ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/AnyEvent/lib/AnyEvent/Handle.pm
(Generate patch)

Comparing AnyEvent/lib/AnyEvent/Handle.pm (file contents):
Revision 1.203 by root, Sat Oct 16 03:22:10 2010 UTC vs.
Revision 1.219 by root, Mon Jul 18 01:19:43 2011 UTC

114=over 4 114=over 4
115 115
116=item on_prepare => $cb->($handle) 116=item on_prepare => $cb->($handle)
117 117
118This (rarely used) callback is called before a new connection is 118This (rarely used) callback is called before a new connection is
119attempted, but after the file handle has been created. It could be used to 119attempted, but after the file handle has been created (you can access that
120file handle via C<< $handle->{fh} >>). It could be used to prepare the
120prepare the file handle with parameters required for the actual connect 121file handle with parameters required for the actual connect (as opposed to
121(as opposed to settings that can be changed when the connection is already 122settings that can be changed when the connection is already established).
122established).
123 123
124The return value of this callback should be the connect timeout value in 124The return value of this callback should be the connect timeout value in
125seconds (or C<0>, or C<undef>, or the empty list, to indicate that the 125seconds (or C<0>, or C<undef>, or the empty list, to indicate that the
126default timeout is to be used). 126default timeout is to be used).
127 127
159 159
160Some errors are fatal (which is indicated by C<$fatal> being true). On 160Some errors are fatal (which is indicated by C<$fatal> being true). On
161fatal errors the handle object will be destroyed (by a call to C<< -> 161fatal errors the handle object will be destroyed (by a call to C<< ->
162destroy >>) after invoking the error callback (which means you are free to 162destroy >>) after invoking the error callback (which means you are free to
163examine the handle object). Examples of fatal errors are an EOF condition 163examine the handle object). Examples of fatal errors are an EOF condition
164with active (but unsatisifable) read watchers (C<EPIPE>) or I/O errors. In 164with active (but unsatisfiable) read watchers (C<EPIPE>) or I/O errors. In
165cases where the other side can close the connection at will, it is 165cases where the other side can close the connection at will, it is
166often easiest to not report C<EPIPE> errors in this callback. 166often easiest to not report C<EPIPE> errors in this callback.
167 167
168AnyEvent::Handle tries to find an appropriate error code for you to check 168AnyEvent::Handle tries to find an appropriate error code for you to check
169against, but in some cases (TLS errors), this does not work well. It is 169against, but in some cases (TLS errors), this does not work well. It is
247many seconds pass without a successful read or write on the underlying 247many seconds pass without a successful read or write on the underlying
248file handle (or a call to C<timeout_reset>), the C<on_timeout> callback 248file handle (or a call to C<timeout_reset>), the C<on_timeout> callback
249will be invoked (and if that one is missing, a non-fatal C<ETIMEDOUT> 249will be invoked (and if that one is missing, a non-fatal C<ETIMEDOUT>
250error will be raised). 250error will be raised).
251 251
252There are three variants of the timeouts that work independently 252There are three variants of the timeouts that work independently of each
253of each other, for both read and write, just read, and just write: 253other, for both read and write (triggered when nothing was read I<OR>
254written), just read (triggered when nothing was read), and just write:
254C<timeout>, C<rtimeout> and C<wtimeout>, with corresponding callbacks 255C<timeout>, C<rtimeout> and C<wtimeout>, with corresponding callbacks
255C<on_timeout>, C<on_rtimeout> and C<on_wtimeout>, and reset functions 256C<on_timeout>, C<on_rtimeout> and C<on_wtimeout>, and reset functions
256C<timeout_reset>, C<rtimeout_reset>, and C<wtimeout_reset>. 257C<timeout_reset>, C<rtimeout_reset>, and C<wtimeout_reset>.
257 258
258Note that timeout processing is active even when you do not have 259Note that timeout processing is active even when you do not have any
259any outstanding read or write requests: If you plan to keep the connection 260outstanding read or write requests: If you plan to keep the connection
260idle then you should disable the timeout temporarily or ignore the timeout 261idle then you should disable the timeout temporarily or ignore the
261in the C<on_timeout> callback, in which case AnyEvent::Handle will simply 262timeout in the corresponding C<on_timeout> callback, in which case
262restart the timeout. 263AnyEvent::Handle will simply restart the timeout.
