2 * Copyright (c) 2022 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
16 #include <hs_apps/sapi/vpp_echo_common.h>
19 echo_api_connect_app_socket (echo_main_t *em)
21 clib_socket_t *cs = &em->app_api_sock;
25 cs->config = (char *) em->socket_name;
27 CLIB_SOCKET_F_IS_CLIENT | CLIB_SOCKET_F_SEQPACKET | CLIB_SOCKET_F_BLOCKING;
29 if ((err = clib_socket_init (cs)))
31 clib_error_report (err);
39 echo_vpp_worker_segment_handle (u32 wrk_index)
41 return (ECHO_INVALID_SEGMENT_HANDLE - wrk_index - 1);
45 echo_segment_discover_mqs (uword segment_handle, int *fds, u32 n_fds)
47 echo_main_t *em = &echo_main;
51 fs_index = echo_segment_lookup (segment_handle);
52 if (fs_index == ECHO_INVALID_SEGMENT_INDEX)
54 ECHO_LOG (0, "ERROR: mq segment %lx for is not attached!",
59 clib_spinlock_lock (&em->segment_handles_lock);
61 fs = fifo_segment_get_segment (&em->segment_main, fs_index);
62 fifo_segment_msg_qs_discover (fs, fds, n_fds);
64 clib_spinlock_unlock (&em->segment_handles_lock);
70 echo_api_attach_reply_handler (app_sapi_attach_reply_msg_t *mp, int *fds)
72 echo_main_t *em = &echo_main;
73 int i, rv, n_fds_used = 0;
79 ECHO_LOG (0, "attach failed: %U", format_session_error, mp->retval);
83 em->my_client_index = mp->api_client_handle;
84 segment_handle = mp->segment_handle;
85 if (segment_handle == ECHO_INVALID_SEGMENT_HANDLE)
87 ECHO_LOG (0, "invalid segment handle");
94 if (mp->fd_flags & SESSION_FD_F_VPP_MQ_SEGMENT)
95 if (echo_segment_attach (echo_vpp_worker_segment_handle (0), "vpp-mq-seg",
96 SSVM_SEGMENT_MEMFD, fds[n_fds_used++]))
99 if (mp->fd_flags & SESSION_FD_F_MEMFD_SEGMENT)
101 segment_name = format (0, "memfd-%ld%c", segment_handle, 0);
102 rv = echo_segment_attach (segment_handle, (char *) segment_name,
103 SSVM_SEGMENT_MEMFD, fds[n_fds_used++]);
104 vec_free (segment_name);
109 echo_segment_attach_mq (segment_handle, mp->app_mq, 0, &em->app_mq);
111 if (mp->fd_flags & SESSION_FD_F_MQ_EVENTFD)
113 ECHO_LOG (0, "SESSION_FD_F_MQ_EVENTFD unsupported!");
117 echo_segment_discover_mqs (echo_vpp_worker_segment_handle (0),
118 fds + n_fds_used, mp->n_fds - n_fds_used);
119 echo_segment_attach_mq (echo_vpp_worker_segment_handle (0), mp->vpp_ctrl_mq,
120 mp->vpp_ctrl_mq_thread, &em->ctrl_mq);
122 em->state = STATE_ATTACHED_NO_CERT;
127 for (i = clib_max (n_fds_used - 1, 0); i < mp->n_fds; i++)
134 echo_api_send_attach (clib_socket_t *cs)
136 echo_main_t *em = &echo_main;
137 app_sapi_msg_t msg = { 0 };
138 app_sapi_attach_msg_t *mp = &msg.attach;
141 clib_memcpy (&mp->name, em->app_name, vec_len (em->app_name));
142 mp->options[APP_OPTIONS_FLAGS] =
143 APP_OPTIONS_FLAGS_ACCEPT_REDIRECT | APP_OPTIONS_FLAGS_ADD_SEGMENT;
144 mp->options[APP_OPTIONS_SEGMENT_SIZE] = 256 << 20;
145 mp->options[APP_OPTIONS_ADD_SEGMENT_SIZE] = 128 << 20;
146 mp->options[APP_OPTIONS_RX_FIFO_SIZE] = em->fifo_size;
147 mp->options[APP_OPTIONS_TX_FIFO_SIZE] = em->fifo_size;
148 mp->options[APP_OPTIONS_PREALLOC_FIFO_PAIRS] = em->prealloc_fifo_pairs;
149 mp->options[APP_OPTIONS_EVT_QUEUE_SIZE] = em->evt_q_size;
