author | alfadur |
Wed, 19 Jun 2019 00:49:45 +0300 | |
changeset 15178 | 21e87882df1c |
parent 15108 | 823052e66611 |
child 15179 | e705ac360785 |
permissions | -rw-r--r-- |
13124 | 1 |
extern crate slab; |
2 |
||
13419 | 3 |
use std::{ |
13420 | 4 |
collections::HashSet, |
14462 | 5 |
io, |
6 |
io::{Error, ErrorKind, Read, Write}, |
|
7 |
mem::{replace, swap}, |
|
8 |
net::{IpAddr, Ipv4Addr, SocketAddr}, |
|
13419 | 9 |
}; |
10 |
||
14462 | 11 |
use log::*; |
13419 | 12 |
use mio::{ |
14462 | 13 |
net::{TcpListener, TcpStream}, |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
14 |
Evented, Poll, PollOpt, Ready, Token, |
13419 | 15 |
}; |
14808 | 16 |
use mio_extras::timer; |
13419 | 17 |
use netbuf; |
13124 | 18 |
use slab::Slab; |
19 |
||
13671 | 20 |
use crate::{ |
15080 | 21 |
core::{server::HwServer, types::ClientId}, |
15079 | 22 |
handlers, |
15107 | 23 |
handlers::{IoResult, IoTask}, |
15108
823052e66611
check for account existence before asking passwords
alfadur
parents:
15107
diff
changeset
|
24 |
protocol::{messages::HwServerMessage::Redirect, messages::*, ProtocolDecoder}, |
13671 | 25 |
utils, |
13419 | 26 |
}; |
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
27 |
|
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
28 |
#[cfg(feature = "official-server")] |
15103 | 29 |
use super::io::{IoThread, RequestId}; |
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
30 |
|
13804 | 31 |
#[cfg(feature = "tls-connections")] |
32 |
use openssl::{ |
|
14462 | 33 |
error::ErrorStack, |
13804 | 34 |
ssl::{ |
14462 | 35 |
HandshakeError, MidHandshakeSslStream, Ssl, SslContext, SslContextBuilder, SslFiletype, |
36 |
SslMethod, SslOptions, SslStream, SslStreamBuilder, SslVerifyMode, |
|
13804 | 37 |
}, |
38 |
}; |
|
14808 | 39 |
use std::time::Duration; |
13419 | 40 |
|
41 |
const MAX_BYTES_PER_READ: usize = 2048; |
|
14808 | 42 |
const SEND_PING_TIMEOUT: Duration = Duration::from_secs(30); |
14812 | 43 |
const DROP_CLIENT_TIMEOUT: Duration = Duration::from_secs(30); |
44 |
const PING_PROBES_COUNT: u8 = 2; |
|
13124 | 45 |
|
13420 | 46 |
#[derive(Hash, Eq, PartialEq, Copy, Clone)] |
13419 | 47 |
pub enum NetworkClientState { |
48 |
Idle, |
|
49 |
NeedsWrite, |
|
50 |
NeedsRead, |
|
51 |
Closed, |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
52 |
#[cfg(feature = "tls-connections")] |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
53 |
Connected, |
13419 | 54 |
} |
55 |
||
56 |
type NetworkResult<T> = io::Result<(T, NetworkClientState)>; |
|
13124 | 57 |
|
13804 | 58 |
pub enum ClientSocket { |
14462 | 59 |
Plain(TcpStream), |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
60 |
#[cfg(feature = "tls-connections")] |
13804 | 61 |
SslHandshake(Option<MidHandshakeSslStream<TcpStream>>), |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
62 |
#[cfg(feature = "tls-connections")] |
14462 | 63 |
SslStream(SslStream<TcpStream>), |
13804 | 64 |
} |
65 |
||
66 |
impl ClientSocket { |
|
67 |
fn inner(&self) -> &TcpStream { |
|
68 |
match self { |
|
69 |
ClientSocket::Plain(stream) => stream, |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
70 |
#[cfg(feature = "tls-connections")] |
13804 | 71 |
ClientSocket::SslHandshake(Some(builder)) => builder.get_ref(), |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
72 |
#[cfg(feature = "tls-connections")] |
13804 | 73 |
ClientSocket::SslHandshake(None) => unreachable!(), |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
74 |
#[cfg(feature = "tls-connections")] |
14462 | 75 |
ClientSocket::SslStream(ssl_stream) => ssl_stream.get_ref(), |
13804 | 76 |
} |
77 |
} |
|
78 |
} |
|
79 |
||
13124 | 80 |
pub struct NetworkClient { |
81 |
id: ClientId, |
|
13804 | 82 |
socket: ClientSocket, |
13124 | 83 |
peer_addr: SocketAddr, |
84 |
decoder: ProtocolDecoder, |
|
14462 | 85 |
buf_out: netbuf::Buf, |
14808 | 86 |
timeout: timer::Timeout, |
13124 | 87 |
} |
88 |
||
89 |
impl NetworkClient { |
|
14808 | 90 |
pub fn new( |
91 |
id: ClientId, |
|
92 |
socket: ClientSocket, |
|
93 |
peer_addr: SocketAddr, |
|
94 |
timeout: timer::Timeout, |
|
95 |
) -> NetworkClient { |
|
13124 | 96 |
NetworkClient { |
14462 | 97 |
id, |
98 |
socket, |
|
99 |
peer_addr, |
|
13124 | 100 |
decoder: ProtocolDecoder::new(), |
14462 | 101 |
buf_out: netbuf::Buf::new(), |
14808 | 102 |
timeout, |
13124 | 103 |
} |
104 |
} |
|
105 |
||
13807 | 106 |
#[cfg(feature = "tls-connections")] |
14462 | 107 |
fn handshake_impl( |
108 |
&mut self, |
|
109 |
handshake: MidHandshakeSslStream<TcpStream>, |
|
110 |
) -> io::Result<NetworkClientState> { |
