nghttp2/src/nghttp.cc

2055 lines
57 KiB
C++
Raw Normal View History

2013-07-21 16:49:12 +02:00
/*
2014-03-30 12:09:21 +02:00
* nghttp2 - HTTP/2 C Library
2013-07-21 16:49:12 +02:00
*
* Copyright (c) 2013 Tatsuhiro Tsujikawa
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated documentation files (the
* "Software"), to deal in the Software without restriction, including
* without limitation the rights to use, copy, modify, merge, publish,
* distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so, subject to
* the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
#include "nghttp2_config.h"
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <netdb.h>
#include <unistd.h>
#include <fcntl.h>
#include <netinet/in.h>
#include <netinet/tcp.h>
#include <signal.h>
#include <getopt.h>
#include <cassert>
#include <cstdio>
#include <cerrno>
#include <cstdlib>
#include <cstring>
#include <string>
#include <iostream>
#include <string>
#include <set>
#include <iomanip>
#include <fstream>
#include <map>
#include <vector>
#include <sstream>
#include <tuple>
#include <chrono>
2013-07-21 16:49:12 +02:00
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <event.h>
#include <event2/event.h>
2013-07-21 16:49:12 +02:00
#include <event2/bufferevent_ssl.h>
#include <nghttp2/nghttp2.h>
#include "http-parser/http_parser.h"
2013-07-22 15:12:54 +02:00
#include "app_helper.h"
2013-07-21 16:49:12 +02:00
#include "HtmlParser.h"
#include "util.h"
#include "base64.h"
2013-12-05 13:54:36 +01:00
#include "http2.h"
2013-07-21 16:49:12 +02:00
#ifndef O_BINARY
# define O_BINARY (0)
#endif // O_BINARY
namespace nghttp2 {
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
struct Config {
2013-12-06 15:17:38 +01:00
std::vector<std::pair<std::string, std::string>> headers;
std::string certfile;
std::string keyfile;
std::string datafile;
nghttp2_option *http2_option;
2013-12-06 15:17:38 +01:00
size_t output_upper_thres;
size_t padding;
2013-12-06 15:17:38 +01:00
ssize_t peer_max_concurrent_streams;
ssize_t header_table_size;
2014-03-25 18:04:24 +01:00
int32_t weight;
2013-12-06 15:17:38 +01:00
int multiply;
// milliseconds
int timeout;
int window_bits;
int connection_window_bits;
2013-07-21 16:49:12 +02:00
bool null_out;
bool remote_name;
bool verbose;
bool get_assets;
bool stat;
bool upgrade;
bool continuation;
Config()
2013-12-06 15:17:38 +01:00
: output_upper_thres(1024*1024),
padding(0),
2013-12-06 15:17:38 +01:00
peer_max_concurrent_streams(NGHTTP2_INITIAL_MAX_CONCURRENT_STREAMS),
header_table_size(-1),
2014-03-25 18:04:24 +01:00
weight(NGHTTP2_DEFAULT_WEIGHT),
multiply(1),
timeout(-1),
window_bits(-1),
connection_window_bits(-1),
2013-12-06 15:17:38 +01:00
null_out(false),
remote_name(false),
verbose(false),
get_assets(false),
stat(false),
upgrade(false),
continuation(false)
{
nghttp2_option_new(&http2_option);
nghttp2_option_set_peer_max_concurrent_streams
(http2_option,
peer_max_concurrent_streams);
}
~Config()
{
nghttp2_option_del(http2_option);
}
2013-07-21 16:49:12 +02:00
};
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
enum StatStage {
STAT_INITIAL,
STAT_ON_REQUEST,
STAT_ON_RESPONSE,
STAT_ON_COMPLETE
2013-07-21 16:49:12 +02:00
};
2013-09-16 09:54:11 +02:00
namespace {
struct RequestStat {
std::chrono::steady_clock::time_point on_request_time;
std::chrono::steady_clock::time_point on_response_time;
std::chrono::steady_clock::time_point on_complete_time;
StatStage stage;
RequestStat():stage(STAT_INITIAL) {}
};
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
std::string strip_fragment(const char *raw_uri)
{
const char *end;
for(end = raw_uri; *end && *end != '#'; ++end);
size_t len = end-raw_uri;
return std::string(raw_uri, len);
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2014-03-25 18:04:24 +01:00
namespace {
struct Request;
} // namespace
namespace {
struct Dependency {
std::vector<std::vector<Request*>> deps;
};
} // namespace
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
struct Request {
Headers res_nva;
Headers push_req_nva;
2013-07-21 16:49:12 +02:00
// URI without fragment
std::string uri;
2013-12-06 15:17:38 +01:00
std::string status;
2013-07-21 16:49:12 +02:00
http_parser_url u;
2014-03-25 18:04:24 +01:00
std::shared_ptr<Dependency> dep;
nghttp2_priority_spec pri_spec;
2013-12-06 15:17:38 +01:00
RequestStat stat;
int64_t data_length;
int64_t data_offset;
2013-07-21 16:49:12 +02:00
nghttp2_gzip *inflater;
HtmlParser *html_parser;
const nghttp2_data_provider *data_prd;
2014-03-25 18:04:24 +01:00
int32_t stream_id;
2013-07-21 16:49:12 +02:00
// Recursion level: 0: first entity, 1: entity linked from first entity
int level;
2014-03-25 18:04:24 +01:00
// RequestPriority value defined in HtmlParser.h
int pri;
// For pushed request, |uri| is empty and |u| is zero-cleared.
2013-07-21 16:49:12 +02:00
Request(const std::string& uri, const http_parser_url &u,
const nghttp2_data_provider *data_prd, int64_t data_length,
2014-03-25 18:04:24 +01:00
const nghttp2_priority_spec& pri_spec,
std::shared_ptr<Dependency> dep, int level = 0)
2013-12-06 15:17:38 +01:00
: uri(uri),
u(u),
2014-03-25 18:04:24 +01:00
dep(std::move(dep)),
pri_spec(pri_spec),
2013-12-06 15:17:38 +01:00
data_length(data_length),
data_offset(0),
inflater(nullptr),
html_parser(nullptr),
data_prd(data_prd),
2014-03-25 18:04:24 +01:00
stream_id(-1),
level(level),
pri(0)
2013-07-21 16:49:12 +02:00
{}
~Request()
{
nghttp2_gzip_inflate_del(inflater);
delete html_parser;
}
void init_inflater()
{
int rv;
rv = nghttp2_gzip_inflate_new(&inflater);
assert(rv == 0);
}
void init_html_parser()
{
html_parser = new HtmlParser(uri);
}
int update_html_parser(const uint8_t *data, size_t len, int fin)
{
if(!html_parser) {
return 0;
}
int rv;
rv = html_parser->parse_chunk(reinterpret_cast<const char*>(data), len,
fin);
return rv;
}
std::string make_reqpath() const
{
std::string path = util::has_uri_field(u, UF_PATH) ?
