2010-12-02 19:28:06 +00:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
|
|
|
# Copyright(C) 2010 Simon Howard
|
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or
|
|
|
|
# modify it under the terms of the GNU General Public License
|
|
|
|
# as published by the Free Software Foundation; either version 2
|
|
|
|
# of the License, or (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, write to the Free Software
|
|
|
|
# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
|
|
|
|
# 02111-1307, USA.
|
|
|
|
#
|
|
|
|
#
|
|
|
|
# Chocolate Doom master server.
|
|
|
|
#
|
|
|
|
|
|
|
|
import socket
|
|
|
|
import struct
|
|
|
|
from select import select
|
|
|
|
from time import time, strftime
|
|
|
|
|
|
|
|
# Filename of log file.
|
|
|
|
|
|
|
|
LOG_FILE = "chocolate-master.log"
|
|
|
|
|
|
|
|
# Servers must refresh themselves periodically. If nothing happens
|
|
|
|
# after this many seconds, remove them from the list.
|
|
|
|
|
|
|
|
SERVER_TIMEOUT = 2 * 60 * 60 # 2 hours
|
|
|
|
|
|
|
|
# Maximum length of a query response.
|
|
|
|
|
|
|
|
MAX_RESPONSE_LEN = 1000
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
# Normal packet types.
|
|
|
|
|
|
|
|
NET_PACKET_TYPE_QUERY = 13
|
|
|
|
NET_PACKET_TYPE_QUERY_RESPONSE = 14
|
|
|
|
|
2010-12-02 19:28:06 +00:00
|
|
|
# Packet types, matches the constants in net_defs.h.
|
|
|
|
|
|
|
|
NET_MASTER_PACKET_TYPE_ADD = 0
|
|
|
|
NET_MASTER_PACKET_TYPE_ADD_RESPONSE = 1
|
|
|
|
NET_MASTER_PACKET_TYPE_QUERY = 2
|
|
|
|
NET_MASTER_PACKET_TYPE_QUERY_RESPONSE = 3
|
|
|
|
|
|
|
|
# Address and port to listen on.
|
|
|
|
|
|
|
|
UDP_ADDRESS = socket.inet_ntoa(struct.pack(">l", socket.INADDR_ANY))
|
|
|
|
UDP_PORT = 2342
|
|
|
|
|
|
|
|
class Server:
|
|
|
|
""" A server that has registered itself. """
|
|
|
|
|
|
|
|
def __init__(self, addr):
|
|
|
|
self.addr = addr
|
2010-12-04 17:17:13 +00:00
|
|
|
self.verified = False
|
2010-12-02 19:28:06 +00:00
|
|
|
self.refresh()
|
|
|
|
|
|
|
|
def refresh(self):
|
|
|
|
self.add_time = time()
|
|
|
|
|
|
|
|
def timed_out(self):
|
|
|
|
return time() - self.add_time > SERVER_TIMEOUT
|
|
|
|
|
|
|
|
def encode_addr(self):
|
|
|
|
s = "%s:%i" % self.addr
|
|
|
|
|
|
|
|
# Encode string along with terminating NUL.
|
|
|
|
|
|
|
|
return struct.pack("%is" % (len(s) + 1), s)
|
|
|
|
|
|
|
|
class MasterServer:
|
|
|
|
def open_log_file(self):
|
|
|
|
self.log_file = open(LOG_FILE, "a")
|
|
|
|
|
|
|
|
def log_output(self, addr, s):
|
|
|
|
timestamp = strftime("%b %d %H:%M:%S")
|
|
|
|
self.log_file.write("%s %s:%i: %s\n" % ((timestamp,) + addr + (s,)))
|
|
|
|
self.log_file.flush()
|
|
|
|
|
|
|
|
def __init__(self, address, port):
|
|
|
|
""" Initialise a new master server. """
|
|
|
|
|
|
|
|
self.servers = {}
|
|
|
|
|
|
|
|
self.open_log_file()
|
|
|
|
|
|
|
|
self.server_addr = (address, port)
|
|
|
|
self.open_socket()
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
def send_query(self, server):
|
|
|
|
""" Send a query to the specified server. """
|
|
|
|
|
|
|
|
packet = struct.pack(">h", NET_PACKET_TYPE_QUERY)
|
|
|
|
|
|
|
|
self.query_sock.sendto(packet, server.addr)
|
|
|
|
|
|
|
|
def parse_query_response(self, data, addr):
|
|
|
|
""" Parse a packet received (presumably) in response to a
|
|
|
|
query that we sent to a server. """
|
|
|
|
|
|
|
|
# Unknown?
|
|
|
|
|
|
|
|
if addr not in self.servers:
|
|
|
|
return
|
|
|
|
|
|
|
|
server = self.servers[addr]
|
|
|
|
|
|
|
|
# Check packet type
|
|
|
|
|
|
|
|
packet_type, = struct.unpack(">h", data[0:2])
|
|
|
|
|
|
|
|
if packet_type != NET_PACKET_TYPE_QUERY_RESPONSE:
|
|
|
|
return
|
|
|
|
|
|
|
|
# TODO: Process rest of details so that we can maintain
|
|
|
|
# some information about list of servers?
|
|
|
|
|
|
|
|
# Server responded to our query, so it is verified.
|
|
|
|
# We can send a positive response to its add request.
|
|
|
|
|
|
|
|
if not server.verified:
|
|
|
|
self.log_output(server.addr, "Server responded to query, added")
|
|
|
|
server.verified = True
|
|
|
|
self.send_add_response(server, 1)
|
|
|
|
|
2010-12-02 19:28:06 +00:00
|
|
|
def send_message(self, addr, message_type, payload):
|
|
|
|
""" Send a message of the specified type to the specified
|
|
|
|
remote address. """
|
|
|
|
|
|
|
|
header = struct.pack(">h", message_type)
|
|
|
|
packet = header + payload
|
|
|
|
|
|
|
|
self.sock.sendto(packet, addr)
|
|
|
|
|
|
|
|
def response_packets(self):
|
|
|
|
""" Convert the list of servers into a list of payload strings
|
|
|
|
for responding to queries. """
|
|
|
|
|
|
|
|
packets = [struct.pack("")]
|
|
|
|
|
|
|
|
for server in self.servers.values():
|
|
|
|
encoded_addr = server.encode_addr()
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
# Only include verified servers.
|
|
|
|
|
|
|
|
if not server.verified:
|
|
|
|
continue
|
|
|
|
|
2010-12-02 19:28:06 +00:00
|
|
|
# Start a new packet?
|
|
|
|
|
|
|
|
if len(packets[-1]) + len(encoded_addr) > MAX_RESPONSE_LEN:
|
|
|
|
packets.append(struct.pack(""))
|
|
|
|
|
|
|
|
packets[-1] += encoded_addr
|
|
|
|
|
|
|
|
return packets
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
def send_add_response(self, server, success):
|
|
|
|
""" Send a response to a server's add request. """
|
|
|
|
|
|
|
|
self.send_message(server.addr,
|
|
|
|
NET_MASTER_PACKET_TYPE_ADD_RESPONSE,
|
|
|
|
struct.pack(">h", success))
|
|
|
|
|
2010-12-02 19:28:06 +00:00
|
|
|
def process_add_to_master(self, addr):
|
|
|
|
""" Process an "add to master" request received from a server. """
|
|
|
|
|
|
|
|
if addr in self.servers:
|
|
|
|
self.log_output(addr, "Refresh server")
|
|
|
|
server = self.servers[addr]
|
|
|
|
server.refresh()
|
|
|
|
else:
|
|
|
|
server = Server(addr)
|
|
|
|
self.servers[addr] = server
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
# If the server has already been verified, we can send a
|
|
|
|
# reply immediately. Otherwise, query the server via a
|
|
|
|
# different socket first to verify it.
|
|
|
|
# Why is this needed? The server might be behind a NAT
|
|
|
|
# gateway. In this case, the master might be able to
|
|
|
|
# communicate with it, but other machines might not.
|
2010-12-02 19:28:06 +00:00
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
if server.verified:
|
2010-12-04 17:30:22 +00:00
|
|
|
self.send_add_response(server, 1)
|
2010-12-04 17:17:13 +00:00
|
|
|
else:
|
|
|
|
self.log_output(addr, "Add request, sending query to confirm")
|
|
|
|
self.send_query(server)
|
2010-12-02 19:28:06 +00:00
|
|
|
|
|
|
|
def process_query(self, addr):
|
|
|
|
""" Process a query message received from a client. """
|
|
|
|
|
|
|
|
self.log_output(addr, "Query")
|
|
|
|
packets = self.response_packets()
|
|
|
|
|
|
|
|
for packet in packets:
|
|
|
|
self.send_message(addr,
|
|
|
|
NET_MASTER_PACKET_TYPE_QUERY_RESPONSE,
|
|
|
|
packet)
|
|
|
|
|
|
|
|
def process_packet(self, data, addr):
|
|
|
|
""" Process a packet received from a server. """
|
|
|
|
|
|
|
|
packet_type, = struct.unpack(">h", data[0:2])
|
|
|
|
|
|
|
|
if packet_type == NET_MASTER_PACKET_TYPE_ADD:
|
|
|
|
self.process_add_to_master(addr)
|
|
|
|
elif packet_type == NET_MASTER_PACKET_TYPE_QUERY:
|
|
|
|
self.process_query(addr)
|
|
|
|
|
|
|
|
def rx_packet(self):
|
|
|
|
""" Invoked when a packet is received. """
|
|
|
|
|
|
|
|
data, addr = self.sock.recvfrom(1024)
|
|
|
|
|
|
|
|
try:
|
|
|
|
self.process_packet(data, addr)
|
|
|
|
except Exception, e:
|
|
|
|
print e
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
def rx_packet_query_sock(self):
|
|
|
|
""" Invoked when a packet is received on the query socket. """
|
|
|
|
|
|
|
|
data, addr = self.query_sock.recvfrom(1024)
|
|
|
|
|
|
|
|
try:
|
|
|
|
self.parse_query_response(data, addr)
|
|
|
|
except Exception, e:
|
|
|
|
print e
|
|
|
|
|
2010-12-02 19:28:06 +00:00
|
|
|
def age_servers(self):
|
|
|
|
""" Check server timestamps and flush out stale servers. """
|
|
|
|
|
|
|
|
for server in self.servers.values():
|
|
|
|
if server.timed_out():
|
|
|
|
self.log_output(server.addr,
|
|
|
|
"Timed out: no heartbeat in %i secs" %
|
|
|
|
(time() - server.add_time))
|
|
|
|
del self.servers[server.addr]
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
# Expect a response to queries quickly, otherwise add
|
|
|
|
# requests are rejected.
|
|
|
|
|
|
|
|
if not server.verified and time() - server.add_time > 5:
|
|
|
|
self.log_output(server.addr,
|
|
|
|
"No response to query, add rejected")
|
|
|
|
self.send_add_response(server, 0)
|
|
|
|
del self.servers[server.addr]
|
|
|
|
|
2010-12-02 19:28:06 +00:00
|
|
|
def open_socket(self):
|
|
|
|
""" Open the server socket and bind to the listening address. """
|
|
|
|
|
|
|
|
self.sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
|
|
self.sock.bind(self.server_addr)
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
# Query socket, used to send queries to servers to check that
|
|
|
|
# they are actually accessible.
|
|
|
|
|
|
|
|
self.query_sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
|
|
|
2010-12-02 19:28:06 +00:00
|
|
|
def run(self):
|
|
|
|
""" Run the server main loop, listening for packets. """
|
|
|
|
|
|
|
|
self.log_output(self.server_addr, "Server started.")
|
|
|
|
|
|
|
|
while True:
|
2010-12-04 17:17:13 +00:00
|
|
|
r, w, x = select([self.sock, self.query_sock], [], [], 5)
|
2010-12-02 19:28:06 +00:00
|
|
|
|
|
|
|
self.age_servers()
|
|
|
|
|
|
|
|
if self.sock in r:
|
|
|
|
self.rx_packet()
|
|
|
|
|
2010-12-04 17:17:13 +00:00
|
|
|
if self.query_sock in r:
|
|
|
|
self.rx_packet_query_sock()
|
|
|
|
|
2010-12-02 19:28:06 +00:00
|
|
|
if __name__ == "__main__":
|
|
|
|
server = MasterServer(UDP_ADDRESS, UDP_PORT)
|
|
|
|
server.run()
|
|
|
|
|