post-merge-fixes

This commit is contained in:
Witold Kręcicki
2020-07-22 00:41:58 +02:00
committed by Evan Hunt
parent f43af328b6
commit f8ef33db6d
4 changed files with 12 additions and 17 deletions

View File

@@ -595,13 +595,10 @@ process_queue(isc__networker_t *worker, isc_queue_t *queue) {
uv_stop(&worker->loop);
isc_mempool_put(worker->mgr->evpool, ievent);
return;
<<<<<<< HEAD
case netievent_udpconnect:
isc__nm_async_udpconnect(worker, ievent);
break;
=======
>>>>>>> netmgr: server-side TLS support
case netievent_udplisten:
isc__nm_async_udplisten(worker, ievent);
break;
@@ -611,16 +608,14 @@ process_queue(isc__networker_t *worker, isc_queue_t *queue) {
case netievent_udpsend:
isc__nm_async_udpsend(worker, ievent);
break;
<<<<<<< HEAD
case netievent_udpread:
isc__nm_async_udpread(worker, ievent);
break;
case netievent_udpclose:
isc__nm_async_udpclose(worker, ievent);
break;
=======
>>>>>>> netmgr: server-side TLS support
case netievent_tcpconnect:
isc__nm_async_tcpconnect(worker, ievent);
break;
@@ -1144,7 +1139,7 @@ isc__nmhandle_get(isc_nmsocket_t *sock, isc_sockaddr_t *peer,
handle->ah_pos = pos;
UNLOCK(&sock->lock);
if (sock->type == isc_nm_tcpsocket || sock->type == isc_nm_tlssocket
if (sock->type == isc_nm_tcpsocket || sock->type == isc_nm_tlssocket ||
(sock->type == isc_nm_udpsocket && sock->client)) {
INSIST(sock->statichandle == NULL);
sock->statichandle = handle;

View File

@@ -70,7 +70,7 @@ tls_do_bio(isc_nmsocket_t *sock, int rv) {
region.length);
isc_region_t dregion =
(isc_region_t){ region.base, rv };
sock->rcb.recv(sock->tcphandle, ISC_R_SUCCESS,
sock->rcb.recv(sock->statichandle, ISC_R_SUCCESS,
&dregion, sock->rcbarg);
free(region.base);
}
@@ -116,7 +116,7 @@ tls_do_bio(isc_nmsocket_t *sock, int rv) {
error:
/* XXXWPK TODO log it ! */
if (sock->rcb.recv != NULL) {
sock->rcb.recv(sock->tcphandle, ISC_R_SUCCESS, NULL,
sock->rcb.recv(sock->statichandle, ISC_R_SUCCESS, NULL,
sock->rcbarg);
} else {
tls_close_direct(sock);
@@ -138,7 +138,7 @@ tls_readcb(isc_nmhandle_t *handle, isc_result_t result, isc_region_t *region,
/* TODO accept_cb should be called if we're not initialized yet!
*/
if (tlssock->rcb.recv != NULL) {
tlssock->rcb.recv(tlssock->tcphandle, result, region,
tlssock->rcb.recv(tlssock->statichandle, result, region,
tlssock->rcbarg);
}
isc__nm_tls_close(tlssock);
@@ -152,11 +152,11 @@ tls_readcb(isc_nmhandle_t *handle, isc_result_t result, isc_region_t *region,
if (SSL_is_init_finished(tlssock->tls.ssl) == 1) {
if (tlssock->server) {
tlssock->listener->accept_cb.accept(
tlssock->tcphandle, ISC_R_SUCCESS,
tlssock->statichandle, ISC_R_SUCCESS,
tlssock->listener->accept_cbarg);
} else {
tlssock->accept_cb.connect(
tlssock->tcphandle, ISC_R_SUCCESS,
tlssock->statichandle, ISC_R_SUCCESS,
tlssock->accept_cbarg);
}
tlssock->tls.state = IO;
@@ -293,7 +293,7 @@ tls_send_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req) {
}
INSIST((unsigned)rv == req->uvbuf.len);
tls_do_bio(sock, TLS_CHECK_RV);
req->cb.send(sock->tcphandle, ISC_R_SUCCESS, req->cbarg);
req->cb.send(sock->statichandle, ISC_R_SUCCESS, req->cbarg);
isc__nm_uvreq_put(&req, sock);
return (ISC_R_SUCCESS);
}