util::get_uri_field(uri.c_str(), u, UF_PATH) : "/";
if(util::has_uri_field(u, UF_QUERY)) {
2013-07-21 16:49:12 +02:00
path += "?";
path.append(uri.c_str()+u.field_data[UF_QUERY].off,
u.field_data[UF_QUERY].len);
}
return path;
}
2014-03-25 18:04:24 +01:00
int32_t find_dep_stream_id(int start)
{
for(auto i = start; i >= 0; --i) {
for(auto req : dep->deps[i]) {
if(req->stat.stage != STAT_ON_COMPLETE) {
return req->stream_id;
}
}
}
return -1;
}
nghttp2_priority_spec resolve_dep(int32_t pri)
{
nghttp2_priority_spec pri_spec = { NGHTTP2_PRIORITY_TYPE_NONE };
int exclusive = 0;
int32_t stream_id = -1;
if(pri == 0) {
return pri_spec;
}
auto start = std::min(pri, (int)dep->deps.size() - 1);
for(auto i = start; i >= 0; --i) {
if(dep->deps[i][0]->pri < pri) {
stream_id = find_dep_stream_id(i);
if(i != (int)dep->deps.size() - 1) {
exclusive = 1;
}
break;
} else if(dep->deps[i][0]->pri == pri) {
stream_id = find_dep_stream_id(i - 1);
break;
}
}
if(stream_id == -1) {
return pri_spec;
}
nghttp2_priority_spec_dep_init(&pri_spec, stream_id, exclusive);
return pri_spec;
}
2013-07-21 16:49:12 +02:00
bool is_ipv6_literal_addr() const
{
if(util::has_uri_field(u, UF_HOST)) {
2013-07-21 16:49:12 +02:00
return memchr(uri.c_str()+u.field_data[UF_HOST].off, ':',
u.field_data[UF_HOST].len);
} else {
return false;
}
}
void record_request_time()
2013-07-21 16:49:12 +02:00
{
stat.stage = STAT_ON_REQUEST;
stat.on_request_time = get_time();
2013-07-21 16:49:12 +02:00
}
void record_response_time()
2013-07-21 16:49:12 +02:00
{
stat.stage = STAT_ON_RESPONSE;
stat.on_response_time = get_time();
2013-07-21 16:49:12 +02:00
}
void record_complete_time()
{
stat.stage = STAT_ON_COMPLETE;
stat.on_complete_time = get_time();
2013-07-21 16:49:12 +02:00
}
};
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
struct SessionStat {
std::chrono::steady_clock::time_point on_handshake_time;
2013-07-21 16:49:12 +02:00
};
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
Config config;
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
size_t populate_settings(nghttp2_settings_entry *iv)
{
size_t niv = 2;
iv[0].settings_id = NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS;
iv[0].value = 100;
iv[1].settings_id = NGHTTP2_SETTINGS_INITIAL_WINDOW_SIZE;
if(config.window_bits != -1) {
iv[1].value = (1 << config.window_bits) - 1;
} else {
iv[1].value = NGHTTP2_INITIAL_WINDOW_SIZE;
}
2013-10-29 13:34:22 +01:00
if(config.header_table_size >= 0) {
iv[niv].settings_id = NGHTTP2_SETTINGS_HEADER_TABLE_SIZE;
iv[niv].value = config.header_table_size;
++niv;
}
return niv;
}
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
void eventcb(bufferevent *bev, short events, void *ptr);
} // namespace
namespace {
extern http_parser_settings htp_hooks;
} // namespace
namespace {
void upgrade_readcb(bufferevent *bev, void *ptr);
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
void readcb(bufferevent *bev, void *ptr);
} // namespace
namespace {
void writecb(bufferevent *bev, void *ptr);
} // namespace
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
struct HttpClient;
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
int submit_request
(HttpClient *client,
const std::vector<std::pair<std::string, std::string>>& headers,
Request *req);
2013-07-21 16:49:12 +02:00
} // namespace
namespace {
void check_stream_id(nghttp2_session *session, int32_t stream_id,
void *user_data);
} // namespace
namespace {
void settings_timeout_cb(evutil_socket_t fd, short what, void *arg);
} // namespace
2013-07-21 16:49:12 +02:00
enum client_state {
STATE_IDLE,
STATE_CONNECTED
};
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
struct HttpClient {
std::vector<std::unique_ptr<Request>> reqvec;
// Map from stream ID to Request object.
std::map<int32_t, Request*> streams;
// Insert path already added in reqvec to prevent multiple request
// for 1 resource.
std::set<std::string> path_cache;
std::string scheme;
std::string host;
2013-07-21 16:49:12 +02:00
std::string hostport;
// Used for parse the HTTP upgrade response from server
2013-09-03 16:09:56 +02:00
std::unique_ptr<http_parser> htp;
2013-12-06 15:17:38 +01:00
SessionStat stat;
nghttp2_session *session;
const nghttp2_session_callbacks *callbacks;
event_base *evbase;
SSL_CTX *ssl_ctx;
SSL *ssl;
bufferevent *bev;
event *settings_timerev;
addrinfo *addrs;
addrinfo *next_addr;
2013-12-06 15:17:38 +01:00
// The number of completed requests, including failed ones.
size_t complete;
// The length of settings_payload
size_t settings_payloadlen;
client_state state;
// The HTTP status code of the response message of HTTP Upgrade.
unsigned int upgrade_response_status_code;
// true if the response message of HTTP Upgrade request is fully
// received. It is not relevant the upgrade succeeds, or not.
bool upgrade_response_complete;
// SETTINGS payload sent as token68 in HTTP Upgrade
uint8_t settings_payload[128];
2013-07-21 16:49:12 +02:00
HttpClient(const nghttp2_session_callbacks* callbacks,
event_base *evbase, SSL_CTX *ssl_ctx)
: session(nullptr),
callbacks(callbacks),
evbase(evbase),
ssl_ctx(ssl_ctx),
ssl(nullptr),
bev(nullptr),
settings_timerev(nullptr),
addrs(nullptr),
next_addr(nullptr),
complete(0),
2013-12-06 15:17:38 +01:00
settings_payloadlen(0),
state(STATE_IDLE),
2013-09-07 09:38:21 +02:00
upgrade_response_status_code(0),
2013-12-06 15:17:38 +01:00
upgrade_response_complete(false)
2013-07-21 16:49:12 +02:00
{}
~HttpClient()
{
disconnect();
2014-01-27 17:40:00 +01:00
if(addrs) {
freeaddrinfo(addrs);
addrs = nullptr;
next_addr = nullptr;
}
2013-07-21 16:49:12 +02:00
}
bool need_upgrade() const
{
return config.upgrade && scheme == "http";
}
int resolve_host(const std::string& host, uint16_t port)
2013-07-21 16:49:12 +02:00
{
int rv;
2014-01-27 17:40:00 +01:00
addrinfo hints;
this->host = host;
2014-01-27 17:40:00 +01:00
memset(&hints, 0, sizeof(hints));
hints.ai_family = AF_UNSPEC;
hints.ai_socktype = SOCK_STREAM;
hints.ai_protocol = 0;
hints.ai_flags = AI_ADDRCONFIG;
rv = getaddrinfo(host.c_str(), util::utos(port).c_str(), &hints, &addrs);
if(rv != 0) {
std::cerr << "getaddrinfo() failed: "
<< gai_strerror(rv) << std::endl;
return -1;
}
if(addrs == nullptr) {
std::cerr << "No address returned" << std::endl;
return -1;
}
next_addr = addrs;
return 0;
}
int initiate_connection()
{
int rv = 0;
2013-07-21 16:49:12 +02:00
if(ssl_ctx) {
// We are establishing TLS connection.
ssl = SSL_new(ssl_ctx);
if(!ssl) {
std::cerr << "SSL_new() failed: "
<< ERR_error_string(ERR_get_error(), nullptr) << std::endl;
return -1;
}
// If the user overrode the host header, use that value for the
// SNI extension
const char *host_string = nullptr;
auto i = std::find_if(std::begin(config.headers),
std::end(config.headers),
[](const std::pair<std::string, std::string>& nv)
{
