ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/AnyEvent/lib/AnyEvent/Handle.pm
(Generate patch)

Comparing AnyEvent/lib/AnyEvent/Handle.pm (file contents):
Revision 1.203 by root, Sat Oct 16 03:22:10 2010 UTC vs.
Revision 1.213 by root, Sat Jan 15 20:32:45 2011 UTC

114=over 4 114=over 4
115 115
116=item on_prepare => $cb->($handle) 116=item on_prepare => $cb->($handle)
117 117
118This (rarely used) callback is called before a new connection is 118This (rarely used) callback is called before a new connection is
119attempted, but after the file handle has been created. It could be used to 119attempted, but after the file handle has been created (you can access that
120file handle via C<< $handle->{fh} >>). It could be used to prepare the
120prepare the file handle with parameters required for the actual connect 121file handle with parameters required for the actual connect (as opposed to
121(as opposed to settings that can be changed when the connection is already 122settings that can be changed when the connection is already established).
122established).
123 123
124The return value of this callback should be the connect timeout value in 124The return value of this callback should be the connect timeout value in
125seconds (or C<0>, or C<undef>, or the empty list, to indicate that the 125seconds (or C<0>, or C<undef>, or the empty list, to indicate that the
126default timeout is to be used). 126default timeout is to be used).
127 127
159 159
160Some errors are fatal (which is indicated by C<$fatal> being true). On 160Some errors are fatal (which is indicated by C<$fatal> being true). On
161fatal errors the handle object will be destroyed (by a call to C<< -> 161fatal errors the handle object will be destroyed (by a call to C<< ->
162destroy >>) after invoking the error callback (which means you are free to 162destroy >>) after invoking the error callback (which means you are free to
163examine the handle object). Examples of fatal errors are an EOF condition 163examine the handle object). Examples of fatal errors are an EOF condition
164with active (but unsatisifable) read watchers (C<EPIPE>) or I/O errors. In 164with active (but unsatisfiable) read watchers (C<EPIPE>) or I/O errors. In
165cases where the other side can close the connection at will, it is 165cases where the other side can close the connection at will, it is
166often easiest to not report C<EPIPE> errors in this callback. 166often easiest to not report C<EPIPE> errors in this callback.
167 167
168AnyEvent::Handle tries to find an appropriate error code for you to check 168AnyEvent::Handle tries to find an appropriate error code for you to check
169against, but in some cases (TLS errors), this does not work well. It is 169against, but in some cases (TLS errors), this does not work well. It is
278For example, a server accepting connections from untrusted sources should 278For example, a server accepting connections from untrusted sources should
279be configured to accept only so-and-so much data that it cannot act on 279be configured to accept only so-and-so much data that it cannot act on
280(for example, when expecting a line, an attacker could send an unlimited 280(for example, when expecting a line, an attacker could send an unlimited
281amount of data without a callback ever being called as long as the line 281amount of data without a callback ever being called as long as the line
282isn't finished). 282isn't finished).
283
284=item wbuf_max => <bytes>
285
286If defined, then a fatal error will be raised (with C<$!> set to C<ENOSPC>)
287when the write buffer ever (strictly) exceeds this size. This is useful to
288avoid some forms of denial-of-service attacks.
289
290Although the units of this parameter is bytes, this is the I<raw> number
291of bytes not yet accepted by the kernel. This can make a difference when
292you e.g. use TLS, as TLS typically makes your write data larger (but it
293can also make it smaller due to compression).
294
295As an example of when this limit is useful, take a chat server that sends
296chat messages to a client. If the client does not read those in a timely
297manner then the send buffer in the server would grow unbounded.
283 298
284=item autocork => <boolean> 299=item autocork => <boolean>
285 300
286When disabled (the default), C<push_write> will try to immediately 301When disabled (the default), C<push_write> will try to immediately
287write the data to the handle if possible. This avoids having to register 302write the data to the handle if possible. This avoids having to register
422Use the C<< ->starttls >> method if you need to start TLS negotiation later. 437Use the C<< ->starttls >> method if you need to start TLS negotiation later.
423 438
424=item tls_ctx => $anyevent_tls 439=item tls_ctx => $anyevent_tls
425 440
426Use the given C<AnyEvent::TLS> object to create the new TLS connection 441Use the given C<AnyEvent::TLS> object to create the new TLS connection
427(unless a connection object was specified directly). If this parameter is 442(unless a connection object was specified directly). If this
428missing, then AnyEvent::Handle will use C<AnyEvent::Handle::TLS_CTX>. 443parameter is missing (or C<undef>), then AnyEvent::Handle will use
444C<AnyEvent::Handle::TLS_CTX>.
