blob: 2ab080d48f046e59e7db41a38d77a1b1d797ae74 [file] [log] [blame]
Emeric Brun2b920a12010-09-23 18:30:22 +02001/*
Emeric Brunb3971ab2015-05-12 18:49:09 +02002 * Peer synchro management.
Emeric Brun2b920a12010-09-23 18:30:22 +02003 *
4 * Copyright 2010 EXCELIANCE, Emeric Brun <ebrun@exceliance.fr>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
13#include <errno.h>
14#include <fcntl.h>
15#include <stdio.h>
16#include <stdlib.h>
17#include <string.h>
18
19#include <sys/socket.h>
20#include <sys/stat.h>
21#include <sys/types.h>
22
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020023#include <haproxy/api.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020024#include <haproxy/applet.h>
Willy Tarreauf1d32c42020-06-04 21:07:02 +020025#include <haproxy/channel.h>
Willy Tarreau83487a82020-06-04 20:19:54 +020026#include <haproxy/cli.h>
Willy Tarreau3afc4c42020-06-03 18:23:19 +020027#include <haproxy/dict.h>
Willy Tarreau36979d92020-06-05 17:27:29 +020028#include <haproxy/errors.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020029#include <haproxy/fd.h>
Willy Tarreau762d7a52020-06-04 11:23:07 +020030#include <haproxy/frontend.h>
Willy Tarreau6131d6a2020-06-02 16:48:09 +020031#include <haproxy/net_helper.h>
Willy Tarreau8efbdfb2020-06-04 11:29:21 +020032#include <haproxy/obj_type-t.h>
Willy Tarreau3c2a7c22020-06-04 18:38:21 +020033#include <haproxy/peers.h>
Willy Tarreaua264d962020-06-04 22:29:18 +020034#include <haproxy/proxy.h>
Willy Tarreau48d25b32020-06-04 18:58:52 +020035#include <haproxy/session-t.h>
Willy Tarreau3727a8a2020-06-04 17:37:26 +020036#include <haproxy/signal.h>
Willy Tarreau2eec9b52020-06-04 19:58:55 +020037#include <haproxy/stats-t.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020038#include <haproxy/stick_table.h>
39#include <haproxy/stream.h>
Willy Tarreau5e539c92020-06-04 20:45:39 +020040#include <haproxy/stream_interface.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020041#include <haproxy/task.h>
42#include <haproxy/thread.h>
Willy Tarreau92b4f132020-06-01 11:05:15 +020043#include <haproxy/time.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020044#include <haproxy/tools.h>
Frédéric Lécaille94571512020-11-10 16:18:03 +010045#include <haproxy/trace.h>
Emeric Brun2b920a12010-09-23 18:30:22 +020046
Emeric Brun2b920a12010-09-23 18:30:22 +020047
48/*******************************/
49/* Current peer learning state */
50/*******************************/
51
52/******************************/
Emeric Brunb3971ab2015-05-12 18:49:09 +020053/* Current peers section resync state */
Emeric Brun2b920a12010-09-23 18:30:22 +020054/******************************/
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010055#define PEERS_F_RESYNC_LOCAL 0x00000001 /* Learn from local finished or no more needed */
56#define PEERS_F_RESYNC_REMOTE 0x00000002 /* Learn from remote finished or no more needed */
57#define PEERS_F_RESYNC_ASSIGN 0x00000004 /* A peer was assigned to learn our lesson */
58#define PEERS_F_RESYNC_PROCESS 0x00000008 /* The assigned peer was requested for resync */
59#define PEERS_F_DONOTSTOP 0x00010000 /* Main table sync task block process during soft stop
60 to push data to new process */
Emeric Brun2b920a12010-09-23 18:30:22 +020061
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010062#define PEERS_RESYNC_STATEMASK (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE)
63#define PEERS_RESYNC_FROMLOCAL 0x00000000
64#define PEERS_RESYNC_FROMREMOTE PEERS_F_RESYNC_LOCAL
65#define PEERS_RESYNC_FINISHED (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE)
Emeric Brunb3971ab2015-05-12 18:49:09 +020066
67/***********************************/
68/* Current shared table sync state */
69/***********************************/
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010070#define SHTABLE_F_TEACH_STAGE1 0x00000001 /* Teach state 1 complete */
71#define SHTABLE_F_TEACH_STAGE2 0x00000002 /* Teach state 2 complete */
Emeric Brun2b920a12010-09-23 18:30:22 +020072
73/******************************/
74/* Remote peer teaching state */
75/******************************/
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010076#define PEER_F_TEACH_PROCESS 0x00000001 /* Teach a lesson to current peer */
77#define PEER_F_TEACH_FINISHED 0x00000008 /* Teach conclude, (wait for confirm) */
78#define PEER_F_TEACH_COMPLETE 0x00000010 /* All that we know already taught to current peer, used only for a local peer */
79#define PEER_F_LEARN_ASSIGN 0x00000100 /* Current peer was assigned for a lesson */
80#define PEER_F_LEARN_NOTUP2DATE 0x00000200 /* Learn from peer finished but peer is not up to date */
81#define PEER_F_ALIVE 0x20000000 /* Used to flag a peer a alive. */
82#define PEER_F_HEARTBEAT 0x40000000 /* Heartbeat message to send. */
83#define PEER_F_DWNGRD 0x80000000 /* When this flag is enabled, we must downgrade the supported version announced during peer sessions. */
Emeric Brun2b920a12010-09-23 18:30:22 +020084
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010085#define PEER_TEACH_RESET ~(PEER_F_TEACH_PROCESS|PEER_F_TEACH_FINISHED) /* PEER_F_TEACH_COMPLETE should never be reset */
86#define PEER_LEARN_RESET ~(PEER_F_LEARN_ASSIGN|PEER_F_LEARN_NOTUP2DATE)
Emeric Brun2b920a12010-09-23 18:30:22 +020087
Frédéric Lécaille54bff832019-03-26 10:25:20 +010088#define PEER_RESYNC_TIMEOUT 5000 /* 5 seconds */
89#define PEER_RECONNECT_TIMEOUT 5000 /* 5 seconds */
Frédéric Lécaille645635d2019-02-11 17:49:39 +010090#define PEER_HEARTBEAT_TIMEOUT 3000 /* 3 seconds */
91
Emeric Brunb3971ab2015-05-12 18:49:09 +020092/*****************************/
93/* Sync message class */
94/*****************************/
95enum {
96 PEER_MSG_CLASS_CONTROL = 0,
97 PEER_MSG_CLASS_ERROR,
98 PEER_MSG_CLASS_STICKTABLE = 10,
99 PEER_MSG_CLASS_RESERVED = 255,
100};
101
102/*****************************/
103/* control message types */
104/*****************************/
105enum {
106 PEER_MSG_CTRL_RESYNCREQ = 0,
107 PEER_MSG_CTRL_RESYNCFINISHED,
108 PEER_MSG_CTRL_RESYNCPARTIAL,
109 PEER_MSG_CTRL_RESYNCCONFIRM,
Frédéric Lécaille645635d2019-02-11 17:49:39 +0100110 PEER_MSG_CTRL_HEARTBEAT,
Emeric Brunb3971ab2015-05-12 18:49:09 +0200111};
112
113/*****************************/
114/* error message types */
115/*****************************/
116enum {
117 PEER_MSG_ERR_PROTOCOL = 0,
118 PEER_MSG_ERR_SIZELIMIT,
119};
120
Emeric Brun530ba382020-06-02 11:17:42 +0200121/* network key types;
122 * network types were directly and mistakenly
123 * mapped on sample types, to keep backward
124 * compatiblitiy we keep those values but
125 * we now use a internal/network mapping
126 * to avoid further mistakes adding or
127 * modifying internals types
128 */
129enum {
130 PEER_KT_ANY = 0, /* any type */
131 PEER_KT_RESV1, /* UNUSED */
132 PEER_KT_SINT, /* signed 64bits integer type */
133 PEER_KT_RESV3, /* UNUSED */
134 PEER_KT_IPV4, /* ipv4 type */
135 PEER_KT_IPV6, /* ipv6 type */
136 PEER_KT_STR, /* char string type */
137 PEER_KT_BIN, /* buffer type */
138 PEER_KT_TYPES /* number of types, must always be last */
139};
140
141/* Map used to retrieve network type from internal type
142 * Note: Undeclared mapping maps entry to PEER_KT_ANY == 0
143 */
144static int peer_net_key_type[SMP_TYPES] = {
145 [SMP_T_SINT] = PEER_KT_SINT,
146 [SMP_T_IPV4] = PEER_KT_IPV4,
147 [SMP_T_IPV6] = PEER_KT_IPV6,
148 [SMP_T_STR] = PEER_KT_STR,
149 [SMP_T_BIN] = PEER_KT_BIN,
150};
151
152/* Map used to retrieve internal type from external type
153 * Note: Undeclared mapping maps entry to SMP_T_ANY == 0
154 */
155static int peer_int_key_type[PEER_KT_TYPES] = {
156 [PEER_KT_SINT] = SMP_T_SINT,
157 [PEER_KT_IPV4] = SMP_T_IPV4,
158 [PEER_KT_IPV6] = SMP_T_IPV6,
159 [PEER_KT_STR] = SMP_T_STR,
160 [PEER_KT_BIN] = SMP_T_BIN,
161};
162
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100163/*
164 * Parameters used by functions to build peer protocol messages. */
165struct peer_prep_params {
166 struct {
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100167 struct peer *peer;
168 } hello;
169 struct {
170 unsigned int st1;
171 } error_status;
172 struct {
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100173 struct stksess *stksess;
174 struct shared_table *shared_table;
175 unsigned int updateid;
176 int use_identifier;
177 int use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200178 struct peer *peer;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100179 } updt;
180 struct {
181 struct shared_table *shared_table;
182 } swtch;
183 struct {
184 struct shared_table *shared_table;
185 } ack;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100186 struct {
187 unsigned char head[2];
188 } control;
189 struct {
190 unsigned char head[2];
191 } error;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100192};
Emeric Brunb3971ab2015-05-12 18:49:09 +0200193
194/*******************************/
195/* stick table sync mesg types */
196/* Note: ids >= 128 contains */
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500197/* id message contains data */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200198/*******************************/
Olivier Houchard33992262018-10-16 18:49:26 +0200199#define PEER_MSG_STKT_UPDATE 0x80
200#define PEER_MSG_STKT_INCUPDATE 0x81
201#define PEER_MSG_STKT_DEFINE 0x82
202#define PEER_MSG_STKT_SWITCH 0x83
203#define PEER_MSG_STKT_ACK 0x84
204#define PEER_MSG_STKT_UPDATE_TIMED 0x85
205#define PEER_MSG_STKT_INCUPDATE_TIMED 0x86
Frédéric Lécaille36fb77e2019-06-04 08:28:19 +0200206/* All the stick-table message identifiers abova have the #7 bit set */
207#define PEER_MSG_STKT_BIT 7
208#define PEER_MSG_STKT_BIT_MASK (1 << PEER_MSG_STKT_BIT)
Emeric Brun2b920a12010-09-23 18:30:22 +0200209
Frédéric Lécaille39143342019-05-24 14:32:27 +0200210/* The maximum length of an encoded data length. */
211#define PEER_MSG_ENC_LENGTH_MAXLEN 5
212
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200213/* Minimum 64-bits value encoded with 2 bytes */
214#define PEER_ENC_2BYTES_MIN 0xf0 /* 0xf0 (or 240) */
215/* 3 bytes */
216#define PEER_ENC_3BYTES_MIN ((1ULL << 11) | PEER_ENC_2BYTES_MIN) /* 0x8f0 (or 2288) */
217/* 4 bytes */
218#define PEER_ENC_4BYTES_MIN ((1ULL << 18) | PEER_ENC_3BYTES_MIN) /* 0x408f0 (or 264432) */
219/* 5 bytes */
220#define PEER_ENC_5BYTES_MIN ((1ULL << 25) | PEER_ENC_4BYTES_MIN) /* 0x20408f0 (or 33818864) */
221/* 6 bytes */
222#define PEER_ENC_6BYTES_MIN ((1ULL << 32) | PEER_ENC_5BYTES_MIN) /* 0x1020408f0 (or 4328786160) */
223/* 7 bytes */
224#define PEER_ENC_7BYTES_MIN ((1ULL << 39) | PEER_ENC_6BYTES_MIN) /* 0x81020408f0 (or 554084600048) */
225/* 8 bytes */
226#define PEER_ENC_8BYTES_MIN ((1ULL << 46) | PEER_ENC_7BYTES_MIN) /* 0x4081020408f0 (or 70922828777712) */
227/* 9 bytes */
228#define PEER_ENC_9BYTES_MIN ((1ULL << 53) | PEER_ENC_8BYTES_MIN) /* 0x204081020408f0 (or 9078122083518704) */
229/* 10 bytes */
230#define PEER_ENC_10BYTES_MIN ((1ULL << 60) | PEER_ENC_9BYTES_MIN) /* 0x10204081020408f0 (or 1161999626690365680) */
231
232/* #7 bit used to detect the last byte to be encoded */
233#define PEER_ENC_STOP_BIT 7
234/* The byte minimum value with #7 bit set */
235#define PEER_ENC_STOP_BYTE (1 << PEER_ENC_STOP_BIT)
236/* The left most number of bits set for PEER_ENC_2BYTES_MIN */
237#define PEER_ENC_2BYTES_MIN_BITS 4
238
Frédéric Lécaille39143342019-05-24 14:32:27 +0200239#define PEER_MSG_HEADER_LEN 2
240
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200241#define PEER_STKT_CACHE_MAX_ENTRIES 128
242
Emeric Brun2b920a12010-09-23 18:30:22 +0200243/**********************************/
244/* Peer Session IO handler states */
245/**********************************/
246
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100247enum {
248 PEER_SESS_ST_ACCEPT = 0, /* Initial state for session create by an accept, must be zero! */
249 PEER_SESS_ST_GETVERSION, /* Validate supported protocol version */
250 PEER_SESS_ST_GETHOST, /* Validate host ID correspond to local host id */
251 PEER_SESS_ST_GETPEER, /* Validate peer ID correspond to a known remote peer id */
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100252 /* after this point, data were possibly exchanged */
253 PEER_SESS_ST_SENDSUCCESS, /* Send ret code 200 (success) and wait for message */
254 PEER_SESS_ST_CONNECT, /* Initial state for session create on a connect, push presentation into buffer */
255 PEER_SESS_ST_GETSTATUS, /* Wait for the welcome message */
256 PEER_SESS_ST_WAITMSG, /* Wait for data messages */
257 PEER_SESS_ST_EXIT, /* Exit with status code */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200258 PEER_SESS_ST_ERRPROTO, /* Send error proto message before exit */
259 PEER_SESS_ST_ERRSIZE, /* Send error size message before exit */
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100260 PEER_SESS_ST_END, /* Killed session */
261};
Emeric Brun2b920a12010-09-23 18:30:22 +0200262
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100263/***************************************************/
264/* Peer Session status code - part of the protocol */
265/***************************************************/
Emeric Brun2b920a12010-09-23 18:30:22 +0200266
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100267#define PEER_SESS_SC_CONNECTCODE 100 /* connect in progress */
268#define PEER_SESS_SC_CONNECTEDCODE 110 /* tcp connect success */
Emeric Brun2b920a12010-09-23 18:30:22 +0200269
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100270#define PEER_SESS_SC_SUCCESSCODE 200 /* accept or connect successful */
Emeric Brun2b920a12010-09-23 18:30:22 +0200271
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100272#define PEER_SESS_SC_TRYAGAIN 300 /* try again later */
Emeric Brun2b920a12010-09-23 18:30:22 +0200273
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100274#define PEER_SESS_SC_ERRPROTO 501 /* error protocol */
275#define PEER_SESS_SC_ERRVERSION 502 /* unknown protocol version */
276#define PEER_SESS_SC_ERRHOST 503 /* bad host name */
277#define PEER_SESS_SC_ERRPEER 504 /* unknown peer */
Emeric Brun2b920a12010-09-23 18:30:22 +0200278
279#define PEER_SESSION_PROTO_NAME "HAProxyS"
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200280#define PEER_MAJOR_VER 2
281#define PEER_MINOR_VER 1
282#define PEER_DWNGRD_MINOR_VER 0
Emeric Brun2b920a12010-09-23 18:30:22 +0200283
Willy Tarreau6254a922019-01-29 17:45:23 +0100284static size_t proto_len = sizeof(PEER_SESSION_PROTO_NAME) - 1;
Frédéric Lécailleed2b4a62017-07-13 09:07:09 +0200285struct peers *cfg_peers = NULL;
Emeric Brun9ef2ad72019-04-02 17:22:01 +0200286static void peer_session_forceshutdown(struct peer *peer);
Emeric Brun2b920a12010-09-23 18:30:22 +0200287
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200288static struct ebpt_node *dcache_tx_insert(struct dcache *dc,
289 struct dcache_tx_entry *i);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200290static inline void flush_dcache(struct peer *peer);
291
Frédéric Lécaille94571512020-11-10 16:18:03 +0100292/* trace source and events */
293static void peers_trace(enum trace_level level, uint64_t mask,
294 const struct trace_source *src,
295 const struct ist where, const struct ist func,
296 const void *a1, const void *a2, const void *a3, const void *a4);
297
298static const struct trace_event peers_trace_events[] = {
299#define PEERS_EV_UPDTMSG (1 << 0)
300 { .mask = PEERS_EV_UPDTMSG, .name = "updtmsg", .desc = "update message received" },
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +0100301#define PEERS_EV_ACKMSG (1 << 1)
302 { .mask = PEERS_EV_ACKMSG, .name = "ackmsg", .desc = "ack message received" },
303#define PEERS_EV_SWTCMSG (1 << 2)
304 { .mask = PEERS_EV_SWTCMSG, .name = "swtcmsg", .desc = "switch message received" },
305#define PEERS_EV_DEFMSG (1 << 3)
306 { .mask = PEERS_EV_DEFMSG, .name = "defmsg", .desc = "definition message received" },
307#define PEERS_EV_CTRLMSG (1 << 4)
308 { .mask = PEERS_EV_CTRLMSG, .name = "ctrlmsg", .desc = "control message sent/received" },
309#define PEERS_EV_SESSREL (1 << 5)
310 { .mask = PEERS_EV_SESSREL, .name = "sessrl", .desc = "peer session releasing" },
311#define PEERS_EV_PROTOERR (1 << 6)
312 { .mask = PEERS_EV_PROTOERR, .name = "protoerr", .desc = "protocol error" },
Frédéric Lécaille94571512020-11-10 16:18:03 +0100313};
314
315static const struct name_desc peers_trace_lockon_args[4] = {
316 /* arg1 */ { /* already used by the connection */ },
317 /* arg2 */ { .name="peers", .desc="Peers protocol" },
318 /* arg3 */ { },
319 /* arg4 */ { }
320};
321
322static const struct name_desc peers_trace_decoding[] = {
323#define PEERS_VERB_CLEAN 1
324 { .name="clean", .desc="only user-friendly stuff, generally suitable for level \"user\"" },
325 { /* end */ }
326};
327
328
329struct trace_source trace_peers = {
330 .name = IST("peers"),
331 .desc = "Peers protocol",
332 .arg_def = TRC_ARG1_CONN, /* TRACE()'s first argument is always a connection */
333 .default_cb = peers_trace,
334 .known_events = peers_trace_events,
335 .lockon_args = peers_trace_lockon_args,
336 .decoding = peers_trace_decoding,
337 .report_events = ~0, /* report everything by default */
338};
339
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +0100340/* Return peer control message types as strings (only for debugging purpose). */
341static inline char *ctrl_msg_type_str(unsigned int type)
342{
343 switch (type) {
344 case PEER_MSG_CTRL_RESYNCREQ:
345 return "RESYNCREQ";
346 case PEER_MSG_CTRL_RESYNCFINISHED:
347 return "RESYNCFINISHED";
348 case PEER_MSG_CTRL_RESYNCPARTIAL:
349 return "RESYNCPARTIAL";
350 case PEER_MSG_CTRL_RESYNCCONFIRM:
351 return "RESYNCCONFIRM";
352 case PEER_MSG_CTRL_HEARTBEAT:
353 return "HEARTBEAT";
354 default:
355 return "???";
356 }
357}
358
Frédéric Lécaille94571512020-11-10 16:18:03 +0100359#define TRACE_SOURCE &trace_peers
360INITCALL1(STG_REGISTER, trace_register_source, TRACE_SOURCE);
361
362static void peers_trace(enum trace_level level, uint64_t mask,
363 const struct trace_source *src,
364 const struct ist where, const struct ist func,
365 const void *a1, const void *a2, const void *a3, const void *a4)
366{
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +0100367 if (mask & (PEERS_EV_UPDTMSG|PEERS_EV_ACKMSG|PEERS_EV_SWTCMSG)) {
Frédéric Lécaille94571512020-11-10 16:18:03 +0100368 if (a2) {
369 const struct peer *peer = a2;
370
371 chunk_appendf(&trace_buf, " peer=%s", peer->id);
372 }
373 if (a3) {
374 const char *p = a3;
375
376 chunk_appendf(&trace_buf, " @%p", p);
377 }
378 if (a4) {
379 const size_t *val = a4;
380
381 chunk_appendf(&trace_buf, " %llu", (unsigned long long)*val);
382 }
383 }
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +0100384
385 if (mask & PEERS_EV_DEFMSG) {
386 if (a2) {
387 const struct peer *peer = a2;
388
389 chunk_appendf(&trace_buf, " peer=%s", peer->id);
390 }
391 if (a3) {
392 const char *p = a3;
393
394 chunk_appendf(&trace_buf, " @%p", p);
395 }
396 if (a4) {
397 const int *val = a4;
398
399 chunk_appendf(&trace_buf, " %d", *val);
400 }
401 }
402
403 if (mask & PEERS_EV_CTRLMSG) {
404 if (a2) {
405 const unsigned char *ctrl_msg_type = a2;
406
407 chunk_appendf(&trace_buf, " %s", ctrl_msg_type_str(*ctrl_msg_type));
408
409 }
410 if (a3) {
411 const char *local_peer = a3;
412
413 chunk_appendf(&trace_buf, " %s", local_peer);
414 }
415
416 if (a4) {
417 const char *remote_peer = a4;
418
419 chunk_appendf(&trace_buf, " -> %s", remote_peer);
420 }
421 }
422
423 if (mask & (PEERS_EV_SESSREL|PEERS_EV_PROTOERR)) {
424 if (a2) {
425 const struct peer *peer = a2;
426 struct peers *peers = NULL;
427
Frédéric Lécaille707a1f52021-01-17 13:08:39 +0100428 if (peer && peer->appctx) {
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +0100429 struct stream_interface *si;
430
431 si = peer->appctx->owner;
432 if (si) {
433 struct stream *s = si_strm(si);
434
435 peers = strm_fe(s)->parent;
436 }
437 }
438
439 if (peers)
440 chunk_appendf(&trace_buf, " %s", peers->local->id);
441 if (peer)
442 chunk_appendf(&trace_buf, " -> %s", peer->id);
443 }
444
445 if (a3) {
446 const int *prev_state = a3;
447
448 chunk_appendf(&trace_buf, " prev_state=%d\n", *prev_state);
449 }
450 }
Frédéric Lécaille94571512020-11-10 16:18:03 +0100451}
452
Frédéric Lécaille95679dc2019-04-15 10:25:27 +0200453static const char *statuscode_str(int statuscode)
454{
455 switch (statuscode) {
456 case PEER_SESS_SC_CONNECTCODE:
457 return "CONN";
458 case PEER_SESS_SC_CONNECTEDCODE:
459 return "HSHK";
460 case PEER_SESS_SC_SUCCESSCODE:
461 return "ESTA";
462 case PEER_SESS_SC_TRYAGAIN:
463 return "RETR";
464 case PEER_SESS_SC_ERRPROTO:
465 return "PROT";
466 case PEER_SESS_SC_ERRVERSION:
467 return "VERS";
468 case PEER_SESS_SC_ERRHOST:
469 return "NAME";
470 case PEER_SESS_SC_ERRPEER:
471 return "UNKN";
472 default:
473 return "NONE";
474 }
475}
476
Emeric Brun18928af2017-03-29 16:32:53 +0200477/* This function encode an uint64 to 'dynamic' length format.