return util::strieq("host", nv.first.c_str());
});
if ( i != std::end(config.headers) ) {
2013-07-21 16:49:12 +02:00
host_string = (*i).second.c_str();
} else {
host_string = host.c_str();
}
if (!util::numeric_host(host_string)) {
SSL_set_tlsext_host_name(ssl, host_string);
2013-07-21 16:49:12 +02:00
}
2013-07-21 16:49:12 +02:00
bev = bufferevent_openssl_socket_new(evbase, -1, ssl,
BUFFEREVENT_SSL_CONNECTING,
BEV_OPT_DEFER_CALLBACKS);
} else {
bev = bufferevent_socket_new(evbase, -1, BEV_OPT_DEFER_CALLBACKS);
}
2014-01-27 17:40:00 +01:00
rv = -1;
while(next_addr) {
rv = bufferevent_socket_connect
(bev, next_addr->ai_addr, next_addr->ai_addrlen);
2014-01-27 17:40:00 +01:00
next_addr = next_addr->ai_next;
if(rv == 0) {
break;
}
}
2013-07-21 16:49:12 +02:00
if(rv != 0) {
return -1;
}
bufferevent_enable(bev, EV_READ);
if(need_upgrade()) {
2013-09-03 16:09:56 +02:00
htp = util::make_unique<http_parser>();
http_parser_init(htp.get(), HTTP_RESPONSE);
htp->data = this;
bufferevent_setcb(bev, upgrade_readcb, nullptr, eventcb, this);
} else {
bufferevent_setcb(bev, readcb, writecb, eventcb, this);
}
2013-07-21 16:49:12 +02:00
if(config.timeout != -1) {
timeval tv = { config.timeout, 0 };
bufferevent_set_timeouts(bev, &tv, &tv);
}
return 0;
}
void disconnect()
{
2013-12-22 11:23:01 +01:00
int fd = -1;
2013-07-21 16:49:12 +02:00
state = STATE_IDLE;
nghttp2_session_del(session);
session = nullptr;
if(ssl) {
2013-12-22 11:23:01 +01:00
fd = SSL_get_fd(ssl);
SSL_set_shutdown(ssl, SSL_RECEIVED_SHUTDOWN);
2013-07-21 16:49:12 +02:00
SSL_shutdown(ssl);
}
if(bev) {
bufferevent_disable(bev, EV_READ | EV_WRITE);
bufferevent_free(bev);
bev = nullptr;
}
if(settings_timerev) {
event_free(settings_timerev);
settings_timerev = nullptr;
}
2013-07-21 16:49:12 +02:00
if(ssl) {
SSL_free(ssl);
ssl = nullptr;
}
2013-12-22 11:23:01 +01:00
if(fd != -1) {
shutdown(fd, SHUT_WR);
close(fd);
}
2013-07-21 16:49:12 +02:00
}
int on_upgrade_connect()
{
2013-09-07 09:38:21 +02:00
ssize_t rv;
record_handshake_time();
assert(!reqvec.empty());
nghttp2_settings_entry iv[16];
size_t niv = populate_settings(iv);
assert(sizeof(settings_payload) >= 8*niv);
rv = nghttp2_pack_settings_payload(settings_payload,
sizeof(settings_payload), iv, niv);
2013-09-07 09:38:21 +02:00
if(rv < 0) {
return -1;
}
settings_payloadlen = rv;
auto token68 = base64::encode(&settings_payload[0],
&settings_payload[settings_payloadlen]);
util::to_token68(token68);
std::string req;
if(reqvec[0]->data_prd) {
// If the request contains upload data, use OPTIONS * to upgrade
req = "OPTIONS *";
} else {
req = "GET ";
req += reqvec[0]->make_reqpath();
}
req += " HTTP/1.1\r\n"
"Host: ";
req += hostport;
2013-09-03 16:09:56 +02:00
req += "\r\n"
"Connection: Upgrade, HTTP2-Settings\r\n"
"Upgrade: " NGHTTP2_CLEARTEXT_PROTO_VERSION_ID "\r\n"
"HTTP2-Settings: ";
req += token68;
2013-09-03 16:09:56 +02:00
req += "\r\n"
"Accept: */*\r\n"
"User-Agent: nghttp2/" NGHTTP2_VERSION "\r\n"
"\r\n";
bufferevent_write(bev, req.c_str(), req.size());
if(config.verbose) {
print_timer();
std::cout << " HTTP Upgrade request\n"
<< req << std::endl;
}
return 0;
}
int on_upgrade_read()
{
int rv;
auto input = bufferevent_get_input(bev);
auto inputlen = evbuffer_get_length(input);
if(inputlen == 0) {
return 0;
}
auto mem = evbuffer_pullup(input, -1);
2013-09-03 16:09:56 +02:00
auto nread = http_parser_execute(htp.get(), &htp_hooks,
reinterpret_cast<const char*>(mem),
inputlen);
if(config.verbose) {
std::cout.write(reinterpret_cast<const char*>(mem), nread);
}
evbuffer_drain(input, nread);
2013-09-03 16:09:56 +02:00
auto htperr = HTTP_PARSER_ERRNO(htp.get());
if(htperr == HPE_OK) {
if(upgrade_response_complete) {
if(config.verbose) {
std::cout << std::endl;
}
if(upgrade_response_status_code == 101) {
if(config.verbose) {
print_timer();
std::cout << " HTTP Upgrade success" << std::endl;
}
bufferevent_setcb(bev, readcb, writecb, eventcb, this);
rv = on_connect();
if(rv != 0) {
return rv;
}
// Read remaining data in the buffer because it is not
// notified callback anymore.
rv = on_read();
if(rv != 0) {
return rv;
}
} else {
std::cerr << "HTTP Upgrade failed" << std::endl;
return -1;
}
}
} else {
std::cerr << "Failed to parse HTTP Upgrade response header: "
<< "(" << http_errno_name(htperr) << ") "
<< http_errno_description(htperr) << std::endl;
return -1;
}
return 0;
}
2013-07-21 16:49:12 +02:00
int on_connect()
{
int rv;
if(!need_upgrade()) {
record_handshake_time();
}
rv = nghttp2_session_client_new2(&session, callbacks, this,
config.http2_option);
if(rv != 0) {
return -1;
}
if(need_upgrade()) {
// Adjust stream user-data depending on the existence of upload
// data
Request *stream_user_data = nullptr;
if(!reqvec[0]->data_prd) {
stream_user_data = reqvec[0].get();
}
rv = nghttp2_session_upgrade(session, settings_payload,
settings_payloadlen, stream_user_data);
if(rv != 0) {
std::cerr << "nghttp2_session_upgrade() returned error: "
<< nghttp2_strerror(rv) << std::endl;
return -1;
}
if(stream_user_data) {
check_stream_id(session, 1, this);
}
}
// Send connection header here
bufferevent_write(bev, NGHTTP2_CLIENT_CONNECTION_PREFACE,
NGHTTP2_CLIENT_CONNECTION_PREFACE_LEN);
// If upgrade succeeds, the SETTINGS value sent with
// HTTP2-Settings header field has already been submitted to
// session object.
if(!need_upgrade()) {
nghttp2_settings_entry iv[16];
auto niv = populate_settings(iv);
rv = nghttp2_submit_settings(session, NGHTTP2_FLAG_NONE, iv, niv);
if(rv != 0) {
return -1;
}
2013-07-21 16:49:12 +02:00
}
assert(settings_timerev == nullptr);
settings_timerev = evtimer_new(evbase, settings_timeout_cb, this);
// SETTINGS ACK timeout is 10 seconds for now
timeval settings_timeout = { 10, 0 };
evtimer_add(settings_timerev, &settings_timeout);
if(config.connection_window_bits != -1) {
int32_t wininc = (1 << config.connection_window_bits) - 1
- NGHTTP2_INITIAL_CONNECTION_WINDOW_SIZE;
rv = nghttp2_submit_window_update
(session, NGHTTP2_FLAG_NONE, 0, wininc);
if(rv != 0) {
return -1;
}
}
// Adjust first request depending on the existence of the upload
// data
for(auto i = std::begin(reqvec)+(need_upgrade() && !reqvec[0]->data_prd);
i != std::end(reqvec); ++i) {
if(submit_request(this, config.headers, (*i).get()) != 0) {
return -1;
}
2013-07-21 16:49:12 +02:00
}
return on_write();
2013-07-21 16:49:12 +02:00
}
int on_read()
{
int rv;
auto input = bufferevent_get_input(bev);
auto inputlen = evbuffer_get_length(input);
auto mem = evbuffer_pullup(input, -1);
2013-07-21 16:49:12 +02:00
rv = nghttp2_session_mem_recv(session, mem, inputlen);
if(rv < 0) {
std::cerr << "nghttp2_session_mem_recv() returned error: "
2013-07-21 16:49:12 +02:00
<< nghttp2_strerror(rv) << std::endl;
return -1;
2013-07-21 16:49:12 +02:00
}
evbuffer_drain(input, rv);
return on_write();
2013-07-21 16:49:12 +02:00
}
int on_write()
2013-07-21 16:49:12 +02:00
{
int rv;
uint8_t buf[4096];
2013-09-03 16:09:56 +02:00
auto output = bufferevent_get_output(bev);
util::EvbufferBuffer evbbuf(output, buf, sizeof(buf));
for(;;) {
if(evbuffer_get_length(output) + evbbuf.get_buflen() >
config.output_upper_thres) {
break;
}
2013-07-21 16:49:12 +02:00
const uint8_t *data;
auto datalen = nghttp2_session_mem_send(session, &data);
if(datalen < 0) {
std::cerr << "nghttp2_session_mem_send() returned error: "
<< nghttp2_strerror(datalen) << std::endl;
return -1;
}
if(datalen == 0) {
break;
}
rv = evbbuf.add(data, datalen);
if(rv != 0) {
std::cerr << "evbuffer_add() failed" << std::endl;
return -1;
}
}
rv = evbbuf.flush();
if(rv != 0) {
std::cerr << "evbuffer_add() failed" << std::endl;
return -1;
}
if(nghttp2_session_want_read(session) == 0 &&
nghttp2_session_want_write(session) == 0 &&
evbuffer_get_length(output) == 0) {
return -1;
2013-07-21 16:49:12 +02:00
}
return 0;
2013-07-21 16:49:12 +02:00
}
bool all_requests_processed() const
{
return complete == reqvec.size();
}
void update_hostport()
{
if(reqvec.empty()) {
return;
}
scheme = util::get_uri_field(reqvec[0]->uri.c_str(), reqvec[0]->u,
UF_SCHEMA);
2013-07-21 16:49:12 +02:00
std::stringstream ss;
if(reqvec[0]->is_ipv6_literal_addr()) {
ss << "[";
util::write_uri_field(ss, reqvec[0]->uri.c_str(), reqvec[0]->u, UF_HOST);
2013-07-21 16:49:12 +02:00
ss << "]";
} else {
util::write_uri_field(ss, reqvec[0]->uri.c_str(), reqvec[0]->u, UF_HOST);
2013-07-21 16:49:12 +02:00
}
if(util::has_uri_field(reqvec[0]->u, UF_PORT) &&
reqvec[0]->u.port != util::get_default_port(reqvec[0]->uri.c_str(),
reqvec[0]->u)) {
2013-07-21 16:49:12 +02:00
ss << ":" << reqvec[0]->u.port;
}
hostport = ss.str();
}
bool add_request(const std::string& uri,
const nghttp2_data_provider *data_prd,
int64_t data_length,
2014-03-25 18:04:24 +01:00
const nghttp2_priority_spec& pri_spec,
std::shared_ptr<Dependency> dep,
2013-07-21 16:49:12 +02:00
int level = 0)
{
http_parser_url u;
2014-02-27 14:11:31 +01:00
memset(&u, 0, sizeof(u));
2013-09-07 09:38:21 +02:00
if(http_parser_parse_url(uri.c_str(), uri.size(), 0, &u) != 0) {
return false;
}
2013-07-21 16:49:12 +02:00
if(path_cache.count(uri)) {
return false;
} else {
if(config.multiply == 1) {
path_cache.insert(uri);
}
2014-03-25 18:04:24 +01:00
2013-07-21 16:49:12 +02:00
reqvec.push_back(util::make_unique<Request>(uri, u, data_prd,
2014-03-25 18:04:24 +01:00
data_length,
pri_spec, std::move(dep),
level));
2013-07-21 16:49:12 +02:00
return true;
}
}
void record_handshake_time()
{
stat.on_handshake_time = get_time();
2013-07-21 16:49:12 +02:00
}
};
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
int htp_msg_begincb(http_parser *htp)
{
if(config.verbose) {
print_timer();
std::cout << " HTTP Upgrade response" << std::endl;
}
return 0;
}
} // namespace
namespace {
int htp_status_completecb(http_parser *htp)
{
auto client = static_cast<HttpClient*>(htp->data);
client->upgrade_response_status_code = htp->status_code;
return 0;
}
} // namespace
namespace {
int htp_msg_completecb(http_parser *htp)
{
auto client = static_cast<HttpClient*>(htp->data);
client->upgrade_response_complete = true;
return 0;
}
} // namespace
namespace {
http_parser_settings htp_hooks = {
htp_msg_begincb, /*http_cb on_message_begin;*/
nullptr, /*http_data_cb on_url;*/
htp_status_completecb, /*http_cb on_status_complete */
nullptr, /*http_data_cb on_header_field;*/
nullptr, /*http_data_cb on_header_value;*/
nullptr, /*http_cb on_headers_complete;*/
nullptr, /*http_data_cb on_body;*/
htp_msg_completecb /*http_cb on_message_complete;*/
};
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
int submit_request
(HttpClient *client,
const std::vector<std::pair<std::string, std::string>>& headers,
Request *req)
2013-07-21 16:49:12 +02:00
{
auto path = req->make_reqpath();
auto scheme = util::get_uri_field(req->uri.c_str(), req->u, UF_SCHEMA);
auto build_headers = Headers
{{":method", req->data_prd ? "POST" : "GET"},
{":path", path},
{":scheme", scheme},
{":authority", client->hostport},
{"accept", "*/*"},
{"accept-encoding", "gzip, deflate"},
{"user-agent", "nghttp2/" NGHTTP2_VERSION}};
if(config.continuation) {
for(size_t i = 0; i < 8; ++i) {
build_headers.emplace_back("continuation-test-" + util::utos(i+1),
std::string(4096, '-'));
}
}
auto num_initial_headers = build_headers.size();
2013-07-21 16:49:12 +02:00
if(req->data_prd) {
build_headers.emplace_back("content-length", util::utos(req->data_length));
2013-07-21 16:49:12 +02:00
}
for(auto& kv : headers) {
size_t i;
for(i = 0; i < num_initial_headers; ++i) {
if(util::strieq(kv.first, build_headers[i].name)) {
build_headers[i].value = kv.second;
break;
}
2013-07-21 16:49:12 +02:00
}
if(i < num_initial_headers) {
continue;
}
// To test "never index" repr, don't index authorization header
// field unconditionally.
auto no_index = util::strieq(kv.first, "authorization");
build_headers.emplace_back(kv.first, kv.second, no_index);
}
std::stable_sort(std::begin(build_headers), std::end(build_headers),
[](const Headers::value_type& lhs,
const Headers::value_type& rhs)
{
return lhs.name < rhs.name;
});
build_headers = http2::concat_norm_headers(std::move(build_headers));
auto nva = std::vector<nghttp2_nv>();
nva.reserve(build_headers.size());
for(auto& kv : build_headers) {
nva.push_back(http2::make_nv(kv.name, kv.value, kv.no_index));
}
2014-03-25 18:04:24 +01:00
auto rv = nghttp2_submit_request(client->session, &req->pri_spec,
nva.data(), nva.size(), req->data_prd, req);
if(rv != 0) {
std::cerr << "nghttp2_submit_request() returned error: "
<< nghttp2_strerror(rv) << std::endl;
return -1;
}
return 0;
2013-07-21 16:49:12 +02:00
}
} // namespace
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
void update_html_parser(HttpClient *client, Request *req,
const uint8_t *data, size_t len, int fin)
{
if(!req->html_parser) {
return;
}
req->update_html_parser(data, len, fin);
for(auto& p : req->html_parser->get_links()) {
auto uri = strip_fragment(p.first.c_str());
2013-07-21 16:49:12 +02:00
http_parser_url u;
2014-02-27 14:11:31 +01:00
memset(&u, 0, sizeof(u));
2013-07-21 16:49:12 +02:00
if(http_parser_parse_url(uri.c_str(), uri.size(), 0, &u) == 0 &&
util::fieldeq(uri.c_str(), u, req->uri.c_str(), req->u, UF_SCHEMA) &&
util::fieldeq(uri.c_str(), u, req->uri.c_str(), req->u, UF_HOST) &&
util::porteq(uri.c_str(), u, req->uri.c_str(), req->u)) {
2013-07-21 16:49:12 +02:00
// No POST data for assets
2014-03-25 18:04:24 +01:00
nghttp2_priority_spec pri_spec;
// We always specify priority group of parent stream, so that
// even if the parent stream is closed, the dependent stream is
// in the same priority group. We adjust the priority using
// separate PRIORITY frame after stream ID becomes known.
nghttp2_priority_spec_group_init(&pri_spec, req->stream_id,
config.weight);
if ( client->add_request(uri, nullptr, 0, pri_spec, req->dep,
req->level+1) ) {
auto& req = client->reqvec.back();
req->pri = p.second;
2013-07-21 16:49:12 +02:00
submit_request(client, config.headers,
client->reqvec.back().get());
}
}
}
req->html_parser->clear_links();
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
HttpClient* get_session(void *user_data)
{
return static_cast<HttpClient*>(user_data);
2013-07-21 16:49:12 +02:00
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
int on_data_chunk_recv_callback
2013-07-21 16:49:12 +02:00
(nghttp2_session *session, uint8_t flags, int32_t stream_id,
const uint8_t *data, size_t len, void *user_data)
{
2013-09-03 16:09:56 +02:00
auto client = get_session(user_data);
2013-07-21 16:49:12 +02:00
auto itr = client->streams.find(stream_id);
if(itr != client->streams.end()) {
2013-09-03 16:09:56 +02:00
auto req = (*itr).second;
2013-07-21 16:49:12 +02:00
if(req->inflater) {
while(len > 0) {
const size_t MAX_OUTLEN = 4096;
uint8_t out[MAX_OUTLEN];
size_t outlen = MAX_OUTLEN;
size_t tlen = len;
int rv = nghttp2_gzip_inflate(req->inflater, out, &outlen, data, &tlen);
if(rv != 0) {
nghttp2_submit_rst_stream(session, NGHTTP2_FLAG_NONE, stream_id,
NGHTTP2_INTERNAL_ERROR);
2013-07-21 16:49:12 +02:00
break;
}
if(!config.null_out) {
std::cout.write(reinterpret_cast<const char*>(out), outlen);
}
update_html_parser(client, req, out, outlen, 0);
data += tlen;
len -= tlen;
}
} else {
if(!config.null_out) {
std::cout.write(reinterpret_cast<const char*>(data), len);
}
update_html_parser(client, req, data, len, 0);
}
}
return 0;
2013-07-21 16:49:12 +02:00
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
void check_stream_id(nghttp2_session *session, int32_t stream_id,
2013-07-21 16:49:12 +02:00
void *user_data)
{
2013-09-03 16:09:56 +02:00
auto client = get_session(user_data);
auto req = (Request*)nghttp2_session_get_stream_user_data(session,
stream_id);
2013-09-07 09:38:21 +02:00
assert(req);
2014-03-25 18:04:24 +01:00
req->stream_id = stream_id;
2013-07-21 16:49:12 +02:00
client->streams[stream_id] = req;
req->record_request_time();
2014-03-25 18:04:24 +01:00
if(req->pri == 0) {
assert(req->dep->deps.empty());
req->dep->deps.push_back(std::vector<Request*>{req});
return;
}
if(stream_id % 2 == 0) {
return;
}
auto pri_spec = req->resolve_dep(req->pri);
if(pri_spec.pri_type == NGHTTP2_PRIORITY_TYPE_DEP) {
nghttp2_submit_priority(session, NGHTTP2_FLAG_NONE, stream_id,
&pri_spec);
}
auto itr = std::begin(req->dep->deps);
for(; itr != std::end(req->dep->deps); ++itr) {
if((*itr)[0]->pri == req->pri) {
(*itr).push_back(req);
break;
}
if((*itr)[0]->pri > req->pri) {
auto v = std::vector<Request*>{req};
req->dep->deps.insert(itr, std::move(v));
break;
}
}
if(itr == std::end(req->dep->deps)) {
req->dep->deps.push_back(std::vector<Request*>{req});
}
2013-07-21 16:49:12 +02:00
}
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
void settings_timeout_cb(evutil_socket_t fd, short what, void *arg)
{
int rv;
auto client = get_session(arg);
nghttp2_session_terminate_session(client->session, NGHTTP2_SETTINGS_TIMEOUT);
rv = client->on_write();
if(rv != 0) {
client->disconnect();
}
}
} // namespace
2013-09-16 09:54:11 +02:00
namespace {
int before_frame_send_callback
(nghttp2_session *session, const nghttp2_frame *frame, void *user_data)
2013-07-21 16:49:12 +02:00
{
if(frame->hd.type == NGHTTP2_HEADERS &&
frame->headers.cat == NGHTTP2_HCAT_REQUEST) {
check_stream_id(session, frame->hd.stream_id, user_data);
2013-07-21 16:49:12 +02:00
}
return 0;
}
2013-09-16 09:54:11 +02:00
} // namespace
namespace {
ssize_t select_padding_callback
(nghttp2_session *session, const nghttp2_frame *frame, size_t max_payload,
void *user_data)
{
return std::min(max_payload, frame->hd.length + config.padding);
}
} // namespace
2013-09-16 09:54:11 +02:00
namespace {
void check_response_header(nghttp2_session *session, Request* req)
2013-07-21 16:49:12 +02:00
{
bool gzip = false;
for(auto& nv : req->res_nva) {
if("content-encoding" == nv.name) {
gzip = util::strieq("gzip", nv.value) ||
util::strieq("deflate", nv.value);
continue;
}
if(":status" == nv.name) {
req->status.assign(nv.value);
2013-07-21 16:49:12 +02:00
}
}
if(gzip) {
if(!req->inflater) {
req->init_inflater();
}
}
if(config.get_assets && req->level == 0) {
if(!req->html_parser) {
req->init_html_parser();
}
}
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
int on_begin_headers_callback(nghttp2_session *session,
const nghttp2_frame *frame,
void *user_data)
{
auto client = get_session(user_data);
switch(frame->hd.type) {
case NGHTTP2_PUSH_PROMISE: {
auto stream_id = frame->push_promise.promised_stream_id;
http_parser_url u;
memset(&u, 0, sizeof(u));
// TODO Set pri and level
2014-03-25 18:04:24 +01:00
nghttp2_priority_spec pri_spec = { NGHTTP2_PRIORITY_TYPE_NONE };
auto req = util::make_unique<Request>("", u, nullptr, 0, pri_spec,
nullptr);
nghttp2_session_set_stream_user_data(session, stream_id, req.get());
client->reqvec.push_back(std::move(req));
check_stream_id(session, stream_id, user_data);
break;
}
}
return 0;
}
} //namespace
namespace {
int on_header_callback(nghttp2_session *session,
const nghttp2_frame *frame,
const uint8_t *name, size_t namelen,
const uint8_t *value, size_t valuelen,
uint8_t flags,
void *user_data)
{
if(config.verbose) {
verbose_on_header_callback(session, frame, name, namelen, value, valuelen,
flags, user_data);
}
switch(frame->hd.type) {
case NGHTTP2_HEADERS: {
if(frame->headers.cat != NGHTTP2_HCAT_RESPONSE &&
frame->headers.cat != NGHTTP2_HCAT_PUSH_RESPONSE) {
break;
}
auto req = (Request*)nghttp2_session_get_stream_user_data
(session, frame->hd.stream_id);
if(!req) {
break;
}
http2::split_add_header(req->res_nva, name, namelen, value, valuelen,
flags & NGHTTP2_NV_FLAG_NO_INDEX);
break;
}
case NGHTTP2_PUSH_PROMISE: {
auto req = (Request*)nghttp2_session_get_stream_user_data
(session, frame->push_promise.promised_stream_id);
if(!req) {
break;
}
http2::split_add_header(req->push_req_nva, name, namelen, value, valuelen,
flags & NGHTTP2_NV_FLAG_NO_INDEX);
break;
}
}
return 0;
}
} // namespace
2013-09-16 09:54:11 +02:00
namespace {
int on_frame_recv_callback2
(nghttp2_session *session, const nghttp2_frame *frame, void *user_data)
2013-07-21 16:49:12 +02:00
{
auto client = get_session(user_data);
switch(frame->hd.type) {
case NGHTTP2_HEADERS: {
if(frame->headers.cat != NGHTTP2_HCAT_RESPONSE &&
frame->headers.cat != NGHTTP2_HCAT_PUSH_RESPONSE) {
break;
}
2013-07-21 16:49:12 +02:00
auto req = (Request*)nghttp2_session_get_stream_user_data
(session, frame->hd.stream_id);
// If this is the HTTP Upgrade with OPTIONS method to avoid POST,
// req is nullptr.
if(req) {
req->record_response_time();
check_response_header(session, req);
}
break;
}
case NGHTTP2_SETTINGS:
if((frame->hd.flags & NGHTTP2_FLAG_ACK) == 0) {
break;
}
if(client->settings_timerev) {
evtimer_del(client->settings_timerev);
event_free(client->settings_timerev);
client->settings_timerev = nullptr;
}
break;
case NGHTTP2_PUSH_PROMISE: {
auto req = (Request*)nghttp2_session_get_stream_user_data
(session, frame->push_promise.promised_stream_id);
if(!req) {
break;
}
std::string scheme, authority, method, path;
for(auto& nv : req->push_req_nva) {
if(nv.name == ":scheme") {
scheme = nv.value;
continue;
}
if(nv.name == ":authority" || nv.name == "host") {
authority = nv.value;
continue;
}
if(nv.name == ":method") {
method = nv.value;
continue;
}
if(nv.name == ":path") {
path = nv.value;
continue;
}
}
if(scheme.empty() || authority.empty() || method.empty() || path.empty() ||
path[0] != '/') {
nghttp2_submit_rst_stream(session, NGHTTP2_FLAG_NONE,
frame->push_promise.promised_stream_id,
NGHTTP2_PROTOCOL_ERROR);
break;
}
std::string uri = scheme;
uri += "://";
uri += authority;
uri += path;
http_parser_url u;
2014-02-27 14:11:31 +01:00
memset(&u, 0, sizeof(u));
if(http_parser_parse_url(uri.c_str(), uri.size(), 0, &u) != 0) {
nghttp2_submit_rst_stream(session, NGHTTP2_FLAG_NONE,
frame->push_promise.promised_stream_id,
NGHTTP2_PROTOCOL_ERROR);
break;
}
req->uri = uri;
req->u = u;
break;
}
}
2013-07-21 16:49:12 +02:00
if(config.verbose) {
2013-12-20 15:48:56 +01:00
verbose_on_frame_recv_callback(session, frame, user_data);
2013-07-21 16:49:12 +02:00
}
return 0;
2013-07-21 16:49:12 +02:00
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
int on_stream_close_callback
2013-07-21 16:49:12 +02:00
(nghttp2_session *session, int32_t stream_id, nghttp2_error_code error_code,
void *user_data)
{
2013-09-03 16:09:56 +02:00
auto client = get_session(user_data);
2013-07-21 16:49:12 +02:00
auto itr = client->streams.find(stream_id);
if(itr != client->streams.end()) {
2013-09-03 16:09:56 +02:00
update_html_parser(client, (*itr).second, nullptr, 0, 1);
2013-07-21 16:49:12 +02:00
(*itr).second->record_complete_time();
++client->complete;
}
if(client->all_requests_processed()) {
nghttp2_session_terminate_session(session, NGHTTP2_NO_ERROR);
2013-07-21 16:49:12 +02:00
}
return 0;
2013-07-21 16:49:12 +02:00
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
void print_stats(const HttpClient& client)
{
std::cout << "***** Statistics *****" << std::endl;
int i = 0;
for(auto& req : client.reqvec) {
std::cout << "#" << ++i << ": " << req->uri << std::endl;
std::cout << " Status: " << req->status << std::endl;
std::cout << " Delta (ms) from handshake(HEADERS):"
<< std::endl;
if(req->stat.stage >= STAT_ON_RESPONSE) {
std::cout << " response HEADERS: "
<< time_delta(req->stat.on_response_time,
client.stat.on_handshake_time).count()
2013-07-21 16:49:12 +02:00
<< "("
<< time_delta(req->stat.on_response_time,
req->stat.on_request_time).count()
2013-07-21 16:49:12 +02:00
<< ")"
<< std::endl;
}
if(req->stat.stage >= STAT_ON_COMPLETE) {
2013-07-21 16:49:12 +02:00
std::cout << " Completed: "
<< time_delta(req->stat.on_complete_time,
client.stat.on_handshake_time).count()
2013-07-21 16:49:12 +02:00
<< "("
<< time_delta(req->stat.on_complete_time,
req->stat.on_request_time).count()
2013-07-21 16:49:12 +02:00
<< ")"
<< std::endl;
}
std::cout << std::endl;
}
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
void print_protocol_nego_error()
{
2014-03-30 12:09:21 +02:00
std::cerr << "HTTP/2 protocol was not selected."
