unicorn-shopify 4.8.2.5.23
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.CHANGELOG.old +25 -0
- data/.document +28 -0
- data/.gitignore +25 -0
- data/.mailmap +26 -0
- data/.olddoc.yml +15 -0
- data/Application_Timeouts +77 -0
- data/CONTRIBUTORS +35 -0
- data/COPYING +674 -0
- data/DESIGN +97 -0
- data/Documentation/.gitignore +5 -0
- data/Documentation/GNUmakefile +30 -0
- data/Documentation/unicorn.1.txt +185 -0
- data/Documentation/unicorn_rails.1.txt +175 -0
- data/FAQ +61 -0
- data/GIT-VERSION-GEN +39 -0
- data/GNUmakefile +252 -0
- data/HACKING +120 -0
- data/ISSUES +100 -0
- data/KNOWN_ISSUES +79 -0
- data/LICENSE +67 -0
- data/Links +59 -0
- data/PHILOSOPHY +145 -0
- data/README +145 -0
- data/Rakefile +16 -0
- data/SIGNALS +123 -0
- data/Sandbox +103 -0
- data/TODO +5 -0
- data/TUNING +101 -0
- data/archive/.gitignore +3 -0
- data/archive/slrnpull.conf +4 -0
- data/bin/unicorn +126 -0
- data/bin/unicorn_rails +209 -0
- data/examples/big_app_gc.rb +2 -0
- data/examples/echo.ru +27 -0
- data/examples/init.sh +74 -0
- data/examples/logger_mp_safe.rb +25 -0
- data/examples/logrotate.conf +29 -0
- data/examples/nginx.conf +156 -0
- data/examples/unicorn.conf.minimal.rb +13 -0
- data/examples/unicorn.conf.rb +113 -0
- data/ext/unicorn_http/CFLAGS +13 -0
- data/ext/unicorn_http/c_util.h +124 -0
- data/ext/unicorn_http/common_field_optimization.h +111 -0
- data/ext/unicorn_http/ext_help.h +82 -0
- data/ext/unicorn_http/extconf.rb +10 -0
- data/ext/unicorn_http/global_variables.h +97 -0
- data/ext/unicorn_http/httpdate.c +78 -0
- data/ext/unicorn_http/unicorn_http.rl +934 -0
- data/ext/unicorn_http/unicorn_http_common.rl +76 -0
- data/lib/unicorn.rb +112 -0
- data/lib/unicorn/app/old_rails.rb +35 -0
- data/lib/unicorn/app/old_rails/static.rb +59 -0
- data/lib/unicorn/cgi_wrapper.rb +147 -0
- data/lib/unicorn/configurator.rb +686 -0
- data/lib/unicorn/const.rb +21 -0
- data/lib/unicorn/http_request.rb +125 -0
- data/lib/unicorn/http_response.rb +73 -0
- data/lib/unicorn/http_server.rb +816 -0
- data/lib/unicorn/launcher.rb +62 -0
- data/lib/unicorn/oob_gc.rb +81 -0
- data/lib/unicorn/preread_input.rb +33 -0
- data/lib/unicorn/socket_helper.rb +197 -0
- data/lib/unicorn/stream_input.rb +146 -0
- data/lib/unicorn/tee_input.rb +133 -0
- data/lib/unicorn/tmpio.rb +27 -0
- data/lib/unicorn/util.rb +90 -0
- data/lib/unicorn/worker.rb +140 -0
- data/setup.rb +1586 -0
- data/t/.gitignore +4 -0
- data/t/GNUmakefile +74 -0
- data/t/README +42 -0
- data/t/before_murder.ru +7 -0
- data/t/bin/content-md5-put +36 -0
- data/t/bin/sha1sum.rb +17 -0
- data/t/bin/unused_listen +40 -0
- data/t/broken-app.ru +12 -0
- data/t/detach.ru +11 -0
- data/t/env.ru +3 -0
- data/t/fails-rack-lint.ru +5 -0
- data/t/heartbeat-timeout.ru +12 -0
- data/t/hijack.ru +42 -0
- data/t/listener_names.ru +4 -0
- data/t/my-tap-lib.sh +201 -0
- data/t/oob_gc.ru +20 -0
- data/t/oob_gc_path.ru +20 -0
- data/t/pid.ru +3 -0
- data/t/preread_input.ru +17 -0
- data/t/rack-input-tests.ru +21 -0
- data/t/t0000-http-basic.sh +50 -0
- data/t/t0001-reload-bad-config.sh +53 -0
- data/t/t0002-config-conflict.sh +49 -0
- data/t/t0002-parser-error.sh +94 -0
- data/t/t0003-working_directory.sh +51 -0
- data/t/t0004-heartbeat-timeout.sh +69 -0
- data/t/t0004-working_directory_broken.sh +24 -0
- data/t/t0005-working_directory_app.rb.sh +40 -0
- data/t/t0006-reopen-logs.sh +83 -0
- data/t/t0006.ru +13 -0
- data/t/t0007-working_directory_no_embed_cli.sh +44 -0
- data/t/t0008-back_out_of_upgrade.sh +110 -0
- data/t/t0009-broken-app.sh +56 -0
- data/t/t0009-winch_ttin.sh +59 -0
- data/t/t0010-reap-logging.sh +55 -0
- data/t/t0011-active-unix-socket.sh +79 -0
- data/t/t0012-reload-empty-config.sh +85 -0
- data/t/t0013-rewindable-input-false.sh +24 -0
- data/t/t0013.ru +12 -0
- data/t/t0014-rewindable-input-true.sh +24 -0
- data/t/t0014.ru +12 -0
- data/t/t0015-configurator-internals.sh +25 -0
- data/t/t0018-write-on-close.sh +23 -0
- data/t/t0019-max_header_len.sh +49 -0
- data/t/t0020-at_exit-handler.sh +49 -0
- data/t/t0021-process_detach.sh +29 -0
- data/t/t0022-listener_names-preload_app.sh +32 -0
- data/t/t0023-before-murder.sh +40 -0
- data/t/t0024-before-murder_once.sh +52 -0
- data/t/t0100-rack-input-tests.sh +124 -0
- data/t/t0116-client_body_buffer_size.sh +80 -0
- data/t/t0116.ru +16 -0
- data/t/t0200-rack-hijack.sh +27 -0
- data/t/t0300-no-default-middleware.sh +20 -0
- data/t/t9000-preread-input.sh +48 -0
- data/t/t9001-oob_gc.sh +47 -0
- data/t/t9002-oob_gc-path.sh +75 -0
- data/t/test-lib.sh +128 -0
- data/t/write-on-close.ru +11 -0
- data/test/aggregate.rb +15 -0
- data/test/benchmark/README +50 -0
- data/test/benchmark/dd.ru +18 -0
- data/test/benchmark/stack.ru +8 -0
- data/test/exec/README +5 -0
- data/test/exec/test_exec.rb +1047 -0
- data/test/test_helper.rb +297 -0
- data/test/unit/test_configurator.rb +175 -0
- data/test/unit/test_droplet.rb +28 -0
- data/test/unit/test_http_parser.rb +854 -0
- data/test/unit/test_http_parser_ng.rb +622 -0
- data/test/unit/test_request.rb +182 -0
- data/test/unit/test_response.rb +93 -0
- data/test/unit/test_server.rb +268 -0
- data/test/unit/test_signals.rb +188 -0
- data/test/unit/test_socket_helper.rb +197 -0
- data/test/unit/test_stream_input.rb +203 -0
- data/test/unit/test_tee_input.rb +304 -0
- data/test/unit/test_upload.rb +306 -0
- data/test/unit/test_util.rb +105 -0
- data/unicorn.gemspec +41 -0
- metadata +311 -0
@@ -0,0 +1,111 @@
|
|
1
|
+
#ifndef common_field_optimization
|
2
|
+
#define common_field_optimization
|
3
|
+
#include "ruby.h"
|
4
|
+
#include "c_util.h"
|
5
|
+
|
6
|
+
struct common_field {
|
7
|
+
const signed long len;
|
8
|
+
const char *name;
|
9
|
+
VALUE value;
|
10
|
+
};
|
11
|
+
|
12
|
+
/*
|
13
|
+
* A list of common HTTP headers we expect to receive.
|
14
|
+
* This allows us to avoid repeatedly creating identical string
|
15
|
+
* objects to be used with rb_hash_aset().
|
16
|
+
*/
|
17
|
+
static struct common_field common_http_fields[] = {
|
18
|
+
# define f(N) { (sizeof(N) - 1), N, Qnil }
|
19
|
+
f("ACCEPT"),
|
20
|
+
f("ACCEPT_CHARSET"),
|
21
|
+
f("ACCEPT_ENCODING"),
|
22
|
+
f("ACCEPT_LANGUAGE"),
|
23
|
+
f("ALLOW"),
|
24
|
+
f("AUTHORIZATION"),
|
25
|
+
f("CACHE_CONTROL"),
|
26
|
+
f("CONNECTION"),
|
27
|
+
f("CONTENT_ENCODING"),
|
28
|
+
f("CONTENT_LENGTH"),
|
29
|
+
f("CONTENT_TYPE"),
|
30
|
+
f("COOKIE"),
|
31
|
+
f("DATE"),
|
32
|
+
f("EXPECT"),
|
33
|
+
f("FROM"),
|
34
|
+
f("HOST"),
|
35
|
+
f("IF_MATCH"),
|
36
|
+
f("IF_MODIFIED_SINCE"),
|
37
|
+
f("IF_NONE_MATCH"),
|
38
|
+
f("IF_RANGE"),
|
39
|
+
f("IF_UNMODIFIED_SINCE"),
|
40
|
+
f("KEEP_ALIVE"), /* Firefox sends this */
|
41
|
+
f("MAX_FORWARDS"),
|
42
|
+
f("PRAGMA"),
|
43
|
+
f("PROXY_AUTHORIZATION"),
|
44
|
+
f("RANGE"),
|
45
|
+
f("REFERER"),
|
46
|
+
f("TE"),
|
47
|
+
f("TRAILER"),
|
48
|
+
f("TRANSFER_ENCODING"),
|
49
|
+
f("UPGRADE"),
|
50
|
+
f("USER_AGENT"),
|
51
|
+
f("VIA"),
|
52
|
+
f("X_FORWARDED_FOR"), /* common for proxies */
|
53
|
+
f("X_FORWARDED_PROTO"), /* common for proxies */
|
54
|
+
f("X_REAL_IP"), /* common for proxies */
|
55
|
+
f("WARNING")
|
56
|
+
# undef f
|
57
|
+
};
|
58
|
+
|
59
|
+
#define HTTP_PREFIX "HTTP_"
|
60
|
+
#define HTTP_PREFIX_LEN (sizeof(HTTP_PREFIX) - 1)
|
61
|
+
|
62
|
+
/* this function is not performance-critical, called only at load time */
|
63
|
+
static void init_common_fields(void)
|
64
|
+
{
|
65
|
+
int i;
|
66
|
+
struct common_field *cf = common_http_fields;
|
67
|
+
char tmp[64];
|
68
|
+
memcpy(tmp, HTTP_PREFIX, HTTP_PREFIX_LEN);
|
69
|
+
|
70
|
+
for(i = ARRAY_SIZE(common_http_fields); --i >= 0; cf++) {
|
71
|
+
/* Rack doesn't like certain headers prefixed with "HTTP_" */
|
72
|
+
if (!strcmp("CONTENT_LENGTH", cf->name) ||
|
73
|
+
!strcmp("CONTENT_TYPE", cf->name)) {
|
74
|
+
cf->value = rb_str_new(cf->name, cf->len);
|
75
|
+
} else {
|
76
|
+
memcpy(tmp + HTTP_PREFIX_LEN, cf->name, cf->len + 1);
|
77
|
+
cf->value = rb_str_new(tmp, HTTP_PREFIX_LEN + cf->len);
|
78
|
+
}
|
79
|
+
cf->value = rb_obj_freeze(cf->value);
|
80
|
+
rb_global_variable(&cf->value);
|
81
|
+
}
|
82
|
+
}
|
83
|
+
|
84
|
+
/* this function is called for every header set */
|
85
|
+
static VALUE find_common_field(const char *field, size_t flen)
|
86
|
+
{
|
87
|
+
int i;
|
88
|
+
struct common_field *cf = common_http_fields;
|
89
|
+
|
90
|
+
for(i = ARRAY_SIZE(common_http_fields); --i >= 0; cf++) {
|
91
|
+
if (cf->len == (long)flen && !memcmp(cf->name, field, flen))
|
92
|
+
return cf->value;
|
93
|
+
}
|
94
|
+
return Qnil;
|
95
|
+
}
|
96
|
+
|
97
|
+
/*
|
98
|
+
* We got a strange header that we don't have a memoized value for.
|
99
|
+
* Fallback to creating a new string to use as a hash key.
|
100
|
+
*/
|
101
|
+
static VALUE uncommon_field(const char *field, size_t flen)
|
102
|
+
{
|
103
|
+
VALUE f = rb_str_new(NULL, HTTP_PREFIX_LEN + flen);
|
104
|
+
memcpy(RSTRING_PTR(f), HTTP_PREFIX, HTTP_PREFIX_LEN);
|
105
|
+
memcpy(RSTRING_PTR(f) + HTTP_PREFIX_LEN, field, flen);
|
106
|
+
assert(*(RSTRING_PTR(f) + RSTRING_LEN(f)) == '\0' &&
|
107
|
+
"string didn't end with \\0"); /* paranoia */
|
108
|
+
return rb_obj_freeze(f);
|
109
|
+
}
|
110
|
+
|
111
|
+
#endif /* common_field_optimization_h */
|
@@ -0,0 +1,82 @@
|
|
1
|
+
#ifndef ext_help_h
|
2
|
+
#define ext_help_h
|
3
|
+
|
4
|
+
#ifndef RSTRING_PTR
|
5
|
+
#define RSTRING_PTR(s) (RSTRING(s)->ptr)
|
6
|
+
#endif /* !defined(RSTRING_PTR) */
|
7
|
+
#ifndef RSTRING_LEN
|
8
|
+
#define RSTRING_LEN(s) (RSTRING(s)->len)
|
9
|
+
#endif /* !defined(RSTRING_LEN) */
|
10
|
+
|
11
|
+
#ifndef HAVE_RB_STR_SET_LEN
|
12
|
+
# ifdef RUBINIUS
|
13
|
+
# error we should never get here with current Rubinius (1.x)
|
14
|
+
# endif
|
15
|
+
/* this is taken from Ruby 1.8.7, 1.8.6 may not have it */
|
16
|
+
static void rb_18_str_set_len(VALUE str, long len)
|
17
|
+
{
|
18
|
+
RSTRING(str)->len = len;
|
19
|
+
RSTRING(str)->ptr[len] = '\0';
|
20
|
+
}
|
21
|
+
# define rb_str_set_len(str,len) rb_18_str_set_len(str,len)
|
22
|
+
#endif /* !defined(HAVE_RB_STR_SET_LEN) */
|
23
|
+
|
24
|
+
/* not all Ruby implementations support frozen objects (Rubinius does not) */
|
25
|
+
#if defined(OBJ_FROZEN)
|
26
|
+
# define assert_frozen(f) assert(OBJ_FROZEN(f) && "unfrozen object")
|
27
|
+
#else
|
28
|
+
# define assert_frozen(f) do {} while (0)
|
29
|
+
#endif /* !defined(OBJ_FROZEN) */
|
30
|
+
|
31
|
+
#if !defined(OFFT2NUM)
|
32
|
+
# if SIZEOF_OFF_T == SIZEOF_LONG
|
33
|
+
# define OFFT2NUM(n) LONG2NUM(n)
|
34
|
+
# else
|
35
|
+
# define OFFT2NUM(n) LL2NUM(n)
|
36
|
+
# endif
|
37
|
+
#endif /* ! defined(OFFT2NUM) */
|
38
|
+
|
39
|
+
#if !defined(SIZET2NUM)
|
40
|
+
# if SIZEOF_SIZE_T == SIZEOF_LONG
|
41
|
+
# define SIZET2NUM(n) ULONG2NUM(n)
|
42
|
+
# else
|
43
|
+
# define SIZET2NUM(n) ULL2NUM(n)
|
44
|
+
# endif
|
45
|
+
#endif /* ! defined(SIZET2NUM) */
|
46
|
+
|
47
|
+
#if !defined(NUM2SIZET)
|
48
|
+
# if SIZEOF_SIZE_T == SIZEOF_LONG
|
49
|
+
# define NUM2SIZET(n) ((size_t)NUM2ULONG(n))
|
50
|
+
# else
|
51
|
+
# define NUM2SIZET(n) ((size_t)NUM2ULL(n))
|
52
|
+
# endif
|
53
|
+
#endif /* ! defined(NUM2SIZET) */
|
54
|
+
|
55
|
+
static inline int str_cstr_eq(VALUE val, const char *ptr, long len)
|
56
|
+
{
|
57
|
+
return (RSTRING_LEN(val) == len && !memcmp(ptr, RSTRING_PTR(val), len));
|
58
|
+
}
|
59
|
+
|
60
|
+
#define STR_CSTR_EQ(val, const_str) \
|
61
|
+
str_cstr_eq(val, const_str, sizeof(const_str) - 1)
|
62
|
+
|
63
|
+
/* strcasecmp isn't locale independent */
|
64
|
+
static int str_cstr_case_eq(VALUE val, const char *ptr, long len)
|
65
|
+
{
|
66
|
+
if (RSTRING_LEN(val) == len) {
|
67
|
+
const char *v = RSTRING_PTR(val);
|
68
|
+
|
69
|
+
for (; len--; ++ptr, ++v) {
|
70
|
+
if ((*ptr == *v) || (*v >= 'A' && *v <= 'Z' && (*v | 0x20) == *ptr))
|
71
|
+
continue;
|
72
|
+
return 0;
|
73
|
+
}
|
74
|
+
return 1;
|
75
|
+
}
|
76
|
+
return 0;
|
77
|
+
}
|
78
|
+
|
79
|
+
#define STR_CSTR_CASE_EQ(val, const_str) \
|
80
|
+
str_cstr_case_eq(val, const_str, sizeof(const_str) - 1)
|
81
|
+
|
82
|
+
#endif /* ext_help_h */
|
@@ -0,0 +1,10 @@
|
|
1
|
+
# -*- encoding: binary -*-
|
2
|
+
require 'mkmf'
|
3
|
+
|
4
|
+
have_macro("SIZEOF_OFF_T", "ruby.h") or check_sizeof("off_t", "sys/types.h")
|
5
|
+
have_macro("SIZEOF_SIZE_T", "ruby.h") or check_sizeof("size_t", "sys/types.h")
|
6
|
+
have_macro("SIZEOF_LONG", "ruby.h") or check_sizeof("long", "sys/types.h")
|
7
|
+
have_func("rb_str_set_len", "ruby.h")
|
8
|
+
have_func("gmtime_r", "time.h")
|
9
|
+
|
10
|
+
create_makefile("unicorn_http")
|
@@ -0,0 +1,97 @@
|
|
1
|
+
#ifndef global_variables_h
|
2
|
+
#define global_variables_h
|
3
|
+
static VALUE eHttpParserError;
|
4
|
+
static VALUE e413;
|
5
|
+
static VALUE e414;
|
6
|
+
|
7
|
+
static VALUE g_rack_url_scheme;
|
8
|
+
static VALUE g_request_method;
|
9
|
+
static VALUE g_request_uri;
|
10
|
+
static VALUE g_fragment;
|
11
|
+
static VALUE g_query_string;
|
12
|
+
static VALUE g_http_version;
|
13
|
+
static VALUE g_request_path;
|
14
|
+
static VALUE g_path_info;
|
15
|
+
static VALUE g_server_name;
|
16
|
+
static VALUE g_server_port;
|
17
|
+
static VALUE g_server_protocol;
|
18
|
+
static VALUE g_http_host;
|
19
|
+
static VALUE g_http_x_forwarded_proto;
|
20
|
+
static VALUE g_http_x_forwarded_ssl;
|
21
|
+
static VALUE g_http_transfer_encoding;
|
22
|
+
static VALUE g_content_length;
|
23
|
+
static VALUE g_http_trailer;
|
24
|
+
static VALUE g_http_connection;
|
25
|
+
static VALUE g_port_80;
|
26
|
+
static VALUE g_port_443;
|
27
|
+
static VALUE g_localhost;
|
28
|
+
static VALUE g_http;
|
29
|
+
static VALUE g_https;
|
30
|
+
static VALUE g_http_09;
|
31
|
+
static VALUE g_http_10;
|
32
|
+
static VALUE g_http_11;
|
33
|
+
|
34
|
+
/** Defines common length and error messages for input length validation. */
|
35
|
+
#define DEF_MAX_LENGTH(N, length) \
|
36
|
+
static const size_t MAX_##N##_LENGTH = length; \
|
37
|
+
static const char * const MAX_##N##_LENGTH_ERR = \
|
38
|
+
"HTTP element " # N " is longer than the " # length " allowed length."
