blob: f9dabf7c0a00003cda2c1e239cb9c855f4476cb8 [file] [log] [blame]
Emeric Brun2b920a12010-09-23 18:30:22 +02001/*
Emeric Brunb3971ab2015-05-12 18:49:09 +02002 * Peer synchro management.
Emeric Brun2b920a12010-09-23 18:30:22 +02003 *
4 * Copyright 2010 EXCELIANCE, Emeric Brun <ebrun@exceliance.fr>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
13#include <errno.h>
Emeric Brun2b920a12010-09-23 18:30:22 +020014#include <stdio.h>
15#include <stdlib.h>
16#include <string.h>
17
18#include <sys/socket.h>
19#include <sys/stat.h>
20#include <sys/types.h>
21
Willy Tarreau8db34cc2021-10-06 17:53:19 +020022#include <import/eb32tree.h>
23#include <import/ebmbtree.h>
24#include <import/ebpttree.h>
25
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020026#include <haproxy/api.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020027#include <haproxy/applet.h>
Willy Tarreau8bd146d2022-07-19 20:17:38 +020028#include <haproxy/cfgparse.h>
Willy Tarreauf1d32c42020-06-04 21:07:02 +020029#include <haproxy/channel.h>
Willy Tarreau83487a82020-06-04 20:19:54 +020030#include <haproxy/cli.h>
Willy Tarreau3afc4c42020-06-03 18:23:19 +020031#include <haproxy/dict.h>
Willy Tarreau36979d92020-06-05 17:27:29 +020032#include <haproxy/errors.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020033#include <haproxy/fd.h>
Willy Tarreau762d7a52020-06-04 11:23:07 +020034#include <haproxy/frontend.h>
Willy Tarreau6131d6a2020-06-02 16:48:09 +020035#include <haproxy/net_helper.h>
Willy Tarreau8efbdfb2020-06-04 11:29:21 +020036#include <haproxy/obj_type-t.h>
Willy Tarreau3c2a7c22020-06-04 18:38:21 +020037#include <haproxy/peers.h>
Willy Tarreaua264d962020-06-04 22:29:18 +020038#include <haproxy/proxy.h>
Willy Tarreau5edca2f2022-05-27 09:25:10 +020039#include <haproxy/sc_strm.h>
Willy Tarreau48d25b32020-06-04 18:58:52 +020040#include <haproxy/session-t.h>
Willy Tarreau3727a8a2020-06-04 17:37:26 +020041#include <haproxy/signal.h>
Willy Tarreau2eec9b52020-06-04 19:58:55 +020042#include <haproxy/stats-t.h>
Willy Tarreaucb086c62022-05-27 09:47:12 +020043#include <haproxy/stconn.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020044#include <haproxy/stick_table.h>
45#include <haproxy/stream.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020046#include <haproxy/task.h>
47#include <haproxy/thread.h>
Willy Tarreau92b4f132020-06-01 11:05:15 +020048#include <haproxy/time.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020049#include <haproxy/tools.h>
Frédéric Lécailled8659352020-11-10 16:18:03 +010050#include <haproxy/trace.h>
Emeric Brun2b920a12010-09-23 18:30:22 +020051
Emeric Brun2b920a12010-09-23 18:30:22 +020052
53/*******************************/
54/* Current peer learning state */
55/*******************************/
56
57/******************************/
Emeric Brunb3971ab2015-05-12 18:49:09 +020058/* Current peers section resync state */
Emeric Brun2b920a12010-09-23 18:30:22 +020059/******************************/
Emeric Brunccdfbae2021-04-28 12:59:35 +020060#define PEERS_F_RESYNC_LOCAL 0x00000001 /* Learn from local finished or no more needed */
61#define PEERS_F_RESYNC_REMOTE 0x00000002 /* Learn from remote finished or no more needed */
62#define PEERS_F_RESYNC_ASSIGN 0x00000004 /* A peer was assigned to learn our lesson */
63#define PEERS_F_RESYNC_PROCESS 0x00000008 /* The assigned peer was requested for resync */
64#define PEERS_F_RESYNC_LOCALTIMEOUT 0x00000010 /* Timeout waiting for a full resync from a local node */
65#define PEERS_F_RESYNC_REMOTETIMEOUT 0x00000020 /* Timeout waiting for a full resync from a remote node */
66#define PEERS_F_RESYNC_LOCALABORT 0x00000040 /* Session aborted learning from a local node */
67#define PEERS_F_RESYNC_REMOTEABORT 0x00000080 /* Session aborted learning from a remote node */
68#define PEERS_F_RESYNC_LOCALFINISHED 0x00000100 /* A local node teach us and was fully up to date */
69#define PEERS_F_RESYNC_REMOTEFINISHED 0x00000200 /* A remote node teach us and was fully up to date */
70#define PEERS_F_RESYNC_LOCALPARTIAL 0x00000400 /* A local node teach us but was partially up to date */
71#define PEERS_F_RESYNC_REMOTEPARTIAL 0x00000800 /* A remote node teach us but was partially up to date */
72#define PEERS_F_RESYNC_LOCALASSIGN 0x00001000 /* A local node was assigned for a full resync */
73#define PEERS_F_RESYNC_REMOTEASSIGN 0x00002000 /* A remote node was assigned for a full resync */
74#define PEERS_F_RESYNC_REQUESTED 0x00004000 /* A resync was explicitly requested */
75#define PEERS_F_DONOTSTOP 0x00010000 /* Main table sync task block process during soft stop
76 to push data to new process */
Emeric Brun2b920a12010-09-23 18:30:22 +020077
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010078#define PEERS_RESYNC_STATEMASK (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE)
79#define PEERS_RESYNC_FROMLOCAL 0x00000000
80#define PEERS_RESYNC_FROMREMOTE PEERS_F_RESYNC_LOCAL
81#define PEERS_RESYNC_FINISHED (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE)
Emeric Brunb3971ab2015-05-12 18:49:09 +020082
83/***********************************/
84/* Current shared table sync state */
85/***********************************/
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010086#define SHTABLE_F_TEACH_STAGE1 0x00000001 /* Teach state 1 complete */
87#define SHTABLE_F_TEACH_STAGE2 0x00000002 /* Teach state 2 complete */
Emeric Brun2b920a12010-09-23 18:30:22 +020088
89/******************************/
90/* Remote peer teaching state */
91/******************************/
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010092#define PEER_F_TEACH_PROCESS 0x00000001 /* Teach a lesson to current peer */
93#define PEER_F_TEACH_FINISHED 0x00000008 /* Teach conclude, (wait for confirm) */
94#define PEER_F_TEACH_COMPLETE 0x00000010 /* All that we know already taught to current peer, used only for a local peer */
95#define PEER_F_LEARN_ASSIGN 0x00000100 /* Current peer was assigned for a lesson */
96#define PEER_F_LEARN_NOTUP2DATE 0x00000200 /* Learn from peer finished but peer is not up to date */
97#define PEER_F_ALIVE 0x20000000 /* Used to flag a peer a alive. */
98#define PEER_F_HEARTBEAT 0x40000000 /* Heartbeat message to send. */
99#define PEER_F_DWNGRD 0x80000000 /* When this flag is enabled, we must downgrade the supported version announced during peer sessions. */
Emeric Brun2b920a12010-09-23 18:30:22 +0200100
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100101#define PEER_TEACH_RESET ~(PEER_F_TEACH_PROCESS|PEER_F_TEACH_FINISHED) /* PEER_F_TEACH_COMPLETE should never be reset */
102#define PEER_LEARN_RESET ~(PEER_F_LEARN_ASSIGN|PEER_F_LEARN_NOTUP2DATE)
Emeric Brun2b920a12010-09-23 18:30:22 +0200103
Frédéric Lécaille54bff832019-03-26 10:25:20 +0100104#define PEER_RESYNC_TIMEOUT 5000 /* 5 seconds */
105#define PEER_RECONNECT_TIMEOUT 5000 /* 5 seconds */
Christopher Fauletab4b0942022-07-26 19:14:36 +0200106#define PEER_LOCAL_RECONNECT_TIMEOUT 500 /* 500ms */
Frédéric Lécaille645635d2019-02-11 17:49:39 +0100107#define PEER_HEARTBEAT_TIMEOUT 3000 /* 3 seconds */
108
Willy Tarreau8bd146d2022-07-19 20:17:38 +0200109/* default maximum of updates sent at once */
110#define PEER_DEF_MAX_UPDATES_AT_ONCE 200
111
Willy Tarreau49962b52021-02-12 16:56:22 +0100112/* flags for "show peers" */
113#define PEERS_SHOW_F_DICT 0x00000001 /* also show the contents of the dictionary */
114
Emeric Brunb3971ab2015-05-12 18:49:09 +0200115/*****************************/
116/* Sync message class */
117/*****************************/
118enum {
119 PEER_MSG_CLASS_CONTROL = 0,
120 PEER_MSG_CLASS_ERROR,
121 PEER_MSG_CLASS_STICKTABLE = 10,
122 PEER_MSG_CLASS_RESERVED = 255,
123};
124
125/*****************************/
126/* control message types */
127/*****************************/
128enum {
129 PEER_MSG_CTRL_RESYNCREQ = 0,
130 PEER_MSG_CTRL_RESYNCFINISHED,
131 PEER_MSG_CTRL_RESYNCPARTIAL,
132 PEER_MSG_CTRL_RESYNCCONFIRM,
Frédéric Lécaille645635d2019-02-11 17:49:39 +0100133 PEER_MSG_CTRL_HEARTBEAT,
Emeric Brunb3971ab2015-05-12 18:49:09 +0200134};
135
136/*****************************/
137/* error message types */
138/*****************************/
139enum {
140 PEER_MSG_ERR_PROTOCOL = 0,
141 PEER_MSG_ERR_SIZELIMIT,
142};
143
Emeric Brun530ba382020-06-02 11:17:42 +0200144/* network key types;
145 * network types were directly and mistakenly
146 * mapped on sample types, to keep backward
147 * compatiblitiy we keep those values but
148 * we now use a internal/network mapping
149 * to avoid further mistakes adding or
150 * modifying internals types
151 */
152enum {
153 PEER_KT_ANY = 0, /* any type */
154 PEER_KT_RESV1, /* UNUSED */
155 PEER_KT_SINT, /* signed 64bits integer type */
156 PEER_KT_RESV3, /* UNUSED */
157 PEER_KT_IPV4, /* ipv4 type */
158 PEER_KT_IPV6, /* ipv6 type */
159 PEER_KT_STR, /* char string type */
160 PEER_KT_BIN, /* buffer type */
161 PEER_KT_TYPES /* number of types, must always be last */
162};
163
164/* Map used to retrieve network type from internal type
165 * Note: Undeclared mapping maps entry to PEER_KT_ANY == 0
166 */
167static int peer_net_key_type[SMP_TYPES] = {
168 [SMP_T_SINT] = PEER_KT_SINT,
169 [SMP_T_IPV4] = PEER_KT_IPV4,
170 [SMP_T_IPV6] = PEER_KT_IPV6,
171 [SMP_T_STR] = PEER_KT_STR,
172 [SMP_T_BIN] = PEER_KT_BIN,
173};
174
175/* Map used to retrieve internal type from external type
176 * Note: Undeclared mapping maps entry to SMP_T_ANY == 0
177 */
178static int peer_int_key_type[PEER_KT_TYPES] = {
179 [PEER_KT_SINT] = SMP_T_SINT,
180 [PEER_KT_IPV4] = SMP_T_IPV4,
181 [PEER_KT_IPV6] = SMP_T_IPV6,
182 [PEER_KT_STR] = SMP_T_STR,
183 [PEER_KT_BIN] = SMP_T_BIN,
184};
185
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100186/*
187 * Parameters used by functions to build peer protocol messages. */
188struct peer_prep_params {
189 struct {
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100190 struct peer *peer;
191 } hello;
192 struct {
193 unsigned int st1;
194 } error_status;
195 struct {
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100196 struct stksess *stksess;
197 struct shared_table *shared_table;
198 unsigned int updateid;
199 int use_identifier;
200 int use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200201 struct peer *peer;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100202 } updt;
203 struct {
204 struct shared_table *shared_table;
205 } swtch;
206 struct {
207 struct shared_table *shared_table;
208 } ack;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100209 struct {
210 unsigned char head[2];
211 } control;
212 struct {
213 unsigned char head[2];
214 } error;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100215};
Emeric Brunb3971ab2015-05-12 18:49:09 +0200216
217/*******************************/
218/* stick table sync mesg types */
219/* Note: ids >= 128 contains */
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500220/* id message contains data */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200221/*******************************/
Olivier Houchard33992262018-10-16 18:49:26 +0200222#define PEER_MSG_STKT_UPDATE 0x80
223#define PEER_MSG_STKT_INCUPDATE 0x81
224#define PEER_MSG_STKT_DEFINE 0x82
225#define PEER_MSG_STKT_SWITCH 0x83
226#define PEER_MSG_STKT_ACK 0x84
227#define PEER_MSG_STKT_UPDATE_TIMED 0x85
228#define PEER_MSG_STKT_INCUPDATE_TIMED 0x86
Frédéric Lécaille36fb77e2019-06-04 08:28:19 +0200229/* All the stick-table message identifiers abova have the #7 bit set */
230#define PEER_MSG_STKT_BIT 7
231#define PEER_MSG_STKT_BIT_MASK (1 << PEER_MSG_STKT_BIT)
Emeric Brun2b920a12010-09-23 18:30:22 +0200232
Frédéric Lécaille39143342019-05-24 14:32:27 +0200233/* The maximum length of an encoded data length. */
234#define PEER_MSG_ENC_LENGTH_MAXLEN 5
235
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200236/* Minimum 64-bits value encoded with 2 bytes */
237#define PEER_ENC_2BYTES_MIN 0xf0 /* 0xf0 (or 240) */
238/* 3 bytes */
239#define PEER_ENC_3BYTES_MIN ((1ULL << 11) | PEER_ENC_2BYTES_MIN) /* 0x8f0 (or 2288) */
240/* 4 bytes */
241#define PEER_ENC_4BYTES_MIN ((1ULL << 18) | PEER_ENC_3BYTES_MIN) /* 0x408f0 (or 264432) */
242/* 5 bytes */
243#define PEER_ENC_5BYTES_MIN ((1ULL << 25) | PEER_ENC_4BYTES_MIN) /* 0x20408f0 (or 33818864) */
244/* 6 bytes */
245#define PEER_ENC_6BYTES_MIN ((1ULL << 32) | PEER_ENC_5BYTES_MIN) /* 0x1020408f0 (or 4328786160) */
246/* 7 bytes */
247#define PEER_ENC_7BYTES_MIN ((1ULL << 39) | PEER_ENC_6BYTES_MIN) /* 0x81020408f0 (or 554084600048) */
248/* 8 bytes */
249#define PEER_ENC_8BYTES_MIN ((1ULL << 46) | PEER_ENC_7BYTES_MIN) /* 0x4081020408f0 (or 70922828777712) */
250/* 9 bytes */
251#define PEER_ENC_9BYTES_MIN ((1ULL << 53) | PEER_ENC_8BYTES_MIN) /* 0x204081020408f0 (or 9078122083518704) */
252/* 10 bytes */
253#define PEER_ENC_10BYTES_MIN ((1ULL << 60) | PEER_ENC_9BYTES_MIN) /* 0x10204081020408f0 (or 1161999626690365680) */
254
255/* #7 bit used to detect the last byte to be encoded */
256#define PEER_ENC_STOP_BIT 7
257/* The byte minimum value with #7 bit set */
258#define PEER_ENC_STOP_BYTE (1 << PEER_ENC_STOP_BIT)
259/* The left most number of bits set for PEER_ENC_2BYTES_MIN */
260#define PEER_ENC_2BYTES_MIN_BITS 4
261
Frédéric Lécaille39143342019-05-24 14:32:27 +0200262#define PEER_MSG_HEADER_LEN 2
263
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200264#define PEER_STKT_CACHE_MAX_ENTRIES 128
265
Emeric Brun2b920a12010-09-23 18:30:22 +0200266/**********************************/
267/* Peer Session IO handler states */
268/**********************************/
269
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100270enum {
271 PEER_SESS_ST_ACCEPT = 0, /* Initial state for session create by an accept, must be zero! */
272 PEER_SESS_ST_GETVERSION, /* Validate supported protocol version */
273 PEER_SESS_ST_GETHOST, /* Validate host ID correspond to local host id */
274 PEER_SESS_ST_GETPEER, /* Validate peer ID correspond to a known remote peer id */
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100275 /* after this point, data were possibly exchanged */
276 PEER_SESS_ST_SENDSUCCESS, /* Send ret code 200 (success) and wait for message */
277 PEER_SESS_ST_CONNECT, /* Initial state for session create on a connect, push presentation into buffer */
278 PEER_SESS_ST_GETSTATUS, /* Wait for the welcome message */
279 PEER_SESS_ST_WAITMSG, /* Wait for data messages */
280 PEER_SESS_ST_EXIT, /* Exit with status code */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200281 PEER_SESS_ST_ERRPROTO, /* Send error proto message before exit */
282 PEER_SESS_ST_ERRSIZE, /* Send error size message before exit */
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100283 PEER_SESS_ST_END, /* Killed session */
284};
Emeric Brun2b920a12010-09-23 18:30:22 +0200285
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100286/***************************************************/
287/* Peer Session status code - part of the protocol */
288/***************************************************/
Emeric Brun2b920a12010-09-23 18:30:22 +0200289
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100290#define PEER_SESS_SC_CONNECTCODE 100 /* connect in progress */
291#define PEER_SESS_SC_CONNECTEDCODE 110 /* tcp connect success */
Emeric Brun2b920a12010-09-23 18:30:22 +0200292
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100293#define PEER_SESS_SC_SUCCESSCODE 200 /* accept or connect successful */
Emeric Brun2b920a12010-09-23 18:30:22 +0200294
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100295#define PEER_SESS_SC_TRYAGAIN 300 /* try again later */
Emeric Brun2b920a12010-09-23 18:30:22 +0200296
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100297#define PEER_SESS_SC_ERRPROTO 501 /* error protocol */
298#define PEER_SESS_SC_ERRVERSION 502 /* unknown protocol version */
299#define PEER_SESS_SC_ERRHOST 503 /* bad host name */
300#define PEER_SESS_SC_ERRPEER 504 /* unknown peer */
Emeric Brun2b920a12010-09-23 18:30:22 +0200301
302#define PEER_SESSION_PROTO_NAME "HAProxyS"
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200303#define PEER_MAJOR_VER 2
304#define PEER_MINOR_VER 1
305#define PEER_DWNGRD_MINOR_VER 0
Emeric Brun2b920a12010-09-23 18:30:22 +0200306
Willy Tarreau6254a922019-01-29 17:45:23 +0100307static size_t proto_len = sizeof(PEER_SESSION_PROTO_NAME) - 1;
Frédéric Lécailleed2b4a62017-07-13 09:07:09 +0200308struct peers *cfg_peers = NULL;
Willy Tarreau8bd146d2022-07-19 20:17:38 +0200309static int peers_max_updates_at_once = PEER_DEF_MAX_UPDATES_AT_ONCE;
Emeric Brun9ef2ad72019-04-02 17:22:01 +0200310static void peer_session_forceshutdown(struct peer *peer);
Emeric Brun2b920a12010-09-23 18:30:22 +0200311
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200312static struct ebpt_node *dcache_tx_insert(struct dcache *dc,
313 struct dcache_tx_entry *i);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200314static inline void flush_dcache(struct peer *peer);
315
Frédéric Lécailled8659352020-11-10 16:18:03 +0100316/* trace source and events */
317static void peers_trace(enum trace_level level, uint64_t mask,
318 const struct trace_source *src,
319 const struct ist where, const struct ist func,
320 const void *a1, const void *a2, const void *a3, const void *a4);
321
322static const struct trace_event peers_trace_events[] = {
323#define PEERS_EV_UPDTMSG (1 << 0)
324 { .mask = PEERS_EV_UPDTMSG, .name = "updtmsg", .desc = "update message received" },
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100325#define PEERS_EV_ACKMSG (1 << 1)
326 { .mask = PEERS_EV_ACKMSG, .name = "ackmsg", .desc = "ack message received" },
327#define PEERS_EV_SWTCMSG (1 << 2)
328 { .mask = PEERS_EV_SWTCMSG, .name = "swtcmsg", .desc = "switch message received" },
329#define PEERS_EV_DEFMSG (1 << 3)
330 { .mask = PEERS_EV_DEFMSG, .name = "defmsg", .desc = "definition message received" },
331#define PEERS_EV_CTRLMSG (1 << 4)
332 { .mask = PEERS_EV_CTRLMSG, .name = "ctrlmsg", .desc = "control message sent/received" },
333#define PEERS_EV_SESSREL (1 << 5)
334 { .mask = PEERS_EV_SESSREL, .name = "sessrl", .desc = "peer session releasing" },
335#define PEERS_EV_PROTOERR (1 << 6)
336 { .mask = PEERS_EV_PROTOERR, .name = "protoerr", .desc = "protocol error" },
Frédéric Lécailled8659352020-11-10 16:18:03 +0100337};
338
339static const struct name_desc peers_trace_lockon_args[4] = {
340 /* arg1 */ { /* already used by the connection */ },
341 /* arg2 */ { .name="peers", .desc="Peers protocol" },
342 /* arg3 */ { },
343 /* arg4 */ { }
344};
345
346static const struct name_desc peers_trace_decoding[] = {
347#define PEERS_VERB_CLEAN 1
348 { .name="clean", .desc="only user-friendly stuff, generally suitable for level \"user\"" },
349 { /* end */ }
350};
351
352
353struct trace_source trace_peers = {
354 .name = IST("peers"),
355 .desc = "Peers protocol",
356 .arg_def = TRC_ARG1_CONN, /* TRACE()'s first argument is always a connection */
357 .default_cb = peers_trace,
358 .known_events = peers_trace_events,
359 .lockon_args = peers_trace_lockon_args,
360 .decoding = peers_trace_decoding,
361 .report_events = ~0, /* report everything by default */
362};
363
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100364/* Return peer control message types as strings (only for debugging purpose). */
365static inline char *ctrl_msg_type_str(unsigned int type)
366{
367 switch (type) {
368 case PEER_MSG_CTRL_RESYNCREQ:
369 return "RESYNCREQ";
370 case PEER_MSG_CTRL_RESYNCFINISHED:
371 return "RESYNCFINISHED";
372 case PEER_MSG_CTRL_RESYNCPARTIAL:
373 return "RESYNCPARTIAL";
374 case PEER_MSG_CTRL_RESYNCCONFIRM:
375 return "RESYNCCONFIRM";
376 case PEER_MSG_CTRL_HEARTBEAT:
377 return "HEARTBEAT";
378 default:
379 return "???";
380 }
381}
382
Frédéric Lécailled8659352020-11-10 16:18:03 +0100383#define TRACE_SOURCE &trace_peers
384INITCALL1(STG_REGISTER, trace_register_source, TRACE_SOURCE);
385
386static void peers_trace(enum trace_level level, uint64_t mask,
387 const struct trace_source *src,
388 const struct ist where, const struct ist func,
389 const void *a1, const void *a2, const void *a3, const void *a4)
390{
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100391 if (mask & (PEERS_EV_UPDTMSG|PEERS_EV_ACKMSG|PEERS_EV_SWTCMSG)) {
Frédéric Lécailled8659352020-11-10 16:18:03 +0100392 if (a2) {
393 const struct peer *peer = a2;
394
395 chunk_appendf(&trace_buf, " peer=%s", peer->id);
396 }
397 if (a3) {
398 const char *p = a3;
399
400 chunk_appendf(&trace_buf, " @%p", p);
401 }
402 if (a4) {
403 const size_t *val = a4;
404
405 chunk_appendf(&trace_buf, " %llu", (unsigned long long)*val);
406 }
407 }
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100408
409 if (mask & PEERS_EV_DEFMSG) {
410 if (a2) {
411 const struct peer *peer = a2;
412
413 chunk_appendf(&trace_buf, " peer=%s", peer->id);
414 }
415 if (a3) {
416 const char *p = a3;
417
418 chunk_appendf(&trace_buf, " @%p", p);
419 }
420 if (a4) {
421 const int *val = a4;
422
423 chunk_appendf(&trace_buf, " %d", *val);
424 }
425 }
426
427 if (mask & PEERS_EV_CTRLMSG) {
428 if (a2) {
429 const unsigned char *ctrl_msg_type = a2;
430
431 chunk_appendf(&trace_buf, " %s", ctrl_msg_type_str(*ctrl_msg_type));
432
433 }
434 if (a3) {
435 const char *local_peer = a3;
436
437 chunk_appendf(&trace_buf, " %s", local_peer);
438 }
439
440 if (a4) {
441 const char *remote_peer = a4;
442
443 chunk_appendf(&trace_buf, " -> %s", remote_peer);
444 }
445 }
446
447 if (mask & (PEERS_EV_SESSREL|PEERS_EV_PROTOERR)) {
448 if (a2) {
449 const struct peer *peer = a2;
450 struct peers *peers = NULL;
451
Christopher Faulet387e7972022-05-12 14:47:52 +0200452 if (peer->appctx)
453 peers = peer->peers;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100454
455 if (peers)
456 chunk_appendf(&trace_buf, " %s", peers->local->id);
Christopher Fauletd9e6b352021-11-15 09:40:57 +0100457 chunk_appendf(&trace_buf, " -> %s", peer->id);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100458 }
459
460 if (a3) {
461 const int *prev_state = a3;
462
463 chunk_appendf(&trace_buf, " prev_state=%d\n", *prev_state);
464 }
465 }
Frédéric Lécailled8659352020-11-10 16:18:03 +0100466}
467
Frédéric Lécaille95679dc2019-04-15 10:25:27 +0200468static const char *statuscode_str(int statuscode)
469{
470 switch (statuscode) {
471 case PEER_SESS_SC_CONNECTCODE:
472 return "CONN";
473 case PEER_SESS_SC_CONNECTEDCODE:
474 return "HSHK";
475 case PEER_SESS_SC_SUCCESSCODE:
476 return "ESTA";
477 case PEER_SESS_SC_TRYAGAIN:
478 return "RETR";
479 case PEER_SESS_SC_ERRPROTO:
480 return "PROT";
481 case PEER_SESS_SC_ERRVERSION:
482 return "VERS";
483 case PEER_SESS_SC_ERRHOST:
484 return "NAME";
485 case PEER_SESS_SC_ERRPEER:
486 return "UNKN";
487 default:
488 return "NONE";
489 }
490}
491
Emeric Brun18928af2017-03-29 16:32:53 +0200492/* This function encode an uint64 to 'dynamic' length format.