263 264
264Zero (the default) disables this timeout. 265Zero (the default) disables the corresponding timeout.
265 266
266=item on_timeout => $cb->($handle) 267=item on_timeout => $cb->($handle)
268
269=item on_rtimeout => $cb->($handle)
270
271=item on_wtimeout => $cb->($handle)
267 272
268Called whenever the inactivity timeout passes. If you return from this 273Called whenever the inactivity timeout passes. If you return from this
269callback, then the timeout will be reset as if some activity had happened, 274callback, then the timeout will be reset as if some activity had happened,
270so this condition is not fatal in any way. 275so this condition is not fatal in any way.
271 276
278For example, a server accepting connections from untrusted sources should 283For example, a server accepting connections from untrusted sources should
279be configured to accept only so-and-so much data that it cannot act on 284be configured to accept only so-and-so much data that it cannot act on
280(for example, when expecting a line, an attacker could send an unlimited 285(for example, when expecting a line, an attacker could send an unlimited
281amount of data without a callback ever being called as long as the line 286amount of data without a callback ever being called as long as the line
282isn't finished). 287isn't finished).
288
289=item wbuf_max => <bytes>
290
291If defined, then a fatal error will be raised (with C<$!> set to C<ENOSPC>)
292when the write buffer ever (strictly) exceeds this size. This is useful to
293avoid some forms of denial-of-service attacks.
294
295Although the units of this parameter is bytes, this is the I<raw> number
296of bytes not yet accepted by the kernel. This can make a difference when
297you e.g. use TLS, as TLS typically makes your write data larger (but it
298can also make it smaller due to compression).
299
300As an example of when this limit is useful, take a chat server that sends
301chat messages to a client. If the client does not read those in a timely
302manner then the send buffer in the server would grow unbounded.
283 303
284=item autocork => <boolean> 304=item autocork => <boolean>
285 305
286When disabled (the default), C<push_write> will try to immediately 306When disabled (the default), C<push_write> will try to immediately
287write the data to the handle if possible. This avoids having to register 307write the data to the handle if possible. This avoids having to register
422Use the C<< ->starttls >> method if you need to start TLS negotiation later. 442Use the C<< ->starttls >> method if you need to start TLS negotiation later.
423 443
424=item tls_ctx => $anyevent_tls 444=item tls_ctx => $anyevent_tls
425 445
426Use the given C<AnyEvent::TLS> object to create the new TLS connection 446Use the given C<AnyEvent::TLS> object to create the new TLS connection
427(unless a connection object was specified directly). If this parameter is 447(unless a connection object was specified directly). If this
428missing, then AnyEvent::Handle will use C<AnyEvent::Handle::TLS_CTX>. 448parameter is missing (or C<undef>), then AnyEvent::Handle will use
449C<AnyEvent::Handle::TLS_CTX>.
429 450
430Instead of an object, you can also specify a hash reference with C<< key 451Instead of an object, you can also specify a hash reference with C<< key
431=> value >> pairs. Those will be passed to L<AnyEvent::TLS> to create a 452=> value >> pairs. Those will be passed to L<AnyEvent::TLS> to create a
432new TLS context object. 453new TLS context object.
433 454
502 $self->{connect}[0], 523 $self->{connect}[0],
503 $self->{connect}[1], 524 $self->{connect}[1],
504 sub { 525 sub {
505 my ($fh, $host, $port, $retry) = @_; 526 my ($fh, $host, $port, $retry) = @_;
506 527
528 delete $self->{_connect}; # no longer needed
529
507 if ($fh) { 530 if ($fh) {
508 $self->{fh} = $fh; 531 $self->{fh} = $fh;
509 532
510 delete $self->{_skip_drain_rbuf}; 533 delete $self->{_skip_drain_rbuf};
511 $self->_start; 534 $self->_start;
518 }); 541 });
519 542
520 } else { 543 } else {
521 if ($self->{on_connect_error}) { 544 if ($self->{on_connect_error}) {
522 $self->{on_connect_error}($self, "$!"); 545 $self->{on_connect_error}($self, "$!");
523 $self->destroy; 546 $self->destroy if $self;
524 } else { 547 } else {
525 $self->_error ($!, 1); 548 $self->_error ($!, 1);
526 } 549 }
527 } 550 }
528 }, 551 },
529 sub { 552 sub {
530 local $self->{fh} = $_[0]; 553 local $self->{fh} = $_[0];
531 554
532 $self->{on_prepare} 555 $self->{on_prepare}
533 ? $self->{on_prepare}->($self) 556 ? $self->{on_prepare}->($self)
534 : () 557 : ()
535 } 558 }
536 ); 559 );
537 } 560 }
538 561
737 760
738=item $handle->rbuf_max ($max_octets) 761=item $handle->rbuf_max ($max_octets)
739 762
740Configures the C<rbuf_max> setting (C<undef> disables it). 763Configures the C<rbuf_max> setting (C<undef> disables it).
