sp_tbs.c 44 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452
  1. #include "precompile.h"
  2. #include "sp_svc.h"
  3. #include "sp_def.h"
  4. #include "sp_dbg_export.h"
  5. #include "sp_ses.h"
  6. #include "sp_tbs.h"
  7. #include "sp_env.h"
  8. #include "sp_bcm.h"
  9. #include "sp_log.h"
  10. #include "sp_uid.h"
  11. #include "sp_var.h"
  12. #include "SpBase.h"
  13. #include "list.h"
  14. #include "array.h"
  15. #include "refcnt.h"
  16. #include "spinlock.h"
  17. #include "strutil.h"
  18. #include "fileutil.h"
  19. #include <winpr/winsock.h>
  20. #include <winpr/string.h>
  21. #define SESSION_BUCKET_SIZE 511
  22. #define REGISTER_BUCKET_SIZE 127
  23. #define RX_BUF_SIZE 1024
  24. #define MSG_EVT_IDX 0
  25. #define SRV_EVT_IDX 1
  26. #define MAX_TIMEOUT 30000
  27. #define HDR_LEN 4
  28. #define CONN_INVALID_ID -1
  29. #define MSG_STOP 0
  30. #define MSG_UAC_ON_CONNECT 1
  31. #define MSG_UAC_ON_CLOSE 2
  32. #define MSG_UAC_ON_DESTROY 3
  33. #define MSG_UAC_ON_ANS 4
  34. #define MSG_ON_EVENT 5
  35. #define RECV_STATE_HEADER 0 /* already recv header length */
  36. #define RECV_STATE_BODY 1 /* recv body */
  37. #define PKT_TYPE_INFO 0
  38. #define PKT_TYPE_SESSION 1
  39. #define PKT_TYPE_SESSIONEND 2
  40. #define PKT_TYPE_REQ 3
  41. #define PKT_TYPE_REQACK 4
  42. #define PKT_TYPE_SESSIONACK 5
  43. #define PKT_TYPE_REGISTER_EVENT 6
  44. #define PKT_TYPE_UNREGISTER_EVENT 7
  45. #define PKT_TYPE_EVENT_DATA 8
  46. #define PKT_TYPE_LOG_EVENT 9
  47. #define PKT_TYPE_LOG_WARN 10
  48. // add sys var get & set type by xkm@20150526
  49. #define PKT_TYPE_SET_VAR_REQ 11 // len + type + tsx_id + varname + varvalue
  50. #define PKT_TYPE_SET_VAR_ACK 12 // len + type + conn_id + tsx_id + errcode + errmsg
  51. #define PKT_TYPE_GET_VAR_REQ 13 // len + type + tsx_id + varname
  52. #define PKT_TYPE_GET_VAR_ACK 14 // len + type + conn_id + tsx_id + errcode + varvalue/errmsg
  53. typedef struct cmd_entry cmd_entry;
  54. typedef struct sub_session sub_session;
  55. typedef struct reg_entry reg_entry;
  56. typedef struct sock_connection sock_connection;
  57. struct cmd_entry {
  58. struct list_head entry;
  59. int msg;
  60. param_size_t param1;
  61. param_size_t param2;
  62. };
  63. struct sub_session {
  64. struct hlist_node hentry;
  65. unsigned int id;
  66. unsigned int tsx_id;
  67. sp_ses_uac_t *uac;
  68. sock_connection *conn;
  69. };
  70. struct reg_entry {
  71. struct hlist_node hentry;
  72. unsigned int register_id;
  73. unsigned int entity_id;
  74. sp_uid_t uid;
  75. sp_bcm_listener_t *listener;
  76. sock_connection *conn;
  77. };
  78. struct sock_connection {
  79. SOCKET fd;
  80. int idx;
  81. int session_cnt;
  82. struct hlist_head session_bucket[SESSION_BUCKET_SIZE];
  83. int register_cnt;
  84. struct hlist_head register_bucket[REGISTER_BUCKET_SIZE];
  85. iobuffer_queue_t *tx_queue;
  86. iobuffer_t *rx_pkt;
  87. char rx_hdr_buf[RX_BUF_SIZE];
  88. int rx_hdr_buf_len;
  89. int rx_state;
  90. int rx_header_len;
  91. sp_tbs_t *tbs;
  92. DECLARE_REF_COUNT_MEMBER(ref_cnt);
  93. };
  94. DECLARE_REF_COUNT_STATIC(sock_connection, sock_connection)
  95. struct sp_tbs_t
  96. {
  97. SOCKET server_fd;
  98. unsigned long server_ip;
  99. unsigned short server_port;
  100. HANDLE conn_evt[MAXIMUM_WAIT_OBJECTS]; // 0 对应待发送消息;1 对应侦听socket事件;2~MAX 对应通讯socket事件
  101. HANDLE ready_evt;
  102. int ready_evt_result;
  103. sock_connection *conn[MAXIMUM_WAIT_OBJECTS]; // 0和1为空
  104. int conn_cnt; // 实际连接数+2
  105. unsigned int sub_session_seq;
  106. struct list_head cmd_list;
  107. spinlock_t cmd_list_lock;
  108. sp_log_client_t *log_client;
  109. HANDLE work_thread;
  110. DWORD work_thread_id;
  111. sp_ses_mgr_t *ses_mgr;
  112. sp_var_client_t *var_client;
  113. };
  114. static void on_write(sp_tbs_t *tbs, sock_connection *conn);
  115. static void on_accept(sp_tbs_t *tbs);
  116. static void on_read(sp_tbs_t *tbs, sock_connection *conn);
  117. static void on_close(sp_tbs_t *tbs, sock_connection *conn);
  118. static void on_stop(sp_tbs_t *tbs);
  119. static void on_session_end(sp_tbs_t *tbs, sock_connection *conn, int conn_id);
  120. static void on_info(sp_tbs_t *tbs, sock_connection *conn, int conn_id, int method_id, int method_sig, iobuffer_t **info_pkt);
  121. static void on_req(sp_tbs_t *tbs, sock_connection *conn, int conn_id, int tsx_id, int method_id, int method_sig, int timeout, iobuffer_t **req_pkt);
  122. static void on_session(sp_tbs_t *tbs, sock_connection *conn, int tsx_id, char *entity_name, char *function_name, char *class_name);
  123. static void on_register_event(sp_tbs_t *tbs, sock_connection *conn, int register_id, char *entity_name, char *function_name);
  124. static void on_unregister_event(sp_tbs_t *tbs, sock_connection *conn, int register_id);
  125. static void post_session_end(sp_tbs_t *tbs, sock_connection *conn, int conn_id);
  126. static void post_req_ack(sp_tbs_t *tbs, sock_connection *conn, int conn_id, int tsx_id, int end, int err, const wchar_t *err_msg, iobuffer_t **ack_pkt);
  127. static void post_session_ack(sp_tbs_t *tbs, sock_connection *conn, int conn_id, int tsx_id, int err, const wchar_t *err_msg);
  128. static void post_event(sp_tbs_t *tbs, reg_entry *entry, int conn_id, int tsx_id, iobuffer_t **evt_pkt);
  129. static void uac_on_connect(sp_tbs_t *tbs, sock_connection *conn, sub_session *session, int error);
  130. static void uac_on_close(sp_tbs_t *tbs, sock_connection *conn, sub_session *session, int error);
  131. static void uac_on_ans(sp_tbs_t *tbs, sock_connection *conn, sub_session *session, int tsx_id, int error, int user_error, int end, iobuffer_t **ans_pkt);
  132. static void uac_on_destroy(sp_tbs_t *tbs, sock_connection *conn, sub_session *session);
  133. static void post_msg(sp_tbs_t *tbs, int msg, param_size_t param1, param_size_t param2);
  134. static void destroy_sub_session(sp_tbs_t *tbs, sock_connection *conn, sub_session *session);
  135. static const wchar_t *get_err_msg(int rc)
  136. {
  137. return rc == 0 ? NULL : L"please find the err msg in ErrorCode.h!";
  138. }
  139. static const wchar_t *get_user_err_msg(int rc)
  140. {
  141. static wchar_t msg[512];
  142. if (rc == 0)
  143. return NULL;
  144. memset(msg, 0, sizeof(msg));
  145. swprintf_s(msg, 512, L"UserError=%d", rc);
  146. return msg;
  147. }
  148. static const char *_GetFileName(const char *pszFilePath)
  149. {
  150. int i=strlen(pszFilePath);
  151. for( ; i>0 && pszFilePath[i-1]!=SPLIT_SLASH; i--)NULL;
  152. return pszFilePath+i;
  153. }
  154. static int create_connection(sp_tbs_t *tbs)
  155. {
  156. sock_connection *conn;
  157. SOCKET fd;
  158. int i;
  159. BOOL opt;
  160. struct sockaddr_in from_addr;
  161. int from_len = sizeof(from_addr);
  162. fd = accept(tbs->server_fd, (struct sockaddr*)&from_addr, &from_len);
  163. if (fd == INVALID_SOCKET) {
  164. sp_dbg_warn("accept connection failed! %s %d", _GetFileName(__FILE__), __LINE__);
  165. return Error_NetBroken;
  166. }
  167. sp_dbg_info("accept from %s:%d", inet_ntoa(from_addr.sin_addr), ntohs(from_addr.sin_port));
  168. if (tbs->conn_cnt >= MAXIMUM_WAIT_OBJECTS) {
  169. sp_dbg_warn("exceed maximum wait objects, connection discard! %s %d", _GetFileName(__FILE__), __LINE__);
  170. WSAEventSelect(fd, tbs->conn_evt[SRV_EVT_IDX], 0);
  171. closesocket(fd);
  172. return Error_Resource;
  173. }
  174. conn = MALLOC_T(sock_connection);
  175. conn->idx = tbs->conn_cnt++;
  176. conn->fd = fd;
  177. conn->rx_hdr_buf_len = 0;
  178. conn->tx_queue = iobuffer_queue_create();
  179. conn->rx_pkt = NULL;
  180. conn->session_cnt = 0;
  181. conn->register_cnt = 0;
  182. conn->tbs = tbs;
  183. conn->rx_state = RECV_STATE_HEADER;
  184. conn->rx_header_len = 0;
  185. for (i = 0; i < array_size(conn->session_bucket); ++i) {
  186. INIT_HLIST_HEAD(&conn->session_bucket[i]);
  187. }
  188. for (i = 0; i < array_size(conn->register_bucket); ++i) {
  189. INIT_HLIST_HEAD(&conn->register_bucket[i]);
  190. }
  191. REF_COUNT_INIT(&conn->ref_cnt);
  192. tbs->conn[conn->idx] = conn;
  193. tbs->conn_evt[conn->idx] = WSACreateEvent();
  194. opt = TRUE;
  195. setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, (char*)&opt, sizeof(opt));
  196. opt = TRUE;
  197. setsockopt(fd, SOL_SOCKET, SO_DONTLINGER, (char*)&opt, sizeof(opt));
  198. WSAEventSelect(fd, tbs->conn_evt[conn->idx], FD_WRITE | FD_READ | FD_CLOSE);
  199. sp_dbg_info("sock connection created!");
  200. return 0;
  201. }
  202. static void __destroy_connection(sock_connection *conn)
  203. {
  204. sp_tbs_t *tbs = conn->tbs;
  205. if (conn->fd != INVALID_SOCKET) {
  206. WSAEventSelect(conn->fd, tbs->conn_evt[conn->idx], 0);
  207. closesocket(conn->fd);
  208. conn->fd = INVALID_SOCKET;
  209. }
  210. WSACloseEvent(tbs->conn_evt[conn->idx]);
  211. tbs->conn_evt[conn->idx] = NULL;
  212. tbs->conn[conn->idx] = NULL;
  213. if (conn->idx != tbs->conn_cnt-1) {
  214. tbs->conn_evt[conn->idx] = tbs->conn_evt[tbs->conn_cnt-1];
  215. tbs->conn[conn->idx] = tbs->conn[tbs->conn_cnt-1];
  216. tbs->conn[conn->idx]->idx = conn->idx;
  217. }
  218. tbs->conn_cnt--;
  219. iobuffer_queue_destroy(conn->tx_queue);
  220. conn->tx_queue = NULL;
  221. if (conn->rx_pkt) {
  222. iobuffer_dec_ref(conn->rx_pkt);
  223. conn->rx_pkt = NULL;
  224. }
  225. free(conn);
  226. sp_dbg_info("sock connection destroy!");
  227. }
  228. IMPLEMENT_REF_COUNT_STATIC(sock_connection, sock_connection, ref_cnt, __destroy_connection)
  229. static __inline int is_worker_thread(sp_tbs_t *tbs)
  230. {
  231. return GetCurrentThreadId() == tbs->work_thread_id;
  232. }
  233. static sub_session *find_sub_session(sock_connection *conn, int conn_id)
  234. {
  235. sub_session *tpos;
  236. struct hlist_node *pos;
  237. int slot = ((unsigned int )conn_id) % SESSION_BUCKET_SIZE; // bugfix, assure slot positive
  238. hlist_for_each_entry(tpos, pos, &conn->session_bucket[slot], sub_session, hentry) {
  239. if (tpos->id == conn_id)
  240. return tpos;
  241. }
  242. return NULL;
  243. }
  244. static void __uac_on_connect(sp_ses_uac_t *uac, int error, void *user_data)
  245. {
  246. sub_session *session = (sub_session*)user_data;
  247. if (is_worker_thread(session->conn->tbs)) {
  248. uac_on_connect(session->conn->tbs, session->conn, session, error);
  249. } else {
  250. post_msg(session->conn->tbs, MSG_UAC_ON_CONNECT, (int)session, error);
  251. }
  252. }
  253. static void __uac_on_close(sp_ses_uac_t *uac, int error, void *user_data)
  254. {
  255. sub_session *session = (sub_session*)user_data;
  256. if (is_worker_thread(session->conn->tbs)) {
  257. uac_on_close(session->conn->tbs, session->conn, session, error);
  258. } else {
  259. post_msg(session->conn->tbs, MSG_UAC_ON_CLOSE, (int)session, error);
  260. }
  261. }
  262. static void __uac_on_destroy(sp_ses_uac_t *uac, void *user_data)
  263. {
  264. sub_session *session = (sub_session*)user_data;
  265. assert(session->uac == NULL);
  266. if (is_worker_thread(session->conn->tbs)) {
  267. uac_on_destroy(session->conn->tbs, session->conn, session);
  268. } else {
  269. post_msg(session->conn->tbs, MSG_UAC_ON_DESTROY, (int)session, 0);
  270. }
  271. }
  272. static void __uac_on_ans(sp_tsx_uac_t *tsx, int error, int end, iobuffer_t **ans_pkt, void *user_data)
  273. {
  274. sub_session *session = (sub_session*)user_data;
  275. iobuffer_t *pkt = NULL;
  276. int tsx_id;
  277. int user_error = 0;
  278. if (error)
  279. {
  280. if (ans_pkt)
  281. {
  282. pkt = *ans_pkt;
  283. iobuffer_reset(pkt);
  284. *ans_pkt = NULL;
  285. }
  286. else
  287. {
  288. pkt = iobuffer_create(-1, -1);
  289. }
  290. }
  291. else
  292. {
  293. assert(ans_pkt);
  294. pkt = *ans_pkt;
  295. *ans_pkt = NULL;
  296. iobuffer_read(pkt, IOBUF_T_I4, &error, NULL);
  297. iobuffer_read(pkt, IOBUF_T_I4, &user_error, NULL);
  298. if (error)
  299. {
  300. iobuffer_reset(pkt);
  301. }
  302. }
  303. tsx_id = sp_tsx_uac_get_id(tsx);
  304. if (is_worker_thread(session->conn->tbs))
  305. {
  306. uac_on_ans(session->conn->tbs, session->conn, session, tsx_id, error, user_error, end, &pkt);
  307. if (pkt)
  308. iobuffer_dec_ref(pkt);
  309. }
  310. else
  311. {
  312. iobuffer_format_write_head(pkt, "4444", &end, &user_error, &error, &tsx_id);
  313. post_msg(session->conn->tbs, MSG_UAC_ON_ANS, (int)session, (int)pkt);
  314. }
  315. if (error || end)
  316. {
  317. sp_tsx_uac_close(tsx);
  318. sp_tsx_uac_destroy(tsx);
  319. }
  320. }
  321. static void uac_on_connect(sp_tbs_t *tbs, sock_connection *conn, sub_session *session, int error)
  322. {
  323. if (!error) {
  324. post_session_ack(tbs, conn, session->id, session->tsx_id, error, NULL);
  325. sp_dbg_info("sub session created ok! ses_id = %d, tsx_id = %d", session->id, session->tsx_id);
  326. } else {
  327. sp_ses_uac_t *uac = session->uac;
  328. post_session_ack(tbs, conn, CONN_INVALID_ID, session->tsx_id, error, get_err_msg(error));
  329. session->uac = NULL;
  330. sp_dbg_info("sub session created failed %d! ses_id = %d, tsx_id = %d", error, session->id, session->tsx_id);
  331. if (uac) {
  332. sp_ses_uac_close(uac);
  333. sp_ses_uac_destroy(uac);
  334. }
  335. }
  336. }
