| // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <errno.h> |
| #include <signal.h> |
| #include <stdio.h> |
| #include <string.h> |
| #include <sys/file.h> |
| #include <sys/stat.h> |
| |
| #include <string> |
| #include <vector> |
| |
| #include "base/command_line.h" |
| #include "base/logging.h" |
| #include "base/strings/string_split.h" |
| #include "base/synchronization/lock.h" |
| #include "net/tools/flip_server/acceptor_thread.h" |
| #include "net/tools/flip_server/constants.h" |
| #include "net/tools/flip_server/flip_config.h" |
| #include "net/tools/flip_server/output_ordering.h" |
| #include "net/tools/flip_server/sm_connection.h" |
| #include "net/tools/flip_server/sm_interface.h" |
| #include "net/tools/flip_server/spdy_interface.h" |
| #include "net/tools/flip_server/streamer_interface.h" |
| |
| // If true, then disables the nagle algorithm); |
| bool FLAGS_disable_nagle = true; |
| |
| // The number of times that accept() will be called when the |
| // alarm goes off when the accept_using_alarm flag is set to true. |
| // If set to 0, accept() will be performed until the accept queue |
| // is completely drained and the accept() call returns an error); |
| int32_t FLAGS_accepts_per_wake = 0; |
| |
| // The size of the TCP accept backlog); |
| int32_t FLAGS_accept_backlog_size = 1024; |
| |
| // If set to false a single socket will be used. If set to true |
| // then a new socket will be created for each accept thread. |
| // Note that this only works with kernels that support |
| // SO_REUSEPORT); |
| bool FLAGS_reuseport = false; |
| |
| // Flag to force spdy, even if NPN is not negotiated. |
| bool FLAGS_force_spdy = false; |
| |
| // The amount of time the server delays before sending back the |
| // reply); |
| double FLAGS_server_think_time_in_s = 0; |
| |
| net::FlipConfig g_proxy_config; |
| |
| static bool GotQuitFromStdin() { |
| // Make stdin nonblocking. Yes this is done each time. Oh well. |
| fcntl(0, F_SETFL, O_NONBLOCK); |
| char c; |
| std::string maybequit; |
| while (read(0, &c, 1) > 0) { |
| maybequit += c; |
| } |
| if (maybequit.size()) { |
| VLOG(1) << "scanning string: \"" << maybequit << "\""; |
| } |
| return (maybequit.size() > 1 && |
| (maybequit.c_str()[0] == 'q' || maybequit.c_str()[0] == 'Q')); |
| } |
| |
| static bool g_want_exit = false; |
| static bool g_want_log_close = false; |
| static void SignalHandler(int signum) { |
| switch (signum) { |
| case SIGTERM: |
| case SIGINT: |
| g_want_exit = true; |
| break; |
| case SIGHUP: |
| g_want_log_close = true; |
| break; |
| } |
| } |
| |
| static int OpenPidFile(const char* pidfile) { |
| int fd; |
| struct stat pid_stat; |
| int ret; |
| |
| fd = open(pidfile, O_RDWR | O_CREAT, 0600); |
| if (fd == -1) { |
| fprintf(stderr, "Could not open pid file '%s' for reading.\n", pidfile); |
| exit(1); |
| } |
| |
| ret = flock(fd, LOCK_EX | LOCK_NB); |
| if (ret == -1) { |
| if (errno == EWOULDBLOCK) { |
| fprintf(stderr, "Flip server is already running.\n"); |
| } else { |
| perror("Error getting lock on pid file"); |
| } |
| exit(1); |
| } |
| |
| if (fstat(fd, &pid_stat) == -1) { |
| fprintf( |
| stderr, "Could not stat pid file '%s': %s\n", pidfile, strerror(errno)); |
| exit(1); |
| } |
| if (pid_stat.st_size != 0) { |
| if (ftruncate(fd, pid_stat.st_size) == -1) { |
| fprintf(stderr, |
| "Could not truncate pid file '%s': %s\n", |
| pidfile, |
| strerror(errno)); |
| exit(1); |
| } |
| } |
| |
| char pid_str[8]; |
| snprintf(pid_str, sizeof(pid_str), "%d", getpid()); |
| int bytes = static_cast<int>(strlen(pid_str)); |
| if (write(fd, pid_str, strlen(pid_str)) != bytes) { |
| perror("Could not write pid file"); |
| close(fd); |
| exit(1); |
| } |
| |
| return fd; |
| } |
| |
| int main(int argc, char** argv) { |
| unsigned int i = 0; |
| bool wait_for_iface = false; |
| int pidfile_fd; |
| |
| signal(SIGPIPE, SIG_IGN); |
| signal(SIGTERM, SignalHandler); |
| signal(SIGINT, SignalHandler); |
| signal(SIGHUP, SignalHandler); |
| |
| base::CommandLine::Init(argc, argv); |
| base::CommandLine cl(argc, argv); |
| |
| if (cl.HasSwitch("help") || argc < 2) { |
| printf("%s <options>\n", argv[0]); |
| printf(" Proxy options:\n"); |
| printf( |
| "\t--proxy<1..n>=\"<listen ip>,<listen port>," |
| "<ssl cert filename>,\n" |
| "\t <ssl key filename>,<http server ip>," |
| "<http server port>,\n" |
| "\t [https server ip],[https server port]," |
| "<spdy only 0|1>\"\n" |
| "\t * The https server ip and port may be left empty if they are" |
| " the same as\n" |
| "\t the http server fields.\n" |
| "\t * spdy only prevents non-spdy https connections from being" |
| " passed\n" |
| "\t through the proxy listen ip:port.\n" |
| "\t--forward-ip-header=<header name>\n" |
| "\n Server options:\n" |
| "\t--spdy-server=\"<listen ip>,<listen port>,[ssl cert filename]," |
| "\n\t [ssl key filename]\"\n" |
| "\t--http-server=\"<listen ip>,<listen port>,[ssl cert filename]," |
| "\n\t [ssl key filename]\"\n" |
| "\t * Leaving the ssl cert and key fields empty will disable ssl" |
| " for the\n" |
| "\t http and spdy flip servers\n" |
| "\n Global options:\n" |
| "\t--logdest=<file|system|both>\n" |
| "\t--logfile=<logfile>\n" |
| "\t--wait-for-iface\n" |
| "\t * The flip server will block until the listen ip has been" |
| " raised.\n" |
| "\t--ssl-session-expiry=<seconds> (default is 300)\n" |
| "\t--ssl-disable-compression\n" |
| "\t--idle-timeout=<seconds> (default is 300)\n" |
| "\t--pidfile=<filepath> (default /var/run/flip-server.pid)\n" |
| "\t--help\n"); |
| exit(0); |
| } |
| |
| if (cl.HasSwitch("pidfile")) { |
| pidfile_fd = OpenPidFile(cl.GetSwitchValueASCII("pidfile").c_str()); |
| } else { |
| pidfile_fd = OpenPidFile(PIDFILE); |
| } |
| |
| net::OutputOrdering::set_server_think_time_in_s(FLAGS_server_think_time_in_s); |
| |
| if (cl.HasSwitch("forward-ip-header")) { |
| net::SpdySM::set_forward_ip_header( |
| cl.GetSwitchValueASCII("forward-ip-header")); |
| net::StreamerSM::set_forward_ip_header( |
| cl.GetSwitchValueASCII("forward-ip-header")); |
| } |
| |
| if (cl.HasSwitch("logdest")) { |
| std::string log_dest_value = cl.GetSwitchValueASCII("logdest"); |
| if (log_dest_value.compare("file") == 0) { |
| g_proxy_config.log_destination_ = logging::LOG_TO_FILE; |
| } else if (log_dest_value.compare("system") == 0) { |
| g_proxy_config.log_destination_ = logging::LOG_TO_SYSTEM_DEBUG_LOG; |
| } else if (log_dest_value.compare("both") == 0) { |
| g_proxy_config.log_destination_ = logging::LOG_TO_ALL; |
