forked from qdeconinck/mp-quic
/
reqres.go
114 lines (106 loc) · 2.64 KB
/
reqres.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
package main
import (
"crypto/rand"
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"encoding/pem"
"errors"
"flag"
"io"
"math/big"
"strconv"
"strings"
"time"
quic "github.com/lucas-clemente/quic-go"
"github.com/lucas-clemente/quic-go/internal/utils"
)
var addr = "localhost:4242"
const (
MsgLen = 750
MinFields = 5
)
// We start a server echoing data on the first stream the client opens,
// then connect with a client, send the message, and wait for its receipt.
func main() {
addrF := flag.String("addr", "localhost:4242", "Address to bind")
verbose := flag.Bool("v", false, "Verbose mode")
flag.Parse()
addr = *addrF
if *verbose {
utils.SetLogLevel(utils.LogLevelDebug)
} else {
utils.SetLogLevel(utils.LogLevelInfo)
}
err := echoServer()
if err != nil {
panic(err)
}
}
// Start a server that performs similar traffic to Siri servers
func echoServer() error {
cfgServer := &quic.Config{}
tlsConfig := generateTLSConfig()
listener, err := quic.ListenAddr(addr, tlsConfig, cfgServer)
if err != nil {
return err
}
sess, err := listener.Accept()
if err != nil {
return err
}
stream, err := sess.AcceptStream()
if err != nil {
panic(err)
}
buf := make([]byte, MsgLen)
for {
read, err := io.ReadFull(stream, buf)
if err != nil {
stream.Close()
stream.Close()
return err
}
msg := string(buf)
splitMsg := strings.Split(msg, "&")
expectedReqSize, _ := strconv.Atoi(splitMsg[1])
if read != expectedReqSize {
stream.Close()
stream.Close()
return errors.New("Did not read the expected size; " + strconv.Itoa(read) + " != " + splitMsg[1])
}
sleepTimeSec, _ := strconv.Atoi(splitMsg[3])
if sleepTimeSec > 0 {
time.Sleep(time.Duration(sleepTimeSec) * time.Second)
}
msgID := splitMsg[0]
resSize, _ := strconv.Atoi(splitMsg[2])
res := msgID + "&" + strings.Repeat("0", resSize-len(msgID)-2) + "\n"
_, err = stream.Write([]byte(res))
if err != nil {
stream.Close()
stream.Close()
return err
}
}
return err
}
// Setup a bare-bones TLS config for the server
func generateTLSConfig() *tls.Config {
key, err := rsa.GenerateKey(rand.Reader, 1024)
if err != nil {
panic(err)
}
template := x509.Certificate{SerialNumber: big.NewInt(1)}
certDER, err := x509.CreateCertificate(rand.Reader, &template, &template, &key.PublicKey, key)
if err != nil {
panic(err)
}
keyPEM := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(key)})
certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER})
tlsCert, err := tls.X509KeyPair(certPEM, keyPEM)
if err != nil {
panic(err)
}
return &tls.Config{Certificates: []tls.Certificate{tlsCert}}
}