|
13807 | 111 |
match handshake.handshake() { |
112 |
Ok(stream) => { |
|
113 |
self.socket = ClientSocket::SslStream(stream); |
|
14462 | 114 |
debug!( |
115 |
"TLS handshake with {} ({}) completed", |
|
116 |
self.id, self.peer_addr |
|
117 |
); |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
118 |
Ok(NetworkClientState::Connected) |
13807 | 119 |
} |
120 |
Err(HandshakeError::WouldBlock(new_handshake)) => { |
|
121 |
self.socket = ClientSocket::SslHandshake(Some(new_handshake)); |
|
122 |
Ok(NetworkClientState::Idle) |
|
123 |
} |
|
13808 | 124 |
Err(HandshakeError::Failure(new_handshake)) => { |
125 |
self.socket = ClientSocket::SslHandshake(Some(new_handshake)); |
|
13807 | 126 |
debug!("TLS handshake with {} ({}) failed", self.id, self.peer_addr); |
127 |
Err(Error::new(ErrorKind::Other, "Connection failure")) |
|
128 |
} |
|
14462 | 129 |
Err(HandshakeError::SetupFailure(_)) => unreachable!(), |
13807 | 130 |
} |
131 |
} |
|
132 |
||
14462 | 133 |
fn read_impl<R: Read>( |
134 |
decoder: &mut ProtocolDecoder, |
|
135 |
source: &mut R, |
|
136 |
id: ClientId, |
|
137 |
addr: &SocketAddr, |
|
15080 | 138 |
) -> NetworkResult<Vec<HwProtocolMessage>> { |
13419 | 139 |
let mut bytes_read = 0; |
140 |
let result = loop { |
|
13804 | 141 |
match decoder.read_from(source) { |
13419 | 142 |
Ok(bytes) => { |
13804 | 143 |
debug!("Client {}: read {} bytes", id, bytes); |
13419 | 144 |
bytes_read += bytes; |
145 |
if bytes == 0 { |
|
146 |
let result = if bytes_read == 0 { |
|
13804 | 147 |
info!("EOF for client {} ({})", id, addr); |
13419 | 148 |
(Vec::new(), NetworkClientState::Closed) |
149 |
} else { |
|
13804 | 150 |
(decoder.extract_messages(), NetworkClientState::NeedsRead) |
13419 | 151 |
}; |
152 |
break Ok(result); |
|
14462 | 153 |
} else if bytes_read >= MAX_BYTES_PER_READ { |
154 |
break Ok((decoder.extract_messages(), NetworkClientState::NeedsRead)); |
|
13419 | 155 |
} |
156 |
} |
|
157 |
Err(ref error) if error.kind() == ErrorKind::WouldBlock => { |
|
14462 | 158 |
let messages = if bytes_read == 0 { |
13419 | 159 |
Vec::new() |
160 |
} else { |
|
13804 | 161 |
decoder.extract_messages() |
13419 | 162 |
}; |
163 |
break Ok((messages, NetworkClientState::Idle)); |
|
164 |
} |
|
14462 | 165 |
Err(error) => break Err(error), |
13419 | 166 |
} |
167 |
}; |
|
168 |
result |
|
169 |
} |
|
170 |
||
15080 | 171 |
pub fn read(&mut self) -> NetworkResult<Vec<HwProtocolMessage>> { |
13804 | 172 |
match self.socket { |
14462 | 173 |
ClientSocket::Plain(ref mut stream) => { |
174 |
NetworkClient::read_impl(&mut self.decoder, stream, self.id, &self.peer_addr) |
|
175 |
} |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
176 |
#[cfg(feature = "tls-connections")] |
13804 | 177 |
ClientSocket::SslHandshake(ref mut handshake_opt) => { |
13807 | 178 |
let handshake = std::mem::replace(handshake_opt, None).unwrap(); |
179 |
Ok((Vec::new(), self.handshake_impl(handshake)?)) |
|
14462 | 180 |
} |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
181 |
#[cfg(feature = "tls-connections")] |
14462 | 182 |
ClientSocket::SslStream(ref mut stream) => { |
13804 | 183 |
NetworkClient::read_impl(&mut self.decoder, stream, self.id, &self.peer_addr) |
14462 | 184 |
} |
13804 | 185 |
} |
186 |
} |
|
187 |
||
188 |
fn write_impl<W: Write>(buf_out: &mut netbuf::Buf, destination: &mut W) -> NetworkResult<()> { |
|
13419 | 189 |
let result = loop { |
13804 | 190 |
match buf_out.write_to(destination) { |
14462 | 191 |
Ok(bytes) if buf_out.is_empty() || bytes == 0 => { |
14676
455865ccd36c
Server action refactoring part 2 of N
alfadur <mail@none>
parents:
14462
diff
changeset
|
192 |
break Ok(((), NetworkClientState::Idle)); |
14462 | 193 |
} |
13420 | 194 |
Ok(_) => (), |
14462 | 195 |
Err(ref error) |
196 |
if error.kind() == ErrorKind::Interrupted |
|
197 |
|| error.kind() == ErrorKind::WouldBlock => |
|
198 |
{ |
|
13419 | 199 |
break Ok(((), NetworkClientState::NeedsWrite)); |
14462 | 200 |
} |
201 |
Err(error) => break Err(error), |
|
13419 | 202 |
} |
203 |
}; |
|
13804 | 204 |
result |
205 |
} |
|
206 |
||
207 |
pub fn write(&mut self) -> NetworkResult<()> { |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
208 |
let result = match self.socket { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
209 |
ClientSocket::Plain(ref mut stream) => { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
210 |
NetworkClient::write_impl(&mut self.buf_out, stream) |
13804 | 211 |
} |
14462 | 212 |
#[cfg(feature = "tls-connections")] |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
