2013-01-25 02:54:41 +00:00
|
|
|
import select, socket, threading, sys, time, traceback
|
2012-06-18 21:42:32 +00:00
|
|
|
from OpenSSL import SSL
|
2012-06-27 20:15:55 +00:00
|
|
|
import certutils
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2012-07-04 09:30:07 +00:00
|
|
|
SSLv2_METHOD = SSL.SSLv2_METHOD
|
|
|
|
SSLv3_METHOD = SSL.SSLv3_METHOD
|
|
|
|
SSLv23_METHOD = SSL.SSLv23_METHOD
|
|
|
|
TLSv1_METHOD = SSL.TLSv1_METHOD
|
|
|
|
|
|
|
|
OP_ALL = SSL.OP_ALL
|
|
|
|
OP_CIPHER_SERVER_PREFERENCE = SSL.OP_CIPHER_SERVER_PREFERENCE
|
|
|
|
OP_COOKIE_EXCHANGE = SSL.OP_COOKIE_EXCHANGE
|
|
|
|
OP_DONT_INSERT_EMPTY_FRAGMENTS = SSL.OP_DONT_INSERT_EMPTY_FRAGMENTS
|
|
|
|
OP_EPHEMERAL_RSA = SSL.OP_EPHEMERAL_RSA
|
|
|
|
OP_MICROSOFT_BIG_SSLV3_BUFFER = SSL.OP_MICROSOFT_BIG_SSLV3_BUFFER
|
|
|
|
OP_MICROSOFT_SESS_ID_BUG = SSL.OP_MICROSOFT_SESS_ID_BUG
|
|
|
|
OP_MSIE_SSLV2_RSA_PADDING = SSL.OP_MSIE_SSLV2_RSA_PADDING
|
|
|
|
OP_NETSCAPE_CA_DN_BUG = SSL.OP_NETSCAPE_CA_DN_BUG
|
|
|
|
OP_NETSCAPE_CHALLENGE_BUG = SSL.OP_NETSCAPE_CHALLENGE_BUG
|
|
|
|
OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG = SSL.OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG
|
|
|
|
OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG = SSL.OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
|
|
|
|
OP_NO_QUERY_MTU = SSL.OP_NO_QUERY_MTU
|
|
|
|
OP_NO_SSLv2 = SSL.OP_NO_SSLv2
|
|
|
|
OP_NO_SSLv3 = SSL.OP_NO_SSLv3
|
|
|
|
OP_NO_TICKET = SSL.OP_NO_TICKET
|
|
|
|
OP_NO_TLSv1 = SSL.OP_NO_TLSv1
|
|
|
|
OP_PKCS1_CHECK_1 = SSL.OP_PKCS1_CHECK_1
|
|
|
|
OP_PKCS1_CHECK_2 = SSL.OP_PKCS1_CHECK_2
|
|
|
|
OP_SINGLE_DH_USE = SSL.OP_SINGLE_DH_USE
|
|
|
|
OP_SSLEAY_080_CLIENT_DH_BUG = SSL.OP_SSLEAY_080_CLIENT_DH_BUG
|
|
|
|
OP_SSLREF2_REUSE_CERT_TYPE_BUG = SSL.OP_SSLREF2_REUSE_CERT_TYPE_BUG
|
|
|
|
OP_TLS_BLOCK_PADDING_BUG = SSL.OP_TLS_BLOCK_PADDING_BUG
|
|
|
|
OP_TLS_D5_BUG = SSL.OP_TLS_D5_BUG
|
|
|
|
OP_TLS_ROLLBACK_BUG = SSL.OP_TLS_ROLLBACK_BUG
|
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
|
|
|
|
class NetLibError(Exception): pass
|
2013-05-05 01:49:20 +00:00
|
|
|
class NetLibDisconnect(NetLibError): pass
|
|
|
|
class NetLibTimeout(NetLibError): pass
|
2012-07-08 11:50:38 +00:00
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2012-09-23 23:10:21 +00:00
|
|
|
class _FileLike:
|
2012-07-23 23:39:49 +00:00
|
|
|
BLOCKSIZE = 1024 * 32
|
2012-06-18 21:42:32 +00:00
|
|
|
def __init__(self, o):
|
|
|
|
self.o = o
|
2012-09-23 23:10:21 +00:00
|
|
|
self._log = None
|
2013-01-16 20:30:19 +00:00
|
|
|
self.first_byte_timestamp = None
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2012-09-23 22:47:41 +00:00
|
|
|
def set_descriptor(self, o):
|
|
|
|
self.o = o
|
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
def __getattr__(self, attr):
|
|
|
|
return getattr(self.o, attr)
|
|
|
|
|
2012-09-23 23:10:21 +00:00
|
|
|
def start_log(self):
|
|
|
|
"""
|
|
|
|
Starts or resets the log.
|
|
|
|
|
|
|
|
This will store all bytes read or written.
|
|
|
|
"""
|
|
|
|
self._log = []
|
|
|
|
|
|
|
|
def stop_log(self):
|
|
|
|
"""
|
|
|
|
Stops the log.
|
|
|
|
"""
|
|
|
|
self._log = None
|
|
|
|
|
|
|
|
def is_logging(self):
|
|
|
|
return self._log is not None
|
|
|
|
|
|
|
|
def get_log(self):
|
|
|
|
"""
|
|
|
|
Returns the log as a string.
|
|
|
|
"""
|
|
|
|
if not self.is_logging():
|
|
|
|
raise ValueError("Not logging!")
|
|
|
|
return "".join(self._log)
|
|
|
|
|
|
|
|
def add_log(self, v):
|
|
|
|
if self.is_logging():
|
|
|
|
self._log.append(v)
|
|
|
|
|
2013-01-16 20:30:19 +00:00
|
|
|
def reset_timestamps(self):
|
|
|
|
self.first_byte_timestamp = None
|
2012-09-23 23:10:21 +00:00
|
|
|
|
2013-01-25 02:54:41 +00:00
|
|
|
|
2012-09-23 23:10:21 +00:00
|
|
|
class Writer(_FileLike):
|
2012-06-18 21:42:32 +00:00
|
|
|
def flush(self):
|
2013-01-26 08:19:35 +00:00
|
|
|
"""
|
|
|
|
May raise NetLibDisconnect
|
|
|
|
"""
|
2013-01-25 02:54:41 +00:00
|
|
|
if hasattr(self.o, "flush"):
|
|
|
|
try:
|
2012-07-29 23:30:31 +00:00
|
|
|
self.o.flush()
|
2013-07-29 21:42:13 +00:00
|
|
|
except (socket.error, IOError), v:
|
2013-01-25 02:54:41 +00:00
|
|
|
raise NetLibDisconnect(str(v))
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2012-09-23 23:10:21 +00:00
|
|
|
def write(self, v):
|
2013-01-26 08:19:35 +00:00
|
|
|
"""
|
|
|
|
May raise NetLibDisconnect
|
|
|
|
"""
|
2012-09-23 23:10:21 +00:00
|
|
|
if v:
|
|
|
|
try:
|
|
|
|
if hasattr(self.o, "sendall"):
|
|
|
|
self.add_log(v)
|
|
|
|
return self.o.sendall(v)
|
|
|
|
else:
|
|
|
|
r = self.o.write(v)
|
|
|
|
self.add_log(v[:r])
|
|
|
|
return r
|
2012-10-13 20:03:23 +00:00
|
|
|
except (SSL.Error, socket.error), v:
|
|
|
|
raise NetLibDisconnect(str(v))
|
2012-09-23 23:10:21 +00:00
|
|
|
|
|
|
|
|
|
|
|
class Reader(_FileLike):
|
2012-06-18 21:42:32 +00:00
|
|
|
def read(self, length):
|
2012-07-23 23:39:49 +00:00
|
|
|
"""
|
2012-10-09 03:25:15 +00:00
|
|
|
If length is -1, we read until connection closes.
|
2012-07-23 23:39:49 +00:00
|
|
|
"""
|
2012-06-18 21:42:32 +00:00
|
|
|
result = ''
|
2012-07-21 04:10:54 +00:00
|
|
|
start = time.time()
|
2012-07-23 23:39:49 +00:00
|
|
|
while length == -1 or length > 0:
|
2012-10-09 03:25:15 +00:00
|
|
|
if length == -1 or length > self.BLOCKSIZE:
|
|
|
|
rlen = self.BLOCKSIZE
|
|
|
|
else:
|
|
|
|
rlen = length
|
2012-06-18 21:42:32 +00:00
|
|
|
try:
|
2012-10-09 03:25:15 +00:00
|
|
|
data = self.o.read(rlen)
|
2012-07-21 08:51:05 +00:00
|
|
|
except SSL.ZeroReturnError:
|
2012-06-18 21:42:32 +00:00
|
|
|
break
|
2012-07-21 04:10:54 +00:00
|
|
|
except SSL.WantReadError:
|
|
|
|
if (time.time() - start) < self.o.gettimeout():
|
|
|
|
time.sleep(0.1)
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
raise NetLibTimeout
|
|
|
|
except socket.timeout:
|
|
|
|
raise NetLibTimeout
|
2012-07-21 05:50:21 +00:00
|
|
|
except socket.error:
|
|
|
|
raise NetLibDisconnect
|
2013-02-23 22:08:43 +00:00
|
|
|
except SSL.SysCallError:
|
2012-07-21 08:51:05 +00:00
|
|
|
raise NetLibDisconnect
|
2013-01-16 20:30:19 +00:00
|
|
|
self.first_byte_timestamp = self.first_byte_timestamp or time.time()
|
2012-06-18 21:42:32 +00:00
|
|
|
if not data:
|
|
|
|
break
|
|
|
|
result += data
|
2012-07-23 23:39:49 +00:00
|
|
|
if length != -1:
|
|
|
|
length -= len(data)
|
2012-09-23 23:10:21 +00:00
|
|
|
self.add_log(result)
|
2012-06-18 21:42:32 +00:00
|
|
|
return result
|
|
|
|
|
|
|
|
def readline(self, size = None):
|
|
|
|
result = ''
|
|
|
|
bytes_read = 0
|
|
|
|
while True:
|
|
|
|
if size is not None and bytes_read >= size:
|
|
|
|
break
|
2012-07-21 08:51:05 +00:00
|
|
|
try:
|
|
|
|
ch = self.read(1)
|
|
|
|
except NetLibDisconnect:
|
|
|
|
break
|
2012-06-18 21:42:32 +00:00
|
|
|
bytes_read += 1
|
|
|
|
if not ch:
|
|
|
|
break
|
|
|
|
else:
|
|
|
|
result += ch
|
|
|
|
if ch == '\n':
|
|
|
|
break
|
|
|
|
return result
|
|
|
|
|
|
|
|
|
|
|
|
class TCPClient:
|
2012-06-29 22:52:28 +00:00
|
|
|
rbufsize = -1
|
|
|
|
wbufsize = -1
|
2013-07-07 05:33:56 +00:00
|
|
|
def __init__(self, host, port, source_address=None):
|
2012-06-25 02:42:15 +00:00
|
|
|
self.host, self.port = host, port
|
2012-06-18 21:42:32 +00:00
|
|
|
self.connection, self.rfile, self.wfile = None, None, None
|
|
|
|
self.cert = None
|
2012-06-26 11:52:35 +00:00
|
|
|
self.ssl_established = False
|
2013-07-07 05:33:56 +00:00
|
|
|
self.source_address = source_address
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2013-02-24 02:36:15 +00:00
|
|
|
def convert_to_ssl(self, cert=None, sni=None, method=TLSv1_METHOD, options=None):
|
2013-01-20 09:13:38 +00:00
|
|
|
"""
|
2013-02-24 02:36:15 +00:00
|
|
|
cert: Path to a file containing both client cert and private key.
|
2013-01-20 09:13:38 +00:00
|
|
|
"""
|
2012-07-04 09:30:07 +00:00
|
|
|
context = SSL.Context(method)
|
2013-01-20 09:36:54 +00:00
|
|
|
if options is not None:
|
2013-01-26 08:29:45 +00:00
|
|
|
context.set_options(options)
|
2013-02-24 02:36:15 +00:00
|
|
|
if cert:
|
2013-01-20 09:36:54 +00:00
|
|
|
try:
|
2013-02-24 02:36:15 +00:00
|
|
|
context.use_privatekey_file(cert)
|
|
|
|
context.use_certificate_file(cert)
|
2013-01-20 09:36:54 +00:00
|
|
|
except SSL.Error, v:
|
|
|
|
raise NetLibError("SSL client certificate error: %s"%str(v))
|
2012-06-25 02:42:15 +00:00
|
|
|
self.connection = SSL.Connection(context, self.connection)
|
2012-07-20 03:15:07 +00:00
|
|
|
self.ssl_established = True
|
2012-06-25 21:50:42 +00:00
|
|
|
if sni:
|
|
|
|
self.connection.set_tlsext_host_name(sni)
|
2012-06-25 02:42:15 +00:00
|
|
|
self.connection.set_connect_state()
|
2012-06-26 02:49:23 +00:00
|
|
|
try:
|
|
|
|
self.connection.do_handshake()
|
|
|
|
except SSL.Error, v:
|
|
|
|
raise NetLibError("SSL handshake error: %s"%str(v))
|
2012-06-27 22:59:03 +00:00
|
|
|
self.cert = certutils.SSLCert(self.connection.get_peer_certificate())
|
2012-09-23 22:47:41 +00:00
|
|
|
self.rfile.set_descriptor(self.connection)
|
|
|
|
self.wfile.set_descriptor(self.connection)
|
2012-06-25 02:42:15 +00:00
