今天的目标:学习原生NIO1
,最后用nio框架netty
实现redis
的ping
命令解析和响应
1. NIO基础
1.1 实现一个阻塞的echo server,代码参考《Pro NIO2》
public class BlockingEchoServer { |
我们用telnet来测试一下telnet 127.0.0.1 6397
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
hello
hello
1.2 实现一个非阻塞的echo server
原生NIO1代码比较啰嗦,比较长,详情参见github,NIO的学习,后面会有专门的文章来说明。
2. 拥抱netty,来实现redis的ping命令
netty使用的基本套路是这样的:
public static void main(String[] args) throws InterruptedException { |
具体的CommandHandler实现如下:private static class CommandHandler extends ChannelInboundHandlerAdapter {
public void channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {
ByteBuf buf = (ByteBuf) msg;
System.out.println(buf.toString(CharsetUtil.UTF_8));
buf.resetReaderIndex();
int read = buf.readByte();
if (read == '*') {
// 获取参数个数
long numberArgs = Protocol.readLong(buf);
byte[][] bytesArray = new byte[(int) numberArgs][];
for (int i = 0; i < numberArgs; i++) {
if (buf.readByte() == '$') {
// 获取命令长度
int size = (int) Protocol.readLong(buf);
bytesArray[i] = new byte[size];
buf.readBytes(bytesArray[i]);
}
}
// 判断是否是ping命令
if (Arrays.equals(PING.getBytes(), bytesArray[0])) {
System.out.println("is ping cmd");
// 拼接response
ctx.write(Unpooled.wrappedBuffer("+".getBytes()));
ctx.write(Unpooled.wrappedBuffer("pong".getBytes()));
ctx.write(Unpooled.wrappedBuffer(CRLF));
ctx.flush();
} else {
ctx.write(Unpooled.wrappedBuffer("+".getBytes()));
ctx.write(Unpooled.wrappedBuffer(CRLF));
ctx.flush();
}
}
}
public void channelReadComplete(ChannelHandlerContext ctx) throws Exception {
}
public void exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception {
cause.printStackTrace();
ctx.close();
}
}
同样,我们用redis-cli
来测试,可以看到解析成功,且返回了正确的命令格式
redis-cli -p 9736 |