7 #include <sys/socket.h>
10 #include <sys/ioctl.h>
11 #include <sys/epoll.h>
19 #include "mutexlock.h"
25 pthread_mutex_init(&mutex, NULL);
27 epoll_fd = epoll_create(1024); // Size argument is ignored.
37 pthread_create(&thread, NULL, Server::do_work_thunk, this);
40 void *Server::do_work_thunk(void *arg)
42 Server *server = static_cast<Server *>(arg);
47 void Server::do_work()
50 int nfds = epoll_wait(epoll_fd, events, EPOLL_MAX_EVENTS, EPOLL_TIMEOUT_MS);
52 MutexLock lock(&mutex); // We release the mutex between iterations.
58 for (int i = 0; i < nfds; ++i) {
59 int fd = events[i].data.fd;
60 assert(clients.count(fd) != 0);
61 Client *client = &clients[fd];
63 if (events[i].events & (EPOLLERR | EPOLLRDHUP | EPOLLHUP)) {
68 process_client(client);
73 void Server::add_client(int sock)
75 MutexLock lock(&mutex);
77 new_client.sock = sock;
78 new_client.client_request.reserve(1024);
79 new_client.state = Client::READING_REQUEST;
80 new_client.header_bytes_sent = 0;
81 new_client.bytes_sent = 0;
83 clients.insert(make_pair(sock, new_client));
85 // Start listening on data from this socket.
87 ev.events = EPOLLIN | EPOLLRDHUP;
89 if (epoll_ctl(epoll_fd, EPOLL_CTL_ADD, sock, &ev) == -1) {
90 perror("epoll_ctl(EPOLL_CTL_ADD)");
95 void Server::add_stream(const string &stream_id)
97 MutexLock lock(&mutex);
98 streams.insert(make_pair(stream_id, Stream()));
101 void Server::set_header(const string &stream_id, const string &header)
103 MutexLock lock(&mutex);
104 assert(streams.count(stream_id) != 0);
105 streams[stream_id].header = header;
108 void Server::add_data(const string &stream_id, const char *data, size_t bytes)
110 MutexLock lock(&mutex);
111 assert(streams.count(stream_id) != 0);
112 Stream *stream = &streams[stream_id];
113 size_t pos = stream->data_size % BACKLOG_SIZE;
114 stream->data_size += bytes;
116 if (pos + bytes > BACKLOG_SIZE) {
117 size_t to_copy = BACKLOG_SIZE - pos;
118 memcpy(stream->data + pos, data, to_copy);
124 memcpy(stream->data + pos, data, bytes);
126 // TODO: wake up clients
129 void Server::process_client(Client *client)
131 switch (client->state) {
132 case Client::READING_REQUEST: {
133 // Try to read more of the request.
135 int ret = read(client->sock, buf, sizeof(buf));
138 close_client(client);
142 // No data? This really means that we were triggered for something else than
143 // POLLIN (which suggests a logic error in epoll).
144 fprintf(stderr, "WARNING: fd %d returned unexpectedly 0 bytes!\n", client->sock);
145 close_client(client);
149 // Guard against overlong requests gobbling up all of our space.
150 if (client->client_request.size() + ret > MAX_CLIENT_REQUEST) {
151 fprintf(stderr, "WARNING: fd %d sent overlong request!\n", client->sock);
152 close_client(client);
156 // See if we have \r\n\r\n anywhere in the request. We start three bytes
157 // before what we just appended, in case we just got the final character.
158 size_t existing_req_bytes = client->client_request.size();
159 client->client_request.append(string(buf, buf + ret));
161 size_t start_at = (existing_req_bytes >= 3 ? existing_req_bytes - 3 : 0);
162 const char *ptr = reinterpret_cast<char *>(
163 memmem(client->client_request.data() + start_at, client->client_request.size() - start_at,
166 // OK, we don't have the entire header yet. Fine; we'll get it later.
170 if (ptr != client->client_request.data() + client->client_request.size() - 4) {
171 fprintf(stderr, "WARNING: fd %d had junk data after request!\n", client->sock);
172 close_client(client);
176 parse_request(client);
179 case Client::SENDING_HEADER: {
180 int ret = write(client->sock,
181 client->header.data() + client->header_bytes_sent,
182 client->header.size() - client->header_bytes_sent);
185 close_client(client);
189 client->header_bytes_sent += ret;
190 assert(client->header_bytes_sent <= client->header.size());
192 if (client->header_bytes_sent < client->header.size()) {
193 // We haven't sent all yet. Fine; we'll do that later.
197 // We're done sending the header! Clear the entire header to release some memory.
198 client->header.clear();
200 // Start sending from the end. In other words, we won't send any of the backlog,
201 // but we'll start sending immediately as we get data.
202 client->state = Client::SENDING_DATA;
203 client->bytes_sent = streams[client->stream_id].data_size;
206 case Client::SENDING_DATA: {
207 // See if there's some data we've lost. Ideally, we should drop to a block boundary,
208 // but resync will be the mux's problem.
209 const Stream &stream = streams[client->stream_id];
210 size_t bytes_to_send = stream.data_size - client->bytes_sent;
211 if (bytes_to_send > BACKLOG_SIZE) {
212 fprintf(stderr, "WARNING: fd %d lost %lld bytes, maybe too slow connection\n",
214 (long long int)(bytes_to_send - BACKLOG_SIZE));
215 client->bytes_sent = streams[client->stream_id].data_size - BACKLOG_SIZE;
216 bytes_to_send = BACKLOG_SIZE;
219 // See if we need to split across the circular buffer.
221 if ((client->bytes_sent % BACKLOG_SIZE) + bytes_to_send > BACKLOG_SIZE) {
225 ret = write(client->sock,
226 stream.data + (client->bytes_sent % BACKLOG_SIZE),
230 perror("write/writev");
231 close_client(client);
234 client->bytes_sent += ret;
236 // TODO: put clients to sleep
246 void Server::parse_request(Client *client)
248 // TODO: Actually parse the request. :-)
249 client->stream_id = "stream";
251 // Construct the header.
252 client->header = "HTTP/1.0 200 OK\r\nContent-type: todo/fixme\r\n\r\n" +
253 streams[client->stream_id].header;
256 client->state = Client::SENDING_HEADER;
259 ev.events = EPOLLOUT | EPOLLRDHUP;
260 ev.data.fd = client->sock;
262 if (epoll_ctl(epoll_fd, EPOLL_CTL_MOD, client->sock, &ev) == -1) {
263 perror("epoll_ctl(EPOLL_CTL_MOD)");
268 void Server::close_client(Client *client)
270 if (epoll_ctl(epoll_fd, EPOLL_CTL_DEL, client->sock, NULL) == -1) {
271 perror("epoll_ctl(EPOLL_CTL_DEL)");
277 clients.erase(client->sock);