2012-06-04 16:48:31 +02:00
|
|
|
/*
|
2013-07-12 17:19:03 +02:00
|
|
|
* nghttp2 - HTTP/2.0 C Library
|
2012-06-04 16:48:31 +02:00
|
|
|
*
|
|
|
|
* Copyright (c) 2012 Tatsuhiro Tsujikawa
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
* a copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
#include "shrpx_https_upstream.h"
|
|
|
|
|
|
|
|
#include <cassert>
|
|
|
|
#include <set>
|
2012-11-23 13:30:17 +01:00
|
|
|
#include <sstream>
|
2012-06-04 16:48:31 +02:00
|
|
|
|
|
|
|
#include "shrpx_client_handler.h"
|
|
|
|
#include "shrpx_downstream.h"
|
2012-06-09 16:14:00 +02:00
|
|
|
#include "shrpx_downstream_connection.h"
|
2012-11-18 13:23:13 +01:00
|
|
|
#include "shrpx_spdy_downstream_connection.h"
|
2012-06-04 16:48:31 +02:00
|
|
|
#include "shrpx_http.h"
|
|
|
|
#include "shrpx_config.h"
|
|
|
|
#include "shrpx_error.h"
|
2012-12-09 15:19:48 +01:00
|
|
|
#include "shrpx_accesslog.h"
|
2012-06-04 16:48:31 +02:00
|
|
|
#include "util.h"
|
|
|
|
|
2013-07-12 17:19:03 +02:00
|
|
|
using namespace nghttp2;
|
2012-06-04 16:48:31 +02:00
|
|
|
|
|
|
|
namespace shrpx {
|
|
|
|
|
2012-06-04 20:11:43 +02:00
|
|
|
namespace {
|
2012-06-09 16:14:00 +02:00
|
|
|
const size_t SHRPX_HTTPS_UPSTREAM_OUTPUT_UPPER_THRES = 64*1024;
|
2012-06-05 15:13:22 +02:00
|
|
|
const size_t SHRPX_HTTPS_MAX_HEADER_LENGTH = 64*1024;
|
2012-06-04 20:11:43 +02:00
|
|
|
} // namespace
|
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
HttpsUpstream::HttpsUpstream(ClientHandler *handler)
|
|
|
|
: handler_(handler),
|
2012-07-11 11:32:04 +02:00
|
|
|
htp_(new http_parser()),
|
2012-06-05 15:13:22 +02:00
|
|
|
current_header_length_(0),
|
2012-09-20 15:28:40 +02:00
|
|
|
downstream_(0),
|
2012-06-04 20:11:43 +02:00
|
|
|
ioctrl_(handler->get_bev())
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
2012-07-11 11:32:04 +02:00
|
|
|
http_parser_init(htp_, HTTP_REQUEST);
|
|
|
|
htp_->data = this;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
HttpsUpstream::~HttpsUpstream()
|
|
|
|
{
|
2012-07-14 20:32:05 +02:00
|
|
|
delete htp_;
|
2012-09-20 15:28:40 +02:00
|
|
|
delete downstream_;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2012-06-05 15:13:22 +02:00
|
|
|
void HttpsUpstream::reset_current_header_length()
|
|
|
|
{
|
|
|
|
current_header_length_ = 0;
|
|
|
|
}
|
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
namespace {
|
2012-07-11 11:32:04 +02:00
|
|
|
int htp_msg_begin(http_parser *htp)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
|
|
|
HttpsUpstream *upstream;
|
2012-07-11 11:32:04 +02:00
|
|
|
upstream = reinterpret_cast<HttpsUpstream*>(htp->data);
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(INFO, upstream) << "HTTP request started";
|
2012-07-11 09:20:16 +02:00
|
|
|
}
|
2012-06-05 15:13:22 +02:00
|
|
|
upstream->reset_current_header_length();
|
2012-06-09 16:14:00 +02:00
|
|
|
Downstream *downstream = new Downstream(upstream, 0, 0);
|
2012-09-20 15:28:40 +02:00
|
|
|
upstream->attach_downstream(downstream);
|
2012-06-04 16:48:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
2012-07-11 11:32:04 +02:00
|
|
|
int htp_uricb(http_parser *htp, const char *data, size_t len)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
|
|
|
HttpsUpstream *upstream;
|
2012-07-11 11:32:04 +02:00
|
|
|
upstream = reinterpret_cast<HttpsUpstream*>(htp->data);
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = upstream->get_downstream();
|
2012-07-11 11:32:04 +02:00
|
|
|
downstream->append_request_path(data, len);
|
2012-06-04 16:48:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
2012-07-11 11:32:04 +02:00
|
|
|
int htp_hdr_keycb(http_parser *htp, const char *data, size_t len)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
|
|
|
HttpsUpstream *upstream;
|
2012-07-11 11:32:04 +02:00
|
|
|
upstream = reinterpret_cast<HttpsUpstream*>(htp->data);
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = upstream->get_downstream();
|
2012-07-11 11:32:04 +02:00
|
|
|
if(downstream->get_request_header_key_prev()) {
|
|
|
|
downstream->append_last_request_header_key(data, len);
|
|
|
|
} else {
|
|
|
|
downstream->add_request_header(std::string(data, len), "");
