puma 3.11.1 → 6.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. checksums.yaml +5 -5
  2. data/History.md +2092 -422
  3. data/LICENSE +23 -20
  4. data/README.md +301 -69
  5. data/bin/puma-wild +3 -9
  6. data/docs/architecture.md +59 -21
  7. data/docs/compile_options.md +55 -0
  8. data/docs/deployment.md +69 -58
  9. data/docs/fork_worker.md +41 -0
  10. data/docs/java_options.md +54 -0
  11. data/docs/jungle/README.md +9 -0
  12. data/docs/jungle/rc.d/README.md +74 -0
  13. data/docs/jungle/rc.d/puma +61 -0
  14. data/docs/jungle/rc.d/puma.conf +10 -0
  15. data/docs/kubernetes.md +78 -0
  16. data/docs/nginx.md +2 -2
  17. data/docs/plugins.md +26 -12
  18. data/docs/rails_dev_mode.md +28 -0
  19. data/docs/restart.md +48 -22
  20. data/docs/signals.md +13 -11
  21. data/docs/stats.md +147 -0
  22. data/docs/systemd.md +108 -117
  23. data/docs/testing_benchmarks_local_files.md +150 -0
  24. data/docs/testing_test_rackup_ci_files.md +36 -0
  25. data/ext/puma_http11/PumaHttp11Service.java +2 -2
  26. data/ext/puma_http11/ext_help.h +1 -1
  27. data/ext/puma_http11/extconf.rb +68 -3
  28. data/ext/puma_http11/http11_parser.c +106 -118
  29. data/ext/puma_http11/http11_parser.h +2 -2
  30. data/ext/puma_http11/http11_parser.java.rl +22 -38
  31. data/ext/puma_http11/http11_parser.rl +6 -4
  32. data/ext/puma_http11/http11_parser_common.rl +6 -6
  33. data/ext/puma_http11/mini_ssl.c +474 -94
  34. data/ext/puma_http11/no_ssl/PumaHttp11Service.java +15 -0
  35. data/ext/puma_http11/org/jruby/puma/Http11.java +136 -121
  36. data/ext/puma_http11/org/jruby/puma/Http11Parser.java +84 -99
  37. data/ext/puma_http11/org/jruby/puma/MiniSSL.java +251 -88
  38. data/ext/puma_http11/puma_http11.c +53 -58
  39. data/lib/puma/app/status.rb +71 -49
  40. data/lib/puma/binder.rb +257 -151
  41. data/lib/puma/cli.rb +61 -38
  42. data/lib/puma/client.rb +464 -224
  43. data/lib/puma/cluster/worker.rb +183 -0
  44. data/lib/puma/cluster/worker_handle.rb +96 -0
  45. data/lib/puma/cluster.rb +343 -239
  46. data/lib/puma/commonlogger.rb +23 -14
  47. data/lib/puma/configuration.rb +144 -96
  48. data/lib/puma/const.rb +194 -115
  49. data/lib/puma/control_cli.rb +135 -81
  50. data/lib/puma/detect.rb +34 -2
  51. data/lib/puma/dsl.rb +1092 -153
  52. data/lib/puma/error_logger.rb +113 -0
  53. data/lib/puma/events.rb +17 -111
  54. data/lib/puma/io_buffer.rb +44 -5
  55. data/lib/puma/jruby_restart.rb +2 -73
  56. data/lib/puma/json_serialization.rb +96 -0
  57. data/lib/puma/launcher/bundle_pruner.rb +104 -0
  58. data/lib/puma/launcher.rb +205 -138
  59. data/lib/puma/log_writer.rb +147 -0
  60. data/lib/puma/minissl/context_builder.rb +96 -0
  61. data/lib/puma/minissl.rb +279 -70
  62. data/lib/puma/null_io.rb +61 -2
  63. data/lib/puma/plugin/systemd.rb +90 -0
  64. data/lib/puma/plugin/tmp_restart.rb +3 -1
  65. data/lib/puma/plugin.rb +9 -13
  66. data/lib/puma/rack/builder.rb +10 -11
  67. data/lib/puma/rack/urlmap.rb +3 -1
  68. data/lib/puma/rack_default.rb +21 -4
  69. data/lib/puma/reactor.rb +97 -185
  70. data/lib/puma/request.rb +688 -0
  71. data/lib/puma/runner.rb +114 -69
  72. data/lib/puma/sd_notify.rb +146 -0
  73. data/lib/puma/server.rb +409 -704
  74. data/lib/puma/single.rb +29 -72
  75. data/lib/puma/state_file.rb +48 -9
  76. data/lib/puma/thread_pool.rb +234 -93
  77. data/lib/puma/util.rb +23 -10
  78. data/lib/puma.rb +68 -5
  79. data/lib/rack/handler/puma.rb +119 -86
  80. data/tools/Dockerfile +16 -0
  81. data/tools/trickletest.rb +0 -1
  82. metadata +55 -33
  83. data/ext/puma_http11/io_buffer.c +0 -155
  84. data/lib/puma/accept_nonblock.rb +0 -23
  85. data/lib/puma/compat.rb +0 -14
  86. data/lib/puma/convenient.rb +0 -23
  87. data/lib/puma/daemon_ext.rb +0 -31
  88. data/lib/puma/delegation.rb +0 -11
  89. data/lib/puma/java_io_buffer.rb +0 -45
  90. data/lib/puma/rack/backports/uri/common_193.rb +0 -33
  91. data/lib/puma/tcp_logger.rb +0 -39
  92. data/tools/jungle/README.md +0 -13
  93. data/tools/jungle/init.d/README.md +0 -59
  94. data/tools/jungle/init.d/puma +0 -421
  95. data/tools/jungle/init.d/run-puma +0 -18
  96. data/tools/jungle/upstart/README.md +0 -61
  97. data/tools/jungle/upstart/puma-manager.conf +0 -31
  98. data/tools/jungle/upstart/puma.conf +0 -69
data/lib/puma/client.rb CHANGED
@@ -1,3 +1,5 @@
1
+ # frozen_string_literal: true
2
+
1
3
  class IO
2
4
  # We need to use this for a jruby work around on both 1.8 and 1.9.
3
5
  # So this either creates the constant (on 1.8), or harmlessly
@@ -6,8 +8,8 @@ class IO
6
8
  end
7
9
  end
8
10
 
