blob: 503a71fcca57c6e3191ae9f01ed49f88624ff1f1 [file] [log] [blame]
Emeric Brun2b920a12010-09-23 18:30:22 +02001/*
Emeric Brunb3971ab2015-05-12 18:49:09 +02002 * Peer synchro management.
Emeric Brun2b920a12010-09-23 18:30:22 +02003 *
4 * Copyright 2010 EXCELIANCE, Emeric Brun <ebrun@exceliance.fr>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
13#include <errno.h>
Emeric Brun2b920a12010-09-23 18:30:22 +020014#include <stdio.h>
15#include <stdlib.h>
16#include <string.h>
17
18#include <sys/socket.h>
19#include <sys/stat.h>
20#include <sys/types.h>
21
Willy Tarreau8db34cc2021-10-06 17:53:19 +020022#include <import/eb32tree.h>
23#include <import/ebmbtree.h>
24#include <import/ebpttree.h>
25
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020026#include <haproxy/api.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020027#include <haproxy/applet.h>
Willy Tarreau8bd146d2022-07-19 20:17:38 +020028#include <haproxy/cfgparse.h>
Willy Tarreauf1d32c42020-06-04 21:07:02 +020029#include <haproxy/channel.h>
Willy Tarreau83487a82020-06-04 20:19:54 +020030#include <haproxy/cli.h>
Willy Tarreau3afc4c42020-06-03 18:23:19 +020031#include <haproxy/dict.h>
Willy Tarreau36979d92020-06-05 17:27:29 +020032#include <haproxy/errors.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020033#include <haproxy/fd.h>
Willy Tarreau762d7a52020-06-04 11:23:07 +020034#include <haproxy/frontend.h>
Willy Tarreau6131d6a2020-06-02 16:48:09 +020035#include <haproxy/net_helper.h>
Willy Tarreau8efbdfb2020-06-04 11:29:21 +020036#include <haproxy/obj_type-t.h>
Willy Tarreau3c2a7c22020-06-04 18:38:21 +020037#include <haproxy/peers.h>
Willy Tarreaua264d962020-06-04 22:29:18 +020038#include <haproxy/proxy.h>
Willy Tarreau5edca2f2022-05-27 09:25:10 +020039#include <haproxy/sc_strm.h>
Willy Tarreau48d25b32020-06-04 18:58:52 +020040#include <haproxy/session-t.h>
Willy Tarreau3727a8a2020-06-04 17:37:26 +020041#include <haproxy/signal.h>
Willy Tarreau2eec9b52020-06-04 19:58:55 +020042#include <haproxy/stats-t.h>
Willy Tarreaucb086c62022-05-27 09:47:12 +020043#include <haproxy/stconn.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020044#include <haproxy/stick_table.h>
45#include <haproxy/stream.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020046#include <haproxy/task.h>
47#include <haproxy/thread.h>
Willy Tarreau92b4f132020-06-01 11:05:15 +020048#include <haproxy/time.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020049#include <haproxy/tools.h>
Frédéric Lécailled8659352020-11-10 16:18:03 +010050#include <haproxy/trace.h>
Emeric Brun2b920a12010-09-23 18:30:22 +020051
Emeric Brun2b920a12010-09-23 18:30:22 +020052
53/*******************************/
54/* Current peer learning state */
55/*******************************/
56
57/******************************/
Emeric Brunb3971ab2015-05-12 18:49:09 +020058/* Current peers section resync state */
Emeric Brun2b920a12010-09-23 18:30:22 +020059/******************************/
Emeric Brunccdfbae2021-04-28 12:59:35 +020060#define PEERS_F_RESYNC_LOCAL 0x00000001 /* Learn from local finished or no more needed */
61#define PEERS_F_RESYNC_REMOTE 0x00000002 /* Learn from remote finished or no more needed */
62#define PEERS_F_RESYNC_ASSIGN 0x00000004 /* A peer was assigned to learn our lesson */
63#define PEERS_F_RESYNC_PROCESS 0x00000008 /* The assigned peer was requested for resync */
64#define PEERS_F_RESYNC_LOCALTIMEOUT 0x00000010 /* Timeout waiting for a full resync from a local node */
65#define PEERS_F_RESYNC_REMOTETIMEOUT 0x00000020 /* Timeout waiting for a full resync from a remote node */
66#define PEERS_F_RESYNC_LOCALABORT 0x00000040 /* Session aborted learning from a local node */
67#define PEERS_F_RESYNC_REMOTEABORT 0x00000080 /* Session aborted learning from a remote node */
68#define PEERS_F_RESYNC_LOCALFINISHED 0x00000100 /* A local node teach us and was fully up to date */
69#define PEERS_F_RESYNC_REMOTEFINISHED 0x00000200 /* A remote node teach us and was fully up to date */
70#define PEERS_F_RESYNC_LOCALPARTIAL 0x00000400 /* A local node teach us but was partially up to date */
71#define PEERS_F_RESYNC_REMOTEPARTIAL 0x00000800 /* A remote node teach us but was partially up to date */
72#define PEERS_F_RESYNC_LOCALASSIGN 0x00001000 /* A local node was assigned for a full resync */
73#define PEERS_F_RESYNC_REMOTEASSIGN 0x00002000 /* A remote node was assigned for a full resync */
74#define PEERS_F_RESYNC_REQUESTED 0x00004000 /* A resync was explicitly requested */
75#define PEERS_F_DONOTSTOP 0x00010000 /* Main table sync task block process during soft stop
76 to push data to new process */
Emeric Brun2b920a12010-09-23 18:30:22 +020077
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010078#define PEERS_RESYNC_STATEMASK (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE)
79#define PEERS_RESYNC_FROMLOCAL 0x00000000
80#define PEERS_RESYNC_FROMREMOTE PEERS_F_RESYNC_LOCAL
81#define PEERS_RESYNC_FINISHED (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE)
Emeric Brunb3971ab2015-05-12 18:49:09 +020082
83/***********************************/
84/* Current shared table sync state */
85/***********************************/
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010086#define SHTABLE_F_TEACH_STAGE1 0x00000001 /* Teach state 1 complete */
87#define SHTABLE_F_TEACH_STAGE2 0x00000002 /* Teach state 2 complete */
Emeric Brun2b920a12010-09-23 18:30:22 +020088
89/******************************/
90/* Remote peer teaching state */
91/******************************/
Frédéric Lécailleaba44a22019-03-26 10:18:07 +010092#define PEER_F_TEACH_PROCESS 0x00000001 /* Teach a lesson to current peer */
93#define PEER_F_TEACH_FINISHED 0x00000008 /* Teach conclude, (wait for confirm) */
94#define PEER_F_TEACH_COMPLETE 0x00000010 /* All that we know already taught to current peer, used only for a local peer */
95#define PEER_F_LEARN_ASSIGN 0x00000100 /* Current peer was assigned for a lesson */
96#define PEER_F_LEARN_NOTUP2DATE 0x00000200 /* Learn from peer finished but peer is not up to date */
97#define PEER_F_ALIVE 0x20000000 /* Used to flag a peer a alive. */
98#define PEER_F_HEARTBEAT 0x40000000 /* Heartbeat message to send. */
99#define PEER_F_DWNGRD 0x80000000 /* When this flag is enabled, we must downgrade the supported version announced during peer sessions. */
Emeric Brun2b920a12010-09-23 18:30:22 +0200100
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100101#define PEER_TEACH_RESET ~(PEER_F_TEACH_PROCESS|PEER_F_TEACH_FINISHED) /* PEER_F_TEACH_COMPLETE should never be reset */
102#define PEER_LEARN_RESET ~(PEER_F_LEARN_ASSIGN|PEER_F_LEARN_NOTUP2DATE)
Emeric Brun2b920a12010-09-23 18:30:22 +0200103
Frédéric Lécaille54bff832019-03-26 10:25:20 +0100104#define PEER_RESYNC_TIMEOUT 5000 /* 5 seconds */
105#define PEER_RECONNECT_TIMEOUT 5000 /* 5 seconds */
Christopher Fauletab4b0942022-07-26 19:14:36 +0200106#define PEER_LOCAL_RECONNECT_TIMEOUT 500 /* 500ms */
Frédéric Lécaille645635d2019-02-11 17:49:39 +0100107#define PEER_HEARTBEAT_TIMEOUT 3000 /* 3 seconds */
108
Willy Tarreau8bd146d2022-07-19 20:17:38 +0200109/* default maximum of updates sent at once */
110#define PEER_DEF_MAX_UPDATES_AT_ONCE 200
111
Willy Tarreau49962b52021-02-12 16:56:22 +0100112/* flags for "show peers" */
113#define PEERS_SHOW_F_DICT 0x00000001 /* also show the contents of the dictionary */
114
Emeric Brunb3971ab2015-05-12 18:49:09 +0200115/*****************************/
116/* Sync message class */
117/*****************************/
118enum {
119 PEER_MSG_CLASS_CONTROL = 0,
120 PEER_MSG_CLASS_ERROR,
121 PEER_MSG_CLASS_STICKTABLE = 10,
122 PEER_MSG_CLASS_RESERVED = 255,
123};
124
125/*****************************/
126/* control message types */
127/*****************************/
128enum {
129 PEER_MSG_CTRL_RESYNCREQ = 0,
130 PEER_MSG_CTRL_RESYNCFINISHED,
131 PEER_MSG_CTRL_RESYNCPARTIAL,
132 PEER_MSG_CTRL_RESYNCCONFIRM,
Frédéric Lécaille645635d2019-02-11 17:49:39 +0100133 PEER_MSG_CTRL_HEARTBEAT,
Emeric Brunb3971ab2015-05-12 18:49:09 +0200134};
135
136/*****************************/
137/* error message types */
138/*****************************/
139enum {
140 PEER_MSG_ERR_PROTOCOL = 0,
141 PEER_MSG_ERR_SIZELIMIT,
142};
143
Emeric Brun530ba382020-06-02 11:17:42 +0200144/* network key types;
145 * network types were directly and mistakenly
146 * mapped on sample types, to keep backward
147 * compatiblitiy we keep those values but
148 * we now use a internal/network mapping
149 * to avoid further mistakes adding or
150 * modifying internals types
151 */
152enum {
153 PEER_KT_ANY = 0, /* any type */
154 PEER_KT_RESV1, /* UNUSED */
155 PEER_KT_SINT, /* signed 64bits integer type */
156 PEER_KT_RESV3, /* UNUSED */
157 PEER_KT_IPV4, /* ipv4 type */
158 PEER_KT_IPV6, /* ipv6 type */
159 PEER_KT_STR, /* char string type */
160 PEER_KT_BIN, /* buffer type */
161 PEER_KT_TYPES /* number of types, must always be last */
162};
163
164/* Map used to retrieve network type from internal type
165 * Note: Undeclared mapping maps entry to PEER_KT_ANY == 0
166 */
167static int peer_net_key_type[SMP_TYPES] = {
168 [SMP_T_SINT] = PEER_KT_SINT,
169 [SMP_T_IPV4] = PEER_KT_IPV4,
170 [SMP_T_IPV6] = PEER_KT_IPV6,
171 [SMP_T_STR] = PEER_KT_STR,
172 [SMP_T_BIN] = PEER_KT_BIN,
173};
174
175/* Map used to retrieve internal type from external type
176 * Note: Undeclared mapping maps entry to SMP_T_ANY == 0
177 */
178static int peer_int_key_type[PEER_KT_TYPES] = {
179 [PEER_KT_SINT] = SMP_T_SINT,
180 [PEER_KT_IPV4] = SMP_T_IPV4,
181 [PEER_KT_IPV6] = SMP_T_IPV6,
182 [PEER_KT_STR] = SMP_T_STR,
183 [PEER_KT_BIN] = SMP_T_BIN,
184};
185
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100186/*
187 * Parameters used by functions to build peer protocol messages. */
188struct peer_prep_params {
189 struct {
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100190 struct peer *peer;
191 } hello;
192 struct {
193 unsigned int st1;
194 } error_status;
195 struct {
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100196 struct stksess *stksess;
197 struct shared_table *shared_table;
198 unsigned int updateid;
199 int use_identifier;
200 int use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200201 struct peer *peer;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100202 } updt;
203 struct {
204 struct shared_table *shared_table;
205 } swtch;
206 struct {
207 struct shared_table *shared_table;
208 } ack;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100209 struct {
210 unsigned char head[2];
211 } control;
212 struct {
213 unsigned char head[2];
214 } error;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100215};
Emeric Brunb3971ab2015-05-12 18:49:09 +0200216
217/*******************************/
218/* stick table sync mesg types */
219/* Note: ids >= 128 contains */
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500220/* id message contains data */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200221/*******************************/
Olivier Houchard33992262018-10-16 18:49:26 +0200222#define PEER_MSG_STKT_UPDATE 0x80
223#define PEER_MSG_STKT_INCUPDATE 0x81
224#define PEER_MSG_STKT_DEFINE 0x82
225#define PEER_MSG_STKT_SWITCH 0x83
226#define PEER_MSG_STKT_ACK 0x84
227#define PEER_MSG_STKT_UPDATE_TIMED 0x85
228#define PEER_MSG_STKT_INCUPDATE_TIMED 0x86
Frédéric Lécaille36fb77e2019-06-04 08:28:19 +0200229/* All the stick-table message identifiers abova have the #7 bit set */
230#define PEER_MSG_STKT_BIT 7
231#define PEER_MSG_STKT_BIT_MASK (1 << PEER_MSG_STKT_BIT)
Emeric Brun2b920a12010-09-23 18:30:22 +0200232
Frédéric Lécaille39143342019-05-24 14:32:27 +0200233/* The maximum length of an encoded data length. */
234#define PEER_MSG_ENC_LENGTH_MAXLEN 5
235
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200236/* Minimum 64-bits value encoded with 2 bytes */
237#define PEER_ENC_2BYTES_MIN 0xf0 /* 0xf0 (or 240) */
238/* 3 bytes */
239#define PEER_ENC_3BYTES_MIN ((1ULL << 11) | PEER_ENC_2BYTES_MIN) /* 0x8f0 (or 2288) */
240/* 4 bytes */
241#define PEER_ENC_4BYTES_MIN ((1ULL << 18) | PEER_ENC_3BYTES_MIN) /* 0x408f0 (or 264432) */
242/* 5 bytes */
243#define PEER_ENC_5BYTES_MIN ((1ULL << 25) | PEER_ENC_4BYTES_MIN) /* 0x20408f0 (or 33818864) */
244/* 6 bytes */
245#define PEER_ENC_6BYTES_MIN ((1ULL << 32) | PEER_ENC_5BYTES_MIN) /* 0x1020408f0 (or 4328786160) */
246/* 7 bytes */
247#define PEER_ENC_7BYTES_MIN ((1ULL << 39) | PEER_ENC_6BYTES_MIN) /* 0x81020408f0 (or 554084600048) */
248/* 8 bytes */
249#define PEER_ENC_8BYTES_MIN ((1ULL << 46) | PEER_ENC_7BYTES_MIN) /* 0x4081020408f0 (or 70922828777712) */
250/* 9 bytes */
251#define PEER_ENC_9BYTES_MIN ((1ULL << 53) | PEER_ENC_8BYTES_MIN) /* 0x204081020408f0 (or 9078122083518704) */
252/* 10 bytes */
253#define PEER_ENC_10BYTES_MIN ((1ULL << 60) | PEER_ENC_9BYTES_MIN) /* 0x10204081020408f0 (or 1161999626690365680) */
254
255/* #7 bit used to detect the last byte to be encoded */
256#define PEER_ENC_STOP_BIT 7
257/* The byte minimum value with #7 bit set */
258#define PEER_ENC_STOP_BYTE (1 << PEER_ENC_STOP_BIT)
259/* The left most number of bits set for PEER_ENC_2BYTES_MIN */
260#define PEER_ENC_2BYTES_MIN_BITS 4
261
Frédéric Lécaille39143342019-05-24 14:32:27 +0200262#define PEER_MSG_HEADER_LEN 2
263
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200264#define PEER_STKT_CACHE_MAX_ENTRIES 128
265
Emeric Brun2b920a12010-09-23 18:30:22 +0200266/**********************************/
267/* Peer Session IO handler states */
268/**********************************/
269
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100270enum {
271 PEER_SESS_ST_ACCEPT = 0, /* Initial state for session create by an accept, must be zero! */
272 PEER_SESS_ST_GETVERSION, /* Validate supported protocol version */
273 PEER_SESS_ST_GETHOST, /* Validate host ID correspond to local host id */
274 PEER_SESS_ST_GETPEER, /* Validate peer ID correspond to a known remote peer id */
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100275 /* after this point, data were possibly exchanged */
276 PEER_SESS_ST_SENDSUCCESS, /* Send ret code 200 (success) and wait for message */
277 PEER_SESS_ST_CONNECT, /* Initial state for session create on a connect, push presentation into buffer */
278 PEER_SESS_ST_GETSTATUS, /* Wait for the welcome message */
279 PEER_SESS_ST_WAITMSG, /* Wait for data messages */
280 PEER_SESS_ST_EXIT, /* Exit with status code */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200281 PEER_SESS_ST_ERRPROTO, /* Send error proto message before exit */
282 PEER_SESS_ST_ERRSIZE, /* Send error size message before exit */
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100283 PEER_SESS_ST_END, /* Killed session */
284};
Emeric Brun2b920a12010-09-23 18:30:22 +0200285
Willy Tarreaue4d927a2013-12-01 12:47:35 +0100286/***************************************************/
287/* Peer Session status code - part of the protocol */
288/***************************************************/
Emeric Brun2b920a12010-09-23 18:30:22 +0200289
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100290#define PEER_SESS_SC_CONNECTCODE 100 /* connect in progress */
291#define PEER_SESS_SC_CONNECTEDCODE 110 /* tcp connect success */
Emeric Brun2b920a12010-09-23 18:30:22 +0200292
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100293#define PEER_SESS_SC_SUCCESSCODE 200 /* accept or connect successful */
Emeric Brun2b920a12010-09-23 18:30:22 +0200294
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100295#define PEER_SESS_SC_TRYAGAIN 300 /* try again later */
Emeric Brun2b920a12010-09-23 18:30:22 +0200296
Frédéric Lécailleaba44a22019-03-26 10:18:07 +0100297#define PEER_SESS_SC_ERRPROTO 501 /* error protocol */
298#define PEER_SESS_SC_ERRVERSION 502 /* unknown protocol version */
299#define PEER_SESS_SC_ERRHOST 503 /* bad host name */
300#define PEER_SESS_SC_ERRPEER 504 /* unknown peer */
Emeric Brun2b920a12010-09-23 18:30:22 +0200301
302#define PEER_SESSION_PROTO_NAME "HAProxyS"
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200303#define PEER_MAJOR_VER 2
304#define PEER_MINOR_VER 1
305#define PEER_DWNGRD_MINOR_VER 0
Emeric Brun2b920a12010-09-23 18:30:22 +0200306
Willy Tarreau6254a922019-01-29 17:45:23 +0100307static size_t proto_len = sizeof(PEER_SESSION_PROTO_NAME) - 1;
Frédéric Lécailleed2b4a62017-07-13 09:07:09 +0200308struct peers *cfg_peers = NULL;
Willy Tarreau8bd146d2022-07-19 20:17:38 +0200309static int peers_max_updates_at_once = PEER_DEF_MAX_UPDATES_AT_ONCE;
Emeric Brun9ef2ad72019-04-02 17:22:01 +0200310static void peer_session_forceshutdown(struct peer *peer);
Emeric Brun2b920a12010-09-23 18:30:22 +0200311
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200312static struct ebpt_node *dcache_tx_insert(struct dcache *dc,
313 struct dcache_tx_entry *i);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200314static inline void flush_dcache(struct peer *peer);
315
Frédéric Lécailled8659352020-11-10 16:18:03 +0100316/* trace source and events */
317static void peers_trace(enum trace_level level, uint64_t mask,
318 const struct trace_source *src,
319 const struct ist where, const struct ist func,
320 const void *a1, const void *a2, const void *a3, const void *a4);
321
322static const struct trace_event peers_trace_events[] = {
323#define PEERS_EV_UPDTMSG (1 << 0)
324 { .mask = PEERS_EV_UPDTMSG, .name = "updtmsg", .desc = "update message received" },
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100325#define PEERS_EV_ACKMSG (1 << 1)
326 { .mask = PEERS_EV_ACKMSG, .name = "ackmsg", .desc = "ack message received" },
327#define PEERS_EV_SWTCMSG (1 << 2)
328 { .mask = PEERS_EV_SWTCMSG, .name = "swtcmsg", .desc = "switch message received" },
329#define PEERS_EV_DEFMSG (1 << 3)
330 { .mask = PEERS_EV_DEFMSG, .name = "defmsg", .desc = "definition message received" },
331#define PEERS_EV_CTRLMSG (1 << 4)
332 { .mask = PEERS_EV_CTRLMSG, .name = "ctrlmsg", .desc = "control message sent/received" },
333#define PEERS_EV_SESSREL (1 << 5)
334 { .mask = PEERS_EV_SESSREL, .name = "sessrl", .desc = "peer session releasing" },
335#define PEERS_EV_PROTOERR (1 << 6)
336 { .mask = PEERS_EV_PROTOERR, .name = "protoerr", .desc = "protocol error" },
Frédéric Lécailled8659352020-11-10 16:18:03 +0100337};
338
339static const struct name_desc peers_trace_lockon_args[4] = {
340 /* arg1 */ { /* already used by the connection */ },
341 /* arg2 */ { .name="peers", .desc="Peers protocol" },
342 /* arg3 */ { },
343 /* arg4 */ { }
344};
345
346static const struct name_desc peers_trace_decoding[] = {
347#define PEERS_VERB_CLEAN 1
348 { .name="clean", .desc="only user-friendly stuff, generally suitable for level \"user\"" },
349 { /* end */ }
350};
351
352
353struct trace_source trace_peers = {
354 .name = IST("peers"),
355 .desc = "Peers protocol",
356 .arg_def = TRC_ARG1_CONN, /* TRACE()'s first argument is always a connection */
357 .default_cb = peers_trace,
358 .known_events = peers_trace_events,
359 .lockon_args = peers_trace_lockon_args,
360 .decoding = peers_trace_decoding,
361 .report_events = ~0, /* report everything by default */
362};
363
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100364/* Return peer control message types as strings (only for debugging purpose). */
365static inline char *ctrl_msg_type_str(unsigned int type)
366{
367 switch (type) {
368 case PEER_MSG_CTRL_RESYNCREQ:
369 return "RESYNCREQ";
370 case PEER_MSG_CTRL_RESYNCFINISHED:
371 return "RESYNCFINISHED";
372 case PEER_MSG_CTRL_RESYNCPARTIAL:
373 return "RESYNCPARTIAL";
374 case PEER_MSG_CTRL_RESYNCCONFIRM:
375 return "RESYNCCONFIRM";
376 case PEER_MSG_CTRL_HEARTBEAT:
377 return "HEARTBEAT";
378 default:
379 return "???";
380 }
381}
382
Frédéric Lécailled8659352020-11-10 16:18:03 +0100383#define TRACE_SOURCE &trace_peers
384INITCALL1(STG_REGISTER, trace_register_source, TRACE_SOURCE);
385
386static void peers_trace(enum trace_level level, uint64_t mask,
387 const struct trace_source *src,
388 const struct ist where, const struct ist func,
389 const void *a1, const void *a2, const void *a3, const void *a4)
390{
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100391 if (mask & (PEERS_EV_UPDTMSG|PEERS_EV_ACKMSG|PEERS_EV_SWTCMSG)) {
Frédéric Lécailled8659352020-11-10 16:18:03 +0100392 if (a2) {
393 const struct peer *peer = a2;
394
395 chunk_appendf(&trace_buf, " peer=%s", peer->id);
396 }
397 if (a3) {
398 const char *p = a3;
399
400 chunk_appendf(&trace_buf, " @%p", p);
401 }
402 if (a4) {
403 const size_t *val = a4;
404
405 chunk_appendf(&trace_buf, " %llu", (unsigned long long)*val);
406 }
407 }
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100408
409 if (mask & PEERS_EV_DEFMSG) {
410 if (a2) {
411 const struct peer *peer = a2;
412
413 chunk_appendf(&trace_buf, " peer=%s", peer->id);
414 }
415 if (a3) {
416 const char *p = a3;
417
418 chunk_appendf(&trace_buf, " @%p", p);
419 }
420 if (a4) {
421 const int *val = a4;
422
423 chunk_appendf(&trace_buf, " %d", *val);
424 }
425 }
426
427 if (mask & PEERS_EV_CTRLMSG) {
428 if (a2) {
429 const unsigned char *ctrl_msg_type = a2;
430
431 chunk_appendf(&trace_buf, " %s", ctrl_msg_type_str(*ctrl_msg_type));
432
433 }
434 if (a3) {
435 const char *local_peer = a3;
436
437 chunk_appendf(&trace_buf, " %s", local_peer);
438 }
439
440 if (a4) {
441 const char *remote_peer = a4;
442
443 chunk_appendf(&trace_buf, " -> %s", remote_peer);
444 }
445 }
446
447 if (mask & (PEERS_EV_SESSREL|PEERS_EV_PROTOERR)) {
448 if (a2) {
449 const struct peer *peer = a2;
450 struct peers *peers = NULL;
451
Christopher Faulet387e7972022-05-12 14:47:52 +0200452 if (peer->appctx)
453 peers = peer->peers;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100454
455 if (peers)
456 chunk_appendf(&trace_buf, " %s", peers->local->id);
Christopher Fauletd9e6b352021-11-15 09:40:57 +0100457 chunk_appendf(&trace_buf, " -> %s", peer->id);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +0100458 }
459
460 if (a3) {
461 const int *prev_state = a3;
462
463 chunk_appendf(&trace_buf, " prev_state=%d\n", *prev_state);
464 }
465 }
Frédéric Lécailled8659352020-11-10 16:18:03 +0100466}
467
Frédéric Lécaille95679dc2019-04-15 10:25:27 +0200468static const char *statuscode_str(int statuscode)
469{
470 switch (statuscode) {
471 case PEER_SESS_SC_CONNECTCODE:
472 return "CONN";
473 case PEER_SESS_SC_CONNECTEDCODE:
474 return "HSHK";
475 case PEER_SESS_SC_SUCCESSCODE:
476 return "ESTA";
477 case PEER_SESS_SC_TRYAGAIN:
478 return "RETR";
479 case PEER_SESS_SC_ERRPROTO:
480 return "PROT";
481 case PEER_SESS_SC_ERRVERSION:
482 return "VERS";
483 case PEER_SESS_SC_ERRHOST:
484 return "NAME";
485 case PEER_SESS_SC_ERRPEER:
486 return "UNKN";
487 default:
488 return "NONE";
489 }
490}
491
Emeric Brun18928af2017-03-29 16:32:53 +0200492/* This function encode an uint64 to 'dynamic' length format.
493 The encoded value is written at address *str, and the
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500494 caller must assure that size after *str is large enough.
Emeric Brun18928af2017-03-29 16:32:53 +0200495 At return, the *str is set at the next Byte after then
496 encoded integer. The function returns then length of the
497 encoded integer in Bytes */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200498int intencode(uint64_t i, char **str) {
499 int idx = 0;
500 unsigned char *msg;
501
Emeric Brunb3971ab2015-05-12 18:49:09 +0200502 msg = (unsigned char *)*str;
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200503 if (i < PEER_ENC_2BYTES_MIN) {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200504 msg[0] = (unsigned char)i;
505 *str = (char *)&msg[idx+1];
506 return (idx+1);
507 }
508
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200509 msg[idx] =(unsigned char)i | PEER_ENC_2BYTES_MIN;
510 i = (i - PEER_ENC_2BYTES_MIN) >> PEER_ENC_2BYTES_MIN_BITS;
511 while (i >= PEER_ENC_STOP_BYTE) {
512 msg[++idx] = (unsigned char)i | PEER_ENC_STOP_BYTE;
513 i = (i - PEER_ENC_STOP_BYTE) >> PEER_ENC_STOP_BIT;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200514 }
515 msg[++idx] = (unsigned char)i;
516 *str = (char *)&msg[idx+1];
517 return (idx+1);
518}
519
520
Emeric Brun5ea07d92021-06-30 13:21:58 +0200521/* This function returns a decoded 64bits unsigned integer
522 * from a varint
523 *
524 * Calling:
525 * - *str must point on the first byte of the buffer to decode.
526 * - end must point on the next byte after the end of the buffer
527 * we are authorized to parse (buf + buflen)
528 *
529 * At return:
530 *
531 * On success *str will point at the byte following
532 * the fully decoded integer into the buffer. and
533 * the decoded value is returned.
534 *
535 * If end is reached before the integer was fully decoded,
536 * *str is set to NULL and the caller have to check this
537 * to know there is a decoding error. In this case
538 * the returned integer is also forced to 0
539 */
Emeric Brun18928af2017-03-29 16:32:53 +0200540uint64_t intdecode(char **str, char *end)
541{
Emeric Brunb3971ab2015-05-12 18:49:09 +0200542 unsigned char *msg;
Emeric Brun18928af2017-03-29 16:32:53 +0200543 uint64_t i;
544 int shift;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200545
546 if (!*str)
547 return 0;
548
549 msg = (unsigned char *)*str;
Emeric Brun18928af2017-03-29 16:32:53 +0200550 if (msg >= (unsigned char *)end)
551 goto fail;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200552
Emeric Brun18928af2017-03-29 16:32:53 +0200553 i = *(msg++);
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200554 if (i >= PEER_ENC_2BYTES_MIN) {
555 shift = PEER_ENC_2BYTES_MIN_BITS;
Emeric Brun18928af2017-03-29 16:32:53 +0200556 do {
557 if (msg >= (unsigned char *)end)
558 goto fail;
559 i += (uint64_t)*msg << shift;
Frédéric Lécaille32b55732019-06-03 18:29:51 +0200560 shift += PEER_ENC_STOP_BIT;
561 } while (*(msg++) >= PEER_ENC_STOP_BYTE);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200562 }
Frédéric Lécaillea8725ec2019-01-22 10:31:39 +0100563 *str = (char *)msg;
564 return i;
Emeric Brun18928af2017-03-29 16:32:53 +0200565
Frédéric Lécaillea8725ec2019-01-22 10:31:39 +0100566 fail:
567 *str = NULL;
568 return 0;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200569}
Emeric Brun2b920a12010-09-23 18:30:22 +0200570
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100571/*
572 * Build a "hello" peer protocol message.
573 * Return the number of written bytes written to build this messages if succeeded,
574 * 0 if not.
575 */
576static int peer_prepare_hellomsg(char *msg, size_t size, struct peer_prep_params *p)
577{
578 int min_ver, ret;
579 struct peer *peer;
580
581 peer = p->hello.peer;
582 min_ver = (peer->flags & PEER_F_DWNGRD) ? PEER_DWNGRD_MINOR_VER : PEER_MINOR_VER;
583 /* Prepare headers */
Willy Tarreau2645b342022-04-12 08:28:18 +0200584 ret = snprintf(msg, size, PEER_SESSION_PROTO_NAME " %d.%d\n%s\n%s %d %d\n",
585 (int)PEER_MAJOR_VER, min_ver, peer->id, localpeer, (int)getpid(), (int)1);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100586 if (ret >= size)
587 return 0;
588
589 return ret;
590}
591
592/*
593 * Build a "handshake succeeded" status message.
594 * Return the number of written bytes written to build this messages if succeeded,
595 * 0 if not.
596 */
597static int peer_prepare_status_successmsg(char *msg, size_t size, struct peer_prep_params *p)
598{
599 int ret;
600
Willy Tarreau2645b342022-04-12 08:28:18 +0200601 ret = snprintf(msg, size, "%d\n", (int)PEER_SESS_SC_SUCCESSCODE);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100602 if (ret >= size)
603 return 0;
604
605 return ret;
606}
607
608/*
609 * Build an error status message.
610 * Return the number of written bytes written to build this messages if succeeded,
611 * 0 if not.
612 */
613static int peer_prepare_status_errormsg(char *msg, size_t size, struct peer_prep_params *p)
614{
615 int ret;
616 unsigned int st1;
617
618 st1 = p->error_status.st1;
Willy Tarreaud05aa382022-11-24 15:32:20 +0100619 ret = snprintf(msg, size, "%u\n", st1);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +0100620 if (ret >= size)
621 return 0;
622
623 return ret;
624}
625
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200626/* Set the stick-table UPDATE message type byte at <msg_type> address,
627 * depending on <use_identifier> and <use_timed> boolean parameters.
628 * Always successful.
629 */
630static inline void peer_set_update_msg_type(char *msg_type, int use_identifier, int use_timed)
631{
632 if (use_timed) {
633 if (use_identifier)
634 *msg_type = PEER_MSG_STKT_UPDATE_TIMED;
635 else
636 *msg_type = PEER_MSG_STKT_INCUPDATE_TIMED;
637 }
638 else {
639 if (use_identifier)
640 *msg_type = PEER_MSG_STKT_UPDATE;
641 else
642 *msg_type = PEER_MSG_STKT_INCUPDATE;
643 }
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200644}
Emeric Brun2b920a12010-09-23 18:30:22 +0200645/*
Emeric Brunb3971ab2015-05-12 18:49:09 +0200646 * This prepare the data update message on the stick session <ts>, <st> is the considered
647 * stick table.
Joseph Herlant82b2f542018-11-15 12:19:14 -0800648 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +0200649 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
650 * check size)
Emeric Brun2b920a12010-09-23 18:30:22 +0200651 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100652static int peer_prepare_updatemsg(char *msg, size_t size, struct peer_prep_params *p)
Emeric Brun2b920a12010-09-23 18:30:22 +0200653{
654 uint32_t netinteger;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200655 unsigned short datalen;
656 char *cursor, *datamsg;
Emeric Brun94900952015-06-11 18:25:54 +0200657 unsigned int data_type;
658 void *data_ptr;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100659 struct stksess *ts;
660 struct shared_table *st;
661 unsigned int updateid;
662 int use_identifier;
663 int use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200664 struct peer *peer;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100665
666 ts = p->updt.stksess;
667 st = p->updt.shared_table;
668 updateid = p->updt.updateid;
669 use_identifier = p->updt.use_identifier;
670 use_timed = p->updt.use_timed;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200671 peer = p->updt.peer;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200672
Frédéric Lécaille0e8db972019-05-24 14:34:34 +0200673 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200674
Emeric Brun2b920a12010-09-23 18:30:22 +0200675 /* construct message */
Emeric Brunb3971ab2015-05-12 18:49:09 +0200676
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +0500677 /* check if we need to send the update identifier */
Emeric Brun819fc6f2017-06-13 19:37:32 +0200678 if (!st->last_pushed || updateid < st->last_pushed || ((updateid - st->last_pushed) != 1)) {
Emeric Bruna6a09982015-09-22 15:34:19 +0200679 use_identifier = 1;
Emeric Brun2b920a12010-09-23 18:30:22 +0200680 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200681
682 /* encode update identifier if needed */
683 if (use_identifier) {
Emeric Brun819fc6f2017-06-13 19:37:32 +0200684 netinteger = htonl(updateid);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200685 memcpy(cursor, &netinteger, sizeof(netinteger));
686 cursor += sizeof(netinteger);
Emeric Brun2b920a12010-09-23 18:30:22 +0200687 }
688
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200689 if (use_timed) {
690 netinteger = htonl(tick_remain(now_ms, ts->expire));
691 memcpy(cursor, &netinteger, sizeof(netinteger));
692 cursor += sizeof(netinteger);
693 }
694
Emeric Brunb3971ab2015-05-12 18:49:09 +0200695 /* encode the key */
Thierry FOURNIER5d24ebc2015-07-24 08:46:42 +0200696 if (st->table->type == SMP_T_STR) {
Emeric Brun2b920a12010-09-23 18:30:22 +0200697 int stlen = strlen((char *)ts->key.key);
698
Emeric Brunb3971ab2015-05-12 18:49:09 +0200699 intencode(stlen, &cursor);
700 memcpy(cursor, ts->key.key, stlen);
701 cursor += stlen;
Emeric Brun2b920a12010-09-23 18:30:22 +0200702 }
Thierry FOURNIER5d24ebc2015-07-24 08:46:42 +0200703 else if (st->table->type == SMP_T_SINT) {
Willy Tarreau6cde5d82020-02-25 09:41:22 +0100704 netinteger = htonl(read_u32(ts->key.key));
Emeric Brunb3971ab2015-05-12 18:49:09 +0200705 memcpy(cursor, &netinteger, sizeof(netinteger));
706 cursor += sizeof(netinteger);
Emeric Brun2b920a12010-09-23 18:30:22 +0200707 }
708 else {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200709 memcpy(cursor, ts->key.key, st->table->key_size);
710 cursor += st->table->key_size;
Emeric Brun2b920a12010-09-23 18:30:22 +0200711 }
712
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100713 HA_RWLOCK_RDLOCK(STK_SESS_LOCK, &ts->lock);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200714 /* encode values */
Emeric Brun94900952015-06-11 18:25:54 +0200715 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
Emeric Brunb3971ab2015-05-12 18:49:09 +0200716
Emeric Brun94900952015-06-11 18:25:54 +0200717 data_ptr = stktable_data_ptr(st->table, ts, data_type);
718 if (data_ptr) {
Emeric Brun90a9b672021-06-22 16:09:55 +0200719 /* in case of array all elements use
720 * the same std_type and they are linearly
721 * encoded.
722 */
723 if (stktable_data_types[data_type].is_array) {
724 unsigned int idx = 0;
725
726 switch (stktable_data_types[data_type].std_type) {
727 case STD_T_SINT: {
728 int data;
729
730 do {
731 data = stktable_data_cast(data_ptr, std_t_sint);
732 intencode(data, &cursor);
733
734 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, ++idx);
735 } while(data_ptr);
736 break;
737 }
738 case STD_T_UINT: {
739 unsigned int data;
740
741 do {
742 data = stktable_data_cast(data_ptr, std_t_uint);
743 intencode(data, &cursor);
744
745 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, ++idx);
746 } while(data_ptr);
747 break;
748 }
749 case STD_T_ULL: {
750 unsigned long long data;
751
752 do {
753 data = stktable_data_cast(data_ptr, std_t_ull);
754 intencode(data, &cursor);
755
756 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, ++idx);
757 } while(data_ptr);
758 break;
759 }
760 case STD_T_FRQP: {
761 struct freq_ctr *frqp;
762
763 do {
764 frqp = &stktable_data_cast(data_ptr, std_t_frqp);
765 intencode((unsigned int)(now_ms - frqp->curr_tick), &cursor);
766 intencode(frqp->curr_ctr, &cursor);
767 intencode(frqp->prev_ctr, &cursor);
768
769 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, ++idx);
770 } while(data_ptr);
771 break;
772 }
773 }
774
775 /* array elements fully encoded
776 * proceed next data_type.
777 */
778 continue;
779 }
Emeric Brun94900952015-06-11 18:25:54 +0200780 switch (stktable_data_types[data_type].std_type) {
781 case STD_T_SINT: {
782 int data;
783
784 data = stktable_data_cast(data_ptr, std_t_sint);
785 intencode(data, &cursor);
786 break;
787 }
788 case STD_T_UINT: {
789 unsigned int data;
790
791 data = stktable_data_cast(data_ptr, std_t_uint);
792 intencode(data, &cursor);
793 break;
794 }
795 case STD_T_ULL: {
796 unsigned long long data;
797
798 data = stktable_data_cast(data_ptr, std_t_ull);
799 intencode(data, &cursor);
800 break;
801 }
802 case STD_T_FRQP: {
Willy Tarreaufa1258f2021-04-10 23:00:53 +0200803 struct freq_ctr *frqp;
Emeric Brun94900952015-06-11 18:25:54 +0200804
805 frqp = &stktable_data_cast(data_ptr, std_t_frqp);
806 intencode((unsigned int)(now_ms - frqp->curr_tick), &cursor);
807 intencode(frqp->curr_ctr, &cursor);
808 intencode(frqp->prev_ctr, &cursor);
809 break;
810 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200811 case STD_T_DICT: {
812 struct dict_entry *de;
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200813 struct ebpt_node *cached_de;
Willy Tarreau237f8ae2019-06-06 16:40:43 +0200814 struct dcache_tx_entry cde = { };
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200815 char *beg, *end;
816 size_t value_len, data_len;
817 struct dcache *dc;
818
819 de = stktable_data_cast(data_ptr, std_t_dict);
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +0100820 if (!de) {
821 /* No entry */
822 intencode(0, &cursor);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200823 break;
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +0100824 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200825
826 dc = peer->dcache;
Frédéric Lécaille6c391982019-06-06 11:34:03 +0200827 cde.entry.key = de;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200828 cached_de = dcache_tx_insert(dc, &cde);
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200829 if (cached_de == &cde.entry) {
830 if (cde.id + 1 >= PEER_ENC_2BYTES_MIN)
831 break;
832 /* Encode the length of the remaining data -> 1 */
833 intencode(1, &cursor);
834 /* Encode the cache entry ID */
835 intencode(cde.id + 1, &cursor);
836 }
837 else {
838 /* Leave enough room to encode the remaining data length. */
839 end = beg = cursor + PEER_MSG_ENC_LENGTH_MAXLEN;
840 /* Encode the dictionary entry key */
841 intencode(cde.id + 1, &end);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200842 /* Encode the length of the dictionary entry data */
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200843 value_len = de->len;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200844 intencode(value_len, &end);
845 /* Copy the data */
846 memcpy(end, de->value.key, value_len);
847 end += value_len;
Frédéric Lécaillefd827932019-06-07 10:34:04 +0200848 /* Encode the length of the data */
849 data_len = end - beg;
850 intencode(data_len, &cursor);
851 memmove(cursor, beg, data_len);
852 cursor += data_len;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200853 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +0200854 break;
855 }
Emeric Brun94900952015-06-11 18:25:54 +0200856 }
857 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200858 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100859 HA_RWLOCK_RDUNLOCK(STK_SESS_LOCK, &ts->lock);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200860
861 /* Compute datalen */
862 datalen = (cursor - datamsg);
863
864 /* prepare message header */
865 msg[0] = PEER_MSG_CLASS_STICKTABLE;
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +0200866 peer_set_update_msg_type(&msg[1], use_identifier, use_timed);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200867 cursor = &msg[2];
868 intencode(datalen, &cursor);
869
870 /* move data after header */
871 memmove(cursor, datamsg, datalen);
872
873 /* return header size + data_len */
874 return (cursor - msg) + datalen;
875}
876
877/*
878 * This prepare the switch table message to targeted share table <st>.
Joseph Herlant82b2f542018-11-15 12:19:14 -0800879 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +0200880 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
881 * check size)
882 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100883static int peer_prepare_switchmsg(char *msg, size_t size, struct peer_prep_params *params)
Emeric Brunb3971ab2015-05-12 18:49:09 +0200884{
885 int len;
886 unsigned short datalen;
Willy Tarreau83061a82018-07-13 11:56:34 +0200887 struct buffer *chunk;
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200888 char *cursor, *datamsg, *chunkp, *chunkq;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200889 uint64_t data = 0;
Emeric Brun94900952015-06-11 18:25:54 +0200890 unsigned int data_type;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100891 struct shared_table *st;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200892
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +0100893 st = params->swtch.shared_table;
Frédéric Lécaille39143342019-05-24 14:32:27 +0200894 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +0200895
896 /* Encode data */
897
898 /* encode local id */
899 intencode(st->local_id, &cursor);
900
901 /* encode table name */
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +0100902 len = strlen(st->table->nid);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200903 intencode(len, &cursor);
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +0100904 memcpy(cursor, st->table->nid, len);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200905 cursor += len;
906
907 /* encode table type */
908
Emeric Brun530ba382020-06-02 11:17:42 +0200909 intencode(peer_net_key_type[st->table->type], &cursor);
Emeric Brunb3971ab2015-05-12 18:49:09 +0200910
911 /* encode table key size */
912 intencode(st->table->key_size, &cursor);
913
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200914 chunk = get_trash_chunk();
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200915 chunkp = chunkq = chunk->area;
Emeric Brun94900952015-06-11 18:25:54 +0200916 /* encode available known data types in table */
917 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
918 if (st->table->data_ofs[data_type]) {
Emeric Brun90a9b672021-06-22 16:09:55 +0200919 /* stored data types parameters are all linearly encoded
920 * at the end of the 'table definition' message.
921 *
922 * Currently only array data_types and and data_types
923 * using freq_counter base type have parameters:
924 *
925 * - array has always at least one parameter set to the
926 * number of elements.
927 *
928 * - array of base-type freq_counters has an additional
929 * parameter set to the period used to compute those
930 * freq_counters.
931 *
932 * - simple freq counter has a parameter set to the period
933 * used to compute
934 *
935 * A set of parameter for a datatype MUST BE prefixed
936 * by the data-type id itself:
937 * This is useless because the data_types are ordered and
938 * the data_type bitfield already gives the information of
939 * stored types, but it was designed this way when the
940 * push of period parameter was added for freq counters
941 * and we don't want to break the compatibility.
942 *
943 */
944 if (stktable_data_types[data_type].is_array) {
945 /* This is an array type so we first encode
946 * the data_type itself to prefix parameters
947 */
948 intencode(data_type, &chunkq);
949
950 /* We encode the first parameter which is
951 * the number of elements of this array
952 */
953 intencode(st->table->data_nbelem[data_type], &chunkq);
954
Ilya Shipitsin01881082021-08-07 14:41:56 +0500955 /* for array of freq counters, there is an additional
Emeric Brun90a9b672021-06-22 16:09:55 +0200956 * period parameter to encode
957 */
958 if (stktable_data_types[data_type].std_type == STD_T_FRQP)
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200959 intencode(st->table->data_arg[data_type].u, &chunkq);
Emeric Brun94900952015-06-11 18:25:54 +0200960 }
Emeric Brun90a9b672021-06-22 16:09:55 +0200961 else if (stktable_data_types[data_type].std_type == STD_T_FRQP) {
962 /* this datatype is a simple freq counter not part
963 * of an array. We encode the data_type itself
964 * to prefix the 'period' parameter
965 */
966 intencode(data_type, &chunkq);
967 intencode(st->table->data_arg[data_type].u, &chunkq);
968 }
969 /* set the bit corresponding to stored data type */
970 data |= 1ULL << data_type;
Emeric Brun94900952015-06-11 18:25:54 +0200971 }
Emeric Brunb3971ab2015-05-12 18:49:09 +0200972 }
973 intencode(data, &cursor);
974
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200975 /* Encode stick-table entries duration. */
976 intencode(st->table->expire, &cursor);
977
978 if (chunkq > chunkp) {
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200979 chunk->data = chunkq - chunkp;
980 memcpy(cursor, chunk->area, chunk->data);
981 cursor += chunk->data;
Frédéric Lécaille37a72542017-07-06 15:02:16 +0200982 }
983
Emeric Brunb3971ab2015-05-12 18:49:09 +0200984 /* Compute datalen */
985 datalen = (cursor - datamsg);
Emeric Brun2b920a12010-09-23 18:30:22 +0200986
Emeric Brunb3971ab2015-05-12 18:49:09 +0200987 /* prepare message header */
988 msg[0] = PEER_MSG_CLASS_STICKTABLE;
989 msg[1] = PEER_MSG_STKT_DEFINE;
990 cursor = &msg[2];
991 intencode(datalen, &cursor);
Emeric Brun2b920a12010-09-23 18:30:22 +0200992
Emeric Brunb3971ab2015-05-12 18:49:09 +0200993 /* move data after header */
994 memmove(cursor, datamsg, datalen);
995
996 /* return header size + data_len */
997 return (cursor - msg) + datalen;
Emeric Brun2b920a12010-09-23 18:30:22 +0200998}
999
Emeric Brunb3971ab2015-05-12 18:49:09 +02001000/*
1001 * This prepare the acknowledge message on the stick session <ts>, <st> is the considered
1002 * stick table.
Joseph Herlant82b2f542018-11-15 12:19:14 -08001003 * <msg> is a buffer of <size> to receive data message content
Emeric Brunb3971ab2015-05-12 18:49:09 +02001004 * If function returns 0, the caller should consider we were unable to encode this message (TODO:
1005 * check size)
1006 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001007static int peer_prepare_ackmsg(char *msg, size_t size, struct peer_prep_params *p)
Emeric Brunb3971ab2015-05-12 18:49:09 +02001008{
1009 unsigned short datalen;
1010 char *cursor, *datamsg;
1011 uint32_t netinteger;
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001012 struct shared_table *st;
Emeric Brunb3971ab2015-05-12 18:49:09 +02001013
Frédéric Lécaille39143342019-05-24 14:32:27 +02001014 cursor = datamsg = msg + PEER_MSG_HEADER_LEN + PEER_MSG_ENC_LENGTH_MAXLEN;
Emeric Brunb3971ab2015-05-12 18:49:09 +02001015
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001016 st = p->ack.shared_table;
Emeric Brunb3971ab2015-05-12 18:49:09 +02001017 intencode(st->remote_id, &cursor);
1018 netinteger = htonl(st->last_get);
1019 memcpy(cursor, &netinteger, sizeof(netinteger));
1020 cursor += sizeof(netinteger);
1021
1022 /* Compute datalen */
1023 datalen = (cursor - datamsg);
1024
1025 /* prepare message header */
1026 msg[0] = PEER_MSG_CLASS_STICKTABLE;
Emeric Brune1ab8082015-08-21 11:48:54 +02001027 msg[1] = PEER_MSG_STKT_ACK;
Emeric Brunb3971ab2015-05-12 18:49:09 +02001028 cursor = &msg[2];
1029 intencode(datalen, &cursor);
1030
1031 /* move data after header */
1032 memmove(cursor, datamsg, datalen);
1033
1034 /* return header size + data_len */
1035 return (cursor - msg) + datalen;
1036}
Emeric Brun2b920a12010-09-23 18:30:22 +02001037
1038/*
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001039 * Function to deinit connected peer
1040 */
1041void __peer_session_deinit(struct peer *peer)
1042{
Christopher Faulet387e7972022-05-12 14:47:52 +02001043 struct peers *peers = peer->peers;
Maciej Zdebd01be2a2022-05-16 17:26:20 +02001044 int thr;
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001045
Christopher Faulet387e7972022-05-12 14:47:52 +02001046 if (!peers || !peer->appctx)
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001047 return;
1048
Willy Tarreau29ffe262022-06-15 14:31:38 +02001049 thr = peer->appctx->t->tid;
Maciej Zdebd01be2a2022-05-16 17:26:20 +02001050 HA_ATOMIC_DEC(&peers->applet_count[thr]);
1051
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001052 if (peer->appctx->st0 == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02001053 HA_ATOMIC_DEC(&connected_peers);
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001054
Willy Tarreau4781b152021-04-06 13:53:36 +02001055 HA_ATOMIC_DEC(&active_peers);
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001056
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001057 flush_dcache(peer);
1058
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001059 /* Re-init current table pointers to force announcement on re-connect */
1060 peer->remote_table = peer->last_local_table = NULL;
1061 peer->appctx = NULL;
1062 if (peer->flags & PEER_F_LEARN_ASSIGN) {
1063 /* unassign current peer for learning */
1064 peer->flags &= ~(PEER_F_LEARN_ASSIGN);
1065 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
1066
Emeric Brunccdfbae2021-04-28 12:59:35 +02001067 if (peer->local)
1068 peers->flags |= PEERS_F_RESYNC_LOCALABORT;
1069 else
1070 peers->flags |= PEERS_F_RESYNC_REMOTEABORT;
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001071 /* reschedule a resync */
1072 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(5000));
1073 }
1074 /* reset teaching and learning flags to 0 */
1075 peer->flags &= PEER_TEACH_RESET;
1076 peer->flags &= PEER_LEARN_RESET;
1077 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
1078}
1079
Christopher Faulet6712dc62022-05-12 15:36:11 +02001080static int peer_session_init(struct appctx *appctx)
1081{
1082 struct peer *peer = appctx->svcctx;
1083 struct stream *s;
1084 struct sockaddr_storage *addr = NULL;
1085
1086 if (!sockaddr_alloc(&addr, &peer->addr, sizeof(peer->addr)))
1087 goto out_error;
1088
1089 if (appctx_finalize_startup(appctx, peer->peers->peers_fe, &BUF_NULL) == -1)
1090 goto out_free_addr;
1091
1092 s = appctx_strm(appctx);
1093 /* applet is waiting for data */
Willy Tarreau90e8b452022-05-25 18:21:43 +02001094 applet_need_more_data(appctx);
Christopher Faulet6712dc62022-05-12 15:36:11 +02001095 appctx_wakeup(appctx);
1096
1097 /* initiate an outgoing connection */
Willy Tarreau7cb9e6c2022-05-17 19:40:40 +02001098 s->scb->dst = addr;
Christopher Faulet9a790f62023-03-16 14:40:03 +01001099 s->scb->flags |= (SC_FL_RCV_ONCE|SC_FL_NOLINGER);
Christopher Faulet6712dc62022-05-12 15:36:11 +02001100 s->flags = SF_ASSIGNED;
1101 s->target = peer_session_target(peer, s);
1102
1103 s->do_log = NULL;
1104 s->uniq_id = 0;
1105
Christopher Faulet6712dc62022-05-12 15:36:11 +02001106 _HA_ATOMIC_INC(&active_peers);
1107 return 0;
1108
1109 out_free_addr:
1110 sockaddr_free(&addr);
1111 out_error:
1112 return -1;
1113}
1114
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001115/*
Emeric Brun2b920a12010-09-23 18:30:22 +02001116 * Callback to release a session with a peer
1117 */
Willy Tarreau00a37f02015-04-13 12:05:19 +02001118static void peer_session_release(struct appctx *appctx)
Emeric Brun2b920a12010-09-23 18:30:22 +02001119{
Willy Tarreau455caef2022-05-05 20:16:16 +02001120 struct peer *peer = appctx->svcctx;
Emeric Brun2b920a12010-09-23 18:30:22 +02001121
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001122 TRACE_PROTO("releasing peer session", PEERS_EV_SESSREL, NULL, peer);
Willy Tarreau455caef2022-05-05 20:16:16 +02001123 /* appctx->svcctx is not a peer session */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01001124 if (appctx->st0 < PEER_SESS_ST_SENDSUCCESS)
Emeric Brun2b920a12010-09-23 18:30:22 +02001125 return;
1126
1127 /* peer session identified */
Emeric Brunb3971ab2015-05-12 18:49:09 +02001128 if (peer) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +01001129 HA_SPIN_LOCK(PEER_LOCK, &peer->lock);
Emeric Brun9ef2ad72019-04-02 17:22:01 +02001130 if (peer->appctx == appctx)
1131 __peer_session_deinit(peer);
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02001132 peer->flags &= ~PEER_F_ALIVE;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01001133 HA_SPIN_UNLOCK(PEER_LOCK, &peer->lock);
Emeric Brun2b920a12010-09-23 18:30:22 +02001134 }
1135}
1136
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02001137/* Retrieve the major and minor versions of peers protocol
1138 * announced by a remote peer. <str> is a null-terminated
1139 * string with the following format: "<maj_ver>.<min_ver>".
1140 */
1141static int peer_get_version(const char *str,
1142 unsigned int *maj_ver, unsigned int *min_ver)
1143{
1144 unsigned int majv, minv;
1145 const char *pos, *saved;
1146 const char *end;
1147
1148 saved = pos = str;
1149 end = str + strlen(str);
1150
1151 majv = read_uint(&pos, end);
1152 if (saved == pos || *pos++ != '.')
1153 return -1;
1154
1155 saved = pos;
1156 minv = read_uint(&pos, end);
1157 if (saved == pos || pos != end)
1158 return -1;
1159
1160 *maj_ver = majv;
1161 *min_ver = minv;
1162
1163 return 0;
1164}
Emeric Brun2b920a12010-09-23 18:30:22 +02001165
1166/*
Frédéric Lécaillece025572019-01-21 13:38:06 +01001167 * Parse a line terminated by an optional '\r' character, followed by a mandatory
1168 * '\n' character.
1169 * Returns 1 if succeeded or 0 if a '\n' character could not be found, and -1 if
1170 * a line could not be read because the communication channel is closed.
1171 */
1172static inline int peer_getline(struct appctx *appctx)
1173{
Willy Tarreauc12b3212022-05-27 11:08:15 +02001174 struct stconn *sc = appctx_sc(appctx);
Frédéric Lécaillece025572019-01-21 13:38:06 +01001175 int n;
Frédéric Lécaillece025572019-01-21 13:38:06 +01001176
Willy Tarreauda304902022-05-27 10:44:04 +02001177 n = co_getline(sc_oc(sc), trash.area, trash.size);
Frédéric Lécaillece025572019-01-21 13:38:06 +01001178 if (!n)
1179 return 0;
1180
1181 if (n < 0 || trash.area[n - 1] != '\n') {
1182 appctx->st0 = PEER_SESS_ST_END;
1183 return -1;
1184 }
1185
1186 if (n > 1 && (trash.area[n - 2] == '\r'))
1187 trash.area[n - 2] = 0;
1188 else
1189 trash.area[n - 1] = 0;
1190
Willy Tarreauda304902022-05-27 10:44:04 +02001191 co_skip(sc_oc(sc), n);
Frédéric Lécaillece025572019-01-21 13:38:06 +01001192
1193 return n;
1194}
1195
1196/*
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001197 * Send a message after having called <peer_prepare_msg> to build it.
1198 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1199 * Returns -1 if there was not enough room left to send the message,
1200 * any other negative returned value must be considered as an error with an appcxt st0
1201 * returned value equal to PEER_SESS_ST_END.
1202 */
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001203static inline int peer_send_msg(struct appctx *appctx,
1204 int (*peer_prepare_msg)(char *, size_t, struct peer_prep_params *),
1205 struct peer_prep_params *params)
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001206{
1207 int ret, msglen;
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001208
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001209 msglen = peer_prepare_msg(trash.area, trash.size, params);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001210 if (!msglen) {
1211 /* internal error: message does not fit in trash */
1212 appctx->st0 = PEER_SESS_ST_END;
1213 return 0;
1214 }
1215
1216 /* message to buffer */
Christopher Faulet7a48b722023-05-05 11:00:50 +02001217 ret = applet_putblk(appctx, trash.area, msglen);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001218 if (ret <= 0) {
Christopher Faulet7a48b722023-05-05 11:00:50 +02001219 if (ret != -1)
1220 appctx->st0 = PEER_SESS_ST_END;
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001221 }
1222
1223 return ret;
1224}
1225
1226/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001227 * Send a hello message.
1228 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1229 * Returns -1 if there was not enough room left to send the message,
1230 * any other negative returned value must be considered as an error with an appcxt st0
1231 * returned value equal to PEER_SESS_ST_END.
1232 */
1233static inline int peer_send_hellomsg(struct appctx *appctx, struct peer *peer)
1234{
1235 struct peer_prep_params p = {
1236 .hello.peer = peer,
1237 };
1238
1239 return peer_send_msg(appctx, peer_prepare_hellomsg, &p);
1240}
1241
1242/*
1243 * Send a success peer handshake status message.
1244 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1245 * Returns -1 if there was not enough room left to send the message,
1246 * any other negative returned value must be considered as an error with an appcxt st0
1247 * returned value equal to PEER_SESS_ST_END.
1248 */
1249static inline int peer_send_status_successmsg(struct appctx *appctx)
1250{
1251 return peer_send_msg(appctx, peer_prepare_status_successmsg, NULL);
1252}
1253
1254/*
1255 * Send a peer handshake status error message.
1256 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1257 * Returns -1 if there was not enough room left to send the message,
1258 * any other negative returned value must be considered as an error with an appcxt st0
1259 * returned value equal to PEER_SESS_ST_END.
1260 */
1261static inline int peer_send_status_errormsg(struct appctx *appctx)
1262{
1263 struct peer_prep_params p = {
1264 .error_status.st1 = appctx->st1,
1265 };
1266
1267 return peer_send_msg(appctx, peer_prepare_status_errormsg, &p);
1268}
1269
1270/*
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001271 * Send a stick-table switch message.
1272 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1273 * Returns -1 if there was not enough room left to send the message,
1274 * any other negative returned value must be considered as an error with an appcxt st0
1275 * returned value equal to PEER_SESS_ST_END.
1276 */
1277static inline int peer_send_switchmsg(struct shared_table *st, struct appctx *appctx)
1278{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001279 struct peer_prep_params p = {
1280 .swtch.shared_table = st,
1281 };
1282
1283 return peer_send_msg(appctx, peer_prepare_switchmsg, &p);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001284}
1285
1286/*
1287 * Send a stick-table update acknowledgement message.
1288 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1289 * Returns -1 if there was not enough room left to send the message,
1290 * any other negative returned value must be considered as an error with an appcxt st0
1291 * returned value equal to PEER_SESS_ST_END.
1292 */
1293static inline int peer_send_ackmsg(struct shared_table *st, struct appctx *appctx)
1294{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001295 struct peer_prep_params p = {
1296 .ack.shared_table = st,
1297 };
1298
1299 return peer_send_msg(appctx, peer_prepare_ackmsg, &p);
Frédéric Lécailleec44ea82019-01-22 15:54:53 +01001300}
1301
1302/*
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01001303 * Send a stick-table update message.
1304 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1305 * Returns -1 if there was not enough room left to send the message,
1306 * any other negative returned value must be considered as an error with an appcxt st0
1307 * returned value equal to PEER_SESS_ST_END.
1308 */
1309static inline int peer_send_updatemsg(struct shared_table *st, struct appctx *appctx, struct stksess *ts,
1310 unsigned int updateid, int use_identifier, int use_timed)
1311{
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001312 struct peer_prep_params p = {
Willy Tarreaua898f0c2020-07-03 19:09:29 +02001313 .updt = {
1314 .stksess = ts,
1315 .shared_table = st,
1316 .updateid = updateid,
1317 .use_identifier = use_identifier,
1318 .use_timed = use_timed,
Willy Tarreau455caef2022-05-05 20:16:16 +02001319 .peer = appctx->svcctx,
Willy Tarreaua898f0c2020-07-03 19:09:29 +02001320 },
Frédéric Lécailled5fe14b2019-01-24 10:33:40 +01001321 };
1322
1323 return peer_send_msg(appctx, peer_prepare_updatemsg, &p);
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01001324}
1325
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001326/*
1327 * Build a peer protocol control class message.
1328 * Returns the number of written bytes used to build the message if succeeded,
1329 * 0 if not.
1330 */
1331static int peer_prepare_control_msg(char *msg, size_t size, struct peer_prep_params *p)
1332{
1333 if (size < sizeof p->control.head)
1334 return 0;
1335
1336 msg[0] = p->control.head[0];
1337 msg[1] = p->control.head[1];
1338
1339 return 2;
1340}
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001341
1342/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001343 * Send a stick-table synchronization request message.
1344 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1345 * Returns -1 if there was not enough room left to send the message,
1346 * any other negative returned value must be considered as an error with an appctx st0
1347 * returned value equal to PEER_SESS_ST_END.
1348 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001349static inline int peer_send_resync_reqmsg(struct appctx *appctx,
1350 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001351{
1352 struct peer_prep_params p = {
1353 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_RESYNCREQ, },
1354 };
1355
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001356 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1357 NULL, &p.control.head[1], peers->local->id, peer->id);
1358
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001359 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1360}
1361
1362/*
1363 * Send a stick-table synchronization confirmation message.
1364 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1365 * Returns -1 if there was not enough room left to send the message,
1366 * any other negative returned value must be considered as an error with an appctx st0
1367 * returned value equal to PEER_SESS_ST_END.
1368 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001369static inline int peer_send_resync_confirmsg(struct appctx *appctx,
1370 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001371{
1372 struct peer_prep_params p = {
1373 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_RESYNCCONFIRM, },
1374 };
1375
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001376 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1377 NULL, &p.control.head[1], peers->local->id, peer->id);
1378
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001379 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1380}
1381
1382/*
1383 * Send a stick-table synchronization finished message.
1384 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1385 * Returns -1 if there was not enough room left to send the message,
1386 * any other negative returned value must be considered as an error with an appctx st0
1387 * returned value equal to PEER_SESS_ST_END.
1388 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001389static inline int peer_send_resync_finishedmsg(struct appctx *appctx,
1390 struct peer *peer, struct peers *peers)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001391{
1392 struct peer_prep_params p = {
1393 .control.head = { PEER_MSG_CLASS_CONTROL, },
1394 };
1395
Emeric Brun70de43b2020-03-16 10:51:01 +01001396 p.control.head[1] = (peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FINISHED ?
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001397 PEER_MSG_CTRL_RESYNCFINISHED : PEER_MSG_CTRL_RESYNCPARTIAL;
1398
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001399 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1400 NULL, &p.control.head[1], peers->local->id, peer->id);
1401
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001402 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1403}
1404
1405/*
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001406 * Send a heartbeat message.
1407 * Return 0 if the message could not be built modifying the appctx st0 to PEER_SESS_ST_END value.
1408 * Returns -1 if there was not enough room left to send the message,
1409 * any other negative returned value must be considered as an error with an appctx st0
1410 * returned value equal to PEER_SESS_ST_END.
1411 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001412static inline int peer_send_heartbeatmsg(struct appctx *appctx,
1413 struct peer *peer, struct peers *peers)
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001414{
1415 struct peer_prep_params p = {
1416 .control.head = { PEER_MSG_CLASS_CONTROL, PEER_MSG_CTRL_HEARTBEAT, },
1417 };
1418
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01001419 TRACE_PROTO("send control message", PEERS_EV_CTRLMSG,
1420 NULL, &p.control.head[1], peers->local->id, peer->id);
1421
Frédéric Lécaille645635d2019-02-11 17:49:39 +01001422 return peer_send_msg(appctx, peer_prepare_control_msg, &p);
1423}
1424
1425/*
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01001426 * Build a peer protocol error class message.
1427 * Returns the number of written bytes used to build the message if succeeded,
1428 * 0 if not.
1429 */
1430static int peer_prepare_error_msg(char *msg, size_t size, struct peer_prep_params *p)
1431{
1432 if (size < sizeof p->error.head)
1433 return 0;
1434
1435 msg[0] = p->error.head[0];
1436 msg[1] = p->error.head[1];
1437
1438 return 2;
1439}
1440
1441/*
1442 * Send a "size limit reached" error message.
1443 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1444 * Returns -1 if there was not enough room left to send the message,
1445 * any other negative returned value must be considered as an error with an appctx st0
1446 * returned value equal to PEER_SESS_ST_END.
1447 */
1448static inline int peer_send_error_size_limitmsg(struct appctx *appctx)
1449{
1450 struct peer_prep_params p = {
1451 .error.head = { PEER_MSG_CLASS_ERROR, PEER_MSG_ERR_SIZELIMIT, },
1452 };
1453
1454 return peer_send_msg(appctx, peer_prepare_error_msg, &p);
1455}
1456
1457/*
1458 * Send a "peer protocol" error message.
1459 * Return 0 if the message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1460 * Returns -1 if there was not enough room left to send the message,
1461 * any other negative returned value must be considered as an error with an appctx st0
1462 * returned value equal to PEER_SESS_ST_END.
1463 */
1464static inline int peer_send_error_protomsg(struct appctx *appctx)
1465{
1466 struct peer_prep_params p = {
1467 .error.head = { PEER_MSG_CLASS_ERROR, PEER_MSG_ERR_PROTOCOL, },
1468 };
1469
1470 return peer_send_msg(appctx, peer_prepare_error_msg, &p);
1471}
1472
1473/*
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001474 * Function used to lookup for recent stick-table updates associated with
1475 * <st> shared stick-table when a lesson must be taught a peer (PEER_F_LEARN_ASSIGN flag set).
1476 */
1477static inline struct stksess *peer_teach_process_stksess_lookup(struct shared_table *st)
1478{
1479 struct eb32_node *eb;
1480
1481 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1482 if (!eb) {
1483 eb = eb32_first(&st->table->updates);
Emeric Brun8e7a13e2021-04-28 11:48:15 +02001484 if (!eb || (eb->key == st->last_pushed)) {
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001485 st->table->commitupdate = st->last_pushed = st->table->localupdate;
1486 return NULL;
1487 }
1488 }
1489
Emeric Brun8e7a13e2021-04-28 11:48:15 +02001490 /* if distance between the last pushed and the retrieved key
1491 * is greater than the distance last_pushed and the local_update
1492 * this means we are beyond localupdate.
1493 */
1494 if ((eb->key - st->last_pushed) > (st->table->localupdate - st->last_pushed)) {
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001495 st->table->commitupdate = st->last_pushed = st->table->localupdate;
1496 return NULL;
1497 }
1498
1499 return eb32_entry(eb, struct stksess, upd);
1500}
1501
1502/*
1503 * Function used to lookup for recent stick-table updates associated with
1504 * <st> shared stick-table during teach state 1 step.
1505 */
1506static inline struct stksess *peer_teach_stage1_stksess_lookup(struct shared_table *st)
1507{
1508 struct eb32_node *eb;
1509
1510 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1511 if (!eb) {
1512 st->flags |= SHTABLE_F_TEACH_STAGE1;
1513 eb = eb32_first(&st->table->updates);
1514 if (eb)
1515 st->last_pushed = eb->key - 1;
1516 return NULL;
1517 }
1518
1519 return eb32_entry(eb, struct stksess, upd);
1520}
1521
1522/*
1523 * Function used to lookup for recent stick-table updates associated with
1524 * <st> shared stick-table during teach state 2 step.
1525 */
1526static inline struct stksess *peer_teach_stage2_stksess_lookup(struct shared_table *st)
1527{
1528 struct eb32_node *eb;
1529
1530 eb = eb32_lookup_ge(&st->table->updates, st->last_pushed+1);
1531 if (!eb || eb->key > st->teaching_origin) {
1532 st->flags |= SHTABLE_F_TEACH_STAGE2;
1533 return NULL;
1534 }
1535
1536 return eb32_entry(eb, struct stksess, upd);
1537}
1538
1539/*
1540 * Generic function to emit update messages for <st> stick-table when a lesson must
1541 * be taught to the peer <p>.
1542 * <locked> must be set to 1 if the shared table <st> is already locked when entering
1543 * this function, 0 if not.
1544 *
1545 * This function temporary unlock/lock <st> when it sends stick-table updates or
1546 * when decrementing its refcount in case of any error when it sends this updates.
1547 *
1548 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1549 * Returns -1 if there was not enough room left to send the message,
1550 * any other negative returned value must be considered as an error with an appcxt st0
1551 * returned value equal to PEER_SESS_ST_END.
1552 * If it returns 0 or -1, this function leave <st> locked if already locked when entering this function
1553 * unlocked if not already locked when entering this function.
1554 */
1555static inline int peer_send_teachmsgs(struct appctx *appctx, struct peer *p,
1556 struct stksess *(*peer_stksess_lookup)(struct shared_table *),
1557 struct shared_table *st, int locked)
1558{
1559 int ret, new_pushed, use_timed;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001560 int updates_sent = 0;
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001561
1562 ret = 1;
1563 use_timed = 0;
1564 if (st != p->last_local_table) {
1565 ret = peer_send_switchmsg(st, appctx);
1566 if (ret <= 0)
1567 return ret;
1568
1569 p->last_local_table = st;
1570 }
1571
1572 if (peer_stksess_lookup != peer_teach_process_stksess_lookup)
1573 use_timed = !(p->flags & PEER_F_DWNGRD);
1574
1575 /* We force new pushed to 1 to force identifier in update message */
1576 new_pushed = 1;
1577
1578 if (!locked)
Willy Tarreau76642222022-10-11 12:02:50 +02001579 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001580
1581 while (1) {
1582 struct stksess *ts;
1583 unsigned updateid;
1584
1585 /* push local updates */
1586 ts = peer_stksess_lookup(st);
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001587 if (!ts) {
1588 ret = 1; // done
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001589 break;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001590 }
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001591
1592 updateid = ts->upd.key;
Frédéric Lécaille36d15652022-10-17 14:58:19 +02001593 if (p->srv->shard && ts->shard != p->srv->shard) {
1594 /* Skip this entry */
1595 st->last_pushed = updateid;
1596 new_pushed = 1;
1597 continue;
1598 }
1599
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001600 ts->ref_cnt++;
Willy Tarreau76642222022-10-11 12:02:50 +02001601 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001602
1603 ret = peer_send_updatemsg(st, appctx, ts, updateid, new_pushed, use_timed);
1604 if (ret <= 0) {
Willy Tarreau76642222022-10-11 12:02:50 +02001605 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001606 ts->ref_cnt--;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001607 break;
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001608 }
1609
Willy Tarreau76642222022-10-11 12:02:50 +02001610 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001611 ts->ref_cnt--;
1612 st->last_pushed = updateid;
1613
1614 if (peer_stksess_lookup == peer_teach_process_stksess_lookup &&
1615 (int)(st->last_pushed - st->table->commitupdate) > 0)
1616 st->table->commitupdate = st->last_pushed;
1617
1618 /* identifier may not needed in next update message */
1619 new_pushed = 0;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001620
1621 updates_sent++;
1622 if (updates_sent >= peers_max_updates_at_once) {
1623 /* pretend we're full so that we get back ASAP */
1624 struct stconn *sc = appctx_sc(appctx);
1625
1626 sc_need_room(sc);
1627 ret = -1;
1628 break;
1629 }
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001630 }
1631
1632 out:
1633 if (!locked)
Willy Tarreau76642222022-10-11 12:02:50 +02001634 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Willy Tarreau8bd146d2022-07-19 20:17:38 +02001635 return ret;
Frédéric Lécaille6a8303d2019-01-22 22:25:17 +01001636}
1637
1638/*
1639 * Function to emit update messages for <st> stick-table when a lesson must
1640 * be taught to the peer <p> (PEER_F_LEARN_ASSIGN flag set).
