2016-11-28 16:35:09 -05:00
/*
* Copyright ( c ) 2007 - 2014 , Anthony Minessale II
* All rights reserved .
2017-02-28 23:37:19 +00:00
*
2016-11-28 16:35:09 -05:00
* Redistribution and use in source and binary forms , with or without
* modification , are permitted provided that the following conditions
* are met :
2017-02-28 23:37:19 +00:00
*
2016-11-28 16:35:09 -05:00
* * Redistributions of source code must retain the above copyright
* notice , this list of conditions and the following disclaimer .
2017-02-28 23:37:19 +00:00
*
2016-11-28 16:35:09 -05:00
* * Redistributions in binary form must reproduce the above copyright
* notice , this list of conditions and the following disclaimer in the
* documentation and / or other materials provided with the distribution .
2017-02-28 23:37:19 +00:00
*
2016-11-28 16:35:09 -05:00
* * Neither the name of the original author ; nor the names of any contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission .
2017-02-28 23:37:19 +00:00
*
*
2016-11-28 16:35:09 -05:00
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* " AS IS " AND ANY EXPRESS OR IMPLIED WARRANTIES , INCLUDING , BUT NOT
* LIMITED TO , THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED . IN NO EVENT SHALL THE COPYRIGHT OWNER
* OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT , INDIRECT , INCIDENTAL , SPECIAL ,
* EXEMPLARY , OR CONSEQUENTIAL DAMAGES ( INCLUDING , BUT NOT LIMITED TO ,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES ; LOSS OF USE , DATA , OR
* PROFITS ; OR BUSINESS INTERRUPTION ) HOWEVER CAUSED AND ON ANY THEORY OF
* LIABILITY , WHETHER IN CONTRACT , STRICT LIABILITY , OR TORT ( INCLUDING
* NEGLIGENCE OR OTHERWISE ) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE , EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE .
*/
# include "blade.h"
typedef enum {
BH_NONE = 0 ,
2017-01-09 13:19:14 +00:00
BH_MYPOOL = ( 1 < < 0 ) ,
BH_MYTPOOL = ( 1 < < 1 )
2016-11-28 16:35:09 -05:00
} bhpvt_flag_t ;
struct blade_handle_s {
bhpvt_flag_t flags ;
2017-01-09 13:19:14 +00:00
ks_pool_t * pool ;
ks_thread_pool_t * tpool ;
2017-02-28 23:37:19 +00:00
2017-02-15 00:56:29 +00:00
config_setting_t * config_directory ;
2017-01-27 19:49:02 +00:00
config_setting_t * config_datastore ;
2017-01-30 05:02:58 +00:00
2017-04-04 12:32:01 -06:00
ks_thread_t * worker_thread ;
ks_bool_t shutdown ;
2017-02-21 16:37:50 +00:00
ks_hash_t * transports ; // registered transports exposed by modules, NOT active connections
2017-03-07 18:45:52 +00:00
ks_hash_t * spaces ; // registered method spaces exposed by modules
2017-03-16 13:13:26 -05:00
// registered event callback registry
// @todo should probably use a blade_handle_event_registration_t and contain optional userdata to pass from registration back into the callback, like
// a blade_module_t to get at inner module data for events that service modules may need to subscribe to between each other
ks_hash_t * events ;
2017-01-30 05:02:58 +00:00
2017-02-21 16:37:50 +00:00
//blade_identity_t *identity;
2017-01-16 17:33:41 +00:00
blade_datastore_t * datastore ;
2017-02-21 16:37:50 +00:00
// @todo insert on connection creations, remove on connection destructions, key based on a UUID for the connection
ks_hash_t * connections ; // active connections keyed by connection id
2017-03-16 13:13:26 -05:00
2017-02-21 16:37:50 +00:00
// @todo insert on session creations, remove on session destructions, key based on a UUID for the session
ks_hash_t * sessions ; // active sessions keyed by session id
2017-03-16 13:13:26 -05:00
ks_hash_t * session_state_callbacks ;
2017-02-21 16:37:50 +00:00
// @todo another hash with sessions keyed by the remote identity without parameters for quick lookup by target identity on sending?
ks_hash_t * requests ; // outgoing requests waiting for a response keyed by the message id
2016-11-28 16:35:09 -05:00
} ;
2017-04-04 12:32:01 -06:00
void * blade_handle_worker_thread ( ks_thread_t * thread , void * data ) ;
2016-11-28 16:35:09 -05:00
2017-02-14 19:04:48 +00:00
typedef struct blade_handle_transport_registration_s blade_handle_transport_registration_t ;
struct blade_handle_transport_registration_s {
2016-11-28 16:35:09 -05:00
ks_pool_t * pool ;
2017-02-14 19:04:48 +00:00
blade_module_t * module ;
blade_transport_callbacks_t * callbacks ;
} ;
2016-11-28 16:35:09 -05:00
2017-02-14 19:04:48 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_transport_registration_create ( blade_handle_transport_registration_t * * bhtrP ,
ks_pool_t * pool ,
blade_module_t * module ,
blade_transport_callbacks_t * callbacks )
{
blade_handle_transport_registration_t * bhtr = NULL ;
2016-11-28 16:35:09 -05:00
2017-02-14 19:04:48 +00:00
ks_assert ( bhtrP ) ;
ks_assert ( pool ) ;
