hand apply whitespace mutiliated patch
[p5sagit/p5-mst-13.2.git] / pod / perlipc.pod
CommitLineData
a0d0e21e 1=head1 NAME
2
184e9718 3perlipc - Perl interprocess communication (signals, fifos, pipes, safe subprocesses, sockets, and semaphores)
a0d0e21e 4
5=head1 DESCRIPTION
6
4633a7c4 7The basic IPC facilities of Perl are built out of the good old Unix
8signals, named pipes, pipe opens, the Berkeley socket routines, and SysV
9IPC calls. Each is used in slightly different situations.
10
11=head1 Signals
12
13Perl uses a simple signal handling model: the %SIG hash contains names or
14references of user-installed signal handlers. These handlers will be called
15with an argument which is the name of the signal that triggered it. A
16signal may be generated intentionally from a particular keyboard sequence like
a2eb9003 17control-C or control-Z, sent to you from another process, or
4633a7c4 18triggered automatically by the kernel when special events transpire, like
54310121 19a child process exiting, your process running out of stack space, or
4633a7c4 20hitting file size limit.
21
22For example, to trap an interrupt signal, set up a handler like this.
7b05b7e3 23Do as little as you possibly can in your handler; notice how all we do is
24set a global variable and then raise an exception. That's because on most
25systems, libraries are not re-entrant; particularly, memory allocation and
26I/O routines are not. That means that doing nearly I<anything> in your
27handler could in theory trigger a memory fault and subsequent core dump.
4633a7c4 28
29 sub catch_zap {
30 my $signame = shift;
31 $shucks++;
32 die "Somebody sent me a SIG$signame";
54310121 33 }
4633a7c4 34 $SIG{INT} = 'catch_zap'; # could fail in modules
35 $SIG{INT} = \&catch_zap; # best strategy
36
37The names of the signals are the ones listed out by C<kill -l> on your
38system, or you can retrieve them from the Config module. Set up an
39@signame list indexed by number to get the name and a %signo table
40indexed by name to get the number:
41
42 use Config;
43 defined $Config{sig_name} || die "No sigs?";
44 foreach $name (split(' ', $Config{sig_name})) {
45 $signo{$name} = $i;
46 $signame[$i] = $name;
47 $i++;
54310121 48 }
4633a7c4 49
6a3992aa 50So to check whether signal 17 and SIGALRM were the same, do just this:
4633a7c4 51
52 print "signal #17 = $signame[17]\n";
54310121 53 if ($signo{ALRM}) {
4633a7c4 54 print "SIGALRM is $signo{ALRM}\n";
54310121 55 }
4633a7c4 56
57You may also choose to assign the strings C<'IGNORE'> or C<'DEFAULT'> as
58the handler, in which case Perl will try to discard the signal or do the
59default thing. Some signals can be neither trapped nor ignored, such as
60the KILL and STOP (but not the TSTP) signals. One strategy for
61temporarily ignoring signals is to use a local() statement, which will be
62automatically restored once your block is exited. (Remember that local()
63values are "inherited" by functions called from within that block.)
64
65 sub precious {
66 local $SIG{INT} = 'IGNORE';
67 &more_functions;
54310121 68 }
4633a7c4 69 sub more_functions {
70 # interrupts still ignored, for now...
54310121 71 }
4633a7c4 72
73Sending a signal to a negative process ID means that you send the signal
fb73857a 74to the entire Unix process-group. This code sends a hang-up signal to all
75processes in the current process group (and sets $SIG{HUP} to IGNORE so
76it doesn't kill itself):
4633a7c4 77
78 {
79 local $SIG{HUP} = 'IGNORE';
80 kill HUP => -$$;
81 # snazzy writing of: kill('HUP', -$$)
82 }
a0d0e21e 83
4633a7c4 84Another interesting signal to send is signal number zero. This doesn't
85actually affect another process, but instead checks whether it's alive
54310121 86or has changed its UID.
a0d0e21e 87
4633a7c4 88 unless (kill 0 => $kid_pid) {
89 warn "something wicked happened to $kid_pid";
54310121 90 }
a0d0e21e 91
4633a7c4 92You might also want to employ anonymous functions for simple signal
93handlers:
a0d0e21e 94
4633a7c4 95 $SIG{INT} = sub { die "\nOutta here!\n" };
a0d0e21e 96
4633a7c4 97But that will be problematic for the more complicated handlers that need
54310121 98to reinstall themselves. Because Perl's signal mechanism is currently
184e9718 99based on the signal(3) function from the C library, you may sometimes be so
4633a7c4 100misfortunate as to run on systems where that function is "broken", that
101is, it behaves in the old unreliable SysV way rather than the newer, more
102reasonable BSD and POSIX fashion. So you'll see defensive people writing
103signal handlers like this:
a0d0e21e 104
54310121 105 sub REAPER {
4633a7c4 106 $waitedpid = wait;
6a3992aa 107 # loathe sysV: it makes us not only reinstate
108 # the handler, but place it after the wait
54310121 109 $SIG{CHLD} = \&REAPER;
4633a7c4 110 }
111 $SIG{CHLD} = \&REAPER;
112 # now do something that forks...
113
114or even the more elaborate:
115
6a3992aa 116 use POSIX ":sys_wait_h";
54310121 117 sub REAPER {
4633a7c4 118 my $child;
4633a7c4 119 while ($child = waitpid(-1,WNOHANG)) {
120 $Kid_Status{$child} = $?;
54310121 121 }
6a3992aa 122 $SIG{CHLD} = \&REAPER; # still loathe sysV
4633a7c4 123 }
124 $SIG{CHLD} = \&REAPER;
125 # do something that forks...
126
127Signal handling is also used for timeouts in Unix, While safely
128protected within an C<eval{}> block, you set a signal handler to trap
129alarm signals and then schedule to have one delivered to you in some
130number of seconds. Then try your blocking operation, clearing the alarm
131when it's done but not before you've exited your C<eval{}> block. If it
132goes off, you'll use die() to jump out of the block, much as you might
133using longjmp() or throw() in other languages.
134
135Here's an example:
136
54310121 137 eval {
4633a7c4 138 local $SIG{ALRM} = sub { die "alarm clock restart" };
54310121 139 alarm 10;
4633a7c4 140 flock(FH, 2); # blocking write lock
54310121 141 alarm 0;
4633a7c4 142 };
143 if ($@ and $@ !~ /alarm clock restart/) { die }
144
145For more complex signal handling, you might see the standard POSIX
146module. Lamentably, this is almost entirely undocumented, but
147the F<t/lib/posix.t> file from the Perl source distribution has some
148examples in it.
149
150=head1 Named Pipes
151
152A named pipe (often referred to as a FIFO) is an old Unix IPC
153mechanism for processes communicating on the same machine. It works
54310121 154just like a regular, connected anonymous pipes, except that the
4633a7c4 155processes rendezvous using a filename and don't have to be related.
156
157To create a named pipe, use the Unix command mknod(1) or on some
158systems, mkfifo(1). These may not be in your normal path.
159
160 # system return val is backwards, so && not ||
161 #
162 $ENV{PATH} .= ":/etc:/usr/etc";
54310121 163 if ( system('mknod', $path, 'p')
4633a7c4 164 && system('mkfifo', $path) )
165 {
5a964f20 166 die "mk{nod,fifo} $path failed";
54310121 167 }
4633a7c4 168
169
170A fifo is convenient when you want to connect a process to an unrelated
171one. When you open a fifo, the program will block until there's something
54310121 172on the other end.
