2004-12-14 00:00:12 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
2016-05-04 09:11:18 +02:00
|
|
|
%%% File : ejabberd_sql.erl
|
2007-12-24 14:57:53 +01:00
|
|
|
%%% Author : Alexey Shchepin <alexey@process-one.net>
|
2016-05-04 09:11:18 +02:00
|
|
|
%%% Purpose : Serve SQL connection
|
2007-12-24 14:57:53 +01:00
|
|
|
%%% Created : 8 Dec 2004 by Alexey Shchepin <alexey@process-one.net>
|
|
|
|
%%%
|
|
|
|
%%%
|
2023-01-09 17:09:06 +01:00
|
|
|
%%% ejabberd, Copyright (C) 2002-2023 ProcessOne
|
2007-12-24 14:57:53 +01:00
|
|
|
%%%
|
|
|
|
%%% This program is free software; you can redistribute it and/or
|
|
|
|
%%% modify it under the terms of the GNU General Public License as
|
|
|
|
%%% published by the Free Software Foundation; either version 2 of the
|
|
|
|
%%% License, or (at your option) any later version.
|
|
|
|
%%%
|
|
|
|
%%% This program is distributed in the hope that it will be useful,
|
|
|
|
%%% but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
%%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
%%% General Public License for more details.
|
2008-08-04 15:41:16 +02:00
|
|
|
%%%
|
2014-02-22 11:27:40 +01:00
|
|
|
%%% You should have received a copy of the GNU General Public License along
|
|
|
|
%%% with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
%%% 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
2007-12-24 14:57:53 +01:00
|
|
|
%%%
|
2004-12-14 00:00:12 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
|
2016-04-20 11:27:32 +02:00
|
|
|
-module(ejabberd_sql).
|
2013-03-14 10:33:02 +01:00
|
|
|
|
2007-12-24 14:57:53 +01:00
|
|
|
-author('alexey@process-one.net').
|
2004-12-14 00:00:12 +01:00
|
|
|
|
2017-08-05 19:58:21 +02:00
|
|
|
-behaviour(p1_fsm).
|
2004-12-14 00:00:12 +01:00
|
|
|
|
|
|
|
%% External exports
|
2019-07-24 13:28:43 +02:00
|
|
|
-export([start_link/2,
|
2005-07-13 05:24:13 +02:00
|
|
|
sql_query/2,
|
2005-11-16 03:59:05 +01:00
|
|
|
sql_query_t/1,
|
|
|
|
sql_transaction/2,
|
2009-04-24 12:27:31 +02:00
|
|
|
sql_bloc/2,
|
2018-12-05 13:11:52 +01:00
|
|
|
abort/1,
|
|
|
|
restart/1,
|
|
|
|
use_new_schema/0,
|
|
|
|
sql_query_to_iolist/1,
|
2021-05-10 17:25:55 +02:00
|
|
|
sql_query_to_iolist/2,
|
2006-01-13 11:59:52 +01:00
|
|
|
escape/1,
|
2018-12-05 13:11:52 +01:00
|
|
|
standard_escape/1,
|
2007-08-16 18:37:00 +02:00
|
|
|
escape_like/1,
|
2016-02-25 18:31:58 +01:00
|
|
|
escape_like_arg/1,
|
2016-05-12 17:32:13 +02:00
|
|
|
escape_like_arg_circumflex/1,
|
2019-12-11 15:48:53 +01:00
|
|
|
to_string_literal/2,
|
2019-12-16 04:52:06 +01:00
|
|
|
to_string_literal_t/1,
|
2010-07-14 13:23:21 +02:00
|
|
|
to_bool/1,
|
2015-04-08 14:31:28 +02:00
|
|
|
sqlite_db/1,
|
|
|
|
sqlite_file/1,
|
2015-10-07 00:06:58 +02:00
|
|
|
encode_term/1,
|
|
|
|
decode_term/1,
|
2015-09-13 16:41:54 +02:00
|
|
|
odbcinst_config/0,
|
2020-10-08 16:23:34 +02:00
|
|
|
init_mssql/1,
|
2018-12-05 13:11:52 +01:00
|
|
|
keep_alive/2,
|
2019-04-23 17:46:14 +02:00
|
|
|
to_list/2,
|
|
|
|
to_array/2]).
|
2004-12-14 00:00:12 +01:00
|
|
|
|
2010-01-31 12:41:28 +01:00
|
|
|
%% gen_fsm callbacks
|
2013-03-14 10:33:02 +01:00
|
|
|
-export([init/1, handle_event/3, handle_sync_event/4,
|
|
|
|
handle_info/3, terminate/3, print_state/1,
|
2010-01-31 12:41:28 +01:00
|
|
|
code_change/4]).
|
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
-export([connecting/2, connecting/3,
|
2019-06-14 11:33:26 +02:00
|
|
|
session_established/2, session_established/3]).
|
2004-12-14 00:00:12 +01:00
|
|
|
|
2013-04-08 11:12:54 +02:00
|
|
|
-include("logger.hrl").
|
2016-02-09 17:23:15 +01:00
|
|
|
-include("ejabberd_sql_pt.hrl").
|
2018-12-13 11:45:45 +01:00
|
|
|
-include("ejabberd_stacktrace.hrl").
|
2005-12-22 10:40:21 +01:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
-record(state,
|
2019-07-31 09:39:53 +02:00
|
|
|
{db_ref :: undefined | pid(),
|
|
|
|
db_type = odbc :: pgsql | mysql | sqlite | odbc | mssql,
|
|
|
|
db_version :: undefined | non_neg_integer(),
|
2022-07-19 14:32:47 +02:00
|
|
|
reconnect_count = 0 :: non_neg_integer(),
|
2019-07-31 09:39:53 +02:00
|
|
|
host :: binary(),
|
|
|
|
pending_requests :: p1_queue:queue(),
|
|
|
|
overload_reported :: undefined | integer()}).
|
2004-12-14 00:00:12 +01:00
|
|
|
|
2016-04-20 11:27:32 +02:00
|
|
|
-define(STATE_KEY, ejabberd_sql_state).
|
|
|
|
-define(NESTING_KEY, ejabberd_sql_nesting_level).
|
2009-07-28 15:46:28 +02:00
|
|
|
-define(TOP_LEVEL_TXN, 0).
|
2013-08-12 14:25:05 +02:00
|
|
|
-define(MAX_TRANSACTION_RESTARTS, 10).
|
2015-10-15 10:07:06 +02:00
|
|
|
-define(KEEPALIVE_QUERY, [<<"SELECT 1;">>]).
|
2016-04-20 11:27:32 +02:00
|
|
|
-define(PREPARE_KEY, ejabberd_sql_prepare).
|
2010-01-31 12:41:28 +01:00
|
|
|
%%-define(DBGFSM, true).
|
|
|
|
-ifdef(DBGFSM).
|
|
|
|
-define(FSMOPTS, [{debug, [trace]}]).
|
|
|
|
-else.
|
|
|
|
-define(FSMOPTS, []).
|
|
|
|
-endif.
|
|
|
|
|
2019-07-31 09:39:53 +02:00
|
|
|
-type state() :: #state{}.
|
2019-06-14 11:33:26 +02:00
|
|
|
-type sql_query_simple() :: [sql_query() | binary()] | #sql_query{} |
|
|
|
|
fun(() -> any()) | fun((atom(), _) -> any()).
|
|
|
|
-type sql_query() :: sql_query_simple() |
|
|
|
|
[{atom() | {atom(), any()}, sql_query_simple()}].
|
2013-03-14 10:33:02 +01:00
|
|
|
-type sql_query_result() :: {updated, non_neg_integer()} |
|
2019-07-04 08:27:51 +02:00
|
|
|
{error, binary() | atom()} |
|
2019-06-14 11:33:26 +02:00
|
|
|
{selected, [binary()], [[binary()]]} |
|
|
|
|
{selected, [any()]} |
|
|
|
|
ok.
|
2013-03-14 10:33:02 +01:00
|
|
|
|
2019-07-31 09:39:53 +02:00
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
%%% API
|
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
-spec start_link(binary(), pos_integer()) -> {ok, pid()} | {error, term()}.
|
|
|
|
start_link(Host, I) ->
|
|
|
|
Proc = binary_to_atom(get_worker_name(Host, I), utf8),
|
|
|
|
p1_fsm:start_link({local, Proc}, ?MODULE, [Host],
|
|
|
|
fsm_limit_opts() ++ ?FSMOPTS).
|
2004-12-14 00:00:12 +01:00
|
|
|
|
2019-07-31 09:39:53 +02:00
|
|
|
-spec sql_query(binary(), sql_query()) -> sql_query_result().
|
2005-07-13 05:24:13 +02:00
|
|
|
sql_query(Host, Query) ->
|
2018-09-25 16:59:49 +02:00
|
|
|
sql_call(Host, {sql_query, Query}).
|
2004-12-14 00:00:12 +01:00
|
|
|
|
2005-12-21 17:10:56 +01:00
|
|
|
%% SQL transaction based on a list of queries
|
2007-08-16 18:37:00 +02:00
|
|
|
%% This function automatically
|
2013-03-14 10:33:02 +01:00
|
|
|
-spec sql_transaction(binary(), [sql_query()] | fun(() -> any())) ->
|
|
|
|
{atomic, any()} |
|
|
|
|
{aborted, any()}.
|
|
|
|
sql_transaction(Host, Queries)
|
|
|
|
when is_list(Queries) ->
|
|
|
|
F = fun () ->
|
|
|
|
lists:foreach(fun (Query) -> sql_query_t(Query) end,
|
2005-12-21 17:10:56 +01:00
|
|
|
Queries)
|
|
|
|
end,
|
|
|
|
sql_transaction(Host, F);
|
|
|
|
%% SQL transaction, based on a erlang anonymous function (F = fun)
|
2009-07-28 15:46:28 +02:00
|
|
|
sql_transaction(Host, F) when is_function(F) ->
|
2019-07-04 08:27:51 +02:00
|
|
|
case sql_call(Host, {sql_transaction, F}) of
|
|
|
|
{atomic, _} = Ret -> Ret;
|
|
|
|
{aborted, _} = Ret -> Ret;
|
|
|
|
Err -> {aborted, Err}
|
|
|
|
end.
|
2005-11-16 03:59:05 +01:00
|
|
|
|
2009-04-24 12:27:31 +02:00
|
|
|
%% SQL bloc, based on a erlang anonymous function (F = fun)
|
2013-03-14 10:33:02 +01:00
|
|
|
sql_bloc(Host, F) -> sql_call(Host, {sql_bloc, F}).
|
2009-05-21 18:19:33 +02:00
|
|
|
|
|
|
|
sql_call(Host, Msg) ->
|
2019-07-31 09:39:53 +02:00
|
|
|
Timeout = query_timeout(Host),
|
2009-05-21 18:19:33 +02:00
|
|
|
case get(?STATE_KEY) of
|
2019-07-24 13:28:43 +02:00
|
|
|
undefined ->
|
2019-08-12 11:21:31 +02:00
|
|
|
sync_send_event(Host,
|
|
|
|
{sql_cmd, Msg, current_time() + Timeout},
|
2019-07-31 09:39:53 +02:00
|
|
|
Timeout);
|
2019-07-24 13:28:43 +02:00
|
|
|
_State ->
|
|
|
|
nested_op(Msg)
|
2009-05-21 18:19:33 +02:00
|
|
|
end.
|
|
|
|
|
2019-07-24 13:28:43 +02:00
|
|
|
keep_alive(Host, Proc) ->
|
2019-07-31 09:39:53 +02:00
|
|
|
Timeout = query_timeout(Host),
|
|
|
|
case sync_send_event(
|
|
|
|
Proc,
|
|
|
|
{sql_cmd, {sql_query, ?KEEPALIVE_QUERY}, current_time() + Timeout},
|
|
|
|
Timeout) of
|
2018-11-21 18:06:32 +01:00
|
|
|
{selected,_,[[<<"1">>]]} ->
|
2018-09-25 16:59:49 +02:00
|
|
|
ok;
|
|
|
|
_Err ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?ERROR_MSG("Keep alive query failed, closing connection: ~p", [_Err]),
|
2019-07-31 09:39:53 +02:00
|
|
|
sync_send_event(Proc, force_timeout, Timeout)
|
2018-09-25 16:59:49 +02:00
|
|
|
end.
|
2017-12-17 17:46:55 +01:00
|
|
|
|
2019-08-12 11:21:31 +02:00
|
|
|
sync_send_event(Host, Msg, Timeout) when is_binary(Host) ->
|
|
|
|
case ejabberd_sql_sup:start(Host) of
|
|
|
|
ok ->
|
|
|
|
Proc = get_worker(Host),
|
|
|
|
sync_send_event(Proc, Msg, Timeout);
|
|
|
|
{error, _} = Err ->
|
|
|
|
Err
|
|
|
|
end;
|
2019-07-24 13:28:43 +02:00
|
|
|
sync_send_event(Proc, Msg, Timeout) ->
|
|
|
|
try p1_fsm:sync_send_event(Proc, Msg, Timeout)
|
2017-12-17 17:46:55 +01:00
|
|
|
catch _:{Reason, {p1_fsm, _, _}} ->
|
|
|
|
{error, Reason}
|
|
|
|
end.
|
2013-03-14 10:33:02 +01:00
|
|
|
|
|
|
|
-spec sql_query_t(sql_query()) -> sql_query_result().
|
2005-12-21 17:10:56 +01:00
|
|
|
%% This function is intended to be used from inside an sql_transaction:
|
2005-11-16 03:59:05 +01:00
|
|
|
sql_query_t(Query) ->
|
2009-07-28 15:46:28 +02:00
|
|
|
QRes = sql_query_internal(Query),
|
2005-11-16 03:59:05 +01:00
|
|
|
case QRes of
|
2019-07-31 09:39:53 +02:00
|
|
|
{error, Reason} -> restart(Reason);
|
2013-03-14 10:33:02 +01:00
|
|
|
Rs when is_list(Rs) ->
|
|
|
|
case lists:keysearch(error, 1, Rs) of
|
2019-07-31 09:39:53 +02:00
|
|
|
{value, {error, Reason}} -> restart(Reason);
|
2013-03-14 10:33:02 +01:00
|
|
|
_ -> QRes
|
|
|
|
end;
|
|
|
|
_ -> QRes
|
2005-11-16 03:59:05 +01:00
|
|
|
end.
|
|
|
|
|
2017-03-31 16:37:18 +02:00
|
|
|
abort(Reason) ->
|
|
|
|
exit(Reason).
|
|
|
|
|
|
|
|
restart(Reason) ->
|
|
|
|
throw({aborted, Reason}).
|
|
|
|
|
2017-05-23 11:25:13 +02:00
|
|
|
-spec escape_char(char()) -> binary().
|
|
|
|
escape_char($\000) -> <<"\\0">>;
|
|
|
|
escape_char($\n) -> <<"\\n">>;
|
|
|
|
escape_char($\t) -> <<"\\t">>;
|
|
|
|
escape_char($\b) -> <<"\\b">>;
|
|
|
|
escape_char($\r) -> <<"\\r">>;
|
|
|
|
escape_char($') -> <<"''">>;
|
|
|
|
escape_char($") -> <<"\\\"">>;
|
|
|
|
escape_char($\\) -> <<"\\\\">>;
|
|
|
|
escape_char(C) -> <<C>>.
|
|
|
|
|
|
|
|
-spec escape(binary()) -> binary().
|
2013-03-14 10:33:02 +01:00
|
|
|
escape(S) ->
|
2017-05-23 11:25:13 +02:00
|
|
|
<< <<(escape_char(Char))/binary>> || <<Char>> <= S >>.
|
2006-01-13 11:59:52 +01:00
|
|
|
|
|
|
|
%% Escape character that will confuse an SQL engine
|
|
|
|
%% Percent and underscore only need to be escaped for pattern matching like
|
|
|
|
%% statement
|
2013-03-14 10:33:02 +01:00
|
|
|
escape_like(S) when is_binary(S) ->
|
|
|
|
<< <<(escape_like(C))/binary>> || <<C>> <= S >>;
|
|
|
|
escape_like($%) -> <<"\\%">>;
|
|
|
|
escape_like($_) -> <<"\\_">>;
|
2016-05-12 17:32:13 +02:00
|
|
|
escape_like($\\) -> <<"\\\\\\\\">>;
|
2017-05-23 11:25:13 +02:00
|
|
|
escape_like(C) when is_integer(C), C >= 0, C =< 255 -> escape_char(C).
|
2013-03-14 10:33:02 +01:00
|
|
|
|
2016-02-25 18:31:58 +01:00
|
|
|
escape_like_arg(S) when is_binary(S) ->
|
|
|
|
<< <<(escape_like_arg(C))/binary>> || <<C>> <= S >>;
|
|
|
|
escape_like_arg($%) -> <<"\\%">>;
|
|
|
|
escape_like_arg($_) -> <<"\\_">>;
|
|
|
|
escape_like_arg($\\) -> <<"\\\\">>;
|
2020-01-13 01:36:52 +01:00
|
|
|
escape_like_arg($[) -> <<"\\[">>; % For MSSQL
|
|
|
|
escape_like_arg($]) -> <<"\\]">>;
|
2016-02-25 18:31:58 +01:00
|
|
|
escape_like_arg(C) when is_integer(C), C >= 0, C =< 255 -> <<C>>.
|
|
|
|
|
2016-05-12 17:32:13 +02:00
|
|
|
escape_like_arg_circumflex(S) when is_binary(S) ->
|
|
|
|
<< <<(escape_like_arg_circumflex(C))/binary>> || <<C>> <= S >>;
|
|
|
|
escape_like_arg_circumflex($%) -> <<"^%">>;
|
|
|
|
escape_like_arg_circumflex($_) -> <<"^_">>;
|
|
|
|
escape_like_arg_circumflex($^) -> <<"^^">>;
|
2016-05-24 17:44:07 +02:00
|
|
|
escape_like_arg_circumflex($[) -> <<"^[">>; % For MSSQL
|
|
|
|
escape_like_arg_circumflex($]) -> <<"^]">>;
|
2016-05-12 17:32:13 +02:00
|
|
|
escape_like_arg_circumflex(C) when is_integer(C), C >= 0, C =< 255 -> <<C>>.
|
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
to_bool(<<"t">>) -> true;
|
|
|
|
to_bool(<<"true">>) -> true;
|
|
|
|
to_bool(<<"1">>) -> true;
|
2010-07-14 13:23:21 +02:00
|
|
|
to_bool(true) -> true;
|
|
|
|
to_bool(1) -> true;
|
|
|
|
to_bool(_) -> false.
|
2004-12-14 00:00:12 +01:00
|
|
|
|
2018-12-05 13:11:52 +01:00
|
|
|
to_list(EscapeFun, Val) ->
|
|
|
|
Escaped = lists:join(<<",">>, lists:map(EscapeFun, Val)),
|
|
|
|
[<<"(">>, Escaped, <<")">>].
|
|
|
|
|
2019-04-23 17:46:14 +02:00
|
|
|
to_array(EscapeFun, Val) ->
|
|
|
|
Escaped = lists:join(<<",">>, lists:map(EscapeFun, Val)),
|
2020-02-27 11:09:44 +01:00
|
|
|
lists:flatten([<<"{">>, Escaped, <<"}">>]).
|
2019-04-23 17:46:14 +02:00
|
|
|
|
2019-12-11 15:48:53 +01:00
|
|
|
to_string_literal(odbc, S) ->
|
|
|
|
<<"'", (escape(S))/binary, "'">>;
|
|
|
|
to_string_literal(mysql, S) ->
|
|
|
|
<<"'", (escape(S))/binary, "'">>;
|
|
|
|
to_string_literal(mssql, S) ->
|
|
|
|
<<"'", (standard_escape(S))/binary, "'">>;
|
|
|
|
to_string_literal(sqlite, S) ->
|
|
|
|
<<"'", (standard_escape(S))/binary, "'">>;
|
|
|
|
to_string_literal(pgsql, S) ->
|
|
|
|
<<"E'", (escape(S))/binary, "'">>.
|
|
|
|
|
2019-12-16 04:52:06 +01:00
|
|
|
to_string_literal_t(S) ->
|
|
|
|
State = get(?STATE_KEY),
|
|
|
|
to_string_literal(State#state.db_type, S).
|
|
|
|
|
2012-04-06 04:31:29 +02:00
|
|
|
encode_term(Term) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
escape(list_to_binary(
|
2015-05-17 19:15:52 +02:00
|
|
|
erl_prettypr:format(erl_syntax:abstract(Term),
|
|
|
|
[{paper, 65535}, {ribbon, 65535}]))).
|
2012-04-06 04:31:29 +02:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
decode_term(Bin) ->
|
|
|
|
Str = binary_to_list(<<Bin/binary, ".">>),
|
2019-05-19 10:22:41 +02:00
|
|
|
try
|
|
|
|
{ok, Tokens, _} = erl_scan:string(Str),
|
|
|
|
{ok, Term} = erl_parse:parse_term(Tokens),
|
|
|
|
Term
|
|
|
|
catch _:{badmatch, {error, {Line, Mod, Reason}, _}} ->
|
|
|
|
?ERROR_MSG("Corrupted Erlang term in SQL database:~n"
|
2019-09-23 14:17:20 +02:00
|
|
|
"** Scanner error: at line ~B: ~ts~n"
|
|
|
|
"** Term: ~ts",
|
2019-05-19 10:22:41 +02:00
|
|
|
[Line, Mod:format_error(Reason), Bin]),
|
|
|
|
erlang:error(badarg);
|
|
|
|
_:{badmatch, {error, {Line, Mod, Reason}}} ->
|
|
|
|
?ERROR_MSG("Corrupted Erlang term in SQL database:~n"
|
2019-09-23 14:17:20 +02:00
|
|
|
"** Parser error: at line ~B: ~ts~n"
|
|
|
|
"** Term: ~ts",
|
2019-05-19 10:22:41 +02:00
|
|
|
[Line, Mod:format_error(Reason), Bin]),
|
|
|
|
erlang:error(badarg)
|
|
|
|
end.
|
2012-04-06 04:31:29 +02:00
|
|
|
|
2015-04-08 14:31:28 +02:00
|
|
|
-spec sqlite_db(binary()) -> atom().
|
|
|
|
sqlite_db(Host) ->
|
|
|
|
list_to_atom("ejabberd_sqlite_" ++ binary_to_list(Host)).
|
|
|
|
|
|
|
|
-spec sqlite_file(binary()) -> string().
|
|
|
|
sqlite_file(Host) ->
|
2019-06-14 11:33:26 +02:00
|
|
|
case ejabberd_option:sql_database(Host) of
|
2015-04-08 14:31:28 +02:00
|
|
|
undefined ->
|
2019-06-14 11:33:26 +02:00
|
|
|
Path = ["sqlite", atom_to_list(node()),
|
|
|
|
binary_to_list(Host), "ejabberd.db"],
|
|
|
|
case file:get_cwd() of
|
|
|
|
{ok, Cwd} ->
|
|
|
|
filename:join([Cwd|Path]);
|
|
|
|
{error, Reason} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?ERROR_MSG("Failed to get current directory: ~ts",
|
2019-06-14 11:33:26 +02:00
|
|
|
[file:format_error(Reason)]),
|
|
|
|
filename:join(Path)
|
|
|
|
end;
|
2015-04-08 14:31:28 +02:00
|
|
|
File ->
|
|
|
|
binary_to_list(File)
|
|
|
|
end.
|
|
|
|
|
2018-03-15 15:55:05 +01:00
|
|
|
use_new_schema() ->
|
2019-06-14 11:33:26 +02:00
|
|
|
ejabberd_option:new_sql_schema().
|
2018-03-15 15:55:05 +01:00
|
|
|
|
2019-07-24 13:28:43 +02:00
|
|
|
-spec get_worker(binary()) -> atom().
|
|
|
|
get_worker(Host) ->
|
|
|
|
PoolSize = ejabberd_option:sql_pool_size(Host),
|
|
|
|
I = p1_rand:round_robin(PoolSize) + 1,
|
|
|
|
binary_to_existing_atom(get_worker_name(Host, I), utf8).
|
|
|
|
|
|
|
|
-spec get_worker_name(binary(), pos_integer()) -> binary().
|
|
|
|
get_worker_name(Host, I) ->
|
|
|
|
<<"ejabberd_sql_", Host/binary, $_, (integer_to_binary(I))/binary>>.
|
|
|
|
|
2004-12-14 00:00:12 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
2010-01-31 12:41:28 +01:00
|
|
|
%%% Callback functions from gen_fsm
|
2004-12-14 00:00:12 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
2019-07-24 13:28:43 +02:00
|
|
|
init([Host]) ->
|
2017-12-17 17:46:55 +01:00
|
|
|
process_flag(trap_exit, true),
|
2019-06-14 11:33:26 +02:00
|
|
|
case ejabberd_option:sql_keepalive_interval(Host) of
|
2013-03-14 10:33:02 +01:00
|
|
|
undefined ->
|
|
|
|
ok;
|
|
|
|
KeepaliveInterval ->
|
2019-06-14 11:33:26 +02:00
|
|
|
timer:apply_interval(KeepaliveInterval, ?MODULE,
|
2017-05-05 12:20:28 +02:00
|
|
|
keep_alive, [Host, self()])
|
2007-08-16 18:37:00 +02:00
|
|
|
end,
|
2010-01-31 12:41:28 +01:00
|
|
|
[DBType | _] = db_opts(Host),
|
2017-08-05 19:58:21 +02:00
|
|
|
p1_fsm:send_event(self(), connect),
|
2019-06-14 11:33:26 +02:00
|
|
|
QueueType = ejabberd_option:sql_queue_type(Host),
|
2013-03-14 10:33:02 +01:00
|
|
|
{ok, connecting,
|
|
|
|
#state{db_type = DBType, host = Host,
|
2019-07-24 13:28:43 +02:00
|
|
|
pending_requests = p1_queue:new(QueueType, max_fsm_queue())}}.
|
2010-01-31 12:41:28 +01:00
|
|
|
|
|
|
|
connecting(connect, #state{host = Host} = State) ->
|
|
|
|
ConnectRes = case db_opts(Host) of
|
2020-10-08 16:23:34 +02:00
|
|
|
[mysql | Args] -> apply(fun mysql_connect/8, Args);
|
|
|
|
[pgsql | Args] -> apply(fun pgsql_connect/8, Args);
|
|
|
|
[sqlite | Args] -> apply(fun sqlite_connect/1, Args);
|
|
|
|
[mssql | Args] -> apply(fun odbc_connect/2, Args);
|
|
|
|
[odbc | Args] -> apply(fun odbc_connect/2, Args)
|
2010-01-31 12:41:28 +01:00
|
|
|
end,
|
|
|
|
case ConnectRes of
|
2016-02-11 18:00:00 +01:00
|
|
|
{ok, Ref} ->
|
2019-07-30 13:26:11 +02:00
|
|
|
try link(Ref) of
|
|
|
|
_ ->
|
|
|
|
lists:foreach(
|
|
|
|
fun({{?PREPARE_KEY, _} = Key, _}) ->
|
|
|
|
erase(Key);
|
|
|
|
(_) ->
|
|
|
|
ok
|
|
|
|
end, get()),
|
|
|
|
PendingRequests =
|
|
|
|
p1_queue:dropwhile(
|
|
|
|
fun(Req) ->
|
|
|
|
p1_fsm:send_event(self(), Req),
|
|
|
|
true
|
|
|
|
end, State#state.pending_requests),
|
|
|
|
State1 = State#state{db_ref = Ref,
|
|
|
|
pending_requests = PendingRequests},
|
|
|
|
State2 = get_db_version(State1),
|
2022-07-19 14:32:47 +02:00
|
|
|
{next_state, session_established, State2#state{reconnect_count = 0}}
|
2019-07-30 13:26:11 +02:00
|
|
|
catch _:Reason ->
|
|
|
|
handle_reconnect(Reason, State)
|
|
|
|
end;
|
|
|
|
{error, Reason} ->
|
|
|
|
handle_reconnect(Reason, State)
|
2010-01-31 12:41:28 +01:00
|
|
|
end;
|
|
|
|
connecting(Event, State) ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Unexpected event in 'connecting': ~p",
|
2013-03-14 10:33:02 +01:00
|
|
|
[Event]),
|
2010-01-31 12:41:28 +01:00
|
|
|
{next_state, connecting, State}.
|
|
|
|
|
2019-07-31 09:39:53 +02:00
|
|
|
connecting({sql_cmd, {sql_query, ?KEEPALIVE_QUERY}, Timestamp},
|
2013-03-14 10:33:02 +01:00
|
|
|
From, State) ->
|
2019-07-31 09:39:53 +02:00
|
|
|
reply(From, {error, <<"SQL connection failed">>}, Timestamp),
|
2010-01-31 12:41:28 +01:00
|
|
|
{next_state, connecting, State};
|
2013-03-14 10:33:02 +01:00
|
|
|
connecting({sql_cmd, Command, Timestamp} = Req, From,
|
|
|
|
State) ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?DEBUG("Queuing pending request while connecting:~n\t~p",
|
2013-03-14 10:33:02 +01:00
|
|
|
[Req]),
|
2017-03-10 13:12:43 +01:00
|
|
|
PendingRequests =
|
|
|
|
try p1_queue:in({sql_cmd, Command, From, Timestamp},
|
|
|
|
State#state.pending_requests)
|
|
|
|
catch error:full ->
|
2019-07-31 09:39:53 +02:00
|
|
|
Err = <<"SQL request queue is overfilled">>,
|
2019-09-23 14:17:20 +02:00
|
|
|
?ERROR_MSG("~ts, bouncing all pending requests", [Err]),
|
2017-03-10 13:12:43 +01:00
|
|
|
Q = p1_queue:dropwhile(
|
2019-07-31 09:39:53 +02:00
|
|
|
fun({sql_cmd, _, To, TS}) ->
|
|
|
|
reply(To, {error, Err}, TS),
|
2017-03-10 13:12:43 +01:00
|
|
|
true
|
|
|
|
end, State#state.pending_requests),
|
|
|
|
p1_queue:in({sql_cmd, Command, From, Timestamp}, Q)
|
|
|
|
end,
|
2010-01-31 12:41:28 +01:00
|
|
|
{next_state, connecting,
|
2017-03-10 13:12:43 +01:00
|
|
|
State#state{pending_requests = PendingRequests}};
|
2010-01-31 12:41:28 +01:00
|
|
|
connecting(Request, {Who, _Ref}, State) ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Unexpected call ~p from ~p in 'connecting'",
|
2010-01-31 12:41:28 +01:00
|
|
|
[Request, Who]),
|
2019-07-31 09:39:53 +02:00
|
|
|
{next_state, connecting, State}.
|
2010-01-31 12:41:28 +01:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
session_established({sql_cmd, Command, Timestamp}, From,
|
|
|
|
State) ->
|
2010-06-11 16:35:45 +02:00
|
|
|
run_sql_cmd(Command, From, State, Timestamp);
|
2010-01-31 12:41:28 +01:00
|
|
|
session_established(Request, {Who, _Ref}, State) ->
|
2019-07-31 09:39:53 +02:00
|
|
|
?WARNING_MSG("Unexpected call ~p from ~p in 'session_established'",
|
2010-01-31 12:41:28 +01:00
|
|
|
[Request, Who]),
|
2019-07-31 09:39:53 +02:00
|
|
|
{next_state, session_established, State}.
|
2004-12-14 00:00:12 +01:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
session_established({sql_cmd, Command, From, Timestamp},
|
|
|
|
State) ->
|
2010-06-11 16:35:45 +02:00
|
|
|
run_sql_cmd(Command, From, State, Timestamp);
|
2018-09-25 16:59:49 +02:00
|
|
|
session_established(force_timeout, State) ->
|
|
|
|
{stop, timeout, State};
|
2010-01-31 12:41:28 +01:00
|
|
|
session_established(Event, State) ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Unexpected event in 'session_established': ~p",
|
2013-03-14 10:33:02 +01:00
|
|
|
[Event]),
|
2010-01-31 12:41:28 +01:00
|
|
|
{next_state, session_established, State}.
|
|
|
|
|
|
|
|
handle_event(_Event, StateName, State) ->
|
|
|
|
{next_state, StateName, State}.
|
|
|
|
|
|
|
|
handle_sync_event(_Event, _From, StateName, State) ->
|
|
|
|
{reply, {error, badarg}, StateName, State}.
|
|
|
|
|
|
|
|
code_change(_OldVsn, StateName, State, _Extra) ->
|
|
|
|
{ok, StateName, State}.
|
|
|
|
|
2022-07-28 19:25:17 +02:00
|
|
|
handle_info({'EXIT', _Pid, _Reason}, connecting, State) ->
|
|
|
|
{next_state, connecting, State};
|
2019-07-30 13:26:11 +02:00
|
|
|
handle_info({'EXIT', _Pid, Reason}, _StateName, State) ->
|
|
|
|
handle_reconnect(Reason, State);
|
2010-01-31 12:41:28 +01:00
|
|
|
handle_info(Info, StateName, State) ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Unexpected info in ~p: ~p",
|
2013-03-14 10:33:02 +01:00
|
|
|
[StateName, Info]),
|
2010-01-31 12:41:28 +01:00
|
|
|
{next_state, StateName, State}.
|
|
|
|
|
|
|
|
terminate(_Reason, _StateName, State) ->
|
2008-12-03 11:58:19 +01:00
|
|
|
case State#state.db_type of
|
2015-03-16 19:53:19 +01:00
|
|
|
mysql -> catch p1_mysql_conn:stop(State#state.db_ref);
|
2015-04-08 14:31:28 +02:00
|
|
|
sqlite -> catch sqlite3:close(sqlite_db(State#state.host));
|
2015-03-16 19:53:19 +01:00
|
|
|
_ -> ok
|
2008-12-03 11:58:19 +01:00
|
|
|
end,
|
2004-12-14 00:00:12 +01:00
|
|
|
ok.
|
|
|
|
|
2010-04-09 19:25:00 +02:00
|
|
|
%%----------------------------------------------------------------------
|
|
|
|
%% Func: print_state/1
|
|
|
|
%% Purpose: Prepare the state to be printed on error log
|
|
|
|
%% Returns: State to print
|
|
|
|
%%----------------------------------------------------------------------
|
2013-03-14 10:33:02 +01:00
|
|
|
print_state(State) -> State.