| } else { |
| LOG(FATAL) << "Invalid logging destination value: " << log_dest_value; |
| } |
| } else { |
| g_proxy_config.log_destination_ = logging::LOG_NONE; |
| } |
| |
| if (cl.HasSwitch("logfile")) { |
| g_proxy_config.log_filename_ = cl.GetSwitchValueASCII("logfile"); |
| if (g_proxy_config.log_destination_ == logging::LOG_NONE) { |
| g_proxy_config.log_destination_ = logging::LOG_TO_FILE; |
| } |
| } else if ((g_proxy_config.log_destination_ & logging::LOG_TO_FILE) != 0) { |
| LOG(FATAL) << "Logging destination requires a log file to be specified."; |
| } |
| |
| if (cl.HasSwitch("wait-for-iface")) { |
| wait_for_iface = true; |
| } |
| |
| if (cl.HasSwitch("ssl-session-expiry")) { |
| std::string session_expiry = cl.GetSwitchValueASCII("ssl-session-expiry"); |
| g_proxy_config.ssl_session_expiry_ = atoi(session_expiry.c_str()); |
| } |
| |
| if (cl.HasSwitch("ssl-disable-compression")) { |
| g_proxy_config.ssl_disable_compression_ = true; |
| } |
| |
| if (cl.HasSwitch("idle-timeout")) { |
| g_proxy_config.idle_socket_timeout_s_ = |
| atoi(cl.GetSwitchValueASCII("idle-timeout").c_str()); |
| } |
| |
| if (cl.HasSwitch("force_spdy")) |
| net::SMConnection::set_force_spdy(true); |
| |
| logging::LoggingSettings settings; |
| settings.logging_dest = g_proxy_config.log_destination_; |
| settings.log_file = g_proxy_config.log_filename_.c_str(); |
| settings.lock_log = logging::DONT_LOCK_LOG_FILE; |
| logging::InitLogging(settings); |
| |
| LOG(INFO) << "Flip SPDY proxy started with configuration:"; |
| LOG(INFO) << "Logging destination : " << g_proxy_config.log_destination_; |
| LOG(INFO) << "Log file : " << g_proxy_config.log_filename_; |
| LOG(INFO) << "Forward IP Header : " |
| << (net::SpdySM::forward_ip_header().length() |
| ? net::SpdySM::forward_ip_header() |
| : "<disabled>"); |
| LOG(INFO) << "Wait for interfaces : " << (wait_for_iface ? "true" |
| : "false"); |
| LOG(INFO) << "Accept backlog size : " << FLAGS_accept_backlog_size; |
| LOG(INFO) << "Accepts per wake : " << FLAGS_accepts_per_wake; |
| LOG(INFO) << "Disable nagle : " << (FLAGS_disable_nagle ? "true" |
| : "false"); |
| LOG(INFO) << "Reuseport : " << (FLAGS_reuseport ? "true" |
| : "false"); |
| LOG(INFO) << "Force SPDY : " << (FLAGS_force_spdy ? "true" |
| : "false"); |
| LOG(INFO) << "SSL session expiry : " |
| << g_proxy_config.ssl_session_expiry_; |
| LOG(INFO) << "SSL disable compression : " |
| << g_proxy_config.ssl_disable_compression_; |
| LOG(INFO) << "Connection idle timeout : " |
| << g_proxy_config.idle_socket_timeout_s_; |
| |
| // Proxy Acceptors |
| while (true) { |
| i += 1; |
| std::stringstream name; |
| name << "proxy" << i; |
| if (!cl.HasSwitch(name.str())) { |
| break; |
| } |
| std::string value = cl.GetSwitchValueASCII(name.str()); |
| std::vector<std::string> value_args = base::SplitString( |
| value, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL); |
| CHECK_EQ((unsigned int)9, value_args.size()); |
| int spdy_only = atoi(value_args[8].c_str()); |
| // If wait_for_iface is enabled, then this call will block |
| // indefinitely until the interface is raised. |
| g_proxy_config.AddAcceptor(net::FLIP_HANDLER_PROXY, |
| value_args[0], |
| value_args[1], |
| value_args[2], |
| value_args[3], |