1641 *
1642 * Note that <st> shared stick-table is locked when calling this function.
1643 *
1644 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1645 * Returns -1 if there was not enough room left to send the message,
1646 * any other negative returned value must be considered as an error with an appcxt st0
1647 * returned value equal to PEER_SESS_ST_END.
1648 */
1649static inline int peer_send_teach_process_msgs(struct appctx *appctx, struct peer *p,
1650 struct shared_table *st)
1651{
1652 return peer_send_teachmsgs(appctx, p, peer_teach_process_stksess_lookup, st, 1);
1653}
1654
1655/*
1656 * Function to emit update messages for <st> stick-table when a lesson must
1657 * be taught to the peer <p> during teach state 1 step.
1658 *
1659 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1660 * Returns -1 if there was not enough room left to send the message,
1661 * any other negative returned value must be considered as an error with an appcxt st0
1662 * returned value equal to PEER_SESS_ST_END.
1663 */
1664static inline int peer_send_teach_stage1_msgs(struct appctx *appctx, struct peer *p,
1665 struct shared_table *st)
1666{
1667 return peer_send_teachmsgs(appctx, p, peer_teach_stage1_stksess_lookup, st, 0);
1668}
1669
1670/*
1671 * Function to emit update messages for <st> stick-table when a lesson must
1672 * be taught to the peer <p> during teach state 1 step.
1673 *
1674 * Return 0 if any message could not be built modifying the appcxt st0 to PEER_SESS_ST_END value.
1675 * Returns -1 if there was not enough room left to send the message,
1676 * any other negative returned value must be considered as an error with an appcxt st0
1677 * returned value equal to PEER_SESS_ST_END.
1678 */
1679static inline int peer_send_teach_stage2_msgs(struct appctx *appctx, struct peer *p,
1680 struct shared_table *st)
1681{
1682 return peer_send_teachmsgs(appctx, p, peer_teach_stage2_stksess_lookup, st, 0);
1683}
1684
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001685
1686/*
1687 * Function used to parse a stick-table update message after it has been received
1688 * by <p> peer with <msg_cur> as address of the pointer to the position in the
1689 * receipt buffer with <msg_end> being position of the end of the stick-table message.
1690 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
1691 * was encountered.
1692 * <exp> must be set if the stick-table entry expires.
1693 * <updt> must be set for PEER_MSG_STKT_UPDATE or PEER_MSG_STKT_UPDATE_TIMED stick-table
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05001694 * messages, in this case the stick-table update message is received with a stick-table
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001695 * update ID.
1696 * <totl> is the length of the stick-table update message computed upon receipt.
1697 */
Frédéric Lécaille444243c2019-01-24 15:40:11 +01001698static int peer_treat_updatemsg(struct appctx *appctx, struct peer *p, int updt, int exp,
1699 char **msg_cur, char *msg_end, int msg_len, int totl)
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001700{
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001701 struct shared_table *st = p->remote_table;
1702 struct stksess *ts, *newts;
1703 uint32_t update;
1704 int expire;
1705 unsigned int data_type;
Willy Tarreaub12be7c2022-11-29 17:43:10 +01001706 size_t keylen;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001707 void *data_ptr;
1708
Frédéric Lécailled8659352020-11-10 16:18:03 +01001709 TRACE_ENTER(PEERS_EV_UPDTMSG, NULL, p);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001710 /* Here we have data message */
1711 if (!st)
1712 goto ignore_msg;
1713
1714 expire = MS_TO_TICKS(st->table->expire);
1715
1716 if (updt) {
Frédéric Lécailled8659352020-11-10 16:18:03 +01001717 if (msg_len < sizeof(update)) {
1718 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001719 goto malformed_exit;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001720 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001721
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001722 memcpy(&update, *msg_cur, sizeof(update));
1723 *msg_cur += sizeof(update);
1724 st->last_get = htonl(update);
1725 }
1726 else {
1727 st->last_get++;
1728 }
1729
1730 if (exp) {
1731 size_t expire_sz = sizeof expire;
1732
Frédéric Lécailled8659352020-11-10 16:18:03 +01001733 if (*msg_cur + expire_sz > msg_end) {
1734 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1735 NULL, p, *msg_cur);
1736 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1737 NULL, p, msg_end, &expire_sz);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001738 goto malformed_exit;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001739 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001740
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001741 memcpy(&expire, *msg_cur, expire_sz);
1742 *msg_cur += expire_sz;
1743 expire = ntohl(expire);
1744 }
1745
1746 newts = stksess_new(st->table, NULL);
1747 if (!newts)
1748 goto ignore_msg;
1749
1750 if (st->table->type == SMP_T_STR) {
1751 unsigned int to_read, to_store;
1752
1753 to_read = intdecode(msg_cur, msg_end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001754 if (!*msg_cur) {
1755 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001756 goto malformed_free_newts;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001757 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001758
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001759 to_store = MIN(to_read, st->table->key_size - 1);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001760 if (*msg_cur + to_store > msg_end) {
1761 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1762 NULL, p, *msg_cur);
1763 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1764 NULL, p, msg_end, &to_store);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001765 goto malformed_free_newts;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001766 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001767
Willy Tarreaub12be7c2022-11-29 17:43:10 +01001768 keylen = to_store;
1769 memcpy(newts->key.key, *msg_cur, keylen);
1770 newts->key.key[keylen] = 0;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001771 *msg_cur += to_read;
1772 }
1773 else if (st->table->type == SMP_T_SINT) {
1774 unsigned int netinteger;
1775
Frédéric Lécailled8659352020-11-10 16:18:03 +01001776 if (*msg_cur + sizeof(netinteger) > msg_end) {
1777 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1778 NULL, p, *msg_cur);
1779 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1780 NULL, p, msg_end);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001781 goto malformed_free_newts;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001782 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001783
Willy Tarreaub12be7c2022-11-29 17:43:10 +01001784 keylen = sizeof(netinteger);
1785 memcpy(&netinteger, *msg_cur, keylen);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001786 netinteger = ntohl(netinteger);
Willy Tarreaub12be7c2022-11-29 17:43:10 +01001787 memcpy(newts->key.key, &netinteger, keylen);
1788 *msg_cur += keylen;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001789 }
1790 else {
Frédéric Lécailled8659352020-11-10 16:18:03 +01001791 if (*msg_cur + st->table->key_size > msg_end) {
1792 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1793 NULL, p, *msg_cur);
1794 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1795 NULL, p, msg_end, &st->table->key_size);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001796 goto malformed_free_newts;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001797 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001798
Willy Tarreaub12be7c2022-11-29 17:43:10 +01001799 keylen = st->table->key_size;
1800 memcpy(newts->key.key, *msg_cur, keylen);
1801 *msg_cur += keylen;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001802 }
1803
Willy Tarreau4ede46b2022-11-29 18:01:28 +01001804 newts->shard = stktable_get_key_shard(st->table, newts->key.key, keylen);
1805
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001806 /* lookup for existing entry */
1807 ts = stktable_set_entry(st->table, newts);
1808 if (ts != newts) {
1809 stksess_free(st->table, newts);
1810 newts = NULL;
1811 }
1812
1813 HA_RWLOCK_WRLOCK(STK_SESS_LOCK, &ts->lock);
1814
1815 for (data_type = 0 ; data_type < STKTABLE_DATA_TYPES ; data_type++) {
Willy Tarreau1e82a142019-01-29 11:08:06 +01001816 uint64_t decoded_int;
Emeric Brun90a9b672021-06-22 16:09:55 +02001817 unsigned int idx;
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001818 int ignore;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001819
Emeric Brun08b0f672021-07-01 18:54:05 +02001820 if (!((1ULL << data_type) & st->remote_data))
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001821 continue;
Willy Tarreaudb2ab822021-10-08 17:53:12 +02001822
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001823 ignore = stktable_data_types[data_type].is_local;
Willy Tarreaudb2ab822021-10-08 17:53:12 +02001824
Emeric Brun90a9b672021-06-22 16:09:55 +02001825 if (stktable_data_types[data_type].is_array) {
1826 /* in case of array all elements
1827 * use the same std_type and they
1828 * are linearly encoded.
1829 * The number of elements was provided
1830 * by table definition message
1831 */
1832 switch (stktable_data_types[data_type].std_type) {
1833 case STD_T_SINT:
1834 for (idx = 0; idx < st->remote_data_nbelem[data_type]; idx++) {
1835 decoded_int = intdecode(msg_cur, msg_end);
1836 if (!*msg_cur) {
1837 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1838 goto malformed_unlock;
1839 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001840
Emeric Brun90a9b672021-06-22 16:09:55 +02001841 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, idx);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001842 if (data_ptr && !ignore)
Emeric Brun90a9b672021-06-22 16:09:55 +02001843 stktable_data_cast(data_ptr, std_t_sint) = decoded_int;
1844 }
1845 break;
1846 case STD_T_UINT:
1847 for (idx = 0; idx < st->remote_data_nbelem[data_type]; idx++) {
1848 decoded_int = intdecode(msg_cur, msg_end);
1849 if (!*msg_cur) {
1850 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1851 goto malformed_unlock;
1852 }
1853
1854 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, idx);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001855 if (data_ptr && !ignore)
Emeric Brun90a9b672021-06-22 16:09:55 +02001856 stktable_data_cast(data_ptr, std_t_uint) = decoded_int;
1857 }
1858 break;
1859 case STD_T_ULL:
1860 for (idx = 0; idx < st->remote_data_nbelem[data_type]; idx++) {
1861 decoded_int = intdecode(msg_cur, msg_end);
1862 if (!*msg_cur) {
1863 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1864 goto malformed_unlock;
1865 }
1866
1867 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, idx);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001868 if (data_ptr && !ignore)
Emeric Brun90a9b672021-06-22 16:09:55 +02001869 stktable_data_cast(data_ptr, std_t_ull) = decoded_int;
1870 }
1871 break;
1872 case STD_T_FRQP:
1873 for (idx = 0; idx < st->remote_data_nbelem[data_type]; idx++) {
1874 struct freq_ctr data;
1875
1876 /* First bit is reserved for the freq_ctr lock
1877 * Note: here we're still protected by the stksess lock
1878 * so we don't need to update the update the freq_ctr
1879 * using its internal lock.
1880 */
1881
1882 decoded_int = intdecode(msg_cur, msg_end);
1883 if (!*msg_cur) {
1884 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1885 goto malformed_unlock;
1886 }
1887
1888 data.curr_tick = tick_add(now_ms, -decoded_int) & ~0x1;
1889 data.curr_ctr = intdecode(msg_cur, msg_end);
1890 if (!*msg_cur) {
1891 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1892 goto malformed_unlock;
1893 }
1894
1895 data.prev_ctr = intdecode(msg_cur, msg_end);
1896 if (!*msg_cur) {
1897 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
1898 goto malformed_unlock;
1899 }
1900
1901 data_ptr = stktable_data_ptr_idx(st->table, ts, data_type, idx);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001902 if (data_ptr && !ignore)
Emeric Brun90a9b672021-06-22 16:09:55 +02001903 stktable_data_cast(data_ptr, std_t_frqp) = data;
1904 }
1905 break;
1906 }
1907
1908 /* array is fully decoded
1909 * proceed next data_type.
1910 */
1911 continue;
1912 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001913 decoded_int = intdecode(msg_cur, msg_end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001914 if (!*msg_cur) {
1915 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001916 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001917 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001918
Willy Tarreau1e82a142019-01-29 11:08:06 +01001919 switch (stktable_data_types[data_type].std_type) {
1920 case STD_T_SINT:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001921 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001922 if (data_ptr && !ignore)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001923 stktable_data_cast(data_ptr, std_t_sint) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001924 break;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001925
Willy Tarreau1e82a142019-01-29 11:08:06 +01001926 case STD_T_UINT:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001927 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001928 if (data_ptr && !ignore)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001929 stktable_data_cast(data_ptr, std_t_uint) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001930 break;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001931
Willy Tarreau1e82a142019-01-29 11:08:06 +01001932 case STD_T_ULL:
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001933 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001934 if (data_ptr && !ignore)
Willy Tarreau1e82a142019-01-29 11:08:06 +01001935 stktable_data_cast(data_ptr, std_t_ull) = decoded_int;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001936 break;
Willy Tarreau1e82a142019-01-29 11:08:06 +01001937
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001938 case STD_T_FRQP: {
Willy Tarreaufa1258f2021-04-10 23:00:53 +02001939 struct freq_ctr data;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001940
Willy Tarreaufa1258f2021-04-10 23:00:53 +02001941 /* First bit is reserved for the freq_ctr lock
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001942 Note: here we're still protected by the stksess lock
Willy Tarreaufa1258f2021-04-10 23:00:53 +02001943 so we don't need to update the update the freq_ctr
Emeric Brun90a9b672021-06-22 16:09:55 +02001944 using its internal lock.
1945 */
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001946
Willy Tarreau1e82a142019-01-29 11:08:06 +01001947 data.curr_tick = tick_add(now_ms, -decoded_int) & ~0x1;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001948 data.curr_ctr = intdecode(msg_cur, msg_end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001949 if (!*msg_cur) {
1950 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001951 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001952 }
Willy Tarreau1e82a142019-01-29 11:08:06 +01001953
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001954 data.prev_ctr = intdecode(msg_cur, msg_end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001955 if (!*msg_cur) {
1956 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG, NULL, p);
Willy Tarreau1e82a142019-01-29 11:08:06 +01001957 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001958 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001959
1960 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01001961 if (data_ptr && !ignore)
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01001962 stktable_data_cast(data_ptr, std_t_frqp) = data;
1963 break;
1964 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001965 case STD_T_DICT: {
1966 struct buffer *chunk;
1967 size_t data_len, value_len;
1968 unsigned int id;
1969 struct dict_entry *de;
1970 struct dcache *dc;
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001971 char *end;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001972
Frédéric Lécailleaf9990f2019-11-13 17:50:34 +01001973 if (!decoded_int) {
1974 /* No entry. */
1975 break;
1976 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001977 data_len = decoded_int;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001978 if (*msg_cur + data_len > msg_end) {
1979 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1980 NULL, p, *msg_cur);
1981 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1982 NULL, p, msg_end, &data_len);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001983 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001984 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001985
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001986 /* Compute the end of the current data, <msg_end> being at the end of
1987 * the entire message.
1988 */
1989 end = *msg_cur + data_len;
1990 id = intdecode(msg_cur, end);
Frédéric Lécailled8659352020-11-10 16:18:03 +01001991 if (!*msg_cur || !id) {
1992 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
1993 NULL, p, *msg_cur, &id);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001994 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01001995 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001996
1997 dc = p->dcache;
Frédéric Lécaille344e9482019-06-05 10:20:09 +02001998 if (*msg_cur == end) {
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02001999 /* Dictionary entry key without value. */
Frédéric Lécaillef9e51be2020-11-12 19:53:11 +01002000 if (id > dc->max_entries) {
2001 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
2002 NULL, p, NULL, &id);
2003 goto malformed_unlock;
2004 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002005 /* IDs sent over the network are numbered from 1. */
2006 de = dc->rx[id - 1].de;
2007 }
2008 else {
2009 chunk = get_trash_chunk();
Frédéric Lécaille344e9482019-06-05 10:20:09 +02002010 value_len = intdecode(msg_cur, end);
2011 if (!*msg_cur || *msg_cur + value_len > end ||
Frédéric Lécailled8659352020-11-10 16:18:03 +01002012 unlikely(value_len + 1 >= chunk->size)) {
2013 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
2014 NULL, p, *msg_cur, &value_len);
2015 TRACE_PROTO("malformed message", PEERS_EV_UPDTMSG,
2016 NULL, p, end, &chunk->size);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002017 goto malformed_unlock;
Frédéric Lécailled8659352020-11-10 16:18:03 +01002018 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002019
2020 chunk_memcpy(chunk, *msg_cur, value_len);
2021 chunk->area[chunk->data] = '\0';
Frédéric Lécaille56aec0d2019-06-06 14:14:15 +02002022 *msg_cur += value_len;
2023
Thayne McCombs92149f92020-11-20 01:28:26 -07002024 de = dict_insert(&server_key_dict, chunk->area);
2025 dict_entry_unref(&server_key_dict, dc->rx[id - 1].de);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002026 dc->rx[id - 1].de = de;
2027 }
2028 if (de) {
2029 data_ptr = stktable_data_ptr(st->table, ts, data_type);
Willy Tarreaub4ff6f42021-12-24 13:38:49 +01002030 if (data_ptr && !ignore) {
Willy Tarreau4781b152021-04-06 13:53:36 +02002031 HA_ATOMIC_INC(&de->refcount);
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002032 stktable_data_cast(data_ptr, std_t_dict) = de;
Thayne McCombs92149f92020-11-20 01:28:26 -07002033 }
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02002034 }
2035 break;
2036 }
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01002037 }
2038 }
2039 /* Force new expiration */
2040 ts->expire = tick_add(now_ms, expire);
2041
2042 HA_RWLOCK_WRUNLOCK(STK_SESS_LOCK, &ts->lock);
2043 stktable_touch_remote(st->table, ts, 1);
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01002044
2045 ignore_msg:
Emeric Brun0909f622022-11-18 14:52:54 +01002046 TRACE_LEAVE(PEERS_EV_UPDTMSG, NULL, p);
2047 return 1;
Willy Tarreau1e82a142019-01-29 11:08:06 +01002048
2049 malformed_unlock:
2050 /* malformed message */
2051 HA_RWLOCK_WRUNLOCK(STK_SESS_LOCK, &ts->lock);
2052 stktable_touch_remote(st->table, ts, 1);
2053 appctx->st0 = PEER_SESS_ST_ERRPROTO;
Frédéric Lécailled8659352020-11-10 16:18:03 +01002054 TRACE_DEVEL("leaving in error", PEERS_EV_UPDTMSG);
Willy Tarreau1e82a142019-01-29 11:08:06 +01002055 return 0;
2056
2057 malformed_free_newts:
2058 /* malformed message */
2059 stksess_free(st->table, newts);
2060 malformed_exit:
2061 appctx->st0 = PEER_SESS_ST_ERRPROTO;
Frédéric Lécailled8659352020-11-10 16:18:03 +01002062 TRACE_DEVEL("leaving in error", PEERS_EV_UPDTMSG);
Willy Tarreau1e82a142019-01-29 11:08:06 +01002063 return 0;
Frédéric Lécaille168a34b2019-01-23 11:16:57 +01002064}
2065
Frédéric Lécaille87f554c2019-01-22 17:26:50 +01002066/*
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002067 * Function used to parse a stick-table update acknowledgement message after it
2068 * has been received by <p> peer with <msg_cur> as address of the pointer to the position in the
2069 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
2070 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
2071 * was encountered.
2072 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
2073 */
2074static inline int peer_treat_ackmsg(struct appctx *appctx, struct peer *p,
2075 char **msg_cur, char *msg_end)
2076{
2077 /* ack message */
2078 uint32_t table_id ;
2079 uint32_t update;
2080 struct shared_table *st;
2081
Emeric Brunb0d60be2021-03-04 10:27:10 +01002082 /* ignore ack during teaching process */
2083 if (p->flags & PEER_F_TEACH_PROCESS)
2084 return 1;
2085
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002086 table_id = intdecode(msg_cur, msg_end);
2087 if (!*msg_cur || (*msg_cur + sizeof(update) > msg_end)) {
2088 /* malformed message */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002089
2090 TRACE_PROTO("malformed message", PEERS_EV_ACKMSG,
2091 NULL, p, *msg_cur);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002092 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2093 return 0;
2094 }
2095
2096 memcpy(&update, *msg_cur, sizeof(update));
2097 update = ntohl(update);
2098
2099 for (st = p->tables; st; st = st->next) {
2100 if (st->local_id == table_id) {
2101 st->update = update;
2102 break;
2103 }
2104 }
2105
2106 return 1;
2107}
2108
2109/*
2110 * Function used to parse a stick-table switch message after it has been received
2111 * by <p> peer with <msg_cur> as address of the pointer to the position in the
2112 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
2113 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
2114 * was encountered.
2115 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
2116 */
2117static inline int peer_treat_switchmsg(struct appctx *appctx, struct peer *p,
2118 char **msg_cur, char *msg_end)
2119{
2120 struct shared_table *st;
2121 int table_id;
2122
2123 table_id = intdecode(msg_cur, msg_end);
2124 if (!*msg_cur) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002125 TRACE_PROTO("malformed message", PEERS_EV_SWTCMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002126 /* malformed message */
2127 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2128 return 0;
2129 }
2130
2131 p->remote_table = NULL;
2132 for (st = p->tables; st; st = st->next) {
2133 if (st->remote_id == table_id) {
2134 p->remote_table = st;
2135 break;
2136 }
2137 }
2138
2139 return 1;
2140}
2141
2142/*
2143 * Function used to parse a stick-table definition message after it has been received
2144 * by <p> peer with <msg_cur> as address of the pointer to the position in the
2145 * receipt buffer with <msg_end> being the position of the end of the stick-table message.
2146 * Update <msg_curr> accordingly to the peer protocol specs if no peer protocol error
2147 * was encountered.
2148 * <totl> is the length of the stick-table update message computed upon receipt.
2149 * Return 1 if succeeded, 0 if not with the appctx state st0 set to PEER_SESS_ST_ERRPROTO.
2150 */
2151static inline int peer_treat_definemsg(struct appctx *appctx, struct peer *p,
2152 char **msg_cur, char *msg_end, int totl)
2153{
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002154 int table_id_len;
2155 struct shared_table *st;
2156 int table_type;
2157 int table_keylen;
2158 int table_id;
2159 uint64_t table_data;
2160
2161 table_id = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002162 if (!*msg_cur) {
2163 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002164 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002165 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002166
2167 table_id_len = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002168 if (!*msg_cur) {
2169 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p, *msg_cur);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002170 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002171 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002172
2173 p->remote_table = NULL;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002174 if (!table_id_len || (*msg_cur + table_id_len) >= msg_end) {
2175 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p, *msg_cur, &table_id_len);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002176 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002177 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002178
2179 for (st = p->tables; st; st = st->next) {
2180 /* Reset IDs */
2181 if (st->remote_id == table_id)
2182 st->remote_id = 0;
2183
Frédéric Lécaille7fcc24d2019-03-20 15:09:45 +01002184 if (!p->remote_table && (table_id_len == strlen(st->table->nid)) &&
2185 (memcmp(st->table->nid, *msg_cur, table_id_len) == 0))
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002186 p->remote_table = st;
2187 }
2188
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002189 if (!p->remote_table) {
2190 TRACE_PROTO("ignored message", PEERS_EV_DEFMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002191 goto ignore_msg;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002192 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002193
2194 *msg_cur += table_id_len;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002195 if (*msg_cur >= msg_end) {
2196 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002197 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002198 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002199
2200 table_type = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002201 if (!*msg_cur) {
2202 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002203 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002204 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002205
2206 table_keylen = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002207 if (!*msg_cur) {
2208 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002209 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002210 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002211
2212 table_data = intdecode(msg_cur, msg_end);
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002213 if (!*msg_cur) {
2214 TRACE_PROTO("malformed message", PEERS_EV_DEFMSG, NULL, p);
Willy Tarreau6f731f32019-01-29 11:11:23 +01002215 goto malformed_exit;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002216 }
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002217
Emeric Brun530ba382020-06-02 11:17:42 +02002218 if (p->remote_table->table->type != peer_int_key_type[table_type]
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002219 || p->remote_table->table->key_size != table_keylen) {
2220 p->remote_table = NULL;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002221 TRACE_PROTO("ignored message", PEERS_EV_DEFMSG, NULL, p);
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002222 goto ignore_msg;
2223 }
2224
Ilya Shipitsin01881082021-08-07 14:41:56 +05002225 /* Check if there there is the additional expire data */
Emeric Brun90a9b672021-06-22 16:09:55 +02002226 intdecode(msg_cur, msg_end);
2227 if (*msg_cur) {
2228 uint64_t data_type;
2229 uint64_t type;
2230
2231 /* This define contains the expire data so we consider
2232 * it also contain all data_types parameters.
