class Excon::Socket
def connect
def connect @socket = nil exception = nil addrinfo = if @proxy ::Socket.getaddrinfo(@proxy[:host], @proxy[:port].to_i, ::Socket::Constants::AF_UNSPEC, ::Socket::Constants::SOCK_STREAM) else ::Socket.getaddrinfo(@params[:host], @params[:port].to_i, ::Socket::Constants::AF_UNSPEC, ::Socket::Constants::SOCK_STREAM) end addrinfo.each do |_, port, _, ip, a_family, s_type| # nonblocking connect begin sockaddr = ::Socket.sockaddr_in(port, ip) socket = ::Socket.new(a_family, s_type, 0) #secs = Integer(timeout) #usecs = Integer((timeout - secs) * 1_000_000) #optval = [secs, usecs].pack("l_2") #sock.setsockopt Socket::SOL_SOCKET, Socket::SO_RCVTIMEO, optval socket.connect_nonblock(sockaddr) @socket = socket break rescue Errno::EINPROGRESS IO.select(nil, [socket], nil, @params[:connect_timeout]) begin socket.connect_nonblock(sockaddr) @socket = socket break rescue Errno::EISCONN @socket = socket break rescue SystemCallError => exception socket.close next end rescue SystemCallError => exception socket.close next end end unless @socket # this will be our last encountered exception raise exception end end
def initialize(params = {}, proxy = nil)
def initialize(params = {}, proxy = nil) @params, @proxy = params, proxy @read_buffer = '' @eof = false connect end
def read(max_length=nil)
def read(max_length=nil) return nil if @eof begin if max_length until @read_buffer.length >= max_length @read_buffer << @socket.read_nonblock(max_length - @read_buffer.length) end else while true @read_buffer << @socket.read_nonblock(CHUNK_SIZE) end end rescue OpenSSL::SSL::SSLError => error if error.message == 'read would block' if IO.select([@socket], nil, nil, @params[:read_timeout]) retry else raise(Excon::Errors::Timeout.new("read timeout reached")) end end rescue Errno::EAGAIN, Errno::EWOULDBLOCK, IO::WaitReadable if IO.select([@socket], nil, nil, @params[:read_timeout]) retry else raise(Excon::Errors::Timeout.new("read timeout reached")) end rescue EOFError @eof = true end if max_length @read_buffer.slice!(0, max_length) else # read until EOFError, so return everything @read_buffer.slice!(0, @read_buffer.length) end end
def write(data)
def write(data) # We normally return from the return in the else block below, but # we guard that data is still something in case we get weird # values and String#[] returns nil. (This behavior has been observed # in the wild, so this is a simple defensive mechanism) while data begin # I wish that this API accepted a start position, then we wouldn't # have to slice data when there is a short write. written = @socket.write_nonblock(data) rescue OpenSSL::SSL::SSLError => error if error.message == 'write would block' if IO.select(nil, [@socket], nil, @params[:write_timeout]) retry else raise(Excon::Errors::Timeout.new("write timeout reached")) end end # If there is an unknown OpenSSL error, don't just swallow # it, raise it out. raise Excon::Errors::SocketError.new(error) rescue Errno::EAGAIN, Errno::EWOULDBLOCK, IO::WaitWritable if IO.select(nil, [@socket], nil, @params[:write_timeout]) retry else raise(Excon::Errors::Timeout.new("write timeout reached")) end else # Fast, common case. # The >= seems weird, why would it have written MORE than we # requested. But we're getting some weird behavior when @socket # is an OpenSSL socket, where it seems like it's saying it wrote # more (perhaps due to SSL packet overhead?). # # Pretty weird, but this is a simple defensive mechanism. return if written >= data.size # This takes advantage of the fact that most ruby implementations # have Copy-On-Write strings. Thusly why requesting a subrange # of data, we actually don't copy data because the new string # simply references a subrange of the original. data = data[written, data.size] end end end