4 server.lua based on lua/libevent by blastbeat
7 -- when using luaevent, never register 2 or more EV_READ at one socket, same for EV_WRITE
8 -- you cant even register a new EV_READ/EV_WRITE callback inside another one
9 -- to do some of the above, use timeout events or something what will called from outside
10 -- dont let garbagecollect eventcallbacks, as long they are running
11 -- when using luasec, there are 4 cases of timeout errors: wantread or wantwrite during reading or writing
14 -- luacheck: ignore 212/self 431/err 211/ret
16 local SCRIPT_NAME = "server_event.lua"
17 local SCRIPT_VERSION = "0.05"
18 local SCRIPT_AUTHOR = "blastbeat"
19 local LAST_MODIFIED = "2009/11/20"
22 MAX_CONNECTIONS = 100000, -- max per server connections (use "ulimit -n" on *nix)
23 MAX_HANDSHAKE_ATTEMPTS= 1000, -- attempts to finish ssl handshake
24 HANDSHAKE_TIMEOUT = 60, -- timeout in seconds per handshake attempt
25 MAX_READ_LENGTH = 1024 * 1024 * 1024 * 1024, -- max bytes allowed to read from sockets
26 MAX_SEND_LENGTH = 1024 * 1024 * 1024 * 1024, -- max bytes size of write buffer (for writing on sockets)
27 ACCEPT_QUEUE = 128, -- might influence the length of the pending sockets queue
28 ACCEPT_DELAY = 10, -- seconds to wait until the next attempt of a full server to accept
29 READ_TIMEOUT = 60 * 60 * 6, -- timeout in seconds for read data from socket
30 WRITE_TIMEOUT = 180, -- timeout in seconds for write data on socket
31 CONNECT_TIMEOUT = 20, -- timeout in seconds for connection attempts
32 CLEAR_DELAY = 5, -- seconds to wait for clearing interface list (and calling ondisconnect listeners)
33 DEBUG = true, -- show debug messages
38 local require = require
39 local tostring = tostring
40 local setmetatable = setmetatable
42 local t_insert = table.insert
43 local t_concat = table.concat
44 local s_sub = string.sub
46 local coroutine_wrap = coroutine.wrap
47 local coroutine_yield = coroutine.yield
49 local has_luasec, ssl = pcall ( require , "ssl" )
50 local socket = require "socket"
51 local levent = require "luaevent.core"
53 local socket_gettime = socket.gettime
54 local getaddrinfo = socket.dns.getaddrinfo
56 local log = require ("util.logger").init("socket")
58 local function debug(...)
59 return log("debug", ("%s "):rep(select('#', ...)), ...)
61 -- local vdebug = debug;
63 local bitor = ( function( ) -- thx Rici Lake
64 local hasbit = function( x, p )
65 return x % ( p + p ) >= p
67 return function( x, y )
70 local limit = x > y and x or y
72 if hasbit( x, p ) or hasbit( y, p ) then
81 local base = levent.new( )
82 local addevent = base.addevent
83 local EV_READ = levent.EV_READ
84 local EV_WRITE = levent.EV_WRITE
85 local EV_TIMEOUT = levent.EV_TIMEOUT
86 local EV_SIGNAL = levent.EV_SIGNAL
88 local EV_READWRITE = bitor( EV_READ, EV_WRITE )
90 local interfacelist = { }
92 -- Client interface methods
93 local interface_mt = {}; interface_mt.__index = interface_mt;
96 function interface_mt:_close()
97 return self:_destroy();
100 function interface_mt:_start_connection(plainssl) -- called from wrapclient
101 local callback = function( event )
102 if EV_TIMEOUT == event then -- timeout during connection
103 self.fatalerror = "connection timeout"
104 self:ontimeout() -- call timeout listener
106 debug( "new connection failed. id:", self.id, "error:", self.fatalerror )
108 if plainssl and has_luasec then -- start ssl session
109 self:starttls(self._sslctx, true)
110 else -- normal connection
111 self:_start_session(true)
113 debug( "new connection established. id:", self.id )
115 self.eventconnect = nil
118 self.eventconnect = addevent( base, self.conn, EV_WRITE, callback, cfg.CONNECT_TIMEOUT )
121 function interface_mt:_start_session(call_onconnect) -- new session, for example after startssl
122 if self.type == "client" then
123 local callback = function( )
124 self:_lock( false, false, false )
125 --vdebug( "start listening on client socket with id:", self.id )
126 self.eventread = addevent( base, self.conn, EV_READ, self.readcallback, cfg.READ_TIMEOUT ); -- register callback
127 if call_onconnect then
130 self.eventsession = nil
133 self.eventsession = addevent( base, nil, EV_TIMEOUT, callback, 0 )
136 --vdebug( "start listening on server socket with id:", self.id )
137 self.eventread = addevent( base, self.conn, EV_READ, self.readcallback ) -- register callback
141 function interface_mt:_start_ssl(call_onconnect) -- old socket will be destroyed, therefore we have to close read/write events first
142 --vdebug( "starting ssl session with client id:", self.id )
144 _ = self.eventread and self.eventread:close( ) -- close events; this must be called outside of the event callbacks!
145 _ = self.eventwrite and self.eventwrite:close( )
146 self.eventread, self.eventwrite = nil, nil
148 self.conn, err = ssl.wrap( self.conn, self._sslctx )
150 self.fatalerror = err
151 self.conn = nil -- cannot be used anymore
152 if call_onconnect then
153 self.ondisconnect = nil -- dont call this when client isnt really connected
156 debug( "fatal error while ssl wrapping:", err )
159 self.conn:settimeout( 0 ) -- set non blocking
160 local handshakecallback = coroutine_wrap(function( event )
163 local maxattempt = cfg.MAX_HANDSHAKE_ATTEMPTS
164 while attempt < maxattempt do -- no endless loop
165 attempt = attempt + 1
166 debug( "ssl handshake of client with id:"..tostring(self)..", attempt:"..attempt )
167 if attempt > maxattempt then
168 self.fatalerror = "max handshake attempts exceeded"
169 elseif EV_TIMEOUT == event then
170 self.fatalerror = "timeout during handshake"
172 _, err = self.conn:dohandshake( )
174 self:_lock( false, false, false ) -- unlock the interface; sending, closing etc allowed
175 self.send = self.conn.send -- caching table lookups with new client object
176 self.receive = self.conn.receive
177 if not call_onconnect then -- trigger listener
178 self:onstatus("ssl-handshake-complete");
180 self:_start_session( call_onconnect )
181 debug( "ssl handshake done" )
182 self.eventhandshake = nil
185 if err == "wantwrite" then
187 elseif err == "wantread" then
190 debug( "ssl handshake error:", err )
191 self.fatalerror = err
194 if self.fatalerror then
195 if call_onconnect then
196 self.ondisconnect = nil -- dont call this when client isnt really connected
199 debug( "handshake failed because:", self.fatalerror )
200 self.eventhandshake = nil
203 event = coroutine_yield( event, cfg.HANDSHAKE_TIMEOUT ) -- yield this monster...
207 debug "starting handshake..."
208 self:_lock( false, true, true ) -- unlock read/write events, but keep interface locked
209 self.eventhandshake = addevent( base, self.conn, EV_READWRITE, handshakecallback, cfg.HANDSHAKE_TIMEOUT )
212 function interface_mt:_destroy() -- close this interface + events and call last listener
213 debug( "closing client with id:", self.id, self.fatalerror )
214 self:_lock( true, true, true ) -- first of all, lock the interface to avoid further actions
216 _ = self.eventread and self.eventread:close( )
217 if self.type == "client" then
218 _ = self.eventwrite and self.eventwrite:close( )
219 _ = self.eventhandshake and self.eventhandshake:close( )
220 _ = self.eventstarthandshake and self.eventstarthandshake:close( )
221 _ = self.eventconnect and self.eventconnect:close( )
222 _ = self.eventsession and self.eventsession:close( )
223 _ = self.eventwritetimeout and self.eventwritetimeout:close( )
224 _ = self.eventreadtimeout and self.eventreadtimeout:close( )
225 _ = self.ondisconnect and self:ondisconnect( self.fatalerror ~= "client to close" and self.fatalerror) -- call ondisconnect listener (wont be the case if handshake failed on connect)
226 _ = self.conn and self.conn:close( ) -- close connection
227 _ = self._server and self._server:counter(-1);
228 self.eventread, self.eventwrite = nil, nil
229 self.eventstarthandshake, self.eventhandshake, self.eventclose = nil, nil, nil
230 self.readcallback, self.writecallback = nil, nil
233 self.eventread, self.eventclose = nil, nil
234 self.interface, self.readcallback = nil, nil
236 interfacelist[ self ] = nil
240 function interface_mt:_lock(nointerface, noreading, nowriting) -- lock or unlock this interface or events
241 self.nointerface, self.noreading, self.nowriting = nointerface, noreading, nowriting
242 return nointerface, noreading, nowriting
246 function interface_mt:lock_read(switch)
250 return self:resume();
254 function interface_mt:pause()
255 return self:_lock(self.nointerface, true, self.nowriting);
258 function interface_mt:resume()
259 self:_lock(self.nointerface, false, self.nowriting);
260 if self.readcallback and not self.eventread then
261 self.eventread = addevent( base, self.conn, EV_READ, self.readcallback, cfg.READ_TIMEOUT ); -- register callback
266 function interface_mt:counter(c)
268 self._connections = self._connections + c
270 return self._connections
274 function interface_mt:write(data)
275 if self.nowriting then return nil, "locked" end
276 --vdebug( "try to send data to client, id/data:", self.id, data )
277 data = tostring( data )
279 local total = len + self.writebufferlen
280 if total > cfg.MAX_SEND_LENGTH then -- check buffer length
281 local err = "send buffer exceeded"
282 debug( "error:", err ) -- to much, check your app
285 t_insert(self.writebuffer, data) -- new buffer
286 self.writebufferlen = total
287 if not self.eventwrite then -- register new write event
288 --vdebug( "register new write event" )
289 self.eventwrite = addevent( base, self.conn, EV_WRITE, self.writecallback, cfg.WRITE_TIMEOUT )
293 function interface_mt:close()
294 if self.nointerface then return nil, "locked"; end
295 debug( "try to close client connection with id:", self.id )
296 if self.type == "client" then
297 self.fatalerror = "client to close"
298 if self.eventwrite then -- wait for incomplete write request
299 self:_lock( true, true, false )
300 debug "closing delayed until writebuffer is empty"
301 return nil, "writebuffer not empty, waiting"
303 self:_lock( true, true, true )
308 debug( "try to close server with id:", tostring(self.id))
309 self.fatalerror = "server to close"
316 function interface_mt:socket()
320 function interface_mt:server()
321 return self._server or self;
324 function interface_mt:port()
328 function interface_mt:serverport()
329 return self._serverport
332 function interface_mt:ip()
336 function interface_mt:ssl()
337 return self._usingssl
339 interface_mt.clientport = interface_mt.port -- COMPAT server_select
341 function interface_mt:type()
342 return self._type or "client"
345 function interface_mt:connections()
346 return self._connections
349 function interface_mt:address()
353 function interface_mt:set_sslctx(sslctx)
354 self._sslctx = sslctx;
356 self.starttls = nil; -- use starttls() of interface_mt
358 self.starttls = false; -- prevent starttls()
362 function interface_mt:set_mode(pattern)
364 self._pattern = pattern;
366 return self._pattern;
369 function interface_mt:set_send(new_send) -- luacheck: ignore 212
370 -- No-op, we always use the underlying connection's send
373 function interface_mt:starttls(sslctx, call_onconnect)
374 debug( "try to start ssl at client id:", self.id )
376 self._sslctx = sslctx;
377 if self._usingssl then -- startssl was already called
378 err = "ssl already active"
381 debug( "error:", err )
384 self._usingssl = true
385 self.startsslcallback = function( ) -- we have to start the handshake outside of a read/write event
386 self.startsslcallback = nil
387 self:_start_ssl(call_onconnect);
388 self.eventstarthandshake = nil
391 if not self.eventwrite then
392 self:_lock( true, true, true ) -- lock the interface, to not disturb the handshake
393 self.eventstarthandshake = addevent( base, nil, EV_TIMEOUT, self.startsslcallback, 0 ) -- add event to start handshake
395 -- wait until writebuffer is empty
396 self:_lock( true, true, false )
397 debug "ssl session delayed until writebuffer is empty..."
399 self.starttls = false;
403 function interface_mt:setoption(option, value)
404 if self.conn.setoption then
405 return self.conn:setoption(option, value);
407 return false, "setoption not implemented";
410 function interface_mt:setlistener(listener)
411 self:ondetach(); -- Notify listener that it is no longer responsible for this connection
412 self.onconnect = listener.onconnect;
413 self.ondisconnect = listener.ondisconnect;
414 self.onincoming = listener.onincoming;
415 self.ontimeout = listener.ontimeout;
416 self.onreadtimeout = listener.onreadtimeout;
417 self.onstatus = listener.onstatus;
418 self.ondetach = listener.ondetach;
422 function interface_mt:onconnect()
424 function interface_mt:onincoming()
426 function interface_mt:ondisconnect()
428 function interface_mt:ontimeout()
430 function interface_mt:onreadtimeout()
431 self.fatalerror = "timeout during receiving"
432 debug( "connection failed:", self.fatalerror )
436 function interface_mt:ondrain()
438 function interface_mt:ondetach()
440 function interface_mt:onstatus()
443 -- End of client interface methods
445 local function handleclient( client, ip, port, server, pattern, listener, sslctx ) -- creates an client interface
446 --vdebug("creating client interfacce...")
450 currenttime = socket_gettime( ); -- safe the origin
451 writebuffer = {}; -- writebuffer
452 writebufferlen = 0; -- length of writebuffer
453 send = client.send; -- caching table lookups
454 receive = client.receive;
455 onconnect = listener.onconnect; -- will be called when client disconnects
456 ondisconnect = listener.ondisconnect; -- will be called when client disconnects
457 onincoming = listener.onincoming; -- will be called when client sends data
458 ontimeout = listener.ontimeout; -- called when fatal socket timeout occurs
459 onreadtimeout = listener.onreadtimeout; -- called when socket inactivity timeout occurs
460 ondrain = listener.ondrain; -- called when writebuffer is empty
461 ondetach = listener.ondetach; -- called when disassociating this listener from this connection
462 onstatus = listener.onstatus; -- called for status changes (e.g. of SSL/TLS)
463 eventread = false, eventwrite = false, eventclose = false,
464 eventhandshake = false, eventstarthandshake = false; -- event handler
465 eventconnect = false, eventsession = false; -- more event handler...
466 eventwritetimeout = false; -- even more event handler...
467 eventreadtimeout = false;
468 fatalerror = false; -- error message
469 writecallback = false; -- will be called on write events
470 readcallback = false; -- will be called on read events
471 nointerface = true; -- lock/unlock parameter of this interface
472 noreading = false, nowriting = false; -- locks of the read/writecallback
473 startsslcallback = false; -- starting handshake callback
474 position = false; -- position of client in interfacelist
477 _ip = ip, _port = port, _server = server, _pattern = pattern,
478 _serverport = (server and server:port() or nil),
479 _sslctx = sslctx; -- parameters
480 _usingssl = false; -- client is using ssl;
482 if not has_luasec then interface.starttls = false; end
483 interface.id = tostring(interface):match("%x+$");
484 interface.writecallback = function( event ) -- called on write events
485 --vdebug( "new client write event, id/ip/port:", interface, ip, port )
486 if interface.nowriting or ( interface.fatalerror and ( "client to close" ~= interface.fatalerror ) ) then -- leave this event
487 --vdebug( "leaving this event because:", interface.nowriting or interface.fatalerror )
488 interface.eventwrite = false
491 if EV_TIMEOUT == event then -- took too long to write some data to socket -> disconnect
492 interface.fatalerror = "timeout during writing"
493 debug( "writing failed:", interface.fatalerror )
495 interface.eventwrite = false
498 if interface._usingssl then -- handle luasec
499 if interface.eventreadtimeout then -- we have to read first
500 local ret = interface.readcallback( ) -- call readcallback
501 --vdebug( "tried to read in writecallback, result:", ret )
503 if interface.eventwritetimeout then -- luasec only
504 interface.eventwritetimeout:close( ) -- first we have to close timeout event which where regged after a wantread error
505 interface.eventwritetimeout = false
508 interface.writebuffer = { t_concat(interface.writebuffer) }
509 local succ, err, byte = interface.conn:send( interface.writebuffer[1], 1, interface.writebufferlen )
510 --vdebug( "write data:", interface.writebuffer, "error:", err, "part:", byte )
511 if succ then -- writing succesful
512 interface.writebuffer[1] = nil
513 interface.writebufferlen = 0
515 if interface.fatalerror then
516 debug "closing client after writing"
517 interface:_close() -- close interface if needed
518 elseif interface.startsslcallback then -- start ssl connection if needed
519 debug "starting ssl handshake after writing"
520 interface.eventstarthandshake = addevent( base, nil, EV_TIMEOUT, interface.startsslcallback, 0 )
521 elseif interface.writebufferlen ~= 0 then
522 -- data possibly written from ondrain
523 return EV_WRITE, cfg.WRITE_TIMEOUT
524 elseif interface.eventreadtimeout then
525 return EV_WRITE, cfg.WRITE_TIMEOUT
527 interface.eventwrite = nil
529 elseif byte and (err == "timeout" or err == "wantwrite") then -- want write again
530 --vdebug( "writebuffer is not empty:", err )
531 interface.writebuffer[1] = s_sub( interface.writebuffer[1], byte + 1, interface.writebufferlen ) -- new buffer
532 interface.writebufferlen = interface.writebufferlen - byte
533 if "wantread" == err then -- happens only with luasec
534 local callback = function( )
536 interface.eventwritetimeout = nil
539 interface.eventwritetimeout = addevent( base, nil, EV_TIMEOUT, callback, cfg.WRITE_TIMEOUT ) -- reg a new timeout event
540 debug( "wantread during write attempt, reg it in readcallback but dont know what really happens next..." )
541 -- hopefully this works with luasec; its simply not possible to use 2 different write events on a socket in luaevent
544 return EV_WRITE, cfg.WRITE_TIMEOUT
545 else -- connection was closed during writing or fatal error
546 interface.fatalerror = err or "fatal error"
547 debug( "connection failed in write event:", interface.fatalerror )
549 interface.eventwrite = nil
555 interface.readcallback = function( event ) -- called on read events
556 --vdebug( "new client read event, id/ip/port:", tostring(interface.id), tostring(ip), tostring(port) )
557 if interface.noreading or interface.fatalerror then -- leave this event
558 --vdebug( "leaving this event because:", tostring(interface.noreading or interface.fatalerror) )
559 interface.eventread = nil
562 if EV_TIMEOUT == event and interface:onreadtimeout() ~= true then
563 return -1 -- took too long to get some data from client -> disconnect
565 if interface._usingssl then -- handle luasec
566 if interface.eventwritetimeout then -- ok, in the past writecallback was regged
567 local ret = interface.writecallback( ) -- call it
568 --vdebug( "tried to write in readcallback, result:", tostring(ret) )
570 if interface.eventreadtimeout then
571 interface.eventreadtimeout:close( )
572 interface.eventreadtimeout = nil
575 local buffer, err, part = interface.conn:receive( interface._pattern ) -- receive buffer with "pattern"
576 --vdebug( "read data:", tostring(buffer), "error:", tostring(err), "part:", tostring(part) )
577 buffer = buffer or part
578 if buffer and #buffer > cfg.MAX_READ_LENGTH then -- check buffer length
579 interface.fatalerror = "receive buffer exceeded"
580 debug( "fatal error:", interface.fatalerror )
582 interface.eventread = nil
585 if err and ( err ~= "timeout" and err ~= "wantread" ) then
586 if "wantwrite" == err then -- need to read on write event
587 if not interface.eventwrite then -- register new write event if needed
588 interface.eventwrite = addevent( base, interface.conn, EV_WRITE, interface.writecallback, cfg.WRITE_TIMEOUT )
590 interface.eventreadtimeout = addevent( base, nil, EV_TIMEOUT,
591 function( ) interface:_close() end, cfg.READ_TIMEOUT)
592 debug( "wantwrite during read attempt, reg it in writecallback but dont know what really happens next..." )
593 -- to be honest i dont know what happens next, if it is allowed to first read, the write etc...
594 else -- connection was closed or fatal error
595 interface.fatalerror = err
596 debug( "connection failed in read event:", interface.fatalerror )
598 interface.eventread = nil
602 interface.onincoming( interface, buffer, err ) -- send new data to listener
604 if interface.noreading then
605 interface.eventread = nil;
608 return EV_READ, cfg.READ_TIMEOUT
611 client:settimeout( 0 ) -- set non blocking
612 setmetatable(interface, interface_mt)
613 interfacelist[ interface ] = true -- add to interfacelist
617 local function handleserver( server, addr, port, pattern, listener, sslctx ) -- creates an server interface
618 debug "creating server interface..."
624 onconnect = listener.onconnect; -- will be called when new client connected
625 eventread = false; -- read event handler
626 eventclose = false; -- close event handler
627 readcallback = false; -- read event callback
628 fatalerror = false; -- error message
629 nointerface = true; -- lock/unlock parameter
631 _ip = addr, _port = port, _pattern = pattern,
634 interface.id = tostring(interface):match("%x+$");
635 interface.readcallback = function( event ) -- server handler, called on incoming connections
636 --vdebug( "server can accept, id/addr/port:", interface, addr, port )
637 if interface.fatalerror then
638 --vdebug( "leaving this event because:", self.fatalerror )
639 interface.eventread = nil
642 local delay = cfg.ACCEPT_DELAY
643 if EV_TIMEOUT == event then
644 if interface._connections >= cfg.MAX_CONNECTIONS then -- check connection count
645 debug( "to many connections, seconds to wait for next accept:", delay )
646 return EV_TIMEOUT, delay -- timeout...
648 return EV_READ -- accept again
651 --vdebug("max connection check ok, accepting...")
652 local client, err = server:accept() -- try to accept; TODO: check err
654 if interface._connections >= cfg.MAX_CONNECTIONS then
655 client:close( ) -- refuse connection
656 debug( "maximal connections reached, refuse client connection; accept delay:", delay )
657 return EV_TIMEOUT, delay -- delay for next accept attempt
659 local client_ip, client_port = client:getpeername( )
660 interface._connections = interface._connections + 1 -- increase connection count
661 local clientinterface = handleclient( client, client_ip, client_port, interface, pattern, listener, sslctx )
662 --vdebug( "client id:", clientinterface, "startssl:", startssl )
663 if has_luasec and sslctx then
664 clientinterface:starttls(sslctx, true)
666 clientinterface:_start_session( true )
668 debug( "accepted incoming client connection from:", client_ip or "<unknown IP>", client_port or "<unknown port>", "to", port or "<unknown port>");
670 client, err = server:accept() -- try to accept again
675 server:settimeout( 0 )
676 setmetatable(interface, interface_mt)
677 interfacelist[ interface ] = true
678 interface:_start_session()
682 local function addserver( addr, port, listener, pattern, sslctx, startssl ) -- TODO: check arguments
683 --vdebug( "creating new tcp server with following parameters:", addr or "nil", port or "nil", sslctx or "nil", startssl or "nil")
684 if sslctx and not has_luasec then
685 debug "fatal error: luasec not found"
686 return nil, "luasec not found"
688 local server, err = socket.bind( addr, port, cfg.ACCEPT_QUEUE ) -- create server socket
690 debug( "creating server socket on "..addr.." port "..port.." failed:", err )
693 local interface = handleserver( server, addr, port, pattern, listener, sslctx, startssl ) -- new server handler
694 debug( "new server created with id:", tostring(interface))
698 local function wrapclient( client, ip, port, listeners, pattern, sslctx )
699 local interface = handleclient( client, ip, port, nil, pattern, listeners, sslctx )
700 interface:_start_connection(sslctx)
701 return interface, client
702 --function handleclient( client, ip, port, server, pattern, listener, _, sslctx ) -- creates an client interface
705 local function addclient( addr, serverport, listener, pattern, sslctx, typ )
706 if sslctx and not has_luasec then
707 debug "need luasec, but not available"
708 return nil, "luasec not found"
711 local addrinfo, err = getaddrinfo(addr)
712 if not addrinfo then return nil, err end
713 if addrinfo[1] and addrinfo[1].family == "inet6" then
719 local create = socket[typ]
720 if type( create ) ~= "function" then
721 return nil, "invalid socket type"
723 local client, err = create() -- creating new socket
725 debug( "cannot create socket:", err )
728 client:settimeout( 0 ) -- set nonblocking
729 local res, err = client:connect( addr, serverport ) -- connect
730 if res or ( err == "timeout" ) then
731 local ip, port = client:getsockname( )
732 local interface = wrapclient( client, ip, serverport, listener, pattern, sslctx )
733 debug( "new connection id:", interface.id )
734 return interface, err
736 debug( "new connection failed:", err )
741 local function loop( ) -- starts the event loop
746 local function newevent( ... )
747 return addevent( base, ... )
750 local function closeallservers ( arg )
751 for item in pairs( interfacelist ) do
752 if item.type == "server" then
758 local function setquitting(yes)
766 local function get_backend()
767 return base:method();
770 -- We need to hold onto the events to stop them
771 -- being garbage-collected
772 local signal_events = {}; -- [signal_num] -> event object
773 local function hook_signal(signal_num, handler)
774 local function _handler()
775 local ret = handler();
776 if ret ~= false then -- Continue handling this signal?
777 return EV_SIGNAL; -- Yes
779 return -1; -- Close this event
781 signal_events[signal_num] = base:addevent(signal_num, EV_SIGNAL, _handler);
782 return signal_events[signal_num];
785 local function link(sender, receiver, buffersize)
788 function receiver:ondrain()
789 if sender_locked then
795 function sender:onincoming(data)
796 receiver:write(data);
797 if receiver.writebufferlen >= buffersize then
798 sender_locked = true;
802 sender:set_mode("*a");
813 addserver = addserver,
814 addclient = addclient,
815 wrapclient = wrapclient,
816 setquitting = setquitting,
817 closeall = closeallservers,
818 get_backend = get_backend,
819 hook_signal = hook_signal,
821 __NAME = SCRIPT_NAME,
822 __DATE = LAST_MODIFIED,
823 __AUTHOR = SCRIPT_AUTHOR,
824 __VERSION = SCRIPT_VERSION,