forked from envoyproxy/envoy
-
Notifications
You must be signed in to change notification settings - Fork 0
/
hot_restarting_base.cc
280 lines (244 loc) · 12.2 KB
/
hot_restarting_base.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
#include "source/server/hot_restarting_base.h"
#include "source/common/api/os_sys_calls_impl.h"
#include "source/common/common/mem_block_builder.h"
#include "source/common/common/safe_memcpy.h"
#include "source/common/common/utility.h"
#include "source/common/network/address_impl.h"
#include "source/common/stats/utility.h"
namespace Envoy {
namespace Server {
using HotRestartMessage = envoy::HotRestartMessage;
static constexpr uint64_t MaxSendmsgSize = 4096;
static constexpr absl::Duration CONNECTION_REFUSED_RETRY_DELAY = absl::Seconds(1);
static constexpr int SENDMSG_MAX_RETRIES = 10;
HotRestartingBase::~HotRestartingBase() {
if (my_domain_socket_ != -1) {
Api::OsSysCalls& os_sys_calls = Api::OsSysCallsSingleton::get();
Api::SysCallIntResult result = os_sys_calls.close(my_domain_socket_);
ASSERT(result.return_value_ == 0);
}
}
void HotRestartingBase::initDomainSocketAddress(sockaddr_un* address) {
memset(address, 0, sizeof(*address));
address->sun_family = AF_UNIX;
}
sockaddr_un HotRestartingBase::createDomainSocketAddress(uint64_t id, const std::string& role,
const std::string& socket_path,
mode_t socket_mode) {
// Right now we only allow a maximum of 3 concurrent envoy processes to be running. When the third
// starts up it will kill the oldest parent.
static constexpr uint64_t MaxConcurrentProcesses = 3;
id = id % MaxConcurrentProcesses;
sockaddr_un address;
initDomainSocketAddress(&address);
Network::Address::PipeInstance addr(fmt::format(socket_path + "_{}_{}", role, base_id_ + id),
socket_mode, nullptr);
safeMemcpy(&address, &(addr.getSockAddr()));
fchmod(my_domain_socket_, socket_mode);
return address;
}
void HotRestartingBase::bindDomainSocket(uint64_t id, const std::string& role,
const std::string& socket_path, mode_t socket_mode) {
Api::OsSysCalls& os_sys_calls = Api::OsSysCallsSingleton::get();
// This actually creates the socket and binds it. We use the socket in datagram mode so we can
// easily read single messages.
my_domain_socket_ = socket(AF_UNIX, SOCK_DGRAM | SOCK_NONBLOCK, 0);
sockaddr_un address = createDomainSocketAddress(id, role, socket_path, socket_mode);
unlink(address.sun_path);
Api::SysCallIntResult result =
os_sys_calls.bind(my_domain_socket_, reinterpret_cast<sockaddr*>(&address), sizeof(address));
if (result.return_value_ != 0) {
const auto msg = fmt::format(
"unable to bind domain socket with base_id={}, id={}, errno={} (see --base-id option)",
base_id_, id, result.errno_);
if (result.errno_ == SOCKET_ERROR_ADDR_IN_USE) {
throw HotRestartDomainSocketInUseException(msg);
}
throw EnvoyException(msg);
}
}
void HotRestartingBase::sendHotRestartMessage(sockaddr_un& address,
const HotRestartMessage& proto) {
Api::OsSysCalls& os_sys_calls = Api::OsSysCallsSingleton::get();
const uint64_t serialized_size = proto.ByteSizeLong();
const uint64_t total_size = sizeof(uint64_t) + serialized_size;
// Fill with uint64_t 'length' followed by the serialized HotRestartMessage.
std::vector<uint8_t> send_buf;
send_buf.resize(total_size);
*reinterpret_cast<uint64_t*>(send_buf.data()) = htobe64(serialized_size);
RELEASE_ASSERT(proto.SerializeWithCachedSizesToArray(send_buf.data() + sizeof(uint64_t)),
"failed to serialize a HotRestartMessage");
RELEASE_ASSERT(fcntl(my_domain_socket_, F_SETFL, 0) != -1,
fmt::format("Set domain socket blocking failed, errno = {}", errno));
uint8_t* next_byte_to_send = send_buf.data();
uint64_t sent = 0;
while (sent < total_size) {
const uint64_t cur_chunk_size = std::min(MaxSendmsgSize, total_size - sent);
iovec iov[1];
iov[0].iov_base = next_byte_to_send;
iov[0].iov_len = cur_chunk_size;
next_byte_to_send += cur_chunk_size;
sent += cur_chunk_size;
msghdr message;
memset(&message, 0, sizeof(message));
message.msg_name = &address;
message.msg_namelen = sizeof(address);
message.msg_iov = iov;
message.msg_iovlen = 1;
// Control data stuff, only relevant for the fd passing done with PassListenSocketReply.
