package server import "bufio" import "bytes" import "context" import "crypto/tls" import "flag" import "fmt" import "io" import "io/ioutil" import "log" import "net" import "net/http" import "os" import "os/signal" import "runtime" import "runtime/debug" import "runtime/pprof" import "strconv" import "strings" import "sync" import "syscall" import "time" import "unsafe" import "github.com/colinmarc/cdb" import "github.com/valyala/fasthttp" import "github.com/valyala/fasthttp/reuseport" import . "github.com/volution/kawipiko/lib/common" import . "github.com/volution/kawipiko/lib/server" import _ "embed" type server struct { httpServer *fasthttp.Server httpsServer *fasthttp.Server https2Server *http.Server cdbReader *cdb.CDB cachedFileFingerprints map[string][]byte cachedDataMeta map[string][]byte cachedDataContent map[string][]byte securityHeadersEnabled bool securityHeadersTls bool http1Disabled bool http2Disabled bool debug bool quiet bool dummy bool delay time.Duration } func (_server *server) Serve (_context *fasthttp.RequestCtx) () { if _server.dummy { _server.ServeDummy (_context) return } _request := (*fasthttp.Request) (NoEscape (unsafe.Pointer (&_context.Request))) _requestHeaders := (*fasthttp.RequestHeader) (NoEscape (unsafe.Pointer (&_request.Header))) _response := (*fasthttp.Response) (NoEscape (unsafe.Pointer (&_context.Response))) _responseHeaders := (*fasthttp.ResponseHeader) (NoEscape (unsafe.Pointer (&_response.Header))) _requestUri := _requestHeaders.RequestURI () _requestUriString_0 := BytesToString (_requestUri) _requestUriString := NoEscapeString (&_requestUriString_0) _keyBuffer := [1024]byte {} _pathBuffer := [1024]byte {} _method := _requestHeaders.Method () _path := _pathBuffer[:0] _path = append (_path, _requestUri ...) if _pathLimit := bytes.IndexByte (_path, '?'); _pathLimit > 0 { _path = _path[: _pathLimit] } // FIXME: Decode path according to `decodeArgAppendNoPlus`! _pathLen := len (_path) if ! bytes.Equal (StringToBytes (http.MethodGet), _method) { if !_server.quiet { log.Printf ("[ww] [bce7a75b] invalid method `%s` for `%s`!\n", BytesToString (_requestHeaders.Method ()), *_requestUriString) } _server.ServeError (_context, http.StatusMethodNotAllowed, nil, true) return } if (_pathLen == 0) || (_path[0] != '/') { if !_server.quiet { log.Printf ("[ww] [fa6b1923] invalid path `%s`!\n", *_requestUriString) } _server.ServeError (_context, http.StatusBadRequest, nil, true) return } _pathIsRoot := _pathLen == 1 _pathHasSlash := !_pathIsRoot && (_path[_pathLen - 1] == '/') if bytes.HasPrefix (_path, StringToBytes ("/__/")) { if bytes.Equal (_path, StringToBytes ("/__/heartbeat")) || bytes.HasPrefix (_path, StringToBytes ("/__/heartbeat/")) { _server.ServeStatic (_context, http.StatusOK, HeartbeatDataOk, HeartbeatContentType, HeartbeatContentEncoding, false) return } else if bytes.Equal (_path, StringToBytes ("/__/about")) || bytes.Equal (_path, StringToBytes ("/__/about/")) { _server.ServeStatic (_context, http.StatusOK, AboutBannerData, AboutBannerContentType, AboutBannerContentEncoding, true) return } else if bytes.HasPrefix (_path, StringToBytes ("/__/banners/errors/")) { _code := _path[len ("/__/banners/errors/") :] if _code, _error := strconv.Atoi (BytesToString (_code)); _error == nil { _banner, _bannerFound := ErrorBannersData[uint (_code)] if (_code > 0) && _bannerFound { _server.ServeStatic (_context, http.StatusOK, _banner, ErrorBannerContentType, ErrorBannerContentEncoding, true) return } } _server.ServeError (_context, http.StatusBadRequest, nil, true) return } else { _server.ServeError (_context, http.StatusBadRequest, nil, true) return } } var _fingerprints []byte var _namespaceAndPathSuffixes = [][2]string { {NamespaceFilesContent, ""}, {NamespaceFilesContent, "/"}, {NamespaceFoldersContent, ""}, } if _fingerprints == nil { _loop_1 : for _namespaceAndPathSuffixIndex := range _namespaceAndPathSuffixes { _namespaceAndPathSuffix := _namespaceAndPathSuffixes[_namespaceAndPathSuffixIndex] _namespace := _namespaceAndPathSuffix[0] _pathSuffix := _namespaceAndPathSuffix[1] switch { case !_pathIsRoot && !_pathHasSlash : // NOP case _pathSuffix == "/" : continue _loop_1 case _pathSuffix == "" : // NOP case _pathSuffix[0] == '/' : _pathSuffix = _pathSuffix[1:] } _pathSuffixHasSlash := (len (_pathSuffix) != 0) && (_pathSuffix[0] == '/') if _server.cachedFileFingerprints != nil { _key := _keyBuffer[:0] _key = append (_key, _path ...) _key = append (_key, _pathSuffix ...) _fingerprints, _ = _server.cachedFileFingerprints[BytesToString (_key)] } else { _key := _keyBuffer[:0] _key = append (_key, _namespace ...) _key = append (_key, ':') _key = append (_key, _path ...) _key = append (_key, _pathSuffix ...) if _value, _error := _server.cdbReader.GetWithCdbHash (_key); _error == nil { _fingerprints = _value } else { _server.ServeError (_context, http.StatusInternalServerError, _error, false) return } } if _fingerprints != nil { if ((_namespace == NamespaceFoldersContent) || _pathSuffixHasSlash) && (!_pathIsRoot && !_pathHasSlash) { _path = append (_path, '/') _server.ServeRedirect (_context, http.StatusTemporaryRedirect, _path, true) return } break _loop_1 } } } if _fingerprints == nil { if bytes.Equal (StringToBytes ("/favicon.ico"), _path) { _server.ServeStatic (_context, http.StatusOK, FaviconData, FaviconContentType, FaviconContentEncoding, true) return } } if _fingerprints == nil { _loop_2 : for _pathLimit := bytes.LastIndexByte (_path, '/'); _pathLimit >= 0; _pathLimit = bytes.LastIndexByte (_path[: _pathLimit], '/') { if _server.cachedFileFingerprints != nil { _key := _keyBuffer[:0] _key = append (_key, _path[: _pathLimit] ...) _key = append (_key, "/*" ...) _fingerprints, _ = _server.cachedFileFingerprints[BytesToString (_key)] } else { _key := _keyBuffer[:0] _key = append (_key, NamespaceFilesContent ...) _key = append (_key, ':') _key = append (_key, _path[: _pathLimit] ...) _key = append (_key, "/*" ...) if _value, _error := _server.cdbReader.GetWithCdbHash (_key); _error == nil { _fingerprints = _value } else { _server.ServeError (_context, http.StatusInternalServerError, _error, false) return } } if _fingerprints != nil { break _loop_2 } } } if _fingerprints == nil { if !_server.quiet { log.Printf ("[ww] [7416f61d] not found `%s`!\n", *_requestUriString) } _server.ServeError (_context, http.StatusNotFound, nil, true) return } _fingerprintsSplit := bytes.IndexByte (_fingerprints, ':') if _fingerprintsSplit < 0 { if !_server.quiet { log.Printf ("[ee] [7ee6c981] invalid data fingerprints for `%s`!\n", *_requestUriString) } _server.ServeError (_context, http.StatusInternalServerError, nil, false) return } _fingerprintMeta := _fingerprints[:_fingerprintsSplit] _fingerprintContent := _fingerprints[_fingerprintsSplit + 1:] var _data []byte if _server.cachedDataContent != nil { _data, _ = _server.cachedDataContent[BytesToString (_fingerprintContent)] } else { _key := _keyBuffer[:0] _key = append (_key, NamespaceDataContent ...) _key = append (_key, ':') _key = append (_key, _fingerprintContent ...) if _value, _error := _server.cdbReader.GetWithCdbHash (_key); _error == nil { _data = _value } else { _server.ServeError (_context, http.StatusInternalServerError, _error, false) return } } if _data == nil { if !_server.quiet { log.Printf ("[ee] [0165c193] missing data content for `%s`!\n", *_requestUriString) } _server.ServeError (_context, http.StatusInternalServerError, nil, false) return } var _dataMetaRaw []byte if _server.cachedDataMeta != nil { _dataMetaRaw, _ = _server.cachedDataMeta[BytesToString (_fingerprintMeta)] } else { _key := _keyBuffer[:0] _key = append (_key, NamespaceDataMetadata ...) _key = append (_key, ':') _key = append (_key, _fingerprintMeta ...) if _value, _error := _server.cdbReader.GetWithCdbHash (_key); _error == nil { _dataMetaRaw = _value } else { _server.ServeError (_context, http.StatusInternalServerError, _error, false) return } } if _dataMetaRaw == nil { if !_server.quiet { log.Printf ("[ee] [e8702411] missing data metadata for `%s`!\n", *_requestUriString) } _server.ServeError (_context, http.StatusInternalServerError, nil, false) return } _responseStatus := http.StatusOK _handleHeader := func (_name []byte, _value []byte) { if _name[0] != '!' { _responseHeaders.AddBytesKV (_name, _value) } else { switch BytesToString (_name) { case "!Status" : if _value, _error := strconv.Atoi (BytesToString (_value)); _error == nil { if (_value >= 200) && (_value <= 599) { _responseStatus = _value } else { if !_server.quiet { log.Printf ("[ee] [c2f7ec36] invalid data metadata for `%s`!\n", *_requestUriString) } _responseStatus = http.StatusInternalServerError } } else { if !_server.quiet { log.Printf ("[ee] [beedae55] invalid data metadata for `%s`!\n", *_requestUriString) } _responseStatus = http.StatusInternalServerError } default : if !_server.quiet { log.Printf ("[ee] [7acc7d90] invalid data metadata for `%s`!\n", *_requestUriString) } } } } if _error := MetadataDecodeIterate (_dataMetaRaw, _handleHeader); _error != nil { _server.ServeError (_context, http.StatusInternalServerError, _error, false) return } if _server.securityHeadersTls { _responseHeaders.AddBytesKV (StringToBytes ("Strict-Transport-Security"), StringToBytes ("max-age=31536000")) _responseHeaders.AddBytesKV (StringToBytes ("Content-Security-Policy"), StringToBytes ("upgrade-insecure-requests")) } if _server.securityHeadersEnabled { _responseHeaders.AddBytesKV (StringToBytes ("Referrer-Policy"), StringToBytes ("strict-origin-when-cross-origin")) _responseHeaders.AddBytesKV (StringToBytes ("X-Content-Type-Options"), StringToBytes ("nosniff")) _responseHeaders.AddBytesKV (StringToBytes ("X-XSS-Protection"), StringToBytes ("1; mode=block")) _responseHeaders.AddBytesKV (StringToBytes ("X-Frame-Options"), StringToBytes ("sameorigin")) } if _server.debug { log.Printf ("[dd] [b15f3cad] serving for `%s`...\n", *_requestUriString) } if _server.delay != 0 { time.Sleep (_server.delay) } _response.SetStatusCode (_responseStatus) _response.SetBodyRaw (_data) } func (_server *server) ServeStatic (_context *fasthttp.RequestCtx, _status uint, _data []byte, _contentType string, _contentEncoding string, _cache bool) () { _response := (*fasthttp.Response) (NoEscape (unsafe.Pointer (&_context.Response))) _responseHeaders := (*fasthttp.ResponseHeader) (NoEscape (unsafe.Pointer (&_response.Header))) _responseHeaders.AddBytesKV (StringToBytes ("Content-Type"), StringToBytes (_contentType)) _responseHeaders.AddBytesKV (StringToBytes ("Content-Encoding"), StringToBytes (_contentEncoding)) if _cache { _responseHeaders.AddBytesKV (StringToBytes ("Cache-Control"), StringToBytes ("public, immutable, max-age=3600")) } else { _responseHeaders.AddBytesKV (StringToBytes ("Cache-Control"), StringToBytes ("private, no-cache, no-store")) } _response.SetStatusCode (int (_status)) _response.SetBodyRaw (_data) } func (_server *server) ServeRedirect (_context *fasthttp.RequestCtx, _status uint, _path []byte, _cache bool) () { _response := (*fasthttp.Response) (NoEscape (unsafe.Pointer (&_context.Response))) _responseHeaders := (*fasthttp.ResponseHeader) (NoEscape (unsafe.Pointer (&_response.Header))) _responseHeaders.SetCanonical (StringToBytes ("Location"), _path) if _cache { _responseHeaders.AddBytesKV (StringToBytes ("Cache-Control"), StringToBytes ("public, immutable, max-age=3600")) } else { _responseHeaders.AddBytesKV (StringToBytes ("Cache-Control"), StringToBytes ("private, no-cache, no-store")) } _response.SetStatusCode (int (_status)) } func (_server *server) ServeError (_context *fasthttp.RequestCtx, _status uint, _error error, _cache bool) () { _response := (*fasthttp.Response) (NoEscape (unsafe.Pointer (&_context.Response))) _responseHeaders := (*fasthttp.ResponseHeader) (NoEscape (unsafe.Pointer (&_response.Header))) _responseHeaders.AddBytesKV (StringToBytes ("Content-Type"), StringToBytes (ErrorBannerContentType)) _responseHeaders.AddBytesKV (StringToBytes ("Content-Encoding"), StringToBytes (ErrorBannerContentEncoding)) if _cache { _responseHeaders.AddBytesKV (StringToBytes ("Cache-Control"), StringToBytes ("public, immutable, max-age=3600")) } else { _responseHeaders.AddBytesKV (StringToBytes ("Cache-Control"), StringToBytes ("private, no-cache, no-store")) } if _banner, _bannerFound := ErrorBannersData[_status]; _bannerFound { _response.SetBodyRaw (_banner) } _response.SetStatusCode (int (_status)) if (_error != nil) && !_server.quiet { LogError (_error, "[23d6cb35] failed handling request!") } } func (_server *server) ServeDummy (_context *fasthttp.RequestCtx) () { _server.ServeStatic (_context, http.StatusOK, DummyData, DummyContentType, DummyContentEncoding, false) } func (_server *server) ServeHTTP (_response http.ResponseWriter, _request *http.Request) () { _requestProtoUnsupported := false switch _request.ProtoMajor { case 1 : _requestProtoUnsupported = _server.http1Disabled || (_request.ProtoMinor < 0) || (_request.ProtoMinor > 1) case 2 : _requestProtoUnsupported = _server.http2Disabled || (_request.ProtoMinor != 0) default : _requestProtoUnsupported = true } if _requestProtoUnsupported { _request.Close = true _response.WriteHeader (http.StatusHTTPVersionNotSupported) return } if _server.dummy { _responseHeaders := _response.Header () _responseHeaders["Content-Type"] = []string { DummyContentType } _responseHeaders["Content-Encoding"] = []string { DummyContentEncoding } _responseHeaders["Cache-Control"] = []string { "private, no-cache, no-store" } _responseHeaders["Date"] = nil _response.WriteHeader (http.StatusOK) _response.Write (DummyData) return } // FIXME: Reimplemnet this to eliminate the HTTP-encode-followed-by-HTTP-decode! _context := fasthttp.RequestCtx {} _context.Request.Reset () _context.Response.Reset () _context.Request.Header.SetMethod (_request.Method) _context.Request.Header.SetRequestURI (_request.URL.Path) _server.Serve (&_context) { _buffer := bytes.NewBuffer (make ([]byte, 0, 4096)) _writer := bufio.NewWriter (_buffer) _context.Response.Header.Write (_writer) _writer.Flush () _context.Response.Header.Read (bufio.NewReader (_buffer)) } _responseBody := _context.Response.Body () _responseHeaders := _response.Header () _context.Response.Header.VisitAll ( func (_key_0 []byte, _value_0 []byte) () { switch string (_key_0) { case "Connection", "Content-Length" : // NOP default : _key := string (_key_0) _value := string (_value_0) _responseHeaders[_key] = append (_responseHeaders[_key], _value) } }) if len (_responseBody) > 0 { _responseHeaders["Content-Length"] = []string { fmt.Sprintf ("%d", len (_responseBody)) } } _response.WriteHeader (_context.Response.Header.StatusCode ()) _response.Write (_responseBody) } func (_server *server) Printf (_format string, _arguments ... interface{}) () { if !_server.quiet { log.Printf ("[ee] [47765179] [fasthttp] " + _format, _arguments ...) } } func Main () () { log.SetPrefix (fmt.Sprintf ("[%8d] ", os.Getpid ())) Main_0 (main_0) } func main_0 () (error) { // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- var _bind string var _bindTls string var _bindTls2 string var _http1Disabled bool var _http2Disabled bool var _tlsPrivate string var _tlsPublic string var _archivePath string var _archiveInmem bool var _archiveMmap bool var _archivePreload bool var _indexPaths bool var _indexDataMeta bool var _indexDataContent bool var _securityHeadersEnabled bool var _securityHeadersTls bool var _timeoutDisabled bool var _processes uint var _threads uint var _slave uint var _debug bool var _quiet bool var _dummy bool var _delay time.Duration var _profileCpu string var _profileMem string var _limitMemory uint var _isFirst bool var _isMaster bool { _flags := flag.NewFlagSet ("kawipiko-server", flag.ContinueOnError) _flags.Usage = func () () { fmt.Fprintf (os.Stderr, "%s", usageText) } _bind_0 := _flags.String ("bind", "", "") _bindTls_0 := _flags.String ("bind-tls", "", "") _bindTls2_0 := _flags.String ("bind-tls-2", "", "") _http1Disabled_0 := _flags.Bool ("http1-disable", false, "") _http2Disabled_0 := _flags.Bool ("http2-disable", false, "") _archivePath_0 := _flags.String ("archive", "", "") _archiveInmem_0 := _flags.Bool ("archive-inmem", false, "") _archiveMmap_0 := _flags.Bool ("archive-mmap", false, "") _archivePreload_0 := _flags.Bool ("archive-preload", false, "") _indexAll_0 := _flags.Bool ("index-all", false, "") _indexPaths_0 := _flags.Bool ("index-paths", false, "") _indexDataMeta_0 := _flags.Bool ("index-data-meta", false, "") _indexDataContent_0 := _flags.Bool ("index-data-content", false, "") _timeoutDisabled_0 := _flags.Bool ("timeout-disable", false, "") _securityHeadersTls_0 := _flags.Bool ("security-headers-tls", false, "") _securityHeadersDisabled_0 := _flags.Bool ("security-headers-disable", false, "") _tlsPrivate_0 := _flags.String ("tls-private", "", "") _tlsPublic_0 := _flags.String ("tls-public", "", "") _tlsBundle_0 := _flags.String ("tls-bundle", "", "") _processes_0 := _flags.Uint ("processes", 0, "") _threads_0 := _flags.Uint ("threads", 0, "") _slave_0 := _flags.Uint ("slave", 0, "") _debug_0 := _flags.Bool ("debug", false, "") _quiet_0 := _flags.Bool ("quiet", false, "") _dummy_0 := _flags.Bool ("dummy", false, "") _delay_0 := _flags.Duration ("delay", 0, "") _profileCpu_0 := _flags.String ("profile-cpu", "", "") _profileMem_0 := _flags.String ("profile-mem", "", "") _limitMemory_0 := _flags.Uint ("limit-memory", 0, "") FlagsParse (_flags, 0, 0) _bind = *_bind_0 _bindTls = *_bindTls_0 _bindTls2 = *_bindTls2_0 _http1Disabled = *_http1Disabled_0 _http2Disabled = *_http2Disabled_0 _archivePath = *_archivePath_0 _archiveInmem = *_archiveInmem_0 _archiveMmap = *_archiveMmap_0 _archivePreload = *_archivePreload_0 _indexAll := *_indexAll_0 _indexPaths = _indexAll || *_indexPaths_0 _indexDataMeta = _indexAll || *_indexDataMeta_0 _indexDataContent = _indexAll || *_indexDataContent_0 _securityHeadersTls = *_securityHeadersTls_0 _securityHeadersEnabled = ! *_securityHeadersDisabled_0 _timeoutDisabled = *_timeoutDisabled_0 _processes = *_processes_0 _threads = *_threads_0 _slave = *_slave_0 _debug = *_debug_0 _quiet = *_quiet_0 && !_debug _dummy = *_dummy_0 _delay = *_delay_0 _profileCpu = *_profileCpu_0 _profileMem = *_profileMem_0 _limitMemory = *_limitMemory_0 if _slave == 0 { _isMaster = true } if _slave <= 1 { _isFirst = true } if (_bind == "") && (_bindTls == "") && (_bindTls2 == "") { AbortError (nil, "[6edd9512] expected bind address argument!") } if (*_tlsBundle_0 != "") && ((*_tlsPrivate_0 != "") || (*_tlsPublic_0 != "")) { AbortError (nil, "[717f5f84] TLS bundle and TLS private/public are mutually exclusive!") } if (*_tlsBundle_0 != "") { _tlsPrivate = *_tlsBundle_0 _tlsPublic = *_tlsBundle_0 } else { _tlsPrivate = *_tlsPrivate_0 _tlsPublic = *_tlsPublic_0 } if ((_tlsPrivate != "") && (_tlsPublic == "")) || ((_tlsPublic != "") && (_tlsPrivate == "")) { AbortError (nil, "[6e5b42e4] TLS private/public must be specified together!") } if ((_tlsPrivate != "") || (_tlsPublic != "")) && ((_bindTls == "") && (_bindTls2 == "")) { AbortError (nil, "[4e31f251] TLS certificate specified, but TLS not enabled!") } if _http1Disabled && (_bind != "") { AbortError (nil, "[f498816a] HTTP/1 is mandatory with `--bind`!") } if _http1Disabled && (_bindTls != "") { AbortError (nil, "[f498816a] HTTP/1 is mandatory with `--bind-tls`!") } if _http2Disabled && (_bindTls == "") && (_bindTls2 == "") { log.Printf ("[ww] [1ed4864c] HTTP/2 is only available with TLS!\n") } if !_dummy { if _archivePath == "" { AbortError (nil, "[eefe1a38] expected archive file argument!") } if _archiveInmem && _archiveMmap { AbortError (nil, "[a2101041] archive 'memory-loaded' and 'memory-mapped' are mutually exclusive!") } if _archiveInmem && _archivePreload { log.Printf ("[ww] [3e8a40e4] archive 'memory-loaded' implies preloading!\n") _archivePreload = false } } else { if _isMaster { log.Printf ("[ww] [8e014192] running in dummy mode; all archive related arguments are ignored!\n") } _archivePath = "" _archiveInmem = false _archiveMmap = false _archivePreload = false _indexAll = false _indexPaths = false _indexDataMeta = false _indexDataContent = false } if !_dummy && (_delay != 0) { if _isMaster { log.Printf ("[ww] [e9296c03] running with a response delay of `%s`!\n", _delay) } } if (_processes > 1) && ((_profileCpu != "") || (_profileMem != "")) { AbortError (nil, "[cd18d250] multi-process and profiling are mutually exclusive!") } if _processes < 1 { _processes = 1 } if _threads < 1 { _threads = 1 } if _processes > 1024 { AbortError (nil, "[45736c1d] maximum number of allowed processes is 1024!") } if _threads > 1024 { AbortError (nil, "[c5df3c8d] maximum number of allowed threads is 1024!") } if (_processes * _threads) > 1024 { AbortError (nil, "[b0177488] maximum number of allowed threads in total is 1024!") } if (_limitMemory != 0) && ((_limitMemory > (16 * 1024)) || (_limitMemory < 128)) { AbortError (nil, "[2781f54c] maximum memory limit is between 128 and 16384 MiB!") } } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- runtime.GOMAXPROCS (int (_threads)) debug.SetGCPercent (50) debug.SetMaxThreads (int (128 * (_threads / 64 + 1))) debug.SetMaxStack (16 * 1024) _httpServerReduceMemory := false if _limitMemory > 0 { if !_quiet && _isMaster { log.Printf ("[ii] [2c130d70] limiting memory to %d MiB;\n", _limitMemory) } { _limitMb := (2 * _limitMemory) + (1 * 1024) _limit := syscall.Rlimit { Cur : uint64 (_limitMb) * 1024 * 1024, Max : uint64 (_limitMb) * 1024 * 1024, } if _error := syscall.Setrlimit (syscall.RLIMIT_AS, &_limit); _error != nil { AbortError (_error, "[4da96378] failed to configure memory limit!") } } { _limitMb := _limitMemory _limit := syscall.Rlimit { Cur : uint64 (_limitMb) * 1024 * 1024, Max : uint64 (_limitMb) * 1024 * 1024, } if _error := syscall.Setrlimit (syscall.RLIMIT_DATA, &_limit); _error != nil { AbortError (_error, "[f661b4fe] failed to configure memory limit!") } } } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- if _processes > 1 { log.Printf ("[ii] [06f8c944] sub-processes starting (`%d` processes with `%d` threads each)...