151 msg.type = APP_SAPI_MSG_TYPE_ATTACH;
152 err = clib_socket_sendmsg (cs, &msg, sizeof (msg), 0, 0);
155 clib_error_report (err);
163 echo_sapi_attach (echo_main_t *em)
165 app_sapi_msg_t _rmp, *rmp = &_rmp;
170 cs = &em->app_api_sock;
171 if (echo_api_send_attach (cs))
175 * Wait for attach reply
177 err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), fds, ARRAY_LEN (fds));
180 clib_error_report (err);
184 if (rmp->type != APP_SAPI_MSG_TYPE_ATTACH_REPLY)
187 return echo_api_attach_reply_handler (&rmp->attach_reply, fds);
191 echo_sapi_add_cert_key (echo_main_t *em)
193 u32 cert_len = test_srv_crt_rsa_len;
194 u32 key_len = test_srv_key_rsa_len;
195 u32 certkey_len = cert_len + key_len;
196 app_sapi_msg_t _msg = { 0 }, *msg = &_msg;
197 app_sapi_cert_key_add_del_msg_t *mp;
198 app_sapi_msg_t _rmp, *rmp = &_rmp;
204 msg->type = APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY;
205 mp = &msg->cert_key_add_del;
206 mp->context = ntohl (0xfeedface);
207 mp->cert_len = cert_len;
208 mp->certkey_len = certkey_len;
211 vec_validate (certkey, certkey_len - 1);
212 clib_memcpy_fast (certkey, test_srv_crt_rsa, cert_len);
213 clib_memcpy_fast (certkey + cert_len, test_srv_key_rsa, key_len);
215 cs = &em->app_api_sock;
216 err = clib_socket_sendmsg (cs, msg, sizeof (*msg), 0, 0);
219 clib_error_report (err);
223 err = clib_socket_sendmsg (cs, certkey, certkey_len, 0, 0);
226 clib_error_report (err);
231 * Wait for reply and process it
233 err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), 0, 0);
236 clib_error_report (err);
240 if (rmp->type != APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY_REPLY)
242 ECHO_LOG (0, "unexpected reply type %u", rmp->type);
246 if (!rmp->cert_key_add_del_reply.retval)
247 rv = rmp->cert_key_add_del_reply.index;
249 em->state = STATE_ATTACHED;
250 em->ckpair_index = rv;
258 echo_sapi_recv_fd (echo_main_t *em, int *fds, int n_fds)
260 app_sapi_msg_t _msg, *msg = &_msg;
262 clib_socket_recvmsg (&em->app_api_sock, msg, sizeof (*msg), fds, n_fds);
265 clib_error_report (err);
272 echo_sapi_detach (echo_main_t *em)
274 clib_socket_t *cs = &em->app_api_sock;
275 clib_socket_close (cs);
276 em->state = STATE_DETACHED;
281 echo_sapi_del_cert_key (echo_main_t *em)
283 app_sapi_msg_t _msg = { 0 }, *msg = &_msg;
284 app_sapi_cert_key_add_del_msg_t *mp;
285 app_sapi_msg_t _rmp, *rmp = &_rmp;
289 msg->type = APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY;
290 mp = &msg->cert_key_add_del;
291 mp->index = em->ckpair_index;
293 cs = &em->app_api_sock;
294 err = clib_socket_sendmsg (cs, msg, sizeof (*msg), 0, 0);
297 clib_error_report (err);
302 * Wait for reply and process it
304 err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), 0, 0);
307 clib_error_report (err);
311 if (rmp->type != APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY_REPLY)
313 ECHO_LOG (0, "unexpected reply type %u", rmp->type);
317 if (rmp->cert_key_add_del_reply.retval)
320 em->state = STATE_CLEANED_CERT_KEY;
325 * fd.io coding-style-patch-verification: ON
328 * eval: (c-set-style "gnu")