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
2012-07-11 11:32:04 +02:00
|
|
|
int htp_hdr_valcb(http_parser *htp, const char *data, size_t len)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
|
|
|
HttpsUpstream *upstream;
|
2012-07-11 11:32:04 +02:00
|
|
|
upstream = reinterpret_cast<HttpsUpstream*>(htp->data);
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = upstream->get_downstream();
|
2012-07-11 11:32:04 +02:00
|
|
|
if(downstream->get_request_header_key_prev()) {
|
|
|
|
downstream->set_last_request_header_value(std::string(data, len));
|
|
|
|
} else {
|
|
|
|
downstream->append_last_request_header_value(data, len);
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
2012-07-11 11:32:04 +02:00
|
|
|
int htp_hdrs_completecb(http_parser *htp)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
2012-11-21 14:10:35 +01:00
|
|
|
int rv;
|
2012-06-04 16:48:31 +02:00
|
|
|
HttpsUpstream *upstream;
|
2012-07-11 11:32:04 +02:00
|
|
|
upstream = reinterpret_cast<HttpsUpstream*>(htp->data);
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(INFO, upstream) << "HTTP request headers completed";
|
2012-07-11 09:20:16 +02:00
|
|
|
}
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = upstream->get_downstream();
|
2012-06-04 16:48:31 +02:00
|
|
|
|
2012-07-11 11:32:04 +02:00
|
|
|
downstream->set_request_method(http_method_str((enum http_method)htp->method));
|
|
|
|
downstream->set_request_major(htp->http_major);
|
|
|
|
downstream->set_request_minor(htp->http_minor);
|
2012-06-06 17:43:18 +02:00
|
|
|
|
2012-07-11 11:32:04 +02:00
|
|
|
downstream->set_request_connection_close(!http_should_keep_alive(htp));
|
2012-07-11 09:20:16 +02:00
|
|
|
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-11-23 13:30:17 +01:00
|
|
|
std::stringstream ss;
|
|
|
|
ss << downstream->get_request_method() << " "
|
|
|
|
<< downstream->get_request_path() << " "
|
|
|
|
<< "HTTP/" << downstream->get_request_major() << "."
|
|
|
|
<< downstream->get_request_minor() << "\n";
|
|
|
|
const Headers& headers = downstream->get_request_headers();
|
|
|
|
for(size_t i = 0; i < headers.size(); ++i) {
|
2012-12-09 13:36:02 +01:00
|
|
|
ss << TTY_HTTP_HD << headers[i].first << TTY_RST << ": "
|
|
|
|
<< headers[i].second << "\n";
|
2012-11-23 13:30:17 +01:00
|
|
|
}
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(INFO, upstream) << "HTTP request headers\n" << ss.str();
|
2012-11-23 13:30:17 +01:00
|
|
|
}
|
|
|
|
|
2012-11-21 14:10:35 +01:00
|
|
|
if(get_config()->client_proxy &&
|
|
|
|
downstream->get_request_method() != "CONNECT") {
|
|
|
|
// Make sure that request path is an absolute URI.
|
|
|
|
http_parser_url u;
|
|
|
|
const char *url = downstream->get_request_path().c_str();
|
|
|
|
memset(&u, 0, sizeof(u));
|
|
|
|
rv = http_parser_parse_url(url,
|
|
|
|
downstream->get_request_path().size(),
|
|
|
|
0, &u);
|
|
|
|
if(rv != 0 || !(u.field_set & (1 << UF_SCHEMA))) {
|
|
|
|
// Expect to respond with 400 bad request
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-06-09 16:14:00 +02:00
|
|
|
DownstreamConnection *dconn;
|
|
|
|
dconn = upstream->get_client_handler()->get_downstream_connection();
|
2012-06-04 16:48:31 +02:00
|
|
|
|
2012-06-09 19:33:34 +02:00
|
|
|
if(downstream->get_expect_100_continue()) {
|
|
|
|
static const char reply_100[] = "HTTP/1.1 100 Continue\r\n\r\n";
|
2012-07-16 16:29:48 +02:00
|
|
|
if(bufferevent_write(upstream->get_client_handler()->get_bev(),
|
|
|
|
reply_100, sizeof(reply_100)-1) != 0) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(FATAL, upstream) << "bufferevent_write() faild";
|
2013-01-25 13:26:03 +01:00
|
|
|
delete dconn;
|
2012-07-16 16:29:48 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2012-06-09 19:33:34 +02:00
|
|
|
}
|
|
|
|
|
2012-11-21 14:10:35 +01:00
|
|
|
rv = dconn->attach_downstream(downstream);
|
2012-06-09 16:14:00 +02:00
|
|
|
if(rv != 0) {
|
|
|
|
downstream->set_request_state(Downstream::CONNECT_FAIL);
|
|
|
|
downstream->set_downstream_connection(0);
|
|
|
|
delete dconn;
|
2012-07-16 16:29:48 +02:00
|
|
|
return -1;
|
2012-06-09 16:14:00 +02:00
|
|
|
} else {
|
2012-07-16 17:12:31 +02:00
|
|
|
rv = downstream->push_request_headers();
|
|
|
|
if(rv != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
downstream->set_request_state(Downstream::HEADER_COMPLETE);
|
|
|
|
return 0;
|
2012-06-05 19:23:07 +02:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
2012-07-11 11:32:04 +02:00
|
|
|
int htp_bodycb(http_parser *htp, const char *data, size_t len)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
2012-07-16 17:12:31 +02:00
|
|
|
int rv;
|
2012-06-04 16:48:31 +02:00
|
|
|
HttpsUpstream *upstream;
|
2012-07-11 11:32:04 +02:00
|
|
|
upstream = reinterpret_cast<HttpsUpstream*>(htp->data);
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = upstream->get_downstream();
|
2012-07-16 17:12:31 +02:00
|
|
|
rv = downstream->push_upload_data_chunk
|
|
|
|
(reinterpret_cast<const uint8_t*>(data), len);
|
|
|
|
if(rv != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
2012-07-11 11:32:04 +02:00
|
|
|
int htp_msg_completecb(http_parser *htp)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
2012-07-16 17:12:31 +02:00
|
|
|
int rv;
|
2012-06-04 16:48:31 +02:00
|
|
|
HttpsUpstream *upstream;
|
2012-07-11 11:32:04 +02:00
|
|
|
upstream = reinterpret_cast<HttpsUpstream*>(htp->data);
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(INFO, upstream) << "HTTP request completed";
|
|
|
|
}
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = upstream->get_downstream();
|
2012-11-18 18:11:46 +01:00
|
|
|
downstream->set_request_state(Downstream::MSG_COMPLETE);
|
2012-07-16 17:12:31 +02:00
|
|
|
rv = downstream->end_upload_data();
|
|
|
|
if(rv != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
// Stop further processing to complete this request
|
2012-07-11 11:32:04 +02:00
|
|
|
http_parser_pause(htp, 1);
|
|
|
|
return 0;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
2012-07-11 11:32:04 +02:00
|
|
|
http_parser_settings htp_hooks = {
|
|
|
|
htp_msg_begin, /*http_cb on_message_begin;*/
|
|
|
|
htp_uricb, /*http_data_cb on_url;*/
|
2012-12-22 17:13:02 +01:00
|
|
|
0, /*http_cb on_status_complete */
|
2012-07-11 11:32:04 +02:00
|
|
|
htp_hdr_keycb, /*http_data_cb on_header_field;*/
|
|
|
|
htp_hdr_valcb, /*http_data_cb on_header_value;*/
|
|
|
|
htp_hdrs_completecb, /*http_cb on_headers_complete;*/
|
|
|
|
htp_bodycb, /*http_data_cb on_body;*/
|
|
|
|
htp_msg_completecb /*http_cb on_message_complete;*/
|
2012-06-04 16:48:31 +02:00
|
|
|
};
|
|
|
|
} // namespace
|
|
|
|
|
2012-07-11 11:32:04 +02:00
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
// on_read() does not consume all available data in input buffer if
|
|
|
|
// one http request is fully received.
|
|
|
|
int HttpsUpstream::on_read()
|
|
|
|
{
|
|
|
|
bufferevent *bev = handler_->get_bev();
|
|
|
|
evbuffer *input = bufferevent_get_input(bev);
|
2012-07-11 09:20:16 +02:00
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
unsigned char *mem = evbuffer_pullup(input, -1);
|
2012-07-11 09:20:16 +02:00
|
|
|
|
2012-07-11 11:32:04 +02:00
|
|
|
if(evbuffer_get_length(input) == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t nread = http_parser_execute(htp_, &htp_hooks,
|
|
|
|
reinterpret_cast<const char*>(mem),
|
|
|
|
evbuffer_get_length(input));
|
2012-06-04 16:48:31 +02:00
|
|
|
evbuffer_drain(input, nread);
|
2012-06-05 15:13:22 +02:00
|
|
|
// Well, actually header length + some body bytes
|
|
|
|
current_header_length_ += nread;
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = get_downstream();
|
2012-11-18 18:11:46 +01:00
|
|
|
|
2012-07-11 11:32:04 +02:00
|
|
|
http_errno htperr = HTTP_PARSER_ERRNO(htp_);
|
|
|
|
if(htperr == HPE_PAUSED) {
|
2012-06-09 16:14:00 +02:00
|
|
|
if(downstream->get_request_state() == Downstream::CONNECT_FAIL) {
|
2012-06-05 19:23:07 +02:00
|
|
|
get_client_handler()->set_should_close_after_write(true);
|
2012-11-18 18:11:46 +01:00
|
|
|
// Following paues_read is needed to avoid reading next data.
|
|
|
|
pause_read(SHRPX_MSG_BLOCK);
|
2012-07-16 16:29:48 +02:00
|
|
|
if(error_reply(503) != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
// Downstream gets deleted after response body is read.
|
|
|
|
} else {
|
|
|
|
assert(downstream->get_request_state() == Downstream::MSG_COMPLETE);
|
|
|
|
if(downstream->get_downstream_connection() == 0) {
|
2012-11-18 13:23:13 +01:00
|
|
|
// Error response has already be sent
|
2012-06-09 16:14:00 +02:00
|
|
|
assert(downstream->get_response_state() == Downstream::MSG_COMPLETE);
|
2012-09-20 15:28:40 +02:00
|
|
|
delete_downstream();
|
2012-06-09 16:14:00 +02:00
|
|
|
} else {
|
|
|
|
pause_read(SHRPX_MSG_BLOCK);
|
|
|
|
}
|
|
|
|
}
|
2012-07-11 11:32:04 +02:00
|
|
|
} else if(htperr == HPE_OK) {
|
2012-06-09 17:30:44 +02:00
|
|
|
// downstream can be NULL here.
|
2012-06-09 17:49:33 +02:00
|
|
|
if(downstream) {
|
|
|
|
if(downstream->get_request_state() == Downstream::INITIAL &&
|
|
|
|
current_header_length_ > SHRPX_HTTPS_MAX_HEADER_LENGTH) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(WARNING, this) << "Request Header too long:"
|
|
|
|
<< current_header_length_
|
|
|
|
<< " bytes";
|
2012-06-09 17:49:33 +02:00
|
|
|
get_client_handler()->set_should_close_after_write(true);
|
2012-11-18 18:11:46 +01:00
|
|
|
pause_read(SHRPX_MSG_BLOCK);
|
2012-07-16 16:29:48 +02:00
|
|
|
if(error_reply(400) != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2012-06-09 17:49:33 +02:00
|
|
|
} else if(downstream->get_output_buffer_full()) {
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(INFO, this) << "Downstream output buffer is full";
|
2012-06-09 17:49:33 +02:00
|
|
|
}
|
|
|
|
pause_read(SHRPX_NO_BUFFER);
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
} else {
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(INFO, this) << "HTTP parse failure: "
|
|
|
|
<< "(" << http_errno_name(htperr) << ") "
|
|
|
|
<< http_errno_description(htperr);
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2012-06-05 15:13:22 +02:00
|
|
|
get_client_handler()->set_should_close_after_write(true);
|
2012-11-18 18:11:46 +01:00
|
|
|
pause_read(SHRPX_MSG_BLOCK);
|
2012-07-16 16:29:48 +02:00
|
|
|
if(error_reply(400) != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-06-04 20:11:43 +02:00
|
|
|
int HttpsUpstream::on_write()
|
|
|
|
{
|
2012-11-21 15:47:48 +01:00
|
|
|
int rv = 0;
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = get_downstream();
|
2012-06-04 20:11:43 +02:00
|
|
|
if(downstream) {
|
2013-02-08 13:46:58 +01:00
|
|
|
rv = downstream->resume_read(SHRPX_NO_BUFFER);
|
2012-06-04 20:11:43 +02:00
|
|
|
}
|
2012-11-21 15:47:48 +01:00
|
|
|
return rv;
|
2012-06-04 20:11:43 +02:00
|
|
|
}
|
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
int HttpsUpstream::on_event()
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ClientHandler* HttpsUpstream::get_client_handler() const
|
|
|
|
{
|
|
|
|
return handler_;
|
|
|
|
}
|
|
|
|
|
2012-06-04 20:11:43 +02:00
|
|
|
void HttpsUpstream::pause_read(IOCtrlReason reason)
|
|
|
|
{
|
|
|
|
ioctrl_.pause_read(reason);
|
|
|
|
}
|
|
|
|
|
2013-02-08 13:46:58 +01:00
|
|
|
int HttpsUpstream::resume_read(IOCtrlReason reason, Downstream *downstream)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
2012-06-04 20:11:43 +02:00
|
|
|
if(ioctrl_.resume_read(reason)) {
|
|
|
|
// Process remaining data in input buffer here because these bytes
|
|
|
|
// are not notified by readcb until new data arrive.
|
2012-07-11 11:32:04 +02:00
|
|
|
http_parser_pause(htp_, 0);
|
2012-11-20 17:29:39 +01:00
|
|
|
return on_read();
|
|
|
|
} else {
|
|
|
|
return 0;
|
2012-06-04 20:11:43 +02:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
void https_downstream_readcb(bufferevent *bev, void *ptr)
|
|
|
|
{
|
2012-06-09 16:14:00 +02:00
|
|
|
DownstreamConnection *dconn = reinterpret_cast<DownstreamConnection*>(ptr);
|
|
|
|
Downstream *downstream = dconn->get_downstream();
|
2012-06-04 16:48:31 +02:00
|
|
|
HttpsUpstream *upstream;
|
|
|
|
upstream = static_cast<HttpsUpstream*>(downstream->get_upstream());
|
2012-11-18 13:23:13 +01:00
|
|
|
int rv;
|
2012-11-20 17:29:39 +01:00
|
|
|
rv = downstream->on_read();
|
|
|
|
if(downstream->get_response_state() == Downstream::MSG_RESET) {
|
|
|
|
delete upstream->get_client_handler();
|
|
|
|
} else if(rv == 0) {
|
2012-06-04 16:48:31 +02:00
|
|
|
if(downstream->get_response_state() == Downstream::MSG_COMPLETE) {
|
2012-06-07 16:42:11 +02:00
|
|
|
if(downstream->get_response_connection_close()) {
|
2012-06-09 16:14:00 +02:00
|
|
|
// Connection close
|
|
|
|
downstream->set_downstream_connection(0);
|
|
|
|
delete dconn;
|
|
|
|
dconn = 0;
|
|
|
|
} else {
|
|
|
|
// Keep-alive
|
|
|
|
dconn->detach_downstream(downstream);
|
|
|
|
}
|
2013-02-11 09:20:52 +01:00
|
|
|
ClientHandler *handler = upstream->get_client_handler();
|
2012-06-09 16:14:00 +02:00
|
|
|
if(downstream->get_request_state() == Downstream::MSG_COMPLETE) {
|
2012-07-11 09:20:16 +02:00
|
|
|
if(handler->get_should_close_after_write() &&
|
|
|
|
handler->get_pending_write_length() == 0) {
|
|
|
|
// If all upstream response body has already written out to
|
|
|
|
// the peer, we cannot use writecb for ClientHandler. In
|
|
|
|
// this case, we just delete handler here.