2233 */
2234 for (data_type = 0; data_type < STKTABLE_DATA_TYPES; data_type++) {
2235 if (table_data & (1ULL << data_type)) {
2236 if (stktable_data_types[data_type].is_array) {
2237 /* This should be an array
2238 * so we parse the data_type prefix
2239 * because we must have parameters.
2240 */
2241 type = intdecode(msg_cur, msg_end);
2242 if (!*msg_cur) {
2243 p->remote_table = NULL;
2244 TRACE_PROTO("missing meta data for array", PEERS_EV_DEFMSG, NULL, p);
2245 goto ignore_msg;
2246 }
2247
2248 /* check if the data_type match the current from the bitfield */
2249 if (type != data_type) {
2250 p->remote_table = NULL;
Ilya Shipitsin01881082021-08-07 14:41:56 +05002251 TRACE_PROTO("meta data mismatch type", PEERS_EV_DEFMSG, NULL, p);
Emeric Brun90a9b672021-06-22 16:09:55 +02002252 goto ignore_msg;
2253 }
2254
2255 /* decode the nbelem of the array */
2256 p->remote_table->remote_data_nbelem[type] = intdecode(msg_cur, msg_end);
2257 if (!*msg_cur) {
2258 p->remote_table = NULL;
2259 TRACE_PROTO("missing array size meta data for array", PEERS_EV_DEFMSG, NULL, p);
2260 goto ignore_msg;
2261 }
2262
2263 /* if it is an array of frqp, we must also have the period to decode */
2264 if (stktable_data_types[data_type].std_type == STD_T_FRQP) {
2265 intdecode(msg_cur, msg_end);
2266 if (!*msg_cur) {
2267 p->remote_table = NULL;
2268 TRACE_PROTO("missing period for frqp", PEERS_EV_DEFMSG, NULL, p);
2269 goto ignore_msg;
2270 }
2271 }
2272 }
2273 else if (stktable_data_types[data_type].std_type == STD_T_FRQP) {
2274 /* This should be a std freq counter data_type
2275 * so we parse the data_type prefix
2276 * because we must have parameters.
2277 */
2278 type = intdecode(msg_cur, msg_end);
2279 if (!*msg_cur) {
2280 p->remote_table = NULL;
2281 TRACE_PROTO("missing meta data for frqp", PEERS_EV_DEFMSG, NULL, p);
2282 goto ignore_msg;
2283 }
2284
2285 /* check if the data_type match the current from the bitfield */
2286 if (type != data_type) {
2287 p->remote_table = NULL;
Ilya Shipitsin01881082021-08-07 14:41:56 +05002288 TRACE_PROTO("meta data mismatch type", PEERS_EV_DEFMSG, NULL, p);
Emeric Brun90a9b672021-06-22 16:09:55 +02002289 goto ignore_msg;
2290 }
2291
2292 /* decode the period */
2293 intdecode(msg_cur, msg_end);
2294 if (!*msg_cur) {
2295 p->remote_table = NULL;
2296 TRACE_PROTO("missing period for frqp", PEERS_EV_DEFMSG, NULL, p);
2297 goto ignore_msg;
2298 }
2299 }
2300 }
2301 }
2302 }
2303 else {
2304 uint64_t data_type;
2305
2306 /* There is not additional data but
2307 * array size parameter is mandatory to parse array
2308 * so we consider an error if an array data_type is define
2309 * but there is no additional data.
2310 */
2311 for (data_type = 0; data_type < STKTABLE_DATA_TYPES; data_type++) {
2312 if (table_data & (1ULL << data_type)) {
2313 if (stktable_data_types[data_type].is_array) {
2314 p->remote_table = NULL;
2315 TRACE_PROTO("missing array size meta data for array", PEERS_EV_DEFMSG, NULL, p);
2316 goto ignore_msg;
2317 }
2318 }
2319 }
2320 }
2321
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002322 p->remote_table->remote_data = table_data;
2323 p->remote_table->remote_id = table_id;
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002324
2325 ignore_msg:
Emeric Brun0909f622022-11-18 14:52:54 +01002326 return 1;
Willy Tarreau6f731f32019-01-29 11:11:23 +01002327
2328 malformed_exit:
2329 /* malformed message */
2330 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2331 return 0;
Frédéric Lécailled27b0942019-01-23 17:31:37 +01002332}
2333
2334/*
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002335 * Receive a stick-table message or pre-parse any other message.
2336 * The message's header will be sent into <msg_head> which must be at least
2337 * <msg_head_sz> bytes long (at least 7 to store 32-bit variable lengths).
2338 * The first two bytes are always read, and the rest is only read if the
2339 * first bytes indicate a stick-table message. If the message is a stick-table
2340 * message, the varint is decoded and the equivalent number of bytes will be
2341 * copied into the trash at trash.area. <totl> is incremented by the number of
2342 * bytes read EVEN IN CASE OF INCOMPLETE MESSAGES.
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002343 * Returns 1 if there was no error, if not, returns 0 if not enough data were available,
2344 * -1 if there was an error updating the appctx state st0 accordingly.
2345 */
2346static inline int peer_recv_msg(struct appctx *appctx, char *msg_head, size_t msg_head_sz,
2347 uint32_t *msg_len, int *totl)
2348{
2349 int reql;
Willy Tarreauc12b3212022-05-27 11:08:15 +02002350 struct stconn *sc = appctx_sc(appctx);
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002351 char *cur;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002352
Willy Tarreauda304902022-05-27 10:44:04 +02002353 reql = co_getblk(sc_oc(sc), msg_head, 2 * sizeof(char), *totl);
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002354 if (reql <= 0) /* closed or EOL not found */
2355 goto incomplete;
2356
2357 *totl += reql;
2358
Frédéric Lécaille36fb77e2019-06-04 08:28:19 +02002359 if (!(msg_head[1] & PEER_MSG_STKT_BIT_MASK))
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002360 return 1;
2361
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002362 /* This is a stick-table message, let's go on */
2363
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002364 /* Read and Decode message length */
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002365 msg_head += *totl;
2366 msg_head_sz -= *totl;
Willy Tarreauda304902022-05-27 10:44:04 +02002367 reql = co_data(sc_oc(sc)) - *totl;
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002368 if (reql > msg_head_sz)
2369 reql = msg_head_sz;
2370
Willy Tarreauda304902022-05-27 10:44:04 +02002371 reql = co_getblk(sc_oc(sc), msg_head, reql, *totl);
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002372 if (reql <= 0) /* closed */
2373 goto incomplete;
2374
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002375 cur = msg_head;
2376 *msg_len = intdecode(&cur, cur + reql);
2377 if (!cur) {
2378 /* the number is truncated, did we read enough ? */
2379 if (reql < msg_head_sz)
2380 goto incomplete;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002381
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002382 /* malformed message */
2383 TRACE_PROTO("malformed message: too large length encoding", PEERS_EV_UPDTMSG);
2384 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2385 return -1;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002386 }
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01002387 *totl += cur - msg_head;
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002388
2389 /* Read message content */
2390 if (*msg_len) {
2391 if (*msg_len > trash.size) {
2392 /* Status code is not success, abort */
2393 appctx->st0 = PEER_SESS_ST_ERRSIZE;
2394 return -1;
2395 }
2396
Willy Tarreauda304902022-05-27 10:44:04 +02002397 reql = co_getblk(sc_oc(sc), trash.area, *msg_len, *totl);
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002398 if (reql <= 0) /* closed */
2399 goto incomplete;
2400 *totl += reql;
2401 }
2402
2403 return 1;
2404
2405 incomplete:
Christopher Faulet3d949012023-03-31 11:21:06 +02002406 if (reql < 0) {
Willy Tarreau345ebcf2020-11-26 17:06:04 +01002407 /* there was an error or the message was truncated */
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002408 appctx->st0 = PEER_SESS_ST_END;
2409 return -1;
2410 }
2411
2412 return 0;
2413}
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002414
2415/*
2416 * Treat the awaited message with <msg_head> as header.*
2417 * Return 1 if succeeded, 0 if not.
2418 */
2419static inline int peer_treat_awaited_msg(struct appctx *appctx, struct peer *peer, unsigned char *msg_head,
2420 char **msg_cur, char *msg_end, int msg_len, int totl)
2421{
Christopher Faulet387e7972022-05-12 14:47:52 +02002422 struct peers *peers = peer->peers;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002423
2424 if (msg_head[0] == PEER_MSG_CLASS_CONTROL) {
2425 if (msg_head[1] == PEER_MSG_CTRL_RESYNCREQ) {
2426 struct shared_table *st;
2427 /* Reset message: remote need resync */
2428
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002429 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2430 NULL, &msg_head[1], peers->local->id, peer->id);
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05002431 /* prepare tables for a global push */
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002432 for (st = peer->tables; st; st = st->next) {
Emeric Brun437e48a2021-04-28 09:49:33 +02002433 st->teaching_origin = st->last_pushed = st->update;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002434 st->flags = 0;
2435 }
2436
2437 /* reset teaching flags to 0 */
2438 peer->flags &= PEER_TEACH_RESET;
2439
2440 /* flag to start to teach lesson */
2441 peer->flags |= PEER_F_TEACH_PROCESS;
Emeric Brunccdfbae2021-04-28 12:59:35 +02002442 peers->flags |= PEERS_F_RESYNC_REQUESTED;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002443 }
2444 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCFINISHED) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002445 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2446 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002447 if (peer->flags & PEER_F_LEARN_ASSIGN) {
Emeric Brunac556082022-10-24 10:04:59 +02002448 int commit_a_finish = 1;
2449
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002450 peer->flags &= ~PEER_F_LEARN_ASSIGN;
2451 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
Emeric Brunac556082022-10-24 10:04:59 +02002452 if (peer->srv->shard) {
2453 struct peer *ps;
2454
2455 peers->flags |= PEERS_F_RESYNC_REMOTEPARTIAL;
2456 peer->flags |= PEER_F_LEARN_NOTUP2DATE;
2457 for (ps = peers->remote; ps; ps = ps->next) {
2458 if (ps->srv->shard == peer->srv->shard) {
2459 /* flag all peers from same shard
2460 * notup2date to disable request
2461 * of a resync frm them
2462 */
2463 ps->flags |= PEER_F_LEARN_NOTUP2DATE;
2464 }
2465 else if (ps->srv->shard && !(ps->flags & PEER_F_LEARN_NOTUP2DATE)) {
2466 /* it remains some other shards not requested
2467 * we don't commit a resync finish to request
2468 * the other shards
2469 */
2470 commit_a_finish = 0;
2471 }
2472 }
2473
2474 if (!commit_a_finish) {
2475 /* it remains some shard to request, we schedule a new request
2476 */
2477 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
2478 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
2479 }
2480 }
2481
2482 if (commit_a_finish) {
2483 peers->flags |= (PEERS_F_RESYNC_LOCAL|PEERS_F_RESYNC_REMOTE);
2484 if (peer->local)
2485 peers->flags |= PEERS_F_RESYNC_LOCALFINISHED;
2486 else
2487 peers->flags |= PEERS_F_RESYNC_REMOTEFINISHED;
2488 }
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002489 }
2490 peer->confirm++;
2491 }
2492 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCPARTIAL) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002493 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2494 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002495 if (peer->flags & PEER_F_LEARN_ASSIGN) {
2496 peer->flags &= ~PEER_F_LEARN_ASSIGN;
2497 peers->flags &= ~(PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
2498
Emeric Brunccdfbae2021-04-28 12:59:35 +02002499 if (peer->local)
2500 peers->flags |= PEERS_F_RESYNC_LOCALPARTIAL;
2501 else
2502 peers->flags |= PEERS_F_RESYNC_REMOTEPARTIAL;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002503 peer->flags |= PEER_F_LEARN_NOTUP2DATE;
Frédéric Lécaille54bff832019-03-26 10:25:20 +01002504 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002505 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
2506 }
2507 peer->confirm++;
2508 }
2509 else if (msg_head[1] == PEER_MSG_CTRL_RESYNCCONFIRM) {
2510 struct shared_table *st;
2511
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002512 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2513 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002514 /* If stopping state */
2515 if (stopping) {
2516 /* Close session, push resync no more needed */
2517 peer->flags |= PEER_F_TEACH_COMPLETE;
2518 appctx->st0 = PEER_SESS_ST_END;
2519 return 0;
2520 }
2521 for (st = peer->tables; st; st = st->next) {
2522 st->update = st->last_pushed = st->teaching_origin;
2523 st->flags = 0;
2524 }
2525
2526 /* reset teaching flags to 0 */
2527 peer->flags &= PEER_TEACH_RESET;
2528 }
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002529 else if (msg_head[1] == PEER_MSG_CTRL_HEARTBEAT) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002530 TRACE_PROTO("received control message", PEERS_EV_CTRLMSG,
2531 NULL, &msg_head[1], peers->local->id, peer->id);
Frédéric Lécaille54bff832019-03-26 10:25:20 +01002532 peer->reconnect = tick_add(now_ms, MS_TO_TICKS(PEER_RECONNECT_TIMEOUT));
Frédéric Lécaille33cab3c2019-11-06 11:51:26 +01002533 peer->rx_hbt++;
Frédéric Lécaille645635d2019-02-11 17:49:39 +01002534 }
Frédéric Lécaille444243c2019-01-24 15:40:11 +01002535 }
2536 else if (msg_head[0] == PEER_MSG_CLASS_STICKTABLE) {
2537 if (msg_head[1] == PEER_MSG_STKT_DEFINE) {
2538 if (!peer_treat_definemsg(appctx, peer, msg_cur, msg_end, totl))
2539 return 0;
2540 }
2541 else if (msg_head[1] == PEER_MSG_STKT_SWITCH) {
2542 if (!peer_treat_switchmsg(appctx, peer, msg_cur, msg_end))
2543 return 0;
2544 }
2545 else if (msg_head[1] == PEER_MSG_STKT_UPDATE ||
2546 msg_head[1] == PEER_MSG_STKT_INCUPDATE ||
2547 msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED ||
2548 msg_head[1] == PEER_MSG_STKT_INCUPDATE_TIMED) {
2549 int update, expire;
2550
2551 update = msg_head[1] == PEER_MSG_STKT_UPDATE || msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED;
2552 expire = msg_head[1] == PEER_MSG_STKT_UPDATE_TIMED || msg_head[1] == PEER_MSG_STKT_INCUPDATE_TIMED;
2553 if (!peer_treat_updatemsg(appctx, peer, update, expire,
2554 msg_cur, msg_end, msg_len, totl))
2555 return 0;
2556
2557 }
2558 else if (msg_head[1] == PEER_MSG_STKT_ACK) {
2559 if (!peer_treat_ackmsg(appctx, peer, msg_cur, msg_end))
2560 return 0;
2561 }
2562 }
2563 else if (msg_head[0] == PEER_MSG_CLASS_RESERVED) {
2564 appctx->st0 = PEER_SESS_ST_ERRPROTO;
2565 return 0;
2566 }
2567
2568 return 1;
2569}
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002570
2571
2572/*
2573 * Send any message to <peer> peer.
2574 * Returns 1 if succeeded, or -1 or 0 if failed.
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05002575 * -1 means an internal error occurred, 0 is for a peer protocol error leading
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002576 * to a peer state change (from the peer I/O handler point of view).
2577 */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002578static inline int peer_send_msgs(struct appctx *appctx,
2579 struct peer *peer, struct peers *peers)
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002580{
2581 int repl;
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002582
2583 /* Need to request a resync */
2584 if ((peer->flags & PEER_F_LEARN_ASSIGN) &&
2585 (peers->flags & PEERS_F_RESYNC_ASSIGN) &&
2586 !(peers->flags & PEERS_F_RESYNC_PROCESS)) {
2587
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002588 repl = peer_send_resync_reqmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002589 if (repl <= 0)
2590 return repl;
2591
2592 peers->flags |= PEERS_F_RESYNC_PROCESS;
2593 }
2594
2595 /* Nothing to read, now we start to write */
2596 if (peer->tables) {
2597 struct shared_table *st;
2598 struct shared_table *last_local_table;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02002599 int updates_sent = 0;
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002600
2601 last_local_table = peer->last_local_table;
2602 if (!last_local_table)
2603 last_local_table = peer->tables;
2604 st = last_local_table->next;
2605
2606 while (1) {
2607 if (!st)
2608 st = peer->tables;
2609
2610 /* It remains some updates to ack */
2611 if (st->last_get != st->last_acked) {
2612 repl = peer_send_ackmsg(st, appctx);
2613 if (repl <= 0)
2614 return repl;
2615
2616 st->last_acked = st->last_get;
2617 }
2618
2619 if (!(peer->flags & PEER_F_TEACH_PROCESS)) {
Willy Tarreau76642222022-10-11 12:02:50 +02002620 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002621 if (!(peer->flags & PEER_F_LEARN_ASSIGN) &&
Emeric Brun8e7a13e2021-04-28 11:48:15 +02002622 (st->last_pushed != st->table->localupdate)) {
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002623
2624 repl = peer_send_teach_process_msgs(appctx, peer, st);
2625 if (repl <= 0) {
Willy Tarreau76642222022-10-11 12:02:50 +02002626 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002627 return repl;
2628 }
2629 }
Willy Tarreau76642222022-10-11 12:02:50 +02002630 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002631 }
Emeric Brun1675ada2021-04-22 18:13:13 +02002632 else if (!(peer->flags & PEER_F_TEACH_FINISHED)) {
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002633 if (!(st->flags & SHTABLE_F_TEACH_STAGE1)) {
2634 repl = peer_send_teach_stage1_msgs(appctx, peer, st);
2635 if (repl <= 0)
2636 return repl;
2637 }
2638
2639 if (!(st->flags & SHTABLE_F_TEACH_STAGE2)) {
2640 repl = peer_send_teach_stage2_msgs(appctx, peer, st);
2641 if (repl <= 0)
2642 return repl;
2643 }
2644 }
2645
2646 if (st == last_local_table)
2647 break;
2648 st = st->next;
Willy Tarreau8bd146d2022-07-19 20:17:38 +02002649
2650 updates_sent++;
2651 if (updates_sent >= peers_max_updates_at_once) {
2652 /* pretend we're full so that we get back ASAP */
2653 struct stconn *sc = appctx_sc(appctx);
2654
2655 sc_need_room(sc);
2656 return -1;
2657 }
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002658 }
2659 }
2660
2661 if ((peer->flags & PEER_F_TEACH_PROCESS) && !(peer->flags & PEER_F_TEACH_FINISHED)) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002662 repl = peer_send_resync_finishedmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002663 if (repl <= 0)
2664 return repl;
2665
2666 /* flag finished message sent */
2667 peer->flags |= PEER_F_TEACH_FINISHED;
2668 }
2669
2670 /* Confirm finished or partial messages */
2671 while (peer->confirm) {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01002672 repl = peer_send_resync_confirmsg(appctx, peer, peers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01002673 if (repl <= 0)
2674 return repl;
2675
2676 peer->confirm--;
2677 }
2678
2679 return 1;
2680}
2681
Frédéric Lécaille95203f22019-01-23 19:38:11 +01002682/*
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002683 * Read and parse a first line of a "hello" peer protocol message.
2684 * Returns 0 if could not read a line, -1 if there was a read error or
2685 * the line is malformed, 1 if succeeded.
2686 */
2687static inline int peer_getline_version(struct appctx *appctx,
2688 unsigned int *maj_ver, unsigned int *min_ver)
2689{
2690 int reql;
2691
2692 reql = peer_getline(appctx);
2693 if (!reql)
2694 return 0;
2695
2696 if (reql < 0)
2697 return -1;
2698
2699 /* test protocol */
2700 if (strncmp(PEER_SESSION_PROTO_NAME " ", trash.area, proto_len + 1) != 0) {
2701 appctx->st0 = PEER_SESS_ST_EXIT;
2702 appctx->st1 = PEER_SESS_SC_ERRPROTO;
2703 return -1;
2704 }
2705 if (peer_get_version(trash.area + proto_len + 1, maj_ver, min_ver) == -1 ||
2706 *maj_ver != PEER_MAJOR_VER || *min_ver > PEER_MINOR_VER) {
2707 appctx->st0 = PEER_SESS_ST_EXIT;
2708 appctx->st1 = PEER_SESS_SC_ERRVERSION;
2709 return -1;
2710 }
2711
2712 return 1;
2713}
2714
2715/*
2716 * Read and parse a second line of a "hello" peer protocol message.
2717 * Returns 0 if could not read a line, -1 if there was a read error or
2718 * the line is malformed, 1 if succeeded.
2719 */
2720static inline int peer_getline_host(struct appctx *appctx)
2721{
2722 int reql;
2723
2724 reql = peer_getline(appctx);
2725 if (!reql)
2726 return 0;
2727
2728 if (reql < 0)
2729 return -1;
2730
2731 /* test hostname match */
2732 if (strcmp(localpeer, trash.area) != 0) {
2733 appctx->st0 = PEER_SESS_ST_EXIT;
2734 appctx->st1 = PEER_SESS_SC_ERRHOST;
2735 return -1;
2736 }
2737
2738 return 1;
2739}
2740
2741/*
2742 * Read and parse a last line of a "hello" peer protocol message.
2743 * Returns 0 if could not read a character, -1 if there was a read error or
2744 * the line is malformed, 1 if succeeded.
2745 * Set <curpeer> accordingly (the remote peer sending the "hello" message).
2746 */
2747static inline int peer_getline_last(struct appctx *appctx, struct peer **curpeer)
2748{
2749 char *p;
2750 int reql;
2751 struct peer *peer;
Willy Tarreau0698c802022-05-11 14:09:57 +02002752 struct stream *s = appctx_strm(appctx);
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002753 struct peers *peers = strm_fe(s)->parent;
2754
2755 reql = peer_getline(appctx);
2756 if (!reql)
2757 return 0;
2758
2759 if (reql < 0)
2760 return -1;
2761
2762 /* parse line "<peer name> <pid> <relative_pid>" */
2763 p = strchr(trash.area, ' ');
2764 if (!p) {
2765 appctx->st0 = PEER_SESS_ST_EXIT;
2766 appctx->st1 = PEER_SESS_SC_ERRPROTO;
2767 return -1;
2768 }
2769 *p = 0;
2770
2771 /* lookup known peer */
2772 for (peer = peers->remote; peer; peer = peer->next) {
2773 if (strcmp(peer->id, trash.area) == 0)
2774 break;
2775 }
2776
2777 /* if unknown peer */
2778 if (!peer) {
2779 appctx->st0 = PEER_SESS_ST_EXIT;
2780 appctx->st1 = PEER_SESS_SC_ERRPEER;
2781 return -1;
2782 }
2783 *curpeer = peer;
2784
2785 return 1;
2786}
2787
2788/*
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002789 * Init <peer> peer after having accepted it at peer protocol level.
2790 */
2791static inline void init_accepted_peer(struct peer *peer, struct peers *peers)
2792{
2793 struct shared_table *st;
2794
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002795 peer->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002796 /* Register status code */
2797 peer->statuscode = PEER_SESS_SC_SUCCESSCODE;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02002798 peer->last_hdshk = now_ms;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002799
2800 /* Awake main task */
2801 task_wakeup(peers->sync_task, TASK_WOKEN_MSG);
2802
2803 /* Init confirm counter */
2804 peer->confirm = 0;
2805
2806 /* Init cursors */
2807 for (st = peer->tables; st ; st = st->next) {
2808 st->last_get = st->last_acked = 0;
Willy Tarreau76642222022-10-11 12:02:50 +02002809 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Emeric Brund9729da2021-02-23 16:50:53 +01002810 /* if st->update appears to be in future it means
2811 * that the last acked value is very old and we
2812 * remain unconnected a too long time to use this
Ilya Shipitsin4a689da2022-10-29 09:34:32 +05002813 * acknowledgement as a reset.
Emeric Brund9729da2021-02-23 16:50:53 +01002814 * We should update the protocol to be able to
2815 * signal the remote peer that it needs a full resync.
2816 * Here a partial fix consist to set st->update at
2817 * the max past value
2818 */
2819 if ((int)(st->table->localupdate - st->update) < 0)
2820 st->update = st->table->localupdate + (2147483648U);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002821 st->teaching_origin = st->last_pushed = st->update;
Emeric Brun1a6b43e2021-04-20 14:43:46 +02002822 st->flags = 0;
Emeric Bruncc9cce92021-02-23 17:08:08 +01002823 if ((int)(st->last_pushed - st->table->commitupdate) > 0)
2824 st->table->commitupdate = st->last_pushed;
Willy Tarreau76642222022-10-11 12:02:50 +02002825 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002826 }
2827
2828 /* reset teaching and learning flags to 0 */
2829 peer->flags &= PEER_TEACH_RESET;
2830 peer->flags &= PEER_LEARN_RESET;
2831
2832 /* if current peer is local */
2833 if (peer->local) {
Ilya Shipitsin46a030c2020-07-05 16:36:08 +05002834 /* if current host need resyncfrom local and no process assigned */
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002835 if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMLOCAL &&
2836 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2837 /* assign local peer for a lesson, consider lesson already requested */
2838 peer->flags |= PEER_F_LEARN_ASSIGN;
2839 peers->flags |= (PEERS_F_RESYNC_ASSIGN|PEERS_F_RESYNC_PROCESS);
Emeric Brunccdfbae2021-04-28 12:59:35 +02002840 peers->flags |= PEERS_F_RESYNC_LOCALASSIGN;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002841 }
2842
2843 }
2844 else if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE &&
2845 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2846 /* assign peer for a lesson */
2847 peer->flags |= PEER_F_LEARN_ASSIGN;
2848 peers->flags |= PEERS_F_RESYNC_ASSIGN;
Emeric Brunccdfbae2021-04-28 12:59:35 +02002849 peers->flags |= PEERS_F_RESYNC_REMOTEASSIGN;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002850 }
2851}
2852
2853/*
2854 * Init <peer> peer after having connected it at peer protocol level.
2855 */
2856static inline void init_connected_peer(struct peer *peer, struct peers *peers)
2857{
2858 struct shared_table *st;
2859
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002860 peer->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002861 /* Init cursors */
2862 for (st = peer->tables; st ; st = st->next) {
2863 st->last_get = st->last_acked = 0;
Willy Tarreau76642222022-10-11 12:02:50 +02002864 HA_RWLOCK_WRLOCK(STK_TABLE_LOCK, &st->table->lock);
Emeric Brund9729da2021-02-23 16:50:53 +01002865 /* if st->update appears to be in future it means
2866 * that the last acked value is very old and we
2867 * remain unconnected a too long time to use this
Ilya Shipitsin4a689da2022-10-29 09:34:32 +05002868 * acknowledgement as a reset.
Emeric Brund9729da2021-02-23 16:50:53 +01002869 * We should update the protocol to be able to
2870 * signal the remote peer that it needs a full resync.
2871 * Here a partial fix consist to set st->update at
2872 * the max past value.
2873 */
2874 if ((int)(st->table->localupdate - st->update) < 0)
2875 st->update = st->table->localupdate + (2147483648U);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002876 st->teaching_origin = st->last_pushed = st->update;
Emeric Brun1a6b43e2021-04-20 14:43:46 +02002877 st->flags = 0;
Emeric Bruncc9cce92021-02-23 17:08:08 +01002878 if ((int)(st->last_pushed - st->table->commitupdate) > 0)
2879 st->table->commitupdate = st->last_pushed;
Willy Tarreau76642222022-10-11 12:02:50 +02002880 HA_RWLOCK_WRUNLOCK(STK_TABLE_LOCK, &st->table->lock);
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002881 }
2882
2883 /* Init confirm counter */
2884 peer->confirm = 0;
2885
2886 /* reset teaching and learning flags to 0 */
2887 peer->flags &= PEER_TEACH_RESET;
2888 peer->flags &= PEER_LEARN_RESET;
2889
2890 /* If current peer is local */
2891 if (peer->local) {
2892 /* flag to start to teach lesson */
2893 peer->flags |= PEER_F_TEACH_PROCESS;
2894 }
2895 else if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE &&
2896 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
2897 /* If peer is remote and resync from remote is needed,
2898 and no peer currently assigned */
2899
2900 /* assign peer for a lesson */
2901 peer->flags |= PEER_F_LEARN_ASSIGN;
2902 peers->flags |= PEERS_F_RESYNC_ASSIGN;
Emeric Brunccdfbae2021-04-28 12:59:35 +02002903 peers->flags |= PEERS_F_RESYNC_REMOTEASSIGN;
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01002904 }
2905}
2906
2907/*
Ilya Shipitsin46a030c2020-07-05 16:36:08 +05002908 * IO Handler to handle message exchange with a peer
Emeric Brun2b920a12010-09-23 18:30:22 +02002909 */
Willy Tarreau00a37f02015-04-13 12:05:19 +02002910static void peer_io_handler(struct appctx *appctx)
Emeric Brun2b920a12010-09-23 18:30:22 +02002911{
Willy Tarreauc12b3212022-05-27 11:08:15 +02002912 struct stconn *sc = appctx_sc(appctx);
Willy Tarreauda304902022-05-27 10:44:04 +02002913 struct stream *s = __sc_strm(sc);
Vincent Bernat3c2f2f22016-04-03 13:48:42 +02002914 struct peers *curpeers = strm_fe(s)->parent;
Emeric Brun80527f52017-06-19 17:46:37 +02002915 struct peer *curpeer = NULL;
Emeric Brun2b920a12010-09-23 18:30:22 +02002916 int reql = 0;
2917 int repl = 0;
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002918 unsigned int maj_ver, min_ver;
Willy Tarreau2d372c22018-11-05 17:12:27 +01002919 int prev_state;
Emeric Brun2b920a12010-09-23 18:30:22 +02002920
Christopher Faulet3d949012023-03-31 11:21:06 +02002921 if (unlikely(se_fl_test(appctx->sedesc, (SE_FL_EOS|SE_FL_ERROR|SE_FL_SHR|SE_FL_SHW)))) {
2922 co_skip(sc_oc(sc), co_data(sc_oc(sc)));
2923 goto out;
2924 }
2925
Joseph Herlant82b2f542018-11-15 12:19:14 -08002926 /* Check if the input buffer is available. */
Willy Tarreauda304902022-05-27 10:44:04 +02002927 if (sc_ib(sc)->size == 0) {
2928 sc_need_room(sc);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01002929 goto out;
2930 }
Christopher Fauleta73e59b2016-12-09 17:30:18 +01002931
Emeric Brun2b920a12010-09-23 18:30:22 +02002932 while (1) {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002933 prev_state = appctx->st0;
Emeric Brun2b920a12010-09-23 18:30:22 +02002934switchstate:
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002935 maj_ver = min_ver = (unsigned int)-1;
Willy Tarreau7b4b4992013-12-01 09:15:12 +01002936 switch(appctx->st0) {
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002937 case PEER_SESS_ST_ACCEPT:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002938 prev_state = appctx->st0;
Willy Tarreau455caef2022-05-05 20:16:16 +02002939 appctx->svcctx = NULL;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002940 appctx->st0 = PEER_SESS_ST_GETVERSION;
Willy Tarreau79108252022-11-14 07:13:22 +01002941 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002942 case PEER_SESS_ST_GETVERSION:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002943 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002944 reql = peer_getline_version(appctx, &maj_ver, &min_ver);
2945 if (reql <= 0) {
2946 if (!reql)
2947 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002948 goto switchstate;
2949 }
2950
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002951 appctx->st0 = PEER_SESS_ST_GETHOST;
Willy Tarreau79108252022-11-14 07:13:22 +01002952 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002953 case PEER_SESS_ST_GETHOST:
Willy Tarreau2d372c22018-11-05 17:12:27 +01002954 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002955 reql = peer_getline_host(appctx);
2956 if (reql <= 0) {
2957 if (!reql)
2958 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002959 goto switchstate;
2960 }
2961
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002962 appctx->st0 = PEER_SESS_ST_GETPEER;
Willy Tarreau79108252022-11-14 07:13:22 +01002963 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01002964 case PEER_SESS_ST_GETPEER: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01002965 prev_state = appctx->st0;
Frédéric Lécaille3f0fb9d2019-01-25 08:30:29 +01002966 reql = peer_getline_last(appctx, &curpeer);
2967 if (reql <= 0) {
2968 if (!reql)
2969 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02002970 goto switchstate;
2971 }
Emeric Brun2b920a12010-09-23 18:30:22 +02002972
Christopher Faulet2a944ee2017-11-07 10:42:54 +01002973 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Willy Tarreau9df94c22016-10-31 18:42:52 +01002974 if (curpeer->appctx && curpeer->appctx != appctx) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02002975 if (curpeer->local) {
2976 /* Local connection, reply a retry */
2977 appctx->st0 = PEER_SESS_ST_EXIT;
2978 appctx->st1 = PEER_SESS_SC_TRYAGAIN;
2979 goto switchstate;
Emeric Brun2b920a12010-09-23 18:30:22 +02002980 }
Emeric Brun80527f52017-06-19 17:46:37 +02002981
2982 /* we're killing a connection, we must apply a random delay before
2983 * retrying otherwise the other end will do the same and we can loop
2984 * for a while.
2985 */
Willy Tarreau52bf8392020-03-08 00:42:37 +01002986 curpeer->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
Emeric Brun9ef2ad72019-04-02 17:22:01 +02002987 peer_session_forceshutdown(curpeer);
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02002988 curpeer->heartbeat = TICK_ETERNITY;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02002989 curpeer->coll++;
Emeric Brun2b920a12010-09-23 18:30:22 +02002990 }
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02002991 if (maj_ver != (unsigned int)-1 && min_ver != (unsigned int)-1) {
2992 if (min_ver == PEER_DWNGRD_MINOR_VER) {
2993 curpeer->flags |= PEER_F_DWNGRD;
2994 }
2995 else {
2996 curpeer->flags &= ~PEER_F_DWNGRD;
2997 }
2998 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02002999 curpeer->appctx = appctx;
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02003000 curpeer->flags |= PEER_F_ALIVE;
Willy Tarreau455caef2022-05-05 20:16:16 +02003001 appctx->svcctx = curpeer;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003002 appctx->st0 = PEER_SESS_ST_SENDSUCCESS;
Willy Tarreau4781b152021-04-06 13:53:36 +02003003 _HA_ATOMIC_INC(&active_peers);
Emeric Brun2b920a12010-09-23 18:30:22 +02003004 }
Willy Tarreau79108252022-11-14 07:13:22 +01003005 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003006 case PEER_SESS_ST_SENDSUCCESS: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003007 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003008 if (!curpeer) {
Willy Tarreau455caef2022-05-05 20:16:16 +02003009 curpeer = appctx->svcctx;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003010 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003011 if (curpeer->appctx != appctx) {
3012 appctx->st0 = PEER_SESS_ST_END;
3013 goto switchstate;
3014 }
3015 }
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003016
3017 repl = peer_send_status_successmsg(appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02003018 if (repl <= 0) {
3019 if (repl == -1)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003020 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02003021 goto switchstate;
3022 }
3023
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01003024 init_accepted_peer(curpeer, curpeers);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003025
Emeric Brun2b920a12010-09-23 18:30:22 +02003026 /* switch to waiting message state */
Willy Tarreau4781b152021-04-06 13:53:36 +02003027 _HA_ATOMIC_INC(&connected_peers);
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003028 appctx->st0 = PEER_SESS_ST_WAITMSG;
Emeric Brun2b920a12010-09-23 18:30:22 +02003029 goto switchstate;
3030 }
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003031 case PEER_SESS_ST_CONNECT: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003032 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003033 if (!curpeer) {
Willy Tarreau455caef2022-05-05 20:16:16 +02003034 curpeer = appctx->svcctx;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003035 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003036 if (curpeer->appctx != appctx) {
3037 appctx->st0 = PEER_SESS_ST_END;
3038 goto switchstate;
3039 }
3040 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003041
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003042 repl = peer_send_hellomsg(appctx, curpeer);
Emeric Brun2b920a12010-09-23 18:30:22 +02003043 if (repl <= 0) {
3044 if (repl == -1)
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003045 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02003046 goto switchstate;
3047 }
3048
3049 /* switch to the waiting statuscode state */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003050 appctx->st0 = PEER_SESS_ST_GETSTATUS;
Emeric Brun2b920a12010-09-23 18:30:22 +02003051 }
Willy Tarreau79108252022-11-14 07:13:22 +01003052 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003053 case PEER_SESS_ST_GETSTATUS: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003054 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003055 if (!curpeer) {
Willy Tarreau455caef2022-05-05 20:16:16 +02003056 curpeer = appctx->svcctx;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003057 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003058 if (curpeer->appctx != appctx) {
3059 appctx->st0 = PEER_SESS_ST_END;
3060 goto switchstate;
3061 }
3062 }
3063
Christopher Faulet642170a2022-07-27 10:49:31 +02003064 if (sc_ic(sc)->flags & CF_WROTE_DATA)
Emeric Brunb3971ab2015-05-12 18:49:09 +02003065 curpeer->statuscode = PEER_SESS_SC_CONNECTEDCODE;
Emeric Brun2b920a12010-09-23 18:30:22 +02003066
Frédéric Lécaillece025572019-01-21 13:38:06 +01003067 reql = peer_getline(appctx);
3068 if (!reql)
3069 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02003070
Frédéric Lécaillece025572019-01-21 13:38:06 +01003071 if (reql < 0)
3072 goto switchstate;
Emeric Brun2b920a12010-09-23 18:30:22 +02003073
3074 /* Register status code */
Willy Tarreau843b7cb2018-07-13 10:54:26 +02003075 curpeer->statuscode = atoi(trash.area);
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003076 curpeer->last_hdshk = now_ms;
Emeric Brun2b920a12010-09-23 18:30:22 +02003077
3078 /* Awake main task */
Frédéric Lécailleed2b4a62017-07-13 09:07:09 +02003079 task_wakeup(curpeers->sync_task, TASK_WOKEN_MSG);
Emeric Brun2b920a12010-09-23 18:30:22 +02003080
3081 /* If status code is success */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003082 if (curpeer->statuscode == PEER_SESS_SC_SUCCESSCODE) {
Frédéric Lécaille4b2fd9b2019-01-25 08:58:41 +01003083 init_connected_peer(curpeer, curpeers);
Emeric Brun2b920a12010-09-23 18:30:22 +02003084 }
3085 else {
Frédéric Lécaille523cc9e2016-10-12 17:30:30 +02003086 if (curpeer->statuscode == PEER_SESS_SC_ERRVERSION)
3087 curpeer->flags |= PEER_F_DWNGRD;
Emeric Brun2b920a12010-09-23 18:30:22 +02003088 /* Status code is not success, abort */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003089 appctx->st0 = PEER_SESS_ST_END;
Emeric Brun2b920a12010-09-23 18:30:22 +02003090 goto switchstate;
3091 }
Willy Tarreau4781b152021-04-06 13:53:36 +02003092 _HA_ATOMIC_INC(&connected_peers);
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003093 appctx->st0 = PEER_SESS_ST_WAITMSG;
Emeric Brun2b920a12010-09-23 18:30:22 +02003094 }
Willy Tarreau79108252022-11-14 07:13:22 +01003095 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003096 case PEER_SESS_ST_WAITMSG: {
Emeric Brunb3971ab2015-05-12 18:49:09 +02003097 uint32_t msg_len = 0;
Willy Tarreau843b7cb2018-07-13 10:54:26 +02003098 char *msg_cur = trash.area;
3099 char *msg_end = trash.area;
Willy Tarreau1dfd4f12020-11-13 14:10:20 +01003100 unsigned char msg_head[7]; // 2 + 5 for varint32
Emeric Brun2b920a12010-09-23 18:30:22 +02003101 int totl = 0;
3102
Willy Tarreau2d372c22018-11-05 17:12:27 +01003103 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003104 if (!curpeer) {
Willy Tarreau455caef2022-05-05 20:16:16 +02003105 curpeer = appctx->svcctx;
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003106 HA_SPIN_LOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003107 if (curpeer->appctx != appctx) {
3108 appctx->st0 = PEER_SESS_ST_END;
3109 goto switchstate;
3110 }
3111 }
3112
Frédéric Lécaille95203f22019-01-23 19:38:11 +01003113 reql = peer_recv_msg(appctx, (char *)msg_head, sizeof msg_head, &msg_len, &totl);
3114 if (reql <= 0) {
3115 if (reql == -1)
3116 goto switchstate;
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01003117 goto send_msgs;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003118 }
Willy Tarreau86a446e2013-11-25 23:02:37 +01003119
Frédéric Lécaille95203f22019-01-23 19:38:11 +01003120 msg_end += msg_len;
Frédéric Lécaille444243c2019-01-24 15:40:11 +01003121 if (!peer_treat_awaited_msg(appctx, curpeer, msg_head, &msg_cur, msg_end, msg_len, totl))
Emeric Brun2b920a12010-09-23 18:30:22 +02003122 goto switchstate;
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01003123
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003124 curpeer->flags |= PEER_F_ALIVE;
3125
Emeric Brun2b920a12010-09-23 18:30:22 +02003126 /* skip consumed message */
Willy Tarreauda304902022-05-27 10:44:04 +02003127 co_skip(sc_oc(sc), totl);
Emeric Brun2b920a12010-09-23 18:30:22 +02003128 /* loop on that state to peek next message */
Willy Tarreau72d6c162013-04-11 16:14:13 +02003129 goto switchstate;
3130
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01003131send_msgs:
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003132 if (curpeer->flags & PEER_F_HEARTBEAT) {
3133 curpeer->flags &= ~PEER_F_HEARTBEAT;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003134 repl = peer_send_heartbeatmsg(appctx, curpeer, curpeers);
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003135 if (repl <= 0) {
3136 if (repl == -1)
3137 goto out;
3138 goto switchstate;
3139 }
Frédéric Lécaille33cab3c2019-11-06 11:51:26 +01003140 curpeer->tx_hbt++;
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003141 }
Frédéric Lécaillebe825e52019-01-24 18:28:44 +01003142 /* we get here when a peer_recv_msg() returns 0 in reql */
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003143 repl = peer_send_msgs(appctx, curpeer, curpeers);
Frédéric Lécaille25e1d5e2019-01-24 17:33:48 +01003144 if (repl <= 0) {
3145 if (repl == -1)
3146 goto out;
3147 goto switchstate;
Emeric Brun597b26e2016-08-12 11:23:31 +02003148 }
3149
Emeric Brun2b920a12010-09-23 18:30:22 +02003150 /* noting more to do */
3151 goto out;
3152 }
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003153 case PEER_SESS_ST_EXIT:
Willy Tarreau2d372c22018-11-05 17:12:27 +01003154 if (prev_state == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02003155 _HA_ATOMIC_DEC(&connected_peers);
Willy Tarreau2d372c22018-11-05 17:12:27 +01003156 prev_state = appctx->st0;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003157 if (peer_send_status_errormsg(appctx) == -1)
3158 goto out;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003159 appctx->st0 = PEER_SESS_ST_END;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003160 goto switchstate;
3161 case PEER_SESS_ST_ERRSIZE: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003162 if (prev_state == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02003163 _HA_ATOMIC_DEC(&connected_peers);
Willy Tarreau2d372c22018-11-05 17:12:27 +01003164 prev_state = appctx->st0;
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003165 if (peer_send_error_size_limitmsg(appctx) == -1)
3166 goto out;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003167 appctx->st0 = PEER_SESS_ST_END;
3168 goto switchstate;
3169 }
3170 case PEER_SESS_ST_ERRPROTO: {
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003171 TRACE_PROTO("protocol error", PEERS_EV_PROTOERR,
3172 NULL, curpeer, &prev_state);
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01003173 if (curpeer)
3174 curpeer->proto_err++;
Willy Tarreau2d372c22018-11-05 17:12:27 +01003175 if (prev_state == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02003176 _HA_ATOMIC_DEC(&connected_peers);
Willy Tarreau2d372c22018-11-05 17:12:27 +01003177 prev_state = appctx->st0;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003178 if (peer_send_error_protomsg(appctx) == -1) {
3179 TRACE_PROTO("could not send error message", PEERS_EV_PROTOERR);
Frédéric Lécaille7d0ceee2019-01-24 14:24:05 +01003180 goto out;
Frédéric Lécailleda2b0842021-01-15 16:21:28 +01003181 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003182 appctx->st0 = PEER_SESS_ST_END;
Willy Tarreau2d372c22018-11-05 17:12:27 +01003183 prev_state = appctx->st0;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003184 }
Willy Tarreau79108252022-11-14 07:13:22 +01003185 __fallthrough;
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003186 case PEER_SESS_ST_END: {
Willy Tarreau2d372c22018-11-05 17:12:27 +01003187 if (prev_state == PEER_SESS_ST_WAITMSG)
Willy Tarreau4781b152021-04-06 13:53:36 +02003188 _HA_ATOMIC_DEC(&connected_peers);
Willy Tarreau2d372c22018-11-05 17:12:27 +01003189 prev_state = appctx->st0;
Emeric Brun80527f52017-06-19 17:46:37 +02003190 if (curpeer) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003191 HA_SPIN_UNLOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003192 curpeer = NULL;
3193 }
Christopher Faulet3d949012023-03-31 11:21:06 +02003194 se_fl_set(appctx->sedesc, SE_FL_EOS|SE_FL_EOI);
3195 co_skip(sc_oc(sc), co_data(sc_oc(sc)));
Willy Tarreau828824a2015-04-19 17:20:03 +02003196 goto out;
Emeric Brun2b920a12010-09-23 18:30:22 +02003197 }
3198 }
3199 }
3200out:
Christopher Faulet9a790f62023-03-16 14:40:03 +01003201 sc_opposite(sc)->flags |= SC_FL_RCV_ONCE;
Emeric Brun80527f52017-06-19 17:46:37 +02003202
3203 if (curpeer)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003204 HA_SPIN_UNLOCK(PEER_LOCK, &curpeer->lock);
Emeric Brun2b920a12010-09-23 18:30:22 +02003205 return;
3206}
3207
Willy Tarreau30576452015-04-13 13:50:30 +02003208static struct applet peer_applet = {
Willy Tarreau3fdb3662012-11-12 00:42:33 +01003209 .obj_type = OBJ_TYPE_APPLET,
Willy Tarreaub24281b2011-02-13 13:16:36 +01003210 .name = "<PEER>", /* used for logging */
3211 .fct = peer_io_handler,
Christopher Faulet6712dc62022-05-12 15:36:11 +02003212 .init = peer_session_init,
Aman Gupta9a13e842012-04-02 18:57:53 -07003213 .release = peer_session_release,
Willy Tarreaub24281b2011-02-13 13:16:36 +01003214};
Emeric Brun2b920a12010-09-23 18:30:22 +02003215
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003216
Emeric Brun2b920a12010-09-23 18:30:22 +02003217/*
3218 * Use this function to force a close of a peer session
3219 */
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003220static void peer_session_forceshutdown(struct peer *peer)
Emeric Brun2b920a12010-09-23 18:30:22 +02003221{
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003222 struct appctx *appctx = peer->appctx;
3223
Frédéric Lécaille5df11902017-06-13 16:39:57 +02003224 /* Note that the peer sessions which have just been created
3225 * (->st0 == PEER_SESS_ST_CONNECT) must not
3226 * be shutdown, if not, the TCP session will never be closed
3227 * and stay in CLOSE_WAIT state after having been closed by
3228 * the remote side.
