module Rpc_server:sig..end
 The server module can manage two kinds of RPC functions: synchronous
 and asynchronous. Synchronous functions compute their result immediately
 and thus the result can be sent back just after the evaluation of the
 function has finished. In contrast to this, asynchronous functions only
 get noticed about the call and need not to know immediately what should
 be answered. Typically, an asynchronous function initiates a second
 communication channel and its result depends on what happens on the
 second channel. The communication on this channel is done in an
 asynchronous way, too, and can be managed by the same event system that
 carries out the RPC service. After several input or output events,
 the result has somehow been computed, and the answer can be sent
 back to the original caller. To do so, the asynchronous RPC function
 invokes 'reply' together with the necessary session IDs that identify
 the answer among all answers.
exception Connection_lost
type t 
type session 
type connection_id 
type connector = |
 
Localhost of int
 (* The service is installed on 'localhost' and listens on the
 given port number. A number of 0 means that the port is
 chosen by the operating system.
 Note: The service is only locally reachable. *)
|
 
Portmapped
 (* The service is installed on every network interface; the port is
 chosen by the operating system; the program is registered with the
 portmapper *)
|
 
Internet of (Unix.inet_addr * int)
 (* The service is installed on the passed interface/port combination.
 Use Unix.inet_addr_any to listen on all network interfaces.
 Use port 0 to automatically choose the port number. *)
|
 
Unix of string
 (* The service is installed on a Unix domain socket.
 Note: the socket path must not exist when the server is started,
 and the socket must be unlinked when the server terminates.
 Note Win32: Unix domain sockets are emulated by writing the
 inet4 port number into a one-line file. *)
|
 
W32_pipe of string
 (* The service is installed for a named pipe. (Only for Win32.) *)
|
 
Descriptor of Unix.file_descr
 (* The service listens on the given file descriptor. *)
|
 
Dynamic_descriptor of (unit -> Unix.file_descr)
 (* The service listens on the returned file descriptor. *)
type binding_sync = {sync_name : string;
 (* procedure name *)
type binding_async = {async_name : string;
 (* procedure name *)
async_invoke : session -> Xdr.xdr_value -> unit;
 (* A function that is called when the procedure is called *)
type binding = val connector_of_sockaddr : Unix.sockaddr -> connector val connector_of_socksymbol : Netsockaddr.socksymbol -> connector Netsockaddr.socksymbol into a connectorval create : ?program_number:Rtypes.uint4 ->
 ?version_number:Rtypes.uint4 ->
 Unixqueue.event_system ->
 connector ->
 Rpc.protocol ->
 Rpc.mode -> Rpc_program.t -> binding list -> int -> t create2
 or one of its variants.
 Creates a new server that is pushed onto the event queue.
 The connector, protocol and mode values control the network
 type of the server. Note that not all combinations are valid; the
 following can be used:
connector, protocol=Tcp, mode=Socket:
 creates a classic TCP server socket that allows multiple
 stream connections at the same timeconnector=Descriptor s, protocol=Tcp, mode=BiPipe:
 (where s is one half of a socketpair)
 creates a stream socket that is the endpoint of a point-to-point
 stream connection (bidirectional pipe)protocol=Udp, mode=Socket:
 creates a UDP server socket that allows serving multiple datagramsconnector = Descriptor _ the file descriptor is not opened by
 this module and not closed. The other connectors work automatically
 regarding this point, i.e. descriptors are opened and closed as
 necessary.
 connector = Dynamic_descriptor: The open descriptor is closed after use.
 The Rpc_program.t specifies the procedures that are available and
 their signatures. The binding list should contain for every procedure
 name the function that handles calls of the procedures.
The remaining integer is the maximum number of waiting connections if a classic Tcp server socket is used; other connection types ignore this number.
 The optional arguments ?program_number and ?version_number override
 the numbers specified in the passed program.
Notes on servers:
create function may block if the connector is Portmappedclass type socket_config =object..end
val default_socket_config : socket_config 
class default_socket_config  : socket_config 
val tls_socket_config : (module Netsys_crypto_types.TLS_CONFIG) -> socket_config Rpc.Tcp.class tls_socket_config :(module Netsys_crypto_types.TLS_CONFIG) ->socket_config
type mode2 = [ `Dummy of Rpc.protocol 
 | `Multiplexer_endpoint of Rpc_transport.rpc_multiplex_controller 
 | `Socket of Rpc.protocol * connector * socket_config 
 | `Socket_endpoint of Rpc.protocol * Unix.file_descr ] 
create2:
`Socket_endpoint(proto,fd): Socket fd is a connected socket
 descriptor used for communication. proto determines the 
 encapsulation; should be Tcp for stream sockets and Udp for
 datagram sockets.`Multiplexer_endpoint m: m is an RPC multiplex controller.`Socket(proto, conn, config): Opens or uses a server socket 
 according to conn. proto determines the 
 encapsulation; should be Tcp for stream sockets and Udp for
 datagram sockets. config specifies configuration details.`Socket_endpoint and `Socket also support
 Win32 named pipes.val create2 : mode2 -> Unixqueue.event_system -> t mode2 argument. This kind of server
 does initially not have any bindings.val bind : ?program_number:Rtypes.uint4 ->
 ?version_number:Rtypes.uint4 ->
 Rpc_program.t -> binding list -> t -> unitbinding list. If the portmapper
 must be informed, this action is started (and continued in the
 background). One can bind several programs in several versions to the
 same server.val unbind : ?program_number:Rtypes.uint4 ->
 ?version_number:Rtypes.uint4 -> Rpc_program.t -> t -> unitval bound_programs : t -> Rpc_program.t listval get_event_system : session -> Unixqueue.event_system val get_connection_id : session -> connection_id val get_xid : session -> Rtypes.uint4 val get_socket_name : session -> Unix.sockaddr
val get_peer_name : session -> Unix.sockaddrval get_conn_socket_name : connection_id -> Unix.sockaddr
val get_conn_peer_name : connection_id -> Unix.sockaddrval get_server : session -> t val get_main_socket_name : t -> Unix.sockaddrval get_protocol : t -> Rpc.protocol val get_srv_event_system : t -> Unixqueue.unix_event_system val get_last_proc_info : t -> stringval is_dummy : t -> bool`Dummy mode. These servers cannot be
 used for communicationval get_tls_session_props : session -> Nettls_support.tls_session_props optiontype rule = [ `Accept
 | `Accept_limit_length of int * rule 
 | `Deny
 | `Drop
 | `Reject
 | `Reject_with of Rpc.server_error ] 
val set_session_filter : t -> (Rpc_transport.sockaddr -> rule) -> unit
 `Deny: TCP connections are immediately closed; UDP packets are dropped
 `Drop: The call is dropped (it does not allocate memory)
 `Reject_with: A response is sent back that the call is rejected. The
 parameter specified the error code
 `Reject: The same as `Reject_with Rpc.Auth_too_weak
 `Accept: The call is accepted without limitation (the default if no
 filter is installed)
 `Accept_limit_length(n,r): If the call is longer than n bytes, the rule
 r will be applied
The parameter of the filter function is the socket address of the client.
The intention of filters is to prevent denial of service attacks. A simple but good filter for TCP servers is set_filter srv (fun _ -> (`Accept_limit_length(n,`Deny)) which accepts messages up to n bytes without limit, and denies longer messages. n is the length of the longest sensible message.
For UDP servers, there is an implicit limit of 16K, so it is not necessary to care about this.
Another application is to restrict which systems can contact this server, based on the IP address of the client.
 Note that this is not a protection against distributed denial of service
 attacks.
val set_session_filter_2 : t ->
 (Rpc_transport.sockaddr -> connection_id -> rule) ->
 unitset_session_filter, but the filter gets as second argument the
 connection ID.val set_mstring_factories : t -> Xdr_mstring.named_mstring_factories -> unitval reply : session -> Xdr.xdr_value -> unitNOTES:
reply.
 Unreplied calls do not allocate memory.reply several times for the same
 session.val reply_error : session -> Rpc.server_error -> unitreply, but an error condition is sent back to the caller.val set_exception_handler : t -> (exn -> unit) -> unitNOTES ABOUT EXCEPTIONS:
`Crit message using Netlog.val set_onclose_action : t -> (connection_id -> unit) -> unitDescriptor connectors when the socket should be closed
 (for these connectors the socket is not closed by this module).
Note that this action only applies to closed connections. It will not be executed for closed sockets in general (closed master socket, closed datagram socket).
 If several onclose actions are set, they will be executed in reverse
 order.
val set_timeout : t -> float -> unitval stop_server : ?graceful:bool -> t -> unit
 graceful: If true, the shutdown procedure is deferred until all
 responses have been transferred back to the caller. This includes
 any responses added to the message queue in the current callback.
 New calls are not accepted.
val stop_connection : t -> connection_id -> unitDescriptor). Nothing happens for datagram-oriented
 servers (mode = Udp).type auth_result = |
 
Auth_positive of (string * string * string * Xdr.encoder option * Xdr.decoder option)
 (* Successful authentication:
 (username, returned_verifier_flavour, returned_verifier_data, 
	 enc_opt, dec_opt
	 )
	 Encoders and decoders are allowed to raise the exceptions
	 Rpc_server.Late_drop and Rpc.Rpc_server.
*)
|
 
Auth_reply of (Xdr_mstring.mstring list * string * string)
 (* The authentication method generates the positive response
	 of this RPC call:
	 (data, verf_flavor, verf_data)
	 (new in Ocamlnet-3.3) *)
|
 
Auth_drop
 (* Authentication demands to drop the message *)
exception Late_drop
type auth_peeker = [ `None
 | `Peek_descriptor of Unix.file_descr -> string option
 | `Peek_multiplexer of
 Rpc_transport.rpc_multiplex_controller -> string option ] 
class type auth_details =object..end
class type auth_method =object..end
val set_auth_methods : t -> auth_method list -> unit auth_none .
 If none of the methods apply, the call is rejected (Auth_too_weak).val auth_none : auth_method get_user will return "".val auth_too_weak : auth_method val auth_transport : auth_method val get_user : session -> stringval get_auth_method : session -> auth_method val verbose : bool -> unitval detach : t -> unitmodule Debug:sig..end