ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/deliantra/server/ext/tcp.ext
(Generate patch)

Comparing deliantra/server/ext/tcp.ext (file contents):
Revision 1.10 by root, Mon May 5 09:01:58 2008 UTC vs.
Revision 1.26 by root, Tue Nov 6 03:45:17 2012 UTC

1#! perl 1#! perl # mandatory
2 2
3# this listens for new tcp connections and hands them over to the server core 3# this listens for new tcp connections and hands them over to the server core
4# wether this being an extension introduces or reduces stability problems 4# whether this being an extension introduces or reduces stability problems
5# is unknown as of today. 5# is unknown as of today.
6 6
7use Socket; 7use Socket;
8use IO::Socket::INET; 8use AnyEvent::Socket;
9 9
10our $LISTEN = new IO::Socket::INET 10CONF BIND_ADDRESSES = [[undef, 13327]];
11 LocalPort => cf::settings->csport,
12 Listen => 1,
13 Blocking => 0,
14 ReuseAddr => 1;
15 11
16if (!$LISTEN) { 12our $MAX_DETECT; # how many bytes to read to identify the protocol
17 # extension yes, completely stupid, not yet 13
18 warn "unable to establish listen socket, exiting.\n"; 14our @LISTENERS;
19 exit (2); 15our @DETECTORS;
16our %DETECTORS;
17
18sub _update_detectors {
19 $MAX_DETECT = List::Util::max map $_->[1], values %DETECTORS;
20} 20}
21 21
22our $LISTENER = EV::io $LISTEN, EV::READ, sub { 22sub register($$$$) {
23 my ($fh, $peername) = $LISTEN->accept 23 my ($name, $max_detect, $detect, $serve) = @_;
24 or return;
25 24
26 my $fd = fileno $fh; 25 $DETECTORS{$name} = [$max_detect, $detect, $serve];
27 my $host = inet_ntoa +(sockaddr_in $peername)[1]; 26 _update_detectors;
28 27
29 warn "new connection from $host\n"; 28 Guard::guard {
29 delete $DETECTORS{$name};
30 _update_detectors;
31 }
32}
30 33
31 # HACK to avoid blocking on common files on log-in. 34our $deliantra_detector = ext::tcp::register deliantra => 10, sub {
32 # remove once async 35 /^..version /s
33 cf::async {#d# 36}, sub {
34 warn "HACK: $cf::CONFDIR/$_", Coro::AIO::aio_load "$cf::CONFDIR/$_", my $dummy for qw(rules news motd);#d# 37 my $ns = cf::client::create fileno $_[1], $_[0];
35 warn "HACK: $cf::VARDIR/crossfiremail", Coro::AIO::aio_load "$cf::VARDIR/crossfiremail", my $dummy;#d# 38 $ns->run;
36 cf::client::create $fd, $host; 39 $ns->inbuf_append ($_[2]);
37 undef $fh;#d#
38 };#d#d
39}; 40};
40 41
42for (@$BIND_ADDRESSES) {
43 my ($host, $port) = @$_;
44 cf::info "listening on ", (format_hostport $host, $port), "\n";
45
46 push @LISTENERS, tcp_server $host, $port, sub {
47 my ($fh, $host, $port) = @_
48 or return;
49
50 my $lhost = AnyEvent::Socket::format_address
51 +(AnyEvent::Socket::unpack_sockaddr getsockname $fh)[1];
52
53 my $id = format_hostport $host, $port;
54
55 cf::info "$id: accepted connection.\n"
56 if $lhost ne $host; # do not log connections from the host, e.g. for watchdogs
57
58 my $buf;
59 my $w; $w = AE::io $fh, 0, sub {
60 my $len = sysread $fh, $buf, 512, length $buf;
61
62 if ($len) {
63 for ($buf) {
64 while (my ($name, $v) = each %DETECTORS) {
65 if (my $cb = $v->[1]()) {
66 undef $w;
67 cf::debug "$id: detected protocol $name.\n";
68 $v->[2]($id, $fh, $buf);
69 return;
70 }
71 }
72
73 if (length >= $MAX_DETECT) { # unable to detect protocol
74 undef $w;
75 cf::debug "$id: data received, but cannot detect protocol, closing.\n";
76 }
77 }
78 } else {
79 undef $w;
80 cf::info "$id: read error during protocol detection ($!)\n";
81 }
82 };
83 };
84}
85

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines