Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright (c) 2014-2016 DeNA Co., Ltd., Kazuho Oku, Shota Fukumori, |
3 | | * Fastly, Inc. |
4 | | * |
5 | | * Permission is hereby granted, free of charge, to any person obtaining a copy |
6 | | * of this software and associated documentation files (the "Software"), to |
7 | | * deal in the Software without restriction, including without limitation the |
8 | | * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or |
9 | | * sell copies of the Software, and to permit persons to whom the Software is |
10 | | * furnished to do so, subject to the following conditions: |
11 | | * |
12 | | * The above copyright notice and this permission notice shall be included in |
13 | | * all copies or substantial portions of the Software. |
14 | | * |
15 | | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
16 | | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
17 | | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
18 | | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
19 | | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING |
20 | | * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS |
21 | | * IN THE SOFTWARE. |
22 | | */ |
23 | | #include <inttypes.h> |
24 | | #include <stddef.h> |
25 | | #include <stdio.h> |
26 | | #include <stdlib.h> |
27 | | #include "picohttpparser.h" |
28 | | #include "h2o.h" |
29 | | #include "h2o/http1.h" |
30 | | #include "h2o/http2.h" |
31 | | #include "./probes_.h" |
32 | | |
33 | | enum enum_h2o_http1_ostream_state { |
34 | | OSTREAM_STATE_HEAD, |
35 | | OSTREAM_STATE_BODY, |
36 | | OSTREAM_STATE_DONE, |
37 | | }; |
38 | | |
39 | | struct st_h2o_http1_finalostream_t { |
40 | | h2o_ostream_t super; |
41 | | enum enum_h2o_http1_ostream_state state; |
42 | | char *chunked_buf; /* buffer used for chunked-encoding (NULL unless chunked encoding is used) */ |
43 | | struct { |
44 | | /** |
45 | | * if `h2o_socket_write` is currently writing an informational response |
46 | | */ |
47 | | unsigned write_inflight : 1; |
48 | | /** |
49 | | * buffer used to store informational responses to be sent, when write of an informational response is inflight |
50 | | */ |
51 | | h2o_iovec_vector_t pending; |
52 | | /** |
53 | | * buffer used to delay the execution of `finalostream_send`, when write of an informational respnose is inflight; |
54 | | * availability is indicated by `inbufs != NULL` |
55 | | */ |
56 | | struct { |
57 | | h2o_sendvec_t *inbufs; |
58 | | size_t inbufcnt; |
59 | | h2o_send_state_t send_state; |
60 | | } pending_final; |
61 | | } informational; |
62 | | }; |
63 | | |
64 | | struct st_h2o_http1_conn_t { |
65 | | h2o_conn_t super; |
66 | | h2o_socket_t *sock; |
67 | | h2o_timer_t _timeout_entry; |
68 | | h2o_timer_t _io_timeout_entry; |
69 | | uint64_t _req_index; |
70 | | size_t _prevreqlen; |
71 | | size_t _unconsumed_request_size; |
72 | | struct st_h2o_http1_req_entity_reader *_req_entity_reader; |
73 | | struct st_h2o_http1_finalostream_t _ostr_final; |
74 | | struct { |
75 | | void *data; |
76 | | h2o_http1_upgrade_cb cb; |
77 | | } upgrade; |
78 | | /** |
79 | | * the request body buffer |
80 | | */ |
81 | | h2o_buffer_t *req_body; |
82 | | /** |
83 | | * the HTTP request / response (intentionally placed at the last, since it is a large structure and has it's own ctor) |
84 | | */ |
85 | | h2o_req_t req; |
86 | | }; |
87 | | |
88 | | struct st_h2o_http1_req_entity_reader { |
89 | | void (*handle_incoming_entity)(struct st_h2o_http1_conn_t *conn); |
90 | | }; |
91 | | |
92 | | struct st_h2o_http1_content_length_entity_reader { |
93 | | struct st_h2o_http1_req_entity_reader super; |
94 | | size_t content_length; |
95 | | }; |
96 | | |
97 | | struct st_h2o_http1_chunked_entity_reader { |
98 | | struct st_h2o_http1_req_entity_reader super; |
99 | | struct phr_chunked_decoder decoder; |
100 | | }; |
101 | | |
102 | | static void finalostream_send(h2o_ostream_t *_self, h2o_req_t *req, h2o_sendvec_t *inbufs, size_t inbufcnt, h2o_send_state_t state); |
103 | | static void finalostream_send_informational(h2o_ostream_t *_self, h2o_req_t *req); |
104 | | static void reqread_on_read(h2o_socket_t *sock, const char *err); |
105 | | static void reqread_on_timeout(h2o_timer_t *entry); |
106 | | static void req_io_on_timeout(h2o_timer_t *entry); |
107 | | static void reqread_start(struct st_h2o_http1_conn_t *conn); |
108 | | static int foreach_request(h2o_conn_t *_conn, int (*cb)(h2o_req_t *req, void *cbdata), void *cbdata); |
109 | | |
110 | | static void init_request(struct st_h2o_http1_conn_t *conn) |
111 | 0 | { |
112 | 0 | if (conn->_req_index != 0) { |
113 | 0 | if (conn->req_body != NULL) |
114 | 0 | h2o_buffer_dispose(&conn->req_body); |
115 | 0 | h2o_dispose_request(&conn->req); |
116 | 0 | if (conn->_unconsumed_request_size) |
117 | 0 | h2o_buffer_consume(&conn->sock->input, conn->_unconsumed_request_size); |
118 | 0 | } |
119 | 0 | assert(conn->req_body == NULL); |
120 | 0 | h2o_init_request(&conn->req, &conn->super, NULL); |
121 | |
|
122 | 0 | ++conn->_req_index; |
123 | 0 | conn->req._ostr_top = &conn->_ostr_final.super; |
124 | |
|
125 | 0 | conn->_ostr_final = (struct st_h2o_http1_finalostream_t){{ |
126 | 0 | NULL, /* next */ |
127 | 0 | finalostream_send, /* do_send */ |
128 | 0 | NULL, /* stop */ |
129 | 0 | conn->super.ctx->globalconf->send_informational_mode == H2O_SEND_INFORMATIONAL_MODE_ALL ? finalostream_send_informational |
130 | 0 | : NULL, /* send_informational */ |
131 | 0 | }}; |
132 | 0 | } |
133 | | |
134 | | static void close_connection(struct st_h2o_http1_conn_t *conn, int close_socket) |
135 | 0 | { |
136 | 0 | if (conn->sock != NULL) { |
137 | 0 | H2O_PROBE_CONN0(H1_CLOSE, &conn->super); |
138 | 0 | H2O_LOG_CONN(h1_close, &conn->super, {}); |
139 | 0 | } |
140 | 0 | h2o_timer_unlink(&conn->_timeout_entry); |
141 | 0 | h2o_timer_unlink(&conn->_io_timeout_entry); |
142 | 0 | if (conn->req_body != NULL) |
143 | 0 | h2o_buffer_dispose(&conn->req_body); |
144 | 0 | h2o_dispose_request(&conn->req); |
145 | 0 | if (conn->sock != NULL && close_socket) |
146 | 0 | h2o_socket_close(conn->sock); |
147 | 0 | h2o_destroy_connection(&conn->super); |
148 | 0 | } |
149 | | |
150 | | static void cleanup_connection(struct st_h2o_http1_conn_t *conn) |
151 | 0 | { |
152 | 0 | if (!conn->req.http1_is_persistent) { |
153 | | /* TODO use lingering close */ |
154 | 0 | close_connection(conn, 1); |
155 | 0 | return; |
156 | 0 | } |
157 | | |
158 | 0 | assert(conn->req.proceed_req == NULL); |
159 | 0 | assert(conn->_req_entity_reader == NULL); |
160 | | |
161 | | /* handle next request */ |
162 | 0 | init_request(conn); |
163 | 0 | conn->req.write_req.cb = NULL; |
164 | 0 | conn->req.write_req.ctx = NULL; |
165 | 0 | conn->req.proceed_req = NULL; |
166 | 0 | conn->_prevreqlen = 0; |
167 | 0 | conn->_unconsumed_request_size = 0; |
168 | |
|
169 | 0 | if (conn->sock->input->size == 0) |
170 | 0 | h2o_conn_set_state(&conn->super, H2O_CONN_STATE_IDLE); |
171 | |
|
172 | 0 | reqread_start(conn); |
173 | 0 | } |
174 | | |
175 | | /** |
176 | | * timer is activated if cb != NULL, disactivated otherwise |
177 | | */ |
178 | | static void set_req_timeout(struct st_h2o_http1_conn_t *conn, uint64_t timeout, h2o_timer_cb cb) |
179 | 0 | { |
180 | 0 | if (conn->req.is_tunnel_req) |
181 | 0 | cb = NULL; |
182 | 0 | if (conn->_timeout_entry.cb != NULL) |
183 | 0 | h2o_timer_unlink(&conn->_timeout_entry); |
184 | 0 | conn->_timeout_entry.cb = cb; |
185 | 0 | if (cb != NULL) |
186 | 0 | h2o_timer_link(conn->super.ctx->loop, timeout, &conn->_timeout_entry); |
187 | 0 | } |
188 | | |
189 | | static void set_req_io_timeout(struct st_h2o_http1_conn_t *conn, uint64_t timeout, h2o_timer_cb cb) |
