Commit graph

277 commits

Author SHA1 Message Date
Kim Alvefur
5b7eea90c4 net.server_epoll: Fix traceback-causing typo
Caused "attempt to index a string value (local 'data')", but only if
keep_buffers is set to false, which is not the default.

Introduced in 917eca7be82b
2021-07-18 08:53:37 +02:00
Kim Alvefur
a30d4e1518 net.server_epoll: Ensure timeouts match epoll flags
Read and write timeouts should usually match whether we want to read or
write.
2021-07-17 14:54:48 +02:00
Kim Alvefur
aba20a09bf net.server_epoll: Skip reset of read timeout when not reading
Should avoid rare but needless timer interactions
2021-07-17 14:51:50 +02:00
Kim Alvefur
decfa3a59d net.server_epoll: Reduce timer churn during TLS handshake
Instead of removing and readding the timer, keep it and adjust it
instead. Should reduce garbage production a bit.
2021-07-17 14:06:57 +02:00
Kim Alvefur
d2678dfdee net.server_epoll: Use only fatal "write" timeout during TLS negotiation
Only real difference between the read and write timeouts is that the
former has a callback that allows the higher levels to keep the
connection alive, while hitting the later is immediately fatal. We want
the later behavior for TLS negotiation.
2021-07-16 17:10:09 +02:00
Kim Alvefur
50bd7b79ea net.server_epoll: Optimize concatenation of exactly 2 buffer chunks
Saves a function call. I forget if I measured this kind of thing but
IIRC infix concatenation is faster than a function call up to some
number of items, but let's stop at 2 here.
2021-07-16 15:40:08 +02:00
Kim Alvefur
56fef6867f net.server_epoll: Avoid allocating a buffer table for single writes
writebuffer is now string | { string }

Saves the allocation of a buffer table until the second write, which
could be rare, especially with opportunistic writes.
2021-07-16 15:38:38 +02:00
Kim Alvefur
07afd46b58 net.server_epoll: Optionally let go of buffers
Reusing an already existing buffer table would reduce garbage, but
keeping it while idle is a waste.
2021-07-16 02:28:32 +02:00
Kim Alvefur
8318977ef4 net.server_epoll: Propagate returns from opportunistic writes
So that if a write ends up writing directly to the socket, it gets the
actual return value
2021-07-16 01:21:05 +02:00
Kim Alvefur
c611398c1f net.server_epoll: Set minimum wait time to 1ms, matching epoll
A timeout value less than 0.001 gets turned into zero on the C side, so
epoll_wait() returns instantly and essentially busy-loops up to 1ms,
e.g. when a timer event ends up scheduled (0, 0.001)ms into the future.

Unsure if this has much effect in practice, but it may waste a small
amount of CPU time. How much would depend on how often this ends up
happening and how fast the CPU gets trough main loop iterations.
2021-07-15 01:38:44 +02:00
Kim Alvefur
005e931005 net.server_epoll: Add setting for disabling the Nagle algorithm
Nagle increases latency and is the bane of all networking!
2021-07-14 22:27:12 +02:00
Kim Alvefur
15dd3e5687 net.server_epoll: Support setting keepalive idle time
Activated by setting config.tcp_keepalive to a number, in seconds.
Defaults to 2h.

Depends on LuaSocket support for this option.
2021-07-14 22:13:30 +02:00
Kim Alvefur
f11bc3c99c net.server_epoll: Add way to enable TCP keeplives on all connections
In case one wishes to enable this for all connections, not just c2s
(not Direct TLS ones, because LuaSec) and s2s. Unclear what use these
are, since they kick in after 2 hours of idle time.
2021-07-14 22:09:39 +02:00
Kim Alvefur
9b58be76c4 net.server_epoll: Add an (empty) method for setting socket options 2021-07-14 22:06:24 +02:00
Kim Alvefur
a60da1f81d net.server_epoll: Log failures to set socket options
Good to know if it fails, especially since the return value doesn't seem
to be checked anywhere.

Since LuaSec-wrapped sockets don't expose the setoption method, this
will likely show when mod_c2s tries to enable keepalives on direct tls
connections.
2021-07-14 22:04:23 +02:00
Kim Alvefur
357cf7647a net.server_epoll: Call onconnect immediately after TLS handshake completion
Skips a roundtrip through the main loop in case client-first data is
available already, if not then :onreadable() will set the appropriate
timeout.
2021-07-13 14:58:50 +02:00
Kim Alvefur
1877068b3d net.server_epoll: Refactor immediate TLS handshake start 2021-07-13 14:55:21 +02:00
Kim Alvefur
123a7b7079 net.server_epoll: Keep socket registered in epoll trough TLS wrapping
There's the theory that the socket isn't the same before/after wrap(),
but since epoll operates on FD numbers this shouldn't matter.
2021-07-13 14:51:05 +02:00
Kim Alvefur
063a7e45a3 net.server_epoll: Use TLS handshake timeout after initiating handshake
The :init() method sets a different timeout than the TLS related methods.
2021-07-13 14:27:46 +02:00
Kim Alvefur
72fae8bef7 net.server_epoll: Start TLS handshake immediately on newly accepted connections
Since TLS is a client-first protocol there is a chance that the
ClientHello message is available already. TLS Fast Open and/or the
TCP_DEFER_ACCEPT socket option would increase that chance.
2021-07-13 14:20:26 +02:00
Kim Alvefur
9615fcca97 net.server_epoll: Factor out TLS initialization into a method
So there's :startls(), :inittls() and :tlshandshake()

:starttls() prepares for plain -> TLS upgrade and ensures that the
(unencrypted) write buffer is drained before proceeding.

:inittls() wraps the connection and does things like SNI, DANE etc.

:tlshandshake() steps the TLS negotiation forward until it completes
2021-07-13 14:20:24 +02:00
Kim Alvefur
b313c33a8e net.server_epoll: Fix typo 2021-07-13 02:05:35 +02:00
Kim Alvefur
f814af50e3 net.server_epoll: Prevent stack overflow of opportunistic writes
net.http.files serving a big enough file on a fast enough connection
with opportunistic_writes enabled could trigger a stack overflow through
repeatedly serving more data that immediately gets sent, draining the
buffer and triggering more data to be sent. This also blocked the server
on a single task until completion or an error.

This change prevents nested opportunistic writes, which should prevent
the stack overflow, at the cost of reduced download speed, but this is
unlikely to be noticeable outside of Gbit networks. Speed at the cost of
blocking other processing is not worth it, especially with the risk of
stack overflow.
2021-07-11 09:39:21 +02:00
Kim Alvefur
b40b79873c net.server_epoll: Immediately attempt to read from newly accepted connections
This may speed up client-first protocols (e.g. XMPP, HTTP and TLS) when
the first client data already arrived by the time we accept() it.

If LuaSocket supported TCP_DEFER_ACCEPT we could use that to further
increase the chance that there's already data to handle.

In case no data has arrived, no harm should be done, :onreadable would
simply set the read timeout and we'll get back to it once there is
something to handle.
2021-07-08 17:57:44 +02:00
Kim Alvefur
852e44959d net.server_epoll: Separate handling of new incoming and outgoing connections
The :init method is more suited for new outgoing connections, which is
why it uses the connect_timeout setting.

Depending on whether a newly accepted connection is to a Direct TLS port
or not, it should be handled differently, and was already. The :starttls
method sets up timeouts on its own, so the one set in :init was not needed.

Newly accepted plain TCP connections don't need a write timeout set, a
read timeout is enough.
2021-07-08 17:52:59 +02:00
Kim Alvefur
532fbe0687 net.server_epoll: Ensure timeout after closing
This should make sure that if there's data left to be written when
closing a connection, there's also a timeout so that it doesn't wait
forever.
2020-10-31 00:33:29 +01:00
Kim Alvefur
672f9dcd63 net.server_epoll: Add missing method for changing TLS context
Supported by the other net.server implementations already, but not used
anywhere in Prosody.
2021-06-10 11:55:40 -01:56
Kim Alvefur
af9aa9349a net.server_epoll: Fix reporting of socket connect timeout
If the underlying TCP connection times out before the write timeout
kicks in, end up here with err="timeout", which the following code
treats as a minor issue.

Then, due to epoll apparently returning the EPOLLOUT (writable) event
too, we go on and try to write to the socket (commonly stream headers).
This fails because the socket is closed, which becomes the error
returned up the stack to the rest of Prosody.

This also trips the 'onconnect' signal, which has effects on various
things, such as the net.connect state machine. Probably undesirable
effects.

With this, we instead return "connection timeout", like server_event,
and destroy the connection handle properly. And then nothing else
happens because the connection has been destroyed.
2021-06-07 17:37:14 +02:00
Kim Alvefur
40c620c7e8 net.server_epoll: Remove unnecessary luacheck annotations
Not sure why these were here to begin with, since it does use the 'self'
argument and did so since they were added.
2021-04-01 12:30:55 +02:00
Kim Alvefur
69b2af382e net.server_epoll: Support for passing DANE TLSA data to LuaSec (0.8 needed) 2019-09-29 16:53:56 +02:00
Kim Alvefur
2f4d12286f Merge 0.11->trunk 2021-01-08 23:56:27 +01:00
Kim Alvefur
ec2e732fea net.server_epoll: Increase log level for error in callback
It's an error, it should be logged at error level.
2020-12-16 10:55:04 +01:00
Kim Alvefur
7c00bae93a net.server_epoll: Log debug message when a connection errors on read
It's confusingly quiet otherwise, even with maximum verboseness.

Thanks perflyst
2020-07-25 17:26:11 +02:00
Kim Alvefur
8b9da40260 net.server_epoll: Add setting for turning off callback protections
Might improve (CPU) performance at the risk of triggering top level
errors.
2020-06-30 18:31:48 +02:00
Kim Alvefur
7acd39cdbe net.server_epoll: Allow setting a custom error handler for listener
This lets plugins handle errors in some custom way, should they wish to.
2020-06-30 17:35:07 +02:00
Kim Alvefur
0a071df2d4 net.server_epoll: ... and include a traceback 2020-06-30 17:34:39 +02:00
Kim Alvefur
6baa04b056 net.server_epoll: Report errors in timers 2020-06-30 17:33:48 +02:00
Kim Alvefur
8ac1c4193c net.server_epoll: Expose way to turn monotonic time into wall clock time 2020-06-30 02:31:29 +02:00
Kim Alvefur
a1ae266ff7 net.server_epoll: Optimize away table allocation for timer objects 2020-06-29 20:23:59 +02:00
Kim Alvefur
2b81c3b50f net.server_epoll: Remove unused time field from timer objects
Unused since the move to util.indexedbheap in c8c3f2eba898
2020-06-29 20:13:12 +02:00
Kim Alvefur
ee10afcfab net.server_epoll: Signal API-compatibilty with util.timer
Reduces the overhead of having both util.timer and the timer handling
here, since they are very similar and now API-compatible.
2020-06-29 17:13:05 +02:00
Kim Alvefur
927ef9f2f2 net.server_epoll: Make API-compatible with util.timer 2020-06-29 16:42:16 +02:00
Kim Alvefur
9708aab9b3 net.server_epoll: Add way to start accepting clients on an arbitrary server socket
This adds an escape hatch where things like UNIX sockets can be added.
2020-06-01 17:19:08 +02:00
Matthew Wild
6ccd66e347 net.server_epoll: Handle missing ports from getsock/peername (as in the case of unix sockets) 2020-06-01 14:26:11 +01:00
Kim Alvefur
9783208ba5 net.server_epoll: Fix typo in internal method name 2020-05-22 15:36:03 +02:00
Kim Alvefur
a166ab719c net.server_epoll: Log some noise before TLS handshake step
This would help pinpoint if a crash happens during the handshake, which
has occurred a few times, e.g. like https://github.com/brunoos/luasec/issues/75
2020-05-22 15:20:19 +02:00
Kim Alvefur
61b6b340b1 net.server_epoll: Reduce log level of TLS handshake errors to debug
These are triggered all the time by random HTTPS connections, so they
are mostly just useless noise. When you actually do need them, you
probably have debug logging enabled too, since these messages are fairly
useless without more context.
2020-02-15 16:43:18 +01:00
Kim Alvefur
0f96c438e5 net.server_epoll: Different error to distinguish connection timeout
This mirrors what server_event does.
2020-02-01 00:33:08 +01:00
Kim Alvefur
20ad50db57 net.server_epoll: Log error about missing *all* callbacks at 'error' level 2020-01-12 20:36:21 +01:00
Kim Alvefur
4a424901c6 net.server_epoll: Log errors caught in listeners on 'error' level 2020-01-12 20:36:04 +01:00