---[[\r
-\r
-\r
- server.lua based on lua/libevent by blastbeat\r
-\r
- notes:\r
- -- when using luaevent, never register 2 or more EV_READ at one socket, same for EV_WRITE\r
- -- you cant even register a new EV_READ/EV_WRITE callback inside another one\r
- -- never call eventcallback:close( ) from inside eventcallback\r
- -- to do some of the above, use timeout events or something what will called from outside\r
- -- dont let garbagecollect eventcallbacks, as long they are running\r
- -- when using luasec, there are 4 cases of timeout errors: wantread or wantwrite during reading or writing\r
-\r
---]]\r
-\r
-\r
-local SCRIPT_NAME = "server_event.lua"\r
-local SCRIPT_VERSION = "0.05"\r
-local SCRIPT_AUTHOR = "blastbeat"\r
-local LAST_MODIFIED = "2009/11/20"\r
-\r
-local cfg = {\r
- MAX_CONNECTIONS = 100000, -- max per server connections (use "ulimit -n" on *nix)\r
- MAX_HANDSHAKE_ATTEMPS = 10, -- attemps to finish ssl handshake\r
- HANDSHAKE_TIMEOUT = 1, -- timout in seconds per handshake attemp\r
- MAX_READ_LENGTH = 1024 * 1024 * 1024 * 1024, -- max bytes allowed to read from sockets\r
- MAX_SEND_LENGTH = 1024 * 1024 * 1024 * 1024, -- max bytes size of write buffer (for writing on sockets)\r
- ACCEPT_DELAY = 10, -- seconds to wait until the next attemp of a full server to accept\r
- READ_TIMEOUT = 60 * 30, -- timeout in seconds for read data from socket\r
- WRITE_TIMEOUT = 30, -- timeout in seconds for write data on socket\r
- CONNECT_TIMEOUT = 10, -- timeout in seconds for connection attemps\r
- CLEAR_DELAY = 5, -- seconds to wait for clearing interface list (and calling ondisconnect listeners) \r
- DEBUG = true, -- show debug messages\r
-}\r
-\r
-local function use(x) return rawget(_G, x); end\r
-local print = use "print"\r
-local pcall = use "pcall"\r
-local ipairs = use "ipairs"\r
-local string = use "string"\r
-local select = use "select"\r
-local require = use "require"\r
-local tostring = use "tostring"\r
-local coroutine = use "coroutine"\r
-local setmetatable = use "setmetatable"\r
-\r
-local ssl = use "ssl"\r
-local socket = use "socket"\r
-\r
-local log = require ("util.logger").init("socket")\r
-\r
-local function debug(...)\r
- return log("debug", ("%s "):rep(select('#', ...)), ...)\r
-end\r
-local vdebug = debug;\r
-\r
-local bitor = ( function( ) -- thx Rici Lake\r
- local hasbit = function( x, p )\r
- return x % ( p + p ) >= p\r
- end\r
- return function( x, y ) \r
- local p = 1\r
- local z = 0\r
- local limit = x > y and x or y\r
- while p <= limit do \r
- if hasbit( x, p ) or hasbit( y, p ) then\r
- z = z + p\r
- end\r
- p = p + p\r
- end\r
- return z\r
- end\r
-end )( )\r
-\r
-local event = require "luaevent.core"\r
-local base = event.new( )\r
-local EV_READ = event.EV_READ\r
-local EV_WRITE = event.EV_WRITE\r
-local EV_TIMEOUT = event.EV_TIMEOUT\r
-\r
-local EV_READWRITE = bitor( EV_READ, EV_WRITE )\r
-\r
-local interfacelist = ( function( ) -- holds the interfaces for sockets\r
- local array = { }\r
- local len = 0\r
- return function( method, arg )\r
- if "add" == method then\r
- len = len + 1\r
- array[ len ] = arg\r
- arg:_position( len )\r
- return len\r
- elseif "delete" == method then\r
- if len <= 0 then\r
- return nil, "array is already empty"\r
- end\r
- local position = arg:_position() -- get position in array\r
- if position ~= len then\r
- local interface = array[ len ] -- get last interface\r
- array[ position ] = interface -- copy it into free position\r
- array[ len ] = nil -- free last position\r
- interface:_position( position ) -- set new position in array\r
- else -- free last position\r
- array[ len ] = nil\r
- end\r
- len = len - 1\r
- return len \r
- else\r
- return array\r
- end\r
- end\r
-end )( )\r
-\r
--- Client interface methods\r
-local interface_mt\r
-do\r
- interface_mt = {}; interface_mt.__index = interface_mt;\r
- \r
- local addevent = base.addevent\r
- local coroutine_wrap, coroutine_yield = coroutine.wrap,coroutine.yield\r
- local string_len = string.len\r
- \r
- -- Private methods\r
- function interface_mt:_position(new_position)\r
- self.position = new_position or self.position\r
- return self.position;\r
- end\r
- function interface_mt:_close() -- regs event to start self:_destroy()\r
- local callback = function( )\r
- self:_destroy();\r
- self.eventclose = nil\r
- return -1\r
- end\r
- self.eventclose = addevent( base, nil, EV_TIMEOUT, callback, 0 )\r
- return true\r
- end\r
- \r
- function interface_mt:_start_connection(plainssl) -- should be called from addclient\r
- local callback = function( event )\r
- if EV_TIMEOUT == event then -- timout during connection\r
- self.fatalerror = "connection timeout"\r
- self.listener.ontimeout( self ) -- call timeout listener\r
- self:_close()\r
- debug( "new connection failed. id:", self, "error:", self.fatalerror )\r
- else\r
- if plainssl then -- start ssl session\r
- self:_start_ssl( self.listener.onconnect )\r
- else -- normal connection\r
- self:_start_session( self.listener.onconnect )\r
- end\r
- debug( "new connection established. id:", self )\r
- end\r
- self.eventconnect = nil\r
- return -1\r
- end\r
- self.eventconnect = addevent( base, self.conn, EV_WRITE, callback, cfg.CONNECT_TIMEOUT )\r
- return true\r
- end\r
- function interface_mt:_start_session(onconnect) -- new session, for example after startssl\r
- if self.type == "client" then\r
- local callback = function( )\r
- self:_lock( false, false, false )\r
- --vdebug( "start listening on client socket with id:", self ) \r
- self.eventread = addevent( base, self.conn, EV_READ, self.readcallback, cfg.READ_TIMEOUT ) -- register callback\r
- onconnect( self )\r
- self.eventsession = nil\r
- return -1\r
- end\r
- self.eventsession = addevent( base, nil, EV_TIMEOUT, callback, 0 )\r
- else\r
- self:_lock( false )\r
- --vdebug( "start listening on server socket with id:", self )\r
- self.eventread = addevent( base, self.conn, EV_READ, self.readcallback ) -- register callback\r
- end\r
- return true\r
- end\r
- function interface_mt:_start_ssl(arg) -- old socket will be destroyed, therefore we have to close read/write events first\r
- --vdebug( "starting ssl session with client id:", self )\r
- local _\r
- _ = self.eventread and self.eventread:close( ) -- close events; this must be called outside of the event callbacks!\r
- _ = self.eventwrite and self.eventwrite:close( )\r
- self.eventread, self.eventwrite = nil, nil\r
- local err\r
- self.conn, err = ssl.wrap( self.conn, self.sslctx )\r
- if err then\r
- self.fatalerror = err\r
- self.conn = nil -- cannot be used anymore\r
- if "onconnect" == arg then\r
- self.ondisconnect = nil -- dont call this when client isnt really connected\r
- end\r
- self:_close()\r
- debug( "fatal error while ssl wrapping:", err )\r
- return false\r
- end\r
- self.conn:settimeout( 0 ) -- set non blocking\r
- local handshakecallback = coroutine_wrap(\r
- function( event )\r
- local _, err\r
- local attempt = 0\r
- local maxattempt = cfg.MAX_HANDSHAKE_ATTEMPS\r
- while attempt < 1000 do -- no endless loop\r
- attempt = attempt + 1\r
- debug( "ssl handshake of client with id:", self, "attemp:", attempt )\r
- if attempt > maxattempt then\r
- self.fatalerror = "max handshake attemps exceeded"\r
- elseif EV_TIMEOUT == event then\r
- self.fatalerror = "timeout during handshake"\r
- else\r
- _, err = self.conn:dohandshake( )\r
- if not err then\r
- self:_lock( false, false, false ) -- unlock the interface; sending, closing etc allowed\r
- self.send = self.conn.send -- caching table lookups with new client object\r
