summaryrefslogtreecommitdiffstats
path: root/ctdb/config/statd-callout
blob: a9c2e3dfba5fcf03e056eb2cd3e2da02a420d2af (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
#!/bin/sh

# this script needs to be installed so that statd points to it with the -H 
# command line argument. The easiest way to do that is to put something like this in 
# /etc/sysconfig/nfs:
#   STATD_HOSTNAME="myhostname -H /etc/ctdb/statd-callout"

[ -n "$CTDB_BASE" ] || \
    export CTDB_BASE=$(cd -P $(dirname "$0") ; echo "$PWD")

. $CTDB_BASE/functions
loadconfig ctdb
loadconfig nfs

[ -z $NFS_HOSTNAME ] && {
	echo NFS_HOSTNAME is not configured. statd-callout failed.
	exit 0
}

case "$1" in
  add-client)
	# the callout does not tell us to which ip the client connected
	# so we must add it to all the ips that we serve
	PNN=`ctdb xpnn | sed -e "s/.*://"`
	ctdb ip -Y | while read LINE; do
		NODE=`echo $LINE | cut -f3 -d:`
		[ "$NODE" = "$PNN" ] || {
			# not us
			continue
		} 
		IP=`echo $LINE | cut -f2 -d:`
		mkdir -p $CTDB_VARDIR/state/statd/ip/$IP
		touch $CTDB_VARDIR/state/statd/ip/$IP/$2
	done
	;;
  del-client)
	# the callout does not tell us to which ip the client disconnected
	# so we must remove it from all the ips that we serve
	PNN=`ctdb xpnn | sed -e "s/.*://"`
	ctdb ip -Y | while read LINE; do
		NODE=`echo $LINE | cut -f3 -d:`
		[ "$NODE" = "$PNN" ] || {
			# not us
			continue
		} 
		IP=`echo $LINE | cut -f2 -d:`
		mkdir -p $CTDB_VARDIR/state/statd/ip/$IP
		rm -f $CTDB_VARDIR/state/statd/ip/$IP/$2
	done
	;;
  updatelocal)
	# For all IPs we serve, collect info and push to the config database
	PNN=`ctdb xpnn | sed -e "s/.*://"`
	ctdb ip -Y | tail -n +2 | while read LINE; do
		NODE=`echo $LINE | cut -f3 -d:`
		[ "$NODE" = "$PNN" ] || {
			continue
		} 
		IP=`echo $LINE | cut -f2 -d:`

		mkdir -p $CTDB_VARDIR/state/statd/ip/$IP

		rm -f $CTDB_VARDIR/state/statd/ip/$IP.tar
		tar cfP $CTDB_VARDIR/state/statd/ip/$IP.tar $CTDB_VARDIR/state/statd/ip/$IP

		rm -f $CTDB_VARDIR/state/statd/ip/$IP.rec
		ctdb pfetch ctdb.tdb statd-state:$IP $CTDB_VARDIR/state/statd/ip/$IP.rec 2>/dev/null
		[ "$?" = "0" ] || {
			# something went wrong,  try storing this data
			echo No record. Store STATD state data for $IP
			ctdb pstore ctdb.tdb statd-state:$IP $CTDB_VARDIR/state/statd/ip/$IP.tar 2>/dev/null
			continue
		}

		cmp $CTDB_VARDIR/state/statd/ip/$IP.tar $CTDB_VARDIR/state/statd/ip/$IP.rec >/dev/null 2>/dev/null
		[ "$?" = "0" ] || {
			# something went wrong,  try storing this data
			echo Updated record. Store STATD state data for $IP
			ctdb pstore ctdb.tdb statd-state:$IP $CTDB_VARDIR/state/statd/ip/$IP.tar 2>/dev/null
			continue
		}
	done
	;;

  updateremote)
	# For all IPs we dont serve, pull the state from the database
	PNN=`ctdb xpnn | sed -e "s/.*://"`
	ctdb ip -Y | tail -n +2 | while read LINE; do
		NODE=`echo $LINE | cut -f3 -d:`
		[ "$NODE" = "$PNN" ] && {
			continue
		} 
		IP=`echo $LINE | cut -f2 -d:`

		mkdir -p $CTDB_VARDIR/state/statd/ip/$IP

		rm -f $CTDB_VARDIR/state/statd/ip/$IP.rec
		ctdb pfetch ctdb.tdb statd-state:$IP $CTDB_VARDIR/state/statd/ip/$IP.rec 2>/dev/null
		[ "$?" = "0" ] || {
			continue
		}

		rm -f $CTDB_VARDIR/state/statd/ip/$IP/*
		tar xfP $CTDB_VARDIR/state/statd/ip/$IP.rec
	done
	;;

  notify)
	# we must restart the lockmanager (on all nodes) so that we get
	# a clusterwide grace period (so other clients dont take out
	# conflicting locks through other nodes before all locks have been
	# reclaimed)

	# we need these settings to make sure that no tcp connections survive
	# across a very fast failover/failback
	#echo 10 > /proc/sys/net/ipv4/tcp_fin_timeout
	#echo 0 > /proc/sys/net/ipv4/tcp_max_tw_buckets
	#echo 0 > /proc/sys/net/ipv4/tcp_max_orphans

	# Delete the notification list for statd, we dont want it to 
	# ping any clients
	rm -f /var/lib/nfs/statd/sm/*
	rm -f /var/lib/nfs/statd/sm.bak/*

	# we must keep a monotonically increasing state variable for the entire
	# cluster  so state always increases when ip addresses fail from one
	# node to another
	# We use epoch and hope the nodes are close enough in clock.
	# Even numbers mean service is shut down, odd numbers mean
	# service is started.
	STATE=$(( $(date '+%s') / 2 * 2))


	# we must also let some time pass between stopping and restarting the
	# lockmanager since othervise there is a window where the lockmanager
	# will respond "strangely" immediately after restarting it, which
	# causes clients to fail to reclaim the locks.
	# 
	if [ "$NFS_SERVER_MODE" != "ganesha" ] ; then
            startstop_nfslock stop >/dev/null 2>&1
            sleep 2
            startstop_nfslock start >/dev/null 2>&1
	fi

	# we now need to send out additional statd notifications to ensure
	# that clients understand that the lockmanager has restarted.
	# we have three cases:
	# 1, clients that ignore the ip address the stat notification came from
	#    and ONLY care about the 'name' in the notify packet.
	#    these clients ONLY work with lock failover IFF that name
	#    can be resolved into an ipaddress that matches the one used
	#    to mount the share.  (==linux clients)
	#    This is handled when starting lockmanager above,  but those
	#    packets are sent from the "wrong" ip address, something linux
	#    clients are ok with, buth other clients will barf at.
	# 2, Some clients only accept statd packets IFF they come from the
	#    'correct' ip address.
	# 2a,Send out the notification using the 'correct' ip address and also
	#    specify the 'correct' hostname in the statd packet.
	#    Some clients require both the correct source address and also the
	#    correct name. (these clients also ONLY work if the ip addresses
	#    used to map the share can be resolved into the name returned in
	#    the notify packet.)
	# 2b,Other clients require that the source ip address of the notify
	#    packet matches the ip address used to take out the lock.
	#    I.e. that the correct source address is used.
	#    These clients also require that the statd notify packet contains
	#    the name as the ip address used when the lock was taken out.
	#
	# Both 2a and 2b are commonly used in lockmanagers since they maximize
	# probability that the client will accept the statd notify packet and
	# not just ignore it.
	# For all IPs we serve, collect info and push to the config database
	PNN=`ctdb xpnn | sed -e "s/.*://"`
	ctdb ip -Y | tail -n +2 | while read LINE; do
		NODE=`echo $LINE | cut -f3 -d:`
		[ "$NODE" = "$PNN" ] || {
			continue
		} 
		IP=`echo $LINE | cut -f2 -d:`

		ls $CTDB_VARDIR/state/statd/ip/$IP | while read CLIENT; do
			rm $CTDB_VARDIR/state/statd/ip/$IP/$CLIENT
			smnotify --client=$CLIENT --ip=$IP --server=$ip --stateval=$STATE
			smnotify --client=$CLIENT --ip=$IP --server=$NFS_HOSTNAME --stateval=$STATE
			STATE=$(($STATE + 1))
			smnotify --client=$CLIENT --ip=$IP --server=$ip --stateval=$STATE
			smnotify --client=$CLIENT --ip=$IP --server=$NFS_HOSTNAME --stateval=$STATE
		done
	done
	;;
esac