// Copyright (c) 2006-2013, Andrey N. Sabelnikov, www.sabelnikov.net // All rights reserved. // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are met: // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above copyright // notice, this list of conditions and the following disclaimer in the // documentation and/or other materials provided with the distribution. // * Neither the name of the Andrey N. Sabelnikov nor the // names of its contributors may be used to endorse or promote products // derived from this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND // ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED // WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE // DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER BE LIABLE FOR ANY // DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES // (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; // LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND // ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS // SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // #pragma once #include #include #include #include #include #include #include #include "levin_base.h" #include "buffer.h" #include "misc_language.h" #include "syncobj.h" #include "misc_os_dependent.h" #include "int-util.h" #include #include #undef MONERO_DEFAULT_LOG_CATEGORY #define MONERO_DEFAULT_LOG_CATEGORY "net" #ifndef MIN_BYTES_WANTED #define MIN_BYTES_WANTED 512 #endif namespace epee { namespace levin { /************************************************************************/ /* */ /************************************************************************/ template class async_protocol_handler; template class async_protocol_handler_config { typedef boost::unordered_map* > connections_map; critical_section m_connects_lock; connections_map m_connects; void add_connection(async_protocol_handler* pc); void del_connection(async_protocol_handler* pc); async_protocol_handler* find_connection(boost::uuids::uuid connection_id) const; int find_and_lock_connection(boost::uuids::uuid connection_id, async_protocol_handler*& aph); friend class async_protocol_handler; levin_commands_handler* m_pcommands_handler; void (*m_pcommands_handler_destroy)(levin_commands_handler*); void delete_connections (size_t count, bool incoming); public: typedef t_connection_context connection_context; uint64_t m_initial_max_packet_size; uint64_t m_max_packet_size; uint64_t m_invoke_timeout; int invoke(int command, const epee::span in_buff, std::string& buff_out, boost::uuids::uuid connection_id); template int invoke_async(int command, const epee::span in_buff, boost::uuids::uuid connection_id, const callback_t &cb, size_t timeout = LEVIN_DEFAULT_TIMEOUT_PRECONFIGURED); int notify(int command, const epee::span in_buff, boost::uuids::uuid connection_id); int send(epee::byte_slice message, const boost::uuids::uuid& connection_id); bool close(boost::uuids::uuid connection_id); bool update_connection_context(const t_connection_context& contxt); bool request_callback(boost::uuids::uuid connection_id); template bool foreach_connection(const callback_t &cb); template bool for_connection(const boost::uuids::uuid &connection_id, const callback_t &cb); size_t get_connections_count(); size_t get_out_connections_count(); size_t get_in_connections_count(); void set_handler(levin_commands_handler* handler, void (*destroy)(levin_commands_handler*) = NULL); async_protocol_handler_config():m_pcommands_handler(NULL), m_pcommands_handler_destroy(NULL), m_initial_max_packet_size(LEVIN_INITIAL_MAX_PACKET_SIZE), m_max_packet_size(LEVIN_DEFAULT_MAX_PACKET_SIZE), m_invoke_timeout(LEVIN_DEFAULT_TIMEOUT_PRECONFIGURED) {} ~async_protocol_handler_config() { set_handler(NULL, NULL); } void del_out_connections(size_t count); void del_in_connections(size_t count); }; /************************************************************************/ /* */ /************************************************************************/ template class async_protocol_handler { std::string m_fragment_buffer; bool send_message(uint32_t command, epee::span in_buff, uint32_t flags, bool expect_response) { const bucket_head2 head = make_header(command, in_buff.size(), flags, expect_response); if(!m_pservice_endpoint->do_send(byte_slice{as_byte_span(head), in_buff})) return false; MDEBUG(m_connection_context << "LEVIN_PACKET_SENT. [len=" << head.m_cb << ", flags" << head.m_flags << ", r?