478 The encoded value is written at address *str, and the
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500479 caller must assure that size after *str is large enough.
Emeric Brun18928af2017-03-29 16:32:53 +0200480 At return, the *str is set at the next Byte after then
481 encoded integer. The function returns then length of the
482 encoded integer in Bytes */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200483int intencode(uint64_t i, char **str) {
484 int idx = 0;
485 unsigned char *msg;
486
Emeric Brunb3971ab2015-05-12 18:49:09 +0200487 msg = (unsigned char *)*str;
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200488 if (i < PEER_ENC_2BYTES_MIN) {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200489 msg[0] = (unsigned char)i;
490 *str = (char *)&msg[idx+1];
491 return (idx+1);
492 }
493
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200494 msg[idx] =(unsigned char)i | PEER_ENC_2BYTES_MIN;
495 i = (i - PEER_ENC_2BYTES_MIN) >> PEER_ENC_2BYTES_MIN_BITS;
496 while (i >= PEER_ENC_STOP_BYTE) {
497 msg[++idx] = (unsigned char)i | PEER_ENC_STOP_BYTE;
498 i = (i - PEER_ENC_STOP_BYTE) >> PEER_ENC_STOP_BIT;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200499 }
500 msg[++idx] = (unsigned char)i;
501 *str = (char *)&msg[idx+1];
502 return (idx+1);
503}
504
505
506/* This function returns the decoded integer or 0
507 if decode failed
508 *str point on the beginning of the integer to decode
509 at the end of decoding *str point on the end of the
510 encoded integer or to null if end is reached */
Emeric Brun18928af2017-03-29 16:32:53 +0200511uint64_t intdecode(char **str, char *end)
512{
Emeric Brunb3971ab2015-05-12 18:49:09 +0200513 unsigned char *msg;
Emeric Brun18928af2017-03-29 16:32:53 +0200514 uint64_t i;
515 int shift;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200516
517 if (!*str)
518 return 0;
519
520 msg = (unsigned char *)*str;
Emeric Brun18928af2017-03-29 16:32:53 +0200521 if (msg >= (unsigned char *)end)
522 goto fail;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200523
Emeric Brun18928af2017-03-29 16:32:53 +0200524 i = *(msg++);
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200525 if (i >= PEER_ENC_2BYTES_MIN) {
526 shift = PEER_ENC_2BYTES_MIN_BITS;
Emeric Brun18928af2017-03-29 16:32:53 +0200527 do {
528 if (msg >= (unsigned char *)end)
529 goto fail;
530 i += (uint64_t)*msg << shift;
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200531 shift += PEER_ENC_STOP_BIT;
532 } while (*(msg++) >= PEER_ENC_STOP_BYTE);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200533 }
Frédéric Lécaillea8725ec2019-01-22 10:31:39 +0100534 *str = (char *)msg;
535 return i;
Emeric Brun18928af2017-03-29 16:32:53 +0200536
Frédéric Lécaillea8725ec2019-01-22 10:31:39 +0100537 fail:
538 *str = NULL;
539 return 0;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200540}
Emeric Brun2b920a12010-09-23 18:30:22 +0200541
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100542/*
543 * Build a "hello" peer protocol message.
544 * Return the number of written bytes written to build this messages if succeeded,
545 * 0 if not.
546 */
547static int peer_prepare_hellomsg(char *msg, size_t size, struct peer_prep_params *p)
548{
549 int min_ver, ret;
550 struct peer *peer;
551
552 peer = p->hello.peer;
553 min_ver = (peer->flags & PEER_F_DWNGRD) ? PEER_DWNGRD_MINOR_VER : PEER_MINOR_VER;
554 /* Prepare headers */
555 ret = snprintf(msg, size, PEER_SESSION_PROTO_NAME " %u.%u\n%s\n%s %d %d\n",
556 PEER_MAJOR_VER, min_ver, peer->id, localpeer, (int)getpid(), relative_pid);
557 if (ret >= size)
558 return 0;
559
560 return ret;
561}
562
563/*
564 * Build a "handshake succeeded" status message.
565 * Return the number of written bytes written to build this messages if succeeded,
566 * 0 if not.
567 */
568static int peer_prepare_status_successmsg(char *msg, size_t size, struct peer_prep_params *p)
569{
570 int ret;
571
572 ret = snprintf(msg, size, "%d\n", PEER_SESS_SC_SUCCESSCODE);
573 if (ret >= size)
574 return 0;
575
576 return ret;
577}
578
579/*
580 * Build an error status message.
581 * Return the number of written bytes written to build this messages if succeeded,
582 * 0 if not.
583 */
584static int peer_prepare_status_errormsg(char *msg, size_t size, struct peer_prep_params *p)
585{
586 int ret;
587 unsigned int st1;
588
589 st1 = p->error_status.st1;
590 ret = snprintf(msg, size, "%d\n", st1);
591 if (ret >= size)
592 return 0;
593
594 return ret;
595}
596
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200597/* Set the stick-table UPDATE message type byte at <msg_type> address,
598 * depending on <use_identifier> and <use_timed> boolean parameters.
599 * Always successful.
600 */
601static inline void peer_set_update_msg_type(char *msg_type, int use_identifier, int use_timed)
602{
603 if (use_timed) {
604 if (use_identifier)
605 *msg_type = PEER_MSG_STKT_UPDATE_TIMED;
606 else
607 *msg_type = PEER_MSG_STKT_INCUPDATE_TIMED;
608 }
609 else {
610 if (use_identifier)
611 *msg_type = PEER_MSG_STKT_UPDATE;
612 else
613 *msg_type = PEER_MSG_STKT_INCUPDATE;
614 }
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200615}
Emeric Brun2b920a12010-09-23 18:30:22 +0200616/*
Emeric Brunb3971ab2015-05-12 18:49:09 +0200617 * This prepare the data update message on the stick session <ts>, <st> is the considered
618 * stick table.
Joseph Herlant82b2f542018-11-15 12:19:14 -0800619 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +0200620 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
621 * check size)
Emeric Brun2b920a12010-09-23 18:30:22 +0200622 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100623static int peer_prepare_updatemsg(char *msg, size_t size, struct peer_prep_params *p)
Emeric Brun2b920a12010-09-23 18:30:22 +0200624{
625 uint32_t netinteger;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200626 unsigned short datalen;
627 char *cursor, *datamsg;
Emeric Brun94900952015-06-11 18:25:54 +0200628 unsigned int data_type;
629 void *data_ptr;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100630 struct stksess *ts;
631 struct shared_table *st;
632 unsigned int updateid;
633 int use_identifier;
634 int use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200635 struct peer *peer;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100636
637 ts = p->updt.stksess;
638 st = p->updt.shared_table;
639 updateid = p->updt.updateid;
640 use_identifier = p->updt.use_identifier;
641 use_timed = p->updt.use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200642 peer = p->updt.peer;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200643
Frédéric Lécaille0e8db972019-05-24 14:34:34 +0200644 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200645
Emeric Brun2b920a12010-09-23 18:30:22 +0200646 /* construct message */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200647
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500648 /* check if we need to send the update identifier */
Emeric Brun819fc6f2017-06-13 19:37:32 +0200649 if (!st->last_pushed || updateid < st->last_pushed || ((updateid - st->last_pushed) != 1)) {
Emeric Bruna6a09982015-09-22 15:34:19 +0200650 use_identifier = 1;
Emeric Brun2b920a12010-09-23 18:30:22 +0200651 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200652
653 /* encode update identifier if needed */
654 if (use_identifier) {
Emeric Brun819fc6f2017-06-13 19:37:32 +0200655 netinteger = htonl(updateid);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200656 memcpy(cursor, &netinteger, sizeof(netinteger));
657 cursor += sizeof(netinteger);
Emeric Brun2b920a12010-09-23 18:30:22 +0200658 }
659
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200660 if (use_timed) {
661 netinteger = htonl(tick_remain(now_ms, ts->expire));
662 memcpy(cursor, &netinteger, sizeof(netinteger));
663 cursor += sizeof(netinteger);
664 }
665
Emeric Brunb3971ab2015-05-12 18:49:09 +0200666 /* encode the key */
Thierry FOURNIER5d24ebc2015-07-24 08:46:42 +0200667 if (st->table->type == SMP_T_STR) {
Emeric Brun2b920a12010-09-23 18:30:22 +0200668 int stlen = strlen((char *)ts->key.key);
669
Emeric Brunb3971ab2015-05-12 18:49:09 +0200670 intencode(stlen, &cursor);
671 memcpy(cursor, ts->key.key, stlen);
672 cursor += stlen;
Emeric Brun2b920a12010-09-23 18:30:22 +0200673 }
Thierry FOURNIER5d24ebc2015-07-24 08:46:42 +0200674 else if (st->table->type == SMP_T_SINT) {
Willy Tarreau6cde5d82020-02-25 09:41:22 +0100675 netinteger = htonl(read_u32(ts->key.key));
Emeric Brunb3971ab2015-05-12 18:49:09 +0200676 memcpy(cursor, &netinteger, sizeof(netinteger));
677 cursor += sizeof(netinteger);
Emeric Brun2b920a12010-09-23 18:30:22 +0200678 }
679 else {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200680 memcpy(cursor, ts->key.key, st->table->key_size);
681 cursor += st->table->key_size;
Emeric Brun2b920a12010-09-23 18:30:22 +0200682 }
683
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100684 HA_RWLOCK_RDLOCK(STK_SESS_LOCK, &ts->lock);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200685 /* encode values */
Emeric Brun94900952015-06-11 18:25:54 +0200686 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200687
Emeric Brun94900952015-06-11 18:25:54 +0200688 data_ptr = stktable_data_ptr(st->table, ts, data_type);
689 if (data_ptr) {
690 switch (stktable_data_types[data_type].std_type) {
691 case STD_T_SINT: {
692 int data;
693
694 data = stktable_data_cast(data_ptr, std_t_sint);
695 intencode(data, &cursor);
696 break;
697 }
698 case STD_T_UINT: {
699 unsigned int data;
700
701 data = stktable_data_cast(data_ptr, std_t_uint);
702 intencode(data, &cursor);
703 break;
704 }
705 case STD_T_ULL: {
706 unsigned long long data;
707
708 data = stktable_data_cast(data_ptr, std_t_ull);
709 intencode(data, &cursor);
710 break;
711 }
712 case STD_T_FRQP: {
713 struct freq_ctr_period *frqp;
714
715 frqp = &stktable_data_cast(data_ptr, std_t_frqp);
716 intencode((unsigned int)(now_ms - frqp->curr_tick), &cursor);
717 intencode(frqp->curr_ctr, &cursor);
718 intencode(frqp->prev_ctr, &cursor);
719 break;
720 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200721 case STD_T_DICT: {
722 struct dict_entry *de;
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200723 struct ebpt_node *cached_de;
Willy Tarreau237f8ae2019-06-06 16:40:43 +0200724 struct dcache_tx_entry cde = { };
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200725 char *beg, *end;
726 size_t value_len, data_len;
727 struct dcache *dc;
728
729 de = stktable_data_cast(data_ptr, std_t_dict);
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +0100730 if (!de) {
731 /* No entry */
732 intencode(0, &cursor);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200733 break;
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +0100734 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200735
736 dc = peer->dcache;
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200737 cde.entry.key = de;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200738 cached_de = dcache_tx_insert(dc, &cde);
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200739 if (cached_de == &cde.entry) {
740 if (cde.id + 1 >= PEER_ENC_2BYTES_MIN)
741 break;
742 /* Encode the length of the remaining data -> 1 */
743 intencode(1, &cursor);
744 /* Encode the cache entry ID */
745 intencode(cde.id + 1, &cursor);
746 }
747 else {
748 /* Leave enough room to encode the remaining data length. */
749 end = beg = cursor + PEER_MSG_ENC_LENGTH_MAXLEN;
750 /* Encode the dictionary entry key */
751 intencode(cde.id + 1, &end);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200752 /* Encode the length of the dictionary entry data */
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200753 value_len = de->len;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200754 intencode(value_len, &end);
755 /* Copy the data */
756 memcpy(end, de->value.key, value_len);
757 end += value_len;
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200758 /* Encode the length of the data */
759 data_len = end - beg;
760 intencode(data_len, &cursor);
761 memmove(cursor, beg, data_len);
762 cursor += data_len;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200763 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200764 break;
765 }
Emeric Brun94900952015-06-11 18:25:54 +0200766 }
767 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200768 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100769 HA_RWLOCK_RDUNLOCK(STK_SESS_LOCK, &ts->lock);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200770
771 /* Compute datalen */
772 datalen = (cursor - datamsg);
773
774 /* prepare message header */
775 msg[0] = PEER_MSG_CLASS_STICKTABLE;
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200776 peer_set_update_msg_type(&msg[1], use_identifier, use_timed);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200777 cursor = &msg[2];
778 intencode(datalen, &cursor);
779
780 /* move data after header */
781 memmove(cursor, datamsg, datalen);
782
783 /* return header size + data_len */
784 return (cursor - msg) + datalen;
785}
786
787/*
788 * This prepare the switch table message to targeted share table <st>.
Joseph Herlant82b2f542018-11-15 12:19:14 -0800789 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +0200790 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
791 * check size)
792 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100793static int peer_prepare_switchmsg(char *msg, size_t size, struct peer_prep_params *params)
Emeric Brunb3971ab2015-05-12 18:49:09 +0200794{
795 int len;
796 unsigned short datalen;
Willy Tarreau83061a82018-07-13 11:56:34 +0200797 struct buffer *chunk;
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200798 char *cursor, *datamsg, *chunkp, *chunkq;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200799 uint64_t data = 0;
Emeric Brun94900952015-06-11 18:25:54 +0200800 unsigned int data_type;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100801 struct shared_table *st;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200802
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100803 st = params->swtch.shared_table;
Frédéric Lécaille39143342019-05-24 14:32:27 +0200804 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200805
806 /* Encode data */
807
808 /* encode local id */
809 intencode(st->local_id, &cursor);
810
811 /* encode table name */
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +0100812 len = strlen(st->table->nid);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200813 intencode(len, &cursor);
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +0100814 memcpy(cursor, st->table->nid, len);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200815 cursor += len;
816
817 /* encode table type */
818
Emeric Brun530ba382020-06-02 11:17:42 +0200819 intencode(peer_net_key_type[st->table->type], &cursor);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200820
821 /* encode table key size */
822 intencode(st->table->key_size, &cursor);
823
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200824 chunk = get_trash_chunk();
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200825 chunkp = chunkq = chunk->area;
Emeric Brun94900952015-06-11 18:25:54 +0200826 /* encode available known data types in table */
827 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
828 if (st->table->data_ofs[data_type]) {
829 switch (stktable_data_types[data_type].std_type) {
830 case STD_T_SINT:
831 case STD_T_UINT:
832 case STD_T_ULL:
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200833 case STD_T_DICT:
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200834 data |= 1 << data_type;
835 break;
Emeric Brun94900952015-06-11 18:25:54 +0200836 case STD_T_FRQP:
837 data |= 1 << data_type;
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200838 intencode(data_type, &chunkq);
839 intencode(st->table->data_arg[data_type].u, &chunkq);
Emeric Brun94900952015-06-11 18:25:54 +0200840 break;
841 }
842 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200843 }
844 intencode(data, &cursor);
845
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200846 /* Encode stick-table entries duration. */
847 intencode(st->table->expire, &cursor);
848
849 if (chunkq > chunkp) {
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200850 chunk->data = chunkq - chunkp;
851 memcpy(cursor, chunk->area, chunk->data);
852 cursor += chunk->data;
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200853 }
854
Emeric Brunb3971ab2015-05-12 18:49:09 +0200855 /* Compute datalen */
856 datalen = (cursor - datamsg);
Emeric Brun2b920a12010-09-23 18:30:22 +0200857
Emeric Brunb3971ab2015-05-12 18:49:09 +0200858 /* prepare message header */
859 msg[0] = PEER_MSG_CLASS_STICKTABLE;
860 msg[1] = PEER_MSG_STKT_DEFINE;
861 cursor = &msg[2];
862 intencode(datalen, &cursor);
Emeric Brun2b920a12010-09-23 18:30:22 +0200863
Emeric Brunb3971ab2015-05-12 18:49:09 +0200864 /* move data after header */
865 memmove(cursor, datamsg, datalen);
866
867 /* return header size + data_len */
868 return (cursor - msg) + datalen;
Emeric Brun2b920a12010-09-23 18:30:22 +0200869}
870
Emeric Brunb3971ab2015-05-12 18:49:09 +0200871/*
872 * This prepare the acknowledge message on the stick session <ts>, <st> is the considered
873 * stick table.
