// // Copyright (c) 2016-2019 Vinnie Falco (vinnie dot falco at gmail dot com) // // Distributed under the Boost Software License, Version 1.0. (See accompanying // file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) // // Official repository: https://github.com/boostorg/beast // //------------------------------------------------------------------------------ // // Example: Advanced server, flex (plain + SSL) // //------------------------------------------------------------------------------ #include "example/common/server_certificate.hpp" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include namespace beast = boost::beast; // from namespace http = beast::http; // from namespace websocket = beast::websocket; // from namespace net = boost::asio; // from namespace ssl = boost::asio::ssl; // from using tcp = boost::asio::ip::tcp; // from // Return a reasonable mime type based on the extension of a file. beast::string_view mime_type(beast::string_view path) { using beast::iequals; auto const ext = [&path] { auto const pos = path.rfind("."); if(pos == beast::string_view::npos) return beast::string_view{}; return path.substr(pos); }(); if(iequals(ext, ".htm")) return "text/html"; if(iequals(ext, ".html")) return "text/html"; if(iequals(ext, ".php")) return "text/html"; if(iequals(ext, ".css")) return "text/css"; if(iequals(ext, ".txt")) return "text/plain"; if(iequals(ext, ".js")) return "application/javascript"; if(iequals(ext, ".json")) return "application/json"; if(iequals(ext, ".xml")) return "application/xml"; if(iequals(ext, ".swf")) return "application/x-shockwave-flash"; if(iequals(ext, ".flv")) return "video/x-flv"; if(iequals(ext, ".png")) return "image/png"; if(iequals(ext, ".jpe")) return "image/jpeg"; if(iequals(ext, ".jpeg")) return "image/jpeg"; if(iequals(ext, ".jpg")) return "image/jpeg"; if(iequals(ext, ".gif")) return "image/gif"; if(iequals(ext, ".bmp")) return "image/bmp"; if(iequals(ext, ".ico")) return "image/vnd.microsoft.icon"; if(iequals(ext, ".tiff")) return "image/tiff"; if(iequals(ext, ".tif")) return "image/tiff"; if(iequals(ext, ".svg")) return "image/svg+xml"; if(iequals(ext, ".svgz")) return "image/svg+xml"; return "application/text"; } // Append an HTTP rel-path to a local filesystem path. // The returned path is normalized for the platform. std::string path_cat( beast::string_view base, beast::string_view path) { if(base.empty()) return std::string(path); std::string result(base); #ifdef BOOST_MSVC char constexpr path_separator = '\\'; if(result.back() == path_separator) result.resize(result.size() - 1); result.append(path.data(), path.size()); for(auto& c : result) if(c == '/') c = path_separator; #else char constexpr path_separator = '/'; if(result.back() == path_separator) result.resize(result.size() - 1); result.append(path.data(), path.size()); #endif return result; } // This function produces an HTTP response for the given // request. The type of the response object depends on the // contents of the request, so the interface requires the // caller to pass a generic lambda for receiving the response. template< class Body, class Allocator, class Send> void handle_request( beast::string_view doc_root, http::request>&& req, Send&& send) { // Returns a bad request response auto const bad_request = [&req](beast::string_view why) { http::response res{http::status::bad_request, req.version()}; res.set(http::field::server, BOOST_BEAST_VERSION_STRING); res.set(http::field::content_type, "text/html"); res.keep_alive(req.keep_alive()); res.body() = std::string(why); res.prepare_payload(); return res; }; // Returns a not found response auto const not_found = [&req](beast::string_view target) { http::response res{http::status::not_found, req.version()}; res.set(http::field::server, BOOST_BEAST_VERSION_STRING); res.set(http::field::content_type, "text/html"); res.keep_alive(req.keep_alive()); res.body() = "The resource '" + std::string(target) + "' was not found."; res.prepare_payload(); return res; }; // Returns a server error response auto const server_error = [&req](beast::string_view what) { http::response res{http::status::internal_server_error, req.version()}; res.set(http::field::server, BOOST_BEAST_VERSION_STRING); res.set(http::field::content_type, "text/html"); res.keep_alive(req.keep_alive()); res.body() = "An