/* * nghttp2 - HTTP/2 C Library * * Copyright (c) 2012 Tatsuhiro Tsujikawa * * Permission is hereby granted, free of charge, to any person obtaining * a copy of this software and associated documentation files (the * "Software"), to deal in the Software without restriction, including * without limitation the rights to use, copy, modify, merge, publish, * distribute, sublicense, and/or sell copies of the Software, and to * permit persons to whom the Software is furnished to do so, subject to * the following conditions: * * The above copyright notice and this permission notice shall be * included in all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ #include "shrpx.h" #include #include #include #ifdef HAVE_SYS_SOCKET_H #include #endif // HAVE_SYS_SOCKET_H #include #ifdef HAVE_NETDB_H #include #endif // HAVE_NETDB_H #include #ifdef HAVE_NETINET_IN_H #include #endif // HAVE_NETINET_IN_H #include #ifdef HAVE_ARPA_INET_H #include #endif // HAVE_ARPA_INET_H #ifdef HAVE_UNISTD_H #include #endif // HAVE_UNISTD_H #include #ifdef HAVE_SYSLOG_H #include #endif // HAVE_SYSLOG_H #ifdef HAVE_LIMITS_H #include #endif // HAVE_LIMITS_H #ifdef HAVE_SYS_TIME_H #include #endif // HAVE_SYS_TIME_H #include #include #include #include #include #include #include #include #include #include #include #include #include #include "shrpx_config.h" #include "shrpx_ssl.h" #include "shrpx_log_config.h" #include "shrpx_worker.h" #include "shrpx_http2_upstream.h" #include "shrpx_http2_session.h" #include "shrpx_worker_process.h" #include "shrpx_process.h" #include "shrpx_signal.h" #include "shrpx_connection.h" #include "util.h" #include "app_helper.h" #include "ssl.h" #include "template.h" extern char **environ; using namespace nghttp2; namespace shrpx { // Deprecated: Environment variables to tell new binary the listening // socket's file descriptors. They are not close-on-exec. constexpr auto ENV_LISTENER4_FD = StringRef::from_lit("NGHTTPX_LISTENER4_FD"); constexpr auto ENV_LISTENER6_FD = StringRef::from_lit("NGHTTPX_LISTENER6_FD"); // Deprecated: Environment variable to tell new binary the port number // the current binary is listening to. constexpr auto ENV_PORT = StringRef::from_lit("NGHTTPX_PORT"); // Deprecated: Environment variable to tell new binary the listening // socket's file descriptor if frontend listens UNIX domain socket. constexpr auto ENV_UNIX_FD = StringRef::from_lit("NGHTTP2_UNIX_FD"); // Deprecated: Environment variable to tell new binary the UNIX domain // socket path. constexpr auto ENV_UNIX_PATH = StringRef::from_lit("NGHTTP2_UNIX_PATH"); // Prefix of environment variables to tell new binary the listening // socket's file descriptor. They are not close-on-exec. For TCP // socket, the value must be comma separated 2 parameters: tcp,. // is file descriptor. For UNIX domain socket, the value must be // comma separated 3 parameters: unix,,. is file // descriptor. is a path to UNIX domain socket. constexpr auto ENV_ACCEPT_PREFIX = StringRef::from_lit("NGHTTPX_ACCEPT_"); #ifndef _KERNEL_FASTOPEN #define _KERNEL_FASTOPEN // conditional define for TCP_FASTOPEN mostly on ubuntu #ifndef TCP_FASTOPEN #define TCP_FASTOPEN 23 #endif // conditional define for SOL_TCP mostly on ubuntu #ifndef SOL_TCP #define SOL_TCP 6 #endif #endif struct SignalServer { SignalServer() : ipc_fd{{-1, -1}}, worker_process_pid(-1) {} ~SignalServer() { if (ipc_fd[0] != -1) { close(ipc_fd[0]); } if (ipc_fd[1] != -1) { shutdown(ipc_fd[1], SHUT_WR); close(ipc_fd[1]); } } std::array ipc_fd; pid_t worker_process_pid; }; namespace { int chown_to_running_user(const char *path) { return chown(path, get_config()->uid, get_config()->gid); } } // namespace namespace { void save_pid() { constexpr auto SUFFIX = StringRef::from_lit(".XXXXXX"); auto &pid_file = get_config()->pid_file; auto len = get_config()->pid_file.size() + SUFFIX.size(); auto buf = make_unique(len + 1); auto p = buf.get(); p = std::copy(std::begin(pid_file), std::end(pid_file), p); p = std::copy(std::begin(SUFFIX), std::end(SUFFIX), p); *p = '\0'; auto temp_path = buf.get(); auto fd = mkstemp(temp_path); if (fd == -1) { auto error = errno; LOG(ERROR) << "Could not save PID to file " << pid_file << ": " << strerror(error); exit(EXIT_FAILURE); } auto content = util::utos(get_config()->pid) + '\n'; if (write(fd, content.c_str(), content.size()) == -1) { auto error = errno; LOG(ERROR) << "Could not save PID to file " << pid_file << ": " << strerror(error); exit(EXIT_FAILURE); } if (fsync(fd) == -1) { auto error = errno; LOG(ERROR) << "Could not save PID to file " << pid_file << ": " << strerror(error); exit(EXIT_FAILURE); } close(fd); if (rename(temp_path, pid_file.c_str()) == -1) { auto error = errno; LOG(ERROR) << "Could not save PID to file " << pid_file << ": " << strerror(error); unlink(temp_path); exit(EXIT_FAILURE); } if (get_config()->uid != 0) { if (chown_to_running_user(pid_file.c_str()) == -1) { auto error = errno; LOG(WARN) << "Changing owner of pid file " << pid_file << " failed: " << strerror(error); } } } } // namespace namespace { void exec_binary(SignalServer *ssv) { int rv; sigset_t oldset; LOG(NOTICE) << "Executing new binary"; rv = shrpx_signal_block_all(&oldset); if (rv != 0) { auto error = errno; LOG(ERROR) << "Blocking all signals failed: " << strerror(error); return; } auto pid = fork(); if (pid != 0) { if (pid == -1) { auto error = errno; LOG(ERROR) << "fork() failed errno=" << error; } rv = shrpx_signal_set(&oldset); if (rv != 0) { auto error = errno; LOG(FATAL) << "Restoring signal mask failed: " << strerror(error); exit(EXIT_FAILURE); } return; } // child process shrpx_signal_unset_master_proc_ign_handler(); rv = shrpx_signal_unblock_all(); if (rv != 0) { auto error = errno; LOG(ERROR) << "Unblocking all signals failed: " << strerror(error); _Exit(EXIT_FAILURE); } auto exec_path = util::get_exec_path(get_config()->argc, get_config()->argv, get_config()->cwd); if (!exec_path) { LOG(ERROR) << "Could not resolve the executable path"; _Exit(EXIT_FAILURE); } auto argv = make_unique(get_config()->argc + 1); argv[0] = exec_path; for (int i = 1; i < get_config()->argc; ++i) { argv[i] = get_config()->argv[i]; } argv[get_config()->argc] = nullptr; size_t envlen = 0; for (char **p = environ; *p; ++p, ++envlen) ; auto &listenerconf = get_config()->conn.listener; auto envp = make_unique(envlen + listenerconf.addrs.size() + 1); size_t envidx = 0; std::vector fd_envs; for (size_t i = 0; i < listenerconf.addrs.size(); ++i) { auto &addr = listenerconf.addrs[i]; auto s = ENV_ACCEPT_PREFIX.str(); s += util::utos(i + 1); s += '='; if (addr.host_unix) { s += "unix,"; s += util::utos(addr.fd); s += ','; s += addr.host; } else { s += "tcp,"; s += util::utos(addr.fd); } fd_envs.emplace_back(s); envp[envidx++] = const_cast(fd_envs.back().c_str()); } for (size_t i = 0; i < envlen; ++i) { auto env = StringRef{environ[i]}; if (util::starts_with(env, ENV_ACCEPT_PREFIX) || util::starts_with(env, ENV_LISTENER4_FD) || util::starts_with(env, ENV_LISTENER6_FD) || util::starts_with(env, ENV_PORT) || util::starts_with(env, ENV_UNIX_FD) || util::starts_with(env, ENV_UNIX_PATH)) { continue; } envp[envidx++] = environ[i]; } envp[envidx++] = nullptr; if (LOG_ENABLED(INFO)) { LOG(INFO) << "cmdline"; for (int i = 0; argv[i]; ++i) { LOG(INFO) << i << ": " << argv[i]; } LOG(INFO) << "environ"; for (int i = 0; envp[i]; ++i) { LOG(INFO) << i << ": " << envp[i]; } } // restores original stderr util::restore_original_fds(); if (execve(argv[0], argv.get(), envp.get()) == -1) { auto error = errno; LOG(ERROR) << "execve failed: errno=" << error; _Exit(EXIT_FAILURE); } } } // namespace namespace { void ipc_send(SignalServer *ssv, uint8_t ipc_event) { ssize_t nwrite; while ((nwrite = write(ssv->ipc_fd[1], &ipc_event, 1)) == -1 && errno == EINTR) ; if (nwrite < 0) { auto error = errno; LOG(ERROR) << "Could not send IPC event to worker process: " << strerror(error); return; } if (nwrite == 0) { LOG(ERROR) << "Could not send IPC event due to pipe overflow"; return; } } } // namespace namespace { void reopen_log(SignalServer *ssv) { LOG(NOTICE) << "Reopening log files: master process"; (void)reopen_log_files(); redirect_stderr_to_errorlog(); ipc_send(ssv, SHRPX_IPC_REOPEN_LOG); } } // namespace namespace { void signal_cb(struct ev_loop *loop, ev_signal *w, int revents) { auto ssv = static_cast(w->data); if (ssv->worker_process_pid == -1) { ev_break(loop); return; } switch (w->signum) { case REOPEN_LOG_SIGNAL: reopen_log(ssv); return; case EXEC_BINARY_SIGNAL: exec_binary(ssv); return; case GRACEFUL_SHUTDOWN_SIGNAL: ipc_send(ssv, SHRPX_IPC_GRACEFUL_SHUTDOWN); return; default: kill(ssv->worker_process_pid, w->signum); ev_break(loop); return; } } } // namespace namespace { void worker_process_child_cb(struct ev_loop *loop, ev_child *w, int revents) { log_chld(w->rpid, w->rstatus, "Worker process"); ev_child_stop(loop, w); ev_break(loop); } } // namespace struct InheritedAddr { // IP address if TCP socket. Otherwise, UNIX domain socket path. ImmutableString host; uint16_t port; // true if UNIX domain socket path bool host_unix; int fd; bool used; }; namespace { int create_unix_domain_server_socket(UpstreamAddr &faddr, std::vector &iaddrs) { auto found = std::find_if( std::begin(iaddrs), std::end(iaddrs), [&faddr](const InheritedAddr &ia) { return !ia.used && ia.host_unix && ia.host == faddr.host; }); if (found != std::end(iaddrs)) { LOG(NOTICE) << "Listening on UNIX domain socket " << faddr.host << (faddr.tls ? ", tls" : ""); (*found).used = true; faddr.fd = (*found).fd; faddr.hostport = "localhost"; return 0; } #ifdef SOCK_NONBLOCK auto fd = socket(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK, 0); if (fd == -1) { auto error = errno; LOG(WARN) << "socket() syscall failed: " << strerror(error); return -1; } #else // !SOCK_NONBLOCK auto fd = socket(AF_UNIX, SOCK_STREAM, 0); if (fd == -1) { auto error = errno; LOG(WARN) << "socket() syscall failed: " << strerror(error); return -1; } util::make_socket_nonblocking(fd); #endif // !SOCK_NONBLOCK int val = 1; if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &val, static_cast(sizeof(val))) == -1) { auto error = errno; LOG(WARN) << "Failed to set SO_REUSEADDR option to listener socket: " << strerror(error); close(fd); return -1; } sockaddr_union addr; addr.un.sun_family = AF_UNIX; if (faddr.host.size() + 1 > sizeof(addr.un.sun_path)) { LOG(FATAL) << "UNIX domain socket path " << faddr.host << " is too long > " << sizeof(addr.un.sun_path); close(fd); return -1; } // copy path including terminal NULL std::copy_n(faddr.host.c_str(), faddr.host.size() + 1, addr.un.sun_path); // unlink (remove) already existing UNIX domain socket path unlink(faddr.host.c_str()); if (bind(fd, &addr.sa, sizeof(addr.un)) != 0) { auto error = errno; LOG(FATAL) << "Failed to bind UNIX domain socket: " << strerror(error); close(fd); return -1; } auto &listenerconf = get_config()->conn.listener; if (listen(fd, listenerconf.backlog) != 0) { auto error = errno; LOG(FATAL) << "Failed to listen to UNIX domain socket: " << strerror(error); close(fd); return -1; } LOG(NOTICE) << "Listening on UNIX domain socket " << faddr.host << (faddr.tls ? ", tls" : ""); faddr.fd = fd; faddr.hostport = "localhost"; return 0; } } // namespace namespace { int create_tcp_server_socket(UpstreamAddr &faddr, std::vector &iaddrs) { int fd = -1; int rv; auto &listenerconf = get_config()->conn.listener; auto service = util::utos(faddr.port); addrinfo hints{}; hints.ai_family = faddr.family; hints.ai_socktype = SOCK_STREAM; hints.ai_flags = AI_PASSIVE; #ifdef AI_ADDRCONFIG hints.ai_flags |= AI_ADDRCONFIG; #endif // AI_ADDRCONFIG auto node = faddr.host == StringRef::from_lit("*") ? nullptr : faddr.host.c_str(); addrinfo *res, *rp; rv = getaddrinfo(node, service.c_str(), &hints, &res); if (rv != 0) { if (LOG_ENABLED(INFO)) { LOG(INFO) << "Unable to get IPv" << (faddr.family == AF_INET ? "4" : "6") << " address for " << faddr.host << ", port " << faddr.port << ": " << gai_strerror(rv); } return -1; } auto res_d = defer(freeaddrinfo, res); std::array host; for (rp = res; rp; rp = rp->ai_next) { rv = getnameinfo(rp->ai_addr, rp->ai_addrlen, host.data(), host.size(), nullptr, 0, NI_NUMERICHOST); if (rv != 0) { LOG(WARN) << "getnameinfo() failed: " << gai_strerror(rv); continue; } auto found = std::find_if(std::begin(iaddrs), std::end(iaddrs), [&host, &faddr](const InheritedAddr &ia) { return !ia.used && !ia.host_unix && ia.host == host.data() && ia.port == faddr.port; }); if (found != std::end(iaddrs)) { (*found).used = true; fd = (*found).fd; break; } #ifdef SOCK_NONBLOCK fd = socket(rp->ai_family, rp->ai_socktype | SOCK_NONBLOCK, rp->ai_protocol); if (fd == -1) { auto error = errno; LOG(WARN) << "socket() syscall failed: " << strerror(error); continue; } #else // !SOCK_NONBLOCK fd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol); if (fd == -1) { auto error = errno; LOG(WARN) << "socket() syscall failed: " << strerror(error); continue; } util::make_socket_nonblocking(fd); #endif // !SOCK_NONBLOCK int val = 1; if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &val, static_cast(sizeof(val))) == -1) { auto error = errno; LOG(WARN) << "Failed to set SO_REUSEADDR option to listener socket: " << strerror(error); close(fd); continue; } #ifdef IPV6_V6ONLY if (faddr.family == AF_INET6) { if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &val, static_cast(sizeof(val))) == -1) { auto error = errno; LOG(WARN) << "Failed to set IPV6_V6ONLY option to listener socket: " << strerror(error); close(fd); continue; } } #endif // IPV6_V6ONLY #ifdef TCP_DEFER_ACCEPT val = 3; if (setsockopt(fd, IPPROTO_TCP, TCP_DEFER_ACCEPT, &val, static_cast(sizeof(val))) == -1) { auto error = errno; LOG(WARN) << "Failed to set TCP_DEFER_ACCEPT option to listener socket: " << strerror(error); } #endif // TCP_DEFER_ACCEPT // When we are executing new binary, and the old binary did not // bind privileged port (< 1024) for some reason, binding to those // ports will fail with permission denied error. if (bind(fd, rp->ai_addr, rp->ai_addrlen) == -1) { auto error = errno; LOG(WARN) << "bind() syscall failed: " << strerror(error); close(fd); continue; } if (listenerconf.fastopen > 0) { val = listenerconf.fastopen; if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &val, static_cast(sizeof(val))) == -1) { auto error = errno; LOG(WARN) << "Failed to set TCP_FASTOPEN option to listener socket: " << strerror(error); } } if (listen(fd, listenerconf.backlog) == -1) { auto error = errno; LOG(WARN) << "listen() syscall failed: " << strerror(error); close(fd); continue; } break; } if (!rp) { LOG(WARN) << "Listening " << (faddr.family == AF_INET ? "IPv4" : "IPv6") << " socket failed"; return -1; } faddr.fd = fd; faddr.hostport = util::make_http_hostport(StringRef{host.data()}, faddr.port); LOG(NOTICE) << "Listening on " << faddr.hostport << (faddr.tls ? ", tls" : ""); return 0; } } // namespace namespace { int create_acceptor_socket() { int rv; auto &listenerconf = mod_config()->conn.listener; std::vector iaddrs; { // Upgrade from 1.7.0 or earlier auto portenv = getenv(ENV_PORT.c_str()); if (portenv) { size_t i = 1; for (auto env_name : {ENV_LISTENER4_FD, ENV_LISTENER6_FD}) { auto fdenv = getenv(env_name.c_str()); if (fdenv) { auto name = ENV_ACCEPT_PREFIX.str(); name += util::utos(i); std::string value = "tcp,"; value += fdenv; setenv(name.c_str(), value.c_str(), 0); ++i; } } } else { auto pathenv = getenv(ENV_UNIX_PATH.c_str()); auto fdenv = getenv(ENV_UNIX_FD.c_str()); if (pathenv && fdenv) { auto name = ENV_ACCEPT_PREFIX.str(); name += '1'; std::string value = "unix,"; value += fdenv; value += ','; value += pathenv; setenv(name.c_str(), value.c_str(), 0); } } } for (size_t i = 1;; ++i) { auto name = ENV_ACCEPT_PREFIX.str(); name += util::utos(i); auto env = getenv(name.c_str()); if (!env) { break; } if (LOG_ENABLED(INFO)) { LOG(INFO) << "Read env " << name << "=" << env; } auto end_type = strchr(env, ','); if (!end_type) { continue; } auto type = StringRef(env, end_type); auto value = end_type + 1; if (type == StringRef::from_lit("unix")) { auto endfd = strchr(value, ','); if (!endfd) { continue; } auto fd = util::parse_uint(reinterpret_cast(value), endfd - value); if (fd == -1) { LOG(WARN) << "Could not parse file descriptor from " << std::string(value, endfd - value); continue; } auto path = endfd + 1; if (strlen(path) == 0) { LOG(WARN) << "Empty UNIX domain socket path (fd=" << fd << ")"; close(fd); continue; } if (LOG_ENABLED(INFO)) { LOG(INFO) << "Inherit UNIX domain socket fd=" << fd << ", path=" << path; } InheritedAddr addr{}; addr.host = path; addr.host_unix = true; addr.fd = static_cast(fd); iaddrs.push_back(std::move(addr)); } if (type == StringRef::from_lit("tcp")) { auto fd = util::parse_uint(value); if (fd == -1) { LOG(WARN) << "Could not parse file descriptor from " << value; continue; } sockaddr_union su; socklen_t salen = sizeof(su); if (getsockname(fd, &su.sa, &salen) != 0) { auto error = errno; LOG(WARN) << "getsockname() syscall failed (fd=" << fd << "): " << strerror(error); close(fd); continue; } uint16_t port; switch (su.storage.ss_family) { case AF_INET: port = ntohs(su.in.sin_port); break; case AF_INET6: port = ntohs(su.in6.sin6_port); break; default: close(fd); continue; } std::array host; rv = getnameinfo(&su.sa, salen, host.data(), host.size(), nullptr, 0, NI_NUMERICHOST); if (rv != 0) { LOG(WARN) << "getnameinfo() failed (fd=" << fd << "): " << gai_strerror(rv); close(fd); continue; } if (LOG_ENABLED(INFO)) { LOG(INFO) << "Inherit TCP socket fd=" << fd << ", address=" << host.data() << ", port=" << port; } InheritedAddr addr{}; addr.host = host.data(); addr.port = static_cast(port); addr.fd = static_cast(fd); iaddrs.push_back(std::move(addr)); continue; } } for (auto &addr : listenerconf.addrs) { if (addr.host_unix) { if (create_unix_domain_server_socket(addr, iaddrs) != 0) { return -1; } if (get_config()->uid != 0) { // fd is not associated to inode, so we cannot use fchown(2) // here. https://lkml.org/lkml/2004/11/1/84 if (chown_to_running_user(addr.host.c_str()) == -1) { auto error = errno; LOG(WARN) << "Changing owner of UNIX domain socket " << addr.host << " failed: " << strerror(error); } } continue; } if (create_tcp_server_socket(addr, iaddrs) != 0) { return -1; } } for (auto &ia : iaddrs) { if (ia.used) { continue; } close(ia.fd); } return 0; } } // namespace namespace { int call_daemon() { #ifdef __sgi return _daemonize(0, 0, 0, 0); #else // !__sgi return daemon(0, 0); #endif // !__sgi } } // namespace namespace { pid_t fork_worker_process(SignalServer *ssv) { int rv; sigset_t oldset; rv = shrpx_signal_block_all(&oldset); if (rv != 0) { auto error = errno; LOG(ERROR) << "Blocking all signals failed: " << strerror(error); return -1; } auto pid = fork(); if (pid == 0) { ev_loop_fork(EV_DEFAULT); shrpx_signal_set_worker_proc_ign_handler(); rv = shrpx_signal_unblock_all(); if (rv != 0) { auto error = errno; LOG(FATAL) << "Unblocking all signals failed: " << strerror(error); _Exit(EXIT_FAILURE); } close(ssv->ipc_fd[1]); WorkerProcessConfig wpconf{ssv->ipc_fd[0]}; rv = worker_process_event_loop(&wpconf); if (rv != 0) { LOG(FATAL) << "Worker process returned error"; _Exit(EXIT_FAILURE); } LOG(NOTICE) << "Worker process shutting down momentarily"; // call exit(...) instead of _Exit to get leak sanitizer report _Exit(EXIT_SUCCESS); } // parent process if (pid == -1) { auto error = errno; LOG(ERROR) << "Could not spawn worker process: " << strerror(error); } rv = shrpx_signal_set(&oldset); if (rv != 0) { auto error = errno; LOG(FATAL) << "Restoring signal mask failed: " << strerror(error); exit(EXIT_FAILURE); } if (pid == -1) { return -1; } close(ssv->ipc_fd[0]); LOG(NOTICE) << "Worker process [" << pid << "] spawned"; return pid; } } // namespace namespace { int event_loop() { int rv; shrpx_signal_set_master_proc_ign_handler(); if (get_config()->daemon) { if (call_daemon() == -1) { auto error = errno; LOG(FATAL) << "Failed to daemonize: " << strerror(error); return -1; } // We get new PID after successful daemon(). mod_config()->pid = getpid(); // daemon redirects stderr file descriptor to /dev/null, so we // need this. redirect_stderr_to_errorlog(); } SignalServer ssv; rv = pipe(ssv.ipc_fd.data()); if (rv == -1) { auto error = errno; LOG(WARN) << "Failed to create pipe to communicate worker process: " << strerror(error); return -1; } for (int i = 0; i < 2; ++i) { auto fd = ssv.ipc_fd[i]; util::make_socket_nonblocking(fd); util::make_socket_closeonexec(fd); } if (create_acceptor_socket() != 0) { return -1; } auto loop = ev_default_loop(get_config()->ev_loop_flags); auto pid = fork_worker_process(&ssv); if (pid == -1) { return -1; } ssv.worker_process_pid = pid; constexpr auto signals = std::array{ {REOPEN_LOG_SIGNAL, EXEC_BINARY_SIGNAL, GRACEFUL_SHUTDOWN_SIGNAL}}; auto sigevs = std::array(); for (size_t i = 0; i < signals.size(); ++i) { auto sigev = &sigevs[i]; ev_signal_init(sigev, signal_cb, signals[i]); sigev->data = &ssv; ev_signal_start(loop, sigev); } ev_child worker_process_childev; ev_child_init(&worker_process_childev, worker_process_child_cb, pid, 0); worker_process_childev.data = nullptr; ev_child_start(loop, &worker_process_childev); // Write PID file when we are ready to accept connection from peer. // This makes easier to write restart script for nghttpx. Because // when we know that PID file is recreated, it means we can send // QUIT signal to the old process to make it shutdown gracefully. if (!get_config()->pid_file.empty()) { save_pid(); } ev_run(loop, 0); return 0; } } // namespace namespace { // Returns true if regular file or symbolic link |path| exists. bool conf_exists(const char *path) { struct stat buf; int rv = stat(path, &buf); return rv == 0 && (buf.st_mode & (S_IFREG | S_IFLNK)); } } // namespace namespace { constexpr auto DEFAULT_NPN_LIST = StringRef::from_lit("h2,h2-16,h2-14," #ifdef HAVE_SPDYLAY "spdy/3.1," #endif // HAVE_SPDYLAY "http/1.1"); } // namespace namespace { constexpr auto DEFAULT_TLS_PROTO_LIST = StringRef::from_lit("TLSv1.2,TLSv1.1"); } // namespace namespace { constexpr auto DEFAULT_ACCESSLOG_FORMAT = StringRef::from_lit( R"($remote_addr - - [$time_local] )" R"("$request" $status $body_bytes_sent )" R"("$http_referer" "$http_user_agent")"); } // namespace namespace { void fill_default_config() { *mod_config() = {}; mod_config()->num_worker = 1; mod_config()->conf_path = "/etc/nghttpx/nghttpx.conf"; mod_config()->pid = getpid(); if (ev_supported_backends() & ~ev_recommended_backends() & EVBACKEND_KQUEUE) { mod_config()->ev_loop_flags = ev_recommended_backends() | EVBACKEND_KQUEUE; } auto &tlsconf = mod_config()->tls; { auto &ticketconf = tlsconf.ticket; { auto &memcachedconf = ticketconf.memcached; memcachedconf.max_retry = 3; memcachedconf.max_fail = 2; memcachedconf.interval = 10_min; memcachedconf.family = AF_UNSPEC; } auto &session_cacheconf = tlsconf.session_cache; { auto &memcachedconf = session_cacheconf.memcached; memcachedconf.family = AF_UNSPEC; } ticketconf.cipher = EVP_aes_128_cbc(); } { auto &ocspconf = tlsconf.ocsp; // ocsp update interval = 14400 secs = 4 hours, borrowed from h2o ocspconf.update_interval = 4_h; ocspconf.fetch_ocsp_response_file = PKGDATADIR "/fetch-ocsp-response"; } { auto &dyn_recconf = tlsconf.dyn_rec; dyn_recconf.warmup_threshold = 1_m; dyn_recconf.idle_timeout = 1_s; } tlsconf.session_timeout = std::chrono::hours(12); auto &httpconf = mod_config()->http; httpconf.server_name = StringRef::from_lit("nghttpx nghttp2/" NGHTTP2_VERSION); httpconf.no_host_rewrite = true; httpconf.request_header_field_buffer = 64_k; httpconf.max_request_header_fields = 100; httpconf.response_header_field_buffer = 64_k; httpconf.max_response_header_fields = 500; auto &http2conf = mod_config()->http2; { auto &upstreamconf = http2conf.upstream; { auto &timeoutconf = upstreamconf.timeout; timeoutconf.settings = 10_s; } // window bits for HTTP/2 and SPDY upstream connection per // stream. 