2018-12-11 22:01:50 +01:00
|
|
|
package stream
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
2019-09-13 14:48:18 +02:00
|
|
|
"net"
|
2018-12-11 22:01:50 +01:00
|
|
|
"sync"
|
2019-09-13 14:48:18 +02:00
|
|
|
"sync/atomic"
|
2018-12-11 22:01:50 +01:00
|
|
|
"time"
|
|
|
|
|
2019-09-13 14:48:18 +02:00
|
|
|
"github.com/pkg/errors"
|
|
|
|
|
2024-10-18 19:21:17 +02:00
|
|
|
"github.com/zrepl/zrepl/internal/rpc/dataconn/heartbeatconn"
|
|
|
|
"github.com/zrepl/zrepl/internal/rpc/dataconn/timeoutconn"
|
2018-12-11 22:01:50 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
type Conn struct {
|
|
|
|
hc *heartbeatconn.Conn
|
|
|
|
|
|
|
|
// whether the per-conn readFrames goroutine completed
|
|
|
|
waitReadFramesDone chan struct{}
|
|
|
|
// filled by per-conn readFrames goroutine
|
|
|
|
frameReads chan readFrameResult
|
|
|
|
|
2019-09-13 14:48:18 +02:00
|
|
|
closeState closeState
|
|
|
|
|
2018-12-11 22:01:50 +01:00
|
|
|
// readMtx serializes read stream operations because we inherently only
|
|
|
|
// support a single stream at a time over hc.
|
2019-03-22 20:45:27 +01:00
|
|
|
readMtx sync.Mutex
|
|
|
|
readClean bool
|
2018-12-11 22:01:50 +01:00
|
|
|
|
|
|
|
// writeMtx serializes write stream operations because we inherently only
|
|
|
|
// support a single stream at a time over hc.
|
|
|
|
writeMtx sync.Mutex
|
|
|
|
writeClean bool
|
|
|
|
}
|
|
|
|
|
|
|
|
var readMessageSentinel = fmt.Errorf("read stream complete")
|
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
var errWriteStreamToErrorUnknownState = fmt.Errorf("dataconn read stream: connection is in unknown state")
|
2018-12-11 22:01:50 +01:00
|
|
|
|
|
|
|
func Wrap(nc timeoutconn.Wire, sendHeartbeatInterval, peerTimeout time.Duration) *Conn {
|
|
|
|
hc := heartbeatconn.Wrap(nc, sendHeartbeatInterval, peerTimeout)
|
|
|
|
conn := &Conn{
|
|
|
|
hc: hc, readClean: true, writeClean: true,
|
|
|
|
waitReadFramesDone: make(chan struct{}),
|
|
|
|
frameReads: make(chan readFrameResult, 5), // FIXME constant
|
|
|
|
}
|
|
|
|
go conn.readFrames()
|
|
|
|
return conn
|
|
|
|
}
|
|
|
|
|
|
|
|
func isConnCleanAfterRead(res *ReadStreamError) bool {
|
|
|
|
return res == nil || res.Kind == ReadStreamErrorKindSource || res.Kind == ReadStreamErrorKindStreamErrTrailerEncoding
|
|
|
|
}
|
|
|
|
|
|
|
|
func isConnCleanAfterWrite(err error) bool {
|
|
|
|
return err == nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Conn) readFrames() {
|
2019-09-13 14:48:18 +02:00
|
|
|
readFrames(c.frameReads, c.waitReadFramesDone, c.hc)
|
2018-12-11 22:01:50 +01:00
|
|
|
}
|
|
|
|
|
2019-09-13 14:48:18 +02:00
|
|
|
func (c *Conn) ReadStreamedMessage(ctx context.Context, maxSize uint32, frameType uint32) (_ []byte, err *ReadStreamError) {
|
|
|
|
|
|
|
|
// if we are closed while reading, return that as an error
|
|
|
|
if closeGuard, cse := c.closeState.RWEntry(); cse != nil {
|
|
|
|
return nil, &ReadStreamError{
|
|
|
|
Kind: ReadStreamErrorKindConn,
|
|
|
|
Err: cse,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
defer func(err **ReadStreamError) {
|
|
|
|
if closed := closeGuard.RWExit(); closed != nil {
|
|
|
|
*err = &ReadStreamError{
|
|
|
|
Kind: ReadStreamErrorKindConn,
|
|
|
|
Err: closed,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}(&err)
|
|
|
|
}
|
|
|
|
|
2018-12-11 22:01:50 +01:00
|
|
|
c.readMtx.Lock()
|
|
|
|
defer c.readMtx.Unlock()
|
|
|
|
if !c.readClean {
|
|
|
|
return nil, &ReadStreamError{
|
|
|
|
Kind: ReadStreamErrorKindConn,
|
|
|
|
Err: fmt.Errorf("dataconn read message: connection is in unknown state"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
r, w := io.Pipe()
|
|
|
|
var buf bytes.Buffer
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
lr := io.LimitReader(r, int64(maxSize))
|
|
|
|
if _, err := io.Copy(&buf, lr); err != nil && err != readMessageSentinel {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
}()
|
2019-09-13 14:48:18 +02:00
|
|
|
err = readStream(c.frameReads, c.hc, w, frameType)
|
2018-12-11 22:01:50 +01:00
|
|
|
c.readClean = isConnCleanAfterRead(err)
|
2019-03-22 20:45:27 +01:00
|
|
|
_ = w.CloseWithError(readMessageSentinel) // always returns nil
|
2018-12-11 22:01:50 +01:00
|
|
|
wg.Wait()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else {
|
|
|
|
return buf.Bytes(), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
type StreamReader struct {
|
|
|
|
*io.PipeReader
|
|
|
|
conn *Conn
|
|
|
|
closeConnOnClose bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *StreamReader) Close() error {
|
|
|
|
err := r.PipeReader.Close()
|
|
|
|
if r.closeConnOnClose {
|
|
|
|
r.conn.Close() // TODO error logging
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-12-11 22:01:50 +01:00
|
|
|
// WriteStreamTo reads a stream from Conn and writes it to w.
