stasis-bLSM/network.h
sears d9a8d6f998 apache2 license + headers
git-svn-id: svn+ssh://svn.corp.yahoo.com/yahoo/yrl/labs/pnuts/code/logstore@3593 8dad8b1f-cf64-0410-95b6-bcf113ffbcfe
2012-01-19 16:49:54 +00:00

381 lines
12 KiB
C++

/*
* network.h
*
* Copyright 2010-2012 Yahoo! Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* Created on: Feb 2, 2010
* Author: sears
*/
#ifndef NETWORK_H_
#define NETWORK_H_
#include <stdio.h>
#include <errno.h>
#include <stdint.h>
#include <string>
typedef unsigned char byte;
#include <cstring>
#include <assert.h>
typedef uint8_t network_op_t;
typedef uint32_t len_t ;
static const len_t DELETE = ((len_t)0) - 1;
#define LOGSTORE_NODELAY
#include <datatuple.h>
//server codes
static const network_op_t LOGSTORE_FIRST_RESPONSE_CODE = 1;
static const network_op_t LOGSTORE_RESPONSE_SUCCESS = 1;
static const network_op_t LOGSTORE_RESPONSE_FAIL = 2;
static const network_op_t LOGSTORE_RESPONSE_SENDING_TUPLES = 3;
static const network_op_t LOGSTORE_RESPONSE_RECEIVING_TUPLES = 4;
static const network_op_t LOGSTORE_LAST_RESPONSE_CODE = 4;
//client codes
static const network_op_t LOGSTORE_FIRST_REQUEST_CODE = 8;
static const network_op_t OP_INSERT = 8; // Create, Update, Delete
static const network_op_t OP_TEST_AND_SET = 9; // Create, Update, Delete iff the datatuple matches the second tuple passed in. (or if it doesn't exist, and isDelete() == true.
static const network_op_t OP_FIND = 10; // Read
static const network_op_t OP_SCAN = 11;
static const network_op_t OP_BULK_INSERT = 12;
static const network_op_t OP_DONE = 13; // Please close the connection.
static const network_op_t OP_FLUSH = 14;
static const network_op_t OP_SHUTDOWN = 15;
static const network_op_t OP_STAT_SPACE_USAGE = 16;
static const network_op_t OP_STAT_PERF_REPORT = 17;
static const network_op_t OP_STAT_HISTOGRAM = 18; // Return N approximately equal size partitions (including split points + cardinalities) N=1 estimates table cardinality.
static const network_op_t OP_DBG_DROP_DATABASE = 19;
static const network_op_t OP_DBG_BLOCKMAP = 20;
static const network_op_t OP_DBG_NOOP = 21;
static const network_op_t OP_DBG_SET_LOG_MODE = 22;
static const network_op_t LOGSTORE_LAST_REQUEST_CODE = 22;
//error codes
static const network_op_t LOGSTORE_FIRST_ERROR = 27;
static const network_op_t LOGSTORE_UNIMPLEMENTED_ERROR = 27;
static const network_op_t LOGSTORE_CONN_CLOSED_ERROR = 28; // Unexpected EOF
static const network_op_t LOGSTORE_SOCKET_ERROR = 29; // The OS returned an error.
static const network_op_t LOGSTORE_REMOTE_ERROR = 30; // The other side didn't like our request
static const network_op_t LOGSTORE_PROTOCOL_ERROR = 31; // The other side responeded with gibberish.
