2012-06-04 16:48:31 +02:00
|
|
|
/*
|
2014-03-30 12:09:21 +02:00
|
|
|
* nghttp2 - HTTP/2 C Library
|
2012-06-04 16:48:31 +02:00
|
|
|
*
|
|
|
|
* Copyright (c) 2012 Tatsuhiro Tsujikawa
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
* a copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
2015-01-08 13:48:39 +01:00
|
|
|
#include "shrpx_connection_handler.h"
|
2012-06-04 16:48:31 +02:00
|
|
|
|
2012-06-08 14:40:03 +02:00
|
|
|
#include <unistd.h>
|
2012-06-05 18:26:04 +02:00
|
|
|
|
|
|
|
#include <cerrno>
|
2013-08-19 17:07:01 +02:00
|
|
|
#include <thread>
|
2012-06-05 18:26:04 +02:00
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
#include "shrpx_client_handler.h"
|
2012-06-05 18:26:04 +02:00
|
|
|
#include "shrpx_ssl.h"
|
|
|
|
#include "shrpx_worker.h"
|
2012-11-18 13:23:13 +01:00
|
|
|
#include "shrpx_config.h"
|
2013-11-04 09:53:57 +01:00
|
|
|
#include "shrpx_http2_session.h"
|
2014-08-19 16:36:04 +02:00
|
|
|
#include "shrpx_connect_blocker.h"
|
2014-10-13 14:09:00 +02:00
|
|
|
#include "shrpx_downstream_connection.h"
|
2014-12-27 18:59:06 +01:00
|
|
|
#include "shrpx_accept_handler.h"
|
2014-06-26 15:55:22 +02:00
|
|
|
#include "util.h"
|
2015-02-05 15:21:53 +01:00
|
|
|
#include "template.h"
|
2014-06-26 15:55:22 +02:00
|
|
|
|
|
|
|
using namespace nghttp2;
|
2012-06-04 16:48:31 +02:00
|
|
|
|
|
|
|
namespace shrpx {
|
|
|
|
|
2014-08-27 15:34:00 +02:00
|
|
|
namespace {
|
2014-12-27 18:59:06 +01:00
|
|
|
void acceptor_disable_cb(struct ev_loop *loop, ev_timer *w, int revent) {
|
2015-01-08 13:48:39 +01:00
|
|
|
auto h = static_cast<ConnectionHandler *>(w->data);
|
2014-08-27 15:34:00 +02:00
|
|
|
|
|
|
|
// If we are in graceful shutdown period, we must not enable
|
2015-01-08 13:48:39 +01:00
|
|
|
// acceptors again.
|
2015-02-25 14:53:23 +01:00
|
|
|
if (h->get_graceful_shutdown()) {
|
2014-08-27 15:34:00 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
h->enable_acceptor();
|
2014-08-27 15:34:00 +02:00
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
2015-03-30 16:20:40 +02:00
|
|
|
namespace {
|
|
|
|
void ocsp_cb(struct ev_loop *loop, ev_timer *w, int revent) {
|
|
|
|
auto h = static_cast<ConnectionHandler *>(w->data);
|
|
|
|
|
|
|
|
// If we are in graceful shutdown period, we won't do ocsp query.
|
|
|
|
if (h->get_graceful_shutdown()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
h->update_ocsp_async();
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
2015-01-12 16:18:27 +01:00
|
|
|
ConnectionHandler::ConnectionHandler(struct ev_loop *loop)
|
2015-02-25 14:53:23 +01:00
|
|
|
: single_worker_(nullptr), loop_(loop), worker_round_robin_cnt_(0),
|
|
|
|
graceful_shutdown_(false) {
|
2014-12-27 18:59:06 +01:00
|
|
|
ev_timer_init(&disable_acceptor_timer_, acceptor_disable_cb, 0., 0.);
|
|
|
|
disable_acceptor_timer_.data = this;
|
2015-03-30 16:20:40 +02:00
|
|
|
|
|
|
|
ev_timer_init(&ocsp_timer_, ocsp_cb, 0., 0.);
|
|
|
|
ocsp_timer_.data = this;
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
2014-11-27 15:39:04 +01:00
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
ConnectionHandler::~ConnectionHandler() {
|
2014-12-27 18:59:06 +01:00
|
|
|
ev_timer_stop(loop_, &disable_acceptor_timer_);
|
2015-03-30 16:20:40 +02:00
|
|
|
ev_timer_stop(loop_, &ocsp_timer_);
|
2014-03-09 06:53:28 +01:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::worker_reopen_log_files() {
|
2014-07-05 11:22:40 +02:00
|
|
|
WorkerEvent wev;
|
|
|
|
|
|
|
|
memset(&wev, 0, sizeof(wev));
|
|
|
|
wev.type = REOPEN_LOG;
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
for (auto &worker : workers_) {
|
|
|
|
worker->send(wev);
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::worker_renew_ticket_keys(
|
2015-01-08 13:15:45 +01:00
|
|
|
const std::shared_ptr<TicketKeys> &ticket_keys) {
|
|
|
|
WorkerEvent wev;
|
|
|
|
|
|
|
|
memset(&wev, 0, sizeof(wev));
|
|
|
|
wev.type = RENEW_TICKET_KEYS;
|
|
|
|
wev.ticket_keys = ticket_keys;
|
|
|
|
|
|
|
|
for (auto &worker : workers_) {
|
|
|
|
worker->send(wev);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
void ConnectionHandler::create_single_worker() {
|
|
|
|
auto cert_tree = ssl::create_cert_lookup_tree();
|
2015-03-30 16:20:40 +02:00
|
|
|
auto sv_ssl_ctx = ssl::setup_server_ssl_context(all_ssl_ctx_, cert_tree);
|
2015-02-11 11:18:41 +01:00
|
|
|
auto cl_ssl_ctx = ssl::setup_client_ssl_context();
|
|
|
|
|
|
|
|
single_worker_ = make_unique<Worker>(loop_, sv_ssl_ctx, cl_ssl_ctx, cert_tree,
|
|
|
|
ticket_keys_);
|
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::create_worker_thread(size_t num) {
|
2014-08-17 11:50:10 +02:00
|
|
|
#ifndef NOTHREADS
|
2014-12-27 18:59:06 +01:00
|
|
|
assert(workers_.size() == 0);
|
2014-07-05 11:22:40 +02:00
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
SSL_CTX *sv_ssl_ctx = nullptr, *cl_ssl_ctx = nullptr;
|
|
|
|
ssl::CertLookupTree *cert_tree = nullptr;
|
|
|
|
|
|
|
|
if (!get_config()->tls_ctx_per_worker) {
|
|
|
|
cert_tree = ssl::create_cert_lookup_tree();
|
2015-03-30 16:20:40 +02:00
|
|
|
sv_ssl_ctx = ssl::setup_server_ssl_context(all_ssl_ctx_, cert_tree);
|
2015-02-11 11:18:41 +01:00
|
|
|
cl_ssl_ctx = ssl::setup_client_ssl_context();
|
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
for (size_t i = 0; i < num; ++i) {
|
2015-02-11 11:18:41 +01:00
|
|
|
auto loop = ev_loop_new(0);
|
|
|
|
|
|
|
|
if (get_config()->tls_ctx_per_worker) {
|
|
|
|
cert_tree = ssl::create_cert_lookup_tree();
|
2015-03-30 16:20:40 +02:00
|
|
|
std::vector<SSL_CTX *> all_ssl_ctx;
|
|
|
|
sv_ssl_ctx = ssl::setup_server_ssl_context(all_ssl_ctx, cert_tree);
|
2015-02-11 11:18:41 +01:00
|
|
|
cl_ssl_ctx = ssl::setup_client_ssl_context();
|
|
|
|
}
|
|
|
|
|
|
|
|
auto worker = make_unique<Worker>(loop, sv_ssl_ctx, cl_ssl_ctx, cert_tree,
|
|
|
|
ticket_keys_);
|
|
|
|
worker->run_async();
|
|
|
|
workers_.push_back(std::move(worker));
|
2014-07-05 11:22:40 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2014-07-05 11:22:40 +02:00
|
|
|
LLOG(INFO, this) << "Created thread #" << workers_.size() - 1;
|
2012-06-05 18:26:04 +02:00
|
|
|
}
|
|
|
|
}
|
2014-08-17 11:50:10 +02:00
|
|
|
#endif // NOTHREADS
|
2012-06-05 18:26:04 +02:00
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::join_worker() {
|
2014-08-17 11:50:10 +02:00
|
|
|
#ifndef NOTHREADS
|
2014-08-12 15:22:02 +02:00
|
|
|
int n = 0;
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2014-08-12 15:22:02 +02:00
|
|
|
LLOG(INFO, this) << "Waiting for worker thread to join: n="
|
|
|
|
<< workers_.size();
|
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
for (auto &worker : workers_) {
|
2014-12-27 18:59:06 +01:00
|
|
|
worker->wait();
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2014-08-12 15:22:02 +02:00
|
|
|
LLOG(INFO, this) << "Thread #" << n << " joined";
|
|
|
|
}
|
|
|
|
++n;
|
|
|
|
}
|
2014-08-17 11:50:10 +02:00
|
|
|
#endif // NOTHREADS
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::graceful_shutdown_worker() {
|
2014-11-27 15:39:04 +01:00
|
|
|
if (get_config()->num_worker == 1) {
|
2014-08-12 15:22:02 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-01-08 14:23:30 +01:00
|
|
|
WorkerEvent wev;
|
|
|
|
memset(&wev, 0, sizeof(wev));
|
|
|
|
wev.type = GRACEFUL_SHUTDOWN;
|
2014-08-12 15:22:02 +02:00
|
|
|
|
2015-01-08 14:23:30 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
LLOG(INFO, this) << "Sending graceful shutdown signal to worker";
|
|
|
|
}
|
|
|
|
|
|
|
|
for (auto &worker : workers_) {
|
2014-08-12 15:22:02 +02:00
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
worker->send(wev);
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
int ConnectionHandler::handle_connection(int fd, sockaddr *addr, int addrlen) {
