kawipiko/sources/cmd/server.go

479 lines
13 KiB
Go
Raw Normal View History

package main
2018-11-09 14:22:44 +00:00
import "bytes"
import "flag"
import "io"
import "log"
import "net/http"
2018-11-09 14:22:44 +00:00
import "os"
import "os/signal"
import "runtime"
import "runtime/pprof"
import "syscall"
2018-11-09 01:26:16 +00:00
import "time"
// import "github.com/colinmarc/cdb"
import cdb "github.com/cipriancraciun/go-cdb-lib"
import "github.com/valyala/fasthttp"
2018-11-13 15:37:33 +00:00
import . "github.com/cipriancraciun/go-cdb-http/lib/common"
import . "github.com/cipriancraciun/go-cdb-http/lib/server"
type server struct {
httpServer *fasthttp.Server
cdbReader *cdb.CDB
debug bool
}
func (_server *server) HandleHTTP (_context *fasthttp.RequestCtx) () {
_uri := _context.URI ()
// _request := &_context.Request
_requestHeaders := &_context.Request.Header
_response := &_context.Response
_responseHeaders := &_context.Response.Header
_keyBuffer := [1024]byte {}
_pathNewBuffer := [1024]byte {}
_timestampBuffer := [128]byte {}
2018-11-09 01:26:16 +00:00
_timestamp := time.Now ()
_timestampHttp := _timestamp.AppendFormat (_timestampBuffer[:0], http.TimeFormat)
2018-11-09 01:26:16 +00:00
// _responseHeaders.Set ("Content-Security-Policy", "upgrade-insecure-requests")
_responseHeaders.Set ("Referrer-Policy", "strict-origin-when-cross-origin")
_responseHeaders.Set ("X-Frame-Options", "SAMEORIGIN")
_responseHeaders.Set ("X-content-type-Options", "nosniff")
_responseHeaders.Set ("X-XSS-Protection", "1; mode=block")
_responseHeaders.SetBytesV ("date", _timestampHttp)
_responseHeaders.SetBytesV ("last-modified", _timestampHttp)
_responseHeaders.Set ("age", "0")
2018-11-09 01:26:16 +00:00
_method := _requestHeaders.Method ()
_path := _uri.Path ()
_pathLen := len (_path)
_pathIsRoot := _pathLen == 1
_pathHasSlash := !_pathIsRoot && (_path[_pathLen - 1] == '/')
if ! bytes.Equal ([]byte (http.MethodGet), _method) {
// log.Printf ("[ww] [bce7a75b] invalid method `%s` for `%s`!\n", _method, _path)
_server.ServeError (_context, http.StatusMethodNotAllowed, nil)
return
}
if (_pathLen == 0) || (_path[0] != '/') {
// log.Printf ("[ww] [fa6b1923] invalid path `%s`!\n", _path)
_server.ServeError (_context, http.StatusBadRequest, nil)
return
}
var _fingerprint []byte
{
_path_0 := _path
if _pathHasSlash {
_path_0 = _path[: _pathLen - 1]
}
2018-11-09 14:11:32 +00:00
_found : for _, _namespace := range []string {NamespaceFilesContent, NamespaceFoldersContent, NamespaceFoldersEntries} {
_key := _keyBuffer[:0]
_key = append (_key, _namespace ...)
_key = append (_key, ':')
_key = append (_key, _path_0 ...)
if _value, _error := _server.cdbReader.GetWithCdbHash (_key); _error == nil {
if _value != nil {
_fingerprint = _value
2018-11-09 14:11:32 +00:00
if (_namespace == NamespaceFoldersContent) || (_namespace == NamespaceFoldersEntries) {
if !_pathHasSlash {
_pathNew := _pathNewBuffer[:0]
_pathNew = append (_pathNew, _path_0 ...)
_pathNew = append (_pathNew, '/')
_server.ServeRedirect (_context, http.StatusTemporaryRedirect, _pathNew)
2018-11-09 14:11:32 +00:00
return
}
}
2018-11-09 14:11:32 +00:00
if _namespace == NamespaceFoldersEntries {
for _, _indexName := range []string {
2018-11-09 14:11:32 +00:00
"index.html", "index.htm",
"index.xhtml", "index.xht",
"index.txt",
"index.json",
"index.xml",
} {
_key := _keyBuffer[:0]
_key = append (_key, NamespaceFilesContent ...)
