nghttpx: Simplify backend request line construction
It turns out that the cause of complication in backend request line construction is a absolute-form in HTTP/1 request. In HTTP/2, we have separated pseudo-header fields and no problem at all. In this commit, we parse request URI in HTTP/1 frontend and extract values from it to make backend logic simpler. This patch removes host header field emission in HTTP/2 backend if :authority is emitted. It also rewrites host header field with authority part in absolute-form URI as per RFC 7230.
This commit is contained in:
parent
7c675b1505
commit
46e3be7b5b
|
@ -390,6 +390,14 @@ void Downstream::set_last_request_header_value(const char *data, size_t len) {
|
||||||
request_headers_, data, len);
|
request_headers_, data, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void Downstream::add_request_header(std::string name, std::string value,
|
||||||
|
int16_t token) {
|
||||||
|
http2::index_header(request_hdidx_, token, request_headers_.size());
|
||||||
|
request_headers_sum_ += name.size() + value.size();
|
||||||
|
request_headers_.emplace_back(std::move(name), std::move(value), false,
|
||||||
|
token);
|
||||||
|
}
|
||||||
|
|
||||||
void Downstream::add_request_header(const uint8_t *name, size_t namelen,
|
void Downstream::add_request_header(const uint8_t *name, size_t namelen,
|
||||||
const uint8_t *value, size_t valuelen,
|
const uint8_t *value, size_t valuelen,
|
||||||
bool no_index, int16_t token) {
|
bool no_index, int16_t token) {
|
||||||
|
|
|
@ -116,6 +116,7 @@ public:
|
||||||
void add_request_header(std::string name, std::string value);
|
void add_request_header(std::string name, std::string value);
|
||||||
void set_last_request_header_value(const char *data, size_t len);
|
void set_last_request_header_value(const char *data, size_t len);
|
||||||
|
|
||||||
|
void add_request_header(std::string name, std::string value, int16_t token);
|
||||||
void add_request_header(const uint8_t *name, size_t namelen,
|
void add_request_header(const uint8_t *name, size_t namelen,
|
||||||
const uint8_t *value, size_t valuelen, bool no_index,
|
const uint8_t *value, size_t valuelen, bool no_index,
|
||||||
int16_t token);
|
int16_t token);
|
||||||
|
@ -152,7 +153,8 @@ public:
|
||||||
// Returns HTTP/2 :scheme header field value.
|
// Returns HTTP/2 :scheme header field value.
|
||||||
const std::string &get_request_http2_scheme() const;
|
const std::string &get_request_http2_scheme() const;
|
||||||
void set_request_http2_scheme(std::string scheme);
|
void set_request_http2_scheme(std::string scheme);
|
||||||
// Returns HTTP/2 :authority header field value.
|
// Returns HTTP/2 :authority header field value. We also set the
|
||||||
|
// value retrieved from absolute-form HTTP/1 request.
|
||||||
const std::string &get_request_http2_authority() const;
|
const std::string &get_request_http2_authority() const;
|
||||||
void set_request_http2_authority(std::string authority);
|
void set_request_http2_authority(std::string authority);
|
||||||
void set_request_major(int major);
|
void set_request_major(int major);
|
||||||
|
|
|
@ -265,8 +265,6 @@ int Http2DownstreamConnection::push_request_headers() {
|
||||||
|
|
||||||
const char *authority = nullptr, *host = nullptr;
|
const char *authority = nullptr, *host = nullptr;
|
||||||
if (!no_host_rewrite) {
|
if (!no_host_rewrite) {
|
||||||
// HTTP/2 backend does not support multiple address, so we always
|
|
||||||
// use index = 0.
|
|
||||||
if (!downstream_->get_request_http2_authority().empty()) {
|
if (!downstream_->get_request_http2_authority().empty()) {
|
||||||
authority = downstream_addr.hostport.get();
|
authority = downstream_addr.hostport.get();
|
||||||
}
|
}
|
||||||
|
@ -302,104 +300,52 @@ int Http2DownstreamConnection::push_request_headers() {
|
||||||
cookies = downstream_->crumble_request_cookie();
|
cookies = downstream_->crumble_request_cookie();
|
||||||
}
|
}
|
||||||
|
|
||||||
// 9 means:
|
// 8 means:
|
||||||
// 1. :method
|
// 1. :method
|
||||||
// 2. :scheme
|
// 2. :scheme
|
||||||
// 3. :path
|
// 3. :path
|
||||||
// 4. :authority (at least either :authority or host exists)
|
// 4. :authority or host (at least either of them exists)
|
||||||
// 5. host
|
// 5. via (optional)
|
||||||
// 6. via (optional)
|
// 6. x-forwarded-for (optional)
|
||||||
// 7. x-forwarded-for (optional)
|
// 7. x-forwarded-proto (optional)
|
||||||
// 8. x-forwarded-proto (optional)
|
// 8. te (optional)
|
||||||
// 9. te (optional)
|
|
||||||
auto nva = std::vector<nghttp2_nv>();
|
auto nva = std::vector<nghttp2_nv>();
|
||||||
nva.reserve(nheader + 9 + cookies.size());
|
nva.reserve(nheader + 8 + cookies.size());
|
||||||
|
|
||||||
std::string via_value;
|
std::string via_value;
|
||||||
std::string xff_value;
|
std::string xff_value;
|
||||||
std::string scheme, uri_authority, path, query;
|
std::string scheme, uri_authority, path, query;
|
||||||
|
|
||||||
// To reconstruct HTTP/1 status line and headers, proxy should
|
nva.push_back(
|
||||||
// preserve host header field. See draft-09 section 8.1.3.1.
|
http2::make_nv_ls(":method", downstream_->get_request_method()));
|
||||||
|
|
||||||
if (downstream_->get_request_method() == "CONNECT") {
|
if (downstream_->get_request_method() == "CONNECT") {
|
||||||
// The upstream may be HTTP/2 or HTTP/1
|
|
||||||
if (authority) {
|
if (authority) {
|
||||||
nva.push_back(http2::make_nv_lc(":authority", authority));
|
nva.push_back(http2::make_nv_lc(":authority", authority));
|
||||||
} else {
|
} else {
|
||||||
nva.push_back(
|
nva.push_back(
|
||||||
http2::make_nv_ls(":authority", downstream_->get_request_path()));
|
http2::make_nv_ls(":authority", downstream_->get_request_path()));
|
||||||
}
|
}
|
||||||
} else if (!downstream_->get_request_http2_scheme().empty()) {
|
|
||||||
// Here the upstream is HTTP/2
|
|
||||||
nva.push_back(
|
|
||||||
http2::make_nv_ls(":scheme", downstream_->get_request_http2_scheme()));
|
|
||||||
nva.push_back(http2::make_nv_ls(":path", downstream_->get_request_path()));
|
|
||||||
if (authority) {
|
|
||||||
nva.push_back(http2::make_nv_lc(":authority", authority));
|
|
||||||
}
|
|
||||||
} else {
|
} else {
|
||||||
// The upstream is HTTP/1
|
if (!downstream_->get_request_http2_scheme().empty()) {
|
||||||
http_parser_url u;
|
nva.push_back(http2::make_nv_ls(":scheme",
|
||||||
const char *url = downstream_->get_request_path().c_str();
|
downstream_->get_request_http2_scheme()));
|
||||||
memset(&u, 0, sizeof(u));
|
} else if (client_handler_->get_ssl()) {
|
||||||
rv = http_parser_parse_url(url, downstream_->get_request_path().size(), 0,
|
|
||||||
&u);
|
|
||||||
if (rv == 0) {
|
|
||||||
http2::copy_url_component(scheme, &u, UF_SCHEMA, url);
|
|
||||||
http2::copy_url_component(uri_authority, &u, UF_HOST, url);
|
|
||||||
http2::copy_url_component(path, &u, UF_PATH, url);
|
|
||||||
http2::copy_url_component(query, &u, UF_QUERY, url);
|
|
||||||
if (path.empty()) {
|
|
||||||
if (!uri_authority.empty() &&
|
|
||||||
downstream_->get_request_method() == "OPTIONS") {
|
|
||||||
path = "*";
|
|
||||||
} else {
|
|
||||||
path = "/";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (!query.empty()) {
|
|
||||||
path += "?";
|
|
||||||
path += query;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (scheme.empty()) {
|
|
||||||
if (client_handler_->get_ssl()) {
|
|
||||||
nva.push_back(http2::make_nv_ll(":scheme", "https"));
|
nva.push_back(http2::make_nv_ll(":scheme", "https"));
|
||||||
} else {
|
} else {
|
||||||
nva.push_back(http2::make_nv_ll(":scheme", "http"));
|
nva.push_back(http2::make_nv_ll(":scheme", "http"));
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
nva.push_back(http2::make_nv_ls(":scheme", scheme));
|
|
||||||
}
|
|
||||||
if (path.empty()) {
|
|
||||||
nva.push_back(
|
|
||||||
http2::make_nv_ls(":path", downstream_->get_request_path()));
|
|
||||||
} else {
|
|
||||||
nva.push_back(http2::make_nv_ls(":path", path));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!no_host_rewrite) {
|
|
||||||
if (authority) {
|
if (authority) {
|
||||||
nva.push_back(http2::make_nv_lc(":authority", authority));
|
nva.push_back(http2::make_nv_lc(":authority", authority));
|
||||||
}
|
}
|
||||||
} else if (!uri_authority.empty()) {
|
|
||||||
// TODO properly check IPv6 numeric address
|
nva.push_back(http2::make_nv_ls(":path", downstream_->get_request_path()));
|
||||||
if (uri_authority.find(":") != std::string::npos) {
|
|
||||||
uri_authority = "[" + uri_authority;
|
|
||||||
uri_authority += "]";
|
|
||||||
}
|
|
||||||
if (u.field_set & (1 << UF_PORT)) {
|
|
||||||
uri_authority += ":";
|
|
||||||
uri_authority += util::utos(u.port);
|
|
||||||
}
|
|
||||||
nva.push_back(http2::make_nv_ls(":authority", uri_authority));
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
nva.push_back(
|
// only emit host header field if :authority is not emitted. They
|
||||||
http2::make_nv_ls(":method", downstream_->get_request_method()));
|
// both must be the same value.
|
||||||
|
if (!authority && host) {
|
||||||
if (host) {
|
|
||||||
nva.push_back(http2::make_nv_lc("host", host));
|
nva.push_back(http2::make_nv_lc("host", host));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -246,22 +246,29 @@ int HttpDownstreamConnection::push_request_headers() {
|
||||||
|
|
||||||
// Assume that method and request path do not contain \r\n.
|
// Assume that method and request path do not contain \r\n.
|
||||||
std::string hdrs = downstream_->get_request_method();
|
std::string hdrs = downstream_->get_request_method();
|
||||||
hdrs += " ";
|
hdrs += ' ';
|
||||||
if (downstream_->get_request_method() == "CONNECT") {
|
if (downstream_->get_request_method() == "CONNECT") {
|
||||||
if (authority) {
|
if (authority) {
|
||||||
hdrs += authority;
|
hdrs += authority;
|
||||||
} else {
|
} else {
|
||||||
hdrs += downstream_->get_request_path();
|
hdrs += downstream_->get_request_path();
|
||||||
}
|
}
|
||||||
} else if (get_config()->http2_proxy &&
|
} else if (get_config()->http2_proxy || get_config()->client_proxy) {
|
||||||
!downstream_->get_request_http2_scheme().empty() && authority &&
|
|
||||||
(downstream_->get_request_path().c_str()[0] == '/' ||
|
|
||||||
downstream_->get_request_path() == "*")) {
|
|
||||||
// Construct absolute-form request target because we are going to
|
// Construct absolute-form request target because we are going to
|
||||||
// send a request to a HTTP/1 proxy.
|
// send a request to a HTTP/1 proxy.
|
||||||
|
if (downstream_->get_request_http2_scheme().empty()) {
|
||||||
|
// this comes from HTTP/1 upstream, use http scheme. We don't
|
||||||
|
// support https forward link yet.
|
||||||
|
hdrs += "http://";
|
||||||
|
} else {
|
||||||
hdrs += downstream_->get_request_http2_scheme();
|
hdrs += downstream_->get_request_http2_scheme();
|
||||||
hdrs += "://";
|
hdrs += "://";
|
||||||
|
}
|
||||||
|
if (authority) {
|
||||||
hdrs += authority;
|
hdrs += authority;
|
||||||
|
} else {
|
||||||
|
hdrs += host;
|
||||||
|
}
|
||||||
|
|
||||||
// Server-wide OPTIONS takes following form in proxy request:
|
// Server-wide OPTIONS takes following form in proxy request:
|
||||||
//
|
//
|
||||||
|
@ -273,8 +280,7 @@ int HttpDownstreamConnection::push_request_headers() {
|
||||||
hdrs += downstream_->get_request_path();
|
hdrs += downstream_->get_request_path();
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
// No proxy case. get_request_path() may be absolute-form but we
|
// No proxy case.
|
||||||
// don't care.
