/* Sent Hello SD: Bacula Director <dirname> calling <version> */
if (!sd->fsend(hello, "SD: Bacula ", dirname, DIR_VERSION, tlspsk_local_need)) {
status = M_FATAL;
- MmsgD3(dbglvl, errmsg, _("[DE0011] Error sending Hello to Storage daemon at \"%s:%d\". ERR=%s\n"),
+ MmsgD3(dbglvl, errmsg, _("[DE0031] Error sending Hello to Storage daemon at \"%s:%d\". ERR=%s\n"),
sd->host(), sd->port(), sd->bstrerror());
return false;
}
Dmsg1(116, ">stored: %s", sd->msg);
if (sd->recv() <= 0) {
status = M_FATAL;
- Mmsg(errmsg, _("[DE0011] bdird<stored: \"%s:%s\" bad response to Hello command: ERR=%s\n"),
+ Mmsg(errmsg, _("[DE0031] bdird<stored: \"%s:%s\" bad response to Hello command: ERR=%s\n"),
sd->who(), sd->host(), sd->bstrerror());
return 0;
}
strncmp(sd->msg, OKhello, sizeof(OKhello)) != 0)
{
status = M_FATAL;
- MmsgD2(dbglvl, errmsg, _("[DE0011] Storage daemon at \"%s:%d\" rejected Hello command\n"),
+ MmsgD2(dbglvl, errmsg, _("[DE0031] Storage daemon at \"%s:%d\" rejected Hello command\n"),
sd->host(), sd->port());
return 0;
}
}
if (jcr->SDVersion < SD_VERSION) {
status = M_FATAL;
- Mmsg(errmsg, _("[DE0011] Older Storage daemon at \"%s:%d\" incompatible with this Director.\n"),
+ Mmsg(errmsg, _("[DE0031] Older Storage daemon at \"%s:%d\" incompatible with this Director.\n"),
sd->host(), sd->port());
return 0;
}
StartAuthTimeout();
if (!fd->fsend(hello, "", dirname, DIR_VERSION, tlspsk_local_need)) {
status = M_FATAL;
- MmsgD3(dbglvl, errmsg, _("[DE0011] Error sending Hello to File daemon at \"%s:%d\". ERR=%s\n"),
+ MmsgD3(dbglvl, errmsg, _("[DE0031] Error sending Hello to File daemon at \"%s:%d\". ERR=%s\n"),
fd->host(), fd->port(), fd->bstrerror());
return false;
}
Dmsg1(116, ">filed: %s", fd->msg);
if (fd->recv() <= 0) {
status = M_FATAL;
- MmsgD3(dbglvl, errmsg, _("[DE0011] Bad response from File daemon at \"%s:%d\" to Hello command: ERR=%s\n"),
+ MmsgD3(dbglvl, errmsg, _("[DE0031] Bad response from File daemon at \"%s:%d\" to Hello command: ERR=%s\n"),
fd->host(), fd->port(), fd->bstrerror());
return 0;
}
sscanf(fd->msg, FDOKnewHello, &jcr->FDVersion) != 1)
{
status = M_FATAL;
- MmsgD2(dbglvl, errmsg, _("[DE0011] File daemon at \"%s:%d\" rejected Hello command\n"),
+ MmsgD2(dbglvl, errmsg, _("[DE0031] File daemon at \"%s:%d\" rejected Hello command\n"),
fd->host(), fd->port());
return 0;
}
if (ua->msglen < 16 || ua->msglen >= MAX_NAME_LENGTH + 15) {
status = M_SECURITY;
- Mmsg(errmsg, _("[DE0011] UA Hello from %s:%s is invalid. Len=%d\n"), ua->who(),
+ Mmsg(errmsg, _("[DE0031] UA Hello from %s:%s is invalid. Len=%d\n"), ua->who(),
ua->host(), ua->msglen);
sleep(5);
return 0;
{
ua->msg[100] = 0; /* terminate string */
status = M_SECURITY;
- Mmsg(errmsg, _("[DE0011] UA Hello from %s:%s is invalid. Got: %s\n"), ua->who(),
+ Mmsg(errmsg, _("[DE0031] UA Hello from %s:%s is invalid. Got: %s\n"), ua->who(),
ua->host(), ua->msg);
sleep(5);
return 0;
if (!auth_success) {
ua->fsend("%s", _(Dir_sorry));
status = M_SECURITY;
- Mmsg(errmsg, _("[DE0015] Unable to authenticate console \"%s\" at %s:%s:%d.\n"),
+ Mmsg(errmsg, _("[DE0020] Unable to authenticate console \"%s\" at %s:%s:%d.\n"),
name, ua->who(), ua->host(), ua->port());
sleep(5);
return 0;
if (authData == NULL)
{
status = M_FATAL;
- Mmsg(errmsg, "[DE0011] Incorrect authentication plugin initialization\n");
+ Mmsg(errmsg, "[DE0031] Incorrect authentication plugin initialization\n");
return false;
}
// We require to have TLS setup to use authentication plugins
if (!tls_started) {
status = M_FATAL;
- MmsgD0(dbglvl, errmsg, _("[DE0011] Unable to use Plugin Authentication because TLS is not available\n"));
+ MmsgD0(dbglvl, errmsg, _("[DE0031] Unable to use Plugin Authentication because TLS is not available\n"));
return false;
}
// send auth plugin start packet and optional welcome string to console
if (!bsock->fsend("auth interactive %s\n", NPRTB(authData->welcome))) {
status = M_FATAL;
- MmsgD1(dbglvl, errmsg, "[DE0011] Send interactive start comm error. ERR=%s\n", bsock->bstrerror());
+ MmsgD1(dbglvl, errmsg, "[DE0031] Send interactive start comm error. ERR=%s\n", bsock->bstrerror());
return false;
}
Dmsg1(dbglvl, "bDirAuthenticationData step %d\n", i);
if (dir_authplugin_do_interaction(uac->jcr, bsock, authData->name, (void *)&data[i]) != bRC_OK){
status = M_FATAL;
- Mmsg(errmsg, "[DE0011] Invalid authentication protocol\n");
+ Mmsg(errmsg, "[DE0031] Invalid authentication protocol\n");
return false;
}
}
if (dir_authplugin_authenticate(uac->jcr, bsock, authData->name) != bRC_OK){
status = M_FATAL;
- Mmsg(errmsg, "[DE0015] Authorization failed\n");
+ Mmsg(errmsg, "[DE0020] Authorization failed\n");
bsock->fsend(_("1999 Authorization failed !!!.\n"));
bmicrosleep(5, 0);
return false;
jcr->jr.PoolId = get_or_create_pool_record(jcr, jcr->pool->name());
if (jcr->jr.PoolId == 0) {
Dmsg1(100, "JobId=%d no PoolId\n", (int)jcr->JobId);
- Jmsg(jcr, M_FATAL, 0, _("[DE0008] Could not get or create a Pool record.\n"));
+ Jmsg(jcr, M_FATAL, 0, _("[DE0028] Could not get or create a Pool record.\n"));
return false;
}
jcr->file_bsock->fsend("accurate files=%s\n", nb.list);
if (!db_open_batch_connection(jcr, jcr->db)) {
- Jmsg0(jcr, M_FATAL, 0, "[DE0008] Can't get batch sql connection");
+ Jmsg0(jcr, M_FATAL, 0, "[DE0028] Can't get batch sql connection");
return false; /* Fail */
}
if (jcr->HasBase) {
jcr->nb_base_files = str_to_int64(nb.list);
if (!db_create_base_file_list(jcr, jcr->db, jobids.list)) {
- Jmsg1(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg1(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return false;
}
if (!db_get_base_file_list(jcr, jcr->db, jcr->use_accurate_chksum,
accurate_list_handler, (void *)jcr)) {
- Jmsg1(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg1(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return false;
}
if (!db_get_file_list(jcr, jcr->db_batch,
jobids.list, opts,
accurate_list_handler, (void *)jcr)) {
- Jmsg1(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db_batch));
+ Jmsg1(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db_batch));
return false;
}
}
jcr->setJobStatus(JS_Running);
Dmsg2(100, "JobId=%d JobLevel=%c\n", jcr->jr.JobId, jcr->jr.JobLevel);
if (!db_update_job_start_record(jcr, jcr->db, &jcr->jr)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return false;
}
Jmsg(jcr, M_INFO, 0, _("Found %ld files from prior incomplete Job.\n"),
(int32_t)job.value);
} else {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return false;
}
Mmsg(buf, "SELECT max(LastIndex) FROM JobMedia WHERE JobId=%s", ed1);
if (!db_sql_query(jcr->db, buf.c_str(), db_int64_handler, &last)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return false;
}
Mmsg(buf, "SELECT max(FirstIndex) FROM JobMedia WHERE JobId=%s", ed1);
if (!db_sql_query(jcr->db, buf.c_str(), db_int64_handler, &first)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return false;
}
/* We skip the last FileIndex (MAX) and the one after (MAX+1), can be
Dmsg1(100, "==== FI=%ld\n", jcr->JobFiles);
Mmsg(buf, "SELECT VolSessionId FROM Job WHERE JobId=%s", ed1);
if (!db_sql_query(jcr->db, buf.c_str(), db_int64_handler, &job)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return false;
}
jcr->VolSessionId = job.value;
Mmsg(buf, "SELECT VolSessionTime FROM Job WHERE JobId=%s", ed1);
if (!db_sql_query(jcr->db, buf.c_str(), db_int64_handler, &job)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return false;
}
jcr->VolSessionTime = job.value;
if (jcr->sd_calls_client) {
if (jcr->FDVersion < 10) {
- Jmsg(jcr, M_FATAL, 0, _("[DE0011] The File daemon does not support SDCallsClient.\n"));
+ Jmsg(jcr, M_FATAL, 0, _("[DE0031] The File daemon does not support SDCallsClient.\n"));
goto bail_out;
}
if (!send_client_addr_to_sd(jcr)) {
bstrncpy(jcr->jr.WriteDevice, jcr->write_dev, sizeof(jcr->jr.WriteDevice));
if (!db_update_job_start_record(jcr, jcr->db, &jcr->jr)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
}
/*
jcr->Encrypt = Encrypt;
} else if (!jcr->is_canceled()) {
- Jmsg(jcr, M_FATAL, 0, _("[DE0011] No Job status returned from FD\n"));
+ Jmsg(jcr, M_FATAL, 0, _("[DE0031] No Job status returned from FD\n"));
}
/* Return the first error status we find Dir, FD, or SD */
/* Get the last valid FileIndex */
Mmsg(buf, "SELECT max(FileIndex) FROM File WHERE JobId=%s", ed1);
if (!db_sql_query(jcr->db, buf.c_str(), db_int64_handler, &job)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return;
}
"AND (FirstIndex > %lld OR LastIndex > %lld)",
ed1, job.value, job.value);
if (!db_sql_query(jcr->db, buf.c_str(), db_string_list_handler, &pids)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
return;
}
/* Nothing to fix */
bail_out:
if (!ok) {
db_sql_query(jcr->db, "ROLLBACK", NULL, NULL);
- Jmsg(jcr, M_FATAL, 0, _("[DE0008] Unable to cleanup JobMedia records\n"));
+ Jmsg(jcr, M_FATAL, 0, _("[DE0028] Unable to cleanup JobMedia records\n"));
}
db_end_transaction(jcr, jcr->db);
db_unlock(jcr->db);
int status;
if (!jcr->client) {
- Mmsg(jcr->errmsg, _("[DE0017] File daemon not defined for current Job\n"));
+ Mmsg(jcr->errmsg, _("[DE0037] File daemon not defined for current Job\n"));
Dmsg0(10, "No Client defined for the job.\n");
return 0;
}
job_end_push(jcr, delete_bsock_end_cb, (void *)jcr->file_bsock);
}
if (!fd) {
- Mmsg(jcr->errmsg, "[DE0010] No socket found of the client\n");
+ Mmsg(jcr->errmsg, "[DE0030] No socket found of the client\n");
return 0;
}
jcr->file_bsock = fd;
if (bget_dirmsg(jcr, fd, BSOCK_TYPE_FD) > 0) {
Dmsg1(110, "<filed: %s", fd->msg);
if (strncmp(fd->msg, OKjob, strlen(OKjob)) != 0) {
- Mmsg(jcr->errmsg, _("[DE0011] File daemon \"%s\" rejected Job command: %s\n"),
+ Mmsg(jcr->errmsg, _("[DE0031] File daemon \"%s\" rejected Job command: %s\n"),
jcr->client->hdr.name, fd->msg);
return 0;
bstrncpy(cr.Uname, fd->msg+strlen(OKjob)+1, sizeof(cr.Uname));
if (!db_update_client_record(jcr, jcr->db, &cr)) {
- Jmsg(jcr, M_WARNING, 0, _("[DE0008] Error updating Client record. ERR=%s\n"),
+ Jmsg(jcr, M_WARNING, 0, _("[DE0028] Error updating Client record. ERR=%s\n"),
db_strerror(jcr->db));
}
}
} else {
- Mmsg(jcr->errmsg, _("[DE0011] FD gave bad response to JobId command: %s\n"),
+ Mmsg(jcr->errmsg, _("[DE0031] FD gave bad response to JobId command: %s\n"),
fd->bstrerror());
return 0;
}
return true;
}
if (prtmsg == DISPLAY_ERROR) {
- Jmsg(jcr, M_FATAL, 0, _("[DE0011] Bad response to %s command: wanted %s, got %s\n"),
+ Jmsg(jcr, M_FATAL, 0, _("[DE0031] Bad response to %s command: wanted %s, got %s\n"),
cmd, resp, bs->msg);
}
return false;
}
- Jmsg(jcr, M_FATAL, 0, _("[DE0018] Socket error on %s command: ERR=%s\n"),
+ Jmsg(jcr, M_FATAL, 0, _("[DE0038] Socket error on %s command: ERR=%s\n"),
cmd, bs->bstrerror());
return false;
}
jcr->catalog->disable_batch_insert);
if (!jcr->db || !db_open_database(jcr, jcr->db)) {
- Jmsg(jcr, M_FATAL, 0, _("[DE0008] Could not open database \"%s\".\n"),
+ Jmsg(jcr, M_FATAL, 0, _("[DE0028] Could not open database \"%s\".\n"),
jcr->catalog->db_name);
if (jcr->db) {
Jmsg(jcr, M_FATAL, 0, "%s", db_strerror(jcr->db));
}
if (!db_create_job_record(jcr, jcr->db, &jcr->jr)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
goto bail_out;
}
jcr->JobId = jcr->jr.JobId;
jcr->catalog->mult_db_connections,
jcr->catalog->disable_batch_insert);
if (!jcr->db || !db_open_database(jcr, jcr->db)) {
- Jmsg(jcr, M_FATAL, 0, _("[DE0008] Could not open database \"%s\".\n"),
+ Jmsg(jcr, M_FATAL, 0, _("[DE0028] Could not open database \"%s\".\n"),
jcr->catalog->db_name);
if (jcr->db) {
Jmsg(jcr, M_FATAL, 0, "%s", db_strerror(jcr->db));
}
if (!db_update_job_start_record(jcr, jcr->db, &jcr->jr)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
}
/* Run any script BeforeJob on dird */
jcr->start_time = time(NULL);
jcr->jr.StartTime = jcr->start_time;
if (!db_update_job_start_record(jcr, jcr->db, &jcr->jr)) {
- Jmsg(jcr, M_FATAL, 0, "[DE0008] %s", db_strerror(jcr->db));
+ Jmsg(jcr, M_FATAL, 0, "[DE0028] %s", db_strerror(jcr->db));
}
generate_plugin_event(jcr, bDirEventJobRun);
}
pm_strcpy(jcr->client_name, jcr->client->hdr.name);
if (!db_create_client_record(jcr, jcr->db, &cr)) {
- Jmsg(jcr, M_FATAL, 0, _("[DE0008] Could not create Client record. ERR=%s\n"),
+ Jmsg(jcr, M_FATAL, 0, _("[DE0028] Could not create Client record. ERR=%s\n"),
db_strerror(jcr->db));
return false;
}
if (jcr->cached_attribute) {
Dmsg0(400, "Flush last cached attribute.\n");
if (!db_create_attributes_record(jcr, jcr->db, jcr->ar)) {
- Jmsg1(jcr, M_FATAL, 0, _("[DE0008] Attribute create error. %s"), jcr->db->bdb_strerror());
+ Jmsg1(jcr, M_FATAL, 0, _("[DE0028] Attribute create error. %s"), jcr->db->bdb_strerror());
}
jcr->cached_attribute = false;
}
}
if (!store) {
- MmsgD1(100, jcr->errmsg, "[DE0017] No storage resource found in jcr for JobId: %d!\n", jcr->JobId);
+ MmsgD1(100, jcr->errmsg, "[DE0037] No storage resource found in jcr for JobId: %d!\n", jcr->JobId);
return false;
}
POOL_MEM buf;
if (!acl_access_client_ok(ua, client->name(), JT_BACKUP_RESTORE)) {
- ua->error_msg(_("[DE0016] No authorization for Client \"%s\"\n"), client->name());
+ ua->error_msg(_("[DE0021] No authorization for Client \"%s\"\n"), client->name());
return;
}
/* Connect to File daemon */
*/
if (have_restricted_acl(ua, Client_ACL) ||
have_restricted_acl(ua, Job_ACL)) {
- ua->error_msg(_("[DE0016] Restricted Client or Job does not permit access to Storage daemons\n"));
+ ua->error_msg(_("[DE0021] Restricted Client or Job does not permit access to Storage daemons\n"));
return;
}
int i;
if (!acl_access_client_ok(ua, client->name(), JT_BACKUP_RESTORE)) {
- ua->error_msg(_("[DE0016] No authorization for Client \"%s\"\n"), client->name());
+ ua->error_msg(_("[DE0021] No authorization for Client \"%s\"\n"), client->name());
return;
}
if (!director) {
char addr[64];
char *who = dir->get_peer(addr, sizeof(addr)) ? dir->who() : addr;
- Jmsg2(jcr, M_FATAL, 0, _("[FE0016] Connection from unknown Director %s at %s rejected.\n"),
+ Jmsg2(jcr, M_FATAL, 0, _("[FE0027] Connection from unknown Director %s at %s rejected.\n"),
dirname, who);
goto auth_fatal;
}
stat = sd->recv();
if (stat <= 0) {
berrno be;
- Jmsg1(jcr, M_FATAL, 0, _("[FE0011] Recv caps from SD failed. ERR=%s\n"),
+ Jmsg1(jcr, M_FATAL, 0, _("[FE0031] Recv caps from SD failed. ERR=%s\n"),
be.bstrerror());
Dmsg1(050, _("Recv caps from SD failed. ERR=%s\n"), be.bstrerror());
return false;
*/
Dmsg1(dbglvl, ">dird: %s", UA_sock->msg);
if (UA_sock->recv() <= 0) {
- Mmsg(errmsg, _("[FE0011] Bad response to Hello command: ERR=%s\n"),
+ Mmsg(errmsg, _("[FE0031] Bad response to Hello command: ERR=%s\n"),
UA_sock->bstrerror());
return false;
}
if (strncmp(UA_sock->msg, DirOKhello, sizeof(DirOKhello)-3) == 0) {
sscanf(UA_sock->msg, DirOKhello, &dir_version);
} else {
- Mmsg(errmsg, _("[FE0011] Director rejected Hello command\n"));
+ Mmsg(errmsg, _("[FE0031] Director rejected Hello command\n"));
return false;
}
/* Turn on compression for newer Directors */
switch (TestTLSRequirement()) {
case TLS_REQ_ERR_LOCAL:
status = msg_type;
- Mmsg(errmsg, _("[%cE0017] Authorization problem: %s \"%s:%s\" did not advertise required TLS support.\n"),
+ Mmsg(errmsg, _("[%cE0067] Authorization problem: %s \"%s:%s\" did not advertise required TLS support.\n"),
component_code, GetLocalClassShortName(), bsock->who(), bsock->host());
return false;
case TLS_REQ_ERR_REMOTE:
status = msg_type;
- Mmsg(errmsg, _("[%cE0017] Authorization problem: %s \"%s:%s\" did not advertise required TLS support.\n"),
+ Mmsg(errmsg, _("[%cE0067] Authorization problem: %s \"%s:%s\" did not advertise required TLS support.\n"),
component_code, GetRemoteClassShortName(), bsock->who(), bsock->host());
return false;
case TLS_REQ_OK:
if (bsock->recv() <= 0) {
bmicrosleep(5, 0); // original cram_md5_respond() wait for 5s here
status = M_FATAL;
- Mmsg(errmsg, "[%cE0011] Unable to get starttls protocol\n", component_code);
+ Mmsg(errmsg, "[%cE0071] Unable to get starttls protocol\n", component_code);
return false;
}
if (scan_string(bsock->msg, "starttls tlspsk=%d\n", &tlspsk_remote) != EOF) {
if (jcr && job_canceled(jcr)) {
auth_success = false;
status = M_FATAL;
- Mmsg(errmsg, "[DE0019] Job is canceled\n");
+ Mmsg(errmsg, "[DE0069] Job is canceled\n");
return false; /* quick exit */
}
}
if (jcr && job_canceled(jcr)) {
auth_success = false;
status = M_FATAL;
- Mmsg(errmsg, "[DE0019] Job is canceled\n");
+ Mmsg(errmsg, "[DE0069] Job is canceled\n");
return false; /* quick exit */
}
}
Dmsg2(authdl, "Authorization key rejected by %s at %s.\n",
GetRemoteClassShortName(), bsock->who());
status = M_FATAL;
- Mmsg(errmsg, _("[%cE0015] Authorization key rejected by %s at %s rejected.\n"
+ Mmsg(errmsg, _("[%cE0065] Authorization key rejected by %s at %s rejected.\n"
"For help, please see: " MANUAL_AUTH_URL "\n"),
component_code,
GetRemoteClassLongName(), bsock->who());
GetLocalClassLongName(), GetRemoteClassLongName());
status = M_FATAL;
Mmsg(errmsg,
- _("[%cE0015] %s unable to authenticate with %s at \"%s:%d\". Possible causes:\n"
+ _("[%cE0065] %s unable to authenticate with %s at \"%s:%d\". Possible causes:\n"
"Passwords or names not the same or\n"
"Maximum Concurrent Jobs exceeded on the %s or\n"
"%s networking messed up (restart daemon).\n"
if (!bsock->fsend("starttls tlspsk=%d\n", tlspsk_local_need)) {
// TODO tweak the error message
status = M_SECURITY;
- Mmsg(errmsg, _("[%cE0011] Connection with %s:%s starttls comm error. ERR=%s\n"),
+ Mmsg(errmsg, _("[%cE0071] Connection with %s:%s starttls comm error. ERR=%s\n"),
component_code, bsock->who(), bsock->host(), bsock->bstrerror());
sleep(5);
return false;
tls = new_tls_connection(ctx, bsock->m_fd);
if (!tls) {
- Mmsg(bsock->errmsg, _("[%cE0016] TLS connection initialization failed.\n"), component_code);
+ Mmsg(bsock->errmsg, _("[%cE0066] TLS connection initialization failed.\n"), component_code);
return false;
}
if (get_tls_psk_context(ctx)) {
if (!psk_shared_key || !psk_set_shared_key(tls, psk_shared_key)) {
- MmsgD1(10, bsock->errmsg, _("[%cE0016] Cannot setup TLS-PSK shared key\n"), component_code);
+ MmsgD1(10, bsock->errmsg, _("[%cE0066] Cannot setup TLS-PSK shared key\n"), component_code);
goto err;
}
}
/* Initiate TLS Negotiation */
if (!tls_bsock_accept(bsock)) {
- Mmsg(bsock->errmsg, _("[%cE0017] TLS Negotiation failed.\n"), component_code);
+ Mmsg(bsock->errmsg, _("[%cE0067] TLS Negotiation failed.\n"), component_code);
goto err;
}
if (!get_tls_psk_context(ctx)) {
if (verify_list) {
if (!tls_postconnect_verify_cn(jcr, tls, verify_list)) {
- Mmsg(bsock->errmsg, _("[%cE0018] TLS certificate verification failed."
+ Mmsg(bsock->errmsg, _("[%cE0068] TLS certificate verification failed."
" Peer certificate did not match a required commonName\n"),
component_code);
goto err;
tls = new_tls_connection(ctx, bsock->m_fd);
if (!tls) {
- Mmsg(bsock->errmsg, _("[%cE0016] TLS connection initialization failed.\n"), component_code);
+ Mmsg(bsock->errmsg, _("[%cE0066] TLS connection initialization failed.\n"), component_code);
return false;
}
if (get_tls_psk_context(ctx)) {
if (!psk_shared_key || !psk_set_shared_key(tls, psk_shared_key)) {
- MmsgD1(10, bsock->errmsg, "[%cE0017] Cannot setup TLS-PSK Password\n", component_code);
+ MmsgD1(10, bsock->errmsg, "[%cE0067] Cannot setup TLS-PSK Password\n", component_code);
goto err;
}
}
* certificate's CN. Otherwise, we use standard host/CN matching. */
if (verify_list) {
if (!tls_postconnect_verify_cn(jcr, tls, verify_list)) {
- Mmsg(bsock->errmsg, _("[%cE0018] TLS certificate verification failed."
+ Mmsg(bsock->errmsg, _("[%cE0068] TLS certificate verification failed."
" Peer certificate did not match a required commonName\n"), component_code);
goto err;
}
/* If host is 127.0.0.1, try localhost */
if (strcmp(bsock->host(), "127.0.0.1") != 0 ||
!tls_postconnect_verify_host(jcr, tls, "localhost")) {
- Mmsg(bsock->errmsg, _("[%cE0018] TLS host certificate verification failed. Host name \"%s\" did not match presented certificate\n"), component_code, bsock->host());
+ Mmsg(bsock->errmsg, _("[%cE0068] TLS host certificate verification failed. Host name \"%s\" did not match presented certificate\n"), component_code, bsock->host());
goto err;
}
}
bool bnet_tls_server(TLS_CONTEXT *ctx, BSOCK * bsock, alist *verify_list,
const char *psk_shared_key)
{
- Mmsg(bsock->errmsg, _("[%cE0019] TLS enabled but not configured.\n"), component_code);
+ Mmsg(bsock->errmsg, _("[%cE0069] TLS enabled but not configured.\n"), component_code);
return false;
}
bool bnet_tls_client(TLS_CONTEXT *ctx, BSOCK * bsock, alist *verify_list,
const char *psk_shared_key)
{
- Mmsg(bsock->errmsg, _("[%cE0019] TLS enabled but not configured.\n"), component_code);
+ Mmsg(bsock->errmsg, _("[%cE0069] TLS enabled but not configured.\n"), component_code);
return false;
}
bmicrosleep(retry_interval, 0);
now = time(NULL);
if (begin_time + max_retry_time <= now) {
- Mmsg(errmsg, _("[%cE0009] Unable to connect to %s on %s:%d. ERR=%s\n"),
+ Mmsg(errmsg, _("[%cE0064] Unable to connect to %s on %s:%d. ERR=%s\n"),
component_code, name, host, port, be.bstrerror());
goto bail_out;
}
*/
if ((addr_list = bnet_host2ipaddrs(host, 0, &errstr)) == NULL) {
/* Note errstr is not malloc'ed */
- MmsgD3(100, errmsg, _("[%cE0012] gethostbyname() for host \"%s\" failed: ERR=%s\n"),
+ MmsgD3(100, errmsg, _("[%cE0060] gethostbyname() for host \"%s\" failed: ERR=%s\n"),
component_code, host, errstr);
*fatal = 1;
return false;
#endif
default:
*fatal = 1;
- MmsgD4(300, errmsg, _("[%cE0012] Socket open error. proto=%d port=%d. ERR=%s\n"),
+ MmsgD4(300, errmsg, _("[%cE0061] Socket open error. proto=%d port=%d. ERR=%s\n"),
component_code, ipaddr->get_family(), ipaddr->get_port_host_order(),
be.bstrerror());
break;
berrno be;
save_errno = errno;
*fatal = 1;
- MmsgD3(300, errmsg, _("[%cE0013] Source address bind error. proto=%d. ERR=%s\n"),
+ MmsgD3(300, errmsg, _("[%cE0062] Source address bind error. proto=%d. ERR=%s\n"),
component_code, src_addr->get_family(), be.bstrerror() );
if (sockfd >= 0) {
socketClose(sockfd);
*/
if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, (sockopt_val_t)&turnon, sizeof(turnon)) < 0) {
berrno be;
- Qmsg2(jcr, M_WARNING, 0, _("[%cW0014] Cannot set SO_KEEPALIVE on socket: %s\n"),
+ Qmsg2(jcr, M_WARNING, 0, _("[%cW0063] Cannot set SO_KEEPALIVE on socket: %s\n"),
component_code, be.bstrerror());
}
#if defined(TCP_KEEPIDLE)
int opt = heart_beat;
if (setsockopt(sockfd, SOL_TCP, TCP_KEEPIDLE, (sockopt_val_t)&opt, sizeof(opt)) < 0) {
berrno be;
- Qmsg2(jcr, M_WARNING, 0, _("[%cW0014] Cannot set TCP_KEEPIDLE on socket: %s\n"),
+ Qmsg2(jcr, M_WARNING, 0, _("[%cW0063] Cannot set TCP_KEEPIDLE on socket: %s\n"),
component_code, be.bstrerror());
}
}
*/
if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, (sockopt_val_t)&turnon, sizeof(turnon)) < 0) {
berrno be;
- Qmsg2(jcr, M_WARNING, 0, _("[%cW0014] Cannot set SO_KEEPALIVE on socket: %s\n"),
+ Qmsg2(jcr, M_WARNING, 0, _("[%cW0063] Cannot set SO_KEEPALIVE on socket: %s\n"),
component_code, be.bstrerror());
}
fin_init(jcr, sockfd, name, host, port, ipaddr->get_sockaddr());
goto cleanup;
case SSL_ERROR_ZERO_RETURN:
/* TLS connection was cleanly shut down */
- Mmsg(bsock->errmsg, _("[%cE0018] TLS Connect failure ERR="), component_code);
+ Mmsg(bsock->errmsg, _("[%cE0064] TLS Connect failure ERR="), component_code);
openssl_post_errors(&bsock->errmsg);
stat = false;
goto cleanup;
break;
default:
/* Socket Error Occurred */
- Mmsg(bsock->errmsg, _("[%cE0018] TLS Connect failure. Check the passwords. ERR="), component_code);
+ Mmsg(bsock->errmsg, _("[%cE0064] TLS Connect failure. Check the passwords. ERR="), component_code);
openssl_post_errors(&bsock->errmsg);
stat = false;
goto cleanup;
break;
case SSL_ERROR_ZERO_RETURN:
/* TLS connection was shut down on us via a TLS protocol-level closure */
- Mmsg(bsock->errmsg, _("[%cW0019] TLS shutdown failure ERR="), component_code);
+ Mmsg(bsock->errmsg, _("[%cW0072] TLS shutdown failure ERR="), component_code);
openssl_post_errors(&bsock->errmsg);
err = -1;
break;
default:
/* Socket Error Occurred */
- Mmsg(bsock->errmsg, _("[%cW0019] TLS shutdown failure ERR="), component_code);
+ Mmsg(bsock->errmsg, _("[%cW0072] TLS shutdown failure ERR="), component_code);
openssl_post_errors(&bsock->errmsg);
err = -1;
break;
}
dev->VolCatInfo.VolCatErrors++;
Jmsg5(jcr, etype, 0, _("%s Write error at %s on device %s Vol=%s. ERR=%s.\n"),
- etype==M_FATAL?"[SF0208]":"[SE0201]",
+ etype==M_FATAL?"[SF0201]":"[SE0201]",
dev->print_addr(ed1, sizeof(ed1)), dev->print_name(),
dev->getVolCatName(), be.bstrerror());
if (dev->get_tape_alerts(this)) {
return false;
}
if (!dev->enabled) {
- Mmsg(dev->errmsg, _("[SF0210] Cannot write block. Device is disabled. dev=%s\n"), dev->print_name());
+ Mmsg(dev->errmsg, _("[SF023] Cannot read block. Device is disabled. dev=%s\n"), dev->print_name());
Jmsg1(jcr, M_FATAL, 0, "%s", dev->errmsg);
return false;
}
looping = 0;
if (!dev->is_open()) {
- Mmsg4(dev->errmsg, _("[SF0211] Attempt to read closed device: fd=%d at file:blk %u:%u on device %s\n"),
+ Mmsg4(dev->errmsg, _("[SF0206] Attempt to read closed device: fd=%d at file:blk %u:%u on device %s\n"),
dev->fd(), dev->file, dev->block_num, dev->print_name());
Jmsg(dcr->jcr, M_FATAL, 0, "%s", dev->errmsg);
Pmsg4(000, "Fatal: dev=%p dcr=%p adata=%d bytes=%lld\n", dev, dcr, dev->adata,
{
SDAuthenticateDIR auth(jcr);
if (!auth.authenticate_director()) {
- Qmsg(jcr, M_FATAL, 0, _("[SF0100] Unable to authenticate Director\n"));
+ Qmsg(jcr, M_FATAL, 0, _("[SF0065] Unable to authenticate Director\n"));
goto bail_out;
}
}
/* destroy() OK because cl is local */
cl->destroy();
pm_strcpy(jcr->errmsg, dir->msg);
- Jmsg(jcr, M_FATAL, 0, _("[SE0011] Bad client command: %s"), jcr->errmsg);
+ Jmsg(jcr, M_FATAL, 0, _("[SF0031] Bad client command: %s"), jcr->errmsg);
Dmsg1(050, "Bad client command: %s", jcr->errmsg);
goto bail_out;
}
if (!device->dev) {
Dmsg1(100, "Device %s could not be opened. Skipped\n", devname.c_str());
Jmsg(jcr, M_WARNING, 0, _("\n"
- "[SW0107] Device \"%s\" in changer \"%s\" requested by DIR could not be opened or does not exist.\n"),
+ "[SW0106] Device \"%s\" in changer \"%s\" requested by DIR could not be opened or does not exist.\n"),
device->hdr.name, devname.c_str());
continue;
}
if (!device->dev) {
Dmsg1(100, "Device %s could not be opened. Skipped\n", devname.c_str());
Jmsg(jcr, M_WARNING, 0, _("\n"
- "[SW0109] Device \"%s\" in changer \"%s\" requested by DIR could not be opened or does not exist.\n"),
+ "[SW0108] Device \"%s\" in changer \"%s\" requested by DIR could not be opened or does not exist.\n"),
device->hdr.name, devname.c_str());
continue;
}
/* Check that device is available */
if (stat(device->device_name, &statp) < 0) {
berrno be;
- Jmsg3(jcr, M_ERROR, 0, _("[SE0001] Unable to stat device %s at %s: ERR=%s\n"),
+ Jmsg3(jcr, M_ERROR, 0, _("[SE0017] Unable to stat device %s at %s: ERR=%s\n"),
device->hdr.name, device->device_name, be.bstrerror());
goto try_again_later;
}
device->dev_type = B_VTAPE_DEV;
#endif
} else if (!(device->cap_bits & CAP_REQMOUNT)) {
- Jmsg2(jcr, M_ERROR, 0, _("[SE0002] %s is an unknown device type. Must be tape or directory."
+ Jmsg2(jcr, M_ERROR, 0, _("[SE0017] %s is an unknown device type. Must be tape or directory."
" st_mode=%x\n"),
device->device_name, statp.st_mode);
goto try_again_later;
/* If invalid dev_type get out */
if (device->dev_type < 0 || device->dev_type > n_drivers) {
- Jmsg2(jcr, M_FATAL, 0, _("[SF0001] Invalid device type=%d name=\"%s\"\n"),
+ Jmsg2(jcr, M_FATAL, 0, _("[SF0017] Invalid device type=%d name=\"%s\"\n"),
device->dev_type, device->hdr.name);
goto never_try_again;
}
break;
#endif
default:
- Jmsg2(jcr, M_FATAL, 0, _("[SF0002] Unknown device type=%d device=\"%s\"\n"),
+ Jmsg2(jcr, M_FATAL, 0, _("[SF0017] Unknown device type=%d device=\"%s\"\n"),
device->dev_type, device->hdr.name);
goto never_try_again;
}