9
- require 'puma/detect'
10
- require 'puma/delegation'
11
+ require_relative 'detect'
12
+ require_relative 'io_buffer'
11
13
  require 'tempfile'
12
14
 
13
15
  if Puma::IS_JRUBY
@@ -21,26 +23,68 @@ module Puma
21
23
 
22
24
  class ConnectionError < RuntimeError; end
23
25
 
24
- class Client
26
+ class HttpParserError501 < IOError; end
27
+
28
+ #———————————————————————— DO NOT USE — this class is for internal use only ———
29
+
30
+
31
+ # An instance of this class represents a unique request from a client.
32
+ # For example, this could be a web request from a browser or from CURL.
33
+ #
34
+ # An instance of `Puma::Client` can be used as if it were an IO object
35
+ # by the reactor. The reactor is expected to call `#to_io`
36
+ # on any non-IO objects it polls. For example, nio4r internally calls
37
+ # `IO::try_convert` (which may call `#to_io`) when a new socket is
38
+ # registered.
39
+ #
40
+ # Instances of this class are responsible for knowing if
41
+ # the header and body are fully buffered via the `try_to_finish` method.
42
+ # They can be used to "time out" a response via the `timeout_at` reader.
43
+ #
44
+ class Client # :nodoc:
45
+
46
+ # this tests all values but the last, which must be chunked
47
+ ALLOWED_TRANSFER_ENCODING = %w[compress deflate gzip].freeze
48
+
49
+ # chunked body validation
50
+ CHUNK_SIZE_INVALID = /[^\h]/.freeze
51
+ CHUNK_VALID_ENDING = Const::LINE_END
52
+ CHUNK_VALID_ENDING_SIZE = CHUNK_VALID_ENDING.bytesize
53
+
54
+ # The maximum number of bytes we'll buffer looking for a valid
55
+ # chunk header.
56
+ MAX_CHUNK_HEADER_SIZE = 4096
57
+
58
+ # The maximum amount of excess data the client sends
59
+ # using chunk size extensions before we abort the connection.
60
+ MAX_CHUNK_EXCESS = 16 * 1024
61
+
62
+ # Content-Length header value validation
63
+ CONTENT_LENGTH_VALUE_INVALID = /[^\d]/.freeze
64
+
65
+ TE_ERR_MSG = 'Invalid Transfer-Encoding'
66
+
67
+ # The object used for a request with no body. All requests with
68
+ # no body share this one object since it has no state.
69
+ EmptyBody = NullIO.new
70
+
25
71
  include Puma::Const
26
- extend Puma::Delegation
27
72
 
28
73
  def initialize(io, env=nil)
29
74
  @io = io
30
75
  @to_io = io.to_io
76
+ @io_buffer = IOBuffer.new
31
77
  @proto_env = env
32
- if !env
33
- @env = nil
34
- else
35
- @env = env.dup
36
- end
78
+ @env = env&.dup
37
79
 
38
80
  @parser = HttpParser.new
39
81
  @parsed_bytes = 0
40
82
  @read_header = true
83
+ @read_proxy = false
41
84
  @ready = false
42
85
 
43
86
  @body = nil
87
+ @body_read_start = nil
44
88
  @buffer = nil
45
89
  @tempfile = nil
46
90
 
@@ -49,19 +93,42 @@ module Puma
49
93
  @requests_served = 0
50
94
  @hijacked = false
51
95
 
96
+ @http_content_length_limit = nil
97
+ @http_content_length_limit_exceeded = false
98
+
52
99
  @peerip = nil
100
+ @peer_family = nil
101
+ @listener = nil
53
102
  @remote_addr_header = nil
103
+ @expect_proxy_proto = false
104
+
105
+ @body_remain = 0
106
+
107
+ @in_last_chunk = false
108
+
109
+ # need unfrozen ASCII-8BIT, +'' is UTF-8
110
+ @read_buffer = String.new # rubocop: disable Performance/UnfreezeString
54
111
  end
55
112
 
56
113
  attr_reader :env, :to_io, :body, :io, :timeout_at, :ready, :hijacked,
57
- :tempfile
114
+ :tempfile, :io_buffer, :http_content_length_limit_exceeded
58
115
 
59
- attr_writer :peerip
116
+ attr_writer :peerip, :http_content_length_limit
60
117
 
61
- attr_accessor :remote_addr_header
118
+ attr_accessor :remote_addr_header, :listener
62
119
 
63
- forward :closed?, :@io
120
+ # Remove in Puma 7?
121
+ def closed?
122
+ @to_io.closed?
123
+ end
124
+
125
+ # Test to see if io meets a bare minimum of functioning, @to_io needs to be
126
+ # used for MiniSSL::Socket
127
+ def io_ok?
128
+ @to_io.is_a?(::BasicSocket) && !closed?
129
+ end
64
130
 
131
+ # @!attribute [r] inspect
65
132
  def inspect
66
133
  "#<Puma::Client:0x#{object_id.to_s(16)} @ready=#{@ready.inspect}>"
67
134
  end
@@ -73,24 +140,36 @@ module Puma
73
140
  env[HIJACK_IO] ||= @io
74
141
  end
75
142
 
143
+ # @!attribute [r] in_data_phase
76
144
  def in_data_phase
77
- !@read_header
145
+ !(@read_header || @read_proxy)
78
146
  end
79
147
 
80
148
  def set_timeout(val)
81
- @timeout_at = Time.now + val
149
+ @timeout_at = Process.clock_gettime(Process::CLOCK_MONOTONIC) + val
150
+ end
151
+
152
+ # Number of seconds until the timeout elapses.
153
+ def timeout
154
+ [@timeout_at - Process.clock_gettime(Process::CLOCK_MONOTONIC), 0].max
82
155
  end
83
156
 
84
157
  def reset(fast_check=true)
85
158
  @parser.reset
159
+ @io_buffer.reset
86
160
  @read_header = true
161
+ @read_proxy = !!@expect_proxy_proto
87
162
  @env = @proto_env.dup
88
- @body = nil
89
- @tempfile = nil
90
163
  @parsed_bytes = 0
91
164
  @ready = false
165
+ @body_remain = 0
166
+ @peerip = nil if @remote_addr_header
167
+ @in_last_chunk = false
168
+ @http_content_length_limit_exceeded = false
92
169
 
93
170
  if @buffer
171
+ return false unless try_to_parse_proxy_protocol
172
+
94
173
  @parsed_bytes = @parser.execute(@env, @buffer, @parsed_bytes)
95
174
 
96
175
  if @parser.finished?
@@ -101,122 +180,185 @@ module Puma
101
180
  end
102
181
 
103
182
  return false
104
- elsif fast_check &&
105
- IO.select([@to_io], nil, nil, FAST_TRACK_KA_TIMEOUT)
106
- return try_to_finish
183
+ else
184
+ begin
185
+ if fast_check && @to_io.wait_readable(FAST_TRACK_KA_TIMEOUT)
186
+ return try_to_finish
187
+ end
188
+ rescue IOError
189
+ # swallow it
190
+ end
107
191
  end
108
192
  end
109
193
 
110
194
  def close
195
+ tempfile_close
111
196
  begin
112
197
  @io.close
113
- rescue IOError
114
- Thread.current.purge_interrupt_queue if Thread.current.respond_to? :purge_interrupt_queue
198
+ rescue IOError, Errno::EBADF
199
+ Puma::Util.purge_interrupt_queue
115
200
  end
116
201
  end
117
202
 
118
- # The object used for a request with no body. All requests with
119
- # no body share this one object since it has no state.
120
- EmptyBody = NullIO.new
203
+ def tempfile_close
204
+ tf_path = @tempfile&.path
205
+ @tempfile&.close
206
+ File.unlink(tf_path) if tf_path
207
+ @tempfile = nil
208
+ @body = nil
209
+ rescue Errno::ENOENT, IOError
210
+ end
121
211
 
122
- def setup_chunked_body(body)
123
- @chunked_body = true
124
- @partial_part_left = 0
125
- @prev_chunk = ""
212
+ # If necessary, read the PROXY protocol from the buffer. Returns
213
+ # false if more data is needed.
214
+ def try_to_parse_proxy_protocol
215
+ if @read_proxy
216
+ if @expect_proxy_proto == :v1
217
+ if @buffer.include? "\r\n"
218
+ if md = PROXY_PROTOCOL_V1_REGEX.match(@buffer)
219
+ if md[1]
220
+ @peerip = md[1].split(" ")[0]
221
+ end
222
+ @buffer = md.post_match
223
+ end
224
+ # if the buffer has a \r\n but doesn't have a PROXY protocol
225
+ # request, this is just HTTP from a non-PROXY client; move on
226
+ @read_proxy = false
227
+ return @buffer.size > 0
228
+ else
229
+ return false
230
+ end
231
+ end
232
+ end
233
+ true
234
+ end
126
235
 
127
- @body = Tempfile.new(Const::PUMA_TMP_BASE)
128
- @body.binmode
129
- @tempfile = @body
236
+ def try_to_finish
237
+ if env[CONTENT_LENGTH] && above_http_content_limit(env[CONTENT_LENGTH].to_i)
238
+ @http_content_length_limit_exceeded = true
239
+ end
130
240
 
131
- return decode_chunk(body)
132
- end
241
+ if @http_content_length_limit_exceeded
242
+ @buffer = nil
243
+ @body = EmptyBody
244
+ set_ready
245
+ return true
246
+ end
133
247
 
134
- def decode_chunk(chunk)
135
- if @partial_part_left > 0
136
- if @partial_part_left <= chunk.size
137
- @body << chunk[0..(@partial_part_left-3)] # skip the \r\n
138
- chunk = chunk[@partial_part_left..-1]
139
- else
140
- @body << chunk
141
- @partial_part_left -= chunk.size
142
- return false
143
- end
248
+ return read_body if in_data_phase
249
+
250
+ data = nil
251
+ begin
252
+ data = @io.read_nonblock(CHUNK_SIZE)
253
+ rescue IO::WaitReadable
254
+ return false
255
+ rescue EOFError
256
+ # Swallow error, don't log
257
+ rescue SystemCallError, IOError
258
+ raise ConnectionError, "Connection error detected during read"
144
259
  end
145
260
 
146
- if @prev_chunk.empty?
147
- io = StringIO.new(chunk)
261
+ # No data means a closed socket
262
+ unless data
263
+ @buffer = nil
264
+ set_ready
265
+ raise EOFError
266
+ end
267
+
268
+ if @buffer
269
+ @buffer << data
148
270
  else
149
- io = StringIO.new(@prev_chunk+chunk)
150
- @prev_chunk = ""
271
+ @buffer = data
151
272
  end
152
273
 
153
- while !io.eof?
154
- line = io.gets
155
- if line.end_with?("\r\n")
156
- len = line.strip.to_i(16)
157
- if len == 0
158
- @body.rewind
159
- rest = io.read
160
- @buffer = rest.empty? ? nil : rest
161
- @requests_served += 1
162
- @ready = true
163
- return true
164
- end
274
+ return false unless try_to_parse_proxy_protocol
165
275
 
166
- len += 2
276
+ @parsed_bytes = @parser.execute(@env, @buffer, @parsed_bytes)
167
277
 
168
- part = io.read(len)
278
+ if @parser.finished? && above_http_content_limit(@parser.body.bytesize)
279
+ @http_content_length_limit_exceeded = true
280
+ end
169
281
 
170
- unless part
171
- @partial_part_left = len
172
- next
173
- end
282
+ if @parser.finished?
283
+ return setup_body
284
+ elsif @parsed_bytes >= MAX_HEADER
285
+ raise HttpParserError,
286
+ "HEADER is longer than allowed, aborting client early."
287
+ end
174
288
 
175
- got = part.size
289
+ false
290
+ end
176
291
 
177
- case
178
- when got == len
179
- @body << part[0..-3] # to skip the ending \r\n
180
- when got <= len - 2
181
- @body << part
182
- @partial_part_left = len - part.size
183
- when got == len - 1 # edge where we get just \r but not \n
184
- @body << part[0..-2]
185
- @partial_part_left = len - part.size
186
- end
187
- else
188
- @prev_chunk = line
189
- return false
190
- end
292
+ def eagerly_finish
293
+ return true if @ready
294
+ return false unless @to_io.wait_readable(0)
295
+ try_to_finish
296
+ end
297
+
298
+ def finish(timeout)
299
+ return if @ready
300
+ @to_io.wait_readable(timeout) || timeout! until try_to_finish
301
+ end
302
+
303
+ def timeout!
304
+ write_error(408) if in_data_phase
305
+ raise ConnectionError
306
+ end
307
+
308
+ def write_error(status_code)
309
+ begin
310
+ @io << ERROR_RESPONSE[status_code]
311
+ rescue StandardError
312
+ end
313
+ end
314
+
315
+ def peerip
316
+ return @peerip if @peerip
317
+
318
+ if @remote_addr_header
319
+ hdr = (@env[@remote_addr_header] || @io.peeraddr.last).split(/[\s,]/).first
320
+ @peerip = hdr
321
+ return hdr
191
322
  end
192
323
 
193
- return false
324
+ @peerip ||= @io.peeraddr.last
194
325
  end
195
326
 
196
- def read_chunked_body
197
- while true
198
- begin
199
- chunk = @io.read_nonblock(4096)
200
- rescue Errno::EAGAIN
201
- return false
202
- rescue SystemCallError, IOError
203
- raise ConnectionError, "Connection error detected during read"
204
- end
327
+ def peer_family
328
+ return @peer_family if @peer_family
205
329
 
206
- # No chunk means a closed socket
207
- unless chunk
208
- @body.close
209
- @buffer = nil
210
- @requests_served += 1
211
- @ready = true
212
- raise EOFError
213
- end
330
+ @peer_family ||= begin
331
+ @io.local_address.afamily
332
+ rescue
333
+ Socket::AF_INET
334
+ end
335
+ end
214
336
 
215
- return true if decode_chunk(chunk)
337
+ # Returns true if the persistent connection can be closed immediately
338
+ # without waiting for the configured idle/shutdown timeout.
339
+ # @version 5.0.0
340
+ #
341
+ def can_close?
342
+ # Allow connection to close if we're not in the middle of parsing a request.
343
+ @parsed_bytes == 0
344
+ end
345
+
346
+ def expect_proxy_proto=(val)
347
+ if val
348
+ if @read_header
349
+ @read_proxy = true
350
+ end
351
+ else
352
+ @read_proxy = false
216
353
  end
354
+ @expect_proxy_proto = val
217
355
  end
218
356
 
357
+ private
358
+
219
359
  def setup_body
360
+ @body_read_start = Process.clock_gettime(Process::CLOCK_MONOTONIC, :float_millisecond)
361
+
220
362
  if @env[HTTP_EXPECT] == CONTINUE
221
363
  # TODO allow a hook here to check the headers before
222
364
  # going forward
@@ -229,35 +371,73 @@ module Puma
229
371
  body = @parser.body
230
372
 
231
373
  te = @env[TRANSFER_ENCODING2]
232
-
233
- if te && CHUNKED.casecmp(te) == 0
234
- return setup_chunked_body(body)
374
+ if te
375
+ te_lwr = te.downcase
376
+ if te.include? ','
377
+ te_ary = te_lwr.split ','
378
+ te_count = te_ary.count CHUNKED
379
+ te_valid = te_ary[0..-2].all? { |e| ALLOWED_TRANSFER_ENCODING.include? e }
380
+ if te_ary.last == CHUNKED && te_count == 1 && te_valid
381
+ @env.delete TRANSFER_ENCODING2
382
+ return setup_chunked_body body
383
+ elsif te_count >= 1
384
+ raise HttpParserError , "#{TE_ERR_MSG}, multiple chunked: '#{te}'"
385
+ elsif !te_valid
386
+ raise HttpParserError501, "#{TE_ERR_MSG}, unknown value: '#{te}'"
387
+ end
388
+ elsif te_lwr == CHUNKED
389
+ @env.delete TRANSFER_ENCODING2
390
+ return setup_chunked_body body
391
+ elsif ALLOWED_TRANSFER_ENCODING.include? te_lwr
392
+ raise HttpParserError , "#{TE_ERR_MSG}, single value must be chunked: '#{te}'"
393
+ else
394
+ raise HttpParserError501 , "#{TE_ERR_MSG}, unknown value: '#{te}'"
395
+ end
235
396
  end
236
397
 
