nghttpx: Rewrite :authority and host header field

We don't rewrite them if -s or -p is used
This commit is contained in:
Tatsuhiro Tsujikawa 2015-02-04 01:15:56 +09:00
parent b707cfe986
commit 82f90f9030
9 changed files with 196 additions and 46 deletions

View File

@ -139,6 +139,27 @@ func TestH1H1GracefulShutdown(t *testing.T) {
} }
} }
// TestH1H1HostRewrite tests that server rewrites Host header field
func TestH1H1HostRewrite(t *testing.T) {
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
w.Header().Add("request-host", r.Host)
})
defer st.Close()
res, err := st.http1(requestParam{
name: "TestH1H1HostRewrite",
})
if err != nil {
t.Fatalf("Error st.http1() = %v", err)
}
if got, want := res.status, 200; got != want {
t.Errorf("status: %v; want %v", got, want)
}
if got, want := res.header.Get("request-host"), st.backendHost; got != want {
t.Errorf("request-host: %v; want %v", got, want)
}
}
// TestH1H2ConnectFailure tests that server handles the situation that // TestH1H2ConnectFailure tests that server handles the situation that
// connection attempt to HTTP/2 backend failed. // connection attempt to HTTP/2 backend failed.
func TestH1H2ConnectFailure(t *testing.T) { func TestH1H2ConnectFailure(t *testing.T) {
@ -184,6 +205,31 @@ func TestH1H2NoHost(t *testing.T) {
} }
} }
// TestH1H2HTTP10 tests that server can accept HTTP/1.0 request
// without Host header field
func TestH1H2HTTP10(t *testing.T) {
st := newServerTester([]string{"--http2-bridge"}, t, func(w http.ResponseWriter, r *http.Request) {
w.Header().Add("request-host", r.Host)
})
defer st.Close()
if _, err := io.WriteString(st.conn, "GET / HTTP/1.0\r\nTest-Case: TestH1H2HTTP10\r\n\r\n"); err != nil {
t.Fatalf("Error io.WriteString() = %v", err)
}
resp, err := http.ReadResponse(bufio.NewReader(st.conn), nil)
if err != nil {
t.Fatalf("Error http.ReadResponse() = %v", err)
}
if got, want := resp.StatusCode, 200; got != want {
t.Errorf("status: %v; want %v", got, want)
}
if got, want := resp.Header.Get("request-host"), st.backendHost; got != want {
t.Errorf("request-host: %v; want %v", got, want)
}
}
// TestH1H2CrumbleCookie tests that Cookies are crumbled and assembled // TestH1H2CrumbleCookie tests that Cookies are crumbled and assembled
// when forwarding to HTTP/2 backend link. go-nghttp2 server // when forwarding to HTTP/2 backend link. go-nghttp2 server
// concatenates crumbled Cookies automatically, so this test is not // concatenates crumbled Cookies automatically, so this test is not

View File

@ -192,6 +192,27 @@ func TestH2H1NoVia(t *testing.T) {
} }
} }
// TestH2H1HostRewrite tests that server rewrites host header field
func TestH2H1HostRewrite(t *testing.T) {
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
w.Header().Add("request-host", r.Host)
})
defer st.Close()
res, err := st.http2(requestParam{
name: "TestH2H1HostRewrite",
})
if err != nil {
t.Fatalf("Error st.http2() = %v", err)
}
if got, want := res.status, 200; got != want {
t.Errorf("status: %v; want %v", got, want)
}
if got, want := res.header.Get("request-host"), st.backendHost; got != want {
t.Errorf("request-host: %v; want %v", got, want)
}
}
// TestH2H1BadRequestCL tests that server rejects request whose // TestH2H1BadRequestCL tests that server rejects request whose
// content-length header field value does not match its request body // content-length header field value does not match its request body
// size. // size.
@ -584,3 +605,24 @@ func TestH2H2ConnectFailure(t *testing.T) {
t.Errorf("status: %v; want %v", got, want) t.Errorf("status: %v; want %v", got, want)
} }
} }
// TestH2H2HostRewrite tests that server rewrites host header field
func TestH2H2HostRewrite(t *testing.T) {
st := newServerTester([]string{"--http2-bridge"}, t, func(w http.ResponseWriter, r *http.Request) {
w.Header().Add("request-host", r.Host)
})
defer st.Close()
res, err := st.http2(requestParam{
name: "TestH2H2HostRewrite",
})
if err != nil {
t.Fatalf("Error st.http2() = %v", err)
}
if got, want := res.status, 200; got != want {
t.Errorf("status: %v; want %v", got, want)
}
if got, want := res.header.Get("request-host"), st.backendHost; got != want {
t.Errorf("request-host: %v; want %v", got, want)
}
}

View File

@ -42,6 +42,7 @@ type serverTester struct {
url string // test frontend server URL url string // test frontend server URL
t *testing.T t *testing.T
ts *httptest.Server // backend server ts *httptest.Server // backend server
backendHost string // backend server host
conn net.Conn // connection to frontend server conn net.Conn // connection to frontend server
h2PrefaceSent bool // HTTP/2 preface was sent in conn h2PrefaceSent bool // HTTP/2 preface was sent in conn
nextStreamID uint32 // next stream ID nextStreamID uint32 // next stream ID
@ -124,6 +125,7 @@ func newServerTesterInternal(args []string, t *testing.T, handler http.HandlerFu
t: t, t: t,
ts: ts, ts: ts,
url: fmt.Sprintf("%v://%v", scheme, authority), url: fmt.Sprintf("%v://%v", scheme, authority),
backendHost: backendURL.Host,
nextStreamID: 1, nextStreamID: 1,
authority: authority, authority: authority,
frCh: make(chan http2.Frame), frCh: make(chan http2.Frame),

View File

@ -224,6 +224,7 @@ void copy_headers_to_nva(std::vector<nghttp2_nv> &nva, const Headers &headers) {
switch (lookup_token(kv.name)) { switch (lookup_token(kv.name)) {
case HD_COOKIE: case HD_COOKIE:
case HD_CONNECTION: case HD_CONNECTION:
case HD_HOST:
case HD_HTTP2_SETTINGS: case HD_HTTP2_SETTINGS:
case HD_KEEP_ALIVE: case HD_KEEP_ALIVE:
case HD_PROXY_CONNECTION: case HD_PROXY_CONNECTION:
@ -249,6 +250,7 @@ void build_http1_headers_from_headers(std::string &hdrs,
switch (lookup_token(kv.name)) { switch (lookup_token(kv.name)) {
case HD_CONNECTION: case HD_CONNECTION:
case HD_COOKIE: case HD_COOKIE:
case HD_HOST:
case HD_HTTP2_SETTINGS: case HD_HTTP2_SETTINGS:
case HD_KEEP_ALIVE: case HD_KEEP_ALIVE:
case HD_PROXY_CONNECTION: case HD_PROXY_CONNECTION:

View File

@ -232,6 +232,33 @@ int Http2DownstreamConnection::push_request_headers() {
if (!downstream_) { if (!downstream_) {
return 0; return 0;
} }
const char *authority = nullptr, *host = nullptr;
if (!get_config()->http2_proxy && !get_config()->client_proxy) {
// HTTP/2 backend does not support multiple address, so we always
// use index = 0.
if (!downstream_->get_request_http2_authority().empty()) {
authority = get_config()->downstream_addrs[0].hostport.get();
}
if (downstream_->get_request_header(http2::HD_HOST)) {
host = get_config()->downstream_addrs[0].hostport.get();
}
} else {
if (!downstream_->get_request_http2_authority().empty()) {
authority = downstream_->get_request_http2_authority().c_str();
}
auto h = downstream_->get_request_header(http2::HD_HOST);
if (h) {
host = h->value.c_str();
}
}
if (!authority && !host) {
// upstream is HTTP/1.0. We use backend server's host
// nonetheless.
host = get_config()->downstream_addrs[0].hostport.get();
}
size_t nheader = downstream_->get_request_headers().size(); size_t nheader = downstream_->get_request_headers().size();
Headers cookies; Headers cookies;
@ -239,28 +266,28 @@ int Http2DownstreamConnection::push_request_headers() {
cookies = downstream_->crumble_request_cookie(); cookies = downstream_->crumble_request_cookie();
} }
// 7 means: // 8 means:
// 1. :method // 1. :method
// 2. :scheme // 2. :scheme
// 3. :path // 3. :path
// 4. :authority (optional) // 4. :authority (at least either :authority or host exists)
// 5. via (optional) // 5. host
// 6. x-forwarded-for (optional) // 6. via (optional)
// 7. x-forwarded-proto (optional) // 7. x-forwarded-for (optional)
// 8. x-forwarded-proto (optional)
auto nva = std::vector<nghttp2_nv>(); auto nva = std::vector<nghttp2_nv>();
nva.reserve(nheader + 7 + cookies.size()); nva.reserve(nheader + 8 + cookies.size());
std::string via_value; std::string via_value;
std::string xff_value; std::string xff_value;
std::string scheme, authority, path, query; std::string scheme, uri_authority, path, query;
// To reconstruct HTTP/1 status line and headers, proxy should // To reconstruct HTTP/1 status line and headers, proxy should
// preserve host header field. See draft-09 section 8.1.3.1. // preserve host header field. See draft-09 section 8.1.3.1.
if (downstream_->get_request_method() == "CONNECT") { if (downstream_->get_request_method() == "CONNECT") {
// The upstream may be HTTP/2 or HTTP/1 // The upstream may be HTTP/2 or HTTP/1
if (!downstream_->get_request_http2_authority().empty()) { if (authority) {
nva.push_back(http2::make_nv_ls( nva.push_back(http2::make_nv_lc(":authority", authority));
":authority", downstream_->get_request_http2_authority()));
} else { } else {
nva.push_back( nva.push_back(
http2::make_nv_ls(":authority", downstream_->get_request_path())); http2::make_nv_ls(":authority", downstream_->get_request_path()));
@ -270,14 +297,8 @@ int Http2DownstreamConnection::push_request_headers() {
nva.push_back( nva.push_back(
http2::make_nv_ls(":scheme", downstream_->get_request_http2_scheme())); http2::make_nv_ls(":scheme", downstream_->get_request_http2_scheme()));
nva.push_back(http2::make_nv_ls(":path", downstream_->get_request_path())); nva.push_back(http2::make_nv_ls(":path", downstream_->get_request_path()));
if (!downstream_->get_request_http2_authority().empty()) { if (authority) {
nva.push_back(http2::make_nv_ls( nva.push_back(http2::make_nv_lc(":authority", authority));
":authority", downstream_->get_request_http2_authority()));
} else if (!downstream_->get_request_header(http2::HD_HOST)) {
if (LOG_ENABLED(INFO)) {
DCLOG(INFO, this) << "host header field missing";
}
return -1;
} }
} else { } else {
// The upstream is HTTP/1 // The upstream is HTTP/1
@ -288,11 +309,11 @@ int Http2DownstreamConnection::push_request_headers() {
&u); &u);
if (rv == 0) { if (rv == 0) {
http2::copy_url_component(scheme, &u, UF_SCHEMA, url); http2::copy_url_component(scheme, &u, UF_SCHEMA, url);
http2::copy_url_component(authority, &u, UF_HOST, url); http2::copy_url_component(uri_authority, &u, UF_HOST, url);
http2::copy_url_component(path, &u, UF_PATH, url); http2::copy_url_component(path, &u, UF_PATH, url);
http2::copy_url_component(query, &u, UF_QUERY, url); http2::copy_url_component(query, &u, UF_QUERY, url);
if (path.empty()) { if (path.empty()) {
if (!authority.empty() && if (!uri_authority.empty() &&
downstream_->get_request_method() == "OPTIONS") { downstream_->get_request_method() == "OPTIONS") {
path = "*"; path = "*";
} else { } else {
@ -319,28 +340,32 @@ int Http2DownstreamConnection::push_request_headers() {
} else { } else {
nva.push_back(http2::make_nv_ls(":path", path)); nva.push_back(http2::make_nv_ls(":path", path));
} }
if (!authority.empty()) {
if (!get_config()->http2_proxy && !get_config()->client_proxy) {
if (authority) {
nva.push_back(http2::make_nv_lc(":authority", authority));
}
} else if (!uri_authority.empty()) {
// TODO properly check IPv6 numeric address // TODO properly check IPv6 numeric address
if (authority.find(":") != std::string::npos) { if (uri_authority.find(":") != std::string::npos) {
authority = "[" + authority; uri_authority = "[" + uri_authority;
authority += "]"; uri_authority += "]";
} }
if (u.field_set & (1 << UF_PORT)) { if (u.field_set & (1 << UF_PORT)) {
authority += ":"; uri_authority += ":";
authority += util::utos(u.port); uri_authority += util::utos(u.port);
} }
nva.push_back(http2::make_nv_ls(":authority", authority)); nva.push_back(http2::make_nv_ls(":authority", uri_authority));
} else if (!downstream_->get_request_header(http2::HD_HOST)) {
if (LOG_ENABLED(INFO)) {
DCLOG(INFO, this) << "host header field missing";
}
return -1;
} }
} }
nva.push_back( nva.push_back(
http2::make_nv_ls(":method", downstream_->get_request_method())); http2::make_nv_ls(":method", downstream_->get_request_method()));
if (host) {
nva.push_back(http2::make_nv_lc("host", host));
}
http2::copy_headers_to_nva(nva, downstream_->get_request_headers()); http2::copy_headers_to_nva(nva, downstream_->get_request_headers());
bool chunked_encoding = false; bool chunked_encoding = false;

View File

@ -634,7 +634,8 @@ int on_stream_close_callback(nghttp2_session *session, int32_t stream_id,
auto http2session = static_cast<Http2Session *>(user_data); auto http2session = static_cast<Http2Session *>(user_data);
if (LOG_ENABLED(INFO)) { if (LOG_ENABLED(INFO)) {
SSLOG(INFO, http2session) << "Stream stream_id=" << stream_id SSLOG(INFO, http2session) << "Stream stream_id=" << stream_id
<< " is being closed"; << " is being closed with error code "
<< error_code;
} }
auto sd = static_cast<StreamData *>( auto sd = static_cast<StreamData *>(
nghttp2_session_get_stream_user_data(session, stream_id)); nghttp2_session_get_stream_user_data(session, stream_id));

View File

@ -107,7 +107,7 @@ void connectcb(struct ev_loop *loop, ev_io *w, int revents) {
HttpDownstreamConnection::HttpDownstreamConnection( HttpDownstreamConnection::HttpDownstreamConnection(
DownstreamConnectionPool *dconn_pool, struct ev_loop *loop) DownstreamConnectionPool *dconn_pool, struct ev_loop *loop)
: DownstreamConnection(dconn_pool), rlimit_(loop, &rev_, 0, 0), : DownstreamConnection(dconn_pool), rlimit_(loop, &rev_, 0, 0),
ioctrl_(&rlimit_), response_htp_{0}, loop_(loop), fd_(-1) { ioctrl_(&rlimit_), response_htp_{0}, loop_(loop), addr_idx_(0), fd_(-1) {
// We do not know fd yet, so just set dummy fd 0 // We do not know fd yet, so just set dummy fd 0
ev_io_init(&wev_, connectcb, 0, EV_WRITE); ev_io_init(&wev_, connectcb, 0, EV_WRITE);
ev_io_init(&rev_, readcb, 0, EV_READ); ev_io_init(&rev_, readcb, 0, EV_READ);
@ -198,6 +198,8 @@ int HttpDownstreamConnection::attach_downstream(Downstream *downstream) {
DCLOG(INFO, this) << "Connecting to downstream server"; DCLOG(INFO, this) << "Connecting to downstream server";
} }
addr_idx_ = i;
ev_io_set(&wev_, fd_, EV_WRITE); ev_io_set(&wev_, fd_, EV_WRITE);
ev_io_set(&rev_, fd_, EV_READ); ev_io_set(&rev_, fd_, EV_READ);
@ -223,27 +225,50 @@ int HttpDownstreamConnection::attach_downstream(Downstream *downstream) {
} }
int HttpDownstreamConnection::push_request_headers() { int HttpDownstreamConnection::push_request_headers() {
const char *authority = nullptr, *host = nullptr;
if (!get_config()->http2_proxy && !get_config()->client_proxy) {
if (!downstream_->get_request_http2_authority().empty()) {
authority = get_config()->downstream_addrs[addr_idx_].hostport.get();
}
if (downstream_->get_request_header(http2::HD_HOST)) {
host = get_config()->downstream_addrs[addr_idx_].hostport.get();
}
} else {
if (!downstream_->get_request_http2_authority().empty()) {
authority = downstream_->get_request_http2_authority().c_str();
}
auto h = downstream_->get_request_header(http2::HD_HOST);
if (h) {
host = h->value.c_str();
}
}
if (!authority && !host) {
// upstream is HTTP/1.0. We use backend server's host
// nonetheless.
host = get_config()->downstream_addrs[addr_idx_].hostport.get();
}
downstream_->assemble_request_cookie(); downstream_->assemble_request_cookie();
// Assume that method and request path do not contain \r\n. // Assume that method and request path do not contain \r\n.
std::string hdrs = downstream_->get_request_method(); std::string hdrs = downstream_->get_request_method();
hdrs += " "; hdrs += " ";
if (downstream_->get_request_method() == "CONNECT") { if (downstream_->get_request_method() == "CONNECT") {
if (!downstream_->get_request_http2_authority().empty()) { if (authority) {
hdrs += downstream_->get_request_http2_authority(); hdrs += authority;
} else { } else {
hdrs += downstream_->get_request_path(); hdrs += downstream_->get_request_path();
} }
} else if (get_config()->http2_proxy && } else if (get_config()->http2_proxy &&
!downstream_->get_request_http2_scheme().empty() && !downstream_->get_request_http2_scheme().empty() && authority &&
!downstream_->get_request_http2_authority().empty() &&
(downstream_->get_request_path().c_str()[0] == '/' || (downstream_->get_request_path().c_str()[0] == '/' ||
downstream_->get_request_path() == "*")) { downstream_->get_request_path() == "*")) {
// Construct absolute-form request target because we are going to // Construct absolute-form request target because we are going to
// send a request to a HTTP/1 proxy. // send a request to a HTTP/1 proxy.
hdrs += downstream_->get_request_http2_scheme(); hdrs += downstream_->get_request_http2_scheme();
hdrs += "://"; hdrs += "://";
hdrs += downstream_->get_request_http2_authority(); hdrs += authority;
// Server-wide OPTIONS takes following form in proxy request: // Server-wide OPTIONS takes following form in proxy request:
// //
@ -259,13 +284,14 @@ int HttpDownstreamConnection::push_request_headers() {
// don't care. // don't care.
hdrs += downstream_->get_request_path(); hdrs += downstream_->get_request_path();
} }
hdrs += " HTTP/1.1\r\n"; hdrs += " HTTP/1.1\r\nHost: ";
if (!downstream_->get_request_header(http2::HD_HOST) && if (authority) {
!downstream_->get_request_http2_authority().empty()) { hdrs += authority;
hdrs += "Host: "; } else {
hdrs += downstream_->get_request_http2_authority(); hdrs += host;
hdrs += "\r\n";
} }
hdrs += "\r\n";
http2::build_http1_headers_from_headers(hdrs, http2::build_http1_headers_from_headers(hdrs,
downstream_->get_request_headers()); downstream_->get_request_headers());

View File

@ -70,6 +70,8 @@ private:
IOControl ioctrl_; IOControl ioctrl_;
http_parser response_htp_; http_parser response_htp_;
struct ev_loop *loop_; struct ev_loop *loop_;
// index of get_config()->downstream_addrs this object is using
size_t addr_idx_;
int fd_; int fd_;
}; };

View File

@ -160,7 +160,11 @@ int htp_hdrs_completecb(http_parser *htp) {
return -1; return -1;
} }
downstream->inspect_http1_request(); if (downstream->get_request_major() == 1 &&
downstream->get_request_minor() == 1 &&
!downstream->get_request_header(http2::HD_HOST)) {
return -1;
}
if (get_config()->client_proxy && if (get_config()->client_proxy &&
downstream->get_request_method() != "CONNECT") { downstream->get_request_method() != "CONNECT") {