version 1.15, 2002/05/29 23:26:34
|
version 1.137, 2008/12/01 17:49:53
|
|
|
//%///////////////////////////////////////////////////////////////////////////// |
//%LICENSE//////////////////////////////////////////////////////////////// |
// |
|
// Copyright (c) 2000, 2001 The Open group, BMC Software, Tivoli Systems, IBM |
|
// |
|
// Permission is hereby granted, free of charge, to any person obtaining a copy |
|
// of this software and associated documentation files (the "Software"), to |
|
// deal in the Software without restriction, including without limitation the |
|
// rights to use, copy, modify, merge, publish, distribute, sublicense, and/or |
|
// sell copies of the Software, and to permit persons to whom the Software is |
|
// furnished to do so, subject to the following conditions: |
|
// |
|
// THE ABOVE COPYRIGHT NOTICE AND THIS PERMISSION NOTICE SHALL BE INCLUDED IN |
|
// ALL COPIES OR SUBSTANTIAL PORTIONS OF THE SOFTWARE. THE SOFTWARE IS PROVIDED |
|
// "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT |
|
// LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR |
|
// PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT |
|
// HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN |
|
// ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION |
|
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
|
// |
|
//============================================================================== |
|
// | // |
// Author: Mike Brasher (mbrasher@bmc.com) |
// Licensed to The Open Group (TOG) under one or more contributor license |
|
// agreements. Refer to the OpenPegasusNOTICE.txt file distributed with |
|
// this work for additional information regarding copyright ownership. |
|
// Each contributor licenses this file to you under the OpenPegasus Open |
|
// Source License; you may not use this file except in compliance with the |
|
// License. |
|
// |
|
// Permission is hereby granted, free of charge, to any person obtaining a |
|
// copy of this software and associated documentation files (the "Software"), |
|
// to deal in the Software without restriction, including without limitation |
|
// the rights to use, copy, modify, merge, publish, distribute, sublicense, |
|
// and/or sell copies of the Software, and to permit persons to whom the |
|
// Software is furnished to do so, subject to the following conditions: |
|
// |
|
// The above copyright notice and this permission notice shall be included |
|
// in all copies or substantial portions of the Software. |
|
// |
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. |
|
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY |
|
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, |
|
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE |
|
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
// | // |
// Modified By: |
////////////////////////////////////////////////////////////////////////// |
// | // |
//%///////////////////////////////////////////////////////////////////////////// | //%///////////////////////////////////////////////////////////////////////////// |
| |
|
#include "Network.h" |
#include <Pegasus/Common/Config.h> | #include <Pegasus/Common/Config.h> |
#include <cstring> | #include <cstring> |
#include "Monitor.h" | #include "Monitor.h" |
|
|
#include "Socket.h" | #include "Socket.h" |
#include <Pegasus/Common/Tracer.h> | #include <Pegasus/Common/Tracer.h> |
#include <Pegasus/Common/HTTPConnection.h> | #include <Pegasus/Common/HTTPConnection.h> |
|
#include <Pegasus/Common/HTTPAcceptor.h> |
#ifdef PEGASUS_OS_TYPE_WINDOWS |
#include <Pegasus/Common/MessageQueueService.h> |
# if defined(FD_SETSIZE) && FD_SETSIZE != 1024 |
#include <Pegasus/Common/Exception.h> |
# error "FD_SETSIZE was not set to 1024 prior to the last inclusion \ |
#include "ArrayIterator.h" |
of <winsock.h>. It may have been indirectly included (e.g., by including \ |
#include "HostAddress.h" |
<windows.h>). Find the inclusion of that header which is visible to this \ |
#include <errno.h> |
compilation unit and #define FD_SETZIE to 1024 prior to that inclusion; \ |
|
otherwise, less than 64 clients (the default) will be able to connect to the \ |
|
CIMOM. PLEASE DO NOT SUPPRESS THIS WARNING; PLEASE FIX THE PROBLEM." |
|
|
|
# endif |
|
# define FD_SETSIZE 1024 |
|
# include <windows.h> |
|
#else |
|
# include <sys/types.h> |
|
# include <sys/socket.h> |
|
# include <sys/time.h> |
|
# include <netinet/in.h> |
|
# include <netdb.h> |
|
# include <arpa/inet.h> |
|
# include <unistd.h> |
|
#endif |
|
| |
PEGASUS_USING_STD; | PEGASUS_USING_STD; |
| |
|
|
| |
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
// | // |
// MonitorRep |
// Tickler |
// | // |
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
| |
struct MonitorRep |
Tickler::Tickler() |
|
: _listenSocket(PEGASUS_INVALID_SOCKET), |
|
_clientSocket(PEGASUS_INVALID_SOCKET), |
|
_serverSocket(PEGASUS_INVALID_SOCKET) |
{ | { |
fd_set rd_fd_set; |
try |
fd_set wr_fd_set; |
|
fd_set ex_fd_set; |
|
fd_set active_rd_fd_set; |
|
fd_set active_wr_fd_set; |
|
fd_set active_ex_fd_set; |
|
}; |
|
|
|
//////////////////////////////////////////////////////////////////////////////// |
|
// |
|
// Monitor |
|
// |
|
//////////////////////////////////////////////////////////////////////////////// |
|
|
|
Monitor::Monitor() |
|
: _module_handle(0), _controller(0), _async(false) |
|
{ | { |
Socket::initializeInterface(); |
_initialize(); |
_rep = new MonitorRep; |
} |
FD_ZERO(&_rep->rd_fd_set); |
catch (...) |
FD_ZERO(&_rep->wr_fd_set); |
{ |
FD_ZERO(&_rep->ex_fd_set); |
_uninitialize(); |
FD_ZERO(&_rep->active_rd_fd_set); |
throw; |
FD_ZERO(&_rep->active_wr_fd_set); |
} |
FD_ZERO(&_rep->active_ex_fd_set); |
|
} | } |
| |
Monitor::~Monitor() |
Tickler::~Tickler() |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
_uninitialize(); |
"deregistering with module controller"); |
} |
| |
if(_module_handle != NULL) |
void Tickler::notify() |
{ | { |
_controller->deregister_module(PEGASUS_MODULENAME_MONITOR); |
Socket::write(_clientSocket, "\0", 1); |
_controller = 0; |
|
delete _module_handle; |
|
} | } |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, "deleting rep"); |
|
| |
delete _rep; |
void Tickler::reset() |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, "uninitializing interface"); |
{ |
Socket::uninitializeInterface(); |
// Clear all bytes from the tickle socket |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
char buffer[32]; |
"returning from monitor destructor"); |
while (Socket::read(_serverSocket, buffer, 32) > 0) |
|
{ |
|
} |
} | } |
| |
|
#if defined(PEGASUS_OS_TYPE_UNIX) |
| |
|
// Use an anonymous pipe for the tickle connection. |
| |
//<<< Tue May 14 20:38:26 2002 mdd >>> |
void Tickler::_initialize() |
// register with module controller |
|
// when it is time to enqueue the message, |
|
// use an async_thread_exec call to |
|
// isolate the entire if(events) { enqueue -> fd_clear } block |
|
// let the thread pool grow and shrink according to load. |
|
|
|
Boolean Monitor::run(Uint32 milliseconds) |
|
{ |
|
// register the monitor as a module to gain access to the cimserver's thread pool |
|
// <<< Wed May 15 09:52:16 2002 mdd >>> |
|
while( _module_handle == NULL) |
|
{ |
|
try |
|
{ | { |
_controller = &(ModuleController::register_module(PEGASUS_QUEUENAME_CONTROLSERVICE, |
int fds[2]; |
PEGASUS_MODULENAME_MONITOR, |
|
(void *)this, |
|
0, |
|
0, |
|
0, |
|
&_module_handle)); |
|
| |
} |
if (pipe(fds) == -1) |
catch(IncompatibleTypes &) |
|
{ |
|
ModuleController* controlService = |
|
new ModuleController(PEGASUS_QUEUENAME_CONTROLSERVICE); |
|
} |
|
catch( AlreadyExists & ) |
|
{ | { |
break; |
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_CREATE", |
|
"Received error number $0 while creating the internal socket.", |
|
getSocketError()); |
|
throw Exception(parms); |
} | } |
|
|
|
_serverSocket = fds[0]; |
|
_clientSocket = fds[1]; |
|
|
|
Socket::disableBlocking(_serverSocket); |
} | } |
| |
#ifdef PEGASUS_OS_TYPE_WINDOWS |
#else |
|
|
|
// Use an external loopback socket connection to allow the tickle socket to |
|
// be included in the select() array on non-Unix platforms. |
| |
// Windows select() has a strange little bug. It returns immediately if |
void Tickler::_initialize() |
// there are no descriptors in the set even if the timeout is non-zero. |
{ |
// To work around this, we call Sleep() for now: |
// |
|
// Set up the addresses for the listen, client, and server sockets |
|
// based on whether IPv6 is enabled. |
|
// |
| |
if (_entries.size() == 0) |
Socket::initializeInterface(); |
Sleep(milliseconds); |
|
| |
|
# ifdef PEGASUS_ENABLE_IPV6 |
|
struct sockaddr_storage listenAddress; |
|
struct sockaddr_storage clientAddress; |
|
struct sockaddr_storage serverAddress; |
|
# else |
|
struct sockaddr_in listenAddress; |
|
struct sockaddr_in clientAddress; |
|
struct sockaddr_in serverAddress; |
#endif | #endif |
| |
// Check for events on the selected file descriptors. Only do this if |
int addressFamily; |
// there were no undispatched events from last time. |
SocketLength addressLength; |
|
|
|
memset(&listenAddress, 0, sizeof (listenAddress)); |
| |
int count = 0; |
# ifdef PEGASUS_ENABLE_IPV6 |
|
if (System::isIPv6StackActive()) |
|
{ |
|
// Use the IPv6 loopback address for the listen sockets |
|
HostAddress::convertTextToBinary( |
|
HostAddress::AT_IPV6, |
|
"::1", |
|
&reinterpret_cast<struct sockaddr_in6*>(&listenAddress)->sin6_addr); |
|
listenAddress.ss_family = AF_INET6; |
|
reinterpret_cast<struct sockaddr_in6*>(&listenAddress)->sin6_port = 0; |
|
|
|
addressFamily = AF_INET6; |
|
addressLength = sizeof(struct sockaddr_in6); |
|
} |
|
else |
|
# endif |
|
{ |
|
// Use the IPv4 loopback address for the listen sockets |
|
HostAddress::convertTextToBinary( |
|
HostAddress::AT_IPV4, |
|
"127.0.0.1", |
|
&reinterpret_cast<struct sockaddr_in*>( |
|
&listenAddress)->sin_addr.s_addr); |
|
reinterpret_cast<struct sockaddr_in*>(&listenAddress)->sin_family = |
|
AF_INET; |
|
reinterpret_cast<struct sockaddr_in*>(&listenAddress)->sin_port = 0; |
| |
|
addressFamily = AF_INET; |
|
addressLength = sizeof(struct sockaddr_in); |
|
} |
| |
memcpy(&_rep->active_rd_fd_set, &_rep->rd_fd_set, sizeof(fd_set)); |
// Use the same address for the client socket as the listen socket |
memcpy(&_rep->active_wr_fd_set, &_rep->wr_fd_set, sizeof(fd_set)); |
clientAddress = listenAddress; |
memcpy(&_rep->active_ex_fd_set, &_rep->ex_fd_set, sizeof(fd_set)); |
|
| |
const Uint32 SECONDS = milliseconds / 1000; |
// |
const Uint32 MICROSECONDS = (milliseconds % 1000) * 1000; |
// Set up a listen socket to allow the tickle client and server to connect |
struct timeval tv = { SECONDS, MICROSECONDS }; |
// |
| |
count = select( |
// Create the listen socket |
FD_SETSIZE, |
if ((_listenSocket = Socket::createSocket(addressFamily, SOCK_STREAM, 0)) == |
&_rep->active_rd_fd_set, |
PEGASUS_INVALID_SOCKET) |
&_rep->active_wr_fd_set, |
|
&_rep->active_ex_fd_set, |
|
&tv); |
|
if (count == 0) |
|
{ | { |
return false; |
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_CREATE", |
|
"Received error number $0 while creating the internal socket.", |
|
getSocketError()); |
|
throw Exception(parms); |
} | } |
| |
#ifdef PEGASUS_OS_TYPE_WINDOWS |
// Bind the listen socket to the loopback address |
else if (count == SOCKET_ERROR) |
if (::bind( |
#else |
_listenSocket, |
else if (count == -1) |
reinterpret_cast<struct sockaddr*>(&listenAddress), |
#endif |
addressLength) < 0) |
{ | { |
return false; |
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_BIND", |
|
"Received error number $0 while binding the internal socket.", |
|
getSocketError()); |
|
throw Exception(parms); |
} | } |
| |
Boolean handled_events = false; |
// Listen for a connection from the tickle client |
for (Uint32 i = 0, n = _entries.size(); i < _entries.size(); i++) |
if ((::listen(_listenSocket, 3)) < 0) |
{ | { |
Sint32 socket = _entries[i].socket; |
MessageLoaderParms parms( |
Uint32 events = 0; |
"Common.Monitor.TICKLE_LISTEN", |
|
"Received error number $0 while listening to the internal socket.", |
|
getSocketError()); |
|
throw Exception(parms); |
|
} |
| |
if(_entries[i].dying.value() > 0 ) |
// Verify we have the correct listen socket |
{ |
SocketLength tmpAddressLength = addressLength; |
if(_entries[i]._type == Monitor::CONNECTION) |
int sock = ::getsockname( |
|
_listenSocket, |
|
reinterpret_cast<struct sockaddr*>(&listenAddress), |
|
&tmpAddressLength); |
|
if (sock < 0) |
{ | { |
|
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_SOCKNAME", |
|
"Received error number $0 while getting the internal socket name.", |
|
getSocketError()); |
|
throw Exception(parms); |
|
} |
| |
MessageQueue *q = MessageQueue::lookup(_entries[i].queueId); |
// |
if(q && static_cast<HTTPConnection *>(q)->is_dying() && |
// Set up the client side of the tickle connection. |
(0 == static_cast<HTTPConnection *>(q)->refcount.value())) |
// |
|
|
|
// Create the client socket |
|
if ((_clientSocket = Socket::createSocket(addressFamily, SOCK_STREAM, 0)) == |
|
PEGASUS_INVALID_SOCKET) |
{ | { |
static_cast<HTTPConnection *>(q)->lock_connection(); |
MessageLoaderParms parms( |
static_cast<HTTPConnection *>(q)->unlock_connection(); |
"Common.Monitor.TICKLE_CLIENT_CREATE", |
|
"Received error number $0 while creating the internal client " |
|
"socket.", |
|
getSocketError()); |
|
throw Exception(parms); |
|
} |
| |
MessageQueue & o = static_cast<HTTPConnection *>(q)->get_owner(); |
// Bind the client socket to the loopback address |
Message* message= new CloseConnectionMessage(static_cast<HTTPConnection *>(q)->getSocket()); |
if (::bind( |
message->dest = o.getQueueId(); |
_clientSocket, |
o.enqueue(message); |
reinterpret_cast<struct sockaddr*>(&clientAddress), |
i--; |
addressLength) < 0) |
n = _entries.size(); |
{ |
|
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_CLIENT_BIND", |
|
"Received error number $0 while binding the internal client " |
|
"socket.", |
|
getSocketError()); |
|
throw Exception(parms); |
} | } |
|
|
|
// Connect the client socket to the listen socket address |
|
if (::connect( |
|
_clientSocket, |
|
reinterpret_cast<struct sockaddr*>(&listenAddress), |
|
addressLength) < 0) |
|
{ |
|
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_CLIENT_CONNECT", |
|
"Received error number $0 while connecting the internal client " |
|
"socket.", |
|
getSocketError()); |
|
throw Exception(parms); |
} | } |
|
|
|
// |
|
// Set up the server side of the tickle connection. |
|
// |
|
|
|
tmpAddressLength = addressLength; |
|
|
|
// Accept the client socket connection. |
|
_serverSocket = ::accept( |
|
_listenSocket, |
|
reinterpret_cast<struct sockaddr*>(&serverAddress), |
|
&tmpAddressLength); |
|
|
|
if (_serverSocket == PEGASUS_SOCKET_ERROR) |
|
{ |
|
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_ACCEPT", |
|
"Received error number $0 while accepting the internal socket " |
|
"connection.", |
|
getSocketError()); |
|
throw Exception(parms); |
} | } |
| |
if (FD_ISSET(socket, &_rep->active_rd_fd_set)) |
// |
events |= SocketMessage::READ; |
// Close the listen socket and make the other sockets non-blocking |
|
// |
| |
if (FD_ISSET(socket, &_rep->active_wr_fd_set)) |
Socket::close(_listenSocket); |
events |= SocketMessage::WRITE; |
Socket::disableBlocking(_serverSocket); |
|
Socket::disableBlocking(_clientSocket); |
|
} |
| |
if (FD_ISSET(socket, &_rep->active_ex_fd_set)) |
#endif |
events |= SocketMessage::EXCEPTION; |
|
| |
if (events) |
void Tickler::_uninitialize() |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4, "uninitializing interface"); |
"Monitor::run - Socket Event Detected events = %d", events); |
|
if (events & SocketMessage::WRITE) |
try |
{ | { |
FD_CLR(socket, &_rep->active_wr_fd_set); |
Socket::close(_serverSocket); |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
Socket::close(_clientSocket); |
"Monitor::run FD_CLR WRITE"); |
Socket::close(_listenSocket); |
} | } |
if (events & SocketMessage::EXCEPTION) |
catch (...) |
{ | { |
FD_CLR(socket, &_rep->active_ex_fd_set); |
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL2, |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
"Failed to close tickle sockets"); |
"Monitor::run FD_CLR EXECEPTION"); |
|
} | } |
if (events & SocketMessage::READ) |
Socket::uninitializeInterface(); |
{ |
|
FD_CLR(socket, &_rep->active_rd_fd_set); |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::run FD_CLR READ"); |
|
} | } |
MessageQueue* queue = MessageQueue::lookup(_entries[i].queueId); |
|
if( ! queue ) |
|
|
//////////////////////////////////////////////////////////////////////////////// |
|
// |
|
// Monitor |
|
// |
|
//////////////////////////////////////////////////////////////////////////////// |
|
|
|
#define MAX_NUMBER_OF_MONITOR_ENTRIES 32 |
|
Monitor::Monitor() |
|
: _stopConnections(0), |
|
_stopConnectionsSem(0), |
|
_solicitSocketCount(0) |
|
{ |
|
int numberOfMonitorEntriesToAllocate = MAX_NUMBER_OF_MONITOR_ENTRIES; |
|
_entries.reserveCapacity(numberOfMonitorEntriesToAllocate); |
|
|
|
// Create a MonitorEntry for the Tickler and set its state to IDLE so the |
|
// Monitor will watch for its events. |
|
_entries.append(MonitorEntry( |
|
_tickler.getReadHandle(), |
|
1, |
|
MonitorEntry::STATUS_IDLE, |
|
MonitorEntry::TYPE_TICKLER)); |
|
|
|
// Start the count at 1 because _entries[0] is the Tickler |
|
for (int i = 1; i < numberOfMonitorEntriesToAllocate; i++) |
{ | { |
unsolicitSocketMessages(socket); |
_entries.append(MonitorEntry()); |
break; |
} |
} | } |
| |
if(_entries[i]._type == Monitor::CONNECTION) |
Monitor::~Monitor() |
{ | { |
if( static_cast<HTTPConnection *>(queue)->refcount.value() == 0 ) |
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4, |
|
"returning from monitor destructor"); |
|
} |
|
|
|
void Monitor::tickle() |
{ | { |
|
_tickler.notify(); |
|
} |
| |
static_cast<HTTPConnection *>(queue)->refcount++; |
void Monitor::setState( |
if( false == static_cast<HTTPConnection *>(queue)->is_dying()) |
Uint32 index, |
_controller->async_thread_exec(*_module_handle, _dispatch, (void *)queue); |
MonitorEntry::Status status) |
else |
{ |
static_cast<HTTPConnection *>(queue)->refcount--; |
AutoMutex autoEntryMutex(_entriesMutex); |
|
// Set the state to requested state |
|
_entries[index].status = status; |
} | } |
|
|
|
void Monitor::run(Uint32 milliseconds) |
|
{ |
|
struct timeval tv = {milliseconds/1000, milliseconds%1000*1000}; |
|
|
|
fd_set fdread; |
|
FD_ZERO(&fdread); |
|
|
|
AutoMutex autoEntryMutex(_entriesMutex); |
|
|
|
ArrayIterator<MonitorEntry> entries(_entries); |
|
|
|
// Check the stopConnections flag. If set, clear the Acceptor monitor |
|
// entries |
|
if (_stopConnections.get() == 1) |
|
{ |
|
for (Uint32 indx = 0; indx < entries.size(); indx++) |
|
{ |
|
if (entries[indx].type == MonitorEntry::TYPE_ACCEPTOR) |
|
{ |
|
if (entries[indx].status != MonitorEntry::STATUS_EMPTY) |
|
{ |
|
if (entries[indx].status == MonitorEntry::STATUS_IDLE || |
|
entries[indx].status == MonitorEntry::STATUS_DYING) |
|
{ |
|
// remove the entry |
|
entries[indx].status = MonitorEntry::STATUS_EMPTY; |
} | } |
else | else |
{ | { |
Message* message = new SocketMessage(socket, events); |
// set status to DYING |
queue->enqueue(message); |
entries[indx].status = MonitorEntry::STATUS_DYING; |
} | } |
count--; |
|
pegasus_yield(); |
|
} | } |
handled_events = true; |
|
} | } |
|
} |
return(handled_events); |
_stopConnections = 0; |
|
_stopConnectionsSem.signal(); |
} | } |
| |
Boolean Monitor::solicitSocketMessages( |
for (Uint32 indx = 0; indx < entries.size(); indx++) |
Sint32 socket, |
{ |
Uint32 events, |
const MonitorEntry& entry = entries[indx]; |
Uint32 queueId, |
|
int type) |
if ((entry.status == MonitorEntry::STATUS_DYING) && |
|
(entry.type == MonitorEntry::TYPE_CONNECTION)) |
{ | { |
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::solictSocketMessage"); |
MessageQueue *q = MessageQueue::lookup(entry.queueId); |
|
PEGASUS_ASSERT(q != 0); |
|
HTTPConnection &h = *static_cast<HTTPConnection *>(q); |
| |
// See whether a handler is already registered for this one: |
if (h._connectionClosePending == false) |
Uint32 pos = _findEntry(socket); |
continue; |
| |
if (pos != PEGASUS_NOT_FOUND) |
// NOTE: do not attempt to delete while there are pending responses |
|
// coming thru. The last response to come thru after a |
|
// _connectionClosePending will reset _responsePending to false |
|
// and then cause the monitor to rerun this code and clean up. |
|
// (see HTTPConnection.cpp) |
|
|
|
if (h._responsePending == true) |
{ | { |
PEG_METHOD_EXIT(); |
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
return false; |
"Monitor::run - Ignoring connection delete request " |
|
"because responses are still pending. " |
|
"connection=0x%p, socket=%d\n", |
|
(void *)&h, h.getSocket())); |
|
continue; |
} | } |
|
h._connectionClosePending = false; |
|
HTTPAcceptor &o = h.getOwningAcceptor(); |
|
Message* message= new CloseConnectionMessage(entry.socket); |
|
message->dest = o.getQueueId(); |
| |
// Set the events: |
// HTTPAcceptor is responsible for closing the connection. |
|
// The lock is released to allow HTTPAcceptor to call |
if (events & SocketMessage::READ) |
// unsolicitSocketMessages to free the entry. |
FD_SET(socket, &_rep->rd_fd_set); |
// Once HTTPAcceptor completes processing of the close |
|
// connection, the lock is re-requested and processing of |
|
// the for loop continues. This is safe with the current |
|
// implementation of the entries object. Note that the |
|
// loop condition accesses the entries.size() on each |
|
// iteration, so that a change in size while the mutex is |
|
// unlocked will not result in an ArrayIndexOutOfBounds |
|
// exception. |
| |
if (events & SocketMessage::WRITE) |
_entriesMutex.unlock(); |
FD_SET(socket, &_rep->wr_fd_set); |
o.enqueue(message); |
|
_entriesMutex.lock(); |
| |
if (events & SocketMessage::EXCEPTION) |
// After enqueue a message and the autoEntryMutex has been |
FD_SET(socket, &_rep->ex_fd_set); |
// released and locked again, the array of _entries can be |
|
// changed. The ArrayIterator has be reset with the original |
|
// _entries. |
|
entries.reset(_entries); |
|
} |
|
} |
| |
// Add the entry to the list: |
Uint32 _idleEntries = 0; |
_MonitorEntry entry(socket, queueId, type); |
|
_entries.append(entry); |
|
| |
// Success! |
/* |
|
We will keep track of the maximum socket number and pass this value |
|
to the kernel as a parameter to SELECT. This loop seems like a good |
|
place to calculate the max file descriptor (maximum socket number) |
|
because we have to traverse the entire array. |
|
*/ |
|
SocketHandle maxSocketCurrentPass = 0; |
|
for (Uint32 indx = 0; indx < entries.size(); indx++) |
|
{ |
|
if (maxSocketCurrentPass < entries[indx].socket) |
|
maxSocketCurrentPass = entries[indx].socket; |
| |
PEG_METHOD_EXIT(); |
if (entries[indx].status == MonitorEntry::STATUS_IDLE) |
return true; |
{ |
|
_idleEntries++; |
|
FD_SET(entries[indx].socket, &fdread); |
} | } |
|
} |
|
|
|
/* |
|
Add 1 then assign maxSocket accordingly. We add 1 to account for |
|
descriptors starting at 0. |
|
*/ |
|
maxSocketCurrentPass++; |
|
|
|
_entriesMutex.unlock(); |
| |
Boolean Monitor::unsolicitSocketMessages(Sint32 socket) |
// |
|
// The first argument to select() is ignored on Windows and it is not |
|
// a socket value. The original code assumed that the number of sockets |
|
// and a socket value have the same type. On Windows they do not. |
|
// |
|
#ifdef PEGASUS_OS_TYPE_WINDOWS |
|
int events = select(0, &fdread, NULL, NULL, &tv); |
|
#else |
|
int events = select(maxSocketCurrentPass, &fdread, NULL, NULL, &tv); |
|
#endif |
|
int selectErrno = getSocketError(); |
|
|
|
_entriesMutex.lock(); |
|
|
|
struct timeval timeNow; |
|
Time::gettimeofday(&timeNow); |
|
|
|
// After enqueue a message and the autoEntryMutex has been released and |
|
// locked again, the array of _entries can be changed. The ArrayIterator |
|
// has be reset with the original _entries |
|
entries.reset(_entries); |
|
|
|
if (events == PEGASUS_SOCKET_ERROR) |
|
{ |
|
PEG_TRACE((TRC_HTTP, Tracer::LEVEL1, |
|
"Monitor::run - select() returned error %d.", selectErrno)); |
|
// The EBADF error indicates that one or more or the file |
|
// descriptions was not valid. This could indicate that |
|
// the entries structure has been corrupted or that |
|
// we have a synchronization error. |
|
|
|
PEGASUS_ASSERT(selectErrno != EBADF); |
|
} |
|
else if (events) |
|
{ |
|
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::run select event received events = %d, monitoring %d " |
|
"idle entries", |
|
events, _idleEntries)); |
|
for (Uint32 indx = 0; indx < entries.size(); indx++) |
|
{ |
|
// The Monitor should only look at entries in the table that are |
|
// IDLE (i.e., owned by the Monitor). |
|
if ((entries[indx].status == MonitorEntry::STATUS_IDLE) && |
|
(FD_ISSET(entries[indx].socket, &fdread))) |
|
{ |
|
MessageQueue* q = MessageQueue::lookup(entries[indx].queueId); |
|
PEGASUS_ASSERT(q != 0); |
|
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::run indx = %d, queueId = %d, q = %p", |
|
indx, entries[indx].queueId, q)); |
|
|
|
try |
|
{ |
|
if (entries[indx].type == MonitorEntry::TYPE_CONNECTION) |
|
{ |
|
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
|
"entries[%d].type is TYPE_CONNECTION", |
|
indx)); |
|
|
|
HTTPConnection *dst = |
|
reinterpret_cast<HTTPConnection *>(q); |
|
dst->_entry_index = indx; |
|
|
|
// Update idle start time because we have received some |
|
// data. Any data is good data at this point, and we'll |
|
// keep the connection alive, even if we've exceeded |
|
// the idleConnectionTimeout, which will be checked |
|
// when we call closeConnectionOnTimeout() next. |
|
Time::gettimeofday(&dst->_idleStartTime); |
|
|
|
// Check for accept pending (ie. SSL handshake pending) |
|
// or idle connection timeouts for sockets from which |
|
// we received data (avoiding extra queue lookup below). |
|
if (!dst->closeConnectionOnTimeout(&timeNow)) |
|
{ |
|
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
|
"Entering HTTPConnection::run() for " |
|
"indx = %d, queueId = %d, q = %p", |
|
indx, entries[indx].queueId, q)); |
|
|
|
try |
|
{ |
|
dst->run(1); |
|
} |
|
catch (...) |
{ | { |
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::unsolicitSocketMessage"); |
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL1, |
|
"Caught exception from " |
|
"HTTPConnection::run()"); |
|
} |
|
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4, |
|
"Exited HTTPConnection::run()"); |
|
} |
|
} |
|
else if (entries[indx].type == MonitorEntry::TYPE_TICKLER) |
|
{ |
|
_tickler.reset(); |
|
} |
|
else |
|
{ |
|
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
|
"Non-connection entry, indx = %d, has been " |
|
"received.", |
|
indx)); |
|
Message* msg = new SocketMessage( |
|
entries[indx].socket, SocketMessage::READ); |
|
entries[indx].status = MonitorEntry::STATUS_BUSY; |
|
_entriesMutex.unlock(); |
|
q->enqueue(msg); |
|
_entriesMutex.lock(); |
| |
// Look for the given entry and remove it: |
// After enqueue a message and the autoEntryMutex has |
|
// been released and locked again, the array of |
|
// entries can be changed. The ArrayIterator has to be |
|
// reset with the latest _entries. |
|
entries.reset(_entries); |
|
entries[indx].status = MonitorEntry::STATUS_IDLE; |
|
} |
|
} |
|
catch (...) |
|
{ |
|
} |
|
} |
|
// else check for accept pending (ie. SSL handshake pending) or |
|
// idle connection timeouts for sockets from which we did not |
|
// receive data. |
|
else if ((entries[indx].status == MonitorEntry::STATUS_IDLE) && |
|
entries[indx].type == MonitorEntry::TYPE_CONNECTION) |
| |
for (Uint32 i = 0, n = _entries.size(); i < n; i++) |
|
{ | { |
if (_entries[i].socket == socket) |
MessageQueue* q = MessageQueue::lookup(entries[indx].queueId); |
|
PEGASUS_ASSERT(q != 0); |
|
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(q); |
|
dst->_entry_index = indx; |
|
dst->closeConnectionOnTimeout(&timeNow); |
|
} |
|
} |
|
} |
|
// else if "events" is zero (ie. select timed out) then we still need |
|
// to check if there are any pending SSL handshakes that have timed out. |
|
else |
{ | { |
Sint32 socket = _entries[i].socket; |
for (Uint32 indx = 0; indx < entries.size(); indx++) |
FD_CLR(socket, &_rep->rd_fd_set); |
{ |
FD_CLR(socket, &_rep->wr_fd_set); |
if ((entries[indx].status == MonitorEntry::STATUS_IDLE) && |
FD_CLR(socket, &_rep->ex_fd_set); |
entries[indx].type == MonitorEntry::TYPE_CONNECTION) |
_entries.remove(i); |
{ |
// ATTN-RK-P3-20020521: Need "Socket::close(socket);" here? |
MessageQueue* q = MessageQueue::lookup(entries[indx].queueId); |
PEG_METHOD_EXIT(); |
PEGASUS_ASSERT(q != 0); |
return true; |
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(q); |
|
dst->_entry_index = indx; |
|
dst->closeConnectionOnTimeout(&timeNow); |
|
} |
} | } |
} | } |
PEG_METHOD_EXIT(); |
|
return false; |
|
} | } |
| |
Uint32 Monitor::_findEntry(Sint32 socket) |
void Monitor::stopListeningForConnections(Boolean wait) |
{ | { |
for (Uint32 i = 0, n = _entries.size(); i < n; i++) |
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::stopListeningForConnections()"); |
|
// set boolean then tickle the server to recognize _stopConnections |
|
_stopConnections = 1; |
|
tickle(); |
|
|
|
if (wait) |
{ | { |
if (_entries[i].socket == socket) |
// Wait for the monitor to notice _stopConnections. Otherwise the |
return i; |
// caller of this function may unbind the ports while the monitor |
|
// is still accepting connections on them. |
|
_stopConnectionsSem.wait(); |
} | } |
| |
return PEG_NOT_FOUND; |
PEG_METHOD_EXIT(); |
} | } |
| |
| |
PEGASUS_THREAD_RETURN PEGASUS_THREAD_CDECL Monitor::_dispatch(void *parm) |
int Monitor::solicitSocketMessages( |
|
SocketHandle socket, |
|
Uint32 events, |
|
Uint32 queueId, |
|
Uint32 type) |
|
{ |
|
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::solicitSocketMessages"); |
|
AutoMutex autoMut(_entriesMutex); |
|
|
|
// Check to see if we need to dynamically grow the _entries array |
|
// We always want the _entries array to be 2 bigger than the |
|
// current connections requested |
|
_solicitSocketCount++; // bump the count |
|
|
|
for (Uint32 i = _entries.size(); i < _solicitSocketCount + 1; i++) |
{ | { |
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(parm); |
_entries.append(MonitorEntry()); |
if( true == dst->is_dying()) |
} |
|
|
|
for (Uint32 index = 1; index < _entries.size(); index++) |
{ | { |
dst->refcount--; |
try |
return 0; |
{ |
|
if (_entries[index].status == MonitorEntry::STATUS_EMPTY) |
|
{ |
|
_entries[index].socket = socket; |
|
_entries[index].queueId = queueId; |
|
_entries[index].type = type; |
|
_entries[index].status = MonitorEntry::STATUS_IDLE; |
|
|
|
return (int)index; |
} | } |
if( false == dst->is_dying()) |
} |
|
catch (...) |
{ | { |
if(false == dst->run(1)) |
} |
pegasus_sleep(1); |
} |
|
// decrease the count, if we are here we didn't do anything meaningful |
|
_solicitSocketCount--; |
|
PEG_METHOD_EXIT(); |
|
return -1; |
|
} |
|
|
|
void Monitor::unsolicitSocketMessages(SocketHandle socket) |
|
{ |
|
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::unsolicitSocketMessages"); |
|
AutoMutex autoMut(_entriesMutex); |
| |
|
/* |
|
Start at index = 1 because _entries[0] is the tickle entry which |
|
never needs to be reset to EMPTY; |
|
*/ |
|
for (Uint32 index = 1; index < _entries.size(); index++) |
|
{ |
|
if (_entries[index].socket == socket) |
|
{ |
|
_entries[index].reset(); |
|
_solicitSocketCount--; |
|
break; |
|
} |
} | } |
dst->refcount--; |
|
return 0; |
/* |
|
Dynamic Contraction: |
|
To remove excess entries we will start from the end of the _entries |
|
array and remove all entries with EMPTY status until we find the |
|
first NON EMPTY. This prevents the positions, of the NON EMPTY |
|
entries, from being changed. |
|
*/ |
|
for (Uint32 index = _entries.size() - 1; |
|
(_entries[index].status == MonitorEntry::STATUS_EMPTY) && |
|
(index >= MAX_NUMBER_OF_MONITOR_ENTRIES); |
|
index--) |
|
{ |
|
_entries.remove(index); |
} | } |
| |
|
PEG_METHOD_EXIT(); |
|
} |
| |
PEGASUS_NAMESPACE_END | PEGASUS_NAMESPACE_END |