_key = append (_key, '/')
if !_pathIsRoot {
_key = append (_key, _path_0 ...)
2018-11-09 14:11:32 +00:00
}
_key = append (_key, '/')
_key = append (_key, _indexName ...)
if _value, _error := _server.cdbReader.GetWithCdbHash (_key); _error == nil {
_fingerprint = _value
2018-11-09 14:11:32 +00:00
break _found
} else {
_server.ServeError (_context, http.StatusInternalServerError, _error)
2018-11-09 14:11:32 +00:00
return
}
}
}
break _found
}
} else {
_server.ServeError (_context, http.StatusInternalServerError, _error)
return
}
}
}
if _fingerprint == nil {
if ! bytes.Equal ([]byte ("/favicon.ico"), _path) {
// log.Printf ("[ww] [7416f61d] not found `%s`!\n", _path)
_server.ServeError (_context, http.StatusNotFound, nil)
2018-11-09 01:12:32 +00:00
} else {
_data, _dataContentType := FaviconData ()
_responseHeaders.Set ("content-type", _dataContentType)
_responseHeaders.Set ("content-encoding", "identity")
_responseHeaders.Set ("etag", "f00f5f99bb3d45ef9806547fe5fe031a")
_responseHeaders.Set ("cache-control", "public, immutable, max-age=3600")
_response.SetStatusCode (http.StatusOK)
_response.SetBody (_data)
2018-11-09 01:12:32 +00:00
}
return
}
var _data []byte
{
_key := _keyBuffer[:0]
_key = append (_key, NamespaceDataContent ...)
_key = append (_key, ':')
_key = append (_key, _fingerprint ...)
if _value, _error := _server.cdbReader.GetWithCdbHash (_key); _error == nil {
if _value != nil {
_data = _value
} else {
// log.Printf ("[ee] [0165c193] missing data content for `%s`!\n", _fingerprint)
_server.ServeError (_context, http.StatusInternalServerError, nil)
return
}
} else {
_server.ServeError (_context, http.StatusInternalServerError, _error)
return
}
}
{
_key := _keyBuffer[:0]
_key = append (_key, NamespaceDataMetadata ...)
_key = append (_key, ':')
_key = append (_key, _fingerprint ...)
if _value, _error := _server.cdbReader.GetWithCdbHash (_key); _error == nil {
if _value != nil {
if _error := MetadataDecodeIterate (_value, _responseHeaders.SetBytesKV); _error == nil {
} else {
_server.ServeError (_context, http.StatusInternalServerError, _error)
return
}
} else {
// log.Printf ("[ee] [e8702411] missing data metadata for `%s`!\n", _fingerprint)
_server.ServeError (_context, http.StatusInternalServerError, nil)
return
}
} else {
_server.ServeError (_context, http.StatusInternalServerError, _error)
return
}
}
if _server.debug {
// log.Printf ("[dd] [b15f3cad] serving for `%s`...\n", _path)
}
_responseHeaders.Set ("cache-control", "public, immutable, max-age=3600")
_response.SetStatusCode (http.StatusOK)
_response.SetBody (_data)
}
func (_server *server) ServeRedirect (_context *fasthttp.RequestCtx, _status uint, _path []byte) () {
_response := &_context.Response
_responseHeaders := &_context.Response.Header
2018-11-09 01:26:16 +00:00
_responseHeaders.Set ("content-type", MimeTypeText)
_responseHeaders.Set ("content-encoding", "identity")
_responseHeaders.Set ("etag", "7aa652d8d607b85808c87c1c2105fbb5")
_responseHeaders.Set ("cache-control", "public, immutable, max-age=3600")
_responseHeaders.SetBytesV ("location", _path)
_response.SetStatusCode (int (_status))
// _response.SetBody ([]byte (fmt.Sprintf ("[%d] %s", _status, _path)))
}
func (_server *server) ServeError (_context *fasthttp.RequestCtx, _status uint, _error error) () {
