2
0

socket_darwin.odin 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436
  1. #+build darwin
  2. package net
  3. /*
  4. Package net implements cross-platform Berkeley Sockets, DNS resolution and associated procedures.
  5. For other protocols and their features, see subdirectories of this package.
  6. */
  7. /*
  8. Copyright 2022 Tetralux <[email protected]>
  9. Copyright 2022 Colin Davidson <[email protected]>
  10. Copyright 2022 Jeroen van Rijn <[email protected]>.
  11. Copyright 2024 Feoramund <[email protected]>.
  12. Made available under Odin's BSD-3 license.
  13. List of contributors:
  14. Tetralux: Initial implementation
  15. Colin Davidson: Linux platform code, OSX platform code, Odin-native DNS resolver
  16. Jeroen van Rijn: Cross platform unification, code style, documentation
  17. Feoramund: FreeBSD platform code
  18. */
  19. import "core:c"
  20. import "core:sys/posix"
  21. import "core:time"
  22. Socket_Option :: enum c.int {
  23. Broadcast = c.int(posix.Sock_Option.BROADCAST),
  24. Reuse_Address = c.int(posix.Sock_Option.REUSEADDR),
  25. Keep_Alive = c.int(posix.Sock_Option.KEEPALIVE),
  26. Out_Of_Bounds_Data_Inline = c.int(posix.Sock_Option.OOBINLINE),
  27. TCP_Nodelay = c.int(posix.TCP_NODELAY),
  28. Linger = c.int(posix.Sock_Option.LINGER),
  29. Receive_Buffer_Size = c.int(posix.Sock_Option.RCVBUF),
  30. Send_Buffer_Size = c.int(posix.Sock_Option.SNDBUF),
  31. Receive_Timeout = c.int(posix.Sock_Option.RCVTIMEO),
  32. Send_Timeout = c.int(posix.Sock_Option.SNDTIMEO),
  33. }
  34. @(private)
  35. _create_socket :: proc(family: Address_Family, protocol: Socket_Protocol) -> (socket: Any_Socket, err: Network_Error) {
  36. c_type: posix.Sock
  37. c_protocol: posix.Protocol
  38. c_family: posix.AF
  39. switch family {
  40. case .IP4: c_family = .INET
  41. case .IP6: c_family = .INET6
  42. case:
  43. unreachable()
  44. }
  45. switch protocol {
  46. case .TCP: c_type = .STREAM; c_protocol = .TCP
  47. case .UDP: c_type = .DGRAM; c_protocol = .UDP
  48. case:
  49. unreachable()
  50. }
  51. sock := posix.socket(c_family, c_type, c_protocol)
  52. if sock < 0 {
  53. err = Create_Socket_Error(posix.errno())
  54. return
  55. }
  56. switch protocol {
  57. case .TCP: return TCP_Socket(sock), nil
  58. case .UDP: return UDP_Socket(sock), nil
  59. case:
  60. unreachable()
  61. }
  62. }
  63. @(private)
  64. _dial_tcp_from_endpoint :: proc(endpoint: Endpoint, options := default_tcp_options) -> (skt: TCP_Socket, err: Network_Error) {
  65. if endpoint.port == 0 {
  66. return 0, .Port_Required
  67. }
  68. family := family_from_endpoint(endpoint)
  69. sock := create_socket(family, .TCP) or_return
  70. skt = sock.(TCP_Socket)
  71. // NOTE(tetra): This is so that if we crash while the socket is open, we can
  72. // bypass the cooldown period, and allow the next run of the program to
  73. // use the same address immediately.
  74. _ = set_option(skt, .Reuse_Address, true)
  75. sockaddr := _endpoint_to_sockaddr(endpoint)
  76. if posix.connect(posix.FD(skt), (^posix.sockaddr)(&sockaddr), posix.socklen_t(sockaddr.ss_len)) != .OK {
  77. errno := posix.errno()
  78. close(skt)
  79. return {}, Dial_Error(errno)
  80. }
  81. return
  82. }
  83. // On Darwin, any port below 1024 is 'privileged' - which means that you need root access in order to use it.
