opal-up 0.0.4 → 0.0.5
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/ext/up_ext/App.h +665 -544
- data/ext/up_ext/AsyncSocket.h +307 -284
- data/ext/up_ext/AsyncSocketData.h +35 -51
- data/ext/up_ext/BloomFilter.h +37 -42
- data/ext/up_ext/ChunkedEncoding.h +174 -175
- data/ext/up_ext/ClientApp.h +20 -23
- data/ext/up_ext/HttpContext.h +476 -381
- data/ext/up_ext/HttpContextData.h +20 -20
- data/ext/up_ext/HttpErrors.h +14 -10
- data/ext/up_ext/HttpParser.h +631 -563
- data/ext/up_ext/HttpResponse.h +526 -460
- data/ext/up_ext/HttpResponseData.h +59 -55
- data/ext/up_ext/HttpRouter.h +328 -310
- data/ext/up_ext/Loop.h +174 -168
- data/ext/up_ext/LoopData.h +60 -67
- data/ext/up_ext/MoveOnlyFunction.h +71 -80
- data/ext/up_ext/PerMessageDeflate.h +218 -198
- data/ext/up_ext/ProxyParser.h +100 -99
- data/ext/up_ext/QueryParser.h +91 -84
- data/ext/up_ext/TopicTree.h +273 -268
- data/ext/up_ext/Utilities.h +25 -25
- data/ext/up_ext/WebSocket.h +376 -310
- data/ext/up_ext/WebSocketContext.h +487 -372
- data/ext/up_ext/WebSocketContextData.h +74 -62
- data/ext/up_ext/WebSocketData.h +53 -46
- data/ext/up_ext/WebSocketExtensions.h +194 -178
- data/ext/up_ext/WebSocketHandshake.h +115 -110
- data/ext/up_ext/WebSocketProtocol.h +441 -398
- data/ext/up_ext/up_ext.c +43 -5
- data/lib/up/ruby/cluster.rb +29 -6
- data/lib/up/version.rb +1 -1
- metadata +2 -2
data/ext/up_ext/AsyncSocket.h
CHANGED
@@ -20,336 +20,359 @@
|
|
20
20
|
|
21
21
|
/* This class implements async socket memory management strategies */
|
22
22
|
|
23
|
-
/* NOTE: Many unsigned/signed conversion warnings could be solved by moving from
|
24
|
-
* to unsigned length for everything to/from uSockets - this would
|
25
|
-
* to signal error with -1 (which is how the
|
23
|
+
/* NOTE: Many unsigned/signed conversion warnings could be solved by moving from
|
24
|
+
* int length to unsigned length for everything to/from uSockets - this would
|
25
|
+
* however remove the opportunity to signal error with -1 (which is how the
|
26
|
+
* entire UNIX syscalling is built). */
|
26
27
|
|
27
28
|
#include <cstring>
|
28
29
|
#include <iostream>
|
29
30
|
|
30
31
|
#include "libusockets.h"
|
31
32
|
|
32
|
-
#include "LoopData.h"
|
33
33
|
#include "AsyncSocketData.h"
|
34
|
+
#include "LoopData.h"
|
34
35
|
|
35
36
|
namespace uWS {
|
36
37
|
|
37
|
-
|
38
|
-
NEEDS_NOTHING,
|
39
|
-
NEEDS_DRAIN,
|
40
|
-
NEEDS_UNCORK
|
41
|
-
};
|
38
|
+
enum SendBufferAttribute { NEEDS_NOTHING, NEEDS_DRAIN, NEEDS_UNCORK };
|
42
39
|
|
43
|
-
|
40
|
+
template <bool, bool, typename> struct WebSocketContext;
|
44
41
|
|
45
|
-
template <bool SSL>
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
template <bool> friend struct HttpResponse;
|
42
|
+
template <bool SSL> struct AsyncSocket {
|
43
|
+
/* This guy is promiscuous */
|
44
|
+
template <bool> friend struct HttpContext;
|
45
|
+
template <bool, bool, typename> friend struct WebSocketContext;
|
46
|
+
template <bool> friend struct TemplatedApp;
|
47
|
+
template <bool, typename> friend struct WebSocketContextData;
|
48
|
+
template <typename, typename> friend struct TopicTree;
|
49
|
+
template <bool> friend struct HttpResponse;
|
54
50
|
|
55
51
|
private:
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
52
|
+
/* Helper, do not use directly (todo: move to uSockets or de-crazify) */
|
53
|
+
void throttle_helper(int toggle) {
|
54
|
+
/* These should be exposed by uSockets */
|
55
|
+
static thread_local int us_events[2] = {0, 0};
|
56
|
+
|
57
|
+
struct us_poll_t *p = (struct us_poll_t *)this;
|
58
|
+
struct us_loop_t *loop = us_socket_context_loop(
|
59
|
+
SSL, us_socket_context(SSL, (us_socket_t *)this));
|
60
|
+
|
61
|
+
if (toggle) {
|
62
|
+
/* Pause */
|
63
|
+
int events = us_poll_events(p);
|
64
|
+
if (events) {
|
65
|
+
us_events[getBufferedAmount() ? 1 : 0] = events;
|
66
|
+
}
|
67
|
+
us_poll_change(p, loop, 0);
|
68
|
+
} else {
|
69
|
+
/* Resume */
|
70
|
+
int events = us_events[getBufferedAmount() ? 1 : 0];
|
71
|
+
us_poll_change(p, loop, events);
|
76
72
|
}
|
73
|
+
}
|
77
74
|
|
78
75
|
protected:
|
79
|
-
|
80
|
-
|
81
|
-
|
76
|
+
/* Returns SSL pointer or FD as pointer */
|
77
|
+
void *getNativeHandle() {
|
78
|
+
return us_socket_get_native_handle(SSL, (us_socket_t *)this);
|
79
|
+
}
|
80
|
+
|
81
|
+
/* Get loop data for socket */
|
82
|
+
LoopData *getLoopData() {
|
83
|
+
return (LoopData *)us_loop_ext(us_socket_context_loop(
|
84
|
+
SSL, us_socket_context(SSL, (us_socket_t *)this)));
|
85
|
+
}
|
86
|
+
|
87
|
+
/* Get socket extension */
|
88
|
+
AsyncSocketData<SSL> *getAsyncSocketData() {
|
89
|
+
return (AsyncSocketData<SSL> *)us_socket_ext(SSL, (us_socket_t *)this);
|
90
|
+
}
|
91
|
+
|
92
|
+
/* Socket timeout */
|
93
|
+
void timeout(unsigned int seconds) {
|
94
|
+
us_socket_timeout(SSL, (us_socket_t *)this, seconds);
|
95
|
+
}
|
96
|
+
|
97
|
+
/* Shutdown socket without any automatic drainage */
|
98
|
+
void shutdown() { us_socket_shutdown(SSL, (us_socket_t *)this); }
|
99
|
+
|
100
|
+
/* Experimental pause */
|
101
|
+
us_socket_t *pause() {
|
102
|
+
throttle_helper(1);
|
103
|
+
return (us_socket_t *)this;
|
104
|
+
}
|
105
|
+
|
106
|
+
/* Experimental resume */
|
107
|
+
us_socket_t *resume() {
|
108
|
+
throttle_helper(0);
|
109
|
+
return (us_socket_t *)this;
|
110
|
+
}
|
111
|
+
|
112
|
+
/* Immediately close socket */
|
113
|
+
us_socket_t *close() {
|
114
|
+
return us_socket_close(SSL, (us_socket_t *)this, 0, nullptr);
|
115
|
+
}
|
116
|
+
|
117
|
+
void corkUnchecked() {
|
118
|
+
/* What if another socket is corked? */
|
119
|
+
getLoopData()->corkedSocket = this;
|
120
|
+
}
|
121
|
+
|
122
|
+
void uncorkWithoutSending() {
|
123
|
+
if (isCorked()) {
|
124
|
+
getLoopData()->corkedSocket = nullptr;
|
82
125
|
}
|
83
|
-
|
84
|
-
|
85
|
-
|
86
|
-
|
126
|
+
}
|
127
|
+
|
128
|
+
/* Cork this socket. Only one socket may ever be corked per-loop at any given
|
129
|
+
* time */
|
130
|
+
void cork() {
|
131
|
+
/* Extra check for invalid corking of others */
|
132
|
+
if (getLoopData()->corkOffset && getLoopData()->corkedSocket != this) {
|
133
|
+
std::cerr
|
134
|
+
<< "Error: Cork buffer must not be acquired without checking canCork!"
|
135
|
+
<< std::endl;
|
136
|
+
std::terminate();
|
87
137
|
}
|
88
138
|
|
89
|
-
/*
|
90
|
-
|
91
|
-
|
139
|
+
/* What if another socket is corked? */
|
140
|
+
getLoopData()->corkedSocket = this;
|
141
|
+
}
|
142
|
+
|
143
|
+
/* Returns wheter we are corked or not */
|
144
|
+
bool isCorked() { return getLoopData()->corkedSocket == this; }
|
145
|
+
|
146
|
+
/* Returns whether we could cork (it is free) */
|
147
|
+
bool canCork() { return getLoopData()->corkedSocket == nullptr; }
|
148
|
+
|
149
|
+
/* Returns a suitable buffer for temporary assemblation of send data */
|
150
|
+
std::pair<char *, SendBufferAttribute> getSendBuffer(size_t size) {
|
151
|
+
/* First step is to determine if we already have backpressure or not */
|
152
|
+
LoopData *loopData = getLoopData();
|
153
|
+
BackPressure &backPressure = getAsyncSocketData()->buffer;
|
154
|
+
size_t existingBackpressure = backPressure.length();
|
155
|
+
if ((!existingBackpressure) && (isCorked() || canCork()) &&
|
156
|
+
(loopData->corkOffset + size < LoopData::CORK_BUFFER_SIZE)) {
|
157
|
+
/* Cork automatically if we can */
|
158
|
+
if (isCorked()) {
|
159
|
+
char *sendBuffer = loopData->corkBuffer + loopData->corkOffset;
|
160
|
+
loopData->corkOffset += (unsigned int)size;
|
161
|
+
return {sendBuffer, SendBufferAttribute::NEEDS_NOTHING};
|
162
|
+
} else {
|
163
|
+
cork();
|
164
|
+
char *sendBuffer = loopData->corkBuffer + loopData->corkOffset;
|
165
|
+
loopData->corkOffset += (unsigned int)size;
|
166
|
+
return {sendBuffer, SendBufferAttribute::NEEDS_UNCORK};
|
167
|
+
}
|
168
|
+
} else {
|
169
|
+
|
170
|
+
/* If we are corked and there is already data in the cork buffer,
|
171
|
+
mark how much is ours and reset it */
|
172
|
+
unsigned int ourCorkOffset = 0;
|
173
|
+
if (isCorked() && loopData->corkOffset) {
|
174
|
+
ourCorkOffset = loopData->corkOffset;
|
175
|
+
loopData->corkOffset = 0;
|
176
|
+
}
|
177
|
+
|
178
|
+
/* Fallback is to use the backpressure as buffer */
|
179
|
+
backPressure.resize(ourCorkOffset + existingBackpressure + size);
|
180
|
+
|
181
|
+
/* And copy corkbuffer in front */
|
182
|
+
memcpy((char *)backPressure.data() + existingBackpressure,
|
183
|
+
loopData->corkBuffer, ourCorkOffset);
|
184
|
+
|
185
|
+
return {(char *)backPressure.data() + ourCorkOffset +
|
186
|
+
existingBackpressure,
|
187
|
+
SendBufferAttribute::NEEDS_DRAIN};
|
92
188
|
}
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
|
189
|
+
}
|
190
|
+
|
191
|
+
/* Returns the user space backpressure. */
|
192
|
+
unsigned int getBufferedAmount() {
|
193
|
+