error occurred: '" + std::string(what) + "'"; res.prepare_payload(); return res; }; // Make sure we can handle the method if( req.method() != http::verb::get && req.method() != http::verb::head) return send(bad_request("Unknown HTTP-method")); // Request path must be absolute and not contain "..". if( req.target().empty() || req.target()[0] != '/' || req.target().find("..") != beast::string_view::npos) return send(bad_request("Illegal request-target")); // Build the path to the requested file std::string path = path_cat(doc_root, req.target()); if(req.target().back() == '/') path.append("index.html"); // Attempt to open the file beast::error_code ec; http::file_body::value_type body; body.open(path.c_str(), beast::file_mode::scan, ec); // Handle the case where the file doesn't exist if(ec == beast::errc::no_such_file_or_directory) return send(not_found(req.target())); // Handle an unknown error if(ec) return send(server_error(ec.message())); // Cache the size since we need it after the move auto const size = body.size(); // Respond to HEAD request if(req.method() == http::verb::head) { http::response res{http::status::ok, req.version()}; res.set(http::field::server, BOOST_BEAST_VERSION_STRING); res.set(http::field::content_type, mime_type(path)); res.content_length(size); res.keep_alive(req.keep_alive()); return send(std::move(res)); } // Respond to GET request http::response res{ std::piecewise_construct, std::make_tuple(std::move(body)), std::make_tuple(http::status::ok, req.version())}; res.set(http::field::server, BOOST_BEAST_VERSION_STRING); res.set(http::field::content_type, mime_type(path)); res.content_length(size); res.keep_alive(req.keep_alive()); return send(std::move(res)); } //------------------------------------------------------------------------------ // Report a failure void fail(beast::error_code ec, char const* what) { // ssl::error::stream_truncated, also known as an SSL "short read", // indicates the peer closed the connection without performing the // required closing handshake (for example, Google does this to // improve performance). Generally this can be a security issue, // but if your communication protocol is self-terminated (as // it is with both HTTP and WebSocket) then you may simply // ignore the lack of close_notify. // // https://github.com/boostorg/beast/issues/38 // // https://security.stackexchange.com/questions/91435/how-to-handle-a-malicious-ssl-tls-shutdown // // When a short read would cut off the end of an HTTP message, // Beast returns the error beast::http::error::partial_message. // Therefore, if we see a short read here, it has occurred // after the message has been completed, so it is safe to ignore it. if(ec == net::ssl::error::stream_truncated) return; std::cerr << what << ": " << ec.message() << "\n"; } //------------------------------------------------------------------------------ // Echoes back all received WebSocket messages. // This uses the Curiously Recurring Template Pattern so that // the same code works with both SSL streams and regular sockets. template class websocket_session { // Access the derived class, this is part of // the Curiously Recurring Template Pattern idiom. Derived& derived() { return static_cast(*this); } beast::flat_buffer buffer_; // Start the asynchronous operation template void do_accept(http::request> req) { // Set suggested timeout settings for the websocket derived().ws().set_option( websocket::stream_base::timeout::suggested( beast::role_type::server)); // Set a decorator to change the Server of the handshake derived().ws().set_option( websocket::stream_base::decorator( [](websocket::response_type& res) { res.set(http::field::server, std::string(BOOST_BEAST_VERSION_STRING) + " advanced-server-flex"); })); // Accept the websocket handshake derived().ws().async_accept( req, beast::bind_front_handler( &websocket_session::on_accept, derived().shared_from_this())); } void on_accept(beast::error_code ec) { if(ec) return fail(ec, "accept"); // Read a message do_read(); } void do_read() { // Read a message into our buffer