2009-01-16 23:11:27 -05:00
|
|
|
/************************************************
|
|
|
|
|
|
|
|
basicsocket.c -
|
|
|
|
|
|
|
|
created at: Thu Mar 31 12:21:29 JST 1994
|
|
|
|
|
|
|
|
Copyright (C) 1993-2007 Yukihiro Matsumoto
|
|
|
|
|
|
|
|
************************************************/
|
|
|
|
|
|
|
|
#include "rubysocket.h"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* BasicSocket.for_fd(fd) => basicsocket
|
|
|
|
*
|
|
|
|
* Returns a socket object which contains the file descriptor, _fd_.
|
|
|
|
*
|
|
|
|
* # If invoked by inetd, STDIN/STDOUT/STDERR is a socket.
|
|
|
|
* STDIN_SOCK = Socket.for_fd(STDIN.fileno)
|
|
|
|
* p STDIN_SOCK.remote_address
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_s_for_fd(VALUE klass, VALUE fd)
|
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
2009-03-01 01:30:41 -05:00
|
|
|
VALUE sock = rsock_init_sock(rb_obj_alloc(klass), NUM2INT(fd));
|
2009-01-16 23:11:27 -05:00
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
|
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.shutdown([how]) => 0
|
|
|
|
*
|
|
|
|
* Calls shutdown(2) system call.
|
|
|
|
*
|
|
|
|
* s.shutdown(Socket::SHUT_RD) disallows further read.
|
|
|
|
*
|
|
|
|
* s.shutdown(Socket::SHUT_WR) disallows further write.
|
|
|
|
*
|
|
|
|
* s.shutdown(Socket::SHUT_RDWR) disallows further read and write.
|
|
|
|
*
|
|
|
|
* _how_ can be symbol or string:
|
|
|
|
* - :RD, :SHUT_RD, "RD" and "SHUT_RD" are accepted as Socket::SHUT_RD.
|
|
|
|
* - :WR, :SHUT_WR, "WR" and "SHUT_WR" are accepted as Socket::SHUT_WR.
|
|
|
|
* - :RDWR, :SHUT_RDWR, "RDWR" and "SHUT_RDWR" are accepted as Socket::SHUT_RDWR.
|
|
|
|
*
|
|
|
|
* UNIXSocket.pair {|s1, s2|
|
|
|
|
* s1.puts "ping"
|
|
|
|
* s1.shutdown(:WR)
|
|
|
|
* p s2.read #=> "ping\n"
|
|
|
|
* s2.puts "pong"
|
|
|
|
* s2.close
|
|
|
|
* p s1.read #=> "pong\n"
|
|
|
|
* }
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_shutdown(int argc, VALUE *argv, VALUE sock)
|
|
|
|
{
|
|
|
|
VALUE howto;
|
|
|
|
int how;
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
if (rb_safe_level() >= 4 && !OBJ_TAINTED(sock)) {
|
|
|
|
rb_raise(rb_eSecurityError, "Insecure: can't shutdown socket");
|
|
|
|
}
|
|
|
|
rb_scan_args(argc, argv, "01", &howto);
|
|
|
|
if (howto == Qnil)
|
|
|
|
how = SHUT_RDWR;
|
|
|
|
else {
|
2009-03-01 01:30:41 -05:00
|
|
|
how = rsock_shutdown_how_arg(howto);
|
2009-01-16 23:11:27 -05:00
|
|
|
if (how != SHUT_WR && how != SHUT_RD && how != SHUT_RDWR) {
|
|
|
|
rb_raise(rb_eArgError, "`how' should be either :SHUT_RD, :SHUT_WR, :SHUT_RDWR");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
if (shutdown(fptr->fd, how) == -1)
|
|
|
|
rb_sys_fail(0);
|
|
|
|
|
|
|
|
return INT2FIX(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.close_read => nil
|
|
|
|
*
|
|
|
|
* Disallows further read.
|
|
|
|
*
|
|
|
|
* s1, s2 = UNIXSocket.pair
|
|
|
|
* s1.close_read
|
|
|
|
* s2.puts #=> Broken pipe (Errno::EPIPE)
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_close_read(VALUE sock)
|
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
if (rb_safe_level() >= 4 && !OBJ_TAINTED(sock)) {
|
|
|
|
rb_raise(rb_eSecurityError, "Insecure: can't close socket");
|
|
|
|
}
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
shutdown(fptr->fd, 0);
|
|
|
|
if (!(fptr->mode & FMODE_WRITABLE)) {
|
|
|
|
return rb_io_close(sock);
|
|
|
|
}
|
|
|
|
fptr->mode &= ~FMODE_READABLE;
|
|
|
|
|
|
|
|
return Qnil;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.close_write => nil
|
|
|
|
*
|
|
|
|
* Disallows further write.
|
|
|
|
*
|
|
|
|
* UNIXSocket.pair {|s1, s2|
|
|
|
|
* s1.print "ping"
|
|
|
|
* s1.close_write
|
|
|
|
* p s2.read #=> "ping"
|
|
|
|
* s2.print "pong"
|
|
|
|
* s2.close
|
|
|
|
* p s1.read #=> "pong"
|
|
|
|
* }
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_close_write(VALUE sock)
|
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
if (rb_safe_level() >= 4 && !OBJ_TAINTED(sock)) {
|
|
|
|
rb_raise(rb_eSecurityError, "Insecure: can't close socket");
|
|
|
|
}
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
if (!(fptr->mode & FMODE_READABLE)) {
|
|
|
|
return rb_io_close(sock);
|
|
|
|
}
|
|
|
|
shutdown(fptr->fd, 1);
|
|
|
|
fptr->mode &= ~FMODE_WRITABLE;
|
|
|
|
|
|
|
|
return Qnil;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Document-method: setsockopt
|
|
|
|
* call-seq: setsockopt(level, optname, optval)
|
|
|
|
*
|
|
|
|
* Sets a socket option. These are protocol and system specific, see your
|
|
|
|
* local sytem documentation for details.
|
|
|
|
*
|
|
|
|
* === Parameters
|
|
|
|
* * +level+ is an integer, usually one of the SOL_ constants such as
|
|
|
|
* Socket::SOL_SOCKET, or a protocol level.
|
|
|
|
* * +optname+ is an integer, usually one of the SO_ constants, such
|
|
|
|
* as Socket::SO_REUSEADDR.
|
|
|
|
* * +optval+ is the value of the option, it is passed to the underlying
|
|
|
|
* setsockopt() as a pointer to a certain number of bytes. How this is
|
|
|
|
* done depends on the type:
|
|
|
|
* - Fixnum: value is assigned to an int, and a pointer to the int is
|
|
|
|
* passed, with length of sizeof(int).
|
|
|
|
* - true or false: 1 or 0 (respectively) is assigned to an int, and the
|
|
|
|
* int is passed as for a Fixnum. Note that +false+ must be passed,
|
|
|
|
* not +nil+.
|
|
|
|
* - String: the string's data and length is passed to the socket.
|
|
|
|
*
|
|
|
|
* === Examples
|
|
|
|
*
|
|
|
|
* Some socket options are integers with boolean values, in this case
|
|
|
|
* #setsockopt could be called like this:
|
|
|
|
* sock.setsockopt(Socket::SOL_SOCKET,Socket::SO_REUSEADDR, true)
|
|
|
|
*
|
|
|
|
* Some socket options are integers with numeric values, in this case
|
|
|
|
* #setsockopt could be called like this:
|
|
|
|
* sock.setsockopt(Socket::IPPROTO_IP, Socket::IP_TTL, 255)
|
|
|
|
*
|
|
|
|
* Option values may be structs. Passing them can be complex as it involves