- self.receive = self.conn.receive\r
- local onsomething\r
- if "onconnect" == arg then -- trigger listener\r
- onsomething = self.listener.onconnect\r
- else\r
- onsomething = self.listener.onsslconnection\r
- end\r
- self:_start_session( onsomething )\r
- debug( "ssl handshake done" )\r
- self.eventhandshake = nil\r
- return -1\r
- end\r
- debug( "error during ssl handshake:", err ) \r
- if err == "wantwrite" then\r
- event = EV_WRITE\r
- elseif err == "wantread" then\r
- event = EV_READ\r
- else\r
- self.fatalerror = err\r
- end \r
- end\r
- if self.fatalerror then\r
- if "onconnect" == arg then\r
- self.ondisconnect = nil -- dont call this when client isnt really connected\r
- end\r
- self:_close()\r
- debug( "handshake failed because:", self.fatalerror )\r
- self.eventhandshake = nil\r
- return -1\r
- end\r
- event = coroutine_yield( event, cfg.HANDSHAKE_TIMEOUT ) -- yield this monster...\r
- end\r
- end\r
- )\r
- debug "starting handshake..."\r
- self:_lock( false, true, true ) -- unlock read/write events, but keep interface locked \r
- self.eventhandshake = addevent( base, self.conn, EV_READWRITE, handshakecallback, cfg.HANDSHAKE_TIMEOUT )\r
- return true\r
- end\r
- function interface_mt:_destroy() -- close this interface + events and call last listener\r
- debug( "closing client with id:", self )\r
- self:_lock( true, true, true ) -- first of all, lock the interface to avoid further actions\r
- local _\r
- _ = self.eventread and self.eventread:close( ) -- close events; this must be called outside of the event callbacks!\r
- if self.type == "client" then\r
- _ = self.eventwrite and self.eventwrite:close( )\r
- _ = self.eventhandshake and self.eventhandshake:close( )\r
- _ = self.eventstarthandshake and self.eventstarthandshake:close( )\r
- _ = self.eventconnect and self.eventconnect:close( )\r
- _ = self.eventsession and self.eventsession:close( )\r
- _ = self.eventwritetimeout and self.eventwritetimeout:close( )\r
- _ = self.eventreadtimeout and self.eventreadtimeout:close( )\r
- _ = self.ondisconnect and self:ondisconnect( self.fatalerror ) -- call ondisconnect listener (wont be the case if handshake failed on connect)\r
- _ = self.conn and self.conn:close( ) -- close connection, must also be called outside of any socket registered events!\r
- self._server:counter(-1);\r
- self.eventread, self.eventwrite = nil, nil\r
- self.eventstarthandshake, self.eventhandshake, self.eventclose = nil, nil, nil\r
- self.readcallback, self.writecallback = nil, nil\r
- else\r
- self.conn:close( )\r
- self.eventread, self.eventclose = nil, nil\r
- self.interface, self.readcallback = nil, nil\r
- end\r
- interfacelist( "delete", self )\r
- return true\r
- end\r
- function interface_mt:_lock(nointerface, noreading, nowriting) -- lock or unlock this interface or events\r
- self.nointerface, self.noreading, self.nowriting = nointerface, noreading, nowriting\r
- return nointerface, noreading, nowriting\r
- end\r
-\r
- function interface_mt:counter(c)\r
- if c then\r
- self._connections = self._connections - c\r
- end\r
- return self._connections\r
- end\r
- \r
- -- Public methods\r
- function interface_mt:write(data)\r
- --vdebug( "try to send data to client, id/data:", self, data )\r
- data = tostring( data )\r
- local len = string_len( data )\r
- local total = len + self.writebufferlen\r
- if total > cfg.MAX_SEND_LENGTH then -- check buffer length\r
- local err = "send buffer exceeded"\r
- debug( "error:", err ) -- to much, check your app\r
- return nil, err\r
- end \r
- self.writebuffer = self.writebuffer .. data -- new buffer\r
- self.writebufferlen = total\r
- if not self.eventwrite then -- register new write event\r
- --vdebug( "register new write event" )\r
- self.eventwrite = addevent( base, self.conn, EV_WRITE, self.writecallback, cfg.WRITE_TIMEOUT )\r
- end\r
- return true\r
- end\r
- function interface_mt:close(now)\r
- debug( "try to close client connection with id:", self )\r
- if self.type == "client" then\r
- self.fatalerror = "client to close"\r
- if ( not self.eventwrite ) or now then -- try to close immediately\r
- self:_lock( true, true, true )\r
- self:_close()\r
- return true\r
- else -- wait for incomplete write request\r
- self:_lock( true, true, false )\r
- debug "closing delayed until writebuffer is empty"\r
- return nil, "writebuffer not empty, waiting"\r
- end\r
- else\r
- debug( "try to close server with id:", self, "args:", now )\r
- self.fatalerror = "server to close"\r
- self:_lock( true )\r
- local count = 0\r
- for _, item in ipairs( interfacelist( ) ) do\r
- if ( item.type ~= "server" ) and ( item._server == self ) then -- client/server match\r
- if item:close( now ) then -- writebuffer was empty\r
- count = count + 1\r
- end\r
- end\r
- end\r
- local timeout = 0 -- dont wait for unfinished writebuffers of clients...\r
- if not now then\r
- timeout = cfg.WRITE_TIMEOUT -- ...or wait for it\r
- end\r
- self:_close( timeout ) -- add new event to remove the server interface\r
- debug( "seconds remained until server is closed:", timeout )\r
- return count -- returns finished clients with empty writebuffer\r
- end\r
- end\r
- \r
- function interface_mt:server()\r
- return self._server or self;\r
- end\r
- \r
- function interface_mt:port()\r
- return self._port\r
- end\r
- \r
- function interface_mt:ip()\r
- return self._ip\r
- end\r
- \r
- function interface_mt:ssl()\r
- return self.usingssl\r
- end\r
-\r
- function interface_mt:type()\r
- return self._type or "client"\r
- end\r
- \r
- function interface_mt:connections()\r
- return self._connections\r
- end\r
- \r
- function interface_mt:address()\r
- return self.addr\r
- end\r
- \r
- \r
- \r
- function interface_mt:starttls()\r
- debug( "try to start ssl at client id:", self )\r
- local err\r
- if not self.sslctx then -- no ssl available\r
- err = "no ssl context available"\r
- elseif self.usingssl then -- startssl was already called\r
- err = "ssl already active"\r
- end\r
- if err then\r
- debug( "error:", err )\r
- return nil, err \r
- end\r
- self.usingssl = true\r
- self.startsslcallback = function( ) -- we have to start the handshake outside of a read/write event\r
- self:_start_ssl();\r
- self.eventstarthandshake = nil\r
- return -1\r
- end\r
- if not self.eventwrite then\r
- self:_lock( true, true, true ) -- lock the interface, to not disturb the handshake\r
- self.eventstarthandshake = addevent( base, nil, EV_TIMEOUT, self.startsslcallback, 0 ) -- add event to start handshake\r
- else -- wait until writebuffer is empty\r
- self:_lock( true, true, false )\r
- debug "ssl session delayed until writebuffer is empty..."\r
- end\r
- return true\r
- end\r
- \r
- function interface_mt.onconnect()\r
- end\r
-end \r
-\r
--- End of client interface methods\r
-\r
-local handleclient;\r
-do\r
- local string_sub = string.sub -- caching table lookups\r
- local string_len = string.len\r
- local addevent = base.addevent\r
- local coroutine_wrap = coroutine.wrap\r
- local socket_gettime = socket.gettime\r
- local coroutine_yield = coroutine.yield\r
- function handleclient( client, ip, port, server, pattern, listener, _, sslctx ) -- creates an client interface\r
- --vdebug("creating client interfacce...")\r
- local interface = {\r
- type = "client";\r
- conn = client;\r
- currenttime = socket_gettime( ); -- safe the origin\r
- writebuffer = ""; -- writebuffer\r
- writebufferlen = 0; -- length of writebuffer\r
- send = client.send; -- caching table lookups\r
- receive = client.receive;\r
- onconnect = listener.onconnect; -- will be called when client disconnects\r
