nghttp2/doc/nghttpx.1

1586 lines
47 KiB
Groff
Raw Normal View History

.\" Man page generated from reStructuredText.
.
2016-02-07 13:24:11 +01:00
.TH "NGHTTPX" "1" "February 07, 2016" "1.8.0-DEV" "nghttp2"
.SH NAME
2015-10-25 09:05:48 +01:00
nghttpx \- HTTP/2 proxy
.
.nr rst2man-indent-level 0
.
.de1 rstReportMargin
\\$1 \\n[an-margin]
level \\n[rst2man-indent-level]
level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
-
\\n[rst2man-indent0]
\\n[rst2man-indent1]
\\n[rst2man-indent2]
..
.de1 INDENT
.\" .rstReportMargin pre:
. RS \\$1
. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
. nr rst2man-indent-level +1
.\" .rstReportMargin post:
..
.de UNINDENT
. RE
.\" indent \\n[an-margin]
.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]]
.nr rst2man-indent-level -1
.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
..
.SH SYNOPSIS
.sp
\fBnghttpx\fP [OPTIONS]... [<PRIVATE_KEY> <CERT>]
.SH DESCRIPTION
.sp
2014-05-16 16:54:09 +02:00
A reverse proxy for HTTP/2, HTTP/1 and SPDY.
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B <PRIVATE_KEY>
2015-01-15 16:10:16 +01:00
Set path to server\(aqs private key. Required unless \fI\%\-p\fP,
\fI\%\-\-client\fP or \fI\%\-\-frontend\-no\-tls\fP are given.
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B <CERT>
2015-01-15 16:10:16 +01:00
Set path to server\(aqs certificate. Required unless \fI\%\-p\fP,
2015-03-30 17:23:12 +02:00
\fI\%\-\-client\fP or \fI\%\-\-frontend\-no\-tls\fP are given. To make OCSP
stapling work, this must be absolute path.
.UNINDENT
2015-02-01 10:33:24 +01:00
.SH OPTIONS
.sp
2014-05-16 16:54:09 +02:00
The options are categorized into several groups.
2015-02-01 10:33:24 +01:00
.SS Connections
.INDENT 0.0
.TP
2015-07-14 17:01:04 +02:00
.B \-b, \-\-backend=(<HOST>,<PORT>|unix:<PATH>)[;<PATTERN>[:...]]
2015-03-14 10:52:50 +01:00
Set backend host and port. The multiple backend
addresses are accepted by repeating this option. UNIX
domain socket can be specified by prefixing path name
2015-07-11 05:45:23 +02:00
with "unix:" (e.g., unix:/var/run/backend.sock).
.sp
Optionally, if <PATTERN>s are given, the backend address
2015-07-12 16:26:45 +02:00
is only used if request matches the pattern. If \fI\%\-s\fP or
\fI\%\-p\fP is used, <PATTERN>s are ignored. The pattern
matching is closely designed to ServeMux in net/http
package of Go programming language. <PATTERN> consists
2015-07-14 17:01:04 +02:00
of path, host + path or just host. The path must start
with "\fI/\fP". If it ends with "\fI/\fP", it matches all request
path in its subtree. To deal with the request to the
directory without trailing slash, the path which ends
with "\fI/\fP" also matches the request path which only lacks
trailing \(aq\fI/\fP\(aq (e.g., path "\fI/foo/\fP" matches request path
"\fI/foo\fP"). If it does not end with "\fI/\fP", it performs exact
match against the request path. If host is given, it
performs exact match against the request host. If host
alone is given, "\fI/\fP" is appended to it, so that it
matches all request paths under the host (e.g.,
specifying "nghttp2.org" equals to "nghttp2.org/").
.sp
Patterns with host take precedence over patterns with
just path. Then, longer patterns take precedence over
2015-07-12 16:26:45 +02:00
shorter ones, breaking a tie by the order of the
appearance in the configuration.
2015-07-11 05:45:23 +02:00
.sp
If <PATTERN> is omitted, "\fI/\fP" is used as pattern, which
2015-07-14 17:01:04 +02:00
matches all request paths (catch\-all pattern). The
catch\-all backend must be given.
2015-07-11 05:45:23 +02:00
.sp
When doing a match, nghttpx made some normalization to
pattern, request host and path. For host part, they are
converted to lower case. For path part, percent\-encoded
unreserved characters defined in RFC 3986 are decoded,
and any dot\-segments (".." and ".") are resolved and
removed.
.sp
For example, \fI\%\-b\fP\(aq127.0.0.1,8080;nghttp2.org/httpbin/\(aq
matches the request host "nghttp2.org" and the request
path "\fI/httpbin/get\fP", but does not match the request host
"nghttp2.org" and the request path "\fI/index.html\fP".
.sp
The multiple <PATTERN>s can be specified, delimiting
them by ":". Specifying
\fI\%\-b\fP\(aq127.0.0.1,8080;nghttp2.org:www.nghttp2.org\(aq has the
same effect to specify \fI\%\-b\fP\(aq127.0.0.1,8080;nghttp2.org\(aq
2015-07-14 17:01:04 +02:00
and \fI\%\-b\fP\(aq127.0.0.1,8080;www.nghttp2.org\(aq.
2015-07-11 05:45:23 +02:00
.sp
The backend addresses sharing same <PATTERN> are grouped
2015-07-14 17:01:04 +02:00
together forming load balancing group.
.sp
Since ";" and ":" are used as delimiter, <PATTERN> must
not contain these characters. Since ";" has special
meaning in shell, the option value must be quoted.
.sp
Default: \fB127.0.0.1,80\fP
.UNINDENT
.INDENT 0.0
.TP
2015-07-14 17:01:04 +02:00
.B \-f, \-\-frontend=(<HOST>,<PORT>|unix:<PATH>)
2015-01-15 16:10:16 +01:00
Set frontend host and port. If <HOST> is \(aq*\(aq, it
2015-02-22 10:02:57 +01:00
assumes all addresses including both IPv4 and IPv6.
UNIX domain socket can be specified by prefixing path
2016-02-07 13:24:11 +01:00
name with "unix:" (e.g., unix:/var/run/nghttpx.sock).
This option can be used multiple times to listen to
multiple addresses.
.sp
Default: \fB*,3000\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-15 16:10:16 +01:00
.B \-\-backlog=<N>
Set listen backlog size.
.sp
2015-01-15 16:10:16 +01:00
Default: \fB512\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-backend\-ipv4
2014-05-16 16:54:09 +02:00
Resolve backend hostname to IPv4 address only.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-backend\-ipv6
2014-05-16 16:54:09 +02:00
Resolve backend hostname to IPv6 address only.
.UNINDENT
.INDENT 0.0
2014-08-29 17:15:31 +02:00
.TP
.B \-\-backend\-http\-proxy\-uri=<URI>
2015-01-15 16:10:16 +01:00
Specify proxy URI in the form
\fI\%http:/\fP/[<USER>:<PASS>@]<PROXY>:<PORT>. If a proxy
requires authentication, specify <USER> and <PASS>.
Note that they must be properly percent\-encoded. This
proxy is used when the backend connection is HTTP/2.
First, make a CONNECT request to the proxy and it
connects to the backend on behalf of nghttpx. This
forms tunnel. After that, nghttpx performs SSL/TLS
handshake with the downstream through the tunnel. The
timeouts when connecting and making CONNECT request can
be specified by \fI\%\-\-backend\-read\-timeout\fP and
\fI\%\-\-backend\-write\-timeout\fP options.