ks_assert ( module ) ;
ks_assert ( callbacks ) ;
2016-11-28 16:35:09 -05:00
2017-02-14 19:04:48 +00:00
bhtr = ks_pool_alloc ( pool , sizeof ( blade_handle_transport_registration_t ) ) ;
bhtr - > pool = pool ;
bhtr - > module = module ;
bhtr - > callbacks = callbacks ;
2016-11-28 16:35:09 -05:00
2017-02-14 19:04:48 +00:00
* bhtrP = bhtr ;
2017-01-30 05:02:58 +00:00
2017-02-14 19:04:48 +00:00
return KS_STATUS_SUCCESS ;
}
2017-01-30 05:02:58 +00:00
2017-02-14 19:04:48 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_transport_registration_destroy ( blade_handle_transport_registration_t * * bhtrP )
{
blade_handle_transport_registration_t * bhtr = NULL ;
2017-02-13 19:07:33 +00:00
2017-02-14 19:04:48 +00:00
ks_assert ( bhtrP ) ;
2016-11-28 16:35:09 -05:00
2017-02-14 19:04:48 +00:00
bhtr = * bhtrP ;
* bhtrP = NULL ;
2016-11-28 16:35:09 -05:00
2017-02-14 19:04:48 +00:00
ks_assert ( bhtr ) ;
ks_pool_free ( bhtr - > pool , & bhtr ) ;
2016-11-28 16:35:09 -05:00
return KS_STATUS_SUCCESS ;
}
2017-02-14 19:04:48 +00:00
2017-03-16 13:13:26 -05:00
typedef struct blade_handle_session_state_callback_registration_s blade_handle_session_state_callback_registration_t ;
struct blade_handle_session_state_callback_registration_s {
ks_pool_t * pool ;
const char * id ;
void * data ;
blade_session_state_callback_t callback ;
} ;
ks_status_t blade_handle_session_state_callback_registration_create ( blade_handle_session_state_callback_registration_t * * bhsscrP ,
ks_pool_t * pool ,
void * data ,
blade_session_state_callback_t callback )
{
blade_handle_session_state_callback_registration_t * bhsscr = NULL ;
uuid_t uuid ;
ks_assert ( bhsscrP ) ;
ks_assert ( pool ) ;
ks_assert ( callback ) ;
ks_uuid ( & uuid ) ;
bhsscr = ks_pool_alloc ( pool , sizeof ( blade_handle_session_state_callback_registration_t ) ) ;
bhsscr - > pool = pool ;
bhsscr - > id = ks_uuid_str ( pool , & uuid ) ;
bhsscr - > data = data ;
bhsscr - > callback = callback ;
* bhsscrP = bhsscr ;
return KS_STATUS_SUCCESS ;
}
ks_status_t blade_handle_session_state_callback_registration_destroy ( blade_handle_session_state_callback_registration_t * * bhsscrP )
{
blade_handle_session_state_callback_registration_t * bhsscr = NULL ;
ks_assert ( bhsscrP ) ;
bhsscr = * bhsscrP ;
* bhsscrP = NULL ;
ks_assert ( bhsscr ) ;
ks_pool_free ( bhsscr - > pool , & bhsscr - > id ) ;
ks_pool_free ( bhsscr - > pool , & bhsscr ) ;
return KS_STATUS_SUCCESS ;
}
2017-02-14 19:04:48 +00:00
2017-01-27 19:49:02 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_create ( blade_handle_t * * bhP , ks_pool_t * pool , ks_thread_pool_t * tpool )
2016-11-28 16:35:09 -05:00
{
bhpvt_flag_t newflags = BH_NONE ;
blade_handle_t * bh = NULL ;
2017-01-09 13:19:14 +00:00
2017-01-27 19:49:02 +00:00
ks_assert ( bhP ) ;
2016-11-28 16:35:09 -05:00
if ( ! pool ) {
newflags | = BH_MYPOOL ;
ks_pool_open ( & pool ) ;
}
2017-01-09 13:19:14 +00:00
if ( ! tpool ) {
newflags | = BH_MYTPOOL ;
ks_thread_pool_create ( & tpool , BLADE_HANDLE_TPOOL_MIN , BLADE_HANDLE_TPOOL_MAX , BLADE_HANDLE_TPOOL_STACK , KS_PRI_NORMAL , BLADE_HANDLE_TPOOL_IDLE ) ;
ks_assert ( tpool ) ;
}
2017-02-28 23:37:19 +00:00
2017-02-14 19:04:48 +00:00
bh = ks_pool_alloc ( pool , sizeof ( blade_handle_t ) ) ;
2016-11-28 16:35:09 -05:00
bh - > flags = newflags ;
2017-01-09 13:19:14 +00:00
bh - > pool = pool ;
bh - > tpool = tpool ;
2017-01-30 05:02:58 +00:00
2017-04-17 11:10:05 -06:00
// @todo this needs to be reviewed, NOLOCK is incorrect, but RWLOCK causes deadlock somewhere
ks_hash_create ( & bh - > transports , KS_HASH_MODE_CASE_INSENSITIVE , KS_HASH_FLAG_RWLOCK | KS_HASH_FLAG_DUP_CHECK , bh - > pool ) ;
2017-02-13 19:07:33 +00:00
ks_assert ( bh - > transports ) ;
2017-04-17 11:10:05 -06:00
ks_hash_create ( & bh - > spaces , KS_HASH_MODE_CASE_INSENSITIVE , KS_HASH_FLAG_RWLOCK | KS_HASH_FLAG_DUP_CHECK , bh - > pool ) ;
2017-03-07 18:45:52 +00:00
ks_assert ( bh - > spaces ) ;
2017-04-17 11:10:05 -06:00
ks_hash_create ( & bh - > events , KS_HASH_MODE_CASE_INSENSITIVE , KS_HASH_FLAG_RWLOCK | KS_HASH_FLAG_DUP_CHECK , bh - > pool ) ;
2017-03-16 13:13:26 -05:00
ks_assert ( bh - > events ) ;
2017-02-28 23:37:19 +00:00
2017-04-17 11:10:05 -06:00
ks_hash_create ( & bh - > connections , KS_HASH_MODE_CASE_INSENSITIVE , KS_HASH_FLAG_RWLOCK | KS_HASH_FLAG_DUP_CHECK , bh - > pool ) ;
2017-02-21 16:37:50 +00:00
ks_assert ( bh - > connections ) ;
2017-03-16 13:13:26 -05:00
2017-04-17 11:10:05 -06:00
ks_hash_create ( & bh - > sessions , KS_HASH_MODE_CASE_INSENSITIVE , KS_HASH_FLAG_RWLOCK | KS_HASH_FLAG_DUP_CHECK , bh - > pool ) ;
2017-02-21 16:37:50 +00:00
ks_assert ( bh - > sessions ) ;
2017-04-17 11:10:05 -06:00
ks_hash_create ( & bh - > session_state_callbacks , KS_HASH_MODE_CASE_INSENSITIVE , KS_HASH_FLAG_RWLOCK | KS_HASH_FLAG_DUP_CHECK , bh - > pool ) ;