| value_args[4], |
| value_args[5], |
| value_args[6], |
| value_args[7], |
| spdy_only, |
| FLAGS_accept_backlog_size, |
| FLAGS_disable_nagle, |
| FLAGS_accepts_per_wake, |
| FLAGS_reuseport, |
| wait_for_iface, |
| NULL); |
| } |
| |
| // Spdy Server Acceptor |
| net::MemoryCache spdy_memory_cache; |
| if (cl.HasSwitch("spdy-server")) { |
| spdy_memory_cache.AddFiles(); |
| std::string value = cl.GetSwitchValueASCII("spdy-server"); |
| std::vector<std::string> value_args = base::SplitString( |
| value, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL); |
| while (value_args.size() < 4) |
| value_args.push_back(std::string()); |
| g_proxy_config.AddAcceptor(net::FLIP_HANDLER_SPDY_SERVER, |
| value_args[0], |
| value_args[1], |
| value_args[2], |
| value_args[3], |
| std::string(), |
| std::string(), |
| std::string(), |
| std::string(), |
| 0, |
| FLAGS_accept_backlog_size, |
| FLAGS_disable_nagle, |
| FLAGS_accepts_per_wake, |
| FLAGS_reuseport, |
| wait_for_iface, |
| &spdy_memory_cache); |
| } |
| |
| // Spdy Server Acceptor |
| net::MemoryCache http_memory_cache; |
| if (cl.HasSwitch("http-server")) { |
| http_memory_cache.AddFiles(); |
| std::string value = cl.GetSwitchValueASCII("http-server"); |
| std::vector<std::string> value_args = base::SplitString( |
| value, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL); |
| while (value_args.size() < 4) |
| value_args.push_back(std::string()); |
| g_proxy_config.AddAcceptor(net::FLIP_HANDLER_HTTP_SERVER, |
| value_args[0], |
| value_args[1], |
| value_args[2], |
| value_args[3], |
| std::string(), |
| std::string(), |
| std::string(), |
| std::string(), |
| 0, |
| FLAGS_accept_backlog_size, |
| FLAGS_disable_nagle, |
| FLAGS_accepts_per_wake, |
| FLAGS_reuseport, |
| wait_for_iface, |
| &http_memory_cache); |
| } |
| |
| std::vector<net::SMAcceptorThread*> sm_worker_threads; |
| |
| for (i = 0; i < g_proxy_config.acceptors_.size(); i++) { |
| net::FlipAcceptor* acceptor = g_proxy_config.acceptors_[i]; |
| |
| sm_worker_threads.push_back(new net::SMAcceptorThread( |
| acceptor, (net::MemoryCache*)acceptor->memory_cache_)); |
| // Note that spdy_memory_cache is not threadsafe, it is merely |
| // thread compatible. Thus, if ever we are to spawn multiple threads, |
| // we either must make the MemoryCache threadsafe, or use |
| // a separate MemoryCache for each thread. |
| // |
| // The latter is what is currently being done as we spawn |
| // a separate thread for each http and spdy server acceptor. |
| |
| sm_worker_threads.back()->InitWorker(); |
| sm_worker_threads.back()->Start(); |
| } |
| |
| while (!g_want_exit) { |
| // Close logfile when HUP signal is received. Logging system will |
| // automatically reopen on next log message. |
| if (g_want_log_close) { |
| g_want_log_close = false; |
| VLOG(1) << "HUP received, reopening log file."; |
| logging::CloseLogFile(); |
| } |
| if (GotQuitFromStdin()) { |
| for (unsigned int i = 0; i < sm_worker_threads.size(); ++i) { |
| sm_worker_threads[i]->Quit(); |
| } |
| for (unsigned int i = 0; i < sm_worker_threads.size(); ++i) { |
| sm_worker_threads[i]->Join(); |
| } |
| break; |
| } |
| usleep(1000 * 10); // 10 ms |
| } |
| |
| unlink(PIDFILE); |
| close(pidfile_fd); |
| return 0; |
| } |