Joseph Herlant82b2f542018-11-15 12:19:14 -0800874 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +0200875 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
876 * check size)
877 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100878static int peer_prepare_ackmsg(char *msg, size_t size, struct peer_prep_params *p)
Emeric Brunb3971ab2015-05-12 18:49:09 +0200879{
880 unsigned short datalen;
881 char *cursor, *datamsg;
882 uint32_t netinteger;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100883 struct shared_table *st;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200884
Frédéric Lécaille39143342019-05-24 14:32:27 +0200885 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200886
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100887 st = p->ack.shared_table;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200888 intencode(st->remote_id, &cursor);
889 netinteger = htonl(st->last_get);
890 memcpy(cursor, &netinteger, sizeof(netinteger));
891 cursor += sizeof(netinteger);
892
893 /* Compute datalen */
894 datalen = (cursor - datamsg);
895
896 /* prepare message header */
897 msg[0] = PEER_MSG_CLASS_STICKTABLE;
Emeric Brune1ab8082015-08-21 11:48:54 +0200898 msg[1] = PEER_MSG_STKT_ACK;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200899 cursor = &msg[2];
900 intencode(datalen, &cursor);
901
902 /* move data after header */
903 memmove(cursor, datamsg, datalen);
904
905 /* return header size + data_len */
906 return (cursor - msg) + datalen;
907}
Emeric Brun2b920a12010-09-23 18:30:22 +0200908
909/*
Emeric Brun9ef2ad72019-04-02 17:22:01 +0200910 * Function to deinit connected peer
911 */
912void __peer_session_deinit(struct peer *peer)
913{
914 struct stream_interface *si;
915 struct stream *s;
916 struct peers *peers;
917
918 if (!peer->appctx)
919 return;
920
921 si = peer->appctx->owner;
922 if (!si)
923 return;
924
925 s = si_strm(si);
926 if (!s)
927 return;
928
929 peers = strm_fe(s)->parent;
930 if (!peers)
931 return;
932
933 if (peer->appctx->st0 == PEER_SESS_ST_WAITMSG)
934 HA_ATOMIC_SUB(&connected_peers, 1);
935
936 HA_ATOMIC_SUB(&active_peers, 1);
937
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200938 flush_dcache(peer);
939
Emeric Brun9ef2ad72019-04-02 17:22:01 +0200940 /* Re-init current table pointers to force announcement on re-connect */
941 peer->remote_table = peer->last_local_table = NULL;
942 peer->appctx = NULL;
943 if (peer->flags & PEER_F_LEARN_ASSIGN) {
944 /* unassign current peer for learning */
945 peer->flags &= ~(PEER_F_LEARN_ASSIGN);
946 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
947
948 /* reschedule a resync */
949 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(5000));
950 }
951 /* reset teaching and learning flags to 0 */
952 peer->flags &= PEER_TEACH_RESET;
953 peer->flags &= PEER_LEARN_RESET;
954 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
955}
956
957/*
Emeric Brun2b920a12010-09-23 18:30:22 +0200958 * Callback to release a session with a peer
959 */
Willy Tarreau00a37f02015-04-13 12:05:19 +0200960static void peer_session_release(struct appctx *appctx)
Emeric Brun2b920a12010-09-23 18:30:22 +0200961{
Vincent Bernat3c2f2f22016-04-03 13:48:42 +0200962 struct peer *peer = appctx->ctx.peers.ptr;
Emeric Brun2b920a12010-09-23 18:30:22 +0200963
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +0100964 TRACE_PROTO("releasing peer session", PEERS_EV_SESSREL, NULL, peer);
Willy Tarreau7b4b4992013-12-01 09:15:12 +0100965 /* appctx->ctx.peers.ptr is not a peer session */
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100966 if (appctx->st0 < PEER_SESS_ST_SENDSUCCESS)
Emeric Brun2b920a12010-09-23 18:30:22 +0200967 return;
968
969 /* peer session identified */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200970 if (peer) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100971 HA_SPIN_LOCK(PEER_LOCK, &peer->lock);
Emeric Brun9ef2ad72019-04-02 17:22:01 +0200972 if (peer->appctx == appctx)
973 __peer_session_deinit(peer);
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +0200974 peer->flags &= ~PEER_F_ALIVE;
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100975 HA_SPIN_UNLOCK(PEER_LOCK, &peer->lock);
Emeric Brun2b920a12010-09-23 18:30:22 +0200976 }
977}
978
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200979/* Retrieve the major and minor versions of peers protocol
980 * announced by a remote peer. <str> is a null-terminated
981 * string with the following format: "<maj_ver>.<min_ver>".
982 */
983static int peer_get_version(const char *str,
984 unsigned int *maj_ver, unsigned int *min_ver)
985{
986 unsigned int majv, minv;
987 const char *pos, *saved;
988 const char *end;
989
990 saved = pos = str;
991 end = str + strlen(str);
992
993 majv = read_uint(&pos, end);
994 if (saved == pos || *pos++ != '.')
995 return -1;
996
997 saved = pos;
998 minv = read_uint(&pos, end);
999 if (saved == pos || pos != end)
1000 return -1;
1001
1002 *maj_ver = majv;
1003 *min_ver = minv;
1004
1005 return 0;
1006}
Emeric Brun2b920a12010-09-23 18:30:22 +02001007
1008/*
Frédéric Lécaillece025572019-01-21 13:38:06 +01001009 * Parse a line terminated by an optional '\r' character, followed by a mandatory
1010 * '\n' character.
1011 * Returns 1 if succeeded or 0 if a '\n' character could not be found, and -1 if
1012 * a line could not be read because the communication channel is closed.
1013 */
1014static inline int peer_getline(struct appctx *appctx)
1015{
1016 int n;
1017 struct stream_interface *si = appctx->owner;
1018
1019 n = co_getline(si_oc(si), trash.area, trash.size);
1020 if (!n)
1021 return 0;
1022
1023 if (n < 0 || trash.area[n - 1] != '\n') {
1024 appctx->st0 = PEER_SESS_ST_END;
1025 return -1;
1026 }
1027
1028 if (n > 1 && (trash.area[n - 2] == '\r'))
1029 trash.area[n - 2] = 0;
1030 else
1031 trash.area[n - 1] = 0;
1032
1033 co_skip(si_oc(si), n);
1034
1035 return n;
1036}
1037
1038/*
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001039 * Send a message after having called <peer_prepare_msg> to build it.
1040 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1041 * Returns -1 if there was not enough room left to send the message,
1042 * any other negative returned value must be considered as an error with an appcxt st0
1043 * returned value equal to PEER_SESS_ST_END.
1044 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001045static inline int peer_send_msg(struct appctx *appctx,
1046 int (*peer_prepare_msg)(char *, size_t, struct peer_prep_params *),
1047 struct peer_prep_params *params)
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001048{
1049 int ret, msglen;
1050 struct stream_interface *si = appctx->owner;
1051
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001052 msglen = peer_prepare_msg(trash.area, trash.size, params);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001053 if (!msglen) {
1054 /* internal error: message does not fit in trash */
1055 appctx->st0 = PEER_SESS_ST_END;
1056 return 0;
1057 }
1058
1059 /* message to buffer */
1060 ret = ci_putblk(si_ic(si), trash.area, msglen);
1061 if (ret <= 0) {
1062 if (ret == -1) {
1063 /* No more write possible */
1064 si_rx_room_blk(si);
1065 return -1;
1066 }
1067 appctx->st0 = PEER_SESS_ST_END;
1068 }
1069
1070 return ret;
1071}
1072
1073/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001074 * Send a hello message.
1075 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1076 * Returns -1 if there was not enough room left to send the message,
1077 * any other negative returned value must be considered as an error with an appcxt st0
1078 * returned value equal to PEER_SESS_ST_END.
1079 */
1080static inline int peer_send_hellomsg(struct appctx *appctx, struct peer *peer)
1081{
1082 struct peer_prep_params p = {
1083 .hello.peer = peer,
1084 };
1085
1086 return peer_send_msg(appctx, peer_prepare_hellomsg, &p);
1087}
1088
1089/*
1090 * Send a success peer handshake status message.
1091 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1092 * Returns -1 if there was not enough room left to send the message,
1093 * any other negative returned value must be considered as an error with an appcxt st0
1094 * returned value equal to PEER_SESS_ST_END.
1095 */
1096static inline int peer_send_status_successmsg(struct appctx *appctx)
1097{
1098 return peer_send_msg(appctx, peer_prepare_status_successmsg, NULL);
1099}
1100
1101/*
1102 * Send a peer handshake status error message.
1103 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1104 * Returns -1 if there was not enough room left to send the message,
1105 * any other negative returned value must be considered as an error with an appcxt st0
1106 * returned value equal to PEER_SESS_ST_END.
1107 */
1108static inline int peer_send_status_errormsg(struct appctx *appctx)
1109{
1110 struct peer_prep_params p = {
1111 .error_status.st1 = appctx->st1,
1112 };
1113
1114 return peer_send_msg(appctx, peer_prepare_status_errormsg, &p);
1115}
1116
1117/*
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001118 * Send a stick-table switch message.
1119 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1120 * Returns -1 if there was not enough room left to send the message,
1121 * any other negative returned value must be considered as an error with an appcxt st0
1122 * returned value equal to PEER_SESS_ST_END.
1123 */
1124static inline int peer_send_switchmsg(struct shared_table *st, struct appctx *appctx)
1125{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001126 struct peer_prep_params p = {
1127 .swtch.shared_table = st,
1128 };
1129
1130 return peer_send_msg(appctx, peer_prepare_switchmsg, &p);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001131}
1132
1133/*
1134 * Send a stick-table update acknowledgement message.
1135 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1136 * Returns -1 if there was not enough room left to send the message,
1137 * any other negative returned value must be considered as an error with an appcxt st0
1138 * returned value equal to PEER_SESS_ST_END.
1139 */
1140static inline int peer_send_ackmsg(struct shared_table *st, struct appctx *appctx)
1141{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001142 struct peer_prep_params p = {
1143 .ack.shared_table = st,
1144 };
1145
1146 return peer_send_msg(appctx, peer_prepare_ackmsg, &p);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001147}
1148
1149/*
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01001150 * Send a stick-table update message.
1151 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1152 * Returns -1 if there was not enough room left to send the message,
1153 * any other negative returned value must be considered as an error with an appcxt st0
1154 * returned value equal to PEER_SESS_ST_END.
1155 */
1156static inline int peer_send_updatemsg(struct shared_table *st, struct appctx *appctx, struct stksess *ts,
1157 unsigned int updateid, int use_identifier, int use_timed)
1158{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001159 struct peer_prep_params p = {
Willy Tarreaua898f0c2020-07-03 19:09:29 +02001160 .updt = {
1161 .stksess = ts,
1162 .shared_table = st,
1163 .updateid = updateid,
1164 .use_identifier = use_identifier,
1165 .use_timed = use_timed,
1166 .peer = appctx->ctx.peers.ptr,
1167 },
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001168 };
1169
1170 return peer_send_msg(appctx, peer_prepare_updatemsg, &p);
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01001171}
1172
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001173/*
1174 * Build a peer protocol control class message.
1175 * Returns the number of written bytes used to build the message if succeeded,
1176 * 0 if not.
1177 */
1178static int peer_prepare_control_msg(char *msg, size_t size, struct peer_prep_params *p)
1179{
1180 if (size < sizeof p->control.head)
1181 return 0;
1182
1183 msg[0] = p->control.head[0];
1184 msg[1] = p->control.head[1];
1185
1186 return 2;
1187}
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001188
1189/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001190 * Send a stick-table synchronization request message.
1191 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1192 * Returns -1 if there was not enough room left to send the message,
1193 * any other negative returned value must be considered as an error with an appctx st0
1194 * returned value equal to PEER_SESS_ST_END.
1195 */
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001196static inline int peer_send_resync_reqmsg(struct appctx *appctx,
1197 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001198{
1199 struct peer_prep_params p = {
1200 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_RESYNCREQ, },
1201 };
1202
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001203 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1204 NULL, &p.control.head[1], peers->local->id, peer->id);
1205
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001206 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1207}
1208
1209/*
1210 * Send a stick-table synchronization confirmation message.
1211 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1212 * Returns -1 if there was not enough room left to send the message,
1213 * any other negative returned value must be considered as an error with an appctx st0
1214 * returned value equal to PEER_SESS_ST_END.
1215 */
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001216static inline int peer_send_resync_confirmsg(struct appctx *appctx,
1217 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001218{
1219 struct peer_prep_params p = {
1220 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_RESYNCCONFIRM, },
1221 };
1222
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001223 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1224 NULL, &p.control.head[1], peers->local->id, peer->id);
1225
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001226 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1227}
1228
1229/*
1230 * Send a stick-table synchronization finished message.
1231 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1232 * Returns -1 if there was not enough room left to send the message,
1233 * any other negative returned value must be considered as an error with an appctx st0
1234 * returned value equal to PEER_SESS_ST_END.
1235 */
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001236static inline int peer_send_resync_finishedmsg(struct appctx *appctx,
1237 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001238{
1239 struct peer_prep_params p = {
1240 .control.head = { PEER_MSG_CLASS_CONTROL, },
1241 };
1242
Emeric Brun70de43b2020-03-16 10:51:01 +01001243 p.control.head[1] = (peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FINISHED ?
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001244 PEER_MSG_CTRL_RESYNCFINISHED : PEER_MSG_CTRL_RESYNCPARTIAL;
1245
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001246 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1247 NULL, &p.control.head[1], peers->local->id, peer->id);
1248
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001249 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1250}
1251
1252/*
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001253 * Send a heartbeat message.
1254 * Return 0 if the message could not be built modifying the appctx st0 to PEER_SESS_ST_END value.
1255 * Returns -1 if there was not enough room left to send the message,
1256 * any other negative returned value must be considered as an error with an appctx st0
1257 * returned value equal to PEER_SESS_ST_END.
1258 */
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001259static inline int peer_send_heartbeatmsg(struct appctx *appctx,
1260 struct peer *peer, struct peers *peers)
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001261{
1262 struct peer_prep_params p = {
1263 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_HEARTBEAT, },
1264 };
1265
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001266 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1267 NULL, &p.control.head[1], peers->local->id, peer->id);
1268
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001269 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1270}
1271
1272/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001273 * Build a peer protocol error class message.
1274 * Returns the number of written bytes used to build the message if succeeded,
1275 * 0 if not.
1276 */
1277static int peer_prepare_error_msg(char *msg, size_t size, struct peer_prep_params *p)
1278{
1279 if (size < sizeof p->error.head)
1280 return 0;
1281
1282 msg[0] = p->error.head[0];
1283 msg[1] = p->error.head[1];
1284
1285 return 2;
1286}
1287
1288/*
1289 * Send a "size limit reached" error message.
1290 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1291 * Returns -1 if there was not enough room left to send the message,
1292 * any other negative returned value must be considered as an error with an appctx st0
1293 * returned value equal to PEER_SESS_ST_END.
1294 */
1295static inline int peer_send_error_size_limitmsg(struct appctx *appctx)
1296{
1297 struct peer_prep_params p = {
1298 .error.head = { PEER_MSG_CLASS_ERROR, PEER_MSG_ERR_SIZELIMIT, },
1299 };
1300
1301 return peer_send_msg(appctx, peer_prepare_error_msg, &p);
1302}
1303
1304/*
1305 * Send a "peer protocol" error message.
1306 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1307 * Returns -1 if there was not enough room left to send the message,
1308 * any other negative returned value must be considered as an error with an appctx st0
1309 * returned value equal to PEER_SESS_ST_END.
1310 */
1311static inline int peer_send_error_protomsg(struct appctx *appctx)
1312{
1313 struct peer_prep_params p = {
1314 .error.head = { PEER_MSG_CLASS_ERROR, PEER_MSG_ERR_PROTOCOL, },
1315 };
1316
1317 return peer_send_msg(appctx, peer_prepare_error_msg, &p);
1318}
1319
1320/*
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001321 * Function used to lookup for recent stick-table updates associated with
1322 * <st> shared stick-table when a lesson must be taught a peer (PEER_F_LEARN_ASSIGN flag set).
1323 */
1324static inline struct stksess *peer_teach_process_stksess_lookup(struct shared_table *st)
1325{
1326 struct eb32_node *eb;
1327
1328 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1329 if (!eb) {
1330 eb = eb32_first(&st->table->updates);
Emeric Brund9e4ee62021-04-28 11:48:15 +02001331 if (!eb || (eb->key == st->last_pushed)) {
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001332 st->table->commitupdate = st->last_pushed = st->table->localupdate;
1333 return NULL;
1334 }
1335 }
1336
Emeric Brund9e4ee62021-04-28 11:48:15 +02001337 /* if distance between the last pushed and the retrieved key
1338 * is greater than the distance last_pushed and the local_update
1339 * this means we are beyond localupdate.
1340 */
1341 if ((eb->key - st->last_pushed) > (st->table->localupdate - st->last_pushed)) {
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001342 st->table->commitupdate = st->last_pushed = st->table->localupdate;
1343 return NULL;
1344 }
1345
1346 return eb32_entry(eb, struct stksess, upd);
1347}
1348
1349/*
1350 * Function used to lookup for recent stick-table updates associated with
1351 * <st> shared stick-table during teach state 1 step.
1352 */
1353static inline struct stksess *peer_teach_stage1_stksess_lookup(struct shared_table *st)
1354{
1355 struct eb32_node *eb;
1356
1357 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1358 if (!eb) {
1359 st->flags |= SHTABLE_F_TEACH_STAGE1;
1360 eb = eb32_first(&st->table->updates);
1361 if (eb)
1362 st->last_pushed = eb->key - 1;
1363 return NULL;
1364 }
1365
1366 return eb32_entry(eb, struct stksess, upd);
1367}
1368
1369/*
1370 * Function used to lookup for recent stick-table updates associated with
1371 * <st> shared stick-table during teach state 2 step.
1372 */
1373static inline struct stksess *peer_teach_stage2_stksess_lookup(struct shared_table *st)
1374{
1375 struct eb32_node *eb;
1376
1377 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1378 if (!eb || eb->key > st->teaching_origin) {
1379 st->flags |= SHTABLE_F_TEACH_STAGE2;
1380 return NULL;
1381 }
1382
1383 return eb32_entry(eb, struct stksess, upd);
1384}
1385
1386/*
1387 * Generic function to emit update messages for <st> stick-table when a lesson must
1388 * be taught to the peer <p>.
1389 * <locked> must be set to 1 if the shared table <st> is already locked when entering
1390 * this function, 0 if not.
1391 *
1392 * This function temporary unlock/lock <st> when it sends stick-table updates or
1393 * when decrementing its refcount in case of any error when it sends this updates.
1394 *
1395 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1396 * Returns -1 if there was not enough room left to send the message,
1397 * any other negative returned value must be considered as an error with an appcxt st0
1398 * returned value equal to PEER_SESS_ST_END.
1399 * If it returns 0 or -1, this function leave <st> locked if already locked when entering this function
1400 * unlocked if not already locked when entering this function.
1401 */
1402static inline int peer_send_teachmsgs(struct appctx *appctx, struct peer *p,
1403 struct stksess *(*peer_stksess_lookup)(struct shared_table *),
1404 struct shared_table *st, int locked)
1405{
1406 int ret, new_pushed, use_timed;
1407
1408 ret = 1;
1409 use_timed = 0;
1410 if (st != p->last_local_table) {
1411 ret = peer_send_switchmsg(st, appctx);
1412 if (ret <= 0)
1413 return ret;
1414
1415 p->last_local_table = st;
1416 }
1417
1418 if (peer_stksess_lookup != peer_teach_process_stksess_lookup)
1419 use_timed = !(p->flags & PEER_F_DWNGRD);
1420
1421 /* We force new pushed to 1 to force identifier in update message */
1422 new_pushed = 1;
1423
1424 if (!locked)
1425 HA_SPIN_LOCK(STK_TABLE_LOCK, &st->table->lock);
1426
1427 while (1) {
1428 struct stksess *ts;
1429 unsigned updateid;
1430
1431 /* push local updates */
1432 ts = peer_stksess_lookup(st);
1433 if (!ts)
1434 break;
1435
1436 updateid = ts->upd.key;
1437 ts->ref_cnt++;
1438 HA_SPIN_UNLOCK(STK_TABLE_LOCK, &st->table->lock);
1439
1440 ret = peer_send_updatemsg(st, appctx, ts, updateid, new_pushed, use_timed);
1441 if (ret <= 0) {
1442 HA_SPIN_LOCK(STK_TABLE_LOCK, &st->table->lock);
1443 ts->ref_cnt--;
1444 if (!locked)
1445 HA_SPIN_UNLOCK(STK_TABLE_LOCK, &st->table->lock);
1446 return ret;
1447 }
1448
1449 HA_SPIN_LOCK(STK_TABLE_LOCK, &st->table->lock);
1450 ts->ref_cnt--;
1451 st->last_pushed = updateid;
1452
1453 if (peer_stksess_lookup == peer_teach_process_stksess_lookup &&
1454 (int)(st->last_pushed - st->table->commitupdate) > 0)
1455 st->table->commitupdate = st->last_pushed;
1456
1457 /* identifier may not needed in next update message */
1458 new_pushed = 0;
1459 }
1460
1461 out:
1462 if (!locked)
1463 HA_SPIN_UNLOCK(STK_TABLE_LOCK, &st->table->lock);
1464 return 1;
1465}
1466
1467/*
1468 * Function to emit update messages for <st> stick-table when a lesson must
1469 * be taught to the peer <p> (PEER_F_LEARN_ASSIGN flag set).