.UNINDENT
2015-09-12 15:51:40 +02:00
.INDENT 0.0
.TP
.B \-\-accept\-proxy\-protocol
Accept PROXY protocol version 1 on frontend connection.
.UNINDENT
2016-02-07 13:24:11 +01:00
.INDENT 0.0
.TP
.B \-\-backend\-no\-tls
Disable SSL/TLS on backend connections. For HTTP/2
backend connections, TLS is enabled by default. For
HTTP/1 backend connections, TLS is disabled by default,
and can be enabled by \fI\%\-\-backend\-http1\-tls\fP option. If
both \fI\%\-\-backend\-no\-tls\fP and \fI\%\-\-backend\-http1\-tls\fP options
are used, \fI\%\-\-backend\-no\-tls\fP has the precedence.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-backend\-http1\-tls
Enable SSL/TLS on backend HTTP/1 connections. See also
\fI\%\-\-backend\-no\-tls\fP option.
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS Performance
.INDENT 0.0
.TP
2015-01-15 16:10:16 +01:00
.B \-n, \-\-workers=<N>
Set the number of worker threads.
.sp
Default: \fB1\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-15 16:10:16 +01:00
.B \-\-read\-rate=<SIZE>
Set maximum average read rate on frontend connection.
Setting 0 to this option means read rate is unlimited.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-08-29 17:15:31 +02:00
.TP
.B \-\-read\-burst=<SIZE>
2015-01-15 16:10:16 +01:00
Set maximum read burst size on frontend connection.
Setting 0 to this option means read burst size is
unlimited.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-08-29 17:15:31 +02:00
.TP
2015-01-15 16:10:16 +01:00
.B \-\-write\-rate=<SIZE>
Set maximum average write rate on frontend connection.
Setting 0 to this option means write rate is unlimited.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-08-29 17:15:31 +02:00
.TP
.B \-\-write\-burst=<SIZE>
2015-01-15 16:10:16 +01:00
Set maximum write burst size on frontend connection.
Setting 0 to this option means write burst size is
unlimited.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-08-29 17:15:31 +02:00
.TP
2015-01-15 16:10:16 +01:00
.B \-\-worker\-read\-rate=<SIZE>
Set maximum average read rate on frontend connection per
worker. Setting 0 to this option means read rate is
unlimited. Not implemented yet.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-worker\-read\-burst=<SIZE>
2015-01-15 16:10:16 +01:00
Set maximum read burst size on frontend connection per
worker. Setting 0 to this option means read burst size
is unlimited. Not implemented yet.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
2015-01-15 16:10:16 +01:00
.B \-\-worker\-write\-rate=<SIZE>
Set maximum average write rate on frontend connection
per worker. Setting 0 to this option means write rate
is unlimited. Not implemented yet.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-worker\-write\-burst=<SIZE>
2015-01-15 16:10:16 +01:00
Set maximum write burst size on frontend connection per
worker. Setting 0 to this option means write burst size
is unlimited. Not implemented yet.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-15 16:10:16 +01:00
.B \-\-worker\-frontend\-connections=<N>
Set maximum number of simultaneous connections frontend
accepts. Setting 0 means unlimited.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-08-16 15:54:15 +02:00
.TP
2015-03-14 10:52:50 +01:00
.B \-\-backend\-http2\-connections\-per\-worker=<N>
2015-07-12 16:26:45 +02:00
Set maximum number of backend HTTP/2 physical
connections per worker. If pattern is used in \fI\%\-b\fP
option, this limit is applied to each pattern group (in
other words, each pattern group can have maximum <N>
HTTP/2 connections). The default value is 0, which
means that the value is adjusted to the number of
backend addresses. If pattern is used, this adjustment
is done for each pattern group.
2015-03-14 10:52:50 +01:00
.UNINDENT
.INDENT 0.0
.TP
2015-01-15 16:10:16 +01:00
.B \-\-backend\-http1\-connections\-per\-host=<N>
Set maximum number of backend concurrent HTTP/1
2015-06-22 17:50:35 +02:00
connections per origin host. This option is meaningful
when \fI\%\-s\fP option is used. The origin host is determined
2015-11-09 03:40:35 +01:00
by authority portion of request URI (or :authority
2015-06-22 17:50:35 +02:00
header field for HTTP/2). To limit the number of
connections per frontend for default mode, use
\fI\%\-\-backend\-http1\-connections\-per\-frontend\fP\&.
.sp
Default: \fB8\fP
.UNINDENT
.INDENT 0.0
2015-01-06 17:40:55 +01:00
.TP
2015-01-15 16:10:16 +01:00
.B \-\-backend\-http1\-connections\-per\-frontend=<N>
Set maximum number of backend concurrent HTTP/1
connections per frontend. This option is only used for
default mode. 0 means unlimited. To limit the number
of connections per host for HTTP/2 or SPDY proxy mode
(\-s option), use \fI\%\-\-backend\-http1\-connections\-per\-host\fP\&.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-rlimit\-nofile=<N>
2015-01-15 16:10:16 +01:00
Set maximum number of open files (RLIMIT_NOFILE) to <N>.
If 0 is given, nghttpx does not set the limit.
.sp
Default: \fB0\fP
.UNINDENT
2015-01-15 16:10:16 +01:00
.INDENT 0.0
.TP
.B \-\-backend\-request\-buffer=<SIZE>
Set buffer size used to store backend request.
.sp
Default: \fB16K\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-backend\-response\-buffer=<SIZE>
Set buffer size used to store backend response.
.sp
2016-01-25 11:44:41 +01:00
Default: \fB128K\fP
2015-01-15 16:10:16 +01:00
.UNINDENT
2015-10-19 17:22:03 +02:00
.INDENT 0.0
.TP
.B \-\-fastopen=<N>
Enables "TCP Fast Open" for the listening socket and
limits the maximum length for the queue of connections
that have not yet completed the three\-way handshake. If
value is 0 then fast open is disabled.
.sp
Default: \fB0\fP
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS Timeout
.INDENT 0.0
.TP
2015-01-29 15:29:52 +01:00
.B \-\-frontend\-http2\-read\-timeout=<DURATION>
2015-01-15 16:10:16 +01:00
Specify read timeout for HTTP/2 and SPDY frontend
2014-05-16 16:54:09 +02:00
connection.
.sp
2015-03-30 17:23:12 +02:00
Default: \fB3m\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-29 15:29:52 +01:00
.B \-\-frontend\-read\-timeout=<DURATION>
2015-01-15 16:10:16 +01:00
Specify read timeout for HTTP/1.1 frontend connection.
.sp
2015-10-19 17:22:03 +02:00
Default: \fB1m\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-29 15:29:52 +01:00
.B \-\-frontend\-write\-timeout=<DURATION>
2015-01-15 16:10:16 +01:00
Specify write timeout for all frontend connections.
.sp
2015-01-29 15:29:52 +01:00
Default: \fB30s\fP
.UNINDENT
.INDENT 0.0
2014-08-16 15:54:15 +02:00
.TP
2015-01-29 15:29:52 +01:00
.B \-\-stream\-read\-timeout=<DURATION>
2015-01-15 16:10:16 +01:00
Specify read timeout for HTTP/2 and SPDY streams. 0
means no timeout.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
2014-08-16 15:54:15 +02:00
.TP
2015-01-29 15:29:52 +01:00
.B \-\-stream\-write\-timeout=<DURATION>
2015-01-15 16:10:16 +01:00
Specify write timeout for HTTP/2 and SPDY streams. 0
means no timeout.
.sp
Default: \fB0\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-29 15:29:52 +01:00
.B \-\-backend\-read\-timeout=<DURATION>
Specify read timeout for backend connection.
.sp
2015-10-19 17:22:03 +02:00
Default: \fB1m\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-29 15:29:52 +01:00
.B \-\-backend\-write\-timeout=<DURATION>
2014-05-16 16:54:09 +02:00
Specify write timeout for backend connection.
.sp
2015-01-29 15:29:52 +01:00
Default: \fB30s\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-29 15:29:52 +01:00
.B \-\-backend\-keep\-alive\-timeout=<DURATION>
2015-01-15 16:10:16 +01:00
Specify keep\-alive timeout for backend connection.
.sp
2015-01-29 15:29:52 +01:00
Default: \fB2s\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-29 15:29:52 +01:00
.B \-\-listener\-disable\-timeout=<DURATION>
2015-01-15 16:10:16 +01:00
After accepting connection failed, connection listener
2015-01-29 15:29:52 +01:00
is disabled for a given amount of time. Specifying 0
2015-01-15 16:10:16 +01:00
disables this feature.
.sp
2016-01-19 12:55:08 +01:00
Default: \fB30s\fP
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS SSL/TLS
.INDENT 0.0
.TP
.B \-\-ciphers=<SUITE>
2015-01-15 16:10:16 +01:00
Set allowed cipher list. The format of the string is
described in OpenSSL ciphers(1).
.UNINDENT
.INDENT 0.0
.TP
.B \-k, \-\-insecure
2016-02-07 13:24:11 +01:00
Don\(aqt verify backend server\(aqs certificate if TLS is
enabled for backend connections.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-cacert=<PATH>
2016-02-07 13:24:11 +01:00
Set path to trusted CA certificate file used in backend
TLS connections. The file must be in PEM format. It
can contain multiple certificates. If the linked
OpenSSL is configured to load system wide certificates,
they are loaded at startup regardless of this option.
.UNINDENT
.INDENT 0.0
.TP
2015-01-15 16:10:16 +01:00
.B \-\-private\-key\-passwd\-file=<PATH>
Path to file that contains password for the server\(aqs
private key. If none is given and the private key is
password protected it\(aqll be requested interactively.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-subcert=<KEYPATH>:<CERTPATH>
2015-01-15 16:10:16 +01:00
Specify additional certificate and private key file.
nghttpx will choose certificates based on the hostname
indicated by client using TLS SNI extension. This
2015-03-30 17:23:12 +02:00
option can be used multiple times. To make OCSP
stapling work, <CERTPATH> must be absolute path.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-backend\-tls\-sni\-field=<HOST>
2015-01-15 16:10:16 +01:00
Explicitly set the content of the TLS SNI extension.
This will default to the backend HOST name.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-dh\-param\-file=<PATH>
2015-01-15 16:10:16 +01:00
Path to file that contains DH parameters in PEM format.
Without this option, DHE cipher suites are not
available.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-npn\-list=<LIST>
2015-01-15 16:10:16 +01:00
Comma delimited list of ALPN protocol identifier sorted
in the order of preference. That means most desirable
protocol comes first. This is used in both ALPN and
NPN. The parameter must be delimited by a single comma
only and any white spaces are treated as a part of
protocol string.
.sp
2015-02-22 10:02:57 +01:00
Default: \fBh2,h2\-16,h2\-14,spdy/3.1,http/1.1\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-verify\-client
Require and verify client certificate.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-verify\-client\-cacert=<PATH>
2015-01-15 16:10:16 +01:00
Path to file that contains CA certificates to verify
client certificate. The file must be in PEM format. It
can contain multiple certificates.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-client\-private\-key\-file=<PATH>
2015-01-15 16:10:16 +01:00
Path to file that contains client private key used in
backend client authentication.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-client\-cert\-file=<PATH>
2015-01-15 16:10:16 +01:00
Path to file that contains client certificate used in
backend client authentication.
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-tls\-proto\-list=<LIST>
2015-01-15 16:10:16 +01:00
Comma delimited list of SSL/TLS protocol to be enabled.
The following protocols are available: TLSv1.2, TLSv1.1
and TLSv1.0. The name matching is done in
case\-insensitive manner. The parameter must be
delimited by a single comma only and any white spaces
2015-10-19 17:22:03 +02:00
are treated as a part of protocol string. If the
protocol list advertised by client does not overlap this
list, you will receive the error message "unknown
protocol".
.sp
Default: \fBTLSv1.2,TLSv1.1\fP
.UNINDENT
.INDENT 0.0
.TP
2015-01-15 16:10:16 +01:00
.B \-\-tls\-ticket\-key\-file=<PATH>
2015-07-28 17:01:12 +02:00
Path to file that contains random data to construct TLS
session ticket parameters. If aes\-128\-cbc is given in
\fI\%\-\-tls\-ticket\-key\-cipher\fP, the file must contain exactly
48 bytes. If aes\-256\-cbc is given in
\fI\%\-\-tls\-ticket\-key\-cipher\fP, the file must contain exactly
80 bytes. This options can be used repeatedly to
specify multiple ticket parameters. If several files
are given, only the first key is used to encrypt TLS
session tickets. Other keys are accepted but server
will issue new session ticket with first key. This
allows session key rotation. Please note that key
rotation does not occur automatically. User should
rearrange files or change options values and restart
nghttpx gracefully. If opening or reading given file
fails, all loaded keys are discarded and it is treated
as if none of this option is given. If this option is
not given or an error occurred while opening or reading
a file, key is generated every 1 hour internally and
they are valid for 12 hours. This is recommended if
ticket key sharing between nghttpx instances is not
required.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-tls\-ticket\-key\-memcached=<HOST>,<PORT>
Specify address of memcached server to store session
cache. This enables shared TLS ticket key between
multiple nghttpx instances. nghttpx does not set TLS
ticket key to memcached. The external ticket key
generator is required. nghttpx just gets TLS ticket
keys from memcached, and use them, possibly replacing
current set of keys. It is up to extern TLS ticket key
generator to rotate keys frequently. See "TLS SESSION
TICKET RESUMPTION" section in manual page to know the
data format in memcached entry.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-tls\-ticket\-key\-memcached\-interval=<DURATION>
Set interval to get TLS ticket keys from memcached.
.sp
Default: \fB10m\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-tls\-ticket\-key\-memcached\-max\-retry=<N>
Set maximum number of consecutive retries before
abandoning TLS ticket key retrieval. If this number is
reached, the attempt is considered as failure, and
"failure" count is incremented by 1, which contributed
to the value controlled
\fI\%\-\-tls\-ticket\-key\-memcached\-max\-fail\fP option.
.sp
Default: \fB3\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-tls\-ticket\-key\-memcached\-max\-fail=<N>
Set maximum number of consecutive failure before
disabling TLS ticket until next scheduled key retrieval.
.sp
Default: \fB2\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-tls\-ticket\-key\-cipher=<CIPHER>
Specify cipher to encrypt TLS session ticket. Specify
either aes\-128\-cbc or aes\-256\-cbc. By default,
aes\-128\-cbc is used.
2015-01-15 16:10:16 +01:00
.UNINDENT
.INDENT 0.0
.TP
2015-03-30 17:23:12 +02:00
.B \-\-fetch\-ocsp\-response\-file=<PATH>
Path to fetch\-ocsp\-response script file. It should be
absolute path.
.sp
Default: \fB/usr/local/share/nghttp2/fetch\-ocsp\-response\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-ocsp\-update\-interval=<DURATION>
Set interval to update OCSP response cache.
.sp
Default: \fB4h\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-no\-ocsp
Disable OCSP stapling.
.UNINDENT
2015-07-28 17:01:12 +02:00
.INDENT 0.0
.TP
.B \-\-tls\-session\-cache\-memcached=<HOST>,<PORT>
Specify address of memcached server to store session
cache. This enables shared session cache between
multiple nghttpx instances.
.UNINDENT
2015-10-25 09:05:48 +01:00
.INDENT 0.0
.TP
.B \-\-tls\-dyn\-rec\-warmup\-threshold=<SIZE>
Specify the threshold size for TLS dynamic record size
behaviour. During a TLS session, after the threshold
number of bytes have been written, the TLS record size
will be increased to the maximum allowed (16K). The max
record size will continue to be used on the active TLS
session. After \fI\%\-\-tls\-dyn\-rec\-idle\-timeout\fP has elapsed,
the record size is reduced to 1300 bytes. Specify 0 to
always use the maximum record size, regardless of idle
period. This behaviour applies to all TLS based
frontends, and TLS HTTP/2 backends.
.sp
Default: \fB1M\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-tls\-dyn\-rec\-idle\-timeout=<DURATION>
Specify TLS dynamic record size behaviour timeout. See
\fI\%\-\-tls\-dyn\-rec\-warmup\-threshold\fP for more information.
This behaviour applies to all TLS based frontends, and
TLS HTTP/2 backends.
.sp
Default: \fB1s\fP
.UNINDENT
2016-02-07 13:24:11 +01:00
.INDENT 0.0
.TP
.B \-\-no\-http2\-cipher\-black\-list
Allow black listed cipher suite on HTTP/2 connection.
See \fI\%https://tools.ietf.org/html/rfc7540#appendix\-A\fP for
the complete HTTP/2 cipher suites black list.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-backend\-tls\-session\-cache\-per\-worker=<N>
Set the maximum number of backend TLS session cache
stored per worker.
.sp
Default: \fB10000\fP
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS HTTP/2 and SPDY
.INDENT 0.0
.TP
2015-01-15 16:10:16 +01:00
.B \-c, \-\-http2\-max\-concurrent\-streams=<N>
Set the maximum number of the concurrent streams in one
HTTP/2 and SPDY session.
.sp
Default: \fB100\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-frontend\-http2\-window\-bits=<N>
2015-01-15 16:10:16 +01:00
Sets the per\-stream initial window size of HTTP/2 SPDY
frontend connection. For HTTP/2, the size is 2**<N>\-1.
For SPDY, the size is 2**<N>.
.sp
Default: \fB16\fP
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-frontend\-http2\-connection\-window\-bits=<N>
2015-01-15 16:10:16 +01:00
Sets the per\-connection window size of HTTP/2 and SPDY
frontend connection. For HTTP/2, the size is
2**<N>\-1. For SPDY, the size is 2**<N>.
.sp
Default: \fB16\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-frontend\-no\-tls
Disable SSL/TLS on frontend connections.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-backend\-http2\-window\-bits=<N>
2015-01-15 16:10:16 +01:00
Sets the initial window size of HTTP/2 backend
2014-05-16 16:54:09 +02:00
connection to 2**<N>\-1.
.sp
Default: \fB16\fP
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-backend\-http2\-connection\-window\-bits=<N>
2015-01-15 16:10:16 +01:00
Sets the per\-connection window size of HTTP/2 backend
connection to 2**<N>\-1.
.sp
Default: \fB16\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-http2\-no\-cookie\-crumbling
Don\(aqt crumble cookie header field.
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-padding=<N>
2015-01-15 16:10:16 +01:00
Add at most <N> bytes to a HTTP/2 frame payload as
padding. Specify 0 to disable padding. This option is
meant for debugging purpose and not intended to enhance
protocol security.
.UNINDENT
2015-02-08 09:48:18 +01:00
.INDENT 0.0
.TP
.B \-\-no\-server\-push
2015-11-26 14:25:22 +01:00
Disable HTTP/2 server push. Server push is supported by
default mode and HTTP/2 frontend via Link header field.
It is also supported if both frontend and backend are
HTTP/2 (which implies \fI\%\-\-http2\-bridge\fP or \fI\%\-\-client\fP mode).
In this case, server push from backend session is
relayed to frontend, and server push via Link header
field is also supported. HTTP SPDY frontend does not
support server push.
2015-02-08 09:48:18 +01:00
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS Mode
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B (default mode)
2015-01-15 16:10:16 +01:00
Accept HTTP/2, SPDY and HTTP/1.1 over SSL/TLS. If
\fI\%\-\-frontend\-no\-tls\fP is used, accept HTTP/2 and HTTP/1.1.
The incoming HTTP/1.1 connection can be upgraded to
HTTP/2 through HTTP Upgrade. The protocol to the
backend is HTTP/1.1.
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-s, \-\-http2\-proxy
Like default mode, but enable secure proxy mode.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-http2\-bridge
2015-01-15 16:10:16 +01:00
Like default mode, but communicate with the backend in
HTTP/2 over SSL/TLS. Thus the incoming all connections
are converted to HTTP/2 connection and relayed to the
backend. See \fI\%\-\-backend\-http\-proxy\-uri\fP option if you are
behind the proxy and want to connect to the outside
2014-05-16 16:54:09 +02:00
HTTP/2 proxy.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-client
2015-01-15 16:10:16 +01:00
Accept HTTP/2 and HTTP/1.1 without SSL/TLS. The
incoming HTTP/1.1 connection can be upgraded to HTTP/2
connection through HTTP Upgrade. The protocol to the
backend is HTTP/2. To use nghttpx as a forward proxy,
use \fI\%\-p\fP option instead.
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-p, \-\-client\-proxy
2015-01-15 16:10:16 +01:00
Like \fI\%\-\-client\fP option, but it also requires the request
path from frontend must be an absolute URI, suitable for
use as a forward proxy.
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS Logging
.INDENT 0.0
.TP
.B \-L, \-\-log\-level=<LEVEL>
2015-01-15 16:10:16 +01:00
Set the severity level of log output. <LEVEL> must be
one of INFO, NOTICE, WARN, ERROR and FATAL.
.sp
Default: \fBNOTICE\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-accesslog\-file=<PATH>
2015-01-15 16:10:16 +01:00
Set path to write access log. To reopen file, send USR1
signal to nghttpx.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-accesslog\-syslog
2015-01-15 16:10:16 +01:00
Send access log to syslog. If this option is used,
\fI\%\-\-accesslog\-file\fP option is ignored.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-accesslog\-format=<FORMAT>
2015-01-15 16:10:16 +01:00
Specify format string for access log. The default
format is combined format. The following variables are
available:
.INDENT 7.0
.IP \(bu 2
2014-11-24 07:27:41 +01:00
$remote_addr: client IP address.
