mirror of
https://github.com/zrepl/zrepl.git
synced 2024-11-22 00:13:52 +01:00
experiment: zync: an rsync-like tool for ZFS datasets (re-uses zrepl abstractions)
Local sync and sync over SSH seems to work. The sshdirect transport might be interesting / re-usable for zrepl as well, although we'd still need some kind of locking in that case.
This commit is contained in:
parent
96d5288667
commit
bd30afaaf9
4
go.mod
4
go.mod
@ -10,6 +10,7 @@ require (
|
|||||||
github.com/go-sql-driver/mysql v1.4.1-0.20190907122137-b2c03bcae3d4
|
github.com/go-sql-driver/mysql v1.4.1-0.20190907122137-b2c03bcae3d4
|
||||||
github.com/golang/protobuf v1.3.2
|
github.com/golang/protobuf v1.3.2
|
||||||
github.com/google/uuid v1.1.1
|
github.com/google/uuid v1.1.1
|
||||||
|
github.com/hashicorp/yamux v0.0.0-20200609203250-aecfd211c9ce
|
||||||
github.com/jinzhu/copier v0.0.0-20170922082739-db4671f3a9b8
|
github.com/jinzhu/copier v0.0.0-20170922082739-db4671f3a9b8
|
||||||
github.com/kr/pretty v0.1.0
|
github.com/kr/pretty v0.1.0
|
||||||
github.com/lib/pq v1.2.0
|
github.com/lib/pq v1.2.0
|
||||||
@ -33,6 +34,7 @@ require (
|
|||||||
github.com/yudai/gojsondiff v0.0.0-20170107030110-7b1b7adf999d
|
github.com/yudai/gojsondiff v0.0.0-20170107030110-7b1b7adf999d
|
||||||
github.com/yudai/golcs v0.0.0-20170316035057-ecda9a501e82 // go1.12 thinks it needs this
|
github.com/yudai/golcs v0.0.0-20170316035057-ecda9a501e82 // go1.12 thinks it needs this
|
||||||
github.com/zrepl/yaml-config v0.0.0-20191220194647-cbb6b0cf4bdd
|
github.com/zrepl/yaml-config v0.0.0-20191220194647-cbb6b0cf4bdd
|
||||||
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2
|
||||||
golang.org/x/net v0.0.0-20190613194153-d28f0bde5980
|
golang.org/x/net v0.0.0-20190613194153-d28f0bde5980
|
||||||
golang.org/x/sync v0.0.0-20190423024810-112230192c58
|
golang.org/x/sync v0.0.0-20190423024810-112230192c58
|
||||||
golang.org/x/sys v0.0.0-20191026070338-33540a1f6037
|
golang.org/x/sys v0.0.0-20191026070338-33540a1f6037
|
||||||
@ -40,3 +42,5 @@ require (
|
|||||||
gonum.org/v1/gonum v0.7.0 // indirect
|
gonum.org/v1/gonum v0.7.0 // indirect
|
||||||
google.golang.org/grpc v1.17.0
|
google.golang.org/grpc v1.17.0
|
||||||
)
|
)
|
||||||
|
|
||||||
|
replace github.com/problame/go-netssh => /home/cs/zrepl/go-netssh
|
||||||
|
3
go.sum
3
go.sum
@ -120,6 +120,8 @@ github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+
|
|||||||
github.com/gostaticanalysis/analysisutil v0.0.0-20190318220348-4088753ea4d3/go.mod h1:eEOZF4jCKGi+aprrirO9e7WKB3beBRtWgqGunKl6pKE=
|
github.com/gostaticanalysis/analysisutil v0.0.0-20190318220348-4088753ea4d3/go.mod h1:eEOZF4jCKGi+aprrirO9e7WKB3beBRtWgqGunKl6pKE=
|
||||||
github.com/hashicorp/hcl v0.0.0-20180404174102-ef8a98b0bbce/go.mod h1:oZtUIOe8dh44I2q6ScRibXws4Ajl+d+nod3AaR9vL5w=
|
github.com/hashicorp/hcl v0.0.0-20180404174102-ef8a98b0bbce/go.mod h1:oZtUIOe8dh44I2q6ScRibXws4Ajl+d+nod3AaR9vL5w=
|
||||||
github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
|
github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
|
||||||
|
github.com/hashicorp/yamux v0.0.0-20200609203250-aecfd211c9ce h1:7UnVY3T/ZnHUrfviiAgIUjg2PXxsQfs5bphsG8F7Keo=
|
||||||
|
github.com/hashicorp/yamux v0.0.0-20200609203250-aecfd211c9ce/go.mod h1:+NfK9FKeTrX5uv1uIXGdwYDTeHna2qgaIlx54MXqjAM=
|
||||||
github.com/hpcloud/tail v1.0.0 h1:nfCOvKYfkgYP8hkirhJocXT2+zOD8yUNjXaWfTlyFKI=
|
github.com/hpcloud/tail v1.0.0 h1:nfCOvKYfkgYP8hkirhJocXT2+zOD8yUNjXaWfTlyFKI=
|
||||||
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
|
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
|
||||||
github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCXIcARxBp/8cbvlwVa7Z1NHg9XEKhtSvM=
|
github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCXIcARxBp/8cbvlwVa7Z1NHg9XEKhtSvM=
|
||||||
@ -300,6 +302,7 @@ github.com/zrepl/yaml-config v0.0.0-20191220194647-cbb6b0cf4bdd/go.mod h1:JmNwis
|
|||||||
github.com/zrepl/zrepl v0.2.0/go.mod h1:M3Zv2IGSO8iYpUjsZD6ayZ2LHy7zyMfzet9XatKOrZ8=
|
github.com/zrepl/zrepl v0.2.0/go.mod h1:M3Zv2IGSO8iYpUjsZD6ayZ2LHy7zyMfzet9XatKOrZ8=
|
||||||
golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
|
golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
|
||||||
golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
|
golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
|
||||||
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2 h1:VklqNMn3ovrHsnt90PveolxSbWFaJdECFbxSq0Mqo2M=
|
||||||
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
golang.org/x/crypto v0.0.0-20190313024323-a1f597ede03a/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
golang.org/x/crypto v0.0.0-20190313024323-a1f597ede03a/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
golang.org/x/crypto v0.0.0-20190325154230-a5d413f7728c/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
golang.org/x/crypto v0.0.0-20190325154230-a5d413f7728c/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
|
7
zync/README.md
Normal file
7
zync/README.md
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
A tool that re-used zrepl abstractions to be an rsync-like sync tool for ZFS.