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
LLOG(INFO, this) << "Accepted connection. fd=" << fd;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2014-08-12 15:22:02 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
if (get_config()->num_worker == 1) {
|
2014-06-26 15:55:22 +02:00
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
if (single_worker_->get_worker_stat()->num_connections >=
|
2014-11-27 15:39:04 +01:00
|
|
|
get_config()->worker_frontend_connections) {
|
2014-06-26 15:55:22 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2014-12-27 18:59:06 +01:00
|
|
|
LLOG(INFO, this) << "Too many connections >="
|
2014-06-26 15:55:22 +02:00
|
|
|
<< get_config()->worker_frontend_connections;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
auto client =
|
|
|
|
ssl::accept_connection(single_worker_.get(), fd, addr, addrlen);
|
2014-11-27 15:39:04 +01:00
|
|
|
if (!client) {
|
2013-09-24 16:17:53 +02:00
|
|
|
LLOG(ERROR, this) << "ClientHandler creation failed";
|
2014-06-26 15:55:22 +02:00
|
|
|
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
2013-09-24 16:17:53 +02:00
|
|
|
}
|
2014-06-26 15:55:22 +02:00
|
|
|
|
2014-03-09 06:53:28 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2014-07-05 11:22:40 +02:00
|
|
|
size_t idx = worker_round_robin_cnt_ % workers_.size();
|
2015-02-11 11:18:41 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
LOG(INFO) << "Dispatch connection to worker #" << idx;
|
|
|
|
}
|
2014-03-09 06:53:28 +01:00
|
|
|
++worker_round_robin_cnt_;
|
|
|
|
WorkerEvent wev;
|
|
|
|
memset(&wev, 0, sizeof(wev));
|
2014-07-05 11:22:40 +02:00
|
|
|
wev.type = NEW_CONNECTION;
|
2014-03-09 06:53:28 +01:00
|
|
|
wev.client_fd = fd;
|
|
|
|
memcpy(&wev.client_addr, addr, addrlen);
|
|
|
|
wev.client_addrlen = addrlen;
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
workers_[idx]->send(wev);
|
2014-06-26 15:55:22 +02:00
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
struct ev_loop *ConnectionHandler::get_loop() const {
|
2014-12-27 18:59:06 +01:00
|
|
|
return loop_;
|
2012-11-20 17:29:39 +01:00
|
|
|
}
|
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
Worker *ConnectionHandler::get_single_worker() const {
|
|
|
|
return single_worker_.get();
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
|
2015-02-22 09:59:50 +01:00
|
|
|
void ConnectionHandler::set_acceptor(std::unique_ptr<AcceptHandler> h) {
|
|
|
|
acceptor_ = std::move(h);
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
|
2015-02-22 09:59:50 +01:00
|
|
|
AcceptHandler *ConnectionHandler::get_acceptor() const {
|
|
|
|
return acceptor_.get();
|
2015-01-08 13:48:39 +01:00
|
|
|
}
|
2014-08-12 15:22:02 +02:00
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::set_acceptor6(std::unique_ptr<AcceptHandler> h) {
|
2014-12-27 18:59:06 +01:00
|
|
|
acceptor6_ = std::move(h);
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
AcceptHandler *ConnectionHandler::get_acceptor6() const {
|
|
|
|
return acceptor6_.get();
|
|
|
|
}
|
2014-08-12 15:22:02 +02:00
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::enable_acceptor() {
|
2015-02-22 09:59:50 +01:00
|
|
|
if (acceptor_) {
|
|
|
|
acceptor_->enable();
|
2014-08-27 15:34:00 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
if (acceptor6_) {
|
|
|
|
acceptor6_->enable();
|
2014-08-27 15:34:00 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::disable_acceptor() {
|
2015-02-22 09:59:50 +01:00
|
|
|
if (acceptor_) {
|
|
|
|
acceptor_->disable();
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
if (acceptor6_) {
|
|
|
|
acceptor6_->disable();
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::disable_acceptor_temporary(ev_tstamp t) {
|
2014-12-27 18:59:06 +01:00
|
|
|
if (t == 0. || ev_is_active(&disable_acceptor_timer_)) {
|
