X-Git-Url: https://git.sesse.net/?p=cubemap;a=blobdiff_plain;f=server.cpp;h=25da16cba4c341e0c07b8d06eb4239a63a0f476c;hp=31e5c0a31da327bc80499c543bbb4dee932b74bb;hb=cfe0df3728d8155fb03688f6db69e00971e23685;hpb=fcdb2b3926312cbd42e2d45bb4cec8f984fb325c diff --git a/server.cpp b/server.cpp index 31e5c0a..25da16c 100644 --- a/server.cpp +++ b/server.cpp @@ -47,9 +47,26 @@ void *Server::do_work_thunk(void *arg) void Server::do_work() { for ( ;; ) { - MutexLock lock(&mutex); - printf("server thread running\n"); - sleep(1); + int nfds = epoll_wait(epoll_fd, events, EPOLL_MAX_EVENTS, EPOLL_TIMEOUT_MS); + + MutexLock lock(&mutex); // We release the mutex between iterations. + if (nfds == -1) { + perror("epoll_wait"); + exit(1); + } + + for (int i = 0; i < nfds; ++i) { + int fd = events[i].data.fd; + assert(clients.count(fd) != 0); + Client *client = &clients[fd]; + + if (events[i].events & (EPOLLERR | EPOLLRDHUP | EPOLLHUP)) { + close_client(client); + continue; + } + + process_client(client); + } } } @@ -57,6 +74,8 @@ void Server::add_client(int sock) { MutexLock lock(&mutex); Client new_client; + new_client.sock = sock; + new_client.client_request.reserve(1024); new_client.state = Client::READING_REQUEST; new_client.header_bytes_sent = 0; new_client.bytes_sent = 0; @@ -65,7 +84,7 @@ void Server::add_client(int sock) // Start listening on data from this socket. epoll_event ev; - ev.events = EPOLLIN; + ev.events = EPOLLIN | EPOLLRDHUP; ev.data.fd = sock; if (epoll_ctl(epoll_fd, EPOLL_CTL_ADD, sock, &ev) == -1) { perror("epoll_ctl(EPOLL_CTL_ADD)"); @@ -88,3 +107,80 @@ void Server::add_data(const string &stream_id, const char *data, size_t bytes) { // TODO } + +void Server::process_client(Client *client) +{ + switch (client->state) { + case Client::READING_REQUEST: { + // Try to read more of the request. + char buf[1024]; + int ret = read(client->sock, buf, sizeof(buf)); + if (ret == -1) { + perror("read"); + close_client(client); + return; + } + if (ret == 0) { + // No data? This really means that we were triggered for something else than + // POLLIN (which suggests a logic error in epoll). + fprintf(stderr, "WARNING: fd %d returned unexpectedly 0 bytes!\n", client->sock); + close_client(client); + return; + } + + // Guard against overlong requests gobbling up all of our space. + if (client->client_request.size() + ret > MAX_CLIENT_REQUEST) { + fprintf(stderr, "WARNING: fd %d sent overlong request!\n", client->sock); + close_client(client); + return; + } + + // See if we have \r\n\r\n anywhere in the request. We start three bytes + // before what we just appended, in case we just got the final character. + size_t existing_req_bytes = client->client_request.size(); + client->client_request.append(string(buf, buf + ret)); + + size_t start_at = (existing_req_bytes >= 3 ? existing_req_bytes - 3 : 0); + const char *ptr = reinterpret_cast( + memmem(client->client_request.data() + start_at, client->client_request.size() - start_at, + "\r\n\r\n", 4)); + if (ptr == NULL) { + // OK, we don't have the entire header yet. Fine; we'll get it later. + return; + } + + if (ptr != client->client_request.data() + client->client_request.size() - 4) { + fprintf(stderr, "WARNING: fd %d had junk data after request!\n", client->sock); + close_client(client); + return; + } + + client->state = Client::SENDING_HEADER; + + epoll_event ev; + ev.events = EPOLLOUT | EPOLLRDHUP; + ev.data.fd = client->sock; + + if (epoll_ctl(epoll_fd, EPOLL_CTL_MOD, client->sock, &ev) == -1) { + perror("epoll_ctl(EPOLL_CTL_MOD)"); + exit(1); + } + break; + } + default: + // TODO + assert(false); + } +} + +void Server::close_client(Client *client) +{ + if (epoll_ctl(epoll_fd, EPOLL_CTL_DEL, client->sock, NULL) == -1) { + perror("epoll_ctl(EPOLL_CTL_DEL)"); + exit(1); + } + + // Bye-bye! + close(client->sock); + clients.erase(client->sock); +}