E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1 | .. This work is licensed under a Creative Commons Attribution 4.0 International License. |
| 2 | .. SPDX-License-Identifier: CC-BY-4.0 |
| 3 | .. CAUTION: this document is generated from source in doc/src/rtd. |
| 4 | .. To make changes edit the source and recompile the document. |
| 5 | .. Do NOT make changes directly to .rst or .md files. |
| 6 | |
| 7 | ============================================================================================ |
| 8 | User's Guide |
| 9 | ============================================================================================ |
| 10 | -------------------------------------------------------------------------------------------- |
| 11 | RIC Message Router -- RMR |
| 12 | -------------------------------------------------------------------------------------------- |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 13 | |
| 14 | |
| 15 | Overview |
| 16 | ======== |
| 17 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 18 | The RIC Message Router (RMR) is a library for peer-to-peer |
| 19 | communication. Applications use the library to send and |
| 20 | receive messages where the message routing and endpoint |
| 21 | selection is based on the message type rather than DNS host |
| 22 | name-IP port combinations. The library provides the following |
| 23 | major features: |
| 24 | |
| 25 | |
| 26 | * Routing and endpoint selection is based on *message type.* |
| 27 | |
| 28 | * Application is insulated from the underlying transport |
| 29 | mechanism and/or protocols. |
| 30 | |
| 31 | * Message distribution (round robin or fanout) is selectable |
| 32 | by message type. |
| 33 | |
| 34 | * Route management updates are received and processed |
| 35 | asynchronously and without overt application involvement. |
| 36 | |
| 37 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 38 | |
| 39 | |
| 40 | Purpose |
| 41 | ------- |
| 42 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 43 | RMR's main purpose is to provide an application with the |
| 44 | ability to send and receive messages to/from other peer |
| 45 | applications with minimal effort on the application's part. |
| 46 | To achieve this, RMR manages all endpoint information, |
| 47 | connections, and routing information necessary to establish |
| 48 | and maintain communication. From the application's point of |
| 49 | view, all that is required to send a message is to allocate |
| 50 | (via RMR) a message buffer, add the payload data, and set the |
| 51 | message type. To receive a message, the application needs |
| 52 | only to invoke the receive function; when a message arrives a |
| 53 | message buffer will be returned as the function result. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 54 | |
| 55 | |
| 56 | Message Routing |
| 57 | --------------- |
| 58 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 59 | Applications are required to place a message type into a |
| 60 | message before sending, and may optionally add a subscription |
| 61 | ID when appropriate. The combination of message type, and |
| 62 | subscription ID are refered to as the *message key,* and is |
| 63 | used to match an entry in a routing table which provides the |
| 64 | possible endpoints expecting to receive messages with the |
| 65 | matching key. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 66 | |
| 67 | |
| 68 | Round Robin Delivery |
| 69 | -------------------- |
| 70 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 71 | An endpoint from RMR's perspective is an application to which |
| 72 | RMR may establish a connection, and expect to send messages |
| 73 | with one or more defined message keys. Each entry in the |
| 74 | route table consists of one or more endpoint groups, called |
| 75 | round robin groups. When a message matches a specific entry, |
| 76 | the entry's groups are used to select the destination of the |
| 77 | message. A message is sent once to each group, with messages |
| 78 | being *balanced* across the endpoints of a group via round |
| 79 | robin selection. Care should be taken when defining multiple |
| 80 | groups for a message type as there is extra overhead required |
| 81 | and thus the overall message latency is somewhat increased. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 82 | |
| 83 | |
| 84 | Routing Table Updates |
| 85 | --------------------- |
| 86 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 87 | Route table information is made available to RMR a static |
| 88 | file (loaded once), or by updates sent from a separate route |
| 89 | manager application. If a static table is provided, it is |
| 90 | loaded during RMR initialization and will remain in use until |
| 91 | an external process connects and delivers a route table |
| 92 | update (often referred to as a dynamic update). Dynamic |
| 93 | updates are listened for in a separate process thread and |
| 94 | applied automatically; the application does not need to allow |
| 95 | for, or trigger, updates. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 96 | |
| 97 | |
| 98 | Latency And Throughput |
| 99 | ---------------------- |
| 100 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 101 | While providing insulation from the underlying message |
| 102 | transport mechanics, RMR must also do so in such a manner |
| 103 | that message latency and throughput are not impacted. In |
| 104 | general, the RMR induced overhead, incurred due to the |
| 105 | process of selecting an endpoint for each message, is minimal |
| 106 | and should not impact the overall latency or throughput of |
| 107 | the application. This impact has been measured with test |
| 108 | applications running on the same physical host and the |
| 109 | average latency through RMR for a message was on the order of |
| 110 | 0.02 milliseconds. |
| 111 | |
| 112 | As an application's throughput increases, it becomes easy for |
| 113 | the application to overrun the underlying transport mechanism |
| 114 | (e.g. NNG), consume all available TCP transmit buffers, or |
| 115 | otherwise find itself in a situation where a send might not |
| 116 | immediately complete. RMR offers different *modes* which |
| 117 | allow the application to manage these states based on the |
| 118 | overall needs of the application. These modes are discussed |
| 119 | in the *Configuration* section of this document. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 120 | |
| 121 | |
| 122 | General Use |
| 123 | =========== |
| 124 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 125 | To use, the RMR based application simply needs to initialise |
| 126 | the RMR environment, wait for RMR to have received a routing |
| 127 | table (become ready), and then invoke either the send or |
| 128 | receive functions. These steps, and some behind the scenes |
| 129 | details, are described in the following paragraphs. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 130 | |
| 131 | |
| 132 | Initialisation |
| 133 | -------------- |
| 134 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 135 | The RMR function ``rmr_init()`` is used to set up the RMR |
| 136 | environment and must be called before messages can be sent or |
| 137 | received. One of the few parameters that the application must |
| 138 | communicate to RMR is the port number that will be used as |
| 139 | the listen port for new connections. The port number is |
| 140 | passed on the initialisation function call and a TCP listen |
| 141 | socket will be opened with this port. If the port is already |
| 142 | in use RMR will report a failure; the application will need |
| 143 | to reinitialise with a different port number, abort, or take |
| 144 | some other action appropriate for the application. |
| 145 | |
| 146 | In addition to creating a TCP listen port, RMR will start a |
| 147 | process thread which will be responsible for receiving |
| 148 | dynamic updates to the route table. This thread also causes a |
| 149 | TCP listen port to be opened as it is expected that the |
| 150 | process which generates route table updates will connect and |
| 151 | send new information when needed. The route table update port |
| 152 | is **not** supplied by the application, but is supplied via |
| 153 | an environment variable as this value is likely determined by |
| 154 | the mechanism which is starting and configuring the |
| 155 | application. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 156 | |
| 157 | |
| 158 | The RMR Context |
| 159 | --------------- |
| 160 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 161 | On successful initialisation, a void pointer, often called a |
| 162 | *handle* by some programming languages, is returned to the |
| 163 | application. This is a reference to the RMR control |
| 164 | information and must be passed as the first parameter on most |
| 165 | RMR function calls. RMR refers to this as the context, or |
| 166 | ctx. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 167 | |
| 168 | |
| 169 | Wait For Ready |
| 170 | -------------- |
| 171 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 172 | An application which is only receiving messages does not need |
| 173 | to wait for RMR to *become ready* after the call to the |
| 174 | initialization function. However, before the application can |
| 175 | successfully send a message, RMR must have loaded a route |
| 176 | table, and the application must wait for RMR to report that |
| 177 | it has done so. The RMR function ``rmr_ready()`` will return |
| 178 | the value *true* (1) when a complete route table has been |
| 179 | loaded and can be used to determine the endpoint for a send |
| 180 | request. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 181 | |
| 182 | |
| 183 | Receiving Messages |
| 184 | ------------------ |
| 185 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 186 | The process of receiving is fairly straight forward. The |