.IP \(bu 2
2014-11-24 07:27:41 +01:00
$time_local: local time in Common Log format.
.IP \(bu 2
2014-11-24 07:27:41 +01:00
$time_iso8601: local time in ISO 8601 format.
.IP \(bu 2
2014-11-24 07:27:41 +01:00
$request: HTTP request line.
.IP \(bu 2
2014-11-24 07:27:41 +01:00
$status: HTTP response status code.
.IP \(bu 2
2015-01-15 16:10:16 +01:00
$body_bytes_sent: the number of bytes sent to client
as response body.
.IP \(bu 2
2015-01-15 16:10:16 +01:00
$http_<VAR>: value of HTTP request header <VAR> where
\(aq_\(aq in <VAR> is replaced with \(aq\-\(aq.
.IP \(bu 2
2014-11-24 07:27:41 +01:00
$remote_port: client port.
.IP \(bu 2
2014-11-24 07:27:41 +01:00
$server_port: server port.
.IP \(bu 2
2015-01-15 16:10:16 +01:00
$request_time: request processing time in seconds with
milliseconds resolution.
.IP \(bu 2
2014-11-24 07:27:41 +01:00
$pid: PID of the running process.
.IP \(bu 2
2015-01-15 16:10:16 +01:00
$alpn: ALPN identifier of the protocol which generates
the response. For HTTP/1, ALPN is always http/1.1,
regardless of minor version.
2015-07-11 05:45:23 +02:00
.IP \(bu 2
$ssl_cipher: cipher used for SSL/TLS connection.
.IP \(bu 2
$ssl_protocol: protocol for SSL/TLS connection.
.IP \(bu 2
$ssl_session_id: session ID for SSL/TLS connection.
.IP \(bu 2
$ssl_session_reused: "r" if SSL/TLS session was
reused. Otherwise, "."
.UNINDENT
.sp
2015-07-14 17:01:04 +02:00
The variable can be enclosed by "{" and "}" for
disambiguation (e.g., ${remote_addr}).
.sp
Default: \fB$remote_addr \- \- [$time_local] "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent"\fP
.UNINDENT
.INDENT 0.0
2014-11-24 07:27:41 +01:00
.TP
.B \-\-errorlog\-file=<PATH>
2015-01-15 16:10:16 +01:00
Set path to write error log. To reopen file, send USR1
2015-04-08 10:36:12 +02:00
signal to nghttpx. stderr will be redirected to the
error log file unless \fI\%\-\-errorlog\-syslog\fP is used.
.sp
Default: \fB/dev/stderr\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-errorlog\-syslog
2015-01-15 16:10:16 +01:00
Send error log to syslog. If this option is used,
\fI\%\-\-errorlog\-file\fP option is ignored.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-syslog\-facility=<FACILITY>
2014-05-16 16:54:09 +02:00
Set syslog facility to <FACILITY>.
.sp
Default: \fBdaemon\fP
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS HTTP
.INDENT 0.0
.TP
.B \-\-add\-x\-forwarded\-for
2015-01-15 16:10:16 +01:00
Append X\-Forwarded\-For header field to the downstream
request.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-strip\-incoming\-x\-forwarded\-for
2015-01-15 16:10:16 +01:00
Strip X\-Forwarded\-For header field from inbound client
requests.
.UNINDENT
.INDENT 0.0
2014-10-27 16:35:44 +01:00
.TP
2016-01-19 12:55:08 +01:00
.B \-\-add\-forwarded=<LIST>
Append RFC 7239 Forwarded header field with parameters
specified in comma delimited list <LIST>. The supported
parameters are "by", "for", "host", and "proto". By
default, the value of "by" and "for" parameters are
obfuscated string. See \fI\%\-\-forwarded\-by\fP and
\fI\%\-\-forwarded\-for\fP options respectively. Note that nghttpx
does not translate non\-standard X\-Forwarded\-* header
fields into Forwarded header field, and vice versa.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-strip\-incoming\-forwarded
Strip Forwarded header field from inbound client
requests.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-forwarded\-by=(obfuscated|ip|<VALUE>)
Specify the parameter value sent out with "by" parameter
of Forwarded header field. If "obfuscated" is given,
the string is randomly generated at startup. If "ip" is
given, the interface address of the connection,
2016-02-07 13:24:11 +01:00
including port number, is sent with "by" parameter. In
case of UNIX domain socket, "localhost" is used instead
of address and port. User can also specify the static
obfuscated string. The limitation is that it must start
with "_", and only consists of character set
[A\-Za\-z0\-9._\-], as described in RFC 7239.
2016-01-19 12:55:08 +01:00
.sp
Default: \fBobfuscated\fP
.UNINDENT
.INDENT 0.0
.TP
2016-01-25 11:44:41 +01:00
.B \-\-forwarded\-for=(obfuscated|ip)
2016-01-19 12:55:08 +01:00
Specify the parameter value sent out with "for"
parameter of Forwarded header field. If "obfuscated" is
given, the string is randomly generated for each client
connection. If "ip" is given, the remote client address
of the connection, without port number, is sent with
2016-02-07 13:24:11 +01:00
"for" parameter. In case of UNIX domain socket,
"localhost" is used instead of address.
2016-01-19 12:55:08 +01:00
.sp
Default: \fBobfuscated\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-no\-via
2015-01-15 16:10:16 +01:00
Don\(aqt append to Via header field. If Via header field
is received, it is left unaltered.
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-no\-location\-rewrite
2015-01-15 16:10:16 +01:00
Don\(aqt rewrite location header field on \fI\%\-\-http2\-bridge\fP,
\fI\%\-\-client\fP and default mode. For \fI\%\-\-http2\-proxy\fP and
\fI\%\-\-client\-proxy\fP mode, location header field will not be
altered regardless of this option.
.UNINDENT
.INDENT 0.0
2014-08-16 15:54:15 +02:00
.TP
2015-07-28 17:01:12 +02:00
.B \-\-host\-rewrite
Rewrite host and :authority header fields on
2015-02-08 09:48:18 +01:00
\fI\%\-\-http2\-bridge\fP, \fI\%\-\-client\fP and default mode. For
\fI\%\-\-http2\-proxy\fP and \fI\%\-\-client\-proxy\fP mode, these headers
will not be altered regardless of this option.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-altsvc=<PROTOID,PORT[,HOST,[ORIGIN]]>
2015-01-15 16:10:16 +01:00
Specify protocol ID, port, host and origin of
alternative service. <HOST> and <ORIGIN> are optional.
2015-05-15 17:10:41 +02:00
They are advertised in alt\-svc header field only in
HTTP/1.1 frontend. This option can be used multiple
times to specify multiple alternative services.
Example: \fI\%\-\-altsvc\fP=h2,443
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
2015-06-12 15:38:19 +02:00
.B \-\-add\-request\-header=<HEADER>
Specify additional header field to add to request header
set. This option just appends header field and won\(aqt
replace anything already set. This option can be used
several times to specify multiple header fields.
Example: \fI\%\-\-add\-request\-header\fP="foo: bar"
.UNINDENT
.INDENT 0.0
.TP
.B \-\-add\-response\-header=<HEADER>
2015-01-15 16:10:16 +01:00
Specify additional header field to add to response
header set. This option just appends header field and
won\(aqt replace anything already set. This option can be
used several times to specify multiple header fields.
Example: \fI\%\-\-add\-response\-header\fP="foo: bar"
.UNINDENT
2015-05-07 13:55:10 +02:00
.INDENT 0.0
.TP
2016-02-07 13:24:11 +01:00
.B \-\-request\-header\-field\-buffer=<SIZE>
2016-01-11 08:23:32 +01:00
Set maximum buffer size for incoming HTTP request header
field list. This is the sum of header name and value in
2016-02-07 13:24:11 +01:00
bytes. If trailer fields exist, they are counted
towards this number.
2015-05-07 13:55:10 +02:00
.sp
Default: \fB64K\fP
.UNINDENT
.INDENT 0.0
.TP
2016-02-07 13:24:11 +01:00
.B \-\-max\-request\-header\-fields=<N>
2016-01-11 08:23:32 +01:00
Set maximum number of incoming HTTP request header
2016-02-07 13:24:11 +01:00
fields. If trailer fields exist, they are counted
towards this number.
2015-05-07 13:55:10 +02:00
.sp
Default: \fB100\fP
.UNINDENT
2016-02-07 13:24:11 +01:00
.INDENT 0.0
.TP
.B \-\-response\-header\-field\-buffer=<SIZE>
Set maximum buffer size for incoming HTTP response
header field list. This is the sum of header name and
value in bytes. If trailer fields exist, they are
counted towards this number.
.sp
Default: \fB64K\fP
.UNINDENT
.INDENT 0.0
.TP
.B \-\-max\-response\-header\-fields=<N>
Set maximum number of incoming HTTP response header
fields. If trailer fields exist, they are counted
towards this number.
.sp
Default: \fB500\fP
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS Debug
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-frontend\-http2\-dump\-request\-header=<PATH>
2015-01-15 16:10:16 +01:00
Dumps request headers received by HTTP/2 frontend to the
file denoted in <PATH>. The output is done in HTTP/1
header field format and each header block is followed by
an empty line. This option is not thread safe and MUST
NOT be used with option \fI\%\-n\fP<N>, where <N> >= 2.
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-\-frontend\-http2\-dump\-response\-header=<PATH>
2015-01-15 16:10:16 +01:00
Dumps response headers sent from HTTP/2 frontend to the
file denoted in <PATH>. The output is done in HTTP/1
header field format and each header block is followed by
an empty line. This option is not thread safe and MUST
NOT be used with option \fI\%\-n\fP<N>, where <N> >= 2.
.UNINDENT
.INDENT 0.0
2014-05-16 16:54:09 +02:00
.TP
.B \-o, \-\-frontend\-frame\-debug
2015-01-15 16:10:16 +01:00
Print HTTP/2 frames in frontend to stderr. This option
is not thread safe and MUST NOT be used with option
\fI\%\-n\fP=N, where N >= 2.
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS Process
.INDENT 0.0
.TP
.B \-D, \-\-daemon
2015-01-15 16:10:16 +01:00
Run in a background. If \fI\%\-D\fP is used, the current working
directory is changed to \(aq\fI/\fP\(aq.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-pid\-file=<PATH>
Set path to save PID of this program.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-user=<USER>
2015-01-15 16:10:16 +01:00
Run this program as <USER>. This option is intended to
be used to drop root privileges.
.UNINDENT
2015-09-06 10:41:37 +02:00
.SS Scripting
.INDENT 0.0
.TP
2015-10-25 09:05:48 +01:00
.B \-\-mruby\-file=<PATH>
Set mruby script file
2015-09-06 10:41:37 +02:00
.UNINDENT
2015-02-01 10:33:24 +01:00
.SS Misc
.INDENT 0.0
.TP
.B \-\-conf=<PATH>
2014-05-16 16:54:09 +02:00
Load configuration from <PATH>.
.sp
Default: \fB/etc/nghttpx/nghttpx.conf\fP
.UNINDENT
.INDENT 0.0
.TP
2015-07-12 16:26:45 +02:00
.B \-\-include=<PATH>
Load additional configurations from <PATH>. File <PATH>
is read when configuration parser encountered this
option. This option can be used multiple times, or even
recursively.
.UNINDENT
.INDENT 0.0
.TP
.B \-v, \-\-version
Print version and exit.
.UNINDENT
.INDENT 0.0
.TP
.B \-h, \-\-help
Print this help and exit.
.UNINDENT
2015-01-15 16:10:16 +01:00
.sp
The <SIZE> argument is an integer and an optional unit (e.g., 10K is
10 * 1024). Units are K, M and G (powers of 1024).
2015-01-29 15:29:52 +01:00
.sp
The <DURATION> argument is an integer and an optional unit (e.g., 1s
2015-03-30 17:23:12 +02:00
is 1 second and 500ms is 500 milliseconds). Units are h, m, s or ms
(hours, minutes, seconds and milliseconds, respectively). If a unit
is omitted, a second is used as unit.
.SH FILES
.INDENT 0.0
.TP
.B \fI/etc/nghttpx/nghttpx.conf\fP
The default configuration file path nghttpx searches at startup.
The configuration file path can be changed using \fI\%\-\-conf\fP
option.
.sp
Those lines which are staring \fB#\fP are treated as comment.
.sp
The option name in the configuration file is the long command\-line
option name with leading \fB\-\-\fP stripped (e.g., \fBfrontend\fP). Put
\fB=\fP between option name and value. Don\(aqt put extra leading or
trailing spaces.
.sp
2016-01-19 12:55:08 +01:00
When specifying arguments including characters which have special
meaning to a shell, we usually use quotes so that shell does not
interpret them. When writing this configuration file, quotes for
this purpose must not be used. For example, specify additional
request header field, do this:
.INDENT 7.0
.INDENT 3.5
.sp
.nf
.ft C
add\-request\-header=foo: bar
.ft P
.fi
.UNINDENT
.UNINDENT
.sp
instead of:
.INDENT 7.0
.INDENT 3.5
.sp
.nf
.ft C
add\-request\-header="foo: bar"
.ft P
.fi
.UNINDENT
.UNINDENT
.sp
The options which do not take argument in the command\-line \fItake\fP
argument in the configuration file. Specify \fByes\fP as an argument
(e.g., \fBhttp2\-proxy=yes\fP). If other string is given, it is
ignored.
.sp
To specify private key and certificate file which are given as
2015-05-12 03:49:42 +02:00
positional arguments in command\-line, use \fBprivate\-key\-file\fP and
\fBcertificate\-file\fP\&.
.sp
\fI\%\-\-conf\fP option cannot be used in the configuration file and
will be ignored if specified.
.UNINDENT
.SH SIGNALS
.INDENT 0.0
.TP
.B SIGQUIT
Shutdown gracefully. First accept pending connections and stop
accepting connection. After all connections are handled, nghttpx
exits.
.TP
.B SIGUSR1
Reopen log files.
.TP
.B SIGUSR2
Fork and execute nghttpx. It will execute the binary in the same
2015-01-10 09:12:24 +01:00
path with same command\-line arguments and environment variables.
After new process comes up, sending SIGQUIT to the original process
to perform hot swapping.