1470 *
1471 * Note that <st> shared stick-table is locked when calling this function.
1472 *
1473 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1474 * Returns -1 if there was not enough room left to send the message,
1475 * any other negative returned value must be considered as an error with an appcxt st0
1476 * returned value equal to PEER_SESS_ST_END.
1477 */
1478static inline int peer_send_teach_process_msgs(struct appctx *appctx, struct peer *p,
1479 struct shared_table *st)
1480{
1481 return peer_send_teachmsgs(appctx, p, peer_teach_process_stksess_lookup, st, 1);
1482}
1483
1484/*
1485 * Function to emit update messages for <st> stick-table when a lesson must
1486 * be taught to the peer <p> during teach state 1 step.
1487 *
1488 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1489 * Returns -1 if there was not enough room left to send the message,
1490 * any other negative returned value must be considered as an error with an appcxt st0
1491 * returned value equal to PEER_SESS_ST_END.
1492 */
1493static inline int peer_send_teach_stage1_msgs(struct appctx *appctx, struct peer *p,
1494 struct shared_table *st)
1495{
1496 return peer_send_teachmsgs(appctx, p, peer_teach_stage1_stksess_lookup, st, 0);
1497}
1498
1499/*
1500 * Function to emit update messages for <st> stick-table when a lesson must
1501 * be taught to the peer <p> during teach state 1 step.
1502 *
1503 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1504 * Returns -1 if there was not enough room left to send the message,
1505 * any other negative returned value must be considered as an error with an appcxt st0
1506 * returned value equal to PEER_SESS_ST_END.
1507 */
1508static inline int peer_send_teach_stage2_msgs(struct appctx *appctx, struct peer *p,
1509 struct shared_table *st)
1510{
1511 return peer_send_teachmsgs(appctx, p, peer_teach_stage2_stksess_lookup, st, 0);
1512}
1513
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001514
1515/*
1516 * Function used to parse a stick-table update message after it has been received
1517 * by <p> peer with <msg_cur> as address of the pointer to the position in the
1518 * receipt buffer with <msg_end> being position of the end of the stick-table message.
1519 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
1520 * was encountered.
1521 * <exp> must be set if the stick-table entry expires.
1522 * <updt> must be set for PEER_MSG_STKT_UPDATE or PEER_MSG_STKT_UPDATE_TIMED stick-table
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05001523 * messages, in this case the stick-table update message is received with a stick-table
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001524 * update ID.
1525 * <totl> is the length of the stick-table update message computed upon receipt.
1526 */
Frédéric Lécaille444243c2019-01-24 15:40:11 +01001527static int peer_treat_updatemsg(struct appctx *appctx, struct peer *p, int updt, int exp,
1528 char **msg_cur, char *msg_end, int msg_len, int totl)
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001529{
1530 struct stream_interface *si = appctx->owner;
1531 struct shared_table *st = p->remote_table;
1532 struct stksess *ts, *newts;
1533 uint32_t update;
1534 int expire;
1535 unsigned int data_type;
1536 void *data_ptr;
1537
Frédéric Lécaille94571512020-11-10 16:18:03 +01001538 TRACE_ENTER(PEERS_EV_UPDTMSG, NULL, p);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001539 /* Here we have data message */
1540 if (!st)
1541 goto ignore_msg;
1542
1543 expire = MS_TO_TICKS(st->table->expire);
1544
1545 if (updt) {
Frédéric Lécaille94571512020-11-10 16:18:03 +01001546 if (msg_len < sizeof(update)) {
1547 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001548 goto malformed_exit;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001549 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001550
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001551 memcpy(&update, *msg_cur, sizeof(update));
1552 *msg_cur += sizeof(update);
1553 st->last_get = htonl(update);
1554 }
1555 else {
1556 st->last_get++;
1557 }
1558
1559 if (exp) {
1560 size_t expire_sz = sizeof expire;
1561
Frédéric Lécaille94571512020-11-10 16:18:03 +01001562 if (*msg_cur + expire_sz > msg_end) {
1563 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1564 NULL, p, *msg_cur);
1565 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1566 NULL, p, msg_end, &expire_sz);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001567 goto malformed_exit;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001568 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001569
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001570 memcpy(&expire, *msg_cur, expire_sz);
1571 *msg_cur += expire_sz;
1572 expire = ntohl(expire);
1573 }
1574
1575 newts = stksess_new(st->table, NULL);
1576 if (!newts)
1577 goto ignore_msg;
1578
1579 if (st->table->type == SMP_T_STR) {
1580 unsigned int to_read, to_store;
1581
1582 to_read = intdecode(msg_cur, msg_end);
Frédéric Lécaille94571512020-11-10 16:18:03 +01001583 if (!*msg_cur) {
1584 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001585 goto malformed_free_newts;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001586 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001587
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001588 to_store = MIN(to_read, st->table->key_size - 1);
Frédéric Lécaille94571512020-11-10 16:18:03 +01001589 if (*msg_cur + to_store > msg_end) {
1590 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1591 NULL, p, *msg_cur);
1592 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1593 NULL, p, msg_end, &to_store);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001594 goto malformed_free_newts;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001595 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001596
1597 memcpy(newts->key.key, *msg_cur, to_store);
1598 newts->key.key[to_store] = 0;
1599 *msg_cur += to_read;
1600 }
1601 else if (st->table->type == SMP_T_SINT) {
1602 unsigned int netinteger;
1603
Frédéric Lécaille94571512020-11-10 16:18:03 +01001604 if (*msg_cur + sizeof(netinteger) > msg_end) {
1605 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1606 NULL, p, *msg_cur);
1607 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1608 NULL, p, msg_end);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001609 goto malformed_free_newts;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001610 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001611
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001612 memcpy(&netinteger, *msg_cur, sizeof(netinteger));
1613 netinteger = ntohl(netinteger);
1614 memcpy(newts->key.key, &netinteger, sizeof(netinteger));
1615 *msg_cur += sizeof(netinteger);
1616 }
1617 else {
Frédéric Lécaille94571512020-11-10 16:18:03 +01001618 if (*msg_cur + st->table->key_size > msg_end) {
1619 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1620 NULL, p, *msg_cur);
1621 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1622 NULL, p, msg_end, &st->table->key_size);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001623 goto malformed_free_newts;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001624 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001625
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001626 memcpy(newts->key.key, *msg_cur, st->table->key_size);
1627 *msg_cur += st->table->key_size;
1628 }
1629
1630 /* lookup for existing entry */
1631 ts = stktable_set_entry(st->table, newts);
1632 if (ts != newts) {
1633 stksess_free(st->table, newts);
1634 newts = NULL;
1635 }
1636
1637 HA_RWLOCK_WRLOCK(STK_SESS_LOCK, &ts->lock);
1638
1639 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
Willy Tarreau1e82a142019-01-29 11:08:06 +01001640 uint64_t decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001641
1642 if (!((1 << data_type) & st->remote_data))
1643 continue;
1644
Willy Tarreau1e82a142019-01-29 11:08:06 +01001645 decoded_int = intdecode(msg_cur, msg_end);
Frédéric Lécaille94571512020-11-10 16:18:03 +01001646 if (!*msg_cur) {
1647 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001648 goto malformed_unlock;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001649 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001650
Willy Tarreau1e82a142019-01-29 11:08:06 +01001651 switch (stktable_data_types[data_type].std_type) {
1652 case STD_T_SINT:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001653 data_ptr = stktable_data_ptr(st->table, ts, data_type);
1654 if (data_ptr)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001655 stktable_data_cast(data_ptr, std_t_sint) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001656 break;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001657
Willy Tarreau1e82a142019-01-29 11:08:06 +01001658 case STD_T_UINT:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001659 data_ptr = stktable_data_ptr(st->table, ts, data_type);
1660 if (data_ptr)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001661 stktable_data_cast(data_ptr, std_t_uint) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001662 break;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001663
Willy Tarreau1e82a142019-01-29 11:08:06 +01001664 case STD_T_ULL:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001665 data_ptr = stktable_data_ptr(st->table, ts, data_type);
1666 if (data_ptr)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001667 stktable_data_cast(data_ptr, std_t_ull) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001668 break;
Willy Tarreau1e82a142019-01-29 11:08:06 +01001669
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001670 case STD_T_FRQP: {
1671 struct freq_ctr_period data;
1672
1673 /* First bit is reserved for the freq_ctr_period lock
1674 Note: here we're still protected by the stksess lock
1675 so we don't need to update the update the freq_ctr_period
1676 using its internal lock */
1677
Willy Tarreau1e82a142019-01-29 11:08:06 +01001678 data.curr_tick = tick_add(now_ms, -decoded_int) & ~0x1;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001679 data.curr_ctr = intdecode(msg_cur, msg_end);
Frédéric Lécaille94571512020-11-10 16:18:03 +01001680 if (!*msg_cur) {
1681 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001682 goto malformed_unlock;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001683 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001684
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001685 data.prev_ctr = intdecode(msg_cur, msg_end);
Frédéric Lécaille94571512020-11-10 16:18:03 +01001686 if (!*msg_cur) {
1687 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001688 goto malformed_unlock;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001689 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001690
1691 data_ptr = stktable_data_ptr(st->table, ts, data_type);
1692 if (data_ptr)
1693 stktable_data_cast(data_ptr, std_t_frqp) = data;
1694 break;
1695 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001696 case STD_T_DICT: {
1697 struct buffer *chunk;
1698 size_t data_len, value_len;
1699 unsigned int id;
1700 struct dict_entry *de;
1701 struct dcache *dc;
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001702 char *end;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001703
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +01001704 if (!decoded_int) {
1705 /* No entry. */
1706 break;
1707 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001708 data_len = decoded_int;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001709 if (*msg_cur + data_len > msg_end) {
1710 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1711 NULL, p, *msg_cur);
1712 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1713 NULL, p, msg_end, &data_len);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001714 goto malformed_unlock;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001715 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001716
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001717 /* Compute the end of the current data, <msg_end> being at the end of
1718 * the entire message.
1719 */
1720 end = *msg_cur + data_len;
1721 id = intdecode(msg_cur, end);
Frédéric Lécaille94571512020-11-10 16:18:03 +01001722 if (!*msg_cur || !id) {
1723 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1724 NULL, p, *msg_cur, &id);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001725 goto malformed_unlock;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001726 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001727
1728 dc = p->dcache;
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001729 if (*msg_cur == end) {
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001730 /* Dictionary entry key without value. */
Frédéric Lécaillecd24d5c2020-11-12 19:53:11 +01001731 if (id > dc->max_entries) {
Frédéric Lécaille94571512020-11-10 16:18:03 +01001732 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1733 NULL, p, NULL, &id);
Frédéric Lécaillecd24d5c2020-11-12 19:53:11 +01001734 goto malformed_unlock;
1735 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001736 /* IDs sent over the network are numbered from 1. */
1737 de = dc->rx[id - 1].de;
1738 }
1739 else {
1740 chunk = get_trash_chunk();
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001741 value_len = intdecode(msg_cur, end);
1742 if (!*msg_cur || *msg_cur + value_len > end ||
Frédéric Lécaille94571512020-11-10 16:18:03 +01001743 unlikely(value_len + 1 >= chunk->size)) {
1744 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1745 NULL, p, *msg_cur, &value_len);
1746 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1747 NULL, p, end, &chunk->size);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001748 goto malformed_unlock;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001749 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001750
1751 chunk_memcpy(chunk, *msg_cur, value_len);
1752 chunk->area[chunk->data] = '\0';
Frédéric Lécaille56aec0d2019-06-06 14:14:15 +02001753 *msg_cur += value_len;
1754
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001755 de = dict_insert(&server_name_dict, chunk->area);
1756 dc->rx[id - 1].de = de;
1757 }
1758 if (de) {
1759 data_ptr = stktable_data_ptr(st->table, ts, data_type);
1760 if (data_ptr)
1761 stktable_data_cast(data_ptr, std_t_dict) = de;
1762 }
1763 break;
1764 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001765 }
1766 }
1767 /* Force new expiration */
1768 ts->expire = tick_add(now_ms, expire);
1769
1770 HA_RWLOCK_WRUNLOCK(STK_SESS_LOCK, &ts->lock);
1771 stktable_touch_remote(st->table, ts, 1);
Frédéric Lécaille94571512020-11-10 16:18:03 +01001772 TRACE_LEAVE(PEERS_EV_UPDTMSG, NULL, p);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001773 return 1;
1774
1775 ignore_msg:
1776 /* skip consumed message */
1777 co_skip(si_oc(si), totl);
Frédéric Lécaille94571512020-11-10 16:18:03 +01001778 TRACE_DEVEL("leaving in error", PEERS_EV_UPDTMSG);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001779 return 0;
Willy Tarreau1e82a142019-01-29 11:08:06 +01001780
1781 malformed_unlock:
1782 /* malformed message */
1783 HA_RWLOCK_WRUNLOCK(STK_SESS_LOCK, &ts->lock);
1784 stktable_touch_remote(st->table, ts, 1);
1785 appctx->st0 = PEER_SESS_ST_ERRPROTO;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001786 TRACE_DEVEL("leaving in error", PEERS_EV_UPDTMSG);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001787 return 0;
1788
1789 malformed_free_newts:
1790 /* malformed message */
1791 stksess_free(st->table, newts);
1792 malformed_exit:
1793 appctx->st0 = PEER_SESS_ST_ERRPROTO;
Frédéric Lécaille94571512020-11-10 16:18:03 +01001794 TRACE_DEVEL("leaving in error", PEERS_EV_UPDTMSG);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001795 return 0;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001796}
1797
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01001798/*
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001799 * Function used to parse a stick-table update acknowledgement message after it
1800 * has been received by <p> peer with <msg_cur> as address of the pointer to the position in the
1801 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
1802 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
1803 * was encountered.
1804 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
1805 */
1806static inline int peer_treat_ackmsg(struct appctx *appctx, struct peer *p,
1807 char **msg_cur, char *msg_end)
1808{
1809 /* ack message */
1810 uint32_t table_id ;
1811 uint32_t update;
1812 struct shared_table *st;
1813
Emeric Brun39555d62021-03-04 10:27:10 +01001814 /* ignore ack during teaching process */
1815 if (p->flags & PEER_F_TEACH_PROCESS)
1816 return 1;
1817
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001818 table_id = intdecode(msg_cur, msg_end);
1819 if (!*msg_cur || (*msg_cur + sizeof(update) > msg_end)) {
1820 /* malformed message */
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001821
1822 TRACE_PROTO("malformed message", PEERS_EV_ACKMSG,
1823 NULL, p, *msg_cur);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001824 appctx->st0 = PEER_SESS_ST_ERRPROTO;
1825 return 0;
1826 }
1827
1828 memcpy(&update, *msg_cur, sizeof(update));
1829 update = ntohl(update);
1830
1831 for (st = p->tables; st; st = st->next) {
1832 if (st->local_id == table_id) {
1833 st->update = update;
1834 break;
1835 }
1836 }
1837
1838 return 1;
1839}
1840
1841/*
1842 * Function used to parse a stick-table switch message after it has been received
1843 * by <p> peer with <msg_cur> as address of the pointer to the position in the
1844 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
1845 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
1846 * was encountered.
1847 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
1848 */
1849static inline int peer_treat_switchmsg(struct appctx *appctx, struct peer *p,
1850 char **msg_cur, char *msg_end)
1851{
1852 struct shared_table *st;
1853 int table_id;
1854
1855 table_id = intdecode(msg_cur, msg_end);
1856 if (!*msg_cur) {
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001857 TRACE_PROTO("malformed message", PEERS_EV_SWTCMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001858 /* malformed message */
1859 appctx->st0 = PEER_SESS_ST_ERRPROTO;
1860 return 0;
1861 }
1862
1863 p->remote_table = NULL;
1864 for (st = p->tables; st; st = st->next) {
1865 if (st->remote_id == table_id) {
1866 p->remote_table = st;
1867 break;
1868 }
1869 }
1870
1871 return 1;
1872}
1873
1874/*
1875 * Function used to parse a stick-table definition message after it has been received
1876 * by <p> peer with <msg_cur> as address of the pointer to the position in the
1877 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
1878 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
1879 * was encountered.
1880 * <totl> is the length of the stick-table update message computed upon receipt.
1881 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
1882 */
1883static inline int peer_treat_definemsg(struct appctx *appctx, struct peer *p,
1884 char **msg_cur, char *msg_end, int totl)
1885{
1886 struct stream_interface *si = appctx->owner;
1887 int table_id_len;
1888 struct shared_table *st;
1889 int table_type;
1890 int table_keylen;
1891 int table_id;
1892 uint64_t table_data;
1893
1894 table_id = intdecode(msg_cur, msg_end);
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001895 if (!*msg_cur) {
1896 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01001897 goto malformed_exit;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001898 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001899
1900 table_id_len = intdecode(msg_cur, msg_end);
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001901 if (!*msg_cur) {
1902 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p, *msg_cur);
Willy Tarreau6f731f32019-01-29 11:11:23 +01001903 goto malformed_exit;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001904 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001905
1906 p->remote_table = NULL;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001907 if (!table_id_len || (*msg_cur + table_id_len) >= msg_end) {
1908 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p, *msg_cur, &table_id_len);
Willy Tarreau6f731f32019-01-29 11:11:23 +01001909 goto malformed_exit;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001910 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001911
1912 for (st = p->tables; st; st = st->next) {
1913 /* Reset IDs */
1914 if (st->remote_id == table_id)
1915 st->remote_id = 0;
1916
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +01001917 if (!p->remote_table && (table_id_len == strlen(st->table->nid)) &&
1918 (memcmp(st->table->nid, *msg_cur, table_id_len) == 0))
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001919 p->remote_table = st;
1920 }
1921
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001922 if (!p->remote_table) {
1923 TRACE_PROTO("ignored message", PEERS_EV_DEFMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001924 goto ignore_msg;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001925 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001926
1927 *msg_cur += table_id_len;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001928 if (*msg_cur >= msg_end) {
1929 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01001930 goto malformed_exit;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001931 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001932
1933 table_type = intdecode(msg_cur, msg_end);
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001934 if (!*msg_cur) {
1935 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01001936 goto malformed_exit;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001937 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001938
1939 table_keylen = intdecode(msg_cur, msg_end);
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001940 if (!*msg_cur) {
1941 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01001942 goto malformed_exit;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001943 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001944
1945 table_data = intdecode(msg_cur, msg_end);
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001946 if (!*msg_cur) {
1947 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01001948 goto malformed_exit;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001949 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001950
Emeric Brun530ba382020-06-02 11:17:42 +02001951 if (p->remote_table->table->type != peer_int_key_type[table_type]
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001952 || p->remote_table->table->key_size != table_keylen) {
1953 p->remote_table = NULL;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01001954 TRACE_PROTO("ignored message", PEERS_EV_DEFMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001955 goto ignore_msg;
1956 }
1957
1958 p->remote_table->remote_data = table_data;
1959 p->remote_table->remote_id = table_id;
1960 return 1;
1961
1962 ignore_msg:
1963 co_skip(si_oc(si), totl);
1964 return 0;
Willy Tarreau6f731f32019-01-29 11:11:23 +01001965
1966 malformed_exit:
1967 /* malformed message */
1968 appctx->st0 = PEER_SESS_ST_ERRPROTO;
1969 return 0;
Frédéric Lécailled27b0942019-01-23 17:31:37 +01001970}
1971
1972/*
Willy Tarreaud4913912020-11-13 14:10:20 +01001973 * Receive a stick-table message or pre-parse any other message.
1974 * The message's header will be sent into <msg_head> which must be at least
1975 * <msg_head_sz> bytes long (at least 7 to store 32-bit variable lengths).
