480 lines
15 KiB
C
480 lines
15 KiB
C
/*
|
|
* tinyproxyd tiny http proxy server
|
|
*
|
|
* @build make examples
|
|
*
|
|
* @http_server bin/tinyhttpd 8000
|
|
* @proxy_server bin/tinyproxyd 1080
|
|
*
|
|
* @proxy_client bin/curl -v www.httpbin.org/get --http-proxy 127.0.0.1:1080
|
|
* bin/curl -v www.httpbin.org/post -d hello --http-proxy 127.0.0.1:1080
|
|
* curl -v www.httpbin.org/get --proxy http://127.0.0.1:1080
|
|
* curl -v www.httpbin.org/post -d hello --proxy http://127.0.0.1:1080
|
|
*
|
|
*/
|
|
|
|
#include "hv.h"
|
|
#include "hloop.h"
|
|
|
|
/*
|
|
* workflow:
|
|
* hloop_new -> hloop_create_tcp_server -> hloop_run ->
|
|
* on_accept -> HV_ALLOC(http_conn_t) -> hio_readline ->
|
|
* on_recv -> parse_http_request_line -> hio_readline ->
|
|
* on_recv -> parse_http_head -> ... -> hio_readline ->
|
|
* on_head_end -> hio_setup_upstream ->
|
|
* on_upstream_connect -> hio_write_upstream(head) ->
|
|
* on_body -> hio_write_upstream(body) ->
|
|
* on_upstream_close -> hio_close ->
|
|
* on_close -> HV_FREE(http_conn_t)
|
|
*
|
|
*/
|
|
|
|
static char proxy_host[64] = "0.0.0.0";
|
|
static int proxy_port = 1080;
|
|
static int proxy_ssl = 0;
|
|
|
|
static int thread_num = 1;
|
|
static hloop_t* accept_loop = NULL;
|
|
static hloop_t** worker_loops = NULL;
|
|
|
|
#define HTTP_KEEPALIVE_TIMEOUT 60000 // ms
|
|
#define HTTP_MAX_URL_LENGTH 256
|
|
#define HTTP_MAX_HEAD_LENGTH 1024
|
|
|
|
typedef enum {
|
|
s_begin,
|
|
s_first_line,
|
|
s_request_line = s_first_line,
|
|
s_status_line = s_first_line,
|
|
s_head,
|
|
s_head_end,
|
|
s_body,
|
|
s_end
|
|
} http_state_e;
|
|
|
|
typedef struct {
|
|
// first line
|
|
int major_version;
|
|
int minor_version;
|
|
union {
|
|
// request line
|
|
struct {
|
|
char method[32];
|
|
char path[HTTP_MAX_URL_LENGTH];
|
|
};
|
|
// status line
|
|
struct {
|
|
int status_code;
|
|
char status_message[64];
|
|
};
|
|
};
|
|
// headers
|
|
char host[64];
|
|
int content_length;
|
|
char content_type[64];
|
|
unsigned keepalive: 1;
|
|
unsigned proxy: 1;
|
|
char head[HTTP_MAX_HEAD_LENGTH];
|
|
int head_len;
|
|
// body
|
|
char* body;
|
|
int body_len; // body_len = content_length
|
|
} http_msg_t;
|
|
|
|
typedef struct {
|
|
hio_t* io;
|
|
http_state_e state;
|
|
http_msg_t request;
|
|
// http_msg_t response;
|
|
} http_conn_t;
|
|
|
|
static int http_request_dump(http_conn_t* conn, char* buf, int len) {
|
|
http_msg_t* msg = &conn->request;
|
|
int offset = 0;
|
|
// request line
|
|
const char* path = msg->path;
|
|
if (msg->proxy) {
|
|
const char* pos = strstr(msg->path, "://");
|
|
pos = pos ? pos + 3 : msg->path;
|
|
path = strchr(pos, '/');
|
|
}
|
|