741 764
765=item $handle->wbuf_max ($max_octets)
766
767Configures the C<wbuf_max> setting (C<undef> disables it).
768
742=cut 769=cut
743 770
744sub rbuf_max { 771sub rbuf_max {
745 $_[0]{rbuf_max} = $_[1]; 772 $_[0]{rbuf_max} = $_[1];
746} 773}
747 774
775sub wbuf_max {
776 $_[0]{wbuf_max} = $_[1];
777}
778
748############################################################################# 779#############################################################################
749 780
750=item $handle->timeout ($seconds) 781=item $handle->timeout ($seconds)
751 782
752=item $handle->rtimeout ($seconds) 783=item $handle->rtimeout ($seconds)
753 784
754=item $handle->wtimeout ($seconds) 785=item $handle->wtimeout ($seconds)
755 786
756Configures (or disables) the inactivity timeout. 787Configures (or disables) the inactivity timeout.
788
789The timeout will be checked instantly, so this method might destroy the
790handle before it returns.
757 791
758=item $handle->timeout_reset 792=item $handle->timeout_reset
759 793
760=item $handle->rtimeout_reset 794=item $handle->rtimeout_reset
761 795
870 if $cb && $self->{low_water_mark} >= (length $self->{wbuf}) + (length $self->{_tls_wbuf}); 904 if $cb && $self->{low_water_mark} >= (length $self->{wbuf}) + (length $self->{_tls_wbuf});
871} 905}
872 906
873=item $handle->push_write ($data) 907=item $handle->push_write ($data)
874 908
875Queues the given scalar to be written. You can push as much data as you 909Queues the given scalar to be written. You can push as much data as
876want (only limited by the available memory), as C<AnyEvent::Handle> 910you want (only limited by the available memory and C<wbuf_max>), as
877buffers it independently of the kernel. 911C<AnyEvent::Handle> buffers it independently of the kernel.
878 912
879This method may invoke callbacks (and therefore the handle might be 913This method may invoke callbacks (and therefore the handle might be
880destroyed after it returns). 914destroyed after it returns).
881 915
882=cut 916=cut
910 $cb->() unless $self->{autocork}; 944 $cb->() unless $self->{autocork};
911 945
912 # if still data left in wbuf, we need to poll 946 # if still data left in wbuf, we need to poll
913 $self->{_ww} = AE::io $self->{fh}, 1, $cb 947 $self->{_ww} = AE::io $self->{fh}, 1, $cb
914 if length $self->{wbuf}; 948 if length $self->{wbuf};
949
950 if (
951 defined $self->{wbuf_max}
952 && $self->{wbuf_max} < length $self->{wbuf}
953 ) {
954 $self->_error (Errno::ENOSPC, 1), return;
955 }
915 }; 956 };
916} 957}
917 958
918our %WH; 959our %WH;
919 960
1054before it was actually written. One way to do that is to replace your 1095before it was actually written. One way to do that is to replace your
1055C<on_drain> handler by a callback that shuts down the socket (and set 1096C<on_drain> handler by a callback that shuts down the socket (and set
1056C<low_water_mark> to C<0>). This method is a shorthand for just that, and 1097C<low_water_mark> to C<0>). This method is a shorthand for just that, and
1057replaces the C<on_drain> callback with: 1098replaces the C<on_drain> callback with:
1058 1099
1059 sub { shutdown $_[0]{fh}, 1 } # for push_shutdown 1100 sub { shutdown $_[0]{fh}, 1 }
1060 1101
1061This simply shuts down the write side and signals an EOF condition to the 1102This simply shuts down the write side and signals an EOF condition to the
1062the peer. 1103the peer.
1063 1104
1064You can rely on the normal read queue and C<on_eof> handling 1105You can rely on the normal read queue and C<on_eof> handling
1740Note that AnyEvent::Handle will automatically C<start_read> for you when 1781Note that AnyEvent::Handle will automatically C<start_read> for you when
1741you change the C<on_read> callback or push/unshift a read callback, and it 1782you change the C<on_read> callback or push/unshift a read callback, and it
1742will automatically C<stop_read> for you when neither C<on_read> is set nor 1783will automatically C<stop_read> for you when neither C<on_read> is set nor
1743there are any read requests in the queue. 1784there are any read requests in the queue.
1744 1785
1745These methods will have no effect when in TLS mode (as TLS doesn't support 1786In older versions of this module (<= 5.3), these methods had no effect,
1746half-duplex connections). 1787as TLS does not support half-duplex connections. In current versions they
1788work as expected, as this behaviour is required to avoid certain resource
1789attacks, where the program would be forced to read (and buffer) arbitrary
1790amounts of data before being able to send some data. The drawback is that
1791some readings of the the SSL/TLS specifications basically require this
1792attack to be working, as SSL/TLS implementations might stall sending data
1793during a rehandshake.
1794
1795As a guideline, during the initial handshake, you should not stop reading,
1796and as a client, it might cause problems, depending on your applciation.
1747 1797
1748=cut 1798=cut
1749 1799
1750sub stop_read { 1800sub stop_read {
1751 my ($self) = @_; 1801 my ($self) = @_;
1752 1802
1753 delete $self->{_rw} unless $self->{tls}; 1803 delete $self->{_rw};
1754} 1804}
1755 1805
1756sub start_read { 1806sub start_read {
1757 my ($self) = @_; 1807 my ($self) = @_;
1758 1808
1960 Net::SSLeay::CTX_set_mode ($tls, 1|2); 2010 Net::SSLeay::CTX_set_mode ($tls, 1|2);
1961 2011
1962 $self->{_rbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ()); 2012 $self->{_rbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());
1963 $self->{_wbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ()); 2013 $self->{_wbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());
1964 2014
1965 Net::SSLeay::BIO_write ($self->{_rbio}, delete $self->{rbuf}); 2015 Net::SSLeay::BIO_write ($self->{_rbio}, $self->{rbuf});
2016 $self->{rbuf} = "";
1966 2017
1967 Net::SSLeay::set_bio ($tls, $self->{_rbio}, $self->{_wbio}); 2018 Net::SSLeay::set_bio ($tls, $self->{_rbio}, $self->{_wbio});
1968 2019
1969 $self->{_on_starttls} = sub { $_[0]{on_starttls}(@_) } 2020 $self->{_on_starttls} = sub { $_[0]{on_starttls}(@_) }
1970 if $self->{on_starttls}; 2021 if $self->{on_starttls};
2007 $self->{tls_ctx}->_put_session (delete $self->{tls}) 2058 $self->{tls_ctx}->_put_session (delete $self->{tls})
2008 if $self->{tls} > 0; 2059 if $self->{tls} > 0;
2009 2060
2010 delete @$self{qw(_rbio _wbio _tls_wbuf _on_starttls)}; 2061 delete @$self{qw(_rbio _wbio _tls_wbuf _on_starttls)};
2011} 2062}
2063
2064=item $handle->resettls
2065
2066This rarely-used method simply resets and TLS state on the handle, usually
2067causing data loss.
2068
2069One case where it may be useful is when you want to skip over the data in
2070the stream but you are not interested in interpreting it, so data loss is
2071no concern.
2072
2073=cut
2074
2075*resettls = \&_freetls;
2012 2076
2013sub DESTROY { 2077sub DESTROY {
2014 my ($self) = @_; 2078 my ($self) = @_;
2015 2079
2016 &_freetls; 2080 &_freetls;
2132 2196
2133It is only safe to "forget" the reference inside EOF or error callbacks, 2197It is only safe to "forget" the reference inside EOF or error callbacks,
2134from within all other callbacks, you need to explicitly call the C<< 2198from within all other callbacks, you need to explicitly call the C<<
2135->destroy >> method. 2199->destroy >> method.
2136 2200
2201=item Why is my C<on_eof> callback never called?
2202
2203Probably because your C<on_error> callback is being called instead: When
2204you have outstanding requests in your read queue, then an EOF is
2205considered an error as you clearly expected some data.
2206
2207To avoid this, make sure you have an empty read queue whenever your handle
2208is supposed to be "idle" (i.e. connection closes are O.K.). You cna set
2209an C<on_read> handler that simply pushes the first read requests in the
2210queue.
2211
2212See also the next question, which explains this in a bit more detail.
2213
2214=item How can I serve requests in a loop?
2215
2216Most protocols consist of some setup phase (authentication for example)
2217followed by a request handling phase, where the server waits for requests
2218and handles them, in a loop.
2219
2220There are two important variants: The first (traditional, better) variant
2221handles requests until the server gets some QUIT command, causing it to
2222close the connection first (highly desirable for a busy TCP server). A
2223client dropping the connection is an error, which means this variant can
2224detect an unexpected detection close.
2225
2226To handle this case, always make sure you have a on-empty read queue, by
2227pushing the "read request start" handler on it:
2228
2229 # we assume a request starts with a single line
2230 my @start_request; @start_request = (line => sub {
2231 my ($hdl, $line) = @_;
2232
2233 ... handle request
2234
2235 # push next request read, possibly from a nested callback
2236 $hdl->push_read (@start_request);
2237 });
2238
2239 # auth done, now go into request handling loop
2240 # now push the first @start_request
2241 $hdl->push_read (@start_request);
2242
2243By always having an outstanding C<push_read>, the handle always expects
2244some data and raises the C<EPIPE> error when the connction is dropped
2245unexpectedly.
2246
2247The second variant is a protocol where the client can drop the connection
2248at any time. For TCP, this means that the server machine may run out of
2249sockets easier, and in general, it means you cnanot distinguish a protocl
2250failure/client crash from a normal connection close. Nevertheless, these
2251kinds of protocols are common (and sometimes even the best solution to the
2252problem).
2253
2254Having an outstanding read request at all times is possible if you ignore
2255C<EPIPE> errors, but this doesn't help with when the client drops the
2256connection during a request, which would still be an error.
2257
2258A better solution is to push the initial request read in an C<on_read>
2259callback. This avoids an error, as when the server doesn't expect data
2260(i.e. is idly waiting for the next request, an EOF will not raise an
2261error, but simply result in an C<on_eof> callback. It is also a bit slower
2262and simpler:
2263
2264 # auth done, now go into request handling loop
2265 $hdl->on_read (sub {
2266 my ($hdl) = @_;
2267
2268 # called each time we receive data but the read queue is empty
2269 # simply start read the request
2270
2271 $hdl->push_read (line => sub {
2272 my ($hdl, $line) = @_;
2273
2274 ... handle request
2275
2276 # do nothing special when the request has been handled, just
2277 # let the request queue go empty.
2278 });
2279 });
2280
2137=item I get different callback invocations in TLS mode/Why can't I pause 2281=item I get different callback invocations in TLS mode/Why can't I pause
2138reading? 2282reading?
2139 2283
2140Unlike, say, TCP, TLS connections do not consist of two independent 2284Unlike, say, TCP, TLS connections do not consist of two independent
2141communication channels, one for each direction. Or put differently, the 2285communication channels, one for each direction. Or put differently, the
2161 $handle->on_read (sub { }); 2305 $handle->on_read (sub { });
2162 $handle->on_eof (undef); 2306 $handle->on_eof (undef);
2163 $handle->on_error (sub { 2307 $handle->on_error (sub {
2164 my $data = delete $_[0]{rbuf}; 2308 my $data = delete $_[0]{rbuf};
2165 }); 2309 });
2310
2311Note that this example removes the C<rbuf> member from the handle object,
2312which is not normally allowed by the API. It is expressly permitted in
2313this case only, as the handle object needs to be destroyed afterwards.
2166 2314
2167The reason to use C<on_error> is that TCP connections, due to latencies 2315The reason to use C<on_error> is that TCP connections, due to latencies
2168and packets loss, might get closed quite violently with an error, when in 2316and packets loss, might get closed quite violently with an error, when in
2169fact all data has been received. 2317fact all data has been received.
2170 2318

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines