The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)
https://grpc.io/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
439 lines
13 KiB
439 lines
13 KiB
/* |
|
* |
|
* Copyright 2015, Google Inc. |
|
* All rights reserved. |
|
* |
|
* Redistribution and use in source and binary forms, with or without |
|
* modification, are permitted provided that the following conditions are |
|
* met: |
|
* |
|
* * Redistributions of source code must retain the above copyright |
|
* notice, this list of conditions and the following disclaimer. |
|
* * Redistributions in binary form must reproduce the above |
|
* copyright notice, this list of conditions and the following disclaimer |
|
* in the documentation and/or other materials provided with the |
|
* distribution. |
|
* * Neither the name of Google Inc. nor the names of its |
|
* contributors may be used to endorse or promote products derived from |
|
* this software without specific prior written permission. |
|
* |
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
* |
|
*/ |
|
|
|
/* FIXME: "posix" files shouldn't be depending on _GNU_SOURCE */ |
|
#ifndef _GNU_SOURCE |
|
#define _GNU_SOURCE |
|
#endif |
|
|
|
#include <grpc/support/port_platform.h> |
|
|
|
#ifdef GRPC_NEED_UDP |
|
#ifdef GPR_POSIX_SOCKET |
|
|
|
#include "src/core/iomgr/udp_server.h" |
|
|
|
#include <errno.h> |
|
#include <fcntl.h> |
|
#include <limits.h> |
|
#include <netinet/in.h> |
|
#include <netinet/tcp.h> |
|
#include <string.h> |
|
#include <sys/socket.h> |
|
#include <sys/stat.h> |
|
#include <sys/types.h> |
|
#include <sys/un.h> |
|
#include <unistd.h> |
|
|
|
#include "src/core/iomgr/fd_posix.h" |
|
#include "src/core/iomgr/pollset_posix.h" |
|
#include "src/core/iomgr/resolve_address.h" |
|
#include "src/core/iomgr/sockaddr_utils.h" |
|
#include "src/core/iomgr/socket_utils_posix.h" |
|
#include "src/core/support/string.h" |
|
#include <grpc/support/alloc.h> |
|
#include <grpc/support/log.h> |
|
#include <grpc/support/sync.h> |
|
#include <grpc/support/string_util.h> |
|
#include <grpc/support/time.h> |
|
|
|
#define INIT_PORT_CAP 2 |
|
|
|
/* one listening port */ |
|
typedef struct { |
|
int fd; |
|
grpc_fd *emfd; |
|
grpc_udp_server *server; |
|
union { |
|
uint8_t untyped[GRPC_MAX_SOCKADDR_SIZE]; |
|
struct sockaddr sockaddr; |
|
struct sockaddr_un un; |
|
} addr; |
|
size_t addr_len; |
|
grpc_closure read_closure; |
|
grpc_closure destroyed_closure; |
|
grpc_udp_server_read_cb read_cb; |
|
} server_port; |
|
|
|
static void unlink_if_unix_domain_socket(const struct sockaddr_un *un) { |
|
struct stat st; |
|
|
|
if (stat(un->sun_path, &st) == 0 && (st.st_mode & S_IFMT) == S_IFSOCK) { |
|
unlink(un->sun_path); |
|
} |
|
} |
|
|
|
/* the overall server */ |
|
struct grpc_udp_server { |
|
gpr_mu mu; |
|
gpr_cv cv; |
|
|
|
/* active port count: how many ports are actually still listening */ |
|
size_t active_ports; |
|
/* destroyed port count: how many ports are completely destroyed */ |
|
size_t destroyed_ports; |
|
|
|
/* is this server shutting down? (boolean) */ |
|
int shutdown; |
|
|
|
/* all listening ports */ |
|
server_port *ports; |
|
size_t nports; |
|
size_t port_capacity; |
|
|
|
/* shutdown callback */ |
|
grpc_closure *shutdown_complete; |
|