uint8_t control_buffer[CMSG_SPACE(sizeof(int))];
if (replyIsExpectedType(&proto, HotRestartMessage::Reply::kPassListenSocket) &&
proto.reply().pass_listen_socket().fd() != -1) {
memset(control_buffer, 0, CMSG_SPACE(sizeof(int)));
message.msg_control = control_buffer;
message.msg_controllen = CMSG_SPACE(sizeof(int));
cmsghdr* control_message = CMSG_FIRSTHDR(&message);
control_message->cmsg_level = SOL_SOCKET;
control_message->cmsg_type = SCM_RIGHTS;
control_message->cmsg_len = CMSG_LEN(sizeof(int));
*reinterpret_cast<int*>(CMSG_DATA(control_message)) = proto.reply().pass_listen_socket().fd();
ASSERT(sent == total_size, "an fd passing message was too long for one sendmsg().");
}
// A transient connection refused error probably means the old process is not ready.
int saved_errno = 0;
int rc = 0;
bool sent = false;
for (int i = 0; i < SENDMSG_MAX_RETRIES; i++) {
auto result = os_sys_calls.sendmsg(my_domain_socket_, &message, 0);
rc = result.return_value_;
saved_errno = result.errno_;
if (rc == static_cast<int>(cur_chunk_size)) {
sent = true;
break;
}
if (saved_errno == ECONNREFUSED) {
ENVOY_LOG(error, "hot restart sendmsg() connection refused, retrying");
absl::SleepFor(CONNECTION_REFUSED_RETRY_DELAY);
continue;
}
RELEASE_ASSERT(false, fmt::format("hot restart sendmsg() failed: returned {}, errno {}", rc,
saved_errno));
}
if (!sent) {
RELEASE_ASSERT(false, fmt::format("hot restart sendmsg() failed: returned {}, errno {}", rc,
saved_errno));
}
}
RELEASE_ASSERT(fcntl(my_domain_socket_, F_SETFL, O_NONBLOCK) != -1,
fmt::format("Set domain socket nonblocking failed, errno = {}", errno));
}
bool HotRestartingBase::replyIsExpectedType(const HotRestartMessage* proto,
HotRestartMessage::Reply::ReplyCase oneof_type) const {
return proto != nullptr && proto->requestreply_case() == HotRestartMessage::kReply &&
proto->reply().reply_case() == oneof_type;
}
// Pull the cloned fd, if present, out of the control data and write it into the
// PassListenSocketReply proto; the higher level code will see a listening fd that Just Works. We
// should only get control data in a PassListenSocketReply, it should only be the fd passing type,
// and there should only be one at a time. Crash on any other control data.
void HotRestartingBase::getPassedFdIfPresent(HotRestartMessage* out, msghdr* message) {
cmsghdr* cmsg = CMSG_FIRSTHDR(message);
if (cmsg != nullptr) {
RELEASE_ASSERT(cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_RIGHTS &&
replyIsExpectedType(out, HotRestartMessage::Reply::kPassListenSocket),
"recvmsg() came with control data when the message's purpose was not to pass a "
"file descriptor.");
out->mutable_reply()->mutable_pass_listen_socket()->set_fd(
*reinterpret_cast<int*>(CMSG_DATA(cmsg)));
RELEASE_ASSERT(CMSG_NXTHDR(message, cmsg) == nullptr,
"More than one control data on a single hot restart recvmsg().");
}
}
// While in use, recv_buf_ is always >= MaxSendmsgSize. In between messages, it is kept empty,
// to be grown back to MaxSendmsgSize at the start of the next message.
void HotRestartingBase::initRecvBufIfNewMessage() {
if (recv_buf_.empty()) {
ASSERT(cur_msg_recvd_bytes_ == 0);
ASSERT(!expected_proto_length_.has_value());
recv_buf_.resize(MaxSendmsgSize);
}
}
// Must only be called when recv_buf_ contains a full proto. Returns that proto, and resets all of
// our receive-buffering state back to empty, to await a new message.
