4 server.lua based on lua/libevent by blastbeat
\r
7 -- when using luaevent, never register 2 or more EV_READ at one socket, same for EV_WRITE
\r
8 -- you cant even register a new EV_READ/EV_WRITE callback inside another one
\r
9 -- never call eventcallback:close( ) from inside eventcallback
\r
10 -- to do some of the above, use timeout events or something what will called from outside
\r
11 -- dont let garbagecollect eventcallbacks, as long they are running
\r
12 -- when using luasec, there are 4 cases of timeout errors: wantread or wantwrite during reading or writing
\r
17 local SCRIPT_NAME = "server_event.lua"
\r
18 local SCRIPT_VERSION = "0.05"
\r
19 local SCRIPT_AUTHOR = "blastbeat"
\r
20 local LAST_MODIFIED = "2009/11/20"
\r
23 MAX_CONNECTIONS = 100000, -- max per server connections (use "ulimit -n" on *nix)
\r
24 MAX_HANDSHAKE_ATTEMPS = 10, -- attemps to finish ssl handshake
\r
25 HANDSHAKE_TIMEOUT = 1, -- timout in seconds per handshake attemp
\r
26 MAX_READ_LENGTH = 1024 * 1024 * 1024 * 1024, -- max bytes allowed to read from sockets
\r
27 MAX_SEND_LENGTH = 1024 * 1024 * 1024 * 1024, -- max bytes size of write buffer (for writing on sockets)
\r
28 ACCEPT_DELAY = 10, -- seconds to wait until the next attemp of a full server to accept
\r
29 READ_TIMEOUT = 60 * 30, -- timeout in seconds for read data from socket
\r
30 WRITE_TIMEOUT = 30, -- timeout in seconds for write data on socket
\r
31 CONNECT_TIMEOUT = 10, -- timeout in seconds for connection attemps
\r
32 CLEAR_DELAY = 5, -- seconds to wait for clearing interface list (and calling ondisconnect listeners)
\r
33 DEBUG = true, -- show debug messages
\r
36 local function use(x) return rawget(_G, x); end
\r
37 local print = use "print"
\r
38 local pcall = use "pcall"
\r
39 local ipairs = use "ipairs"
\r
40 local string = use "string"
\r
41 local select = use "select"
\r
42 local require = use "require"
\r
43 local tostring = use "tostring"
\r
44 local coroutine = use "coroutine"
\r
45 local setmetatable = use "setmetatable"
\r
47 local ssl = use "ssl"
\r
48 local socket = use "socket"
\r
50 local log = require ("util.logger").init("socket")
\r
52 local function debug(...)
\r
53 return log("debug", ("%s "):rep(select('#', ...)), ...)
\r
55 local vdebug = debug;
\r
57 local bitor = ( function( ) -- thx Rici Lake
\r
58 local hasbit = function( x, p )
\r
59 return x % ( p + p ) >= p
\r
61 return function( x, y )
\r
64 local limit = x > y and x or y
\r
65 while p <= limit do
\r
66 if hasbit( x, p ) or hasbit( y, p ) then
\r
75 local event = require "luaevent.core"
\r
76 local base = event.new( )
\r
77 local EV_READ = event.EV_READ
\r
78 local EV_WRITE = event.EV_WRITE
\r
79 local EV_TIMEOUT = event.EV_TIMEOUT
\r
81 local EV_READWRITE = bitor( EV_READ, EV_WRITE )
\r
83 local interfacelist = ( function( ) -- holds the interfaces for sockets
\r
86 return function( method, arg )
\r
87 if "add" == method then
\r
90 arg:_position( len )
\r
92 elseif "delete" == method then
\r
94 return nil, "array is already empty"
\r
96 local position = arg:_position() -- get position in array
\r
97 if position ~= len then
\r
98 local interface = array[ len ] -- get last interface
\r
99 array[ position ] = interface -- copy it into free position
\r
100 array[ len ] = nil -- free last position
\r
101 interface:_position( position ) -- set new position in array
\r
102 else -- free last position
\r
113 -- Client interface methods
\r
116 interface_mt = {}; interface_mt.__index = interface_mt;
\r
118 local addevent = base.addevent
\r
119 local coroutine_wrap, coroutine_yield = coroutine.wrap,coroutine.yield
\r
120 local string_len = string.len
\r
123 function interface_mt:_position(new_position)
\r
124 self.position = new_position or self.position
\r
125 return self.position;
\r
127 function interface_mt:_close() -- regs event to start self:_destroy()
\r
128 local callback = function( )
\r
130 self.eventclose = nil
\r
133 self.eventclose = addevent( base, nil, EV_TIMEOUT, callback, 0 )
\r
137 function interface_mt:_start_connection(plainssl) -- should be called from addclient
\r
138 local callback = function( event )
\r
139 if EV_TIMEOUT == event then -- timout during connection
\r
140 self.fatalerror = "connection timeout"
\r
141 self.listener.ontimeout( self ) -- call timeout listener
\r
143 debug( "new connection failed. id:", self.id, "error:", self.fatalerror )
\r
145 if plainssl then -- start ssl session
\r
146 self:_start_ssl( self.listener.onconnect )
\r
147 else -- normal connection
\r
148 self:_start_session( self.listener.onconnect )
\r
150 debug( "new connection established. id:", self.id )
\r
152 self.eventconnect = nil
\r
155 self.eventconnect = addevent( base, self.conn, EV_WRITE, callback, cfg.CONNECT_TIMEOUT )
\r
158 function interface_mt:_start_session(onconnect) -- new session, for example after startssl
\r
159 if self.type == "client" then
\r
160 local callback = function( )
\r
161 self:_lock( false, false, false )
\r
162 --vdebug( "start listening on client socket with id:", self.id )
\r
163 self.eventread = addevent( base, self.conn, EV_READ, self.readcallback, cfg.READ_TIMEOUT ) -- register callback
\r
165 self.eventsession = nil
\r
168 self.eventsession = addevent( base, nil, EV_TIMEOUT, callback, 0 )
\r
170 self:_lock( false )
\r
171 --vdebug( "start listening on server socket with id:", self.id )
\r
172 self.eventread = addevent( base, self.conn, EV_READ, self.readcallback ) -- register callback
\r
176 function interface_mt:_start_ssl(arg) -- old socket will be destroyed, therefore we have to close read/write events first
\r
177 --vdebug( "starting ssl session with client id:", self.id )
\r
179 _ = self.eventread and self.eventread:close( ) -- close events; this must be called outside of the event callbacks!
\r
180 _ = self.eventwrite and self.eventwrite:close( )
\r
181 self.eventread, self.eventwrite = nil, nil
\r
183 self.conn, err = ssl.wrap( self.conn, self._sslctx )
\r
185 self.fatalerror = err
\r
186 self.conn = nil -- cannot be used anymore
\r
187 if "onconnect" == arg then
\r
188 self.ondisconnect = nil -- dont call this when client isnt really connected
\r
191 debug( "fatal error while ssl wrapping:", err )
\r
194 self.conn:settimeout( 0 ) -- set non blocking
\r
195 local handshakecallback = coroutine_wrap(
\r
199 local maxattempt = cfg.MAX_HANDSHAKE_ATTEMPS
\r
200 while attempt < 1000 do -- no endless loop
\r
201 attempt = attempt + 1
\r
202 debug( "ssl handshake of client with id:"..tostring(self).."attemp:"..attempt )
\r
203 if attempt > maxattempt then
\r
204 self.fatalerror = "max handshake attemps exceeded"
\r
205 elseif EV_TIMEOUT == event then
\r
206 self.fatalerror = "timeout during handshake"
\r
208 _, err = self.conn:dohandshake( )
\r
210 self:_lock( false, false, false ) -- unlock the interface; sending, closing etc allowed
\r
211 self.send = self.conn.send -- caching table lookups with new client object
\r
212 self.receive = self.conn.receive
\r
214 if "onconnect" == arg then -- trigger listener
\r
215 onsomething = self.listener.onconnect
\r
217 onsomething = self.listener.onsslconnection
\r
219 self:_start_session( onsomething )
\r
220 debug( "ssl handshake done" )
\r
221 self.eventhandshake = nil
\r
224 debug( "error during ssl handshake:", err )
\r
225 if err == "wantwrite" then
\r
227 elseif err == "wantread" then
\r
230 self.fatalerror = err
\r
233 if self.fatalerror then
\r
234 if "onconnect" == arg then
\r
235 self.ondisconnect = nil -- dont call this when client isnt really connected
\r
238 debug( "handshake failed because:", self.fatalerror )
\r
239 self.eventhandshake = nil
\r
242 event = coroutine_yield( event, cfg.HANDSHAKE_TIMEOUT ) -- yield this monster...
