1998-01-16 07:13:05 -05:00
|
|
|
/************************************************
|
|
|
|
|
|
|
|
socket.c -
|
|
|
|
|
|
|
|
created at: Thu Mar 31 12:21:29 JST 1994
|
|
|
|
|
* encoding.c: provide basic features for M17N.
* parse.y: encoding aware parsing.
* parse.y (pragma_encoding): encoding specification pragma.
* parse.y (rb_intern3): encoding specified symbols.
* string.c (rb_str_length): length based on characters.
for older behavior, bytesize method added.
* string.c (rb_str_index_m): index based on characters. rindex as
well.
* string.c (succ_char): encoding aware succeeding string.
* string.c (rb_str_reverse): reverse based on characters.
* string.c (rb_str_inspect): encoding aware string description.
* string.c (rb_str_upcase_bang): encoding aware case conversion.
downcase, capitalize, swapcase as well.
* string.c (rb_str_tr_bang): tr based on characters. delete,
squeeze, tr_s, count as well.
* string.c (rb_str_split_m): split based on characters.
* string.c (rb_str_each_line): encoding aware each_line.
* string.c (rb_str_each_char): added. iteration based on
characters.
* string.c (rb_str_strip_bang): encoding aware whitespace
stripping. lstrip, rstrip as well.
* string.c (rb_str_justify): encoding aware justifying (ljust,
rjust, center).
* string.c (str_encoding): get encoding attribute from a string.
* re.c (rb_reg_initialize): encoding aware regular expression
* sprintf.c (rb_str_format): formatting (i.e. length count) based
on characters.
* io.c (rb_io_getc): getc to return one-character string.
for older behavior, getbyte method added.
* ext/stringio/stringio.c (strio_getc): ditto.
* io.c (rb_io_ungetc): allow pushing arbitrary string at the
current reading point.
* ext/stringio/stringio.c (strio_ungetc): ditto.
* ext/strscan/strscan.c: encoding support.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@13261 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
2007-08-24 23:29:39 -04:00
|
|
|
Copyright (C) 1993-2007 Yukihiro Matsumoto
|
2000-05-09 00:53:16 -04:00
|
|
|
|
1998-01-16 07:13:05 -05:00
|
|
|
************************************************/
|
|
|
|
|
2009-01-16 23:11:27 -05:00
|
|
|
#include "rubysocket.h"
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2013-04-05 22:39:44 -04:00
|
|
|
static VALUE sock_s_unpack_sockaddr_in(VALUE, VALUE);
|
|
|
|
|
|
|
|
void
|
|
|
|
rsock_sys_fail_host_port(const char *mesg, VALUE host, VALUE port)
|
2014-01-04 05:13:36 -05:00
|
|
|
{
|
|
|
|
rsock_syserr_fail_host_port(errno, mesg, host, port);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rsock_syserr_fail_host_port(int err, const char *mesg, VALUE host, VALUE port)
|
2013-04-05 22:39:44 -04:00
|
|
|
{
|
|
|
|
VALUE message;
|
|
|
|
|
2014-01-04 05:15:31 -05:00
|
|
|
message = rb_sprintf("%s for %+"PRIsVALUE" port % "PRIsVALUE"",
|
|
|
|
mesg, host, port);
|
2013-04-05 22:39:44 -04:00
|
|
|
|
2014-01-04 05:13:36 -05:00
|
|
|
rb_syserr_fail_str(err, message);
|
2013-04-05 22:39:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rsock_sys_fail_path(const char *mesg, VALUE path)
|
2014-01-04 05:13:36 -05:00
|
|
|
{
|
|
|
|
rsock_syserr_fail_path(errno, mesg, path);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rsock_syserr_fail_path(int err, const char *mesg, VALUE path)
|
2013-04-05 22:39:44 -04:00
|
|
|
{
|
2013-04-05 22:50:08 -04:00
|
|
|
VALUE message;
|
2014-01-03 05:12:38 -05:00
|
|
|
|
2013-04-06 00:14:57 -04:00
|
|
|
if (RB_TYPE_P(path, T_STRING)) {
|
2014-01-04 05:15:31 -05:00
|
|
|
message = rb_sprintf("%s for % "PRIsVALUE"", mesg, path);
|
2014-01-04 05:13:36 -05:00
|
|
|
rb_syserr_fail_str(err, message);
|
2013-04-05 22:50:08 -04:00
|
|
|
}
|
|
|
|
else {
|
2014-01-04 05:13:36 -05:00
|
|
|
rb_syserr_fail(err, mesg);
|
2013-04-05 22:50:08 -04:00
|
|
|
}
|
2013-04-05 22:39:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2013-04-06 07:04:45 -04:00
|
|
|
rsock_sys_fail_sockaddr(const char *mesg, struct sockaddr *addr, socklen_t len)
|
2014-01-04 05:13:36 -05:00
|
|
|
{
|
|
|
|
rsock_syserr_fail_sockaddr(errno, mesg, addr, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rsock_syserr_fail_sockaddr(int err, const char *mesg, struct sockaddr *addr, socklen_t len)
|
2013-04-05 22:39:44 -04:00
|
|
|
{
|
2013-04-06 01:50:42 -04:00
|
|
|
VALUE rai;
|
2013-04-05 22:39:44 -04:00
|
|
|
|
2013-04-06 07:04:45 -04:00
|
|
|
rai = rsock_addrinfo_new(addr, len, PF_UNSPEC, 0, 0, Qnil, Qnil);
|
2013-04-06 01:50:42 -04:00
|
|
|
|
2014-01-04 05:13:36 -05:00
|
|
|
rsock_syserr_fail_raddrinfo(err, mesg, rai);
|
2013-04-06 01:50:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2013-04-06 07:21:05 -04:00
|
|
|
rsock_sys_fail_raddrinfo(const char *mesg, VALUE rai)
|
2014-01-04 05:13:36 -05:00
|
|
|
{
|
|
|
|
rsock_syserr_fail_raddrinfo(errno, mesg, rai);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rsock_syserr_fail_raddrinfo(int err, const char *mesg, VALUE rai)
|
2013-04-06 01:50:42 -04:00
|
|
|
{
|
|
|
|
VALUE str, message;
|
|
|
|
|
|
|
|
str = rsock_addrinfo_inspect_sockaddr(rai);
|
2014-01-04 05:15:31 -05:00
|
|
|
message = rb_sprintf("%s for %"PRIsVALUE"", mesg, str);
|
2013-04-06 01:50:42 -04:00
|
|
|
|
2014-01-04 05:13:36 -05:00
|
|
|
rb_syserr_fail_str(err, message);
|
2013-04-06 01:50:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2013-04-06 07:21:05 -04:00
|
|
|
rsock_sys_fail_raddrinfo_or_sockaddr(const char *mesg, VALUE addr, VALUE rai)
|
2013-04-06 01:50:42 -04:00
|
|
|
{
|
2014-01-04 05:13:36 -05:00
|
|
|
rsock_syserr_fail_raddrinfo_or_sockaddr(errno, mesg, addr, rai);
|
|
|
|
}
|
2014-01-03 05:12:38 -05:00
|
|
|
|
2014-01-04 05:13:36 -05:00
|
|
|
void
|
|
|
|
rsock_syserr_fail_raddrinfo_or_sockaddr(int err, const char *mesg, VALUE addr, VALUE rai)
|
|
|
|
{
|
2013-04-06 07:04:45 -04:00
|
|
|
if (NIL_P(rai)) {
|
|
|
|
StringValue(addr);
|
2014-01-03 05:12:38 -05:00
|
|
|
|
2014-01-04 05:13:36 -05:00
|
|
|
rsock_syserr_fail_sockaddr(err, mesg,
|
2013-04-06 07:04:45 -04:00
|
|
|
(struct sockaddr *)RSTRING_PTR(addr),
|
|
|
|
(socklen_t)RSTRING_LEN(addr)); /* overflow should be checked already */
|
|
|
|
}
|
2013-04-06 01:50:42 -04:00
|
|
|
else
|
2014-01-04 05:13:36 -05:00
|
|
|
rsock_syserr_fail_raddrinfo(err, mesg, rai);
|
2013-04-05 22:39:44 -04:00
|
|
|
}
|
|
|
|
|
2009-01-07 09:20:15 -05:00
|
|
|
static void
|
2009-01-16 08:31:49 -05:00
|
|
|
setup_domain_and_type(VALUE domain, int *dv, VALUE type, int *tv)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-03-01 01:30:41 -05:00
|
|
|
*dv = rsock_family_arg(domain);
|
|
|
|
*tv = rsock_socktype_arg(type);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-02-02 00:55:56 -05:00
|
|
|
* Socket.new(domain, socktype [, protocol]) => socket
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
* Creates a new socket object.
|
|
|
|
*
|
|
|
|
* _domain_ should be a communications domain such as: :INET, :INET6, :UNIX, etc.
|
|
|
|
*
|
|
|
|
* _socktype_ should be a socket type such as: :STREAM, :DGRAM, :RAW, etc.
|
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* _protocol_ is optional and should be a protocol defined in the domain.
|
|
|
|
* If protocol is not given, 0 is used internally.
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
2009-02-02 00:55:56 -05:00
|
|
|
* Socket.new(:INET, :STREAM) # TCP socket
|
|
|
|
* Socket.new(:INET, :DGRAM) # UDP socket
|
|
|
|
* Socket.new(:UNIX, :STREAM) # UNIX stream socket
|
|
|
|
* Socket.new(:UNIX, :DGRAM) # UNIX datagram socket
|
2009-01-16 08:31:49 -05:00
|
|
|
*/
|
2009-01-07 09:20:15 -05:00
|
|
|
static VALUE
|
2009-02-02 00:55:56 -05:00
|
|
|
sock_initialize(int argc, VALUE *argv, VALUE sock)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-02-02 00:55:56 -05:00
|
|
|
VALUE domain, type, protocol;
|
2009-01-16 08:31:49 -05:00
|
|
|
int fd;
|
|
|
|
int d, t;
|
|
|
|
|
2009-02-02 00:55:56 -05:00
|
|
|
rb_scan_args(argc, argv, "21", &domain, &type, &protocol);
|
|
|
|
if (NIL_P(protocol))
|
|
|
|
protocol = INT2FIX(0);
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_secure(3);
|
|
|
|
setup_domain_and_type(domain, &d, type, &t);
|
2009-03-01 01:48:22 -05:00
|
|
|
fd = rsock_socket(d, t, NUM2INT(protocol));
|
2009-01-16 08:31:49 -05:00
|
|
|
if (fd < 0) rb_sys_fail("socket(2)");
|
|
|
|
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_init_sock(sock, fd);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
#if defined HAVE_SOCKETPAIR
|
2009-01-07 09:20:15 -05:00
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
io_call_close(VALUE io)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
return rb_funcall(io, rb_intern("close"), 0, 0);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
io_close(VALUE io)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
return rb_rescue(io_call_close, io, 0, 0);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
static VALUE
|
|
|
|
pair_yield(VALUE pair)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
return rb_ensure(rb_yield, pair, io_close, rb_ary_entry(pair, 1));
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-04-18 10:10:06 -04:00
|
|
|
#if defined HAVE_SOCKETPAIR
|
2011-10-31 10:49:57 -04:00
|
|
|
|
2014-01-31 03:06:19 -05:00
|
|
|
#ifdef SOCK_CLOEXEC
|
2011-10-31 10:49:57 -04:00
|
|
|
static int
|
2011-11-04 22:19:48 -04:00
|
|
|
rsock_socketpair0(int domain, int type, int protocol, int sv[2])
|
2011-10-31 10:49:57 -04:00
|
|
|
{
|
2011-11-04 22:19:48 -04:00
|
|
|
int ret;
|
2014-01-28 09:37:34 -05:00
|
|
|
static int cloexec_state = -1; /* <0: unknown, 0: ignored, >0: working */
|
|
|
|
|
|
|
|
if (cloexec_state > 0) { /* common path, if SOCK_CLOEXEC is defined */
|
|
|
|
ret = socketpair(domain, type|SOCK_CLOEXEC, protocol, sv);
|
|
|
|
if (ret == 0 && (sv[0] <= 2 || sv[1] <= 2)) {
|
|
|
|
goto fix_cloexec; /* highly unlikely */
|
|
|
|
}
|
|
|
|
goto update_max_fd;
|
|
|
|
}
|
|
|
|
else if (cloexec_state < 0) { /* usually runs once only for detection */
|
2011-11-04 22:19:48 -04:00
|
|
|
ret = socketpair(domain, type|SOCK_CLOEXEC, protocol, sv);
|
2014-01-28 09:37:34 -05:00
|
|
|
if (ret == 0) {
|
|
|
|
cloexec_state = rsock_detect_cloexec(sv[0]);
|
|
|
|
if ((cloexec_state == 0) || (sv[0] <= 2 || sv[1] <= 2))
|
|
|
|
goto fix_cloexec;
|
|
|
|
goto update_max_fd;
|
|
|
|
}
|
|
|
|
else if (ret == -1 && errno == EINVAL) {
|
2011-11-04 22:19:48 -04:00
|
|
|
/* SOCK_CLOEXEC is available since Linux 2.6.27. Linux 2.6.18 fails with EINVAL */
|
2011-11-05 05:06:05 -04:00
|
|
|
ret = socketpair(domain, type, protocol, sv);
|
|
|
|
if (ret != -1) {
|
|
|
|
/* The reason of EINVAL may be other than SOCK_CLOEXEC.
|
|
|
|
* So disable SOCK_CLOEXEC only if socketpair() succeeds without SOCK_CLOEXEC.
|
|
|
|
* Ex. Socket.pair(:UNIX, 0xff) fails with EINVAL.
|
|
|
|
*/
|
2014-01-28 09:37:34 -05:00
|
|
|
cloexec_state = 0;
|
2011-11-04 22:19:48 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-01-28 09:37:34 -05:00
|
|
|
else { /* cloexec_state == 0 */
|
2011-11-04 22:19:48 -04:00
|
|
|
ret = socketpair(domain, type, protocol, sv);
|
|
|
|
}
|
2011-11-03 09:46:41 -04:00
|
|
|
if (ret == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-01-28 09:37:34 -05:00
|
|
|
fix_cloexec:
|
|
|
|
rb_maygvl_fd_fix_cloexec(sv[0]);
|
|
|
|
rb_maygvl_fd_fix_cloexec(sv[1]);
|
|
|
|
|
|
|
|
update_max_fd:
|
|
|
|
rb_update_max_fd(sv[0]);
|
|
|
|
rb_update_max_fd(sv[1]);
|
2011-11-03 09:46:41 -04:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2014-01-31 03:06:19 -05:00
|
|
|
#else /* !SOCK_CLOEXEC */
|
|
|
|
static int
|
|
|
|
rsock_socketpair0(int domain, int type, int protocol, int sv[2])
|
|
|
|
{
|
|
|
|
int ret = socketpair(domain, type, protocol, sv);
|
|
|
|
|
|
|
|
if (ret == -1)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
rb_fd_fix_cloexec(sv[0]);
|
|
|
|
rb_fd_fix_cloexec(sv[1]);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif /* !SOCK_CLOEXEC */
|
2011-11-03 09:46:41 -04:00
|
|
|
|
|
|
|
static int
|
|
|
|
rsock_socketpair(int domain, int type, int protocol, int sv[2])
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = rsock_socketpair0(domain, type, protocol, sv);
|
|
|
|
if (ret < 0 && (errno == EMFILE || errno == ENFILE)) {
|
|
|
|
rb_gc();
|
|
|
|
ret = rsock_socketpair0(domain, type, protocol, sv);
|
2011-10-31 10:49:57 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-01-07 09:20:15 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.pair(domain, type, protocol) => [socket1, socket2]
|
|
|
|
* Socket.socketpair(domain, type, protocol) => [socket1, socket2]
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Creates a pair of sockets connected each other.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _domain_ should be a communications domain such as: :INET, :INET6, :UNIX, etc.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _socktype_ should be a socket type such as: :STREAM, :DGRAM, :RAW, etc.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* _protocol_ should be a protocol defined in the domain,
|
|
|
|
* defaults to 0 for the domain.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2013-03-13 23:49:30 -04:00
|
|
|
* s1, s2 = Socket.pair(:UNIX, :STREAM, 0)
|
|
|
|
* s1.send "a", 0
|
|
|
|
* s1.send "b", 0
|
|
|
|
* s1.close
|
|
|
|
* p s2.recv(10) #=> "ab"
|
|
|
|
* p s2.recv(10) #=> ""
|
|
|
|
* p s2.recv(10) #=> ""
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* s1, s2 = Socket.pair(:UNIX, :DGRAM, 0)
|
|
|
|
* s1.send "a", 0
|
|
|
|
* s1.send "b", 0
|
|
|
|
* p s2.recv(10) #=> "a"
|
|
|
|
* p s2.recv(10) #=> "b"
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
|
|
|
*/
|
2009-01-16 23:11:27 -05:00
|
|
|
VALUE
|
2009-03-01 01:48:22 -05:00
|
|
|
rsock_sock_s_socketpair(int argc, VALUE *argv, VALUE klass)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-02-04 11:20:05 -05:00
|
|
|
VALUE domain, type, protocol;
|
2009-01-16 08:31:49 -05:00
|
|
|
int d, t, p, sp[2];
|
|
|
|
int ret;
|
|
|
|
VALUE s1, s2, r;
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-02-04 11:20:05 -05:00
|
|
|
rb_scan_args(argc, argv, "21", &domain, &type, &protocol);
|
|
|
|
if (NIL_P(protocol))
|
|
|
|
protocol = INT2FIX(0);
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
setup_domain_and_type(domain, &d, type, &t);
|
|
|
|
p = NUM2INT(protocol);
|
2011-10-31 10:49:57 -04:00
|
|
|
ret = rsock_socketpair(d, t, p, sp);
|
2009-01-16 08:31:49 -05:00
|
|
|
if (ret < 0) {
|
|
|
|
rb_sys_fail("socketpair(2)");
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
2009-03-01 01:30:41 -05:00
|
|
|
s1 = rsock_init_sock(rb_obj_alloc(klass), sp[0]);
|
|
|
|
s2 = rsock_init_sock(rb_obj_alloc(klass), sp[1]);
|
2009-01-16 08:31:49 -05:00
|
|
|
r = rb_assoc_new(s1, s2);
|
|
|
|
if (rb_block_given_p()) {
|
|
|
|
return rb_ensure(pair_yield, r, io_close, s1);
|
|
|
|
}
|
|
|
|
return r;
|
2009-04-18 10:10:06 -04:00
|
|
|
}
|
2009-01-16 08:31:49 -05:00
|
|
|
#else
|
2009-04-18 10:10:06 -04:00
|
|
|
#define rsock_sock_s_socketpair rb_f_notimplement
|
2009-01-16 08:31:49 -05:00
|
|
|
#endif
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-19 12:54:59 -04:00
|
|
|
* socket.connect(remote_sockaddr) => 0
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2010-03-22 05:45:57 -04:00
|
|
|
* Requests a connection to be made on the given +remote_sockaddr+. Returns 0 if
|
2009-01-16 08:31:49 -05:00
|
|
|
* successful, otherwise an exception is raised.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Parameter
|
2010-03-22 05:45:57 -04:00
|
|
|
* * +remote_sockaddr+ - the +struct+ sockaddr contained in a string or Addrinfo object
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Example:
|
|
|
|
* # Pull down Google's web page
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new( AF_INET, SOCK_STREAM, 0 )
|
|
|
|
* sockaddr = Socket.pack_sockaddr_in( 80, 'www.google.com' )
|
|
|
|
* socket.connect( sockaddr )
|
|
|
|
* socket.write( "GET / HTTP/1.0\r\n\r\n" )
|
2010-04-22 04:04:13 -04:00
|
|
|
* results = socket.read
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Unix-based Exceptions
|
2010-04-22 04:04:13 -04:00
|
|
|
* On unix-based systems the following system exceptions may be raised if
|
2009-01-16 08:31:49 -05:00
|
|
|
* the call to _connect_ fails:
|
|
|
|
* * Errno::EACCES - search permission is denied for a component of the prefix
|
2009-11-04 07:02:37 -05:00
|
|
|
* path or write access to the +socket+ is denied
|
2009-01-16 08:31:49 -05:00
|
|
|
* * Errno::EADDRINUSE - the _sockaddr_ is already in use
|
|
|
|
* * Errno::EADDRNOTAVAIL - the specified _sockaddr_ is not available from the
|
|
|
|
* local machine
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EAFNOSUPPORT - the specified _sockaddr_ is not a valid address for
|
2009-01-16 08:31:49 -05:00
|
|
|
* the address family of the specified +socket+
|
|
|
|
* * Errno::EALREADY - a connection is already in progress for the specified
|
|
|
|
* socket
|
|
|
|
* * Errno::EBADF - the +socket+ is not a valid file descriptor
|
|
|
|
* * Errno::ECONNREFUSED - the target _sockaddr_ was not listening for connections
|
|
|
|
* refused the connection request
|
|
|
|
* * Errno::ECONNRESET - the remote host reset the connection request
|
|
|
|
* * Errno::EFAULT - the _sockaddr_ cannot be accessed
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EHOSTUNREACH - the destination host cannot be reached (probably
|
2009-01-16 08:31:49 -05:00
|
|
|
* because the host is down or a remote router cannot reach it)
|
|
|
|
* * Errno::EINPROGRESS - the O_NONBLOCK is set for the +socket+ and the
|
2009-11-04 07:02:37 -05:00
|
|
|
* connection cannot be immediately established; the connection will be
|
2009-01-16 08:31:49 -05:00
|
|
|
* established asynchronously
|
|
|
|
* * Errno::EINTR - the attempt to establish the connection was interrupted by
|
|
|
|
* delivery of a signal that was caught; the connection will be established
|
|
|
|
* asynchronously
|
|
|
|
* * Errno::EISCONN - the specified +socket+ is already connected
|
|
|
|
* * Errno::EINVAL - the address length used for the _sockaddr_ is not a valid
|
2010-04-22 04:04:13 -04:00
|
|
|
* length for the address family or there is an invalid family in _sockaddr_
|
2009-01-16 08:31:49 -05:00
|
|
|
* * Errno::ENAMETOOLONG - the pathname resolved had a length which exceeded
|
|
|
|
* PATH_MAX
|
|
|
|
* * Errno::ENETDOWN - the local interface used to reach the destination is down
|
|
|
|
* * Errno::ENETUNREACH - no route to the network is present
|
|
|
|
* * Errno::ENOBUFS - no buffer space is available
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ENOSR - there were insufficient STREAMS resources available to
|
2009-01-16 08:31:49 -05:00
|
|
|
* complete the operation
|
|
|
|
* * Errno::ENOTSOCK - the +socket+ argument does not refer to a socket
|
|
|
|
* * Errno::EOPNOTSUPP - the calling +socket+ is listening and cannot be connected
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EPROTOTYPE - the _sockaddr_ has a different type than the socket
|
2009-01-16 08:31:49 -05:00
|
|
|
* bound to the specified peer address
|
|
|
|
* * Errno::ETIMEDOUT - the attempt to connect time out before a connection
|
|
|
|
* was made.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* On unix-based systems if the address family of the calling +socket+ is
|
|
|
|
* AF_UNIX the follow exceptions may be raised if the call to _connect_
|
|
|
|
* fails:
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EIO - an i/o error occurred while reading from or writing to the
|
2009-01-16 08:31:49 -05:00
|
|
|
* file system
|
|
|
|
* * Errno::ELOOP - too many symbolic links were encountered in translating
|
|
|
|
* the pathname in _sockaddr_
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ENAMETOOLLONG - a component of a pathname exceeded NAME_MAX
|
2009-11-04 07:02:37 -05:00
|
|
|
* characters, or an entire pathname exceeded PATH_MAX characters
|
2009-01-16 08:31:49 -05:00
|
|
|
* * Errno::ENOENT - a component of the pathname does not name an existing file
|
|
|
|
* or the pathname is an empty string
|
|
|
|
* * Errno::ENOTDIR - a component of the path prefix of the pathname in _sockaddr_
|
2010-04-22 04:04:13 -04:00
|
|
|
* is not a directory
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Windows Exceptions
|
2010-04-22 04:04:13 -04:00
|
|
|
* On Windows systems the following system exceptions may be raised if
|
2009-01-16 08:31:49 -05:00
|
|
|
* the call to _connect_ fails:
|
|
|
|
* * Errno::ENETDOWN - the network is down
|
|
|
|
* * Errno::EADDRINUSE - the socket's local address is already in use
|
|
|
|
* * Errno::EINTR - the socket was cancelled
|
|
|
|
* * Errno::EINPROGRESS - a blocking socket is in progress or the service provider
|
2010-04-22 04:04:13 -04:00
|
|
|
* is still processing a callback function. Or a nonblocking connect call is
|
2009-01-16 08:31:49 -05:00
|
|
|
* in progress on the +socket+.
|
|
|
|
* * Errno::EALREADY - see Errno::EINVAL
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EADDRNOTAVAIL - the remote address is not a valid address, such as
|
2009-01-16 08:31:49 -05:00
|
|
|
* ADDR_ANY TODO check ADDRANY TO INADDR_ANY
|
|
|
|
* * Errno::EAFNOSUPPORT - addresses in the specified family cannot be used with
|
|
|
|
* with this +socket+
|
|
|
|
* * Errno::ECONNREFUSED - the target _sockaddr_ was not listening for connections
|
|
|
|
* refused the connection request
|
|
|
|
* * Errno::EFAULT - the socket's internal address or address length parameter
|
|
|
|
* is too small or is not a valid part of the user space address
|
|
|
|
* * Errno::EINVAL - the +socket+ is a listening socket
|
|
|
|
* * Errno::EISCONN - the +socket+ is already connected
|
|
|
|
* * Errno::ENETUNREACH - the network cannot be reached from this host at this time
|
|
|
|
* * Errno::EHOSTUNREACH - no route to the network is present
|
|
|
|
* * Errno::ENOBUFS - no buffer space is available
|
|
|
|
* * Errno::ENOTSOCK - the +socket+ argument does not refer to a socket
|
|
|
|
* * Errno::ETIMEDOUT - the attempt to connect time out before a connection
|
|
|
|
* was made.
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EWOULDBLOCK - the socket is marked as nonblocking and the
|
2009-01-16 08:31:49 -05:00
|
|
|
* connection cannot be completed immediately
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EACCES - the attempt to connect the datagram socket to the
|
2009-01-16 08:31:49 -05:00
|
|
|
* broadcast address failed
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === See
|
|
|
|
* * connect manual pages on unix-based systems
|
|
|
|
* * connect function in Microsoft's Winsock functions reference
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
sock_connect(VALUE sock, VALUE addr)
|
|
|
|
{
|
2013-04-06 01:50:42 -04:00
|
|
|
VALUE rai;
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_io_t *fptr;
|
|
|
|
int fd, n;
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2013-04-06 01:50:42 -04:00
|
|
|
SockAddrStringValueWithAddrinfo(addr, rai);
|
2009-01-16 08:31:49 -05:00
|
|
|
addr = rb_str_new4(addr);
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
fd = fptr->fd;
|
2013-04-06 03:58:51 -04:00
|
|
|
n = rsock_connect(fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_SOCKLEN(addr), 0);
|
2009-01-16 08:31:49 -05:00
|
|
|
if (n < 0) {
|
2013-04-06 07:21:05 -04:00
|
|
|
rsock_sys_fail_raddrinfo_or_sockaddr("connect(2)", addr, rai);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
return INT2FIX(n);
|
|
|
|
}
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-19 12:54:59 -04:00
|
|
|
* socket.connect_nonblock(remote_sockaddr) => 0
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2010-03-22 05:45:57 -04:00
|
|
|
* Requests a connection to be made on the given +remote_sockaddr+ after
|
2009-01-16 08:31:49 -05:00
|
|
|
* O_NONBLOCK is set for the underlying file descriptor.
|
|
|
|
* Returns 0 if successful, otherwise an exception is raised.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Parameter
|
2010-03-22 05:45:57 -04:00
|
|
|
* * +remote_sockaddr+ - the +struct+ sockaddr contained in a string or Addrinfo object
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Example:
|
|
|
|
* # Pull down Google's web page
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new(AF_INET, SOCK_STREAM, 0)
|
|
|
|
* sockaddr = Socket.sockaddr_in(80, 'www.google.com')
|
|
|
|
* begin # emulate blocking connect
|
|
|
|
* socket.connect_nonblock(sockaddr)
|
2009-03-19 07:40:38 -04:00
|
|
|
* rescue IO::WaitWritable
|
2009-03-04 17:19:33 -05:00
|
|
|
* IO.select(nil, [socket]) # wait 3-way handshake completion
|
2009-01-16 08:31:49 -05:00
|
|
|
* begin
|
2010-04-22 04:04:13 -04:00
|
|
|
* socket.connect_nonblock(sockaddr) # check connection failure
|
2009-01-16 08:31:49 -05:00
|
|
|
* rescue Errno::EISCONN
|
|
|
|
* end
|
|
|
|
* end
|
|
|
|
* socket.write("GET / HTTP/1.0\r\n\r\n")
|
2010-04-22 04:04:13 -04:00
|
|
|
* results = socket.read
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Refer to Socket#connect for the exceptions that may be thrown if the call
|
2010-04-22 04:04:13 -04:00
|
|
|
* to _connect_nonblock_ fails.
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
* Socket#connect_nonblock may raise any error corresponding to connect(2) failure,
|
|
|
|
* including Errno::EINPROGRESS.
|
|
|
|
*
|
2009-03-19 07:40:38 -04:00
|
|
|
* If the exception is Errno::EINPROGRESS,
|
|
|
|
* it is extended by IO::WaitWritable.
|
|
|
|
* So IO::WaitWritable can be used to rescue the exceptions for retrying connect_nonblock.
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === See
|
|
|
|
* * Socket#connect
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
sock_connect_nonblock(VALUE sock, VALUE addr)
|
|
|
|
{
|
2013-04-06 01:50:42 -04:00
|
|
|
VALUE rai;
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_io_t *fptr;
|
|
|
|
int n;
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2013-04-06 01:50:42 -04:00
|
|
|
SockAddrStringValueWithAddrinfo(addr, rai);
|
2009-01-16 08:31:49 -05:00
|
|
|
addr = rb_str_new4(addr);
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
rb_io_set_nonblock(fptr);
|
2013-04-06 03:58:51 -04:00
|
|
|
n = connect(fptr->fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_SOCKLEN(addr));
|
2009-01-16 08:31:49 -05:00
|
|
|
if (n < 0) {
|
2009-02-21 10:57:52 -05:00
|
|
|
if (errno == EINPROGRESS)
|
2013-04-08 15:58:55 -04:00
|
|
|
rb_readwrite_sys_fail(RB_IO_WAIT_WRITABLE, "connect(2) would block");
|
2013-04-06 07:21:05 -04:00
|
|
|
rsock_sys_fail_raddrinfo_or_sockaddr("connect(2)", addr, rai);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
return INT2FIX(n);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-19 12:54:59 -04:00
|
|
|
* socket.bind(local_sockaddr) => 0
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2010-03-22 05:45:57 -04:00
|
|
|
* Binds to the given local address.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Parameter
|
2010-03-22 05:45:57 -04:00
|
|
|
* * +local_sockaddr+ - the +struct+ sockaddr contained in a string or an Addrinfo object
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
* require 'socket'
|
2010-03-22 05:45:57 -04:00
|
|
|
*
|
|
|
|
* # use Addrinfo
|
|
|
|
* socket = Socket.new(:INET, :STREAM, 0)
|
|
|
|
* socket.bind(Addrinfo.tcp("127.0.0.1", 2222))
|
|
|
|
* p socket.local_address #=> #<Addrinfo: 127.0.0.1:2222 TCP>
|
|
|
|
*
|
|
|
|
* # use struct sockaddr
|
2009-01-16 08:31:49 -05:00
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new( AF_INET, SOCK_STREAM, 0 )
|
|
|
|
* sockaddr = Socket.pack_sockaddr_in( 2200, 'localhost' )
|
|
|
|
* socket.bind( sockaddr )
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Unix-based Exceptions
|
2010-04-22 04:04:13 -04:00
|
|
|
* On unix-based based systems the following system exceptions may be raised if
|
2009-01-16 08:31:49 -05:00
|
|
|
* the call to _bind_ fails:
|
|
|
|
* * Errno::EACCES - the specified _sockaddr_ is protected and the current
|
|
|
|
* user does not have permission to bind to it
|
|
|
|
* * Errno::EADDRINUSE - the specified _sockaddr_ is already in use
|
|
|
|
* * Errno::EADDRNOTAVAIL - the specified _sockaddr_ is not available from the
|
|
|
|
* local machine
|
2009-11-04 07:02:37 -05:00
|
|
|
* * Errno::EAFNOSUPPORT - the specified _sockaddr_ is not a valid address for
|
2009-01-16 08:31:49 -05:00
|
|
|
* the family of the calling +socket+
|
|
|
|
* * Errno::EBADF - the _sockaddr_ specified is not a valid file descriptor
|
|
|
|
* * Errno::EFAULT - the _sockaddr_ argument cannot be accessed
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EINVAL - the +socket+ is already bound to an address, and the
|
2009-01-16 08:31:49 -05:00
|
|
|
* protocol does not support binding to the new _sockaddr_ or the +socket+
|
|
|
|
* has been shut down.