/* We return the actual amount of bytes in backbuffer, including
|
194
|
+
* pendingRemoval */
|
195
|
+
return (unsigned int)getAsyncSocketData()->buffer.totalLength();
|
196
|
+
}
|
197
|
+
|
198
|
+
/* Returns the text representation of an IPv4 or IPv6 address */
|
199
|
+
std::string_view addressAsText(std::string_view binary) {
|
200
|
+
static thread_local char buf[64];
|
201
|
+
int ipLength = 0;
|
202
|
+
|
203
|
+
if (!binary.length()) {
|
204
|
+
return {};
|
97
205
|
}
|
98
206
|
|
99
|
-
|
100
|
-
void shutdown() {
|
101
|
-
us_socket_shutdown(SSL, (us_socket_t *) this);
|
102
|
-
}
|
207
|
+
unsigned char *b = (unsigned char *)binary.data();
|
103
208
|
|
104
|
-
|
105
|
-
|
106
|
-
|
107
|
-
|
209
|
+
if (binary.length() == 4) {
|
210
|
+
ipLength = snprintf(buf, 64, "%u.%u.%u.%u", b[0], b[1], b[2], b[3]);
|
211
|
+
} else {
|
212
|
+
ipLength = snprintf(buf, 64,
|
213
|
+
"%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%"
|
214
|
+
"02x:%02x%02x:%02x%02x",
|
215
|
+
b[0], b[1], b[2], b[3], b[4], b[5], b[6], b[7], b[8],
|
216
|
+
b[9], b[10], b[11], b[12], b[13], b[14], b[15]);
|
108
217
|
}
|
109
218
|
|
110
|
-
|
111
|
-
|
112
|
-
|
113
|
-
|
219
|
+
return {buf, (unsigned int)ipLength};
|
220
|
+
}
|
221
|
+
|
222
|
+
/* Returns the remote IP address or empty string on failure */
|
223
|
+
std::string_view getRemoteAddress() {
|
224
|
+
static thread_local char buf[16];
|
225
|
+
int ipLength = 16;
|
226
|
+
us_socket_remote_address(SSL, (us_socket_t *)this, buf, &ipLength);
|
227
|
+
return std::string_view(buf, (unsigned int)ipLength);
|
228
|
+
}
|
229
|
+
|
230
|
+
/* Returns the text representation of IP */
|
231
|
+
std::string_view getRemoteAddressAsText() {
|
232
|
+
return addressAsText(getRemoteAddress());
|
233
|
+
}
|
234
|
+
|
235
|
+
/* Write in three levels of prioritization: cork-buffer, syscall,
|
236
|
+
* socket-buffer. Always drain if possible. Returns pair of bytes written
|
237
|
+
* (anywhere) and wheter or not this call resulted in the polling for writable
|
238
|
+
* (or we are in a state that implies polling for writable). */
|
239
|
+
std::pair<int, bool> write(const char *src, int length,
|
240
|
+
bool optionally = false, int nextLength = 0) {
|
241
|
+
/* Fake success if closed, simple fix to allow uncork of closed socket to
|
242
|
+
* succeed */
|
243
|
+
if (us_socket_is_closed(SSL, (us_socket_t *)this)) {
|
244
|
+
return {length, false};
|
114
245
|
}
|
115
246
|
|
116
|
-
|
117
|
-
|
118
|
-
return us_socket_close(SSL, (us_socket_t *) this, 0, nullptr);
|
119
|
-
}
|
247
|
+
LoopData *loopData = getLoopData();
|
248
|
+
AsyncSocketData<SSL> *asyncSocketData = getAsyncSocketData();
|
120
249
|
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
250
|
+
/* We are limited if we have a per-socket buffer */
|
251
|
+
if (asyncSocketData->buffer.length()) {
|
252
|
+
/* Write off as much as we can */
|
253
|
+
int written = us_socket_write(
|
254
|
+
SSL, (us_socket_t *)this, asyncSocketData->buffer.data(),
|
255
|
+
(int)asyncSocketData->buffer.length(), /*nextLength != 0 | */ length);
|
125
256
|
|
126
|
-
|
127
|
-
|
128
|
-
getLoopData()->corkedSocket = nullptr;
|
129
|
-
}
|
130
|
-
}
|
257
|
+
/* On failure return, otherwise continue down the function */
|
258
|
+
if ((unsigned int)written < asyncSocketData->buffer.length()) {
|
131
259
|
|
132
|
-
|
133
|
-
|
134
|
-
|
135
|
-
if (getLoopData()->corkOffset && getLoopData()->corkedSocket != this) {
|
136
|
-
std::cerr << "Error: Cork buffer must not be acquired without checking canCork!" << std::endl;
|
137
|
-
std::terminate();
|
138
|
-
}
|
260
|
+
/* Update buffering (todo: we can do better here if we keep track of
|
261
|
+
* what happens to this guy later on) */
|
262
|
+
asyncSocketData->buffer.erase((unsigned int)written);
|
139
263
|
|
140
|
-
|
141
|
-
|
142
|
-
|
143
|
-
|
144
|
-
/* Returns wheter we are corked or not */
|
145
|
-
bool isCorked() {
|
146
|
-
return getLoopData()->corkedSocket == this;
|
147
|
-
}
|
148
|
-
|
149
|
-
/* Returns whether we could cork (it is free) */
|
150
|
-
bool canCork() {
|
151
|
-
return getLoopData()->corkedSocket == nullptr;
|
152
|
-
}
|
153
|
-
|
154
|
-
/* Returns a suitable buffer for temporary assemblation of send data */
|
155
|
-
std::pair<char *, SendBufferAttribute> getSendBuffer(size_t size) {
|
156
|
-
/* First step is to determine if we already have backpressure or not */
|
157
|
-
LoopData *loopData = getLoopData();
|
158
|
-
BackPressure &backPressure = getAsyncSocketData()->buffer;
|
159
|
-
size_t existingBackpressure = backPressure.length();
|
160
|
-
if ((!existingBackpressure) && (isCorked() || canCork()) && (loopData->corkOffset + size < LoopData::CORK_BUFFER_SIZE)) {
|
161
|
-
/* Cork automatically if we can */
|
162
|
-
if (isCorked()) {
|
163
|
-
char *sendBuffer = loopData->corkBuffer + loopData->corkOffset;
|
164
|
-
loopData->corkOffset += (unsigned int) size;
|
165
|
-
return {sendBuffer, SendBufferAttribute::NEEDS_NOTHING};
|
166
|
-
} else {
|
167
|
-
cork();
|
168
|
-
char *sendBuffer = loopData->corkBuffer + loopData->corkOffset;
|
169
|
-
loopData->corkOffset += (unsigned int) size;
|
170
|
-
return {sendBuffer, SendBufferAttribute::NEEDS_UNCORK};
|
171
|
-
}
|
264
|
+
if (optionally) {
|
265
|
+
/* Thankfully we can exit early here */
|
266
|
+
return {0, true};
|
172
267
|
} else {
|
268
|
+
/* This path is horrible and points towards erroneous usage */
|
269
|
+
asyncSocketData->buffer.append(src, (unsigned int)length);
|
173
270
|
|
174
|
-
|
175
|
-
mark how much is ours and reset it */
|
176
|
-
unsigned int ourCorkOffset = 0;
|
177
|
-
if (isCorked() && loopData->corkOffset) {
|
178
|
-
ourCorkOffset = loopData->corkOffset;
|
179
|
-
loopData->corkOffset = 0;
|
180
|
-
}
|
181
|
-
|
182
|
-
/* Fallback is to use the backpressure as buffer */
|
183
|
-
backPressure.resize(ourCorkOffset + existingBackpressure + size);
|
184
|
-
|
185
|
-
/* And copy corkbuffer in front */
|
186
|
-
memcpy((char *) backPressure.data() + existingBackpressure, loopData->corkBuffer, ourCorkOffset);
|
187
|
-
|
188
|
-
return {(char *) backPressure.data() + ourCorkOffset + existingBackpressure, SendBufferAttribute::NEEDS_DRAIN};
|
271
|
+
return {length, true};
|
189
272
|
}
|
190
|
-
|
273
|
+
}
|
191
274
|
|
192
|
-
|
193
|
-
|
194
|
-
/* We return the actual amount of bytes in backbuffer, including pendingRemoval */
|
195
|
-
return (unsigned int) getAsyncSocketData()->buffer.totalLength();
|
275
|
+
/* At this point we simply have no buffer and can continue as normal */
|
276
|
+
asyncSocketData->buffer.clear();
|
196
277
|
}
|
197
278
|
|
198
|
-
|
199
|
-
|
200
|
-
|
201
|
-
|
202
|
-
|
203
|
-
|
204
|
-
|
205
|
-
|
206
|
-
|
207
|
-
|
208
|
-
|
209
|
-
if (binary.length() == 4) {
|
210
|
-
ipLength = snprintf(buf, 64, "%u.%u.%u.%u", b[0], b[1], b[2], b[3]);
|
279
|
+
if (length) {
|
280
|
+
if (loopData->corkedSocket == this) {
|
281
|
+
/* We are corked */
|
282
|
+
if (LoopData::CORK_BUFFER_SIZE - loopData->corkOffset >=
|
283
|
+
(unsigned int)length) {
|
284
|
+
/* If the entire chunk fits in cork buffer */
|
285
|
+
memcpy(loopData->corkBuffer + loopData->corkOffset, src,
|
286
|
+
(unsigned int)length);
|
287
|
+
loopData->corkOffset += (unsigned int)length;
|
288
|
+
/* Fall through to default return */
|
211
289
|
} else {
|
212
|
-
|
213
|
-
|
214
|
-
|
215
|
-
|
216
|
-
|
217
|
-
|
218
|
-
|
219
|
-
|
220
|
-
|
221
|
-
|
222
|
-
|
223
|
-
|
224
|
-
|
225
|
-
|
226
|
-
|
227
|
-
|
228
|
-
/* Returns the text representation of IP */
|
229
|
-
std::string_view getRemoteAddressAsText() {
|
230
|
-
return addressAsText(getRemoteAddress());
|
231
|
-
}
|
232
|
-
|
233
|
-
/* Write in three levels of prioritization: cork-buffer, syscall, socket-buffer. Always drain if possible.
|
234
|
-
* Returns pair of bytes written (anywhere) and wheter or not this call resulted in the polling for
|
235
|
-
* writable (or we are in a state that implies polling for writable). */
|
236
|
-
std::pair<int, bool> write(const char *src, int length, bool optionally = false, int nextLength = 0) {
|
237
|
-
/* Fake success if closed, simple fix to allow uncork of closed socket to succeed */
|
238
|
-
if (us_socket_is_closed(SSL, (us_socket_t *) this)) {
|
239
|
-
return {length, false};
|
240
|
-
}
|
241
|
-
|
242
|
-
LoopData *loopData = getLoopData();
|
243
|
-
AsyncSocketData<SSL> *asyncSocketData = getAsyncSocketData();
|
244
|
-
|
245
|
-
/* We are limited if we have a per-socket buffer */
|
246
|
-
if (asyncSocketData->buffer.length()) {
|
247
|
-
/* Write off as much as we can */
|
248
|
-
int written = us_socket_write(SSL, (us_socket_t *) this, asyncSocketData->buffer.data(), (int) asyncSocketData->buffer.length(), /*nextLength != 0 | */length);
|
249
|
-
|
250
|
-
/* On failure return, otherwise continue down the function */
|
251
|
-
if ((unsigned int) written < asyncSocketData->buffer.length()) {
|
252
|
-
|
253
|
-
/* Update buffering (todo: we can do better here if we keep track of what happens to this guy later on) */
|
254
|
-
asyncSocketData->buffer.erase((unsigned int) written);
|
255
|
-
|
256
|
-
if (optionally) {
|
257
|
-
/* Thankfully we can exit early here */
|
258
|
-
return {0, true};
|
259
|
-
} else {
|
260
|
-
/* This path is horrible and points towards erroneous usage */
|
261
|
-
asyncSocketData->buffer.append(src, (unsigned int) length);
|
262
|
-
|
263
|
-
return {length, true};
|
264
|
-
}
|
265
|
-
}
|
266
|
-
|
267
|
-
/* At this point we simply have no buffer and can continue as normal */
|
268
|
-
asyncSocketData->buffer.clear();
|
290
|
+
/* Strategy differences between SSL and non-SSL regarding syscall
|
291
|
+
* minimizing */
|
292
|
+
if constexpr (false) {
|
293
|
+
/* Cork up as much as we can */
|
294
|
+
unsigned int stripped =
|
295
|
+
LoopData::CORK_BUFFER_SIZE - loopData->corkOffset;
|
296
|
+
memcpy(loopData->corkBuffer + loopData->corkOffset, src, stripped);
|
297
|
+
loopData->corkOffset = LoopData::CORK_BUFFER_SIZE;
|
298
|
+
|
299
|
+
auto [written, failed] =
|
300
|
+
uncork(src + stripped, length - (int)stripped, optionally);
|
301
|
+
return {written + (int)stripped, failed};
|
302
|
+
}
|
303
|
+
|
304
|
+
/* For non-SSL we take the penalty of two syscalls */
|
305
|
+
return uncork(src, length, optionally);
|
269
306
|
}
|
270
|
-
|
271
|
-
|
272
|
-
|
273
|
-
|
274
|
-
|
275
|
-
|
276
|
-
|
277
|
-
|
278
|
-
|
279
|
-
|
280
|
-
|
281
|
-
|
282
|
-
|
283
|
-
|
284
|
-
|
285
|
-
|
286
|
-
|
287
|
-
|
288
|
-
|
289
|
-
|
290
|
-
|
291
|
-
|
292
|
-
|
293
|
-
|
294
|
-
|
295
|
-
|
296
|
-
|
297
|
-
|
298
|
-
/* Did we fail? */
|
299
|
-
if (written < length) {
|
300
|
-
/* If the write was optional then just bail out */
|
301
|
-
if (optionally) {
|
302
|
-
return {written, true};
|
303
|
-
}
|
304
|
-
|
305
|
-
/* Fall back to worst possible case (should be very rare for HTTP) */
|
306
|
-
/* At least we can reserve room for next chunk if we know it up front */
|
307
|
-
if (nextLength) {
|
308
|
-
asyncSocketData->buffer.reserve(asyncSocketData->buffer.length() + (size_t) (length - written + nextLength));
|
309
|
-
}
|
310
|
-
|
311
|
-
/* Buffer this chunk */
|
312
|
-
asyncSocketData->buffer.append(src + written, (size_t) (length - written));
|
313
|
-
|
314
|
-
/* Return the failure */
|
315
|
-
return {length, true};
|
316
|
-
}
|
317
|
-
/* Fall through to default return */
|
318
|
-
}
|
307
|
+
} else {
|
308
|
+
/* We are not corked */
|
309
|
+
int written = us_socket_write(SSL, (us_socket_t *)this, src, length,
|
310
|
+
nextLength != 0);
|
311
|
+
|
312
|
+
/* Did we fail? */
|
313
|
+
if (written < length) {
|
314
|
+
/* If the write was optional then just bail out */
|
315
|
+
if (optionally) {
|
316
|
+
return {written, true};
|
317
|
+
}
|
318
|
+
|
319
|
+
/* Fall back to worst possible case (should be very rare for HTTP) */
|
320
|
+
/* At least we can reserve room for next chunk if we know it up front
|
321
|
+
*/
|
322
|
+
if (nextLength) {
|
323
|
+
asyncSocketData->buffer.reserve(
|
324
|
+
asyncSocketData->buffer.length() +
|
325
|
+
(size_t)(length - written + nextLength));
|
326
|
+
}
|
327
|
+
|
328
|
+
/* Buffer this chunk */
|
329
|
+
asyncSocketData->buffer.append(src + written,
|
330
|
+
(size_t)(length - written));
|
331
|
+
|
332
|
+
/* Return the failure */
|
333
|
+
return {length, true};
|
319
334
|
}
|
320
|
-
|
321
|
-
|
322
|
-
return {length, false};
|
335
|
+
/* Fall through to default return */
|
336
|
+
}
|
323
337
|
}
|
324
338
|
|
325
|
-
/*
|
326
|
-
|
327
|
-
|
328
|
-
|
329
|
-
|
330
|
-
|
331
|
-
|
332
|
-
|
333
|
-
|
334
|
-
|
335
|
-
|
336
|
-
|
337
|
-
|
338
|
-
|
339
|
-
|
340
|
-
|
341
|
-
|
342
|
-
|
343
|
-
|
344
|
-
|
345
|
-
|
346
|
-
|
347
|
-
|
348
|
-
|
339
|
+
/* Default fall through return */
|
340
|
+
return {length, false};
|
341
|
+
}
|
342
|
+
|
343
|
+
/* Uncork this socket and flush or buffer any corked and/or passed data. It is
|
344
|
+
* essential to remember doing this. */
|
345
|
+
/* It does NOT count bytes written from cork buffer (they are already
|
346
|
+
* accounted for in the write call responsible for its corking)! */
|
347
|
+
std::pair<int, bool> uncork(const char *src = nullptr, int length = 0,
|
348
|
+
bool optionally = false) {
|
349
|
+
LoopData *loopData = getLoopData();
|
350
|
+
|
351
|
+
if (loopData->corkedSocket == this) {
|
352
|
+
loopData->corkedSocket = nullptr;
|
353
|
+
|
354
|
+
if (loopData->corkOffset) {
|
355
|
+
/* Corked data is already accounted for via its write call */
|
356
|
+
auto [written, failed] = write(
|
357
|
+
loopData->corkBuffer, (int)loopData->corkOffset, false, length);
|
358
|
+
loopData->corkOffset = 0;
|
359
|
+
|
360
|
+
if (failed) {
|
361
|
+
/* We do not need to care for buffering here, write does that */
|
362
|
+
return {0, true};
|
349
363
|
}
|
364
|
+
}
|
365
|
+
|
366
|
+
/* We should only return with new writes, not things written to cork
|
367
|
+
* already */
|
368
|
+
return write(src, length, optionally, 0);
|
369
|
+
} else {
|
370
|
+
/* We are not even corked! */
|
371
|
+
return {0, false};
|
350
372
|
}
|
373
|
+
}
|
351
374
|
};
|
352
375
|
|
353
|
-
}
|
376
|
+
} // namespace uWS
|
354
377
|
|
355
378
|
#endif // UWS_ASYNCSOCKET_H
|