1976 * The first two bytes are always read, and the rest is only read if the
1977 * first bytes indicate a stick-table message. If the message is a stick-table
1978 * message, the varint is decoded and the equivalent number of bytes will be
1979 * copied into the trash at trash.area. <totl> is incremented by the number of
1980 * bytes read EVEN IN CASE OF INCOMPLETE MESSAGES.
Frédéric Lécaille95203f22019-01-23 19:38:11 +01001981 * Returns 1 if there was no error, if not, returns 0 if not enough data were available,
1982 * -1 if there was an error updating the appctx state st0 accordingly.
1983 */
1984static inline int peer_recv_msg(struct appctx *appctx, char *msg_head, size_t msg_head_sz,
1985 uint32_t *msg_len, int *totl)
1986{
1987 int reql;
1988 struct stream_interface *si = appctx->owner;
Willy Tarreaud4913912020-11-13 14:10:20 +01001989 char *cur;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01001990
1991 reql = co_getblk(si_oc(si), msg_head, 2 * sizeof(char), *totl);
1992 if (reql <= 0) /* closed or EOL not found */
1993 goto incomplete;
1994
1995 *totl += reql;
1996
Frédéric Lécaille36fb77e2019-06-04 08:28:19 +02001997 if (!(msg_head[1] & PEER_MSG_STKT_BIT_MASK))
Frédéric Lécaille95203f22019-01-23 19:38:11 +01001998 return 1;
1999
Willy Tarreaud4913912020-11-13 14:10:20 +01002000 /* This is a stick-table message, let's go on */
2001
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002002 /* Read and Decode message length */
Willy Tarreaud4913912020-11-13 14:10:20 +01002003 msg_head += *totl;
2004 msg_head_sz -= *totl;
2005 reql = co_data(si_oc(si)) - *totl;
2006 if (reql > msg_head_sz)
2007 reql = msg_head_sz;
2008
2009 reql = co_getblk(si_oc(si), msg_head, reql, *totl);
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002010 if (reql <= 0) /* closed */
2011 goto incomplete;
2012
Willy Tarreaud4913912020-11-13 14:10:20 +01002013 cur = msg_head;
2014 *msg_len = intdecode(&cur, cur + reql);
2015 if (!cur) {
2016 /* the number is truncated, did we read enough ? */
2017 if (reql < msg_head_sz)
2018 goto incomplete;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002019
Willy Tarreaud4913912020-11-13 14:10:20 +01002020 /* malformed message */
Frédéric Lécaille94571512020-11-10 16:18:03 +01002021 TRACE_PROTO("malformed message: too large length encoding", PEERS_EV_UPDTMSG);
Willy Tarreaud4913912020-11-13 14:10:20 +01002022 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2023 return -1;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002024 }
Willy Tarreaud4913912020-11-13 14:10:20 +01002025 *totl += cur - msg_head;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002026
2027 /* Read message content */
2028 if (*msg_len) {
2029 if (*msg_len > trash.size) {
2030 /* Status code is not success, abort */
2031 appctx->st0 = PEER_SESS_ST_ERRSIZE;
2032 return -1;
2033 }
2034
2035 reql = co_getblk(si_oc(si), trash.area, *msg_len, *totl);
2036 if (reql <= 0) /* closed */
2037 goto incomplete;
2038 *totl += reql;
2039 }
2040
2041 return 1;
2042
2043 incomplete:
Willy Tarreau46af74a2020-11-26 17:06:04 +01002044 if (reql < 0 || (si_oc(si)->flags & (CF_SHUTW|CF_SHUTW_NOW))) {
2045 /* there was an error or the message was truncated */
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002046 appctx->st0 = PEER_SESS_ST_END;
2047 return -1;
2048 }
2049
2050 return 0;
2051}
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002052
2053/*
2054 * Treat the awaited message with <msg_head> as header.*
2055 * Return 1 if succeeded, 0 if not.
2056 */
2057static inline int peer_treat_awaited_msg(struct appctx *appctx, struct peer *peer, unsigned char *msg_head,
2058 char **msg_cur, char *msg_end, int msg_len, int totl)
2059{
2060 struct stream_interface *si = appctx->owner;
2061 struct stream *s = si_strm(si);
2062 struct peers *peers = strm_fe(s)->parent;
2063
2064 if (msg_head[0] == PEER_MSG_CLASS_CONTROL) {
2065 if (msg_head[1] == PEER_MSG_CTRL_RESYNCREQ) {
2066 struct shared_table *st;
2067 /* Reset message: remote need resync */
2068
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002069 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2070 NULL, &msg_head[1], peers->local->id, peer->id);
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05002071 /* prepare tables for a global push */
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002072 for (st = peer->tables; st; st = st->next) {
Emeric Bruneb2f8e02021-04-28 09:49:33 +02002073 st->teaching_origin = st->last_pushed = st->update;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002074 st->flags = 0;
2075 }
2076
2077 /* reset teaching flags to 0 */
2078 peer->flags &= PEER_TEACH_RESET;
2079
2080 /* flag to start to teach lesson */
2081 peer->flags |= PEER_F_TEACH_PROCESS;
2082 }
2083 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCFINISHED) {
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002084 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2085 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002086 if (peer->flags & PEER_F_LEARN_ASSIGN) {
2087 peer->flags &= ~PEER_F_LEARN_ASSIGN;
2088 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
2089 peers->flags |= (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE);
2090 }
2091 peer->confirm++;
2092 }
2093 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCPARTIAL) {
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002094 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2095 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002096 if (peer->flags & PEER_F_LEARN_ASSIGN) {
2097 peer->flags &= ~PEER_F_LEARN_ASSIGN;
2098 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
2099
2100 peer->flags |= PEER_F_LEARN_NOTUP2DATE;
Frédéric Lécaille54bff832019-03-26 10:25:20 +01002101 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002102 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
2103 }
2104 peer->confirm++;
2105 }
2106 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCCONFIRM) {
2107 struct shared_table *st;
2108
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002109 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2110 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002111 /* If stopping state */
2112 if (stopping) {
2113 /* Close session, push resync no more needed */
2114 peer->flags |= PEER_F_TEACH_COMPLETE;
2115 appctx->st0 = PEER_SESS_ST_END;
2116 return 0;
2117 }
2118 for (st = peer->tables; st; st = st->next) {
2119 st->update = st->last_pushed = st->teaching_origin;
2120 st->flags = 0;
2121 }
2122
2123 /* reset teaching flags to 0 */
2124 peer->flags &= PEER_TEACH_RESET;
2125 }
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002126 else if (msg_head[1] == PEER_MSG_CTRL_HEARTBEAT) {
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002127 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2128 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille54bff832019-03-26 10:25:20 +01002129 peer->reconnect = tick_add(now_ms, MS_TO_TICKS(PEER_RECONNECT_TIMEOUT));
Frédéric Lécaille33cab3c2019-11-06 11:51:26 +01002130 peer->rx_hbt++;
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002131 }
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002132 }
2133 else if (msg_head[0] == PEER_MSG_CLASS_STICKTABLE) {
2134 if (msg_head[1] == PEER_MSG_STKT_DEFINE) {
2135 if (!peer_treat_definemsg(appctx, peer, msg_cur, msg_end, totl))
2136 return 0;
2137 }
2138 else if (msg_head[1] == PEER_MSG_STKT_SWITCH) {
2139 if (!peer_treat_switchmsg(appctx, peer, msg_cur, msg_end))
2140 return 0;
2141 }
2142 else if (msg_head[1] == PEER_MSG_STKT_UPDATE ||
2143 msg_head[1] == PEER_MSG_STKT_INCUPDATE ||
2144 msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED ||
2145 msg_head[1] == PEER_MSG_STKT_INCUPDATE_TIMED) {
2146 int update, expire;
2147
2148 update = msg_head[1] == PEER_MSG_STKT_UPDATE || msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED;
2149 expire = msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED || msg_head[1] == PEER_MSG_STKT_INCUPDATE_TIMED;
2150 if (!peer_treat_updatemsg(appctx, peer, update, expire,
2151 msg_cur, msg_end, msg_len, totl))
2152 return 0;
2153
2154 }
2155 else if (msg_head[1] == PEER_MSG_STKT_ACK) {
2156 if (!peer_treat_ackmsg(appctx, peer, msg_cur, msg_end))
2157 return 0;
2158 }
2159 }
2160 else if (msg_head[0] == PEER_MSG_CLASS_RESERVED) {
2161 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2162 return 0;
2163 }
2164
2165 return 1;
2166}
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002167
2168
2169/*
2170 * Send any message to <peer> peer.
2171 * Returns 1 if succeeded, or -1 or 0 if failed.
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05002172 * -1 means an internal error occurred, 0 is for a peer protocol error leading
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002173 * to a peer state change (from the peer I/O handler point of view).
2174 */
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002175static inline int peer_send_msgs(struct appctx *appctx,
2176 struct peer *peer, struct peers *peers)
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002177{
2178 int repl;
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002179
2180 /* Need to request a resync */
2181 if ((peer->flags & PEER_F_LEARN_ASSIGN) &&
2182 (peers->flags & PEERS_F_RESYNC_ASSIGN) &&
2183 !(peers->flags & PEERS_F_RESYNC_PROCESS)) {
2184
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002185 repl = peer_send_resync_reqmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002186 if (repl <= 0)
2187 return repl;
2188
2189 peers->flags |= PEERS_F_RESYNC_PROCESS;
2190 }
2191
2192 /* Nothing to read, now we start to write */
2193 if (peer->tables) {
2194 struct shared_table *st;
2195 struct shared_table *last_local_table;
2196
2197 last_local_table = peer->last_local_table;
2198 if (!last_local_table)
2199 last_local_table = peer->tables;
2200 st = last_local_table->next;
2201
2202 while (1) {
2203 if (!st)
2204 st = peer->tables;
2205
2206 /* It remains some updates to ack */
2207 if (st->last_get != st->last_acked) {
2208 repl = peer_send_ackmsg(st, appctx);
2209 if (repl <= 0)
2210 return repl;
2211
2212 st->last_acked = st->last_get;
2213 }
2214
2215 if (!(peer->flags & PEER_F_TEACH_PROCESS)) {
2216 HA_SPIN_LOCK(STK_TABLE_LOCK, &st->table->lock);
2217 if (!(peer->flags & PEER_F_LEARN_ASSIGN) &&
Emeric Brund9e4ee62021-04-28 11:48:15 +02002218 (st->last_pushed != st->table->localupdate)) {
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002219
2220 repl = peer_send_teach_process_msgs(appctx, peer, st);
2221 if (repl <= 0) {
2222 HA_SPIN_UNLOCK(STK_TABLE_LOCK, &st->table->lock);
2223 return repl;
2224 }
2225 }
2226 HA_SPIN_UNLOCK(STK_TABLE_LOCK, &st->table->lock);
2227 }
Emeric Brun6ffb9bc2021-04-22 18:13:13 +02002228 else if (!(peer->flags & PEER_F_TEACH_FINISHED)) {
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002229 if (!(st->flags & SHTABLE_F_TEACH_STAGE1)) {
2230 repl = peer_send_teach_stage1_msgs(appctx, peer, st);
2231 if (repl <= 0)
2232 return repl;
2233 }
2234
2235 if (!(st->flags & SHTABLE_F_TEACH_STAGE2)) {
2236 repl = peer_send_teach_stage2_msgs(appctx, peer, st);
2237 if (repl <= 0)
2238 return repl;
2239 }
2240 }
2241
2242 if (st == last_local_table)
2243 break;
2244 st = st->next;
2245 }
2246 }
2247
2248 if ((peer->flags & PEER_F_TEACH_PROCESS) && !(peer->flags & PEER_F_TEACH_FINISHED)) {
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002249 repl = peer_send_resync_finishedmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002250 if (repl <= 0)
2251 return repl;
2252
2253 /* flag finished message sent */
2254 peer->flags |= PEER_F_TEACH_FINISHED;
2255 }
2256
2257 /* Confirm finished or partial messages */
2258 while (peer->confirm) {
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002259 repl = peer_send_resync_confirmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002260 if (repl <= 0)
2261 return repl;
2262
2263 peer->confirm--;
2264 }
2265
2266 return 1;
2267}
2268
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002269/*
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002270 * Read and parse a first line of a "hello" peer protocol message.
2271 * Returns 0 if could not read a line, -1 if there was a read error or
2272 * the line is malformed, 1 if succeeded.
2273 */
2274static inline int peer_getline_version(struct appctx *appctx,
2275 unsigned int *maj_ver, unsigned int *min_ver)
2276{
2277 int reql;
2278
2279 reql = peer_getline(appctx);
2280 if (!reql)
2281 return 0;
2282
2283 if (reql < 0)
2284 return -1;
2285
2286 /* test protocol */
2287 if (strncmp(PEER_SESSION_PROTO_NAME " ", trash.area, proto_len + 1) != 0) {
2288 appctx->st0 = PEER_SESS_ST_EXIT;
2289 appctx->st1 = PEER_SESS_SC_ERRPROTO;
2290 return -1;
2291 }
2292 if (peer_get_version(trash.area + proto_len + 1, maj_ver, min_ver) == -1 ||
2293 *maj_ver != PEER_MAJOR_VER || *min_ver > PEER_MINOR_VER) {
2294 appctx->st0 = PEER_SESS_ST_EXIT;
2295 appctx->st1 = PEER_SESS_SC_ERRVERSION;
2296 return -1;
2297 }
2298
2299 return 1;
2300}
2301
2302/*
2303 * Read and parse a second line of a "hello" peer protocol message.
2304 * Returns 0 if could not read a line, -1 if there was a read error or
2305 * the line is malformed, 1 if succeeded.
2306 */
2307static inline int peer_getline_host(struct appctx *appctx)
2308{
2309 int reql;
2310
2311 reql = peer_getline(appctx);
2312 if (!reql)
2313 return 0;
2314
2315 if (reql < 0)
2316 return -1;
2317
2318 /* test hostname match */
2319 if (strcmp(localpeer, trash.area) != 0) {
2320 appctx->st0 = PEER_SESS_ST_EXIT;
2321 appctx->st1 = PEER_SESS_SC_ERRHOST;
2322 return -1;
2323 }
2324
2325 return 1;
2326}
2327
2328/*
2329 * Read and parse a last line of a "hello" peer protocol message.
2330 * Returns 0 if could not read a character, -1 if there was a read error or
2331 * the line is malformed, 1 if succeeded.
2332 * Set <curpeer> accordingly (the remote peer sending the "hello" message).
2333 */
2334static inline int peer_getline_last(struct appctx *appctx, struct peer **curpeer)
2335{
2336 char *p;
2337 int reql;
2338 struct peer *peer;
2339 struct stream_interface *si = appctx->owner;
2340 struct stream *s = si_strm(si);
2341 struct peers *peers = strm_fe(s)->parent;
2342
2343 reql = peer_getline(appctx);
2344 if (!reql)
2345 return 0;
2346
2347 if (reql < 0)
2348 return -1;
2349
2350 /* parse line "<peer name> <pid> <relative_pid>" */
2351 p = strchr(trash.area, ' ');
2352 if (!p) {
2353 appctx->st0 = PEER_SESS_ST_EXIT;
2354 appctx->st1 = PEER_SESS_SC_ERRPROTO;
2355 return -1;
2356 }
2357 *p = 0;
2358
2359 /* lookup known peer */
2360 for (peer = peers->remote; peer; peer = peer->next) {
2361 if (strcmp(peer->id, trash.area) == 0)
2362 break;
2363 }
2364
2365 /* if unknown peer */
2366 if (!peer) {
2367 appctx->st0 = PEER_SESS_ST_EXIT;
2368 appctx->st1 = PEER_SESS_SC_ERRPEER;
2369 return -1;
2370 }
2371 *curpeer = peer;
2372
2373 return 1;
2374}
2375
2376/*
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002377 * Init <peer> peer after having accepted it at peer protocol level.
2378 */
2379static inline void init_accepted_peer(struct peer *peer, struct peers *peers)
2380{
2381 struct shared_table *st;
2382
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002383 peer->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002384 /* Register status code */
2385 peer->statuscode = PEER_SESS_SC_SUCCESSCODE;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02002386 peer->last_hdshk = now_ms;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002387
2388 /* Awake main task */
2389 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
2390
2391 /* Init confirm counter */
2392 peer->confirm = 0;
2393
2394 /* Init cursors */
2395 for (st = peer->tables; st ; st = st->next) {
2396 st->last_get = st->last_acked = 0;
Emeric Brun21680f62021-02-23 16:50:53 +01002397 HA_SPIN_LOCK(STK_TABLE_LOCK, &st->table->lock);
2398 /* if st->update appears to be in future it means
2399 * that the last acked value is very old and we
2400 * remain unconnected a too long time to use this
2401 * acknowlegement as a reset.
2402 * We should update the protocol to be able to
2403 * signal the remote peer that it needs a full resync.
2404 * Here a partial fix consist to set st->update at
2405 * the max past value
2406 */
2407 if ((int)(st->table->localupdate - st->update) < 0)
2408 st->update = st->table->localupdate + (2147483648U);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002409 st->teaching_origin = st->last_pushed = st->update;
Emeric Brun5c880772021-04-20 14:43:46 +02002410 st->flags = 0;
Emeric Bruncd0a30e2021-02-23 17:08:08 +01002411 if ((int)(st->last_pushed - st->table->commitupdate) > 0)
2412 st->table->commitupdate = st->last_pushed;
Emeric Brun21680f62021-02-23 16:50:53 +01002413 HA_SPIN_UNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002414 }
2415
2416 /* reset teaching and learning flags to 0 */
2417 peer->flags &= PEER_TEACH_RESET;
2418 peer->flags &= PEER_LEARN_RESET;
2419
2420 /* if current peer is local */
2421 if (peer->local) {
Ilya Shipitsin46a030c2020-07-05 16:36:08 +05002422 /* if current host need resyncfrom local and no process assigned */
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002423 if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMLOCAL &&
2424 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2425 /* assign local peer for a lesson, consider lesson already requested */
2426 peer->flags |= PEER_F_LEARN_ASSIGN;
2427 peers->flags |= (PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
2428 }
2429
2430 }
2431 else if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE &&
2432 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2433 /* assign peer for a lesson */
2434 peer->flags |= PEER_F_LEARN_ASSIGN;
2435 peers->flags |= PEERS_F_RESYNC_ASSIGN;
2436 }
2437}
2438
2439/*
2440 * Init <peer> peer after having connected it at peer protocol level.
2441 */
2442static inline void init_connected_peer(struct peer *peer, struct peers *peers)
2443{
2444 struct shared_table *st;
2445
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002446 peer->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002447 /* Init cursors */
2448 for (st = peer->tables; st ; st = st->next) {
2449 st->last_get = st->last_acked = 0;
Emeric Brun21680f62021-02-23 16:50:53 +01002450 HA_SPIN_LOCK(STK_TABLE_LOCK, &st->table->lock);
2451 /* if st->update appears to be in future it means
2452 * that the last acked value is very old and we
2453 * remain unconnected a too long time to use this
2454 * acknowlegement as a reset.
2455 * We should update the protocol to be able to
2456 * signal the remote peer that it needs a full resync.
2457 * Here a partial fix consist to set st->update at
2458 * the max past value.
2459 */
2460 if ((int)(st->table->localupdate - st->update) < 0)
2461 st->update = st->table->localupdate + (2147483648U);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002462 st->teaching_origin = st->last_pushed = st->update;
Emeric Brun5c880772021-04-20 14:43:46 +02002463 st->flags = 0;
Emeric Bruncd0a30e2021-02-23 17:08:08 +01002464 if ((int)(st->last_pushed - st->table->commitupdate) > 0)
2465 st->table->commitupdate = st->last_pushed;
Emeric Brun21680f62021-02-23 16:50:53 +01002466 HA_SPIN_UNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002467 }
2468
2469 /* Init confirm counter */
2470 peer->confirm = 0;
2471
2472 /* reset teaching and learning flags to 0 */
2473 peer->flags &= PEER_TEACH_RESET;
2474 peer->flags &= PEER_LEARN_RESET;
2475
2476 /* If current peer is local */
2477 if (peer->local) {
2478 /* flag to start to teach lesson */
2479 peer->flags |= PEER_F_TEACH_PROCESS;
2480 }
2481 else if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE &&
2482 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2483 /* If peer is remote and resync from remote is needed,
2484 and no peer currently assigned */
2485
2486 /* assign peer for a lesson */
2487 peer->flags |= PEER_F_LEARN_ASSIGN;
2488 peers->flags |= PEERS_F_RESYNC_ASSIGN;
2489 }
2490}
2491
2492/*
Ilya Shipitsin46a030c2020-07-05 16:36:08 +05002493 * IO Handler to handle message exchange with a peer
Emeric Brun2b920a12010-09-23 18:30:22 +02002494 */
Willy Tarreau00a37f02015-04-13 12:05:19 +02002495static void peer_io_handler(struct appctx *appctx)
Emeric Brun2b920a12010-09-23 18:30:22 +02002496{
Willy Tarreau00a37f02015-04-13 12:05:19 +02002497 struct stream_interface *si = appctx->owner;
Willy Tarreau87b09662015-04-03 00:22:06 +02002498 struct stream *s = si_strm(si);
Vincent Bernat3c2f2f22016-04-03 13:48:42 +02002499 struct peers *curpeers = strm_fe(s)->parent;
Emeric Brun80527f52017-06-19 17:46:37 +02002500 struct peer *curpeer = NULL;
Emeric Brun2b920a12010-09-23 18:30:22 +02002501 int reql = 0;
2502 int repl = 0;
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002503 unsigned int maj_ver, min_ver;
Willy Tarreau2d372c22018-11-05 17:12:27 +01002504 int prev_state;
Emeric Brun2b920a12010-09-23 18:30:22 +02002505
Joseph Herlant82b2f542018-11-15 12:19:14 -08002506 /* Check if the input buffer is available. */
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002507 if (si_ic(si)->buf.size == 0) {
2508 si_rx_room_blk(si);
2509 goto out;
2510 }
Christopher Fauleta73e59b2016-12-09 17:30:18 +01002511
Emeric Brun2b920a12010-09-23 18:30:22 +02002512 while (1) {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002513 prev_state = appctx->st0;
Emeric Brun2b920a12010-09-23 18:30:22 +02002514switchstate:
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002515 maj_ver = min_ver = (unsigned int)-1;
Willy Tarreau7b4b4992013-12-01 09:15:12 +01002516 switch(appctx->st0) {
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002517 case PEER_SESS_ST_ACCEPT:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002518 prev_state = appctx->st0;
Willy Tarreau7b4b4992013-12-01 09:15:12 +01002519 appctx->ctx.peers.ptr = NULL;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002520 appctx->st0 = PEER_SESS_ST_GETVERSION;
Emeric Brun2b920a12010-09-23 18:30:22 +02002521 /* fall through */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002522 case PEER_SESS_ST_GETVERSION:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002523 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002524 reql = peer_getline_version(appctx, &maj_ver, &min_ver);
2525 if (reql <= 0) {
2526 if (!reql)
2527 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002528 goto switchstate;
2529 }
2530
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002531 appctx->st0 = PEER_SESS_ST_GETHOST;
Emeric Brun2b920a12010-09-23 18:30:22 +02002532 /* fall through */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002533 case PEER_SESS_ST_GETHOST:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002534 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002535 reql = peer_getline_host(appctx);
2536 if (reql <= 0) {
2537 if (!reql)
2538 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002539 goto switchstate;
2540 }
2541
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002542 appctx->st0 = PEER_SESS_ST_GETPEER;
Emeric Brun2b920a12010-09-23 18:30:22 +02002543 /* fall through */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002544 case PEER_SESS_ST_GETPEER: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002545 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002546 reql = peer_getline_last(appctx, &curpeer);
2547 if (reql <= 0) {
2548 if (!reql)
2549 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002550 goto switchstate;
2551 }
Emeric Brun2b920a12010-09-23 18:30:22 +02002552
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002553 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Willy Tarreau9df94c22016-10-31 18:42:52 +01002554 if (curpeer->appctx && curpeer->appctx != appctx) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02002555 if (curpeer->local) {
2556 /* Local connection, reply a retry */
2557 appctx->st0 = PEER_SESS_ST_EXIT;
2558 appctx->st1 = PEER_SESS_SC_TRYAGAIN;
2559 goto switchstate;
Emeric Brun2b920a12010-09-23 18:30:22 +02002560 }
Emeric Brun80527f52017-06-19 17:46:37 +02002561
2562 /* we're killing a connection, we must apply a random delay before
2563 * retrying otherwise the other end will do the same and we can loop
2564 * for a while.
2565 */
Willy Tarreau52bf8392020-03-08 00:42:37 +01002566 curpeer->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
Emeric Brun9ef2ad72019-04-02 17:22:01 +02002567 peer_session_forceshutdown(curpeer);
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002568 curpeer->heartbeat = TICK_ETERNITY;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02002569 curpeer->coll++;
Emeric Brun2b920a12010-09-23 18:30:22 +02002570 }
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002571 if (maj_ver != (unsigned int)-1 && min_ver != (unsigned int)-1) {
2572 if (min_ver == PEER_DWNGRD_MINOR_VER) {
2573 curpeer->flags |= PEER_F_DWNGRD;
2574 }
2575 else {
2576 curpeer->flags &= ~PEER_F_DWNGRD;
2577 }
2578 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02002579 curpeer->appctx = appctx;
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002580 curpeer->flags |= PEER_F_ALIVE;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002581 appctx->ctx.peers.ptr = curpeer;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002582 appctx->st0 = PEER_SESS_ST_SENDSUCCESS;
Olivier Houcharded879892019-03-08 18:53:43 +01002583 _HA_ATOMIC_ADD(&active_peers, 1);
Emeric Brun2b920a12010-09-23 18:30:22 +02002584 }
Tim Duesterhus588b3142020-05-29 14:35:51 +02002585 /* fall through */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002586 case PEER_SESS_ST_SENDSUCCESS: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002587 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02002588 if (!curpeer) {
2589 curpeer = appctx->ctx.peers.ptr;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002590 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02002591 if (curpeer->appctx != appctx) {
2592 appctx->st0 = PEER_SESS_ST_END;
2593 goto switchstate;
2594 }
2595 }
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002596
2597 repl = peer_send_status_successmsg(appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02002598 if (repl <= 0) {
2599 if (repl == -1)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002600 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002601 goto switchstate;
2602 }
2603
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002604 init_accepted_peer(curpeer, curpeers);
Emeric Brunb3971ab2015-05-12 18:49:09 +02002605
Emeric Brun2b920a12010-09-23 18:30:22 +02002606 /* switch to waiting message state */
Olivier Houcharded879892019-03-08 18:53:43 +01002607 _HA_ATOMIC_ADD(&connected_peers, 1);
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002608 appctx->st0 = PEER_SESS_ST_WAITMSG;
Emeric Brun2b920a12010-09-23 18:30:22 +02002609 goto switchstate;
2610 }
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002611 case PEER_SESS_ST_CONNECT: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002612 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02002613 if (!curpeer) {
2614 curpeer = appctx->ctx.peers.ptr;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002615 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02002616 if (curpeer->appctx != appctx) {
2617 appctx->st0 = PEER_SESS_ST_END;
2618 goto switchstate;
2619 }
2620 }
Emeric Brun2b920a12010-09-23 18:30:22 +02002621
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002622 repl = peer_send_hellomsg(appctx, curpeer);
Emeric Brun2b920a12010-09-23 18:30:22 +02002623 if (repl <= 0) {
2624 if (repl == -1)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002625 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002626 goto switchstate;
2627 }
2628
2629 /* switch to the waiting statuscode state */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002630 appctx->st0 = PEER_SESS_ST_GETSTATUS;
Emeric Brun2b920a12010-09-23 18:30:22 +02002631 }
Tim Duesterhus588b3142020-05-29 14:35:51 +02002632 /* fall through */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002633 case PEER_SESS_ST_GETSTATUS: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002634 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02002635 if (!curpeer) {
2636 curpeer = appctx->ctx.peers.ptr;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002637 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02002638 if (curpeer->appctx != appctx) {
2639 appctx->st0 = PEER_SESS_ST_END;
2640 goto switchstate;
2641 }
2642 }
2643
Willy Tarreau2bb4a962014-11-28 11:11:05 +01002644 if (si_ic(si)->flags & CF_WRITE_PARTIAL)
Emeric Brunb3971ab2015-05-12 18:49:09 +02002645 curpeer->statuscode = PEER_SESS_SC_CONNECTEDCODE;
Emeric Brun2b920a12010-09-23 18:30:22 +02002646
Frédéric Lécaillece025572019-01-21 13:38:06 +01002647 reql = peer_getline(appctx);
2648 if (!reql)
2649 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002650
Frédéric Lécaillece025572019-01-21 13:38:06 +01002651 if (reql < 0)
2652 goto switchstate;
Emeric Brun2b920a12010-09-23 18:30:22 +02002653
2654 /* Register status code */
Willy Tarreau843b7cb2018-07-13 10:54:26 +02002655 curpeer->statuscode = atoi(trash.area);
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02002656 curpeer->last_hdshk = now_ms;
Emeric Brun2b920a12010-09-23 18:30:22 +02002657
2658 /* Awake main task */
Frédéric Lécailleed2b4a62017-07-13 09:07:09 +02002659 task_wakeup(curpeers->sync_task, TASK_WOKEN_MSG);
Emeric Brun2b920a12010-09-23 18:30:22 +02002660
2661 /* If status code is success */
Emeric Brunb3971ab2015-05-12 18:49:09 +02002662 if (curpeer->statuscode == PEER_SESS_SC_SUCCESSCODE) {
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002663 init_connected_peer(curpeer, curpeers);
Emeric Brun2b920a12010-09-23 18:30:22 +02002664 }
2665 else {
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002666 if (curpeer->statuscode == PEER_SESS_SC_ERRVERSION)
2667 curpeer->flags |= PEER_F_DWNGRD;
Emeric Brun2b920a12010-09-23 18:30:22 +02002668 /* Status code is not success, abort */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002669 appctx->st0 = PEER_SESS_ST_END;
Emeric Brun2b920a12010-09-23 18:30:22 +02002670 goto switchstate;
2671 }
Olivier Houcharded879892019-03-08 18:53:43 +01002672 _HA_ATOMIC_ADD(&connected_peers, 1);
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002673 appctx->st0 = PEER_SESS_ST_WAITMSG;
Emeric Brun2b920a12010-09-23 18:30:22 +02002674 }
Tim Duesterhus588b3142020-05-29 14:35:51 +02002675 /* fall through */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002676 case PEER_SESS_ST_WAITMSG: {
Emeric Brunb3971ab2015-05-12 18:49:09 +02002677 uint32_t msg_len = 0;
Willy Tarreau843b7cb2018-07-13 10:54:26 +02002678 char *msg_cur = trash.area;
2679 char *msg_end = trash.area;
Willy Tarreaud4913912020-11-13 14:10:20 +01002680 unsigned char msg_head[7]; // 2 + 5 for varint32
Emeric Brun2b920a12010-09-23 18:30:22 +02002681 int totl = 0;
2682
Willy Tarreau2d372c22018-11-05 17:12:27 +01002683 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02002684 if (!curpeer) {
2685 curpeer = appctx->ctx.peers.ptr;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002686 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02002687 if (curpeer->appctx != appctx) {
2688 appctx->st0 = PEER_SESS_ST_END;
2689 goto switchstate;
2690 }
2691 }
2692
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002693 reql = peer_recv_msg(appctx, (char *)msg_head, sizeof msg_head, &msg_len, &totl);
2694 if (reql <= 0) {
2695 if (reql == -1)
2696 goto switchstate;
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01002697 goto send_msgs;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002698 }
Willy Tarreau86a446e2013-11-25 23:02:37 +01002699
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002700 msg_end += msg_len;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002701 if (!peer_treat_awaited_msg(appctx, curpeer, msg_head, &msg_cur, msg_end, msg_len, totl))
Emeric Brun2b920a12010-09-23 18:30:22 +02002702 goto switchstate;
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01002703
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01002704 curpeer->flags |= PEER_F_ALIVE;
2705
Emeric Brun2b920a12010-09-23 18:30:22 +02002706 /* skip consumed message */
Willy Tarreau06d80a92017-10-19 14:32:15 +02002707 co_skip(si_oc(si), totl);
Emeric Brun2b920a12010-09-23 18:30:22 +02002708 /* loop on that state to peek next message */
Willy Tarreau72d6c162013-04-11 16:14:13 +02002709 goto switchstate;
2710
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01002711send_msgs:
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002712 if (curpeer->flags & PEER_F_HEARTBEAT) {
2713 curpeer->flags &= ~PEER_F_HEARTBEAT;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002714 repl = peer_send_heartbeatmsg(appctx, curpeer, curpeers);
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002715 if (repl <= 0) {
2716 if (repl == -1)
2717 goto out;
2718 goto switchstate;
2719 }
Frédéric Lécaille33cab3c2019-11-06 11:51:26 +01002720 curpeer->tx_hbt++;
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002721 }
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01002722 /* we get here when a peer_recv_msg() returns 0 in reql */
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002723 repl = peer_send_msgs(appctx, curpeer, curpeers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002724 if (repl <= 0) {
2725 if (repl == -1)
2726 goto out;
2727 goto switchstate;
Emeric Brun597b26e2016-08-12 11:23:31 +02002728 }
2729
Emeric Brun2b920a12010-09-23 18:30:22 +02002730 /* noting more to do */
2731 goto out;
2732 }
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002733 case PEER_SESS_ST_EXIT:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002734 if (prev_state == PEER_SESS_ST_WAITMSG)
Olivier Houcharded879892019-03-08 18:53:43 +01002735 _HA_ATOMIC_SUB(&connected_peers, 1);
Willy Tarreau2d372c22018-11-05 17:12:27 +01002736 prev_state = appctx->st0;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002737 if (peer_send_status_errormsg(appctx) == -1)
2738 goto out;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002739 appctx->st0 = PEER_SESS_ST_END;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002740 goto switchstate;
2741 case PEER_SESS_ST_ERRSIZE: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002742 if (prev_state == PEER_SESS_ST_WAITMSG)
Olivier Houcharded879892019-03-08 18:53:43 +01002743 _HA_ATOMIC_SUB(&connected_peers, 1);
Willy Tarreau2d372c22018-11-05 17:12:27 +01002744 prev_state = appctx->st0;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002745 if (peer_send_error_size_limitmsg(appctx) == -1)
2746 goto out;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002747 appctx->st0 = PEER_SESS_ST_END;
2748 goto switchstate;
2749 }
2750 case PEER_SESS_ST_ERRPROTO: {
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002751 TRACE_PROTO("protocol error", PEERS_EV_PROTOERR,
2752 NULL, curpeer, &prev_state);
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01002753 if (curpeer)
2754 curpeer->proto_err++;
Willy Tarreau2d372c22018-11-05 17:12:27 +01002755 if (prev_state == PEER_SESS_ST_WAITMSG)
Olivier Houcharded879892019-03-08 18:53:43 +01002756 _HA_ATOMIC_SUB(&connected_peers, 1);
Willy Tarreau2d372c22018-11-05 17:12:27 +01002757 prev_state = appctx->st0;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002758 if (peer_send_error_protomsg(appctx) == -1) {
2759 TRACE_PROTO("could not send error message", PEERS_EV_PROTOERR);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002760 goto out;
Frédéric Lécaille1cc0d9a2021-01-15 16:21:28 +01002761 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02002762 appctx->st0 = PEER_SESS_ST_END;
Willy Tarreau2d372c22018-11-05 17:12:27 +01002763 prev_state = appctx->st0;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002764 }
Tim Duesterhus588b3142020-05-29 14:35:51 +02002765 /* fall through */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002766 case PEER_SESS_ST_END: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002767 if (prev_state == PEER_SESS_ST_WAITMSG)
Olivier Houcharded879892019-03-08 18:53:43 +01002768 _HA_ATOMIC_SUB(&connected_peers, 1);
Willy Tarreau2d372c22018-11-05 17:12:27 +01002769 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02002770 if (curpeer) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002771 HA_SPIN_UNLOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02002772 curpeer = NULL;
2773 }
Willy Tarreau73b013b2012-05-21 16:31:45 +02002774 si_shutw(si);
2775 si_shutr(si);
Willy Tarreau2bb4a962014-11-28 11:11:05 +01002776 si_ic(si)->flags |= CF_READ_NULL;
Willy Tarreau828824a2015-04-19 17:20:03 +02002777 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002778 }
2779 }
2780 }
2781out:
Willy Tarreau2bb4a962014-11-28 11:11:05 +01002782 si_oc(si)->flags |= CF_READ_DONTWAIT;
Emeric Brun80527f52017-06-19 17:46:37 +02002783
2784 if (curpeer)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002785 HA_SPIN_UNLOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun2b920a12010-09-23 18:30:22 +02002786 return;
2787}
2788
Willy Tarreau30576452015-04-13 13:50:30 +02002789static struct applet peer_applet = {
Willy Tarreau3fdb3662012-11-12 00:42:33 +01002790 .obj_type = OBJ_TYPE_APPLET,
Willy Tarreaub24281b2011-02-13 13:16:36 +01002791 .name = "<PEER>", /* used for logging */
2792 .fct = peer_io_handler,
Aman Gupta9a13e842012-04-02 18:57:53 -07002793 .release = peer_session_release,
Willy Tarreaub24281b2011-02-13 13:16:36 +01002794};
Emeric Brun2b920a12010-09-23 18:30:22 +02002795
Emeric Brun9ef2ad72019-04-02 17:22:01 +02002796
Emeric Brun2b920a12010-09-23 18:30:22 +02002797/*
2798 * Use this function to force a close of a peer session
2799 */
Emeric Brun9ef2ad72019-04-02 17:22:01 +02002800static void peer_session_forceshutdown(struct peer *peer)
Emeric Brun2b920a12010-09-23 18:30:22 +02002801{
Emeric Brun9ef2ad72019-04-02 17:22:01 +02002802 struct appctx *appctx = peer->appctx;
2803
Frédéric Lécaille5df11902017-06-13 16:39:57 +02002804 /* Note that the peer sessions which have just been created
2805 * (->st0 == PEER_SESS_ST_CONNECT) must not
2806 * be shutdown, if not, the TCP session will never be closed
2807 * and stay in CLOSE_WAIT state after having been closed by
2808 * the remote side.
