blob: 8a2bf9a2c9da7a13885a72fe91f2c1d18961ad27 [file] [log] [blame]
/*
* Copyright (C) 2007 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#define TRACE_TAG SOCKETS
#include "sysdeps.h"
#include <ctype.h>
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <algorithm>
#include <chrono>
#include <mutex>
#include <string>
#include <vector>
#if !ADB_HOST
#include <android-base/properties.h>
#include <log/log_properties.h>
#endif
#include "adb.h"
#include "adb_io.h"
#include "adb_utils.h"
#include "transport.h"
#include "types.h"
using namespace std::chrono_literals;
static std::recursive_mutex& local_socket_list_lock = *new std::recursive_mutex();
static unsigned local_socket_next_id = 1;
static auto& local_socket_list = *new std::vector<asocket*>();
/* the the list of currently closing local sockets.
** these have no peer anymore, but still packets to
** write to their fd.
*/
static auto& local_socket_closing_list = *new std::vector<asocket*>();
// Parse the global list of sockets to find one with id |local_id|.
// If |peer_id| is not 0, also check that it is connected to a peer
// with id |peer_id|. Returns an asocket handle on success, NULL on failure.
asocket* find_local_socket(unsigned local_id, unsigned peer_id) {
asocket* result = nullptr;
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
for (asocket* s : local_socket_list) {
if (s->id != local_id) {
continue;
}
if (peer_id == 0 || (s->peer && s->peer->id == peer_id)) {
result = s;
}
break;
}
return result;
}
void install_local_socket(asocket* s) {
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
s->id = local_socket_next_id++;
// Socket ids should never be 0.
if (local_socket_next_id == 0) {
LOG(FATAL) << "local socket id overflow";
}
local_socket_list.push_back(s);
}
void remove_socket(asocket* s) {
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
for (auto list : { &local_socket_list, &local_socket_closing_list }) {
list->erase(std::remove_if(list->begin(), list->end(), [s](asocket* x) { return x == s; }),
list->end());
}
}
void close_all_sockets(atransport* t) {
/* this is a little gross, but since s->close() *will* modify
** the list out from under you, your options are limited.
*/
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
restart:
for (asocket* s : local_socket_list) {
if (s->transport == t || (s->peer && s->peer->transport == t)) {
s->close(s);
goto restart;
}
}
}
enum class SocketFlushResult {
Destroyed,
TryAgain,
Completed,
};
static SocketFlushResult local_socket_flush_incoming(asocket* s) {
if (!s->packet_queue.empty()) {
std::vector<adb_iovec> iov = s->packet_queue.iovecs();
ssize_t rc = adb_writev(s->fd, iov.data(), iov.size());
if (rc > 0 && static_cast<size_t>(rc) == s->packet_queue.size()) {
s->packet_queue.clear();
} else if (rc > 0) {
// TODO: Implement a faster drop_front?
s->packet_queue.take_front(rc);
fdevent_add(s->fde, FDE_WRITE);
return SocketFlushResult::TryAgain;
} else if (rc == -1 && errno == EAGAIN) {
fdevent_add(s->fde, FDE_WRITE);
return SocketFlushResult::TryAgain;
} else {
// We failed to write, but it's possible that we can still read from the socket.
// Give that a try before giving up.
s->has_write_error = true;
}
}
// If we sent the last packet of a closing socket, we can now destroy it.
if (s->closing) {
s->close(s);
return SocketFlushResult::Destroyed;
}
fdevent_del(s->fde, FDE_WRITE);
return SocketFlushResult::Completed;
}
// Returns false if the socket has been closed and destroyed as a side-effect of this function.
static bool local_socket_flush_outgoing(asocket* s) {
const size_t max_payload = s->get_max_payload();
apacket::payload_type data;
data.resize(max_payload);
char* x = &data[0];
size_t avail = max_payload;
int r = 0;
int is_eof = 0;
while (avail > 0) {
r = adb_read(s->fd, x, avail);
D("LS(%d): post adb_read(fd=%d,...) r=%d (errno=%d) avail=%zu", s->id, s->fd, r,
r < 0 ? errno : 0, avail);
if (r == -1) {
if (errno == EAGAIN) {
break;
}
} else if (r > 0) {
avail -= r;
x += r;
continue;
}
/* r = 0 or unhandled error */
is_eof = 1;
break;
}
D("LS(%d): fd=%d post avail loop. r=%d is_eof=%d forced_eof=%d", s->id, s->fd, r, is_eof,
s->fde->force_eof);
if (avail != max_payload && s->peer) {
data.resize(max_payload - avail);
// s->peer->enqueue() may call s->close() and free s,
// so save variables for debug printing below.
unsigned saved_id = s->id;
int saved_fd = s->fd;
r = s->peer->enqueue(s->peer, std::move(data));
D("LS(%u): fd=%d post peer->enqueue(). r=%d", saved_id, saved_fd, r);
if (r < 0) {
// Error return means they closed us as a side-effect and we must
// return immediately.