  84. MAX_PRIVILEGED_PORT :: 1023
  85. @(private)
  86. _bind :: proc(skt: Any_Socket, ep: Endpoint) -> (err: Network_Error) {
  87. sockaddr := _endpoint_to_sockaddr(ep)
  88. s := any_socket_to_socket(skt)
  89. if posix.bind(posix.FD(s), (^posix.sockaddr)(&sockaddr), posix.socklen_t(sockaddr.ss_len)) != .OK {
  90. errno := posix.errno()
  91. if errno == .EACCES && ep.port <= MAX_PRIVILEGED_PORT {
  92. err = .Privileged_Port_Without_Root
  93. } else {
  94. err = Bind_Error(errno)
  95. }
  96. }
  97. return
  98. }
  99. @(private)
  100. _listen_tcp :: proc(interface_endpoint: Endpoint, backlog := 1000) -> (skt: TCP_Socket, err: Network_Error) {
  101. assert(backlog > 0 && i32(backlog) < max(i32))
  102. family := family_from_endpoint(interface_endpoint)
  103. sock := create_socket(family, .TCP) or_return
  104. skt = sock.(TCP_Socket)
  105. defer if err != nil { close(skt) }
  106. // NOTE(tetra): This is so that if we crash while the socket is open, we can
  107. // bypass the cooldown period, and allow the next run of the program to
  108. // use the same address immediately.
  109. //
  110. // TODO(tetra, 2022-02-15): Confirm that this doesn't mean other processes can hijack the address!
  111. set_option(sock, .Reuse_Address, true) or_return
  112. bind(sock, interface_endpoint) or_return
  113. if posix.listen(posix.FD(skt), i32(backlog)) != .OK {
  114. err = Listen_Error(posix.errno())
  115. return
  116. }
  117. return
  118. }
  119. @(private)
  120. _bound_endpoint :: proc(sock: Any_Socket) -> (ep: Endpoint, err: Network_Error) {
  121. addr: posix.sockaddr_storage
  122. addr_len := posix.socklen_t(size_of(addr))
  123. if posix.getsockname(posix.FD(any_socket_to_socket(sock)), (^posix.sockaddr)(&addr), &addr_len) != .OK {
  124. err = Listen_Error(posix.errno())
  125. return
  126. }
  127. ep = _sockaddr_to_endpoint(&addr)
  128. return
  129. }
  130. @(private)
  131. _accept_tcp :: proc(sock: TCP_Socket, options := default_tcp_options) -> (client: TCP_Socket, source: Endpoint, err: Network_Error) {
  132. addr: posix.sockaddr_storage
  133. addr_len := posix.socklen_t(size_of(addr))
  134. client_sock := posix.accept(posix.FD(sock), (^posix.sockaddr)(&addr), &addr_len)
  135. if client_sock < 0 {
  136. err = Accept_Error(posix.errno())
  137. return
  138. }
  139. client = TCP_Socket(client_sock)
  140. source = _sockaddr_to_endpoint(&addr)
  141. return
  142. }
  143. @(private)
  144. _close :: proc(skt: Any_Socket) {
  145. s := any_socket_to_socket(skt)
  146. posix.close(posix.FD(s))
  147. }
  148. @(private)
  149. _recv_tcp :: proc(skt: TCP_Socket, buf: []byte) -> (bytes_read: int, err: Network_Error) {
  150. if len(buf) <= 0 {
  151. return
  152. }
  153. res := posix.recv(posix.FD(skt), raw_data(buf), len(buf), {})
  154. if res < 0 {
  155. err = TCP_Recv_Error(posix.errno())
  156. return
  157. }
  158. return int(res), nil
  159. }
  160. @(private)
  161. _recv_udp :: proc(skt: UDP_Socket, buf: []byte) -> (bytes_read: int, remote_endpoint: Endpoint, err: Network_Error) {
  162. if len(buf) <= 0 {
  163. return
  164. }
  165. from: posix.sockaddr_storage
  166. fromsize := posix.socklen_t(size_of(from))
  167. res := posix.recvfrom(posix.FD(skt), raw_data(buf), len(buf), {}, (^posix.sockaddr)(&from), &fromsize)
  168. if res < 0 {
  169. err = UDP_Recv_Error(posix.errno())
  170. return
  171. }
  172. bytes_read = int(res)
  173. remote_endpoint = _sockaddr_to_endpoint(&from)
  174. return
  175. }
  176. @(private)
  177. _send_tcp :: proc(skt: TCP_Socket, buf: []byte) -> (bytes_written: int, err: Network_Error) {
  178. for bytes_written < len(buf) {
  179. limit := min(int(max(i32)), len(buf) - bytes_written)
  180. remaining := buf[bytes_written:][:limit]
  181. res := posix.send(posix.FD(skt), raw_data(remaining), len(remaining), {.NOSIGNAL})
  182. if res < 0 {
  183. errno := posix.errno()
  184. if errno == .EPIPE {
  185. // EPIPE arises if the socket has been closed remotely.