|
|
/* all pollsets interested in new connections */ |
|
grpc_pollset **pollsets; |
|
/* number of pollsets in the pollsets array */ |
|
size_t pollset_count; |
|
/* The parent grpc server */ |
|
grpc_server *grpc_server; |
|
}; |
|
|
|
grpc_udp_server *grpc_udp_server_create(void) { |
|
grpc_udp_server *s = gpr_malloc(sizeof(grpc_udp_server)); |
|
gpr_mu_init(&s->mu); |
|
gpr_cv_init(&s->cv); |
|
s->active_ports = 0; |
|
s->destroyed_ports = 0; |
|
s->shutdown = 0; |
|
s->ports = gpr_malloc(sizeof(server_port) * INIT_PORT_CAP); |
|
s->nports = 0; |
|
s->port_capacity = INIT_PORT_CAP; |
|
|
|
return s; |
|
} |
|
|
|
static void finish_shutdown(grpc_exec_ctx *exec_ctx, grpc_udp_server *s) { |
|
grpc_exec_ctx_enqueue(exec_ctx, s->shutdown_complete, 1); |
|
|
|
gpr_mu_destroy(&s->mu); |
|
gpr_cv_destroy(&s->cv); |
|
|
|
gpr_free(s->ports); |
|
gpr_free(s); |
|
} |
|
|
|
static void destroyed_port(grpc_exec_ctx *exec_ctx, void *server, int success) { |
|
grpc_udp_server *s = server; |
|
gpr_mu_lock(&s->mu); |
|
s->destroyed_ports++; |
|
if (s->destroyed_ports == s->nports) { |
|
gpr_mu_unlock(&s->mu); |
|
finish_shutdown(exec_ctx, s); |
|
} else { |
|
gpr_mu_unlock(&s->mu); |
|
} |
|
} |
|
|
|
/* called when all listening endpoints have been shutdown, so no further |
|
events will be received on them - at this point it's safe to destroy |
|
things */ |
|
static void deactivated_all_ports(grpc_exec_ctx *exec_ctx, grpc_udp_server *s) { |
|
size_t i; |
|
|
|
/* delete ALL the things */ |
|
gpr_mu_lock(&s->mu); |
|
|
|
if (!s->shutdown) { |
|
gpr_mu_unlock(&s->mu); |
|
return; |
|
} |
|
|
|
if (s->nports) { |
|
for (i = 0; i < s->nports; i++) { |
|
server_port *sp = &s->ports[i]; |
|
if (sp->addr.sockaddr.sa_family == AF_UNIX) { |
|
unlink_if_unix_domain_socket(&sp->addr.un); |
|
} |
|
sp->destroyed_closure.cb = destroyed_port; |
|
sp->destroyed_closure.cb_arg = s; |
|
grpc_fd_orphan(exec_ctx, sp->emfd, &sp->destroyed_closure, NULL, |
|
"udp_listener_shutdown"); |
|
} |
|
gpr_mu_unlock(&s->mu); |
|
} else { |
|
gpr_mu_unlock(&s->mu); |
|
finish_shutdown(exec_ctx, s); |
|
} |
|
} |
|
|
|
void grpc_udp_server_destroy(grpc_exec_ctx *exec_ctx, grpc_udp_server *s, |
|
grpc_closure *on_done) { |
|
size_t i; |
|
gpr_mu_lock(&s->mu); |
|
|
|
GPR_ASSERT(!s->shutdown); |
|
s->shutdown = 1; |
|
|
|
s->shutdown_complete = on_done; |
|
|
|
/* shutdown all fd's */ |
|
if (s->active_ports) { |
|
for (i = 0; i < s->nports; i++) { |
|
grpc_fd_shutdown(exec_ctx, s->ports[i].emfd); |
|
} |
|
gpr_mu_unlock(&s->mu); |
|
} else { |
|
gpr_mu_unlock(&s->mu); |
|
deactivated_all_ports(exec_ctx, s); |
|
} |
|
} |
|
|
|
/* Prepare a recently-created socket for listening. */ |
|
static int prepare_socket(int fd, const struct sockaddr *addr, |
|
size_t addr_len) { |
|
struct sockaddr_storage sockname_temp; |
|
socklen_t sockname_len; |
|
int get_local_ip; |
|
int rc; |
|
|
|
if (fd < 0) { |
|
goto error; |
|
} |
|
|
|
if (!grpc_set_socket_nonblocking(fd, 1) || !grpc_set_socket_cloexec(fd, 1)) { |
|
gpr_log(GPR_ERROR, "Unable to configure socket %d: %s", fd, |
|
strerror(errno)); |
|
} |
|
|
|
get_local_ip = 1; |
|
rc = setsockopt(fd, IPPROTO_IP, IP_PKTINFO, &get_local_ip, |
|
sizeof(get_local_ip)); |
|
if (rc == 0 && addr->sa_family == AF_INET6) { |
