Index: net/tools/flip_server/flip_in_mem_edsm_server.cc |
diff --git a/net/tools/flip_server/flip_in_mem_edsm_server.cc b/net/tools/flip_server/flip_in_mem_edsm_server.cc |
deleted file mode 100644 |
index d14af00d1a1fdb1b624dd5166997556efd4d707b..0000000000000000000000000000000000000000 |
--- a/net/tools/flip_server/flip_in_mem_edsm_server.cc |
+++ /dev/null |
@@ -1,403 +0,0 @@ |
-// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include <errno.h> |
-#include <signal.h> |
-#include <stdio.h> |
-#include <string.h> |
-#include <sys/file.h> |
-#include <sys/stat.h> |
- |
-#include <string> |
-#include <vector> |
- |
-#include "base/command_line.h" |
-#include "base/logging.h" |
-#include "base/strings/string_split.h" |
-#include "base/synchronization/lock.h" |
-#include "net/tools/flip_server/acceptor_thread.h" |
-#include "net/tools/flip_server/constants.h" |
-#include "net/tools/flip_server/flip_config.h" |
-#include "net/tools/flip_server/output_ordering.h" |
-#include "net/tools/flip_server/sm_connection.h" |
-#include "net/tools/flip_server/sm_interface.h" |
-#include "net/tools/flip_server/spdy_interface.h" |
-#include "net/tools/flip_server/streamer_interface.h" |
- |
-// If true, then disables the nagle algorithm); |
-bool FLAGS_disable_nagle = true; |
- |
-// The number of times that accept() will be called when the |
-// alarm goes off when the accept_using_alarm flag is set to true. |
-// If set to 0, accept() will be performed until the accept queue |
-// is completely drained and the accept() call returns an error); |
-int32_t FLAGS_accepts_per_wake = 0; |
- |
-// The size of the TCP accept backlog); |
-int32_t FLAGS_accept_backlog_size = 1024; |
- |
-// If set to false a single socket will be used. If set to true |
-// then a new socket will be created for each accept thread. |
-// Note that this only works with kernels that support |
-// SO_REUSEPORT); |
-bool FLAGS_reuseport = false; |
- |
-// Flag to force spdy, even if NPN is not negotiated. |
-bool FLAGS_force_spdy = false; |
- |
-// The amount of time the server delays before sending back the |
-// reply); |
-double FLAGS_server_think_time_in_s = 0; |
- |
-net::FlipConfig g_proxy_config; |
- |
-static bool GotQuitFromStdin() { |
- // Make stdin nonblocking. Yes this is done each time. Oh well. |
- fcntl(0, F_SETFL, O_NONBLOCK); |
- char c; |
- std::string maybequit; |
- while (read(0, &c, 1) > 0) { |
- maybequit += c; |
- } |
- if (maybequit.size()) { |
- VLOG(1) << "scanning string: \"" << maybequit << "\""; |
- } |
- return (maybequit.size() > 1 && |
- (maybequit.c_str()[0] == 'q' || maybequit.c_str()[0] == 'Q')); |
-} |
- |
-static bool g_want_exit = false; |
-static bool g_want_log_close = false; |
-static void SignalHandler(int signum) { |
- switch (signum) { |
- case SIGTERM: |
- case SIGINT: |
- g_want_exit = true; |
- break; |
- case SIGHUP: |
- g_want_log_close = true; |
- break; |
- } |
-} |
- |
-static int OpenPidFile(const char* pidfile) { |
- int fd; |
- struct stat pid_stat; |
- int ret; |
- |
- fd = open(pidfile, O_RDWR | O_CREAT, 0600); |
- if (fd == -1) { |
- fprintf(stderr, "Could not open pid file '%s' for reading.\n", pidfile); |
- exit(1); |
- } |
- |
- ret = flock(fd, LOCK_EX | LOCK_NB); |
- if (ret == -1) { |
- if (errno == EWOULDBLOCK) { |
- fprintf(stderr, "Flip server is already running.\n"); |