2017-03-16 13:13:26 -05:00
ks_assert ( bh - > session_state_callbacks ) ;
2017-04-17 11:10:05 -06:00
ks_hash_create ( & bh - > requests , KS_HASH_MODE_CASE_INSENSITIVE , KS_HASH_FLAG_RWLOCK | KS_HASH_FLAG_DUP_CHECK , bh - > pool ) ;
2017-02-21 16:37:50 +00:00
ks_assert ( bh - > requests ) ;
2017-02-28 23:37:19 +00:00
2016-11-28 16:35:09 -05:00
* bhP = bh ;
2017-03-07 18:45:52 +00:00
ks_log ( KS_LOG_DEBUG , " Created \n " ) ;
2016-11-28 16:35:09 -05:00
return KS_STATUS_SUCCESS ;
}
2017-02-14 19:04:48 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_destroy ( blade_handle_t * * bhP )
{
blade_handle_t * bh = NULL ;
bhpvt_flag_t flags ;
ks_pool_t * pool ;
ks_assert ( bhP ) ;
bh = * bhP ;
* bhP = NULL ;
ks_assert ( bh ) ;
flags = bh - > flags ;
pool = bh - > pool ;
blade_handle_shutdown ( bh ) ;
2017-02-21 16:37:50 +00:00
ks_hash_destroy ( & bh - > requests ) ;
2017-03-16 13:13:26 -05:00
ks_hash_destroy ( & bh - > session_state_callbacks ) ;
2017-02-21 16:37:50 +00:00
ks_hash_destroy ( & bh - > sessions ) ;
ks_hash_destroy ( & bh - > connections ) ;
2017-03-16 13:13:26 -05:00
ks_hash_destroy ( & bh - > events ) ;
2017-03-07 18:45:52 +00:00
ks_hash_destroy ( & bh - > spaces ) ;
2017-02-14 19:04:48 +00:00
ks_hash_destroy ( & bh - > transports ) ;
if ( bh - > tpool & & ( flags & BH_MYTPOOL ) ) ks_thread_pool_destroy ( & bh - > tpool ) ;
2017-03-07 18:45:52 +00:00
ks_log ( KS_LOG_DEBUG , " Destroyed \n " ) ;
2017-02-14 19:04:48 +00:00
ks_pool_free ( bh - > pool , & bh ) ;
if ( pool & & ( flags & BH_MYPOOL ) ) {
ks_pool_close ( & pool ) ;
}
return KS_STATUS_SUCCESS ;
}
2017-01-27 19:49:02 +00:00
ks_status_t blade_handle_config ( blade_handle_t * bh , config_setting_t * config )
2017-01-09 13:19:14 +00:00
{
2017-02-15 00:56:29 +00:00
config_setting_t * directory = NULL ;
2017-01-27 19:49:02 +00:00
config_setting_t * datastore = NULL ;
2017-02-28 23:37:19 +00:00
2017-01-09 13:19:14 +00:00
ks_assert ( bh ) ;
2017-01-27 19:49:02 +00:00
if ( ! config ) return KS_STATUS_FAIL ;
if ( ! config_setting_is_group ( config ) ) return KS_STATUS_FAIL ;
2017-02-15 00:56:29 +00:00
directory = config_setting_get_member ( config , " directory " ) ;
2017-02-28 23:37:19 +00:00
2017-01-27 19:49:02 +00:00
datastore = config_setting_get_member ( config , " datastore " ) ;
//if (datastore && !config_setting_is_group(datastore)) return KS_STATUS_FAIL;
2017-01-30 05:02:58 +00:00
2017-02-15 00:56:29 +00:00
bh - > config_directory = directory ;
2017-01-27 19:49:02 +00:00
bh - > config_datastore = datastore ;
2017-02-28 23:37:19 +00:00
2017-01-27 19:49:02 +00:00
return KS_STATUS_SUCCESS ;
2017-01-09 13:19:14 +00:00
}
2017-02-09 17:08:07 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_startup ( blade_handle_t * bh , config_setting_t * config )
2017-01-09 13:19:14 +00:00
{
ks_assert ( bh ) ;
2017-01-31 19:28:21 +00:00
if ( blade_handle_config ( bh , config ) ! = KS_STATUS_SUCCESS ) {
ks_log ( KS_LOG_DEBUG , " blade_handle_config failed \n " ) ;
return KS_STATUS_FAIL ;
}
2017-01-30 05:02:58 +00:00
2017-01-27 19:49:02 +00:00
if ( bh - > config_datastore & & ! blade_handle_datastore_available ( bh ) ) {
blade_datastore_create ( & bh - > datastore , bh - > pool , bh - > tpool ) ;
2017-01-30 05:02:58 +00:00
ks_assert ( bh - > datastore ) ;
2017-01-31 19:28:21 +00:00
if ( blade_datastore_startup ( bh - > datastore , bh - > config_datastore ) ! = KS_STATUS_SUCCESS ) {
ks_log ( KS_LOG_DEBUG , " blade_datastore_startup failed \n " ) ;
return KS_STATUS_FAIL ;
}
2017-01-27 19:49:02 +00:00
}
2017-02-15 00:56:29 +00:00
2017-04-13 15:36:53 -06:00
// @todo load internal modules, call onload and onstartup
2017-02-15 00:56:29 +00:00
2017-04-04 12:32:01 -06:00
if ( ks_thread_create_ex ( & bh - > worker_thread ,
blade_handle_worker_thread ,
bh ,
KS_THREAD_FLAG_DEFAULT ,
KS_THREAD_DEFAULT_STACK ,
KS_PRI_NORMAL ,
bh - > pool ) ! = KS_STATUS_SUCCESS ) {
// @todo error logging
return KS_STATUS_FAIL ;
}
2017-01-27 19:49:02 +00:00
return KS_STATUS_SUCCESS ;
2017-01-09 13:19:14 +00:00
}
2017-01-27 19:49:02 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_shutdown ( blade_handle_t * bh )
2017-01-09 13:19:14 +00:00
{
2017-02-21 16:37:50 +00:00
ks_hash_iterator_t * it = NULL ;
2017-01-09 13:19:14 +00:00
ks_assert ( bh ) ;
2017-01-30 05:02:58 +00:00
2017-04-04 11:00:17 -06:00
while ( ( it = ks_hash_first ( bh - > requests , KS_UNLOCKED ) ) ) {
2017-02-21 16:37:50 +00:00
void * key = NULL ;
blade_request_t * value = NULL ;
2017-02-28 23:37:19 +00:00
2017-02-21 16:37:50 +00:00
ks_hash_this ( it , ( const void * * ) & key , NULL , ( void * * ) & value ) ;
ks_hash_remove ( bh - > requests , key ) ;
2017-02-28 23:37:19 +00:00