std::unique_ptr<HotRestartMessage> HotRestartingBase::parseProtoAndResetState() {
auto ret = std::make_unique<HotRestartMessage>();
RELEASE_ASSERT(
ret->ParseFromArray(recv_buf_.data() + sizeof(uint64_t), expected_proto_length_.value()),
"failed to parse a HotRestartMessage.");
recv_buf_.resize(0);
cur_msg_recvd_bytes_ = 0;
expected_proto_length_.reset();
return ret;
}
std::unique_ptr<HotRestartMessage> HotRestartingBase::receiveHotRestartMessage(Blocking block) {
// By default the domain socket is non blocking. If we need to block, make it blocking first.
if (block == Blocking::Yes) {
RELEASE_ASSERT(fcntl(my_domain_socket_, F_SETFL, 0) != -1,
fmt::format("Set domain socket blocking failed, errno = {}", errno));
}
initRecvBufIfNewMessage();
iovec iov[1];
msghdr message;
uint8_t control_buffer[CMSG_SPACE(sizeof(int))];
std::unique_ptr<HotRestartMessage> ret = nullptr;
while (!ret) {
iov[0].iov_base = recv_buf_.data() + cur_msg_recvd_bytes_;
iov[0].iov_len = MaxSendmsgSize;
// We always setup to receive an FD even though most messages do not pass one.
memset(control_buffer, 0, CMSG_SPACE(sizeof(int)));
memset(&message, 0, sizeof(message));
message.msg_iov = iov;
message.msg_iovlen = 1;
message.msg_control = control_buffer;
message.msg_controllen = CMSG_SPACE(sizeof(int));
const int recvmsg_rc = recvmsg(my_domain_socket_, &message, 0);
if (block == Blocking::No && recvmsg_rc == -1 && errno == SOCKET_ERROR_AGAIN) {
return nullptr;
}
RELEASE_ASSERT(recvmsg_rc != -1, fmt::format("recvmsg() returned -1, errno = {}", errno));
RELEASE_ASSERT(message.msg_flags == 0,
fmt::format("recvmsg() left msg_flags = {}", message.msg_flags));
cur_msg_recvd_bytes_ += recvmsg_rc;
// If we don't already know 'length', we're at the start of a new length+protobuf message!
if (!expected_proto_length_.has_value()) {
// We are not ok with messages so fragmented that the length doesn't even come in one piece.
RELEASE_ASSERT(recvmsg_rc >= 8, "received a brokenly tiny message fragment.");
expected_proto_length_ = be64toh(*reinterpret_cast<uint64_t*>(recv_buf_.data()));
// Expand the buffer from its default 4096 if this message is going to be longer.
if (expected_proto_length_.value() > MaxSendmsgSize - sizeof(uint64_t)) {
recv_buf_.resize(expected_proto_length_.value() + sizeof(uint64_t));
cur_msg_recvd_bytes_ = recvmsg_rc;
}
}
// If we have received beyond the end of the current in-flight proto, then next is misaligned.
RELEASE_ASSERT(cur_msg_recvd_bytes_ <= sizeof(uint64_t) + expected_proto_length_.value(),
"received a length+protobuf message not aligned to start of sendmsg().");
if (cur_msg_recvd_bytes_ == sizeof(uint64_t) + expected_proto_length_.value()) {
ret = parseProtoAndResetState();
}
}
// Turn non-blocking back on if we made it blocking.
if (block == Blocking::Yes) {
RELEASE_ASSERT(fcntl(my_domain_socket_, F_SETFL, O_NONBLOCK) != -1,
fmt::format("Set domain socket nonblocking failed, errno = {}", errno));
}
getPassedFdIfPresent(ret.get(), &message);
return ret;
}
Stats::Gauge& HotRestartingBase::hotRestartGeneration(Stats::Scope& scope) {
// Track the hot-restart generation. Using gauge's accumulate semantics,
// the increments will be combined across hot-restart. This may be useful
// at some point, though the main motivation for this stat is to enable
// an integration test showing that dynamic stat-names can be coalesced
// across hot-restarts. There's no other reason this particular stat-name
// needs to be created dynamically.
//
// Note also, this stat cannot currently be represented as a counter due to
// the way stats get latched on sink update. See the comment in
// InstanceUtil::flushMetricsToSinks.
return Stats::Utility::gaugeFromElements(scope,
{Stats::DynamicName("server.hot_restart_generation")},
Stats::Gauge::ImportMode::Accumulate);
}
} // namespace Server
} // namespace Envoy