if (path == NULL) path = "/";
|
|
offset += snprintf(buf + offset, len - offset, "%s %s HTTP/%d.%d\r\n", msg->method, path, msg->major_version, msg->minor_version);
|
|
// headers
|
|
if (msg->proxy) {
|
|
if (msg->head_len) {
|
|
memcpy(buf + offset, msg->head, msg->head_len);
|
|
offset += msg->head_len;
|
|
}
|
|
char peeraddrstr[SOCKADDR_STRLEN] = {0};
|
|
SOCKADDR_STR(hio_peeraddr(conn->io), peeraddrstr);
|
|
offset += snprintf(buf + offset, len - offset, "X-Origin-IP: %s\r\n", peeraddrstr);
|
|
} else {
|
|
offset += snprintf(buf + offset, len - offset, "Connection: %s\r\n", msg->keepalive ? "keep-alive" : "close");
|
|
if (msg->content_length > 0) {
|
|
offset += snprintf(buf + offset, len - offset, "Content-Length: %d\r\n", msg->content_length);
|
|
}
|
|
if (*msg->content_type) {
|
|
offset += snprintf(buf + offset, len - offset, "Content-Type: %s\r\n", msg->content_type);
|
|
}
|
|
}
|
|
// TODO: Add your headers
|
|
offset += snprintf(buf + offset, len - offset, "\r\n");
|
|
// body
|
|
if (msg->body && msg->content_length > 0) {
|
|
memcpy(buf + offset, msg->body, msg->content_length);
|
|
offset += msg->content_length;
|
|
}
|
|
return offset;
|
|
}
|
|
|
|
static bool parse_http_request_line(http_conn_t* conn, char* buf, int len) {
|
|
// GET / HTTP/1.1
|
|
http_msg_t* req = &conn->request;
|
|
sscanf(buf, "%s %s HTTP/%d.%d", req->method, req->path, &req->major_version, &req->minor_version);
|
|
if (req->major_version != 1) return false;
|
|
if (req->minor_version == 1) req->keepalive = 1;
|
|
// printf("%s %s HTTP/%d.%d\r\n", req->method, req->path, req->major_version, req->minor_version);
|
|
return true;
|
|
}
|
|
|
|
static bool parse_http_head(http_conn_t* conn, char* buf, int len) {
|
|
http_msg_t* req = &conn->request;
|
|
// Content-Type: text/html
|
|
const char* key = buf;
|
|
const char* val = buf;
|
|
char* delim = strchr(buf, ':');
|
|
if (!delim) return false;
|
|
*delim = '\0';
|
|
val = delim + 1;
|
|
// trim space
|
|
while (*val == ' ') ++val;
|
|
// printf("%s: %s\r\n", key, val);
|
|
if (stricmp(key, "Host") == 0) {
|
|
strncpy(req->host, val, sizeof(req->host) - 1);
|
|
} else if (stricmp(key, "Content-Length") == 0) {
|
|
req->content_length = atoi(val);
|
|
} else if (stricmp(key, "Content-Type") == 0) {
|
|
strncpy(req->content_type, val, sizeof(req->content_type) - 1);
|
|
} else if (stricmp(key, "Connection") == 0 || stricmp(key, "Proxy-Connection") == 0) {
|
|
if (stricmp(val, "close") == 0) {
|
|
req->keepalive = 0;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
static void on_upstream_connect(hio_t* upstream_io) {
|
|
// printf("on_upstream_connect\n");
|
|
