Coverage Report

Created: 2026-04-28 06:18

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/h2o/lib/http1.c
Line
Count
Source
1
/*
2
 * Copyright (c) 2014-2016 DeNA Co., Ltd., Kazuho Oku, Shota Fukumori,
3
 *                         Fastly, Inc.
4
 *
5
 * Permission is hereby granted, free of charge, to any person obtaining a copy
6
 * of this software and associated documentation files (the "Software"), to
7
 * deal in the Software without restriction, including without limitation the
8
 * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
9
 * sell copies of the Software, and to permit persons to whom the Software is
10
 * furnished to do so, subject to the following conditions:
11
 *
12
 * The above copyright notice and this permission notice shall be included in
13
 * all copies or substantial portions of the Software.
14
 *
15
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
20
 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
21
 * IN THE SOFTWARE.
22
 */
23
#include <inttypes.h>
24
#include <stddef.h>
25
#include <stdio.h>
26
#include <stdlib.h>
27
#include "picohttpparser.h"
28
#include "h2o.h"
29
#include "h2o/http1.h"
30
#include "h2o/http2.h"
31
#include "./probes_.h"
32
33
enum enum_h2o_http1_ostream_state {
34
    OSTREAM_STATE_HEAD,
35
    OSTREAM_STATE_BODY,
36
    OSTREAM_STATE_DONE,
37
};
38
39
struct st_h2o_http1_finalostream_t {
40
    h2o_ostream_t super;
41
    enum enum_h2o_http1_ostream_state state;
42
    char *chunked_buf; /* buffer used for chunked-encoding (NULL unless chunked encoding is used) */
43
    struct {
44
        /**
45
         * if `h2o_socket_write` is currently writing an informational response
46
         */
47
        unsigned write_inflight : 1;
48
        /**
49
         * buffer used to store informational responses to be sent, when write of an informational response is inflight
50
         */
51
        h2o_iovec_vector_t pending;
52
        /**
53
         * buffer used to delay the execution of `finalostream_send`, when write of an informational respnose is inflight;
54
         * availability is indicated by `inbufs != NULL`
55
         */
56
        struct {
57
            h2o_sendvec_t *inbufs;
58
            size_t inbufcnt;
59
            h2o_send_state_t send_state;
60
        } pending_final;
61
    } informational;
62
};
63
64
struct st_h2o_http1_conn_t {
65
    h2o_conn_t super;
66
    h2o_socket_t *sock;
67
    h2o_timer_t _timeout_entry;
68
    h2o_timer_t _io_timeout_entry;
69
    uint64_t _req_index;
70
    size_t _prevreqlen;
71
    size_t _unconsumed_request_size;
72
    struct st_h2o_http1_req_entity_reader *_req_entity_reader;
73
    struct st_h2o_http1_finalostream_t _ostr_final;
74
    struct {
75
        void *data;
76
        h2o_http1_upgrade_cb cb;
77
    } upgrade;
78
    /**
79
     * the request body buffer
80
     */
81
    h2o_buffer_t *req_body;
82
    /**
83
     * the HTTP request / response (intentionally placed at the last, since it is a large structure and has it's own ctor)
84
     */
85
    h2o_req_t req;
86
};
87
88
struct st_h2o_http1_req_entity_reader {
89
    void (*handle_incoming_entity)(struct st_h2o_http1_conn_t *conn);
90
};
91
92
struct st_h2o_http1_content_length_entity_reader {
93
    struct st_h2o_http1_req_entity_reader super;
94
    size_t content_length;
95
};
96
97
struct st_h2o_http1_chunked_entity_reader {
98
    struct st_h2o_http1_req_entity_reader super;
99
    struct phr_chunked_decoder decoder;
100
};
101
102
static void finalostream_send(h2o_ostream_t *_self, h2o_req_t *req, h2o_sendvec_t *inbufs, size_t inbufcnt, h2o_send_state_t state);
103
static void finalostream_send_informational(h2o_ostream_t *_self, h2o_req_t *req);
104
static void reqread_on_read(h2o_socket_t *sock, const char *err);
105
static void reqread_on_timeout(h2o_timer_t *entry);
106
static void req_io_on_timeout(h2o_timer_t *entry);
107
static void reqread_start(struct st_h2o_http1_conn_t *conn);
108
static int foreach_request(h2o_conn_t *_conn, int (*cb)(h2o_req_t *req, void *cbdata), void *cbdata);
109
110
static void init_request(struct st_h2o_http1_conn_t *conn)
111
15.9k
{
112
15.9k
    if (conn->_req_index != 0) {
113
6.55k
        if (conn->req_body != NULL)
114
994
            h2o_buffer_dispose(&conn->req_body);
115
6.55k
        h2o_dispose_request(&conn->req);
116
6.55k
        if (conn->_unconsumed_request_size)
117
5.55k
            h2o_buffer_consume(&conn->sock->input, conn->_unconsumed_request_size);
118
6.55k
    }
119
15.9k
    assert(conn->req_body == NULL);
120
15.9k
    h2o_init_request(&conn->req, &conn->super, NULL);
121
122
15.9k
    ++conn->_req_index;
123
15.9k
    conn->req._ostr_top = &conn->_ostr_final.super;
124
125
15.9k
    conn->_ostr_final = (struct st_h2o_http1_finalostream_t){{
126
15.9k
        NULL,              /* next */
127
15.9k
        finalostream_send, /* do_send */
128
15.9k
        NULL,              /* stop */
129
15.9k
        conn->super.ctx->globalconf->send_informational_mode == H2O_SEND_INFORMATIONAL_MODE_ALL ? finalostream_send_informational
130
15.9k
                                                                                                : NULL, /* send_informational */
131
15.9k
    }};
132
15.9k
}
133
134
static void close_connection(struct st_h2o_http1_conn_t *conn, int close_socket)
135
9.35k
{
136
9.35k
    if (conn->sock != NULL) {
137
5.30k
        H2O_PROBE_CONN0(H1_CLOSE, &conn->super);
138
5.30k
        H2O_LOG_CONN(h1_close, &conn->super, {});
139
5.30k
    }
140
9.35k
    h2o_timer_unlink(&conn->_timeout_entry);
141
9.35k
    h2o_timer_unlink(&conn->_io_timeout_entry);
142
9.35k
    if (conn->req_body != NULL)
143
638
        h2o_buffer_dispose(&conn->req_body);
144
9.35k
    h2o_dispose_request(&conn->req);
145
9.35k
    if (conn->sock != NULL && close_socket)
146
5.20k
        h2o_socket_close(conn->sock);
147
9.35k
    h2o_destroy_connection(&conn->super);
148
9.35k
}
149
150
static void cleanup_connection(struct st_h2o_http1_conn_t *conn)
151
9.28k
{
152
9.28k
    if (!conn->req.http1_is_persistent) {
153
        /* TODO use lingering close */
154
2.72k
        close_connection(conn, 1);
155
2.72k
        return;
156
2.72k
    }
157
158
9.28k
    assert(conn->req.proceed_req == NULL);
159
6.55k
    assert(conn->_req_entity_reader == NULL);
160
161
    /* handle next request */
162
6.55k
    init_request(conn);
163
6.55k
    conn->req.write_req.cb = NULL;
164
6.55k
    conn->req.write_req.ctx = NULL;
165
6.55k
    conn->req.proceed_req = NULL;
166
6.55k
    conn->_prevreqlen = 0;
167
6.55k
    conn->_unconsumed_request_size = 0;
168
169
6.55k
    if (conn->sock->input->size == 0)
170
1.89k
        h2o_conn_set_state(&conn->super, H2O_CONN_STATE_IDLE);
171
172
6.55k
    reqread_start(conn);
173
6.55k
}
174
175
/**
176
 * timer is activated if cb != NULL, disactivated otherwise
177
 */
178
static void set_req_timeout(struct st_h2o_http1_conn_t *conn, uint64_t timeout, h2o_timer_cb cb)
179
26.5k
{
180
26.5k
    if (conn->req.is_tunnel_req)
181
114
        cb = NULL;
182
26.5k
    if (conn->_timeout_entry.cb != NULL)
183
9.46k
        h2o_timer_unlink(&conn->_timeout_entry);
184
26.5k
    conn->_timeout_entry.cb = cb;
185
26.5k
    if (cb != NULL)
186
17.0k
        h2o_timer_link(conn->super.ctx->loop, timeout, &conn->_timeout_entry);
187
26.5k
}
188
189
static void set_req_io_timeout(struct st_h2o_http1_conn_t *conn, uint64_t timeout, h2o_timer_cb cb)
190
49.7k
{
191
49.7k
    if (conn->req.is_tunnel_req)
192
191
        cb = NULL;
193
49.7k
    if (conn->_io_timeout_entry.cb != NULL)
194
30.9k
        h2o_timer_unlink(&conn->_io_timeout_entry);
195
49.7k
    conn->_io_timeout_entry.cb = cb;
196
49.7k
    if (cb != NULL)
197
40.1k
        h2o_timer_link(conn->super.ctx->loop, timeout, &conn->_io_timeout_entry);
198
49.7k
}
199
200
static void clear_timeouts(struct st_h2o_http1_conn_t *conn)
201
9.52k
{
202
9.52k
    set_req_timeout(conn, 0, NULL);
203
9.52k
    set_req_io_timeout(conn, 0, NULL);
204
9.52k
}
205
206
static void entity_read_do_send_error(struct st_h2o_http1_conn_t *conn, int status, size_t status_error_index, const char *reason,
207
                                      const char *body)
208
284
{
209
284
    conn->req.proceed_req = NULL;
210
284
    conn->_req_entity_reader = NULL;
211
284
    clear_timeouts(conn);
212
284
    h2o_socket_read_stop(conn->sock);
213
    /* FIXME We should check if `h2o_proceed_request` has been called, rather than trying to guess if we have (I'm unsure if the
214
     * contract is for h2o_req_t::_generator to become non-NULL immediately after `h2o_proceed_request` is being called). */
215
284
    if (conn->req._generator == NULL && conn->_ostr_final.state == OSTREAM_STATE_HEAD) {
216
254
        conn->super.ctx->emitted_error_status[status_error_index]++;
217
254
        h2o_send_error_generic(&conn->req, status, reason, body, H2O_SEND_ERROR_HTTP1_CLOSE_CONNECTION);
218
254
    } else {
219
30
        conn->req.http1_is_persistent = 0;
220
30
        if (conn->_ostr_final.state == OSTREAM_STATE_DONE)
221
30
            cleanup_connection(conn);
222
30
    }
223
284
}
224
225
#define DECL_ENTITY_READ_SEND_ERROR_XXX(status_)                                                                                   \
226
    static void entity_read_send_error_##status_(struct st_h2o_http1_conn_t *conn, const char *reason, const char *body)           \
227
284
    {                                                                                                                              \
228
284
        entity_read_do_send_error(conn, status_, H2O_STATUS_ERROR_##status_, reason, body);                                        \
229
284
    }
http1.c:entity_read_send_error_400
Line
Count
Source
227
180
    {                                                                                                                              \
228
180
        entity_read_do_send_error(conn, status_, H2O_STATUS_ERROR_##status_, reason, body);                                        \
229
180
    }
http1.c:entity_read_send_error_502
Line
Count
Source
227
26
    {                                                                                                                              \
228
26
        entity_read_do_send_error(conn, status_, H2O_STATUS_ERROR_##status_, reason, body);                                        \
229
26
    }
http1.c:entity_read_send_error_413
Line
Count
Source
227
78
    {                                                                                                                              \
228
78
        entity_read_do_send_error(conn, status_, H2O_STATUS_ERROR_##status_, reason, body);                                        \
229
78
    }
230
231
DECL_ENTITY_READ_SEND_ERROR_XXX(400)
232
DECL_ENTITY_READ_SEND_ERROR_XXX(413)
233
DECL_ENTITY_READ_SEND_ERROR_XXX(502)
234
235
static void handle_one_body_fragment(struct st_h2o_http1_conn_t *conn, size_t fragment_size, size_t extra_bytes, int complete)
236
2.63k
{
237
2.63k
    if (fragment_size == 0 && !complete) {
238
412
        h2o_buffer_consume(&conn->sock->input, extra_bytes);
239
412
        return;
240
412
    }
241
242
2.22k
    clear_timeouts(conn);
243
2.22k
    h2o_socket_read_stop(conn->sock);
244
245
    /* move data being read to req_body */
246
2.22k
    if (!h2o_buffer_try_append(&conn->req_body, conn->sock->input->bytes, fragment_size)) {
247
0
        entity_read_send_error_502(conn, "Bad Gateway", "Bad Gateway");
248
0
        return;
249
0
    }
250
2.22k
    h2o_buffer_consume(&conn->sock->input, fragment_size + extra_bytes);
251
2.22k
    conn->req.req_body_bytes_received += fragment_size;
252
253
    /* invoke action */
254
2.22k
    conn->req.entity = h2o_iovec_init(conn->req_body->bytes, conn->req_body->size);
255
2.22k
    if (conn->req.write_req.cb(conn->req.write_req.ctx, complete) != 0) {
256
0
        entity_read_send_error_502(conn, "Bad Gateway", "Bad Gateway");
257
0
        return;
258
0
    }
259
2.22k
    if (complete) {
260
1.02k
        conn->req.proceed_req = NULL;
261
1.02k
        conn->_req_entity_reader = NULL;
262
1.02k
        if (conn->_ostr_final.state == OSTREAM_STATE_DONE) {
263
276
            cleanup_connection(conn);
264
276
        }
265
1.02k
    }
266
2.22k
}
267
268
static void handle_chunked_entity_read(struct st_h2o_http1_conn_t *conn)
269
1.17k
{
270
1.17k
    struct st_h2o_http1_chunked_entity_reader *reader = (void *)conn->_req_entity_reader;
271
1.17k
    size_t bufsz;
272
1.17k
    ssize_t ret;
273
274
    /* decode the incoming data */
275
1.17k
    if ((bufsz = conn->sock->input->size) == 0)
276
59
        return;
277
1.11k
    ret = phr_decode_chunked(&reader->decoder, conn->sock->input->bytes, &bufsz);
278
1.11k
    if (ret != -1 && bufsz + conn->req.req_body_bytes_received >= conn->super.ctx->globalconf->max_request_entity_size) {
279
0
        entity_read_send_error_413(conn, "Request Entity Too Large", "request entity is too large");
280
0
        return;
281
0
    }
282
1.11k
    if (ret < 0) {
283
936
        if (ret == -2) {
284
            /* incomplete */
285
833
            handle_one_body_fragment(conn, bufsz, conn->sock->input->size - bufsz, 0);
286
833
        } else {
287
            /* error */
288
103
            entity_read_send_error_400(conn, "Invalid Request", "broken chunked-encoding");
289
103
        }
290
936
    } else {
291
        /* complete */
292
180
        assert(bufsz + ret <= conn->sock->input->size);
293
180
        conn->sock->input->size = bufsz + ret;
294
180
        handle_one_body_fragment(conn, bufsz, 0, 1);
295
180
    }
296
1.11k
}
297
298
static int create_chunked_entity_reader(struct st_h2o_http1_conn_t *conn)
299
560
{
300
560
    struct st_h2o_http1_chunked_entity_reader *reader = h2o_mem_alloc_pool(&conn->req.pool, *reader, 1);
301
560
    conn->_req_entity_reader = &reader->super;
302
303
560
    reader->super.handle_incoming_entity = handle_chunked_entity_read;
304
560
    memset(&reader->decoder, 0, sizeof(reader->decoder));
305
560
    reader->decoder.consume_trailer = 1;
306
307
560
    return 0;
308
560
}
309
310
static void handle_content_length_entity_read(struct st_h2o_http1_conn_t *conn)
311
1.72k
{
312
1.72k
    int complete = 0;
313
1.72k
    struct st_h2o_http1_content_length_entity_reader *reader = (void *)conn->_req_entity_reader;
314
1.72k
    size_t length = conn->sock->input->size;
315
316
1.72k
    if (conn->req.req_body_bytes_received + conn->sock->input->size >= reader->content_length) {
317
847
        complete = 1;
318
847
        length = reader->content_length - conn->req.req_body_bytes_received;
319
847
    }
320
1.72k
    if (!complete && length == 0)
321
96
        return;
322
323
1.62k
    handle_one_body_fragment(conn, length, 0, complete);
324
1.62k
}
325
326
static int create_content_length_entity_reader(struct st_h2o_http1_conn_t *conn, size_t content_length)
327
1.07k
{
328
1.07k
    struct st_h2o_http1_content_length_entity_reader *reader = h2o_mem_alloc_pool(&conn->req.pool, *reader, 1);
329
1.07k
    conn->_req_entity_reader = &reader->super;
330
331
1.07k
    reader->super.handle_incoming_entity = handle_content_length_entity_read;
332
1.07k
    reader->content_length = content_length;
333
334
1.07k
    return 0;
335
1.07k
}
336
337
static int create_entity_reader(struct st_h2o_http1_conn_t *conn, const struct phr_header *entity_header)
338
1.73k
{
339
    /* strlen("content-length") is unequal to sizeof("transfer-encoding"), and thus checking the length only is sufficient */
340
1.73k
    if (entity_header->name_len == sizeof("transfer-encoding") - 1) {
341
        /* transfer-encoding */
342
591
        if (!h2o_lcstris(entity_header->value, entity_header->value_len, H2O_STRLIT("chunked"))) {
343
31
            entity_read_send_error_400(conn, "Invalid Request", "unknown transfer-encoding");
344
31
            return -1;
345
31
        }
346
560
        return create_chunked_entity_reader(conn);
347
1.13k
    } else {
348
        /* content-length */
349
1.13k
        size_t content_length = h2o_strtosize(entity_header->value, entity_header->value_len);
350
1.13k
        if (content_length == SIZE_MAX) {
351
46
            entity_read_send_error_400(conn, "Invalid Request", "broken content-length header");
352
46
            return -1;
353
46
        }
354
1.09k
        if (content_length > conn->super.ctx->globalconf->max_request_entity_size) {
355
78
            entity_read_send_error_413(conn, "Request Entity Too Large", "request entity is too large");
356
78
            return -1;
357
78
        }
358
1.01k
        conn->req.content_length = content_length;
359
1.01k
        return create_content_length_entity_reader(conn, (size_t)content_length);
360
1.09k
    }
361
    /* failed */
362
0
    return -1;
363
1.73k
}
364
365
static const char *init_headers(h2o_mem_pool_t *pool, h2o_headers_t *headers, const struct phr_header *src, size_t len,
366
                                h2o_iovec_t *connection, h2o_iovec_t *host, h2o_iovec_t *upgrade, ssize_t *expect_header_index,
367
                                ssize_t *entity_header_index)
368
8.73k
{
369
8.73k
    *entity_header_index = -1;
370
8.73k
    *expect_header_index = -1;
371
372
8.73k
    assert(headers->size == 0);
373
374
    /* setup */
375
8.73k
    if (len != 0) {
376
5.96k
        size_t i;
377
5.96k
        h2o_vector_reserve(pool, headers, len);
378
57.4k
        for (i = 0; i != len; ++i) {
379
51.4k
            const h2o_token_t *name_token;
380
            /* reject multiline header */
381
51.4k
            if (src[i].name_len == 0)
382
33
                return "line folding of header fields is not supported";
383
51.4k
            char orig_case[src[i].name_len];
384
            /* preserve the original case */
385
51.4k
            memcpy(orig_case, src[i].name, src[i].name_len);
386
            /* convert to lower-case in-place */
387
51.4k
            h2o_strtolower((char *)src[i].name, src[i].name_len);
388
51.4k
            if ((name_token = h2o_lookup_token(src[i].name, src[i].name_len)) != NULL) {
389
20.6k
                if (name_token->flags.is_init_header_special) {
390
4.24k
                    if (name_token == H2O_TOKEN_HOST) {
391
893
                        host->base = (char *)src[i].value;
392
893
                        host->len = src[i].value_len;
393
3.35k
                    } else if (name_token == H2O_TOKEN_CONTENT_LENGTH) {
394
1.27k
                        if (*entity_header_index == -1)
395
1.14k
                            *entity_header_index = i;
396
2.07k
                    } else if (name_token == H2O_TOKEN_TRANSFER_ENCODING) {
397
703
                        *entity_header_index = i;
398
1.37k
                    } else if (name_token == H2O_TOKEN_EXPECT) {
399
158
                        *expect_header_index = i;
400
1.21k
                    } else if (name_token == H2O_TOKEN_UPGRADE) {
401
1.21k
                        upgrade->base = (char *)src[i].value;
402
1.21k
                        upgrade->len = src[i].value_len;
403
1.21k
                    } else {
404
0
                        assert(!"logic flaw");
405
0
                    }
406
16.3k
                } else {
407
16.3k
                    h2o_add_header(pool, headers, name_token, orig_case, src[i].value, src[i].value_len);
408
16.3k
                    if (name_token == H2O_TOKEN_CONNECTION)
409
1.32k
                        *connection = headers->entries[headers->size - 1].value;
410
16.3k
                }
411
30.8k
            } else {
412
30.8k
                h2o_add_header_by_str(pool, headers, src[i].name, src[i].name_len, 0, orig_case, src[i].value, src[i].value_len);
413
30.8k
            }
414
51.4k
        }
415
5.96k
    }
416
417
8.70k
    return NULL;
418
8.73k
}
419
420
static int upgrade_is_h2(h2o_iovec_t upgrade)
421
628
{
422
628
    if (h2o_lcstris(upgrade.base, upgrade.len, H2O_STRLIT("h2c")) || h2o_lcstris(upgrade.base, upgrade.len, H2O_STRLIT("h2c-14")) ||
423
88
        h2o_lcstris(upgrade.base, upgrade.len, H2O_STRLIT("h2c-16")))
424
571
        return 1;
425
57
    return 0;
426
628
}
427
428
static const char fixup_request_is_h2_upgrade[] = "fixup h2 upgrade";
429
430
static const char *fixup_request(struct st_h2o_http1_conn_t *conn, struct phr_header *headers, size_t num_headers,
431
                                 int minor_version, ssize_t *expect_header_index, ssize_t *entity_header_index)
432
8.73k
{
433
8.73k
    h2o_iovec_t connection = {NULL, 0}, host = {NULL, 0}, upgrade = {NULL, 0};
434
8.73k
    enum { METHOD_NORMAL, METHOD_CONNECT, METHOD_CONNECT_UDP } method_type;
435
8.73k
    const char *ret;
436
437
8.73k
    conn->req.input.scheme = conn->sock->ssl != NULL ? &H2O_URL_SCHEME_HTTPS : &H2O_URL_SCHEME_HTTP;
438
8.73k
    conn->req.version = 0x100 | (minor_version != 0);
439
440
    /* RFC 7231 6.2: a server MUST NOT send a 1xx response to an HTTP/1.0 client */
441
8.73k
    if (conn->req.version < 0x101)
442
1.80k
        conn->_ostr_final.super.send_informational = NULL;
443
444
8.73k
    if (h2o_memis(conn->req.input.method.base, conn->req.input.method.len, H2O_STRLIT("CONNECT"))) {
445
95
        method_type = METHOD_CONNECT;
446
8.64k
    } else if (h2o_memis(conn->req.input.method.base, conn->req.input.method.len, H2O_STRLIT("CONNECT-UDP"))) {
447
1
        method_type = METHOD_CONNECT_UDP;
448
8.64k
    } else {
449
8.64k
        method_type = METHOD_NORMAL;
450
8.64k
    }
451
452
    /* init headers */
453
8.73k
    if ((ret = init_headers(&conn->req.pool, &conn->req.headers, headers, num_headers, &connection, &host, &upgrade,
454
8.73k
                            expect_header_index, entity_header_index)) != NULL)
455
33
        return ret;
456
457
    /* copy the values to pool, since the buffer pointed by the headers may get realloced */
458
8.70k
    if (*entity_header_index != -1 || method_type != METHOD_NORMAL || upgrade.base != NULL) {
459
2.60k
        size_t i;
460
2.60k
        conn->req.input.method = h2o_strdup(&conn->req.pool, conn->req.input.method.base, conn->req.input.method.len);
461
2.60k
        conn->req.input.path = h2o_strdup(&conn->req.pool, conn->req.input.path.base, conn->req.input.path.len);
462
17.7k
        for (i = 0; i != conn->req.headers.size; ++i) {
463
15.1k
            h2o_header_t *header = conn->req.headers.entries + i;
464
15.1k
            if (!h2o_iovec_is_token(header->name)) {
465
9.62k
                *header->name = h2o_strdup(&conn->req.pool, header->name->base, header->name->len);
466
9.62k
            }
467
15.1k
            header->value = h2o_strdup(&conn->req.pool, header->value.base, header->value.len);
468
15.1k
        }
469
2.60k
        if (host.base != NULL)
470
332
            host = h2o_strdup(&conn->req.pool, host.base, host.len);
471
2.60k
        if (upgrade.base != NULL)
472
899
            upgrade = h2o_strdup(&conn->req.pool, upgrade.base, upgrade.len);
473
2.60k
    }
474
475
8.70k
    if (method_type == METHOD_CONNECT) {
476
        /* CONNECT method, validate, setting the target host in `req->input.authority`. Path becomes empty. */
477
95
        if (conn->req.version < 0x101 || conn->req.input.path.len == 0 ||
478
80
            (host.base != NULL && !h2o_memis(conn->req.input.path.base, conn->req.input.path.len, host.base, host.len)) ||
479
18
            *entity_header_index != -1)
480
78
            return "invalid request";
481
17
        conn->req.input.authority = conn->req.input.path;
482
17
        conn->req.input.path = h2o_iovec_init(NULL, 0);
483
17
        conn->req.is_tunnel_req = 1;
484
8.60k
    } else {
485
        /* request line is in ordinary form, path might contain absolute URL; if so, convert it */
486
8.60k
        if (conn->req.input.path.len != 0 && conn->req.input.path.base[0] != '/') {
487
6.97k
            h2o_url_t url;
488
6.97k
            if (h2o_url_parse(&conn->req.pool, conn->req.input.path.base, conn->req.input.path.len, &url) == 0) {
489
308
                conn->req.input.scheme = url.scheme;
490
308
                conn->req.input.path = url.path;
491
308
                host = url.authority; /* authority part of the absolute form overrides the host header field (RFC 7230 S5.4) */
