2013-10-17 17:40:50 -03:00
|
|
|
"""Event loop using a selector and related classes.
|
|
|
|
|
|
|
|
A selector is a "notify-when-ready" multiplexer. For a subclass which
|
|
|
|
also includes support for signal handling, see the unix_events sub-module.
|
|
|
|
"""
|
|
|
|
|
2014-01-25 10:32:06 -04:00
|
|
|
__all__ = ['BaseSelectorEventLoop']
|
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
import collections
|
2013-11-01 18:12:50 -03:00
|
|
|
import errno
|
2014-08-31 10:07:57 -03:00
|
|
|
import functools
|
2013-10-17 17:40:50 -03:00
|
|
|
import socket
|
2015-01-13 19:19:09 -04:00
|
|
|
import sys
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
|
|
|
import ssl
|
|
|
|
except ImportError: # pragma: no cover
|
|
|
|
ssl = None
|
|
|
|
|
|
|
|
from . import base_events
|
|
|
|
from . import constants
|
|
|
|
from . import events
|
|
|
|
from . import futures
|
|
|
|
from . import selectors
|
|
|
|
from . import transports
|
2015-01-13 19:19:09 -04:00
|
|
|
from . import sslproto
|
2013-10-17 19:39:45 -03:00
|
|
|
from .log import logger
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
|
2014-07-11 22:11:53 -03:00
|
|
|
def _test_selector_event(selector, fd, event):
|
|
|
|
# Test if the selector is monitoring 'event' events
|
|
|
|
# for the file descriptor 'fd'.
|
|
|
|
try:
|
|
|
|
key = selector.get_key(fd)
|
|
|
|
except KeyError:
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
return bool(key.events & event)
|
|
|
|
|
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
class BaseSelectorEventLoop(base_events.BaseEventLoop):
|
|
|
|
"""Selector event loop.
|
|
|
|
|
|
|
|
See events.EventLoop for API specification.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self, selector=None):
|
|
|
|
super().__init__()
|
|
|
|
|
|
|
|
if selector is None:
|
|
|
|
selector = selectors.DefaultSelector()
|
2013-10-17 19:39:45 -03:00
|
|
|
logger.debug('Using selector: %s', selector.__class__.__name__)
|
2013-10-17 17:40:50 -03:00
|
|
|
self._selector = selector
|
|
|
|
self._make_self_pipe()
|
|
|
|
|
|
|
|
def _make_socket_transport(self, sock, protocol, waiter=None, *,
|
|
|
|
extra=None, server=None):
|
|
|
|
return _SelectorSocketTransport(self, sock, protocol, waiter,
|
|
|
|
extra, server)
|
|
|
|
|
2015-01-08 19:09:10 -04:00
|
|
|
def _make_ssl_transport(self, rawsock, protocol, sslcontext, waiter=None,
|
|
|
|
*, server_side=False, server_hostname=None,
|
2013-10-17 17:40:50 -03:00
|
|
|
extra=None, server=None):
|
2015-01-13 19:19:09 -04:00
|
|
|
if not sslproto._is_sslproto_available():
|
|
|
|
return self._make_legacy_ssl_transport(
|
|
|
|
rawsock, protocol, sslcontext, waiter,
|
|
|
|
server_side=server_side, server_hostname=server_hostname,
|
|
|
|
extra=extra, server=server)
|
|
|
|
|
|
|
|
ssl_protocol = sslproto.SSLProtocol(self, protocol, sslcontext, waiter,
|
|
|
|
server_side, server_hostname)
|
|
|
|
_SelectorSocketTransport(self, rawsock, ssl_protocol,
|
|
|
|
extra=extra, server=server)
|
|
|
|
return ssl_protocol._app_transport
|
|
|
|
|
|
|
|
def _make_legacy_ssl_transport(self, rawsock, protocol, sslcontext,
|
|
|
|
waiter, *,
|
|
|
|
server_side=False, server_hostname=None,
|
|
|
|
extra=None, server=None):
|
|
|
|
# Use the legacy API: SSL_write, SSL_read, etc. The legacy API is used
|
|
|
|
# on Python 3.4 and older, when ssl.MemoryBIO is not available.
|
2013-10-17 17:40:50 -03:00
|
|
|
return _SelectorSslTransport(
|
|
|
|
self, rawsock, protocol, sslcontext, waiter,
|
|
|
|
server_side, server_hostname, extra, server)
|
|
|
|
|
|
|
|
def _make_datagram_transport(self, sock, protocol,
|
2014-07-08 18:57:31 -03:00
|
|
|
address=None, waiter=None, extra=None):
|
|
|
|
return _SelectorDatagramTransport(self, sock, protocol,
|
|
|
|
address, waiter, extra)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
def close(self):
|
2014-12-26 16:07:52 -04:00
|
|
|
if self.is_running():
|
2014-11-20 19:23:27 -04:00
|
|
|
raise RuntimeError("Cannot close a running event loop")
|
2014-06-10 05:23:10 -03:00
|
|
|
if self.is_closed():
|
|
|
|
return
|
|
|
|
self._close_self_pipe()
|
2014-11-20 19:23:27 -04:00
|
|
|
super().close()
|
2013-10-17 17:40:50 -03:00
|
|
|
if self._selector is not None:
|
|
|
|
self._selector.close()
|
|
|
|
self._selector = None
|
|
|
|
|
|
|
|
def _socketpair(self):
|
|
|
|
raise NotImplementedError
|
|
|
|
|
|
|
|
def _close_self_pipe(self):
|
|
|
|
self.remove_reader(self._ssock.fileno())
|
|
|
|
self._ssock.close()
|
|
|
|
self._ssock = None
|
|
|
|
self._csock.close()
|
|
|
|
self._csock = None
|
|
|
|
self._internal_fds -= 1
|
|
|
|
|
|
|
|
def _make_self_pipe(self):
|
|
|
|
# A self-socket, really. :-)
|
|
|
|
self._ssock, self._csock = self._socketpair()
|
|
|
|
self._ssock.setblocking(False)
|
|
|
|
self._csock.setblocking(False)
|
|
|
|
self._internal_fds += 1
|
|
|
|
self.add_reader(self._ssock.fileno(), self._read_from_self)
|
|
|
|
|
2014-07-17 17:43:40 -03:00
|
|
|
def _process_self_data(self, data):
|
|
|
|
pass
|
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
def _read_from_self(self):
|
2014-06-19 07:59:15 -03:00
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
data = self._ssock.recv(4096)
|
|
|
|
if not data:
|
|
|
|
break
|
2014-07-17 17:43:40 -03:00
|
|
|
self._process_self_data(data)
|
2014-06-19 07:59:15 -03:00
|
|
|
except InterruptedError:
|
|
|
|
continue
|
|
|
|
except BlockingIOError:
|
|
|
|
break
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
def _write_to_self(self):
|
2014-05-06 18:42:40 -03:00
|
|
|
# This may be called from a different thread, possibly after
|
|
|
|
# _close_self_pipe() has been called or even while it is
|
|
|
|
# running. Guard for self._csock being None or closed. When
|
|
|
|
# a socket is closed, send() raises OSError (with errno set to
|
|
|
|
# EBADF, but let's not rely on the exact error code).
|
|
|
|
csock = self._csock
|
|
|
|
if csock is not None:
|
|
|
|
try:
|
2014-07-17 17:43:40 -03:00
|
|
|
csock.send(b'\0')
|
2014-05-06 18:42:40 -03:00
|
|
|
except OSError:
|
2014-07-25 17:36:05 -03:00
|
|
|
if self._debug:
|
|
|
|
logger.debug("Fail to write a null byte into the "
|
|
|
|
"self-pipe socket",
|
|
|
|
exc_info=True)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-11-01 18:22:30 -03:00
|
|
|
def _start_serving(self, protocol_factory, sock,
|
|
|
|
sslcontext=None, server=None):
|
2013-10-17 17:40:50 -03:00
|
|
|
self.add_reader(sock.fileno(), self._accept_connection,
|
2013-11-01 18:22:30 -03:00
|
|
|
protocol_factory, sock, sslcontext, server)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-11-01 18:22:30 -03:00
|
|
|
def _accept_connection(self, protocol_factory, sock,
|
|
|
|
sslcontext=None, server=None):
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
|
|
|
conn, addr = sock.accept()
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._debug:
|
|
|
|
logger.debug("%r got a new connection from %r: %r",
|
|
|
|
server, addr, conn)
|
2013-10-17 17:40:50 -03:00
|
|
|
conn.setblocking(False)
|
2013-11-01 18:12:50 -03:00
|
|
|
except (BlockingIOError, InterruptedError, ConnectionAbortedError):
|
2013-10-17 17:40:50 -03:00
|
|
|
pass # False alarm.
|
2013-11-01 18:12:50 -03:00
|
|
|
except OSError as exc:
|
2013-10-17 17:40:50 -03:00
|
|
|
# There's nowhere to send the error, so just log it.
|
2013-11-01 18:12:50 -03:00
|
|
|
if exc.errno in (errno.EMFILE, errno.ENFILE,
|
|
|
|
errno.ENOBUFS, errno.ENOMEM):
|
|
|
|
# Some platforms (e.g. Linux keep reporting the FD as
|
|
|
|
# ready, so we remove the read handler temporarily.
|
|
|
|
# We'll try again in a while.
|
2014-02-18 19:02:19 -04:00
|
|
|
self.call_exception_handler({
|
|
|
|
'message': 'socket.accept() out of system resource',
|
|
|
|
'exception': exc,
|
|
|
|
'socket': sock,
|
|
|
|
})
|
2013-11-01 18:12:50 -03:00
|
|
|
self.remove_reader(sock.fileno())
|
|
|
|
self.call_later(constants.ACCEPT_RETRY_DELAY,
|
|
|
|
self._start_serving,
|
2013-11-01 18:22:30 -03:00
|
|
|
protocol_factory, sock, sslcontext, server)
|
2013-11-01 18:12:50 -03:00
|
|
|
else:
|
|
|
|
raise # The event loop will catch, log and ignore it.
|
2013-10-17 17:40:50 -03:00
|
|
|
else:
|
2013-11-01 18:22:30 -03:00
|
|
|
if sslcontext:
|
2013-10-17 17:40:50 -03:00
|
|
|
self._make_ssl_transport(
|
2015-01-08 07:06:36 -04:00
|
|
|
conn, protocol_factory(), sslcontext,
|
2013-10-17 17:40:50 -03:00
|
|
|
server_side=True, extra={'peername': addr}, server=server)
|
|
|
|
else:
|
|
|
|
self._make_socket_transport(
|
|
|
|
conn, protocol_factory(), extra={'peername': addr},
|
|
|
|
server=server)
|
|
|
|
# It's now up to the protocol to handle the connection.
|
|
|
|
|
|
|
|
def add_reader(self, fd, callback, *args):
|
|
|
|
"""Add a reader callback."""
|
2014-06-10 05:23:10 -03:00
|
|
|
self._check_closed()
|
2014-02-18 19:02:19 -04:00
|
|
|
handle = events.Handle(callback, args, self)
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
|
|
|
key = self._selector.get_key(fd)
|
|
|
|
except KeyError:
|
|
|
|
self._selector.register(fd, selectors.EVENT_READ,
|
|
|
|
(handle, None))
|
|
|
|
else:
|
|
|
|
mask, (reader, writer) = key.events, key.data
|
|
|
|
self._selector.modify(fd, mask | selectors.EVENT_READ,
|
|
|
|
(handle, writer))
|
|
|
|
if reader is not None:
|
|
|
|
reader.cancel()
|
|
|
|
|
|
|
|
def remove_reader(self, fd):
|
|
|
|
"""Remove a reader callback."""
|
2014-06-10 05:23:10 -03:00
|
|
|
if self.is_closed():
|
2014-03-05 19:52:53 -04:00
|
|
|
return False
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
|
|
|
key = self._selector.get_key(fd)
|
|
|
|
except KeyError:
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
mask, (reader, writer) = key.events, key.data
|
|
|
|
mask &= ~selectors.EVENT_READ
|
|
|
|
if not mask:
|
|
|
|
self._selector.unregister(fd)
|
|
|
|
else:
|
|
|
|
self._selector.modify(fd, mask, (None, writer))
|
|
|
|
|
|
|
|
if reader is not None:
|
|
|
|
reader.cancel()
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
return False
|
|
|
|
|
|
|
|
def add_writer(self, fd, callback, *args):
|
|
|
|
"""Add a writer callback.."""
|
2014-06-10 05:23:10 -03:00
|
|
|
self._check_closed()
|
2014-02-18 19:02:19 -04:00
|
|
|
handle = events.Handle(callback, args, self)
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
|
|
|
key = self._selector.get_key(fd)
|
|
|
|
except KeyError:
|
|
|
|
self._selector.register(fd, selectors.EVENT_WRITE,
|
|
|
|
(None, handle))
|
|
|
|
else:
|
|
|
|
mask, (reader, writer) = key.events, key.data
|
|
|
|
self._selector.modify(fd, mask | selectors.EVENT_WRITE,
|
|
|
|
(reader, handle))
|
|
|
|
if writer is not None:
|
|
|
|
writer.cancel()
|
|
|
|
|
|
|
|
def remove_writer(self, fd):
|
|
|
|
"""Remove a writer callback."""
|
2014-06-10 05:23:10 -03:00
|
|
|
if self.is_closed():
|
2014-03-05 19:52:53 -04:00
|
|
|
return False
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
|
|
|
key = self._selector.get_key(fd)
|
|
|
|
except KeyError:
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
mask, (reader, writer) = key.events, key.data
|
|
|
|
# Remove both writer and connector.
|
|
|
|
mask &= ~selectors.EVENT_WRITE
|
|
|
|
if not mask:
|
|
|
|
self._selector.unregister(fd)
|
|
|
|
else:
|
|
|
|
self._selector.modify(fd, mask, (reader, None))
|
|
|
|
|
|
|
|
if writer is not None:
|
|
|
|
writer.cancel()
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
return False
|
|
|
|
|
|
|
|
def sock_recv(self, sock, n):
|
2014-06-19 12:11:49 -03:00
|
|
|
"""Receive data from the socket.
|
|
|
|
|
|
|
|
The return value is a bytes object representing the data received.
|
|
|
|
The maximum amount of data to be received at once is specified by
|
|
|
|
nbytes.
|
|
|
|
|
|
|
|
This method is a coroutine.
|
|
|
|
"""
|
2014-07-29 18:08:17 -03:00
|
|
|
if self.get_debug() and sock.gettimeout() != 0:
|
|
|
|
raise ValueError("the socket must be non-blocking")
|
2013-10-17 17:40:50 -03:00
|
|
|
fut = futures.Future(loop=self)
|
|
|
|
self._sock_recv(fut, False, sock, n)
|
|
|
|
return fut
|
|
|
|
|
|
|
|
def _sock_recv(self, fut, registered, sock, n):
|
2014-02-13 04:24:37 -04:00
|
|
|
# _sock_recv() can add itself as an I/O callback if the operation can't
|
2014-02-18 23:27:48 -04:00
|
|
|
# be done immediately. Don't use it directly, call sock_recv().
|
2013-10-17 17:40:50 -03:00
|
|
|
fd = sock.fileno()
|
|
|
|
if registered:
|
|
|
|
# Remove the callback early. It should be rare that the
|
|
|
|
# selector says the fd is ready but the call still returns
|
|
|
|
# EAGAIN, and I am willing to take a hit in that case in
|
|
|
|
# order to simplify the common case.
|
|
|
|
self.remove_reader(fd)
|
|
|
|
if fut.cancelled():
|
|
|
|
return
|
|
|
|
try:
|
|
|
|
data = sock.recv(n)
|
|
|
|
except (BlockingIOError, InterruptedError):
|
|
|
|
self.add_reader(fd, self._sock_recv, fut, True, sock, n)
|
|
|
|
except Exception as exc:
|
|
|
|
fut.set_exception(exc)
|
|
|
|
else:
|
|
|
|
fut.set_result(data)
|
|
|
|
|
|
|
|
def sock_sendall(self, sock, data):
|
2014-06-19 12:11:49 -03:00
|
|
|
"""Send data to the socket.
|
|
|
|
|
|
|
|
The socket must be connected to a remote socket. This method continues
|
|
|
|
to send data from data until either all data has been sent or an
|
|
|
|
error occurs. None is returned on success. On error, an exception is
|
|
|
|
raised, and there is no way to determine how much data, if any, was
|
|
|
|
successfully processed by the receiving end of the connection.
|
|
|
|
|
|
|
|
This method is a coroutine.
|
|
|
|
"""
|
2014-07-29 18:08:17 -03:00
|
|
|
if self.get_debug() and sock.gettimeout() != 0:
|
|
|
|
raise ValueError("the socket must be non-blocking")
|
2013-10-17 17:40:50 -03:00
|
|
|
fut = futures.Future(loop=self)
|
|
|
|
if data:
|
|
|
|
self._sock_sendall(fut, False, sock, data)
|
|
|
|
else:
|
|
|
|
fut.set_result(None)
|
|
|
|
return fut
|
|
|
|
|
|
|
|
def _sock_sendall(self, fut, registered, sock, data):
|
|
|
|
fd = sock.fileno()
|
|
|
|
|
|
|
|
if registered:
|
|
|
|
self.remove_writer(fd)
|
|
|
|
if fut.cancelled():
|
|
|
|
return
|
|
|
|
|
|
|
|
try:
|
|
|
|
n = sock.send(data)
|
|
|
|
except (BlockingIOError, InterruptedError):
|
|
|
|
n = 0
|
|
|
|
except Exception as exc:
|
|
|
|
fut.set_exception(exc)
|
|
|
|
return
|
|
|
|
|
|
|
|
if n == len(data):
|
|
|
|
fut.set_result(None)
|
|
|
|
else:
|
|
|
|
if n:
|
|
|
|
data = data[n:]
|
|
|
|
self.add_writer(fd, self._sock_sendall, fut, True, sock, data)
|
|
|
|
|
|
|
|
def sock_connect(self, sock, address):
|
2014-06-19 12:11:49 -03:00
|
|
|
"""Connect to a remote socket at address.
|
|
|
|
|
|
|
|
The address must be already resolved to avoid the trap of hanging the
|
|
|
|
entire event loop when the address requires doing a DNS lookup. For
|
|
|
|
example, it must be an IP address, not an hostname, for AF_INET and
|
|
|
|
AF_INET6 address families. Use getaddrinfo() to resolve the hostname
|
|
|
|
asynchronously.
|
|
|
|
|
|
|
|
This method is a coroutine.
|
|
|
|
"""
|
2014-07-29 18:08:17 -03:00
|
|
|
if self.get_debug() and sock.gettimeout() != 0:
|
|
|
|
raise ValueError("the socket must be non-blocking")
|
2013-10-17 17:40:50 -03:00
|
|
|
fut = futures.Future(loop=self)
|
2014-02-13 04:24:37 -04:00
|
|
|
try:
|
|
|
|
base_events._check_resolved_address(sock, address)
|
|
|
|
except ValueError as err:
|
|
|
|
fut.set_exception(err)
|
|
|
|
else:
|
2014-08-31 10:07:57 -03:00
|
|
|
self._sock_connect(fut, sock, address)
|
2013-10-17 17:40:50 -03:00
|
|
|
return fut
|
|
|
|
|
2014-08-31 10:07:57 -03:00
|
|
|
def _sock_connect(self, fut, sock, address):
|
2013-10-17 17:40:50 -03:00
|
|
|
fd = sock.fileno()
|
2014-08-31 10:07:57 -03:00
|
|
|
try:
|
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
sock.connect(address)
|
|
|
|
except InterruptedError:
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
break
|
|
|
|
except BlockingIOError:
|
|
|
|
fut.add_done_callback(functools.partial(self._sock_connect_done,
|
2015-01-08 20:42:52 -04:00
|
|
|
fd))
|
2014-08-31 10:07:57 -03:00
|
|
|
self.add_writer(fd, self._sock_connect_cb, fut, sock, address)
|
|
|
|
except Exception as exc:
|
|
|
|
fut.set_exception(exc)
|
|
|
|
else:
|
|
|
|
fut.set_result(None)
|
|
|
|
|
2015-01-08 20:42:52 -04:00
|
|
|
def _sock_connect_done(self, fd, fut):
|
|
|
|
self.remove_writer(fd)
|
2014-08-31 10:07:57 -03:00
|
|
|
|
|
|
|
def _sock_connect_cb(self, fut, sock, address):
|
2013-10-17 17:40:50 -03:00
|
|
|
if fut.cancelled():
|
|
|
|
return
|
2014-08-31 10:07:57 -03:00
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
2014-08-31 10:07:57 -03:00
|
|
|
err = sock.getsockopt(socket.SOL_SOCKET, socket.SO_ERROR)
|
|
|
|
if err != 0:
|
|
|
|
# Jump to any except clause below.
|
|
|
|
raise OSError(err, 'Connect call failed %s' % (address,))
|
2013-10-17 17:40:50 -03:00
|
|
|
except (BlockingIOError, InterruptedError):
|
2014-08-31 10:07:57 -03:00
|
|
|
# socket is still registered, the callback will be retried later
|
|
|
|
pass
|
2013-10-17 17:40:50 -03:00
|
|
|
except Exception as exc:
|
|
|
|
fut.set_exception(exc)
|
|
|
|
else:
|
|
|
|
fut.set_result(None)
|
|
|
|
|
|
|
|
def sock_accept(self, sock):
|
2014-06-19 12:11:49 -03:00
|
|
|
"""Accept a connection.
|
|
|
|
|
|
|
|
The socket must be bound to an address and listening for connections.
|
|
|
|
The return value is a pair (conn, address) where conn is a new socket
|
|
|
|
object usable to send and receive data on the connection, and address
|
|
|
|
is the address bound to the socket on the other end of the connection.
|
|
|
|
|
|
|
|
This method is a coroutine.
|
|
|
|
"""
|
2014-07-29 18:08:17 -03:00
|
|
|
if self.get_debug() and sock.gettimeout() != 0:
|
|
|
|
raise ValueError("the socket must be non-blocking")
|
2013-10-17 17:40:50 -03:00
|
|
|
fut = futures.Future(loop=self)
|
|
|
|
self._sock_accept(fut, False, sock)
|
|
|
|
return fut
|
|
|
|
|
|
|
|
def _sock_accept(self, fut, registered, sock):
|
|
|
|
fd = sock.fileno()
|
|
|
|
if registered:
|
|
|
|
self.remove_reader(fd)
|
|
|
|
if fut.cancelled():
|
|
|
|
return
|
|
|
|
try:
|
|
|
|
conn, address = sock.accept()
|
|
|
|
conn.setblocking(False)
|
|
|
|
except (BlockingIOError, InterruptedError):
|
|
|
|
self.add_reader(fd, self._sock_accept, fut, True, sock)
|
|
|
|
except Exception as exc:
|
|
|
|
fut.set_exception(exc)
|
|
|
|
else:
|
|
|
|
fut.set_result((conn, address))
|
|
|
|
|
|
|
|
def _process_events(self, event_list):
|
|
|
|
for key, mask in event_list:
|
|
|
|
fileobj, (reader, writer) = key.fileobj, key.data
|
|
|
|
if mask & selectors.EVENT_READ and reader is not None:
|
|
|
|
if reader._cancelled:
|
|
|
|
self.remove_reader(fileobj)
|
|
|
|
else:
|
|
|
|
self._add_callback(reader)
|
|
|
|
if mask & selectors.EVENT_WRITE and writer is not None:
|
|
|
|
if writer._cancelled:
|
|
|
|
self.remove_writer(fileobj)
|
|
|
|
else:
|
|
|
|
self._add_callback(writer)
|
|
|
|
|
|
|
|
def _stop_serving(self, sock):
|
|
|
|
self.remove_reader(sock.fileno())
|
|
|
|
sock.close()
|
|
|
|
|
|
|
|
|
2014-02-18 19:41:13 -04:00
|
|
|
class _SelectorTransport(transports._FlowControlMixin,
|
|
|
|
transports.Transport):
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
max_size = 256 * 1024 # Buffer size passed to recv().
|
|
|
|
|
2013-11-27 18:12:48 -04:00
|
|
|
_buffer_factory = bytearray # Constructs initial value for self._buffer.
|
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
def __init__(self, loop, sock, protocol, extra, server=None):
|
2014-11-05 10:27:41 -04:00
|
|
|
super().__init__(extra, loop)
|
2013-10-17 17:40:50 -03:00
|
|
|
self._extra['socket'] = sock
|
|
|
|
self._extra['sockname'] = sock.getsockname()
|
|
|
|
if 'peername' not in self._extra:
|
|
|
|
try:
|
|
|
|
self._extra['peername'] = sock.getpeername()
|
|
|
|
except socket.error:
|
|
|
|
self._extra['peername'] = None
|
|
|
|
self._sock = sock
|
|
|
|
self._sock_fd = sock.fileno()
|
|
|
|
self._protocol = protocol
|
|
|
|
self._server = server
|
2013-11-27 18:12:48 -04:00
|
|
|
self._buffer = self._buffer_factory()
|
2013-10-18 14:10:36 -03:00
|
|
|
self._conn_lost = 0 # Set when call to connection_lost scheduled.
|
2013-10-17 17:40:50 -03:00
|
|
|
self._closing = False # Set when close() called.
|
2013-10-18 19:17:11 -03:00
|
|
|
if self._server is not None:
|
2014-07-11 17:52:21 -03:00
|
|
|
self._server._attach()
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2014-07-11 22:11:53 -03:00
|
|
|
def __repr__(self):
|
2014-10-12 04:52:11 -03:00
|
|
|
info = [self.__class__.__name__]
|
|
|
|
if self._sock is None:
|
|
|
|
info.append('closed')
|
|
|
|
elif self._closing:
|
|
|
|
info.append('closing')
|
|
|
|
info.append('fd=%s' % self._sock_fd)
|
2014-08-25 18:20:52 -03:00
|
|
|
# test if the transport was closed
|
|
|
|
if self._loop is not None:
|
|
|
|
polling = _test_selector_event(self._loop._selector,
|
|
|
|
self._sock_fd, selectors.EVENT_READ)
|
|
|
|
if polling:
|
|
|
|
info.append('read=polling')
|
|
|
|
else:
|
|
|
|
info.append('read=idle')
|
2014-07-11 22:11:53 -03:00
|
|
|
|
2014-08-25 18:20:52 -03:00
|
|
|
polling = _test_selector_event(self._loop._selector,
|
2015-01-08 19:09:10 -04:00
|
|
|
self._sock_fd,
|
|
|
|
selectors.EVENT_WRITE)
|
2014-08-25 18:20:52 -03:00
|
|
|
if polling:
|
|
|
|
state = 'polling'
|
|
|
|
else:
|
|
|
|
state = 'idle'
|
2014-07-11 22:11:53 -03:00
|
|
|
|
2014-08-25 18:20:52 -03:00
|
|
|
bufsize = self.get_write_buffer_size()
|
|
|
|
info.append('write=<%s, bufsize=%s>' % (state, bufsize))
|
2014-07-11 22:11:53 -03:00
|
|
|
return '<%s>' % ' '.join(info)
|
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
def abort(self):
|
|
|
|
self._force_close(None)
|
|
|
|
|
|
|
|
def close(self):
|
|
|
|
if self._closing:
|
|
|
|
return
|
|
|
|
self._closing = True
|
|
|
|
self._loop.remove_reader(self._sock_fd)
|
|
|
|
if not self._buffer:
|
2013-10-18 14:10:36 -03:00
|
|
|
self._conn_lost += 1
|
2013-10-17 17:40:50 -03:00
|
|
|
self._loop.call_soon(self._call_connection_lost, None)
|
|
|
|
|
2014-02-18 20:40:41 -04:00
|
|
|
def _fatal_error(self, exc, message='Fatal error on transport'):
|
2013-10-18 14:10:36 -03:00
|
|
|
# Should be called from exception handler only.
|
2015-01-13 19:19:09 -04:00
|
|
|
if isinstance(exc, (BrokenPipeError,
|
|
|
|
ConnectionResetError, ConnectionAbortedError)):
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.debug("%r: %s", self, message, exc_info=True)
|
|
|
|
else:
|
2014-02-18 19:02:19 -04:00
|
|
|
self._loop.call_exception_handler({
|
2014-02-18 20:40:41 -04:00
|
|
|
'message': message,
|
2014-02-18 19:02:19 -04:00
|
|
|
'exception': exc,
|
|
|
|
'transport': self,
|
|
|
|
'protocol': self._protocol,
|
|
|
|
})
|
2013-10-17 17:40:50 -03:00
|
|
|
self._force_close(exc)
|
|
|
|
|
|
|
|
def _force_close(self, exc):
|
2013-10-18 14:10:36 -03:00
|
|
|
if self._conn_lost:
|
|
|
|
return
|
2013-10-17 17:40:50 -03:00
|
|
|
if self._buffer:
|
|
|
|
self._buffer.clear()
|
|
|
|
self._loop.remove_writer(self._sock_fd)
|
2013-10-18 14:10:36 -03:00
|
|
|
if not self._closing:
|
|
|
|
self._closing = True
|
|
|
|
self._loop.remove_reader(self._sock_fd)
|
2013-10-17 17:40:50 -03:00
|
|
|
self._conn_lost += 1
|
|
|
|
self._loop.call_soon(self._call_connection_lost, exc)
|
|
|
|
|
|
|
|
def _call_connection_lost(self, exc):
|
|
|
|
try:
|
|
|
|
self._protocol.connection_lost(exc)
|
|
|
|
finally:
|
|
|
|
self._sock.close()
|
|
|
|
self._sock = None
|
|
|
|
self._protocol = None
|
|
|
|
self._loop = None
|
|
|
|
server = self._server
|
|
|
|
if server is not None:
|
2014-07-11 17:52:21 -03:00
|
|
|
server._detach()
|
2013-10-17 17:40:50 -03:00
|
|
|
self._server = None
|
|
|
|
|
2013-10-18 19:17:11 -03:00
|
|
|
def get_write_buffer_size(self):
|
2013-11-27 18:12:48 -04:00
|
|
|
return len(self._buffer)
|
2013-10-18 19:17:11 -03:00
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
class _SelectorSocketTransport(_SelectorTransport):
|
|
|
|
|
|
|
|
def __init__(self, loop, sock, protocol, waiter=None,
|
|
|
|
extra=None, server=None):
|
|
|
|
super().__init__(loop, sock, protocol, extra, server)
|
|
|
|
self._eof = False
|
|
|
|
self._paused = False
|
|
|
|
|
|
|
|
self._loop.add_reader(self._sock_fd, self._read_ready)
|
|
|
|
self._loop.call_soon(self._protocol.connection_made, self)
|
|
|
|
if waiter is not None:
|
2014-07-08 18:57:31 -03:00
|
|
|
# wait until protocol.connection_made() has been called
|
2014-07-07 13:08:22 -03:00
|
|
|
self._loop.call_soon(waiter._set_result_unless_cancelled, None)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-10-18 11:58:20 -03:00
|
|
|
def pause_reading(self):
|
2013-11-27 18:12:48 -04:00
|
|
|
if self._closing:
|
|
|
|
raise RuntimeError('Cannot pause_reading() when closing')
|
|
|
|
if self._paused:
|
|
|
|
raise RuntimeError('Already paused')
|
2013-10-17 17:40:50 -03:00
|
|
|
self._paused = True
|
|
|
|
self._loop.remove_reader(self._sock_fd)
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.debug("%r pauses reading", self)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-10-18 11:58:20 -03:00
|
|
|
def resume_reading(self):
|
2013-11-27 18:12:48 -04:00
|
|
|
if not self._paused:
|
|
|
|
raise RuntimeError('Not paused')
|
2013-10-17 17:40:50 -03:00
|
|
|
self._paused = False
|
|
|
|
if self._closing:
|
|
|
|
return
|
|
|
|
self._loop.add_reader(self._sock_fd, self._read_ready)
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.debug("%r resumes reading", self)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
def _read_ready(self):
|
|
|
|
try:
|
|
|
|
data = self._sock.recv(self.max_size)
|
|
|
|
except (BlockingIOError, InterruptedError):
|
|
|
|
pass
|
|
|
|
except Exception as exc:
|
2014-02-18 20:40:41 -04:00
|
|
|
self._fatal_error(exc, 'Fatal read error on socket transport')
|
2013-10-17 17:40:50 -03:00
|
|
|
else:
|
|
|
|
if data:
|
|
|
|
self._protocol.data_received(data)
|
|
|
|
else:
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.debug("%r received EOF", self)
|
2013-10-17 17:40:50 -03:00
|
|
|
keep_open = self._protocol.eof_received()
|
2013-10-30 18:36:58 -03:00
|
|
|
if keep_open:
|
|
|
|
# We're keeping the connection open so the
|
|
|
|
# protocol can write more, but we still can't
|
|
|
|
# receive more, so remove the reader callback.
|
|
|
|
self._loop.remove_reader(self._sock_fd)
|
|
|
|
else:
|
2013-10-17 17:40:50 -03:00
|
|
|
self.close()
|
|
|
|
|
|
|
|
def write(self, data):
|
2013-11-27 18:12:48 -04:00
|
|
|
if not isinstance(data, (bytes, bytearray, memoryview)):
|
|
|
|
raise TypeError('data argument must be byte-ish (%r)',
|
|
|
|
type(data))
|
|
|
|
if self._eof:
|
|
|
|
raise RuntimeError('Cannot call write() after write_eof()')
|
2013-10-17 17:40:50 -03:00
|
|
|
if not data:
|
|
|
|
return
|
|
|
|
|
|
|
|
if self._conn_lost:
|
|
|
|
if self._conn_lost >= constants.LOG_THRESHOLD_FOR_CONNLOST_WRITES:
|
2013-10-17 19:39:45 -03:00
|
|
|
logger.warning('socket.send() raised exception.')