=" << head.m_have_to_return_data <<", cmd = " << head.m_command << ", ver=" << head.m_protocol_version); return true; } public: typedef t_connection_context connection_context; typedef async_protocol_handler_config config_type; enum stream_state { stream_state_head, stream_state_body }; std::atomic m_protocol_released; volatile uint32_t m_invoke_buf_ready; volatile int m_invoke_result_code; critical_section m_local_inv_buff_lock; std::string m_local_inv_buff; critical_section m_call_lock; volatile uint32_t m_wait_count; volatile uint32_t m_close_called; bucket_head2 m_current_head; net_utils::i_service_endpoint* m_pservice_endpoint; config_type& m_config; t_connection_context& m_connection_context; std::atomic m_max_packet_size; net_utils::buffer m_cache_in_buffer; stream_state m_state; int32_t m_oponent_protocol_ver; bool m_connection_initialized; struct invoke_response_handler_base { virtual bool handle(int res, const epee::span buff, connection_context& context)=0; virtual bool is_timer_started() const=0; virtual void cancel()=0; virtual bool cancel_timer()=0; virtual void reset_timer()=0; }; template struct anvoke_handler: invoke_response_handler_base { anvoke_handler(const callback_t& cb, uint64_t timeout, async_protocol_handler& con, int command) :m_cb(cb), m_timeout(timeout), m_con(con), m_timer(con.m_pservice_endpoint->get_io_service()), m_timer_started(false), m_cancel_timer_called(false), m_timer_cancelled(false), m_command(command) { if(m_con.start_outer_call()) { MDEBUG(con.get_context_ref() << "anvoke_handler, timeout: " << timeout); m_timer.expires_from_now(boost::posix_time::milliseconds(timeout)); m_timer.async_wait([&con, command, cb, timeout](const boost::system::error_code& ec) { if(ec == boost::asio::error::operation_aborted) return; MINFO(con.get_context_ref() << "Timeout on invoke operation happened, command: " << command << " timeout: " << timeout); epee::span fake; cb(LEVIN_ERROR_CONNECTION_TIMEDOUT, fake, con.get_context_ref()); con.close(); con.finish_outer_call(); }); m_timer_started = true; } } virtual ~anvoke_handler() {} callback_t m_cb; async_protocol_handler& m_con; boost::asio::deadline_timer m_timer; bool m_timer_started; bool m_cancel_timer_called; bool m_timer_cancelled; uint64_t m_timeout; int m_command; virtual bool handle(int res, const epee::span buff, typename async_protocol_handler::connection_context& context) { if(!cancel_timer()) return false; m_cb(res, buff, context); m_con.finish_outer_call(); return true; } virtual bool is_timer_started() const { return m_timer_started; } virtual void cancel() { if(cancel_timer()) { epee::span fake; m_cb(LEVIN_ERROR_CONNECTION_DESTROYED, fake, m_con.get_context_ref()); m_con.finish_outer_call(); } } virtual bool cancel_timer() { if(!m_cancel_timer_called) { m_cancel_timer_called = true; boost::system::error_code ignored_ec; m_timer_cancelled = 1 == m_timer.cancel(ignored_ec); } return m_timer_cancelled; } virtual void reset_timer() { boost::system::error_code ignored_ec; if (!m_cancel_timer_called && m_timer.cancel(ignored_ec) > 0) { callback_t& cb = m_cb; uint64_t timeout = m_timeout; async_protocol_handler& con = m_con; int command = m_command; m_timer.expires_from_now(boost::posix_time::milliseconds(m_timeout)); m_timer.async_wait([&con, cb, command, timeout](const boost::system::error_code& ec) { if(ec == boost::asio::error::operation_aborted) return; MINFO(con.get_context_ref() << "Timeout on invoke operation happened, command: " << command << " timeout: " << timeout); epee::span fake; cb(LEVIN_ERROR_CONNECTION_TIMEDOUT, fake, con.get_context_ref()); con.close(); con.finish_outer_call(); }); } } }; critical_section m_invoke_response_handlers_lock; std::list > m_invoke_response_handlers; template bool add_invoke_response_handler(const callback_t &cb, uint64_t timeout, async_protocol_handler& con, int command) { CRITICAL_REGION_LOCAL(m_invoke_response_handlers_lock); if (m_protocol_released) { MERROR("Adding response handler to a released object"); return false; } boost::shared_ptr handler(boost::make_shared>(cb, timeout, con, command)); m_invoke_response_handlers.push_back(handler); return handler->is_timer_started(); } template friend struct anvoke_handler; public: async_protocol_handler(net_utils::i_service_endpoint* psnd_hndlr, config_type& config, t_connection_context& conn_context): m_current_head(bucket_head2()), m_pservice_endpoint(psnd_hndlr), m_config(config), m_connection_context(conn_context), m_max_packet_size(config.m_initial_max_packet_size), m_cache_in_buffer(4 * 1024), m_state(stream_state_head) { m_close_called = 0; m_protocol_released = false; m_wait_count = 0; m_oponent_protocol_ver = 0; m_connection_initialized = false; m_invoke_buf_ready = 0; m_invoke_result_code = LEVIN_ERROR_CONNECTION; } virtual ~async_protocol_handler() { try { if(m_connection_initialized) { m_config.del_connection(this); } for (size_t i = 0; i < 60 * 1000 / 100 && 0 != boost::interprocess::ipcdetail::atomic_read32(&m_wait_count); ++i) { misc_utils::sleep_no_w(100); } CHECK_AND_ASSERT_MES_NO_RET(0 == boost::interprocess::ipcdetail::atomic_read32(&m_wait_count), "Failed to wait for operation completion. m_wait_count = " << m_wait_count); MTRACE(m_connection_context << "~async_protocol_handler()"); } catch (...) { /* ignore */ } } bool start_outer_call() { MTRACE(m_connection_context << "[levin_protocol] -->> start_outer_call"); if(!m_pservice_endpoint->add_ref()) { MERROR(m_connection_context << "[levin_protocol] -->> start_outer_call failed"); return false; } boost::interprocess::ipcdetail::atomic_inc32(&m_wait_count); return true; } bool finish_outer_call() { MTRACE(m_connection_context << "[levin_protocol] <<-- finish_outer_call"); boost::interprocess::ipcdetail::atomic_dec32(&m_wait_count); m_pservice_endpoint->release(); return true; } bool release_protocol() { decltype(m_invoke_response_handlers) local_invoke_response_handlers; CRITICAL_REGION_BEGIN(m_invoke_response_handlers_lock); local_invoke_response_handlers.swap(m_invoke_response_handlers); m_protocol_released = true; CRITICAL_REGION_END(); // Never call callback inside critical section, that can cause deadlock. Callback can be called when // invoke_response_handler_base is cancelled std::for_each(local_invoke_response_handlers.begin(), local_invoke_response_handlers.end(), [](const boost::shared_ptr& pinv_resp_hndlr) { pinv_resp_hndlr->cancel(); }); return true; } bool close() { boost::interprocess::ipcdetail::atomic_inc32(&m_close_called); m_pservice_endpoint->close(); return true; } void update_connection_context(const connection_context& contxt) { m_connection_context = contxt; } void request_callback() { misc_utils::auto_scope_leave_caller scope_exit_handler = misc_utils::create_scope_leave_handler( boost::bind(&async_protocol_handler::finish_outer_call, this)); m_pservice_endpoint->request_callback(); } void handle_qued_callback() { m_config.m_pcommands_handler->callback(m_connection_context); } virtual bool handle_recv(const void* ptr, size_t cb) { if(boost::interprocess::ipcdetail::atomic_read32(&m_close_called)) return false; //closing connections if(!m_config.m_pcommands_handler) { MERROR(m_connection_context << "Commands handler not set!"); return false; } // these should never fail, but do runtime check for safety const uint64_t max_packet_size = m_max_packet_size; CHECK_AND_ASSERT_MES(max_packet_size >= m_cache_in_buffer.size(), false, "Bad m_cache_in_buffer.size()"); CHECK_AND_ASSERT_MES(max_packet_size - m_cache_in_buffer.size() >= m_fragment_buffer.size(), false, "Bad m_cache_in_buffer.size() + m_fragment_buffer.size()"); // flipped to subtraction; prevent overflow since m_max_packet_size is variable and public if(cb > max_packet_size - m_cache_in_buffer.size() - m_fragment_buffer.size()) { MWARNING(m_connection_context << "Maximum packet size exceed!, m_max_packet_size = " << max_packet_size << ", packet received " << m_cache_in_buffer.size() + cb << ", connection will be closed."); return false; } m_cache_in_buffer.append((const char*)ptr, cb); bool is_continue = true; while(is_continue) { switch(m_state) { case stream_state_body: if(m_cache_in_buffer.size() < m_current_head.m_cb) { is_continue = false; if(cb >= MIN_BYTES_WANTED) { CRITICAL_REGION_LOCAL(m_invoke_response_handlers_lock); if (!m_invoke_response_handlers.empty()) { //async call scenario boost::shared_ptr response_handler = m_invoke_response_handlers.front(); response_handler->reset_timer(); MDEBUG(m_connection_context << "LEVIN_PACKET partial msg received. len=" << cb << ", current total " << m_cache_in_buffer.size() << "/" << m_current_head.m_cb << " (" << (100.0f * m_cache_in_buffer.size() / (m_current_head.m_cb ? m_current_head.m_cb : 1)) << "%)"); } } break; } { std::string temp{}; epee::span buff_to_invoke = m_cache_in_buffer.carve((std::string::size_type)m_current_head.m_cb); m_state = stream_state_head; // abstract_tcp_server2.h manages max bandwidth for a p2p link if (!(m_current_head.m_flags & (LEVIN_PACKET_REQUEST | LEVIN_PACKET_RESPONSE))) { // special noise/fragment command static constexpr const uint32_t both_flags = (LEVIN_PACKET_BEGIN | LEVIN_PACKET_END); if ((m_current_head.m_flags & both_flags) == both_flags) break; // noise message, skip to next message if (m_current_head.m_flags & LEVIN_PACKET_BEGIN) m_fragment_buffer.clear(); m_fragment_buffer.append(reinterpret_cast(buff_to_invoke.data()), buff_to_invoke.size()); if (!(m_current_head.m_flags & LEVIN_PACKET_END)) break; // skip to next message if (m_fragment_buffer.size() < sizeof(bucket_head2)) { MERROR(m_connection_context << "Fragmented data too small for levin header"); return false; } temp = std::move(m_fragment_buffer); m_fragment_buffer.clear(); std::memcpy(std::addressof(m_current_head), std::addressof(temp[0]), sizeof(bucket_head2)); const size_t max_bytes = m_connection_context.get_max_bytes(m_current_head.m_command); if(m_current_head.m_cb > std::min(max_packet_size, max_bytes)) { MERROR(m_connection_context << "Maximum packet size exceed!, m_max_packet_size = " << std::min(max_packet_size, max_bytes) << ", packet header received " << m_current_head.m_cb << ", command " << m_current_head.m_command << ", connection will be closed."); return false; } buff_to_invoke = {reinterpret_cast(temp.data()) + sizeof(bucket_head2), temp.size() - sizeof(bucket_head2)}; } bool is_response = (m_oponent_protocol_ver == LEVIN_PROTOCOL_VER_1 && m_current_head.m_flags&LEVIN_PACKET_RESPONSE); MDEBUG(m_connection_context << "LEVIN_PACKET_RECEIVED. [len=" << m_current_head.m_cb << ", flags" << m_current_head.m_flags << ", r?=" << m_current_head.m_have_to_return_data <<", cmd = " << m_current_head.m_command << ", v=" << m_current_head.m_protocol_version); if(is_response) {//response to some invoke epee::critical_region_t invoke_response_handlers_guard(m_invoke_response_handlers_lock); if(!m_invoke_response_handlers.empty()) {//async call scenario boost::shared_ptr response_handler = m_invoke_response_handlers.front(); bool timer_cancelled = response_handler->cancel_timer(); // Don't pop handler, to avoid destroying it if(timer_cancelled) m_invoke_response_handlers.pop_front(); invoke_response_handlers_guard.unlock(); if(timer_cancelled) response_handler->handle(m_current_head.m_return_code, buff_to_invoke, m_connection_context); } else { invoke_response_handlers_guard.unlock(); //use sync call scenario if(!boost::interprocess::ipcdetail::atomic_read32(&m_wait_count) && !boost::interprocess::ipcdetail::atomic_read32(&m_close_called)) { MERROR(m_connection_context << "no active invoke when response came, wtf?"); return false; }else { CRITICAL_REGION_BEGIN(m_local_inv_buff_lock); m_local_inv_buff = std::string((const char*)buff_to_invoke.data(), buff_to_invoke.size()); buff_to_invoke = epee::span((const uint8_t*)NULL, 0); m_invoke_result_code = m_current_head.m_return_code; CRITICAL_REGION_END(); boost::interprocess::ipcdetail::atomic_write32(&m_invoke_buf_ready, 1); } } }else { if(m_current_head.m_have_to_return_data) { byte_slice return_buff; const uint32_t return_code = m_config.m_pcommands_handler->invoke( m_current_head.m_command, buff_to_invoke, return_buff, m_connection_context ); // peer_id remains unset if dropped if (m_current_head.m_command == m_connection_context.handshake_command() && m_connection_context.handshake_complete()) m_max_packet_size = m_config.m_max_packet_size; bucket_head2 head = make_header(m_current_head.m_command, return_buff.size(), LEVIN_PACKET_RESPONSE, false); head.m_return_code = SWAP32LE(return_code); if(!m_pservice_endpoint->do_send(byte_slice{{epee::as_byte_span(head), epee::to_span(return_buff)}})) return false; MDEBUG(m_connection_context << "LEVIN_PACKET_SENT. [len=" << head.m_cb << ", flags" << head.m_flags << ", r?=" << head.m_have_to_return_data <<", cmd = " << head.m_command << ", ver=" << head.m_protocol_version); } else m_config.m_pcommands_handler->notify(m_current_head.m_command, buff_to_invoke, m_connection_context); } // reuse small buffer if (!temp.empty() && temp.capacity() <= 64 * 1024) { temp.clear(); m_fragment_buffer = std::move(temp); } } break; case stream_state_head: { if(m_cache_in_buffer.size() < sizeof(bucket_head2)) { if(m_cache_in_buffer.size() >= sizeof(uint64_t) && *((uint64_t*)m_cache_in_buffer.span(8).data()) != SWAP64LE(LEVIN_SIGNATURE)) { MWARNING(m_connection_context << "Signature mismatch, connection will be closed"); return false; } is_continue = false; break; } #if BYTE_ORDER == LITTLE_ENDIAN bucket_head2& phead = *(bucket_head2*)m_cache_in_buffer.span(sizeof(bucket_head2)).data(); #else bucket_head2 phead = *(bucket_head2*)m_cache_in_buffer.span(sizeof(bucket_head2)).data(); phead.m_signature = SWAP64LE(phead.m_signature); phead.m_cb = SWAP64LE(phead.m_cb); phead.m_command = SWAP32LE(phead.m_command); phead.m_return_code = SWAP32LE(phead.m_return_code); phead.m_flags = SWAP32LE(phead.m_flags); phead.m_protocol_version = SWAP32LE(phead.m_protocol_version); #endif if(LEVIN_SIGNATURE != phead.m_signature) { LOG_ERROR_CC(m_connection_context, "Signature mismatch, connection will be closed"); return false; } m_current_head = phead; m_cache_in_buffer.erase(sizeof(bucket_head2)); m_state = stream_state_body; m_oponent_protocol_ver = m_current_head.m_protocol_version; const size_t max_bytes = m_connection_context.get_max_bytes(m_current_head.m_command); if(m_current_head.m_cb > std::min(max_packet_size, max_bytes)) { LOG_ERROR_CC(m_connection_context, "Maximum packet size exceed!, m_max_packet_size = " << std::min(max_packet_size, max_bytes) << ", packet header received " << m_current_head.m_cb << ", command " << m_current_head.m_command << ", connection will be closed."); return false; } } break; default: LOG_ERROR_CC(m_connection_context, "Undefined state in levin_server_impl::connection_handler, m_state=" << m_state); return false; } } return true; } bool after_init_connection() { if (!m_connection_initialized) { m_connection_initialized = true; m_config.add_connection(this); } return true; } template bool async_invoke(int command, const epee::span in_buff, const callback_t &cb, size_t timeout = LEVIN_DEFAULT_TIMEOUT_PRECONFIGURED) { misc_utils::auto_scope_leave_caller scope_exit_handler = misc_utils::create_scope_leave_handler( boost::bind(&async_protocol_handler::finish_outer_call, this)); if(timeout == LEVIN_DEFAULT_TIMEOUT_PRECONFIGURED) timeout = m_config.m_invoke_timeout; int err_code = LEVIN_OK; do { CRITICAL_REGION_LOCAL(m_call_lock); boost::interprocess::ipcdetail::atomic_write32(&m_invoke_buf_ready, 0); CRITICAL_REGION_BEGIN(m_invoke_response_handlers_lock); if (command == m_connection_context.handshake_command()) m_max_packet_size = m_config.m_max_packet_size; if(!send_message(command, in_buff, LEVIN_PACKET_REQUEST, true)) { LOG_ERROR_CC(m_connection_context, "Failed to do_send"); err_code = LEVIN_ERROR_CONNECTION; break; } if(!add_invoke_response_handler(cb, timeout, *this, command)) { err_code = LEVIN_ERROR_CONNECTION_DESTROYED; break; } CRITICAL_REGION_END(); } while (false); if (LEVIN_OK != err_code) { epee::span stub_buff = nullptr; // Never call callback inside critical section, that can cause deadlock cb(err_code, stub_buff, m_connection_context); return false; } return true; } int invoke(int command, const epee::span in_buff, std::string& buff_out) { misc_utils::auto_scope_leave_caller scope_exit_handler = misc_utils::create_scope_leave_handler( boost::bind(&async_protocol_handler::finish_outer_call, this)); CRITICAL_REGION_LOCAL(m_call_lock); boost::interprocess::ipcdetail::atomic_write32(&m_invoke_buf_ready, 0); if (command == m_connection_context.handshake_command()) m_max_packet_size = m_config.m_max_packet_size; if (!send_message(command, in_buff, LEVIN_PACKET_REQUEST, true)) { LOG_ERROR_CC(m_connection_context, "Failed to send request"); return LEVIN_ERROR_CONNECTION; } uint64_t ticks_start = misc_utils::get_tick_count(); size_t prev_size = 0; while(!boost::interprocess::ipcdetail::atomic_read32(&m_invoke_buf_ready) && !m_protocol_released) { if(m_cache_in_buffer.size() - prev_size >= MIN_BYTES_WANTED) { prev_size = m_cache_in_buffer.size(); ticks_start = misc_utils::get_tick_count(); } if(misc_utils::get_tick_count() - ticks_start > m_config.m_invoke_timeout) { MWARNING(m_connection_context << "invoke timeout (" << m_config.m_invoke_timeout << "), closing connection "); close(); return LEVIN_ERROR_CONNECTION_TIMEDOUT; } if(!m_pservice_endpoint->call_run_once_service_io()) return LEVIN_ERROR_CONNECTION_DESTROYED; } if(m_protocol_released) return LEVIN_ERROR_CONNECTION_DESTROYED; CRITICAL_REGION_BEGIN(m_local_inv_buff_lock); buff_out.swap(m_local_inv_buff); m_local_inv_buff.clear(); CRITICAL_REGION_END(); return m_invoke_result_code; } int notify(int command, const epee::span in_buff) { misc_utils::auto_scope_leave_caller scope_exit_handler = misc_utils::create_scope_leave_handler( boost::bind(&async_protocol_handler::finish_outer_call, this)); CRITICAL_REGION_LOCAL(m_call_lock); if (!send_message(command, in_buff, LEVIN_PACKET_REQUEST, false)) { LOG_ERROR_CC(m_connection_context, "Failed to send notify message"); return -1; } return 1; } /*! Sends `message` without adding a levin header. The message must have been created with `make_notify`, `make_noise_notify` or `make_fragmented_notify`. See additional instructions for `make_fragmented_notify`. \return 1 on success */ int send(byte_slice message) { const misc_utils::auto_scope_leave_caller scope_exit_handler = misc_utils::create_scope_leave_handler( boost::bind(&async_protocol_handler::finish_outer_call, this) ); const std::size_t length = message.size(); if (!m_pservice_endpoint->do_send(std::move(message))) { LOG_ERROR_CC(m_connection_context, "Failed to send message, dropping it"); return -1; } MDEBUG(m_connection_context << "LEVIN_PACKET_SENT. [len=" << (length - sizeof(bucket_head2)) << ", r?=0]"); return 1; } //------------------------------------------------------------------------------------------ boost::uuids::uuid get_connection_id() {return m_connection_context.m_connection_id;} //------------------------------------------------------------------------------------------ t_connection_context& get_context_ref() {return m_connection_context;} }; //------------------------------------------------------------------------------------------ template void async_protocol_handler_config::del_connection(async_protocol_handler* pconn) { CRITICAL_REGION_BEGIN(m_connects_lock); m_connects.erase(pconn->get_connection_id()); CRITICAL_REGION_END(); m_pcommands_handler->on_connection_close(pconn->m_connection_context); } //------------------------------------------------------------------------------------------ template void async_protocol_handler_config::delete_connections(size_t count, bool incoming) { std::vector connections; CRITICAL_REGION_BEGIN(m_connects_lock); for (auto& c: m_connects) { if (c.second->m_connection_context.m_is_income == incoming) connections.push_back(c.first); } // close random connections from the provided set // TODO or better just keep removing random elements (performance) unsigned seed = std::chrono::system_clock::now().time_since_epoch().count(); shuffle(connections.begin(), connections.end(), std::default_random_engine(seed)); while (count > 0 && connections.size() > 0) { try { auto i = connections.end() - 1; async_protocol_handler *conn = m_connects.at(*i); del_connection(conn); conn->close(); connections.erase(i); } catch (const std::out_of_range &e) { MWARNING("Connection not found in m_connects, continuing"); } --count; } CRITICAL_REGION_END(); } //------------------------------------------------------------------------------------------ template void async_protocol_handler_config::del_out_connections(size_t count) { delete_connections(count, false); } //------------------------------------------------------------------------------------------ template void async_protocol_handler_config::del_in_connections(size_t count) { delete_connections(count, true); } //------------------------------------------------------------------------------------------ template void async_protocol_handler_config::add_connection(async_protocol_handler* pconn) { CRITICAL_REGION_BEGIN(m_connects_lock); m_connects[pconn->get_connection_id()] = pconn; CRITICAL_REGION_END(); m_pcommands_handler->on_connection_new(pconn->m_connection_context); } //------------------------------------------------------------------------------------------ template async_protocol_handler* async_protocol_handler_config::find_connection(boost::uuids::uuid connection_id) const { auto it = m_connects.find(connection_id); return it == m_connects.end() ? 0 : it->second; } //------------------------------------------------------------------------------------------ template int async_protocol_handler_config::find_and_lock_connection(boost::uuids::uuid connection_id, async_protocol_handler*& aph) { CRITICAL_REGION_LOCAL(m_connects_lock); aph = find_connection(connection_id); if(0 == aph) return LEVIN_ERROR_CONNECTION_NOT_FOUND; if(!aph->start_outer_call()) return LEVIN_ERROR_CONNECTION_DESTROYED; return LEVIN_OK; } //------------------------------------------------------------------------------------------ template int async_protocol_handler_config::invoke(int command, const epee::span in_buff, std::string& buff_out, boost::uuids::uuid connection_id) { async_protocol_handler* aph; int r = find_and_lock_connection(connection_id, aph); return LEVIN_OK == r ? aph->invoke(command, in_buff, buff_out) : r; } //------------------------------------------------------------------------------------------ template template int async_protocol_handler_config::invoke_async(int command, const epee::span in_buff, boost::uuids::uuid connection_id, const callback_t &cb, size_t timeout) { async_protocol_handler* aph; int r = find_and_lock_connection(connection_id, aph); return LEVIN_OK == r ? aph->async_invoke(command, in_buff, cb, timeout) : r; } //------------------------------------------------------------------------------------------ template template bool async_protocol_handler_config::foreach_connection(const callback_t &cb) { CRITICAL_REGION_LOCAL(m_connects_lock); for(auto& c: m_connects) { async_protocol_handler* aph = c.second; if(!cb(aph->get_context_ref())) return false; } return true; } //------------------------------------------------------------------------------------------ template template bool async_protocol_handler_config::for_connection(const boost::uuids::uuid &connection_id, const callback_t &cb) { CRITICAL_REGION_LOCAL(m_connects_lock); async_protocol_handler* aph = find_connection(connection_id); if (!aph) return false; if(!cb(aph->get_context_ref())) return false; return true; } //------------------------------------------------------------------------------------------ template size_t async_protocol_handler_config::get_connections_count() { CRITICAL_REGION_LOCAL(m_connects_lock); return m_connects.size(); } //------------------------------------------------------------------------------------------ template size_t async_protocol_handler_config::get_out_connections_count() { CRITICAL_REGION_LOCAL(m_connects_lock); size_t count = 0; for (const auto &c: m_connects) if (!c.second->m_connection_context.m_is_income) ++count; return count; } //------------------------------------------------------------------------------------------ template size_t async_protocol_handler_config::get_in_connections_count() { CRITICAL_REGION_LOCAL(m_connects_lock); size_t count = 0; for (const auto &c: m_connects) if (c.second->m_connection_context.m_is_income) ++count; return count; } //------------------------------------------------------------------------------------------ template void async_protocol_handler_config::set_handler(levin_commands_handler* handler, void (*destroy)(levin_commands_handler*)) { if (m_pcommands_handler && m_pcommands_handler_destroy) (*m_pcommands_handler_destroy)(m_pcommands_handler); m_pcommands_handler = handler; m_pcommands_handler_destroy = destroy; } //------------------------------------------------------------------------------------------ template int async_protocol_handler_config::notify(int command, const epee::span in_buff, boost::uuids::uuid connection_id) { async_protocol_handler* aph; int r = find_and_lock_connection(connection_id, aph); return LEVIN_OK == r ? aph->notify(command, in_buff) : r; } //------------------------------------------------------------------------------------------ template int async_protocol_handler_config::send(byte_slice message, const boost::uuids::uuid& connection_id) { async_protocol_handler* aph; int r = find_and_lock_connection(connection_id, aph); return LEVIN_OK == r ? aph->send(std::move(message)) : 0; } //------------------------------------------------------------------------------------------ template bool async_protocol_handler_config::close(boost::uuids::uuid connection_id) { CRITICAL_REGION_LOCAL(m_connects_lock); async_protocol_handler* aph = find_connection(connection_id); if (!aph) return false; if (!aph->close()) return false; m_connects.erase(connection_id); return true; } //------------------------------------------------------------------------------------------ template bool async_protocol_handler_config::update_connection_context(const t_connection_context& contxt) { CRITICAL_REGION_LOCAL(m_connects_lock); async_protocol_handler* aph = find_connection(contxt.m_connection_id); if(0 == aph) return false; aph->update_connection_context(contxt); return true; } //------------------------------------------------------------------------------------------ template bool async_protocol_handler_config::request_callback(boost::uuids::uuid connection_id) { async_protocol_handler* aph; int r = find_and_lock_connection(connection_id, aph); if(LEVIN_OK == r) { aph->request_callback(); return true; } else { return false; } } } }