blob: 550179dc852845415874d1648aac35f54e19800d [file] [log] [blame]
Harald Weltef5a0fa32019-03-03 15:44:18 +01001#include <stdint.h>
2#include <string.h>
3#include <unistd.h>
4#include <pthread.h>
5
6#include <osmocom/core/linuxlist.h>
7#include <osmocom/core/select.h>
8#include <osmocom/core/fsm.h>
9#include <osmocom/core/logging.h>
10#include <osmocom/core/socket.h>
11#include <osmocom/gsm/protocol/ipaccess.h>
12#include <osmocom/abis/ipa.h>
13
14#include <osmocom/rspro/RsproPDU.h>
15
16#include "debug.h"
17#include "rspro_util.h"
18#include "rspro_server.h"
19
20#define S(x) (1 << (x))
21
Harald Weltef5a0fa32019-03-03 15:44:18 +010022static RsproPDU_t *slotmap2CreateMappingReq(const struct slot_mapping *slotmap)
23{
24 ClientSlot_t clslot;
25 BankSlot_t bslot;
26
27 client_slot2rspro(&clslot, &slotmap->client);
28 bank_slot2rspro(&bslot, &slotmap->bank);
29
30 return rspro_gen_CreateMappingReq(&clslot, &bslot);
31}
32
33static RsproPDU_t *slotmap2RemoveMappingReq(const struct slot_mapping *slotmap)
34{
35 ClientSlot_t clslot;
36 BankSlot_t bslot;
37
38 client_slot2rspro(&clslot, &slotmap->client);
39 bank_slot2rspro(&bslot, &slotmap->bank);
40
41 return rspro_gen_RemoveMappingReq(&clslot, &bslot);
42}
43
44
45static void client_conn_send(struct rspro_client_conn *conn, RsproPDU_t *pdu)
46{
Harald Weltea8b86ce2019-03-31 14:59:20 +020047 if (!pdu) {
48 LOGPFSML(conn->fi, LOGL_ERROR, "Attempt to transmit NULL\n");
49 osmo_log_backtrace(DMAIN, LOGL_ERROR);
Harald Weltef5a0fa32019-03-03 15:44:18 +010050 return;
51 }
Harald Welte15e8b7f2022-04-27 09:24:21 +020052 LOGPFSML(conn->fi, LOGL_DEBUG, "Tx RSPRO %s\n", rspro_msgt_name(pdu));
Harald Weltea8b86ce2019-03-31 14:59:20 +020053
54 struct msgb *msg_tx = rspro_enc_msg(pdu);
55 if (!msg_tx) {
56 LOGPFSML(conn->fi, LOGL_ERROR, "Error encdoing RSPRO %s\n", rspro_msgt_name(pdu));
57 osmo_log_backtrace(DMAIN, LOGL_ERROR);
58 ASN_STRUCT_FREE(asn_DEF_RsproPDU, pdu);
59 return;
60 }
Harald Weltef5a0fa32019-03-03 15:44:18 +010061 ipa_prepend_header_ext(msg_tx, IPAC_PROTO_EXT_RSPRO);
62 ipa_msg_push_header(msg_tx, IPAC_PROTO_OSMO);
63 ipa_server_conn_send(conn->peer, msg_tx);
64}
65
66
67/***********************************************************************
68 * per-client connection FSM
69 ***********************************************************************/
70
71static void rspro_client_conn_destroy(struct rspro_client_conn *conn);
72
73enum remsim_server_client_fsm_state {
74 CLNTC_ST_INIT,
75 CLNTC_ST_ESTABLISHED,
Harald Weltee5c77732019-03-07 23:58:24 +010076 CLNTC_ST_WAIT_CONF_RES, /* waiting for ConfigClientRes */
Harald Welte0a64da62019-03-30 17:38:04 +010077 CLNTC_ST_CONNECTED_BANKD,
78 CLNTC_ST_CONNECTED_CLIENT,
Harald Welte65006582022-05-03 16:22:37 +020079 CLNTC_ST_REJECTED,
Harald Weltef5a0fa32019-03-03 15:44:18 +010080};
81
82enum remsim_server_client_event {
83 CLNTC_E_TCP_UP,
84 CLNTC_E_CLIENT_CONN, /* Connect{Client,Bank}Req received */
85 CLNTC_E_BANK_CONN,
86 CLNTC_E_TCP_DOWN,
Harald Welte15b75e12019-03-08 16:55:46 +010087 CLNTC_E_KA_TIMEOUT,
Harald Weltef5a0fa32019-03-03 15:44:18 +010088 CLNTC_E_CREATE_MAP_RES, /* CreateMappingRes received */
89 CLNTC_E_REMOVE_MAP_RES, /* RemoveMappingRes received */
Harald Weltee5c77732019-03-07 23:58:24 +010090 CLNTC_E_CONFIG_CL_RES, /* ConfigClientRes received */
Harald Weltef5a0fa32019-03-03 15:44:18 +010091 CLNTC_E_PUSH, /* drain maps_new or maps_delreq */
Harald Welte4c37f662019-03-31 15:00:00 +020092 CLNTC_E_CL_CFG_BANKD, /* send [new] ConfigConfigBankReq */
Harald Weltef5a0fa32019-03-03 15:44:18 +010093};
94
95static const struct value_string server_client_event_names[] = {
96 OSMO_VALUE_STRING(CLNTC_E_TCP_UP),
97 OSMO_VALUE_STRING(CLNTC_E_CLIENT_CONN),
98 OSMO_VALUE_STRING(CLNTC_E_BANK_CONN),
99 OSMO_VALUE_STRING(CLNTC_E_TCP_DOWN),
Harald Welte15b75e12019-03-08 16:55:46 +0100100 OSMO_VALUE_STRING(CLNTC_E_KA_TIMEOUT),
Harald Weltef5a0fa32019-03-03 15:44:18 +0100101 OSMO_VALUE_STRING(CLNTC_E_CREATE_MAP_RES),
102 OSMO_VALUE_STRING(CLNTC_E_REMOVE_MAP_RES),
Harald Weltee5c77732019-03-07 23:58:24 +0100103 OSMO_VALUE_STRING(CLNTC_E_CONFIG_CL_RES),
Harald Weltef5a0fa32019-03-03 15:44:18 +0100104 OSMO_VALUE_STRING(CLNTC_E_PUSH),
Harald Welte4c37f662019-03-31 15:00:00 +0200105 OSMO_VALUE_STRING(CLNTC_E_CL_CFG_BANKD),
Harald Weltef5a0fa32019-03-03 15:44:18 +0100106 { 0, NULL }
107};
108
109static void clnt_st_init(struct osmo_fsm_inst *fi, uint32_t event, void *data)
110{
111 switch (event) {
112 case CLNTC_E_TCP_UP:
113 osmo_fsm_inst_state_chg(fi, CLNTC_ST_ESTABLISHED, 10, 1);
114 break;
115 default:
116 OSMO_ASSERT(0);
117 }
118}
119
120static void clnt_st_established(struct osmo_fsm_inst *fi, uint32_t event, void *data)
121{
122 struct rspro_client_conn *conn = fi->priv;
Harald Welte65006582022-05-03 16:22:37 +0200123 struct rspro_client_conn *previous_conn;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100124 const RsproPDU_t *pdu = data;
125 const ConnectClientReq_t *cclreq = NULL;
126 const ConnectBankReq_t *cbreq = NULL;
127 RsproPDU_t *resp = NULL;
Harald Weltefb48de82022-04-27 09:15:43 +0200128 char ip_str[INET6_ADDRSTRLEN];
129 char port_str[6];
130
131 /* remote IP and port */
132 osmo_sock_get_ip_and_port(conn->peer->ofd.fd, ip_str, sizeof(ip_str),
133 port_str, sizeof(port_str), false);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100134
135 switch (event) {
136 case CLNTC_E_CLIENT_CONN:
137 cclreq = &pdu->msg.choice.connectClientReq;
138 /* save the [remote] component identity in 'conn' */
139 rspro_comp_id_retrieve(&conn->comp_id, &cclreq->identity);
140 if (conn->comp_id.type != ComponentType_remsimClient) {
Harald Welte15e8b7f2022-04-27 09:24:21 +0200141 LOGPFSML(fi, LOGL_ERROR, "ConnectClientReq from identity != Client ?!?\n");
Harald Weltef5a0fa32019-03-03 15:44:18 +0100142 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_ERROR, NULL);
Harald Welte900ee722022-05-03 16:22:21 +0200143 return;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100144 }
Harald Welte4c37f662019-03-31 15:00:00 +0200145
Harald Welte4c37f662019-03-31 15:00:00 +0200146
Harald Weltee5c77732019-03-07 23:58:24 +0100147 if (!cclreq->clientSlot) {
148#if 0
149 /* FIXME: determine ClientID */
150 resp = rspro_gen_ConnectClientRes(&conn->srv->comp_id, ResultCode_ok);
151 client_conn_send(conn, resp);
152 osmo_fsm_inst_state_chg(fi, CLNTC_ST_WAIT_CL_CONF_RES, 3, 30);
153#else
154 /* FIXME: the original plan was to dynamically assign a ClientID
155 * from server to client here. Send ConfigReq and transition to
156 * CLNTC_ST_WAIT_CONF_RES */
Harald Welte15e8b7f2022-04-27 09:24:21 +0200157 LOGPFSML(fi, LOGL_ERROR, "ConnectClientReq without ClientId not supported yet!\n");
Harald Weltee5c77732019-03-07 23:58:24 +0100158 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_ERROR, NULL);
159#endif
160 } else {
Harald Weltee5c77732019-03-07 23:58:24 +0100161 rspro2client_slot(&conn->client.slot, cclreq->clientSlot);
162 osmo_fsm_inst_update_id_f(fi, "C%u:%u", conn->client.slot.client_id,
163 conn->client.slot.slot_nr);
Harald Welte1c691b12019-03-31 10:58:11 +0200164 osmo_fsm_inst_update_id_f(conn->keepalive_fi, "C%u:%u",
165 conn->client.slot.client_id,
166 conn->client.slot.slot_nr);
Harald Weltefb48de82022-04-27 09:15:43 +0200167 LOGPFSML(fi, LOGL_INFO, "Client connected from %s:%s\n", ip_str, port_str);
Harald Welte65006582022-05-03 16:22:37 +0200168
169 /* check for unique-ness */
170 previous_conn = client_conn_by_slot(conn->srv, &conn->client.slot);
171 if (previous_conn && previous_conn != conn) {
172 /* we're dropping the current (new) connection as we don't really know which
173 * is the "right" one. Dropping the new gives the old connection time to
174 * timeout, or to continue to operate. If we were to drop the old
175 * connection, this could interrupt a perfectly working connection and opens
176 * some kind of DoS. */
177 LOGPFSML(fi, LOGL_ERROR, "New client connection from %s:%s, but we already "
178 "have a connection from %s:%u. Dropping new connection.\n",
179 ip_str, port_str, previous_conn->peer->addr, previous_conn->peer->port);
180 resp = rspro_gen_ConnectClientRes(&conn->srv->comp_id, ResultCode_identityInUse);
181 client_conn_send(conn, resp);
182 osmo_fsm_inst_state_chg(fi, CLNTC_ST_REJECTED, 1, 2);
183 return;
184 }
185
186 /* reparent us from srv->connections to srv->clients */
187 pthread_rwlock_wrlock(&conn->srv->rwlock);
188 llist_del(&conn->list);
189 llist_add_tail(&conn->list, &conn->srv->clients);
190 pthread_rwlock_unlock(&conn->srv->rwlock);
191
Harald Weltee5c77732019-03-07 23:58:24 +0100192 resp = rspro_gen_ConnectClientRes(&conn->srv->comp_id, ResultCode_ok);
193 client_conn_send(conn, resp);
Harald Welte0a64da62019-03-30 17:38:04 +0100194 osmo_fsm_inst_state_chg(fi, CLNTC_ST_CONNECTED_CLIENT, 0, 0);
Harald Weltee5c77732019-03-07 23:58:24 +0100195 }
Harald Weltef5a0fa32019-03-03 15:44:18 +0100196 break;
197 case CLNTC_E_BANK_CONN:
198 cbreq = &pdu->msg.choice.connectBankReq;
199 /* save the [remote] component identity in 'conn' */
200 rspro_comp_id_retrieve(&conn->comp_id, &cbreq->identity);
201 if (conn->comp_id.type != ComponentType_remsimBankd) {
Harald Welte15e8b7f2022-04-27 09:24:21 +0200202 LOGPFSML(fi, LOGL_ERROR, "ConnectBankReq from identity != Bank ?!?\n");
Harald Weltef5a0fa32019-03-03 15:44:18 +0100203 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_ERROR, NULL);
Harald Welte900ee722022-05-03 16:22:21 +0200204 return;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100205 }
206 conn->bank.bank_id = cbreq->bankId;