_response := &_context.Response
_responseHeaders := &_context.Response.Header
_responseHeaders.Set ("content-type", MimeTypeText)
_responseHeaders.Set ("content-encoding", "identity")
_responseHeaders.Set ("cache-control", "no-cache")
_response.SetStatusCode (int (_status))
// _response.SetBody ([]byte (fmt.Sprintf ("[%d]", _status)))
LogError (_error, "")
}
func main () () {
Main (main_0)
}
func main_0 () (error) {
var _bind string
var _archive string
var _archiveMmap bool
var _archiveInmem bool
var _archivePreload bool
var _debug bool
var _profileCpu string
var _profileMem string
{
2018-11-09 18:52:30 +00:00
_flags := flag.NewFlagSet ("cdb-http-server", flag.ContinueOnError)
_bind_0 := _flags.String ("bind", "", "<ip>:<port>")
_archive_0 := _flags.String ("archive", "", "<path>")
_archiveMmap_0 := _flags.Bool ("archive-mmap", false, "(memory-mapped archive file)")
_archiveInmem_0 := _flags.Bool ("archive-inmem", false, "(memory-loaded archive file)")
_archivePreload_0 := _flags.Bool ("archive-preload", false, "(preload archive file)")
_debug_0 := _flags.Bool ("debug", false, "")
_profileCpu_0 := _flags.String ("profile-cpu", "", "<path>")
_profileMem_0 := _flags.String ("profile-mem", "", "<path>")
FlagsParse (_flags, 0, 0)
_bind = *_bind_0
_archive = *_archive_0
_archiveMmap = *_archiveMmap_0
_archiveInmem = *_archiveInmem_0
_archivePreload = *_archivePreload_0
_debug = *_debug_0
_profileCpu = *_profileCpu_0
_profileMem = *_profileMem_0
if _bind == "" {
AbortError (nil, "[6edd9512] expected bind address argument!")
}
if _archive == "" {
AbortError (nil, "[eefe1a38] expected archive file argument!")
}
if _archiveInmem && _archiveMmap {
AbortError (nil, "[a2101041] archive 'memory-loaded' and 'memory-mapped' are mutually exclusive!")
}
if _archiveInmem && _archivePreload {
log.Printf ("[ww] [3e8a40e4] archive 'memory-loaded' implies preloading!\n")
_archivePreload = false
}
}
var _cdbReader *cdb.CDB
2018-11-09 14:22:44 +00:00
{
var _cdbFile *os.File
if _cdbFile_0, _error := os.Open (_archive); _error == nil {
_cdbFile = _cdbFile_0
2018-11-09 14:22:44 +00:00
} else {
AbortError (_error, "[9e0b5ed3] failed opening archive file!")
}
var _cdbFileSize int64
if _cdbFileStat, _error := _cdbFile.Stat (); _error == nil {
_cdbFileSize = _cdbFileStat.Size ()
} else {
AbortError (_error, "[0ccf0a3b] failed opening archive file!")
}
if _cdbFileSize < 1024 {
AbortError (nil, "[6635a2a8] failed opening archive: file is too small (or empty)!")
}
if _cdbFileSize >= (2 * 1024 * 1024 * 1024) {
AbortError (nil, "[545bf6ce] failed opening archive: file is too large!")
2018-11-09 14:22:44 +00:00
}
if _archivePreload {
log.Printf ("[ii] [13f4ebf7] preloading archive...\n")
_buffer := [16 * 1024]byte {}
_loop : for {
switch _, _error := _cdbFile.Read (_buffer[:]); _error {
case io.EOF :
break _loop
case nil :
continue _loop
default :
AbortError (_error, "[a1c3b922] failed preloading archive file...\n")
}
}
}
if _archiveInmem || _archiveMmap {
var _cdbData []byte
if _archiveInmem {
log.Printf ("[ii] [216e584b] opening memory-loaded archive...\n")
_cdbData = make ([]byte, _cdbFileSize)
if _, _error := io.ReadFull (_cdbFile, _cdbData); _error != nil {
AbortError (_error, "[73039784] failed loading archive file!")