|
2013-10-17 17:40:50 -03:00
|
|
|
self._conn_lost += 1
|
|
|
|
return
|
|
|
|
|
|
|
|
if not self._buffer:
|
2013-10-18 19:17:11 -03:00
|
|
|
# Optimization: try to send now.
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
|
|
|
n = self._sock.send(data)
|
|
|
|
except (BlockingIOError, InterruptedError):
|
2013-10-18 14:10:36 -03:00
|
|
|
pass
|
|
|
|
except Exception as exc:
|
2014-02-18 20:40:41 -04:00
|
|
|
self._fatal_error(exc, 'Fatal write error on socket transport')
|
2013-10-17 17:40:50 -03:00
|
|
|
return
|
|
|
|
else:
|
|
|
|
data = data[n:]
|
|
|
|
if not data:
|
|
|
|
return
|
2013-10-18 19:17:11 -03:00
|
|
|
# Not all was written; register write handler.
|
2013-10-17 17:40:50 -03:00
|
|
|
self._loop.add_writer(self._sock_fd, self._write_ready)
|
|
|
|
|
2013-10-18 19:17:11 -03:00
|
|
|
# Add it to the buffer.
|
2013-11-27 18:12:48 -04:00
|
|
|
self._buffer.extend(data)
|
2013-10-18 19:17:11 -03:00
|
|
|
self._maybe_pause_protocol()
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
def _write_ready(self):
|
2013-11-27 18:12:48 -04:00
|
|
|
assert self._buffer, 'Data should not be empty'
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
try:
|
2013-11-27 18:12:48 -04:00
|
|
|
n = self._sock.send(self._buffer)
|
2013-10-17 17:40:50 -03:00
|
|
|
except (BlockingIOError, InterruptedError):
|
2013-11-27 18:12:48 -04:00
|
|
|
pass
|
2013-10-17 17:40:50 -03:00
|
|
|
except Exception as exc:
|
|
|
|
self._loop.remove_writer(self._sock_fd)
|
2013-11-27 18:12:48 -04:00
|
|
|
self._buffer.clear()
|
2014-02-18 20:40:41 -04:00
|
|
|
self._fatal_error(exc, 'Fatal write error on socket transport')
|
2013-10-17 17:40:50 -03:00
|
|
|
else:
|
2013-11-27 18:12:48 -04:00
|
|
|
if n:
|
|
|
|
del self._buffer[:n]
|
2013-10-18 19:17:11 -03:00
|
|
|
self._maybe_resume_protocol() # May append to buffer.
|
|
|
|
if not self._buffer:
|
2013-10-17 17:40:50 -03:00
|
|
|
self._loop.remove_writer(self._sock_fd)
|
|
|
|
if self._closing:
|
|
|
|
self._call_connection_lost(None)
|
|
|
|
elif self._eof:
|
|
|
|
self._sock.shutdown(socket.SHUT_WR)
|
|
|
|
|
|
|
|
def write_eof(self):
|
|
|
|
if self._eof:
|
|
|
|
return
|
|
|
|
self._eof = True
|
|
|
|
if not self._buffer:
|
|
|
|
self._sock.shutdown(socket.SHUT_WR)
|
|
|
|
|
|
|
|
def can_write_eof(self):
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
|
|
class _SelectorSslTransport(_SelectorTransport):
|
|
|
|
|
2013-11-27 18:12:48 -04:00
|
|
|
_buffer_factory = bytearray
|
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
def __init__(self, loop, rawsock, protocol, sslcontext, waiter=None,
|
|
|
|
server_side=False, server_hostname=None,
|
|
|
|
extra=None, server=None):
|
2013-11-01 18:22:30 -03:00
|
|
|
if ssl is None:
|
|
|
|
raise RuntimeError('stdlib ssl module not available')
|
|
|
|
|
2015-01-13 19:19:09 -04:00
|
|
|
if not sslcontext:
|
|
|
|
sslcontext = sslproto._create_transport_context(server_side, server_hostname)
|
2013-11-01 18:22:30 -03:00
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
wrap_kwargs = {
|
|
|
|
'server_side': server_side,
|
|
|
|
'do_handshake_on_connect': False,
|
|
|
|
}
|
2014-11-23 19:04:34 -04:00
|
|
|
if server_hostname and not server_side:
|
2013-10-17 17:40:50 -03:00
|
|
|
wrap_kwargs['server_hostname'] = server_hostname
|
|
|
|
sslsock = sslcontext.wrap_socket(rawsock, **wrap_kwargs)
|
|
|
|
|
|
|
|
super().__init__(loop, sslsock, protocol, extra, server)
|
|
|
|
|
|
|
|
self._server_hostname = server_hostname
|
|
|
|
self._waiter = waiter
|
|
|
|
self._sslcontext = sslcontext
|
|
|
|
self._paused = False
|
|
|
|
|
|
|
|
# SSL-specific extra info. (peercert is set later)
|
|
|
|
self._extra.update(sslcontext=sslcontext)
|
|
|
|
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.debug("%r starts SSL handshake", self)
|
|
|
|
start_time = self._loop.time()
|
|
|
|
else:
|
|
|
|
start_time = None
|
|
|
|
self._on_handshake(start_time)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2014-07-11 22:11:53 -03:00
|
|
|
def _on_handshake(self, start_time):
|
2013-10-17 17:40:50 -03:00
|
|
|
try:
|
|
|
|
self._sock.do_handshake()
|
|
|
|
except ssl.SSLWantReadError:
|
2014-07-11 22:11:53 -03:00
|
|
|
self._loop.add_reader(self._sock_fd,
|
|
|
|
self._on_handshake, start_time)
|
2013-10-17 17:40:50 -03:00
|
|
|
return
|
|
|
|
except ssl.SSLWantWriteError:
|
2014-07-11 22:11:53 -03:00
|
|
|
self._loop.add_writer(self._sock_fd,
|
|
|
|
self._on_handshake, start_time)
|
2013-10-17 17:40:50 -03:00
|
|
|
return
|
|
|
|
except BaseException as exc:
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.warning("%r: SSL handshake failed",
|
|
|
|
self, exc_info=True)
|
2013-10-18 19:17:11 -03:00
|
|
|
self._loop.remove_reader(self._sock_fd)
|
|
|
|
self._loop.remove_writer(self._sock_fd)
|
2013-10-17 17:40:50 -03:00
|
|
|
self._sock.close()
|
2015-01-14 11:56:20 -04:00
|
|
|
if self._waiter is not None and not self._waiter.cancelled():
|
2013-10-17 17:40:50 -03:00
|
|
|
self._waiter.set_exception(exc)
|
2014-07-11 22:11:53 -03:00
|
|
|
if isinstance(exc, Exception):
|
|
|
|
return
|
|
|
|
else:
|
|
|
|
raise
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-10-18 19:17:11 -03:00
|
|
|
self._loop.remove_reader(self._sock_fd)
|
|
|
|
self._loop.remove_writer(self._sock_fd)
|
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
peercert = self._sock.getpeercert()
|
2013-12-05 19:23:13 -04:00
|
|
|
if not hasattr(self._sslcontext, 'check_hostname'):
|
|
|
|
# Verify hostname if requested, Python 3.4+ uses check_hostname
|
|
|
|
# and checks the hostname in do_handshake()
|
|
|
|
if (self._server_hostname and
|
|
|
|
self._sslcontext.verify_mode != ssl.CERT_NONE):
|
|
|
|
try:
|
|
|
|
ssl.match_hostname(peercert, self._server_hostname)
|
|
|
|
except Exception as exc:
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.warning("%r: SSL handshake failed "
|
|
|
|
"on matching the hostname",
|
|
|
|
self, exc_info=True)
|
2013-12-05 19:23:13 -04:00
|
|
|
self._sock.close()
|
2015-01-14 12:13:28 -04:00
|
|
|
if (self._waiter is not None
|
|
|
|
and not self._waiter.cancelled()):
|
2013-12-05 19:23:13 -04:00
|
|
|
self._waiter.set_exception(exc)
|
|
|
|
return
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
# Add extra info that becomes available after handshake.
|
|
|
|
self._extra.update(peercert=peercert,
|
|
|
|
cipher=self._sock.cipher(),
|
|
|
|
compression=self._sock.compression(),
|
|
|
|
)
|
|
|
|
|
2013-11-01 18:18:02 -03:00
|
|
|
self._read_wants_write = False
|
|
|
|
self._write_wants_read = False
|
|
|
|
self._loop.add_reader(self._sock_fd, self._read_ready)
|
2013-10-17 17:40:50 -03:00
|
|
|
self._loop.call_soon(self._protocol.connection_made, self)
|
|
|
|
if self._waiter is not None:
|
2014-07-08 18:57:31 -03:00
|
|
|
# wait until protocol.connection_made() has been called
|
2014-07-05 10:29:41 -03:00
|
|
|
self._loop.call_soon(self._waiter._set_result_unless_cancelled,
|
|
|
|
None)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
dt = self._loop.time() - start_time
|
|
|
|
logger.debug("%r: SSL handshake took %.1f ms", self, dt * 1e3)
|
|
|
|
|
2013-10-18 11:58:20 -03:00
|
|
|
def pause_reading(self):
|
2013-10-17 17:40:50 -03:00
|
|
|
# XXX This is a bit icky, given the comment at the top of
|
2013-11-01 18:18:02 -03:00
|
|
|
# _read_ready(). Is it possible to evoke a deadlock? I don't
|
2013-10-17 17:40:50 -03:00
|
|
|
# know, although it doesn't look like it; write() will still
|
|
|
|
# accept more data for the buffer and eventually the app will
|
2013-10-18 11:58:20 -03:00
|
|
|
# call resume_reading() again, and things will flow again.
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-11-27 18:12:48 -04:00
|
|
|
if self._closing:
|
|
|
|
raise RuntimeError('Cannot pause_reading() when closing')
|
|
|
|
if self._paused:
|
|
|
|
raise RuntimeError('Already paused')
|
2013-10-17 17:40:50 -03:00
|
|
|
self._paused = True
|
|
|
|
self._loop.remove_reader(self._sock_fd)
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.debug("%r pauses reading", self)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-10-18 11:58:20 -03:00
|
|
|
def resume_reading(self):
|
2013-11-27 18:12:48 -04:00
|
|
|
if not self._paused:
|
2014-05-27 15:24:43 -03:00
|
|
|
raise RuntimeError('Not paused')
|
2013-10-17 17:40:50 -03:00
|
|
|
self._paused = False
|
|
|
|
if self._closing:
|
|
|
|
return
|
2013-11-01 18:18:02 -03:00
|
|
|
self._loop.add_reader(self._sock_fd, self._read_ready)
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.debug("%r resumes reading", self)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-11-01 18:18:02 -03:00
|
|
|
def _read_ready(self):
|
|
|
|
if self._write_wants_read:
|
|
|
|
self._write_wants_read = False
|
|
|
|
self._write_ready()
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-11-01 18:18:02 -03:00
|
|
|
if self._buffer:
|
|
|
|
self._loop.add_writer(self._sock_fd, self._write_ready)
|
|
|
|
|
|
|
|
try:
|
|
|
|
data = self._sock.recv(self.max_size)
|
|
|
|
except (BlockingIOError, InterruptedError, ssl.SSLWantReadError):
|
|
|
|
pass
|
|
|
|
except ssl.SSLWantWriteError:
|
|
|
|
self._read_wants_write = True
|
|
|
|
self._loop.remove_reader(self._sock_fd)
|
|
|
|
self._loop.add_writer(self._sock_fd, self._write_ready)
|
|
|
|
except Exception as exc:
|
2014-02-18 20:40:41 -04:00
|
|
|
self._fatal_error(exc, 'Fatal read error on SSL transport')
|
2013-11-01 18:18:02 -03:00
|
|
|
else:
|
|
|
|
if data:
|
|
|
|
self._protocol.data_received(data)
|
2013-10-17 17:40:50 -03:00
|
|
|
else:
|
2013-11-01 18:18:02 -03:00
|
|
|
try:
|
2014-07-11 22:11:53 -03:00
|
|
|
if self._loop.get_debug():
|
|
|
|
logger.debug("%r received EOF", self)
|
2013-11-01 18:19:35 -03:00
|
|
|
keep_open = self._protocol.eof_received()
|
|
|
|
if keep_open:
|
|
|
|
logger.warning('returning true from eof_received() '
|
|
|
|
'has no effect when using ssl')
|
2013-11-01 18:18:02 -03:00
|
|
|
finally:
|
|
|
|
self.close()
|
|
|
|
|
|
|
|
def _write_ready(self):
|
|
|
|
if self._read_wants_write:
|
|
|
|
self._read_wants_write = False
|
|
|
|
self._read_ready()
|
|
|
|
|
|
|
|
if not (self._paused or self._closing):
|
|
|
|
self._loop.add_reader(self._sock_fd, self._read_ready)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
if self._buffer:
|
|
|
|
try:
|
2013-11-27 18:12:48 -04:00
|
|
|
n = self._sock.send(self._buffer)
|
2014-02-26 12:35:30 -04:00
|
|
|
except (BlockingIOError, InterruptedError, ssl.SSLWantWriteError):
|
2013-10-17 17:40:50 -03:00
|
|
|
n = 0
|
2013-11-01 18:18:02 -03:00
|
|
|
except ssl.SSLWantReadError:
|
|
|
|
n = 0
|
|
|
|
self._loop.remove_writer(self._sock_fd)
|
|
|
|
self._write_wants_read = True
|
2013-10-17 17:40:50 -03:00
|
|
|
except Exception as exc:
|
|
|
|
self._loop.remove_writer(self._sock_fd)
|
2013-11-27 18:12:48 -04:00
|
|
|
self._buffer.clear()
|
2014-02-18 20:40:41 -04:00
|
|
|
self._fatal_error(exc, 'Fatal write error on SSL transport')
|
2013-10-17 17:40:50 -03:00
|
|
|
return
|
|
|
|
|
2013-11-27 18:12:48 -04:00
|
|
|
if n:
|
|
|
|
del self._buffer[:n]
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-11-01 18:18:02 -03:00
|
|
|
self._maybe_resume_protocol() # May append to buffer.
|
2013-10-18 19:17:11 -03:00
|
|
|
|
2013-11-01 18:18:02 -03:00
|
|
|
if not self._buffer:
|
2013-10-17 17:40:50 -03:00
|
|
|
self._loop.remove_writer(self._sock_fd)
|
2013-11-01 18:18:02 -03:00
|
|
|
if self._closing:
|
|
|
|
self._call_connection_lost(None)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
def write(self, data):
|
2013-11-27 18:12:48 -04:00
|
|
|
if not isinstance(data, (bytes, bytearray, memoryview)):
|
|
|
|
raise TypeError('data argument must be byte-ish (%r)',
|
|
|
|
type(data))
|
2013-10-17 17:40:50 -03:00
|
|
|
if not data:
|
|
|
|
return
|
|
|
|
|
|
|
|
if self._conn_lost:
|
|
|
|
if self._conn_lost >= constants.LOG_THRESHOLD_FOR_CONNLOST_WRITES:
|
2013-10-17 19:39:45 -03:00
|
|
|
logger.warning('socket.send() raised exception.')
|
2013-10-17 17:40:50 -03:00
|
|
|
self._conn_lost += 1
|
|
|
|
return
|
|
|
|
|
2013-11-01 18:18:02 -03:00
|
|
|
if not self._buffer:
|
|
|
|
self._loop.add_writer(self._sock_fd, self._write_ready)
|
|
|
|
|
|
|
|
# Add it to the buffer.
|
2013-11-27 18:12:48 -04:00
|
|
|
self._buffer.extend(data)
|
2013-10-18 19:17:11 -03:00
|
|
|
self._maybe_pause_protocol()
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
def can_write_eof(self):
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
|
|
|
class _SelectorDatagramTransport(_SelectorTransport):
|
|
|
|
|
2013-11-27 18:12:48 -04:00
|
|
|
_buffer_factory = collections.deque
|
|
|
|
|
2014-07-08 18:57:31 -03:00
|
|
|
def __init__(self, loop, sock, protocol, address=None,
|
|
|
|
waiter=None, extra=None):
|
2013-10-17 17:40:50 -03:00
|
|
|
super().__init__(loop, sock, protocol, extra)
|
|
|
|
self._address = address
|
|
|
|
self._loop.add_reader(self._sock_fd, self._read_ready)
|
|
|
|
self._loop.call_soon(self._protocol.connection_made, self)
|
2014-07-08 18:57:31 -03:00
|
|
|
if waiter is not None:
|
|
|
|
# wait until protocol.connection_made() has been called
|
|
|
|
self._loop.call_soon(waiter._set_result_unless_cancelled, None)
|
2013-10-17 17:40:50 -03:00
|
|
|
|
2013-10-18 19:17:11 -03:00
|
|
|
def get_write_buffer_size(self):
|
|
|
|
return sum(len(data) for data, _ in self._buffer)
|
|
|
|
|
2013-10-17 17:40:50 -03:00
|
|
|
def _read_ready(self):
|
|
|
|
try:
|
|
|
|
data, addr = self._sock.recvfrom(self.max_size)
|
|
|
|
except (BlockingIOError, InterruptedError):
|
|
|
|
pass
|
2013-11-15 20:51:48 -04:00
|
|
|
except OSError as exc:
|
|
|
|
self._protocol.error_received(exc)
|
2013-10-17 17:40:50 -03:00
|
|
|
except Exception as exc:
|
2014-02-18 20:40:41 -04:00
|
|
|
self._fatal_error(exc, 'Fatal read error on datagram transport')
|
2013-10-17 17:40:50 -03:00
|
|
|
else:
|
|
|
|
self._protocol.datagram_received(data, addr)
|
|
|
|
|
|
|
|
def sendto(self, data, addr=None):
|
2013-11-27 18:12:48 -04:00
|
|
|
if not isinstance(data, (bytes, bytearray, memoryview)):
|
|
|
|
raise TypeError('data argument must be byte-ish (%r)',
|
|
|
|
type(data))
|
2013-10-17 17:40:50 -03:00
|
|
|
if not data:
|
|
|
|
return
|
|
|
|
|
2013-11-27 18:12:48 -04:00
|
|
|
if self._address and addr not in (None, self._address):
|
|
|
|
raise ValueError('Invalid address: must be None or %s' %
|
|
|
|
(self._address,))
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
if self._conn_lost and self._address:
|
|
|
|
if self._conn_lost >= constants.LOG_THRESHOLD_FOR_CONNLOST_WRITES:
|
2013-10-17 19:39:45 -03:00
|
|
|
logger.warning('socket.send() raised exception.')
|
2013-10-17 17:40:50 -03:00
|
|
|
self._conn_lost += 1
|
|
|
|
return
|
|
|
|
|
|
|
|
if not self._buffer:
|
|
|
|
# Attempt to send it right away first.
|
|
|
|
try:
|
|
|
|
if self._address:
|
|
|
|
self._sock.send(data)
|
|
|
|
else:
|
|
|
|
self._sock.sendto(data, addr)
|
|
|
|
return
|
2013-10-18 14:10:36 -03:00
|
|
|
except (BlockingIOError, InterruptedError):
|
|
|
|
self._loop.add_writer(self._sock_fd, self._sendto_ready)
|
2013-11-15 20:51:48 -04:00
|
|
|
except OSError as exc:
|
|
|
|
self._protocol.error_received(exc)
|
2013-10-17 17:40:50 -03:00
|
|
|
return
|
|
|
|
except Exception as exc:
|
2014-02-18 20:40:41 -04:00
|
|
|
self._fatal_error(exc,
|
|
|
|
'Fatal write error on datagram transport')
|
2013-10-17 17:40:50 -03:00
|
|
|
return
|
|
|
|
|
2013-11-27 18:12:48 -04:00
|
|
|
# Ensure that what we buffer is immutable.
|
|
|
|
self._buffer.append((bytes(data), addr))
|
2013-10-18 19:17:11 -03:00
|
|
|
self._maybe_pause_protocol()
|
2013-10-17 17:40:50 -03:00
|
|
|
|
|
|
|
def _sendto_ready(self):
|
|
|
|
while self._buffer:
|
|
|
|
data, addr = self._buffer.popleft()
|
|
|
|
try:
|
|
|
|
if self._address:
|
|
|
|
self._sock.send(data)
|
|
|
|
else:
|
|
|
|
self._sock.sendto(data, addr)
|
2013-10-18 14:10:36 -03:00
|
|
|
except (BlockingIOError, InterruptedError):
|
|
|
|
self._buffer.appendleft((data, addr)) # Try again later.
|
|
|
|
break
|
2013-11-15 20:51:48 -04:00
|
|
|
except OSError as exc:
|
|
|
|
self._protocol.error_received(exc)
|
2013-10-17 17:40:50 -03:00
|
|
|
return
|
|
|
|
except Exception as exc:
|
2014-02-18 20:40:41 -04:00
|
|
|
self._fatal_error(exc,
|
|
|
|
'Fatal write error on datagram transport')
|
2013-10-17 17:40:50 -03:00
|
|
|
return
|
|
|
|
|
2013-10-18 19:17:11 -03:00
|
|
|
self._maybe_resume_protocol() # May append to buffer.
|
2013-10-17 17:40:50 -03:00
|
|
|
if not self._buffer:
|
|
|
|
self._loop.remove_writer(self._sock_fd)
|
|
|
|
if self._closing:
|
|
|
|
self._call_connection_lost(None)
|