nghttp2/src/shrpx_http.cc

281 lines
8.7 KiB
C++
Raw Normal View History

/*
2014-03-30 12:09:21 +02:00
* nghttp2 - HTTP/2 C Library
*
* Copyright (c) 2012 Tatsuhiro Tsujikawa
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated documentation files (the
* "Software"), to deal in the Software without restriction, including
* without limitation the rights to use, copy, modify, merge, publish,
* distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so, subject to
* the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
#include "shrpx_http.h"
#include "shrpx_config.h"
#include "shrpx_log.h"
#include "http2.h"
#include "util.h"
2013-07-12 17:19:03 +02:00
using namespace nghttp2;
namespace shrpx {
namespace http {
2016-03-19 15:41:21 +01:00
StringRef create_error_html(BlockAllocator &balloc, unsigned int http_status) {
auto &httpconf = get_config()->http;
const auto &error_pages = httpconf.error_pages;
for (const auto &page : error_pages) {
if (page.http_status == 0 || page.http_status == http_status) {
2016-03-19 15:41:21 +01:00
return StringRef{std::begin(page.content), std::end(page.content)};
}
}
auto status_string = http2::stringify_status(balloc, http_status);
auto reason_phrase = http2::get_reason_phrase(http_status);
2016-03-19 15:41:21 +01:00
2016-03-20 09:55:17 +01:00
return concat_string_ref(
balloc, StringRef::from_lit(R"(<!DOCTYPE html><html lang="en"><title>)"),
status_string, StringRef::from_lit(" "), reason_phrase,
StringRef::from_lit("</title><body><h1>"), status_string,
StringRef::from_lit(" "), reason_phrase,
StringRef::from_lit("</h1><footer>"), httpconf.server_name,
2016-03-20 09:55:17 +01:00
StringRef::from_lit("</footer></body></html>"));
}
StringRef create_forwarded(BlockAllocator &balloc, int params,
const StringRef &node_by, const StringRef &node_for,
const StringRef &host, const StringRef &proto) {
size_t len = 0;
if ((params & FORWARDED_BY) && !node_by.empty()) {
len += str_size("by=\"") + node_by.size() + str_size("\";");
}
if ((params & FORWARDED_FOR) && !node_for.empty()) {
len += str_size("for=\"") + node_for.size() + str_size("\";");
}
if ((params & FORWARDED_HOST) && !host.empty()) {
len += str_size("host=\"") + host.size() + str_size("\";");
}
if ((params & FORWARDED_PROTO) && !proto.empty()) {
len += str_size("proto=") + proto.size() + str_size(";");
}
auto iov = make_byte_ref(balloc, len + 1);
auto p = iov.base;
if ((params & FORWARDED_BY) && !node_by.empty()) {
// This must be quoted-string unless it is obfuscated version
// (which starts with "_") or some special value (e.g.,
// "localhost" for UNIX domain socket), since ':' is not allowed
// in token. ':' is used to separate host and port.
if (node_by[0] == '_' || node_by[0] == 'l') {
p = util::copy_lit(p, "by=");
p = std::copy(std::begin(node_by), std::end(node_by), p);
p = util::copy_lit(p, ";");
} else {
p = util::copy_lit(p, "by=\"");
p = std::copy(std::begin(node_by), std::end(node_by), p);
p = util::copy_lit(p, "\";");
}
}
if ((params & FORWARDED_FOR) && !node_for.empty()) {
// We only quote IPv6 literal address only, which starts with '['.
if (node_for[0] == '[') {
p = util::copy_lit(p, "for=\"");
p = std::copy(std::begin(node_for), std::end(node_for), p);
p = util::copy_lit(p, "\";");
} else {
p = util::copy_lit(p, "for=");
p = std::copy(std::begin(node_for), std::end(node_for), p);
p = util::copy_lit(p, ";");
}
}
if ((params & FORWARDED_HOST) && !host.empty()) {
// Just be quoted to skip checking characters.
p = util::copy_lit(p, "host=\"");
p = std::copy(std::begin(host), std::end(host), p);
p = util::copy_lit(p, "\";");
}
if ((params & FORWARDED_PROTO) && !proto.empty()) {
// Scheme production rule only allow characters which are all in
// token.
p = util::copy_lit(p, "proto=");
p = std::copy(std::begin(proto), std::end(proto), p);
*p++ = ';';
}
if (iov.base == p) {
return StringRef{};
}
--p;
*p = '\0';
return StringRef{iov.base, p};
}
2014-11-27 15:39:04 +01:00
std::string colorizeHeaders(const char *hdrs) {
std::string nhdrs;
const char *p = strchr(hdrs, '\n');
2014-11-27 15:39:04 +01:00
if (!p) {
// Not valid HTTP header
return hdrs;
}
2014-11-27 15:39:04 +01:00
nhdrs.append(hdrs, p + 1);
++p;
2014-11-27 15:39:04 +01:00
while (1) {
const char *np = strchr(p, ':');
if (!np) {
nhdrs.append(p);
break;
}
nhdrs += TTY_HTTP_HD;
nhdrs.append(p, np);
nhdrs += TTY_RST;
auto redact = util::strieq_l("authorization", StringRef{p, np});
p = np;
np = strchr(p, '\n');
2014-11-27 15:39:04 +01:00
if (!np) {
if (redact) {
nhdrs.append(": <redacted>");
} else {
nhdrs.append(p);
}
break;
}
if (redact) {
nhdrs.append(": <redacted>\n");
} else {
nhdrs.append(p, np + 1);
}
2014-11-27 15:39:04 +01:00
p = np + 1;
}
return nhdrs;
}
2014-11-27 15:39:04 +01:00
ssize_t select_padding_callback(nghttp2_session *session,
const nghttp2_frame *frame, size_t max_payload,
void *user_data) {
return std::min(max_payload, frame->hd.length + get_config()->padding);
}
2017-10-25 17:45:22 +02:00
StringRef create_affinity_cookie(BlockAllocator &balloc, const StringRef &name,
uint32_t affinity_cookie,
const StringRef &path, bool secure) {
static constexpr auto PATH_PREFIX = StringRef::from_lit("; Path=");
static constexpr auto SECURE = StringRef::from_lit("; Secure");
// <name>=<value>[; Path=<path>][; Secure]
size_t len = name.size() + 1 + 8;
if (!path.empty()) {
len += PATH_PREFIX.size() + path.size();
}
if (secure) {
len += SECURE.size();
}
auto iov = make_byte_ref(balloc, len + 1);
auto p = iov.base;
p = std::copy(std::begin(name), std::end(name), p);
*p++ = '=';
affinity_cookie = htonl(affinity_cookie);
p = util::format_hex(p,
StringRef{reinterpret_cast<uint8_t *>(&affinity_cookie),
reinterpret_cast<uint8_t *>(&affinity_cookie) +
sizeof(affinity_cookie)});
if (!path.empty()) {
p = std::copy(std::begin(PATH_PREFIX), std::end(PATH_PREFIX), p);
p = std::copy(std::begin(path), std::end(path), p);
}
if (secure) {
p = std::copy(std::begin(SECURE), std::end(SECURE), p);
}
*p = '\0';
return StringRef{iov.base, p};
}
bool require_cookie_secure_attribute(SessionAffinityCookieSecure secure,
const StringRef &scheme) {
switch (secure) {
case SessionAffinityCookieSecure::AUTO:
return scheme == "https";
case SessionAffinityCookieSecure::YES:
return true;
default:
return false;
}
}
2021-08-26 13:59:32 +02:00
StringRef create_altsvc_header_value(BlockAllocator &balloc,
const std::vector<AltSvc> &altsvcs) {
// <PROTOID>="<HOST>:<SERVICE>"; <PARAMS>
size_t len = 0;
if (altsvcs.empty()) {
return StringRef{};
}
for (auto &altsvc : altsvcs) {
len += util::percent_encode_tokenlen(altsvc.protocol_id);
len += str_size("=\"");
len += util::quote_stringlen(altsvc.host);
len += str_size(":");
len += altsvc.service.size();
len += str_size("\"");
if (!altsvc.params.empty()) {
len += str_size("; ");
len += altsvc.params.size();
}
}
// ", " between items.
len += (altsvcs.size() - 1) * 2;
// We will write additional ", " at the end, and cut it later.
auto iov = make_byte_ref(balloc, len + 2);
auto p = iov.base;
for (auto &altsvc : altsvcs) {
p = util::percent_encode_token(p, altsvc.protocol_id);
p = util::copy_lit(p, "=\"");
p = util::quote_string(p, altsvc.host);
*p++ = ':';
p = std::copy(std::begin(altsvc.service), std::end(altsvc.service), p);
*p++ = '"';
if (!altsvc.params.empty()) {
p = util::copy_lit(p, "; ");
p = std::copy(std::begin(altsvc.params), std::end(altsvc.params), p);
}
p = util::copy_lit(p, ", ");
}
p -= 2;
*p = '\0';
assert(static_cast<size_t>(p - iov.base) == len);
return StringRef{iov.base, p};
}
bool check_http_scheme(const StringRef &scheme, bool encrypted) {
return encrypted ? scheme == "https" : scheme == "http";
}
} // namespace http
} // namespace shrpx