2022-12-06 00:53:31 +00:00
|
|
|
// This file Copyright © 2017-2022 Mnemosyne LLC.
|
|
|
|
// It may be used under GPLv2 (SPDX: GPL-2.0-only), GPLv3 (SPDX: GPL-3.0-only),
|
|
|
|
// or any future license endorsed by Mnemosyne LLC.
|
|
|
|
// License text can be found in the licenses/ folder.
|
|
|
|
|
2022-12-06 16:28:28 +00:00
|
|
|
#include <fmt/format.h>
|
|
|
|
|
2022-12-06 00:53:31 +00:00
|
|
|
#include <libutp/utp.h>
|
|
|
|
|
|
|
|
#include "transmission.h"
|
|
|
|
|
|
|
|
#include "peer-socket.h"
|
|
|
|
#include "net.h"
|
2022-12-06 16:28:28 +00:00
|
|
|
#include "session.h"
|
|
|
|
|
2022-12-08 22:44:19 +00:00
|
|
|
#define tr_logAddErrorIo(io, msg) tr_logAddError(msg, (io)->display_name())
|
|
|
|
#define tr_logAddWarnIo(io, msg) tr_logAddWarn(msg, (io)->display_name())
|
|
|
|
#define tr_logAddDebugIo(io, msg) tr_logAddDebug(msg, (io)->display_name())
|
|
|
|
#define tr_logAddTraceIo(io, msg) tr_logAddTrace(msg, (io)->display_name())
|
2022-12-06 16:28:28 +00:00
|
|
|
|
2022-12-23 16:56:27 +00:00
|
|
|
tr_peer_socket::tr_peer_socket(tr_session const* session, tr_address const& address, tr_port port, tr_socket_t sock)
|
2022-12-06 16:28:28 +00:00
|
|
|
: handle{ sock }
|
|
|
|
, address_{ address }
|
|
|
|
, port_{ port }
|
|
|
|
, type_{ Type::TCP }
|
|
|
|
{
|
|
|
|
TR_ASSERT(sock != TR_BAD_SOCKET);
|
|
|
|
|
2023-01-04 21:37:55 +00:00
|
|
|
++n_open_sockets_;
|
2022-12-06 16:28:28 +00:00
|
|
|
session->setSocketTOS(sock, address_.type);
|
|
|
|
|
|
|
|
if (auto const& algo = session->peerCongestionAlgorithm(); !std::empty(algo))
|
|
|
|
{
|
|
|
|
tr_netSetCongestionControl(sock, algo.c_str());
|
|
|
|
}
|
|
|
|
|
|
|
|
tr_logAddTraceIo(this, fmt::format("socket (tcp) is {}", handle.tcp));
|
|
|
|
}
|
|
|
|
|
|
|
|
tr_peer_socket::tr_peer_socket(tr_address const& address, tr_port port, struct UTPSocket* const sock)
|
|
|
|
: address_{ address }
|
|
|
|
, port_{ port }
|
|
|
|
, type_{ Type::UTP }
|
|
|
|
{
|
|
|
|
TR_ASSERT(sock != nullptr);
|
2023-01-04 21:37:55 +00:00
|
|
|
|
|
|
|
++n_open_sockets_;
|
2022-12-06 16:28:28 +00:00
|
|
|
handle.utp = sock;
|
|
|
|
|
|
|
|
tr_logAddTraceIo(this, fmt::format("socket (µTP) is {}", fmt::ptr(handle.utp)));
|
|
|
|
}
|
2022-12-06 00:53:31 +00:00
|
|
|
|
2023-01-04 21:37:55 +00:00
|
|
|
void tr_peer_socket::close()
|
2022-12-06 00:53:31 +00:00
|
|
|
{
|
2022-12-16 07:23:12 +00:00
|
|
|
if (is_tcp() && (handle.tcp != TR_BAD_SOCKET))
|
2022-12-06 00:53:31 +00:00
|
|
|
{
|
2023-01-04 21:37:55 +00:00
|
|
|
--n_open_sockets_;
|
|
|
|
tr_net_close_socket(handle.tcp);
|
2022-12-06 00:53:31 +00:00
|
|
|
}
|
|
|
|
#ifdef WITH_UTP
|
|
|
|
else if (is_utp())
|
|
|
|
{
|
2023-01-04 21:37:55 +00:00
|
|
|
--n_open_sockets_;
|
2022-12-06 00:53:31 +00:00
|
|
|
utp_set_userdata(handle.utp, nullptr);
|
|
|
|
utp_close(handle.utp);
|
|
|
|
}
|
|
|
|
#endif
|
2022-12-06 16:28:28 +00:00
|
|
|
|
|
|
|
type_ = Type::None;
|
|
|
|
handle = {};
|
2022-12-06 00:53:31 +00:00
|
|
|
}
|
2022-12-16 07:23:12 +00:00
|
|
|
|
|
|
|
size_t tr_peer_socket::try_write(Buffer& buf, size_t max, tr_error** error) const
|
|
|
|
{
|
|
|
|
if (max == size_t{})
|
|
|
|
{
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_tcp())
|
|
|
|
{
|
2023-01-28 02:12:09 +00:00
|
|
|
return buf.to_socket(handle.tcp, max, error);
|
2022-12-16 07:23:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef WITH_UTP
|
|
|
|
if (is_utp())
|
|
|
|
{
|
2023-01-02 18:41:47 +00:00
|
|
|
auto const [data, datalen] = buf.pullup();
|
2022-12-16 07:23:12 +00:00
|
|
|
|
|
|
|
errno = 0;
|
2022-12-18 18:09:02 +00:00
|
|
|
auto const n_written = utp_write(handle.utp, data, std::min(datalen, max));
|
2022-12-16 07:23:12 +00:00
|
|
|
auto const error_code = errno;
|
|
|
|
|
2022-12-18 18:09:02 +00:00
|
|
|
if (n_written > 0)
|
2022-12-16 07:23:12 +00:00
|
|
|
{
|
2022-12-18 18:09:02 +00:00
|
|
|
buf.drain(n_written);
|
|
|
|
return static_cast<size_t>(n_written);
|
2022-12-16 07:23:12 +00:00
|
|
|
}
|
|
|
|
|
2022-12-18 18:09:02 +00:00
|
|
|
if (n_written < 0 && error_code != 0)
|
2022-12-16 07:23:12 +00:00
|
|
|
{
|
2023-01-25 18:20:10 +00:00
|
|
|
tr_error_set_from_errno(error, error_code);
|
2022-12-16 07:23:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t tr_peer_socket::try_read(Buffer& buf, size_t max, tr_error** error) const
|
|
|
|
{
|
|
|
|
if (max == size_t{})
|
|
|
|
{
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_tcp())
|
|
|
|
{
|
2023-01-28 02:12:09 +00:00
|
|
|
return buf.add_socket(handle.tcp, max, error);
|
2022-12-16 07:23:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef WITH_UTP
|
2022-12-23 16:56:27 +00:00
|
|
|
// utp_read_drained() notifies libutp that this read buffer is empty.
|
|
|
|
// It opens up the congestion window by sending an ACK (soonish) if
|
|
|
|
// one was not going to be sent.
|
|
|
|
if (is_utp() && std::empty(buf))
|
2022-12-16 07:23:12 +00:00
|
|
|
{
|
2022-12-23 16:56:27 +00:00
|
|
|
utp_read_drained(handle.utp);
|
2022-12-16 07:23:12 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return {};
|
|
|
|
}
|
2023-01-04 21:37:55 +00:00
|
|
|
|
|
|
|
bool tr_peer_socket::limit_reached(tr_session* const session) noexcept
|
|
|
|
{
|
|
|
|
return n_open_sockets_.load() >= session->peerLimit();
|
|
|
|
}
|