429 445
430Instead of an object, you can also specify a hash reference with C<< key 446Instead of an object, you can also specify a hash reference with C<< key
431=> value >> pairs. Those will be passed to L<AnyEvent::TLS> to create a 447=> value >> pairs. Those will be passed to L<AnyEvent::TLS> to create a
432new TLS context object. 448new TLS context object.
433 449
501 AnyEvent::Socket::tcp_connect ( 517 AnyEvent::Socket::tcp_connect (
502 $self->{connect}[0], 518 $self->{connect}[0],
503 $self->{connect}[1], 519 $self->{connect}[1],
504 sub { 520 sub {
505 my ($fh, $host, $port, $retry) = @_; 521 my ($fh, $host, $port, $retry) = @_;
522
523 delete $self->{_connect}; # no longer needed
506 524
507 if ($fh) { 525 if ($fh) {
508 $self->{fh} = $fh; 526 $self->{fh} = $fh;
509 527
510 delete $self->{_skip_drain_rbuf}; 528 delete $self->{_skip_drain_rbuf};
528 }, 546 },
529 sub { 547 sub {
530 local $self->{fh} = $_[0]; 548 local $self->{fh} = $_[0];
531 549
532 $self->{on_prepare} 550 $self->{on_prepare}
533 ? $self->{on_prepare}->($self) 551 ? $self->{on_prepare}->($self)
534 : () 552 : ()
535 } 553 }
536 ); 554 );
537 } 555 }
538 556
737 755
738=item $handle->rbuf_max ($max_octets) 756=item $handle->rbuf_max ($max_octets)
739 757
740Configures the C<rbuf_max> setting (C<undef> disables it). 758Configures the C<rbuf_max> setting (C<undef> disables it).
741 759
760=item $handle->wbuf_max ($max_octets)
761
762Configures the C<wbuf_max> setting (C<undef> disables it).
763
742=cut 764=cut
743 765
744sub rbuf_max { 766sub rbuf_max {
745 $_[0]{rbuf_max} = $_[1]; 767 $_[0]{rbuf_max} = $_[1];
768}
769
770sub rbuf_max {
771 $_[0]{wbuf_max} = $_[1];
746} 772}
747 773
748############################################################################# 774#############################################################################
749 775
750=item $handle->timeout ($seconds) 776=item $handle->timeout ($seconds)
870 if $cb && $self->{low_water_mark} >= (length $self->{wbuf}) + (length $self->{_tls_wbuf}); 896 if $cb && $self->{low_water_mark} >= (length $self->{wbuf}) + (length $self->{_tls_wbuf});
871} 897}
872 898
873=item $handle->push_write ($data) 899=item $handle->push_write ($data)
874 900
875Queues the given scalar to be written. You can push as much data as you 901Queues the given scalar to be written. You can push as much data as
876want (only limited by the available memory), as C<AnyEvent::Handle> 902you want (only limited by the available memory and C<wbuf_max>), as
877buffers it independently of the kernel. 903C<AnyEvent::Handle> buffers it independently of the kernel.
878 904
879This method may invoke callbacks (and therefore the handle might be 905This method may invoke callbacks (and therefore the handle might be
880destroyed after it returns). 906destroyed after it returns).
881 907
882=cut 908=cut
910 $cb->() unless $self->{autocork}; 936 $cb->() unless $self->{autocork};
911 937
912 # if still data left in wbuf, we need to poll 938 # if still data left in wbuf, we need to poll
913 $self->{_ww} = AE::io $self->{fh}, 1, $cb 939 $self->{_ww} = AE::io $self->{fh}, 1, $cb
914 if length $self->{wbuf}; 940 if length $self->{wbuf};
941
942 if (
943 defined $self->{wbuf_max}
944 && $self->{wbuf_max} < length $self->{wbuf}
945 ) {
946 $self->_error (Errno::ENOSPC, 1), return;
947 }
915 }; 948 };
916} 949}
917 950
918our %WH; 951our %WH;
919 952
1740Note that AnyEvent::Handle will automatically C<start_read> for you when 1773Note that AnyEvent::Handle will automatically C<start_read> for you when
1741you change the C<on_read> callback or push/unshift a read callback, and it 1774you change the C<on_read> callback or push/unshift a read callback, and it
1742will automatically C<stop_read> for you when neither C<on_read> is set nor 1775will automatically C<stop_read> for you when neither C<on_read> is set nor
1743there are any read requests in the queue. 1776there are any read requests in the queue.
