mirror of
https://github.com/moparisthebest/spdylay
synced 2024-11-14 05:25:07 -05:00
284 lines
7.4 KiB
C++
284 lines
7.4 KiB
C++
/*
|
|
* Spdylay - SPDY Library
|
|
*
|
|
* Copyright (c) 2012 Tatsuhiro Tsujikawa
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
* a copy of this software and associated documentation files (the
|
|
* "Software"), to deal in the Software without restriction, including
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
* the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be
|
|
* included in all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*/
|
|
#include "shrpx_client_handler.h"
|
|
|
|
#include <unistd.h>
|
|
#include <cerrno>
|
|
|
|
#include "shrpx_upstream.h"
|
|
#include "shrpx_spdy_upstream.h"
|
|
#include "shrpx_https_upstream.h"
|
|
#include "shrpx_config.h"
|
|
#include "shrpx_downstream_connection.h"
|
|
#include "shrpx_accesslog.h"
|
|
|
|
namespace shrpx {
|
|
|
|
namespace {
|
|
void upstream_readcb(bufferevent *bev, void *arg)
|
|
{
|
|
ClientHandler *handler = reinterpret_cast<ClientHandler*>(arg);
|
|
int rv = handler->on_read();
|
|
if(rv != 0) {
|
|
LOG(WARNING) << "<upstream> Read operation (application level) failure";
|
|
delete handler;
|
|
}
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
void upstream_writecb(bufferevent *bev, void *arg)
|
|
{
|
|
ClientHandler *handler = reinterpret_cast<ClientHandler*>(arg);
|
|
// We actually depend on write low-warter mark == 0.
|
|
if(handler->get_should_close_after_write()) {
|
|
delete handler;
|
|
} else {
|
|
Upstream *upstream = handler->get_upstream();
|
|
int rv = upstream->on_write();
|
|
if(rv != 0) {
|
|
LOG(WARNING) << "<upstream> Write operation (application level) failure";
|
|
delete handler;
|
|
}
|
|
}
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
void upstream_eventcb(bufferevent *bev, short events, void *arg)
|
|
{
|
|
ClientHandler *handler = reinterpret_cast<ClientHandler*>(arg);
|
|
bool finish = false;
|
|
if(events & BEV_EVENT_EOF) {
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Upstream EOF";
|
|
}
|
|
finish = true;
|
|
}
|
|
if(events & BEV_EVENT_ERROR) {
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Upstream network error: "
|
|
<< evutil_socket_error_to_string(EVUTIL_SOCKET_ERROR());
|
|
}
|
|
finish = true;
|
|
}
|
|
if(events & BEV_EVENT_TIMEOUT) {
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Upstream time out";
|
|
}
|
|
finish = true;
|
|
}
|
|
if(finish) {
|
|
delete handler;
|
|
} else {
|
|
if(events & BEV_EVENT_CONNECTED) {
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Upstream connected. handler " << handler;
|
|
}
|
|
if(get_config()->accesslog) {
|
|
upstream_connect(handler->get_ipaddr());
|
|
}
|
|
handler->set_bev_cb(upstream_readcb, upstream_writecb, upstream_eventcb);
|
|
handler->validate_next_proto();
|
|
if(ENABLE_LOG) {
|
|
if(SSL_session_reused(handler->get_ssl())) {
|
|
LOG(INFO) << "SSL/TLS session reused";
|
|
}
|
|
}
|
|
// At this point, input buffer is already filled with some
|
|
// bytes. The read callback is not called until new data
|
|
// come. So consume input buffer here.
|
|
handler->get_upstream()->on_read();
|
|
}
|
|
}
|
|
}
|
|
} // namespace
|
|
|
|
ClientHandler::ClientHandler(bufferevent *bev, SSL *ssl, const char *ipaddr)
|
|
: bev_(bev),
|
|
ssl_(ssl),
|
|
upstream_(0),
|
|
ipaddr_(ipaddr),
|
|
should_close_after_write_(false)
|
|
{
|
|
bufferevent_enable(bev_, EV_READ | EV_WRITE);
|
|
bufferevent_setwatermark(bev_, EV_READ, 0, SHRPX_READ_WARTER_MARK);
|
|
set_upstream_timeouts(&get_config()->upstream_read_timeout,
|
|
&get_config()->upstream_write_timeout);
|
|
set_bev_cb(0, upstream_writecb, upstream_eventcb);
|
|
}
|
|
|
|
ClientHandler::~ClientHandler()
|
|
{
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Deleting ClientHandler " << this;
|
|
}
|
|
int fd = SSL_get_fd(ssl_);
|
|
SSL_shutdown(ssl_);
|
|
bufferevent_disable(bev_, EV_READ | EV_WRITE);
|
|
bufferevent_free(bev_);
|
|
SSL_free(ssl_);
|
|
shutdown(fd, SHUT_WR);
|
|
close(fd);
|
|
delete upstream_;
|
|
for(std::set<DownstreamConnection*>::iterator i = dconn_pool_.begin();
|
|
i != dconn_pool_.end(); ++i) {
|
|
delete *i;
|
|
}
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Deleted";
|
|
}
|
|
}
|
|
|
|
Upstream* ClientHandler::get_upstream()
|
|
{
|
|
return upstream_;
|
|
}
|
|
|
|
bufferevent* ClientHandler::get_bev() const
|
|
{
|
|
return bev_;
|
|
}
|
|
|
|
event_base* ClientHandler::get_evbase() const
|
|
{
|
|
return bufferevent_get_base(bev_);
|
|
}
|
|
|
|
void ClientHandler::set_bev_cb
|
|
(bufferevent_data_cb readcb, bufferevent_data_cb writecb,
|
|
bufferevent_event_cb eventcb)
|
|
{
|
|
bufferevent_setcb(bev_, readcb, writecb, eventcb, this);
|
|
}
|
|
|
|
void ClientHandler::set_upstream_timeouts(const timeval *read_timeout,
|
|
const timeval *write_timeout)
|
|
{
|
|
bufferevent_set_timeouts(bev_, read_timeout, write_timeout);
|
|
}
|
|
|
|
int ClientHandler::validate_next_proto()
|
|
{
|
|
const unsigned char *next_proto = 0;
|
|
unsigned int next_proto_len;
|
|
SSL_get0_next_proto_negotiated(ssl_, &next_proto, &next_proto_len);
|
|
if(next_proto) {
|
|
std::string proto(next_proto, next_proto+next_proto_len);
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Upstream negotiated next protocol: " << proto;
|
|
}
|
|
uint16_t version = spdylay_npn_get_version(next_proto, next_proto_len);
|
|
if(version) {
|
|
SpdyUpstream *spdy_upstream = new SpdyUpstream(version, this);
|
|
upstream_ = spdy_upstream;
|
|
return 0;
|
|
}
|
|
} else {
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "No proto negotiated.";
|
|
}
|
|
}
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Use HTTP/1.1";
|
|
}
|
|
HttpsUpstream *https_upstream = new HttpsUpstream(this);
|
|
upstream_ = https_upstream;
|
|
return 0;
|
|
}
|
|
|
|
int ClientHandler::on_read()
|
|
{
|
|
return upstream_->on_read();
|
|
}
|
|
|
|
int ClientHandler::on_event()
|
|
{
|
|
return upstream_->on_event();
|
|
}
|
|
|
|
const std::string& ClientHandler::get_ipaddr() const
|
|
{
|
|
return ipaddr_;
|
|
}
|
|
|
|
bool ClientHandler::get_should_close_after_write() const
|
|
{
|
|
return should_close_after_write_;
|
|
}
|
|
|
|
void ClientHandler::set_should_close_after_write(bool f)
|
|
{
|
|
should_close_after_write_ = f;
|
|
}
|
|
|
|
void ClientHandler::pool_downstream_connection(DownstreamConnection *dconn)
|
|
{
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Pooling downstream connection " << dconn;
|
|
}
|
|
dconn_pool_.insert(dconn);
|
|
}
|
|
|
|
void ClientHandler::remove_downstream_connection(DownstreamConnection *dconn)
|
|
{
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Removing downstream connection " << dconn
|
|
<< " from pool";
|
|
}
|
|
dconn_pool_.erase(dconn);
|
|
}
|
|
|
|
DownstreamConnection* ClientHandler::get_downstream_connection()
|
|
{
|
|
if(dconn_pool_.empty()) {
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Downstream connection pool is empty. Create new one";
|
|
}
|
|
return new DownstreamConnection(this);
|
|
} else {
|
|
DownstreamConnection *dconn = *dconn_pool_.begin();
|
|
dconn_pool_.erase(dconn);
|
|
if(ENABLE_LOG) {
|
|
LOG(INFO) << "Reuse downstream connection " << dconn
|
|
<< " from pool";
|
|
}
|
|
return dconn;
|
|
}
|
|
}
|
|
|
|
size_t ClientHandler::get_pending_write_length()
|
|
{
|
|
evbuffer *output = bufferevent_get_output(bev_);
|
|
return evbuffer_get_length(output);
|
|
}
|
|
|
|
SSL* ClientHandler::get_ssl() const
|
|
{
|
|
return ssl_;
|
|
}
|
|
|
|
} // namespace shrpx
|