|
|
|
|
|
2004-12-14 00:00:12 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
%%% Internal functions
|
|
|
|
%%%----------------------------------------------------------------------
|
2022-07-19 14:32:47 +02:00
|
|
|
handle_reconnect(Reason, #state{host = Host, reconnect_count = RC} = State) ->
|
|
|
|
StartInterval0 = ejabberd_option:sql_start_interval(Host),
|
|
|
|
StartInterval = case RC of
|
|
|
|
0 -> erlang:min(5000, StartInterval0);
|
|
|
|
_ -> StartInterval0
|
|
|
|
end,
|
2019-07-30 13:26:11 +02:00
|
|
|
?WARNING_MSG("~p connection failed:~n"
|
|
|
|
"** Reason: ~p~n"
|
|
|
|
"** Retry after: ~B seconds",
|
|
|
|
[State#state.db_type, Reason,
|
|
|
|
StartInterval div 1000]),
|
2022-07-28 13:17:35 +02:00
|
|
|
case State#state.db_type of
|
|
|
|
mysql -> catch p1_mysql_conn:stop(State#state.db_ref);
|
|
|
|
sqlite -> catch sqlite3:close(sqlite_db(State#state.host));
|
|
|
|
pgsql -> catch pgsql:terminate(State#state.db_ref);
|
|
|
|
_ -> ok
|
|
|
|
end,
|
2019-07-30 13:26:11 +02:00
|
|
|
p1_fsm:send_event_after(StartInterval, connect),
|
2022-07-19 14:32:47 +02:00
|
|
|
{next_state, connecting, State#state{reconnect_count = RC + 1}}.
|
2009-05-21 18:19:33 +02:00
|
|
|
|
2010-06-11 16:35:45 +02:00
|
|
|
run_sql_cmd(Command, From, State, Timestamp) ->
|
2019-07-31 09:39:53 +02:00
|
|
|
case current_time() >= Timestamp of
|
|
|
|
true ->
|
|
|
|
State1 = report_overload(State),
|
|
|
|
{next_state, session_established, State1};
|
|
|
|
false ->
|
2022-07-15 13:51:30 +02:00
|
|
|
receive
|
|
|
|
{'EXIT', _Pid, Reason} ->
|
|
|
|
PR = p1_queue:in({sql_cmd, Command, From, Timestamp},
|
|
|
|
State#state.pending_requests),
|
|
|
|
handle_reconnect(Reason, State#state{pending_requests = PR})
|
|
|
|
after 0 ->
|
|
|
|
put(?NESTING_KEY, ?TOP_LEVEL_TXN),
|
|
|
|
put(?STATE_KEY, State),
|
|
|
|
abort_on_driver_error(outer_op(Command), From, Timestamp)
|
|
|
|
end
|
2010-06-11 16:35:45 +02:00
|
|
|
end.
|
|
|
|
|
2022-05-12 17:25:11 +02:00
|
|
|
%% @doc Only called by handle_call, only handles top level operations.
|
|
|
|
-spec outer_op(Op::{atom(), binary()}) ->
|
|
|
|
{error, Reason::binary()} | {aborted, Reason::binary()} | {atomic, Result::any()}.
|
2009-07-28 15:46:28 +02:00
|
|
|
outer_op({sql_query, Query}) ->
|
|
|
|
sql_query_internal(Query);
|
|
|
|
outer_op({sql_transaction, F}) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
outer_transaction(F, ?MAX_TRANSACTION_RESTARTS, <<"">>);
|
|
|
|
outer_op({sql_bloc, F}) -> execute_bloc(F).
|
2009-07-28 15:46:28 +02:00
|
|
|
|
|
|
|
%% Called via sql_query/transaction/bloc from client code when inside a
|
|
|
|
%% nested operation
|
|
|
|
nested_op({sql_query, Query}) ->
|
|
|
|
sql_query_internal(Query);
|
|
|
|
nested_op({sql_transaction, F}) ->
|
|
|
|
NestingLevel = get(?NESTING_KEY),
|
2013-03-14 10:33:02 +01:00
|
|
|
if NestingLevel =:= (?TOP_LEVEL_TXN) ->
|
|
|
|
outer_transaction(F, ?MAX_TRANSACTION_RESTARTS, <<"">>);
|
|
|
|
true -> inner_transaction(F)
|
2009-07-28 15:46:28 +02:00
|
|
|
end;
|
2013-03-14 10:33:02 +01:00
|
|
|
nested_op({sql_bloc, F}) -> execute_bloc(F).
|
2009-07-28 15:46:28 +02:00
|
|
|
|
|
|
|
%% Never retry nested transactions - only outer transactions
|
|
|
|
inner_transaction(F) ->
|
|
|
|
PreviousNestingLevel = get(?NESTING_KEY),
|
|
|
|
case get(?NESTING_KEY) of
|
2013-03-14 10:33:02 +01:00
|
|
|
?TOP_LEVEL_TXN ->
|
|
|
|
{backtrace, T} = process_info(self(), backtrace),
|
2019-06-24 19:32:34 +02:00
|
|
|
?ERROR_MSG("Inner transaction called at outer txn "
|
2019-09-23 14:17:20 +02:00
|
|
|
"level. Trace: ~ts",
|
2013-03-14 10:33:02 +01:00
|
|
|
[T]),
|
|
|
|
erlang:exit(implementation_faulty);
|
|
|
|
_N -> ok
|
2009-07-28 15:46:28 +02:00
|
|
|
end,
|
|
|
|
put(?NESTING_KEY, PreviousNestingLevel + 1),
|
|
|
|
Result = (catch F()),
|
|
|
|
put(?NESTING_KEY, PreviousNestingLevel),
|
|
|
|
case Result of
|
2013-03-14 10:33:02 +01:00
|
|
|
{aborted, Reason} -> {aborted, Reason};
|
|
|
|
{'EXIT', Reason} -> {'EXIT', Reason};
|
|
|
|
{atomic, Res} -> {atomic, Res};
|
|
|
|
Res -> {atomic, Res}
|
2005-11-16 03:59:05 +01:00
|
|
|
end.
|
|
|
|
|
2009-07-28 15:46:28 +02:00
|
|
|
outer_transaction(F, NRestarts, _Reason) ->
|
|
|
|
PreviousNestingLevel = get(?NESTING_KEY),
|
|
|
|
case get(?NESTING_KEY) of
|
2013-03-14 10:33:02 +01:00
|
|
|
?TOP_LEVEL_TXN -> ok;
|
|
|
|
_N ->
|
|
|
|
{backtrace, T} = process_info(self(), backtrace),
|
2019-06-24 19:32:34 +02:00
|
|
|
?ERROR_MSG("Outer transaction called at inner txn "
|
2019-09-23 14:17:20 +02:00
|
|
|
"level. Trace: ~ts",
|
2013-03-14 10:33:02 +01:00
|
|
|
[T]),
|
|
|
|
erlang:exit(implementation_faulty)
|
2009-07-28 15:46:28 +02:00
|
|
|
end,
|
2022-07-28 19:24:28 +02:00
|
|
|
case sql_begin() of
|
|
|
|
{error, Reason} ->
|
|
|
|
maybe_restart_transaction(F, NRestarts, Reason, false);
|
2022-07-28 13:17:35 +02:00
|
|
|
_ ->
|
2022-07-28 19:24:28 +02:00
|
|
|
put(?NESTING_KEY, PreviousNestingLevel + 1),
|
|
|
|
try F() of
|
|
|
|
Res ->
|
|
|
|
case sql_commit() of
|
|
|
|
{error, Reason} ->
|
|
|
|
restart(Reason);
|
2022-07-28 13:17:35 +02:00
|
|
|
_ ->
|
2022-07-28 19:24:28 +02:00
|
|
|
{atomic, Res}
|
|
|
|
end
|
|
|
|
catch
|
|
|
|
?EX_RULE(throw, {aborted, Reason}, _) when NRestarts > 0 ->
|
|
|
|
maybe_restart_transaction(F, NRestarts, Reason, true);
|
|
|
|
?EX_RULE(throw, {aborted, Reason}, Stack) when NRestarts =:= 0 ->
|
|
|
|
StackTrace = ?EX_STACK(Stack),
|
|
|
|
?ERROR_MSG("SQL transaction restarts exceeded~n** "
|
|
|
|
"Restarts: ~p~n** Last abort reason: "
|
|
|
|
"~p~n** Stacktrace: ~p~n** When State "
|
|
|
|
"== ~p",
|
|
|
|
[?MAX_TRANSACTION_RESTARTS, Reason,
|
|
|
|
StackTrace, get(?STATE_KEY)]),
|
|
|
|
maybe_restart_transaction(F, NRestarts, Reason, true);
|
|
|
|
?EX_RULE(exit, Reason, _) ->
|
|
|
|
maybe_restart_transaction(F, 0, Reason, true)
|
2022-07-28 13:17:35 +02:00
|
|
|
end
|
2022-07-28 19:24:28 +02:00
|
|
|
end.
|
|
|
|
|
|
|
|
maybe_restart_transaction(F, NRestarts, Reason, DoRollback) ->
|
|
|
|
Res = case driver_restart_required(Reason) of
|
|
|
|
true ->
|
|
|
|
{aborted, Reason};
|
|
|
|
_ when DoRollback ->
|
|
|
|
case sql_rollback() of
|
|
|
|
{error, Reason2} ->
|
|
|
|
case driver_restart_required(Reason2) of
|
|
|
|
true ->
|
|
|
|
{aborted, Reason2};
|
|
|
|
_ ->
|
|
|
|
continue
|
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
continue
|
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
continue
|
2022-07-28 13:17:35 +02:00
|
|
|
end,
|
|
|
|
case Res of
|
|
|
|
continue when NRestarts > 0 ->
|
|
|
|
put(?NESTING_KEY, ?TOP_LEVEL_TXN),
|
|
|
|
outer_transaction(F, NRestarts - 1, Reason);
|
|
|
|
continue ->
|
|
|
|
{aborted, Reason};
|
|
|
|
Other ->
|
|
|
|
Other
|
2005-11-16 03:59:05 +01:00
|
|
|
end.
|
|
|
|
|
2009-07-28 15:46:28 +02:00
|
|
|
execute_bloc(F) ->
|
|
|
|
case catch F() of
|
2013-03-14 10:33:02 +01:00
|
|
|
{aborted, Reason} -> {aborted, Reason};
|
|
|
|
{'EXIT', Reason} -> {aborted, Reason};
|
|
|
|
Res -> {atomic, Res}
|
2009-04-24 12:27:31 +02:00
|
|
|
end.
|
|
|
|
|
2016-02-18 15:38:25 +01:00
|
|
|
execute_fun(F) when is_function(F, 0) ->
|
|
|
|
F();
|
|
|
|
execute_fun(F) when is_function(F, 2) ->
|
|
|
|
State = get(?STATE_KEY),
|
|
|
|
F(State#state.db_type, State#state.db_version).
|
|
|
|
|
2016-02-11 18:00:00 +01:00
|
|
|
sql_query_internal([{_, _} | _] = Queries) ->
|
|
|
|
State = get(?STATE_KEY),
|
|
|
|
case select_sql_query(Queries, State) of
|
|
|
|
undefined ->
|
|
|
|
{error, <<"no matching query for the current DBMS found">>};
|
|
|
|
Query ->
|
|
|
|
sql_query_internal(Query)
|
|
|
|
end;
|
2016-02-09 17:23:15 +01:00
|
|
|
sql_query_internal(#sql_query{} = Query) ->
|
|
|
|
State = get(?STATE_KEY),
|
|
|
|
Res =
|
|
|
|
try
|
|
|
|
case State#state.db_type of
|
|
|
|
odbc ->
|
|
|
|
generic_sql_query(Query);
|
2016-03-24 13:03:19 +01:00
|
|
|
mssql ->
|
2016-05-12 17:32:13 +02:00
|
|
|
mssql_sql_query(Query);
|
2016-02-09 17:23:15 +01:00
|
|
|
pgsql ->
|
|
|
|
Key = {?PREPARE_KEY, Query#sql_query.hash},
|
|
|
|
case get(Key) of
|
|
|
|
undefined ->
|
2019-11-26 17:45:01 +01:00
|
|
|
Host = State#state.host,
|
|
|
|
PreparedStatements =
|
|
|
|
ejabberd_option:sql_prepared_statements(Host),
|
|
|
|
case PreparedStatements of
|
|
|
|
false ->
|
|
|
|
put(Key, ignore);
|
|
|
|
true ->
|
|
|
|
case pgsql_prepare(Query, State) of
|
|
|
|
{ok, _, _, _} ->
|
|
|
|
put(Key, prepared);
|
|
|
|
{error, Error} ->
|
|
|
|
?ERROR_MSG(
|
|
|
|
"PREPARE failed for SQL query "
|
2016-02-09 17:23:15 +01:00
|
|
|
"at ~p: ~p",
|
|
|
|
[Query#sql_query.loc, Error]),
|
2019-11-26 17:45:01 +01:00
|
|
|
put(Key, ignore)
|
|
|
|
end
|
2016-02-09 17:23:15 +01:00
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
ok
|
|
|
|
end,
|
|
|
|
case get(Key) of
|
|
|
|
prepared ->
|
|
|
|
pgsql_execute_sql_query(Query, State);
|
|
|
|
_ ->
|
2019-11-26 17:45:01 +01:00
|
|
|
pgsql_sql_query(Query)
|
2016-02-09 17:23:15 +01:00
|
|
|
end;
|
|
|
|
mysql ->
|
|
|
|
generic_sql_query(Query);
|
|
|
|
sqlite ->
|
2016-05-12 17:32:13 +02:00
|
|
|
sqlite_sql_query(Query)
|
2016-02-09 17:23:15 +01:00
|
|
|
end
|
2018-07-01 13:26:49 +02:00
|
|
|
catch exit:{timeout, _} ->
|
|
|
|
{error, <<"timed out">>};
|
|
|
|
exit:{killed, _} ->
|
|
|
|
{error, <<"killed">>};
|
|
|
|
exit:{normal, _} ->
|
|
|
|
{error, <<"terminated unexpectedly">>};
|
2019-07-31 09:39:53 +02:00
|
|
|
exit:{shutdown, _} ->
|
|
|
|
{error, <<"shutdown">>};
|
2018-12-13 11:45:45 +01:00
|
|
|
?EX_RULE(Class, Reason, Stack) ->
|
2019-06-25 23:05:41 +02:00
|
|
|
StackTrace = ?EX_STACK(Stack),
|
2019-09-23 14:17:20 +02:00
|
|
|
?ERROR_MSG("Internal error while processing SQL query:~n** ~ts",
|
2019-07-07 21:12:14 +02:00
|
|
|
[misc:format_exception(2, Class, Reason, StackTrace)]),
|
2016-02-09 17:23:15 +01:00
|
|
|
{error, <<"internal error">>}
|
|
|
|
end,
|
2018-09-25 16:59:49 +02:00
|
|
|
check_error(Res, Query);
|
2016-02-18 15:38:25 +01:00
|
|
|
sql_query_internal(F) when is_function(F) ->
|
|
|
|
case catch execute_fun(F) of
|
2019-03-07 20:14:13 +01:00
|
|
|
{aborted, Reason} -> {error, Reason};
|
2016-02-18 15:38:25 +01:00
|
|
|
{'EXIT', Reason} -> {error, Reason};
|
|
|
|
Res -> Res
|
|
|
|
end;
|
2009-07-28 15:46:28 +02:00
|
|
|
sql_query_internal(Query) ->
|
|
|
|
State = get(?STATE_KEY),
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("SQL: \"~ts\"", [Query]),
|
2017-05-05 12:20:28 +02:00
|
|
|
QueryTimeout = query_timeout(State#state.host),
|
2009-07-28 15:46:28 +02:00
|
|
|
Res = case State#state.db_type of
|
2013-03-14 10:33:02 +01:00
|
|
|
odbc ->
|
2016-03-24 13:03:19 +01:00
|
|
|
to_odbc(odbc:sql_query(State#state.db_ref, [Query],
|
2017-05-05 12:20:28 +02:00
|
|
|
QueryTimeout - 1000));
|
2016-03-24 13:03:19 +01:00
|
|
|
mssql ->
|
|
|
|
to_odbc(odbc:sql_query(State#state.db_ref, [Query],
|
2017-05-05 12:20:28 +02:00
|
|
|
QueryTimeout - 1000));
|
2013-03-14 10:33:02 +01:00
|
|
|
pgsql ->
|
2017-02-28 12:19:07 +01:00
|
|
|
pgsql_to_odbc(pgsql:squery(State#state.db_ref, Query,
|
2017-05-05 12:20:28 +02:00
|
|
|
QueryTimeout - 1000));
|
2013-03-14 10:33:02 +01:00
|
|
|
mysql ->
|
2022-07-15 13:51:30 +02:00
|
|
|
mysql_to_odbc(p1_mysql_conn:squery(State#state.db_ref,
|
2013-03-14 10:33:02 +01:00
|
|
|
[Query], self(),
|
2022-07-19 14:35:35 +02:00
|
|
|
[{timeout, QueryTimeout - 1000},
|
2022-07-15 13:51:30 +02:00
|
|
|
{result_type, binary}]));
|
2015-04-08 14:31:28 +02:00
|
|
|
sqlite ->
|
|
|
|
Host = State#state.host,
|
|
|
|
sqlite_to_odbc(Host, sqlite3:sql_exec(sqlite_db(Host), Query))
|
2013-03-14 10:33:02 +01:00
|
|
|
end,
|
2018-09-25 16:59:49 +02:00
|
|
|
check_error(Res, Query).
|
2009-05-21 18:19:33 +02:00
|
|
|
|
2016-02-11 18:00:00 +01:00
|
|
|
select_sql_query(Queries, State) ->
|
|
|
|
select_sql_query(
|
|
|
|
Queries, State#state.db_type, State#state.db_version, undefined).
|
|
|
|
|
|
|
|
select_sql_query([], _Type, _Version, undefined) ->
|
|
|
|
undefined;
|
|
|
|
select_sql_query([], _Type, _Version, Query) ->
|
|
|
|
Query;
|
2016-02-11 18:05:00 +01:00
|
|
|
select_sql_query([{any, Query} | _], _Type, _Version, _) ->
|
|
|
|
Query;
|
2016-02-11 18:00:00 +01:00
|
|
|
select_sql_query([{Type, Query} | _], Type, _Version, _) ->
|
|
|
|
Query;
|
|
|
|
select_sql_query([{{Type, _Version1}, Query1} | Rest], Type, undefined, _) ->
|
|
|
|
select_sql_query(Rest, Type, undefined, Query1);
|
|
|
|
select_sql_query([{{Type, Version1}, Query1} | Rest], Type, Version, Query) ->
|
|
|
|
if
|
|
|
|
Version >= Version1 ->
|
|
|
|
Query1;
|
|
|
|
true ->
|
|
|
|
select_sql_query(Rest, Type, Version, Query)
|
|
|
|
end;
|
|
|
|
select_sql_query([{_, _} | Rest], Type, Version, Query) ->
|
|
|
|
select_sql_query(Rest, Type, Version, Query).
|
|
|
|
|
2016-02-09 17:23:15 +01:00
|
|
|
generic_sql_query(SQLQuery) ->
|
|
|
|
sql_query_format_res(
|
|
|
|
sql_query_internal(generic_sql_query_format(SQLQuery)),
|
|
|
|
SQLQuery).
|
|
|
|
|
|
|
|
generic_sql_query_format(SQLQuery) ->
|
|
|
|
Args = (SQLQuery#sql_query.args)(generic_escape()),
|
|
|
|
(SQLQuery#sql_query.format_query)(Args).
|
|
|
|
|
|
|
|
generic_escape() ->
|
|
|
|
#sql_escape{string = fun(X) -> <<"'", (escape(X))/binary, "'">> end,
|
2019-04-23 17:46:14 +02:00
|
|
|
integer = fun(X) -> misc:i2l(X) end,
|
|
|
|
boolean = fun(true) -> <<"1">>;
|
2016-02-09 17:23:15 +01:00
|
|
|
(false) -> <<"0">>
|
2019-04-23 17:46:14 +02:00
|
|
|
end,
|
2020-01-13 01:36:52 +01:00
|
|
|
in_array_string = fun(X) -> <<"'", (escape(X))/binary, "'">> end,
|
|
|
|
like_escape = fun() -> <<"">> end
|
2016-02-09 17:23:15 +01:00
|
|
|
}.
|
|
|
|
|
2019-11-26 17:45:01 +01:00
|
|
|
pgsql_sql_query(SQLQuery) ->
|
|
|
|
sql_query_format_res(
|
|
|
|
sql_query_internal(pgsql_sql_query_format(SQLQuery)),
|
|
|
|
SQLQuery).
|
|
|
|
|
|
|
|
pgsql_sql_query_format(SQLQuery) ->
|
|
|
|
Args = (SQLQuery#sql_query.args)(pgsql_escape()),
|
|
|
|
(SQLQuery#sql_query.format_query)(Args).
|
|
|
|
|
|
|
|
pgsql_escape() ->
|
|
|
|
#sql_escape{string = fun(X) -> <<"E'", (escape(X))/binary, "'">> end,
|
|
|
|
integer = fun(X) -> misc:i2l(X) end,
|
2020-03-18 14:01:15 +01:00
|
|
|
boolean = fun(true) -> <<"'t'">>;
|
|
|
|
(false) -> <<"'f'">>
|
2019-11-26 17:45:01 +01:00
|
|
|
end,
|
2020-01-13 01:36:52 +01:00
|
|
|
in_array_string = fun(X) -> <<"E'", (escape(X))/binary, "'">> end,
|
2020-03-18 14:31:13 +01:00
|
|
|
like_escape = fun() -> <<"ESCAPE E'\\\\'">> end
|
2016-02-09 17:23:15 +01:00
|
|
|
}.
|
|
|
|
|
2016-05-12 17:32:13 +02:00
|
|
|
sqlite_sql_query(SQLQuery) ->
|
|
|
|
sql_query_format_res(
|
|
|
|
sql_query_internal(sqlite_sql_query_format(SQLQuery)),
|
|
|
|
SQLQuery).
|
|
|
|
|
|
|
|
sqlite_sql_query_format(SQLQuery) ->
|
|
|
|
Args = (SQLQuery#sql_query.args)(sqlite_escape()),
|
|
|
|
(SQLQuery#sql_query.format_query)(Args).
|
|
|
|
|
|
|
|
sqlite_escape() ->
|
|
|
|
#sql_escape{string = fun(X) -> <<"'", (standard_escape(X))/binary, "'">> end,
|
2019-04-23 17:46:14 +02:00
|
|
|
integer = fun(X) -> misc:i2l(X) end,
|
|
|
|
boolean = fun(true) -> <<"1">>;
|
2016-05-12 17:32:13 +02:00
|
|
|
(false) -> <<"0">>
|
2019-04-23 17:46:14 +02:00
|
|
|
end,
|
2020-01-13 01:36:52 +01:00
|
|
|
in_array_string = fun(X) -> <<"'", (standard_escape(X))/binary, "'">> end,
|
|
|
|
like_escape = fun() -> <<"ESCAPE '\\'">> end
|
2016-05-12 17:32:13 +02:00
|
|
|
}.
|
|
|
|
|
|
|
|
standard_escape(S) ->
|
|
|
|
<< <<(case Char of
|
|
|
|
$' -> << "''" >>;
|
|
|
|
_ -> << Char >>
|
|
|
|
end)/binary>> || <<Char>> <= S >>.
|
|
|
|
|
|
|
|
mssql_sql_query(SQLQuery) ->
|
|
|
|
sqlite_sql_query(SQLQuery).
|
|
|
|
|
2016-02-09 17:23:15 +01:00
|
|
|
pgsql_prepare(SQLQuery, State) ->
|
2020-01-13 01:36:52 +01:00
|
|
|
Escape = #sql_escape{_ = fun(_) -> arg end,
|
|
|
|
like_escape = fun() -> escape end},
|
|
|
|
{RArgs, _} =
|
|
|
|
lists:foldl(
|
2020-02-27 11:09:44 +01:00
|
|
|
fun(arg, {Acc, I}) ->
|
|
|
|
{[<<$$, (integer_to_binary(I))/binary>> | Acc], I + 1};
|
|
|
|
(escape, {Acc, I}) ->
|
2020-03-18 14:36:17 +01:00
|
|
|
{[<<"ESCAPE E'\\\\'">> | Acc], I};
|
2020-02-27 11:09:44 +01:00
|
|
|
(List, {Acc, I}) when is_list(List) ->
|
|
|
|
{[<<$$, (integer_to_binary(I))/binary>> | Acc], I + 1}
|
|
|
|
end, {[], 1}, (SQLQuery#sql_query.args)(Escape)),
|
2020-01-13 01:36:52 +01:00
|
|
|
Args = lists:reverse(RArgs),
|
|
|
|
%N = length((SQLQuery#sql_query.args)(Escape)),
|
|
|
|
%Args = [<<$$, (integer_to_binary(I))/binary>> || I <- lists:seq(1, N)],
|
2016-02-09 17:23:15 +01:00
|
|
|
Query = (SQLQuery#sql_query.format_query)(Args),
|
|
|
|
pgsql:prepare(State#state.db_ref, SQLQuery#sql_query.hash, Query).
|
|
|
|
|
|
|
|
pgsql_execute_escape() ->
|
|
|
|
#sql_escape{string = fun(X) -> X end,
|
2019-04-23 17:46:14 +02:00
|
|
|
integer = fun(X) -> [misc:i2l(X)] end,
|
|
|
|
boolean = fun(true) -> "1";
|
2016-02-23 00:56:43 +01:00
|
|
|
(false) -> "0"
|
2019-04-23 17:46:14 +02:00
|
|
|
end,
|
2020-01-13 01:36:52 +01:00
|
|
|
in_array_string = fun(X) -> <<"\"", (escape(X))/binary, "\"">> end,
|
|
|
|
like_escape = fun() -> ignore end
|
2016-02-09 17:23:15 +01:00
|
|
|
}.
|
|
|
|
|
|
|
|
pgsql_execute_sql_query(SQLQuery, State) ->
|
|
|
|
Args = (SQLQuery#sql_query.args)(pgsql_execute_escape()),
|
2020-01-13 01:36:52 +01:00
|
|
|
Args2 = lists:filter(fun(ignore) -> false; (_) -> true end, Args),
|
2016-02-09 17:23:15 +01:00
|
|
|
ExecuteRes =
|
2020-01-13 01:36:52 +01:00
|
|
|
pgsql:execute(State#state.db_ref, SQLQuery#sql_query.hash, Args2),
|
2016-02-18 15:38:25 +01:00
|
|
|
% {T, ExecuteRes} =
|
|
|
|
% timer:tc(pgsql, execute, [State#state.db_ref, SQLQuery#sql_query.hash, Args]),
|
2019-09-23 14:17:20 +02:00
|
|
|
% io:format("T ~ts ~p~n", [SQLQuery#sql_query.hash, T]),
|
2016-02-09 17:23:15 +01:00
|
|
|
Res = pgsql_execute_to_odbc(ExecuteRes),
|
|
|
|
sql_query_format_res(Res, SQLQuery).
|
|
|
|
|
|
|
|
|
|
|
|
sql_query_format_res({selected, _, Rows}, SQLQuery) ->
|
|
|
|
Res =
|
|
|
|
lists:flatmap(
|
|
|
|
fun(Row) ->
|
|
|
|
try
|
|
|
|
[(SQLQuery#sql_query.format_res)(Row)]
|
|
|
|
catch
|
2018-12-13 11:45:45 +01:00
|
|
|
?EX_RULE(Class, Reason, Stack) ->
|
2019-06-25 23:05:41 +02:00
|
|
|
StackTrace = ?EX_STACK(Stack),
|
2019-07-07 21:12:14 +02:00
|
|
|
?ERROR_MSG("Error while processing SQL query result:~n"
|
2019-09-23 14:17:20 +02:00
|
|
|
"** Row: ~p~n** ~ts",
|
2019-07-07 21:12:14 +02:00
|
|
|
[Row,
|
|
|
|
misc:format_exception(2, Class, Reason, StackTrace)]),
|
2016-02-09 17:23:15 +01:00
|
|
|
[]
|
|
|
|
end
|
|
|
|
end, Rows),
|
|
|
|
{selected, Res};
|
|
|
|
sql_query_format_res(Res, _SQLQuery) ->
|
|
|
|
Res.
|
|
|
|
|
2016-05-04 20:01:05 +02:00
|
|
|
sql_query_to_iolist(SQLQuery) ->
|
|
|
|
generic_sql_query_format(SQLQuery).
|
|
|
|
|
2021-05-10 17:25:55 +02:00
|
|
|
sql_query_to_iolist(sqlite, SQLQuery) ->
|
|
|
|
sqlite_sql_query_format(SQLQuery);
|
|
|
|
sql_query_to_iolist(_DbType, SQLQuery) ->
|
|
|
|
generic_sql_query_format(SQLQuery).
|
|
|
|
|
2019-09-08 23:15:55 +02:00
|
|
|
sql_begin() ->
|
|
|
|
sql_query_internal(
|
|
|
|
[{mssql, [<<"begin transaction;">>]},
|
|
|
|
{any, [<<"begin;">>]}]).
|
|
|
|
|
|
|
|
sql_commit() ->
|
|
|
|
sql_query_internal(
|
|
|
|
[{mssql, [<<"commit transaction;">>]},
|
|
|
|
{any, [<<"commit;">>]}]).
|
|
|
|
|
|
|
|
sql_rollback() ->
|
|
|
|
sql_query_internal(
|
|
|
|
[{mssql, [<<"rollback transaction;">>]},
|
|
|
|
{any, [<<"rollback;">>]}]).
|
|
|
|
|
2022-07-28 13:17:35 +02:00
|
|
|
driver_restart_required(<<"query timed out">>) -> true;
|
|
|
|
driver_restart_required(<<"connection closed">>) -> true;
|
|
|
|
driver_restart_required(<<"Failed sending data on socket", _/binary>>) -> true;
|
|
|
|
driver_restart_required(<<"SQL connection failed">>) -> true;
|
|
|
|
driver_restart_required(<<"Communication link failure">>) -> true;
|
|
|
|
driver_restart_required(_) -> false.
|
|
|
|
|
2009-07-28 15:46:28 +02:00
|
|
|
%% Generate the OTP callback return tuple depending on the driver result.
|
2022-07-28 13:17:35 +02:00
|
|
|
abort_on_driver_error({Tag, Msg} = Reply, From, Timestamp) when Tag == error; Tag == aborted ->
|
2022-07-19 14:35:35 +02:00
|
|
|
reply(From, Reply, Timestamp),
|
2022-07-28 13:17:35 +02:00
|
|
|
case driver_restart_required(Msg) of
|
|
|
|
true ->
|
|
|
|
handle_reconnect(Msg, get(?STATE_KEY));
|
|
|
|
_ ->
|
|
|
|
{next_state, session_established, get(?STATE_KEY)}
|
|
|
|
end;
|
2019-07-31 09:39:53 +02:00
|
|
|
abort_on_driver_error(Reply, From, Timestamp) ->
|
|
|
|
reply(From, Reply, Timestamp),
|
2010-01-31 12:41:28 +01:00
|
|
|
{next_state, session_established, get(?STATE_KEY)}.
|
2009-05-21 18:19:33 +02:00
|
|
|
|
2019-07-31 09:39:53 +02:00
|
|
|
-spec report_overload(state()) -> state().
|
|
|
|
report_overload(#state{overload_reported = PrevTime} = State) ->
|
|
|
|
CurrTime = current_time(),
|
|
|
|
case PrevTime == undefined orelse (CurrTime - PrevTime) > timer:seconds(30) of
|
|
|
|
true ->
|
|
|
|
?ERROR_MSG("SQL connection pool is overloaded, "
|
|
|
|
"discarding stale requests", []),
|
|
|
|
State#state{overload_reported = current_time()};
|
|
|
|
false ->
|
|
|
|
State
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec reply({pid(), term()}, term(), integer()) -> term().
|
|
|
|
reply(From, Reply, Timestamp) ->
|
|
|
|
case current_time() >= Timestamp of
|
|
|
|
true -> ok;
|
|
|
|
false -> p1_fsm:reply(From, Reply)
|
|
|
|
end.
|
|
|
|
|
2006-01-02 18:39:04 +01:00
|
|
|
%% == pure ODBC code
|
|
|
|
|
|
|
|
%% part of init/1
|
|
|
|
%% Open an ODBC database connection
|
2017-05-05 15:25:10 +02:00
|
|
|
odbc_connect(SQLServer, Timeout) ->
|
2013-04-08 11:12:54 +02:00
|
|
|
ejabberd:start_app(odbc),
|
2015-09-13 13:20:31 +02:00
|
|
|
odbc:connect(binary_to_list(SQLServer),
|
|
|
|
[{scrollable_cursors, off},
|
2018-09-25 16:59:49 +02:00
|
|
|
{extended_errors, on},
|
2015-09-13 13:20:31 +02:00
|
|
|
{tuple_row, off},
|
2017-05-05 15:25:10 +02:00
|
|
|
{timeout, Timeout},
|
2015-09-13 13:20:31 +02:00
|
|
|
{binary_strings, on}]).
|
2006-01-02 18:39:04 +01:00
|
|
|
|
2015-03-16 19:53:19 +01:00
|
|
|
%% == Native SQLite code
|
|
|
|
|
|
|
|
%% part of init/1
|
|
|
|
%% Open a database connection to SQLite
|
|
|
|
|
2015-04-08 14:31:28 +02:00
|
|
|
sqlite_connect(Host) ->
|
|
|
|
File = sqlite_file(Host),
|
|
|
|
case filelib:ensure_dir(File) of
|
|
|
|
ok ->
|
|
|
|
case sqlite3:open(sqlite_db(Host), [{file, File}]) of
|
|
|
|
{ok, Ref} ->
|
|
|
|
sqlite3:sql_exec(
|
|
|
|
sqlite_db(Host), "pragma foreign_keys = on"),
|
|
|
|
{ok, Ref};
|
|
|
|
{error, {already_started, Ref}} ->
|
|
|
|
{ok, Ref};
|
|
|
|
{error, Reason} ->
|
|
|
|
{error, Reason}
|
|
|
|
end;
|
|
|
|
Err ->
|
|
|
|
Err
|
2015-03-16 19:53:19 +01:00
|
|
|
end.
|
|
|
|
|
|
|
|
%% Convert SQLite query result to Erlang ODBC result formalism
|
2015-04-08 14:31:28 +02:00
|
|
|
sqlite_to_odbc(Host, ok) ->
|
|
|
|
{updated, sqlite3:changes(sqlite_db(Host))};
|
|
|
|
sqlite_to_odbc(Host, {rowid, _}) ->
|
|
|
|
{updated, sqlite3:changes(sqlite_db(Host))};
|
|
|
|
sqlite_to_odbc(_Host, [{columns, Columns}, {rows, TRows}]) ->
|
2015-04-08 13:38:04 +02:00
|
|
|
Rows = [lists:map(
|
|
|
|
fun(I) when is_integer(I) ->
|
2016-09-24 22:34:28 +02:00
|
|
|
integer_to_binary(I);
|
2015-04-08 13:38:04 +02:00
|
|
|
(B) ->
|
|
|
|
B
|
|
|
|
end, tuple_to_list(Row)) || Row <- TRows],
|
|
|
|
{selected, [list_to_binary(C) || C <- Columns], Rows};
|
2015-04-08 14:31:28 +02:00
|
|
|
sqlite_to_odbc(_Host, {error, _Code, Reason}) ->
|
2015-03-16 19:53:19 +01:00
|
|
|
{error, Reason};
|
2015-04-08 14:31:28 +02:00
|
|
|
sqlite_to_odbc(_Host, _) ->
|
2015-03-16 19:53:19 +01:00
|
|
|
{updated, undefined}.
|
|
|
|
|
2006-01-02 18:39:04 +01:00
|
|
|
%% == Native PostgreSQL code
|
|
|
|
|
|
|
|
%% part of init/1
|
|
|
|
%% Open a database connection to PostgreSQL
|
2017-05-05 15:25:10 +02:00
|
|
|
pgsql_connect(Server, Port, DB, Username, Password, ConnectTimeout,
|
|
|
|
Transport, SSLOpts) ->
|
2022-11-16 13:58:30 +01:00
|
|
|
pgsql:connect([{host, Server},
|
|
|
|
{database, DB},
|
|
|
|
{user, Username},
|
|
|
|
{password, Password},
|
|
|
|
{port, Port},
|
|
|
|
{transport, Transport},
|
|
|
|
{connect_timeout, ConnectTimeout},
|
|
|
|
{as_binary, true}|SSLOpts]).
|
2006-01-02 18:39:04 +01:00
|
|
|
|
|
|
|
%% Convert PostgreSQL query result to Erlang ODBC result formalism
|
2005-10-13 03:36:07 +02:00
|
|
|
pgsql_to_odbc({ok, PGSQLResult}) ->
|
|
|
|
case PGSQLResult of
|
2013-03-14 10:33:02 +01:00
|
|
|
[Item] -> pgsql_item_to_odbc(Item);
|
|
|
|
Items -> [pgsql_item_to_odbc(Item) || Item <- Items]
|
2005-10-13 03:36:07 +02:00
|
|
|
end.
|
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
pgsql_item_to_odbc({<<"SELECT", _/binary>>, Rows,
|
|
|
|
Recs}) ->
|
|
|
|
{selected, [element(1, Row) || Row <- Rows], Recs};
|
2013-07-21 12:24:36 +02:00
|
|
|
pgsql_item_to_odbc({<<"FETCH", _/binary>>, Rows,
|
|
|
|
Recs}) ->
|
|
|
|
{selected, [element(1, Row) || Row <- Rows], Recs};
|
2013-03-14 10:33:02 +01:00
|
|
|
pgsql_item_to_odbc(<<"INSERT ", OIDN/binary>>) ->
|
|
|
|
[_OID, N] = str:tokens(OIDN, <<" ">>),
|
2016-09-24 22:34:28 +02:00
|
|
|
{updated, binary_to_integer(N)};
|
2013-03-14 10:33:02 +01:00
|
|
|
pgsql_item_to_odbc(<<"DELETE ", N/binary>>) ->
|
2016-09-24 22:34:28 +02:00
|
|
|
{updated, binary_to_integer(N)};
|
2013-03-14 10:33:02 +01:00
|
|
|
pgsql_item_to_odbc(<<"UPDATE ", N/binary>>) ->
|
2016-09-24 22:34:28 +02:00
|
|
|
{updated, binary_to_integer(N)};
|
2013-03-14 10:33:02 +01:00
|
|
|
pgsql_item_to_odbc({error, Error}) -> {error, Error};
|
|
|
|
pgsql_item_to_odbc(_) -> {updated, undefined}.
|
2005-10-13 03:36:07 +02:00
|
|
|
|
2016-02-09 17:23:15 +01:00
|
|
|
pgsql_execute_to_odbc({ok, {<<"SELECT", _/binary>>, Rows}}) ->
|
|
|
|
{selected, [], [[Field || {_, Field} <- Row] || Row <- Rows]};
|
|
|
|
pgsql_execute_to_odbc({ok, {'INSERT', N}}) ->
|
|
|
|
{updated, N};
|
|
|
|
pgsql_execute_to_odbc({ok, {'DELETE', N}}) ->
|
|
|
|
{updated, N};
|
|
|
|
pgsql_execute_to_odbc({ok, {'UPDATE', N}}) ->
|
|
|
|
{updated, N};
|
|
|
|
pgsql_execute_to_odbc({error, Error}) -> {error, Error};
|
|
|
|
pgsql_execute_to_odbc(_) -> {updated, undefined}.
|
|
|
|
|
|
|
|
|
2006-01-02 18:39:04 +01:00
|
|
|
%% == Native MySQL code
|
|
|
|
|
|
|
|
%% part of init/1
|
|
|
|
%% Open a database connection to MySQL
|
2022-11-14 11:19:51 +01:00
|
|
|
mysql_connect(Server, Port, DB, Username, Password, ConnectTimeout, Transport, SSLOpts0) ->
|
2020-02-26 10:50:35 +01:00
|
|
|
SSLOpts = case Transport of
|
|
|
|
ssl ->
|
2022-11-14 11:19:51 +01:00
|
|
|
[ssl_required|SSLOpts0];
|
2020-02-26 10:50:35 +01:00
|
|
|
_ ->
|
|
|
|
[]
|
|
|
|
end,
|
2013-09-18 13:09:10 +02:00
|
|
|
case p1_mysql_conn:start(binary_to_list(Server), Port,
|
2015-10-07 00:06:58 +02:00
|
|
|
binary_to_list(Username),
|
|
|
|
binary_to_list(Password),
|
2017-05-05 15:25:10 +02:00
|
|
|
binary_to_list(DB),
|
2020-02-26 10:50:35 +01:00
|
|
|
ConnectTimeout, fun log/3, SSLOpts)
|
2013-03-14 10:33:02 +01:00
|
|
|
of
|
2015-10-07 00:06:58 +02:00
|
|
|
{ok, Ref} ->
|
|
|
|
p1_mysql_conn:fetch(
|
2016-01-26 13:47:24 +01:00
|
|
|
Ref, [<<"set names 'utf8mb4' collate 'utf8mb4_bin';">>], self()),
|
2015-10-07 00:06:58 +02:00
|
|
|
{ok, Ref};
|
|
|
|
Err -> Err
|
2006-01-02 18:39:04 +01:00
|
|
|
end.
|
|
|
|
|
|
|
|
%% Convert MySQL query result to Erlang ODBC result formalism
|
|
|
|
mysql_to_odbc({updated, MySQLRes}) ->
|
2013-09-18 13:09:10 +02:00
|
|
|
{updated, p1_mysql:get_result_affected_rows(MySQLRes)};
|
2006-01-02 18:39:04 +01:00
|
|
|
mysql_to_odbc({data, MySQLRes}) ->
|
2013-09-18 13:09:10 +02:00
|
|
|
mysql_item_to_odbc(p1_mysql:get_result_field_info(MySQLRes),
|
|
|
|
p1_mysql:get_result_rows(MySQLRes));
|
2013-03-14 10:33:02 +01:00
|
|
|
mysql_to_odbc({error, MySQLRes})
|
2014-07-04 17:28:19 +02:00
|
|
|
when is_binary(MySQLRes) ->
|
2007-07-17 09:09:04 +02:00
|
|
|
{error, MySQLRes};
|
2014-07-04 17:28:19 +02:00
|
|
|
mysql_to_odbc({error, MySQLRes})
|
|
|
|
when is_list(MySQLRes) ->
|
|
|
|
{error, list_to_binary(MySQLRes)};
|
2006-01-02 18:39:04 +01:00
|
|
|
mysql_to_odbc({error, MySQLRes}) ->
|
2020-12-03 19:56:58 +01:00
|
|
|
mysql_to_odbc({error, p1_mysql:get_result_reason(MySQLRes)});
|
2014-07-04 17:28:19 +02:00
|
|
|
mysql_to_odbc(ok) ->
|
|
|
|
ok.
|
|
|
|
|
2006-01-02 18:39:04 +01:00
|
|
|
|
|
|
|
%% When tabular data is returned, convert it to the ODBC formalism
|
|
|
|
mysql_item_to_odbc(Columns, Recs) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
{selected, [element(2, Column) || Column <- Columns], Recs}.
|
|
|
|
|
|
|
|
to_odbc({selected, Columns, Recs}) ->
|
2015-09-13 13:20:31 +02:00
|
|
|
Rows = [lists:map(
|
|
|
|
fun(I) when is_integer(I) ->
|
2016-09-24 22:34:28 +02:00
|
|
|
integer_to_binary(I);
|
2015-09-13 13:20:31 +02:00
|
|
|
(B) ->
|
|
|
|
B
|
|
|
|
end, Row) || Row <- Recs],
|
|
|
|
{selected, [list_to_binary(C) || C <- Columns], Rows};
|
|
|
|
to_odbc({error, Reason}) when is_list(Reason) ->
|
|
|
|
{error, list_to_binary(Reason)};
|
2013-03-14 10:33:02 +01:00
|
|
|
to_odbc(Res) ->
|
|
|
|
Res.
|
2007-08-16 18:37:00 +02:00
|
|
|
|
2016-02-11 18:00:00 +01:00
|
|
|
get_db_version(#state{db_type = pgsql} = State) ->
|
|
|
|
case pgsql:squery(State#state.db_ref,
|
|
|
|
<<"select current_setting('server_version_num')">>) of
|
|
|
|
{ok, [{_, _, [[SVersion]]}]} ->
|
|
|
|
case catch binary_to_integer(SVersion) of
|
|
|
|
Version when is_integer(Version) ->
|
|
|
|
State#state{db_version = Version};
|
|
|
|
Error ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Error getting pgsql version: ~p", [Error]),
|
2016-02-11 18:00:00 +01:00
|
|
|
State
|
|
|
|
end;
|
|
|
|
Res ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Error getting pgsql version: ~p", [Res]),
|
2016-02-11 18:00:00 +01:00
|
|
|
State
|
|
|
|
end;
|
|
|
|
get_db_version(State) ->
|
|
|
|
State.
|
|
|
|
|
2008-10-13 17:25:30 +02:00
|
|
|
log(Level, Format, Args) ->
|
|
|
|
case Level of
|
2013-03-14 10:33:02 +01:00
|
|
|
debug -> ?DEBUG(Format, Args);
|
2019-03-04 18:02:02 +01:00
|
|
|
info -> ?INFO_MSG(Format, Args);
|
2013-03-14 10:33:02 +01:00
|
|
|
normal -> ?INFO_MSG(Format, Args);
|
|
|
|
error -> ?ERROR_MSG(Format, Args)
|
2008-10-13 17:25:30 +02:00
|
|
|
end.
