fix memory leaks on keystate reloading, simplify keystate reloading logic
This commit is contained in:
parent
d0f2d8b426
commit
8077e0f21c
@ -201,7 +201,7 @@ TALER_MINT_conf_duration_provide ()
|
|||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Iterator for denomination keys.
|
* Iterator for (re)loading/initializing denomination keys.
|
||||||
*
|
*
|
||||||
* @param cls closure
|
* @param cls closure
|
||||||
* @param dki the denomination key issue
|
* @param dki the denomination key issue
|
||||||
@ -240,7 +240,8 @@ reload_keys_denom_iter (void *cls,
|
|||||||
|
|
||||||
res = GNUNET_CONTAINER_multihashmap_put (ctx->denomkey_map,
|
res = GNUNET_CONTAINER_multihashmap_put (ctx->denomkey_map,
|
||||||
&denom_key_hash,
|
&denom_key_hash,
|
||||||
GNUNET_memdup (dki, sizeof (struct TALER_MINT_DenomKeyIssuePriv)),
|
GNUNET_memdup (dki,
|
||||||
|
sizeof (struct TALER_MINT_DenomKeyIssuePriv)),
|
||||||
GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
|
GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
|
||||||
if (GNUNET_OK != res)
|
if (GNUNET_OK != res)
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
||||||
@ -302,46 +303,24 @@ reload_keys_sign_iter (void *cls,
|
|||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Load the mint's key state from disk.
|
* Iterator for freeing denomination keys.
|
||||||
*
|
*
|
||||||
* @return fresh key state (with reference count 1)
|
* @param cls closure with the `struct MintKeyState`
|
||||||
|
* @param key key for the denomination key
|
||||||
|
* @param alias coin alias
|
||||||
|
* @return #GNUNET_OK to continue to iterate,
|
||||||
|
* #GNUNET_NO to stop iteration with no error,
|
||||||
|
* #GNUNET_SYSERR to abort iteration with error!
|
||||||
*/
|
*/
|
||||||
static struct MintKeyState *
|
static int
|
||||||
reload_keys ()
|
free_denom_key (void *cls,
|
||||||
|
const struct GNUNET_HashCode *key,
|
||||||
|
void *value)
|
||||||
{
|
{
|
||||||
struct MintKeyState *key_state;
|
struct TALER_MINT_DenomKeyIssuePriv *dki = value;
|
||||||
json_t *keys;
|
|
||||||
|
|
||||||
key_state = GNUNET_new (struct MintKeyState);
|
GNUNET_free (dki);
|
||||||
key_state->refcnt = 1;
|
return GNUNET_OK;
|
||||||
|
|
||||||
key_state->next_reload = GNUNET_TIME_UNIT_FOREVER_ABS;
|
|
||||||
|
|
||||||
key_state->denom_keys_array = json_array ();
|
|
||||||
GNUNET_assert (NULL != key_state->denom_keys_array);
|
|
||||||
|
|
||||||
key_state->sign_keys_array = json_array ();
|
|
||||||
GNUNET_assert (NULL != key_state->sign_keys_array);
|
|
||||||
|
|
||||||
key_state->denomkey_map = GNUNET_CONTAINER_multihashmap_create (32,
|
|
||||||
GNUNET_NO);
|
|
||||||
GNUNET_assert (NULL != key_state->denomkey_map);
|
|
||||||
|
|
||||||
key_state->reload_time = GNUNET_TIME_absolute_get ();
|
|
||||||
|
|
||||||
TALER_MINT_denomkeys_iterate (mintdir, &reload_keys_denom_iter, key_state);
|
|
||||||
TALER_MINT_signkeys_iterate (mintdir, &reload_keys_sign_iter, key_state);
|
|
||||||
|
|
||||||
keys = json_pack ("{s:o, s:o, s:o, s:o}",
|
|
||||||
"master_pub", TALER_JSON_from_data (&master_pub,
|
|
||||||
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey)),
|
|
||||||
"signkeys", key_state->sign_keys_array,
|
|
||||||
"denoms", key_state->denom_keys_array,
|
|
||||||
"list_issue_date", TALER_JSON_from_abs (key_state->reload_time));
|
|
||||||
|
|
||||||
key_state->keys_json = json_dumps (keys, JSON_INDENT(2));
|
|
||||||
|
|
||||||
return key_state;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -358,6 +337,12 @@ TALER_MINT_key_state_release (struct MintKeyState *key_state)
|
|||||||
key_state->refcnt--;
|
key_state->refcnt--;
|
||||||
if (0 == key_state->refcnt)
|
if (0 == key_state->refcnt)
|
||||||
{
|
{
|
||||||
|
json_decref (key_state->denom_keys_array);
|
||||||
|
json_decref (key_state->sign_keys_array);
|
||||||
|
GNUNET_CONTAINER_multihashmap_iterate (key_state->denomkey_map,
|
||||||
|
&free_denom_key,
|
||||||
|
key_state);
|
||||||
|
GNUNET_CONTAINER_multihashmap_destroy (key_state->denomkey_map);
|
||||||
GNUNET_free (key_state);
|
GNUNET_free (key_state);
|
||||||
}
|
}
|
||||||
GNUNET_assert (0 == pthread_mutex_unlock (&internal_key_state_mutex));
|
GNUNET_assert (0 == pthread_mutex_unlock (&internal_key_state_mutex));
|
||||||
@ -376,19 +361,41 @@ TALER_MINT_key_state_acquire (void)
|
|||||||
{
|
{
|
||||||
struct GNUNET_TIME_Absolute now = GNUNET_TIME_absolute_get ();
|
