2013-10-22 17:13:18 -05:00
|
|
|
// Copyright 2013 The Rust Project Developers. See the COPYRIGHT
|
|
|
|
// file at the top-level directory of this distribution and at
|
|
|
|
// http://rust-lang.org/COPYRIGHT.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
|
|
// option. This file may not be copied, modified, or distributed
|
|
|
|
// except according to those terms.
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
use std::cast;
|
2013-11-11 00:46:32 -06:00
|
|
|
use std::io::IoError;
|
2014-01-17 21:33:29 -06:00
|
|
|
use std::io::net::ip;
|
|
|
|
use std::libc::{size_t, ssize_t, c_int, c_void, c_uint};
|
2013-12-12 19:47:48 -06:00
|
|
|
use std::libc;
|
2014-01-17 21:33:29 -06:00
|
|
|
use std::mem;
|
2013-12-12 19:47:48 -06:00
|
|
|
use std::ptr;
|
2013-11-05 02:27:41 -06:00
|
|
|
use std::rt::rtio;
|
2013-12-12 19:47:48 -06:00
|
|
|
use std::rt::task::BlockedTask;
|
2014-01-17 21:33:29 -06:00
|
|
|
use std::unstable::intrinsics;
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-12-12 19:47:48 -06:00
|
|
|
use homing::{HomingIO, HomeHandle};
|
2013-11-05 13:29:45 -06:00
|
|
|
use stream::StreamWatcher;
|
|
|
|
use super::{Loop, Request, UvError, Buf, status_to_io_result,
|
2013-11-07 17:13:06 -06:00
|
|
|
uv_error_to_io_error, UvHandle, slice_to_uv_buf,
|
2013-12-12 19:47:48 -06:00
|
|
|
wait_until_woken_after, wakeup};
|
|
|
|
use uvio::UvIoFactory;
|
2013-11-05 13:29:45 -06:00
|
|
|
use uvll;
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
/// Generic functions related to dealing with sockaddr things
|
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
pub fn htons(u: u16) -> u16 { intrinsics::to_be16(u as i16) as u16 }
|
|
|
|
pub fn ntohs(u: u16) -> u16 { intrinsics::from_be16(u as i16) as u16 }
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
pub fn sockaddr_to_addr(storage: &libc::sockaddr_storage,
|
|
|
|
len: uint) -> ip::SocketAddr {
|
|
|
|
match storage.ss_family as c_int {
|
|
|
|
libc::AF_INET => {
|
|
|
|
assert!(len as uint >= mem::size_of::<libc::sockaddr_in>());
|
|
|
|
let storage: &libc::sockaddr_in = unsafe {
|
|
|
|
cast::transmute(storage)
|
2013-11-25 23:59:08 -06:00
|
|
|
};
|
2014-01-17 21:33:29 -06:00
|
|
|
let addr = storage.sin_addr.s_addr as u32;
|
|
|
|
let a = (addr >> 0) as u8;
|
|
|
|
let b = (addr >> 8) as u8;
|
|
|
|
let c = (addr >> 16) as u8;
|
|
|
|
let d = (addr >> 24) as u8;
|
|
|
|
ip::SocketAddr {
|
|
|
|
ip: ip::Ipv4Addr(a, b, c, d),
|
|
|
|
port: ntohs(storage.sin_port),
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2014-01-17 21:33:29 -06:00
|
|
|
}
|
|
|
|
libc::AF_INET6 => {
|
|
|
|
assert!(len as uint >= mem::size_of::<libc::sockaddr_in6>());
|
|
|
|
let storage: &libc::sockaddr_in6 = unsafe {
|
|
|
|
cast::transmute(storage)
|
2013-11-07 17:26:47 -06:00
|
|
|
};
|
2014-01-17 21:33:29 -06:00
|
|
|
let a = ntohs(storage.sin6_addr.s6_addr[0]);
|
|
|
|
let b = ntohs(storage.sin6_addr.s6_addr[1]);
|
|
|
|
let c = ntohs(storage.sin6_addr.s6_addr[2]);
|
|
|
|
let d = ntohs(storage.sin6_addr.s6_addr[3]);
|
|
|
|
let e = ntohs(storage.sin6_addr.s6_addr[4]);
|
|
|
|
let f = ntohs(storage.sin6_addr.s6_addr[5]);
|
|
|
|
let g = ntohs(storage.sin6_addr.s6_addr[6]);
|
|
|
|
let h = ntohs(storage.sin6_addr.s6_addr[7]);
|
|
|
|
ip::SocketAddr {
|
|
|
|
ip: ip::Ipv6Addr(a, b, c, d, e, f, g, h),
|
|
|
|
port: ntohs(storage.sin6_port),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
n => {
|
|
|
|
fail!("unknown family {}", n);
|
|
|
|
}
|
2013-11-07 17:26:47 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
fn addr_to_sockaddr(addr: ip::SocketAddr) -> (libc::sockaddr_storage, uint) {
|
|
|
|
unsafe {
|
|
|
|
let mut storage: libc::sockaddr_storage = intrinsics::init();
|
|
|
|
let len = match addr.ip {
|
|
|
|
ip::Ipv4Addr(a, b, c, d) => {
|
|
|
|
let storage: &mut libc::sockaddr_in =
|
|
|
|
cast::transmute(&mut storage);
|
|
|
|
(*storage).sin_family = libc::AF_INET as libc::sa_family_t;
|
|
|
|
(*storage).sin_port = htons(addr.port);
|
|
|
|
(*storage).sin_addr = libc::in_addr {
|
|
|
|
s_addr: (d as u32 << 24) |
|
|
|
|
(c as u32 << 16) |
|
|
|
|
(b as u32 << 8) |
|
|
|
|
(a as u32 << 0)
|
|
|
|
};
|
|
|
|
mem::size_of::<libc::sockaddr_in>()
|
|
|
|
}
|
|
|
|
ip::Ipv6Addr(a, b, c, d, e, f, g, h) => {
|
|
|
|
let storage: &mut libc::sockaddr_in6 =
|
|
|
|
cast::transmute(&mut storage);
|
|
|
|
storage.sin6_family = libc::AF_INET6 as libc::sa_family_t;
|
|
|
|
storage.sin6_port = htons(addr.port);
|
|
|
|
storage.sin6_addr = libc::in6_addr {
|
|
|
|
s6_addr: [
|
|
|
|
htons(a),
|
|
|
|
htons(b),
|
|
|
|
htons(c),
|
|
|
|
htons(d),
|
|
|
|
htons(e),
|
|
|
|
htons(f),
|
|
|
|
htons(g),
|
|
|
|
htons(h),
|
|
|
|
]
|
|
|
|
};
|
|
|
|
mem::size_of::<libc::sockaddr_in6>()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
return (storage, len);
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
enum SocketNameKind {
|
|
|
|
TcpPeer,
|
|
|
|
Tcp,
|
|
|
|
Udp
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
fn socket_name(sk: SocketNameKind,
|
|
|
|
handle: *c_void) -> Result<ip::SocketAddr, IoError> {
