1 /*
2 * nghttp2 - HTTP/2 C Library
3 *
4 * Copyright (c) 2012 Tatsuhiro Tsujikawa
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining
7 * a copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sublicense, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice shall be
15 * included in all copies or substantial portions of the Software.
16 *
17 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
18 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
19 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
20 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
21 * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
22 * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
23 * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
24 */
25 #include "shrpx_connection_handler.h"
26
27 #ifdef HAVE_UNISTD_H
28 # include <unistd.h>
29 #endif // HAVE_UNISTD_H
30 #include <sys/types.h>
31 #include <sys/wait.h>
32
33 #include <cerrno>
34 #include <thread>
35 #include <random>
36
37 #include "shrpx_client_handler.h"
38 #include "shrpx_tls.h"
39 #include "shrpx_worker.h"
40 #include "shrpx_config.h"
41 #include "shrpx_http2_session.h"
42 #include "shrpx_connect_blocker.h"
43 #include "shrpx_downstream_connection.h"
44 #include "shrpx_accept_handler.h"
45 #include "shrpx_memcached_dispatcher.h"
46 #include "shrpx_signal.h"
47 #include "shrpx_log.h"
48 #include "xsi_strerror.h"
49 #include "util.h"
50 #include "template.h"
51
52 using namespace nghttp2;
53
54 namespace shrpx {
55
56 namespace {
acceptor_disable_cb(struct ev_loop * loop,ev_timer * w,int revent)57 void acceptor_disable_cb(struct ev_loop *loop, ev_timer *w, int revent) {
58 auto h = static_cast<ConnectionHandler *>(w->data);
59
60 // If we are in graceful shutdown period, we must not enable
61 // acceptors again.
62 if (h->get_graceful_shutdown()) {
63 return;
64 }
65
66 h->enable_acceptor();
67 }
68 } // namespace
69
70 namespace {
ocsp_cb(struct ev_loop * loop,ev_timer * w,int revent)71 void ocsp_cb(struct ev_loop *loop, ev_timer *w, int revent) {
72 auto h = static_cast<ConnectionHandler *>(w->data);
73
74 // If we are in graceful shutdown period, we won't do ocsp query.
75 if (h->get_graceful_shutdown()) {
76 return;
77 }
78
79 LOG(NOTICE) << "Start ocsp update";
80
81 h->proceed_next_cert_ocsp();
82 }
83 } // namespace
84
85 namespace {
ocsp_read_cb(struct ev_loop * loop,ev_io * w,int revent)86 void ocsp_read_cb(struct ev_loop *loop, ev_io *w, int revent) {
87 auto h = static_cast<ConnectionHandler *>(w->data);
88
89 h->read_ocsp_chunk();
90 }
91 } // namespace
92
93 namespace {
ocsp_chld_cb(struct ev_loop * loop,ev_child * w,int revent)94 void ocsp_chld_cb(struct ev_loop *loop, ev_child *w, int revent) {
95 auto h = static_cast<ConnectionHandler *>(w->data);
96
97 h->handle_ocsp_complete();
98 }
99 } // namespace
100
101 namespace {
thread_join_async_cb(struct ev_loop * loop,ev_async * w,int revent)102 void thread_join_async_cb(struct ev_loop *loop, ev_async *w, int revent) {
103 ev_break(loop);
104 }
105 } // namespace
106
107 namespace {
serial_event_async_cb(struct ev_loop * loop,ev_async * w,int revent)108 void serial_event_async_cb(struct ev_loop *loop, ev_async *w, int revent) {
109 auto h = static_cast<ConnectionHandler *>(w->data);
110
111 h->handle_serial_event();
112 }
113 } // namespace
114
ConnectionHandler(struct ev_loop * loop,std::mt19937 & gen)115 ConnectionHandler::ConnectionHandler(struct ev_loop *loop, std::mt19937 &gen)
116 :
117 #ifdef ENABLE_HTTP3
118 quic_ipc_fd_(-1),
119 #endif // ENABLE_HTTP3
120 gen_(gen),
121 single_worker_(nullptr),
122 loop_(loop),
123 #ifdef HAVE_NEVERBLEED
124 nb_(nullptr),
125 #endif // HAVE_NEVERBLEED
126 tls_ticket_key_memcached_get_retry_count_(0),
127 tls_ticket_key_memcached_fail_count_(0),
128 worker_round_robin_cnt_(get_config()->api.enabled ? 1 : 0),
129 graceful_shutdown_(false),
130 enable_acceptor_on_ocsp_completion_(false) {
131 ev_timer_init(&disable_acceptor_timer_, acceptor_disable_cb, 0., 0.);
132 disable_acceptor_timer_.data = this;
133
134 ev_timer_init(&ocsp_timer_, ocsp_cb, 0., 0.);
135 ocsp_timer_.data = this;
136
137 ev_io_init(&ocsp_.rev, ocsp_read_cb, -1, EV_READ);
138 ocsp_.rev.data = this;
139
140 ev_async_init(&thread_join_asyncev_, thread_join_async_cb);
141
142 ev_async_init(&serial_event_asyncev_, serial_event_async_cb);
143 serial_event_asyncev_.data = this;
144
145 ev_async_start(loop_, &serial_event_asyncev_);
146
147 ev_child_init(&ocsp_.chldev, ocsp_chld_cb, 0, 0);
148 ocsp_.chldev.data = this;
149
150 ocsp_.next = 0;
151 ocsp_.proc.rfd = -1;
152
153 reset_ocsp();
154 }
155
~ConnectionHandler()156 ConnectionHandler::~ConnectionHandler() {
157 ev_child_stop(loop_, &ocsp_.chldev);
158 ev_async_stop(loop_, &serial_event_asyncev_);
159 ev_async_stop(loop_, &thread_join_asyncev_);
160 ev_io_stop(loop_, &ocsp_.rev);
161 ev_timer_stop(loop_, &ocsp_timer_);
162 ev_timer_stop(loop_, &disable_acceptor_timer_);
163
164 #ifdef ENABLE_HTTP3
165 for (auto ssl_ctx : quic_all_ssl_ctx_) {
166 if (ssl_ctx == nullptr) {
167 continue;
168 }
169
170 auto tls_ctx_data =
171 static_cast<tls::TLSContextData *>(SSL_CTX_get_app_data(ssl_ctx));
172 delete tls_ctx_data;