.UNINDENT
2015-09-23 17:17:14 +02:00
.sp
\fBNOTE:\fP
.INDENT 0.0
.INDENT 3.5
2015-10-19 17:22:03 +02:00
nghttpx consists of multiple processes: one process for processing
these signals, and another one for processing requests. The former
spawns the latter. The former is called master process, and the
latter is called worker process. If neverbleed is enabled, the
worker process spawns neverbleed daemon process which does RSA key
processing. The above signal must be sent to the master process.
If the other processes received one of them, it is ignored. This
behaviour of these processes may change in the future release. In
other words, in the future release, the processes other than master
process may terminate upon the reception of these signals.
Therefore these signals should not be sent to the processes other
than master process.
2015-09-23 17:17:14 +02:00
.UNINDENT
.UNINDENT
2015-02-08 09:48:18 +01:00
.SH SERVER PUSH
.sp
2015-11-26 14:25:22 +01:00
nghttpx supports HTTP/2 server push in default mode with Link header
field. nghttpx looks for Link header field (\fI\%RFC 5988\fP) in response headers from
2015-02-08 09:48:18 +01:00
backend server and extracts URI\-reference with parameter
\fBrel=preload\fP (see \fI\%preload\fP)
and pushes those URIs to the frontend client. Here is a sample Link
header field to initiate server push:
.INDENT 0.0
.INDENT 3.5
.sp
.nf
.ft C
Link: </fonts/font.woff>; rel=preload
Link: </css/theme.css>; rel=preload
.ft P
.fi
.UNINDENT
.UNINDENT
.sp
2015-09-06 10:41:37 +02:00
Currently, the following restriction is applied for server push:
2015-02-08 09:48:18 +01:00
.INDENT 0.0
.IP 1. 3
The associated stream must have method "GET" or "POST". The
associated stream\(aqs status code must be 200.
.UNINDENT
.sp
2015-09-06 10:41:37 +02:00
This limitation may be loosened in the future release.
2015-11-26 14:25:22 +01:00
.sp
nghttpx also supports server push if both frontend and backend are
HTTP/2 (which implies \fI\%\-\-http2\-bridge\fP or \fI\%\-\-client\fP).
In this case, in addition to server push via Link header field, server
push from backend is relayed to frontend HTTP/2 session.
.sp
HTTP/2 server push will be disabled if \fI\%\-\-http2\-proxy\fP or
\fI\%\-\-client\-proxy\fP is used.
2015-02-26 16:57:13 +01:00
.SH UNIX DOMAIN SOCKET
.sp
nghttpx supports UNIX domain socket with a filename for both frontend
and backend connections.
.sp
Please note that current nghttpx implementation does not delete a
socket with a filename. And on start up, if nghttpx detects that the
specified socket already exists in the file system, nghttpx first
deletes it. However, if SIGUSR2 is used to execute new binary and
both old and new configurations use same filename, new binary does not
delete the socket and continues to use it.
2015-04-08 10:36:12 +02:00
.SH OCSP STAPLING
.sp
2015-06-22 17:50:35 +02:00
OCSP query is done using external Python script
\fBfetch\-ocsp\-response\fP, which has been originally developed in Perl
as part of h2o project (\fI\%https://github.com/h2o/h2o\fP), and was
translated into Python.
2015-04-08 10:36:12 +02:00
.sp
The script file is usually installed under
\fB$(prefix)/share/nghttp2/\fP directory. The actual path to script can
be customized using \fI\%\-\-fetch\-ocsp\-response\-file\fP option.
2015-08-14 16:59:47 +02:00
.sp
If OCSP query is failed, previous OCSP response, if any, is continued
to be used.
2015-07-28 17:01:12 +02:00
.SH TLS SESSION RESUMPTION
.sp
nghttpx supports TLS session resumption through both session ID and
session ticket.
.SS SESSION ID RESUMPTION
.sp
By default, session ID is shared by all worker threads.
.sp
If \fI\%\-\-tls\-session\-cache\-memcached\fP is given, nghttpx will
insert serialized session data to memcached with
\fBnghttpx:tls\-session\-cache:\fP + lowercased hex string of session ID
as a memcached entry key, with expiry time 12 hours. Session timeout
is set to 12 hours.
.SS TLS SESSION TICKET RESUMPTION
.sp
By default, session ticket is shared by all worker threads. The
automatic key rotation is also enabled by default. Every an hour, new
encryption key is generated, and previous encryption key becomes
decryption only key. We set session timeout to 12 hours, and thus we
keep at most 12 keys.
.sp
If \fI\%\-\-tls\-ticket\-key\-memcached\fP is given, encryption keys are
retrieved from memcached. nghttpx just reads keys from memcached; one
has to deploy key generator program to update keys frequently (e.g.,
2015-08-08 18:13:35 +02:00
every 1 hour). The example key generator tlsticketupdate.go is
available under contrib directory in nghttp2 archive. The memcached
entry key is \fBnghttpx:tls\-ticket\-key\fP\&. The data format stored in
memcached is the binary format described below:
2015-07-28 17:01:12 +02:00
.INDENT 0.0
.INDENT 3.5
.sp
.nf
.ft C
+\-\-\-\-\-\-\-\-\-\-\-\-\-\-+\-\-\-\-\-\-\-+\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-+
| VERSION (4) |LEN (2)|KEY(48 or 80) ...
+\-\-\-\-\-\-\-\-\-\-\-\-\-\-+\-\-\-\-\-\-\-+\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-+
^ |
| |
+\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-+
(LEN, KEY) pair can be repeated
.ft P
.fi
.UNINDENT
.UNINDENT
.sp
All numbers in the above figure is bytes. All integer fields are
network byte order.
.sp
First 4 bytes integer VERSION field, which must be 1. The 2 bytes
integer LEN field gives the length of following KEY field, which
contains key. If \fI\%\-\-tls\-ticket\-key\-cipher\fP=aes\-128\-cbc is
used, LEN must be 48. If
\fI\%\-\-tls\-ticket\-key\-cipher\fP=aes\-256\-cbc is used, LEN must be
80. LEN and KEY pair can be repeated multiple times to store multiple
keys. The key appeared first is used as encryption key. All the
remaining keys are used as decryption only.
.sp
If \fI\%\-\-tls\-ticket\-key\-file\fP is given, encryption key is read
from the given file. In this case, nghttpx does not rotate key
automatically. To rotate key, one has to restart nghttpx (see
SIGNALS).
2015-09-06 10:41:37 +02:00
.SH MRUBY SCRIPTING
.sp
\fBWARNING:\fP
.INDENT 0.0
.INDENT 3.5
The current mruby extension API is experimental and not frozen. The
API is subject to change in the future release.
.UNINDENT
.UNINDENT
.sp
nghttpx allows users to extend its capability using mruby scripts.
nghttpx has 2 hook points to execute mruby script: request phase and
response phase. The request phase hook is invoked after all request
header fields are received from client. The response phase hook is
invoked after all response header fields are received from backend
server. These hooks allows users to modify header fields, or common
HTTP variables, like authority or request path, and even return custom
response without forwarding request to backend servers.
