ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/AnyEvent/lib/AnyEvent/Handle.pm
(Generate patch)

Comparing AnyEvent/lib/AnyEvent/Handle.pm (file contents):
Revision 1.93 by root, Wed Oct 1 14:49:23 2008 UTC vs.
Revision 1.99 by root, Thu Oct 23 02:41:00 2008 UTC

59treatment of characters applies to this module as well. 59treatment of characters applies to this module as well.
60 60
61All callbacks will be invoked with the handle object as their first 61All callbacks will be invoked with the handle object as their first
62argument. 62argument.
63 63
64=head2 SIGPIPE is not handled by this module
65
66SIGPIPE is not handled by this module, so one of the practical
67requirements of using it is to ignore SIGPIPE (C<$SIG{PIPE} =
68'IGNORE'>). At least, this is highly recommend in a networked program: If
69you use AnyEvent::Handle in a filter program (like sort), exiting on
70SIGPIPE is probably the right thing to do.
71
72=head1 METHODS 64=head1 METHODS
73 65
74=over 4 66=over 4
75 67
76=item B<new (%args)> 68=item B<new (%args)>
295 287
296 $self->{fh} or Carp::croak "mandatory argument fh is missing"; 288 $self->{fh} or Carp::croak "mandatory argument fh is missing";
297 289
298 AnyEvent::Util::fh_nonblocking $self->{fh}, 1; 290 AnyEvent::Util::fh_nonblocking $self->{fh}, 1;
299 291
300 if ($self->{tls}) {
301 require Net::SSLeay;
302 $self->starttls (delete $self->{tls}, delete $self->{tls_ctx}); 292 $self->starttls (delete $self->{tls}, delete $self->{tls_ctx})
303 } 293 if $self->{tls};
304 294
305 $self->{_activity} = AnyEvent->now; 295 $self->{_activity} = AnyEvent->now;
306 $self->_timeout; 296 $self->_timeout;
307 297
308 $self->on_drain (delete $self->{on_drain}) if exists $self->{on_drain}; 298 $self->on_drain (delete $self->{on_drain}) if exists $self->{on_drain};
552 ->($self, @_); 542 ->($self, @_);
553 } 543 }
554 544
555 if ($self->{tls}) { 545 if ($self->{tls}) {
556 $self->{_tls_wbuf} .= $_[0]; 546 $self->{_tls_wbuf} .= $_[0];
547
557 &_dotls ($self); 548 &_dotls ($self);
558 } else { 549 } else {
559 $self->{wbuf} .= $_[0]; 550 $self->{wbuf} .= $_[0];
560 $self->_drain_wbuf; 551 $self->_drain_wbuf;
561 } 552 }
579=cut 570=cut
580 571
581register_write_type netstring => sub { 572register_write_type netstring => sub {
582 my ($self, $string) = @_; 573 my ($self, $string) = @_;
583 574
584 sprintf "%d:%s,", (length $string), $string 575 (length $string) . ":$string,"
585}; 576};
586 577
587=item packstring => $format, $data 578=item packstring => $format, $data
588 579
589An octet string prefixed with an encoded length. The encoding C<$format> 580An octet string prefixed with an encoded length. The encoding C<$format>
1103An octet string prefixed with an encoded length. The encoding C<$format> 1094An octet string prefixed with an encoded length. The encoding C<$format>
1104uses the same format as a Perl C<pack> format, but must specify a single 1095uses the same format as a Perl C<pack> format, but must specify a single
1105integer only (only one of C<cCsSlLqQiInNvVjJw> is allowed, plus an 1096integer only (only one of C<cCsSlLqQiInNvVjJw> is allowed, plus an
1106optional C<!>, C<< < >> or C<< > >> modifier). 1097optional C<!>, C<< < >> or C<< > >> modifier).
1107 1098
1108DNS over TCP uses a prefix of C<n>, EPP uses a prefix of C<N>. 1099For example, DNS over TCP uses a prefix of C<n> (2 octet network order),
1100EPP uses a prefix of C<N> (4 octtes).
1109 1101
1110Example: read a block of data prefixed by its length in BER-encoded 1102Example: read a block of data prefixed by its length in BER-encoded
1111format (very efficient). 1103format (very efficient).
1112 1104
1113 $handle->push_read (packstring => "w", sub { 1105 $handle->push_read (packstring => "w", sub {
1292 if ($len > 0) { 1284 if ($len > 0) {
1293 $self->{_activity} = AnyEvent->now; 1285 $self->{_activity} = AnyEvent->now;
1294 1286
1295 if ($self->{tls}) { 1287 if ($self->{tls}) {
1296 Net::SSLeay::BIO_write ($self->{_rbio}, $$rbuf); 1288 Net::SSLeay::BIO_write ($self->{_rbio}, $$rbuf);
1289
1297 &_dotls ($self); 1290 &_dotls ($self);
1298 } else { 1291 } else {
1299 $self->_drain_rbuf unless $self->{_in_drain}; 1292 $self->_drain_rbuf unless $self->{_in_drain};
1300 } 1293 }
1301 1294
1309 } 1302 }
1310 }); 1303 });
1311 } 1304 }
1312} 1305}
1313 1306
1307# poll the write BIO and send the data if applicable
1314sub _dotls { 1308sub _dotls {
1315 my ($self) = @_; 1309 my ($self) = @_;
1316 1310
1317 my $buf; 1311 my $tmp;
1318 1312
1319 if (length $self->{_tls_wbuf}) { 1313 if (length $self->{_tls_wbuf}) {
1320 while ((my $len = Net::SSLeay::write ($self->{tls}, $self->{_tls_wbuf})) > 0) { 1314 while (($tmp = Net::SSLeay::write ($self->{tls}, $self->{_tls_wbuf})) > 0) {
1321 substr $self->{_tls_wbuf}, 0, $len, ""; 1315 substr $self->{_tls_wbuf}, 0, $tmp, "";
1322 } 1316 }
1323 } 1317 }
1324 1318
1325 while (defined ($buf = Net::SSLeay::read ($self->{tls}))) { 1319 while (defined ($tmp = Net::SSLeay::read ($self->{tls}))) {
1326 unless (length $buf) { 1320 unless (length $tmp) {
1327 # let's treat SSL-eof as we treat normal EOF 1321 # let's treat SSL-eof as we treat normal EOF
1328 delete $self->{_rw}; 1322 delete $self->{_rw};
1329 $self->{_eof} = 1; 1323 $self->{_eof} = 1;
1330 &_freetls; 1324 &_freetls;
1331 } 1325 }
1332 1326
1333 $self->{rbuf} .= $buf; 1327 $self->{rbuf} .= $tmp;
1334 $self->_drain_rbuf unless $self->{_in_drain}; 1328 $self->_drain_rbuf unless $self->{_in_drain};
1335 $self->{tls} or return; # tls session might have gone away in callback 1329 $self->{tls} or return; # tls session might have gone away in callback
1336 } 1330 }
1337 1331
1338 my $err = Net::SSLeay::get_error ($self->{tls}, -1); 1332 $tmp = Net::SSLeay::get_error ($self->{tls}, -1);
1339 1333
1340 if ($err!= Net::SSLeay::ERROR_WANT_READ ()) { 1334 if ($tmp != Net::SSLeay::ERROR_WANT_READ ()) {
1341 if ($err == Net::SSLeay::ERROR_SYSCALL ()) { 1335 if ($tmp == Net::SSLeay::ERROR_SYSCALL ()) {
1342 return $self->_error ($!, 1); 1336 return $self->_error ($!, 1);
1343 } elsif ($err == Net::SSLeay::ERROR_SSL ()) { 1337 } elsif ($tmp == Net::SSLeay::ERROR_SSL ()) {
1344 return $self->_error (&Errno::EIO, 1); 1338 return $self->_error (&Errno::EIO, 1);
1345 } 1339 }
1346 1340
1347 # all others are fine for our purposes 1341 # all other errors are fine for our purposes
1348 } 1342 }
1349 1343
1350 if (length ($buf = Net::SSLeay::BIO_read ($self->{_wbio}))) { 1344 while (length ($tmp = Net::SSLeay::BIO_read ($self->{_wbio}))) {
1351 $self->{wbuf} .= $buf; 1345 $self->{wbuf} .= $tmp;
1352 $self->_drain_wbuf; 1346 $self->_drain_wbuf;
1353 } 1347 }
1354} 1348}
1355 1349
1356=item $handle->starttls ($tls[, $tls_ctx]) 1350=item $handle->starttls ($tls[, $tls_ctx])
1374 1368
1375=cut 1369=cut
1376 1370
1377sub starttls { 1371sub starttls {
1378 my ($self, $ssl, $ctx) = @_; 1372 my ($self, $ssl, $ctx) = @_;
1373
1374 require Net::SSLeay;
1379 1375
1380 Carp::croak "it is an error to call starttls more than once on an Anyevent::Handle object" 1376 Carp::croak "it is an error to call starttls more than once on an Anyevent::Handle object"
1381 if $self->{tls}; 1377 if $self->{tls};
1382 1378
1383 if ($ssl eq "accept") { 1379 if ($ssl eq "accept") {
1426 1422
1427sub stoptls { 1423sub stoptls {
1428 my ($self) = @_; 1424 my ($self) = @_;
1429 1425
1430 if ($self->{tls}) { 1426 if ($self->{tls}) {
1431 Net::SSLeay::shutdown $self->{tls}; 1427 Net::SSLeay::shutdown ($self->{tls});
1432 1428
1433 &_dotls; 1429 &_dotls;
1434 1430
1435 # we don't give a shit. no, we do, but we can't. no... 1431 # we don't give a shit. no, we do, but we can't. no...
1436 # we, we... have to use openssl :/ 1432 # we, we... have to use openssl :/
1474 @linger = (); 1470 @linger = ();
1475 }); 1471 });
1476 } 1472 }
1477} 1473}
1478 1474
1475=item $handle->destroy
1476
1477Shut's down the handle object as much as possible - this call ensures that
1478no further callbacks will be invoked and resources will be freed as much
1479as possible. You must not call any methods on the object afterwards.
1480
1481The handle might still linger in the background and write out remaining
1482data, as specified by the C<linger> option, however.
1483
1484=cut
1485
1486sub destroy {
1487 my ($self) = @_;
1488
1489 $self->DESTROY;
1490 %$self = ();
1491}
1492
1479=item AnyEvent::Handle::TLS_CTX 1493=item AnyEvent::Handle::TLS_CTX
1480 1494
1481This function creates and returns the Net::SSLeay::CTX object used by 1495This function creates and returns the Net::SSLeay::CTX object used by
1482default for TLS mode. 1496default for TLS mode.
1483 1497
1511 } 1525 }
1512} 1526}
1513 1527
1514=back 1528=back
1515 1529
1530
1531=head1 NONFREQUENTLY ASKED QUESTIONS
1532
1533=over 4
1534
1535=item How do I read data until the other side closes the connection?
1536
1537If you just want to read your data into a perl scalar, the easiest way
1538to achieve this is by setting an C<on_read> callback that does nothing,
1539clearing the C<on_eof> callback and in the C<on_error> callback, the data
1540will be in C<$_[0]{rbuf}>:
1541
1542 $handle->on_read (sub { });
1543 $handle->on_eof (undef);
1544 $handle->on_error (sub {
1545 my $data = delete $_[0]{rbuf};
1546 undef $handle;
1547 });
1548
1549The reason to use C<on_error> is that TCP connections, due to latencies
1550and packets loss, might get closed quite violently with an error, when in
1551fact, all data has been received.
1552
1553It is usually better to use acknowledgements when transfering data,
1554to make sure the other side hasn't just died and you got the data
1555intact. This is also one reason why so many internet protocols have an
1556explicit QUIT command.
1557
1558
1559=item I don't want to destroy the handle too early - how do I wait until
1560all data has been written?
1561
1562After writing your last bits of data, set the C<on_drain> callback
1563and destroy the handle in there - with the default setting of
1564C<low_water_mark> this will be called precisely when all data has been
1565written to the socket:
1566
1567 $handle->push_write (...);
1568 $handle->on_drain (sub {
1569 warn "all data submitted to the kernel\n";
1570 undef $handle;
1571 });
1572
1573=item I get different callback invocations in TLS mode/Why can't I pause
1574reading?
1575
1576Unlike, say, TCP, TLS conenctions do not consist of two independent
1577communication channels, one for each direction. Or put differently. the
1578read and write directions are not independent of each other: you cannot
1579write data unless you are also prepared to read, and vice versa.
1580
1581This can mean than, in TLS mode, you might get C<on_error> or C<on_eof>
1582callback invocations when you are not expecting any read data - the reason
1583is that AnyEvent::Handle always reads in TLS mode.
1584
1585During the connection, you have to make sure that you always have a
1586non-empty read-queue, or an C<on_read> watcher. At the end of the
1587connection (or when you no longer want to use it) you can call the
1588C<destroy> method.
1589
1590=back
1591
1592
1516=head1 SUBCLASSING AnyEvent::Handle 1593=head1 SUBCLASSING AnyEvent::Handle
1517 1594
1518In many cases, you might want to subclass AnyEvent::Handle. 1595In many cases, you might want to subclass AnyEvent::Handle.
1519 1596
1520To make this easier, a given version of AnyEvent::Handle uses these 1597To make this easier, a given version of AnyEvent::Handle uses these

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines