7 #include <sys/socket.h>
10 #include <sys/ioctl.h>
11 #include <sys/epoll.h>
20 #include "mutexlock.h"
25 Client::Client(int sock)
27 state(Client::READING_REQUEST),
31 request.reserve(1024);
34 Client::Client(const ClientProto &serialized)
35 : sock(serialized.sock()),
36 state(State(serialized.state())),
37 request(serialized.request()),
38 stream_id(serialized.stream_id()),
39 header(serialized.header()),
40 header_bytes_sent(serialized.header_bytes_sent()),
41 bytes_sent(serialized.bytes_sent())
45 ClientProto Client::serialize() const
47 ClientProto serialized;
48 serialized.set_sock(sock);
49 serialized.set_state(state);
50 serialized.set_request(request);
51 serialized.set_stream_id(stream_id);
52 serialized.set_header(header);
53 serialized.set_header_bytes_sent(serialized.header_bytes_sent());
54 serialized.set_bytes_sent(bytes_sent);
58 Stream::Stream(const string &stream_id)
59 : stream_id(stream_id),
60 data(new char[BACKLOG_SIZE]),
63 memset(data, 0, BACKLOG_SIZE);
71 Stream::Stream(const StreamProto &serialized)
72 : stream_id(serialized.stream_id()),
73 header(serialized.header()),
74 data(new char[BACKLOG_SIZE]),
75 data_size(serialized.data_size())
77 assert(serialized.data().size() == BACKLOG_SIZE);
78 memcpy(data, serialized.data().data(), BACKLOG_SIZE);
81 StreamProto Stream::serialize() const
83 StreamProto serialized;
84 serialized.set_header(header);
85 serialized.set_data(string(data, data + BACKLOG_SIZE));
86 serialized.set_data_size(data_size);
87 serialized.set_stream_id(stream_id);
93 pthread_mutex_init(&mutex, NULL);
95 epoll_fd = epoll_create(1024); // Size argument is ignored.
111 // Joinable is already the default, but it's good to be certain.
113 pthread_attr_init(&attr);
114 pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_JOINABLE);
115 pthread_create(&worker_thread, &attr, Server::do_work_thunk, this);
121 MutexLock lock(&mutex);
125 if (pthread_join(worker_thread, NULL) == -1) {
126 perror("pthread_join");
131 void *Server::do_work_thunk(void *arg)
133 Server *server = static_cast<Server *>(arg);
138 void Server::do_work()
141 int nfds = epoll_wait(epoll_fd, events, EPOLL_MAX_EVENTS, EPOLL_TIMEOUT_MS);
143 perror("epoll_wait");
147 MutexLock lock(&mutex); // We release the mutex between iterations.
153 for (int i = 0; i < nfds; ++i) {
154 int fd = events[i].data.fd;
155 assert(clients.count(fd) != 0);
156 Client *client = &clients[fd];
158 if (events[i].events & (EPOLLERR | EPOLLRDHUP | EPOLLHUP)) {
159 close_client(client);
163 process_client(client);
168 CubemapStateProto Server::serialize() const
170 CubemapStateProto serialized;
171 for (map<int, Client>::const_iterator client_it = clients.begin();
172 client_it != clients.end();
174 serialized.add_clients()->MergeFrom(client_it->second.serialize());
176 for (map<string, Stream *>::const_iterator stream_it = streams.begin();
177 stream_it != streams.end();
179 serialized.add_streams()->MergeFrom(stream_it->second->serialize());
184 void Server::add_client(int sock)
186 MutexLock lock(&mutex);
187 clients.insert(make_pair(sock, Client(sock)));
189 // Start listening on data from this socket.
191 ev.events = EPOLLIN | EPOLLRDHUP;
192 ev.data.u64 = 0; // Keep Valgrind happy.
194 if (epoll_ctl(epoll_fd, EPOLL_CTL_ADD, sock, &ev) == -1) {
195 perror("epoll_ctl(EPOLL_CTL_ADD)");
200 void Server::add_client_from_serialized(const ClientProto &client)
202 MutexLock lock(&mutex);
203 clients.insert(make_pair(client.sock(), Client(client)));
205 // Start listening on data from this socket.
207 if (client.state() == Client::READING_REQUEST) {
208 ev.events = EPOLLIN | EPOLLRDHUP;
210 // If we don't have more data for this client, we'll be putting it into
211 // the sleeping array again soon.
212 ev.events = EPOLLOUT | EPOLLRDHUP;
214 ev.data.u64 = 0; // Keep Valgrind happy.
215 ev.data.fd = client.sock();
216 if (epoll_ctl(epoll_fd, EPOLL_CTL_ADD, client.sock(), &ev) == -1) {
217 perror("epoll_ctl(EPOLL_CTL_ADD)");
222 void Server::add_stream(const string &stream_id)
224 MutexLock lock(&mutex);
225 streams.insert(make_pair(stream_id, new Stream(stream_id)));
228 void Server::add_stream_from_serialized(const StreamProto &stream)
230 MutexLock lock(&mutex);
231 streams.insert(make_pair(stream.stream_id(), new Stream(stream)));
234 void Server::set_header(const string &stream_id, const string &header)
236 MutexLock lock(&mutex);
237 find_stream(stream_id)->header = header;
239 // If there are clients we haven't sent anything to yet, we should give
240 // them the header, so push back into the SENDING_HEADER state.
241 for (map<int, Client>::iterator client_it = clients.begin();
242 client_it != clients.end();
244 Client *client = &client_it->second;
245 if (client->state == Client::SENDING_DATA &&
246 client->bytes_sent == 0) {
247 construct_header(client);
252 void Server::add_data(const string &stream_id, const char *data, size_t bytes)
258 MutexLock lock(&mutex);
259 Stream *stream = find_stream(stream_id);
260 size_t pos = stream->data_size % BACKLOG_SIZE;
261 stream->data_size += bytes;
263 if (pos + bytes > BACKLOG_SIZE) {
264 size_t to_copy = BACKLOG_SIZE - pos;
265 memcpy(stream->data + pos, data, to_copy);
271 memcpy(stream->data + pos, data, bytes);
272 wake_up_all_clients();
275 void Server::process_client(Client *client)
277 switch (client->state) {
278 case Client::READING_REQUEST: {
279 // Try to read more of the request.
281 int ret = read(client->sock, buf, sizeof(buf));
284 close_client(client);
288 // No data? This really means that we were triggered for something else than
289 // POLLIN (which suggests a logic error in epoll).
290 fprintf(stderr, "WARNING: fd %d returned unexpectedly 0 bytes!\n", client->sock);
291 close_client(client);
295 // Guard against overlong requests gobbling up all of our space.
296 if (client->request.size() + ret > MAX_CLIENT_REQUEST) {
297 fprintf(stderr, "WARNING: fd %d sent overlong request!\n", client->sock);
298 close_client(client);
302 // See if we have \r\n\r\n anywhere in the request. We start three bytes
303 // before what we just appended, in case we just got the final character.
304 size_t existing_req_bytes = client->request.size();
305 client->request.append(string(buf, buf + ret));
307 size_t start_at = (existing_req_bytes >= 3 ? existing_req_bytes - 3 : 0);
308 const char *ptr = reinterpret_cast<char *>(
309 memmem(client->request.data() + start_at, client->request.size() - start_at,
312 // OK, we don't have the entire header yet. Fine; we'll get it later.
316 if (ptr != client->request.data() + client->request.size() - 4) {
317 fprintf(stderr, "WARNING: fd %d had junk data after request!\n", client->sock);
318 close_client(client);
322 parse_request(client);
323 construct_header(client);
326 case Client::SENDING_HEADER: {
327 int ret = write(client->sock,
328 client->header.data() + client->header_bytes_sent,
329 client->header.size() - client->header_bytes_sent);
332 close_client(client);
336 client->header_bytes_sent += ret;
337 assert(client->header_bytes_sent <= client->header.size());
339 if (client->header_bytes_sent < client->header.size()) {
340 // We haven't sent all yet. Fine; we'll do that later.
344 // We're done sending the header! Clear the entire header to release some memory.
345 client->header.clear();
347 // Start sending from the end. In other words, we won't send any of the backlog,
348 // but we'll start sending immediately as we get data.
349 client->state = Client::SENDING_DATA;
350 client->bytes_sent = find_stream(client->stream_id)->data_size;
353 case Client::SENDING_DATA: {
354 // See if there's some data we've lost. Ideally, we should drop to a block boundary,
355 // but resync will be the mux's problem.
356 const Stream &stream = *find_stream(client->stream_id);
357 size_t bytes_to_send = stream.data_size - client->bytes_sent;
358 if (bytes_to_send > BACKLOG_SIZE) {
359 fprintf(stderr, "WARNING: fd %d lost %lld bytes, maybe too slow connection\n",
361 (long long int)(bytes_to_send - BACKLOG_SIZE));
362 client->bytes_sent = find_stream(client->stream_id)->data_size - BACKLOG_SIZE;
363 bytes_to_send = BACKLOG_SIZE;
366 // See if we need to split across the circular buffer.
368 if ((client->bytes_sent % BACKLOG_SIZE) + bytes_to_send > BACKLOG_SIZE) {
369 size_t bytes_first_part = BACKLOG_SIZE - (client->bytes_sent % BACKLOG_SIZE);
372 iov[0].iov_base = const_cast<char *>(stream.data + (client->bytes_sent % BACKLOG_SIZE));
373 iov[0].iov_len = bytes_first_part;
375 iov[1].iov_base = const_cast<char *>(stream.data);
376 iov[1].iov_len = bytes_to_send - bytes_first_part;
378 ret = writev(client->sock, iov, 2);
380 ret = write(client->sock,
381 stream.data + (client->bytes_sent % BACKLOG_SIZE),
385 perror("write/writev");
386 close_client(client);
389 client->bytes_sent += ret;
391 if (client->bytes_sent == stream.data_size) {
392 // We don't have any more data for this client, so put it to sleep.
393 put_client_to_sleep(client);
402 void Server::parse_request(Client *client)
404 // TODO: Actually parse the request. :-)
405 client->stream_id = "stream";
406 client->request.clear();
409 void Server::construct_header(Client *client)
411 client->header = "HTTP/1.0 200 OK\r\nContent-type: video/x-flv\r\nCache-Control: no-cache\r\n\r\n" +
412 find_stream(client->stream_id)->header;
415 client->state = Client::SENDING_HEADER;
418 ev.events = EPOLLOUT | EPOLLRDHUP;
419 ev.data.u64 = 0; // Keep Valgrind happy.
420 ev.data.fd = client->sock;
422 if (epoll_ctl(epoll_fd, EPOLL_CTL_MOD, client->sock, &ev) == -1) {
423 perror("epoll_ctl(EPOLL_CTL_MOD)");
428 void Server::close_client(Client *client)
430 if (epoll_ctl(epoll_fd, EPOLL_CTL_DEL, client->sock, NULL) == -1) {
431 perror("epoll_ctl(EPOLL_CTL_DEL)");
435 // This client could be sleeping, so we'll need to fix that. (Argh, O(n).)
436 vector<int>::iterator new_end =
437 remove(sleeping_clients.begin(), sleeping_clients.end(), client->sock);
438 sleeping_clients.erase(new_end, sleeping_clients.end());
442 clients.erase(client->sock);
445 void Server::put_client_to_sleep(Client *client)
448 ev.events = EPOLLRDHUP;
449 ev.data.u64 = 0; // Keep Valgrind happy.
450 ev.data.fd = client->sock;
452 if (epoll_ctl(epoll_fd, EPOLL_CTL_MOD, client->sock, &ev) == -1) {
453 perror("epoll_ctl(EPOLL_CTL_MOD)");
457 sleeping_clients.push_back(client->sock);
460 void Server::wake_up_all_clients()
462 for (unsigned i = 0; i < sleeping_clients.size(); ++i) {
464 ev.events = EPOLLOUT | EPOLLRDHUP;
465 ev.data.u64 = 0; // Keep Valgrind happy.
466 ev.data.fd = sleeping_clients[i];
467 if (epoll_ctl(epoll_fd, EPOLL_CTL_MOD, sleeping_clients[i], &ev) == -1) {
468 perror("epoll_ctl(EPOLL_CTL_MOD)");
472 sleeping_clients.clear();
475 Stream *Server::find_stream(const string &stream_id)
477 map<string, Stream *>::iterator it = streams.find(stream_id);
478 assert(it != streams.end());