\n", _processes, _threads) _processesJoin := & sync.WaitGroup {} _processesPid := make ([]*os.Process, _processes) _processName := os.Args[0] _processArguments := make ([]string, 0, len (os.Args)) if _bind != "" { _processArguments = append (_processArguments, "--bind", _bind) } if _bindTls != "" { _processArguments = append (_processArguments, "--bind-tls", _bindTls) } if _bindTls2 != "" { _processArguments = append (_processArguments, "--bind-tls-2", _bindTls2) } if _http1Disabled { _processArguments = append (_processArguments, "--http1-disabled") } if _http2Disabled { _processArguments = append (_processArguments, "--http2-disabled") } if _archivePath != "" { _processArguments = append (_processArguments, "--archive", _archivePath) } if _archiveInmem { _processArguments = append (_processArguments, "--archive-inmem") } if _archiveMmap { _processArguments = append (_processArguments, "--archive-mmap") } if _archivePreload { _processArguments = append (_processArguments, "--archive-preload") } if _indexPaths { _processArguments = append (_processArguments, "--index-paths") } if _indexDataMeta { _processArguments = append (_processArguments, "--index-data-meta") } if _indexDataContent { _processArguments = append (_processArguments, "--index-data-content") } if _securityHeadersTls { _processArguments = append (_processArguments, "--security-headers-tls") } if !_securityHeadersEnabled { _processArguments = append (_processArguments, "--security-headers-disable") } if _tlsPrivate != "" { _processArguments = append (_processArguments, "--tls-private", _tlsPrivate) } if _tlsPublic != "" { _processArguments = append (_processArguments, "--tls-public", _tlsPublic) } if _timeoutDisabled { _processArguments = append (_processArguments, "--timeout-disable") } if _limitMemory != 0 { _processArguments = append (_processArguments, "--limit-memory", fmt.Sprintf ("%d", _limitMemory)) } if _quiet { _processArguments = append (_processArguments, "--quiet") } if _debug { _processArguments = append (_processArguments, "--debug") } if _dummy { _processArguments = append (_processArguments, "--dummy") } _processArguments = append (_processArguments, "--threads", fmt.Sprintf ("%d", _threads)) _processAttributes := & os.ProcAttr { Env : []string {}, Files : []*os.File { os.Stdin, os.Stdout, os.Stderr, }, Sys : nil, } for _processIndex, _ := range _processesPid { _processArguments := append ([]string { _processName, "--slave", fmt.Sprintf ("%d", _processIndex + 1) }, _processArguments ...) if _processPid, _error := os.StartProcess (_processName, _processArguments, _processAttributes); _error == nil { _processesJoin.Add (1) _processesPid[_processIndex] = _processPid if !_quiet { log.Printf ("[ii] [63cb22f8] sub-process `%d` started (with `%d` threads);\n", _processPid.Pid, _threads) } go func (_index int, _processPid *os.Process) () { if _processStatus, _error := _processPid.Wait (); _error == nil { if _processStatus.Success () { if _debug { log.Printf ("[ii] [66b60b81] sub-process `%d` succeeded;\n", _processPid.Pid) } } else { log.Printf ("[ww] [5d25046b] sub-process `%d` failed: `%s`; ignoring!\n", _processPid.Pid, _processStatus) } } else { LogError (_error, fmt.Sprintf ("[f1bfc927] failed waiting for sub-process `%d`; ignoring!", _processPid.Pid)) } _processesPid[_processIndex] = nil _processesJoin.Done () } (_processIndex, _processPid) } else { LogError (_error, "[8892b34d] failed starting sub-process; ignoring!") } } { _signals := make (chan os.Signal, 32) signal.Notify (_signals, syscall.SIGINT, syscall.SIGTERM) go func () () { for { _signal := <- _signals if _debug { log.Printf ("[ii] [a9243ecb] signaling sub-processes...\n") } for _, _processPid := range _processesPid { if _processPid != nil { if _error := _processPid.Signal (_signal); _error != nil { LogError (_error, fmt.Sprintf ("[ab681164] failed signaling sub-process `%d`; ignoring!", _processPid.Pid)) } } } } } () } _processesJoin.Wait () if !_quiet { log.Printf ("[ii] [b949bafc] sub-processes terminated;\n") } return nil } if _isMaster { log.Printf ("[ii] [6602a54a] starting (with `%d` threads)...\n", _threads) } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- var _cdbReader *cdb.CDB if _archivePath != "" { if !_quiet && (_debug || _isFirst) { log.Printf ("[ii] [3b788396] opening archive file `%s`...\n", _archivePath) } var _cdbFile *os.File if _cdbFile_0, _error := os.Open (_archivePath); _error == nil { _cdbFile = _cdbFile_0 } else { AbortError (_error, "[9e0b5ed3] failed opening archive file!") } var _cdbFileSize int { var _cdbFileSize_0 int64 if _cdbFileStat, _error := _cdbFile.Stat (); _error == nil { _cdbFileSize_0 = _cdbFileStat.Size () } else { AbortError (_error, "[0ccf0a3b] failed opening archive file!") } if _cdbFileSize_0 < 1024 { AbortError (nil, "[6635a2a8] failed opening archive: file is too small (or empty)!") } if _cdbFileSize_0 >= (4 * 1024 * 1024 * 1024) { AbortError (nil, "[545bf6ce] failed opening archive: file is too large!") } _cdbFileSize = int (_cdbFileSize_0) } if _archivePreload { if !_quiet { log.Printf ("[ii] [13f4ebf7] preloading archive file...\n") } _buffer := [16 * 1024]byte {} _loop : for { switch _, _error := _cdbFile.Read (_buffer[:]); _error { case io.EOF : break _loop case nil : continue _loop default : AbortError (_error, "[a1c3b922] failed preloading archive file...") } } } if _archiveInmem || _archiveMmap { var _cdbData []byte if _archiveInmem { if _debug { log.Printf ("[ii] [216e584b] opening memory-loaded archive...\n") } _cdbData = make ([]byte, _cdbFileSize) if _, _error := io.ReadFull (_cdbFile, _cdbData); _error != nil { AbortError (_error, "[73039784] failed loading archive file!") } } else if _archiveMmap { if _debug { log.Printf ("[ii] [f47fae8a] opening memory-mapped archive...