|
#if !defined(__APPLE__) |
|
rc = setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, &get_local_ip, |
|
sizeof(get_local_ip)); |
|
#endif |
|
} |
|
|
|
GPR_ASSERT(addr_len < ~(socklen_t)0); |
|
if (bind(fd, addr, (socklen_t)addr_len) < 0) { |
|
char *addr_str; |
|
grpc_sockaddr_to_string(&addr_str, addr, 0); |
|
gpr_log(GPR_ERROR, "bind addr=%s: %s", addr_str, strerror(errno)); |
|
gpr_free(addr_str); |
|
goto error; |
|
} |
|
|
|
sockname_len = sizeof(sockname_temp); |
|
if (getsockname(fd, (struct sockaddr *)&sockname_temp, &sockname_len) < 0) { |
|
goto error; |
|
} |
|
|
|
return grpc_sockaddr_get_port((struct sockaddr *)&sockname_temp); |
|
|
|
error: |
|
if (fd >= 0) { |
|
close(fd); |
|
} |
|
return -1; |
|
} |
|
|
|
/* event manager callback when reads are ready */ |
|
static void on_read(grpc_exec_ctx *exec_ctx, void *arg, int success) { |
|
server_port *sp = arg; |
|
|
|
if (success == 0) { |
|
gpr_mu_lock(&sp->server->mu); |
|
if (0 == --sp->server->active_ports) { |
|
gpr_mu_unlock(&sp->server->mu); |
|
deactivated_all_ports(exec_ctx, sp->server); |
|
} else { |
|
gpr_mu_unlock(&sp->server->mu); |
|
} |
|
return; |
|
} |
|
|
|
/* Tell the registered callback that data is available to read. */ |
|
GPR_ASSERT(sp->read_cb); |
|
sp->read_cb(exec_ctx, sp->emfd, sp->server->grpc_server); |
|
|
|
/* Re-arm the notification event so we get another chance to read. */ |
|
grpc_fd_notify_on_read(exec_ctx, sp->emfd, &sp->read_closure); |
|
} |
|
|
|
static int add_socket_to_server(grpc_udp_server *s, int fd, |
|
const struct sockaddr *addr, size_t addr_len, |
|
grpc_udp_server_read_cb read_cb) { |
|
server_port *sp; |
|
int port; |
|
char *addr_str; |
|
char *name; |
|
|
|
port = prepare_socket(fd, addr, addr_len); |
|
if (port >= 0) { |
|
grpc_sockaddr_to_string(&addr_str, (struct sockaddr *)&addr, 1); |
|
gpr_asprintf(&name, "udp-server-listener:%s", addr_str); |
|
gpr_free(addr_str); |
|
gpr_mu_lock(&s->mu); |
|
/* append it to the list under a lock */ |
|
if (s->nports == s->port_capacity) { |
|
s->port_capacity *= 2; |
|
s->ports = gpr_realloc(s->ports, sizeof(server_port) * s->port_capacity); |
|
} |
|
sp = &s->ports[s->nports++]; |
|
sp->server = s; |
|
sp->fd = fd; |
|
sp->emfd = grpc_fd_create(fd, name); |
|
memcpy(sp->addr.untyped, addr, addr_len); |
|
sp->addr_len = addr_len; |
|
sp->read_cb = read_cb; |
|
GPR_ASSERT(sp->emfd); |
|
gpr_mu_unlock(&s->mu); |
|
gpr_free(name); |
|
} |
|
|
|
return port; |
|
} |
|
|
|
int grpc_udp_server_add_port(grpc_udp_server *s, const void *addr, |
|
size_t addr_len, grpc_udp_server_read_cb read_cb) { |
|
int allocated_port1 = -1; |
|
int allocated_port2 = -1; |
|
unsigned i; |
|
int fd; |
|
grpc_dualstack_mode dsmode; |
|
struct sockaddr_in6 addr6_v4mapped; |
|
struct sockaddr_in wild4; |
|
struct sockaddr_in6 wild6; |
|
struct sockaddr_in addr4_copy; |
|
struct sockaddr *allocated_addr = NULL; |
|
struct sockaddr_storage sockname_temp; |
|
socklen_t sockname_len; |
|
int port; |
|
|
|
if (((struct sockaddr *)addr)->sa_family == AF_UNIX) { |
|
unlink_if_unix_domain_socket(addr); |
|
} |
|
|
|
/* Check if this is a wildcard port, and if so, try to keep the port the same |
|
as some previously created listener. */ |
|