190 | 0 | { |
191 | 0 | if (conn->req.is_tunnel_req) |
192 | 0 | cb = NULL; |
193 | 0 | if (conn->_io_timeout_entry.cb != NULL) |
194 | 0 | h2o_timer_unlink(&conn->_io_timeout_entry); |
195 | 0 | conn->_io_timeout_entry.cb = cb; |
196 | 0 | if (cb != NULL) |
197 | 0 | h2o_timer_link(conn->super.ctx->loop, timeout, &conn->_io_timeout_entry); |
198 | 0 | } |
199 | | |
200 | | static void clear_timeouts(struct st_h2o_http1_conn_t *conn) |
201 | 0 | { |
202 | 0 | set_req_timeout(conn, 0, NULL); |
203 | 0 | set_req_io_timeout(conn, 0, NULL); |
204 | 0 | } |
205 | | |
206 | | static void entity_read_do_send_error(struct st_h2o_http1_conn_t *conn, int status, size_t status_error_index, const char *reason, |
207 | | const char *body) |
208 | 0 | { |
209 | 0 | conn->req.proceed_req = NULL; |
210 | 0 | conn->_req_entity_reader = NULL; |
211 | 0 | clear_timeouts(conn); |
212 | 0 | h2o_socket_read_stop(conn->sock); |
213 | | /* FIXME We should check if `h2o_proceed_request` has been called, rather than trying to guess if we have (I'm unsure if the |
214 | | * contract is for h2o_req_t::_generator to become non-NULL immediately after `h2o_proceed_request` is being called). */ |
215 | 0 | if (conn->req._generator == NULL && conn->_ostr_final.state == OSTREAM_STATE_HEAD) { |
216 | 0 | conn->super.ctx->emitted_error_status[status_error_index]++; |
217 | 0 | h2o_send_error_generic(&conn->req, status, reason, body, H2O_SEND_ERROR_HTTP1_CLOSE_CONNECTION); |
218 | 0 | } else { |
219 | 0 | conn->req.http1_is_persistent = 0; |
220 | 0 | if (conn->_ostr_final.state == OSTREAM_STATE_DONE) |
221 | 0 | cleanup_connection(conn); |
222 | 0 | } |
223 | 0 | } |
224 | | |
225 | | #define DECL_ENTITY_READ_SEND_ERROR_XXX(status_) \ |
226 | | static void entity_read_send_error_##status_(struct st_h2o_http1_conn_t *conn, const char *reason, const char *body) \ |
227 | 0 | { \ |
228 | 0 | entity_read_do_send_error(conn, status_, H2O_STATUS_ERROR_##status_, reason, body); \ |
229 | 0 | } Unexecuted instantiation: http1.c:entity_read_send_error_400 Unexecuted instantiation: http1.c:entity_read_send_error_502 Unexecuted instantiation: http1.c:entity_read_send_error_413 |
230 | | |
231 | | DECL_ENTITY_READ_SEND_ERROR_XXX(400) |
232 | | DECL_ENTITY_READ_SEND_ERROR_XXX(413) |
233 | | DECL_ENTITY_READ_SEND_ERROR_XXX(502) |
234 | | |
235 | | static void handle_one_body_fragment(struct st_h2o_http1_conn_t *conn, size_t fragment_size, size_t extra_bytes, int complete) |
236 | 0 | { |
237 | 0 | if (fragment_size == 0 && !complete) { |
238 | 0 | h2o_buffer_consume(&conn->sock->input, extra_bytes); |
239 | 0 | return; |
240 | 0 | } |
241 | | |
242 | 0 | clear_timeouts(conn); |
243 | 0 | h2o_socket_read_stop(conn->sock); |
244 | | |
245 | | /* move data being read to req_body */ |
246 | 0 | if (!h2o_buffer_try_append(&conn->req_body, conn->sock->input->bytes, fragment_size)) { |
247 | 0 | entity_read_send_error_502(conn, "Bad Gateway", "Bad Gateway"); |
248 | 0 | return; |
249 | 0 | } |
250 | 0 | h2o_buffer_consume(&conn->sock->input, fragment_size + extra_bytes); |
251 | 0 | conn->req.req_body_bytes_received += fragment_size; |
252 | | |
253 | | /* invoke action */ |
254 | 0 | conn->req.entity = h2o_iovec_init(conn->req_body->bytes, conn->req_body->size); |
255 | 0 | if (conn->req.write_req.cb(conn->req.write_req.ctx, complete) != 0) { |
256 | 0 | entity_read_send_error_502(conn, "Bad Gateway", "Bad Gateway"); |
257 | 0 | return; |
258 | 0 | } |
259 | 0 | if (complete) { |
260 | 0 | conn->req.proceed_req = NULL; |
261 | 0 | conn->_req_entity_reader = NULL; |
262 | 0 | if (conn->_ostr_final.state == OSTREAM_STATE_DONE) { |
263 | 0 | cleanup_connection(conn); |
264 | 0 | } |
265 | 0 | } |
266 | 0 | } |
267 | | |
268 | | static void handle_chunked_entity_read(struct st_h2o_http1_conn_t *conn) |
269 | 0 | { |
270 | 0 | struct st_h2o_http1_chunked_entity_reader *reader = (void *)conn->_req_entity_reader; |
271 | 0 | size_t bufsz; |
272 | 0 | ssize_t ret; |
273 | | |
274 | | /* decode the incoming data */ |
275 | 0 | if ((bufsz = conn->sock->input->size) == 0) |
276 | 0 | return; |
277 | 0 | ret = phr_decode_chunked(&reader->decoder, conn->sock->input->bytes, &bufsz); |
278 | 0 | if (ret != -1 && bufsz + conn->req.req_body_bytes_received >= conn->super.ctx->globalconf->max_request_entity_size) { |
279 | 0 | entity_read_send_error_413(conn, "Request Entity Too Large", "request entity is too large"); |
280 | 0 | return; |
281 | 0 | } |
282 | 0 | if (ret < 0) { |
283 | 0 | if (ret == -2) { |
284 | | /* incomplete */ |
285 | 0 | handle_one_body_fragment(conn, bufsz, conn->sock->input->size - bufsz, 0); |
286 | 0 | } else { |
287 | | /* error */ |
288 | 0 | entity_read_send_error_400(conn, "Invalid Request", "broken chunked-encoding"); |
289 | 0 | } |
290 | 0 | } else { |
291 | | /* complete */ |
292 | 0 | assert(bufsz + ret <= conn->sock->input->size); |
293 | 0 | conn->sock->input->size = bufsz + ret; |
294 | 0 | handle_one_body_fragment(conn, bufsz, 0, 1); |
295 | 0 | } |
296 | 0 | } |
297 | | |
298 | | static int create_chunked_entity_reader(struct st_h2o_http1_conn_t *conn) |
299 | 0 | { |
300 | 0 | struct st_h2o_http1_chunked_entity_reader *reader = h2o_mem_alloc_pool(&conn->req.pool, *reader, 1); |
301 | 0 | conn->_req_entity_reader = &reader->super; |
302 | |
|
303 | 0 | reader->super.handle_incoming_entity = handle_chunked_entity_read; |
304 | 0 | memset(&reader->decoder, 0, sizeof(reader->decoder)); |
305 | 0 | reader->decoder.consume_trailer = 1; |
306 | |
|
307 | 0 | return 0; |
308 | 0 | } |
309 | | |
310 | | static void handle_content_length_entity_read(struct st_h2o_http1_conn_t *conn) |
311 | 0 | { |
312 | 0 | int complete = 0; |
313 | 0 | struct st_h2o_http1_content_length_entity_reader *reader = (void *)conn->_req_entity_reader; |
314 | 0 | size_t length = conn->sock->input->size; |
315 | |
|
316 | 0 | if (conn->req.req_body_bytes_received + conn->sock->input->size >= reader->content_length) { |
317 | 0 | complete = 1; |
318 | 0 | length = reader->content_length - conn->req.req_body_bytes_received; |
319 | 0 | } |
320 | 0 | if (!complete && length == 0) |
321 | 0 | return; |
322 | | |
323 | 0 | handle_one_body_fragment(conn, length, 0, complete); |
324 | 0 | } |
325 | | |
326 | | static int create_content_length_entity_reader(struct st_h2o_http1_conn_t *conn, size_t content_length) |
327 | 0 | { |
328 | 0 | struct st_h2o_http1_content_length_entity_reader *reader = h2o_mem_alloc_pool(&conn->req.pool, *reader, 1); |
329 | 0 | conn->_req_entity_reader = &reader->super; |
330 | |
|
331 | 0 | reader->super.handle_incoming_entity = handle_content_length_entity_read; |
332 | 0 | reader->content_length = content_length; |
333 | |
|
334 | 0 | return 0; |
335 | 0 | } |
336 | | |
337 | | static int create_entity_reader(struct st_h2o_http1_conn_t *conn, const struct phr_header *entity_header) |
338 | 0 | { |
339 | | /* strlen("content-length") is unequal to sizeof("transfer-encoding"), and thus checking the length only is sufficient */ |
340 | 0 | if (entity_header->name_len == sizeof("transfer-encoding") - 1) { |
341 | | /* transfer-encoding */ |
342 | 0 | if (!h2o_lcstris(entity_header->value, entity_header->value_len, H2O_STRLIT("chunked"))) { |
343 | 0 | entity_read_send_error_400(conn, "Invalid Request", "unknown transfer-encoding"); |
344 | 0 | return -1; |
345 | 0 | } |
346 | 0 | return create_chunked_entity_reader(conn); |
347 | 0 | } else { |
348 | | /* content-length */ |
349 | 0 | size_t content_length = h2o_strtosize(entity_header->value, entity_header->value_len); |
350 | 0 | if (content_length == SIZE_MAX) { |
