evio/examples/http-server/main.go

239 lines
5.9 KiB
Go
Raw Normal View History

2017-11-02 18:08:18 +03:00
// Copyright 2017 Joshua J Baker. All rights reserved.
// Use of this source code is governed by an MIT-style
// license that can be found in the LICENSE file.
2017-10-28 03:01:03 +03:00
package main
import (
2017-11-01 03:44:57 +03:00
"crypto/tls"
"flag"
2017-10-28 03:01:03 +03:00
"fmt"
2017-11-02 03:36:35 +03:00
"io"
2017-10-28 03:01:03 +03:00
"log"
2017-11-02 03:36:35 +03:00
"net"
2017-10-28 03:01:03 +03:00
"strconv"
"strings"
"time"
2017-10-29 00:58:59 +03:00
"github.com/tidwall/evio"
2017-10-28 03:01:03 +03:00
)
2017-11-02 23:29:13 +03:00
var res string
2017-10-28 03:01:03 +03:00
type request struct {
2017-10-28 22:23:13 +03:00
proto, method string
path, query string
head, body string
remoteAddr string
2017-10-28 03:01:03 +03:00
}
type conn struct {
2017-10-30 00:05:23 +03:00
addr evio.Addr
2017-10-29 00:58:59 +03:00
is evio.InputStream
2017-10-28 03:01:03 +03:00
}
func main() {
2017-11-01 03:44:57 +03:00
var port int
2017-11-02 03:36:35 +03:00
var tlsport int
var tlspem string
2017-11-02 23:29:13 +03:00
var aaaa bool
2017-11-03 23:22:31 +03:00
var noparse bool
2017-11-02 03:36:35 +03:00
2017-11-01 03:44:57 +03:00
flag.IntVar(&port, "port", 8080, "server port")
2017-11-02 03:36:35 +03:00
flag.IntVar(&tlsport, "tlsport", 4443, "tls port")
flag.StringVar(&tlspem, "tlscert", "", "tls pem cert/key file")
2017-11-02 23:29:13 +03:00
flag.BoolVar(&aaaa, "aaaa", false, "aaaaa....")
2017-11-03 23:22:31 +03:00
flag.BoolVar(&noparse, "noparse", true, "do not parse requests")
2017-11-01 03:44:57 +03:00
flag.Parse()
2017-11-02 23:29:13 +03:00
if aaaa {
res = strings.Repeat("a", 1024)
} else {
res = "Hello World!\r\n"
}
2017-10-29 00:58:59 +03:00
var events evio.Events
2017-10-28 03:01:03 +03:00
var conns = make(map[int]*conn)
2017-11-02 03:36:35 +03:00
events.Serving = func(wakefn func(id int) bool, addr []net.Addr) (action evio.Action) {
2017-11-01 03:44:57 +03:00
log.Printf("http server started on port %d", port)
2017-11-02 03:36:35 +03:00
if tlspem != "" {
log.Printf("https server started on port %d", tlsport)
2017-11-01 03:44:57 +03:00
}
2017-10-28 03:01:03 +03:00
return
}
2017-10-30 00:05:23 +03:00
events.Opened = func(id int, addr evio.Addr) (out []byte, opts evio.Options, action evio.Action) {
2017-10-28 03:01:03 +03:00
conns[id] = &conn{addr: addr}
2017-11-03 04:31:36 +03:00
//log.Printf("opened: %d: %s: %s", id, addr.Local.String(), addr.Remote.String())
2017-10-28 03:01:03 +03:00
return
}
2017-11-01 03:44:57 +03:00
events.Closed = func(id int, err error) (action evio.Action) {
2017-11-03 04:31:36 +03:00
// c := conns[id]
// log.Printf("closed: %d: %s: %s", id, c.addr.Local.String(), c.addr.Remote.String())
2017-10-28 03:01:03 +03:00
delete(conns, id)
return
}
2017-10-29 00:58:59 +03:00
events.Data = func(id int, in []byte) (out []byte, action evio.Action) {
2017-11-01 03:44:57 +03:00
if in == nil {
return
}
2017-11-03 23:22:31 +03:00
if noparse {
out = []byte("HTTP/1.1 200 OK\r\nServer: evio\r\nDate: Fri, 03 Nov 2017 11:37:00 GMT\r\nContent-Length: 14\r\n\r\nHello World!\r\n")
return
}
2017-10-28 03:01:03 +03:00
c := conns[id]
2017-10-28 22:23:13 +03:00
data := c.is.Begin(in)
// process the pipeline
2017-10-28 03:01:03 +03:00
var req request
for {
leftover, err := parsereq(data, &req)
if err != nil {
// bad thing happened
2017-10-28 22:23:13 +03:00
out = appendresp(out, "500 Error", "", err.Error()+"\n")
2017-10-29 00:58:59 +03:00
action = evio.Close
2017-10-28 03:01:03 +03:00
break
} else if len(leftover) == len(data) {
// request not ready, yet
break
}
// handle the request
2017-10-30 00:05:23 +03:00
req.remoteAddr = c.addr.Remote.String()
2017-10-28 22:23:13 +03:00
out = appendhandle(out, &req)
2017-10-28 03:01:03 +03:00
data = leftover
}
2017-10-28 22:23:13 +03:00
c.is.End(data)
2017-10-28 03:01:03 +03:00
return
}
2017-11-02 03:36:35 +03:00
// We at least want the single http address.