173 SSL_CTX_free(ssl_ctx);
174 }
175 #endif // ENABLE_HTTP3
176
177 for (auto ssl_ctx : all_ssl_ctx_) {
178 auto tls_ctx_data =
179 static_cast<tls::TLSContextData *>(SSL_CTX_get_app_data(ssl_ctx));
180 delete tls_ctx_data;
181 SSL_CTX_free(ssl_ctx);
182 }
183
184 // Free workers before destroying ev_loop
185 workers_.clear();
186
187 for (auto loop : worker_loops_) {
188 ev_loop_destroy(loop);
189 }
190 }
191
set_ticket_keys_to_worker(const std::shared_ptr<TicketKeys> & ticket_keys)192 void ConnectionHandler::set_ticket_keys_to_worker(
193 const std::shared_ptr<TicketKeys> &ticket_keys) {
194 for (auto &worker : workers_) {
195 worker->set_ticket_keys(ticket_keys);
196 }
197 }
198
worker_reopen_log_files()199 void ConnectionHandler::worker_reopen_log_files() {
200 for (auto &worker : workers_) {
201 WorkerEvent wev{};
202
203 wev.type = WorkerEventType::REOPEN_LOG;
204
205 worker->send(std::move(wev));
206 }
207 }
208
worker_replace_downstream(std::shared_ptr<DownstreamConfig> downstreamconf)209 void ConnectionHandler::worker_replace_downstream(
210 std::shared_ptr<DownstreamConfig> downstreamconf) {
211 for (auto &worker : workers_) {
212 WorkerEvent wev{};
213
214 wev.type = WorkerEventType::REPLACE_DOWNSTREAM;
215 wev.downstreamconf = downstreamconf;
216
217 worker->send(std::move(wev));
218 }
219 }
220
create_single_worker()221 int ConnectionHandler::create_single_worker() {
222 cert_tree_ = tls::create_cert_lookup_tree();
223 auto sv_ssl_ctx = tls::setup_server_ssl_context(
224 all_ssl_ctx_, indexed_ssl_ctx_, cert_tree_.get()
225 #ifdef HAVE_NEVERBLEED
226 ,
227 nb_
228 #endif // HAVE_NEVERBLEED
229 );
230
231 #ifdef ENABLE_HTTP3
232 quic_cert_tree_ = tls::create_cert_lookup_tree();
233 auto quic_sv_ssl_ctx = tls::setup_quic_server_ssl_context(
234 quic_all_ssl_ctx_, quic_indexed_ssl_ctx_, quic_cert_tree_.get()
235 # ifdef HAVE_NEVERBLEED
236 ,
237 nb_
238 # endif // HAVE_NEVERBLEED
239 );
240 #endif // ENABLE_HTTP3
241
242 auto cl_ssl_ctx = tls::setup_downstream_client_ssl_context(
243 #ifdef HAVE_NEVERBLEED
244 nb_
245 #endif // HAVE_NEVERBLEED
246 );
247
248 if (cl_ssl_ctx) {
249 all_ssl_ctx_.push_back(cl_ssl_ctx);
250 #ifdef ENABLE_HTTP3
251 quic_all_ssl_ctx_.push_back(nullptr);
252 #endif // ENABLE_HTTP3
253 }
254
255 auto config = get_config();
256 auto &tlsconf = config->tls;
257
258 SSL_CTX *session_cache_ssl_ctx = nullptr;
259 {
260 auto &memcachedconf = config->tls.session_cache.memcached;
261 if (memcachedconf.tls) {
262 session_cache_ssl_ctx = tls::create_ssl_client_context(
263 #ifdef HAVE_NEVERBLEED
264 nb_,
265 #endif // HAVE_NEVERBLEED
266 tlsconf.cacert, memcachedconf.cert_file,
267 memcachedconf.private_key_file, nullptr);
268 all_ssl_ctx_.push_back(session_cache_ssl_ctx);
269 #ifdef ENABLE_HTTP3
270 quic_all_ssl_ctx_.push_back(nullptr);
271 #endif // ENABLE_HTTP3
272 }
273 }
274
275 #if defined(ENABLE_HTTP3) && defined(HAVE_LIBBPF)
276 quic_bpf_refs_.resize(config->conn.quic_listener.addrs.size());
277 #endif // ENABLE_HTTP3 && HAVE_LIBBPF
278
279 #ifdef ENABLE_HTTP3
280 assert(cid_prefixes_.size() == 1);
281 const auto &cid_prefix = cid_prefixes_[0];
282 #endif // ENABLE_HTTP3
283
284 single_worker_ = std::make_unique<Worker>(
285 loop_, sv_ssl_ctx, cl_ssl_ctx, session_cache_ssl_ctx, cert_tree_.get(),
286 #ifdef ENABLE_HTTP3
287 quic_sv_ssl_ctx, quic_cert_tree_.get(), cid_prefix.data(),
288 cid_prefix.size(),
289 # ifdef HAVE_LIBBPF
290 /* index = */ 0,
291 # endif // HAVE_LIBBPF
292 #endif // ENABLE_HTTP3
293 ticket_keys_, this, config->conn.downstream);
294 #ifdef HAVE_MRUBY
295 if (single_worker_->create_mruby_context() != 0) {
296 return -1;
297 }
298 #endif // HAVE_MRUBY
299
300 #ifdef ENABLE_HTTP3
301 if (single_worker_->setup_quic_server_socket() != 0) {
302 return -1;
303 }
304 #endif // ENABLE_HTTP3
305
306 return 0;
307 }
308
create_worker_thread(size_t num)309 int ConnectionHandler::create_worker_thread(size_t num) {
310 #ifndef NOTHREADS
311 assert(workers_.size() == 0);
312
313 cert_tree_ = tls::create_cert_lookup_tree();
314 auto sv_ssl_ctx = tls::setup_server_ssl_context(
315 all_ssl_ctx_, indexed_ssl_ctx_, cert_tree_.get()
316 # ifdef HAVE_NEVERBLEED
317 ,
318 nb_
319 # endif // HAVE_NEVERBLEED
320 );
321
322 # ifdef ENABLE_HTTP3
323 quic_cert_tree_ = tls::create_cert_lookup_tree();
324 auto quic_sv_ssl_ctx = tls::setup_quic_server_ssl_context(
325 quic_all_ssl_ctx_, quic_indexed_ssl_ctx_, quic_cert_tree_.get()
326 # ifdef HAVE_NEVERBLEED
327 ,
328 nb_
329 # endif // HAVE_NEVERBLEED
330 );
331 # endif // ENABLE_HTTP3
332
333 auto cl_ssl_ctx = tls::setup_downstream_client_ssl_context(
334 # ifdef HAVE_NEVERBLEED
335 nb_
336 # endif // HAVE_NEVERBLEED
337 );
338
339 if (cl_ssl_ctx) {
340 all_ssl_ctx_.push_back(cl_ssl_ctx);
341 # ifdef ENABLE_HTTP3
342 quic_all_ssl_ctx_.push_back(nullptr);
343 # endif // ENABLE_HTTP3
344 }
345
346 auto config = get_config();
347 auto &tlsconf = config->tls;
348 auto &apiconf = config->api;
349
350 # if defined(ENABLE_HTTP3) && defined(HAVE_LIBBPF)
351 quic_bpf_refs_.resize(config->conn.quic_listener.addrs.size());
352 # endif // ENABLE_HTTP3 && HAVE_LIBBPF
353
354 // We have dedicated worker for API request processing.
