(file) Return to Monitor.cpp CVS log (file) (dir) Up to [Pegasus] / pegasus / src / Pegasus / Common

Diff for /pegasus/src/Pegasus/Common/Monitor.cpp between version 1.5 and 1.130

version 1.5, 2002/03/07 21:15:57 version 1.130, 2008/02/27 20:21:17
Line 1 
Line 1 
 //%/////////////////////////////////////////////////////////////////////////////  //%2006////////////////////////////////////////////////////////////////////////
 // //
 // Copyright (c) 2000, 2001 The Open group, BMC Software, Tivoli Systems, IBM  // Copyright (c) 2000, 2001, 2002 BMC Software; Hewlett-Packard Development
   // Company, L.P.; IBM Corp.; The Open Group; Tivoli Systems.
   // Copyright (c) 2003 BMC Software; Hewlett-Packard Development Company, L.P.;
   // IBM Corp.; EMC Corporation, The Open Group.
   // Copyright (c) 2004 BMC Software; Hewlett-Packard Development Company, L.P.;
   // IBM Corp.; EMC Corporation; VERITAS Software Corporation; The Open Group.
   // Copyright (c) 2005 Hewlett-Packard Development Company, L.P.; IBM Corp.;
   // EMC Corporation; VERITAS Software Corporation; The Open Group.
   // Copyright (c) 2006 Hewlett-Packard Development Company, L.P.; IBM Corp.;
   // EMC Corporation; Symantec Corporation; The Open Group.
 // //
 // Permission is hereby granted, free of charge, to any person obtaining a copy // Permission is hereby granted, free of charge, to any person obtaining a copy
 // of this software and associated documentation files (the "Software"), to // of this software and associated documentation files (the "Software"), to
Line 20 
Line 29 
 // //
 //============================================================================== //==============================================================================
 // //
 // Author: Mike Brasher (mbrasher@bmc.com)  
 //  
 // Modified By:  
 //  
 //%///////////////////////////////////////////////////////////////////////////// //%/////////////////////////////////////////////////////////////////////////////
  
   #include "Network.h"
 #include <Pegasus/Common/Config.h> #include <Pegasus/Common/Config.h>
 #include <cstring> #include <cstring>
 #include "Monitor.h" #include "Monitor.h"
 #include "MessageQueue.h" #include "MessageQueue.h"
 #include "Socket.h" #include "Socket.h"
 #include <Pegasus/Common/Tracer.h> #include <Pegasus/Common/Tracer.h>
   #include <Pegasus/Common/HTTPConnection.h>
 #ifdef PEGASUS_OS_TYPE_WINDOWS  #include <Pegasus/Common/MessageQueueService.h>
 # if defined(FD_SETSIZE) && FD_SETSIZE != 1024  #include <Pegasus/Common/Exception.h>
 #  error "FD_SETSIZE was not set to 1024 prior to the last inclusion \  #include "ArrayIterator.h"
 of <winsock.h>. It may have been indirectly included (e.g., by including \  #include "HostAddress.h"
 <windows.h>). Find the inclusion of that header which is visible to this \  
 compilation unit and #define FD_SETZIE to 1024 prior to that inclusion; \  
 otherwise, less than 64 clients (the default) will be able to connect to the \  
 CIMOM. PLEASE DO NOT SUPPRESS THIS WARNING; PLEASE FIX THE PROBLEM."  
   
 # endif  
 # define FD_SETSIZE 1024  
 # include <windows.h>  
 #else  
 # include <sys/types.h>  
 # include <sys/socket.h>  
 # include <sys/time.h>  
 # include <netinet/in.h>  
 # include <netdb.h>  
 # include <arpa/inet.h>  
 # include <unistd.h>  
 #endif  
  
 PEGASUS_USING_STD; PEGASUS_USING_STD;
  
