1 | #! perl # MANDATORY |
1 | #! perl # mandatory |
2 | |
2 | |
3 | # this listens for new tcp connections and hands them over to the server core |
3 | # this listens for new tcp connections and hands them over to the server core |
4 | # wether this being an extension introduces or reduces stability problems |
4 | # whether this being an extension introduces or reduces stability problems |
5 | # is unknown as of today. |
5 | # is unknown as of today. |
6 | |
6 | |
7 | use Socket; |
7 | use Socket; |
8 | use AnyEvent::Socket; |
8 | use AnyEvent::Socket; |
9 | |
9 | |
10 | our $BIND = $cf::CFG{bind_addresses} || [[undef, 13327]]; |
10 | CONF BIND_ADDRESSES = [[undef, 13327]]; |
11 | |
11 | |
12 | for (@$BIND) { |
12 | our $MAX_DETECT = 16; # how many bytes to raed to identify the protocol |
|
|
13 | |
|
|
14 | our @LISTENERS; |
|
|
15 | |
|
|
16 | for (@$BIND_ADDRESSES) { |
13 | my ($host, $port) = @$_; |
17 | my ($host, $port) = @$_; |
14 | warn "listening on $host:$port\n"; |
18 | cf::info "listening on ", (format_hostport $host, $port), "\n"; |
15 | |
19 | |
16 | tcp_server $host, $port, sub { |
20 | push @LISTENERS, tcp_server $host, $port, sub { |
17 | my ($fh, $host, $port) = @_ |
21 | my ($fh, $host, $port) = @_ |
18 | or return; |
22 | or return; |
19 | |
23 | |
20 | warn "new connection from [$host]:$port\n"; |
24 | my $lhost = AnyEvent::Socket::format_address |
|
|
25 | +(AnyEvent::Socket::unpack_sockaddr getsockname $fh)[1]; |
21 | |
26 | |
22 | # HACK to avoid blocking on common files on log-in. |
27 | my $id = format_hostport $host, $port; |
23 | # remove once async |
28 | |
24 | cf::async {#d# |
29 | cf::info "$id: new connection\n" |
25 | warn "HACK ext/tcp.ext: $cf::LOCALDIR/crossfiremail\n" and Coro::AIO::aio_load "$cf::LOCALDIR/crossfiremail", my $dummy;#d# |
30 | if $lhost ne $host; # do not log connections from the host, e.g. for watchdogs |
|
|
31 | |
|
|
32 | my $buf; |
|
|
33 | my $w; $w = AE::io $fh, 0, sub { |
|
|
34 | my $len = sysread $fh, $buf, 512, length $buf; |
|
|
35 | |
|
|
36 | if ($len) { |
|
|
37 | if ($buf =~ /^..version /s) { # deliantra protocol |
|
|
38 | undef $w; |
|
|
39 | |
26 | cf::client::create fileno $fh, $host; |
40 | my $ns = cf::client::create fileno $fh, $host; |
|
|
41 | $ns->inbuf_append ($buf); |
|
|
42 | |
|
|
43 | } elsif ($buf =~ /^GET / && defined &ext::http::server) { # http or websocket |
|
|
44 | undef $w; |
|
|
45 | |
|
|
46 | &ext::http::server ($id, $fh, $buf); |
|
|
47 | |
|
|
48 | } elsif (length $buf >= $MAX_DETECT) { # unable to detect protocol |
|
|
49 | undef $w; |
|
|
50 | |
|
|
51 | cf::info "$id: protocol detection error\n"; |
|
|
52 | } |
|
|
53 | } else { |
|
|
54 | undef $w; |
|
|
55 | |
|
|
56 | cf::info "$id: read error during protocol detection\n"; |
|
|
57 | } |
27 | };#d#d |
58 | }; |
28 | }; |
59 | }; |
29 | } |
60 | } |
30 | |
61 | |