252 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			252 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * tcp client demo
 | 
						|
 *
 | 
						|
 * @build   make examples
 | 
						|
 * @server  bin/tcp_echo_server 1234
 | 
						|
 * @client  bin/tcp_client_test 127.0.0.1 1234
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
#include "hloop.h"
 | 
						|
#include "hssl.h"
 | 
						|
#include "hmutex.h"
 | 
						|
 | 
						|
#include "hbase.h"
 | 
						|
#include "herr.h"
 | 
						|
 | 
						|
#define TEST_SSL        0
 | 
						|
#define TEST_UNPACK     0
 | 
						|
#define TEST_RECONNECT  1
 | 
						|
 | 
						|
// @see mqtt/mqtt_client.h
 | 
						|
typedef struct tcp_client_s {
 | 
						|
    // connect: host:port
 | 
						|
    char host[256];
 | 
						|
    int  port;
 | 
						|
    int  connect_timeout; // ms
 | 
						|
    // reconnect
 | 
						|
    reconn_setting_t* reconn_setting;
 | 
						|
    // flags
 | 
						|
    unsigned char   ssl: 1; // Read Only
 | 
						|
    unsigned char   alloced_ssl_ctx: 1; // intern
 | 
						|
    unsigned char   connected : 1;
 | 
						|
    // privdata
 | 
						|
    hloop_t*    loop;
 | 
						|
    hio_t*      io;
 | 
						|
    htimer_t*   reconn_timer;
 | 
						|
    // SSL/TLS
 | 
						|
    hssl_ctx_t  ssl_ctx;
 | 
						|
    // thread-safe
 | 
						|
    hmutex_t    mutex_;
 | 
						|
    // ...
 | 
						|
} tcp_client_t;
 | 
						|
 | 
						|
static tcp_client_t* tcp_client_new(hloop_t* loop DEFAULT(NULL));
 | 
						|
static void          tcp_client_run (tcp_client_t* cli);
 | 
						|
static void          tcp_client_stop(tcp_client_t* cli);
 | 
						|
static void          tcp_client_free(tcp_client_t* cli);
 | 
						|
 | 
						|
// SSL/TLS
 | 
						|
static int tcp_client_set_ssl_ctx(tcp_client_t* cli, hssl_ctx_t ssl_ctx);
 | 
						|
static int tcp_client_new_ssl_ctx(tcp_client_t* cli, hssl_ctx_opt_t* opt);
 | 
						|
 | 
						|
// reconnect
 | 
						|
static int tcp_client_set_reconnect(tcp_client_t* cli, reconn_setting_t* reconn);
 | 
						|
static int tcp_client_reconnect(tcp_client_t* cli);
 | 
						|
 | 
						|
static void tcp_client_set_connnect_timeout(tcp_client_t* cli, int timeout_ms);
 | 
						|
static int  tcp_client_connect(tcp_client_t* cli, const char* host, int port, int ssl);
 | 
						|
static int  tcp_client_disconnect(tcp_client_t* cli);
 | 
						|
static bool tcp_client_is_connected(tcp_client_t* cli);
 | 
						|
 | 
						|
static int  tcp_client_send(tcp_client_t* cli, const void* buf, int len);
 | 
						|
 | 
						|
static void reconnect_timer_cb(htimer_t* timer) {
 | 
						|
    tcp_client_t* cli = (tcp_client_t*)hevent_userdata(timer);
 | 
						|
    if (cli == NULL) return;
 | 
						|
    cli->reconn_timer = NULL;
 | 
						|
    tcp_client_reconnect(cli);
 | 
						|
}
 | 
						|
 | 
						|
static void on_close(hio_t* io) {
 | 
						|
    printf("onclose: connfd=%d error=%d\n", hio_fd(io), hio_error(io));
 | 
						|
    tcp_client_t* cli = (tcp_client_t*)hevent_userdata(io);
 | 
						|
    cli->connected = 0;
 | 
						|
    // reconnect
 | 
						|
    if (cli->reconn_setting && reconn_setting_can_retry(cli->reconn_setting)) {
 | 
						|
        uint32_t delay = reconn_setting_calc_delay(cli->reconn_setting);
 | 
						|
        printf("reconnect cnt=%d, delay=%d ...\n", cli->reconn_setting->cur_retry_cnt, cli->reconn_setting->cur_delay);
 | 
						|
        cli->reconn_timer = htimer_add(cli->loop, reconnect_timer_cb, delay, 1);
 | 
						|
        hevent_set_userdata(cli->reconn_timer, cli);
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
static void on_message(hio_t* io, void* buf, int len) {
 | 
						|
    printf("onmessage: %.*s\n", len, (char*)buf);
 | 
						|
    tcp_client_t* cli = (tcp_client_t*)hevent_userdata(io);
 | 
						|
    // ...
 | 
						|
}
 | 
						|
 | 
						|
static void on_connect(hio_t* io) {
 | 
						|
    printf("onconnect: connfd=%d\n", hio_fd(io));
 | 
						|
    tcp_client_t* cli = (tcp_client_t*)hevent_userdata(io);
 | 
						|
    cli->connected = 1;
 | 
						|
 | 
						|
#if TEST_UNPACK
 | 
						|
    static unpack_setting_t s_unpack_setting;
 | 
						|
    s_unpack_setting.mode = UNPACK_BY_DELIMITER;
 | 
						|
    s_unpack_setting.package_max_length = DEFAULT_PACKAGE_MAX_LENGTH;
 | 
						|
    s_unpack_setting.delimiter_bytes = 2;
 | 
						|
    s_unpack_setting.delimiter[0] = '\r';
 | 
						|
    s_unpack_setting.delimiter[1] = '\n';
 | 
						|
    hio_set_unpack(io, &s_unpack_setting);
 | 
						|
#endif
 | 
						|
 | 
						|
    hio_write(io, "hello\r\n", 7);
 | 
						|
 | 
						|
    hio_setcb_read(io, on_message);
 | 
						|
    hio_read(io);
 | 
						|
}
 | 
						|
 | 
						|
// hloop_new -> malloc(tcp_client_t)
 | 
						|
tcp_client_t* tcp_client_new(hloop_t* loop) {
 | 
						|
    if (loop == NULL) {
 | 
						|
        loop = hloop_new(HLOOP_FLAG_AUTO_FREE);
 | 
						|
        if (loop == NULL) return NULL;
 | 
						|
    }
 | 
						|
    tcp_client_t* cli = NULL;
 | 
						|
    HV_ALLOC_SIZEOF(cli);
 | 
						|
    if (cli == NULL) return NULL;
 | 
						|
    cli->loop = loop;
 | 
						|
    hmutex_init(&cli->mutex_);
 | 
						|
    return cli;
 | 
						|
}
 | 
						|
 | 
						|
// hloop_free -> free(tcp_client_t)
 | 
						|
void tcp_client_free(tcp_client_t* cli) {
 | 
						|
    if (!cli) return;
 | 
						|
    hmutex_destroy(&cli->mutex_);
 | 
						|
    if (cli->ssl_ctx && cli->alloced_ssl_ctx) {
 | 
						|
        hssl_ctx_free(cli->ssl_ctx);
 | 
						|
        cli->ssl_ctx = NULL;
 | 
						|
    }
 | 
						|
    HV_FREE(cli->reconn_setting);
 | 
						|
    HV_FREE(cli);
 | 
						|
}
 | 
						|
 | 
						|
void tcp_client_run (tcp_client_t* cli) {
 | 
						|
    if (!cli || !cli->loop) return;
 | 
						|
    hloop_run(cli->loop);
 | 
						|
}
 | 
						|
 | 
						|
void tcp_client_stop(tcp_client_t* cli) {
 | 
						|
    if (!cli || !cli->loop) return;
 | 
						|
    hloop_stop(cli->loop);
 | 
						|
}
 | 
						|
 | 
						|
int tcp_client_set_ssl_ctx(tcp_client_t* cli, hssl_ctx_t ssl_ctx) {
 | 
						|
    cli->ssl_ctx = ssl_ctx;
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
// hssl_ctx_new(opt) -> tcp_client_set_ssl_ctx
 | 
						|
int tcp_client_new_ssl_ctx(tcp_client_t* cli, hssl_ctx_opt_t* opt) {
 | 
						|
    opt->endpoint = HSSL_CLIENT;
 | 
						|
    hssl_ctx_t ssl_ctx = hssl_ctx_new(opt);
 | 
						|
    if (ssl_ctx == NULL) return ERR_NEW_SSL_CTX;
 | 
						|
    cli->alloced_ssl_ctx = true;
 | 
						|
    return tcp_client_set_ssl_ctx(cli, ssl_ctx);
 | 
						|
}
 | 
						|
 | 
						|
int tcp_client_set_reconnect(tcp_client_t* cli, reconn_setting_t* reconn) {
 | 
						|
    if (reconn == NULL) {
 | 
						|
        HV_FREE(cli->reconn_setting);
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
    if (cli->reconn_setting == NULL) {
 | 
						|
        HV_ALLOC_SIZEOF(cli->reconn_setting);
 | 
						|
    }
 | 
						|
    *cli->reconn_setting = *reconn;
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
int tcp_client_reconnect(tcp_client_t* cli) {
 | 
						|
    tcp_client_connect(cli, cli->host, cli->port, cli->ssl);
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
int tcp_client_connect(tcp_client_t* cli, const char* host, int port, int ssl) {
 | 
						|
    if (!cli) return -1;
 | 
						|
    hv_strncpy(cli->host, host, sizeof(cli->host));
 | 
						|
    cli->port = port;
 | 
						|
    cli->ssl = ssl;
 | 
						|
    hio_t* io = hio_create_socket(cli->loop, host, port, HIO_TYPE_TCP, HIO_CLIENT_SIDE);
 | 
						|
    if (io == NULL) return -1;
 | 
						|
    if (ssl) {
 | 
						|
        if (cli->ssl_ctx) {
 | 
						|
            hio_set_ssl_ctx(io, cli->ssl_ctx);
 | 
						|
        }
 | 
						|
        hio_enable_ssl(io);
 | 
						|
    }
 | 
						|
    if (cli->connect_timeout > 0) {
 | 
						|
        hio_set_connect_timeout(io, cli->connect_timeout);
 | 
						|
    }
 | 
						|
    cli->io = io;
 | 
						|
    hevent_set_userdata(io, cli);
 | 
						|
    hio_setcb_connect(io, on_connect);
 | 
						|
    hio_setcb_close(io, on_close);
 | 
						|
    return hio_connect(io);
 | 
						|
}
 | 
						|
 | 
						|
int tcp_client_disconnect(tcp_client_t* cli) {
 | 
						|
    if (!cli || !cli->io) return -1;
 | 
						|
    // cancel reconnect first
 | 
						|
    tcp_client_set_reconnect(cli, NULL);
 | 
						|
    return hio_close(cli->io);
 | 
						|
}
 | 
						|
 | 
						|
bool tcp_client_is_connected(tcp_client_t* cli) {
 | 
						|
    return cli && cli->connected;
 | 
						|
}
 | 
						|
 | 
						|
int tcp_client_send(tcp_client_t* cli, const void* buf, int len) {
 | 
						|
    if (!cli || !cli->io || !buf || len == 0) return -1;
 | 
						|
    if (!cli->connected) return -2;
 | 
						|
    // thread-safe
 | 
						|
    hmutex_lock(&cli->mutex_);
 | 
						|
    int nwrite = hio_write(cli->io, buf, len);
 | 
						|
    hmutex_unlock(&cli->mutex_);
 | 
						|
    return nwrite;
 | 
						|
}
 | 
						|
 | 
						|
int main(int argc, char** argv) {
 | 
						|
    if (argc < 3) {
 | 
						|
        printf("Usage: %s host port\n", argv[0]);
 | 
						|
        return -10;
 | 
						|
    }
 | 
						|
    const char* host = argv[1];
 | 
						|
    int port = atoi(argv[2]);
 | 
						|
 | 
						|
    tcp_client_t* cli = tcp_client_new(NULL);
 | 
						|
    if (!cli) return -20;
 | 
						|
 | 
						|
#if TEST_RECONNECT
 | 
						|
    reconn_setting_t reconn;
 | 
						|
    reconn_setting_init(&reconn);
 | 
						|
    reconn.min_delay = 1000;
 | 
						|
    reconn.max_delay = 10000;
 | 
						|
    reconn.delay_policy = 2;
 | 
						|
    tcp_client_set_reconnect(cli, &reconn);
 | 
						|
#endif
 | 
						|
 | 
						|
    int ssl = 0;
 | 
						|
#if TEST_SSL
 | 
						|
    ssl = 1;
 | 
						|
#endif
 | 
						|
    tcp_client_connect(cli, host, port, ssl);
 | 
						|
 | 
						|
    tcp_client_run(cli);
 | 
						|
    tcp_client_free(cli);
 | 
						|
    return 0;
 | 
						|
}
 |