|
||||||
|
|
||||||
|
Test environment:
|
||||||
|
|
||||||
|
```
|
||||||
|
go build -o zync && rsync -a ./zync root@192.168.124.233:/usr/local/bin/ && sudo ./zync local:///rpool/zrepltlstest/src ssh://root:%2Fhome%2Fcs%2Fzrepl%2Fzrepl%2Fzync%2Ftestid@192.168.124.233/p1/zync_sink
|
||||||
|
```
|
406
zync/transport/sshdirect/dial.go
Normal file
406
zync/transport/sshdirect/dial.go
Normal file
@ -0,0 +1,406 @@
|
|||||||
|
package sshdirect
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"os/exec"
|
||||||
|
"sync"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/hashicorp/yamux"
|
||||||
|
"github.com/zrepl/zrepl/transport"
|
||||||
|
"github.com/zrepl/zrepl/util/circlog"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Endpoint struct {
|
||||||
|
Host string
|
||||||
|
User string
|
||||||
|
Port uint16
|
||||||
|
IdentityFile string
|
||||||
|
SSHCommand string
|
||||||
|
Options []string
|
||||||
|
RunCommand []string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e Endpoint) CmdArgs() (cmd string, args []string, env []string) {
|
||||||
|
|
||||||
|
if e.SSHCommand != "" {
|
||||||
|
cmd = e.SSHCommand
|
||||||
|
} else {
|
||||||
|
cmd = "ssh"
|
||||||
|
}
|
||||||
|
|
||||||
|
args = make([]string, 0, 2*len(e.Options)+4)
|
||||||
|
args = append(args,
|
||||||
|
"-p", fmt.Sprintf("%d", e.Port),
|
||||||
|
"-T",
|
||||||
|
"-i", e.IdentityFile,
|
||||||
|
"-o", "BatchMode=yes",
|
||||||
|
)
|
||||||
|
for _, option := range e.Options {
|
||||||
|
args = append(args, "-o", option)
|
||||||
|
}
|
||||||
|
args = append(args, fmt.Sprintf("%s@%s", e.User, e.Host))
|
||||||
|
|
||||||
|
args = append(args, e.RunCommand...)
|
||||||
|
|
||||||
|
env = []string{}
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
type SSHConn struct {
|
||||||
|
cmd *exec.Cmd
|
||||||
|
stdin io.WriteCloser
|
||||||
|
stdout io.ReadCloser
|
||||||
|
|
||||||
|
shutdownMtx sync.Mutex
|
||||||
|
shutdownResult *shutdownResult // TODO not used anywhere
|
||||||
|
cmdCancel context.CancelFunc
|
||||||
|
}
|
||||||
|
|
||||||
|
const go_network string = "netssh"
|
||||||
|
|
||||||
|
type clientAddr struct {
|
||||||
|
pid int
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a clientAddr) Network() string {
|
||||||
|
return go_network
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a clientAddr) String() string {
|
||||||
|
return fmt.Sprintf("pid=%d", a.pid)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *SSHConn) LocalAddr() net.Addr {
|
||||||
|
proc := conn.cmd.Process
|
||||||
|
if proc == nil {
|
||||||
|
return clientAddr{-1}
|
||||||
|
}
|
||||||
|
return clientAddr{proc.Pid}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *SSHConn) RemoteAddr() net.Addr {
|
||||||
|
return conn.LocalAddr()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Read implements io.Reader.
|
||||||
|
// It returns *IOError for any non-nil error that is != io.EOF.
|
||||||
|
func (conn *SSHConn) Read(p []byte) (int, error) {
|
||||||
|
n, err := conn.stdout.Read(p)
|
||||||
|
if err != nil && err != io.EOF {
|
||||||
|
return n, &IOError{err}
|
||||||
|
}
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write implements io.Writer.
