This module implements a high-level cross-platform sockets interface. The procedures implemented in this module are primarily for blocking sockets. For asynchronous non-blocking sockets use the asyncnet module together with the asyncdispatch module.
The first thing you will always need to do in order to start using sockets, is to create a new instance of the Socket type using the newSocket procedure.
In order to use the SSL procedures defined in this module, you will need to compile your application with the -d:ssl flag. See the newContext procedure for additional details.
On Windows the SSL library checks for valid certificates. It uses the cacert.pem file for this purpose which was extracted from https://curl.se/ca/cacert.pem. Besides the OpenSSL DLLs (e.g. libssl-1_1-x64.dll, libcrypto-1_1-x64.dll) you also need to ship cacert.pem with your .exe file.
After you create a socket with the newSocket procedure, you can easily connect it to a server running at a known hostname (or IP address) and port. To do so over TCP, use the example below.
Example: cmd: -r:off
import std/net
let socket = newSocket()
socket.connect("google.com", Port(80))For SSL, use the following example: Example: cmd: -r:off -d:ssl
import std/net
let socket = newSocket()
let ctx = newContext()
wrapSocket(ctx, socket)
socket.connect("google.com", Port(443))UDP is a connectionless protocol, so UDP sockets don't have to explicitly call the connect procedure. They can simply start sending data immediately. Example: cmd: -r:off
import std/net
let socket = newSocket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)
socket.sendTo("192.168.0.1", Port(27960), "status\n") Example: cmd: -r:off
import std/net
let socket = newSocket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)
let ip = parseIpAddress("192.168.0.1")
doAssert socket.sendTo(ip, Port(27960), "status\c\l") == 8 After you create a socket with the newSocket procedure, you can create a TCP server by calling the bindAddr and listen procedures.
Example: cmd: -r:off
import std/net let socket = newSocket() socket.bindAddr(Port(1234)) socket.listen() # You can then begin accepting connections using the `accept` procedure. var client: Socket var address = "" while true: socket.acceptAddr(client, address) echo "Client connected from: ", address
IpAddress = object
case family*: IpAddressFamily ## the type of the IP address (IPv4 or IPv6)
of IpAddressFamily.IPv6:
address_v6*: array[0 .. 15, uint8] ## Contains the IP address in bytes in
## case of IPv6
of IpAddressFamily.IPv4:
address_v4*: array[0 .. 3, uint8] ## Contains the IP address in bytes in
## case of IPv4IpAddressFamily {.pure.} = enum
IPv6, ## IPv6 address
IPv4 ## IPv4 addressReadLineResult = enum ReadFullLine, ReadPartialLine, ReadDisconnected, ReadNone
SOBool = enum OptAcceptConn, OptBroadcast, OptDebug, OptDontRoute, OptKeepAlive, OptOOBInline, OptReuseAddr, OptReusePort, OptNoDelay
proc accept(server: Socket; client: var owned(Socket); flags = {SafeDisconn};
inheritable = defined(nimInheritHandles)) {....tags: [ReadIOEffect],
raises: [OSError, IOError, SslError], forbids: [].}Equivalent to acceptAddr but doesn't return the address, only the socket.
The SocketHandle associated with the resulting client will not be inheritable by child processes by default. This can be changed via the inheritable parameter.
The accept call may result in an error if the connecting socket disconnects during the duration of the accept. If the SafeDisconn flag is specified then this error will not be raised and instead accept will be called again.
proc acceptAddr(server: Socket; client: var owned(Socket); address: var string;
flags = {SafeDisconn}; inheritable = defined(nimInheritHandles)) {.
...tags: [ReadIOEffect], gcsafe, raises: [OSError, IOError, SslError],
forbids: [].}Blocks until a connection is being made from a client. When a connection is made sets client to the client socket and address to the address of the connecting client. This function will raise OSError if an error occurs.
The resulting client will inherit any properties of the server socket. For example: whether the socket is buffered or not.
The SocketHandle associated with the resulting client will not be inheritable by child processes by default. This can be changed via the inheritable parameter.
The accept call may result in an error if the connecting socket disconnects during the duration of the accept. If the SafeDisconn flag is specified then this error will not be raised and instead accept will be called again.
proc close(socket: Socket; flags = {SafeDisconn}) {.