2**16-1 = 64KiB-1, which is HTTP/2 default. Please note // that SPDY/3 default is 64KiB. upstreamconf.window_bits = 16; // HTTP/2 SPDY/3.1 has connection-level flow control. The default // window size for HTTP/2 is 64KiB - 1. SPDY/3's default is 64KiB upstreamconf.connection_window_bits = 16; upstreamconf.max_concurrent_streams = 100; nghttp2_option_new(&upstreamconf.option); nghttp2_option_set_no_auto_window_update(upstreamconf.option, 1); nghttp2_option_set_no_recv_client_magic(upstreamconf.option, 1); // For API endpoint, we enable automatic window update. This is // because we are a sink. nghttp2_option_new(&upstreamconf.api_option); nghttp2_option_set_no_recv_client_magic(upstreamconf.api_option, 1); } { auto &downstreamconf = http2conf.downstream; { auto &timeoutconf = downstreamconf.timeout; timeoutconf.settings = 10_s; } downstreamconf.window_bits = 16; downstreamconf.connection_window_bits = 30; downstreamconf.max_concurrent_streams = 100; nghttp2_option_new(&downstreamconf.option); nghttp2_option_set_no_auto_window_update(downstreamconf.option, 1); nghttp2_option_set_peer_max_concurrent_streams(downstreamconf.option, 100); } auto &loggingconf = mod_config()->logging; { auto &accessconf = loggingconf.access; accessconf.format = parse_log_format(DEFAULT_ACCESSLOG_FORMAT); auto &errorconf = loggingconf.error; errorconf.file = "/dev/stderr"; } loggingconf.syslog_facility = LOG_DAEMON; auto &connconf = mod_config()->conn; { auto &listenerconf = connconf.listener; { // Default accept() backlog listenerconf.backlog = 512; listenerconf.timeout.sleep = 30_s; } } { auto &upstreamconf = connconf.upstream; { auto &timeoutconf = upstreamconf.timeout; // Read timeout for HTTP2 upstream connection timeoutconf.http2_read = 3_min; // Read timeout for non-HTTP2 upstream connection timeoutconf.read = 1_min; // Write timeout for HTTP2/non-HTTP2 upstream connection timeoutconf.write = 30_s; } } { connconf.downstream = std::make_shared(); auto &downstreamconf = *connconf.downstream; { auto &timeoutconf = downstreamconf.timeout; // Read/Write timeouts for downstream connection timeoutconf.read = 1_min; timeoutconf.write = 30_s; // Timeout for pooled (idle) connections timeoutconf.idle_read = 2_s; } downstreamconf.connections_per_host = 8; downstreamconf.request_buffer_size = 16_k; downstreamconf.response_buffer_size = 128_k; downstreamconf.family = AF_UNSPEC; } auto &apiconf = mod_config()->api; apiconf.max_request_body = 16_k; } } // namespace namespace { void print_version(std::ostream &out) { out << get_config()->http.server_name.c_str() << std::endl; } } // namespace namespace { void print_usage(std::ostream &out) { out << R"(Usage: nghttpx [OPTIONS]... [ ] A reverse proxy for HTTP/2, HTTP/1 and SPDY.)" << std::endl; } } // namespace namespace { void print_help(std::ostream &out) { print_usage(out); out << R"( Set path to server's private key. Required unless "no-tls" parameter is used in --frontend option. Set path to server's certificate. Required unless "no-tls" parameter is used in --frontend option. To make OCSP stapling work, this must be an absolute path. Options: The options are categorized into several groups. Connections: -b, --backend=(,|unix:)[;[[:...]][[;PARAM]...] Set backend host and port. The multiple backend addresses are accepted by repeating this option. UNIX domain socket can be specified by prefixing path name with "unix:" (e.g., unix:/var/run/backend.sock). Optionally, if s are given, the backend address is only used if request matches the pattern. If --http2-proxy is used, s are ignored. The pattern matching is closely designed to ServeMux in net/http package of Go programming language. consists of path, host + path or just host. The path must start with "/". If it ends with "/", it matches all request path in its subtree. To deal with the request to the directory without trailing slash, the path which ends with "/" also matches the request path which only lacks trailing '/' (e.g., path "/foo/" matches request path "/foo"). If it does not end with "/", it performs exact match against the request path. If host is given, it performs exact match against the request host. If host alone is given, "/" is appended to it, so that it matches all request paths under the host (e.g., specifying "nghttp2.org" equals to "nghttp2.org/"). Patterns with host take precedence over patterns with just path. Then, longer patterns take precedence over shorter ones. Host can include "*" in the left most position to indicate wildcard match (only suffix match is done). The "*" must match at least one character. For example, host pattern "*.nghttp2.org" matches against "www.nghttp2.org" and "git.ngttp2.org", but does not match against "nghttp2.org". The exact hosts match takes precedence over the wildcard hosts match. If is omitted or empty string, "/" is used as pattern, which matches all request paths (catch-all pattern). The catch-all backend must be given. When doing a match, nghttpx made some normalization to pattern, request host and path. For host part, they are converted to lower case. For path part, percent-encoded unreserved characters defined in RFC 3986 are decoded, and any dot-segments (".." and ".") are resolved and removed. For example, -b'127.0.0.1,8080;nghttp2.org/httpbin/' matches the request host "nghttp2.org" and the request path "/httpbin/get", but does not match the request host "nghttp2.org" and the request path "/index.html". The multiple s can be specified, delimiting them by ":". Specifying -b'127.0.0.1,8080;nghttp2.org:www.nghttp2.org' has the same effect to specify -b'127.0.0.1,8080;nghttp2.org' and -b'127.0.0.1,8080;www.nghttp2.org'. The backend addresses sharing same are grouped together forming load balancing group. Several parameters are accepted after . The parameters are delimited by ";". The available parameters are: "proto=", "tls", "sni=", "fall=", "rise=", and "affinity=". The parameter consists of keyword, and optionally followed by "=" and value. For example, the parameter "proto=h2" consists of the keyword "proto" and value "h2". The parameter "tls" consists of the keyword "tls" without value. Each parameter is described as follows. The backend application protocol can be specified using optional "proto" parameter, and in the form of "proto=". should be one of the following list without quotes: "h2", "http/1.1". The default value of is "http/1.1". Note that usually "h2" refers to HTTP/2 over TLS. But in this option, it may mean HTTP/2 over cleartext TCP unless "tls" keyword is used (see below). TLS can be enabled by specifying optional "tls" parameter. TLS is not enabled by default. With "sni=" parameter, it can override the TLS SNI field value with given . This will default to the backend name The feature to detect whether backend is online or offline can be enabled using optional "fall" and "rise" parameters. Using "fall=" parameter, if nghttpx cannot connect to a this backend times in a row, this backend is assumed to be offline, and it is excluded from load balancing. If is 0, this backend never be excluded from load balancing whatever times nghttpx cannot connect to it, and this is the default. There is also "rise=" parameter. After backend was excluded from load balancing group, nghttpx periodically attempts to make a connection to the failed backend, and if the connection is made successfully times in a row, the backend is assumed to be online, and it is now eligible for load balancing target. If is 0, a backend is permanently offline, once it goes in that state, and this is the default behaviour. The session affinity is enabled using "affinity=" parameter. If "ip" is given in , client IP based session affinity is enabled. If "none" is given in , session affinity is disabled, and this is the default. The session affinity is enabled per . If at least one backend has "affinity" parameter, and its is not "none", session affinity is enabled for all backend servers sharing the same . It is advised to set "affinity" parameter to all backend explicitly if session affinity is desired. The session affinity may break if one of the backend gets unreachable, or backend settings are reload or replaced by API. Since ";" and ":" are used as delimiter, must not contain these characters. Since ";" has special meaning in shell, the option value must be quoted. Default: )" << DEFAULT_DOWNSTREAM_HOST << "," << DEFAULT_DOWNSTREAM_PORT << R"( -f, --frontend=(,|unix:)[;no-tls] Set frontend host and port. If is '*', it assumes all addresses including both IPv4 and IPv6. UNIX domain socket can be specified by prefixing path name with "unix:" (e.g., unix:/var/run/nghttpx.sock). This option can be used multiple times to listen to multiple addresses. Optionally, TLS can be disabled by specifying "no-tls" parameter. TLS is enabled by default. To make this frontend as API endpoint, specify "api" parameter. This is disabled by default. It is important to limit the access to the API frontend. Otherwise, someone may change the backend server, and break your services, or expose confidential information to the outside the world. Default: *,3000 --backlog= Set listen backlog size. Default: )" << get_config()->conn.listener.backlog << R"( --backend-address-family=(auto|IPv4|IPv6) Specify address family of backend connections. If "auto" is given, both IPv4 and IPv6 are considered. If "IPv4" is given, only IPv4 address is considered. If "IPv6" is given, only IPv6 address is considered. Default: auto --backend-http-proxy-uri= Specify proxy URI in the form http://[:@]:. If a proxy requires authentication, specify and . Note that they must be properly percent-encoded. This proxy is used when the backend connection is HTTP/2. First, make a CONNECT request to the proxy and it connects to the backend on behalf of nghttpx. This forms tunnel. After that, nghttpx performs SSL/TLS handshake with the downstream through the tunnel. The timeouts when connecting and making CONNECT request can be specified by --backend-read-timeout and --backend-write-timeout options. --accept-proxy-protocol Accept PROXY protocol version 1 on frontend connection. Performance: -n, --workers= Set the number of worker threads. Default: )" << get_config()->num_worker << R"( --read-rate= Set maximum average read rate on frontend connection. Setting 0 to this option means read rate is unlimited. Default: )" << get_config()->conn.upstream.ratelimit.read.rate << R"( --read-burst= Set maximum read burst size on frontend connection. Setting 0 to this option means read burst size is unlimited. Default: )" << get_config()->conn.upstream.ratelimit.read.burst << R"( --write-rate= Set maximum average write rate on frontend connection. Setting 0 to this option means write rate is unlimited. Default: )" << get_config()->conn.upstream.ratelimit.write.rate << R"( --write-burst= Set maximum write burst size on frontend connection. Setting 0 to this option means write burst size is unlimited. Default: )" << get_config()->conn.upstream.ratelimit.write.burst << R"( --worker-read-rate= Set maximum average read rate on frontend connection per worker. Setting 0 to this option means read rate is unlimited. Not implemented yet. Default: 0 --worker-read-burst= Set maximum read burst size on frontend connection per worker. Setting 0 to this option means read burst size is unlimited. Not implemented yet. Default: 0 --worker-write-rate= Set maximum average write rate on frontend connection per worker. Setting 0 to this option means write rate is unlimited. Not implemented yet. Default: 0 --worker-write-burst= Set maximum write burst size on frontend connection per worker. Setting 0 to this option means write burst size is unlimited. Not implemented yet. Default: 0 --worker-frontend-connections= Set maximum number of simultaneous connections frontend accepts. Setting 0 means unlimited. Default: )" << get_config()->conn.upstream.worker_connections << R"( --backend-connections-per-host= Set maximum number of backend concurrent connections (and/or streams in case of HTTP/2) per origin host. This option is meaningful when --http2-proxy option is used. The origin host is determined by authority portion of request URI (or :authority header field for HTTP/2). To limit the number of connections per frontend for default mode, use --backend-connections-per-frontend. Default: )" << get_config()->conn.downstream->connections_per_host << R"( --backend-connections-per-frontend= Set maximum number of backend concurrent connections (and/or streams in case of HTTP/2) per frontend. This option is only used for default mode. 0 means unlimited. To limit the number of connections per host with --http2-proxy option, use --backend-connections-per-host. Default: )" << get_config()->conn.downstream->connections_per_frontend << R"( --rlimit-nofile= Set maximum number of open files (RLIMIT_NOFILE) to . If 0 is given, nghttpx does not set the limit. Default: )" << get_config()->rlimit_nofile << R"( --backend-request-buffer= Set buffer size used to store backend request. Default: )" << util::utos_unit(get_config()->conn.downstream->request_buffer_size) << R"( --backend-response-buffer= Set buffer size used to store backend response. Default: )" << util::utos_unit(get_config()->conn.downstream->response_buffer_size) << R"( --fastopen= Enables "TCP Fast Open" for the listening socket and limits the maximum length for the queue of connections that have not yet completed the three-way handshake. If value is 0 then fast open is disabled. Default: )" << get_config()->conn.listener.fastopen << R"( --no-kqueue Don't use kqueue. This option is only applicable for the platforms which have kqueue. For other platforms, this option will be simply ignored. Timeout: --frontend-http2-read-timeout= Specify read timeout for HTTP/2 and SPDY frontend connection. Default: )" << util::duration_str(get_config()->conn.upstream.timeout.http2_read) << R"( --frontend-read-timeout= Specify read timeout for HTTP/1.1 frontend connection. Default: )" << util::duration_str(get_config()->conn.upstream.timeout.read) << R"( --frontend-write-timeout= Specify write timeout for all frontend connections. Default: )" << util::duration_str(get_config()->conn.upstream.timeout.write) << R"( --stream-read-timeout= Specify read timeout for HTTP/2 and SPDY streams. 0 means no timeout. Default: )" << util::duration_str(get_config()->http2.timeout.stream_read) << R"( --stream-write-timeout= Specify write timeout for HTTP/2 and SPDY streams. 0 means no timeout. Default: )" << util::duration_str(get_config()->http2.timeout.stream_write) << R"( --backend-read-timeout= Specify read timeout for backend connection. Default: )" << util::duration_str(get_config()->conn.downstream->timeout.read) << R"( --backend-write-timeout= Specify write timeout for backend connection. Default: )" << util::duration_str(get_config()->conn.downstream->timeout.write) << R"( --backend-keep-alive-timeout= Specify keep-alive timeout for backend connection. Default: )" << util::duration_str(get_config()->conn.downstream->timeout.idle_read) << R"( --listener-disable-timeout= After accepting connection failed, connection listener is disabled for a given amount of time. Specifying 0 disables this feature. Default: )" << util::duration_str(get_config()->conn.listener.timeout.sleep) << R"( --frontend-http2-setting-timeout= Specify timeout before SETTINGS ACK is received from client. Default: )" << util::duration_str(get_config()->http2.upstream.timeout.settings) << R"( --backend-http2-settings-timeout= Specify timeout before SETTINGS ACK is received from backend server. Default: )" << util::duration_str(get_config()->http2.downstream.timeout.settings) << R"( SSL/TLS: --ciphers= Set allowed cipher list. The format of the string is described in OpenSSL ciphers(1). -k, --insecure Don't verify backend server's certificate if TLS is enabled for backend connections. --cacert= Set path to trusted CA certificate file used in backend TLS connections. The file must be in PEM format. It can contain multiple certificates. If the linked OpenSSL is configured to load system wide certificates, they are loaded at startup regardless of this option. --private-key-passwd-file= Path to file that contains password for the server's private key. If none is given and the private key is password protected it'll be requested interactively. --subcert=: Specify additional certificate and private key file. nghttpx will choose certificates based on the hostname indicated by client using TLS SNI extension. This option can be used multiple times. To make OCSP stapling work, must be absolute path. --dh-param-file= Path to file that contains DH parameters in PEM format. Without this option, DHE cipher suites are not available. --npn-list= Comma delimited list of ALPN protocol identifier sorted in the order of preference. That means most desirable protocol comes first. This is used in both ALPN and NPN. The parameter must be delimited by a single comma only and any white spaces are treated as a part of protocol string. Default: )" << DEFAULT_NPN_LIST << R"( --verify-client Require and verify client certificate. --verify-client-cacert= Path to file that contains CA certificates to verify client certificate. The file must be in PEM format. It can contain multiple certificates. --client-private-key-file= Path to file that contains client private key used in backend client authentication. --client-cert-file= Path to file that contains client certificate used in backend client authentication. --tls-proto-list= Comma delimited list of SSL/TLS protocol to be enabled. The following protocols are available: TLSv1.2, TLSv1.1 and TLSv1.0. The name matching is done in case-insensitive manner. The parameter must be delimited by a single comma only and any white spaces are treated as a part of protocol string. If the protocol list advertised by client does not overlap this list, you will receive the error message "unknown protocol". Default: )" << DEFAULT_TLS_PROTO_LIST << R"( --tls-ticket-key-file= Path to file that contains random data to construct TLS session ticket parameters. If aes-128-cbc is given in --tls-ticket-key-cipher, the file must contain exactly 48 bytes. If aes-256-cbc is given in --tls-ticket-key-cipher, the file must contain exactly 80 bytes. This options can be used repeatedly to specify multiple ticket parameters. If several files are given, only the first key is used to encrypt TLS session tickets. Other keys are accepted but server will issue new session ticket with first key. This allows session key rotation. Please note that key rotation does not occur automatically. User should rearrange files or change options values and restart nghttpx gracefully. If opening or reading given file fails, all loaded keys are discarded and it is treated as if none of this option is given. If this option is not given or an error occurred while opening or reading a file, key is generated every 1 hour internally and they are valid for 12 hours. This is recommended if ticket key sharing between nghttpx instances is not required. --tls-ticket-key-memcached=,[;tls] Specify address of memcached server to get TLS ticket keys for session resumption. This enables shared TLS ticket key between multiple nghttpx instances. nghttpx does not set TLS ticket key to memcached. The external ticket key generator is required. nghttpx just gets TLS ticket keys from memcached, and use them, possibly replacing current set of keys. It is up to extern TLS ticket key generator to rotate keys frequently. See "TLS SESSION TICKET RESUMPTION" section in manual page to know the data format in memcached entry. Optionally, memcached connection can be encrypted with TLS by specifying "tls" parameter. --tls-ticket-key-memcached-address-family=(auto|IPv4|IPv6) Specify address family of memcached connections to get TLS ticket keys. If "auto" is given, both IPv4 and IPv6 are considered. If "IPv4" is given, only IPv4 address is considered. If "IPv6" is given, only IPv6 address is considered. Default: auto --tls-ticket-key-memcached-interval= Set interval to get TLS ticket keys from memcached. Default: )" << util::duration_str(get_config()->tls.ticket.memcached.interval) << R"( --tls-ticket-key-memcached-max-retry= Set maximum number of consecutive retries before abandoning TLS ticket key retrieval. If this number is reached, the attempt is considered as failure, and "failure" count is incremented by 1, which contributed to the value controlled --tls-ticket-key-memcached-max-fail option. Default: )" << get_config()->tls.ticket.memcached.max_retry << R"( --tls-ticket-key-memcached-max-fail= Set maximum number of consecutive failure before disabling TLS ticket until next scheduled key retrieval. Default: )" << get_config()->tls.ticket.memcached.max_fail << R"( --tls-ticket-key-cipher= Specify cipher to encrypt TLS session ticket. Specify either aes-128-cbc or aes-256-cbc. By default, aes-128-cbc is used. --tls-ticket-key-memcached-cert-file= Path to client certificate for memcached connections to get TLS ticket keys. --tls-ticket-key-memcached-private-key-file= Path to client private key for memcached connections to get TLS ticket keys. --fetch-ocsp-response-file= Path to fetch-ocsp-response script file. It should be absolute path. Default: )" << get_config()->tls.ocsp.fetch_ocsp_response_file << R"( --ocsp-update-interval= Set interval to update OCSP response cache. Default: )" << util::duration_str(get_config()->tls.ocsp.update_interval) << R"( --no-ocsp Disable OCSP stapling. --tls-session-cache-memcached=,[;tls] Specify address of memcached server to store session