#include <assert.h>
#include <errno.h>
+#include <inttypes.h>
#include <netinet/in.h>
+#include <netinet/tcp.h>
#include <pthread.h>
#include <stdint.h>
#include <stdio.h>
#include <utility>
#include <vector>
+#include "ktls.h"
#include "tlse.h"
#include "acceptor.h"
int Server::lookup_stream_by_url(const string &url) const
{
- map<string, int>::const_iterator stream_url_it = stream_url_map.find(url);
+ const auto stream_url_it = stream_url_map.find(url);
if (stream_url_it == stream_url_map.end()) {
return -1;
}
}
}
+namespace {
+
+void flush_pending_data(int sock)
+{
+ // Flush pending data, which would otherwise wait for the 200ms TCP_CORK timer
+ // to elapsed; does not cancel out TCP_CORK (since that still takes priority),
+ // but does a one-off flush.
+ int one = 1;
+ if (setsockopt(sock, SOL_TCP, TCP_NODELAY, &one, sizeof(one)) == -1) {
+ log_perror("setsockopt(TCP_NODELAY)");
+ // Can still continue.
+ }
+}
+
+} // namespace
+
bool Server::send_pending_tls_data(Client *client)
{
// See if there's data from the TLS library to write.
return true;
}
if (ret > 0 && size_t(ret) == client->tls_data_left_to_send) {
- // All data has been sent, so we don't need to go to sleep.
+ // All data has been sent, so we don't need to go to sleep
+ // (although we are likely to do so immediately afterwards,
+ // due to lack of client data).
tls_buffer_clear(client->tls_context);
client->tls_data_to_send = nullptr;
+
+ // Flush the data we just wrote, since the client probably
+ // is waiting for it.
+ flush_pending_data(client->sock);
return false;
}
if (!client->close_after_response) {
assert(client->stream_pos_end != Client::STREAM_POS_NO_END);
- // We've already sent a Content-length, so we can't just skip data.
+ // We've already sent a Content-Length, so we can't just skip data.
// Close the connection immediately and hope the other side
// is able to figure out that there was an error and it needs to skip.
client->close_after_response = true;
}
// Parse the headers, for logging purposes.
- // TODO: Case-insensitivity.
- multimap<string, string> headers = extract_headers(lines, client->remote_addr);
- multimap<string, string>::const_iterator referer_it = headers.find("Referer");
+ HTTPHeaderMultimap headers = extract_headers(lines, client->remote_addr);
+ const auto referer_it = headers.find("Referer");
if (referer_it != headers.end()) {
client->referer = referer_it->second;
}
- multimap<string, string>::const_iterator user_agent_it = headers.find("User-Agent");
+ const auto user_agent_it = headers.find("User-Agent");
if (user_agent_it != headers.end()) {
client->user_agent = user_agent_it->second;
}
client->close_after_response = true;
client->http_11 = false;
} else {
- multimap<string, string>::const_iterator connection_it = headers.find("Connection");
+ const auto connection_it = headers.find("Connection");
if (connection_it != headers.end() && connection_it->second == "close") {
client->close_after_response = true;
}
}
- map<string, int>::const_iterator stream_url_map_it = stream_url_map.find(url);
+ const auto stream_url_map_it = stream_url_map.find(url);
if (stream_url_map_it != stream_url_map.end()) {
// Serve a regular stream..
client->stream = streams[stream_url_map_it->second].get();
client->serving_hls_playlist = false;
} else {
- map<string, int>::const_iterator stream_hls_url_map_it = stream_hls_url_map.find(url);
+ const auto stream_hls_url_map_it = stream_hls_url_map.find(url);
if (stream_hls_url_map_it != stream_hls_url_map.end()) {
// Serve HLS playlist.
client->stream = streams[stream_hls_url_map_it->second].get();
client->serving_hls_playlist = true;
} else {
- map<string, string>::const_iterator ping_url_map_it = ping_url_map.find(url);
+ const auto ping_url_map_it = ping_url_map.find(url);
if (ping_url_map_it == ping_url_map.end()) {
return 404; // Not found.
} else {
string response = stream->http_header;
if (client->stream_pos == Client::STREAM_POS_HEADER_ONLY) {
char buf[64];
- snprintf(buf, sizeof(buf), "Content-length: %zu\r\n", stream->stream_header.size());
+ snprintf(buf, sizeof(buf), "Content-Length: %zu\r\n", stream->stream_header.size());
response.append(buf);
} else if (client->stream_pos_end != Client::STREAM_POS_NO_END) {
char buf[64];
- snprintf(buf, sizeof(buf), "Content-length: %zu\r\n", client->stream_pos_end - client->stream_pos);
+ snprintf(buf, sizeof(buf), "Content-Length: %" PRIu64 "\r\n", client->stream_pos_end - client->stream_pos);
response.append(buf);
}
if (client->http_11) {
if (stream->encoding == Stream::STREAM_ENCODING_RAW) {
response.append("\r\n");
} else if (stream->encoding == Stream::STREAM_ENCODING_METACUBE) {
- response.append("Content-encoding: metacube\r\n\r\n");
+ response.append("Content-Encoding: metacube\r\n\r\n");
if (!stream->stream_header.empty()) {
metacube2_block_header hdr;
memcpy(hdr.sync, METACUBE2_SYNC, sizeof(hdr.sync));
char error[256];
if (client->http_11 && client->close_after_response) {
snprintf(error, sizeof(error),
- "HTTP/1.1 %d Error\r\nContent-type: text/plain\r\nConnection: close\r\n\r\nSomething went wrong. Sorry.\r\n",
+ "HTTP/1.1 %d Error\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\nSomething went wrong. Sorry.\r\n",
error_code);
} else {
snprintf(error, sizeof(error),
- "HTTP/1.%d %d Error\r\nContent-type: text/plain\r\nContent-length: 30\r\n\r\nSomething went wrong. Sorry.\r\n",
+ "HTTP/1.%d %d Error\r\nContent-Type: text/plain\r\nContent-Length: 30\r\n\r\nSomething went wrong. Sorry.\r\n",
client->http_11, error_code);
}
client->header_or_short_response_holder = error;
void Server::construct_204(Client *client)
{
- map<string, string>::const_iterator ping_url_map_it = ping_url_map.find(client->url);
+ const auto ping_url_map_it = ping_url_map.find(client->url);
assert(ping_url_map_it != ping_url_map.end());
string response;
change_epoll_events(client, EPOLLOUT | EPOLLET | EPOLLRDHUP);
}
+namespace {
+
template<class T>
void delete_from(vector<T> *v, T elem)
{
typename vector<T>::iterator new_end = remove(v->begin(), v->end(), elem);
v->erase(new_end, v->end());
}
+
+void send_ktls_close(int sock)
+{
+ uint8_t record_type = 21; // Alert.
+ uint8_t body[] = {
+ 1, // Warning level (but still fatal!).
+ 0, // close_notify.
+ };
+
+ int cmsg_len = sizeof(record_type);
+ char buf[CMSG_SPACE(cmsg_len)];
+
+ msghdr msg = {0};
+ msg.msg_control = buf;
+ msg.msg_controllen = sizeof(buf);
+ cmsghdr *cmsg = CMSG_FIRSTHDR(&msg);
+ cmsg->cmsg_level = SOL_TLS;
+ cmsg->cmsg_type = TLS_SET_RECORD_TYPE;
+ cmsg->cmsg_len = CMSG_LEN(cmsg_len);
+ *CMSG_DATA(cmsg) = record_type;
+ msg.msg_controllen = cmsg->cmsg_len;
+
+ iovec msg_iov;
+ msg_iov.iov_base = body;
+ msg_iov.iov_len = sizeof(body);
+ msg.msg_iov = &msg_iov;
+ msg.msg_iovlen = 1;
+
+ int err;
+ do {
+ err = sendmsg(sock, &msg, 0);
+ } while (err == -1 && errno == EINTR); // Ignore all other errors.
+}
+
+} // namespace
void Server::close_client(Client *client)
{
}
if (client->tls_context) {
+ if (client->in_ktls_mode) {
+ // Keep GnuTLS happy.
+ send_ktls_close(client->sock);
+ }
tls_destroy_context(client->tls_context);
}
// Log to access_log.
access_log->write(client->get_stats());
+ flush_pending_data(client->sock);
+
// Switch states and reset the parsers. We don't reset statistics.
client->state = Client::READING_REQUEST;
client->url.clear();