492
308
            }
493
6.97k
        }
494
        /* move host header to req->authority */
495
8.60k
        if (host.base != NULL)
496
825
            conn->req.input.authority = host;
497
        /* each protocol implementation validates masque */
498
8.60k
        if (!h2o_req_validate_pseudo_headers(&conn->req))
499
2
            return "invalid request";
500
        /* special handling for CONNECT-UDP, else it is an ordinary request */
501
8.60k
        if (method_type == METHOD_CONNECT_UDP) {
502
0
            conn->req.is_tunnel_req = 1;
503
8.60k
        } else {
504
            /* handle Connection and Upgrade header fields */
505
8.60k
            if (connection.base != NULL) {
506
                /* TODO contains_token function can be faster */
507
1.09k
                if (h2o_contains_token(connection.base, connection.len, H2O_STRLIT("keep-alive"), ',')) {
508
748
                    conn->req.http1_is_persistent = 1;
509
748
                }
510
                /* Upgrade is respected only for requests without bodies. Use of upgrade on a request with body is unsupported,
511
                 * because we reuse the entity reader for reading the body and the tunnelled data. */
512
1.09k
                if (upgrade.base != NULL && h2o_contains_token(connection.base, connection.len, H2O_STRLIT("upgrade"), ',') &&
513
663
                    *entity_header_index == -1) {
514
                    /* early return if upgrading to h2 */
515
628
                    if (upgrade_is_h2(upgrade)) {
516
571
                        if (conn->sock->ssl == NULL && conn->super.ctx->globalconf->http1.upgrade_to_http2)
517
571
                            return fixup_request_is_h2_upgrade;
518
571
                    } else {
519
57
                        conn->req.upgrade = upgrade;
520
57
                        conn->req.is_tunnel_req = 1;
521
57
                        conn->req.http1_is_persistent = 0;
522
57
                    }
523
628
                }
524
7.51k
            } else if (conn->req.version >= 0x101) {
525
                /* defaults to keep-alive if >= HTTP/1.1 */
526
6.30k
                conn->req.http1_is_persistent = 1;
527
6.30k
            }
528
            /* disable keep-alive if shutdown is requested */
529
8.03k
            if (conn->req.http1_is_persistent && conn->super.ctx->shutdown_requested)
530
0
                conn->req.http1_is_persistent = 0;
531
8.03k
        }
532
8.60k
    }
533
534
8.05k
    return NULL;
535
8.70k
}
536
537
static void on_continue_sent(h2o_socket_t *sock, const char *err)
538
0
{
539
0
    struct st_h2o_http1_conn_t *conn = sock->data;
540
541
0
    if (err != NULL) {
542
0
        close_connection(conn, 1);
543
0
        return;
544
0
    }
545
546
0
    h2o_socket_read_start(sock, reqread_on_read);
547
0
    conn->_req_entity_reader->handle_incoming_entity(conn);
548
0
}
549
550
static int contains_crlf_only(const char *s, size_t len)
551
179
{
552
326
    for (; len != 0; ++s, --len)
553
295
        if (!(*s == '\r' || *s == '\n'))
554
148
            return 0;
555
31
    return 1;
556
179
}
557
558
static void send_bad_request(struct st_h2o_http1_conn_t *conn, const char *body)
559
1.17k
{
560
1.17k
    h2o_socket_read_stop(conn->sock);
561
1.17k
    h2o_send_error_400(&conn->req, "Bad Request", body, H2O_SEND_ERROR_BROKEN_REQUEST | H2O_SEND_ERROR_HTTP1_CLOSE_CONNECTION);
562
1.17k
}
563
564
static void resume_request_read(struct st_h2o_http1_conn_t *conn)
565
1.14k
{
566
1.14k
    set_req_timeout(conn, conn->super.ctx->globalconf->http1.req_timeout, reqread_on_timeout);
567
1.14k
    set_req_io_timeout(conn, conn->super.ctx->globalconf->http1.req_io_timeout, req_io_on_timeout);
568
1.14k
    h2o_socket_read_start(conn->sock, reqread_on_read);
569
1.14k
}
570
571
static void proceed_request(h2o_req_t *req, const char *errstr)
572
671
{
573
671
    struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, req);
574
575
671
    if (errstr != NULL) {
576
26
        entity_read_send_error_502(conn, "Bad Gateway", "Bad Gateway");
577
26
        return;
578
26
    }
579
580
671
    assert(conn->req.entity.len == conn->req_body->size);
581
645
    h2o_buffer_consume(&conn->req_body, conn->req_body->size);
582
583
645
    resume_request_read(conn);
584
645
}
585
586
static int write_req_non_streaming(void *_req, int is_end_stream)
587
1.00k
{
588
1.00k
    struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, _req);
589
590
1.00k
    if (is_end_stream) {
591
506
        conn->req.proceed_req = NULL;
592
506
        h2o_process_request(&conn->req);
593
506
    } else {
594
502
        resume_request_read(conn);
595
502
    }
596
1.00k
    return 0;
597
1.00k
}
598
599
static int write_req_first(void *_req, int is_end_stream)
600
1.32k
{
601
1.32k
    struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, _req);
602
603
    /* if possible, switch to streaming request body mode */
604
1.32k
    if (!is_end_stream && h2o_req_can_stream_request(&conn->req)) {
605
630
        conn->req.write_req.cb = NULL; /* will be set to something before `proceed_req` is being invoked */
606
630
        conn->req.proceed_req = proceed_request;
607
630
        h2o_process_request(&conn->req);
608
630
        return 0;
609
630
    }
610
611
694
    conn->req.write_req.cb = write_req_non_streaming;
612
694
    return write_req_non_streaming(&conn->req, is_end_stream);
613
1.32k
}
614
615
static int write_req_connect_first(void *_req, int is_end_stream)
616
30
{
617
30
    struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, _req);
618
619
30
    conn->req.write_req.cb = NULL; /* will not be called again until proceed_req is called by the generator */
620
30
    if (is_end_stream)
621
0
        conn->req.proceed_req = NULL;
622
623
30
    return 0;
624
30
}
625
626
static void handle_incoming_request(struct st_h2o_http1_conn_t *conn)
627
16.0k
{
628
16.0k
    size_t inreqlen = conn->sock->input->size < H2O_MAX_REQLEN ? conn->sock->input->size : H2O_MAX_REQLEN;
629
16.0k
    int reqlen, minor_version;
630
16.0k
    struct phr_header headers[H2O_MAX_HEADERS];
631
16.0k
    size_t num_headers = H2O_MAX_HEADERS;
632
633
16.0k
    if (conn->sock->input->size != 0)
634
16.0k
        h2o_conn_set_state(&conn->super, H2O_CONN_STATE_ACTIVE);
635
636
    /* need to set request_begin_at here for keep-alive connection */
637
16.0k
    if (h2o_timeval_is_null(&conn->req.timestamps.request_begin_at))
638
14.3k
        conn->req.timestamps.request_begin_at = h2o_gettimeofday(conn->super.ctx->loop);
639
640
16.0k
    reqlen = phr_parse_request(conn->sock->input->bytes, inreqlen, (const char **)&conn->req.input.method.base,
641
16.0k
                               &conn->req.input.method.len, (const char **)&conn->req.input.path.base, &conn->req.input.path.len,
642
16.0k
                               &minor_version, headers, &num_headers, conn->_prevreqlen);
643
16.0k
    conn->_prevreqlen = inreqlen;
644
645
    /* handle incomplete or broken HTTP headers */
646
16.0k
    switch (reqlen) {
647
2.19k
    case -2: /* incomplete */
648
2.19k
        if (inreqlen == H2O_MAX_REQLEN) {
649
0
            send_bad_request(conn, "Bad Request");
650
0
        }
651
2.19k
        return;
652
5.13k
    case -1: // error
653
        /* upgrade to HTTP/2 if the request starts with: PRI * HTTP/2 */
654
5.13k
        if (conn->super.ctx->globalconf->http1.upgrade_to_http2) {
655
            /* should check up to the first octet that phr_parse_request returns an error */
656
5.13k
            static const h2o_iovec_t HTTP2_SIG = {H2O_STRLIT("PRI * HTTP/2")};
657
5.13k
            if (conn->sock->input->size >= HTTP2_SIG.len && memcmp(conn->sock->input->bytes, HTTP2_SIG.base, HTTP2_SIG.len) == 0) {
658
4.04k
                h2o_accept_ctx_t accept_ctx = {conn->super.ctx, conn->super.hosts};
659
4.04k
                h2o_socket_t *sock = conn->sock;
660
4.04k
                struct timeval connected_at = conn->super.connected_at;
661
                /* destruct the connection after detatching the socket */
662
4.04k
                conn->sock = NULL;
663
4.04k
                close_connection(conn, 1);
664
                /* and accept as http2 connection */
665
4.04k
                h2o_http2_accept(&accept_ctx, sock, connected_at);
666
4.04k
                return;
667
4.04k
            }
668
5.13k
        }
669
1.09k
        if (inreqlen <= 4 && contains_crlf_only(conn->sock->input->bytes, inreqlen)) {
670
31
            close_connection(conn, 1);
671
1.06k
        } else {
672
1.06k
            send_bad_request(conn, "Bad Request");
673
1.06k
        }
674
1.09k
        return;
675
8.73k
    default: /* parse complete */
676
8.73k
        break;
677
16.0k
    }
678
679
    /* parse complete */
680
8.73k
    const char *err;
681
8.73k
    ssize_t entity_body_header_index;
682
8.73k
    ssize_t expect_header_index;
683
8.73k
    conn->_unconsumed_request_size = reqlen;
684
8.73k
    if ((err = fixup_request(conn, headers, num_headers, minor_version, &expect_header_index, &entity_body_header_index)) != NULL &&
685
684
        err != fixup_request_is_h2_upgrade) {
686
113
        clear_timeouts(conn);
687
113
        send_bad_request(conn, err);
688
113
        return;
689
113
    }
690
8.62k
    h2o_probe_log_request(&conn->req, conn->_req_index);
691
692
    /* handle H2 upgrade */
693
8.62k
    if (err == fixup_request_is_h2_upgrade) {
694
571
        clear_timeouts(conn);
695
571
        h2o_socket_read_stop(conn->sock);
696
571
        if (h2o_http2_handle_upgrade(&conn->req, conn->super.connected_at) != 0)
697
469
            h2o_send_error_400(&conn->req, "Invalid Request", "Broken upgrade request to HTTP/2", 0);
698
571
        return;
699
571
    }
700
701
    /* handle request with body */
702
8.05k
    if (entity_body_header_index != -1) {
703
        /* Request has body, start reading it */
704
1.73k
        conn->req.timestamps.request_body_begin_at = h2o_gettimeofday(conn->super.ctx->loop);
705
1.73k
        if (create_entity_reader(conn, headers + entity_body_header_index) != 0)
706
155
            return;
707
1.57k
        conn->_unconsumed_request_size = 0;
708
1.57k
        h2o_buffer_init(&conn->req_body, &h2o_socket_buffer_prototype);
709
1.57k
        conn->req.write_req.cb = write_req_first;
710
1.57k
        conn->req.write_req.ctx = &conn->req;
711
1.57k
        if (expect_header_index != -1) {
712
9
            h2o_iovec_t expect_value = h2o_iovec_init(headers[expect_header_index].value, headers[expect_header_index].value_len);
713
9
            if (!h2o_lcstris(expect_value.base, expect_value.len, H2O_STRLIT("100-continue"))) {
714
9
                clear_timeouts(conn);
715
9
                h2o_socket_read_stop(conn->sock);
716
9
                h2o_send_error_417(&conn->req, "Expectation Failed", "unknown expectation", H2O_SEND_ERROR_HTTP1_CLOSE_CONNECTION);
717
9
                return;
718
9
            }
719
0
            if (h2o_req_should_forward_expect(&conn->req)) {
720
                /* in forward mode, expect header is treated like other normal headers */
721
0
                char orig_case_cstr[sizeof("expect")] = {0};
722
0
                assert(sizeof(orig_case_cstr) - 1 == headers[expect_header_index].name_len);
723
0
                h2o_memcpy(orig_case_cstr, headers[expect_header_index].name, sizeof(orig_case_cstr) - 1);
724
0
                h2o_add_header(&conn->req.pool, &conn->req.headers, H2O_TOKEN_EXPECT, orig_case_cstr,
725
0
                               h2o_strdup(&conn->req.pool, expect_value.base, expect_value.len).base, expect_value.len);
726
0
                h2o_buffer_consume(&conn->sock->input, reqlen);
727
0
                goto ProcessImmediately;
728
0
            }
729
            /* not in forward mode, send out own 100-continue */
730
0
            h2o_buffer_consume(&conn->sock->input, reqlen);
731
0
            static const h2o_iovec_t res = {H2O_STRLIT("HTTP/1.1 100 Continue\r\n\r\n")};
732
0
            h2o_socket_write(conn->sock, (void *)&res, 1, on_continue_sent);
733
            /* processing of the incoming entity is postponed until the 100 response is sent */
734
0
            h2o_socket_read_stop(conn->sock);
735
1.56k
        } else {
736
1.56k
            h2o_buffer_consume(&conn->sock->input, reqlen);
737
            /* Invocation of `h2o_process_request` is delayed to reduce backend concurrency */
738
1.56k
            conn->_req_entity_reader->handle_incoming_entity(conn);
739
1.56k
        }
740
1.56k
        return;
741
1.57k
    }
742
743
    /* handle tunnel request */
744
6.32k
    if (conn->req.is_tunnel_req) {
745
        /* Is a CONNECT request or an upgrade (e.g., WebSocket). Request is submitted immediately and body is streamed. */
746
74
        if (!h2o_req_can_stream_request(&conn->req) &&
747
54
            h2o_memis(conn->req.input.method.base, conn->req.input.method.len, H2O_STRLIT("CONNECT"))) {
748
17
            clear_timeouts(conn);
749
17
            h2o_socket_read_stop(conn->sock);
750
17
            h2o_send_error_405(&conn->req, "Method Not Allowed", "Method Not Allowed", 0);
751
17
            return;
752
17
        }
753
57
        if (create_content_length_entity_reader(conn, SIZE_MAX) != 0)
754
0
            return;
755
57
        conn->_unconsumed_request_size = 0;
756
57
        h2o_buffer_consume(&conn->sock->input, reqlen);
757
57
        h2o_buffer_init(&conn->req_body, &h2o_socket_buffer_prototype);
758
57
        goto ProcessImmediately;
759
57
    }
760
761
    /* handle ordinary request without request body */
762
6.24k
    clear_timeouts(conn);
763
6.24k
    h2o_socket_read_stop(conn->sock);
764
6.24k
    h2o_process_request(&conn->req);
765
6.24k
    return;
766
767
57
ProcessImmediately:
768
57
    conn->req.write_req.cb = write_req_connect_first;
769
57
    conn->req.write_req.ctx = &conn->req;
770
57
    conn->req.proceed_req = proceed_request;
771
57
    conn->_req_entity_reader->handle_incoming_entity(conn); /* read payload received early before submitting the request */
772
57
    if (conn->req.entity.base == NULL)
773
27
        conn->req.entity = h2o_iovec_init("", 0); /* if nothing was read, still indicate that body exists */
774
    /* stop reading (this might or might not be done by `handle_incoming_entity`) until HTTP response is given */
775
57
    h2o_socket_read_stop(conn->sock);
776
57
    clear_timeouts(conn);
777
57
    h2o_process_request(&conn->req);
778
57
    return;
779
6.32k
}
780
781
void reqread_on_read(h2o_socket_t *sock, const char *err)
782
15.1k
{
783
15.1k
    struct st_h2o_http1_conn_t *conn = sock->data;
784
785
15.1k
    if (err != NULL) {
786
2.44k
        close_connection(conn, 1);
787
2.44k
        return;
788
2.44k
    }
789
790
12.6k
    set_req_io_timeout(conn, conn->super.ctx->globalconf->http1.req_io_timeout, req_io_on_timeout);
791
12.6k
    if (conn->_req_entity_reader == NULL)
792
11.4k
        handle_incoming_request(conn);
793
1.27k
    else
794
1.27k
        conn->_req_entity_reader->handle_incoming_entity(conn);
795
12.6k
}
796
797
static void close_idle_connection(h2o_conn_t *_conn)
798
0
{
799
0
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
800
0
    conn->req.http1_is_persistent = 0;
801
0
    close_connection(conn, 1);
802
0
}
803
804
static void on_timeout(struct st_h2o_http1_conn_t *conn)
805
0
{
806
0
    if (conn->_req_index == 1) {
807
        /* assign hostconf and bind conf so that the request can be logged */
808
0
        h2o_hostconf_t *hostconf = h2o_req_setup(&conn->req);
809
0
        h2o_req_bind_conf(&conn->req, hostconf, &hostconf->fallback_path);
810
        /* set error status for logging */
811
0
        conn->req.res.reason = "Request Timeout";
812
0
    }
813
814
0
    close_idle_connection(&conn->super);
815
0
}
816
817
static void req_io_on_timeout(h2o_timer_t *entry)
818
0
{
819
0
    struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, _io_timeout_entry, entry);
820
0
    conn->super.ctx->http1.events.request_io_timeouts++;
821
0
    on_timeout(conn);
822
0
}
823
824
static void reqread_on_timeout(h2o_timer_t *entry)
825
0
{
826
0
    struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, _timeout_entry, entry);
827
0
    conn->super.ctx->http1.events.request_timeouts++;
828
0
    on_timeout(conn);
829
0
}
830
831
static inline void reqread_start(struct st_h2o_http1_conn_t *conn)
832
15.9k
{
833
15.9k
    set_req_timeout(conn, conn->super.ctx->globalconf->http1.req_timeout, reqread_on_timeout);
834
15.9k
    set_req_io_timeout(conn, conn->super.ctx->globalconf->http1.req_io_timeout, req_io_on_timeout);
835
15.9k
    h2o_socket_read_start(conn->sock, reqread_on_read);
836
15.9k
    if (conn->sock->input->size != 0)
837
4.65k
        handle_incoming_request(conn);
838
15.9k
}
839
840
static void on_send_next(h2o_socket_t *sock, const char *err)
841
1.41k
{
842
1.41k
    struct st_h2o_http1_conn_t *conn = sock->data;
843
844
1.41k
    if (err != NULL)
845
3
        close_connection(conn, 1);
846
1.40k
    else
847
1.40k
        h2o_proceed_response(&conn->req);
848
1.41k
}
849
850
static void on_send_complete_post_trailers(h2o_socket_t *sock, const char *err)
851
0
{
852
0
    struct st_h2o_http1_conn_t *conn = sock->data;
853
854
0
    if (err != NULL)
855
0
        conn->req.http1_is_persistent = 0;
856
857
0
    conn->_ostr_final.state = OSTREAM_STATE_DONE;
858
0
    if (conn->req.proceed_req == NULL)
859
0
        cleanup_connection(conn);
860
0
}
861
862
static void on_send_complete(h2o_socket_t *sock, const char *err)
863
9.35k
{
864
9.35k
    struct st_h2o_http1_conn_t *conn = sock->data;
865
866
9.35k
    if (err == NULL) {
867
9.34k
        if (conn->req._ostr_top != &conn->_ostr_final.super) {
868
0
            err = "pull error";
869
9.34k
        } else {
870
            /* success */
871
9.34k
            conn->req.timestamps.response_end_at = h2o_gettimeofday(conn->super.ctx->loop);
872
9.34k
            if (h2o_timeval_is_null(&conn->req.timestamps.response_start_at)) {
873
0
                conn->req.timestamps.response_start_at = conn->req.timestamps.response_end_at;
874
0
            }
875
9.34k
        }
876
9.34k
    }
877
878
9.35k
    if (err != NULL)
879
5
        conn->req.http1_is_persistent = 0;
880
881
9.35k
    if (err == NULL && conn->req.send_server_timing && conn->_ostr_final.chunked_buf != NULL) {
882
0
        h2o_iovec_t trailer;
883
0
        if ((trailer = h2o_build_server_timing_trailer(&conn->req, H2O_STRLIT("server-timing: "), H2O_STRLIT("\r\n\r\n"))).len !=
884
0
            0) {
885
0
            h2o_socket_write(conn->sock, &trailer, 1, on_send_complete_post_trailers);
886
0
            return;
887
0
        }
888
0
    }
889
890
9.35k
    conn->_ostr_final.state = OSTREAM_STATE_DONE;
891
892
9.35k
    if (conn->req.is_tunnel_req) {
893
        /* We have received a complete request (the end of the request is the request headers, see `fixup_request`), and the
894
         * connection is not going to handle any more requests. Therefore, we can close the connection immediately, regardless of if
895
         * the connection had been turned into a tunnel. */
896
74
        assert(!conn->req.http1_is_persistent);
897
74
        cleanup_connection(conn);
898
9.28k
    } else if (conn->req.proceed_req == NULL) {
899
        /* Upstream has sent an early response. Continue forwarding the request body. */
900
8.90k
        cleanup_connection(conn);
901
8.90k
    }
902
9.35k
}
903
904
static void on_upgrade_complete(h2o_socket_t *socket, const char *err)
905
102
{
906
102
    struct st_h2o_http1_conn_t *conn = socket->data;
907
102
    h2o_http1_upgrade_cb cb = conn->upgrade.cb;
908
102
    void *data = conn->upgrade.data;
909
102
    h2o_socket_t *sock = NULL;
910
102
    size_t headers_size = 0;
911
912
    /* destruct the connection (after detaching the socket) */
913
102
    if (err == 0) {
914
101
        sock = conn->sock;
915
101
        headers_size = conn->_unconsumed_request_size;
916
101
        close_connection(conn, 0);
917
101
    } else {
918
1
        close_connection(conn, 1);
919
1
    }
920
921
102
    cb(data, sock, headers_size);
922
102
}
923
924
static size_t flatten_headers_estimate_size(h2o_req_t *req, size_t server_name_and_connection_len)
925
9.45k
{
926
9.45k
    size_t len = sizeof("HTTP/1.1  \r\nserver: \r\nconnection: \r\ncontent-length: \r\n\r\n") + 3 + strlen(req->res.reason) +
927
9.45k
                 server_name_and_connection_len + sizeof(H2O_UINT64_LONGEST_STR) - 1 + sizeof("cache-control: private") - 1;
928
9.45k
    const h2o_header_t *header, *end;
929
930
20.1k
    for (header = req->res.headers.entries, end = header + req->res.headers.size; header != end; ++header)
931
10.6k
        len += header->name->len + header->value.len + 4;
932
933
9.45k
    return len;
934
9.45k
}
935
936
static size_t flatten_res_headers(char *buf, h2o_req_t *req)
937
9.45k
{
938
9.45k
    char *dst = buf;
939
9.45k
    size_t i;
940
20.1k
    for (i = 0; i != req->res.headers.size; ++i) {
941
10.6k
        const h2o_header_t *header = req->res.headers.entries + i;
942
10.6k
        memcpy(dst, header->orig_name ? header->orig_name : header->name->base, header->name->len);
943
10.6k
        dst += header->name->len;
944
10.6k
        *dst++ = ':';
945
10.6k
        *dst++ = ' ';
946
10.6k
        memcpy(dst, header->value.base, header->value.len);
947
10.6k
        dst += header->value.len;
948
10.6k
        *dst++ = '\r';
949
10.6k
        *dst++ = '\n';
950
10.6k
    }
951
952
9.45k
    return dst - buf;
953
9.45k
}
954
955
static size_t flatten_headers(char *buf, h2o_req_t *req, const char *connection)
956
9.45k
{
957
9.45k
    h2o_context_t *ctx = req->conn->ctx;
958
9.45k
    char *dst = buf;
959
960
9.45k
    assert(req->res.status <= 999);
961
962
    /* send essential headers with the first chars uppercased for max. interoperability (#72) */
963
9.45k
    if (req->res.content_length != SIZE_MAX) {
964
7.26k
        dst += sprintf(dst, "HTTP/1.1 %d %s\r\nConnection: %s\r\nContent-Length: %zu\r\n", req->res.status, req->res.reason,
965
7.26k
                       connection, req->res.content_length);
966
7.26k
    } else {
967
2.19k
        dst += sprintf(dst, "HTTP/1.1 %d %s\r\nConnection: %s\r\n", req->res.status, req->res.reason, connection);
968
2.19k
    }
969
9.45k
    if (ctx->globalconf->server_name.len) {
970
9.45k
        dst += sprintf(dst, "Server: %s\r\n", ctx->globalconf->server_name.base);
971
9.45k
    }
972
973
9.45k
    dst += flatten_res_headers(dst, req);
974
9.45k
    *dst++ = '\r';
975
9.45k
    *dst++ = '\n';
976
977
9.45k
    return dst - buf;
978
9.45k
}
979
980
static int should_use_chunked_encoding(h2o_req_t *req)
981
9.35k
{
982
9.35k
    if (req->is_tunnel_req)
983
74
        return 0;
984
9.28k
    if (req->version != 0x101)
985
2.73k
        return 0;
986
    /* do nothing if content-length is known */
987
6.54k
    if (req->res.content_length != SIZE_MAX)
988
4.76k
        return 0;
989
    /* RFC 2616 4.4 states that the following status codes (and response to a HEAD method) should not include message body */
990
1.77k
    if ((100 <= req->res.status && req->res.status <= 199) || req->res.status == 204 || req->res.status == 304)
991
0
        return 0;
992
1.77k
    if (h2o_memis(req->input.method.base, req->input.method.len, H2O_STRLIT("HEAD")))
993
597
        return 0;
994
995
1.18k
    return 1;
996
1.77k
}
997
998
static void setup_chunked(struct st_h2o_http1_finalostream_t *self, h2o_req_t *req)
999
9.35k
{
1000
9.35k
    if (should_use_chunked_encoding(req)) {
1001
1.18k
        h2o_add_header(&req->pool, &req->res.headers, H2O_TOKEN_TRANSFER_ENCODING, NULL, H2O_STRLIT("chunked"));
1002
1.18k
        self->chunked_buf = h2o_mem_alloc_pool_aligned(&req->pool, 1, sizeof(size_t) * 2 + sizeof("\r\n"));
1003
1.18k
    }
1004
9.35k
}
1005
1006
static void encode_chunked(h2o_sendvec_t *prefix, h2o_sendvec_t *suffix, h2o_send_state_t state, size_t chunk_size,
1007
                           int send_trailers, char *buffer)
1008
2.28k
{
1009
2.28k
    h2o_sendvec_init_raw(prefix, NULL, 0);
1010
2.28k
    h2o_sendvec_init_raw(suffix, NULL, 0);
1011
1012
    /* create chunk header and output data */
1013
2.28k
    if (chunk_size != 0) {
1014
1.18k
        prefix->raw = buffer;
1015
1.18k
        prefix->len = sprintf(buffer, "%zx\r\n", chunk_size);
1016
1.18k
        if (state != H2O_SEND_STATE_ERROR) {
1017
1.18k
            suffix->raw = "\r\n0\r\n\r\n";
1018
1.18k
            suffix->len = state == H2O_SEND_STATE_FINAL ? (send_trailers ? 5 : 7) : 2;
1019
1.18k
        }
1020
1.18k
    } else if (state == H2O_SEND_STATE_FINAL) {
1021
1.10k
        suffix->raw = "0\r\n\r\n";
1022
1.10k
        suffix->len = send_trailers ? 3 : 5;
1023
1.10k
    }
1024
1025
    /* if state is error, send a broken chunk to pass the error down to the browser */
1026
2.28k
    if (state == H2O_SEND_STATE_ERROR) {
1027
0
        suffix->raw = "\r\n1\r\n";
1028
0
        suffix->len = 5;
1029
0
    }
1030
2.28k
}
1031
1032
void finalostream_send(h2o_ostream_t *_self, h2o_req_t *_req, h2o_sendvec_t *inbufs, size_t inbufcnt, h2o_send_state_t send_state)
1033
10.7k
{
1034
10.7k
    struct st_h2o_http1_conn_t *conn = (struct st_h2o_http1_conn_t *)_req->conn;
1035
10.7k
    h2o_sendvec_t bufs[inbufcnt + 1 + 2]; /* 1 for header, 2 for chunked encoding */
1036
10.7k
    size_t bufcnt = 0, chunked_prefix_index = 0;
1037
10.7k
    int empty_payload_allowed = conn->_ostr_final.state == OSTREAM_STATE_HEAD || send_state != H2O_SEND_STATE_IN_PROGRESS;
1038
1039
10.7k
    assert(&conn->req == _req);
1040
10.7k
    assert(_self == &conn->_ostr_final.super);
1041
1042
10.7k
    if (conn->_ostr_final.informational.write_inflight) {
1043
0
        conn->_ostr_final.informational.pending_final.inbufs = h2o_mem_alloc_pool(&conn->req.pool, h2o_sendvec_t, inbufcnt);
1044
0
        memcpy(conn->_ostr_final.informational.pending_final.inbufs, inbufs, sizeof(*inbufs) * inbufcnt);
1045
0
        conn->_ostr_final.informational.pending_final.inbufcnt = inbufcnt;
1046
0
        conn->_ostr_final.informational.pending_final.send_state = send_state;
1047
0
        return;
1048
0
    }
1049
1050
10.7k
    if (send_state == H2O_SEND_STATE_ERROR) {
1051
0
        conn->req.http1_is_persistent = 0;
1052
0
        conn->req.send_server_timing = 0;
1053
0
        if (conn->req.upstream_refused) {
1054
            /* to let the client retry, immediately close the connection without sending any data */
1055
0
            on_send_complete(conn->sock, NULL);
1056
0
            return;
1057
0
        }
1058
0
    }
1059
1060
10.7k
    if (conn->_ostr_final.state == OSTREAM_STATE_HEAD) {
1061
        /* build headers and send */
1062
9.35k
        conn->req.timestamps.response_start_at = h2o_gettimeofday(conn->super.ctx->loop);
1063
9.35k
        setup_chunked(&conn->_ostr_final, &conn->req);
1064
9.35k
        if (conn->req.send_server_timing)
1065
0
            h2o_add_server_timing_header(&conn->req, conn->_ostr_final.chunked_buf != NULL);
1066
1067
9.35k
        const char *connection = conn->req.http1_is_persistent ? "keep-alive" : "close";
1068
9.35k
        if (conn->req.is_tunnel_req && conn->req.res.status == 101 && conn->req.upgrade.base)
1069
4
            connection = "upgrade";
1070
9.35k
        size_t headers_est_size =
1071
9.35k
            flatten_headers_estimate_size(&conn->req, conn->super.ctx->globalconf->server_name.len + strlen(connection));
1072
9.35k
        h2o_sendvec_init_raw(bufs + bufcnt, h2o_mem_alloc_pool(&conn->req.pool, char, headers_est_size), 0);
1073
9.35k
        bufs[bufcnt].len = flatten_headers(bufs[bufcnt].raw, &conn->req, connection);
1074
9.35k
        conn->req.header_bytes_sent += bufs[bufcnt].len;
1075
9.35k
        ++bufcnt;
1076
9.35k
        h2o_probe_log_response(&conn->req, conn->_req_index);
1077
9.35k
        conn->_ostr_final.state = OSTREAM_STATE_BODY;
1078
9.35k
    }
1079
1080
10.7k
    if (conn->_ostr_final.chunked_buf != NULL)
1081
2.28k
        chunked_prefix_index = bufcnt++;
1082
1083
10.7k
    size_t bytes_sent = 0;
1084
19.3k
    for (size_t i = 0; i != inbufcnt; ++i) {
1085
8.60k
        if (inbufs[i].len == 0)
1086
0
            continue;
1087
8.60k
        bufs[bufcnt++] = inbufs[i];
1088
8.60k
        bytes_sent += inbufs[i].len;
1089
8.60k
    }
1090
10.7k
    assert(empty_payload_allowed || bytes_sent != 0 || !"h2o_data must only be called when there is progress");
1091
10.7k
    conn->req.bytes_sent += bytes_sent;
1092
1093
10.7k
    if (conn->_ostr_final.chunked_buf != NULL) {
1094
2.28k
        encode_chunked(bufs + chunked_prefix_index, bufs + bufcnt, send_state, bytes_sent, conn->req.send_server_timing != 0,
1095
2.28k
                       conn->_ostr_final.chunked_buf);
1096
2.28k
        if (bufs[bufcnt].len != 0)
1097
2.28k
            ++bufcnt;
1098
2.28k
    }
1099
1100
10.7k
    if (bufcnt != 0)
1101
10.4k
        set_req_io_timeout(conn, conn->super.ctx->globalconf->http1.req_io_timeout, req_io_on_timeout);
1102
1103
10.7k
    h2o_socket_sendvec(conn->sock, bufs, bufcnt, h2o_send_state_is_in_progress(send_state) ? on_send_next : on_send_complete);
1104
10.7k
}
1105
1106
static void on_send_informational_complete(h2o_socket_t *sock, const char *err);
1107
1108
static void do_send_informational(struct st_h2o_http1_conn_t *conn)
1109
0
{
1110
0
    assert(!conn->_ostr_final.informational.write_inflight && conn->_ostr_final.informational.pending.size != 0);
1111
1112
0
    conn->_ostr_final.informational.write_inflight = 1;
1113
0
    h2o_socket_write(conn->sock, conn->_ostr_final.informational.pending.entries, conn->_ostr_final.informational.pending.size,
1114
0
                     on_send_informational_complete);
1115
0
    conn->_ostr_final.informational.pending.size = 0;
1116
0
}
1117
1118
static void on_send_informational_complete(h2o_socket_t *sock, const char *err)
1119
0
{
1120
0
    struct st_h2o_http1_conn_t *conn = sock->data;
1121
0
    if (err != NULL) {
1122
0
        close_connection(conn, 1);
1123
0
        return;
1124
0
    }
1125
1126
0
    conn->_ostr_final.informational.write_inflight = 0;
1127
1128
0
    if (conn->_ostr_final.informational.pending_final.inbufs != NULL) {
1129
0
        finalostream_send(&conn->_ostr_final.super, &conn->req, conn->_ostr_final.informational.pending_final.inbufs,
1130
0
                          conn->_ostr_final.informational.pending_final.inbufcnt,
1131
0
                          conn->_ostr_final.informational.pending_final.send_state);
1132
0
        return;
1133
0
    }
1134
1135
0
    if (conn->_ostr_final.informational.pending.size != 0)
1136
0
        do_send_informational(conn);
1137
0
}
1138
1139
static void finalostream_send_informational(h2o_ostream_t *_self, h2o_req_t *req)
1140
0
{
1141
0
    struct st_h2o_http1_conn_t *conn = (struct st_h2o_http1_conn_t *)req->conn;
1142
0
    assert(_self == &conn->_ostr_final.super);
1143
1144
0
    size_t len = sizeof("HTTP/1.1  \r\n\r\n") + 3 + strlen(req->res.reason) - 1;
1145
0
    h2o_iovec_t buf = h2o_iovec_init(NULL, len);
1146
1147
0
    int i;
1148
0
    for (i = 0; i != req->res.headers.size; ++i)
1149
0
        buf.len += req->res.headers.entries[i].name->len + req->res.headers.entries[i].value.len + 4;
1150
1151
0
    buf.base = h2o_mem_alloc_pool(&req->pool, char, buf.len);
1152
0
    char *dst = buf.base;
1153
0
    dst += sprintf(dst, "HTTP/1.1 %d %s\r\n", req->res.status, req->res.reason);
1154
0
    dst += flatten_res_headers(dst, req);
1155
0
    *dst++ = '\r';
1156
0
    *dst++ = '\n';
1157
1158
0
    req->header_bytes_sent += dst - buf.base;
1159
1160
0
    h2o_vector_reserve(&req->pool, &conn->_ostr_final.informational.pending, conn->_ostr_final.informational.pending.size + 1);
1161
0
    conn->_ostr_final.informational.pending.entries[conn->_ostr_final.informational.pending.size++] = buf;
1162
1163
0
    if (!conn->_ostr_final.informational.write_inflight)
1164
0
        do_send_informational(conn);
1165
0
}
1166
1167
static socklen_t get_sockname(h2o_conn_t *_conn, struct sockaddr *sa)
1168
0
{
1169
0
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
1170
0
    return h2o_socket_getsockname(conn->sock, sa);
1171
0
}
1172
1173
static socklen_t get_peername(h2o_conn_t *_conn, struct sockaddr *sa)
1174
2.08k
{
1175
2.08k
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
1176
2.08k
    return h2o_socket_getpeername(conn->sock, sa);
1177
2.08k
}
1178
1179
static ptls_t *get_ptls(h2o_conn_t *_conn)
1180
2.08k
{
1181
2.08k
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
1182
2.08k
    assert(conn->sock != NULL && "it never becomes NULL, right?");
1183
2.08k
    return h2o_socket_get_ptls(conn->sock);
1184
2.08k
}
1185
1186
static const char *get_ssl_server_name(h2o_conn_t *_conn)
1187
0
{
1188
0
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
1189
0
    return h2o_socket_get_ssl_server_name(conn->sock);
1190
0
}
1191
1192
static ptls_log_conn_state_t *log_state(h2o_conn_t *_conn)
1193
0
{
1194
0
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
1195
0
    return h2o_socket_log_state(conn->sock);
1196
0
}
1197
1198
static int can_zerocopy(h2o_conn_t *_conn)
1199
2.08k
{
1200
2.08k
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
1201
2.08k
    return conn->sock->ssl == NULL || h2o_socket_can_tls_offload(conn->sock);
1202
2.08k
}
1203
1204
static uint64_t get_req_id(h2o_req_t *req)
1205
0
{
1206
0
    struct st_h2o_http1_conn_t *conn = H2O_STRUCT_FROM_MEMBER(struct st_h2o_http1_conn_t, req, req);
1207
0
    return conn->_req_index;
1208
0
}
1209
1210
static h2o_socket_t *steal_socket(h2o_conn_t *_conn)
1211
0
{
1212
0
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
1213
0
    h2o_socket_t *sock = conn->sock;
1214
1215
0
    if (sock->ssl != NULL)
1216
0
        return NULL;
1217
1218
0
    close_connection(conn, 0);
1219
0
    return sock;
1220
0
}
1221
1222
#define DEFINE_LOGGER(name)                                                                                                        \
1223
    static h2o_iovec_t log_##name(h2o_req_t *req)                                                                                  \
1224
0
    {                                                                                                                              \
1225
0
        struct st_h2o_http1_conn_t *conn = (void *)req->conn;                                                                      \
1226
0
        return h2o_socket_log_##name(conn->sock, &req->pool);                                                                      \
1227
0
    }
Unexecuted instantiation: http1.c:log_tcp_congestion_controller
Unexecuted instantiation: http1.c:log_tcp_delivery_rate
Unexecuted instantiation: http1.c:log_ssl_protocol_version
Unexecuted instantiation: http1.c:log_ssl_session_reused
Unexecuted instantiation: http1.c:log_ssl_cipher
Unexecuted instantiation: http1.c:log_ssl_cipher_bits
Unexecuted instantiation: http1.c:log_ssl_session_id
Unexecuted instantiation: http1.c:log_ssl_negotiated_protocol
Unexecuted instantiation: http1.c:log_ssl_ech_config_id
Unexecuted instantiation: http1.c:log_ssl_ech_kem
Unexecuted instantiation: http1.c:log_ssl_ech_cipher
Unexecuted instantiation: http1.c:log_ssl_ech_cipher_bits
Unexecuted instantiation: http1.c:log_ssl_backend
1228
1229
DEFINE_LOGGER(tcp_congestion_controller)
1230
DEFINE_LOGGER(tcp_delivery_rate)
1231
DEFINE_LOGGER(ssl_protocol_version)
1232
DEFINE_LOGGER(ssl_session_reused)
1233
DEFINE_LOGGER(ssl_cipher)
1234
DEFINE_LOGGER(ssl_cipher_bits)
1235
DEFINE_LOGGER(ssl_session_id)
1236
DEFINE_LOGGER(ssl_negotiated_protocol)
1237
DEFINE_LOGGER(ssl_ech_config_id)
1238
DEFINE_LOGGER(ssl_ech_kem)
1239
DEFINE_LOGGER(ssl_ech_cipher)
1240
DEFINE_LOGGER(ssl_ech_cipher_bits)
1241
DEFINE_LOGGER(ssl_backend)
1242
1243
#undef DEFINE_LOGGER
1244
1245
static h2o_iovec_t log_request_index(h2o_req_t *req)
1246
0
{
1247
0
    struct st_h2o_http1_conn_t *conn = (void *)req->conn;
1248
0
    char *s = h2o_mem_alloc_pool(&req->pool, char, sizeof(H2O_UINT64_LONGEST_STR));
1249
0
    size_t len = sprintf(s, "%" PRIu64, conn->_req_index);
1250
0
    return h2o_iovec_init(s, len);
1251
0
}
1252
1253
static int foreach_request(h2o_conn_t *_conn, int (*cb)(h2o_req_t *req, void *cbdata), void *cbdata)
1254
0
{
1255
0
    struct st_h2o_http1_conn_t *conn = (void *)_conn;
1256
0
    return cb(&conn->req, cbdata);
1257
0
}
1258
1259
static void initiate_graceful_shutdown(h2o_conn_t *_conn)
1260
0
{
1261
    /* note: nothing special needs to be done for handling graceful shutdown */
1262
0
}
1263
1264
static const h2o_conn_callbacks_t h1_callbacks = {
1265
    .get_sockname = get_sockname,
1266
    .get_peername = get_peername,
1267
    .get_ptls = get_ptls,
1268
    .get_ssl_server_name = get_ssl_server_name,
1269
    .log_state = log_state,
1270
    .close_idle_connection = close_idle_connection,
1271
    .foreach_request = foreach_request,
1272
    .request_shutdown = initiate_graceful_shutdown,
1273
    .can_zerocopy = can_zerocopy,
1274
    .get_req_id = get_req_id,
1275
    .steal_socket = steal_socket,
1276
    .log_ = {{
1277
        .transport =
1278
            {
1279
                .cc_name = log_tcp_congestion_controller,
1280
                .delivery_rate = log_tcp_delivery_rate,
1281
            },
1282
        .ssl =
1283
            {
1284
                .protocol_version = log_ssl_protocol_version,
1285
                .session_reused = log_ssl_session_reused,
1286
                .cipher = log_ssl_cipher,
1287
                .cipher_bits = log_ssl_cipher_bits,
1288
                .session_id = log_ssl_session_id,
1289
                .negotiated_protocol = log_ssl_negotiated_protocol,
1290
                .ech_config_id = log_ssl_ech_config_id,
1291
                .ech_kem = log_ssl_ech_kem,
1292
                .ech_cipher = log_ssl_ech_cipher,
1293
                .ech_cipher_bits = log_ssl_ech_cipher_bits,
1294
                .backend = log_ssl_backend,
1295
            },
1296
        .http1 =
1297
            {
1298
                .request_index = log_request_index,
1299
            },
1300
    }},
1301
};
1302
1303
static int conn_is_h1(h2o_conn_t *conn)
1304
102
{
1305
102
    return conn->callbacks == &h1_callbacks;
1306
102
}
1307
1308
void h2o_http1_accept(h2o_accept_ctx_t *ctx, h2o_socket_t *sock, struct timeval connected_at)
1309
9.35k
{
1310
9.35k
    struct st_h2o_http1_conn_t *conn =
1311
9.35k
        (void *)h2o_create_connection(sizeof(*conn), ctx->ctx, ctx->hosts, connected_at, &h1_callbacks);
1312
1313
    /* zero-fill all properties expect req */
1314
9.35k
    memset((char *)conn + sizeof(conn->super), 0, offsetof(struct st_h2o_http1_conn_t, req) - sizeof(conn->super));
1315
1316
    /* init properties that need to be non-zero */
1317
9.35k
    conn->sock = sock;
1318
9.35k
    sock->data = conn;
1319
1320
9.35k
    H2O_PROBE_CONN(H1_ACCEPT, &conn->super, conn->sock, &conn->super, h2o_conn_get_uuid(&conn->super));
1321
9.35k
    H2O_LOG_CONN(h1_accept, &conn->super, {
1322
9.35k
        PTLS_LOG_ELEMENT_PTR(sock, conn->sock);
1323
9.35k
        PTLS_LOG_ELEMENT_SAFESTR(uuid, h2o_conn_get_uuid(&conn->super));
1324
9.35k
    });
1325
1326
9.35k
    init_request(conn);
1327
9.35k
    reqread_start(conn);
1328
9.35k
}
1329
1330
void h2o_http1_upgrade(h2o_req_t *req, h2o_iovec_t *inbufs, size_t inbufcnt, h2o_http1_upgrade_cb on_complete, void *user_data)
1331
102
{
1332
1333
102
    assert(conn_is_h1(req->conn));
1334
102
    struct st_h2o_http1_conn_t *conn = (void *)req->conn;
1335
1336
102
    h2o_iovec_t *bufs = alloca(sizeof(h2o_iovec_t) * (inbufcnt + 1));
1337
1338
102
    conn->upgrade.data = user_data;
1339
102
    conn->upgrade.cb = on_complete;
1340
1341
102
    bufs[0].base = h2o_mem_alloc_pool(
1342
102
        &conn->req.pool, char,
1343
102
        flatten_headers_estimate_size(&conn->req, conn->super.ctx->globalconf->server_name.len + sizeof("upgrade") - 1));
1344
102
    bufs[0].len = flatten_headers(bufs[0].base, &conn->req, conn->req.res.status == 101 ? "upgrade" : "close");
1345
102
    h2o_memcpy(bufs + 1, inbufs, sizeof(h2o_iovec_t) * inbufcnt);
1346
1347
102
    h2o_socket_write(conn->sock, bufs, inbufcnt + 1, on_upgrade_complete);
1348
102
}