351 | 0 | entity_read_send_error_400(conn, "Invalid Request", "broken content-length header"); |
352 | 0 | return -1; |
353 | 0 | } |
354 | 0 | if (content_length > conn->super.ctx->globalconf->max_request_entity_size) { |
355 | 0 | entity_read_send_error_413(conn, "Request Entity Too Large", "request entity is too large"); |
356 | 0 | return -1; |
357 | 0 | } |
358 | 0 | conn->req.content_length = content_length; |
359 | 0 | return create_content_length_entity_reader(conn, (size_t)content_length); |
360 | 0 | } |
361 | | /* failed */ |
362 | 0 | return -1; |
363 | 0 | } |
364 | | |
365 | | static const char *init_headers(h2o_mem_pool_t *pool, h2o_headers_t *headers, const struct phr_header *src, size_t len, |
366 | | h2o_iovec_t *connection, h2o_iovec_t *host, h2o_iovec_t *upgrade, ssize_t *expect_header_index, |
367 | | ssize_t *entity_header_index) |
368 | 0 | { |
369 | 0 | *entity_header_index = -1; |
370 | 0 | *expect_header_index = -1; |
371 | |
|
372 | 0 | assert(headers->size == 0); |
373 | | |
374 | | /* setup */ |
375 | 0 | if (len != 0) { |
376 | 0 | size_t i; |
377 | 0 | h2o_vector_reserve(pool, headers, len); |
378 | 0 | for (i = 0; i != len; ++i) { |
379 | 0 | const h2o_token_t *name_token; |
380 | | /* reject multiline header */ |
381 | 0 | if (src[i].name_len == 0) |
382 | 0 | return "line folding of header fields is not supported"; |
383 | 0 | char orig_case[src[i].name_len]; |
384 | | /* preserve the original case */ |
385 | 0 | memcpy(orig_case, src[i].name, src[i].name_len); |
386 | | /* convert to lower-case in-place */ |
387 | 0 | h2o_strtolower((char *)src[i].name, src[i].name_len); |
388 | 0 | if ((name_token = h2o_lookup_token(src[i].name, src[i].name_len)) != NULL) { |
389 | 0 | if (name_token->flags.is_init_header_special) { |
390 | 0 | if (name_token == H2O_TOKEN_HOST) { |
391 | 0 | host->base = (char *)src[i].value; |
392 | 0 | host->len = src[i].value_len; |
393 | 0 | } else if (name_token == H2O_TOKEN_CONTENT_LENGTH) { |
394 | 0 | if (*entity_header_index == -1) |
395 | 0 | *entity_header_index = i; |
396 | 0 | } else if (name_token == H2O_TOKEN_TRANSFER_ENCODING) { |
397 | 0 | *entity_header_index = i; |
398 | 0 | } else if (name_token == H2O_TOKEN_EXPECT) { |
399 | 0 | *expect_header_index = i; |
400 | 0 | } else if (name_token == H2O_TOKEN_UPGRADE) { |
401 | 0 | upgrade->base = (char *)src[i].value; |
402 | 0 | upgrade->len = src[i].value_len; |
403 | 0 | } else { |
404 | 0 | assert(!"logic flaw"); |
405 | 0 | } |
406 | 0 | } else { |
407 | 0 | h2o_add_header(pool, headers, name_token, orig_case, src[i].value, src[i].value_len); |
408 | 0 | if (name_token == H2O_TOKEN_CONNECTION) |
409 | 0 | *connection = headers->entries[headers->size - 1].value; |
410 | 0 | } |
411 | 0 | } else { |
412 | 0 | h2o_add_header_by_str(pool, headers, src[i].name, src[i].name_len, 0, orig_case, src[i].value, src[i].value_len); |
413 | 0 | } |
414 | 0 | } |
415 | 0 | } |
416 | | |
417 | 0 | return NULL; |
418 | 0 | } |
419 | | |
420 | | static int upgrade_is_h2(h2o_iovec_t upgrade) |
421 | 0 | { |
422 | 0 | if (h2o_lcstris(upgrade.base, upgrade.len, H2O_STRLIT("h2c")) || h2o_lcstris(upgrade.base, upgrade.len, H2O_STRLIT("h2c-14")) || |
423 | 0 | h2o_lcstris(upgrade.base, upgrade.len, H2O_STRLIT("h2c-16"))) |
424 | 0 | return 1; |
425 | 0 | return 0; |
426 | 0 | } |
427 | | |
428 | | static const char fixup_request_is_h2_upgrade[] = "fixup h2 upgrade"; |
429 | | |
430 | | static const char *fixup_request(struct st_h2o_http1_conn_t *conn, struct phr_header *headers, size_t num_headers, |
431 | | int minor_version, ssize_t *expect_header_index, ssize_t *entity_header_index) |
432 | 0 | { |
433 | 0 | h2o_iovec_t connection = {NULL, 0}, host = {NULL, 0}, upgrade = {NULL, 0}; |
434 | 0 | enum { METHOD_NORMAL, METHOD_CONNECT, METHOD_CONNECT_UDP } method_type; |
435 | 0 | const char *ret; |
436 | |
|
437 | 0 | conn->req.input.scheme = conn->sock->ssl != NULL ? &H2O_URL_SCHEME_HTTPS : &H2O_URL_SCHEME_HTTP; |
438 | 0 | conn->req.version = 0x100 | (minor_version != 0); |
439 | | |
440 | | /* RFC 7231 6.2: a server MUST NOT send a 1xx response to an HTTP/1.0 client */ |
441 | 0 | if (conn->req.version < 0x101) |
442 | 0 | conn->_ostr_final.super.send_informational = NULL; |
443 | |
|
444 | 0 | if (h2o_memis(conn->req.input.method.base, conn->req.input.method.len, H2O_STRLIT("CONNECT"))) { |
445 | 0 | method_type = METHOD_CONNECT; |
446 | 0 | } else if (h2o_memis(conn->req.input.method.base, conn->req.input.method.len, H2O_STRLIT("CONNECT-UDP"))) { |
447 | 0 | method_type = METHOD_CONNECT_UDP; |
448 | 0 | } else { |
449 | 0 | method_type = METHOD_NORMAL; |
450 | 0 | } |
451 | | |
452 | | /* init headers */ |
453 | 0 | if ((ret = init_headers(&conn->req.pool, &conn->req.headers, headers, num_headers, &connection, &host, &upgrade, |
454 | 0 | expect_header_index, entity_header_index)) != NULL) |
455 | 0 | return ret; |
456 | | |
457 | | /* copy the values to pool, since the buffer pointed by the headers may get realloced */ |
458 | 0 | if (*entity_header_index != -1 || method_type != METHOD_NORMAL || upgrade.base != NULL) { |
459 | 0 | size_t i; |
460 | 0 | conn->req.input.method = h2o_strdup(&conn->req.pool, conn->req.input.method.base, conn->req.input.method.len); |
461 | 0 | conn->req.input.path = h2o_strdup(&conn->req.pool, conn->req.input.path.base, conn->req.input.path.len); |
462 | 0 | for (i = 0; i != conn->req.headers.size; ++i) { |
463 | 0 | h2o_header_t *header = conn->req.headers.entries + i; |
464 | 0 | if (!h2o_iovec_is_token(header->name)) { |
465 | 0 | *header->name = h2o_strdup(&conn->req.pool, header->name->base, header->name->len); |
466 | 0 | } |
467 | 0 | header->value = h2o_strdup(&conn->req.pool, header->value.base, header->value.len); |
468 | 0 | } |
469 | 0 | if (host.base != NULL) |
470 | 0 | host = h2o_strdup(&conn->req.pool, host.base, host.len); |
471 | 0 | if (upgrade.base != NULL) |
472 | 0 | upgrade = h2o_strdup(&conn->req.pool, upgrade.base, upgrade.len); |
473 | 0 | } |
474 | |
|
475 | 0 | if (method_type == METHOD_CONNECT) { |
476 | | /* CONNECT method, validate, setting the target host in `req->input.authority`. Path becomes empty. */ |
477 | 0 | if (conn->req.version < 0x101 || conn->req.input.path.len == 0 || |
478 | 0 | (host.base != NULL && !h2o_memis(conn->req.input.path.base, conn->req.input.path.len, host.base, host.len)) || |
479 | 0 | *entity_header_index != -1) |
480 | 0 | return "invalid request"; |
481 | 0 | conn->req.input.authority = conn->req.input.path; |
482 | 0 | conn->req.input.path = h2o_iovec_init(NULL, 0); |
483 | 0 | conn->req.is_tunnel_req = 1; |
484 | 0 | } else { |
485 | | /* request line is in ordinary form, path might contain absolute URL; if so, convert it */ |
486 | 0 | if (conn->req.input.path.len != 0 && conn->req.input.path.base[0] != '/') { |
487 | 0 | h2o_url_t url; |
488 | 0 | if (h2o_url_parse(&conn->req.pool, conn->req.input.path.base, conn->req.input.path.len, &url) == 0) { |
489 | 0 | conn->req.input.scheme = url.scheme; |
490 | 0 | conn->req.input.path = url.path; |
491 | 0 | host = url.authority; /* authority part of the absolute form overrides the host header field (RFC 7230 S5.4) */ |
492 | 0 | } |
493 | 0 | } |
494 | | /* move host header to req->authority */ |
495 | 0 | if (host.base != NULL) |
496 | 0 | conn->req.input.authority = host; |
497 | | /* each protocol implementation validates masque */ |
498 | 0 | if (!h2o_req_validate_pseudo_headers(&conn->req)) |
499 | 0 | return "invalid request"; |
500 | | /* special handling for CONNECT-UDP, else it is an ordinary request */ |
501 | 0 | if (method_type == METHOD_CONNECT_UDP) { |
502 | 0 | conn->req.is_tunnel_req = 1; |
503 | 0 | } else { |
504 | | /* handle Connection and Upgrade header fields */ |
505 | 0 | if (connection.base != NULL) { |
506 | | /* TODO contains_token function can be faster */ |
507 | 0 | if (h2o_contains_token(connection.base, connection.len, H2O_STRLIT("keep-alive"), ',')) { |
508 | 0 | conn->req.http1_is_persistent = 1; |
509 | 0 | } |
510 | | /* Upgrade is respected only for requests without bodies. Use of upgrade on a request with body is unsupported, |
511 | | * because we reuse the entity reader for reading the body and the tunnelled data. */ |
512 | 0 | if (upgrade.base != NULL && h2o_contains_token(connection.base, connection.len, H2O_STRLIT("upgrade"), ',') && |
513 | 0 | *entity_header_index == -1) { |
514 | | /* early return if upgrading to h2 */ |
515 | 0 | if (upgrade_is_h2(upgrade)) { |
516 | 0 | if (conn->sock->ssl == NULL && conn->super.ctx->globalconf->http1.upgrade_to_http2) |
517 | 0 | return fixup_request_is_h2_upgrade; |
518 | 0 | } else { |
519 | 0 | conn->req.upgrade = upgrade; |
520 | 0 | conn->req.is_tunnel_req = 1; |
521 | 0 | conn->req.http1_is_persistent = 0; |
522 | 0 | } |
523 | 0 | } |
524 | 0 | } else if (conn->req.version >= 0x101) { |
525 | | /* defaults to keep-alive if >= HTTP/1.1 */ |
526 | 0 | conn->req.http1_is_persistent = 1; |
527 | 0 | } |
528 | | /* disable keep-alive if shutdown is requested */ |
529 | 0 | if (conn->req.http1_is_persistent && conn->super.ctx->shutdown_requested) |
530 | 0 | conn->req.http1_is_persistent = 0; |
531 | 0 | } |
532 | 0 | } |
533 | | |
534 | 0 | return NULL; |
535 | 0 | } |
536 | | |
537 | | static void on_continue_sent(h2o_socket_t *sock, const char *err) |
538 | 0 | { |
539 | 0 | struct st_h2o_http1_conn_t *conn = sock->data; |
540 | |
|
541 | 0 | if (err != NULL) { |
542 | 0 | close_connection(conn, 1); |
543 | 0 | return; |
544 | 0 | } |
545 | | |
546 | 0 | h2o_socket_read_start(sock, reqread_on_read); |
547 | 0 | conn->_req_entity_reader->handle_incoming_entity(conn); |
548 | 0 | } |
549 | | |
550 | | static int contains_crlf_only(const char *s, size_t len) |
551 | 0 | { |
552 | 0 | for (; len != 0; ++s, --len) |
553 | 0 | if (!(*s == '\r' || *s == '\n')) |
554 | 0 | return 0; |
555 | 0 | return 1; |
556 | 0 | } |
557 | | |
558 | | static void send_bad_request(struct st_h2o_http1_conn_t *conn, const char *body) |
559 | 0 | { |
560 | 0 | h2o_socket_read_stop(conn->sock); |
561 | 0 | h2o_send_error_400(&conn->req, "Bad Request", body, H2O_SEND_ERROR_BROKEN_REQUEST | H2O_SEND_ERROR_HTTP1_CLOSE_CONNECTION); |
562 | 0 | } |
563 | | |
564 | | static void resume_request_read(struct st_h2o_http1_conn_t *conn) |
565 | 0 | { |
566 | 0 | set_req_timeout(conn, conn->super.ctx->globalconf->http1.req_timeout, reqread_on_timeout); |
567 | 0 | set_req_io_timeout(conn, conn->super.ctx->globalconf->http1.req_io_timeout, req_io_on_timeout); |
568 | 0 | h2o_socket_read_start(conn->sock, reqread_on_read); |
569 | 0 | } |
570 | | |
571 | | static void proceed_request(h2o_req_t *req, const char *errstr) |
572 | 0 | { |
573 | 0 | struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, req); |
574 | |
|
575 | 0 | if (errstr != NULL) { |
576 | 0 | entity_read_send_error_502(conn, "Bad Gateway", "Bad Gateway"); |
577 | 0 | return; |
578 | 0 | } |
579 | | |
580 | 0 | assert(conn->req.entity.len == conn->req_body->size); |
581 | 0 | h2o_buffer_consume(&conn->req_body, conn->req_body->size); |
582 | |
|
583 | 0 | resume_request_read(conn); |
584 | 0 | } |
585 | | |
586 | | static int write_req_non_streaming(void *_req, int is_end_stream) |
587 | 0 | { |
588 | 0 | struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, _req); |
589 | |
|
590 | 0 | if (is_end_stream) { |
591 | 0 | conn->req.proceed_req = NULL; |
592 | 0 | h2o_process_request(&conn->req); |
593 | 0 | } else { |
594 | 0 | resume_request_read(conn); |
595 | 0 | } |
596 | 0 | return 0; |
597 | 0 | } |
598 | | |
599 | | static int write_req_first(void *_req, int is_end_stream) |
600 | 0 | { |
601 | 0 | struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, _req); |
602 | | |
603 | | /* if possible, switch to streaming request body mode */ |
604 | 0 | if (!is_end_stream && h2o_req_can_stream_request(&conn->req)) { |
605 | 0 | conn->req.write_req.cb = NULL; /* will be set to something before `proceed_req` is being invoked */ |
606 | 0 | conn->req.proceed_req = proceed_request; |
607 | 0 | h2o_process_request(&conn->req); |
608 | 0 | return 0; |
609 | 0 | } |
610 | | |
611 | 0 | conn->req.write_req.cb = write_req_non_streaming; |
612 | 0 | return write_req_non_streaming(&conn->req, is_end_stream); |
613 | 0 | } |
614 | | |
615 | | static int write_req_connect_first(void *_req, int is_end_stream) |
616 | 0 | { |
617 | 0 | struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, _req); |
618 | |
|
619 | 0 | conn->req.write_req.cb = NULL; /* will not be called again until proceed_req is called by the generator */ |
620 | 0 | if (is_end_stream) |
621 | 0 | conn->req.proceed_req = NULL; |
622 | |
|
623 | 0 | return 0; |
624 | 0 | } |
625 | | |
626 | | static void handle_incoming_request(struct st_h2o_http1_conn_t *conn) |
627 | 0 | { |
628 | 0 | size_t inreqlen = conn->sock->input->size < H2O_MAX_REQLEN ? conn->sock->input->size : H2O_MAX_REQLEN; |
629 | 0 | int reqlen, minor_version; |
630 | 0 | struct phr_header headers[H2O_MAX_HEADERS]; |
631 | 0 | size_t num_headers = H2O_MAX_HEADERS; |
632 | |
|
633 | 0 | if (conn->sock->input->size != 0) |
634 | 0 | h2o_conn_set_state(&conn->super, H2O_CONN_STATE_ACTIVE); |
635 | | |
636 | | /* need to set request_begin_at here for keep-alive connection */ |
637 | 0 | if (h2o_timeval_is_null(&conn->req.timestamps.request_begin_at)) |
638 | 0 | conn->req.timestamps.request_begin_at = h2o_gettimeofday(conn->super.ctx->loop); |
639 | |
|
640 | 0 | reqlen = phr_parse_request(conn->sock->input->bytes, inreqlen, (const char **)&conn->req.input.method.base, |
641 | 0 | &conn->req.input.method.len, (const char **)&conn->req.input.path.base, &conn->req.input.path.len, |
642 | 0 | &minor_version, headers, &num_headers, conn->_prevreqlen); |
643 | 0 | conn->_prevreqlen = inreqlen; |
644 | | |
645 | | /* handle incomplete or broken HTTP headers */ |
646 | 0 | switch (reqlen) { |
647 | 0 | case -2: /* incomplete */ |
648 | 0 | if (inreqlen == H2O_MAX_REQLEN) { |
649 | 0 | send_bad_request(conn, "Bad Request"); |
650 | 0 | } |
651 | 0 | return; |
652 | 0 | case -1: // error |
653 | | /* upgrade to HTTP/2 if the request starts with: PRI * HTTP/2 */ |
654 | 0 | if (conn->super.ctx->globalconf->http1.upgrade_to_http2) { |
655 | | /* should check up to the first octet that phr_parse_request returns an error */ |
656 | 0 | static const h2o_iovec_t HTTP2_SIG = {H2O_STRLIT("PRI * HTTP/2")}; |
657 | 0 | if (conn->sock->input->size >= HTTP2_SIG.len && memcmp(conn->sock->input->bytes, HTTP2_SIG.base, HTTP2_SIG.len) == 0) { |
658 | 0 | h2o_accept_ctx_t accept_ctx = {conn->super.ctx, conn->super.hosts}; |
659 | 0 | h2o_socket_t *sock = conn->sock; |
660 | 0 | struct timeval connected_at = conn->super.connected_at; |
661 | | /* destruct the connection after detatching the socket */ |
662 | 0 | conn->sock = NULL; |
663 | 0 | close_connection(conn, 1); |
664 | | /* and accept as http2 connection */ |
665 | 0 | h2o_http2_accept(&accept_ctx, sock, connected_at); |
666 | 0 | return; |
667 | 0 | } |
668 | 0 | } |
669 | 0 | if (inreqlen <= 4 && contains_crlf_only(conn->sock->input->bytes, inreqlen)) { |
670 | 0 | close_connection(conn, 1); |
671 | 0 | } else { |
672 | 0 | send_bad_request(conn, "Bad Request"); |
673 | 0 | } |
674 | 0 | return; |
675 | 0 | default: /* parse complete */ |
676 | 0 | break; |
677 | 0 | } |
678 | | |