\r
246 debug "starting handshake..."
\r
247 self:_lock( false, true, true ) -- unlock read/write events, but keep interface locked
\r
248 self.eventhandshake = addevent( base, self.conn, EV_READWRITE, handshakecallback, cfg.HANDSHAKE_TIMEOUT )
\r
251 function interface_mt:_destroy() -- close this interface + events and call last listener
\r
252 debug( "closing client with id:", self.id )
\r
253 self:_lock( true, true, true ) -- first of all, lock the interface to avoid further actions
\r
255 _ = self.eventread and self.eventread:close( ) -- close events; this must be called outside of the event callbacks!
\r
256 if self.type == "client" then
\r
257 _ = self.eventwrite and self.eventwrite:close( )
\r
258 _ = self.eventhandshake and self.eventhandshake:close( )
\r
259 _ = self.eventstarthandshake and self.eventstarthandshake:close( )
\r
260 _ = self.eventconnect and self.eventconnect:close( )
\r
261 _ = self.eventsession and self.eventsession:close( )
\r
262 _ = self.eventwritetimeout and self.eventwritetimeout:close( )
\r
263 _ = self.eventreadtimeout and self.eventreadtimeout:close( )
\r
264 _ = self.ondisconnect and self:ondisconnect( self.fatalerror ) -- call ondisconnect listener (wont be the case if handshake failed on connect)
\r
265 _ = self.conn and self.conn:close( ) -- close connection, must also be called outside of any socket registered events!
\r
266 self._server:counter(-1);
\r
267 self.eventread, self.eventwrite = nil, nil
\r
268 self.eventstarthandshake, self.eventhandshake, self.eventclose = nil, nil, nil
\r
269 self.readcallback, self.writecallback = nil, nil
\r
272 self.eventread, self.eventclose = nil, nil
\r
273 self.interface, self.readcallback = nil, nil
\r
275 interfacelist( "delete", self )
\r
278 function interface_mt:_lock(nointerface, noreading, nowriting) -- lock or unlock this interface or events
\r
279 self.nointerface, self.noreading, self.nowriting = nointerface, noreading, nowriting
\r
280 return nointerface, noreading, nowriting
\r
283 function interface_mt:counter(c)
\r
285 self._connections = self._connections - c
\r
287 return self._connections
\r
291 function interface_mt:write(data)
\r
292 vdebug( "try to send data to client, id/data:", self.id, data )
\r
293 data = tostring( data )
\r
294 local len = string_len( data )
\r
295 local total = len + self.writebufferlen
\r
296 if total > cfg.MAX_SEND_LENGTH then -- check buffer length
\r
297 local err = "send buffer exceeded"
\r
298 debug( "error:", err ) -- to much, check your app
\r
301 self.writebuffer = self.writebuffer .. data -- new buffer
\r
302 self.writebufferlen = total
\r
303 if not self.eventwrite then -- register new write event
\r
304 --vdebug( "register new write event" )
\r
305 self.eventwrite = addevent( base, self.conn, EV_WRITE, self.writecallback, cfg.WRITE_TIMEOUT )
\r
309 function interface_mt:close(now)
\r
310 debug( "try to close client connection with id:", self.id )
\r
311 if self.type == "client" then
\r
312 self.fatalerror = "client to close"
\r
313 if ( not self.eventwrite ) or now then -- try to close immediately
\r
314 self:_lock( true, true, true )
\r
317 else -- wait for incomplete write request
\r
318 self:_lock( true, true, false )
\r
319 debug "closing delayed until writebuffer is empty"
\r
320 return nil, "writebuffer not empty, waiting"
\r
323 debug( "try to close server with id:", self.id, "args:", now )
\r
324 self.fatalerror = "server to close"
\r
327 for _, item in ipairs( interfacelist( ) ) do
\r
328 if ( item.type ~= "server" ) and ( item._server == self ) then -- client/server match
\r
329 if item:close( now ) then -- writebuffer was empty
\r
334 local timeout = 0 -- dont wait for unfinished writebuffers of clients...
\r
336 timeout = cfg.WRITE_TIMEOUT -- ...or wait for it
\r
338 self:_close( timeout ) -- add new event to remove the server interface
\r
339 debug( "seconds remained until server is closed:", timeout )
\r
340 return count -- returns finished clients with empty writebuffer
\r
344 function interface_mt:server()
\r
345 return self._server or self;
\r
348 function interface_mt:port()
\r
352 function interface_mt:ip()
\r
356 function interface_mt:ssl()
\r
357 return self.usingssl
\r
360 function interface_mt:type()
\r
361 return self._type or "client"
\r
364 function interface_mt:connections()
\r
365 return self._connections
\r
368 function interface_mt:address()
\r
374 function interface_mt:starttls()
\r
375 debug( "try to start ssl at client id:", self.id )
\r
377 if not self._sslctx then -- no ssl available
\r
378 err = "no ssl context available"
\r
379 elseif self.usingssl then -- startssl was already called
\r
380 err = "ssl already active"
\r
383 debug( "error:", err )
\r
386 self.usingssl = true
\r
387 self.startsslcallback = function( ) -- we have to start the handshake outside of a read/write event
\r
389 self.eventstarthandshake = nil
\r
392 if not self.eventwrite then
\r
393 self:_lock( true, true, true ) -- lock the interface, to not disturb the handshake
\r
394 self.eventstarthandshake = addevent( base, nil, EV_TIMEOUT, self.startsslcallback, 0 ) -- add event to start handshake
\r
395 else -- wait until writebuffer is empty
\r
396 self:_lock( true, true, false )
\r
397 debug "ssl session delayed until writebuffer is empty..."
\r
402 function interface_mt.onconnect()
\r
406 -- End of client interface methods
\r
408 local handleclient;
\r
410 local string_sub = string.sub -- caching table lookups
\r
411 local string_len = string.len
\r
412 local addevent = base.addevent
\r
413 local coroutine_wrap = coroutine.wrap
\r
414 local socket_gettime = socket.gettime
\r
415 local coroutine_yield = coroutine.yield
\r
416 function handleclient( client, ip, port, server, pattern, listener, _, sslctx ) -- creates an client interface
\r
417 --vdebug("creating client interfacce...")
\r
418 local interface = {
\r
421 currenttime = socket_gettime( ); -- safe the origin
\r
422 writebuffer = ""; -- writebuffer
\r
423 writebufferlen = 0; -- length of writebuffer
\r
424 send = client.send; -- caching table lookups
\r
425 receive = client.receive;
\r
426 onconnect = listener.onconnect; -- will be called when client disconnects
\r
427 ondisconnect = listener.ondisconnect; -- will be called when client disconnects
\r
428 onincoming = listener.onincoming; -- will be called when client sends data
\r
429 eventread = false, eventwrite = false, eventclose = false,
\r
430 eventhandshake = false, eventstarthandshake = false; -- event handler
\r
431 eventconnect = false, eventsession = false; -- more event handler...
\r
432 eventwritetimeout = false; -- even more event handler...
\r
433 eventreadtimeout = false;
\r
434 fatalerror = false; -- error message
\r
435 writecallback = false; -- will be called on write events
\r
436 readcallback = false; -- will be called on read events
\r
437 nointerface = true; -- lock/unlock parameter of this interface
\r
438 noreading = false, nowriting = false; -- locks of the read/writecallback
\r
439 startsslcallback = false; -- starting handshake callback
\r
440 position = false; -- position of client in interfacelist
\r
443 _ip = ip, _port = port, _server = server, _pattern = pattern,
\r
444 _sslctx = sslctx; -- parameters
\r
445 _usingssl = false; -- client is using ssl;
\r
447 interface.id = tostring(interface):match("%x+$");
\r
448 interface.writecallback = function( event ) -- called on write events
\r
449 --vdebug( "new client write event, id/ip/port:", interface, ip, port )
\r
450 if interface.nowriting or ( interface.fatalerror and ( "client to close" ~= interface.fatalerror ) ) then -- leave this event
\r
451 --vdebug( "leaving this event because:", interface.nowriting or interface.fatalerror )
\r
452 interface.eventwrite = false
\r
455 if EV_TIMEOUT == event then -- took too long to write some data to socket -> disconnect
\r
456 interface.fatalerror = "timeout during writing"
\r
457 debug( "writing failed:", interface.fatalerror )
\r
459 interface.eventwrite = false
\r
461 else -- can write :)
\r
462 if interface.usingssl then -- handle luasec
\r
463 if interface.eventreadtimeout then -- we have to read first
\r
464 local ret = interface.readcallback( ) -- call readcallback
\r
465 --vdebug( "tried to read in writecallback, result:", ret )
\r
467 if interface.eventwritetimeout then -- luasec only
\r
468 interface.eventwritetimeout:close( ) -- first we have to close timeout event which where regged after a wantread error
\r
469 interface.eventwritetimeout = false
\r
472 local succ, err, byte = interface.send( interface.conn, interface.writebuffer, 1, interface.writebufferlen )
\r
473 --vdebug( "write data:", interface.writebuffer, "error:", err, "part:", byte )
\r
474 if succ then -- writing succesful
\r
475 interface.writebuffer = ""
\r
476 interface.writebufferlen = 0
\r
477 if interface.fatalerror then
\r
478 debug "closing client after writing"
\r
479 interface:_close() -- close interface if needed
\r
480 elseif interface.startsslcallback then -- start ssl connection if needed
\r
481 debug "starting ssl handshake after writing"
\r
482 interface.eventstarthandshake = addevent( base, nil, EV_TIMEOUT, interface.startsslcallback, 0 )
\r
483 elseif interface.eventreadtimeout then
\r
484 return EV_WRITE, EV_TIMEOUT
\r
486 interface.eventwrite = nil
\r
488 elseif byte then -- want write again
\r
489 --vdebug( "writebuffer is not empty:", err )
\r
490 interface.writebuffer = string_sub( interface.writebuffer, byte + 1, interface.writebufferlen ) -- new buffer
\r
491 interface.writebufferlen = interface.writebufferlen - byte
\r
492 if "wantread" == err then -- happens only with luasec
\r
493 local callback = function( )
\r
495 interface.eventwritetimeout = nil
\r
496 return evreturn, evtimeout
\r
498 interface.eventwritetimeout = addevent( base, nil, EV_TIMEOUT, callback, cfg.WRITE_TIMEOUT ) -- reg a new timeout event
\r
499 debug( "wantread during write attemp, reg it in readcallback but dont know what really happens next..." )
\r
500 -- hopefully this works with luasec; its simply not possible to use 2 different write events on a socket in luaevent
\r
503 return EV_WRITE, cfg.WRITE_TIMEOUT
\r
504 else -- connection was closed during writing or fatal error
\r
505 interface.fatalerror = err or "fatal error"
\r
506 debug( "connection failed in write event:", interface.fatalerror )
\r
508 interface.eventwrite = nil
\r
513 local usingssl, receive = interface._usingssl, interface.receive;
\r
514 interface.readcallback = function( event ) -- called on read events
\r
515 --vdebug( "new client read event, id/ip/port:", interface, ip, port )
\r
516 if interface.noreading or interface.fatalerror then -- leave this event
\r
517 --vdebug( "leaving this event because:", interface.noreading or interface.fatalerror )
\r
518 interface.eventread = nil
\r
521 if EV_TIMEOUT == event then -- took too long to get some data from client -> disconnect
\r
522 interface.fatalerror = "timeout during receiving"
\r
523 debug( "connection failed:", interface.fatalerror )
\r
525 interface.eventread = nil
\r
528 if usingssl then -- handle luasec
\r
529 if interface.eventwritetimeout then -- ok, in the past writecallback was regged
\r
530 local ret = interface.writecallback( ) -- call it
\r
531 --vdebug( "tried to write in readcallback, result:", ret )
\r
533 if interface.eventreadtimeout then
\r
534 interface.eventreadtimeout:close( )
\r
535 interface.eventreadtimeout = nil
\r
538 local buffer, err, part = receive( client, pattern ) -- receive buffer with "pattern"
\r
539 --vdebug( "read data:", buffer, "error:", err, "part:", part )
\r
540 buffer = buffer or part or ""
\r
541 local len = string_len( buffer )
\r
542 if len > cfg.MAX_READ_LENGTH then -- check buffer length
\r
543 interface.fatalerror = "receive buffer exceeded"
\r
544 debug( "fatal error:", interface.fatalerror )
\r
546 interface.eventread = nil
\r
549 if err and ( "timeout" ~= err ) then
\r
550 if "wantwrite" == err then -- need to read on write event
\r
551 if not interface.eventwrite then -- register new write event if needed
\r
552 interface.eventwrite = addevent( base, interface.conn, EV_WRITE, interface.writecallback, cfg.WRITE_TIMEOUT )
\r
554 interface.eventreadtimeout = addevent( base, nil, EV_TIMEOUT,
\r
557 end, cfg.READ_TIMEOUT
\r
559 debug( "wantwrite during read attemp, reg it in writecallback but dont know what really happens next..." )
\r
560 -- to be honest i dont know what happens next, if it is allowed to first read, the write etc...
\r
561 else -- connection was closed or fatal error
\r
562 interface.fatalerror = err
\r
563 debug( "connection failed in read event:", interface.fatalerror )
\r
565 interface.eventread = nil
\r
569 interface.onincoming( interface, buffer, err ) -- send new data to listener
\r
570 return EV_READ, cfg.READ_TIMEOUT
\r
574 client:settimeout( 0 ) -- set non blocking
\r
575 setmetatable(interface, interface_mt)
\r
576 interfacelist( "add", interface ) -- add to interfacelist
\r
583 function handleserver( server, addr, port, pattern, listener, sslctx, startssl ) -- creates an server interface
\r
584 debug "creating server interface..."
\r
585 local interface = {
\r
589 onconnect = listener.onconnect; -- will be called when new client connected
\r
590 eventread = false; -- read event handler
\r
591 eventclose = false; -- close event handler
\r
592 readcallback = false; -- read event callback
\r
593 fatalerror = false; -- error message
\r
594 nointerface = true; -- lock/unlock parameter
\r
596 interface.id = tostring(interface):match("%x+$");
\r
597 interface.readcallback = function( event ) -- server handler, called on incoming connections
\r
598 --vdebug( "server can accept, id/addr/port:", interface, addr, port )
\r
599 if interface.fatalerror then
\r
600 --vdebug( "leaving this event because:", self.fatalerror )
\r
601 interface.eventread = nil
\r
604 local delay = cfg.ACCEPT_DELAY
\r
605 if EV_TIMEOUT == event then
\r
606 if interface._connections >= cfg.MAX_CONNECTIONS then -- check connection count
\r
607 debug( "to many connections, seconds to wait for next accept:", delay )
\r
608 return EV_TIMEOUT, delay -- timeout...
\r
610 return EV_READ -- accept again
\r
613 --vdebug("max connection check ok, accepting...")
\r
614 local client, err = server:accept() -- try to accept; TODO: check err
\r
616 if interface._connections >= cfg.MAX_CONNECTIONS then
\r
617 client:close( ) -- refuse connection
\r
618 debug( "maximal connections reached, refuse client connection; accept delay:", delay )
\r
619 return EV_TIMEOUT, delay -- delay for next accept attemp
\r
621 local ip, port = client:getpeername( )
\r
622 interface._connections = interface._connections + 1 -- increase connection count
\r
623 local clientinterface = handleclient( client, ip, port, interface, pattern, listener, nil, sslctx )
\r
624 --vdebug( "client id:", clientinterface, "startssl:", startssl )
\r
626 clientinterface:_start_ssl( clientinterface.onconnect )
\r
628 clientinterface:_start_session( clientinterface.onconnect )
\r
630 debug( "accepted incoming client connection from:", ip, port )
\r
631 client, err = server:accept() -- try to accept again
\r
636 server:settimeout( 0 )
\r
637 setmetatable(interface, interface_mt)
\r
638 interfacelist( "add", interface )
\r
639 interface:_start_session()
\r
644 local addserver = ( function( )
\r
645 return function( addr, port, listener, pattern, sslcfg, startssl ) -- TODO: check arguments
\r
646 --vdebug( "creating new tcp server with following parameters:", addr or "nil", port or "nil", sslcfg or "nil", startssl or "nil")
\r
647 local server, err = socket.bind( addr, port, cfg.ACCEPT_QUEUE ) -- create server socket
\r
649 debug( "creating server socket failed because:", err )
\r
655 debug "fatal error: luasec not found"
\r
656 return nil, "luasec not found"
\r
658 sslctx, err = ssl.newcontext( sslcfg )
\r
660 debug( "error while creating new ssl context for server socket:", err )
\r
664 local interface = handleserver( server, addr, port, pattern, listener, sslctx, startssl ) -- new server handler
\r
665 debug( "new server created with id:", tostring(interface))
\r
670 local wrapclient = ( function( )
\r
671 return function( client, addr, serverport, listener, pattern, localaddr, localport, sslcfg, startssl )
\r
672 debug( "try to connect to:", addr, serverport, "with parameters:", pattern, localaddr, localport, sslcfg, startssl )
\r
674 if sslcfg then -- handle ssl/new context
\r
676 debug "need luasec, but not available"
\r
677 return nil, "luasec not found"
\r
679 sslctx, err = ssl.newcontext( sslcfg )
\r
681 debug( "cannot create new ssl context:", err )
\r
688 local addclient = ( function( )
\r
689 return function( addr, serverport, listener, pattern, localaddr, localport, sslcfg, startssl )
\r
690 local client, err = socket.tcp() -- creating new socket
\r
692 debug( "cannot create socket:", err )
\r
695 client:settimeout( 0 ) -- set nonblocking
\r
697 local res, err = client:bind( localaddr, localport, -1 )
\r
699 debug( "cannot bind client:", err )
\r
703 local res, err = client:connect( addr, serverport ) -- connect
\r
704 if res or ( err == "timeout" ) then
\r
705 local ip, port = client:getsockname( )
\r
706 local server = function( )
\r
707 return nil, "this is a dummy server interface"
\r
709 local interface = handleclient( client, ip, port, server, pattern, listener, sslctx )
\r
710 interface:_start_connection( startssl )
\r
711 debug( "new connection id:", interface )
\r
712 return interface, err
\r
714 debug( "new connection failed:", err )
\r
717 return wrapclient( client, addr, serverport, listener, pattern, localaddr, localport, sslcfg, startssl )
\r
721 local loop = function( ) -- starts the event loop
\r
722 return base:loop( )
\r
725 local newevent = ( function( )
\r
726 local add = base.addevent
\r
727 return function( ... )
\r
728 return add( base, ... )
\r
732 local closeallservers = function( arg )
\r
733 for _, item in ipairs( interfacelist( ) ) do
\r
734 if item "type" == "server" then
\r
735 item( "close", arg )
\r
747 addevent = newevent,
\r
748 addserver = addserver,
\r
749 addclient = addclient,
\r
750 wrapclient = wrapclient,
\r
751 closeallservers = closeallservers,
\r
753 __NAME = SCRIPT_NAME,
\r
754 __DATE = LAST_MODIFIED,
\r
755 __AUTHOR = SCRIPT_AUTHOR,
\r
756 __VERSION = SCRIPT_VERSION,
\r