Line 61 
Line 50 
  
 //////////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////////////
 // //
 // MonitorRep  // Tickler
 // //
 //////////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////////////
  
 struct MonitorRep  Tickler::Tickler()
       : _listenSocket(PEGASUS_INVALID_SOCKET),
         _clientSocket(PEGASUS_INVALID_SOCKET),
         _serverSocket(PEGASUS_INVALID_SOCKET)
   {
       try
 { {
     fd_set rd_fd_set;          _initialize();
     fd_set wr_fd_set;      }
     fd_set ex_fd_set;      catch (...)
     fd_set active_rd_fd_set;      {
     fd_set active_wr_fd_set;          _uninitialize();
     fd_set active_ex_fd_set;          throw;
 };      }
   }
  
 ////////////////////////////////////////////////////////////////////////////////  Tickler::~Tickler()
 //  {
 // Monitor      _uninitialize();
 //  }
 ////////////////////////////////////////////////////////////////////////////////  
  
 Monitor::Monitor()  #if defined(PEGASUS_OS_TYPE_UNIX)
   
   // Use an anonymous pipe for the tickle connection.
   
   void Tickler::_initialize()
 { {
     Socket::initializeInterface();      int fds[2];
  
     _rep = new MonitorRep;      if (pipe(fds) == -1)
     FD_ZERO(&_rep->rd_fd_set);      {
     FD_ZERO(&_rep->wr_fd_set);          MessageLoaderParms parms(
     FD_ZERO(&_rep->ex_fd_set);              "Common.Monitor.TICKLE_CREATE",
     FD_ZERO(&_rep->active_rd_fd_set);              "Received error number $0 while creating the internal socket.",
     FD_ZERO(&_rep->active_wr_fd_set);              getSocketError());
     FD_ZERO(&_rep->active_ex_fd_set);          throw Exception(parms);
 } }
  
 Monitor::~Monitor()      _serverSocket = fds[0];
 {      _clientSocket = fds[1];
     Socket::uninitializeInterface();  
 } }
  
 Boolean Monitor::run(Uint32 milliseconds)  #else
 {  
 #ifdef PEGASUS_OS_TYPE_WINDOWS  
  
     // Windows select() has a strange little bug. It returns immediately if  // Use an external loopback socket connection to allow the tickle socket to
     // there are no descriptors in the set even if the timeout is non-zero.  // be included in the select() array on non-Unix platforms.
     // To work around this, we call Sleep() for now:  
  
     if (_entries.size() == 0)  void Tickler::_initialize()
         Sleep(milliseconds);  {
       //
       // Set up the addresses for the listen, client, and server sockets
       // based on whether IPv6 is enabled.
       //
  
       Socket::initializeInterface();
   
   # ifdef PEGASUS_ENABLE_IPV6
       struct sockaddr_storage listenAddress;
       struct sockaddr_storage clientAddress;
       struct sockaddr_storage serverAddress;
   # else
       struct sockaddr_in listenAddress;
       struct sockaddr_in clientAddress;
       struct sockaddr_in serverAddress;
 #endif #endif
  
     // Check for events on the selected file descriptors. Only do this if      int addressFamily;
     // there were no undispatched events from last time.      SocketLength addressLength;
  
     static int count = 0;      memset(&listenAddress, 0, sizeof (listenAddress));
  
     if (count == 0)  # ifdef PEGASUS_ENABLE_IPV6
       if (System::isIPv6StackActive())
     {     {
         memcpy(&_rep->active_rd_fd_set, &_rep->rd_fd_set, sizeof(fd_set));          // Use the IPv6 loopback address for the listen sockets
         memcpy(&_rep->active_wr_fd_set, &_rep->wr_fd_set, sizeof(fd_set));          HostAddress::convertTextToBinary(
         memcpy(&_rep->active_ex_fd_set, &_rep->ex_fd_set, sizeof(fd_set));              HostAddress::AT_IPV6,
               "::1",
         const Uint32 SECONDS = milliseconds / 1000;              &reinterpret_cast<struct sockaddr_in6*>(&listenAddress)->sin6_addr);
         const Uint32 MICROSECONDS = (milliseconds % 1000) * 1000;          listenAddress.ss_family = AF_INET6;
         struct timeval tv = { SECONDS, MICROSECONDS };          reinterpret_cast<struct sockaddr_in6*>(&listenAddress)->sin6_port = 0;
   
         count = select(  
             FD_SETSIZE,  
             &_rep->active_rd_fd_set,  
             &_rep->active_wr_fd_set,  
             &_rep->active_ex_fd_set,  
             &tv);  
  
         if (count == 0)          addressFamily = AF_INET6;
             return false;          addressLength = sizeof(struct sockaddr_in6);
 #ifdef PEGASUS_OS_TYPE_WINDOWS      }
         else if (count == SOCKET_ERROR)      else
 #else  
         else if (count == -1)  
 #endif #endif
         {         {
             count = 0;          // Use the IPv4 loopback address for the listen sockets
             return false;          HostAddress::convertTextToBinary(
               HostAddress::AT_IPV4,
               "127.0.0.1",
               &reinterpret_cast<struct sockaddr_in*>(
                   &listenAddress)->sin_addr.s_addr);
           reinterpret_cast<struct sockaddr_in*>(&listenAddress)->sin_family =
               AF_INET;
           reinterpret_cast<struct sockaddr_in*>(&listenAddress)->sin_port = 0;
   
           addressFamily = AF_INET;
           addressLength = sizeof(struct sockaddr_in);
         }         }
   
       // Use the same address for the client socket as the listen socket
       clientAddress = listenAddress;
   
       //
       // Set up a listen socket to allow the tickle client and server to connect
       //
   
       // Create the listen socket
       if ((_listenSocket = Socket::createSocket(addressFamily, SOCK_STREAM, 0)) ==
                PEGASUS_INVALID_SOCKET)
       {
           MessageLoaderParms parms(
               "Common.Monitor.TICKLE_CREATE",
               "Received error number $0 while creating the internal socket.",
               getSocketError());
           throw Exception(parms);
     }     }
  
     for (Uint32 i = 0, n = _entries.size(); i < n; i++)      // Bind the listen socket to the loopback address
       if (::bind(
               _listenSocket,
               reinterpret_cast<struct sockaddr*>(&listenAddress),
               addressLength) < 0)
     {     {
         Sint32 socket = _entries[i].socket;          MessageLoaderParms parms(
         Uint32 events = 0;              "Common.Monitor.TICKLE_BIND",
               "Received error number $0 while binding the internal socket.",
               getSocketError());
           throw Exception(parms);
       }
  
         if (FD_ISSET(socket, &_rep->active_rd_fd_set))      // Listen for a connection from the tickle client
             events |= SocketMessage::READ;      if ((::listen(_listenSocket, 3)) < 0)
       {
           MessageLoaderParms parms(
               "Common.Monitor.TICKLE_LISTEN",
               "Received error number $0 while listening to the internal socket.",
               getSocketError());
           throw Exception(parms);
       }
  
         if (FD_ISSET(socket, &_rep->active_wr_fd_set))      // Verify we have the correct listen socket
             events |= SocketMessage::WRITE;      SocketLength tmpAddressLength = addressLength;
       int sock = ::getsockname(
           _listenSocket,
           reinterpret_cast<struct sockaddr*>(&listenAddress),
           &tmpAddressLength);
       if (sock < 0)
       {
           MessageLoaderParms parms(
               "Common.Monitor.TICKLE_SOCKNAME",
               "Received error number $0 while getting the internal socket name.",
               getSocketError());
           throw Exception(parms);
       }
  
         if (FD_ISSET(socket, &_rep->active_ex_fd_set))      //
             events |= SocketMessage::EXCEPTION;      // Set up the client side of the tickle connection.
       //
  
         if (events)      // Create the client socket
       if ((_clientSocket = Socket::createSocket(addressFamily, SOCK_STREAM, 0)) ==
                PEGASUS_INVALID_SOCKET)
         {         {
             Tracer::trace(TRC_HTTP, Tracer::LEVEL4,          MessageLoaderParms parms(
                "Monitor::run - Socket Event Detected events = %d", events);              "Common.Monitor.TICKLE_CLIENT_CREATE",
               "Received error number $0 while creating the internal client "
                   "socket.",
               getSocketError());
           throw Exception(parms);
       }
  
