Line data Source code
1 : #include "fd_http_resolver.h"
2 : #include "fd_ssresolve.h"
3 :
4 : #include "../../../util/log/fd_log.h"
5 : #include "../../../util/fd_util.h"
6 :
7 : #include <poll.h>
8 : #include <errno.h>
9 : #include <unistd.h>
10 : #include <sys/socket.h>
11 : #include <netinet/in.h>
12 : #include <netinet/tcp.h>
13 :
14 : #if FD_HAS_OPENSSL
15 : #include <openssl/ssl.h>
16 : #include "../../../waltz/openssl/fd_openssl_tile.h"
17 : #endif
18 :
19 0 : #define PEER_STATE_UNRESOLVED (0)
20 0 : #define PEER_STATE_REFRESHING (1)
21 0 : #define PEER_STATE_VALID (2)
22 0 : #define PEER_STATE_INVALID (3)
23 :
24 0 : #define PEER_DEADLINE_NANOS_VALID (5L*1000L*1000L*1000L) /* 5 seconds */
25 0 : #define PEER_DEADLINE_NANOS_RESOLVE (2L*1000L*1000L*1000L) /* 2 seconds */
26 0 : #define PEER_DEADLINE_NANOS_INVALID (5L*1000L*1000L*1000L) /* 5 seconds */
27 :
28 : /* FIXME: The fds/fds_len/idx logic is fragile, replace with something
29 : that duplicates less state / etc. */
30 :
31 : struct fd_ssresolve_peer {
32 : fd_sspeer_key_t key;
33 : fd_ip4_port_t addr;
34 : int is_https;
35 : ulong full_slot;
36 : ulong incr_slot;
37 : uchar full_hash[ FD_HASH_FOOTPRINT ];
38 : uchar incr_hash[ FD_HASH_FOOTPRINT ];
39 :
40 : fd_ssresolve_t * full_ssresolve;
41 : fd_ssresolve_t * inc_ssresolve;
42 :
43 : struct {
44 : ulong next;
45 : } pool;
46 :
47 : struct {
48 : ulong next;
49 : ulong prev;
50 : } deadline;
51 :
52 : struct {
53 : ulong idx;
54 : } fd;
55 :
56 : int state;
57 : long deadline_nanos;
58 : };
59 : typedef struct fd_ssresolve_peer fd_ssresolve_peer_t;
60 :
61 : #define POOL_NAME peer_pool
62 0 : #define POOL_T fd_ssresolve_peer_t
63 : #define POOL_IDX_T ulong
64 0 : #define POOL_NEXT pool.next
65 : #include "../../../util/tmpl/fd_pool.c"
66 :
67 : #define DLIST_NAME deadline_list
68 : #define DLIST_ELE_T fd_ssresolve_peer_t
69 0 : #define DLIST_PREV deadline.prev
70 0 : #define DLIST_NEXT deadline.next
71 : #include "../../../util/tmpl/fd_dlist.c"
72 :
73 : struct fd_http_resolver_private {
74 : fd_ssresolve_peer_t * pool;
75 : deadline_list_t * unresolved;
76 : deadline_list_t * resolving;
77 : deadline_list_t * valid;
78 : deadline_list_t * invalid;
79 :
80 : ulong fds_len;
81 : struct pollfd * fds;
82 : ulong * fds_idx;
83 :
84 : int incremental_snapshot_fetch;
85 :
86 : void * cb_arg;
87 : fd_http_resolver_on_resolve_fn_t on_resolve_cb;
88 :
89 : #if FD_HAS_OPENSSL
90 : SSL_CTX * ssl_ctx;
91 : #endif
92 :
93 : ulong magic; /* ==FD_HTTP_RESOLVER_MAGIC */
94 : };
95 :
96 : FD_FN_CONST ulong
97 0 : fd_http_resolver_align( void ) {
98 0 : return fd_ulong_max( alignof(fd_http_resolver_t), fd_ulong_max( peer_pool_align(), fd_ulong_max( deadline_list_align(), fd_ulong_max( alignof(struct pollfd), alignof(ulong) ) ) ) );