213 |
ClientSocket::SslHandshake(ref mut handshake_opt) => { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
214 |
let handshake = std::mem::replace(handshake_opt, None).unwrap(); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
215 |
Ok(((), self.handshake_impl(handshake)?)) |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
216 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
217 |
#[cfg(feature = "tls-connections")] |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
218 |
ClientSocket::SslStream(ref mut stream) => { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
219 |
NetworkClient::write_impl(&mut self.buf_out, stream) |
13804 | 220 |
} |
221 |
}; |
|
222 |
||
223 |
self.socket.inner().flush()?; |
|
13419 | 224 |
result |
225 |
} |
|
226 |
||
13124 | 227 |
pub fn send_raw_msg(&mut self, msg: &[u8]) { |
13529 | 228 |
self.buf_out.write_all(msg).unwrap(); |
13124 | 229 |
} |
230 |
||
13529 | 231 |
pub fn send_string(&mut self, msg: &str) { |
13124 | 232 |
self.send_raw_msg(&msg.as_bytes()); |
233 |
} |
|
14808 | 234 |
|
235 |
pub fn replace_timeout(&mut self, timeout: timer::Timeout) -> timer::Timeout { |
|
236 |
replace(&mut self.timeout, timeout) |
|
237 |
} |
|
13124 | 238 |
} |
239 |
||
13804 | 240 |
#[cfg(feature = "tls-connections")] |
241 |
struct ServerSsl { |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
242 |
listener: TcpListener, |
14462 | 243 |
context: SslContext, |
13804 | 244 |
} |
245 |
||
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
246 |
#[cfg(feature = "official-server")] |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
247 |
pub struct IoLayer { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
248 |
next_request_id: RequestId, |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
249 |
request_queue: Vec<(RequestId, ClientId)>, |
15103 | 250 |
io_thread: IoThread, |
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
251 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
252 |
|
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
253 |
#[cfg(feature = "official-server")] |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
254 |
impl IoLayer { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
255 |
fn new() -> Self { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
256 |
Self { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
257 |
next_request_id: 0, |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
258 |
request_queue: vec![], |
15103 | 259 |
io_thread: IoThread::new(), |
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
260 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
261 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
262 |
|
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
263 |
fn send(&mut self, client_id: ClientId, task: IoTask) { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
264 |
let request_id = self.next_request_id; |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
265 |
self.next_request_id += 1; |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
266 |
self.request_queue.push((request_id, client_id)); |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
267 |
self.io_thread.send(request_id, task); |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
268 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
269 |
|
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
270 |
fn try_recv(&mut self) -> Option<(ClientId, IoResult)> { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
271 |
let (request_id, result) = self.io_thread.try_recv()?; |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
272 |
if let Some(index) = self |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
273 |
.request_queue |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
274 |
.iter() |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
275 |
.position(|(id, _)| *id == request_id) |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
276 |
{ |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
277 |
let (_, client_id) = self.request_queue.swap_remove(index); |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
278 |
Some((client_id, result)) |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
279 |
} else { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
280 |
None |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
281 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
282 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
283 |
|
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
284 |
