG_ERR, ("Unable to get known public IPs from local node %u\n", pnn)); + talloc_free(mem_ctx); + return -1; + } + + for (j=0; j<ips->num; j++) { + if (ips->ips[j].pnn == pnn) { if (ctdb->do_checkpublicip && !ctdb_sys_have_ip(&ips->ips[j].addr)) { - DEBUG(DEBUG_CRIT,("Public address '%s' is missing and we should serve this ip\n", + DEBUG(DEBUG_CRIT,("Public IP '%s' is assigned to us but not on an interface\n", ctdb_addr_to_str(&ips->ips[j].addr))); need_takeover_run = true; } } else { - if (ctdb->do_checkpublicip && ctdb_sys_have_ip(&ips->ips[j].addr)) { + if (ctdb->do_checkpublicip && + ctdb_sys_have_ip(&ips->ips[j].addr)) { - DEBUG(DEBUG_CRIT,("We are still serving a public address '%s' that we should not be serving. Removing it.\n", + DEBUG(DEBUG_CRIT,("We are still serving a public IP '%s' that we should not be serving. Removing it\n", ctdb_addr_to_str(&ips->ips[j].addr))); if (ctdb_ctrl_release_ip(ctdb, CONTROL_TIMEOUT(), CTDB_CURRENT_NODE, &ips->ips[j]) != 0) { - DEBUG(DEBUG_ERR,("Failed to release local ip address\n")); + DEBUG(DEBUG_ERR,("Failed to release local IP address\n")); } } } |