237
398
  @chunked_body = false
238
399
 
239
400
  cl = @env[CONTENT_LENGTH]
240
401
 
241
- unless cl
402
+ if cl
403
+ # cannot contain characters that are not \d, or be empty
404
+ if CONTENT_LENGTH_VALUE_INVALID.match?(cl) || cl.empty?
405
+ raise HttpParserError, "Invalid Content-Length: #{cl.inspect}"
406
+ end
407
+ else
242
408
  @buffer = body.empty? ? nil : body
243
409
  @body = EmptyBody
244
- @requests_served += 1
245
- @ready = true
410
+ set_ready
246
411
  return true
247
412
  end
248
413
 
249
- remain = cl.to_i - body.bytesize
414
+ content_length = cl.to_i
415
+
416
+ remain = content_length - body.bytesize
250
417
 
251
418
  if remain <= 0
252
- @body = StringIO.new(body)
253
- @buffer = nil
254
- @requests_served += 1
255
- @ready = true
419
+ # Part of the body is a pipelined request OR garbage. We'll deal with that later.
420
+ if content_length == 0
421
+ @body = EmptyBody
422
+ if body.empty?
423
+ @buffer = nil
424
+ else
425
+ @buffer = body
426
+ end
427
+ elsif remain == 0
428
+ @body = StringIO.new body
429
+ @buffer = nil
430
+ else
431
+ @body = StringIO.new(body[0,content_length])
432
+ @buffer = body[content_length..-1]
433
+ end
434
+ set_ready
256
435
  return true
257
436
  end
258
437
 
259
438
  if remain > MAX_BODY
260
- @body = Tempfile.new(Const::PUMA_TMP_BASE)
439
+ @body = Tempfile.create(Const::PUMA_TMP_BASE)
440
+ File.unlink @body.path unless IS_WINDOWS
261
441
  @body.binmode
262
442
  @tempfile = @body
263
443
  else
@@ -270,95 +450,9 @@ module Puma
270
450
 
271
451
  @body_remain = remain
272
452
 
273
- return false
274
- end
275
-
276
- def try_to_finish
277
- return read_body unless @read_header
278
-
279
- begin
280
- data = @io.read_nonblock(CHUNK_SIZE)
281
- rescue Errno::EAGAIN
282
- return false
283
- rescue SystemCallError, IOError
284
- raise ConnectionError, "Connection error detected during read"
285
- end
286
-
287
- if @buffer
288
- @buffer << data
289
- else
290
- @buffer = data
291
- end
292
-
293
- @parsed_bytes = @parser.execute(@env, @buffer, @parsed_bytes)
294
-
295
- if @parser.finished?
296
- return setup_body
297
- elsif @parsed_bytes >= MAX_HEADER
298
- raise HttpParserError,
299
- "HEADER is longer than allowed, aborting client early."
300
- end
301
-
302
453
  false
303
454
  end
304
455
 
305
- if IS_JRUBY
306
- def jruby_start_try_to_finish
307
- return read_body unless @read_header
308
-
309
- begin
310
- data = @io.sysread_nonblock(CHUNK_SIZE)
311
- rescue OpenSSL::SSL::SSLError => e
312
- return false if e.kind_of? IO::WaitReadable
313
- raise e
314
- end
315
-
316
- if @buffer
317
- @buffer << data
318
- else
319
- @buffer = data
320
- end
321
-
322
- @parsed_bytes = @parser.execute(@env, @buffer, @parsed_bytes)
323
-
324
- if @parser.finished?
325
- return setup_body
326
- elsif @parsed_bytes >= MAX_HEADER
327
- raise HttpParserError,
328
- "HEADER is longer than allowed, aborting client early."
329
- end
330
-
331
- false
332
- end
333
-
334
- def eagerly_finish
335
- return true if @ready
336
-
337
- if @io.kind_of? OpenSSL::SSL::SSLSocket
338
- return true if jruby_start_try_to_finish
339
- end
340
-
341
- return false unless IO.select([@to_io], nil, nil, 0)
342
- try_to_finish
343
- end
344
-
345
- else
346
-
347
- def eagerly_finish
348
- return true if @ready
349
- return false unless IO.select([@to_io], nil, nil, 0)
350
- try_to_finish
351
- end
352
- end # IS_JRUBY
353
-
354
- def finish
355
- return true if @ready
356
- until try_to_finish
357
- IO.select([@to_io], nil, nil)
358
- end
359
- true
360
- end
361
-
362
456
  def read_body
363
457
  if @chunked_body
364
458
  return read_chunked_body
@@ -375,8 +469,8 @@ module Puma
375
469
  end
376
470
 