}
} else if _archiveMmap {
log.Printf ("[ii] [f47fae8a] opening memory-mapped archive...\n")
if _cdbData_0, _error := syscall.Mmap (int (_cdbFile.Fd ()), 0, int (_cdbFileSize), syscall.PROT_READ, syscall.MAP_SHARED); _error == nil {
_cdbData = _cdbData_0
} else {
AbortError (_error, "[c0e2632c] failed mapping archive file!")
}
2018-11-09 14:22:44 +00:00
} else {
panic ("e4fffcd8")
}
if _error := _cdbFile.Close (); _error != nil {
AbortError (_error, "[5e0449c2] failed closing archive file!")
2018-11-09 14:22:44 +00:00
}
if _cdbReader_0, _error := cdb.NewFromBufferWithHasher (_cdbData, nil); _error == nil {
_cdbReader = _cdbReader_0
} else {
AbortError (_error, "[27e4813e] failed opening archive!")
}
2018-11-09 14:22:44 +00:00
} else {
log.Printf ("[ww] [dd697a66] using `read`-based archive (with significant performance impact)!\n")
if _cdbReader_0, _error := cdb.NewFromReaderWithHasher (_cdbFile, nil); _error == nil {
_cdbReader = _cdbReader_0
} else {
AbortError (_error, "[35832022] failed opening archive!")
}
2018-11-09 14:22:44 +00:00
}
}
_server := & server {
httpServer : nil,
cdbReader : _cdbReader,
debug : _debug,
}
if _profileCpu != "" {
log.Printf ("[ii] [70c210f3] profiling CPU to `%s`...\n", _profileCpu)
_stream, _error := os.Create (_profileCpu)
if _error != nil {
AbortError (_error, "[fd4e0009] failed opening CPU profile!")
}
_error = pprof.StartCPUProfile (_stream)
if _error != nil {
AbortError (_error, "[ac721629] failed starting CPU profile!")
}
defer pprof.StopCPUProfile ()
}
if _profileMem != "" {
log.Printf ("[ii] [9196ee90] profiling MEM to `%s`...\n", _profileMem)
_stream, _error := os.Create (_profileMem)
if _error != nil {
AbortError (_error, "[907d08b5] failed opening MEM profile!")
}
_profile := pprof.Lookup ("heap")
defer func () {
runtime.GC ()
if _profile != nil {
if _error := _profile.WriteTo (_stream, 0); _error != nil {
AbortError (_error, "[4b1e5112] failed writing MEM profile!")
}
} else {
AbortError (nil, "[385dc8f0] failed loading MEM profile!")
}
_stream.Close ()
} ()
}
_httpServer := & fasthttp.Server {
2018-11-13 18:04:05 +00:00
Name : "cdb-http",
Handler : _server.HandleHTTP,
2018-11-13 18:04:05 +00:00
NoDefaultServerHeader : true,
NoDefaultContentType : true,
2018-11-13 18:04:05 +00:00
DisableHeaderNamesNormalizing : true,
Concurrency : 4 * 1024,
MaxRequestsPerConn : 256 * 1024,
MaxRequestBodySize : 0,
GetOnly : true,
ReadTimeout : 6 * time.Second,
WriteTimeout : 6 * time.Second,
MaxKeepaliveDuration : 60 * time.Second,
ReadBufferSize : 8 * 1024,
WriteBufferSize : 64 * 1024,
TCPKeepalive : true,
TCPKeepalivePeriod : 6 * time.Second,
}
_server.httpServer = _httpServer
{
_signals := make (chan os.Signal, 32)
signal.Notify (_signals, syscall.SIGINT, syscall.SIGTERM)
go func () () {
<- _signals
log.Printf ("[ii] [691cb695] shutingdown...\n")
_server.httpServer.Shutdown ()
} ()
}
log.Printf ("[ii] [f11e4e37] listening on `http://%s/`;\n", _bind)
if _error := _httpServer.ListenAndServe (_bind); _error != nil {
AbortError (_error, "[44f45c67] failed starting server!")
}
defer log.Printf ("[ii] [a49175db] done!\n")
return nil
}