2809 */
2810 if (!appctx || appctx->st0 == PEER_SESS_ST_CONNECT)
Willy Tarreau7b4b4992013-12-01 09:15:12 +01002811 return;
2812
Willy Tarreau81bc3b02016-10-31 17:37:39 +01002813 if (appctx->applet != &peer_applet)
2814 return;
2815
Emeric Brun9ef2ad72019-04-02 17:22:01 +02002816 __peer_session_deinit(peer);
2817
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002818 appctx->st0 = PEER_SESS_ST_END;
Willy Tarreau78c0c502016-10-31 17:32:20 +01002819 appctx_wakeup(appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02002820}
2821
Willy Tarreau91d96282015-03-13 15:47:26 +01002822/* Pre-configures a peers frontend to accept incoming connections */
2823void peers_setup_frontend(struct proxy *fe)
2824{
2825 fe->last_change = now.tv_sec;
Frédéric Lécaillec06b5d42018-04-26 10:06:41 +02002826 fe->cap = PR_CAP_FE | PR_CAP_BE;
Willy Tarreaua389c9e2020-10-07 17:49:42 +02002827 fe->mode = PR_MODE_PEERS;
Willy Tarreau91d96282015-03-13 15:47:26 +01002828 fe->maxconn = 0;
2829 fe->conn_retries = CONN_RETRIES;
2830 fe->timeout.client = MS_TO_TICKS(5000);
Willy Tarreaud1d48d42015-03-13 16:15:46 +01002831 fe->accept = frontend_accept;
Willy Tarreauf87ab942015-03-13 15:55:16 +01002832 fe->default_target = &peer_applet.obj_type;
Willy Tarreau91d96282015-03-13 15:47:26 +01002833 fe->options2 |= PR_O2_INDEPSTR | PR_O2_SMARTCON | PR_O2_SMARTACC;
Willy Tarreau0fca4832015-05-01 19:12:05 +02002834 fe->bind_proc = 0; /* will be filled by users */
Willy Tarreau91d96282015-03-13 15:47:26 +01002835}
2836
Emeric Brun2b920a12010-09-23 18:30:22 +02002837/*
Willy Tarreaubd55e312010-11-11 10:55:09 +01002838 * Create a new peer session in assigned state (connect will start automatically)
Emeric Brun2b920a12010-09-23 18:30:22 +02002839 */
Willy Tarreau9df94c22016-10-31 18:42:52 +01002840static struct appctx *peer_session_create(struct peers *peers, struct peer *peer)
Emeric Brun2b920a12010-09-23 18:30:22 +02002841{
Willy Tarreau04b92862017-09-15 11:01:04 +02002842 struct proxy *p = peers->peers_fe; /* attached frontend */
Willy Tarreau7b4b4992013-12-01 09:15:12 +01002843 struct appctx *appctx;
Willy Tarreau15b5e142015-04-04 14:38:25 +02002844 struct session *sess;
Willy Tarreau87b09662015-04-03 00:22:06 +02002845 struct stream *s;
Emeric Brun2b920a12010-09-23 18:30:22 +02002846
Frédéric Lécaille219587f2021-01-18 15:14:39 +01002847 peer->new_conn++;
Frédéric Lécaille54bff832019-03-26 10:25:20 +01002848 peer->reconnect = tick_add(now_ms, MS_TO_TICKS(PEER_RECONNECT_TIMEOUT));
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002849 peer->heartbeat = TICK_ETERNITY;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002850 peer->statuscode = PEER_SESS_SC_CONNECTCODE;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02002851 peer->last_hdshk = now_ms;
Willy Tarreaud990baf2015-04-05 00:32:03 +02002852 s = NULL;
2853
Emeric Brun1138fd02017-06-19 12:38:55 +02002854 appctx = appctx_new(&peer_applet, tid_bit);
Willy Tarreaud990baf2015-04-05 00:32:03 +02002855 if (!appctx)
2856 goto out_close;
2857
2858 appctx->st0 = PEER_SESS_ST_CONNECT;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002859 appctx->ctx.peers.ptr = (void *)peer;
Willy Tarreaud990baf2015-04-05 00:32:03 +02002860
Willy Tarreau04b92862017-09-15 11:01:04 +02002861 sess = session_new(p, NULL, &appctx->obj_type);
Willy Tarreau15b5e142015-04-04 14:38:25 +02002862 if (!sess) {
Christopher Faulet767a84b2017-11-24 16:50:31 +01002863 ha_alert("out of memory in peer_session_create().\n");
Willy Tarreaud990baf2015-04-05 00:32:03 +02002864 goto out_free_appctx;
Emeric Brun2b920a12010-09-23 18:30:22 +02002865 }
2866
Willy Tarreau87787ac2017-08-28 16:22:54 +02002867 if ((s = stream_new(sess, &appctx->obj_type)) == NULL) {
Christopher Faulet767a84b2017-11-24 16:50:31 +01002868 ha_alert("Failed to initialize stream in peer_session_create().\n");
Willy Tarreau87787ac2017-08-28 16:22:54 +02002869 goto out_free_sess;
Willy Tarreau8baf9062015-04-05 00:46:36 +02002870 }
2871
Willy Tarreau6e2979c2015-04-27 13:21:15 +02002872 /* applet is waiting for data */
Willy Tarreau0cd3bd62018-11-06 18:46:37 +01002873 si_cant_get(&s->si[0]);
Willy Tarreau6e2979c2015-04-27 13:21:15 +02002874 appctx_wakeup(appctx);
2875
Willy Tarreau3ed35ef2013-10-24 11:51:38 +02002876 /* initiate an outgoing connection */
Willy Tarreau1c8d32b2019-07-18 15:47:45 +02002877 s->target = peer_session_target(peer, s);
Willy Tarreau9b7587a2020-10-15 07:32:10 +02002878 if (!sockaddr_alloc(&s->target_addr, &peer->addr, sizeof(peer->addr)))
Willy Tarreau1c8d32b2019-07-18 15:47:45 +02002879 goto out_free_strm;
Willy Tarreau02efeda2019-07-18 17:21:24 +02002880 s->flags = SF_ASSIGNED|SF_ADDR_SET;
Willy Tarreaudbd02672017-12-06 17:39:53 +01002881 s->si[1].flags |= SI_FL_NOLINGER;
Willy Tarreau32e3c6a2013-10-11 19:34:20 +02002882
Emeric Brun2b920a12010-09-23 18:30:22 +02002883 s->do_log = NULL;
Emeric Brun2b920a12010-09-23 18:30:22 +02002884 s->uniq_id = 0;
Emeric Brun2b920a12010-09-23 18:30:22 +02002885
Willy Tarreau22ec1ea2014-11-27 20:45:39 +01002886 s->res.flags |= CF_READ_DONTWAIT;
Willy Tarreau696a2912014-11-24 11:36:57 +01002887
Emeric Brunb3971ab2015-05-12 18:49:09 +02002888 peer->appctx = appctx;
Willy Tarreau87787ac2017-08-28 16:22:54 +02002889 task_wakeup(s->task, TASK_WOKEN_INIT);
Olivier Houcharded879892019-03-08 18:53:43 +01002890 _HA_ATOMIC_ADD(&active_peers, 1);
Willy Tarreau9df94c22016-10-31 18:42:52 +01002891 return appctx;
Emeric Brun2b920a12010-09-23 18:30:22 +02002892
2893 /* Error unrolling */
Willy Tarreau15b5e142015-04-04 14:38:25 +02002894 out_free_strm:
Emeric Brun2b920a12010-09-23 18:30:22 +02002895 LIST_DEL(&s->list);
Willy Tarreaubafbe012017-11-24 17:34:44 +01002896 pool_free(pool_head_stream, s);
Willy Tarreau15b5e142015-04-04 14:38:25 +02002897 out_free_sess:
Willy Tarreau11c36242015-04-04 15:54:03 +02002898 session_free(sess);
Willy Tarreaud990baf2015-04-05 00:32:03 +02002899 out_free_appctx:
2900 appctx_free(appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02002901 out_close:
Willy Tarreaub21d08e2016-10-31 17:46:57 +01002902 return NULL;
Emeric Brun2b920a12010-09-23 18:30:22 +02002903}
2904
2905/*
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002906 * Task processing function to manage re-connect, peer session
2907 * tasks wakeup on local update and heartbeat.
Emeric Brun2b920a12010-09-23 18:30:22 +02002908 */
Olivier Houchard9f6af332018-05-25 14:04:04 +02002909static struct task *process_peer_sync(struct task * task, void *context, unsigned short state)
Emeric Brun2b920a12010-09-23 18:30:22 +02002910{
Olivier Houchard9f6af332018-05-25 14:04:04 +02002911 struct peers *peers = context;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002912 struct peer *ps;
2913 struct shared_table *st;
Emeric Brun2b920a12010-09-23 18:30:22 +02002914
2915 task->expire = TICK_ETERNITY;
2916
Emeric Brunb3971ab2015-05-12 18:49:09 +02002917 if (!peers->peers_fe) {
Willy Tarreau46dc1ca2015-05-01 18:32:13 +02002918 /* this one was never started, kill it */
Emeric Brunb3971ab2015-05-12 18:49:09 +02002919 signal_unregister_handler(peers->sighandler);
Olivier Houchard3f795f72019-04-17 22:51:06 +02002920 task_destroy(peers->sync_task);
Willy Tarreau37bb7be2015-09-21 15:24:58 +02002921 peers->sync_task = NULL;
Willy Tarreau46dc1ca2015-05-01 18:32:13 +02002922 return NULL;
2923 }
2924
Emeric Brun80527f52017-06-19 17:46:37 +02002925 /* Acquire lock for all peers of the section */
2926 for (ps = peers->remote; ps; ps = ps->next)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002927 HA_SPIN_LOCK(PEER_LOCK, &ps->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02002928
Emeric Brun2b920a12010-09-23 18:30:22 +02002929 if (!stopping) {
2930 /* Normal case (not soft stop)*/
Emeric Brunb3971ab2015-05-12 18:49:09 +02002931
Emeric Brun13eca442021-04-21 16:06:35 +02002932 /* resync timeout set to TICK_ETERNITY means we just start
2933 * a new process and timer was not initialized.
2934 * We must arm this timer to switch to a request to a remote
2935 * node if incoming connection from old local process never
2936 * comes.
2937 */
2938 if (peers->resync_timeout == TICK_ETERNITY)
2939 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
2940
Emeric Brunb3971ab2015-05-12 18:49:09 +02002941 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMLOCAL) &&
2942 (!nb_oldpids || tick_is_expired(peers->resync_timeout, now_ms)) &&
2943 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02002944 /* Resync from local peer needed
2945 no peer was assigned for the lesson
2946 and no old local peer found
2947 or resync timeout expire */
2948
2949 /* flag no more resync from local, to try resync from remotes */
Emeric Brunb3971ab2015-05-12 18:49:09 +02002950 peers->flags |= PEERS_F_RESYNC_LOCAL;
Emeric Brun2b920a12010-09-23 18:30:22 +02002951
2952 /* reschedule a resync */
Frédéric Lécaille54bff832019-03-26 10:25:20 +01002953 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
Emeric Brun2b920a12010-09-23 18:30:22 +02002954 }
2955
2956 /* For each session */
Emeric Brunb3971ab2015-05-12 18:49:09 +02002957 for (ps = peers->remote; ps; ps = ps->next) {
Emeric Brun2b920a12010-09-23 18:30:22 +02002958 /* For each remote peers */
Emeric Brunb3971ab2015-05-12 18:49:09 +02002959 if (!ps->local) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01002960 if (!ps->appctx) {
2961 /* no active peer connection */
Emeric Brun2b920a12010-09-23 18:30:22 +02002962 if (ps->statuscode == 0 ||
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002963 ((ps->statuscode == PEER_SESS_SC_CONNECTCODE ||
Willy Tarreaub4e34da2015-05-20 10:39:04 +02002964 ps->statuscode == PEER_SESS_SC_SUCCESSCODE ||
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002965 ps->statuscode == PEER_SESS_SC_CONNECTEDCODE) &&
Emeric Brun2b920a12010-09-23 18:30:22 +02002966 tick_is_expired(ps->reconnect, now_ms))) {
2967 /* connection never tried
Willy Tarreau9df94c22016-10-31 18:42:52 +01002968 * or previous peer connection established with success
2969 * or previous peer connection failed while connecting
Emeric Brun2b920a12010-09-23 18:30:22 +02002970 * and reconnection timer is expired */
2971
2972 /* retry a connect */
Willy Tarreau9df94c22016-10-31 18:42:52 +01002973 ps->appctx = peer_session_create(peers, ps);
Emeric Brun2b920a12010-09-23 18:30:22 +02002974 }
Willy Tarreaub4e34da2015-05-20 10:39:04 +02002975 else if (!tick_is_expired(ps->reconnect, now_ms)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02002976 /* If previous session failed during connection
2977 * but reconnection timer is not expired */
2978
2979 /* reschedule task for reconnect */
2980 task->expire = tick_first(task->expire, ps->reconnect);
2981 }
2982 /* else do nothing */
Willy Tarreau9df94c22016-10-31 18:42:52 +01002983 } /* !ps->appctx */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002984 else if (ps->statuscode == PEER_SESS_SC_SUCCESSCODE) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01002985 /* current peer connection is active and established */
Emeric Brunb3971ab2015-05-12 18:49:09 +02002986 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE) &&
2987 !(peers->flags & PEERS_F_RESYNC_ASSIGN) &&
Emeric Brun2b920a12010-09-23 18:30:22 +02002988 !(ps->flags & PEER_F_LEARN_NOTUP2DATE)) {
2989 /* Resync from a remote is needed
2990 * and no peer was assigned for lesson
2991 * and current peer may be up2date */
2992
2993 /* assign peer for the lesson */
2994 ps->flags |= PEER_F_LEARN_ASSIGN;
Emeric Brunb3971ab2015-05-12 18:49:09 +02002995 peers->flags |= PEERS_F_RESYNC_ASSIGN;
Emeric Brun2b920a12010-09-23 18:30:22 +02002996
Willy Tarreau9df94c22016-10-31 18:42:52 +01002997 /* wake up peer handler to handle a request of resync */
Willy Tarreaue5843b32015-04-27 18:40:14 +02002998 appctx_wakeup(ps->appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02002999 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003000 else {
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003001 int update_to_push = 0;
3002
Emeric Brunb3971ab2015-05-12 18:49:09 +02003003 /* Awake session if there is data to push */
3004 for (st = ps->tables; st ; st = st->next) {
Emeric Brund9e4ee62021-04-28 11:48:15 +02003005 if (st->last_pushed != st->table->localupdate) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01003006 /* wake up the peer handler to push local updates */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003007 update_to_push = 1;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003008 /* There is no need to send a heartbeat message
3009 * when some updates must be pushed. The remote
3010 * peer will consider <ps> peer as alive when it will
3011 * receive these updates.
3012 */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003013 ps->flags &= ~PEER_F_HEARTBEAT;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003014 /* Re-schedule another one later. */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003015 ps->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003016 /* We are going to send updates, let's ensure we will
3017 * come back to send heartbeat messages or to reconnect.
3018 */
3019 task->expire = tick_first(ps->reconnect, ps->heartbeat);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003020 appctx_wakeup(ps->appctx);
3021 break;
3022 }
3023 }
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003024 /* When there are updates to send we do not reconnect
3025 * and do not send heartbeat message either.
3026 */
3027 if (!update_to_push) {
3028 if (tick_is_expired(ps->reconnect, now_ms)) {
3029 if (ps->flags & PEER_F_ALIVE) {
3030 /* This peer was alive during a 'reconnect' period.
3031 * Flag it as not alive again for the next period.
3032 */
3033 ps->flags &= ~PEER_F_ALIVE;
Frédéric Lécaille54bff832019-03-26 10:25:20 +01003034 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(PEER_RECONNECT_TIMEOUT));
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003035 }
3036 else {
Willy Tarreau52bf8392020-03-08 00:42:37 +01003037 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02003038 ps->heartbeat = TICK_ETERNITY;
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003039 peer_session_forceshutdown(ps);
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01003040 ps->no_hbt++;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003041 }
3042 }
3043 else if (tick_is_expired(ps->heartbeat, now_ms)) {
3044 ps->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
3045 ps->flags |= PEER_F_HEARTBEAT;
3046 appctx_wakeup(ps->appctx);
3047 }
Frédéric Lécailleb7405c12019-03-27 14:32:39 +01003048 task->expire = tick_first(ps->reconnect, ps->heartbeat);
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003049 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003050 }
3051 /* else do nothing */
3052 } /* SUCCESSCODE */
3053 } /* !ps->peer->local */
3054 } /* for */
3055
3056 /* Resync from remotes expired: consider resync is finished */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003057 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE) &&
3058 !(peers->flags & PEERS_F_RESYNC_ASSIGN) &&
3059 tick_is_expired(peers->resync_timeout, now_ms)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003060 /* Resync from remote peer needed
3061 * no peer was assigned for the lesson
3062 * and resync timeout expire */
3063
3064 /* flag no more resync from remote, consider resync is finished */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003065 peers->flags |= PEERS_F_RESYNC_REMOTE;
Emeric Brun2b920a12010-09-23 18:30:22 +02003066 }
3067
Emeric Brunb3971ab2015-05-12 18:49:09 +02003068 if ((peers->flags & PEERS_RESYNC_STATEMASK) != PEERS_RESYNC_FINISHED) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003069 /* Resync not finished*/
Frédéric Lécaille5d6e5f82017-05-29 13:47:16 +02003070 /* reschedule task to resync timeout if not expired, to ended resync if needed */
3071 if (!tick_is_expired(peers->resync_timeout, now_ms))
3072 task->expire = tick_first(task->expire, peers->resync_timeout);
Emeric Brun2b920a12010-09-23 18:30:22 +02003073 }
3074 } /* !stopping */
3075 else {
3076 /* soft stop case */
Willy Tarreau086735a2018-11-05 15:09:47 +01003077 if (state & TASK_WOKEN_SIGNAL) {
Joseph Herlant82b2f542018-11-15 12:19:14 -08003078 /* We've just received the signal */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003079 if (!(peers->flags & PEERS_F_DONOTSTOP)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003080 /* add DO NOT STOP flag if not present */
Olivier Houcharded879892019-03-08 18:53:43 +01003081 _HA_ATOMIC_ADD(&jobs, 1);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003082 peers->flags |= PEERS_F_DONOTSTOP;
Emeric Brun2b920a12010-09-23 18:30:22 +02003083
Emeric Brun1efabf12021-04-22 18:20:37 +02003084 /* disconnect all connected peers to process a local sync
3085 * this must be done only the first time we are switching
3086 * in stopping state
Emeric Brun80527f52017-06-19 17:46:37 +02003087 */
Emeric Brun1efabf12021-04-22 18:20:37 +02003088 for (ps = peers->remote; ps; ps = ps->next) {
3089 /* we're killing a connection, we must apply a random delay before
3090 * retrying otherwise the other end will do the same and we can loop
3091 * for a while.
3092 */
3093 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
3094 if (ps->appctx) {
3095 peer_session_forceshutdown(ps);
3096 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003097 }
3098 }
3099 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003100
Emeric Brunb3971ab2015-05-12 18:49:09 +02003101 ps = peers->local;
Emeric Brun2b920a12010-09-23 18:30:22 +02003102 if (ps->flags & PEER_F_TEACH_COMPLETE) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02003103 if (peers->flags & PEERS_F_DONOTSTOP) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003104 /* resync of new process was complete, current process can die now */
Olivier Houcharded879892019-03-08 18:53:43 +01003105 _HA_ATOMIC_SUB(&jobs, 1);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003106 peers->flags &= ~PEERS_F_DONOTSTOP;
3107 for (st = ps->tables; st ; st = st->next)
Emeric Brun167b7832021-04-23 17:02:22 +02003108 _HA_ATOMIC_SUB(&st->table->refcnt, 1);
Emeric Brun2b920a12010-09-23 18:30:22 +02003109 }
3110 }
Willy Tarreau9df94c22016-10-31 18:42:52 +01003111 else if (!ps->appctx) {
3112 /* If there's no active peer connection */
Emeric Brun2b920a12010-09-23 18:30:22 +02003113 if (ps->statuscode == 0 ||
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003114 ps->statuscode == PEER_SESS_SC_SUCCESSCODE ||
3115 ps->statuscode == PEER_SESS_SC_CONNECTEDCODE ||
3116 ps->statuscode == PEER_SESS_SC_TRYAGAIN) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003117 /* connection never tried
Willy Tarreau9df94c22016-10-31 18:42:52 +01003118 * or previous peer connection was successfully established
3119 * or previous tcp connect succeeded but init state incomplete
Emeric Brun2b920a12010-09-23 18:30:22 +02003120 * or during previous connect, peer replies a try again statuscode */
3121
Emeric Brun1efabf12021-04-22 18:20:37 +02003122 /* connect to the local peer if we must push a local sync */
3123 if (peers->flags & PEERS_F_DONOTSTOP) {
3124 peer_session_create(peers, ps);
3125 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003126 }
3127 else {
3128 /* Other error cases */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003129 if (peers->flags & PEERS_F_DONOTSTOP) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003130 /* unable to resync new process, current process can die now */
Olivier Houcharded879892019-03-08 18:53:43 +01003131 _HA_ATOMIC_SUB(&jobs, 1);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003132 peers->flags &= ~PEERS_F_DONOTSTOP;
3133 for (st = ps->tables; st ; st = st->next)
Emeric Brun167b7832021-04-23 17:02:22 +02003134 _HA_ATOMIC_SUB(&st->table->refcnt, 1);
Emeric Brun2b920a12010-09-23 18:30:22 +02003135 }
3136 }
3137 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003138 else if (ps->statuscode == PEER_SESS_SC_SUCCESSCODE ) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01003139 /* current peer connection is active and established
3140 * wake up all peer handlers to push remaining local updates */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003141 for (st = ps->tables; st ; st = st->next) {
Emeric Brund9e4ee62021-04-28 11:48:15 +02003142 if (st->last_pushed != st->table->localupdate) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02003143 appctx_wakeup(ps->appctx);
3144 break;
3145 }
3146 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003147 }
3148 } /* stopping */
Emeric Brun80527f52017-06-19 17:46:37 +02003149
3150 /* Release lock for all peers of the section */
3151 for (ps = peers->remote; ps; ps = ps->next)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003152 HA_SPIN_UNLOCK(PEER_LOCK, &ps->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003153
Emeric Brun2b920a12010-09-23 18:30:22 +02003154 /* Wakeup for re-connect */
3155 return task;
3156}
3157
Emeric Brunb3971ab2015-05-12 18:49:09 +02003158
Emeric Brun2b920a12010-09-23 18:30:22 +02003159/*
Willy Tarreaud9443442018-10-15 11:18:03 +02003160 * returns 0 in case of error.