|
||||||
|
// It returns *IOError for any error != nil.
|
||||||
|
func (conn *SSHConn) Write(p []byte) (int, error) {
|
||||||
|
n, err := conn.stdin.Write(p)
|
||||||
|
if err != nil {
|
||||||
|
return n, &IOError{err}
|
||||||
|
}
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *SSHConn) CloseWrite() error {
|
||||||
|
return conn.stdin.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
type deadliner interface {
|
||||||
|
SetReadDeadline(time.Time) error
|
||||||
|
SetWriteDeadline(time.Time) error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *SSHConn) SetReadDeadline(t time.Time) error {
|
||||||
|
// type assertion is covered by test TestExecCmdPipesDeadlineBehavior
|
||||||
|
return conn.stdout.(deadliner).SetReadDeadline(t)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *SSHConn) SetWriteDeadline(t time.Time) error {
|
||||||
|
// type assertion is covered by test TestExecCmdPipesDeadlineBehavior
|
||||||
|
return conn.stdin.(deadliner).SetWriteDeadline(t)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *SSHConn) SetDeadline(t time.Time) error {
|
||||||
|
// try both
|
||||||
|
rerr := conn.SetReadDeadline(t)
|
||||||
|
werr := conn.SetWriteDeadline(t)
|
||||||
|
if rerr != nil {
|
||||||
|
return rerr
|
||||||
|
}
|
||||||
|
if werr != nil {
|
||||||
|
return werr
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *SSHConn) Close() error {
|
||||||
|
conn.shutdownProcess()
|
||||||
|
return nil // FIXME: waitError will be non-zero because we signaled it, shutdownProcess needs to distinguish that
|
||||||
|
}
|
||||||
|
|
||||||
|
type shutdownResult struct {
|
||||||
|
waitErr error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *SSHConn) shutdownProcess() *shutdownResult {
|
||||||
|
conn.shutdownMtx.Lock()
|
||||||
|
defer conn.shutdownMtx.Unlock()
|
||||||
|
|
||||||
|
if conn.shutdownResult != nil {
|
||||||
|
return conn.shutdownResult
|
||||||
|
}
|
||||||
|
|
||||||
|
wait := make(chan error, 1)
|
||||||
|
go func() {
|
||||||
|
if err := conn.cmd.Process.Signal(syscall.SIGTERM); err != nil {
|
||||||
|
// TODO log error
|
||||||
|
return
|
||||||
|
}
|
||||||
|
wait <- conn.cmd.Wait()
|
||||||
|
}()
|
||||||
|
|
||||||
|
timeout := time.NewTimer(1 * time.Second) // FIXME const
|
||||||
|
defer timeout.Stop()
|
||||||
|
|
||||||
|
select {
|
||||||
|
case waitErr := <-wait:
|
||||||
|
conn.shutdownResult = &shutdownResult{waitErr}
|
||||||
|
case <-timeout.C:
|
||||||
|
conn.cmdCancel()
|
||||||
|
waitErr := <-wait // reuse existing Wait invocation, must not call twice
|
||||||
|
conn.shutdownResult = &shutdownResult{waitErr}
|
||||||
|
}
|
||||||
|
return conn.shutdownResult
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cmd returns the underlying *exec.Cmd (the ssh client process)
|
||||||
|
// Use read-only, should not be necessary for regular users.
|
||||||
|
func (conn *SSHConn) Cmd() *exec.Cmd {
|
||||||
|
return conn.cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
// CmdCancel bypasses the normal shutdown mechanism of SSHConn
|
||||||
|
// (that is, calling Close) and cancels the process's context,
|
||||||
|
// which usually results in SIGKILL being sent to the process.
|
||||||
|
// Intended for integration tests, regular users shouldn't use it.
|
||||||
|
func (conn *SSHConn) CmdCancel() {
|
||||||
|
conn.cmdCancel()
|
||||||
|
}
|
||||||
|
|
||||||
|
const bannerMessageLen = 31
|
||||||
|
|
||||||
|
var messages = make(map[string][]byte)
|
||||||
|
|
||||||
|
func mustMessage(str string) []byte {
|
||||||
|
if len(str) > bannerMessageLen {
|
||||||
|
panic("message length must be smaller than bannerMessageLen")
|
||||||
|
}
|
||||||
|
if _, ok := messages[str]; ok {
|
||||||
|
panic("duplicate message")
|
||||||
|
}
|
||||||
|
var buf bytes.Buffer
|
||||||
|
n, _ := buf.WriteString(str)
|
||||||
|
if n != len(str) {
|
||||||
|
panic("message must only contain ascii / 8-bit chars")
|
||||||
|
}
|
||||||
|
buf.Write(bytes.Repeat([]byte{0}, bannerMessageLen-n))
|
||||||
|
return buf.Bytes()
|
||||||
|
}
|
||||||
|
|
||||||
|
var banner_msg = mustMessage("SSDIRECTHCON_HELO")
|
||||||
|
var proxy_error_msg = mustMessage("SSDIRECTHCON_PROXY_ERROR") /* FIXME irrelevant, was copy-pasta */
|
||||||
|
var begin_msg = mustMessage("SSDIRECTHCON_BEGIN")
|
||||||
|
|
||||||
|
type SSHError struct {
|
||||||
|
RWCError error
|
||||||
|
WhileActivity string
|
||||||
|
}
|
||||||
|
|
||||||
|
// Error() will try to present a one-line error message unless ssh stderr output is longer than one line
|
||||||
|
func (e *SSHError) Error() string {
|
||||||
|
|
||||||
|
exitErr, ok := e.RWCError.(*exec.ExitError)
|
||||||
|
if !ok {
|
||||||
|
return fmt.Sprintf("ssh: %s", e.RWCError)
|
||||||
|
}
|
||||||
|
|
||||||
|
ws := exitErr.ProcessState.Sys().(syscall.WaitStatus)
|
||||||
|
var wsmsg string
|
||||||
|
if ws.Exited() {
|
||||||
|
wsmsg = fmt.Sprintf("(exit status %d)", ws.ExitStatus())
|
||||||
|
} else {
|
||||||
|
wsmsg = fmt.Sprintf("(%s)", ws.Signal())
|
||||||
|
}
|
||||||
|
|
||||||
|
haveSSHMessage := len(exitErr.Stderr) > 0
|
||||||
|
sshOnelineStderr := false
|
||||||
|
if i := bytes.Index(exitErr.Stderr, []byte("\n")); i == len(exitErr.Stderr)-1 {
|
||||||
|
sshOnelineStderr = true
|
||||||
|
}
|
||||||
|
stderr := bytes.TrimSpace(exitErr.Stderr)
|
||||||
|
|
||||||
|
if haveSSHMessage {
|
||||||
|
if sshOnelineStderr {
|
||||||
|
return fmt.Sprintf("ssh: '%s' %s", stderr, wsmsg) // FIXME proper single-quoting
|
||||||
|
} else {
|
||||||
|
return fmt.Sprintf("ssh %s\n%s", wsmsg, stderr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return fmt.Sprintf("ssh terminated without stderr output %s", wsmsg)
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
type ProtocolError struct {
|
||||||
|
What string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e ProtocolError) Error() string {
|
||||||
|
return e.What
|
||||||
|
}
|
||||||
|
|
||||||
|
// Dial connects to the remote endpoint where it expects a command executing Proxy().
|
||||||
|
// Dial performs a handshake consisting of the exchange of banner messages before returning the connection.
|
||||||
|
// If the handshake cannot be completed before dialCtx is Done(), the underlying ssh command is killed
|
||||||
|
// and the dialCtx.Err() returned.
|
||||||
|
// If the handshake completes, dialCtx's deadline does not affect the returned connection.
|
||||||
|
//
|
||||||
|
// Errors returned are either dialCtx.Err(), or intances of ProtocolError or *SSHError
|
||||||
|
func Dial(dialCtx context.Context, endpoint Endpoint) (*SSHConn, error) {
|
||||||
|
|
||||||
|
sshCmd, sshArgs, sshEnv := endpoint.CmdArgs()
|
||||||
|
commandCtx, commandCancel := context.WithCancel(context.Background())
|
||||||
|
cmd := exec.CommandContext(commandCtx, sshCmd, sshArgs...)
|
||||||
|
cmd.Env = sshEnv
|
||||||
|
stdin, err := cmd.StdinPipe()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
stdout, err := cmd.StdoutPipe()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
stderrBuf, err := circlog.NewCircularLog(1 << 15)
|
||||||
|
if err != nil {
|
||||||
|
panic(err) // wrong API usage
|
||||||
|
}
|
||||||
|
cmd.Stderr = stderrBuf
|
||||||
|
|
||||||
|
if err = cmd.Start(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
cmdWaitErrOrIOErr := func(ioErr error, what string) *SSHError {
|
||||||
|
werr := cmd.Wait()
|
||||||
|
if werr, ok := werr.(*exec.ExitError); ok {
|
||||||
|
werr.Stderr = []byte(stderrBuf.String())
|
||||||
|
return &SSHError{werr, what}
|
||||||
|
}
|
||||||
|
return &SSHError{ioErr, what}
|
||||||
|
}
|
||||||
|
|
||||||
|
confErrChan := make(chan error, 1)
|
||||||
|
go func() {
|
||||||
|
defer close(confErrChan)
|
||||||
|
var buf bytes.Buffer
|
||||||
|
if _, err := io.CopyN(&buf, stdout, int64(len(banner_msg))); err != nil {
|
||||||
|
confErrChan <- cmdWaitErrOrIOErr(err, "read banner")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
resp := buf.Bytes()
|
||||||
|
switch {
|
||||||
|
case bytes.Equal(resp, banner_msg):
|
||||||
|
break
|
||||||
|
case bytes.Equal(resp, proxy_error_msg):
|
||||||
|
_ = cmdWaitErrOrIOErr(nil, "")
|
||||||
|
confErrChan <- ProtocolError{"proxy error, check remote configuration"}
|
||||||
|
return
|
||||||
|
default:
|
||||||
|
_ = cmdWaitErrOrIOErr(nil, "")
|
||||||
|
confErrChan <- ProtocolError{fmt.Sprintf("unknown banner message: %v", resp)}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
buf.Reset()
|
||||||
|
buf.Write(begin_msg)
|
||||||
|
if _, err := io.Copy(stdin, &buf); err != nil {
|
||||||
|
confErrChan <- cmdWaitErrOrIOErr(err, "send begin message")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
select {
|
||||||
|
case <-dialCtx.Done():
|
||||||
|
|
||||||
|
commandCancel()
|
||||||
|
// cancelling will make one of the calls in above goroutine fail,
|
||||||
|
// and the goroutine will send the error to confErrChan
|
||||||
|
//
|
||||||
|
// ignore the error and return the cancellation cause
|
||||||
|
|
||||||
|
// draining always terminates because we know the channel is always closed
|
||||||
|
for _ = range confErrChan {
|
||||||
|
}
|
||||||
|
|
||||||
|
// TODO collect stderr in this case
|
||||||
|
// can probably extend *SSHError for this but need to implement net.Error
|
||||||
|
|
||||||
|
return nil, dialCtx.Err()
|
||||||
|
|
||||||
|
case err := <-confErrChan:
|
||||||
|
if err != nil {
|
||||||
|
commandCancel()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return &SSHConn{
|
||||||
|
cmd: cmd,
|
||||||
|
stdin: stdin,
|
||||||
|
stdout: stdout,
|
||||||
|
cmdCancel: commandCancel,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type Connecter struct {
|
||||||
|
s *yamux.Session
|
||||||
|
endpoint Endpoint
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ transport.Connecter = (*Connecter)(nil)
|
||||||
|
|
||||||
|
func NewConnecter(ctx context.Context, endpoint Endpoint) (*Connecter, error) {
|
||||||
|
conn, err := Dial(ctx, endpoint)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
s, err := yamux.Client(conn, nil)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &Connecter{
|
||||||
|
s: s,
|
||||||
|
endpoint: endpoint,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type fakeWire struct {
|
||||||
|
net.Conn
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *fakeWire) CloseWrite() error {
|
||||||
|
time.Sleep(1*time.Second) // HACKY
|
||||||
|
return fmt.Errorf("fakeWire does not support CloseWrite")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Connecter) Connect(ctx context.Context) (transport.Wire, error) {
|
||||||
|
conn, err := c.s.Open()
|
||||||
|
return &fakeWire{conn}, err
|
||||||
|
}
|
48
zync/transport/sshdirect/error.go
Normal file
48
zync/transport/sshdirect/error.go
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
package sshdirect
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"syscall"
|
||||||
|
)
|
||||||
|
|
||||||
|
type timeouter interface {
|
||||||
|
Timeout() bool
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ timeouter = &os.PathError{}
|
||||||
|
|
||||||
|
type IOError struct {
|
||||||
|
Cause error
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ net.Error = &IOError{}
|
||||||
|
|
||||||
|
func (e IOError) GoString() string {
|
||||||
|
return fmt.Sprintf("ServeConnIOError:%#v", e.Cause)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e IOError) Error() string {
|
||||||
|
// following case found by experiment
|
||||||
|
if pathErr, ok := e.Cause.(*os.PathError); ok {
|
||||||
|
if pathErr.Err == syscall.EPIPE {
|
||||||
|
return fmt.Sprintf("netssh %s: %s (likely: connection reset by peer)",
|
||||||
|
pathErr.Op, pathErr.Err,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("netssh: %s: %s", pathErr.Op, pathErr.Err)
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("netssh: %s", e.Cause.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e IOError) Timeout() bool {
|
||||||
|
if to, ok := e.Cause.(timeouter); ok {
|
||||||
|
return to.Timeout()
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e IOError) Temporary() bool {
|
||||||
|
return false
|
||||||
|
}
|
91
zync/transport/sshdirect/serve.go
Normal file
91
zync/transport/sshdirect/serve.go
Normal file
@ -0,0 +1,91 @@
|
|||||||
|
package sshdirect
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"io"
|
||||||
|
"log"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/hashicorp/yamux"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ServeConn struct {
|
||||||
|
stdin, stdout *os.File
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ net.Conn = (*ServeConn)(nil)
|
||||||
|
|
||||||
|
func ServeStdin() (net.Listener, error) {
|
||||||
|
|
||||||
|
conn := &ServeConn{
|
||||||
|
stdin: os.Stdin,
|
||||||
|
stdout: os.Stdout,
|
||||||
|
}
|
||||||
|
|
||||||
|
var buf bytes.Buffer
|
||||||
|
buf.Write(banner_msg)
|
||||||
|
if _, err := io.Copy(conn, &buf); err != nil {
|
||||||
|
log.Printf("error sending confirm message: %s", err)
|
||||||
|
conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
buf.Reset()
|
||||||
|
if _, err := io.CopyN(&buf, conn, int64(len(begin_msg))); err != nil {
|
||||||
|
log.Printf("error reading begin message: %s", err)
|
||||||
|
conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return yamux.Server(conn, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *ServeConn) Read(p []byte) (int, error) {
|
||||||
|
return c.stdin.Read(p)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *ServeConn) Write(p []byte) (int, error) {
|
||||||
|
return c.stdout.Write(p)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *ServeConn) Close() (err error) {
|
||||||
|
e1 := f.stdin.Close()
|
||||||
|
e2 := f.stdout.Close()
|
||||||
|
// FIXME merge errors
|
||||||
|
if e1 != nil {
|
||||||
|
return e1
|
||||||
|
}
|
||||||
|
return e2
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *ServeConn) SetReadDeadline(t time.Time) error {
|
||||||
|
return f.stdin.SetReadDeadline(t)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *ServeConn) SetWriteDeadline(t time.Time) error {
|
||||||
|
return f.stdout.SetReadDeadline(t)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *ServeConn) SetDeadline(t time.Time) error {
|
||||||
|
// try both...
|
||||||
|
werr := f.SetWriteDeadline(t)
|
||||||
|
rerr := f.SetReadDeadline(t)
|
||||||
|
if werr != nil {
|
||||||
|
return werr
|
||||||
|
}
|
||||||
|
if rerr != nil {
|
||||||
|
return rerr
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type serveAddr struct{}
|
||||||
|
|
||||||
|
const GoNetwork string = "sshdirect"
|
||||||
|
|
||||||
|
func (serveAddr) Network() string { return GoNetwork }
|
||||||
|
func (serveAddr) String() string { return "???" }
|
||||||
|
|
||||||
|
func (f *ServeConn) LocalAddr() net.Addr { return serveAddr{} }
|
||||||
|
func (f *ServeConn) RemoteAddr() net.Addr { return serveAddr{} }
|
@ -0,0 +1,47 @@
|
|||||||
|
package transportlistenerfromnetlistener
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/zrepl/zrepl/transport"
|
||||||
|
)
|
||||||
|
|
||||||
|
type wrapFixed struct {
|
||||||
|
id string
|
||||||
|
l net.Listener
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ transport.AuthenticatedListener = (*wrapFixed)(nil)
|
||||||
|
|
||||||
|
func WrapFixed(l net.Listener, identity string) transport.AuthenticatedListener {
|
||||||
|
return &wrapFixed{identity, l}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *wrapFixed) Addr() net.Addr {
|
||||||
|
return w.l.Addr()
|
||||||
|
}
|
||||||
|
|
||||||
|
type fakeWire struct {
|
||||||
|
net.Conn
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *fakeWire) CloseWrite() error {
|
||||||
|
time.Sleep(1*time.Second) // HACKY
|
||||||
|
return fmt.Errorf("fakeWire does not support CloseWrite")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *wrapFixed) Accept(ctx context.Context) (*transport.AuthConn, error) {
|
||||||
|
nc, err := w.l.Accept()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return transport.NewAuthConn(&fakeWire{nc}, w.id), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *wrapFixed) Close() error {
|
||||||
|
return w.l.Close()
|
||||||
|
}
|
333
zync/zync.go
Normal file
333
zync/zync.go
Normal file
@ -0,0 +1,333 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"net/url"
|
||||||
|
"os"
|
||||||
|
"os/signal"
|
||||||
|
"runtime"
|
||||||
|
"strconv"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/kr/pretty"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
"github.com/zrepl/zrepl/daemon/filters"
|
||||||
|
"github.com/zrepl/zrepl/daemon/logging"
|
||||||
|
"github.com/zrepl/zrepl/daemon/logging/trace"
|
||||||
|
"github.com/zrepl/zrepl/endpoint"
|
||||||
|
"github.com/zrepl/zrepl/logger"
|
||||||
|
"github.com/zrepl/zrepl/replication"
|
||||||
|
"github.com/zrepl/zrepl/replication/logic"
|
||||||
|
"github.com/zrepl/zrepl/replication/logic/pdu"
|
||||||
|
"github.com/zrepl/zrepl/rpc"
|
||||||
|
"github.com/zrepl/zrepl/transport"
|
||||||
|
"github.com/zrepl/zrepl/zfs"
|
||||||
|
"github.com/zrepl/zrepl/zync/transport/sshdirect"
|
||||||
|
"github.com/zrepl/zrepl/zync/transport/transportlistenerfromnetlistener"
|
||||||
|
)
|
||||||
|
|
||||||
|
var flagStdinserver = flag.String("stdinserver", "", "")
|
||||||
|
var flagStderrToFile = flag.String("stderrtofile", "", "")
|
||||||
|
|
||||||
|
const (
|
||||||
|
modeSender = "sender"
|
||||||
|
modeReceiver = "receiver"
|
||||||
|
)
|
||||||
|
|
||||||
|
func connecter(ctx context.Context, u *url.URL, mode, fs string) (transport.Connecter, error) {
|
||||||
|
switch u.Scheme {
|
||||||
|
case "ssh":
|
||||||
|
return connecterSSH(ctx, u, mode, fs)
|
||||||
|
default:
|
||||||
|
panic(fmt.Sprintf("unknown scheme %q", u.Scheme))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func connecterSSH(ctx context.Context, u *url.URL, mode, fs string) (transport.Connecter, error) {
|
||||||
|
var port uint16
|
||||||
|
if u.Port() == "" {
|
||||||
|
port = 22
|
||||||
|
} else {
|
||||||
|
portU64, err := strconv.ParseUint(u.Port(), 10, 16)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.Wrap(err, "invalid port")
|
||||||
|
}
|
||||||
|
port = uint16(portU64)
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Println(u.User)
|
||||||
|
idFilePath, hasIdFile := u.User.Password()
|
||||||
|
if hasIdFile {
|
||||||
|
_, err := ioutil.ReadFile(idFilePath)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
hasIdFile = false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !hasIdFile {
|
||||||
|
return nil, errors.New("must set password to identity file path")
|
||||||
|
}
|
||||||
|
|
||||||
|
ep := sshdirect.Endpoint{
|
||||||
|
Host: u.Hostname(),
|
||||||
|
Port: port,
|
||||||
|
User: u.User.Username(),
|
||||||
|
IdentityFile: idFilePath,
|
||||||
|
RunCommand: []string{"zync", "-stderrtofile", "/tmp/zync_server.log", "-stdinserver", mode, fs},
|
||||||
|
}
|
||||||
|
return sshdirect.NewConnecter(ctx, ep)
