ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/AnyEvent/lib/AnyEvent/Socket.pm
(Generate patch)

Comparing AnyEvent/lib/AnyEvent/Socket.pm (file contents):
Revision 1.17 by root, Sat May 24 02:50:45 2008 UTC vs.
Revision 1.154 by root, Mon Jun 25 11:04:09 2012 UTC

1=head1 NAME 1=head1 NAME
2 2
3AnyEvent::Socket - useful IPv4 and IPv6 stuff. 3AnyEvent::Socket - useful IPv4 and IPv6 stuff. also unix domain sockets. and stuff.
4 4
5=head1 SYNOPSIS 5=head1 SYNOPSIS
6 6
7 use AnyEvent::Socket; 7 use AnyEvent::Socket;
8
9 tcp_connect "gameserver.deliantra.net", 13327, sub {
10 my ($fh) = @_
11 or die "gameserver.deliantra.net connect failed: $!";
12
13 # enjoy your filehandle
14 };
15
16 # a simple tcp server
17 tcp_server undef, 8888, sub {
18 my ($fh, $host, $port) = @_;
19
20 syswrite $fh, "The internet is full, $host:$port. Go away!\015\012";
21 };
8 22
9=head1 DESCRIPTION 23=head1 DESCRIPTION
10 24
11This module implements various utility functions for handling internet 25This module implements various utility functions for handling internet
12protocol addresses and sockets, in an as transparent and simple way as 26protocol addresses and sockets, in an as transparent and simple way as
19 33
20=cut 34=cut
21 35
22package AnyEvent::Socket; 36package AnyEvent::Socket;
23 37
24no warnings;
25use strict;
26
27use Carp (); 38use Carp ();
28use Errno (); 39use Errno ();
29use Socket (); 40use Socket qw(AF_INET AF_UNIX SOCK_STREAM SOCK_DGRAM SOL_SOCKET SO_REUSEADDR);
30 41
31use AnyEvent (); 42use AnyEvent (); BEGIN { AnyEvent::common_sense }
32use AnyEvent::Util qw(guard fh_nonblocking); 43use AnyEvent::Util qw(guard fh_nonblocking AF_INET6);
33use AnyEvent::DNS (); 44use AnyEvent::DNS ();
34 45
35use base 'Exporter'; 46use base 'Exporter';
36 47
37BEGIN { 48our @EXPORT = qw(
38 *socket_inet_aton = \&Socket::inet_aton; # take a copy, in case Coro::LWP overrides it 49 getprotobyname
39} 50 parse_hostport format_hostport
51 parse_ipv4 parse_ipv6
52 parse_ip parse_address
53 format_ipv4 format_ipv6
54 format_ip format_address
55 address_family
56 inet_aton
57 tcp_server
58 tcp_connect
59);
40 60
41BEGIN { 61our $VERSION = $AnyEvent::VERSION;
42 my $af_inet6 = eval { &Socket::AF_INET6 };
43 eval "sub AF_INET6() { $af_inet6 }"; die if $@;
44
45 delete $AnyEvent::PROTOCOL{ipv6} unless $af_inet6;
46}
47
48our @EXPORT = qw(parse_ipv4 parse_ipv6 parse_ip format_ip inet_aton tcp_server tcp_connect);
49
50our $VERSION = '1.0';
51 62
52=item $ipn = parse_ipv4 $dotted_quad 63=item $ipn = parse_ipv4 $dotted_quad
53 64
54Tries to parse the given dotted quad IPv4 address and return it in 65Tries to parse the given dotted quad IPv4 address and return it in
55octet form (or undef when it isn't in a parsable format). Supports all 66octet form (or undef when it isn't in a parsable format). Supports all
67 78
68 # check leading parts against range 79 # check leading parts against range
69 return undef if grep $_ >= 256, @_[0 .. @_ - 2]; 80 return undef if grep $_ >= 256, @_[0 .. @_ - 2];
70 81
71 # check trailing part against range 82 # check trailing part against range
72 return undef if $_[-1] >= 1 << (8 * (4 - $#_)); 83 return undef if $_[-1] >= 2 ** (8 * (4 - $#_));
73 84
74 pack "N", (pop) 85 pack "N", (pop)
75 + ($_[0] << 24) 86 + ($_[0] << 24)
76 + ($_[1] << 16) 87 + ($_[1] << 16)
77 + ($_[2] << 8); 88 + ($_[2] << 8);
81 92
82Tries to parse the given IPv6 address and return it in 93Tries to parse the given IPv6 address and return it in
83octet form (or undef when it isn't in a parsable format). 94octet form (or undef when it isn't in a parsable format).
84 95
85Should support all forms specified by RFC 2373 (and additionally all IPv4 96Should support all forms specified by RFC 2373 (and additionally all IPv4
86forms supported by parse_ipv4). 97forms supported by parse_ipv4). Note that scope-id's are not supported
98(and will not parse).
87 99
88This function works similarly to C<inet_pton AF_INET6, ...>. 100This function works similarly to C<inet_pton AF_INET6, ...>.
101
102Example:
103
104 print unpack "H*", parse_ipv6 "2002:5345::10.0.0.1";
105 # => 2002534500000000000000000a000001
89 106
90=cut 107=cut
91 108
92sub parse_ipv6($) { 109sub parse_ipv6($) {
93 # quick test to avoid longer processing 110 # quick test to avoid longer processing
124 141
125 # and done 142 # and done
126 pack "n*", map hex, @h, @t 143 pack "n*", map hex, @h, @t
127} 144}
128 145
129=item $ipn = parse_ip $text 146=item $token = parse_unix $hostname
130 147
148This fucntion exists mainly for symmetry to the other C<parse_protocol>
149functions - it takes a hostname and, if it is C<unix/>, it returns a
150special address token, otherwise C<undef>.
151
152The only use for this function is probably to detect whether a hostname
153matches whatever AnyEvent uses for unix domain sockets.
154
155=cut
156
157sub parse_unix($) {
158 $_[0] eq "unix/"
159 ? pack "S", AF_UNIX
160 : undef
161
162}
163
164=item $ipn = parse_address $ip
165
131Combines C<parse_ipv4> and C<parse_ipv6> in one function. 166Combines C<parse_ipv4> and C<parse_ipv6> in one function. The address
167here refers to the host address (not socket address) in network form
168(binary).
132 169
133=cut 170If the C<$text> is C<unix/>, then this function returns a special token
171recognised by the other functions in this module to mean "UNIX domain
172socket".
134 173
174If the C<$text> to parse is a mapped IPv4 in IPv6 address (:ffff::<ipv4>),
175then it will be treated as an IPv4 address. If you don't want that, you
176have to call C<parse_ipv4> and/or C<parse_ipv6> manually.
177
178Example:
179
180 print unpack "H*", parse_address "10.1.2.3";
181 # => 0a010203
182
183=item $ipn = AnyEvent::Socket::aton $ip
184
185Same as C<parse_address>, but not exported (think C<Socket::inet_aton> but
186I<without> name resolution).
187
188=cut
189
135sub parse_ip($) { 190sub parse_address($) {
136 &parse_ipv4 || &parse_ipv6 191 for (&parse_ipv6) {
192 if ($_) {
193 s/^\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff//;
194 return $_;
195 } else {
196 return &parse_ipv4 || &parse_unix
197 }
198 }
137} 199}
138 200
201*aton = \&parse_address;
202
203=item ($name, $aliases, $proto) = getprotobyname $name
204
205Works like the builtin function of the same name, except it tries hard to
206work even on broken platforms (well, that's windows), where getprotobyname
207is traditionally very unreliable.
208
209Example: get the protocol number for TCP (usually 6)
210
211 my $proto = getprotobyname "tcp";
212
213=cut
214
215# microsoft can't even get getprotobyname working (the etc/protocols file
216# gets lost fairly often on windows), so we have to hardcode some common
217# protocol numbers ourselves.
218our %PROTO_BYNAME;
219
220$PROTO_BYNAME{tcp} = Socket::IPPROTO_TCP () if defined &Socket::IPPROTO_TCP;
221$PROTO_BYNAME{udp} = Socket::IPPROTO_UDP () if defined &Socket::IPPROTO_UDP;
222$PROTO_BYNAME{icmp} = Socket::IPPROTO_ICMP() if defined &Socket::IPPROTO_ICMP;
223
224sub getprotobyname($) {
225 my $name = lc shift;
226
227 defined (my $proton = $PROTO_BYNAME{$name} || (getprotobyname $name)[2])
228 or return;
229
230 ($name, uc $name, $proton)
231}
232
233=item ($host, $service) = parse_hostport $string[, $default_service]
234
235Splitting a string of the form C<hostname:port> is a common
236problem. Unfortunately, just splitting on the colon makes it hard to
237specify IPv6 addresses and doesn't support the less common but well
238standardised C<[ip literal]> syntax.
239
240This function tries to do this job in a better way, it supports (at
241least) the following formats, where C<port> can be a numerical port
242number of a service name, or a C<name=port> string, and the C< port> and
243C<:port> parts are optional. Also, everywhere where an IP address is
244supported a hostname or unix domain socket address is also supported (see
245C<parse_unix>), and strings starting with C</> will also be interpreted as
246unix domain sockets.
247
248 hostname:port e.g. "www.linux.org", "www.x.de:443", "www.x.de:https=443",
249 ipv4:port e.g. "198.182.196.56", "127.1:22"
250 ipv6 e.g. "::1", "affe::1"
251 [ipv4or6]:port e.g. "[::1]", "[10.0.1]:80"
252 [ipv4or6] port e.g. "[127.0.0.1]", "[www.x.org] 17"
253 ipv4or6 port e.g. "::1 443", "10.0.0.1 smtp"
254 unix/:path e.g. "unix/:/path/to/socket"
255 /path e.g. "/path/to/socket"
256
257It also supports defaulting the service name in a simple way by using
258C<$default_service> if no service was detected. If neither a service was
259detected nor a default was specified, then this function returns the
260empty list. The same happens when a parse error was detected, such as a
261hostname with a colon in it (the function is rather conservative, though).
262
263Example:
264
265 print join ",", parse_hostport "localhost:443";
266 # => "localhost,443"
267
268 print join ",", parse_hostport "localhost", "https";
269 # => "localhost,https"
270
271 print join ",", parse_hostport "[::1]";
272 # => "," (empty list)
273
274 print join ",", parse_host_port "/tmp/debug.sock";
275 # => "unix/", "/tmp/debug.sock"
276
277=cut
278
279sub parse_hostport($;$) {
280 my ($host, $port);
281
282 for ("$_[0]") { # work on a copy, just in case, and also reset pos
283
284 # shortcut for /path
285 return ("unix/", $_)
286 if m%^/%;
287
288 # parse host, special cases: "ipv6" or "ipv6[#p ]port"
289 unless (
290 ($host) = /^\s* ([0-9a-fA-F:]*:[0-9a-fA-F:]*:[0-9a-fA-F\.:]*)/xgc
291 and parse_ipv6 $host
292 ) {
293 /^\s*/xgc;
294
295 if (/^ \[ ([^\[\]]+) \]/xgc) {
296 $host = $1;
297 } elsif (/^ ([^\[\]:\ ]+) /xgc) {
298 $host = $1;
299 } else {
300 return;
301 }
302 }
303
304 # parse port
305 if (/\G (?:\s+|:|\#) ([^:[:space:]]+) \s*$/xgc) {
306 $port = $1;
307 } elsif (/\G\s*$/gc && length $_[1]) {
308 $port = $_[1];
309 } else {
310 return;
311 }
312
313 }
314
315 # hostnames must not contain :'s
316 return if $host =~ /:/ && !parse_ipv6 $host;
317
318 ($host, $port)
319}
320
321=item $string = format_hostport $host, $port
322
323Takes a host (in textual form) and a port and formats in unambigiously in
324a way that C<parse_hostport> can parse it again. C<$port> can be C<undef>.
325
326=cut
327
328sub format_hostport($;$) {
329 my ($host, $port) = @_;
330
331 $port = ":$port" if length $port;
332 $host = "[$host]" if $host =~ /:/;
333
334 "$host$port"
335}
336
337=item $sa_family = address_family $ipn
338
339Returns the address family/protocol-family (AF_xxx/PF_xxx, in one value :)
340of the given host address in network format.
341
342=cut
343
344sub address_family($) {
345 4 == length $_[0]
346 ? AF_INET
347 : 16 == length $_[0]
348 ? AF_INET6
349 : unpack "S", $_[0]
350}
351
139=item $text = format_ip $ipn 352=item $text = format_ipv4 $ipn
140 353
141Takes either an IPv4 address (4 octets) or and IPv6 address (16 octets) 354Expects a four octet string representing a binary IPv4 address and returns
355its textual format. Rarely used, see C<format_address> for a nicer
356interface.
357
358=item $text = format_ipv6 $ipn
359
360Expects a sixteen octet string representing a binary IPv6 address and
361returns its textual format. Rarely used, see C<format_address> for a
362nicer interface.
363
364=item $text = format_address $ipn
365
366Covnvert a host address in network format (e.g. 4 octets for IPv4 or 16
142and converts it into textual form. 367octets for IPv6) and convert it into textual form.
368
369Returns C<unix/> for UNIX domain sockets.
143 370
144This function works similarly to C<inet_ntop AF_INET || AF_INET6, ...>, 371This function works similarly to C<inet_ntop AF_INET || AF_INET6, ...>,
145except it automatically detects the address type. 372except it automatically detects the address type.
146 373
147=cut 374Returns C<undef> if it cannot detect the type.
148 375
149sub format_ip; 376If the C<$ipn> is a mapped IPv4 in IPv6 address (:ffff::<ipv4>), then just
377the contained IPv4 address will be returned. If you do not want that, you
378have to call C<format_ipv6> manually.
379
380Example:
381
382 print format_address "\x01\x02\x03\x05";
383 => 1.2.3.5
384
385=item $text = AnyEvent::Socket::ntoa $ipn
386
387Same as format_address, but not exported (think C<inet_ntoa>).
388
389=cut
390
150sub format_ip($) { 391sub format_ipv4($) {
392 join ".", unpack "C4", $_[0]
393}
394
395sub format_ipv6($) {
396 if ($_[0] =~ /^\x00\x00\x00\x00\x00\x00\x00\x00/) {
397 if (v0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 eq $_[0]) {
398 return "::";
399 } elsif (v0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1 eq $_[0]) {
400 return "::1";
401 } elsif (v0.0.0.0.0.0.0.0.0.0.0.0 eq substr $_[0], 0, 12) {
402 # v4compatible
403 return "::" . format_ipv4 substr $_[0], 12;
404 } elsif (v0.0.0.0.0.0.0.0.0.0.255.255 eq substr $_[0], 0, 12) {
405 # v4mapped
406 return "::ffff:" . format_ipv4 substr $_[0], 12;
407 } elsif (v0.0.0.0.0.0.0.0.255.255.0.0 eq substr $_[0], 0, 12) {
408 # v4translated
409 return "::ffff:0:" . format_ipv4 substr $_[0], 12;
410 }
411 }
412
413 my $ip = sprintf "%x:%x:%x:%x:%x:%x:%x:%x", unpack "n8", $_[0];
414
415 # this is admittedly rather sucky
416 $ip =~ s/(?:^|:) 0:0:0:0:0:0:0 (?:$|:)/::/x
417 or $ip =~ s/(?:^|:) 0:0:0:0:0:0 (?:$|:)/::/x
418 or $ip =~ s/(?:^|:) 0:0:0:0:0 (?:$|:)/::/x
419 or $ip =~ s/(?:^|:) 0:0:0:0 (?:$|:)/::/x
420 or $ip =~ s/(?:^|:) 0:0:0 (?:$|:)/::/x
421 or $ip =~ s/(?:^|:) 0:0 (?:$|:)/::/x
422 or $ip =~ s/(?:^|:) 0 (?:$|:)/::/x;
423
424 $ip
425}
426
427sub format_address($) {
151 if (4 == length $_[0]) { 428 if (4 == length $_[0]) {
152 return join ".", unpack "C4", $_[0] 429 return &format_ipv4;
153 } elsif (16 == length $_[0]) { 430 } elsif (16 == length $_[0]) {
154 if (v0.0.0.0.0.0.0.0.0.0.255.255 eq substr $_[0], 0, 12) { 431 return $_[0] =~ /^\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff(....)$/s
155 # v4mapped 432 ? format_ipv4 $1
156 return "::ffff:" . format_ip substr $_[0], 12; 433 : &format_ipv6;
157 } else { 434 } elsif (AF_UNIX == address_family $_[0]) {
158 my $ip = sprintf "%x:%x:%x:%x:%x:%x:%x:%x", unpack "n8", $_[0]; 435 return "unix/"
159
160 $ip =~ s/^0:(?:0:)*/::/
161 or $ip =~ s/(:0)+$/::/
162 or $ip =~ s/(:0)+/:/;
163 return $ip
164 }
165 } else { 436 } else {
166 return undef 437 return undef
167 } 438 }
168} 439}
169 440
441*ntoa = \&format_address;
442
170=item inet_aton $name_or_address, $cb->(@addresses) 443=item inet_aton $name_or_address, $cb->(@addresses)
171 444
172Works similarly to its Socket counterpart, except that it uses a 445Works similarly to its Socket counterpart, except that it uses a
173callback. Also, if a host has only an IPv6 address, this might be passed 446callback. Use the length to distinguish between ipv4 and ipv6 (4 octets
174to the callback instead (use the length to detect this - 4 for IPv4, 16 447for IPv4, 16 for IPv6), or use C<format_address> to convert it to a more
175for IPv6). 448readable format.
176 449
177Unlike the L<Socket> function of the same name, you can get multiple IPv4 450Note that C<resolve_sockaddr>, while initially a more complex interface,
178and IPv6 addresses as result. 451resolves host addresses, IDNs, service names and SRV records and gives you
452an ordered list of socket addresses to try and should be preferred over
453C<inet_aton>.
454
455Example.
456
457 inet_aton "www.google.com", my $cv = AE::cv;
458 say unpack "H*", $_
459 for $cv->recv;
460 # => d155e363
461 # => d155e367 etc.
462
463 inet_aton "ipv6.google.com", my $cv = AE::cv;
464 say unpack "H*", $_
465 for $cv->recv;
466 # => 20014860a00300000000000000000068
179 467
180=cut 468=cut
181 469
182sub inet_aton { 470sub inet_aton {
183 my ($name, $cb) = @_; 471 my ($name, $cb) = @_;
187 } elsif (my $ipn = &parse_ipv6) { 475 } elsif (my $ipn = &parse_ipv6) {
188 $cb->($ipn); 476 $cb->($ipn);
189 } elsif ($name eq "localhost") { # rfc2606 et al. 477 } elsif ($name eq "localhost") { # rfc2606 et al.
190 $cb->(v127.0.0.1, v0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1); 478 $cb->(v127.0.0.1, v0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1);
191 } else { 479 } else {
192 require AnyEvent::DNS; 480 require AnyEvent::DNS unless $AnyEvent::DNS::VERSION;
193 481
194 # simple, bad suboptimal algorithm 482 my $ipv4 = $AnyEvent::PROTOCOL{ipv4};
483 my $ipv6 = $AnyEvent::PROTOCOL{ipv6};
484
485 my @res;
486
487 my $cv = AE::cv {
488 $cb->(map @$_, reverse @res);
489 };
490
491 $cv->begin;
492
493 if ($ipv4) {
494 $cv->begin;
195 AnyEvent::DNS::a ($name, sub { 495 AnyEvent::DNS::a ($name, sub {
196 if (@_) { 496 $res[$ipv4] = [map &parse_ipv4, @_];
197 $cb->(map +(parse_ipv4 $_), @_);
198 } else {
199 $cb->(); 497 $cv->end;
200 #AnyEvent::DNS::aaaa ($name, $cb); need inet_pton
201 } 498 });
202 }); 499 };
203 }
204}
205 500
501 if ($ipv6) {
502 $cv->begin;
503 AnyEvent::DNS::aaaa ($name, sub {
504 $res[$ipv6] = [map &parse_ipv6, @_];
505 $cv->end;
506 });
507 };
508
509 $cv->end;
510 }
511}
512
513BEGIN {
514 *sockaddr_family = $Socket::VERSION >= 1.75
515 ? \&Socket::sockaddr_family
516 : # for 5.6.x, we need to do something much more horrible
517 (Socket::pack_sockaddr_in 0x5555, "\x55\x55\x55\x55"
518 | eval { Socket::pack_sockaddr_un "U" }) =~ /^\x00/
519 ? sub { unpack "xC", $_[0] }
520 : sub { unpack "S" , $_[0] };
521}
522
523# check for broken platforms with an extra field in sockaddr structure
524# kind of a rfc vs. bsd issue, as usual (ok, normally it's a
525# unix vs. bsd issue, a iso C vs. bsd issue or simply a
526# correctness vs. bsd issue.)
527my $pack_family = 0x55 == sockaddr_family ("\x55\x55")
528 ? "xC" : "S";
529
206=item $sa = AnyEvent::Socket::pack_sockaddr $port, $host 530=item $sa = AnyEvent::Socket::pack_sockaddr $service, $host
207 531
208Pack the given port/host combination into a binary sockaddr structure. Handles 532Pack the given port/host combination into a binary sockaddr
209both IPv4 and IPv6 host addresses. 533structure. Handles both IPv4 and IPv6 host addresses, as well as UNIX
534domain sockets (C<$host> == C<unix/> and C<$service> == absolute
535pathname).
536
537Example:
538
539 my $bind = AnyEvent::Socket::pack_sockaddr 43, v195.234.53.120;
540 bind $socket, $bind
541 or die "bind: $!";
210 542
211=cut 543=cut
212 544
213sub pack_sockaddr($$) { 545sub pack_sockaddr($$) {
214 if (4 == length $_[1]) { 546 my $af = address_family $_[1];
547
548 if ($af == AF_INET) {
215 Socket::pack_sockaddr_in $_[0], $_[1] 549 Socket::pack_sockaddr_in $_[0], $_[1]
216 } elsif (16 == length $_[1]) { 550 } elsif ($af == AF_INET6) {
217 pack "SnL a16 L", 551 pack "$pack_family nL a16 L",
218 Socket::AF_INET6, 552 AF_INET6,
219 $_[0], # port 553 $_[0], # port
220 0, # flowinfo 554 0, # flowinfo
221 $_[1], # addr 555 $_[1], # addr
222 0 # scope id 556 0 # scope id
557 } elsif ($af == AF_UNIX) {
558 Socket::pack_sockaddr_un $_[0]
223 } else { 559 } else {
224 Carp::croak "pack_sockaddr: invalid host"; 560 Carp::croak "pack_sockaddr: invalid host";
225 } 561 }
226} 562}
227 563
228=item ($port, $host) = AnyEvent::Socket::unpack_sockaddr $sa 564=item ($service, $host) = AnyEvent::Socket::unpack_sockaddr $sa
229 565
230Unpack the given binary sockaddr structure (as used by bind, getpeername 566Unpack the given binary sockaddr structure (as used by bind, getpeername
231etc.) into a C<$port, $host> combination. 567etc.) into a C<$service, $host> combination.
232 568
233Handles both IPv4 and IPv6 sockaddr structures. 569For IPv4 and IPv6, C<$service> is the port number and C<$host> the host
570address in network format (binary).
234 571
572For UNIX domain sockets, C<$service> is the absolute pathname and C<$host>
573is a special token that is understood by the other functions in this
574module (C<format_address> converts it to C<unix/>).
575
235=cut 576=cut
577
578# perl contains a bug (imho) where it requires that the kernel always returns
579# sockaddr_un structures of maximum length (which is not, AFAICS, required
580# by any standard). try to 0-pad structures for the benefit of those platforms.
581
582my $sa_un_zero = eval { Socket::pack_sockaddr_un "" }; $sa_un_zero ^= $sa_un_zero;
236 583
237sub unpack_sockaddr($) { 584sub unpack_sockaddr($) {
238 my $af = unpack "S", $_[0]; 585 my $af = sockaddr_family $_[0];
239 586
240 if ($af == &Socket::AF_INET) { 587 if ($af == AF_INET) {
241 Socket::unpack_sockaddr_in $_[0] 588 Socket::unpack_sockaddr_in $_[0]
242 } elsif ($af == AF_INET6) { 589 } elsif ($af == AF_INET6) {
243 (unpack "SnL a16 L")[1, 3] 590 unpack "x2 n x4 a16", $_[0]
591 } elsif ($af == AF_UNIX) {
592 ((Socket::unpack_sockaddr_un $_[0] ^ $sa_un_zero), pack "S", AF_UNIX)
244 } else { 593 } else {
245 Carp::croak "unpack_sockaddr: unsupported protocol family $af"; 594 Carp::croak "unpack_sockaddr: unsupported protocol family $af";
246 } 595 }
247} 596}
248 597
249sub _tcp_port($) { 598=item resolve_sockaddr $node, $service, $proto, $family, $type, $cb->([$family, $type, $proto, $sockaddr], ...)
250 $_[0] =~ /^(\d*)$/ and return $1*1;
251 599
252 (getservbyname $_[0], "tcp")[2] 600Tries to resolve the given nodename and service name into protocol families
601and sockaddr structures usable to connect to this node and service in a
602protocol-independent way. It works remotely similar to the getaddrinfo
603posix function.
604
605For internet addresses, C<$node> is either an IPv4 or IPv6 address, an
606internet hostname (DNS domain name or IDN), and C<$service> is either
607a service name (port name from F</etc/services>) or a numerical port
608number. If both C<$node> and C<$service> are names, then SRV records
609will be consulted to find the real service, otherwise they will be
610used as-is. If you know that the service name is not in your services
611database, then you can specify the service in the format C<name=port>
612(e.g. C<http=80>).
613
614If a host cannot be found via DNS, then it will be looked up in
615F</etc/hosts> (or the file specified via C<< $ENV{PERL_ANYEVENT_HOSTS}
616>>). If they are found, the addresses there will be used. The effect is as
617if entries from F</etc/hosts> would yield C<A> and C<AAAA> records for the
618host name unless DNS already had records for them.
619
620For UNIX domain sockets, C<$node> must be the string C<unix/> and
621C<$service> must be the absolute pathname of the socket. In this case,
622C<$proto> will be ignored.
623
624C<$proto> must be a protocol name, currently C<tcp>, C<udp> or
625C<sctp>. The default is currently C<tcp>, but in the future, this function
626might try to use other protocols such as C<sctp>, depending on the socket
627type and any SRV records it might find.
628
629C<$family> must be either C<0> (meaning any protocol is OK), C<4> (use
630only IPv4) or C<6> (use only IPv6). The default is influenced by
631C<$ENV{PERL_ANYEVENT_PROTOCOLS}>.
632
633C<$type> must be C<SOCK_STREAM>, C<SOCK_DGRAM> or C<SOCK_SEQPACKET> (or
634C<undef> in which case it gets automatically chosen to be C<SOCK_STREAM>
635unless C<$proto> is C<udp>).
636
637The callback will receive zero or more array references that contain
638C<$family, $type, $proto> for use in C<socket> and a binary
639C<$sockaddr> for use in C<connect> (or C<bind>).
640
641The application should try these in the order given.
642
643Example:
644
645 resolve_sockaddr "google.com", "http", 0, undef, undef, sub { ... };
646
647=cut
648
649our %HOSTS; # $HOSTS{$nodename}[$ipv6] = [@aliases...]
650our @HOSTS_CHECKING; # callbacks to call when hosts have been loaded
651our $HOSTS_MTIME;
652
653sub _parse_hosts($) {
654 %HOSTS = ();
655
656 for (split /\n/, $_[0]) {
657 s/#.*$//;
658 s/^[ \t]+//;
659 y/A-Z/a-z/;
660
661 my ($addr, @aliases) = split /[ \t]+/;
662 next unless @aliases;
663
664 if (my $ip = parse_ipv4 $addr) {
665 push @{ $HOSTS{$_}[0] }, $ip
666 for @aliases;
667 } elsif (my $ip = parse_ipv6 $addr) {
668 push @{ $HOSTS{$_}[1] }, $ip
669 for @aliases;
670 }
671 }
672}
673
674# helper function - unless dns delivered results, check and parse hosts, then clal continuation code
675sub _load_hosts_unless(&$@) {
676 my ($cont, $cv, @dns) = @_;
677
678 if (@dns) {
679 $cv->end;
680 } else {
681 my $etc_hosts = length $ENV{PERL_ANYEVENT_HOSTS} ? $ENV{PERL_ANYEVENT_HOSTS}
682 : AnyEvent::WIN32 ? "$ENV{SystemRoot}/system32/drivers/etc/hosts"
683 : "/etc/hosts";
684
685 push @HOSTS_CHECKING, sub {
686 $cont->();
687 $cv->end;
688 };
689
690 unless ($#HOSTS_CHECKING) {
691 # we are not the first, so we actually have to do the work
692 require AnyEvent::IO;
693
694 AnyEvent::IO::aio_stat ($etc_hosts, sub {
695 if ((stat _)[9] ne $HOSTS_MTIME) {
696 AE::log 8 => "(re)loading $etc_hosts.";
697 $HOSTS_MTIME = (stat _)[9];
698 # we might load a newer version of hosts,but that's a harmless race,
699 # as the next call will just load it again.
700 AnyEvent::IO::aio_load ($etc_hosts, sub {
701 _parse_hosts $_[0];
702 (shift @HOSTS_CHECKING)->() while @HOSTS_CHECKING;
703 });
704 } else {
705 (shift @HOSTS_CHECKING)->() while @HOSTS_CHECKING;
706 }
707 });
708 }
709 }
710}
711
712sub resolve_sockaddr($$$$$$) {
713 my ($node, $service, $proto, $family, $type, $cb) = @_;
714
715 if ($node eq "unix/") {
716 return $cb->() if $family || $service !~ /^\//; # no can do
717
718 return $cb->([AF_UNIX, defined $type ? $type : SOCK_STREAM, 0, Socket::pack_sockaddr_un $service]);
719 }
720
721 unless (AF_INET6) {
722 $family != 6
723 or return $cb->();
724
725 $family = 4;
726 }
727
728 $cb->() if $family == 4 && !$AnyEvent::PROTOCOL{ipv4};
729 $cb->() if $family == 6 && !$AnyEvent::PROTOCOL{ipv6};
730
731 $family ||= 4 unless $AnyEvent::PROTOCOL{ipv6};
732 $family ||= 6 unless $AnyEvent::PROTOCOL{ipv4};
733
734 $proto ||= "tcp";
735 $type ||= $proto eq "udp" ? SOCK_DGRAM : SOCK_STREAM;
736
737 my $proton = AnyEvent::Socket::getprotobyname $proto
253 or Carp::croak "$_[0]: service unknown" 738 or Carp::croak "$proto: protocol unknown";
739
740 my $port;
741
742 if ($service =~ /^(\S+)=(\d+)$/) {
743 ($service, $port) = ($1, $2);
744 } elsif ($service =~ /^\d+$/) {
745 ($service, $port) = (undef, $service);
746 } else {
747 $port = (getservbyname $service, $proto)[2]
748 or Carp::croak "$service/$proto: service unknown";
749 }
750
751 # resolve a records / provide sockaddr structures
752 my $resolve = sub {
753 my @target = @_;
754
755 my @res;
756 my $cv = AE::cv {
757 $cb->(
758 map $_->[2],
759 sort {
760 $AnyEvent::PROTOCOL{$b->[1]} <=> $AnyEvent::PROTOCOL{$a->[1]}
761 or $a->[0] <=> $b->[0]
762 }
763 @res
764 )
765 };
766
767 $cv->begin;
768 for my $idx (0 .. $#target) {
769 my ($node, $port) = @{ $target[$idx] };
770
771 if (my $noden = parse_address $node) {
772 my $af = address_family $noden;
773
774 if ($af == AF_INET && $family != 6) {
775 push @res, [$idx, "ipv4", [AF_INET, $type, $proton,
776 pack_sockaddr $port, $noden]]
777 }
778
779 if ($af == AF_INET6 && $family != 4) {
780 push @res, [$idx, "ipv6", [AF_INET6, $type, $proton,
781 pack_sockaddr $port, $noden]]
782 }
783 } else {
784 $node =~ y/A-Z/a-z/;
785
786 my $hosts = $HOSTS{$node};
787
788 # a records
789 if ($family != 6) {
790 $cv->begin;
791 AnyEvent::DNS::a $node, sub {
792 push @res, [$idx, "ipv4", [AF_INET , $type, $proton, pack_sockaddr $port, parse_ipv4 $_]]
793 for @_;
794
795 # dns takes precedence over hosts
796 _load_hosts_unless {
797 push @res,
798 map [$idx, "ipv4", [AF_INET , $type, $proton, pack_sockaddr $port, $_]],
799 @{ $HOSTS{$node}[0] };
800 } $cv, @_;
801 };
802 }
803
804 # aaaa records
805 if ($family != 4) {
806 $cv->begin;
807 AnyEvent::DNS::aaaa $node, sub {
808 push @res, [$idx, "ipv6", [AF_INET6, $type, $proton, pack_sockaddr $port, parse_ipv6 $_]]
809 for @_;
810
811 _load_hosts_unless {
812 push @res,
813 map [$idx + 0.5, "ipv6", [AF_INET6, $type, $proton, pack_sockaddr $port, $_]],
814 @{ $HOSTS{$node}[1] }
815 } $cv, @_;
816 };
817 }
818 }
819 }
820 $cv->end;
821 };
822
823 $node = AnyEvent::Util::idn_to_ascii $node
824 if $node =~ /[^\x00-\x7f]/;
825
826 # try srv records, if applicable
827 if ($node eq "localhost") {
828 $resolve->(["127.0.0.1", $port], ["::1", $port]);
829 } elsif (defined $service && !parse_address $node) {
830 AnyEvent::DNS::srv $service, $proto, $node, sub {
831 my (@srv) = @_;
832
833 if (@srv) {
834 # the only srv record has "." ("" here) => abort
835 $srv[0][2] ne "" || $#srv
836 or return $cb->();
837
838 # use srv records then
839 $resolve->(
840 map ["$_->[3].", $_->[2]],
841 grep $_->[3] ne ".",
842 @srv
843 );
844 } else {
845 # no srv records, continue traditionally
846 $resolve->([$node, $port]);
847 }
848 };
849 } else {
850 # most common case
851 $resolve->([$node, $port]);
852 }
254} 853}
255 854
256=item $guard = tcp_connect $host, $service, $connect_cb[, $prepare_cb] 855=item $guard = tcp_connect $host, $service, $connect_cb[, $prepare_cb]
257 856
258This is a convenience function that creates a TCP socket and makes a 100% 857This is a convenience function that creates a TCP socket and makes a
259non-blocking connect to the given C<$host> (which can be a hostname or a 858100% non-blocking connect to the given C<$host> (which can be a DNS/IDN
859hostname or a textual IP address, or the string C<unix/> for UNIX domain
260textual IP address) and C<$service> (which can be a numeric port number or 860sockets) and C<$service> (which can be a numeric port number or a service
261a service name, or a C<servicename=portnumber> string). 861name, or a C<servicename=portnumber> string, or the pathname to a UNIX
862domain socket).
262 863
263If both C<$host> and C<$port> are names, then this function will use SRV 864If both C<$host> and C<$port> are names, then this function will use SRV
264records to locate the real target(s). 865records to locate the real target(s).
265 866
266In either case, it will create a list of target hosts (e.g. for multihomed 867In either case, it will create a list of target hosts (e.g. for multihomed
267hosts or hosts with both IPv4 and IPv6 addresses) and try to connect to 868hosts or hosts with both IPv4 and IPv6 addresses) and try to connect to
268each in turn. 869each in turn.