\n") } if _cdbData_0, _error := syscall.Mmap (int (_cdbFile.Fd ()), 0, int (_cdbFileSize), syscall.PROT_READ, syscall.MAP_SHARED); _error == nil { _cdbData = _cdbData_0 } else { AbortError (_error, "[c0e2632c] failed mapping archive file!") } if _archivePreload { if _debug { log.Printf ("[ii] [d96b06c9] preloading memory-loaded archive...\n") } _buffer := [16 * 1024]byte {} _bufferOffset := 0 for { if _bufferOffset == _cdbFileSize { break } _bufferOffset += copy (_buffer[:], _cdbData[_bufferOffset:]) } } } else { panic ("[e4fffcd8]") } if _error := _cdbFile.Close (); _error != nil { AbortError (_error, "[5e0449c2] failed closing archive file!") } if _cdbReader_0, _error := cdb.NewFromBufferWithHasher (_cdbData, nil); _error == nil { _cdbReader = _cdbReader_0 } else { AbortError (_error, "[27e4813e] failed opening archive!") } } else { if !_quiet && (_debug || _isFirst) { log.Printf ("[ww] [dd697a66] using `read`-based archive (with significant performance impact)!\n") } if _cdbReader_0, _error := cdb.NewFromReaderWithHasher (_cdbFile, nil); _error == nil { _cdbReader = _cdbReader_0 } else { AbortError (_error, "[35832022] failed opening archive!") } } if _schemaVersion, _error := _cdbReader.GetWithCdbHash ([]byte (NamespaceSchemaVersion)); _error == nil { if _schemaVersion == nil { AbortError (nil, "[09316866] missing archive schema version!") } else if string (_schemaVersion) != CurrentSchemaVersion { AbortError (nil, "[e6482cf7] invalid archive schema version!") } } else { AbortError (_error, "[87cae197] failed opening archive!") } } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- var _cachedFileFingerprints map[string][]byte if _indexPaths { _cachedFileFingerprints = make (map[string][]byte, 128 * 1024) } var _cachedDataMeta map[string][]byte if _indexDataMeta { _cachedDataMeta = make (map[string][]byte, 128 * 1024) } var _cachedDataContent map[string][]byte if _indexDataContent { _cachedDataContent = make (map[string][]byte, 128 * 1024) } if _indexPaths || _indexDataMeta || _indexDataContent { if !_quiet { log.Printf ("[ii] [fa5338fd] indexing archive...\n") } if _filesIndex, _error := _cdbReader.GetWithCdbHash ([]byte (NamespaceFilesIndex)); _error == nil { if _filesIndex != nil { _keyBuffer := [1024]byte {} for { _offset := bytes.IndexByte (_filesIndex, '\n') if _offset == 0 { continue } if _offset == -1 { break } _filePath := _filesIndex[: _offset] _filesIndex = _filesIndex[_offset + 1 :] var _fingerprints []byte var _fingerprintContent []byte var _fingerprintMeta []byte { _key := _keyBuffer[:0] _key = append (_key, NamespaceFilesContent ...) _key = append (_key, ':') _key = append (_key, _filePath ...) if _fingerprints_0, _error := _cdbReader.GetWithCdbHash (_key); _error == nil { if _fingerprints_0 != nil { _fingerprints = _fingerprints_0 _fingerprintsSplit := bytes.IndexByte (_fingerprints, ':') if _fingerprintsSplit < 0 { AbortError (nil, "[aa6e678f] failed indexing archive!") } _fingerprintMeta = _fingerprints[:_fingerprintsSplit] _fingerprintContent = _fingerprints[_fingerprintsSplit + 1:] } else { AbortError (_error, "[460b3cf1] failed indexing archive!") } } else { AbortError (_error, "[216f2075] failed indexing archive!") } } if _indexPaths { _cachedFileFingerprints[BytesToString (_filePath)] = _fingerprints } if _indexDataMeta { if _, _wasCached := _cachedDataMeta[BytesToString (_fingerprintMeta)]; !_wasCached { _key := _keyBuffer[:0] _key = append (_key, NamespaceDataMetadata ...) _key = append (_key, ':') _key = append (_key, _fingerprintMeta ...) if _dataMeta, _error := _cdbReader.GetWithCdbHash (_key); _error == nil { if _dataMeta != nil { _cachedDataMeta[BytesToString (_fingerprintMeta)] = _dataMeta } else { AbortError (_error, "[6df556bf] failed indexing archive!") } } else { AbortError (_error, "[0d730134] failed indexing archive!") } } } if _indexDataContent { if _, _wasCached := _cachedDataContent[BytesToString (_fingerprintContent)]; !_wasCached { _key := _keyBuffer[:0] _key = append (_key, NamespaceDataContent ...) _key = append (_key, ':') _key = append (_key, _fingerprintContent ...) if _dataContent, _error := _cdbReader.GetWithCdbHash (_key); _error == nil { if _dataContent != nil { _cachedDataContent[BytesToString (_fingerprintContent)] = _dataContent } else { AbortError (_error, "[4e27fe46] failed indexing archive!") } } else { AbortError (_error, "[532845ad] failed indexing archive!") } } } } } else { log.Printf ("[ww] [30314f31] missing archive files index; ignoring!\n") } } else { AbortError (_error, "[82299b3d] failed indexing arcdive!") } } if _indexPaths && _indexDataMeta && _indexDataContent { if _error := _cdbReader.Close (); _error == nil { _cdbReader = nil } else { AbortError (_error, "[d7aa79e1] failed closing archive!") } } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- if _profileCpu != "" { log.Printf ("[ii] [70c210f3] profiling CPU to `%s`...\n", _profileCpu) _stream, _error := os.Create (_profileCpu) if _error != nil { AbortError (_error, "[fd4e0009] failed opening CPU profile!") } _error = pprof.StartCPUProfile (_stream) if _error != nil { AbortError (_error, "[ac721629] failed starting CPU profile!") } defer pprof.StopCPUProfile () } if _profileMem != "" { log.Printf ("[ii] [9196ee90] profiling MEM to `%s`...\n", _profileMem) _stream, _error := os.Create (_profileMem) if _error != nil { AbortError (_error, "[907d08b5] failed opening MEM profile!") } _profile := pprof.Lookup ("heap") defer func () () { runtime.GC () if _profile != nil { if _error := _profile.WriteTo (_stream, 0); _error != nil { AbortError (_error, "[4b1e5112] failed writing MEM profile!") } } else { AbortError (nil, "[385dc8f0] failed loading MEM profile!") } _stream.Close () } () } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- _server := & server { cdbReader : _cdbReader, cachedFileFingerprints : _cachedFileFingerprints, cachedDataMeta : _cachedDataMeta, cachedDataContent : _cachedDataContent, securityHeadersTls : _securityHeadersTls, securityHeadersEnabled : _securityHeadersEnabled, http1Disabled : _http1Disabled, http2Disabled : _http2Disabled, quiet : _quiet, debug : _debug, dummy : _dummy, delay : _delay, } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- _tlsConfig := & tls.Config { Certificates : nil, MinVersion : tls.VersionTLS12, CipherSuites : []uint16 { // NOTE: https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility // NOTE: TLSv1.3 tls.TLS_AES_128_GCM_SHA256, tls.TLS_AES_256_GCM_SHA384, tls.TLS_CHACHA20_POLY1305_SHA256, // NOTE: TLSv1.2 tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, // NOTE: Required for HTTP/2. tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, tls.TLS_RSA_WITH_AES_128_GCM_SHA256, }, Renegotiation : tls.RenegotiateNever, PreferServerCipherSuites : true, SessionTicketsDisabled : true, DynamicRecordSizingDisabled : true, NextProtos : []string { "http/1.1", "http/1.0" }, } if (_bindTls != "") || (_bindTls2 != "") { if _tlsPrivate != "" { if _certificate, _error := tls.LoadX509KeyPair (_tlsPublic, _tlsPrivate); _error == nil { _tlsConfig.Certificates = append (_tlsConfig.Certificates, _certificate) } else { AbortError (_error, "[ecdf443d] failed loading TLS certificate!") } } if len (_tlsConfig.Certificates) == 0 { if !_quiet { log.Printf ("[ii] [344ba198] no TLS certificate specified; using self-signed!\n") } if _certificate, _error := tls.X509KeyPair ([]byte (DefaultTlsCertificatePublic), []byte (DefaultTlsCertificatePrivate)); _error == nil { _tlsConfig.Certificates = append (_tlsConfig.Certificates, _certificate) } else { AbortError (_error, "[98ba6d23] failed parsing TLS certificate!") } } } _httpServer := & fasthttp.Server { Name : "kawipiko", Handler : _server.Serve, GetOnly : true, NoDefaultServerHeader : true, NoDefaultContentType : true, NoDefaultDate : true, DisableHeaderNamesNormalizing : true, Concurrency : 16 * 1024 + 128, MaxRequestsPerConn : 256 * 1024, ReadBufferSize : 16 * 1024, WriteBufferSize : 16 * 1024, MaxRequestBodySize : 16 * 1024, ReadTimeout : 30 * time.Second, WriteTimeout : 30 * time.Second, IdleTimeout : 360 * time.Second, TCPKeepalive : true, TCPKeepalivePeriod : 60 * time.Second, ReduceMemoryUsage : _httpServerReduceMemory, CloseOnShutdown : true, DisableKeepalive : false, Logger : _server, } _httpsServer := & fasthttp.Server {} *_httpsServer = *_httpServer _https2Server := & http.Server { Handler : _server, TLSConfig : nil, MaxHeaderBytes : _httpsServer.ReadBufferSize, ReadTimeout : _httpsServer.ReadTimeout, ReadHeaderTimeout : _httpsServer.ReadTimeout, WriteTimeout : _httpsServer.WriteTimeout, IdleTimeout : _httpsServer.IdleTimeout, } _tls2Config := _tlsConfig.Clone () if !_http1Disabled && !_http2Disabled { _tls2Config.NextProtos = []string { "h2", "http/1.1", "http/1.0" } } else if !_http1Disabled { _tls2Config.NextProtos = []string { "http/1.1", "http/1.0" } } else if !_http2Disabled { _tls2Config.NextProtos = []string { "h2" } } else { panic ("[1b618ffe]") } if !_quiet { _https2Server.ErrorLog = log.New (os.Stderr, log.Prefix () + "[ee] [f734edc4] [gohttp] ", 0) } else { _https2Server.ErrorLog = log.New (ioutil.Discard, "", 0) } if _timeoutDisabled { _httpServer.ReadTimeout = 0 _httpServer.WriteTimeout = 0 _httpServer.IdleTimeout = 0 _httpsServer.ReadTimeout = 0 _httpsServer.WriteTimeout = 0 _httpsServer.IdleTimeout = 0 _https2Server.ReadTimeout = 0 _https2Server.ReadHeaderTimeout = 0 _https2Server.WriteTimeout = 0 _https2Server.IdleTimeout = 0 } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- if !_quiet && (_debug || _isFirst) { if _bind != "" { log.Printf ("[ii] [f11e4e37] listening on `http://%s/` (using FastHTTP supporting HTTP/1.1, HTTP/1.0);\n", _bind) } if _bindTls != "" { if !_http1Disabled && (!_http2Disabled && _bindTls2 == "") { log.Printf ("[ii] [21f050c3] listening on `https://%s/` (using FastHTTP supporting TLS with HTTP/1.1, HTTP/1.0, and HTTP/2 split);\n", _bindTls) } else if !_http1Disabled { log.Printf ("[ii] [21f050c3] listening on `https://%s/` (using FastHTTP supporting TLS with HTTP/1.1, HTTP/1.0);\n", _bindTls) } else { panic ("[fc754170]") } } if _bindTls2 != "" { if !_http1Disabled && !_http2Disabled { log.Printf ("[ii] [e7f03c99] listening on `https://%s/` (using Go HTTP supporting TLS with HTTP/2, HTTP/1.1, HTTP/1.0);\n", _bindTls2) } else if !_http1Disabled { log.Printf ("[ii] [477583ad] listening on `https://%s/` (using Go HTTP supporting TLS with HTTP/1.1, HTTP/1.0 only);\n", _bindTls2) } else if !_http2Disabled { log.Printf ("[ii] [7d2c7ddb] listening on `https://%s/` (using Go HTTP supporting TLS with HTTP/2 only);\n", _bindTls2) } else { panic ("[d784a82c]") } } } var _httpListener net.Listener if _bind != "" { if _listener_0, _error := reuseport.Listen ("tcp4", _bind); _error == nil { _httpListener = _listener_0 } else { AbortError (_error, "[d5f51e9f] failed creating HTTP listener!") } } var _httpsListener net.Listener if _bindTls != "" { if _listener_0, _error := reuseport.Listen ("tcp4", _bindTls); _error == nil { _httpsListener = _listener_0 } else { AbortError (_error, "[e35cc693] failed creating HTTPS listener!") } } var _https2Listener net.Listener if _bindTls2 != "" { if _listener_0, _error := reuseport.Listen ("tcp4", _bindTls2); _error == nil { _https2Listener = _listener_0 } else { AbortError (_error, "[63567445] failed creating HTTPS+2 listener!") } } var _splitListenerClose func () () if (_httpsListener != nil) && (_https2Listener == nil) && !_http2Disabled { log.Printf ("[ii] [1098a405] listening on `https://%s/` (using Go HTTP supporting only HTTP/2 split);\n", _bindTls) _tlsConfig.NextProtos = []string { "h2", "http/1.1", "http/1.0" } _tlsListener := tls.NewListener (_httpsListener, _tlsConfig) _httpsListener_0 := & splitListener { listener : _tlsListener, queue : make (chan net.Conn), } _https2Listener_0 := & splitListener { listener : _tlsListener, queue : make (chan net.Conn), } _splitListenerClose = func () () { if _error := _tlsListener.Close (); _error != nil { LogError (_error, "[a5bce477] failed closing TLS listener!") } } go func () () { for { if _connection_0, _error := _tlsListener.Accept (); _error == nil { go func () () { _connection := _connection_0.(*tls.Conn) if _error := _connection.Handshake (); _error != nil { if !_quiet { LogError (_error, "[d1c3dba3] failed negotiating TLS connection!") } } _protocol := _connection.ConnectionState () .NegotiatedProtocol if _protocol == "h2" { if _debug { log.Printf ("[dd] [df9f3e7e] dispatching HTTP/2 TLS connection!\n") } _https2Listener_0.queue <- _connection } else if (_protocol == "http/1.1") || (_protocol == "http/1.0") || (_protocol == "") { if _debug { log.Printf ("[dd] [d534c361] dispatching HTTP/1.x TLS connection!\n") } _httpsListener_0.queue <- _connection } else { if !_quiet { log.Printf ("[ww] [5cc0ebde] unknown TLS protocol `%s`!\n", _protocol) } _connection.Close () } } () } else if strings.Contains (_error.Error (), "use of closed network connection") { break } else { LogError (_error, "[04b6637f] failed accepting TLS connection!") break } } } () _httpsListener = _httpsListener_0 _https2Listener = _https2Listener_0 } else { if _httpsListener != nil { _httpsListener = tls.NewListener (_httpsListener, _tlsConfig) } if _https2Listener != nil { _https2Listener = tls.NewListener (_https2Listener, _tls2Config) } } if _httpListener != nil { _server.httpServer = _httpServer } if _httpsListener != nil { _server.httpsServer = _httpsServer } if _https2Listener != nil { _server.https2Server = _https2Server } _httpServer = nil _httpsServer = nil _https2Server = nil // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- var _waiter sync.WaitGroup if _server.httpServer != nil { _waiter.Add (1) go func () () { defer _waiter.Done () if !_quiet { log.Printf ("[ii] [f2061f1b] starting FastHTTP server...\n") } if _error := _server.httpServer.Serve (_httpListener); _error != nil { AbortError (_error, "[44f45c67] failed executing server!") } } () } if _server.httpsServer != nil { _waiter.Add (1) go func () () { defer _waiter.Done () if !_quiet { log.Printf ("[ii] [83cb1f6f] starting FastHTTP server (with TLS)...\n") } if _error := _server.httpsServer.Serve (_httpsListener); _error != nil { AbortError (_error, "[b2d50852] failed executing server!") } } () } if _server.https2Server != nil { _waiter.Add (1) go func () () { defer _waiter.Done () if !_quiet { log.Printf ("[ii] [46ec2e41] starting Go HTTP server...\n") } if _error := _server.https2Server.Serve (_https2Listener); (_error != nil) && (_error != http.ErrServerClosed) { AbortError (_error, "[9f6d28f4] failed executing server!") } } () } { _waiter.Add (1) _signals := make (chan os.Signal, 32) signal.Notify (_signals, syscall.SIGINT, syscall.SIGTERM) go func () () { defer _waiter.Done () <- _signals if !_quiet { log.Printf ("[ii] [691cb695] terminating...\n") } if _server.httpServer != nil { _waiter.Add (1) go func () () { defer _waiter.Done () if !_quiet { log.Printf ("[ii] [8eea3f63] stopping FastHTTP server...\n") } _server.httpServer.Shutdown () if !_quiet { log.Printf ("[ii] [aca4a14f] stopped FastHTTP server;\n") } } () } if _splitListenerClose != nil { _waiter.Add (1) go func () () { defer _waiter.Done () _splitListenerClose () } () } if _server.httpsServer != nil { _waiter.Add (1) go func () () { defer _waiter.Done () if !_quiet { log.Printf ("[ii] [ff651007] stopping FastHTTP server (for TLS)...\n") } _server.httpsServer.Shutdown () if !_quiet { log.Printf ("[ii] [ee4180b7] stopped FastHTTP server (for TLS);\n") } } () } if _server.https2Server != nil { _waiter.Add (1) go func () () { defer _waiter.Done () if !_quiet { log.Printf ("[ii] [9ae5a25b] stopping Go HTTP server...\n") } _server.https2Server.Shutdown (context.TODO ()) if !_quiet { log.Printf ("[ii] [9a487770] stopped Go HTTP server;\n") } } () } if true { go func () () { time.Sleep (6 * time.Second) AbortError (nil, "[827c672c] forced terminated!") } () } } () } _waiter.Wait () if !_quiet { defer log.Printf ("[ii] [a49175db] terminated!\n") } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- if _cdbReader != nil { _server.cdbReader = nil if _error := _cdbReader.Close (); _error != nil { AbortError (_error, "[a1031c39] failed closing archive!") } } // -------------------------------------------------------------------------------- // -------------------------------------------------------------------------------- return nil } type splitListener struct { listener net.Listener queue chan net.Conn } func (_listener *splitListener) Accept () (net.Conn, error) { if _connection, _ok := <- _listener.queue; _ok { return _connection, nil } else { return nil, io.EOF } } func (_listener *splitListener) Close () (error) { close (_listener.queue) return nil } func (_listener *splitListener) Addr () (net.Addr) { if _listener.listener != nil { return _listener.listener.Addr () } else { return nil } } //go:embed usage.txt var usageText string