//
// Note that if we still have buffered packets, the socket will be
// placed on the closing socket list. This handler function will be
// called again to process FDE_WRITE events.
return false;
}
if (r > 0) {
/* if the remote cannot accept further events,
** we disable notification of READs. They'll
** be enabled again when we get a call to ready()
*/
fdevent_del(s->fde, FDE_READ);
}
}
// Don't allow a forced eof if data is still there.
if ((s->fde->force_eof && !r) || is_eof) {
D(" closing because is_eof=%d r=%d s->fde.force_eof=%d", is_eof, r, s->fde->force_eof);
s->close(s);
return false;
}
return true;
}
static int local_socket_enqueue(asocket* s, apacket::payload_type data) {
D("LS(%d): enqueue %zu", s->id, data.size());
s->packet_queue.append(std::move(data));
switch (local_socket_flush_incoming(s)) {
case SocketFlushResult::Destroyed:
return -1;
case SocketFlushResult::TryAgain:
return 1;
case SocketFlushResult::Completed:
return 0;
}
return !s->packet_queue.empty();
}
static void local_socket_ready(asocket* s) {
/* far side is ready for data, pay attention to
readable events */
fdevent_add(s->fde, FDE_READ);
}
struct ClosingSocket {
std::chrono::steady_clock::time_point begin;
};
// The standard (RFC 1122 - 4.2.2.13) says that if we call close on a
// socket while we have pending data, a TCP RST should be sent to the
// other end to notify it that we didn't read all of its data. However,
// this can result in data that we've successfully written out to be dropped
// on the other end. To avoid this, instead of immediately closing a
// socket, call shutdown on it instead, and then read from the file
// descriptor until we hit EOF or an error before closing.
static void deferred_close(unique_fd fd) {
// Shutdown the socket in the outgoing direction only, so that
// we don't have the same problem on the opposite end.
adb_shutdown(fd.get(), SHUT_WR);
auto callback = [](fdevent* fde, unsigned event, void* arg) {
auto socket_info = static_cast<ClosingSocket*>(arg);
if (event & FDE_READ) {
ssize_t rc;
char buf[BUFSIZ];
while ((rc = adb_read(fde->fd.get(), buf, sizeof(buf))) > 0) {
continue;
}
if (rc == -1 && errno == EAGAIN) {
// There's potentially more data to read.
auto duration = std::chrono::steady_clock::now() - socket_info->begin;
if (duration > 1s) {
LOG(WARNING) << "timeout expired while flushing socket, closing";
} else {
return;
}
}
} else if (event & FDE_TIMEOUT) {
LOG(WARNING) << "timeout expired while flushing socket, closing";
}
// Either there was an error, we hit the end of the socket, or our timeout expired.
fdevent_destroy(fde);
delete socket_info;
};
ClosingSocket* socket_info = new ClosingSocket{
.begin = std::chrono::steady_clock::now(),
};
fdevent* fde = fdevent_create(fd.release(), callback, socket_info);
fdevent_add(fde, FDE_READ);
fdevent_set_timeout(fde, 1s);
}
// be sure to hold the socket list lock when calling this
static void local_socket_destroy(asocket* s) {
int exit_on_close = s->exit_on_close;
D("LS(%d): destroying fde.fd=%d", s->id, s->fd);
deferred_close(fdevent_release(s->fde));
remove_socket(s);
delete s;
if (exit_on_close) {
D("local_socket_destroy: exiting");
exit(1);
}
}
static void local_socket_close(asocket* s) {
D("entered local_socket_close. LS(%d) fd=%d", s->id, s->fd);
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
if (s->peer) {
D("LS(%d): closing peer. peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
/* Note: it's important to call shutdown before disconnecting from
* the peer, this ensures that remote sockets can still get the id
* of the local socket they're connected to, to send a CLOSE()
* protocol event. */
if (s->peer->shutdown) {
s->peer->shutdown(s->peer);
}
s->peer->peer = nullptr;
s->peer->close(s->peer);
s->peer = nullptr;
}
/* If we are already closing, or if there are no
** pending packets, destroy immediately
*/
if (s->closing || s->has_write_error || s->packet_queue.empty()) {
int id = s->id;
local_socket_destroy(s);
D("LS(%d): closed", id);
return;
}
/* otherwise, put on the closing list
*/
D("LS(%d): closing", s->id);
s->closing = 1;
fdevent_del(s->fde, FDE_READ);
remove_socket(s);
D("LS(%d): put on socket_closing_list fd=%d", s->id, s->fd);
local_socket_closing_list.push_back(s);
CHECK_EQ(FDE_WRITE, s->fde->state & FDE_WRITE);
}
static void local_socket_event_func(int fd, unsigned ev, void* _s) {
asocket* s = reinterpret_cast<asocket*>(_s);
D("LS(%d): event_func(fd=%d(==%d), ev=%04x)", s->id, s->fd, fd, ev);
/* put the FDE_WRITE processing before the FDE_READ
** in order to simplify the code.
*/
if (ev & FDE_WRITE) {
switch (local_socket_flush_incoming(s)) {
case SocketFlushResult::Destroyed:
return;
case SocketFlushResult::TryAgain:
break;
case SocketFlushResult::Completed:
s->peer->ready(s->peer);
break;
}
}
if (ev & FDE_READ) {
if (!local_socket_flush_outgoing(s)) {
return;
}
}
if (ev & FDE_ERROR) {
/* this should be caught be the next read or write
** catching it here means we may skip the last few
** bytes of readable data.
*/
D("LS(%d): FDE_ERROR (fd=%d)", s->id, s->fd);
return;
}
}
asocket* create_local_socket(unique_fd ufd) {
int fd = ufd.release();
asocket* s = new asocket();
s->fd = fd;
s->enqueue = local_socket_enqueue;
s->ready = local_socket_ready;
s->shutdown = nullptr;
s->close = local_socket_close;
install_local_socket(s);
s->fde = fdevent_create(fd, local_socket_event_func, s);
D("LS(%d): created (fd=%d)", s->id, s->fd);
return s;
}
asocket* create_local_service_socket(std::string_view name, atransport* transport) {
#if !ADB_HOST
if (asocket* s = daemon_service_to_socket(name); s) {
return s;
}
#endif
unique_fd fd = service_to_fd(name, transport);
if (fd < 0) {
return nullptr;
}
int fd_value = fd.get();
asocket* s = create_local_socket(std::move(fd));
LOG(VERBOSE) << "LS(" << s->id << "): bound to '" << name << "' via " << fd_value;
#if !ADB_HOST
if ((name.starts_with("root:") && getuid() != 0 && __android_log_is_debuggable()) ||
(name.starts_with("unroot:") && getuid() == 0) || name.starts_with("usb:") ||
name.starts_with("tcpip:")) {
D("LS(%d): enabling exit_on_close", s->id);
s->exit_on_close = 1;
}
#endif
return s;
}
static int remote_socket_enqueue(asocket* s, apacket::payload_type data) {
D("entered remote_socket_enqueue RS(%d) WRITE fd=%d peer.fd=%d", s->id, s->fd, s->peer->fd);
apacket* p = get_apacket();
p->msg.command = A_WRTE;
p->msg.arg0 = s->peer->id;
p->msg.arg1 = s->id;
if (data.size() > MAX_PAYLOAD) {
put_apacket(p);
return -1;
}
p->payload = std::move(data);
p->msg.data_length = p->payload.size();
send_packet(p, s->transport);
return 1;
}
static void remote_socket_ready(asocket* s) {
D("entered remote_socket_ready RS(%d) OKAY fd=%d peer.fd=%d", s->id, s->fd, s->peer->fd);
apacket* p = get_apacket();
p->msg.command = A_OKAY;
p->msg.arg0 = s->peer->id;
p->msg.arg1 = s->id;
send_packet(p, s->transport);
}
static void remote_socket_shutdown(asocket* s) {
D("entered remote_socket_shutdown RS(%d) CLOSE fd=%d peer->fd=%d", s->id, s->fd,
s->peer ? s->peer->fd : -1);
apacket* p = get_apacket();
p->msg.command = A_CLSE;
if (s->peer) {
p->msg.arg0 = s->peer->id;
}
p->msg.arg1 = s->id;
send_packet(p, s->transport);
}
static void remote_socket_close(asocket* s) {
if (s->peer) {
s->peer->peer = nullptr;
D("RS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
s->peer->close(s->peer);
}
D("entered remote_socket_close RS(%d) CLOSE fd=%d peer->fd=%d", s->id, s->fd,
s->peer ? s->peer->fd : -1);
D("RS(%d): closed", s->id);
delete s;
}
// Create a remote socket to exchange packets with a remote service through transport
// |t|. Where |id| is the socket id of the corresponding service on the other
// side of the transport (it is allocated by the remote side and _cannot_ be 0).
// Returns a new non-NULL asocket handle.
asocket* create_remote_socket(unsigned id, atransport* t) {
if (id == 0) {
LOG(FATAL) << "invalid remote socket id (0)";
}
asocket* s = new asocket();
s->id = id;
s->enqueue = remote_socket_enqueue;
s->ready = remote_socket_ready;
s->shutdown = remote_socket_shutdown;
s->close = remote_socket_close;
s->transport = t;
D("RS(%d): created", s->id);
return s;
}
void connect_to_remote(asocket* s, std::string_view destination) {
D("Connect_to_remote call RS(%d) fd=%d", s->id, s->fd);
apacket* p = get_apacket();
LOG(VERBOSE) << "LS(" << s->id << ": connect(" << destination << ")";
p->msg.command = A_OPEN;
p->msg.arg0 = s->id;
// adbd used to expect a null-terminated string.
// Keep doing so to maintain backward compatibility.
p->payload.resize(destination.size() + 1);
memcpy(p->payload.data(), destination.data(), destination.size());
p->payload[destination.size()] = '\0';
p->msg.data_length = p->payload.size();
CHECK_LE(p->msg.data_length, s->get_max_payload());
send_packet(p, s->transport);
}
/* this is used by magic sockets to rig local sockets to
send the go-ahead message when they connect */
static void local_socket_ready_notify(asocket* s) {
s->ready = local_socket_ready;
s->shutdown = nullptr;
s->close = local_socket_close;
SendOkay(s->fd);
s->ready(s);
}
/* this is used by magic sockets to rig local sockets to
send the failure message if they are closed before
connected (to avoid closing them without a status message) */
static void local_socket_close_notify(asocket* s) {
s->ready = local_socket_ready;
s->shutdown = nullptr;
s->close = local_socket_close;
SendFail(s->fd, "closed");
s->close(s);
}
static unsigned unhex(const char* s, int len) {
unsigned n = 0, c;
while (len-- > 0) {
switch ((c = *s++)) {
case '0':
case '1':
case '2':
case '3':
case '4':
case '5':
case '6':
case '7':
case '8':
case '9':
c -= '0';
break;
case 'a':
case 'b':
case 'c':
case 'd':
case 'e':
case 'f':
c = c - 'a' + 10;
break;
case 'A':
case 'B':
case 'C':
case 'D':
case 'E':
case 'F':
c = c - 'A' + 10;
break;
default:
return 0xffffffff;
}
n = (n << 4) | c;
}
return n;
}
#if ADB_HOST
namespace internal {
// Parses a host service string of the following format:
// * [tcp:|udp:]<serial>[:<port>]:<command>
// * <prefix>:<serial>:<command>
// Where <port> must be a base-10 number and <prefix> may be any of {usb,product,model,device}.
bool parse_host_service(std::string_view* out_serial, std::string_view* out_command,
std::string_view full_service) {
if (full_service.empty()) {
return false;
}
std::string_view serial;
std::string_view command = full_service;
// Remove |count| bytes from the beginning of command and add them to |serial|.
auto consume = [&full_service, &serial, &command](size_t count) {
CHECK_LE(count, command.size());
if (!serial.empty()) {
CHECK_EQ(serial.data() + serial.size(), command.data());
}
serial = full_service.substr(0, serial.size() + count);
command.remove_prefix(count);
};
// Remove the trailing : from serial, and assign the values to the output parameters.