|
39
|
+
|
40
|
+
NORETURN(static void parser_raise(VALUE klass, const char *));
|
41
|
+
|
42
|
+
/**
|
43
|
+
* Validates the max length of given input and throws an HttpParserError
|
44
|
+
* exception if over.
|
45
|
+
*/
|
46
|
+
#define VALIDATE_MAX_LENGTH(len, N) do { \
|
47
|
+
if (len > MAX_##N##_LENGTH) \
|
48
|
+
parser_raise(eHttpParserError, MAX_##N##_LENGTH_ERR); \
|
49
|
+
} while (0)
|
50
|
+
|
51
|
+
#define VALIDATE_MAX_URI_LENGTH(len, N) do { \
|
52
|
+
if (len > MAX_##N##_LENGTH) \
|
53
|
+
parser_raise(e414, MAX_##N##_LENGTH_ERR); \
|
54
|
+
} while (0)
|
55
|
+
|
56
|
+
/** Defines global strings in the init method. */
|
57
|
+
#define DEF_GLOBAL(N, val) do { \
|
58
|
+
g_##N = rb_obj_freeze(rb_str_new(val, sizeof(val) - 1)); \
|
59
|
+
rb_global_variable(&g_##N); \
|
60
|
+
} while (0)
|
61
|
+
|
62
|
+
/* Defines the maximum allowed lengths for various input elements.*/
|
63
|
+
DEF_MAX_LENGTH(FIELD_NAME, 256);
|
64
|
+
DEF_MAX_LENGTH(FIELD_VALUE, 80 * 1024);
|
65
|
+
DEF_MAX_LENGTH(REQUEST_URI, 1024 * 15);
|
66
|
+
DEF_MAX_LENGTH(FRAGMENT, 1024); /* Don't know if this length is specified somewhere or not */
|
67
|
+
DEF_MAX_LENGTH(REQUEST_PATH, 4096); /* common PATH_MAX on modern systems */
|
68
|
+
DEF_MAX_LENGTH(QUERY_STRING, (1024 * 10));
|
69
|
+
|
70
|
+
static void init_globals(void)
|
71
|
+
{
|
72
|
+
DEF_GLOBAL(rack_url_scheme, "rack.url_scheme");
|
73
|
+
DEF_GLOBAL(request_method, "REQUEST_METHOD");
|
74
|
+
DEF_GLOBAL(request_uri, "REQUEST_URI");
|
75
|
+
DEF_GLOBAL(fragment, "FRAGMENT");
|
76
|
+
DEF_GLOBAL(query_string, "QUERY_STRING");
|
77
|
+
DEF_GLOBAL(http_version, "HTTP_VERSION");
|
78
|
+
DEF_GLOBAL(request_path, "REQUEST_PATH");
|
79
|
+
DEF_GLOBAL(path_info, "PATH_INFO");
|
80
|
+
DEF_GLOBAL(server_name, "SERVER_NAME");
|
81
|
+
DEF_GLOBAL(server_port, "SERVER_PORT");
|
82
|
+
DEF_GLOBAL(server_protocol, "SERVER_PROTOCOL");
|
83
|
+
DEF_GLOBAL(http_x_forwarded_proto, "HTTP_X_FORWARDED_PROTO");
|
84
|
+
DEF_GLOBAL(http_x_forwarded_ssl, "HTTP_X_FORWARDED_SSL");
|
85
|
+
DEF_GLOBAL(port_80, "80");
|
86
|
+
DEF_GLOBAL(port_443, "443");
|
87
|
+
DEF_GLOBAL(localhost, "localhost");
|
88
|
+
DEF_GLOBAL(http, "http");
|
89
|
+
DEF_GLOBAL(https, "https");
|
90
|
+
DEF_GLOBAL(http_11, "HTTP/1.1");
|
91
|
+
DEF_GLOBAL(http_10, "HTTP/1.0");
|
92
|
+
DEF_GLOBAL(http_09, "HTTP/0.9");
|
93
|
+
}
|
94
|
+
|
95
|
+
#undef DEF_GLOBAL
|
96
|
+
|
97
|
+
#endif /* global_variables_h */
|
@@ -0,0 +1,78 @@
|
|
1
|
+
#include <ruby.h>
|
2
|
+
#include <time.h>
|
3
|
+
#include <stdio.h>
|
4
|
+
|
5
|
+
static const size_t buf_capa = sizeof("Thu, 01 Jan 1970 00:00:00 GMT");
|
6
|
+
static VALUE buf;
|
7
|
+
static char *buf_ptr;
|
8
|
+
static const char week[] = "Sun\0Mon\0Tue\0Wed\0Thu\0Fri\0Sat";
|
9
|
+
static const char months[] = "Jan\0Feb\0Mar\0Apr\0May\0Jun\0"
|
10
|
+
"Jul\0Aug\0Sep\0Oct\0Nov\0Dec";
|
11
|
+
|
12
|
+
/* for people on wonky systems only */
|
13
|
+
#ifndef HAVE_GMTIME_R
|
14
|
+
static struct tm * my_gmtime_r(time_t *now, struct tm *tm)
|
15
|
+
{
|
16
|
+
struct tm *global = gmtime(now);
|
17
|
+
if (global)
|
18
|
+
*tm = *global;
|
19
|
+
return tm;
|
20
|
+
}
|
21
|
+
# define gmtime_r my_gmtime_r
|
22
|
+
#endif
|
23
|
+
|
24
|
+
|
25
|
+
/*
|
26
|
+
* Returns a string which represents the time as rfc1123-date of HTTP-date
|
27
|
+
* defined by RFC 2616:
|
28
|
+
*
|
29
|
+
* day-of-week, DD month-name CCYY hh:mm:ss GMT
|
30
|
+
*
|
31
|
+
* Note that the result is always GMT.
|
32
|
+
*
|
33
|
+
* This method is identical to Time#httpdate in the Ruby standard library,
|
34
|
+
* except it is implemented in C for performance. We always saw
|
35
|
+
* Time#httpdate at or near the top of the profiler output so we
|
36
|
+
* decided to rewrite this in C.
|
37
|
+
*
|
38
|
+
* Caveats: it relies on a Ruby implementation with the global VM lock,
|
39
|
+
* a thread-safe version will be provided when a Unix-only, GVL-free Ruby
|
40
|
+
* implementation becomes viable.
