2024-03-21 09:30:47 -04:00
|
|
|
// Copyright (c) 2006-2012, Salvatore Sanfilippo <antirez at gmail dot com>
|
|
|
|
// SPDX-FileCopyrightText: 2024 Redict Contributors
|
|
|
|
// SPDX-FileCopyrightText: 2024 Salvatore Sanfilippo <antirez at gmail dot com>
|
|
|
|
//
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2024-03-21 15:11:44 -04:00
|
|
|
// SPDX-License-Identifier: LGPL-3.0-only
|
2009-03-22 05:30:00 -04:00
|
|
|
|
|
|
|
#ifndef ANET_H
|
|
|
|
#define ANET_H
|
|
|
|
|
2016-01-08 09:05:14 -05:00
|
|
|
#include <sys/types.h>
|
|
|
|
|
2009-03-22 05:30:00 -04:00
|
|
|
#define ANET_OK 0
|
|
|
|
#define ANET_ERR -1
|
|
|
|
#define ANET_ERR_LEN 256
|
|
|
|
|
2014-01-10 09:02:39 -05:00
|
|
|
/* Flags used with certain functions. */
|
|
|
|
#define ANET_NONE 0
|
|
|
|
#define ANET_IP_ONLY (1<<0)
|
2023-12-24 03:40:34 -05:00
|
|
|
#define ANET_PREFER_IPV4 (1<<1)
|
|
|
|
#define ANET_PREFER_IPV6 (1<<2)
|
2014-01-10 09:02:39 -05:00
|
|
|
|
2014-07-29 17:39:37 -04:00
|
|
|
#if defined(__sun) || defined(_AIX)
|
2010-12-23 06:09:07 -05:00
|
|
|
#define AF_LOCAL AF_UNIX
|
|
|
|
#endif
|
|
|
|
|
2014-07-29 17:39:37 -04:00
|
|
|
#ifdef _AIX
|
|
|
|
#undef ip_len
|
|
|
|
#endif
|
|
|
|
|
2019-09-12 03:56:54 -04:00
|
|
|
int anetTcpNonBlockConnect(char *err, const char *addr, int port);
|
|
|
|
int anetTcpNonBlockBestEffortBindConnect(char *err, const char *addr, int port, const char *source_addr);
|
Add hostname support in Sentinel. (#8282)
This is both a bugfix and an enhancement.
Internally, Sentinel relies entirely on IP addresses to identify
instances. When configured with a new master, it also requires users to
specify and IP and not hostname.
However, replicas may use the replica-announce-ip configuration to
announce a hostname. When that happens, Sentinel fails to match the
announced hostname with the expected IP and considers that a different
instance, triggering reconfiguration, etc.
Another use case is where TLS is used and clients are expected to match
the hostname to connect to with the certificate's SAN attribute. To
properly implement this configuration, it is necessary for Sentinel to
redirect clients to a hostname rather than an IP address.
The new 'resolve-hostnames' configuration parameter determines if
Sentinel is willing to accept hostnames. It is set by default to no,
which maintains backwards compatibility and avoids unexpected DNS
resolution delays on systems with DNS configuration issues.
Internally, Sentinel continues to identify instances by their resolved
IP address and will also report the IP by default. The new
'announce-hostnames' parameter determines if Sentinel should prefer to
announce a hostname, when available, rather than an IP address. This
applies to addresses returned to clients, as well as their
representation in the configuration file, REPLICAOF configuration
commands, etc.
This commit also introduces SENTINEL CONFIG GET and SENTINEL CONFIG SET
which can be used to introspect or configure global Sentinel
configuration that was previously was only possible by directly
accessing the configuration file and possibly restarting the instance.
Co-authored-by: myl1024 <myl92916@qq.com>
Co-authored-by: sundb <sundbcn@gmail.com>
2021-01-28 05:09:11 -05:00
|
|
|
int anetResolve(char *err, char *host, char *ipbuf, size_t ipbuf_len, int flags);
|
2013-11-08 14:55:48 -05:00
|
|
|
int anetTcpServer(char *err, int port, char *bindaddr, int backlog);
|
|
|
|
int anetTcp6Server(char *err, int port, char *bindaddr, int backlog);
|
|
|
|
int anetUnixServer(char *err, char *path, mode_t perm, int backlog);
|
2011-06-17 14:47:49 -04:00
|
|
|
int anetTcpAccept(char *err, int serversock, char *ip, size_t ip_len, int *port);
|
2010-10-13 12:50:07 -04:00
|
|
|
int anetUnixAccept(char *err, int serversock);
|
2009-03-22 05:30:00 -04:00
|
|
|
int anetNonBlock(char *err, int fd);
|
2014-10-17 10:30:11 -04:00
|
|
|
int anetBlock(char *err, int fd);
|
2021-01-19 15:57:30 -05:00
|
|
|
int anetCloexec(int fd);
|
2013-01-31 05:14:15 -05:00
|
|
|
int anetEnableTcpNoDelay(char *err, int fd);
|
|
|
|
int anetDisableTcpNoDelay(char *err, int fd);
|
2014-10-22 09:23:21 -04:00
|
|
|
int anetSendTimeout(char *err, int fd, long long ms);
|
2019-07-01 08:22:29 -04:00
|
|
|
int anetRecvTimeout(char *err, int fd, long long ms);
|
Introduce connAddr
Originally, connPeerToString is designed to get the address info from
socket only(for both TCP & TLS), and the API 'connPeerToString' is
oriented to operate a FD like:
int connPeerToString(connection *conn, char *ip, size_t ip_len, int *port) {
return anetFdToString(conn ? conn->fd : -1, ip, ip_len, port, FD_TO_PEER_NAME);
}
Introduce connAddr and implement .addr method for socket and TLS,
thus the API 'connAddr' and 'connFormatAddr' become oriented to a
connection like:
static inline int connAddr(connection *conn, char *ip, size_t ip_len, int *port, int remote) {
if (conn && conn->type->addr) {
return conn->type->addr(conn, ip, ip_len, port, remote);
}
return -1;
}
Also remove 'FD_TO_PEER_NAME' & 'FD_TO_SOCK_NAME', use a boolean type
'remote' to get local/remote address of a connection.
With these changes, it's possible to support the other connection
types which does not use socket(Ex, RDMA).
Thanks to Oran for suggestions!
Signed-off-by: zhenwei pi <pizhenwei@bytedance.com>
2022-07-26 22:08:32 -04:00
|
|
|
int anetFdToString(int fd, char *ip, size_t ip_len, int *port, int remote);
|
2013-02-08 10:30:21 -05:00
|
|
|
int anetKeepAlive(char *err, int fd, int interval);
|
2014-12-11 12:20:30 -05:00
|
|
|
int anetFormatAddr(char *fmt, size_t fmt_len, char *ip, int port);
|
2021-10-06 09:08:13 -04:00
|
|
|
int anetPipe(int fds[2], int read_flags, int write_flags);
|
2022-04-20 02:29:37 -04:00
|
|
|
int anetSetSockMarkId(char *err, int fd, uint32_t id);
|
2022-07-26 21:38:25 -04:00
|
|
|
int anetGetError(int fd);
|
2023-04-17 14:05:36 -04:00
|
|
|
int anetIsFifo(char *filepath);
|
2009-03-22 05:30:00 -04:00
|
|
|
|
|
|
|
#endif
|