Index: third_party/grpc/src/core/channel/http_server_filter.c |
diff --git a/third_party/grpc/src/core/channel/http_server_filter.c b/third_party/grpc/src/core/channel/http_server_filter.c |
new file mode 100644 |
index 0000000000000000000000000000000000000000..370f8dbe423d3a6b4f09a18198369f0f4f930cbf |
--- /dev/null |
+++ b/third_party/grpc/src/core/channel/http_server_filter.c |
@@ -0,0 +1,233 @@ |
+/* |
+ * |
+ * Copyright 2015-2016, Google Inc. |
+ * All rights reserved. |
+ * |
+ * Redistribution and use in source and binary forms, with or without |
+ * modification, are permitted provided that the following conditions are |
+ * met: |
+ * |
+ * * Redistributions of source code must retain the above copyright |
+ * notice, this list of conditions and the following disclaimer. |
+ * * Redistributions in binary form must reproduce the above |
+ * copyright notice, this list of conditions and the following disclaimer |
+ * in the documentation and/or other materials provided with the |
+ * distribution. |
+ * * Neither the name of Google Inc. nor the names of its |
+ * contributors may be used to endorse or promote products derived from |
+ * this software without specific prior written permission. |
+ * |
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
+ * |
+ */ |
+ |
+#include "src/core/channel/http_server_filter.h" |
+ |
+#include <grpc/support/alloc.h> |
+#include <grpc/support/log.h> |
+#include <string.h> |
+#include "src/core/profiling/timers.h" |
+#include "src/core/transport/static_metadata.h" |
+ |
+typedef struct call_data { |
+ uint8_t seen_path; |
+ uint8_t seen_post; |
+ uint8_t sent_status; |
+ uint8_t seen_scheme; |
+ uint8_t seen_te_trailers; |
+ uint8_t seen_authority; |
+ grpc_linked_mdelem status; |
+ grpc_linked_mdelem content_type; |
+ |
+ grpc_metadata_batch *recv_initial_metadata; |
+ /** Closure to call when finished with the hs_on_recv hook */ |
+ grpc_closure *on_done_recv; |
+ /** Receive closures are chained: we inject this closure as the on_done_recv |
+ up-call on transport_op, and remember to call our on_done_recv member |
+ after handling it. */ |
+ grpc_closure hs_on_recv; |
+} call_data; |
+ |
+typedef struct channel_data { uint8_t unused; } channel_data; |
+ |
+typedef struct { |
+ grpc_call_element *elem; |
+ grpc_exec_ctx *exec_ctx; |
+} server_filter_args; |
+ |
+static grpc_mdelem *server_filter(void *user_data, grpc_mdelem *md) { |
+ server_filter_args *a = user_data; |
+ grpc_call_element *elem = a->elem; |
+ call_data *calld = elem->call_data; |
+ |
+ /* Check if it is one of the headers we care about. */ |
+ if (md == GRPC_MDELEM_TE_TRAILERS || md == GRPC_MDELEM_METHOD_POST || |
+ md == GRPC_MDELEM_SCHEME_HTTP || md == GRPC_MDELEM_SCHEME_HTTPS || |
+ md == GRPC_MDELEM_CONTENT_TYPE_APPLICATION_SLASH_GRPC) { |
+ /* swallow it */ |
+ if (md == GRPC_MDELEM_METHOD_POST) { |
+ calld->seen_post = 1; |
+ } else if (md->key == GRPC_MDSTR_SCHEME) { |
+ calld->seen_scheme = 1; |
+ } else if (md == GRPC_MDELEM_TE_TRAILERS) { |
+ calld->seen_te_trailers = 1; |
+ } |
+ /* TODO(klempner): Track that we've seen all the headers we should |
+ require */ |
+ return NULL; |
+ } else if (md->key == GRPC_MDSTR_CONTENT_TYPE) { |
+ if (strncmp(grpc_mdstr_as_c_string(md->value), "application/grpc+", 17) == |
+ 0) { |
+ /* Although the C implementation doesn't (currently) generate them, |
+ any custom +-suffix is explicitly valid. */ |
+ /* TODO(klempner): We should consider preallocating common values such |
+ as +proto or +json, or at least stashing them if we see them. */ |
+ /* TODO(klempner): Should we be surfacing this to application code? */ |
+ } else { |
+ /* TODO(klempner): We're currently allowing this, but we shouldn't |
+ see it without a proxy so log for now. */ |
+ gpr_log(GPR_INFO, "Unexpected content-type %s", |
+ grpc_mdstr_as_c_string(md->value)); |
+ } |
+ return NULL; |
+ } else if (md->key == GRPC_MDSTR_TE || md->key == GRPC_MDSTR_METHOD || |
+ md->key == GRPC_MDSTR_SCHEME) { |
+ gpr_log(GPR_ERROR, "Invalid %s: header: '%s'", |
