aboutsummaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAge
* QUIC: removed redundant "app" flag from ngx_quic_close_frame_t.Sergey Kandaurov2021-02-03
| | | | | | The flag was introduced to create type-aware CONNECTION_CLOSE frames, and now is replaced with frame type information, directly accessible. Notably, this fixes type logging for received frames in b3d9e57d0f62.
* HTTP/3: reverted version check for keepalive flag.Roman Arutyunyan2021-02-02
| | | | | | The flag is used in ngx_http_finalize_connection() to switch client connection to the keepalive mode. Since eaea7dac3292 this code is not executed for HTTP/3 which allows us to revert the change and get back to the default branch code.
* HTTP/3: fixed format specifier.Roman Arutyunyan2021-02-01
|
* HTTP/3: refactored request body parser.Roman Arutyunyan2021-01-25
| | | | | | | | The change reduces diff to the default branch for src/http/ngx_http_request_body.c. Also, client Content-Length, if present, is now checked against the real body size sent by client.
* QUIC: fixed stateless reset recognition and send.Roman Arutyunyan2021-02-01
| | | | | Previously, if an unexpected packet was received on an existing QUIC connection, stateless reset token was neither recognized nor sent.
* QUIC: refactored packet processing.Roman Arutyunyan2021-01-28
| | | | | | | | | | - split ngx_quic_process_packet() in two functions with the second one called ngx_quic_process_payload() in charge of decrypring and handling the payload - renamed ngx_quic_payload_handler() to ngx_quic_handle_frames() - moved error cleanup from ngx_quic_input() to ngx_quic_process_payload() - moved handling closed connection from ngx_quic_handle_frames() to ngx_quic_process_payload() - minor fixes
* QUIC: stateless retry.Vladimir Homutov2021-01-29
| | | | | | | | | Previously, quic connection object was created when Retry packet was sent. This is neither necessary nor convenient, and contradicts the idea of retry: protecting from bad clients and saving server resources. Now, the connection is not created, token is verified cryptographically instead of holding it in connection.
* HTTP/3: call ngx_handle_read_event() from client header handler.Roman Arutyunyan2021-01-29
| | | | | | | | | | | | | This function should be called at the end of an event handler to prepare the event for the next handler call. Particularly, the "active" flag is set or cleared depending on data availability. With this call missing in one code path, read handler was not called again after handling the initial part of the client request, if the request was too big to fit into a single STREAM frame. Now ngx_handle_read_event() is called in this code path. Also, read timer is restarted.
* HTTP/3: removed HTTP/3-specific code.Roman Arutyunyan2020-12-21
| | | | | | The ngx_http_set_lingering_close() function is not called for HTTP/3. The change reduces diff to the default branch.
* HTTP/3: client header validation.Roman Arutyunyan2021-01-18
| | | | | | | | | | A header with the name containing null, CR, LF, colon or uppercase characters, is now considered an error. A header with the value containing null, CR or LF, is also considered an error. Also, header is considered invalid unless its name only contains lowercase characters, digits, minus and optionally underscore. Such header can be optionally ignored.
* HTTP/3: added comment.Roman Arutyunyan2021-01-12
|
* HTTP/3: client pseudo-headers restrictions.Roman Arutyunyan2021-01-22
| | | | | | - :method, :path and :scheme are expected exactly once and not empty - :method and :scheme character validation is added - :authority cannot appear more than once
* HTTP/3: refactored request parser.Roman Arutyunyan2021-01-22
| | | | | The change reduces diff to the default branch for src/http/ngx_http_request.c and src/http/ngx_http_parse.c.
* QUIC: draft-33 salt and retry keys.Sergey Kandaurov2021-01-11
| | | | | Notably, the version negotiation table is updated to reject draft-33/QUICv1 (which requires a new TLS codepoint) unless explicitly asked to built with.
* QUIC: fixed header protection macro name.Vladimir Homutov2020-12-30
|
* QUIC: ngx_quic_bpf module.Vladimir Homutov2020-12-25
| | | | | | | | | | | | The quic kernel bpf helper inspects packet payload for DCID, extracts key and routes the packet into socket matching the key. Due to reuseport feature, each worker owns a personal socket, which is identified by the same key, used to create DCID. BPF objects are locked in RAM and are subject to RLIMIT_MEMLOCK. The "ulimit -l" command may be used to setup proper limits, if maps cannot be created with EPERM or updated with ETOOLONG.
* Core: added interface to linux bpf() system call.Vladimir Homutov2020-12-15
| | | | It contains wrappers for operations with BPF maps and for loading BPF programs.
* QUIC: ngx_quic_module.Vladimir Homutov2020-12-25
|
* QUIC: moved all quic sources into src/event/quic.Vladimir Homutov2020-12-25
|
* QUIC: removed unused <openssl/aes.h> inclusion.Sergey Kandaurov2020-12-22
| | | | The low-level API was used in early QUIC development.
* QUIC: fixed -Wtype-limits with GCC <= 5 (ticket #2104).Sergey Kandaurov2020-12-22
|
* QUIC: fixed logging PATH_CHALLENGE/RESPONSE and build with GCC < 5.Sergey Kandaurov2020-12-22
|
* QUIC: fixed building ALPN callback without debug and http2.Sergey Kandaurov2020-12-22
|
* QUIC: fixed build with OpenSSL < 1.1.1.Sergey Kandaurov2020-12-22
| | | | | The <openssl/kdf.h> header is available since OpenSSL 1.1.0, and HKDF API used for separate Extract and Expand steps in TLSv1.3 - since OpenSSL 1.1.1.
* QUIC: converted to SSL_CIPHER_get_protocol_id().Sergey Kandaurov2020-12-21
| | | | | This API is available in BoringSSL for quite some time: https://boringssl.googlesource.com/boringssl/+/3743aaf
* HTTP/3: staticize internal parsing functions.Sergey Kandaurov2020-12-16
|
* HTTP/3: staticize ngx_http_v3_methods.Sergey Kandaurov2020-12-16
|
* Merged with the default branch.Sergey Kandaurov2020-12-15
|\
| * Fixed double close of non-regular files in flv and mp4.Maxim Dounin2020-12-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | With introduction of open_file_cache in 1454:f497ed7682a7, opening a file with ngx_open_cached_file() automatically adds a cleanup handler to close the file. As such, calling ngx_close_file() directly for non-regular files is no longer needed and will result in duplicate close() call. In 1454:f497ed7682a7 ngx_close_file() call for non-regular files was removed in the static module, but wasn't in the flv module. And the resulting incorrect code was later copied to the mp4 module. Fix is to remove the ngx_close_file() call from both modules. Reported by Chris Newton.
| * Removed extra allocation for r->uri.Maxim Dounin2020-12-10
| | | | | | | | | | | | | | The ngx_http_parse_complex_uri() function cannot make URI longer and does not null-terminate URI, so there is no need to allocate an extra byte. This allocation appears to be a leftover from changes in 461:a88a3e4e158f (0.1.5), where null-termination of r->uri and many other strings was removed.
| * Fixed parsing of absolute URIs with empty path (ticket #2079).Maxim Dounin2020-12-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When the request line contains request-target in the absolute-URI form, it can contain path-empty instead of a single slash (see RFC 7230, RFC 3986). Previously, the ngx_http_parse_request_line() function only accepted empty path when there was no query string. With this change, non-empty query is also correctly handled. That is, request line "GET http://example.com?foo HTTP/1.1" is accepted and results in $uri "/" and $args "foo". Note that $request_uri remains "?foo", similarly to how spaces in URIs are handled. Providing "/?foo", similarly to how "/" is provided for "GET http://example.com HTTP/1.1", requires allocation.
| * SSL: fixed SSL shutdown on lingering close.Ruslan Ermilov2020-12-08
| | | | | | | | | | | | | | Ensure c->recv is properly reset to ngx_recv if SSL_shutdown() blocks on writing. The bug had appeared in 554c6ae25ffc.
| * Upstream: excluded down servers from the next_upstream tries.Ruslan Ermilov2020-11-27
| | | | | | | | | | | | | | Previously, the number of next_upstream tries included servers marked as "down", resulting in "no live upstreams" with the code 502 instead of the code derived from an attempt to connect to the last tried "up" server (ticket #2096).
| * Version bump.Ruslan Ermilov2020-11-26
| |
* | QUIC: always calculate rtt for largest acknowledged packet.Roman Arutyunyan2020-12-09
| | | | | | | | | | | | | | Previously, when processing client ACK, rtt could be calculated for a packet different than the largest if it was missing in the sent chain. Even though this is an unlikely situation, rtt based on a different packet could be larger than needed leading to bigger pto timeout and performance degradation.
* | QUIC: send and process ack_delay for Initial and Handshake levels.Roman Arutyunyan2020-12-10
| | | | | | | | | | | | | | | | | | | | | | | | Previously, this only worked for Application level because before quic-transport-30, there were the following constraints: Because the receiver doesn't use the ACK Delay for Initial and Handshake packets, a sender SHOULD send a value of 0. When adjusting an RTT sample using peer-reported acknowledgement delays, an endpoint ... MUST ignore the ACK Delay field of the ACK frame for packets sent in the Initial and Handshake packet number space.
* | QUIC: use client max_ack_delay when computing pto timeout.Roman Arutyunyan2020-12-09
| | | | | | | | | | | | Previously, server max_ack_delay was used which is wrong. Also, level check is simplified.
* | QUIC: resend handshake packets along with initial.Roman Arutyunyan2020-12-08
| | | | | | | | | | To speed up handshake, resend both initial and handshake packets if there's at least one unacknowledged initial packet.
* | QUIC: set the temporary flag for input frame buffers.Roman Arutyunyan2020-12-08
| | | | | | | | | | Missing flag prevented frame data from being copied as the buffer was not considered a memory buffer.
* | QUIC: coalesce output packets into a single UDP datagram.Roman Arutyunyan2020-12-07
| | | | | | | | | | | | Now initial output packet is not padded anymore if followed by a handshake packet. If the datagram is still not big enough to satisfy minimum size requirements, handshake packet is padded.
* | QUIC: introduced QUIC buffers.Roman Arutyunyan2020-12-01
| | | | | | | | | | Buffers are used to hold frame data. They have a fixed size and are reused after being freed.
* | QUIC: fixed handling of clients connected to wildcard address.Vladimir Homutov2020-12-07
| | | | | | | | | | | | | | | | | | The patch replaces c->send() occurences with c->send_chain(), because the latter accounts for the local address, which may be different if the wildcard listener is used. Previously, server sent response to client using address different from one client connected to.
* | QUIC: disabling bidirectional SSL shutdown earlier.Sergey Kandaurov2020-12-06
| | | | | | | | | | Notably, this fixes an issue with Chrome that can emit a "certificate_unknown" alert during the SSL handshake where c->ssl->no_wait_shutdown is not yet set.
* | QUIC: fixed missing quic flag on listener in the stream module.Vladimir Homutov2020-12-04
| |
* | HTTP/3: introduced ngx_http_v3_filter.Roman Arutyunyan2020-11-27
| | | | | | | | | | | | | | The filter is responsible for creating HTTP/3 response header and body. The change removes differences to the default branch for ngx_http_chunked_filter_module and ngx_http_header_filter_module.
* | QUIC: fixed send contexts cleanup.Vladimir Homutov2020-12-02
| | | | | | | | | | The ngx_quic_get_send_ctx() macro takes 'level' argument, not send context index.
* | QUIC: removed ngx_quic_hexdump() macro.Vladimir Homutov2020-11-27
| | | | | | | | | | | | | | | | Instead, appropriate format specifier for hexadecimal is used in ngx_log_debug(). The STREAM frame "data" debug is moved into ngx_quic_log_frame(), similar to all other frame fields debug.
* | HTTP/3: eliminated r->method_start.Roman Arutyunyan2020-11-25
| | | | | | | | | | | | The field was introduced to ease parsing HTTP/3 requests. The change reduces diff to the default branch.
* | HTTP/3: null-terminate empty header value.Roman Arutyunyan2020-11-17
| | | | | | | | | | | | | | | | | | | | Header value returned from the HTTP parser is expected to be null-terminated or have a spare byte after the value bytes. When an empty header value was passed by client in a literal header representation, neither was true. This could result in segfault. The fix is to assign a literal empty null-terminated string in this case. Thanks to Andrey Kolyshkin.
* | HTTP/3: finalize chunked response body chain with NULL.Roman Arutyunyan2020-11-17
| | | | | | | | | | | | | | Unfinalized chain could result in segfault. The problem was introduced in ef83990f0e25. Patch by Andrey Kolyshkin.