nghttp2/src/shrpx.cc

2107 lines
73 KiB
C++
Raw Normal View History

/*
2014-03-30 12:09:21 +02:00
* nghttp2 - HTTP/2 C Library
*
* Copyright (c) 2012 Tatsuhiro Tsujikawa
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated documentation files (the
* "Software"), to deal in the Software without restriction, including
* without limitation the rights to use, copy, modify, merge, publish,
* distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so, subject to
* the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
#include "shrpx.h"
#include <stdint.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <netdb.h>
#include <signal.h>
#include <netinet/in.h>
#include <netinet/tcp.h>
#include <arpa/inet.h>
2012-06-06 16:58:19 +02:00
#include <unistd.h>
#include <getopt.h>
2012-08-01 18:20:18 +02:00
#include <syslog.h>
#include <signal.h>
#include <limits.h>
2015-01-10 15:17:48 +01:00
#include <sys/time.h>
#include <sys/resource.h>
#include <grp.h>
2012-06-06 16:58:19 +02:00
#include <limits>
#include <cstdlib>
2012-06-06 16:58:19 +02:00
#include <iostream>
#include <fstream>
#include <vector>
#include <initializer_list>
#include <openssl/ssl.h>
#include <openssl/err.h>
2014-08-02 03:11:45 +02:00
#include <openssl/conf.h>
#include <openssl/rand.h>
#include <ev.h>
2013-07-12 17:19:03 +02:00
#include <nghttp2/nghttp2.h>
#include "shrpx_config.h"
#include "shrpx_connection_handler.h"
2012-06-08 15:41:24 +02:00
#include "shrpx_ssl.h"
#include "shrpx_log_config.h"
#include "shrpx_worker.h"
#include "shrpx_accept_handler.h"
#include "shrpx_http2_upstream.h"
#include "shrpx_http2_session.h"
2014-01-08 17:27:56 +01:00
#include "util.h"
#include "app_helper.h"
2014-03-04 13:33:43 +01:00
#include "ssl.h"
#include "template.h"
2014-01-08 17:27:56 +01:00
extern char **environ;
2014-01-08 17:27:56 +01:00
using namespace nghttp2;
namespace shrpx {
namespace {
const int REOPEN_LOG_SIGNAL = SIGUSR1;
const int EXEC_BINARY_SIGNAL = SIGUSR2;
const int GRACEFUL_SHUTDOWN_SIGNAL = SIGQUIT;
} // namespace
// Environment variables to tell new binary the listening socket's
// file descriptors. They are not close-on-exec.
#define ENV_LISTENER4_FD "NGHTTPX_LISTENER4_FD"
#define ENV_LISTENER6_FD "NGHTTPX_LISTENER6_FD"
// Environment variable to tell new binary the port number the current
// binary is listening to.
#define ENV_PORT "NGHTTPX_PORT"
// Environment variable to tell new binary the listening socket's file
// descriptor if frontend listens UNIX domain socket.
#define ENV_UNIX_FD "NGHTTP2_UNIX_FD"
// Environment variable to tell new binary the UNIX domain socket
// path.
#define ENV_UNIX_PATH "NGHTTP2_UNIX_PATH"
namespace {
int resolve_hostname(sockaddr_union *addr, size_t *addrlen,
2014-11-27 15:39:04 +01:00
const char *hostname, uint16_t port, int family) {
addrinfo hints;
int rv;
2012-06-06 16:58:19 +02:00
2014-05-14 15:39:28 +02:00
auto service = util::utos(port);
memset(&hints, 0, sizeof(addrinfo));
2012-06-06 16:58:19 +02:00
hints.ai_family = family;
hints.ai_socktype = SOCK_STREAM;
#ifdef AI_ADDRCONFIG
hints.ai_flags |= AI_ADDRCONFIG;
#endif // AI_ADDRCONFIG
2012-06-05 18:26:04 +02:00
addrinfo *res;
2012-06-06 16:58:19 +02:00
2014-05-14 15:39:28 +02:00
rv = getaddrinfo(hostname, service.c_str(), &hints, &res);
2014-11-27 15:39:04 +01:00
if (rv != 0) {
LOG(FATAL) << "Unable to resolve address for " << hostname << ": "
<< gai_strerror(rv);
return -1;
2012-06-05 18:26:04 +02:00
}
char host[NI_MAXHOST];
2014-11-27 15:39:04 +01:00
rv = getnameinfo(res->ai_addr, res->ai_addrlen, host, sizeof(host), 0, 0,
NI_NUMERICHOST);
if (rv != 0) {
LOG(FATAL) << "Address resolution for " << hostname
<< " failed: " << gai_strerror(rv);
2014-07-17 17:21:15 +02:00
freeaddrinfo(res);
return -1;
}
2014-07-17 17:21:15 +02:00
2014-11-27 15:39:04 +01:00
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "Address resolution for " << hostname
<< " succeeded: " << host;
2014-07-17 17:21:15 +02:00
}
memcpy(addr, res->ai_addr, res->ai_addrlen);
*addrlen = res->ai_addrlen;
freeaddrinfo(res);
2012-06-05 18:26:04 +02:00
return 0;
}
} // namespace
namespace {
void close_env_fd(std::initializer_list<const char *> envnames) {
for (auto envname : envnames) {
auto envfd = getenv(envname);
if (!envfd) {
continue;
}
auto fd = strtol(envfd, nullptr, 10);
close(fd);
}
}
} // namespace
namespace {
std::unique_ptr<AcceptHandler>
create_unix_domain_acceptor(ConnectionHandler *handler) {
auto path = get_config()->host.get();
auto pathlen = strlen(path);
{
auto envfd = getenv(ENV_UNIX_FD);
auto envpath = getenv(ENV_UNIX_PATH);
if (envfd && envpath) {
auto fd = strtoul(envfd, nullptr, 10);
if (util::streq(envpath, path)) {
LOG(NOTICE) << "Listening on UNIX domain socket " << path;
return make_unique<AcceptHandler>(fd, handler);
}
LOG(WARN) << "UNIX domain socket path was changed between old binary ("
<< envpath << ") and new binary (" << path << ")";
close(fd);
}
}
#ifdef SOCK_NONBLOCK
auto fd = socket(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK, 0);
if (fd == -1) {
return nullptr;
}
#else // !SOCK_NONBLOCK
auto fd = socket(AF_UNIX, SOCK_STREAM, 0);
if (fd == -1) {
return nullptr;
}
util::make_socket_nonblocking(fd);
#endif // !SOCK_NONBLOCK
int val = 1;
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &val,
static_cast<socklen_t>(sizeof(val))) == -1) {
close(fd);
return nullptr;
}
sockaddr_union addr;
addr.un.sun_family = AF_UNIX;
if (pathlen + 1 > sizeof(addr.un.sun_path)) {
LOG(FATAL) << "UNIX domain socket path " << path << " is too long > "
<< sizeof(addr.un.sun_path);
close(fd);
return nullptr;
}
// copy path including terminal NULL
std::copy_n(path, pathlen + 1, addr.un.sun_path);
// unlink (remove) already existing UNIX domain socket path
unlink(path);
if (bind(fd, &addr.sa, sizeof(addr.un)) != 0) {
auto error = errno;
LOG(FATAL) << "Failed to bind UNIX domain socket, error=" << error;
close(fd);
return nullptr;
}
if (listen(fd, get_config()->backlog) != 0) {
auto error = errno;
LOG(FATAL) << "Failed to listen to UNIX domain socket, error=" << error;
close(fd);
return nullptr;
}
LOG(NOTICE) << "Listening on UNIX domain socket " << path;
return make_unique<AcceptHandler>(fd, handler);
}
} // namespace
namespace {
std::unique_ptr<AcceptHandler> create_acceptor(ConnectionHandler *handler,
int family) {
{
2014-11-27 15:39:04 +01:00
auto envfd =
getenv(family == AF_INET ? ENV_LISTENER4_FD : ENV_LISTENER6_FD);
auto envport = getenv(ENV_PORT);
2014-11-27 15:39:04 +01:00
if (envfd && envport) {
auto fd = strtoul(envfd, nullptr, 10);
auto port = strtoul(envport, nullptr, 10);
// Only do this iff NGHTTPX_PORT == get_config()->port.
// Otherwise, close fd, and create server socket as usual.
2014-11-27 15:39:04 +01:00
if (port == get_config()->port) {
LOG(NOTICE) << "Listening on port " << get_config()->port;
return make_unique<AcceptHandler>(fd, handler);
}
LOG(WARN) << "Port was changed between old binary (" << port
<< ") and new binary (" << get_config()->port << ")";
close(fd);
}
}
addrinfo hints;
int fd = -1;
2014-07-06 12:21:18 +02:00
int rv;
2014-05-14 15:39:28 +02:00
auto service = util::utos(get_config()->port);
memset(&hints, 0, sizeof(addrinfo));
hints.ai_family = family;
hints.ai_socktype = SOCK_STREAM;
hints.ai_flags = AI_PASSIVE;
#ifdef AI_ADDRCONFIG
hints.ai_flags |= AI_ADDRCONFIG;
#endif // AI_ADDRCONFIG
2014-11-27 15:39:04 +01:00
auto node = strcmp("*", get_config()->host.get()) == 0
? nullptr
: get_config()->host.get();
addrinfo *res, *rp;
2014-07-06 12:21:18 +02:00
rv = getaddrinfo(node, service.c_str(), &hints, &res);
2014-11-27 15:39:04 +01:00
if (rv != 0) {
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "Unable to get IPv" << (family == AF_INET ? "4" : "6")
<< " address for " << get_config()->host.get() << ": "
2014-07-06 12:21:18 +02:00
<< gai_strerror(rv);
}
2014-07-06 12:21:18 +02:00
return nullptr;
}
2014-11-27 15:39:04 +01:00
for (rp = res; rp; rp = rp->ai_next) {
#ifdef SOCK_NONBLOCK
fd =
socket(rp->ai_family, rp->ai_socktype | SOCK_NONBLOCK, rp->ai_protocol);
2014-11-27 15:39:04 +01:00
if (fd == -1) {
continue;
}
#else // !SOCK_NONBLOCK
fd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
if (fd == -1) {
continue;
}
util::make_socket_nonblocking(fd);
#endif // !SOCK_NONBLOCK
int val = 1;
2014-11-27 15:39:04 +01:00
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &val,
static_cast<socklen_t>(sizeof(val))) == -1) {
close(fd);
continue;
}
#ifdef IPV6_V6ONLY
2014-11-27 15:39:04 +01:00
if (family == AF_INET6) {
if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &val,
static_cast<socklen_t>(sizeof(val))) == -1) {
close(fd);
continue;
}
}
#endif // IPV6_V6ONLY
#ifdef TCP_DEFER_ACCEPT
val = 3;
if (setsockopt(fd, IPPROTO_TCP, TCP_DEFER_ACCEPT, &val,
static_cast<socklen_t>(sizeof(val))) == -1) {
LOG(WARN) << "Failed to set TCP_DEFER_ACCEPT option to listener socket";
}
#endif // TCP_DEFER_ACCEPT
if (bind(fd, rp->ai_addr, rp->ai_addrlen) == 0 &&
listen(fd, get_config()->backlog) == 0) {
break;
}
close(fd);
}
2014-07-06 12:21:18 +02:00
2014-11-27 15:39:04 +01:00
if (!rp) {
LOG(WARN) << "Listening " << (family == AF_INET ? "IPv4" : "IPv6")
<< " socket failed";
2014-07-06 12:21:18 +02:00
2014-07-17 17:21:15 +02:00
freeaddrinfo(res);
2014-07-06 12:21:18 +02:00
return nullptr;
}
2014-07-06 12:21:18 +02:00
char host[NI_MAXHOST];
2014-11-27 15:39:04 +01:00
rv = getnameinfo(rp->ai_addr, rp->ai_addrlen, host, sizeof(host), nullptr, 0,
NI_NUMERICHOST);
2014-07-06 12:21:18 +02:00
2014-07-17 17:21:15 +02:00
freeaddrinfo(res);
2014-11-27 15:39:04 +01:00
if (rv != 0) {
LOG(WARN) << gai_strerror(rv);
2014-07-06 12:21:18 +02:00
close(fd);
return nullptr;
}
LOG(NOTICE) << "Listening on " << host << ", port " << get_config()->port;
return make_unique<AcceptHandler>(fd, handler);
}
} // namespace
namespace {
2014-11-27 15:39:04 +01:00
void drop_privileges() {
if (getuid() == 0 && get_config()->uid != 0) {
if (initgroups(get_config()->user.get(), get_config()->gid) != 0) {
auto error = errno;
LOG(FATAL) << "Could not change supplementary groups: "
<< strerror(error);
exit(EXIT_FAILURE);
}
2014-11-27 15:39:04 +01:00
if (setgid(get_config()->gid) != 0) {
auto error = errno;
LOG(FATAL) << "Could not change gid: " << strerror(error);
exit(EXIT_FAILURE);
}
2014-11-27 15:39:04 +01:00
if (setuid(get_config()->uid) != 0) {
auto error = errno;
LOG(FATAL) << "Could not change uid: " << strerror(error);
exit(EXIT_FAILURE);
}
2014-11-27 15:39:04 +01:00
if (setuid(0) != -1) {
LOG(FATAL) << "Still have root privileges?";
exit(EXIT_FAILURE);
}
}
}
} // namespace
namespace {
2014-11-27 15:39:04 +01:00
void save_pid() {
std::ofstream out(get_config()->pid_file.get(), std::ios::binary);
out << get_config()->pid << "\n";
out.close();
2014-11-27 15:39:04 +01:00
if (!out) {
LOG(ERROR) << "Could not save PID to file " << get_config()->pid_file.get();
exit(EXIT_FAILURE);
}
2014-08-12 18:53:44 +02:00
2014-11-27 15:39:04 +01:00
if (get_config()->uid != 0) {
if (chown(get_config()->pid_file.get(), get_config()->uid,
get_config()->gid) == -1) {
2014-08-12 18:53:44 +02:00
auto error = errno;
2014-11-27 15:39:04 +01:00
LOG(WARN) << "Changing owner of pid file " << get_config()->pid_file.get()
<< " failed: " << strerror(error);
2014-08-12 18:53:44 +02:00
}
}
}
} // namespace
namespace {
void reopen_log_signal_cb(struct ev_loop *loop, ev_signal *w, int revents) {
auto conn_handler = static_cast<ConnectionHandler *>(w->data);
2014-11-27 15:39:04 +01:00
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "Reopening log files: main";
}
(void)reopen_log_files();
2014-11-27 15:39:04 +01:00
if (get_config()->num_worker > 1) {
conn_handler->worker_reopen_log_files();
}
}
} // namespace
namespace {
void exec_binary_signal_cb(struct ev_loop *loop, ev_signal *w, int revents) {
auto conn_handler = static_cast<ConnectionHandler *>(w->data);
LOG(NOTICE) << "Executing new binary";
auto pid = fork();
2014-11-27 15:39:04 +01:00
if (pid == -1) {
auto error = errno;
LOG(ERROR) << "fork() failed errno=" << error;
return;
}
2014-11-27 15:39:04 +01:00
if (pid != 0) {
return;
}
2014-11-27 15:39:04 +01:00
auto exec_path = util::get_exec_path(get_config()->argc, get_config()->argv,
get_config()->cwd);
2014-11-27 15:39:04 +01:00
if (!exec_path) {
LOG(ERROR) << "Could not resolve the executable path";
return;
}
auto argv = make_unique<char *[]>(get_config()->argc + 1);
argv[0] = exec_path;
2014-11-27 15:39:04 +01:00
for (int i = 1; i < get_config()->argc; ++i) {
argv[i] = strdup(get_config()->argv[i]);
}
argv[get_config()->argc] = nullptr;
size_t envlen = 0;
2014-11-27 15:39:04 +01:00
for (char **p = environ; *p; ++p, ++envlen)
;
// 3 for missing (fd4, fd6 and port) or (unix fd and unix path)
auto envp = make_unique<char *[]>(envlen + 3 + 1);
size_t envidx = 0;
if (get_config()->host_unix) {
auto acceptor = conn_handler->get_acceptor();
std::string fd = ENV_UNIX_FD "=";
fd += util::utos(acceptor->get_fd());
envp[envidx++] = strdup(fd.c_str());
std::string path = ENV_UNIX_PATH "=";
path += get_config()->host.get();
envp[envidx++] = strdup(path.c_str());
} else {
auto acceptor4 = conn_handler->get_acceptor();
if (acceptor4) {
std::string fd4 = ENV_LISTENER4_FD "=";
fd4 += util::utos(acceptor4->get_fd());
envp[envidx++] = strdup(fd4.c_str());
}
auto acceptor6 = conn_handler->get_acceptor6();
if (acceptor6) {
std::string fd6 = ENV_LISTENER6_FD "=";
fd6 += util::utos(acceptor6->get_fd());
envp[envidx++] = strdup(fd6.c_str());
}
std::string port = ENV_PORT "=";
port += util::utos(get_config()->port);
envp[envidx++] = strdup(port.c_str());
}
2014-11-27 15:39:04 +01:00
for (size_t i = 0; i < envlen; ++i) {
if (util::startsWith(environ[i], ENV_LISTENER4_FD) ||
util::startsWith(environ[i], ENV_LISTENER6_FD) ||
util::startsWith(environ[i], ENV_PORT) ||
util::startsWith(environ[i], ENV_UNIX_FD) ||
util::startsWith(environ[i], ENV_UNIX_PATH)) {
continue;
}
envp[envidx++] = environ[i];
}
envp[envidx++] = nullptr;
2014-11-27 15:39:04 +01:00
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "cmdline";
2014-11-27 15:39:04 +01:00
for (int i = 0; argv[i]; ++i) {
LOG(INFO) << i << ": " << argv[i];
}
LOG(INFO) << "environ";
2014-11-27 15:39:04 +01:00
for (int i = 0; envp[i]; ++i) {
LOG(INFO) << i << ": " << envp[i];
}
}
2014-11-27 15:39:04 +01:00
if (execve(argv[0], argv.get(), envp.get()) == -1) {
auto error = errno;
LOG(ERROR) << "execve failed: errno=" << error;
_Exit(EXIT_FAILURE);
}
}
} // namespace
namespace {
void graceful_shutdown_signal_cb(struct ev_loop *loop, ev_signal *w,
int revents) {
auto conn_handler = static_cast<ConnectionHandler *>(w->data);
if (conn_handler->get_graceful_shutdown()) {
return;
}
LOG(NOTICE) << "Graceful shutdown signal received";
conn_handler->set_graceful_shutdown(true);
conn_handler->disable_acceptor();
// After disabling accepting new connection, disptach incoming
// connection in backlog.
conn_handler->accept_pending_connection();
conn_handler->graceful_shutdown_worker();
if (get_config()->num_worker == 1) {
return;
}
// We have accepted all pending connections. Shutdown main event
// loop.
ev_break(loop);
}
} // namespace
2014-07-05 12:40:30 +02:00
namespace {
void refresh_cb(struct ev_loop *loop, ev_timer *w, int revents) {
auto conn_handler = static_cast<ConnectionHandler *>(w->data);
2015-02-11 11:18:41 +01:00
auto worker = conn_handler->get_single_worker();
// In multi threaded mode (get_config()->num_worker > 1), we have to
// wait for event notification to workers to finish.
if (get_config()->num_worker == 1 && conn_handler->get_graceful_shutdown() &&
2015-02-11 11:18:41 +01:00
(!worker || worker->get_worker_stat()->num_connections == 0)) {
ev_break(loop);
}
2014-07-05 12:40:30 +02:00
}
} // namespace
namespace {
void renew_ticket_key_cb(struct ev_loop *loop, ev_timer *w, int revents) {
auto conn_handler = static_cast<ConnectionHandler *>(w->data);
2015-02-11 11:18:41 +01:00
const auto &old_ticket_keys = conn_handler->get_ticket_keys();
auto ticket_keys = std::make_shared<TicketKeys>();
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "renew ticket key";
}
// We store at most 2 ticket keys
if (old_ticket_keys) {
auto &old_keys = old_ticket_keys->keys;
auto &new_keys = ticket_keys->keys;
assert(!old_keys.empty());
new_keys.resize(2);
new_keys[1] = old_keys[0];
} else {
ticket_keys->keys.resize(1);
}
if (RAND_bytes(reinterpret_cast<unsigned char *>(&ticket_keys->keys[0]),
sizeof(ticket_keys->keys[0])) == 0) {
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "failed to renew ticket key";
}
return;
}
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "ticket keys generation done";
for (auto &key : ticket_keys->keys) {
LOG(INFO) << "name: " << util::format_hex(key.name, sizeof(key.name));
}
}
2015-02-11 11:18:41 +01:00
conn_handler->set_ticket_keys(ticket_keys);
conn_handler->worker_renew_ticket_keys(ticket_keys);
}
} // namespace
namespace {
2014-11-27 15:39:04 +01:00
int event_loop() {
auto loop = EV_DEFAULT;
auto conn_handler = make_unique<ConnectionHandler>(loop);
2014-11-27 15:39:04 +01:00
if (get_config()->daemon) {
if (daemon(0, 0) == -1) {
auto error = errno;
LOG(FATAL) << "Failed to daemonize: " << strerror(error);
exit(EXIT_FAILURE);
}
// We get new PID after successful daemon().
mod_config()->pid = getpid();
}
2014-11-27 15:39:04 +01:00
if (get_config()->pid_file) {
save_pid();
}
if (get_config()->host_unix) {
close_env_fd({ENV_LISTENER4_FD, ENV_LISTENER6_FD});
auto acceptor = create_unix_domain_acceptor(conn_handler.get());
if (!acceptor) {
LOG(FATAL) << "Failed to listen on UNIX domain socket "
<< get_config()->host.get();
exit(EXIT_FAILURE);
}
conn_handler->set_acceptor(std::move(acceptor));
} else {
close_env_fd({ENV_UNIX_FD});
auto acceptor6 = create_acceptor(conn_handler.get(), AF_INET6);
auto acceptor4 = create_acceptor(conn_handler.get(), AF_INET);
if (!acceptor6 && !acceptor4) {
LOG(FATAL) << "Failed to listen on address " << get_config()->host.get()
<< ", port " << get_config()->port;
exit(EXIT_FAILURE);
}
conn_handler->set_acceptor(std::move(acceptor4));
conn_handler->set_acceptor6(std::move(acceptor6));
}
2015-02-11 11:18:41 +01:00
ev_timer renew_ticket_key_timer;
if (!get_config()->upstream_no_tls) {
bool auto_tls_ticket_key = true;
if (!get_config()->tls_ticket_key_files.empty()) {
auto ticket_keys =
read_tls_ticket_key_file(get_config()->tls_ticket_key_files);
if (!ticket_keys) {
LOG(WARN) << "Use internal session ticket key generator";
} else {
conn_handler->set_ticket_keys(std::move(ticket_keys));
auto_tls_ticket_key = false;
}
}
if (auto_tls_ticket_key) {
// Renew ticket key every 12hrs
ev_timer_init(&renew_ticket_key_timer, renew_ticket_key_cb, 0.,
12 * 3600.);
renew_ticket_key_timer.data = conn_handler.get();
ev_timer_again(loop, &renew_ticket_key_timer);
// Generate first session ticket key before running workers.
renew_ticket_key_cb(loop, &renew_ticket_key_timer, 0);
}
}
// ListenHandler loads private key, and we listen on a priveleged port.
// After that, we drop the root privileges if needed.
drop_privileges();
#ifndef NOTHREADS
int rv;
sigset_t signals;
sigemptyset(&signals);
sigaddset(&signals, REOPEN_LOG_SIGNAL);
sigaddset(&signals, EXEC_BINARY_SIGNAL);
sigaddset(&signals, GRACEFUL_SHUTDOWN_SIGNAL);
rv = pthread_sigmask(SIG_BLOCK, &signals, nullptr);
2014-11-27 15:39:04 +01:00
if (rv != 0) {
LOG(ERROR) << "Blocking signals failed: " << strerror(rv);
}
#endif // !NOTHREADS
2015-02-11 11:18:41 +01:00
if (get_config()->num_worker == 1) {
conn_handler->create_single_worker();
} else {
2015-02-11 11:18:41 +01:00
conn_handler->create_worker_thread(get_config()->num_worker);
2012-06-05 18:26:04 +02:00
}
#ifndef NOTHREADS
rv = pthread_sigmask(SIG_UNBLOCK, &signals, nullptr);
2014-11-27 15:39:04 +01:00
if (rv != 0) {
LOG(ERROR) << "Unblocking signals failed: " << strerror(rv);
}
#endif // !NOTHREADS
ev_signal reopen_log_sig;
ev_signal_init(&reopen_log_sig, reopen_log_signal_cb, REOPEN_LOG_SIGNAL);
reopen_log_sig.data = conn_handler.get();
ev_signal_start(loop, &reopen_log_sig);
2014-07-05 12:40:30 +02:00
ev_signal exec_bin_sig;
ev_signal_init(&exec_bin_sig, exec_binary_signal_cb, EXEC_BINARY_SIGNAL);
exec_bin_sig.data = conn_handler.get();
ev_signal_start(loop, &exec_bin_sig);
2014-07-05 12:40:30 +02:00
ev_signal graceful_shutdown_sig;
ev_signal_init(&graceful_shutdown_sig, graceful_shutdown_signal_cb,
GRACEFUL_SHUTDOWN_SIGNAL);
graceful_shutdown_sig.data = conn_handler.get();
ev_signal_start(loop, &graceful_shutdown_sig);
2014-07-05 12:40:30 +02:00
ev_timer refresh_timer;
ev_timer_init(&refresh_timer, refresh_cb, 0., 1.);
refresh_timer.data = conn_handler.get();
ev_timer_again(loop, &refresh_timer);
2014-07-05 12:40:30 +02:00
2014-11-27 15:39:04 +01:00
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "Entering event loop";
}
ev_run(loop, 0);
conn_handler->join_worker();
return 0;
}
} // namespace
namespace {
// Returns true if regular file or symbolic link |path| exists.
2014-11-27 15:39:04 +01:00
bool conf_exists(const char *path) {
struct stat buf;
int rv = stat(path, &buf);
return rv == 0 && (buf.st_mode & (S_IFREG | S_IFLNK));
}
} // namespace
2013-09-23 13:55:39 +02:00
namespace {
2015-02-20 15:50:17 +01:00
const char *DEFAULT_NPN_LIST = "h2,h2-16," NGHTTP2_PROTO_VERSION_ID ","
2013-09-23 13:55:39 +02:00
#ifdef HAVE_SPDYLAY
"spdy/3.1,"
2013-09-23 13:55:39 +02:00
#endif // HAVE_SPDYLAY
"http/1.1";
2013-09-23 13:55:39 +02:00
} // namespace
namespace {
const char *DEFAULT_TLS_PROTO_LIST = "TLSv1.2,TLSv1.1";
} // namespace
namespace {
2014-11-27 15:39:04 +01:00
const char *DEFAULT_ACCESSLOG_FORMAT = "$remote_addr - - [$time_local] "
"\"$request\" $status $body_bytes_sent "
"\"$http_referer\" \"$http_user_agent\"";
} // namespace
namespace {
auto DEFAULT_DOWNSTREAM_HOST = "127.0.0.1";
int16_t DEFAULT_DOWNSTREAM_PORT = 80;
} // namespace;
2012-06-06 16:58:19 +02:00
namespace {
2014-11-27 15:39:04 +01:00
void fill_default_config() {
memset(mod_config(), 0, sizeof(*mod_config()));
mod_config()->verbose = false;
mod_config()->daemon = false;
2013-07-26 14:42:39 +02:00
mod_config()->server_name = "nghttpx nghttp2/" NGHTTP2_VERSION;
mod_config()->host = strcopy("*");
mod_config()->port = 3000;
mod_config()->private_key_file = nullptr;
mod_config()->private_key_passwd = nullptr;
mod_config()->cert_file = nullptr;
// Read timeout for HTTP2 upstream connection
mod_config()->http2_upstream_read_timeout = 180.;
// Read timeout for non-HTTP2 upstream connection
mod_config()->upstream_read_timeout = 180.;
// Write timeout for HTTP2/non-HTTP2 upstream connection
mod_config()->upstream_write_timeout = 30.;
// Read/Write timeouts for downstream connection
mod_config()->downstream_read_timeout = 180.;
mod_config()->downstream_write_timeout = 30.;
// Read timeout for HTTP/2 stream
mod_config()->stream_read_timeout = 0.;
// Write timeout for HTTP/2 stream
mod_config()->stream_write_timeout = 0.;
// Timeout for pooled (idle) connections
mod_config()->downstream_idle_read_timeout = 2.;
2014-03-30 12:09:21 +02:00
// window bits for HTTP/2 and SPDY upstream/downstream connection
// per stream. 2**16-1 = 64KiB-1, which is HTTP/2 default. Please
// note that SPDY/3 default is 64KiB.
mod_config()->http2_upstream_window_bits = 16;
mod_config()->http2_downstream_window_bits = 16;
2014-03-30 12:09:21 +02:00
// HTTP/2 SPDY/3.1 has connection-level flow control. The default
// window size for HTTP/2 is 64KiB - 1. SPDY/3's default is 64KiB
mod_config()->http2_upstream_connection_window_bits = 16;
mod_config()->http2_downstream_connection_window_bits = 16;
mod_config()->upstream_no_tls = false;
mod_config()->downstream_no_tls = false;
mod_config()->num_worker = 1;
mod_config()->http2_max_concurrent_streams = 100;
2012-08-01 18:32:33 +02:00
mod_config()->add_x_forwarded_for = false;
mod_config()->strip_incoming_x_forwarded_for = false;
mod_config()->no_via = false;
mod_config()->accesslog_file = nullptr;
mod_config()->accesslog_syslog = false;
mod_config()->accesslog_format = parse_log_format(DEFAULT_ACCESSLOG_FORMAT);
#if defined(__ANDROID__) || defined(ANDROID)
// Android does not have /dev/stderr. Use /proc/self/fd/2 instead.
mod_config()->errorlog_file = strcopy("/proc/self/fd/2");
2014-11-27 15:39:04 +01:00
#else // !__ANDROID__ && ANDROID
mod_config()->errorlog_file = strcopy("/dev/stderr");
#endif // !__ANDROID__ && ANDROID
mod_config()->errorlog_syslog = false;
mod_config()->conf_path = strcopy("/etc/nghttpx/nghttpx.conf");
2012-08-01 18:20:18 +02:00
mod_config()->syslog_facility = LOG_DAEMON;
2012-08-01 18:28:59 +02:00
// Default accept() backlog
2015-01-14 13:24:12 +01:00
mod_config()->backlog = 512;
mod_config()->ciphers = nullptr;
mod_config()->http2_proxy = false;
mod_config()->http2_bridge = false;
mod_config()->client_proxy = false;
mod_config()->client = false;
mod_config()->client_mode = false;
mod_config()->insecure = false;
mod_config()->cacert = nullptr;
mod_config()->pid_file = nullptr;
mod_config()->user = nullptr;
mod_config()->uid = 0;
mod_config()->gid = 0;
mod_config()->pid = getpid();
mod_config()->backend_ipv4 = false;
mod_config()->backend_ipv6 = false;
mod_config()->downstream_http_proxy_userinfo = nullptr;
mod_config()->downstream_http_proxy_host = nullptr;
mod_config()->downstream_http_proxy_port = 0;
mod_config()->downstream_http_proxy_addrlen = 0;
mod_config()->read_rate = 0;
mod_config()->read_burst = 0;
mod_config()->write_rate = 0;
mod_config()->write_burst = 0;
mod_config()->worker_read_rate = 0;
mod_config()->worker_read_burst = 0;
mod_config()->worker_write_rate = 0;
mod_config()->worker_write_burst = 0;
mod_config()->verify_client = false;
mod_config()->verify_client_cacert = nullptr;
mod_config()->client_private_key_file = nullptr;
mod_config()->client_cert_file = nullptr;
mod_config()->http2_upstream_dump_request_header = nullptr;
mod_config()->http2_upstream_dump_response_header = nullptr;
mod_config()->http2_no_cookie_crumbling = false;
mod_config()->upstream_frame_debug = false;
mod_config()->padding = 0;
mod_config()->worker_frontend_connections = 0;
mod_config()->http2_upstream_callbacks = create_http2_upstream_callbacks();
mod_config()->http2_downstream_callbacks =
create_http2_downstream_callbacks();
nghttp2_option_new(&mod_config()->http2_option);
nghttp2_option_set_no_auto_window_update(get_config()->http2_option, 1);
nghttp2_option_new(&mod_config()->http2_client_option);
nghttp2_option_set_no_auto_window_update(get_config()->http2_client_option,
1);
nghttp2_option_set_peer_max_concurrent_streams(
get_config()->http2_client_option, 100);
mod_config()->tls_proto_mask = 0;
mod_config()->no_location_rewrite = false;
2015-02-03 17:41:20 +01:00
mod_config()->no_host_rewrite = false;
mod_config()->argc = 0;
mod_config()->argv = nullptr;
mod_config()->downstream_connections_per_host = 8;
mod_config()->downstream_connections_per_frontend = 0;
mod_config()->listener_disable_timeout = 0.;
mod_config()->tls_ctx_per_worker = false;
mod_config()->downstream_request_buffer_size = 16 * 1024;
2015-01-20 17:47:43 +01:00
mod_config()->downstream_response_buffer_size = 16 * 1024;
2015-02-08 08:19:12 +01:00
mod_config()->no_server_push = false;
mod_config()->host_unix = false;
mod_config()->http2_downstream_connections_per_worker = 0;
2013-09-13 14:23:55 +02:00
}
} // namespace
2012-11-22 15:08:36 +01:00
namespace {
2014-11-27 15:39:04 +01:00
void print_version(std::ostream &out) {
2012-11-22 15:08:36 +01:00
out << get_config()->server_name << std::endl;
}
} // namespace
2012-06-06 16:58:19 +02:00
namespace {
2014-11-27 15:39:04 +01:00
void print_usage(std::ostream &out) {
out << R"(Usage: nghttpx [OPTIONS]... [<PRIVATE_KEY> <CERT>]
A reverse proxy for HTTP/2, HTTP/1 and SPDY.)" << std::endl;
2012-06-06 16:58:19 +02:00
}
} // namespace
namespace {
2014-11-27 15:39:04 +01:00
void print_help(std::ostream &out) {
2012-06-06 16:58:19 +02:00
print_usage(out);
out << R"(
2015-01-13 15:02:18 +01:00
<PRIVATE_KEY>
Set path to server's private key. Required unless -p,
--client or --frontend-no-tls are given.
<CERT> Set path to server's certificate. Required unless -p,
--client or --frontend-no-tls are given.
Options:
The options are categorized into several groups.
Connections:
-b, --backend=<HOST,PORT>
Set backend host and port. The multiple backend
addresses are accepted by repeating this option. UNIX
domain socket can be specified by prefixing path name
with "unix:" (e.g., unix:/var/run/backend.sock)
2015-01-13 15:02:18 +01:00
Default: )" << DEFAULT_DOWNSTREAM_HOST << ","
<< DEFAULT_DOWNSTREAM_PORT << R"(
-f, --frontend=<HOST,PORT>
2015-01-13 15:02:18 +01:00
Set frontend host and port. If <HOST> is '*', it
assumes all addresses including both IPv4 and IPv6.
UNIX domain socket can be specified by prefixing path
name with "unix:" (e.g., unix:/var/run/nghttpx.sock)
2015-01-13 15:02:18 +01:00
Default: )" << get_config()->host.get() << ","
<< get_config()->port << R"(
2015-01-13 15:02:18 +01:00
--backlog=<N>
Set listen backlog size.
Default: )" << get_config()->backlog << R"(
--backend-ipv4
Resolve backend hostname to IPv4 address only.
--backend-ipv6
Resolve backend hostname to IPv6 address only.
--backend-http-proxy-uri=<URI>
2015-01-13 15:02:18 +01:00
Specify proxy URI in the form
http://[<USER>:<PASS>@]<PROXY>:<PORT>. If a proxy
requires authentication, specify <USER> and <PASS>.
Note that they must be properly percent-encoded. This
proxy is used when the backend connection is HTTP/2.
First, make a CONNECT request to the proxy and it
connects to the backend on behalf of nghttpx. This
forms tunnel. After that, nghttpx performs SSL/TLS
handshake with the downstream through the tunnel. The
timeouts when connecting and making CONNECT request can
be specified by --backend-read-timeout and
--backend-write-timeout options.
Performance:
2015-01-13 14:39:35 +01:00
-n, --workers=<N>
2015-01-13 15:02:18 +01:00
Set the number of worker threads.
Default: )" << get_config()->num_worker << R"(
--read-rate=<SIZE>
2015-01-13 15:02:18 +01:00
Set maximum average read rate on frontend connection.
Setting 0 to this option means read rate is unlimited.
Default: )" << get_config()->read_rate << R"(
--read-burst=<SIZE>
2015-01-13 15:02:18 +01:00
Set maximum read burst size on frontend connection.
Setting 0 to this option means read burst size is
unlimited.
Default: )" << get_config()->read_burst << R"(
--write-rate=<SIZE>
2015-01-13 15:02:18 +01:00
Set maximum average write rate on frontend connection.
Setting 0 to this option means write rate is unlimited.
Default: )" << get_config()->write_rate << R"(
--write-burst=<SIZE>
2015-01-13 15:02:18 +01:00
Set maximum write burst size on frontend connection.
Setting 0 to this option means write burst size is
unlimited.
Default: )" << get_config()->write_burst << R"(
--worker-read-rate=<SIZE>
2015-01-13 15:02:18 +01:00
Set maximum average read rate on frontend connection per
worker. Setting 0 to this option means read rate is
unlimited. Not implemented yet.
Default: )" << get_config()->worker_read_rate << R"(
--worker-read-burst=<SIZE>
2015-01-13 15:02:18 +01:00
Set maximum read burst size on frontend connection per
worker. Setting 0 to this option means read burst size
is unlimited. Not implemented yet.
Default: )" << get_config()->worker_read_burst << R"(
--worker-write-rate=<SIZE>
2015-01-13 15:02:18 +01:00
Set maximum average write rate on frontend connection
per worker. Setting 0 to this option means write rate
is unlimited. Not implemented yet.
Default: )" << get_config()->worker_write_rate << R"(
--worker-write-burst=<SIZE>
2015-01-13 15:02:18 +01:00
Set maximum write burst size on frontend connection per
worker. Setting 0 to this option means write burst size
is unlimited. Not implemented yet.
Default: )" << get_config()->worker_write_burst << R"(
2015-01-13 14:39:35 +01:00
--worker-frontend-connections=<N>
2015-01-13 15:02:18 +01:00
Set maximum number of simultaneous connections frontend
accepts. Setting 0 means unlimited.
Default: )" << get_config()->worker_frontend_connections << R"(
--backend-http2-connections-per-worker=<N>
Set maximum number of HTTP/2 connections per worker.
The default value is 0, which means the number of
backend addresses specified by -b option.
2015-01-13 14:39:35 +01:00
--backend-http1-connections-per-host=<N>
2015-01-13 15:02:18 +01:00
Set maximum number of backend concurrent HTTP/1
connections per host. This option is meaningful when -s
option is used. To limit the number of connections per
frontend for default mode, use
--backend-http1-connections-per-frontend.
Default: )" << get_config()->downstream_connections_per_host
<< R"(
2015-01-13 14:39:35 +01:00
--backend-http1-connections-per-frontend=<N>
2015-01-13 15:02:18 +01:00
Set maximum number of backend concurrent HTTP/1
connections per frontend. This option is only used for
default mode. 0 means unlimited. To limit the number
of connections per host for HTTP/2 or SPDY proxy mode
(-s option), use --backend-http1-connections-per-host.
Default: )" << get_config()->downstream_connections_per_frontend
<< R"(
2015-01-10 15:17:48 +01:00
--rlimit-nofile=<N>
2015-01-13 15:02:18 +01:00
Set maximum number of open files (RLIMIT_NOFILE) to <N>.
If 0 is given, nghttpx does not set the limit.
Default: )" << get_config()->rlimit_nofile << R"(
--backend-request-buffer=<SIZE>
Set buffer size used to store backend request.
Default: )"
<< util::utos_with_unit(get_config()->downstream_request_buffer_size)
<< R"(
--backend-response-buffer=<SIZE>
Set buffer size used to store backend response.
Default: )"
<< util::utos_with_unit(get_config()->downstream_response_buffer_size)
<< R"(
Timeout:
2015-01-29 15:23:30 +01:00
--frontend-http2-read-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
Specify read timeout for HTTP/2 and SPDY frontend
connection.
Default: )"
<< util::duration_str(get_config()->http2_upstream_read_timeout) << R"(
2015-01-29 15:23:30 +01:00
--frontend-read-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
Specify read timeout for HTTP/1.1 frontend connection.
Default: )"
<< util::duration_str(get_config()->upstream_read_timeout) << R"(
2015-01-29 15:23:30 +01:00
--frontend-write-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
Specify write timeout for all frontend connections.
Default: )"
<< util::duration_str(get_config()->upstream_write_timeout) << R"(
2015-01-29 15:23:30 +01:00
--stream-read-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
Specify read timeout for HTTP/2 and SPDY streams. 0
means no timeout.
Default: )"
<< util::duration_str(get_config()->stream_read_timeout) << R"(
2015-01-29 15:23:30 +01:00
--stream-write-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
Specify write timeout for HTTP/2 and SPDY streams. 0
means no timeout.
Default: )"
<< util::duration_str(get_config()->stream_write_timeout) << R"(
2015-01-29 15:23:30 +01:00
--backend-read-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
Specify read timeout for backend connection.
Default: )"
<< util::duration_str(get_config()->downstream_read_timeout) << R"(
2015-01-29 15:23:30 +01:00
--backend-write-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
Specify write timeout for backend connection.
Default: )"
<< util::duration_str(get_config()->downstream_write_timeout) << R"(
2015-01-29 15:23:30 +01:00
--backend-keep-alive-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
Specify keep-alive timeout for backend connection.
Default: )"
<< util::duration_str(get_config()->downstream_idle_read_timeout) << R"(
2015-01-29 15:23:30 +01:00
--listener-disable-timeout=<DURATION>
2015-01-13 15:02:18 +01:00
After accepting connection failed, connection listener
is disabled for a given amount of time. Specifying 0
2015-01-13 15:02:18 +01:00
disables this feature.
Default: )"
<< util::duration_str(get_config()->listener_disable_timeout) << R"(
SSL/TLS:
2015-01-13 15:02:18 +01:00
--ciphers=<SUITE>
Set allowed cipher list. The format of the string is
described in OpenSSL ciphers(1).
-k, --insecure
2015-01-13 15:02:18 +01:00
Don't verify backend server's certificate if -p,
--client or --http2-bridge are given and
--backend-no-tls is not given.
--cacert=<PATH>
Set path to trusted CA certificate file if -p, --client
or --http2-bridge are given and --backend-no-tls is not
given. The file must be in PEM format. It can contain
multiple certificates. If the linked OpenSSL is
configured to load system wide certificates, they are
loaded at startup regardless of this option.
2015-01-13 14:39:35 +01:00
--private-key-passwd-file=<PATH>
2015-01-13 15:02:18 +01:00
Path to file that contains password for the server's
private key. If none is given and the private key is
password protected it'll be requested interactively.
--subcert=<KEYPATH>:<CERTPATH>
2015-01-13 15:02:18 +01:00
Specify additional certificate and private key file.
nghttpx will choose certificates based on the hostname
indicated by client using TLS SNI extension. This
option can be used multiple times.
--backend-tls-sni-field=<HOST>
2015-01-13 15:02:18 +01:00
Explicitly set the content of the TLS SNI extension.
This will default to the backend HOST name.
--dh-param-file=<PATH>
2015-01-13 15:02:18 +01:00
Path to file that contains DH parameters in PEM format.
Without this option, DHE cipher suites are not
available.
--npn-list=<LIST>
Comma delimited list of ALPN protocol identifier sorted
in the order of preference. That means most desirable
protocol comes first. This is used in both ALPN and
NPN. The parameter must be delimited by a single comma
only and any white spaces are treated as a part of
protocol string.
Default: )" << DEFAULT_NPN_LIST << R"(
--verify-client
Require and verify client certificate.
--verify-client-cacert=<PATH>
2015-01-13 15:02:18 +01:00
Path to file that contains CA certificates to verify
client certificate. The file must be in PEM format. It
can contain multiple certificates.
--client-private-key-file=<PATH>
2015-01-13 15:02:18 +01:00
Path to file that contains client private key used in
backend client authentication.
--client-cert-file=<PATH>
2015-01-13 15:02:18 +01:00
Path to file that contains client certificate used in
backend client authentication.
--tls-proto-list=<LIST>
2015-01-13 15:02:18 +01:00
Comma delimited list of SSL/TLS protocol to be enabled.
The following protocols are available: TLSv1.2, TLSv1.1
and TLSv1.0. The name matching is done in
case-insensitive manner. The parameter must be
delimited by a single comma only and any white spaces
are treated as a part of protocol string.
Default: )" << DEFAULT_TLS_PROTO_LIST << R"(
2015-01-13 14:39:35 +01:00
--tls-ticket-key-file=<PATH>
2015-01-13 15:02:18 +01:00
Path to file that contains 48 bytes random data to
construct TLS session ticket parameters. This options
can be used repeatedly to specify multiple ticket
parameters. If several files are given, only the first
key is used to encrypt TLS session tickets. Other keys
are accepted but server will issue new session ticket
with first key. This allows session key rotation.
Please note that key rotation does not occur
automatically. User should rearrange files or change
options values and restart nghttpx gracefully. If
opening or reading given file fails, all loaded keys are
discarded and it is treated as if none of this option is
given. If this option is not given or an error occurred
while opening or reading a file, key is generated
automatically and renewed every 12hrs. At most 2 keys
are stored in memory.
--tls-ctx-per-worker
2015-01-13 15:02:18 +01:00
Create OpenSSL's SSL_CTX per worker, so that no internal
locking is required. This may improve scalability with
multi threaded configuration. If this option is
enabled, session ID is no longer shared accross SSL_CTX
objects, which means session ID generated by one worker
is not acceptable by another worker. On the other hand,
session ticket key is shared across all worker threads.
HTTP/2 and SPDY:
2015-01-13 14:39:35 +01:00
-c, --http2-max-concurrent-streams=<N>
2015-01-13 15:02:18 +01:00
Set the maximum number of the concurrent streams in one
HTTP/2 and SPDY session.
Default: )" << get_config()->http2_max_concurrent_streams << R"(
--frontend-http2-window-bits=<N>
2015-01-13 15:02:18 +01:00
Sets the per-stream initial window size of HTTP/2 SPDY
frontend connection. For HTTP/2, the size is 2**<N>-1.
For SPDY, the size is 2**<N>.
Default: )" << get_config()->http2_upstream_window_bits << R"(
--frontend-http2-connection-window-bits=<N>
2015-01-13 15:02:18 +01:00
Sets the per-connection window size of HTTP/2 and SPDY
frontend connection. For HTTP/2, the size is
2**<N>-1. For SPDY, the size is 2**<N>.
Default: )" << get_config()->http2_upstream_connection_window_bits
2014-11-27 15:39:04 +01:00
<< R"(
2015-01-13 15:02:18 +01:00
--frontend-no-tls
Disable SSL/TLS on frontend connections.
--backend-http2-window-bits=<N>
Sets the initial window size of HTTP/2 backend
connection to 2**<N>-1.
Default: )" << get_config()->http2_downstream_window_bits << R"(
--backend-http2-connection-window-bits=<N>
2015-01-13 15:02:18 +01:00
Sets the per-connection window size of HTTP/2 backend
connection to 2**<N>-1.
Default: )"
<< get_config()->http2_downstream_connection_window_bits << R"(
2015-01-13 15:02:18 +01:00
--backend-no-tls
Disable SSL/TLS on backend connections.
--http2-no-cookie-crumbling
2015-01-13 15:02:18 +01:00
Don't crumble cookie header field.
--padding=<N>
Add at most <N> bytes to a HTTP/2 frame payload as
padding. Specify 0 to disable padding. This option is
meant for debugging purpose and not intended to enhance
protocol security.
2015-02-08 08:19:12 +01:00
--no-server-push
Disable HTTP/2 server push. Server push is only
supported by default mode and HTTP/2 frontend. SPDY
frontend does not support server push.
Mode:
2015-01-13 15:02:18 +01:00
(default mode)
Accept HTTP/2, SPDY and HTTP/1.1 over SSL/TLS. If
--frontend-no-tls is used, accept HTTP/2 and HTTP/1.1.
The incoming HTTP/1.1 connection can be upgraded to
HTTP/2 through HTTP Upgrade. The protocol to the
backend is HTTP/1.1.
-s, --http2-proxy
Like default mode, but enable secure proxy mode.
--http2-bridge
Like default mode, but communicate with the backend in
HTTP/2 over SSL/TLS. Thus the incoming all connections
are converted to HTTP/2 connection and relayed to the
backend. See --backend-http-proxy-uri option if you are
behind the proxy and want to connect to the outside
HTTP/2 proxy.
--client Accept HTTP/2 and HTTP/1.1 without SSL/TLS. The
incoming HTTP/1.1 connection can be upgraded to HTTP/2
connection through HTTP Upgrade. The protocol to the
backend is HTTP/2. To use nghttpx as a forward proxy,
use -p option instead.
-p, --client-proxy
2015-01-13 15:02:18 +01:00
Like --client option, but it also requires the request
path from frontend must be an absolute URI, suitable for
use as a forward proxy.
Logging:
-L, --log-level=<LEVEL>
2015-01-13 15:02:18 +01:00
Set the severity level of log output. <LEVEL> must be
one of INFO, NOTICE, WARN, ERROR and FATAL.
Default: NOTICE
--accesslog-file=<PATH>
2015-01-13 15:02:18 +01:00
Set path to write access log. To reopen file, send USR1
signal to nghttpx.
--accesslog-syslog
2015-01-13 15:02:18 +01:00
Send access log to syslog. If this option is used,
--accesslog-file option is ignored.
--accesslog-format=<FORMAT>
2015-01-13 15:02:18 +01:00
Specify format string for access log. The default
format is combined format. The following variables are
available:
* $remote_addr: client IP address.
* $time_local: local time in Common Log format.
* $time_iso8601: local time in ISO 8601 format.
* $request: HTTP request line.
* $status: HTTP response status code.
* $body_bytes_sent: the number of bytes sent to client
as response body.
* $http_<VAR>: value of HTTP request header <VAR> where
'_' in <VAR> is replaced with '-'.
* $remote_port: client port.
* $server_port: server port.
* $request_time: request processing time in seconds with
milliseconds resolution.
* $pid: PID of the running process.
* $alpn: ALPN identifier of the protocol which generates
the response. For HTTP/1, ALPN is always http/1.1,
regardless of minor version.
Default: )" << DEFAULT_ACCESSLOG_FORMAT << R"(
--errorlog-file=<PATH>
2015-01-13 15:02:18 +01:00
Set path to write error log. To reopen file, send USR1
signal to nghttpx.
Default: )" << get_config()->errorlog_file.get() << R"(
--errorlog-syslog
Send error log to syslog. If this option is used,
--errorlog-file option is ignored.
--syslog-facility=<FACILITY>
2015-01-13 15:02:18 +01:00
Set syslog facility to <FACILITY>.
Default: )" << str_syslog_facility(get_config()->syslog_facility)
<< R"(
2015-01-15 15:19:35 +01:00
HTTP:
--add-x-forwarded-for
2015-01-13 15:02:18 +01:00
Append X-Forwarded-For header field to the downstream
request.
--strip-incoming-x-forwarded-for
2015-01-13 15:02:18 +01:00
Strip X-Forwarded-For header field from inbound client
requests.
--no-via Don't append to Via header field. If Via header field
is received, it is left unaltered.
--no-location-rewrite
2015-01-13 15:02:18 +01:00
Don't rewrite location header field on --http2-bridge,
--client and default mode. For --http2-proxy and
--client-proxy mode, location header field will not be
altered regardless of this option.
2015-02-03 17:41:20 +01:00
--no-host-rewrite
Don't rewrite host and :authority header fields on
--http2-bridge, --client and default mode. For
--http2-proxy and --client-proxy mode, these headers
will not be altered regardless of this option.
--altsvc=<PROTOID,PORT[,HOST,[ORIGIN]]>
2015-01-13 15:02:18 +01:00
Specify protocol ID, port, host and origin of
alternative service. <HOST> and <ORIGIN> are optional.
They are advertised in alt-svc header field or HTTP/2
ALTSVC frame. This option can be used multiple times to
specify multiple alternative services. Example:
--altsvc=h2,443
--add-response-header=<HEADER>
2015-01-13 15:02:18 +01:00
Specify additional header field to add to response
header set. This option just appends header field and
won't replace anything already set. This option can be
used several times to specify multiple header fields.
Example: --add-response-header="foo: bar"
2015-01-15 15:19:35 +01:00
Debug:
--frontend-http2-dump-request-header=<PATH>
2015-01-13 15:02:18 +01:00
Dumps request headers received by HTTP/2 frontend to the
file denoted in <PATH>. The output is done in HTTP/1
header field format and each header block is followed by
an empty line. This option is not thread safe and MUST
NOT be used with option -n<N>, where <N> >= 2.
--frontend-http2-dump-response-header=<PATH>
2015-01-13 15:02:18 +01:00
Dumps response headers sent from HTTP/2 frontend to the
file denoted in <PATH>. The output is done in HTTP/1
header field format and each header block is followed by
an empty line. This option is not thread safe and MUST
NOT be used with option -n<N>, where <N> >= 2.
-o, --frontend-frame-debug
2015-01-13 15:02:18 +01:00
Print HTTP/2 frames in frontend to stderr. This option
is not thread safe and MUST NOT be used with option
-n=N, where N >= 2.
2015-01-15 15:19:35 +01:00
Process:
-D, --daemon
2015-01-13 15:02:18 +01:00
Run in a background. If -D is used, the current working
directory is changed to '/'.
--pid-file=<PATH>
Set path to save PID of this program.
--user=<USER>
Run this program as <USER>. This option is intended to
be used to drop root privileges.
2015-01-15 15:19:35 +01:00
Misc:
2015-01-13 15:02:18 +01:00
--conf=<PATH>
Load configuration from <PATH>.
Default: )" << get_config()->conf_path.get() << R"(
-v, --version
Print version and exit.
-h, --help Print this help and exit.
The <SIZE> argument is an integer and an optional unit (e.g., 10K is
10 * 1024). Units are K, M and G (powers of 1024).
2015-01-29 15:23:30 +01:00
The <DURATION> argument is an integer and an optional unit (e.g., 1s
is 1 second and 500ms is 500 milliseconds). Units are s or ms. If
a unit is omitted, a second is used as unit.)" << std::endl;
2012-06-06 16:58:19 +02:00
}
} // namespace
2014-11-27 15:39:04 +01:00
int main(int argc, char **argv) {
Log::set_severity_level(NOTICE);
2012-06-06 16:58:19 +02:00
create_config();
fill_default_config();
// We have to copy argv, since getopt_long may change its content.
mod_config()->argc = argc;
2014-11-27 15:39:04 +01:00
mod_config()->argv = new char *[argc];
2014-11-27 15:39:04 +01:00
for (int i = 0; i < argc; ++i) {
mod_config()->argv[i] = strdup(argv[i]);
}
mod_config()->cwd = getcwd(nullptr, 0);
2014-11-27 15:39:04 +01:00
if (mod_config()->cwd == nullptr) {
auto error = errno;
LOG(FATAL) << "failed to get current working directory: errno=" << error;
exit(EXIT_FAILURE);
}
2014-11-27 15:39:04 +01:00
std::vector<std::pair<const char *, const char *>> cmdcfgs;
while (1) {
static int flag = 0;
2012-06-06 16:58:19 +02:00
static option long_options[] = {
2014-11-27 15:39:04 +01:00
{"daemon", no_argument, nullptr, 'D'},
{"log-level", required_argument, nullptr, 'L'},
{"backend", required_argument, nullptr, 'b'},
{"http2-max-concurrent-streams", required_argument, nullptr, 'c'},
{"frontend", required_argument, nullptr, 'f'},
{"help", no_argument, nullptr, 'h'},
{"insecure", no_argument, nullptr, 'k'},
{"workers", required_argument, nullptr, 'n'},
{"client-proxy", no_argument, nullptr, 'p'},
{"http2-proxy", no_argument, nullptr, 's'},
{"version", no_argument, nullptr, 'v'},
{"frontend-frame-debug", no_argument, nullptr, 'o'},
{"add-x-forwarded-for", no_argument, &flag, 1},
{"frontend-http2-read-timeout", required_argument, &flag, 2},
{"frontend-read-timeout", required_argument, &flag, 3},
{"frontend-write-timeout", required_argument, &flag, 4},
{"backend-read-timeout", required_argument, &flag, 5},
{"backend-write-timeout", required_argument, &flag, 6},
{"accesslog-file", required_argument, &flag, 7},
{"backend-keep-alive-timeout", required_argument, &flag, 8},
{"frontend-http2-window-bits", required_argument, &flag, 9},
{"pid-file", required_argument, &flag, 10},
{"user", required_argument, &flag, 11},
{"conf", required_argument, &flag, 12},
{"syslog-facility", required_argument, &flag, 14},
{"backlog", required_argument, &flag, 15},
{"ciphers", required_argument, &flag, 16},
{"client", no_argument, &flag, 17},
{"backend-http2-window-bits", required_argument, &flag, 18},
{"cacert", required_argument, &flag, 19},
{"backend-ipv4", no_argument, &flag, 20},
{"backend-ipv6", no_argument, &flag, 21},
{"private-key-passwd-file", required_argument, &flag, 22},
{"no-via", no_argument, &flag, 23},
{"subcert", required_argument, &flag, 24},
{"http2-bridge", no_argument, &flag, 25},
{"backend-http-proxy-uri", required_argument, &flag, 26},
{"backend-no-tls", no_argument, &flag, 27},
{"frontend-no-tls", no_argument, &flag, 29},
{"backend-tls-sni-field", required_argument, &flag, 31},
{"dh-param-file", required_argument, &flag, 33},
{"read-rate", required_argument, &flag, 34},
{"read-burst", required_argument, &flag, 35},
{"write-rate", required_argument, &flag, 36},
{"write-burst", required_argument, &flag, 37},
{"npn-list", required_argument, &flag, 38},
{"verify-client", no_argument, &flag, 39},
{"verify-client-cacert", required_argument, &flag, 40},
{"client-private-key-file", required_argument, &flag, 41},
{"client-cert-file", required_argument, &flag, 42},
{"frontend-http2-dump-request-header", required_argument, &flag, 43},
{"frontend-http2-dump-response-header", required_argument, &flag, 44},
{"http2-no-cookie-crumbling", no_argument, &flag, 45},
{"frontend-http2-connection-window-bits", required_argument, &flag, 46},
{"backend-http2-connection-window-bits", required_argument, &flag, 47},
{"tls-proto-list", required_argument, &flag, 48},
{"padding", required_argument, &flag, 49},
{"worker-read-rate", required_argument, &flag, 50},
{"worker-read-burst", required_argument, &flag, 51},
{"worker-write-rate", required_argument, &flag, 52},
{"worker-write-burst", required_argument, &flag, 53},
{"altsvc", required_argument, &flag, 54},
{"add-response-header", required_argument, &flag, 55},
{"worker-frontend-connections", required_argument, &flag, 56},
{"accesslog-syslog", no_argument, &flag, 57},
{"errorlog-file", required_argument, &flag, 58},
{"errorlog-syslog", no_argument, &flag, 59},
{"stream-read-timeout", required_argument, &flag, 60},
{"stream-write-timeout", required_argument, &flag, 61},
{"no-location-rewrite", no_argument, &flag, 62},
{"backend-http1-connections-per-host", required_argument, &flag, 63},
2014-11-27 15:39:04 +01:00
{"listener-disable-timeout", required_argument, &flag, 64},
{"strip-incoming-x-forwarded-for", no_argument, &flag, 65},
{"accesslog-format", required_argument, &flag, 66},
{"backend-http1-connections-per-frontend", required_argument, &flag,
67},
{"tls-ticket-key-file", required_argument, &flag, 68},
2015-01-10 15:17:48 +01:00
{"rlimit-nofile", required_argument, &flag, 69},
{"tls-ctx-per-worker", no_argument, &flag, 70},
{"backend-response-buffer", required_argument, &flag, 71},
{"backend-request-buffer", required_argument, &flag, 72},
2015-02-03 17:41:20 +01:00
{"no-host-rewrite", no_argument, &flag, 73},
2015-02-08 08:19:12 +01:00
{"no-server-push", no_argument, &flag, 74},
{"backend-http2-connections-per-worker", required_argument, &flag, 76},
2014-11-27 15:39:04 +01:00
{nullptr, 0, nullptr, 0}};
2012-06-06 16:58:19 +02:00
int option_index = 0;
int c = getopt_long(argc, argv, "DL:b:c:f:hkn:opsv", long_options,
2012-06-06 16:58:19 +02:00
&option_index);
2014-11-27 15:39:04 +01:00
if (c == -1) {
2012-06-06 16:58:19 +02:00
break;
}
2014-11-27 15:39:04 +01:00
switch (c) {
2012-06-06 16:58:19 +02:00
case 'D':
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_DAEMON, "yes");
2012-06-06 16:58:19 +02:00
break;
case 'L':
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_LOG_LEVEL, optarg);
2012-06-06 16:58:19 +02:00
break;
case 'b':
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND, optarg);
2012-06-06 16:58:19 +02:00
break;
2012-11-22 14:05:52 +01:00
case 'c':
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_HTTP2_MAX_CONCURRENT_STREAMS, optarg);
2012-11-22 14:05:52 +01:00
break;
2012-06-06 16:58:19 +02:00
case 'f':
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND, optarg);
2012-06-06 16:58:19 +02:00
break;
2012-11-22 14:05:52 +01:00
case 'h':
print_help(std::cout);
exit(EXIT_SUCCESS);
case 'k':
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_INSECURE, "yes");
break;
2012-06-06 16:58:19 +02:00
case 'n':
#ifdef NOTHREADS
LOG(WARN) << "Threading disabled at build time, no threads created.";
#else
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_WORKERS, optarg);
#endif // NOTHREADS
2012-06-06 16:58:19 +02:00
break;
case 'o':
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_FRAME_DEBUG, "yes");
break;
2012-11-22 14:05:52 +01:00
case 'p':
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_CLIENT_PROXY, "yes");
2012-06-06 16:58:19 +02:00
break;
case 's':
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_HTTP2_PROXY, "yes");
break;
2012-11-22 15:08:36 +01:00
case 'v':
print_version(std::cout);
exit(EXIT_SUCCESS);
2012-06-06 16:58:19 +02:00
case '?':
2014-01-08 17:27:56 +01:00
util::show_candidates(argv[optind - 1], long_options);
2012-06-06 16:58:19 +02:00
exit(EXIT_FAILURE);
case 0:
2014-11-27 15:39:04 +01:00
switch (flag) {
case 1:
// --add-x-forwarded-for
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_ADD_X_FORWARDED_FOR, "yes");
break;
case 2:
// --frontend-http2-read-timeout
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_READ_TIMEOUT, optarg);
break;
case 3:
// --frontend-read-timeout
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_READ_TIMEOUT, optarg);
break;
case 4:
// --frontend-write-timeout
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_WRITE_TIMEOUT, optarg);
break;
case 5:
// --backend-read-timeout
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_READ_TIMEOUT, optarg);
break;
case 6:
// --backend-write-timeout
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_WRITE_TIMEOUT, optarg);
break;
2012-07-17 18:08:05 +02:00
case 7:
cmdcfgs.emplace_back(SHRPX_OPT_ACCESSLOG_FILE, optarg);
2012-07-17 18:08:05 +02:00
break;
case 8:
// --backend-keep-alive-timeout
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_KEEP_ALIVE_TIMEOUT, optarg);
break;
case 9:
// --frontend-http2-window-bits
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_WINDOW_BITS, optarg);
break;
case 10:
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_PID_FILE, optarg);
break;
case 11:
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_USER, optarg);
break;
case 12:
// --conf
mod_config()->conf_path = strcopy(optarg);
break;
2012-08-01 18:20:18 +02:00
case 14:
// --syslog-facility
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_SYSLOG_FACILITY, optarg);
2012-08-01 18:20:18 +02:00
break;
2012-08-01 18:28:59 +02:00
case 15:
// --backlog
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKLOG, optarg);
2012-08-01 18:28:59 +02:00
break;
case 16:
// --ciphers
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_CIPHERS, optarg);
break;
case 17:
// --client
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_CLIENT, "yes");
break;
case 18:
// --backend-http2-window-bits
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP2_WINDOW_BITS, optarg);
break;
case 19:
// --cacert
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_CACERT, optarg);
break;
case 20:
// --backend-ipv4
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_IPV4, "yes");
break;
case 21:
// --backend-ipv6
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_IPV6, "yes");
break;
case 22:
// --private-key-passwd-file
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_PRIVATE_KEY_PASSWD_FILE, optarg);
break;
case 23:
// --no-via
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_NO_VIA, "yes");
break;
case 24:
// --subcert
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_SUBCERT, optarg);
break;
case 25:
// --http2-bridge
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_HTTP2_BRIDGE, "yes");
break;
case 26:
// --backend-http-proxy-uri
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP_PROXY_URI, optarg);
break;
case 27:
// --backend-no-tls
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_NO_TLS, "yes");
break;
case 29:
// --frontend-no-tls
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_NO_TLS, "yes");
break;
case 31:
// --backend-tls-sni-field
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_TLS_SNI_FIELD, optarg);
break;
case 33:
// --dh-param-file
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_DH_PARAM_FILE, optarg);
break;
case 34:
// --read-rate
cmdcfgs.emplace_back(SHRPX_OPT_READ_RATE, optarg);
break;
case 35:
// --read-burst
cmdcfgs.emplace_back(SHRPX_OPT_READ_BURST, optarg);
break;
case 36:
// --write-rate
cmdcfgs.emplace_back(SHRPX_OPT_WRITE_RATE, optarg);
break;
case 37:
// --write-burst
cmdcfgs.emplace_back(SHRPX_OPT_WRITE_BURST, optarg);
break;
2013-09-23 13:55:39 +02:00
case 38:
// --npn-list
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_NPN_LIST, optarg);
2013-09-23 13:55:39 +02:00
break;
case 39:
// --verify-client
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_VERIFY_CLIENT, "yes");
break;
case 40:
// --verify-client-cacert
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_VERIFY_CLIENT_CACERT, optarg);
break;
case 41:
// --client-private-key-file
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_CLIENT_PRIVATE_KEY_FILE, optarg);
break;
case 42:
// --client-cert-file
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_CLIENT_CERT_FILE, optarg);
break;
case 43:
// --frontend-http2-dump-request-header
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_DUMP_REQUEST_HEADER,
optarg);
break;
case 44:
// --frontend-http2-dump-response-header
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_DUMP_RESPONSE_HEADER,
optarg);
break;
case 45:
// --http2-no-cookie-crumbling
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_HTTP2_NO_COOKIE_CRUMBLING, "yes");
break;
case 46:
// --frontend-http2-connection-window-bits
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_CONNECTION_WINDOW_BITS,
optarg);
break;
case 47:
// --backend-http2-connection-window-bits
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP2_CONNECTION_WINDOW_BITS,
optarg);
break;
case 48:
// --tls-proto-list
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_TLS_PROTO_LIST, optarg);
break;
case 49:
// --padding
cmdcfgs.emplace_back(SHRPX_OPT_PADDING, optarg);
break;
case 50:
// --worker-read-rate
cmdcfgs.emplace_back(SHRPX_OPT_WORKER_READ_RATE, optarg);
break;
case 51:
// --worker-read-burst
cmdcfgs.emplace_back(SHRPX_OPT_WORKER_READ_BURST, optarg);
break;
case 52:
// --worker-write-rate
cmdcfgs.emplace_back(SHRPX_OPT_WORKER_WRITE_RATE, optarg);
break;
case 53:
// --worker-write-burst
cmdcfgs.emplace_back(SHRPX_OPT_WORKER_WRITE_BURST, optarg);
break;
case 54:
// --altsvc
cmdcfgs.emplace_back(SHRPX_OPT_ALTSVC, optarg);
break;
case 55:
// --add-response-header
cmdcfgs.emplace_back(SHRPX_OPT_ADD_RESPONSE_HEADER, optarg);
break;
case 56:
// --worker-frontend-connections
cmdcfgs.emplace_back(SHRPX_OPT_WORKER_FRONTEND_CONNECTIONS, optarg);
break;
case 57:
// --accesslog-syslog
cmdcfgs.emplace_back(SHRPX_OPT_ACCESSLOG_SYSLOG, "yes");
break;
case 58:
// --errorlog-file
cmdcfgs.emplace_back(SHRPX_OPT_ERRORLOG_FILE, optarg);
break;
case 59:
// --errorlog-syslog
cmdcfgs.emplace_back(SHRPX_OPT_ERRORLOG_SYSLOG, "yes");
break;
case 60:
// --stream-read-timeout
cmdcfgs.emplace_back(SHRPX_OPT_STREAM_READ_TIMEOUT, optarg);
break;
case 61:
// --stream-write-timeout
cmdcfgs.emplace_back(SHRPX_OPT_STREAM_WRITE_TIMEOUT, optarg);
break;
case 62:
// --no-location-rewrite
cmdcfgs.emplace_back(SHRPX_OPT_NO_LOCATION_REWRITE, "yes");
break;
case 63:
// --backend-http1-connections-per-host
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP1_CONNECTIONS_PER_HOST,
optarg);
break;
case 64:
// --listener-disable-timeout
cmdcfgs.emplace_back(SHRPX_OPT_LISTENER_DISABLE_TIMEOUT, optarg);
break;
case 65:
// --strip-incoming-x-forwarded-for
cmdcfgs.emplace_back(SHRPX_OPT_STRIP_INCOMING_X_FORWARDED_FOR, "yes");
break;
case 66:
// --accesslog-format
cmdcfgs.emplace_back(SHRPX_OPT_ACCESSLOG_FORMAT, optarg);
break;
case 67:
// --backend-http1-connections-per-frontend
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP1_CONNECTIONS_PER_FRONTEND,
optarg);
break;
case 68:
// --tls-ticket-key-file
cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_FILE, optarg);
break;
2015-01-10 15:17:48 +01:00
case 69:
// --rlimit-nofile
cmdcfgs.emplace_back(SHRPX_OPT_RLIMIT_NOFILE, optarg);
break;
case 70:
// --tls-ctx-per-worker
cmdcfgs.emplace_back(SHRPX_OPT_TLS_CTX_PER_WORKER, "yes");
break;
case 71:
// --backend-response-buffer
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_RESPONSE_BUFFER, optarg);
break;
case 72:
// --backend-request-buffer
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_REQUEST_BUFFER, optarg);
break;
2015-02-03 17:41:20 +01:00
case 73:
// --no-host-rewrite
cmdcfgs.emplace_back(SHRPX_OPT_NO_HOST_REWRITE, "yes");
break;
2015-02-08 08:19:12 +01:00
case 74:
// --no-server-push
cmdcfgs.emplace_back(SHRPX_OPT_NO_SERVER_PUSH, "yes");
break;
case 76:
// --backend-http2-connections-per-worker
cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP2_CONNECTIONS_PER_WORKER,
optarg);
break;
default:
break;
}
break;
2012-06-06 16:58:19 +02:00
default:
break;
}
}
// Initialize OpenSSL before parsing options because we create
// SSL_CTX there.
2014-08-02 03:11:45 +02:00
OPENSSL_config(nullptr);
OpenSSL_add_all_algorithms();
SSL_load_error_strings();
SSL_library_init();
2014-11-27 15:39:04 +01:00
if (conf_exists(get_config()->conf_path.get())) {
if (load_config(get_config()->conf_path.get()) == -1) {
2012-08-01 17:26:24 +02:00
LOG(FATAL) << "Failed to load configuration from "
<< get_config()->conf_path.get();
exit(EXIT_FAILURE);
}
}
2014-11-27 15:39:04 +01:00
if (argc - optind >= 2) {
2014-01-18 08:32:22 +01:00
cmdcfgs.emplace_back(SHRPX_OPT_PRIVATE_KEY_FILE, argv[optind++]);
cmdcfgs.emplace_back(SHRPX_OPT_CERTIFICATE_FILE, argv[optind++]);
}
// First open default log files to deal with errors occurred while
// parsing option values.
reopen_log_files();
2014-11-27 15:39:04 +01:00
for (size_t i = 0, len = cmdcfgs.size(); i < len; ++i) {
if (parse_config(cmdcfgs[i].first, cmdcfgs[i].second) == -1) {
2012-08-01 17:26:24 +02:00
LOG(FATAL) << "Failed to parse command-line argument.";
exit(EXIT_FAILURE);
}
}
#ifndef NOTHREADS
std::unique_ptr<nghttp2::ssl::LibsslGlobalLock> lock;
if (!get_config()->tls_ctx_per_worker) {
lock = make_unique<nghttp2::ssl::LibsslGlobalLock>();
}
#endif // NOTHREADS
2014-11-27 15:39:04 +01:00
if (get_config()->accesslog_syslog || get_config()->errorlog_syslog) {
openlog("nghttpx", LOG_NDELAY | LOG_NOWAIT | LOG_PID,
get_config()->syslog_facility);
}
2014-11-27 15:39:04 +01:00
if (reopen_log_files() != 0) {
LOG(FATAL) << "Failed to open log file";
exit(EXIT_FAILURE);
}
2014-11-27 15:39:04 +01:00
if (get_config()->uid != 0) {
if (log_config()->accesslog_fd != -1 &&
fchown(log_config()->accesslog_fd, get_config()->uid,
2014-11-27 15:39:04 +01:00
get_config()->gid) == -1) {
2014-08-10 13:58:02 +02:00
auto error = errno;
LOG(WARN) << "Changing owner of access log file failed: "
<< strerror(error);
2014-08-10 13:58:02 +02:00
}
if (log_config()->errorlog_fd != -1 &&
fchown(log_config()->errorlog_fd, get_config()->uid,
get_config()->gid) == -1) {
2014-08-10 13:58:02 +02:00
auto error = errno;
LOG(WARN) << "Changing owner of error log file failed: "
<< strerror(error);
2014-08-10 13:58:02 +02:00
}
}
2014-11-27 15:39:04 +01:00
if (get_config()->http2_upstream_dump_request_header_file) {
2014-08-12 18:53:44 +02:00
auto path = get_config()->http2_upstream_dump_request_header_file.get();
auto f = open_file_for_write(path);
2014-11-27 15:39:04 +01:00
if (f == nullptr) {
2014-08-12 18:53:44 +02:00
LOG(FATAL) << "Failed to open http2 upstream request header file: "
<< path;
exit(EXIT_FAILURE);
}
mod_config()->http2_upstream_dump_request_header = f;
2014-11-27 15:39:04 +01:00
if (get_config()->uid != 0) {
if (chown(path, get_config()->uid, get_config()->gid) == -1) {
2014-08-12 18:53:44 +02:00
auto error = errno;
LOG(WARN) << "Changing owner of http2 upstream request header file "
2014-11-27 15:39:04 +01:00
<< path << " failed: " << strerror(error);
2014-08-12 18:53:44 +02:00
}
}
}
2014-11-27 15:39:04 +01:00
if (get_config()->http2_upstream_dump_response_header_file) {
2014-08-12 18:53:44 +02:00
auto path = get_config()->http2_upstream_dump_response_header_file.get();
auto f = open_file_for_write(path);
2014-11-27 15:39:04 +01:00
if (f == nullptr) {
2014-08-12 18:53:44 +02:00
LOG(FATAL) << "Failed to open http2 upstream response header file: "
<< path;
exit(EXIT_FAILURE);
}
mod_config()->http2_upstream_dump_response_header = f;
2014-11-27 15:39:04 +01:00
if (get_config()->uid != 0) {
if (chown(path, get_config()->uid, get_config()->gid) == -1) {
2014-08-12 18:53:44 +02:00
auto error = errno;
LOG(WARN) << "Changing owner of http2 upstream response header file"
2014-11-27 15:39:04 +01:00
<< " " << path << " failed: " << strerror(error);
2014-08-12 18:53:44 +02:00
}
}
}
2014-11-27 15:39:04 +01:00
if (get_config()->npn_list.empty()) {
mod_config()->npn_list = parse_config_str_list(DEFAULT_NPN_LIST);
2013-09-23 13:55:39 +02:00
}
2014-11-27 15:39:04 +01:00
if (get_config()->tls_proto_list.empty()) {
mod_config()->tls_proto_list =
parse_config_str_list(DEFAULT_TLS_PROTO_LIST);
}
2013-09-23 13:55:39 +02:00
mod_config()->tls_proto_mask =
2014-11-27 15:39:04 +01:00
ssl::create_tls_proto_mask(get_config()->tls_proto_list);
2014-06-10 16:15:29 +02:00
mod_config()->alpn_prefs = ssl::set_alpn_prefs(get_config()->npn_list);
2014-11-27 15:39:04 +01:00
if (get_config()->backend_ipv4 && get_config()->backend_ipv6) {
LOG(FATAL) << "--backend-ipv4 and --backend-ipv6 cannot be used at the "
<< "same time.";
exit(EXIT_FAILURE);
}
2014-11-27 15:39:04 +01:00
if (get_config()->worker_frontend_connections == 0) {
mod_config()->worker_frontend_connections =
2014-11-27 15:39:04 +01:00
std::numeric_limits<size_t>::max();
}
2014-11-27 15:39:04 +01:00
if (get_config()->http2_proxy + get_config()->http2_bridge +
get_config()->client_proxy + get_config()->client >
1) {
LOG(FATAL) << "--http2-proxy, --http2-bridge, --client-proxy and --client "
<< "cannot be used at the same time.";
exit(EXIT_FAILURE);
}
2014-11-27 15:39:04 +01:00
if (get_config()->client || get_config()->client_proxy) {
mod_config()->client_mode = true;
2015-02-11 11:18:41 +01:00
mod_config()->upstream_no_tls = true;
}
2014-11-27 15:39:04 +01:00
if (get_config()->client_mode || get_config()->http2_bridge) {
mod_config()->downstream_proto = PROTO_HTTP2;
} else {
mod_config()->downstream_proto = PROTO_HTTP;
}
2015-02-11 11:18:41 +01:00
if (!get_config()->upstream_no_tls &&
(!get_config()->private_key_file || !get_config()->cert_file)) {
print_usage(std::cerr);
LOG(FATAL) << "Too few arguments";
exit(EXIT_FAILURE);
}
if (get_config()->downstream_addrs.empty()) {
DownstreamAddr addr;
addr.host = strcopy(DEFAULT_DOWNSTREAM_HOST);
addr.port = DEFAULT_DOWNSTREAM_PORT;
2014-05-14 15:39:28 +02:00
mod_config()->downstream_addrs.push_back(std::move(addr));
}
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "Resolving backend address";
}
for (auto &addr : mod_config()->downstream_addrs) {
2014-05-14 15:39:28 +02:00
if (addr.host_unix) {
// for AF_UNIX socket, we use "localhost" as host for backend
// hostport. This is used as Host header field to backend and
// not going to be passed to any syscalls.
addr.hostport =
strcopy(util::make_hostport("localhost", get_config()->port));
2014-05-14 15:39:28 +02:00
auto path = addr.host.get();
auto pathlen = strlen(path);
2014-05-14 15:39:28 +02:00
if (pathlen + 1 > sizeof(addr.addr.un.sun_path)) {
LOG(FATAL) << "UNIX domain socket path " << path << " is too long > "
<< sizeof(addr.addr.un.sun_path);
exit(EXIT_FAILURE);
}
LOG(INFO) << "Use UNIX domain socket path " << path
<< " for backend connection";
2014-05-14 15:39:28 +02:00
addr.addr.un.sun_family = AF_UNIX;
// copy path including terminal NULL
std::copy_n(path, pathlen + 1, addr.addr.un.sun_path);
addr.addrlen = sizeof(addr.addr.un);
continue;
}
2014-05-14 15:39:28 +02:00
addr.hostport = strcopy(util::make_hostport(addr.host.get(), addr.port));
2012-06-06 16:58:19 +02:00
if (resolve_hostname(
&addr.addr, &addr.addrlen, addr.host.get(), addr.port,
get_config()->backend_ipv4
? AF_INET
: (get_config()->backend_ipv6 ? AF_INET6 : AF_UNSPEC)) == -1) {
exit(EXIT_FAILURE);
}
}
2012-06-05 18:26:04 +02:00
2014-11-27 15:39:04 +01:00
if (get_config()->downstream_http_proxy_host) {
if (LOG_ENABLED(INFO)) {
LOG(INFO) << "Resolving backend http proxy address";
}
2014-11-27 15:39:04 +01:00
if (resolve_hostname(&mod_config()->downstream_http_proxy_addr,
&mod_config()->downstream_http_proxy_addrlen,
get_config()->downstream_http_proxy_host.get(),
get_config()->downstream_http_proxy_port,
AF_UNSPEC) == -1) {
exit(EXIT_FAILURE);
}
}
if (get_config()->http2_downstream_connections_per_worker == 0) {
mod_config()->http2_downstream_connections_per_worker =
get_config()->downstream_addrs.size();
}
2015-01-10 15:17:48 +01:00
if (get_config()->rlimit_nofile) {
struct rlimit lim = {static_cast<rlim_t>(get_config()->rlimit_nofile),
static_cast<rlim_t>(get_config()->rlimit_nofile)};
2015-01-10 15:17:48 +01:00
if (setrlimit(RLIMIT_NOFILE, &lim) != 0) {
auto error = errno;
LOG(WARN) << "Setting rlimit-nofile failed: " << strerror(error);
}
}
2014-11-27 15:39:04 +01:00
if (get_config()->upstream_frame_debug) {
// To make it sync to logging
set_output(stderr);
2014-11-27 15:39:04 +01:00
if (isatty(fileno(stdout))) {
set_color_output(true);
}
reset_timer();
}
2012-06-06 16:58:19 +02:00
struct sigaction act;
memset(&act, 0, sizeof(struct sigaction));
act.sa_handler = SIG_IGN;
sigaction(SIGPIPE, &act, nullptr);
sigaction(SIGCHLD, &act, nullptr);
2012-06-06 16:58:19 +02:00
event_loop();
2012-06-08 15:41:24 +02:00
LOG(NOTICE) << "Shutdown momentarily";
return 0;
}
} // namespace shrpx
2014-11-27 15:39:04 +01:00
int main(int argc, char **argv) { return shrpx::main(argc, argv); }