99 0 : }
100 :
101 : FD_FN_CONST ulong
102 0 : fd_http_resolver_footprint( ulong peers_cnt ) {
103 0 : ulong l;
104 0 : l = FD_LAYOUT_INIT;
105 0 : l = FD_LAYOUT_APPEND( l, alignof(fd_http_resolver_t), sizeof(fd_http_resolver_t) );
106 0 : l = FD_LAYOUT_APPEND( l, peer_pool_align(), peer_pool_footprint( peers_cnt ) );
107 0 : l = FD_LAYOUT_APPEND( l, deadline_list_align(), deadline_list_footprint() );
108 0 : l = FD_LAYOUT_APPEND( l, deadline_list_align(), deadline_list_footprint() );
109 0 : l = FD_LAYOUT_APPEND( l, deadline_list_align(), deadline_list_footprint() );
110 0 : l = FD_LAYOUT_APPEND( l, deadline_list_align(), deadline_list_footprint() );
111 0 : l = FD_LAYOUT_APPEND( l, alignof(struct pollfd), 2UL*peers_cnt*sizeof(struct pollfd) );
112 0 : l = FD_LAYOUT_APPEND( l, alignof(ulong), 2UL*peers_cnt*sizeof(ulong) );
113 :
114 0 : for( ulong i=0UL; i<peers_cnt*2UL; i++ ) {
115 0 : l = FD_LAYOUT_APPEND( l, fd_ssresolve_align(), fd_ssresolve_footprint() );
116 0 : }
117 0 : return FD_LAYOUT_FINI( l, fd_http_resolver_align() );
118 0 : }
119 :
120 : void *
121 : fd_http_resolver_new( void * shmem,
122 : ulong peers_cnt,
123 : int incremental_snapshot_fetch,
124 : fd_http_resolver_on_resolve_fn_t on_resolve_cb,
125 0 : void * cb_arg ) {
126 0 : if( FD_UNLIKELY( !shmem ) ) {
127 0 : FD_LOG_WARNING(( "NULL shmem" ));
128 0 : return NULL;
129 0 : }
130 :
131 0 : if( FD_UNLIKELY( !fd_ulong_is_aligned( (ulong)shmem, fd_http_resolver_align() ) ) ) {
132 0 : FD_LOG_WARNING(( "unaligned shmem" ));
133 0 : return NULL;
134 0 : }
135 :
136 0 : if( FD_UNLIKELY( peers_cnt<1UL ) ) {
137 0 : FD_LOG_WARNING(( "max_peers must be at least 1" ));
138 0 : return NULL;
139 0 : }
140 :
141 0 : FD_SCRATCH_ALLOC_INIT( l, shmem );
142 0 : fd_http_resolver_t * resolver = FD_SCRATCH_ALLOC_APPEND( l, fd_http_resolver_align(), sizeof(fd_http_resolver_t) );
143 0 : void * _pool = FD_SCRATCH_ALLOC_APPEND( l, peer_pool_align(), peer_pool_footprint( peers_cnt ) );
144 0 : void * _unresolved = FD_SCRATCH_ALLOC_APPEND( l, deadline_list_align(), deadline_list_footprint() );
145 0 : void * _resolving = FD_SCRATCH_ALLOC_APPEND( l, deadline_list_align(), deadline_list_footprint() );
146 0 : void * _invalid = FD_SCRATCH_ALLOC_APPEND( l, deadline_list_align(), deadline_list_footprint() );
147 0 : void * _valid = FD_SCRATCH_ALLOC_APPEND( l, deadline_list_align(), deadline_list_footprint() );
148 0 : struct pollfd * fds = FD_SCRATCH_ALLOC_APPEND( l, alignof(struct pollfd), 2UL*peers_cnt*sizeof(struct pollfd) );
149 0 : ulong * fds_idx = FD_SCRATCH_ALLOC_APPEND( l, alignof(ulong), 2UL*peers_cnt*sizeof(ulong) );
150 :
151 0 : resolver->pool = peer_pool_join( peer_pool_new( _pool, peers_cnt ) );
152 0 : resolver->unresolved = deadline_list_join( deadline_list_new( _unresolved ) );
153 0 : resolver->resolving = deadline_list_join( deadline_list_new( _resolving ) );
154 0 : resolver->invalid = deadline_list_join( deadline_list_new( _invalid ) );
155 0 : resolver->valid = deadline_list_join( deadline_list_new( _valid ) );
156 :
157 0 : resolver->fds_len = 0UL;
158 0 : resolver->fds = fds;
159 0 : resolver->fds_idx = fds_idx;
160 :
161 0 : for( ulong i=0UL; i<peer_pool_max( resolver->pool ); i++ ) {
162 0 : void * _full_ssresolve = FD_SCRATCH_ALLOC_APPEND( l, fd_ssresolve_align(), fd_ssresolve_footprint() );
163 0 : void * _inc_ssresolve = FD_SCRATCH_ALLOC_APPEND( l, fd_ssresolve_align(), fd_ssresolve_footprint() );
164 0 : resolver->pool[ i ].full_ssresolve = fd_ssresolve_join( fd_ssresolve_new( _full_ssresolve ) );
165 0 : resolver->pool[ i ].inc_ssresolve = fd_ssresolve_join( fd_ssresolve_new( _inc_ssresolve ) );
166 0 : }
167 :
168 0 : resolver->incremental_snapshot_fetch = incremental_snapshot_fetch;
169 0 : resolver->cb_arg = cb_arg;
170 0 : resolver->on_resolve_cb = on_resolve_cb;
171 :
172 0 : #if FD_HAS_OPENSSL
173 0 : SSL_CTX * ssl_ctx = SSL_CTX_new( TLS_client_method() );
174 0 : if( FD_UNLIKELY( !ssl_ctx ) ) {
175 0 : FD_LOG_ERR(( "SSL_CTX_new failed" ));
176 0 : }
177 :
178 0 : if( FD_UNLIKELY( !SSL_CTX_set_min_proto_version( ssl_ctx, TLS1_3_VERSION ) ) ) {
179 0 : FD_LOG_ERR(( "SSL_CTX_set_min_proto_version(ssl_ctx,TLS1_3_VERSION) failed" ));
180 0 : }
181 :
182 : /* transfering ownership of ssl_ctx by assignment */
183 0 : resolver->ssl_ctx = ssl_ctx;
184 :
185 0 : fd_ossl_load_certs( resolver->ssl_ctx );
186 0 : #endif
187 :
188 0 : FD_COMPILER_MFENCE();
189 0 : FD_VOLATILE( resolver->magic ) = FD_HTTP_RESOLVER_MAGIC;
190 0 : FD_COMPILER_MFENCE();
191 :
192 0 : return (void *)resolver;
193 0 : }
194 :
195 : fd_http_resolver_t *
196 0 : fd_http_resolver_join( void * shresolver ) {
197 0 : if( FD_UNLIKELY( !shresolver ) ) {
198 0 : FD_LOG_WARNING(( "NULL shresolver" ));
199 0 : return NULL;
200 0 : }
201 :
202 0 : if( FD_UNLIKELY( !fd_ulong_is_aligned( (ulong)shresolver, fd_http_resolver_align() ) ) ) {
203 0 : FD_LOG_WARNING(( "misaligned shresolver" ));
204 0 : return NULL;
205 0 : }
206 :
207 0 : fd_http_resolver_t * resolver = (fd_http_resolver_t *)shresolver;
208 :
209 0 : if( FD_UNLIKELY( resolver->magic!=FD_HTTP_RESOLVER_MAGIC ) ) {
210 0 : FD_LOG_WARNING(( "bad magic" ));
211 0 : return NULL;
212 0 : }
213 :
214 0 : return resolver;
215 0 : }
216 :
217 : int
218 : fd_http_resolver_add( fd_http_resolver_t * resolver,
219 : fd_ip4_port_t addr,
220 : char const * hostname,
221 : int is_https,
222 0 : fd_sspeer_selector_t * selector ) {
223 0 : if( !peer_pool_free( resolver->pool ) ) {
224 0 : FD_LOG_WARNING(( "peer pool exhausted" ));
225 0 : return -1;
226 0 : }
227 0 : fd_ssresolve_peer_t * peer = peer_pool_ele_acquire( resolver->pool );
228 0 : memset( &peer->key.url, 0, sizeof(peer->key.url) );
229 0 : if( FD_LIKELY( hostname ) ) {
230 0 : strncpy( peer->key.url.hostname, hostname, sizeof(peer->key.url.hostname) - 1UL );
231 0 : peer->key.url.hostname[ sizeof(peer->key.url.hostname) - 1UL ] = '\0';
232 0 : } else {
233 0 : peer->key.url.hostname[ 0 ] = '\0';
234 0 : }
235 0 : peer->key.url.resolved_addr = addr;
236 0 : peer->key.is_url = 1;
237 0 : peer->state = PEER_STATE_UNRESOLVED;
238 0 : peer->addr = addr;
239 0 : peer->is_https = is_https;
240 0 : peer->fd.idx = ULONG_MAX;
241 0 : peer->full_slot = ULONG_MAX;
242 0 : peer->incr_slot = ULONG_MAX;
243 :
244 : /* The peer needs to be added to the selector, in order to guarantee
245 : that any subsequent update on the selector is able to find it.
246 : At this time, latency, full/incr slot, as well as full/incr hash
247 : are unknown. */
248 0 : ulong score = fd_sspeer_selector_add( selector, &peer->key, addr, ULONG_MAX, ULONG_MAX, ULONG_MAX, NULL, NULL );
249 0 : if( FD_UNLIKELY( score==ULONG_MAX ) ) {
250 : /* If unable to add, then release the element back to the pool. */
251 0 : FD_LOG_WARNING(( "failed to add peer to selector (hostname \"%s\" addr=" FD_IP4_ADDR_FMT ":%hu score=%lu)",
252 0 : peer->key.url.hostname[ 0 ] ? peer->key.url.hostname : "(none)",
253 0 : FD_IP4_ADDR_FMT_ARGS( peer->addr.addr ), fd_ushort_bswap( peer->addr.port ), score ));
254 0 : peer_pool_ele_release( resolver->pool, peer );
255 0 : return -1;
256 0 : }
257 : /* Add to the unresolved list. */
258 0 : deadline_list_ele_push_tail( resolver->unresolved, peer, resolver->pool );
259 0 : return 0;
260 0 : }
261 :
262 : static int
263 : create_socket( fd_http_resolver_t * resolver,
264 0 : fd_ssresolve_peer_t * peer ) {
265 0 : int sockfd = socket( AF_INET, SOCK_STREAM|SOCK_NONBLOCK, 0 );
266 0 : if( FD_UNLIKELY( -1==sockfd ) ) FD_LOG_ERR(( "socket failed (%i-%s)", errno, strerror( errno ) ));
267 :
268 0 : int optval = 1;
269 0 : if( FD_UNLIKELY( -1==setsockopt( sockfd, IPPROTO_TCP, TCP_NODELAY, &optval, sizeof(int) ) ) ) {
270 0 : FD_LOG_ERR(( "setsockopt() failed (%d-%s)", errno, fd_io_strerror( errno ) ));
271 0 : }
272 :
273 0 : struct sockaddr_in addr = {
274 0 : .sin_family = AF_INET,
275 0 : .sin_port = peer->addr.port,
276 0 : .sin_addr = { .s_addr = peer->addr.addr }
277 0 : };
278 :
279 0 : if( FD_UNLIKELY( -1==connect( sockfd, fd_type_pun( &addr ), sizeof(addr) ) && errno!=EINPROGRESS ) ) {
280 0 : if( FD_UNLIKELY( -1==close( sockfd ) ) ) FD_LOG_ERR(( "close() failed (%i-%s)", errno, fd_io_strerror( errno ) ));
281 0 : return -1;
282 0 : }
283 :