207 conn->bank.num_slots = cbreq->numberOfSlots;
208 osmo_fsm_inst_update_id_f(fi, "B%u", conn->bank.bank_id);
Harald Welte1c691b12019-03-31 10:58:11 +0200209 osmo_fsm_inst_update_id_f(conn->keepalive_fi, "B%u", conn->bank.bank_id);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100210
Harald Weltefb48de82022-04-27 09:15:43 +0200211 LOGPFSML(fi, LOGL_INFO, "Bankd connected from %s:%s\n", ip_str, port_str);
212 if (!strncmp(ip_str, "127.", 4)) {
213 LOGPFSML(fi, LOGL_NOTICE, "Bankd connected from %s (localhost). "
214 "This only works if your clients also all are on localhost, "
215 "as they must be able to reach the bankd!\n", ip_str);
216 }
217
Harald Welte65006582022-05-03 16:22:37 +0200218 /* check for unique-ness */
219 previous_conn = bankd_conn_by_id(conn->srv, conn->bank.bank_id);
220 if (previous_conn && previous_conn != conn) {
221 /* we're dropping the current (new) connection as we don't really know which
222 * is the "right" one. Dropping the new gives the old connection time to
223 * timeout, or to continue to operate. If we were to drop the old
224 * connection, this could interrupt a perfectly working connection and opens
225 * some kind of DoS. */
226 LOGPFSML(fi, LOGL_ERROR, "New bankd connection from %s:%s, but we already "
227 "have a connection from %s:%u. Dropping new connection.\n",
228 ip_str, port_str, previous_conn->peer->addr, previous_conn->peer->port);
229 resp = rspro_gen_ConnectBankRes(&conn->srv->comp_id, ResultCode_identityInUse);
230 client_conn_send(conn, resp);
231 osmo_fsm_inst_state_chg(fi, CLNTC_ST_REJECTED, 1, 2);
232 return;
233 }
234
Harald Weltef5a0fa32019-03-03 15:44:18 +0100235 /* reparent us from srv->connections to srv->banks */
236 pthread_rwlock_wrlock(&conn->srv->rwlock);
237 llist_del(&conn->list);
238 llist_add_tail(&conn->list, &conn->srv->banks);
239 pthread_rwlock_unlock(&conn->srv->rwlock);
240
241 /* send response to bank first */
242 resp = rspro_gen_ConnectBankRes(&conn->srv->comp_id, ResultCode_ok);
243 client_conn_send(conn, resp);
244
245 /* the state change will associate any pre-existing slotmaps */
Harald Welte0a64da62019-03-30 17:38:04 +0100246 osmo_fsm_inst_state_chg(fi, CLNTC_ST_CONNECTED_BANKD, 0, 0);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100247
248 osmo_fsm_inst_dispatch(fi, CLNTC_E_PUSH, NULL);
249 break;
250 default:
251 OSMO_ASSERT(0);
252 }
253}
254
Harald Weltee5c77732019-03-07 23:58:24 +0100255static void clnt_st_wait_cl_conf_res(struct osmo_fsm_inst *fi, uint32_t event, void *data)
256{
257 switch (event) {
258 case CLNTC_E_CONFIG_CL_RES:
Harald Welte0a64da62019-03-30 17:38:04 +0100259 osmo_fsm_inst_state_chg(fi, CLNTC_ST_CONNECTED_CLIENT, 0, 0);
Harald Weltee5c77732019-03-07 23:58:24 +0100260 break;
261 default:
262 OSMO_ASSERT(0);
263 }
264}
Harald Weltef5a0fa32019-03-03 15:44:18 +0100265
Harald Welte4c37f662019-03-31 15:00:00 +0200266/*! find a connected client (if any) for given slotmap and update its Bankd configuration.
267 * \param[in] map slotmap whose client connection shall be updated
268 * \param[in] srv rspro_server on which we operate
269 * \param[in] bankd_conn bankd connection serving the map (may be NULL if not known)
270 */
271static void _update_client_for_slotmap(struct slot_mapping *map, struct rspro_server *srv,
272 struct rspro_client_conn *bankd_conn)
273{
Harald Welteea3eefe2020-02-16 15:26:35 +0100274 struct rspro_client_conn *conn;
Harald Welte4c37f662019-03-31 15:00:00 +0200275 char ip_str[INET6_ADDRSTRLEN];
276 char port_str[6];
277 uint32_t bankd_ip;
278 int bankd_port;
279 bool changed = false;
280 int rc;
281
282 OSMO_ASSERT(map);
283 OSMO_ASSERT(srv);
284
Harald Welteea3eefe2020-02-16 15:26:35 +0100285 conn = client_conn_by_slot(srv, &map->client);
Harald Welte4c37f662019-03-31 15:00:00 +0200286 if (!conn)
287 LOGP(DMAIN, LOGL_DEBUG, "%s\n", __func__);
288 else
Harald Welte15e8b7f2022-04-27 09:24:21 +0200289 LOGPFSML(conn->fi, LOGL_DEBUG, "%s\n", __func__);
Harald Welte4c37f662019-03-31 15:00:00 +0200290
291 if (!conn)
292 return;
293
294 if (!bank_slot_equals(&conn->client.bankd.slot, &map->bank)) {
Harald Welte15e8b7f2022-04-27 09:24:21 +0200295 LOGPFSML(conn->fi, LOGL_NOTICE, "BankSlot has changed B%u:%u -> B%u:%u\n",
Harald Welte4c37f662019-03-31 15:00:00 +0200296 conn->client.bankd.slot.bank_id, conn->client.bankd.slot.slot_nr,
297 map->bank.bank_id, map->bank.slot_nr);
298 conn->client.bankd.slot = map->bank;
299 changed = true;
300 }
301
302 /* if caller didn't provide bankd_conn, resolve it from map */
303 if (!bankd_conn)
304 bankd_conn = bankd_conn_by_id(srv, map->bank.bank_id);
Harald Welte3598c582020-02-16 15:30:38 +0100305 if (map->state == SLMAP_S_DELETING || !bankd_conn) {
306 bankd_ip = 0;
307 bankd_port = 0;
308 } else {
309 /* obtain IP and port of bankd */
310 rc = osmo_sock_get_ip_and_port(bankd_conn->peer->ofd.fd, ip_str, sizeof(ip_str),
311 port_str, sizeof(port_str), false);
312 if (rc < 0) {
Harald Welte15e8b7f2022-04-27 09:24:21 +0200313 LOGPFSML(bankd_conn->fi, LOGL_ERROR, "Error during getpeername\n");
Harald Welte3598c582020-02-16 15:30:38 +0100314 return;
315 }
316 bankd_ip = ntohl(inet_addr(ip_str));
317 bankd_port = 9999; /* TODO: configurable */
Harald Welte4c37f662019-03-31 15:00:00 +0200318 }
Harald Welte3598c582020-02-16 15:30:38 +0100319
320 /* determine if IP/port of bankd have changed */
Harald Welte4c37f662019-03-31 15:00:00 +0200321 if (conn->client.bankd.port != bankd_port || conn->client.bankd.ip != bankd_ip) {
Harald Welte3598c582020-02-16 15:30:38 +0100322 struct in_addr ia = { .s_addr = bankd_ip };
Harald Welte15e8b7f2022-04-27 09:24:21 +0200323 LOGPFSML(conn->fi, LOGL_NOTICE, "Bankd IP/Port changed to %s:%u\n", inet_ntoa(ia), bankd_port);
Harald Welte4c37f662019-03-31 15:00:00 +0200324 conn->client.bankd.ip = bankd_ip;
325 conn->client.bankd.port = bankd_port;
326 changed = true;
327 }
328
329 /* update the client with new bankd information, if any changes were made */
330 if (changed)
331 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_CL_CFG_BANKD, NULL);
332}
333
Harald Welte0a64da62019-03-30 17:38:04 +0100334static void clnt_st_connected_client_onenter(struct osmo_fsm_inst *fi, uint32_t prev_state)
Harald Weltef5a0fa32019-03-03 15:44:18 +0100335{
Harald Weltef5a0fa32019-03-03 15:44:18 +0100336 struct rspro_client_conn *conn = fi->priv;
Harald Welte4c37f662019-03-31 15:00:00 +0200337 struct slotmaps *slotmaps = conn->srv->slotmaps;
338 struct slot_mapping *map;
339
Harald Welte15e8b7f2022-04-27 09:24:21 +0200340 LOGPFSML(fi, LOGL_DEBUG, "%s\n", __func__);
Harald Welte4c37f662019-03-31 15:00:00 +0200341
342 /* check for an existing slotmap for this client/slot */
343 slotmaps_rdlock(slotmaps);
344 llist_for_each_entry(map, &slotmaps->mappings, list) {
345 if (client_slot_equals(&map->client, &conn->client.slot)) {
346 _update_client_for_slotmap(map, conn->srv, NULL);
347 break;
348 }
349 }
350 slotmaps_unlock(slotmaps);
351#if 0
Harald Weltef5a0fa32019-03-03 15:44:18 +0100352 ClientSlot_t clslot;
353 RsproPDU_t *pdu;
354
355 /* send configuration to this new client */
356 client_slot2rspro(&clslot, FIXME);
357 pdu = rspro_gen_ConfigClientReq(&clslot, bankd_ip, bankd_port);
358 client_conn_send(conn, pdu);
359#endif
360}
361
Harald Welte0a64da62019-03-30 17:38:04 +0100362static void clnt_st_connected_bankd_onenter(struct osmo_fsm_inst *fi, uint32_t prev_state)
Harald Weltef5a0fa32019-03-03 15:44:18 +0100363{
364 struct rspro_client_conn *conn = fi->priv;
365 struct slotmaps *slotmaps = conn->srv->slotmaps;
366 struct slot_mapping *map;
367
Harald Welte15e8b7f2022-04-27 09:24:21 +0200368 LOGPFSML(fi, LOGL_DEBUG, "Associating pre-existing slotmaps (if any)\n");
Harald Weltef5a0fa32019-03-03 15:44:18 +0100369 /* Link all known mappings to this new bank */
370 slotmaps_wrlock(slotmaps);
371 llist_for_each_entry(map, &slotmaps->mappings, list) {
372 if (map->bank.bank_id == conn->bank.bank_id)
373 _slotmap_state_change(map, SLMAP_S_NEW, &conn->bank.maps_new);
374 }
375 slotmaps_unlock(slotmaps);
376}
377
Harald Welte0a64da62019-03-30 17:38:04 +0100378static void clnt_st_connected_client(struct osmo_fsm_inst *fi, uint32_t event, void *data)
Harald Weltef5a0fa32019-03-03 15:44:18 +0100379{
380 struct rspro_client_conn *conn = fi->priv;
Harald Welte4c37f662019-03-31 15:00:00 +0200381 BankSlot_t bslot;
382 RsproPDU_t *tx;
Harald Welte0a64da62019-03-30 17:38:04 +0100383
384 switch (event) {
Harald Welte4c37f662019-03-31 15:00:00 +0200385 case CLNTC_E_CL_CFG_BANKD: /* Send [new] Bankd information to client */
386 bank_slot2rspro(&bslot, &conn->client.bankd.slot);
387 tx = rspro_gen_ConfigClientBankReq(&bslot, conn->client.bankd.ip,
388 conn->client.bankd.port);
389 client_conn_send(conn, tx);
390 break;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100391 default:
392 OSMO_ASSERT(0);
393 }
394}
395
Harald Welte0a64da62019-03-30 17:38:04 +0100396static void clnt_st_connected_bankd(struct osmo_fsm_inst *fi, uint32_t event, void *data)
Harald Weltef5a0fa32019-03-03 15:44:18 +0100397{
398 struct rspro_client_conn *conn = fi->priv;
399 struct slotmaps *slotmaps = conn->srv->slotmaps;
Harald Welte35ded292019-03-31 15:13:09 +0200400 const __attribute__((unused)) RsproPDU_t *rx = NULL;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100401 struct slot_mapping *map, *map2;
402
403 switch (event) {
Harald Welte1b07f7f2019-03-30 17:33:07 +0100404 case CLNTC_E_CREATE_MAP_RES: /* Bankd acknowledges mapping was created */
Harald Weltef5a0fa32019-03-03 15:44:18 +0100405 rx = data;
406 slotmaps_wrlock(slotmaps);
407 /* FIXME: resolve map by pdu->tag */
408 /* as hack use first element of conn->maps_unack */
409 map = llist_first_entry(&conn->bank.maps_unack, struct slot_mapping, bank_list);
410 if (!map) {
411 slotmaps_unlock(slotmaps);
Harald Welte15e8b7f2022-04-27 09:24:21 +0200412 LOGPFSML(fi, LOGL_NOTICE, "CreateMapRes but no unacknowledged map");
Harald Weltef5a0fa32019-03-03 15:44:18 +0100413 break;
414 }
415 _slotmap_state_change(map, SLMAP_S_ACTIVE, &conn->bank.maps_active);
416 slotmaps_unlock(slotmaps);
Harald Welte4c37f662019-03-31 15:00:00 +0200417 _update_client_for_slotmap(map, conn->srv, conn);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100418 break;
Harald Welte1b07f7f2019-03-30 17:33:07 +0100419 case CLNTC_E_REMOVE_MAP_RES: /* Bankd acknowledges mapping was removed */
Harald Weltef5a0fa32019-03-03 15:44:18 +0100420 rx = data;
421 slotmaps_wrlock(slotmaps);
422 /* FIXME: resolve map by pdu->tag */
423 /* as hack use first element of conn->maps_deleting */
424 map = llist_first_entry(&conn->bank.maps_deleting, struct slot_mapping, bank_list);
425 if (!map) {
426 slotmaps_unlock(slotmaps);
Harald Welte15e8b7f2022-04-27 09:24:21 +0200427 LOGPFSML(fi, LOGL_NOTICE, "RemoveMapRes but no unacknowledged map");
Harald Weltef5a0fa32019-03-03 15:44:18 +0100428 break;
429 }
430 slotmaps_unlock(slotmaps);
Harald Welte3598c582020-02-16 15:30:38 +0100431 /* update client! */
432 OSMO_ASSERT(map->state == SLMAP_S_DELETING);
433 _update_client_for_slotmap(map, conn->srv, conn);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100434 /* slotmap_del() will remove it from both global and bank list */
435 slotmap_del(map->maps, map);
436 break;
Harald Welte1b07f7f2019-03-30 17:33:07 +0100437 case CLNTC_E_PUSH: /* check if any create or delete requests are pending */
Harald Weltef5a0fa32019-03-03 15:44:18 +0100438 slotmaps_wrlock(slotmaps);
439 /* send any pending create requests */
440 llist_for_each_entry_safe(map, map2, &conn->bank.maps_new, bank_list) {
441 RsproPDU_t *pdu = slotmap2CreateMappingReq(map);
442 client_conn_send(conn, pdu);
443 _slotmap_state_change(map, SLMAP_S_UNACKNOWLEDGED, &conn->bank.maps_unack);
444 }
445 /* send any pending delete requests */
446 llist_for_each_entry_safe(map, map2, &conn->bank.maps_delreq, bank_list) {
447 RsproPDU_t *pdu = slotmap2RemoveMappingReq(map);
448 client_conn_send(conn, pdu);
449 _slotmap_state_change(map, SLMAP_S_DELETING, &conn->bank.maps_deleting);
450 }
451 slotmaps_unlock(slotmaps);
452 break;
453 default:
454 OSMO_ASSERT(0);
455 }
456}
457
458static void clnt_allstate_action(struct osmo_fsm_inst *fi, uint32_t event, void *data)
459{
Harald Welte35ded292019-03-31 15:13:09 +0200460 //struct rspro_client_conn *conn = fi->priv;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100461
462 switch (event) {
463 case CLNTC_E_TCP_DOWN:
Harald Weltee1590df2022-04-27 09:19:48 +0200464 LOGPFSML(fi, LOGL_NOTICE, "Connection lost; terminating FSM\n");
Harald Weltef5a0fa32019-03-03 15:44:18 +0100465 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, NULL);
466 break;
Harald Welte15b75e12019-03-08 16:55:46 +0100467 case CLNTC_E_KA_TIMEOUT:
Harald Weltee1590df2022-04-27 09:19:48 +0200468 LOGPFSML(fi, LOGL_NOTICE, "IPA keep-alive timeout; terminating FSM\n");
Harald Welte15b75e12019-03-08 16:55:46 +0100469 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, NULL);
470 break;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100471 default:
472 OSMO_ASSERT(0);
473 }
474}
475
476static int server_client_fsm_timer_cb(struct osmo_fsm_inst *fi)
477{
Harald Welte35ded292019-03-31 15:13:09 +0200478 //struct rspro_client_conn *conn = fi->priv;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100479
480 switch (fi->T) {
481 case 1:
482 /* No ClientConnectReq received:disconnect */
483 return 1; /* ask core to terminate FSM */
Harald Welte65006582022-05-03 16:22:37 +0200484 case 2:
485 /* Timeout after rejecting client */
486 LOGPFSML(fi, LOGL_NOTICE, "Closing connection of rejected peer\n");
487 return 1; /* ask core to terminate FSM */
Harald Weltef5a0fa32019-03-03 15:44:18 +0100488 default:
489 OSMO_ASSERT(0);
490 }
491 return 0;
492}
493
494static void server_client_cleanup(struct osmo_fsm_inst *fi, enum osmo_fsm_term_cause cause)
495{
496 struct rspro_client_conn *conn = fi->priv;
497 /* this call will destroy the IPA connection, which will in turn call closed_cb()
498 * which will try to deliver a E_TCP_DOWN event. Clear conn->fi to avoid that loop */
499 conn->fi = NULL;
500 rspro_client_conn_destroy(conn);
501}
502
503static const struct osmo_fsm_state server_client_fsm_states[] = {
504 [CLNTC_ST_INIT] = {
505 .name = "INIT",
506 .in_event_mask = S(CLNTC_E_TCP_UP),
507 .out_state_mask = S(CLNTC_ST_ESTABLISHED),
508 .action = clnt_st_init,
509 },