|
|
|
|
* * Errno::EINVAL - the address length is not a valid length for the address
|
|
|
|
* family
|
|
|
|
* * Errno::ENAMETOOLONG - the pathname resolved had a length which exceeded
|
|
|
|
* PATH_MAX
|
|
|
|
* * Errno::ENOBUFS - no buffer space is available
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ENOSR - there were insufficient STREAMS resources available to
|
2009-01-16 08:31:49 -05:00
|
|
|
* complete the operation
|
|
|
|
* * Errno::ENOTSOCK - the +socket+ does not refer to a socket
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EOPNOTSUPP - the socket type of the +socket+ does not support
|
2009-01-16 08:31:49 -05:00
|
|
|
* binding to an address
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* On unix-based based systems if the address family of the calling +socket+ is
|
|
|
|
* Socket::AF_UNIX the follow exceptions may be raised if the call to _bind_
|
|
|
|
* fails:
|
|
|
|
* * Errno::EACCES - search permission is denied for a component of the prefix
|
2009-11-04 07:02:37 -05:00
|
|
|
* path or write access to the +socket+ is denied
|
2009-01-16 08:31:49 -05:00
|
|
|
* * Errno::EDESTADDRREQ - the _sockaddr_ argument is a null pointer
|
|
|
|
* * Errno::EISDIR - same as Errno::EDESTADDRREQ
|
|
|
|
* * Errno::EIO - an i/o error occurred
|
|
|
|
* * Errno::ELOOP - too many symbolic links were encountered in translating
|
|
|
|
* the pathname in _sockaddr_
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ENAMETOOLLONG - a component of a pathname exceeded NAME_MAX
|
2009-11-04 07:02:37 -05:00
|
|
|
* characters, or an entire pathname exceeded PATH_MAX characters
|
2009-01-16 08:31:49 -05:00
|
|
|
* * Errno::ENOENT - a component of the pathname does not name an existing file
|
|
|
|
* or the pathname is an empty string
|
|
|
|
* * Errno::ENOTDIR - a component of the path prefix of the pathname in _sockaddr_
|
|
|
|
* is not a directory
|
|
|
|
* * Errno::EROFS - the name would reside on a read only filesystem
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Windows Exceptions
|
2010-04-22 04:04:13 -04:00
|
|
|
* On Windows systems the following system exceptions may be raised if
|
2009-01-16 08:31:49 -05:00
|
|
|
* the call to _bind_ fails:
|
|
|
|
* * Errno::ENETDOWN-- the network is down
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EACCES - the attempt to connect the datagram socket to the
|
2009-01-16 08:31:49 -05:00
|
|
|
* broadcast address failed
|
|
|
|
* * Errno::EADDRINUSE - the socket's local address is already in use
|
|
|
|
* * Errno::EADDRNOTAVAIL - the specified address is not a valid address for this
|
|
|
|
* computer
|
|
|
|
* * Errno::EFAULT - the socket's internal address or address length parameter
|
|
|
|
* is too small or is not a valid part of the user space addressed
|
|
|
|
* * Errno::EINVAL - the +socket+ is already bound to an address
|
|
|
|
* * Errno::ENOBUFS - no buffer space is available
|
|
|
|
* * Errno::ENOTSOCK - the +socket+ argument does not refer to a socket
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === See
|
|
|
|
* * bind manual pages on unix-based systems
|
|
|
|
* * bind function in Microsoft's Winsock functions reference
|
2010-04-22 04:04:13 -04:00
|
|
|
*/
|
2009-01-16 08:31:49 -05:00
|
|
|
static VALUE
|
|
|
|
sock_bind(VALUE sock, VALUE addr)
|
|
|
|
{
|
2013-04-06 01:50:42 -04:00
|
|
|
VALUE rai;
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_io_t *fptr;
|
|
|
|
|
2013-04-06 01:50:42 -04:00
|
|
|
SockAddrStringValueWithAddrinfo(addr, rai);
|
2009-01-16 08:31:49 -05:00
|
|
|
GetOpenFile(sock, fptr);
|
2013-04-06 03:58:51 -04:00
|
|
|
if (bind(fptr->fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_SOCKLEN(addr)) < 0)
|
2013-04-06 07:21:05 -04:00
|
|
|
rsock_sys_fail_raddrinfo_or_sockaddr("bind(2)", addr, rai);
|
2009-01-16 08:31:49 -05:00
|
|
|
|
|
|
|
return INT2FIX(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-19 12:54:59 -04:00
|
|
|
* socket.listen( int ) => 0
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Listens for connections, using the specified +int+ as the backlog. A call
|
2010-04-22 04:04:13 -04:00
|
|
|
* to _listen_ only applies if the +socket+ is of type SOCK_STREAM or
|
2009-01-16 08:31:49 -05:00
|
|
|
* SOCK_SEQPACKET.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Parameter
|
|
|
|
* * +backlog+ - the maximum length of the queue for pending connections.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Example 1
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new( AF_INET, SOCK_STREAM, 0 )
|
|
|
|
* sockaddr = Socket.pack_sockaddr_in( 2200, 'localhost' )
|
|
|
|
* socket.bind( sockaddr )
|
|
|
|
* socket.listen( 5 )
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-11-04 07:02:37 -05:00
|
|
|
* === Example 2 (listening on an arbitrary port, unix-based systems only):
|
2009-01-16 08:31:49 -05:00
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new( AF_INET, SOCK_STREAM, 0 )
|
|
|
|
* socket.listen( 1 )
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Unix-based Exceptions
|
|
|
|
* On unix based systems the above will work because a new +sockaddr+ struct
|
|
|
|
* is created on the address ADDR_ANY, for an arbitrary port number as handed
|
|
|
|
* off by the kernel. It will not work on Windows, because Windows requires that
|
|
|
|
* the +socket+ is bound by calling _bind_ before it can _listen_.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* If the _backlog_ amount exceeds the implementation-dependent maximum
|
|
|
|
* queue length, the implementation's maximum queue length will be used.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* On unix-based based systems the following system exceptions may be raised if the
|
|
|
|
* call to _listen_ fails:
|
|
|
|
* * Errno::EBADF - the _socket_ argument is not a valid file descriptor
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EDESTADDRREQ - the _socket_ is not bound to a local address, and
|
2009-01-16 08:31:49 -05:00
|
|
|
* the protocol does not support listening on an unbound socket
|
|
|
|
* * Errno::EINVAL - the _socket_ is already connected
|
|
|
|
* * Errno::ENOTSOCK - the _socket_ argument does not refer to a socket
|
|
|
|
* * Errno::EOPNOTSUPP - the _socket_ protocol does not support listen
|
2009-11-04 07:02:37 -05:00
|
|
|
* * Errno::EACCES - the calling process does not have appropriate privileges
|
2009-01-16 08:31:49 -05:00
|
|
|
* * Errno::EINVAL - the _socket_ has been shut down
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ENOBUFS - insufficient resources are available in the system to
|
2009-01-16 08:31:49 -05:00
|
|
|
* complete the call
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Windows Exceptions
|
2010-04-22 04:04:13 -04:00
|
|
|
* On Windows systems the following system exceptions may be raised if
|
2009-01-16 08:31:49 -05:00
|
|
|
* the call to _listen_ fails:
|
|
|
|
* * Errno::ENETDOWN - the network is down
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EADDRINUSE - the socket's local address is already in use. This
|
2009-01-16 08:31:49 -05:00
|
|
|
* usually occurs during the execution of _bind_ but could be delayed
|
|
|
|
* if the call to _bind_ was to a partially wildcard address (involving
|
2010-04-22 04:04:13 -04:00
|
|
|
* ADDR_ANY) and if a specific address needs to be committed at the
|
2009-01-16 08:31:49 -05:00
|
|
|
* time of the call to _listen_
|
|
|
|
* * Errno::EINPROGRESS - a Windows Sockets 1.1 call is in progress or the
|
|
|
|
* service provider is still processing a callback function
|
|
|
|
* * Errno::EINVAL - the +socket+ has not been bound with a call to _bind_.
|
|
|
|
* * Errno::EISCONN - the +socket+ is already connected
|
|
|
|
* * Errno::EMFILE - no more socket descriptors are available
|
|
|
|
* * Errno::ENOBUFS - no buffer space is available
|
|
|
|
* * Errno::ENOTSOC - +socket+ is not a socket
|
|
|
|
* * Errno::EOPNOTSUPP - the referenced +socket+ is not a type that supports
|
|
|
|
* the _listen_ method
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === See
|
|
|
|
* * listen manual pages on unix-based systems
|
|
|
|
* * listen function in Microsoft's Winsock functions reference
|
|
|
|
*/
|
2010-03-21 06:50:52 -04:00
|
|
|
VALUE
|
|
|
|
rsock_sock_listen(VALUE sock, VALUE log)
|
2009-01-16 08:31:49 -05:00
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
|
|
|
int backlog;
|
|
|
|
|
|
|
|
backlog = NUM2INT(log);
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
if (listen(fptr->fd, backlog) < 0)
|
|
|
|
rb_sys_fail("listen(2)");
|
|
|
|
|
|
|
|
return INT2FIX(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-19 12:54:59 -04:00
|
|
|
* socket.recvfrom(maxlen) => [mesg, sender_addrinfo]
|
|
|
|
* socket.recvfrom(maxlen, flags) => [mesg, sender_addrinfo]
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Receives up to _maxlen_ bytes from +socket+. _flags_ is zero or more
|
|
|
|
* of the +MSG_+ options. The first element of the results, _mesg_, is the data
|
2010-03-22 05:45:57 -04:00
|
|
|
* received. The second element, _sender_addrinfo_, contains protocol-specific
|
|
|
|
* address information of the sender.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Parameters
|
2010-03-22 05:45:57 -04:00
|
|
|
* * +maxlen+ - the maximum number of bytes to receive from the socket
|
2010-04-22 04:04:13 -04:00
|
|
|
* * +flags+ - zero or more of the +MSG_+ options
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Example
|
|
|
|
* # In one file, start this first
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new( AF_INET, SOCK_STREAM, 0 )
|
|
|
|
* sockaddr = Socket.pack_sockaddr_in( 2200, 'localhost' )
|
|
|
|
* socket.bind( sockaddr )
|
|
|
|
* socket.listen( 5 )
|
2010-01-31 04:03:08 -05:00
|
|
|
* client, client_addrinfo = socket.accept
|
2009-01-16 08:31:49 -05:00
|
|
|
* data = client.recvfrom( 20 )[0].chomp
|
|
|
|
* puts "I only received 20 bytes '#{data}'"
|
|
|
|
* sleep 1
|
|
|
|
* socket.close
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* # In another file, start this second
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new( AF_INET, SOCK_STREAM, 0 )
|
|
|
|
* sockaddr = Socket.pack_sockaddr_in( 2200, 'localhost' )
|
|
|
|
* socket.connect( sockaddr )
|
|
|
|
* socket.puts "Watch this get cut short!"
|
2010-04-22 04:04:13 -04:00
|
|
|
* socket.close
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Unix-based Exceptions
|
|
|
|
* On unix-based based systems the following system exceptions may be raised if the
|
|
|
|
* call to _recvfrom_ fails:
|
|
|
|
* * Errno::EAGAIN - the +socket+ file descriptor is marked as O_NONBLOCK and no
|
|
|
|
* data is waiting to be received; or MSG_OOB is set and no out-of-band data
|
2010-04-22 04:04:13 -04:00
|
|
|
* is available and either the +socket+ file descriptor is marked as
|
|
|
|
* O_NONBLOCK or the +socket+ does not support blocking to wait for
|
2009-01-16 08:31:49 -05:00
|
|
|
* out-of-band-data
|
|
|
|
* * Errno::EWOULDBLOCK - see Errno::EAGAIN
|
|
|
|
* * Errno::EBADF - the +socket+ is not a valid file descriptor
|
|
|
|
* * Errno::ECONNRESET - a connection was forcibly closed by a peer
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EFAULT - the socket's internal buffer, address or address length
|
2009-01-16 08:31:49 -05:00
|
|
|
* cannot be accessed or written
|
2009-11-04 07:02:37 -05:00
|
|
|
* * Errno::EINTR - a signal interrupted _recvfrom_ before any data was available
|
2009-01-16 08:31:49 -05:00
|
|
|
* * Errno::EINVAL - the MSG_OOB flag is set and no out-of-band data is available
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EIO - an i/o error occurred while reading from or writing to the
|
2009-01-16 08:31:49 -05:00
|
|
|
* filesystem
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ENOBUFS - insufficient resources were available in the system to
|
2009-01-16 08:31:49 -05:00
|
|
|
* perform the operation
|
|
|
|
* * Errno::ENOMEM - insufficient memory was available to fulfill the request
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ENOSR - there were insufficient STREAMS resources available to
|
2009-01-16 08:31:49 -05:00
|
|
|
* complete the operation
|
|
|
|
* * Errno::ENOTCONN - a receive is attempted on a connection-mode socket that
|
|
|
|
* is not connected
|
|
|
|
* * Errno::ENOTSOCK - the +socket+ does not refer to a socket
|
|
|
|
* * Errno::EOPNOTSUPP - the specified flags are not supported for this socket type
|
|
|
|
* * Errno::ETIMEDOUT - the connection timed out during connection establishment
|
|
|
|
* or due to a transmission timeout on an active connection
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Windows Exceptions
|
2010-04-22 04:04:13 -04:00
|
|
|
* On Windows systems the following system exceptions may be raised if
|
2009-01-16 08:31:49 -05:00
|
|
|
* the call to _recvfrom_ fails:
|
|
|
|
* * Errno::ENETDOWN - the network is down
|
|
|
|
* * Errno::EFAULT - the internal buffer and from parameters on +socket+ are not
|
|
|
|
* part of the user address space, or the internal fromlen parameter is
|
2009-11-04 07:02:37 -05:00
|
|
|
* too small to accommodate the peer address
|
2009-01-16 08:31:49 -05:00
|
|
|
* * Errno::EINTR - the (blocking) call was cancelled by an internal call to
|
|
|
|
* the WinSock function WSACancelBlockingCall
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EINPROGRESS - a blocking Windows Sockets 1.1 call is in progress or
|
2009-01-16 08:31:49 -05:00
|
|
|
* the service provider is still processing a callback function
|
|
|
|
* * Errno::EINVAL - +socket+ has not been bound with a call to _bind_, or an
|
|
|
|
* unknown flag was specified, or MSG_OOB was specified for a socket with
|
|
|
|
* SO_OOBINLINE enabled, or (for byte stream-style sockets only) the internal
|
|
|
|
* len parameter on +socket+ was zero or negative
|
|
|
|
* * Errno::EISCONN - +socket+ is already connected. The call to _recvfrom_ is
|
2010-04-22 04:04:13 -04:00
|
|
|
* not permitted with a connected socket on a socket that is connection
|
2009-01-16 08:31:49 -05:00
|
|
|
* oriented or connectionless.
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ENETRESET - the connection has been broken due to the keep-alive
|
2009-01-16 08:31:49 -05:00
|
|
|
* activity detecting a failure while the operation was in progress.
|
|
|
|
* * Errno::EOPNOTSUPP - MSG_OOB was specified, but +socket+ is not stream-style
|
|
|
|
* such as type SOCK_STREAM. OOB data is not supported in the communication
|
2010-04-22 04:04:13 -04:00
|
|
|
* domain associated with +socket+, or +socket+ is unidirectional and
|
2009-01-16 08:31:49 -05:00
|
|
|
* supports only send operations
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ESHUTDOWN - +socket+ has been shutdown. It is not possible to
|
2009-01-16 08:31:49 -05:00
|
|
|
* call _recvfrom_ on a socket after _shutdown_ has been invoked.
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::EWOULDBLOCK - +socket+ is marked as nonblocking and a call to
|
2009-01-16 08:31:49 -05:00
|
|
|
* _recvfrom_ would block.
|
|
|
|
* * Errno::EMSGSIZE - the message was too large to fit into the specified buffer
|
|
|
|
* and was truncated.
|
|
|
|
* * Errno::ETIMEDOUT - the connection has been dropped, because of a network
|
|
|
|
* failure or because the system on the other end went down without
|
|
|
|
* notice
|
2010-04-22 04:04:13 -04:00
|
|
|
* * Errno::ECONNRESET - the virtual circuit was reset by the remote side
|
2009-01-16 08:31:49 -05:00
|
|
|
* executing a hard or abortive close. The application should close the
|
|
|
|
* socket; it is no longer usable. On a UDP-datagram socket this error
|
|
|
|
* indicates a previous send operation resulted in an ICMP Port Unreachable
|
|
|
|
* message.
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
sock_recvfrom(int argc, VALUE *argv, VALUE sock)
|
|
|
|
{
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_s_recvfrom(sock, argc, argv, RECV_SOCKET);
|
2009-01-16 08:31:49 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-19 12:54:59 -04:00
|
|
|
* socket.recvfrom_nonblock(maxlen) => [mesg, sender_addrinfo]
|
|
|
|
* socket.recvfrom_nonblock(maxlen, flags) => [mesg, sender_addrinfo]
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Receives up to _maxlen_ bytes from +socket+ using recvfrom(2) after
|
|
|
|
* O_NONBLOCK is set for the underlying file descriptor.
|
|
|
|
* _flags_ is zero or more of the +MSG_+ options.
|
|
|
|
* The first element of the results, _mesg_, is the data received.
|
2010-03-22 05:45:57 -04:00
|
|
|
* The second element, _sender_addrinfo_, contains protocol-specific address
|
|
|
|
* information of the sender.