|
||||||
|
}
|
||||||
|
|
||||||
|
func onefsfilter(osname string) zfs.DatasetFilter {
|
||||||
|
f, err := filters.DatasetMapFilterFromConfig(map[string]bool{
|
||||||
|
osname: true,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return f
|
||||||
|
}
|
||||||
|
|
||||||
|
func makeEndpoint(mode, fs string) (interface{}, error) {
|
||||||
|
switch mode {
|
||||||
|
case modeSender:
|
||||||
|
sc := endpoint.SenderConfig{
|
||||||
|
FSF: onefsfilter(fs),
|
||||||
|
Encrypt: &zfs.NilBool{B: true},
|
||||||
|
JobID: endpoint.MustMakeJobID("sender"),
|
||||||
|
}
|
||||||
|
return endpoint.NewSender(sc), nil
|
||||||
|
case modeReceiver:
|
||||||
|
rpath, err := zfs.NewDatasetPath(fs)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return endpoint.NewReceiver(endpoint.ReceiverConfig{
|
||||||
|
JobID: endpoint.MustMakeJobID("receiver"),
|
||||||
|
AppendClientIdentity: false,
|
||||||
|
RootWithoutClientComponent: rpath,
|
||||||
|
}), nil
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("unknown mode %q", mode)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func serve(ctx context.Context, handler rpc.Handler) error {
|
||||||
|
|
||||||
|
// copy-pasta from passive.go
|
||||||
|
ctxInterceptor := func(handlerCtx context.Context, info rpc.HandlerContextInterceptorData, handler func(ctx context.Context)) {
|
||||||
|
// the handlerCtx is clean => need to inherit logging and tracing config from job context
|
||||||
|
handlerCtx = logging.WithInherit(handlerCtx, ctx)
|
||||||
|
handlerCtx = trace.WithInherit(handlerCtx, ctx)
|
||||||
|
|
||||||
|
handlerCtx, endTask := trace.WithTaskAndSpan(handlerCtx, "handler", fmt.Sprintf("method=%q", info.FullMethod()))
|
||||||
|
defer endTask()
|
||||||
|
handler(handlerCtx)
|
||||||
|
}
|
||||||
|
|
||||||
|
l, err := sshdirect.ServeStdin()
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
srv := rpc.NewServer(handler, rpc.GetLoggersOrPanic(ctx), ctxInterceptor)
|
||||||
|
srv.Serve(ctx, transportlistenerfromnetlistener.WrapFixed(l, "fakeclientidentitymustnotbeempty"))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseFSArg(ctx context.Context, mode, arg string) (interface{}, error) {
|
||||||
|
u, err := url.Parse(arg)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !u.IsAbs() {
|
||||||
|
return nil, fmt.Errorf("URL must be absolute, got %q", arg)
|
||||||
|
}
|
||||||
|
if u.Path[0] != '/' {
|
||||||
|
panic("impl error: expecting leading /")
|
||||||
|
}
|
||||||
|
fs := u.Path[1:]
|
||||||
|
switch u.Scheme {
|
||||||
|
case "local":
|
||||||
|
if u.Host != "" {
|
||||||
|
panic("hostname must be empty for 'local' scheme")
|
||||||
|
}
|
||||||
|
return makeEndpoint(mode, fs)
|
||||||
|
default:
|
||||||
|
cn, err := connecter(ctx, u, mode, fs)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return rpc.NewClient(cn, rpc.GetLoggersOrPanic(ctx)), nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// func parseEndpoints(s, r string) (sender, receiver logic.Endpoint, _ error) {
|
||||||
|
// sUrl, err := url.Parse(s)
|
||||||
|
// if err != nil {
|
||||||
|
// return nil, nil, err
|
||||||
|
// }
|
||||||
|
// rUrl, err := url.Parse((r))
|
||||||
|
// if err != nil {
|
||||||
|
// return nil, nil, err
|
||||||
|
// }
|
||||||
|
// if !sUrl.IsAbs() || !rUrl.IsAbs() {
|
||||||
|
// return nil, nil, fmt.Errorf("must have a scheme")
|
||||||
|
// }
|
||||||
|
|
||||||
|
// if sUrl.Scheme == "local" {&& rUrl.Scheme == "local" {
|
||||||
|
// var err error
|
||||||
|
// sender, err = makeEndpoint(modeSender, sUrl.Path)
|
||||||
|
// if err == nil {
|
||||||
|
// receiver, err = makeEndpoint(modeReceiver, rUrl.Path)
|
||||||
|
// }
|
||||||
|
// return sender, receiver, err
|
||||||
|
// } else {
|
||||||
|
|
||||||
|
// }
|
||||||
|
// }
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
|
||||||
|
cancelSigs := make(chan os.Signal)
|
||||||
|
signal.Notify(cancelSigs, os.Interrupt, syscall.SIGTERM)
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
trace.WithTaskFromStackUpdateCtx(&ctx)
|
||||||
|
|
||||||
|
ctx = logging.WithLoggers(ctx, logging.SubsystemLoggersWithUniversalLogger(logger.NewStderrDebugLogger()))
|
||||||
|
|
||||||
|
ctx, cancel := context.WithCancel(ctx)
|
||||||
|
defer cancel()
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-cancelSigs:
|
||||||
|
cancel()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
flag.Parse()
|
||||||
|
|
||||||
|
if *flagStderrToFile != "" {
|
||||||
|
f, err := os.Create(*flagStderrToFile)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
syscall.Dup2(int(f.Fd()), int(os.Stderr.Fd()))
|
||||||
|
runtime.KeepAlive(f)
|
||||||
|
// enough?