355 if (apiconf.enabled) {
356 ++num;
357 }
358
359 SSL_CTX *session_cache_ssl_ctx = nullptr;
360 {
361 auto &memcachedconf = config->tls.session_cache.memcached;
362
363 if (memcachedconf.tls) {
364 session_cache_ssl_ctx = tls::create_ssl_client_context(
365 # ifdef HAVE_NEVERBLEED
366 nb_,
367 # endif // HAVE_NEVERBLEED
368 tlsconf.cacert, memcachedconf.cert_file,
369 memcachedconf.private_key_file, nullptr);
370 all_ssl_ctx_.push_back(session_cache_ssl_ctx);
371 # ifdef ENABLE_HTTP3
372 quic_all_ssl_ctx_.push_back(nullptr);
373 # endif // ENABLE_HTTP3
374 }
375 }
376
377 # ifdef ENABLE_HTTP3
378 assert(cid_prefixes_.size() == num);
379 # endif // ENABLE_HTTP3
380
381 for (size_t i = 0; i < num; ++i) {
382 auto loop = ev_loop_new(config->ev_loop_flags);
383
384 # ifdef ENABLE_HTTP3
385 const auto &cid_prefix = cid_prefixes_[i];
386 # endif // ENABLE_HTTP3
387
388 auto worker = std::make_unique<Worker>(
389 loop, sv_ssl_ctx, cl_ssl_ctx, session_cache_ssl_ctx, cert_tree_.get(),
390 # ifdef ENABLE_HTTP3
391 quic_sv_ssl_ctx, quic_cert_tree_.get(), cid_prefix.data(),
392 cid_prefix.size(),
393 # ifdef HAVE_LIBBPF
394 i,
395 # endif // HAVE_LIBBPF
396 # endif // ENABLE_HTTP3
397 ticket_keys_, this, config->conn.downstream);
398 # ifdef HAVE_MRUBY
399 if (worker->create_mruby_context() != 0) {
400 return -1;
401 }
402 # endif // HAVE_MRUBY
403
404 # ifdef ENABLE_HTTP3
405 if ((!apiconf.enabled || i != 0) &&
406 worker->setup_quic_server_socket() != 0) {
407 return -1;
408 }
409 # endif // ENABLE_HTTP3
410
411 workers_.push_back(std::move(worker));
412 worker_loops_.push_back(loop);
413
414 LLOG(NOTICE, this) << "Created worker thread #" << workers_.size() - 1;
415 }
416
417 for (auto &worker : workers_) {
418 worker->run_async();
419 }
420
421 #endif // NOTHREADS
422
423 return 0;
424 }
425
join_worker()426 void ConnectionHandler::join_worker() {
427 #ifndef NOTHREADS
428 int n = 0;
429
430 if (LOG_ENABLED(INFO)) {
431 LLOG(INFO, this) << "Waiting for worker thread to join: n="
432 << workers_.size();
433 }
434
435 for (auto &worker : workers_) {
436 worker->wait();
437 if (LOG_ENABLED(INFO)) {
438 LLOG(INFO, this) << "Thread #" << n << " joined";
439 }
440 ++n;
441 }
442 #endif // NOTHREADS
443 }
444
graceful_shutdown_worker()445 void ConnectionHandler::graceful_shutdown_worker() {
446 if (single_worker_) {
447 return;
448 }
449
450 if (LOG_ENABLED(INFO)) {
451 LLOG(INFO, this) << "Sending graceful shutdown signal to worker";
452 }
453
454 for (auto &worker : workers_) {
455 WorkerEvent wev{};
456 wev.type = WorkerEventType::GRACEFUL_SHUTDOWN;
457
458 worker->send(std::move(wev));
459 }
460
461 #ifndef NOTHREADS
462 ev_async_start(loop_, &thread_join_asyncev_);
463
464 thread_join_fut_ = std::async(std::launch::async, [this]() {
465 (void)reopen_log_files(get_config()->logging);
466 join_worker();
467 ev_async_send(get_loop(), &thread_join_asyncev_);
468 delete_log_config();
469 });
470 #endif // NOTHREADS
471 }
472
handle_connection(int fd,sockaddr * addr,int addrlen,const UpstreamAddr * faddr)473 int ConnectionHandler::handle_connection(int fd, sockaddr *addr, int addrlen,
474 const UpstreamAddr *faddr) {
475 if (LOG_ENABLED(INFO)) {
476 LLOG(INFO, this) << "Accepted connection from "
477 << util::numeric_name(addr, addrlen) << ", fd=" << fd;
478 }
479
480 auto config = get_config();
481
482 if (single_worker_) {
483 auto &upstreamconf = config->conn.upstream;
484 if (single_worker_->get_worker_stat()->num_connections >=
485 upstreamconf.worker_connections) {
486
487 if (LOG_ENABLED(INFO)) {
488 LLOG(INFO, this) << "Too many connections >="
489 << upstreamconf.worker_connections;
490 }
491
492 close(fd);
493 return -1;
494 }
495
496 auto client =
497 tls::accept_connection(single_worker_.get(), fd, addr, addrlen, faddr);
498 if (!client) {
499 LLOG(ERROR, this) << "ClientHandler creation failed";
500
501 close(fd);
502 return -1;
503 }
504
505 return 0;
506 }
507
508 Worker *worker;
509
510 if (faddr->alt_mode == UpstreamAltMode::API) {
511 worker = workers_[0].get();
512
513 if (LOG_ENABLED(INFO)) {
514 LOG(INFO) << "Dispatch connection to API worker #0";
515 }
516 } else {
517 worker = workers_[worker_round_robin_cnt_].get();
518
519 if (LOG_ENABLED(INFO)) {
520 LOG(INFO) << "Dispatch connection to worker #" << worker_round_robin_cnt_;
521 }
522
523 if (++worker_round_robin_cnt_ == workers_.size()) {
524 auto &apiconf = config->api;
525
526 if (apiconf.enabled) {
527 worker_round_robin_cnt_ = 1;
528 } else {
529 worker_round_robin_cnt_ = 0;
530 }
531 }
532 }
533
534 WorkerEvent wev{};
535 wev.type = WorkerEventType::NEW_CONNECTION;
536 wev.client_fd = fd;
537 memcpy(&wev.client_addr, addr, addrlen);
538 wev.client_addrlen = addrlen;
539 wev.faddr = faddr;
540
541 worker->send(std::move(wev));
542
543 return 0;
544 }
545
get_loop() const546 struct ev_loop *ConnectionHandler::get_loop() const {
547 return loop_;
548 }
549
get_single_worker() const550 Worker *ConnectionHandler::get_single_worker() const {
551 return single_worker_.get();
552 }
553
add_acceptor(std::unique_ptr<AcceptHandler> h)554 void ConnectionHandler::add_acceptor(std::unique_ptr<AcceptHandler> h) {
555 acceptors_.push_back(std::move(h));
556 }
557
delete_acceptor()558 void ConnectionHandler::delete_acceptor() { acceptors_.clear(); }
559
enable_acceptor()560 void ConnectionHandler::enable_acceptor() {
561 for (auto &a : acceptors_) {
562 a->enable();
563 }
564 }
565
disable_acceptor()566 void ConnectionHandler::disable_acceptor() {
567 for (auto &a : acceptors_) {
568 a->disable();
569 }
570 }
571
sleep_acceptor(ev_tstamp t)572 void ConnectionHandler::sleep_acceptor(ev_tstamp t) {
573 if (t == 0. || ev_is_active(&disable_acceptor_timer_)) {
574 return;
575 }
576
577 disable_acceptor();
578
579 ev_timer_set(&disable_acceptor_timer_, t, 0.);
580 ev_timer_start(loop_, &disable_acceptor_timer_);
581 }
582
accept_pending_connection()583 void ConnectionHandler::accept_pending_connection() {
584 for (auto &a : acceptors_) {
585 a->accept_connection();
586 }
587 }
588
set_ticket_keys(std::shared_ptr<TicketKeys> ticket_keys)589 void ConnectionHandler::set_ticket_keys(
590 std::shared_ptr<TicketKeys> ticket_keys) {
591 ticket_keys_ = std::move(ticket_keys);
592 if (single_worker_) {
593 single_worker_->set_ticket_keys(ticket_keys_);
594 }
595 }
596
get_ticket_keys() const597 const std::shared_ptr<TicketKeys> &ConnectionHandler::get_ticket_keys() const {
598 return ticket_keys_;
599 }
600
set_graceful_shutdown(bool f)601 void ConnectionHandler::set_graceful_shutdown(bool f) {
602 graceful_shutdown_ = f;
603 if (single_worker_) {
604 single_worker_->set_graceful_shutdown(f);
605 }
606 }
607
get_graceful_shutdown() const608 bool ConnectionHandler::get_graceful_shutdown() const {
609 return graceful_shutdown_;
610 }
611
cancel_ocsp_update()612 void ConnectionHandler::cancel_ocsp_update() {
613 enable_acceptor_on_ocsp_completion_ = false;
614 ev_timer_stop(loop_, &ocsp_timer_);
615
616 if (ocsp_.proc.pid == 0) {
617 return;
618 }
619
620 int rv;
621
622 rv = kill(ocsp_.proc.pid, SIGTERM);
623 if (rv != 0) {
624 auto error = errno;
625 LOG(ERROR) << "Could not send signal to OCSP query process: errno="
626 << error;
627 }
628
629 while ((rv = waitpid(ocsp_.proc.pid, nullptr, 0)) == -1 && errno == EINTR)
630 ;
631 if (rv == -1) {
632 auto error = errno;
633 LOG(ERROR) << "Error occurred while we were waiting for the completion of "
634 "OCSP query process: errno="
635 << error;
636 }
637 }
638
639 // inspired by h2o_read_command function from h2o project:
640 // https://github.com/h2o/h2o
start_ocsp_update(const char * cert_file)641 int ConnectionHandler::start_ocsp_update(const char *cert_file) {
642 int rv;
643
644 if (LOG_ENABLED(INFO)) {
645 LOG(INFO) << "Start ocsp update for " << cert_file;
646 }
647
648 assert(!ev_is_active(&ocsp_.rev));
649 assert(!ev_is_active(&ocsp_.chldev));
650
651 char *const argv[] = {
652 const_cast<char *>(
653 get_config()->tls.ocsp.fetch_ocsp_response_file.c_str()),
654 const_cast<char *>(cert_file), nullptr};
655
656 Process proc;
657 rv = exec_read_command(proc, argv);
658 if (rv != 0) {
659 return -1;
660 }
661
662 ocsp_.proc = proc;
663
664 ev_io_set(&ocsp_.rev, ocsp_.proc.rfd, EV_READ);
665 ev_io_start(loop_, &ocsp_.rev);
666
667 ev_child_set(&ocsp_.chldev, ocsp_.proc.pid, 0);
668 ev_child_start(loop_, &ocsp_.chldev);
669
670 return 0;
671 }
672
read_ocsp_chunk()673 void ConnectionHandler::read_ocsp_chunk() {
674 std::array<uint8_t, 4_k> buf;
675 for (;;) {
676 ssize_t n;
677 while ((n = read(ocsp_.proc.rfd, buf.data(), buf.size())) == -1 &&
678 errno == EINTR)
679 ;
680
681 if (n == -1) {
682 if (errno == EAGAIN || errno == EWOULDBLOCK) {
683 return;
684 }
685 auto error = errno;
686 LOG(WARN) << "Reading from ocsp query command failed: errno=" << error;
687 ocsp_.error = error;
688
689 break;
690 }
691
692 if (n == 0) {
693 break;
694 }
695
696 std::copy_n(std::begin(buf), n, std::back_inserter(ocsp_.resp));
697 }
698
699 ev_io_stop(loop_, &ocsp_.rev);
700 }
701
handle_ocsp_complete()702 void ConnectionHandler::handle_ocsp_complete() {
703 ev_io_stop(loop_, &ocsp_.rev);
704 ev_child_stop(loop_, &ocsp_.chldev);
705
706 assert(ocsp_.next < all_ssl_ctx_.size());
707 #ifdef ENABLE_HTTP3
708 assert(all_ssl_ctx_.size() == quic_all_ssl_ctx_.size());
709 #endif // ENABLE_HTTP3
710
711 auto ssl_ctx = all_ssl_ctx_[ocsp_.next];
712 auto tls_ctx_data =
713 static_cast<tls::TLSContextData *>(SSL_CTX_get_app_data(ssl_ctx));
714
715 auto rstatus = ocsp_.chldev.rstatus;
716 auto status = WEXITSTATUS(rstatus);
717 if (ocsp_.error || !WIFEXITED(rstatus) || status != 0) {
718 LOG(WARN) << "ocsp query command for " << tls_ctx_data->cert_file
719 << " failed: error=" << ocsp_.error << ", rstatus=" << log::hex
720 << rstatus << log::dec << ", status=" << status;
721 ++ocsp_.next;
722 proceed_next_cert_ocsp();
723 return;
724 }
725
726 if (LOG_ENABLED(INFO)) {
727 LOG(INFO) << "ocsp update for " << tls_ctx_data->cert_file
728 << " finished successfully";
729 }
730
731 auto config = get_config();
732 auto &tlsconf = config->tls;
733
734 if (tlsconf.ocsp.no_verify ||
735 tls::verify_ocsp_response(ssl_ctx, ocsp_.resp.data(),
736 ocsp_.resp.size()) == 0) {
737 #ifdef ENABLE_HTTP3
738 // We have list of SSL_CTX with the same certificate in
739 // quic_all_ssl_ctx_ as well. Some SSL_CTXs are missing there in
740 // that case we get nullptr.