<< " (nghttp2 expects " << NGHTTP2_PROTO_VERSION_ID << ")"
<< std::endl;
}
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
int client_select_next_proto_cb(SSL* ssl,
unsigned char **out, unsigned char *outlen,
const unsigned char *in, unsigned int inlen,
void *arg)
{
2013-07-22 15:08:52 +02:00
if(config.verbose) {
2013-07-21 16:49:12 +02:00
print_timer();
std::cout << "[NPN] server offers:" << std::endl;
2013-07-21 16:49:12 +02:00
}
for(unsigned int i = 0; i < inlen; i += in[i]+1) {
2013-07-22 15:08:52 +02:00
if(config.verbose) {
2013-07-21 16:49:12 +02:00
std::cout << " * ";
std::cout.write(reinterpret_cast<const char*>(&in[i+1]), in[i]);
std::cout << std::endl;
}
}
if(nghttp2_select_next_protocol(out, outlen, in, inlen) <= 0) {
print_protocol_nego_error();
return SSL_TLSEXT_ERR_NOACK;
2013-07-21 16:49:12 +02:00
}
return SSL_TLSEXT_ERR_OK;
}
} // namespace
namespace {
void upgrade_readcb(bufferevent *bev, void *ptr)
{
int rv;
auto client = static_cast<HttpClient*>(ptr);
rv = client->on_upgrade_read();
if(rv != 0) {
client->disconnect();
}
}
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
void readcb(bufferevent *bev, void *ptr)
{
int rv;
auto client = static_cast<HttpClient*>(ptr);
2013-07-21 16:49:12 +02:00
rv = client->on_read();
if(rv != 0) {
client->disconnect();
}
}
} // namespace
namespace {
void writecb(bufferevent *bev, void *ptr)
{
if(evbuffer_get_length(bufferevent_get_output(bev)) > 0) {
return;
}
int rv;
auto client = static_cast<HttpClient*>(ptr);
2013-07-21 16:49:12 +02:00
rv = client->on_write();
if(rv != 0) {
client->disconnect();
}
}
} // namespace
namespace {
void eventcb(bufferevent *bev, short events, void *ptr)
{
int rv;
auto client = static_cast<HttpClient*>(ptr);
2013-07-21 16:49:12 +02:00
if(events & BEV_EVENT_CONNECTED) {
client->state = STATE_CONNECTED;
int fd = bufferevent_getfd(bev);
int val = 1;
if(setsockopt(fd, IPPROTO_TCP, TCP_NODELAY,
reinterpret_cast<char *>(&val), sizeof(val)) == -1) {
std::cerr << "Setting option TCP_NODELAY failed: errno="
<< errno << std::endl;
}
if(client->need_upgrade()) {
rv = client->on_upgrade_connect();
} else {
2014-01-07 18:15:46 +01:00
if(client->ssl) {
// Check NPN or ALPN result
const unsigned char *next_proto = nullptr;
unsigned int next_proto_len;
SSL_get0_next_proto_negotiated(client->ssl,
&next_proto, &next_proto_len);
for(int i = 0; i < 2; ++i) {
if(next_proto) {
if(config.verbose) {
std::cout << "The negotiated protocol: ";
std::cout.write(reinterpret_cast<const char*>(next_proto),
next_proto_len);
std::cout << std::endl;
}
if(NGHTTP2_PROTO_VERSION_ID_LEN != next_proto_len ||
memcmp(NGHTTP2_PROTO_VERSION_ID, next_proto,
NGHTTP2_PROTO_VERSION_ID_LEN) != 0) {
next_proto = nullptr;
}
break;
}
#if OPENSSL_VERSION_NUMBER >= 0x10002000L
2014-01-07 18:15:46 +01:00
SSL_get0_alpn_selected(client->ssl, &next_proto, &next_proto_len);
#else // OPENSSL_VERSION_NUMBER < 0x10002000L
2014-01-07 18:15:46 +01:00
break;
#endif // OPENSSL_VERSION_NUMBER < 0x10002000L
2014-01-07 18:15:46 +01:00
}
if(!next_proto) {
print_protocol_nego_error();
client->disconnect();
return;
}
}
rv = client->on_connect();
}
if(rv != 0) {
client->disconnect();
return;
}
return;
}
if(events & BEV_EVENT_EOF) {
2013-07-21 16:49:12 +02:00
std::cerr << "EOF" << std::endl;
auto state = client->state;
2013-07-21 16:49:12 +02:00
client->disconnect();
if(state == STATE_IDLE) {
2014-01-27 17:40:00 +01:00
if(client->initiate_connection() == 0) {
std::cerr << "Trying next address" << std::endl;
}
}
2013-07-21 16:49:12 +02:00
return;
}
if(events & (BEV_EVENT_ERROR | BEV_EVENT_TIMEOUT)) {
2013-07-21 16:49:12 +02:00
if(events & BEV_EVENT_ERROR) {
if(client->state == STATE_IDLE) {
std::cerr << "Could not connect to the host" << std::endl;
} else {
std::cerr << "Network error" << std::endl;
}
} else {
std::cerr << "Timeout" << std::endl;
}
auto state = client->state;
2013-07-21 16:49:12 +02:00
client->disconnect();
if(state == STATE_IDLE) {
2014-01-27 17:40:00 +01:00
if(client->initiate_connection() == 0) {
std::cerr << "Trying next address" << std::endl;
}
}
2013-07-21 16:49:12 +02:00
return;
}
}
} // namespace
2013-09-16 09:54:11 +02:00
namespace {
int communicate(const std::string& scheme, const std::string& host,
uint16_t port,
2013-07-21 16:49:12 +02:00
std::vector<std::tuple<std::string,
nghttp2_data_provider*,
int64_t>> requests,
const nghttp2_session_callbacks *callbacks)
{
int result = 0;
auto evbase = event_base_new();
SSL_CTX *ssl_ctx = nullptr;
if(scheme == "https") {
2013-07-21 16:49:12 +02:00
ssl_ctx = SSL_CTX_new(SSLv23_client_method());
if(!ssl_ctx) {
std::cerr << "Failed to create SSL_CTX: "
<< ERR_error_string(ERR_get_error(), nullptr) << std::endl;
result = -1;
goto fin;
}
SSL_CTX_set_options(ssl_ctx,
SSL_OP_ALL | SSL_OP_NO_SSLv2 | SSL_OP_NO_COMPRESSION |
SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION);
SSL_CTX_set_mode(ssl_ctx, SSL_MODE_ENABLE_PARTIAL_WRITE);
SSL_CTX_set_mode(ssl_ctx, SSL_MODE_AUTO_RETRY);
SSL_CTX_set_mode(ssl_ctx, SSL_MODE_RELEASE_BUFFERS);
if(!config.keyfile.empty()) {
if(SSL_CTX_use_PrivateKey_file(ssl_ctx, config.keyfile.c_str(),
SSL_FILETYPE_PEM) != 1) {
2013-09-03 16:09:56 +02:00
std::cerr << ERR_error_string(ERR_get_error(), nullptr) << std::endl;
2013-07-21 16:49:12 +02:00
result = -1;
goto fin;
}
}
if(!config.certfile.empty()) {
if(SSL_CTX_use_certificate_chain_file(ssl_ctx,
config.certfile.c_str()) != 1) {
2013-09-03 16:09:56 +02:00
std::cerr << ERR_error_string(ERR_get_error(), nullptr) << std::endl;
2013-07-21 16:49:12 +02:00
result = -1;
goto fin;
}
}
SSL_CTX_set_next_proto_select_cb(ssl_ctx,
client_select_next_proto_cb, nullptr);
#if OPENSSL_VERSION_NUMBER >= 0x10002000L
unsigned char proto_list[255];
proto_list[0] = NGHTTP2_PROTO_VERSION_ID_LEN;
memcpy(&proto_list[1], NGHTTP2_PROTO_VERSION_ID,
NGHTTP2_PROTO_VERSION_ID_LEN);
SSL_CTX_set_alpn_protos(ssl_ctx, proto_list, proto_list[0] + 1);
#endif // OPENSSL_VERSION_NUMBER >= 0x10002000L
2013-07-21 16:49:12 +02:00
}
{
HttpClient client{callbacks, evbase, ssl_ctx};
2014-03-25 18:04:24 +01:00
nghttp2_priority_spec pri_spec = { NGHTTP2_PRIORITY_TYPE_NONE };
if(config.weight != NGHTTP2_DEFAULT_WEIGHT) {
nghttp2_priority_spec_group_init(&pri_spec, -1, config.weight);
