gf/net/gtcp/gtcp_server.go

156 lines
4.0 KiB
Go

// Copyright 2017 gf Author(https://github.com/gogf/gf). All Rights Reserved.
//
// This Source Code Form is subject to the terms of the MIT License.
// If a copy of the MIT was not distributed with this file,
// You can obtain one at https://github.com/gogf/gf.
package gtcp
import (
"crypto/tls"
"errors"
"net"
"sync"
"github.com/gogf/gf/container/gmap"
"github.com/gogf/gf/os/glog"
"github.com/gogf/gf/util/gconv"
)
const (
// Default TCP server name.
gDEFAULT_SERVER = "default"
)
// TCP Server.
type Server struct {
mu sync.Mutex // Used for Server.listen concurrent safety.
listen net.Listener // Listener.
address string // Server listening address.
handler func(*Conn) // Connection handler.
tlsConfig *tls.Config // TLS configuration.
}
// Map for name to server, for singleton purpose.
var serverMapping = gmap.NewStrAnyMap(true)
// GetServer returns the TCP server with specified <name>,
// or it returns a new normal TCP server named <name> if it does not exist.
// The parameter <name> is used to specify the TCP server
func GetServer(name ...interface{}) *Server {
serverName := gDEFAULT_SERVER
if len(name) > 0 && name[0] != "" {
serverName = gconv.String(name[0])
}
return serverMapping.GetOrSetFuncLock(serverName, func() interface{} {
return NewServer("", nil)
}).(*Server)
}
// NewServer creates and returns a new normal TCP server.
// The parameter <name> is optional, which is used to specify the instance name of the server.
func NewServer(address string, handler func(*Conn), name ...string) *Server {
s := &Server{
address: address,
handler: handler,
}
if len(name) > 0 && name[0] != "" {
serverMapping.Set(name[0], s)
}
return s
}
// NewServerTLS creates and returns a new TCP server with TLS support.
// The parameter <name> is optional, which is used to specify the instance name of the server.
func NewServerTLS(address string, tlsConfig *tls.Config, handler func(*Conn), name ...string) *Server {
s := NewServer(address, handler, name...)
s.SetTLSConfig(tlsConfig)
return s
}
// NewServerKeyCrt creates and returns a new TCP server with TLS support.
// The parameter <name> is optional, which is used to specify the instance name of the server.
func NewServerKeyCrt(address, crtFile, keyFile string, handler func(*Conn), name ...string) *Server {
s := NewServer(address, handler, name...)
if err := s.SetTLSKeyCrt(crtFile, keyFile); err != nil {
glog.Error(err)
}
return s
}
// SetAddress sets the listening address for server.
func (s *Server) SetAddress(address string) {
s.address = address
}
// SetHandler sets the connection handler for server.
func (s *Server) SetHandler(handler func(*Conn)) {
s.handler = handler
}
// SetTlsKeyCrt sets the certificate and key file for TLS configuration of server.
func (s *Server) SetTLSKeyCrt(crtFile, keyFile string) error {
tlsConfig, err := LoadKeyCrt(crtFile, keyFile)
if err != nil {
return err
}
s.tlsConfig = tlsConfig
return nil
}
// SetTlsConfig sets the TLS configuration of server.
func (s *Server) SetTLSConfig(tlsConfig *tls.Config) {
s.tlsConfig = tlsConfig
}
// Close closes the listener and shutdowns the server.
func (s *Server) Close() error {
s.mu.Lock()
defer s.mu.Unlock()
if s.listen == nil {
return nil
}
return s.listen.Close()
}
// Run starts running the TCP Server.
func (s *Server) Run() (err error) {
if s.handler == nil {
err = errors.New("start running failed: socket handler not defined")
glog.Error(err)
return
}
if s.tlsConfig != nil {
// TLS Server
s.mu.Lock()
s.listen, err = tls.Listen("tcp", s.address, s.tlsConfig)
s.mu.Unlock()
if err != nil {
glog.Error(err)
return
}
} else {
// Normal Server
addr, err := net.ResolveTCPAddr("tcp", s.address)
if err != nil {
glog.Error(err)
return err
}
s.mu.Lock()
s.listen, err = net.ListenTCP("tcp", addr)
s.mu.Unlock()
if err != nil {
glog.Error(err)
return err
}
}
// Listening loop.
for {
if conn, err := s.listen.Accept(); err != nil {
return err
} else if conn != nil {
go s.handler(NewConnByNetConn(conn))
}
}
}