679 | | /* parse complete */ |
680 | 0 | const char *err; |
681 | 0 | ssize_t entity_body_header_index; |
682 | 0 | ssize_t expect_header_index; |
683 | 0 | conn->_unconsumed_request_size = reqlen; |
684 | 0 | if ((err = fixup_request(conn, headers, num_headers, minor_version, &expect_header_index, &entity_body_header_index)) != NULL && |
685 | 0 | err != fixup_request_is_h2_upgrade) { |
686 | 0 | clear_timeouts(conn); |
687 | 0 | send_bad_request(conn, err); |
688 | 0 | return; |
689 | 0 | } |
690 | 0 | h2o_probe_log_request(&conn->req, conn->_req_index); |
691 | | |
692 | | /* handle H2 upgrade */ |
693 | 0 | if (err == fixup_request_is_h2_upgrade) { |
694 | 0 | clear_timeouts(conn); |
695 | 0 | h2o_socket_read_stop(conn->sock); |
696 | 0 | if (h2o_http2_handle_upgrade(&conn->req, conn->super.connected_at) != 0) |
697 | 0 | h2o_send_error_400(&conn->req, "Invalid Request", "Broken upgrade request to HTTP/2", 0); |
698 | 0 | return; |
699 | 0 | } |
700 | | |
701 | | /* handle request with body */ |
702 | 0 | if (entity_body_header_index != -1) { |
703 | | /* Request has body, start reading it */ |
704 | 0 | conn->req.timestamps.request_body_begin_at = h2o_gettimeofday(conn->super.ctx->loop); |
705 | 0 | if (create_entity_reader(conn, headers + entity_body_header_index) != 0) |
706 | 0 | return; |
707 | 0 | conn->_unconsumed_request_size = 0; |
708 | 0 | h2o_buffer_init(&conn->req_body, &h2o_socket_buffer_prototype); |
709 | 0 | conn->req.write_req.cb = write_req_first; |
710 | 0 | conn->req.write_req.ctx = &conn->req; |
711 | 0 | if (expect_header_index != -1) { |
712 | 0 | h2o_iovec_t expect_value = h2o_iovec_init(headers[expect_header_index].value, headers[expect_header_index].value_len); |
713 | 0 | if (!h2o_lcstris(expect_value.base, expect_value.len, H2O_STRLIT("100-continue"))) { |
714 | 0 | clear_timeouts(conn); |
715 | 0 | h2o_socket_read_stop(conn->sock); |
716 | 0 | h2o_send_error_417(&conn->req, "Expectation Failed", "unknown expectation", H2O_SEND_ERROR_HTTP1_CLOSE_CONNECTION); |
717 | 0 | return; |
718 | 0 | } |
719 | 0 | if (h2o_req_should_forward_expect(&conn->req)) { |
720 | | /* in forward mode, expect header is treated like other normal headers */ |
721 | 0 | char orig_case_cstr[sizeof("expect")] = {0}; |
722 | 0 | assert(sizeof(orig_case_cstr) - 1 == headers[expect_header_index].name_len); |
723 | 0 | h2o_memcpy(orig_case_cstr, headers[expect_header_index].name, sizeof(orig_case_cstr) - 1); |
724 | 0 | h2o_add_header(&conn->req.pool, &conn->req.headers, H2O_TOKEN_EXPECT, orig_case_cstr, |
725 | 0 | h2o_strdup(&conn->req.pool, expect_value.base, expect_value.len).base, expect_value.len); |
726 | 0 | h2o_buffer_consume(&conn->sock->input, reqlen); |
727 | 0 | goto ProcessImmediately; |
728 | 0 | } |
729 | | /* not in forward mode, send out own 100-continue */ |
730 | 0 | h2o_buffer_consume(&conn->sock->input, reqlen); |
731 | 0 | static const h2o_iovec_t res = {H2O_STRLIT("HTTP/1.1 100 Continue\r\n\r\n")}; |
732 | 0 | h2o_socket_write(conn->sock, (void *)&res, 1, on_continue_sent); |
733 | | /* processing of the incoming entity is postponed until the 100 response is sent */ |
734 | 0 | h2o_socket_read_stop(conn->sock); |
735 | 0 | } else { |
736 | 0 | h2o_buffer_consume(&conn->sock->input, reqlen); |
737 | | /* Invocation of `h2o_process_request` is delayed to reduce backend concurrency */ |
738 | 0 | conn->_req_entity_reader->handle_incoming_entity(conn); |
739 | 0 | } |
740 | 0 | return; |
741 | 0 | } |
742 | | |
743 | | /* handle tunnel request */ |
744 | 0 | if (conn->req.is_tunnel_req) { |
745 | | /* Is a CONNECT request or an upgrade (e.g., WebSocket). Request is submitted immediately and body is streamed. */ |
746 | 0 | if (!h2o_req_can_stream_request(&conn->req) && |
747 | 0 | h2o_memis(conn->req.input.method.base, conn->req.input.method.len, H2O_STRLIT("CONNECT"))) { |
748 | 0 | h2o_send_error_405(&conn->req, "Method Not Allowed", "Method Not Allowed", 0); |
749 | 0 | return; |
750 | 0 | } |
751 | 0 | if (create_content_length_entity_reader(conn, SIZE_MAX) != 0) |
752 | 0 | return; |
753 | 0 | conn->_unconsumed_request_size = 0; |
754 | 0 | h2o_buffer_consume(&conn->sock->input, reqlen); |
755 | 0 | h2o_buffer_init(&conn->req_body, &h2o_socket_buffer_prototype); |
756 | 0 | goto ProcessImmediately; |
757 | 0 | } |
758 | | |
759 | | /* handle ordinary request without request body */ |
760 | 0 | clear_timeouts(conn); |
761 | 0 | h2o_socket_read_stop(conn->sock); |
762 | 0 | h2o_process_request(&conn->req); |
763 | 0 | return; |
764 | | |
765 | 0 | ProcessImmediately: |
766 | 0 | conn->req.write_req.cb = write_req_connect_first; |
767 | 0 | conn->req.write_req.ctx = &conn->req; |
768 | 0 | conn->req.proceed_req = proceed_request; |
769 | 0 | conn->_req_entity_reader->handle_incoming_entity(conn); /* read payload received early before submitting the request */ |
770 | 0 | if (conn->req.entity.base == NULL) |
771 | 0 | conn->req.entity = h2o_iovec_init("", 0); /* if nothing was read, still indicate that body exists */ |
772 | | /* stop reading (this might or might not be done by `handle_incoming_entity`) until HTTP response is given */ |
773 | 0 | h2o_socket_read_stop(conn->sock); |
774 | 0 | clear_timeouts(conn); |
775 | 0 | h2o_process_request(&conn->req); |
776 | 0 | return; |
777 | 0 | } |
778 | | |
779 | | void reqread_on_read(h2o_socket_t *sock, const char *err) |
780 | 0 | { |
781 | 0 | struct st_h2o_http1_conn_t *conn = sock->data; |
782 | |
|
783 | 0 | if (err != NULL) { |
784 | 0 | close_connection(conn, 1); |
785 | 0 | return; |
786 | 0 | } |
787 | | |
788 | 0 | set_req_io_timeout(conn, conn->super.ctx->globalconf->http1.req_io_timeout, req_io_on_timeout); |
789 | 0 | if (conn->_req_entity_reader == NULL) |
790 | 0 | handle_incoming_request(conn); |
791 | 0 | else |
792 | 0 | conn->_req_entity_reader->handle_incoming_entity(conn); |
793 | 0 | } |
794 | | |
795 | | static void close_idle_connection(h2o_conn_t *_conn) |
796 | 0 | { |
797 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
798 | 0 | conn->req.http1_is_persistent = 0; |
799 | 0 | close_connection(conn, 1); |
800 | 0 | } |
801 | | |
802 | | static void on_timeout(struct st_h2o_http1_conn_t *conn) |
803 | 0 | { |
804 | 0 | if (conn->_req_index == 1) { |
805 | | /* assign hostconf and bind conf so that the request can be logged */ |
806 | 0 | h2o_hostconf_t *hostconf = h2o_req_setup(&conn->req); |
807 | 0 | h2o_req_bind_conf(&conn->req, hostconf, &hostconf->fallback_path); |
808 | | /* set error status for logging */ |
809 | 0 | conn->req.res.reason = "Request Timeout"; |
810 | 0 | } |
811 | |
|
812 | 0 | close_idle_connection(&conn->super); |
813 | 0 | } |
814 | | |
815 | | static void req_io_on_timeout(h2o_timer_t *entry) |
816 | 0 | { |
817 | 0 | struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, _io_timeout_entry, entry); |
818 | 0 | conn->super.ctx->http1.events.request_io_timeouts++; |
819 | 0 | on_timeout(conn); |
820 | 0 | } |
821 | | |
822 | | static void reqread_on_timeout(h2o_timer_t *entry) |
823 | 0 | { |
824 | 0 | struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, _timeout_entry, entry); |
825 | 0 | conn->super.ctx->http1.events.request_timeouts++; |
826 | 0 | on_timeout(conn); |
827 | 0 | } |
828 | | |
829 | | static inline void reqread_start(struct st_h2o_http1_conn_t *conn) |
830 | 0 | { |
831 | 0 | set_req_timeout(conn, conn->super.ctx->globalconf->http1.req_timeout, reqread_on_timeout); |
832 | 0 | set_req_io_timeout(conn, conn->super.ctx->globalconf->http1.req_io_timeout, req_io_on_timeout); |
833 | 0 | h2o_socket_read_start(conn->sock, reqread_on_read); |
834 | 0 | if (conn->sock->input->size != 0) |
