blob: 1260653bda4c6db83a2fcc5faa4939c9fbae4c21 [file] [log] [blame]
/** @file
A brief file description
@section license License
Licensed to the Apache Software Foundation (ASF) under one
or more contributor license agreements. See the NOTICE file
distributed with this work for additional information
regarding copyright ownership. The ASF licenses this file
to you under the Apache License, Version 2.0 (the
"License"); you may not use this file except in compliance
with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
/****************************************************************************
HttpServerSession.cc
Description:
****************************************************************************/
#include "tscore/ink_config.h"
#include "tscore/Allocator.h"
#include "HttpServerSession.h"
#include "HttpSessionManager.h"
#include "HttpSM.h"
static int64_t next_ss_id = (int64_t)0;
ClassAllocator<HttpServerSession> httpServerSessionAllocator("httpServerSessionAllocator");
void
HttpServerSession::destroy()
{
ink_release_assert(server_vc == nullptr);
ink_assert(read_buffer);
ink_assert(server_trans_stat == 0);
magic = HTTP_SS_MAGIC_DEAD;
if (read_buffer) {
free_MIOBuffer(read_buffer);
read_buffer = nullptr;
}
mutex.clear();
if (TS_SERVER_SESSION_SHARING_POOL_THREAD == sharing_pool) {
THREAD_FREE(this, httpServerSessionAllocator, this_thread());
} else {
httpServerSessionAllocator.free(this);
}
}
void
HttpServerSession::new_connection(NetVConnection *new_vc)
{
ink_assert(new_vc != nullptr);
server_vc = new_vc;
// Used to do e.g. mutex = new_vc->thread->mutex; when per-thread pools enabled
mutex = new_vc->mutex;
// Unique client session identifier.
con_id = ink_atomic_increment((int64_t *)(&next_ss_id), 1);
magic = HTTP_SS_MAGIC_ALIVE;
HTTP_SUM_GLOBAL_DYN_STAT(http_current_server_connections_stat, 1); // Update the true global stat
HTTP_INCREMENT_DYN_STAT(http_total_server_connections_stat);
// Check to see if we are limiting the number of connections
// per host
if (enable_origin_connection_limiting == true) {
if (connection_count == nullptr) {
connection_count = ConnectionCount::getInstance();
}
connection_count->incrementCount(get_server_ip(), hostname_hash, sharing_match);
ip_port_text_buffer addrbuf;
Debug("http_ss", "[%" PRId64 "] new connection, ip: %s, count: %u", con_id,
ats_ip_nptop(&get_server_ip().sa, addrbuf, sizeof(addrbuf)),
connection_count->getCount(get_server_ip(), hostname_hash, sharing_match));
}
#ifdef LAZY_BUF_ALLOC
read_buffer = new_empty_MIOBuffer(HTTP_SERVER_RESP_HDR_BUFFER_INDEX);
#else
read_buffer = new_MIOBuffer(HTTP_SERVER_RESP_HDR_BUFFER_INDEX);
#endif
buf_reader = read_buffer->alloc_reader();
Debug("http_ss", "[%" PRId64 "] session born, netvc %p", con_id, new_vc);
state = HSS_INIT;
new_vc->set_tcp_congestion_control(SERVER_SIDE);
}
VIO *
HttpServerSession::do_io_read(Continuation *c, int64_t nbytes, MIOBuffer *buf)
{
return server_vc->do_io_read(c, nbytes, buf);
}
VIO *
HttpServerSession::do_io_write(Continuation *c, int64_t nbytes, IOBufferReader *buf, bool owner)
{
return server_vc->do_io_write(c, nbytes, buf, owner);
}
void
HttpServerSession::do_io_shutdown(ShutdownHowTo_t howto)
{
server_vc->do_io_shutdown(howto);
}
void
HttpServerSession::do_io_close(int alerrno)
{
if (state == HSS_ACTIVE) {
HTTP_DECREMENT_DYN_STAT(http_current_server_transactions_stat);
this->server_trans_stat--;
}
Debug("http_ss", "[%" PRId64 "] session closing, netvc %p", con_id, server_vc);
HTTP_SUM_GLOBAL_DYN_STAT(http_current_server_connections_stat, -1); // Make sure to work on the global stat
HTTP_SUM_DYN_STAT(http_transactions_per_server_con, transact_count);
// Check to see if we are limiting the number of connections
// per host
if (enable_origin_connection_limiting == true) {
if (connection_count->getCount(get_server_ip(), hostname_hash, sharing_match) >= 0) {
connection_count->incrementCount(get_server_ip(), hostname_hash, sharing_match, -1);
ip_port_text_buffer addrbuf;
Debug("http_ss", "[%" PRId64 "] connection closed, ip: %s, count: %u", con_id,
ats_ip_nptop(&get_server_ip().sa, addrbuf, sizeof(addrbuf)),
connection_count->getCount(get_server_ip(), hostname_hash, sharing_match));
} else {
Error("[%" PRId64 "] number of connections should be greater than or equal to zero: %u", con_id,
connection_count->getCount(get_server_ip(), hostname_hash, sharing_match));
}
}
if (server_vc) {
server_vc->do_io_close(alerrno);
}
server_vc = nullptr;
if (to_parent_proxy) {
HTTP_DECREMENT_DYN_STAT(http_current_parent_proxy_connections_stat);
}
destroy();
}
void
HttpServerSession::reenable(VIO *vio)
{
server_vc->reenable(vio);
}
// void HttpServerSession::release()
//
// Releases the session for K-A reuse
//
void
HttpServerSession::release()
{
Debug("http_ss", "Releasing session, private_session=%d, sharing_match=%d", private_session, sharing_match);
// Set our state to KA for stat issues
state = HSS_KA_SHARED;
server_vc->control_flags.set_flags(0);
// Private sessions are never released back to the shared pool
if (private_session || TS_SERVER_SESSION_SHARING_MATCH_NONE == sharing_match) {
this->do_io_close();
return;
}
// Make sure the vios for the current SM are cleared
server_vc->do_io_read(nullptr, 0, nullptr);
server_vc->do_io_write(nullptr, 0, nullptr);
HSMresult_t r = httpSessionManager.release_session(this);
if (r == HSM_RETRY) {
// Session could not be put in the session manager
// due to lock contention
// FIX: should retry instead of closing
this->do_io_close();
} else {
// The session was successfully put into the session
// manager and it will manage it
// (Note: should never get HSM_NOT_FOUND here)
ink_assert(r == HSM_DONE);
}
}