|
41
|
+
*/
|
42
|
+
static VALUE httpdate(VALUE self)
|
43
|
+
{
|
44
|
+
static time_t last;
|
45
|
+
time_t now = time(NULL); /* not a syscall on modern 64-bit systems */
|
46
|
+
struct tm tm;
|
47
|
+
|
48
|
+
if (last == now)
|
49
|
+
return buf;
|
50
|
+
last = now;
|
51
|
+
gmtime_r(&now, &tm);
|
52
|
+
|
53
|
+
/* we can make this thread-safe later if our Ruby loses the GVL */
|
54
|
+
snprintf(buf_ptr, buf_capa,
|
55
|
+
"%s, %02d %s %4d %02d:%02d:%02d GMT",
|
56
|
+
week + (tm.tm_wday * 4),
|
57
|
+
tm.tm_mday,
|
58
|
+
months + (tm.tm_mon * 4),
|
59
|
+
tm.tm_year + 1900,
|
60
|
+
tm.tm_hour,
|
61
|
+
tm.tm_min,
|
62
|
+
tm.tm_sec);
|
63
|
+
|
64
|
+
return buf;
|
65
|
+
}
|
66
|
+
|
67
|
+
void init_unicorn_httpdate(void)
|
68
|
+
{
|
69
|
+
VALUE mod = rb_define_module("Unicorn");
|
70
|
+
mod = rb_define_module_under(mod, "HttpResponse");
|
71
|
+
|
72
|
+
buf = rb_str_new(0, buf_capa - 1);
|
73
|
+
rb_global_variable(&buf);
|
74
|
+
buf_ptr = RSTRING_PTR(buf);
|
75
|
+
httpdate(Qnil);
|
76
|
+
|
77
|
+
rb_define_method(mod, "httpdate", httpdate, 0);
|
78
|
+
}
|
@@ -0,0 +1,934 @@
|
|
1
|
+
/**
|
2
|
+
* Copyright (c) 2009 Eric Wong (all bugs are Eric's fault)
|
3
|
+
* Copyright (c) 2005 Zed A. Shaw
|
4
|
+
* You can redistribute it and/or modify it under the same terms as Ruby 1.8 or
|
5
|
+
* the GPLv2+ (GPLv3+ preferred)
|
6
|
+
*/
|
7
|
+
#include "ruby.h"
|
8
|
+
#include "ext_help.h"
|
9
|
+
#include <assert.h>
|
10
|
+
#include <string.h>
|
11
|
+
#include <sys/types.h>
|
12
|
+
#include "common_field_optimization.h"
|
13
|
+
#include "global_variables.h"
|
14
|
+
#include "c_util.h"
|
15
|
+
|
16
|
+
void init_unicorn_httpdate(void);
|
17
|
+
|
18
|
+
#define UH_FL_CHUNKED 0x1
|
19
|
+
#define UH_FL_HASBODY 0x2
|
20
|
+
#define UH_FL_INBODY 0x4
|
21
|
+
#define UH_FL_HASTRAILER 0x8
|
22
|
+
#define UH_FL_INTRAILER 0x10
|
23
|
+
#define UH_FL_INCHUNK 0x20
|
24
|
+
#define UH_FL_REQEOF 0x40
|
25
|
+
#define UH_FL_KAVERSION 0x80
|
26
|
+
#define UH_FL_HASHEADER 0x100
|
27
|
+
#define UH_FL_TO_CLEAR 0x200
|
28
|
+
|
29
|
+
/* all of these flags need to be set for keepalive to be supported */
|
30
|
+
#define UH_FL_KEEPALIVE (UH_FL_KAVERSION | UH_FL_REQEOF | UH_FL_HASHEADER)
|
31
|
+
|
32
|
+
static unsigned int MAX_HEADER_LEN = 1024 * (80 + 32); /* same as Mongrel */
|
33
|
+
|
34
|
+
/* this is only intended for use with Rainbows! */
|
35
|
+
static VALUE set_maxhdrlen(VALUE self, VALUE len)
|
36
|
+
{
|
37
|
+
return UINT2NUM(MAX_HEADER_LEN = NUM2UINT(len));
|
38
|
+
}
|
39
|
+
|
40
|
+
/* keep this small for Rainbows! since every client has one */
|
41
|
+
struct http_parser {
|
42
|
+
int cs; /* Ragel internal state */
|
43
|
+
unsigned int flags;
|
44
|
+
unsigned int mark;
|
45
|
+
unsigned int offset;
|
46
|
+
union { /* these 2 fields don't nest */
|
47
|
+
unsigned int field;
|
48
|
+
unsigned int query;
|
49
|
+
} start;
|
50
|
+
union {
|
51
|
+
unsigned int field_len; /* only used during header processing */
|
52
|
+
unsigned int dest_offset; /* only used during body processing */
|
53
|
+
} s;
|
54
|
+
VALUE buf;
|
55
|
+
VALUE env;
|
56
|
+
VALUE cont; /* Qfalse: unset, Qnil: ignored header, T_STRING: append */
|
57
|
+
union {
|
58
|
+
off_t content;
|
59
|
+
off_t chunk;
|
60
|
+
} len;
|
61
|
+
};
|
62
|
+
|
63
|
+
static ID id_clear, id_set_backtrace, id_response_start_sent;
|
64
|
+
|
65
|
+
static void finalize_header(struct http_parser *hp);
|
66
|
+
|
67
|
+
static void parser_raise(VALUE klass, const char *msg)
|
68
|
+
{
|
69
|
+
VALUE exc = rb_exc_new2(klass, msg);
|
70
|
+
VALUE bt = rb_ary_new();
|
71
|
+
|
72
|
+
rb_funcall(exc, id_set_backtrace, 1, bt);
|
73
|
+
rb_exc_raise(exc);
|
74
|
+
}
|
75
|
+
|
76
|
+
static inline unsigned int ulong2uint(unsigned long n)
|
77
|
+
{
|
78
|
+
unsigned int i = (unsigned int)n;
|
79
|
+
|
80
|
+
if (sizeof(unsigned int) != sizeof(unsigned long)) {
|
81
|
+
if ((unsigned long)i != n) {
|
82
|
+
rb_raise(rb_eRangeError, "too large to be 32-bit uint: %lu", n);
|
83
|
+
}
|
84
|
+
}
|
85
|
+
return i;
|
86
|
+
}
|
87
|
+
|
88
|
+
#define REMAINING (unsigned long)(pe - p)
|
89
|
+
#define LEN(AT, FPC) (ulong2uint(FPC - buffer) - hp->AT)
|
90
|
+
#define MARK(M,FPC) (hp->M = ulong2uint((FPC) - buffer))
|
91
|
+
#define PTR_TO(F) (buffer + hp->F)
|
92
|
+
#define STR_NEW(M,FPC) rb_str_new(PTR_TO(M), LEN(M, FPC))
|
93
|
+
#define STRIPPED_STR_NEW(M,FPC) stripped_str_new(PTR_TO(M), LEN(M, FPC))
|
94
|
+
|
95
|
+
#define HP_FL_TEST(hp,fl) ((hp)->flags & (UH_FL_##fl))
|
96
|
+
#define HP_FL_SET(hp,fl) ((hp)->flags |= (UH_FL_##fl))
|
97
|
+
#define HP_FL_UNSET(hp,fl) ((hp)->flags &= ~(UH_FL_##fl))
|
98
|
+
#define HP_FL_ALL(hp,fl) (HP_FL_TEST(hp, fl) == (UH_FL_##fl))
|
99
|
+
|
100
|
+
static int is_lws(char c)
|
101
|
+
{
|
102
|
+
return (c == ' ' || c == '\t');
|
103
|
+
}
|
104
|
+
|
105
|
+
static VALUE stripped_str_new(const char *str, long len)
|
106
|
+
{
|
107
|
+
long end;
|
108
|
+
|
109
|
+
for (end = len - 1; end >= 0 && is_lws(str[end]); end--);
|
110
|
+
|
111
|
+
return rb_str_new(str, end + 1);
|
112
|
+
}
|
113
|
+
|
114
|
+
/*
|
115
|
+
* handles values of the "Connection:" header, keepalive is implied
|
116
|
+
* for HTTP/1.1 but needs to be explicitly enabled with HTTP/1.0
|
117
|
+
* Additionally, we require GET/HEAD requests to support keepalive.
|
118
|
+
*/
|
119
|
+
static void hp_keepalive_connection(struct http_parser *hp, VALUE val)
|
120
|
+
{
|
121
|
+
if (STR_CSTR_CASE_EQ(val, "keep-alive")) {
|
122
|
+
/* basically have HTTP/1.0 masquerade as HTTP/1.1+ */
|
123
|
+
HP_FL_SET(hp, KAVERSION);
|
124
|
+
} else if (STR_CSTR_CASE_EQ(val, "close")) {
|
125
|
+
/*
|
126
|
+
* it doesn't matter what HTTP version or request method we have,
|
127
|
+
* if a client says "Connection: close", we disable keepalive
|
128
|
+
*/
|
129
|
+
HP_FL_UNSET(hp, KAVERSION);
|
130
|
+
} else {
|
131
|
+
/*
|
132
|
+
* client could've sent anything, ignore it for now. Maybe
|
133
|
+
* "HP_FL_UNSET(hp, KAVERSION);" just in case?
|
134
|
+
* Raising an exception might be too mean...
|
135
|
+
*/
|
136
|
+
}
|
137
|
+
}
|
138
|
+
|
139
|
+
static void
|
140
|
+
request_method(struct http_parser *hp, const char *ptr, size_t len)
|
141
|
+
{
|
142
|
+
VALUE v = rb_str_new(ptr, len);
|
143
|
+
|
144
|
+
rb_hash_aset(hp->env, g_request_method, v);
|
145
|
+
}
|
146
|
+
|
147
|
+
static void
|
148
|
+
http_version(struct http_parser *hp, const char *ptr, size_t len)
|
149
|
+
{
|
150
|
+
VALUE v;
|
151
|
+
|
152
|
+
HP_FL_SET(hp, HASHEADER);
|
153
|
+
|
154
|
+
if (CONST_MEM_EQ("HTTP/1.1", ptr, len)) {
|
155
|
+
/* HTTP/1.1 implies keepalive unless "Connection: close" is set */
|
156
|
+
HP_FL_SET(hp, KAVERSION);
|
157
|
+
v = g_http_11;
|
158
|
+
} else if (CONST_MEM_EQ("HTTP/1.0", ptr, len)) {
|
159
|
+
v = g_http_10;
|
160
|
+
} else {
|
161
|
+
v = rb_str_new(ptr, len);
|
162
|
+
}
|
163
|
+
rb_hash_aset(hp->env, g_server_protocol, v);
|
164
|
+
rb_hash_aset(hp->env, g_http_version, v);
|
165
|
+
}
|
166
|
+
|
167
|
+
static inline void hp_invalid_if_trailer(struct http_parser *hp)
|
168
|
+
{
|
169
|
+
if (HP_FL_TEST(hp, INTRAILER))
|
170
|
+
parser_raise(eHttpParserError, "invalid Trailer");
|
171
|
+
}
|
172
|
+
|
173
|
+
static void write_cont_value(struct http_parser *hp,
|
174
|
+
char *buffer, const char *p)
|
175
|
+
{
|
176
|
+
char *vptr;
|
177
|
+
long end;
|
178
|
+
long len = LEN(mark, p);
|
179
|
+
long cont_len;
|
180
|
+
|
181
|
+
if (hp->cont == Qfalse)
|
182
|
+
parser_raise(eHttpParserError, "invalid continuation line");
|
183
|
+
if (NIL_P(hp->cont))
|
184
|
+
return; /* we're ignoring this header (probably Host:) */
|
185
|
+
|
186
|
+
assert(TYPE(hp->cont) == T_STRING && "continuation line is not a string");
|
187
|
+
assert(hp->mark > 0 && "impossible continuation line offset");
|
188
|
+
|
189
|
+
if (len == 0)
|
190
|
+
return;
|
191
|
+
|
192
|
+
cont_len = RSTRING_LEN(hp->cont);
|
193
|
+
if (cont_len > 0) {
|
194
|
+
--hp->mark;
|
195
|
+
len = LEN(mark, p);
|
196
|
+
}
|
197
|
+
vptr = PTR_TO(mark);
|
198
|
+
|
199
|
+
/* normalize tab to space */
|
200
|
+
if (cont_len > 0) {
|
201
|
+
assert((' ' == *vptr || '\t' == *vptr) && "invalid leading white space");
|
202
|
+
*vptr = ' ';
|
203
|
+
}
|
204
|
+
|
205
|
+
for (end = len - 1; end >= 0 && is_lws(vptr[end]); end--);
|
206
|
+
rb_str_buf_cat(hp->cont, vptr, end + 1);
|
207
|
+
}
|
208
|
+
|
209
|
+
static void write_value(struct http_parser *hp,
|
210
|
+
const char *buffer, const char *p)
|
211
|
+
{
|
212
|
+
VALUE f = find_common_field(PTR_TO(start.field), hp->s.field_len);
|
213
|
+
VALUE v;
|
214
|
+
VALUE e;
|
215
|
+
|
216
|
+
VALIDATE_MAX_LENGTH(LEN(mark, p), FIELD_VALUE);
|
217
|
+
v = LEN(mark, p) == 0 ? rb_str_buf_new(128) : STRIPPED_STR_NEW(mark, p);
|
218
|
+
if (NIL_P(f)) {
|
219
|
+
const char *field = PTR_TO(start.field);
|
220
|
+
size_t flen = hp->s.field_len;
|
221
|
+
|
222
|
+
VALIDATE_MAX_LENGTH(flen, FIELD_NAME);
|
223
|
+
|
224
|
+
/*
|
225
|
+
* ignore "Version" headers since they conflict with the HTTP_VERSION
|
226
|
+
* rack env variable.