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
def connect(self):
|
|
|
|
try:
|
|
|
|
addr = socket.gethostbyname(self.host)
|
2012-06-25 02:42:15 +00:00
|
|
|
connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
2013-07-07 05:33:56 +00:00
|
|
|
if self.source_address:
|
|
|
|
connection.bind(self.source_address)
|
2012-06-25 02:42:15 +00:00
|
|
|
connection.connect((addr, self.port))
|
2012-09-23 23:10:21 +00:00
|
|
|
self.rfile = Reader(connection.makefile('rb', self.rbufsize))
|
|
|
|
self.wfile = Writer(connection.makefile('wb', self.wbufsize))
|
2013-07-29 21:42:13 +00:00
|
|
|
except (socket.error, IOError), err:
|
2012-06-18 21:42:32 +00:00
|
|
|
raise NetLibError('Error connecting to "%s": %s' % (self.host, err))
|
2012-06-25 02:42:15 +00:00
|
|
|
self.connection = connection
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2012-07-21 04:10:54 +00:00
|
|
|
def settimeout(self, n):
|
|
|
|
self.connection.settimeout(n)
|
|
|
|
|
|
|
|
def gettimeout(self):
|
2013-01-26 08:29:45 +00:00
|
|
|
return self.connection.gettimeout()
|
2012-07-21 04:10:54 +00:00
|
|
|
|
2012-07-20 02:43:51 +00:00
|
|
|
def close(self):
|
|
|
|
"""
|
|
|
|
Does a hard close of the socket, i.e. a shutdown, followed by a close.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
if self.ssl_established:
|
|
|
|
self.connection.shutdown()
|
|
|
|
else:
|
2013-06-17 15:03:17 +00:00
|
|
|
self.connection.shutdown(socket.SHUT_WR)
|
|
|
|
#Section 4.2.2.13 of RFC 1122 tells us that a close() with any pending readable data could lead to an immediate RST being sent.
|
|
|
|
#http://ia600609.us.archive.org/22/items/TheUltimateSo_lingerPageOrWhyIsMyTcpNotReliable/the-ultimate-so_linger-page-or-why-is-my-tcp-not-reliable.html
|
|
|
|
while self.connection.recv(4096):
|
|
|
|
pass
|
2013-07-29 21:42:13 +00:00
|
|
|
self.connection.close()
|
|
|
|
except (socket.error, SSL.Error, IOError):
|
2012-07-20 02:43:51 +00:00
|
|
|
# Socket probably already closed
|
|
|
|
pass
|
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
|
|
|
|
class BaseHandler:
|
2012-06-24 23:23:04 +00:00
|
|
|
"""
|
|
|
|
The instantiator is expected to call the handle() and finish() methods.
|
2013-07-29 21:42:13 +00:00
|
|
|
|
2012-06-24 23:23:04 +00:00
|
|
|
"""
|
2012-06-18 21:42:32 +00:00
|
|
|
rbufsize = -1
|
2012-06-26 02:49:23 +00:00
|
|
|
wbufsize = -1
|
2012-06-18 21:42:32 +00:00
|
|
|
def __init__(self, connection, client_address, server):
|
|
|
|
self.connection = connection
|
2012-09-23 23:10:21 +00:00
|
|
|
self.rfile = Reader(self.connection.makefile('rb', self.rbufsize))
|
|
|
|
self.wfile = Writer(self.connection.makefile('wb', self.wbufsize))
|
2012-06-18 21:42:32 +00:00
|
|
|
|
|
|
|
self.client_address = client_address
|
|
|
|
self.server = server
|
2012-06-24 23:34:10 +00:00
|
|
|
self.finished = False
|
2012-06-26 11:52:35 +00:00
|
|
|
self.ssl_established = False
|
2013-05-12 20:48:21 +00:00
|
|
|
|
2013-01-20 09:13:38 +00:00
|
|
|
self.clientcert = None
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2013-05-12 20:48:21 +00:00
|
|
|
def convert_to_ssl(self, cert, key, method=SSLv23_METHOD, options=None, handle_sni=None, request_client_cert=False):
|
2012-07-04 09:30:07 +00:00
|
|
|
"""
|
|
|
|
method: One of SSLv2_METHOD, SSLv3_METHOD, SSLv23_METHOD, or TLSv1_METHOD
|
2013-02-25 08:11:09 +00:00
|
|
|
handle_sni: SNI handler, should take a connection object. Server
|
|
|
|
name can be retrieved like this:
|
|
|
|
|
|
|
|
connection.get_servername()
|
|
|
|
|
|
|
|
And you can specify the connection keys as follows:
|
|
|
|
|
|
|
|
new_context = Context(TLSv1_METHOD)
|
|
|
|
new_context.use_privatekey(key)
|
|
|
|
new_context.use_certificate(cert)
|
|
|
|
connection.set_context(new_context)
|
2013-05-12 20:48:21 +00:00
|
|
|
|
|
|
|
The request_client_cert argument requires some explanation. We're
|
|
|
|
supposed to be able to do this with no negative effects - if the
|
|
|
|
client has no cert to present, we're notified and proceed as usual.
|
|
|
|
Unfortunately, Android seems to have a bug (tested on 4.2.2) - when
|
|
|
|
an Android client is asked to present a certificate it does not
|
|
|
|
have, it hangs up, which is frankly bogus. Some time down the track
|
|
|
|
we may be able to make the proper behaviour the default again, but
|
|
|
|
until then we're conservative.
|
2012-07-04 09:30:07 +00:00
|
|
|
"""
|
|
|
|
ctx = SSL.Context(method)
|
|
|
|
if not options is None:
|
|
|
|
ctx.set_options(options)
|
2013-02-25 08:11:09 +00:00
|
|
|
if handle_sni:
|
|
|
|
# SNI callback happens during do_handshake()
|
|
|
|
ctx.set_tlsext_servername_callback(handle_sni)
|
2012-06-18 21:42:32 +00:00
|
|
|
ctx.use_privatekey_file(key)
|
|
|
|
ctx.use_certificate_file(cert)
|
2013-05-12 20:48:21 +00:00
|
|
|
if request_client_cert:
|
|
|
|
def ver(*args):
|
|
|
|
self.clientcert = certutils.SSLCert(args[1])
|
|
|
|
ctx.set_verify(SSL.VERIFY_PEER, ver)
|
2012-06-18 21:42:32 +00:00
|
|
|
self.connection = SSL.Connection(ctx, self.connection)
|
2012-07-20 03:15:07 +00:00
|
|
|
self.ssl_established = True
|
2012-06-18 21:42:32 +00:00
|
|
|
self.connection.set_accept_state()
|
2012-06-26 02:49:23 +00:00
|
|
|
try:
|
|
|
|
self.connection.do_handshake()
|
|
|
|
except SSL.Error, v:
|
|
|
|
raise NetLibError("SSL handshake error: %s"%str(v))
|
2012-09-23 22:47:41 +00:00
|
|
|
self.rfile.set_descriptor(self.connection)
|
|
|
|
self.wfile.set_descriptor(self.connection)
|
2012-06-18 21:42:32 +00:00
|
|
|
|
|
|
|
def finish(self):
|
2012-06-24 23:34:10 +00:00
|
|
|
self.finished = True
|
2012-07-08 11:50:38 +00:00
|
|
|
try:
|
|
|
|
if not getattr(self.wfile, "closed", False):
|
|
|
|
self.wfile.flush()
|
2012-07-23 11:20:32 +00:00
|
|
|
self.close()
|
2012-07-08 11:50:38 +00:00
|
|
|
self.wfile.close()
|
|
|
|
self.rfile.close()
|
2013-03-02 23:16:09 +00:00
|
|
|
except (socket.error, NetLibDisconnect):
|
2012-07-08 11:50:38 +00:00
|
|
|
# Remote has disconnected
|
|
|
|
pass
|
2012-06-18 21:42:32 +00:00
|
|
|
|
|
|
|
def handle(self): # pragma: no cover
|
|
|
|
raise NotImplementedError
|
|
|
|
|
2012-09-30 22:30:02 +00:00
|
|
|
def settimeout(self, n):
|
|
|
|
self.connection.settimeout(n)
|
|
|
|
|
2012-07-20 02:43:51 +00:00
|
|
|
def close(self):
|
|
|
|
"""
|
|
|
|
Does a hard close of the socket, i.e. a shutdown, followed by a close.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
if self.ssl_established:
|
|
|
|
self.connection.shutdown()
|
|
|
|
else:
|
2013-06-17 15:03:17 +00:00
|
|
|
self.connection.shutdown(socket.SHUT_WR)
|
|
|
|
#Section 4.2.2.13 of RFC 1122 tells us that a close() with any pending readable data could lead to an immediate RST being sent.
|
|
|
|
#http://ia600609.us.archive.org/22/items/TheUltimateSo_lingerPageOrWhyIsMyTcpNotReliable/the-ultimate-so_linger-page-or-why-is-my-tcp-not-reliable.html
|
|
|
|
while self.connection.recv(4096):
|
|
|
|
pass
|
2013-02-23 22:08:43 +00:00
|
|
|
except (socket.error, SSL.Error):
|
2012-07-20 02:43:51 +00:00
|
|
|
# Socket probably already closed
|
|
|
|
pass
|
2013-06-17 15:03:17 +00:00
|
|
|
|
2012-07-23 11:20:32 +00:00
|
|
|
self.connection.close()
|
2012-07-20 02:43:51 +00:00
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
|
|
|
|
class TCPServer:
|
|
|
|
request_queue_size = 20
|
|
|
|
def __init__(self, server_address):
|
|
|
|
self.server_address = server_address
|
|
|
|
self.__is_shut_down = threading.Event()
|
|
|
|
self.__shutdown_request = False
|
|
|
|
self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
self.socket.bind(self.server_address)
|
|
|
|
self.server_address = self.socket.getsockname()
|
2012-06-27 04:24:22 +00:00
|
|
|
self.port = self.server_address[1]
|
2012-06-18 21:42:32 +00:00
|
|
|
self.socket.listen(self.request_queue_size)
|
|
|
|
|
|
|
|
def request_thread(self, request, client_address):
|
|
|
|
try:
|
|
|
|
self.handle_connection(request, client_address)
|
|
|
|
request.close()
|
|
|
|
except:
|
2012-07-10 04:22:45 +00:00
|
|
|
self.handle_error(request, client_address)
|
|
|
|
request.close()
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2012-06-19 23:01:40 +00:00
|
|
|
def serve_forever(self, poll_interval=0.1):
|
2012-06-18 21:42:32 +00:00
|
|
|
self.__is_shut_down.clear()
|
|
|
|
try:
|
|
|
|
while not self.__shutdown_request:
|
|
|
|
r, w, e = select.select([self.socket], [], [], poll_interval)
|
|
|
|
if self.socket in r:
|
2013-01-27 06:21:18 +00:00
|
|
|
request, client_address = self.socket.accept()
|
|
|
|
t = threading.Thread(
|
|
|
|
target = self.request_thread,
|
|
|
|
args = (request, client_address)
|
|
|
|
)
|
|
|
|
t.setDaemon(1)
|
|
|
|
t.start()
|
2012-06-18 21:42:32 +00:00
|
|
|
finally:
|
|
|
|
self.__shutdown_request = False
|
|
|
|
self.__is_shut_down.set()
|
|
|
|
|
|
|
|
def shutdown(self):
|
|
|
|
self.__shutdown_request = True
|
|
|
|
self.__is_shut_down.wait()
|
2012-06-19 22:51:02 +00:00
|
|
|
self.socket.close()
|
2012-06-18 21:42:32 +00:00
|
|
|
self.handle_shutdown()
|
|
|
|
|
|
|
|
def handle_error(self, request, client_address, fp=sys.stderr):
|
|
|
|
"""
|
|
|
|
Called when handle_connection raises an exception.
|
|
|
|
"""
|
2012-07-10 04:22:45 +00:00
|
|
|
# If a thread has persisted after interpreter exit, the module might be
|
2012-07-20 02:43:51 +00:00
|
|
|
# none.
|
2012-07-10 04:22:45 +00:00
|
|
|
if traceback:
|
|
|
|
exc = traceback.format_exc()
|
|
|
|
print >> fp, '-'*40
|
|
|
|
print >> fp, "Error in processing of request from %s:%s"%client_address
|
|
|
|
print >> fp, exc
|
|
|
|
print >> fp, '-'*40
|
2012-06-18 21:42:32 +00:00
|
|
|
|
|
|
|
def handle_connection(self, request, client_address): # pragma: no cover
|
|
|
|
"""
|
|
|
|
Called after client connection.
|
|
|
|
"""
|
|
|
|
raise NotImplementedError
|
|
|
|
|
|
|
|
def handle_shutdown(self):
|
|
|
|
"""
|
|
|
|
Called after server shutdown.
|
|
|
|
"""
|
|
|
|
pass
|