|
|
@ -385,21 +385,12 @@ void help( char *name ) { |
|
|
|
); |
|
|
|
); |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
void handle_read( int64 clientsocket, int afteraccept ) { |
|
|
|
void handle_read( int64 clientsocket ) { |
|
|
|
struct http_data* h = io_getcookie( clientsocket ); |
|
|
|
struct http_data* h = io_getcookie( clientsocket ); |
|
|
|
int l = io_tryread( clientsocket, static_scratch, sizeof static_scratch ); |
|
|
|
int l = io_tryread( clientsocket, static_scratch, sizeof static_scratch ); |
|
|
|
tai6464 t; |
|
|
|
tai6464 t; |
|
|
|
|
|
|
|
|
|
|
|
taia_now(&t); |
|
|
|
|
|
|
|
taia_addsec(&t,&t,OT_CLIENT_TIMEOUT); |
|
|
|
|
|
|
|
io_timeout(clientsocket,t); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if( l <= 0 ) { |
|
|
|
if( l <= 0 ) { |
|
|
|
// getting 0 bytes doesn't mean connection closed,
|
|
|
|
|
|
|
|
// when we try the shortcut read() after accept()
|
|
|
|
|
|
|
|
// and nothing is there yet
|
|
|
|
|
|
|
|
if( afteraccept && ( errno == EAGAIN ) ) |
|
|
|
|
|
|
|
return; |
|
|
|
|
|
|
|
if( h ) { |
|
|
|
if( h ) { |
|
|
|
array_reset(&h->r); |
|
|
|
array_reset(&h->r); |
|
|
|
free(h); |
|
|
|
free(h); |
|
|
@ -416,26 +407,47 @@ void handle_read( int64 clientsocket, int afteraccept ) { |
|
|
|
httperror(clientsocket,h,"500 request too long","You sent too much headers"); |
|
|
|
httperror(clientsocket,h,"500 request too long","You sent too much headers"); |
|
|
|
else if ((l=header_complete(h))) |
|
|
|
else if ((l=header_complete(h))) |
|
|
|
httpresponse(clientsocket,h); |
|
|
|
httpresponse(clientsocket,h); |
|
|
|
|
|
|
|
else { |
|
|
|
|
|
|
|
taia_now(&t); |
|
|
|
|
|
|
|
taia_addsec(&t,&t,OT_CLIENT_TIMEOUT); |
|
|
|
|
|
|
|
io_timeout(clientsocket,t); |
|
|
|
|
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
void server_mainloop( int64 serversocket ) { |
|
|
|
void handle_accept( int64 serversocket ) { |
|
|
|
tai6464 t, next_timeout_check; |
|
|
|
struct http_data* h; |
|
|
|
unsigned char ip[4]; |
|
|
|
unsigned char ip[4]; |
|
|
|
uint16 port; |
|
|
|
uint16 port; |
|
|
|
|
|
|
|
tai6464 t; |
|
|
|
|
|
|
|
int64 i; |
|
|
|
|
|
|
|
|
|
|
|
io_wantread( serversocket ); |
|
|
|
while( ( i = socket_accept4( serversocket, (char*)ip, &port) ) != -1 ) { |
|
|
|
taia_now( &next_timeout_check ); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
for (;;) { |
|
|
|
if( !io_fd( i ) || |
|
|
|
int64 i; |
|
|
|
!(h = (struct http_data*)malloc(sizeof(struct http_data))) ) { |
|
|
|
int handled_connections = 1024; |
|
|
|
io_close( i ); |
|
|
|
|
|
|
|
continue; |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
taia_now(&t); |
|
|
|
io_wantread( i ); |
|
|
|
taia_addsec(&t,&t,OT_CLIENT_TIMEOUT_CHECKINTERVAL); |
|
|
|
|
|
|
|
io_waituntil(t); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
byte_zero(h,sizeof(struct http_data)); |
|
|
|
|
|
|
|
memmove(h->ip,ip,sizeof(ip)); |
|
|
|
|
|
|
|
io_setcookie(i,h); |
|
|
|
|
|
|
|
++ot_overall_connections; |
|
|
|
taia_now(&t); |
|
|
|
taia_now(&t); |
|
|
|
if( taia_less( &next_timeout_check, &t ) ) { |
|
|
|
taia_addsec(&t,&t,OT_CLIENT_TIMEOUT); |
|
|
|
|
|
|
|
io_timeout(i,t); |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if( errno==EAGAIN ) |
|
|
|
|
|
|
|
io_eagain( serversocket ); |
|
|
|
|
|
|
|
else |
|
|
|
|
|
|
|
carp( "socket_accept4" ); |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void handle_timeouted( ) { |
|
|
|
|
|
|
|
int64 i; |
|
|
|
while( ( i = io_timeouted() ) != -1 ) { |
|
|
|
while( ( i = io_timeouted() ) != -1 ) { |
|
|
|
struct http_data* h=io_getcookie(i); |
|
|
|
struct http_data* h=io_getcookie(i); |
|
|
|
if( h ) { |
|
|
|
if( h ) { |
|
|
@ -444,40 +456,33 @@ void server_mainloop( int64 serversocket ) { |
|
|
|
} |
|
|
|
} |
|
|
|
io_close(i); |
|
|
|
io_close(i); |
|
|
|
} |
|
|
|
} |
|
|
|
taia_now(&next_timeout_check); |
|
|
|
} |
|
|
|
taia_addsec(&next_timeout_check,&next_timeout_check,OT_CLIENT_TIMEOUT_CHECKINTERVAL); |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
while( --handled_connections && ( ( i = io_canread() ) != -1 ) ) { |
|
|
|
void server_mainloop( int64 serversocket ) { |
|
|
|
|
|
|
|
tai6464 t, next_timeout_check; |
|
|
|
|
|
|
|
|
|
|
|
if( i != serversocket ) { |
|
|
|
io_wantread( serversocket ); |
|
|
|
handle_read( i, 0 ); |
|
|
|
taia_now( &next_timeout_check ); |
|
|
|
continue; |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Attention, i changes from what io_canread() returned to
|
|
|
|
for (;;) { |
|
|
|
// what socket_accept4 returns as new socket
|
|
|
|
int64 i; |
|
|
|
while( ( i = socket_accept4( serversocket, (char*)ip, &port) ) != -1 ) { |
|
|
|
|
|
|
|
if( io_fd( i ) ) { |
|
|
|
|
|
|
|
struct http_data* h=(struct http_data*)malloc(sizeof(struct http_data)); |
|
|
|
|
|
|
|
io_wantread( i ); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (h) { |
|
|
|
taia_now(&t); |
|
|
|
byte_zero(h,sizeof(struct http_data)); |
|
|
|
taia_addsec(&t,&t,OT_CLIENT_TIMEOUT_CHECKINTERVAL); |
|
|
|
memmove(h->ip,ip,sizeof(ip)); |
|
|
|
io_waituntil(t); |
|
|
|
io_setcookie(i,h); |
|
|
|
|
|
|
|
++ot_overall_connections; |
|
|
|
|
|
|
|
handle_read(i,1); |
|
|
|
|
|
|
|
} else |
|
|
|
|
|
|
|
io_close(i); |
|
|
|
|
|
|
|
} else |
|
|
|
|
|
|
|
io_close(i); |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if( errno==EAGAIN ) |
|
|
|
while( ( i = io_canread() ) != -1 ) { |
|
|
|
io_eagain( serversocket ); |
|
|
|
if( i == serversocket ) |
|
|
|
|
|
|
|
handle_accept( i ); |
|
|
|
else |
|
|
|
else |
|
|
|
carp( "socket_accept4" ); |
|
|
|
handle_read( i ); |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
taia_now(&t); |
|
|
|
|
|
|
|
if( taia_less( &next_timeout_check, &t ) ) { |
|
|
|
|
|
|
|
handle_timeouted( ); |
|
|
|
|
|
|
|
taia_now(&next_timeout_check); |
|
|
|
|
|
|
|
taia_addsec(&next_timeout_check,&next_timeout_check,OT_CLIENT_TIMEOUT_CHECKINTERVAL); |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|