cache. This enables shared session cache between multiple nghttpx instances. Optionally, memcached connection can be encrypted with TLS by specifying "tls" parameter. --tls-session-cache-memcached-address-family=(auto|IPv4|IPv6) Specify address family of memcached connections to store session cache. If "auto" is given, both IPv4 and IPv6 are considered. If "IPv4" is given, only IPv4 address is considered. If "IPv6" is given, only IPv6 address is considered. Default: auto --tls-session-cache-memcached-cert-file= Path to client certificate for memcached connections to store session cache. --tls-session-cache-memcached-private-key-file= Path to client private key for memcached connections to store session cache. --tls-dyn-rec-warmup-threshold= Specify the threshold size for TLS dynamic record size behaviour. During a TLS session, after the threshold number of bytes have been written, the TLS record size will be increased to the maximum allowed (16K). The max record size will continue to be used on the active TLS session. After --tls-dyn-rec-idle-timeout has elapsed, the record size is reduced to 1300 bytes. Specify 0 to always use the maximum record size, regardless of idle period. This behaviour applies to all TLS based frontends, and TLS HTTP/2 backends. Default: )" << util::utos_unit(get_config()->tls.dyn_rec.warmup_threshold) << R"( --tls-dyn-rec-idle-timeout= Specify TLS dynamic record size behaviour timeout. See --tls-dyn-rec-warmup-threshold for more information. This behaviour applies to all TLS based frontends, and TLS HTTP/2 backends. Default: )" << util::duration_str(get_config()->tls.dyn_rec.idle_timeout) << R"( --no-http2-cipher-black-list Allow black listed cipher suite on HTTP/2 connection. See https://tools.ietf.org/html/rfc7540#appendix-A for the complete HTTP/2 cipher suites black list. HTTP/2 and SPDY: -c, --frontend-http2-max-concurrent-streams= Set the maximum number of the concurrent streams in one frontend HTTP/2 and SPDY session. Default: )" << get_config()->http2.upstream.max_concurrent_streams << R"( --backend-http2-max-concurrent-streams= Set the maximum number of the concurrent streams in one backend HTTP/2 session. This sets maximum number of concurrent opened pushed streams. The maximum number of concurrent requests are set by a remote server. Default: )" << get_config()->http2.downstream.max_concurrent_streams << R"( --frontend-http2-window-bits= Sets the per-stream initial window size of HTTP/2 SPDY frontend connection. For HTTP/2, the size is 2**-1. For SPDY, the size is 2**. Default: )" << get_config()->http2.upstream.window_bits << R"( --frontend-http2-connection-window-bits= Sets the per-connection window size of HTTP/2 and SPDY frontend connection. For HTTP/2, the size is 2**-1. For SPDY, the size is 2**. Default: )" << get_config()->http2.upstream.connection_window_bits << R"( --backend-http2-window-bits= Sets the initial window size of HTTP/2 backend connection to 2**-1. Default: )" << get_config()->http2.downstream.window_bits << R"( --backend-http2-connection-window-bits= Sets the per-connection window size of HTTP/2 backend connection to 2**-1. Default: )" << get_config()->http2.downstream.connection_window_bits << R"( --http2-no-cookie-crumbling Don't crumble cookie header field. --padding= Add at most bytes to a HTTP/2 frame payload as padding. Specify 0 to disable padding. This option is meant for debugging purpose and not intended to enhance protocol security. --no-server-push Disable HTTP/2 server push. Server push is supported by default mode and HTTP/2 frontend via Link header field. It is also supported if both frontend and backend are HTTP/2 in default mode. In this case, server push from backend session is relayed to frontend, and server push via Link header field is also supported. SPDY frontend does not support server push. Mode: (default mode) Accept HTTP/2, SPDY and HTTP/1.1 over SSL/TLS. "no-tls" parameter is used in --frontend option, accept HTTP/2 and HTTP/1.1 over cleartext TCP. The incoming HTTP/1.1 connection can be upgraded to HTTP/2 through HTTP Upgrade. -s, --http2-proxy Like default mode, but enable forward proxy. This is so called HTTP/2 proxy mode. Logging: -L, --log-level= Set the severity level of log output. must be one of INFO, NOTICE, WARN, ERROR and FATAL. Default: NOTICE --accesslog-file= Set path to write access log. To reopen file, send USR1 signal to nghttpx. --accesslog-syslog Send access log to syslog. If this option is used, --accesslog-file option is ignored. --accesslog-format= Specify format string for access log. The default format is combined format. The following variables are available: * $remote_addr: client IP address. * $time_local: local time in Common Log format. * $time_iso8601: local time in ISO 8601 format. * $request: HTTP request line. * $status: HTTP response status code. * $body_bytes_sent: the number of bytes sent to client as response body. * $http_: value of HTTP request header where '_' in is replaced with '-'. * $remote_port: client port. * $server_port: server port. * $request_time: request processing time in seconds with milliseconds resolution. * $pid: PID of the running process. * $alpn: ALPN identifier of the protocol which generates the response. For HTTP/1, ALPN is always http/1.1, regardless of minor version. * $ssl_cipher: cipher used for SSL/TLS connection. * $ssl_protocol: protocol for SSL/TLS connection. * $ssl_session_id: session ID for SSL/TLS connection. * $ssl_session_reused: "r" if SSL/TLS session was reused. Otherwise, "." The variable can be enclosed by "{" and "}" for disambiguation (e.g., ${remote_addr}). Default: )" << DEFAULT_ACCESSLOG_FORMAT << R"( --errorlog-file= Set path to write error log. To reopen file, send USR1 signal to nghttpx. stderr will be redirected to the error log file unless --errorlog-syslog is used. Default: )" << get_config()->logging.error.file << R"( --errorlog-syslog Send error log to syslog. If this option is used, --errorlog-file option is ignored. --syslog-facility= Set syslog facility to . Default: )" << str_syslog_facility(get_config()->logging.syslog_facility) << R"( HTTP: --add-x-forwarded-for Append X-Forwarded-For header field to the downstream request. --strip-incoming-x-forwarded-for Strip X-Forwarded-For header field from inbound client requests. --add-forwarded= Append RFC 7239 Forwarded header field with parameters specified in comma delimited list . The supported parameters are "by", "for", "host", and "proto". By default, the value of "by" and "for" parameters are obfuscated string. See --forwarded-by and --forwarded-for options respectively. Note that nghttpx does not translate non-standard X-Forwarded-* header fields into Forwarded header field, and vice versa. --strip-incoming-forwarded Strip Forwarded header field from inbound client requests. --forwarded-by=(obfuscated|ip|) Specify the parameter value sent out with "by" parameter of Forwarded header field. If "obfuscated" is given, the string is randomly generated at startup. If "ip" is given, the interface address of the connection, including port number, is sent with "by" parameter. In case of UNIX domain socket, "localhost" is used instead of address and port. User can also specify the static obfuscated string. The limitation is that it must start with "_", and only consists of character set [A-Za-z0-9._-], as described in RFC 7239. Default: obfuscated --forwarded-for=(obfuscated|ip) Specify the parameter value sent out with "for" parameter of Forwarded header field. If "obfuscated" is given, the string is randomly generated for each client connection. If "ip" is given, the remote client address of the connection, without port number, is sent with "for" parameter. In case of UNIX domain socket, "localhost" is used instead of address. Default: obfuscated --no-via Don't append to Via header field. If Via header field is received, it is left unaltered. --no-location-rewrite Don't rewrite location header field in default mode. When --http2-proxy is used, location header field will not be altered regardless of this option. --host-rewrite Rewrite host and :authority header fields in default mode. When --http2-proxy is used, these headers will not be altered regardless of this option. --altsvc= Specify protocol ID, port, host and origin of alternative service. and are optional. They are advertised in alt-svc header field only in HTTP/1.1 frontend. This option can be used multiple times to specify multiple alternative services. Example: --altsvc=h2,443 --add-request-header=
Specify additional header field to add to request header set. This option just appends header field and won't replace anything already set. This option can be used several times to specify multiple header fields. Example: --add-request-header="foo: bar" --add-response-header=
Specify additional header field to add to response header set. This option just appends header field and won't replace anything already set. This option can be used several times to specify multiple header fields. Example: --add-response-header="foo: bar" --request-header-field-buffer= Set maximum buffer size for incoming HTTP request header field list. This is the sum of header name and value in bytes. If trailer fields exist, they are counted towards this number. Default: )" << util::utos_unit(get_config()->http.request_header_field_buffer) << R"( --max-request-header-fields= Set maximum number of incoming HTTP request header fields. If trailer fields exist, they are counted towards this number. Default: )" << get_config()->http.max_request_header_fields << R"( --response-header-field-buffer= Set maximum buffer size for incoming HTTP response header field list. This is the sum of header name and value in bytes. If trailer fields exist, they are counted towards this number. Default: )" << util::utos_unit(get_config()->http.response_header_field_buffer) << R"( --max-response-header-fields= Set maximum number of incoming HTTP response header fields. If trailer fields exist, they are counted towards this number. Default: )" << get_config()->http.max_response_header_fields << R"( --error-page=(|*)= Set file path to custom error page served when nghttpx originally generates HTTP error status code . must be greater than or equal to 400, and at most 599. If "*" is used instead of , it matches all HTTP status code. If error status code comes from backend server, the custom error pages are not used. API: --api-max-request-body= Set the maximum size of request body for API request. Default: )" << util::utos_unit(get_config()->api.max_request_body) << R"( Debug: --frontend-http2-dump-request-header= Dumps request headers received by HTTP/2 frontend to the file denoted in . The output is done in HTTP/1 header field format and each header block is followed by an empty line. This option is not thread safe and MUST NOT be used with option -n, where >= 2. --frontend-http2-dump-response-header= Dumps response headers sent from HTTP/2 frontend to the file denoted in . The output is done in HTTP/1 header field format and each header block is followed by an empty line. This option is not thread safe and MUST NOT be used with option -n, where >= 2. -o, --frontend-frame-debug Print HTTP/2 frames in frontend to stderr. This option is not thread safe and MUST NOT be used with option -n=N, where N >= 2. Process: -D, --daemon Run in a background. If -D is used, the current working directory is changed to '/'. --pid-file= Set path to save PID of this program. --user= Run this program as . This option is intended to be used to drop root privileges. Scripting: --mruby-file= Set mruby script file Misc: --conf= Load configuration from . Default: )" << get_config()->conf_path << R"( --include= Load additional configurations from . File is read when configuration parser encountered this option. This option can be used multiple times, or even recursively. -v, --version Print version and exit. -h, --help Print this help and exit. -- The argument is an integer and an optional unit (e.g., 10K is 10 * 1024). Units are K, M and G (powers of 1024). The argument is an integer and an optional unit (e.g., 1s is 1 second and 500ms is 500 milliseconds). Units are h, m, s or ms (hours, minutes, seconds and milliseconds, respectively). If a unit is omitted, a second is used as unit.)" << std::endl; } } // namespace namespace { void process_options(int argc, char **argv, std::vector> &cmdcfgs) { if (conf_exists(get_config()->conf_path.c_str())) { std::set include_set; if (load_config(get_config()->conf_path.c_str(), include_set) == -1) { LOG(FATAL) << "Failed to load configuration from " << get_config()->conf_path; exit(EXIT_FAILURE); } assert(include_set.empty()); } if (argc - optind >= 2) { cmdcfgs.emplace_back(SHRPX_OPT_PRIVATE_KEY_FILE, StringRef{argv[optind++]}); cmdcfgs.emplace_back(SHRPX_OPT_CERTIFICATE_FILE, StringRef{argv[optind++]}); } // Reopen log files using configurations in file reopen_log_files(); { std::set include_set; for (auto &p : cmdcfgs) { if (parse_config(mod_config(), p.first, p.second, include_set) == -1) { LOG(FATAL) << "Failed to parse command-line argument."; exit(EXIT_FAILURE); } } assert(include_set.empty()); } auto &loggingconf = get_config()->logging; if (loggingconf.access.syslog || loggingconf.error.syslog) { openlog("nghttpx", LOG_NDELAY | LOG_NOWAIT | LOG_PID, loggingconf.syslog_facility); } if (reopen_log_files() != 0) { LOG(FATAL) << "Failed to open log file"; exit(EXIT_FAILURE); } redirect_stderr_to_errorlog(); if (get_config()->uid != 0) { if (log_config()->accesslog_fd != -1 && fchown(log_config()->accesslog_fd, get_config()->uid, get_config()->gid) == -1) { auto error = errno; LOG(WARN) << "Changing owner of access log file failed: " << strerror(error); } if (log_config()->errorlog_fd != -1 && fchown(log_config()->errorlog_fd, get_config()->uid, get_config()->gid) == -1) { auto error = errno; LOG(WARN) << "Changing owner of error log file failed: " << strerror(error); } } auto &http2conf = mod_config()->http2; { auto &dumpconf = http2conf.upstream.debug.dump; if (!dumpconf.request_header_file.empty()) { auto path = dumpconf.request_header_file.c_str(); auto f = open_file_for_write(path); if (f == nullptr) { LOG(FATAL) << "Failed to open http2 upstream request header file: " << path; exit(EXIT_FAILURE); } dumpconf.request_header = f; if (get_config()->uid != 0) { if (chown_to_running_user(path) == -1) { auto error = errno; LOG(WARN) << "Changing owner of http2 upstream request header file " << path << " failed: " << strerror(error); } } } if (!dumpconf.response_header_file.empty()) { auto path = dumpconf.response_header_file.c_str(); auto f = open_file_for_write(path); if (f == nullptr) { LOG(FATAL) << "Failed to open http2 upstream response header file: " << path; exit(EXIT_FAILURE); } dumpconf.response_header = f; if (get_config()->uid != 0) { if (chown_to_running_user(path) == -1) { auto error = errno; LOG(WARN) << "Changing owner of http2 upstream response header file" << " " << path << " failed: " << strerror(error); } } } } auto &tlsconf = mod_config()->tls; if (tlsconf.npn_list.empty()) { tlsconf.npn_list = util::parse_config_str_list(DEFAULT_NPN_LIST); } if (tlsconf.tls_proto_list.empty()) { tlsconf.tls_proto_list = util::parse_config_str_list(DEFAULT_TLS_PROTO_LIST); } tlsconf.tls_proto_mask = ssl::create_tls_proto_mask(tlsconf.tls_proto_list); tlsconf.alpn_prefs = ssl::set_alpn_prefs(tlsconf.npn_list); tlsconf.bio_method = create_bio_method(); auto &listenerconf = mod_config()->conn.listener; auto &upstreamconf = mod_config()->conn.upstream; if (listenerconf.addrs.empty()) { UpstreamAddr addr{}; addr.host = "*"; addr.port = 3000; addr.tls = true; addr.family = AF_INET; listenerconf.addrs.push_back(addr); addr.family = AF_INET6; listenerconf.addrs.push_back(std::move(addr)); } if (upstreamconf.worker_connections == 0) { upstreamconf.worker_connections = std::numeric_limits::max(); } if (ssl::upstream_tls_enabled() && (tlsconf.private_key_file.empty() || tlsconf.cert_file.empty())) { print_usage(std::cerr); LOG(FATAL) << "Too few arguments"; exit(EXIT_FAILURE); } if (ssl::upstream_tls_enabled() && !tlsconf.ocsp.disabled) { struct stat buf; if (stat(tlsconf.ocsp.fetch_ocsp_response_file.c_str(), &buf) != 0) { tlsconf.ocsp.disabled = true; LOG(WARN) << "--fetch-ocsp-response-file: " << tlsconf.ocsp.fetch_ocsp_response_file << " not found. OCSP stapling has been disabled."; } } if (configure_downstream_group(mod_config(), get_config()->http2_proxy, false, tlsconf) != 0) { exit(EXIT_FAILURE); } auto &proxy = mod_config()->downstream_http_proxy; if (!proxy.host.empty()) { auto hostport = util::make_hostport(StringRef{proxy.host}, proxy.port); if (resolve_hostname(&proxy.addr, proxy.host.c_str(), proxy.port, AF_UNSPEC) == -1) { LOG(FATAL) << "Resolving backend HTTP proxy address failed: " << hostport; exit(EXIT_FAILURE); } LOG(NOTICE) << "Backend HTTP proxy address: " << hostport << " -> " << util::to_numeric_addr(&proxy.addr); } { auto &memcachedconf = tlsconf.session_cache.memcached; if (!memcachedconf.host.empty()) { auto hostport = util::make_hostport(StringRef{memcachedconf.host}, memcachedconf.port); if (resolve_hostname(&memcachedconf.addr, memcachedconf.host.c_str(), memcachedconf.port, memcachedconf.family) == -1) { LOG(FATAL) << "Resolving memcached address for TLS session cache failed: " << hostport; exit(EXIT_FAILURE); } LOG(NOTICE) << "Memcached address for TLS session cache: " << hostport << " -> " << util::to_numeric_addr(&memcachedconf.addr); if (memcachedconf.tls) { LOG(NOTICE) << "Connection to memcached for TLS session cache will be " "encrypted by TLS"; } } } { auto &memcachedconf = tlsconf.ticket.memcached; if (!memcachedconf.host.empty()) { auto hostport = util::make_hostport(StringRef{memcachedconf.host}, memcachedconf.port); if (resolve_hostname(&memcachedconf.addr, memcachedconf.host.c_str(), memcachedconf.port, memcachedconf.family) == -1) { LOG(FATAL) << "Resolving memcached address for TLS ticket key failed: " << hostport; exit(EXIT_FAILURE); } LOG(NOTICE) << "Memcached address for TLS ticket key: " << hostport << " -> " << util::to_numeric_addr(&memcachedconf.addr); if (memcachedconf.tls) { LOG(NOTICE) << "Connection to memcached for TLS ticket key will be " "encrypted by TLS"; } } } if (get_config()->rlimit_nofile) { struct rlimit lim = {static_cast(get_config()->rlimit_nofile), static_cast(get_config()->rlimit_nofile)}; if (setrlimit(RLIMIT_NOFILE, &lim) != 0) { auto error = errno; LOG(WARN) << "Setting rlimit-nofile failed: " << strerror(error); } } auto &fwdconf = mod_config()->http.forwarded; if (fwdconf.by_node_type == FORWARDED_NODE_OBFUSCATED && fwdconf.by_obfuscated.empty()) { std::random_device rd; std::mt19937 gen(rd()); auto &dst = fwdconf.by_obfuscated; dst = "_"; dst += util::random_alpha_digit(gen, SHRPX_OBFUSCATED_NODE_LENGTH); } if (get_config()->http2.upstream.debug.frame_debug) { // To make it sync to logging set_output(stderr); if (isatty(fileno(stdout))) { set_color_output(true); } reset_timer(); } mod_config()->http2.upstream.callbacks = create_http2_upstream_callbacks(); mod_config()->http2.downstream.callbacks = create_http2_downstream_callbacks(); } } // namespace int main(int argc, char **argv) { nghttp2::ssl::libssl_init(); #ifndef NOTHREADS nghttp2::ssl::LibsslGlobalLock lock; #endif // NOTHREADS Log::set_severity_level(NOTICE); create_config(); fill_default_config(); // make copy of stderr util::store_original_fds(); // First open log files with default configuration, so that we can // log errors/warnings while reading configuration files. reopen_log_files(); mod_config()->original_argv = argv; // We have to copy argv, since getopt_long may change its content. mod_config()->argc = argc; mod_config()->argv = new char *[argc]; for (int i = 0; i < argc; ++i) { mod_config()->argv[i] = strdup(argv[i]); if (mod_config()->argv[i] == nullptr) { auto error = errno; LOG(FATAL) << "failed to copy argv: " << strerror(error); exit(EXIT_FAILURE); } } mod_config()->cwd = getcwd(nullptr, 0); if (mod_config()->cwd == nullptr) { auto error = errno; LOG(FATAL) << "failed to get current working directory: errno=" << error; exit(EXIT_FAILURE); } std::vector> cmdcfgs; while (1) { static int flag = 0; static option long_options[] = { {SHRPX_OPT_DAEMON.c_str(), no_argument, nullptr, 'D'}, {SHRPX_OPT_LOG_LEVEL.c_str(), required_argument, nullptr, 'L'}, {SHRPX_OPT_BACKEND.c_str(), required_argument, nullptr, 'b'}, {SHRPX_OPT_HTTP2_MAX_CONCURRENT_STREAMS.c_str(), required_argument, nullptr, 'c'}, {SHRPX_OPT_FRONTEND.c_str(), required_argument, nullptr, 'f'}, {"help", no_argument, nullptr, 'h'}, {SHRPX_OPT_INSECURE.c_str(), no_argument, nullptr, 'k'}, {SHRPX_OPT_WORKERS.c_str(), required_argument, nullptr, 'n'}, {SHRPX_OPT_CLIENT_PROXY.c_str(), no_argument, nullptr, 'p'}, {SHRPX_OPT_HTTP2_PROXY.c_str(), no_argument, nullptr, 's'}, {"version", no_argument, nullptr, 'v'}, {SHRPX_OPT_FRONTEND_FRAME_DEBUG.c_str(), no_argument, nullptr, 'o'}, {SHRPX_OPT_ADD_X_FORWARDED_FOR.c_str(), no_argument, &flag, 1}, {SHRPX_OPT_FRONTEND_HTTP2_READ_TIMEOUT.c_str(), required_argument, &flag, 2}, {SHRPX_OPT_FRONTEND_READ_TIMEOUT.c_str(), required_argument, &flag, 3}, {SHRPX_OPT_FRONTEND_WRITE_TIMEOUT.c_str(), required_argument, &flag, 4}, {SHRPX_OPT_BACKEND_READ_TIMEOUT.c_str(), required_argument, &flag, 5}, {SHRPX_OPT_BACKEND_WRITE_TIMEOUT.c_str(), required_argument, &flag, 6}, {SHRPX_OPT_ACCESSLOG_FILE.c_str(), required_argument, &flag, 7}, {SHRPX_OPT_BACKEND_KEEP_ALIVE_TIMEOUT.c_str(), required_argument, &flag, 8}, {SHRPX_OPT_FRONTEND_HTTP2_WINDOW_BITS.c_str(), required_argument, &flag, 9}, {SHRPX_OPT_PID_FILE.c_str(), required_argument, &flag, 10}, {SHRPX_OPT_USER.c_str(), required_argument, &flag, 11}, {"conf", required_argument, &flag, 12}, {SHRPX_OPT_SYSLOG_FACILITY.c_str(), required_argument, &flag, 14}, {SHRPX_OPT_BACKLOG.c_str(), required_argument, &flag, 15}, {SHRPX_OPT_CIPHERS.c_str(), required_argument, &flag, 16}, {SHRPX_OPT_CLIENT.c_str(), no_argument, &flag, 17}, {SHRPX_OPT_BACKEND_HTTP2_WINDOW_BITS.c_str(), required_argument, &flag, 18}, {SHRPX_OPT_CACERT.c_str(), required_argument, &flag, 19}, {SHRPX_OPT_BACKEND_IPV4.c_str(), no_argument, &flag, 20}, {SHRPX_OPT_BACKEND_IPV6.c_str(), no_argument, &flag, 21}, {SHRPX_OPT_PRIVATE_KEY_PASSWD_FILE.c_str(), required_argument, &flag, 22}, {SHRPX_OPT_NO_VIA.c_str(), no_argument, &flag, 23}, {SHRPX_OPT_SUBCERT.c_str(), required_argument, &flag, 24}, {SHRPX_OPT_HTTP2_BRIDGE.c_str(), no_argument, &flag, 25}, {SHRPX_OPT_BACKEND_HTTP_PROXY_URI.c_str(), required_argument, &flag, 26}, {SHRPX_OPT_BACKEND_NO_TLS.c_str(), no_argument, &flag, 27}, {SHRPX_OPT_FRONTEND_NO_TLS.c_str(), no_argument, &flag, 29}, {SHRPX_OPT_BACKEND_TLS_SNI_FIELD.c_str(), required_argument, &flag, 31}, {SHRPX_OPT_DH_PARAM_FILE.c_str(), required_argument, &flag, 33}, {SHRPX_OPT_READ_RATE.c_str(), required_argument, &flag, 34}, {SHRPX_OPT_READ_BURST.c_str(), required_argument, &flag, 35}, {SHRPX_OPT_WRITE_RATE.c_str(), required_argument, &flag, 36}, {SHRPX_OPT_WRITE_BURST.c_str(), required_argument, &flag, 37}, {SHRPX_OPT_NPN_LIST.c_str(), required_argument, &flag, 38}, {SHRPX_OPT_VERIFY_CLIENT.c_str(), no_argument, &flag, 39}, {SHRPX_OPT_VERIFY_CLIENT_CACERT.c_str(), required_argument, &flag, 40}, {SHRPX_OPT_CLIENT_PRIVATE_KEY_FILE.c_str(), required_argument, &flag, 41}, {SHRPX_OPT_CLIENT_CERT_FILE.c_str(), required_argument, &flag, 42}, {SHRPX_OPT_FRONTEND_HTTP2_DUMP_REQUEST_HEADER.c_str(), required_argument, &flag, 43}, {SHRPX_OPT_FRONTEND_HTTP2_DUMP_RESPONSE_HEADER.c_str(), required_argument, &flag, 44}, {SHRPX_OPT_HTTP2_NO_COOKIE_CRUMBLING.c_str(), no_argument, &flag, 45}, {SHRPX_OPT_FRONTEND_HTTP2_CONNECTION_WINDOW_BITS.c_str(), required_argument, &flag, 46}, {SHRPX_OPT_BACKEND_HTTP2_CONNECTION_WINDOW_BITS.c_str(), required_argument, &flag, 47}, {SHRPX_OPT_TLS_PROTO_LIST.c_str(), required_argument, &flag, 48}, {SHRPX_OPT_PADDING.c_str(), required_argument, &flag, 49}, {SHRPX_OPT_WORKER_READ_RATE.c_str(), required_argument, &flag, 50}, {SHRPX_OPT_WORKER_READ_BURST.c_str(), required_argument, &flag, 51}, {SHRPX_OPT_WORKER_WRITE_RATE.c_str(), required_argument, &flag, 52}, {SHRPX_OPT_WORKER_WRITE_BURST.c_str(), required_argument, &flag, 53}, {SHRPX_OPT_ALTSVC.c_str(), required_argument, &flag, 54}, {SHRPX_OPT_ADD_RESPONSE_HEADER.c_str(), required_argument, &flag, 55}, {SHRPX_OPT_WORKER_FRONTEND_CONNECTIONS.c_str(), required_argument, &flag, 56}, {SHRPX_OPT_ACCESSLOG_SYSLOG.c_str(), no_argument, &flag, 57}, {SHRPX_OPT_ERRORLOG_FILE.c_str(), required_argument, &flag, 58}, {SHRPX_OPT_ERRORLOG_SYSLOG.c_str(), no_argument, &flag, 59}, {SHRPX_OPT_STREAM_READ_TIMEOUT.c_str(), required_argument, &flag, 60}, {SHRPX_OPT_STREAM_WRITE_TIMEOUT.c_str(), required_argument, &flag, 61}, {SHRPX_OPT_NO_LOCATION_REWRITE.c_str(), no_argument, &flag, 62}, {SHRPX_OPT_BACKEND_HTTP1_CONNECTIONS_PER_HOST.c_str(), required_argument, &flag, 63}, {SHRPX_OPT_LISTENER_DISABLE_TIMEOUT.c_str(), required_argument, &flag, 64}, {SHRPX_OPT_STRIP_INCOMING_X_FORWARDED_FOR.c_str(), no_argument, &flag, 65}, {SHRPX_OPT_ACCESSLOG_FORMAT.c_str(), required_argument, &flag, 66}, {SHRPX_OPT_BACKEND_HTTP1_CONNECTIONS_PER_FRONTEND.c_str(), required_argument, &flag, 67}, {SHRPX_OPT_TLS_TICKET_KEY_FILE.c_str(), required_argument, &flag, 68}, {SHRPX_OPT_RLIMIT_NOFILE.c_str(), required_argument, &flag, 69}, {SHRPX_OPT_BACKEND_RESPONSE_BUFFER.c_str(), required_argument, &flag, 71}, {SHRPX_OPT_BACKEND_REQUEST_BUFFER.c_str(), required_argument, &flag, 72}, {SHRPX_OPT_NO_HOST_REWRITE.c_str(), no_argument, &flag, 73}, {SHRPX_OPT_NO_SERVER_PUSH.c_str(), no_argument, &flag, 74}, {SHRPX_OPT_BACKEND_HTTP2_CONNECTIONS_PER_WORKER.c_str(), required_argument, &flag, 76}, {SHRPX_OPT_FETCH_OCSP_RESPONSE_FILE.c_str(), required_argument, &flag, 77}, {SHRPX_OPT_OCSP_UPDATE_INTERVAL.c_str(), required_argument, &flag, 78}, {SHRPX_OPT_NO_OCSP.c_str(), no_argument, &flag, 79}, {SHRPX_OPT_HEADER_FIELD_BUFFER.c_str(), required_argument, &flag, 80}, {SHRPX_OPT_MAX_HEADER_FIELDS.c_str(), required_argument, &flag, 81}, {SHRPX_OPT_ADD_REQUEST_HEADER.c_str(), required_argument, &flag, 82}, {SHRPX_OPT_INCLUDE.c_str(), required_argument, &flag, 83}, {SHRPX_OPT_TLS_TICKET_KEY_CIPHER.c_str(), required_argument, &flag, 84}, {SHRPX_OPT_HOST_REWRITE.c_str(), no_argument, &flag, 85}, {SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED.c_str(), required_argument, &flag, 86}, {SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED.c_str(), required_argument, &flag, 87}, {SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_INTERVAL.c_str(), required_argument, &flag, 88}, {SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_MAX_RETRY.c_str(), required_argument, &flag, 89}, {SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_MAX_FAIL.c_str(), required_argument, &flag, 90}, {SHRPX_OPT_MRUBY_FILE.c_str(), required_argument, &flag, 91}, {SHRPX_OPT_ACCEPT_PROXY_PROTOCOL.c_str(), no_argument, &flag, 93}, {SHRPX_OPT_FASTOPEN.c_str(), required_argument, &flag, 94}, {SHRPX_OPT_TLS_DYN_REC_WARMUP_THRESHOLD.c_str(), required_argument, &flag, 95}, {SHRPX_OPT_TLS_DYN_REC_IDLE_TIMEOUT.c_str(), required_argument, &flag, 96}, {SHRPX_OPT_ADD_FORWARDED.c_str(), required_argument, &flag, 97}, {SHRPX_OPT_STRIP_INCOMING_FORWARDED.c_str(), no_argument, &flag, 98}, {SHRPX_OPT_FORWARDED_BY.c_str(), required_argument, &flag, 99}, {SHRPX_OPT_FORWARDED_FOR.c_str(), required_argument, &flag, 100}, {SHRPX_OPT_RESPONSE_HEADER_FIELD_BUFFER.c_str(), required_argument, &flag, 101}, {SHRPX_OPT_MAX_RESPONSE_HEADER_FIELDS.c_str(), required_argument, &flag, 102}, {SHRPX_OPT_NO_HTTP2_CIPHER_BLACK_LIST.c_str(), no_argument, &flag, 103}, {SHRPX_OPT_REQUEST_HEADER_FIELD_BUFFER.c_str(), required_argument, &flag, 104}, {SHRPX_OPT_MAX_REQUEST_HEADER_FIELDS.c_str(), required_argument, &flag, 105}, {SHRPX_OPT_BACKEND_HTTP1_TLS.c_str(), no_argument, &flag, 106}, {SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED_TLS.c_str(), no_argument, &flag, 108}, {SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED_CERT_FILE.c_str(), required_argument, &flag, 109}, {SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED_PRIVATE_KEY_FILE.c_str(), required_argument, &flag, 110}, {SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_TLS.c_str(), no_argument, &flag, 111}, {SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_CERT_FILE.c_str(), required_argument, &flag, 112}, {SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_PRIVATE_KEY_FILE.c_str(), required_argument, &flag, 113}, {SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_ADDRESS_FAMILY.c_str(), required_argument, &flag, 114}, {SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED_ADDRESS_FAMILY.c_str(), required_argument, &flag, 115}, {SHRPX_OPT_BACKEND_ADDRESS_FAMILY.c_str(), required_argument, &flag, 116}, {SHRPX_OPT_FRONTEND_HTTP2_MAX_CONCURRENT_STREAMS.c_str(), required_argument, &flag, 117}, {SHRPX_OPT_BACKEND_HTTP2_MAX_CONCURRENT_STREAMS.c_str(), required_argument, &flag, 118}, {SHRPX_OPT_BACKEND_CONNECTIONS_PER_FRONTEND.c_str(), required_argument, &flag, 119}, {SHRPX_OPT_BACKEND_TLS.c_str(), no_argument, &flag, 120}, {SHRPX_OPT_BACKEND_CONNECTIONS_PER_HOST.c_str(), required_argument, &flag, 121}, {SHRPX_OPT_ERROR_PAGE.c_str(), required_argument, &flag, 122}, {SHRPX_OPT_NO_KQUEUE.c_str(), no_argument, &flag, 123}, {SHRPX_OPT_FRONTEND_HTTP2_SETTINGS_TIMEOUT.c_str(), required_argument, &flag, 124}, {SHRPX_OPT_BACKEND_HTTP2_SETTINGS_TIMEOUT.c_str(), required_argument, &flag, 125}, {SHRPX_OPT_API_MAX_REQUEST_BODY.c_str(), required_argument, &flag, 126}, {nullptr, 0, nullptr, 0}}; int option_index = 0; int c = getopt_long(argc, argv, "DL:b:c:f:hkn:opsv", long_options, &option_index); if (c == -1) { break; } switch (c) { case 'D': cmdcfgs.emplace_back(SHRPX_OPT_DAEMON, StringRef::from_lit("yes")); break; case 'L': cmdcfgs.emplace_back(SHRPX_OPT_LOG_LEVEL, StringRef{optarg}); break; case 'b': cmdcfgs.emplace_back(SHRPX_OPT_BACKEND, StringRef{optarg}); break; case 'c': cmdcfgs.emplace_back(SHRPX_OPT_HTTP2_MAX_CONCURRENT_STREAMS, StringRef{optarg}); break; case 'f': cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND, StringRef{optarg}); break; case 'h': print_help(std::cout); exit(EXIT_SUCCESS); case 'k': cmdcfgs.emplace_back(SHRPX_OPT_INSECURE, StringRef::from_lit("yes")); break; case 'n': cmdcfgs.emplace_back(SHRPX_OPT_WORKERS, StringRef{optarg}); break; case 'o': cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_FRAME_DEBUG, StringRef::from_lit("yes")); break; case 'p': cmdcfgs.emplace_back(SHRPX_OPT_CLIENT_PROXY, StringRef::from_lit("yes")); break; case 's': cmdcfgs.emplace_back(SHRPX_OPT_HTTP2_PROXY, StringRef::from_lit("yes")); break; case 'v': print_version(std::cout); exit(EXIT_SUCCESS); case '?': util::show_candidates(argv[optind - 1], long_options); exit(EXIT_FAILURE); case 0: switch (flag) { case 1: // --add-x-forwarded-for cmdcfgs.emplace_back(SHRPX_OPT_ADD_X_FORWARDED_FOR, StringRef::from_lit("yes")); break; case 2: // --frontend-http2-read-timeout cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_READ_TIMEOUT, StringRef{optarg}); break; case 3: // --frontend-read-timeout cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_READ_TIMEOUT, StringRef{optarg}); break; case 4: // --frontend-write-timeout cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_WRITE_TIMEOUT, StringRef{optarg}); break; case 5: // --backend-read-timeout cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_READ_TIMEOUT, StringRef{optarg}); break; case 6: // --backend-write-timeout cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_WRITE_TIMEOUT, StringRef{optarg}); break; case 7: cmdcfgs.emplace_back(SHRPX_OPT_ACCESSLOG_FILE, StringRef{optarg}); break; case 8: // --backend-keep-alive-timeout cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_KEEP_ALIVE_TIMEOUT, StringRef{optarg}); break; case 9: // --frontend-http2-window-bits cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_WINDOW_BITS, StringRef{optarg}); break; case 10: cmdcfgs.emplace_back(SHRPX_OPT_PID_FILE, StringRef{optarg}); break; case 11: cmdcfgs.emplace_back(SHRPX_OPT_USER, StringRef{optarg}); break; case 12: // --conf mod_config()->conf_path = optarg; break; case 14: // --syslog-facility cmdcfgs.emplace_back(SHRPX_OPT_SYSLOG_FACILITY, StringRef{optarg}); break; case 15: // --backlog cmdcfgs.emplace_back(SHRPX_OPT_BACKLOG, StringRef{optarg}); break; case 16: // --ciphers cmdcfgs.emplace_back(SHRPX_OPT_CIPHERS, StringRef{optarg}); break; case 17: // --client cmdcfgs.emplace_back(SHRPX_OPT_CLIENT, StringRef::from_lit("yes")); break; case 18: // --backend-http2-window-bits cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP2_WINDOW_BITS, StringRef{optarg}); break; case 19: // --cacert cmdcfgs.emplace_back(SHRPX_OPT_CACERT, StringRef{optarg}); break; case 20: // --backend-ipv4 cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_IPV4, StringRef::from_lit("yes")); break; case 21: // --backend-ipv6 cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_IPV6, StringRef::from_lit("yes")); break; case 22: // --private-key-passwd-file cmdcfgs.emplace_back(SHRPX_OPT_PRIVATE_KEY_PASSWD_FILE, StringRef{optarg}); break; case 23: // --no-via cmdcfgs.emplace_back(SHRPX_OPT_NO_VIA, StringRef::from_lit("yes")); break; case 24: // --subcert cmdcfgs.emplace_back(SHRPX_OPT_SUBCERT, StringRef{optarg}); break; case 25: // --http2-bridge cmdcfgs.emplace_back(SHRPX_OPT_HTTP2_BRIDGE, StringRef::from_lit("yes")); break; case 26: // --backend-http-proxy-uri cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP_PROXY_URI, StringRef{optarg}); break; case 27: // --backend-no-tls cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_NO_TLS, StringRef::from_lit("yes")); break; case 29: // --frontend-no-tls cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_NO_TLS, StringRef::from_lit("yes")); break; case 31: // --backend-tls-sni-field cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_TLS_SNI_FIELD, StringRef{optarg}); break; case 33: // --dh-param-file cmdcfgs.emplace_back(SHRPX_OPT_DH_PARAM_FILE, StringRef{optarg}); break; case 34: // --read-rate cmdcfgs.emplace_back(SHRPX_OPT_READ_RATE, StringRef{optarg}); break; case 35: // --read-burst cmdcfgs.emplace_back(SHRPX_OPT_READ_BURST, StringRef{optarg}); break; case 36: // --write-rate cmdcfgs.emplace_back(SHRPX_OPT_WRITE_RATE, StringRef{optarg}); break; case 37: // --write-burst cmdcfgs.emplace_back(SHRPX_OPT_WRITE_BURST, StringRef{optarg}); break; case 38: // --npn-list cmdcfgs.emplace_back(SHRPX_OPT_NPN_LIST, StringRef{optarg}); break; case 39: // --verify-client cmdcfgs.emplace_back(SHRPX_OPT_VERIFY_CLIENT, StringRef::from_lit("yes")); break; case 40: // --verify-client-cacert cmdcfgs.emplace_back(SHRPX_OPT_VERIFY_CLIENT_CACERT, StringRef{optarg}); break; case 41: // --client-private-key-file cmdcfgs.emplace_back(SHRPX_OPT_CLIENT_PRIVATE_KEY_FILE, StringRef{optarg}); break; case 42: // --client-cert-file cmdcfgs.emplace_back(SHRPX_OPT_CLIENT_CERT_FILE, StringRef{optarg}); break; case 43: // --frontend-http2-dump-request-header cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_DUMP_REQUEST_HEADER, StringRef{optarg}); break; case 44: // --frontend-http2-dump-response-header cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_DUMP_RESPONSE_HEADER, StringRef{optarg}); break; case 45: // --http2-no-cookie-crumbling cmdcfgs.emplace_back(SHRPX_OPT_HTTP2_NO_COOKIE_CRUMBLING, StringRef::from_lit("yes")); break; case 46: // --frontend-http2-connection-window-bits cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_CONNECTION_WINDOW_BITS, StringRef{optarg}); break; case 47: // --backend-http2-connection-window-bits cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP2_CONNECTION_WINDOW_BITS, StringRef{optarg}); break; case 48: // --tls-proto-list cmdcfgs.emplace_back(SHRPX_OPT_TLS_PROTO_LIST, StringRef{optarg}); break; case 49: // --padding cmdcfgs.emplace_back(SHRPX_OPT_PADDING, StringRef{optarg}); break; case 50: // --worker-read-rate cmdcfgs.emplace_back(SHRPX_OPT_WORKER_READ_RATE, StringRef{optarg}); break; case 51: // --worker-read-burst cmdcfgs.emplace_back(SHRPX_OPT_WORKER_READ_BURST, StringRef{optarg}); break; case 52: // --worker-write-rate cmdcfgs.emplace_back(SHRPX_OPT_WORKER_WRITE_RATE, StringRef{optarg}); break; case 53: // --worker-write-burst cmdcfgs.emplace_back(SHRPX_OPT_WORKER_WRITE_BURST, StringRef{optarg}); break; case 54: // --altsvc cmdcfgs.emplace_back(SHRPX_OPT_ALTSVC, StringRef{optarg}); break; case 55: // --add-response-header cmdcfgs.emplace_back(SHRPX_OPT_ADD_RESPONSE_HEADER, StringRef{optarg}); break; case 56: // --worker-frontend-connections cmdcfgs.emplace_back(SHRPX_OPT_WORKER_FRONTEND_CONNECTIONS, StringRef{optarg}); break; case 57: // --accesslog-syslog cmdcfgs.emplace_back(SHRPX_OPT_ACCESSLOG_SYSLOG, StringRef::from_lit("yes")); break; case 58: // --errorlog-file cmdcfgs.emplace_back(SHRPX_OPT_ERRORLOG_FILE, StringRef{optarg}); break; case 59: // --errorlog-syslog cmdcfgs.emplace_back(SHRPX_OPT_ERRORLOG_SYSLOG, StringRef::from_lit("yes")); break; case 60: // --stream-read-timeout cmdcfgs.emplace_back(SHRPX_OPT_STREAM_READ_TIMEOUT, StringRef{optarg}); break; case 61: // --stream-write-timeout cmdcfgs.emplace_back(SHRPX_OPT_STREAM_WRITE_TIMEOUT, StringRef{optarg}); break; case 62: // --no-location-rewrite cmdcfgs.emplace_back(SHRPX_OPT_NO_LOCATION_REWRITE, StringRef::from_lit("yes")); break; case 63: // --backend-http1-connections-per-host cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP1_CONNECTIONS_PER_HOST, StringRef{optarg}); break; case 64: // --listener-disable-timeout cmdcfgs.emplace_back(SHRPX_OPT_LISTENER_DISABLE_TIMEOUT, StringRef{optarg}); break; case 65: // --strip-incoming-x-forwarded-for cmdcfgs.emplace_back(SHRPX_OPT_STRIP_INCOMING_X_FORWARDED_FOR, StringRef::from_lit("yes")); break; case 66: // --accesslog-format cmdcfgs.emplace_back(SHRPX_OPT_ACCESSLOG_FORMAT, StringRef{optarg}); break; case 67: // --backend-http1-connections-per-frontend cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP1_CONNECTIONS_PER_FRONTEND, StringRef{optarg}); break; case 68: // --tls-ticket-key-file cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_FILE, StringRef{optarg}); break; case 69: // --rlimit-nofile cmdcfgs.emplace_back(SHRPX_OPT_RLIMIT_NOFILE, StringRef{optarg}); break; case 71: // --backend-response-buffer cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_RESPONSE_BUFFER, StringRef{optarg}); break; case 72: // --backend-request-buffer cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_REQUEST_BUFFER, StringRef{optarg}); break; case 73: // --no-host-rewrite cmdcfgs.emplace_back(SHRPX_OPT_NO_HOST_REWRITE, StringRef::from_lit("yes")); break; case 74: // --no-server-push cmdcfgs.emplace_back(SHRPX_OPT_NO_SERVER_PUSH, StringRef::from_lit("yes")); break; case 76: // --backend-http2-connections-per-worker cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP2_CONNECTIONS_PER_WORKER, StringRef{optarg}); break; case 77: // --fetch-ocsp-response-file cmdcfgs.emplace_back(SHRPX_OPT_FETCH_OCSP_RESPONSE_FILE, StringRef{optarg}); break; case 78: // --ocsp-update-interval cmdcfgs.emplace_back(SHRPX_OPT_OCSP_UPDATE_INTERVAL, StringRef{optarg}); break; case 79: // --no-ocsp cmdcfgs.emplace_back(SHRPX_OPT_NO_OCSP, StringRef::from_lit("yes")); break; case 80: // --header-field-buffer cmdcfgs.emplace_back(SHRPX_OPT_HEADER_FIELD_BUFFER, StringRef{optarg}); break; case 81: // --max-header-fields cmdcfgs.emplace_back(SHRPX_OPT_MAX_HEADER_FIELDS, StringRef{optarg}); break; case 82: // --add-request-header cmdcfgs.emplace_back(SHRPX_OPT_ADD_REQUEST_HEADER, StringRef{optarg}); break; case 83: // --include cmdcfgs.emplace_back(SHRPX_OPT_INCLUDE, StringRef{optarg}); break; case 84: // --tls-ticket-key-cipher cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_CIPHER, StringRef{optarg}); break; case 85: // --host-rewrite cmdcfgs.emplace_back(SHRPX_OPT_HOST_REWRITE, StringRef::from_lit("yes")); break; case 86: // --tls-session-cache-memcached cmdcfgs.emplace_back(SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED, StringRef{optarg}); break; case 87: // --tls-ticket-key-memcached cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED, StringRef{optarg}); break; case 88: // --tls-ticket-key-memcached-interval cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_INTERVAL, StringRef{optarg}); break; case 89: // --tls-ticket-key-memcached-max-retry cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_MAX_RETRY, StringRef{optarg}); break; case 90: // --tls-ticket-key-memcached-max-fail cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_MAX_FAIL, StringRef{optarg}); break; case 91: // --mruby-file cmdcfgs.emplace_back(SHRPX_OPT_MRUBY_FILE, StringRef{optarg}); break; case 93: // --accept-proxy-protocol cmdcfgs.emplace_back(SHRPX_OPT_ACCEPT_PROXY_PROTOCOL, StringRef::from_lit("yes")); break; case 94: // --fastopen cmdcfgs.emplace_back(SHRPX_OPT_FASTOPEN, StringRef{optarg}); break; case 95: // --tls-dyn-rec-warmup-threshold cmdcfgs.emplace_back(SHRPX_OPT_TLS_DYN_REC_WARMUP_THRESHOLD, StringRef{optarg}); break; case 96: // --tls-dyn-rec-idle-timeout cmdcfgs.emplace_back(SHRPX_OPT_TLS_DYN_REC_IDLE_TIMEOUT, StringRef{optarg}); break; case 97: // --add-forwarded cmdcfgs.emplace_back(SHRPX_OPT_ADD_FORWARDED, StringRef{optarg}); break; case 98: // --strip-incoming-forwarded cmdcfgs.emplace_back(SHRPX_OPT_STRIP_INCOMING_FORWARDED, StringRef::from_lit("yes")); break; case 99: // --forwarded-by cmdcfgs.emplace_back(SHRPX_OPT_FORWARDED_BY, StringRef{optarg}); break; case 100: // --forwarded-for cmdcfgs.emplace_back(SHRPX_OPT_FORWARDED_FOR, StringRef{optarg}); break; case 101: // --response-header-field-buffer cmdcfgs.emplace_back(SHRPX_OPT_RESPONSE_HEADER_FIELD_BUFFER, StringRef{optarg}); break; case 102: // --max-response-header-fields cmdcfgs.emplace_back(SHRPX_OPT_MAX_RESPONSE_HEADER_FIELDS, StringRef{optarg}); break; case 103: // --no-http2-cipher-black-list cmdcfgs.emplace_back(SHRPX_OPT_NO_HTTP2_CIPHER_BLACK_LIST, StringRef::from_lit("yes")); break; case 104: // --request-header-field-buffer cmdcfgs.emplace_back(SHRPX_OPT_REQUEST_HEADER_FIELD_BUFFER, StringRef{optarg}); break; case 105: // --max-request-header-fields cmdcfgs.emplace_back(SHRPX_OPT_MAX_REQUEST_HEADER_FIELDS, StringRef{optarg}); break; case 106: // --backend-http1-tls cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP1_TLS, StringRef::from_lit("yes")); break; case 108: // --tls-session-cache-memcached-tls cmdcfgs.emplace_back(SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED_TLS, StringRef::from_lit("yes")); break; case 109: // --tls-session-cache-memcached-cert-file cmdcfgs.emplace_back(SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED_CERT_FILE, StringRef{optarg}); break; case 110: // --tls-session-cache-memcached-private-key-file cmdcfgs.emplace_back( SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED_PRIVATE_KEY_FILE, StringRef{optarg}); break; case 111: // --tls-ticket-key-memcached-tls cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_TLS, StringRef::from_lit("yes")); break; case 112: // --tls-ticket-key-memcached-cert-file cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_CERT_FILE, StringRef{optarg}); break; case 113: // --tls-ticket-key-memcached-private-key-file cmdcfgs.emplace_back( SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_PRIVATE_KEY_FILE, StringRef{optarg}); break; case 114: // --tls-ticket-key-memcached-address-family cmdcfgs.emplace_back(SHRPX_OPT_TLS_TICKET_KEY_MEMCACHED_ADDRESS_FAMILY, StringRef{optarg}); break; case 115: // --tls-session-cache-memcached-address-family cmdcfgs.emplace_back( SHRPX_OPT_TLS_SESSION_CACHE_MEMCACHED_ADDRESS_FAMILY, StringRef{optarg}); break; case 116: // --backend-address-family cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_ADDRESS_FAMILY, StringRef{optarg}); break; case 117: // --frontend-http2-max-concurrent-streams cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_MAX_CONCURRENT_STREAMS, StringRef{optarg}); break; case 118: // --backend-http2-max-concurrent-streams cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP2_MAX_CONCURRENT_STREAMS, StringRef{optarg}); break; case 119: // --backend-connections-per-frontend cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_CONNECTIONS_PER_FRONTEND, StringRef{optarg}); break; case 120: // --backend-tls cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_TLS, StringRef::from_lit("yes")); break; case 121: // --backend-connections-per-host cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_CONNECTIONS_PER_HOST, StringRef{optarg}); break; case 122: // --error-page cmdcfgs.emplace_back(SHRPX_OPT_ERROR_PAGE, StringRef{optarg}); break; case 123: // --no-kqueue cmdcfgs.emplace_back(SHRPX_OPT_NO_KQUEUE, StringRef::from_lit("yes")); break; case 124: // --frontend-http2-settings-timeout cmdcfgs.emplace_back(SHRPX_OPT_FRONTEND_HTTP2_SETTINGS_TIMEOUT, StringRef{optarg}); break; case 125: // --backend-http2-settings-timeout cmdcfgs.emplace_back(SHRPX_OPT_BACKEND_HTTP2_SETTINGS_TIMEOUT, StringRef{optarg}); break; case 126: // --api-max-request-body cmdcfgs.emplace_back(SHRPX_OPT_API_MAX_REQUEST_BODY, StringRef{optarg}); break; default: break; } break; default: break; } } process_options(argc, argv, cmdcfgs); if (event_loop() != 0) { return -1; } LOG(NOTICE) << "Shutdown momentarily"; delete log_config(); return 0; } } // namespace shrpx int main(int argc, char **argv) { return run_app(shrpx::main, argc, argv); }