// auth for goim handshake with client, use rsa & aes. func (server *Server) authTCP(rr *bufio.Reader, wr *bufio.Writer, p *proto.Proto) (key string, rid int32, heartbeat time.Duration, err error) { if err = p.ReadTCP(rr); err != nil { return } if p.Operation != define.OP_AUTH { log.Warn("auth operation not valid: %d", p.Operation) err = ErrOperation return } if key, rid, heartbeat, err = server.operator.Connect(p); err != nil { return } p.Body = nil p.Operation = define.OP_AUTH_REPLY if err = p.WriteTCP(wr); err != nil { return } err = wr.Flush() return }
// dispatch accepts connections on the listener and serves requests // for each incoming connection. dispatch blocks; the caller typically // invokes it in a go statement. func (server *Server) dispatchTCP(key string, conn *net.TCPConn, wr *bufio.Writer, wp *bytes.Pool, wb *bytes.Buffer, ch *Channel) { var ( p *proto.Proto err error ) if Debug { log.Debug("key: %s start dispatch tcp goroutine", key) } for { p = ch.Ready() if Debug { log.Debug("key:%s dispatch msg:%v", key, *p) } switch p { case proto.ProtoFinish: if Debug { log.Debug("key: %s wakeup exit dispatch goroutine", key) } goto failed case proto.ProtoReady: // fetch message from svrbox(client send) for { if p, err = ch.CliProto.Get(); err != nil { err = nil // must be empty error break } //LogSlow(SlowLogTypeReceive, key, p) if err = p.WriteTCP(wr); err != nil { goto failed } p.Body = nil // avoid memory leak ch.CliProto.GetAdv() } default: // server send //LogSlow(SlowLogTypeReceive, key, p) if err = p.WriteTCP(wr); err != nil { goto failed } } // only hungry flush response if err = wr.Flush(); err != nil { break } } failed: if err != nil { log.Error("key: %s dispatch tcp error(%v)", key, err) } conn.Close() wp.Put(wb) // must ensure all channel message discard, for reader won't blocking Signal for { if p == proto.ProtoFinish { break } p = ch.Ready() } if Debug { log.Debug("key: %s dispatch goroutine exit", key) } return }