|
2020-04-10 21:58:28 +02:00
|
|
|
func (c *Conn) ReadStream(frameType uint32, closeConnOnClose bool) (_ *StreamReader, err error) {
|
2019-09-13 14:48:18 +02:00
|
|
|
|
|
|
|
// if we are closed while writing, return that as an error
|
|
|
|
if closeGuard, cse := c.closeState.RWEntry(); cse != nil {
|
2020-04-10 21:58:28 +02:00
|
|
|
return nil, cse
|
2019-09-13 14:48:18 +02:00
|
|
|
} else {
|
2020-04-10 21:58:28 +02:00
|
|
|
defer func(err *error) {
|
2019-09-13 14:48:18 +02:00
|
|
|
if closed := closeGuard.RWExit(); closed != nil {
|
|
|
|
*err = closed
|
|
|
|
}
|
|
|
|
}(&err)
|
|
|
|
}
|
|
|
|
|
2018-12-11 22:01:50 +01:00
|
|
|
c.readMtx.Lock()
|
|
|
|
if !c.readClean {
|
2021-01-23 21:22:25 +01:00
|
|
|
c.readMtx.Unlock()
|
2020-04-10 21:58:28 +02:00
|
|
|
return nil, errWriteStreamToErrorUnknownState
|
2018-12-11 22:01:50 +01:00
|
|
|
}
|
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
r, w := io.Pipe()
|
|
|
|
go func() {
|
|
|
|
defer c.readMtx.Unlock()
|
|
|
|
var err *ReadStreamError = readStream(c.frameReads, c.hc, w, frameType)
|
|
|
|
if err != nil {
|
|
|
|
_ = w.CloseWithError(err) // doc guarantees that error will always be nil
|
|
|
|
} else {
|
|
|
|
w.Close()
|
|
|
|
}
|
|
|
|
c.readClean = isConnCleanAfterRead(err)
|
|
|
|
}()
|
|
|
|
|
|
|
|
return &StreamReader{PipeReader: r, conn: c, closeConnOnClose: closeConnOnClose}, nil
|
2018-12-11 22:01:50 +01:00
|
|
|
}
|
|
|
|
|
2019-09-13 14:48:18 +02:00
|
|
|
func (c *Conn) WriteStreamedMessage(ctx context.Context, buf io.Reader, frameType uint32) (err error) {
|
|
|
|
|
|
|
|
// if we are closed while writing, return that as an error
|
|
|
|
if closeGuard, cse := c.closeState.RWEntry(); cse != nil {
|
|
|
|
return cse
|
|
|
|
} else {
|
|
|
|
defer func(err *error) {
|
|
|
|
if closed := closeGuard.RWExit(); closed != nil {
|
|
|
|
*err = closed
|
|
|
|
}
|
|
|
|
}(&err)
|
|
|
|
}
|
|
|
|
|
2018-12-11 22:01:50 +01:00
|
|
|
c.writeMtx.Lock()
|
|
|
|
defer c.writeMtx.Unlock()
|
|
|
|
if !c.writeClean {
|
|
|
|
return fmt.Errorf("dataconn write message: connection is in unknown state")
|
|
|
|
}
|
|
|
|
errBuf, errConn := writeStream(ctx, c.hc, buf, frameType)
|
|
|
|
if errBuf != nil {
|
|
|
|
panic(errBuf)
|
|
|
|
}
|
|
|
|
c.writeClean = isConnCleanAfterWrite(errConn)
|
|
|
|
return errConn
|
|
|
|
}
|
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
func (c *Conn) SendStream(ctx context.Context, stream io.ReadCloser, frameType uint32) (err error) {
|
2019-09-13 14:48:18 +02:00
|
|
|
|
|
|
|
// if we are closed while reading, return that as an error
|
|
|
|
if closeGuard, cse := c.closeState.RWEntry(); cse != nil {
|
|
|
|
return cse
|
|
|
|
} else {
|
|
|
|
defer func(err *error) {
|
|
|
|
if closed := closeGuard.RWExit(); closed != nil {
|
|
|
|
*err = closed
|
|
|
|
}
|
|
|
|
}(&err)
|
|
|
|
}
|
|
|
|
|
2018-12-11 22:01:50 +01:00
|
|
|
c.writeMtx.Lock()
|
|
|
|
defer c.writeMtx.Unlock()
|
|
|
|
if !c.writeClean {
|
|
|
|
return fmt.Errorf("dataconn send stream: connection is in unknown state")
|
|
|
|
}
|
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
errStream, errConn := writeStream(ctx, c.hc, stream, frameType)
|
2018-12-11 22:01:50 +01:00
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
c.writeClean = isConnCleanAfterWrite(errConn) // TODO correct?
