|  |  | varnish-cache/bin/varnishtest/vtc_http.c | 
|---|
| 0 |  | /*- | 
| 1 |  |  * Copyright (c) 2008-2019 Varnish Software AS | 
| 2 |  |  * All rights reserved. | 
| 3 |  |  * | 
| 4 |  |  * Author: Poul-Henning Kamp <phk@phk.freebsd.dk> | 
| 5 |  |  * | 
| 6 |  |  * SPDX-License-Identifier: BSD-2-Clause | 
| 7 |  |  * | 
| 8 |  |  * Redistribution and use in source and binary forms, with or without | 
| 9 |  |  * modification, are permitted provided that the following conditions | 
| 10 |  |  * are met: | 
| 11 |  |  * 1. Redistributions of source code must retain the above copyright | 
| 12 |  |  *    notice, this list of conditions and the following disclaimer. | 
| 13 |  |  * 2. Redistributions in binary form must reproduce the above copyright | 
| 14 |  |  *    notice, this list of conditions and the following disclaimer in the | 
| 15 |  |  *    documentation and/or other materials provided with the distribution. | 
| 16 |  |  * | 
| 17 |  |  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND | 
| 18 |  |  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 
| 19 |  |  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 
| 20 |  |  * ARE DISCLAIMED.  IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE | 
| 21 |  |  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | 
| 22 |  |  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | 
| 23 |  |  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | 
| 24 |  |  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | 
| 25 |  |  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 
| 26 |  |  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
| 27 |  |  * SUCH DAMAGE. | 
| 28 |  |  */ | 
| 29 |  |  | 
| 30 |  | #include "config.h" | 
| 31 |  |  | 
| 32 |  | #include <sys/socket.h> | 
| 33 |  |  | 
| 34 |  | #include <math.h> | 
| 35 |  | #include <poll.h> | 
| 36 |  | #include <stdio.h> | 
| 37 |  | #include <stdlib.h> | 
| 38 |  | #include <unistd.h> | 
| 39 |  | #include <string.h> | 
| 40 |  |  | 
| 41 |  | #include "vtc.h" | 
| 42 |  | #include "vtc_http.h" | 
| 43 |  |  | 
| 44 |  | #include "vct.h" | 
| 45 |  | #include "vfil.h" | 
| 46 |  | #include "vnum.h" | 
| 47 |  | #include "vrnd.h" | 
| 48 |  | #include "vtcp.h" | 
| 49 |  | #include "vtim.h" | 
| 50 |  | #include "hpack.h" | 
| 51 |  |  | 
| 52 |  | extern const struct cmds http_cmds[]; | 
| 53 |  |  | 
| 54 |  | /* SECTION: client-server client/server | 
| 55 |  |  * | 
| 56 |  |  * Client and server threads are fake HTTP entities used to test your Varnish | 
| 57 |  |  * and VCL. They take any number of arguments, and the one that are not | 
| 58 |  |  * recognized, assuming they don't start with '-', are treated as | 
| 59 |  |  * specifications, laying out the actions to undertake:: | 
| 60 |  |  * | 
| 61 |  |  *         client cNAME [...] | 
| 62 |  |  *         server sNAME [...] | 
| 63 |  |  * | 
| 64 |  |  * Clients and server are identified by a string that's the first argument, | 
| 65 |  |  * clients' names start with 'c' and servers' names start with 's'. | 
| 66 |  |  * | 
| 67 |  |  * As the client and server commands share a good deal of arguments and | 
| 68 |  |  * specification actions, they are grouped in this single section, specific | 
| 69 |  |  * items will be explicitly marked as such. | 
| 70 |  |  * | 
| 71 |  |  * SECTION: client-server.macros Macros and automatic behaviour | 
| 72 |  |  * | 
| 73 |  |  * To make things easier in the general case, clients will connect by default | 
| 74 |  |  * to a Varnish server called v1. To connect to a different Varnish server, use | 
| 75 |  |  * '-connect ${vNAME_sock}'. | 
| 76 |  |  * | 
| 77 |  |  * The -vcl+backend switch of the ``varnish`` command will add all the declared | 
| 78 |  |  * servers as backends. Be careful though, servers will by default listen to | 
| 79 |  |  * the 127.0.0.1 IP and will pick a random port, and publish 3 macros: | 
| 80 |  |  * sNAME_addr, sNAME_port and sNAME_sock, but only once they are started. For | 
| 81 |  |  * 'varnish -vcl+backend' to create the vcl with the correct values, the server | 
| 82 |  |  * must be started first. | 
| 83 |  |  * | 
| 84 |  |  * SECTION: client-server.args Arguments | 
| 85 |  |  * | 
| 86 |  |  * \-start | 
| 87 |  |  *        Start the thread in background, processing the last given | 
| 88 |  |  *        specification. | 
| 89 |  |  * | 
| 90 |  |  * \-wait | 
| 91 |  |  *        Block until the thread finishes. | 
| 92 |  |  * | 
| 93 |  |  * \-run (client only) | 
| 94 |  |  *        Equivalent to "-start -wait". | 
| 95 |  |  * | 
| 96 |  |  * \-repeat NUMBER | 
| 97 |  |  *        Instead of processing the specification only once, do it NUMBER times. | 
| 98 |  |  * | 
| 99 |  |  * \-keepalive | 
| 100 |  |  *        For repeat, do not open new connections but rather run all | 
| 101 |  |  *        iterations in the same connection | 
| 102 |  |  * | 
| 103 |  |  * \-break (server only) | 
| 104 |  |  *        Stop the server. | 
| 105 |  |  * | 
| 106 |  |  * \-listen STRING (server only) | 
| 107 |  |  *        Dictate the listening socket for the server. STRING is of the form | 
| 108 |  |  *        "IP PORT", or "/PATH/TO/SOCKET" for a Unix domain socket. In the | 
| 109 |  |  *        latter case, the path must begin with '/', and the server must be | 
| 110 |  |  *        able to create it. | 
| 111 |  |  * | 
| 112 |  |  * \-connect STRING (client only) | 
| 113 |  |  *        Indicate the server to connect to. STRING is also of the form | 
| 114 |  |  *        "IP PORT", or "/PATH/TO/SOCKET". As with "server -listen", a | 
| 115 |  |  *        Unix domain socket is recognized when STRING begins with a '/'. | 
| 116 |  |  * | 
| 117 |  |  * \-dispatch (server only, s0 only) | 
| 118 |  |  *        Normally, to keep things simple, server threads only handle one | 
| 119 |  |  *        connection at a time, but the -dispatch switch allows to accept | 
| 120 |  |  *        any number of connection and handle them following the given spec. | 
| 121 |  |  * | 
| 122 |  |  *        However, -dispatch is only allowed for the server name "s0". | 
| 123 |  |  * | 
| 124 |  |  * \-proxy1 STRING (client only) | 
| 125 |  |  *        Use the PROXY protocol version 1 for this connection. STRING | 
| 126 |  |  *        is of the form "CLIENTIP:PORT SERVERIP:PORT". | 
| 127 |  |  * | 
| 128 |  |  * \-proxy2 STRING (client only) | 
| 129 |  |  *        Use the PROXY protocol version 2 for this connection. STRING | 
| 130 |  |  *        is of the form "CLIENTIP:PORT SERVERIP:PORT [TLV [TLV ... ]]". | 
| 131 |  |  * | 
| 132 |  |  *        TLV is in the form name=val | 
| 133 |  |  * | 
| 134 |  |  *        name: 0xID or alpn, authority, crc32c, noop, unique_id, netns | 
| 135 |  |  *        val: 0x... or string | 
| 136 |  |  * | 
| 137 |  |  *        ssl is currently not implemented (can be sent as hex) | 
| 138 |  |  * | 
| 139 |  |  * SECTION: client-server.spec Specification | 
| 140 |  |  * | 
| 141 |  |  * It's a string, either double-quoted "like this", but most of the time | 
| 142 |  |  * enclosed in curly brackets, allowing multilining. Write a command per line in | 
| 143 |  |  * it, empty line are ignored, and long line can be wrapped by using a | 
| 144 |  |  * backslash. For example:: | 
| 145 |  |  * | 
| 146 |  |  *     client c1 { | 
| 147 |  |  *         txreq -url /foo \ | 
| 148 |  |  *               -hdr "bar: baz" | 
| 149 |  |  * | 
| 150 |  |  *         rxresp | 
| 151 |  |  *     } -run | 
| 152 |  |  */ | 
| 153 |  |  | 
| 154 |  | #define ONLY_CLIENT(hp, av)                                             \ | 
| 155 |  |         do {                                                            \ | 
| 156 |  |                 if (hp->h2)                                             \ | 
| 157 |  |                         vtc_fatal(hp->vl,                               \ | 
| 158 |  |                             "\"%s\" only possible before H/2 upgrade",  \ | 
| 159 |  |                                         av[0]);                         \ | 
| 160 |  |                 if (hp->sfd != NULL)                                    \ | 
| 161 |  |                         vtc_fatal(hp->vl,                               \ | 
| 162 |  |                             "\"%s\" only possible in client", av[0]);   \ | 
| 163 |  |         } while (0) | 
| 164 |  |  | 
| 165 |  | #define ONLY_SERVER(hp, av)                                             \ | 
| 166 |  |         do {                                                            \ | 
| 167 |  |                 if (hp->h2)                                             \ | 
| 168 |  |                         vtc_fatal(hp->vl,                               \ | 
| 169 |  |                             "\"%s\" only possible before H/2 upgrade",  \ | 
| 170 |  |                                         av[0]);                         \ | 
| 171 |  |                 if (hp->sfd == NULL)                                    \ | 
| 172 |  |                         vtc_fatal(hp->vl,                               \ | 
| 173 |  |                             "\"%s\" only possible in server", av[0]);   \ | 
| 174 |  |         } while (0) | 
| 175 |  |  | 
| 176 |  |  | 
| 177 |  | /* XXX: we may want to vary this */ | 
| 178 |  | static const char * const nl = "\r\n"; | 
| 179 |  |  | 
| 180 |  | /********************************************************************** | 
| 181 |  |  * Generate a synthetic body | 
| 182 |  |  */ | 
| 183 |  |  | 
| 184 |  | char * | 
| 185 | 534 | synth_body(const char *len, int rnd) | 
| 186 |  | { | 
| 187 |  |         int i, j, k, l; | 
| 188 |  |         char *b; | 
| 189 |  |  | 
| 190 |  |  | 
| 191 | 534 |         AN(len); | 
| 192 | 534 |         i = strtoul(len, NULL, 0); | 
| 193 | 534 |         assert(i > 0); | 
| 194 | 534 |         b = malloc(i + 1L); | 
| 195 | 534 |         AN(b); | 
| 196 | 534 |         l = k = '!'; | 
| 197 | 36071296 |         for (j = 0; j < i; j++) { | 
| 198 | 36070762 |                 if ((j % 64) == 63) { | 
| 199 | 563281 |                         b[j] = '\n'; | 
| 200 | 563281 |                         k++; | 
| 201 | 563281 |                         if (k == '~') | 
| 202 | 6005 |                                 k = '!'; | 
| 203 | 563281 |                         l = k; | 
| 204 | 36070762 |                 } else if (rnd) { | 
| 205 | 4128 |                         b[j] = (VRND_RandomTestable() % 95) + ' '; | 
| 206 | 4128 |                 } else { | 
| 207 | 35503353 |                         b[j] = (char)l; | 
| 208 | 35503353 |                         if (++l == '~') | 
| 209 | 380263 |                                 l = '!'; | 
| 210 |  |                 } | 
| 211 | 36070762 |         } | 
| 212 | 534 |         b[i - 1] = '\n'; | 
| 213 | 534 |         b[i] = '\0'; | 
| 214 | 534 |         return (b); | 
| 215 |  | } | 
| 216 |  |  | 
| 217 |  | /********************************************************************** | 
| 218 |  |  * Finish and write the vsb to the fd | 
| 219 |  |  */ | 
| 220 |  |  | 
| 221 |  | static void | 
| 222 | 5652 | http_write(const struct http *hp, int lvl, const char *pfx) | 
| 223 |  | { | 
| 224 |  |  | 
| 225 | 5652 |         AZ(VSB_finish(hp->vsb)); | 
| 226 | 5652 |         vtc_dump(hp->vl, lvl, pfx, VSB_data(hp->vsb), VSB_len(hp->vsb)); | 
| 227 | 5652 |         if (VSB_tofile(hp->vsb, hp->sess->fd)) | 
| 228 | 14 |                 vtc_log(hp->vl, hp->fatal, "Write failed: %s", | 
| 229 | 7 |                     strerror(errno)); | 
| 230 | 5652 | } | 
| 231 |  |  | 
| 232 |  | /********************************************************************** | 
| 233 |  |  * find header | 
| 234 |  |  */ | 
| 235 |  |  | 
| 236 |  | static char * | 
| 237 | 14265 | http_find_header(char * const *hh, const char *hdr) | 
| 238 |  | { | 
| 239 |  |         int n, l; | 
| 240 |  |         char *r; | 
| 241 |  |  | 
| 242 | 14265 |         l = strlen(hdr); | 
| 243 |  |  | 
| 244 | 103961 |         for (n = 3; hh[n] != NULL; n++) { | 
| 245 | 95892 |                 if (strncasecmp(hdr, hh[n], l) || hh[n][l] != ':') | 
| 246 | 89696 |                         continue; | 
| 247 | 12402 |                 for (r = hh[n] + l + 1; vct_issp(*r); r++) | 
| 248 | 6206 |                         continue; | 
| 249 | 6196 |                 return (r); | 
| 250 |  |         } | 
| 251 | 8069 |         return (NULL); | 
| 252 | 14265 | } | 
| 253 |  |  | 
| 254 |  | /********************************************************************** | 
| 255 |  |  * count header | 
| 256 |  |  */ | 
| 257 |  |  | 
| 258 |  | static int | 
| 259 | 5605 | http_count_header(char * const *hh, const char *hdr) | 
| 260 |  | { | 
| 261 | 5605 |         int n, l, r = 0; | 
| 262 |  |  | 
| 263 | 5605 |         l = strlen(hdr); | 
| 264 |  |  | 
| 265 | 44801 |         for (n = 3; hh[n] != NULL; n++) { | 
| 266 | 39196 |                 if (strncasecmp(hdr, hh[n], l) || hh[n][l] != ':') | 
| 267 | 36412 |                         continue; | 
| 268 | 2784 |                 r++; | 
| 269 | 2784 |         } | 
| 270 | 5605 |         return (r); | 
| 271 |  | } | 
| 272 |  |  | 
| 273 |  | /* SECTION: client-server.spec.expect | 
| 274 |  |  * | 
| 275 |  |  * expect STRING1 OP STRING2 | 
| 276 |  |  *         Test if "STRING1 OP STRING2" is true, and if not, fails the test. | 
| 277 |  |  *         OP can be ==, <, <=, >, >= when STRING1 and STRING2 represent numbers | 
| 278 |  |  *         in which case it's an order operator. If STRING1 and STRING2 are | 
| 279 |  |  *         meant as strings OP is a matching operator, either == (exact match) | 
| 280 |  |  *         or ~ (regex match). | 
| 281 |  |  * | 
| 282 |  |  *         varnishtest will first try to resolve STRING1 and STRING2 by looking | 
| 283 |  |  *         if they have special meanings, in which case, the resolved value is | 
| 284 |  |  *         use for the test. Note that this value can be a string representing a | 
| 285 |  |  *         number, allowing for tests such as:: | 
| 286 |  |  * | 
| 287 |  |  *                 expect req.http.x-num > 2 | 
| 288 |  |  * | 
| 289 |  |  *         Here's the list of recognized strings, most should be obvious as they | 
| 290 |  |  *         either match VCL logic, or the txreq/txresp options: | 
| 291 |  |  * | 
| 292 |  |  *         - remote.ip | 
| 293 |  |  *         - remote.port | 
| 294 |  |  *         - remote.path | 
| 295 |  |  *         - req.method | 
| 296 |  |  *         - req.url | 
| 297 |  |  *         - req.proto | 
| 298 |  |  *         - resp.proto | 
| 299 |  |  *         - resp.status | 
| 300 |  |  *         - resp.reason | 
| 301 |  |  *         - resp.chunklen | 
| 302 |  |  *         - req.bodylen | 
| 303 |  |  *         - req.body | 
| 304 |  |  *         - resp.bodylen | 
| 305 |  |  *         - resp.body | 
| 306 |  |  *         - req.http.NAME | 
| 307 |  |  *         - resp.http.NAME | 
| 308 |  |  */ | 
| 309 |  |  | 
| 310 |  | static const char * | 
| 311 | 13530 | cmd_var_resolve(struct http *hp, char *spec) | 
| 312 |  | { | 
| 313 |  |         char **hh, *hdr; | 
| 314 | 13530 |         if (!strcmp(spec, "remote.ip")) | 
| 315 | 4 |                 return (hp->rem_ip); | 
| 316 | 13526 |         if (!strcmp(spec, "remote.port")) | 
| 317 | 4 |                 return (hp->rem_port); | 
| 318 | 13522 |         if (!strcmp(spec, "remote.path")) | 
| 319 | 4 |                 return (hp->rem_path); | 
| 320 | 13518 |         if (!strcmp(spec, "req.method")) | 
| 321 | 54 |                 return (hp->req[0]); | 
| 322 | 13464 |         if (!strcmp(spec, "req.url")) | 
| 323 | 637 |                 return (hp->req[1]); | 
| 324 | 12827 |         if (!strcmp(spec, "req.proto")) | 
| 325 | 45 |                 return (hp->req[2]); | 
| 326 | 12782 |         if (!strcmp(spec, "resp.proto")) | 
| 327 | 34 |                 return (hp->resp[0]); | 
| 328 | 12748 |         if (!strcmp(spec, "resp.status")) | 
| 329 | 1635 |                 return (hp->resp[1]); | 
| 330 | 11113 |         if (!strcmp(spec, "resp.reason")) | 
| 331 | 227 |                 return (hp->resp[2]); | 
| 332 | 10886 |         if (!strcmp(spec, "resp.chunklen")) | 
| 333 | 0 |                 return (hp->chunklen); | 
| 334 | 10886 |         if (!strcmp(spec, "req.bodylen")) | 
| 335 | 29 |                 return (hp->bodylen); | 
| 336 | 10857 |         if (!strcmp(spec, "req.body")) | 
| 337 | 20 |                 return (hp->body != NULL ? hp->body : spec); | 
| 338 | 10837 |         if (!strcmp(spec, "resp.bodylen")) | 
| 339 | 653 |                 return (hp->bodylen); | 
| 340 | 10184 |         if (!strcmp(spec, "resp.body")) | 
| 341 | 210 |                 return (hp->body != NULL ? hp->body : spec); | 
| 342 | 9974 |         if (!strncmp(spec, "req.http.", 9)) { | 
| 343 | 382 |                 hh = hp->req; | 
| 344 | 382 |                 hdr = spec + 9; | 
| 345 | 9974 |         } else if (!strncmp(spec, "resp.http.", 10)) { | 
| 346 | 3011 |                 hh = hp->resp; | 
| 347 | 3011 |                 hdr = spec + 10; | 
| 348 | 9592 |         } else if (!strcmp(spec, "h2.state")) { | 
| 349 | 8 |                 if (hp->h2) | 
| 350 | 4 |                         return ("true"); | 
| 351 |  |                 else | 
| 352 | 4 |                         return ("false"); | 
| 353 |  |         } else | 
| 354 | 6573 |                 return (spec); | 
| 355 | 3393 |         hdr = http_find_header(hh, hdr); | 
| 356 | 3393 |         return (hdr); | 
| 357 | 13530 | } | 
| 358 |  |  | 
| 359 |  | static void | 
| 360 | 6765 | cmd_http_expect(CMD_ARGS) | 
| 361 |  | { | 
| 362 |  |         struct http *hp; | 
| 363 |  |         const char *lhs; | 
| 364 |  |         char *cmp; | 
| 365 |  |         const char *rhs; | 
| 366 |  |  | 
| 367 | 6765 |         (void)vl; | 
| 368 | 6765 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 369 | 6765 |         AZ(strcmp(av[0], "expect")); | 
| 370 | 6765 |         av++; | 
| 371 |  |  | 
| 372 | 6765 |         AN(av[0]); | 
| 373 | 6765 |         AN(av[1]); | 
| 374 | 6765 |         AN(av[2]); | 
| 375 | 6765 |         AZ(av[3]); | 
| 376 | 6765 |         lhs = cmd_var_resolve(hp, av[0]); | 
| 377 | 6765 |         cmp = av[1]; | 
| 378 | 6765 |         rhs = cmd_var_resolve(hp, av[2]); | 
| 379 |  |  | 
| 380 | 6765 |         vtc_expect(vl, av[0], lhs, cmp, av[2], rhs); | 
| 381 | 6765 | } | 
| 382 |  |  | 
| 383 |  | /* SECTION: client-server.spec.expect_pattern | 
| 384 |  |  * | 
| 385 |  |  * expect_pattern | 
| 386 |  |  * | 
| 387 |  |  * Expect as the http body the test pattern generated by chunkedlen ('0'..'7' | 
| 388 |  |  * repeating). | 
| 389 |  |  */ | 
| 390 |  | static void | 
| 391 | 4 | cmd_http_expect_pattern(CMD_ARGS) | 
| 392 |  | { | 
| 393 |  |         char *p; | 
| 394 |  |         struct http *hp; | 
| 395 | 4 |         char t = '0'; | 
| 396 |  |  | 
| 397 | 4 |         (void)vl; | 
| 398 | 4 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 399 | 4 |         AZ(strcmp(av[0], "expect_pattern")); | 
| 400 | 4 |         av++; | 
| 401 | 4 |         AZ(av[0]); | 
| 402 | 262148 |         for (p = hp->body; *p != '\0'; p++) { | 
| 403 | 262144 |                 if (*p != t) | 
| 404 | 0 |                         vtc_fatal(hp->vl, | 
| 405 |  |                             "EXPECT PATTERN FAIL @%zd should 0x%02x is 0x%02x", | 
| 406 | 0 |                             (ssize_t) (p - hp->body), t, *p); | 
| 407 | 262144 |                 t += 1; | 
| 408 | 262144 |                 t &= ~0x08; | 
| 409 | 262144 |         } | 
| 410 | 4 |         vtc_log(hp->vl, 4, "EXPECT PATTERN SUCCESS"); | 
| 411 | 4 | } | 
| 412 |  |  | 
| 413 |  | /********************************************************************** | 
| 414 |  |  * Split a HTTP protocol header | 
| 415 |  |  */ | 
| 416 |  |  | 
| 417 |  | static void | 
| 418 | 5605 | http_splitheader(struct http *hp, int req) | 
| 419 |  | { | 
| 420 |  |         char *p, *q, **hh; | 
| 421 |  |         int n; | 
| 422 |  |         char buf[20]; | 
| 423 |  |  | 
| 424 | 5605 |         CHECK_OBJ_NOTNULL(hp, HTTP_MAGIC); | 
| 425 | 5605 |         if (req) { | 
| 426 | 2346 |                 memset(hp->req, 0, sizeof hp->req); | 
| 427 | 2346 |                 hh = hp->req; | 
| 428 | 2346 |         } else { | 
| 429 | 3259 |                 memset(hp->resp, 0, sizeof hp->resp); | 
| 430 | 3259 |                 hh = hp->resp; | 
| 431 |  |         } | 
| 432 |  |  | 
| 433 | 5605 |         n = 0; | 
| 434 | 5605 |         p = hp->rx_b; | 
| 435 | 5605 |         if (*p == '\0') { | 
| 436 | 80 |                 vtc_log(hp->vl, 4, "No headers"); | 
| 437 | 80 |                 return; | 
| 438 |  |         } | 
| 439 |  |  | 
| 440 |  |         /* REQ/PROTO */ | 
| 441 | 5526 |         while (vct_islws(*p)) | 
| 442 | 1 |                 p++; | 
| 443 | 5525 |         hh[n++] = p; | 
| 444 | 38200 |         while (!vct_islws(*p)) | 
| 445 | 32675 |                 p++; | 
| 446 | 5525 |         AZ(vct_iscrlf(p, hp->rx_e)); | 
| 447 | 5525 |         *p++ = '\0'; | 
| 448 |  |  | 
| 449 |  |         /* URL/STATUS */ | 
| 450 | 5525 |         while (vct_issp(*p))            /* XXX: H space only */ | 
| 451 | 0 |                 p++; | 
| 452 | 5525 |         AZ(vct_iscrlf(p, hp->rx_e)); | 
| 453 | 5525 |         hh[n++] = p; | 
| 454 | 27098 |         while (!vct_islws(*p)) | 
| 455 | 21573 |                 p++; | 
| 456 | 5525 |         if (vct_iscrlf(p, hp->rx_e)) { | 
| 457 | 1 |                 hh[n++] = NULL; | 
| 458 | 1 |                 q = p; | 
| 459 | 1 |                 p = vct_skipcrlf(p, hp->rx_e); | 
| 460 | 1 |                 *q = '\0'; | 
| 461 | 1 |         } else { | 
| 462 | 5524 |                 *p++ = '\0'; | 
| 463 |  |                 /* PROTO/MSG */ | 
| 464 | 5524 |                 while (vct_issp(*p))            /* XXX: H space only */ | 
| 465 | 0 |                         p++; | 
| 466 | 5524 |                 hh[n++] = p; | 
| 467 | 42979 |                 while (!vct_iscrlf(p, hp->rx_e)) | 
| 468 | 37455 |                         p++; | 
| 469 | 5524 |                 q = p; | 
| 470 | 5524 |                 p = vct_skipcrlf(p, hp->rx_e); | 
| 471 | 5524 |                 *q = '\0'; | 
| 472 |  |         } | 
| 473 | 5525 |         assert(n == 3); | 
| 474 |  |  | 
| 475 | 44713 |         while (*p != '\0') { | 
| 476 | 44711 |                 assert(n < MAX_HDR); | 
| 477 | 44711 |                 if (vct_iscrlf(p, hp->rx_e)) | 
| 478 | 5523 |                         break; | 
| 479 | 39188 |                 hh[n++] = p++; | 
| 480 | 856737 |                 while (*p != '\0' && !vct_iscrlf(p, hp->rx_e)) | 
| 481 | 817549 |                         p++; | 
| 482 | 39188 |                 if (*p == '\0') { | 
| 483 | 0 |                         break; | 
| 484 |  |                 } | 
| 485 | 39188 |                 q = p; | 
| 486 | 39188 |                 p = vct_skipcrlf(p, hp->rx_e); | 
| 487 | 39188 |                 *q = '\0'; | 
| 488 |  |         } | 
| 489 | 5525 |         p = vct_skipcrlf(p, hp->rx_e); | 
| 490 | 5525 |         assert(*p == '\0'); | 
| 491 |  |  | 
| 492 | 61296 |         for (n = 0; n < 3 || hh[n] != NULL; n++) { | 
| 493 | 55771 |                 bprintf(buf, "http[%2d] ", n); | 
| 494 | 55771 |                 vtc_dump(hp->vl, 4, buf, hh[n], -1); | 
| 495 | 55771 |         } | 
| 496 | 5605 | } | 
| 497 |  |  | 
| 498 |  |  | 
| 499 |  | /********************************************************************** | 
| 500 |  |  * Receive another character | 
| 501 |  |  */ | 
| 502 |  |  | 
| 503 |  | static int | 
| 504 | 1269247 | http_rxchar(struct http *hp, int n, int eof) | 
| 505 |  | { | 
| 506 |  |         int i; | 
| 507 |  |         struct pollfd pfd[1]; | 
| 508 |  |  | 
| 509 | 2539752 |         while (n > 0) { | 
| 510 | 1270609 |                 pfd[0].fd = hp->sess->fd; | 
| 511 | 1270609 |                 pfd[0].events = POLLIN; | 
| 512 | 1270609 |                 pfd[0].revents = 0; | 
| 513 | 1270609 |                 i = poll(pfd, 1, (int)(hp->timeout * 1000)); | 
| 514 | 1270609 |                 if (i < 0 && errno == EINTR) | 
| 515 | 0 |                         continue; | 
| 516 | 1270609 |                 if (i == 0) { | 
| 517 | 0 |                         vtc_log(hp->vl, hp->fatal, | 
| 518 |  |                             "HTTP rx timeout (fd:%d %.3fs)", | 
| 519 | 0 |                             hp->sess->fd, hp->timeout); | 
| 520 | 0 |                         continue; | 
| 521 |  |                 } | 
| 522 | 1270609 |                 if (i < 0) { | 
| 523 | 0 |                         vtc_log(hp->vl, hp->fatal, | 
| 524 |  |                             "HTTP rx failed (fd:%d poll: %s)", | 
| 525 | 0 |                             hp->sess->fd, strerror(errno)); | 
| 526 | 0 |                         continue; | 
| 527 |  |                 } | 
| 528 | 1270609 |                 assert(i > 0); | 
| 529 | 1270609 |                 assert(hp->rx_p + n < hp->rx_e); | 
| 530 | 1270609 |                 i = read(hp->sess->fd, hp->rx_p, n); | 
| 531 | 1270609 |                 if (!(pfd[0].revents & POLLIN)) | 
| 532 | 0 |                         vtc_log(hp->vl, 4, | 
| 533 |  |                             "HTTP rx poll (fd:%d revents: %x n=%d, i=%d)", | 
| 534 | 0 |                             hp->sess->fd, pfd[0].revents, n, i); | 
| 535 | 1270609 |                 if (i == 0 && eof) | 
| 536 | 85 |                         return (i); | 
| 537 | 1270524 |                 if (i == 0) { | 
| 538 | 38 |                         vtc_log(hp->vl, hp->fatal, | 
| 539 |  |                             "HTTP rx EOF (fd:%d read: %s) %d", | 
| 540 | 19 |                             hp->sess->fd, strerror(errno), n); | 
| 541 | 19 |                         return (-1); | 
| 542 |  |                 } | 
| 543 | 1270505 |                 if (i < 0) { | 
| 544 | 0 |                         vtc_log(hp->vl, hp->fatal, | 
| 545 |  |                             "HTTP rx failed (fd:%d read: %s)", | 
| 546 | 0 |                             hp->sess->fd, strerror(errno)); | 
| 547 | 0 |                         return (-1); | 
| 548 |  |                 } | 
| 549 | 1270505 |                 hp->rx_p += i; | 
| 550 | 1270505 |                 *hp->rx_p = '\0'; | 
| 551 | 1270505 |                 n -= i; | 
| 552 |  |         } | 
| 553 | 1269143 |         return (1); | 
| 554 | 1269247 | } | 
| 555 |  |  | 
| 556 |  | static int | 
| 557 | 1349 | http_rxchunk(struct http *hp) | 
| 558 |  | { | 
| 559 |  |         char *q, *old; | 
| 560 |  |         int i; | 
| 561 |  |  | 
| 562 | 1349 |         old = hp->rx_p; | 
| 563 | 1349 |         do { | 
| 564 | 6795 |                 if (http_rxchar(hp, 1, 0) < 0) | 
| 565 | 11 |                         return (-1); | 
| 566 | 6784 |         } while (hp->rx_p[-1] != '\n'); | 
| 567 | 1338 |         vtc_dump(hp->vl, 4, "len", old, -1); | 
| 568 | 1338 |         i = strtoul(old, &q, 16); | 
| 569 | 1338 |         bprintf(hp->chunklen, "%d", i); | 
| 570 | 1338 |         if ((q == old) || (q == hp->rx_p) || (*q != '\0' && !vct_islws(*q))) { | 
| 571 | 4 |                 vtc_log(hp->vl, hp->fatal, "Chunklen fail (%02x @ %td)", | 
| 572 | 2 |                     (*q & 0xff), q - old); | 
| 573 | 2 |                 return (-1); | 
| 574 |  |         } | 
| 575 | 1338 |         assert(*q == '\0' || vct_islws(*q)); | 
| 576 | 1338 |         hp->rx_p = old; | 
| 577 | 1338 |         if (i > 0) { | 
| 578 | 1074 |                 if (http_rxchar(hp, i, 0) < 0) | 
| 579 | 1 |                         return (-1); | 
| 580 | 1073 |                 vtc_dump(hp->vl, 4, "chunk", old, i); | 
| 581 | 1073 |         } | 
| 582 | 1337 |         old = hp->rx_p; | 
| 583 | 1337 |         if (http_rxchar(hp, 2, 0) < 0) | 
| 584 | 0 |                 return (-1); | 
| 585 | 1337 |         if (!vct_iscrlf(old, hp->rx_e)) { | 
| 586 | 0 |                 vtc_log(hp->vl, hp->fatal, "Chunklen without CRLF"); | 
| 587 | 0 |                 return (-1); | 
| 588 |  |         } | 
| 589 | 1337 |         hp->rx_p = old; | 
| 590 | 1337 |         *hp->rx_p = '\0'; | 
| 591 | 1337 |         return (i); | 
| 592 | 1349 | } | 
| 593 |  |  | 
| 594 |  | /********************************************************************** | 
| 595 |  |  * Swallow a HTTP message body | 
| 596 |  |  * | 
| 597 |  |  * max: 0 is all | 
| 598 |  |  */ | 
| 599 |  |  | 
| 600 |  | static void | 
| 601 | 5433 | http_swallow_body(struct http *hp, char * const *hh, int body, int max) | 
| 602 |  | { | 
| 603 |  |         const char *p, *q; | 
| 604 |  |         int i, l, ll; | 
| 605 |  |  | 
| 606 | 5433 |         l = hp->rx_p - hp->body; | 
| 607 |  |  | 
| 608 | 5433 |         p = http_find_header(hh, "transfer-encoding"); | 
| 609 | 5433 |         q = http_find_header(hh, "content-length"); | 
| 610 | 5433 |         if (p != NULL && !strcasecmp(p, "chunked")) { | 
| 611 | 279 |                 if (q != NULL) { | 
| 612 | 0 |                         vtc_log(hp->vl, hp->fatal, "Both C-E: Chunked and C-L"); | 
| 613 | 0 |                         return; | 
| 614 |  |                 } | 
| 615 | 279 |                 ll = 0; | 
| 616 | 1336 |                 while (http_rxchunk(hp) > 0) { | 
| 617 | 1063 |                         ll = (hp->rx_p - hp->body) - l; | 
| 618 | 1063 |                         if (max && ll >= max) | 
| 619 | 6 |                                 break; | 
| 620 |  |                 } | 
| 621 | 279 |                 p = "chunked"; | 
| 622 | 5433 |         } else if (q != NULL) { | 
| 623 | 2734 |                 ll = strtoul(q, NULL, 10); | 
| 624 | 2734 |                 if (max && ll > l + max) | 
| 625 | 4 |                         ll = max; | 
| 626 |  |                 else | 
| 627 | 2730 |                         ll -= l; | 
| 628 | 2734 |                 i = http_rxchar(hp, ll, 0); | 
| 629 | 2734 |                 if (i < 0) | 
| 630 | 7 |                         return; | 
| 631 | 2727 |                 p = "c-l"; | 
| 632 | 5147 |         } else if (body) { | 
| 633 | 7 |                 ll = 0; | 
| 634 | 7 |                 do  { | 
| 635 | 196725 |                         i = http_rxchar(hp, 1, 1); | 
| 636 | 196725 |                         if (i < 0) | 
| 637 | 0 |                                 return; | 
| 638 | 196725 |                         ll += i; | 
| 639 | 196725 |                         if (max && ll >= max) | 
| 640 | 2 |                                 break; | 
| 641 | 196723 |                 } while (i > 0); | 
| 642 | 7 |                 p = "eof"; | 
| 643 | 7 |         } else { | 
| 644 | 2413 |                 p = "none"; | 
| 645 | 2413 |                 ll = l = 0; | 
| 646 |  |         } | 
| 647 | 5426 |         vtc_dump(hp->vl, 4, p, hp->body + l, ll); | 
| 648 | 5426 |         l += ll; | 
| 649 | 5426 |         hp->bodyl = l; | 
| 650 | 5426 |         bprintf(hp->bodylen, "%d", l); | 
| 651 | 5433 | } | 
| 652 |  |  | 
| 653 |  | /********************************************************************** | 
| 654 |  |  * Receive a HTTP protocol header | 
| 655 |  |  */ | 
| 656 |  |  | 
| 657 |  | static void | 
| 658 | 5605 | http_rxhdr(struct http *hp) | 
| 659 |  | { | 
| 660 | 5605 |         int i, s = 0; | 
| 661 |  |         char *p; | 
| 662 |  |         ssize_t l; | 
| 663 |  |  | 
| 664 | 5605 |         CHECK_OBJ_NOTNULL(hp, HTTP_MAGIC); | 
| 665 | 5605 |         hp->rx_p = hp->rx_b; | 
| 666 | 5605 |         *hp->rx_p = '\0'; | 
| 667 | 5605 |         hp->body = NULL; | 
| 668 | 5605 |         bprintf(hp->bodylen, "%s", "<undef>"); | 
| 669 | 1060360 |         while (1) { | 
| 670 | 1060360 |                 p = hp->rx_p; | 
| 671 | 1060360 |                 i = http_rxchar(hp, 1, 1); | 
| 672 | 1060360 |                 if (i < 1) | 
| 673 | 80 |                         break; | 
| 674 | 1060280 |                 if (s == 0 && *p == '\r') | 
| 675 | 44718 |                         s = 1; | 
| 676 | 1015562 |                 else if ((s == 0 || s == 1) && *p == '\n') | 
| 677 | 44720 |                         s = 2; | 
| 678 | 970842 |                 else if (s == 2 && *p == '\r') | 
| 679 | 5524 |                         s = 3; | 
| 680 | 965318 |                 else if ((s == 2 || s == 3) && *p == '\n') | 
| 681 | 5525 |                         break; | 
| 682 |  |                 else | 
| 683 | 959793 |                         s = 0; | 
| 684 |  |         } | 
| 685 | 5605 |         l = hp->rx_p - hp->rx_b; | 
| 686 | 5605 |         vtc_dump(hp->vl, 4, "rxhdr", hp->rx_b, l); | 
| 687 | 5605 |         vtc_log(hp->vl, 4, "rxhdrlen = %zd", l); | 
| 688 | 5605 |         if (i < 1) | 
| 689 | 80 |                 vtc_log(hp->vl, hp->fatal, "HTTP header is incomplete"); | 
| 690 | 5605 |         *hp->rx_p = '\0'; | 
| 691 | 5605 |         hp->body = hp->rx_p; | 
| 692 | 5605 | } | 
| 693 |  |  | 
| 694 |  | /* SECTION: client-server.spec.rxresp | 
| 695 |  |  * | 
| 696 |  |  * rxresp [-no_obj] (client only) | 
| 697 |  |  *         Receive and parse a response's headers and body. If -no_obj is | 
| 698 |  |  *         present, only get the headers. | 
| 699 |  |  */ | 
| 700 |  |  | 
| 701 |  | static void | 
| 702 | 3212 | cmd_http_rxresp(CMD_ARGS) | 
| 703 |  | { | 
| 704 |  |         struct http *hp; | 
| 705 | 3212 |         int has_obj = 1; | 
| 706 |  |  | 
| 707 | 3212 |         (void)vl; | 
| 708 | 3212 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 709 | 3212 |         ONLY_CLIENT(hp, av); | 
| 710 | 3212 |         AZ(strcmp(av[0], "rxresp")); | 
| 711 | 3212 |         av++; | 
| 712 |  |  | 
| 713 | 3238 |         for (; *av != NULL; av++) | 
| 714 | 52 |                 if (!strcmp(*av, "-no_obj")) | 
| 715 | 26 |                         has_obj = 0; | 
| 716 |  |                 else | 
| 717 | 0 |                         vtc_fatal(hp->vl, | 
| 718 | 0 |                             "Unknown http rxresp spec: %s\n", *av); | 
| 719 | 3212 |         http_rxhdr(hp); | 
| 720 | 3212 |         http_splitheader(hp, 0); | 
| 721 | 3212 |         if (http_count_header(hp->resp, "Content-Length") > 1) | 
| 722 | 0 |                 vtc_fatal(hp->vl, | 
| 723 |  |                     "Multiple Content-Length headers.\n"); | 
| 724 | 3212 |         if (!has_obj) | 
| 725 | 26 |                 return; | 
| 726 | 3186 |         if (!hp->resp[0] || !hp->resp[1]) | 
| 727 | 63 |                 return; | 
| 728 | 3123 |         if (hp->head_method) | 
| 729 | 70 |                 return; | 
| 730 | 3053 |         if (!strcmp(hp->resp[1], "200")) | 
| 731 | 2295 |                 http_swallow_body(hp, hp->resp, 1, 0); | 
| 732 |  |         else | 
| 733 | 758 |                 http_swallow_body(hp, hp->resp, 0, 0); | 
| 734 | 3053 |         vtc_log(hp->vl, 4, "bodylen = %s", hp->bodylen); | 
| 735 | 3212 | } | 
| 736 |  |  | 
| 737 |  | /* SECTION: client-server.spec.rxresphdrs | 
| 738 |  |  * | 
| 739 |  |  * rxresphdrs (client only) | 
| 740 |  |  *         Receive and parse a response's headers. | 
| 741 |  |  */ | 
| 742 |  |  | 
| 743 |  | static void | 
| 744 | 47 | cmd_http_rxresphdrs(CMD_ARGS) | 
| 745 |  | { | 
| 746 |  |         struct http *hp; | 
| 747 |  |  | 
| 748 | 47 |         (void)vl; | 
| 749 | 47 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 750 | 47 |         ONLY_CLIENT(hp, av); | 
| 751 | 47 |         AZ(strcmp(av[0], "rxresphdrs")); | 
| 752 | 47 |         av++; | 
| 753 |  |  | 
| 754 | 47 |         for (; *av != NULL; av++) | 
| 755 | 0 |                 vtc_fatal(hp->vl, "Unknown http rxresp spec: %s\n", *av); | 
| 756 | 47 |         http_rxhdr(hp); | 
| 757 | 47 |         http_splitheader(hp, 0); | 
| 758 | 47 |         if (http_count_header(hp->resp, "Content-Length") > 1) | 
| 759 | 0 |                 vtc_fatal(hp->vl, | 
| 760 |  |                     "Multiple Content-Length headers.\n"); | 
| 761 | 47 | } | 
| 762 |  |  | 
| 763 |  | /* SECTION: client-server.spec.gunzip | 
| 764 |  |  * | 
| 765 |  |  * gunzip | 
| 766 |  |  *         Gunzip the body in place. | 
| 767 |  |  */ | 
| 768 |  | static void | 
| 769 | 37 | cmd_http_gunzip(CMD_ARGS) | 
| 770 |  | { | 
| 771 |  |         struct http *hp; | 
| 772 |  |  | 
| 773 | 37 |         (void)av; | 
| 774 | 37 |         (void)vl; | 
| 775 |  |  | 
| 776 | 37 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 777 | 37 |         vtc_gunzip(hp, hp->body, &hp->bodyl); | 
| 778 | 37 | } | 
| 779 |  |  | 
| 780 |  | /********************************************************************** | 
| 781 |  |  * Handle common arguments of a transmitted request or response | 
| 782 |  |  */ | 
| 783 |  |  | 
| 784 |  | static char* const * | 
| 785 | 5403 | http_tx_parse_args(char * const *av, struct vtclog *vl, struct http *hp, | 
| 786 |  |     char *body, unsigned nohost, unsigned nodate, unsigned noserver, unsigned nouseragent) | 
| 787 |  | { | 
| 788 | 5403 |         long bodylen = 0; | 
| 789 |  |         char *b, *c; | 
| 790 |  |         char *nullbody; | 
| 791 |  |         ssize_t len; | 
| 792 | 5403 |         int nolen = 0; | 
| 793 |  |         int l; | 
| 794 |  |  | 
| 795 | 5403 |         nullbody = body; | 
| 796 |  |  | 
| 797 | 7648 |         for (; *av != NULL; av++) { | 
| 798 | 3389 |                 if (!strcmp(*av, "-nolen")) { | 
| 799 | 134 |                         nolen = 1; | 
| 800 | 3389 |                 } else if (!strcmp(*av, "-nohost")) { | 
| 801 | 2 |                         nohost = 1; | 
| 802 | 3255 |                 } else if (!strcmp(*av, "-nodate")) { | 
| 803 | 8 |                         nodate = 1; | 
| 804 | 3253 |                 } else if (!strcmp(*av, "-hdr")) { | 
| 805 | 2097 |                         if (!strncasecmp(av[1], "Content-Length:", 15) || | 
| 806 | 2032 |                             !strncasecmp(av[1], "Transfer-Encoding:", 18)) | 
| 807 | 154 |                                 nolen = 1; | 
| 808 | 2097 |                         if (!strncasecmp(av[1], "Host:", 5)) | 
| 809 | 36 |                                 nohost = 1; | 
| 810 | 2097 |                         if (!strncasecmp(av[1], "Date:", 5)) | 
| 811 | 8 |                                 nodate = 1; | 
| 812 | 2097 |                         if (!strncasecmp(av[1], "Server:", 7)) | 
| 813 | 15 |                                 noserver = 1; | 
| 814 | 2097 |                         if (!strncasecmp(av[1], "User-Agent:", 11)) | 
| 815 | 2 |                                 nouseragent = 1; | 
| 816 | 2097 |                         VSB_printf(hp->vsb, "%s%s", av[1], nl); | 
| 817 | 2097 |                         av++; | 
| 818 | 3245 |                 } else if (!strcmp(*av, "-hdrlen")) { | 
| 819 | 4 |                         VSB_printf(hp->vsb, "%s: ", av[1]); | 
| 820 | 4 |                         l = atoi(av[2]); | 
| 821 | 754 |                         while (l-- > 0) | 
| 822 | 750 |                                 VSB_putc(hp->vsb, '0' + (l % 10)); | 
| 823 | 4 |                         VSB_printf(hp->vsb, "%s", nl); | 
| 824 | 4 |                         av+=2; | 
| 825 | 4 |                 } else | 
| 826 | 1144 |                         break; | 
| 827 | 2245 |         } | 
| 828 | 6564 |         for (; *av != NULL; av++) { | 
| 829 | 1161 |                 if (!strcmp(*av, "-body")) { | 
| 830 | 756 |                         assert(body == nullbody); | 
| 831 | 756 |                         REPLACE(body, av[1]); | 
| 832 |  |  | 
| 833 | 756 |                         AN(body); | 
| 834 | 756 |                         av++; | 
| 835 | 756 |                         bodylen = strlen(body); | 
| 836 | 23223 |                         for (b = body; *b != '\0'; b++) { | 
| 837 | 22467 |                                 if (*b == '\\' && b[1] == '0') { | 
| 838 | 4 |                                         *b = '\0'; | 
| 839 | 41 |                                         for (c = b+1; *c != '\0'; c++) { | 
| 840 | 37 |                                                 *c = c[1]; | 
| 841 | 37 |                                         } | 
| 842 | 4 |                                         b++; | 
| 843 | 4 |                                         bodylen--; | 
| 844 | 4 |                                 } | 
| 845 | 22467 |                         } | 
| 846 | 1161 |                 } else if (!strcmp(*av, "-bodyfrom")) { | 
| 847 | 2 |                         assert(body == nullbody); | 
| 848 | 2 |                         free(body); | 
| 849 | 2 |                         body = VFIL_readfile(NULL, av[1], &len); | 
| 850 | 2 |                         AN(body); | 
| 851 | 2 |                         assert(len < INT_MAX); | 
| 852 | 2 |                         bodylen = len; | 
| 853 | 2 |                         av++; | 
| 854 | 405 |                 } else if (!strcmp(*av, "-bodylen")) { | 
| 855 | 223 |                         assert(body == nullbody); | 
| 856 | 223 |                         free(body); | 
| 857 | 223 |                         body = synth_body(av[1], 0); | 
| 858 | 223 |                         bodylen = strlen(body); | 
| 859 | 223 |                         av++; | 
| 860 | 403 |                 } else if (!strncmp(*av, "-gzip", 5)) { | 
| 861 | 180 |                         l = vtc_gzip_cmd(hp, av, &body, &bodylen); | 
| 862 | 180 |                         if (l == 0) | 
| 863 | 0 |                                 break; | 
| 864 | 180 |                         av++; | 
| 865 | 180 |                         if (l > 1) | 
| 866 | 163 |                                 VSB_printf(hp->vsb, "Content-Encoding: gzip%s", nl); | 
| 867 | 180 |                 } else | 
| 868 | 0 |                         break; | 
| 869 | 1161 |         } | 
| 870 | 5403 |         if (!nohost) { | 
| 871 | 3140 |                 VSB_cat(hp->vsb, "Host: "); | 
| 872 | 3140 |                 macro_cat(vl, hp->vsb, "localhost", NULL); | 
| 873 | 3140 |                 VSB_cat(hp->vsb, nl); | 
| 874 | 3140 |         } | 
| 875 | 5403 |         if (!nodate) { | 
| 876 | 2171 |                 VSB_cat(hp->vsb, "Date: "); | 
| 877 | 2171 |                 macro_cat(vl, hp->vsb, "date", NULL); | 
| 878 | 2171 |                 VSB_cat(hp->vsb, nl); | 
| 879 | 2171 |         } | 
| 880 | 5403 |         if (!noserver) | 
| 881 | 2158 |                 VSB_printf(hp->vsb, "Server: %s%s", hp->sess->name, nl); | 
| 882 | 5403 |         if (!nouseragent) | 
| 883 | 3214 |                 VSB_printf(hp->vsb, "User-Agent: %s%s", hp->sess->name, nl); | 
| 884 | 5403 |         if (body != NULL && !nolen) | 
| 885 | 2121 |                 VSB_printf(hp->vsb, "Content-Length: %ld%s", bodylen, nl); | 
| 886 | 5403 |         VSB_cat(hp->vsb, nl); | 
| 887 | 5403 |         if (body != NULL) { | 
| 888 | 2252 |                 VSB_bcat(hp->vsb, body, bodylen); | 
| 889 | 2252 |                 free(body); | 
| 890 | 2252 |         } | 
| 891 | 5403 |         return (av); | 
| 892 |  | } | 
| 893 |  |  | 
| 894 |  | /* SECTION: client-server.spec.txreq | 
| 895 |  |  * | 
| 896 |  |  * txreq|txresp [...] | 
| 897 |  |  *         Send a minimal request or response, but overload it if necessary. | 
| 898 |  |  * | 
| 899 |  |  *         txreq is client-specific and txresp is server-specific. | 
| 900 |  |  * | 
| 901 |  |  *         The only thing different between a request and a response, apart | 
| 902 |  |  *         from who can send them is that the first line (request line vs | 
| 903 |  |  *         status line), so all the options are pretty much the same. | 
| 904 |  |  * | 
| 905 |  |  *         \-method STRING (txreq only) | 
| 906 |  |  *                 What method to use (default: "GET"). | 
| 907 |  |  * | 
| 908 |  |  *         \-req STRING (txreq only) | 
| 909 |  |  *                 Alias for -method. | 
| 910 |  |  * | 
| 911 |  |  *         \-url STRING (txreq only) | 
| 912 |  |  *                 What location to use (default "/"). | 
| 913 |  |  * | 
| 914 |  |  *         \-proto STRING | 
| 915 |  |  *                 What protocol use in the status line. | 
| 916 |  |  *                 (default: "HTTP/1.1"). | 
| 917 |  |  * | 
| 918 |  |  *         \-status NUMBER (txresp only) | 
| 919 |  |  *                 What status code to return (default 200). | 
| 920 |  |  * | 
| 921 |  |  *         \-reason STRING (txresp only) | 
| 922 |  |  *                 What message to put in the status line (default: "OK"). | 
| 923 |  |  * | 
| 924 |  |  *         \-noserver (txresp only) | 
| 925 |  |  *                 Don't include a Server header with the id of the server. | 
| 926 |  |  * | 
| 927 |  |  *         \-nouseragent (txreq only) | 
| 928 |  |  *                 Don't include a User-Agent header with the id of the client. | 
| 929 |  |  * | 
| 930 |  |  *         These three switches can appear in any order but must come before the | 
| 931 |  |  *         following ones. | 
| 932 |  |  * | 
| 933 |  |  *         \-nohost | 
| 934 |  |  *                 Don't include a Host header in the request. Also Implied | 
| 935 |  |  *                 by the addition of a Host header with ``-hdr``. | 
| 936 |  |  * | 
| 937 |  |  *         \-nolen | 
| 938 |  |  *                 Don't include a Content-Length header. Also implied by the | 
| 939 |  |  *                 addition of a Content-Length or Transfer-Encoding header | 
| 940 |  |  *                 with ``-hdr``. | 
| 941 |  |  * | 
| 942 |  |  *         \-nodate | 
| 943 |  |  *                 Don't include a Date header in the response. Also implied | 
| 944 |  |  *                 by the addition of a Date header with ``-hdr``. | 
| 945 |  |  * | 
| 946 |  |  *         \-hdr STRING | 
| 947 |  |  *                 Add STRING as a header, it must follow this format: | 
| 948 |  |  *                 "name: value". It can be called multiple times. | 
| 949 |  |  * | 
| 950 |  |  *         \-hdrlen STRING NUMBER | 
| 951 |  |  *                 Add STRING as a header with NUMBER bytes of content. | 
| 952 |  |  * | 
| 953 |  |  *         You can then use the arguments related to the body: | 
| 954 |  |  * | 
| 955 |  |  *         \-body STRING | 
| 956 |  |  *                 Input STRING as body. | 
| 957 |  |  * | 
| 958 |  |  *         \-bodyfrom FILE | 
| 959 |  |  *                 Same as -body but content is read from FILE. | 
| 960 |  |  * | 
| 961 |  |  *         \-bodylen NUMBER | 
| 962 |  |  *                 Generate and input a body that is NUMBER bytes-long. | 
| 963 |  |  * | 
| 964 |  |  *         \-gziplevel NUMBER | 
| 965 |  |  *                 Set the gzip level (call it before any of the other gzip | 
| 966 |  |  *                 switches). | 
| 967 |  |  * | 
| 968 |  |  *         \-gzipresidual NUMBER | 
| 969 |  |  *                 Add extra gzip bits. You should never need it. | 
| 970 |  |  * | 
| 971 |  |  *         \-gzipbody STRING | 
| 972 |  |  *                 Gzip STRING and send it as body. | 
| 973 |  |  * | 
| 974 |  |  *         \-gziplen NUMBER | 
| 975 |  |  *                 Combine -bodylen and -gzipbody: generate a string of length | 
| 976 |  |  *                 NUMBER, gzip it and send as body. | 
| 977 |  |  */ | 
| 978 |  |  | 
| 979 |  | /********************************************************************** | 
| 980 |  |  * Transmit a response | 
| 981 |  |  */ | 
| 982 |  |  | 
| 983 |  | static void | 
| 984 | 2187 | cmd_http_txresp(CMD_ARGS) | 
| 985 |  | { | 
| 986 |  |         struct http *hp; | 
| 987 | 2187 |         const char *proto = "HTTP/1.1"; | 
| 988 | 2187 |         const char *status = "200"; | 
| 989 | 2187 |         const char *reason = "OK"; | 
| 990 | 2187 |         char* body = NULL; | 
| 991 | 2187 |         unsigned noserver = 0; | 
| 992 |  |  | 
| 993 | 2187 |         (void)vl; | 
| 994 | 2187 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 995 | 2187 |         ONLY_SERVER(hp, av); | 
| 996 | 2187 |         AZ(strcmp(av[0], "txresp")); | 
| 997 | 2187 |         av++; | 
| 998 |  |  | 
| 999 | 2187 |         VSB_clear(hp->vsb); | 
| 1000 |  |  | 
| 1001 | 2430 |         for (; *av != NULL; av++) { | 
| 1002 | 1673 |                 if (!strcmp(*av, "-proto")) { | 
| 1003 | 41 |                         proto = av[1]; | 
| 1004 | 41 |                         av++; | 
| 1005 | 1673 |                 } else if (!strcmp(*av, "-status")) { | 
| 1006 | 160 |                         status = av[1]; | 
| 1007 | 160 |                         av++; | 
| 1008 | 1632 |                 } else if (!strcmp(*av, "-reason")) { | 
| 1009 | 28 |                         reason = av[1]; | 
| 1010 | 28 |                         av++; | 
| 1011 | 28 |                         continue; | 
| 1012 | 1444 |                 } else if (!strcmp(*av, "-noserver")) { | 
| 1013 | 14 |                         noserver = 1; | 
| 1014 | 14 |                         continue; | 
| 1015 |  |                 } else | 
| 1016 | 1430 |                         break; | 
| 1017 | 201 |         } | 
| 1018 |  |  | 
| 1019 | 2187 |         VSB_printf(hp->vsb, "%s %s %s%s", proto, status, reason, nl); | 
| 1020 |  |  | 
| 1021 |  |         /* send a "Content-Length: 0" header unless something else happens */ | 
| 1022 | 2187 |         REPLACE(body, ""); | 
| 1023 |  |  | 
| 1024 | 2187 |         av = http_tx_parse_args(av, vl, hp, body, 1, 0, noserver, 1); | 
| 1025 | 2187 |         if (*av != NULL) | 
| 1026 | 0 |                 vtc_fatal(hp->vl, "Unknown http txresp spec: %s\n", *av); | 
| 1027 |  |  | 
| 1028 | 2187 |         http_write(hp, 4, "txresp"); | 
| 1029 | 2187 | } | 
| 1030 |  |  | 
| 1031 |  | static void | 
| 1032 | 2 | cmd_http_upgrade(CMD_ARGS) | 
| 1033 |  | { | 
| 1034 |  |         char *h; | 
| 1035 |  |         struct http *hp; | 
| 1036 |  |  | 
| 1037 | 2 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1038 | 2 |         ONLY_SERVER(hp, av); | 
| 1039 | 2 |         AN(hp->sfd); | 
| 1040 |  |  | 
| 1041 | 2 |         h = http_find_header(hp->req, "Upgrade"); | 
| 1042 | 2 |         if (!h || strcmp(h, "h2c")) | 
| 1043 | 0 |                 vtc_fatal(vl, "Req misses \"Upgrade: h2c\" header"); | 
| 1044 |  |  | 
| 1045 | 2 |         h = http_find_header(hp->req, "Connection"); | 
| 1046 | 2 |         if (!h || strcmp(h, "Upgrade, HTTP2-Settings")) | 
| 1047 | 0 |                 vtc_fatal(vl, "Req misses \"Connection: " | 
| 1048 |  |                         "Upgrade, HTTP2-Settings\" header"); | 
| 1049 |  |  | 
| 1050 | 2 |         h = http_find_header(hp->req, "HTTP2-Settings"); | 
| 1051 | 2 |         if (!h) | 
| 1052 | 0 |                 vtc_fatal(vl, "Req misses \"HTTP2-Settings\" header"); | 
| 1053 |  |  | 
| 1054 | 2 |         parse_string(vl, hp, | 
| 1055 |  |             "txresp -status 101" | 
| 1056 |  |             " -hdr \"Connection: Upgrade\"" | 
| 1057 |  |             " -hdr \"Upgrade: h2c\"\n" | 
| 1058 |  |         ); | 
| 1059 |  |  | 
| 1060 | 2 |         parse_string(vl, hp, | 
| 1061 |  |             "rxpri\n" | 
| 1062 |  |             "stream 0 {\n" | 
| 1063 |  |             "    txsettings\n" | 
| 1064 |  |             "    rxsettings\n" | 
| 1065 |  |             "    txsettings -ack\n" | 
| 1066 |  |             "    rxsettings\n" | 
| 1067 |  |             "    expect settings.ack == true\n" | 
| 1068 |  |             "} -start\n" | 
| 1069 |  |         ); | 
| 1070 |  |  | 
| 1071 | 2 |         b64_settings(hp, h); | 
| 1072 |  |  | 
| 1073 | 2 | } | 
| 1074 |  |  | 
| 1075 |  | /********************************************************************** | 
| 1076 |  |  * Receive a request | 
| 1077 |  |  */ | 
| 1078 |  |  | 
| 1079 |  | /* SECTION: client-server.spec.rxreq | 
| 1080 |  |  * | 
| 1081 |  |  * rxreq (server only) | 
| 1082 |  |  *         Receive and parse a request's headers and body. | 
| 1083 |  |  */ | 
| 1084 |  | static void | 
| 1085 | 2358 | cmd_http_rxreq(CMD_ARGS) | 
| 1086 |  | { | 
| 1087 |  |         struct http *hp; | 
| 1088 |  |  | 
| 1089 | 2358 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1090 | 2358 |         ONLY_SERVER(hp, av); | 
| 1091 | 2358 |         AZ(strcmp(av[0], "rxreq")); | 
| 1092 | 2358 |         av++; | 
| 1093 |  |  | 
| 1094 | 2358 |         for (; *av != NULL; av++) | 
| 1095 | 0 |                 vtc_fatal(vl, "Unknown http rxreq spec: %s\n", *av); | 
| 1096 | 2358 |         http_rxhdr(hp); | 
| 1097 | 2358 |         http_splitheader(hp, 1); | 
| 1098 | 2358 |         if (http_count_header(hp->req, "Content-Length") > 1) | 
| 1099 | 0 |                 vtc_fatal(vl, "Multiple Content-Length headers.\n"); | 
| 1100 | 2358 |         http_swallow_body(hp, hp->req, 0, 0); | 
| 1101 | 2358 |         vtc_log(vl, 4, "bodylen = %s", hp->bodylen); | 
| 1102 | 2358 | } | 
| 1103 |  |  | 
| 1104 |  | /* SECTION: client-server.spec.rxreqhdrs | 
| 1105 |  |  * | 
| 1106 |  |  * rxreqhdrs (server only) | 
| 1107 |  |  *         Receive and parse a request's headers (but not the body). | 
| 1108 |  |  */ | 
| 1109 |  |  | 
| 1110 |  | static void | 
| 1111 | 5 | cmd_http_rxreqhdrs(CMD_ARGS) | 
| 1112 |  | { | 
| 1113 |  |         struct http *hp; | 
| 1114 |  |  | 
| 1115 | 5 |         (void)vl; | 
| 1116 | 5 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1117 | 5 |         AZ(strcmp(av[0], "rxreqhdrs")); | 
| 1118 | 5 |         av++; | 
| 1119 |  |  | 
| 1120 | 5 |         for (; *av != NULL; av++) | 
| 1121 | 0 |                 vtc_fatal(hp->vl, "Unknown http rxreq spec: %s\n", *av); | 
| 1122 | 5 |         http_rxhdr(hp); | 
| 1123 | 5 |         http_splitheader(hp, 1); | 
| 1124 | 5 |         if (http_count_header(hp->req, "Content-Length") > 1) | 
| 1125 | 0 |                 vtc_fatal(hp->vl, "Multiple Content-Length headers.\n"); | 
| 1126 | 5 | } | 
| 1127 |  |  | 
| 1128 |  | /* SECTION: client-server.spec.rxreqbody | 
| 1129 |  |  * | 
| 1130 |  |  * rxreqbody (server only) | 
| 1131 |  |  *         Receive a request's body. | 
| 1132 |  |  */ | 
| 1133 |  |  | 
| 1134 |  | static void | 
| 1135 | 4 | cmd_http_rxreqbody(CMD_ARGS) | 
| 1136 |  | { | 
| 1137 |  |         struct http *hp; | 
| 1138 |  |  | 
| 1139 | 4 |         (void)vl; | 
| 1140 | 4 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1141 | 4 |         ONLY_SERVER(hp, av); | 
| 1142 | 4 |         AZ(strcmp(av[0], "rxreqbody")); | 
| 1143 | 4 |         av++; | 
| 1144 |  |  | 
| 1145 | 4 |         for (; *av != NULL; av++) | 
| 1146 | 0 |                 vtc_fatal(hp->vl, "Unknown http rxreq spec: %s\n", *av); | 
| 1147 | 4 |         http_swallow_body(hp, hp->req, 0, 0); | 
| 1148 | 4 |         vtc_log(hp->vl, 4, "bodylen = %s", hp->bodylen); | 
| 1149 | 4 | } | 
| 1150 |  |  | 
| 1151 |  | /* SECTION: client-server.spec.rxrespbody | 
| 1152 |  |  * | 
| 1153 |  |  * rxrespbody (client only) | 
| 1154 |  |  *         Receive (part of) a response's body. | 
| 1155 |  |  * | 
| 1156 |  |  * -max : max length of this receive, 0 for all | 
| 1157 |  |  */ | 
| 1158 |  |  | 
| 1159 |  | static void | 
| 1160 | 35 | cmd_http_rxrespbody(CMD_ARGS) | 
| 1161 |  | { | 
| 1162 |  |         struct http *hp; | 
| 1163 | 35 |         int max = 0; | 
| 1164 |  |  | 
| 1165 | 35 |         (void)vl; | 
| 1166 | 35 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1167 | 35 |         ONLY_CLIENT(hp, av); | 
| 1168 | 35 |         AZ(strcmp(av[0], "rxrespbody")); | 
| 1169 | 35 |         av++; | 
| 1170 |  |  | 
| 1171 | 47 |         for (; *av != NULL; av++) | 
| 1172 | 24 |                 if (!strcmp(*av, "-max")) { | 
| 1173 | 12 |                         max = atoi(av[1]); | 
| 1174 | 12 |                         av++; | 
| 1175 | 12 |                 } else | 
| 1176 | 0 |                         vtc_fatal(hp->vl, | 
| 1177 | 0 |                             "Unknown http rxrespbody spec: %s\n", *av); | 
| 1178 |  |  | 
| 1179 | 35 |         http_swallow_body(hp, hp->resp, 1, max); | 
| 1180 | 35 |         vtc_log(hp->vl, 4, "bodylen = %s", hp->bodylen); | 
| 1181 | 35 | } | 
| 1182 |  |  | 
| 1183 |  | /* SECTION: client-server.spec.rxchunk | 
| 1184 |  |  * | 
| 1185 |  |  * rxchunk | 
| 1186 |  |  *         Receive an HTTP chunk. | 
| 1187 |  |  */ | 
| 1188 |  |  | 
| 1189 |  | static void | 
| 1190 | 13 | cmd_http_rxchunk(CMD_ARGS) | 
| 1191 |  | { | 
| 1192 |  |         struct http *hp; | 
| 1193 |  |         int ll, i; | 
| 1194 |  |  | 
| 1195 | 13 |         (void)vl; | 
| 1196 | 13 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1197 | 13 |         ONLY_CLIENT(hp, av); | 
| 1198 |  |  | 
| 1199 | 13 |         i = http_rxchunk(hp); | 
| 1200 | 13 |         if (i == 0) { | 
| 1201 | 0 |                 ll = hp->rx_p - hp->body; | 
| 1202 | 0 |                 hp->bodyl = ll; | 
| 1203 | 0 |                 bprintf(hp->bodylen, "%d", ll); | 
| 1204 | 0 |                 vtc_log(hp->vl, 4, "bodylen = %s", hp->bodylen); | 
| 1205 | 0 |         } | 
| 1206 | 13 | } | 
| 1207 |  |  | 
| 1208 |  | /********************************************************************** | 
| 1209 |  |  * Transmit a request | 
| 1210 |  |  */ | 
| 1211 |  |  | 
| 1212 |  | static void | 
| 1213 | 3219 | cmd_http_txreq(CMD_ARGS) | 
| 1214 |  | { | 
| 1215 |  |         struct http *hp; | 
| 1216 | 3219 |         const char *req = "GET"; | 
| 1217 | 3219 |         const char *url = "/"; | 
| 1218 | 3219 |         const char *proto = "HTTP/1.1"; | 
| 1219 | 3219 |         const char *up = NULL; | 
| 1220 |  |         unsigned nohost; | 
| 1221 | 3219 |         unsigned nouseragent = 0; | 
| 1222 |  |  | 
| 1223 | 3219 |         (void)vl; | 
| 1224 | 3219 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1225 | 3219 |         ONLY_CLIENT(hp, av); | 
| 1226 | 3219 |         AZ(strcmp(av[0], "txreq")); | 
| 1227 | 3219 |         av++; | 
| 1228 |  |  | 
| 1229 | 3219 |         VSB_clear(hp->vsb); | 
| 1230 |  |  | 
| 1231 | 3219 |         hp->head_method = 0; | 
| 1232 | 5227 |         for (; *av != NULL; av++) { | 
| 1233 | 2924 |                 if (!strcmp(*av, "-url")) { | 
| 1234 | 1682 |                         url = av[1]; | 
| 1235 | 1682 |                         av++; | 
| 1236 | 2924 |                 } else if (!strcmp(*av, "-proto")) { | 
| 1237 | 50 |                         proto = av[1]; | 
| 1238 | 50 |                         av++; | 
| 1239 | 1242 |                 } else if (!strcmp(*av, "-method") || | 
| 1240 | 1071 |                     !strcmp(*av, "-req")) { | 
| 1241 | 271 |                         req = av[1]; | 
| 1242 | 271 |                         hp->head_method = !strcmp(av[1], "HEAD") ; | 
| 1243 | 271 |                         av++; | 
| 1244 | 1192 |                 } else if (!hp->sfd && !strcmp(*av, "-up")) { | 
| 1245 | 1 |                         up = av[1]; | 
| 1246 | 1 |                         av++; | 
| 1247 | 921 |                 } else if (!strcmp(*av, "-nouseragent")) { | 
| 1248 | 4 |                         nouseragent = 1; | 
| 1249 | 4 |                 } else | 
| 1250 | 916 |                         break; | 
| 1251 | 2008 |         } | 
| 1252 | 3219 |         VSB_printf(hp->vsb, "%s %s %s%s", req, url, proto, nl); | 
| 1253 |  |  | 
| 1254 | 3219 |         if (up) | 
| 1255 | 2 |                 VSB_printf(hp->vsb, "Connection: Upgrade, HTTP2-Settings%s" | 
| 1256 |  |                                 "Upgrade: h2c%s" | 
| 1257 | 1 |                                 "HTTP2-Settings: %s%s", nl, nl, up, nl); | 
| 1258 |  |  | 
| 1259 | 3219 |         nohost = strcmp(proto, "HTTP/1.1") != 0; | 
| 1260 | 3219 |         av = http_tx_parse_args(av, vl, hp, NULL, nohost, 1, 1, nouseragent); | 
| 1261 | 3219 |         if (*av != NULL) | 
| 1262 | 0 |                 vtc_fatal(hp->vl, "Unknown http txreq spec: %s\n", *av); | 
| 1263 | 3219 |         http_write(hp, 4, "txreq"); | 
| 1264 |  |  | 
| 1265 | 3219 |         if (up) { | 
| 1266 | 1 |                 parse_string(vl, hp, | 
| 1267 |  |                     "rxresp\n" | 
| 1268 |  |                     "expect resp.status == 101\n" | 
| 1269 |  |                     "expect resp.http.connection == Upgrade\n" | 
| 1270 |  |                     "expect resp.http.upgrade == h2c\n" | 
| 1271 |  |                     "txpri\n" | 
| 1272 |  |                 ); | 
| 1273 | 1 |                 b64_settings(hp, up); | 
| 1274 | 1 |                 parse_string(vl, hp, | 
| 1275 |  |                     "stream 0 {\n" | 
| 1276 |  |                     "    txsettings\n" | 
| 1277 |  |                     "    rxsettings\n" | 
| 1278 |  |                     "    txsettings -ack\n" | 
| 1279 |  |                     "    rxsettings\n" | 
| 1280 |  |                     "    expect settings.ack == true" | 
| 1281 |  |                     "} -start\n" | 
| 1282 |  |                 ); | 
| 1283 | 1 |         } | 
| 1284 | 3219 | } | 
| 1285 |  |  | 
| 1286 |  | /* SECTION: client-server.spec.recv | 
| 1287 |  |  * | 
| 1288 |  |  * recv NUMBER | 
| 1289 |  |  *         Read NUMBER bytes from the connection. | 
| 1290 |  |  */ | 
| 1291 |  |  | 
| 1292 |  | static void | 
| 1293 | 9 | cmd_http_recv(CMD_ARGS) | 
| 1294 |  | { | 
| 1295 |  |         struct http *hp; | 
| 1296 |  |         int i, n; | 
| 1297 |  |         char u[32]; | 
| 1298 |  |  | 
| 1299 | 9 |         (void)vl; | 
| 1300 | 9 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1301 | 9 |         AN(av[1]); | 
| 1302 | 9 |         AZ(av[2]); | 
| 1303 | 9 |         n = strtoul(av[1], NULL, 0); | 
| 1304 | 29 |         while (n > 0) { | 
| 1305 | 20 |                 i = read(hp->sess->fd, u, n > 32 ? 32 : n); | 
| 1306 | 20 |                 if (i > 0) | 
| 1307 | 20 |                         vtc_dump(hp->vl, 4, "recv", u, i); | 
| 1308 |  |                 else | 
| 1309 | 0 |                         vtc_log(hp->vl, hp->fatal, "recv() got %d (%s)", i, | 
| 1310 | 0 |                             strerror(errno)); | 
| 1311 | 20 |                 n -= i; | 
| 1312 |  |         } | 
| 1313 | 9 | } | 
| 1314 |  |  | 
| 1315 |  | /* SECTION: client-server.spec.send | 
| 1316 |  |  * | 
| 1317 |  |  * send STRING | 
| 1318 |  |  *         Push STRING on the connection. | 
| 1319 |  |  */ | 
| 1320 |  |  | 
| 1321 |  | static void | 
| 1322 | 901 | cmd_http_send(CMD_ARGS) | 
| 1323 |  | { | 
| 1324 |  |         struct http *hp; | 
| 1325 |  |         int i; | 
| 1326 |  |  | 
| 1327 | 901 |         (void)vl; | 
| 1328 | 901 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1329 | 901 |         AN(av[1]); | 
| 1330 | 901 |         AZ(av[2]); | 
| 1331 | 901 |         vtc_dump(hp->vl, 4, "send", av[1], -1); | 
| 1332 | 901 |         i = write(hp->sess->fd, av[1], strlen(av[1])); | 
| 1333 | 901 |         if (i != strlen(av[1])) | 
| 1334 | 0 |                 vtc_log(hp->vl, hp->fatal, "Write error in http_send(): %s", | 
| 1335 | 0 |                     strerror(errno)); | 
| 1336 | 901 | } | 
| 1337 |  |  | 
| 1338 |  | /* SECTION: client-server.spec.send_n | 
| 1339 |  |  * | 
| 1340 |  |  * send_n NUMBER STRING | 
| 1341 |  |  *         Write STRING on the socket NUMBER times. | 
| 1342 |  |  */ | 
| 1343 |  |  | 
| 1344 |  | static void | 
| 1345 | 4 | cmd_http_send_n(CMD_ARGS) | 
| 1346 |  | { | 
| 1347 |  |         struct http *hp; | 
| 1348 |  |         int i, n, l; | 
| 1349 |  |  | 
| 1350 | 4 |         (void)vl; | 
| 1351 | 4 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1352 | 4 |         AN(av[1]); | 
| 1353 | 4 |         AN(av[2]); | 
| 1354 | 4 |         AZ(av[3]); | 
| 1355 | 4 |         n = strtoul(av[1], NULL, 0); | 
| 1356 | 4 |                 vtc_dump(hp->vl, 4, "send_n", av[2], -1); | 
| 1357 | 4 |         l = strlen(av[2]); | 
| 1358 | 2094 |         while (n--) { | 
| 1359 | 2090 |                 i = write(hp->sess->fd, av[2], l); | 
| 1360 | 2090 |                 if (i != l) | 
| 1361 | 0 |                         vtc_log(hp->vl, hp->fatal, | 
| 1362 |  |                             "Write error in http_send(): %s", | 
| 1363 | 0 |                             strerror(errno)); | 
| 1364 |  |         } | 
| 1365 | 4 | } | 
| 1366 |  |  | 
| 1367 |  | /* SECTION: client-server.spec.send_urgent | 
| 1368 |  |  * | 
| 1369 |  |  * send_urgent STRING | 
| 1370 |  |  *         Send string as TCP OOB urgent data. You will never need this. | 
| 1371 |  |  */ | 
| 1372 |  |  | 
| 1373 |  | static void | 
| 1374 | 10 | cmd_http_send_urgent(CMD_ARGS) | 
| 1375 |  | { | 
| 1376 |  |         struct http *hp; | 
| 1377 |  |         int i; | 
| 1378 |  |  | 
| 1379 | 10 |         (void)vl; | 
| 1380 | 10 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1381 | 10 |         AN(av[1]); | 
| 1382 | 10 |         AZ(av[2]); | 
| 1383 | 10 |         vtc_dump(hp->vl, 4, "send_urgent", av[1], -1); | 
| 1384 | 10 |         i = send(hp->sess->fd, av[1], strlen(av[1]), MSG_OOB); | 
| 1385 | 10 |         if (i != strlen(av[1])) | 
| 1386 | 0 |                 vtc_log(hp->vl, hp->fatal, | 
| 1387 | 0 |                     "Write error in http_send_urgent(): %s", strerror(errno)); | 
| 1388 | 10 | } | 
| 1389 |  |  | 
| 1390 |  | /* SECTION: client-server.spec.sendhex | 
| 1391 |  |  * | 
| 1392 |  |  * sendhex STRING | 
| 1393 |  |  *         Send bytes as described by STRING. STRING should consist of hex pairs | 
| 1394 |  |  *         possibly separated by whitespace or newlines. For example: | 
| 1395 |  |  *         "0F EE a5    3df2". | 
| 1396 |  |  */ | 
| 1397 |  |  | 
| 1398 |  | static void | 
| 1399 | 179 | cmd_http_sendhex(CMD_ARGS) | 
| 1400 |  | { | 
| 1401 |  |         struct vsb *vsb; | 
| 1402 |  |         struct http *hp; | 
| 1403 |  |  | 
| 1404 | 179 |         (void)vl; | 
| 1405 | 179 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1406 | 179 |         AN(av[1]); | 
| 1407 | 179 |         AZ(av[2]); | 
| 1408 | 179 |         vsb = vtc_hex_to_bin(hp->vl, av[1]); | 
| 1409 | 179 |         assert(VSB_len(vsb) >= 0); | 
| 1410 | 179 |         vtc_hexdump(hp->vl, 4, "sendhex", VSB_data(vsb), VSB_len(vsb)); | 
| 1411 | 179 |         if (VSB_tofile(vsb, hp->sess->fd)) | 
| 1412 | 0 |                 vtc_log(hp->vl, hp->fatal, "Write failed: %s", | 
| 1413 | 0 |                     strerror(errno)); | 
| 1414 | 179 |         VSB_destroy(&vsb); | 
| 1415 | 179 | } | 
| 1416 |  |  | 
| 1417 |  | /* SECTION: client-server.spec.chunked | 
| 1418 |  |  * | 
| 1419 |  |  * chunked STRING | 
| 1420 |  |  *         Send STRING as chunked encoding. | 
| 1421 |  |  */ | 
| 1422 |  |  | 
| 1423 |  | static void | 
| 1424 | 60 | cmd_http_chunked(CMD_ARGS) | 
| 1425 |  | { | 
| 1426 |  |         struct http *hp; | 
| 1427 |  |  | 
| 1428 | 60 |         (void)vl; | 
| 1429 | 60 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1430 | 60 |         AN(av[1]); | 
| 1431 | 60 |         AZ(av[2]); | 
| 1432 | 60 |         VSB_clear(hp->vsb); | 
| 1433 | 120 |         VSB_printf(hp->vsb, "%jx%s%s%s", | 
| 1434 | 60 |             (uintmax_t)strlen(av[1]), nl, av[1], nl); | 
| 1435 | 60 |         http_write(hp, 4, "chunked"); | 
| 1436 | 60 | } | 
| 1437 |  |  | 
| 1438 |  | /* SECTION: client-server.spec.chunkedlen | 
| 1439 |  |  * | 
| 1440 |  |  * chunkedlen NUMBER | 
| 1441 |  |  *         Do as ``chunked`` except that the string will be generated | 
| 1442 |  |  *         for you, with a length of NUMBER characters. | 
| 1443 |  |  */ | 
| 1444 |  |  | 
| 1445 |  | static void | 
| 1446 | 185 | cmd_http_chunkedlen(CMD_ARGS) | 
| 1447 |  | { | 
| 1448 |  |         unsigned len; | 
| 1449 |  |         unsigned u, v; | 
| 1450 |  |         char buf[16384]; | 
| 1451 |  |         struct http *hp; | 
| 1452 |  |  | 
| 1453 | 185 |         (void)vl; | 
| 1454 | 185 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1455 | 185 |         AN(av[1]); | 
| 1456 | 185 |         AZ(av[2]); | 
| 1457 | 185 |         VSB_clear(hp->vsb); | 
| 1458 |  |  | 
| 1459 | 185 |         len = atoi(av[1]); | 
| 1460 |  |  | 
| 1461 | 185 |         if (len == 0) { | 
| 1462 | 69 |                 VSB_printf(hp->vsb, "0%s%s", nl, nl); | 
| 1463 | 69 |         } else { | 
| 1464 | 1690139 |                 for (u = 0; u < sizeof buf; u++) | 
| 1465 | 1690023 |                         buf[u] = (u & 7) + '0'; | 
| 1466 |  |  | 
| 1467 | 116 |                 VSB_printf(hp->vsb, "%x%s", len, nl); | 
| 1468 | 406 |                 for (u = 0; u < len; u += v) { | 
| 1469 | 290 |                         v = vmin_t(unsigned, len - u, sizeof buf); | 
| 1470 | 290 |                         VSB_bcat(hp->vsb, buf, v); | 
| 1471 | 290 |                 } | 
| 1472 | 116 |                 VSB_printf(hp->vsb, "%s", nl); | 
| 1473 |  |         } | 
| 1474 | 185 |         http_write(hp, 4, "chunked"); | 
| 1475 | 185 | } | 
| 1476 |  |  | 
| 1477 |  |  | 
| 1478 |  | /* SECTION: client-server.spec.timeout | 
| 1479 |  |  * | 
| 1480 |  |  * timeout NUMBER | 
| 1481 |  |  *         Set the TCP timeout for this entity. | 
| 1482 |  |  */ | 
| 1483 |  |  | 
| 1484 |  | static void | 
| 1485 | 34 | cmd_http_timeout(CMD_ARGS) | 
| 1486 |  | { | 
| 1487 |  |         struct http *hp; | 
| 1488 |  |         double d; | 
| 1489 |  |  | 
| 1490 | 34 |         (void)vl; | 
| 1491 | 34 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1492 | 34 |         AN(av[1]); | 
| 1493 | 34 |         AZ(av[2]); | 
| 1494 | 34 |         d = VNUM(av[1]); | 
| 1495 | 34 |         if (isnan(d)) | 
| 1496 | 0 |                 vtc_fatal(vl, "timeout is not a number (%s)", av[1]); | 
| 1497 | 34 |         hp->timeout = d; | 
| 1498 | 34 | } | 
| 1499 |  |  | 
| 1500 |  | /* SECTION: client-server.spec.expect_close | 
| 1501 |  |  * | 
| 1502 |  |  * expect_close | 
| 1503 |  |  *      Reads from the connection, expecting nothing to read but an EOF. | 
| 1504 |  |  */ | 
| 1505 |  | static void | 
| 1506 | 176 | cmd_http_expect_close(CMD_ARGS) | 
| 1507 |  | { | 
| 1508 |  |         struct http *hp; | 
| 1509 |  |         struct pollfd fds[1]; | 
| 1510 |  |         char c; | 
| 1511 |  |         int i; | 
| 1512 |  |  | 
| 1513 | 176 |         (void)vl; | 
| 1514 | 176 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1515 | 176 |         AZ(av[1]); | 
| 1516 |  |  | 
| 1517 | 176 |         vtc_log(vl, 4, "Expecting close (fd = %d)", hp->sess->fd); | 
| 1518 | 176 |         if (hp->h2) | 
| 1519 | 14 |                 stop_h2(hp); | 
| 1520 | 176 |         while (1) { | 
| 1521 | 176 |                 fds[0].fd = hp->sess->fd; | 
| 1522 | 176 |                 fds[0].events = POLLIN; | 
| 1523 | 176 |                 fds[0].revents = 0; | 
| 1524 | 176 |                 i = poll(fds, 1, (int)(hp->timeout * 1000)); | 
| 1525 | 176 |                 if (i < 0 && errno == EINTR) | 
| 1526 | 0 |                         continue; | 
| 1527 | 176 |                 if (i == 0) | 
| 1528 | 0 |                         vtc_log(vl, hp->fatal, "Expected close: timeout"); | 
| 1529 | 176 |                 if (i != 1 || !(fds[0].revents & (POLLIN|POLLERR|POLLHUP))) | 
| 1530 | 8 |                         vtc_log(vl, hp->fatal, | 
| 1531 |  |                             "Expected close: poll = %d, revents = 0x%x", | 
| 1532 | 4 |                             i, fds[0].revents); | 
| 1533 | 172 |                 i = read(hp->sess->fd, &c, 1); | 
| 1534 | 172 |                 if (i <= 0 && VTCP_Check(i)) | 
| 1535 | 172 |                         break; | 
| 1536 | 4 |                 if (i == 1 && vct_islws(c)) | 
| 1537 | 0 |                         continue; | 
| 1538 | 0 |                 vtc_log(vl, hp->fatal, | 
| 1539 | 0 |                     "Expecting close: read = %d, c = 0x%02x", i, c); | 
| 1540 |  |         } | 
| 1541 | 172 |         vtc_log(vl, 4, "fd=%d EOF, as expected", hp->sess->fd); | 
| 1542 | 172 | } | 
| 1543 |  |  | 
| 1544 |  | /* SECTION: client-server.spec.close | 
| 1545 |  |  * | 
| 1546 |  |  * close (server only) | 
| 1547 |  |  *      Close the connection. Note that if operating in HTTP/2 mode no | 
| 1548 |  |  *      extra (GOAWAY) frame is sent, it's simply a TCP close. | 
| 1549 |  |  */ | 
| 1550 |  | static void | 
| 1551 | 19 | cmd_http_close(CMD_ARGS) | 
| 1552 |  | { | 
| 1553 |  |         struct http *hp; | 
| 1554 |  |  | 
| 1555 | 19 |         (void)vl; | 
| 1556 | 19 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1557 | 19 |         ONLY_SERVER(hp, av); | 
| 1558 | 19 |         AZ(av[1]); | 
| 1559 | 19 |         assert(hp->sfd != NULL); | 
| 1560 | 19 |         assert(*hp->sfd >= 0); | 
| 1561 | 19 |         if (hp->h2) | 
| 1562 | 0 |                 stop_h2(hp); | 
| 1563 | 19 |         VTCP_close(&hp->sess->fd); | 
| 1564 | 19 |         vtc_log(vl, 4, "Closed"); | 
| 1565 | 19 | } | 
| 1566 |  |  | 
| 1567 |  | /* SECTION: client-server.spec.accept | 
| 1568 |  |  * | 
| 1569 |  |  * accept (server only) | 
| 1570 |  |  *      Close the current connection, if any, and accept a new one. Note | 
| 1571 |  |  *      that this new connection is HTTP/1.x. | 
| 1572 |  |  */ | 
| 1573 |  | static void | 
| 1574 | 162 | cmd_http_accept(CMD_ARGS) | 
| 1575 |  | { | 
| 1576 |  |         struct http *hp; | 
| 1577 |  |  | 
| 1578 | 162 |         (void)vl; | 
| 1579 | 162 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1580 | 162 |         ONLY_SERVER(hp, av); | 
| 1581 | 162 |         AZ(av[1]); | 
| 1582 | 162 |         assert(hp->sfd != NULL); | 
| 1583 | 162 |         assert(*hp->sfd >= 0); | 
| 1584 | 162 |         if (hp->h2) | 
| 1585 | 0 |                 stop_h2(hp); | 
| 1586 | 162 |         if (hp->sess->fd >= 0) | 
| 1587 | 144 |                 VTCP_close(&hp->sess->fd); | 
| 1588 | 162 |         vtc_log(vl, 4, "Accepting"); | 
| 1589 | 162 |         hp->sess->fd = accept(*hp->sfd, NULL, NULL); | 
| 1590 | 162 |         if (hp->sess->fd < 0) | 
| 1591 | 0 |                 vtc_log(vl, hp->fatal, "Accepted failed: %s", strerror(errno)); | 
| 1592 | 162 |         vtc_log(vl, 3, "Accepted socket fd is %d", hp->sess->fd); | 
| 1593 | 162 | } | 
| 1594 |  |  | 
| 1595 |  | /* SECTION: client-server.spec.shutdown | 
| 1596 |  |  * | 
| 1597 |  |  * shutdown | 
| 1598 |  |  *      Initiate shutdown. | 
| 1599 |  |  * | 
| 1600 |  |  *      \-read | 
| 1601 |  |  *              Shutdown the read direction. | 
| 1602 |  |  *      \-write | 
| 1603 |  |  *              Shutdown the write direction. | 
| 1604 |  |  * | 
| 1605 |  |  *      The default is both direction. | 
| 1606 |  |  */ | 
| 1607 |  | static void | 
| 1608 | 10 | cmd_http_shutdown(CMD_ARGS) | 
| 1609 |  | { | 
| 1610 |  |         struct http *hp; | 
| 1611 | 10 |         int how = SHUT_RDWR; | 
| 1612 | 10 |         const char *str[] = { | 
| 1613 |  |                 [SHUT_RD]       = "RD", | 
| 1614 |  |                 [SHUT_WR]       = "WR", | 
| 1615 |  |                 [SHUT_RDWR]     = "RDWR", | 
| 1616 |  |         }; | 
| 1617 |  |  | 
| 1618 | 10 |         (void)vl; | 
| 1619 | 10 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1620 | 10 |         AZ(strcmp(av[0], "shutdown")); | 
| 1621 | 10 |         av++; | 
| 1622 |  |  | 
| 1623 | 10 |         if (*av != NULL) { | 
| 1624 | 8 |                 if (!strcmp(*av, "-read")) { | 
| 1625 | 2 |                         how = SHUT_RD; | 
| 1626 | 2 |                         av++; | 
| 1627 | 8 |                 } else if (!strcmp(*av, "-write")) { | 
| 1628 | 6 |                         how = SHUT_WR; | 
| 1629 | 6 |                         av++; | 
| 1630 | 6 |                 } | 
| 1631 | 8 |         } | 
| 1632 |  |  | 
| 1633 | 10 |         if (*av != NULL) | 
| 1634 | 0 |                 vtc_fatal(hp->vl, "Unknown http shutdown spec: %s\n", *av); | 
| 1635 |  |  | 
| 1636 | 10 |         vtc_log(vl, 4, "Shutting down fd (%s): %d", str[how], hp->sess->fd); | 
| 1637 | 10 |         if (shutdown(hp->sess->fd, how) < 0) | 
| 1638 | 0 |                 vtc_log(vl, hp->fatal, "Shutdown failed: %s", strerror(errno)); | 
| 1639 | 10 |         vtc_log(vl, 3, "Shutdown socket fd (%d): %d", how, hp->sess->fd); | 
| 1640 | 10 | } | 
| 1641 |  |  | 
| 1642 |  | /* SECTION: client-server.spec.fatal | 
| 1643 |  |  * | 
| 1644 |  |  * fatal|non_fatal | 
| 1645 |  |  *         Control whether a failure of this entity should stop the test. | 
| 1646 |  |  */ | 
| 1647 |  |  | 
| 1648 |  | static void | 
| 1649 | 415 | cmd_http_fatal(CMD_ARGS) | 
| 1650 |  | { | 
| 1651 |  |         struct http *hp; | 
| 1652 | 415 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1653 |  |  | 
| 1654 | 415 |         (void)vl; | 
| 1655 | 415 |         AZ(av[1]); | 
| 1656 | 415 |         if (!strcmp(av[0], "fatal")) { | 
| 1657 | 20 |                 hp->fatal = 0; | 
| 1658 | 20 |         } else { | 
| 1659 | 395 |                 assert(!strcmp(av[0], "non_fatal")); | 
| 1660 | 395 |                 hp->fatal = -1; | 
| 1661 |  |         } | 
| 1662 | 415 | } | 
| 1663 |  |  | 
| 1664 |  | #define cmd_http_non_fatal cmd_http_fatal | 
| 1665 |  |  | 
| 1666 |  | static const char PREFACE[24] = { | 
| 1667 |  |         0x50, 0x52, 0x49, 0x20, 0x2a, 0x20, 0x48, 0x54, | 
| 1668 |  |         0x54, 0x50, 0x2f, 0x32, 0x2e, 0x30, 0x0d, 0x0a, | 
| 1669 |  |         0x0d, 0x0a, 0x53, 0x4d, 0x0d, 0x0a, 0x0d, 0x0a | 
| 1670 |  | }; | 
| 1671 |  |  | 
| 1672 |  | /* SECTION: client-server.spec.txpri | 
| 1673 |  |  * | 
| 1674 |  |  * txpri (client only) | 
| 1675 |  |  *      Send an HTTP/2 preface ("PRI * HTTP/2.0\\r\\n\\r\\nSM\\r\\n\\r\\n") | 
| 1676 |  |  *      and set client to HTTP/2. | 
| 1677 |  |  */ | 
| 1678 |  | static void | 
| 1679 | 181 | cmd_http_txpri(CMD_ARGS) | 
| 1680 |  | { | 
| 1681 |  |         size_t l; | 
| 1682 |  |         struct http *hp; | 
| 1683 |  |  | 
| 1684 | 181 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1685 | 181 |         ONLY_CLIENT(hp, av); | 
| 1686 |  |  | 
| 1687 | 181 |         vtc_dump(hp->vl, 4, "txpri", PREFACE, sizeof(PREFACE)); | 
| 1688 |  |         /* Dribble out the preface */ | 
| 1689 | 181 |         l = write(hp->sess->fd, PREFACE, 18); | 
| 1690 | 181 |         if (l != 18) | 
| 1691 | 0 |                 vtc_log(vl, hp->fatal, "Write failed: (%zd vs %zd) %s", | 
| 1692 | 0 |                     l, sizeof(PREFACE), strerror(errno)); | 
| 1693 | 181 |         VTIM_sleep(0.01); | 
| 1694 | 181 |         l = write(hp->sess->fd, PREFACE + 18, sizeof(PREFACE) - 18); | 
| 1695 | 181 |         if (l != sizeof(PREFACE) - 18) | 
| 1696 | 0 |                 vtc_log(vl, hp->fatal, "Write failed: (%zd vs %zd) %s", | 
| 1697 | 0 |                     l, sizeof(PREFACE), strerror(errno)); | 
| 1698 |  |  | 
| 1699 | 181 |         start_h2(hp); | 
| 1700 | 181 |         AN(hp->h2); | 
| 1701 | 181 | } | 
| 1702 |  |  | 
| 1703 |  | /* SECTION: client-server.spec.rxpri | 
| 1704 |  |  * | 
| 1705 |  |  * rxpri (server only) | 
| 1706 |  |  *      Receive a preface. If valid set the server to HTTP/2, abort | 
| 1707 |  |  *      otherwise. | 
| 1708 |  |  */ | 
| 1709 |  | static void | 
| 1710 | 30 | cmd_http_rxpri(CMD_ARGS) | 
| 1711 |  | { | 
| 1712 |  |         struct http *hp; | 
| 1713 |  |  | 
| 1714 | 30 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1715 | 30 |         ONLY_SERVER(hp, av); | 
| 1716 |  |  | 
| 1717 | 30 |         hp->rx_p = hp->rx_b; | 
| 1718 | 30 |         if (!http_rxchar(hp, sizeof(PREFACE), 0)) | 
| 1719 | 0 |                 vtc_fatal(vl, "Couldn't retrieve connection preface"); | 
| 1720 | 30 |         if (memcmp(hp->rx_b, PREFACE, sizeof(PREFACE))) | 
| 1721 | 0 |                 vtc_fatal(vl, "Received invalid preface\n"); | 
| 1722 | 30 |         start_h2(hp); | 
| 1723 | 30 |         AN(hp->h2); | 
| 1724 | 30 | } | 
| 1725 |  |  | 
| 1726 |  | /* SECTION: client-server.spec.settings | 
| 1727 |  |  * | 
| 1728 |  |  * settings -dectbl INT | 
| 1729 |  |  *      Force internal HTTP/2 settings to certain values. Currently only | 
| 1730 |  |  *      support setting the decoding table size. | 
| 1731 |  |  */ | 
| 1732 |  | static void | 
| 1733 | 0 | cmd_http_settings(CMD_ARGS) | 
| 1734 |  | { | 
| 1735 |  |         uint32_t n; | 
| 1736 |  |         char *p; | 
| 1737 |  |         struct http *hp; | 
| 1738 | 0 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1739 |  |  | 
| 1740 | 0 |         if (!hp->h2) | 
| 1741 | 0 |                 vtc_fatal(hp->vl, "Only possible in H/2 mode"); | 
| 1742 |  |  | 
| 1743 | 0 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1744 |  |  | 
| 1745 | 0 |         for (; *av != NULL; av++) { | 
| 1746 | 0 |                 if (!strcmp(*av, "-dectbl")) { | 
| 1747 | 0 |                         n = strtoul(av[1], &p, 0); | 
| 1748 | 0 |                         if (*p != '\0') | 
| 1749 | 0 |                                 vtc_fatal(hp->vl, "-dectbl takes an integer as " | 
| 1750 | 0 |                                     "argument (found %s)", av[1]); | 
| 1751 | 0 |                         assert(HPK_ResizeTbl(hp->decctx, n) != hpk_err); | 
| 1752 | 0 |                         av++; | 
| 1753 | 0 |                 } else | 
| 1754 | 0 |                         vtc_fatal(vl, "Unknown settings spec: %s\n", *av); | 
| 1755 | 0 |         } | 
| 1756 | 0 | } | 
| 1757 |  |  | 
| 1758 |  | static void | 
| 1759 | 600 | cmd_http_stream(CMD_ARGS) | 
| 1760 |  | { | 
| 1761 |  |         struct http *hp; | 
| 1762 | 600 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1763 | 600 |         if (!hp->h2) { | 
| 1764 | 187 |                 vtc_log(hp->vl, 4, "Not in H/2 mode, do what's needed"); | 
| 1765 | 187 |                 if (hp->sfd) | 
| 1766 | 26 |                         parse_string(vl, hp, "rxpri"); | 
| 1767 |  |                 else | 
| 1768 | 161 |                         parse_string(vl, hp, "txpri"); | 
| 1769 | 187 |                 parse_string(vl, hp, | 
| 1770 |  |                     "stream 0 {\n" | 
| 1771 |  |                     "    txsettings\n" | 
| 1772 |  |                     "    rxsettings\n" | 
| 1773 |  |                     "    txsettings -ack\n" | 
| 1774 |  |                     "    rxsettings\n" | 
| 1775 |  |                     "    expect settings.ack == true" | 
| 1776 |  |                     "} -run\n" | 
| 1777 |  |                 ); | 
| 1778 | 187 |         } | 
| 1779 | 600 |         cmd_stream(av, hp, vl); | 
| 1780 | 600 | } | 
| 1781 |  |  | 
| 1782 |  | /* SECTION: client-server.spec.write_body | 
| 1783 |  |  * | 
| 1784 |  |  * write_body STRING | 
| 1785 |  |  *      Write the body of a request or a response to a file. By using the | 
| 1786 |  |  *      shell command, higher-level checks on the body can be performed | 
| 1787 |  |  *      (eg. XML, JSON, ...) provided that such checks can be delegated | 
| 1788 |  |  *      to an external program. | 
| 1789 |  |  */ | 
| 1790 |  | static void | 
| 1791 | 2 | cmd_http_write_body(CMD_ARGS) | 
| 1792 |  | { | 
| 1793 |  |         struct http *hp; | 
| 1794 |  |  | 
| 1795 | 2 |         (void)vl; | 
| 1796 | 2 |         CAST_OBJ_NOTNULL(hp, priv, HTTP_MAGIC); | 
| 1797 | 2 |         AN(av[0]); | 
| 1798 | 2 |         AN(av[1]); | 
| 1799 | 2 |         AZ(av[2]); | 
| 1800 | 2 |         AZ(strcmp(av[0], "write_body")); | 
| 1801 | 2 |         if (VFIL_writefile(NULL, av[1], hp->body, hp->bodyl) != 0) | 
| 1802 | 0 |                 vtc_fatal(hp->vl, "failed to write body: %s (%d)", | 
| 1803 | 0 |                     strerror(errno), errno); | 
| 1804 | 2 | } | 
| 1805 |  |  | 
| 1806 |  | /********************************************************************** | 
| 1807 |  |  * Execute HTTP specifications | 
| 1808 |  |  */ | 
| 1809 |  |  | 
| 1810 |  | const struct cmds http_cmds[] = { | 
| 1811 |  | #define CMD_HTTP(n) { #n, cmd_http_##n }, | 
| 1812 |  |         /* session */ | 
| 1813 |  |         CMD_HTTP(accept) | 
| 1814 |  |         CMD_HTTP(close) | 
| 1815 |  |         CMD_HTTP(recv) | 
| 1816 |  |         CMD_HTTP(send) | 
| 1817 |  |         CMD_HTTP(send_n) | 
| 1818 |  |         CMD_HTTP(send_urgent) | 
| 1819 |  |         CMD_HTTP(sendhex) | 
| 1820 |  |         CMD_HTTP(shutdown) | 
| 1821 |  |         CMD_HTTP(timeout) | 
| 1822 |  |  | 
| 1823 |  |         /* spec */ | 
| 1824 |  |         CMD_HTTP(fatal) | 
| 1825 |  |         CMD_HTTP(non_fatal) | 
| 1826 |  |  | 
| 1827 |  |         /* body */ | 
| 1828 |  |         CMD_HTTP(gunzip) | 
| 1829 |  |         CMD_HTTP(write_body) | 
| 1830 |  |  | 
| 1831 |  |         /* HTTP/1.x */ | 
| 1832 |  |         CMD_HTTP(chunked) | 
| 1833 |  |         CMD_HTTP(chunkedlen) | 
| 1834 |  |         CMD_HTTP(rxchunk) | 
| 1835 |  |  | 
| 1836 |  |         /* HTTP/2 */ | 
| 1837 |  |         CMD_HTTP(stream) | 
| 1838 |  |         CMD_HTTP(settings) | 
| 1839 |  |  | 
| 1840 |  |         /* client */ | 
| 1841 |  |         CMD_HTTP(rxresp) | 
| 1842 |  |         CMD_HTTP(rxrespbody) | 
| 1843 |  |         CMD_HTTP(rxresphdrs) | 
| 1844 |  |         CMD_HTTP(txpri) | 
| 1845 |  |         CMD_HTTP(txreq) | 
| 1846 |  |  | 
| 1847 |  |         /* server */ | 
| 1848 |  |         CMD_HTTP(rxpri) | 
| 1849 |  |         CMD_HTTP(rxreq) | 
| 1850 |  |         CMD_HTTP(rxreqbody) | 
| 1851 |  |         CMD_HTTP(rxreqhdrs) | 
| 1852 |  |         CMD_HTTP(txresp) | 
| 1853 |  |         CMD_HTTP(upgrade) | 
| 1854 |  |  | 
| 1855 |  |         /* expect */ | 
| 1856 |  |         CMD_HTTP(expect) | 
| 1857 |  |         CMD_HTTP(expect_close) | 
| 1858 |  |         CMD_HTTP(expect_pattern) | 
| 1859 |  | #undef CMD_HTTP | 
| 1860 |  |         { NULL, NULL } | 
| 1861 |  | }; | 
| 1862 |  |  | 
| 1863 |  | static void | 
| 1864 | 3941 | http_process_cleanup(void *arg) | 
| 1865 |  | { | 
| 1866 |  |         struct http *hp; | 
| 1867 |  |  | 
| 1868 | 3941 |         CAST_OBJ_NOTNULL(hp, arg, HTTP_MAGIC); | 
| 1869 |  |  | 
| 1870 | 3941 |         if (hp->h2) | 
| 1871 | 197 |                 stop_h2(hp); | 
| 1872 | 3941 |         VSB_destroy(&hp->vsb); | 
| 1873 | 3941 |         free(hp->rx_b); | 
| 1874 | 3941 |         free(hp->rem_ip); | 
| 1875 | 3941 |         free(hp->rem_port); | 
| 1876 | 3941 |         free(hp->rem_path); | 
| 1877 | 3941 |         FREE_OBJ(hp); | 
| 1878 | 3941 | } | 
| 1879 |  |  | 
| 1880 |  | int | 
| 1881 | 3940 | http_process(struct vtclog *vl, struct vtc_sess *vsp, const char *spec, | 
| 1882 |  |     int sock, int *sfd, const char *addr, int rcvbuf) | 
| 1883 |  | { | 
| 1884 |  |         struct http *hp; | 
| 1885 |  |         int retval, oldbuf; | 
| 1886 | 3940 |         socklen_t intlen = sizeof(int); | 
| 1887 |  |  | 
| 1888 | 3940 |         (void)sfd; | 
| 1889 | 3940 |         ALLOC_OBJ(hp, HTTP_MAGIC); | 
| 1890 | 3940 |         AN(hp); | 
| 1891 | 3940 |         hp->sess = vsp; | 
| 1892 | 3940 |         hp->sess->fd = sock; | 
| 1893 | 3940 |         hp->timeout = vtc_maxdur * .5; | 
| 1894 |  |  | 
| 1895 | 3940 |         if (rcvbuf) { | 
| 1896 |  |                 // XXX setsockopt() too late on SunOS | 
| 1897 |  |                 // https://github.com/varnishcache/varnish-cache/pull/2980#issuecomment-486214661 | 
| 1898 | 9 |                 hp->rcvbuf = rcvbuf; | 
| 1899 |  |  | 
| 1900 | 9 |                 oldbuf = 0; | 
| 1901 | 9 |                 AZ(getsockopt(hp->sess->fd, SOL_SOCKET, SO_RCVBUF, &oldbuf, &intlen)); | 
| 1902 | 9 |                 AZ(setsockopt(hp->sess->fd, SOL_SOCKET, SO_RCVBUF, &rcvbuf, intlen)); | 
| 1903 | 9 |                 AZ(getsockopt(hp->sess->fd, SOL_SOCKET, SO_RCVBUF, &rcvbuf, &intlen)); | 
| 1904 |  |  | 
| 1905 | 18 |                 vtc_log(vl, 3, "-rcvbuf fd=%d old=%d new=%d actual=%d", | 
| 1906 | 9 |                     hp->sess->fd, oldbuf, hp->rcvbuf, rcvbuf); | 
| 1907 | 9 |         } | 
| 1908 |  |  | 
| 1909 | 3940 |         hp->nrxbuf = 2048*1024; | 
| 1910 | 3940 |         hp->rx_b = malloc(hp->nrxbuf); | 
| 1911 | 3940 |         AN(hp->rx_b); | 
| 1912 | 3940 |         hp->rx_e = hp->rx_b + hp->nrxbuf; | 
| 1913 | 3940 |         hp->rx_p = hp->rx_b; | 
| 1914 | 3940 |         *hp->rx_p = '\0'; | 
| 1915 |  |  | 
| 1916 | 3940 |         hp->vsb = VSB_new_auto(); | 
| 1917 | 3940 |         AN(hp->vsb); | 
| 1918 |  |  | 
| 1919 | 3940 |         hp->sfd = sfd; | 
| 1920 |  |  | 
| 1921 | 3940 |         hp->rem_ip = malloc(VTCP_ADDRBUFSIZE); | 
| 1922 | 3940 |         AN(hp->rem_ip); | 
| 1923 |  |  | 
| 1924 | 3940 |         hp->rem_port = malloc(VTCP_PORTBUFSIZE); | 
| 1925 | 3940 |         AN(hp->rem_port); | 
| 1926 |  |  | 
| 1927 | 3940 |         hp->vl = vl; | 
| 1928 | 3940 |         vtc_log_set_cmd(hp->vl, http_cmds); | 
| 1929 | 3940 |         hp->gziplevel = 0; | 
| 1930 | 3940 |         hp->gzipresidual = -1; | 
| 1931 |  |  | 
| 1932 | 3940 |         if (*addr != '/') { | 
| 1933 | 3615 |                 VTCP_hisname(sock, hp->rem_ip, VTCP_ADDRBUFSIZE, hp->rem_port, | 
| 1934 |  |                              VTCP_PORTBUFSIZE); | 
| 1935 | 3615 |                 hp->rem_path = NULL; | 
| 1936 | 3615 |         } else { | 
| 1937 | 325 |                 strcpy(hp->rem_ip, "0.0.0.0"); | 
| 1938 | 325 |                 strcpy(hp->rem_port, "0"); | 
| 1939 | 325 |                 hp->rem_path = strdup(addr); | 
| 1940 |  |         } | 
| 1941 |  |         /* XXX: After an upgrade to HTTP/2 the cleanup of a server that is | 
| 1942 |  |          * not -wait'ed before the test resets is subject to a race where the | 
| 1943 |  |          * cleanup does not happen, so ASAN reports leaks despite the push | 
| 1944 |  |          * of a cleanup handler. To easily reproduce, remove the server wait | 
| 1945 |  |          * from a02022.vtc and run with ASAN enabled. | 
| 1946 |  |          */ | 
| 1947 | 3940 |         pthread_cleanup_push(http_process_cleanup, hp); | 
| 1948 | 3940 |         parse_string(vl, hp, spec); | 
| 1949 | 3940 |         retval = hp->sess->fd; | 
| 1950 | 3940 |         pthread_cleanup_pop(0); | 
| 1951 | 3940 |         http_process_cleanup(hp); | 
| 1952 | 3940 |         return (retval); | 
| 1953 |  | } | 
| 1954 |  |  | 
| 1955 |  | /********************************************************************** | 
| 1956 |  |  * Magic test routine | 
| 1957 |  |  * | 
| 1958 |  |  * This function brute-forces some short strings through gzip(9) to | 
| 1959 |  |  * find candidates for all possible 8 bit positions of the stopbit. | 
| 1960 |  |  * | 
| 1961 |  |  * Here is some good short output strings: | 
| 1962 |  |  * | 
| 1963 |  |  *      0 184 <e04c8d0fd604c> | 
| 1964 |  |  *      1 257 <1ea86e6cf31bf4ec3d7a86> | 
| 1965 |  |  *      2 106 <10> | 
| 1966 |  |  *      3 163 <a5e2e2e1c2e2> | 
| 1967 |  |  *      4 180 <71c5d18ec5d5d1> | 
| 1968 |  |  *      5 189 <39886d28a6d2988> | 
| 1969 |  |  *      6 118 <80000> | 
| 1970 |  |  *      7 151 <386811868> | 
| 1971 |  |  * | 
| 1972 |  |  */ | 
| 1973 |  |  | 
| 1974 |  | #if 0 | 
| 1975 |  | void xxx(void); | 
| 1976 |  |  | 
| 1977 |  | void | 
| 1978 |  | xxx(void) | 
| 1979 |  | { | 
| 1980 |  |         z_stream vz; | 
| 1981 |  |         int n; | 
| 1982 |  |         char ibuf[200]; | 
| 1983 |  |         char obuf[200]; | 
| 1984 |  |         int fl[8]; | 
| 1985 |  |         int i, j; | 
| 1986 |  |  | 
| 1987 |  |         for (n = 0; n < 8; n++) | 
| 1988 |  |                 fl[n] = 9999; | 
| 1989 |  |  | 
| 1990 |  |         memset(&vz, 0, sizeof vz); | 
| 1991 |  |  | 
| 1992 |  |         for (n = 0;  n < 999999999; n++) { | 
| 1993 |  |                 *ibuf = 0; | 
| 1994 |  |                 for (j = 0; j < 7; j++) { | 
| 1995 |  |                         snprintf(strchr(ibuf, 0), 5, "%x", | 
| 1996 |  |                             (unsigned)VRND_RandomTestable() & 0xffff); | 
| 1997 |  |                         vz.next_in = TRUST_ME(ibuf); | 
| 1998 |  |                         vz.avail_in = strlen(ibuf); | 
| 1999 |  |                         vz.next_out = TRUST_ME(obuf); | 
| 2000 |  |                         vz.avail_out = sizeof obuf; | 
| 2001 |  |                         assert(Z_OK == deflateInit2(&vz, | 
| 2002 |  |                             9, Z_DEFLATED, 31, 9, Z_DEFAULT_STRATEGY)); | 
| 2003 |  |                         assert(Z_STREAM_END == deflate(&vz, Z_FINISH)); | 
| 2004 |  |                         i = vz.stop_bit & 7; | 
| 2005 |  |                         if (fl[i] > strlen(ibuf)) { | 
| 2006 |  |                                 printf("%d %jd <%s>\n", i, vz.stop_bit, ibuf); | 
| 2007 |  |                                 fl[i] = strlen(ibuf); | 
| 2008 |  |                         } | 
| 2009 |  |                         assert(Z_OK == deflateEnd(&vz)); | 
| 2010 |  |                 } | 
| 2011 |  |         } | 
| 2012 |  |  | 
| 2013 |  |         printf("FOO\n"); | 
| 2014 |  | } | 
| 2015 |  | #endif |