  337. static void uac_on_close(sp_tbs_t *tbs, sock_connection *conn, sub_session *session, int error)
  338. {
  339. if (session->uac) {
  340. sp_ses_uac_t *uac = session->uac;
  341. sp_dbg_info("uac on close detected! id = %d, %s %d %d", session->id, _GetFileName(__FILE__), __LINE__, error);
  342. post_session_end(tbs, conn, session->id);
  343. session->uac = NULL;
  344. if (error != Error_Closed)
  345. sp_ses_uac_close(uac);
  346. sp_ses_uac_destroy(uac);
  347. }
  348. }
  349. static void uac_on_ans(sp_tbs_t *tbs, sock_connection *conn, sub_session *session, int tsx_id, int error, int user_error, int end, iobuffer_t **ans_pkt)
  350. {
  351. post_req_ack(tbs, conn, session->id, tsx_id, end, error, get_user_err_msg(user_error), ans_pkt);
  352. //sp_dbg_info("answer tsx id tsx_id=%d error=%d file=%s line=%d", tsx_id, error, _GetFileName(__FILE__), __LINE__);
  353. }
  354. static void uac_on_destroy(sp_tbs_t *tbs, sock_connection *conn, sub_session *session)
  355. {
  356. destroy_sub_session(tbs, conn, session);
  357. sp_dbg_info("destroy sub session(id:%d) uac %s %d", session->id, _GetFileName(__FILE__), __LINE__);
  358. }
  359. static int create_sub_session(sp_tbs_t *tbs, sock_connection *conn, int tsx_id, char *entity_name, char *function_name, char *class_name, sub_session **p_session)
  360. {
  361. sp_env_t *env = sp_get_env();
  362. sp_entity_t *ent = sp_mod_mgr_find_entity_by_name(env->mod_mgr, entity_name);
  363. if (ent) {
  364. int rc;
  365. sub_session *session = MALLOC_T(sub_session);
  366. sp_ses_uac_callback cb;
  367. iobuffer_t *pkt = NULL;
  368. char *param = NULL;
  369. session->id = tbs->sub_session_seq++;
  370. session->conn = conn;
  371. session->tsx_id = tsx_id;
  372. hlist_add_head(&session->hentry, &conn->session_bucket[session->id % SESSION_BUCKET_SIZE]);
  373. conn->session_cnt++;
  374. sock_connection_inc_ref(conn);
  375. cb.user_data = session;
  376. cb.on_close = &__uac_on_close;
  377. cb.on_destroy = &__uac_on_destroy;
  378. cb.on_connect = &__uac_on_connect;
  379. rc = sp_ses_uac_create(tbs->ses_mgr, ent->mod->cfg->idx, ent->cfg->idx, &cb, &session->uac);
  380. if (rc != 0) {
  381. goto on_error;
  382. }
  383. pkt = iobuffer_create(-1, -1);
  384. if (function_name == NULL || strlen(function_name) == 0) {
  385. param = class_name;
  386. } else {
  387. param = strdup_printf("%s::%s", class_name, function_name);
  388. }
  389. iobuffer_write(pkt, IOBUF_T_STR, param, -1);
  390. if (param != class_name) {
  391. toolkit_free(param);
  392. }
  393. rc = sp_ses_uac_async_connect(session->uac, 10000, &pkt);
  394. if (pkt)
  395. iobuffer_dec_ref(pkt);
  396. if (rc != 0) {
  397. goto on_error;
  398. }
  399. on_error:
  400. if (rc != 0) {
  401. conn->session_cnt--;
  402. hlist_del(&session->hentry);
  403. sock_connection_dec_ref(conn);
  404. free(session);
  405. } else {
  406. *p_session = session;
  407. }
  408. return rc;
  409. } else {
  410. return Error_NotExist;
  411. }
  412. }
  413. static void destroy_sub_session(sp_tbs_t *tbs, sock_connection *conn, sub_session *session)
  414. {
  415. conn->session_cnt--;
  416. hlist_del(&session->hentry);
  417. if (session->uac) {
  418. sp_ses_uac_t *uac = session->uac;
  419. session->uac = NULL;
  420. sp_ses_uac_destroy(uac);
  421. }
  422. sock_connection_dec_ref(conn);
  423. free(session);
  424. sp_dbg_info("destroy sub session(id:%d) %s %d", session->id, _GetFileName(__FILE__), __LINE__);
  425. }
  426. static void post_session_ack(sp_tbs_t *tbs, sock_connection *conn, int conn_id, int tsx_id, int err, const wchar_t *err_msg)
  427. {
  428. if (conn->fd != INVALID_SOCKET) {
  429. int len;
  430. iobuffer_t *pkt = iobuffer_create(-1, -1);
  431. int type = PKT_TYPE_SESSIONACK;
  432. iobuffer_format_write(pkt, "4444w", &type, &conn_id, &tsx_id, &err, err_msg);
  433. len = iobuffer_get_length(pkt)-4;
  434. iobuffer_write_head(pkt, IOBUF_T_I4, &len, 0);
  435. iobuffer_queue_enqueue(conn->tx_queue, pkt);
  436. on_write(tbs, conn);
  437. sp_dbg_info("send PKT_TYPE_SESSIONACK tsx_id=%d, err=%d", tsx_id, err);
  438. }
  439. }
  440. static void post_req_ack(sp_tbs_t *tbs, sock_connection *conn, int conn_id, int tsx_id, int end, int err, const wchar_t *err_msg, iobuffer_t **ack_pkt)
  441. {
  442. if (conn->fd != INVALID_SOCKET) {
  443. iobuffer_t *pkt = NULL;
  444. int len;
  445. char bend = !!end;
  446. int type = PKT_TYPE_REQACK;
  447. if (ack_pkt) {
  448. pkt = *ack_pkt;
  449. *ack_pkt = NULL;
  450. }
  451. if (!pkt) {
  452. pkt = iobuffer_create(-1, -1);
  453. }
  454. iobuffer_format_write_head(pkt, "w41444", err_msg, &err, &bend, &tsx_id, &conn_id, &type);
  455. len = iobuffer_get_length(pkt)-4;
  456. iobuffer_write_head(pkt, IOBUF_T_I4, &len, 0);
  457. iobuffer_queue_enqueue(conn->tx_queue, pkt);
  458. on_write(tbs, conn);
  459. sp_dbg_info("send PKT_TYPE_REQACK tsx_id=%d, err=%d", tsx_id, err);
  460. }
  461. }
  462. static void post_set_var_ack(sp_tbs_t *tbs, sock_connection *conn, int tsx_id, int err, const wchar_t *err_msg)
  463. {
  464. if (conn->fd != INVALID_SOCKET) {
  465. int len;
  466. int type = PKT_TYPE_SET_VAR_ACK;
  467. iobuffer_t *pkt = iobuffer_create(-1, -1);
  468. int conn_id = CONN_INVALID_ID;
  469. iobuffer_format_write(pkt, "4444w", &type, &conn_id, &tsx_id, &err, err_msg);
  470. len = iobuffer_get_length(pkt) - 4;
  471. iobuffer_write_head(pkt, IOBUF_T_I4, &len, 0);
  472. iobuffer_queue_enqueue(conn->tx_queue, pkt);
  473. sp_dbg_info("send PKT_TYPE_SET_VAR_ACK tsx_id=%d, err=%d", tsx_id, err);
  474. on_write(tbs, conn);
  475. }
  476. }
  477. static void post_get_var_ack(sp_tbs_t *tbs, sock_connection *conn, int tsx_id, int err, const wchar_t *err_msg, const wchar_t *value)
  478. {
  479. if (conn->fd != INVALID_SOCKET) {
  480. int len;
  481. int type = PKT_TYPE_GET_VAR_ACK;
  482. iobuffer_t *pkt = iobuffer_create(-1, -1);
  483. int conn_id = CONN_INVALID_ID;
  484. iobuffer_format_write(pkt, "4444w", &type, &conn_id, &tsx_id, &err, err == 0 ? value : err_msg);
  485. len = iobuffer_get_length(pkt) - 4;
  486. iobuffer_write_head(pkt, IOBUF_T_I4, &len, 0);
  487. iobuffer_queue_enqueue(conn->tx_queue, pkt);
  488. sp_dbg_info("send PKT_TYPE_GET_VAR_ACK tsx_id=%d, err=%d", tsx_id, err);
  489. on_write(tbs, conn);
  490. }
  491. }
  492. static void post_session_end(sp_tbs_t *tbs, sock_connection *conn, int conn_id)
  493. {
  494. if (conn->fd != INVALID_SOCKET) {
  495. int len;
  496. iobuffer_t *pkt = iobuffer_create(-1, -1);
  497. int type = PKT_TYPE_SESSIONEND;
  498. iobuffer_format_write(pkt, "44", &type, &conn_id);
  499. len = iobuffer_get_length(pkt)-4;