|
|
|
|
delete handler;
|
|
|
|
return;
|
|
|
|
} else {
|
2012-09-20 15:28:40 +02:00
|
|
|
upstream->delete_downstream();
|
2012-07-11 09:20:16 +02:00
|
|
|
// Process next HTTP request
|
2013-02-09 09:03:03 +01:00
|
|
|
if(upstream->resume_read(SHRPX_MSG_BLOCK, 0) == -1) {
|
|
|
|
return;
|
|
|
|
}
|
2012-07-11 09:20:16 +02:00
|
|
|
}
|
2013-02-11 09:20:52 +01:00
|
|
|
} else if(downstream->tunnel_established()) {
|
|
|
|
// This path is effectively only taken for SPDY downstream
|
|
|
|
// because only SPDY downstream sets response_state to
|
|
|
|
// MSG_COMPLETE and this function. For HTTP downstream, EOF
|
|
|
|
// from tunnel connection is handled on
|
|
|
|
// https_downstream_eventcb.
|
|
|
|
//
|
|
|
|
// Tunneled connection always indicates connection close.
|
|
|
|
if(handler->get_pending_write_length() == 0) {
|
|
|
|
// For tunneled connection, if there is no pending data,
|
|
|
|
// delete handler because on_write will not be called.
|
|
|
|
delete handler;
|
|
|
|
} else {
|
|
|
|
if(LOG_ENABLED(INFO)) {
|
|
|
|
DLOG(INFO, downstream) << "Tunneled connection has pending data";
|
|
|
|
}
|
|
|
|
}
|
2012-06-07 16:42:11 +02:00
|
|
|
}
|
2012-06-04 20:11:43 +02:00
|
|
|
} else {
|
|
|
|
ClientHandler *handler = upstream->get_client_handler();
|
|
|
|
bufferevent *bev = handler->get_bev();
|
|
|
|
size_t outputlen = evbuffer_get_length(bufferevent_get_output(bev));
|
|
|
|
if(outputlen > SHRPX_HTTPS_UPSTREAM_OUTPUT_UPPER_THRES) {
|
|
|
|
downstream->pause_read(SHRPX_NO_BUFFER);
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if(downstream->get_response_state() == Downstream::HEADER_COMPLETE) {
|
2012-06-09 16:14:00 +02:00
|
|
|
// We already sent HTTP response headers to upstream
|
|
|
|
// client. Just close the upstream connection.
|
2012-06-04 16:48:31 +02:00
|
|
|
delete upstream->get_client_handler();
|
|
|
|
} else {
|
2012-06-09 16:14:00 +02:00
|
|
|
// We did not sent any HTTP response, so sent error
|
|
|
|
// response. Cannot reuse downstream connection in this case.
|
2012-07-16 16:29:48 +02:00
|
|
|
if(upstream->error_reply(502) != 0) {
|
|
|
|
delete upstream->get_client_handler();
|
|
|
|
return;
|
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
if(downstream->get_request_state() == Downstream::MSG_COMPLETE) {
|
2012-09-20 15:28:40 +02:00
|
|
|
upstream->delete_downstream();
|
2012-06-09 16:14:00 +02:00
|
|
|
// Process next HTTP request
|
2013-02-09 09:03:03 +01:00
|
|
|
if(upstream->resume_read(SHRPX_MSG_BLOCK, 0) == -1) {
|
|
|
|
return;
|
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
void https_downstream_writecb(bufferevent *bev, void *ptr)
|
|
|
|
{
|
2012-11-21 19:13:30 +01:00
|
|
|
if(evbuffer_get_length(bufferevent_get_output(bev)) > 0) {
|
|
|
|
return;
|
|
|
|
}
|
2012-06-09 17:49:33 +02:00
|
|
|
DownstreamConnection *dconn = reinterpret_cast<DownstreamConnection*>(ptr);
|
|
|
|
Downstream *downstream = dconn->get_downstream();
|
|
|
|
HttpsUpstream *upstream;
|
|
|
|
upstream = static_cast<HttpsUpstream*>(downstream->get_upstream());
|
2013-02-09 09:03:03 +01:00
|
|
|
// May return -1
|
2013-02-08 13:46:58 +01:00
|
|
|
upstream->resume_read(SHRPX_NO_BUFFER, downstream);
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
void https_downstream_eventcb(bufferevent *bev, short events, void *ptr)
|
|
|
|
{
|
2012-06-09 16:14:00 +02:00
|
|
|
DownstreamConnection *dconn = reinterpret_cast<DownstreamConnection*>(ptr);
|
|
|
|
Downstream *downstream = dconn->get_downstream();
|
2012-06-04 16:48:31 +02:00
|
|
|
HttpsUpstream *upstream;
|
|
|
|
upstream = static_cast<HttpsUpstream*>(downstream->get_upstream());
|
|
|
|
if(events & BEV_EVENT_CONNECTED) {
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
DCLOG(INFO, dconn) << "Connection established";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2012-06-07 16:42:11 +02:00
|
|
|
} else if(events & BEV_EVENT_EOF) {
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
DCLOG(INFO, dconn) << "EOF";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2012-06-07 17:39:55 +02:00
|
|
|
if(downstream->get_response_state() == Downstream::HEADER_COMPLETE) {
|
|
|
|
// Server may indicate the end of the request by EOF
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
DCLOG(INFO, dconn) << "The end of the response body was indicated by "
|
|
|
|
<< "EOF";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2012-06-07 17:39:55 +02:00
|
|
|
upstream->on_downstream_body_complete(downstream);
|
2012-07-11 09:20:16 +02:00
|
|
|
downstream->set_response_state(Downstream::MSG_COMPLETE);
|
|
|
|
|
|
|
|
ClientHandler *handler = upstream->get_client_handler();
|
|
|
|
if(handler->get_should_close_after_write() &&
|
|
|
|
handler->get_pending_write_length() == 0) {
|
|
|
|
// If all upstream response body has already written out to
|
|
|
|
// the peer, we cannot use writecb for ClientHandler. In this
|
|
|
|
// case, we just delete handler here.
|
|
|
|
delete handler;
|
|
|
|
return;
|
|
|
|
}
|
2012-06-07 17:39:55 +02:00
|
|
|
} else if(downstream->get_response_state() == Downstream::MSG_COMPLETE) {
|
|
|
|
// Nothing to do
|
|
|
|
} else {
|
|
|
|
// error
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
DCLOG(INFO, dconn) << "Treated as error";
|
2012-06-07 17:39:55 +02:00
|
|
|
}
|
2012-07-16 16:29:48 +02:00
|
|
|
if(upstream->error_reply(502) != 0) {
|
|
|
|
delete upstream->get_client_handler();
|
|
|
|
return;
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
if(downstream->get_request_state() == Downstream::MSG_COMPLETE) {
|
2012-09-20 15:28:40 +02:00
|
|
|
upstream->delete_downstream();
|
2013-02-09 09:03:03 +01:00
|
|
|
if(upstream->resume_read(SHRPX_MSG_BLOCK, 0) == -1) {
|
|
|
|
return;
|
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
} else if(events & (BEV_EVENT_ERROR | BEV_EVENT_TIMEOUT)) {
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
if(events & BEV_EVENT_ERROR) {
|
|
|
|
DCLOG(INFO, dconn) << "Network error";
|
|
|
|
} else {
|
|
|
|
DCLOG(INFO, dconn) << "Timeout";
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
if(downstream->get_response_state() == Downstream::INITIAL) {
|
|
|
|
int status;
|
|
|
|
if(events & BEV_EVENT_TIMEOUT) {
|
|
|
|
status = 504;
|
|
|
|
} else {
|
|
|
|
status = 502;
|
|
|
|
}
|
2012-07-16 16:29:48 +02:00
|
|
|
if(upstream->error_reply(status) != 0) {
|
|
|
|
delete upstream->get_client_handler();
|
|
|
|
return;
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
if(downstream->get_request_state() == Downstream::MSG_COMPLETE) {
|
2012-09-20 15:28:40 +02:00
|
|
|
upstream->delete_downstream();
|
2013-02-09 09:03:03 +01:00
|
|
|
if(upstream->resume_read(SHRPX_MSG_BLOCK, 0) == -1) {
|
|
|
|
return;
|
|
|
|
}
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
2012-07-16 16:29:48 +02:00
|
|
|
int HttpsUpstream::error_reply(int status_code)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