269 870
270If the connect is successful, then the C<$connect_cb> will be invoked with 871After the connection is established, then the C<$connect_cb> will be
271the socket file handle (in non-blocking mode) as first and the peer host 872invoked with the socket file handle (in non-blocking mode) as first, and
272(as a textual IP address) and peer port as second and third arguments, 873the peer host (as a textual IP address) and peer port as second and third
273respectively. The fourth argument is a code reference that you can call 874arguments, respectively. The fourth argument is a code reference that you
274if, for some reason, you don't like this connection, which will cause 875can call if, for some reason, you don't like this connection, which will
275C<tcp_connect> to try the next one (or call your callback without any 876cause C<tcp_connect> to try the next one (or call your callback without
276arguments if there are no more connections). In most cases, you can simply 877any arguments if there are no more connections). In most cases, you can
277ignore this argument. 878simply ignore this argument.
278 879
279 $cb->($filehandle, $host, $port, $retry) 880 $cb->($filehandle, $host, $port, $retry)
280 881
281If the connect is unsuccessful, then the C<$connect_cb> will be invoked 882If the connect is unsuccessful, then the C<$connect_cb> will be invoked
282without any arguments and C<$!> will be set appropriately (with C<ENXIO> 883without any arguments and C<$!> will be set appropriately (with C<ENXIO>
283indicating a DNS resolution failure). 884indicating a DNS resolution failure).
284 885
886The callback will I<never> be invoked before C<tcp_connect> returns, even
887if C<tcp_connect> was able to connect immediately (e.g. on unix domain
888sockets).
889
285The file handle is perfect for being plugged into L<AnyEvent::Handle>, but 890The file handle is perfect for being plugged into L<AnyEvent::Handle>, but
286can be used as a normal perl file handle as well. 891can be used as a normal perl file handle as well.
287 892
288Unless called in void context, C<tcp_connect> returns a guard object that 893Unless called in void context, C<tcp_connect> returns a guard object that
289will automatically abort connecting when it gets destroyed (it does not do 894will automatically cancel the connection attempt when it gets destroyed
895- in which case the callback will not be invoked. Destroying it does not
290anything to the socket after the connect was successful). 896do anything to the socket after the connect was successful - you cannot
897"uncall" a callback that has been invoked already.
291 898
292Sometimes you need to "prepare" the socket before connecting, for example, 899Sometimes you need to "prepare" the socket before connecting, for example,
293to C<bind> it to some port, or you want a specific connect timeout that 900to C<bind> it to some port, or you want a specific connect timeout that
294is lower than your kernel's default timeout. In this case you can specify 901is lower than your kernel's default timeout. In this case you can specify
295a second callback, C<$prepare_cb>. It will be called with the file handle 902a second callback, C<$prepare_cb>. It will be called with the file handle
298timeout is to be used). 905timeout is to be used).
299 906
300Note that the socket could be either a IPv4 TCP socket or an IPv6 TCP 907Note that the socket could be either a IPv4 TCP socket or an IPv6 TCP
301socket (although only IPv4 is currently supported by this module). 908socket (although only IPv4 is currently supported by this module).
302 909
910Note to the poor Microsoft Windows users: Windows (of course) doesn't
911correctly signal connection errors, so unless your event library works
912around this, failed connections will simply hang. The only event libraries
913that handle this condition correctly are L<EV> and L<Glib>. Additionally,
914AnyEvent works around this bug with L<Event> and in its pure-perl
915backend. All other libraries cannot correctly handle this condition. To
916lessen the impact of this windows bug, a default timeout of 30 seconds
917will be imposed on windows. Cygwin is not affected.
918
303Simple Example: connect to localhost on port 22. 919Simple Example: connect to localhost on port 22.
304 920
305 tcp_connect localhost => 22, sub { 921 tcp_connect localhost => 22, sub {
306 my $fh = shift 922 my $fh = shift
307 or die "unable to connect: $!"; 923 or die "unable to connect: $!";
308 # do something 924 # do something
309 }; 925 };
310 926
311Complex Example: connect to www.google.com on port 80 and make a simple 927Complex Example: connect to www.google.com on port 80 and make a simple
312GET request without much error handling. Also limit the connection timeout 928GET request without much error handling. Also limit the connection timeout
313to 15 seconds. 929to 15 seconds.
314 930
318 or die "unable to connect: $!"; 934 or die "unable to connect: $!";
319 935
320 my $handle; # avoid direct assignment so on_eof has it in scope. 936 my $handle; # avoid direct assignment so on_eof has it in scope.
321 $handle = new AnyEvent::Handle 937 $handle = new AnyEvent::Handle
322 fh => $fh, 938 fh => $fh,
939 on_error => sub {
940 AE::log error => $_[2];
941 $_[0]->destroy;
942 },
323 on_eof => sub { 943 on_eof => sub {
324 undef $handle; # keep it alive till eof 944 $handle->destroy; # destroy handle
325 warn "done.\n"; 945 AE::log info => "Done.";
326 }; 946 };
327 947
328 $handle->push_write ("GET / HTTP/1.0\015\012\015\012"); 948 $handle->push_write ("GET / HTTP/1.0\015\012\015\012");
329 949
330 $handle->push_read_line ("\015\012\015\012", sub { 950 $handle->push_read (line => "\015\012\015\012", sub {
331 my ($handle, $line) = @_; 951 my ($handle, $line) = @_;
332 952
333 # print response header 953 # print response header
334 print "HEADER\n$line\n\nBODY\n"; 954 print "HEADER\n$line\n\nBODY\n";
335 955
344 # could call $fh->bind etc. here 964 # could call $fh->bind etc. here
345 965
346 15 966 15
347 }; 967 };
348 968
969Example: connect to a UNIX domain socket.
970
971 tcp_connect "unix/", "/tmp/.X11-unix/X0", sub {
972 ...
973 }
974
349=cut 975=cut
350 976
351sub tcp_connect($$$;$) { 977sub tcp_connect($$$;$) {
352 my ($host, $port, $connect, $prepare) = @_; 978 my ($host, $port, $connect, $prepare) = @_;
353 979
354 # see http://cr.yp.to/docs/connect.html for some background 980 # see http://cr.yp.to/docs/connect.html for some tricky aspects
981 # also http://advogato.org/article/672.html
355 982
356 my %state = ( fh => undef ); 983 my %state = ( fh => undef );
357 984
358 # name resolution 985 # name/service to type/sockaddr resolution
359 AnyEvent::DNS::addr $host, $port, 0, 0, 0, sub { 986 resolve_sockaddr $host, $port, 0, 0, undef, sub {
360 my @target = @_; 987 my @target = @_;
361 988
362 $state{next} = sub { 989 $state{next} = sub {
363 return unless exists $state{fh}; 990 return unless exists $state{fh};
364 991
992 my $errno = $!;
365 my $target = shift @target 993 my $target = shift @target
366 or do { 994 or return AE::postpone {
995 return unless exists $state{fh};
367 %state = (); 996 %state = ();
997 $! = $errno;
368 return $connect->(); 998 $connect->();
369 }; 999 };
370 1000
371 my ($domain, $type, $proto, $sockaddr) = @$target; 1001 my ($domain, $type, $proto, $sockaddr) = @$target;
372 1002
373 # socket creation 1003 # socket creation
374 socket $state{fh}, $domain, $type, $proto 1004 socket $state{fh}, $domain, $type, $proto
375 or return $state{next}(); 1005 or return $state{next}();
376 1006
377 fh_nonblocking $state{fh}, 1; 1007 fh_nonblocking $state{fh}, 1;
378 1008
379 # prepare and optional timeout
380 if ($prepare) {
381 my $timeout = $prepare->($state{fh}); 1009 my $timeout = $prepare && $prepare->($state{fh});
382 1010
1011 $timeout ||= 30 if AnyEvent::WIN32;
1012
383 $state{to} = AnyEvent->timer (after => $timeout, cb => sub { 1013 $state{to} = AE::timer $timeout, 0, sub {
384 $! = &Errno::ETIMEDOUT; 1014 $! = Errno::ETIMEDOUT;
385 $state{next}(); 1015 $state{next}();
386 }) if $timeout; 1016 } if $timeout;
1017
1018 # now connect
1019 if (
1020 (connect $state{fh}, $sockaddr)
1021 || ($! == Errno::EINPROGRESS # POSIX
1022 || $! == Errno::EWOULDBLOCK
1023 # WSAEINPROGRESS intentionally not checked - it means something else entirely
1024 || $! == AnyEvent::Util::WSAEINVAL # not convinced, but doesn't hurt
1025 || $! == AnyEvent::Util::WSAEWOULDBLOCK)
387 } 1026 ) {
388 1027 $state{ww} = AE::io $state{fh}, 1, sub {
389 # called when the connect was successful, which,
390 # in theory, could be the case immediately (but never is in practise)
391 my $connected = sub {
392 delete $state{ww};
393 delete $state{to};
394
395 # we are connected, or maybe there was an error 1028 # we are connected, or maybe there was an error
396 if (my $sin = getpeername $state{fh}) { 1029 if (my $sin = getpeername $state{fh}) {
397 my ($port, $host) = unpack_sockaddr $sin; 1030 my ($port, $host) = unpack_sockaddr $sin;
398 1031
1032 delete $state{ww}; delete $state{to};
1033
399 my $guard = guard { 1034 my $guard = guard { %state = () };
400 %state = ();
401 };
402 1035
403 $connect->($state{fh}, format_ip $host, $port, sub { 1036 $connect->(delete $state{fh}, format_address $host, $port, sub {
404 $guard->cancel; 1037 $guard->cancel;
1038 $state{next}();
1039 });
1040 } else {
1041 if ($! == Errno::ENOTCONN) {
1042 # dummy read to fetch real error code if !cygwin
1043 sysread $state{fh}, my $buf, 1;
1044
1045 # cygwin 1.5 continously reports "ready' but never delivers
1046 # an error with getpeername or sysread.
1047 # cygwin 1.7 only reports readyness *once*, but is otherwise
1048 # the same, which is actually more broken.
1049 # Work around both by using unportable SO_ERROR for cygwin.
1050 $! = (unpack "l", getsockopt $state{fh}, Socket::SOL_SOCKET(), Socket::SO_ERROR()) || Errno::EAGAIN
1051 if AnyEvent::CYGWIN && $! == Errno::EAGAIN;
1052 }
1053
1054 return if $! == Errno::EAGAIN; # skip spurious wake-ups
1055
1056 delete $state{ww}; delete $state{to};
1057
405 $state{next}(); 1058 $state{next}();
406 }); 1059 }
407 } else {
408 # dummy read to fetch real error code
409 sysread $state{fh}, my $buf, 1 if $! == &Errno::ENOTCONN;
410 $state{next}();
411 } 1060 };
412 };
413
414 # now connect
415 if (connect $state{fh}, $sockaddr) {
416 $connected->();
417 } elsif ($! == &Errno::EINPROGRESS || $! == &Errno::EWOULDBLOCK) { # EINPROGRESS is POSIX
418 $state{ww} = AnyEvent->io (fh => $state{fh}, poll => 'w', cb => $connected);
419 } else { 1061 } else {
420 %state = (); 1062 $state{next}();
421 $connect->();
422 } 1063 }
423 }; 1064 };
424 1065
425 $! = &Errno::ENXIO; 1066 $! = Errno::ENXIO;
426 $state{next}(); 1067 $state{next}();
427 }; 1068 };
428 1069
429 defined wantarray && guard { %state = () } 1070 defined wantarray && guard { %state = () }
430} 1071}
431 1072
432=item $guard = tcp_server $host, $port, $accept_cb[, $prepare_cb] 1073=item $guard = tcp_server $host, $service, $accept_cb[, $prepare_cb]
433 1074
434Create and bind a TCP socket to the given host (any IPv4 host if undef, 1075Create and bind a stream socket to the given host address and port, set
435otherwise it must be an IPv4 or IPv6 address) and port (service name or 1076the SO_REUSEADDR flag (if applicable) and call C<listen>. Unlike the name
436numeric port number, or an ephemeral port if given as zero or undef), set 1077implies, this function can also bind on UNIX domain sockets.
437the SO_REUSEADDR flag and call C<listen>.
438 1078
1079For internet sockets, C<$host> must be an IPv4 or IPv6 address (or
1080C<undef>, in which case it binds either to C<0> or to C<::>, depending
1081on whether IPv4 or IPv6 is the preferred protocol, and maybe to both in
1082future versions, as applicable).
1083
1084To bind to the IPv4 wildcard address, use C<0>, to bind to the IPv6
1085wildcard address, use C<::>.
1086
1087The port is specified by C<$service>, which must be either a service name
1088or a numeric port number (or C<0> or C<undef>, in which case an ephemeral
1089port will be used).
1090
1091For UNIX domain sockets, C<$host> must be C<unix/> and C<$service> must be
1092the absolute pathname of the socket. This function will try to C<unlink>
1093the socket before it tries to bind to it, and will try to unlink it after
1094it stops using it. See SECURITY CONSIDERATIONS, below.
1095
439For each new connection that could be C<accept>ed, call the C<$accept_cb> 1096For each new connection that could be C<accept>ed, call the C<<
440with the file handle (in non-blocking mode) as first and the peer host and 1097$accept_cb->($fh, $host, $port) >> with the file handle (in non-blocking
441port as second and third arguments (see C<tcp_connect> for details). 1098mode) as first, and the peer host and port as second and third arguments
1099(see C<tcp_connect> for details).
442 1100
443Croaks on any errors. 1101Croaks on any errors it can detect before the listen.
444 1102
445If called in non-void context, then this function returns a guard object 1103If called in non-void context, then this function returns a guard object
446whose lifetime it tied to the TCP server: If the object gets destroyed, 1104whose lifetime it tied to the TCP server: If the object gets destroyed,
447the server will be stopped (but existing accepted connections will 1105the server will be stopped (but existing accepted connections will
448continue). 1106not be affected).
1107
1108Regardless, when the function returns to the caller, the socket is bound
1109and in listening state.
449 1110
450If you need more control over the listening socket, you can provide a 1111If you need more control over the listening socket, you can provide a
451C<$prepare_cb>, which is called just before the C<listen ()> call, with 1112C<< $prepare_cb->($fh, $host, $port) >>, which is called just before the
452the listen file handle as first argument. 1113C<listen ()> call, with the listen file handle as first argument, and IP
1114address and port number of the local socket endpoint as second and third
1115arguments.
453 1116
454It should return the length of the listen queue (or C<0> for the default). 1117It should return the length of the listen queue (or C<0> for the default).
455 1118
1119Note to IPv6 users: RFC-compliant behaviour for IPv6 sockets listening on
1120C<::> is to bind to both IPv6 and IPv4 addresses by default on dual-stack
1121hosts. Unfortunately, only GNU/Linux seems to implement this properly, so
1122if you want both IPv4 and IPv6 listening sockets you should create the
1123IPv6 socket first and then attempt to bind on the IPv4 socket, but ignore
1124any C<EADDRINUSE> errors.
1125
456Example: bind on TCP port 8888 on the local machine and tell each client 1126Example: bind on some TCP port on the local machine and tell each client
457to go away. 1127to go away.
458 1128
459 tcp_server undef, 8888, sub { 1129 tcp_server undef, undef, sub {
460 my ($fh, $host, $port) = @_; 1130 my ($fh, $host, $port) = @_;
461 1131
462 syswrite $fh, "The internet is full, $host:$port. Go away!\015\012"; 1132 syswrite $fh, "The internet is full, $host:$port. Go away!\015\012";
1133 }, sub {
1134 my ($fh, $thishost, $thisport) = @_;
1135 AE::log info => "Bound to $thishost, port $thisport.";
463 }; 1136 };
464 1137
1138Example: bind a server on a unix domain socket.
1139
1140 tcp_server "unix/", "/tmp/mydir/mysocket", sub {
1141 my ($fh) = @_;
1142 };
1143
465=cut 1144=cut
466 1145
467sub tcp_server($$$;$) { 1146sub tcp_server($$$;$) {
468 my ($host, $port, $accept, $prepare) = @_; 1147 my ($host, $service, $accept, $prepare) = @_;
1148
1149 $host = $AnyEvent::PROTOCOL{ipv4} < $AnyEvent::PROTOCOL{ipv6} && AF_INET6
1150 ? "::" : "0"
1151 unless defined $host;
1152
1153 my $ipn = parse_address $host
1154 or Carp::croak "AnyEvent::Socket::tcp_server: cannot parse '$host' as host address";
1155
1156 my $af = address_family $ipn;
469 1157
470 my %state; 1158 my %state;
471 1159
472 socket $state{fh}, &Socket::AF_INET, &Socket::SOCK_STREAM, 0 1160 # win32 perl is too stupid to get this right :/
1161 Carp::croak "tcp_server/socket: address family not supported"
1162 if AnyEvent::WIN32 && $af == AF_UNIX;
1163
1164 socket $state{fh}, $af, SOCK_STREAM, 0
473 or Carp::croak "socket: $!"; 1165 or Carp::croak "tcp_server/socket: $!";
474 1166
1167 if ($af == AF_INET || $af == AF_INET6) {
475 setsockopt $state{fh}, &Socket::SOL_SOCKET, &Socket::SO_REUSEADDR, 1 1168 setsockopt $state{fh}, SOL_SOCKET, SO_REUSEADDR, 1
476 or Carp::croak "so_reuseaddr: $!"; 1169 or Carp::croak "tcp_server/so_reuseaddr: $!"
1170 unless AnyEvent::WIN32; # work around windows bug
477 1171
478 bind $state{fh}, Socket::pack_sockaddr_in _tcp_port $port, socket_inet_aton ($host || "0.0.0.0") 1172 unless ($service =~ /^\d*$/) {
1173 $service = (getservbyname $service, "tcp")[2]
1174 or Carp::croak "$service: service unknown"
1175 }
1176 } elsif ($af == AF_UNIX) {
1177 unlink $service;
1178 }
1179
1180 bind $state{fh}, pack_sockaddr $service, $ipn
479 or Carp::croak "bind: $!"; 1181 or Carp::croak "bind: $!";
480 1182
1183 if ($af == AF_UNIX) {
1184 my $fh = $state{fh};
1185 my $ino = (stat $fh)[1];
1186 $state{unlink} = guard {
1187 # this is racy, but is not designed to be foolproof, just best-effort
1188 unlink $service
1189 if $ino == (stat $fh)[1];
1190 };
1191 }
1192
481 fh_nonblocking $state{fh}, 1; 1193 fh_nonblocking $state{fh}, 1;
482 1194
483 my $len = ($prepare && $prepare->($state{fh})) || 128; 1195 my $len;
1196
1197 if ($prepare) {
1198 my ($service, $host) = unpack_sockaddr getsockname $state{fh};
1199 $len = $prepare && $prepare->($state{fh}, format_address $host, $service);
1200 }
1201
1202 $len ||= 128;
484 1203
485 listen $state{fh}, $len 1204 listen $state{fh}, $len
486 or Carp::croak "listen: $!"; 1205 or Carp::croak "listen: $!";
487 1206
488 $state{aw} = AnyEvent->io (fh => $state{fh}, poll => 'r', cb => sub { 1207 $state{aw} = AE::io $state{fh}, 0, sub {
489 # this closure keeps $state alive 1208 # this closure keeps $state alive
490 while (my $peer = accept my $fh, $state{fh}) { 1209 while ($state{fh} && (my $peer = accept my $fh, $state{fh})) {
491 fh_nonblocking $fh, 1; # POSIX requires inheritance, the outside world does not 1210 fh_nonblocking $fh, 1; # POSIX requires inheritance, the outside world does not
1211
492 my ($port, $host) = Socket::unpack_sockaddr_in $peer; 1212 my ($service, $host) = unpack_sockaddr $peer;
493 $accept->($fh, (Socket::inet_ntoa $host), $port); 1213 $accept->($fh, format_address $host, $service);
494 } 1214 }
495 }); 1215 };
496 1216
497 defined wantarray 1217 defined wantarray
498 ? guard { %state = () } # clear fh and watcher, which breaks the circular dependency 1218 ? guard { %state = () } # clear fh and watcher, which breaks the circular dependency
499 : () 1219 : ()
500} 1220}
501 1221
5021; 1222=item tcp_nodelay $fh, $enable
1223
1224Enables (or disables) the C<TCP_NODELAY> socket option (also known as
1225Nagle's algorithm). Returns false on error, true otherwise.
1226
1227=cut
1228
1229sub tcp_nodelay($$) {
1230 my $onoff = int ! ! $_[1];
1231
1232 setsockopt $_[0], Socket::IPPROTO_TCP (), Socket::TCP_NODELAY (), $onoff
1233}
1234
1235=item tcp_congestion $fh, $algorithm
1236
1237Sets the tcp congestion avoidance algorithm (via the C<TCP_CONGESTION>
1238socket option). The default is OS-specific, but is usually
1239C<reno>. Typical other available choices include C<cubic>, C<lp>, C<bic>,
1240C<highspeed>, C<htcp>, C<hybla>, C<illinois>, C<scalable>, C<vegas>,
1241C<veno>, C<westwood> and C<yeah>.
1242
1243=cut
1244
1245sub tcp_congestion($$) {
1246 defined TCP_CONGESTION
1247 ? setsockopt $_[0], Socket::IPPROTO_TCP (), TCP_CONGESTION, "$_[1]"
1248 : undef
1249}
503 1250
504=back 1251=back
505 1252
1253=head1 SECURITY CONSIDERATIONS
1254
1255This module is quite powerful, with with power comes the ability to abuse
1256as well: If you accept "hostnames" and ports from untrusted sources,
1257then note that this can be abused to delete files (host=C<unix/>). This
1258is not really a problem with this module, however, as blindly accepting
1259any address and protocol and trying to bind a server or connect to it is
1260harmful in general.
1261
506=head1 AUTHOR 1262=head1 AUTHOR
507 1263
508 Marc Lehmann <schmorp@schmorp.de> 1264 Marc Lehmann <schmorp@schmorp.de>
509 http://home.schmorp.de/ 1265 http://anyevent.schmorp.de
510 1266
511=cut 1267=cut
512 1268
12691
1270

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines