2020-08-08 18:38:34 +00:00
|
|
|
#include <iostream>
|
|
|
|
#include <filesystem>
|
|
|
|
#include <boost/program_options.hpp>
|
2022-08-15 10:30:47 +00:00
|
|
|
#include <Common/filesystemHelpers.h>
|
2020-08-08 18:38:34 +00:00
|
|
|
|
|
|
|
#include <sys/stat.h>
|
2020-08-27 03:58:05 +00:00
|
|
|
#include <pwd.h>
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2022-06-10 08:22:31 +00:00
|
|
|
#if defined(OS_LINUX)
|
2020-08-08 18:38:34 +00:00
|
|
|
#include <syscall.h>
|
|
|
|
#include <linux/capability.h>
|
|
|
|
#endif
|
|
|
|
|
2020-12-17 17:06:01 +00:00
|
|
|
#if defined(OS_DARWIN)
|
|
|
|
#include <mach-o/dyld.h>
|
|
|
|
#endif
|
|
|
|
|
2020-08-08 18:38:34 +00:00
|
|
|
#include <Common/Exception.h>
|
|
|
|
#include <Common/ShellCommand.h>
|
|
|
|
#include <Common/formatReadable.h>
|
|
|
|
#include <Common/Config/ConfigProcessor.h>
|
|
|
|
#include <Common/OpenSSLHelpers.h>
|
2023-03-06 14:53:58 +00:00
|
|
|
#include <base/hex.h>
|
2021-12-21 13:41:53 +00:00
|
|
|
#include <Common/getResource.h>
|
2021-10-02 07:13:14 +00:00
|
|
|
#include <base/sleep.h>
|
2020-08-08 18:38:34 +00:00
|
|
|
#include <IO/ReadBufferFromFileDescriptor.h>
|
|
|
|
#include <IO/WriteBufferFromFileDescriptor.h>
|
|
|
|
#include <IO/ReadBufferFromFile.h>
|
|
|
|
#include <IO/WriteBufferFromFile.h>
|
2020-11-26 01:44:26 +00:00
|
|
|
#include <IO/MMapReadBufferFromFile.h>
|
2020-08-08 18:38:34 +00:00
|
|
|
#include <IO/ReadBufferFromMemory.h>
|
|
|
|
#include <IO/copyData.h>
|
|
|
|
#include <IO/Operators.h>
|
|
|
|
#include <readpassphrase.h>
|
|
|
|
|
|
|
|
#include <Poco/Util/XMLConfiguration.h>
|
|
|
|
|
|
|
|
|
|
|
|
/** This tool can be used to install ClickHouse without a deb/rpm/tgz package, having only "clickhouse" binary.
|
2020-08-08 20:42:10 +00:00
|
|
|
* It also allows to avoid dependency on systemd, upstart, SysV init.
|
|
|
|
*
|
2020-08-08 18:38:34 +00:00
|
|
|
* The following steps are performed:
|
|
|
|
*
|
|
|
|
* - copying the binary to binary directory (/usr/bin).
|
|
|
|
* - creation of symlinks for tools.
|
|
|
|
* - creation of clickhouse user and group.
|
|
|
|
* - creation of config directory (/etc/clickhouse-server).
|
|
|
|
* - creation of default configuration files.
|
|
|
|
* - creation of a directory for logs (/var/log/clickhouse-server).
|
|
|
|
* - creation of a data directory if not exists.
|
|
|
|
* - setting a password for default user.
|
|
|
|
* - choose an option to listen connections.
|
|
|
|
* - changing the ownership and mode of the directories.
|
|
|
|
* - setting capabilities for binary.
|
|
|
|
* - setting ulimits for the user.
|
2020-08-08 20:42:10 +00:00
|
|
|
* - (todo) put service in cron.
|
2020-08-08 18:38:34 +00:00
|
|
|
*
|
|
|
|
* It does not install clickhouse-odbc-bridge.
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace DB
|
|
|
|
{
|
|
|
|
|
|
|
|
namespace ErrorCodes
|
|
|
|
{
|
|
|
|
extern const int FILE_DOESNT_EXIST;
|
|
|
|
extern const int CANNOT_OPEN_FILE;
|
|
|
|
extern const int SYSTEM_ERROR;
|
|
|
|
extern const int NOT_ENOUGH_SPACE;
|
2021-10-16 17:03:45 +00:00
|
|
|
extern const int NOT_IMPLEMENTED;
|
2021-03-02 06:37:47 +00:00
|
|
|
extern const int CANNOT_KILL;
|
2022-05-09 17:43:51 +00:00
|
|
|
extern const int BAD_ARGUMENTS;
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
|
2021-04-13 17:34:11 +00:00
|
|
|
/// ANSI escape sequence for intense color in terminal.
|
|
|
|
#define HILITE "\033[1m"
|
|
|
|
#define END_HILITE "\033[0m"
|
2020-08-08 20:42:10 +00:00
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
#if defined(OS_DARWIN)
|
2021-10-16 23:04:53 +00:00
|
|
|
/// Until createUser() and createGroup() are implemented, only sudo-less installations are supported/default for macOS.
|
2021-10-16 17:03:45 +00:00
|
|
|
static constexpr auto DEFAULT_CLICKHOUSE_SERVER_USER = "";
|
|
|
|
static constexpr auto DEFAULT_CLICKHOUSE_SERVER_GROUP = "";
|
|
|
|
static constexpr auto DEFAULT_CLICKHOUSE_BRIDGE_USER = "";
|
|
|
|
static constexpr auto DEFAULT_CLICKHOUSE_BRIDGE_GROUP = "";
|
|
|
|
#else
|
|
|
|
static constexpr auto DEFAULT_CLICKHOUSE_SERVER_USER = "clickhouse";
|
|
|
|
static constexpr auto DEFAULT_CLICKHOUSE_SERVER_GROUP = "clickhouse";
|
|
|
|
static constexpr auto DEFAULT_CLICKHOUSE_BRIDGE_USER = "clickhouse-bridge";
|
|
|
|
static constexpr auto DEFAULT_CLICKHOUSE_BRIDGE_GROUP = "clickhouse-bridge";
|
|
|
|
#endif
|
2021-06-14 10:35:12 +00:00
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
using namespace DB;
|
|
|
|
namespace po = boost::program_options;
|
|
|
|
namespace fs = std::filesystem;
|
|
|
|
|
|
|
|
|
2020-11-26 01:44:26 +00:00
|
|
|
static auto executeScript(const std::string & command, bool throw_on_error = false)
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
|
|
|
auto sh = ShellCommand::execute(command);
|
2020-08-09 02:13:56 +00:00
|
|
|
WriteBufferFromFileDescriptor wb_stdout(STDOUT_FILENO);
|
|
|
|
WriteBufferFromFileDescriptor wb_stderr(STDERR_FILENO);
|
|
|
|
copyData(sh->out, wb_stdout);
|
|
|
|
copyData(sh->err, wb_stderr);
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
if (throw_on_error)
|
|
|
|
{
|
|
|
|
sh->wait();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
return sh->tryWait();
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
|
|
|
|
2020-11-26 01:44:26 +00:00
|
|
|
static bool ask(std::string question)
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
|
|
|
while (true)
|
|
|
|
{
|
|
|
|
std::string answer;
|
|
|
|
std::cout << question;
|
|
|
|
std::getline(std::cin, answer);
|
|
|
|
if (!std::cin.good())
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (answer.empty() || answer == "n" || answer == "N")
|
|
|
|
return false;
|
|
|
|
if (answer == "y" || answer == "Y")
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-26 01:44:26 +00:00
|
|
|
static bool filesEqual(std::string path1, std::string path2)
|
|
|
|
{
|
|
|
|
MMapReadBufferFromFile in1(path1, 0);
|
|
|
|
MMapReadBufferFromFile in2(path2, 0);
|
|
|
|
|
|
|
|
/// memcmp is faster than hashing and comparing hashes
|
|
|
|
return in1.buffer().size() == in2.buffer().size()
|
|
|
|
&& 0 == memcmp(in1.buffer().begin(), in2.buffer().begin(), in1.buffer().size());
|
|
|
|
}
|
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
static void changeOwnership(const String & file_name, const String & user_name, const String & group_name = {}, bool recursive = true)
|
|
|
|
{
|
|
|
|
if (!user_name.empty() || !group_name.empty())
|
|
|
|
{
|
|
|
|
std::string command = fmt::format("chown {} {}:{} '{}'", (recursive ? "-R" : ""), user_name, group_name, file_name);
|
|
|
|
fmt::print(" {}\n", command);
|
|
|
|
executeScript(command);
|
|
|
|
}
|
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
static void createGroup(const String & group_name)
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
if (!group_name.empty())
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
#if defined(OS_DARWIN)
|
2021-10-16 23:04:53 +00:00
|
|
|
// TODO: implement.
|
2021-10-16 17:03:45 +00:00
|
|
|
throw Exception(ErrorCodes::NOT_IMPLEMENTED, "Unable to create a group in macOS");
|
2022-01-05 23:30:41 +00:00
|
|
|
#elif defined(OS_FREEBSD)
|
|
|
|
std::string command = fmt::format("pw groupadd {}", group_name);
|
|
|
|
fmt::print(" {}\n", command);
|
|
|
|
executeScript(command);
|
2021-10-16 17:03:45 +00:00
|
|
|
#else
|
|
|
|
std::string command = fmt::format("groupadd -r {}", group_name);
|
|
|
|
fmt::print(" {}\n", command);
|
|
|
|
executeScript(command);
|
|
|
|
#endif
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
2021-10-16 17:03:45 +00:00
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
static void createUser(const String & user_name, [[maybe_unused]] const String & group_name)
|
|
|
|
{
|
|
|
|
if (!user_name.empty())
|
|
|
|
{
|
|
|
|
#if defined(OS_DARWIN)
|
2021-10-16 23:04:53 +00:00
|
|
|
// TODO: implement.
