| 1 | #include "protocol.hfa" | 
|---|
| 2 |  | 
|---|
| 3 | #define _GNU_SOURCE | 
|---|
| 4 | extern "C" { | 
|---|
| 5 | #include <fcntl.h> | 
|---|
| 6 | } | 
|---|
| 7 | #include <iofwd.hfa> | 
|---|
| 8 |  | 
|---|
| 9 | #include <assert.h> | 
|---|
| 10 | // #include <stdio.h> // Don't use stdio.h, too slow to compile | 
|---|
| 11 | extern "C" { | 
|---|
| 12 | int snprintf ( char * s, size_t n, const char * format, ... ); | 
|---|
| 13 | #include <linux/io_uring.h> | 
|---|
| 14 | } | 
|---|
| 15 | #include <string.h> | 
|---|
| 16 | #include <errno.h> | 
|---|
| 17 |  | 
|---|
| 18 | #include "options.hfa" | 
|---|
| 19 |  | 
|---|
| 20 | const char * http_msgs[] = { | 
|---|
| 21 | "HTTP/1.1 200 OK\nContent-Type: text/plain\nContent-Length: %zu\n\n", | 
|---|
| 22 | "HTTP/1.1 400 Bad Request\nContent-Type: text/plain\nContent-Length: 0\n\n", | 
|---|
| 23 | "HTTP/1.1 404 Not Found\nContent-Type: text/plain\nContent-Length: 0\n\n", | 
|---|
| 24 | "HTTP/1.1 413 Payload Too Large\nContent-Type: text/plain\nContent-Length: 0\n\n", | 
|---|
| 25 | "HTTP/1.1 414 URI Too Long\nContent-Type: text/plain\nContent-Length: 0\n\n", | 
|---|
| 26 | }; | 
|---|
| 27 |  | 
|---|
| 28 | _Static_assert( KNOWN_CODES == (sizeof(http_msgs ) / sizeof(http_msgs [0]))); | 
|---|
| 29 |  | 
|---|
| 30 | const int http_codes[] = { | 
|---|
| 31 | 200, | 
|---|
| 32 | 400, | 
|---|
| 33 | 404, | 
|---|
| 34 | 413, | 
|---|
| 35 | 414, | 
|---|
| 36 | }; | 
|---|
| 37 |  | 
|---|
| 38 | _Static_assert( KNOWN_CODES == (sizeof(http_codes) / sizeof(http_codes[0]))); | 
|---|
| 39 |  | 
|---|
| 40 | int code_val(HttpCode code) { | 
|---|
| 41 | return http_codes[code]; | 
|---|
| 42 | } | 
|---|
| 43 |  | 
|---|
| 44 | static inline int answer( int fd, const char * it, int len) { | 
|---|
| 45 | while(len > 0) { | 
|---|
| 46 | // Call write | 
|---|
| 47 | int ret = write(fd, it, len); | 
|---|
| 48 | if( ret < 0 ) { if( errno != EAGAIN && errno != EWOULDBLOCK) abort( "'answer error' error: (%d) %s\n", (int)errno, strerror(errno) ); } | 
|---|
| 49 |  | 
|---|
| 50 | // update it/len | 
|---|
| 51 | it  += ret; | 
|---|
| 52 | len -= ret; | 
|---|
| 53 | } | 
|---|
| 54 | return 0; | 
|---|
| 55 | } | 
|---|
| 56 |  | 
|---|
| 57 | int answer_error( int fd, HttpCode code ) { | 
|---|
| 58 | /* paranoid */ assert( code < KNOWN_CODES && code != OK200 ); | 
|---|
| 59 | int idx = (int)code; | 
|---|
| 60 | return answer( fd, http_msgs[idx], strlen( http_msgs[idx] ) ); | 
|---|
| 61 | } | 
|---|
| 62 |  | 
|---|
| 63 | int answer_header( int fd, size_t size ) { | 
|---|
| 64 | const char * fmt = http_msgs[OK200]; | 
|---|
| 65 | int len = 100; | 
|---|
| 66 | char buffer[len]; | 
|---|
| 67 | len = snprintf(buffer, len, fmt, size); | 
|---|
| 68 | return answer( fd, buffer, len ); | 
|---|
| 69 | } | 
|---|
| 70 |  | 
|---|
| 71 | [HttpCode code, bool closed, * const char file, size_t len] http_read(int fd, []char buffer, size_t len) { | 
|---|
| 72 | char * it = buffer; | 
|---|
| 73 | size_t count = len - 1; | 
|---|
| 74 | int rlen = 0; | 
|---|
| 75 | READ: | 
|---|
| 76 | for() { | 
|---|
| 77 | int ret = cfa_read(fd, (void*)it, count, 0, -1`s, 0p, 0p); | 
|---|
| 78 | if(ret == 0 ) return [OK200, true, 0, 0]; | 
|---|
| 79 | if(ret < 0 ) { | 
|---|
| 80 | if( errno == EAGAIN || errno == EWOULDBLOCK) continue READ; | 
|---|
| 81 | abort( "read error: (%d) %s\n", (int)errno, strerror(errno) ); | 
|---|
| 82 | } | 
|---|
| 83 | it[ret + 1] = '\0'; | 
|---|
| 84 | rlen += ret; | 
|---|
| 85 |  | 
|---|
| 86 | if( strstr( it, "\r\n\r\n" ) ) break; | 
|---|
| 87 |  | 
|---|
| 88 | it += ret; | 
|---|
| 89 | count -= ret; | 
|---|
| 90 |  | 
|---|
| 91 | if( count < 1 ) return [E414, false, 0, 0]; | 
|---|
| 92 | } | 
|---|
| 93 |  | 
|---|
| 94 | printf("%.*s\n", rlen, buffer); | 
|---|
| 95 |  | 
|---|
| 96 | it = buffer; | 
|---|
| 97 | int ret = memcmp(it, "GET /", 5); | 
|---|
| 98 | if( ret != 0 ) return [E400, false, 0, 0]; | 
|---|
| 99 | it += 5; | 
|---|
| 100 |  | 
|---|
| 101 | char * end = strstr( it, " " ); | 
|---|
| 102 | return [OK200, false, it, end - it]; | 
|---|
| 103 | } | 
|---|
| 104 |  | 
|---|
| 105 | void sendfile( int pipe[2], int fd, int ans_fd, size_t count ) { | 
|---|
| 106 | off_t offset = 0; | 
|---|
| 107 | ssize_t ret; | 
|---|
| 108 | SPLICE1: while(count > 0) { | 
|---|
| 109 | ret = cfa_splice(ans_fd, &offset, pipe[1], 0p, count, SPLICE_F_MOVE | SPLICE_F_MORE, 0, -1`s, 0p, 0p); | 
|---|
| 110 | if( ret < 0 ) { | 
|---|
| 111 | if( errno != EAGAIN && errno != EWOULDBLOCK) continue SPLICE1; | 
|---|
| 112 | abort( "splice [0] error: (%d) %s\n", (int)errno, strerror(errno) ); | 
|---|
| 113 | } | 
|---|
| 114 |  | 
|---|
| 115 | count -= ret; | 
|---|
| 116 | offset += ret; | 
|---|
| 117 | size_t in_pipe = ret; | 
|---|
| 118 | SPLICE2: while(in_pipe > 0) { | 
|---|
| 119 | ret = cfa_splice(pipe[0], 0p, fd, 0p, in_pipe, SPLICE_F_MOVE | SPLICE_F_MORE, 0, -1`s, 0p, 0p); | 
|---|
| 120 | if( ret < 0 ) { | 
|---|
| 121 | if( errno != EAGAIN && errno != EWOULDBLOCK) continue SPLICE2; | 
|---|
| 122 | abort( "splice [1] error: (%d) %s\n", (int)errno, strerror(errno) ); | 
|---|
| 123 | } | 
|---|
| 124 | in_pipe -= ret; | 
|---|
| 125 | } | 
|---|
| 126 |  | 
|---|
| 127 | } | 
|---|
| 128 | } | 
|---|