}
2013-07-21 16:49:12 +02:00
for(auto req : requests) {
for(int i = 0; i < config.multiply; ++i) {
2014-03-25 18:04:24 +01:00
auto dep = std::make_shared<Dependency>();
2013-07-21 16:49:12 +02:00
client.add_request(std::get<0>(req), std::get<1>(req),
2014-03-25 18:04:24 +01:00
std::get<2>(req), pri_spec, std::move(dep));
2013-07-21 16:49:12 +02:00
}
}
client.update_hostport();
if(client.resolve_host(host, port) != 0) {
goto fin;
}
if(client.initiate_connection() != 0) {
2013-07-21 16:49:12 +02:00
goto fin;
}
event_base_loop(evbase, 0);
if(!client.all_requests_processed()) {
std::cerr << "Some requests were not processed. total="
<< client.reqvec.size()
<< ", processed=" << client.complete << std::endl;
}
if(config.stat) {
print_stats(client);
}
}
fin:
if(ssl_ctx) {
SSL_CTX_free(ssl_ctx);
}
if(evbase) {
event_base_free(evbase);
}
return result;
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
ssize_t file_read_callback
(nghttp2_session *session, int32_t stream_id,
uint8_t *buf, size_t length, uint32_t *data_flags,
2013-07-21 16:49:12 +02:00
nghttp2_data_source *source, void *user_data)
{
auto req = (Request*)nghttp2_session_get_stream_user_data
(session, stream_id);
2013-09-07 09:38:21 +02:00
assert(req);
2013-07-21 16:49:12 +02:00
int fd = source->fd;
ssize_t r;
while((r = pread(fd, buf, length, req->data_offset)) == -1 &&
errno == EINTR);
if(r == -1) {
return NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE;
} else {
if(r == 0) {
*data_flags |= NGHTTP2_DATA_FLAG_EOF;
2013-07-21 16:49:12 +02:00
} else {
req->data_offset += r;
}
return r;
}
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
int run(char **uris, int n)
{
nghttp2_session_callbacks callbacks;
memset(&callbacks, 0, sizeof(nghttp2_session_callbacks));
callbacks.on_stream_close_callback = on_stream_close_callback;
callbacks.on_frame_recv_callback = on_frame_recv_callback2;
callbacks.before_frame_send_callback = before_frame_send_callback;
2013-07-21 16:49:12 +02:00
if(config.verbose) {
2013-12-20 15:48:56 +01:00
callbacks.on_frame_send_callback = verbose_on_frame_send_callback;
callbacks.on_invalid_frame_recv_callback =
verbose_on_invalid_frame_recv_callback;
callbacks.on_unknown_frame_recv_callback =
verbose_on_unknown_frame_recv_callback;
2013-07-21 16:49:12 +02:00
}
callbacks.on_data_chunk_recv_callback = on_data_chunk_recv_callback;
callbacks.on_begin_headers_callback = on_begin_headers_callback;
callbacks.on_header_callback = on_header_callback;
if(config.padding) {
callbacks.select_padding_callback = select_padding_callback;
}
std::string prev_scheme;
2013-07-21 16:49:12 +02:00
std::string prev_host;
uint16_t prev_port = 0;
int failures = 0;
int data_fd = -1;
nghttp2_data_provider data_prd;
struct stat data_stat;
if(!config.datafile.empty()) {
data_fd = open(config.datafile.c_str(), O_RDONLY | O_BINARY);
if(data_fd == -1) {
std::cerr << "Could not open file " << config.datafile << std::endl;
return 1;
}
if(fstat(data_fd, &data_stat) == -1) {
close(data_fd);
std::cerr << "Could not stat file " << config.datafile << std::endl;
return 1;
}
data_prd.source.fd = data_fd;
data_prd.read_callback = file_read_callback;
}
std::vector<std::tuple<std::string, nghttp2_data_provider*, int64_t>>
requests;
for(int i = 0; i < n; ++i) {
http_parser_url u;
2014-02-27 14:11:31 +01:00
memset(&u, 0, sizeof(u));
2013-09-03 16:09:56 +02:00
auto uri = strip_fragment(uris[i]);
2013-07-21 16:49:12 +02:00
if(http_parser_parse_url(uri.c_str(), uri.size(), 0, &u) == 0 &&
util::has_uri_field(u, UF_SCHEMA)) {
uint16_t port = util::has_uri_field(u, UF_PORT) ?
u.port : util::get_default_port(uri.c_str(), u);
if(!util::fieldeq(uri.c_str(), u, UF_SCHEMA, prev_scheme.c_str()) ||
!util::fieldeq(uri.c_str(), u, UF_HOST, prev_host.c_str()) ||
port != prev_port) {
2013-07-21 16:49:12 +02:00
if(!requests.empty()) {
if (communicate(prev_scheme, prev_host, prev_port,
std::move(requests), &callbacks) != 0) {
2013-07-21 16:49:12 +02:00
++failures;
}
requests.clear();
}
prev_scheme = util::get_uri_field(uri.c_str(), u, UF_SCHEMA);
prev_host = util::get_uri_field(uri.c_str(), u, UF_HOST);
2013-07-21 16:49:12 +02:00
prev_port = port;
}
requests.emplace_back(uri, data_fd == -1 ? nullptr : &data_prd,
data_stat.st_size);
}
}
if(!requests.empty()) {
if (communicate(prev_scheme, prev_host, prev_port, std::move(requests),
2013-07-21 16:49:12 +02:00
&callbacks) != 0) {
++failures;
}
}
return failures;
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
namespace {
void print_version(std::ostream& out)
{
out << "nghttp nghttp2/" NGHTTP2_VERSION << std::endl;
}
} // namespace
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
void print_usage(std::ostream& out)
{
out << R"(Usage: nghttp [OPTIONS]... <URI>...
HTTP/2 experimental client)" << std::endl;
2013-07-21 16:49:12 +02:00
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
2013-09-16 09:54:11 +02:00
namespace {
2013-07-21 16:49:12 +02:00
void print_help(std::ostream& out)
{
print_usage(out);
out << R"(
<URI> Specify URI to access.
Options:
-v, --verbose Print debug information such as reception and
transmission of frames and name/value pairs.
-n, --null-out Discard downloaded data.
-O, --remote-name Save download data in the current directory. The
filename is dereived from URI. If URI ends with
'/', 'index.html' is used as a filename. Not
implemented yet.
-t, --timeout=<N> Timeout each request after <N> seconds.
-w, --window-bits=<N>
Sets the stream level initial window size to
2**<N>-1.
-W, --connection-window-bits=<N>
Sets the connection level initial window size to
2**<N>-1.
-a, --get-assets Download assets such as stylesheets, images and
script files linked from the downloaded resource.
Only links whose origins are the same with the
linking resource will be downloaded.
-s, --stat Print statistics.
-H, --header Add a header to the requests.
--cert=<CERT> Use the specified client certificate file. The
file must be in PEM format.
--key=<KEY> Use the client private key file. The file must
be in PEM format.
-d, --data=<FILE> Post FILE to server. If '-' is given, data will
be read from stdin.
-m, --multiply=<N> Request each URI <N> times. By default, same URI
is not requested twice. This option disables it
too.