3229 */
3230 if (!appctx || appctx->st0 == PEER_SESS_ST_CONNECT)
Willy Tarreau7b4b4992013-12-01 09:15:12 +01003231 return;
3232
Willy Tarreau81bc3b02016-10-31 17:37:39 +01003233 if (appctx->applet != &peer_applet)
3234 return;
3235
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003236 __peer_session_deinit(peer);
3237
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003238 appctx->st0 = PEER_SESS_ST_END;
Willy Tarreau78c0c502016-10-31 17:32:20 +01003239 appctx_wakeup(appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02003240}
3241
Willy Tarreau91d96282015-03-13 15:47:26 +01003242/* Pre-configures a peers frontend to accept incoming connections */
3243void peers_setup_frontend(struct proxy *fe)
3244{
Willy Tarreau69530f52023-04-28 09:16:15 +02003245 fe->last_change = ns_to_sec(now_ns);
Frédéric Lécaillec06b5d42018-04-26 10:06:41 +02003246 fe->cap = PR_CAP_FE | PR_CAP_BE;
Willy Tarreaua389c9e2020-10-07 17:49:42 +02003247 fe->mode = PR_MODE_PEERS;
Willy Tarreau91d96282015-03-13 15:47:26 +01003248 fe->maxconn = 0;
3249 fe->conn_retries = CONN_RETRIES;
Christopher Faulet13db4bd2022-08-29 11:32:26 +02003250 fe->timeout.connect = MS_TO_TICKS(1000);
Willy Tarreau91d96282015-03-13 15:47:26 +01003251 fe->timeout.client = MS_TO_TICKS(5000);
Christopher Faulet13db4bd2022-08-29 11:32:26 +02003252 fe->timeout.server = MS_TO_TICKS(5000);
Willy Tarreaud1d48d42015-03-13 16:15:46 +01003253 fe->accept = frontend_accept;
Willy Tarreauf87ab942015-03-13 15:55:16 +01003254 fe->default_target = &peer_applet.obj_type;
Willy Tarreau91d96282015-03-13 15:47:26 +01003255 fe->options2 |= PR_O2_INDEPSTR | PR_O2_SMARTCON | PR_O2_SMARTACC;
3256}
3257
Emeric Brun2b920a12010-09-23 18:30:22 +02003258/*
Willy Tarreaubd55e312010-11-11 10:55:09 +01003259 * Create a new peer session in assigned state (connect will start automatically)
Emeric Brun2b920a12010-09-23 18:30:22 +02003260 */
Willy Tarreau9df94c22016-10-31 18:42:52 +01003261static struct appctx *peer_session_create(struct peers *peers, struct peer *peer)
Emeric Brun2b920a12010-09-23 18:30:22 +02003262{
Willy Tarreau7b4b4992013-12-01 09:15:12 +01003263 struct appctx *appctx;
Maciej Zdeb34e40852022-05-16 17:27:28 +02003264 unsigned int thr = 0;
3265 int idx;
Emeric Brun2b920a12010-09-23 18:30:22 +02003266
Frédéric Lécaille2b0ba542021-01-18 15:14:39 +01003267 peer->new_conn++;
Christopher Fauletab4b0942022-07-26 19:14:36 +02003268 peer->reconnect = tick_add(now_ms, (stopping ? MS_TO_TICKS(PEER_LOCAL_RECONNECT_TIMEOUT) : MS_TO_TICKS(PEER_RECONNECT_TIMEOUT)));
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02003269 peer->heartbeat = TICK_ETERNITY;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003270 peer->statuscode = PEER_SESS_SC_CONNECTCODE;
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003271 peer->last_hdshk = now_ms;
Willy Tarreaud990baf2015-04-05 00:32:03 +02003272
Maciej Zdeb34e40852022-05-16 17:27:28 +02003273 for (idx = 0; idx < global.nbthread; idx++)
3274 thr = peers->applet_count[idx] < peers->applet_count[thr] ? idx : thr;
3275 appctx = appctx_new_on(&peer_applet, NULL, thr);
Christopher Faulet2479e5f2022-01-19 14:50:11 +01003276 if (!appctx)
Christopher Fauleta9e8b392022-03-23 11:01:09 +01003277 goto out_close;
Willy Tarreau455caef2022-05-05 20:16:16 +02003278 appctx->svcctx = (void *)peer;
Willy Tarreaud990baf2015-04-05 00:32:03 +02003279
Christopher Faulet6712dc62022-05-12 15:36:11 +02003280 appctx->st0 = PEER_SESS_ST_CONNECT;
3281 peer->appctx = appctx;
Christopher Fauleta9e8b392022-03-23 11:01:09 +01003282
Maciej Zdebd01be2a2022-05-16 17:26:20 +02003283 HA_ATOMIC_INC(&peers->applet_count[thr]);
Maciej Zdeb34e40852022-05-16 17:27:28 +02003284 appctx_wakeup(appctx);
Willy Tarreau9df94c22016-10-31 18:42:52 +01003285 return appctx;
Emeric Brun2b920a12010-09-23 18:30:22 +02003286
Emeric Brun2b920a12010-09-23 18:30:22 +02003287 out_close:
Willy Tarreaub21d08e2016-10-31 17:46:57 +01003288 return NULL;
Emeric Brun2b920a12010-09-23 18:30:22 +02003289}
3290
3291/*
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003292 * Task processing function to manage re-connect, peer session
Willy Tarreauf6c88422021-01-29 12:38:42 +01003293 * tasks wakeup on local update and heartbeat. Let's keep it exported so that it
3294 * resolves in stack traces and "show tasks".
Emeric Brun2b920a12010-09-23 18:30:22 +02003295 */
Willy Tarreau144f84a2021-03-02 16:09:26 +01003296struct task *process_peer_sync(struct task * task, void *context, unsigned int state)
Emeric Brun2b920a12010-09-23 18:30:22 +02003297{
Olivier Houchard9f6af332018-05-25 14:04:04 +02003298 struct peers *peers = context;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003299 struct peer *ps;
3300 struct shared_table *st;
Emeric Brun2b920a12010-09-23 18:30:22 +02003301
3302 task->expire = TICK_ETERNITY;
3303
Emeric Brun80527f52017-06-19 17:46:37 +02003304 /* Acquire lock for all peers of the section */
3305 for (ps = peers->remote; ps; ps = ps->next)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003306 HA_SPIN_LOCK(PEER_LOCK, &ps->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003307
Emeric Brun2b920a12010-09-23 18:30:22 +02003308 if (!stopping) {
3309 /* Normal case (not soft stop)*/
Emeric Brunb3971ab2015-05-12 18:49:09 +02003310
Emeric Brun2c4ab412021-04-21 16:06:35 +02003311 /* resync timeout set to TICK_ETERNITY means we just start
3312 * a new process and timer was not initialized.
3313 * We must arm this timer to switch to a request to a remote
3314 * node if incoming connection from old local process never
3315 * comes.
3316 */
3317 if (peers->resync_timeout == TICK_ETERNITY)
3318 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
3319
Emeric Brunb3971ab2015-05-12 18:49:09 +02003320 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMLOCAL) &&
3321 (!nb_oldpids || tick_is_expired(peers->resync_timeout, now_ms)) &&
3322 !(peers->flags & PEERS_F_RESYNC_ASSIGN)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003323 /* Resync from local peer needed
3324 no peer was assigned for the lesson
3325 and no old local peer found
3326 or resync timeout expire */
3327
3328 /* flag no more resync from local, to try resync from remotes */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003329 peers->flags |= PEERS_F_RESYNC_LOCAL;
Emeric Brunccdfbae2021-04-28 12:59:35 +02003330 peers->flags |= PEERS_F_RESYNC_LOCALTIMEOUT;
Emeric Brun2b920a12010-09-23 18:30:22 +02003331
3332 /* reschedule a resync */
Frédéric Lécaille54bff832019-03-26 10:25:20 +01003333 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
Emeric Brun2b920a12010-09-23 18:30:22 +02003334 }
3335
3336 /* For each session */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003337 for (ps = peers->remote; ps; ps = ps->next) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003338 /* For each remote peers */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003339 if (!ps->local) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01003340 if (!ps->appctx) {
3341 /* no active peer connection */
Emeric Brun2b920a12010-09-23 18:30:22 +02003342 if (ps->statuscode == 0 ||
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003343 ((ps->statuscode == PEER_SESS_SC_CONNECTCODE ||
Willy Tarreaub4e34da2015-05-20 10:39:04 +02003344 ps->statuscode == PEER_SESS_SC_SUCCESSCODE ||
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003345 ps->statuscode == PEER_SESS_SC_CONNECTEDCODE) &&
Emeric Brun2b920a12010-09-23 18:30:22 +02003346 tick_is_expired(ps->reconnect, now_ms))) {
3347 /* connection never tried
Willy Tarreau9df94c22016-10-31 18:42:52 +01003348 * or previous peer connection established with success
3349 * or previous peer connection failed while connecting
Emeric Brun2b920a12010-09-23 18:30:22 +02003350 * and reconnection timer is expired */
3351
3352 /* retry a connect */
Willy Tarreau9df94c22016-10-31 18:42:52 +01003353 ps->appctx = peer_session_create(peers, ps);
Emeric Brun2b920a12010-09-23 18:30:22 +02003354 }
Willy Tarreaub4e34da2015-05-20 10:39:04 +02003355 else if (!tick_is_expired(ps->reconnect, now_ms)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003356 /* If previous session failed during connection
3357 * but reconnection timer is not expired */
3358
3359 /* reschedule task for reconnect */
3360 task->expire = tick_first(task->expire, ps->reconnect);
3361 }
3362 /* else do nothing */
Willy Tarreau9df94c22016-10-31 18:42:52 +01003363 } /* !ps->appctx */
Willy Tarreaue4d927a2013-12-01 12:47:35 +01003364 else if (ps->statuscode == PEER_SESS_SC_SUCCESSCODE) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01003365 /* current peer connection is active and established */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003366 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE) &&
3367 !(peers->flags & PEERS_F_RESYNC_ASSIGN) &&
Emeric Brun2b920a12010-09-23 18:30:22 +02003368 !(ps->flags & PEER_F_LEARN_NOTUP2DATE)) {
3369 /* Resync from a remote is needed
3370 * and no peer was assigned for lesson
3371 * and current peer may be up2date */
3372
3373 /* assign peer for the lesson */
3374 ps->flags |= PEER_F_LEARN_ASSIGN;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003375 peers->flags |= PEERS_F_RESYNC_ASSIGN;
Emeric Brunccdfbae2021-04-28 12:59:35 +02003376 peers->flags |= PEERS_F_RESYNC_REMOTEASSIGN;
Emeric Brun2b920a12010-09-23 18:30:22 +02003377
Willy Tarreau9df94c22016-10-31 18:42:52 +01003378 /* wake up peer handler to handle a request of resync */
Willy Tarreaue5843b32015-04-27 18:40:14 +02003379 appctx_wakeup(ps->appctx);
Emeric Brun2b920a12010-09-23 18:30:22 +02003380 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003381 else {
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003382 int update_to_push = 0;
3383
Emeric Brunb3971ab2015-05-12 18:49:09 +02003384 /* Awake session if there is data to push */
3385 for (st = ps->tables; st ; st = st->next) {
Emeric Brun8e7a13e2021-04-28 11:48:15 +02003386 if (st->last_pushed != st->table->localupdate) {
Willy Tarreau9df94c22016-10-31 18:42:52 +01003387 /* wake up the peer handler to push local updates */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003388 update_to_push = 1;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003389 /* There is no need to send a heartbeat message
3390 * when some updates must be pushed. The remote
3391 * peer will consider <ps> peer as alive when it will
3392 * receive these updates.
3393 */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003394 ps->flags &= ~PEER_F_HEARTBEAT;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003395 /* Re-schedule another one later. */
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003396 ps->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003397 /* We are going to send updates, let's ensure we will
3398 * come back to send heartbeat messages or to reconnect.
3399 */
3400 task->expire = tick_first(ps->reconnect, ps->heartbeat);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003401 appctx_wakeup(ps->appctx);
3402 break;
3403 }
3404 }
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003405 /* When there are updates to send we do not reconnect
3406 * and do not send heartbeat message either.
3407 */
3408 if (!update_to_push) {
3409 if (tick_is_expired(ps->reconnect, now_ms)) {
3410 if (ps->flags & PEER_F_ALIVE) {
3411 /* This peer was alive during a 'reconnect' period.
3412 * Flag it as not alive again for the next period.
3413 */
3414 ps->flags &= ~PEER_F_ALIVE;
Frédéric Lécaille54bff832019-03-26 10:25:20 +01003415 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(PEER_RECONNECT_TIMEOUT));
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003416 }
3417 else {
Willy Tarreau52bf8392020-03-08 00:42:37 +01003418 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
Frédéric Lécaillebaeb9192020-10-14 11:50:26 +02003419 ps->heartbeat = TICK_ETERNITY;
Emeric Brun9ef2ad72019-04-02 17:22:01 +02003420 peer_session_forceshutdown(ps);
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01003421 ps->no_hbt++;
Frédéric Lécaille045e0d42019-03-21 11:12:32 +01003422 }
3423 }
3424 else if (tick_is_expired(ps->heartbeat, now_ms)) {
3425 ps->heartbeat = tick_add(now_ms, MS_TO_TICKS(PEER_HEARTBEAT_TIMEOUT));
3426 ps->flags |= PEER_F_HEARTBEAT;
3427 appctx_wakeup(ps->appctx);
3428 }
Frédéric Lécailleb7405c12019-03-27 14:32:39 +01003429 task->expire = tick_first(ps->reconnect, ps->heartbeat);
Frédéric Lécaille645635d2019-02-11 17:49:39 +01003430 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003431 }
3432 /* else do nothing */
3433 } /* SUCCESSCODE */
3434 } /* !ps->peer->local */
3435 } /* for */
3436
3437 /* Resync from remotes expired: consider resync is finished */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003438 if (((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FROMREMOTE) &&
3439 !(peers->flags & PEERS_F_RESYNC_ASSIGN) &&
3440 tick_is_expired(peers->resync_timeout, now_ms)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003441 /* Resync from remote peer needed
3442 * no peer was assigned for the lesson
3443 * and resync timeout expire */
3444
3445 /* flag no more resync from remote, consider resync is finished */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003446 peers->flags |= PEERS_F_RESYNC_REMOTE;
Emeric Brunccdfbae2021-04-28 12:59:35 +02003447 peers->flags |= PEERS_F_RESYNC_REMOTETIMEOUT;
Emeric Brun2b920a12010-09-23 18:30:22 +02003448 }
3449
Emeric Brunb3971ab2015-05-12 18:49:09 +02003450 if ((peers->flags & PEERS_RESYNC_STATEMASK) != PEERS_RESYNC_FINISHED) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003451 /* Resync not finished*/
Frédéric Lécaille5d6e5f82017-05-29 13:47:16 +02003452 /* reschedule task to resync timeout if not expired, to ended resync if needed */
3453 if (!tick_is_expired(peers->resync_timeout, now_ms))
3454 task->expire = tick_first(task->expire, peers->resync_timeout);
Emeric Brun2b920a12010-09-23 18:30:22 +02003455 }
3456 } /* !stopping */
3457 else {
3458 /* soft stop case */
Willy Tarreau086735a2018-11-05 15:09:47 +01003459 if (state & TASK_WOKEN_SIGNAL) {
Joseph Herlant82b2f542018-11-15 12:19:14 -08003460 /* We've just received the signal */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003461 if (!(peers->flags & PEERS_F_DONOTSTOP)) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003462 /* add DO NOT STOP flag if not present */
Willy Tarreau4781b152021-04-06 13:53:36 +02003463 _HA_ATOMIC_INC(&jobs);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003464 peers->flags |= PEERS_F_DONOTSTOP;
Emeric Brun2b920a12010-09-23 18:30:22 +02003465
Emeric Bruncbfe5eb2021-04-22 18:20:37 +02003466 /* disconnect all connected peers to process a local sync
3467 * this must be done only the first time we are switching
3468 * in stopping state
Emeric Brun80527f52017-06-19 17:46:37 +02003469 */
Emeric Bruncbfe5eb2021-04-22 18:20:37 +02003470 for (ps = peers->remote; ps; ps = ps->next) {
3471 /* we're killing a connection, we must apply a random delay before
3472 * retrying otherwise the other end will do the same and we can loop
3473 * for a while.
3474 */
3475 ps->reconnect = tick_add(now_ms, MS_TO_TICKS(50 + ha_random() % 2000));
3476 if (ps->appctx) {
3477 peer_session_forceshutdown(ps);
3478 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003479 }
Christopher Faulet160fff62022-07-26 19:19:18 +02003480
3481 /* Set resync timeout for the local peer and request a immediate reconnect */
3482 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
3483 peers->local->reconnect = now_ms;
Emeric Brun2b920a12010-09-23 18:30:22 +02003484 }
3485 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003486
Emeric Brunb3971ab2015-05-12 18:49:09 +02003487 ps = peers->local;
Emeric Brun2b920a12010-09-23 18:30:22 +02003488 if (ps->flags & PEER_F_TEACH_COMPLETE) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02003489 if (peers->flags & PEERS_F_DONOTSTOP) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003490 /* resync of new process was complete, current process can die now */
Willy Tarreau4781b152021-04-06 13:53:36 +02003491 _HA_ATOMIC_DEC(&jobs);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003492 peers->flags &= ~PEERS_F_DONOTSTOP;
3493 for (st = ps->tables; st ; st = st->next)
Emeric Brun2cc201f2021-04-23 12:21:26 +02003494 HA_ATOMIC_DEC(&st->table->refcnt);
Emeric Brun2b920a12010-09-23 18:30:22 +02003495 }
3496 }
Willy Tarreau9df94c22016-10-31 18:42:52 +01003497 else if (!ps->appctx) {
Christopher Faulet19a82b92022-08-26 18:40:46 +02003498 /* Re-arm resync timeout if necessary */
3499 if (!tick_isset(peers->resync_timeout))
3500 peers->resync_timeout = tick_add(now_ms, MS_TO_TICKS(PEER_RESYNC_TIMEOUT));
3501
Willy Tarreau9df94c22016-10-31 18:42:52 +01003502 /* If there's no active peer connection */
Christopher Fauletb372f162022-08-26 18:46:16 +02003503 if ((peers->flags & PEERS_RESYNC_STATEMASK) == PEERS_RESYNC_FINISHED &&
3504 !tick_is_expired(peers->resync_timeout, now_ms) &&
Christopher Faulet160fff62022-07-26 19:19:18 +02003505 (ps->statuscode == 0 ||
3506 ps->statuscode == PEER_SESS_SC_SUCCESSCODE ||
3507 ps->statuscode == PEER_SESS_SC_CONNECTEDCODE ||
3508 ps->statuscode == PEER_SESS_SC_TRYAGAIN)) {
Christopher Fauletb372f162022-08-26 18:46:16 +02003509 /* The resync is finished for the local peer and
3510 * the resync timeout is not expired and
Christopher Faulet160fff62022-07-26 19:19:18 +02003511 * connection never tried
3512 * or previous peer connection was successfully established
3513 * or previous tcp connect succeeded but init state incomplete
3514 * or during previous connect, peer replies a try again statuscode */
Emeric Brun2b920a12010-09-23 18:30:22 +02003515
Christopher Faulet160fff62022-07-26 19:19:18 +02003516 if (!tick_is_expired(ps->reconnect, now_ms)) {
3517 /* reconnection timer is not expired. reschedule task for reconnect */
3518 task->expire = tick_first(task->expire, ps->reconnect);
3519 }
3520 else {
3521 /* connect to the local peer if we must push a local sync */
3522 if (peers->flags & PEERS_F_DONOTSTOP) {
3523 peer_session_create(peers, ps);
3524 }
Emeric Bruncbfe5eb2021-04-22 18:20:37 +02003525 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003526 }
3527 else {
3528 /* Other error cases */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003529 if (peers->flags & PEERS_F_DONOTSTOP) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003530 /* unable to resync new process, current process can die now */
Willy Tarreau4781b152021-04-06 13:53:36 +02003531 _HA_ATOMIC_DEC(&jobs);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003532 peers->flags &= ~PEERS_F_DONOTSTOP;
3533 for (st = ps->tables; st ; st = st->next)
Emeric Brun2cc201f2021-04-23 12:21:26 +02003534 HA_ATOMIC_DEC(&st->table->refcnt);
Emeric Brun2b920a12010-09-23 18:30:22 +02003535 }
3536 }
3537 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003538 else if (ps->statuscode == PEER_SESS_SC_SUCCESSCODE ) {
Christopher Faulet19a82b92022-08-26 18:40:46 +02003539 /* Reset resync timeout during a resync */
3540 peers->resync_timeout = TICK_ETERNITY;
3541
Willy Tarreau9df94c22016-10-31 18:42:52 +01003542 /* current peer connection is active and established
3543 * wake up all peer handlers to push remaining local updates */
Emeric Brunb3971ab2015-05-12 18:49:09 +02003544 for (st = ps->tables; st ; st = st->next) {
Emeric Brun8e7a13e2021-04-28 11:48:15 +02003545 if (st->last_pushed != st->table->localupdate) {
Emeric Brunb3971ab2015-05-12 18:49:09 +02003546 appctx_wakeup(ps->appctx);
3547 break;
3548 }
3549 }
Emeric Brun2b920a12010-09-23 18:30:22 +02003550 }
3551 } /* stopping */
Emeric Brun80527f52017-06-19 17:46:37 +02003552
3553 /* Release lock for all peers of the section */
3554 for (ps = peers->remote; ps; ps = ps->next)
Christopher Faulet2a944ee2017-11-07 10:42:54 +01003555 HA_SPIN_UNLOCK(PEER_LOCK, &ps->lock);
Emeric Brun80527f52017-06-19 17:46:37 +02003556
Emeric Brun2b920a12010-09-23 18:30:22 +02003557 /* Wakeup for re-connect */
3558 return task;
3559}
3560
Emeric Brunb3971ab2015-05-12 18:49:09 +02003561
Emeric Brun2b920a12010-09-23 18:30:22 +02003562/*
Willy Tarreaud9443442018-10-15 11:18:03 +02003563 * returns 0 in case of error.
Emeric Brun2b920a12010-09-23 18:30:22 +02003564 */
Willy Tarreaud9443442018-10-15 11:18:03 +02003565int peers_init_sync(struct peers *peers)
Emeric Brun2b920a12010-09-23 18:30:22 +02003566{
Emeric Brun2b920a12010-09-23 18:30:22 +02003567 struct peer * curpeer;
Emeric Brun2b920a12010-09-23 18:30:22 +02003568
Emeric Brun2b920a12010-09-23 18:30:22 +02003569 for (curpeer = peers->remote; curpeer; curpeer = curpeer->next) {
Emeric Brun2b920a12010-09-23 18:30:22 +02003570 peers->peers_fe->maxconn += 3;
3571 }
3572
Willy Tarreaubeeabf52021-10-01 18:23:30 +02003573 peers->sync_task = task_new_anywhere();
Willy Tarreaud9443442018-10-15 11:18:03 +02003574 if (!peers->sync_task)
3575 return 0;
3576
Maciej Zdebd01be2a2022-05-16 17:26:20 +02003577 memset(peers->applet_count, 0, sizeof(peers->applet_count));
Emeric Brunb3971ab2015-05-12 18:49:09 +02003578 peers->sync_task->process = process_peer_sync;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003579 peers->sync_task->context = (void *)peers;
3580 peers->sighandler = signal_register_task(0, peers->sync_task, 0);
3581 task_wakeup(peers->sync_task, TASK_WOKEN_INIT);
Willy Tarreaud9443442018-10-15 11:18:03 +02003582 return 1;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003583}
3584
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003585/*
3586 * Allocate a cache a dictionary entries used upon transmission.
3587 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003588static struct dcache_tx *new_dcache_tx(size_t max_entries)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003589{
3590 struct dcache_tx *d;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003591 struct ebpt_node *entries;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003592
3593 d = malloc(sizeof *d);
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003594 entries = calloc(max_entries, sizeof *entries);
3595 if (!d || !entries)
3596 goto err;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003597
3598 d->lru_key = 0;
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003599 d->prev_lookup = NULL;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003600 d->cached_entries = EB_ROOT_UNIQUE;
3601 d->entries = entries;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003602
3603 return d;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003604
3605 err:
3606 free(d);
3607 free(entries);
3608 return NULL;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003609}
3610
3611/*
3612 * Allocate a cache of dictionary entries with <name> as name and <max_entries>
3613 * as maximum of entries.
Ilya Shipitsinc02a23f2020-05-06 00:53:22 +05003614 * Return the dictionary cache if succeeded, NULL if not.
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003615 * Must be deallocated calling free_dcache().
3616 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003617static struct dcache *new_dcache(size_t max_entries)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003618{
3619 struct dcache_tx *dc_tx;
3620 struct dcache *dc;
3621 struct dcache_rx *dc_rx;
3622
3623 dc = calloc(1, sizeof *dc);
3624 dc_tx = new_dcache_tx(max_entries);
3625 dc_rx = calloc(max_entries, sizeof *dc_rx);
3626 if (!dc || !dc_tx || !dc_rx)
3627 goto err;
3628
3629 dc->tx = dc_tx;
3630 dc->rx = dc_rx;
3631 dc->max_entries = max_entries;
3632
3633 return dc;
3634
3635 err:
3636 free(dc);
3637 free(dc_tx);
3638 free(dc_rx);
3639 return NULL;
3640}
3641
3642/*
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003643 * Look for the dictionary entry with the value of <i> in <d> cache of dictionary
3644 * entries used upon transmission.
3645 * Return the entry if found, NULL if not.
3646 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003647static struct ebpt_node *dcache_tx_lookup_value(struct dcache_tx *d,
3648 struct dcache_tx_entry *i)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003649{
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003650 return ebpt_lookup(&d->cached_entries, i->entry.key);
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003651}
3652
3653/*
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003654 * Flush <dc> cache.
3655 * Always succeeds.
3656 */
3657static inline void flush_dcache(struct peer *peer)
3658{
3659 int i;
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02003660 struct dcache *dc = peer->dcache;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003661
Frédéric Lécailleea875e62020-11-12 21:01:54 +01003662 for (i = 0; i < dc->max_entries; i++) {
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003663 ebpt_delete(&dc->tx->entries[i]);
Frédéric Lécailleea875e62020-11-12 21:01:54 +01003664 dc->tx->entries[i].key = NULL;
Thayne McCombs92149f92020-11-20 01:28:26 -07003665 dict_entry_unref(&server_key_dict, dc->rx[i].de);
3666 dc->rx[i].de = NULL;
Frédéric Lécailleea875e62020-11-12 21:01:54 +01003667 }
3668 dc->tx->prev_lookup = NULL;
3669 dc->tx->lru_key = 0;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003670
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003671 memset(dc->rx, 0, dc->max_entries * sizeof *dc->rx);
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003672}
3673
3674/*
3675 * Insert a dictionary entry in <dc> cache part used upon transmission (->tx)
3676 * with information provided by <i> dictionary cache entry (especially the value
3677 * to be inserted if not already). Return <i> if already present in the cache
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003678 * or something different of <i> if not.
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003679 */
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003680static struct ebpt_node *dcache_tx_insert(struct dcache *dc, struct dcache_tx_entry *i)
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003681{
3682 struct dcache_tx *dc_tx;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003683 struct ebpt_node *o;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003684
3685 dc_tx = dc->tx;
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003686
3687 if (dc_tx->prev_lookup && dc_tx->prev_lookup->key == i->entry.key) {
3688 o = dc_tx->prev_lookup;
3689 } else {
3690 o = dcache_tx_lookup_value(dc_tx, i);
3691 if (o) {
3692 /* Save it */
3693 dc_tx->prev_lookup = o;
3694 }
3695 }
3696
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003697 if (o) {
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003698 /* Copy the ID. */
3699 i->id = o - dc->tx->entries;
3700 return &i->entry;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003701 }
3702
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003703 /* The new entry to put in cache */
Frédéric Lécailleb65717f2019-06-07 14:25:25 +02003704 dc_tx->prev_lookup = o = &dc_tx->entries[dc_tx->lru_key];
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003705
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003706 ebpt_delete(o);
3707 o->key = i->entry.key;
3708 ebpt_insert(&dc_tx->cached_entries, o);
3709 i->id = dc_tx->lru_key;
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003710
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003711 /* Update the index for the next entry to put in cache */
3712 dc_tx->lru_key = (dc_tx->lru_key + 1) & (dc->max_entries - 1);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003713
Frédéric Lécaille74167b22019-05-28 19:02:42 +02003714 return o;
3715}
Emeric Brunb3971ab2015-05-12 18:49:09 +02003716
3717/*
Frédéric Lécaille8d78fa72019-05-20 18:22:52 +02003718 * Allocate a dictionary cache for each peer of <peers> section.
3719 * Return 1 if succeeded, 0 if not.
3720 */
3721int peers_alloc_dcache(struct peers *peers)
3722{
3723 struct peer *p;
3724
3725 for (p = peers->remote; p; p = p->next) {
3726 p->dcache = new_dcache(PEER_STKT_CACHE_MAX_ENTRIES);
3727 if (!p->dcache)
3728 return 0;
3729 }
3730
3731 return 1;
3732}
3733
3734/*
Emeric Brunb3971ab2015-05-12 18:49:09 +02003735 * Function used to register a table for sync on a group of peers
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003736 * Returns 0 in case of success.
Emeric Brunb3971ab2015-05-12 18:49:09 +02003737 */
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003738int peers_register_table(struct peers *peers, struct stktable *table)
Emeric Brunb3971ab2015-05-12 18:49:09 +02003739{
3740 struct shared_table *st;
3741 struct peer * curpeer;
3742 int id = 0;
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003743 int retval = 0;
Emeric Brunb3971ab2015-05-12 18:49:09 +02003744
3745 for (curpeer = peers->remote; curpeer; curpeer = curpeer->next) {
Vincent Bernat02779b62016-04-03 13:48:43 +02003746 st = calloc(1,sizeof(*st));
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003747 if (!st) {
3748 retval = 1;
3749 break;
3750 }
Emeric Brunb3971ab2015-05-12 18:49:09 +02003751 st->table = table;
3752 st->next = curpeer->tables;
3753 if (curpeer->tables)
3754 id = curpeer->tables->local_id;
3755 st->local_id = id + 1;
3756
Emeric Brun2cc201f2021-04-23 12:21:26 +02003757 /* If peer is local we inc table
3758 * refcnt to protect against flush
3759 * until this process pushed all
3760 * table content to the new one
3761 */
3762 if (curpeer->local)
3763 HA_ATOMIC_INC(&st->table->refcnt);
Emeric Brunb3971ab2015-05-12 18:49:09 +02003764 curpeer->tables = st;
3765 }
3766
3767 table->sync_task = peers->sync_task;
Remi Tricot-Le Breton208ff012021-05-12 17:39:04 +02003768
3769 return retval;
Emeric Brun2b920a12010-09-23 18:30:22 +02003770}
3771
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003772/* context used by a "show peers" command */
3773struct show_peers_ctx {
Willy Tarreau3a31e372022-05-03 14:58:47 +02003774 void *target; /* if non-null, dump only this section and stop */
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003775 struct peers *peers; /* "peers" section being currently dumped. */
3776 struct peer *peer; /* "peer" being currently dumped. */
3777 int flags; /* non-zero if "dict" dump requested */
Willy Tarreau3a31e372022-05-03 14:58:47 +02003778 enum {
Willy Tarreauce9123c2022-05-03 15:04:25 +02003779 STATE_HEAD = 0, /* dump the section's header */
Willy Tarreau3a31e372022-05-03 14:58:47 +02003780 STATE_PEER, /* dump the whole peer */
3781 STATE_DONE, /* finished */
3782 } state; /* parser's state */
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003783};
3784
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003785/*
3786 * Parse the "show peers" command arguments.
3787 * Returns 0 if succeeded, 1 if not with the ->msg of the appctx set as
3788 * error message.
3789 */
3790static int cli_parse_show_peers(char **args, char *payload, struct appctx *appctx, void *private)
3791{
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003792 struct show_peers_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003793
Willy Tarreau49962b52021-02-12 16:56:22 +01003794 if (strcmp(args[2], "dict") == 0) {
3795 /* show the dictionaries (large dump) */
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003796 ctx->flags |= PEERS_SHOW_F_DICT;
Willy Tarreau49962b52021-02-12 16:56:22 +01003797 args++;
3798 } else if (strcmp(args[2], "-") == 0)
3799 args++; // allows to show a section called "dict"
3800
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003801 if (*args[2]) {
3802 struct peers *p;
3803
3804 for (p = cfg_peers; p; p = p->next) {
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01003805 if (strcmp(p->id, args[2]) == 0) {
Willy Tarreaucb8bf172022-05-03 14:26:31 +02003806 ctx->target = p;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003807 break;
3808 }
3809 }
3810
Willy Tarreau9d008692019-08-09 11:21:01 +02003811 if (!p)
3812 return cli_err(appctx, "No such peers\n");
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003813 }
3814
Willy Tarreauce9123c2022-05-03 15:04:25 +02003815 /* where to start from */
3816 ctx->peers = ctx->target ? ctx->target : cfg_peers;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003817 return 0;
3818}
3819
3820/*
3821 * This function dumps the peer state information of <peers> "peers" section.
3822 * Returns 0 if the output buffer is full and needs to be called again, non-zero if not.
3823 * Dedicated to be called by cli_io_handler_show_peers() cli I/O handler.
3824 */
Willy Tarreaud0a06d52022-05-18 15:07:19 +02003825static int peers_dump_head(struct buffer *msg, struct appctx *appctx, struct peers *peers)
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003826{
3827 struct tm tm;
3828
3829 get_localtime(peers->last_change, &tm);
Willy Tarreau1ad64ac2020-09-24 08:48:08 +02003830 chunk_appendf(msg, "%p: [%02d/%s/%04d:%02d:%02d:%02d] id=%s disabled=%d flags=0x%x resync_timeout=%s task_calls=%u\n",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003831 peers,
3832 tm.tm_mday, monthname[tm.tm_mon], tm.tm_year+1900,
3833 tm.tm_hour, tm.tm_min, tm.tm_sec,
Willy Tarreau1ad64ac2020-09-24 08:48:08 +02003834 peers->id, peers->disabled, peers->flags,
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003835 peers->resync_timeout ?
3836 tick_is_expired(peers->resync_timeout, now_ms) ? "<PAST>" :
3837 human_time(TICKS_TO_MS(peers->resync_timeout - now_ms),
Emeric Brun0bbec0f2019-04-18 11:39:43 +02003838 TICKS_TO_MS(1000)) : "<NEVER>",
3839 peers->sync_task ? peers->sync_task->calls : 0);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003840
Willy Tarreaud0a06d52022-05-18 15:07:19 +02003841 if (applet_putchk(appctx, msg) == -1)
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003842 return 0;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003843
3844 return 1;
3845}
3846
3847/*
3848 * This function dumps <peer> state information.
3849 * Returns 0 if the output buffer is full and needs to be called again, non-zero
3850 * if not. Dedicated to be called by cli_io_handler_show_peers() cli I/O handler.
3851 */
Willy Tarreau50e77b22022-05-31 08:55:54 +02003852static int peers_dump_peer(struct buffer *msg, struct appctx *appctx, struct peer *peer, int flags)
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003853{
3854 struct connection *conn;
3855 char pn[INET6_ADDRSTRLEN];
Willy Tarreau4596fe22022-05-17 19:07:51 +02003856 struct stconn *peer_cs;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003857 struct stream *peer_s;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003858 struct shared_table *st;
3859
3860 addr_to_str(&peer->addr, pn, sizeof pn);
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003861 chunk_appendf(msg, " %p: id=%s(%s,%s) addr=%s:%d last_status=%s",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003862 peer, peer->id,
3863 peer->local ? "local" : "remote",
Frédéric Lécaillee7e2b212020-10-05 12:33:07 +02003864 peer->appctx ? "active" : "inactive",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003865 pn, get_host_port(&peer->addr),
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003866 statuscode_str(peer->statuscode));
3867
3868 chunk_appendf(msg, " last_hdshk=%s\n",
3869 peer->last_hdshk ? human_time(TICKS_TO_MS(now_ms - peer->last_hdshk),
3870 TICKS_TO_MS(1000)) : "<NEVER>");
3871
3872 chunk_appendf(msg, " reconnect=%s",
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003873 peer->reconnect ?
3874 tick_is_expired(peer->reconnect, now_ms) ? "<PAST>" :
3875 human_time(TICKS_TO_MS(peer->reconnect - now_ms),
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003876 TICKS_TO_MS(1000)) : "<NEVER>");
3877
3878 chunk_appendf(msg, " heartbeat=%s",
3879 peer->heartbeat ?
3880 tick_is_expired(peer->heartbeat, now_ms) ? "<PAST>" :
3881 human_time(TICKS_TO_MS(peer->heartbeat - now_ms),
3882 TICKS_TO_MS(1000)) : "<NEVER>");
3883
3884 chunk_appendf(msg, " confirm=%u tx_hbt=%u rx_hbt=%u no_hbt=%u new_conn=%u proto_err=%u coll=%u\n",
Frédéric Lécailleec1c10b2019-11-07 15:22:33 +01003885 peer->confirm, peer->tx_hbt, peer->rx_hbt,
Frédéric Lécaille3fc0fe02020-10-08 09:46:24 +02003886 peer->no_hbt, peer->new_conn, peer->proto_err, peer->coll);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003887
3888 chunk_appendf(&trash, " flags=0x%x", peer->flags);
3889
Willy Tarreaufc505992022-05-31 08:53:25 +02003890 if (!peer->appctx)
Frédéric Lécaille470502b2019-11-06 10:41:03 +01003891 goto table_info;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003892
Willy Tarreaufc505992022-05-31 08:53:25 +02003893 chunk_appendf(&trash, " appctx:%p st0=%d st1=%d task_calls=%u",
3894 peer->appctx, peer->appctx->st0, peer->appctx->st1,
3895 peer->appctx->t ? peer->appctx->t->calls : 0);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003896
Willy Tarreauc12b3212022-05-27 11:08:15 +02003897 peer_cs = appctx_sc(peer->appctx);
Willy Tarreau03926122023-01-12 17:09:34 +01003898 if (!peer_cs) {
3899 /* the appctx might exist but not yet be initialized due to
3900 * deferred initialization used to balance applets across
3901 * threads.
3902 */
3903 goto table_info;
3904 }
3905
Willy Tarreauea27f482022-05-18 16:10:52 +02003906 peer_s = __sc_strm(peer_cs);
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003907
Willy Tarreau74568cf2022-05-27 09:03:30 +02003908 chunk_appendf(&trash, " state=%s", sc_state_str(sc_opposite(peer_cs)->state));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003909
3910 conn = objt_conn(strm_orig(peer_s));
3911 if (conn)
3912 chunk_appendf(&trash, "\n xprt=%s", conn_get_xprt_name(conn));
3913
Willy Tarreau3ca14902019-07-17 14:53:15 +02003914 switch (conn && conn_get_src(conn) ? addr_to_str(conn->src, pn, sizeof(pn)) : AF_UNSPEC) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003915 case AF_INET:
3916 case AF_INET6:
Willy Tarreau3ca14902019-07-17 14:53:15 +02003917 chunk_appendf(&trash, " src=%s:%d", pn, get_host_port(conn->src));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003918 break;
3919 case AF_UNIX:
3920 chunk_appendf(&trash, " src=unix:%d", strm_li(peer_s)->luid);
3921 break;
3922 }
3923
Willy Tarreau3ca14902019-07-17 14:53:15 +02003924 switch (conn && conn_get_dst(conn) ? addr_to_str(conn->dst, pn, sizeof(pn)) : AF_UNSPEC) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003925 case AF_INET:
3926 case AF_INET6:
Willy Tarreau3ca14902019-07-17 14:53:15 +02003927 chunk_appendf(&trash, " addr=%s:%d", pn, get_host_port(conn->dst));
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003928 break;
3929 case AF_UNIX:
3930 chunk_appendf(&trash, " addr=unix:%d", strm_li(peer_s)->luid);
3931 break;
3932 }
3933
Frédéric Lécaille470502b2019-11-06 10:41:03 +01003934 table_info:
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003935 if (peer->remote_table)
3936 chunk_appendf(&trash, "\n remote_table:%p id=%s local_id=%d remote_id=%d",
3937 peer->remote_table,
3938 peer->remote_table->table->id,
3939 peer->remote_table->local_id,
3940 peer->remote_table->remote_id);
3941
3942 if (peer->last_local_table)
3943 chunk_appendf(&trash, "\n last_local_table:%p id=%s local_id=%d remote_id=%d",
3944 peer->last_local_table,
3945 peer->last_local_table->table->id,
3946 peer->last_local_table->local_id,
3947 peer->last_local_table->remote_id);
3948
3949 if (peer->tables) {
3950 chunk_appendf(&trash, "\n shared tables:");
3951 for (st = peer->tables; st; st = st->next) {
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003952 int i, count;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003953 struct stktable *t;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003954 struct dcache *dcache;
3955
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003956 t = st->table;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003957 dcache = peer->dcache;
3958
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02003959 chunk_appendf(&trash, "\n %p local_id=%d remote_id=%d "
3960 "flags=0x%x remote_data=0x%llx",
3961 st, st->local_id, st->remote_id,
3962 st->flags, (unsigned long long)st->remote_data);
3963 chunk_appendf(&trash, "\n last_acked=%u last_pushed=%u last_get=%u"
3964 " teaching_origin=%u update=%u",
3965 st->last_acked, st->last_pushed, st->last_get,
3966 st->teaching_origin, st->update);
3967 chunk_appendf(&trash, "\n table:%p id=%s update=%u localupdate=%u"
Emeric Brun2cc201f2021-04-23 12:21:26 +02003968 " commitupdate=%u refcnt=%u",
3969 t, t->id, t->update, t->localupdate, t->commitupdate, t->refcnt);
Willy Tarreau49962b52021-02-12 16:56:22 +01003970 if (flags & PEERS_SHOW_F_DICT) {
3971 chunk_appendf(&trash, "\n TX dictionary cache:");
3972 count = 0;
3973 for (i = 0; i < dcache->max_entries; i++) {
3974 struct ebpt_node *node;
3975 struct dict_entry *de;
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003976
Willy Tarreau49962b52021-02-12 16:56:22 +01003977 node = &dcache->tx->entries[i];
3978 if (!node->key)
3979 break;
Frédéric Lécaille6c391982019-06-06 11:34:03 +02003980
Willy Tarreau49962b52021-02-12 16:56:22 +01003981 if (!count++)
3982 chunk_appendf(&trash, "\n ");
3983 de = node->key;
3984 chunk_appendf(&trash, " %3u -> %s", i, (char *)de->value.key);
3985 count &= 0x3;
3986 }
3987 chunk_appendf(&trash, "\n RX dictionary cache:");
3988 count = 0;
3989 for (i = 0; i < dcache->max_entries; i++) {
3990 if (!count++)
3991 chunk_appendf(&trash, "\n ");
3992 chunk_appendf(&trash, " %3u -> %s", i,
3993 dcache->rx[i].de ?
3994 (char *)dcache->rx[i].de->value.key : "-");
3995 count &= 0x3;
3996 }
3997 } else {
3998 chunk_appendf(&trash, "\n Dictionary cache not dumped (use \"show peers dict\")");
Frédéric Lécaille62b0b0b2019-05-29 16:20:41 +02003999 }
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004000 }
4001 }
4002
4003 end:
4004 chunk_appendf(&trash, "\n");
Willy Tarreau50e77b22022-05-31 08:55:54 +02004005 if (applet_putchk(appctx, msg) == -1)
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004006 return 0;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004007
4008 return 1;
4009}
4010
4011/*
4012 * This function dumps all the peers of "peers" section.
4013 * Returns 0 if the output buffer is full and needs to be called
4014 * again, non-zero if not. It proceeds in an isolated thread, so
4015 * there is no thread safety issue here.
4016 */
4017static int cli_io_handler_show_peers(struct appctx *appctx)
4018{
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004019 struct show_peers_ctx *ctx = appctx->svcctx;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004020 int ret = 0, first_peers = 1;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004021
4022 thread_isolate();
4023
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004024 chunk_reset(&trash);
4025
Willy Tarreau3a31e372022-05-03 14:58:47 +02004026 while (ctx->state != STATE_DONE) {
4027 switch (ctx->state) {
Willy Tarreau3a31e372022-05-03 14:58:47 +02004028 case STATE_HEAD:
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004029 if (!ctx->peers) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004030 /* No more peers list. */
Willy Tarreau3a31e372022-05-03 14:58:47 +02004031 ctx->state = STATE_DONE;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004032 }
4033 else {
4034 if (!first_peers)
4035 chunk_appendf(&trash, "\n");
4036 else
4037 first_peers = 0;
Willy Tarreaud0a06d52022-05-18 15:07:19 +02004038 if (!peers_dump_head(&trash, appctx, ctx->peers))
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004039 goto out;
4040
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004041 ctx->peer = ctx->peers->remote;
4042 ctx->peers = ctx->peers->next;
Willy Tarreau3a31e372022-05-03 14:58:47 +02004043 ctx->state = STATE_PEER;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004044 }
4045 break;
4046
Willy Tarreau3a31e372022-05-03 14:58:47 +02004047 case STATE_PEER:
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004048 if (!ctx->peer) {
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004049 /* End of peer list */
Willy Tarreauce9123c2022-05-03 15:04:25 +02004050 if (!ctx->target)
4051 ctx->state = STATE_HEAD; // next one
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004052 else
Willy Tarreau3a31e372022-05-03 14:58:47 +02004053 ctx->state = STATE_DONE;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004054 }
4055 else {
Willy Tarreau50e77b22022-05-31 08:55:54 +02004056 if (!peers_dump_peer(&trash, appctx, ctx->peer, ctx->flags))
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004057 goto out;
4058
Willy Tarreaucb8bf172022-05-03 14:26:31 +02004059 ctx->peer = ctx->peer->next;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004060 }
Willy Tarreau3a31e372022-05-03 14:58:47 +02004061 break;
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004062
Willy Tarreau3a31e372022-05-03 14:58:47 +02004063 default:
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004064 break;
4065 }
4066 }
4067 ret = 1;
4068 out:
4069 thread_release();
4070 return ret;
4071}
4072
Willy Tarreau8bd146d2022-07-19 20:17:38 +02004073/* config parser for global "tune.peers.max-updates-at-once" */
4074static int cfg_parse_max_updt_at_once(char **args, int section_type, struct proxy *curpx,
4075 const struct proxy *defpx, const char *file, int line,
4076 char **err)
4077{
4078 int arg = -1;
4079
4080 if (too_many_args(1, args, err, NULL))
4081 return -1;
4082
4083 if (*(args[1]) != 0)
4084 arg = atoi(args[1]);
4085
4086 if (arg < 1) {
4087 memprintf(err, "'%s' expects an integer argument greater than 0.", args[0]);
4088 return -1;
4089 }
4090
4091 peers_max_updates_at_once = arg;
4092 return 0;
4093}
4094
4095/* config keyword parsers */
4096static struct cfg_kw_list cfg_kws = {ILH, {
4097 { CFG_GLOBAL, "tune.peers.max-updates-at-once", cfg_parse_max_updt_at_once },
4098 { 0, NULL, NULL }
4099}};
4100
4101INITCALL1(STG_REGISTER, cfg_register_keywords, &cfg_kws);
4102
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004103/*
4104 * CLI keywords.
4105 */
4106static struct cli_kw_list cli_kws = {{ }, {
Willy Tarreaub205bfd2021-05-07 11:38:37 +02004107 { { "show", "peers", NULL }, "show peers [dict|-] [section] : dump some information about all the peers or this peers section", cli_parse_show_peers, cli_io_handler_show_peers, },
Frédéric Lécaille95679dc2019-04-15 10:25:27 +02004108 {},
4109}};
4110
4111/* Register cli keywords */
4112INITCALL1(STG_REGISTER, cli_register_kw, &cli_kws);