2017-11-03 04:31:36 +03:00
addrs := []string{fmt.Sprintf("tcp://:%d", port)}
2017-11-02 03:36:35 +03:00
if tlspem != "" {
// load the cert and key pair from the concat'd pem file.
cer, err := tls.LoadX509KeyPair(tlspem, tlspem)
2017-11-01 03:44:57 +03:00
if err != nil {
log.Fatal(err)
}
config := &tls.Config{Certificates: []tls.Certificate{cer}}
2017-11-02 03:36:35 +03:00
// Update the address list to include https.
2017-11-03 04:31:36 +03:00
addrs = append(addrs, fmt.Sprintf("tcp://:%d", tlsport))
2017-11-02 03:36:35 +03:00
// TLS translate the events
events = evio.Translate(events,
func(id int, addr evio.Addr) bool {
// only translate for the second address.
return addr.Index == 1
},
2017-11-02 23:29:13 +03:00
func(id int, rw io.ReadWriter) io.ReadWriter {
2017-11-02 03:36:35 +03:00
// Use the standard Go crypto/tls package and create a tls.Conn
// from the provided io.ReadWriter. Here we use the handy
// evio.NopConn utility to create a barebone net.Conn in order
// for the tls.Server to accept the connection.
return tls.Server(evio.NopConn(rw), config)
},
)
2017-11-01 03:44:57 +03:00
}
2017-11-02 03:36:35 +03:00
// Start serving!
log.Fatal(evio.Serve(events, addrs...))
2017-10-28 03:01:03 +03:00
}
2017-10-28 22:23:13 +03:00
// appendhandle handles the incoming request and appends the response to
// the provided bytes, which is then returned to the caller.
func appendhandle(b []byte, req *request) []byte {
2017-11-02 23:29:13 +03:00
return appendresp(b, "200 OK", "", res)
2017-10-28 03:01:03 +03:00
}
2017-10-28 22:23:13 +03:00
// appendresp will append a valid http response to the provide bytes.
// The status param should be the code plus text such as "200 OK".
// The head parameter should be a series of lines ending with "\r\n" or empty.
func appendresp(b []byte, status, head, body string) []byte {
2017-10-28 03:01:03 +03:00
b = append(b, "HTTP/1.1"...)
b = append(b, ' ')
b = append(b, status...)
b = append(b, '\r', '\n')
2017-11-02 23:29:13 +03:00
b = append(b, "Server: evio\r\n"...)
2017-10-28 03:01:03 +03:00
b = append(b, "Date: "...)
b = time.Now().AppendFormat(b, "Mon, 02 Jan 2006 15:04:05 GMT")
b = append(b, '\r', '\n')
if len(body) > 0 {
b = append(b, "Content-Length: "...)
b = strconv.AppendInt(b, int64(len(body)), 10)
b = append(b, '\r', '\n')
}
b = append(b, head...)
b = append(b, '\r', '\n')
if len(body) > 0 {
b = append(b, body...)
}
return b
}
2017-10-28 22:23:13 +03:00
// parsereq is a very simple http request parser. This operation
// waits for the entire payload to be buffered before returning a
// valid request.
2017-10-28 03:01:03 +03:00
func parsereq(data []byte, req *request) (leftover []byte, err error) {
2017-11-02 23:29:13 +03:00
sdata := string(data)
var i, s int
2017-10-28 03:01:03 +03:00
var top string
var clen int
2017-11-02 23:29:13 +03:00
var q = -1
// method, path, proto line
for ; i < len(sdata); i++ {
if sdata[i] == ' ' {
req.method = sdata[s:i]
for i, s = i+1, i+1; i < len(sdata); i++ {
if sdata[i] == '?' && q == -1 {
q = i - s
} else if sdata[i] == ' ' {
if q != -1 {
req.path = sdata[s:q]
req.query = req.path[q+1 : i]
} else {
req.path = sdata[s:i]
}
for i, s = i+1, i+1; i < len(sdata); i++ {
if sdata[i] == '\n' && sdata[i-1] == '\r' {
req.proto = sdata[s:i]
i, s = i+1, i+1
break
}
2017-10-28 22:23:13 +03:00
}
2017-11-02 23:29:13 +03:00
break
2017-10-28 22:23:13 +03:00
}
2017-11-02 23:29:13 +03:00
}
break
}
}
if req.proto == "" {
return data, fmt.Errorf("malformed request")
}
top = sdata[:s]
for ; i < len(sdata); i++ {
if i > 1 && sdata[i] == '\n' && sdata[i-1] == '\r' {
line := sdata[s : i-1]
s = i + 1
if line == "" {
req.head = sdata[len(top)+2 : i+1]
2017-10-28 03:01:03 +03:00
i++
if clen > 0 {
2017-11-02 23:29:13 +03:00
if len(sdata[i:]) < clen {
2017-10-28 03:01:03 +03:00
break
}
2017-11-02 23:29:13 +03:00
req.body = sdata[i : i+clen]
2017-10-28 03:01:03 +03:00
i += clen
}
return data[i:], nil
2017-11-02 23:29:13 +03:00
}
if strings.HasPrefix(line, "Content-Length:") {
n, err := strconv.ParseInt(strings.TrimSpace(line[len("Content-Length:"):]), 10, 64)
if err == nil {
clen = int(n)
2017-10-28 03:01:03 +03:00
}
}
}
}
// not enough data
return data, nil
}