741 auto quic_ssl_ctx = quic_all_ssl_ctx_[ocsp_.next];
742 if (quic_ssl_ctx) {
743 # ifndef OPENSSL_IS_BORINGSSL
744 auto quic_tls_ctx_data = static_cast<tls::TLSContextData *>(
745 SSL_CTX_get_app_data(quic_ssl_ctx));
746 # ifdef HAVE_ATOMIC_STD_SHARED_PTR
747 std::atomic_store_explicit(
748 &quic_tls_ctx_data->ocsp_data,
749 std::make_shared<std::vector<uint8_t>>(ocsp_.resp),
750 std::memory_order_release);
751 # else // !HAVE_ATOMIC_STD_SHARED_PTR
752 std::lock_guard<std::mutex> g(quic_tls_ctx_data->mu);
753 quic_tls_ctx_data->ocsp_data =
754 std::make_shared<std::vector<uint8_t>>(ocsp_.resp);
755 # endif // !HAVE_ATOMIC_STD_SHARED_PTR
756 # else // OPENSSL_IS_BORINGSSL
757 SSL_CTX_set_ocsp_response(quic_ssl_ctx, ocsp_.resp.data(),
758 ocsp_.resp.size());
759 # endif // OPENSSL_IS_BORINGSSL
760 }
761 #endif // ENABLE_HTTP3
762
763 #ifndef OPENSSL_IS_BORINGSSL
764 # ifdef HAVE_ATOMIC_STD_SHARED_PTR
765 std::atomic_store_explicit(
766 &tls_ctx_data->ocsp_data,
767 std::make_shared<std::vector<uint8_t>>(std::move(ocsp_.resp)),
768 std::memory_order_release);
769 # else // !HAVE_ATOMIC_STD_SHARED_PTR
770 std::lock_guard<std::mutex> g(tls_ctx_data->mu);
771 tls_ctx_data->ocsp_data =
772 std::make_shared<std::vector<uint8_t>>(std::move(ocsp_.resp));
773 # endif // !HAVE_ATOMIC_STD_SHARED_PTR
774 #else // OPENSSL_IS_BORINGSSL
775 SSL_CTX_set_ocsp_response(ssl_ctx, ocsp_.resp.data(), ocsp_.resp.size());
776 #endif // OPENSSL_IS_BORINGSSL
777 }
778
779 ++ocsp_.next;
780 proceed_next_cert_ocsp();
781 }
782
reset_ocsp()783 void ConnectionHandler::reset_ocsp() {
784 if (ocsp_.proc.rfd != -1) {
785 close(ocsp_.proc.rfd);
786 }
787
788 ocsp_.proc.rfd = -1;
789 ocsp_.proc.pid = 0;
790 ocsp_.error = 0;
791 ocsp_.resp = std::vector<uint8_t>();
792 }
793
proceed_next_cert_ocsp()794 void ConnectionHandler::proceed_next_cert_ocsp() {
795 for (;;) {
796 reset_ocsp();
797 if (ocsp_.next == all_ssl_ctx_.size()) {
798 ocsp_.next = 0;
799 // We have updated all ocsp response, and schedule next update.
800 ev_timer_set(&ocsp_timer_, get_config()->tls.ocsp.update_interval, 0.);
801 ev_timer_start(loop_, &ocsp_timer_);
802
803 if (enable_acceptor_on_ocsp_completion_) {
804 enable_acceptor_on_ocsp_completion_ = false;
805 enable_acceptor();
806 }
807
808 return;
809 }
810
811 auto ssl_ctx = all_ssl_ctx_[ocsp_.next];
812 auto tls_ctx_data =
813 static_cast<tls::TLSContextData *>(SSL_CTX_get_app_data(ssl_ctx));
814
815 // client SSL_CTX is also included in all_ssl_ctx_, but has no
816 // tls_ctx_data.