377
471
  begin
378
- chunk = @io.read_nonblock(want)
379
- rescue Errno::EAGAIN
472
+ chunk = @io.read_nonblock(want, @read_buffer)
473
+ rescue IO::WaitReadable
380
474
  return false
381
475
  rescue SystemCallError, IOError
382
476
  raise ConnectionError, "Connection error detected during read"
@@ -386,8 +480,7 @@ module Puma
386
480
  unless chunk
387
481
  @body.close
388
482
  @buffer = nil
389
- @requests_served += 1
390
- @ready = true
483
+ set_ready
391
484
  raise EOFError
392
485
  end
393
486
 
@@ -396,8 +489,7 @@ module Puma
396
489
  if remain <= 0
397
490
  @body.rewind
398
491
  @buffer = nil
399
- @requests_served += 1
400
- @ready = true
492
+ set_ready
401
493
  return true
402
494
  end
403
495
 
@@ -406,37 +498,185 @@ module Puma
406
498
  false
407
499
  end
408
500
 
409
- def write_400
410
- begin
411
- @io << ERROR_400_RESPONSE
412
- rescue StandardError
501
+ def read_chunked_body
502
+ while true
503
+ begin
504
+ chunk = @io.read_nonblock(CHUNK_SIZE, @read_buffer)
505
+ rescue IO::WaitReadable
506
+ return false
507
+ rescue SystemCallError, IOError
508
+ raise ConnectionError, "Connection error detected during read"
509
+ end
510
+
511
+ # No chunk means a closed socket
512
+ unless chunk
513
+ @body.close
514
+ @buffer = nil
515
+ set_ready
516
+ raise EOFError
517
+ end
518
+
519
+ if decode_chunk(chunk)
520
+ @env[CONTENT_LENGTH] = @chunked_content_length.to_s
521
+ return true
522
+ end
413
523
  end
414
524
  end
415
525
 
416
- def write_408
417
- begin
418
- @io << ERROR_408_RESPONSE
419
- rescue StandardError
526
+ def setup_chunked_body(body)
527
+ @chunked_body = true
528
+ @partial_part_left = 0
529
+ @prev_chunk = ""
530
+ @excess_cr = 0
531
+
532
+ @body = Tempfile.create(Const::PUMA_TMP_BASE)
533
+ File.unlink @body.path unless IS_WINDOWS
534
+ @body.binmode
535
+ @tempfile = @body
536
+ @chunked_content_length = 0
537
+
538
+ if decode_chunk(body)
539
+ @env[CONTENT_LENGTH] = @chunked_content_length.to_s
540
+ return true
420
541
  end
421
542
  end
422
543
 
423
- def write_500
424
- begin
425
- @io << ERROR_500_RESPONSE
426
- rescue StandardError
427
- end
544
+ # @version 5.0.0
545
+ def write_chunk(str)
546
+ @chunked_content_length += @body.write(str)
428
547
  end
429
548
 
430
- def peerip
431
- return @peerip if @peerip
549
+ def decode_chunk(chunk)
550
+ if @partial_part_left > 0
551
+ if @partial_part_left <= chunk.size
552
+ if @partial_part_left > 2
553
+ write_chunk(chunk[0..(@partial_part_left-3)]) # skip the \r\n
554
+ end
555
+ chunk = chunk[@partial_part_left..-1]
556
+ @partial_part_left = 0
557
+ else
558
+ if @partial_part_left > 2
559
+ if @partial_part_left == chunk.size + 1
560
+ # Don't include the last \r
561
+ write_chunk(chunk[0..(@partial_part_left-3)])
562
+ else
563
+ # don't include the last \r\n
564
+ write_chunk(chunk)
565
+ end
566
+ end
567
+ @partial_part_left -= chunk.size
568
+ return false
569
+ end
570
+ end
432
571
 
433
- if @remote_addr_header
434
- hdr = (@env[@remote_addr_header] || LOCALHOST_ADDR).split(/[\s,]/).first
435
- @peerip = hdr
436
- return hdr
572
+ if @prev_chunk.empty?
573
+ io = StringIO.new(chunk)
574
+ else
575
+ io = StringIO.new(@prev_chunk+chunk)
576
+ @prev_chunk = ""
437
577
  end
438
578
 
439
- @peerip ||= @io.peeraddr.last
579
+ while !io.eof?
580
+ line = io.gets
581
+ if line.end_with?(CHUNK_VALID_ENDING)
582
+ # Puma doesn't process chunk extensions, but should parse if they're
583
+ # present, which is the reason for the semicolon regex
584
+ chunk_hex = line.strip[/\A[^;]+/]
585
+ if CHUNK_SIZE_INVALID.match? chunk_hex
586
+ raise HttpParserError, "Invalid chunk size: '#{chunk_hex}'"
587
+ end
588
+ len = chunk_hex.to_i(16)
589
+ if len == 0
590
+ @in_last_chunk = true
591
+ @body.rewind
592
+ rest = io.read
593
+ if rest.bytesize < CHUNK_VALID_ENDING_SIZE
594
+ @buffer = nil
595
+ @partial_part_left = CHUNK_VALID_ENDING_SIZE - rest.bytesize
596
+ return false
597
+ else
598
+ # if the next character is a CRLF, set buffer to everything after that CRLF
599
+ start_of_rest = if rest.start_with?(CHUNK_VALID_ENDING)
600
+ CHUNK_VALID_ENDING_SIZE
601
+ else # we have started a trailer section, which we do not support. skip it!
602
+ rest.index(CHUNK_VALID_ENDING*2) + CHUNK_VALID_ENDING_SIZE*2
603
+ end
604
+
605
+ @buffer = rest[start_of_rest..-1]
606
+ @buffer = nil if @buffer.empty?
607
+ set_ready
608
+ return true
609
+ end
610
+ end
611
+
612
+ # Track the excess as a function of the size of the
613
+ # header vs the size of the actual data. Excess can
614
+ # go negative (and is expected to) when the body is
615
+ # significant.
616
+ # The additional of chunk_hex.size and 2 compensates
617
+ # for a client sending 1 byte in a chunked body over
618
+ # a long period of time, making sure that that client
619
+ # isn't accidentally eventually punished.
620
+ @excess_cr += (line.size - len - chunk_hex.size - 2)
621
+
622
+ if @excess_cr >= MAX_CHUNK_EXCESS
623
+ raise HttpParserError, "Maximum chunk excess detected"
624
+ end
625
+
626
+ len += 2
627
+
628
+ part = io.read(len)
629
+
630
+ unless part
631
+ @partial_part_left = len
632
+ next
633
+ end
634
+
635
+ got = part.size
636
+
637
+ case
638
+ when got == len
639
+ # proper chunked segment must end with "\r\n"
640
+ if part.end_with? CHUNK_VALID_ENDING
641
+ write_chunk(part[0..-3]) # to skip the ending \r\n
642
+ else
643
+ raise HttpParserError, "Chunk size mismatch"
644
+ end
645
+ when got <= len - 2
646
+ write_chunk(part)
647
+ @partial_part_left = len - part.size
648
+ when got == len - 1 # edge where we get just \r but not \n
649
+ write_chunk(part[0..-2])
650
+ @partial_part_left = len - part.size
651
+ end
652
+ else
653
+ if @prev_chunk.size + line.size >= MAX_CHUNK_HEADER_SIZE
654
+ raise HttpParserError, "maximum size of chunk header exceeded"
655
+ end
656
+
657
+ @prev_chunk = line
658
+ return false
659
+ end
660
+ end
661
+
662
+ if @in_last_chunk
663
+ set_ready
664
+ true
665
+ else
666
+ false
667
+ end
668
+ end
669
+
670
+ def set_ready
671
+ if @body_read_start
672
+ @env['puma.request_body_wait'] = Process.clock_gettime(Process::CLOCK_MONOTONIC, :float_millisecond) - @body_read_start
673
+ end
674
+ @requests_served += 1
675
+ @ready = true
676
+ end
677
+
678
+ def above_http_content_limit(value)
679
+ @http_content_length_limit&.< value
440
680
  end
441
681
  end
442
682
  end