1744 1777
1745These methods will have no effect when in TLS mode (as TLS doesn't support 1778In older versions of this module (<= 5.3), these methods had no effect,
1746half-duplex connections). 1779as TLS does not support half-duplex connections. In current versions they
1780work as expected, as this behaviour is required to avoid certain resource
1781attacks, where the program would be forced to read (and buffer) arbitrary
1782amounts of data before being able to send some data. The drawback is that
1783some readings of the the SSL/TLS specifications basically require this
1784attack to be working, as SSL/TLS implementations might stall sending data
1785during a rehandshake.
1786
1787As a guideline, during the initial handshake, you should not stop reading,
1788and as a client, it might cause problems, depending on your applciation.
1747 1789
1748=cut 1790=cut
1749 1791
1750sub stop_read { 1792sub stop_read {
1751 my ($self) = @_; 1793 my ($self) = @_;
1752 1794
1753 delete $self->{_rw} unless $self->{tls}; 1795 delete $self->{_rw};
1754} 1796}
1755 1797
1756sub start_read { 1798sub start_read {
1757 my ($self) = @_; 1799 my ($self) = @_;
1758 1800
2132 2174
2133It is only safe to "forget" the reference inside EOF or error callbacks, 2175It is only safe to "forget" the reference inside EOF or error callbacks,
2134from within all other callbacks, you need to explicitly call the C<< 2176from within all other callbacks, you need to explicitly call the C<<
2135->destroy >> method. 2177->destroy >> method.
2136 2178
2179=item Why is my C<on_eof> callback never called?
2180
2181Probably because your C<on_error> callback is being called instead: When
2182you have outstanding requests in your read queue, then an EOF is
2183considered an error as you clearly expected some data.
2184
2185To avoid this, make sure you have an empty read queue whenever your handle
2186is supposed to be "idle" (i.e. connection closes are O.K.). You cna set
2187an C<on_read> handler that simply pushes the first read requests in the
2188queue.
2189
2190See also the next question, which explains this in a bit more detail.
2191
2192=item How can I serve requests in a loop?
2193
2194Most protocols consist of some setup phase (authentication for example)
2195followed by a request handling phase, where the server waits for requests
2196and handles them, in a loop.
2197
2198There are two important variants: The first (traditional, better) variant
2199handles requests until the server gets some QUIT command, causing it to
2200close the connection first (highly desirable for a busy TCP server). A
2201client dropping the connection is an error, which means this variant can
2202detect an unexpected detection close.
2203
2204To handle this case, always make sure you have a on-empty read queue, by
2205pushing the "read request start" handler on it:
2206
2207 # we assume a request starts with a single line
2208 my @start_request; @start_request = (line => sub {
2209 my ($hdl, $line) = @_;
2210
2211 ... handle request
2212
2213 # push next request read, possibly from a nested callback
2214 $hdl->push_read (@start_request);
2215 });
2216
2217 # auth done, now go into request handling loop
2218 # now push the first @start_request
2219 $hdl->push_read (@start_request);
2220
2221By always having an outstanding C<push_read>, the handle always expects
2222some data and raises the C<EPIPE> error when the connction is dropped
2223unexpectedly.
2224
2225The second variant is a protocol where the client can drop the connection
2226at any time. For TCP, this means that the server machine may run out of
2227sockets easier, and in general, it means you cnanot distinguish a protocl
2228failure/client crash from a normal connection close. Nevertheless, these
2229kinds of protocols are common (and sometimes even the best solution to the
2230problem).
2231
2232Having an outstanding read request at all times is possible if you ignore
2233C<EPIPE> errors, but this doesn't help with when the client drops the
2234connection during a request, which would still be an error.
2235
2236A better solution is to push the initial request read in an C<on_read>
2237callback. This avoids an error, as when the server doesn't expect data
2238(i.e. is idly waiting for the next request, an EOF will not raise an
2239error, but simply result in an C<on_eof> callback. It is also a bit slower
2240and simpler:
2241
2242 # auth done, now go into request handling loop
2243 $hdl->on_read (sub {
2244 my ($hdl) = @_;
2245
2246 # called each time we receive data but the read queue is empty
2247 # simply start read the request
2248
2249 $hdl->push_read (line => sub {
2250 my ($hdl, $line) = @_;
2251
2252 ... handle request
2253
2254 # do nothing special when the request has been handled, just
2255 # let the request queue go empty.
2256 });
2257 });
2258
2137=item I get different callback invocations in TLS mode/Why can't I pause 2259=item I get different callback invocations in TLS mode/Why can't I pause
2138reading? 2260reading?
2139 2261
2140Unlike, say, TCP, TLS connections do not consist of two independent 2262Unlike, say, TCP, TLS connections do not consist of two independent
2141communication channels, one for each direction. Or put differently, the 2263communication channels, one for each direction. Or put differently, the

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines