1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626
|
# -*- encoding: utf-8 -*-
require 'socket'
require 'timeout'
require 'io/wait'
require 'digest/sha1'
module Stomp
class Connection
def _interruptible_gets(read_socket)
# The gets thread may be interrupted by the heartbeat thread. Ensure that
# if so interrupted, a new gets cannot start until after the heartbeat
# thread finishes its work. This is PURELY to avoid a segfault bug
# involving OpenSSL::Buffer.
@gets_semaphore.synchronize { @getst = Thread.current }
read_socket.gets
ensure
@gets_semaphore.synchronize { @getst = nil }
end
private
# Really read from the wire.
def _receive(read_socket, connread = false, noiosel = false)
# p [ "ioscheck", @iosto, connread, noiosel, @nto_cmd_read ]
# _dump_callstack()
drdbg = ENV['DRDBG'] ? true : false
@read_semaphore.synchronize do
p [ "_receive_lock", Thread::current() ] if drdbg
line = nil
# =====
# Read COMMAND (frame name)
# =====
if connread
begin
Timeout::timeout(@connread_timeout, Stomp::Error::ConnectReadTimeout) do
line = _init_line_read(read_socket)
end
rescue Stomp::Error::ConnectReadTimeout => ex
if @reliable
_reconn_prep()
end
raise ex
end
else
p [ "_receive_COMMAND" ] if drdbg
_dump_callstack() if drdbg
line = _init_line_read(read_socket)
end
#
p [ "_receive_nilcheck", line.nil? ] if drdbg
return nil if line.nil?
#An extra \n at the beginning of the frame, possibly not caught by is_ready?
line = '' if line == "\n"
if line == HAND_SHAKE_DATA
raise Stomp::Error::HandShakeDetectedError
end
p [ "_receive_norm_lend", line, Time.now ] if drdbg
line = _normalize_line_end(line) if @protocol >= Stomp::SPL_12
# =====
# Read Headers (if any)
# =====
# Reads the headers until it runs into a empty line
p [ "_receive_start_headers", line, Time.now ] if drdbg
message_header = ''
begin
message_header += line
unless connread || noiosel || @nto_cmd_read
raise Stomp::Error::ReceiveTimeout unless IO.select([read_socket], nil, nil, @iosto)
end
p [ "_receive_next_header", line, Time.now ] if drdbg
line = _interruptible_gets(read_socket)
p [ "_receive_normle_header", line ] if drdbg
raise Stomp::Error::StompServerError if line.nil?
line = _normalize_line_end(line) if @protocol >= Stomp::SPL_12
end until line =~ /^\s?\n$/
p [ "_receive_end_headers" ] if drdbg
# Checks if it includes content_length header
content_length = message_header.match(/content-length\s?:\s?(\d+)\s?\n/)
message_body = ''
# =====
# Read message body (if any)
# =====
p [ "_receive_start_body", content_length ] if drdbg
# If content_length is present, read the specified amount of bytes
if content_length
unless connread || noiosel
raise Stomp::Error::ReceiveTimeout unless IO.select([read_socket], nil, nil, @iosto)
end
p [ "_receive_have_content_length" ] if drdbg
message_body = read_socket.read content_length[1].to_i
unless connread || noiosel
raise Stomp::Error::ReceiveTimeout unless IO.select([read_socket], nil, nil, @iosto)
end
raise Stomp::Error::InvalidMessageLength unless parse_char(read_socket.getc) == "\0"
# Else read the rest of the message until the first \0
else
unless connread || noiosel
raise Stomp::Error::ReceiveTimeout unless IO.select([read_socket], nil, nil, @iosto)
end
p [ "no_content_length" ] if drdbg
message_body = read_socket.readline("\0")
message_body.chop!