...raises: [LibraryError, Exception, SslError, OSError], tags: [RootEffect],
forbids: [].}Closes a socket.
If socket is an SSL/TLS socket, this proc will also send a closure notification to the peer. If SafeDisconn is in flags, failure to do so due to disconnections will be ignored. This is generally safe in practice. See here for more details.
proc connect(socket: Socket; address: string; port = Port(0)) {.
...tags: [ReadIOEffect, RootEffect], raises: [OSError, SslError], forbids: [].}Connects socket to address:port. Address can be an IP address or a host name. If address is a host name, this function will try each IP of that host name. htons is already performed on port so you must not do it.
If socket is an SSL socket a handshake will be automatically performed.
proc connect(socket: Socket; address: string; port = Port(0); timeout: int) {.
...tags: [ReadIOEffect, WriteIOEffect, RootEffect],
raises: [OSError, TimeoutError], forbids: [].}Connects to server as specified by address on port specified by port.
The timeout parameter specifies the time in milliseconds to allow for the connection to the server to be made.
proc dial(address: string; port: Port; protocol = IPPROTO_TCP; buffered = true): owned(
Socket) {....tags: [ReadIOEffect, WriteIOEffect], raises: [OSError, IOError],
forbids: [].}address:port pair via the specified protocol. The procedure iterates through possible resolutions of the address until it succeeds, meaning that it seamlessly works with both IPv4 and IPv6. Returns Socket ready to send or receive data. Source Edit proc getPeerCertificates(socket: Socket): seq[Certificate] {.
...raises: [Exception], tags: [], forbids: [].}proc getPeerCertificates(sslHandle: SslPtr): seq[Certificate] {.
...raises: [Exception], tags: [], forbids: [].}sslHandle. The handshake must have been completed and the certificate chain must have been verified successfully or else an empty sequence is returned. The chain is ordered from leaf certificate to root certificate. Source Edit proc getPrimaryIPAddr(dest = parseIpAddress("8.8.8.8")): IpAddress {.
...raises: [OSError, OSError, SslError, ValueError, Exception, LibraryError],
tags: [ReadIOEffect, RootEffect], forbids: [].}Finds the local IP address, usually assigned to eth0 on LAN or wlan0 on WiFi, used to reach an external address. Useful to run local services.
No traffic is sent.
Supports IPv4 and v6. Raises OSError if external networking is not set up.
Example: cmd: -r:off
echo getPrimaryIPAddr() # "192.168.1.2"Source Edit
proc newContext(protVersion = protSSLv23; verifyMode = CVerifyPeer;
certFile = ""; keyFile = ""; cipherList = CiphersIntermediate;
caDir = ""; caFile = ""; ciphersuites = CiphersModern): SslContext {.
...raises: [LibraryError, SslError, Exception, IOError, OSError],
tags: [RootEffect, ReadDirEffect, ReadEnvEffect, ReadIOEffect], forbids: [].}Creates an SSL context.
Protocol version is currently ignored by default and TLS is used. With -d:openssl10, only SSLv23 and TLSv1 may be used.
There are three options for verify mode: CVerifyNone: certificates are not verified; CVerifyPeer: certificates are verified; CVerifyPeerUseEnvVars: certificates are verified and the optional environment variables SSL_CERT_FILE and SSL_CERT_DIR are also used to locate certificates
The nimDisableCertificateValidation define overrides verifyMode and disables certificate verification globally!
CA certificates will be loaded, in the following order, from:
verifyMode is set to CVerifyPeerUseEnvVars, the SSL_CERT_FILE and SSL_CERT_DIR environment variables are usedThe last two parameters specify the certificate file path and the key file path, a server socket will most likely not work without these.
Certificates can be generated using the following command:
openssl req -x509 -nodes -days 365 -newkey rsa:4096 -keyout mykey.pem -out mycert.pemor using ECDSA:
openssl ecparam -out mykey.pem -name secp256k1 -genkeyopenssl req -new -key mykey.pem -x509 -nodes -days 365 -out mycert.pemproc newSocket(domain, sockType, protocol: cint; buffered = true;
inheritable = defined(nimInheritHandles)): owned(Socket) {.
...raises: [OSError], tags: [], forbids: [].}Creates a new socket.
The SocketHandle associated with the resulting Socket will not be inheritable by child processes by default. This can be changed via the inheritable parameter.
If an error occurs OSError will be raised.
Source Editproc newSocket(domain: Domain = AF_INET; sockType: SockType = SOCK_STREAM;
protocol: Protocol = IPPROTO_TCP; buffered = true;
inheritable = defined(nimInheritHandles)): owned(Socket) {.
...raises: [OSError], tags: [], forbids: [].}Creates a new socket.
The SocketHandle associated with the resulting Socket will not be inheritable by child processes by default. This can be changed via the inheritable parameter.
If an error occurs OSError will be raised.
Source Editproc parseIpAddress(addressStr: string): IpAddress {....raises: [ValueError],
tags: [], forbids: [].}Parses an IP address
Raises ValueError on error.
For IPv4 addresses, only the strict form as defined in RFC 6943 is considered valid, see https://datatracker.ietf.org/doc/html/rfc6943#section-3.1.1.
Source Editproc readLine(socket: Socket; line: var string; timeout = -1;
flags = {SafeDisconn}; maxLength = MaxLineLength) {.
...tags: [ReadIOEffect, TimeEffect], raises: [TimeoutError, OSError, SslError],
forbids: [].}Reads a line of data from socket.
If a full line is read \r\L is not added to line, however if solely \r\L is read then line will be set to it.
If the socket is disconnected, line will be set to "".
An OSError exception will be raised in the case of a socket error.
A timeout can be specified in milliseconds, if data is not received within the specified time a TimeoutError exception will be raised.
The maxLength parameter determines the maximum amount of characters that can be read. The result is truncated after that.
SafeDisconn flag is currently supported.proc recv(socket: Socket; data: pointer; size: int): int {....tags: [ReadIOEffect],
raises: [], forbids: [].}Receives data from a socket.
Note: This is a low-level function, you may be interested in the higher level versions of this function which are also named recv.
proc recv(socket: Socket; data: pointer; size: int; timeout: int): int {.
...tags: [ReadIOEffect, TimeEffect], raises: [TimeoutError, OSError],
forbids: [].}timeout parameter in milliseconds. Source Edit proc recv(socket: Socket; data: var string; size: int; timeout = -1;
flags = {SafeDisconn}): int {....raises: [TimeoutError, OSError, SslError],
tags: [ReadIOEffect, TimeEffect],
forbids: [].}Higher-level version of recv.
Reads up to size bytes from socket into data.
For buffered sockets this function will attempt to read all the requested data. It will read this data in BufferSize chunks.
For unbuffered sockets this function makes no effort to read all the data requested. It will return as much data as the operating system gives it.
When 0 is returned the socket's connection has been closed.
This function will throw an OSError exception when an error occurs. A value lower than 0 is never returned.
A timeout may be specified in milliseconds, if enough data is not received within the time specified a TimeoutError exception will be raised.
SafeDisconn flag is currently supported.proc recv(socket: Socket; size: int; timeout = -1; flags = {SafeDisconn}): string {.
inline, ...raises: [TimeoutError, OSError, SslError],
tags: [ReadIOEffect, TimeEffect], forbids: [].}Higher-level version of recv which returns a string.
Reads up to size bytes from socket into the result.
For buffered sockets this function will attempt to read all the requested data. It will read this data in BufferSize chunks.
For unbuffered sockets this function makes no effort to read all the data requested. It will return as much data as the operating system gives it.
When "" is returned the socket's connection has been closed.
This function will throw an OSError exception when an error occurs.
A timeout may be specified in milliseconds, if enough data is not received within the time specified a TimeoutError exception will be raised.
SafeDisconn flag is currently supported.proc recvFrom[T: string | IpAddress](socket: Socket; data: var string;
length: int; address: var T;
port: var Port; flags = 0'i32): int {.
...tags: [ReadIOEffect].}Receives data from socket. This function should normally be used with connection-less sockets (UDP sockets). The source address of the data packet is stored in the address argument as either a string or an IpAddress.
If an error occurs an OSError exception will be raised. Otherwise the return value will be the length of data received.
socket is buffered the non-buffered implementation will be used. Therefore if socket contains something in its buffer this function will make no effort to return it.proc recvLine(socket: Socket; timeout = -1; flags = {SafeDisconn};
maxLength = MaxLineLength): string {.