|
|
|
|
let getsockname = match sk {
|
|
|
|
TcpPeer => uvll::uv_tcp_getpeername,
|
|
|
|
Tcp => uvll::uv_tcp_getsockname,
|
|
|
|
Udp => uvll::uv_udp_getsockname,
|
|
|
|
};
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
// Allocate a sockaddr_storage since we don't know if it's ipv4 or ipv6
|
|
|
|
let mut sockaddr: libc::sockaddr_storage = unsafe { intrinsics::init() };
|
|
|
|
let mut namelen = mem::size_of::<libc::sockaddr_storage>() as c_int;
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
let sockaddr_p = &mut sockaddr as *mut libc::sockaddr_storage;
|
|
|
|
match unsafe {
|
|
|
|
getsockname(handle, sockaddr_p as *mut libc::sockaddr, &mut namelen)
|
|
|
|
} {
|
|
|
|
0 => Ok(sockaddr_to_addr(&sockaddr, namelen as uint)),
|
|
|
|
n => Err(uv_error_to_io_error(UvError(n)))
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
/// TCP implementation
|
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
pub struct TcpWatcher {
|
|
|
|
handle: *uvll::uv_tcp_t,
|
|
|
|
stream: StreamWatcher,
|
2013-12-12 19:47:48 -06:00
|
|
|
home: HomeHandle,
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
pub struct TcpListener {
|
2013-12-12 19:47:48 -06:00
|
|
|
home: HomeHandle,
|
2013-11-05 02:27:41 -06:00
|
|
|
handle: *uvll::uv_pipe_t,
|
|
|
|
priv closing_task: Option<BlockedTask>,
|
2013-12-12 19:47:48 -06:00
|
|
|
priv outgoing: Chan<Result<~rtio::RtioTcpStream, IoError>>,
|
|
|
|
priv incoming: Port<Result<~rtio::RtioTcpStream, IoError>>,
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
pub struct TcpAcceptor {
|
|
|
|
listener: ~TcpListener,
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
// TCP watchers (clients/streams)
|
2013-10-22 17:13:18 -05:00
|
|
|
|
|
|
|
impl TcpWatcher {
|
2013-12-12 19:47:48 -06:00
|
|
|
pub fn new(io: &mut UvIoFactory) -> TcpWatcher {
|
|
|
|
let handle = io.make_handle();
|
|
|
|
TcpWatcher::new_home(&io.loop_, handle)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn new_home(loop_: &Loop, home: HomeHandle) -> TcpWatcher {
|
2013-11-05 02:27:41 -06:00
|
|
|
let handle = unsafe { uvll::malloc_handle(uvll::UV_TCP) };
|
|
|
|
assert_eq!(unsafe {
|
2013-11-05 13:29:45 -06:00
|
|
|
uvll::uv_tcp_init(loop_.handle, handle)
|
2013-11-05 02:27:41 -06:00
|
|
|
}, 0);
|
|
|
|
TcpWatcher {
|
2013-12-12 19:47:48 -06:00
|
|
|
home: home,
|
2013-11-05 02:27:41 -06:00
|
|
|
handle: handle,
|
|
|
|
stream: StreamWatcher::new(handle),
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
pub fn connect(io: &mut UvIoFactory, address: ip::SocketAddr)
|
2013-11-05 02:27:41 -06:00
|
|
|
-> Result<TcpWatcher, UvError>
|
|
|
|
{
|
|
|
|
struct Ctx { status: c_int, task: Option<BlockedTask> }
|
|
|
|
|
2013-12-12 19:47:48 -06:00
|
|
|
let tcp = TcpWatcher::new(io);
|
2014-01-17 21:33:29 -06:00
|
|
|
let (addr, _len) = addr_to_sockaddr(address);
|
|
|
|
let mut req = Request::new(uvll::UV_CONNECT);
|
|
|
|
let result = unsafe {
|
|
|
|
let addr_p = &addr as *libc::sockaddr_storage;
|
|
|
|
uvll::uv_tcp_connect(req.handle, tcp.handle,
|
|
|
|
addr_p as *libc::sockaddr,
|
|
|
|
connect_cb)
|
|
|
|
};
|
|
|
|
return match result {
|
|
|
|
0 => {
|
|
|
|
req.defuse(); // uv callback now owns this request
|
|
|
|
let mut cx = Ctx { status: 0, task: None };
|
|
|
|
wait_until_woken_after(&mut cx.task, || {
|
|
|
|
req.set_data(&cx);
|
|
|
|
});
|
|
|
|
match cx.status {
|
|
|
|
0 => Ok(tcp),
|
|
|
|
n => Err(UvError(n)),
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
}
|
2014-01-17 21:33:29 -06:00
|
|
|
n => Err(UvError(n))
|
2013-11-21 18:55:40 -06:00
|
|
|
};
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
extern fn connect_cb(req: *uvll::uv_connect_t, status: c_int) {
|
2013-11-05 13:29:45 -06:00
|
|
|
let req = Request::wrap(req);
|
2013-11-07 17:13:06 -06:00
|
|
|
assert!(status != uvll::ECANCELED);
|
|
|
|
let cx: &mut Ctx = unsafe { req.get_data() };
|
2013-11-05 02:27:41 -06:00
|
|
|
cx.status = status;
|
2013-12-12 19:47:48 -06:00
|
|
|
wakeup(&mut cx.task);
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
impl HomingIO for TcpWatcher {
|
2013-12-12 19:47:48 -06:00
|
|
|
fn home<'r>(&'r mut self) -> &'r mut HomeHandle { &mut self.home }
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl rtio::RtioSocket for TcpWatcher {
|
2014-01-17 21:33:29 -06:00
|
|
|
fn socket_name(&mut self) -> Result<ip::SocketAddr, IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
socket_name(Tcp, self.handle)
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl rtio::RtioTcpStream for TcpWatcher {
|
|
|
|
fn read(&mut self, buf: &mut [u8]) -> Result<uint, IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
self.stream.read(buf).map_err(uv_error_to_io_error)
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
|
|
|
|
fn write(&mut self, buf: &[u8]) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
self.stream.write(buf).map_err(uv_error_to_io_error)
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
fn peer_name(&mut self) -> Result<ip::SocketAddr, IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
socket_name(TcpPeer, self.handle)
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn control_congestion(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_tcp_nodelay(self.handle, 0 as c_int)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn nodelay(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_tcp_nodelay(self.handle, 1 as c_int)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn keepalive(&mut self, delay_in_seconds: uint) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_tcp_keepalive(self.handle, 1 as c_int,
|
|
|
|
delay_in_seconds as c_uint)
|
|
|
|
})
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn letdie(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_tcp_keepalive(self.handle, 0 as c_int, 0 as c_uint)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
impl UvHandle<uvll::uv_tcp_t> for TcpWatcher {
|
|
|
|
fn uv_handle(&self) -> *uvll::uv_tcp_t { self.stream.handle }
|
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl Drop for TcpWatcher {
|
|
|
|
fn drop(&mut self) {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-07 17:13:06 -06:00
|
|
|
self.close();
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
// TCP listeners (unbound servers)
|
|
|
|
|
|
|
|
impl TcpListener {
|
2014-01-17 21:33:29 -06:00
|
|
|
pub fn bind(io: &mut UvIoFactory, address: ip::SocketAddr)
|
2013-11-20 17:46:49 -06:00
|
|
|
-> Result<~TcpListener, UvError> {
|
2013-11-21 18:55:40 -06:00
|
|
|
let handle = unsafe { uvll::malloc_handle(uvll::UV_TCP) };
|
|
|
|
assert_eq!(unsafe {
|
2013-12-12 19:47:48 -06:00
|
|
|
uvll::uv_tcp_init(io.uv_loop(), handle)
|
2013-11-21 18:55:40 -06:00
|
|
|
}, 0);
|
2013-12-12 19:47:48 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-11-21 18:55:40 -06:00
|
|
|
let l = ~TcpListener {
|
2013-12-12 19:47:48 -06:00
|
|
|
home: io.make_handle(),
|
2013-11-21 18:55:40 -06:00
|
|
|
handle: handle,
|
|
|
|
closing_task: None,
|
2013-12-12 19:47:48 -06:00
|
|
|
outgoing: chan,
|
|
|
|
incoming: port,
|
2013-11-21 18:55:40 -06:00
|
|
|
};
|
2014-01-17 21:33:29 -06:00
|
|
|
let (addr, _len) = addr_to_sockaddr(address);
|
|
|
|
let res = unsafe {
|
|
|
|
let addr_p = &addr as *libc::sockaddr_storage;
|
|
|
|
uvll::uv_tcp_bind(l.handle, addr_p as *libc::sockaddr)
|
|
|
|
};
|
2013-11-21 18:55:40 -06:00
|
|
|
return match res {
|
|
|
|
0 => Ok(l.install()),
|
|
|
|
n => Err(UvError(n))
|
|
|
|
};
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl HomingIO for TcpListener {
|
2013-12-12 19:47:48 -06:00
|
|
|
fn home<'r>(&'r mut self) -> &'r mut HomeHandle { &mut self.home }
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
impl UvHandle<uvll::uv_tcp_t> for TcpListener {
|
|
|
|
fn uv_handle(&self) -> *uvll::uv_tcp_t { self.handle }
|
|
|
|
}
|
|
|
|
|
|
|
|
impl rtio::RtioSocket for TcpListener {
|
2014-01-17 21:33:29 -06:00
|
|
|
fn socket_name(&mut self) -> Result<ip::SocketAddr, IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
socket_name(Tcp, self.handle)
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl rtio::RtioTcpListener for TcpListener {
|
|
|
|
fn listen(mut ~self) -> Result<~rtio::RtioTcpAcceptor, IoError> {
|
|
|
|
// create the acceptor object from ourselves
|
2013-12-12 19:47:48 -06:00
|
|
|
let mut acceptor = ~TcpAcceptor { listener: self };
|
2013-11-05 02:27:41 -06:00
|
|
|
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = acceptor.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
// XXX: the 128 backlog should be configurable
|
|
|
|
match unsafe { uvll::uv_listen(acceptor.listener.handle, 128, listen_cb) } {
|
|
|
|
0 => Ok(acceptor as ~rtio::RtioTcpAcceptor),
|
|
|
|
n => Err(uv_error_to_io_error(UvError(n))),
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
extern fn listen_cb(server: *uvll::uv_stream_t, status: c_int) {
|
2013-11-07 17:13:06 -06:00
|
|
|
assert!(status != uvll::ECANCELED);
|
2013-12-12 19:47:48 -06:00
|
|
|
let tcp: &mut TcpListener = unsafe { UvHandle::from_uv_handle(&server) };
|
2013-11-05 02:27:41 -06:00
|
|
|
let msg = match status {
|
|
|
|
0 => {
|
2013-11-05 13:29:45 -06:00
|
|
|
let loop_ = Loop::wrap(unsafe {
|
2013-11-05 02:27:41 -06:00
|
|
|
uvll::get_loop_for_uv_handle(server)
|
|
|
|
});
|
2013-12-12 19:47:48 -06:00
|
|
|
let client = TcpWatcher::new_home(&loop_, tcp.home().clone());
|
2013-11-05 02:27:41 -06:00
|
|
|
assert_eq!(unsafe { uvll::uv_accept(server, client.handle) }, 0);
|
|
|
|
Ok(~client as ~rtio::RtioTcpStream)
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
n => Err(uv_error_to_io_error(UvError(n)))
|
|
|
|
};
|
|
|
|
tcp.outgoing.send(msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Drop for TcpListener {
|
|
|
|
fn drop(&mut self) {
|
2013-11-07 17:13:06 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
|
|
|
self.close();
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
// TCP acceptors (bound servers)
|
|
|
|
|
|
|
|
impl HomingIO for TcpAcceptor {
|
2013-12-12 19:47:48 -06:00
|
|
|
fn home<'r>(&'r mut self) -> &'r mut HomeHandle { self.listener.home() }
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl rtio::RtioSocket for TcpAcceptor {
|
2014-01-17 21:33:29 -06:00
|
|
|
fn socket_name(&mut self) -> Result<ip::SocketAddr, IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
socket_name(Tcp, self.listener.handle)
|
|
|
|
}
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl rtio::RtioTcpAcceptor for TcpAcceptor {
|
|
|
|
fn accept(&mut self) -> Result<~rtio::RtioTcpStream, IoError> {
|
2013-12-12 19:47:48 -06:00
|
|
|
self.listener.incoming.recv()
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn accept_simultaneously(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_tcp_simultaneous_accepts(self.listener.handle, 1)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn dont_accept_simultaneously(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_tcp_simultaneous_accepts(self.listener.handle, 0)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
/// UDP implementation
|
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
pub struct UdpWatcher {
|
|
|
|
handle: *uvll::uv_udp_t,
|
2013-12-12 19:47:48 -06:00
|
|
|
home: HomeHandle,
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
impl UdpWatcher {
|
2014-01-17 21:33:29 -06:00
|
|
|
pub fn bind(io: &mut UvIoFactory, address: ip::SocketAddr)
|
2013-11-20 17:46:49 -06:00
|
|
|
-> Result<UdpWatcher, UvError> {
|
2013-11-21 18:55:40 -06:00
|
|
|
let udp = UdpWatcher {
|
|
|
|
handle: unsafe { uvll::malloc_handle(uvll::UV_UDP) },
|
2013-12-12 19:47:48 -06:00
|
|
|
home: io.make_handle(),
|
2013-11-21 18:55:40 -06:00
|
|
|
};
|
|
|
|
assert_eq!(unsafe {
|
2013-12-12 19:47:48 -06:00
|
|
|
uvll::uv_udp_init(io.uv_loop(), udp.handle)
|
2013-11-21 18:55:40 -06:00
|
|
|
}, 0);
|
2014-01-17 21:33:29 -06:00
|
|
|
let (addr, _len) = addr_to_sockaddr(address);
|
|
|
|
let result = unsafe {
|
|
|
|
let addr_p = &addr as *libc::sockaddr_storage;
|
|
|
|
uvll::uv_udp_bind(udp.handle, addr_p as *libc::sockaddr, 0u32)
|
|
|
|
};
|
2013-11-21 18:55:40 -06:00
|
|
|
return match result {
|
|
|
|
0 => Ok(udp),
|
|
|
|
n => Err(UvError(n)),
|
|
|
|
};
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
impl UvHandle<uvll::uv_udp_t> for UdpWatcher {
|
|
|
|
fn uv_handle(&self) -> *uvll::uv_udp_t { self.handle }
|
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl HomingIO for UdpWatcher {
|
2013-12-12 19:47:48 -06:00
|
|
|
fn home<'r>(&'r mut self) -> &'r mut HomeHandle { &mut self.home }
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
impl rtio::RtioSocket for UdpWatcher {
|
2014-01-17 21:33:29 -06:00
|
|
|
fn socket_name(&mut self) -> Result<ip::SocketAddr, IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
socket_name(Udp, self.handle)
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
impl rtio::RtioUdpSocket for UdpWatcher {
|
|
|
|
fn recvfrom(&mut self, buf: &mut [u8])
|
2014-01-17 21:33:29 -06:00
|
|
|
-> Result<(uint, ip::SocketAddr), IoError>
|
2013-11-05 02:27:41 -06:00
|
|
|
{
|
|
|
|
struct Ctx {
|
|
|
|
task: Option<BlockedTask>,
|
|
|
|
buf: Option<Buf>,
|
2014-01-17 21:33:29 -06:00
|
|
|
result: Option<(ssize_t, Option<ip::SocketAddr>)>,
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
let a = match unsafe {
|
2013-11-05 02:27:41 -06:00
|
|
|
uvll::uv_udp_recv_start(self.handle, alloc_cb, recv_cb)
|
|
|
|
} {
|
|
|
|
0 => {
|
|
|
|
let mut cx = Ctx {
|
|
|
|
task: None,
|
|
|
|
buf: Some(slice_to_uv_buf(buf)),
|
|
|
|
result: None,
|
|
|
|
};
|
2013-11-20 17:46:49 -06:00
|
|
|
wait_until_woken_after(&mut cx.task, || {
|
2013-11-07 17:13:06 -06:00
|
|
|
unsafe { uvll::set_data_for_uv_handle(self.handle, &cx) }
|
2013-11-20 17:46:49 -06:00
|
|
|
});
|
2013-11-05 02:27:41 -06:00
|
|
|
match cx.result.take_unwrap() {
|
|
|
|
(n, _) if n < 0 =>
|
|
|
|
Err(uv_error_to_io_error(UvError(n as c_int))),
|
2013-11-07 17:26:47 -06:00
|
|
|
(n, addr) => Ok((n as uint, addr.unwrap()))
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
n => Err(uv_error_to_io_error(UvError(n)))
|
|
|
|
};
|
2013-11-07 17:13:06 -06:00
|
|
|
return a;
|
2013-11-05 02:27:41 -06:00
|
|
|
|
|
|
|
extern fn alloc_cb(handle: *uvll::uv_udp_t,
|
2013-11-07 17:26:47 -06:00
|
|
|
_suggested_size: size_t,
|
|
|
|
buf: *mut Buf) {
|
|
|
|
unsafe {
|
|
|
|
let cx: &mut Ctx =
|
|
|
|
cast::transmute(uvll::get_data_for_uv_handle(handle));
|
|
|
|
*buf = cx.buf.take().expect("recv alloc_cb called more than once")
|
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-07 17:26:47 -06:00
|
|
|
extern fn recv_cb(handle: *uvll::uv_udp_t, nread: ssize_t, buf: *Buf,
|
2014-01-17 21:33:29 -06:00
|
|
|
addr: *libc::sockaddr, _flags: c_uint) {
|
2013-11-07 17:13:06 -06:00
|
|
|
assert!(nread != uvll::ECANCELED as ssize_t);
|
|
|
|
let cx: &mut Ctx = unsafe {
|
|
|
|
cast::transmute(uvll::get_data_for_uv_handle(handle))
|
|
|
|
};
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
// When there's no data to read the recv callback can be a no-op.
|
|
|
|
// This can happen if read returns EAGAIN/EWOULDBLOCK. By ignoring
|
|
|
|
// this we just drop back to kqueue and wait for the next callback.
