File: event.cc

package info (click to toggle)
golang-github-google-certificate-transparency 0.0~git20160709.0.0f6e3d1~ds1-3
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, bullseye, buster
  • size: 5,676 kB
  • sloc: cpp: 35,278; python: 11,838; java: 1,911; sh: 1,885; makefile: 950; xml: 520; ansic: 225
file content (285 lines) | stat: -rw-r--r-- 6,742 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
/* -*- indent-tabs-mode: nil -*- */
#include "server/event.h"

#include <limits.h>
#include <openssl/evp.h>
#include <openssl/pem.h>

time_t Services::rough_time_;

FD::FD(EventLoop* loop, int fd, CanDelete deletable)
    : fd_(fd), loop_(loop), wants_erase_(false), deletable_(deletable) {
  DCHECK_GE(fd, 0);
  CHECK_LT((unsigned)fd, (unsigned)FD_SETSIZE);
  loop->Add(this);
  Activity();
}

void FD::Close() {
  DCHECK_EQ(deletable_, DELETE) << "Can't call Close() on a non-deletable FD";
  if (wants_erase_) {
    LOG(INFO) << "Attempting to close an already closed fd " << fd();
    return;
  }
  LOG(INFO) << "Closing fd " << fd() << std::endl;
  wants_erase_ = true;
  shutdown(fd(), SHUT_RDWR);
  close(fd());
}

bool FD::WillAccept(int fd) {
  if (fd >= kFDLimit - kFDLimitWindow)
    loop()->MaybeDropOne();
  return fd < kFDLimit;
}

void Listener::ReadIsAllowed() {
  int in = accept(fd(), NULL, NULL);
  CHECK_GE(in, 0);
  if (!WillAccept(in)) {
    static char sorry[] = "No free connections.\n";

    // we have to consume the result.
    ssize_t s = write(in, sorry, sizeof sorry);
    if (s != sizeof sorry)
      LOG(WARNING) << "Failed to write sorry correctly.";
    shutdown(in, SHUT_RDWR);
    close(in);
    return;
  }
  Accepted(in);
}

void Listener::WriteIsAllowed() {
  DLOG(FATAL) << "WriteIsAllowed() called on a read-only Listener.";
}

time_t EventLoop::ProcessRepeatedEvents() {
  if (events_.empty())
    return INT_MAX;
  Services::SetRoughTime();
  time_t now = Services::RoughTime();
  time_t earliest = INT_MAX;
  for (std::vector<RepeatedEvent*>::iterator it = events_.begin();
       it != events_.end(); ++it) {
    RepeatedEvent* event = *it;
    time_t trigger = event->Trigger();
    if (trigger <= now) {
      event->Execute();
      LOG(INFO) << "Executed " << event->Description() << " with a delay of "
                << difftime(now, trigger) << " seconds";
      event->Activity();
      trigger = event->Trigger();
      CHECK_GT(trigger, now);
    }
    earliest = std::min(earliest, trigger);
  }
  CHECK_GT(earliest, 0);
  return earliest - now;
}

void EventLoop::OneLoop() {
  time_t select_timeout = ProcessRepeatedEvents();
  // Do not schedule any repeated events between now and the next
  // select - they will get ignored until select returns.
  CHECK_GT(select_timeout, 0);

  fd_set readers, writers;
  int max = -1;

  memset(&readers, '\0', sizeof readers);
  memset(&writers, '\0', sizeof writers);
  for (std::deque<FD*>::const_iterator pfd = fds_.begin(); pfd != fds_.end();
       ++pfd) {
    FD* fd = *pfd;

    DCHECK(!fd->WantsErase());
    if (fd->WantsWrite())
      Set(fd->fd(), &writers, &max);
    if (fd->WantsRead())
      Set(fd->fd(), &readers, &max);
  }

  CHECK_GE(max, 0);

  struct timeval tv;
  tv.tv_sec = select_timeout;
  tv.tv_usec = 0;

  int r = select(max + 1, &readers, &writers, NULL, &tv);
  if (r == 0)
    return;

  CHECK_GT(r, 0);

  Services::SetRoughTime();
  int n = 0;
  for (std::deque<FD*>::iterator pfd = fds_.begin(); pfd != fds_.end();) {
    FD* fd = *pfd;

    if (EraseCheck(&pfd))
      continue;

    if (FD_ISSET(fd->fd(), &writers)) {
      DCHECK(fd->WantsWrite());
      fd->WriteIsAllowed();
      fd->Activity();
      ++n;
    }

    if (EraseCheck(&pfd))
      continue;

    if (FD_ISSET(fd->fd(), &readers)) {
      DCHECK(fd->WantsRead());
      fd->ReadIsAllowed();
      fd->Activity();
      ++n;
    }

    if (EraseCheck(&pfd))
      continue;

    ++pfd;
  }
  CHECK_LE(n, r);
}

void EventLoop::Stop() {
  go_ = false;
}

void EventLoop::Forever() {
  for (; go_;)
    OneLoop();
}

void EventLoop::MaybeDropOne() {
  std::deque<FD*>::iterator drop = fds_.end();
  time_t oldest = Services::RoughTime() - kIdleTime;

  for (std::deque<FD*>::iterator pfd = fds_.begin(); pfd != fds_.end();
       ++pfd) {
    FD* fd = *pfd;

    if (fd->CanDrop() && fd->LastActivity() < oldest) {
      oldest = fd->LastActivity();
      drop = pfd;
    }
  }
  if (drop != fds_.end())
    (*drop)->Close();
}

bool EventLoop::EraseCheck(std::deque<FD*>::iterator* pfd) {
  if ((**pfd)->WantsErase()) {
    delete **pfd;
    *pfd = fds_.erase(*pfd);
    return true;
  }
  return false;
}

// static
void EventLoop::Set(int fd, fd_set* fdset, int* max) {
  DCHECK_GE(fd, 0);
  CHECK_LT((unsigned)fd, (unsigned)FD_SETSIZE);
  FD_SET(fd, fdset);
  if (fd > *max)
    *max = fd;
}

void Server::ReadIsAllowed() {
  char buf[1024];

  ssize_t n = read(fd(), buf, sizeof buf);
  VLOG(1) << "read " << n << " bytes from " << fd();
  if (n <= 0) {
    Close();
    return;
  }
  rbuffer_.append(buf, (size_t)n);
  BytesRead(&rbuffer_);
}

void Server::WriteIsAllowed() {
  ssize_t n = write(fd(), wbuffer_.data(), wbuffer_.length());
  VLOG(1) << "wrote " << n << " bytes to " << fd();
  if (n <= 0) {
    Close();
    return;
  }
  wbuffer_.erase(0, n);
}

void UDPServer::ReadIsAllowed() {
  char buf[2048];
  struct sockaddr_in sa;
  socklen_t sa_len = sizeof sa;

  ssize_t in = recvfrom(fd(), buf, sizeof buf, 0, (sockaddr*)&sa, &sa_len);
  CHECK_GE(in, 1);
  CHECK_EQ(sa_len, sizeof sa);
  // LOG(INFO) << "UDP packet " << util::HexString(std::string(buf, in));
  PacketRead(sa, buf, in);
}

void UDPServer::WriteIsAllowed() {
  CHECK(!write_queue_.empty());
  WBuffer wbuf = write_queue_.front();
  write_queue_.pop_front();
  ssize_t out = sendto(fd(), wbuf.packet.data(), wbuf.packet.length(), 0,
                       (const sockaddr*)&wbuf.sa, sizeof wbuf.sa);
  CHECK_NE(out, -1);
  CHECK_EQ((size_t)out, wbuf.packet.length());
}

void UDPServer::QueuePacket(const sockaddr_in& to, const char* buf,
                            size_t len) {
  WBuffer wbuf;
  wbuf.sa = to;
  wbuf.packet = std::string(buf, len);
  write_queue_.push_back(wbuf);
}

bool Services::InitServer(int* sock, int port, const char* ip, int type) {
  bool ret = false;
  struct sockaddr_in server;
  int s = -1;

  memset(&server, 0, sizeof(server));
  server.sin_family = AF_INET;
  server.sin_port = htons((unsigned short)port);
  if (ip == NULL)
    server.sin_addr.s_addr = htonl(INADDR_ANY);
  else
    memcpy(&server.sin_addr.s_addr, ip, 4);

  if (type == SOCK_STREAM)
    s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  else /* type == SOCK_DGRAM */
    s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  if (s == -1)
    goto err;

  {
    int j = 1;
    setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &j, sizeof j);
  }

  if (bind(s, (struct sockaddr*)&server, sizeof(server)) == -1) {
    perror("bind");
    goto err;
  }
  /* Make it 128 for linux */
  if (type == SOCK_STREAM && listen(s, 128) == -1)
    goto err;
  *sock = s;
  ret = true;
err:
  if (!ret && s != -1) {
    shutdown(s, SHUT_RDWR);
    close(s);
  }
  return ret;
}