  186. err = TCP_Send_Error.Connection_Closed
  187. return
  188. }
  189. err = TCP_Send_Error(errno)
  190. return
  191. }
  192. bytes_written += int(res)
  193. }
  194. return
  195. }
  196. @(private)
  197. _send_udp :: proc(skt: UDP_Socket, buf: []byte, to: Endpoint) -> (bytes_written: int, err: Network_Error) {
  198. toaddr := _endpoint_to_sockaddr(to)
  199. for bytes_written < len(buf) {
  200. limit := min(1<<31, len(buf) - bytes_written)
  201. remaining := buf[bytes_written:][:limit]
  202. res := posix.sendto(posix.FD(skt), raw_data(remaining), len(remaining), {.NOSIGNAL}, (^posix.sockaddr)(&toaddr), posix.socklen_t(toaddr.ss_len))
  203. if res < 0 {
  204. errno := posix.errno()
  205. if errno == .EPIPE {
  206. // EPIPE arises if the socket has been closed remotely.
  207. err = UDP_Send_Error.Not_Socket
  208. return
  209. }
  210. err = UDP_Send_Error(errno)
  211. return
  212. }
  213. bytes_written += int(res)
  214. }
  215. return
  216. }
  217. @(private)
  218. _shutdown :: proc(skt: Any_Socket, manner: Shutdown_Manner) -> (err: Network_Error) {
  219. s := any_socket_to_socket(skt)
  220. if posix.shutdown(posix.FD(s), posix.Shut(manner)) != .OK {
  221. err = Shutdown_Error(posix.errno())
  222. }
  223. return
  224. }
  225. @(private)
  226. _set_option :: proc(s: Any_Socket, option: Socket_Option, value: any, loc := #caller_location) -> Network_Error {
  227. level := posix.SOL_SOCKET if option != .TCP_Nodelay else posix.IPPROTO_TCP
  228. // NOTE(tetra, 2022-02-15): On Linux, you cannot merely give a single byte for a bool;
  229. // it _has_ to be a b32.
  230. // I haven't tested if you can give more than that.
  231. bool_value: b32
  232. int_value: posix.socklen_t
  233. timeval_value: posix.timeval
  234. ptr: rawptr
  235. len: posix.socklen_t
  236. switch option {
  237. case
  238. .Broadcast,
  239. .Reuse_Address,
  240. .Keep_Alive,
  241. .Out_Of_Bounds_Data_Inline,
  242. .TCP_Nodelay:
  243. // TODO: verify whether these are options or not on Linux
  244. // .Broadcast,
  245. // .Conditional_Accept,
  246. // .Dont_Linger:
  247. switch x in value {
  248. case bool, b8:
  249. x2 := x
  250. bool_value = b32((^bool)(&x2)^)
  251. case b16:
  252. bool_value = b32(x)
  253. case b32:
  254. bool_value = b32(x)
  255. case b64:
  256. bool_value = b32(x)
  257. case:
  258. panic("set_option() value must be a boolean here", loc)
  259. }
  260. ptr = &bool_value
  261. len = size_of(bool_value)
  262. case
  263. .Linger,
  264. .Send_Timeout,
  265. .Receive_Timeout:
  266. t := value.(time.Duration) or_else panic("set_option() value must be a time.Duration here", loc)
  267. micros := i64(time.duration_microseconds(t))
  268. timeval_value.tv_usec = posix.suseconds_t(micros % 1e6)
  269. timeval_value.tv_sec = posix.time_t(micros - i64(timeval_value.tv_usec)) / 1e6
  270. ptr = &timeval_value
  271. len = size_of(timeval_value)
  272. case
  273. .Receive_Buffer_Size,
  274. .Send_Buffer_Size:
  275. // TODO: check for out of range values and return .Value_Out_Of_Range?
  276. switch i in value {
  277. case i8, u8: i2 := i; int_value = posix.socklen_t((^u8)(&i2)^)
  278. case i16, u16: i2 := i; int_value = posix.socklen_t((^u16)(&i2)^)
  279. case i32, u32: i2 := i; int_value = posix.socklen_t((^u32)(&i2)^)
  280. case i64, u64: i2 := i; int_value = posix.socklen_t((^u64)(&i2)^)
  281. case i128, u128: i2 := i; int_value = posix.socklen_t((^u128)(&i2)^)
  282. case int, uint: i2 := i; int_value = posix.socklen_t((^uint)(&i2)^)
  283. case:
  284. panic("set_option() value must be an integer here", loc)
  285. }
  286. ptr = &int_value
  287. len = size_of(int_value)
  288. }
  289. skt := any_socket_to_socket(s)
  290. if posix.setsockopt(posix.FD(skt), i32(level), posix.Sock_Option(option), ptr, len) != .OK {
  291. return Socket_Option_Error(posix.errno())
  292. }
  293. return nil
  294. }
  295. @(private)
  296. _set_blocking :: proc(socket: Any_Socket, should_block: bool) -> (err: Network_Error) {
  297. socket := any_socket_to_socket(socket)
  298. flags_ := posix.fcntl(posix.FD(socket), .GETFL, 0)
  299. if flags_ < 0 {
  300. return Set_Blocking_Error(posix.errno())
  301. }
  302. flags := transmute(posix.O_Flags)flags_
  303. if should_block {
  304. flags -= {.NONBLOCK}
  305. } else {
  306. flags += {.NONBLOCK}
  307. }
  308. if posix.fcntl(posix.FD(socket), .SETFL, flags) < 0 {
  309. return Set_Blocking_Error(posix.errno())
  310. }
  311. return nil
  312. }
  313. @private
  314. _endpoint_to_sockaddr :: proc(ep: Endpoint) -> (sockaddr: posix.sockaddr_storage) {
  315. switch a in ep.address {
  316. case IP4_Address:
  317. (^posix.sockaddr_in)(&sockaddr)^ = posix.sockaddr_in {
  318. sin_port = u16be(ep.port),
  319. sin_addr = transmute(posix.in_addr)a,
  320. sin_family = .INET,
  321. sin_len = size_of(posix.sockaddr_in),
  322. }
  323. return
  324. case IP6_Address:
  325. (^posix.sockaddr_in6)(&sockaddr)^ = posix.sockaddr_in6 {
  326. sin6_port = u16be(ep.port),
  327. sin6_addr = transmute(posix.in6_addr)a,
  328. sin6_family = .INET6,
  329. sin6_len = size_of(posix.sockaddr_in6),
  330. }
  331. return
  332. }
  333. unreachable()
  334. }
  335. @private
  336. _sockaddr_to_endpoint :: proc(native_addr: ^posix.sockaddr_storage) -> (ep: Endpoint) {
  337. #partial switch native_addr.ss_family {
  338. case .INET:
  339. addr := cast(^posix.sockaddr_in)native_addr
  340. port := int(addr.sin_port)
  341. ep = Endpoint {
  342. address = IP4_Address(transmute([4]byte)addr.sin_addr),
  343. port = port,
  344. }
  345. case .INET6:
  346. addr := cast(^posix.sockaddr_in6)native_addr
  347. port := int(addr.sin6_port)
  348. ep = Endpoint {
  349. address = IP6_Address(transmute([8]u16be)addr.sin6_addr),
  350. port = port,
  351. }
  352. case:
  353. panic("native_addr is neither IP4 or IP6 address")
  354. }
  355. return
  356. }
  357. @(private)
  358. _sockaddr_basic_to_endpoint :: proc(native_addr: ^posix.sockaddr) -> (ep: Endpoint) {
  359. #partial switch native_addr.sa_family {
  360. case .INET:
  361. addr := cast(^posix.sockaddr_in)native_addr
  362. port := int(addr.sin_port)
  363. ep = Endpoint {
  364. address = IP4_Address(transmute([4]byte)addr.sin_addr),
  365. port = port,
  366. }
  367. case .INET6:
  368. addr := cast(^posix.sockaddr_in6)native_addr
  369. port := int(addr.sin6_port)
  370. ep = Endpoint {
  371. address = IP6_Address(transmute([8]u16be)addr.sin6_addr),
  372. port = port,
  373. }
  374. case:
  375. panic("native_addr is neither IP4 or IP6 address")
  376. }
  377. return
  378. }