|
227
|
+
*/
|
228
|
+
if (CONST_MEM_EQ("VERSION", field, flen)) {
|
229
|
+
hp->cont = Qnil;
|
230
|
+
return;
|
231
|
+
}
|
232
|
+
f = uncommon_field(field, flen);
|
233
|
+
} else if (f == g_http_connection) {
|
234
|
+
hp_keepalive_connection(hp, v);
|
235
|
+
} else if (f == g_content_length) {
|
236
|
+
hp->len.content = parse_length(RSTRING_PTR(v), RSTRING_LEN(v));
|
237
|
+
if (hp->len.content < 0)
|
238
|
+
parser_raise(eHttpParserError, "invalid Content-Length");
|
239
|
+
if (hp->len.content != 0)
|
240
|
+
HP_FL_SET(hp, HASBODY);
|
241
|
+
hp_invalid_if_trailer(hp);
|
242
|
+
} else if (f == g_http_transfer_encoding) {
|
243
|
+
if (STR_CSTR_CASE_EQ(v, "chunked")) {
|
244
|
+
HP_FL_SET(hp, CHUNKED);
|
245
|
+
HP_FL_SET(hp, HASBODY);
|
246
|
+
}
|
247
|
+
hp_invalid_if_trailer(hp);
|
248
|
+
} else if (f == g_http_trailer) {
|
249
|
+
HP_FL_SET(hp, HASTRAILER);
|
250
|
+
hp_invalid_if_trailer(hp);
|
251
|
+
} else {
|
252
|
+
assert(TYPE(f) == T_STRING && "memoized object is not a string");
|
253
|
+
assert_frozen(f);
|
254
|
+
}
|
255
|
+
|
256
|
+
e = rb_hash_aref(hp->env, f);
|
257
|
+
if (NIL_P(e)) {
|
258
|
+
hp->cont = rb_hash_aset(hp->env, f, v);
|
259
|
+
} else if (f == g_http_host) {
|
260
|
+
/*
|
261
|
+
* ignored, absolute URLs in REQUEST_URI take precedence over
|
262
|
+
* the Host: header (ref: rfc 2616, section 5.2.1)
|
263
|
+
*/
|
264
|
+
hp->cont = Qnil;
|
265
|
+
} else {
|
266
|
+
rb_str_buf_cat(e, ",", 1);
|
267
|
+
hp->cont = rb_str_buf_append(e, v);
|
268
|
+
}
|
269
|
+
}
|
270
|
+
|
271
|
+
/** Machine **/
|
272
|
+
|
273
|
+
%%{
|
274
|
+
machine http_parser;
|
275
|
+
|
276
|
+
action mark {MARK(mark, fpc); }
|
277
|
+
|
278
|
+
action start_field { MARK(start.field, fpc); }
|
279
|
+
action snake_upcase_field { snake_upcase_char(deconst(fpc)); }
|
280
|
+
action downcase_char { downcase_char(deconst(fpc)); }
|
281
|
+
action write_field { hp->s.field_len = LEN(start.field, fpc); }
|
282
|
+
action start_value { MARK(mark, fpc); }
|
283
|
+
action write_value { write_value(hp, buffer, fpc); }
|
284
|
+
action write_cont_value { write_cont_value(hp, buffer, fpc); }
|
285
|
+
action request_method { request_method(hp, PTR_TO(mark), LEN(mark, fpc)); }
|
286
|
+
action scheme {
|
287
|
+
rb_hash_aset(hp->env, g_rack_url_scheme, STR_NEW(mark, fpc));
|
288
|
+
}
|
289
|
+
action host { rb_hash_aset(hp->env, g_http_host, STR_NEW(mark, fpc)); }
|
290
|
+
action request_uri {
|
291
|
+
VALUE str;
|
292
|
+
|
293
|
+
VALIDATE_MAX_URI_LENGTH(LEN(mark, fpc), REQUEST_URI);
|
294
|
+
str = rb_hash_aset(hp->env, g_request_uri, STR_NEW(mark, fpc));
|
295
|
+
/*
|
296
|
+
* "OPTIONS * HTTP/1.1\r\n" is a valid request, but we can't have '*'
|
297
|
+
* in REQUEST_PATH or PATH_INFO or else Rack::Lint will complain
|
298
|
+
*/
|
299
|
+
if (STR_CSTR_EQ(str, "*")) {
|
300
|
+
str = rb_str_new(NULL, 0);
|
301
|
+
rb_hash_aset(hp->env, g_path_info, str);
|
302
|
+
rb_hash_aset(hp->env, g_request_path, str);
|
303
|
+
}
|
304
|
+
}
|
305
|
+
action fragment {
|
306
|
+
VALIDATE_MAX_URI_LENGTH(LEN(mark, fpc), FRAGMENT);
|
307
|
+
rb_hash_aset(hp->env, g_fragment, STR_NEW(mark, fpc));
|
308
|
+
}
|
309
|
+
action start_query {MARK(start.query, fpc); }
|
310
|
+
action query_string {
|
311
|
+
VALIDATE_MAX_URI_LENGTH(LEN(start.query, fpc), QUERY_STRING);
|
312
|
+
rb_hash_aset(hp->env, g_query_string, STR_NEW(start.query, fpc));
|
313
|
+
}
|
314
|
+
action http_version { http_version(hp, PTR_TO(mark), LEN(mark, fpc)); }
|
315
|
+
action request_path {
|
316
|
+
VALUE val;
|
317
|
+
|
318
|
+
VALIDATE_MAX_URI_LENGTH(LEN(mark, fpc), REQUEST_PATH);
|
319
|
+
val = rb_hash_aset(hp->env, g_request_path, STR_NEW(mark, fpc));
|
320
|
+
|
321
|
+
/* rack says PATH_INFO must start with "/" or be empty */
|
322
|
+
if (!STR_CSTR_EQ(val, "*"))
|
323
|
+
rb_hash_aset(hp->env, g_path_info, val);
|
324
|
+
}
|
325
|
+
action add_to_chunk_size {
|
326
|
+
hp->len.chunk = step_incr(hp->len.chunk, fc, 16);
|
327
|
+
if (hp->len.chunk < 0)
|
328
|
+
parser_raise(eHttpParserError, "invalid chunk size");
|
329
|
+
}
|
330
|
+
action header_done {
|
331
|
+
finalize_header(hp);
|
332
|
+
|
333
|
+
cs = http_parser_first_final;
|
334
|
+
if (HP_FL_TEST(hp, HASBODY)) {
|
335
|
+
HP_FL_SET(hp, INBODY);
|
336
|
+
if (HP_FL_TEST(hp, CHUNKED))
|
337
|
+
cs = http_parser_en_ChunkedBody;
|
338
|
+
} else {
|
339
|
+
HP_FL_SET(hp, REQEOF);
|
340
|
+
assert(!HP_FL_TEST(hp, CHUNKED) && "chunked encoding without body!");
|
341
|
+
}
|
342
|
+
/*
|
343
|
+
* go back to Ruby so we can call the Rack application, we'll reenter
|
344
|
+
* the parser iff the body needs to be processed.