2017-02-21 16:37:50 +00:00
blade_request_destroy ( & value ) ;
2017-04-13 15:36:53 -06:00
// @todo note to self, fix this when switching to auto cleanup, as hash invalidates iterator when removing
2017-02-21 16:37:50 +00:00
}
2017-02-28 23:37:19 +00:00
2017-02-23 23:01:22 +00:00
for ( it = ks_hash_first ( bh - > sessions , KS_UNLOCKED ) ; it ; it = ks_hash_next ( & it ) ) {
void * key = NULL ;
blade_session_t * value = NULL ;
2017-02-28 23:37:19 +00:00
2017-02-23 23:01:22 +00:00
ks_hash_this ( it , ( const void * * ) & key , NULL , ( void * * ) & value ) ;
2017-02-28 23:37:19 +00:00
2017-02-23 23:01:22 +00:00
blade_session_hangup ( value ) ;
}
while ( ks_hash_count ( bh - > sessions ) > 0 ) ks_sleep_ms ( 100 ) ;
2017-04-13 15:36:53 -06:00
// @todo unload internal modules, call onshutdown and onunload
2017-03-07 18:45:52 +00:00
2017-04-04 11:00:17 -06:00
while ( ( it = ks_hash_first ( bh - > events , KS_UNLOCKED ) ) ) {
2017-03-16 13:13:26 -05:00
void * key = NULL ;
blade_event_callback_t * value = NULL ;
ks_hash_this ( it , ( const void * * ) & key , NULL , ( void * * ) & value ) ;
blade_handle_event_unregister ( bh , ( const char * ) key ) ;
2017-04-13 15:36:53 -06:00
// @todo note to self, fix this when switching to auto cleanup, as hash invalidates iterator when removing
2017-03-16 13:13:26 -05:00
}
2017-04-04 11:00:17 -06:00
while ( ( it = ks_hash_first ( bh - > spaces , KS_UNLOCKED ) ) ) {
2017-03-07 18:45:52 +00:00
void * key = NULL ;
blade_space_t * value = NULL ;
ks_hash_this ( it , ( const void * * ) & key , NULL , ( void * * ) & value ) ;
blade_handle_space_unregister ( value ) ;
2017-04-13 15:36:53 -06:00
// @todo note to self, fix this when switching to auto cleanup, as hash invalidates iterator when removing
2017-03-07 18:45:52 +00:00
}
2017-02-15 00:56:29 +00:00
// @todo unload DSOs
2017-01-27 19:49:02 +00:00
if ( blade_handle_datastore_available ( bh ) ) blade_datastore_destroy ( & bh - > datastore ) ;
2017-02-15 00:56:29 +00:00
2017-04-05 10:42:58 -06:00
if ( bh - > worker_thread ) {
bh - > shutdown = KS_TRUE ;
ks_thread_join ( bh - > worker_thread ) ;
ks_pool_free ( bh - > pool , & bh - > worker_thread ) ;
bh - > shutdown = KS_FALSE ;
}
2017-01-27 19:49:02 +00:00
return KS_STATUS_SUCCESS ;
2017-01-09 13:19:14 +00:00
}
2017-02-09 17:08:07 +00:00
KS_DECLARE ( ks_pool_t * ) blade_handle_pool_get ( blade_handle_t * bh )
{
ks_assert ( bh ) ;
return bh - > pool ;
}
KS_DECLARE ( ks_thread_pool_t * ) blade_handle_tpool_get ( blade_handle_t * bh )
{
ks_assert ( bh ) ;
return bh - > tpool ;
}
2017-02-14 19:04:48 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_transport_register ( blade_handle_t * bh , blade_module_t * bm , const char * name , blade_transport_callbacks_t * callbacks )
2017-02-13 19:07:33 +00:00
{
2017-02-14 19:04:48 +00:00
blade_handle_transport_registration_t * bhtr = NULL ;
blade_handle_transport_registration_t * bhtr_old = NULL ;
2017-02-28 23:37:19 +00:00
2017-02-13 19:07:33 +00:00
ks_assert ( bh ) ;
2017-02-14 19:04:48 +00:00
ks_assert ( bm ) ;
ks_assert ( name ) ;
2017-02-13 19:07:33 +00:00
ks_assert ( callbacks ) ;
2017-02-21 16:37:50 +00:00
// @todo reduce blade_handle_t parameter, pull from blade_module_t parameter
2017-02-14 19:04:48 +00:00
blade_handle_transport_registration_create ( & bhtr , bh - > pool , bm , callbacks ) ;
ks_assert ( bhtr ) ;
2017-02-13 19:07:33 +00:00
ks_hash_write_lock ( bh - > transports ) ;
2017-02-14 19:04:48 +00:00
bhtr_old = ks_hash_search ( bh - > transports , ( void * ) name , KS_UNLOCKED ) ;
if ( bhtr_old ) ks_hash_remove ( bh - > transports , ( void * ) name ) ;
ks_hash_insert ( bh - > transports , ( void * ) name , bhtr ) ;
2017-02-13 19:07:33 +00:00
ks_hash_write_unlock ( bh - > transports ) ;
2017-02-14 19:04:48 +00:00
if ( bhtr_old ) blade_handle_transport_registration_destroy ( & bhtr_old ) ;
ks_log ( KS_LOG_DEBUG , " Transport Registered: %s \n " , name ) ;
2017-02-13 19:07:33 +00:00
return KS_STATUS_SUCCESS ;
}
2017-02-14 19:04:48 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_transport_unregister ( blade_handle_t * bh , const char * name )
2017-02-13 19:07:33 +00:00
{
2017-02-14 19:04:48 +00:00
blade_handle_transport_registration_t * bhtr = NULL ;
2017-02-13 19:07:33 +00:00
ks_assert ( bh ) ;
2017-02-14 19:04:48 +00:00
ks_assert ( name ) ;
2017-02-13 19:07:33 +00:00
ks_hash_write_lock ( bh - > transports ) ;
2017-02-14 19:04:48 +00:00
bhtr = ks_hash_search ( bh - > transports , ( void * ) name , KS_UNLOCKED ) ;
if ( bhtr ) ks_hash_remove ( bh - > transports , ( void * ) name ) ;
2017-02-13 19:07:33 +00:00
ks_hash_write_unlock ( bh - > transports ) ;
2017-03-07 18:45:52 +00:00
if ( bhtr ) {
blade_handle_transport_registration_destroy ( & bhtr ) ;
ks_log ( KS_LOG_DEBUG , " Transport Unregistered: %s \n " , name ) ;
}
2017-02-14 19:04:48 +00:00
2017-02-13 19:07:33 +00:00
return KS_STATUS_SUCCESS ;
}
2017-03-07 18:45:52 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_space_register ( blade_space_t * bs )
{
blade_handle_t * bh = NULL ;
const char * path = NULL ;
blade_space_t * bs_old = NULL ;
ks_assert ( bs ) ;
bh = blade_space_handle_get ( bs ) ;
ks_assert ( bh ) ;
path = blade_space_path_get ( bs ) ;
ks_assert ( path ) ;
ks_hash_write_lock ( bh - > spaces ) ;
bs_old = ks_hash_search ( bh - > spaces , ( void * ) path , KS_UNLOCKED ) ;
if ( bs_old ) ks_hash_remove ( bh - > spaces , ( void * ) path ) ;
ks_hash_insert ( bh - > spaces , ( void * ) path , bs ) ;
ks_hash_write_unlock ( bh - > spaces ) ;
if ( bs_old ) blade_space_destroy ( & bs_old ) ;
ks_log ( KS_LOG_DEBUG , " Space Registered: %s \n " , path ) ;
return KS_STATUS_SUCCESS ;
}
KS_DECLARE ( ks_status_t ) blade_handle_space_unregister ( blade_space_t * bs )
{
blade_handle_t * bh = NULL ;
const char * path = NULL ;
ks_assert ( bs ) ;
bh = blade_space_handle_get ( bs ) ;
ks_assert ( bh ) ;
path = blade_space_path_get ( bs ) ;
ks_assert ( path ) ;
ks_hash_write_lock ( bh - > spaces ) ;
2017-04-04 11:00:17 -06:00
ks_hash_remove ( bh - > spaces , ( void * ) path ) ;
2017-03-07 18:45:52 +00:00
ks_hash_write_unlock ( bh - > spaces ) ;
if ( bs ) {
ks_log ( KS_LOG_DEBUG , " Space Unregistered: %s \n " , path ) ;
2017-04-04 11:00:17 -06:00
blade_space_destroy ( & bs ) ;
2017-03-07 18:45:52 +00:00
}
return KS_STATUS_SUCCESS ;
}
KS_DECLARE ( blade_space_t * ) blade_handle_space_lookup ( blade_handle_t * bh , const char * path )
{
blade_space_t * bs = NULL ;
ks_assert ( bh ) ;
ks_assert ( path ) ;
ks_hash_read_lock ( bh - > spaces ) ;
bs = ks_hash_search ( bh - > spaces , ( void * ) path , KS_UNLOCKED ) ;
ks_hash_read_unlock ( bh - > spaces ) ;
return bs ;
}
2017-03-16 13:13:26 -05:00
KS_DECLARE ( ks_status_t ) blade_handle_event_register ( blade_handle_t * bh , const char * event , blade_event_callback_t callback )
{
ks_assert ( bh ) ;
ks_assert ( event ) ;
ks_assert ( callback ) ;
ks_hash_write_lock ( bh - > events ) ;
ks_hash_insert ( bh - > events , ( void * ) event , ( void * ) ( intptr_t ) callback ) ;
ks_hash_write_unlock ( bh - > events ) ;
ks_log ( KS_LOG_DEBUG , " Event Registered: %s \n " , event ) ;
return KS_STATUS_SUCCESS ;
}
KS_DECLARE ( ks_status_t ) blade_handle_event_unregister ( blade_handle_t * bh , const char * event )
{
ks_bool_t removed = KS_FALSE ;
ks_assert ( bh ) ;
ks_assert ( event ) ;
ks_hash_write_lock ( bh - > events ) ;
if ( ks_hash_remove ( bh - > events , ( void * ) event ) ) removed = KS_TRUE ;
ks_hash_write_unlock ( bh - > events ) ;
if ( removed ) {
ks_log ( KS_LOG_DEBUG , " Event Unregistered: %s \n " , event ) ;
}
return KS_STATUS_SUCCESS ;
}
KS_DECLARE ( blade_event_callback_t ) blade_handle_event_lookup ( blade_handle_t * bh , const char * event )
{
blade_event_callback_t callback = NULL ;
ks_assert ( bh ) ;
ks_assert ( event ) ;
ks_hash_read_lock ( bh - > events ) ;
callback = ( blade_event_callback_t ) ( intptr_t ) ks_hash_search ( bh - > events , ( void * ) event , KS_UNLOCKED ) ;
ks_hash_read_unlock ( bh - > events ) ;
return callback ;
}
2017-02-23 23:01:22 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_connect ( blade_handle_t * bh , blade_connection_t * * bcP , blade_identity_t * target , const char * session_id )
2017-02-13 19:07:33 +00:00
{
2017-02-14 19:04:48 +00:00
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_transport_registration_t * bhtr = NULL ;
const char * tname = NULL ;
2017-02-28 23:37:19 +00:00
2017-02-13 19:07:33 +00:00
ks_assert ( bh ) ;
ks_assert ( target ) ;
2017-02-15 00:56:29 +00:00
// @todo this should take a callback, and push this to a queue to be processed async from another thread on the handle
// which will allow the onconnect callback to block while doing things like DNS lookups without having unknown
// impact depending on the caller thread
2017-02-13 19:07:33 +00:00
ks_hash_read_lock ( bh - > transports ) ;
2017-02-15 00:56:29 +00:00
tname = blade_identity_parameter_get ( target , " transport " ) ;
2017-02-14 19:04:48 +00:00
if ( tname ) {
bhtr = ks_hash_search ( bh - > transports , ( void * ) tname , KS_UNLOCKED ) ;
if ( ! bhtr ) {
// @todo error logging, target has an explicit transport that is not available in the local transports registry
// discuss later whether this scenario should still attempt other transports when target is explicit
2017-02-15 00:56:29 +00:00
// @note discussions indicate that by default messages should favor relaying through a master service, unless
// an existing direct connection already exists to the target (which if the target is the master node, then there is
// no conflict of proper routing). This also applies to routing for identities which relate to groups, relaying should
// most often occur through a master service, however there may be scenarios that exist where an existing session
// exists dedicated to faster delivery for a group (IE, through an ampq cluster directly, such as master services
// syncing with each other through a pub/sub). There is also the potential that instead of a separate session, the
// current session with a master service may be able to have another connection attached which represents access through
// amqp, which in turn acts as a preferred router for only group identities
// This information does not directly apply to connecting, but should be noted for the next level up where you simply
// send a message which will not actually connect, only check for existing sessions for the target and master service
// @note relaying by master services should take a slightly different path, when they receive something not for the
// master service itself, it should relay this on to all other master services, which in turn all including original
// receiver pass on to any sessions matching an identity that is part of the group, alternatively they can use a pub/sub
// like amqp to relay between the master services more efficiently than using the websocket to send every master service
// session the message individually
2017-02-14 19:04:48 +00:00
}
} else {
for ( ks_hash_iterator_t * it = ks_hash_first ( bh - > transports , KS_UNLOCKED ) ; it ; it = ks_hash_next ( & it ) ) {
// @todo use onrank (or replace with whatever method is used for determining what transport to use) and keep highest ranked callbacks
}
}
ks_hash_read_unlock ( bh - > transports ) ;
2017-01-30 05:02:58 +00:00
2017-02-14 19:04:48 +00:00
// @todo need to be able to get to the blade_module_t from the callbacks, may require envelope around registration of callbacks to include module
// this is required because onconnect transport callback needs to be able to get back to the module data to create the connection being returned
2017-02-23 23:01:22 +00:00
if ( bhtr ) ret = bhtr - > callbacks - > onconnect ( bcP , bhtr - > module , target , session_id ) ;
2017-02-14 19:04:48 +00:00
else ret = KS_STATUS_FAIL ;
2017-01-30 05:02:58 +00:00
2017-02-14 19:04:48 +00:00
return ret ;
2017-01-30 05:02:58 +00:00
}
2017-02-21 16:37:50 +00:00
KS_DECLARE ( blade_connection_t * ) blade_handle_connections_get ( blade_handle_t * bh , const char * cid )
{
blade_connection_t * bc = NULL ;
ks_assert ( bh ) ;
ks_assert ( cid ) ;
ks_hash_read_lock ( bh - > connections ) ;
bc = ks_hash_search ( bh - > connections , ( void * ) cid , KS_UNLOCKED ) ;
if ( bc & & blade_connection_read_lock ( bc , KS_FALSE ) ! = KS_STATUS_SUCCESS ) bc = NULL ;
ks_hash_read_unlock ( bh - > connections ) ;
return bc ;
}
KS_DECLARE ( ks_status_t ) blade_handle_connections_add ( blade_connection_t * bc )
{
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_t * bh = NULL ;
ks_assert ( bc ) ;
bh = blade_connection_handle_get ( bc ) ;
ks_assert ( bh ) ;
ks_hash_write_lock ( bh - > connections ) ;
ret = ks_hash_insert ( bh - > connections , ( void * ) blade_connection_id_get ( bc ) , bc ) ;
ks_hash_write_unlock ( bh - > connections ) ;
return ret ;
}
KS_DECLARE ( ks_status_t ) blade_handle_connections_remove ( blade_connection_t * bc )
{
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_t * bh = NULL ;
ks_assert ( bc ) ;
bh = blade_connection_handle_get ( bc ) ;
ks_assert ( bh ) ;
blade_connection_write_lock ( bc , KS_TRUE ) ;
ks_hash_write_lock ( bh - > connections ) ;
if ( ks_hash_remove ( bh - > connections , ( void * ) blade_connection_id_get ( bc ) ) = = NULL ) ret = KS_STATUS_FAIL ;
ks_hash_write_unlock ( bh - > connections ) ;
blade_connection_write_unlock ( bc ) ;
2017-03-16 13:13:26 -05:00
// @todo call bh->connection_callbacks
2017-02-21 16:37:50 +00:00
return ret ;
}
2017-02-21 21:20:44 +00:00
KS_DECLARE ( blade_session_t * ) blade_handle_sessions_get ( blade_handle_t * bh , const char * sid )
{
blade_session_t * bs = NULL ;
2017-02-23 23:01:22 +00:00
ks_assert ( bh ) ;
2017-02-21 21:20:44 +00:00
ks_assert ( sid ) ;
2017-04-17 11:10:05 -06:00
// @todo consider using blade_session_t via reference counting, rather than locking a mutex to simulate a reference count to halt cleanups while in use
// using actual reference counting would mean that mutexes would not need to be held locked when looking up a session by id just to prevent cleanup,
// instead cleanup would automatically occur when the last reference is actually removed (which SHOULD be at the end of the state machine thread),
// which is safer than another thread potentially waiting on the write lock to release while it's being destroyed, or external code forgetting to unlock
// then use short lived mutex or rwl for accessing the content of the session while it is referenced
// this approach should also be used for blade_connection_t, which has a similar threaded state machine
2017-02-21 21:20:44 +00:00
ks_hash_read_lock ( bh - > sessions ) ;
bs = ks_hash_search ( bh - > sessions , ( void * ) sid , KS_UNLOCKED ) ;
if ( bs & & blade_session_read_lock ( bs , KS_FALSE ) ! = KS_STATUS_SUCCESS ) bs = NULL ;
ks_hash_read_unlock ( bh - > sessions ) ;
return bs ;
}
KS_DECLARE ( ks_status_t ) blade_handle_sessions_add ( blade_session_t * bs )
{
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_t * bh = NULL ;
ks_assert ( bs ) ;
bh = blade_session_handle_get ( bs ) ;
ks_assert ( bh ) ;
ks_hash_write_lock ( bh - > sessions ) ;
ret = ks_hash_insert ( bh - > sessions , ( void * ) blade_session_id_get ( bs ) , bs ) ;
ks_hash_write_unlock ( bh - > sessions ) ;
return ret ;
}
KS_DECLARE ( ks_status_t ) blade_handle_sessions_remove ( blade_session_t * bs )
{
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_t * bh = NULL ;
ks_assert ( bs ) ;
bh = blade_session_handle_get ( bs ) ;
ks_assert ( bh ) ;
blade_session_write_lock ( bs , KS_TRUE ) ;
ks_hash_write_lock ( bh - > sessions ) ;
if ( ks_hash_remove ( bh - > sessions , ( void * ) blade_session_id_get ( bs ) ) = = NULL ) ret = KS_STATUS_FAIL ;
ks_hash_write_unlock ( bh - > sessions ) ;
blade_session_write_unlock ( bs ) ;
return ret ;
}
2017-04-14 08:59:58 -06:00
KS_DECLARE ( void ) blade_handle_sessions_send ( blade_handle_t * bh , ks_list_t * sessions , const char * exclude , cJSON * json )
2017-03-16 13:13:26 -05:00
{
blade_session_t * bs = NULL ;
ks_assert ( bh ) ;
ks_assert ( sessions ) ;
ks_assert ( json ) ;
2017-04-14 08:59:58 -06:00
ks_list_iterator_start ( sessions ) ;
while ( ks_list_iterator_hasnext ( sessions ) ) {
const char * sessionid = ks_list_iterator_next ( sessions ) ;
2017-03-16 13:13:26 -05:00
if ( exclude & & ! strcmp ( exclude , sessionid ) ) continue ;
bs = blade_handle_sessions_get ( bh , sessionid ) ;
if ( ! bs ) {
ks_log ( KS_LOG_DEBUG , " This should not happen \n " ) ;
continue ;
}
blade_session_send ( bs , json , NULL ) ;
blade_session_read_unlock ( bs ) ;
}
2017-04-14 08:59:58 -06:00
ks_list_iterator_stop ( sessions ) ;
2017-03-16 13:13:26 -05:00
}
KS_DECLARE ( ks_status_t ) blade_handle_session_state_callback_register ( blade_handle_t * bh , void * data , blade_session_state_callback_t callback , const char * * id )
{
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_session_state_callback_registration_t * bhsscr = NULL ;
ks_assert ( bh ) ;
ks_assert ( callback ) ;
ks_assert ( id ) ;
blade_handle_session_state_callback_registration_create ( & bhsscr , blade_handle_pool_get ( bh ) , data , callback ) ;
ks_assert ( bhsscr ) ;
ks_hash_write_lock ( bh - > session_state_callbacks ) ;
ret = ks_hash_insert ( bh - > session_state_callbacks , ( void * ) bhsscr - > id , bhsscr ) ;
ks_hash_write_unlock ( bh - > session_state_callbacks ) ;
* id = bhsscr - > id ;
return ret ;
}
KS_DECLARE ( ks_status_t ) blade_handle_session_state_callback_unregister ( blade_handle_t * bh , const char * id )
{
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_session_state_callback_registration_t * bhsscr = NULL ;
ks_assert ( bh ) ;
ks_assert ( id ) ;
ks_hash_write_lock ( bh - > session_state_callbacks ) ;
bhsscr = ( blade_handle_session_state_callback_registration_t * ) ks_hash_remove ( bh - > session_state_callbacks , ( void * ) id ) ;
if ( ! bhsscr ) ret = KS_STATUS_FAIL ;
2017-04-17 11:10:05 -06:00
ks_hash_write_unlock ( bh - > session_state_callbacks ) ;
2017-03-16 13:13:26 -05:00
if ( bhsscr ) blade_handle_session_state_callback_registration_destroy ( & bhsscr ) ;
return ret ;
}
KS_DECLARE ( void ) blade_handle_session_state_callbacks_execute ( blade_session_t * bs , blade_session_state_condition_t condition )
{
blade_handle_t * bh = NULL ;
ks_hash_iterator_t * it = NULL ;
ks_assert ( bs ) ;
if ( blade_session_state_get ( bs ) = = BLADE_SESSION_STATE_NONE ) return ;
bh = blade_session_handle_get ( bs ) ;
ks_assert ( bh ) ;
ks_hash_read_lock ( bh - > session_state_callbacks ) ;
for ( it = ks_hash_first ( bh - > session_state_callbacks , KS_UNLOCKED ) ; it ; it = ks_hash_next ( & it ) ) {
void * key = NULL ;
blade_handle_session_state_callback_registration_t * value = NULL ;
ks_hash_this ( it , ( const void * * ) & key , NULL , ( void * * ) & value ) ;
value - > callback ( bs , condition , value - > data ) ;
}
ks_hash_read_unlock ( bh - > session_state_callbacks ) ;
}
2017-02-21 21:20:44 +00:00