|
2010-01-31 12:41:28 +01:00
|
|
|
|
|
|
|
db_opts(Host) ->
|
2019-08-12 11:21:31 +02:00
|
|
|
Type = ejabberd_option:sql_type(Host),
|
2019-06-14 11:33:26 +02:00
|
|
|
Server = ejabberd_option:sql_server(Host),
|
|
|
|
Timeout = ejabberd_option:sql_connect_timeout(Host),
|
|
|
|
Transport = case ejabberd_option:sql_ssl(Host) of
|
2017-01-10 15:40:38 +01:00
|
|
|
false -> tcp;
|
|
|
|
true -> ssl
|
|
|
|
end,
|
|
|
|
warn_if_ssl_unsupported(Transport, Type),
|
2013-08-12 14:25:05 +02:00
|
|
|
case Type of
|
|
|
|
odbc ->
|
2017-05-05 15:25:10 +02:00
|
|
|
[odbc, Server, Timeout];
|
2015-03-16 19:53:19 +01:00
|
|
|
sqlite ->
|
2015-04-08 14:31:28 +02:00
|
|
|
[sqlite, Host];
|
2013-08-12 14:25:05 +02:00
|
|
|
_ ->
|
2019-06-14 11:33:26 +02:00
|
|
|
Port = ejabberd_option:sql_port(Host),
|
|
|
|
DB = case ejabberd_option:sql_database(Host) of
|
|
|
|
undefined -> <<"ejabberd">>;
|
|
|
|
D -> D
|
|
|
|
end,
|
|
|
|
User = ejabberd_option:sql_username(Host),
|
|
|
|
Pass = ejabberd_option:sql_password(Host),
|
2017-01-10 15:40:38 +01:00
|
|
|
SSLOpts = get_ssl_opts(Transport, Host),
|
2015-09-13 16:41:54 +02:00
|
|
|
case Type of
|
|
|
|
mssql ->
|
2023-01-14 13:03:41 +01:00
|
|
|
case odbc_server_is_connstring(Server) of
|
|
|
|
true ->
|
|
|
|
[mssql, Server, Timeout];
|
|
|
|
false ->
|
|
|
|
Encryption = case Transport of
|
|
|
|
tcp -> <<"">>;
|
|
|
|
ssl -> <<";ENCRYPTION=require;ENCRYPT=yes">>
|
|
|
|
end,
|
|
|
|
[mssql, <<"DRIVER=ODBC;SERVER=", Server/binary, ";DATABASE=", DB/binary,
|
|
|
|
";UID=", User/binary, ";PWD=", Pass/binary,
|
|
|
|
";PORT=", (integer_to_binary(Port))/binary, Encryption/binary,
|
|
|
|
";CLIENT_CHARSET=UTF-8;">>, Timeout]
|
|
|
|
end;
|
2015-09-13 16:41:54 +02:00
|
|
|
_ ->
|
2017-05-05 15:25:10 +02:00
|
|
|
[Type, Server, Port, DB, User, Pass, Timeout, Transport, SSLOpts]
|
2015-09-13 16:41:54 +02:00
|
|
|
end
|
|
|
|
end.
|
|
|
|
|
2017-01-10 15:40:38 +01:00
|
|
|
warn_if_ssl_unsupported(tcp, _) ->
|
|
|
|
ok;
|
|
|
|
warn_if_ssl_unsupported(ssl, pgsql) ->
|
|
|
|
ok;
|
2023-01-14 13:03:41 +01:00
|
|
|
warn_if_ssl_unsupported(ssl, mssql) ->
|
|
|
|
ok;
|
2020-02-26 10:50:35 +01:00
|
|
|
warn_if_ssl_unsupported(ssl, mysql) ->
|
|
|
|
ok;
|
2017-01-10 15:40:38 +01:00
|
|
|
warn_if_ssl_unsupported(ssl, Type) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?WARNING_MSG("SSL connection is not supported for ~ts", [Type]).
|
2017-01-10 15:40:38 +01:00
|
|
|
|
|
|
|
get_ssl_opts(ssl, Host) ->
|
2019-06-14 11:33:26 +02:00
|
|
|
Opts1 = case ejabberd_option:sql_ssl_certfile(Host) of
|
2017-01-10 15:40:38 +01:00
|
|
|
undefined -> [];
|
|
|
|
CertFile -> [{certfile, CertFile}]
|
|
|
|
end,
|
2019-06-14 11:33:26 +02:00
|
|
|
Opts2 = case ejabberd_option:sql_ssl_cafile(Host) of
|
2017-01-10 15:40:38 +01:00
|
|
|
undefined -> Opts1;
|
|
|
|
CAFile -> [{cacertfile, CAFile}|Opts1]
|
|
|
|
end,
|
2019-06-14 11:33:26 +02:00
|
|
|
case ejabberd_option:sql_ssl_verify(Host) of
|
2017-01-10 15:40:38 +01:00
|
|
|
true ->
|
|
|
|
case lists:keymember(cacertfile, 1, Opts2) of
|
|
|
|
true ->
|
|
|
|
[{verify, verify_peer}|Opts2];
|
|
|
|
false ->
|
|
|
|
?WARNING_MSG("SSL verification is enabled for "
|
|
|
|
"SQL connection, but option "
|
|
|
|
"'sql_ssl_cafile' is not set; "
|
|
|
|
"verification will be disabled", []),
|
|
|
|
Opts2
|
|
|
|
end;
|
|
|
|
false ->
|
2022-11-14 11:18:26 +01:00
|
|
|
[{verify, verify_none}|Opts2]
|
2017-01-10 15:40:38 +01:00
|
|
|
end;
|
|
|
|
get_ssl_opts(tcp, _) ->
|
|
|
|
[].
|
|
|
|
|
2023-01-14 13:03:41 +01:00
|
|
|
init_mssql_odbcinst(Host) ->
|
2020-10-08 16:23:34 +02:00
|
|
|
Driver = ejabberd_option:sql_odbc_driver(Host),
|
|
|
|
ODBCINST = io_lib:fwrite("[ODBC]~n"
|
|
|
|
"Driver = ~s~n", [Driver]),
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("~ts:~n~ts", [odbcinst_config(), ODBCINST]),
|
2020-04-23 13:56:41 +02:00
|
|
|
case filelib:ensure_dir(odbcinst_config()) of
|
2015-09-13 16:41:54 +02:00
|
|
|
ok ->
|
|
|
|
try
|
2019-01-31 13:25:56 +01:00
|
|
|
ok = write_file_if_new(odbcinst_config(), ODBCINST),
|
2015-09-13 16:41:54 +02:00
|
|
|
os:putenv("ODBCSYSINI", tmp_dir()),
|
|
|
|
ok
|
|
|
|
catch error:{badmatch, {error, Reason} = Err} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?ERROR_MSG("Failed to create temporary files in ~ts: ~ts",
|
2015-09-13 16:41:54 +02:00
|
|
|
[tmp_dir(), file:format_error(Reason)]),
|
|
|
|
Err
|
|
|
|
end;
|
|
|
|
{error, Reason} = Err ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?ERROR_MSG("Failed to create temporary directory ~ts: ~ts",
|
2015-09-13 16:41:54 +02:00
|
|
|
[tmp_dir(), file:format_error(Reason)]),
|
|
|
|
Err
|
2010-01-31 12:41:28 +01:00
|
|
|
end.
|
|
|
|
|
2023-01-14 13:03:41 +01:00
|
|
|
init_mssql(Host) ->
|
|
|
|
Server = ejabberd_option:sql_server(Host),
|
|
|
|
case odbc_server_is_connstring(Server) of
|
|
|
|
true -> ok;
|
|
|
|
false -> init_mssql_odbcinst(Host)
|
|
|
|
end.
|
|
|
|
|
|
|
|
odbc_server_is_connstring(Server) ->
|
|
|
|
case binary:match(Server, <<"=">>) of
|
|
|
|
nomatch -> false;
|
|
|
|
_ -> true
|
|
|
|
end.
|
|
|
|
|
2019-01-31 13:25:56 +01:00
|
|
|
write_file_if_new(File, Payload) ->
|
|
|
|
case filelib:is_file(File) of
|
|
|
|
true -> ok;
|
|
|
|
false -> file:write_file(File, Payload)
|
|
|
|
end.
|
|
|
|
|
2015-09-13 16:41:54 +02:00
|
|
|
tmp_dir() ->
|
2017-11-30 15:32:09 +01:00
|
|
|
case os:type() of
|
|
|
|
{win32, _} -> filename:join([os:getenv("HOME"), "conf"]);
|
|
|
|
_ -> filename:join(["/tmp", "ejabberd"])
|
|
|
|
end.
|
2015-09-13 16:41:54 +02:00
|
|
|
|
|
|
|
odbcinst_config() ->
|
|
|
|
filename:join(tmp_dir(), "odbcinst.ini").
|
|
|
|
|
2010-01-31 12:41:28 +01:00
|
|
|
max_fsm_queue() ->
|
2017-03-10 13:12:43 +01:00
|
|
|
proplists:get_value(max_queue, fsm_limit_opts(), unlimited).
|
2010-06-11 16:35:45 +02:00
|
|
|
|
2010-01-31 12:41:28 +01:00
|
|
|
fsm_limit_opts() ->
|
2017-03-10 13:12:43 +01:00
|
|
|
ejabberd_config:fsm_limit_opts([]).
|
2015-06-01 14:38:27 +02:00
|
|
|
|
2017-05-05 12:20:28 +02:00
|
|
|
query_timeout(LServer) ->
|
2019-06-14 11:33:26 +02:00
|
|
|
ejabberd_option:sql_query_timeout(LServer).
|
2017-05-05 12:20:28 +02:00
|
|
|
|
2019-07-31 09:39:53 +02:00
|
|
|
current_time() ->
|
|
|
|
erlang:monotonic_time(millisecond).
|
|
|
|
|
2018-09-25 16:59:49 +02:00
|
|
|
%% ***IMPORTANT*** This error format requires extended_errors turned on.
|
|
|
|
extended_error({"08S01", _, Reason}) ->
|
|
|
|
% TCP Provider: The specified network name is no longer available
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("ODBC Link Failure: ~ts", [Reason]),
|
2018-09-25 16:59:49 +02:00
|
|
|
<<"Communication link failure">>;
|
|
|
|
extended_error({"08001", _, Reason}) ->
|
|
|
|
% Login timeout expired
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("ODBC Connect Timeout: ~ts", [Reason]),
|
2018-09-25 16:59:49 +02:00
|
|
|
<<"SQL connection failed">>;
|
|
|
|
extended_error({"IMC01", _, Reason}) ->
|
|
|
|
% The connection is broken and recovery is not possible
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("ODBC Link Failure: ~ts", [Reason]),
|
2018-09-25 16:59:49 +02:00
|
|
|
<<"Communication link failure">>;
|
|
|
|
extended_error({"IMC06", _, Reason}) ->
|
|
|
|
% The connection is broken and recovery is not possible
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("ODBC Link Failure: ~ts", [Reason]),
|
2018-09-25 16:59:49 +02:00
|
|
|
<<"Communication link failure">>;
|
|
|
|
extended_error({Code, _, Reason}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("ODBC Error ~ts: ~ts", [Code, Reason]),
|
2018-09-25 16:59:49 +02:00
|
|
|
iolist_to_binary(Reason);
|
|
|
|
extended_error(Error) ->
|
|
|
|
Error.
|
|
|
|
|
2017-12-17 17:46:55 +01:00
|
|
|
check_error({error, Why} = Err, _Query) when Why == killed ->
|
|
|
|
Err;
|
2018-09-25 16:59:49 +02:00
|
|
|
check_error({error, Why}, #sql_query{} = Query) ->
|
|
|
|
Err = extended_error(Why),
|
2019-09-23 14:17:20 +02:00
|
|
|
?ERROR_MSG("SQL query '~ts' at ~p failed: ~p",
|
2018-09-25 16:59:49 +02:00
|
|
|
[Query#sql_query.hash, Query#sql_query.loc, Err]),
|
|
|
|
{error, Err};
|
|
|
|
check_error({error, Why}, Query) ->
|
|
|
|
Err = extended_error(Why),
|
2016-02-11 18:00:00 +01:00
|
|
|
case catch iolist_to_binary(Query) of
|
|
|
|
SQuery when is_binary(SQuery) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?ERROR_MSG("SQL query '~ts' failed: ~p", [SQuery, Err]);
|
2016-02-11 18:00:00 +01:00
|
|
|
_ ->
|
2018-09-25 16:59:49 +02:00
|
|
|
?ERROR_MSG("SQL query ~p failed: ~p", [Query, Err])
|
2016-02-11 18:00:00 +01:00
|
|
|
end,
|
2018-09-25 16:59:49 +02:00
|
|
|
{error, Err};
|
2016-01-13 10:59:00 +01:00
|
|
|
check_error(Result, _Query) ->
|
|
|
|
Result.
|