if (grpc_sockaddr_get_port(addr) == 0) { |
|
for (i = 0; i < s->nports; i++) { |
|
sockname_len = sizeof(sockname_temp); |
|
if (0 == getsockname(s->ports[i].fd, (struct sockaddr *)&sockname_temp, |
|
&sockname_len)) { |
|
port = grpc_sockaddr_get_port((struct sockaddr *)&sockname_temp); |
|
if (port > 0) { |
|
allocated_addr = malloc(addr_len); |
|
memcpy(allocated_addr, addr, addr_len); |
|
grpc_sockaddr_set_port(allocated_addr, port); |
|
addr = allocated_addr; |
|
break; |
|
} |
|
} |
|
} |
|
} |
|
|
|
if (grpc_sockaddr_to_v4mapped(addr, &addr6_v4mapped)) { |
|
addr = (const struct sockaddr *)&addr6_v4mapped; |
|
addr_len = sizeof(addr6_v4mapped); |
|
} |
|
|
|
/* Treat :: or 0.0.0.0 as a family-agnostic wildcard. */ |
|
if (grpc_sockaddr_is_wildcard(addr, &port)) { |
|
grpc_sockaddr_make_wildcards(port, &wild4, &wild6); |
|
|
|
/* Try listening on IPv6 first. */ |
|
addr = (struct sockaddr *)&wild6; |
|
addr_len = sizeof(wild6); |
|
fd = grpc_create_dualstack_socket(addr, SOCK_DGRAM, IPPROTO_UDP, &dsmode); |
|
allocated_port1 = add_socket_to_server(s, fd, addr, addr_len, read_cb); |
|
if (fd >= 0 && dsmode == GRPC_DSMODE_DUALSTACK) { |
|
goto done; |
|
} |
|
|
|
/* If we didn't get a dualstack socket, also listen on 0.0.0.0. */ |
|
if (port == 0 && allocated_port1 > 0) { |
|
grpc_sockaddr_set_port((struct sockaddr *)&wild4, allocated_port1); |
|
} |
|
addr = (struct sockaddr *)&wild4; |
|
addr_len = sizeof(wild4); |
|
} |
|
|
|
fd = grpc_create_dualstack_socket(addr, SOCK_DGRAM, IPPROTO_UDP, &dsmode); |
|
if (fd < 0) { |
|
gpr_log(GPR_ERROR, "Unable to create socket: %s", strerror(errno)); |
|
} |
|
if (dsmode == GRPC_DSMODE_IPV4 && |
|
grpc_sockaddr_is_v4mapped(addr, &addr4_copy)) { |
|
addr = (struct sockaddr *)&addr4_copy; |
|
addr_len = sizeof(addr4_copy); |
|
} |
|
allocated_port2 = add_socket_to_server(s, fd, addr, addr_len, read_cb); |
|
|
|
done: |
|
gpr_free(allocated_addr); |
|
return allocated_port1 >= 0 ? allocated_port1 : allocated_port2; |
|
} |
|
|
|
int grpc_udp_server_get_fd(grpc_udp_server *s, unsigned port_index) { |
|
return (port_index < s->nports) ? s->ports[port_index].fd : -1; |
|
} |
|
|
|
void grpc_udp_server_start(grpc_exec_ctx *exec_ctx, grpc_udp_server *s, |
|
grpc_pollset **pollsets, size_t pollset_count, |
|
grpc_server *server) { |
|
size_t i, j; |
|
gpr_mu_lock(&s->mu); |
|
GPR_ASSERT(s->active_ports == 0); |
|
s->pollsets = pollsets; |
|
s->grpc_server = server; |
|
for (i = 0; i < s->nports; i++) { |
|
for (j = 0; j < pollset_count; j++) { |
|
grpc_pollset_add_fd(exec_ctx, pollsets[j], s->ports[i].emfd); |
|
} |
|
s->ports[i].read_closure.cb = on_read; |
|
s->ports[i].read_closure.cb_arg = &s->ports[i]; |
|
grpc_fd_notify_on_read(exec_ctx, s->ports[i].emfd, |
|
&s->ports[i].read_closure); |
|
s->active_ports++; |
|
} |
|
gpr_mu_unlock(&s->mu); |
|
} |
|
|
|
/* TODO(rjshade): Add a test for this method. */ |
|
void grpc_udp_server_write(server_port *sp, const char *buffer, size_t buf_len, |
|
const struct sockaddr *peer_address) { |
|
ssize_t rc; |
|
rc = sendto(sp->fd, buffer, buf_len, 0, peer_address, sizeof(peer_address)); |
|
if (rc < 0) { |
|
gpr_log(GPR_ERROR, "Unable to send data: %s", strerror(errno)); |
|
} |
|
} |
|
|
|
#endif |
|
#endif
|
|
|