493 The encoded value is written at address *str, and the
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500494 caller must assure that size after *str is large enough.
Emeric Brun18928af2017-03-29 16:32:53 +0200495 At return, the *str is set at the next Byte after then
496 encoded integer. The function returns then length of the
497 encoded integer in Bytes */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200498int intencode(uint64_t i, char **str) {
499 int idx = 0;
500 unsigned char *msg;
501
Emeric Brunb3971ab2015-05-12 18:49:09 +0200502 msg = (unsigned char *)*str;
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200503 if (i < PEER_ENC_2BYTES_MIN) {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200504 msg[0] = (unsigned char)i;
505 *str = (char *)&msg[idx+1];
506 return (idx+1);
507 }
508
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200509 msg[idx] =(unsigned char)i | PEER_ENC_2BYTES_MIN;
510 i = (i - PEER_ENC_2BYTES_MIN) >> PEER_ENC_2BYTES_MIN_BITS;
511 while (i >= PEER_ENC_STOP_BYTE) {
512 msg[++idx] = (unsigned char)i | PEER_ENC_STOP_BYTE;
513 i = (i - PEER_ENC_STOP_BYTE) >> PEER_ENC_STOP_BIT;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200514 }
515 msg[++idx] = (unsigned char)i;
516 *str = (char *)&msg[idx+1];
517 return (idx+1);
518}
519
520
Emeric Brun5ea07d92021-06-30 13:21:58 +0200521/* This function returns a decoded 64bits unsigned integer
522 * from a varint
523 *
524 * Calling:
525 * - *str must point on the first byte of the buffer to decode.
526 * - end must point on the next byte after the end of the buffer
527 * we are authorized to parse (buf + buflen)
528 *
529 * At return:
530 *
531 * On success *str will point at the byte following
532 * the fully decoded integer into the buffer. and
533 * the decoded value is returned.
534 *
535 * If end is reached before the integer was fully decoded,
536 * *str is set to NULL and the caller have to check this
537 * to know there is a decoding error. In this case
538 * the returned integer is also forced to 0
539 */
Emeric Brun18928af2017-03-29 16:32:53 +0200540uint64_t intdecode(char **str, char *end)
541{
Emeric Brunb3971ab2015-05-12 18:49:09 +0200542 unsigned char *msg;
Emeric Brun18928af2017-03-29 16:32:53 +0200543 uint64_t i;
544 int shift;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200545
546 if (!*str)
547 return 0;
548
549 msg = (unsigned char *)*str;
Emeric Brun18928af2017-03-29 16:32:53 +0200550 if (msg >= (unsigned char *)end)
551 goto fail;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200552
Emeric Brun18928af2017-03-29 16:32:53 +0200553 i = *(msg++);
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200554 if (i >= PEER_ENC_2BYTES_MIN) {
555 shift = PEER_ENC_2BYTES_MIN_BITS;
Emeric Brun18928af2017-03-29 16:32:53 +0200556 do {
557 if (msg >= (unsigned char *)end)
558 goto fail;
559 i += (uint64_t)*msg << shift;
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200560 shift += PEER_ENC_STOP_BIT;
561 } while (*(msg++) >= PEER_ENC_STOP_BYTE);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200562 }
Frédéric Lécaillea8725ec2019-01-22 10:31:39 +0100563 *str = (char *)msg;
564 return i;
Emeric Brun18928af2017-03-29 16:32:53 +0200565
Frédéric Lécaillea8725ec2019-01-22 10:31:39 +0100566 fail:
567 *str = NULL;
568 return 0;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200569}
Emeric Brun2b920a12010-09-23 18:30:22 +0200570
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100571/*
572 * Build a "hello" peer protocol message.
573 * Return the number of written bytes written to build this messages if succeeded,
574 * 0 if not.
575 */
576static int peer_prepare_hellomsg(char *msg, size_t size, struct peer_prep_params *p)
577{
578 int min_ver, ret;
579 struct peer *peer;
580
581 peer = p->hello.peer;
582 min_ver = (peer->flags & PEER_F_DWNGRD) ? PEER_DWNGRD_MINOR_VER : PEER_MINOR_VER;
583 /* Prepare headers */
Willy Tarreau2645b342022-04-12 08:28:18 +0200584 ret = snprintf(msg, size, PEER_SESSION_PROTO_NAME " %d.%d\n%s\n%s %d %d\n",
585 (int)PEER_MAJOR_VER, min_ver, peer->id, localpeer, (int)getpid(), (int)1);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100586 if (ret >= size)
587 return 0;
588
589 return ret;
590}
591
592/*
593 * Build a "handshake succeeded" status message.
594 * Return the number of written bytes written to build this messages if succeeded,
595 * 0 if not.
596 */
597static int peer_prepare_status_successmsg(char *msg, size_t size, struct peer_prep_params *p)
598{
599 int ret;
600
Willy Tarreau2645b342022-04-12 08:28:18 +0200601 ret = snprintf(msg, size, "%d\n", (int)PEER_SESS_SC_SUCCESSCODE);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100602 if (ret >= size)
603 return 0;
604
605 return ret;
606}
607
608/*
609 * Build an error status message.
610 * Return the number of written bytes written to build this messages if succeeded,
611 * 0 if not.
612 */
613static int peer_prepare_status_errormsg(char *msg, size_t size, struct peer_prep_params *p)
614{
615 int ret;
616 unsigned int st1;
617
618 st1 = p->error_status.st1;
619 ret = snprintf(msg, size, "%d\n", st1);
620 if (ret >= size)
621 return 0;
622
623 return ret;
624}
625
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200626/* Set the stick-table UPDATE message type byte at <msg_type> address,
627 * depending on <use_identifier> and <use_timed> boolean parameters.
628 * Always successful.
629 */
630static inline void peer_set_update_msg_type(char *msg_type, int use_identifier, int use_timed)
631{
632 if (use_timed) {
633 if (use_identifier)
634 *msg_type = PEER_MSG_STKT_UPDATE_TIMED;
635 else
636 *msg_type = PEER_MSG_STKT_INCUPDATE_TIMED;
637 }
638 else {
639 if (use_identifier)
640 *msg_type = PEER_MSG_STKT_UPDATE;
641 else
642 *msg_type = PEER_MSG_STKT_INCUPDATE;
643 }
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200644}
Emeric Brun2b920a12010-09-23 18:30:22 +0200645/*
Emeric Brunb3971ab2015-05-12 18:49:09 +0200646 * This prepare the data update message on the stick session <ts>, <st> is the considered
647 * stick table.
Joseph Herlant82b2f542018-11-15 12:19:14 -0800648 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +0200649 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
650 * check size)
Emeric Brun2b920a12010-09-23 18:30:22 +0200651 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100652static int peer_prepare_updatemsg(char *msg, size_t size, struct peer_prep_params *p)
Emeric Brun2b920a12010-09-23 18:30:22 +0200653{
654 uint32_t netinteger;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200655 unsigned short datalen;
656 char *cursor, *datamsg;
Emeric Brun94900952015-06-11 18:25:54 +0200657 unsigned int data_type;
658 void *data_ptr;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100659 struct stksess *ts;
660 struct shared_table *st;
661 unsigned int updateid;
662 int use_identifier;
663 int use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200664 struct peer *peer;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100665
666 ts = p->updt.stksess;
667 st = p->updt.shared_table;
668 updateid = p->updt.updateid;
669 use_identifier = p->updt.use_identifier;
670 use_timed = p->updt.use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200671 peer = p->updt.peer;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200672
Frédéric Lécaille0e8db972019-05-24 14:34:34 +0200673 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200674
Emeric Brun2b920a12010-09-23 18:30:22 +0200675 /* construct message */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200676
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500677 /* check if we need to send the update identifier */
Emeric Brun819fc6f2017-06-13 19:37:32 +0200678 if (!st->last_pushed || updateid < st->last_pushed || ((updateid - st->last_pushed) != 1)) {
Emeric Bruna6a09982015-09-22 15:34:19 +0200679 use_identifier = 1;
Emeric Brun2b920a12010-09-23 18:30:22 +0200680 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200681
682 /* encode update identifier if needed */
683 if (use_identifier) {
Emeric Brun819fc6f2017-06-13 19:37:32 +0200684 netinteger = htonl(updateid);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200685 memcpy(cursor, &netinteger, sizeof(netinteger));
686 cursor += sizeof(netinteger);
Emeric Brun2b920a12010-09-23 18:30:22 +0200687 }
688
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200689 if (use_timed) {
690 netinteger = htonl(tick_remain(now_ms, ts->expire));
691 memcpy(cursor, &netinteger, sizeof(netinteger));
692 cursor += sizeof(netinteger);
693 }
694
Emeric Brunb3971ab2015-05-12 18:49:09 +0200695 /* encode the key */
Thierry FOURNIER5d24ebc2015-07-24 08:46:42 +0200696 if (st->table->type == SMP_T_STR) {
Emeric Brun2b920a12010-09-23 18:30:22 +0200697 int stlen = strlen((char *)ts->key.key);
698
Emeric Brunb3971ab2015-05-12 18:49:09 +0200699 intencode(stlen, &cursor);
700 memcpy(cursor, ts->key.key, stlen);
701 cursor += stlen;
Emeric Brun2b920a12010-09-23 18:30:22 +0200702 }
Thierry FOURNIER5d24ebc2015-07-24 08:46:42 +0200703 else if (st->table->type == SMP_T_SINT) {
Willy Tarreau6cde5d82020-02-25 09:41:22 +0100704 netinteger = htonl(read_u32(ts->key.key));
Emeric Brunb3971ab2015-05-12 18:49:09 +0200705 memcpy(cursor, &netinteger, sizeof(netinteger));
706 cursor += sizeof(netinteger);
Emeric Brun2b920a12010-09-23 18:30:22 +0200707 }
708 else {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200709 memcpy(cursor, ts->key.key, st->table->key_size);
710 cursor += st->table->key_size;
Emeric Brun2b920a12010-09-23 18:30:22 +0200711 }
712
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100713 HA_RWLOCK_RDLOCK(STK_SESS_LOCK, &ts->lock);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200714 /* encode values */
Emeric Brun94900952015-06-11 18:25:54 +0200715 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200716
Emeric Brun94900952015-06-11 18:25:54 +0200717 data_ptr = stktable_data_ptr(st->table, ts, data_type);
718 if (data_ptr) {
Emeric Brun90a9b672021-06-22 16:09:55 +0200719 /* in case of array all elements use
720 * the same std_type and they are linearly
721 * encoded.
722 */
723 if (stktable_data_types[data_type].is_array) {
724 unsigned int idx = 0;
725
726 switch (stktable_data_types[data_type].std_type) {
727 case STD_T_SINT: {
728 int data;
729
730 do {
731 data = stktable_data_cast(data_ptr, std_t_sint);
732 intencode(data, &cursor);
733
734 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, ++idx);
735 } while(data_ptr);
736 break;
737 }
738 case STD_T_UINT: {
739 unsigned int data;
740
741 do {
742 data = stktable_data_cast(data_ptr, std_t_uint);
743 intencode(data, &cursor);
744
745 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, ++idx);
746 } while(data_ptr);
747 break;
748 }
749 case STD_T_ULL: {
750 unsigned long long data;
751
752 do {
753 data = stktable_data_cast(data_ptr, std_t_ull);
754 intencode(data, &cursor);
755
756 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, ++idx);
757 } while(data_ptr);
758 break;
759 }
760 case STD_T_FRQP: {
761 struct freq_ctr *frqp;
762
763 do {
764 frqp = &stktable_data_cast(data_ptr, std_t_frqp);
765 intencode((unsigned int)(now_ms - frqp->curr_tick), &cursor);
766 intencode(frqp->curr_ctr, &cursor);
767 intencode(frqp->prev_ctr, &cursor);
768
769 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, ++idx);
770 } while(data_ptr);
771 break;
772 }
773 }
774
775 /* array elements fully encoded
776 * proceed next data_type.
777 */
778 continue;
779 }
Emeric Brun94900952015-06-11 18:25:54 +0200780 switch (stktable_data_types[data_type].std_type) {
781 case STD_T_SINT: {
782 int data;
783
784 data = stktable_data_cast(data_ptr, std_t_sint);
785 intencode(data, &cursor);
786 break;
787 }
788 case STD_T_UINT: {
789 unsigned int data;
790
791 data = stktable_data_cast(data_ptr, std_t_uint);
792 intencode(data, &cursor);
793 break;
794 }
795 case STD_T_ULL: {
796 unsigned long long data;
797
798 data = stktable_data_cast(data_ptr, std_t_ull);
799 intencode(data, &cursor);
800 break;
801 }
802 case STD_T_FRQP: {
Willy Tarreaufa1258f2021-04-10 23:00:53 +0200803 struct freq_ctr *frqp;
Emeric Brun94900952015-06-11 18:25:54 +0200804
805 frqp = &stktable_data_cast(data_ptr, std_t_frqp);
806 intencode((unsigned int)(now_ms - frqp->curr_tick), &cursor);
807 intencode(frqp->curr_ctr, &cursor);
808 intencode(frqp->prev_ctr, &cursor);
809 break;
810 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200811 case STD_T_DICT: {
812 struct dict_entry *de;
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200813 struct ebpt_node *cached_de;
Willy Tarreau237f8ae2019-06-06 16:40:43 +0200814 struct dcache_tx_entry cde = { };
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200815 char *beg, *end;
816 size_t value_len, data_len;
817 struct dcache *dc;
818
819 de = stktable_data_cast(data_ptr, std_t_dict);
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +0100820 if (!de) {
821 /* No entry */
822 intencode(0, &cursor);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200823 break;
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +0100824 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200825
826 dc = peer->dcache;
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200827 cde.entry.key = de;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200828 cached_de = dcache_tx_insert(dc, &cde);
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200829 if (cached_de == &cde.entry) {
830 if (cde.id + 1 >= PEER_ENC_2BYTES_MIN)
831 break;
832 /* Encode the length of the remaining data -> 1 */
833 intencode(1, &cursor);
834 /* Encode the cache entry ID */
835 intencode(cde.id + 1, &cursor);
836 }
837 else {
838 /* Leave enough room to encode the remaining data length. */
839 end = beg = cursor + PEER_MSG_ENC_LENGTH_MAXLEN;
840 /* Encode the dictionary entry key */
841 intencode(cde.id + 1, &end);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200842 /* Encode the length of the dictionary entry data */
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200843 value_len = de->len;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200844 intencode(value_len, &end);
845 /* Copy the data */
846 memcpy(end, de->value.key, value_len);
847 end += value_len;
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200848 /* Encode the length of the data */
849 data_len = end - beg;
850 intencode(data_len, &cursor);
851 memmove(cursor, beg, data_len);
852 cursor += data_len;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200853 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200854 break;
855 }
Emeric Brun94900952015-06-11 18:25:54 +0200856 }
857 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200858 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100859 HA_RWLOCK_RDUNLOCK(STK_SESS_LOCK, &ts->lock);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200860
861 /* Compute datalen */
862 datalen = (cursor - datamsg);
863
864 /* prepare message header */
865 msg[0] = PEER_MSG_CLASS_STICKTABLE;
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200866 peer_set_update_msg_type(&msg[1], use_identifier, use_timed);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200867 cursor = &msg[2];
868 intencode(datalen, &cursor);
869
870 /* move data after header */
871 memmove(cursor, datamsg, datalen);
872
873 /* return header size + data_len */
874 return (cursor - msg) + datalen;
875}
876
877/*
878 * This prepare the switch table message to targeted share table <st>.
Joseph Herlant82b2f542018-11-15 12:19:14 -0800879 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +0200880 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
881 * check size)
882 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100883static int peer_prepare_switchmsg(char *msg, size_t size, struct peer_prep_params *params)
Emeric Brunb3971ab2015-05-12 18:49:09 +0200884{
885 int len;
886 unsigned short datalen;
Willy Tarreau83061a82018-07-13 11:56:34 +0200887 struct buffer *chunk;
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200888 char *cursor, *datamsg, *chunkp, *chunkq;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200889 uint64_t data = 0;
Emeric Brun94900952015-06-11 18:25:54 +0200890 unsigned int data_type;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100891 struct shared_table *st;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200892
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100893 st = params->swtch.shared_table;
Frédéric Lécaille39143342019-05-24 14:32:27 +0200894 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200895
896 /* Encode data */
897
898 /* encode local id */
899 intencode(st->local_id, &cursor);
900
901 /* encode table name */
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +0100902 len = strlen(st->table->nid);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200903 intencode(len, &cursor);
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +0100904 memcpy(cursor, st->table->nid, len);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200905 cursor += len;
906
907 /* encode table type */
908
Emeric Brun530ba382020-06-02 11:17:42 +0200909 intencode(peer_net_key_type[st->table->type], &cursor);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200910
911 /* encode table key size */
912 intencode(st->table->key_size, &cursor);
913
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200914 chunk = get_trash_chunk();
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200915 chunkp = chunkq = chunk->area;
Emeric Brun94900952015-06-11 18:25:54 +0200916 /* encode available known data types in table */
917 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
918 if (st->table->data_ofs[data_type]) {
Emeric Brun90a9b672021-06-22 16:09:55 +0200919 /* stored data types parameters are all linearly encoded
920 * at the end of the 'table definition' message.
921 *
922 * Currently only array data_types and and data_types
923 * using freq_counter base type have parameters:
924 *
925 * - array has always at least one parameter set to the
926 * number of elements.
927 *
928 * - array of base-type freq_counters has an additional
929 * parameter set to the period used to compute those
930 * freq_counters.
931 *
932 * - simple freq counter has a parameter set to the period
933 * used to compute
934 *
935 * A set of parameter for a datatype MUST BE prefixed
936 * by the data-type id itself:
937 * This is useless because the data_types are ordered and
938 * the data_type bitfield already gives the information of
939 * stored types, but it was designed this way when the
940 * push of period parameter was added for freq counters
941 * and we don't want to break the compatibility.
942 *
943 */
944 if (stktable_data_types[data_type].is_array) {
945 /* This is an array type so we first encode
946 * the data_type itself to prefix parameters
947 */
948 intencode(data_type, &chunkq);
949
950 /* We encode the first parameter which is
951 * the number of elements of this array
952 */
953 intencode(st->table->data_nbelem[data_type], &chunkq);
954
Ilya Shipitsin01881082021-08-07 14:41:56 +0500955 /* for array of freq counters, there is an additional
Emeric Brun90a9b672021-06-22 16:09:55 +0200956 * period parameter to encode
957 */
958 if (stktable_data_types[data_type].std_type == STD_T_FRQP)
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200959 intencode(st->table->data_arg[data_type].u, &chunkq);
Emeric Brun94900952015-06-11 18:25:54 +0200960 }
Emeric Brun90a9b672021-06-22 16:09:55 +0200961 else if (stktable_data_types[data_type].std_type == STD_T_FRQP) {
962 /* this datatype is a simple freq counter not part
963 * of an array. We encode the data_type itself
964 * to prefix the 'period' parameter
965 */
966 intencode(data_type, &chunkq);
967 intencode(st->table->data_arg[data_type].u, &chunkq);
968 }
969 /* set the bit corresponding to stored data type */
970 data |= 1ULL << data_type;
Emeric Brun94900952015-06-11 18:25:54 +0200971 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200972 }
973 intencode(data, &cursor);
974
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200975 /* Encode stick-table entries duration. */
976 intencode(st->table->expire, &cursor);
977
978 if (chunkq > chunkp) {
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200979 chunk->data = chunkq - chunkp;
980 memcpy(cursor, chunk->area, chunk->data);
981 cursor += chunk->data;
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200982 }
983
Emeric Brunb3971ab2015-05-12 18:49:09 +0200984 /* Compute datalen */
985 datalen = (cursor - datamsg);
Emeric Brun2b920a12010-09-23 18:30:22 +0200986
Emeric Brunb3971ab2015-05-12 18:49:09 +0200987 /* prepare message header */
988 msg[0] = PEER_MSG_CLASS_STICKTABLE;
989 msg[1] = PEER_MSG_STKT_DEFINE;
990 cursor = &msg[2];
991 intencode(datalen, &cursor);
Emeric Brun2b920a12010-09-23 18:30:22 +0200992
Emeric Brunb3971ab2015-05-12 18:49:09 +0200993 /* move data after header */
994 memmove(cursor, datamsg, datalen);
995
996 /* return header size + data_len */
997 return (cursor - msg) + datalen;
Emeric Brun2b920a12010-09-23 18:30:22 +0200998}
999
Emeric Brunb3971ab2015-05-12 18:49:09 +02001000/*
1001 * This prepare the acknowledge message on the stick session <ts>, <st> is the considered
1002 * stick table.