510 [CLNTC_ST_ESTABLISHED] = {
511 .name = "ESTABLISHED",
512 .in_event_mask = S(CLNTC_E_CLIENT_CONN) | S(CLNTC_E_BANK_CONN),
Harald Welte0a64da62019-03-30 17:38:04 +0100513 .out_state_mask = S(CLNTC_ST_CONNECTED_CLIENT) | S(CLNTC_ST_WAIT_CONF_RES) |
Harald Welte65006582022-05-03 16:22:37 +0200514 S(CLNTC_ST_CONNECTED_BANKD) | S(CLNTC_ST_REJECTED),
Harald Weltef5a0fa32019-03-03 15:44:18 +0100515 .action = clnt_st_established,
516 },
Harald Weltee5c77732019-03-07 23:58:24 +0100517 [CLNTC_ST_WAIT_CONF_RES] = {
518 .name = "WAIT_CONFIG_RES",
519 .in_event_mask = S(CLNTC_E_CONFIG_CL_RES),
Harald Welte0a64da62019-03-30 17:38:04 +0100520 .out_state_mask = S(CLNTC_ST_CONNECTED_CLIENT),
Harald Weltee5c77732019-03-07 23:58:24 +0100521 .action = clnt_st_wait_cl_conf_res,
522 },
Harald Welte0a64da62019-03-30 17:38:04 +0100523 [CLNTC_ST_CONNECTED_CLIENT] = {
524 .name = "CONNECTED_CLIENT",
Harald Welte4c37f662019-03-31 15:00:00 +0200525 .in_event_mask = S(CLNTC_E_CL_CFG_BANKD),
Harald Welte0a64da62019-03-30 17:38:04 +0100526 .action = clnt_st_connected_client,
527 .onenter = clnt_st_connected_client_onenter,
528 },
529 [CLNTC_ST_CONNECTED_BANKD] = {
530 .name = "CONNECTED_BANKD",
Harald Weltef5a0fa32019-03-03 15:44:18 +0100531 .in_event_mask = S(CLNTC_E_CREATE_MAP_RES) | S(CLNTC_E_REMOVE_MAP_RES) |
532 S(CLNTC_E_PUSH),
Harald Welte0a64da62019-03-30 17:38:04 +0100533 .action = clnt_st_connected_bankd,
534 .onenter = clnt_st_connected_bankd_onenter,
Harald Weltef5a0fa32019-03-03 15:44:18 +0100535 },
Harald Welte65006582022-05-03 16:22:37 +0200536 [CLNTC_ST_REJECTED] = {
537 .name = "REJECTED",
538 /* no events permitted, no action required */
539 }
Harald Welte0a64da62019-03-30 17:38:04 +0100540
Harald Weltef5a0fa32019-03-03 15:44:18 +0100541};
542
543static struct osmo_fsm remsim_server_client_fsm = {
544 .name = "SERVER_CONN",
545 .states = server_client_fsm_states,
546 .num_states = ARRAY_SIZE(server_client_fsm_states),
Harald Welte10f7a762019-03-31 12:38:47 +0200547 .allstate_event_mask = S(CLNTC_E_TCP_DOWN) | S(CLNTC_E_KA_TIMEOUT),
Harald Weltef5a0fa32019-03-03 15:44:18 +0100548 .allstate_action = clnt_allstate_action,
549 .cleanup = server_client_cleanup,
550 .timer_cb = server_client_fsm_timer_cb,
551 .log_subsys = DMAIN,
552 .event_names = server_client_event_names,
553};
554
555struct osmo_fsm_inst *server_client_fsm_alloc(void *ctx, struct rspro_client_conn *conn)
556{
557 //const char *id = osmo_sock_get_name2(conn->peer->ofd.fd);
558 return osmo_fsm_inst_alloc(&remsim_server_client_fsm, ctx, conn, LOGL_DEBUG, NULL);
559}
560
561
562static __attribute__((constructor)) void on_dso_load(void)
563{
Harald Welte4ccd2fc2019-12-01 13:32:54 +0100564 OSMO_ASSERT(osmo_fsm_register(&remsim_server_client_fsm) == 0);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100565}
566
567
568/***********************************************************************
569 * IPA RSPRO Server
570 ***********************************************************************/
571
Harald Weltef30ff9e2019-03-30 19:17:37 +0100572struct rspro_client_conn *_client_conn_by_slot(struct rspro_server *srv, const struct client_slot *cslot)
573{
574 struct rspro_client_conn *conn;
575 llist_for_each_entry(conn, &srv->clients, list) {
576 if (client_slot_equals(&conn->client.slot, cslot))
577 return conn;
578 }
579 return NULL;
580}
581struct rspro_client_conn *client_conn_by_slot(struct rspro_server *srv, const struct client_slot *cslot)
582{
583 struct rspro_client_conn *conn;
584 pthread_rwlock_rdlock(&srv->rwlock);
585 conn = _client_conn_by_slot(srv, cslot);
586 pthread_rwlock_unlock(&srv->rwlock);
587 return conn;
588}
589
Harald Weltef5a0fa32019-03-03 15:44:18 +0100590struct rspro_client_conn *_bankd_conn_by_id(struct rspro_server *srv, uint16_t bank_id)
591{
592 struct rspro_client_conn *conn;
593 llist_for_each_entry(conn, &srv->banks, list) {
594 if (conn->bank.bank_id == bank_id)
595 return conn;
596 }
597 return NULL;
598}
599struct rspro_client_conn *bankd_conn_by_id(struct rspro_server *srv, uint16_t bank_id)
600{
601 struct rspro_client_conn *conn;
602 pthread_rwlock_rdlock(&srv->rwlock);
603 conn = _bankd_conn_by_id(srv, bank_id);
604 pthread_rwlock_unlock(&srv->rwlock);
605 return conn;
606}
607
608static int handle_rx_rspro(struct rspro_client_conn *conn, const RsproPDU_t *pdu)
609{
Harald Welte15e8b7f2022-04-27 09:24:21 +0200610 LOGPFSML(conn->fi, LOGL_DEBUG, "Rx RSPRO %s\n", rspro_msgt_name(pdu));
Harald Welteb49ac9c2019-03-09 20:36:07 +0100611
Harald Weltef5a0fa32019-03-03 15:44:18 +0100612 switch (pdu->msg.present) {
613 case RsproPDUchoice_PR_connectClientReq:
614 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_CLIENT_CONN, (void *)pdu);
615 break;
616 case RsproPDUchoice_PR_connectBankReq:
617 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_BANK_CONN, (void *)pdu);
618 break;
619 case RsproPDUchoice_PR_createMappingRes:
620 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_CREATE_MAP_RES, (void *)pdu);
621 break;
622 case RsproPDUchoice_PR_removeMappingRes:
623 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_REMOVE_MAP_RES, (void *)pdu);
624 break;
Harald Welted571a3e2019-03-11 22:09:50 +0100625 case RsproPDUchoice_PR_configClientIdRes:
Harald Weltee5c77732019-03-07 23:58:24 +0100626 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_CONFIG_CL_RES, (void *)pdu);
627 break;
Harald Welte19dee082019-03-31 10:53:45 +0200628 case RsproPDUchoice_PR_configClientBankRes:
629 /* TODO: store somewhere that client has ACKed? */
630 break;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100631 default:
Harald Welte19dee082019-03-31 10:53:45 +0200632 LOGPFSML(conn->fi, LOGL_ERROR, "Received unknown/unimplemented RSPRO msg_type %s\n",
633 rspro_msgt_name(pdu));
Harald Weltef5a0fa32019-03-03 15:44:18 +0100634 return -1;
635 }
636 return 0;
637}
638
639/* data was received from one of the client connections to the RSPRO socket */
640static int sock_read_cb(struct ipa_server_conn *peer, struct msgb *msg)
641{
642 struct ipaccess_head *hh = (struct ipaccess_head *) msg->data;
643 struct ipaccess_head_ext *he = (struct ipaccess_head_ext *) msgb_l2(msg);
644 struct rspro_client_conn *conn = peer->data;
645 RsproPDU_t *pdu;
646 int rc;
647
648 if (msgb_length(msg) < sizeof(*hh))
649 goto invalid;
650 msg->l2h = &hh->data[0];
Harald Welte7bfcc652019-03-08 16:55:01 +0100651 switch (hh->proto) {
652 case IPAC_PROTO_IPACCESS:
653 rc = ipa_server_conn_ccm(peer, msg);
Harald Welte15b75e12019-03-08 16:55:46 +0100654 if (rc < 0)
655 break;
656 switch (hh->data[0]) {
657 case IPAC_MSGT_PONG:
658 ipa_keepalive_fsm_pong_received(conn->keepalive_fi);
659 rc = 0;
660 break;
661 default:
662 break;
663 }
Harald Welte7bfcc652019-03-08 16:55:01 +0100664 break;
665 case IPAC_PROTO_OSMO:
666 if (!he || msgb_l2len(msg)< sizeof(*he))
667 goto invalid;
668 msg->l2h = &he->data[0];
Harald Weltef5a0fa32019-03-03 15:44:18 +0100669
Harald Welte7bfcc652019-03-08 16:55:01 +0100670 switch (he->proto) {
671 case IPAC_PROTO_EXT_RSPRO:
672 pdu = rspro_dec_msg(msg);
673 if (!pdu)
674 goto invalid;
Harald Weltef5a0fa32019-03-03 15:44:18 +0100675
Harald Welte7bfcc652019-03-08 16:55:01 +0100676 rc = handle_rx_rspro(conn, pdu);
677 ASN_STRUCT_FREE(asn_DEF_RsproPDU, pdu);
678 break;
679 default:
680 goto invalid;
681 }
682 break;
683 default:
Harald Weltef5a0fa32019-03-03 15:44:18 +0100684 goto invalid;
Harald Welte7bfcc652019-03-08 16:55:01 +0100685 }
Harald Welte6b990f92019-07-18 18:16:33 +0200686 msgb_free(msg);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100687 return rc;
688
689invalid:
690 msgb_free(msg);
691 return -1;
692}
693
694static int sock_closed_cb(struct ipa_server_conn *peer)
695{
696 struct rspro_client_conn *conn = peer->data;
697 if (conn->fi)
698 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_TCP_DOWN, NULL);
699 /* FIXME: who cleans up conn? */
700 /* ipa server code relases 'peer' just after this */
701 return 0;
702}
703
Harald Welte15b75e12019-03-08 16:55:46 +0100704static const struct ipa_keepalive_params ka_params = {
705 .interval = 30,
706 .wait_for_resp = 10,
707};
708
Harald Weltef5a0fa32019-03-03 15:44:18 +0100709/* a new TCP connection was accepted on the RSPRO server socket */
710static int accept_cb(struct ipa_server_link *link, int fd)
711{
712 struct rspro_server *srv = link->data;
713 struct rspro_client_conn *conn;
714
715 conn = talloc_zero(srv, struct rspro_client_conn);
716 OSMO_ASSERT(conn);
717
718 conn->srv = srv;
719 /* don't allocate peer under 'conn', as it must survive 'conn' during teardown */
720 conn->peer = ipa_server_conn_create(link, link, fd, sock_read_cb, sock_closed_cb, conn);
721 if (!conn->peer)
722 goto out_err;
723
724 /* don't allocate 'fi' as slave from 'conn', as 'fi' needs to survive 'conn' during
725 * teardown */
726 conn->fi = server_client_fsm_alloc(srv, conn);
727 if (!conn->fi)
728 goto out_err_conn;
729
Harald Welte15b75e12019-03-08 16:55:46 +0100730 /* use ipa_keepalive_fsm to periodically send an IPA_PING and expect a PONG in response */
731 conn->keepalive_fi = ipa_server_conn_alloc_keepalive_fsm(conn->peer, &ka_params, NULL);
732 if (!conn->keepalive_fi)
733 goto out_err_fi;
734 /* ensure parent is notified once keepalive FSM instance is dying */
735 osmo_fsm_inst_change_parent(conn->keepalive_fi, conn->fi, CLNTC_E_KA_TIMEOUT);
736 ipa_keepalive_fsm_start(conn->keepalive_fi);
737
Harald Weltef5a0fa32019-03-03 15:44:18 +0100738 INIT_LLIST_HEAD(&conn->bank.maps_new);
739 INIT_LLIST_HEAD(&conn->bank.maps_unack);
740 INIT_LLIST_HEAD(&conn->bank.maps_active);