2014-03-30 12:09:21 +02:00
-u, --upgrade Perform HTTP Upgrade for HTTP/2. This option is
ignored if the request URI has https scheme. If
-d is used, the HTTP upgrade request is performed
with OPTIONS method.
2014-03-25 18:04:24 +01:00
-p, --weight=<WEIGHT>
Sets priority group weight. The valid value
range is [)"
<< NGHTTP2_MIN_WEIGHT << ", " << NGHTTP2_MAX_WEIGHT << R"(], inclusive.
Default: )"
2014-03-25 18:04:24 +01:00
<< NGHTTP2_DEFAULT_WEIGHT << R"(
-M, --peer-max-concurrent-streams=<N>
Use <N> as SETTINGS_MAX_CONCURRENT_STREAMS value
of remote endpoint as if it is received in
SETTINGS frame. The default is large enough as
it is seen as unlimited.
-c, --header-table-size=<N>
Specify decoder header table size.
-b, --padding=<N> Add at most <N> bytes to a frame payload as
padding. Specify 0 to disable padding.
--color Force colored log output.
--continuation Send large header to test CONTINUATION.
--version Display version information and exit.
-h, --help Display this help and exit.)"
2013-07-21 16:49:12 +02:00
<< std::endl;
}
2013-09-16 09:54:11 +02:00
} // namespace
2013-07-21 16:49:12 +02:00
int main(int argc, char **argv)
{
bool color = false;
2013-07-21 16:49:12 +02:00
while(1) {
2013-09-06 18:46:20 +02:00
int flag = 0;
2013-07-21 16:49:12 +02:00
static option long_options[] = {
2013-08-18 15:08:40 +02:00
{"verbose", no_argument, nullptr, 'v'},
{"null-out", no_argument, nullptr, 'n'},
{"remote-name", no_argument, nullptr, 'O'},
{"timeout", required_argument, nullptr, 't'},
{"window-bits", required_argument, nullptr, 'w'},
{"connection-window-bits", required_argument, nullptr, 'W'},
2013-08-18 15:08:40 +02:00
{"get-assets", no_argument, nullptr, 'a'},
{"stat", no_argument, nullptr, 's'},
{"help", no_argument, nullptr, 'h'},
{"header", required_argument, nullptr, 'H'},
{"data", required_argument, nullptr, 'd'},
{"multiply", required_argument, nullptr, 'm'},
{"upgrade", no_argument, nullptr, 'u'},
2014-03-25 18:04:24 +01:00
{"weight", required_argument, nullptr, 'p'},
{"peer-max-concurrent-streams", required_argument, nullptr, 'M'},
2013-10-29 13:34:22 +01:00
{"header-table-size", required_argument, nullptr, 'c'},
2014-02-09 13:46:15 +01:00
{"padding", required_argument, nullptr, 'b'},
{"cert", required_argument, &flag, 1},
{"key", required_argument, &flag, 2},
{"color", no_argument, &flag, 3},
{"continuation", no_argument, &flag, 4},
{"version", no_argument, &flag, 5},
2013-08-18 15:08:40 +02:00
{nullptr, 0, nullptr, 0 }
2013-07-21 16:49:12 +02:00
};
int option_index = 0;
2014-02-07 15:22:17 +01:00
int c = getopt_long(argc, argv, "M:Oab:c:d:m:np:hH:vst:uw:W:", long_options,
2013-07-21 16:49:12 +02:00
&option_index);
2013-10-29 13:34:22 +01:00
char *end;
2013-07-21 16:49:12 +02:00
if(c == -1) {
break;
}
switch(c) {
case 'M':
// peer-max-concurrent-streams option
config.peer_max_concurrent_streams = strtoul(optarg, nullptr, 10);
break;
2013-07-21 16:49:12 +02:00
case 'O':
config.remote_name = true;
break;
case 'h':
print_help(std::cout);
exit(EXIT_SUCCESS);
2014-02-07 15:22:17 +01:00
case 'b':
config.padding = strtol(optarg, nullptr, 10);
2014-02-07 15:22:17 +01:00
break;
2013-07-21 16:49:12 +02:00
case 'n':
config.null_out = true;
break;
case 'p': {
errno = 0;
auto n = strtoul(optarg, nullptr, 10);
if(errno == 0 && NGHTTP2_MIN_WEIGHT <= n && n <= NGHTTP2_MAX_WEIGHT) {
2014-03-25 18:04:24 +01:00
config.weight = n;
} else {
std::cerr << "-p: specify the integer in the range ["
<< NGHTTP2_MIN_WEIGHT << ", "
2014-03-25 18:04:24 +01:00
<< NGHTTP2_MAX_WEIGHT << "], inclusive"
<< std::endl;
exit(EXIT_FAILURE);
}
break;
}
2013-07-21 16:49:12 +02:00
case 'v':
config.verbose = true;
break;
case 't':
config.timeout = atoi(optarg) * 1000;
break;
case 'u':
config.upgrade = true;
break;
case 'w':
case 'W': {
2013-07-21 16:49:12 +02:00
errno = 0;
char *endptr = nullptr;
unsigned long int n = strtoul(optarg, &endptr, 10);
if(errno == 0 && *endptr == '\0' && n < 31) {
if(c == 'w') {
config.window_bits = n;
} else {
config.connection_window_bits = n;
}
2013-07-21 16:49:12 +02:00
} else {
std::cerr << "-" << static_cast<char>(c)
<< ": specify the integer in the range [0, 30], inclusive"
2013-07-21 16:49:12 +02:00
<< std::endl;
exit(EXIT_FAILURE);
}
break;
}
case 'H': {
char *header = optarg;
// Skip first possible ':' in the header name
char *value = strchr( optarg + 1, ':' );
if ( ! value || header + 1 == value) {
2013-07-21 16:49:12 +02:00
std::cerr << "-H: invalid header: " << optarg
<< std::endl;
exit(EXIT_FAILURE);
}
*value = 0;
value++;
while( isspace( *value ) ) { value++; }
if ( *value == 0 ) {
// This could also be a valid case for suppressing a header
// similar to curl
std::cerr << "-H: invalid header - value missing: " << optarg
<< std::endl;
exit(EXIT_FAILURE);
}
// Note that there is no processing currently to handle multiple
// message-header fields with the same field name
config.headers.emplace_back(header, value);
util::inp_strlower(config.headers.back().first);
2013-07-21 16:49:12 +02:00
break;
}
case 'a':
#ifdef HAVE_LIBXML2
config.get_assets = true;
#else // !HAVE_LIBXML2
std::cerr << "Warning: -a, --get-assets option cannot be used because\n"
<< "the binary was not compiled with libxml2."
<< std::endl;
#endif // !HAVE_LIBXML2
break;
case 's':
config.stat = true;
break;
case 'd':
config.datafile = strcmp("-", optarg) == 0 ? "/dev/stdin" : optarg;
break;
case 'm':
2013-09-03 16:09:56 +02:00
config.multiply = strtoul(optarg, nullptr, 10);
2013-07-21 16:49:12 +02:00
break;
2013-10-29 13:34:22 +01:00
case 'c':
errno = 0;
2013-10-29 13:34:22 +01:00
config.header_table_size = strtol(optarg, &end, 10);
if(errno == ERANGE || *end != '\0') {
std::cerr << "-c: Bad option value: " << optarg << std::endl;
exit(EXIT_FAILURE);
}
break;
2013-07-21 16:49:12 +02:00
case '?':
2014-01-08 17:27:56 +01:00
util::show_candidates(argv[optind - 1], long_options);
2013-07-21 16:49:12 +02:00
exit(EXIT_FAILURE);
case 0:
switch(flag) {
case 1:
// cert option
config.certfile = optarg;
break;
case 2:
// key option
config.keyfile = optarg;
break;
case 3:
// color option
color = true;
break;
case 4:
// continuation option
config.continuation = true;
break;
case 5:
// version option
print_version(std::cout);
exit(EXIT_SUCCESS);
2013-07-21 16:49:12 +02:00
}
break;
default:
break;
}
}
set_color_output(color || isatty(fileno(stdout)));
2013-07-21 16:49:12 +02:00
nghttp2_option_set_peer_max_concurrent_streams
(config.http2_option, config.peer_max_concurrent_streams);
2013-07-21 16:49:12 +02:00
struct sigaction act;
memset(&act, 0, sizeof(struct sigaction));
act.sa_handler = SIG_IGN;
2013-09-03 16:09:56 +02:00
sigaction(SIGPIPE, &act, nullptr);
2013-07-21 16:49:12 +02:00
SSL_load_error_strings();
SSL_library_init();
reset_timer();
return run(argv+optind, argc-optind);
}
} // namespace nghttp2
int main(int argc, char **argv)
{
return nghttp2::main(argc, argv);
}