2017-02-28 23:37:19 +00:00
KS_DECLARE ( blade_request_t * ) blade_handle_requests_get ( blade_handle_t * bh , const char * mid )
{
blade_request_t * br = NULL ;
ks_assert ( bh ) ;
ks_assert ( mid ) ;
ks_hash_read_lock ( bh - > requests ) ;
br = ks_hash_search ( bh - > requests , ( void * ) mid , KS_UNLOCKED ) ;
ks_hash_read_unlock ( bh - > requests ) ;
return br ;
}
KS_DECLARE ( ks_status_t ) blade_handle_requests_add ( blade_request_t * br )
{
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_t * bh = NULL ;
ks_assert ( br ) ;
bh = br - > handle ;
ks_assert ( bh ) ;
ks_hash_write_lock ( bh - > requests ) ;
ret = ks_hash_insert ( bh - > requests , ( void * ) br - > message_id , br ) ;
ks_hash_write_unlock ( bh - > requests ) ;
return ret ;
}
KS_DECLARE ( ks_status_t ) blade_handle_requests_remove ( blade_request_t * br )
{
ks_status_t ret = KS_STATUS_SUCCESS ;
blade_handle_t * bh = NULL ;
ks_assert ( br ) ;
bh = br - > handle ;
ks_assert ( bh ) ;
ks_hash_write_lock ( bh - > requests ) ;
if ( ks_hash_remove ( bh - > requests , ( void * ) br - > message_id ) = = NULL ) ret = KS_STATUS_FAIL ;
ks_hash_write_unlock ( bh - > requests ) ;
return ret ;
}
2017-01-16 17:33:41 +00:00
2017-01-30 05:02:58 +00:00
KS_DECLARE ( ks_bool_t ) blade_handle_datastore_available ( blade_handle_t * bh )
2017-01-16 17:33:41 +00:00
{
ks_assert ( bh ) ;
2017-01-30 05:02:58 +00:00
return bh - > datastore ! = NULL ;
2017-01-09 13:19:14 +00:00
}
2016-11-28 16:35:09 -05:00
2017-01-17 18:20:43 +00:00
KS_DECLARE ( ks_status_t ) blade_handle_datastore_store ( blade_handle_t * bh , const void * key , int32_t key_length , const void * data , int64_t data_length )
{
ks_assert ( bh ) ;
ks_assert ( key ) ;
ks_assert ( key_length > 0 ) ;
ks_assert ( data ) ;
ks_assert ( data_length > 0 ) ;
2017-01-27 19:49:02 +00:00
if ( ! blade_handle_datastore_available ( bh ) ) return KS_STATUS_INACTIVE ;
2017-02-28 23:37:19 +00:00
2017-01-17 18:20:43 +00:00
return blade_datastore_store ( bh - > datastore , key , key_length , data , data_length ) ;
}
KS_DECLARE ( ks_status_t ) blade_handle_datastore_fetch ( blade_handle_t * bh ,
blade_datastore_fetch_callback_t callback ,
const void * key ,
int32_t key_length ,
void * userdata )
{
ks_assert ( bh ) ;
ks_assert ( callback ) ;
ks_assert ( key ) ;
ks_assert ( key_length > 0 ) ;
2017-02-28 23:37:19 +00:00
2017-01-27 19:49:02 +00:00
if ( ! blade_handle_datastore_available ( bh ) ) return KS_STATUS_INACTIVE ;
2017-02-28 23:37:19 +00:00
2017-01-17 18:20:43 +00:00
return blade_datastore_fetch ( bh - > datastore , callback , key , key_length , userdata ) ;
}
2017-04-04 12:32:01 -06:00
void * blade_handle_worker_thread ( ks_thread_t * thread , void * data )
{
blade_handle_t * bh = NULL ;
blade_connection_t * bc = NULL ;
2017-04-13 15:36:53 -06:00
//blade_session_t *bs = NULL;
2017-04-04 12:32:01 -06:00
ks_hash_iterator_t * it = NULL ;
ks_q_t * cleanup = NULL ;
ks_assert ( thread ) ;
ks_assert ( data ) ;
bh = ( blade_handle_t * ) data ;
ks_q_create ( & cleanup , bh - > pool , 0 ) ;
ks_assert ( cleanup ) ;
while ( ! bh - > shutdown ) {
ks_hash_write_lock ( bh - > connections ) ;
for ( it = ks_hash_first ( bh - > connections , KS_UNLOCKED ) ; it ; it = ks_hash_next ( & it ) ) {
void * key = NULL ;
blade_connection_t * value = NULL ;
ks_hash_this ( it , ( const void * * ) & key , NULL , ( void * * ) & value ) ;
if ( blade_connection_state_get ( value ) = = BLADE_CONNECTION_STATE_CLEANUP ) ks_q_push ( cleanup , value ) ;
}
ks_hash_write_unlock ( bh - > connections ) ;
while ( ks_q_trypop ( cleanup , ( void * * ) & bc ) = = KS_STATUS_SUCCESS ) {
blade_handle_connections_remove ( bc ) ;
blade_connection_destroy ( & bc ) ;
}
2017-04-13 15:36:53 -06:00
//ks_hash_write_lock(bh->sessions);
//for (it = ks_hash_first(bh->sessions, KS_UNLOCKED); it; it = ks_hash_next(&it)) {
// void *key = NULL;
// blade_session_t *value = NULL;
2017-04-04 12:47:14 -06:00
2017-04-13 15:36:53 -06:00
// ks_hash_this(it, (const void **)&key, NULL, (void **)&value);
2017-04-04 12:47:14 -06:00
2017-04-13 15:36:53 -06:00
// if (blade_session_state_get(value) == BLADE_SESSION_STATE_CLEANUP) ks_q_push(cleanup, value);
//}
//ks_hash_write_unlock(bh->sessions);
2017-04-04 12:47:14 -06:00
2017-04-13 15:36:53 -06:00
//while (ks_q_trypop(cleanup, (void **)&bs) == KS_STATUS_SUCCESS) {
// blade_handle_sessions_remove(bs);
// blade_session_destroy(&bs);
//}
2017-04-04 12:47:14 -06:00
2017-04-04 12:32:01 -06:00
ks_sleep_ms ( 500 ) ;
}
return NULL ;
}
2016-11-28 16:35:09 -05:00
/* For Emacs:
* Local Variables :
* mode : c
* indent - tabs - mode : t
* tab - width : 4
* c - basic - offset : 4
* End :
* For VIM :
* vim : set softtabstop = 4 shiftwidth = 4 tabstop = 4 noet :
*/