Joseph Herlant82b2f542018-11-15 12:19:14 -08001003 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +02001004 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
1005 * check size)
1006 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001007static int peer_prepare_ackmsg(char *msg, size_t size, struct peer_prep_params *p)
Emeric Brunb3971ab2015-05-12 18:49:09 +02001008{
1009 unsigned short datalen;
1010 char *cursor, *datamsg;
1011 uint32_t netinteger;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001012 struct shared_table *st;
Emeric Brunb3971ab2015-05-12 18:49:09 +02001013
Frédéric Lécaille39143342019-05-24 14:32:27 +02001014 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +02001015
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001016 st = p->ack.shared_table;
Emeric Brunb3971ab2015-05-12 18:49:09 +02001017 intencode(st->remote_id, &cursor);
1018 netinteger = htonl(st->last_get);
1019 memcpy(cursor, &netinteger, sizeof(netinteger));
1020 cursor += sizeof(netinteger);
1021
1022 /* Compute datalen */
1023 datalen = (cursor - datamsg);
1024
1025 /* prepare message header */
1026 msg[0] = PEER_MSG_CLASS_STICKTABLE;
Emeric Brune1ab8082015-08-21 11:48:54 +02001027 msg[1] = PEER_MSG_STKT_ACK;
Emeric Brunb3971ab2015-05-12 18:49:09 +02001028 cursor = &msg[2];
1029 intencode(datalen, &cursor);
1030
1031 /* move data after header */
1032 memmove(cursor, datamsg, datalen);
1033
1034 /* return header size + data_len */
1035 return (cursor - msg) + datalen;
1036}
Emeric Brun2b920a12010-09-23 18:30:22 +02001037
1038/*
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001039 * Function to deinit connected peer
1040 */
1041void __peer_session_deinit(struct peer *peer)
1042{
Christopher Faulet387e7972022-05-12 14:47:52 +02001043 struct peers *peers = peer->peers;
Maciej Zdebd01be2a2022-05-16 17:26:20 +02001044 int thr;
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001045
Christopher Faulet387e7972022-05-12 14:47:52 +02001046 if (!peers || !peer->appctx)
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001047 return;
1048
Willy Tarreau29ffe262022-06-15 14:31:38 +02001049 thr = peer->appctx->t->tid;
Maciej Zdebd01be2a2022-05-16 17:26:20 +02001050 HA_ATOMIC_DEC(&peers->applet_count[thr]);
1051
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001052 if (peer->appctx->st0 == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02001053 HA_ATOMIC_DEC(&connected_peers);
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001054
Willy Tarreau4781b152021-04-06 13:53:36 +02001055 HA_ATOMIC_DEC(&active_peers);
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001056
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001057 flush_dcache(peer);
1058
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001059 /* Re-init current table pointers to force announcement on re-connect */
1060 peer->remote_table = peer->last_local_table = NULL;
1061 peer->appctx = NULL;
1062 if (peer->flags & PEER_F_LEARN_ASSIGN) {
1063 /* unassign current peer for learning */
1064 peer->flags &= ~(PEER_F_LEARN_ASSIGN);
1065 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
1066
Emeric Brunccdfbae2021-04-28 12:59:35 +02001067 if (peer->local)
1068 peers->flags |= PEERS_F_RESYNC_LOCALABORT;
1069 else
1070 peers->flags |= PEERS_F_RESYNC_REMOTEABORT;
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001071 /* reschedule a resync */
1072 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(5000));
1073 }
1074 /* reset teaching and learning flags to 0 */
1075 peer->flags &= PEER_TEACH_RESET;
1076 peer->flags &= PEER_LEARN_RESET;
1077 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
1078}
1079
Christopher Faulet6712dc62022-05-12 15:36:11 +02001080static int peer_session_init(struct appctx *appctx)
1081{
1082 struct peer *peer = appctx->svcctx;
1083 struct stream *s;
1084 struct sockaddr_storage *addr = NULL;
1085
1086 if (!sockaddr_alloc(&addr, &peer->addr, sizeof(peer->addr)))
1087 goto out_error;
1088
1089 if (appctx_finalize_startup(appctx, peer->peers->peers_fe, &BUF_NULL) == -1)
1090 goto out_free_addr;
1091
1092 s = appctx_strm(appctx);
1093 /* applet is waiting for data */
Willy Tarreau90e8b452022-05-25 18:21:43 +02001094 applet_need_more_data(appctx);
Christopher Faulet6712dc62022-05-12 15:36:11 +02001095 appctx_wakeup(appctx);
1096
1097 /* initiate an outgoing connection */
Willy Tarreau7cb9e6c2022-05-17 19:40:40 +02001098 s->scb->dst = addr;
Willy Tarreaucb041662022-05-17 19:44:42 +02001099 s->scb->flags |= SC_FL_NOLINGER;
Christopher Faulet6712dc62022-05-12 15:36:11 +02001100 s->flags = SF_ASSIGNED;
1101 s->target = peer_session_target(peer, s);
1102
1103 s->do_log = NULL;
1104 s->uniq_id = 0;
1105
1106 s->res.flags |= CF_READ_DONTWAIT;
1107
1108 _HA_ATOMIC_INC(&active_peers);
1109 return 0;
1110
1111 out_free_addr:
1112 sockaddr_free(&addr);
1113 out_error:
1114 return -1;
1115}
1116
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001117/*
Emeric Brun2b920a12010-09-23 18:30:22 +02001118 * Callback to release a session with a peer
1119 */
Willy Tarreau00a37f02015-04-13 12:05:19 +02001120static void peer_session_release(struct appctx *appctx)
Emeric Brun2b920a12010-09-23 18:30:22 +02001121{
Willy Tarreau455caef2022-05-05 20:16:16 +02001122 struct peer *peer = appctx->svcctx;
Emeric Brun2b920a12010-09-23 18:30:22 +02001123
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001124 TRACE_PROTO("releasing peer session", PEERS_EV_SESSREL, NULL, peer);
Willy Tarreau455caef2022-05-05 20:16:16 +02001125 /* appctx->svcctx is not a peer session */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01001126 if (appctx->st0 < PEER_SESS_ST_SENDSUCCESS)
Emeric Brun2b920a12010-09-23 18:30:22 +02001127 return;
1128
1129 /* peer session identified */
Emeric Brunb3971ab2015-05-12 18:49:09 +02001130 if (peer) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +01001131 HA_SPIN_LOCK(PEER_LOCK, &peer->lock);
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001132 if (peer->appctx == appctx)
1133 __peer_session_deinit(peer);
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02001134 peer->flags &= ~PEER_F_ALIVE;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01001135 HA_SPIN_UNLOCK(PEER_LOCK, &peer->lock);
Emeric Brun2b920a12010-09-23 18:30:22 +02001136 }
1137}
1138
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02001139/* Retrieve the major and minor versions of peers protocol
1140 * announced by a remote peer. <str> is a null-terminated
1141 * string with the following format: "<maj_ver>.<min_ver>".
1142 */
1143static int peer_get_version(const char *str,
1144 unsigned int *maj_ver, unsigned int *min_ver)
1145{
1146 unsigned int majv, minv;
1147 const char *pos, *saved;
1148 const char *end;
1149
1150 saved = pos = str;
1151 end = str + strlen(str);
1152
1153 majv = read_uint(&pos, end);
1154 if (saved == pos || *pos++ != '.')
1155 return -1;
1156
1157 saved = pos;
1158 minv = read_uint(&pos, end);
1159 if (saved == pos || pos != end)
1160 return -1;
1161
1162 *maj_ver = majv;
1163 *min_ver = minv;
1164
1165 return 0;
1166}
Emeric Brun2b920a12010-09-23 18:30:22 +02001167
1168/*
Frédéric Lécaillece025572019-01-21 13:38:06 +01001169 * Parse a line terminated by an optional '\r' character, followed by a mandatory
1170 * '\n' character.
1171 * Returns 1 if succeeded or 0 if a '\n' character could not be found, and -1 if
1172 * a line could not be read because the communication channel is closed.
1173 */
1174static inline int peer_getline(struct appctx *appctx)
1175{
Willy Tarreauc12b3212022-05-27 11:08:15 +02001176 struct stconn *sc = appctx_sc(appctx);
Frédéric Lécaillece025572019-01-21 13:38:06 +01001177 int n;
Frédéric Lécaillece025572019-01-21 13:38:06 +01001178
Willy Tarreauda304902022-05-27 10:44:04 +02001179 n = co_getline(sc_oc(sc), trash.area, trash.size);
Frédéric Lécaillece025572019-01-21 13:38:06 +01001180 if (!n)
1181 return 0;
1182
1183 if (n < 0 || trash.area[n - 1] != '\n') {
1184 appctx->st0 = PEER_SESS_ST_END;
1185 return -1;
1186 }
1187
1188 if (n > 1 && (trash.area[n - 2] == '\r'))
1189 trash.area[n - 2] = 0;
1190 else
1191 trash.area[n - 1] = 0;
1192
Willy Tarreauda304902022-05-27 10:44:04 +02001193 co_skip(sc_oc(sc), n);
Frédéric Lécaillece025572019-01-21 13:38:06 +01001194
1195 return n;
1196}
1197
1198/*
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001199 * Send a message after having called <peer_prepare_msg> to build it.
1200 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1201 * Returns -1 if there was not enough room left to send the message,
1202 * any other negative returned value must be considered as an error with an appcxt st0
1203 * returned value equal to PEER_SESS_ST_END.
1204 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001205static inline int peer_send_msg(struct appctx *appctx,
1206 int (*peer_prepare_msg)(char *, size_t, struct peer_prep_params *),
1207 struct peer_prep_params *params)
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001208{
1209 int ret, msglen;
Willy Tarreauc12b3212022-05-27 11:08:15 +02001210 struct stconn *sc = appctx_sc(appctx);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001211
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001212 msglen = peer_prepare_msg(trash.area, trash.size, params);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001213 if (!msglen) {
1214 /* internal error: message does not fit in trash */
1215 appctx->st0 = PEER_SESS_ST_END;
1216 return 0;
1217 }
1218
1219 /* message to buffer */
Willy Tarreauda304902022-05-27 10:44:04 +02001220 ret = ci_putblk(sc_ic(sc), trash.area, msglen);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001221 if (ret <= 0) {
1222 if (ret == -1) {
1223 /* No more write possible */
Willy Tarreauda304902022-05-27 10:44:04 +02001224 sc_need_room(sc);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001225 return -1;
1226 }
1227 appctx->st0 = PEER_SESS_ST_END;
1228 }
1229
1230 return ret;
1231}
1232
1233/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001234 * Send a hello message.
1235 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1236 * Returns -1 if there was not enough room left to send the message,
1237 * any other negative returned value must be considered as an error with an appcxt st0
1238 * returned value equal to PEER_SESS_ST_END.
1239 */
1240static inline int peer_send_hellomsg(struct appctx *appctx, struct peer *peer)
1241{
1242 struct peer_prep_params p = {
1243 .hello.peer = peer,
1244 };
1245
1246 return peer_send_msg(appctx, peer_prepare_hellomsg, &p);
1247}
1248
1249/*
1250 * Send a success peer handshake status message.
1251 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1252 * Returns -1 if there was not enough room left to send the message,
1253 * any other negative returned value must be considered as an error with an appcxt st0
1254 * returned value equal to PEER_SESS_ST_END.
1255 */
1256static inline int peer_send_status_successmsg(struct appctx *appctx)
1257{
1258 return peer_send_msg(appctx, peer_prepare_status_successmsg, NULL);
1259}
1260
1261/*
1262 * Send a peer handshake status error message.
1263 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1264 * Returns -1 if there was not enough room left to send the message,
1265 * any other negative returned value must be considered as an error with an appcxt st0
1266 * returned value equal to PEER_SESS_ST_END.
1267 */
1268static inline int peer_send_status_errormsg(struct appctx *appctx)
1269{
1270 struct peer_prep_params p = {
1271 .error_status.st1 = appctx->st1,
1272 };
1273
1274 return peer_send_msg(appctx, peer_prepare_status_errormsg, &p);
1275}
1276
1277/*
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001278 * Send a stick-table switch message.
1279 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1280 * Returns -1 if there was not enough room left to send the message,
1281 * any other negative returned value must be considered as an error with an appcxt st0
1282 * returned value equal to PEER_SESS_ST_END.
1283 */
1284static inline int peer_send_switchmsg(struct shared_table *st, struct appctx *appctx)
1285{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001286 struct peer_prep_params p = {
1287 .swtch.shared_table = st,
1288 };
1289
1290 return peer_send_msg(appctx, peer_prepare_switchmsg, &p);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001291}
1292
1293/*
1294 * Send a stick-table update acknowledgement message.
1295 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1296 * Returns -1 if there was not enough room left to send the message,
1297 * any other negative returned value must be considered as an error with an appcxt st0
1298 * returned value equal to PEER_SESS_ST_END.
1299 */
1300static inline int peer_send_ackmsg(struct shared_table *st, struct appctx *appctx)
1301{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001302 struct peer_prep_params p = {
1303 .ack.shared_table = st,
1304 };
1305
1306 return peer_send_msg(appctx, peer_prepare_ackmsg, &p);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001307}
1308
1309/*
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01001310 * Send a stick-table update message.
1311 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1312 * Returns -1 if there was not enough room left to send the message,
1313 * any other negative returned value must be considered as an error with an appcxt st0
1314 * returned value equal to PEER_SESS_ST_END.
1315 */
1316static inline int peer_send_updatemsg(struct shared_table *st, struct appctx *appctx, struct stksess *ts,
1317 unsigned int updateid, int use_identifier, int use_timed)
1318{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001319 struct peer_prep_params p = {
Willy Tarreaua898f0c2020-07-03 19:09:29 +02001320 .updt = {
1321 .stksess = ts,
1322 .shared_table = st,
1323 .updateid = updateid,
1324 .use_identifier = use_identifier,
1325 .use_timed = use_timed,
Willy Tarreau455caef2022-05-05 20:16:16 +02001326 .peer = appctx->svcctx,
Willy Tarreaua898f0c2020-07-03 19:09:29 +02001327 },
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001328 };
1329
1330 return peer_send_msg(appctx, peer_prepare_updatemsg, &p);
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01001331}
1332
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001333/*
1334 * Build a peer protocol control class message.
1335 * Returns the number of written bytes used to build the message if succeeded,
1336 * 0 if not.
1337 */
1338static int peer_prepare_control_msg(char *msg, size_t size, struct peer_prep_params *p)
1339{
1340 if (size < sizeof p->control.head)
1341 return 0;
1342
1343 msg[0] = p->control.head[0];
1344 msg[1] = p->control.head[1];
1345
1346 return 2;
1347}
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001348
1349/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001350 * Send a stick-table synchronization request message.
1351 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1352 * Returns -1 if there was not enough room left to send the message,
1353 * any other negative returned value must be considered as an error with an appctx st0
1354 * returned value equal to PEER_SESS_ST_END.
1355 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001356static inline int peer_send_resync_reqmsg(struct appctx *appctx,
1357 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001358{
1359 struct peer_prep_params p = {
1360 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_RESYNCREQ, },
1361 };
1362
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001363 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1364 NULL, &p.control.head[1], peers->local->id, peer->id);
1365
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001366 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1367}
1368
1369/*
1370 * Send a stick-table synchronization confirmation message.
1371 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1372 * Returns -1 if there was not enough room left to send the message,
1373 * any other negative returned value must be considered as an error with an appctx st0
1374 * returned value equal to PEER_SESS_ST_END.
1375 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001376static inline int peer_send_resync_confirmsg(struct appctx *appctx,
1377 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001378{
1379 struct peer_prep_params p = {
1380 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_RESYNCCONFIRM, },
1381 };
1382
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001383 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1384 NULL, &p.control.head[1], peers->local->id, peer->id);
1385
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001386 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1387}
1388
1389/*
1390 * Send a stick-table synchronization finished message.
1391 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1392 * Returns -1 if there was not enough room left to send the message,
1393 * any other negative returned value must be considered as an error with an appctx st0
1394 * returned value equal to PEER_SESS_ST_END.
1395 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001396static inline int peer_send_resync_finishedmsg(struct appctx *appctx,
1397 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001398{
1399 struct peer_prep_params p = {
1400 .control.head = { PEER_MSG_CLASS_CONTROL, },
1401 };
1402
Emeric Brun70de43b2020-03-16 10:51:01 +01001403 p.control.head[1] = (peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FINISHED ?
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001404 PEER_MSG_CTRL_RESYNCFINISHED : PEER_MSG_CTRL_RESYNCPARTIAL;
1405
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001406 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1407 NULL, &p.control.head[1], peers->local->id, peer->id);
1408
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001409 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1410}
1411
1412/*
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001413 * Send a heartbeat message.
1414 * Return 0 if the message could not be built modifying the appctx st0 to PEER_SESS_ST_END value.
1415 * Returns -1 if there was not enough room left to send the message,
1416 * any other negative returned value must be considered as an error with an appctx st0
1417 * returned value equal to PEER_SESS_ST_END.
1418 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001419static inline int peer_send_heartbeatmsg(struct appctx *appctx,
1420 struct peer *peer, struct peers *peers)
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001421{
1422 struct peer_prep_params p = {
1423 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_HEARTBEAT, },
1424 };
1425
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001426 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1427 NULL, &p.control.head[1], peers->local->id, peer->id);
1428
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001429 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1430}
1431
1432/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001433 * Build a peer protocol error class message.
1434 * Returns the number of written bytes used to build the message if succeeded,
1435 * 0 if not.
1436 */
1437static int peer_prepare_error_msg(char *msg, size_t size, struct peer_prep_params *p)
1438{
1439 if (size < sizeof p->error.head)
1440 return 0;
1441
1442 msg[0] = p->error.head[0];
1443 msg[1] = p->error.head[1];
1444
1445 return 2;
1446}
1447
1448/*
1449 * Send a "size limit reached" error message.
1450 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1451 * Returns -1 if there was not enough room left to send the message,
1452 * any other negative returned value must be considered as an error with an appctx st0
1453 * returned value equal to PEER_SESS_ST_END.
1454 */
1455static inline int peer_send_error_size_limitmsg(struct appctx *appctx)
1456{
1457 struct peer_prep_params p = {
1458 .error.head = { PEER_MSG_CLASS_ERROR, PEER_MSG_ERR_SIZELIMIT, },
1459 };
1460
1461 return peer_send_msg(appctx, peer_prepare_error_msg, &p);
1462}
1463
1464/*
1465 * Send a "peer protocol" error message.
1466 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1467 * Returns -1 if there was not enough room left to send the message,
1468 * any other negative returned value must be considered as an error with an appctx st0
1469 * returned value equal to PEER_SESS_ST_END.
1470 */
1471static inline int peer_send_error_protomsg(struct appctx *appctx)
1472{
1473 struct peer_prep_params p = {
1474 .error.head = { PEER_MSG_CLASS_ERROR, PEER_MSG_ERR_PROTOCOL, },
1475 };
1476
1477 return peer_send_msg(appctx, peer_prepare_error_msg, &p);
1478}
1479
1480/*
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001481 * Function used to lookup for recent stick-table updates associated with
1482 * <st> shared stick-table when a lesson must be taught a peer (PEER_F_LEARN_ASSIGN flag set).
1483 */
1484static inline struct stksess *peer_teach_process_stksess_lookup(struct shared_table *st)
1485{
1486 struct eb32_node *eb;
1487
1488 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1489 if (!eb) {
1490 eb = eb32_first(&st->table->updates);
Emeric Brun8e7a13e2021-04-28 11:48:15 +02001491 if (!eb || (eb->key == st->last_pushed)) {
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001492 st->table->commitupdate = st->last_pushed = st->table->localupdate;
1493 return NULL;
1494 }
1495 }
1496
Emeric Brun8e7a13e2021-04-28 11:48:15 +02001497 /* if distance between the last pushed and the retrieved key
1498 * is greater than the distance last_pushed and the local_update
1499 * this means we are beyond localupdate.
1500 */
1501 if ((eb->key - st->last_pushed) > (st->table->localupdate - st->last_pushed)) {
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001502 st->table->commitupdate = st->last_pushed = st->table->localupdate;
1503 return NULL;
1504 }
1505
1506 return eb32_entry(eb, struct stksess, upd);
1507}
1508
1509/*
1510 * Function used to lookup for recent stick-table updates associated with
1511 * <st> shared stick-table during teach state 1 step.
1512 */
1513static inline struct stksess *peer_teach_stage1_stksess_lookup(struct shared_table *st)
1514{
1515 struct eb32_node *eb;
1516
1517 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1518 if (!eb) {
1519 st->flags |= SHTABLE_F_TEACH_STAGE1;
1520 eb = eb32_first(&st->table->updates);
1521 if (eb)
1522 st->last_pushed = eb->key - 1;
1523 return NULL;
1524 }
1525
1526 return eb32_entry(eb, struct stksess, upd);
1527}
1528
1529/*
1530 * Function used to lookup for recent stick-table updates associated with
1531 * <st> shared stick-table during teach state 2 step.
1532 */
1533static inline struct stksess *peer_teach_stage2_stksess_lookup(struct shared_table *st)
1534{
1535 struct eb32_node *eb;
1536
1537 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1538 if (!eb || eb->key > st->teaching_origin) {
1539 st->flags |= SHTABLE_F_TEACH_STAGE2;
1540 return NULL;
1541 }
1542
1543 return eb32_entry(eb, struct stksess, upd);
1544}
1545
1546/*
1547 * Generic function to emit update messages for <st> stick-table when a lesson must
1548 * be taught to the peer <p>.
1549 * <locked> must be set to 1 if the shared table <st> is already locked when entering
1550 * this function, 0 if not.
1551 *
1552 * This function temporary unlock/lock <st> when it sends stick-table updates or
1553 * when decrementing its refcount in case of any error when it sends this updates.
1554 *
1555 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1556 * Returns -1 if there was not enough room left to send the message,
1557 * any other negative returned value must be considered as an error with an appcxt st0
1558 * returned value equal to PEER_SESS_ST_END.
1559 * If it returns 0 or -1, this function leave <st> locked if already locked when entering this function
1560 * unlocked if not already locked when entering this function.
1561 */
1562static inline int peer_send_teachmsgs(struct appctx *appctx, struct peer *p,
1563 struct stksess *(*peer_stksess_lookup)(struct shared_table *),
1564 struct shared_table *st, int locked)
1565{
1566 int ret, new_pushed, use_timed;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001567 int updates_sent = 0;
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001568
1569 ret = 1;
1570 use_timed = 0;
1571 if (st != p->last_local_table) {
1572 ret = peer_send_switchmsg(st, appctx);
1573 if (ret <= 0)
1574 return ret;
1575
1576 p->last_local_table = st;
1577 }
1578
1579 if (peer_stksess_lookup != peer_teach_process_stksess_lookup)
1580 use_timed = !(p->flags & PEER_F_DWNGRD);
1581
1582 /* We force new pushed to 1 to force identifier in update message */
1583 new_pushed = 1;
1584
1585 if (!locked)
Willy Tarreau76642222022-10-11 12:02:50 +02001586 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001587
1588 while (1) {
1589 struct stksess *ts;
1590 unsigned updateid;
1591
1592 /* push local updates */
1593 ts = peer_stksess_lookup(st);
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001594 if (!ts) {
1595 ret = 1; // done
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001596 break;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001597 }
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001598
1599 updateid = ts->upd.key;
Frédéric Lécaille36d15652022-10-17 14:58:19 +02001600 if (p->srv->shard && ts->shard != p->srv->shard) {
1601 /* Skip this entry */
1602 st->last_pushed = updateid;
1603 new_pushed = 1;
1604 continue;
1605 }
1606
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001607 ts->ref_cnt++;
Willy Tarreau76642222022-10-11 12:02:50 +02001608 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001609
1610 ret = peer_send_updatemsg(st, appctx, ts, updateid, new_pushed, use_timed);
1611 if (ret <= 0) {
Willy Tarreau76642222022-10-11 12:02:50 +02001612 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001613 ts->ref_cnt--;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001614 break;
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001615 }
1616
Willy Tarreau76642222022-10-11 12:02:50 +02001617 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001618 ts->ref_cnt--;
1619 st->last_pushed = updateid;
1620
1621 if (peer_stksess_lookup == peer_teach_process_stksess_lookup &&
1622 (int)(st->last_pushed - st->table->commitupdate) > 0)
1623 st->table->commitupdate = st->last_pushed;
1624
1625 /* identifier may not needed in next update message */
1626 new_pushed = 0;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001627
1628 updates_sent++;
1629 if (updates_sent >= peers_max_updates_at_once) {
1630 /* pretend we're full so that we get back ASAP */
1631 struct stconn *sc = appctx_sc(appctx);
1632
1633 sc_need_room(sc);
1634 ret = -1;
1635 break;
1636 }
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001637 }
1638
1639 out:
1640 if (!locked)
Willy Tarreau76642222022-10-11 12:02:50 +02001641 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001642 return ret;
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001643}
1644
1645/*
1646 * Function to emit update messages for <st> stick-table when a lesson must
1647 * be taught to the peer <p> (PEER_F_LEARN_ASSIGN flag set).
1648 *
1649 * Note that <st> shared stick-table is locked when calling this function.
1650 *
1651 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1652 * Returns -1 if there was not enough room left to send the message,
1653 * any other negative returned value must be considered as an error with an appcxt st0
1654 * returned value equal to PEER_SESS_ST_END.
1655 */
1656static inline int peer_send_teach_process_msgs(struct appctx *appctx, struct peer *p,
1657 struct shared_table *st)
1658{
1659 return peer_send_teachmsgs(appctx, p, peer_teach_process_stksess_lookup, st, 1);
1660}
1661
1662/*
1663 * Function to emit update messages for <st> stick-table when a lesson must
1664 * be taught to the peer <p> during teach state 1 step.
1665 *
1666 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1667 * Returns -1 if there was not enough room left to send the message,
1668 * any other negative returned value must be considered as an error with an appcxt st0
1669 * returned value equal to PEER_SESS_ST_END.
1670 */
1671static inline int peer_send_teach_stage1_msgs(struct appctx *appctx, struct peer *p,
1672 struct shared_table *st)
1673{
1674 return peer_send_teachmsgs(appctx, p, peer_teach_stage1_stksess_lookup, st, 0);
1675}
1676
1677/*
1678 * Function to emit update messages for <st> stick-table when a lesson must
1679 * be taught to the peer <p> during teach state 1 step.
1680 *
1681 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1682 * Returns -1 if there was not enough room left to send the message,
1683 * any other negative returned value must be considered as an error with an appcxt st0
1684 * returned value equal to PEER_SESS_ST_END.
1685 */
1686static inline int peer_send_teach_stage2_msgs(struct appctx *appctx, struct peer *p,
1687 struct shared_table *st)
1688{
1689 return peer_send_teachmsgs(appctx, p, peer_teach_stage2_stksess_lookup, st, 0);
1690}
1691
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001692
1693/*
1694 * Function used to parse a stick-table update message after it has been received
1695 * by <p> peer with <msg_cur> as address of the pointer to the position in the
1696 * receipt buffer with <msg_end> being position of the end of the stick-table message.
1697 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
1698 * was encountered.
1699 * <exp> must be set if the stick-table entry expires.
1700 * <updt> must be set for PEER_MSG_STKT_UPDATE or PEER_MSG_STKT_UPDATE_TIMED stick-table
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05001701 * messages, in this case the stick-table update message is received with a stick-table
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001702 * update ID.
1703 * <totl> is the length of the stick-table update message computed upon receipt.
1704 */
Frédéric Lécaille444243c2019-01-24 15:40:11 +01001705static int peer_treat_updatemsg(struct appctx *appctx, struct peer *p, int updt, int exp,
1706 char **msg_cur, char *msg_end, int msg_len, int totl)
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001707{
Willy Tarreauc12b3212022-05-27 11:08:15 +02001708 struct stconn *sc = appctx_sc(appctx);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001709 struct shared_table *st = p->remote_table;
1710 struct stksess *ts, *newts;
1711 uint32_t update;
1712 int expire;
1713 unsigned int data_type;
1714 void *data_ptr;
1715
Frédéric Lécailled8659352020-11-10 16:18:03 +01001716 TRACE_ENTER(PEERS_EV_UPDTMSG, NULL, p);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001717 /* Here we have data message */
1718 if (!st)
1719 goto ignore_msg;
1720
1721 expire = MS_TO_TICKS(st->table->expire);
1722
1723 if (updt) {
Frédéric Lécailled8659352020-11-10 16:18:03 +01001724 if (msg_len < sizeof(update)) {
1725 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001726 goto malformed_exit;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001727 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001728
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001729 memcpy(&update, *msg_cur, sizeof(update));
1730 *msg_cur += sizeof(update);
1731 st->last_get = htonl(update);
1732 }
1733 else {
1734 st->last_get++;
1735 }
1736
1737 if (exp) {
1738 size_t expire_sz = sizeof expire;
1739
Frédéric Lécailled8659352020-11-10 16:18:03 +01001740 if (*msg_cur + expire_sz > msg_end) {
1741 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1742 NULL, p, *msg_cur);
1743 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1744 NULL, p, msg_end, &expire_sz);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001745 goto malformed_exit;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001746 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001747
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001748 memcpy(&expire, *msg_cur, expire_sz);
1749 *msg_cur += expire_sz;
1750 expire = ntohl(expire);
1751 }
1752
1753 newts = stksess_new(st->table, NULL);
1754 if (!newts)
1755 goto ignore_msg;
1756
1757 if (st->table->type == SMP_T_STR) {
1758 unsigned int to_read, to_store;
1759
1760 to_read = intdecode(msg_cur, msg_end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001761 if (!*msg_cur) {
1762 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001763 goto malformed_free_newts;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001764 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001765
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001766 to_store = MIN(to_read, st->table->key_size - 1);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001767 if (*msg_cur + to_store > msg_end) {
1768 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1769 NULL, p, *msg_cur);
1770 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1771 NULL, p, msg_end, &to_store);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001772 goto malformed_free_newts;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001773 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001774
1775 memcpy(newts->key.key, *msg_cur, to_store);
1776 newts->key.key[to_store] = 0;
1777 *msg_cur += to_read;
1778 }
1779 else if (st->table->type == SMP_T_SINT) {
1780 unsigned int netinteger;
1781
Frédéric Lécailled8659352020-11-10 16:18:03 +01001782 if (*msg_cur + sizeof(netinteger) > msg_end) {
1783 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1784 NULL, p, *msg_cur);
1785 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1786 NULL, p, msg_end);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001787 goto malformed_free_newts;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001788 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001789
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001790 memcpy(&netinteger, *msg_cur, sizeof(netinteger));
1791 netinteger = ntohl(netinteger);
1792 memcpy(newts->key.key, &netinteger, sizeof(netinteger));
1793 *msg_cur += sizeof(netinteger);
1794 }
1795 else {
Frédéric Lécailled8659352020-11-10 16:18:03 +01001796 if (*msg_cur + st->table->key_size > msg_end) {
1797 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1798 NULL, p, *msg_cur);
1799 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1800 NULL, p, msg_end, &st->table->key_size);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001801 goto malformed_free_newts;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001802 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001803
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001804 memcpy(newts->key.key, *msg_cur, st->table->key_size);
1805 *msg_cur += st->table->key_size;
1806 }
1807
1808 /* lookup for existing entry */
1809 ts = stktable_set_entry(st->table, newts);
1810 if (ts != newts) {
1811 stksess_free(st->table, newts);
1812 newts = NULL;
1813 }
1814
1815 HA_RWLOCK_WRLOCK(STK_SESS_LOCK, &ts->lock);
1816
1817 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
Willy Tarreau1e82a142019-01-29 11:08:06 +01001818 uint64_t decoded_int;
Emeric Brun90a9b672021-06-22 16:09:55 +02001819 unsigned int idx;
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001820 int ignore;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001821
Emeric Brun08b0f672021-07-01 18:54:05 +02001822 if (!((1ULL << data_type) & st->remote_data))
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001823 continue;
Willy Tarreaudb2ab822021-10-08 17:53:12 +02001824
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001825 ignore = stktable_data_types[data_type].is_local;
Willy Tarreaudb2ab822021-10-08 17:53:12 +02001826
Emeric Brun90a9b672021-06-22 16:09:55 +02001827 if (stktable_data_types[data_type].is_array) {
1828 /* in case of array all elements
1829 * use the same std_type and they
1830 * are linearly encoded.
1831 * The number of elements was provided
1832 * by table definition message
1833 */
1834 switch (stktable_data_types[data_type].std_type) {
1835 case STD_T_SINT:
1836 for (idx = 0; idx < st->remote_data_nbelem[data_type]; idx++) {
1837 decoded_int = intdecode(msg_cur, msg_end);
1838 if (!*msg_cur) {
1839 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1840 goto malformed_unlock;
1841 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001842
Emeric Brun90a9b672021-06-22 16:09:55 +02001843 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, idx);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001844 if (data_ptr && !ignore)
Emeric Brun90a9b672021-06-22 16:09:55 +02001845 stktable_data_cast(data_ptr, std_t_sint) = decoded_int;
1846 }
1847 break;
1848 case STD_T_UINT:
1849 for (idx = 0; idx < st->remote_data_nbelem[data_type]; idx++) {
1850 decoded_int = intdecode(msg_cur, msg_end);
1851 if (!*msg_cur) {
1852 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1853 goto malformed_unlock;
1854 }
1855
1856 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, idx);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001857 if (data_ptr && !ignore)
Emeric Brun90a9b672021-06-22 16:09:55 +02001858 stktable_data_cast(data_ptr, std_t_uint) = decoded_int;
1859 }
1860 break;
1861 case STD_T_ULL:
1862 for (idx = 0; idx < st->remote_data_nbelem[data_type]; idx++) {
1863 decoded_int = intdecode(msg_cur, msg_end);
1864 if (!*msg_cur) {
1865 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1866 goto malformed_unlock;
1867 }
1868
1869 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, idx);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001870 if (data_ptr && !ignore)
Emeric Brun90a9b672021-06-22 16:09:55 +02001871 stktable_data_cast(data_ptr, std_t_ull) = decoded_int;
1872 }
1873 break;
1874 case STD_T_FRQP:
1875 for (idx = 0; idx < st->remote_data_nbelem[data_type]; idx++) {
1876 struct freq_ctr data;
1877
1878 /* First bit is reserved for the freq_ctr lock
1879 * Note: here we're still protected by the stksess lock
1880 * so we don't need to update the update the freq_ctr
1881 * using its internal lock.
1882 */
1883
1884 decoded_int = intdecode(msg_cur, msg_end);
1885 if (!*msg_cur) {
1886 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1887 goto malformed_unlock;
1888 }
1889
1890 data.curr_tick = tick_add(now_ms, -decoded_int) & ~0x1;
1891 data.curr_ctr = intdecode(msg_cur, msg_end);
1892 if (!*msg_cur) {
1893 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1894 goto malformed_unlock;
1895 }
1896
1897 data.prev_ctr = intdecode(msg_cur, msg_end);
1898 if (!*msg_cur) {
1899 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1900 goto malformed_unlock;
1901 }
1902
1903 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, idx);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001904 if (data_ptr && !ignore)
Emeric Brun90a9b672021-06-22 16:09:55 +02001905 stktable_data_cast(data_ptr, std_t_frqp) = data;
1906 }
1907 break;
1908 }
1909
1910 /* array is fully decoded
1911 * proceed next data_type.
1912 */
1913 continue;
1914 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001915 decoded_int = intdecode(msg_cur, msg_end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001916 if (!*msg_cur) {
1917 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001918 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001919 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001920
Willy Tarreau1e82a142019-01-29 11:08:06 +01001921 switch (stktable_data_types[data_type].std_type) {
1922 case STD_T_SINT:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001923 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001924 if (data_ptr && !ignore)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001925 stktable_data_cast(data_ptr, std_t_sint) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001926 break;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001927
Willy Tarreau1e82a142019-01-29 11:08:06 +01001928 case STD_T_UINT:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001929 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001930 if (data_ptr && !ignore)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001931 stktable_data_cast(data_ptr, std_t_uint) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001932 break;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001933
Willy Tarreau1e82a142019-01-29 11:08:06 +01001934 case STD_T_ULL:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001935 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001936 if (data_ptr && !ignore)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001937 stktable_data_cast(data_ptr, std_t_ull) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001938 break;
Willy Tarreau1e82a142019-01-29 11:08:06 +01001939
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001940 case STD_T_FRQP: {
Willy Tarreaufa1258f2021-04-10 23:00:53 +02001941 struct freq_ctr data;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001942
Willy Tarreaufa1258f2021-04-10 23:00:53 +02001943 /* First bit is reserved for the freq_ctr lock
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001944 Note: here we're still protected by the stksess lock
Willy Tarreaufa1258f2021-04-10 23:00:53 +02001945 so we don't need to update the update the freq_ctr
Emeric Brun90a9b672021-06-22 16:09:55 +02001946 using its internal lock.
1947 */
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001948
Willy Tarreau1e82a142019-01-29 11:08:06 +01001949 data.curr_tick = tick_add(now_ms, -decoded_int) & ~0x1;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001950 data.curr_ctr = intdecode(msg_cur, msg_end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001951 if (!*msg_cur) {
1952 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001953 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001954 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001955
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001956 data.prev_ctr = intdecode(msg_cur, msg_end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001957 if (!*msg_cur) {
1958 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001959 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001960 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001961
1962 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001963 if (data_ptr && !ignore)
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001964 stktable_data_cast(data_ptr, std_t_frqp) = data;
1965 break;
1966 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001967 case STD_T_DICT: {
1968 struct buffer *chunk;
1969 size_t data_len, value_len;
1970 unsigned int id;
1971 struct dict_entry *de;
1972 struct dcache *dc;
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001973 char *end;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001974
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +01001975 if (!decoded_int) {
1976 /* No entry. */
1977 break;
1978 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001979 data_len = decoded_int;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001980 if (*msg_cur + data_len > msg_end) {
1981 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1982 NULL, p, *msg_cur);
1983 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1984 NULL, p, msg_end, &data_len);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001985 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001986 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001987
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001988 /* Compute the end of the current data, <msg_end> being at the end of
1989 * the entire message.
1990 */
1991 end = *msg_cur + data_len;
1992 id = intdecode(msg_cur, end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001993 if (!*msg_cur || !id) {
1994 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1995 NULL, p, *msg_cur, &id);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001996 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001997 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001998
1999 dc = p->dcache;
Frédéric Lécaille344e9482019-06-05 10:20:09 +02002000 if (*msg_cur == end) {
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002001 /* Dictionary entry key without value. */
Frédéric Lécaillef9e51be2020-11-12 19:53:11 +01002002 if (id > dc->max_entries) {
2003 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
2004 NULL, p, NULL, &id);
2005 goto malformed_unlock;
2006 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002007 /* IDs sent over the network are numbered from 1. */
2008 de = dc->rx[id - 1].de;
2009 }
2010 else {
2011 chunk = get_trash_chunk();
Frédéric Lécaille344e9482019-06-05 10:20:09 +02002012 value_len = intdecode(msg_cur, end);
2013 if (!*msg_cur || *msg_cur + value_len > end ||
Frédéric Lécailled8659352020-11-10 16:18:03 +01002014 unlikely(value_len + 1 >= chunk->size)) {
2015 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
2016 NULL, p, *msg_cur, &value_len);
2017 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
2018 NULL, p, end, &chunk->size);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002019 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01002020 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002021
2022 chunk_memcpy(chunk, *msg_cur, value_len);
2023 chunk->area[chunk->data] = '\0';
Frédéric Lécaille56aec0d2019-06-06 14:14:15 +02002024 *msg_cur += value_len;
2025
Thayne McCombs92149f92020-11-20 01:28:26 -07002026 de = dict_insert(&server_key_dict, chunk->area);
2027 dict_entry_unref(&server_key_dict, dc->rx[id - 1].de);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002028 dc->rx[id - 1].de = de;
2029 }
2030 if (de) {
2031 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01002032 if (data_ptr && !ignore) {
Willy Tarreau4781b152021-04-06 13:53:36 +02002033 HA_ATOMIC_INC(&de->refcount);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002034 stktable_data_cast(data_ptr, std_t_dict) = de;
Thayne McCombs92149f92020-11-20 01:28:26 -07002035 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002036 }
2037 break;
2038 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01002039 }
2040 }
2041 /* Force new expiration */
2042 ts->expire = tick_add(now_ms, expire);
2043
2044 HA_RWLOCK_WRUNLOCK(STK_SESS_LOCK, &ts->lock);
2045 stktable_touch_remote(st->table, ts, 1);
Frédéric Lécailled8659352020-11-10 16:18:03 +01002046 TRACE_LEAVE(PEERS_EV_UPDTMSG, NULL, p);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01002047 return 1;
2048
2049 ignore_msg:
2050 /* skip consumed message */
Willy Tarreauda304902022-05-27 10:44:04 +02002051 co_skip(sc_oc(sc), totl);
Frédéric Lécailled8659352020-11-10 16:18:03 +01002052 TRACE_DEVEL("leaving in error", PEERS_EV_UPDTMSG);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01002053 return 0;
Willy Tarreau1e82a142019-01-29 11:08:06 +01002054
2055 malformed_unlock:
2056 /* malformed message */
2057 HA_RWLOCK_WRUNLOCK(STK_SESS_LOCK, &ts->lock);
2058 stktable_touch_remote(st->table, ts, 1);
2059 appctx->st0 = PEER_SESS_ST_ERRPROTO;
Frédéric Lécailled8659352020-11-10 16:18:03 +01002060 TRACE_DEVEL("leaving in error", PEERS_EV_UPDTMSG);
Willy Tarreau1e82a142019-01-29 11:08:06 +01002061 return 0;
2062
2063 malformed_free_newts:
2064 /* malformed message */
2065 stksess_free(st->table, newts);
2066 malformed_exit:
2067 appctx->st0 = PEER_SESS_ST_ERRPROTO;
Frédéric Lécailled8659352020-11-10 16:18:03 +01002068 TRACE_DEVEL("leaving in error", PEERS_EV_UPDTMSG);
Willy Tarreau1e82a142019-01-29 11:08:06 +01002069 return 0;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01002070}
2071
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01002072/*
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002073 * Function used to parse a stick-table update acknowledgement message after it
2074 * has been received by <p> peer with <msg_cur> as address of the pointer to the position in the
2075 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
2076 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
2077 * was encountered.
2078 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
2079 */
2080static inline int peer_treat_ackmsg(struct appctx *appctx, struct peer *p,
2081 char **msg_cur, char *msg_end)
2082{
2083 /* ack message */
2084 uint32_t table_id ;
2085 uint32_t update;
2086 struct shared_table *st;
2087
Emeric Brunb0d60be2021-03-04 10:27:10 +01002088 /* ignore ack during teaching process */
2089 if (p->flags & PEER_F_TEACH_PROCESS)
2090 return 1;
2091
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002092 table_id = intdecode(msg_cur, msg_end);
2093 if (!*msg_cur || (*msg_cur + sizeof(update) > msg_end)) {
2094 /* malformed message */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002095
2096 TRACE_PROTO("malformed message", PEERS_EV_ACKMSG,
2097 NULL, p, *msg_cur);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002098 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2099 return 0;
2100 }
2101
2102 memcpy(&update, *msg_cur, sizeof(update));
2103 update = ntohl(update);
2104
2105 for (st = p->tables; st; st = st->next) {
2106 if (st->local_id == table_id) {
2107 st->update = update;
2108 break;
2109 }
2110 }
2111
2112 return 1;
2113}
2114
2115/*
2116 * Function used to parse a stick-table switch message after it has been received
2117 * by <p> peer with <msg_cur> as address of the pointer to the position in the
2118 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
2119 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
2120 * was encountered.
2121 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
2122 */
2123static inline int peer_treat_switchmsg(struct appctx *appctx, struct peer *p,
2124 char **msg_cur, char *msg_end)
2125{
2126 struct shared_table *st;
2127 int table_id;
2128
2129 table_id = intdecode(msg_cur, msg_end);
2130 if (!*msg_cur) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002131 TRACE_PROTO("malformed message", PEERS_EV_SWTCMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002132 /* malformed message */
2133 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2134 return 0;
2135 }
2136
2137 p->remote_table = NULL;
2138 for (st = p->tables; st; st = st->next) {
2139 if (st->remote_id == table_id) {
2140 p->remote_table = st;
2141 break;
2142 }
2143 }
2144
2145 return 1;
2146}
2147
2148/*
2149 * Function used to parse a stick-table definition message after it has been received
2150 * by <p> peer with <msg_cur> as address of the pointer to the position in the
2151 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
2152 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
2153 * was encountered.
2154 * <totl> is the length of the stick-table update message computed upon receipt.
2155 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
2156 */
2157static inline int peer_treat_definemsg(struct appctx *appctx, struct peer *p,
2158 char **msg_cur, char *msg_end, int totl)
2159{
Willy Tarreauc12b3212022-05-27 11:08:15 +02002160 struct stconn *sc = appctx_sc(appctx);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002161 int table_id_len;
2162 struct shared_table *st;
2163 int table_type;
2164 int table_keylen;
2165 int table_id;
2166 uint64_t table_data;
2167
2168 table_id = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002169 if (!*msg_cur) {
2170 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002171 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002172 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002173
2174 table_id_len = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002175 if (!*msg_cur) {
2176 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p, *msg_cur);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002177 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002178 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002179
2180 p->remote_table = NULL;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002181 if (!table_id_len || (*msg_cur + table_id_len) >= msg_end) {
2182 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p, *msg_cur, &table_id_len);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002183 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002184 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002185
2186 for (st = p->tables; st; st = st->next) {
2187 /* Reset IDs */
2188 if (st->remote_id == table_id)
2189 st->remote_id = 0;
2190
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +01002191 if (!p->remote_table && (table_id_len == strlen(st->table->nid)) &&
2192 (memcmp(st->table->nid, *msg_cur, table_id_len) == 0))
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002193 p->remote_table = st;
2194 }
2195
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002196 if (!p->remote_table) {
2197 TRACE_PROTO("ignored message", PEERS_EV_DEFMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002198 goto ignore_msg;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002199 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002200
2201 *msg_cur += table_id_len;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002202 if (*msg_cur >= msg_end) {
2203 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002204 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002205 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002206
2207 table_type = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002208 if (!*msg_cur) {
2209 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002210 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002211 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002212
2213 table_keylen = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002214 if (!*msg_cur) {
2215 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002216 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002217 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002218
2219 table_data = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002220 if (!*msg_cur) {
2221 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002222 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002223 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002224
Emeric Brun530ba382020-06-02 11:17:42 +02002225 if (p->remote_table->table->type != peer_int_key_type[table_type]
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002226 || p->remote_table->table->key_size != table_keylen) {
2227 p->remote_table = NULL;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002228 TRACE_PROTO("ignored message", PEERS_EV_DEFMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002229 goto ignore_msg;
2230 }
2231
Ilya Shipitsin01881082021-08-07 14:41:56 +05002232 /* Check if there there is the additional expire data */
Emeric Brun90a9b672021-06-22 16:09:55 +02002233 intdecode(msg_cur, msg_end);
2234 if (*msg_cur) {
2235 uint64_t data_type;
2236 uint64_t type;
2237
2238 /* This define contains the expire data so we consider
2239 * it also contain all data_types parameters.
2240 */
2241 for (data_type = 0; data_type < STKTABLE_DATA_TYPES; data_type++) {
2242 if (table_data & (1ULL << data_type)) {
2243 if (stktable_data_types[data_type].is_array) {
2244 /* This should be an array
2245 * so we parse the data_type prefix
2246 * because we must have parameters.
2247 */
2248 type = intdecode(msg_cur, msg_end);
2249 if (!*msg_cur) {
2250 p->remote_table = NULL;
2251 TRACE_PROTO("missing meta data for array", PEERS_EV_DEFMSG, NULL, p);
2252 goto ignore_msg;
2253 }
2254
2255 /* check if the data_type match the current from the bitfield */
2256 if (type != data_type) {
2257 p->remote_table = NULL;
Ilya Shipitsin01881082021-08-07 14:41:56 +05002258 TRACE_PROTO("meta data mismatch type", PEERS_EV_DEFMSG, NULL, p);
Emeric Brun90a9b672021-06-22 16:09:55 +02002259 goto ignore_msg;
2260 }
2261
2262 /* decode the nbelem of the array */
2263 p->remote_table->remote_data_nbelem[type] = intdecode(msg_cur, msg_end);
2264 if (!*msg_cur) {
2265 p->remote_table = NULL;
2266 TRACE_PROTO("missing array size meta data for array", PEERS_EV_DEFMSG, NULL, p);
2267 goto ignore_msg;
2268 }
2269
2270 /* if it is an array of frqp, we must also have the period to decode */
2271 if (stktable_data_types[data_type].std_type == STD_T_FRQP) {
2272 intdecode(msg_cur, msg_end);
2273 if (!*msg_cur) {
2274 p->remote_table = NULL;
2275 TRACE_PROTO("missing period for frqp", PEERS_EV_DEFMSG, NULL, p);
2276 goto ignore_msg;
2277 }
2278 }
2279 }
2280 else if (stktable_data_types[data_type].std_type == STD_T_FRQP) {
2281 /* This should be a std freq counter data_type
2282 * so we parse the data_type prefix
2283 * because we must have parameters.
2284 */
2285 type = intdecode(msg_cur, msg_end);
2286 if (!*msg_cur) {
2287 p->remote_table = NULL;
2288 TRACE_PROTO("missing meta data for frqp", PEERS_EV_DEFMSG, NULL, p);
2289 goto ignore_msg;
2290 }
2291
2292 /* check if the data_type match the current from the bitfield */
2293 if (type != data_type) {
2294 p->remote_table = NULL;
Ilya Shipitsin01881082021-08-07 14:41:56 +05002295 TRACE_PROTO("meta data mismatch type", PEERS_EV_DEFMSG, NULL, p);
Emeric Brun90a9b672021-06-22 16:09:55 +02002296 goto ignore_msg;
2297 }
2298
2299 /* decode the period */
2300 intdecode(msg_cur, msg_end);
2301 if (!*msg_cur) {
2302 p->remote_table = NULL;
2303 TRACE_PROTO("missing period for frqp", PEERS_EV_DEFMSG, NULL, p);
2304 goto ignore_msg;
2305 }
2306 }
2307 }
2308 }
2309 }
2310 else {
2311 uint64_t data_type;
2312
2313 /* There is not additional data but
2314 * array size parameter is mandatory to parse array
2315 * so we consider an error if an array data_type is define
2316 * but there is no additional data.
2317 */
2318 for (data_type = 0; data_type < STKTABLE_DATA_TYPES; data_type++) {
2319 if (table_data & (1ULL << data_type)) {
2320 if (stktable_data_types[data_type].is_array) {
2321 p->remote_table = NULL;
2322 TRACE_PROTO("missing array size meta data for array", PEERS_EV_DEFMSG, NULL, p);
2323 goto ignore_msg;
2324 }
2325 }
2326 }
2327 }
2328
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002329 p->remote_table->remote_data = table_data;
2330 p->remote_table->remote_id = table_id;
2331 return 1;
2332
2333 ignore_msg:
Willy Tarreauda304902022-05-27 10:44:04 +02002334 co_skip(sc_oc(sc), totl);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002335 return 0;
Willy Tarreau6f731f32019-01-29 11:11:23 +01002336
2337 malformed_exit:
2338 /* malformed message */
2339 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2340 return 0;
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002341}
2342
2343/*
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002344 * Receive a stick-table message or pre-parse any other message.
2345 * The message's header will be sent into <msg_head> which must be at least
2346 * <msg_head_sz> bytes long (at least 7 to store 32-bit variable lengths).
2347 * The first two bytes are always read, and the rest is only read if the
2348 * first bytes indicate a stick-table message. If the message is a stick-table
2349 * message, the varint is decoded and the equivalent number of bytes will be
2350 * copied into the trash at trash.area. <totl> is incremented by the number of
2351 * bytes read EVEN IN CASE OF INCOMPLETE MESSAGES.
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002352 * Returns 1 if there was no error, if not, returns 0 if not enough data were available,
2353 * -1 if there was an error updating the appctx state st0 accordingly.
2354 */
2355static inline int peer_recv_msg(struct appctx *appctx, char *msg_head, size_t msg_head_sz,
2356 uint32_t *msg_len, int *totl)
2357{
2358 int reql;
Willy Tarreauc12b3212022-05-27 11:08:15 +02002359 struct stconn *sc = appctx_sc(appctx);
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002360 char *cur;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002361
Willy Tarreauda304902022-05-27 10:44:04 +02002362 reql = co_getblk(sc_oc(sc), msg_head, 2 * sizeof(char), *totl);
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002363 if (reql <= 0) /* closed or EOL not found */
2364 goto incomplete;
2365
2366 *totl += reql;
2367
Frédéric Lécaille36fb77e2019-06-04 08:28:19 +02002368 if (!(msg_head[1] & PEER_MSG_STKT_BIT_MASK))
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002369 return 1;
2370
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002371 /* This is a stick-table message, let's go on */
2372
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002373 /* Read and Decode message length */
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002374 msg_head += *totl;
2375 msg_head_sz -= *totl;
Willy Tarreauda304902022-05-27 10:44:04 +02002376 reql = co_data(sc_oc(sc)) - *totl;
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002377 if (reql > msg_head_sz)
2378 reql = msg_head_sz;
2379
Willy Tarreauda304902022-05-27 10:44:04 +02002380 reql = co_getblk(sc_oc(sc), msg_head, reql, *totl);
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002381 if (reql <= 0) /* closed */
2382 goto incomplete;
2383
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002384 cur = msg_head;
2385 *msg_len = intdecode(&cur, cur + reql);
2386 if (!cur) {
2387 /* the number is truncated, did we read enough ? */
2388 if (reql < msg_head_sz)
2389 goto incomplete;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002390
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002391 /* malformed message */
2392 TRACE_PROTO("malformed message: too large length encoding", PEERS_EV_UPDTMSG);
2393 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2394 return -1;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002395 }
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002396 *totl += cur - msg_head;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002397
2398 /* Read message content */
2399 if (*msg_len) {
2400 if (*msg_len > trash.size) {
2401 /* Status code is not success, abort */
2402 appctx->st0 = PEER_SESS_ST_ERRSIZE;
2403 return -1;
2404 }
2405
Willy Tarreauda304902022-05-27 10:44:04 +02002406 reql = co_getblk(sc_oc(sc), trash.area, *msg_len, *totl);
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002407 if (reql <= 0) /* closed */
2408 goto incomplete;
2409 *totl += reql;
2410 }
2411
2412 return 1;
2413
2414 incomplete:
Willy Tarreauda304902022-05-27 10:44:04 +02002415 if (reql < 0 || (sc_oc(sc)->flags & (CF_SHUTW|CF_SHUTW_NOW))) {
Willy Tarreau345ebcf2020-11-26 17:06:04 +01002416 /* there was an error or the message was truncated */
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002417 appctx->st0 = PEER_SESS_ST_END;
2418 return -1;
2419 }
2420
2421 return 0;
2422}
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002423
2424/*
2425 * Treat the awaited message with <msg_head> as header.*
2426 * Return 1 if succeeded, 0 if not.
2427 */
2428static inline int peer_treat_awaited_msg(struct appctx *appctx, struct peer *peer, unsigned char *msg_head,
2429 char **msg_cur, char *msg_end, int msg_len, int totl)
2430{
Christopher Faulet387e7972022-05-12 14:47:52 +02002431 struct peers *peers = peer->peers;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002432
2433 if (msg_head[0] == PEER_MSG_CLASS_CONTROL) {
2434 if (msg_head[1] == PEER_MSG_CTRL_RESYNCREQ) {
2435 struct shared_table *st;
2436 /* Reset message: remote need resync */
2437
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002438 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2439 NULL, &msg_head[1], peers->local->id, peer->id);
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05002440 /* prepare tables for a global push */
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002441 for (st = peer->tables; st; st = st->next) {
Emeric Brun437e48a2021-04-28 09:49:33 +02002442 st->teaching_origin = st->last_pushed = st->update;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002443 st->flags = 0;
2444 }
2445
2446 /* reset teaching flags to 0 */
2447 peer->flags &= PEER_TEACH_RESET;
2448
2449 /* flag to start to teach lesson */
2450 peer->flags |= PEER_F_TEACH_PROCESS;
Emeric Brunccdfbae2021-04-28 12:59:35 +02002451 peers->flags |= PEERS_F_RESYNC_REQUESTED;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002452 }
2453 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCFINISHED) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002454 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2455 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002456 if (peer->flags & PEER_F_LEARN_ASSIGN) {
Emeric Brunac556082022-10-24 10:04:59 +02002457 int commit_a_finish = 1;
2458
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002459 peer->flags &= ~PEER_F_LEARN_ASSIGN;
2460 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
Emeric Brunac556082022-10-24 10:04:59 +02002461 if (peer->srv->shard) {
2462 struct peer *ps;
2463
2464 peers->flags |= PEERS_F_RESYNC_REMOTEPARTIAL;
2465 peer->flags |= PEER_F_LEARN_NOTUP2DATE;
2466 for (ps = peers->remote; ps; ps = ps->next) {
2467 if (ps->srv->shard == peer->srv->shard) {
2468 /* flag all peers from same shard
2469 * notup2date to disable request
2470 * of a resync frm them
2471 */
2472 ps->flags |= PEER_F_LEARN_NOTUP2DATE;
2473 }
2474 else if (ps->srv->shard && !(ps->flags & PEER_F_LEARN_NOTUP2DATE)) {
2475 /* it remains some other shards not requested
2476 * we don't commit a resync finish to request
2477 * the other shards
2478 */
2479 commit_a_finish = 0;
2480 }
2481 }
2482
2483 if (!commit_a_finish) {
2484 /* it remains some shard to request, we schedule a new request
2485 */
2486 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
2487 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
2488 }
2489 }
2490
2491 if (commit_a_finish) {
2492 peers->flags |= (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE);
2493 if (peer->local)
2494 peers->flags |= PEERS_F_RESYNC_LOCALFINISHED;
2495 else
2496 peers->flags |= PEERS_F_RESYNC_REMOTEFINISHED;
2497 }
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002498 }
2499 peer->confirm++;
2500 }
2501 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCPARTIAL) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002502 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2503 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002504 if (peer->flags & PEER_F_LEARN_ASSIGN) {
2505 peer->flags &= ~PEER_F_LEARN_ASSIGN;
2506 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
2507
Emeric Brunccdfbae2021-04-28 12:59:35 +02002508 if (peer->local)
2509 peers->flags |= PEERS_F_RESYNC_LOCALPARTIAL;
2510 else
2511 peers->flags |= PEERS_F_RESYNC_REMOTEPARTIAL;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002512 peer->flags |= PEER_F_LEARN_NOTUP2DATE;
Frédéric Lécaille54bff832019-03-26 10:25:20 +01002513 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002514 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
2515 }
2516 peer->confirm++;
2517 }
2518 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCCONFIRM) {
2519 struct shared_table *st;
2520
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002521 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2522 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002523 /* If stopping state */
2524 if (stopping) {
2525 /* Close session, push resync no more needed */
2526 peer->flags |= PEER_F_TEACH_COMPLETE;
2527 appctx->st0 = PEER_SESS_ST_END;
2528 return 0;
2529 }
2530 for (st = peer->tables; st; st = st->next) {
2531 st->update = st->last_pushed = st->teaching_origin;
2532 st->flags = 0;
2533 }
2534
2535 /* reset teaching flags to 0 */
2536 peer->flags &= PEER_TEACH_RESET;
2537 }
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002538 else if (msg_head[1] == PEER_MSG_CTRL_HEARTBEAT) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002539 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2540 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille54bff832019-03-26 10:25:20 +01002541 peer->reconnect = tick_add(now_ms, MS_TO_TICKS(PEER_RECONNECT_TIMEOUT));
Frédéric Lécaille33cab3c2019-11-06 11:51:26 +01002542 peer->rx_hbt++;
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002543 }
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002544 }
2545 else if (msg_head[0] == PEER_MSG_CLASS_STICKTABLE) {
2546 if (msg_head[1] == PEER_MSG_STKT_DEFINE) {
2547 if (!peer_treat_definemsg(appctx, peer, msg_cur, msg_end, totl))
2548 return 0;
2549 }
2550 else if (msg_head[1] == PEER_MSG_STKT_SWITCH) {
2551 if (!peer_treat_switchmsg(appctx, peer, msg_cur, msg_end))
2552 return 0;
2553 }
2554 else if (msg_head[1] == PEER_MSG_STKT_UPDATE ||
2555 msg_head[1] == PEER_MSG_STKT_INCUPDATE ||
2556 msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED ||
2557 msg_head[1] == PEER_MSG_STKT_INCUPDATE_TIMED) {
2558 int update, expire;
2559
2560 update = msg_head[1] == PEER_MSG_STKT_UPDATE || msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED;
2561 expire = msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED || msg_head[1] == PEER_MSG_STKT_INCUPDATE_TIMED;
2562 if (!peer_treat_updatemsg(appctx, peer, update, expire,
2563 msg_cur, msg_end, msg_len, totl))
2564 return 0;
2565
2566 }
2567 else if (msg_head[1] == PEER_MSG_STKT_ACK) {
2568 if (!peer_treat_ackmsg(appctx, peer, msg_cur, msg_end))
2569 return 0;
2570 }
2571 }
2572 else if (msg_head[0] == PEER_MSG_CLASS_RESERVED) {
2573 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2574 return 0;
2575 }
2576
2577 return 1;
2578}
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002579
2580
2581/*
2582 * Send any message to <peer> peer.
2583 * Returns 1 if succeeded, or -1 or 0 if failed.
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05002584 * -1 means an internal error occurred, 0 is for a peer protocol error leading
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002585 * to a peer state change (from the peer I/O handler point of view).
2586 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002587static inline int peer_send_msgs(struct appctx *appctx,
2588 struct peer *peer, struct peers *peers)
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002589{
2590 int repl;
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002591
2592 /* Need to request a resync */
2593 if ((peer->flags & PEER_F_LEARN_ASSIGN) &&
2594 (peers->flags & PEERS_F_RESYNC_ASSIGN) &&
2595 !(peers->flags & PEERS_F_RESYNC_PROCESS)) {
2596
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002597 repl = peer_send_resync_reqmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002598 if (repl <= 0)
2599 return repl;
2600
2601 peers->flags |= PEERS_F_RESYNC_PROCESS;
2602 }
2603
2604 /* Nothing to read, now we start to write */
2605 if (peer->tables) {
2606 struct shared_table *st;
2607 struct shared_table *last_local_table;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02002608 int updates_sent = 0;
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002609
2610 last_local_table = peer->last_local_table;
2611 if (!last_local_table)
2612 last_local_table = peer->tables;
2613 st = last_local_table->next;
2614
2615 while (1) {
2616 if (!st)
2617 st = peer->tables;
2618
2619 /* It remains some updates to ack */
2620 if (st->last_get != st->last_acked) {
2621 repl = peer_send_ackmsg(st, appctx);
2622 if (repl <= 0)
2623 return repl;
2624
2625 st->last_acked = st->last_get;
2626 }
2627
2628 if (!(peer->flags & PEER_F_TEACH_PROCESS)) {
Willy Tarreau76642222022-10-11 12:02:50 +02002629 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002630 if (!(peer->flags & PEER_F_LEARN_ASSIGN) &&
Emeric Brun8e7a13e2021-04-28 11:48:15 +02002631 (st->last_pushed != st->table->localupdate)) {
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002632
2633 repl = peer_send_teach_process_msgs(appctx, peer, st);
2634 if (repl <= 0) {
Willy Tarreau76642222022-10-11 12:02:50 +02002635 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002636 return repl;
2637 }
2638 }
Willy Tarreau76642222022-10-11 12:02:50 +02002639 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002640 }
Emeric Brun1675ada2021-04-22 18:13:13 +02002641 else if (!(peer->flags & PEER_F_TEACH_FINISHED)) {
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002642 if (!(st->flags & SHTABLE_F_TEACH_STAGE1)) {
2643 repl = peer_send_teach_stage1_msgs(appctx, peer, st);
2644 if (repl <= 0)
2645 return repl;
2646 }
2647
2648 if (!(st->flags & SHTABLE_F_TEACH_STAGE2)) {
2649 repl = peer_send_teach_stage2_msgs(appctx, peer, st);
2650 if (repl <= 0)
2651 return repl;
2652 }
2653 }
2654
2655 if (st == last_local_table)
2656 break;
2657 st = st->next;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02002658
2659 updates_sent++;
2660 if (updates_sent >= peers_max_updates_at_once) {
2661 /* pretend we're full so that we get back ASAP */
2662 struct stconn *sc = appctx_sc(appctx);
2663
2664 sc_need_room(sc);
2665 return -1;
2666 }
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002667 }
2668 }
2669
2670 if ((peer->flags & PEER_F_TEACH_PROCESS) && !(peer->flags & PEER_F_TEACH_FINISHED)) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002671 repl = peer_send_resync_finishedmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002672 if (repl <= 0)
2673 return repl;
2674
2675 /* flag finished message sent */
2676 peer->flags |= PEER_F_TEACH_FINISHED;
2677 }
2678
2679 /* Confirm finished or partial messages */
2680 while (peer->confirm) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002681 repl = peer_send_resync_confirmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002682 if (repl <= 0)
2683 return repl;
2684
2685 peer->confirm--;
2686 }
2687
2688 return 1;
2689}
2690
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002691/*
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002692 * Read and parse a first line of a "hello" peer protocol message.
2693 * Returns 0 if could not read a line, -1 if there was a read error or
2694 * the line is malformed, 1 if succeeded.
2695 */
2696static inline int peer_getline_version(struct appctx *appctx,
2697 unsigned int *maj_ver, unsigned int *min_ver)
2698{
2699 int reql;
2700
2701 reql = peer_getline(appctx);
2702 if (!reql)
2703 return 0;
2704
2705 if (reql < 0)
2706 return -1;
2707
2708 /* test protocol */
2709 if (strncmp(PEER_SESSION_PROTO_NAME " ", trash.area, proto_len + 1) != 0) {
2710 appctx->st0 = PEER_SESS_ST_EXIT;
2711 appctx->st1 = PEER_SESS_SC_ERRPROTO;
2712 return -1;
2713 }
2714 if (peer_get_version(trash.area + proto_len + 1, maj_ver, min_ver) == -1 ||
2715 *maj_ver != PEER_MAJOR_VER || *min_ver > PEER_MINOR_VER) {
2716 appctx->st0 = PEER_SESS_ST_EXIT;
2717 appctx->st1 = PEER_SESS_SC_ERRVERSION;
2718 return -1;
2719 }
2720
2721 return 1;
2722}
2723
2724/*
2725 * Read and parse a second line of a "hello" peer protocol message.
2726 * Returns 0 if could not read a line, -1 if there was a read error or
2727 * the line is malformed, 1 if succeeded.
2728 */
2729static inline int peer_getline_host(struct appctx *appctx)
2730{
2731 int reql;
2732
2733 reql = peer_getline(appctx);
2734 if (!reql)
2735 return 0;
2736
2737 if (reql < 0)
2738 return -1;
2739
2740 /* test hostname match */
2741 if (strcmp(localpeer, trash.area) != 0) {
2742 appctx->st0 = PEER_SESS_ST_EXIT;
2743 appctx->st1 = PEER_SESS_SC_ERRHOST;
2744 return -1;
2745 }
2746
2747 return 1;
2748}
2749
2750/*
2751 * Read and parse a last line of a "hello" peer protocol message.
2752 * Returns 0 if could not read a character, -1 if there was a read error or
2753 * the line is malformed, 1 if succeeded.
2754 * Set <curpeer> accordingly (the remote peer sending the "hello" message).