http_conn_t* conn = (http_conn_t*)hevent_userdata(upstream_io);
|
|
http_msg_t* req = &conn->request;
|
|
// send head
|
|
char stackbuf[HTTP_MAX_HEAD_LENGTH + 1024] = {0};
|
|
char* buf = stackbuf;
|
|
int buflen = sizeof(stackbuf);
|
|
int msglen = http_request_dump(conn, buf, buflen);
|
|
hio_write(upstream_io, buf, msglen);
|
|
if (conn->state != s_end) {
|
|
// start recv body then upstream
|
|
hio_read_start(conn->io);
|
|
} else {
|
|
if (req->keepalive) {
|
|
// Connection: keep-alive\r\n
|
|
// reset and receive next request
|
|
memset(&conn->request, 0, sizeof(http_msg_t));
|
|
// memset(&conn->response, 0, sizeof(http_msg_t));
|
|
conn->state = s_first_line;
|
|
hio_readline(conn->io);
|
|
}
|
|
}
|
|
// start recv response
|
|
hio_read_start(upstream_io);
|
|
}
|
|
|
|
static int on_head_end(http_conn_t* conn) {
|
|
http_msg_t* req = &conn->request;
|
|
if (req->host[0] == '\0') {
|
|
fprintf(stderr, "No Host header!\n");
|
|
return -1;
|
|
}
|
|
char backend_host[64] = {0};
|
|
strcpy(backend_host, req->host);
|
|
int backend_port = 80;
|
|
char* pos = strchr(backend_host, ':');
|
|
if (pos) {
|
|
*pos = '\0';
|
|
backend_port = atoi(pos + 1);
|
|
}
|
|
if (backend_port == proxy_port &&
|
|
(strcmp(backend_host, proxy_host) == 0 ||
|
|
strcmp(backend_host, "localhost") == 0 ||
|
|
strcmp(backend_host, "127.0.0.1") == 0)) {
|
|
req->proxy = 0;
|
|
return 0;
|
|
}
|
|
// NOTE: blew for proxy
|
|
req->proxy = 1;
|
|
int backend_ssl = strncmp(req->path, "https", 5) == 0 ? 1 : 0;
|
|
// printf("upstream %s:%d\n", backend_host, backend_port);
|
|
hloop_t* loop = hevent_loop(conn->io);
|
|
// hio_t* upstream_io = hio_setup_tcp_upstream(conn->io, backend_host, backend_port, backend_ssl);
|
|
hio_t* upstream_io = hio_create_socket(loop, backend_host, backend_port, HIO_TYPE_TCP, HIO_CLIENT_SIDE);
|
|
if (upstream_io == NULL) {
|
|
fprintf(stderr, "Failed to upstream %s:%d!\n", backend_host, backend_port);
|
|
return -3;
|
|
}
|
|
if (backend_ssl) {
|
|
hio_enable_ssl(upstream_io);
|
|
}
|
|
hevent_set_userdata(upstream_io, conn);
|
|
hio_setup_upstream(conn->io, upstream_io);
|
|
hio_setcb_read(upstream_io, hio_write_upstream);
|
|
hio_setcb_close(upstream_io, hio_close_upstream);
|
|
hio_setcb_connect(upstream_io, on_upstream_connect);
|
|
hio_connect(upstream_io);
|
|
return 0;
|
|
}
|
|
|
|
static int on_body(http_conn_t* conn, void* buf, int readbytes) {
|
|
http_msg_t* req = &conn->request;
|
|
if (req->proxy) {
|
|
hio_write_upstream(conn->io, buf, readbytes);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int on_request(http_conn_t* conn) {
|
|
// NOTE: just reply 403, please refer to examples/tinyhttpd if you want to reply other.