|
||||||
|
}
|
||||||
|
|
||||||
|
if *flagStdinserver != "" {
|
||||||
|
if flag.NArg() != 1 {
|
||||||
|
panic("usage: -stdinserver MODE FS")
|
||||||
|
}
|
||||||
|
h, err := makeEndpoint(*flagStdinserver, flag.Arg(0))
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
err = serve(ctx, h.(rpc.Handler))
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if flag.NArg() != 2 {
|
||||||
|
panic("usage: zync SENDER RECEIVER")
|
||||||
|
}
|
||||||
|
|
||||||
|
sender, err := parseFSArg(ctx, modeSender, flag.Arg(0))
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
receiver, err := parseFSArg(ctx, modeReceiver, flag.Arg(1))
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
pp := logic.PlannerPolicy{
|
||||||
|
EncryptedSend: logic.TriFromBool(true), // FIXME add flag
|
||||||
|
ReplicationConfig: pdu.ReplicationConfig{
|
||||||
|
Protection: &pdu.ReplicationConfigProtection{
|
||||||
|
Initial: pdu.ReplicationGuaranteeKind_GuaranteeNothing,
|
||||||
|
Incremental: pdu.ReplicationGuaranteeKind_GuaranteeNothing,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
p := logic.NewPlanner(nil, nil, sender.(logic.Sender), receiver.(logic.Receiver), pp)
|
||||||
|
_, wait := replication.Do(ctx, p)
|
||||||
|
defer wait(true)
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func local() {
|
||||||
|
|
||||||
|
cancelSigs := make(chan os.Signal)
|
||||||
|
signal.Notify(cancelSigs, os.Interrupt, syscall.SIGTERM)
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
trace.WithTaskFromStackUpdateCtx(&ctx)
|
||||||
|
|
||||||
|
ctx = logging.WithLoggers(ctx, logging.SubsystemLoggersWithUniversalLogger(logger.NewStderrDebugLogger()))
|
||||||
|
|
||||||
|
ctx, cancel := context.WithCancel(ctx)
|
||||||
|
defer cancel()
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-cancelSigs:
|
||||||
|
cancel()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
sc := endpoint.SenderConfig{
|
||||||
|
FSF: onefsfilter(os.Args[1]),
|
||||||
|
Encrypt: &zfs.NilBool{B: true},
|
||||||
|
JobID: endpoint.MustMakeJobID("sender"),
|
||||||
|
}
|
||||||
|
s := endpoint.NewSender(sc)
|
||||||
|
pretty.Println(s)
|
||||||
|
rpath, err := zfs.NewDatasetPath(os.Args[2])
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
r := endpoint.NewReceiver(endpoint.ReceiverConfig{
|
||||||
|
JobID: endpoint.MustMakeJobID("receiver"),
|
||||||
|
AppendClientIdentity: false,
|
||||||
|
RootWithoutClientComponent: rpath,
|
||||||
|
})
|
||||||
|
pretty.Println(r)
|
||||||
|
pp := logic.PlannerPolicy{
|
||||||
|
EncryptedSend: logic.TriFromBool(sc.Encrypt.B),
|
||||||
|
ReplicationConfig: pdu.ReplicationConfig{
|
||||||
|
Protection: &pdu.ReplicationConfigProtection{
|
||||||
|
Initial: pdu.ReplicationGuaranteeKind_GuaranteeNothing,
|
||||||
|
Incremental: pdu.ReplicationGuaranteeKind_GuaranteeNothing,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
p := logic.NewPlanner(nil, nil, s, r, pp)
|
||||||
|
report, wait := replication.Do(ctx, p)
|
||||||
|
defer wait(true)
|
||||||
|
|
||||||
|
ticker := time.NewTicker(2 * time.Second)
|
||||||
|
for !wait(false) {
|
||||||
|
select {
|
||||||
|
case <-ticker.C:
|
||||||
|
// pretty.Println(report())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
pretty.Println(report())
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user