struct GNUNET_TIME_Absolute now = GNUNET_TIME_absolute_get ();
|
||||||
struct MintKeyState *key_state;
|
struct MintKeyState *key_state;
|
||||||
|
json_t *keys;
|
||||||
|
|
||||||
GNUNET_assert (0 == pthread_mutex_lock (&internal_key_state_mutex));
|
GNUNET_assert (0 == pthread_mutex_lock (&internal_key_state_mutex));
|
||||||
|
if (internal_key_state->next_reload.abs_value_us <= now.abs_value_us)
|
||||||
|
{
|
||||||
|
TALER_MINT_key_state_release (internal_key_state);
|
||||||
|
internal_key_state = NULL;
|
||||||
|
}
|
||||||
if (NULL == internal_key_state)
|
if (NULL == internal_key_state)
|
||||||
{
|
{
|
||||||
internal_key_state = reload_keys ();
|
key_state = GNUNET_new (struct MintKeyState);
|
||||||
}
|
key_state->next_reload = GNUNET_TIME_UNIT_FOREVER_ABS;
|
||||||
else if (internal_key_state->next_reload.abs_value_us <= now.abs_value_us)
|
key_state->denom_keys_array = json_array ();
|
||||||
{
|
GNUNET_assert (NULL != key_state->denom_keys_array);
|
||||||
GNUNET_assert (0 < internal_key_state->refcnt);
|
key_state->sign_keys_array = json_array ();
|
||||||
internal_key_state->refcnt--;
|
GNUNET_assert (NULL != key_state->sign_keys_array);
|
||||||
if (0 == internal_key_state->refcnt)
|
key_state->denomkey_map = GNUNET_CONTAINER_multihashmap_create (32,
|
||||||
GNUNET_free (internal_key_state);
|
GNUNET_NO);
|
||||||
internal_key_state = reload_keys ();
|
key_state->reload_time = GNUNET_TIME_absolute_get ();
|
||||||
|
TALER_MINT_denomkeys_iterate (mintdir,
|
||||||
|
&reload_keys_denom_iter,
|
||||||
|
key_state);
|
||||||
|
TALER_MINT_signkeys_iterate (mintdir,
|
||||||
|
&reload_keys_sign_iter,
|
||||||
|
key_state);
|
||||||
|
keys = json_pack ("{s:o, s:o, s:o, s:o}",
|
||||||
|
"master_pub",
|
||||||
|
TALER_JSON_from_data (&master_pub,
|
||||||
|
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey)),
|
||||||
|
"signkeys", key_state->sign_keys_array,
|
||||||
|
"denoms", key_state->denom_keys_array,
|
||||||
|
"list_issue_date", TALER_JSON_from_abs (key_state->reload_time));
|
||||||
|
key_state->keys_json = json_dumps (keys,
|
||||||
|
JSON_INDENT(2));
|
||||||
|
internal_key_state = key_state;
|
||||||
}
|
}
|
||||||
key_state = internal_key_state;
|
key_state = internal_key_state;
|
||||||
key_state->refcnt++;
|
key_state->refcnt++;
|
||||||
@ -458,6 +465,9 @@ handle_signal (int signal_number)
|
|||||||
/**
|
/**
|
||||||
* Read signals from a pipe in a loop, and reload keys from disk if
|
* Read signals from a pipe in a loop, and reload keys from disk if
|
||||||
* SIGUSR1 is read from the pipe.
|
* SIGUSR1 is read from the pipe.
|
||||||
|
*
|
||||||
|
* @return #GNUNET_SYSERR on errors, otherwise does not return
|
||||||
|
* (FIXME: #3474)
|
||||||
*/
|
*/
|
||||||
int
|
int
|
||||||
TALER_MINT_key_reload_loop (void)
|
TALER_MINT_key_reload_loop (void)
|
||||||
@ -487,16 +497,15 @@ TALER_MINT_key_reload_loop (void)
|
|||||||
|
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
||||||
"(re-)loading keys\n");
|
"(re-)loading keys\n");
|
||||||
GNUNET_assert (0 == pthread_mutex_lock (&internal_key_state_mutex));
|
|
||||||
if (NULL != internal_key_state)
|
if (NULL != internal_key_state)
|
||||||
{
|
{
|
||||||
GNUNET_assert (0 != internal_key_state->refcnt);
|
GNUNET_assert (0 != internal_key_state->refcnt);
|
||||||
internal_key_state->refcnt -= 1;
|
TALER_MINT_key_state_release (internal_key_state);
|
||||||
if (0 == internal_key_state->refcnt)
|
|
||||||
GNUNET_free (internal_key_state);
|
|
||||||
}
|
}
|
||||||
internal_key_state = reload_keys ();
|
/* This will re-initialize 'internal_key_state' with
|
||||||
GNUNET_assert (0 == pthread_mutex_unlock (&internal_key_state_mutex));
|
an initial refcnt of 1 */
|
||||||
|
(void) TALER_MINT_key_state_acquire ();
|
||||||
|
|
||||||
read_again:
|
read_again:
|
||||||
errno = 0;
|
errno = 0;
|
||||||
res = read (reload_pipe[0], &c, 1);
|
res = read (reload_pipe[0], &c, 1);
|
||||||
@ -513,8 +522,7 @@ read_again:
|
|||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Sign the message in @a purpose with the mint's signing
|
* Sign the message in @a purpose with the mint's signing key.
|
||||||
* key.
|
|
||||||
*
|
*
|
||||||
* @param purpose the message to sign
|
* @param purpose the message to sign
|
||||||
* @param[OUT] sig signature over purpose using current signing key
|
* @param[OUT] sig signature over purpose using current signing key
|
||||||
|
Loading…
Reference in New Issue
Block a user