284 0 : resolver->fds[ resolver->fds_len ] = (struct pollfd){
285 0 : .fd = sockfd,
286 0 : .events = POLLIN|POLLOUT,
287 0 : .revents = 0
288 0 : };
289 :
290 0 : return 0;
291 0 : }
292 :
293 : static int
294 : peer_connect( fd_http_resolver_t * resolver,
295 0 : fd_ssresolve_peer_t * peer ) {
296 0 : int err;
297 0 : err = create_socket( resolver, peer ); /* full */
298 0 : if( FD_UNLIKELY( err ) ) return err;
299 0 : resolver->fds_idx[ resolver->fds_len ] = peer_pool_idx( resolver->pool, peer );
300 0 : peer->fd.idx = resolver->fds_len;
301 0 : resolver->fds_len++;
302 :
303 0 : if( FD_UNLIKELY( peer->is_https ) ) {
304 0 : #if FD_HAS_OPENSSL
305 0 : fd_ssresolve_init_https( peer->full_ssresolve, peer->addr, resolver->fds[ peer->fd.idx ].fd, 1, peer->key.url.hostname, resolver->ssl_ctx );
306 : #else
307 : FD_LOG_ERR(( "peer %s requires https but firedancer is built without openssl support. Please remove this peer from your validator config.", peer->key.url.hostname ));
308 : #endif
309 0 : } else {
310 0 : fd_ssresolve_init( peer->full_ssresolve, peer->addr, resolver->fds[ peer->fd.idx ].fd, 1, peer->key.url.hostname );
311 0 : }
312 :
313 0 : if( FD_LIKELY( resolver->incremental_snapshot_fetch ) ) {
314 0 : err = create_socket( resolver, peer ); /* incremental */
315 0 : if( FD_UNLIKELY( err ) ) return err;
316 0 : resolver->fds_idx[ resolver->fds_len ] = peer_pool_idx( resolver->pool, peer );
317 0 : resolver->fds_len++;
318 0 : if( FD_UNLIKELY( peer->is_https ) ) {
319 0 : #if FD_HAS_OPENSSL
320 0 : fd_ssresolve_init_https( peer->inc_ssresolve, peer->addr, resolver->fds[ peer->fd.idx+1UL ].fd, 0, peer->key.url.hostname, resolver->ssl_ctx );
321 : #else
322 : FD_LOG_ERR(( "peer requires https but firedancer is built without openssl support" ));
323 : #endif
324 0 : } else {
325 0 : fd_ssresolve_init( peer->inc_ssresolve, peer->addr, resolver->fds[ peer->fd.idx+1UL ].fd, 0, peer->key.url.hostname );
326 0 : }
327 0 : } else {
328 0 : resolver->fds[ resolver->fds_len ] = (struct pollfd) {
329 0 : .fd = -1,
330 0 : .events = 0,
331 0 : .revents = 0
332 0 : };
333 0 : resolver->fds_idx[ resolver->fds_len ] = ULONG_MAX;
334 0 : resolver->fds_len++;
335 0 : }
336 :
337 0 : return 0;
338 0 : }
339 :
340 : static inline void
341 : remove_peer( fd_http_resolver_t * resolver,
342 0 : ulong idx ) {
343 0 : FD_TEST( idx<resolver->fds_len );
344 :
345 0 : fd_ssresolve_peer_t * cur_peer = peer_pool_ele( resolver->pool, resolver->fds_idx[ idx ] );
346 0 : fd_ssresolve_cancel( cur_peer->full_ssresolve );
347 0 : fd_ssresolve_cancel( cur_peer->inc_ssresolve );
348 :
349 0 : if( FD_UNLIKELY( resolver->fds_len==2UL ) ) {
350 0 : resolver->fds_len = 0UL;
351 0 : return;
352 0 : }
353 :
354 0 : resolver->fds[ idx ] = resolver->fds[ resolver->fds_len-2UL ];