4633a7c4 173
174For example, let's say you'd like to have your F<.signature> file be a
175named pipe that has a Perl program on the other end. Now every time any
6a3992aa 176program (like a mailer, news reader, finger program, etc.) tries to read
4633a7c4 177from that file, the reading program will block and your program will
6a3992aa 178supply the new signature. We'll use the pipe-checking file test B<-p>
4633a7c4 179to find out whether anyone (or anything) has accidentally removed our fifo.
180
181 chdir; # go home
182 $FIFO = '.signature';
183 $ENV{PATH} .= ":/etc:/usr/games";
184
185 while (1) {
186 unless (-p $FIFO) {
187 unlink $FIFO;
54310121 188 system('mknod', $FIFO, 'p')
4633a7c4 189 && die "can't mknod $FIFO: $!";
54310121 190 }
4633a7c4 191
192 # next line blocks until there's a reader
193 open (FIFO, "> $FIFO") || die "can't write $FIFO: $!";
194 print FIFO "John Smith (smith\@host.org)\n", `fortune -s`;
195 close FIFO;
6a3992aa 196 sleep 2; # to avoid dup signals
4633a7c4 197 }
a0d0e21e 198
5a964f20 199=head2 WARNING
200
201By installing Perl code to deal with signals, you're exposing yourself
202to danger from two things. First, few system library functions are
203re-entrant. If the signal interrupts while Perl is executing one function
204(like malloc(3) or printf(3)), and your signal handler then calls the
205same function again, you could get unpredictable behavior--often, a
206core dump. Second, Perl isn't itself re-entrant at the lowest levels.
207If the signal interrupts Perl while Perl is changing its own internal
208data structures, similarly unpredictable behaviour may result.
209
210There are two things you can do, knowing this: be paranoid or be
211pragmatic. The paranoid approach is to do as little as possible in your
212signal handler. Set an existing integer variable that already has a
213value, and return. This doesn't help you if you're in a slow system call,
214which will just restart. That means you have to C<die> to longjump(3) out
215of the handler. Even this is a little cavalier for the true paranoiac,
216who avoids C<die> in a handler because the system I<is> out to get you.
217The pragmatic approach is to say ``I know the risks, but prefer the
218convenience'', and to do anything you want in your signal handler,
219prepared to clean up core dumps now and again.
220
221To forbid signal handlers altogether would bars you from
222many interesting programs, including virtually everything in this manpage,
223since you could no longer even write SIGCHLD handlers. Their dodginess
224is expected to be addresses in the 5.005 release.
225
a0d0e21e 226
4633a7c4 227=head1 Using open() for IPC
228
229Perl's basic open() statement can also be used for unidirectional interprocess
230communication by either appending or prepending a pipe symbol to the second
a2eb9003 231argument to open(). Here's how to start something up in a child process you
4633a7c4 232intend to write to:
233
54310121 234 open(SPOOLER, "| cat -v | lpr -h 2>/dev/null")
4633a7c4 235 || die "can't fork: $!";
236 local $SIG{PIPE} = sub { die "spooler pipe broke" };
237 print SPOOLER "stuff\n";
238 close SPOOLER || die "bad spool: $! $?";
239
240And here's how to start up a child process you intend to read from:
241
242 open(STATUS, "netstat -an 2>&1 |")
243 || die "can't fork: $!";
244 while (<STATUS>) {
245 next if /^(tcp|udp)/;
246 print;
54310121 247 }
a2eb9003 248 close STATUS || die "bad netstat: $! $?";
4633a7c4 249
250If one can be sure that a particular program is a Perl script that is
251expecting filenames in @ARGV, the clever programmer can write something
252like this:
253
5a964f20 254 % program f1 "cmd1|" - f2 "cmd2|" f3 < tmpfile
4633a7c4 255
256and irrespective of which shell it's called from, the Perl program will
257read from the file F<f1>, the process F<cmd1>, standard input (F<tmpfile>
258in this case), the F<f2> file, the F<cmd2> command, and finally the F<f3>
259file. Pretty nifty, eh?
260
54310121 261You might notice that you could use backticks for much the
4633a7c4 262same effect as opening a pipe for reading:
263
264 print grep { !/^(tcp|udp)/ } `netstat -an 2>&1`;
265 die "bad netstat" if $?;
266
267While this is true on the surface, it's much more efficient to process the
268file one line or record at a time because then you don't have to read the
269whole thing into memory at once. It also gives you finer control of the
270whole process, letting you to kill off the child process early if you'd
271like.
272
273Be careful to check both the open() and the close() return values. If
274you're I<writing> to a pipe, you should also trap SIGPIPE. Otherwise,
275think of what happens when you start up a pipe to a command that doesn't
276exist: the open() will in all likelihood succeed (it only reflects the
277fork()'s success), but then your output will fail--spectacularly. Perl
278can't know whether the command worked because your command is actually
279running in a separate process whose exec() might have failed. Therefore,
6a3992aa 280while readers of bogus commands return just a quick end of file, writers
4633a7c4 281to bogus command will trigger a signal they'd better be prepared to
282handle. Consider:
283
5a964f20 284 open(FH, "|bogus") or die "can't fork: $!";
285 print FH "bang\n" or die "can't write: $!";
286 close FH or die "can't close: $!";
287
288That won't blow up until the close, and it will blow up with a SIGPIPE.
289To catch it, you could use this:
290
291 $SIG{PIPE} = 'IGNORE';
292 open(FH, "|bogus") or die "can't fork: $!";
293 print FH "bang\n" or die "can't write: $!";
294 close FH or die "can't close: status=$?";
4633a7c4 295
68dc0745 296=head2 Filehandles
297
5a964f20 298Both the main process and any child processes it forks share the same
299STDIN, STDOUT, and STDERR filehandles. If both processes try to access
300them at once, strange things can happen. You'll certainly want to any
301stdio flush output buffers before forking. You may also want to close
302or reopen the filehandles for the child. You can get around this by
303opening your pipe with open(), but on some systems this means that the
304child process cannot outlive the parent.
68dc0745 305
306=head2 Background Processes
307
308You can run a command in the background with:
309
7b05b7e3 310 system("cmd &");
68dc0745 311
312The command's STDOUT and STDERR (and possibly STDIN, depending on your
313shell) will be the same as the parent's. You won't need to catch
314SIGCHLD because of the double-fork taking place (see below for more
315details).
316
317=head2 Complete Dissociation of Child from Parent
318
319In some cases (starting server processes, for instance) you'll want to
5a964f20 320complete dissociate the child process from the parent. The easiest
321way is to use:
322
323 use POSIX qw(setsid);
324 setsid() or die "Can't start a new session: $!";
325
326However, you may not be on POSIX. The following process is reported
327to work on most Unixish systems. Non-Unix users should check their
328Your_OS::Process module for other solutions.
68dc0745 329
330=over 4
331
332=item *
333
7a2e2cd6 334Open /dev/tty and use the TIOCNOTTY ioctl on it. See L<tty(4)>
68dc0745 335for details.
336
337=item *
338
339Change directory to /
340
341=item *
342
343Reopen STDIN, STDOUT, and STDERR so they're not connected to the old
344tty.
345
346=item *
347
348Background yourself like this:
349
350 fork && exit;
351
5a964f20 352=item *
353
354Ignore hangup signals in case you're running on a shell that doesn't
355automatically no-hup you:
356
357 $SIG{HUP} = 'IGNORE'; # or whatever you'd like
358
68dc0745 359=back
360
4633a7c4 361=head2 Safe Pipe Opens
362
363Another interesting approach to IPC is making your single program go
364multiprocess and communicate between (or even amongst) yourselves. The
365open() function will accept a file argument of either C<"-|"> or C<"|-">
366to do a very interesting thing: it forks a child connected to the
367filehandle you've opened. The child is running the same program as the
368parent. This is useful for safely opening a file when running under an
369assumed UID or GID, for example. If you open a pipe I<to> minus, you can
370write to the filehandle you opened and your kid will find it in his
371STDIN. If you open a pipe I<from> minus, you can read from the filehandle
372you opened whatever your kid writes to his STDOUT.
373
374 use English;
375 my $sleep_count = 0;
376
54310121 377 do {
c07a80fd 378 $pid = open(KID_TO_WRITE, "|-");
4633a7c4 379 unless (defined $pid) {
380 warn "cannot fork: $!";
381 die "bailing out" if $sleep_count++ > 6;
382 sleep 10;
54310121 383 }
4633a7c4 384 } until defined $pid;
385
386 if ($pid) { # parent
c07a80fd 387 print KID_TO_WRITE @some_data;
388 close(KID_TO_WRITE) || warn "kid exited $?";
4633a7c4 389 } else { # child
390 ($EUID, $EGID) = ($UID, $GID); # suid progs only
54310121 391 open (FILE, "> /safe/file")
4633a7c4 392 || die "can't open /safe/file: $!";
393 while (<STDIN>) {
394 print FILE; # child's STDIN is parent's KID
54310121 395 }
4633a7c4 396 exit; # don't forget this
54310121 397 }
4633a7c4 398
399Another common use for this construct is when you need to execute
400something without the shell's interference. With system(), it's
54310121 401straightforward, but you can't use a pipe open or backticks safely.
4633a7c4 402That's because there's no way to stop the shell from getting its hands on
403your arguments. Instead, use lower-level control to call exec() directly.
404
54310121 405Here's a safe backtick or pipe open for read:
4633a7c4 406
407 # add error processing as above
c07a80fd 408 $pid = open(KID_TO_READ, "-|");
4633a7c4 409
410 if ($pid) { # parent
c07a80fd 411 while (<KID_TO_READ>) {
4633a7c4 412 # do something interesting
54310121 413 }
c07a80fd 414 close(KID_TO_READ) || warn "kid exited $?";
4633a7c4 415
416 } else { # child
417 ($EUID, $EGID) = ($UID, $GID); # suid only
418 exec($program, @options, @args)
419 || die "can't exec program: $!";
420 # NOTREACHED
54310121 421 }
4633a7c4 422
423
424And here's a safe pipe open for writing:
425
426 # add error processing as above
c07a80fd 427 $pid = open(KID_TO_WRITE, "|-");
4633a7c4 428 $SIG{ALRM} = sub { die "whoops, $program pipe broke" };
429
430 if ($pid) { # parent
431 for (@data) {
c07a80fd 432 print KID_TO_WRITE;
54310121 433 }
c07a80fd 434 close(KID_TO_WRITE) || warn "kid exited $?";
4633a7c4 435
436 } else { # child
437 ($EUID, $EGID) = ($UID, $GID);
438 exec($program, @options, @args)
439 || die "can't exec program: $!";
440 # NOTREACHED
54310121 441 }
4633a7c4 442
443Note that these operations are full Unix forks, which means they may not be
444correctly implemented on alien systems. Additionally, these are not true
54310121 445multithreading. If you'd like to learn more about threading, see the
184e9718 446F<modules> file mentioned below in the SEE ALSO section.
4633a7c4 447
7b05b7e3 448=head2 Bidirectional Communication with Another Process
4633a7c4 449
450While this works reasonably well for unidirectional communication, what
451about bidirectional communication? The obvious thing you'd like to do
452doesn't actually work:
453
c07a80fd 454 open(PROG_FOR_READING_AND_WRITING, "| some program |")
4633a7c4 455
54310121 456and if you forget to use the B<-w> flag, then you'll miss out
4633a7c4 457entirely on the diagnostic message:
458
459 Can't do bidirectional pipe at -e line 1.
460
461If you really want to, you can use the standard open2() library function
7b05b7e3 462to catch both ends. There's also an open3() for tridirectional I/O so you
4633a7c4 463can also catch your child's STDERR, but doing so would then require an
464awkward select() loop and wouldn't allow you to use normal Perl input
465operations.
466
467If you look at its source, you'll see that open2() uses low-level
5a964f20 468primitives like Unix pipe() and exec() calls to create all the connections.
4633a7c4 469While it might have been slightly more efficient by using socketpair(), it
470would have then been even less portable than it already is. The open2()
471and open3() functions are unlikely to work anywhere except on a Unix
472system or some other one purporting to be POSIX compliant.
473
474Here's an example of using open2():
475
476 use FileHandle;
477 use IPC::Open2;
5a964f20 478 $pid = open2(*Reader, *Writer, "cat -u -n" );
4633a7c4 479 Writer->autoflush(); # default here, actually
480 print Writer "stuff\n";
481 $got = <Reader>;
482
6a3992aa 483The problem with this is that Unix buffering is really going to
484ruin your day. Even though your C<Writer> filehandle is auto-flushed,
4633a7c4 485and the process on the other end will get your data in a timely manner,
6a3992aa 486you can't usually do anything to force it to give it back to you
54310121 487in a similarly quick fashion. In this case, we could, because we
4633a7c4 488gave I<cat> a B<-u> flag to make it unbuffered. But very few Unix
489commands are designed to operate over pipes, so this seldom works
54310121 490unless you yourself wrote the program on the other end of the
4633a7c4 491double-ended pipe.
492
54310121 493A solution to this is the nonstandard F<Comm.pl> library. It uses
4633a7c4 494pseudo-ttys to make your program behave more reasonably:
495
496 require 'Comm.pl';
497 $ph = open_proc('cat -n');
498 for (1..10) {
499 print $ph "a line\n";
500 print "got back ", scalar <$ph>;
501 }
a0d0e21e 502
4633a7c4 503This way you don't have to have control over the source code of the
54310121 504program you're using. The F<Comm> library also has expect()
505and interact() functions. Find the library (and we hope its
4633a7c4 506successor F<IPC::Chat>) at your nearest CPAN archive as detailed
184e9718 507in the SEE ALSO section below.
a0d0e21e 508
5a964f20 509=head2 Bidirectional Communication with Yourself
510
511If you want, you may make low-level pipe() and fork()
512to stitch this together by hand. This example only
513talks to itself, but you could reopen the appropriate
514handles to STDIN and STDOUT and call other processes.
515
516 #!/usr/bin/perl -w
517 # pipe1 - bidirectional communication using two pipe pairs
518 # designed for the socketpair-challenged
519 use IO::Handle; # thousands of lines just for autoflush :-(
520 pipe(PARENT_RDR, CHILD_WTR); # XXX: failure?
521 pipe(CHILD_RDR, PARENT_WTR); # XXX: failure?
522 CHILD_WTR->autoflush(1);
523 PARENT_WTR->autoflush(1);
524
525 if ($pid = fork) {
526 close PARENT_RDR; close PARENT_WTR;
527 print CHILD_WTR "Parent Pid $$ is sending this\n";
528 chomp($line = <CHILD_RDR>);
529 print "Parent Pid $$ just read this: `$line'\n";
530 close CHILD_RDR; close CHILD_WTR;
531 waitpid($pid,0);
532 } else {
533 die "cannot fork: $!" unless defined $pid;
534 close CHILD_RDR; close CHILD_WTR;
535 chomp($line = <PARENT_RDR>);
536 print "Child Pid $$ just read this: `$line'\n";
537 print PARENT_WTR "Child Pid $$ is sending this\n";
538 close PARENT_RDR; close PARENT_WTR;
539 exit;
540 }
541
542But you don't actually have to make two pipe calls. If you
543have the socketpair() system call, it will do this all for you.
544
545 #!/usr/bin/perl -w
546 # pipe2 - bidirectional communication using socketpair
547 # "the best ones always go both ways"
548
549 use Socket;
550 use IO::Handle; # thousands of lines just for autoflush :-(
551 # We say AF_UNIX because although *_LOCAL is the
552 # POSIX 1003.1g form of the constant, many machines
553 # still don't have it.
554 socketpair(CHILD, PARENT, AF_UNIX, SOCK_STREAM, PF_UNSPEC)
555 or die "socketpair: $!";
556
557 CHILD->autoflush(1);
558 PARENT->autoflush(1);
559
560 if ($pid = fork) {
561 close PARENT;
562 print CHILD "Parent Pid $$ is sending this\n";
563 chomp($line = <CHILD>);
564 print "Parent Pid $$ just read this: `$line'\n";
565 close CHILD;
566 waitpid($pid,0);
567 } else {
568 die "cannot fork: $!" unless defined $pid;
569 close CHILD;
570 chomp($line = <PARENT>);
571 print "Child Pid $$ just read this: `$line'\n";
572 print PARENT "Child Pid $$ is sending this\n";
573 close PARENT;
574 exit;
575 }
576
4633a7c4 577=head1 Sockets: Client/Server Communication
a0d0e21e 578
6a3992aa 579While not limited to Unix-derived operating systems (e.g., WinSock on PCs
4633a7c4 580provides socket support, as do some VMS libraries), you may not have
184e9718 581sockets on your system, in which case this section probably isn't going to do
6a3992aa 582you much good. With sockets, you can do both virtual circuits (i.e., TCP
583streams) and datagrams (i.e., UDP packets). You may be able to do even more
4633a7c4 584depending on your system.
585
586The Perl function calls for dealing with sockets have the same names as
587the corresponding system calls in C, but their arguments tend to differ
588for two reasons: first, Perl filehandles work differently than C file
589descriptors. Second, Perl already knows the length of its strings, so you
590don't need to pass that information.
a0d0e21e 591
4633a7c4 592One of the major problems with old socket code in Perl was that it used
593hard-coded values for some of the constants, which severely hurt
594portability. If you ever see code that does anything like explicitly
595setting C<$AF_INET = 2>, you know you're in for big trouble: An
596immeasurably superior approach is to use the C<Socket> module, which more
597reliably grants access to various constants and functions you'll need.
a0d0e21e 598
68dc0745 599If you're not writing a server/client for an existing protocol like
600NNTP or SMTP, you should give some thought to how your server will
601know when the client has finished talking, and vice-versa. Most
602protocols are based on one-line messages and responses (so one party
4a6725af 603knows the other has finished when a "\n" is received) or multi-line
68dc0745 604messages and responses that end with a period on an empty line
605("\n.\n" terminates a message/response).
606
5a964f20 607=head2 Internet Line Terminators
608
609The Internet line terminator is "\015\012". Under ASCII variants of
610Unix, that could usually be written as "\r\n", but under other systems,
611"\r\n" might at times be "\015\015\012", "\012\012\015", or something
612completely different. The standards specify writing "\015\012" to be
613conformant (be strict in what you provide), but they also recommend
614accepting a lone "\012" on input (but be lenient in what you require).
615We haven't always been very good about that in the code in this manpage,
616but unless you're on a Mac, you'll probably be ok.
617
4633a7c4 618=head2 Internet TCP Clients and Servers
a0d0e21e 619
4633a7c4 620Use Internet-domain sockets when you want to do client-server
621communication that might extend to machines outside of your own system.
622
623Here's a sample TCP client using Internet-domain sockets:
624
625 #!/usr/bin/perl -w
4633a7c4 626 use strict;
627 use Socket;
628 my ($remote,$port, $iaddr, $paddr, $proto, $line);
629
630 $remote = shift || 'localhost';
631 $port = shift || 2345; # random port
632 if ($port =~ /\D/) { $port = getservbyname($port, 'tcp') }
633 die "No port" unless $port;
634 $iaddr = inet_aton($remote) || die "no host: $remote";
635 $paddr = sockaddr_in($port, $iaddr);
636
637 $proto = getprotobyname('tcp');
638 socket(SOCK, PF_INET, SOCK_STREAM, $proto) || die "socket: $!";
639 connect(SOCK, $paddr) || die "connect: $!";
54310121 640 while (defined($line = <SOCK>)) {
4633a7c4 641 print $line;
54310121 642 }
4633a7c4 643
644 close (SOCK) || die "close: $!";
645 exit;
646
647And here's a corresponding server to go along with it. We'll
648leave the address as INADDR_ANY so that the kernel can choose
54310121 649the appropriate interface on multihomed hosts. If you want sit
c07a80fd 650on a particular interface (like the external side of a gateway
651or firewall machine), you should fill this in with your real address
652instead.
653
654 #!/usr/bin/perl -Tw
c07a80fd 655 use strict;
656 BEGIN { $ENV{PATH} = '/usr/ucb:/bin' }
657 use Socket;
658 use Carp;
5a964f20 659 $EOL = "\015\012";
c07a80fd 660
54310121 661 sub logmsg { print "$0 $$: @_ at ", scalar localtime, "\n" }
c07a80fd 662
663 my $port = shift || 2345;
664 my $proto = getprotobyname('tcp');
6a3992aa 665 $port = $1 if $port =~ /(\d+)/; # untaint port number
666
c07a80fd 667 socket(Server, PF_INET, SOCK_STREAM, $proto) || die "socket: $!";
54310121 668 setsockopt(Server, SOL_SOCKET, SO_REUSEADDR,
c07a80fd 669 pack("l", 1)) || die "setsockopt: $!";
670 bind(Server, sockaddr_in($port, INADDR_ANY)) || die "bind: $!";
671 listen(Server,SOMAXCONN) || die "listen: $!";
672
673 logmsg "server started on port $port";
674
675 my $paddr;
676
677 $SIG{CHLD} = \&REAPER;
678
679 for ( ; $paddr = accept(Client,Server); close Client) {
680 my($port,$iaddr) = sockaddr_in($paddr);
681 my $name = gethostbyaddr($iaddr,AF_INET);
682
54310121 683 logmsg "connection from $name [",
684 inet_ntoa($iaddr), "]
c07a80fd 685 at port $port";
686
54310121 687 print Client "Hello there, $name, it's now ",
5a964f20 688 scalar localtime, $EOL;
54310121 689 }
c07a80fd 690
54310121 691And here's a multithreaded version. It's multithreaded in that
692like most typical servers, it spawns (forks) a slave server to
c07a80fd 693handle the client request so that the master server can quickly
694go back to service a new client.
4633a7c4 695
696 #!/usr/bin/perl -Tw
4633a7c4 697 use strict;
698 BEGIN { $ENV{PATH} = '/usr/ucb:/bin' }
a0d0e21e 699 use Socket;
4633a7c4 700 use Carp;
5a964f20 701 $EOL = "\015\012";
a0d0e21e 702
4633a7c4 703 sub spawn; # forward declaration
54310121 704 sub logmsg { print "$0 $$: @_ at ", scalar localtime, "\n" }
a0d0e21e 705
4633a7c4 706 my $port = shift || 2345;
707 my $proto = getprotobyname('tcp');
80aa6872 708 $port = $1 if $port =~ /(\d+)/; # untaint port number
54310121 709
c07a80fd 710 socket(Server, PF_INET, SOCK_STREAM, $proto) || die "socket: $!";
54310121 711 setsockopt(Server, SOL_SOCKET, SO_REUSEADDR,
c07a80fd 712 pack("l", 1)) || die "setsockopt: $!";
713 bind(Server, sockaddr_in($port, INADDR_ANY)) || die "bind: $!";
714 listen(Server,SOMAXCONN) || die "listen: $!";
a0d0e21e 715
4633a7c4 716 logmsg "server started on port $port";
a0d0e21e 717
4633a7c4 718 my $waitedpid = 0;
719 my $paddr;
a0d0e21e 720
54310121 721 sub REAPER {
4633a7c4 722 $waitedpid = wait;
6a3992aa 723 $SIG{CHLD} = \&REAPER; # loathe sysV
4633a7c4 724 logmsg "reaped $waitedpid" . ($? ? " with exit $?" : '');
725 }
726
727 $SIG{CHLD} = \&REAPER;
728
54310121 729 for ( $waitedpid = 0;
730 ($paddr = accept(Client,Server)) || $waitedpid;
731 $waitedpid = 0, close Client)
4633a7c4 732 {
6a3992aa 733 next if $waitedpid and not $paddr;
4633a7c4 734 my($port,$iaddr) = sockaddr_in($paddr);
735 my $name = gethostbyaddr($iaddr,AF_INET);
736
54310121 737 logmsg "connection from $name [",
738 inet_ntoa($iaddr), "]
4633a7c4 739 at port $port";
a0d0e21e 740
54310121 741 spawn sub {
5a964f20 742 print "Hello there, $name, it's now ", scalar localtime, $EOL;
743 exec '/usr/games/fortune' # XXX: `wrong' line terminators
4633a7c4 744 or confess "can't exec fortune: $!";
745 };
a0d0e21e 746
54310121 747 }
a0d0e21e 748
4633a7c4 749 sub spawn {
750 my $coderef = shift;
a0d0e21e 751
54310121 752 unless (@_ == 0 && $coderef && ref($coderef) eq 'CODE') {
4633a7c4 753 confess "usage: spawn CODEREF";
a0d0e21e 754 }
4633a7c4 755
756 my $pid;
757 if (!defined($pid = fork)) {
758 logmsg "cannot fork: $!";
759 return;
760 } elsif ($pid) {
761 logmsg "begat $pid";
6a3992aa 762 return; # I'm the parent
4633a7c4 763 }
6a3992aa 764 # else I'm the child -- go spawn
4633a7c4 765
c07a80fd 766 open(STDIN, "<&Client") || die "can't dup client to stdin";
767 open(STDOUT, ">&Client") || die "can't dup client to stdout";
4633a7c4 768 ## open(STDERR, ">&STDOUT") || die "can't dup stdout to stderr";
769 exit &$coderef();
54310121 770 }
4633a7c4 771
772This server takes the trouble to clone off a child version via fork() for
773each incoming request. That way it can handle many requests at once,
774which you might not always want. Even if you don't fork(), the listen()
775will allow that many pending connections. Forking servers have to be
776particularly careful about cleaning up their dead children (called
777"zombies" in Unix parlance), because otherwise you'll quickly fill up your
778process table.
779
780We suggest that you use the B<-T> flag to use taint checking (see L<perlsec>)
781even if we aren't running setuid or setgid. This is always a good idea
782for servers and other programs run on behalf of someone else (like CGI
783scripts), because it lessens the chances that people from the outside will
784be able to compromise your system.
785
786Let's look at another TCP client. This one connects to the TCP "time"
787service on a number of different machines and shows how far their clocks
788differ from the system on which it's being run:
789
790 #!/usr/bin/perl -w
4633a7c4 791 use strict;
792 use Socket;
793
794 my $SECS_of_70_YEARS = 2208988800;
54310121 795 sub ctime { scalar localtime(shift) }
4633a7c4 796
54310121 797 my $iaddr = gethostbyname('localhost');
798 my $proto = getprotobyname('tcp');
799 my $port = getservbyname('time', 'tcp');
4633a7c4 800 my $paddr = sockaddr_in(0, $iaddr);
801 my($host);
802
803 $| = 1;
804 printf "%-24s %8s %s\n", "localhost", 0, ctime(time());
805
806 foreach $host (@ARGV) {
807 printf "%-24s ", $host;
808 my $hisiaddr = inet_aton($host) || die "unknown host";
809 my $hispaddr = sockaddr_in($port, $hisiaddr);
810 socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die "socket: $!";
811 connect(SOCKET, $hispaddr) || die "bind: $!";
812 my $rtime = ' ';
813 read(SOCKET, $rtime, 4);
814 close(SOCKET);
815 my $histime = unpack("N", $rtime) - $SECS_of_70_YEARS ;
816 printf "%8d %s\n", $histime - time, ctime($histime);
a0d0e21e 817 }
818
4633a7c4 819=head2 Unix-Domain TCP Clients and Servers
820
a2eb9003 821That's fine for Internet-domain clients and servers, but what about local
4633a7c4 822communications? While you can use the same setup, sometimes you don't
823want to. Unix-domain sockets are local to the current host, and are often
54310121 824used internally to implement pipes. Unlike Internet domain sockets, Unix
4633a7c4 825domain sockets can show up in the file system with an ls(1) listing.
826
5a964f20 827 % ls -l /dev/log
4633a7c4 828 srw-rw-rw- 1 root 0 Oct 31 07:23 /dev/log
a0d0e21e 829
4633a7c4 830You can test for these with Perl's B<-S> file test:
831
832 unless ( -S '/dev/log' ) {
833 die "something's wicked with the print system";
54310121 834 }
4633a7c4 835
836Here's a sample Unix-domain client:
837
838 #!/usr/bin/perl -w
4633a7c4 839 use Socket;
840 use strict;
841 my ($rendezvous, $line);
842
843 $rendezvous = shift || '/tmp/catsock';
844 socket(SOCK, PF_UNIX, SOCK_STREAM, 0) || die "socket: $!";
9607fc9c 845 connect(SOCK, sockaddr_un($rendezvous)) || die "connect: $!";
54310121 846 while (defined($line = <SOCK>)) {
4633a7c4 847 print $line;
54310121 848 }
4633a7c4 849 exit;
850
5a964f20 851And here's a corresponding server. You don't have to worry about silly
852network terminators here because Unix domain sockets are guaranteed
853to be on the localhost, and thus everything works right.
4633a7c4 854
855 #!/usr/bin/perl -Tw
4633a7c4 856 use strict;
857 use Socket;
858 use Carp;
859
860 BEGIN { $ENV{PATH} = '/usr/ucb:/bin' }
5a964f20 861 sub logmsg { print "$0 $$: @_ at ", scalar localtime, "\n" }
4633a7c4 862
863 my $NAME = '/tmp/catsock';
864 my $uaddr = sockaddr_un($NAME);
865 my $proto = getprotobyname('tcp');
866
c07a80fd 867 socket(Server,PF_UNIX,SOCK_STREAM,0) || die "socket: $!";
4633a7c4 868 unlink($NAME);
c07a80fd 869 bind (Server, $uaddr) || die "bind: $!";
870 listen(Server,SOMAXCONN) || die "listen: $!";
4633a7c4 871
872 logmsg "server started on $NAME";
873
5a964f20 874 my $waitedpid;
875
876 sub REAPER {
877 $waitedpid = wait;
878 $SIG{CHLD} = \&REAPER; # loathe sysV
879 logmsg "reaped $waitedpid" . ($? ? " with exit $?" : '');
880 }
881
4633a7c4 882 $SIG{CHLD} = \&REAPER;
883
5a964f20 884
54310121 885 for ( $waitedpid = 0;
886 accept(Client,Server) || $waitedpid;
887 $waitedpid = 0, close Client)
4633a7c4 888 {
889 next if $waitedpid;
890 logmsg "connection on $NAME";
54310121 891 spawn sub {
4633a7c4 892 print "Hello there, it's now ", scalar localtime, "\n";
893 exec '/usr/games/fortune' or die "can't exec fortune: $!";
894 };
54310121 895 }
4633a7c4 896
897As you see, it's remarkably similar to the Internet domain TCP server, so
898much so, in fact, that we've omitted several duplicate functions--spawn(),
899logmsg(), ctime(), and REAPER()--which are exactly the same as in the
900other server.
901
902So why would you ever want to use a Unix domain socket instead of a
903simpler named pipe? Because a named pipe doesn't give you sessions. You
904can't tell one process's data from another's. With socket programming,
905you get a separate session for each client: that's why accept() takes two
906arguments.
907
908For example, let's say that you have a long running database server daemon
909that you want folks from the World Wide Web to be able to access, but only
910if they go through a CGI interface. You'd have a small, simple CGI
911program that does whatever checks and logging you feel like, and then acts
912as a Unix-domain client and connects to your private server.
913
7b05b7e3 914=head1 TCP Clients with IO::Socket
915
916For those preferring a higher-level interface to socket programming, the
917IO::Socket module provides an object-oriented approach. IO::Socket is
918included as part of the standard Perl distribution as of the 5.004
919release. If you're running an earlier version of Perl, just fetch
920IO::Socket from CPAN, where you'll also find find modules providing easy
921interfaces to the following systems: DNS, FTP, Ident (RFC 931), NIS and
922NISPlus, NNTP, Ping, POP3, SMTP, SNMP, SSLeay, Telnet, and Time--just
923to name a few.
924
925=head2 A Simple Client
926
927Here's a client that creates a TCP connection to the "daytime"
928service at port 13 of the host name "localhost" and prints out everything
929that the server there cares to provide.
930
931 #!/usr/bin/perl -w
932 use IO::Socket;
933 $remote = IO::Socket::INET->new(
934 Proto => "tcp",
935 PeerAddr => "localhost",
936 PeerPort => "daytime(13)",
937 )
938 or die "cannot connect to daytime port at localhost";
939 while ( <$remote> ) { print }
940
941When you run this program, you should get something back that
942looks like this:
943
944 Wed May 14 08:40:46 MDT 1997
945
946Here are what those parameters to the C<new> constructor mean:
947
948=over
949
950=item C<Proto>
951
952This is which protocol to use. In this case, the socket handle returned
953will be connected to a TCP socket, because we want a stream-oriented
954connection, that is, one that acts pretty much like a plain old file.
955Not all sockets are this of this type. For example, the UDP protocol
956can be used to make a datagram socket, used for message-passing.
957
958=item C<PeerAddr>
959
960This is the name or Internet address of the remote host the server is
961running on. We could have specified a longer name like C<"www.perl.com">,
962or an address like C<"204.148.40.9">. For demonstration purposes, we've
963used the special hostname C<"localhost">, which should always mean the
964current machine you're running on. The corresponding Internet address
965for localhost is C<"127.1">, if you'd rather use that.
966
967=item C<PeerPort>
968
969This is the service name or port number we'd like to connect to.
970We could have gotten away with using just C<"daytime"> on systems with a
971well-configured system services file,[FOOTNOTE: The system services file
972is in I</etc/services> under Unix] but just in case, we've specified the
973port number (13) in parentheses. Using just the number would also have
974worked, but constant numbers make careful programmers nervous.
975
976=back
977
978Notice how the return value from the C<new> constructor is used as
979a filehandle in the C<while> loop? That's what's called an indirect
980filehandle, a scalar variable containing a filehandle. You can use
981it the same way you would a normal filehandle. For example, you
982can read one line from it this way:
983
984 $line = <$handle>;
985
986all remaining lines from is this way:
987
988 @lines = <$handle>;
989
990and send a line of data to it this way:
991
992 print $handle "some data\n";
993
994=head2 A Webget Client
995
996Here's a simple client that takes a remote host to fetch a document
997from, and then a list of documents to get from that host. This is a
998more interesting client than the previous one because it first sends
999something to the server before fetching the server's response.
1000
1001 #!/usr/bin/perl -w
1002 use IO::Socket;
1003 unless (@ARGV > 1) { die "usage: $0 host document ..." }
1004 $host = shift(@ARGV);
5a964f20 1005 $EOL = "\015\012";
1006 $BLANK = $EOL x 2;
7b05b7e3 1007 foreach $document ( @ARGV ) {
1008 $remote = IO::Socket::INET->new( Proto => "tcp",
1009 PeerAddr => $host,
1010 PeerPort => "http(80)",
1011 );
1012 unless ($remote) { die "cannot connect to http daemon on $host" }
1013 $remote->autoflush(1);
5a964f20 1014 print $remote "GET $document HTTP/1.0" . $BLANK;
7b05b7e3 1015 while ( <$remote> ) { print }
1016 close $remote;
1017 }
1018
1019The web server handing the "http" service, which is assumed to be at
1020its standard port, number 80. If your the web server you're trying to
1021connect to is at a different port (like 1080 or 8080), you should specify
1022as the named-parameter pair, C<PeerPort =E<gt> 8080>. The C<autoflush>
1023method is used on the socket because otherwise the system would buffer
1024up the output we sent it. (If you're on a Mac, you'll also need to
1025change every C<"\n"> in your code that sends data over the network to
1026be a C<"\015\012"> instead.)
1027
1028Connecting to the server is only the first part of the process: once you
1029have the connection, you have to use the server's language. Each server
1030on the network has its own little command language that it expects as
1031input. The string that we send to the server starting with "GET" is in
1032HTTP syntax. In this case, we simply request each specified document.
1033Yes, we really are making a new connection for each document, even though
1034it's the same host. That's the way you always used to have to speak HTTP.
1035Recent versions of web browsers may request that the remote server leave
1036the connection open a little while, but the server doesn't have to honor
1037such a request.
1038
1039Here's an example of running that program, which we'll call I<webget>:
1040
5a964f20 1041 % webget www.perl.com /guanaco.html
7b05b7e3 1042 HTTP/1.1 404 File Not Found
1043 Date: Thu, 08 May 1997 18:02:32 GMT
1044 Server: Apache/1.2b6
1045 Connection: close
1046 Content-type: text/html
1047
1048 <HEAD><TITLE>404 File Not Found</TITLE></HEAD>
1049 <BODY><H1>File Not Found</H1>
1050 The requested URL /guanaco.html was not found on this server.<P>
1051 </BODY>
1052
1053Ok, so that's not very interesting, because it didn't find that
1054particular document. But a long response wouldn't have fit on this page.
1055
1056For a more fully-featured version of this program, you should look to
1057the I<lwp-request> program included with the LWP modules from CPAN.
1058
1059=head2 Interactive Client with IO::Socket
1060
1061Well, that's all fine if you want to send one command and get one answer,
1062but what about setting up something fully interactive, somewhat like
1063the way I<telnet> works? That way you can type a line, get the answer,
1064type a line, get the answer, etc.
1065
1066This client is more complicated than the two we've done so far, but if
1067you're on a system that supports the powerful C<fork> call, the solution
1068isn't that rough. Once you've made the connection to whatever service
1069you'd like to chat with, call C<fork> to clone your process. Each of
1070these two identical process has a very simple job to do: the parent
1071copies everything from the socket to standard output, while the child
1072simultaneously copies everything from standard input to the socket.