static const network_op_t LOGSTORE_LAST_ERROR = 31;
static const network_op_t OP_INVALID = 32;
typedef enum {
LOGSTORE_CLIENT_REQUEST,
LOGSTORE_SERVER_RESPONSE
} logstore_opcode_type;
#ifndef MYFREAD
#ifdef HAVE_FREAD_UNLOCKED
#define MYFREAD(a,b,c,d) fread_unlocked(a,b,c,d)
#define MYFWRITE(a,b,c,d) fwrite_unlocked(a,b,c,d)
#define MYFEOF(a) feof_unlocked(a)
#define MYFERROR(a) ferror_unlocked(a)
#define MYFFLUSH(a) fflush_unlocked(a)
#else
#define MYFREAD(a,b,c,d) fread(a,b,c,d)
#define MYFWRITE(a,b,c,d) fwrite(a,b,c,d)
#define MYFEOF(a) feof(a)
#define MYFERROR(a) ferror(a)
#define MYFFLUSH(a) fflush(a)
#endif
#endif
static inline int readfromsocket(FILE * sockf, void *buf, ssize_t count) {
ssize_t i = MYFREAD(buf, sizeof(byte), count, sockf);
if(i != count) {
if(MYFEOF(sockf)) {
errno = EOF;
return EOF;
} else if(MYFERROR(sockf)) {
perror("readfromsocket failed");
errno = -1;
return -1;
}
printf("logic bug? unreported short read?\n");
errno = EOF;
return EOF;
}
return 0;
}
static inline int readfromsocket(int sockd, void *buf, ssize_t count)
{
ssize_t n = 0;
while( n < count )
{
ssize_t i = read( sockd, ((byte*)buf) + n, count - n);
if(i == -1) {
perror("readfromsocket failed");
return errno;
} else if(i == 0) {
errno = EOF;
return errno;
}
n += i;
}
return 0;
}
static inline int writetosocket(FILE * sockf, const void *buf, ssize_t count) {
ssize_t i = MYFWRITE((byte*)buf, sizeof(byte), count, sockf);
if(i != count) {
if(MYFEOF(sockf)) {
errno = EOF;
return errno;
} else if(MYFERROR(sockf)) {
perror("writetosocket failed");
errno = -1;
return -1;
}
printf("logic error? unreported short write?\n");
errno = EOF;
return EOF;
}
return 0;
}
static inline int writetosocket(int sockd, const void *buf, ssize_t count)
{
ssize_t n = 0;
while( n < count )
{
ssize_t i = write( sockd, ((byte*)buf) + n, count - n);
if(i == -1) { // XXX not threadsafe!
perror("writetosocket failed");
return errno;
} else if(i == 0) {
errno = EOF;
return errno;
}
n += i;
}
return 0;
}
static inline bool opiserror(network_op_t op) {
return (LOGSTORE_FIRST_ERROR <= op && op <= LOGSTORE_LAST_ERROR);
}
static inline bool opisrequest(network_op_t op) {
return (LOGSTORE_FIRST_REQUEST_CODE <= op && op <= LOGSTORE_LAST_REQUEST_CODE);
}
static inline bool opisresponse(network_op_t op) {
return (LOGSTORE_FIRST_RESPONSE_CODE <= op && op <= LOGSTORE_LAST_RESPONSE_CODE);
}
static inline network_op_t readopfromsocket(FILE * sockf, logstore_opcode_type type) {
network_op_t ret;
MYFFLUSH(sockf); // our first read after a write is always (?) a readop, so fflush the write here.
ssize_t n = MYFREAD(&ret, sizeof(network_op_t), 1, sockf);
if(n == sizeof(network_op_t)) {
// done.
} else if(n == 0) { // EOF
perror("Socket closed mid request.");
return LOGSTORE_CONN_CLOSED_ERROR;
} else {
assert(n == -1); // sizeof(network_op_t) is 1, so short reads are impossible.
perror("Could not read opcode from socket");
return LOGSTORE_SOCKET_ERROR;
}
// sanity checking
switch(type) {
case LOGSTORE_CLIENT_REQUEST: {
if(!(opisrequest(ret) || opiserror(ret))) {
fprintf(stderr, "Read invalid request code %d\n", (int)ret);
if(opisresponse(ret)) {
fprintf(stderr, "(also, the request code is a valid response code)\n");
}
ret = LOGSTORE_PROTOCOL_ERROR;
}
} break;
case LOGSTORE_SERVER_RESPONSE: {
if(!(opisresponse(ret) || opiserror(ret))) {
fprintf(stderr, "Read invalid response code %d\n", (int)ret);
if(opisrequest(ret)) {
fprintf(stderr, "(also, the response code is a valid request code)\n");
}
ret = LOGSTORE_PROTOCOL_ERROR;
}
}
}
return ret;
}
static inline network_op_t readopfromsocket(int sockd, logstore_opcode_type type) {
network_op_t ret;
ssize_t n = read(sockd, &ret, sizeof(network_op_t));
if(n == sizeof(network_op_t)) {
// done.
} else if(n == 0) { // EOF
perror("Socket closed mid request.");
return LOGSTORE_CONN_CLOSED_ERROR;
} else {
assert(n == -1); // sizeof(network_op_t) is 1, so short reads are impossible.
perror("Could not read opcode from socket");
return LOGSTORE_SOCKET_ERROR;
}
// sanity checking
switch(type) {
case LOGSTORE_CLIENT_REQUEST: {
if(!(opisrequest(ret) || opiserror(ret))) {
fprintf(stderr, "Read invalid request code %d\n", (int)ret);
if(opisresponse(ret)) {
fprintf(stderr, "(also, the request code is a valid response code)\n");
}
ret = LOGSTORE_PROTOCOL_ERROR;
}
} break;
case LOGSTORE_SERVER_RESPONSE: {
if(!(opisresponse(ret) || opiserror(ret))) {
fprintf(stderr, "Read invalid response code %d\n", (int)ret);
if(opisrequest(ret)) {
fprintf(stderr, "(also, the response code is a valid request code)\n");
}
ret = LOGSTORE_PROTOCOL_ERROR;
}
}
}
return ret;
}
static inline int writeoptosocket(FILE * sockf, network_op_t op) {
assert(opiserror(op) || opisrequest(op) || opisresponse(op));
int ret = writetosocket(sockf, &op, sizeof(network_op_t));
if(op == LOGSTORE_RESPONSE_RECEIVING_TUPLES) {
MYFFLUSH(sockf);
}
return ret;
}
static inline int writeoptosocket(int sockd, network_op_t op) {
assert(opiserror(op) || opisrequest(op) || opisresponse(op));
return writetosocket(sockd, &op, sizeof(network_op_t));
}
/**
Iterator wire format:
LOGSTORE_RESPONSE_SENDING_TUPLES
TUPLE
TUPLE
TUPLE
datatuple::DELETE
*/
static inline datatuple* readtuplefromsocket(FILE * sockf, int * err) {
len_t keylen, datalen, buflen;
if(( *err = readfromsocket(sockf, &keylen, sizeof(keylen)) )) return NULL;
if(keylen == DELETE) return NULL; // *err is zero.
if(( *err = readfromsocket(sockf, &datalen, sizeof(datalen)) )) return NULL;
buflen = datatuple::length_from_header(keylen, datalen);
byte* bytes = (byte*) malloc(buflen);
if(( *err = readfromsocket(sockf, bytes, buflen) )) { free(bytes); return NULL; }
datatuple * ret = datatuple::from_bytes(keylen, datalen, bytes);
free(bytes);
return ret;
}
/**
@param sockd The socket.
@param error will be set to zero on succes, a logstore error number on failure
@return a datatuple, or NULL.
*/
static inline datatuple* readtuplefromsocket(int sockd, int * err) {
len_t keylen, datalen, buflen;
if(( *err = readfromsocket(sockd, &keylen, sizeof(keylen)) )) return NULL;
if(keylen == DELETE) return NULL; // *err is zero.
if(( *err = readfromsocket(sockd, &datalen, sizeof(datalen)) )) return NULL;
buflen = datatuple::length_from_header(keylen, datalen);
// TODO remove the malloc / free in readtuplefromsocket, either with a
// two-stage API for datatuple::create, or with realloc.
byte* bytes = (byte*) malloc(buflen);
if(( *err = readfromsocket(sockd, bytes, buflen) )) return NULL;
datatuple * ret = datatuple::from_bytes(keylen, datalen, bytes);
free(bytes);
return ret;
}
static inline int writeendofiteratortosocket(FILE * sockf) {
return writetosocket(sockf, &DELETE, sizeof(DELETE));
}
static inline int writeendofiteratortosocket(int sockd) {
return writetosocket(sockd, &DELETE, sizeof(DELETE));
}
static inline int writetupletosocket(FILE * sockf, const datatuple *tup) {
len_t keylen, datalen;
int err;
if(tup == NULL) {
if(( err = writeendofiteratortosocket(sockf) )) return err;
} else {
const byte* buf = tup->get_bytes(&keylen, &datalen);
if(( err = writetosocket(sockf, &keylen, sizeof(keylen)) )) return err;
if(( err = writetosocket(sockf, &datalen, sizeof(datalen)) )) return err;
if(( err = writetosocket(sockf, buf, datatuple::length_from_header(keylen, datalen)) )) return err;
}
return 0;
}
static inline int writetupletosocket(int sockd, const datatuple* tup) {
len_t keylen, datalen;
int err;
if(tup == NULL) {
if(( err = writeendofiteratortosocket(sockd) )) return err;
} else {
const byte* buf = tup->get_bytes(&keylen, &datalen);
if(( err = writetosocket(sockd, &keylen, sizeof(keylen)) )) return err;
if(( err = writetosocket(sockd, &datalen, sizeof(datalen)) )) return err;
if(( err = writetosocket(sockd, buf, datatuple::length_from_header(keylen, datalen)) )) return err;
}
return 0;
}
static inline uint64_t readcountfromsocket(FILE* sockf, int *err) {
uint64_t ret;
*err = readfromsocket(sockf, &ret, sizeof(ret));
return ret;
}
static inline uint64_t readcountfromsocket(int sockd, int *err) {
uint64_t ret;
*err = readfromsocket(sockd, &ret, sizeof(ret));
return ret;
}
static inline int writecounttosocket(FILE* sockf, uint64_t count) {
return writetosocket(sockf, &count, sizeof(count));
}
static inline int writecounttosocket(int sockd, uint64_t count) {
return writetosocket(sockd, &count, sizeof(count));
}
#endif /* NETWORK_H_ */