835 | 0 | handle_incoming_request(conn); |
836 | 0 | } |
837 | | |
838 | | static void on_send_next(h2o_socket_t *sock, const char *err) |
839 | 0 | { |
840 | 0 | struct st_h2o_http1_conn_t *conn = sock->data; |
841 | |
|
842 | 0 | if (err != NULL) |
843 | 0 | close_connection(conn, 1); |
844 | 0 | else |
845 | 0 | h2o_proceed_response(&conn->req); |
846 | 0 | } |
847 | | |
848 | | static void on_send_complete_post_trailers(h2o_socket_t *sock, const char *err) |
849 | 0 | { |
850 | 0 | struct st_h2o_http1_conn_t *conn = sock->data; |
851 | |
|
852 | 0 | if (err != NULL) |
853 | 0 | conn->req.http1_is_persistent = 0; |
854 | |
|
855 | 0 | conn->_ostr_final.state = OSTREAM_STATE_DONE; |
856 | 0 | if (conn->req.proceed_req == NULL) |
857 | 0 | cleanup_connection(conn); |
858 | 0 | } |
859 | | |
860 | | static void on_send_complete(h2o_socket_t *sock, const char *err) |
861 | 0 | { |
862 | 0 | struct st_h2o_http1_conn_t *conn = sock->data; |
863 | |
|
864 | 0 | if (err == NULL) { |
865 | 0 | if (conn->req._ostr_top != &conn->_ostr_final.super) { |
866 | 0 | err = "pull error"; |
867 | 0 | } else { |
868 | | /* success */ |
869 | 0 | conn->req.timestamps.response_end_at = h2o_gettimeofday(conn->super.ctx->loop); |
870 | 0 | } |
871 | 0 | } |
872 | |
|
873 | 0 | if (err != NULL) |
874 | 0 | conn->req.http1_is_persistent = 0; |
875 | |
|
876 | 0 | if (err == NULL && conn->req.send_server_timing && conn->_ostr_final.chunked_buf != NULL) { |
877 | 0 | h2o_iovec_t trailer; |
878 | 0 | if ((trailer = h2o_build_server_timing_trailer(&conn->req, H2O_STRLIT("server-timing: "), H2O_STRLIT("\r\n\r\n"))).len != |
879 | 0 | 0) { |
880 | 0 | h2o_socket_write(conn->sock, &trailer, 1, on_send_complete_post_trailers); |
881 | 0 | return; |
882 | 0 | } |
883 | 0 | } |
884 | | |
885 | 0 | conn->_ostr_final.state = OSTREAM_STATE_DONE; |
886 | |
|
887 | 0 | if (conn->req.is_tunnel_req) { |
888 | | /* We have received a complete request (the end of the request is the request headers, see `fixup_request`), and the |
889 | | * connection is not going to handle any more requests. Therefore, we can close the connection immediately, regardless of if |
890 | | * the connection had been turned into a tunnel. */ |
891 | 0 | assert(!conn->req.http1_is_persistent); |
892 | 0 | cleanup_connection(conn); |
893 | 0 | } else if (conn->req.proceed_req == NULL) { |
894 | | /* Upstream has sent an early response. Continue forwarding the request body. */ |
895 | 0 | cleanup_connection(conn); |
896 | 0 | } |
897 | 0 | } |
898 | | |
899 | | static void on_upgrade_complete(h2o_socket_t *socket, const char *err) |
900 | 0 | { |
901 | 0 | struct st_h2o_http1_conn_t *conn = socket->data; |
902 | 0 | h2o_http1_upgrade_cb cb = conn->upgrade.cb; |
903 | 0 | void *data = conn->upgrade.data; |
904 | 0 | h2o_socket_t *sock = NULL; |
905 | 0 | size_t headers_size = 0; |
906 | | |
907 | | /* destruct the connection (after detaching the socket) */ |
908 | 0 | if (err == 0) { |
909 | 0 | sock = conn->sock; |
910 | 0 | headers_size = conn->_unconsumed_request_size; |
911 | 0 | close_connection(conn, 0); |
912 | 0 | } else { |
913 | 0 | close_connection(conn, 1); |
914 | 0 | } |
915 | |
|
916 | 0 | cb(data, sock, headers_size); |
917 | 0 | } |
918 | | |
919 | | static size_t flatten_headers_estimate_size(h2o_req_t *req, size_t server_name_and_connection_len) |
920 | 0 | { |
921 | 0 | size_t len = sizeof("HTTP/1.1 \r\nserver: \r\nconnection: \r\ncontent-length: \r\n\r\n") + 3 + strlen(req->res.reason) + |
922 | 0 | server_name_and_connection_len + sizeof(H2O_UINT64_LONGEST_STR) - 1 + sizeof("cache-control: private") - 1; |
923 | 0 | const h2o_header_t *header, *end; |
924 | |
|
925 | 0 | for (header = req->res.headers.entries, end = header + req->res.headers.size; header != end; ++header) |
926 | 0 | len += header->name->len + header->value.len + 4; |
927 | |
|
928 | 0 | return len; |
929 | 0 | } |
930 | | |
931 | | static size_t flatten_res_headers(char *buf, h2o_req_t *req) |
932 | 0 | { |
933 | 0 | char *dst = buf; |
934 | 0 | size_t i; |
935 | 0 | for (i = 0; i != req->res.headers.size; ++i) { |
936 | 0 | const h2o_header_t *header = req->res.headers.entries + i; |
937 | 0 | memcpy(dst, header->orig_name ? header->orig_name : header->name->base, header->name->len); |
938 | 0 | dst += header->name->len; |
939 | 0 | *dst++ = ':'; |
940 | 0 | *dst++ = ' '; |
941 | 0 | memcpy(dst, header->value.base, header->value.len); |
942 | 0 | dst += header->value.len; |
943 | 0 | *dst++ = '\r'; |
944 | 0 | *dst++ = '\n'; |
945 | 0 | } |
946 | |
|
947 | 0 | return dst - buf; |
948 | 0 | } |
949 | | |
950 | | static size_t flatten_headers(char *buf, h2o_req_t *req, const char *connection) |
951 | 0 | { |
952 | 0 | h2o_context_t *ctx = req->conn->ctx; |
953 | 0 | char *dst = buf; |
954 | |
|
955 | 0 | assert(req->res.status <= 999); |
956 | | |
957 | | /* send essential headers with the first chars uppercased for max. interoperability (#72) */ |
958 | 0 | if (req->res.content_length != SIZE_MAX) { |
959 | 0 | dst += sprintf(dst, "HTTP/1.1 %d %s\r\nConnection: %s\r\nContent-Length: %zu\r\n", req->res.status, req->res.reason, |
960 | 0 | connection, req->res.content_length); |
961 | 0 | } else { |
962 | 0 | dst += sprintf(dst, "HTTP/1.1 %d %s\r\nConnection: %s\r\n", req->res.status, req->res.reason, connection); |
963 | 0 | } |
964 | 0 | if (ctx->globalconf->server_name.len) { |
965 | 0 | dst += sprintf(dst, "Server: %s\r\n", ctx->globalconf->server_name.base); |
966 | 0 | } |
967 | |
|
968 | 0 | dst += flatten_res_headers(dst, req); |
969 | 0 | *dst++ = '\r'; |
970 | 0 | *dst++ = '\n'; |
971 | |
|
972 | 0 | return dst - buf; |
973 | 0 | } |
974 | | |
975 | | static int should_use_chunked_encoding(h2o_req_t *req) |
976 | 0 | { |
977 | 0 | if (req->is_tunnel_req) |
978 | 0 | return 0; |
979 | 0 | if (req->version != 0x101) |
980 | 0 | return 0; |
981 | | /* do nothing if content-length is known */ |
982 | 0 | if (req->res.content_length != SIZE_MAX) |
983 | 0 | return 0; |
984 | | /* RFC 2616 4.4 states that the following status codes (and response to a HEAD method) should not include message body */ |
985 | 0 | if ((100 <= req->res.status && req->res.status <= 199) || req->res.status == 204 || req->res.status == 304) |
986 | 0 | return 0; |
987 | 0 | if (h2o_memis(req->input.method.base, req->input.method.len, H2O_STRLIT("HEAD"))) |
988 | 0 | return 0; |
989 | | |
990 | 0 | return 1; |
991 | 0 | } |
992 | | |
993 | | static void setup_chunked(struct st_h2o_http1_finalostream_t *self, h2o_req_t *req) |
994 | 0 | { |
995 | 0 | if (should_use_chunked_encoding(req)) { |
996 | 0 | h2o_add_header(&req->pool, &req->res.headers, H2O_TOKEN_TRANSFER_ENCODING, NULL, H2O_STRLIT("chunked")); |
997 | 0 | self->chunked_buf = h2o_mem_alloc_pool_aligned(&req->pool, 1, sizeof(size_t) * 2 + sizeof("\r\n")); |
998 | 0 | } |
999 | 0 | } |
1000 | | |
1001 | | static void encode_chunked(h2o_sendvec_t *prefix, h2o_sendvec_t *suffix, h2o_send_state_t state, size_t chunk_size, |
1002 | | int send_trailers, char *buffer) |
1003 | 0 | { |
1004 | 0 | h2o_sendvec_init_raw(prefix, NULL, 0); |
1005 | 0 | h2o_sendvec_init_raw(suffix, NULL, 0); |
1006 | | |
1007 | | /* create chunk header and output data */ |
1008 | 0 | if (chunk_size != 0) { |
1009 | 0 | prefix->raw = buffer; |
1010 | 0 | prefix->len = sprintf(buffer, "%zx\r\n", chunk_size); |
1011 | 0 | if (state != H2O_SEND_STATE_ERROR) { |
1012 | 0 | suffix->raw = "\r\n0\r\n\r\n"; |
1013 | 0 | suffix->len = state == H2O_SEND_STATE_FINAL ? (send_trailers ? 5 : 7) : 2; |
1014 | 0 | } |
1015 | 0 | } else if (state == H2O_SEND_STATE_FINAL) { |
1016 | 0 | suffix->raw = "0\r\n\r\n"; |
1017 | 0 | suffix->len = send_trailers ? 3 : 5; |
1018 | 0 | } |
1019 | | |
1020 | | /* if state is error, send a broken chunk to pass the error down to the browser */ |
1021 | 0 | if (state == H2O_SEND_STATE_ERROR) { |
1022 | 0 | suffix->raw = "\r\n1\r\n"; |
1023 | 0 | suffix->len = 5; |
1024 | 0 | } |
1025 | 0 | } |
1026 | | |
1027 | | void finalostream_send(h2o_ostream_t *_self, h2o_req_t *_req, h2o_sendvec_t *inbufs, size_t inbufcnt, h2o_send_state_t send_state) |
1028 | 0 | { |
1029 | 0 | struct st_h2o_http1_conn_t *conn = (struct st_h2o_http1_conn_t *)_req->conn; |
1030 | 0 | h2o_sendvec_t bufs[inbufcnt + 1 + 2]; /* 1 for header, 2 for chunked encoding */ |
1031 | 0 | size_t bufcnt = 0, chunked_prefix_index = 0; |
1032 | 0 | int empty_payload_allowed = conn->_ostr_final.state == OSTREAM_STATE_HEAD || send_state != H2O_SEND_STATE_IN_PROGRESS; |
1033 | |
|
1034 | 0 | assert(&conn->req == _req); |
1035 | 0 | assert(_self == &conn->_ostr_final.super); |
1036 | | |
1037 | 0 | if (conn->_ostr_final.informational.write_inflight) { |
1038 | 0 | conn->_ostr_final.informational.pending_final.inbufs = h2o_mem_alloc_pool(&conn->req.pool, h2o_sendvec_t, inbufcnt); |
1039 | 0 | memcpy(conn->_ostr_final.informational.pending_final.inbufs, inbufs, sizeof(*inbufs) * inbufcnt); |
1040 | 0 | conn->_ostr_final.informational.pending_final.inbufcnt = inbufcnt; |
1041 | 0 | conn->_ostr_final.informational.pending_final.send_state = send_state; |
1042 | 0 | return; |
1043 | 0 | } |
1044 | | |
1045 | 0 | if (send_state == H2O_SEND_STATE_ERROR) { |
1046 | 0 | conn->req.http1_is_persistent = 0; |
1047 | 0 | conn->req.send_server_timing = 0; |
1048 | 0 | if (conn->req.upstream_refused) { |
1049 | | /* to let the client retry, immediately close the connection without sending any data */ |
1050 | 0 | on_send_complete(conn->sock, NULL); |
1051 | 0 | return; |
1052 | 0 | } |
1053 | 0 | } |
1054 | | |
1055 | 0 | if (conn->_ostr_final.state == OSTREAM_STATE_HEAD) { |
1056 | | /* build headers and send */ |
1057 | 0 | conn->req.timestamps.response_start_at = h2o_gettimeofday(conn->super.ctx->loop); |
1058 | 0 | setup_chunked(&conn->_ostr_final, &conn->req); |
1059 | 0 | if (conn->req.send_server_timing) |
1060 | 0 | h2o_add_server_timing_header(&conn->req, conn->_ostr_final.chunked_buf != NULL); |
1061 | |
|
1062 | 0 | const char *connection = conn->req.http1_is_persistent ? "keep-alive" : "close"; |
1063 | 0 | if (conn->req.is_tunnel_req && conn->req.res.status == 101 && conn->req.upgrade.base) |
1064 | 0 | connection = "upgrade"; |
1065 | 0 | size_t headers_est_size = |
1066 | 0 | flatten_headers_estimate_size(&conn->req, conn->super.ctx->globalconf->server_name.len + strlen(connection)); |
1067 | 0 | h2o_sendvec_init_raw(bufs + bufcnt, h2o_mem_alloc_pool(&conn->req.pool, char, headers_est_size), 0); |
1068 | 0 | bufs[bufcnt].len = flatten_headers(bufs[bufcnt].raw, &conn->req, connection); |
1069 | 0 | conn->req.header_bytes_sent += bufs[bufcnt].len; |
1070 | 0 | ++bufcnt; |
1071 | 0 | h2o_probe_log_response(&conn->req, conn->_req_index); |
1072 | 0 | conn->_ostr_final.state = OSTREAM_STATE_BODY; |
1073 | 0 | } |
1074 | |
|
1075 | 0 | if (conn->_ostr_final.chunked_buf != NULL) |
1076 | 0 | chunked_prefix_index = bufcnt++; |
1077 | |
|
1078 | 0 | size_t bytes_sent = 0; |
1079 | 0 | for (size_t i = 0; i != inbufcnt; ++i) { |
1080 | 0 | if (inbufs[i].len == 0) |
1081 | 0 | continue; |
1082 | 0 | bufs[bufcnt++] = inbufs[i]; |
1083 | 0 | bytes_sent += inbufs[i].len; |
1084 | 0 | } |
1085 | 0 | assert(empty_payload_allowed || bytes_sent != 0 || !"h2o_data must only be called when there is progress"); |
1086 | 0 | conn->req.bytes_sent += bytes_sent; |
1087 | |
|
1088 | 0 | if (conn->_ostr_final.chunked_buf != NULL) { |
1089 | 0 | encode_chunked(bufs + chunked_prefix_index, bufs + bufcnt, send_state, bytes_sent, conn->req.send_server_timing != 0, |
1090 | 0 | conn->_ostr_final.chunked_buf); |
1091 | 0 | if (bufs[bufcnt].len != 0) |
1092 | 0 | ++bufcnt; |
1093 | 0 | } |
1094 | |
|
1095 | 0 | if (bufcnt != 0) |
1096 | 0 | set_req_io_timeout(conn, conn->super.ctx->globalconf->http1.req_io_timeout, req_io_on_timeout); |
1097 | |
|
1098 | 0 | h2o_socket_sendvec(conn->sock, bufs, bufcnt, h2o_send_state_is_in_progress(send_state) ? on_send_next : on_send_complete); |
1099 | 0 | } |
1100 | | |
1101 | | static void on_send_informational_complete(h2o_socket_t *sock, const char *err); |
1102 | | |
1103 | | static void do_send_informational(struct st_h2o_http1_conn_t *conn) |
1104 | 0 | { |
1105 | 0 | assert(!conn->_ostr_final.informational.write_inflight && conn->_ostr_final.informational.pending.size != 0); |
1106 | | |
1107 | 0 | conn->_ostr_final.informational.write_inflight = 1; |
1108 | 0 | h2o_socket_write(conn->sock, conn->_ostr_final.informational.pending.entries, conn->_ostr_final.informational.pending.size, |
1109 | 0 | on_send_informational_complete); |
1110 | 0 | conn->_ostr_final.informational.pending.size = 0; |
1111 | 0 | } |
1112 | | |
1113 | | static void on_send_informational_complete(h2o_socket_t *sock, const char *err) |
1114 | 0 | { |
1115 | 0 | struct st_h2o_http1_conn_t *conn = sock->data; |
1116 | 0 | if (err != NULL) { |
1117 | 0 | close_connection(conn, 1); |
1118 | 0 | return; |
1119 | 0 | } |
1120 | | |
1121 | 0 | conn->_ostr_final.informational.write_inflight = 0; |
1122 | |
|
1123 | 0 | if (conn->_ostr_final.informational.pending_final.inbufs != NULL) { |
1124 | 0 | finalostream_send(&conn->_ostr_final.super, &conn->req, conn->_ostr_final.informational.pending_final.inbufs, |
1125 | 0 | conn->_ostr_final.informational.pending_final.inbufcnt, |
1126 | 0 | conn->_ostr_final.informational.pending_final.send_state); |
1127 | 0 | return; |
1128 | 0 | } |
1129 | | |
1130 | 0 | if (conn->_ostr_final.informational.pending.size != 0) |
1131 | 0 | do_send_informational(conn); |
1132 | 0 | } |
1133 | | |
1134 | | static void finalostream_send_informational(h2o_ostream_t *_self, h2o_req_t *req) |
1135 | 0 | { |
1136 | 0 | struct st_h2o_http1_conn_t *conn = (struct st_h2o_http1_conn_t *)req->conn; |
1137 | 0 | assert(_self == &conn->_ostr_final.super); |
1138 | | |
1139 | 0 | size_t len = sizeof("HTTP/1.1 \r\n\r\n") + 3 + strlen(req->res.reason) - 1; |
1140 | 0 | h2o_iovec_t buf = h2o_iovec_init(NULL, len); |
1141 | |
|
1142 | 0 | int i; |
1143 | 0 | for (i = 0; i != req->res.headers.size; ++i) |
1144 | 0 | buf.len += req->res.headers.entries[i].name->len + req->res.headers.entries[i].value.len + 4; |
1145 | |
|
1146 | 0 | buf.base = h2o_mem_alloc_pool(&req->pool, char, buf.len); |
1147 | 0 | char *dst = buf.base; |
1148 | 0 | dst += sprintf(dst, "HTTP/1.1 %d %s\r\n", req->res.status, req->res.reason); |
1149 | 0 | dst += flatten_res_headers(dst, req); |
1150 | 0 | *dst++ = '\r'; |
1151 | 0 | *dst++ = '\n'; |
1152 | |
|
1153 | 0 | req->header_bytes_sent += dst - buf.base; |
1154 | |
|
1155 | 0 | h2o_vector_reserve(&req->pool, &conn->_ostr_final.informational.pending, conn->_ostr_final.informational.pending.size + 1); |
1156 | 0 | conn->_ostr_final.informational.pending.entries[conn->_ostr_final.informational.pending.size++] = buf; |
1157 | |
|
1158 | 0 | if (!conn->_ostr_final.informational.write_inflight) |
1159 | 0 | do_send_informational(conn); |
1160 | 0 | } |
1161 | | |
1162 | | static socklen_t get_sockname(h2o_conn_t *_conn, struct sockaddr *sa) |
1163 | 0 | { |
1164 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
1165 | 0 | return h2o_socket_getsockname(conn->sock, sa); |
1166 | 0 | } |
1167 | | |
1168 | | static socklen_t get_peername(h2o_conn_t *_conn, struct sockaddr *sa) |
1169 | 0 | { |
1170 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
1171 | 0 | return h2o_socket_getpeername(conn->sock, sa); |
1172 | 0 | } |
1173 | | |
1174 | | static ptls_t *get_ptls(h2o_conn_t *_conn) |
1175 | 0 | { |
1176 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
1177 | 0 | assert(conn->sock != NULL && "it never becomes NULL, right?"); |
1178 | 0 | return h2o_socket_get_ptls(conn->sock); |
1179 | 0 | } |
1180 | | |
1181 | | static const char *get_ssl_server_name(h2o_conn_t *_conn) |
1182 | 0 | { |
1183 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
1184 | 0 | return h2o_socket_get_ssl_server_name(conn->sock); |
1185 | 0 | } |
1186 | | |
1187 | | static ptls_log_conn_state_t *log_state(h2o_conn_t *_conn) |
1188 | 0 | { |
1189 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
1190 | 0 | return h2o_socket_log_state(conn->sock); |
1191 | 0 | } |
1192 | | |
1193 | | static int can_zerocopy(h2o_conn_t *_conn) |
1194 | 0 | { |
1195 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
1196 | 0 | return conn->sock->ssl == NULL || h2o_socket_can_tls_offload(conn->sock); |
1197 | 0 | } |
1198 | | |
1199 | | static uint64_t get_req_id(h2o_req_t *req) |
1200 | 0 | { |
1201 | 0 | struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, req); |
1202 | 0 | return conn->_req_index; |
1203 | 0 | } |
1204 | | |
1205 | | static h2o_socket_t *steal_socket(h2o_conn_t *_conn) |
1206 | 0 | { |
1207 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
1208 | 0 | h2o_socket_t *sock = conn->sock; |
1209 | |
|
1210 | 0 | if (sock->ssl != NULL) |
1211 | 0 | return NULL; |
1212 | | |
1213 | 0 | close_connection(conn, 0); |
1214 | 0 | return sock; |
1215 | 0 | } |
1216 | | |
1217 | | #define DEFINE_LOGGER(name) \ |
1218 | | static h2o_iovec_t log_##name(h2o_req_t *req) \ |
1219 | 0 | { \ |
1220 | 0 | struct st_h2o_http1_conn_t *conn = (void *)req->conn; \ |
1221 | 0 | return h2o_socket_log_##name(conn->sock, &req->pool); \ |
1222 | 0 | } Unexecuted instantiation: http1.c:log_tcp_congestion_controller Unexecuted instantiation: http1.c:log_tcp_delivery_rate Unexecuted instantiation: http1.c:log_ssl_protocol_version Unexecuted instantiation: http1.c:log_ssl_session_reused Unexecuted instantiation: http1.c:log_ssl_cipher Unexecuted instantiation: http1.c:log_ssl_cipher_bits Unexecuted instantiation: http1.c:log_ssl_session_id Unexecuted instantiation: http1.c:log_ssl_negotiated_protocol Unexecuted instantiation: http1.c:log_ssl_ech_config_id Unexecuted instantiation: http1.c:log_ssl_ech_kem Unexecuted instantiation: http1.c:log_ssl_ech_cipher Unexecuted instantiation: http1.c:log_ssl_ech_cipher_bits Unexecuted instantiation: http1.c:log_ssl_backend |
1223 | | |
1224 | | DEFINE_LOGGER(tcp_congestion_controller) |
1225 | | DEFINE_LOGGER(tcp_delivery_rate) |
1226 | | DEFINE_LOGGER(ssl_protocol_version) |
1227 | | DEFINE_LOGGER(ssl_session_reused) |
1228 | | DEFINE_LOGGER(ssl_cipher) |
1229 | | DEFINE_LOGGER(ssl_cipher_bits) |
1230 | | DEFINE_LOGGER(ssl_session_id) |
1231 | | DEFINE_LOGGER(ssl_negotiated_protocol) |
1232 | | DEFINE_LOGGER(ssl_ech_config_id) |
1233 | | DEFINE_LOGGER(ssl_ech_kem) |
1234 | | DEFINE_LOGGER(ssl_ech_cipher) |
1235 | | DEFINE_LOGGER(ssl_ech_cipher_bits) |
1236 | | DEFINE_LOGGER(ssl_backend) |
1237 | | |
1238 | | #undef DEFINE_LOGGER |
1239 | | |
1240 | | static h2o_iovec_t log_request_index(h2o_req_t *req) |
1241 | 0 | { |
1242 | 0 | struct st_h2o_http1_conn_t *conn = (void *)req->conn; |
1243 | 0 | char *s = h2o_mem_alloc_pool(&req->pool, char, sizeof(H2O_UINT64_LONGEST_STR)); |
1244 | 0 | size_t len = sprintf(s, "%" PRIu64, conn->_req_index); |
1245 | 0 | return h2o_iovec_init(s, len); |
1246 | 0 | } |
1247 | | |
1248 | | static int foreach_request(h2o_conn_t *_conn, int (*cb)(h2o_req_t *req, void *cbdata), void *cbdata) |
1249 | 0 | { |
1250 | 0 | struct st_h2o_http1_conn_t *conn = (void *)_conn; |
1251 | 0 | return cb(&conn->req, cbdata); |
1252 | 0 | } |
1253 | | |
1254 | | static void initiate_graceful_shutdown(h2o_conn_t *_conn) |
1255 | 0 | { |
1256 | | /* note: nothing special needs to be done for handling graceful shutdown */ |
1257 | 0 | } |
1258 | | |
1259 | | static const h2o_conn_callbacks_t h1_callbacks = { |
1260 | | .get_sockname = get_sockname, |
1261 | | .get_peername = get_peername, |
1262 | | .get_ptls = get_ptls, |
1263 | | .get_ssl_server_name = get_ssl_server_name, |
1264 | | .log_state = log_state, |
1265 | | .close_idle_connection = close_idle_connection, |
1266 | | .foreach_request = foreach_request, |
1267 | | .request_shutdown = initiate_graceful_shutdown, |
1268 | | .can_zerocopy = can_zerocopy, |
1269 | | .get_req_id = get_req_id, |
1270 | | .steal_socket = steal_socket, |
1271 | | .log_ = {{ |
1272 | | .transport = |
1273 | | { |
1274 | | .cc_name = log_tcp_congestion_controller, |
1275 | | .delivery_rate = log_tcp_delivery_rate, |
1276 | | }, |
1277 | | .ssl = |
1278 | | { |
1279 | | .protocol_version = log_ssl_protocol_version, |
1280 | | .session_reused = log_ssl_session_reused, |
1281 | | .cipher = log_ssl_cipher, |
1282 | | .cipher_bits = log_ssl_cipher_bits, |
1283 | | .session_id = log_ssl_session_id, |
1284 | | .negotiated_protocol = log_ssl_negotiated_protocol, |
1285 | | .ech_config_id = log_ssl_ech_config_id, |
1286 | | .ech_kem = log_ssl_ech_kem, |
1287 | | .ech_cipher = log_ssl_ech_cipher, |
1288 | | .ech_cipher_bits = log_ssl_ech_cipher_bits, |
1289 | | .backend = log_ssl_backend, |
1290 | | }, |
1291 | | .http1 = |
1292 | | { |
1293 | | .request_index = log_request_index, |
1294 | | }, |
1295 | | }}, |
1296 | | }; |
1297 | | |
1298 | | static int conn_is_h1(h2o_conn_t *conn) |
1299 | 0 | { |
1300 | 0 | return conn->callbacks == &h1_callbacks; |
1301 | 0 | } |
1302 | | |
1303 | | void h2o_http1_accept(h2o_accept_ctx_t *ctx, h2o_socket_t *sock, struct timeval connected_at) |
1304 | 0 | { |
1305 | 0 | struct st_h2o_http1_conn_t *conn = |
1306 | 0 | (void *)h2o_create_connection(sizeof(*conn), ctx->ctx, ctx->hosts, connected_at, &h1_callbacks); |
1307 | | |
1308 | | /* zero-fill all properties expect req */ |
1309 | 0 | memset((char *)conn + sizeof(conn->super), 0, offsetof(struct st_h2o_http1_conn_t, req) - sizeof(conn->super)); |
1310 | | |
1311 | | /* init properties that need to be non-zero */ |
1312 | 0 | conn->sock = sock; |
1313 | 0 | sock->data = conn; |
1314 | |
|
1315 | 0 | H2O_PROBE_CONN(H1_ACCEPT, &conn->super, conn->sock, &conn->super, h2o_conn_get_uuid(&conn->super)); |
1316 | 0 | H2O_LOG_CONN(h1_accept, &conn->super, { |
1317 | 0 | PTLS_LOG_ELEMENT_PTR(sock, conn->sock); |
1318 | 0 | PTLS_LOG_ELEMENT_SAFESTR(uuid, h2o_conn_get_uuid(&conn->super)); |
1319 | 0 | }); |
1320 | | |
1321 | 0 | init_request(conn); |
1322 | 0 | reqread_start(conn); |
1323 | 0 | } |
1324 | | |
1325 | | void h2o_http1_upgrade(h2o_req_t *req, h2o_iovec_t *inbufs, size_t inbufcnt, h2o_http1_upgrade_cb on_complete, void *user_data) |
1326 | 0 | { |
1327 | |
|
1328 | 0 | assert(conn_is_h1(req->conn)); |
1329 | 0 | struct st_h2o_http1_conn_t *conn = (void *)req->conn; |
1330 | |
|
1331 | 0 | h2o_iovec_t *bufs = alloca(sizeof(h2o_iovec_t) * (inbufcnt + 1)); |
1332 | |
|
1333 | 0 | conn->upgrade.data = user_data; |
1334 | 0 | conn->upgrade.cb = on_complete; |
1335 | |
|
1336 | 0 | bufs[0].base = h2o_mem_alloc_pool( |
1337 | 0 | &conn->req.pool, char, |
1338 | 0 | flatten_headers_estimate_size(&conn->req, conn->super.ctx->globalconf->server_name.len + sizeof("upgrade") - 1)); |
1339 | 0 | bufs[0].len = flatten_headers(bufs[0].base, &conn->req, conn->req.res.status == 101 ? "upgrade" : "close"); |
1340 | 0 | h2o_memcpy(bufs + 1, inbufs, sizeof(h2o_iovec_t) * inbufcnt); |
1341 | |
|
1342 | 0 | h2o_socket_write(conn->sock, bufs, inbufcnt + 1, on_upgrade_complete); |
1343 | 0 | } |