auto finish = [out_serial, out_command, &serial, &command] {
if (serial.empty() || command.empty()) {
return false;
}
CHECK_EQ(':', serial.back());
serial.remove_suffix(1);
*out_serial = serial;
*out_command = command;
return true;
};
static constexpr std::string_view prefixes[] = {"usb:", "product:", "model:", "device:"};
for (std::string_view prefix : prefixes) {
if (command.starts_with(prefix)) {
consume(prefix.size());
size_t offset = command.find_first_of(':');
if (offset == std::string::npos) {
return false;
}
consume(offset + 1);
return finish();
}
}
// For fastboot compatibility, ignore protocol prefixes.
if (command.starts_with("tcp:") || command.starts_with("udp:")) {
consume(4);
if (command.empty()) {
return false;
}
}
if (command.starts_with("vsock:")) {
// vsock serials are vsock:cid:port, which have an extra colon compared to tcp.
size_t next_colon = command.find(':');
if (next_colon == std::string::npos) {
return false;
}
consume(next_colon + 1);
}
bool found_address = false;
if (command[0] == '[') {
// Read an IPv6 address. `adb connect` creates the serial number from the canonical
// network address so it will always have the [] delimiters.
size_t ipv6_end = command.find_first_of(']');
if (ipv6_end != std::string::npos) {
consume(ipv6_end + 1);
if (command.empty()) {
// Nothing after the IPv6 address.
return false;
} else if (command[0] != ':') {
// Garbage after the IPv6 address.
return false;
}
consume(1);
found_address = true;
}
}
if (!found_address) {
// Scan ahead to the next colon.
size_t offset = command.find_first_of(':');
if (offset == std::string::npos) {
return false;
}
consume(offset + 1);
}
// We're either at the beginning of a port, or the command itself.
// Look for a port in between colons.
size_t next_colon = command.find_first_of(':');
if (next_colon == std::string::npos) {
// No colon, we must be at the command.
return finish();
}
bool port_valid = true;
if (command.size() <= next_colon) {
return false;
}
std::string_view port = command.substr(0, next_colon);
for (auto digit : port) {
if (!isdigit(digit)) {
// Port isn't a number.
port_valid = false;
break;
}
}
if (port_valid) {
consume(next_colon + 1);
}
return finish();
}
} // namespace internal
#endif // ADB_HOST
static int smart_socket_enqueue(asocket* s, apacket::payload_type data) {
#if ADB_HOST
std::string_view service;
std::string_view serial;
TransportId transport_id = 0;
TransportType type = kTransportAny;
#endif
D("SS(%d): enqueue %zu", s->id, data.size());
if (s->smart_socket_data.empty()) {
// TODO: Make this an IOVector?
s->smart_socket_data.assign(data.begin(), data.end());
} else {
std::copy(data.begin(), data.end(), std::back_inserter(s->smart_socket_data));
}
/* don't bother if we can't decode the length */
if (s->smart_socket_data.size() < 4) {
return 0;
}
uint32_t len = unhex(s->smart_socket_data.data(), 4);
if (len == 0 || len > MAX_PAYLOAD) {
D("SS(%d): bad size (%u)", s->id, len);
goto fail;
}
D("SS(%d): len is %u", s->id, len);
/* can't do anything until we have the full header */
if ((len + 4) > s->smart_socket_data.size()) {
D("SS(%d): waiting for %zu more bytes", s->id, len + 4 - s->smart_socket_data.size());
return 0;
}
s->smart_socket_data[len + 4] = 0;
D("SS(%d): '%s'", s->id, (char*)(s->smart_socket_data.data() + 4));
#if ADB_HOST
service = std::string_view(s->smart_socket_data).substr(4);
if (ConsumePrefix(&service, "host-serial:")) {
// serial number should follow "host:" and could be a host:port string.
if (!internal::parse_host_service(&serial, &service, service)) {
LOG(ERROR) << "SS(" << s->id << "): failed to parse host service: " << service;
goto fail;
}
} else if (ConsumePrefix(&service, "host-transport-id:")) {
if (!ParseUint(&transport_id, service, &service)) {
LOG(ERROR) << "SS(" << s->id << "): failed to parse host transport id: " << service;
return -1;
}
if (!ConsumePrefix(&service, ":")) {
LOG(ERROR) << "SS(" << s->id << "): host-transport-id without command";
return -1;
}
} else if (ConsumePrefix(&service, "host-usb:")) {
type = kTransportUsb;
} else if (ConsumePrefix(&service, "host-local:")) {
type = kTransportLocal;
} else if (ConsumePrefix(&service, "host:")) {
type = kTransportAny;
} else {
service = std::string_view{};
}
if (!service.empty()) {
asocket* s2;
// Some requests are handled immediately -- in that case the handle_host_request() routine
// has sent the OKAY or FAIL message and all we have to do is clean up.
auto host_request_result = handle_host_request(
service, type, serial.empty() ? nullptr : std::string(serial).c_str(), transport_id,
s->peer->fd, s);
switch (host_request_result) {
case HostRequestResult::Handled:
LOG(VERBOSE) << "SS(" << s->id << "): handled host service '" << service << "'";
goto fail;
case HostRequestResult::SwitchedTransport:
D("SS(%d): okay transport", s->id);
s->smart_socket_data.clear();
return 0;
case HostRequestResult::Unhandled:
break;
}
/* try to find a local service with this name.
** if no such service exists, we'll fail out
** and tear down here.
*/
// TODO: Convert to string_view.
s2 = host_service_to_socket(service, serial, transport_id);
if (s2 == nullptr) {
LOG(VERBOSE) << "SS(" << s->id << "): couldn't create host service '" << service << "'";
SendFail(s->peer->fd, "unknown host service");
goto fail;
}
/* we've connected to a local host service,
** so we make our peer back into a regular
** local socket and bind it to the new local
** service socket, acknowledge the successful
** connection, and close this smart socket now
** that its work is done.
*/
SendOkay(s->peer->fd);
s->peer->ready = local_socket_ready;
s->peer->shutdown = nullptr;
s->peer->close = local_socket_close;
s->peer->peer = s2;
s2->peer = s->peer;
s->peer = nullptr;
D("SS(%d): okay", s->id);
s->close(s);
/* initial state is "ready" */
s2->ready(s2);
return 0;
}
#else /* !ADB_HOST */
if (s->transport == nullptr) {
std::string error_msg = "unknown failure";
s->transport = acquire_one_transport(kTransportAny, nullptr, 0, nullptr, &error_msg);
if (s->transport == nullptr) {
SendFail(s->peer->fd, error_msg);
goto fail;
}
}
#endif
if (!s->transport) {
SendFail(s->peer->fd, "device offline (no transport)");
goto fail;
} else if (!ConnectionStateIsOnline(s->transport->GetConnectionState())) {
/* if there's no remote we fail the connection
** right here and terminate it
*/
SendFail(s->peer->fd, "device offline (transport offline)");
goto fail;
}
/* instrument our peer to pass the success or fail
** message back once it connects or closes, then
** detach from it, request the connection, and
** tear down
*/
s->peer->ready = local_socket_ready_notify;
s->peer->shutdown = nullptr;
s->peer->close = local_socket_close_notify;
s->peer->peer = nullptr;
/* give him our transport and upref it */
s->peer->transport = s->transport;
connect_to_remote(s->peer, std::string_view(s->smart_socket_data).substr(4));
s->peer = nullptr;
s->close(s);
return 1;
fail:
/* we're going to close our peer as a side-effect, so
** return -1 to signal that state to the local socket
** who is enqueueing against us
*/
s->close(s);
return -1;
}
static void smart_socket_ready(asocket* s) {
D("SS(%d): ready", s->id);
}
static void smart_socket_close(asocket* s) {
D("SS(%d): closed", s->id);
if (s->peer) {
s->peer->peer = nullptr;
s->peer->close(s->peer);
s->peer = nullptr;
}
delete s;
}
static asocket* create_smart_socket(void) {
D("Creating smart socket");
asocket* s = new asocket();
s->enqueue = smart_socket_enqueue;
s->ready = smart_socket_ready;
s->shutdown = nullptr;
s->close = smart_socket_close;
D("SS(%d)", s->id);
return s;
}
void connect_to_smartsocket(asocket* s) {
D("Connecting to smart socket");
asocket* ss = create_smart_socket();
s->peer = ss;
ss->peer = s;
s->ready(s);
}
size_t asocket::get_max_payload() const {
size_t max_payload = MAX_PAYLOAD;
if (transport) {
max_payload = std::min(max_payload, transport->get_max_payload());
}
if (peer && peer->transport) {
max_payload = std::min(max_payload, peer->transport->get_max_payload());
}
return max_payload;
}