             MessageQueue* queue = MessageQueue::lookup(_entries[i].queueId);      // Bind the client socket to the loopback address
       if (::bind(
               _clientSocket,
               reinterpret_cast<struct sockaddr*>(&clientAddress),
               addressLength) < 0)
       {
           MessageLoaderParms parms(
               "Common.Monitor.TICKLE_CLIENT_BIND",
               "Received error number $0 while binding the internal client "
                   "socket.",
               getSocketError());
           throw Exception(parms);
       }
  
             if (!queue)      // Connect the client socket to the listen socket address
                 unsolicitSocketMessages(_entries[i].queueId);      if (::connect(
               _clientSocket,
               reinterpret_cast<struct sockaddr*>(&listenAddress),
               addressLength) < 0)
       {
           MessageLoaderParms parms(
               "Common.Monitor.TICKLE_CLIENT_CONNECT",
               "Received error number $0 while connecting the internal client "
                   "socket.",
               getSocketError());
           throw Exception(parms);
       }
  
       //
       // Set up the server side of the tickle connection.
       //
  
             Message* message = new SocketMessage(socket, events);      tmpAddressLength = addressLength;
             queue->enqueue(message);  
  
             if (events & SocketMessage::WRITE)      // Accept the client socket connection.
       _serverSocket = ::accept(
           _listenSocket,
           reinterpret_cast<struct sockaddr*>(&serverAddress),
           &tmpAddressLength);
   
       if (_serverSocket == PEGASUS_SOCKET_ERROR)
             {             {
                 FD_CLR(socket, &_rep->active_wr_fd_set);          MessageLoaderParms parms(
                 Tracer::trace(TRC_HTTP, Tracer::LEVEL4,              "Common.Monitor.TICKLE_ACCEPT",
                    "Monitor::run FD_CLR WRITE");              "Received error number $0 while accepting the internal socket "
                   "connection.",
               getSocketError());
           throw Exception(parms);
       }
   
       //
       // Close the listen socket and make the other sockets non-blocking
       //
   
       Socket::close(_listenSocket);
       Socket::disableBlocking(_serverSocket);
       Socket::disableBlocking(_clientSocket);
             }             }
  
             if (events & SocketMessage::EXCEPTION)  #endif
   
   void Tickler::_uninitialize()
   {
       PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4, "uninitializing interface");
   
       try
       {
           Socket::close(_serverSocket);
           Socket::close(_clientSocket);
           Socket::close(_listenSocket);
       }
       catch (...)
             {             {
                 FD_CLR(socket, &_rep->active_ex_fd_set);          PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4,
                 Tracer::trace(TRC_HTTP, Tracer::LEVEL4,              "Failed to close tickle sockets");
                    "Monitor::run FD_CLR EXECEPTION");  
             }             }
       Socket::uninitializeInterface();
   }
   
   
   ////////////////////////////////////////////////////////////////////////////////
   //
   // Monitor
   //
   ////////////////////////////////////////////////////////////////////////////////
  
             if (events & SocketMessage::READ)  #define MAX_NUMBER_OF_MONITOR_ENTRIES  32
   Monitor::Monitor()
      : _stopConnections(0),
        _stopConnectionsSem(0),
        _solicitSocketCount(0)
   {
       int numberOfMonitorEntriesToAllocate = MAX_NUMBER_OF_MONITOR_ENTRIES;
       _entries.reserveCapacity(numberOfMonitorEntriesToAllocate);
   
       // Create a MonitorEntry for the Tickler and set its state to IDLE so the
       // Monitor will watch for its events.
       _entries.append(MonitorEntry(
           _tickler.getServerSocket(),
           1,
           MonitorEntry::STATUS_IDLE,
           MonitorEntry::TYPE_INTERNAL));
   
       // Start the count at 1 because _entries[0] is the Tickler
       for (int i = 1; i < numberOfMonitorEntriesToAllocate; i++)
             {             {
                 FD_CLR(socket, &_rep->active_rd_fd_set);          _entries.append(MonitorEntry());
                 Tracer::trace(TRC_HTTP, Tracer::LEVEL4,      }
                    "Monitor::run FD_CLR READ");  
             }             }
  
             count--;  Monitor::~Monitor()
             return true;  {
       PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4,
                     "returning from monitor destructor");
         }         }
   
   void Monitor::tickle()
   {
       Socket::write(_tickler.getClientSocket(), "\0", 1);
     }     }
  
     return false;  void Monitor::setState(
       Uint32 index,
       MonitorEntry::Status status)
   {
       AutoMutex autoEntryMutex(_entriesMutex);
       // Set the state to requested state
       _entries[index].status = status;
 } }
  
 Boolean Monitor::solicitSocketMessages(  void Monitor::run(Uint32 milliseconds)
     Sint32 socket,  
     Uint32 events,  
     Uint32 queueId)  
 { {
     PEG_METHOD_ENTER(TRC_HTTP, "Monitor::solictSocketMessage");      struct timeval tv = {milliseconds/1000, milliseconds%1000*1000};
  
     // See whether a handler is already registered for this one:      fd_set fdread;
       FD_ZERO(&fdread);
  
     Uint32 pos = _findEntry(socket);      AutoMutex autoEntryMutex(_entriesMutex);
  
     if (pos != PEGASUS_NOT_FOUND)      ArrayIterator<MonitorEntry> entries(_entries);
   
       // Check the stopConnections flag.  If set, clear the Acceptor monitor
       // entries
       if (_stopConnections.get() == 1)
     {     {
         PEG_METHOD_EXIT();          for (Uint32 indx = 0; indx < entries.size(); indx++)
         return false;          {
               if (entries[indx].type == MonitorEntry::TYPE_ACCEPTOR)
               {
                   if (entries[indx].status != MonitorEntry::STATUS_EMPTY)
                   {
                       if (entries[indx].status == MonitorEntry::STATUS_IDLE ||
                           entries[indx].status == MonitorEntry::STATUS_DYING)
                       {
                           // remove the entry
                           entries[indx].status = MonitorEntry::STATUS_EMPTY;
                       }
                       else
                       {
                           // set status to DYING
                           entries[indx].status = MonitorEntry::STATUS_DYING;
                       }
                   }
               }
           }
           _stopConnections = 0;
           _stopConnectionsSem.signal();
     }     }
  
     // Set the events:      for (Uint32 indx = 0; indx < entries.size(); indx++)
       {
           const MonitorEntry& entry = entries[indx];
  
     if (events & SocketMessage::READ)          if ((entry.status == MonitorEntry::STATUS_DYING) &&
         FD_SET(socket, &_rep->rd_fd_set);              (entry.type == MonitorEntry::TYPE_CONNECTION))
           {
               MessageQueue *q = MessageQueue::lookup(entry.queueId);
               PEGASUS_ASSERT(q != 0);
               HTTPConnection &h = *static_cast<HTTPConnection *>(q);
  
     if (events & SocketMessage::WRITE)              if (h._connectionClosePending == false)
         FD_SET(socket, &_rep->wr_fd_set);                  continue;
  
     if (events & SocketMessage::EXCEPTION)              // NOTE: do not attempt to delete while there are pending responses
         FD_SET(socket, &_rep->ex_fd_set);              // coming thru. The last response to come thru after a
               // _connectionClosePending will reset _responsePending to false
               // and then cause the monitor to rerun this code and clean up.
               // (see HTTPConnection.cpp)
  
     // Add the entry to the list:              if (h._responsePending == true)
               {
                   PEG_TRACE((TRC_HTTP, Tracer::LEVEL4,
                       "Monitor::run - Ignoring connection delete request "
                           "because responses are still pending. "
                           "connection=0x%p, socket=%d\n",
                       (void *)&h, h.getSocket()));
                   continue;
               }
               h._connectionClosePending = false;
               MessageQueue &o = h.get_owner();
               Message* message= new CloseConnectionMessage(entry.socket);
               message->dest = o.getQueueId();
  
     _MonitorEntry entry = { socket, queueId };              // HTTPAcceptor is responsible for closing the connection.
     _entries.append(entry);              // The lock is released to allow HTTPAcceptor to call
               // unsolicitSocketMessages to free the entry.
               // Once HTTPAcceptor completes processing of the close
               // connection, the lock is re-requested and processing of
               // the for loop continues.  This is safe with the current
               // implementation of the entries object.  Note that the
               // loop condition accesses the entries.size() on each
               // iteration, so that a change in size while the mutex is
               // unlocked will not result in an ArrayIndexOutOfBounds
               // exception.
  
     // Success!              _entriesMutex.unlock();
               o.enqueue(message);
               _entriesMutex.lock();
  
     PEG_METHOD_EXIT();              // After enqueue a message and the autoEntryMutex has been
     return true;              // released and locked again, the array of _entries can be
               // changed. The ArrayIterator has be reset with the original
               // _entries.
               entries.reset(_entries);
           }
       }
   
       Uint32 _idleEntries = 0;
   
       /*
           We will keep track of the maximum socket number and pass this value
           to the kernel as a parameter to SELECT.  This loop seems like a good
           place to calculate the max file descriptor (maximum socket number)
           because we have to traverse the entire array.
       */
       SocketHandle maxSocketCurrentPass = 0;
       for (Uint32 indx = 0; indx < entries.size(); indx++)
       {
           if (maxSocketCurrentPass < entries[indx].socket)
               maxSocketCurrentPass = entries[indx].socket;
   
           if (entries[indx].status == MonitorEntry::STATUS_IDLE)
           {
               _idleEntries++;
               FD_SET(entries[indx].socket, &fdread);
           }
       }
   
       /*
           Add 1 then assign maxSocket accordingly. We add 1 to account for
           descriptors starting at 0.
       */
       maxSocketCurrentPass++;
   
       _entriesMutex.unlock();
   
       //
       // The first argument to select() is ignored on Windows and it is not
       // a socket value.  The original code assumed that the number of sockets
       // and a socket value have the same type.  On Windows they do not.
       //
   #ifdef PEGASUS_OS_TYPE_WINDOWS
       int events = select(0, &fdread, NULL, NULL, &tv);
   #else
       int events = select(maxSocketCurrentPass, &fdread, NULL, NULL, &tv);
   #endif
       int selectErrno = getSocketError();
   
       _entriesMutex.lock();
   
       struct timeval timeNow;
       Time::gettimeofday(&timeNow);
   
       // After enqueue a message and the autoEntryMutex has been released and
       // locked again, the array of _entries can be changed. The ArrayIterator
       // has be reset with the original _entries
       entries.reset(_entries);
   
       if (events == PEGASUS_SOCKET_ERROR)
       {
           PEG_TRACE((TRC_HTTP, Tracer::LEVEL4,
               "Monitor::run - select() returned error %d.", selectErrno));
           // The EBADF error indicates that one or more or the file
           // descriptions was not valid. This could indicate that
           // the entries structure has been corrupted or that
           // we have a synchronization error.
   
           PEGASUS_ASSERT(selectErrno != EBADF);
       }
       else if (events)
       {
           PEG_TRACE((TRC_HTTP, Tracer::LEVEL4,
               "Monitor::run select event received events = %d, monitoring %d "
                   "idle entries",
               events, _idleEntries));
           for (Uint32 indx = 0; indx < entries.size(); indx++)
           {
               // The Monitor should only look at entries in the table that are
               // IDLE (i.e., owned by the Monitor).
               if ((entries[indx].status == MonitorEntry::STATUS_IDLE) &&
                   (FD_ISSET(entries[indx].socket, &fdread)))
               {
                   MessageQueue* q = MessageQueue::lookup(entries[indx].queueId);
                   PEGASUS_ASSERT(q != 0);
                   PEG_TRACE((TRC_HTTP, Tracer::LEVEL4,
                       "Monitor::run indx = %d, queueId = %d, q = %p",
                       indx, entries[indx].queueId, q));
   
                   try
                   {
                       if (entries[indx].type == MonitorEntry::TYPE_CONNECTION)
                       {
                           PEG_TRACE((TRC_HTTP, Tracer::LEVEL4,
                               "entries[%d].type is TYPE_CONNECTION",
                               indx));
   
                           HTTPConnection *dst =
                               reinterpret_cast<HTTPConnection *>(q);
                           dst->_entry_index = indx;
   
                           // Update idle start time because we have received some
                           // data. Any data is good data at this point, and we'll
                           // keep the connection alive, even if we've exceeded
                           // the idleConnectionTimeout, which will be checked
                           // when we call closeConnectionOnTimeout() next.
                           Time::gettimeofday(&dst->_idleStartTime);
   
                           // Check for accept pending (ie. SSL handshake pending)
                           // or idle connection timeouts for sockets from which
                           // we received data (avoiding extra queue lookup below).
                           if (!dst->closeConnectionOnTimeout(&timeNow))
                           {
                               PEG_TRACE((TRC_HTTP, Tracer::LEVEL4,
                                   "Entering HTTPConnection::run() for "
                                       "indx = %d, queueId = %d, q = %p",
                                   indx, entries[indx].queueId, q));
   
                               try
                               {
                                   dst->run(1);
                               }
                               catch (...)
                               {
                                   PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL2,
                                       "Caught exception from "
                                       "HTTPConnection::run()");
 } }
                               PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4,
                                   "Exited HTTPConnection::run()");
                               }
   
  
 Boolean Monitor::unsolicitSocketMessages(Sint32 socket)                      }
                       else if (entries[indx].type == MonitorEntry::TYPE_INTERNAL)
 { {
     PEG_METHOD_ENTER(TRC_HTTP, "Monitor::unsolicitSocketMessage");                          char buffer;
                           Sint32 ignored =
                               Socket::read(entries[indx].socket, &buffer, 1);
                       }
                       else
                       {
                           PEG_TRACE((TRC_HTTP, Tracer::LEVEL4,
                               "Non-connection entry, indx = %d, has been "
                                   "received.",
                               indx));
                           int events = 0;
                           events |= SocketMessage::READ;
                           Message* msg = new SocketMessage(
                               entries[indx].socket, events);
                           entries[indx].status = MonitorEntry::STATUS_BUSY;
                           _entriesMutex.unlock();
                           q->enqueue(msg);
                           _entriesMutex.lock();
  
     // Look for the given entry and remove it:                          // After enqueue a message and the autoEntryMutex has
                           // been released and locked again, the array of
                           // entries can be changed. The ArrayIterator has to be
                           // reset with the latest _entries.
                           entries.reset(_entries);
                           entries[indx].status = MonitorEntry::STATUS_IDLE;
                       }
                   }
                   catch (...)
                   {
                   }
               }
               // else check for accept pending (ie. SSL handshake pending) or
               // idle connection timeouts for sockets from which we did not
               // receive data.
               else if ((entries[indx].status == MonitorEntry::STATUS_IDLE) &&
                   entries[indx].type == MonitorEntry::TYPE_CONNECTION)
  
     for (Uint32 i = 0, n = _entries.size(); i < n; i++)  
     {     {
         if (_entries[i].socket == socket)                  MessageQueue* q = MessageQueue::lookup(entries[indx].queueId);
                   HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(q);
                   dst->_entry_index = indx;
                   dst->closeConnectionOnTimeout(&timeNow);
               }
           }
       }
       // else if "events" is zero (ie. select timed out) then we still need
       // to check if there are any pending SSL handshakes that have timed out.
       else
       {
           for (Uint32 indx = 0; indx < entries.size(); indx++)
           {
               if ((entries[indx].status == MonitorEntry::STATUS_IDLE) &&
                   entries[indx].type == MonitorEntry::TYPE_CONNECTION)
               {
                   MessageQueue* q = MessageQueue::lookup(entries[indx].queueId);
                   HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(q);
                   dst->_entry_index = indx;
                   dst->closeConnectionOnTimeout(&timeNow);
               }
           }
       }
   }
   
   void Monitor::stopListeningForConnections(Boolean wait)
         {         {
             Sint32 socket = _entries[i].socket;      PEG_METHOD_ENTER(TRC_HTTP, "Monitor::stopListeningForConnections()");
             FD_CLR(socket, &_rep->rd_fd_set);      // set boolean then tickle the server to recognize _stopConnections
             FD_CLR(socket, &_rep->wr_fd_set);      _stopConnections = 1;
             FD_CLR(socket, &_rep->ex_fd_set);      tickle();
             _entries.remove(i);  
       if (wait)
       {
         // Wait for the monitor to notice _stopConnections.  Otherwise the
         // caller of this function may unbind the ports while the monitor
         // is still accepting connections on them.
         _stopConnectionsSem.wait();
       }
   
             PEG_METHOD_EXIT();             PEG_METHOD_EXIT();
             return true;  
         }         }
   
   
   int Monitor::solicitSocketMessages(
       SocketHandle socket,
       Uint32 events,
       Uint32 queueId,
       Uint32 type)
   {
       PEG_METHOD_ENTER(TRC_HTTP, "Monitor::solicitSocketMessages");
       AutoMutex autoMut(_entriesMutex);
   
       // Check to see if we need to dynamically grow the _entries array
       // We always want the _entries array to be 2 bigger than the
       // current connections requested
       _solicitSocketCount++;  // bump the count
   
       for (Uint32 i = _entries.size(); i < _solicitSocketCount + 1; i++)
       {
           _entries.append(MonitorEntry());
     }     }
  
       for (Uint32 index = 1; index < _entries.size(); index++)
       {
           try
           {
               if (_entries[index].status == MonitorEntry::STATUS_EMPTY)
               {
                   _entries[index].socket = socket;
                   _entries[index].queueId  = queueId;
                   _entries[index].type = type;
                   _entries[index].status = MonitorEntry::STATUS_IDLE;
   
                   return (int)index;
               }
           }
           catch (...)
           {
           }
       }
       // decrease the count, if we are here we didn't do anything meaningful
       _solicitSocketCount--;
     PEG_METHOD_EXIT();     PEG_METHOD_EXIT();
     return false;      return -1;
 } }
  
 Uint32 Monitor::_findEntry(Sint32 socket) const  void Monitor::unsolicitSocketMessages(SocketHandle socket)
   {
       PEG_METHOD_ENTER(TRC_HTTP, "Monitor::unsolicitSocketMessages");
       AutoMutex autoMut(_entriesMutex);
   
       /*
           Start at index = 1 because _entries[0] is the tickle entry which
           never needs to be reset to EMPTY;
       */
       for (Uint32 index = 1; index < _entries.size(); index++)
       {
           if (_entries[index].socket == socket)
 { {
     for (Uint32 i = 0, n = _entries.size(); i < n; i++)              _entries[index].reset();
               _solicitSocketCount--;
               break;
           }
       }
   
       /*
           Dynamic Contraction:
           To remove excess entries we will start from the end of the _entries
           array and remove all entries with EMPTY status until we find the
           first NON EMPTY.  This prevents the positions, of the NON EMPTY
           entries, from being changed.
       */
       for (Uint32 index = _entries.size() - 1;
            (_entries[index].status == MonitorEntry::STATUS_EMPTY) &&
                (index >= MAX_NUMBER_OF_MONITOR_ENTRIES);
            index--)
     {     {
         if (_entries[i].socket == socket)          _entries.remove(index);
             return i;  
     }     }
  
     return PEG_NOT_FOUND;      PEG_METHOD_EXIT();
 } }
  
 PEGASUS_NAMESPACE_END PEGASUS_NAMESPACE_END


Legend:
Removed from v.1.5  
changed lines
  Added in v.1.130

No CVS admin address has been configured
Powered by
ViewCVS 0.9.2