| 187 | application invokes the RMR ``rmr_rcv_msg()`` function which |
| 188 | will block until a message is received. The function returns |
| 189 | a pointer to a message block which provides all of the |
| 190 | details about the message. Specifically, the application has |
| 191 | access to the following information either directly or |
| 192 | indirectly: |
| 193 | |
| 194 | |
| 195 | * The payload (actual data) |
| 196 | |
| 197 | * The total payload length in bytes |
| 198 | |
| 199 | * The number of bytes of the payload which contain valid data |
| 200 | |
| 201 | * The message type and subscription ID values |
| 202 | |
| 203 | * The hostname and IP address of the source of the message |
| 204 | (the sender) |
| 205 | |
| 206 | * The transaction ID |
| 207 | |
| 208 | * Tracing data (if provided) |
| 209 | |
| 210 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 211 | |
| 212 | |
| 213 | The Message Payload |
| 214 | ------------------- |
| 215 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 216 | The message payload contains the *raw* data that was sent by |
| 217 | the peer application. The format will likely depend on the |
| 218 | message type, and is expected to be known by the application. |
| 219 | A direct pointer to the payload is available from the message |
| 220 | buffer (see appendix B for specific message buffer details). |
| 221 | |
| 222 | Two payload-related length values are also directly |
| 223 | available: the total payload length, and the number of bytes |
| 224 | actually filled with data. The used length is set by the |
| 225 | caller, and may or not be an accurate value. The total |
| 226 | payload length is determined when the buffer is created for |
| 227 | sending, and is the maximum number of bytes that the |
| 228 | application may modify should the buffer be used to return a |
| 229 | response. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 230 | |
| 231 | |
| 232 | Message Type and Subscription ID |
| 233 | -------------------------------- |
| 234 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 235 | The message type and subscription ID are both directly |
| 236 | available from the message buffer, and are the values which |
| 237 | were used to by RMR in the sending application to select the |
| 238 | endpoint. If the application resends the message, as opposed |
| 239 | to returning the message buffer as a response, the message |
| 240 | number and/or the subscription ID might need to be changed to |
| 241 | avoid potential issues[1]. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 242 | |
| 243 | |
| 244 | Sender Information |
| 245 | ------------------ |
| 246 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 247 | The source, or sender information, is indirectly available to |
| 248 | the application via the ``rmr_get_src()`` and |
| 249 | ``rmr_get_ip()`` functions. The former returns a string |
| 250 | containing ``hostname:port,`` while the string |
| 251 | ``ip:port`` is returned by the latter. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 252 | |
| 253 | |
| 254 | Transaction ID |
| 255 | -------------- |
| 256 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 257 | The message buffer contains a fixed length set of bytes which |
| 258 | applications can set to track related messages across the |
| 259 | application concept of a transaction. RMR will use the |
| 260 | transaction ID for matching a response message when the |
| 261 | ``rmr_call()`` function is used to send a message. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 262 | |
| 263 | |
| 264 | Trace Information |
| 265 | ----------------- |
| 266 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 267 | RMR supports the addition of an optional trace information to |
| 268 | any message. The presence and size is controlled by the |
| 269 | application, and can vary from message to message if desired. |
| 270 | The actual contents of the trace information is determined by |
| 271 | the application; RMR provides only the means to set, extract, |
| 272 | and obtain a direct reference to the trace bytes. The trace |
| 273 | data field in a message buffer is discussed in greater detail |
| 274 | in the *Trace Data* section. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 275 | |
| 276 | |
| 277 | Sending Messages |
| 278 | ---------------- |
| 279 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 280 | Sending requires only slightly more work on the part of the |
| 281 | application than receiving a message. The application must |
| 282 | allocate an RMR message buffer, populate the message payload |
| 283 | with data, set the message type and length, and optionally |
| 284 | set the subscription ID. Information such as the source IP |
| 285 | address, hostname, and port are automatically added to the |
| 286 | message buffer by RMR, so there is no need for the |
| 287 | application to worry about these. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 288 | |
| 289 | |
| 290 | Message Buffer Allocation |
| 291 | ------------------------- |
| 292 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 293 | The function ``rmr_msg_alloc()`` allocates a *zero copy* |
| 294 | buffer and returns a pointer to the RMR ``rmr_mbuf_t`` |
| 295 | structure. The message buffer provides direct access to the |
| 296 | payload, length, message type and subscription ID fields. The |
| 297 | buffer must be preallocated in order to allow the underlying |
| 298 | transport mechanism to allocate the payload space from its |
| 299 | internal memory pool; this eliminates multiple copies as the |
| 300 | message is sent, and thus is more efficient. |
| 301 | |
| 302 | If a message buffer has been received, and the application |
| 303 | wishes to use the buffer to send a response, or to forward |
| 304 | the buffer to another application, a new buffer does **not** |
| 305 | need to be allocated. The application may set the necessary |
| 306 | information (message type, etc.), and adjust the payload, as |
| 307 | is necessary and then pass the message buffer to |
| 308 | ``rmr_send_msg()`` or ``rmr_rts_msg()`` to be sent or |
| 309 | returned to the sender. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 310 | |
| 311 | |
| 312 | Populating the Message Buffer |
| 313 | ----------------------------- |
| 314 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 315 | The application has direct access to several of the message |
| 316 | buffer fields, and should set them appropriately. |
| 317 | |
| 318 | |
| 319 | .. list-table:: |
| 320 | :widths: 15,80 |
| 321 | :header-rows: 0 |
| 322 | :class: borderless |
| 323 | |
| 324 | * - **len** |
| 325 | - |
| 326 | This is the number of bytes that the application placed into |
| 327 | the payload. Setting length to 0 is allowed, and length may |
| 328 | be less than the allocated payload size. |
| 329 | |
| 330 | * - **mtype** |
| 331 | - |
| 332 | The message type that RMR will use to determine the endpoint |
| 333 | used as the target of the send. |
| 334 | |
| 335 | * - **sub_id** |
| 336 | - |
| 337 | The subscription ID if the message is to be routed based on |
| 338 | the combination of message type and subscription ID. If no |
| 339 | subscription ID is valid for the message, the application |
| 340 | should set the field with the RMR constant |
| 341 | ``RMR_VOID_SUBID.`` |
| 342 | |
| 343 | * - **payload** |
| 344 | - |
| 345 | The application should obtain the reference (pointer) to the |
| 346 | payload from the message buffer and place any data into the |
| 347 | payload. The application is responsible for ensuring that the |
| 348 | maximum payload size is not exceeded. The application may |
| 349 | obtain the maximum size via the ``rmr_payload_size()`` |
| 350 | function. |
| 351 | |
| 352 | * - **trace data** |
| 353 | - |
| 354 | Optionally, the application may add trace information to the |
| 355 | message buffer. |
| 356 | |
| 357 | |
| 358 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 359 | |
| 360 | |
| 361 | Sending a Message Buffer |
| 362 | ------------------------ |
| 363 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 364 | Once the application has populated the necessary bits of a |
| 365 | message, it may be sent by passing the buffer to the |
| 366 | ``rmr_send_msg()`` function. This function will select an |
| 367 | endpoint to receive the message, based on message type and |
| 368 | subscription ID, and will pass the message to the underlying |
| 369 | transport mechanism for actual transmission on the |
| 370 | connection. (Depending on the underlying transport mechanism, |
| 371 | the actual connection to the endpoint may happen at the time |
| 372 | of the first message sent to the endpoint, and thus the |
| 373 | latency of the first send might be longer than expected.) |
| 374 | |
| 375 | On success, the send function will return a reference to a |
| 376 | message buffer; the status within that message buffer will |
| 377 | indicate what the message buffer contains. When the status is |
| 378 | ``RMR_OK`` the reference is to a **new** message buffer for |
| 379 | the application to use for the next send; the payload size is |
| 380 | the same as the payload size allocated for the message that |
| 381 | was just sent. This is a convenience as it eliminates the |
| 382 | need for the application to call the message allocation |
| 383 | function at some point in the future, and assumes the |
| 384 | application will send many messages which will require the |
| 385 | same payload dimensions. |
| 386 | |
| 387 | If the message contains any status other than ``RMR_OK,`` |
| 388 | then the message could **not** be sent, and the reference is |
| 389 | to the unsent message buffer. The value of the status will |
| 390 | indicate whether the nature of the failure was transient ( |
| 391 | ``RMR_ERR_RETRY``) or not. Transient failures are likely to |
| 392 | be successful if the application attempts to send the message |
| 393 | at a later time. Unfortunately, it is impossible for RMR to |
| 394 | know the exact transient failure (e.g. connection being |
| 395 | established, or TCP buffer shortage), and thus it is not |
| 396 | possible to communicate how long the application should wait |
| 397 | before attempting to resend, if the application wishes to |
| 398 | resend the message. (More discussion with respect to message |
| 399 | retries can be found in the *Handling Failures* section.) |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 400 | |
| 401 | |
| 402 | Advanced Usage |
| 403 | ============== |
| 404 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 405 | Several forms of usage fall into a more advanced category and |
| 406 | are described in the following sections. These include |
| 407 | blocking call, return to sender and wormhole functions. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 408 | |
| 409 | |
| 410 | The Call Function |
| 411 | ----------------- |
| 412 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 413 | The RMR function ``rmr_call()`` sends a message in the exact |
| 414 | same manner as the ``rmr_send_msg()()`` function, with the |
| 415 | endpoint selection based on the message key. But unlike the |
| 416 | send function, ``rmr_call()`` will block and wait for a |
| 417 | response from the application that is selected to receive the |
| 418 | message. The matching message is determined by the |
| 419 | transaction ID which the application must place into the |
| 420 | message buffer prior to invoking ``rmr_call()``. Similarly, |
| 421 | the responding application must ensure that the same |
| 422 | transaction ID is placed into the message buffer before |
| 423 | returning its response. |
| 424 | |
| 425 | The return from the call is a message buffer with the |
| 426 | response message; there is no difference between a message |
| 427 | buffer returned by the receive function and one returned by |
| 428 | the ``rmr_call()`` function. If a response is not received in |
| 429 | a reasonable amount of time, a nil message buffer is returned |
| 430 | to the calling application. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 431 | |
| 432 | |
| 433 | Returning a Response |
| 434 | -------------------- |
| 435 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 436 | Because of the nature of RMR's routing policies, it is |
| 437 | generally not possible for an application to control exactly |
| 438 | which endpoint is sent a message. There are cases, such as |
| 439 | responding to a message delivered via ``rmr_call()`` that the |
| 440 | application must send a message and guarantee that RMR routes |
| 441 | it to an exact destination. To enable this, RMR provides the |
| 442 | ``rmr_rts_msg(),`` return to sender, function. Upon receipt |
| 443 | of any message, an application may alter the payload, and if |
| 444 | necessary the message type and subscription ID, and pass the |
| 445 | altered message buffer to the ``rmr_rts_msg()`` function to |
| 446 | return the altered message to the application which sent it. |
| 447 | When this function is used, RMR will examine the message |
| 448 | buffer for the source information and use that to select the |
| 449 | connection on which to write the response. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 450 | |
| 451 | |
| 452 | Multi-threaded Calls |
| 453 | -------------------- |
| 454 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 455 | The basic call mechanism described above is **not** thread |
| 456 | safe, as it is not possible to guarantee that a response |
| 457 | message is delivered to the correct thread. The RMR function |
| 458 | ``rmr_mt_call()`` accepts an additional parameter which |
| 459 | identifies the calling thread in order to ensure that the |
| 460 | response is delivered properly. In addition, the application |
| 461 | must specifically initialise the multi-threaded call |
| 462 | environment by passing the ``RMRFL_MTCALL`` flag as an option |
| 463 | to the ``rmr_init()`` function. |
| 464 | |
| 465 | One advantage of the multi-threaded call capability in RMR is |
| 466 | the fact that only the calling thread is blocked. Messages |
| 467 | received which are not responses to the call are continued to |
| 468 | be delivered via normal ``rmr_rcv_msg()`` calls. |
| 469 | |
| 470 | While the process is blocked waiting for the response, it is |
| 471 | entirely possible that asynchronous, non-matching, messages |
| 472 | will arrive. When this happens, RMR will queues the messages |
| 473 | and return them to the application over the next calls to |
| 474 | ``rmr_rcv_msg().`` |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 475 | |
| 476 | |
| 477 | Wormholes |
| 478 | --------- |
| 479 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 480 | As was mentioned earlier, the design of RMR is to eliminate |
| 481 | the need for an application to know a specific endpoint, even |
| 482 | when a response message is being sent. In some rare cases it |
| 483 | may be necessary for an application to establish a direct |
| 484 | connection to an RMR-based application rather than relying on |
| 485 | message type and subscription ID based routing. The |
| 486 | *wormhole* functions provide an application with the ability |
| 487 | to create a direct connection and then to send and receive |
| 488 | messages across the connection. The following are the RMR |
| 489 | functions which provide wormhole communications: |
| 490 | |
| 491 | |
| 492 | .. list-table:: |
| 493 | :widths: auto |
| 494 | :header-rows: 0 |
| 495 | :class: borderless |
| 496 | |
| 497 | * - **rmr_wh_open** |
| 498 | - |
| 499 | Open a connection to an endpoint. Name or IP address and port |
| 500 | of the endpoint is supplied. Returns a wormhole ID that the |
| 501 | application must use when sending a direct message. |
| 502 | |
| 503 | * - **rmr_wh_send_msg** |
| 504 | - |
| 505 | Sends an RMR message buffer to the connected application. The |
| 506 | message type and subscription ID may be set in the message, |
| 507 | but RMR will ignore both. |
| 508 | |
| 509 | * - **rmr_wh_close** |
| 510 | - |
| 511 | Closes the direct connection. |
| 512 | |
| 513 | |
| 514 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 515 | |
| 516 | |
| 517 | Handling Failures |
| 518 | ================= |
| 519 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 520 | The vast majority of states reported by RMR are fatal; if |
| 521 | encountered during setup or initialization, then it is |
| 522 | unlikely that any message oriented processing should |
| 523 | continue, and when encountered on a message operation |
| 524 | continued operation on that message should be abandoned. |
| 525 | Specifically with regard to message sending, it is very |
| 526 | likely that the underlying transport mechanism will report a |
| 527 | *soft,* or transient, failure which might be successful if |
| 528 | the operation is retried at a later point in time. The |
| 529 | paragraphs below discuss the methods that an application |
| 530 | might deal with these soft failures. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 531 | |
| 532 | |
| 533 | Failure Notification |
| 534 | -------------------- |
| 535 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 536 | When a soft failure is reported, the returned message buffer |
| 537 | returned by the RMR function will be ``RMR_ERR_RETRY.`` These |
| 538 | types of failures can occur for various reasons; one of two |
| 539 | reasons is typically the underlying cause: |
| 540 | |
| 541 | |
| 542 | * The session to the targeted recipient (endpoint) is not |
| 543 | connected. |
| 544 | |
| 545 | * The transport mechanism buffer pool is full and cannot |
| 546 | accept another buffer. |
| 547 | |
| 548 | |
| 549 | |
| 550 | Unfortunately, it is not possible for RMR to determine which |
| 551 | of these two cases is occurring, and equally as unfortunate |
| 552 | the time to resolve each is different. The first, no |
| 553 | connection, may require up to a second before a message can |
| 554 | be accepted, while a rejection because of buffer shortage is |
| 555 | likely to resolve in less than a millisecond. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 556 | |
| 557 | |
| 558 | Application Response |
| 559 | -------------------- |
| 560 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 561 | The action which an application takes when a soft failure is |
| 562 | reported ultimately depends on the nature of the application |
| 563 | with respect to factors such as tolerance to extended message |
| 564 | latency, dropped messages, and over all message rate. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 565 | |
| 566 | |
| 567 | RMR Retry Modes |
| 568 | --------------- |
| 569 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 570 | In an effort to reduce the workload of an application |
| 571 | developer, RMR has a default retry policy such that RMR will |
| 572 | attempt to retransmit a message up to 1000 times when a soft |
| 573 | failure is reported. These retries generally take less than 1 |
| 574 | millisecond (if all 1000 are attempted) and in most cases |
| 575 | eliminates nearly all reported soft failures to the |
| 576 | application. When using this mode, it might allow the |
| 577 | application to simply treat all bad return values from a send |
| 578 | attempt as permanent failures. |
| 579 | |
| 580 | If an application is so sensitive to any delay in RMR, or the |
| 581 | underlying transport mechanism, it is possible to set RMR to |
| 582 | return a failure immediately on any kind of error (permanent |
| 583 | failures are always reported without retry). In this mode, |
| 584 | RMR will still set the state in the message buffer to |
| 585 | ``RMR_ERR_RETRY,`` but will **not** make any attempts to |