derived().ws().async_read( buffer_, beast::bind_front_handler( &websocket_session::on_read, derived().shared_from_this())); } void on_read( beast::error_code ec, std::size_t bytes_transferred) { boost::ignore_unused(bytes_transferred); // This indicates that the websocket_session was closed if(ec == websocket::error::closed) return; if(ec) fail(ec, "read"); // Echo the message derived().ws().text(derived().ws().got_text()); derived().ws().async_write( buffer_.data(), beast::bind_front_handler( &websocket_session::on_write, derived().shared_from_this())); } void on_write( beast::error_code ec, std::size_t bytes_transferred) { boost::ignore_unused(bytes_transferred); if(ec) return fail(ec, "write"); // Clear the buffer buffer_.consume(buffer_.size()); // Do another read do_read(); } public: // Start the asynchronous operation template void run(http::request> req) { // Accept the WebSocket upgrade request do_accept(std::move(req)); } }; //------------------------------------------------------------------------------ // Handles a plain WebSocket connection class plain_websocket_session : public websocket_session , public std::enable_shared_from_this { websocket::stream ws_; public: // Create the session explicit plain_websocket_session( beast::tcp_stream&& stream) : ws_(std::move(stream)) { } // Called by the base class websocket::stream& ws() { return ws_; } }; //------------------------------------------------------------------------------ // Handles an SSL WebSocket connection class ssl_websocket_session : public websocket_session , public std::enable_shared_from_this { websocket::stream< beast::ssl_stream> ws_; public: // Create the ssl_websocket_session explicit ssl_websocket_session( beast::ssl_stream&& stream) : ws_(std::move(stream)) { } // Called by the base class websocket::stream< beast::ssl_stream>& ws() { return ws_; } }; //------------------------------------------------------------------------------ template void make_websocket_session( beast::tcp_stream stream, http::request> req) { std::make_shared( std::move(stream))->run(std::move(req)); } template void make_websocket_session( beast::ssl_stream stream, http::request> req) { std::make_shared( std::move(stream))->run(std::move(req)); } //------------------------------------------------------------------------------ // Handles an HTTP server connection. // This uses the Curiously Recurring Template Pattern so that // the same code works with both SSL streams and regular sockets. template class http_session { // Access the derived class, this is part of // the Curiously Recurring Template Pattern idiom. Derived& derived() { return static_cast(*this); } // This queue is used for HTTP pipelining. class queue { enum { // Maximum number of responses we will queue limit = 8 }; // The type-erased, saved work item struct work { virtual ~work() = default; virtual void operator()() = 0; }; http_session& self_; std::vector> items_; public: explicit queue(http_session& self) : self_(self) { static_assert(limit > 0, "queue limit must be positive"); items_.reserve(limit); } // Returns `true` if we have reached the queue limit bool is_full() const { return items_.size() >= limit; } // Called when a message finishes sending // Returns `true` if the caller should initiate a read bool on_write() { BOOST_ASSERT(! items_.empty()); auto const was_full = is_full(); items_.erase(items_.begin()); if(! items_.empty()) (*items_.front())(); return was_full; } // Called by the HTTP handler to send a response. template void operator()(http::message&& msg) { // This holds a work item struct work_impl : work { http_session& self_; http::message msg_; work_impl( http_session& self, http::message&& msg) : self_(self) , msg_(std::move(msg)) { } void operator()() { http::async_write( self_.derived().stream(), msg_, beast::bind_front_handler( &http_session::on_write, self_.derived().shared_from_this(), msg_.need_eof())); } }; // Allocate and store the work items_.push_back( boost::make_unique(self_, std::move(msg))); // If there was no previous work, start this one if(items_.size() == 1) (*items_.front())(); } }; std::shared_ptr doc_root_; queue queue_; // The parser is stored in an optional container so we can // construct it from scratch it at the beginning of each new message. boost::optional> parser_; protected: beast::flat_buffer buffer_; public: // Construct the session http_session( beast::flat_buffer buffer, std::shared_ptr const& doc_root) : doc_root_(doc_root) , queue_(*this) , buffer_(std::move(buffer)) { } void do_read() { // Construct a new parser for each message parser_.emplace(); // Apply a reasonable limit to the allowed size // of the body in bytes to prevent abuse. parser_->body_limit(10000); // Set the timeout. beast::get_lowest_layer( derived().stream()).expires_after(std::chrono::seconds(30)); // Read a request using the parser-oriented interface http::async_read( derived().stream(), buffer_, *parser_, beast::bind_front_handler( &http_session::on_read, derived().shared_from_this())); } void on_read(beast::error_code ec, std::size_t bytes_transferred) { boost::ignore_unused(bytes_transferred); // This means they closed the connection if(ec == http::error::end_of_stream) return derived().do_eof(); if(ec) return fail(ec, "read"); // See if it is a WebSocket Upgrade if(websocket::is_upgrade(parser_->get())) { // Disable the timeout. // The websocket::stream uses its own timeout settings. beast::get_lowest_layer(derived().stream()).expires_never(); // Create a websocket session, transferring ownership // of both the socket and the HTTP request. return make_websocket_session( derived().release_stream(), parser_->release()); } // Send the response handle_request(*doc_root_, parser_->release(), queue_); // If we aren't at the queue limit, try to pipeline another request if(! queue_.is_full()) do_read(); } void on_write(bool close, beast::error_code ec, std::size_t bytes_transferred) { boost::ignore_unused(bytes_transferred); if(ec) return fail(ec, "write"); if(close) { // This means we should close the connection, usually because // the response indicated the "Connection: close" semantic. return derived().do_eof(); } // Inform the queue that a write completed if(queue_.on_write()) { // Read another request do_read(); } } }; //------------------------------------------------------------------------------ // Handles a plain HTTP connection class plain_http_session : public http_session , public std::enable_shared_from_this { beast::tcp_stream stream_; public: // Create the session plain_http_session( beast::tcp_stream&& stream, beast::flat_buffer&& buffer, std::shared_ptr const& doc_root) : http_session( std::move(buffer), doc_root) , stream_(std::move(stream)) { } // Start the session void run() { this->do_read(); } // Called by the base class beast::tcp_stream& stream() { return stream_; } // Called by the base class beast::tcp_stream release_stream() { return std::move(stream_); } // Called by the base class void do_eof() { // Send a TCP shutdown beast::error_code ec; stream_.socket().shutdown(tcp::socket::shutdown_send, ec); // At this point the connection is closed gracefully } }; //------------------------------------------------------------------------------ // Handles an SSL HTTP connection class ssl_http_session : public http_session , public std::enable_shared_from_this { beast::ssl_stream stream_; public: // Create the http_session ssl_http_session( beast::tcp_stream&& stream, ssl::context& ctx, beast::flat_buffer&& buffer, std::shared_ptr const& doc_root) : http_session( std::move(buffer), doc_root) , stream_(std::move(stream), ctx) { } // Start the session void run() { // Set the timeout. beast::get_lowest_layer(stream_).expires_after(std::chrono::seconds(30)); // Perform the SSL handshake // Note, this is the buffered version of the handshake. stream_.async_handshake( ssl::stream_base::server, buffer_.data(), beast::bind_front_handler( &ssl_http_session::on_handshake, shared_from_this())); } // Called by the base class beast::ssl_stream& stream() { return stream_; } // Called by the base class beast::ssl_stream release_stream() { return std::move(stream_); } // Called by the base class void do_eof() { // Set the timeout. beast::get_lowest_layer(stream_).expires_after(std::chrono::seconds(30)); // Perform the SSL shutdown stream_.async_shutdown( beast::bind_front_handler( &ssl_http_session::on_shutdown, shared_from_this())); } private: void on_handshake( beast::error_code ec, std::size_t bytes_used) { if(ec) return fail(ec, "handshake"); // Consume the portion of the buffer used by the handshake buffer_.consume(bytes_used); do_read(); } void on_shutdown(beast::error_code ec) { if(ec) return fail(ec, "shutdown"); // At this point the connection is closed gracefully } }; //------------------------------------------------------------------------------ // Detects SSL handshakes class detect_session : public std::enable_shared_from_this { beast::tcp_stream stream_; ssl::context& ctx_; std::shared_ptr doc_root_; beast::flat_buffer buffer_; public: explicit detect_session( tcp::socket&& socket, ssl::context& ctx, std::shared_ptr const& doc_root) : stream_(std::move(socket)) , ctx_(ctx) , doc_root_(doc_root) { } // Launch the detector void run() { // Set the timeout. stream_.expires_after(std::chrono::seconds(30)); beast::async_detect_ssl( stream_, buffer_, beast::bind_front_handler( &detect_session::on_detect, this->shared_from_this())); } void on_detect(beast::error_code ec, bool result) { if(ec) return fail(ec, "detect"); if(result) { // Launch SSL session std::make_shared( std::move(stream_), ctx_, std::move(buffer_), doc_root_)->run(); return; } // Launch plain session std::make_shared( std::move(stream_), std::move(buffer_), doc_root_)->run(); } }; // Accepts incoming connections and launches the sessions class listener : public std::enable_shared_from_this { net::io_context& ioc_; ssl::context& ctx_; tcp::acceptor acceptor_; std::shared_ptr doc_root_; public: listener( net::io_context& ioc, ssl::context& ctx, tcp::endpoint endpoint, std::shared_ptr const& doc_root) : ioc_(ioc) , ctx_(ctx) , acceptor_(net::make_strand(ioc)) , doc_root_(doc_root) { beast::error_code ec; // Open the acceptor acceptor_.open(endpoint.protocol(), ec); if(ec) { fail(ec, "open"); return; } // Allow address reuse acceptor_.set_option(net::socket_base::reuse_address(true), ec); if(ec) { fail(ec, "set_option"); return; } // Bind to the server address acceptor_.bind(endpoint, ec); if(ec) { fail(ec, "bind"); return; } // Start listening for connections acceptor_.listen( net::socket_base::max_listen_connections, ec); if(ec) { fail(ec, "listen"); return; } } // Start accepting incoming connections void run() { do_accept(); } private: void do_accept() { // The new connection gets its own strand acceptor_.async_accept( net::make_strand(ioc_), beast::bind_front_handler( &listener::on_accept, shared_from_this())); } void on_accept(beast::error_code ec, tcp::socket socket) { if(ec) { fail(ec, "accept"); } else { // Create the detector http_session and run it std::make_shared( std::move(socket), ctx_, doc_root_)->run(); } // Accept another connection do_accept(); } }; //------------------------------------------------------------------------------ int main(int argc, char* argv[]) { // Check command line arguments. if (argc != 5) { std::cerr << "Usage: advanced-server-flex
\n" << "Example:\n" << " advanced-server-flex 0.0.0.0 8080 . 1\n"; return EXIT_FAILURE; } auto const address = net::ip::make_address(argv[1]); auto const port = static_cast(std::atoi(argv[2])); auto const doc_root = std::make_shared(argv[3]); auto const threads = std::max(1, std::atoi(argv[4])); // The io_context is required for all I/O net::io_context ioc{threads}; // The SSL context is required, and holds certificates ssl::context ctx{ssl::context::tlsv12}; // This holds the self-signed certificate used by the server load_server_certificate(ctx); // Create and launch a listening port std::make_shared( ioc, ctx, tcp::endpoint{address, port}, doc_root)->run(); // Capture SIGINT and SIGTERM to perform a clean shutdown net::signal_set signals(ioc, SIGINT, SIGTERM); signals.async_wait( [&](beast::error_code const&, int) { // Stop the `io_context`. This will cause `run()` // to return immediately, eventually destroying the // `io_context` and all of the sockets in it. ioc.stop(); }); // Run the I/O service on the requested number of threads std::vector v; v.reserve(threads - 1); for(auto i = threads - 1; i > 0; --i) v.emplace_back( [&ioc] { ioc.run(); }); ioc.run(); // (If we get here, it means we got a SIGINT or SIGTERM) // Block until all the threads exit for(auto& t : v) t.join(); return EXIT_SUCCESS; }