|
345
|
+
*/
|
346
|
+
goto post_exec;
|
347
|
+
}
|
348
|
+
|
349
|
+
action end_trailers {
|
350
|
+
cs = http_parser_first_final;
|
351
|
+
goto post_exec;
|
352
|
+
}
|
353
|
+
|
354
|
+
action end_chunked_body {
|
355
|
+
HP_FL_SET(hp, INTRAILER);
|
356
|
+
cs = http_parser_en_Trailers;
|
357
|
+
++p;
|
358
|
+
assert(p <= pe && "buffer overflow after chunked body");
|
359
|
+
goto post_exec;
|
360
|
+
}
|
361
|
+
|
362
|
+
action skip_chunk_data {
|
363
|
+
skip_chunk_data_hack: {
|
364
|
+
size_t nr = MIN((size_t)hp->len.chunk, REMAINING);
|
365
|
+
memcpy(RSTRING_PTR(hp->cont) + hp->s.dest_offset, fpc, nr);
|
366
|
+
hp->s.dest_offset += nr;
|
367
|
+
hp->len.chunk -= nr;
|
368
|
+
p += nr;
|
369
|
+
assert(hp->len.chunk >= 0 && "negative chunk length");
|
370
|
+
if ((size_t)hp->len.chunk > REMAINING) {
|
371
|
+
HP_FL_SET(hp, INCHUNK);
|
372
|
+
goto post_exec;
|
373
|
+
} else {
|
374
|
+
fhold;
|
375
|
+
fgoto chunk_end;
|
376
|
+
}
|
377
|
+
}}
|
378
|
+
|
379
|
+
include unicorn_http_common "unicorn_http_common.rl";
|
380
|
+
}%%
|
381
|
+
|
382
|
+
/** Data **/
|
383
|
+
%% write data;
|
384
|
+
|
385
|
+
static void http_parser_init(struct http_parser *hp)
|
386
|
+
{
|
387
|
+
int cs = 0;
|
388
|
+
hp->flags = 0;
|
389
|
+
hp->mark = 0;
|
390
|
+
hp->offset = 0;
|
391
|
+
hp->start.field = 0;
|
392
|
+
hp->s.field_len = 0;
|
393
|
+
hp->len.content = 0;
|
394
|
+
hp->cont = Qfalse; /* zero on MRI, should be optimized away by above */
|
395
|
+
%% write init;
|
396
|
+
hp->cs = cs;
|
397
|
+
}
|
398
|
+
|
399
|
+
/** exec **/
|
400
|
+
static void
|
401
|
+
http_parser_execute(struct http_parser *hp, char *buffer, size_t len)
|
402
|
+
{
|
403
|
+
const char *p, *pe;
|
404
|
+
int cs = hp->cs;
|
405
|
+
size_t off = hp->offset;
|
406
|
+
|
407
|
+
if (cs == http_parser_first_final)
|
408
|
+
return;
|
409
|
+
|
410
|
+
assert(off <= len && "offset past end of buffer");
|
411
|
+
|
412
|
+
p = buffer+off;
|
413
|
+
pe = buffer+len;
|
414
|
+
|
415
|
+
assert((void *)(pe - p) == (void *)(len - off) &&
|
416
|
+
"pointers aren't same distance");
|
417
|
+
|
418
|
+
if (HP_FL_TEST(hp, INCHUNK)) {
|
419
|
+
HP_FL_UNSET(hp, INCHUNK);
|
420
|
+
goto skip_chunk_data_hack;
|
421
|
+
}
|
422
|
+
%% write exec;
|
423
|
+
post_exec: /* "_out:" also goes here */
|
424
|
+
if (hp->cs != http_parser_error)
|
425
|
+
hp->cs = cs;
|
426
|
+
hp->offset = ulong2uint(p - buffer);
|
427
|
+
|
428
|
+
assert(p <= pe && "buffer overflow after parsing execute");
|
429
|
+
assert(hp->offset <= len && "offset longer than length");
|
430
|
+
}
|
431
|
+
|
432
|
+
static struct http_parser *data_get(VALUE self)
|
433
|
+
{
|
434
|
+
struct http_parser *hp;
|
435
|
+
|
436
|
+
Data_Get_Struct(self, struct http_parser, hp);
|
437
|
+
assert(hp && "failed to extract http_parser struct");
|
438
|
+
return hp;
|
439
|
+
}
|
440
|
+
|
441
|
+
/*
|
442
|
+
* set rack.url_scheme to "https" or "http", no others are allowed by Rack
|
443
|
+
* this resembles the Rack::Request#scheme method as of rack commit
|
444
|
+
* 35bb5ba6746b5d346de9202c004cc926039650c7
|
445
|
+
*/
|
446
|
+
static void set_url_scheme(VALUE env, VALUE *server_port)
|
447
|
+
{
|
448
|
+
VALUE scheme = rb_hash_aref(env, g_rack_url_scheme);
|
449
|
+
|
450
|
+
if (NIL_P(scheme)) {
|
451
|
+
/*
|
452
|
+
* would anybody be horribly opposed to removing the X-Forwarded-SSL
|
453
|
+
* and X-Forwarded-Proto handling from this parser? We've had it
|
454
|
+
* forever and nobody has said anything against it, either.
|
455
|
+
* Anyways, please send comments to our public mailing list:
|
456
|
+
* unicorn-public@bogomips.org (no HTML mail, no subscription necessary)
|
457
|
+
*/
|
458
|
+
scheme = rb_hash_aref(env, g_http_x_forwarded_ssl);
|
459
|
+
if (!NIL_P(scheme) && STR_CSTR_EQ(scheme, "on")) {
|
460
|
+
*server_port = g_port_443;
|
461
|
+
scheme = g_https;
|
462
|
+
} else {
|
463
|
+
scheme = rb_hash_aref(env, g_http_x_forwarded_proto);
|
464
|
+
if (NIL_P(scheme)) {
|
465
|
+
scheme = g_http;
|
466
|
+
} else {
|
467
|
+
long len = RSTRING_LEN(scheme);
|
468
|
+
if (len >= 5 && !memcmp(RSTRING_PTR(scheme), "https", 5)) {
|
469
|
+
if (len != 5)
|
470
|
+
scheme = g_https;
|
471
|
+
*server_port = g_port_443;
|
472
|
+
} else {
|
473
|
+
scheme = g_http;
|
474
|
+
}
|
475
|
+
}
|
476
|
+
}
|
477
|
+
rb_hash_aset(env, g_rack_url_scheme, scheme);
|
478
|
+
} else if (STR_CSTR_EQ(scheme, "https")) {
|
479
|
+
*server_port = g_port_443;
|
480
|
+
} else {
|
481
|
+
assert(*server_port == g_port_80 && "server_port not set");
|
482
|
+
}
|
483
|
+
}
|
484
|
+
|
485
|
+
/*
|
486
|
+
* Parse and set the SERVER_NAME and SERVER_PORT variables
|
487
|
+
* Not supporting X-Forwarded-Host/X-Forwarded-Port in here since
|
488
|
+
* anybody who needs them is using an unsupported configuration and/or
|
489
|
+
* incompetent. Rack::Request will handle X-Forwarded-{Port,Host} just
|
490
|
+
* fine.
|
491
|
+
*/
|
492
|
+
static void set_server_vars(VALUE env, VALUE *server_port)
|
493
|
+
{
|
494
|
+
VALUE server_name = g_localhost;
|
495
|
+
VALUE host = rb_hash_aref(env, g_http_host);
|
496
|
+
|
497
|
+
if (!NIL_P(host)) {
|
498
|
+
char *host_ptr = RSTRING_PTR(host);
|
499
|
+
long host_len = RSTRING_LEN(host);
|
500
|
+
char *colon;
|
501
|
+
|
502
|
+
if (*host_ptr == '[') { /* ipv6 address format */
|
503
|
+
char *rbracket = memchr(host_ptr + 1, ']', host_len - 1);
|
504
|
+
|
505
|
+
if (rbracket)
|
506
|
+
colon = (rbracket[1] == ':') ? rbracket + 1 : NULL;
|
507
|
+
else
|
508
|
+
colon = memchr(host_ptr + 1, ':', host_len - 1);
|
509
|
+
} else {
|
510
|
+
colon = memchr(host_ptr, ':', host_len);
|
511
|
+
}
|
512
|
+
|
513
|
+
if (colon) {
|
514
|
+
long port_start = colon - host_ptr + 1;
|
515
|
+
|
516
|
+
server_name = rb_str_substr(host, 0, colon - host_ptr);
|
517
|
+
if ((host_len - port_start) > 0)
|
518
|
+
*server_port = rb_str_substr(host, port_start, host_len);
|
519
|
+
} else {
|
520
|
+
server_name = host;
|
521
|
+
}
|
522
|
+
}
|
523
|
+
rb_hash_aset(env, g_server_name, server_name);
|
524
|
+
rb_hash_aset(env, g_server_port, *server_port);
|
525
|
+
}
|
526
|
+
|
527
|
+
static void finalize_header(struct http_parser *hp)
|
528
|
+
{
|
529
|
+
VALUE server_port = g_port_80;
|
530
|
+
|
531
|
+
set_url_scheme(hp->env, &server_port);
|
532
|
+
set_server_vars(hp->env, &server_port);
|
533
|
+
|
534
|
+
if (!HP_FL_TEST(hp, HASHEADER))
|
535
|
+
rb_hash_aset(hp->env, g_server_protocol, g_http_09);
|
536
|
+
|
537
|
+
/* rack requires QUERY_STRING */
|
538
|
+
if (NIL_P(rb_hash_aref(hp->env, g_query_string)))
|
539
|
+
rb_hash_aset(hp->env, g_query_string, rb_str_new(NULL, 0));
|
540
|
+
}
|
541
|
+
|
542
|
+
static void hp_mark(void *ptr)
|
543
|
+
{
|
544
|
+
struct http_parser *hp = ptr;
|
545
|
+
|
546
|
+
rb_gc_mark(hp->buf);
|
547
|
+
rb_gc_mark(hp->env);
|
548
|
+
rb_gc_mark(hp->cont);
|
549
|
+
}
|
550
|
+
|
551
|
+
static VALUE HttpParser_alloc(VALUE klass)
|
552
|
+
{
|
553
|
+
struct http_parser *hp;
|
554
|
+
return Data_Make_Struct(klass, struct http_parser, hp_mark, -1, hp);
|
555
|
+
}
|
556
|
+
|
557
|
+
|
558
|
+
/**
|
559
|
+
* call-seq:
|
560
|
+
* parser.new => parser
|
561
|
+
*
|
562
|
+
* Creates a new parser.