355 0 : resolver->fds_idx[ idx ] = resolver->fds_idx[ resolver->fds_len-2UL ];
356 :
357 0 : resolver->fds[ idx+1UL ] = resolver->fds[ resolver->fds_len-1UL ];
358 0 : resolver->fds_idx[ idx+1UL ] = resolver->fds_idx[ resolver->fds_len-1UL ];
359 :
360 0 : fd_ssresolve_peer_t * peer = peer_pool_ele( resolver->pool, resolver->fds_idx[ idx ] );
361 0 : peer->fd.idx = idx;
362 :
363 0 : resolver->fds_len -= 2UL;
364 0 : }
365 :
366 : static inline void
367 : unresolve_peer( fd_http_resolver_t * resolver,
368 : fd_ssresolve_peer_t * peer,
369 0 : long now ) {
370 0 : FD_TEST( peer->state==PEER_STATE_UNRESOLVED || peer->state==PEER_STATE_REFRESHING );
371 0 : remove_peer( resolver, peer->fd.idx );
372 0 : deadline_list_ele_remove( resolver->resolving, peer, resolver->pool );
373 0 : peer->state = PEER_STATE_INVALID;
374 0 : peer->deadline_nanos = now + PEER_DEADLINE_NANOS_INVALID;
375 0 : deadline_list_ele_push_tail( resolver->invalid, peer, resolver->pool );
376 0 : }
377 :
378 : static inline int
379 : poll_resolve( fd_http_resolver_t * resolver,
380 : struct pollfd * pfd,
381 : fd_ssresolve_peer_t * peer,
382 : fd_ssresolve_t * ssresolve,
383 : ulong idx,
384 0 : long now ) {
385 0 : FD_TEST( !fd_ssresolve_is_done( ssresolve ) );
386 0 : if( FD_LIKELY( pfd->revents & POLLOUT ) ) {
387 0 : int res = fd_ssresolve_advance_poll_out( ssresolve );
388 :
389 0 : if( FD_UNLIKELY( res==FD_SSRESOLVE_ADVANCE_ERROR ) ) {
390 0 : unresolve_peer( resolver, peer_pool_ele( resolver->pool, resolver->fds_idx[ idx ] ), now );
391 0 : return -1;
392 0 : }
393 0 : }
394 :
395 0 : if( FD_LIKELY( pfd->revents & POLLIN ) ) {
396 0 : fd_ssresolve_result_t resolve_result;
397 0 : int res = fd_ssresolve_advance_poll_in( ssresolve, &resolve_result );
398 :
399 0 : if( FD_UNLIKELY( res==FD_SSRESOLVE_ADVANCE_ERROR ) ) {
400 0 : unresolve_peer( resolver, peer_pool_ele( resolver->pool, resolver->fds_idx[ idx ] ), now );
401 0 : return -1;
402 0 : } else if( FD_UNLIKELY( res==FD_SSRESOLVE_ADVANCE_AGAIN ) ) {
403 0 : return -1;
404 0 : } else if( FD_LIKELY( res==FD_SSRESOLVE_ADVANCE_RESULT ) ) {
405 0 : FD_TEST( peer->deadline_nanos>now );
406 :
407 0 : if( resolve_result.base_slot==ULONG_MAX ) {
408 0 : peer->full_slot = resolve_result.slot;
409 0 : fd_memcpy( peer->full_hash, resolve_result.hash, FD_HASH_FOOTPRINT );
410 0 : } else {
411 0 : peer->full_slot = resolve_result.base_slot;
412 0 : peer->incr_slot = resolve_result.slot;
413 0 : fd_memcpy( peer->incr_hash, resolve_result.hash, FD_HASH_FOOTPRINT );
414 0 : }
415 0 : }
416 0 : }
417 :
418 0 : return 0;
419 0 : }
420 :
421 : static inline void
422 : poll_advance( fd_http_resolver_t * resolver,
423 0 : long now ) {
424 0 : if( FD_LIKELY( !resolver->fds_len ) ) return;
425 :
426 0 : int nfds = fd_syscall_poll( resolver->fds, (uint)resolver->fds_len, 0 );
427 0 : if( FD_LIKELY( !nfds ) ) return;
428 0 : else if( FD_UNLIKELY( -1==nfds && errno==EINTR ) ) return;
429 0 : else if( FD_UNLIKELY( -1==nfds ) ) FD_LOG_ERR(( "poll failed (%i-%s)", errno, strerror( errno ) ));
430 :
431 0 : for( ulong i=0UL; i<resolver->fds_len; i++) {
432 :
433 0 : struct pollfd * pfd = &resolver->fds[ i ];
434 0 : if( FD_UNLIKELY( pfd->fd==-1 ) ) continue;
435 :
436 0 : fd_ssresolve_peer_t * peer = peer_pool_ele( resolver->pool, resolver->fds_idx[ i ] );
437 0 : int full = i&1UL ? 0 : 1; /* even indices are full, odd indices are incremental */
438 0 : fd_ssresolve_t * ssresolve = full ? peer->full_ssresolve : peer->inc_ssresolve;
439 :
440 : /* Process pending I/O before checking for errors. POLLIN can
441 : coexist with POLLHUP when the server sends a response and then
442 : closes the connection (common for HTTP HEAD redirects). */
443 0 : if( FD_LIKELY( !fd_ssresolve_is_done( ssresolve ) ) ) {
444 0 : int res = poll_resolve( resolver, pfd, peer, ssresolve, i, now );
445 0 : if( FD_UNLIKELY( res ) ) continue;
446 0 : }
447 :
448 : /* Only react to POLLERR/POLLHUP if the ssresolve hasn't completed
449 : yet. After a redirect is parsed the server often closes the
450 : connection, which is harmless. */
451 0 : if( FD_UNLIKELY( (pfd->revents & (POLLERR|POLLHUP)) && !fd_ssresolve_is_done( ssresolve ) ) ) {
452 0 : unresolve_peer( resolver, peer_pool_ele( resolver->pool, resolver->fds_idx[ i ] ), now );
453 0 : continue;
454 0 : }
455 :
456 : /* Once both the full and incremental snapshots are resolved, we can
457 : mark the peer valid and remove the peer from the list of peers to
458 : ping. */
459 0 : if( FD_LIKELY( fd_ssresolve_is_done( peer->full_ssresolve ) &&
460 0 : (!resolver->incremental_snapshot_fetch || fd_ssresolve_is_done( peer->inc_ssresolve ) ) ) ) {
461 0 : peer->state = PEER_STATE_VALID;
462 0 : peer->deadline_nanos = now + PEER_DEADLINE_NANOS_VALID;
463 :
464 0 : deadline_list_ele_remove( resolver->resolving, peer, resolver->pool );
465 0 : deadline_list_ele_push_tail( resolver->valid, peer, resolver->pool );
466 0 : remove_peer( resolver, peer->fd.idx );
467 :
468 0 : resolver->on_resolve_cb( resolver->cb_arg, &peer->key, peer->full_slot, peer->incr_slot, peer->full_hash, peer->incr_hash );
469 0 : }
470 0 : }
471 0 : }
472 :
473 : void
474 : fd_http_resolver_advance( fd_http_resolver_t * resolver,
475 : long now,
476 0 : fd_sspeer_selector_t * selector ) {
477 0 : while( !deadline_list_is_empty( resolver->unresolved, resolver->pool ) ) {
478 0 : fd_ssresolve_peer_t * peer = deadline_list_ele_pop_head( resolver->unresolved, resolver->pool );
479 :
480 0 : FD_LOG_INFO(( "resolving " FD_IP4_ADDR_FMT ":%hu", FD_IP4_ADDR_FMT_ARGS( peer->addr.addr ), fd_ushort_bswap( peer->addr.port ) ));
481 0 : int result = peer_connect( resolver, peer );
482 0 : if( FD_UNLIKELY( -1==result ) ) {
483 0 : peer->state = PEER_STATE_INVALID;
484 0 : peer->deadline_nanos = now + PEER_DEADLINE_NANOS_INVALID;
485 0 : deadline_list_ele_push_tail( resolver->invalid, peer, resolver->pool );
486 0 : } else {
487 0 : peer->state = PEER_STATE_REFRESHING;
488 0 : peer->deadline_nanos = now + PEER_DEADLINE_NANOS_RESOLVE;
489 0 : deadline_list_ele_push_tail( resolver->resolving, peer, resolver->pool );
490 0 : }
491 0 : }
492 :
493 0 : while( !deadline_list_is_empty( resolver->resolving, resolver->pool ) ) {
494 0 : fd_ssresolve_peer_t * peer = deadline_list_ele_peek_head( resolver->resolving, resolver->pool );
495 0 : if( FD_LIKELY( peer->deadline_nanos>now ) ) break;
496 :
497 0 : deadline_list_ele_pop_head( resolver->resolving, resolver->pool );
498 0 : peer->state = PEER_STATE_INVALID;
499 0 : peer->deadline_nanos = now + PEER_DEADLINE_NANOS_INVALID;
500 0 : deadline_list_ele_push_tail( resolver->invalid, peer, resolver->pool );
501 0 : remove_peer( resolver, peer->fd.idx );
502 :
503 0 : fd_sspeer_selector_remove( selector, &peer->key );
504 0 : }
505 :
506 0 : while( !deadline_list_is_empty( resolver->invalid, resolver->pool ) ) {
507 0 : fd_ssresolve_peer_t * peer = deadline_list_ele_peek_head( resolver->invalid, resolver->pool );
508 0 : if( FD_LIKELY( peer->deadline_nanos>now ) ) break;
509 :
510 0 : deadline_list_ele_pop_head( resolver->invalid, resolver->pool );
511 :
512 0 : peer->state = PEER_STATE_UNRESOLVED;
513 0 : peer->deadline_nanos = 0L;
514 0 : deadline_list_ele_push_tail( resolver->unresolved, peer, resolver->pool );
515 0 : }
516 :
517 0 : while( !deadline_list_is_empty( resolver->valid, resolver->pool ) ) {
518 0 : fd_ssresolve_peer_t * peer = deadline_list_ele_peek_head( resolver->valid, resolver->pool );
519 0 : if( FD_LIKELY( peer->deadline_nanos>now ) ) break;
520 :
521 0 : deadline_list_ele_pop_head( resolver->valid, resolver->pool );
522 :
523 0 : int result = peer_connect( resolver, peer );
524 0 : if( FD_UNLIKELY( -1==result ) ) {
525 0 : peer->state = PEER_STATE_INVALID;
526 0 : peer->deadline_nanos = now + PEER_DEADLINE_NANOS_INVALID;
527 0 : deadline_list_ele_push_tail( resolver->invalid, peer, resolver->pool );
528 0 : fd_sspeer_selector_remove( selector, &peer->key );
529 0 : } else {
530 0 : peer->state = PEER_STATE_REFRESHING;
531 0 : peer->deadline_nanos = now + PEER_DEADLINE_NANOS_RESOLVE;
532 0 : deadline_list_ele_push_tail( resolver->resolving, peer, resolver->pool );
533 0 : }
534 0 : }
535 :
536 0 : poll_advance( resolver, now );
537 0 : }
|