|
2018-12-11 22:01:50 +01:00
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
if errStream != nil {
|
|
|
|
return errStream
|
|
|
|
} else if errConn != nil {
|
|
|
|
return errConn
|
2018-12-11 22:01:50 +01:00
|
|
|
}
|
2020-04-10 21:58:28 +02:00
|
|
|
// TODO combined error?
|
|
|
|
return nil
|
2018-12-11 22:01:50 +01:00
|
|
|
}
|
|
|
|
|
2019-09-13 14:48:18 +02:00
|
|
|
type closeState struct {
|
|
|
|
closeCount uint32
|
|
|
|
}
|
|
|
|
|
|
|
|
type closeStateErrConnectionClosed struct{}
|
|
|
|
|
|
|
|
var _ net.Error = (*closeStateErrConnectionClosed)(nil)
|
|
|
|
|
|
|
|
func (e *closeStateErrConnectionClosed) Error() string {
|
|
|
|
return "connection closed"
|
|
|
|
}
|
2022-10-23 18:18:07 +02:00
|
|
|
|
|
|
|
func (e *closeStateErrConnectionClosed) Timeout() bool { return false }
|
|
|
|
|
|
|
|
// This function is deprecated in net.Error and since this
|
|
|
|
// function is not involved in .Accept() code path, nothing
|
|
|
|
// really needs this method to be here.
|
2020-04-10 21:58:28 +02:00
|
|
|
func (e *closeStateErrConnectionClosed) Temporary() bool { return false }
|
2019-09-13 14:48:18 +02:00
|
|
|
|
|
|
|
func (s *closeState) CloseEntry() error {
|
|
|
|
firstCloser := atomic.AddUint32(&s.closeCount, 1) == 1
|
|
|
|
if !firstCloser {
|
|
|
|
return errors.New("duplicate close")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type closeStateEntry struct {
|
|
|
|
s *closeState
|
|
|
|
entryCount uint32
|
|
|
|
}
|
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
func (s *closeState) RWEntry() (e *closeStateEntry, err net.Error) {
|
2019-09-13 14:48:18 +02:00
|
|
|
entry := &closeStateEntry{s, atomic.LoadUint32(&s.closeCount)}
|
|
|
|
if entry.entryCount > 0 {
|
|
|
|
return nil, &closeStateErrConnectionClosed{}
|
|
|
|
}
|
|
|
|
return entry, nil
|
|
|
|
}
|
|
|
|
|
2020-04-10 21:58:28 +02:00
|
|
|
func (e *closeStateEntry) RWExit() net.Error {
|
2019-09-13 14:48:18 +02:00
|
|
|
if atomic.LoadUint32(&e.entryCount) == e.entryCount {
|
|
|
|
// no calls to Close() while running rw operation
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return &closeStateErrConnectionClosed{}
|
|
|
|
}
|
|
|
|
|
2018-12-11 22:01:50 +01:00
|
|
|
func (c *Conn) Close() error {
|
2019-09-13 14:48:18 +02:00
|
|
|
if err := c.closeState.CloseEntry(); err != nil {
|
|
|
|
return errors.Wrap(err, "stream conn close")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Shutdown c.hc, which will cause c.readFrames to close c.waitReadFramesDone
|
2018-12-11 22:01:50 +01:00
|
|
|
err := c.hc.Shutdown()
|
2019-09-13 14:48:18 +02:00
|
|
|
// However, c.readFrames may be blocking on a filled c.frameReads
|
|
|
|
// and since the connection is closed, nobody is going to read from it
|
2019-09-07 22:22:05 +02:00
|
|
|
for read := range c.frameReads {
|
|
|
|
debug("Conn.Close() draining queued read")
|
|
|
|
read.f.Buffer.Free()
|
|
|
|
}
|
2019-09-13 14:48:18 +02:00
|
|
|
// if we can't close, don't expect c.readFrames to terminate
|
|
|
|
// this might leak c.readFrames, but we can't do something useful at this point
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// shutdown didn't report errors, so c.readFrames will exit due to read error
|
|
|
|
// This behavior is the contract we have with c.hc.
|
|
|
|
// If that contract is broken, this read will block indefinitely and
|
|
|
|
// cause an easily diagnosable goroutine leak (of this goroutine)
|
|
|
|
<-c.waitReadFramesDone
|
|
|
|
return nil
|
2018-12-11 22:01:50 +01:00
|
|
|
}
|