|
2021-10-16 17:03:45 +00:00
|
|
|
throw Exception(ErrorCodes::NOT_IMPLEMENTED, "Unable to create a user in macOS");
|
2022-01-05 23:30:41 +00:00
|
|
|
#elif defined(OS_FREEBSD)
|
|
|
|
std::string command = group_name.empty()
|
|
|
|
? fmt::format("pw useradd -s /bin/false -d /nonexistent -n {}", user_name)
|
|
|
|
: fmt::format("pw useradd -s /bin/false -d /nonexistent -g {} -n {}", group_name, user_name);
|
|
|
|
fmt::print(" {}\n", command);
|
|
|
|
executeScript(command);
|
2021-10-16 17:03:45 +00:00
|
|
|
#else
|
|
|
|
std::string command = group_name.empty()
|
|
|
|
? fmt::format("useradd -r --shell /bin/false --home-dir /nonexistent --user-group {}", user_name)
|
|
|
|
: fmt::format("useradd -r --shell /bin/false --home-dir /nonexistent -g {} {}", group_name, user_name);
|
|
|
|
fmt::print(" {}\n", command);
|
|
|
|
executeScript(command);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-01-06 01:26:02 +00:00
|
|
|
static std::string formatWithSudo(std::string command, bool needed = true)
|
|
|
|
{
|
|
|
|
if (!needed)
|
|
|
|
return command;
|
|
|
|
|
|
|
|
#if defined(OS_FREEBSD)
|
|
|
|
/// FreeBSD does not have 'sudo' installed.
|
|
|
|
return fmt::format("su -m root -c '{}'", command);
|
|
|
|
#else
|
|
|
|
return fmt::format("sudo {}", command);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
int mainEntryClickHouseInstall(int argc, char ** argv)
|
|
|
|
{
|
2020-08-08 18:38:34 +00:00
|
|
|
try
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
po::options_description desc;
|
|
|
|
desc.add_options()
|
|
|
|
("help,h", "produce help message")
|
|
|
|
("prefix", po::value<std::string>()->default_value("/"), "prefix for all paths")
|
|
|
|
("binary-path", po::value<std::string>()->default_value("usr/bin"), "where to install binaries")
|
|
|
|
("config-path", po::value<std::string>()->default_value("etc/clickhouse-server"), "where to install configs")
|
|
|
|
("log-path", po::value<std::string>()->default_value("var/log/clickhouse-server"), "where to create log directory")
|
|
|
|
("data-path", po::value<std::string>()->default_value("var/lib/clickhouse"), "directory for data")
|
|
|
|
("pid-path", po::value<std::string>()->default_value("var/run/clickhouse-server"), "directory for pid file")
|
|
|
|
("user", po::value<std::string>()->default_value(DEFAULT_CLICKHOUSE_SERVER_USER), "clickhouse user to create")
|
|
|
|
("group", po::value<std::string>()->default_value(DEFAULT_CLICKHOUSE_SERVER_GROUP), "clickhouse group to create")
|
2023-03-22 12:53:22 +00:00
|
|
|
("noninteractive,y", "run non-interactively")
|
|
|
|
("link", "create symlink to the binary instead of copying to binary-path")
|
2021-10-16 17:03:45 +00:00
|
|
|
;
|
|
|
|
|
|
|
|
po::variables_map options;
|
|
|
|
po::store(po::parse_command_line(argc, argv, desc), options);
|
|
|
|
|
|
|
|
if (options.count("help"))
|
|
|
|
{
|
2022-01-06 01:26:02 +00:00
|
|
|
std::cout << "Usage: " << formatWithSudo(std::string(argv[0]) + " install [options]", getuid() != 0) << '\n';
|
2021-10-16 17:03:45 +00:00
|
|
|
std::cout << desc << '\n';
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-08-08 18:38:34 +00:00
|
|
|
/// We need to copy binary to the binary directory.
|
2020-12-17 20:09:03 +00:00
|
|
|
/// The binary is currently run. We need to obtain its path from procfs (on Linux).
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2020-12-17 17:06:01 +00:00
|
|
|
#if defined(OS_DARWIN)
|
2020-12-17 20:09:03 +00:00
|
|
|
uint32_t path_length = 0;
|
|
|
|
_NSGetExecutablePath(nullptr, &path_length);
|
2020-12-18 00:30:01 +00:00
|
|
|
if (path_length <= 1)
|
2022-04-18 08:18:31 +00:00
|
|
|
throw Exception(ErrorCodes::FILE_DOESNT_EXIST, "Cannot obtain path to the binary");
|
2020-12-17 17:06:01 +00:00
|
|
|
|
2020-12-17 20:09:03 +00:00
|
|
|
std::string path(path_length, std::string::value_type());
|
|
|
|
auto res = _NSGetExecutablePath(&path[0], &path_length);
|
|
|
|
if (res != 0)
|
2022-04-18 08:18:31 +00:00
|
|
|
throw Exception(ErrorCodes::FILE_DOESNT_EXIST, "Cannot obtain path to the binary");
|
2020-12-17 17:06:01 +00:00
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
if (path.back() == '\0')
|
|
|
|
path.pop_back();
|
|
|
|
|
2020-12-17 17:06:01 +00:00
|
|
|
fs::path binary_self_path(path);
|
2022-01-05 19:33:02 +00:00
|
|
|
#elif defined(OS_FREEBSD)
|
|
|
|
/// https://stackoverflow.com/questions/1023306/finding-current-executables-path-without-proc-self-exe
|
2022-01-05 19:59:22 +00:00
|
|
|
fs::path binary_self_path = argc >= 1 ? argv[0] : "/proc/curproc/file";
|
2020-12-18 03:17:23 +00:00
|
|
|
#else
|
2020-08-08 18:38:34 +00:00
|
|
|
fs::path binary_self_path = "/proc/self/exe";
|
2020-12-17 17:06:01 +00:00
|
|
|
#endif
|
2020-12-18 03:17:23 +00:00
|
|
|
|
2020-08-08 18:38:34 +00:00
|
|
|
if (!fs::exists(binary_self_path))
|
|
|
|
throw Exception(ErrorCodes::FILE_DOESNT_EXIST, "Cannot obtain path to the binary from {}, file doesn't exist",
|
|
|
|
binary_self_path.string());
|
|
|
|
|
2020-11-26 01:44:26 +00:00
|
|
|
fs::path binary_self_canonical_path = fs::canonical(binary_self_path);
|
|
|
|
|
2020-08-08 18:38:34 +00:00
|
|
|
/// Copy binary to the destination directory.
|
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
fs::path prefix = options["prefix"].as<std::string>();
|
|
|
|
fs::path bin_dir = prefix / options["binary-path"].as<std::string>();
|
2020-08-08 18:38:34 +00:00
|
|
|
|
|
|
|
fs::path main_bin_path = bin_dir / "clickhouse";
|
|
|
|
fs::path main_bin_tmp_path = bin_dir / "clickhouse.new";
|
|
|
|
fs::path main_bin_old_path = bin_dir / "clickhouse.old";
|
|
|
|
|
2020-11-26 01:44:26 +00:00
|
|
|
size_t binary_size = fs::file_size(binary_self_path);
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2020-11-26 01:44:26 +00:00
|
|
|
bool old_binary_exists = fs::exists(main_bin_path);
|
2020-11-26 02:11:55 +00:00
|
|
|
bool already_installed = false;
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
if (options.count("link"))
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
2023-03-22 12:53:22 +00:00
|
|
|
if (old_binary_exists)
|
2020-11-26 01:44:26 +00:00
|
|
|
{
|
2023-03-22 12:53:22 +00:00
|
|
|
bool is_symlink = FS::isSymlink(main_bin_path);
|
|
|
|
fs::path points_to;
|
|
|
|
if (is_symlink)
|
|
|
|
points_to = fs::weakly_canonical(FS::readSymlink(main_bin_path));
|
|
|
|
|
|
|
|
if (is_symlink && points_to == binary_self_canonical_path)
|
|
|
|
{
|
|
|
|
already_installed = true;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!is_symlink)
|
|
|
|
{
|
|
|
|
fmt::print("File {} already exists but it's not a symlink. Will rename to {}.\n",
|
|
|
|
main_bin_path.string(), main_bin_old_path.string());
|
|
|
|
fs::rename(main_bin_path, main_bin_old_path);
|
|
|
|
}
|
|
|
|
else if (points_to != main_bin_path)
|
|
|
|
{
|
|
|
|
fmt::print("Symlink {} already exists but it points to {}. Will replace the old symlink to {}.\n",
|
|
|
|
main_bin_path.string(), points_to.string(), binary_self_canonical_path.string());
|
|
|
|
fs::remove(main_bin_path);
|
|
|
|
}
|
|
|
|
}
|
2020-11-26 01:44:26 +00:00
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
if (!already_installed)
|
|
|
|
{
|
|
|
|
if (!fs::exists(bin_dir))
|
|
|
|
{
|
|
|
|
fmt::print("Creating binary directory {}.\n", bin_dir.string());
|
|
|
|
fs::create_directories(bin_dir);
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt::print("Creating symlink {} to {}.\n", main_bin_path.string(), binary_self_canonical_path.string());
|
|
|
|
fs::create_symlink(binary_self_canonical_path, main_bin_path);
|
|
|
|
|
|
|
|
if (0 != chmod(binary_self_canonical_path.string().c_str(), S_IRUSR | S_IRGRP | S_IROTH | S_IXUSR | S_IXGRP | S_IXOTH))
|
|
|
|
throwFromErrno(fmt::format("Cannot chmod {}", binary_self_canonical_path.string()), ErrorCodes::SYSTEM_ERROR);
|
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
2020-11-26 02:11:55 +00:00
|
|
|
else
|
|
|
|
{
|
2023-03-22 12:53:22 +00:00
|
|
|
bool is_symlink = FS::isSymlink(main_bin_path);
|
|
|
|
|
|
|
|
if (!is_symlink)
|
|
|
|
{
|
|
|
|
/// Check if the binary is the same file (already installed).
|
|
|
|
if (old_binary_exists && binary_self_canonical_path == fs::canonical(main_bin_path))
|
|
|
|
{
|
|
|
|
already_installed = true;
|
|
|
|
fmt::print("ClickHouse binary is already located at {}\n", main_bin_path.string());
|
|
|
|
}
|
|
|
|
/// Check if binary has the same content.
|
|
|
|
else if (old_binary_exists && binary_size == fs::file_size(main_bin_path))
|
|
|
|
{
|
|
|
|
fmt::print("Found already existing ClickHouse binary at {} having the same size. Will check its contents.\n",
|
|
|
|
main_bin_path.string());
|
|
|
|
|
|
|
|
if (filesEqual(binary_self_path.string(), main_bin_path.string()))
|
|
|
|
{
|
|
|
|
already_installed = true;
|
|
|
|
fmt::print("ClickHouse binary is already located at {} and it has the same content as {}\n",
|
|
|
|
main_bin_path.string(), binary_self_canonical_path.string());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (already_installed)
|
2021-10-16 17:03:45 +00:00
|
|
|
{
|
2023-03-22 12:53:22 +00:00
|
|
|
if (0 != chmod(main_bin_path.string().c_str(), S_IRUSR | S_IRGRP | S_IROTH | S_IXUSR | S_IXGRP | S_IXOTH))
|
|
|
|
throwFromErrno(fmt::format("Cannot chmod {}", main_bin_path.string()), ErrorCodes::SYSTEM_ERROR);
|
2021-10-16 17:03:45 +00:00
|
|
|
}
|
2023-03-22 12:53:22 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!fs::exists(bin_dir))
|
|
|
|
{
|
|
|
|
fmt::print("Creating binary directory {}.\n", bin_dir.string());
|
|
|
|
fs::create_directories(bin_dir);
|
|
|
|
}
|
2021-10-16 17:03:45 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
size_t available_space = fs::space(bin_dir).available;
|
|
|
|
if (available_space < binary_size)
|
|
|
|
throw Exception(ErrorCodes::NOT_ENOUGH_SPACE, "Not enough space for clickhouse binary in {}, required {}, available {}.",
|
|
|
|
bin_dir.string(), ReadableSize(binary_size), ReadableSize(available_space));
|
2020-11-26 01:44:26 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
fmt::print("Copying ClickHouse binary to {}\n", main_bin_tmp_path.string());
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
try
|
|
|
|
{
|
|
|
|
ReadBufferFromFile in(binary_self_path.string());
|
|
|
|
WriteBufferFromFile out(main_bin_tmp_path.string());
|
|
|
|
copyData(in, out);
|
|
|
|
out.sync();
|
2020-11-26 01:44:26 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
if (0 != fchmod(out.getFD(), S_IRUSR | S_IRGRP | S_IROTH | S_IXUSR | S_IXGRP | S_IXOTH))
|
|
|
|
throwFromErrno(fmt::format("Cannot chmod {}", main_bin_tmp_path.string()), ErrorCodes::SYSTEM_ERROR);
|
2020-11-26 01:44:26 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
out.finalize();
|
|
|
|
}
|
|
|
|
catch (const Exception & e)
|
|
|
|
{
|
|
|
|
if (e.code() == ErrorCodes::CANNOT_OPEN_FILE && geteuid() != 0)
|
|
|
|
std::cerr << "Install must be run as root: " << formatWithSudo("./clickhouse install") << '\n';
|
|
|
|
throw;
|
|
|
|
}
|
2020-11-26 01:44:26 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
if (old_binary_exists)
|
|
|
|
{
|
|
|
|
fmt::print("{} already exists, will rename existing binary to {} and put the new binary in place\n",
|
|
|
|
main_bin_path.string(), main_bin_old_path.string());
|
2020-11-26 01:44:26 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
/// There is file exchange operation in Linux but it's not portable.
|
|
|
|
fs::rename(main_bin_path, main_bin_old_path);
|
|
|
|
}
|
2020-11-26 02:11:55 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
fmt::print("Renaming {} to {}.\n", main_bin_tmp_path.string(), main_bin_path.string());
|
|
|
|
fs::rename(main_bin_tmp_path, main_bin_path);
|
|
|
|
}
|
2020-11-26 01:44:26 +00:00
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
|
|
|
|
/// Create symlinks.
|
|
|
|
|
|
|
|
std::initializer_list<const char *> tools
|
|
|
|
{
|
|
|
|
"clickhouse-server",
|
|
|
|
"clickhouse-client",
|
|
|
|
"clickhouse-local",
|
|
|
|
"clickhouse-benchmark",
|
|
|
|
"clickhouse-copier",
|
|
|
|
"clickhouse-obfuscator",
|
2020-09-07 03:22:47 +00:00
|
|
|
"clickhouse-git-import",
|
2020-08-08 18:38:34 +00:00
|
|
|
"clickhouse-compressor",
|
|
|
|
"clickhouse-format",
|
2022-01-26 22:23:18 +00:00
|
|
|
"clickhouse-extract-from-config",
|
|
|
|
"clickhouse-keeper",
|
|
|
|
"clickhouse-keeper-converter",
|
2022-06-16 17:38:33 +00:00
|
|
|
"clickhouse-disks",
|
2020-08-08 18:38:34 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
for (const auto & tool : tools)
|
|
|
|
{
|
|
|
|
bool need_to_create = true;
|
|
|
|
fs::path symlink_path = bin_dir / tool;
|
|
|
|
|
|
|
|
if (fs::exists(symlink_path))
|
|
|
|
{
|
2022-08-15 10:30:47 +00:00
|
|
|
bool is_symlink = FS::isSymlink(symlink_path);
|
2020-08-08 18:38:34 +00:00
|
|
|
fs::path points_to;
|
|
|
|
if (is_symlink)
|
2022-08-15 10:30:47 +00:00
|
|
|
points_to = fs::weakly_canonical(FS::readSymlink(symlink_path));
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2023-03-22 12:53:22 +00:00
|
|
|
if (is_symlink && (points_to == main_bin_path || (options.count("link") && points_to == binary_self_canonical_path)))
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
|
|
|
need_to_create = false;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!is_symlink)
|
|
|
|
{
|
|
|
|
fs::path rename_path = symlink_path.replace_extension(".old");
|
|
|
|
fmt::print("File {} already exists but it's not a symlink. Will rename to {}.\n",
|
|
|
|
symlink_path.string(), rename_path.string());
|
|
|
|
fs::rename(symlink_path, rename_path);
|
|
|
|
}
|
|
|
|
else if (points_to != main_bin_path)
|
|
|
|
{
|
|
|
|
fmt::print("Symlink {} already exists but it points to {}. Will replace the old symlink to {}.\n",
|
|
|
|
symlink_path.string(), points_to.string(), main_bin_path.string());
|
|
|
|
fs::remove(symlink_path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (need_to_create)
|
|
|
|
{
|
|
|
|
fmt::print("Creating symlink {} to {}.\n", symlink_path.string(), main_bin_path.string());
|
|
|
|
fs::create_symlink(main_bin_path, symlink_path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Creation of clickhouse user and group.
|
|
|
|
|
|
|
|
std::string user = options["user"].as<std::string>();
|
|
|
|
std::string group = options["group"].as<std::string>();
|
|
|
|
|
|
|
|
if (!group.empty())
|
|
|
|
{
|
2021-06-14 10:35:12 +00:00
|
|
|
fmt::print("Creating clickhouse group if it does not exist.\n");
|
2021-10-16 17:03:45 +00:00
|
|
|
createGroup(group);
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
|
|
|
else
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Will not create a dedicated clickhouse group.\n");
|
2021-06-14 10:35:12 +00:00
|
|
|
|
|
|
|
if (!user.empty())
|
|
|
|
{
|
|
|
|
fmt::print("Creating clickhouse user if it does not exist.\n");
|
2021-10-16 17:03:45 +00:00
|
|
|
createUser(user, group);
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
if (group.empty())
|
|
|
|
group = user;
|
|
|
|
|
2020-08-08 18:38:34 +00:00
|
|
|
/// Setting ulimits.
|
|
|
|
try
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
#if defined(OS_DARWIN)
|
|
|
|
|
|
|
|
/// TODO Set ulimits on macOS.
|
|
|
|
|
|
|
|
#else
|
2020-08-08 18:38:34 +00:00
|
|
|
fs::path ulimits_dir = "/etc/security/limits.d";
|
|
|
|
fs::path ulimits_file = ulimits_dir / fmt::format("{}.conf", user);
|
|
|
|
fmt::print("Will set ulimits for {} user in {}.\n", user, ulimits_file.string());
|
|
|
|
std::string ulimits_content = fmt::format(
|
2022-09-16 10:41:36 +00:00
|
|
|
"{0}\tsoft\tnofile\t1048576\n"
|
|
|
|
"{0}\thard\tnofile\t1048576\n", user);
|
2020-08-08 18:38:34 +00:00
|
|
|
|
|
|
|
fs::create_directories(ulimits_dir);
|
|
|
|
|
|
|
|
WriteBufferFromFile out(ulimits_file.string());
|
|
|
|
out.write(ulimits_content.data(), ulimits_content.size());
|
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
2021-10-16 17:03:45 +00:00
|
|
|
#endif
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
std::cerr << "Cannot set ulimits: " << getCurrentExceptionMessage(false) << "\n";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Will not create a dedicated clickhouse user.\n");
|
2020-08-08 18:38:34 +00:00
|
|
|
|
|
|
|
/// Creating configuration files and directories.
|
|
|
|
|
|
|
|
fs::path config_dir = prefix / options["config-path"].as<std::string>();
|
|
|
|
|
|
|
|
if (!fs::exists(config_dir))
|
|
|
|
{
|
|
|
|
fmt::print("Creating config directory {}.\n", config_dir.string());
|
|
|
|
fs::create_directories(config_dir);
|
|
|
|
}
|
|
|
|
|
|
|
|
fs::path main_config_file = config_dir / "config.xml";
|
|
|
|
fs::path users_config_file = config_dir / "users.xml";
|
|
|
|
fs::path config_d = config_dir / "config.d";
|
|
|
|
fs::path users_d = config_dir / "users.d";
|
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
fs::path log_path = prefix / options["log-path"].as<std::string>();
|
|
|
|
fs::path data_path = prefix / options["data-path"].as<std::string>();
|
|
|
|
fs::path pid_path = prefix / options["pid-path"].as<std::string>();
|
2020-08-08 18:38:34 +00:00
|
|
|
|
|
|
|
bool has_password_for_default_user = false;
|
|
|
|
|
2020-11-12 16:48:17 +00:00
|
|
|
if (!fs::exists(config_d))
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
|
|
|
fmt::print("Creating config directory {} that is used for tweaks of main server configuration.\n", config_d.string());
|
|
|
|
fs::create_directory(config_d);
|
2020-11-12 16:48:17 +00:00
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2020-11-12 16:48:17 +00:00
|
|
|
if (!fs::exists(users_d))
|
|
|
|
{
|
2020-08-08 18:38:34 +00:00
|
|
|
fmt::print("Creating config directory {} that is used for tweaks of users configuration.\n", users_d.string());
|
|
|
|
fs::create_directory(users_d);
|
2020-11-12 16:48:17 +00:00
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2020-11-12 16:48:17 +00:00
|
|
|
if (!fs::exists(main_config_file))
|
|
|
|
{
|
2020-08-08 18:38:34 +00:00
|
|
|
std::string_view main_config_content = getResource("config.xml");
|
|
|
|
if (main_config_content.empty())
|
|
|
|
{
|
|
|
|
fmt::print("There is no default config.xml, you have to download it and place to {}.\n", main_config_file.string());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
{
|
|
|
|
WriteBufferFromFile out(main_config_file.string());
|
|
|
|
out.write(main_config_content.data(), main_config_content.size());
|
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Override the default paths.
|
|
|
|
|
|
|
|
/// Data paths.
|
2021-11-26 16:21:29 +00:00
|
|
|
const std::string data_file = config_d / "data-paths.xml";
|
|
|
|
if (!fs::exists(data_file))
|
2021-10-16 17:03:45 +00:00
|
|
|
{
|
|
|
|
WriteBufferFromFile out(data_file);
|
2021-10-26 05:51:22 +00:00
|
|
|
out << "<clickhouse>\n"
|
2021-10-16 17:03:45 +00:00
|
|
|
" <path>" << data_path.string() << "</path>\n"
|
|
|
|
" <tmp_path>" << (data_path / "tmp").string() << "</tmp_path>\n"
|
|
|
|
" <user_files_path>" << (data_path / "user_files").string() << "</user_files_path>\n"
|
|
|
|
" <format_schema_path>" << (data_path / "format_schemas").string() << "</format_schema_path>\n"
|
2021-10-26 05:51:22 +00:00
|
|
|
"</clickhouse>\n";
|
2021-10-16 17:03:45 +00:00
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
2021-11-26 16:21:29 +00:00
|
|
|
fs::permissions(data_file, fs::perms::owner_read, fs::perm_options::replace);
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Data path configuration override is saved to file {}.\n", data_file);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Logger.
|
2021-11-26 16:21:29 +00:00
|
|
|
const std::string logger_file = config_d / "logger.xml";
|
|
|
|
if (!fs::exists(logger_file))
|
2021-10-16 17:03:45 +00:00
|
|
|
{
|
|
|
|
WriteBufferFromFile out(logger_file);
|
2021-10-26 05:51:22 +00:00
|
|
|
out << "<clickhouse>\n"
|
2021-10-16 17:03:45 +00:00
|
|
|
" <logger>\n"
|
|
|
|
" <log>" << (log_path / "clickhouse-server.log").string() << "</log>\n"
|
|
|
|
" <errorlog>" << (log_path / "clickhouse-server.err.log").string() << "</errorlog>\n"
|
|
|
|
" </logger>\n"
|
2021-10-26 05:51:22 +00:00
|
|
|
"</clickhouse>\n";
|
2021-10-16 17:03:45 +00:00
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
2021-11-26 16:21:29 +00:00
|
|
|
fs::permissions(logger_file, fs::perms::owner_read, fs::perm_options::replace);
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Log path configuration override is saved to file {}.\n", logger_file);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// User directories.
|
2021-11-26 16:21:29 +00:00
|
|
|
const std::string user_directories_file = config_d / "user-directories.xml";
|
|
|
|
if (!fs::exists(user_directories_file))
|
2021-10-16 17:03:45 +00:00
|
|
|
{
|
|
|
|
WriteBufferFromFile out(user_directories_file);
|
2021-10-26 05:51:22 +00:00
|
|
|
out << "<clickhouse>\n"
|
2021-10-16 17:03:45 +00:00
|
|
|
" <user_directories>\n"
|
|
|
|
" <local_directory>\n"
|
|
|
|
" <path>" << (data_path / "access").string() << "</path>\n"
|
|
|
|
" </local_directory>\n"
|
|
|
|
" </user_directories>\n"
|
2021-10-26 05:51:22 +00:00
|
|
|
"</clickhouse>\n";
|
2021-10-16 17:03:45 +00:00
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
2021-11-26 16:21:29 +00:00
|
|
|
fs::permissions(user_directories_file, fs::perms::owner_read, fs::perm_options::replace);
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("User directory path configuration override is saved to file {}.\n", user_directories_file);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// OpenSSL.
|
2021-11-26 16:21:29 +00:00
|
|
|
const std::string openssl_file = config_d / "openssl.xml";
|
|
|
|
if (!fs::exists(openssl_file))
|
2021-10-16 17:03:45 +00:00
|
|
|
{
|
|
|
|
WriteBufferFromFile out(openssl_file);
|
2021-10-26 05:51:22 +00:00
|
|
|
out << "<clickhouse>\n"
|
2021-10-16 17:03:45 +00:00
|
|
|
" <openSSL>\n"
|
|
|
|
" <server>\n"
|
|
|
|
" <certificateFile>" << (config_dir / "server.crt").string() << "</certificateFile>\n"
|
|
|
|
" <privateKeyFile>" << (config_dir / "server.key").string() << "</privateKeyFile>\n"
|
|
|
|
" <dhParamsFile>" << (config_dir / "dhparam.pem").string() << "</dhParamsFile>\n"
|
|
|
|
" </server>\n"
|
|
|
|
" </openSSL>\n"
|
2021-10-26 05:51:22 +00:00
|
|
|
"</clickhouse>\n";
|
2021-10-16 17:03:45 +00:00
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
2021-11-26 16:21:29 +00:00
|
|
|
fs::permissions(openssl_file, fs::perms::owner_read, fs::perm_options::replace);
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("OpenSSL path configuration override is saved to file {}.\n", openssl_file);
|
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
2020-11-12 16:48:17 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fmt::print("Config file {} already exists, will keep it and extract path info from it.\n", main_config_file.string());
|
|
|
|
|
|
|
|
ConfigProcessor processor(main_config_file.string(), /* throw_on_bad_incl = */ false, /* log_to_console = */ false);
|
|
|
|
ConfigurationPtr configuration(new Poco::Util::XMLConfiguration(processor.processConfig()));
|
|
|
|
|
|
|
|
if (configuration->has("path"))
|
|
|
|
{
|
|
|
|
data_path = configuration->getString("path");
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("{} has {} as data path.\n", main_config_file.string(), data_path.string());
|
2020-11-12 16:48:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (configuration->has("logger.log"))
|
|
|
|
{
|
|
|
|
log_path = fs::path(configuration->getString("logger.log")).remove_filename();
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("{} has {} as log path.\n", main_config_file.string(), log_path.string());
|
2020-11-12 17:28:24 +00:00
|
|
|
}
|
2020-11-12 16:48:17 +00:00
|
|
|
}
|
|
|
|
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2020-11-12 16:48:17 +00:00
|
|
|
if (!fs::exists(users_config_file))
|
|
|
|
{
|
2020-08-08 18:38:34 +00:00
|
|
|
std::string_view users_config_content = getResource("users.xml");
|
|
|
|
if (users_config_content.empty())
|
|
|
|
{
|
|
|
|
fmt::print("There is no default users.xml, you have to download it and place to {}.\n", users_config_file.string());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
WriteBufferFromFile out(users_config_file.string());
|
|
|
|
out.write(users_config_content.data(), users_config_content.size());
|
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2020-11-13 11:31:37 +00:00
|
|
|
fmt::print("Users config file {} already exists, will keep it and extract users info from it.\n", users_config_file.string());
|
2020-08-08 18:38:34 +00:00
|
|
|
|
|
|
|
/// Check if password for default user already specified.
|
2020-11-12 16:48:17 +00:00
|
|
|
ConfigProcessor processor(users_config_file.string(), /* throw_on_bad_incl = */ false, /* log_to_console = */ false);
|
|
|
|
ConfigurationPtr configuration(new Poco::Util::XMLConfiguration(processor.processConfig()));
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2020-11-12 16:48:17 +00:00
|
|
|
if (!configuration->getString("users.default.password", "").empty()
|
2020-11-26 02:11:55 +00:00
|
|
|
|| !configuration->getString("users.default.password_sha256_hex", "").empty()
|
|
|
|
|| !configuration->getString("users.default.password_double_sha1_hex", "").empty())
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
2020-11-12 16:48:17 +00:00
|
|
|
has_password_for_default_user = true;
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Create directories for data and log.
|
|
|
|
|
|
|
|
if (fs::exists(log_path))
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Log directory {} already exists.\n", log_path.string());
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Creating log directory {}.\n", log_path.string());
|
2020-08-08 18:38:34 +00:00
|
|
|
fs::create_directories(log_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fs::exists(data_path))
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Data directory {} already exists.\n", data_path.string());
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Creating data directory {}.\n", data_path.string());
|
2020-08-08 18:38:34 +00:00
|
|
|
fs::create_directories(data_path);
|
|
|
|
}
|
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
if (fs::exists(pid_path))
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Pid directory {} already exists.\n", pid_path.string());
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
fmt::print("Creating pid directory {}.\n", pid_path.string());
|
2020-08-08 20:42:10 +00:00
|
|
|
fs::create_directories(pid_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Chmod and chown data and log directories
|
2021-10-16 17:03:45 +00:00
|
|
|
changeOwnership(log_path, user, group);
|
|
|
|
changeOwnership(pid_path, user, group);
|
2020-08-08 20:42:10 +00:00
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
/// Not recursive, because there can be a huge number of files and it will be slow.
|
|
|
|
changeOwnership(data_path, user, group, /* recursive= */ false);
|
2020-08-08 20:42:10 +00:00
|
|
|
|
2020-08-11 22:48:25 +00:00
|
|
|
/// All users are allowed to read pid file (for clickhouse status command).
|
|
|
|
fs::permissions(pid_path, fs::perms::owner_all | fs::perms::group_read | fs::perms::others_read, fs::perm_options::replace);
|
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
/// Other users in clickhouse group are allowed to read and even delete logs.
|
|
|
|
fs::permissions(log_path, fs::perms::owner_all | fs::perms::group_all, fs::perm_options::replace);
|
|
|
|
|
|
|
|
/// Data directory is not accessible to anyone except clickhouse.
|
|
|
|
fs::permissions(data_path, fs::perms::owner_all, fs::perm_options::replace);
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2021-06-14 10:35:12 +00:00
|
|
|
fs::path odbc_bridge_path = bin_dir / "clickhouse-odbc-bridge";
|
|
|
|
fs::path library_bridge_path = bin_dir / "clickhouse-library-bridge";
|
|
|
|
|
|
|
|
if (fs::exists(odbc_bridge_path) || fs::exists(library_bridge_path))
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
createGroup(DEFAULT_CLICKHOUSE_BRIDGE_GROUP);
|
|
|
|
createUser(DEFAULT_CLICKHOUSE_BRIDGE_USER, DEFAULT_CLICKHOUSE_BRIDGE_GROUP);
|
2021-06-14 10:35:12 +00:00
|
|
|
|
|
|
|
if (fs::exists(odbc_bridge_path))
|
2021-10-16 17:03:45 +00:00
|
|
|
changeOwnership(odbc_bridge_path, DEFAULT_CLICKHOUSE_BRIDGE_USER, DEFAULT_CLICKHOUSE_BRIDGE_GROUP);
|
2021-06-14 10:35:12 +00:00
|
|
|
if (fs::exists(library_bridge_path))
|
2021-10-16 17:03:45 +00:00
|
|
|
changeOwnership(library_bridge_path, DEFAULT_CLICKHOUSE_BRIDGE_USER, DEFAULT_CLICKHOUSE_BRIDGE_GROUP);
|
2021-06-14 10:35:12 +00:00
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2021-04-13 19:11:45 +00:00
|
|
|
bool stdin_is_a_tty = isatty(STDIN_FILENO);
|
2020-08-08 18:38:34 +00:00
|
|
|
bool stdout_is_a_tty = isatty(STDOUT_FILENO);
|
2021-04-14 14:27:13 +00:00
|
|
|
|
|
|
|
/// dpkg or apt installers can ask for non-interactive work explicitly.
|
|
|
|
|
2022-08-21 18:24:17 +00:00
|
|
|
const char * debian_frontend_var = getenv("DEBIAN_FRONTEND"); // NOLINT(concurrency-mt-unsafe)
|
2023-03-22 12:53:22 +00:00
|
|
|
bool noninteractive = (debian_frontend_var && debian_frontend_var == std::string_view("noninteractive"))
|
|
|
|
|| options.count("noninteractive");
|
|
|
|
|
2021-04-14 14:27:13 +00:00
|
|
|
|
|
|
|
bool is_interactive = !noninteractive && stdin_is_a_tty && stdout_is_a_tty;
|
|
|
|
|
|
|
|
/// We can ask password even if stdin is closed/redirected but /dev/tty is available.
|
|
|
|
bool can_ask_password = !noninteractive && stdout_is_a_tty;
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2021-06-14 10:35:12 +00:00
|
|
|
/// Set up password for default user.
|
2020-08-08 18:38:34 +00:00
|
|
|
if (has_password_for_default_user)
|
|
|
|
{
|
2021-04-13 20:51:44 +00:00
|
|
|
fmt::print(HILITE "Password for default user is already specified. To remind or reset, see {} and {}." END_HILITE "\n",
|
2020-08-08 18:38:34 +00:00
|
|
|
users_config_file.string(), users_d.string());
|
|
|
|
}
|
2021-04-14 14:27:13 +00:00
|
|
|
else if (!can_ask_password)
|
2020-08-08 18:38:34 +00:00
|
|
|
{
|
2021-04-13 20:51:44 +00:00
|
|
|
fmt::print(HILITE "Password for default user is empty string. See {} and {} to change it." END_HILITE "\n",
|
2020-08-08 18:38:34 +00:00
|
|
|
users_config_file.string(), users_d.string());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2021-04-13 19:11:45 +00:00
|
|
|
/// NOTE: When installing debian package with dpkg -i, stdin is not a terminal but we are still being able to enter password.
|
|
|
|
/// More sophisticated method with /dev/tty is used inside the `readpassphrase` function.
|
|
|
|
|
2020-08-08 18:38:34 +00:00
|
|
|
char buf[1000] = {};
|
|
|
|
std::string password;
|
|
|
|
if (auto * result = readpassphrase("Enter password for default user: ", buf, sizeof(buf), 0))
|
|
|
|
password = result;
|
|
|
|
|
|
|
|
if (!password.empty())
|
|
|
|
{
|
|
|
|
std::string password_file = users_d / "default-password.xml";
|
|
|
|
WriteBufferFromFile out(password_file);
|
|
|
|
#if USE_SSL
|
|
|
|
std::vector<uint8_t> hash;
|
|
|
|
hash.resize(32);
|
|
|
|
encodeSHA256(password, hash.data());
|
|
|
|
std::string hash_hex;
|
|
|
|
hash_hex.resize(64);
|
|
|
|
for (size_t i = 0; i < 32; ++i)
|
|
|
|
writeHexByteLowercase(hash[i], &hash_hex[2 * i]);
|
2021-10-26 05:51:22 +00:00
|
|
|
out << "<clickhouse>\n"
|
2020-08-08 18:38:34 +00:00
|
|
|
" <users>\n"
|
|
|
|
" <default>\n"
|
2020-08-08 20:42:10 +00:00
|
|
|
" <password remove='1' />\n"
|
2020-08-08 18:38:34 +00:00
|
|
|
" <password_sha256_hex>" << hash_hex << "</password_sha256_hex>\n"
|
|
|
|
" </default>\n"
|
|
|
|
" </users>\n"
|
2021-10-26 05:51:22 +00:00
|
|
|
"</clickhouse>\n";
|
2020-08-08 18:38:34 +00:00
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
2021-04-13 20:51:44 +00:00
|
|
|
fmt::print(HILITE "Password for default user is saved in file {}." END_HILITE "\n", password_file);
|
2020-08-08 18:38:34 +00:00
|
|
|
#else
|
2021-10-26 05:51:22 +00:00
|
|
|
out << "<clickhouse>\n"
|
2020-08-08 18:38:34 +00:00
|
|
|
" <users>\n"
|
|
|
|
" <default>\n"
|
|
|
|
" <password><![CDATA[" << password << "]]></password>\n"
|
|
|
|
" </default>\n"
|
|
|
|
" </users>\n"
|
2021-10-26 05:51:22 +00:00
|
|
|
"</clickhouse>\n";
|
2020-08-08 18:38:34 +00:00
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
2021-04-13 20:51:44 +00:00
|
|
|
fmt::print(HILITE "Password for default user is saved in plaintext in file {}." END_HILITE "\n", password_file);
|
2020-08-08 18:38:34 +00:00
|
|
|
#endif
|
|
|
|
has_password_for_default_user = true;
|
|
|
|
}
|
|
|
|
else
|
2021-04-13 20:51:44 +00:00
|
|
|
fmt::print(HILITE "Password for default user is empty string. See {} and {} to change it." END_HILITE "\n",
|
2020-08-08 18:38:34 +00:00
|
|
|
users_config_file.string(), users_d.string());
|
|
|
|
}
|
|
|
|
|
2020-10-20 18:09:15 +00:00
|
|
|
/** Set capabilities for the binary.