- ondisconnect = listener.ondisconnect; -- will be called when client disconnects\r
- onincoming = listener.onincoming; -- will be called when client sends data\r
- eventread = false, eventwrite = false, eventclose = false,\r
- eventhandshake = false, eventstarthandshake = false; -- event handler\r
- eventconnect = false, eventsession = false; -- more event handler...\r
- eventwritetimeout = false; -- even more event handler...\r
- eventreadtimeout = false;\r
- fatalerror = false; -- error message\r
- writecallback = false; -- will be called on write events\r
- readcallback = false; -- will be called on read events\r
- nointerface = true; -- lock/unlock parameter of this interface\r
- noreading = false, nowriting = false; -- locks of the read/writecallback\r
- startsslcallback = false; -- starting handshake callback\r
- position = false; -- position of client in interfacelist\r
- \r
- -- Properties\r
- _ip = ip, _port = port, _server = server, _pattern = pattern,\r
- _sslctx = sslctx; -- parameters\r
- _usingssl = false; -- client is using ssl;\r
- }\r
- interface.writecallback = function( event ) -- called on write events\r
- --vdebug( "new client write event, id/ip/port:", interface, ip, port )\r
- if interface.nowriting or ( interface.fatalerror and ( "client to close" ~= interface.fatalerror ) ) then -- leave this event\r
- --vdebug( "leaving this event because:", interface.nowriting or interface.fatalerror )\r
- interface.eventwrite = false\r
- return -1\r
- end\r
- if EV_TIMEOUT == event then -- took too long to write some data to socket -> disconnect\r
- interface.fatalerror = "timeout during writing"\r
- debug( "writing failed:", interface.fatalerror ) \r
- interface:_close()\r
- interface.eventwrite = false\r
- return -1\r
- else -- can write :)\r
- if interface.usingssl then -- handle luasec\r
- if interface.eventreadtimeout then -- we have to read first\r
- local ret = interface.readcallback( ) -- call readcallback\r
- --vdebug( "tried to read in writecallback, result:", ret )\r
- end\r
- if interface.eventwritetimeout then -- luasec only\r
- interface.eventwritetimeout:close( ) -- first we have to close timeout event which where regged after a wantread error\r
- interface.eventwritetimeout = false\r
- end\r
- end\r
- local succ, err, byte = interface.send( interface.conn, interface.writebuffer, 1, interface.writebufferlen )\r
- --vdebug( "write data:", interface.writebuffer, "error:", err, "part:", byte )\r
- if succ then -- writing succesful\r
- interface.writebuffer = ""\r
- interface.writebufferlen = 0\r
- if interface.fatalerror then\r
- debug "closing client after writing"\r
- interface:_close() -- close interface if needed\r
- elseif interface.startsslcallback then -- start ssl connection if needed\r
- debug "starting ssl handshake after writing"\r
- interface.eventstarthandshake = addevent( base, nil, EV_TIMEOUT, interface.startsslcallback, 0 )\r
- elseif interface.eventreadtimeout then\r
- return EV_WRITE, EV_TIMEOUT\r
- end\r
- interface.eventwrite = nil\r
- return -1\r
- elseif byte then -- want write again\r
- --vdebug( "writebuffer is not empty:", err )\r
- interface.writebuffer = string_sub( interface.writebuffer, byte + 1, interface.writebufferlen ) -- new buffer\r
- interface.writebufferlen = interface.writebufferlen - byte \r
- if "wantread" == err then -- happens only with luasec\r
- local callback = function( )\r
- interface:_close()\r
- interface.eventwritetimeout = nil\r
- return evreturn, evtimeout\r
- end\r
- interface.eventwritetimeout = addevent( base, nil, EV_TIMEOUT, callback, cfg.WRITE_TIMEOUT ) -- reg a new timeout event\r
- debug( "wantread during write attemp, reg it in readcallback but dont know what really happens next..." )\r
- -- hopefully this works with luasec; its simply not possible to use 2 different write events on a socket in luaevent\r
- return -1\r
- end\r
- return EV_WRITE, cfg.WRITE_TIMEOUT \r
- else -- connection was closed during writing or fatal error\r
- interface.fatalerror = err or "fatal error"\r
- debug( "connection failed in write event:", interface.fatalerror ) \r
- interface:_close()\r
- interface.eventwrite = nil\r
- return -1\r
- end\r
- end\r
- end\r
- local usingssl, receive = interface._usingssl, interface.receive;\r
- interface.readcallback = function( event ) -- called on read events\r
- --vdebug( "new client read event, id/ip/port:", interface, ip, port )\r
- if interface.noreading or interface.fatalerror then -- leave this event\r
- --vdebug( "leaving this event because:", interface.noreading or interface.fatalerror )\r
- interface.eventread = nil\r
- return -1\r
- end\r
- if EV_TIMEOUT == event then -- took too long to get some data from client -> disconnect\r
- interface.fatalerror = "timeout during receiving"\r
- debug( "connection failed:", interface.fatalerror ) \r
- interface:_close()\r
- interface.eventread = nil\r
- return -1\r
- else -- can read\r
- if usingssl then -- handle luasec\r
- if interface.eventwritetimeout then -- ok, in the past writecallback was regged\r
- local ret = interface.writecallback( ) -- call it\r
- --vdebug( "tried to write in readcallback, result:", ret )\r
- end\r
- if interface.eventreadtimeout then\r
- interface.eventreadtimeout:close( )\r
- interface.eventreadtimeout = nil\r
- end\r
- end\r
- local buffer, err, part = receive( client, pattern ) -- receive buffer with "pattern"\r
- --vdebug( "read data:", buffer, "error:", err, "part:", part ) \r
- buffer = buffer or part or ""\r
- local len = string_len( buffer )\r
- if len > cfg.MAX_READ_LENGTH then -- check buffer length\r
- interface.fatalerror = "receive buffer exceeded"\r
- debug( "fatal error:", interface.fatalerror )\r
- interface:_close()\r
- interface.eventread = nil\r
- return -1\r
- end\r
- if err and ( "timeout" ~= err ) then\r
- if "wantwrite" == err then -- need to read on write event\r
- if not interface.eventwrite then -- register new write event if needed\r
- interface.eventwrite = addevent( base, interface.conn, EV_WRITE, interface.writecallback, cfg.WRITE_TIMEOUT )\r
- end\r
- interface.eventreadtimeout = addevent( base, nil, EV_TIMEOUT,\r
- function( )\r
- interface:_close()\r
- end, cfg.READ_TIMEOUT\r
- ) \r
- debug( "wantwrite during read attemp, reg it in writecallback but dont know what really happens next..." )\r
- -- to be honest i dont know what happens next, if it is allowed to first read, the write etc...\r
- else -- connection was closed or fatal error \r
- interface.fatalerror = err\r
- debug( "connection failed in read event:", interface.fatalerror ) \r
- interface:_close()\r
- interface.eventread = nil\r
- return -1\r
- end\r
- end\r
- interface.onincoming( interface, buffer, err ) -- send new data to listener\r
- return EV_READ, cfg.READ_TIMEOUT\r
- end\r
- end\r
-\r
- client:settimeout( 0 ) -- set non blocking\r
- setmetatable(interface, interface_mt)\r
- interfacelist( "add", interface ) -- add to interfacelist\r
- return interface\r
- end\r
-end\r
-\r
-local handleserver\r
-do\r
- function handleserver( server, addr, port, pattern, listener, sslctx, startssl ) -- creates an server interface\r
- debug "creating server interface..."\r
- local interface = {\r
- _connections = 0;\r
- \r
- conn = server;\r
- onconnect = listener.onconnect; -- will be called when new client connected\r
- eventread = false; -- read event handler\r
- eventclose = false; -- close event handler\r
- readcallback = false; -- read event callback\r
- fatalerror = false; -- error message\r
- nointerface = true; -- lock/unlock parameter\r
- }\r
- interface.readcallback = function( event ) -- server handler, called on incoming connections\r
- --vdebug( "server can accept, id/addr/port:", interface, addr, port )\r
- if interface.fatalerror then\r
- --vdebug( "leaving this event because:", self.fatalerror )\r
- interface.eventread = nil\r
- return -1\r
- end\r
- local delay = cfg.ACCEPT_DELAY\r
- if EV_TIMEOUT == event then\r
- if interface._connections >= cfg.MAX_CONNECTIONS then -- check connection count\r
- debug( "to many connections, seconds to wait for next accept:", delay )\r
- return EV_TIMEOUT, delay -- timeout...\r
- else\r
- return EV_READ -- accept again\r
- end\r
- end\r
- --vdebug("max connection check ok, accepting...")\r
- local client, err = server:accept() -- try to accept; TODO: check err\r
- while client do\r
- if interface._connections >= cfg.MAX_CONNECTIONS then\r
- client:close( ) -- refuse connection\r
- debug( "maximal connections reached, refuse client connection; accept delay:", delay )\r
- return EV_TIMEOUT, delay -- delay for next accept attemp\r
- end\r
- local ip, port = client:getpeername( )\r
- interface._connections = interface._connections + 1 -- increase connection count\r
- local clientinterface = handleclient( client, ip, port, interface, pattern, listener, nil, sslctx )\r
- --vdebug( "client id:", clientinterface, "startssl:", startssl )\r
- if startssl then\r
- clientinterface:_start_ssl( clientinterface.onconnect )\r
- else\r
- clientinterface:_start_session( clientinterface.onconnect )\r
- end\r
- debug( "accepted incoming client connection from:", ip, port )\r
- client, err = server:accept() -- try to accept again\r
- end\r
- return EV_READ\r
- end\r
- \r
- server:settimeout( 0 )\r
- setmetatable(interface, interface_mt)\r
- interfacelist( "add", interface )\r
- interface:_start_session()\r
- return interface\r
- end\r
-end\r
-\r
-local addserver = ( function( )\r
- return function( addr, port, listener, pattern, sslcfg, startssl ) -- TODO: check arguments\r
- --vdebug( "creating new tcp server with following parameters:", addr or "nil", port or "nil", sslcfg or "nil", startssl or "nil")\r
- local server, err = socket.bind( addr, port, cfg.ACCEPT_QUEUE ) -- create server socket\r
- if not server then\r
- debug( "creating server socket failed because:", err )\r
- return nil, err\r
- end\r
- local sslctx\r
- if sslcfg then\r
- if not ssl then\r
- debug "fatal error: luasec not found"\r
- return nil, "luasec not found"\r
- end\r
- sslctx, err = ssl.newcontext( sslcfg )\r
- if err then\r
- debug( "error while creating new ssl context for server socket:", err )\r
- return nil, err\r
- end\r
- end \r
- local interface = handleserver( server, addr, port, pattern, listener, sslctx, startssl ) -- new server handler\r
- debug( "new server created with id:", tostring(interface))\r
- return interface\r
- end\r
-end )( )\r
-\r
-local wrapclient = ( function( )\r
- return function( client, addr, serverport, listener, pattern, localaddr, localport, sslcfg, startssl )\r
- debug( "try to connect to:", addr, serverport, "with parameters:", pattern, localaddr, localport, sslcfg, startssl )\r
- local sslctx\r
- if sslcfg then -- handle ssl/new context\r
- if not ssl then\r
- debug "need luasec, but not available" \r
- return nil, "luasec not found"\r
- end\r
- sslctx, err = ssl.newcontext( sslcfg )\r
- if err then\r
- debug( "cannot create new ssl context:", err )\r
- return nil, err\r
- end\r
- end\r
- end\r
-end )( )\r
-\r
-local addclient = ( function( )\r
- return function( addr, serverport, listener, pattern, localaddr, localport, sslcfg, startssl )\r
- local client, err = socket.tcp() -- creating new socket\r
- if not client then\r
- debug( "cannot create socket:", err ) \r
- return nil, err\r
- end\r
- client:settimeout( 0 ) -- set nonblocking\r
- if localaddr then\r
- local res, err = client:bind( localaddr, localport, -1 )\r
- if not res then\r
- debug( "cannot bind client:", err )\r
- return nil, err\r
- end\r
- end\r
- local res, err = client:connect( addr, serverport ) -- connect\r
- if res or ( err == "timeout" ) then\r
- local ip, port = client:getsockname( )\r
- local server = function( )\r
- return nil, "this is a dummy server interface"\r
- end\r
- local interface = handleclient( client, ip, port, server, pattern, listener, sslctx )\r
- interface:_start_connection( startssl )\r
- debug( "new connection id:", interface )\r
- return interface, err\r
- else\r
- debug( "new connection failed:", err )\r
- return nil, err\r
- end\r
- return wrapclient( client, addr, serverport, listener, pattern, localaddr, localport, sslcfg, startssl ) \r
- end\r
-end )( )\r
-\r
-local loop = function( ) -- starts the event loop\r
- return base:loop( )\r
-end\r
-\r
-local newevent = ( function( )\r
- local add = base.addevent\r
- return function( ... )\r
- return add( base, ... )\r
- end\r
-end )( )\r
-\r
-local closeallservers = function( arg )\r
- for _, item in ipairs( interfacelist( ) ) do\r
- if item "type" == "server" then\r
- item( "close", arg )\r
- end\r
- end\r
-end\r
-\r
-return {\r
-\r
- cfg = cfg,\r
- base = base,\r
- loop = loop,\r
- event = event,\r
- event_base = base,\r
- addevent = newevent,\r
- addserver = addserver,\r
- addclient = addclient,\r
- wrapclient = wrapclient,\r
- closeallservers = closeallservers,\r
-\r
- __NAME = SCRIPT_NAME,\r
- __DATE = LAST_MODIFIED,\r
- __AUTHOR = SCRIPT_AUTHOR,\r
- __VERSION = SCRIPT_VERSION,\r
-\r
-}\r
+--[[
+
+
+ server.lua based on lua/libevent by blastbeat
+
+ notes:
+ -- when using luaevent, never register 2 or more EV_READ at one socket, same for EV_WRITE
+ -- you cant even register a new EV_READ/EV_WRITE callback inside another one
+ -- never call eventcallback:close( ) from inside eventcallback
+ -- to do some of the above, use timeout events or something what will called from outside
+ -- dont let garbagecollect eventcallbacks, as long they are running
+ -- when using luasec, there are 4 cases of timeout errors: wantread or wantwrite during reading or writing
+
+--]]
+
+local SCRIPT_NAME = "server_event.lua"
+local SCRIPT_VERSION = "0.05"
+local SCRIPT_AUTHOR = "blastbeat"
+local LAST_MODIFIED = "2009/11/20"
+
+local cfg = {
+ MAX_CONNECTIONS = 100000, -- max per server connections (use "ulimit -n" on *nix)
+ MAX_HANDSHAKE_ATTEMPTS= 1000, -- attempts to finish ssl handshake
+ HANDSHAKE_TIMEOUT = 60, -- timeout in seconds per handshake attempt
+ MAX_READ_LENGTH = 1024 * 1024 * 1024 * 1024, -- max bytes allowed to read from sockets
+ MAX_SEND_LENGTH = 1024 * 1024 * 1024 * 1024, -- max bytes size of write buffer (for writing on sockets)
+ ACCEPT_DELAY = 10, -- seconds to wait until the next attempt of a full server to accept
+ READ_TIMEOUT = 60 * 60 * 6, -- timeout in seconds for read data from socket
+ WRITE_TIMEOUT = 180, -- timeout in seconds for write data on socket
+ CONNECT_TIMEOUT = 20, -- timeout in seconds for connection attempts
+ CLEAR_DELAY = 5, -- seconds to wait for clearing interface list (and calling ondisconnect listeners)
+ DEBUG = true, -- show debug messages
+}
+
+local function use(x) return rawget(_G, x); end
+local print = use "print"
+local pcall = use "pcall"
+local ipairs = use "ipairs"
+local string = use "string"
+local select = use "select"
+local require = use "require"
+local tostring = use "tostring"
+local coroutine = use "coroutine"
+local setmetatable = use "setmetatable"
+
+local ssl = use "ssl"
+local socket = use "socket" or require "socket"
+
+local log = require ("util.logger").init("socket")
+
+local function debug(...)
