7 #include <sys/sendfile.h>
8 #include <sys/socket.h>
19 #include "mutexlock.h"
29 pthread_mutex_init(&mutex, NULL);
30 pthread_mutex_init(&queued_data_mutex, NULL);
32 epoll_fd = epoll_create(1024); // Size argument is ignored.
43 ret = close(epoll_fd);
44 } while (ret == -1 && errno == EINTR);
47 perror("close(epoll_fd)");
51 vector<ClientStats> Server::get_client_stats() const
53 vector<ClientStats> ret;
55 MutexLock lock(&mutex);
56 for (map<int, Client>::const_iterator client_it = clients.begin();
57 client_it != clients.end();
59 ret.push_back(client_it->second.get_stats());
64 void Server::do_work()
67 int nfds = epoll_wait(epoll_fd, events, EPOLL_MAX_EVENTS, EPOLL_TIMEOUT_MS);
68 if (nfds == -1 && errno == EINTR) {
79 MutexLock lock(&mutex); // We release the mutex between iterations.
81 process_queued_data();
83 for (int i = 0; i < nfds; ++i) {
84 int fd = events[i].data.fd;
85 assert(clients.count(fd) != 0);
86 Client *client = &clients[fd];
88 if (events[i].events & (EPOLLERR | EPOLLRDHUP | EPOLLHUP)) {
93 process_client(client);
96 for (map<string, Stream *>::iterator stream_it = streams.begin();
97 stream_it != streams.end();
99 vector<Client *> to_process;
100 swap(stream_it->second->to_process, to_process);
101 for (size_t i = 0; i < to_process.size(); ++i) {
102 process_client(to_process[i]);
112 CubemapStateProto Server::serialize()
114 // We don't serialize anything queued, so empty the queues.
115 process_queued_data();
117 CubemapStateProto serialized;
118 for (map<int, Client>::const_iterator client_it = clients.begin();
119 client_it != clients.end();
121 serialized.add_clients()->MergeFrom(client_it->second.serialize());
123 for (map<string, Stream *>::const_iterator stream_it = streams.begin();
124 stream_it != streams.end();
126 serialized.add_streams()->MergeFrom(stream_it->second->serialize());
131 void Server::add_client_deferred(int sock)
133 MutexLock lock(&queued_data_mutex);
134 queued_add_clients.push_back(sock);
137 void Server::add_client(int sock)
139 clients.insert(make_pair(sock, Client(sock)));
141 // Start listening on data from this socket.
143 ev.events = EPOLLIN | EPOLLET | EPOLLRDHUP;
144 ev.data.u64 = 0; // Keep Valgrind happy.
146 if (epoll_ctl(epoll_fd, EPOLL_CTL_ADD, sock, &ev) == -1) {
147 perror("epoll_ctl(EPOLL_CTL_ADD)");
151 process_client(&clients[sock]);
154 void Server::add_client_from_serialized(const ClientProto &client)
156 MutexLock lock(&mutex);
157 Stream *stream = find_stream(client.stream_id());
158 clients.insert(make_pair(client.sock(), Client(client, stream)));
159 Client *client_ptr = &clients[client.sock()];
161 // Start listening on data from this socket.
163 if (client.state() == Client::READING_REQUEST) {
164 ev.events = EPOLLIN | EPOLLET | EPOLLRDHUP;
166 // If we don't have more data for this client, we'll be putting it into
167 // the sleeping array again soon.
168 ev.events = EPOLLOUT | EPOLLET | EPOLLRDHUP;
170 ev.data.u64 = 0; // Keep Valgrind happy.
171 ev.data.fd = client.sock();
172 if (epoll_ctl(epoll_fd, EPOLL_CTL_ADD, client.sock(), &ev) == -1) {
173 perror("epoll_ctl(EPOLL_CTL_ADD)");
177 if (client_ptr->state == Client::SENDING_DATA &&
178 client_ptr->bytes_sent == client_ptr->stream->bytes_received) {
179 client_ptr->stream->put_client_to_sleep(client_ptr);
181 process_client(client_ptr);
185 void Server::add_stream(const string &stream_id, size_t backlog_size)
187 MutexLock lock(&mutex);
188 streams.insert(make_pair(stream_id, new Stream(stream_id, backlog_size)));
191 void Server::add_stream_from_serialized(const StreamProto &stream)
193 MutexLock lock(&mutex);
194 streams.insert(make_pair(stream.stream_id(), new Stream(stream)));
197 void Server::set_header(const string &stream_id, const string &header)
199 MutexLock lock(&mutex);
200 find_stream(stream_id)->header = header;
202 // If there are clients we haven't sent anything to yet, we should give
203 // them the header, so push back into the SENDING_HEADER state.
