/*
|
* CDDL HEADER START
|
*
|
* The contents of this file are subject to the terms of the
|
* Common Development and Distribution License, Version 1.0 only
|
* (the "License"). You may not use this file except in compliance
|
* with the License.
|
*
|
* You can obtain a copy of the license at
|
* trunk/opends/resource/legal-notices/OpenDS.LICENSE
|
* or https://OpenDS.dev.java.net/OpenDS.LICENSE.
|
* See the License for the specific language governing permissions
|
* and limitations under the License.
|
*
|
* When distributing Covered Code, include this CDDL HEADER in each
|
* file and include the License file at
|
* trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable,
|
* add the following below this CDDL HEADER, with the fields enclosed
|
* by brackets "[]" replaced with your own identifying information:
|
* Portions Copyright [yyyy] [name of copyright owner]
|
*
|
* CDDL HEADER END
|
*
|
*
|
* Portions Copyright 2006-2007 Sun Microsystems, Inc.
|
*/
|
package org.opends.server.tasks;
|
import org.opends.messages.Message;
|
import org.opends.messages.TaskMessages;
|
|
import static org.opends.server.core.DirectoryServer.getAttributeType;
|
import static org.opends.server.config.ConfigConstants.*;
|
import static org.opends.messages.TaskMessages.*;
|
import static org.opends.messages.ToolMessages.*;
|
import static org.opends.server.util.StaticUtils.*;
|
import static org.opends.server.loggers.debug.DebugLogger.*;
|
import org.opends.server.loggers.debug.DebugTracer;
|
import org.opends.server.types.DebugLogLevel;
|
|
import org.opends.server.backends.task.Task;
|
import org.opends.server.backends.task.TaskState;
|
import org.opends.server.core.DirectoryServer;
|
import org.opends.server.core.LockFileManager;
|
import org.opends.server.api.Backend;
|
import org.opends.server.api.ClientConnection;
|
import org.opends.server.config.ConfigEntry;
|
import org.opends.server.config.ConfigException;
|
import org.opends.server.types.Attribute;
|
import org.opends.server.types.AttributeType;
|
import org.opends.server.types.BackupDirectory;
|
import org.opends.server.types.BackupInfo;
|
import org.opends.server.types.DirectoryException;
|
import org.opends.server.types.DN;
|
import org.opends.server.types.Entry;
|
|
|
import org.opends.server.types.Operation;
|
import org.opends.server.types.Privilege;
|
import org.opends.server.types.RestoreConfig;
|
import org.opends.server.types.ResultCode;
|
|
import java.util.List;
|
import java.util.Map;
|
import java.util.HashMap;
|
import java.io.File;
|
|
/**
|
* This class provides an implementation of a Directory Server task that can
|
* be used to restore a binary backup of a Directory Server backend.
|
*/
|
public class RestoreTask extends Task
|
{
|
/**
|
* The tracer object for the debug logger.
|
*/
|
private static final DebugTracer TRACER = getTracer();
|
|
|
/**
|
* Stores mapping between configuration attribute name and its label.
|
*/
|
static private Map<String,Message> argDisplayMap =
|
new HashMap<String,Message>();
|
static {
|
argDisplayMap.put(
|
ATTR_BACKUP_DIRECTORY_PATH,
|
INFO_RESTORE_ARG_BACKUP_DIR.get());
|
|
argDisplayMap.put(
|
ATTR_BACKUP_ID,
|
INFO_RESTORE_ARG_BACKUP_ID.get());
|
|
argDisplayMap.put(
|
ATTR_TASK_RESTORE_VERIFY_ONLY,
|
INFO_RESTORE_ARG_VERIFY_ONLY.get());
|
}
|
|
|
// The task arguments.
|
private File backupDirectory;
|
private String backupID;
|
private boolean verifyOnly;
|
|
private RestoreConfig restoreConfig;
|
|
/**
|
* {@inheritDoc}
|
*/
|
public Message getDisplayName() {
|
return INFO_TASK_RESTORE_NAME.get();
|
}
|
|
/**
|
* {@inheritDoc}
|
*/
|
public Message getAttributeDisplayName(String name) {
|
return argDisplayMap.get(name);
|
}
|
|
/**
|
* {@inheritDoc}
|
*/
|
@Override public void initializeTask() throws DirectoryException
|
{
|
// If the client connection is available, then make sure the associated
|
// client has the BACKEND_RESTORE privilege.
|
Operation operation = getOperation();
|
if (operation != null)
|
{
|
ClientConnection clientConnection = operation.getClientConnection();
|
if (! clientConnection.hasPrivilege(Privilege.BACKEND_RESTORE, operation))
|
{
|
Message message = ERR_TASK_RESTORE_INSUFFICIENT_PRIVILEGES.get();
|
throw new DirectoryException(ResultCode.INSUFFICIENT_ACCESS_RIGHTS,
|
message);
|
}
|
}
|
|
|
Entry taskEntry = getTaskEntry();
|
|
AttributeType typeBackupDirectory;
|
AttributeType typebackupID;
|
AttributeType typeVerifyOnly;
|
|
|
typeBackupDirectory = getAttributeType(ATTR_BACKUP_DIRECTORY_PATH, true);
|
typebackupID = getAttributeType(ATTR_BACKUP_ID, true);
|
typeVerifyOnly = getAttributeType(ATTR_TASK_RESTORE_VERIFY_ONLY, true);
|
|
List<Attribute> attrList;
|
|
attrList = taskEntry.getAttribute(typeBackupDirectory);
|
String backupDirectoryPath = TaskUtils.getSingleValueString(attrList);
|
backupDirectory = new File(backupDirectoryPath);
|
if (! backupDirectory.isAbsolute())
|
{
|
backupDirectory =
|
new File(DirectoryServer.getServerRoot(), backupDirectoryPath);
|
}
|
|
attrList = taskEntry.getAttribute(typebackupID);
|
backupID = TaskUtils.getSingleValueString(attrList);
|
|
attrList = taskEntry.getAttribute(typeVerifyOnly);
|
verifyOnly = TaskUtils.getBoolean(attrList, false);
|
|
}
|
|
/**
|
* Acquire an exclusive lock on a backend.
|
* @param backend The backend on which the lock is to be acquired.
|
* @return true if the lock was successfully acquired.
|
*/
|
private boolean lockBackend(Backend backend)
|
{
|
try
|
{
|
String lockFile = LockFileManager.getBackendLockFileName(backend);
|
StringBuilder failureReason = new StringBuilder();
|
if (! LockFileManager.acquireExclusiveLock(lockFile, failureReason))
|
{
|
Message message = ERR_RESTOREDB_CANNOT_LOCK_BACKEND.get(
|
backend.getBackendID(), String.valueOf(failureReason));
|
logError(message);
|
return false;
|
}
|
}
|
catch (Exception e)
|
{
|
Message message = ERR_RESTOREDB_CANNOT_LOCK_BACKEND.get(
|
backend.getBackendID(), getExceptionMessage(e));
|
logError(message);
|
return false;
|
}
|
return true;
|
}
|
|
/**
|
* Release a lock on a backend.
|
* @param backend The backend on which the lock is held.
|
* @return true if the lock was successfully released.
|
*/
|
private boolean unlockBackend(Backend backend)
|
{
|
try
|
{
|
String lockFile = LockFileManager.getBackendLockFileName(backend);
|
StringBuilder failureReason = new StringBuilder();
|
if (! LockFileManager.releaseLock(lockFile, failureReason))
|
{
|
Message message = WARN_RESTOREDB_CANNOT_UNLOCK_BACKEND.get(
|
backend.getBackendID(), String.valueOf(failureReason));
|
logError(message);
|
return false;
|
}
|
}
|
catch (Exception e)
|
{
|
Message message = WARN_RESTOREDB_CANNOT_UNLOCK_BACKEND.get(
|
backend.getBackendID(), getExceptionMessage(e));
|
logError(message);
|
return false;
|
}
|
return true;
|
}
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public void interruptTask(TaskState interruptState, Message interruptReason)
|
{
|
if (TaskState.STOPPED_BY_ADMINISTRATOR.equals(interruptState) &&
|
restoreConfig != null)
|
{
|
addLogMessage(TaskMessages.INFO_TASK_STOPPED_BY_ADMIN.get(
|
interruptReason));
|
setTaskInterruptState(interruptState);
|
restoreConfig.cancel();
|
}
|
}
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public boolean isInterruptable() {
|
return true;
|
}
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
protected TaskState runTask()
|
{
|
// Open the backup directory and make sure it is valid.
|
BackupDirectory backupDir;
|
try
|
{
|
backupDir = BackupDirectory.readBackupDirectoryDescriptor(
|
backupDirectory.getPath());
|
}
|
catch (Exception e)
|
{
|
Message message = ERR_RESTOREDB_CANNOT_READ_BACKUP_DIRECTORY.get(
|
String.valueOf(backupDirectory), getExceptionMessage(e));
|
logError(message);
|
return TaskState.STOPPED_BY_ERROR;
|
}
|
|
|
// If a backup ID was specified, then make sure it is valid. If none was
|
// provided, then choose the latest backup from the archive.
|
if (backupID != null)
|
{
|
BackupInfo backupInfo = backupDir.getBackupInfo(backupID);
|
if (backupInfo == null)
|
{
|
Message message =
|
ERR_RESTOREDB_INVALID_BACKUP_ID.get(
|
backupID, String.valueOf(backupDirectory));
|
logError(message);
|
return TaskState.STOPPED_BY_ERROR;
|
}
|
}
|
else
|
{
|
BackupInfo latestBackup = backupDir.getLatestBackup();
|
if (latestBackup == null)
|
{
|
Message message =
|
ERR_RESTOREDB_NO_BACKUPS_IN_DIRECTORY.get(
|
String.valueOf(backupDirectory));
|
logError(message);
|
return TaskState.STOPPED_BY_ERROR;
|
}
|
else
|
{
|
backupID = latestBackup.getBackupID();
|
}
|
}
|
|
// Get the DN of the backend configuration entry from the backup.
|
DN configEntryDN = backupDir.getConfigEntryDN();
|
|
ConfigEntry configEntry;
|
try
|
{
|
// Get the backend configuration entry.
|
configEntry = DirectoryServer.getConfigEntry(configEntryDN);
|
}
|
catch (ConfigException e)
|
{
|
if (debugEnabled())
|
{
|
TRACER.debugCaught(DebugLogLevel.ERROR, e);
|
}
|
Message message = ERR_RESTOREDB_NO_BACKENDS_FOR_DN.get(
|
String.valueOf(backupDirectory), configEntryDN.toString());
|
logError(message);
|
return TaskState.STOPPED_BY_ERROR;
|
}
|
|
// Get the backend ID from the configuration entry.
|
String backendID = TaskUtils.getBackendID(configEntry);
|
|
// Get the backend.
|
Backend backend = DirectoryServer.getBackend(backendID);
|
|
if (! backend.supportsRestore())
|
{
|
Message message =
|
ERR_RESTOREDB_CANNOT_RESTORE.get(backend.getBackendID());
|
logError(message);
|
return TaskState.STOPPED_BY_ERROR;
|
}
|
|
// Create the restore config object from the information available.
|
restoreConfig = new RestoreConfig(backupDir, backupID, verifyOnly);
|
|
// Notify the task listeners that a restore is going to start
|
// this must be done before disabling the backend to allow
|
// listener to get access to the backend configuration
|
// and to take appropriate actions.
|
DirectoryServer.notifyRestoreBeginning(backend, restoreConfig);
|
|
// Disable the backend.
|
try
|
{
|
TaskUtils.disableBackend(backendID);
|
}
|
catch (DirectoryException e)
|
{
|
if (debugEnabled())
|
{
|
TRACER.debugCaught(DebugLogLevel.ERROR, e);
|
}
|
|
logError(e.getMessageObject());
|
return TaskState.STOPPED_BY_ERROR;
|
}
|
|
// From here we must make sure to re-enable the backend before returning.
|
boolean errorsEncountered = false;
|
try
|
{
|
// Acquire an exclusive lock for the backend.
|
if (lockBackend(backend))
|
{
|
// From here we must make sure to release the backend exclusive lock.
|
try
|
{
|
// Perform the restore.
|
try
|
{
|
backend.restoreBackup(restoreConfig);
|
}
|
catch (DirectoryException de)
|
{
|
DirectoryServer.notifyRestoreEnded(backend, restoreConfig, false);
|
Message message = ERR_RESTOREDB_ERROR_DURING_BACKUP.get(
|
backupID, backupDir.getPath(), de.getMessageObject());
|
logError(message);
|
errorsEncountered = true;
|
}
|
catch (Exception e)
|
{
|
DirectoryServer.notifyRestoreEnded(backend, restoreConfig, false);
|
Message message = ERR_RESTOREDB_ERROR_DURING_BACKUP.get(
|
backupID, backupDir.getPath(), getExceptionMessage(e));
|
logError(message);
|
errorsEncountered = true;
|
}
|
}
|
finally
|
{
|
// Release the exclusive lock on the backend.
|
if (!unlockBackend(backend))
|
{
|
errorsEncountered = true;
|
}
|
}
|
}
|
}
|
finally
|
{
|
// Enable the backend.
|
try
|
{
|
TaskUtils.enableBackend(backendID);
|
// it is necessary to retrieve the backend structure again
|
// because disabling and enabling it again may have resulted
|
// in a new backend being registered to the server.
|
backend = DirectoryServer.getBackend(backendID);
|
}
|
catch (DirectoryException e)
|
{
|
if (debugEnabled())
|
{
|
TRACER.debugCaught(DebugLogLevel.ERROR, e);
|
}
|
|
logError(e.getMessageObject());
|
errorsEncountered = true;
|
}
|
DirectoryServer.notifyRestoreEnded(backend, restoreConfig, true);
|
}
|
|
if (errorsEncountered)
|
{
|
return TaskState.COMPLETED_WITH_ERRORS;
|
}
|
else
|
{
|
return getFinalTaskState();
|
}
|
}
|
}
|