...raises: [TimeoutError, OSError, SslError], tags: [ReadIOEffect, TimeEffect],
forbids: [].}Reads a line of data from socket.
If a full line is read \r\L is not added to the result, however if solely \r\L is read then the result will be set to it.
If the socket is disconnected, the result will be set to "".
An OSError exception will be raised in the case of a socket error.
A timeout can be specified in milliseconds, if data is not received within the specified time a TimeoutError exception will be raised.
The maxLength parameter determines the maximum amount of characters that can be read. The result is truncated after that.
SafeDisconn flag is currently supported.proc sendTo(socket: Socket; address: IpAddress; port: Port; data: string;
flags = 0'i32): int {.discardable, ...tags: [WriteIOEffect],
raises: [OSError], forbids: [].}This proc sends data to the specified IpAddress and returns the number of bytes written.
Generally for use with connection-less (UDP) sockets.
If an error occurs an OSError exception will be raised.
This is the high-level version of the above sendTo function.
proc sendTo(socket: Socket; address: string; port: Port; data: pointer;
size: int; af: Domain = AF_INET; flags = 0'i32) {.
...tags: [WriteIOEffect], raises: [OSError], forbids: [].}This proc sends data to the specified address, which may be an IP address or a hostname, if a hostname is specified this function will try each IP of that hostname. This function should normally be used with connection-less sockets (UDP sockets).
If an error occurs an OSError exception will be raised.
Note: You may wish to use the high-level version of this function which is defined below.
Note: This proc is not available for SSL sockets.
Source Editproc sendTo(socket: Socket; address: string; port: Port; data: string) {.
...tags: [WriteIOEffect], raises: [OSError], forbids: [].}This proc sends data to the specified address, which may be an IP address or a hostname, if a hostname is specified this function will try each IP of that hostname.
Generally for use with connection-less (UDP) sockets.
If an error occurs an OSError exception will be raised.
This is the high-level version of the above sendTo function.
proc sessionIdContext=(ctx: SslContext; sidCtx: string) {....raises: [SslError],
tags: [], forbids: [].}Sets the session id context in which a session can be reused. Used for permitting clients to reuse a session id instead of doing a new handshake.
TLS clients might attempt to resume a session using the session id context, thus it must be set if verifyMode is set to CVerifyPeer or CVerifyPeerUseEnvVars, otherwise the connection will fail and SslError will be raised if resumption occurs.
proc setSockOpt(socket: Socket; opt: SOBool; value: bool; level = SOL_SOCKET) {.
...tags: [WriteIOEffect], raises: [OSError], forbids: [].}opt to a boolean value specified by value. Example: cmd: -r:off
let socket = newSocket() socket.setSockOpt(OptReusePort, true) socket.setSockOpt(OptNoDelay, true, level = IPPROTO_TCP.cint)Source Edit
proc skip(socket: Socket; size: int; timeout = -1) {.
...raises: [TimeoutError, OSError], tags: [TimeEffect, ReadIOEffect],
forbids: [].}Skips size amount of bytes.
An optional timeout can be specified in milliseconds, if skipping the bytes takes longer than specified a TimeoutError exception will be raised.
Returns the number of skipped bytes.
Source Editproc wrapConnectedSocket(ctx: SslContext; socket: Socket;
handshake: SslHandshakeType; hostname: string = "") {.
...raises: [SslError, Exception], tags: [RootEffect], forbids: [].}Wraps a connected socket in an SSL context. This function effectively turns socket into an SSL socket. hostname should be specified so that the client knows which hostname the server certificate should be validated against.
This should be called on a connected socket, and will perform an SSL handshake immediately.
FIXME: Disclaimer: This code is not well tested, may be very unsafe and prone to security vulnerabilities.
Source Editproc wrapSocket(ctx: SslContext; socket: Socket) {....raises: [SslError], tags: [],
forbids: [].}Wraps a socket in an SSL context. This function effectively turns socket into an SSL socket.
This must be called on an unconnected socket; an SSL session will be started when the socket is connected.
FIXME: Disclaimer: This code is not well tested, may be very unsafe and prone to security vulnerabilities.
Source Edit
© 2006–2024 Andreas Rumpf
Licensed under the MIT License.
https://nim-lang.org/docs/net.html