- } else { |
- perror("Error getting lock on pid file"); |
- } |
- exit(1); |
- } |
- |
- if (fstat(fd, &pid_stat) == -1) { |
- fprintf( |
- stderr, "Could not stat pid file '%s': %s\n", pidfile, strerror(errno)); |
- exit(1); |
- } |
- if (pid_stat.st_size != 0) { |
- if (ftruncate(fd, pid_stat.st_size) == -1) { |
- fprintf(stderr, |
- "Could not truncate pid file '%s': %s\n", |
- pidfile, |
- strerror(errno)); |
- exit(1); |
- } |
- } |
- |
- char pid_str[8]; |
- snprintf(pid_str, sizeof(pid_str), "%d", getpid()); |
- int bytes = static_cast<int>(strlen(pid_str)); |
- if (write(fd, pid_str, strlen(pid_str)) != bytes) { |
- perror("Could not write pid file"); |
- close(fd); |
- exit(1); |
- } |
- |
- return fd; |
-} |
- |
-int main(int argc, char** argv) { |
- unsigned int i = 0; |
- bool wait_for_iface = false; |
- int pidfile_fd; |
- |
- signal(SIGPIPE, SIG_IGN); |
- signal(SIGTERM, SignalHandler); |
- signal(SIGINT, SignalHandler); |
- signal(SIGHUP, SignalHandler); |
- |
- base::CommandLine::Init(argc, argv); |
- base::CommandLine cl(argc, argv); |
- |
- if (cl.HasSwitch("help") || argc < 2) { |
- printf("%s <options>\n", argv[0]); |
- printf(" Proxy options:\n"); |
- printf( |
- "\t--proxy<1..n>=\"<listen ip>,<listen port>," |
- "<ssl cert filename>,\n" |
- "\t <ssl key filename>,<http server ip>," |
- "<http server port>,\n" |
- "\t [https server ip],[https server port]," |
- "<spdy only 0|1>\"\n" |
- "\t * The https server ip and port may be left empty if they are" |
- " the same as\n" |
- "\t the http server fields.\n" |
- "\t * spdy only prevents non-spdy https connections from being" |
- " passed\n" |
- "\t through the proxy listen ip:port.\n" |
- "\t--forward-ip-header=<header name>\n" |
- "\n Server options:\n" |
- "\t--spdy-server=\"<listen ip>,<listen port>,[ssl cert filename]," |
- "\n\t [ssl key filename]\"\n" |
- "\t--http-server=\"<listen ip>,<listen port>,[ssl cert filename]," |
- "\n\t [ssl key filename]\"\n" |
- "\t * Leaving the ssl cert and key fields empty will disable ssl" |
- " for the\n" |
- "\t http and spdy flip servers\n" |
- "\n Global options:\n" |
- "\t--logdest=<file|system|both>\n" |
- "\t--logfile=<logfile>\n" |
- "\t--wait-for-iface\n" |
- "\t * The flip server will block until the listen ip has been" |
- " raised.\n" |
- "\t--ssl-session-expiry=<seconds> (default is 300)\n" |
- "\t--ssl-disable-compression\n" |
- "\t--idle-timeout=<seconds> (default is 300)\n" |
- "\t--pidfile=<filepath> (default /var/run/flip-server.pid)\n" |
- "\t--help\n"); |
- exit(0); |
- } |
- |
- if (cl.HasSwitch("pidfile")) { |
- pidfile_fd = OpenPidFile(cl.GetSwitchValueASCII("pidfile").c_str()); |
- } else { |
- pidfile_fd = OpenPidFile(PIDFILE); |
- } |
- |
- net::OutputOrdering::set_server_think_time_in_s(FLAGS_server_think_time_in_s); |
- |
- if (cl.HasSwitch("forward-ip-header")) { |
- net::SpdySM::set_forward_ip_header( |
- cl.GetSwitchValueASCII("forward-ip-header")); |
- net::StreamerSM::set_forward_ip_header( |
- cl.GetSwitchValueASCII("forward-ip-header")); |
- } |
- |
- if (cl.HasSwitch("logdest")) { |
- std::string log_dest_value = cl.GetSwitchValueASCII("logdest"); |
- if (log_dest_value.compare("file") == 0) { |
- g_proxy_config.log_destination_ = logging::LOG_TO_FILE; |
- } else if (log_dest_value.compare("system") == 0) { |
- g_proxy_config.log_destination_ = logging::LOG_TO_SYSTEM_DEBUG_LOG; |
- } else if (log_dest_value.compare("both") == 0) { |
- g_proxy_config.log_destination_ = logging::LOG_TO_ALL; |
- } else { |
- LOG(FATAL) << "Invalid logging destination value: " << log_dest_value; |
- } |
- } else { |
- g_proxy_config.log_destination_ = logging::LOG_NONE; |
- } |
- |
- if (cl.HasSwitch("logfile")) { |
- g_proxy_config.log_filename_ = cl.GetSwitchValueASCII("logfile"); |
- if (g_proxy_config.log_destination_ == logging::LOG_NONE) { |
- g_proxy_config.log_destination_ = logging::LOG_TO_FILE; |
- } |
- } else if ((g_proxy_config.log_destination_ & logging::LOG_TO_FILE) != 0) { |
- LOG(FATAL) << "Logging destination requires a log file to be specified."; |
- } |
- |
- if (cl.HasSwitch("wait-for-iface")) { |
- wait_for_iface = true; |
- } |
- |
- if (cl.HasSwitch("ssl-session-expiry")) { |
- std::string session_expiry = cl.GetSwitchValueASCII("ssl-session-expiry"); |
- g_proxy_config.ssl_session_expiry_ = atoi(session_expiry.c_str()); |
- } |
- |
- if (cl.HasSwitch("ssl-disable-compression")) { |
- g_proxy_config.ssl_disable_compression_ = true; |
- } |
- |
- if (cl.HasSwitch("idle-timeout")) { |
- g_proxy_config.idle_socket_timeout_s_ = |
- atoi(cl.GetSwitchValueASCII("idle-timeout").c_str()); |
- } |
- |
- if (cl.HasSwitch("force_spdy")) |
- net::SMConnection::set_force_spdy(true); |
- |
- logging::LoggingSettings settings; |
- settings.logging_dest = g_proxy_config.log_destination_; |
- settings.log_file = g_proxy_config.log_filename_.c_str(); |
- settings.lock_log = logging::DONT_LOCK_LOG_FILE; |
- logging::InitLogging(settings); |
- |
- LOG(INFO) << "Flip SPDY proxy started with configuration:"; |
- LOG(INFO) << "Logging destination : " << g_proxy_config.log_destination_; |
- LOG(INFO) << "Log file : " << g_proxy_config.log_filename_; |
- LOG(INFO) << "Forward IP Header : " |
- << (net::SpdySM::forward_ip_header().length() |
- ? net::SpdySM::forward_ip_header() |
- : "<disabled>"); |
- LOG(INFO) << "Wait for interfaces : " << (wait_for_iface ? "true" |
- : "false"); |
- LOG(INFO) << "Accept backlog size : " << FLAGS_accept_backlog_size; |
- LOG(INFO) << "Accepts per wake : " << FLAGS_accepts_per_wake; |
- LOG(INFO) << "Disable nagle : " << (FLAGS_disable_nagle ? "true" |
- : "false"); |
- LOG(INFO) << "Reuseport : " << (FLAGS_reuseport ? "true" |
- : "false"); |
- LOG(INFO) << "Force SPDY : " << (FLAGS_force_spdy ? "true" |
- : "false"); |
- LOG(INFO) << "SSL session expiry : " |
- << g_proxy_config.ssl_session_expiry_; |
- LOG(INFO) << "SSL disable compression : " |
- << g_proxy_config.ssl_disable_compression_; |
- LOG(INFO) << "Connection idle timeout : " |
- << g_proxy_config.idle_socket_timeout_s_; |
- |
- // Proxy Acceptors |
- while (true) { |
- i += 1; |
- std::stringstream name; |
- name << "proxy" << i; |
- if (!cl.HasSwitch(name.str())) { |
- break; |
- } |
- std::string value = cl.GetSwitchValueASCII(name.str()); |
- std::vector<std::string> value_args = base::SplitString( |
- value, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL); |
- CHECK_EQ((unsigned int)9, value_args.size()); |
- int spdy_only = atoi(value_args[8].c_str()); |
- // If wait_for_iface is enabled, then this call will block |
- // indefinitely until the interface is raised. |
- g_proxy_config.AddAcceptor(net::FLIP_HANDLER_PROXY, |
- value_args[0], |
- value_args[1], |
- value_args[2], |
- value_args[3], |
- value_args[4], |
- value_args[5], |
- value_args[6], |
- value_args[7], |
- spdy_only, |
- FLAGS_accept_backlog_size, |
- FLAGS_disable_nagle, |
- FLAGS_accepts_per_wake, |
- FLAGS_reuseport, |
- wait_for_iface, |
- NULL); |
- } |
- |
- // Spdy Server Acceptor |
- net::MemoryCache spdy_memory_cache; |
- if (cl.HasSwitch("spdy-server")) { |
- spdy_memory_cache.AddFiles(); |
- std::string value = cl.GetSwitchValueASCII("spdy-server"); |
- std::vector<std::string> value_args = base::SplitString( |
- value, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL); |
- while (value_args.size() < 4) |
- value_args.push_back(std::string()); |
- g_proxy_config.AddAcceptor(net::FLIP_HANDLER_SPDY_SERVER, |
- value_args[0], |
- value_args[1], |
- value_args[2], |
- value_args[3], |
- std::string(), |
- std::string(), |
- std::string(), |
- std::string(), |
- 0, |
- FLAGS_accept_backlog_size, |
- FLAGS_disable_nagle, |
- FLAGS_accepts_per_wake, |
- FLAGS_reuseport, |
- wait_for_iface, |
- &spdy_memory_cache); |
- } |
- |
- // Spdy Server Acceptor |
- net::MemoryCache http_memory_cache; |
- if (cl.HasSwitch("http-server")) { |
- http_memory_cache.AddFiles(); |
- std::string value = cl.GetSwitchValueASCII("http-server"); |
- std::vector<std::string> value_args = base::SplitString( |
- value, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL); |
- while (value_args.size() < 4) |
- value_args.push_back(std::string()); |
- g_proxy_config.AddAcceptor(net::FLIP_HANDLER_HTTP_SERVER, |
- value_args[0], |
- value_args[1], |
- value_args[2], |
- value_args[3], |
- std::string(), |
- std::string(), |
- std::string(), |
- std::string(), |
- 0, |
- FLAGS_accept_backlog_size, |
- FLAGS_disable_nagle, |
- FLAGS_accepts_per_wake, |
- FLAGS_reuseport, |
- wait_for_iface, |
- &http_memory_cache); |
- } |
- |
- std::vector<net::SMAcceptorThread*> sm_worker_threads; |
- |
- for (i = 0; i < g_proxy_config.acceptors_.size(); i++) { |
- net::FlipAcceptor* acceptor = g_proxy_config.acceptors_[i]; |
- |
- sm_worker_threads.push_back(new net::SMAcceptorThread( |
- acceptor, (net::MemoryCache*)acceptor->memory_cache_)); |
- // Note that spdy_memory_cache is not threadsafe, it is merely |
- // thread compatible. Thus, if ever we are to spawn multiple threads, |
- // we either must make the MemoryCache threadsafe, or use |
- // a separate MemoryCache for each thread. |
- // |
- // The latter is what is currently being done as we spawn |
- // a separate thread for each http and spdy server acceptor. |
- |
- sm_worker_threads.back()->InitWorker(); |
- sm_worker_threads.back()->Start(); |
- } |
- |
- while (!g_want_exit) { |
- // Close logfile when HUP signal is received. Logging system will |
- // automatically reopen on next log message. |
- if (g_want_log_close) { |
- g_want_log_close = false; |
- VLOG(1) << "HUP received, reopening log file."; |
- logging::CloseLogFile(); |
- } |
- if (GotQuitFromStdin()) { |
- for (unsigned int i = 0; i < sm_worker_threads.size(); ++i) { |
- sm_worker_threads[i]->Quit(); |
- } |
- for (unsigned int i = 0; i < sm_worker_threads.size(); ++i) { |
- sm_worker_threads[i]->Join(); |
- } |
- break; |
- } |
- usleep(1000 * 10); // 10 ms |
- } |
- |
- unlink(PIDFILE); |
- close(pidfile_fd); |
- return 0; |
-} |