  500. iobuffer_write_head(pkt, IOBUF_T_I4, &len, 0);
  501. iobuffer_queue_enqueue(conn->tx_queue, pkt);
  502. sp_dbg_info("send PKT_TYPE_SESSIONEND");
  503. on_write(tbs, conn);
  504. }
  505. }
  506. static void on_session(sp_tbs_t *tbs, sock_connection *conn, int tsx_id, char *entity_name, char *function_name, char *class_name)
  507. {
  508. sub_session *session = NULL;
  509. int rc;
  510. rc = create_sub_session(tbs, conn, tsx_id, entity_name, function_name, class_name, &session);
  511. if (rc == 0) {
  512. sp_dbg_info("start create sub session!");
  513. //post_session_ack(tbs, conn, session->id, tsx_id, rc, NULL);
  514. } else {
  515. sp_dbg_warn("create_sub_session failed! err = %d %s %d", rc, _GetFileName(__FILE__), __LINE__);
  516. post_session_ack(tbs, conn, CONN_INVALID_ID, tsx_id, rc, get_err_msg(rc));
  517. }
  518. }
  519. static reg_entry *find_reg_entry(sock_connection *conn, int register_id)
  520. {
  521. reg_entry *tpos;
  522. struct hlist_node *pos;
  523. int slot = ((unsigned int)register_id) % REGISTER_BUCKET_SIZE; // bugfix, assure slot positive
  524. hlist_for_each_entry(tpos, pos, &conn->register_bucket[slot], reg_entry, hentry) {
  525. if (tpos->register_id == register_id) {
  526. return tpos;
  527. }
  528. }
  529. return NULL;
  530. }
  531. static void post_event(sp_tbs_t *tbs, reg_entry *entry, int conn_id, int tsx_id, iobuffer_t **evt_pkt)
  532. {
  533. if (entry->conn->fd != INVALID_SOCKET) {
  534. int type;
  535. int len;
  536. iobuffer_t *pkt = *evt_pkt;
  537. *evt_pkt = NULL;
  538. type = PKT_TYPE_EVENT_DATA;
  539. iobuffer_write_head(pkt, IOBUF_T_I4, &tsx_id, 0);
  540. iobuffer_write_head(pkt, IOBUF_T_I4, &conn_id, 0);
  541. iobuffer_write_head(pkt, IOBUF_T_I4, &type, 0);
  542. len = iobuffer_get_length(pkt)-4;
  543. iobuffer_write_head(pkt, IOBUF_T_I4, &len, 0);
  544. iobuffer_queue_enqueue(entry->conn->tx_queue, pkt);
  545. sp_dbg_info("send PKT_TYPE_EVENT_DATA tsx_id=%d", tsx_id);
  546. on_write(tbs, entry->conn);
  547. //sp_dbg_info("post event len:%d", len);
  548. }
  549. sp_bcm_listener_dec_ref(entry->listener); //@
  550. }
  551. static void __bcm_on_message_raw(sp_bcm_listener_t *listener, int from_client_id, iobuffer_t **msg_pkt, void *user_data)
  552. {
  553. reg_entry *entry = (reg_entry*)user_data;
  554. iobuffer_t *pkt = *msg_pkt;
  555. *msg_pkt = NULL;
  556. sp_bcm_listener_inc_ref(listener); //@
  557. post_msg(entry->conn->tbs, MSG_ON_EVENT, (int)entry, (int)pkt);
  558. sp_dbg_info("post event from_client_id:%d", from_client_id);
  559. }
  560. static void __bcm_on_destroy(sp_bcm_listener_t *listener, void *user_data)
  561. {
  562. reg_entry *entry = (reg_entry*)user_data;
  563. entry->conn->register_cnt--;
  564. hlist_del(&entry->hentry);
  565. sock_connection_dec_ref(entry->conn);
  566. sp_dbg_info("unregister event ok! register_id = %d", entry->register_id);
  567. free(entry);
  568. }
  569. static void on_register_event(sp_tbs_t *tbs, sock_connection *conn, int register_id, char *entity_name, char *function_name)
  570. {
  571. sp_env_t *env = sp_get_env();
  572. sp_entity_t *ent = sp_mod_mgr_find_entity_by_name(env->mod_mgr, entity_name);
  573. if (ent) {
  574. int rc;
  575. sp_svc_t *svc = sp_ses_mgr_get_svc(tbs->ses_mgr);
  576. reg_entry *entry;
  577. sp_bcm_listener_cb cb;
  578. if (find_reg_entry(conn, register_id)) {
  579. sp_dbg_warn("register entry already exist, register id %d", register_id);
  580. return;
  581. }
  582. entry = ZALLOC_T(reg_entry);
  583. entry->register_id = register_id;
  584. entry->entity_id = ent->cfg->idx;
  585. hlist_add_head(&entry->hentry, &conn->register_bucket[((unsigned int)register_id) % REGISTER_BUCKET_SIZE]); // bugfix, assure index positive
  586. conn->register_cnt++;
  587. sock_connection_inc_ref(conn);
  588. entry->conn = conn;
  589. cb.on_message_raw = &__bcm_on_message_raw;
  590. cb.on_message = NULL;
  591. cb.on_destroy = &__bcm_on_destroy;
  592. cb.user_data = entry;
  593. rc = sp_bcm_listener_create(svc, entry->entity_id, function_name, &cb, &entry->listener);
  594. if (rc != 0) {
  595. goto on_error;
  596. }
  597. rc = sp_bcm_listener_subscribe(entry->listener, &entry->uid);
  598. if (rc != 0) {
  599. goto on_error;
  600. }
  601. on_error:
  602. if (rc != 0) {
  603. sp_dbg_warn("create bcm listener failed! entity = %s, register_id = %d", ent->cfg->name, register_id);
  604. conn->register_cnt--;
  605. hlist_del_init(&entry->hentry);
  606. if (entry->listener) {
  607. sp_bcm_listener_destroy(entry->listener);
  608. }
  609. free(entry);
  610. sock_connection_dec_ref(conn);
  611. } else {
  612. sp_dbg_info("register event for %s ok! register_id = %d", ent->cfg->name, register_id);
  613. }
  614. } else {
  615. sp_dbg_warn("cannot find entity %s!", entity_name);
  616. }
  617. }
  618. static void on_unregister_event(sp_tbs_t *tbs, sock_connection *conn, int register_id)
  619. {
  620. reg_entry *entry = find_reg_entry(conn, register_id);
  621. if (entry) {
  622. if (sp_bcm_listener_unsubscribe(entry->listener) == 0) {
  623. sp_bcm_listener_destroy(entry->listener);
  624. } else {
  625. sp_dbg_warn("entry already unregistered! register_id = %d", register_id);
  626. }
  627. } else {
  628. sp_dbg_warn("%s, entry not found, registered_id = %d", __FUNCTION__, register_id);
  629. }
  630. }
  631. static void on_log_event(sp_tbs_t *tbs, sock_connection *conn, int severity_level, int user_code, const char *msg)
  632. {
  633. sp_log_client_log(tbs->log_client, Log_Event, severity_level, 0, user_code, 0, 0, msg);
  634. }
  635. static void on_log_warn(sp_tbs_t *tbs, sock_connection *conn, int severity_level, int user_code, const char *msg)
  636. {
  637. sp_log_client_log(tbs->log_client, Log_Warning, severity_level, 0, user_code, 0, 0, msg);
  638. }
  639. static void on_req(sp_tbs_t *tbs, sock_connection *conn, int conn_id, int tsx_id, int method_id, int method_sig, int timeout, iobuffer_t **req_pkt)
  640. {
  641. sub_session *session = find_sub_session(conn, conn_id);
  642. if (session) {
  643. if (session->uac) {
  644. int rc;
  645. sp_tsx_uac_t *tsx;
  646. sp_tsx_uac_callback cb;
  647. cb.user_data = session;
  648. cb.on_ans = &__uac_on_ans;
  649. cb.on_destroy = NULL;
  650. rc = sp_tsx_uac_create(session->uac, tsx_id, method_id, method_sig, &cb, &tsx);
  651. if (rc == 0) {
  652. rc = sp_tsx_uac_async_req(tsx, timeout, req_pkt);
  653. if (rc == 0) {
  654. //sp_dbg_info("send req: tsx_id=%d, method_id=%d, method_sig=%d, pkt_size=%d",
  655. // tsx_id, method_id, method_sig, *req_pkt == NULL ? 0 : iobuffer_get_length(*req_pkt));
  656. } else {
  657. sp_dbg_warn("async req tsx failed! err = %d %s %d", rc, _GetFileName(__FILE__), __LINE__);
  658. post_req_ack(tbs, conn, conn_id, tsx_id, 1, rc, get_err_msg(rc), NULL);
  659. sp_tsx_uac_destroy(tsx);
  660. }
  661. } else {
  662. sp_dbg_warn("create req tsx failed! %s %d", _GetFileName(__FILE__), __LINE__);
  663. post_req_ack(tbs, conn, conn_id, tsx_id, 1, rc, get_err_msg(rc), NULL);
  664. }
  665. } else {
  666. sp_dbg_warn("session already closed! %s %d", _GetFileName(__FILE__), __LINE__);
  667. post_req_ack(tbs, conn, conn_id, tsx_id, 1, Error_NetBroken, get_err_msg(Error_NetBroken), NULL);
  668. }
  669. } else {
  670. sp_dbg_warn("cannot find session id in htable! ignored! %s %d", _GetFileName(__FILE__), __LINE__);
  671. post_req_ack(tbs, conn, conn_id, tsx_id, 1, Error_NotExist, get_err_msg(Error_NotExist), NULL);
  672. }
  673. }
  674. static void on_info(sp_tbs_t *tbs, sock_connection *conn, int conn_id, int method_id, int method_sig, iobuffer_t **info_pkt)
  675. {
  676. sub_session *session = find_sub_session(conn, conn_id);
  677. if (session) {
  678. if (session->uac) {
  679. int rc = sp_ses_uac_send_info(session->uac, method_id, method_sig, info_pkt);
  680. if (rc != 0) {
  681. sp_dbg_warn("uac send info failed! error = %d %s %d", rc, _GetFileName(__FILE__), __LINE__);
  682. }
  683. else {
  684. //sp_dbg_info("send info: method_id=%d, method_sig=%d, pkt_size=%d", method_id, method_sig,
  685. // *info_pkt == NULL ? 0 : iobuffer_get_length(*info_pkt));
  686. }
  687. } else {
  688. sp_dbg_warn("session already closed! info ignored ! %s %d", _GetFileName(__FILE__), __LINE__);
  689. }
  690. } else {
  691. sp_dbg_warn("cannot find session id in htable! ignored! %s %d", _GetFileName(__FILE__), __LINE__);
  692. }
  693. }
  694. static void on_session_end(sp_tbs_t *tbs, sock_connection *conn, int conn_id)
  695. {
  696. sub_session *session = find_sub_session(conn, conn_id);
  697. if (session) {
  698. if (session->uac) {
  699. sp_ses_uac_t *uac = session->uac;
  700. session->uac = NULL;
  701. if (sp_ses_uac_close(uac) == 0) {
  702. sp_ses_uac_destroy(uac);
  703. } else {
  704. sp_dbg_warn("duplicated uac close!");
  705. }
  706. }
  707. } else {
  708. sp_dbg_info("cannot find session id in htable! ignored! %s %d", _GetFileName(__FILE__), __LINE__);
  709. }
  710. }
  711. static void on_stop(sp_tbs_t *tbs)
  712. {
  713. int i;
  714. WSAEventSelect(tbs->server_fd, tbs->conn_evt[SRV_EVT_IDX], 0);
  715. closesocket(tbs->server_fd);
  716. tbs->server_fd = INVALID_SOCKET;
  717. for (i = tbs->conn_cnt-1; i > SRV_EVT_IDX; --i) {
  718. sock_connection *conn = tbs->conn[i];
  719. assert(conn);
  720. on_close(tbs, conn);
  721. }
  722. }
  723. static void on_close(sp_tbs_t *tbs, sock_connection *conn)
  724. {
  725. int i;
  726. sp_dbg_warn("socket on close is invoked!");
  727. if (conn->fd != INVALID_SOCKET) {
  728. WSAEventSelect(conn->fd, tbs->conn_evt[conn->idx], 0);
  729. closesocket(conn->fd);
  730. conn->fd = INVALID_SOCKET;
  731. }
  732. for (i = 0; i < SESSION_BUCKET_SIZE; ++i) {
  733. sub_session *tpos;
  734. struct hlist_node *pos, *n;
  735. hlist_for_each_entry_safe(tpos, pos, n, &conn->session_bucket[i], sub_session, hentry) {
  736. if (tpos->uac) {
  737. sp_ses_uac_t *uac = tpos->uac;
  738. tpos->uac = NULL;
  739. if (sp_ses_uac_close(uac) == 0) {
  740. sp_ses_uac_destroy(uac);
  741. } else {
  742. sp_dbg_warn("duplicated uac close! %s %d", _GetFileName(__FILE__), __LINE__);
  743. }
  744. }
  745. }
  746. }
  747. for (i = 0; i < REGISTER_BUCKET_SIZE; ++i) {
  748. reg_entry *tpos;
  749. struct hlist_node *pos, *n;
  750. hlist_for_each_entry_safe(tpos, pos, n, &conn->register_bucket[i], reg_entry, hentry) {
  751. if (tpos->listener) {
  752. if (sp_bcm_listener_unsubscribe(tpos->listener) == 0) {
  753. sp_bcm_listener_destroy(tpos->listener);
  754. }
  755. }
  756. }
  757. }
  758. sock_connection_dec_ref(conn);
  759. }
  760. static void on_set_var_req(sp_tbs_t *tbs, sock_connection *conn, int tsx_id, char *name, char *value)
  761. {
  762. int rc;
  763. if (name == NULL)
  764. {
  765. rc = Error_Param;
  766. post_set_var_ack(tbs, conn, tsx_id, rc, L"param [name] is null");
  767. return;
  768. }
  769. rc = sp_var_client_set((sp_var_client_t*)tbs->var_client, name, value, 0);
  770. post_set_var_ack(tbs, conn, tsx_id, rc, get_err_msg(rc));
  771. }
  772. static void on_get_var_req(sp_tbs_t *tbs, sock_connection *conn, int tsx_id, char *name)
  773. {
  774. int len = 260;
  775. int rc;
  776. char szTmp[260] = { 0 };
  777. wchar_t wszValue[260] = { 0 };
  778. if (name == NULL)
  779. {
  780. rc = Error_Param;
  781. post_get_var_ack(tbs, conn, tsx_id, rc, L"param [name] is null", NULL);
  782. return;
  783. }
  784. rc = sp_var_client_lock(tbs->var_client);
  785. if (rc == 0) {
  786. rc = sp_var_client_get((sp_var_client_t*)tbs->var_client, name, szTmp, &len);
  787. }
  788. sp_var_client_unlock(tbs->var_client);
  789. if (rc == 0)
  790. {
  791. len = 260;
  792. MultiByteToWideChar(CP_ACP, 0, szTmp, -1, &wszValue[0], len);
  793. post_get_var_ack(tbs, conn, tsx_id, rc, get_err_msg(rc), wszValue);
  794. }
  795. else
  796. post_get_var_ack(tbs, conn, tsx_id, rc, get_err_msg(rc), NULL);
  797. }
  798. static void process_tcp_pkt(sp_tbs_t *tbs, sock_connection *conn, iobuffer_t **p_pkt)
  799. {
  800. iobuffer_t *pkt = *p_pkt;
  801. int type;
  802. iobuffer_read(pkt, IOBUF_T_I4, &type, NULL);
  803. switch (type) {
  804. case PKT_TYPE_INFO:
  805. {
  806. int conn_id;
  807. int method_id;
  808. int method_sig;
  809. iobuffer_format_read(pkt, "444", &conn_id, &method_id, &method_sig);
  810. sp_dbg_info("recv PKT_TYPE_INFO conn_id=%d method_id=%d method_sig=%d", conn_id, method_id, method_sig);
  811. on_info(tbs, conn, conn_id, method_id, method_sig, &pkt);
  812. }
  813. break;
  814. case PKT_TYPE_REQ:
  815. {
  816. int conn_id;
  817. int tsx_id;
  818. int method_id;
  819. int method_sig;
  820. int timeout;
  821. iobuffer_format_read(pkt, "44444", &conn_id, &tsx_id, &method_id, &method_sig, &timeout);
  822. sp_dbg_info("recv PKT_TYPE_REQ conn_id=%d tsx_id=%d method_id=%d method_sig=%d timeout=%d", conn_id, tsx_id, method_id, method_sig, timeout);
  823. on_req(tbs, conn, conn_id, tsx_id, method_id, method_sig, timeout, &pkt);
  824. }
  825. break;
  826. case PKT_TYPE_SESSION:
  827. {
  828. int tsx_id;
  829. wchar_t *wentity_name;
  830. wchar_t *wfunction_name;
  831. wchar_t *wclass_name;
  832. char *entity_name;
  833. char *function_name;
  834. char *class_name;
  835. int n;
  836. iobuffer_format_read(pkt, "4www", &tsx_id, &wentity_name, &wfunction_name, &wclass_name);
  837. n = WideCharToMultiByte(CP_ACP, 0, wentity_name, -1, NULL, 0, NULL, NULL);
  838. entity_name = malloc(n);
  839. WideCharToMultiByte(CP_ACP, 0, wentity_name, -1, entity_name, n, NULL, NULL);
  840. toolkit_free(wentity_name);
  841. n = WideCharToMultiByte(CP_ACP, 0, wfunction_name, -1, NULL, 0, NULL, NULL);
  842. function_name = malloc(n);
  843. WideCharToMultiByte(CP_ACP, 0, wfunction_name, -1, function_name, n, NULL, NULL);
  844. toolkit_free(wfunction_name);
  845. n = WideCharToMultiByte(CP_ACP, 0, wclass_name, -1, NULL, 0, NULL, NULL);
  846. class_name = malloc(n);
  847. WideCharToMultiByte(CP_ACP, 0, wclass_name, -1, class_name, n, NULL, NULL);
  848. toolkit_free(wclass_name);
  849. sp_dbg_info("recv PKT_TYPE_SESSION tsx_id=%d entity_name=%s function_name=%s class_name=%s", tsx_id, entity_name, function_name, class_name);
  850. on_session(tbs, conn, tsx_id, entity_name, function_name, class_name);
  851. if (entity_name)
  852. free(entity_name);
  853. if (function_name)
  854. free(function_name);
  855. if (class_name)
  856. free(class_name);
  857. }
  858. break;
  859. case PKT_TYPE_SESSIONEND:
  860. {
  861. int conn_id;
  862. iobuffer_read(pkt, IOBUF_T_I4, &conn_id, NULL);
  863. sp_dbg_info("recv PKT_TYPE_SESSIONEND conn_id=%d", conn_id);
  864. on_session_end(tbs, conn, conn_id);
  865. }
  866. break;
  867. case PKT_TYPE_REGISTER_EVENT:
  868. {
  869. int register_id;
  870. wchar_t *wentity_name;
  871. char *entity_name;
  872. wchar_t *wfunction_name;
  873. char *function_name;
  874. int n;
  875. iobuffer_format_read(pkt, "4ww", &register_id, &wentity_name, &wfunction_name);
  876. n = WideCharToMultiByte(CP_ACP, 0, wentity_name, -1, NULL, 0, NULL, NULL);
  877. entity_name = malloc(n);
  878. WideCharToMultiByte(CP_ACP, 0, wentity_name, -1, entity_name, n, NULL, NULL);
  879. toolkit_free(wentity_name);
  880. n = WideCharToMultiByte(CP_ACP, 0, wfunction_name, -1, NULL, 0, NULL, NULL);
  881. function_name = (char*)malloc(n);
  882. WideCharToMultiByte(CP_ACP, 0, wfunction_name, -1, function_name, n, NULL, NULL);
  883. toolkit_free(wfunction_name);
  884. sp_dbg_info("recv PKT_TYPE_REGISTER_EVENT register_id=%d, entity_name=%s, function_name=%s", register_id, entity_name, function_name);
  885. on_register_event(tbs, conn, register_id, entity_name, function_name);
  886. if (entity_name)
  887. free(entity_name);
  888. if (function_name)
  889. free(function_name);
  890. }
  891. break;
  892. case PKT_TYPE_UNREGISTER_EVENT:
  893. {
  894. int register_id;
  895. iobuffer_format_read(pkt, "4", &register_id);
  896. sp_dbg_info("recv PKT_TYPE_UNREGISTER_EVENT register_id=%d", register_id);
  897. on_unregister_event(tbs, conn, register_id);
  898. }
  899. break;
  900. case PKT_TYPE_LOG_EVENT:
  901. {
  902. int severity_level;
  903. int user_code;
  904. wchar_t *wmsg = NULL;
  905. char *msg = NULL;
  906. iobuffer_format_read(pkt, "44w", &severity_level, &user_code, &wmsg);
  907. if (wmsg) {
  908. int n = WideCharToMultiByte(CP_ACP, 0, wmsg, -1, NULL, 0, NULL, NULL);
  909. msg = (char*)malloc(n);
  910. WideCharToMultiByte(CP_ACP, 0, wmsg, -1, msg, n, NULL, NULL);
  911. toolkit_free(wmsg);
  912. }
  913. sp_dbg_info("recv PKT_TYPE_LOG_EVENT severity_level=%d, user_code=0x%08x, msg=%s", severity_level, user_code, msg ? msg : "<null>");
  914. on_log_event(tbs, conn, severity_level, user_code, msg);
  915. if (msg)
  916. free(msg);
  917. }
  918. break;
  919. case PKT_TYPE_LOG_WARN:
  920. {
  921. int severity_level;
  922. int user_code;
  923. wchar_t *wmsg = NULL;
  924. char *msg = NULL;
  925. iobuffer_format_read(pkt, "44w", &severity_level, &user_code, &wmsg);
  926. if (wmsg) {
  927. int n = WideCharToMultiByte(CP_ACP, 0, wmsg, -1, NULL, 0, NULL, NULL);
  928. msg = (char*)malloc(n);
  929. WideCharToMultiByte(CP_ACP, 0, wmsg, -1, msg, n, NULL, NULL);
  930. toolkit_free(wmsg);
  931. }
  932. sp_dbg_info("recv PKT_TYPE_LOG_WARN severity_level=%d, user_code=0x%08x, msg=%s", severity_level, user_code, msg ? msg : "<null>");
  933. on_log_warn(tbs, conn, severity_level, user_code, msg);
  934. if (msg)
  935. free(msg);
  936. }
  937. break;
  938. case PKT_TYPE_SET_VAR_REQ:
  939. {
  940. int tsx_id = 0;
  941. wchar_t *wname = NULL;
  942. wchar_t *wvalue = NULL;
  943. char *name = NULL;
  944. char *value = NULL;
  945. iobuffer_format_read(pkt, "4ww", &tsx_id, &wname, &wvalue);
  946. if (wname)
  947. {
  948. int n = WideCharToMultiByte(CP_ACP, 0, wname, -1, NULL, 0, NULL, NULL);
  949. name = (char*)malloc(n);
  950. WideCharToMultiByte(CP_ACP, 0, wname, -1, name, n, NULL, NULL);
  951. toolkit_free(wname);
  952. }
  953. if (wvalue)
  954. {
  955. int n = WideCharToMultiByte(CP_ACP, 0, wvalue, -1, NULL, 0, NULL, NULL);
  956. value = (char*)malloc(n);
  957. WideCharToMultiByte(CP_ACP, 0, wvalue, -1, value, n, NULL, NULL);
  958. toolkit_free(wvalue);
  959. }
  960. sp_dbg_info("recv PKT_TYPE_SET_VAR_REQ tsx_id=%d, name=%s, value=%s", tsx_id, name ? name : "<null>", value ? value : "<null>");
  961. on_set_var_req(tbs, conn, tsx_id, name, value);
  962. if (name)
  963. free(name);
  964. if (value)
  965. free(value);
  966. }
  967. break;
  968. case PKT_TYPE_GET_VAR_REQ:
  969. {
  970. int tsx_id = 0;
  971. wchar_t *wname = NULL;
  972. char *name = NULL;
  973. iobuffer_format_read(pkt, "4w", &tsx_id, &wname);
  974. if (wname)
  975. {
  976. int n = WideCharToMultiByte(CP_ACP, 0, wname, -1, NULL, 0, NULL, NULL);
  977. name = (char*)malloc(n);
  978. WideCharToMultiByte(CP_ACP, 0, wname, -1, name, n, NULL, NULL);
  979. toolkit_free(wname);
  980. }
  981. sp_dbg_info("recv PKT_TYPE_GET_VAR_REQ tsx_id=%d, name=%s", tsx_id, name ? name : "<null>");
  982. on_get_var_req(tbs, conn, tsx_id, name);
  983. if (name)
  984. free(name);
  985. }
  986. break;
  987. default:
  988. sp_dbg_warn("recv unknown pkt type: %d", type);
  989. //assert(0);
  990. break;
  991. }
  992. *p_pkt = NULL;
  993. if (pkt)
  994. iobuffer_dec_ref(pkt);
  995. }
  996. static void on_read(sp_tbs_t *tbs, sock_connection *conn)
  997. {
  998. if (conn->rx_state == RECV_STATE_HEADER) {
  999. int t = recv(conn->fd, &conn->rx_hdr_buf[conn->rx_hdr_buf_len], RX_BUF_SIZE-conn->rx_hdr_buf_len, 0);
  1000. if (t > 0) {
  1001. int offset = 0;
  1002. conn->rx_hdr_buf_len += t;
  1003. while (conn->rx_hdr_buf_len-offset >= HDR_LEN) {
  1004. iobuffer_t *pkt;
  1005. memcpy(&conn->rx_header_len, conn->rx_hdr_buf+offset, HDR_LEN);
  1006. conn->rx_header_len += 4; // fixed hdr not include type!!!
  1007. offset += HDR_LEN;
  1008. pkt = iobuffer_create(-1, conn->rx_header_len);
  1009. if (conn->rx_hdr_buf_len-offset >= conn->rx_header_len) {
  1010. memcpy(iobuffer_data(pkt, -1), conn->rx_hdr_buf+offset, conn->rx_header_len);
  1011. offset += conn->rx_header_len;
  1012. iobuffer_push_count(pkt, conn->rx_header_len);
  1013. process_tcp_pkt(tbs, conn, &pkt);
  1014. if (pkt)
  1015. iobuffer_dec_ref(pkt);
  1016. } else {
  1017. memcpy(iobuffer_data(pkt, -1), conn->rx_hdr_buf+offset, conn->rx_hdr_buf_len-offset);
  1018. iobuffer_push_count(pkt, conn->rx_hdr_buf_len-offset);
  1019. offset = conn->rx_hdr_buf_len;
  1020. assert(conn->rx_pkt == NULL);
  1021. conn->rx_pkt = pkt;
  1022. conn->rx_state = RECV_STATE_BODY;
  1023. }
  1024. }
  1025. if (offset == conn->rx_hdr_buf_len) {
  1026. conn->rx_hdr_buf_len = 0;
  1027. } else {
  1028. if (offset > 0) {
  1029. assert(conn->rx_state == RECV_STATE_HEADER);
  1030. memmove(&conn->rx_hdr_buf[0], &conn->rx_hdr_buf[offset], conn->rx_hdr_buf_len-offset);
  1031. conn->rx_hdr_buf_len -= offset;
  1032. }
  1033. }
  1034. }
  1035. } else if (conn->rx_state == RECV_STATE_BODY) {
  1036. int offset, t;
  1037. assert(conn->rx_pkt);
  1038. offset = iobuffer_get_length(conn->rx_pkt);
  1039. t = recv(conn->fd, iobuffer_data(conn->rx_pkt, -1), conn->rx_header_len-offset, 0);
  1040. if (t > 0) {
  1041. iobuffer_push_count(conn->rx_pkt, t);
  1042. if (offset+t == conn->rx_header_len) {
  1043. process_tcp_pkt(tbs, conn, &conn->rx_pkt);
  1044. if (conn->rx_pkt) {
  1045. iobuffer_dec_ref(conn->rx_pkt);
  1046. conn->rx_pkt = NULL;
  1047. }
  1048. conn->rx_hdr_buf_len = 0;
  1049. conn->rx_state = RECV_STATE_HEADER;
  1050. }
  1051. }
  1052. } else {
  1053. sp_dbg_warn("cannot go here, bug! %s, %d", _GetFileName(__FILE__), __LINE__);
  1054. assert(0);
  1055. }
  1056. }
  1057. static void on_write(sp_tbs_t *tbs, sock_connection *conn)
  1058. {
  1059. if (conn->fd == INVALID_SOCKET)
  1060. return;
  1061. while (iobuffer_queue_count(conn->tx_queue) > 0) {
  1062. iobuffer_t *pkt = iobuffer_queue_head(conn->tx_queue);
  1063. int sended = 0;
  1064. int total = iobuffer_get_length(pkt);
  1065. while (sended < total) {
  1066. int t = send(conn->fd, iobuffer_data(pkt, 0), total-sended, 0);
  1067. if (t > 0) {
  1068. sended += t;
  1069. iobuffer_pop_count(pkt, t);
  1070. } else {
  1071. break;
  1072. }
  1073. }
  1074. if (sended < total) {
  1075. break;
  1076. } else {
  1077. iobuffer_queue_deque(conn->tx_queue);
  1078. iobuffer_dec_ref(pkt);
  1079. }
  1080. }
  1081. }
  1082. static void on_accept(sp_tbs_t *tbs)
  1083. {
  1084. int rc;
  1085. rc = create_connection(tbs);
  1086. if (rc != 0) {
  1087. sp_dbg_warn("create connection failed! err = %d %s %d", rc, _GetFileName(__FILE__), __LINE__);
  1088. } else {
  1089. sp_dbg_info("create connection ok! %s %d", _GetFileName(__FILE__), __LINE__);
  1090. }
  1091. }
  1092. static void post_msg(sp_tbs_t *tbs, int msg, param_size_t param1, param_size_t param2)
  1093. {
  1094. cmd_entry *e = MALLOC_T(cmd_entry);
  1095. e->msg = msg;
  1096. e->param1 = param1;
  1097. e->param2 = param2;
  1098. spinlock_enter(&tbs->cmd_list_lock, -1);
  1099. list_add_tail(&e->entry, &tbs->cmd_list);
  1100. spinlock_leave(&tbs->cmd_list_lock);
  1101. ReleaseSemaphore(tbs->conn_evt[MSG_EVT_IDX], 1, NULL);
  1102. }
  1103. static unsigned int __stdcall server_proc(void *arg)
  1104. {
  1105. sp_tbs_t *tbs = (sp_tbs_t*)arg;
  1106. struct sockaddr_in addr = {0};
  1107. int istop = 0;
  1108. int fixed_conn;
  1109. assert(tbs->server_fd == INVALID_SOCKET);
  1110. tbs->server_fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  1111. if (tbs->server_fd == INVALID_SOCKET) {
  1112. sp_dbg_warn("create list fd socket failed! %s %d, LastError=%d", _GetFileName(__FILE__), __LINE__, WSAGetLastError());
  1113. tbs->ready_evt_result = Error_Resource;
  1114. goto on_error;
  1115. }
  1116. {
  1117. long val = 1;
  1118. setsockopt(tbs->server_fd, SOL_SOCKET, SO_REUSEADDR, (char*)&val, sizeof(val));
  1119. }
  1120. addr.sin_family = AF_INET;
  1121. addr.sin_addr.s_addr = tbs->server_ip;
  1122. addr.sin_port = tbs->server_port;
  1123. if (bind(tbs->server_fd, (struct sockaddr*)&addr, sizeof(addr)) != 0) {
  1124. sp_dbg_warn("bind address failed! %s %d, LastError=%d", _GetFileName(__FILE__), __LINE__, WSAGetLastError());
  1125. tbs->ready_evt_result = Error_AlreadyExist;
  1126. goto on_error;
  1127. }
  1128. if (listen(tbs->server_fd, 5) != 0) {
  1129. sp_dbg_warn("winsock::listen failed! %s %d, LastError=%d", _GetFileName(__FILE__), __LINE__, WSAGetLastError());
  1130. tbs->ready_evt_result = Error_AlreadyExist;
  1131. goto on_error;
  1132. }
  1133. assert(tbs->conn_evt[SRV_EVT_IDX] == NULL);
  1134. tbs->conn_evt[SRV_EVT_IDX] = WSACreateEvent();
  1135. WSAEventSelect(tbs->server_fd, tbs->conn_evt[SRV_EVT_IDX], FD_ACCEPT | FD_CLOSE);
  1136. tbs->conn_cnt++;
  1137. sp_dbg_info("start server ok!");
  1138. tbs->ready_evt_result = 0;
  1139. SetEvent(tbs->ready_evt);
  1140. fixed_conn = tbs->conn_cnt;
  1141. while (!istop || tbs->conn_cnt > fixed_conn) {
  1142. DWORD evt_cnt = (DWORD)tbs->conn_cnt;
  1143. DWORD dwRet = WaitForMultipleObjects(evt_cnt, &tbs->conn_evt[0], FALSE, MAX_TIMEOUT);
  1144. if (dwRet == WAIT_TIMEOUT) {
  1145. continue;
  1146. } else if (dwRet == WAIT_OBJECT_0+MSG_EVT_IDX) { // cmd
  1147. cmd_entry *e;
  1148. spinlock_enter(&tbs->cmd_list_lock, -1);
  1149. e = list_first_entry(&tbs->cmd_list, cmd_entry, entry);
  1150. list_del(&e->entry);
  1151. spinlock_leave(&tbs->cmd_list_lock);
  1152. switch (e->msg) {
  1153. case MSG_STOP:
  1154. {
  1155. on_stop(tbs); // ...stop
  1156. istop++;
  1157. }
  1158. break;
  1159. case MSG_UAC_ON_CONNECT:
  1160. {
  1161. sub_session *session = (sub_session*)e->param1;
  1162. int error = e->param2;
  1163. uac_on_connect(tbs, session->conn, session, error);
  1164. }
  1165. break;
  1166. case MSG_UAC_ON_DESTROY:
  1167. {
  1168. sub_session *session = (sub_session*)e->param1;
  1169. uac_on_destroy(tbs, session->conn, session);
  1170. }
  1171. break;
  1172. case MSG_UAC_ON_CLOSE:
  1173. {
  1174. sub_session *session = (sub_session*)e->param1;
  1175. int error = e->param2;
  1176. uac_on_close(tbs, session->conn, session, error);
  1177. }
  1178. break;
  1179. case MSG_UAC_ON_ANS:
  1180. {
  1181. sub_session *session = (sub_session*)e->param1;
  1182. iobuffer_t *ans_pkt = (iobuffer_t*)e->param2;
  1183. int tsx_id;
  1184. int error;
  1185. int end;
  1186. int user_error;
  1187. iobuffer_format_read(ans_pkt, "4444", &tsx_id, &error, &user_error, &end);
  1188. uac_on_ans(tbs, session->conn, session, tsx_id, error, user_error, end, &ans_pkt);
  1189. if (ans_pkt)
  1190. iobuffer_dec_ref(ans_pkt);
  1191. }
  1192. break;
  1193. case MSG_ON_EVENT:
  1194. {
  1195. reg_entry *entry = (reg_entry*)e->param1;
  1196. iobuffer_t *evt_pkt = (iobuffer_t *)e->param2;
  1197. post_event(tbs, entry, 0, entry->register_id, &evt_pkt);
  1198. if (evt_pkt)
  1199. iobuffer_dec_ref(evt_pkt);
  1200. }
  1201. break;
  1202. default:
  1203. sp_dbg_warn("unknown msg type! %s %d", _GetFileName(__FILE__), __LINE__);
  1204. assert(0);
  1205. break;
  1206. }
  1207. free(e);
  1208. } else if (dwRet == WAIT_OBJECT_0 + SRV_EVT_IDX) { //
  1209. WSANETWORKEVENTS netevents;
  1210. if (WSAEnumNetworkEvents(tbs->server_fd, tbs->conn_evt[SRV_EVT_IDX], &netevents) != SOCKET_ERROR) {
  1211. if (netevents.lNetworkEvents & FD_ACCEPT) {
  1212. if (netevents.iErrorCode[FD_ACCEPT_BIT] == 0) {
  1213. sp_dbg_info("FD_ACCEPT trigger!");
  1214. on_accept(tbs);
  1215. } else {
  1216. sp_dbg_warn("listen accept error bit! %s, %d", _GetFileName(__FILE__), __LINE__);
  1217. }
  1218. }
  1219. if (netevents.lNetworkEvents & FD_CLOSE) {
  1220. sp_dbg_warn("listen socket closed detected! %s, %d", _GetFileName(__FILE__), __LINE__);
  1221. break;
  1222. }
  1223. } else {
  1224. sp_dbg_warn("WSAEnumNetworkEvents failed, LastError=%d", WSAGetLastError());
  1225. }
  1226. } else if (dwRet < WAIT_OBJECT_0 + evt_cnt) {
  1227. WSANETWORKEVENTS netevents;
  1228. int idx = dwRet - WAIT_OBJECT_0;
  1229. sock_connection *conn = tbs->conn[idx];
  1230. assert(conn);
  1231. if (WSAEnumNetworkEvents(conn->fd, tbs->conn_evt[idx], &netevents) != SOCKET_ERROR) {
  1232. if (netevents.lNetworkEvents & FD_READ) {
  1233. if (netevents.iErrorCode[FD_READ_BIT] == 0) {
  1234. on_read(tbs, conn);
  1235. }
  1236. }
  1237. if (netevents.lNetworkEvents & FD_WRITE) {
  1238. if (netevents.iErrorCode[FD_WRITE_BIT] == 0) {
  1239. on_write(tbs, conn);
  1240. }
  1241. }
  1242. if (netevents.lNetworkEvents & FD_CLOSE) {
  1243. on_close(tbs, conn);
  1244. }
  1245. }
  1246. } else {
  1247. sp_dbg_warn("unexpected dwRet! %s %d", _GetFileName(__FILE__), __LINE__);
  1248. break;
  1249. }
  1250. }
  1251. sp_dbg_info("tbs server thread exit!");
  1252. on_error:
  1253. if (tbs->server_fd != INVALID_SOCKET) {
  1254. if (tbs->conn_evt[SRV_EVT_IDX])
  1255. WSAEventSelect(tbs->server_fd, tbs->conn_evt[SRV_EVT_IDX], 0);
  1256. closesocket(tbs->server_fd);
  1257. tbs->server_fd = INVALID_SOCKET;
  1258. }
  1259. if (tbs->conn_evt[SRV_EVT_IDX]) {
  1260. WSACloseEvent(tbs->conn_evt[SRV_EVT_IDX]);
  1261. tbs->conn_evt[SRV_EVT_IDX] = NULL;
  1262. tbs->conn_cnt--;
  1263. }
  1264. if (tbs->ready_evt_result) {
  1265. SetEvent(tbs->ready_evt);
  1266. }
  1267. return 0;
  1268. }
  1269. int sp_tbs_create(sp_ses_mgr_t *ses_mgr, const char *ipaddr, unsigned short port, sp_tbs_t **p_tbs)
  1270. {
  1271. sp_tbs_t *tbs;
  1272. sp_svc_t *svc = sp_ses_mgr_get_svc(ses_mgr);
  1273. assert(ipaddr);
  1274. assert(ses_mgr);
  1275. tbs = ZALLOC_T(sp_tbs_t);
  1276. tbs->conn_evt[0] = CreateSemaphoreA(NULL, 0, 0x7fffffff, NULL);
  1277. tbs->ready_evt = CreateEventA(NULL, TRUE, FALSE, NULL);
  1278. sp_log_client_create(svc, sp_svc_get_iom(svc), &tbs->log_client);
  1279. tbs->conn_cnt = 1;
  1280. tbs->server_fd = INVALID_SOCKET;
  1281. tbs->server_ip = inet_addr(ipaddr);
  1282. tbs->server_port = htons(port);
  1283. tbs->sub_session_seq = (unsigned int)GetTickCount();
  1284. INIT_LIST_HEAD(&tbs->cmd_list);
  1285. spinlock_init(&tbs->cmd_list_lock);
  1286. tbs->ses_mgr = ses_mgr;
  1287. sp_var_client_create(svc, &tbs->var_client);
  1288. *p_tbs = tbs;
  1289. return 0;
  1290. }
  1291. int sp_tbs_start(sp_tbs_t *tbs)
  1292. {
  1293. if (tbs->work_thread) {
  1294. sp_dbg_warn("may be already started! %s %d", _GetFileName(__FILE__), __LINE__);
  1295. return Error_Duplication;
  1296. }
  1297. tbs->ready_evt_result = 0;
  1298. ResetEvent(tbs->ready_evt);
  1299. tbs->work_thread = (HANDLE)_beginthreadex(NULL, 0, &server_proc, tbs, 0, (unsigned*)&tbs->work_thread_id);
  1300. if (!tbs->work_thread) {
  1301. return Error_Resource;
  1302. }
  1303. WaitForSingleObject(tbs->ready_evt, INFINITE);
  1304. if (tbs->ready_evt_result) {
  1305. CloseHandle(tbs->work_thread);
  1306. tbs->work_thread = NULL;
  1307. }
  1308. return tbs->ready_evt_result;
  1309. }
  1310. void sp_tbs_stop(sp_tbs_t *tbs)
  1311. {
  1312. assert(tbs->work_thread);
  1313. post_msg(tbs, MSG_STOP, 0, 0);
  1314. WaitForSingleObject(tbs->work_thread, INFINITE);
  1315. CloseHandle(tbs->work_thread);
  1316. tbs->work_thread = NULL;
  1317. }
  1318. void sp_tbs_destroy(sp_tbs_t *tbs)
  1319. {
  1320. assert(tbs->conn_cnt == 1);
  1321. assert(tbs->server_fd == INVALID_SOCKET);
  1322. CloseHandle(tbs->conn_evt[0]);
  1323. CloseHandle(tbs->ready_evt);
  1324. sp_log_client_destroy(tbs->log_client);
  1325. sp_var_client_destroy(tbs->var_client);
  1326. free(tbs);
  1327. }