204 for (map<int, Client>::iterator client_it = clients.begin();
205 client_it != clients.end();
207 Client *client = &client_it->second;
208 if (client->state == Client::SENDING_DATA &&
209 client->bytes_sent == 0) {
210 construct_header(client);
215 void Server::set_mark_pool(const std::string &stream_id, MarkPool *mark_pool)
217 MutexLock lock(&mutex);
218 assert(clients.empty());
219 find_stream(stream_id)->mark_pool = mark_pool;
222 void Server::add_data_deferred(const string &stream_id, const char *data, size_t bytes)
224 MutexLock lock(&queued_data_mutex);
225 queued_data[stream_id].append(string(data, data + bytes));
228 // See the .h file for postconditions after this function.
229 void Server::process_client(Client *client)
231 switch (client->state) {
232 case Client::READING_REQUEST: {
234 // Try to read more of the request.
238 ret = read(client->sock, buf, sizeof(buf));
239 } while (ret == -1 && errno == EINTR);
241 if (ret == -1 && errno == EAGAIN) {
242 // No more data right now. Nothing to do.
243 // This is postcondition #2.
248 close_client(client);
252 // OK, the socket is closed.
253 close_client(client);
257 RequestParseStatus status = wait_for_double_newline(&client->request, buf, ret);
260 case RP_OUT_OF_SPACE:
261 fprintf(stderr, "WARNING: fd %d sent overlong request!\n", client->sock);
262 close_client(client);
264 case RP_NOT_FINISHED_YET:
265 // OK, we don't have the entire header yet. Fine; we'll get it later.
266 // See if there's more data for us.
267 goto read_request_again;
269 fprintf(stderr, "WARNING: fd %d had junk data after request!\n", client->sock);
270 close_client(client);
276 assert(status == RP_FINISHED);
278 int error_code = parse_request(client);
279 if (error_code == 200) {
280 construct_header(client);
282 construct_error(client, error_code);
285 // We've changed states, so fall through.
286 assert(client->state == Client::SENDING_ERROR ||
287 client->state == Client::SENDING_HEADER);
289 case Client::SENDING_ERROR:
290 case Client::SENDING_HEADER: {
291 sending_header_or_error_again:
294 ret = write(client->sock,
295 client->header_or_error.data() + client->header_or_error_bytes_sent,
296 client->header_or_error.size() - client->header_or_error_bytes_sent);
297 } while (ret == -1 && errno == EINTR);
299 if (ret == -1 && errno == EAGAIN) {
300 // We're out of socket space, so now we're at the “low edge” of epoll's
301 // edge triggering. epoll will tell us when there is more room, so for now,
303 // This is postcondition #4.
308 // Error! Postcondition #1.
310 close_client(client);
314 client->header_or_error_bytes_sent += ret;
315 assert(client->header_or_error_bytes_sent <= client->header_or_error.size());
317 if (client->header_or_error_bytes_sent < client->header_or_error.size()) {
318 // We haven't sent all yet. Fine; go another round.
319 goto sending_header_or_error_again;
322 // We're done sending the header or error! Clear it to release some memory.
323 client->header_or_error.clear();
325 if (client->state == Client::SENDING_ERROR) {
326 // We're done sending the error, so now close.
327 // This is postcondition #1.
328 close_client(client);
332 // Start sending from the end. In other words, we won't send any of the backlog,
333 // but we'll start sending immediately as we get data.
334 // This is postcondition #3.
335 client->state = Client::SENDING_DATA;
336 client->bytes_sent = client->stream->bytes_received;
337 client->stream->put_client_to_sleep(client);
340 case Client::SENDING_DATA: {
342 // See if there's some data we've lost. Ideally, we should drop to a block boundary,
343 // but resync will be the mux's problem.
344 Stream *stream = client->stream;
345 size_t bytes_to_send = stream->bytes_received - client->bytes_sent;
346 if (bytes_to_send == 0) {
349 if (bytes_to_send > stream->backlog_size) {
350 fprintf(stderr, "WARNING: fd %d lost %lld bytes, maybe too slow connection\n",
352 (long long int)(bytes_to_send - stream->backlog_size));
353 client->bytes_sent = stream->bytes_received - stream->backlog_size;
354 bytes_to_send = stream->backlog_size;
357 // See if we need to split across the circular buffer.
358 bool more_data = false;
359 if ((client->bytes_sent % stream->backlog_size) + bytes_to_send > stream->backlog_size) {
360 bytes_to_send = stream->backlog_size - (client->bytes_sent % stream->backlog_size);
366 loff_t offset = client->bytes_sent % stream->backlog_size;
367 ret = sendfile(client->sock, stream->data_fd, &offset, bytes_to_send);
368 } while (ret == -1 && errno == EINTR);
370 if (ret == -1 && errno == EAGAIN) {
371 // We're out of socket space, so return; epoll will wake us up
372 // when there is more room.
373 // This is postcondition #4.
377 // Error, close; postcondition #1.
379 close_client(client);
382 client->bytes_sent += ret;
384 if (client->bytes_sent == stream->bytes_received) {
385 // We don't have any more data for this client, so put it to sleep.
386 // This is postcondition #3.
387 stream->put_client_to_sleep(client);
388 } else if (more_data) {
389 goto sending_data_again;
398 int Server::parse_request(Client *client)
400 vector<string> lines = split_lines(client->request);
402 return 400; // Bad request (empty).
405 vector<string> request_tokens = split_tokens(lines[0]);
406 if (request_tokens.size() < 2) {
407 return 400; // Bad request (empty).
409 if (request_tokens[0] != "GET") {
410 return 400; // Should maybe be 405 instead?
412 if (streams.count(request_tokens[1]) == 0) {
413 return 404; // Not found.
416 client->stream_id = request_tokens[1];
417 client->stream = find_stream(client->stream_id);
418 if (client->stream->mark_pool != NULL) {
419 client->fwmark = client->stream->mark_pool->get_mark();
421 client->fwmark = 0; // No mark.
423 if (setsockopt(client->sock, SOL_SOCKET, SO_MARK, &client->fwmark, sizeof(client->fwmark)) == -1) {
424 if (client->fwmark != 0) {
425 perror("setsockopt(SO_MARK)");
428 client->request.clear();
433 void Server::construct_header(Client *client)
435 client->header_or_error = find_stream(client->stream_id)->header;
438 client->state = Client::SENDING_HEADER;
441 ev.events = EPOLLOUT | EPOLLET | EPOLLRDHUP;
442 ev.data.u64 = 0; // Keep Valgrind happy.
443 ev.data.fd = client->sock;
445 if (epoll_ctl(epoll_fd, EPOLL_CTL_MOD, client->sock, &ev) == -1) {
446 perror("epoll_ctl(EPOLL_CTL_MOD)");
451 void Server::construct_error(Client *client, int error_code)
454 snprintf(error, 256, "HTTP/1.0 %d Error\r\nContent-type: text/plain\r\n\r\nSomething went wrong. Sorry.\r\n",
456 client->header_or_error = error;
459 client->state = Client::SENDING_ERROR;
462 ev.events = EPOLLOUT | EPOLLET | EPOLLRDHUP;
463 ev.data.u64 = 0; // Keep Valgrind happy.
464 ev.data.fd = client->sock;
466 if (epoll_ctl(epoll_fd, EPOLL_CTL_MOD, client->sock, &ev) == -1) {
467 perror("epoll_ctl(EPOLL_CTL_MOD)");
473 void delete_from(vector<T> *v, T elem)
475 typename vector<T>::iterator new_end = remove(v->begin(), v->end(), elem);
476 v->erase(new_end, v->end());
479 void Server::close_client(Client *client)
481 if (epoll_ctl(epoll_fd, EPOLL_CTL_DEL, client->sock, NULL) == -1) {
482 perror("epoll_ctl(EPOLL_CTL_DEL)");
486 // This client could be sleeping, so we'll need to fix that. (Argh, O(n).)
487 if (client->stream != NULL) {
488 delete_from(&client->stream->sleeping_clients, client);
489 delete_from(&client->stream->to_process, client);
490 if (client->stream->mark_pool != NULL) {
491 int fwmark = client->fwmark;
492 client->stream->mark_pool->release_mark(fwmark);
499 ret = close(client->sock);
500 } while (ret == -1 && errno == EINTR);
506 clients.erase(client->sock);
509 Stream *Server::find_stream(const string &stream_id)
511 map<string, Stream *>::iterator it = streams.find(stream_id);
512 assert(it != streams.end());
516 void Server::process_queued_data()
518 MutexLock lock(&queued_data_mutex);
520 for (size_t i = 0; i < queued_add_clients.size(); ++i) {
521 add_client(queued_add_clients[i]);
523 queued_add_clients.clear();
525 for (map<string, string>::iterator queued_it = queued_data.begin();
526 queued_it != queued_data.end();
528 Stream *stream = find_stream(queued_it->first);
529 stream->add_data(queued_it->second.data(), queued_it->second.size());