2755 */
2756static inline int peer_getline_last(struct appctx *appctx, struct peer **curpeer)
2757{
2758 char *p;
2759 int reql;
2760 struct peer *peer;
Willy Tarreau0698c802022-05-11 14:09:57 +02002761 struct stream *s = appctx_strm(appctx);
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002762 struct peers *peers = strm_fe(s)->parent;
2763
2764 reql = peer_getline(appctx);
2765 if (!reql)
2766 return 0;
2767
2768 if (reql < 0)
2769 return -1;
2770
2771 /* parse line "<peer name> <pid> <relative_pid>" */
2772 p = strchr(trash.area, ' ');
2773 if (!p) {
2774 appctx->st0 = PEER_SESS_ST_EXIT;
2775 appctx->st1 = PEER_SESS_SC_ERRPROTO;
2776 return -1;
2777 }
2778 *p = 0;
2779
2780 /* lookup known peer */
2781 for (peer = peers->remote; peer; peer = peer->next) {
2782 if (strcmp(peer->id, trash.area) == 0)
2783 break;
2784 }
2785
2786 /* if unknown peer */
2787 if (!peer) {
2788 appctx->st0 = PEER_SESS_ST_EXIT;
2789 appctx->st1 = PEER_SESS_SC_ERRPEER;
2790 return -1;
2791 }
2792 *curpeer = peer;
2793
2794 return 1;
2795}
2796
2797/*
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002798 * Init <peer> peer after having accepted it at peer protocol level.
2799 */
2800static inline void init_accepted_peer(struct peer *peer, struct peers *peers)
2801{
2802 struct shared_table *st;
2803
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002804 peer->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002805 /* Register status code */
2806 peer->statuscode = PEER_SESS_SC_SUCCESSCODE;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02002807 peer->last_hdshk = now_ms;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002808
2809 /* Awake main task */
2810 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
2811
2812 /* Init confirm counter */
2813 peer->confirm = 0;
2814
2815 /* Init cursors */
2816 for (st = peer->tables; st ; st = st->next) {
2817 st->last_get = st->last_acked = 0;
Willy Tarreau76642222022-10-11 12:02:50 +02002818 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Emeric Brund9729da2021-02-23 16:50:53 +01002819 /* if st->update appears to be in future it means
2820 * that the last acked value is very old and we
2821 * remain unconnected a too long time to use this
Ilya Shipitsin4a689da2022-10-29 09:34:32 +05002822 * acknowledgement as a reset.
Emeric Brund9729da2021-02-23 16:50:53 +01002823 * We should update the protocol to be able to
2824 * signal the remote peer that it needs a full resync.
2825 * Here a partial fix consist to set st->update at
2826 * the max past value
2827 */
2828 if ((int)(st->table->localupdate - st->update) < 0)
2829 st->update = st->table->localupdate + (2147483648U);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002830 st->teaching_origin = st->last_pushed = st->update;
Emeric Brun1a6b43e2021-04-20 14:43:46 +02002831 st->flags = 0;
Emeric Bruncc9cce92021-02-23 17:08:08 +01002832 if ((int)(st->last_pushed - st->table->commitupdate) > 0)
2833 st->table->commitupdate = st->last_pushed;
Willy Tarreau76642222022-10-11 12:02:50 +02002834 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002835 }
2836
2837 /* reset teaching and learning flags to 0 */
2838 peer->flags &= PEER_TEACH_RESET;
2839 peer->flags &= PEER_LEARN_RESET;
2840
2841 /* if current peer is local */
2842 if (peer->local) {
Ilya Shipitsin46a030c2020-07-05 16:36:08 +05002843 /* if current host need resyncfrom local and no process assigned */
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002844 if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMLOCAL &&
2845 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2846 /* assign local peer for a lesson, consider lesson already requested */
2847 peer->flags |= PEER_F_LEARN_ASSIGN;
2848 peers->flags |= (PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
Emeric Brunccdfbae2021-04-28 12:59:35 +02002849 peers->flags |= PEERS_F_RESYNC_LOCALASSIGN;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002850 }
2851
2852 }
2853 else if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE &&
2854 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2855 /* assign peer for a lesson */
2856 peer->flags |= PEER_F_LEARN_ASSIGN;
2857 peers->flags |= PEERS_F_RESYNC_ASSIGN;
Emeric Brunccdfbae2021-04-28 12:59:35 +02002858 peers->flags |= PEERS_F_RESYNC_REMOTEASSIGN;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002859 }
2860}
2861
2862/*
2863 * Init <peer> peer after having connected it at peer protocol level.
2864 */
2865static inline void init_connected_peer(struct peer *peer, struct peers *peers)
2866{
2867 struct shared_table *st;
2868
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002869 peer->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002870 /* Init cursors */
2871 for (st = peer->tables; st ; st = st->next) {
2872 st->last_get = st->last_acked = 0;
Willy Tarreau76642222022-10-11 12:02:50 +02002873 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Emeric Brund9729da2021-02-23 16:50:53 +01002874 /* if st->update appears to be in future it means
2875 * that the last acked value is very old and we
2876 * remain unconnected a too long time to use this
Ilya Shipitsin4a689da2022-10-29 09:34:32 +05002877 * acknowledgement as a reset.
Emeric Brund9729da2021-02-23 16:50:53 +01002878 * We should update the protocol to be able to
2879 * signal the remote peer that it needs a full resync.
2880 * Here a partial fix consist to set st->update at
2881 * the max past value.
2882 */
2883 if ((int)(st->table->localupdate - st->update) < 0)
2884 st->update = st->table->localupdate + (2147483648U);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002885 st->teaching_origin = st->last_pushed = st->update;
Emeric Brun1a6b43e2021-04-20 14:43:46 +02002886 st->flags = 0;
Emeric Bruncc9cce92021-02-23 17:08:08 +01002887 if ((int)(st->last_pushed - st->table->commitupdate) > 0)
2888 st->table->commitupdate = st->last_pushed;
Willy Tarreau76642222022-10-11 12:02:50 +02002889 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002890 }
2891
2892 /* Init confirm counter */
2893 peer->confirm = 0;
2894
2895 /* reset teaching and learning flags to 0 */
2896 peer->flags &= PEER_TEACH_RESET;
2897 peer->flags &= PEER_LEARN_RESET;
2898
2899 /* If current peer is local */
2900 if (peer->local) {
2901 /* flag to start to teach lesson */
2902 peer->flags |= PEER_F_TEACH_PROCESS;
2903 }
2904 else if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE &&
2905 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2906 /* If peer is remote and resync from remote is needed,
2907 and no peer currently assigned */
2908
2909 /* assign peer for a lesson */
2910 peer->flags |= PEER_F_LEARN_ASSIGN;
2911 peers->flags |= PEERS_F_RESYNC_ASSIGN;
Emeric Brunccdfbae2021-04-28 12:59:35 +02002912 peers->flags |= PEERS_F_RESYNC_REMOTEASSIGN;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002913 }
2914}
2915
2916/*
Ilya Shipitsin46a030c2020-07-05 16:36:08 +05002917 * IO Handler to handle message exchange with a peer
Emeric Brun2b920a12010-09-23 18:30:22 +02002918 */
Willy Tarreau00a37f02015-04-13 12:05:19 +02002919static void peer_io_handler(struct appctx *appctx)
Emeric Brun2b920a12010-09-23 18:30:22 +02002920{
Willy Tarreauc12b3212022-05-27 11:08:15 +02002921 struct stconn *sc = appctx_sc(appctx);
Willy Tarreauda304902022-05-27 10:44:04 +02002922 struct stream *s = __sc_strm(sc);
Vincent Bernat3c2f2f22016-04-03 13:48:42 +02002923 struct peers *curpeers = strm_fe(s)->parent;
Emeric Brun80527f52017-06-19 17:46:37 +02002924 struct peer *curpeer = NULL;
Emeric Brun2b920a12010-09-23 18:30:22 +02002925 int reql = 0;
2926 int repl = 0;
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002927 unsigned int maj_ver, min_ver;
Willy Tarreau2d372c22018-11-05 17:12:27 +01002928 int prev_state;
Emeric Brun2b920a12010-09-23 18:30:22 +02002929
Joseph Herlant82b2f542018-11-15 12:19:14 -08002930 /* Check if the input buffer is available. */
Willy Tarreauda304902022-05-27 10:44:04 +02002931 if (sc_ib(sc)->size == 0) {
2932 sc_need_room(sc);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002933 goto out;
2934 }
Christopher Fauleta73e59b2016-12-09 17:30:18 +01002935
Emeric Brun2b920a12010-09-23 18:30:22 +02002936 while (1) {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002937 prev_state = appctx->st0;
Emeric Brun2b920a12010-09-23 18:30:22 +02002938switchstate:
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002939 maj_ver = min_ver = (unsigned int)-1;
Willy Tarreau7b4b4992013-12-01 09:15:12 +01002940 switch(appctx->st0) {
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002941 case PEER_SESS_ST_ACCEPT:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002942 prev_state = appctx->st0;
Willy Tarreau455caef2022-05-05 20:16:16 +02002943 appctx->svcctx = NULL;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002944 appctx->st0 = PEER_SESS_ST_GETVERSION;
Willy Tarreau79108252022-11-14 07:13:22 +01002945 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002946 case PEER_SESS_ST_GETVERSION:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002947 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002948 reql = peer_getline_version(appctx, &maj_ver, &min_ver);
2949 if (reql <= 0) {
2950 if (!reql)
2951 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002952 goto switchstate;
2953 }
2954
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002955 appctx->st0 = PEER_SESS_ST_GETHOST;
Willy Tarreau79108252022-11-14 07:13:22 +01002956 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002957 case PEER_SESS_ST_GETHOST:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002958 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002959 reql = peer_getline_host(appctx);
2960 if (reql <= 0) {
2961 if (!reql)
2962 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002963 goto switchstate;
2964 }
2965
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002966 appctx->st0 = PEER_SESS_ST_GETPEER;
Willy Tarreau79108252022-11-14 07:13:22 +01002967 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002968 case PEER_SESS_ST_GETPEER: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002969 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002970 reql = peer_getline_last(appctx, &curpeer);
2971 if (reql <= 0) {
2972 if (!reql)
2973 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002974 goto switchstate;
2975 }
Emeric Brun2b920a12010-09-23 18:30:22 +02002976
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002977 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Willy Tarreau9df94c22016-10-31 18:42:52 +01002978 if (curpeer->appctx && curpeer->appctx != appctx) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02002979 if (curpeer->local) {
2980 /* Local connection, reply a retry */
2981 appctx->st0 = PEER_SESS_ST_EXIT;
2982 appctx->st1 = PEER_SESS_SC_TRYAGAIN;
2983 goto switchstate;
Emeric Brun2b920a12010-09-23 18:30:22 +02002984 }
Emeric Brun80527f52017-06-19 17:46:37 +02002985
2986 /* we're killing a connection, we must apply a random delay before
2987 * retrying otherwise the other end will do the same and we can loop
2988 * for a while.
2989 */
Willy Tarreau52bf8392020-03-08 00:42:37 +01002990 curpeer->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
Emeric Brun9ef2ad72019-04-02 17:22:01 +02002991 peer_session_forceshutdown(curpeer);
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002992 curpeer->heartbeat = TICK_ETERNITY;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02002993 curpeer->coll++;
Emeric Brun2b920a12010-09-23 18:30:22 +02002994 }
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002995 if (maj_ver != (unsigned int)-1 && min_ver != (unsigned int)-1) {
2996 if (min_ver == PEER_DWNGRD_MINOR_VER) {
2997 curpeer->flags |= PEER_F_DWNGRD;
2998 }
2999 else {
3000 curpeer->flags &= ~PEER_F_DWNGRD;
3001 }
3002 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003003 curpeer->appctx = appctx;
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02003004 curpeer->flags |= PEER_F_ALIVE;
Willy Tarreau455caef2022-05-05 20:16:16 +02003005 appctx->svcctx = curpeer;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003006 appctx->st0 = PEER_SESS_ST_SENDSUCCESS;
Willy Tarreau4781b152021-04-06 13:53:36 +02003007 _HA_ATOMIC_INC(&active_peers);
Emeric Brun2b920a12010-09-23 18:30:22 +02003008 }
Willy Tarreau79108252022-11-14 07:13:22 +01003009 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003010 case PEER_SESS_ST_SENDSUCCESS: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003011 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003012 if (!curpeer) {
Willy Tarreau455caef2022-05-05 20:16:16 +02003013 curpeer = appctx->svcctx;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003014 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003015 if (curpeer->appctx != appctx) {
3016 appctx->st0 = PEER_SESS_ST_END;
3017 goto switchstate;
3018 }
3019 }
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003020
3021 repl = peer_send_status_successmsg(appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02003022 if (repl <= 0) {
3023 if (repl == -1)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003024 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02003025 goto switchstate;
3026 }
3027
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01003028 init_accepted_peer(curpeer, curpeers);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003029
Emeric Brun2b920a12010-09-23 18:30:22 +02003030 /* switch to waiting message state */
Willy Tarreau4781b152021-04-06 13:53:36 +02003031 _HA_ATOMIC_INC(&connected_peers);
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003032 appctx->st0 = PEER_SESS_ST_WAITMSG;
Emeric Brun2b920a12010-09-23 18:30:22 +02003033 goto switchstate;
3034 }
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003035 case PEER_SESS_ST_CONNECT: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003036 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003037 if (!curpeer) {
Willy Tarreau455caef2022-05-05 20:16:16 +02003038 curpeer = appctx->svcctx;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003039 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003040 if (curpeer->appctx != appctx) {
3041 appctx->st0 = PEER_SESS_ST_END;
3042 goto switchstate;
3043 }
3044 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003045
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003046 repl = peer_send_hellomsg(appctx, curpeer);
Emeric Brun2b920a12010-09-23 18:30:22 +02003047 if (repl <= 0) {
3048 if (repl == -1)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003049 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02003050 goto switchstate;
3051 }
3052
3053 /* switch to the waiting statuscode state */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003054 appctx->st0 = PEER_SESS_ST_GETSTATUS;
Emeric Brun2b920a12010-09-23 18:30:22 +02003055 }
Willy Tarreau79108252022-11-14 07:13:22 +01003056 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003057 case PEER_SESS_ST_GETSTATUS: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003058 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003059 if (!curpeer) {
Willy Tarreau455caef2022-05-05 20:16:16 +02003060 curpeer = appctx->svcctx;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003061 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003062 if (curpeer->appctx != appctx) {
3063 appctx->st0 = PEER_SESS_ST_END;
3064 goto switchstate;
3065 }
3066 }
3067
Christopher Faulet642170a2022-07-27 10:49:31 +02003068 if (sc_ic(sc)->flags & CF_WROTE_DATA)
Emeric Brunb3971ab2015-05-12 18:49:09 +02003069 curpeer->statuscode = PEER_SESS_SC_CONNECTEDCODE;
Emeric Brun2b920a12010-09-23 18:30:22 +02003070
Frédéric Lécaillece025572019-01-21 13:38:06 +01003071 reql = peer_getline(appctx);
3072 if (!reql)
3073 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02003074
Frédéric Lécaillece025572019-01-21 13:38:06 +01003075 if (reql < 0)
3076 goto switchstate;
Emeric Brun2b920a12010-09-23 18:30:22 +02003077
3078 /* Register status code */
Willy Tarreau843b7cb2018-07-13 10:54:26 +02003079 curpeer->statuscode = atoi(trash.area);
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003080 curpeer->last_hdshk = now_ms;
Emeric Brun2b920a12010-09-23 18:30:22 +02003081
3082 /* Awake main task */
Frédéric Lécailleed2b4a62017-07-13 09:07:09 +02003083 task_wakeup(curpeers->sync_task, TASK_WOKEN_MSG);
Emeric Brun2b920a12010-09-23 18:30:22 +02003084
3085 /* If status code is success */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003086 if (curpeer->statuscode == PEER_SESS_SC_SUCCESSCODE) {
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01003087 init_connected_peer(curpeer, curpeers);
Emeric Brun2b920a12010-09-23 18:30:22 +02003088 }
3089 else {
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02003090 if (curpeer->statuscode == PEER_SESS_SC_ERRVERSION)
3091 curpeer->flags |= PEER_F_DWNGRD;
Emeric Brun2b920a12010-09-23 18:30:22 +02003092 /* Status code is not success, abort */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003093 appctx->st0 = PEER_SESS_ST_END;
Emeric Brun2b920a12010-09-23 18:30:22 +02003094 goto switchstate;
3095 }
Willy Tarreau4781b152021-04-06 13:53:36 +02003096 _HA_ATOMIC_INC(&connected_peers);
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003097 appctx->st0 = PEER_SESS_ST_WAITMSG;
Emeric Brun2b920a12010-09-23 18:30:22 +02003098 }
Willy Tarreau79108252022-11-14 07:13:22 +01003099 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003100 case PEER_SESS_ST_WAITMSG: {
Emeric Brunb3971ab2015-05-12 18:49:09 +02003101 uint32_t msg_len = 0;
Willy Tarreau843b7cb2018-07-13 10:54:26 +02003102 char *msg_cur = trash.area;
3103 char *msg_end = trash.area;
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01003104 unsigned char msg_head[7]; // 2 + 5 for varint32
Emeric Brun2b920a12010-09-23 18:30:22 +02003105 int totl = 0;
3106
Willy Tarreau2d372c22018-11-05 17:12:27 +01003107 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003108 if (!curpeer) {
Willy Tarreau455caef2022-05-05 20:16:16 +02003109 curpeer = appctx->svcctx;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003110 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003111 if (curpeer->appctx != appctx) {
3112 appctx->st0 = PEER_SESS_ST_END;
3113 goto switchstate;
3114 }
3115 }
3116
Frédéric Lécaille95203f22019-01-23 19:38:11 +01003117 reql = peer_recv_msg(appctx, (char *)msg_head, sizeof msg_head, &msg_len, &totl);
3118 if (reql <= 0) {
3119 if (reql == -1)
3120 goto switchstate;
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01003121 goto send_msgs;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003122 }
Willy Tarreau86a446e2013-11-25 23:02:37 +01003123
Frédéric Lécaille95203f22019-01-23 19:38:11 +01003124 msg_end += msg_len;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01003125 if (!peer_treat_awaited_msg(appctx, curpeer, msg_head, &msg_cur, msg_end, msg_len, totl))
Emeric Brun2b920a12010-09-23 18:30:22 +02003126 goto switchstate;
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01003127
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003128 curpeer->flags |= PEER_F_ALIVE;
3129
Emeric Brun2b920a12010-09-23 18:30:22 +02003130 /* skip consumed message */
Willy Tarreauda304902022-05-27 10:44:04 +02003131 co_skip(sc_oc(sc), totl);
Emeric Brun2b920a12010-09-23 18:30:22 +02003132 /* loop on that state to peek next message */
Willy Tarreau72d6c162013-04-11 16:14:13 +02003133 goto switchstate;
3134
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01003135send_msgs:
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003136 if (curpeer->flags & PEER_F_HEARTBEAT) {
3137 curpeer->flags &= ~PEER_F_HEARTBEAT;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003138 repl = peer_send_heartbeatmsg(appctx, curpeer, curpeers);
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003139 if (repl <= 0) {
3140 if (repl == -1)
3141 goto out;
3142 goto switchstate;
3143 }
Frédéric Lécaille33cab3c2019-11-06 11:51:26 +01003144 curpeer->tx_hbt++;
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003145 }
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01003146 /* we get here when a peer_recv_msg() returns 0 in reql */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003147 repl = peer_send_msgs(appctx, curpeer, curpeers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01003148 if (repl <= 0) {
3149 if (repl == -1)
3150 goto out;
3151 goto switchstate;
Emeric Brun597b26e2016-08-12 11:23:31 +02003152 }
3153
Emeric Brun2b920a12010-09-23 18:30:22 +02003154 /* noting more to do */
3155 goto out;
3156 }
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003157 case PEER_SESS_ST_EXIT:
Willy Tarreau2d372c22018-11-05 17:12:27 +01003158 if (prev_state == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02003159 _HA_ATOMIC_DEC(&connected_peers);
Willy Tarreau2d372c22018-11-05 17:12:27 +01003160 prev_state = appctx->st0;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003161 if (peer_send_status_errormsg(appctx) == -1)
3162 goto out;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003163 appctx->st0 = PEER_SESS_ST_END;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003164 goto switchstate;
3165 case PEER_SESS_ST_ERRSIZE: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003166 if (prev_state == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02003167 _HA_ATOMIC_DEC(&connected_peers);
Willy Tarreau2d372c22018-11-05 17:12:27 +01003168 prev_state = appctx->st0;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003169 if (peer_send_error_size_limitmsg(appctx) == -1)
3170 goto out;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003171 appctx->st0 = PEER_SESS_ST_END;
3172 goto switchstate;
3173 }
3174 case PEER_SESS_ST_ERRPROTO: {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003175 TRACE_PROTO("protocol error", PEERS_EV_PROTOERR,
3176 NULL, curpeer, &prev_state);
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01003177 if (curpeer)
3178 curpeer->proto_err++;
Willy Tarreau2d372c22018-11-05 17:12:27 +01003179 if (prev_state == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02003180 _HA_ATOMIC_DEC(&connected_peers);
Willy Tarreau2d372c22018-11-05 17:12:27 +01003181 prev_state = appctx->st0;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003182 if (peer_send_error_protomsg(appctx) == -1) {
3183 TRACE_PROTO("could not send error message", PEERS_EV_PROTOERR);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003184 goto out;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003185 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003186 appctx->st0 = PEER_SESS_ST_END;
Willy Tarreau2d372c22018-11-05 17:12:27 +01003187 prev_state = appctx->st0;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003188 }
Willy Tarreau79108252022-11-14 07:13:22 +01003189 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003190 case PEER_SESS_ST_END: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003191 if (prev_state == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02003192 _HA_ATOMIC_DEC(&connected_peers);
Willy Tarreau2d372c22018-11-05 17:12:27 +01003193 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003194 if (curpeer) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003195 HA_SPIN_UNLOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003196 curpeer = NULL;
3197 }
Willy Tarreauda304902022-05-27 10:44:04 +02003198 sc_shutw(sc);
3199 sc_shutr(sc);
3200 sc_ic(sc)->flags |= CF_READ_NULL;
Willy Tarreau828824a2015-04-19 17:20:03 +02003201 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02003202 }
3203 }
3204 }
3205out:
Willy Tarreauda304902022-05-27 10:44:04 +02003206 sc_oc(sc)->flags |= CF_READ_DONTWAIT;
Emeric Brun80527f52017-06-19 17:46:37 +02003207
3208 if (curpeer)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003209 HA_SPIN_UNLOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun2b920a12010-09-23 18:30:22 +02003210 return;
3211}
3212
Willy Tarreau30576452015-04-13 13:50:30 +02003213static struct applet peer_applet = {
Willy Tarreau3fdb3662012-11-12 00:42:33 +01003214 .obj_type = OBJ_TYPE_APPLET,
Willy Tarreaub24281b2011-02-13 13:16:36 +01003215 .name = "<PEER>", /* used for logging */
3216 .fct = peer_io_handler,
Christopher Faulet6712dc62022-05-12 15:36:11 +02003217 .init = peer_session_init,
Aman Gupta9a13e842012-04-02 18:57:53 -07003218 .release = peer_session_release,
Willy Tarreaub24281b2011-02-13 13:16:36 +01003219};
Emeric Brun2b920a12010-09-23 18:30:22 +02003220
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003221
Emeric Brun2b920a12010-09-23 18:30:22 +02003222/*
3223 * Use this function to force a close of a peer session
3224 */
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003225static void peer_session_forceshutdown(struct peer *peer)
Emeric Brun2b920a12010-09-23 18:30:22 +02003226{
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003227 struct appctx *appctx = peer->appctx;
3228
Frédéric Lécaille5df11902017-06-13 16:39:57 +02003229 /* Note that the peer sessions which have just been created
3230 * (->st0 == PEER_SESS_ST_CONNECT) must not
3231 * be shutdown, if not, the TCP session will never be closed
3232 * and stay in CLOSE_WAIT state after having been closed by
3233 * the remote side.
3234 */
3235 if (!appctx || appctx->st0 == PEER_SESS_ST_CONNECT)
Willy Tarreau7b4b4992013-12-01 09:15:12 +01003236 return;
3237
Willy Tarreau81bc3b02016-10-31 17:37:39 +01003238 if (appctx->applet != &peer_applet)
3239 return;
3240
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003241 __peer_session_deinit(peer);
3242
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003243 appctx->st0 = PEER_SESS_ST_END;
Willy Tarreau78c0c502016-10-31 17:32:20 +01003244 appctx_wakeup(appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02003245}
3246
Willy Tarreau91d96282015-03-13 15:47:26 +01003247/* Pre-configures a peers frontend to accept incoming connections */
3248void peers_setup_frontend(struct proxy *fe)
3249{
3250 fe->last_change = now.tv_sec;
Frédéric Lécaillec06b5d42018-04-26 10:06:41 +02003251 fe->cap = PR_CAP_FE | PR_CAP_BE;
Willy Tarreaua389c9e2020-10-07 17:49:42 +02003252 fe->mode = PR_MODE_PEERS;
Willy Tarreau91d96282015-03-13 15:47:26 +01003253 fe->maxconn = 0;
3254 fe->conn_retries = CONN_RETRIES;
Christopher Faulet13db4bd2022-08-29 11:32:26 +02003255 fe->timeout.connect = MS_TO_TICKS(1000);
Willy Tarreau91d96282015-03-13 15:47:26 +01003256 fe->timeout.client = MS_TO_TICKS(5000);
Christopher Faulet13db4bd2022-08-29 11:32:26 +02003257 fe->timeout.server = MS_TO_TICKS(5000);
Willy Tarreaud1d48d42015-03-13 16:15:46 +01003258 fe->accept = frontend_accept;
Willy Tarreauf87ab942015-03-13 15:55:16 +01003259 fe->default_target = &peer_applet.obj_type;
Willy Tarreau91d96282015-03-13 15:47:26 +01003260 fe->options2 |= PR_O2_INDEPSTR | PR_O2_SMARTCON | PR_O2_SMARTACC;
3261}
3262
Emeric Brun2b920a12010-09-23 18:30:22 +02003263/*
Willy Tarreaubd55e312010-11-11 10:55:09 +01003264 * Create a new peer session in assigned state (connect will start automatically)
Emeric Brun2b920a12010-09-23 18:30:22 +02003265 */
Willy Tarreau9df94c22016-10-31 18:42:52 +01003266static struct appctx *peer_session_create(struct peers *peers, struct peer *peer)
Emeric Brun2b920a12010-09-23 18:30:22 +02003267{
Willy Tarreau7b4b4992013-12-01 09:15:12 +01003268 struct appctx *appctx;
Maciej Zdeb34e40852022-05-16 17:27:28 +02003269 unsigned int thr = 0;
3270 int idx;
Emeric Brun2b920a12010-09-23 18:30:22 +02003271
Frédéric Lécaille2b0ba542021-01-18 15:14:39 +01003272 peer->new_conn++;
Christopher Fauletab4b0942022-07-26 19:14:36 +02003273 peer->reconnect = tick_add(now_ms, (stopping ? MS_TO_TICKS(PEER_LOCAL_RECONNECT_TIMEOUT) : MS_TO_TICKS(PEER_RECONNECT_TIMEOUT)));
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02003274 peer->heartbeat = TICK_ETERNITY;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003275 peer->statuscode = PEER_SESS_SC_CONNECTCODE;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003276 peer->last_hdshk = now_ms;
Willy Tarreaud990baf2015-04-05 00:32:03 +02003277
Maciej Zdeb34e40852022-05-16 17:27:28 +02003278 for (idx = 0; idx < global.nbthread; idx++)
3279 thr = peers->applet_count[idx] < peers->applet_count[thr] ? idx : thr;
3280 appctx = appctx_new_on(&peer_applet, NULL, thr);
Christopher Faulet2479e5f2022-01-19 14:50:11 +01003281 if (!appctx)
Christopher Fauleta9e8b392022-03-23 11:01:09 +01003282 goto out_close;
Willy Tarreau455caef2022-05-05 20:16:16 +02003283 appctx->svcctx = (void *)peer;
Willy Tarreaud990baf2015-04-05 00:32:03 +02003284
Christopher Faulet6712dc62022-05-12 15:36:11 +02003285 appctx->st0 = PEER_SESS_ST_CONNECT;
3286 peer->appctx = appctx;
Christopher Fauleta9e8b392022-03-23 11:01:09 +01003287
Maciej Zdebd01be2a2022-05-16 17:26:20 +02003288 HA_ATOMIC_INC(&peers->applet_count[thr]);
Maciej Zdeb34e40852022-05-16 17:27:28 +02003289 appctx_wakeup(appctx);
Willy Tarreau9df94c22016-10-31 18:42:52 +01003290 return appctx;
Emeric Brun2b920a12010-09-23 18:30:22 +02003291
Emeric Brun2b920a12010-09-23 18:30:22 +02003292 out_close:
Willy Tarreaub21d08e2016-10-31 17:46:57 +01003293 return NULL;
Emeric Brun2b920a12010-09-23 18:30:22 +02003294}
3295
3296/*
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003297 * Task processing function to manage re-connect, peer session
Willy Tarreauf6c88422021-01-29 12:38:42 +01003298 * tasks wakeup on local update and heartbeat. Let's keep it exported so that it
3299 * resolves in stack traces and "show tasks".
Emeric Brun2b920a12010-09-23 18:30:22 +02003300 */
Willy Tarreau144f84a2021-03-02 16:09:26 +01003301struct task *process_peer_sync(struct task * task, void *context, unsigned int state)
Emeric Brun2b920a12010-09-23 18:30:22 +02003302{
Olivier Houchard9f6af332018-05-25 14:04:04 +02003303 struct peers *peers = context;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003304 struct peer *ps;
3305 struct shared_table *st;
Emeric Brun2b920a12010-09-23 18:30:22 +02003306
3307 task->expire = TICK_ETERNITY;
3308
Emeric Brunb3971ab2015-05-12 18:49:09 +02003309 if (!peers->peers_fe) {
Willy Tarreau46dc1ca2015-05-01 18:32:13 +02003310 /* this one was never started, kill it */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003311 signal_unregister_handler(peers->sighandler);
Olivier Houchard3f795f72019-04-17 22:51:06 +02003312 task_destroy(peers->sync_task);
Willy Tarreau37bb7be2015-09-21 15:24:58 +02003313 peers->sync_task = NULL;
Willy Tarreau46dc1ca2015-05-01 18:32:13 +02003314 return NULL;
3315 }
3316
Emeric Brun80527f52017-06-19 17:46:37 +02003317 /* Acquire lock for all peers of the section */
3318 for (ps = peers->remote; ps; ps = ps->next)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003319 HA_SPIN_LOCK(PEER_LOCK, &ps->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003320
Emeric Brun2b920a12010-09-23 18:30:22 +02003321 if (!stopping) {
3322 /* Normal case (not soft stop)*/
Emeric Brunb3971ab2015-05-12 18:49:09 +02003323
Emeric Brun2c4ab412021-04-21 16:06:35 +02003324 /* resync timeout set to TICK_ETERNITY means we just start
3325 * a new process and timer was not initialized.
3326 * We must arm this timer to switch to a request to a remote
3327 * node if incoming connection from old local process never
3328 * comes.
3329 */
3330 if (peers->resync_timeout == TICK_ETERNITY)
3331 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
3332
Emeric Brunb3971ab2015-05-12 18:49:09 +02003333 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMLOCAL) &&
3334 (!nb_oldpids || tick_is_expired(peers->resync_timeout, now_ms)) &&
3335 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003336 /* Resync from local peer needed
3337 no peer was assigned for the lesson
3338 and no old local peer found
3339 or resync timeout expire */
3340
3341 /* flag no more resync from local, to try resync from remotes */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003342 peers->flags |= PEERS_F_RESYNC_LOCAL;
Emeric Brunccdfbae2021-04-28 12:59:35 +02003343 peers->flags |= PEERS_F_RESYNC_LOCALTIMEOUT;
Emeric Brun2b920a12010-09-23 18:30:22 +02003344
3345 /* reschedule a resync */
Frédéric Lécaille54bff832019-03-26 10:25:20 +01003346 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
Emeric Brun2b920a12010-09-23 18:30:22 +02003347 }
3348
3349 /* For each session */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003350 for (ps = peers->remote; ps; ps = ps->next) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003351 /* For each remote peers */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003352 if (!ps->local) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01003353 if (!ps->appctx) {
3354 /* no active peer connection */
Emeric Brun2b920a12010-09-23 18:30:22 +02003355 if (ps->statuscode == 0 ||
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003356 ((ps->statuscode == PEER_SESS_SC_CONNECTCODE ||
Willy Tarreaub4e34da2015-05-20 10:39:04 +02003357 ps->statuscode == PEER_SESS_SC_SUCCESSCODE ||
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003358 ps->statuscode == PEER_SESS_SC_CONNECTEDCODE) &&
Emeric Brun2b920a12010-09-23 18:30:22 +02003359 tick_is_expired(ps->reconnect, now_ms))) {
3360 /* connection never tried
Willy Tarreau9df94c22016-10-31 18:42:52 +01003361 * or previous peer connection established with success
3362 * or previous peer connection failed while connecting
Emeric Brun2b920a12010-09-23 18:30:22 +02003363 * and reconnection timer is expired */
3364
3365 /* retry a connect */
Willy Tarreau9df94c22016-10-31 18:42:52 +01003366 ps->appctx = peer_session_create(peers, ps);
Emeric Brun2b920a12010-09-23 18:30:22 +02003367 }
Willy Tarreaub4e34da2015-05-20 10:39:04 +02003368 else if (!tick_is_expired(ps->reconnect, now_ms)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003369 /* If previous session failed during connection
3370 * but reconnection timer is not expired */
3371
3372 /* reschedule task for reconnect */
3373 task->expire = tick_first(task->expire, ps->reconnect);
3374 }
3375 /* else do nothing */
Willy Tarreau9df94c22016-10-31 18:42:52 +01003376 } /* !ps->appctx */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003377 else if (ps->statuscode == PEER_SESS_SC_SUCCESSCODE) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01003378 /* current peer connection is active and established */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003379 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE) &&
3380 !(peers->flags & PEERS_F_RESYNC_ASSIGN) &&
Emeric Brun2b920a12010-09-23 18:30:22 +02003381 !(ps->flags & PEER_F_LEARN_NOTUP2DATE)) {
3382 /* Resync from a remote is needed
3383 * and no peer was assigned for lesson
3384 * and current peer may be up2date */
3385
3386 /* assign peer for the lesson */
3387 ps->flags |= PEER_F_LEARN_ASSIGN;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003388 peers->flags |= PEERS_F_RESYNC_ASSIGN;
Emeric Brunccdfbae2021-04-28 12:59:35 +02003389 peers->flags |= PEERS_F_RESYNC_REMOTEASSIGN;
Emeric Brun2b920a12010-09-23 18:30:22 +02003390
Willy Tarreau9df94c22016-10-31 18:42:52 +01003391 /* wake up peer handler to handle a request of resync */
Willy Tarreaue5843b32015-04-27 18:40:14 +02003392 appctx_wakeup(ps->appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02003393 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003394 else {
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003395 int update_to_push = 0;
3396
Emeric Brunb3971ab2015-05-12 18:49:09 +02003397 /* Awake session if there is data to push */
3398 for (st = ps->tables; st ; st = st->next) {
Emeric Brun8e7a13e2021-04-28 11:48:15 +02003399 if (st->last_pushed != st->table->localupdate) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01003400 /* wake up the peer handler to push local updates */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003401 update_to_push = 1;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003402 /* There is no need to send a heartbeat message
3403 * when some updates must be pushed. The remote
3404 * peer will consider <ps> peer as alive when it will
3405 * receive these updates.
3406 */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003407 ps->flags &= ~PEER_F_HEARTBEAT;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003408 /* Re-schedule another one later. */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003409 ps->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003410 /* We are going to send updates, let's ensure we will
3411 * come back to send heartbeat messages or to reconnect.
3412 */
3413 task->expire = tick_first(ps->reconnect, ps->heartbeat);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003414 appctx_wakeup(ps->appctx);
3415 break;
3416 }
3417 }
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003418 /* When there are updates to send we do not reconnect
3419 * and do not send heartbeat message either.
3420 */
3421 if (!update_to_push) {
3422 if (tick_is_expired(ps->reconnect, now_ms)) {
3423 if (ps->flags & PEER_F_ALIVE) {
3424 /* This peer was alive during a 'reconnect' period.
3425 * Flag it as not alive again for the next period.
3426 */
3427 ps->flags &= ~PEER_F_ALIVE;
Frédéric Lécaille54bff832019-03-26 10:25:20 +01003428 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(PEER_RECONNECT_TIMEOUT));
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003429 }
3430 else {
Willy Tarreau52bf8392020-03-08 00:42:37 +01003431 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02003432 ps->heartbeat = TICK_ETERNITY;
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003433 peer_session_forceshutdown(ps);
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01003434 ps->no_hbt++;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003435 }
3436 }
3437 else if (tick_is_expired(ps->heartbeat, now_ms)) {
3438 ps->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
3439 ps->flags |= PEER_F_HEARTBEAT;
3440 appctx_wakeup(ps->appctx);
3441 }
Frédéric Lécailleb7405c12019-03-27 14:32:39 +01003442 task->expire = tick_first(ps->reconnect, ps->heartbeat);
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003443 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003444 }
3445 /* else do nothing */
3446 } /* SUCCESSCODE */
3447 } /* !ps->peer->local */
3448 } /* for */
3449
3450 /* Resync from remotes expired: consider resync is finished */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003451 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE) &&
3452 !(peers->flags & PEERS_F_RESYNC_ASSIGN) &&
3453 tick_is_expired(peers->resync_timeout, now_ms)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003454 /* Resync from remote peer needed
3455 * no peer was assigned for the lesson
3456 * and resync timeout expire */
3457
3458 /* flag no more resync from remote, consider resync is finished */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003459 peers->flags |= PEERS_F_RESYNC_REMOTE;
Emeric Brunccdfbae2021-04-28 12:59:35 +02003460 peers->flags |= PEERS_F_RESYNC_REMOTETIMEOUT;
Emeric Brun2b920a12010-09-23 18:30:22 +02003461 }
3462
Emeric Brunb3971ab2015-05-12 18:49:09 +02003463 if ((peers->flags & PEERS_RESYNC_STATEMASK) != PEERS_RESYNC_FINISHED) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003464 /* Resync not finished*/
Frédéric Lécaille5d6e5f82017-05-29 13:47:16 +02003465 /* reschedule task to resync timeout if not expired, to ended resync if needed */
3466 if (!tick_is_expired(peers->resync_timeout, now_ms))
3467 task->expire = tick_first(task->expire, peers->resync_timeout);
Emeric Brun2b920a12010-09-23 18:30:22 +02003468 }
3469 } /* !stopping */
3470 else {
3471 /* soft stop case */
Willy Tarreau086735a2018-11-05 15:09:47 +01003472 if (state & TASK_WOKEN_SIGNAL) {
Joseph Herlant82b2f542018-11-15 12:19:14 -08003473 /* We've just received the signal */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003474 if (!(peers->flags & PEERS_F_DONOTSTOP)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003475 /* add DO NOT STOP flag if not present */
Willy Tarreau4781b152021-04-06 13:53:36 +02003476 _HA_ATOMIC_INC(&jobs);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003477 peers->flags |= PEERS_F_DONOTSTOP;
Emeric Brun2b920a12010-09-23 18:30:22 +02003478
Emeric Bruncbfe5eb2021-04-22 18:20:37 +02003479 /* disconnect all connected peers to process a local sync
3480 * this must be done only the first time we are switching
3481 * in stopping state
Emeric Brun80527f52017-06-19 17:46:37 +02003482 */
Emeric Bruncbfe5eb2021-04-22 18:20:37 +02003483 for (ps = peers->remote; ps; ps = ps->next) {
3484 /* we're killing a connection, we must apply a random delay before
3485 * retrying otherwise the other end will do the same and we can loop
3486 * for a while.
3487 */
3488 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
3489 if (ps->appctx) {
3490 peer_session_forceshutdown(ps);
3491 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003492 }
Christopher Faulet160fff62022-07-26 19:19:18 +02003493
3494 /* Set resync timeout for the local peer and request a immediate reconnect */
3495 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
3496 peers->local->reconnect = now_ms;
Emeric Brun2b920a12010-09-23 18:30:22 +02003497 }
3498 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003499
Emeric Brunb3971ab2015-05-12 18:49:09 +02003500 ps = peers->local;
Emeric Brun2b920a12010-09-23 18:30:22 +02003501 if (ps->flags & PEER_F_TEACH_COMPLETE) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02003502 if (peers->flags & PEERS_F_DONOTSTOP) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003503 /* resync of new process was complete, current process can die now */
Willy Tarreau4781b152021-04-06 13:53:36 +02003504 _HA_ATOMIC_DEC(&jobs);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003505 peers->flags &= ~PEERS_F_DONOTSTOP;
3506 for (st = ps->tables; st ; st = st->next)
Emeric Brun2cc201f2021-04-23 12:21:26 +02003507 HA_ATOMIC_DEC(&st->table->refcnt);
Emeric Brun2b920a12010-09-23 18:30:22 +02003508 }
3509 }
Willy Tarreau9df94c22016-10-31 18:42:52 +01003510 else if (!ps->appctx) {
Christopher Faulet19a82b92022-08-26 18:40:46 +02003511 /* Re-arm resync timeout if necessary */
3512 if (!tick_isset(peers->resync_timeout))
3513 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
3514
Willy Tarreau9df94c22016-10-31 18:42:52 +01003515 /* If there's no active peer connection */
Christopher Fauletb372f162022-08-26 18:46:16 +02003516 if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FINISHED &&
3517 !tick_is_expired(peers->resync_timeout, now_ms) &&
Christopher Faulet160fff62022-07-26 19:19:18 +02003518 (ps->statuscode == 0 ||
3519 ps->statuscode == PEER_SESS_SC_SUCCESSCODE ||
3520 ps->statuscode == PEER_SESS_SC_CONNECTEDCODE ||
3521 ps->statuscode == PEER_SESS_SC_TRYAGAIN)) {
Christopher Fauletb372f162022-08-26 18:46:16 +02003522 /* The resync is finished for the local peer and
3523 * the resync timeout is not expired and
Christopher Faulet160fff62022-07-26 19:19:18 +02003524 * connection never tried
3525 * or previous peer connection was successfully established
3526 * or previous tcp connect succeeded but init state incomplete
3527 * or during previous connect, peer replies a try again statuscode */
Emeric Brun2b920a12010-09-23 18:30:22 +02003528
Christopher Faulet160fff62022-07-26 19:19:18 +02003529 if (!tick_is_expired(ps->reconnect, now_ms)) {
3530 /* reconnection timer is not expired. reschedule task for reconnect */
3531 task->expire = tick_first(task->expire, ps->reconnect);
3532 }
3533 else {
3534 /* connect to the local peer if we must push a local sync */
3535 if (peers->flags & PEERS_F_DONOTSTOP) {
3536 peer_session_create(peers, ps);
3537 }
Emeric Bruncbfe5eb2021-04-22 18:20:37 +02003538 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003539 }
3540 else {
3541 /* Other error cases */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003542 if (peers->flags & PEERS_F_DONOTSTOP) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003543 /* unable to resync new process, current process can die now */
Willy Tarreau4781b152021-04-06 13:53:36 +02003544 _HA_ATOMIC_DEC(&jobs);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003545 peers->flags &= ~PEERS_F_DONOTSTOP;
3546 for (st = ps->tables; st ; st = st->next)
Emeric Brun2cc201f2021-04-23 12:21:26 +02003547 HA_ATOMIC_DEC(&st->table->refcnt);
Emeric Brun2b920a12010-09-23 18:30:22 +02003548 }
3549 }
3550 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003551 else if (ps->statuscode == PEER_SESS_SC_SUCCESSCODE ) {
Christopher Faulet19a82b92022-08-26 18:40:46 +02003552 /* Reset resync timeout during a resync */
3553 peers->resync_timeout = TICK_ETERNITY;
3554
Willy Tarreau9df94c22016-10-31 18:42:52 +01003555 /* current peer connection is active and established
3556 * wake up all peer handlers to push remaining local updates */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003557 for (st = ps->tables; st ; st = st->next) {
Emeric Brun8e7a13e2021-04-28 11:48:15 +02003558 if (st->last_pushed != st->table->localupdate) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02003559 appctx_wakeup(ps->appctx);
3560 break;
3561 }
3562 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003563 }
3564 } /* stopping */
Emeric Brun80527f52017-06-19 17:46:37 +02003565
3566 /* Release lock for all peers of the section */
3567 for (ps = peers->remote; ps; ps = ps->next)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003568 HA_SPIN_UNLOCK(PEER_LOCK, &ps->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003569
Emeric Brun2b920a12010-09-23 18:30:22 +02003570 /* Wakeup for re-connect */
3571 return task;
3572}
3573
Emeric Brunb3971ab2015-05-12 18:49:09 +02003574
Emeric Brun2b920a12010-09-23 18:30:22 +02003575/*
Willy Tarreaud9443442018-10-15 11:18:03 +02003576 * returns 0 in case of error.
Emeric Brun2b920a12010-09-23 18:30:22 +02003577 */
Willy Tarreaud9443442018-10-15 11:18:03 +02003578int peers_init_sync(struct peers *peers)
Emeric Brun2b920a12010-09-23 18:30:22 +02003579{
Emeric Brun2b920a12010-09-23 18:30:22 +02003580 struct peer * curpeer;
Emeric Brun2b920a12010-09-23 18:30:22 +02003581
Emeric Brun2b920a12010-09-23 18:30:22 +02003582 for (curpeer = peers->remote; curpeer; curpeer = curpeer->next) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003583 peers->peers_fe->maxconn += 3;
3584 }
3585
Willy Tarreaubeeabf52021-10-01 18:23:30 +02003586 peers->sync_task = task_new_anywhere();
Willy Tarreaud9443442018-10-15 11:18:03 +02003587 if (!peers->sync_task)
3588 return 0;
3589
Maciej Zdebd01be2a2022-05-16 17:26:20 +02003590 memset(peers->applet_count, 0, sizeof(peers->applet_count));
Emeric Brunb3971ab2015-05-12 18:49:09 +02003591 peers->sync_task->process = process_peer_sync;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003592 peers->sync_task->context = (void *)peers;
3593 peers->sighandler = signal_register_task(0, peers->sync_task, 0);
3594 task_wakeup(peers->sync_task, TASK_WOKEN_INIT);
Willy Tarreaud9443442018-10-15 11:18:03 +02003595 return 1;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003596}
3597
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003598/*
3599 * Allocate a cache a dictionary entries used upon transmission.
3600 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003601static struct dcache_tx *new_dcache_tx(size_t max_entries)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003602{
3603 struct dcache_tx *d;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003604 struct ebpt_node *entries;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003605
3606 d = malloc(sizeof *d);
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003607 entries = calloc(max_entries, sizeof *entries);
3608 if (!d || !entries)
3609 goto err;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003610
3611 d->lru_key = 0;
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003612 d->prev_lookup = NULL;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003613 d->cached_entries = EB_ROOT_UNIQUE;
3614 d->entries = entries;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003615
3616 return d;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003617
3618 err:
3619 free(d);
3620 free(entries);
3621 return NULL;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003622}
3623
3624/*
3625 * Allocate a cache of dictionary entries with <name> as name and <max_entries>
3626 * as maximum of entries.
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05003627 * Return the dictionary cache if succeeded, NULL if not.
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003628 * Must be deallocated calling free_dcache().
3629 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003630static struct dcache *new_dcache(size_t max_entries)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003631{
3632 struct dcache_tx *dc_tx;
3633 struct dcache *dc;
3634 struct dcache_rx *dc_rx;
3635
3636 dc = calloc(1, sizeof *dc);
3637 dc_tx = new_dcache_tx(max_entries);
3638 dc_rx = calloc(max_entries, sizeof *dc_rx);
3639 if (!dc || !dc_tx || !dc_rx)
3640 goto err;
3641
3642 dc->tx = dc_tx;
3643 dc->rx = dc_rx;
3644 dc->max_entries = max_entries;
3645
3646 return dc;
3647
3648 err:
3649 free(dc);
3650 free(dc_tx);
3651 free(dc_rx);
3652 return NULL;
3653}
3654
3655/*
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003656 * Look for the dictionary entry with the value of <i> in <d> cache of dictionary
3657 * entries used upon transmission.
3658 * Return the entry if found, NULL if not.
3659 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003660static struct ebpt_node *dcache_tx_lookup_value(struct dcache_tx *d,
3661 struct dcache_tx_entry *i)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003662{
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003663 return ebpt_lookup(&d->cached_entries, i->entry.key);
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003664}
3665
3666/*
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003667 * Flush <dc> cache.
3668 * Always succeeds.
3669 */
3670static inline void flush_dcache(struct peer *peer)
3671{
3672 int i;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02003673 struct dcache *dc = peer->dcache;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003674
Frédéric Lécailleea875e62020-11-12 21:01:54 +01003675 for (i = 0; i < dc->max_entries; i++) {
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003676 ebpt_delete(&dc->tx->entries[i]);
Frédéric Lécailleea875e62020-11-12 21:01:54 +01003677 dc->tx->entries[i].key = NULL;
Thayne McCombs92149f92020-11-20 01:28:26 -07003678 dict_entry_unref(&server_key_dict, dc->rx[i].de);
3679 dc->rx[i].de = NULL;
Frédéric Lécailleea875e62020-11-12 21:01:54 +01003680 }
3681 dc->tx->prev_lookup = NULL;
3682 dc->tx->lru_key = 0;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003683
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003684 memset(dc->rx, 0, dc->max_entries * sizeof *dc->rx);
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003685}
3686
3687/*
3688 * Insert a dictionary entry in <dc> cache part used upon transmission (->tx)
3689 * with information provided by <i> dictionary cache entry (especially the value
3690 * to be inserted if not already). Return <i> if already present in the cache
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003691 * or something different of <i> if not.
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003692 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003693static struct ebpt_node *dcache_tx_insert(struct dcache *dc, struct dcache_tx_entry *i)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003694{
3695 struct dcache_tx *dc_tx;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003696 struct ebpt_node *o;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003697
3698 dc_tx = dc->tx;
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003699
3700 if (dc_tx->prev_lookup && dc_tx->prev_lookup->key == i->entry.key) {
3701 o = dc_tx->prev_lookup;
3702 } else {
3703 o = dcache_tx_lookup_value(dc_tx, i);
3704 if (o) {
3705 /* Save it */
3706 dc_tx->prev_lookup = o;
3707 }
3708 }
3709
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003710 if (o) {
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003711 /* Copy the ID. */
3712 i->id = o - dc->tx->entries;
3713 return &i->entry;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003714 }
3715
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003716 /* The new entry to put in cache */
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003717 dc_tx->prev_lookup = o = &dc_tx->entries[dc_tx->lru_key];
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003718
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003719 ebpt_delete(o);
3720 o->key = i->entry.key;
3721 ebpt_insert(&dc_tx->cached_entries, o);
3722 i->id = dc_tx->lru_key;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003723
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003724 /* Update the index for the next entry to put in cache */
3725 dc_tx->lru_key = (dc_tx->lru_key + 1) & (dc->max_entries - 1);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003726
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003727 return o;
3728}
Emeric Brunb3971ab2015-05-12 18:49:09 +02003729
3730/*
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02003731 * Allocate a dictionary cache for each peer of <peers> section.
3732 * Return 1 if succeeded, 0 if not.
3733 */
3734int peers_alloc_dcache(struct peers *peers)
3735{
3736 struct peer *p;
3737
3738 for (p = peers->remote; p; p = p->next) {
3739 p->dcache = new_dcache(PEER_STKT_CACHE_MAX_ENTRIES);
3740 if (!p->dcache)
3741 return 0;
3742 }
3743
3744 return 1;
3745}
3746
3747/*
Emeric Brunb3971ab2015-05-12 18:49:09 +02003748 * Function used to register a table for sync on a group of peers
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003749 * Returns 0 in case of success.
Emeric Brunb3971ab2015-05-12 18:49:09 +02003750 */
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003751int peers_register_table(struct peers *peers, struct stktable *table)
Emeric Brunb3971ab2015-05-12 18:49:09 +02003752{
3753 struct shared_table *st;
3754 struct peer * curpeer;
3755 int id = 0;
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003756 int retval = 0;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003757
3758 for (curpeer = peers->remote; curpeer; curpeer = curpeer->next) {
Vincent Bernat02779b62016-04-03 13:48:43 +02003759 st = calloc(1,sizeof(*st));
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003760 if (!st) {
3761 retval = 1;
3762 break;
3763 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003764 st->table = table;
3765 st->next = curpeer->tables;
3766 if (curpeer->tables)
3767 id = curpeer->tables->local_id;
3768 st->local_id = id + 1;
3769
Emeric Brun2cc201f2021-04-23 12:21:26 +02003770 /* If peer is local we inc table
3771 * refcnt to protect against flush
3772 * until this process pushed all
3773 * table content to the new one
3774 */
3775 if (curpeer->local)
3776 HA_ATOMIC_INC(&st->table->refcnt);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003777 curpeer->tables = st;
3778 }
3779
3780 table->sync_task = peers->sync_task;
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003781
3782 return retval;
Emeric Brun2b920a12010-09-23 18:30:22 +02003783}
3784
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003785/* context used by a "show peers" command */
3786struct show_peers_ctx {
Willy Tarreau3a31e372022-05-03 14:58:47 +02003787 void *target; /* if non-null, dump only this section and stop */
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003788 struct peers *peers; /* "peers" section being currently dumped. */
3789 struct peer *peer; /* "peer" being currently dumped. */
3790 int flags; /* non-zero if "dict" dump requested */
Willy Tarreau3a31e372022-05-03 14:58:47 +02003791 enum {
Willy Tarreauce9123c2022-05-03 15:04:25 +02003792 STATE_HEAD = 0, /* dump the section's header */
Willy Tarreau3a31e372022-05-03 14:58:47 +02003793 STATE_PEER, /* dump the whole peer */
3794 STATE_DONE, /* finished */
3795 } state; /* parser's state */
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003796};
3797
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003798/*
3799 * Parse the "show peers" command arguments.
3800 * Returns 0 if succeeded, 1 if not with the ->msg of the appctx set as
3801 * error message.
3802 */
3803static int cli_parse_show_peers(char **args, char *payload, struct appctx *appctx, void *private)
3804{
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003805 struct show_peers_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003806
Willy Tarreau49962b52021-02-12 16:56:22 +01003807 if (strcmp(args[2], "dict") == 0) {
3808 /* show the dictionaries (large dump) */
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003809 ctx->flags |= PEERS_SHOW_F_DICT;
Willy Tarreau49962b52021-02-12 16:56:22 +01003810 args++;
3811 } else if (strcmp(args[2], "-") == 0)
3812 args++; // allows to show a section called "dict"
3813
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003814 if (*args[2]) {
3815 struct peers *p;
3816
3817 for (p = cfg_peers; p; p = p->next) {
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01003818 if (strcmp(p->id, args[2]) == 0) {
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003819 ctx->target = p;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003820 break;
3821 }
3822 }
3823
Willy Tarreau9d008692019-08-09 11:21:01 +02003824 if (!p)
3825 return cli_err(appctx, "No such peers\n");
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003826 }
3827
Willy Tarreauce9123c2022-05-03 15:04:25 +02003828 /* where to start from */
3829 ctx->peers = ctx->target ? ctx->target : cfg_peers;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003830 return 0;
3831}
3832
3833/*
3834 * This function dumps the peer state information of <peers> "peers" section.
3835 * Returns 0 if the output buffer is full and needs to be called again, non-zero if not.
3836 * Dedicated to be called by cli_io_handler_show_peers() cli I/O handler.
3837 */
Willy Tarreaud0a06d52022-05-18 15:07:19 +02003838static int peers_dump_head(struct buffer *msg, struct appctx *appctx, struct peers *peers)
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003839{
3840 struct tm tm;
3841
3842 get_localtime(peers->last_change, &tm);
Willy Tarreau1ad64ac2020-09-24 08:48:08 +02003843 chunk_appendf(msg, "%p: [%02d/%s/%04d:%02d:%02d:%02d] id=%s disabled=%d flags=0x%x resync_timeout=%s task_calls=%u\n",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003844 peers,
3845 tm.tm_mday, monthname[tm.tm_mon], tm.tm_year+1900,
3846 tm.tm_hour, tm.tm_min, tm.tm_sec,
Willy Tarreau1ad64ac2020-09-24 08:48:08 +02003847 peers->id, peers->disabled, peers->flags,
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003848 peers->resync_timeout ?
3849 tick_is_expired(peers->resync_timeout, now_ms) ? "<PAST>" :
3850 human_time(TICKS_TO_MS(peers->resync_timeout - now_ms),
Emeric Brun0bbec0f2019-04-18 11:39:43 +02003851 TICKS_TO_MS(1000)) : "<NEVER>",
3852 peers->sync_task ? peers->sync_task->calls : 0);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003853
Willy Tarreaud0a06d52022-05-18 15:07:19 +02003854 if (applet_putchk(appctx, msg) == -1)
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003855 return 0;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003856
3857 return 1;
3858}
3859
3860/*
3861 * This function dumps <peer> state information.
3862 * Returns 0 if the output buffer is full and needs to be called again, non-zero
3863 * if not. Dedicated to be called by cli_io_handler_show_peers() cli I/O handler.
3864 */
Willy Tarreau50e77b22022-05-31 08:55:54 +02003865static int peers_dump_peer(struct buffer *msg, struct appctx *appctx, struct peer *peer, int flags)
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003866{
3867 struct connection *conn;
3868 char pn[INET6_ADDRSTRLEN];
Willy Tarreau4596fe22022-05-17 19:07:51 +02003869 struct stconn *peer_cs;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003870 struct stream *peer_s;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003871 struct shared_table *st;
3872
3873 addr_to_str(&peer->addr, pn, sizeof pn);
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003874 chunk_appendf(msg, " %p: id=%s(%s,%s) addr=%s:%d last_status=%s",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003875 peer, peer->id,
3876 peer->local ? "local" : "remote",
Frédéric Lécaillee7e2b212020-10-05 12:33:07 +02003877 peer->appctx ? "active" : "inactive",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003878 pn, get_host_port(&peer->addr),
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003879 statuscode_str(peer->statuscode));
3880
3881 chunk_appendf(msg, " last_hdshk=%s\n",
3882 peer->last_hdshk ? human_time(TICKS_TO_MS(now_ms - peer->last_hdshk),
3883 TICKS_TO_MS(1000)) : "<NEVER>");
3884
3885 chunk_appendf(msg, " reconnect=%s",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003886 peer->reconnect ?
3887 tick_is_expired(peer->reconnect, now_ms) ? "<PAST>" :
3888 human_time(TICKS_TO_MS(peer->reconnect - now_ms),
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003889 TICKS_TO_MS(1000)) : "<NEVER>");
3890
3891 chunk_appendf(msg, " heartbeat=%s",
3892 peer->heartbeat ?
3893 tick_is_expired(peer->heartbeat, now_ms) ? "<PAST>" :
3894 human_time(TICKS_TO_MS(peer->heartbeat - now_ms),
3895 TICKS_TO_MS(1000)) : "<NEVER>");
3896
3897 chunk_appendf(msg, " confirm=%u tx_hbt=%u rx_hbt=%u no_hbt=%u new_conn=%u proto_err=%u coll=%u\n",
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01003898 peer->confirm, peer->tx_hbt, peer->rx_hbt,
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003899 peer->no_hbt, peer->new_conn, peer->proto_err, peer->coll);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003900
3901 chunk_appendf(&trash, " flags=0x%x", peer->flags);
3902
Willy Tarreaufc505992022-05-31 08:53:25 +02003903 if (!peer->appctx)
Frédéric Lécaille470502b2019-11-06 10:41:03 +01003904 goto table_info;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003905
Willy Tarreaufc505992022-05-31 08:53:25 +02003906 chunk_appendf(&trash, " appctx:%p st0=%d st1=%d task_calls=%u",
3907 peer->appctx, peer->appctx->st0, peer->appctx->st1,
3908 peer->appctx->t ? peer->appctx->t->calls : 0);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003909
Willy Tarreauc12b3212022-05-27 11:08:15 +02003910 peer_cs = appctx_sc(peer->appctx);
Willy Tarreauea27f482022-05-18 16:10:52 +02003911 peer_s = __sc_strm(peer_cs);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003912
Willy Tarreau74568cf2022-05-27 09:03:30 +02003913 chunk_appendf(&trash, " state=%s", sc_state_str(sc_opposite(peer_cs)->state));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003914
3915 conn = objt_conn(strm_orig(peer_s));
3916 if (conn)
3917 chunk_appendf(&trash, "\n xprt=%s", conn_get_xprt_name(conn));
3918
Willy Tarreau3ca14902019-07-17 14:53:15 +02003919 switch (conn && conn_get_src(conn) ? addr_to_str(conn->src, pn, sizeof(pn)) : AF_UNSPEC) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003920 case AF_INET:
3921 case AF_INET6:
Willy Tarreau3ca14902019-07-17 14:53:15 +02003922 chunk_appendf(&trash, " src=%s:%d", pn, get_host_port(conn->src));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003923 break;
3924 case AF_UNIX:
3925 chunk_appendf(&trash, " src=unix:%d", strm_li(peer_s)->luid);
3926 break;
3927 }
3928
Willy Tarreau3ca14902019-07-17 14:53:15 +02003929 switch (conn && conn_get_dst(conn) ? addr_to_str(conn->dst, pn, sizeof(pn)) : AF_UNSPEC) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003930 case AF_INET:
3931 case AF_INET6:
Willy Tarreau3ca14902019-07-17 14:53:15 +02003932 chunk_appendf(&trash, " addr=%s:%d", pn, get_host_port(conn->dst));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003933 break;
3934 case AF_UNIX:
3935 chunk_appendf(&trash, " addr=unix:%d", strm_li(peer_s)->luid);
3936 break;
3937 }
3938
Frédéric Lécaille470502b2019-11-06 10:41:03 +01003939 table_info:
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003940 if (peer->remote_table)
3941 chunk_appendf(&trash, "\n remote_table:%p id=%s local_id=%d remote_id=%d",
3942 peer->remote_table,
3943 peer->remote_table->table->id,
3944 peer->remote_table->local_id,
3945 peer->remote_table->remote_id);
3946
3947 if (peer->last_local_table)
3948 chunk_appendf(&trash, "\n last_local_table:%p id=%s local_id=%d remote_id=%d",
3949 peer->last_local_table,
3950 peer->last_local_table->table->id,
3951 peer->last_local_table->local_id,
3952 peer->last_local_table->remote_id);
3953
3954 if (peer->tables) {
3955 chunk_appendf(&trash, "\n shared tables:");
3956 for (st = peer->tables; st; st = st->next) {
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003957 int i, count;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003958 struct stktable *t;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003959 struct dcache *dcache;
3960
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003961 t = st->table;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003962 dcache = peer->dcache;
3963
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003964 chunk_appendf(&trash, "\n %p local_id=%d remote_id=%d "
3965 "flags=0x%x remote_data=0x%llx",
3966 st, st->local_id, st->remote_id,
3967 st->flags, (unsigned long long)st->remote_data);
3968 chunk_appendf(&trash, "\n last_acked=%u last_pushed=%u last_get=%u"
3969 " teaching_origin=%u update=%u",
3970 st->last_acked, st->last_pushed, st->last_get,
3971 st->teaching_origin, st->update);
3972 chunk_appendf(&trash, "\n table:%p id=%s update=%u localupdate=%u"
Emeric Brun2cc201f2021-04-23 12:21:26 +02003973 " commitupdate=%u refcnt=%u",
3974 t, t->id, t->update, t->localupdate, t->commitupdate, t->refcnt);
Willy Tarreau49962b52021-02-12 16:56:22 +01003975 if (flags & PEERS_SHOW_F_DICT) {
3976 chunk_appendf(&trash, "\n TX dictionary cache:");
3977 count = 0;
3978 for (i = 0; i < dcache->max_entries; i++) {
3979 struct ebpt_node *node;
3980 struct dict_entry *de;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003981
Willy Tarreau49962b52021-02-12 16:56:22 +01003982 node = &dcache->tx->entries[i];
3983 if (!node->key)
3984 break;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003985
Willy Tarreau49962b52021-02-12 16:56:22 +01003986 if (!count++)
3987 chunk_appendf(&trash, "\n ");
3988 de = node->key;
3989 chunk_appendf(&trash, " %3u -> %s", i, (char *)de->value.key);
3990 count &= 0x3;
3991 }
3992 chunk_appendf(&trash, "\n RX dictionary cache:");
3993 count = 0;
3994 for (i = 0; i < dcache->max_entries; i++) {
3995 if (!count++)
3996 chunk_appendf(&trash, "\n ");
3997 chunk_appendf(&trash, " %3u -> %s", i,
3998 dcache->rx[i].de ?
3999 (char *)dcache->rx[i].de->value.key : "-");
4000 count &= 0x3;
4001 }
4002 } else {
4003 chunk_appendf(&trash, "\n Dictionary cache not dumped (use \"show peers dict\")");
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02004004 }
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004005 }
4006 }
4007
4008 end:
4009 chunk_appendf(&trash, "\n");
Willy Tarreau50e77b22022-05-31 08:55:54 +02004010 if (applet_putchk(appctx, msg) == -1)
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004011 return 0;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004012
4013 return 1;
4014}
4015
4016/*
4017 * This function dumps all the peers of "peers" section.
4018 * Returns 0 if the output buffer is full and needs to be called
4019 * again, non-zero if not. It proceeds in an isolated thread, so
4020 * there is no thread safety issue here.
4021 */
4022static int cli_io_handler_show_peers(struct appctx *appctx)
4023{
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004024 struct show_peers_ctx *ctx = appctx->svcctx;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004025 int ret = 0, first_peers = 1;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004026
4027 thread_isolate();
4028
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004029 chunk_reset(&trash);
4030
Willy Tarreau3a31e372022-05-03 14:58:47 +02004031 while (ctx->state != STATE_DONE) {
4032 switch (ctx->state) {
Willy Tarreau3a31e372022-05-03 14:58:47 +02004033 case STATE_HEAD:
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004034 if (!ctx->peers) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004035 /* No more peers list. */
Willy Tarreau3a31e372022-05-03 14:58:47 +02004036 ctx->state = STATE_DONE;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004037 }
4038 else {
4039 if (!first_peers)
4040 chunk_appendf(&trash, "\n");
4041 else
4042 first_peers = 0;
Willy Tarreaud0a06d52022-05-18 15:07:19 +02004043 if (!peers_dump_head(&trash, appctx, ctx->peers))
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004044 goto out;
4045
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004046 ctx->peer = ctx->peers->remote;
4047 ctx->peers = ctx->peers->next;
Willy Tarreau3a31e372022-05-03 14:58:47 +02004048 ctx->state = STATE_PEER;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004049 }
4050 break;
4051
Willy Tarreau3a31e372022-05-03 14:58:47 +02004052 case STATE_PEER:
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004053 if (!ctx->peer) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004054 /* End of peer list */
Willy Tarreauce9123c2022-05-03 15:04:25 +02004055 if (!ctx->target)
4056 ctx->state = STATE_HEAD; // next one
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004057 else
Willy Tarreau3a31e372022-05-03 14:58:47 +02004058 ctx->state = STATE_DONE;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004059 }
4060 else {
Willy Tarreau50e77b22022-05-31 08:55:54 +02004061 if (!peers_dump_peer(&trash, appctx, ctx->peer, ctx->flags))
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004062 goto out;
4063
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004064 ctx->peer = ctx->peer->next;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004065 }
Willy Tarreau3a31e372022-05-03 14:58:47 +02004066 break;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004067
Willy Tarreau3a31e372022-05-03 14:58:47 +02004068 default:
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004069 break;
4070 }
4071 }
4072 ret = 1;
4073 out:
4074 thread_release();
4075 return ret;
4076}
4077
Willy Tarreau8bd146d2022-07-19 20:17:38 +02004078/* config parser for global "tune.peers.max-updates-at-once" */
4079static int cfg_parse_max_updt_at_once(char **args, int section_type, struct proxy *curpx,
4080 const struct proxy *defpx, const char *file, int line,
4081 char **err)
4082{
4083 int arg = -1;
4084
4085 if (too_many_args(1, args, err, NULL))
4086 return -1;
4087
4088 if (*(args[1]) != 0)
4089 arg = atoi(args[1]);
4090
4091 if (arg < 1) {
4092 memprintf(err, "'%s' expects an integer argument greater than 0.", args[0]);
4093 return -1;
4094 }
4095
4096 peers_max_updates_at_once = arg;
4097 return 0;
4098}
4099
4100/* config keyword parsers */
4101static struct cfg_kw_list cfg_kws = {ILH, {
4102 { CFG_GLOBAL, "tune.peers.max-updates-at-once", cfg_parse_max_updt_at_once },
4103 { 0, NULL, NULL }
4104}};
4105
4106INITCALL1(STG_REGISTER, cfg_register_keywords, &cfg_kws);
4107
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004108/*
4109 * CLI keywords.
4110 */
4111static struct cli_kw_list cli_kws = {{ }, {
Willy Tarreaub205bfd2021-05-07 11:38:37 +02004112 { { "show", "peers", NULL }, "show peers [dict|-] [section] : dump some information about all the peers or this peers section", cli_parse_show_peers, cli_io_handler_show_peers, },
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004113 {},
4114}};
4115
4116/* Register cli keywords */
4117INITCALL1(STG_REGISTER, cli_register_kw, &cli_kws);