| 586 | resend the message. This zero-retry policy is enabled by |
| 587 | invoking the ``rmr_set_stimeout()`` with a value of 0; this |
| 588 | can be done once immediately after ``rmr_init()`` is invoked. |
| 589 | |
| 590 | Regardless of the retry mode which the application sets, it |
| 591 | will ultimately be up to the application to handle failures |
| 592 | by queuing the message internally for resend, retrying |
| 593 | immediately, or dropping the send attempt all together. As |
| 594 | stated before, only the application can determine how to best |
| 595 | handle send failures. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 596 | |
| 597 | |
| 598 | Other Failures |
| 599 | -------------- |
| 600 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 601 | RMR will return the state of processing for message based |
| 602 | operations (send/receive) as the status in the message |
| 603 | buffer. For non-message operations, state is returned to the |
| 604 | caller as the integer return value for all functions which |
| 605 | are not expected to return a pointer (e.g. |
| 606 | ``rmr_init()``.) The following are the RMR state constants |
| 607 | and a brief description of their meaning. |
| 608 | |
| 609 | |
| 610 | .. list-table:: |
| 611 | :widths: auto |
| 612 | :header-rows: 0 |
| 613 | :class: borderless |
| 614 | |
| 615 | * - **RMR_OK** |
| 616 | - |
| 617 | state is good; operation finished successfully |
| 618 | |
| 619 | * - **RMR_ERR_BADARG** |
| 620 | - |
| 621 | argument passed to function was unusable |
| 622 | |
| 623 | * - **RMR_ERR_NOENDPT** |
| 624 | - |
| 625 | send/call could not find an endpoint based on msg type |
| 626 | |
| 627 | * - **RMR_ERR_EMPTY** |
| 628 | - |
| 629 | msg received had no payload; attempt to send an empty message |
| 630 | |
| 631 | * - **RMR_ERR_NOHDR** |
| 632 | - |
| 633 | message didn't contain a valid header |
| 634 | |
| 635 | * - **RMR_ERR_SENDFAILED** |
| 636 | - |
| 637 | send failed; errno may contain the transport provider reason |
| 638 | |
| 639 | * - **RMR_ERR_CALLFAILED** |
| 640 | - |
| 641 | unable to send the message for a call function; errno may |
| 642 | contain the transport provider reason |
| 643 | |
| 644 | * - **RMR_ERR_NOWHOPEN** |
| 645 | - |
| 646 | no wormholes are open |
| 647 | |
| 648 | * - **RMR_ERR_WHID** |
| 649 | - |
| 650 | the wormhole id provided was invalid |
| 651 | |
| 652 | * - **RMR_ERR_OVERFLOW** |
| 653 | - |
| 654 | operation would have busted through a buffer/field size |
| 655 | |
| 656 | * - **RMR_ERR_RETRY** |
| 657 | - |
| 658 | request (send/call/rts) failed, but caller should retry |
| 659 | (EAGAIN for wrappers) |
| 660 | |
| 661 | * - **RMR_ERR_RCVFAILED** |
| 662 | - |
| 663 | receive failed (hard error) |
| 664 | |
| 665 | * - **RMR_ERR_TIMEOUT** |
| 666 | - |
| 667 | response message not received in a reasonable amount of time |
| 668 | |
| 669 | * - **RMR_ERR_UNSET** |
| 670 | - |
| 671 | the message hasn't been populated with a transport buffer |
| 672 | |
| 673 | * - **RMR_ERR_TRUNC** |
| 674 | - |
| 675 | length in the received buffer is longer than the size of the |
| 676 | allocated payload, received message likely truncated (length |
| 677 | set by sender could be wrong, but we can't know that) |
| 678 | |
| 679 | * - **RMR_ERR_INITFAILED** |
| 680 | - |
| 681 | initialisation of something (probably message) failed |
| 682 | |
| 683 | * - **RMR_ERR_NOTSUPP** |
| 684 | - |
| 685 | the request is not supported, or RMR was not initialised for |
| 686 | the request |
| 687 | |
| 688 | |
| 689 | |
| 690 | Depending on the underlying transport mechanism, and the |
| 691 | nature of the call that RMR attempted, the system |
| 692 | ``errno`` value might reflect additional detail about the |
| 693 | failure. Applications should **not** rely on errno as some |
| 694 | transport mechanisms do not set it with any consistency. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 695 | |
| 696 | |
| 697 | Configuration and Control |
| 698 | ========================= |
| 699 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 700 | With the assumption that most RMR based applications will be |
| 701 | executed in a containerised environment, there are some |
| 702 | underlying mechanics which the developer may need to know in |
| 703 | order to properly provide a configuration specification to |
| 704 | the container management system. The following paragraphs |
| 705 | briefly discuss these. |
| 706 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 707 | |
| 708 | |
| 709 | TCP Ports |
| 710 | --------- |
| 711 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 712 | RMR requires two (2) TCP listen ports: one for general |
| 713 | application-to-application communications and one for |
| 714 | route-table updates. The general communication port is |
| 715 | specified by the application at the time RMR is initialised. |
| 716 | The port used to listen for route table updates is likely to |
| 717 | be a constant port shared by all applications provided they |
| 718 | are running in separate containers. To that end, the port |
| 719 | number defaults to 4561, but can be configured with an |
| 720 | environment variable (see later paragraph in this section). |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 721 | |
| 722 | |
| 723 | Host Names |
| 724 | ---------- |
| 725 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 726 | RMR is typically host name agnostic. Route table entries may |
| 727 | contain endpoints defined either by host name or IP address. |
| 728 | In the container world the concept of a *service name* might |
| 729 | exist, and likely is different than a host name. RMR's only |
| 730 | requirement with respect to host names is that a name used on |
| 731 | a route table entry must be resolvable via the |
| 732 | ``gethostbyname`` system call. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 733 | |
| 734 | |
| 735 | Environment Variables |
| 736 | --------------------- |
| 737 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 738 | Several environment variables are recognised by RMR which, in |
| 739 | general, are used to define interfaces and listen ports (e.g. |
| 740 | the route table update listen port), or debugging |
| 741 | information. Generally this information is system controlled |
| 742 | and thus RMR expects this information to be defined in the |
| 743 | environment rather than provided by the application. The |
| 744 | following is a list of the environment variables which RMR |
| 745 | recognises: |
| 746 | |
| 747 | |
| 748 | .. list-table:: |
| 749 | :widths: auto |
| 750 | :header-rows: 0 |
| 751 | :class: borderless |
| 752 | |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 753 | * - **RMR_ASYNC_CONN** |
| 754 | - |
| 755 | Allows the async connection mode to be turned off (by setting |
| 756 | the value to 0). When set to 1, or missing from the |
| 757 | environment, RMR will invoke the connection interface in the |
| 758 | transport mechanism using the non-blocking (async) mode. This |
| 759 | will likely result in many "soft failures" (retry) until the |
| 760 | connection is established, but allows the application to |
| 761 | continue unimpeded should the connection be slow to set up. |
| 762 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 763 | * - **RMR_BIND_IF** |
| 764 | - |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 765 | This provides the interface that RMR will bind listen ports |
| 766 | to, allowing for a single interface to be used rather than |
| 767 | listening across all interfaces. This should be the IP |
| 768 | address assigned to the interface that RMR should listen on, |
| 769 | and if not defined RMR will listen on all interfaces. |
E. Scott Daniels | 9c923bc | 2020-08-03 09:22:20 -0400 | [diff] [blame] | 770 | |
| 771 | * - **RMR_CTL_PORT** |
| 772 | - |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 773 | This variable defines the port that RMR should open for |
| 774 | communications with Route Manager, and other RMR control |
| 775 | applications. If not defined, the port 4561 is assumed. |
| 776 | |
| 777 | Previously, the ``RMR_RTG_SVC`` (route table generator |
| 778 | service port) was used to define this port. However, a future |
| 779 | version of Route Manager will require RMR to connect and |
| 780 | request tables, thus that variable is now used to supply the |
| 781 | Route Manager's well-known address and port. |
| 782 | |
| 783 | To maintain backwards compatibility with the older Route |
| 784 | Manager versions, the presence of this variable in the |
| 785 | environment will shift RMR's behaviour with respect to the |
| 786 | default value used when ``RMR_RTG_SVC`` is **not** defined. |
| 787 | |
| 788 | When ``RMR_CTL_PORT`` is **defined:** RMR assumes that Route |
| 789 | Manager requires RMR to connect and request table updates is |
| 790 | made, and the default well-known address for Route manager is |
| 791 | used (routemgr:4561). |
| 792 | |
| 793 | When ``RMR_CTL_PORT`` is **undefined:** RMR assumes that |
| 794 | Route Manager will connect and push table updates, thus the |
| 795 | default listen port (4561) is used. |
| 796 | |
| 797 | To avoid any possible misinterpretation and/or incorrect |
| 798 | assumptions on the part of RMR, it is recommended that both |
| 799 | the ``RMR_CTL_PORT`` and ``RMR_RTG_SVC`` be defined. In the |
| 800 | case where both variables are defined, RMR will behave |
| 801 | exactly as is communicated with the variable's values. |
E. Scott Daniels | 9c923bc | 2020-08-03 09:22:20 -0400 | [diff] [blame] | 802 | |
| 803 | * - **RMR_RTREQ_FREQ** |
| 804 | - |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 805 | When RMR needs a new route table it will send a request once |
| 806 | every ``n`` seconds. The default value for ``n`` is 5, but |
| 807 | can be changed if this variable is set prior to invoking the |