2014-08-27 15:34:00 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
disable_acceptor();
|
2014-08-27 15:34:00 +02:00
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
ev_timer_set(&disable_acceptor_timer_, t, 0.);
|
|
|
|
ev_timer_start(loop_, &disable_acceptor_timer_);
|
2014-08-27 15:34:00 +02:00
|
|
|
}
|
|
|
|
|
2015-01-08 13:48:39 +01:00
|
|
|
void ConnectionHandler::accept_pending_connection() {
|
2015-02-22 09:59:50 +01:00
|
|
|
if (acceptor_) {
|
|
|
|
acceptor_->accept_connection();
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
if (acceptor6_) {
|
|
|
|
acceptor6_->accept_connection();
|
2014-08-12 15:22:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
void
|
|
|
|
ConnectionHandler::set_ticket_keys(std::shared_ptr<TicketKeys> ticket_keys) {
|
|
|
|
ticket_keys_ = std::move(ticket_keys);
|
|
|
|
if (single_worker_) {
|
|
|
|
single_worker_->set_ticket_keys(ticket_keys_);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const std::shared_ptr<TicketKeys> &ConnectionHandler::get_ticket_keys() const {
|
|
|
|
return ticket_keys_;
|
|
|
|
}
|
|
|
|
|
2015-02-25 14:53:23 +01:00
|
|
|
void ConnectionHandler::set_graceful_shutdown(bool f) {
|
|
|
|
graceful_shutdown_ = f;
|
|
|
|
if (single_worker_) {
|
|
|
|
single_worker_->set_graceful_shutdown(f);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ConnectionHandler::get_graceful_shutdown() const {
|
|
|
|
return graceful_shutdown_;
|
|
|
|
}
|
|
|
|
|
2015-03-30 16:20:40 +02:00
|
|
|
namespace {
|
|
|
|
void update_ocsp_ssl_ctx(SSL_CTX *ssl_ctx) {
|
|
|
|
auto tls_ctx_data =
|
|
|
|
static_cast<ssl::TLSContextData *>(SSL_CTX_get_app_data(ssl_ctx));
|
|
|
|
auto cert_file = tls_ctx_data->cert_file;
|
|
|
|
|
|
|
|
std::vector<uint8_t> out;
|
|
|
|
if (ssl::get_ocsp_response(out, cert_file) != 0) {
|
|
|
|
LOG(WARN) << "ocsp update for " << cert_file << " failed";
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
LOG(INFO) << "ocsp update for " << cert_file << " finished successfully";
|
|
|
|
}
|
|
|
|
|
|
|
|
std::lock_guard<std::mutex> g(tls_ctx_data->mu);
|
|
|
|
tls_ctx_data->ocsp_data = std::move(out);
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
void ConnectionHandler::update_ocsp() {
|
|
|
|
for (auto ssl_ctx : all_ssl_ctx_) {
|
|
|
|
update_ocsp_ssl_ctx(ssl_ctx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void ConnectionHandler::update_ocsp_async() {
|
|
|
|
#ifndef NOTHREADS
|
|
|
|
ocsp_result_ = std::async(std::launch::async, [this]() {
|
|
|
|
// Log files are managed per thread. We have to open log files
|
|
|
|
// for this thread. We don't reopen log files in this thread when
|
|
|
|
// signal is received. This is future TODO.
|
|
|
|
reopen_log_files();
|
|
|
|
auto closer = defer([]() {
|
|
|
|
auto lgconf = log_config();
|
|
|
|
if (lgconf->accesslog_fd != -1) {
|
|
|
|
close(lgconf->accesslog_fd);
|
|
|
|
}
|
|
|
|
if (lgconf->errorlog_fd != -1) {
|
|
|
|
close(lgconf->errorlog_fd);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
update_ocsp();
|
|
|
|
});
|
|
|
|
#endif // !NOTHREADS
|
|
|
|
}
|
|
|
|
|
|
|
|
void ConnectionHandler::handle_ocsp_completion() {
|
|
|
|
#ifndef NOTHREADS
|
|
|
|
if (!ocsp_result_.valid()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ocsp_result_.wait_for(std::chrono::seconds(0)) !=
|
|
|
|
std::future_status::ready) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ocsp_result_.get();
|
|
|
|
|
|
|
|
ev_timer_set(&ocsp_timer_, get_config()->ocsp_update_interval, 0.);
|
|
|
|
ev_timer_start(loop_, &ocsp_timer_);
|
|
|
|
#endif // !NOTHREADS
|
|
|
|
}
|
|
|
|
|
|
|
|
void ConnectionHandler::join_ocsp_thread() {
|
|
|
|
#ifndef NOTHREADS
|
|
|
|
if (!ocsp_result_.valid()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ocsp_result_.get();
|
|
|
|
#endif // !NOTHREADS
|
|
|
|
}
|
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
} // namespace shrpx
|