.sp
2015-10-25 09:05:48 +01:00
To specify mruby script file, use \fI\%\-\-mruby\-file\fP option. The
2015-10-19 17:22:03 +02:00
script will be evaluated once per thread on startup, and it must
instantiate object and evaluate it as the return value (e.g.,
\fBApp.new\fP). This object is called app object. If app object
defines \fBon_req\fP method, it is called with \fI\%Nghttpx::Env\fP
object on request hook. Similarly, if app object defines \fBon_resp\fP
method, it is called with \fI\%Nghttpx::Env\fP object on response
hook. For each method invocation, user can can access
\fI\%Nghttpx::Request\fP and \fI\%Nghttpx::Response\fP objects
via \fI\%Nghttpx::Env#req\fP and \fI\%Nghttpx::Env#resp\fP
respectively.
2015-09-06 10:41:37 +02:00
.INDENT 0.0
.TP
.B Nghttpx::REQUEST_PHASE
Constant to represent request phase.
.UNINDENT
.INDENT 0.0
.TP
.B Nghttpx::RESPONSE_PHASE
Constant to represent response phase.
.UNINDENT
.INDENT 0.0
.TP
.B class Nghttpx::Env
Object to represent current request specific context.
.INDENT 7.0
.TP
.B attribute [R] req
Return \fI\%Request\fP object.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R] resp
Return \fI\%Response\fP object.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R] ctx
Return Ruby hash object. It persists until request finishes.
So values set in request phase hoo can be retrieved in
response phase hook.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R] phase
Return the current phase.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R] remote_addr
Return IP address of a remote client.
.UNINDENT
.UNINDENT
.INDENT 0.0
.TP
.B class Nghttpx::Request
Object to represent request from client. The modification to
Request object is allowed only in request phase hook.
.INDENT 7.0
.TP
.B attribute [R] http_version_major
Return HTTP major version.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R] http_version_minor
Return HTTP minor version.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R/W] method
HTTP method. On assignment, copy of given value is assigned.
We don\(aqt accept arbitrary method name. We will document them
later, but well known methods, like GET, PUT and POST, are all
supported.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R/W] authority
Authority (i.e., example.org), including optional port
component . On assignment, copy of given value is assigned.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R/W] scheme
Scheme (i.e., http, https). On assignment, copy of given
value is assigned.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R/W] path
Request path, including query component (i.e., /index.html).
On assignment, copy of given value is assigned. The path does
not include authority component of URI.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R] headers
Return Ruby hash containing copy of request header fields.
Changing values in returned hash does not change request
header fields actually used in request processing. Use
\fI\%Nghttpx::Request#add_header\fP or
\fI\%Nghttpx::Request#set_header\fP to change request
header fields.
.UNINDENT
.INDENT 7.0
.TP
.B add_header(key, value)
Add header entry associated with key. The value can be single
string or array of string. It does not replace any existing
values associated with key.
.UNINDENT
.INDENT 7.0
.TP
.B set_header(key, value)
Set header entry associated with key. The value can be single
string or array of string. It replaces any existing values
associated with key.
.UNINDENT
.INDENT 7.0
.TP
.B clear_headers()
Clear all existing request header fields.
.UNINDENT
.INDENT 7.0
.TP
.B push uri
Initiate to push resource identified by \fIuri\fP\&. Only HTTP/2
protocol supports this feature. For the other protocols, this
method is noop. \fIuri\fP can be absolute URI, absolute path or
relative path to the current request. For absolute or
relative path, scheme and authority are inherited from the
current request. Currently, method is always GET. nghttpx
will issue request to backend servers to fulfill this request.
The request and response phase hooks will be called for pushed
resource as well.
.UNINDENT
.UNINDENT
.INDENT 0.0
.TP
.B class Nghttpx::Response
Object to represent response from backend server.
.INDENT 7.0
.TP
.B attribute [R] http_version_major
Return HTTP major version.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R] http_version_minor
Return HTTP minor version.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R/W] status
HTTP status code. It must be in the range [200, 999],
inclusive. The non\-final status code is not supported in
mruby scripting at the moment.
.UNINDENT
.INDENT 7.0
.TP
.B attribute [R] headers
Return Ruby hash containing copy of response header fields.
Changing values in returned hash does not change response
header fields actually used in response processing. Use
\fI\%Nghttpx::Response#add_header\fP or
\fI\%Nghttpx::Response#set_header\fP to change response
header fields.
.UNINDENT
.INDENT 7.0
.TP
.B add_header(key, value)
Add header entry associated with key. The value can be single
string or array of string. It does not replace any existing
values associated with key.
.UNINDENT
.INDENT 7.0
.TP
.B set_header(key, value)
Set header entry associated with key. The value can be single
string or array of string. It replaces any existing values
associated with key.
.UNINDENT
.INDENT 7.0
.TP
.B clear_headers()
Clear all existing response header fields.
.UNINDENT
.INDENT 7.0
.TP
.B return(body)
Return custom response \fIbody\fP to a client. When this method
is called in request phase hook, the request is not forwarded
to the backend, and response phase hook for this request will
2015-11-09 03:40:35 +01:00
not be invoked. When this method is called in response phase
2015-09-06 10:41:37 +02:00
hook, response from backend server is canceled and discarded.
The status code and response header fields should be set
before using this method. To set status code, use :rb:meth To
set response header fields, use
\fI\%Nghttpx::Response#status\fP\&. If status code is not
set, 200 is used. \fI\%Nghttpx::Response#add_header\fP and
\fI\%Nghttpx::Response#set_header\fP\&. When this method is
invoked in response phase hook, the response headers are
filled with the ones received from backend server. To send
completely custom header fields, first call
\fI\%Nghttpx::Response#clear_headers\fP to erase all
existing header fields, and then add required header fields.
It is an error to call this method twice for a given request.
.UNINDENT
.UNINDENT
.SS MRUBY EXAMPLES
.sp
2015-11-09 03:40:35 +01:00
Modify request path:
2015-09-06 10:41:37 +02:00
.INDENT 0.0
.INDENT 3.5
.sp
.nf
.ft C
2015-10-19 17:22:03 +02:00
class App
def on_req(env)
env.req.path = "/apps#{env.req.path}"
end
2015-09-06 10:41:37 +02:00
end
2015-10-19 17:22:03 +02:00
App.new
2015-09-06 10:41:37 +02:00
.ft P
.fi
.UNINDENT
.UNINDENT
.sp
2015-10-19 17:22:03 +02:00
Don\(aqt forget to instantiate and evaluate object at the last line.
2015-09-06 10:41:37 +02:00
.sp
Restrict permission of viewing a content to a specific client
addresses:
.INDENT 0.0
.INDENT 3.5
.sp
.nf
.ft C
2015-10-19 17:22:03 +02:00
class App
def on_req(env)
allowed_clients = ["127.0.0.1", "::1"]
2015-09-06 10:41:37 +02:00
2015-10-19 17:22:03 +02:00
if env.req.path.start_with?("/log/") &&
!allowed_clients.include?(env.remote_addr) then
env.resp.status = 404
env.resp.return "permission denied"
end
2015-09-06 10:41:37 +02:00
end
end
2015-10-19 17:22:03 +02:00
App.new
2015-09-06 10:41:37 +02:00
.ft P
.fi
.UNINDENT
.UNINDENT
.SH SEE ALSO
.sp
\fInghttp(1)\fP, \fInghttpd(1)\fP, \fIh2load(1)\fP
.SH AUTHOR
Tatsuhiro Tsujikawa
.SH COPYRIGHT
2016-01-11 08:23:32 +01:00
2012, 2015, 2016, Tatsuhiro Tsujikawa
.\" Generated by docutils manpage writer.
.