|
|
|
std::string html = http::create_error_html(status_code);
|
2013-01-16 14:51:33 +01:00
|
|
|
std::string header;
|
|
|
|
header.reserve(512);
|
|
|
|
header += "HTTP/1.1 ";
|
|
|
|
header += http::get_status_string(status_code);
|
|
|
|
header += "\r\nServer: ";
|
|
|
|
header += get_config()->server_name;
|
|
|
|
header += "\r\nContent-Length: ";
|
|
|
|
header += util::utos(html.size());
|
|
|
|
header += "\r\nContent-Type: text/html; charset=UTF-8\r\n";
|
2012-06-05 15:13:22 +02:00
|
|
|
if(get_client_handler()->get_should_close_after_write()) {
|
2013-01-16 14:51:33 +01:00
|
|
|
header += "Connection: close\r\n";
|
2012-06-05 15:13:22 +02:00
|
|
|
}
|
2013-01-16 14:51:33 +01:00
|
|
|
header += "\r\n";
|
2012-06-04 16:48:31 +02:00
|
|
|
evbuffer *output = bufferevent_get_output(handler_->get_bev());
|
2012-07-16 16:29:48 +02:00
|
|
|
if(evbuffer_add(output, header.c_str(), header.size()) != 0 ||
|
|
|
|
evbuffer_add(output, html.c_str(), html.size()) != 0) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(FATAL, this) << "evbuffer_add() failed";
|
2012-07-16 16:29:48 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream *downstream = get_downstream();
|
2012-06-09 16:14:00 +02:00
|
|
|
if(downstream) {
|
|
|
|
downstream->set_response_state(Downstream::MSG_COMPLETE);
|
|
|
|
}
|
2012-12-09 15:19:48 +01:00
|
|
|
if(get_config()->accesslog) {
|
|
|
|
upstream_response(this->get_client_handler()->get_ipaddr(), status_code,
|
|
|
|
downstream);
|
|
|
|
}
|
2012-07-16 16:29:48 +02:00
|
|
|
return 0;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
bufferevent_data_cb HttpsUpstream::get_downstream_readcb()
|
|
|
|
{
|
|
|
|
return https_downstream_readcb;
|
|
|
|
}
|
|
|
|
|
|
|
|
bufferevent_data_cb HttpsUpstream::get_downstream_writecb()
|
|
|
|
{
|
|
|
|
return https_downstream_writecb;
|
|
|
|
}
|
|
|
|
|
|
|
|
bufferevent_event_cb HttpsUpstream::get_downstream_eventcb()
|
|
|
|
{
|
|
|
|
return https_downstream_eventcb;
|
|
|
|
}
|
|
|
|
|
2012-09-20 15:28:40 +02:00
|
|
|
void HttpsUpstream::attach_downstream(Downstream *downstream)
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
2012-09-20 15:28:40 +02:00
|
|
|
assert(!downstream_);
|
|
|
|
downstream_ = downstream;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2012-09-20 15:28:40 +02:00
|
|
|
void HttpsUpstream::delete_downstream()
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
2012-09-20 15:28:40 +02:00
|
|
|
delete downstream_;
|
|
|
|
downstream_ = 0;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2012-09-20 15:28:40 +02:00
|
|
|
Downstream* HttpsUpstream::get_downstream() const
|
2012-06-04 16:48:31 +02:00
|
|
|
{
|
2012-09-20 15:28:40 +02:00
|
|
|
return downstream_;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int HttpsUpstream::on_downstream_header_complete(Downstream *downstream)
|
|
|
|
{
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
DLOG(INFO, downstream) << "HTTP response header completed";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2013-02-01 15:30:12 +01:00
|
|
|
bool connection_upgrade = false;
|
2012-06-06 17:43:18 +02:00
|
|
|
std::string via_value;
|
2012-07-11 09:20:16 +02:00
|
|
|
char temp[16];
|
|
|
|
snprintf(temp, sizeof(temp), "HTTP/%d.%d ",
|
2012-09-20 15:36:17 +02:00
|
|
|
downstream->get_request_major(),
|
|
|
|
downstream->get_request_minor());
|
2012-07-11 09:20:16 +02:00
|
|
|
std::string hdrs = temp;
|
2012-06-04 16:48:31 +02:00
|
|
|
hdrs += http::get_status_string(downstream->get_response_http_status());
|
|
|
|
hdrs += "\r\n";
|
|
|
|
for(Headers::const_iterator i = downstream->get_response_headers().begin();
|
|
|
|
i != downstream->get_response_headers().end(); ++i) {
|
2013-02-01 15:30:12 +01:00
|
|
|
if(util::strieq((*i).first.c_str(), "connection")) {
|
|
|
|
if(util::strifind((*i).second.c_str(), "upgrade")) {
|
|
|
|
connection_upgrade = true;
|
|
|
|
}
|
|
|
|
} else if(util::strieq((*i).first.c_str(), "keep-alive") || // HTTP/1.0?
|
2012-06-04 16:48:31 +02:00
|
|
|
util:: strieq((*i).first.c_str(), "proxy-connection")) {
|
|
|
|
// These are ignored
|
2013-01-09 14:01:25 +01:00
|
|
|
} else if(!get_config()->no_via &&
|
|
|
|
util::strieq((*i).first.c_str(), "via")) {
|
2012-06-06 17:43:18 +02:00
|
|
|
via_value = (*i).second;
|
2012-06-04 16:48:31 +02:00
|
|
|
} else {
|
2012-06-06 17:43:18 +02:00
|
|
|
hdrs += (*i).first;
|
2012-11-18 13:23:13 +01:00
|
|
|
http::capitalize(hdrs, hdrs.size()-(*i).first.size());
|
2012-06-06 17:43:18 +02:00
|
|
|
hdrs += ": ";
|
|
|
|
hdrs += (*i).second;
|
2012-06-04 16:48:31 +02:00
|
|
|
hdrs += "\r\n";
|
|
|
|
}
|
|
|
|
}
|
2012-07-11 09:20:16 +02:00
|
|
|
|
2012-09-13 14:33:35 +02:00
|
|
|
// We check downstream->get_response_connection_close() in case when
|
|
|
|
// the Content-Length is not available.
|
|
|
|
if(!downstream->get_request_connection_close() &&
|
|
|
|
!downstream->get_response_connection_close()) {
|
|
|
|
if(downstream->get_request_major() <= 0 ||
|
|
|
|
downstream->get_request_minor() <= 0) {
|
|
|
|
// We add this header for HTTP/1.0 or HTTP/0.9 clients
|
2012-07-11 09:20:16 +02:00
|
|
|
hdrs += "Connection: Keep-Alive\r\n";
|
2013-02-01 15:30:12 +01:00
|
|
|
} else if(connection_upgrade) {
|
|
|
|
hdrs += "Connection: upgrade\r\n";
|
2012-07-11 09:20:16 +02:00
|
|
|
}
|
|
|
|
} else {
|
2012-09-13 14:33:35 +02:00
|
|
|
hdrs += "Connection: close\r\n";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2013-01-09 14:01:25 +01:00
|
|
|
if(!get_config()->no_via) {
|
|
|
|
hdrs += "Via: ";
|
|
|
|
if(!via_value.empty()) {
|
|
|
|
hdrs += via_value;
|
|
|
|
hdrs += ", ";
|
|
|
|
}
|
|
|
|
hdrs += http::create_via_header_value
|
|
|
|
(downstream->get_response_major(), downstream->get_response_minor());
|
|
|
|
hdrs += "\r\n";
|
2012-06-06 17:43:18 +02:00
|
|
|
}
|
2013-01-09 14:01:25 +01:00
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
hdrs += "\r\n";
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 13:36:02 +01:00
|
|
|
const char *hdrp;
|
|
|
|
std::string nhdrs;
|
|
|
|
if(get_config()->tty) {
|
|
|
|
nhdrs = http::colorizeHeaders(hdrs.c_str());
|
|
|
|
hdrp = nhdrs.c_str();
|
|
|
|
} else {
|
|
|
|
hdrp = hdrs.c_str();
|
|
|
|
}
|
|
|
|
ULOG(INFO, this) << "HTTP response headers\n" << hdrp;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
evbuffer *output = bufferevent_get_output(handler_->get_bev());
|
2012-07-16 16:55:08 +02:00
|
|
|
if(evbuffer_add(output, hdrs.c_str(), hdrs.size()) != 0) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(FATAL, this) << "evbuffer_add() failed";
|
2012-07-16 16:55:08 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2012-12-09 15:19:48 +01:00
|
|
|
if(get_config()->accesslog) {
|
|
|
|
upstream_response(this->get_client_handler()->get_ipaddr(),
|
|
|
|
downstream->get_response_http_status(), downstream);
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int HttpsUpstream::on_downstream_body(Downstream *downstream,
|
|
|
|
const uint8_t *data, size_t len)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
evbuffer *output = bufferevent_get_output(handler_->get_bev());
|
|
|
|
if(downstream->get_chunked_response()) {
|
|
|
|
char chunk_size_hex[16];
|
|
|
|
rv = snprintf(chunk_size_hex, sizeof(chunk_size_hex), "%X\r\n",
|
|
|
|
static_cast<unsigned int>(len));
|
2012-07-16 16:55:08 +02:00
|
|
|
if(evbuffer_add(output, chunk_size_hex, rv) != 0) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(FATAL, this) << "evbuffer_add() failed";
|
2012-07-16 16:55:08 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2013-01-25 14:00:33 +01:00
|
|
|
if(evbuffer_add(output, data, len) != 0) {
|
|
|
|
ULOG(FATAL, this) << "evbuffer_add() failed";
|
|
|
|
return -1;
|
|
|
|
}
|
2012-06-09 19:51:42 +02:00
|
|
|
if(downstream->get_chunked_response()) {
|
2013-01-25 14:00:33 +01:00
|
|
|
if(evbuffer_add(output, "\r\n", 2) != 0) {
|
|
|
|
ULOG(FATAL, this) << "evbuffer_add() failed";
|
|
|
|
return -1;
|
|
|
|
}
|
2012-06-09 19:51:42 +02:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int HttpsUpstream::on_downstream_body_complete(Downstream *downstream)
|
|
|
|
{
|
|
|
|
if(downstream->get_chunked_response()) {
|
|
|
|
evbuffer *output = bufferevent_get_output(handler_->get_bev());
|
2012-07-16 16:55:08 +02:00
|
|
|
if(evbuffer_add(output, "0\r\n\r\n", 5) != 0) {
|
2012-12-09 11:15:14 +01:00
|
|
|
ULOG(FATAL, this) << "evbuffer_add() failed";
|
2012-07-16 16:55:08 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2013-01-21 14:42:49 +01:00
|
|
|
if(LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
DLOG(INFO, downstream) << "HTTP response completed";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2012-09-13 14:33:35 +02:00
|
|
|
if(downstream->get_request_connection_close() ||
|
|
|
|
downstream->get_response_connection_close()) {
|
2012-07-11 09:20:16 +02:00
|
|
|
ClientHandler *handler = get_client_handler();
|
2012-06-04 16:48:31 +02:00
|
|
|
handler->set_should_close_after_write(true);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace shrpx
|