|
|
|
|
*
|
|
|
|
* 1. Check that "setcap" tool exists.
|
|
|
|
* 2. Check that an arbitrary program with installed capabilities can run.
|
|
|
|
* 3. Set the capabilities.
|
|
|
|
*
|
|
|
|
* The second is important for Docker and systemd-nspawn.
|
|
|
|
* When the container has no capabilities,
|
|
|
|
* but the executable file inside the container has capabilities,
|
|
|
|
* then attempt to run this file will end up with a cryptic "Operation not permitted" message.
|
|
|
|
*/
|
2020-08-08 18:38:34 +00:00
|
|
|
|
2022-06-10 08:22:31 +00:00
|
|
|
#if defined(OS_LINUX)
|
2020-08-08 18:38:34 +00:00
|
|
|
fmt::print("Setting capabilities for clickhouse binary. This is optional.\n");
|
2020-10-20 18:09:15 +00:00
|
|
|
std::string command = fmt::format("command -v setcap >/dev/null"
|
2021-11-25 14:24:24 +00:00
|
|
|
" && command -v capsh >/dev/null"
|
2022-03-21 02:30:13 +00:00
|
|
|
" && capsh --has-p=cap_net_admin,cap_ipc_lock,cap_sys_nice,cap_net_bind_service+ep >/dev/null 2>&1"
|
2022-03-21 02:32:05 +00:00
|
|
|
" && setcap 'cap_net_admin,cap_ipc_lock,cap_sys_nice,cap_net_bind_service+ep' {0}"
|
|
|
|
" || echo \"Cannot set 'net_admin' or 'ipc_lock' or 'sys_nice' or 'net_bind_service' capability for clickhouse binary."
|
2020-10-20 18:09:15 +00:00
|
|
|
" This is optional. Taskstats accounting will be disabled."
|
|
|
|
" To enable taskstats accounting you may add the required capability later manually.\"",
|
2021-11-25 14:24:24 +00:00
|
|
|
fs::canonical(main_bin_path).string());
|
2020-08-08 18:38:34 +00:00
|
|
|
executeScript(command);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/// If password was set, ask for open for connections.
|
|
|
|
if (is_interactive && has_password_for_default_user)
|
|
|
|
{
|
|
|
|
if (ask("Allow server to accept connections from the network (default is localhost only), [y/N]: "))
|
|
|
|
{
|
|
|
|
std::string listen_file = config_d / "listen.xml";
|
|
|
|
WriteBufferFromFile out(listen_file);
|
2021-10-26 05:51:22 +00:00
|
|
|
out << "<clickhouse>\n"
|
2020-08-08 18:38:34 +00:00
|
|
|
" <listen_host>::</listen_host>\n"
|
2021-10-26 05:51:22 +00:00
|
|
|
"</clickhouse>\n";
|
2020-08-08 18:38:34 +00:00
|
|
|
out.sync();
|
|
|
|
out.finalize();
|
|
|
|
fmt::print("The choice is saved in file {}.\n", listen_file);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
/// Chmod and chown configs
|
|
|
|
changeOwnership(config_dir, user, group);
|
|
|
|
|
|
|
|
/// Symlink "preprocessed_configs" is created by the server, so "write" is needed.
|
|
|
|
fs::permissions(config_dir, fs::perms::owner_all, fs::perm_options::replace);
|
|
|
|
|
|
|
|
/// Subdirectories, so "execute" is needed.
|
|
|
|
if (fs::exists(config_d))
|
|
|
|
fs::permissions(config_d, fs::perms::owner_read | fs::perms::owner_exec, fs::perm_options::replace);
|
|
|
|
if (fs::exists(users_d))
|
|
|
|
fs::permissions(users_d, fs::perms::owner_read | fs::perms::owner_exec, fs::perm_options::replace);
|
|
|
|
|
|
|
|
/// Readonly.
|
|
|
|
if (fs::exists(main_config_file))
|
|
|
|
fs::permissions(main_config_file, fs::perms::owner_read, fs::perm_options::replace);
|
|
|
|
if (fs::exists(users_config_file))
|
|
|
|
fs::permissions(users_config_file, fs::perms::owner_read, fs::perm_options::replace);
|
|
|
|
|
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
std::string maybe_password;
|
|
|
|
if (has_password_for_default_user)
|
|
|
|
maybe_password = " --password";
|
|
|
|
|
2021-10-31 09:33:42 +00:00
|
|
|
fs::path pid_file = pid_path / "clickhouse-server.pid";
|
|
|
|
if (fs::exists(pid_file))
|
|
|
|
{
|
2021-10-29 00:00:57 +00:00
|
|
|
fmt::print(
|
2021-10-29 19:49:28 +00:00
|
|
|
"\nClickHouse has been successfully installed.\n"
|
|
|
|
"\nRestart clickhouse-server with:\n"
|
2022-01-06 01:26:02 +00:00
|
|
|
" {}\n"
|
2021-10-29 19:49:28 +00:00
|
|
|
"\nStart clickhouse-client with:\n"
|
|
|
|
" clickhouse-client{}\n\n",
|
2022-01-06 01:26:02 +00:00
|
|
|
formatWithSudo("clickhouse restart"),
|
2021-10-29 19:49:28 +00:00
|
|
|
maybe_password);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2021-10-29 00:00:57 +00:00
|
|
|
fmt::print(
|
2021-10-29 19:49:28 +00:00
|
|
|
"\nClickHouse has been successfully installed.\n"
|
|
|
|
"\nStart clickhouse-server with:\n"
|
2022-01-06 01:26:02 +00:00
|
|
|
" {}\n"
|
2021-10-29 19:49:28 +00:00
|
|
|
"\nStart clickhouse-client with:\n"
|
|
|
|
" clickhouse-client{}\n\n",
|
2022-01-06 01:26:02 +00:00
|
|
|
formatWithSudo("clickhouse start"),
|
2021-10-29 19:49:28 +00:00
|
|
|
maybe_password);
|
2021-10-29 00:00:57 +00:00
|
|
|
}
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
2020-11-26 02:11:55 +00:00
|
|
|
catch (const fs::filesystem_error &)
|
|
|
|
{
|
|
|
|
std::cerr << getCurrentExceptionMessage(false) << '\n';
|
|
|
|
|
|
|
|
if (getuid() != 0)
|
2022-01-06 01:26:02 +00:00
|
|
|
std::cerr << "\nRun with " << formatWithSudo("...") << "\n";
|
2020-11-26 02:11:55 +00:00
|
|
|
|
|
|
|
return getCurrentExceptionCode();
|
2020-08-08 18:38:34 +00:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
2020-08-11 22:04:38 +00:00
|
|
|
std::cerr << getCurrentExceptionMessage(false) << '\n';
|
2020-08-08 18:38:34 +00:00
|
|
|
return getCurrentExceptionCode();
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
namespace
|
|
|
|
{
|
2022-11-16 06:44:43 +00:00
|
|
|
int start(const std::string & user, const fs::path & executable, const fs::path & config, const fs::path & pid_file, unsigned max_tries)
|
2020-08-08 20:42:10 +00:00
|
|
|
{
|
|
|
|
if (fs::exists(pid_file))
|
|
|
|
{
|
|
|
|
ReadBufferFromFile in(pid_file.string());
|
2022-10-07 10:46:45 +00:00
|
|
|
Int32 pid;
|
2020-08-08 20:42:10 +00:00
|
|
|
if (tryReadIntText(pid, in))
|
|
|
|
{
|
|
|
|
fmt::print("{} file exists and contains pid = {}.\n", pid_file.string(), pid);
|
|
|
|
|
|
|
|
if (0 == kill(pid, 0))
|
|
|
|
{
|
|
|
|
fmt::print("The process with pid = {} is already running.\n", pid);
|
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fmt::print("{} file exists but damaged, ignoring.\n", pid_file.string());
|
|
|
|
fs::remove(pid_file);
|
|
|
|
}
|
|
|
|
}
|
2020-08-18 09:43:02 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
/// Create a directory for pid file.
|
|
|
|
/// It's created by "install" but we also support cases when ClickHouse is already installed different way.
|
|
|
|
fs::path pid_path = pid_file;
|
|
|
|
pid_path.remove_filename();
|
|
|
|
fs::create_directories(pid_path);
|
|
|
|
/// All users are allowed to read pid file (for clickhouse status command).
|
|
|
|
fs::permissions(pid_path, fs::perms::owner_all | fs::perms::group_read | fs::perms::others_read, fs::perm_options::replace);
|
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
changeOwnership(pid_path, user);
|
2020-08-18 09:43:02 +00:00
|
|
|
}
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
std::string command = fmt::format("{} --config-file {} --pid-file {} --daemon",
|
|
|
|
executable.string(), config.string(), pid_file.string());
|
|
|
|
|
|
|
|
if (!user.empty())
|
2022-09-27 20:35:22 +00:00
|
|
|
{
|
|
|
|
/// sudo respects limits in /etc/security/limits.conf e.g. open files,
|
2022-09-28 09:28:59 +00:00
|
|
|
/// that's why we are using it instead of the 'clickhouse su' tool.