| 808 | process. Accepted values are between 1 and 300 inclusive. |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 809 | |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 810 | * - **RMR_RTG_SVC** |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 811 | - |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 812 | The value of this variable depends on the Route Manager in |
| 813 | use. |
| 814 | |
| 815 | When the Route Manager is expecting to connect to an xAPP and |
| 816 | push route tables, this variable must indicate the |
| 817 | ``port`` which RMR should use to listen for these |
| 818 | connections. |
| 819 | |
| 820 | When the Route Manager is expecting RMR to connect and |
| 821 | request a table update during initialisation, the variable |
| 822 | should be the ``host`` of the Route Manager process. |
| 823 | |
| 824 | The ``RMR_CTL_PORT`` variable (added with the support of |
| 825 | sending table update requests to Route manager), controls the |
| 826 | behaviour if this variable is not set. See the description of |
| 827 | that variable for details. |
| 828 | |
| 829 | * - **RMR_HR_LOG** |
| 830 | - |
| 831 | By default RMR writes messages to standard error (incorrectly |
| 832 | referred to as log messages) in human readable format. If |
| 833 | this environment variable is set to 0, the format of standard |
| 834 | error messages might be written in some format not easily |
| 835 | read by humans. If missing, a value of 1 is assumed. |
| 836 | |
| 837 | * - **RMR_LOG_VLEVEL** |
| 838 | - |
| 839 | This is a numeric value which corresponds to the verbosity |
| 840 | level used to limit messages written to standard error. The |
| 841 | lower the number the less chatty RMR functions are during |
| 842 | execution. The following is the current relationship between |
| 843 | the value set on this variable and the messages written: |
| 844 | |
| 845 | |
| 846 | .. list-table:: |
| 847 | :widths: auto |
| 848 | :header-rows: 0 |
| 849 | :class: borderless |
| 850 | |
| 851 | * - **0** |
| 852 | - |
| 853 | Off; no messages of any sort are written. |
| 854 | |
| 855 | * - **1** |
| 856 | - |
| 857 | Only critical messages are written (default if this variable |
| 858 | does not exist) |
| 859 | |
| 860 | * - **2** |
| 861 | - |
| 862 | Errors and all messages written with a lower value. |
| 863 | |
| 864 | * - **3** |
| 865 | - |
| 866 | Warnings and all messages written with a lower value. |
| 867 | |
| 868 | * - **4** |
| 869 | - |
| 870 | Informational and all messages written with a lower value. |
| 871 | |
| 872 | * - **5** |
| 873 | - |
| 874 | Debugging mode -- all messages written, however this requires |
| 875 | RMR to have been compiled with debugging support enabled. |
| 876 | |
| 877 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 878 | |
| 879 | * - **RMR_RTG_ISRAW** |
| 880 | - |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 881 | **Deprecated.** Should be set to 1 if the route table |
| 882 | generator is sending "plain" messages (not using RMR to send |
| 883 | messages), 0 if the RTG is using RMR to send. The default is |
| 884 | 1 as we don't expect the RTG to use RMR. |
| 885 | |
| 886 | This variable is only recognised when using the NNG transport |
| 887 | library as it is not possible to support NNG "raw" |
| 888 | communications with other transport libraries. It is also |
| 889 | necessary to match the value of this variable with the |
| 890 | capabilities of the Route Manager; at some point in the |
| 891 | future RMR will assume that all Route Manager messages will |
| 892 | arrive via an RMR connection and will ignore this variable. |
| 893 | |
| 894 | * - **RMR_SEED_RT** |
| 895 | - |
| 896 | This is used to supply a static route table which can be used |
| 897 | for debugging, testing, or if no route table generator |
| 898 | process is being used to supply the route table. If not |
| 899 | defined, no static table is used and RMR will not report |
| 900 | *ready* until a table is received. The static route table may |
| 901 | contain both the route table (between newrt start and end |
| 902 | records), and the MEID map (between meid_map start and end |
| 903 | records). |
| 904 | |
| 905 | * - **RMR_SRC_ID** |
| 906 | - |
| 907 | This is either the name or IP address which is placed into |
| 908 | outbound messages as the message source. This will used when |
| 909 | an RMR based application uses the rmr_rts_msg() function to |
| 910 | return a response to the sender. If not supplied RMR will use |
| 911 | the hostname which in some container environments might not |
| 912 | be routable. |
| 913 | |
| 914 | The value of this variable is also used for Route Manager |
| 915 | messages which are sent via an RMR connection. |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 916 | |
E. Scott Daniels | d07cc97 | 2021-04-01 10:05:33 -0400 | [diff] [blame] | 917 | * - **RMR_STASH_RT** |
| 918 | - |
| 919 | Names the file where RMR should write the latest update it |
| 920 | receives from the source of route tables (generally Route |
| 921 | Manager). This is meant to assist with debugging and/or |
| 922 | troubleshooting when it is suspected that route information |
| 923 | isn't being sent and/or received correctly. If this variable |
| 924 | is not given, RMR will save the last update using the |
| 925 | ``RMR_SEED_RT`` variable value and adding a ``.stash`` suffix |
| 926 | to the filename so as not to overwrite the static table. |
| 927 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 928 | * - **RMR_VCTL_FILE** |
| 929 | - |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 930 | This supplies the name of a verbosity control file. The core |
| 931 | RMR functions do not produce messages unless there is a |
| 932 | critical failure. However, the route table collection thread, |
| 933 | not a part of the main message processing component, can |
| 934 | write additional messages to standard error. If this variable |
| 935 | is set, RMR will extract the verbosity level for these |
| 936 | messages (0 is silent) from the first line of the file. |
| 937 | Changes to the file are detected and thus the level can be |
| 938 | changed dynamically, however RMR will only suss out this |
| 939 | variable during initialisation, so it is impossible to enable |
| 940 | verbosity after startup. |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 941 | |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 942 | * - **RMR_WARNINGS** |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 943 | - |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 944 | If set to 1, RMR will write some warnings which are |
| 945 | non-performance impacting. If the variable is not defined, or |
| 946 | set to 0, RMR will not write these additional warnings. |
| 947 | |
| 948 | |
| 949 | |
| 950 | There are other, non-RMR, variables which may exist and are |
| 951 | used by RMR. These variable names are not under the control |
| 952 | of RMR, so they are subject to change without potentiallyb |
| 953 | being reflected in either RMR's code, or this document. The |
| 954 | following is a list of these environment variables. |
| 955 | |
| 956 | |
| 957 | .. list-table:: |
| 958 | :widths: auto |
| 959 | :header-rows: 0 |
| 960 | :class: borderless |
| 961 | |
| 962 | * - **ALARM_MANAGER_SERVICE_NAME** |
| 963 | - |
| 964 | This is the DNS name, or IP address, of the process which is |
| 965 | listening for RMR alarm messages. If this variable is |
| 966 | missing, ``service-ricplt-alarmmanager-rmr`` is assumed. |
| 967 | |
| 968 | * - **ALARM_MANAGER_SERVICE_PORT** |
| 969 | - |
| 970 | This is the port that the alarm manager is using to accept |
| 971 | RMR messages. If the environment variable is missing the |
| 972 | value ``4560`` is assumed. |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 973 | |
| 974 | |
| 975 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 976 | |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 977 | Logging and Alarms |
| 978 | ------------------ |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 979 | |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 980 | As with nearly all UNIX libraries, errors, warnings and |
| 981 | informational messages are written in plain text to the |
| 982 | standard error device (stderr). All RMR messages are prefixed |
| 983 | with the current time (in milliseconds past the standard UNIX |
| 984 | epoch), the process ID, and a severity indicator. RMR |
| 985 | messages are written with one of three severity strings: |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 986 | |
| 987 | |
| 988 | .. list-table:: |
| 989 | :widths: auto |
| 990 | :header-rows: 0 |
| 991 | :class: borderless |
| 992 | |
| 993 | * - **[CRI]** |
| 994 | - |
| 995 | The event is of a critical nature and it is unlikely that RMR |
| 996 | will continue to operate correctly if at all. It is almost |
| 997 | certain that immediate action will be needed to resolve the |
| 998 | issue. |
| 999 | |
| 1000 | * - **[ERR]** |
| 1001 | - |
| 1002 | The event is not expected and RMR is not able to handle it. |
| 1003 | There is a small chance that continued operation will be |
| 1004 | negatively impacted. Eventual action to diagnose and correct |
| 1005 | the issue will be necessary. |
| 1006 | |
| 1007 | * - **[WRN]** |
| 1008 | - |
| 1009 | The event was not expected by RMR, but can be worked round. |
| 1010 | Normal operation will continue, but it is recommended that |
| 1011 | the cause of the problem be investigated. |
| 1012 | |
| 1013 | |
| 1014 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1015 | |
| 1016 | |
E. Scott Daniels | 2686455 | 2021-02-22 14:42:21 -0500 | [diff] [blame] | 1017 | Log message supression |
| 1018 | ---------------------- |
| 1019 | |
| 1020 | For the most part, the *fast path* code in RMR does no |
| 1021 | logging; even when messages are squelched, there is a |
| 1022 | non-zero cosst to check for the setting each time a potential |
| 1023 | message is to be written. To that end, RMRM will log only |
| 1024 | severe errors once initialisation has completed. An exception |
| 1025 | to this policy exists in the route table collection thread. |
| 1026 | The thread of execution which collects route table updates |
| 1027 | does not need to be concerned with performance, and as such |
| 1028 | has the potential to log its actions in a very verbose |
| 1029 | manner. The environment variable `` RMR_VCTL_FILE `` can be |
| 1030 | used to define a file where the desired verbosity level (0 to |
| 1031 | 4 where 0 is off) can be placed. If the environment variable |
| 1032 | is not set when the process starts, RMR will assume that the |
| 1033 | file ``/tmp/rmr.v`` will be used. Beginning with version |
| 1034 | 4.6.0 this file does **not** need to exist when the process |
| 1035 | is started. To change the verbosity level, the desired value |
| 1036 | is written to the file on the first line. |
| 1037 | |
| 1038 | |
| 1039 | Alarms |
| 1040 | ------ |
| 1041 | |
| 1042 | The route table colleciton thread is also responsible for |
| 1043 | watching for situations which need to be reported as alarms |
| 1044 | to the platform's alarm management service. When a state |
| 1045 | exists RMR will create and send an alarm (via RMR message) to |
| 1046 | the alarm service, and will send a *clear* message when the |
| 1047 | state no longer exists. Currently RMR will alarm only when |
| 1048 | the application is not removing messages from the receive |
| 1049 | ring quicklye enough causing RMR to drop messages as they are |
| 1050 | received. |
| 1051 | |
| 1052 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1053 | Notes |
| 1054 | ===== |
| 1055 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1056 | |
| 1057 | [1] It is entirely possible to design a routing table, and |
| 1058 | application group, such that the same message type is is |
| 1059 | left unchanged and the message is forwarded by an |
| 1060 | application after updating the payload. This type of |
| 1061 | behaviour is often referred to as service chaining, and can |
| 1062 | be done without any "knowledge" by an application with |
| 1063 | respect to where the message goes next. Service chaining is |
| 1064 | supported by RMR in as much as it allows the message to be |
| 1065 | resent, but the actual complexities of designing and |
| 1066 | implementing service chaining lie with the route table |
| 1067 | generator process. |
| 1068 | |
| 1069 | |
| 1070 | |
| 1071 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1072 | |
| 1073 | |
| 1074 | Appendix A -- Quick Reference |
| 1075 | ============================= |
| 1076 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1077 | Please refer to the RMR manual pages on the Read the Docs |
| 1078 | site |
| 1079 | |
| 1080 | https://docs.o-ran-sc.org/projects/o-ran-sc-ric-plt-lib-rmr/en/latest/index.html |
| 1081 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1082 | |
| 1083 | |
| 1084 | Appendix B -- Message Buffer Details |
| 1085 | ==================================== |
| 1086 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1087 | The RMR message buffer is a C structure which is exposed in |
| 1088 | the ``rmr.h`` header file. It is used to manage a message |
| 1089 | received from a peer endpoint, or a message that is being |
| 1090 | sent to a peer. Fields include payload length, amount of |
| 1091 | payload actually used, status, and a reference to the |
| 1092 | payload. There are also fields which the application should |
| 1093 | ignore, and could be hidden in the header file, but we chose |
| 1094 | not to. These fields include a reference to the RMR header |
| 1095 | information, and to the underlying transport mechanism |
| 1096 | message struct which may or may not be the same as the RMR |
| 1097 | header reference. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1098 | |
| 1099 | |
| 1100 | The Structure |
| 1101 | ------------- |
| 1102 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1103 | The following is the C structure. Readers are cautioned to |
| 1104 | examine the ``rmr.h`` header file directly; the information |
| 1105 | here may be out of date (old document in some cache), and |
| 1106 | thus it may be incorrect. |
| 1107 | |
| 1108 | |
| 1109 | :: |
| 1110 | |
| 1111 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1112 | typedef struct { |
| 1113 | int state; // state of processing |
| 1114 | int mtype; // message type |
| 1115 | int len; // length of data in the payload (send or received) |
| 1116 | unsigned char* payload; // transported data |
| 1117 | unsigned char* xaction; // pointer to fixed length transaction id bytes |
| 1118 | int sub_id; // subscription id |
| 1119 | int tp_state; // transport state (errno) |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1120 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1121 | // these things are off limits to the user application |
| 1122 | void* tp_buf; // underlying transport allocated pointer (e.g. nng message) |
| 1123 | void* header; // internal message header (whole buffer: header+payload) |
| 1124 | unsigned char* id; // if we need an ID in the message separate from the xaction id |
| 1125 | int flags; // various MFL_ (private) flags as needed |
| 1126 | int alloc_len; // the length of the allocated space (hdr+payload) |
| 1127 | void* ring; // ring this buffer should be queued back to |
| 1128 | int rts_fd; // SI fd for return to sender |
| 1129 | int cookie; // cookie to detect user misuse of free'd msg |
| 1130 | } rmr_mbuf_t; |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1131 | |
| 1132 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1133 | |
| 1134 | |
| 1135 | State vs Transport State |
| 1136 | ------------------------ |
| 1137 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1138 | The state field reflects the state at the time the message |
| 1139 | buffer is returned to the calling application. For a send |
| 1140 | operation, if the state is not ``RMR_OK`` then the message |
| 1141 | buffer references the payload that could not be sent, and |
| 1142 | when the state is ``RMR_OK`` the buffer references a *fresh* |
| 1143 | payload that the application may fill in. |
| 1144 | |
| 1145 | When the state is not ``RMR_OK,`` C programmes may examine |
| 1146 | the global ``errno`` value which RMR will have left set, if |
| 1147 | it was set, by the underlying transport mechanism. In some |
| 1148 | cases, wrapper modules are not able to directly access the |
| 1149 | C-library ``errno`` value, and to assist with possible |
| 1150 | transport error details, the send and receive operations |
| 1151 | populate ``tp_state`` with the value of ``errno.`` |
| 1152 | |
| 1153 | Regardless of whether the application makes use of the |
| 1154 | ``tp_state,`` or the ``errno`` value, it should be noted that |
| 1155 | the underlying transport mechanism may not actually update |
| 1156 | the errno value; in other words: it might not be accurate. In |
| 1157 | addition, RMR populates the ``tp_state`` value in the message |
| 1158 | buffer **only** when the state is not ``RMR_OK.`` |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1159 | |
| 1160 | |
| 1161 | Field References |
| 1162 | ---------------- |
| 1163 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1164 | The transaction field was exposed in the first version of |
| 1165 | RMR, and in hindsight this shouldn't have been done. Rather |
| 1166 | than break any existing code the reference was left, but |
| 1167 | additional fields such as trace data, were not directly |
| 1168 | exposed to the application. The application developer is |
| 1169 | strongly encouraged to use the functions which get and set |
| 1170 | the transaction ID rather than using the pointer directly; |
| 1171 | any data overruns will not be detected if the reference is |
| 1172 | used directly. |
| 1173 | |
| 1174 | In contrast, the payload reference should be used directly by |
| 1175 | the application in the interest of speed and ease of |
| 1176 | programming. The same care to prevent writing more bytes to |
| 1177 | the payload buffer than it can hold must be taken by the |
| 1178 | application. By the nature of the allocation of the payload |
| 1179 | in transport space, RMR is unable to add guard bytes and/or |
| 1180 | test for data overrun. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1181 | |
| 1182 | |
| 1183 | Actual Transmission |
| 1184 | ------------------- |
| 1185 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1186 | When RMR sends the application's message, the message buffer |
| 1187 | is **not** transmitted. The transport buffer (tp_buf) which |
| 1188 | contains the RMR header and application payload is the only |
| 1189 | set of bytes which are transmitted. While it may seem to the |
| 1190 | caller like the function ``rmr_send_msg()`` is returning a |
| 1191 | new message buffer, the same struct is reused and only a new |
| 1192 | transport buffer is allocated. The intent is to keep the |
| 1193 | alloc/free cycles to a minimum. |
| 1194 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1195 | |
| 1196 | |
| 1197 | Appendix C -- Glossary |
| 1198 | ====================== |
| 1199 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1200 | Many terms in networking can be interpreted with multiple |
| 1201 | meanings, and several terms used in various RMR documentation |
| 1202 | are RMR specific. The following definitions are the meanings |
| 1203 | of terms used within RMR documentation and should help the |
| 1204 | reader to understand the intent of meaning. |
| 1205 | |
| 1206 | .. list-table:: |
| 1207 | :widths: 25,70 |
| 1208 | :header-rows: 0 |
| 1209 | :class: borderless |
| 1210 | |
| 1211 | * - **application** |
| 1212 | - |
| 1213 | A programme which uses RMR to send and/or receive messages |
| 1214 | to/from another RMR based application. |
| 1215 | |
| 1216 | * - **Critical error** |
| 1217 | - |
| 1218 | An error that RMR has encountered which will prevent further |
| 1219 | successful processing by RMR. Critical errors usually |
| 1220 | indicate that the application should abort. |
| 1221 | |
| 1222 | * - **Endpoint** |
| 1223 | - |
| 1224 | An RMR based application that is defined as being capable of |
| 1225 | receiving one or more types of messages (as defined by a |
| 1226 | *routing key.*) |
| 1227 | |
| 1228 | * - **Environment variable** |
| 1229 | - |
| 1230 | A key/value pair which is set externally to the application, |
| 1231 | but which is available to the application (and referenced |
| 1232 | libraries) through the ``getenv`` system call. Environment |
| 1233 | variables are the main method of communicating information |
| 1234 | such as port numbers to RMR. |
| 1235 | |
| 1236 | * - **Error** |
| 1237 | - |
| 1238 | An abnormal condition that RMR has encountered, but will not |
| 1239 | affect the overall processing by RMR, but may impact certain |
| 1240 | aspects such as the ability to communicate with a specific |
| 1241 | endpoint. Errors generally indicate that something, usually |
| 1242 | external to RMR, must be addressed. |
| 1243 | |
| 1244 | * - **Host name** |
| 1245 | - |
| 1246 | The name of the host as returned by the ``gethostbyname`` |
| 1247 | system call. In a containerised environment this might be the |
| 1248 | container or service name depending on how the container is |
| 1249 | started. From RMR's point of view, a host name can be used to |
| 1250 | resolve an *endpoint* definition in a *route* table.) |
| 1251 | |
| 1252 | * - **IP** |
| 1253 | - |
| 1254 | Internet protocol. A low level transmission protocol which |
| 1255 | governs the transmission of datagrams across network |
| 1256 | boundaries. |
| 1257 | |
| 1258 | * - **Listen socket** |
| 1259 | - |
| 1260 | A *TCP* socket used to await incoming connection requests. |
| 1261 | Listen sockets are defined by an interface and port number |
| 1262 | combination where the port number is unique for the |
| 1263 | interface. |
| 1264 | |
| 1265 | * - **Message** |
| 1266 | - |
| 1267 | A series of bytes transmitted from the application to another |
| 1268 | RMR based application. A message is comprised of RMR specific |
| 1269 | data (a header), and application data (a payload). |
| 1270 | |
| 1271 | * - **Message buffer** |
| 1272 | - |
| 1273 | A data structure used to describe a message which is to be |
| 1274 | sent or has been received. The message buffer includes the |
| 1275 | payload length, message type, message source, and other |
| 1276 | information. |
| 1277 | |
| 1278 | * - **Message type** |
| 1279 | - |
| 1280 | A signed integer (0-32000) which identifies the type of |
| 1281 | message being transmitted, and is one of the two components |
| 1282 | of a *routing key.* See *Subscription ID.* |
| 1283 | |
| 1284 | * - **Payload** |
| 1285 | - |
| 1286 | The portion of a message which holds the user data to be |
| 1287 | transmitted to the remote *endpoint.* The payload contents |
| 1288 | are completely application defined. |
| 1289 | |
| 1290 | * - **RMR context** |
| 1291 | - |
| 1292 | A set of information which defines the current state of the |
| 1293 | underlying transport connections that RMR is managing. The |
| 1294 | application will be give a context reference (pointer) that |
| 1295 | is supplied to most RMR functions as the first parameter. |
| 1296 | |
| 1297 | * - **Round robin** |
| 1298 | - |
| 1299 | The method of selecting an *endpoint* from a list such that |
| 1300 | all *endpoints* are selected before starting at the head of |
| 1301 | the list. |
| 1302 | |
| 1303 | * - **Route table** |
| 1304 | - |
| 1305 | A series of "rules" which define the possible *endpoints* for |
| 1306 | each *routing key.* |
| 1307 | |
| 1308 | * - **Route table manager** |
| 1309 | - |
| 1310 | An application responsible for building a *route table* and |
| 1311 | then distributing it to all applicable RMR based |
| 1312 | applications. |
| 1313 | |
| 1314 | * - **Routing** |
| 1315 | - |
| 1316 | The process of selecting an *endpoint* which will be the |
| 1317 | recipient of a message. |
| 1318 | |
| 1319 | * - **Routing key** |
| 1320 | - |
| 1321 | A combination of *message type* and *subscription ID* which |
| 1322 | RMR uses to select the destination *endpoint* when sending a |
| 1323 | message. |
| 1324 | |
| 1325 | * - **Source** |
| 1326 | - |
| 1327 | The sender of a message. |
| 1328 | |
| 1329 | * - **Subscription ID** |
| 1330 | - |
| 1331 | A signed integer value (0-32000) which identifies the |
| 1332 | subscription characteristic of a message. It is used in |
| 1333 | conjunction with the *message type* to determine the *routing |
| 1334 | key.* |
| 1335 | |
| 1336 | * - **Target** |
| 1337 | - |
| 1338 | The *endpoint* selected to receive a message. |
| 1339 | |
| 1340 | * - **TCP** |
| 1341 | - |
| 1342 | Transmission Control Protocol. A connection based internet |
| 1343 | protocol which provides for lossless packet transportation, |
| 1344 | usually over IP. |
| 1345 | |
| 1346 | * - **Thread** |
| 1347 | - |
| 1348 | Also called a *process thread, or pthread.* This is a |
| 1349 | lightweight process which executes in concurrently with the |
| 1350 | application and shares the same address space. RMR uses |
| 1351 | threads to manage asynchronous functions such as route table |
| 1352 | updates. |
| 1353 | |
| 1354 | * - **Trace information** |
| 1355 | - |
| 1356 | An optional portion of the message buffer that the |
| 1357 | application may populate with data that allows for tracing |
| 1358 | the progress of the transaction or application activity |
| 1359 | across components. RMR makes no use of this data. |
| 1360 | |
| 1361 | * - **Transaction ID** |
| 1362 | - |
| 1363 | A fixed number of bytes in the *message* buffer) which the |
| 1364 | application may populate with information related to the |
| 1365 | transaction. RMR makes use of the transaction ID for matching |
| 1366 | response messages with the &c function is used to send a |
| 1367 | message. |
| 1368 | |
| 1369 | * - **Transient failure** |
| 1370 | - |
| 1371 | An error state that is believed to be short lived and that |
| 1372 | the operation, if retried by the application, might be |
| 1373 | successful. C programmers will recognise this as |
| 1374 | ``EAGAIN.`` |
| 1375 | |
| 1376 | * - **Warning** |
| 1377 | - |
| 1378 | A warning occurs when RMR has encountered something that it |
| 1379 | believes isn't correct, but has a defined work round. |
| 1380 | |
| 1381 | * - **Wormhole** |
| 1382 | - |
| 1383 | A direct connection managed by RMR between the user |
| 1384 | application and a remote, RMR based, application. |
| 1385 | |
| 1386 | |
| 1387 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1388 | |
| 1389 | |
| 1390 | Appendix D -- Code Examples |
| 1391 | =========================== |
| 1392 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1393 | The following snippet of code illustrate some of the basic |
| 1394 | operation of the RMR library. Please refer to the examples |
| 1395 | and test directories in the RMR repository for complete RMR |
| 1396 | based programmes. |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1397 | |
| 1398 | |
| 1399 | Sender Sample |
| 1400 | ------------- |
| 1401 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1402 | The following code segment shows how a message buffer can be |
| 1403 | allocated, populated, and sent. The snippet also illustrates |
| 1404 | how the result from the ``rmr_send_msg()`` function is used |
| 1405 | to send the next message. It does not illustrate error and/or |
| 1406 | retry handling. |
| 1407 | |
| 1408 | |
| 1409 | :: |
| 1410 | |
| 1411 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1412 | #include <unistd.h> |
| 1413 | #include <errno.h> |
| 1414 | #include <string.h> |
| 1415 | #include <stdio.h> |
| 1416 | #include <stdlib.h> |
| 1417 | #include <sys/epoll.h> |
| 1418 | #include <time.h> |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1419 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1420 | #include <rmr/rmr.h> |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1421 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1422 | int main( int argc, char** argv ) { |
| 1423 | void* mrc; // msg router context |
| 1424 | struct epoll_event events[1]; // list of events to give to epoll |
| 1425 | struct epoll_event epe; // event definition for event to listen to |
| 1426 | int ep_fd = -1; // epoll's file des (given to epoll_wait) |
| 1427 | int rcv_fd; // file des for epoll checks |
| 1428 | int nready; // number of events ready for receive |
| 1429 | rmr_mbuf_t* sbuf; // send buffer |
| 1430 | rmr_mbuf_t* rbuf; // received buffer |
| 1431 | int count = 0; |
| 1432 | int rcvd_count = 0; |
| 1433 | char* listen_port = "43086"; |
| 1434 | int delay = 1000000; // mu-sec delay between messages |
| 1435 | int mtype = 0; |
| 1436 | int stats_freq = 100; |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1437 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1438 | if( argc > 1 ) { // simplistic arg picking |
| 1439 | listen_port = argv[1]; |
| 1440 | } |
| 1441 | if( argc > 2 ) { |
| 1442 | delay = atoi( argv[2] ); |
| 1443 | } |
| 1444 | if( argc > 3 ) { |
| 1445 | mtype = atoi( argv[3] ); |
| 1446 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1447 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1448 | fprintf( stderr, "<DEMO> listen port: %s; mtype: %d; delay: %d\\n", |
| 1449 | listen_port, mtype, delay ); |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1450 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1451 | if( (mrc = rmr_init( listen_port, 1400, RMRFL_NONE )) == NULL ) { |
| 1452 | fprintf( stderr, "<DEMO> unable to initialise RMR\\n" ); |
| 1453 | exit( 1 ); |