817 if (!tls_ctx_data) {
818 ++ocsp_.next;
819 continue;
820 }
821
822 auto cert_file = tls_ctx_data->cert_file;
823
824 if (start_ocsp_update(cert_file) != 0) {
825 ++ocsp_.next;
826 continue;
827 }
828
829 break;
830 }
831 }
832
set_tls_ticket_key_memcached_dispatcher(std::unique_ptr<MemcachedDispatcher> dispatcher)833 void ConnectionHandler::set_tls_ticket_key_memcached_dispatcher(
834 std::unique_ptr<MemcachedDispatcher> dispatcher) {
835 tls_ticket_key_memcached_dispatcher_ = std::move(dispatcher);
836 }
837
838 MemcachedDispatcher *
get_tls_ticket_key_memcached_dispatcher() const839 ConnectionHandler::get_tls_ticket_key_memcached_dispatcher() const {
840 return tls_ticket_key_memcached_dispatcher_.get();
841 }
842
843 // Use the similar backoff algorithm described in
844 // https://github.com/grpc/grpc/blob/master/doc/connection-backoff.md
845 namespace {
846 constexpr size_t MAX_BACKOFF_EXP = 10;
847 constexpr auto MULTIPLIER = 3.2;
848 constexpr auto JITTER = 0.2;
849 } // namespace
850
on_tls_ticket_key_network_error(ev_timer * w)851 void ConnectionHandler::on_tls_ticket_key_network_error(ev_timer *w) {
852 if (++tls_ticket_key_memcached_get_retry_count_ >=
853 get_config()->tls.ticket.memcached.max_retry) {
854 LOG(WARN) << "Memcached: tls ticket get retry all failed "
855 << tls_ticket_key_memcached_get_retry_count_ << " times.";
856
857 on_tls_ticket_key_not_found(w);
858 return;
859 }
860
861 auto base_backoff = util::int_pow(
862 MULTIPLIER,
863 std::min(MAX_BACKOFF_EXP, tls_ticket_key_memcached_get_retry_count_));
864 auto dist = std::uniform_real_distribution<>(-JITTER * base_backoff,
865 JITTER * base_backoff);
866
867 auto backoff = base_backoff + dist(gen_);
868
869 LOG(WARN)
870 << "Memcached: tls ticket get failed due to network error, retrying in "
871 << backoff << " seconds";
872
873 ev_timer_set(w, backoff, 0.);
874 ev_timer_start(loop_, w);
875 }
876
on_tls_ticket_key_not_found(ev_timer * w)877 void ConnectionHandler::on_tls_ticket_key_not_found(ev_timer *w) {
878 tls_ticket_key_memcached_get_retry_count_ = 0;
879
880 if (++tls_ticket_key_memcached_fail_count_ >=
881 get_config()->tls.ticket.memcached.max_fail) {
882 LOG(WARN) << "Memcached: could not get tls ticket; disable tls ticket";
883
884 tls_ticket_key_memcached_fail_count_ = 0;
885
886 set_ticket_keys(nullptr);
887 set_ticket_keys_to_worker(nullptr);
888 }
889
890 LOG(WARN) << "Memcached: tls ticket get failed, schedule next";
891 schedule_next_tls_ticket_key_memcached_get(w);
892 }
893
on_tls_ticket_key_get_success(const std::shared_ptr<TicketKeys> & ticket_keys,ev_timer * w)894 void ConnectionHandler::on_tls_ticket_key_get_success(
895 const std::shared_ptr<TicketKeys> &ticket_keys, ev_timer *w) {
896 LOG(NOTICE) << "Memcached: tls ticket get success";
897
898 tls_ticket_key_memcached_get_retry_count_ = 0;
899 tls_ticket_key_memcached_fail_count_ = 0;
900
901 schedule_next_tls_ticket_key_memcached_get(w);
902
903 if (!ticket_keys || ticket_keys->keys.empty()) {
904 LOG(WARN) << "Memcached: tls ticket keys are empty; tls ticket disabled";
905 set_ticket_keys(nullptr);
906 set_ticket_keys_to_worker(nullptr);
907 return;
908 }
909
910 if (LOG_ENABLED(INFO)) {
911 LOG(INFO) << "ticket keys get done";
912 LOG(INFO) << 0 << " enc+dec: "
913 << util::format_hex(ticket_keys->keys[0].data.name);
914 for (size_t i = 1; i < ticket_keys->keys.size(); ++i) {
915 auto &key = ticket_keys->keys[i];
916 LOG(INFO) << i << " dec: " << util::format_hex(key.data.name);
917 }
918 }
919
920 set_ticket_keys(ticket_keys);
921 set_ticket_keys_to_worker(ticket_keys);
922 }
923
schedule_next_tls_ticket_key_memcached_get(ev_timer * w)924 void ConnectionHandler::schedule_next_tls_ticket_key_memcached_get(
925 ev_timer *w) {
926 ev_timer_set(w, get_config()->tls.ticket.memcached.interval, 0.);
927 ev_timer_start(loop_, w);
928 }
929
create_tls_ticket_key_memcached_ssl_ctx()930 SSL_CTX *ConnectionHandler::create_tls_ticket_key_memcached_ssl_ctx() {
931 auto config = get_config();
932 auto &tlsconf = config->tls;
933 auto &memcachedconf = config->tls.ticket.memcached;
934
935 auto ssl_ctx = tls::create_ssl_client_context(
936 #ifdef HAVE_NEVERBLEED
937 nb_,
938 #endif // HAVE_NEVERBLEED
939 tlsconf.cacert, memcachedconf.cert_file, memcachedconf.private_key_file,
940 nullptr);
941
942 all_ssl_ctx_.push_back(ssl_ctx);
943 #ifdef ENABLE_HTTP3
944 quic_all_ssl_ctx_.push_back(nullptr);
945 #endif // ENABLE_HTTP3
946
947 return ssl_ctx;
948 }
949
950 #ifdef HAVE_NEVERBLEED
set_neverbleed(neverbleed_t * nb)951 void ConnectionHandler::set_neverbleed(neverbleed_t *nb) { nb_ = nb; }
952 #endif // HAVE_NEVERBLEED
953
handle_serial_event()954 void ConnectionHandler::handle_serial_event() {
955 std::vector<SerialEvent> q;
956 {
957 std::lock_guard<std::mutex> g(serial_event_mu_);
958 q.swap(serial_events_);
959 }
960
961 for (auto &sev : q) {
962 switch (sev.type) {
963 case SerialEventType::REPLACE_DOWNSTREAM:
964 // Mmake sure that none of worker uses
965 // get_config()->conn.downstream
966 mod_config()->conn.downstream = sev.downstreamconf;
967
968 if (single_worker_) {
969 single_worker_->replace_downstream_config(sev.downstreamconf);
970
971 break;
972 }
973
974 worker_replace_downstream(sev.downstreamconf);
975
976 break;
977 default:
978 break;
979 }
980 }
981 }
982
send_replace_downstream(const std::shared_ptr<DownstreamConfig> & downstreamconf)983 void ConnectionHandler::send_replace_downstream(
984 const std::shared_ptr<DownstreamConfig> &downstreamconf) {
985 send_serial_event(
986 SerialEvent(SerialEventType::REPLACE_DOWNSTREAM, downstreamconf));
987 }
988
send_serial_event(SerialEvent ev)989 void ConnectionHandler::send_serial_event(SerialEvent ev) {
990 {
991 std::lock_guard<std::mutex> g(serial_event_mu_);
992
993 serial_events_.push_back(std::move(ev));
994 }
995
996 ev_async_send(loop_, &serial_event_asyncev_);
997 }
998
get_ssl_ctx(size_t idx) const999 SSL_CTX *ConnectionHandler::get_ssl_ctx(size_t idx) const {
1000 return all_ssl_ctx_[idx];
1001 }
1002
1003 const std::vector<SSL_CTX *> &
get_indexed_ssl_ctx(size_t idx) const1004 ConnectionHandler::get_indexed_ssl_ctx(size_t idx) const {
1005 return indexed_ssl_ctx_[idx];
1006 }
1007
1008 #ifdef ENABLE_HTTP3
1009 const std::vector<SSL_CTX *> &
get_quic_indexed_ssl_ctx(size_t idx) const1010 ConnectionHandler::get_quic_indexed_ssl_ctx(size_t idx) const {
1011 return quic_indexed_ssl_ctx_[idx];
1012 }
1013 #endif // ENABLE_HTTP3
1014
set_enable_acceptor_on_ocsp_completion(bool f)1015 void ConnectionHandler::set_enable_acceptor_on_ocsp_completion(bool f) {
1016 enable_acceptor_on_ocsp_completion_ = f;
1017 }
1018
1019 #ifdef ENABLE_HTTP3
forward_quic_packet(const UpstreamAddr * faddr,const Address & remote_addr,const Address & local_addr,const ngtcp2_pkt_info & pi,const uint8_t * cid_prefix,const uint8_t * data,size_t datalen)1020 int ConnectionHandler::forward_quic_packet(
1021 const UpstreamAddr *faddr, const Address &remote_addr,
1022 const Address &local_addr, const ngtcp2_pkt_info &pi,
1023 const uint8_t *cid_prefix, const uint8_t *data, size_t datalen) {
1024 assert(!get_config()->single_thread);
1025
1026 for (auto &worker : workers_) {
1027 if (!std::equal(cid_prefix, cid_prefix + SHRPX_QUIC_CID_PREFIXLEN,
1028 worker->get_cid_prefix())) {
1029 continue;
1030 }
1031
1032 WorkerEvent wev{};
1033 wev.type = WorkerEventType::QUIC_PKT_FORWARD;
1034 wev.quic_pkt = std::make_unique<QUICPacket>(faddr->index, remote_addr,
1035 local_addr, pi, data, datalen);
1036
1037 worker->send(std::move(wev));
1038
1039 return 0;
1040 }
1041
1042 return -1;
1043 }
1044
set_quic_keying_materials(std::shared_ptr<QUICKeyingMaterials> qkms)1045 void ConnectionHandler::set_quic_keying_materials(
1046 std::shared_ptr<QUICKeyingMaterials> qkms) {
1047 quic_keying_materials_ = std::move(qkms);
1048 }
1049
1050 const std::shared_ptr<QUICKeyingMaterials> &
get_quic_keying_materials() const1051 ConnectionHandler::get_quic_keying_materials() const {
1052 return quic_keying_materials_;
1053 }
1054
set_cid_prefixes(const std::vector<std::array<uint8_t,SHRPX_QUIC_CID_PREFIXLEN>> & cid_prefixes)1055 void ConnectionHandler::set_cid_prefixes(
1056 const std::vector<std::array<uint8_t, SHRPX_QUIC_CID_PREFIXLEN>>
1057 &cid_prefixes) {
1058 cid_prefixes_ = cid_prefixes;
1059 }
1060
1061 QUICLingeringWorkerProcess *
match_quic_lingering_worker_process_cid_prefix(const uint8_t * dcid,size_t dcidlen)1062 ConnectionHandler::match_quic_lingering_worker_process_cid_prefix(
1063 const uint8_t *dcid, size_t dcidlen) {
1064 assert(dcidlen >= SHRPX_QUIC_CID_PREFIXLEN);
1065
1066 for (auto &lwps : quic_lingering_worker_processes_) {
1067 for (auto &cid_prefix : lwps.cid_prefixes) {
1068 if (std::equal(std::begin(cid_prefix), std::end(cid_prefix), dcid)) {
1069 return &lwps;
1070 }
1071 }
1072 }
1073
1074 return nullptr;
1075 }
1076
1077 # ifdef HAVE_LIBBPF
get_quic_bpf_refs()1078 std::vector<BPFRef> &ConnectionHandler::get_quic_bpf_refs() {
1079 return quic_bpf_refs_;
1080 }
1081
unload_bpf_objects()1082 void ConnectionHandler::unload_bpf_objects() {
1083 LOG(NOTICE) << "Unloading BPF objects";
1084
1085 for (auto &ref : quic_bpf_refs_) {
1086 if (ref.obj == nullptr) {
1087 continue;
1088 }
1089
1090 bpf_object__close(ref.obj);
1091
1092 ref.obj = nullptr;
1093 }
1094 }
1095 # endif // HAVE_LIBBPF
1096
set_quic_ipc_fd(int fd)1097 void ConnectionHandler::set_quic_ipc_fd(int fd) { quic_ipc_fd_ = fd; }
1098
set_quic_lingering_worker_processes(const std::vector<QUICLingeringWorkerProcess> & quic_lwps)1099 void ConnectionHandler::set_quic_lingering_worker_processes(
1100 const std::vector<QUICLingeringWorkerProcess> &quic_lwps) {
1101 quic_lingering_worker_processes_ = quic_lwps;
1102 }
1103
forward_quic_packet_to_lingering_worker_process(QUICLingeringWorkerProcess * quic_lwp,const Address & remote_addr,const Address & local_addr,const ngtcp2_pkt_info & pi,const uint8_t * data,size_t datalen)1104 int ConnectionHandler::forward_quic_packet_to_lingering_worker_process(
1105 QUICLingeringWorkerProcess *quic_lwp, const Address &remote_addr,
1106 const Address &local_addr, const ngtcp2_pkt_info &pi, const uint8_t *data,
1107 size_t datalen) {
1108 std::array<uint8_t, 512> header;
1109
1110 assert(header.size() >= 1 + 1 + 1 + 1 + sizeof(sockaddr_storage) * 2);
1111 assert(remote_addr.len > 0);
1112 assert(local_addr.len > 0);
1113
1114 auto p = header.data();
1115
1116 *p++ = static_cast<uint8_t>(QUICIPCType::DGRAM_FORWARD);
1117 *p++ = static_cast<uint8_t>(remote_addr.len - 1);
1118 p = std::copy_n(reinterpret_cast<const uint8_t *>(&remote_addr.su),
1119 remote_addr.len, p);
1120 *p++ = static_cast<uint8_t>(local_addr.len - 1);
1121 p = std::copy_n(reinterpret_cast<const uint8_t *>(&local_addr.su),
1122 local_addr.len, p);
1123 *p++ = pi.ecn;
1124
1125 iovec msg_iov[] = {
1126 {
1127 .iov_base = header.data(),
1128 .iov_len = static_cast<size_t>(p - header.data()),
1129 },
1130 {
1131 .iov_base = const_cast<uint8_t *>(data),
1132 .iov_len = datalen,
1133 },
1134 };
1135
1136 msghdr msg{};
1137 msg.msg_iov = msg_iov;
1138 msg.msg_iovlen = array_size(msg_iov);
1139
1140 ssize_t nwrite;
1141
1142 while ((nwrite = sendmsg(quic_lwp->quic_ipc_fd, &msg, 0)) == -1 &&
1143 errno == EINTR)
1144 ;
1145
1146 if (nwrite == -1) {
1147 std::array<char, STRERROR_BUFSIZE> errbuf;
1148
1149 auto error = errno;
1150 LOG(ERROR) << "Failed to send QUIC IPC message: "
1151 << xsi_strerror(error, errbuf.data(), errbuf.size());
1152
1153 return -1;
1154 }
1155
1156 return 0;
1157 }
1158
quic_ipc_read()1159 int ConnectionHandler::quic_ipc_read() {
1160 std::array<uint8_t, 65536> buf;
1161
1162 ssize_t nread;
1163
1164 while ((nread = recv(quic_ipc_fd_, buf.data(), buf.size(), 0)) == -1 &&
1165 errno == EINTR)
1166 ;
1167
1168 if (nread == -1) {
1169 std::array<char, STRERROR_BUFSIZE> errbuf;
1170
1171 auto error = errno;
1172 LOG(ERROR) << "Failed to read data from QUIC IPC channel: "
1173 << xsi_strerror(error, errbuf.data(), errbuf.size());
1174
1175 return -1;
1176 }
1177
1178 if (nread == 0) {
1179 return 0;
1180 }
1181
1182 size_t len = 1 + 1 + 1 + 1;
1183
1184 // Wire format:
1185 // TYPE(1) REMOTE_ADDRLEN(1) REMOTE_ADDR(N) LOCAL_ADDRLEN(1) LOCAL_ADDR(N)
1186 // ECN(1) DGRAM_PAYLOAD(N)
1187 //
1188 // When encoding, REMOTE_ADDRLEN and LOCAL_ADDRLEN are decremented
1189 // by 1.
1190 if (static_cast<size_t>(nread) < len) {
1191 return 0;
1192 }
1193
1194 auto p = buf.data();
1195 if (*p != static_cast<uint8_t>(QUICIPCType::DGRAM_FORWARD)) {
1196 LOG(ERROR) << "Unknown QUICIPCType: " << static_cast<uint32_t>(*p);
1197
1198 return -1;
1199 }
1200
1201 ++p;
1202
1203 auto pkt = std::make_unique<QUICPacket>();
1204
1205 auto remote_addrlen = static_cast<size_t>(*p++) + 1;
1206 if (remote_addrlen > sizeof(sockaddr_storage)) {
1207 LOG(ERROR) << "The length of remote address is too large: "
1208 << remote_addrlen;
1209
1210 return -1;
1211 }
1212
1213 len += remote_addrlen;
1214
1215 if (static_cast<size_t>(nread) < len) {
1216 LOG(ERROR) << "Insufficient QUIC IPC message length";
1217
1218 return -1;
1219 }
1220
1221 pkt->remote_addr.len = remote_addrlen;
1222 memcpy(&pkt->remote_addr.su, p, remote_addrlen);
1223
1224 p += remote_addrlen;
1225
1226 auto local_addrlen = static_cast<size_t>(*p++) + 1;
1227 if (local_addrlen > sizeof(sockaddr_storage)) {
1228 LOG(ERROR) << "The length of local address is too large: " << local_addrlen;
1229
1230 return -1;
1231 }
1232
1233 len += local_addrlen;
1234
1235 if (static_cast<size_t>(nread) < len) {
1236 LOG(ERROR) << "Insufficient QUIC IPC message length";
1237
1238 return -1;
1239 }
1240
1241 pkt->local_addr.len = local_addrlen;
1242 memcpy(&pkt->local_addr.su, p, local_addrlen);
1243
1244 p += local_addrlen;
1245
1246 pkt->pi.ecn = *p++;
1247
1248 auto datalen = nread - (p - buf.data());
1249
1250 pkt->data.assign(p, p + datalen);
1251
1252 // At the moment, UpstreamAddr index is unknown.
1253 pkt->upstream_addr_index = static_cast<size_t>(-1);
1254
1255 ngtcp2_version_cid vc;
1256
1257 auto rv = ngtcp2_pkt_decode_version_cid(&vc, p, datalen, SHRPX_QUIC_SCIDLEN);
1258 if (rv < 0) {
1259 LOG(ERROR) << "ngtcp2_pkt_decode_version_cid: " << ngtcp2_strerror(rv);
1260
1261 return -1;
1262 }
1263
1264 if (vc.dcidlen != SHRPX_QUIC_SCIDLEN) {
1265 LOG(ERROR) << "DCID length is invalid";
1266 return -1;
1267 }
1268
1269 if (single_worker_) {
1270 auto faddr = single_worker_->find_quic_upstream_addr(pkt->local_addr);
1271 if (faddr == nullptr) {
1272 LOG(ERROR) << "No suitable upstream address found";
1273
1274 return 0;
1275 }
1276
1277 auto quic_conn_handler = single_worker_->get_quic_connection_handler();
1278
1279 // Ignore return value
1280 quic_conn_handler->handle_packet(faddr, pkt->remote_addr, pkt->local_addr,
1281 pkt->pi, pkt->data.data(),
1282 pkt->data.size());
1283
1284 return 0;
1285 }
1286
1287 auto &qkm = quic_keying_materials_->keying_materials.front();
1288
1289 std::array<uint8_t, SHRPX_QUIC_DECRYPTED_DCIDLEN> decrypted_dcid;
1290
1291 if (decrypt_quic_connection_id(decrypted_dcid.data(),
1292 vc.dcid + SHRPX_QUIC_CID_PREFIX_OFFSET,
1293 qkm.cid_encryption_key.data()) != 0) {
1294 return -1;
1295 }
1296
1297 for (auto &worker : workers_) {
1298 if (!std::equal(std::begin(decrypted_dcid),
1299 std::begin(decrypted_dcid) + SHRPX_QUIC_CID_PREFIXLEN,
1300 worker->get_cid_prefix())) {
1301 continue;
1302 }
1303
1304 WorkerEvent wev{
1305 .type = WorkerEventType::QUIC_PKT_FORWARD,
1306 .quic_pkt = std::move(pkt),
1307 };
1308 worker->send(std::move(wev));
1309
1310 return 0;
1311 }
1312
1313 if (LOG_ENABLED(INFO)) {
1314 LOG(INFO) << "No worker to match CID prefix";
1315 }
1316
1317 return 0;
1318 }
1319 #endif // ENABLE_HTTP3
1320
1321 } // namespace shrpx
1322