|
2022-09-27 16:07:12 +00:00
|
|
|
command = fmt::format("sudo -u '{}' {}", user, command);
|
2022-09-27 20:35:22 +00:00
|
|
|
}
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
fmt::print("Will run {}\n", command);
|
|
|
|
executeScript(command, true);
|
|
|
|
|
|
|
|
/// Wait to start.
|
|
|
|
|
|
|
|
size_t try_num = 0;
|
2022-11-16 06:44:43 +00:00
|
|
|
for (; try_num < max_tries; ++try_num)
|
2020-08-08 20:42:10 +00:00
|
|
|
{
|
|
|
|
fmt::print("Waiting for server to start\n");
|
|
|
|
if (fs::exists(pid_file))
|
|
|
|
{
|
|
|
|
fmt::print("Server started\n");
|
|
|
|
break;
|
|
|
|
}
|
2021-01-04 14:05:06 +00:00
|
|
|
sleepForSeconds(1);
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
|
2022-11-16 06:44:43 +00:00
|
|
|
if (try_num == max_tries)
|
2020-08-08 20:42:10 +00:00
|
|
|
{
|
|
|
|
fmt::print("Cannot start server. You can execute {} without --daemon option to run manually.\n", command);
|
2020-08-18 09:43:02 +00:00
|
|
|
|
|
|
|
fs::path log_path;
|
|
|
|
|
|
|
|
{
|
|
|
|
ConfigProcessor processor(config.string(), /* throw_on_bad_incl = */ false, /* log_to_console = */ false);
|
|
|
|
ConfigurationPtr configuration(new Poco::Util::XMLConfiguration(processor.processConfig()));
|
|
|
|
|
|
|
|
if (configuration->has("logger.log"))
|
|
|
|
log_path = fs::path(configuration->getString("logger.log")).remove_filename();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (log_path.empty())
|
|
|
|
{
|
|
|
|
fmt::print("Cannot obtain path to logs (logger.log) from config file {}.\n", config.string());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fs::path stderr_path = log_path;
|
|
|
|
stderr_path.replace_filename("stderr.log");
|
|
|
|
fmt::print("Look for logs at {} and for {}.\n", log_path.string(), stderr_path.string());
|
|
|
|
}
|
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
return 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-10-07 10:46:45 +00:00
|
|
|
int isRunning(const fs::path & pid_file)
|
2020-08-08 20:42:10 +00:00
|
|
|
{
|
2022-10-07 10:46:45 +00:00
|
|
|
int pid = 0;
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
if (fs::exists(pid_file))
|
|
|
|
{
|
2021-06-14 21:58:29 +00:00
|
|
|
try
|
2020-08-08 20:42:10 +00:00
|
|
|
{
|
2021-06-14 21:58:29 +00:00
|
|
|
ReadBufferFromFile in(pid_file.string());
|
|
|
|
if (tryReadIntText(pid, in))
|
|
|
|
{
|
|
|
|
fmt::print("{} file exists and contains pid = {}.\n", pid_file.string(), pid);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fmt::print("{} file exists but damaged, ignoring.\n", pid_file.string());
|
|
|
|
fs::remove(pid_file);
|
|
|
|
}
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
2021-06-14 21:58:29 +00:00
|
|
|
catch (const Exception & e)
|
2020-08-08 20:42:10 +00:00
|
|
|
{
|
2021-06-14 21:58:29 +00:00
|
|
|
if (e.code() != ErrorCodes::FILE_DOESNT_EXIST)
|
|
|
|
throw;
|
|
|
|
|
|
|
|
/// If file does not exist (TOCTOU) - it's ok.
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!pid)
|
|
|
|
{
|
|
|
|
auto sh = ShellCommand::execute("pidof clickhouse-server");
|
|
|
|
|
|
|
|
if (tryReadIntText(pid, sh->out))
|
|
|
|
{
|
|
|
|
fmt::print("Found pid = {} in the list of running processes.\n", pid);
|
|
|
|
}
|
|
|
|
else if (!sh->out.eof())
|
|
|
|
{
|
|
|
|
fmt::print("The pidof command returned unusual output.\n");
|
|
|
|
}
|
|
|
|
|
2021-04-28 23:32:41 +00:00
|
|
|
WriteBufferFromFileDescriptor std_err(STDERR_FILENO);
|
|
|
|
copyData(sh->err, std_err);
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
sh->tryWait();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pid)
|
|
|
|
{
|
|
|
|
if (0 == kill(pid, 0))
|
|
|
|
{
|
|
|
|
fmt::print("The process with pid = {} is running.\n", pid);
|
|
|
|
}
|
2021-04-24 01:15:48 +00:00
|
|
|
else if (errno == ESRCH)
|
2021-04-23 17:25:30 +00:00
|
|
|
{
|
2021-04-24 01:56:16 +00:00
|
|
|
fmt::print("The process with pid = {} does not exist.\n", pid);
|
2021-04-24 23:42:18 +00:00
|
|
|
return 0;
|
2021-04-23 17:25:30 +00:00
|
|
|
}
|
2021-04-24 23:42:18 +00:00
|
|
|
else
|
|
|
|
throwFromErrno(fmt::format("Cannot obtain the status of pid {} with `kill`", pid), ErrorCodes::CANNOT_KILL);
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!pid)
|
|
|
|
{
|
|
|
|
fmt::print("Now there is no clickhouse-server process.\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
return pid;
|
|
|
|
}
|
|
|
|
|
2022-12-26 11:15:58 +00:00
|
|
|
bool sendSignalAndWaitForStop(const fs::path & pid_file, int signal, unsigned max_tries, unsigned wait_ms, const char * signal_name)
|
2020-08-08 20:42:10 +00:00
|
|
|
{
|
2022-10-07 10:46:45 +00:00
|
|
|
int pid = isRunning(pid_file);
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
if (!pid)
|
2022-12-26 11:15:58 +00:00
|
|
|
return true;
|
2020-11-26 04:54:18 +00:00
|
|
|
|
|
|
|
if (0 == kill(pid, signal))
|
|
|
|
fmt::print("Sent {} signal to process with pid {}.\n", signal_name, pid);
|
2020-08-08 20:42:10 +00:00
|
|
|
else
|
2020-11-26 04:54:18 +00:00
|
|
|
throwFromErrno(fmt::format("Cannot send {} signal", signal_name), ErrorCodes::SYSTEM_ERROR);
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
size_t try_num = 0;
|
2022-11-16 06:44:43 +00:00
|
|
|
for (; try_num < max_tries; ++try_num)
|
2020-08-08 20:42:10 +00:00
|
|
|
{
|
|
|
|
fmt::print("Waiting for server to stop\n");
|
|
|
|
if (!isRunning(pid_file))
|
|
|
|
{
|
|
|
|
fmt::print("Server stopped\n");
|
|
|
|
break;
|
|
|
|
}
|
2022-12-26 11:15:58 +00:00
|
|
|
sleepForMilliseconds(wait_ms);
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
|
2022-12-26 11:15:58 +00:00
|
|
|
return try_num < max_tries;
|
|
|
|
}
|
2022-05-09 17:43:51 +00:00
|
|
|
|
2022-12-26 11:15:58 +00:00
|
|
|
int stop(const fs::path & pid_file, bool force, bool do_not_kill, unsigned max_tries)
|
|
|
|
{
|
|
|
|
if (force && do_not_kill)
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Specified flags are incompatible");
|
2021-03-02 06:37:47 +00:00
|
|
|
|
2022-12-26 11:15:58 +00:00
|
|
|
int signal = force ? SIGKILL : SIGTERM;
|
|
|
|
const char * signal_name = force ? "kill" : "terminate";
|
2021-03-02 06:37:47 +00:00
|
|
|
|
2022-12-26 11:15:58 +00:00
|
|
|
if (sendSignalAndWaitForStop(pid_file, signal, max_tries, 1000, signal_name))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
int pid = isRunning(pid_file);
|
|
|
|
if (!pid)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (do_not_kill)
|
|
|
|
{
|
|
|
|
fmt::print("Process (pid = {}) is still running. Will not try to kill it.\n", pid);
|
|
|
|
return 1;
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
|
2022-12-26 11:15:58 +00:00
|
|
|
/// Send termination signal again, the server will receive it and immediately terminate.
|
|
|
|
fmt::print("Will send the termination signal again to force the termination (pid = {}).\n", pid);
|
|
|
|
if (sendSignalAndWaitForStop(pid_file, signal, std::min(10U, max_tries), 1000, signal_name))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/// Send kill signal. Total wait is 100 seconds.
|
|
|
|
constexpr size_t num_kill_check_tries = 1000;
|
|
|
|
constexpr size_t kill_check_delay_ms = 100;
|
|
|
|
fmt::print("Will terminate forcefully (pid = {}).\n", pid);
|
|
|
|
if (sendSignalAndWaitForStop(pid_file, SIGKILL, num_kill_check_tries, kill_check_delay_ms, signal_name))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!isRunning(pid_file))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
throw Exception(ErrorCodes::CANNOT_KILL,
|
|
|
|
"The server process still exists after {} tries (delay: {} ms)",
|
|
|
|
num_kill_check_tries, kill_check_delay_ms);
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int mainEntryClickHouseStart(int argc, char ** argv)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
po::options_description desc;
|
|
|
|
desc.add_options()
|
|
|
|
("help,h", "produce help message")
|
|
|
|
("prefix", po::value<std::string>()->default_value("/"), "prefix for all paths")
|
|
|
|
("binary-path", po::value<std::string>()->default_value("usr/bin"), "directory with binary")
|
|
|
|
("config-path", po::value<std::string>()->default_value("etc/clickhouse-server"), "directory with configs")
|
|
|
|
("pid-path", po::value<std::string>()->default_value("var/run/clickhouse-server"), "directory for pid file")
|
|
|
|
("user", po::value<std::string>()->default_value(DEFAULT_CLICKHOUSE_SERVER_USER), "clickhouse user")
|
2022-11-16 06:44:43 +00:00
|
|
|
("max-tries", po::value<unsigned>()->default_value(60), "Max number of tries for waiting the server (with 1 second delay)")
|
2021-10-16 17:03:45 +00:00
|
|
|
;
|
|
|
|
|
|
|
|
po::variables_map options;
|
|
|
|
po::store(po::parse_command_line(argc, argv, desc), options);
|
|
|
|
|
|
|
|
if (options.count("help"))
|
|
|
|
{
|
2022-01-06 01:26:02 +00:00
|
|
|
std::cout << "Usage: " << formatWithSudo(std::string(argv[0]) + " start", getuid() != 0) << '\n';
|
2021-10-16 17:03:45 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
std::string user = options["user"].as<std::string>();
|
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
fs::path prefix = options["prefix"].as<std::string>();
|
|
|
|
fs::path executable = prefix / options["binary-path"].as<std::string>() / "clickhouse-server";
|
|
|
|
fs::path config = prefix / options["config-path"].as<std::string>() / "config.xml";
|
|
|
|
fs::path pid_file = prefix / options["pid-path"].as<std::string>() / "clickhouse-server.pid";
|
2022-11-16 06:44:43 +00:00
|
|
|
unsigned max_tries = options["max-tries"].as<unsigned>();
|
2020-08-08 20:42:10 +00:00
|
|
|
|
2022-11-16 06:44:43 +00:00
|
|
|
return start(user, executable, config, pid_file, max_tries);
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
2020-08-11 22:04:38 +00:00
|
|
|
std::cerr << getCurrentExceptionMessage(false) << '\n';
|
2020-08-08 20:42:10 +00:00
|
|
|
return getCurrentExceptionCode();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int mainEntryClickHouseStop(int argc, char ** argv)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
po::options_description desc;
|
|
|
|
desc.add_options()
|
|
|
|
("help,h", "produce help message")
|
|
|
|
("prefix", po::value<std::string>()->default_value("/"), "prefix for all paths")
|
|
|
|
("pid-path", po::value<std::string>()->default_value("var/run/clickhouse-server"), "directory for pid file")
|
|
|
|
("force", po::bool_switch(), "Stop with KILL signal instead of TERM")
|
2022-05-09 17:43:51 +00:00
|
|
|
("do-not-kill", po::bool_switch(), "Do not send KILL even if TERM did not help")
|
2022-11-16 06:44:43 +00:00
|
|
|
("max-tries", po::value<unsigned>()->default_value(60), "Max number of tries for waiting the server to finish after sending TERM (with 1 second delay)")
|
2021-10-16 17:03:45 +00:00
|
|
|
;
|
|
|
|
|
|
|
|
po::variables_map options;
|
|
|
|
po::store(po::parse_command_line(argc, argv, desc), options);
|
|
|
|
|
|
|
|
if (options.count("help"))
|
|
|
|
{
|
2022-01-06 01:26:02 +00:00
|
|
|
std::cout << "Usage: " << formatWithSudo(std::string(argv[0]) + " stop", getuid() != 0) << '\n';
|
2021-10-16 17:03:45 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
fs::path prefix = options["prefix"].as<std::string>();
|
|
|
|
fs::path pid_file = prefix / options["pid-path"].as<std::string>() / "clickhouse-server.pid";
|
2020-08-08 20:42:10 +00:00
|
|
|
|
2022-05-09 17:43:51 +00:00
|
|
|
bool force = options["force"].as<bool>();
|
|
|
|
bool do_not_kill = options["do-not-kill"].as<bool>();
|
2022-11-16 06:44:43 +00:00
|
|
|
unsigned max_tries = options["max-tries"].as<unsigned>();
|
|
|
|
return stop(pid_file, force, do_not_kill, max_tries);
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
2020-08-11 22:04:38 +00:00
|
|
|
std::cerr << getCurrentExceptionMessage(false) << '\n';
|
2020-08-08 20:42:10 +00:00
|
|
|
return getCurrentExceptionCode();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int mainEntryClickHouseStatus(int argc, char ** argv)
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
try
|
|
|
|
{
|
|
|
|
po::options_description desc;
|
|
|
|
desc.add_options()
|
|
|
|
("help,h", "produce help message")
|
|
|
|
("prefix", po::value<std::string>()->default_value("/"), "prefix for all paths")
|
|
|
|
("pid-path", po::value<std::string>()->default_value("var/run/clickhouse-server"), "directory for pid file")
|
|
|
|
;
|
2020-08-08 20:42:10 +00:00
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
po::variables_map options;
|
|
|
|
po::store(po::parse_command_line(argc, argv, desc), options);
|
2020-08-08 20:42:10 +00:00
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
if (options.count("help"))
|
|
|
|
{
|
2022-01-06 01:26:02 +00:00
|
|
|
std::cout << "Usage: " << formatWithSudo(std::string(argv[0]) + " status", getuid() != 0) << '\n';
|
2021-10-16 17:03:45 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
fs::path prefix = options["prefix"].as<std::string>();
|
|
|
|
fs::path pid_file = prefix / options["pid-path"].as<std::string>() / "clickhouse-server.pid";
|
2020-08-08 20:42:10 +00:00
|
|
|
|
|
|
|
isRunning(pid_file);
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
2020-08-11 22:04:38 +00:00
|
|
|
std::cerr << getCurrentExceptionMessage(false) << '\n';
|
2020-08-08 20:42:10 +00:00
|
|
|
return getCurrentExceptionCode();
|
|
|
|
}
|
2021-10-16 17:03:45 +00:00
|
|
|
|
|
|
|
return 0;
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int mainEntryClickHouseRestart(int argc, char ** argv)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
2021-10-16 17:03:45 +00:00
|
|
|
po::options_description desc;
|
|
|
|
desc.add_options()
|
|
|
|
("help,h", "produce help message")
|
|
|
|
("prefix", po::value<std::string>()->default_value("/"), "prefix for all paths")
|
|
|
|
("binary-path", po::value<std::string>()->default_value("usr/bin"), "directory with binary")
|
|
|
|
("config-path", po::value<std::string>()->default_value("etc/clickhouse-server"), "directory with configs")
|
|
|
|
("pid-path", po::value<std::string>()->default_value("var/run/clickhouse-server"), "directory for pid file")
|
|
|
|
("user", po::value<std::string>()->default_value(DEFAULT_CLICKHOUSE_SERVER_USER), "clickhouse user")
|
|
|
|
("force", po::value<bool>()->default_value(false), "Stop with KILL signal instead of TERM")
|
2022-05-09 17:43:51 +00:00
|
|
|
("do-not-kill", po::bool_switch(), "Do not send KILL even if TERM did not help")
|
2022-11-16 06:44:43 +00:00
|
|
|
("max-tries", po::value<unsigned>()->default_value(60), "Max number of tries for waiting the server (with 1 second delay)")
|
2021-10-16 17:03:45 +00:00
|
|
|
;
|
|
|
|
|
|
|
|
po::variables_map options;
|
|
|
|
po::store(po::parse_command_line(argc, argv, desc), options);
|
|
|
|
|
|
|
|
if (options.count("help"))
|
|
|
|
{
|
2022-01-06 01:26:02 +00:00
|
|
|
std::cout << "Usage: " << formatWithSudo(std::string(argv[0]) + " restart", getuid() != 0) << '\n';
|
2021-10-16 17:03:45 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-08-08 20:42:10 +00:00
|
|
|
std::string user = options["user"].as<std::string>();
|
|
|
|
|
2021-10-16 17:03:45 +00:00
|
|
|
fs::path prefix = options["prefix"].as<std::string>();
|
|
|
|
fs::path executable = prefix / options["binary-path"].as<std::string>() / "clickhouse-server";
|
|
|
|
fs::path config = prefix / options["config-path"].as<std::string>() / "config.xml";
|
|
|
|
fs::path pid_file = prefix / options["pid-path"].as<std::string>() / "clickhouse-server.pid";
|
2020-08-08 20:42:10 +00:00
|
|
|
|
2022-05-09 17:43:51 +00:00
|
|
|
bool force = options["force"].as<bool>();
|
|
|
|
bool do_not_kill = options["do-not-kill"].as<bool>();
|
2022-11-16 06:44:43 +00:00
|
|
|
unsigned max_tries = options["max-tries"].as<unsigned>();
|
2021-10-16 17:03:45 +00:00
|
|
|
|
2022-11-16 06:44:43 +00:00
|
|
|
if (int res = stop(pid_file, force, do_not_kill, max_tries))
|
|
|
|
return res;
|
|
|
|
return start(user, executable, config, pid_file, max_tries);
|
2020-08-08 20:42:10 +00:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
2020-08-11 22:04:38 +00:00
|
|
|
std::cerr << getCurrentExceptionMessage(false) << '\n';
|
2020-08-08 20:42:10 +00:00
|
|
|
return getCurrentExceptionCode();
|
|
|
|
}
|
|
|
|
}
|