|
|
||||||
hdrs += downstream_->get_request_path();
|
hdrs += downstream_->get_request_path();
|
||||||
}
|
}
|
||||||
hdrs += " HTTP/1.1\r\nHost: ";
|
hdrs += " HTTP/1.1\r\nHost: ";
|
||||||
|
|
|
@ -136,6 +136,51 @@ int htp_hdr_valcb(http_parser *htp, const char *data, size_t len) {
|
||||||
}
|
}
|
||||||
} // namespace
|
} // namespace
|
||||||
|
|
||||||
|
namespace {
|
||||||
|
void rewrite_request_host_path_from_uri(Downstream *downstream, const char *uri,
|
||||||
|
http_parser_url &u) {
|
||||||
|
assert(u.field_set & (1 << UF_HOST));
|
||||||
|
|
||||||
|
// As per https://tools.ietf.org/html/rfc7230#section-5.4, we
|
||||||
|
// rewrite host header field with authority component.
|
||||||
|
std::string authority;
|
||||||
|
http2::copy_url_component(authority, &u, UF_HOST, uri);
|
||||||
|
// TODO properly check IPv6 numeric address
|
||||||
|
if (authority.find(':') != std::string::npos) {
|
||||||
|
authority = '[' + authority;
|
||||||
|
authority += ']';
|
||||||
|
}
|
||||||
|
if (u.field_set & (1 << UF_PORT)) {
|
||||||
|
authority += ':';
|
||||||
|
authority += util::utos(u.port);
|
||||||
|
}
|
||||||
|
downstream->set_request_http2_authority(authority);
|
||||||
|
|
||||||
|
std::string path;
|
||||||
|
if (u.field_set & (1 << UF_PATH)) {
|
||||||
|
http2::copy_url_component(path, &u, UF_PATH, uri);
|
||||||
|
} else if (downstream->get_request_method() == "OPTIONS") {
|
||||||
|
// Server-wide OPTIONS takes following form in proxy request:
|
||||||
|
//
|
||||||
|
// OPTIONS http://example.org HTTP/1.1
|
||||||
|
//
|
||||||
|
// Notice that no slash after authority. See
|
||||||
|
// http://tools.ietf.org/html/rfc7230#section-5.3.4
|
||||||
|
downstream->set_request_path("*");
|
||||||
|
// we ignore query component here
|
||||||
|
return;
|
||||||
|
} else {
|
||||||
|
path = "/";
|
||||||
|
}
|
||||||
|
if (u.field_set & (1 << UF_QUERY)) {
|
||||||
|
auto &fdata = u.field_data[UF_QUERY];
|
||||||
|
path += '?';
|
||||||
|
path.append(uri + fdata.off, fdata.len);
|
||||||
|
}
|
||||||
|
downstream->set_request_path(path);
|
||||||
|
}
|
||||||
|
} // namespace
|
||||||
|
|
||||||
namespace {
|
namespace {
|
||||||
int htp_hdrs_completecb(http_parser *htp) {
|
int htp_hdrs_completecb(http_parser *htp) {
|
||||||
int rv;
|
int rv;
|
||||||
|
@ -178,18 +223,25 @@ int htp_hdrs_completecb(http_parser *htp) {
|
||||||
|
|
||||||
downstream->inspect_http1_request();
|
downstream->inspect_http1_request();
|
||||||
|
|
||||||
if (get_config()->client_proxy &&
|
if (downstream->get_request_method() != "CONNECT") {
|
||||||
downstream->get_request_method() != "CONNECT") {
|
http_parser_url u{};
|
||||||
// Make sure that request path is an absolute URI.
|
auto uri = downstream->get_request_path().c_str();
|
||||||
http_parser_url u;
|
rv = http_parser_parse_url(uri, downstream->get_request_path().size(), 0,
|
||||||
auto url = downstream->get_request_path().c_str();
|
|
||||||
memset(&u, 0, sizeof(u));
|
|
||||||
rv = http_parser_parse_url(url, downstream->get_request_path().size(), 0,
|
|
||||||
&u);
|
&u);
|
||||||
if (rv != 0 || !(u.field_set & (1 << UF_SCHEMA))) {
|
if (rv != 0) {
|
||||||
// Expect to respond with 400 bad request
|
// Expect to respond with 400 bad request
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
// checking UF_HOST could be redundant, but just in case ...
|
||||||
|
if (!(u.field_set & (1 << UF_SCHEMA)) || !(u.field_set & (1 << UF_HOST))) {
|
||||||
|
if (get_config()->client_proxy) {
|
||||||
|
// Request URI should be absolute-form for client proxy mode
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
rewrite_request_host_path_from_uri(downstream, uri, u);
|
||||||
|
// uri could be invalidated here
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
rv = downstream->attach_downstream_connection(
|
rv = downstream->attach_downstream_connection(
|
||||||
|
|
Loading…
Reference in New Issue