Emeric Brun2b920a12010-09-23 18:30:22 +02003161 */
Willy Tarreaud9443442018-10-15 11:18:03 +02003162int peers_init_sync(struct peers *peers)
Emeric Brun2b920a12010-09-23 18:30:22 +02003163{
Emeric Brun2b920a12010-09-23 18:30:22 +02003164 struct peer * curpeer;
Emeric Brun2b920a12010-09-23 18:30:22 +02003165
Emeric Brun2b920a12010-09-23 18:30:22 +02003166 for (curpeer = peers->remote; curpeer; curpeer = curpeer->next) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003167 peers->peers_fe->maxconn += 3;
3168 }
3169
Emeric Brunc60def82017-09-27 14:59:38 +02003170 peers->sync_task = task_new(MAX_THREADS_MASK);
Willy Tarreaud9443442018-10-15 11:18:03 +02003171 if (!peers->sync_task)
3172 return 0;
3173
Emeric Brunb3971ab2015-05-12 18:49:09 +02003174 peers->sync_task->process = process_peer_sync;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003175 peers->sync_task->context = (void *)peers;
3176 peers->sighandler = signal_register_task(0, peers->sync_task, 0);
3177 task_wakeup(peers->sync_task, TASK_WOKEN_INIT);
Willy Tarreaud9443442018-10-15 11:18:03 +02003178 return 1;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003179}
3180
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003181/*
3182 * Allocate a cache a dictionary entries used upon transmission.
3183 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003184static struct dcache_tx *new_dcache_tx(size_t max_entries)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003185{
3186 struct dcache_tx *d;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003187 struct ebpt_node *entries;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003188
3189 d = malloc(sizeof *d);
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003190 entries = calloc(max_entries, sizeof *entries);
3191 if (!d || !entries)
3192 goto err;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003193
3194 d->lru_key = 0;
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003195 d->prev_lookup = NULL;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003196 d->cached_entries = EB_ROOT_UNIQUE;
3197 d->entries = entries;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003198
3199 return d;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003200
3201 err:
3202 free(d);
3203 free(entries);
3204 return NULL;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003205}
3206
3207/*
3208 * Allocate a cache of dictionary entries with <name> as name and <max_entries>
3209 * as maximum of entries.
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05003210 * Return the dictionary cache if succeeded, NULL if not.
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003211 * Must be deallocated calling free_dcache().
3212 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003213static struct dcache *new_dcache(size_t max_entries)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003214{
3215 struct dcache_tx *dc_tx;
3216 struct dcache *dc;
3217 struct dcache_rx *dc_rx;
3218
3219 dc = calloc(1, sizeof *dc);
3220 dc_tx = new_dcache_tx(max_entries);
3221 dc_rx = calloc(max_entries, sizeof *dc_rx);
3222 if (!dc || !dc_tx || !dc_rx)
3223 goto err;
3224
3225 dc->tx = dc_tx;
3226 dc->rx = dc_rx;
3227 dc->max_entries = max_entries;
3228
3229 return dc;
3230
3231 err:
3232 free(dc);
3233 free(dc_tx);
3234 free(dc_rx);
3235 return NULL;
3236}
3237
3238/*
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003239 * Look for the dictionary entry with the value of <i> in <d> cache of dictionary
3240 * entries used upon transmission.
3241 * Return the entry if found, NULL if not.
3242 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003243static struct ebpt_node *dcache_tx_lookup_value(struct dcache_tx *d,
3244 struct dcache_tx_entry *i)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003245{
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003246 return ebpt_lookup(&d->cached_entries, i->entry.key);
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003247}
3248
3249/*
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003250 * Flush <dc> cache.
3251 * Always succeeds.
3252 */
3253static inline void flush_dcache(struct peer *peer)
3254{
3255 int i;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02003256 struct dcache *dc = peer->dcache;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003257
Frédéric Lécaille9650ee92020-11-12 21:01:54 +01003258 for (i = 0; i < dc->max_entries; i++) {
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003259 ebpt_delete(&dc->tx->entries[i]);
Frédéric Lécaille9650ee92020-11-12 21:01:54 +01003260 dc->tx->entries[i].key = NULL;
3261 }
3262 dc->tx->prev_lookup = NULL;
3263 dc->tx->lru_key = 0;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003264
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003265 memset(dc->rx, 0, dc->max_entries * sizeof *dc->rx);
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003266}
3267
3268/*
3269 * Insert a dictionary entry in <dc> cache part used upon transmission (->tx)
3270 * with information provided by <i> dictionary cache entry (especially the value
3271 * to be inserted if not already). Return <i> if already present in the cache
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003272 * or something different of <i> if not.
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003273 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003274static struct ebpt_node *dcache_tx_insert(struct dcache *dc, struct dcache_tx_entry *i)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003275{
3276 struct dcache_tx *dc_tx;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003277 struct ebpt_node *o;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003278
3279 dc_tx = dc->tx;
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003280
3281 if (dc_tx->prev_lookup && dc_tx->prev_lookup->key == i->entry.key) {
3282 o = dc_tx->prev_lookup;
3283 } else {
3284 o = dcache_tx_lookup_value(dc_tx, i);
3285 if (o) {
3286 /* Save it */
3287 dc_tx->prev_lookup = o;
3288 }
3289 }
3290
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003291 if (o) {
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003292 /* Copy the ID. */
3293 i->id = o - dc->tx->entries;
3294 return &i->entry;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003295 }
3296
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003297 /* The new entry to put in cache */
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003298 dc_tx->prev_lookup = o = &dc_tx->entries[dc_tx->lru_key];
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003299
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003300 ebpt_delete(o);
3301 o->key = i->entry.key;
3302 ebpt_insert(&dc_tx->cached_entries, o);
3303 i->id = dc_tx->lru_key;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003304
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003305 /* Update the index for the next entry to put in cache */
3306 dc_tx->lru_key = (dc_tx->lru_key + 1) & (dc->max_entries - 1);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003307
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003308 return o;
3309}
Emeric Brunb3971ab2015-05-12 18:49:09 +02003310
3311/*
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02003312 * Allocate a dictionary cache for each peer of <peers> section.
3313 * Return 1 if succeeded, 0 if not.
3314 */
3315int peers_alloc_dcache(struct peers *peers)
3316{
3317 struct peer *p;
3318
3319 for (p = peers->remote; p; p = p->next) {
3320 p->dcache = new_dcache(PEER_STKT_CACHE_MAX_ENTRIES);
3321 if (!p->dcache)
3322 return 0;
3323 }
3324
3325 return 1;
3326}
3327
3328/*
Emeric Brunb3971ab2015-05-12 18:49:09 +02003329 * Function used to register a table for sync on a group of peers
3330 *
3331 */
3332void peers_register_table(struct peers *peers, struct stktable *table)
3333{
3334 struct shared_table *st;
3335 struct peer * curpeer;
3336 int id = 0;
3337
3338 for (curpeer = peers->remote; curpeer; curpeer = curpeer->next) {
Vincent Bernat02779b62016-04-03 13:48:43 +02003339 st = calloc(1,sizeof(*st));
Emeric Brunb3971ab2015-05-12 18:49:09 +02003340 st->table = table;
3341 st->next = curpeer->tables;
3342 if (curpeer->tables)
3343 id = curpeer->tables->local_id;
3344 st->local_id = id + 1;
3345
Emeric Brun167b7832021-04-23 17:02:22 +02003346 /* If peer is local we inc table
3347 * refcnt to protect against flush
3348 * until this process pushed all
3349 * table content to the new one
3350 */
3351 if (curpeer->local)
3352 _HA_ATOMIC_ADD(&st->table->refcnt, 1);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003353 curpeer->tables = st;
3354 }
3355
3356 table->sync_task = peers->sync_task;
Emeric Brun2b920a12010-09-23 18:30:22 +02003357}
3358
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003359/*
3360 * Parse the "show peers" command arguments.
3361 * Returns 0 if succeeded, 1 if not with the ->msg of the appctx set as
3362 * error message.
3363 */
3364static int cli_parse_show_peers(char **args, char *payload, struct appctx *appctx, void *private)
3365{
3366 appctx->ctx.cfgpeers.target = NULL;
3367
3368 if (*args[2]) {
3369 struct peers *p;
3370
3371 for (p = cfg_peers; p; p = p->next) {
3372 if (!strcmp(p->id, args[2])) {
3373 appctx->ctx.cfgpeers.target = p;
3374 break;
3375 }
3376 }
3377
Willy Tarreau9d008692019-08-09 11:21:01 +02003378 if (!p)
3379 return cli_err(appctx, "No such peers\n");
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003380 }
3381
3382 return 0;
3383}
3384
3385/*
3386 * This function dumps the peer state information of <peers> "peers" section.
3387 * Returns 0 if the output buffer is full and needs to be called again, non-zero if not.
3388 * Dedicated to be called by cli_io_handler_show_peers() cli I/O handler.
3389 */
3390static int peers_dump_head(struct buffer *msg, struct stream_interface *si, struct peers *peers)
3391{
3392 struct tm tm;
3393
3394 get_localtime(peers->last_change, &tm);
Willy Tarreau1ad64ac2020-09-24 08:48:08 +02003395 chunk_appendf(msg, "%p: [%02d/%s/%04d:%02d:%02d:%02d] id=%s disabled=%d flags=0x%x resync_timeout=%s task_calls=%u\n",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003396 peers,
3397 tm.tm_mday, monthname[tm.tm_mon], tm.tm_year+1900,
3398 tm.tm_hour, tm.tm_min, tm.tm_sec,
Willy Tarreau1ad64ac2020-09-24 08:48:08 +02003399 peers->id, peers->disabled, peers->flags,
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003400 peers->resync_timeout ?
3401 tick_is_expired(peers->resync_timeout, now_ms) ? "<PAST>" :
3402 human_time(TICKS_TO_MS(peers->resync_timeout - now_ms),
Emeric Brun0bbec0f2019-04-18 11:39:43 +02003403 TICKS_TO_MS(1000)) : "<NEVER>",
3404 peers->sync_task ? peers->sync_task->calls : 0);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003405
3406 if (ci_putchk(si_ic(si), msg) == -1) {
3407 si_rx_room_blk(si);
3408 return 0;
3409 }
3410
3411 return 1;
3412}
3413
3414/*
3415 * This function dumps <peer> state information.
3416 * Returns 0 if the output buffer is full and needs to be called again, non-zero
3417 * if not. Dedicated to be called by cli_io_handler_show_peers() cli I/O handler.
3418 */
3419static int peers_dump_peer(struct buffer *msg, struct stream_interface *si, struct peer *peer)
3420{
3421 struct connection *conn;
3422 char pn[INET6_ADDRSTRLEN];
3423 struct stream_interface *peer_si;
3424 struct stream *peer_s;
3425 struct appctx *appctx;
3426 struct shared_table *st;
3427
3428 addr_to_str(&peer->addr, pn, sizeof pn);
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003429 chunk_appendf(msg, " %p: id=%s(%s,%s) addr=%s:%d last_status=%s",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003430 peer, peer->id,
3431 peer->local ? "local" : "remote",
Frédéric Lécaillee7e2b212020-10-05 12:33:07 +02003432 peer->appctx ? "active" : "inactive",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003433 pn, get_host_port(&peer->addr),
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003434 statuscode_str(peer->statuscode));
3435
3436 chunk_appendf(msg, " last_hdshk=%s\n",
3437 peer->last_hdshk ? human_time(TICKS_TO_MS(now_ms - peer->last_hdshk),
3438 TICKS_TO_MS(1000)) : "<NEVER>");
3439
3440 chunk_appendf(msg, " reconnect=%s",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003441 peer->reconnect ?
3442 tick_is_expired(peer->reconnect, now_ms) ? "<PAST>" :
3443 human_time(TICKS_TO_MS(peer->reconnect - now_ms),
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003444 TICKS_TO_MS(1000)) : "<NEVER>");
3445
3446 chunk_appendf(msg, " heartbeat=%s",
3447 peer->heartbeat ?
3448 tick_is_expired(peer->heartbeat, now_ms) ? "<PAST>" :
3449 human_time(TICKS_TO_MS(peer->heartbeat - now_ms),
3450 TICKS_TO_MS(1000)) : "<NEVER>");
3451
3452 chunk_appendf(msg, " confirm=%u tx_hbt=%u rx_hbt=%u no_hbt=%u new_conn=%u proto_err=%u coll=%u\n",
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01003453 peer->confirm, peer->tx_hbt, peer->rx_hbt,
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003454 peer->no_hbt, peer->new_conn, peer->proto_err, peer->coll);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003455
3456 chunk_appendf(&trash, " flags=0x%x", peer->flags);
3457
3458 appctx = peer->appctx;
3459 if (!appctx)
Frédéric Lécaille470502b2019-11-06 10:41:03 +01003460 goto table_info;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003461
Emeric Brun0bbec0f2019-04-18 11:39:43 +02003462 chunk_appendf(&trash, " appctx:%p st0=%d st1=%d task_calls=%u", appctx, appctx->st0, appctx->st1,
3463 appctx->t ? appctx->t->calls : 0);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003464
3465 peer_si = peer->appctx->owner;
3466 if (!peer_si)
Frédéric Lécaille470502b2019-11-06 10:41:03 +01003467 goto table_info;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003468
3469 peer_s = si_strm(peer_si);
3470 if (!peer_s)
Frédéric Lécaille470502b2019-11-06 10:41:03 +01003471 goto table_info;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003472
3473 chunk_appendf(&trash, " state=%s", si_state_str(si_opposite(peer_si)->state));
3474
3475 conn = objt_conn(strm_orig(peer_s));
3476 if (conn)
3477 chunk_appendf(&trash, "\n xprt=%s", conn_get_xprt_name(conn));
3478
Willy Tarreau3ca14902019-07-17 14:53:15 +02003479 switch (conn && conn_get_src(conn) ? addr_to_str(conn->src, pn, sizeof(pn)) : AF_UNSPEC) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003480 case AF_INET:
3481 case AF_INET6:
Willy Tarreau3ca14902019-07-17 14:53:15 +02003482 chunk_appendf(&trash, " src=%s:%d", pn, get_host_port(conn->src));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003483 break;
3484 case AF_UNIX:
3485 chunk_appendf(&trash, " src=unix:%d", strm_li(peer_s)->luid);
3486 break;
3487 }
3488
Willy Tarreau3ca14902019-07-17 14:53:15 +02003489 switch (conn && conn_get_dst(conn) ? addr_to_str(conn->dst, pn, sizeof(pn)) : AF_UNSPEC) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003490 case AF_INET:
3491 case AF_INET6:
Willy Tarreau3ca14902019-07-17 14:53:15 +02003492 chunk_appendf(&trash, " addr=%s:%d", pn, get_host_port(conn->dst));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003493 break;
3494 case AF_UNIX:
3495 chunk_appendf(&trash, " addr=unix:%d", strm_li(peer_s)->luid);
3496 break;
3497 }
3498
Frédéric Lécaille470502b2019-11-06 10:41:03 +01003499 table_info:
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003500 if (peer->remote_table)
3501 chunk_appendf(&trash, "\n remote_table:%p id=%s local_id=%d remote_id=%d",
3502 peer->remote_table,
3503 peer->remote_table->table->id,
3504 peer->remote_table->local_id,
3505 peer->remote_table->remote_id);
3506
3507 if (peer->last_local_table)
3508 chunk_appendf(&trash, "\n last_local_table:%p id=%s local_id=%d remote_id=%d",
3509 peer->last_local_table,
3510 peer->last_local_table->table->id,
3511 peer->last_local_table->local_id,
3512 peer->last_local_table->remote_id);
3513
3514 if (peer->tables) {
3515 chunk_appendf(&trash, "\n shared tables:");
3516 for (st = peer->tables; st; st = st->next) {
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003517 int i, count;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003518 struct stktable *t;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003519 struct dcache *dcache;
3520
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003521 t = st->table;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003522 dcache = peer->dcache;
3523
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003524 chunk_appendf(&trash, "\n %p local_id=%d remote_id=%d "
3525 "flags=0x%x remote_data=0x%llx",
3526 st, st->local_id, st->remote_id,
3527 st->flags, (unsigned long long)st->remote_data);
3528 chunk_appendf(&trash, "\n last_acked=%u last_pushed=%u last_get=%u"
3529 " teaching_origin=%u update=%u",
3530 st->last_acked, st->last_pushed, st->last_get,
3531 st->teaching_origin, st->update);
3532 chunk_appendf(&trash, "\n table:%p id=%s update=%u localupdate=%u"
Emeric Brun167b7832021-04-23 17:02:22 +02003533 " commitupdate=%u refcnt=%u",
3534 t, t->id, t->update, t->localupdate, t->commitupdate, t->refcnt);
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003535 chunk_appendf(&trash, "\n TX dictionary cache:");
3536 count = 0;
3537 for (i = 0; i < dcache->max_entries; i++) {
3538 struct ebpt_node *node;
3539 struct dict_entry *de;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003540
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003541 node = &dcache->tx->entries[i];
3542 if (!node->key)
3543 break;
3544
3545 if (!count++)
3546 chunk_appendf(&trash, "\n ");
3547 de = node->key;
3548 chunk_appendf(&trash, " %3u -> %s", i, (char *)de->value.key);
3549 count &= 0x3;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003550 }
3551 chunk_appendf(&trash, "\n RX dictionary cache:");
3552 count = 0;
3553 for (i = 0; i < dcache->max_entries; i++) {
3554 if (!count++)
3555 chunk_appendf(&trash, "\n ");
3556 chunk_appendf(&trash, " %3u -> %s", i,
3557 dcache->rx[i].de ?
3558 (char *)dcache->rx[i].de->value.key : "-");
3559 count &= 0x3;
3560 }
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003561 }
3562 }
3563
3564 end:
3565 chunk_appendf(&trash, "\n");
3566 if (ci_putchk(si_ic(si), msg) == -1) {
3567 si_rx_room_blk(si);
3568 return 0;
3569 }
3570
3571 return 1;
3572}
3573
3574/*
3575 * This function dumps all the peers of "peers" section.
3576 * Returns 0 if the output buffer is full and needs to be called
3577 * again, non-zero if not. It proceeds in an isolated thread, so
3578 * there is no thread safety issue here.
3579 */
3580static int cli_io_handler_show_peers(struct appctx *appctx)
3581{
3582 int show_all;
3583 int ret = 0, first_peers = 1;
3584 struct stream_interface *si = appctx->owner;
3585
3586 thread_isolate();
3587
3588 show_all = !appctx->ctx.cfgpeers.target;
3589
3590 chunk_reset(&trash);
3591
3592 while (appctx->st2 != STAT_ST_FIN) {
3593 switch (appctx->st2) {
3594 case STAT_ST_INIT:
3595 if (show_all)
3596 appctx->ctx.cfgpeers.peers = cfg_peers;
3597 else
3598 appctx->ctx.cfgpeers.peers = appctx->ctx.cfgpeers.target;
3599
3600 appctx->st2 = STAT_ST_LIST;
3601 /* fall through */
3602
3603 case STAT_ST_LIST:
3604 if (!appctx->ctx.cfgpeers.peers) {
3605 /* No more peers list. */
3606 appctx->st2 = STAT_ST_END;
3607 }
3608 else {
3609 if (!first_peers)
3610 chunk_appendf(&trash, "\n");
3611 else
3612 first_peers = 0;
3613 if (!peers_dump_head(&trash, si, appctx->ctx.cfgpeers.peers))
3614 goto out;
3615
3616 appctx->ctx.cfgpeers.peer = appctx->ctx.cfgpeers.peers->remote;
3617 appctx->ctx.cfgpeers.peers = appctx->ctx.cfgpeers.peers->next;
3618 appctx->st2 = STAT_ST_INFO;
3619 }
3620 break;
3621
3622 case STAT_ST_INFO:
3623 if (!appctx->ctx.cfgpeers.peer) {
3624 /* End of peer list */
3625 if (show_all)
3626 appctx->st2 = STAT_ST_LIST;
3627 else
3628 appctx->st2 = STAT_ST_END;
3629 }
3630 else {
3631 if (!peers_dump_peer(&trash, si, appctx->ctx.cfgpeers.peer))
3632 goto out;
3633
3634 appctx->ctx.cfgpeers.peer = appctx->ctx.cfgpeers.peer->next;
3635 }
3636 break;
3637
3638 case STAT_ST_END:
3639 appctx->st2 = STAT_ST_FIN;
3640 break;
3641 }
3642 }
3643 ret = 1;
3644 out:
3645 thread_release();
3646 return ret;
3647}
3648
3649/*
3650 * CLI keywords.
3651 */
3652static struct cli_kw_list cli_kws = {{ }, {
3653 { { "show", "peers", NULL }, "show peers [peers section]: dump some information about all the peers or this peers section", cli_parse_show_peers, cli_io_handler_show_peers, },
3654 {},
3655}};
3656
3657/* Register cli keywords */
3658INITCALL1(STG_REGISTER, cli_register_kw, &cli_kws);
3659