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
* When recvfrom(2) returns 0, Socket#recvfrom_nonblock returns
|
|
|
|
* an empty string as data.
|
|
|
|
* The meaning depends on the socket: EOF on TCP, empty packet on UDP, etc.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Parameters
|
2010-03-22 05:45:57 -04:00
|
|
|
* * +maxlen+ - the maximum number of bytes to receive from the socket
|
2010-04-22 04:04:13 -04:00
|
|
|
* * +flags+ - zero or more of the +MSG_+ options
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Example
|
|
|
|
* # In one file, start this first
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new(AF_INET, SOCK_STREAM, 0)
|
|
|
|
* sockaddr = Socket.sockaddr_in(2200, 'localhost')
|
|
|
|
* socket.bind(sockaddr)
|
|
|
|
* socket.listen(5)
|
2010-01-31 04:03:08 -05:00
|
|
|
* client, client_addrinfo = socket.accept
|
2009-01-16 08:31:49 -05:00
|
|
|
* begin # emulate blocking recvfrom
|
|
|
|
* pair = client.recvfrom_nonblock(20)
|
2009-03-19 07:40:38 -04:00
|
|
|
* rescue IO::WaitReadable
|
2009-01-16 08:31:49 -05:00
|
|
|
* IO.select([client])
|
|
|
|
* retry
|
|
|
|
* end
|
|
|
|
* data = pair[0].chomp
|
|
|
|
* puts "I only received 20 bytes '#{data}'"
|
|
|
|
* sleep 1
|
|
|
|
* socket.close
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* # In another file, start this second
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new(AF_INET, SOCK_STREAM, 0)
|
|
|
|
* sockaddr = Socket.sockaddr_in(2200, 'localhost')
|
|
|
|
* socket.connect(sockaddr)
|
|
|
|
* socket.puts "Watch this get cut short!"
|
2010-04-22 04:04:13 -04:00
|
|
|
* socket.close
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Refer to Socket#recvfrom for the exceptions that may be thrown if the call
|
2010-04-22 04:04:13 -04:00
|
|
|
* to _recvfrom_nonblock_ fails.
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
* Socket#recvfrom_nonblock may raise any error corresponding to recvfrom(2) failure,
|
|
|
|
* including Errno::EWOULDBLOCK.
|
|
|
|
*
|
2009-03-19 07:40:38 -04:00
|
|
|
* If the exception is Errno::EWOULDBLOCK or Errno::AGAIN,
|
|
|
|
* it is extended by IO::WaitReadable.
|
|
|
|
* So IO::WaitReadable can be used to rescue the exceptions for retrying recvfrom_nonblock.
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === See
|
|
|
|
* * Socket#recvfrom
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
sock_recvfrom_nonblock(int argc, VALUE *argv, VALUE sock)
|
|
|
|
{
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_s_recvfrom_nonblock(sock, argc, argv, RECV_SOCKET);
|
2009-01-16 08:31:49 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* socket.accept => [client_socket, client_addrinfo]
|
|
|
|
*
|
|
|
|
* Accepts a next connection.
|
2009-02-05 06:01:43 -05:00
|
|
|
* Returns a new Socket object and Addrinfo object.
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
* serv = Socket.new(:INET, :STREAM, 0)
|
|
|
|
* serv.listen(5)
|
|
|
|
* c = Socket.new(:INET, :STREAM, 0)
|
2010-03-22 05:45:57 -04:00
|
|
|
* c.connect(serv.connect_address)
|
2009-02-05 06:01:43 -05:00
|
|
|
* p serv.accept #=> [#<Socket:fd 6>, #<Addrinfo: 127.0.0.1:48555 TCP>]
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
sock_accept(VALUE sock)
|
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
|
|
|
VALUE sock2;
|
2013-02-24 12:51:17 -05:00
|
|
|
union_sockaddr buf;
|
2010-04-28 04:14:13 -04:00
|
|
|
socklen_t len = (socklen_t)sizeof buf;
|
2009-01-16 08:31:49 -05:00
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
2013-02-24 12:51:17 -05:00
|
|
|
sock2 = rsock_s_accept(rb_cSocket,fptr->fd,&buf.addr,&len);
|
2009-01-16 08:31:49 -05:00
|
|
|
|
2013-02-24 12:51:17 -05:00
|
|
|
return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, &buf.addr, len));
|
2009-01-16 08:31:49 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-19 12:54:59 -04:00
|
|
|
* socket.accept_nonblock => [client_socket, client_addrinfo]
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Accepts an incoming connection using accept(2) after
|
|
|
|
* O_NONBLOCK is set for the underlying file descriptor.
|
2009-11-04 07:02:37 -05:00
|
|
|
* It returns an array containing the accepted socket
|
2009-01-16 08:31:49 -05:00
|
|
|
* for the incoming connection, _client_socket_,
|
2010-01-31 04:03:08 -05:00
|
|
|
* and an Addrinfo, _client_addrinfo_.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Example
|
|
|
|
* # In one script, start this first
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new(AF_INET, SOCK_STREAM, 0)
|
|
|
|
* sockaddr = Socket.sockaddr_in(2200, 'localhost')
|
|
|
|
* socket.bind(sockaddr)
|
|
|
|
* socket.listen(5)
|
|
|
|
* begin # emulate blocking accept
|
2010-01-31 04:03:08 -05:00
|
|
|
* client_socket, client_addrinfo = socket.accept_nonblock
|
2009-03-19 07:40:38 -04:00
|
|
|
* rescue IO::WaitReadable, Errno::EINTR
|
2009-01-16 08:31:49 -05:00
|
|
|
* IO.select([socket])
|
|
|
|
* retry
|
|
|
|
* end
|
|
|
|
* puts "The client said, '#{client_socket.readline.chomp}'"
|
|
|
|
* client_socket.puts "Hello from script one!"
|
|
|
|
* socket.close
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* # In another script, start this second
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new(AF_INET, SOCK_STREAM, 0)
|
|
|
|
* sockaddr = Socket.sockaddr_in(2200, 'localhost')
|
|
|
|
* socket.connect(sockaddr)
|
2010-04-22 04:04:13 -04:00
|
|
|
* socket.puts "Hello from script 2."
|
2009-01-16 08:31:49 -05:00
|
|
|
* puts "The server said, '#{socket.readline.chomp}'"
|
|
|
|
* socket.close
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Refer to Socket#accept for the exceptions that may be thrown if the call
|
2010-04-22 04:04:13 -04:00
|
|
|
* to _accept_nonblock_ fails.
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
* Socket#accept_nonblock may raise any error corresponding to accept(2) failure,
|
|
|
|
* including Errno::EWOULDBLOCK.
|
2009-03-19 07:40:38 -04:00
|
|
|
*
|
|
|
|
* If the exception is Errno::EWOULDBLOCK, Errno::AGAIN, Errno::ECONNABORTED or Errno::EPROTO,
|
|
|
|
* it is extended by IO::WaitReadable.
|
|
|
|
* So IO::WaitReadable can be used to rescue the exceptions for retrying accept_nonblock.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === See
|
|
|
|
* * Socket#accept
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
sock_accept_nonblock(VALUE sock)
|
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
|
|
|
VALUE sock2;
|
2013-02-24 12:51:17 -05:00
|
|
|
union_sockaddr buf;
|
2010-04-28 04:14:13 -04:00
|
|
|
socklen_t len = (socklen_t)sizeof buf;
|
2009-01-16 08:31:49 -05:00
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
2013-02-24 12:51:17 -05:00
|
|
|
sock2 = rsock_s_accept_nonblock(rb_cSocket, fptr, &buf.addr, &len);
|
|
|
|
return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, &buf.addr, len));
|
2009-01-16 08:31:49 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-19 12:54:59 -04:00
|
|
|
* socket.sysaccept => [client_socket_fd, client_addrinfo]
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-11-04 07:02:37 -05:00
|
|
|
* Accepts an incoming connection returning an array containing the (integer)
|
2009-01-16 08:31:49 -05:00
|
|
|
* file descriptor for the incoming connection, _client_socket_fd_,
|
2010-01-31 04:03:08 -05:00
|
|
|
* and an Addrinfo, _client_addrinfo_.
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === Example
|
|
|
|
* # In one script, start this first
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new( AF_INET, SOCK_STREAM, 0 )
|
|
|
|
* sockaddr = Socket.pack_sockaddr_in( 2200, 'localhost' )
|
|
|
|
* socket.bind( sockaddr )
|
|
|
|
* socket.listen( 5 )
|
2010-01-31 04:03:08 -05:00
|
|
|
* client_fd, client_addrinfo = socket.sysaccept
|
2009-01-16 08:31:49 -05:00
|
|
|
* client_socket = Socket.for_fd( client_fd )
|
|
|
|
* puts "The client said, '#{client_socket.readline.chomp}'"
|
|
|
|
* client_socket.puts "Hello from script one!"
|
|
|
|
* socket.close
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* # In another script, start this second
|
|
|
|
* require 'socket'
|
|
|
|
* include Socket::Constants
|
|
|
|
* socket = Socket.new( AF_INET, SOCK_STREAM, 0 )
|
|
|
|
* sockaddr = Socket.pack_sockaddr_in( 2200, 'localhost' )
|
|
|
|
* socket.connect( sockaddr )
|
2010-04-22 04:04:13 -04:00
|
|
|
* socket.puts "Hello from script 2."
|
2009-01-16 08:31:49 -05:00
|
|
|
* puts "The server said, '#{socket.readline.chomp}'"
|
|
|
|
* socket.close
|
2010-04-22 04:04:13 -04:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Refer to Socket#accept for the exceptions that may be thrown if the call
|
2010-04-22 04:04:13 -04:00
|
|
|
* to _sysaccept_ fails.
|
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* === See
|
|
|
|
* * Socket#accept
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
sock_sysaccept(VALUE sock)
|
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
|
|
|
VALUE sock2;
|
2013-02-24 12:51:17 -05:00
|
|
|
union_sockaddr buf;
|
2010-04-28 04:14:13 -04:00
|
|
|
socklen_t len = (socklen_t)sizeof buf;
|
2009-01-16 08:31:49 -05:00
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
2013-02-24 12:51:17 -05:00
|
|
|
sock2 = rsock_s_accept(0,fptr->fd,&buf.addr,&len);
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2013-02-24 12:51:17 -05:00
|
|
|
return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, &buf.addr, len));
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
#ifdef HAVE_GETHOSTNAME
|
2009-01-07 09:20:15 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.gethostname => hostname
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Returns the hostname.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* p Socket.gethostname #=> "hal"
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2010-03-22 05:45:57 -04:00
|
|
|
* Note that it is not guaranteed to be able to convert to IP address using gethostbyname, getaddrinfo, etc.
|
|
|
|
* If you need local IP address, use Socket.ip_address_list.
|
2009-01-07 09:20:15 -05:00
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_gethostname(VALUE obj)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2014-07-25 00:17:50 -04:00
|
|
|
#if defined(NI_MAXHOST)
|
|
|
|
# define RUBY_MAX_HOST_NAME_LEN NI_MAXHOST
|
|
|
|
#elif defined(HOST_NAME_MAX)
|
|
|
|
# define RUBY_MAX_HOST_NAME_LEN HOST_NAME_MAX
|
|
|
|
#else
|
|
|
|
# define RUBY_MAX_HOST_NAME_LEN 1024
|
2009-02-10 10:39:16 -05:00
|
|
|
#endif
|
2014-07-25 00:17:50 -04:00
|
|
|
|
|
|
|
char buf[RUBY_MAX_HOST_NAME_LEN+1];
|
2009-01-16 08:31:49 -05:00
|
|
|
|
|
|
|
rb_secure(3);
|
|
|
|
if (gethostname(buf, (int)sizeof buf - 1) < 0)
|
2013-04-05 22:39:44 -04:00
|
|
|
rb_sys_fail("gethostname(3)");
|
2009-01-16 08:31:49 -05:00
|
|
|
|
|
|
|
buf[sizeof buf - 1] = '\0';
|
|
|
|
return rb_str_new2(buf);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
2009-01-16 08:31:49 -05:00
|
|
|
#else
|
|
|
|
#ifdef HAVE_UNAME
|
|
|
|
|
|
|
|
#include <sys/utsname.h>
|
2009-01-07 09:20:15 -05:00
|
|
|
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_gethostname(VALUE obj)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
struct utsname un;
|
|
|
|
|
|
|
|
rb_secure(3);
|
|
|
|
uname(&un);
|
|
|
|
return rb_str_new2(un.nodename);
|
|
|
|
}
|
|
|
|
#else
|
2009-04-18 10:10:06 -04:00
|
|
|
#define sock_gethostname rb_f_notimplement
|
2009-01-16 08:31:49 -05:00
|
|
|
#endif
|
|
|
|
#endif
|
2009-01-07 09:20:15 -05:00
|
|
|
|
|
|
|
static VALUE
|
2014-02-19 04:38:24 -05:00
|
|
|
make_addrinfo(struct rb_addrinfo *res0, int norevlookup)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
VALUE base, ary;
|
|
|
|
struct addrinfo *res;
|
|
|
|
|
|
|
|
if (res0 == NULL) {
|
|
|
|
rb_raise(rb_eSocket, "host not found");
|
|
|
|
}
|
|
|
|
base = rb_ary_new();
|
2014-02-19 04:38:24 -05:00
|
|
|
for (res = res0->ai; res; res = res->ai_next) {
|
2013-02-14 06:28:49 -05:00
|
|
|
ary = rsock_ipaddr(res->ai_addr, res->ai_addrlen, norevlookup);
|
2009-01-16 08:31:49 -05:00
|
|
|
if (res->ai_canonname) {
|
|
|
|
RARRAY_PTR(ary)[2] = rb_str_new2(res->ai_canonname);
|
|
|
|
}
|
|
|
|
rb_ary_push(ary, INT2FIX(res->ai_family));
|
|
|
|
rb_ary_push(ary, INT2FIX(res->ai_socktype));
|
|
|
|
rb_ary_push(ary, INT2FIX(res->ai_protocol));
|
|
|
|
rb_ary_push(base, ary);
|
|
|
|
}
|
|
|
|
return base;
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
static VALUE
|
2013-02-15 02:54:38 -05:00
|
|
|
sock_sockaddr(struct sockaddr *addr, socklen_t len)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
char *ptr;
|
|
|
|
|
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
ptr = (char*)&((struct sockaddr_in*)addr)->sin_addr.s_addr;
|
2013-02-15 02:54:38 -05:00
|
|
|
len = (socklen_t)sizeof(((struct sockaddr_in*)addr)->sin_addr.s_addr);
|
2009-01-16 08:31:49 -05:00
|
|
|
break;
|
2009-12-30 15:56:41 -05:00
|
|
|
#ifdef AF_INET6
|
2009-01-16 08:31:49 -05:00
|
|
|
case AF_INET6:
|
|
|
|
ptr = (char*)&((struct sockaddr_in6*)addr)->sin6_addr.s6_addr;
|
2013-02-15 02:54:38 -05:00
|
|
|
len = (socklen_t)sizeof(((struct sockaddr_in6*)addr)->sin6_addr.s6_addr);
|
2009-01-16 08:31:49 -05:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
rb_raise(rb_eSocket, "unknown socket family:%d", addr->sa_family);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return rb_str_new(ptr, len);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.gethostbyname(hostname) => [official_hostname, alias_hostnames, address_family, *address_list]
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Obtains the host information for _hostname_.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* p Socket.gethostbyname("hal") #=> ["localhost", ["hal"], 2, "\x7F\x00\x00\x01"]
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_gethostbyname(VALUE obj, VALUE host)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_secure(3);
|
2009-03-01 01:48:22 -05:00
|
|
|
return rsock_make_hostent(host, rsock_addrinfo(host, Qnil, SOCK_STREAM, AI_CANONNAME), sock_sockaddr);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.gethostbyaddr(address_string [, address_family]) => hostent
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Obtains the host information for _address_.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2010-04-22 04:04:13 -04:00
|
|
|
* p Socket.gethostbyaddr([221,186,184,68].pack("CCCC"))
|
2009-01-16 08:31:49 -05:00
|
|
|
* #=> ["carbon.ruby-lang.org", [], 2, "\xDD\xBA\xB8D"]
|
2009-01-07 09:20:15 -05:00
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_gethostbyaddr(int argc, VALUE *argv)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
VALUE addr, family;
|
|
|
|
struct hostent *h;
|
|
|
|
char **pch;
|
|
|
|
VALUE ary, names;
|
|
|
|
int t = AF_INET;
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_scan_args(argc, argv, "11", &addr, &family);
|
2012-04-25 23:34:12 -04:00
|
|
|
StringValue(addr);
|
2009-01-16 08:31:49 -05:00
|
|
|
if (!NIL_P(family)) {
|
2009-03-01 01:30:41 -05:00
|
|
|
t = rsock_family_arg(family);
|
2009-01-16 08:31:49 -05:00
|
|
|
}
|
2010-02-05 21:35:11 -05:00
|
|
|
#ifdef AF_INET6
|
2009-01-16 08:31:49 -05:00
|
|
|
else if (RSTRING_LEN(addr) == 16) {
|
|
|
|
t = AF_INET6;
|
|
|
|
}
|
|
|
|
#endif
|
2013-04-06 03:58:51 -04:00
|
|
|
h = gethostbyaddr(RSTRING_PTR(addr), RSTRING_SOCKLEN(addr), t);
|
2009-01-16 08:31:49 -05:00
|
|
|
if (h == NULL) {
|
|
|
|
#ifdef HAVE_HSTRERROR
|
|
|
|
extern int h_errno;
|
|
|
|
rb_raise(rb_eSocket, "%s", (char*)hstrerror(h_errno));
|
2009-01-12 09:32:21 -05:00
|
|
|
#else
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_raise(rb_eSocket, "host not found");
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
ary = rb_ary_new();
|
|
|
|
rb_ary_push(ary, rb_str_new2(h->h_name));
|
|
|
|
names = rb_ary_new();
|
|
|
|
rb_ary_push(ary, names);
|
|
|
|
if (h->h_aliases != NULL) {
|
|
|
|
for (pch = h->h_aliases; *pch; pch++) {
|
|
|
|
rb_ary_push(names, rb_str_new2(*pch));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rb_ary_push(ary, INT2NUM(h->h_addrtype));
|
|
|
|
#ifdef h_addr
|
|
|
|
for (pch = h->h_addr_list; *pch; pch++) {
|
|
|
|
rb_ary_push(ary, rb_str_new(*pch, h->h_length));
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
rb_ary_push(ary, rb_str_new(h->h_addr, h->h_length));
|
2009-01-12 09:32:21 -05:00
|
|
|
#endif
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
return ary;
|
|
|
|
}
|
|
|
|
|
2009-01-07 09:20:15 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.getservbyname(service_name) => port_number
|
|
|
|
* Socket.getservbyname(service_name, protocol_name) => port_number
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Obtains the port number for _service_name_.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* If _protocol_name_ is not given, "tcp" is assumed.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.getservbyname("smtp") #=> 25
|
|
|
|
* Socket.getservbyname("shell") #=> 514
|
|
|
|
* Socket.getservbyname("syslog", "udp") #=> 514
|
2010-04-22 04:04:13 -04:00
|
|
|
*/
|
2009-01-07 09:20:15 -05:00
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_getservbyname(int argc, VALUE *argv)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
VALUE service, proto;
|
|
|
|
struct servent *sp;
|
2010-04-28 04:14:13 -04:00
|
|
|
long port;
|
2009-01-16 08:31:49 -05:00
|
|
|
const char *servicename, *protoname = "tcp";
|
|
|
|
|
|
|
|
rb_scan_args(argc, argv, "11", &service, &proto);
|
|
|
|
StringValue(service);
|
|
|
|
if (!NIL_P(proto)) StringValue(proto);
|
|
|
|
servicename = StringValueCStr(service);
|
|
|
|
if (!NIL_P(proto)) protoname = StringValueCStr(proto);
|
|
|
|
sp = getservbyname(servicename, protoname);
|
|
|
|
if (sp) {
|
|
|
|
port = ntohs(sp->s_port);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
char *end;
|
|
|
|
|
|
|
|
port = STRTOUL(servicename, &end, 0);
|
|
|
|
if (*end != '\0') {
|
|
|
|
rb_raise(rb_eSocket, "no such service %s/%s", servicename, protoname);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return INT2FIX(port);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.getservbyport(port [, protocol_name]) => service
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Obtains the port number for _port_.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* If _protocol_name_ is not given, "tcp" is assumed.
|
|
|
|
*
|
|
|
|
* Socket.getservbyport(80) #=> "www"
|
|
|
|
* Socket.getservbyport(514, "tcp") #=> "shell"
|
|
|
|
* Socket.getservbyport(514, "udp") #=> "syslog"
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_getservbyport(int argc, VALUE *argv)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
VALUE port, proto;
|
|
|
|
struct servent *sp;
|
|
|
|
long portnum;
|
|
|
|
const char *protoname = "tcp";
|
|
|
|
|
|
|
|
rb_scan_args(argc, argv, "11", &port, &proto);
|
|
|
|
portnum = NUM2LONG(port);
|
|
|
|
if (portnum != (uint16_t)portnum) {
|
|
|
|
const char *s = portnum > 0 ? "big" : "small";
|
|
|
|
rb_raise(rb_eRangeError, "integer %ld too %s to convert into `int16_t'", portnum, s);
|
|
|
|
}
|
|
|
|
if (!NIL_P(proto)) protoname = StringValueCStr(proto);
|
|
|
|
|
|
|
|
sp = getservbyport((int)htons((uint16_t)portnum), protoname);
|
|
|
|
if (!sp) {
|
|
|
|
rb_raise(rb_eSocket, "no such service for port %d/%s", (int)portnum, protoname);
|
|
|
|
}
|
|
|
|
return rb_tainted_str_new2(sp->s_name);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2010-02-05 21:35:11 -05:00
|
|
|
* Socket.getaddrinfo(nodename, servname[, family[, socktype[, protocol[, flags[, reverse_lookup]]]]]) => array
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Obtains address information for _nodename_:_servname_.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _family_ should be an address family such as: :INET, :INET6, :UNIX, etc.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _socktype_ should be a socket type such as: :STREAM, :DGRAM, :RAW, etc.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* _protocol_ should be a protocol defined in the family,
|
|
|
|
* and defaults to 0 for the family.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _flags_ should be bitwise OR of Socket::AI_* constants.
|
|
|
|
*
|
|
|
|
* Socket.getaddrinfo("www.ruby-lang.org", "http", nil, :STREAM)
|
|
|
|
* #=> [["AF_INET", 80, "carbon.ruby-lang.org", "221.186.184.68", 2, 1, 6]] # PF_INET/SOCK_STREAM/IPPROTO_TCP
|
|
|
|
*
|
|
|
|
* Socket.getaddrinfo("localhost", nil)
|
|
|
|
* #=> [["AF_INET", 0, "localhost", "127.0.0.1", 2, 1, 6], # PF_INET/SOCK_STREAM/IPPROTO_TCP
|
|
|
|
* # ["AF_INET", 0, "localhost", "127.0.0.1", 2, 2, 17], # PF_INET/SOCK_DGRAM/IPPROTO_UDP
|
|
|
|
* # ["AF_INET", 0, "localhost", "127.0.0.1", 2, 3, 0]] # PF_INET/SOCK_RAW/IPPROTO_IP
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2010-02-05 21:35:11 -05:00
|
|
|
* _reverse_lookup_ directs the form of the third element, and has to
|
2012-10-19 23:51:33 -04:00
|
|
|
* be one of below. If _reverse_lookup_ is omitted, the default value is +nil+.
|
2010-02-05 21:35:11 -05:00
|
|
|
*
|
|
|
|
* +true+, +:hostname+: hostname is obtained from numeric address using reverse lookup, which may take a time.
|
|
|
|
* +false+, +:numeric+: hostname is same as numeric address.
|
|
|
|
* +nil+: obey to the current +do_not_reverse_lookup+ flag.
|
2010-03-21 23:33:14 -04:00
|
|
|
*
|
|
|
|
* If Addrinfo object is preferred, use Addrinfo.getaddrinfo.
|
2009-01-07 09:20:15 -05:00
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_getaddrinfo(int argc, VALUE *argv)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2010-02-05 21:35:11 -05:00
|
|
|
VALUE host, port, family, socktype, protocol, flags, ret, revlookup;
|
2014-02-19 04:38:24 -05:00
|
|
|
struct addrinfo hints;
|
|
|
|
struct rb_addrinfo *res;
|
2010-02-05 21:35:11 -05:00
|
|
|
int norevlookup;
|
2009-01-16 08:31:49 -05:00
|
|
|
|
2010-02-05 21:35:11 -05:00
|
|
|
rb_scan_args(argc, argv, "25", &host, &port, &family, &socktype, &protocol, &flags, &revlookup);
|
2009-01-16 08:31:49 -05:00
|
|
|
|
|
|
|
MEMZERO(&hints, struct addrinfo, 1);
|
2009-03-01 01:30:41 -05:00
|
|
|
hints.ai_family = NIL_P(family) ? PF_UNSPEC : rsock_family_arg(family);
|
2009-01-16 08:31:49 -05:00
|
|
|
|
|
|
|
if (!NIL_P(socktype)) {
|
2009-03-01 01:30:41 -05:00
|
|
|
hints.ai_socktype = rsock_socktype_arg(socktype);
|
2009-01-16 08:31:49 -05:00
|
|
|
}
|
|
|
|
if (!NIL_P(protocol)) {
|
|
|
|
hints.ai_protocol = NUM2INT(protocol);
|
|
|
|
}
|
|
|
|
if (!NIL_P(flags)) {
|
|
|
|
hints.ai_flags = NUM2INT(flags);
|
|
|
|
}
|
2010-02-05 21:35:11 -05:00
|
|
|
if (NIL_P(revlookup) || !rsock_revlookup_flag(revlookup, &norevlookup)) {
|
|
|
|
norevlookup = rsock_do_not_reverse_lookup;
|
|
|
|
}
|
2009-03-01 01:48:22 -05:00
|
|
|
res = rsock_getaddrinfo(host, port, &hints, 0);
|
2009-01-16 08:31:49 -05:00
|
|
|
|
2010-02-05 21:35:11 -05:00
|
|
|
ret = make_addrinfo(res, norevlookup);
|
2014-02-19 04:38:24 -05:00
|
|
|
rb_freeaddrinfo(res);
|
2009-01-16 08:31:49 -05:00
|
|
|
return ret;
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.getnameinfo(sockaddr [, flags]) => [hostname, servicename]
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Obtains name information for _sockaddr_.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _sockaddr_ should be one of follows.
|
2009-11-04 07:02:37 -05:00
|
|
|
* - packed sockaddr string such as Socket.sockaddr_in(80, "127.0.0.1")
|
2009-01-16 08:31:49 -05:00
|
|
|
* - 3-elements array such as ["AF_INET", 80, "127.0.0.1"]
|
|
|
|
* - 4-elements array such as ["AF_INET", 80, ignored, "127.0.0.1"]
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _flags_ should be bitwise OR of Socket::NI_* constants.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* Note:
|
|
|
|
* The last form is compatible with IPSocket#addr and IPSocket#peeraddr.
|
2009-01-16 08:31:49 -05:00
|
|
|
*
|
|
|
|
* Socket.getnameinfo(Socket.sockaddr_in(80, "127.0.0.1")) #=> ["localhost", "www"]
|
|
|
|
* Socket.getnameinfo(["AF_INET", 80, "127.0.0.1"]) #=> ["localhost", "www"]
|
|
|
|
* Socket.getnameinfo(["AF_INET", 80, "localhost", "127.0.0.1"]) #=> ["localhost", "www"]
|
2010-03-21 23:33:14 -04:00
|
|
|
*
|
|
|
|
* If Addrinfo object is preferred, use Addrinfo#getnameinfo.
|
2009-01-07 09:20:15 -05:00
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_getnameinfo(int argc, VALUE *argv)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
VALUE sa, af = Qnil, host = Qnil, port = Qnil, flags, tmp;
|
|
|
|
char *hptr, *pptr;
|
2009-01-07 09:20:15 -05:00
|
|
|
char hbuf[1024], pbuf[1024];
|
2009-01-16 08:31:49 -05:00
|
|
|
int fl;
|
2014-02-19 04:38:24 -05:00
|
|
|
struct rb_addrinfo *res = NULL;
|
|
|
|
struct addrinfo hints, *r;
|
2014-04-07 08:14:29 -04:00
|
|
|
int error, saved_errno;
|
2013-02-24 12:51:17 -05:00
|
|
|
union_sockaddr ss;
|
2009-01-16 08:31:49 -05:00
|
|
|
struct sockaddr *sap;
|
2013-02-14 06:28:49 -05:00
|
|
|
socklen_t salen;
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
sa = flags = Qnil;
|
|
|
|
rb_scan_args(argc, argv, "11", &sa, &flags);
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
fl = 0;
|
|
|
|
if (!NIL_P(flags)) {
|
|
|
|
fl = NUM2INT(flags);
|
|
|
|
}
|
2009-01-17 11:39:03 -05:00
|
|
|
tmp = rb_check_sockaddr_string_type(sa);
|
2009-01-16 08:31:49 -05:00
|
|
|
if (!NIL_P(tmp)) {
|
|
|
|
sa = tmp;
|
2009-03-01 09:00:48 -05:00
|
|
|
if (sizeof(ss) < (size_t)RSTRING_LEN(sa)) {
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_raise(rb_eTypeError, "sockaddr length too big");
|
|
|
|
}
|
|
|
|
memcpy(&ss, RSTRING_PTR(sa), RSTRING_LEN(sa));
|
2013-02-24 12:51:17 -05:00
|
|
|
if (!VALIDATE_SOCKLEN(&ss.addr, RSTRING_LEN(sa))) {
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_raise(rb_eTypeError, "sockaddr size differs - should not happen");
|
|
|
|
}
|
2013-02-24 12:51:17 -05:00
|
|
|
sap = &ss.addr;
|
2013-04-06 03:58:51 -04:00
|
|
|
salen = RSTRING_SOCKLEN(sa);
|
2009-01-16 08:31:49 -05:00
|
|
|
goto call_nameinfo;
|
|
|
|
}
|
|
|
|
tmp = rb_check_array_type(sa);
|
|
|
|
if (!NIL_P(tmp)) {
|
|
|
|
sa = tmp;
|
|
|
|
MEMZERO(&hints, struct addrinfo, 1);
|
|
|
|
if (RARRAY_LEN(sa) == 3) {
|
|
|
|
af = RARRAY_PTR(sa)[0];
|
|
|
|
port = RARRAY_PTR(sa)[1];
|
|
|
|
host = RARRAY_PTR(sa)[2];
|
|
|
|
}
|
|
|
|
else if (RARRAY_LEN(sa) >= 4) {
|
|
|
|
af = RARRAY_PTR(sa)[0];
|
|
|
|
port = RARRAY_PTR(sa)[1];
|
|
|
|
host = RARRAY_PTR(sa)[3];
|
|
|
|
if (NIL_P(host)) {
|
|
|
|
host = RARRAY_PTR(sa)[2];
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/*
|
|
|
|
* 4th element holds numeric form, don't resolve.
|
2009-03-01 01:30:41 -05:00
|
|
|
* see rsock_ipaddr().
|
2009-01-16 08:31:49 -05:00
|
|
|
*/
|
|
|
|
#ifdef AI_NUMERICHOST /* AIX 4.3.3 doesn't have AI_NUMERICHOST. */
|
|
|
|
hints.ai_flags |= AI_NUMERICHOST;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
rb_raise(rb_eArgError, "array size should be 3 or 4, %ld given",
|
|
|
|
RARRAY_LEN(sa));
|
|
|
|
}
|
|
|
|
/* host */
|
|
|
|
if (NIL_P(host)) {
|
|
|
|
hptr = NULL;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
strncpy(hbuf, StringValuePtr(host), sizeof(hbuf));
|
|
|
|
hbuf[sizeof(hbuf) - 1] = '\0';
|
|
|
|
hptr = hbuf;
|
|
|
|
}
|
|
|
|
/* port */
|
|
|
|
if (NIL_P(port)) {
|
|
|
|
strcpy(pbuf, "0");
|
|
|
|
pptr = NULL;
|
|
|
|
}
|
|
|
|
else if (FIXNUM_P(port)) {
|
|
|
|
snprintf(pbuf, sizeof(pbuf), "%ld", NUM2LONG(port));
|
|
|
|
pptr = pbuf;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
strncpy(pbuf, StringValuePtr(port), sizeof(pbuf));
|
|
|
|
pbuf[sizeof(pbuf) - 1] = '\0';
|
|
|
|
pptr = pbuf;
|
|
|
|
}
|
|
|
|
hints.ai_socktype = (fl & NI_DGRAM) ? SOCK_DGRAM : SOCK_STREAM;
|
|
|
|
/* af */
|
2009-03-01 01:30:41 -05:00
|
|
|
hints.ai_family = NIL_P(af) ? PF_UNSPEC : rsock_family_arg(af);
|
2009-01-16 08:31:49 -05:00
|
|
|
error = rb_getaddrinfo(hptr, pptr, &hints, &res);
|
|
|
|
if (error) goto error_exit_addr;
|
2014-02-19 04:38:24 -05:00
|
|
|
sap = res->ai->ai_addr;
|
|
|
|
salen = res->ai->ai_addrlen;
|
2009-01-16 08:31:49 -05:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
rb_raise(rb_eTypeError, "expecting String or Array");
|
|
|
|
}
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
call_nameinfo:
|
2013-02-14 06:28:49 -05:00
|
|
|
error = rb_getnameinfo(sap, salen, hbuf, sizeof(hbuf),
|
2009-01-16 08:31:49 -05:00
|
|
|
pbuf, sizeof(pbuf), fl);
|
|
|
|
if (error) goto error_exit_name;
|
|
|
|
if (res) {
|
2014-02-19 04:38:24 -05:00
|
|
|
for (r = res->ai->ai_next; r; r = r->ai_next) {
|
2009-01-16 08:31:49 -05:00
|
|
|
char hbuf2[1024], pbuf2[1024];
|
2009-01-07 10:27:09 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
sap = r->ai_addr;
|
2013-02-14 06:28:49 -05:00
|
|
|
salen = r->ai_addrlen;
|
|
|
|
error = rb_getnameinfo(sap, salen, hbuf2, sizeof(hbuf2),
|
2009-01-16 08:31:49 -05:00
|
|
|
pbuf2, sizeof(pbuf2), fl);
|
|
|
|
if (error) goto error_exit_name;
|
|
|
|
if (strcmp(hbuf, hbuf2) != 0|| strcmp(pbuf, pbuf2) != 0) {
|
2014-02-19 04:38:24 -05:00
|
|
|
rb_freeaddrinfo(res);
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_raise(rb_eSocket, "sockaddr resolved to multiple nodename");
|
|
|
|
}
|
|
|
|
}
|
2014-02-19 04:38:24 -05:00
|
|
|
rb_freeaddrinfo(res);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
return rb_assoc_new(rb_str_new2(hbuf), rb_str_new2(pbuf));
|
2009-01-12 09:58:25 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
error_exit_addr:
|
2014-04-07 08:14:29 -04:00
|
|
|
saved_errno = errno;
|
2014-02-19 04:38:24 -05:00
|
|
|
if (res) rb_freeaddrinfo(res);
|
2014-04-07 08:14:29 -04:00
|
|
|
errno = saved_errno;
|
2009-03-01 01:30:41 -05:00
|
|
|
rsock_raise_socket_error("getaddrinfo", error);
|
2009-01-12 09:58:25 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
error_exit_name:
|
2014-04-07 08:14:29 -04:00
|
|
|
saved_errno = errno;
|
2014-02-19 04:38:24 -05:00
|
|
|
if (res) rb_freeaddrinfo(res);
|
2014-04-07 08:14:29 -04:00
|
|
|
errno = saved_errno;
|
2009-03-01 01:30:41 -05:00
|
|
|
rsock_raise_socket_error("getnameinfo", error);
|
2012-04-13 19:45:37 -04:00
|
|
|
|
|
|
|
UNREACHABLE;
|
2009-01-12 09:58:25 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.sockaddr_in(port, host) => sockaddr
|
|
|
|
* Socket.pack_sockaddr_in(port, host) => sockaddr
|
2009-01-12 09:58:25 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Packs _port_ and _host_ as an AF_INET/AF_INET6 sockaddr string.
|
|
|
|
*
|
|
|
|
* Socket.sockaddr_in(80, "127.0.0.1")
|
|
|
|
* #=> "\x02\x00\x00P\x7F\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00"
|
|
|
|
*
|
|
|
|
* Socket.sockaddr_in(80, "::1")
|
|
|
|
* #=> "\n\x00\x00P\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00"
|
2009-01-12 09:58:25 -05:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_pack_sockaddr_in(VALUE self, VALUE port, VALUE host)
|
2009-01-12 09:58:25 -05:00
|
|
|
{
|
2014-02-19 04:38:24 -05:00
|
|
|
struct rb_addrinfo *res = rsock_addrinfo(host, port, 0, 0);
|
|
|
|
VALUE addr = rb_str_new((char*)res->ai->ai_addr, res->ai->ai_addrlen);
|
2009-01-12 09:58:25 -05:00
|
|
|
|
2014-02-19 04:38:24 -05:00
|
|
|
rb_freeaddrinfo(res);
|
2009-01-16 08:31:49 -05:00
|
|
|
OBJ_INFECT(addr, port);
|
|
|
|
OBJ_INFECT(addr, host);
|
2009-01-12 09:58:25 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
return addr;
|
2009-01-12 09:58:25 -05:00
|
|
|
}
|
|
|
|
|
2009-01-07 09:20:15 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.unpack_sockaddr_in(sockaddr) => [port, ip_address]
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Unpacks _sockaddr_ into port and ip_address.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _sockaddr_ should be a string or an addrinfo for AF_INET/AF_INET6.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* sockaddr = Socket.sockaddr_in(80, "127.0.0.1")
|
|
|
|
* p sockaddr #=> "\x02\x00\x00P\x7F\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00"
|
|
|
|
* p Socket.unpack_sockaddr_in(sockaddr) #=> [80, "127.0.0.1"]
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_unpack_sockaddr_in(VALUE self, VALUE addr)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
struct sockaddr_in * sockaddr;
|
|
|
|
VALUE host;
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
sockaddr = (struct sockaddr_in*)SockAddrStringValuePtr(addr);
|
|
|
|
if (RSTRING_LEN(addr) <
|
|
|
|
(char*)&((struct sockaddr *)sockaddr)->sa_family +
|
|
|
|
sizeof(((struct sockaddr *)sockaddr)->sa_family) -
|
|
|
|
(char*)sockaddr)
|
|
|
|
rb_raise(rb_eArgError, "too short sockaddr");
|
|
|
|
if (((struct sockaddr *)sockaddr)->sa_family != AF_INET
|
|
|
|
#ifdef INET6
|
|
|
|
&& ((struct sockaddr *)sockaddr)->sa_family != AF_INET6
|
|
|
|
#endif
|
|
|
|
) {
|
|
|
|
#ifdef INET6
|
|
|
|
rb_raise(rb_eArgError, "not an AF_INET/AF_INET6 sockaddr");
|
|
|
|
#else
|
|
|
|
rb_raise(rb_eArgError, "not an AF_INET sockaddr");
|
|
|
|
#endif
|
|
|
|
}
|
2013-04-06 03:58:51 -04:00
|
|
|
host = rsock_make_ipaddr((struct sockaddr*)sockaddr, RSTRING_SOCKLEN(addr));
|
2009-01-16 08:31:49 -05:00
|
|
|
OBJ_INFECT(host, addr);
|
|
|
|
return rb_assoc_new(INT2NUM(ntohs(sockaddr->sin_port)), host);
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
#ifdef HAVE_SYS_UN_H
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-15 12:06:37 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.sockaddr_un(path) => sockaddr
|
|
|
|
* Socket.pack_sockaddr_un(path) => sockaddr
|
2009-01-15 12:06:37 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Packs _path_ as an AF_UNIX sockaddr string.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.sockaddr_un("/tmp/sock") #=> "\x01\x00/tmp/sock\x00\x00..."
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_pack_sockaddr_un(VALUE self, VALUE path)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
struct sockaddr_un sockaddr;
|
|
|
|
VALUE addr;
|
|
|
|
|
2012-04-25 23:34:12 -04:00
|
|
|
StringValue(path);
|
2013-02-15 17:19:05 -05:00
|
|
|
INIT_SOCKADDR_UN(&sockaddr, sizeof(struct sockaddr_un));
|
2012-04-26 18:18:03 -04:00
|
|
|
if (sizeof(sockaddr.sun_path) < (size_t)RSTRING_LEN(path)) {
|
2012-04-25 23:34:12 -04:00
|
|
|
rb_raise(rb_eArgError, "too long unix socket path (%"PRIuSIZE" bytes given but %"PRIuSIZE" bytes max)",
|
|
|
|
(size_t)RSTRING_LEN(path), sizeof(sockaddr.sun_path));
|
2009-01-16 08:31:49 -05:00
|
|
|
}
|
2012-04-25 23:34:12 -04:00
|
|
|
memcpy(sockaddr.sun_path, RSTRING_PTR(path), RSTRING_LEN(path));
|
2013-01-28 19:32:05 -05:00
|
|
|
addr = rb_str_new((char*)&sockaddr, rsock_unix_sockaddr_len(path));
|
2009-01-16 08:31:49 -05:00
|
|
|
OBJ_INFECT(addr, path);
|
|
|
|
|
|
|
|
return addr;
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-16 08:31:49 -05:00
|
|
|
* Socket.unpack_sockaddr_un(sockaddr) => path
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* Unpacks _sockaddr_ into path.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2009-01-16 08:31:49 -05:00
|
|
|
* _sockaddr_ should be a string or an addrinfo for AF_UNIX.
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
2010-04-22 04:04:13 -04:00
|
|
|
* sockaddr = Socket.sockaddr_un("/tmp/sock")
|
2009-01-16 08:31:49 -05:00
|
|
|
* p Socket.unpack_sockaddr_un(sockaddr) #=> "/tmp/sock"
|
2009-01-07 09:20:15 -05:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-16 08:31:49 -05:00
|
|
|
sock_s_unpack_sockaddr_un(VALUE self, VALUE addr)
|
2009-01-07 09:20:15 -05:00
|
|
|
{
|
2009-01-16 08:31:49 -05:00
|
|
|
struct sockaddr_un * sockaddr;
|
|
|
|
VALUE path;
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-16 08:31:49 -05:00
|
|
|
sockaddr = (struct sockaddr_un*)SockAddrStringValuePtr(addr);
|
|
|
|
if (RSTRING_LEN(addr) <
|
|
|
|
(char*)&((struct sockaddr *)sockaddr)->sa_family +
|
|
|
|
sizeof(((struct sockaddr *)sockaddr)->sa_family) -
|
|
|
|
(char*)sockaddr)
|
|
|
|
rb_raise(rb_eArgError, "too short sockaddr");
|
|
|
|
if (((struct sockaddr *)sockaddr)->sa_family != AF_UNIX) {
|
|
|
|
rb_raise(rb_eArgError, "not an AF_UNIX sockaddr");
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
2009-03-01 09:00:48 -05:00
|
|
|
if (sizeof(struct sockaddr_un) < (size_t)RSTRING_LEN(addr)) {
|
2009-01-16 08:31:49 -05:00
|
|
|
rb_raise(rb_eTypeError, "too long sockaddr_un - %ld longer than %d",
|
|
|
|
RSTRING_LEN(addr), (int)sizeof(struct sockaddr_un));
|
|
|
|
}
|
2013-04-06 03:58:51 -04:00
|
|
|
path = rsock_unixpath_str(sockaddr, RSTRING_SOCKLEN(addr));
|
2009-01-16 08:31:49 -05:00
|
|
|
OBJ_INFECT(path, addr);
|
|
|
|
return path;
|
2009-01-07 09:20:15 -05:00
|
|
|
}
|
2009-01-16 08:31:49 -05:00
|
|
|
#endif
|
2009-01-07 09:20:15 -05:00
|
|
|
|
2009-01-28 21:25:39 -05:00
|
|
|
#if defined(HAVE_GETIFADDRS) || defined(SIOCGLIFCONF) || defined(SIOCGIFCONF) || defined(_WIN32)
|
2013-02-14 08:27:46 -05:00
|
|
|
|
|
|
|
static socklen_t
|
|
|
|
sockaddr_len(struct sockaddr *addr)
|
|
|
|
{
|
|
|
|
if (addr == NULL)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
#ifdef HAVE_STRUCT_SOCKADDR_SA_LEN
|
|
|
|
if (addr->sa_len != 0)
|
|
|
|
return addr->sa_len;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
return (socklen_t)sizeof(struct sockaddr_in);
|
|
|
|
|
|
|
|
#ifdef AF_INET6
|
|
|
|
case AF_INET6:
|
|
|
|
return (socklen_t)sizeof(struct sockaddr_in6);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_SYS_UN_H
|
|
|
|
case AF_UNIX:
|
|
|
|
return (socklen_t)sizeof(struct sockaddr_un);
|
|
|
|
#endif
|
|
|
|
|
2013-05-11 04:32:26 -04:00
|
|
|
#ifdef AF_PACKET
|
|
|
|
case AF_PACKET:
|
|
|
|
return (socklen_t)(offsetof(struct sockaddr_ll, sll_addr) + ((struct sockaddr_ll *)addr)->sll_halen);
|
|
|
|
#endif
|
|
|
|
|
2013-02-14 08:27:46 -05:00
|
|
|
default:
|
2013-03-26 10:34:20 -04:00
|
|
|
return (socklen_t)(offsetof(struct sockaddr, sa_family) + sizeof(addr->sa_family));
|
2013-02-14 08:27:46 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-11 04:32:26 -04:00
|
|
|
socklen_t
|
|
|
|
rsock_sockaddr_len(struct sockaddr *addr)
|
|
|
|
{
|
|
|
|
return sockaddr_len(addr);
|
|
|
|
}
|
|
|
|
|
2009-01-20 06:19:09 -05:00
|
|
|
static VALUE
|
2013-02-14 08:27:46 -05:00
|
|
|
sockaddr_obj(struct sockaddr *addr, socklen_t len)
|
2009-01-20 06:19:09 -05:00
|
|
|
{
|
2009-02-24 08:02:59 -05:00
|
|
|
#if defined(AF_INET6) && defined(__KAME__)
|
|
|
|
struct sockaddr_in6 addr6;
|
|
|
|
#endif
|
2009-01-20 06:19:09 -05:00
|
|
|
|
|
|
|
if (addr == NULL)
|
|
|
|
return Qnil;
|
2013-02-15 02:54:38 -05:00
|
|
|
|
2013-02-14 08:27:46 -05:00
|
|
|
len = sockaddr_len(addr);
|
2009-01-20 06:19:09 -05:00
|
|
|
|
2013-02-14 08:27:46 -05:00
|
|
|
#if defined(__KAME__) && defined(AF_INET6)
|
|
|
|
if (addr->sa_family == AF_INET6) {
|
2009-02-24 08:02:59 -05:00
|
|
|
/* KAME uses the 2nd 16bit word of link local IPv6 address as interface index internally */
|
2009-02-24 08:19:04 -05:00
|
|
|
/* http://orange.kame.net/dev/cvsweb.cgi/kame/IMPLEMENTATION */
|
2009-02-24 08:02:59 -05:00
|
|
|
/* convert fe80:1::1 to fe80::1%1 */
|
2013-02-14 08:27:46 -05:00
|
|
|
len = (socklen_t)sizeof(struct sockaddr_in6);
|
2009-02-24 08:02:59 -05:00
|
|
|
memcpy(&addr6, addr, len);
|
|
|
|
addr = (struct sockaddr *)&addr6;
|
|
|
|
if (IN6_IS_ADDR_LINKLOCAL(&addr6.sin6_addr) &&
|
|
|
|
addr6.sin6_scope_id == 0 &&
|
|
|
|
(addr6.sin6_addr.s6_addr[2] || addr6.sin6_addr.s6_addr[3])) {
|
|
|
|
addr6.sin6_scope_id = (addr6.sin6_addr.s6_addr[2] << 8) | addr6.sin6_addr.s6_addr[3];
|
|
|
|
addr6.sin6_addr.s6_addr[2] = 0;
|
|
|
|
addr6.sin6_addr.s6_addr[3] = 0;
|
|
|
|
}
|
2009-01-20 06:19:09 -05:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_addrinfo_new(addr, len, addr->sa_family, 0, 0, Qnil, Qnil);
|
2009-01-20 06:19:09 -05:00
|
|
|
}
|
2013-02-14 08:27:46 -05:00
|
|
|
|
2013-05-11 04:32:26 -04:00
|
|
|
VALUE
|
|
|
|
rsock_sockaddr_obj(struct sockaddr *addr, socklen_t len)
|
|
|
|
{
|
|
|
|
return sockaddr_obj(addr, len);
|
|
|
|
}
|
|
|
|
|
2009-01-20 06:19:09 -05:00
|
|
|
#endif
|
|
|
|
|
2009-04-18 10:10:06 -04:00
|
|
|
#if defined(HAVE_GETIFADDRS) || (defined(SIOCGLIFCONF) && defined(SIOCGLIFNUM) && !defined(__hpux)) || defined(SIOCGIFCONF) || defined(_WIN32)
|
2009-01-20 06:19:09 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2009-01-25 02:36:45 -05:00
|
|
|
* Socket.ip_address_list => array
|
2009-01-20 06:19:09 -05:00
|
|
|
*
|
|
|
|
* Returns local IP addresses as an array.
|
|
|
|
*
|
2009-02-05 06:01:43 -05:00
|
|
|
* The array contains Addrinfo objects.
|
2009-01-20 06:19:09 -05:00
|
|
|
*
|
2009-01-25 02:36:45 -05:00
|
|
|
* pp Socket.ip_address_list
|
2009-02-05 06:01:43 -05:00
|
|
|
* #=> [#<Addrinfo: 127.0.0.1>,
|
|
|
|
* #<Addrinfo: 192.168.0.128>,
|
|
|
|
* #<Addrinfo: ::1>,
|
2009-01-20 06:19:09 -05:00
|
|
|
* ...]
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
2009-01-25 02:36:45 -05:00
|
|
|
socket_s_ip_address_list(VALUE self)
|
2009-01-20 06:19:09 -05:00
|
|
|
{
|
|
|
|
#if defined(HAVE_GETIFADDRS)
|
|
|
|
struct ifaddrs *ifp = NULL;
|
|
|
|
struct ifaddrs *p;
|
|
|
|
int ret;
|
|
|
|
VALUE list;
|
|
|
|
|
|
|
|
ret = getifaddrs(&ifp);
|
|
|
|
if (ret == -1) {
|
|
|
|
rb_sys_fail("getifaddrs");
|
|
|
|
}
|
|
|
|
|
|
|
|
list = rb_ary_new();
|
|
|
|
for (p = ifp; p; p = p->ifa_next) {
|
|
|
|
if (p->ifa_addr != NULL && IS_IP_FAMILY(p->ifa_addr->sa_family)) {
|
2013-02-14 08:27:46 -05:00
|
|
|
struct sockaddr *addr = p->ifa_addr;
|
2013-05-07 18:51:16 -04:00
|
|
|
#if defined(AF_INET6) && defined(__sun)
|
2013-05-06 07:51:07 -04:00
|
|
|
/*
|
|
|
|
* OpenIndiana SunOS 5.11 getifaddrs() returns IPv6 link local
|
|
|
|
* address with sin6_scope_id == 0.
|
|
|
|
* So fill it from the interface name (ifa_name).
|
|
|
|
*/
|
|
|
|
struct sockaddr_in6 addr6;
|
|
|
|
if (addr->sa_family == AF_INET6) {
|
|
|
|
socklen_t len = (socklen_t)sizeof(struct sockaddr_in6);
|
|
|
|
memcpy(&addr6, addr, len);
|
|
|
|
addr = (struct sockaddr *)&addr6;
|
|
|
|
if (IN6_IS_ADDR_LINKLOCAL(&addr6.sin6_addr) &&
|
|
|
|
addr6.sin6_scope_id == 0) {
|
|
|
|
unsigned int ifindex = if_nametoindex(p->ifa_name);
|
|
|
|
if (ifindex != 0) {
|
|
|
|
addr6.sin6_scope_id = ifindex;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2013-02-14 08:27:46 -05:00
|
|
|
rb_ary_push(list, sockaddr_obj(addr, sockaddr_len(addr)));
|
2009-01-20 06:19:09 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
freeifaddrs(ifp);
|
|
|
|
|
|
|
|
return list;
|
|
|
|
#elif defined(SIOCGLIFCONF) && defined(SIOCGLIFNUM) && !defined(__hpux)
|
|
|
|
/* Solaris if_tcp(7P) */
|
2009-11-04 07:02:37 -05:00
|
|
|
/* HP-UX has SIOCGLIFCONF too. But it uses different struct */
|
2009-01-20 06:19:09 -05:00
|
|
|
int fd = -1;
|
|
|
|
int ret;
|
|
|
|
struct lifnum ln;
|
|
|
|
struct lifconf lc;
|
|
|
|
char *reason = NULL;
|
|
|
|
int save_errno;
|
|
|
|
int i;
|
|
|
|
VALUE list = Qnil;
|
|
|
|
|
|
|
|
lc.lifc_buf = NULL;
|
|
|
|
|
|
|
|
fd = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
if (fd == -1)
|
2013-04-05 22:39:44 -04:00
|
|
|
rb_sys_fail("socket(2)");
|
2009-01-20 06:19:09 -05:00
|
|
|
|
|
|
|
memset(&ln, 0, sizeof(ln));
|
|
|
|
ln.lifn_family = AF_UNSPEC;
|
|
|
|
|
|
|
|
ret = ioctl(fd, SIOCGLIFNUM, &ln);
|
|
|
|
if (ret == -1) {
|
|
|
|
reason = "SIOCGLIFNUM";
|
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&lc, 0, sizeof(lc));
|
|
|
|
lc.lifc_family = AF_UNSPEC;
|
|
|
|
lc.lifc_flags = 0;
|
|
|
|
lc.lifc_len = sizeof(struct lifreq) * ln.lifn_count;
|
|
|
|
lc.lifc_req = xmalloc(lc.lifc_len);
|
|
|
|
|
|
|
|
ret = ioctl(fd, SIOCGLIFCONF, &lc);
|
|
|
|
if (ret == -1) {
|
|
|
|
reason = "SIOCGLIFCONF";
|
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
|
|
|
|
list = rb_ary_new();
|
|
|
|
for (i = 0; i < ln.lifn_count; i++) {
|
|
|
|
struct lifreq *req = &lc.lifc_req[i];
|
|
|
|
if (IS_IP_FAMILY(req->lifr_addr.ss_family)) {
|
2010-02-08 07:08:45 -05:00
|
|
|
if (req->lifr_addr.ss_family == AF_INET6 &&
|
|
|
|
IN6_IS_ADDR_LINKLOCAL(&((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_addr) &&
|
|
|
|
((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_scope_id == 0) {
|
|
|
|
struct lifreq req2;
|
|
|
|
memcpy(req2.lifr_name, req->lifr_name, LIFNAMSIZ);
|
|
|
|
ret = ioctl(fd, SIOCGLIFINDEX, &req2);
|
|
|
|
if (ret == -1) {
|
|
|
|
reason = "SIOCGLIFINDEX";
|
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_scope_id = req2.lifr_index;
|
|
|
|
}
|
2013-02-14 08:27:46 -05:00
|
|
|
rb_ary_push(list, sockaddr_obj((struct sockaddr *)&req->lifr_addr, req->lifr_addrlen));
|
2009-01-20 06:19:09 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
finish:
|
|
|
|
save_errno = errno;
|
|
|
|
if (lc.lifc_buf != NULL)
|
|
|
|
xfree(lc.lifc_req);
|
|
|
|
if (fd != -1)
|
|
|
|
close(fd);
|
|
|
|
errno = save_errno;
|
|
|
|
|
|
|
|
if (reason)
|
|
|
|
rb_sys_fail(reason);
|
|
|
|
return list;
|
|
|
|
|
|
|
|
#elif defined(SIOCGIFCONF)
|
|
|
|
int fd = -1;
|
|
|
|
int ret;
|
2013-05-06 23:12:32 -04:00
|
|
|
#define EXTRA_SPACE ((int)(sizeof(struct ifconf) + sizeof(union_sockaddr)))
|
2009-01-20 06:19:09 -05:00
|
|
|
char initbuf[4096+EXTRA_SPACE];
|
|
|
|
char *buf = initbuf;
|
|
|
|
int bufsize;
|
|
|
|
struct ifconf conf;
|
|
|
|
struct ifreq *req;
|
|
|
|
VALUE list = Qnil;
|
2009-01-24 22:33:54 -05:00
|
|
|
const char *reason = NULL;
|
2009-01-20 06:19:09 -05:00
|
|
|
int save_errno;
|
|
|
|
|
|
|
|
fd = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
if (fd == -1)
|
2013-04-05 22:39:44 -04:00
|
|
|
rb_sys_fail("socket(2)");
|
2009-01-20 06:19:09 -05:00
|
|
|
|
|
|
|
bufsize = sizeof(initbuf);
|
|
|
|
buf = initbuf;
|
|
|
|
|
|
|
|
retry:
|
|
|
|
conf.ifc_len = bufsize;
|
|
|
|
conf.ifc_req = (struct ifreq *)buf;
|
|
|
|
|
|
|
|
/* fprintf(stderr, "bufsize: %d\n", bufsize); */
|
|
|
|
|
|
|
|
ret = ioctl(fd, SIOCGIFCONF, &conf);
|
|
|
|
if (ret == -1) {
|
|
|
|
reason = "SIOCGIFCONF";
|
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fprintf(stderr, "conf.ifc_len: %d\n", conf.ifc_len); */
|
|
|
|
|
|
|
|
if (bufsize - EXTRA_SPACE < conf.ifc_len) {
|
|
|
|
if (bufsize < conf.ifc_len) {
|
|
|
|
/* NetBSD returns required size for all interfaces. */
|
|
|
|
bufsize = conf.ifc_len + EXTRA_SPACE;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
bufsize = bufsize << 1;
|
|
|
|
}
|
|
|
|
if (buf == initbuf)
|
|
|
|
buf = NULL;
|
|
|
|
buf = xrealloc(buf, bufsize);
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(fd);
|
|
|
|
fd = -1;
|
|
|
|
|
|
|
|
list = rb_ary_new();
|
|
|
|
req = conf.ifc_req;
|
|
|
|
while ((char*)req < (char*)conf.ifc_req + conf.ifc_len) {
|
|
|
|
struct sockaddr *addr = &req->ifr_addr;
|
|
|
|
if (IS_IP_FAMILY(addr->sa_family)) {
|
2013-02-14 08:27:46 -05:00
|
|
|
rb_ary_push(list, sockaddr_obj(addr, sockaddr_len(addr)));
|
2009-01-20 06:19:09 -05:00
|
|
|
}
|
2013-02-13 18:20:27 -05:00
|
|
|
#ifdef HAVE_STRUCT_SOCKADDR_SA_LEN
|
2009-01-20 06:19:09 -05:00
|
|
|
# ifndef _SIZEOF_ADDR_IFREQ
|
|
|
|
# define _SIZEOF_ADDR_IFREQ(r) \
|
|
|
|
(sizeof(struct ifreq) + \
|
|
|
|
(sizeof(struct sockaddr) < (r).ifr_addr.sa_len ? \
|
|
|
|
(r).ifr_addr.sa_len - sizeof(struct sockaddr) : \
|
|
|
|
0))
|
|
|
|
# endif
|
|
|
|
req = (struct ifreq *)((char*)req + _SIZEOF_ADDR_IFREQ(*req));
|
|
|
|
#else
|
|
|
|
req = (struct ifreq *)((char*)req + sizeof(struct ifreq));
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
finish:
|
|
|
|
|
|
|
|
save_errno = errno;
|
|
|
|
if (buf != initbuf)
|
|
|
|
xfree(buf);
|
|
|
|
if (fd != -1)
|
|
|
|
close(fd);
|
|
|
|
errno = save_errno;
|
|
|
|
|
|
|
|
if (reason)
|
|
|
|
rb_sys_fail(reason);
|
|
|
|
return list;
|
|
|
|
|
|
|
|
#undef EXTRA_SPACE
|
2009-01-28 21:25:39 -05:00
|
|
|
#elif defined(_WIN32)
|
|
|
|
typedef struct ip_adapter_unicast_address_st {
|
|
|
|
unsigned LONG_LONG dummy0;
|
|
|
|
struct ip_adapter_unicast_address_st *Next;
|
|
|
|
struct {
|
|
|
|
struct sockaddr *lpSockaddr;
|
|
|
|
int iSockaddrLength;
|
|
|
|
} Address;
|
|
|
|
int dummy1;
|
|
|
|
int dummy2;
|
|
|
|
int dummy3;
|
|
|
|
long dummy4;
|
|
|
|
long dummy5;
|
|
|
|
long dummy6;
|
|
|
|
} ip_adapter_unicast_address_t;
|
|
|
|
typedef struct ip_adapter_anycast_address_st {
|
|
|
|
unsigned LONG_LONG dummy0;
|
|
|
|
struct ip_adapter_anycast_address_st *Next;
|
|
|
|
struct {
|
|
|
|
struct sockaddr *lpSockaddr;
|
|
|
|
int iSockaddrLength;
|
|
|
|
} Address;
|
|
|
|
} ip_adapter_anycast_address_t;
|
|
|
|
typedef struct ip_adapter_addresses_st {
|
|
|
|
unsigned LONG_LONG dummy0;
|
|
|
|
struct ip_adapter_addresses_st *Next;
|
|
|
|
void *dummy1;
|
|
|
|
ip_adapter_unicast_address_t *FirstUnicastAddress;
|
|
|
|
ip_adapter_anycast_address_t *FirstAnycastAddress;
|
|
|
|
void *dummy2;
|
|
|
|
void *dummy3;
|
|
|
|
void *dummy4;
|
|
|
|
void *dummy5;
|
|
|
|
void *dummy6;
|
|
|
|
BYTE dummy7[8];
|
|
|
|
DWORD dummy8;
|
|
|
|
DWORD dummy9;
|
|
|
|
DWORD dummy10;
|
|
|
|
DWORD IfType;
|
2009-07-17 09:40:59 -04:00
|
|
|
int OperStatus;
|
2009-01-28 21:25:39 -05:00
|
|
|
DWORD dummy12;
|
|
|
|
DWORD dummy13[16];
|
|
|
|
void *dummy14;
|
|
|
|
} ip_adapter_addresses_t;
|
|
|
|
typedef ULONG (WINAPI *GetAdaptersAddresses_t)(ULONG, ULONG, PVOID, ip_adapter_addresses_t *, PULONG);
|
|
|
|
HMODULE h;
|
|
|
|
GetAdaptersAddresses_t pGetAdaptersAddresses;
|
|
|
|
ULONG len;
|
|
|
|
DWORD ret;
|
|
|
|
ip_adapter_addresses_t *adapters;
|
|
|
|
VALUE list;
|
|
|
|
|
|
|
|
h = LoadLibrary("iphlpapi.dll");
|
|
|
|
if (!h)
|
|
|
|
rb_notimplement();
|
|
|
|
pGetAdaptersAddresses = (GetAdaptersAddresses_t)GetProcAddress(h, "GetAdaptersAddresses");
|
|
|
|
if (!pGetAdaptersAddresses) {
|
2009-11-01 00:24:47 -04:00
|
|
|
FreeLibrary(h);
|
2009-01-28 21:25:39 -05:00
|
|
|
rb_notimplement();
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = pGetAdaptersAddresses(AF_UNSPEC, 0, NULL, NULL, &len);
|
|
|
|
if (ret != ERROR_SUCCESS && ret != ERROR_BUFFER_OVERFLOW) {
|
|
|
|
errno = rb_w32_map_errno(ret);
|
2009-11-01 00:24:47 -04:00
|
|
|
FreeLibrary(h);
|
2009-01-28 21:25:39 -05:00
|
|
|
rb_sys_fail("GetAdaptersAddresses");
|
|
|
|
}
|
|
|
|
adapters = (ip_adapter_addresses_t *)ALLOCA_N(BYTE, len);
|
|
|
|
ret = pGetAdaptersAddresses(AF_UNSPEC, 0, NULL, adapters, &len);
|
|
|
|
if (ret != ERROR_SUCCESS) {
|
|
|
|
errno = rb_w32_map_errno(ret);
|
2009-11-01 00:24:47 -04:00
|
|
|
FreeLibrary(h);
|
2009-01-28 21:25:39 -05:00
|
|
|
rb_sys_fail("GetAdaptersAddresses");
|
|
|
|
}
|
|
|
|
|
|
|
|
list = rb_ary_new();
|
|
|
|
for (; adapters; adapters = adapters->Next) {
|
|
|
|
ip_adapter_unicast_address_t *uni;
|
|
|
|
ip_adapter_anycast_address_t *any;
|
2009-07-17 09:40:59 -04:00
|
|
|
if (adapters->OperStatus != 1) /* 1 means IfOperStatusUp */
|
|
|
|
continue;
|
2009-01-28 21:25:39 -05:00
|
|
|
for (uni = adapters->FirstUnicastAddress; uni; uni = uni->Next) {
|
2009-07-17 09:40:59 -04:00
|
|
|
#ifndef INET6
|
|
|
|
if (uni->Address.lpSockaddr->sa_family == AF_INET)
|
|
|
|
#else
|
2009-01-28 21:25:39 -05:00
|
|
|
if (IS_IP_FAMILY(uni->Address.lpSockaddr->sa_family))
|
2009-07-17 09:40:59 -04:00
|
|
|
#endif
|
2013-02-14 08:27:46 -05:00
|
|
|
rb_ary_push(list, sockaddr_obj(uni->Address.lpSockaddr, uni->Address.iSockaddrLength));
|
2009-01-28 21:25:39 -05:00
|
|
|
}
|
|
|
|
for (any = adapters->FirstAnycastAddress; any; any = any->Next) {
|
2009-07-17 09:40:59 -04:00
|
|
|
#ifndef INET6
|
|
|
|
if (any->Address.lpSockaddr->sa_family == AF_INET)
|
|
|
|
#else
|
2009-01-28 21:25:39 -05:00
|
|
|
if (IS_IP_FAMILY(any->Address.lpSockaddr->sa_family))
|
2009-07-17 09:40:59 -04:00
|
|
|
#endif
|
2013-02-14 08:27:46 -05:00
|
|
|
rb_ary_push(list, sockaddr_obj(any->Address.lpSockaddr, any->Address.iSockaddrLength));
|
2009-01-28 21:25:39 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-11-01 00:24:47 -04:00
|
|
|
FreeLibrary(h);
|
2009-01-28 21:25:39 -05:00
|
|
|
return list;
|
2009-01-20 06:19:09 -05:00
|
|
|
#endif
|
|
|
|
}
|
2009-04-18 10:10:06 -04:00
|
|
|
#else
|
|
|
|
#define socket_s_ip_address_list rb_f_notimplement
|
|
|
|
#endif
|
2009-01-20 06:19:09 -05:00
|
|
|
|
1999-08-13 01:37:52 -04:00
|
|
|
void
|
2014-09-30 01:25:32 -04:00
|
|
|
Init_socket(void)
|
1998-01-16 07:13:05 -05:00
|
|
|
{
|
2010-03-22 12:15:21 -04:00
|
|
|
rsock_init_basicsocket();
|
1999-01-19 23:59:39 -05:00
|
|
|
|
2011-08-15 19:08:39 -04:00
|
|
|
/*
|
|
|
|
* Document-class: Socket < BasicSocket
|
|
|
|
*
|
|
|
|
* Class +Socket+ provides access to the underlying operating system
|
|
|
|
* socket implementations. It can be used to provide more operating system
|
|
|
|
* specific functionality than the protocol-specific socket classes.
|
|
|
|
*
|
|
|
|
* The constants defined under Socket::Constants are also defined under
|
|
|
|
* Socket. For example, Socket::AF_INET is usable as well as
|
|
|
|
* Socket::Constants::AF_INET. See Socket::Constants for the list of
|
|
|
|
* constants.
|
|
|
|
*
|
|
|
|
* === What's a socket?
|
|
|
|
*
|
2014-01-19 00:43:23 -05:00
|
|
|
* Sockets are endpoints of a bidirectional communication channel.
|
2011-08-15 19:08:39 -04:00
|
|
|
* Sockets can communicate within a process, between processes on the same
|
|
|
|
* machine or between different machines. There are many types of socket:
|
|
|
|
* TCPSocket, UDPSocket or UNIXSocket for example.
|
|
|
|
*
|
|
|
|
* Sockets have their own vocabulary:
|
2012-10-19 23:51:33 -04:00
|
|
|
*
|
|
|
|
* *domain:*
|
|
|
|
* The family of protocols:
|
|
|
|
* * Socket::PF_INET
|
|
|
|
* * Socket::PF_INET6
|
|
|
|
* * Socket::PF_UNIX
|
|
|
|
* * etc.
|
|
|
|
*
|
|
|
|
* *type:*
|
|
|
|
* The type of communications between the two endpoints, typically
|
|
|
|
* * Socket::SOCK_STREAM
|
|
|
|
* * Socket::SOCK_DGRAM.
|
|
|
|
*
|
|
|
|
* *protocol:*
|
|
|
|
* Typically _zero_.
|
|
|
|
* This may be used to identify a variant of a protocol.
|
|
|
|
*
|
|
|
|
* *hostname:*
|
|
|
|
* The identifier of a network interface:
|
2014-01-19 00:43:23 -05:00
|
|
|
* * a string (hostname, IPv4 or IPv6 address or +broadcast+
|
2012-10-19 23:51:33 -04:00
|
|
|
* which specifies a broadcast address)
|
|
|
|
* * a zero-length string which specifies INADDR_ANY
|
|
|
|
* * an integer (interpreted as binary address in host byte order).
|
2011-08-15 19:08:39 -04:00
|
|
|
*
|
|
|
|
* === Quick start
|
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* Many of the classes, such as TCPSocket, UDPSocket or UNIXSocket,
|
|
|
|
* ease the use of sockets comparatively to the equivalent C programming interface.
|
|
|
|
*
|
|
|
|
* Let's create an internet socket using the IPv4 protocol in a C-like manner:
|
2011-08-15 19:08:39 -04:00
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* s = Socket.new Socket::AF_INET, Socket::SOCK_STREAM
|
2011-08-15 19:08:39 -04:00
|
|
|
* s.connect Socket.pack_sockaddr_in(80, 'example.com')
|
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* You could also use the TCPSocket class:
|
|
|
|
*
|
2011-08-15 19:08:39 -04:00
|
|
|
* s = TCPSocket.new 'example.com', 80
|
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* A simple server might look like this:
|
2011-08-15 19:08:39 -04:00
|
|
|
*
|
|
|
|
* require 'socket'
|
|
|
|
*
|
|
|
|
* server = TCPServer.new 2000 # Server bound to port 2000
|
|
|
|
*
|
|
|
|
* loop do
|
|
|
|
* client = server.accept # Wait for a client to connect
|
|
|
|
* client.puts "Hello !"
|
|
|
|
* client.puts "Time is #{Time.now}"
|
|
|
|
* client.close
|
|
|
|
* end
|
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* A simple client may look like this:
|
2011-08-15 19:08:39 -04:00
|
|
|
*
|
|
|
|
* require 'socket'
|
|
|
|
*
|
|
|
|
* s = TCPSocket.new 'localhost', 2000
|
|
|
|
*
|
|
|
|
* while line = s.gets # Read lines from socket
|
|
|
|
* puts line # and print them
|
|
|
|
* end
|
|
|
|
*
|
|
|
|
* s.close # close socket when done
|
|
|
|
*
|
|
|
|
* === Exception Handling
|
|
|
|
*
|
|
|
|
* Ruby's Socket implementation raises exceptions based on the error
|
|
|
|
* generated by the system dependent implementation. This is why the
|
|
|
|
* methods are documented in a way that isolate Unix-based system
|
2012-10-19 23:51:33 -04:00
|
|
|
* exceptions from Windows based exceptions. If more information on a
|
|
|
|
* particular exception is needed, please refer to the Unix manual pages or
|
2011-08-15 19:08:39 -04:00
|
|
|
* the Windows WinSock reference.
|
|
|
|
*
|
2012-10-19 23:51:33 -04:00
|
|
|
* === Convenience methods
|
2011-08-15 19:08:39 -04:00
|
|
|
*
|
|
|
|
* Although the general way to create socket is Socket.new,
|
2012-10-19 23:51:33 -04:00
|
|
|
* there are several methods of socket creation for most cases.
|
2011-08-15 19:08:39 -04:00
|
|
|
*
|
|
|
|
* TCP client socket::
|
|
|
|
* Socket.tcp, TCPSocket.open
|
|
|
|
* TCP server socket::
|
|
|
|
* Socket.tcp_server_loop, TCPServer.open
|
|
|
|
* UNIX client socket::
|
|
|
|
* Socket.unix, UNIXSocket.open
|
|
|
|
* UNIX server socket::
|
|
|
|
* Socket.unix_server_loop, UNIXServer.open
|
|
|
|
*
|
|
|
|
* === Documentation by
|
|
|
|
*
|
|
|
|
* * Zach Dennis
|
|
|
|
* * Sam Roberts
|
|
|
|
* * <em>Programming Ruby</em> from The Pragmatic Bookshelf.
|
|
|
|
*
|
|
|
|
* Much material in this documentation is taken with permission from
|
|
|
|
* <em>Programming Ruby</em> from The Pragmatic Bookshelf.
|
|
|
|
*/
|
1999-01-19 23:59:39 -05:00
|
|
|
rb_cSocket = rb_define_class("Socket", rb_cBasicSocket);
|
|
|
|
|
2010-03-22 12:15:21 -04:00
|
|
|
rsock_init_socket_init();
|
2009-01-16 23:11:27 -05:00
|
|
|
|
2009-02-02 00:55:56 -05:00
|
|
|
rb_define_method(rb_cSocket, "initialize", sock_initialize, -1);
|
1999-01-19 23:59:39 -05:00
|
|
|
rb_define_method(rb_cSocket, "connect", sock_connect, 1);
|
2006-05-22 03:38:42 -04:00
|
|
|
rb_define_method(rb_cSocket, "connect_nonblock", sock_connect_nonblock, 1);
|
1999-01-19 23:59:39 -05:00
|
|
|
rb_define_method(rb_cSocket, "bind", sock_bind, 1);
|
2010-03-21 06:50:52 -04:00
|
|
|
rb_define_method(rb_cSocket, "listen", rsock_sock_listen, 1);
|
1999-01-19 23:59:39 -05:00
|
|
|
rb_define_method(rb_cSocket, "accept", sock_accept, 0);
|
2006-05-22 03:38:42 -04:00
|
|
|
rb_define_method(rb_cSocket, "accept_nonblock", sock_accept_nonblock, 0);
|
2002-05-23 01:35:32 -04:00
|
|
|
rb_define_method(rb_cSocket, "sysaccept", sock_sysaccept, 0);
|
1999-01-19 23:59:39 -05:00
|
|
|
|
|
|
|
rb_define_method(rb_cSocket, "recvfrom", sock_recvfrom, -1);
|
2006-05-22 03:38:42 -04:00
|
|
|
rb_define_method(rb_cSocket, "recvfrom_nonblock", sock_recvfrom_nonblock, -1);
|
1999-01-19 23:59:39 -05:00
|
|
|
|
2009-03-01 01:48:22 -05:00
|
|
|
rb_define_singleton_method(rb_cSocket, "socketpair", rsock_sock_s_socketpair, -1);
|
|
|
|
rb_define_singleton_method(rb_cSocket, "pair", rsock_sock_s_socketpair, -1);
|
1999-01-19 23:59:39 -05:00
|
|
|
rb_define_singleton_method(rb_cSocket, "gethostname", sock_gethostname, 0);
|
|
|
|
rb_define_singleton_method(rb_cSocket, "gethostbyname", sock_s_gethostbyname, 1);
|
|
|
|
rb_define_singleton_method(rb_cSocket, "gethostbyaddr", sock_s_gethostbyaddr, -1);
|
* array.c: replace rb_protect_inspect() and rb_inspecting_p() by
rb_exec_recursive() in eval.c.
* eval.c (rb_exec_recursive): new function.
* array.c (rb_ary_join): use rb_exec_recursive().
* array.c (rb_ary_inspect, rb_ary_hash): ditto.
* file.c (rb_file_join): ditto.
* hash.c (rb_hash_inspect, rb_hash_to_s, rb_hash_hash): ditto.
* io.c (rb_io_puts): ditto.
* object.c (rb_obj_inspect): ditto
* struct.c (rb_struct_inspect): ditto.
* lib/set.rb (SortedSet::setup): a hack to shut up warning.
[ruby-talk:132866]
* lib/time.rb (Time::strptime): add new function. inspired by
[ruby-talk:132815].
* lib/parsedate.rb (ParseDate::strptime): ditto.
* regparse.c: move st_*_strend() functions from st.c. fixed some
potential memory leaks.
* exception error messages updated. [ruby-core:04497]
* ext/socket/socket.c (Init_socket): add bunch of Socket
constants. Patch from Sam Roberts <sroberts@uniserve.com>.
[ruby-core:04409]
* array.c (rb_ary_s_create): no need for negative argc check.
[ruby-core:04463]
* array.c (rb_ary_unshift_m): ditto.
* lib/xmlrpc/parser.rb (XMLRPC::FaultException): make it subclass
of StandardError class, not Exception class. [ruby-core:04429]
* parse.y (fcall_gen): lvar(arg) will be evaluated as
lvar.call(arg) when lvar is a defined local variable. [new]
* object.c (rb_class_initialize): call inherited method before
calling initializing block.
* eval.c (rb_thread_start_1): initialize newly pushed frame.
* lib/open3.rb (Open3::popen3): $? should not be EXIT_FAILURE.
fixed: [ruby-core:04444]
* eval.c (is_defined): NODE_IASGN is an assignment.
* ext/readline/readline.c (Readline.readline): use rl_outstream
and rl_instream. [ruby-dev:25699]
* ext/etc/etc.c (Init_etc): sGroup needs HAVE_ST_GR_PASSWD check
[ruby-dev:25675]
* misc/ruby-mode.el: [ruby-core:04415]
* lib/rdoc/generators/html_generator.rb: [ruby-core:04412]
* lib/rdoc/generators/ri_generator.rb: ditto.
* struct.c (make_struct): fixed: [ruby-core:04402]
* ext/curses/curses.c (window_color_set): [ruby-core:04393]
* ext/socket/socket.c (Init_socket): SO_REUSEPORT added.
[ruby-talk:130092]
* object.c: [ruby-doc:818]
* parse.y (open_args): fix too verbose warnings for the space
before argument parentheses. [ruby-dev:25492]
* parse.y (parser_yylex): ditto.
* parse.y (parser_yylex): the first expression in the parentheses
should not be a command. [ruby-dev:25492]
* lib/irb/context.rb (IRB::Context::initialize): [ruby-core:04330]
* object.c (Init_Object): remove Object#type. [ruby-core:04335]
* st.c (st_foreach): report success/failure by return value.
[ruby-Bugs-1396]
* parse.y: forgot to initialize parser struct. [ruby-dev:25492]
* parse.y (parser_yylex): no tLABEL on EXPR_BEG.
[ruby-talk:127711]
* document updates - [ruby-core:04296], [ruby-core:04301],
[ruby-core:04302], [ruby-core:04307]
* dir.c (rb_push_glob): should work for NUL delimited patterns.
* dir.c (rb_glob2): should aware of offset in the pattern.
* string.c (rb_str_new4): should propagate taintedness.
* env.h: rename member names in struct FRAME; last_func -> callee,
orig_func -> this_func, last_class -> this_class.
* struct.c (rb_struct_set): use original method name, not callee
name, to retrieve member slot. [ruby-core:04268]
* time.c (time_strftime): protect from format modification from GC
finalizers.
* object.c (Init_Object): remove rb_obj_id_obsolete()
* eval.c (rb_mod_define_method): incomplete subclass check.
[ruby-dev:25464]
* gc.c (rb_data_object_alloc): klass may be NULL.
[ruby-list:40498]
* bignum.c (rb_big_rand): should return positive random number.
[ruby-dev:25401]
* bignum.c (rb_big_rand): do not use rb_big_modulo to generate
random bignums. [ruby-dev:25396]
* variable.c (rb_autoload): [ruby-dev:25373]
* eval.c (svalue_to_avalue): [ruby-dev:25366]
* string.c (rb_str_justify): [ruby-dev:25367]
* io.c (rb_f_select): [ruby-dev:25312]
* ext/socket/socket.c (sock_s_getservbyport): [ruby-talk:124072]
* struct.c (make_struct): [ruby-dev:25249]
* dir.c (dir_open_dir): new function. [ruby-dev:25242]
* io.c (rb_f_open): add type check for return value from to_open.
* lib/pstore.rb (PStore#transaction): Use the empty content when a
file is not found. [ruby-dev:24561]
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@8068 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
2005-03-04 01:47:45 -05:00
|
|
|
rb_define_singleton_method(rb_cSocket, "getservbyname", sock_s_getservbyname, -1);
|
|
|
|
rb_define_singleton_method(rb_cSocket, "getservbyport", sock_s_getservbyport, -1);
|
1999-08-13 01:37:52 -04:00
|
|
|
rb_define_singleton_method(rb_cSocket, "getaddrinfo", sock_s_getaddrinfo, -1);
|
|
|
|
rb_define_singleton_method(rb_cSocket, "getnameinfo", sock_s_getnameinfo, -1);
|
2001-08-05 23:05:23 -04:00
|
|
|
rb_define_singleton_method(rb_cSocket, "sockaddr_in", sock_s_pack_sockaddr_in, 2);
|
|
|
|
rb_define_singleton_method(rb_cSocket, "pack_sockaddr_in", sock_s_pack_sockaddr_in, 2);
|
|
|
|
rb_define_singleton_method(rb_cSocket, "unpack_sockaddr_in", sock_s_unpack_sockaddr_in, 1);
|
2001-08-06 02:10:10 -04:00
|
|
|
#ifdef HAVE_SYS_UN_H
|
|
|
|
rb_define_singleton_method(rb_cSocket, "sockaddr_un", sock_s_pack_sockaddr_un, 1);
|
|
|
|
rb_define_singleton_method(rb_cSocket, "pack_sockaddr_un", sock_s_pack_sockaddr_un, 1);
|
2001-08-05 23:05:23 -04:00
|
|
|
rb_define_singleton_method(rb_cSocket, "unpack_sockaddr_un", sock_s_unpack_sockaddr_un, 1);
|
2001-08-06 02:10:10 -04:00
|
|
|
#endif
|
2009-01-20 06:19:09 -05:00
|
|
|
|
2009-01-25 02:36:45 -05:00
|
|
|
rb_define_singleton_method(rb_cSocket, "ip_address_list", socket_s_ip_address_list, 0);
|
1998-01-16 07:13:05 -05:00
|
|
|
}
|