1073To accomplish the same thing using just one process would be I<much>
1074harder, because it's easier to code two processes to do one thing than it
1075is to code one process to do two things. (This keep-it-simple principle
5a964f20 1076a cornerstones of the Unix philosophy, and good software engineering as
1077well, which is probably why it's spread to other systems.)
7b05b7e3 1078
1079Here's the code:
1080
1081 #!/usr/bin/perl -w
1082 use strict;
1083 use IO::Socket;
1084 my ($host, $port, $kidpid, $handle, $line);
1085
1086 unless (@ARGV == 2) { die "usage: $0 host port" }
1087 ($host, $port) = @ARGV;
1088
1089 # create a tcp connection to the specified host and port
1090 $handle = IO::Socket::INET->new(Proto => "tcp",
1091 PeerAddr => $host,
1092 PeerPort => $port)
1093 or die "can't connect to port $port on $host: $!";
1094
1095 $handle->autoflush(1); # so output gets there right away
1096 print STDERR "[Connected to $host:$port]\n";
1097
1098 # split the program into two processes, identical twins
1099 die "can't fork: $!" unless defined($kidpid = fork());
1100
1101 # the if{} block runs only in the parent process
1102 if ($kidpid) {
1103 # copy the socket to standard output
1104 while (defined ($line = <$handle>)) {
1105 print STDOUT $line;
1106 }
1107 kill("TERM", $kidpid); # send SIGTERM to child
1108 }
1109 # the else{} block runs only in the child process
1110 else {
1111 # copy standard input to the socket
1112 while (defined ($line = <STDIN>)) {
1113 print $handle $line;
1114 }
1115 }
1116
1117The C<kill> function in the parent's C<if> block is there to send a
1118signal to our child process (current running in the C<else> block)
1119as soon as the remote server has closed its end of the connection.
1120
7b05b7e3 1121If the remote server sends data a byte at time, and you need that
1122data immediately without waiting for a newline (which might not happen),
1123you may wish to replace the C<while> loop in the parent with the
1124following:
1125
1126 my $byte;
1127 while (sysread($handle, $byte, 1) == 1) {
1128 print STDOUT $byte;
1129 }
1130
1131Making a system call for each byte you want to read is not very efficient
1132(to put it mildly) but is the simplest to explain and works reasonably
1133well.
1134
1135=head1 TCP Servers with IO::Socket
1136
5a964f20 1137As always, setting up a server is little bit more involved than running a client.
7b05b7e3 1138The model is that the server creates a special kind of socket that
1139does nothing but listen on a particular port for incoming connections.
1140It does this by calling the C<IO::Socket::INET-E<gt>new()> method with
1141slightly different arguments than the client did.
1142
1143=over
1144
1145=item Proto
1146
1147This is which protocol to use. Like our clients, we'll
1148still specify C<"tcp"> here.
1149
1150=item LocalPort
1151
1152We specify a local
1153port in the C<LocalPort> argument, which we didn't do for the client.
1154This is service name or port number for which you want to be the
1155server. (Under Unix, ports under 1024 are restricted to the
1156superuser.) In our sample, we'll use port 9000, but you can use
1157any port that's not currently in use on your system. If you try
1158to use one already in used, you'll get an "Address already in use"
1159message. Under Unix, the C<netstat -a> command will show
1160which services current have servers.
1161
1162=item Listen
1163
1164The C<Listen> parameter is set to the maximum number of
1165pending connections we can accept until we turn away incoming clients.
1166Think of it as a call-waiting queue for your telephone.
1167The low-level Socket module has a special symbol for the system maximum, which
1168is SOMAXCONN.
1169
1170=item Reuse
1171
1172The C<Reuse> parameter is needed so that we restart our server
1173manually without waiting a few minutes to allow system buffers to
1174clear out.
1175
1176=back
1177
1178Once the generic server socket has been created using the parameters
1179listed above, the server then waits for a new client to connect
1180to it. The server blocks in the C<accept> method, which eventually an
1181bidirectional connection to the remote client. (Make sure to autoflush
1182this handle to circumvent buffering.)
1183
1184To add to user-friendliness, our server prompts the user for commands.
1185Most servers don't do this. Because of the prompt without a newline,
1186you'll have to use the C<sysread> variant of the interactive client above.
1187
1188This server accepts one of five different commands, sending output
1189back to the client. Note that unlike most network servers, this one
1190only handles one incoming client at a time. Multithreaded servers are
7b8d334a 1191covered in Chapter 6 of the Camel as well as later in this manpage.
7b05b7e3 1192
1193Here's the code. We'll
1194
1195 #!/usr/bin/perl -w
1196 use IO::Socket;
1197 use Net::hostent; # for OO version of gethostbyaddr
1198
1199 $PORT = 9000; # pick something not in use
1200
1201 $server = IO::Socket::INET->new( Proto => 'tcp',
1202 LocalPort => $PORT,
1203 Listen => SOMAXCONN,
1204 Reuse => 1);
1205
1206 die "can't setup server" unless $server;
1207 print "[Server $0 accepting clients]\n";
1208
1209 while ($client = $server->accept()) {
1210 $client->autoflush(1);
1211 print $client "Welcome to $0; type help for command list.\n";
1212 $hostinfo = gethostbyaddr($client->peeraddr);
1213 printf "[Connect from %s]\n", $hostinfo->name || $client->peerhost;
1214 print $client "Command? ";
1215 while ( <$client>) {
1216 next unless /\S/; # blank line
1217 if (/quit|exit/i) { last; }
1218 elsif (/date|time/i) { printf $client "%s\n", scalar localtime; }
1219 elsif (/who/i ) { print $client `who 2>&1`; }
1220 elsif (/cookie/i ) { print $client `/usr/games/fortune 2>&1`; }
1221 elsif (/motd/i ) { print $client `cat /etc/motd 2>&1`; }
1222 else {
1223 print $client "Commands: quit date who cookie motd\n";
1224 }
1225 } continue {
1226 print $client "Command? ";
1227 }
1228 close $client;
1229 }
1230
1231=head1 UDP: Message Passing
4633a7c4 1232
1233Another kind of client-server setup is one that uses not connections, but
1234messages. UDP communications involve much lower overhead but also provide
1235less reliability, as there are no promises that messages will arrive at
1236all, let alone in order and unmangled. Still, UDP offers some advantages
1237over TCP, including being able to "broadcast" or "multicast" to a whole
1238bunch of destination hosts at once (usually on your local subnet). If you
1239find yourself overly concerned about reliability and start building checks
6a3992aa 1240into your message system, then you probably should use just TCP to start
4633a7c4 1241with.
1242
1243Here's a UDP program similar to the sample Internet TCP client given
7b05b7e3 1244earlier. However, instead of checking one host at a time, the UDP version
4633a7c4 1245will check many of them asynchronously by simulating a multicast and then
1246using select() to do a timed-out wait for I/O. To do something similar
1247with TCP, you'd have to use a different socket handle for each host.
1248
1249 #!/usr/bin/perl -w
1250 use strict;
4633a7c4 1251 use Socket;
1252 use Sys::Hostname;
1253
54310121 1254 my ( $count, $hisiaddr, $hispaddr, $histime,
1255 $host, $iaddr, $paddr, $port, $proto,
4633a7c4 1256 $rin, $rout, $rtime, $SECS_of_70_YEARS);
1257
1258 $SECS_of_70_YEARS = 2208988800;
1259
1260 $iaddr = gethostbyname(hostname());
1261 $proto = getprotobyname('udp');
1262 $port = getservbyname('time', 'udp');
1263 $paddr = sockaddr_in(0, $iaddr); # 0 means let kernel pick
1264
1265 socket(SOCKET, PF_INET, SOCK_DGRAM, $proto) || die "socket: $!";
1266 bind(SOCKET, $paddr) || die "bind: $!";
1267
1268 $| = 1;
1269 printf "%-12s %8s %s\n", "localhost", 0, scalar localtime time;
1270 $count = 0;
1271 for $host (@ARGV) {
1272 $count++;
1273 $hisiaddr = inet_aton($host) || die "unknown host";
1274 $hispaddr = sockaddr_in($port, $hisiaddr);
1275 defined(send(SOCKET, 0, 0, $hispaddr)) || die "send $host: $!";
1276 }
1277
1278 $rin = '';
1279 vec($rin, fileno(SOCKET), 1) = 1;
1280
1281 # timeout after 10.0 seconds
1282 while ($count && select($rout = $rin, undef, undef, 10.0)) {
1283 $rtime = '';
1284 ($hispaddr = recv(SOCKET, $rtime, 4, 0)) || die "recv: $!";
1285 ($port, $hisiaddr) = sockaddr_in($hispaddr);
1286 $host = gethostbyaddr($hisiaddr, AF_INET);
1287 $histime = unpack("N", $rtime) - $SECS_of_70_YEARS ;
1288 printf "%-12s ", $host;
1289 printf "%8d %s\n", $histime - time, scalar localtime($histime);
1290 $count--;
1291 }
1292
1293=head1 SysV IPC
1294
1295While System V IPC isn't so widely used as sockets, it still has some
1296interesting uses. You can't, however, effectively use SysV IPC or
1297Berkeley mmap() to have shared memory so as to share a variable amongst
1298several processes. That's because Perl would reallocate your string when
1299you weren't wanting it to.
1300
54310121 1301Here's a small example showing shared memory usage.
a0d0e21e 1302
1303 $IPC_PRIVATE = 0;
1304 $IPC_RMID = 0;
1305 $size = 2000;
1306 $key = shmget($IPC_PRIVATE, $size , 0777 );
4633a7c4 1307 die unless defined $key;
a0d0e21e 1308
1309 $message = "Message #1";
1310 shmwrite($key, $message, 0, 60 ) || die "$!";
1311 shmread($key,$buff,0,60) || die "$!";
1312
1313 print $buff,"\n";
1314
1315 print "deleting $key\n";
1316 shmctl($key ,$IPC_RMID, 0) || die "$!";
1317
1318Here's an example of a semaphore:
1319
1320 $IPC_KEY = 1234;
1321 $IPC_RMID = 0;
1322 $IPC_CREATE = 0001000;
1323 $key = semget($IPC_KEY, $nsems , 0666 | $IPC_CREATE );
1324 die if !defined($key);
1325 print "$key\n";
1326
a2eb9003 1327Put this code in a separate file to be run in more than one process.
a0d0e21e 1328Call the file F<take>:
1329
1330 # create a semaphore
1331
1332 $IPC_KEY = 1234;
1333 $key = semget($IPC_KEY, 0 , 0 );
1334 die if !defined($key);
1335
1336 $semnum = 0;
1337 $semflag = 0;
1338
1339 # 'take' semaphore
1340 # wait for semaphore to be zero
1341 $semop = 0;
1342 $opstring1 = pack("sss", $semnum, $semop, $semflag);
1343
1344 # Increment the semaphore count
1345 $semop = 1;
1346 $opstring2 = pack("sss", $semnum, $semop, $semflag);
1347 $opstring = $opstring1 . $opstring2;
1348
1349 semop($key,$opstring) || die "$!";
1350
a2eb9003 1351Put this code in a separate file to be run in more than one process.
a0d0e21e 1352Call this file F<give>:
1353
4633a7c4 1354 # 'give' the semaphore
a0d0e21e 1355 # run this in the original process and you will see
1356 # that the second process continues
1357
1358 $IPC_KEY = 1234;
1359 $key = semget($IPC_KEY, 0, 0);
1360 die if !defined($key);
1361
1362 $semnum = 0;
1363 $semflag = 0;
1364
1365 # Decrement the semaphore count
1366 $semop = -1;
1367 $opstring = pack("sss", $semnum, $semop, $semflag);
1368
1369 semop($key,$opstring) || die "$!";
1370
7b05b7e3 1371The SysV IPC code above was written long ago, and it's definitely
1372clunky looking. It should at the very least be made to C<use strict>
1373and C<require "sys/ipc.ph">. Better yet, check out the IPC::SysV modules
1374on CPAN.
4633a7c4 1375
1376=head1 NOTES
1377
5a964f20 1378Most of these routines quietly but politely return C<undef> when they
1379fail instead of causing your program to die right then and there due to
1380an uncaught exception. (Actually, some of the new I<Socket> conversion
1381functions croak() on bad arguments.) It is therefore essential to
1382check return values from these functions. Always begin your socket
1383programs this way for optimal success, and don't forget to add B<-T>
1384taint checking flag to the #! line for servers:
4633a7c4 1385
5a964f20 1386 #!/usr/bin/perl -Tw
4633a7c4 1387 use strict;
1388 use sigtrap;
1389 use Socket;
1390
1391=head1 BUGS
1392
1393All these routines create system-specific portability problems. As noted
1394elsewhere, Perl is at the mercy of your C libraries for much of its system
1395behaviour. It's probably safest to assume broken SysV semantics for
6a3992aa 1396signals and to stick with simple TCP and UDP socket operations; e.g., don't
a2eb9003 1397try to pass open file descriptors over a local UDP datagram socket if you
4633a7c4 1398want your code to stand a chance of being portable.
1399
5a964f20 1400As mentioned in the signals section, because few vendors provide C
1401libraries that are safely re-entrant, the prudent programmer will do
1402little else within a handler beyond setting a numeric variable that
1403already exists; or, if locked into a slow (restarting) system call,
1404using die() to raise an exception and longjmp(3) out. In fact, even
1405these may in some cases cause a core dump. It's probably best to avoid
1406signals except where they are absolutely inevitable. This
1407will be addressed in a future release of Perl.
4633a7c4 1408
1409=head1 AUTHOR
1410
1411Tom Christiansen, with occasional vestiges of Larry Wall's original
7b05b7e3 1412version and suggestions from the Perl Porters.
4633a7c4 1413
1414=head1 SEE ALSO
1415
7b05b7e3 1416There's a lot more to networking than this, but this should get you
1417started.
1418
5a964f20 1419For intrepid programmers, the indispensable textbook is I<Unix Network
1420Programming> by W. Richard Stevens (published by Addison-Wesley). Note
1421that most books on networking address networking from the perspective of
1422a C programmer; translation to Perl is left as an exercise for the reader.
7b05b7e3 1423
1424The IO::Socket(3) manpage describes the object library, and the Socket(3)
1425manpage describes the low-level interface to sockets. Besides the obvious
1426functions in L<perlfunc>, you should also check out the F<modules> file
1427at your nearest CPAN site. (See L<perlmodlib> or best yet, the F<Perl
1428FAQ> for a description of what CPAN is and where to get it.)
1429
4633a7c4 1430Section 5 of the F<modules> file is devoted to "Networking, Device Control
6a3992aa 1431(modems), and Interprocess Communication", and contains numerous unbundled
4633a7c4 1432modules numerous networking modules, Chat and Expect operations, CGI
1433programming, DCE, FTP, IPC, NNTP, Proxy, Ptty, RPC, SNMP, SMTP, Telnet,
1434Threads, and ToolTalk--just to name a few.