diff --git a/doc/h2load.1 b/doc/h2load.1 index eb8d7b43..9b6a241c 100644 --- a/doc/h2load.1 +++ b/doc/h2load.1 @@ -1,6 +1,6 @@ .\" Man page generated from reStructuredText. . -.TH "H2LOAD" "1" "Aug 31, 2021" "1.45.0-DEV" "nghttp2" +.TH "H2LOAD" "1" "Sep 15, 2021" "1.45.0-DEV" "nghttp2" .SH NAME h2load \- HTTP/2 benchmarking tool . @@ -328,6 +328,11 @@ Disable UDP GSO. .UNINDENT .INDENT 0.0 .TP +.B \-\-max\-udp\-payload\-size= +Specify the maximum outgoing UDP datagram payload size. +.UNINDENT +.INDENT 0.0 +.TP .B \-v, \-\-verbose Output debug information. .UNINDENT diff --git a/doc/h2load.1.rst b/doc/h2load.1.rst index c4e733f2..66173807 100644 --- a/doc/h2load.1.rst +++ b/doc/h2load.1.rst @@ -277,6 +277,10 @@ OPTIONS Disable UDP GSO. +.. option:: --max-udp-payload-size= + + Specify the maximum outgoing UDP datagram payload size. + .. option:: -v, --verbose Output debug information. diff --git a/doc/nghttp.1 b/doc/nghttp.1 index 72f579b8..10e4c5b3 100644 --- a/doc/nghttp.1 +++ b/doc/nghttp.1 @@ -1,6 +1,6 @@ .\" Man page generated from reStructuredText. . -.TH "NGHTTP" "1" "Aug 31, 2021" "1.45.0-DEV" "nghttp2" +.TH "NGHTTP" "1" "Sep 15, 2021" "1.45.0-DEV" "nghttp2" .SH NAME nghttp \- HTTP/2 client . diff --git a/doc/nghttpd.1 b/doc/nghttpd.1 index 9a4efc7b..0a29da62 100644 --- a/doc/nghttpd.1 +++ b/doc/nghttpd.1 @@ -1,6 +1,6 @@ .\" Man page generated from reStructuredText. . -.TH "NGHTTPD" "1" "Aug 31, 2021" "1.45.0-DEV" "nghttp2" +.TH "NGHTTPD" "1" "Sep 15, 2021" "1.45.0-DEV" "nghttp2" .SH NAME nghttpd \- HTTP/2 server . diff --git a/doc/nghttpx.1 b/doc/nghttpx.1 index 2be0a35b..95baf730 100644 --- a/doc/nghttpx.1 +++ b/doc/nghttpx.1 @@ -1,6 +1,6 @@ .\" Man page generated from reStructuredText. . -.TH "NGHTTPX" "1" "Aug 31, 2021" "1.45.0-DEV" "nghttp2" +.TH "NGHTTPX" "1" "Sep 15, 2021" "1.45.0-DEV" "nghttp2" .SH NAME nghttpx \- HTTP/2 proxy . @@ -1089,12 +1089,13 @@ option. But be aware its implications. .INDENT 0.0 .TP .B \-\-tls\-no\-postpone\-early\-data -By default, nghttpx postpones forwarding HTTP requests -sent in early data, including those sent in partially in -it, until TLS handshake finishes. If all backend server -recognizes "Early\-Data" header field, using this option -makes nghttpx not postpone forwarding request and get -full potential of 0\-RTT data. +By default, except for QUIC connections, nghttpx +postpones forwarding HTTP requests sent in early data, +including those sent in partially in it, until TLS +handshake finishes. If all backend server recognizes +"Early\-Data" header field, using this option makes +nghttpx not postpone forwarding request and get full +potential of 0\-RTT data. .UNINDENT .INDENT 0.0 .TP @@ -1741,6 +1742,51 @@ Default: \fB/usr/local/lib/nghttp2/reuseport_kern.o\fP .UNINDENT .INDENT 0.0 .TP +.B \-\-frontend\-quic\-early\-data +Enable early data on frontend QUIC connections. nghttpx +sends "Early\-Data" header field to a backend server if a +request is received in early data and handshake has not +finished. All backend servers should deal with possibly +replayed requests. +.UNINDENT +.INDENT 0.0 +.TP +.B \-\-frontend\-quic\-qlog\-dir= +Specify a directory where a qlog file is written for +frontend QUIC connections. A qlog file is created per +each QUIC connection. The file name is ISO8601 basic +format, followed by "\-", server Source Connection ID and +".qlog". +.UNINDENT +.INDENT 0.0 +.TP +.B \-\-frontend\-quic\-require\-token +Require an address validation token for a frontend QUIC +connection. Server sends a token in Retry packet or +NEW_TOKEN frame in the previous connection. +.UNINDENT +.INDENT 0.0 +.TP +.B \-\-frontend\-quic\-congestion\-controller= +Specify a congestion controller algorithm for a frontend +QUIC connection. should be either "cubic" or +"bbr". +.sp +Default: \fBcubic\fP +.UNINDENT +.INDENT 0.0 +.TP +.B \-\-frontend\-quic\-connection\-id\-encryption\-key= +Specify Connection ID encryption key. The encryption +key must be 16 bytes, and it must be encoded in hex +string (which is 32 bytes long). If this option is +omitted, new key is generated. In order to survive QUIC +connection in a configuration reload event, old and new +configuration must have this option and share the same +key. +.UNINDENT +.INDENT 0.0 +.TP .B \-\-no\-quic\-bpf Disable eBPF. .UNINDENT diff --git a/doc/nghttpx.1.rst b/doc/nghttpx.1.rst index fb4a0a92..21592553 100644 --- a/doc/nghttpx.1.rst +++ b/doc/nghttpx.1.rst @@ -1003,12 +1003,13 @@ SSL/TLS .. option:: --tls-no-postpone-early-data - By default, nghttpx postpones forwarding HTTP requests - sent in early data, including those sent in partially in - it, until TLS handshake finishes. If all backend server - recognizes "Early-Data" header field, using this option - makes nghttpx not postpone forwarding request and get - full potential of 0-RTT data. + By default, except for QUIC connections, nghttpx + postpones forwarding HTTP requests sent in early data, + including those sent in partially in it, until TLS + handshake finishes. If all backend server recognizes + "Early-Data" header field, using this option makes + nghttpx not postpone forwarding request and get full + potential of 0-RTT data. .. option:: --tls-max-early-data= @@ -1589,6 +1590,46 @@ HTTP/3 and QUIC Default: ``/usr/local/lib/nghttp2/reuseport_kern.o`` +.. option:: --frontend-quic-early-data + + Enable early data on frontend QUIC connections. nghttpx + sends "Early-Data" header field to a backend server if a + request is received in early data and handshake has not + finished. All backend servers should deal with possibly + replayed requests. + +.. option:: --frontend-quic-qlog-dir= + + Specify a directory where a qlog file is written for + frontend QUIC connections. A qlog file is created per + each QUIC connection. The file name is ISO8601 basic + format, followed by "-", server Source Connection ID and + ".qlog". + +.. option:: --frontend-quic-require-token + + Require an address validation token for a frontend QUIC + connection. Server sends a token in Retry packet or + NEW_TOKEN frame in the previous connection. + +.. option:: --frontend-quic-congestion-controller= + + Specify a congestion controller algorithm for a frontend + QUIC connection. should be either "cubic" or + "bbr". + + Default: ``cubic`` + +.. option:: --frontend-quic-connection-id-encryption-key= + + Specify Connection ID encryption key. The encryption + key must be 16 bytes, and it must be encoded in hex + string (which is 32 bytes long). If this option is + omitted, new key is generated. In order to survive QUIC + connection in a configuration reload event, old and new + configuration must have this option and share the same + key. + .. option:: --no-quic-bpf Disable eBPF.