|
563
|
+
*/
|
564
|
+
static VALUE HttpParser_init(VALUE self)
|
565
|
+
{
|
566
|
+
struct http_parser *hp = data_get(self);
|
567
|
+
|
568
|
+
http_parser_init(hp);
|
569
|
+
hp->buf = rb_str_new(NULL, 0);
|
570
|
+
hp->env = rb_hash_new();
|
571
|
+
|
572
|
+
return self;
|
573
|
+
}
|
574
|
+
|
575
|
+
/**
|
576
|
+
* call-seq:
|
577
|
+
* parser.clear => parser
|
578
|
+
*
|
579
|
+
* Resets the parser to it's initial state so that you can reuse it
|
580
|
+
* rather than making new ones.
|
581
|
+
*/
|
582
|
+
static VALUE HttpParser_clear(VALUE self)
|
583
|
+
{
|
584
|
+
struct http_parser *hp = data_get(self);
|
585
|
+
|
586
|
+
http_parser_init(hp);
|
587
|
+
rb_funcall(hp->env, id_clear, 0);
|
588
|
+
rb_ivar_set(self, id_response_start_sent, Qfalse);
|
589
|
+
|
590
|
+
return self;
|
591
|
+
}
|
592
|
+
|
593
|
+
static void advance_str(VALUE str, off_t nr)
|
594
|
+
{
|
595
|
+
long len = RSTRING_LEN(str);
|
596
|
+
|
597
|
+
if (len == 0)
|
598
|
+
return;
|
599
|
+
|
600
|
+
rb_str_modify(str);
|
601
|
+
|
602
|
+
assert(nr <= len && "trying to advance past end of buffer");
|
603
|
+
len -= nr;
|
604
|
+
if (len > 0) /* unlikely, len is usually 0 */
|
605
|
+
memmove(RSTRING_PTR(str), RSTRING_PTR(str) + nr, len);
|
606
|
+
rb_str_set_len(str, len);
|
607
|
+
}
|
608
|
+
|
609
|
+
/**
|
610
|
+
* call-seq:
|
611
|
+
* parser.content_length => nil or Integer
|
612
|
+
*
|
613
|
+
* Returns the number of bytes left to run through HttpParser#filter_body.
|
614
|
+
* This will initially be the value of the "Content-Length" HTTP header
|
615
|
+
* after header parsing is complete and will decrease in value as
|
616
|
+
* HttpParser#filter_body is called for each chunk. This should return
|
617
|
+
* zero for requests with no body.
|
618
|
+
*
|
619
|
+
* This will return nil on "Transfer-Encoding: chunked" requests.
|
620
|
+
*/
|
621
|
+
static VALUE HttpParser_content_length(VALUE self)
|
622
|
+
{
|
623
|
+
struct http_parser *hp = data_get(self);
|
624
|
+
|
625
|
+
return HP_FL_TEST(hp, CHUNKED) ? Qnil : OFFT2NUM(hp->len.content);
|
626
|
+
}
|
627
|
+
|
628
|
+
/**
|
629
|
+
* Document-method: parse
|
630
|
+
* call-seq:
|
631
|
+
* parser.parse => env or nil
|
632
|
+
*
|
633
|
+
* Takes a Hash and a String of data, parses the String of data filling
|
634
|
+
* in the Hash returning the Hash if parsing is finished, nil otherwise
|
635
|
+
* When returning the env Hash, it may modify data to point to where
|
636
|
+
* body processing should begin.
|
637
|
+
*
|
638
|
+
* Raises HttpParserError if there are parsing errors.
|
639
|
+
*/
|
640
|
+
static VALUE HttpParser_parse(VALUE self)
|
641
|
+
{
|
642
|
+
struct http_parser *hp = data_get(self);
|
643
|
+
VALUE data = hp->buf;
|
644
|
+
|
645
|
+
if (HP_FL_TEST(hp, TO_CLEAR))
|
646
|
+
HttpParser_clear(self);
|
647
|
+
|
648
|
+
http_parser_execute(hp, RSTRING_PTR(data), RSTRING_LEN(data));
|
649
|
+
if (hp->offset > MAX_HEADER_LEN)
|
650
|
+
parser_raise(e413, "HTTP header is too large");
|
651
|
+
|
652
|
+
if (hp->cs == http_parser_first_final ||
|
653
|
+
hp->cs == http_parser_en_ChunkedBody) {
|
654
|
+
advance_str(data, hp->offset + 1);
|
655
|
+
hp->offset = 0;
|
656
|
+
if (HP_FL_TEST(hp, INTRAILER))
|
657
|
+
HP_FL_SET(hp, REQEOF);
|
658
|
+
|
659
|
+
return hp->env;
|
660
|
+
}
|
661
|
+
|
662
|
+
if (hp->cs == http_parser_error)
|
663
|
+
parser_raise(eHttpParserError, "Invalid HTTP format, parsing fails.");
|
664
|
+
|
665
|
+
return Qnil;
|
666
|
+
}
|
667
|
+
|
668
|
+
/**
|
669
|
+
* Document-method: parse
|
670
|
+
* call-seq:
|
671
|
+
* parser.add_parse(buffer) => env or nil
|
672
|
+
*
|
673
|
+
* adds the contents of +buffer+ to the internal buffer and attempts to
|
674
|
+
* continue parsing. Returns the +env+ Hash on success or nil if more
|
675
|
+
* data is needed.
|
676
|
+
*
|
677
|
+
* Raises HttpParserError if there are parsing errors.
|
678
|
+
*/
|
679
|
+
static VALUE HttpParser_add_parse(VALUE self, VALUE buffer)
|
680
|
+
{
|
681
|
+
struct http_parser *hp = data_get(self);
|
682
|
+
|
683
|
+
Check_Type(buffer, T_STRING);
|
684
|
+
rb_str_buf_append(hp->buf, buffer);
|
685
|
+
|
686
|
+
return HttpParser_parse(self);
|
687
|
+
}
|
688
|
+
|
689
|
+
/**
|
690
|
+
* Document-method: trailers
|
691
|
+
* call-seq:
|
692
|
+
* parser.trailers(req, data) => req or nil
|
693
|
+
*
|
694
|
+
* This is an alias for HttpParser#headers
|
695
|
+
*/
|
696
|
+
|
697
|
+
/**
|
698
|
+
* Document-method: headers
|
699
|
+
*/
|
700
|
+
static VALUE HttpParser_headers(VALUE self, VALUE env, VALUE buf)
|
701
|
+
{
|
702
|
+
struct http_parser *hp = data_get(self);
|
703
|
+
|
704
|
+
hp->env = env;
|
705
|
+
hp->buf = buf;
|
706
|
+
|
707
|
+
return HttpParser_parse(self);
|
708
|
+
}
|
709
|
+
|
710
|
+
static int chunked_eof(struct http_parser *hp)
|
711
|
+
{
|
712
|
+
return ((hp->cs == http_parser_first_final) || HP_FL_TEST(hp, INTRAILER));
|
713
|
+
}
|
714
|
+
|
715
|
+
/**
|
716
|
+
* call-seq:
|
717
|
+
* parser.body_eof? => true or false
|
718
|
+
*
|
719
|
+
* Detects if we're done filtering the body or not. This can be used
|
720
|
+
* to detect when to stop calling HttpParser#filter_body.
|
721
|
+
*/
|
722
|
+
static VALUE HttpParser_body_eof(VALUE self)
|
723
|
+
{
|
724
|
+
struct http_parser *hp = data_get(self);
|
725
|
+
|
726
|
+
if (HP_FL_TEST(hp, CHUNKED))
|
727
|
+
return chunked_eof(hp) ? Qtrue : Qfalse;
|
728
|
+
|
729
|
+
return hp->len.content == 0 ? Qtrue : Qfalse;
|
730
|
+
}
|
731
|
+
|
732
|
+
/**
|
733
|
+
* call-seq:
|
734
|
+
* parser.keepalive? => true or false
|
735
|
+
*
|
736
|
+
* This should be used to detect if a request can really handle
|
737
|
+
* keepalives and pipelining. Currently, the rules are:
|
738
|
+
*
|
739
|
+
* 1. MUST be a GET or HEAD request
|
740
|
+
* 2. MUST be HTTP/1.1 +or+ HTTP/1.0 with "Connection: keep-alive"
|
741
|
+
* 3. MUST NOT have "Connection: close" set
|
742
|
+
*/
|
743
|
+
static VALUE HttpParser_keepalive(VALUE self)
|
744
|
+
{
|
745
|
+
struct http_parser *hp = data_get(self);
|
746
|
+
|
747
|
+
return HP_FL_ALL(hp, KEEPALIVE) ? Qtrue : Qfalse;
|
748
|
+
}
|
749
|
+
|
750
|
+
/**
|
751
|
+
* call-seq:
|
752
|
+
* parser.next? => true or false
|
753
|
+
*
|
754
|
+
* Exactly like HttpParser#keepalive?, except it will reset the internal
|
755
|
+
* parser state on next parse if it returns true.
|
756
|
+
*/
|
757
|
+
static VALUE HttpParser_next(VALUE self)
|
758
|
+
{
|
759
|
+
struct http_parser *hp = data_get(self);
|
760
|
+
|
761
|
+
if (HP_FL_ALL(hp, KEEPALIVE)) {
|
762
|
+
HP_FL_SET(hp, TO_CLEAR);
|
763
|
+
return Qtrue;
|
764
|
+
}
|
765
|
+
return Qfalse;
|
766
|
+
}
|
767
|
+
|
768
|
+
/**
|
769
|
+
* call-seq:
|
770
|
+
* parser.headers? => true or false
|
771
|
+
*
|
772
|
+
* This should be used to detect if a request has headers (and if
|
773
|
+
* the response will have headers as well). HTTP/0.9 requests
|
774
|
+
* should return false, all subsequent HTTP versions will return true
|
775
|
+
*/
|
776
|
+
static VALUE HttpParser_has_headers(VALUE self)
|
777
|
+
{
|
778
|
+
struct http_parser *hp = data_get(self);
|
779
|
+
|
780
|
+
return HP_FL_TEST(hp, HASHEADER) ? Qtrue : Qfalse;
|
781
|
+
}
|
782
|
+
|
783
|
+
static VALUE HttpParser_buf(VALUE self)
|
784
|
+
{
|
785
|
+
return data_get(self)->buf;
|
786
|
+
}
|
787
|
+
|
788
|
+
static VALUE HttpParser_env(VALUE self)
|
789
|
+
{
|
790
|
+
return data_get(self)->env;
|
791
|
+
}
|
792
|
+
|
793
|
+
/**
|
794
|
+
* call-seq:
|
795
|
+
* parser.filter_body(dst, src) => nil/src
|
796
|
+
*
|
797
|
+
* Takes a String of +src+, will modify data if dechunking is done.
|
798
|
+
* Returns +nil+ if there is more data left to process. Returns
|
799
|
+
* +src+ if body processing is complete. When returning +src+,
|
800
|
+
* it may modify +src+ so the start of the string points to where
|
801
|
+
* the body ended so that trailer processing can begin.
|
802
|
+
*
|
803
|
+
* Raises HttpParserError if there are dechunking errors.
|
804
|
+
* Basically this is a glorified memcpy(3) that copies +src+
|
805
|
+
* into +buf+ while filtering it through the dechunker.
|
806
|
+
*/
|
807
|
+
static VALUE HttpParser_filter_body(VALUE self, VALUE dst, VALUE src)
|
808
|
+
{
|
809
|
+
struct http_parser *hp = data_get(self);
|
810
|
+
char *srcptr;
|
811
|
+
long srclen;
|
812
|
+
|
813
|
+
srcptr = RSTRING_PTR(src);
|
814
|
+
srclen = RSTRING_LEN(src);
|
815
|
+
|
816
|
+
StringValue(dst);
|
817
|
+
|
818
|
+
if (HP_FL_TEST(hp, CHUNKED)) {
|
819
|
+
if (!chunked_eof(hp)) {
|
820
|
+
rb_str_modify(dst);
|
821
|
+
rb_str_resize(dst, srclen); /* we can never copy more than srclen bytes */
|
822
|
+
|
823
|
+
hp->s.dest_offset = 0;
|
824
|
+
hp->cont = dst;
|
825
|
+
hp->buf = src;
|
826
|
+
http_parser_execute(hp, srcptr, srclen);
|
827
|
+
if (hp->cs == http_parser_error)
|
828
|
+
parser_raise(eHttpParserError, "Invalid HTTP format, parsing fails.");
|
829
|
+
|
830
|
+
assert(hp->s.dest_offset <= hp->offset &&
|
831
|
+
"destination buffer overflow");
|
832
|
+
advance_str(src, hp->offset);
|
833
|
+
rb_str_set_len(dst, hp->s.dest_offset);
|
834
|
+
|
835
|
+
if (RSTRING_LEN(dst) == 0 && chunked_eof(hp)) {
|
836
|
+
assert(hp->len.chunk == 0 && "chunk at EOF but more to parse");
|
837
|
+
} else {
|
838
|
+
src = Qnil;
|
839
|
+
}
|
840
|
+
}
|
841
|
+
} else {
|
842
|
+
/* no need to enter the Ragel machine for unchunked transfers */
|
843
|
+
assert(hp->len.content >= 0 && "negative Content-Length");
|
844
|
+
if (hp->len.content > 0) {
|
845
|
+
long nr = MIN(srclen, hp->len.content);
|
846
|
+
|
847
|
+
rb_str_modify(dst);
|
848
|
+
rb_str_resize(dst, nr);
|
849
|
+
/*
|
850
|
+
* using rb_str_replace() to avoid memcpy() doesn't help in
|
851
|
+
* most cases because a GC-aware programmer will pass an explicit
|
852
|
+
* buffer to env["rack.input"].read and reuse the buffer in a loop.
|
853
|
+
* This causes copy-on-write behavior to be triggered anyways
|
854
|
+
* when the +src+ buffer is modified (when reading off the socket).
|
855
|
+
*/
|
856
|
+
hp->buf = src;
|
857
|
+
memcpy(RSTRING_PTR(dst), srcptr, nr);
|
858
|
+
hp->len.content -= nr;
|
859
|
+
if (hp->len.content == 0) {
|
860
|
+
HP_FL_SET(hp, REQEOF);
|
861
|
+
hp->cs = http_parser_first_final;
|
862
|
+
}
|
863
|
+
advance_str(src, nr);
|
864
|
+
src = Qnil;
|
865
|
+
}
|
866
|
+
}
|
867
|
+
hp->offset = 0; /* for trailer parsing */
|
868
|
+
return src;
|
869
|
+
}
|
870
|
+
|
871
|
+
#define SET_GLOBAL(var,str) do { \
|
872
|
+
var = find_common_field(str, sizeof(str) - 1); \
|
873
|
+
assert(!NIL_P(var) && "missed global field"); \
|
874
|
+
} while (0)
|
875
|
+
|
876
|
+
void Init_unicorn_http(void)
|
877
|
+
{
|
878
|
+
VALUE mUnicorn, cHttpParser;
|
879
|
+
|
880
|
+
mUnicorn = rb_define_module("Unicorn");
|
881
|
+
cHttpParser = rb_define_class_under(mUnicorn, "HttpParser", rb_cObject);
|
882
|
+
eHttpParserError =
|
883
|
+
rb_define_class_under(mUnicorn, "HttpParserError", rb_eIOError);
|
884
|
+
e413 = rb_define_class_under(mUnicorn, "RequestEntityTooLargeError",
|
885
|
+
eHttpParserError);
|
886
|
+
e414 = rb_define_class_under(mUnicorn, "RequestURITooLongError",
|
887
|
+
eHttpParserError);
|
888
|
+
|
889
|
+
init_globals();
|
890
|
+
rb_define_alloc_func(cHttpParser, HttpParser_alloc);
|
891
|
+
rb_define_method(cHttpParser, "initialize", HttpParser_init, 0);
|
892
|
+
rb_define_method(cHttpParser, "clear", HttpParser_clear, 0);
|
893
|
+
rb_define_method(cHttpParser, "parse", HttpParser_parse, 0);
|
894
|
+
rb_define_method(cHttpParser, "add_parse", HttpParser_add_parse, 1);
|
895
|
+
rb_define_method(cHttpParser, "headers", HttpParser_headers, 2);
|
896
|
+
rb_define_method(cHttpParser, "trailers", HttpParser_headers, 2);
|
897
|
+
rb_define_method(cHttpParser, "filter_body", HttpParser_filter_body, 2);
|
898
|
+
rb_define_method(cHttpParser, "content_length", HttpParser_content_length, 0);
|
899
|
+
rb_define_method(cHttpParser, "body_eof?", HttpParser_body_eof, 0);
|
900
|
+
rb_define_method(cHttpParser, "keepalive?", HttpParser_keepalive, 0);
|
901
|
+
rb_define_method(cHttpParser, "headers?", HttpParser_has_headers, 0);
|
902
|
+
rb_define_method(cHttpParser, "next?", HttpParser_next, 0);
|
903
|
+
rb_define_method(cHttpParser, "buf", HttpParser_buf, 0);
|
904
|
+
rb_define_method(cHttpParser, "env", HttpParser_env, 0);
|
905
|
+
|
906
|
+
/*
|
907
|
+
* The maximum size a single chunk when using chunked transfer encoding.
|
908
|
+
* This is only a theoretical maximum used to detect errors in clients,
|
909
|
+
* it is highly unlikely to encounter clients that send more than
|
910
|
+
* several kilobytes at once.
|
911
|
+
*/
|
912
|
+
rb_define_const(cHttpParser, "CHUNK_MAX", OFFT2NUM(UH_OFF_T_MAX));
|
913
|
+
|
914
|
+
/*
|
915
|
+
* The maximum size of the body as specified by Content-Length.
|
916
|
+
* This is only a theoretical maximum, the actual limit is subject
|
917
|
+
* to the limits of the file system used for +Dir.tmpdir+.
|
918
|
+
*/
|
919
|
+
rb_define_const(cHttpParser, "LENGTH_MAX", OFFT2NUM(UH_OFF_T_MAX));
|
920
|
+
|
921
|
+
rb_define_singleton_method(cHttpParser, "max_header_len=", set_maxhdrlen, 1);
|
922
|
+
|
923
|
+
init_common_fields();
|
924
|
+
SET_GLOBAL(g_http_host, "HOST");
|
925
|
+
SET_GLOBAL(g_http_trailer, "TRAILER");
|
926
|
+
SET_GLOBAL(g_http_transfer_encoding, "TRANSFER_ENCODING");
|
927
|
+
SET_GLOBAL(g_content_length, "CONTENT_LENGTH");
|
928
|
+
SET_GLOBAL(g_http_connection, "CONNECTION");
|
929
|
+
id_clear = rb_intern("clear");
|
930
|
+
id_set_backtrace = rb_intern("set_backtrace");
|
931
|
+
id_response_start_sent = rb_intern("@response_start_sent");
|
932
|
+
init_unicorn_httpdate();
|
933
|
+
}
|
934
|
+
#undef SET_GLOBAL
|