|
|
|
|
* examining your system headers to determine the correct definition. An
|
|
|
|
* example is an +ip_mreq+, which may be defined in your system headers as:
|
|
|
|
* struct ip_mreq {
|
|
|
|
* struct in_addr imr_multiaddr;
|
|
|
|
* struct in_addr imr_interface;
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
* In this case #setsockopt could be called like this:
|
|
|
|
* optval = IPAddr.new("224.0.0.251") + Socket::INADDR_ANY
|
|
|
|
* sock.setsockopt(Socket::IPPROTO_IP, Socket::IP_ADD_MEMBERSHIP, optval)
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
2009-02-01 20:53:02 -05:00
|
|
|
bsock_setsockopt(int argc, VALUE *argv, VALUE sock)
|
2009-01-16 23:11:27 -05:00
|
|
|
{
|
2009-02-01 20:53:02 -05:00
|
|
|
VALUE lev, optname, val;
|
2009-02-09 08:56:43 -05:00
|
|
|
int family, level, option;
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_io_t *fptr;
|
|
|
|
int i;
|
|
|
|
char *v;
|
|
|
|
int vlen;
|
|
|
|
|
2009-02-01 20:53:02 -05:00
|
|
|
if (argc == 1) {
|
|
|
|
lev = rb_funcall(argv[0], rb_intern("level"), 0);
|
|
|
|
optname = rb_funcall(argv[0], rb_intern("optname"), 0);
|
|
|
|
val = rb_funcall(argv[0], rb_intern("data"), 0);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
rb_scan_args(argc, argv, "30", &lev, &optname, &val);
|
|
|
|
}
|
|
|
|
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_secure(2);
|
2009-02-09 08:56:43 -05:00
|
|
|
GetOpenFile(sock, fptr);
|
2009-03-01 06:58:13 -05:00
|
|
|
family = rsock_getfamily(fptr->fd);
|
2009-03-01 01:30:41 -05:00
|
|
|
level = rsock_level_arg(family, lev);
|
|
|
|
option = rsock_optname_arg(family, level, optname);
|
2009-01-16 23:11:27 -05:00
|
|
|
|
|
|
|
switch (TYPE(val)) {
|
|
|
|
case T_FIXNUM:
|
|
|
|
i = FIX2INT(val);
|
|
|
|
goto numval;
|
|
|
|
case T_FALSE:
|
|
|
|
i = 0;
|
|
|
|
goto numval;
|
|
|
|
case T_TRUE:
|
|
|
|
i = 1;
|
|
|
|
numval:
|
|
|
|
v = (char*)&i; vlen = sizeof(i);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
StringValue(val);
|
|
|
|
v = RSTRING_PTR(val);
|
|
|
|
vlen = RSTRING_LEN(val);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define rb_sys_fail_path(path) rb_sys_fail(NIL_P(path) ? 0 : RSTRING_PTR(path))
|
|
|
|
|
2009-02-09 08:56:43 -05:00
|
|
|
rb_io_check_closed(fptr);
|
2009-01-16 23:11:27 -05:00
|
|
|
if (setsockopt(fptr->fd, level, option, v, vlen) < 0)
|
|
|
|
rb_sys_fail_path(fptr->pathv);
|
|
|
|
|
|
|
|
return INT2FIX(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Document-method: getsockopt
|
|
|
|
* call-seq: getsockopt(level, optname)
|
|
|
|
*
|
|
|
|
* Gets a socket option. These are protocol and system specific, see your
|
|
|
|
* local sytem documentation for details. The option is returned as
|
|
|
|
* a String with the data being the binary value of the socket option.
|
|
|
|
*
|
|
|
|
* === Parameters
|
|
|
|
* * +level+ is an integer, usually one of the SOL_ constants such as
|
|
|
|
* Socket::SOL_SOCKET, or a protocol level.
|
|
|
|
* * +optname+ is an integer, usually one of the SO_ constants, such
|
|
|
|
* as Socket::SO_REUSEADDR.
|
|
|
|
*
|
|
|
|
* === Examples
|
|
|
|
*
|
|
|
|
* Some socket options are integers with boolean values, in this case
|
|
|
|
* #getsockopt could be called like this:
|
|
|
|
* optval = sock.getsockopt(Socket::SOL_SOCKET,Socket::SO_REUSEADDR)
|
|
|
|
* optval = optval.unpack "i"
|
|
|
|
* reuseaddr = optval[0] == 0 ? false : true
|
|
|
|
*
|
|
|
|
* Some socket options are integers with numeric values, in this case
|
|
|
|
* #getsockopt could be called like this:
|
|
|
|
* optval = sock.getsockopt(Socket::IPPROTO_IP, Socket::IP_TTL)
|
|
|
|
* ipttl = optval.unpack("i")[0]
|
|
|
|
*
|
|
|
|
* Option values may be structs. Decoding them can be complex as it involves
|
|
|
|
* examining your system headers to determine the correct definition. An
|
|
|
|
* example is a +struct linger+, which may be defined in your system headers
|
|
|
|
* as:
|
|
|
|
* struct linger {
|
|
|
|
* int l_onoff;
|
|
|
|
* int l_linger;
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
* In this case #getsockopt could be called like this:
|
|
|
|
* optval = sock.getsockopt(Socket::SOL_SOCKET, Socket::SO_LINGER)
|
|
|
|
* onoff, linger = optval.unpack "ii"
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_getsockopt(VALUE sock, VALUE lev, VALUE optname)
|
|
|
|
{
|
|
|
|
#if !defined(__BEOS__)
|
|
|
|
int level, option;
|
|
|
|
socklen_t len;
|
|
|
|
char *buf;
|
|
|
|
rb_io_t *fptr;
|
2009-02-09 08:56:43 -05:00
|
|
|
int family;
|
2009-01-16 23:11:27 -05:00
|
|
|
|
2009-02-09 08:56:43 -05:00
|
|
|
GetOpenFile(sock, fptr);
|
2009-03-01 06:58:13 -05:00
|
|
|
family = rsock_getfamily(fptr->fd);
|
2009-03-01 01:30:41 -05:00
|
|
|
level = rsock_level_arg(family, lev);
|
|
|
|
option = rsock_optname_arg(family, level, optname);
|
2009-01-16 23:11:27 -05:00
|
|
|
len = 256;
|
|
|
|
buf = ALLOCA_N(char,len);
|
|
|
|
|
2009-02-09 08:56:43 -05:00
|
|
|
rb_io_check_closed(fptr);
|
2009-02-08 10:12:27 -05:00
|
|
|
|
2009-01-16 23:11:27 -05:00
|
|
|
if (getsockopt(fptr->fd, level, option, buf, &len) < 0)
|
|
|
|
rb_sys_fail_path(fptr->pathv);
|
|
|
|
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_sockopt_new(family, level, option, rb_str_new(buf, len));
|
2009-01-16 23:11:27 -05:00
|
|
|
#else
|
|
|
|
rb_notimplement();
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.getsockname => sockaddr
|
|
|
|
*
|
|
|
|
* Returns the local address of the socket as a sockaddr string.
|
|
|
|
*
|
|
|
|
* TCPServer.open("127.0.0.1", 15120) {|serv|
|
|
|
|
* p serv.getsockname #=> "\x02\x00;\x10\x7F\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00"
|
|
|
|
* }
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_getsockname(VALUE sock)
|
|
|
|
{
|
2009-02-09 06:19:57 -05:00
|
|
|
struct sockaddr_storage buf;
|
2009-01-16 23:11:27 -05:00
|
|
|
socklen_t len = sizeof buf;
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
2009-02-09 06:19:57 -05:00
|
|
|
if (getsockname(fptr->fd, (struct sockaddr*)&buf, &len) < 0)
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_sys_fail("getsockname(2)");
|
2009-02-09 06:19:57 -05:00
|
|
|
return rb_str_new((char*)&buf, len);
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.getpeername => sockaddr
|
|
|
|
*
|
|
|
|
* Returns the remote address of the socket as a sockaddr string.
|
|
|
|
*
|
|
|
|
* TCPServer.open("127.0.0.1", 1440) {|serv|
|
|
|
|
* c = TCPSocket.new("127.0.0.1", 1440)
|
|
|
|
* s = serv.accept
|
|
|
|
* p s.getpeername #=> "\x02\x00\x82u\x7F\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00"
|
|
|
|
* }
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_getpeername(VALUE sock)
|
|
|
|
{
|
2009-02-10 09:31:21 -05:00
|
|
|
struct sockaddr_storage buf;
|
2009-01-16 23:11:27 -05:00
|
|
|
socklen_t len = sizeof buf;
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
2009-02-10 09:31:21 -05:00
|
|
|
if (getpeername(fptr->fd, (struct sockaddr*)&buf, &len) < 0)
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_sys_fail("getpeername(2)");
|
2009-02-10 09:31:21 -05:00
|
|
|
return rb_str_new((char*)&buf, len);
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
|
2009-02-10 20:22:08 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.getpeereid => [euid, egid]
|
|
|
|
*
|
|
|
|
* Returns the user and group on the peer of the UNIX socket.
|
|
|
|
* The result is a two element array which contains the effective uid and the effective gid.
|
|
|
|
*
|
|
|
|
* Socket.unix_server_loop("/tmp/sock") {|s|
|
2009-02-13 07:01:53 -05:00
|
|
|
* begin
|
2009-02-13 09:43:12 -05:00
|
|
|
* euid, egid = s.getpeereid
|
|
|
|
*
|
|
|
|
* # Check the connected client is myself or not.
|
|
|
|
* next if euid != Process.uid
|
|
|
|
*
|
|
|
|
* # do something about my resource.
|
|
|
|
*
|
2009-02-13 07:01:53 -05:00
|
|
|
* ensure
|
|
|
|
* s.close
|
|
|
|
* end
|
2009-02-10 20:22:08 -05:00
|
|
|
* }
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_getpeereid(VALUE self)
|
|
|
|
{
|
|
|
|
#if defined(HAVE_GETPEEREID)
|
|
|
|
rb_io_t *fptr;
|
|
|
|
uid_t euid;
|
|
|
|
gid_t egid;
|
|
|
|
GetOpenFile(self, fptr);
|
|
|
|
if (getpeereid(fptr->fd, &euid, &egid) == -1)
|
|
|
|
rb_sys_fail("getpeereid");
|
|
|
|
return rb_assoc_new(UIDT2NUM(euid), GIDT2NUM(egid));
|
|
|
|
#elif defined(SO_PEERCRED) /* GNU/Linux */
|
|
|
|
rb_io_t *fptr;
|
|
|
|
struct ucred cred;
|
|
|
|
socklen_t len = sizeof(cred);
|
|
|
|
GetOpenFile(self, fptr);
|
|
|
|
if (getsockopt(fptr->fd, SOL_SOCKET, SO_PEERCRED, &cred, &len) == -1)
|
|
|
|
rb_sys_fail("getsockopt(SO_PEERCRED)");
|
|
|
|
return rb_assoc_new(UIDT2NUM(cred.uid), GIDT2NUM(cred.gid));
|
2009-02-12 07:43:04 -05:00
|
|
|
#elif defined(HAVE_GETPEERUCRED) /* Solaris */
|
|
|
|
rb_io_t *fptr;
|
|
|
|
ucred_t *uc = NULL;
|
|
|
|
VALUE ret;
|
|
|
|
GetOpenFile(self, fptr);
|
|
|
|
if (getpeerucred(fptr->fd, &uc) == -1)
|
|
|
|
rb_sys_fail("getpeerucred");
|
|
|
|
ret = rb_assoc_new(UIDT2NUM(ucred_geteuid(uc)), GIDT2NUM(ucred_getegid(uc)));
|
|
|
|
ucred_free(uc);
|
|
|
|
return ret;
|
2009-02-10 20:22:08 -05:00
|
|
|
#else
|
|
|
|
rb_notimplement();
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2009-01-16 23:11:27 -05:00
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* bsock.local_address => addrinfo
|
|
|
|
*
|
2009-02-05 06:01:43 -05:00
|
|
|
* Returns an Addrinfo object for local address obtained by getsockname.
|
2009-01-16 23:11:27 -05:00
|
|
|
*
|
|
|
|
* Note that addrinfo.protocol is filled by 0.
|
|
|
|
*
|
|
|
|
* TCPServer.open("127.0.0.1", 1512) {|serv|
|
2009-02-05 06:01:43 -05:00
|
|
|
* p serv.local_address #=> #<Addrinfo: 127.0.0.1:1512 TCP>
|
2009-01-16 23:11:27 -05:00
|
|
|
* }
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_local_address(VALUE sock)
|
|
|
|
{
|
2009-02-10 09:31:21 -05:00
|
|
|
struct sockaddr_storage buf;
|
2009-01-16 23:11:27 -05:00
|
|
|
socklen_t len = sizeof buf;
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
2009-02-10 09:31:21 -05:00
|
|
|
if (getsockname(fptr->fd, (struct sockaddr*)&buf, &len) < 0)
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_sys_fail("getsockname(2)");
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_fd_socket_addrinfo(fptr->fd, (struct sockaddr *)&buf, len);
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* bsock.remote_address => addrinfo
|
|
|
|
*
|
2009-02-05 06:01:43 -05:00
|
|
|
* Returns an Addrinfo object for remote address obtained by getpeername.
|
2009-01-16 23:11:27 -05:00
|
|
|
*
|
|
|
|
* Note that addrinfo.protocol is filled by 0.
|
|
|
|
*
|
|
|
|
* TCPServer.open("127.0.0.1", 1728) {|serv|
|
|
|
|
* c = TCPSocket.new("127.0.0.1", 1728)
|
|
|
|
* s = serv.accept
|
2009-02-05 06:01:43 -05:00
|
|
|
* p s.remote_address #=> #<Addrinfo: 127.0.0.1:36504 TCP>
|
2009-01-16 23:11:27 -05:00
|
|
|
* }
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_remote_address(VALUE sock)
|
|
|
|
{
|
2009-02-10 09:31:21 -05:00
|
|
|
struct sockaddr_storage buf;
|
2009-01-16 23:11:27 -05:00
|
|
|
socklen_t len = sizeof buf;
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
2009-02-10 09:31:21 -05:00
|
|
|
if (getpeername(fptr->fd, (struct sockaddr*)&buf, &len) < 0)
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_sys_fail("getpeername(2)");
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_fd_socket_addrinfo(fptr->fd, (struct sockaddr *)&buf, len);
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.send(mesg, flags [, sockaddr_to]) => numbytes_sent
|
|
|
|
*
|
|
|
|
* send _mesg_ via _basicsocket_.
|
|
|
|
*
|
|
|
|
* _mesg_ should be a string.
|
|
|
|
*
|
|
|
|
* _flags_ should be a bitwise OR of Socket::MSG_* constants.
|
|
|
|
*
|
|
|
|
* _sockaddr_to_ should be a packed sockaddr string or an addrinfo.
|
|
|
|
*
|
|
|
|
* TCPSocket.open("localhost", 80) {|s|
|
|
|
|
* s.send "GET / HTTP/1.0\r\n\r\n", 0
|
|
|
|
* p s.read
|
|
|
|
* }
|
|
|
|
*/
|
|
|
|
VALUE
|
2009-03-01 01:30:41 -05:00
|
|
|
rsock_bsock_send(int argc, VALUE *argv, VALUE sock)
|
2009-01-16 23:11:27 -05:00
|
|
|
{
|
2009-03-01 01:30:41 -05:00
|
|
|
struct rsock_send_arg arg;
|
2009-01-16 23:11:27 -05:00
|
|
|
VALUE flags, to;
|
|
|
|
rb_io_t *fptr;
|
|
|
|
int n;
|
|
|
|
rb_blocking_function_t *func;
|
|
|
|
|
|
|
|
rb_secure(4);
|
|
|
|
rb_scan_args(argc, argv, "21", &arg.mesg, &flags, &to);
|
|
|
|
|
|
|
|
StringValue(arg.mesg);
|
|
|
|
if (!NIL_P(to)) {
|
|
|
|
SockAddrStringValue(to);
|
|
|
|
to = rb_str_new4(to);
|
|
|
|
arg.to = (struct sockaddr *)RSTRING_PTR(to);
|
|
|
|
arg.tolen = RSTRING_LEN(to);
|
2009-03-01 01:30:41 -05:00
|
|
|
func = rsock_sendto_blocking;
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
else {
|
2009-03-01 01:30:41 -05:00
|
|
|
func = rsock_send_blocking;
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
arg.fd = fptr->fd;
|
|
|
|
arg.flags = NUM2INT(flags);
|
|
|
|
while (rb_thread_fd_writable(arg.fd),
|
|
|
|
(n = (int)BLOCKING_REGION(func, &arg)) < 0) {
|
|
|
|
if (rb_io_wait_writable(arg.fd)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
rb_sys_fail("send(2)");
|
|
|
|
}
|
|
|
|
return INT2FIX(n);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.do_not_reverse_lookup => true or false
|
|
|
|
*
|
|
|
|
* Gets the do_not_reverse_lookup flag of _basicsocket_.
|
|
|
|
*
|
|
|
|
* TCPSocket.open("www.ruby-lang.org", 80) {|sock|
|
|
|
|
* p sock.do_not_reverse_lookup #=> false
|
|
|
|
* p sock.peeraddr #=> ["AF_INET", 80, "carbon.ruby-lang.org", "221.186.184.68"]
|
|
|
|
* sock.do_not_reverse_lookup = true
|
|
|
|
* p sock.peeraddr #=> ["AF_INET", 80, "221.186.184.68", "221.186.184.68"]
|
|
|
|
* }
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_do_not_reverse_lookup(VALUE sock)
|
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
return (fptr->mode & FMODE_NOREVLOOKUP) ? Qtrue : Qfalse;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.do_not_reverse_lookup = bool
|
|
|
|
*
|
|
|
|
* Sets the do_not_reverse_lookup flag of _basicsocket_.
|
|
|
|
*
|
|
|
|
* BasicSocket.do_not_reverse_lookup = false
|
|
|
|
* p TCPSocket.new("127.0.0.1", 80).do_not_reverse_lookup #=> false
|
|
|
|
* BasicSocket.do_not_reverse_lookup = true
|
|
|
|
* p TCPSocket.new("127.0.0.1", 80).do_not_reverse_lookup #=> true
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_do_not_reverse_lookup_set(VALUE sock, VALUE state)
|
|
|
|
{
|
|
|
|
rb_io_t *fptr;
|
|
|
|
|
|
|
|
rb_secure(4);
|
|
|
|
GetOpenFile(sock, fptr);
|
|
|
|
if (RTEST(state)) {
|
|
|
|
fptr->mode |= FMODE_NOREVLOOKUP;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
fptr->mode &= ~FMODE_NOREVLOOKUP;
|
|
|
|
}
|
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.recv(maxlen) => mesg
|
|
|
|
* basicsocket.recv(maxlen, flags) => mesg
|
|
|
|
*
|
|
|
|
* Receives a message.
|
|
|
|
*
|
|
|
|
* _maxlen_ is the maximum number of bytes to receive.
|
|
|
|
*
|
|
|
|
* _flags_ should be a bitwise OR of Socket::MSG_* constants.
|
|
|
|
*
|
|
|
|
* UNIXSocket.pair {|s1, s2|
|
|
|
|
* s1.puts "Hello World"
|
|
|
|
* p s2.recv(4) #=> "Hell"
|
|
|
|
* p s2.recv(4, Socket::MSG_PEEK) #=> "o Wo"
|
|
|
|
* p s2.recv(4) #=> "o Wo"
|
|
|
|
* p s2.recv(10) #=> "rld\n"
|
|
|
|
* }
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_recv(int argc, VALUE *argv, VALUE sock)
|
|
|
|
{
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_s_recvfrom(sock, argc, argv, RECV_RECV);
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* basicsocket.recv_nonblock(maxlen) => mesg
|
|
|
|
* basicsocket.recv_nonblock(maxlen, flags) => mesg
|
|
|
|
*
|
|
|
|
* Receives up to _maxlen_ bytes from +socket+ using recvfrom(2) after
|
|
|
|
* O_NONBLOCK is set for the underlying file descriptor.
|
|
|
|
* _flags_ is zero or more of the +MSG_+ options.
|
|
|
|
* The result, _mesg_, is the data received.
|
|
|
|
*
|
|
|
|
* When recvfrom(2) returns 0, Socket#recv_nonblock returns
|
|
|
|
* an empty string as data.
|
|
|
|
* The meaning depends on the socket: EOF on TCP, empty packet on UDP, etc.
|
|
|
|
*
|
|
|
|
* === Parameters
|
|
|
|
* * +maxlen+ - the number of bytes to receive from the socket
|
|
|
|
* * +flags+ - zero or more of the +MSG_+ options
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
* serv = TCPServer.new("127.0.0.1", 0)
|
|
|
|
* af, port, host, addr = serv.addr
|
|
|
|
* c = TCPSocket.new(addr, port)
|
|
|
|
* s = serv.accept
|
|
|
|
* c.send "aaa", 0
|
|
|
|
* IO.select([s]) # emulate blocking recv.
|
|
|
|
* p s.recv_nonblock(10) #=> "aaa"
|
|
|
|
*
|
|
|
|
* Refer to Socket#recvfrom for the exceptions that may be thrown if the call
|
|
|
|
* to _recv_nonblock_ fails.
|
|
|
|
*
|
|
|
|
* BasicSocket#recv_nonblock may raise any error corresponding to recvfrom(2) failure,
|
|
|
|
* including Errno::EWOULDBLOCK.
|
|
|
|
*
|
|
|
|
* === See
|
|
|
|
* * Socket#recvfrom
|
|
|
|
*/
|
|
|
|
|
|
|
|
static VALUE
|
|
|
|
bsock_recv_nonblock(int argc, VALUE *argv, VALUE sock)
|
|
|
|
{
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_s_recvfrom_nonblock(sock, argc, argv, RECV_RECV);
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* BasicSocket.do_not_reverse_lookup => true or false
|
|
|
|
*
|
|
|
|
* Gets the global do_not_reverse_lookup flag.
|
|
|
|
*
|
|
|
|
* BasicSocket.do_not_reverse_lookup #=> false
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_do_not_rev_lookup(void)
|
|
|
|
{
|
2009-03-01 01:30:41 -05:00
|
|
|
return rsock_do_not_reverse_lookup?Qtrue:Qfalse;
|
2009-01-16 23:11:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* BasicSocket.do_not_reverse_lookup = bool
|
|
|
|
*
|
|
|
|
* Sets the global do_not_reverse_lookup flag.
|
|
|
|
*
|
|
|
|
* The flag is used for initial value of do_not_reverse_lookup for each socket.
|
|
|
|
*
|
|
|
|
* s1 = TCPSocket.new("localhost", 80)
|
|
|
|
* p s1.do_not_reverse_lookup #=> true
|
|
|
|
* BasicSocket.do_not_reverse_lookup = false
|
|
|
|
* s2 = TCPSocket.new("localhost", 80)
|
|
|
|
* p s2.do_not_reverse_lookup #=> false
|
|
|
|
* p s1.do_not_reverse_lookup #=> true
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
bsock_do_not_rev_lookup_set(VALUE self, VALUE val)
|
|
|
|
{
|
|
|
|
rb_secure(4);
|
2009-03-01 01:30:41 -05:00
|
|
|
rsock_do_not_reverse_lookup = RTEST(val);
|
2009-01-16 23:11:27 -05:00
|
|
|
return val;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* BasicSocket class
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
Init_basicsocket(void)
|
|
|
|
{
|
|
|
|
rb_cBasicSocket = rb_define_class("BasicSocket", rb_cIO);
|
|
|
|
rb_undef_method(rb_cBasicSocket, "initialize");
|
|
|
|
|
|
|
|
rb_define_singleton_method(rb_cBasicSocket, "do_not_reverse_lookup",
|
|
|
|
bsock_do_not_rev_lookup, 0);
|
|
|
|
rb_define_singleton_method(rb_cBasicSocket, "do_not_reverse_lookup=",
|
|
|
|
bsock_do_not_rev_lookup_set, 1);
|
|
|
|
rb_define_singleton_method(rb_cBasicSocket, "for_fd", bsock_s_for_fd, 1);
|
|
|
|
|
|
|
|
rb_define_method(rb_cBasicSocket, "close_read", bsock_close_read, 0);
|
|
|
|
rb_define_method(rb_cBasicSocket, "close_write", bsock_close_write, 0);
|
|
|
|
rb_define_method(rb_cBasicSocket, "shutdown", bsock_shutdown, -1);
|
2009-02-01 20:53:02 -05:00
|
|
|
rb_define_method(rb_cBasicSocket, "setsockopt", bsock_setsockopt, -1);
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_define_method(rb_cBasicSocket, "getsockopt", bsock_getsockopt, 2);
|
|
|
|
rb_define_method(rb_cBasicSocket, "getsockname", bsock_getsockname, 0);
|
|
|
|
rb_define_method(rb_cBasicSocket, "getpeername", bsock_getpeername, 0);
|
2009-02-10 20:22:08 -05:00
|
|
|
rb_define_method(rb_cBasicSocket, "getpeereid", bsock_getpeereid, 0);
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_define_method(rb_cBasicSocket, "local_address", bsock_local_address, 0);
|
|
|
|
rb_define_method(rb_cBasicSocket, "remote_address", bsock_remote_address, 0);
|
2009-03-01 01:30:41 -05:00
|
|
|
rb_define_method(rb_cBasicSocket, "send", rsock_bsock_send, -1);
|
2009-01-16 23:11:27 -05:00
|
|
|
rb_define_method(rb_cBasicSocket, "recv", bsock_recv, -1);
|
|
|
|
rb_define_method(rb_cBasicSocket, "recv_nonblock", bsock_recv_nonblock, -1);
|
|
|
|
rb_define_method(rb_cBasicSocket, "do_not_reverse_lookup", bsock_do_not_reverse_lookup, 0);
|
|
|
|
rb_define_method(rb_cBasicSocket, "do_not_reverse_lookup=", bsock_do_not_reverse_lookup_set, 1);
|
|
|
|
}
|