|
2013-11-07 17:13:06 -06:00
|
|
|
if nread == 0 {
|
2013-11-07 17:26:47 -06:00
|
|
|
cx.buf = Some(unsafe { *buf });
|
2013-11-07 17:13:06 -06:00
|
|
|
return
|
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
|
|
|
|
unsafe {
|
|
|
|
assert_eq!(uvll::uv_udp_recv_stop(handle), 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
let cx: &mut Ctx = unsafe {
|
|
|
|
cast::transmute(uvll::get_data_for_uv_handle(handle))
|
|
|
|
};
|
2013-11-07 17:26:47 -06:00
|
|
|
let addr = if addr == ptr::null() {
|
|
|
|
None
|
|
|
|
} else {
|
2014-01-17 21:33:29 -06:00
|
|
|
let len = mem::size_of::<libc::sockaddr_storage>();
|
|
|
|
Some(sockaddr_to_addr(unsafe { cast::transmute(addr) }, len))
|
2013-11-07 17:26:47 -06:00
|
|
|
};
|
2013-11-05 02:27:41 -06:00
|
|
|
cx.result = Some((nread, addr));
|
2013-12-12 19:47:48 -06:00
|
|
|
wakeup(&mut cx.task);
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
fn sendto(&mut self, buf: &[u8], dst: ip::SocketAddr) -> Result<(), IoError> {
|
2013-11-05 02:27:41 -06:00
|
|
|
struct Ctx { task: Option<BlockedTask>, result: c_int }
|
|
|
|
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
let mut req = Request::new(uvll::UV_UDP_SEND);
|
2013-11-05 02:27:41 -06:00
|
|
|
let buf = slice_to_uv_buf(buf);
|
2014-01-17 21:33:29 -06:00
|
|
|
let (addr, _len) = addr_to_sockaddr(dst);
|
|
|
|
let result = unsafe {
|
|
|
|
let addr_p = &addr as *libc::sockaddr_storage;
|
|
|
|
uvll::uv_udp_send(req.handle, self.handle, [buf],
|
|
|
|
addr_p as *libc::sockaddr, send_cb)
|
|
|
|
};
|
2013-11-05 02:27:41 -06:00
|
|
|
|
|
|
|
return match result {
|
|
|
|
0 => {
|
2013-11-07 17:13:06 -06:00
|
|
|
req.defuse(); // uv callback now owns this request
|
2013-11-05 02:27:41 -06:00
|
|
|
let mut cx = Ctx { task: None, result: 0 };
|
2013-11-20 17:46:49 -06:00
|
|
|
wait_until_woken_after(&mut cx.task, || {
|
2013-11-07 17:13:06 -06:00
|
|
|
req.set_data(&cx);
|
2013-11-20 17:46:49 -06:00
|
|
|
});
|
2013-11-05 02:27:41 -06:00
|
|
|
match cx.result {
|
|
|
|
0 => Ok(()),
|
|
|
|
n => Err(uv_error_to_io_error(UvError(n)))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
n => Err(uv_error_to_io_error(UvError(n)))
|
|
|
|
};
|
|
|
|
|
|
|
|
extern fn send_cb(req: *uvll::uv_udp_send_t, status: c_int) {
|
|
|
|
let req = Request::wrap(req);
|
2013-11-07 17:13:06 -06:00
|
|
|
assert!(status != uvll::ECANCELED);
|
|
|
|
let cx: &mut Ctx = unsafe { req.get_data() };
|
2013-11-05 02:27:41 -06:00
|
|
|
cx.result = status;
|
2013-12-12 19:47:48 -06:00
|
|
|
wakeup(&mut cx.task);
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
fn join_multicast(&mut self, multi: ip::IpAddr) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
2013-11-20 17:46:49 -06:00
|
|
|
multi.to_str().with_c_str(|m_addr| {
|
2013-11-05 02:27:41 -06:00
|
|
|
uvll::uv_udp_set_membership(self.handle,
|
|
|
|
m_addr, ptr::null(),
|
|
|
|
uvll::UV_JOIN_GROUP)
|
2013-11-20 17:46:49 -06:00
|
|
|
})
|
2013-11-05 02:27:41 -06:00
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2014-01-17 21:33:29 -06:00
|
|
|
fn leave_multicast(&mut self, multi: ip::IpAddr) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
2013-11-20 17:46:49 -06:00
|
|
|
multi.to_str().with_c_str(|m_addr| {
|
2013-11-05 02:27:41 -06:00
|
|
|
uvll::uv_udp_set_membership(self.handle,
|
|
|
|
m_addr, ptr::null(),
|
|
|
|
uvll::UV_LEAVE_GROUP)
|
2013-11-20 17:46:49 -06:00
|
|
|
})
|
2013-11-05 02:27:41 -06:00
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
|
|
|
|
fn loop_multicast_locally(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_udp_set_multicast_loop(self.handle,
|
|
|
|
1 as c_int)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn dont_loop_multicast_locally(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_udp_set_multicast_loop(self.handle,
|
|
|
|
0 as c_int)
|
|
|
|
})
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn multicast_time_to_live(&mut self, ttl: int) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_udp_set_multicast_ttl(self.handle,
|
|
|
|
ttl as c_int)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn time_to_live(&mut self, ttl: int) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_udp_set_ttl(self.handle, ttl as c_int)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn hear_broadcasts(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_udp_set_broadcast(self.handle,
|
|
|
|
1 as c_int)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 02:27:41 -06:00
|
|
|
fn ignore_broadcasts(&mut self) -> Result<(), IoError> {
|
2013-11-06 01:29:11 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
2013-11-05 02:27:41 -06:00
|
|
|
status_to_io_result(unsafe {
|
|
|
|
uvll::uv_udp_set_broadcast(self.handle,
|
|
|
|
0 as c_int)
|
|
|
|
})
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-05 02:27:41 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
impl Drop for UdpWatcher {
|
|
|
|
fn drop(&mut self) {
|
|
|
|
// Send ourselves home to close this handle (blocking while doing so).
|
2013-11-07 17:13:06 -06:00
|
|
|
let _m = self.fire_homing_missile();
|
|
|
|
self.close();
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod test {
|
2013-11-06 13:03:11 -06:00
|
|
|
use std::rt::rtio::{RtioTcpStream, RtioTcpListener, RtioTcpAcceptor,
|
|
|
|
RtioUdpSocket};
|
2013-12-13 13:30:59 -06:00
|
|
|
use std::io::test::{next_test_ip4, next_test_ip6};
|
2013-11-06 13:03:11 -06:00
|
|
|
|
2013-12-13 13:30:59 -06:00
|
|
|
use super::{UdpWatcher, TcpWatcher, TcpListener};
|
2013-11-07 17:13:06 -06:00
|
|
|
use super::super::local_loop;
|
2013-10-22 17:13:18 -05:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn connect_close_ip4() {
|
2013-11-07 17:13:06 -06:00
|
|
|
match TcpWatcher::connect(local_loop(), next_test_ip4()) {
|
2013-11-28 14:22:53 -06:00
|
|
|
Ok(..) => fail!(),
|
2013-11-07 17:13:06 -06:00
|
|
|
Err(e) => assert_eq!(e.name(), ~"ECONNREFUSED"),
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn connect_close_ip6() {
|
2013-11-07 17:13:06 -06:00
|
|
|
match TcpWatcher::connect(local_loop(), next_test_ip6()) {
|
2013-11-28 14:22:53 -06:00
|
|
|
Ok(..) => fail!(),
|
2013-11-07 17:13:06 -06:00
|
|
|
Err(e) => assert_eq!(e.name(), ~"ECONNREFUSED"),
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn udp_bind_close_ip4() {
|
2013-11-07 17:13:06 -06:00
|
|
|
match UdpWatcher::bind(local_loop(), next_test_ip4()) {
|
2013-11-28 14:22:53 -06:00
|
|
|
Ok(..) => {}
|
|
|
|
Err(..) => fail!()
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn udp_bind_close_ip6() {
|
2013-11-07 17:13:06 -06:00
|
|
|
match UdpWatcher::bind(local_loop(), next_test_ip6()) {
|
2013-11-28 14:22:53 -06:00
|
|
|
Ok(..) => {}
|
|
|
|
Err(..) => fail!()
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn listen_ip4() {
|
2013-12-15 20:17:43 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-11-07 17:13:06 -06:00
|
|
|
let addr = next_test_ip4();
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
do spawn {
|
|
|
|
let w = match TcpListener::bind(local_loop(), addr) {
|
2013-11-06 13:03:11 -06:00
|
|
|
Ok(w) => w, Err(e) => fail!("{:?}", e)
|
2013-10-22 17:13:18 -05:00
|
|
|
};
|
2013-11-07 17:13:06 -06:00
|
|
|
let mut w = match w.listen() {
|
|
|
|
Ok(w) => w, Err(e) => fail!("{:?}", e),
|
|
|
|
};
|
2013-12-03 18:44:16 -06:00
|
|
|
chan.send(());
|
2013-11-07 17:13:06 -06:00
|
|
|
match w.accept() {
|
|
|
|
Ok(mut stream) => {
|
|
|
|
let mut buf = [0u8, ..10];
|
|
|
|
match stream.read(buf) {
|
|
|
|
Ok(10) => {} e => fail!("{:?}", e),
|
|
|
|
}
|
|
|
|
for i in range(0, 10u8) {
|
|
|
|
assert_eq!(buf[i], i + 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Err(e) => fail!("{:?}", e)
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
|
|
|
|
port.recv();
|
|
|
|
let mut w = match TcpWatcher::connect(local_loop(), addr) {
|
|
|
|
Ok(w) => w, Err(e) => fail!("{:?}", e)
|
|
|
|
};
|
|
|
|
match w.write([1, 2, 3, 4, 5, 6, 7, 8, 9, 10]) {
|
|
|
|
Ok(()) => {}, Err(e) => fail!("{:?}", e)
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn listen_ip6() {
|
2013-12-15 20:17:43 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-11-07 17:13:06 -06:00
|
|
|
let addr = next_test_ip6();
|
2013-11-06 13:03:11 -06:00
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
do spawn {
|
|
|
|
let w = match TcpListener::bind(local_loop(), addr) {
|
2013-11-06 13:03:11 -06:00
|
|
|
Ok(w) => w, Err(e) => fail!("{:?}", e)
|
2013-10-22 17:13:18 -05:00
|
|
|
};
|
2013-11-07 17:13:06 -06:00
|
|
|
let mut w = match w.listen() {
|
|
|
|
Ok(w) => w, Err(e) => fail!("{:?}", e),
|
|
|
|
};
|
2013-12-03 18:44:16 -06:00
|
|
|
chan.send(());
|
2013-11-07 17:13:06 -06:00
|
|
|
match w.accept() {
|
|
|
|
Ok(mut stream) => {
|
|
|
|
let mut buf = [0u8, ..10];
|
|
|
|
match stream.read(buf) {
|
|
|
|
Ok(10) => {} e => fail!("{:?}", e),
|
|
|
|
}
|
|
|
|
for i in range(0, 10u8) {
|
|
|
|
assert_eq!(buf[i], i + 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Err(e) => fail!("{:?}", e)
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
|
|
|
|
port.recv();
|
|
|
|
let mut w = match TcpWatcher::connect(local_loop(), addr) {
|
|
|
|
Ok(w) => w, Err(e) => fail!("{:?}", e)
|
|
|
|
};
|
|
|
|
match w.write([1, 2, 3, 4, 5, 6, 7, 8, 9, 10]) {
|
|
|
|
Ok(()) => {}, Err(e) => fail!("{:?}", e)
|
|
|
|
}
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn udp_recv_ip4() {
|
2013-12-15 20:17:43 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-11-07 17:13:06 -06:00
|
|
|
let client = next_test_ip4();
|
|
|
|
let server = next_test_ip4();
|
|
|
|
|
|
|
|
do spawn {
|
|
|
|
match UdpWatcher::bind(local_loop(), server) {
|
|
|
|
Ok(mut w) => {
|
2013-12-03 18:44:16 -06:00
|
|
|
chan.send(());
|
2013-11-07 17:13:06 -06:00
|
|
|
let mut buf = [0u8, ..10];
|
|
|
|
match w.recvfrom(buf) {
|
|
|
|
Ok((10, addr)) => assert_eq!(addr, client),
|
|
|
|
e => fail!("{:?}", e),
|
|
|
|
}
|
|
|
|
for i in range(0, 10u8) {
|
|
|
|
assert_eq!(buf[i], i + 1);
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
Err(e) => fail!("{:?}", e)
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
}
|
2013-11-06 13:03:11 -06:00
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
port.recv();
|
|
|
|
let mut w = match UdpWatcher::bind(local_loop(), client) {
|
|
|
|
Ok(w) => w, Err(e) => fail!("{:?}", e)
|
|
|
|
};
|
|
|
|
match w.sendto([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], server) {
|
|
|
|
Ok(()) => {}, Err(e) => fail!("{:?}", e)
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn udp_recv_ip6() {
|
2013-12-15 20:17:43 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-11-07 17:13:06 -06:00
|
|
|
let client = next_test_ip6();
|
|
|
|
let server = next_test_ip6();
|
|
|
|
|
|
|
|
do spawn {
|
|
|
|
match UdpWatcher::bind(local_loop(), server) {
|
|
|
|
Ok(mut w) => {
|
2013-12-03 18:44:16 -06:00
|
|
|
chan.send(());
|
2013-11-07 17:13:06 -06:00
|
|
|
let mut buf = [0u8, ..10];
|
|
|
|
match w.recvfrom(buf) {
|
|
|
|
Ok((10, addr)) => assert_eq!(addr, client),
|
|
|
|
e => fail!("{:?}", e),
|
|
|
|
}
|
|
|
|
for i in range(0, 10u8) {
|
|
|
|
assert_eq!(buf[i], i + 1);
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
Err(e) => fail!("{:?}", e)
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
port.recv();
|
|
|
|
let mut w = match UdpWatcher::bind(local_loop(), client) {
|
|
|
|
Ok(w) => w, Err(e) => fail!("{:?}", e)
|
|
|
|
};
|
|
|
|
match w.sendto([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], server) {
|
|
|
|
Ok(()) => {}, Err(e) => fail!("{:?}", e)
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2013-11-06 13:03:11 -06:00
|
|
|
fn test_read_read_read() {
|
2013-11-07 17:13:06 -06:00
|
|
|
let addr = next_test_ip4();
|
|
|
|
static MAX: uint = 5000;
|
2013-12-15 20:17:43 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-11-07 17:13:06 -06:00
|
|
|
|
|
|
|
do spawn {
|
|
|
|
let listener = TcpListener::bind(local_loop(), addr).unwrap();
|
|
|
|
let mut acceptor = listener.listen().unwrap();
|
2013-12-03 18:44:16 -06:00
|
|
|
chan.send(());
|
2013-11-07 17:13:06 -06:00
|
|
|
let mut stream = acceptor.accept().unwrap();
|
|
|
|
let buf = [1, .. 2048];
|
|
|
|
let mut total_bytes_written = 0;
|
|
|
|
while total_bytes_written < MAX {
|
|
|
|
assert!(stream.write(buf).is_ok());
|
|
|
|
uvdebug!("wrote bytes");
|
|
|
|
total_bytes_written += buf.len();
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
}
|
2013-11-06 13:03:11 -06:00
|
|
|
|
2013-12-13 13:30:59 -06:00
|
|
|
port.recv();
|
|
|
|
let mut stream = TcpWatcher::connect(local_loop(), addr).unwrap();
|
|
|
|
let mut buf = [0, .. 2048];
|
|
|
|
let mut total_bytes_read = 0;
|
|
|
|
while total_bytes_read < MAX {
|
|
|
|
let nread = stream.read(buf).unwrap();
|
|
|
|
total_bytes_read += nread;
|
|
|
|
for i in range(0u, nread) {
|
|
|
|
assert_eq!(buf[i], 1);
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
}
|
2013-12-13 13:30:59 -06:00
|
|
|
uvdebug!("read {} bytes total", total_bytes_read);
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2013-11-09 13:02:16 -06:00
|
|
|
#[ignore(cfg(windows))] // FIXME(#10102) server never sees second packet
|
2013-11-06 13:03:11 -06:00
|
|
|
fn test_udp_twice() {
|
2013-11-07 17:13:06 -06:00
|
|
|
let server_addr = next_test_ip4();
|
|
|
|
let client_addr = next_test_ip4();
|
2013-12-15 20:17:43 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-07 17:13:06 -06:00
|
|
|
do spawn {
|
|
|
|
let mut client = UdpWatcher::bind(local_loop(), client_addr).unwrap();
|
2013-12-03 18:44:16 -06:00
|
|
|
port.recv();
|
2013-11-07 17:13:06 -06:00
|
|
|
assert!(client.sendto([1], server_addr).is_ok());
|
|
|
|
assert!(client.sendto([2], server_addr).is_ok());
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
|
|
|
|
let mut server = UdpWatcher::bind(local_loop(), server_addr).unwrap();
|
2013-12-03 18:44:16 -06:00
|
|
|
chan.send(());
|
2013-11-07 17:13:06 -06:00
|
|
|
let mut buf1 = [0];
|
|
|
|
let mut buf2 = [0];
|
|
|
|
let (nread1, src1) = server.recvfrom(buf1).unwrap();
|
|
|
|
let (nread2, src2) = server.recvfrom(buf2).unwrap();
|
|
|
|
assert_eq!(nread1, 1);
|
|
|
|
assert_eq!(nread2, 1);
|
|
|
|
assert_eq!(src1, client_addr);
|
|
|
|
assert_eq!(src2, client_addr);
|
|
|
|
assert_eq!(buf1[0], 1);
|
|
|
|
assert_eq!(buf2[0], 2);
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-06 13:03:11 -06:00
|
|
|
#[test]
|
|
|
|
fn test_udp_many_read() {
|
2013-11-07 17:13:06 -06:00
|
|
|
let server_out_addr = next_test_ip4();
|
|
|
|
let server_in_addr = next_test_ip4();
|
|
|
|
let client_out_addr = next_test_ip4();
|
|
|
|
let client_in_addr = next_test_ip4();
|
|
|
|
static MAX: uint = 500_000;
|
|
|
|
|
2013-12-15 20:17:43 -06:00
|
|
|
let (p1, c1) = Chan::new();
|
|
|
|
let (p2, c2) = Chan::new();
|
2013-11-07 17:13:06 -06:00
|
|
|
|
|
|
|
do spawn {
|
|
|
|
let l = local_loop();
|
|
|
|
let mut server_out = UdpWatcher::bind(l, server_out_addr).unwrap();
|
|
|
|
let mut server_in = UdpWatcher::bind(l, server_in_addr).unwrap();
|
2013-12-03 18:44:16 -06:00
|
|
|
let (port, chan) = (p1, c2);
|
2013-11-07 17:13:06 -06:00
|
|
|
chan.send(());
|
|
|
|
port.recv();
|
|
|
|
let msg = [1, .. 2048];
|
|
|
|
let mut total_bytes_sent = 0;
|
|
|
|
let mut buf = [1];
|
|
|
|
while buf[0] == 1 {
|
|
|
|
// send more data
|
|
|
|
assert!(server_out.sendto(msg, client_in_addr).is_ok());
|
|
|
|
total_bytes_sent += msg.len();
|
|
|
|
// check if the client has received enough
|
|
|
|
let res = server_in.recvfrom(buf);
|
|
|
|
assert!(res.is_ok());
|
|
|
|
let (nread, src) = res.unwrap();
|
|
|
|
assert_eq!(nread, 1);
|
|
|
|
assert_eq!(src, client_out_addr);
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-11-07 17:13:06 -06:00
|
|
|
assert!(total_bytes_sent >= MAX);
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-12-13 13:30:59 -06:00
|
|
|
let l = local_loop();
|
|
|
|
let mut client_out = UdpWatcher::bind(l, client_out_addr).unwrap();
|
|
|
|
let mut client_in = UdpWatcher::bind(l, client_in_addr).unwrap();
|
|
|
|
let (port, chan) = (p2, c1);
|
|
|
|
port.recv();
|
|
|
|
chan.send(());
|
|
|
|
let mut total_bytes_recv = 0;
|
|
|
|
let mut buf = [0, .. 2048];
|
|
|
|
while total_bytes_recv < MAX {
|
|
|
|
// ask for more
|
|
|
|
assert!(client_out.sendto([1], server_in_addr).is_ok());
|
|
|
|
// wait for data
|
|
|
|
let res = client_in.recvfrom(buf);
|
|
|
|
assert!(res.is_ok());
|
|
|
|
let (nread, src) = res.unwrap();
|
|
|
|
assert_eq!(src, server_out_addr);
|
|
|
|
total_bytes_recv += nread;
|
|
|
|
for i in range(0u, nread) {
|
|
|
|
assert_eq!(buf[i], 1);
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
}
|
2013-12-13 13:30:59 -06:00
|
|
|
// tell the server we're done
|
|
|
|
assert!(client_out.sendto([0], server_in_addr).is_ok());
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_read_and_block() {
|
2013-11-07 17:13:06 -06:00
|
|
|
let addr = next_test_ip4();
|
2013-12-13 13:30:59 -06:00
|
|
|
let (port, chan) = Chan::<Port<()>>::new();
|
2013-11-07 17:13:06 -06:00
|
|
|
|
|
|
|
do spawn {
|
2013-12-03 18:44:16 -06:00
|
|
|
let port2 = port.recv();
|
2013-11-07 17:13:06 -06:00
|
|
|
let mut stream = TcpWatcher::connect(local_loop(), addr).unwrap();
|
|
|
|
stream.write([0, 1, 2, 3, 4, 5, 6, 7]);
|
|
|
|
stream.write([0, 1, 2, 3, 4, 5, 6, 7]);
|
|
|
|
port2.recv();
|
|
|
|
stream.write([0, 1, 2, 3, 4, 5, 6, 7]);
|
|
|
|
stream.write([0, 1, 2, 3, 4, 5, 6, 7]);
|
|
|
|
port2.recv();
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-12-13 13:30:59 -06:00
|
|
|
|
|
|
|
let listener = TcpListener::bind(local_loop(), addr).unwrap();
|
|
|
|
let mut acceptor = listener.listen().unwrap();
|
|
|
|
let (port2, chan2) = Chan::new();
|
|
|
|
chan.send(port2);
|
|
|
|
let mut stream = acceptor.accept().unwrap();
|
|
|
|
let mut buf = [0, .. 2048];
|
|
|
|
|
|
|
|
let expected = 32;
|
|
|
|
let mut current = 0;
|
|
|
|
let mut reads = 0;
|
|
|
|
|
|
|
|
while current < expected {
|
|
|
|
let nread = stream.read(buf).unwrap();
|
|
|
|
for i in range(0u, nread) {
|
|
|
|
let val = buf[i] as uint;
|
|
|
|
assert_eq!(val, current % 8);
|
|
|
|
current += 1;
|
|
|
|
}
|
|
|
|
reads += 1;
|
|
|
|
|
|
|
|
chan2.try_send(());
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure we had multiple reads
|
|
|
|
assert!(reads > 1);
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-11-06 13:03:11 -06:00
|
|
|
#[test]
|
|
|
|
fn test_simple_tcp_server_and_client_on_diff_threads() {
|
|
|
|
let addr = next_test_ip4();
|
|
|
|
|
2013-12-13 13:30:59 -06:00
|
|
|
do spawn {
|
2013-11-07 17:13:06 -06:00
|
|
|
let listener = TcpListener::bind(local_loop(), addr).unwrap();
|
|
|
|
let mut acceptor = listener.listen().unwrap();
|
|
|
|
let mut stream = acceptor.accept().unwrap();
|
|
|
|
let mut buf = [0, .. 2048];
|
|
|
|
let nread = stream.read(buf).unwrap();
|
|
|
|
assert_eq!(nread, 8);
|
|
|
|
for i in range(0u, nread) {
|
|
|
|
assert_eq!(buf[i], i as u8);
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-06 13:03:11 -06:00
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
|
2013-12-13 13:30:59 -06:00
|
|
|
let mut stream = TcpWatcher::connect(local_loop(), addr);
|
|
|
|
while stream.is_err() {
|
|
|
|
stream = TcpWatcher::connect(local_loop(), addr);
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-12-13 13:30:59 -06:00
|
|
|
stream.unwrap().write([0, 1, 2, 3, 4, 5, 6, 7]);
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|
2013-11-06 13:03:11 -06:00
|
|
|
|
2013-11-07 22:13:25 -06:00
|
|
|
#[should_fail] #[test]
|
|
|
|
fn tcp_listener_fail_cleanup() {
|
|
|
|
let addr = next_test_ip4();
|
|
|
|
let w = TcpListener::bind(local_loop(), addr).unwrap();
|
|
|
|
let _w = w.listen().unwrap();
|
|
|
|
fail!();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[should_fail] #[test]
|
|
|
|
fn tcp_stream_fail_cleanup() {
|
2013-12-15 20:17:43 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-11-07 22:13:25 -06:00
|
|
|
let addr = next_test_ip4();
|
|
|
|
|
2013-11-21 18:55:40 -06:00
|
|
|
do spawn {
|
2013-11-07 22:13:25 -06:00
|
|
|
let w = TcpListener::bind(local_loop(), addr).unwrap();
|
|
|
|
let mut w = w.listen().unwrap();
|
2013-12-03 18:44:16 -06:00
|
|
|
chan.send(());
|
2013-11-07 22:13:25 -06:00
|
|
|
w.accept();
|
|
|
|
}
|
|
|
|
port.recv();
|
|
|
|
let _w = TcpWatcher::connect(local_loop(), addr).unwrap();
|
|
|
|
fail!();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[should_fail] #[test]
|
|
|
|
fn udp_listener_fail_cleanup() {
|
|
|
|
let addr = next_test_ip4();
|
|
|
|
let _w = UdpWatcher::bind(local_loop(), addr).unwrap();
|
|
|
|
fail!();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[should_fail] #[test]
|
|
|
|
fn udp_fail_other_task() {
|
|
|
|
let addr = next_test_ip4();
|
2013-12-15 20:17:43 -06:00
|
|
|
let (port, chan) = Chan::new();
|
2013-11-07 22:13:25 -06:00
|
|
|
|
|
|
|
// force the handle to be created on a different scheduler, failure in
|
|
|
|
// the original task will force a homing operation back to this
|
|
|
|
// scheduler.
|
2013-12-13 13:30:59 -06:00
|
|
|
do spawn {
|
2013-11-07 22:13:25 -06:00
|
|
|
let w = UdpWatcher::bind(local_loop(), addr).unwrap();
|
2013-12-03 18:44:16 -06:00
|
|
|
chan.send(w);
|
2013-11-07 22:13:25 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
let _w = port.recv();
|
|
|
|
fail!();
|
|
|
|
}
|
2013-10-22 17:13:18 -05:00
|
|
|
}
|