+ return log("debug", ("%s "):rep(select('#', ...)), ...)
+end
+local vdebug = debug;
+
+local bitor = ( function( ) -- thx Rici Lake
+ local hasbit = function( x, p )
+ return x % ( p + p ) >= p
+ end
+ return function( x, y )
+ local p = 1
+ local z = 0
+ local limit = x > y and x or y
+ while p <= limit do
+ if hasbit( x, p ) or hasbit( y, p ) then
+ z = z + p
+ end
+ p = p + p
+ end
+ return z
+ end
+end )( )
+
+local event = require "luaevent.core"
+local base = event.new( )
+local EV_READ = event.EV_READ
+local EV_WRITE = event.EV_WRITE
+local EV_TIMEOUT = event.EV_TIMEOUT
+local EV_SIGNAL = event.EV_SIGNAL
+
+local EV_READWRITE = bitor( EV_READ, EV_WRITE )
+
+local interfacelist = ( function( ) -- holds the interfaces for sockets
+ local array = { }
+ local len = 0
+ return function( method, arg )
+ if "add" == method then
+ len = len + 1
+ array[ len ] = arg
+ arg:_position( len )
+ return len
+ elseif "delete" == method then
+ if len <= 0 then
+ return nil, "array is already empty"
+ end
+ local position = arg:_position() -- get position in array
+ if position ~= len then
+ local interface = array[ len ] -- get last interface
+ array[ position ] = interface -- copy it into free position
+ array[ len ] = nil -- free last position
+ interface:_position( position ) -- set new position in array
+ else -- free last position
+ array[ len ] = nil
+ end
+ len = len - 1
+ return len
+ else
+ return array
+ end
+ end
+end )( )
+
+-- Client interface methods
+local interface_mt
+do
+ interface_mt = {}; interface_mt.__index = interface_mt;
+
+ local addevent = base.addevent
+ local coroutine_wrap, coroutine_yield = coroutine.wrap,coroutine.yield
+ local string_len = string.len
+
+ -- Private methods
+ function interface_mt:_position(new_position)
+ self.position = new_position or self.position
+ return self.position;
+ end
+ function interface_mt:_close() -- regs event to start self:_destroy()
+ local callback = function( )
+ self:_destroy();
+ self.eventclose = nil
+ return -1
+ end
+ self.eventclose = addevent( base, nil, EV_TIMEOUT, callback, 0 )
+ return true
+ end
+
+ function interface_mt:_start_connection(plainssl) -- should be called from addclient
+ local callback = function( event )
+ if EV_TIMEOUT == event then -- timeout during connection
+ self.fatalerror = "connection timeout"
+ self:ontimeout() -- call timeout listener
+ self:_close()
+ debug( "new connection failed. id:", self.id, "error:", self.fatalerror )
+ else
+ if plainssl and ssl then -- start ssl session
+ self:starttls()
+ else -- normal connection
+ self:_start_session( self.listener.onconnect )
+ end
+ debug( "new connection established. id:", self.id )
+ end
+ self.eventconnect = nil
+ return -1
+ end
+ self.eventconnect = addevent( base, self.conn, EV_WRITE, callback, cfg.CONNECT_TIMEOUT )
+ return true
+ end
+ function interface_mt:_start_session(onconnect) -- new session, for example after startssl
+ if self.type == "client" then
+ local callback = function( )
+ self:_lock( false, false, false )
+ --vdebug( "start listening on client socket with id:", self.id )
+ self.eventread = addevent( base, self.conn, EV_READ, self.readcallback, cfg.READ_TIMEOUT ); -- register callback
+ self:onconnect()
+ self.eventsession = nil
+ return -1
+ end
+ self.eventsession = addevent( base, nil, EV_TIMEOUT, callback, 0 )
+ else
+ self:_lock( false )
+ --vdebug( "start listening on server socket with id:", self.id )
+ self.eventread = addevent( base, self.conn, EV_READ, self.readcallback ) -- register callback
+ end
+ return true
+ end
+ function interface_mt:_start_ssl(arg) -- old socket will be destroyed, therefore we have to close read/write events first
+ --vdebug( "starting ssl session with client id:", self.id )
+ local _
+ _ = self.eventread and self.eventread:close( ) -- close events; this must be called outside of the event callbacks!
+ _ = self.eventwrite and self.eventwrite:close( )
+ self.eventread, self.eventwrite = nil, nil
+ local err
+ self.conn, err = ssl.wrap( self.conn, self._sslctx )
+ if err then
+ self.fatalerror = err
+ self.conn = nil -- cannot be used anymore
+ if "onconnect" == arg then
+ self.ondisconnect = nil -- dont call this when client isnt really connected
+ end
+ self:_close()
+ debug( "fatal error while ssl wrapping:", err )
+ return false
+ end
+ self.conn:settimeout( 0 ) -- set non blocking
+ local handshakecallback = coroutine_wrap(
+ function( event )
+ local _, err
+ local attempt = 0
+ local maxattempt = cfg.MAX_HANDSHAKE_ATTEMPTS
+ while attempt < maxattempt do -- no endless loop
+ attempt = attempt + 1
+ debug( "ssl handshake of client with id:"..tostring(self)..", attempt:"..attempt )
+ if attempt > maxattempt then
+ self.fatalerror = "max handshake attempts exceeded"
+ elseif EV_TIMEOUT == event then
+ self.fatalerror = "timeout during handshake"
+ else
+ _, err = self.conn:dohandshake( )
+ if not err then
+ self:_lock( false, false, false ) -- unlock the interface; sending, closing etc allowed
+ self.send = self.conn.send -- caching table lookups with new client object
+ self.receive = self.conn.receive
+ local onsomething
+ if "onconnect" == arg then -- trigger listener
+ onsomething = self.onconnect
+ else
+ onsomething = self.onsslconnection
+ end
+ self:_start_session( onsomething )
+ debug( "ssl handshake done" )
+ self:onstatus("ssl-handshake-complete");
+ self.eventhandshake = nil
+ return -1
+ end
+ debug( "error during ssl handshake:", err )
+ if err == "wantwrite" then
+ event = EV_WRITE
+ elseif err == "wantread" then
+ event = EV_READ
+ else
+ self.fatalerror = err
+ end
+ end
+ if self.fatalerror then
+ if "onconnect" == arg then
+ self.ondisconnect = nil -- dont call this when client isnt really connected
+ end
+ self:_close()
+ debug( "handshake failed because:", self.fatalerror )
+ self.eventhandshake = nil
+ return -1
+ end
+ event = coroutine_yield( event, cfg.HANDSHAKE_TIMEOUT ) -- yield this monster...
+ end
+ end
+ )
+ debug "starting handshake..."
+ self:_lock( false, true, true ) -- unlock read/write events, but keep interface locked
+ self.eventhandshake = addevent( base, self.conn, EV_READWRITE, handshakecallback, cfg.HANDSHAKE_TIMEOUT )
+ return true
+ end
+ function interface_mt:_destroy() -- close this interface + events and call last listener
+ debug( "closing client with id:", self.id )
+ self:_lock( true, true, true ) -- first of all, lock the interface to avoid further actions
+ local _
+ _ = self.eventread and self.eventread:close( ) -- close events; this must be called outside of the event callbacks!
+ if self.type == "client" then
+ _ = self.eventwrite and self.eventwrite:close( )
+ _ = self.eventhandshake and self.eventhandshake:close( )
+ _ = self.eventstarthandshake and self.eventstarthandshake:close( )
+ _ = self.eventconnect and self.eventconnect:close( )
+ _ = self.eventsession and self.eventsession:close( )
+ _ = self.eventwritetimeout and self.eventwritetimeout:close( )
+ _ = self.eventreadtimeout and self.eventreadtimeout:close( )
+ _ = self.ondisconnect and self:ondisconnect( self.fatalerror ~= "client to close" and self.fatalerror) -- call ondisconnect listener (wont be the case if handshake failed on connect)
+ _ = self.conn and self.conn:close( ) -- close connection, must also be called outside of any socket registered events!
+ _ = self._server and self._server:counter(-1);
+ self.eventread, self.eventwrite = nil, nil
+ self.eventstarthandshake, self.eventhandshake, self.eventclose = nil, nil, nil
+ self.readcallback, self.writecallback = nil, nil
+ else
+ self.conn:close( )
+ self.eventread, self.eventclose = nil, nil
+ self.interface, self.readcallback = nil, nil
+ end
+ interfacelist( "delete", self )
+ return true
+ end
+
+ function interface_mt:_lock(nointerface, noreading, nowriting) -- lock or unlock this interface or events
+ self.nointerface, self.noreading, self.nowriting = nointerface, noreading, nowriting
+ return nointerface, noreading, nowriting
+ end
+
+ --TODO: Deprecate
+ function interface_mt:lock_read(switch)
+ if switch then
+ return self:pause();
+ else
+ return self:resume();
+ end
+ end
+
+ function interface_mt:pause()
+ return self:_lock(self.nointerface, true, self.nowriting);
+ end
+
+ function interface_mt:resume()
+ return self:_lock(self.nointerface, false, self.nowriting);
+ end
+
+ function interface_mt:counter(c)
+ if c then
+ self._connections = self._connections + c
+ end
+ return self._connections
+ end
+
+ -- Public methods
+ function interface_mt:write(data)
+ if self.nowriting then return nil, "locked" end
+ --vdebug( "try to send data to client, id/data:", self.id, data )
+ data = tostring( data )
+ local len = string_len( data )
+ local total = len + self.writebufferlen
+ if total > cfg.MAX_SEND_LENGTH then -- check buffer length
+ local err = "send buffer exceeded"
+ debug( "error:", err ) -- to much, check your app
+ return nil, err
+ end
+ self.writebuffer = self.writebuffer .. data -- new buffer
+ self.writebufferlen = total
+ if not self.eventwrite then -- register new write event
+ --vdebug( "register new write event" )
+ self.eventwrite = addevent( base, self.conn, EV_WRITE, self.writecallback, cfg.WRITE_TIMEOUT )
+ end
+ return true
+ end
+ function interface_mt:close(now)
+ if self.nointerface then return nil, "locked"; end
+ debug( "try to close client connection with id:", self.id )
+ if self.type == "client" then
+ self.fatalerror = "client to close"
+ if ( not self.eventwrite ) or now then -- try to close immediately
+ self:_lock( true, true, true )
+ self:_close()
+ return true
+ else -- wait for incomplete write request
+ self:_lock( true, true, false )
+ debug "closing delayed until writebuffer is empty"
+ return nil, "writebuffer not empty, waiting"
+ end
+ else
+ debug( "try to close server with id:", self.id, "args:", now )
+ self.fatalerror = "server to close"
+ self:_lock( true )
+ local count = 0
+ for _, item in ipairs( interfacelist( ) ) do
+ if ( item.type ~= "server" ) and ( item._server == self ) then -- client/server match
+ if item:close( now ) then -- writebuffer was empty
+ count = count + 1
+ end
+ end
+ end
+ local timeout = 0 -- dont wait for unfinished writebuffers of clients...
+ if not now then
+ timeout = cfg.WRITE_TIMEOUT -- ...or wait for it
+ end
+ self:_close( timeout ) -- add new event to remove the server interface
+ debug( "seconds remained until server is closed:", timeout )
+ return count -- returns finished clients with empty writebuffer
+ end
+ end
+
+ function interface_mt:server()
+ return self._server or self;
+ end
+
+ function interface_mt:port()
+ return self._port
+ end
+
+ function interface_mt:serverport()
+ return self._serverport
+ end
+
+ function interface_mt:ip()
+ return self._ip
+ end
+
+ function interface_mt:ssl()
+ return self._usingssl
+ end
+
+ function interface_mt:type()
+ return self._type or "client"
+ end
+
+ function interface_mt:connections()
+ return self._connections
+ end
+
+ function interface_mt:address()
+ return self.addr
+ end
+
+ function interface_mt:set_sslctx(sslctx)
+ self._sslctx = sslctx;
+ if sslctx then
+ self.starttls = nil; -- use starttls() of interface_mt
+ else
+ self.starttls = false; -- prevent starttls()
+ end
+ end
+
+ function interface_mt:set_mode(pattern)
+ if pattern then
+ self._pattern = pattern;
+ end
+ return self._pattern;
+ end
+
+ function interface_mt:set_send(new_send)
+ -- No-op, we always use the underlying connection's send
+ end
+
+ function interface_mt:starttls(sslctx)
+ debug( "try to start ssl at client id:", self.id )
+ local err
+ self._sslctx = sslctx;
+ if self._usingssl then -- startssl was already called
+ err = "ssl already active"
+ end
+ if err then
+ debug( "error:", err )
+ return nil, err
+ end
+ self._usingssl = true
+ self.startsslcallback = function( ) -- we have to start the handshake outside of a read/write event
+ self.startsslcallback = nil
+ self:_start_ssl();
+ self.eventstarthandshake = nil
+ return -1
+ end
+ if not self.eventwrite then
+ self:_lock( true, true, true ) -- lock the interface, to not disturb the handshake
+ self.eventstarthandshake = addevent( base, nil, EV_TIMEOUT, self.startsslcallback, 0 ) -- add event to start handshake
+ else -- wait until writebuffer is empty
+ self:_lock( true, true, false )
+ debug "ssl session delayed until writebuffer is empty..."
+ end
+ self.starttls = false;
+ return true
+ end
+
+ function interface_mt:setoption(option, value)
+ if self.conn.setoption then
+ return self.conn:setoption(option, value);
+ end
+ return false, "setoption not implemented";
+ end
+
+ function interface_mt:setlistener(listener)
+ self.onconnect, self.ondisconnect, self.onincoming, self.ontimeout, self.onstatus
+ = listener.onconnect, listener.ondisconnect, listener.onincoming, listener.ontimeout, listener.onstatus;
+ end
+
+ -- Stub handlers
+ function interface_mt:onconnect()
+ return self:onincoming(nil);
+ end
+ function interface_mt:onincoming()
+ end
+ function interface_mt:ondisconnect()
+ end
+ function interface_mt:ontimeout()
+ end
+ function interface_mt:ondrain()
+ end
+ function interface_mt:onstatus()
+ debug("server.lua: Dummy onstatus()")
+ end
+end
+
+-- End of client interface methods
+
+local handleclient;
+do
+ local string_sub = string.sub -- caching table lookups
+ local string_len = string.len
+ local addevent = base.addevent
+ local coroutine_wrap = coroutine.wrap
+ local socket_gettime = socket.gettime
+ local coroutine_yield = coroutine.yield
+ function handleclient( client, ip, port, server, pattern, listener, _, sslctx ) -- creates an client interface
+ --vdebug("creating client interfacce...")
+ local interface = {
+ type = "client";
+ conn = client;
+ currenttime = socket_gettime( ); -- safe the origin
+ writebuffer = ""; -- writebuffer
+ writebufferlen = 0; -- length of writebuffer
+ send = client.send; -- caching table lookups
+ receive = client.receive;
+ onconnect = listener.onconnect; -- will be called when client disconnects
+ ondisconnect = listener.ondisconnect; -- will be called when client disconnects
+ onincoming = listener.onincoming; -- will be called when client sends data
+ ontimeout = listener.ontimeout; -- called when fatal socket timeout occurs
+ onstatus = listener.onstatus; -- called for status changes (e.g. of SSL/TLS)
+ eventread = false, eventwrite = false, eventclose = false,
+ eventhandshake = false, eventstarthandshake = false; -- event handler
+ eventconnect = false, eventsession = false; -- more event handler...
+ eventwritetimeout = false; -- even more event handler...
+ eventreadtimeout = false;
+ fatalerror = false; -- error message
+ writecallback = false; -- will be called on write events
+ readcallback = false; -- will be called on read events
+ nointerface = true; -- lock/unlock parameter of this interface
+ noreading = false, nowriting = false; -- locks of the read/writecallback
+ startsslcallback = false; -- starting handshake callback
+ position = false; -- position of client in interfacelist
+
+ -- Properties
+ _ip = ip, _port = port, _server = server, _pattern = pattern,
+ _serverport = (server and server:port() or nil),
+ _sslctx = sslctx; -- parameters
+ _usingssl = false; -- client is using ssl;
+ }
+ if not ssl then interface.starttls = false; end
+ interface.id = tostring(interface):match("%x+$");
+ interface.writecallback = function( event ) -- called on write events
+ --vdebug( "new client write event, id/ip/port:", interface, ip, port )
+ if interface.nowriting or ( interface.fatalerror and ( "client to close" ~= interface.fatalerror ) ) then -- leave this event
+ --vdebug( "leaving this event because:", interface.nowriting or interface.fatalerror )
+ interface.eventwrite = false
+ return -1
+ end
+ if EV_TIMEOUT == event then -- took too long to write some data to socket -> disconnect
+ interface.fatalerror = "timeout during writing"
+ debug( "writing failed:", interface.fatalerror )
+ interface:_close()
+ interface.eventwrite = false
+ return -1
+ else -- can write :)
+ if interface._usingssl then -- handle luasec
+ if interface.eventreadtimeout then -- we have to read first
+ local ret = interface.readcallback( ) -- call readcallback
+ --vdebug( "tried to read in writecallback, result:", ret )
+ end
+ if interface.eventwritetimeout then -- luasec only
+ interface.eventwritetimeout:close( ) -- first we have to close timeout event which where regged after a wantread error
+ interface.eventwritetimeout = false
+ end
+ end
+ local succ, err, byte = interface.conn:send( interface.writebuffer, 1, interface.writebufferlen )
+ --vdebug( "write data:", interface.writebuffer, "error:", err, "part:", byte )
+ if succ then -- writing succesful
+ interface.writebuffer = ""
+ interface.writebufferlen = 0
+ interface:ondrain();
+ if interface.fatalerror then
+ debug "closing client after writing"
+ interface:_close() -- close interface if needed
+ elseif interface.startsslcallback then -- start ssl connection if needed
+ debug "starting ssl handshake after writing"
+ interface.eventstarthandshake = addevent( base, nil, EV_TIMEOUT, interface.startsslcallback, 0 )
+ elseif interface.eventreadtimeout then
+ return EV_WRITE, EV_TIMEOUT
+ end
+ interface.eventwrite = nil
+ return -1
+ elseif byte and (err == "timeout" or err == "wantwrite") then -- want write again
+ --vdebug( "writebuffer is not empty:", err )
+ interface.writebuffer = string_sub( interface.writebuffer, byte + 1, interface.writebufferlen ) -- new buffer
+ interface.writebufferlen = interface.writebufferlen - byte
+ if "wantread" == err then -- happens only with luasec
+ local callback = function( )
+ interface:_close()
+ interface.eventwritetimeout = nil
+ return -1;
+ end
+ interface.eventwritetimeout = addevent( base, nil, EV_TIMEOUT, callback, cfg.WRITE_TIMEOUT ) -- reg a new timeout event
+ debug( "wantread during write attempt, reg it in readcallback but dont know what really happens next..." )
+ -- hopefully this works with luasec; its simply not possible to use 2 different write events on a socket in luaevent
+ return -1
+ end
+ return EV_WRITE, cfg.WRITE_TIMEOUT
+ else -- connection was closed during writing or fatal error
+ interface.fatalerror = err or "fatal error"
+ debug( "connection failed in write event:", interface.fatalerror )
+ interface:_close()
+ interface.eventwrite = nil
+ return -1
+ end
+ end
+ end
+
+ interface.readcallback = function( event ) -- called on read events
+ --vdebug( "new client read event, id/ip/port:", tostring(interface.id), tostring(ip), tostring(port) )
+ if interface.noreading or interface.fatalerror then -- leave this event
+ --vdebug( "leaving this event because:", tostring(interface.noreading or interface.fatalerror) )
+ interface.eventread = nil
+ return -1
+ end
+ if EV_TIMEOUT == event then -- took too long to get some data from client -> disconnect
+ interface.fatalerror = "timeout during receiving"
+ debug( "connection failed:", interface.fatalerror )
+ interface:_close()
+ interface.eventread = nil
+ return -1
+ else -- can read
+ if interface._usingssl then -- handle luasec
+ if interface.eventwritetimeout then -- ok, in the past writecallback was regged
+ local ret = interface.writecallback( ) -- call it
+ --vdebug( "tried to write in readcallback, result:", tostring(ret) )
+ end
+ if interface.eventreadtimeout then
+ interface.eventreadtimeout:close( )
+ interface.eventreadtimeout = nil
+ end
+ end
+ local buffer, err, part = interface.conn:receive( interface._pattern ) -- receive buffer with "pattern"
+ --vdebug( "read data:", tostring(buffer), "error:", tostring(err), "part:", tostring(part) )
+ buffer = buffer or part or ""
+ local len = string_len( buffer )
+ if len > cfg.MAX_READ_LENGTH then -- check buffer length
+ interface.fatalerror = "receive buffer exceeded"
+ debug( "fatal error:", interface.fatalerror )
+ interface:_close()
+ interface.eventread = nil
+ return -1
+ end
+ interface.onincoming( interface, buffer, err ) -- send new data to listener
+ if err and ( err ~= "timeout" and err ~= "wantread" ) then
+ if "wantwrite" == err then -- need to read on write event
+ if not interface.eventwrite then -- register new write event if needed
+ interface.eventwrite = addevent( base, interface.conn, EV_WRITE, interface.writecallback, cfg.WRITE_TIMEOUT )
+ end
+ interface.eventreadtimeout = addevent( base, nil, EV_TIMEOUT,
+ function( )
+ interface:_close()
+ end, cfg.READ_TIMEOUT
+ )
+ debug( "wantwrite during read attempt, reg it in writecallback but dont know what really happens next..." )
+ -- to be honest i dont know what happens next, if it is allowed to first read, the write etc...
+ else -- connection was closed or fatal error
+ interface.fatalerror = err
+ debug( "connection failed in read event:", interface.fatalerror )
+ interface:_close()
+ interface.eventread = nil
+ return -1
+ end
+ end
+ return EV_READ, cfg.READ_TIMEOUT
+ end
+ end
+
+ client:settimeout( 0 ) -- set non blocking
+ setmetatable(interface, interface_mt)
+ interfacelist( "add", interface ) -- add to interfacelist
+ return interface
+ end
+end
+
+local handleserver
+do
+ function handleserver( server, addr, port, pattern, listener, sslctx ) -- creates an server interface
+ debug "creating server interface..."
+ local interface = {
+ _connections = 0;
+
+ conn = server;
+ onconnect = listener.onconnect; -- will be called when new client connected
+ eventread = false; -- read event handler
+ eventclose = false; -- close event handler
+ readcallback = false; -- read event callback
+ fatalerror = false; -- error message
+ nointerface = true; -- lock/unlock parameter
+
+ _ip = addr, _port = port, _pattern = pattern,
+ _sslctx = sslctx;
+ }
+ interface.id = tostring(interface):match("%x+$");
+ interface.readcallback = function( event ) -- server handler, called on incoming connections
+ --vdebug( "server can accept, id/addr/port:", interface, addr, port )
+ if interface.fatalerror then
+ --vdebug( "leaving this event because:", self.fatalerror )
+ interface.eventread = nil
+ return -1
+ end
+ local delay = cfg.ACCEPT_DELAY
+ if EV_TIMEOUT == event then
+ if interface._connections >= cfg.MAX_CONNECTIONS then -- check connection count
+ debug( "to many connections, seconds to wait for next accept:", delay )
+ return EV_TIMEOUT, delay -- timeout...
+ else
+ return EV_READ -- accept again
+ end
+ end
+ --vdebug("max connection check ok, accepting...")
+ local client, err = server:accept() -- try to accept; TODO: check err
+ while client do
+ if interface._connections >= cfg.MAX_CONNECTIONS then
+ client:close( ) -- refuse connection
+ debug( "maximal connections reached, refuse client connection; accept delay:", delay )
+ return EV_TIMEOUT, delay -- delay for next accept attempt
+ end
+ local client_ip, client_port = client:getpeername( )
+ interface._connections = interface._connections + 1 -- increase connection count
+ local clientinterface = handleclient( client, client_ip, client_port, interface, pattern, listener, nil, sslctx )
+ --vdebug( "client id:", clientinterface, "startssl:", startssl )
+ if ssl and sslctx then
+ clientinterface:starttls(sslctx)
+ else
+ clientinterface:_start_session( clientinterface.onconnect )
+ end
+ debug( "accepted incoming client connection from:", client_ip or "<unknown IP>", client_port or "<unknown port>", "to", port or "<unknown port>");
+
+ client, err = server:accept() -- try to accept again
+ end
+ return EV_READ
+ end
+
+ server:settimeout( 0 )
+ setmetatable(interface, interface_mt)
+ interfacelist( "add", interface )
+ interface:_start_session()
+ return interface
+ end
+end
+
+local addserver = ( function( )
+ return function( addr, port, listener, pattern, sslcfg, startssl ) -- TODO: check arguments
+ --vdebug( "creating new tcp server with following parameters:", addr or "nil", port or "nil", sslcfg or "nil", startssl or "nil")
+ local server, err = socket.bind( addr, port, cfg.ACCEPT_QUEUE ) -- create server socket
+ if not server then
+ debug( "creating server socket failed because:", err )
+ return nil, err
+ end
+ local sslctx
+ if sslcfg then
+ if not ssl then
+ debug "fatal error: luasec not found"
+ return nil, "luasec not found"
+ end
+ sslctx, err = sslcfg
+ if err then
+ debug( "error while creating new ssl context for server socket:", err )
+ return nil, err
+ end
+ end
+ local interface = handleserver( server, addr, port, pattern, listener, sslctx, startssl ) -- new server handler
+ debug( "new server created with id:", tostring(interface))
+ return interface
+ end
+end )( )
+
+local addclient, wrapclient
+do
+ function wrapclient( client, ip, port, listeners, pattern, sslctx, startssl )
+ local interface = handleclient( client, ip, port, nil, pattern, listeners, sslctx )
+ interface:_start_session()
+ return interface, client
+ --function handleclient( client, ip, port, server, pattern, listener, _, sslctx ) -- creates an client interface
+ end
+
+ function addclient( addr, serverport, listener, pattern, localaddr, localport, sslcfg, startssl )
+ local client, err = socket.tcp() -- creating new socket
+ if not client then
+ debug( "cannot create socket:", err )
+ return nil, err
+ end
+ client:settimeout( 0 ) -- set nonblocking
+ if localaddr then
+ local res, err = client:bind( localaddr, localport, -1 )
+ if not res then
+ debug( "cannot bind client:", err )
+ return nil, err
+ end
+ end
+ local sslctx
+ if sslcfg then -- handle ssl/new context
+ if not ssl then
+ debug "need luasec, but not available"
+ return nil, "luasec not found"
+ end
+ sslctx, err = sslcfg
+ if err then
+ debug( "cannot create new ssl context:", err )
+ return nil, err
+ end
+ end
+ local res, err = client:connect( addr, serverport ) -- connect
+ if res or ( err == "timeout" ) then
+ local ip, port = client:getsockname( )
+ local server = function( )
+ return nil, "this is a dummy server interface"
+ end
+ local interface = wrapclient( client, ip, serverport, listener, pattern, sslctx, startssl )
+ interface:_start_connection( startssl )
+ debug( "new connection id:", interface.id )
+ return interface, err
+ else
+ debug( "new connection failed:", err )
+ return nil, err
+ end
+ end
+end
+
+
+local loop = function( ) -- starts the event loop
+ base:loop( )
+ return "quitting";
+end
+
+local newevent = ( function( )
+ local add = base.addevent
+ return function( ... )
+ return add( base, ... )
+ end
+end )( )
+
+local closeallservers = function( arg )
+ for _, item in ipairs( interfacelist( ) ) do
+ if item.type == "server" then
+ item:close( arg )
+ end
+ end
+end
+
+local function setquitting(yes)
+ if yes then
+ -- Quit now
+ closeallservers();
+ base:loopexit();
+ end
+end
+
+function get_backend()
+ return base:method();
+end
+
+-- We need to hold onto the events to stop them
+-- being garbage-collected
+local signal_events = {}; -- [signal_num] -> event object
+function hook_signal(signal_num, handler)
+ local function _handler(event)
+ local ret = handler();
+ if ret ~= false then -- Continue handling this signal?
+ return EV_SIGNAL; -- Yes
+ end
+ return -1; -- Close this event
+ end
+ signal_events[signal_num] = base:addevent(signal_num, EV_SIGNAL, _handler);
+ return signal_events[signal_num];
+end
+
+local function link(sender, receiver, buffersize)
+ sender:set_mode(buffersize);
+ local sender_locked;
+
+ function receiver:ondrain()
+ if sender_locked then
+ sender:resume();
+ sender_locked = nil;
+ end
+ end
+
+ function sender:onincoming(data)
+ receiver:write(data);
+ if receiver.writebufferlen >= buffersize then
+ sender_locked = true;
+ sender:pause();
+ end
+ end
+end
+
+return {
+
+ cfg = cfg,
+ base = base,
+ loop = loop,
+ link = link,
+ event = event,
+ event_base = base,
+ addevent = newevent,
+ addserver = addserver,
+ addclient = addclient,
+ wrapclient = wrapclient,
+ setquitting = setquitting,
+ closeall = closeallservers,
+ get_backend = get_backend,
+ hook_signal = hook_signal,
+
+ __NAME = SCRIPT_NAME,
+ __DATE = LAST_MODIFIED,
+ __AUTHOR = SCRIPT_AUTHOR,
+ __VERSION = SCRIPT_VERSION,
+
+}