fn cancel(&mut self, client_id: ClientId) { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
285 |
let mut index = 0; |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
286 |
while index < self.request_queue.len() { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
287 |
if self.request_queue[index].1 == client_id { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
288 |
self.request_queue.swap_remove(index); |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
289 |
} else { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
290 |
index += 1; |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
291 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
292 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
293 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
294 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
295 |
|
14808 | 296 |
enum TimeoutEvent { |
14812 | 297 |
SendPing { probes_count: u8 }, |
14808 | 298 |
DropClient, |
299 |
} |
|
300 |
||
301 |
struct TimerData(TimeoutEvent, ClientId); |
|
302 |
||
13124 | 303 |
pub struct NetworkLayer { |
304 |
listener: TcpListener, |
|
15080 | 305 |
server: HwServer, |
13419 | 306 |
clients: Slab<NetworkClient>, |
13420 | 307 |
pending: HashSet<(ClientId, NetworkClientState)>, |
13804 | 308 |
pending_cache: Vec<(ClientId, NetworkClientState)>, |
309 |
#[cfg(feature = "tls-connections")] |
|
14462 | 310 |
ssl: ServerSsl, |
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
311 |
#[cfg(feature = "official-server")] |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
312 |
io: IoLayer, |
14808 | 313 |
timer: timer::Timer<TimerData>, |
314 |
} |
|
315 |
||
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
316 |
fn register_read<E: Evented>(poll: &Poll, evented: &E, token: mio::Token) -> io::Result<()> { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
317 |
poll.register(evented, token, Ready::readable(), PollOpt::edge()) |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
318 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
319 |
|
14812 | 320 |
fn create_ping_timeout( |
321 |
timer: &mut timer::Timer<TimerData>, |
|
322 |
probes_count: u8, |
|
323 |
client_id: ClientId, |
|
324 |
) -> timer::Timeout { |
|
14808 | 325 |
timer.set_timeout( |
326 |
SEND_PING_TIMEOUT, |
|
14812 | 327 |
TimerData(TimeoutEvent::SendPing { probes_count }, client_id), |
14808 | 328 |
) |
329 |
} |
|
330 |
||
331 |
fn create_drop_timeout(timer: &mut timer::Timer<TimerData>, client_id: ClientId) -> timer::Timeout { |
|
332 |
timer.set_timeout( |
|
333 |
DROP_CLIENT_TIMEOUT, |
|
334 |
TimerData(TimeoutEvent::DropClient, client_id), |
|
335 |
) |
|
13124 | 336 |
} |
337 |
||
338 |
impl NetworkLayer { |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
339 |
pub fn register(&self, poll: &Poll) -> io::Result<()> { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
340 |
register_read(poll, &self.listener, utils::SERVER_TOKEN)?; |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
341 |
#[cfg(feature = "tls-connections")] |
14840 | 342 |
register_read(poll, &self.ssl.listener, utils::SECURE_SERVER_TOKEN)?; |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
343 |
register_read(poll, &self.timer, utils::TIMER_TOKEN)?; |
14808 | 344 |
|
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
345 |
#[cfg(feature = "official-server")] |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
346 |
self.io.io_thread.register_rx(poll, utils::IO_TOKEN)?; |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
347 |
|
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
348 |
Ok(()) |
13124 | 349 |
} |
350 |
||
351 |
fn deregister_client(&mut self, poll: &Poll, id: ClientId) { |
|
13419 | 352 |
if let Some(ref client) = self.clients.get(id) { |
13804 | 353 |
poll.deregister(client.socket.inner()) |
13529 | 354 |
.expect("could not deregister socket"); |
13124 | 355 |
info!("client {} ({}) removed", client.id, client.peer_addr); |
356 |
self.clients.remove(id); |
|
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
357 |
#[cfg(feature = "official-server")] |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
358 |
self.io.cancel(id); |
13124 | 359 |
} |
360 |
} |
|
361 |
||
14462 | 362 |
fn register_client( |
363 |
&mut self, |
|
364 |
poll: &Poll, |
|
365 |
client_socket: ClientSocket, |
|
366 |
addr: SocketAddr, |
|
14921 | 367 |
) -> io::Result<ClientId> { |
14698 | 368 |
let entry = self.clients.vacant_entry(); |
369 |
let client_id = entry.key(); |
|
370 |
||
14462 | 371 |
poll.register( |
372 |
client_socket.inner(), |
|
14698 | 373 |
Token(client_id), |
14462 | 374 |
Ready::readable() | Ready::writable(), |
375 |
PollOpt::edge(), |
|
14921 | 376 |
)?; |
13124 | 377 |
|
14808 | 378 |
let client = NetworkClient::new( |
379 |
client_id, |
|
380 |
client_socket, |
|
381 |
addr, |
|
14812 | 382 |
create_ping_timeout(&mut self.timer, PING_PROBES_COUNT - 1, client_id), |
14808 | 383 |
); |
13124 | 384 |
info!("client {} ({}) added", client.id, client.peer_addr); |
385 |
entry.insert(client); |
|
14698 | 386 |
|
14921 | 387 |
Ok(client_id) |
13124 | 388 |
} |
389 |
||
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
390 |
fn handle_response(&mut self, mut response: handlers::Response, poll: &Poll) { |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
391 |
if response.is_empty() { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
392 |
return; |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
393 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
394 |
|
14677
6e6632068a33
Server action refactoring part 3 of N
alfadur <mail@none>
parents:
14676
diff
changeset
|
395 |
debug!("{} pending server messages", response.len()); |
6e6632068a33
Server action refactoring part 3 of N
alfadur <mail@none>
parents:
14676
diff
changeset
|
396 |
let output = response.extract_messages(&mut self.server); |
6e6632068a33
Server action refactoring part 3 of N
alfadur <mail@none>
parents:
14676
diff
changeset
|
397 |
for (clients, message) in output { |
13424 | 398 |
debug!("Message {:?} to {:?}", message, clients); |
399 |
let msg_string = message.to_raw_protocol(); |
|
400 |
for client_id in clients { |
|
401 |
if let Some(client) = self.clients.get_mut(client_id) { |
|
402 |
client.send_string(&msg_string); |
|
14462 | 403 |
self.pending |
404 |
.insert((client_id, NetworkClientState::NeedsWrite)); |
|
13419 | 405 |
} |
406 |
} |
|
407 |
} |
|
14701 | 408 |
|
409 |
for client_id in response.extract_removed_clients() { |
|
410 |
self.deregister_client(poll, client_id); |
|
411 |
} |
|
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
412 |
|
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
413 |
#[cfg(feature = "official-server")] |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
414 |
{ |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
415 |
let client_id = response.client_id(); |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
416 |
for task in response.extract_io_tasks() { |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
417 |
self.io.send(client_id, task); |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
418 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
419 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
420 |
} |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
421 |
|
14808 | 422 |
pub fn handle_timeout(&mut self, poll: &Poll) -> io::Result<()> { |
423 |
while let Some(TimerData(event, client_id)) = self.timer.poll() { |
|
424 |
match event { |
|
14812 | 425 |
TimeoutEvent::SendPing { probes_count } => { |
14808 | 426 |
if let Some(ref mut client) = self.clients.get_mut(client_id) { |
15080 | 427 |
client.send_string(&HwServerMessage::Ping.to_raw_protocol()); |
14808 | 428 |
client.write()?; |
14812 | 429 |
let timeout = if probes_count != 0 { |
430 |
create_ping_timeout(&mut self.timer, probes_count - 1, client_id) |
|
431 |
} else { |
|
432 |
create_drop_timeout(&mut self.timer, client_id) |
|
433 |
}; |
|
434 |
client.replace_timeout(timeout); |
|
14808 | 435 |
} |
436 |
} |
|
437 |
TimeoutEvent::DropClient => { |
|
438 |
self.operation_failed( |
|
439 |
poll, |
|
440 |
client_id, |
|
441 |
&ErrorKind::TimedOut.into(), |
|
442 |
"No ping response", |
|
443 |
)?; |
|
444 |
} |
|
445 |
} |
|
446 |
} |
|
447 |
Ok(()) |
|
448 |
} |
|
449 |
||
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
450 |
#[cfg(feature = "official-server")] |
15107 | 451 |
pub fn handle_io_result(&mut self, poll: &Poll) -> io::Result<()> { |
452 |
while let Some((client_id, result)) = self.io.try_recv() { |
|
453 |
debug!("Handling io result {:?} for client {}", result, client_id); |
|
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
454 |
let mut response = handlers::Response::new(client_id); |
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
455 |
handlers::handle_io_result(&mut self.server, client_id, &mut response, result); |
15107 | 456 |
self.handle_response(response, poll); |
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
457 |
} |
14921 | 458 |
Ok(()) |
13419 | 459 |
} |
460 |
||
13804 | 461 |
fn create_client_socket(&self, socket: TcpStream) -> io::Result<ClientSocket> { |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
462 |
Ok(ClientSocket::Plain(socket)) |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
463 |
} |
13804 | 464 |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
465 |
#[cfg(feature = "tls-connections")] |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
466 |
fn create_client_secure_socket(&self, socket: TcpStream) -> io::Result<ClientSocket> { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
467 |
let ssl = Ssl::new(&self.ssl.context).unwrap(); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
468 |
let mut builder = SslStreamBuilder::new(ssl, socket); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
469 |
builder.set_accept_state(); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
470 |
match builder.handshake() { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
471 |
Ok(stream) => Ok(ClientSocket::SslStream(stream)), |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
472 |
Err(HandshakeError::WouldBlock(stream)) => Ok(ClientSocket::SslHandshake(Some(stream))), |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
473 |
Err(e) => { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
474 |
debug!("OpenSSL handshake failed: {}", e); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
475 |
Err(Error::new(ErrorKind::Other, "Connection failure")) |
13804 | 476 |
} |
477 |
} |
|
478 |
} |
|
479 |
||
14840 | 480 |
fn init_client(&mut self, poll: &Poll, client_id: ClientId) { |
481 |
let mut response = handlers::Response::new(client_id); |
|
14852 | 482 |
|
483 |
if let ClientSocket::Plain(_) = self.clients[client_id].socket { |
|
484 |
#[cfg(feature = "tls-connections")] |
|
485 |
response.add(Redirect(self.ssl.listener.local_addr().unwrap().port()).send_self()) |
|
486 |
} |
|
14840 | 487 |
|
488 |
handlers::handle_client_accept(&mut self.server, client_id, &mut response); |
|
489 |
self.handle_response(response, poll); |
|
490 |
} |
|
491 |
||
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
492 |
pub fn accept_client(&mut self, poll: &Poll, server_token: mio::Token) -> io::Result<()> { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
493 |
match server_token { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
494 |
utils::SERVER_TOKEN => { |
14875 | 495 |
let (client_socket, addr) = self.listener.accept()?; |
496 |
info!("Connected(plaintext): {}", addr); |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
497 |
let client_id = |
14921 | 498 |
self.register_client(poll, self.create_client_socket(client_socket)?, addr)?; |
14840 | 499 |
self.init_client(poll, client_id); |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
500 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
501 |
#[cfg(feature = "tls-connections")] |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
502 |
utils::SECURE_SERVER_TOKEN => { |
14875 | 503 |
let (client_socket, addr) = self.ssl.listener.accept()?; |
504 |
info!("Connected(TLS): {}", addr); |
|
14921 | 505 |
self.register_client(poll, self.create_client_secure_socket(client_socket)?, addr)?; |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
506 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
507 |
_ => unreachable!(), |
14698 | 508 |
} |
13124 | 509 |
|
510 |
Ok(()) |
|
511 |
} |
|
512 |
||
14462 | 513 |
fn operation_failed( |
514 |
&mut self, |
|
515 |
poll: &Poll, |
|
516 |
client_id: ClientId, |
|
517 |
error: &Error, |
|
518 |
msg: &str, |
|
519 |
) -> io::Result<()> { |
|
13419 | 520 |
let addr = if let Some(ref mut client) = self.clients.get_mut(client_id) { |
521 |
client.peer_addr |
|
522 |
} else { |
|
523 |
SocketAddr::new(IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)), 0) |
|
524 |
}; |
|
525 |
debug!("{}({}): {}", msg, addr, error); |
|
526 |
self.client_error(poll, client_id) |
|
13124 | 527 |
} |
528 |
||
14462 | 529 |
pub fn client_readable(&mut self, poll: &Poll, client_id: ClientId) -> io::Result<()> { |
530 |
let messages = if let Some(ref mut client) = self.clients.get_mut(client_id) { |
|
14812 | 531 |
let timeout = client.replace_timeout(create_ping_timeout( |
532 |
&mut self.timer, |
|
533 |
PING_PROBES_COUNT - 1, |
|
534 |
client_id, |
|
535 |
)); |
|
14808 | 536 |
self.timer.cancel_timeout(&timeout); |
14462 | 537 |
client.read() |
538 |
} else { |
|
539 |
warn!("invalid readable client: {}", client_id); |
|
540 |
Ok((Vec::new(), NetworkClientState::Idle)) |
|
541 |
}; |
|
13419 | 542 |
|
14676
455865ccd36c
Server action refactoring part 2 of N
alfadur <mail@none>
parents:
14462
diff
changeset
|
543 |
let mut response = handlers::Response::new(client_id); |
455865ccd36c
Server action refactoring part 2 of N
alfadur <mail@none>
parents:
14462
diff
changeset
|
544 |
|
13419 | 545 |
match messages { |
546 |
Ok((messages, state)) => { |
|
547 |
for message in messages { |
|
14676
455865ccd36c
Server action refactoring part 2 of N
alfadur <mail@none>
parents:
14462
diff
changeset
|
548 |
debug!("Handling message {:?} for client {}", message, client_id); |
14801 | 549 |
handlers::handle(&mut self.server, client_id, &mut response, message); |
13419 | 550 |
} |
551 |
match state { |
|
13420 | 552 |
NetworkClientState::NeedsRead => { |
553 |
self.pending.insert((client_id, state)); |
|
14462 | 554 |
} |
555 |
NetworkClientState::Closed => self.client_error(&poll, client_id)?, |
|
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
556 |
#[cfg(feature = "tls-connections")] |
14840 | 557 |
NetworkClientState::Connected => self.init_client(poll, client_id), |
13419 | 558 |
_ => {} |
559 |
}; |
|
13124 | 560 |
} |
13419 | 561 |
Err(e) => self.operation_failed( |
14462 | 562 |
poll, |
563 |
client_id, |
|
564 |
&e, |
|
565 |
"Error while reading from client socket", |
|
566 |
)?, |
|
13124 | 567 |
} |
568 |
||
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
569 |
self.handle_response(response, poll); |
13124 | 570 |
|
571 |
Ok(()) |
|
572 |
} |
|
573 |
||
14462 | 574 |
pub fn client_writable(&mut self, poll: &Poll, client_id: ClientId) -> io::Result<()> { |
575 |
let result = if let Some(ref mut client) = self.clients.get_mut(client_id) { |
|
576 |
client.write() |
|
577 |
} else { |
|
578 |
warn!("invalid writable client: {}", client_id); |
|
579 |
Ok(((), NetworkClientState::Idle)) |
|
580 |
}; |
|
13419 | 581 |
|
582 |
match result { |
|
13420 | 583 |
Ok(((), state)) if state == NetworkClientState::NeedsWrite => { |
584 |
self.pending.insert((client_id, state)); |
|
14462 | 585 |
} |
13420 | 586 |
Ok(_) => {} |
14462 | 587 |
Err(e) => { |
588 |
self.operation_failed(poll, client_id, &e, "Error while writing to client socket")? |
|
589 |
} |
|
13124 | 590 |
} |
591 |
||
592 |
Ok(()) |
|
593 |
} |
|
594 |
||
14462 | 595 |
pub fn client_error(&mut self, poll: &Poll, client_id: ClientId) -> io::Result<()> { |
13124 | 596 |
self.deregister_client(poll, client_id); |
14678
08a8605bafaf
Server action refactoring part 4 of N
alfadur <mail@none>
parents:
14677
diff
changeset
|
597 |
let mut response = handlers::Response::new(client_id); |
08a8605bafaf
Server action refactoring part 4 of N
alfadur <mail@none>
parents:
14677
diff
changeset
|
598 |
handlers::handle_client_loss(&mut self.server, client_id, &mut response); |
14784
f43ab2bd76ae
add a thread for internal server IO and implement account checking with it
alfadur
parents:
14702
diff
changeset
|
599 |
self.handle_response(response, poll); |
13124 | 600 |
|
601 |
Ok(()) |
|
602 |
} |
|
13419 | 603 |
|
604 |
pub fn has_pending_operations(&self) -> bool { |
|
605 |
!self.pending.is_empty() |
|
606 |
} |
|
607 |
||
608 |
pub fn on_idle(&mut self, poll: &Poll) -> io::Result<()> { |
|
13420 | 609 |
if self.has_pending_operations() { |
13483 | 610 |
let mut cache = replace(&mut self.pending_cache, Vec::new()); |
13420 | 611 |
cache.extend(self.pending.drain()); |
612 |
for (id, state) in cache.drain(..) { |
|
613 |
match state { |
|
14462 | 614 |
NetworkClientState::NeedsRead => self.client_readable(poll, id)?, |
615 |
NetworkClientState::NeedsWrite => self.client_writable(poll, id)?, |
|
13420 | 616 |
_ => {} |
617 |
} |
|
13419 | 618 |
} |
13420 | 619 |
swap(&mut cache, &mut self.pending_cache); |
13419 | 620 |
} |
621 |
Ok(()) |
|
622 |
} |
|
13124 | 623 |
} |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
624 |
|
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
625 |
pub struct NetworkLayerBuilder { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
626 |
listener: Option<TcpListener>, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
627 |
secure_listener: Option<TcpListener>, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
628 |
clients_capacity: usize, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
629 |
rooms_capacity: usize, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
630 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
631 |
|
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
632 |
impl Default for NetworkLayerBuilder { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
633 |
fn default() -> Self { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
634 |
Self { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
635 |
clients_capacity: 1024, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
636 |
rooms_capacity: 512, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
637 |
listener: None, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
638 |
secure_listener: None, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
639 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
640 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
641 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
642 |
|
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
643 |
impl NetworkLayerBuilder { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
644 |
pub fn with_listener(self, listener: TcpListener) -> Self { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
645 |
Self { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
646 |
listener: Some(listener), |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
647 |
..self |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
648 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
649 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
650 |
|
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
651 |
pub fn with_secure_listener(self, listener: TcpListener) -> Self { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
652 |
Self { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
653 |
secure_listener: Some(listener), |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
654 |
..self |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
655 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
656 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
657 |
|
14840 | 658 |
#[cfg(feature = "tls-connections")] |
659 |
fn create_ssl_context(listener: TcpListener) -> ServerSsl { |
|
660 |
let mut builder = SslContextBuilder::new(SslMethod::tls()).unwrap(); |
|
661 |
builder.set_verify(SslVerifyMode::NONE); |
|
662 |
builder.set_read_ahead(true); |
|
663 |
builder |
|
664 |
.set_certificate_file("ssl/cert.pem", SslFiletype::PEM) |
|
665 |
.expect("Cannot find certificate file"); |
|
666 |
builder |
|
667 |
.set_private_key_file("ssl/key.pem", SslFiletype::PEM) |
|
668 |
.expect("Cannot find private key file"); |
|
669 |
builder.set_options(SslOptions::NO_COMPRESSION); |
|
670 |
builder.set_cipher_list("DEFAULT:!LOW:!RC4:!EXP").unwrap(); |
|
671 |
ServerSsl { |
|
672 |
listener, |
|
673 |
context: builder.build(), |
|
674 |
} |
|
675 |
} |
|
676 |
||
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
677 |
pub fn build(self) -> NetworkLayer { |
15080 | 678 |
let server = HwServer::new(self.clients_capacity, self.rooms_capacity); |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
679 |
let clients = Slab::with_capacity(self.clients_capacity); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
680 |
let pending = HashSet::with_capacity(2 * self.clients_capacity); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
681 |
let pending_cache = Vec::with_capacity(2 * self.clients_capacity); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
682 |
let timer = timer::Builder::default().build(); |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
683 |
|
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
684 |
NetworkLayer { |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
685 |
listener: self.listener.expect("No listener provided"), |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
686 |
server, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
687 |
clients, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
688 |
pending, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
689 |
pending_cache, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
690 |
#[cfg(feature = "tls-connections")] |
14840 | 691 |
ssl: Self::create_ssl_context( |
14835
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
692 |
self.secure_listener.expect("No secure listener provided"), |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
693 |
), |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
694 |
#[cfg(feature = "official-server")] |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
695 |
io: IoLayer::new(), |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
696 |
timer, |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
697 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
698 |
} |
8ddb5842fe0b
allow running plaintext and tls servers in parallel
alfadur
parents:
14812
diff
changeset
|
699 |
} |