741 INIT_LLIST_HEAD(&conn->bank.maps_delreq);
742 INIT_LLIST_HEAD(&conn->bank.maps_deleting);
743
744 pthread_rwlock_wrlock(&conn->srv->rwlock);
745 llist_add_tail(&conn->list, &srv->connections);
746 pthread_rwlock_unlock(&conn->srv->rwlock);
747
748 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_TCP_UP, NULL);
749 return 0;
750
Harald Welte15b75e12019-03-08 16:55:46 +0100751out_err_fi:
752 osmo_fsm_inst_term(conn->fi, OSMO_FSM_TERM_ERROR, NULL);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100753out_err_conn:
754 ipa_server_conn_destroy(conn->peer);
755 /* the above will free 'conn' down the chain */
756 return -1;
757out_err:
758 talloc_free(conn);
759 return -1;
760}
761
762/* call-back if we were triggered by a rest_api thread */
763int event_fd_cb(struct osmo_fd *ofd, unsigned int what)
764{
765 struct rspro_server *srv = ofd->data;
766 struct rspro_client_conn *conn;
767 bool non_empty_new, non_empty_del;
768 uint64_t value;
769 int rc;
770
771 /* read from the socket to "confirm" the event and make it non-readable again */
772 rc = read(ofd->fd, &value, 8);
773 if (rc < 8) {
Harald Weltea9d7ad12021-12-08 21:09:12 +0100774 LOGP(DMAIN, LOGL_ERROR, "Error reading eventfd: %d\n", rc);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100775 return rc;
776 }
777
Harald Weltea9d7ad12021-12-08 21:09:12 +0100778 LOGP(DMAIN, LOGL_INFO, "Event FD arrived, checking for any pending work\n");
Harald Weltef5a0fa32019-03-03 15:44:18 +0100779
780 pthread_rwlock_rdlock(&srv->rwlock);
781 llist_for_each_entry(conn, &srv->banks, list) {
782 slotmaps_rdlock(srv->slotmaps);
783 non_empty_new = llist_empty(&conn->bank.maps_new);
784 non_empty_del = llist_empty(&conn->bank.maps_delreq);
785 slotmaps_unlock(srv->slotmaps);
786
787 /* trigger FSM to send any pending new/deleted maps */
788 if (non_empty_new || non_empty_del)
789 osmo_fsm_inst_dispatch(conn->fi, CLNTC_E_PUSH, NULL);
790 }
791 pthread_rwlock_unlock(&srv->rwlock);
792
793 return 0;
794}
795
796/* unlink all slotmaps from any of the lists of this conn->bank.maps_* */
797static void _unlink_all_slotmaps(struct rspro_client_conn *conn)
798{
799 struct slot_mapping *smap, *smap2;
800
801 llist_for_each_entry_safe(smap, smap2, &conn->bank.maps_new, bank_list) {
802 /* unlink from list and keep in state NEW */
803 _slotmap_state_change(smap, SLMAP_S_NEW, NULL);
804 }
805 llist_for_each_entry_safe(smap, smap2, &conn->bank.maps_unack, bank_list) {
806 /* unlink from list and change to state NEW */
807 _slotmap_state_change(smap, SLMAP_S_NEW, NULL);
808 }
809 llist_for_each_entry_safe(smap, smap2, &conn->bank.maps_active, bank_list) {
810 /* unlink from list and change to state NEW */
811 _slotmap_state_change(smap, SLMAP_S_NEW, NULL);
812 }
813 llist_for_each_entry_safe(smap, smap2, &conn->bank.maps_delreq, bank_list) {
814 /* unlink from list and delete */
815 _slotmap_del(smap->maps, smap);
816 }
817 llist_for_each_entry_safe(smap, smap2, &conn->bank.maps_deleting, bank_list) {
818 /* unlink from list and delete */
819 _slotmap_del(smap->maps, smap);
820 }
821}
822
823/* only to be used by the FSM cleanup. */
824static void rspro_client_conn_destroy(struct rspro_client_conn *conn)
825{
826 /* this will internally call closed_cb() which will dispatch a TCP_DOWN event */
827 ipa_server_conn_destroy(conn->peer);
828 conn->peer = NULL;
829
830 /* ensure all slotmaps are unlinked + returned to NEW or deleted */
831 slotmaps_wrlock(conn->srv->slotmaps);
832 _unlink_all_slotmaps(conn);
833 slotmaps_unlock(conn->srv->slotmaps);
834
835 pthread_rwlock_wrlock(&conn->srv->rwlock);
836 llist_del(&conn->list);
837 pthread_rwlock_unlock(&conn->srv->rwlock);
838
839 talloc_free(conn);
840}
841
842
843struct rspro_server *rspro_server_create(void *ctx, const char *host, uint16_t port)
844
845{
846 struct rspro_server *srv = talloc_zero(ctx, struct rspro_server);
847 OSMO_ASSERT(srv);
848
849 pthread_rwlock_init(&srv->rwlock, NULL);
850 pthread_rwlock_wrlock(&srv->rwlock);
851 INIT_LLIST_HEAD(&srv->connections);
852 INIT_LLIST_HEAD(&srv->clients);
853 INIT_LLIST_HEAD(&srv->banks);
854 pthread_rwlock_unlock(&srv->rwlock);
855
856 srv->link = ipa_server_link_create(ctx, NULL, host, port, accept_cb, srv);
Harald Weltea04ff862022-05-03 16:40:45 +0200857 if (!srv->link) {
858 talloc_free(srv);
859 return NULL;
860 }
861
Harald Weltef5a0fa32019-03-03 15:44:18 +0100862 ipa_server_link_open(srv->link);
863
864 return srv;
865}
866
867void rspro_server_destroy(struct rspro_server *srv)
868{
869 /* FIXME: clear all lists */
870
871 ipa_server_link_destroy(srv->link);
872 srv->link = NULL;
Harald Weltea04ff862022-05-03 16:40:45 +0200873 pthread_rwlock_destroy(&srv->rwlock);
Harald Weltef5a0fa32019-03-03 15:44:18 +0100874 talloc_free(srv);
875}