|
|
http_msg_t* req = &conn->request;
|
|
char buf[256] = {0};
|
|
int len = snprintf(buf, sizeof(buf), "HTTP/%d.%d %d %s\r\nContent-Length: 0\r\n\r\n",
|
|
req->major_version, req->minor_version, 403, "Forbidden");
|
|
hio_write(conn->io, buf, len);
|
|
return 403;
|
|
}
|
|
|
|
static void on_close(hio_t* io) {
|
|
// printf("on_close fd=%d error=%d\n", hio_fd(io), hio_error(io));
|
|
http_conn_t* conn = (http_conn_t*)hevent_userdata(io);
|
|
if (conn) {
|
|
HV_FREE(conn);
|
|
hevent_set_userdata(io, NULL);
|
|
}
|
|
hio_close_upstream(io);
|
|
}
|
|
|
|
static void on_recv(hio_t* io, void* buf, int readbytes) {
|
|
char* str = (char*)buf;
|
|
// printf("on_recv fd=%d readbytes=%d\n", hio_fd(io), readbytes);
|
|
// printf("%.*s", readbytes, str);
|
|
http_conn_t* conn = (http_conn_t*)hevent_userdata(io);
|
|
http_msg_t* req = &conn->request;
|
|
switch (conn->state) {
|
|
case s_begin:
|
|
// printf("s_begin");
|
|
conn->state = s_first_line;
|
|
case s_first_line:
|
|
// printf("s_first_line\n");
|
|
if (readbytes < 2) {
|
|
fprintf(stderr, "Not match \r\n!");
|
|
hio_close(io);
|
|
return;
|
|
}
|
|
str[readbytes - 2] = '\0';
|
|
if (parse_http_request_line(conn, str, readbytes - 2) == false) {
|
|
fprintf(stderr, "Failed to parse http request line:\n%s\n", str);
|
|
hio_close(io);
|
|
return;
|
|
}
|
|
// start read head
|
|
conn->state = s_head;
|
|
hio_readline(io);
|
|
break;
|
|
case s_head:
|
|
// printf("s_head\n");
|
|
if (readbytes < 2) {
|
|
fprintf(stderr, "Not match \r\n!");
|
|
hio_close(io);
|
|
return;
|
|
}
|
|
if (readbytes == 2 && str[0] == '\r' && str[1] == '\n') {
|
|
conn->state = s_head_end;
|
|
} else {
|
|
// NOTE: save head
|
|
if (strnicmp(str, "Proxy-", 6) != 0) {
|
|
if (req->head_len + readbytes < HTTP_MAX_HEAD_LENGTH) {
|
|
memcpy(req->head + req->head_len, buf, readbytes);
|
|
req->head_len += readbytes;
|
|
}
|
|
}
|
|
str[readbytes - 2] = '\0';
|
|
if (parse_http_head(conn, str, readbytes - 2) == false) {
|
|
fprintf(stderr, "Failed to parse http head:\n%s\n", str);
|
|
hio_close(io);
|
|
return;
|
|
}
|
|
hio_readline(io);
|
|
break;
|
|
}
|
|
case s_head_end:
|
|
// printf("s_head_end\n");
|
|
if (on_head_end(conn) < 0) {
|
|
hio_close(io);
|
|
return;
|
|
}
|
|
if (req->content_length == 0) {
|
|
conn->state = s_end;
|
|
if (req->proxy) {
|
|
// NOTE: wait upstream connect!
|
|
} else {
|
|
goto s_end;
|
|
}
|
|
} else {
|
|
conn->state = s_body;
|
|
if (req->proxy) {
|
|
// NOTE: start read body on_upstream_connect
|
|
// hio_read_start(io);
|
|
} else {
|
|
// WARN: too large content_length should read multiple times!
|
|
hio_readbytes(io, req->content_length);
|
|
}
|
|
break;
|
|
}
|
|
case s_body:
|
|
// printf("s_body\n");
|
|
if (on_body(conn, buf, readbytes) < 0) {
|
|
hio_close(io);
|
|
return;
|
|
}
|
|
req->body = str;
|
|
req->body_len += readbytes;
|
|
if (readbytes == req->content_length) {
|
|
conn->state = s_end;
|
|
} else {
|
|
// Not end
|
|
break;
|
|
}
|
|
case s_end:
|
|
s_end:
|
|
// printf("s_end\n");
|
|
// received complete request
|
|
if (req->proxy) {
|
|
// NOTE: reply by upstream
|
|
} else {
|
|
on_request(conn);
|
|
}
|
|
if (hio_is_closed(io)) return;
|
|
if (req->keepalive) {
|
|
// Connection: keep-alive\r\n
|
|
// reset and receive next request
|
|
memset(&conn->request, 0, sizeof(http_msg_t));
|
|
// memset(&conn->response, 0, sizeof(http_msg_t));
|
|
conn->state = s_first_line;
|
|
hio_readline(io);
|
|
} else {
|
|
// Connection: close\r\n
|
|
if (req->proxy) {
|
|
// NOTE: wait upstream close!
|
|
} else {
|
|
hio_close(io);
|
|
}
|
|
}
|
|
break;
|
|
default: break;
|
|
}
|
|
}
|
|
|
|
static void new_conn_event(hevent_t* ev) {
|
|
hloop_t* loop = ev->loop;
|
|
hio_t* io = (hio_t*)hevent_userdata(ev);
|
|
hio_attach(loop, io);
|
|
|
|
/*
|
|
char localaddrstr[SOCKADDR_STRLEN] = {0};
|
|
char peeraddrstr[SOCKADDR_STRLEN] = {0};
|
|
printf("tid=%ld connfd=%d [%s] <= [%s]\n",
|
|
(long)hv_gettid(),
|
|
(int)hio_fd(io),
|
|
SOCKADDR_STR(hio_localaddr(io), localaddrstr),
|
|
SOCKADDR_STR(hio_peeraddr(io), peeraddrstr));
|
|
*/
|
|
|
|
hio_setcb_close(io, on_close);
|
|
hio_setcb_read(io, on_recv);
|
|
hio_set_keepalive_timeout(io, HTTP_KEEPALIVE_TIMEOUT);
|
|
|
|
http_conn_t* conn = NULL;
|
|
HV_ALLOC_SIZEOF(conn);
|
|
conn->io = io;
|
|
hevent_set_userdata(io, conn);
|
|
// start read first line
|
|
conn->state = s_first_line;
|
|
hio_readline(io);
|
|
}
|
|
|
|
static hloop_t* get_next_loop() {
|
|
static int s_cur_index = 0;
|
|
if (s_cur_index == thread_num) {
|
|
s_cur_index = 0;
|
|
}
|
|
return worker_loops[s_cur_index++];
|
|
}
|
|
|
|
static void on_accept(hio_t* io) {
|
|
hio_detach(io);
|
|
|
|
hloop_t* worker_loop = get_next_loop();
|
|
hevent_t ev;
|
|
memset(&ev, 0, sizeof(ev));
|
|
ev.loop = worker_loop;
|
|
ev.cb = new_conn_event;
|
|
ev.userdata = io;
|
|
hloop_post_event(worker_loop, &ev);
|
|
}
|
|
|
|
static HTHREAD_ROUTINE(worker_thread) {
|
|
hloop_t* loop = (hloop_t*)userdata;
|
|
hloop_run(loop);
|
|
return 0;
|
|
}
|
|
|
|
static HTHREAD_ROUTINE(accept_thread) {
|
|
hloop_t* loop = (hloop_t*)userdata;
|
|
hio_t* listenio = hloop_create_tcp_server(loop, proxy_host, proxy_port, on_accept);
|
|
if (listenio == NULL) {
|
|
exit(1);
|
|
}
|
|
if (proxy_ssl) {
|
|
hio_enable_ssl(listenio);
|
|
}
|
|
printf("tinyproxyd listening on %s:%d, listenfd=%d, thread_num=%d\n",
|
|
proxy_host, proxy_port, hio_fd(listenio), thread_num);
|
|
hloop_run(loop);
|
|
return 0;
|
|
}
|
|
|
|
int main(int argc, char** argv) {
|
|
if (argc < 2) {
|
|
printf("Usage: %s proxy_port [thread_num]\n", argv[0]);
|
|
return -10;
|
|
}
|
|
proxy_port = atoi(argv[1]);
|
|
if (argc > 2) {
|
|
thread_num = atoi(argv[2]);
|
|
} else {
|
|
thread_num = get_ncpu();
|
|
}
|
|
if (thread_num == 0) thread_num = 1;
|
|
|
|
worker_loops = (hloop_t**)malloc(sizeof(hloop_t*) * thread_num);
|
|
for (int i = 0; i < thread_num; ++i) {
|
|
worker_loops[i] = hloop_new(HLOOP_FLAG_AUTO_FREE);
|
|
hthread_create(worker_thread, worker_loops[i]);
|
|
}
|
|
|
|
accept_loop = hloop_new(HLOOP_FLAG_AUTO_FREE);
|
|
accept_thread(accept_loop);
|
|
return 0;
|
|
}
|