| 1454 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1455 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1456 | rcv_fd = rmr_get_rcvfd( mrc ); // set up epoll things, start by getting the FD from RMR |
| 1457 | if( rcv_fd < 0 ) { |
| 1458 | fprintf( stderr, "<DEMO> unable to set up polling fd\\n" ); |
| 1459 | exit( 1 ); |
| 1460 | } |
| 1461 | if( (ep_fd = epoll_create1( 0 )) < 0 ) { |
| 1462 | fprintf( stderr, "[FAIL] unable to create epoll fd: %d\\n", errno ); |
| 1463 | exit( 1 ); |
| 1464 | } |
| 1465 | epe.events = EPOLLIN; |
| 1466 | epe.data.fd = rcv_fd; |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1467 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1468 | if( epoll_ctl( ep_fd, EPOLL_CTL_ADD, rcv_fd, &epe ) != 0 ) { |
| 1469 | fprintf( stderr, "[FAIL] epoll_ctl status not 0 : %s\\n", strerror( errno ) ); |
| 1470 | exit( 1 ); |
| 1471 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1472 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1473 | sbuf = rmr_alloc_msg( mrc, 256 ); // alloc 1st send buf; subsequent bufs alloc on send |
| 1474 | rbuf = NULL; // don't need to alloc receive buffer |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1475 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1476 | while( ! rmr_ready( mrc ) ) { // must have route table |
| 1477 | sleep( 1 ); // wait til we get one |
| 1478 | } |
| 1479 | fprintf( stderr, "<DEMO> rmr is ready\\n" ); |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1480 | |
| 1481 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1482 | while( 1 ) { // send messages until the cows come home |
| 1483 | snprintf( sbuf->payload, 200, |
| 1484 | "count=%d received= %d ts=%lld %d stand up and cheer!", // create the payload |
| 1485 | count, rcvd_count, (long long) time( NULL ), rand() ); |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1486 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1487 | sbuf->mtype = mtype; // fill in the message bits |
| 1488 | sbuf->len = strlen( sbuf->payload ) + 1; // send full ascii-z string |
| 1489 | sbuf->state = 0; |
| 1490 | sbuf = rmr_send_msg( mrc, sbuf ); // send & get next buf to fill in |
| 1491 | while( sbuf->state == RMR_ERR_RETRY ) { // soft failure (device busy?) retry |
| 1492 | sbuf = rmr_send_msg( mrc, sbuf ); // w/ simple spin that doesn't give up |
| 1493 | } |
| 1494 | count++; |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1495 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1496 | // check to see if anything was received and pull all messages in |
| 1497 | while( (nready = epoll_wait( ep_fd, events, 1, 0 )) > 0 ) { // 0 is non-blocking |
| 1498 | if( events[0].data.fd == rcv_fd ) { // waiting on 1 thing, so [0] is ok |
| 1499 | errno = 0; |
| 1500 | rbuf = rmr_rcv_msg( mrc, rbuf ); // receive and ignore; just count |
| 1501 | if( rbuf ) { |
| 1502 | rcvd_count++; |
| 1503 | } |
| 1504 | } |
| 1505 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1506 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1507 | if( (count % stats_freq) == 0 ) { // occasional stats out to tty |
| 1508 | fprintf( stderr, "<DEMO> sent %d received %d\\n", count, rcvd_count ); |
| 1509 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1510 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1511 | usleep( delay ); |
| 1512 | } |
| 1513 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1514 | |
| 1515 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1516 | |
| 1517 | |
| 1518 | Receiver Sample |
| 1519 | --------------- |
| 1520 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1521 | The receiver code is even simpler than the sender code as it |
| 1522 | does not need to wait for a route table to arrive (only |
| 1523 | senders need to do that), nor does it need to allocate an |
| 1524 | initial buffer. The example assumes that the sender is |
| 1525 | transmitting a zero terminated string as the payload. |
| 1526 | |
| 1527 | |
| 1528 | :: |
| 1529 | |
| 1530 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1531 | #include <unistd.h> |
| 1532 | #include <errno.h> |
| 1533 | #include <stdio.h> |
| 1534 | #include <stdlib.h> |
| 1535 | #include <time.h> |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1536 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1537 | #include <rmr/rmr.h> |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1538 | |
| 1539 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1540 | int main( int argc, char** argv ) { |
| 1541 | void* mrc; // msg router context |
| 1542 | long long total = 0; |
| 1543 | rmr_mbuf_t* msg = NULL; // message received |
| 1544 | int stat_freq = 10; // write stats after reciving this many messages |
| 1545 | int i; |
| 1546 | char* listen_port = "4560"; // default to what has become the standard RMR port |
| 1547 | long long count = 0; |
| 1548 | long long bad = 0; |
| 1549 | long long empty = 0; |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1550 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1551 | if( argc > 1 ) { |
| 1552 | listen_port = argv[1]; |
| 1553 | } |
| 1554 | if( argc > 2 ) { |
| 1555 | stat_freq = atoi( argv[2] ); |
| 1556 | } |
| 1557 | fprintf( stderr, "<DEMO> listening on port: %s\\n", listen_port ); |
| 1558 | fprintf( stderr, "<DEMO> stats will be reported every %d messages\\n", stat_freq ); |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1559 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1560 | mrc = rmr_init( listen_port, RMR_MAX_RCV_BYTES, RMRFL_NONE ); |
| 1561 | if( mrc == NULL ) { |
| 1562 | fprintf( stderr, "<DEMO> ABORT: unable to initialise RMr\\n" ); |
| 1563 | exit( 1 ); |
| 1564 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1565 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1566 | while( ! rmr_ready( mrc ) ) { // wait for RMR to get a route table |
| 1567 | fprintf( stderr, "<DEMO> waiting for ready\\n" ); |
| 1568 | sleep( 3 ); |
| 1569 | } |
| 1570 | fprintf( stderr, "<DEMO> rmr now shows ready\\n" ); |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1571 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1572 | while( 1 ) { // receive until killed |
| 1573 | msg = rmr_rcv_msg( mrc, msg ); // block until one arrives |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1574 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1575 | if( msg ) { |
| 1576 | if( msg->state == RMR_OK ) { |
| 1577 | count++; // nothing fancy, just count |
| 1578 | } else { |
| 1579 | bad++; |
| 1580 | } |
| 1581 | } else { |
| 1582 | empty++; |
| 1583 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1584 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1585 | if( (count % stat_freq) == 0 ) { |
| 1586 | fprintf( stderr, "<DEMO> total received: %lld; errors: %lld; empty: %lld\\n", |
| 1587 | count, bad, empty ); |
| 1588 | } |
| 1589 | } |
| 1590 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1591 | |
| 1592 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1593 | |
| 1594 | |
| 1595 | Receive and Send Sample |
| 1596 | ----------------------- |
| 1597 | |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1598 | The following code snippet receives messages and responds to |
| 1599 | the sender if the message type is odd. The code illustrates |
| 1600 | how the received message may be used to return a message to |
| 1601 | the source. Variable type definitions are omitted for clarity |
| 1602 | and should be obvious. |
| 1603 | |
| 1604 | It should also be noted that things like the message type |
| 1605 | which id returned to the sender (99) is a random value that |
| 1606 | these applications would have agreed on in advance and is |
| 1607 | **not** an RMR definition. |
| 1608 | |
| 1609 | |
| 1610 | :: |
| 1611 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1612 | mrc = rmr_init( listen_port, MAX_BUF_SZ, RMRFL_NOFLAGS ); |
| 1613 | rmr_set_stimeout( mrc, 1 ); // allow RMR to retry failed sends for ~1ms |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1614 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1615 | while( ! rmr_ready( mrc ) ) { // we send, therefore we need a route table |
| 1616 | sleep( 1 ); |
| 1617 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1618 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1619 | mbuf = NULL; // ensure our buffer pointer is nil for 1st call |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1620 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1621 | while( TRUE ) { |
| 1622 | mbuf = rmr_rcv_msg( mrc, mbuf ); // wait for message |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1623 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1624 | if( mbuf == NULL || mbuf->state != RMR_OK ) { |
| 1625 | break; |
| 1626 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1627 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1628 | if( mbuf->mtype % 2 ) { // respond to odd message types |
| 1629 | plen = rmr_payload_size( mbuf ); // max size |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1630 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1631 | // reset necessary fields in msg |
| 1632 | mbuf->mtype = 99; // response type |
| 1633 | mbuf->sub_id = RMR_VOID_SUBID; // we turn subid off |
| 1634 | mbuf->len = snprintf( mbuf->payload, plen, "pong: %s", get_info() ); |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1635 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1636 | mbuf = rmr_rts_msg( mrc, mbuf ); // return to sender |
| 1637 | if( mbuf == NULL || mbuf->state != RMR_OK ) { |
| 1638 | fprintf( stderr, "return to sender failed\\n" ); |
| 1639 | } |
| 1640 | } |
| 1641 | } |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1642 | |
E. Scott Daniels | a3a121c | 2020-05-06 09:07:08 -0400 | [diff] [blame] | 1643 | fprintf( stderr, "abort: receive failure\\n" ); |
| 1644 | rmr_close( mrc ); |
E. Scott Daniels | ece5bbe | 2020-07-21 13:39:18 -0400 | [diff] [blame] | 1645 | |
| 1646 | |
| 1647 | |