end
# =====
# If the buffer isn't empty, reads/drains trailing new lines.
#
# Note: experiments with JRuby seem to show that socket.ready? never
# returns true. It appears that in cases where Ruby returns true
# that JRuby returns an Integer. We attempt to adjust for this
# in the _is_ready? method.
#
# Note 2: the draining of new lines must be done _after_ a message
# is read. Do _not_ leave them on the wire and attempt to drain them
# at the start of the next read. Attempting to do that breaks the
# asynchronous nature of the 'poll' method.
# =====
p [ "_receive_start_drain_loop", "isr", _is_ready?(read_socket) ] if drdbg
while _is_ready?(read_socket)
unless connread || noiosel
raise Stomp::Error::ReceiveTimeout unless IO.select([read_socket], nil, nil, @iosto)
end
p [ "_receive_next_drain" ] if drdbg
last_char = read_socket.getc
break unless last_char
if parse_char(last_char) != "\n"
read_socket.ungetc(last_char)
break
end
end
# =====
# Complete receive processing
# =====
p [ "_receive_hb_update" ] if drdbg
if @protocol >= Stomp::SPL_11
@lr = Time.now.to_f if @hbr
end
# Adds the excluded \n and \0 and tries to create a new message with it
p [ "_receive_new_message" ] if drdbg
msg = Message.new(message_header + "\n" + message_body + "\0", @protocol >= Stomp::SPL_11)
p [ "_receive_decode_headers", msg.command, msg.headers ] if drdbg
# Check for a valid frame name from the server.
p [ "_receive_frame_name_check", msg.command ] if drdbg
unless SERVER_FRAMES[msg.command]
sfex = Stomp::Error::ServerFrameNameError.new(msg.command)
raise sfex
end
#
# Always decode headers, even for 1.0. Issue #160.
if msg.command != Stomp::CMD_CONNECTED
msg.headers = _decodeHeaders(msg.headers)
end
p [ "_receive_ends", msg.command, msg.headers ] if drdbg
p [ "_receive_UNlock", Thread::current() ] if drdbg
msg
end
end
#
# This is a total hack, to try and guess how JRuby will behave today.
#
def _is_ready?(s)
rdy = s.ready?
#p [ "isr?", rdy ]
return rdy unless @jruby
#p [ "jrdychk", rdy.class ]
if rdy.class == NilClass
# rdy = true
rdy = false # A test
else
rdy = (rdy.class == Integer || rdy.class == TrueClass) ? true : false
end
#p [ "isr?_last", rdy ]
rdy
end
# Normalize line ends because 1.2+ brokers can send 'mixed mode' headers, i.e.:
# - Some headers end with '\n'
# - Other headers end with '\r\n'
def _normalize_line_end(line)
return line unless @usecrlf
# p [ "nleln", line ]
line_len = line.respond_to?(:bytesize) ? line.bytesize : line.length
last2 = line[line_len-2...line_len]
# p [ "nlel2", last2 ]
return line unless last2 == "\r\n"
return line[0...line_len-2] + "\n"
end
# transmit logically puts a Message on the wire.
def transmit(command, headers = {}, body = '')
# p [ "XMIT01", command, headers ]
# The transmit may fail so we may need to retry.
while true
begin
used_socket = socket()
_transmit(used_socket, command, headers, body)
return
rescue Stomp::Error::MaxReconnectAttempts => e
_ = e
raise
rescue
@failure = $!
raise unless @reliable
errstr = "transmit to #{@host} failed: #{$!}\n"
unless slog(:on_miscerr, log_params, "es_trans: " + errstr)
$stderr.print errstr
end
# !!! This loop initiates a re-connect !!!
_reconn_prep()
end
end
end
# _transmit is the real wire write logic.
def _transmit(used_socket, command, headers = {}, body = '')
dtrdbg = ENV['DTRDBG'] ? true : false
# p [ "wirewrite" ]
# _dump_callstack()
p [ "_transmit_headers_in1", headers ] if dtrdbg
if @protocol >= Stomp::SPL_11 && command != Stomp::CMD_CONNECT
headers = _encodeHeaders(headers)
p [ "_transmit_headers_in2", headers ] if dtrdbg
end
@transmit_semaphore.synchronize do
p [ "_transmit_lock", Thread::current() ] if dtrdbg
# Handle nil body
body = '' if body.nil?
# The content-length should be expressed in bytes.
# Ruby 1.8: String#length => # of bytes; Ruby 1.9: String#length => # of characters
# With Unicode strings, # of bytes != # of characters. So, use String#bytesize when available.
body_length_bytes = body.respond_to?(:bytesize) ? body.bytesize : body.length
# ActiveMQ interprets every message as a BinaryMessage
# if content_length header is included.
# Using :suppress_content_length => true will suppress this behaviour
# and ActiveMQ will interpret the message as a TextMessage.
# For more information refer to http://juretta.com/log/2009/05/24/activemq-jms-stomp/
# Lets send this header in the message, so it can maintain state when using unreceive
headers[:'content-length'] = "#{body_length_bytes}" unless headers[:suppress_content_length]
headers[:'content-type'] = "text/plain; charset=UTF-8" unless headers[:'content-type'] || headers[:suppress_content_type]
p [ "_transmit_command", command ] if dtrdbg
_wire_write(used_socket,command)
p [ "_transmit_headers", headers ] if dtrdbg
headers.each do |k,v|
if v.is_a?(Array)
v.each do |e|
_wire_write(used_socket,"#{k}:#{e}")
end
else
_wire_write(used_socket,"#{k}:#{v}")
end
end
p [ "_transmit_headers done" ] if dtrdbg
_wire_write(used_socket,"")
if body != ''
p [ "_transmit_body", body ] if dtrdbg
if headers[:suppress_content_length]
if tz = body.index("\00")
used_socket.write body[0..tz-1]
else
used_socket.write body
end
else
used_socket.write body
end
end
used_socket.write "\0"
used_socket.flush if @autoflush
# used_socket.flush
if @protocol >= Stomp::SPL_11
@ls = Time.now.to_f if @hbs
end
p [ "_transmit_UNlock", Thread::current() ] if dtrdbg
end
end
# Use CRLF if protocol is >= 1.2, and the client requested CRLF
def _wire_write(sock, data)
# p [ "debug_01", @protocol, @usecrlf ]
dwrdbg = ENV['DWRDBG'] ? true : false
if @protocol >= Stomp::SPL_12 && @usecrlf
wiredata = "#{data}#{Stomp::CR}#{Stomp::LF}"
# p [ "wiredataout_01:", wiredata ]
sock.write(wiredata)
else
p [ "_wire_write_begin:", "#{data}" ] if dwrdbg
if @jruby && @ssl
p [ "_wire_write_jrbeg:" ] if dwrdbg
# Same results for all of these write methods.
# sock.puts data
# sock.print "#{data}\n"
# sock.syswrite "#{data}\n"
sock.write "#{data}\n"
p [ "_wire_write_jrend:" ] if dwrdbg
else
sock.puts data
end
p [ "_wire_write_end:" ] if dwrdbg
end
end
# open_tcp_socket opens a TCP socket.
def open_tcp_socket()
## $stderr.print("h: #{@host}, p: #{@port}\n")
tcp_socket = nil
slog(:on_connecting, log_params)
Timeout::timeout(@connect_timeout, Stomp::Error::SocketOpenTimeout) do
tcp_socket = TCPSocket.open(@host, @port)
end
tcp_socket
end
# open_ssl_socket opens an SSL socket.
def open_ssl_socket()
require 'openssl' unless defined?(OpenSSL)
ossdbg = ENV['OSSDBG'] ? true : false
begin # Any raised SSL exceptions
ctx = @sslctx_newparm ? OpenSSL::SSL::SSLContext.new(@sslctx_newparm) : OpenSSL::SSL::SSLContext.new
ctx.verify_mode = OpenSSL::SSL::VERIFY_NONE # Assume for now
#
# Note: if a client uses :ssl => true this would result in the gem using
# the _default_ Ruby ciphers list. This is _known_ to fail in later
# Ruby releases. The gem now detects :ssl => true, and replaces that
# with:
# * :ssl => Stomp::SSLParams.new
#
# The above results in the use of Stomp default parameters.
#
# To specifically request Stomp default parameters, use:
# * :ssl => Stomp::SSLParams.new(..., :ciphers => Stomp::DEFAULT_CIPHERS)
#
# If connecting with an SSLParams instance, and the _default_ Ruby
# ciphers list is actually required, use:
# * :ssl => Stomp::SSLParams.new(..., :use_ruby_ciphers => true)
#
# If a custom ciphers list is required, connect with:
# * :ssl => Stomp::SSLParams.new(..., :ciphers => custom_ciphers_list)
#
if @ssl != true
#
# Here @ssl is:
# * an instance of Stomp::SSLParams
# Control would not be here if @ssl == false or @ssl.nil?.
#
# Back reference the SSLContext
@ssl.ctx = ctx
# Server authentication parameters if required
if @ssl.ts_files
ctx.verify_mode = OpenSSL::SSL::VERIFY_PEER
truststores = OpenSSL::X509::Store.new
fl = @ssl.ts_files.split(",")
fl.each do |fn|
# Add next cert file listed
raise Stomp::Error::SSLNoTruststoreFileError if !File::exists?(fn)
raise Stomp::Error::SSLUnreadableTruststoreFileError if !File::readable?(fn)
truststores.add_file(fn)
end
ctx.cert_store = truststores
end
#
p [ "OSSL50", "old code starts" ] if ossdbg
usecert = nil
usekey = nil
# Client authentication
# If cert exists as a file, then it should not be input as text
raise Stomp::Error::SSLClientParamsError if !@ssl.cert_file.nil? &&
!@ssl.cert_text.nil?
# If cert exists as file, then key must exist, either as text or file
raise Stomp::Error::SSLClientParamsError if !@ssl.cert_file.nil? &&
@ssl.key_file.nil? && @ssl.key_text.nil?
if @ssl.cert_file
raise Stomp::Error::SSLNoCertFileError if !File::exists?(@ssl.cert_file)
raise Stomp::Error::SSLUnreadableCertFileError if !File::readable?(@ssl.cert_file)
p [ "OSSL51", "old code cert file read" ] if ossdbg
usecert = OpenSSL::X509::Certificate.new(File.read(@ssl.cert_file))
end
# If cert exists as file, then key must exist, either as text or file
raise Stomp::Error::SSLClientParamsError if !@ssl.cert_text.nil? &&
@ssl.key_file.nil? && @ssl.key_text.nil?
if @ssl.cert_text
p [ "OSSL52", "old code cert text get" ] if ossdbg
usecert = OpenSSL::X509::Certificate.new(@ssl.cert_text)
end
# If key exists as a text, then it should not be input as file
raise Stomp::Error::SSLClientParamsError if !@ssl.key_text.nil? &&
!@ssl.key_file.nil?
if @ssl.key_file
raise Stomp::Error::SSLNoKeyFileError if !File::exists?(@ssl.key_file)
raise Stomp::Error::SSLUnreadableKeyFileError if !File::readable?(@ssl.key_file)
p [ "OSSL53", "old code key file read" ] if ossdbg
usekey = OpenSSL::PKey::RSA.new(File.read(@ssl.key_file), @ssl.key_password)
end
if @ssl.key_text
nt = @ssl.key_text.gsub(/\t/, "")
p [ "OSSL54", "old code key text get" ] if ossdbg
usekey = OpenSSL::PKey::RSA.new(nt, @ssl.key_password)
end
#
# This style of code because: in newer Ruby versions the 'cert'
# and 'key' attributes are deprecated. It is suggested that the
# 'add_certificate' method be used instead.
#
if ctx.respond_to?(:add_certificate) # Newer Ruby version ??
p [ "OSSL55", "new code option", usecert, usekey ] if ossdbg
if !usecert.nil? && !usekey.nil?
p [ "OSSL55", "new code add_certificate" ] if ossdbg
ctx.add_certificate(usecert, usekey)
else
p [ "OSSL56", "new code SKIP add_certificate" ] if ossdbg
end
else
# Older Ruby versions
p [ "OSSL56", "old code option", usecert, usekey ] if ossdbg
ctx.cert = usecert
ctx.key = usekey
end
p [ "OSSL99", "old code ends" ] if ossdbg
# Cipher list
# As of this writing, there are numerous problems with supplying
# cipher lists to jruby. So we do not attempt to do that here.
if !@ssl.use_ruby_ciphers # No Ruby ciphers (the default)
if @ssl.ciphers # User ciphers list?
ctx.ciphers = @ssl.ciphers # Accept user supplied ciphers
else
ctx.ciphers = Stomp::DEFAULT_CIPHERS # Just use Stomp defaults
end
end unless @jruby
# Set SSLContext Options if user asks for it in Stomp::SSLParams
# and SSL supports it.
if @ssl.ssl_ctxopts && ctx.respond_to?(:options=)
ctx.options = @ssl.ssl_ctxopts
end
end
#
ssl = nil
slog(:on_ssl_connecting, log_params)
# _dump_ctx(ctx)
Timeout::timeout(@connect_timeout, Stomp::Error::SocketOpenTimeout) do
tcp_socket = TCPSocket.open(@host, @port)
ssl = OpenSSL::SSL::SSLSocket.new(tcp_socket, ctx)
ssl.hostname = @host if ssl.respond_to? :hostname=
ssl.sync_close = true # Sync ssl close with underlying TCP socket
ssl.connect
if (ssl.context.verify_mode != OpenSSL::SSL::VERIFY_NONE) && @ssl_post_conn_check
ssl.post_connection_check(@host)
end
end
def ssl.ready?
@ssl_ready_lock ||= Mutex.new
@ssl_ready_lock.synchronize do
! @rbuffer.empty? || @io.ready?
end
end
if @ssl != true
# Pass back results if possible
if RUBY_VERSION =~ /1\.8\.[56]/
@ssl.verify_result = "N/A for Ruby #{RUBY_VERSION}"
else
@ssl.verify_result = ssl.verify_result
end
@ssl.peer_cert = ssl.peer_cert
end
slog(:on_ssl_connected, log_params)
ssl
rescue Exception => ex
lp = log_params.clone
lp[:ssl_exception] = ex
slog(:on_ssl_connectfail, lp)
if ssl
# shut down the TCP socket - we just failed to do the SSL handshake in time
ssl.close
end
#
puts ex.backtrace if ossdbg
$stdout.flush if ossdbg
raise # Reraise
end
end
# close_socket closes the current open socket, and hence the connection.
def close_socket()
begin
# Need to set @closed = true before closing the socket
# within the @read_semaphore thread
@closed = true
@read_semaphore.synchronize do
@socket.close
end
rescue
#Ignoring if already closed
end
@closed
end
# open_socket opens a TCP or SSL soclet as required.
def open_socket()
used_socket = @ssl ? open_ssl_socket : open_tcp_socket
# try to close the old connection if any
close_socket
@closed = false
if @parameters # nil in some rspec tests
unless @reconnect_delay
@reconnect_delay = @parameters[:initial_reconnect_delay] || iosto1
end
end
# Use keepalive
used_socket.setsockopt(Socket::SOL_SOCKET, Socket::SO_KEEPALIVE, true)
# TCP_NODELAY option (disables Nagle's algorithm)
used_socket.setsockopt(Socket::IPPROTO_TCP, Socket::TCP_NODELAY, !!(@parameters && @parameters[:tcp_nodelay]))
@iosto = @parse_timeout ? @parse_timeout.to_f : 0.0
used_socket
end
# connect performs a basic STOMP CONNECT operation.
def connect(used_socket)
@connect_headers = {} unless @connect_headers # Caller said nil/false
headers = @connect_headers.clone
headers[:login] = @login unless @login.to_s.empty?
headers[:passcode] = @passcode unless @login.to_s.empty?
_pre_connect
if !@hhas10 && @stompconn
_transmit(used_socket, Stomp::CMD_STOMP, headers)
else
_transmit(used_socket, Stomp::CMD_CONNECT, headers)
end
connread = true
noiosel = false
@connection_frame = _receive(used_socket, connread, noiosel)
_post_connect
@disconnect_receipt = nil
@session = @connection_frame.headers["session"] if @connection_frame
# replay any subscriptions.
@subscriptions.each {|k,v|
_transmit(used_socket, Stomp::CMD_SUBSCRIBE, v)
}
end
def _init_line_read(read_socket)
line = ''
if @protocol == Stomp::SPL_10 || (@protocol >= Stomp::SPL_11 && !@hbr)
if @jruby
# Handle JRuby specific behavior.
#p [ "ilrjr00", _is_ready?(read_socket), RUBY_VERSION ]
if RUBY_VERSION < "2"
while true
#p [ "ilrjr01A1", _is_ready?(read_socket) ]
line = _interruptible_gets(read_socket) # Data from wire
break unless line == "\n"
line = ''
end
else # RUBY_VERSION >= "2"
while _is_ready?(read_socket)
#p [ "ilrjr01B2", _is_ready?(read_socket) ]
line = _interruptible_gets(read_socket) # Data from wire
break unless line == "\n"
line = ''
end
end
else
line = _interruptible_gets(read_socket) # The old way
end
else # We are >= 1.1 *AND* receiving heartbeats.
while true
line = _interruptible_gets(read_socket) # Data from wire
break unless line == "\n"
line = ''
@lr = Time.now.to_f
end
end
line
end
# Used for debugging
def _dump_ctx(ctx)
p [ "dc01", ctx.inspect ]
p [ "dc02ciphers", ctx.ciphers ]
end
# used for debugging
def _dump_callstack()
i = 0
caller.each do |c|
p [ "csn", i, c ]
i += 1
end
end # _dump_callstack
# used for debugging
def _dump_threads()
tl = Thread::list
tl.each do |at|
p [ "THDMPN", at ]
end
p [ "THDMPMain", @parameters[:client_main] ]
end
end # class Connection
end # module Stomp
|