+ grpc_mdstr_as_c_string(md->key), grpc_mdstr_as_c_string(md->value)); |
+ /* swallow it and error everything out. */ |
+ /* TODO(klempner): We ought to generate more descriptive error messages |
+ on the wire here. */ |
+ grpc_call_element_send_cancel(a->exec_ctx, elem); |
+ return NULL; |
+ } else if (md->key == GRPC_MDSTR_PATH) { |
+ if (calld->seen_path) { |
+ gpr_log(GPR_ERROR, "Received :path twice"); |
+ return NULL; |
+ } |
+ calld->seen_path = 1; |
+ return md; |
+ } else if (md->key == GRPC_MDSTR_AUTHORITY) { |
+ calld->seen_authority = 1; |
+ return md; |
+ } else if (md->key == GRPC_MDSTR_HOST) { |
+ /* translate host to :authority since :authority may be |
+ omitted */ |
+ grpc_mdelem *authority = grpc_mdelem_from_metadata_strings( |
+ GRPC_MDSTR_AUTHORITY, GRPC_MDSTR_REF(md->value)); |
+ calld->seen_authority = 1; |
+ return authority; |
+ } else { |
+ return md; |
+ } |
+} |
+ |
+static void hs_on_recv(grpc_exec_ctx *exec_ctx, void *user_data, bool success) { |
+ grpc_call_element *elem = user_data; |
+ call_data *calld = elem->call_data; |
+ if (success) { |
+ server_filter_args a; |
+ a.elem = elem; |
+ a.exec_ctx = exec_ctx; |
+ grpc_metadata_batch_filter(calld->recv_initial_metadata, server_filter, &a); |
+ /* Have we seen the required http2 transport headers? |
+ (:method, :scheme, content-type, with :path and :authority covered |
+ at the channel level right now) */ |
+ if (calld->seen_post && calld->seen_scheme && calld->seen_te_trailers && |
+ calld->seen_path && calld->seen_authority) { |
+ /* do nothing */ |
+ } else { |
+ if (!calld->seen_path) { |
+ gpr_log(GPR_ERROR, "Missing :path header"); |
+ } |
+ if (!calld->seen_authority) { |
+ gpr_log(GPR_ERROR, "Missing :authority header"); |
+ } |
+ if (!calld->seen_post) { |
+ gpr_log(GPR_ERROR, "Missing :method header"); |
+ } |
+ if (!calld->seen_scheme) { |
+ gpr_log(GPR_ERROR, "Missing :scheme header"); |
+ } |
+ if (!calld->seen_te_trailers) { |
+ gpr_log(GPR_ERROR, "Missing te trailers header"); |
+ } |
+ /* Error this call out */ |
+ success = 0; |
+ grpc_call_element_send_cancel(exec_ctx, elem); |
+ } |
+ } |
+ calld->on_done_recv->cb(exec_ctx, calld->on_done_recv->cb_arg, success); |
+} |
+ |
+static void hs_mutate_op(grpc_call_element *elem, |
+ grpc_transport_stream_op *op) { |
+ /* grab pointers to our data from the call element */ |
+ call_data *calld = elem->call_data; |
+ |
+ if (op->send_initial_metadata != NULL && !calld->sent_status) { |
+ calld->sent_status = 1; |
+ grpc_metadata_batch_add_head(op->send_initial_metadata, &calld->status, |
+ GRPC_MDELEM_STATUS_200); |
+ grpc_metadata_batch_add_tail( |
+ op->send_initial_metadata, &calld->content_type, |
+ GRPC_MDELEM_CONTENT_TYPE_APPLICATION_SLASH_GRPC); |
+ } |
+ |
+ if (op->recv_initial_metadata) { |
+ /* substitute our callback for the higher callback */ |
+ calld->recv_initial_metadata = op->recv_initial_metadata; |
+ calld->on_done_recv = op->recv_initial_metadata_ready; |
+ op->recv_initial_metadata_ready = &calld->hs_on_recv; |
+ } |
+} |
+ |
+static void hs_start_transport_op(grpc_exec_ctx *exec_ctx, |
+ grpc_call_element *elem, |
+ grpc_transport_stream_op *op) { |
+ GRPC_CALL_LOG_OP(GPR_INFO, elem, op); |
+ GPR_TIMER_BEGIN("hs_start_transport_op", 0); |
+ hs_mutate_op(elem, op); |
+ grpc_call_next_op(exec_ctx, elem, op); |
+ GPR_TIMER_END("hs_start_transport_op", 0); |
+} |
+ |
+/* Constructor for call_data */ |
+static void init_call_elem(grpc_exec_ctx *exec_ctx, grpc_call_element *elem, |
+ grpc_call_element_args *args) { |
+ /* grab pointers to our data from the call element */ |
+ call_data *calld = elem->call_data; |
+ /* initialize members */ |
+ memset(calld, 0, sizeof(*calld)); |
+ grpc_closure_init(&calld->hs_on_recv, hs_on_recv, elem); |
+} |
+ |
+/* Destructor for call_data */ |
+static void destroy_call_elem(grpc_exec_ctx *exec_ctx, |
+ grpc_call_element *elem) {} |
+ |
+/* Constructor for channel_data */ |
+static void init_channel_elem(grpc_exec_ctx *exec_ctx, |
+ grpc_channel_element *elem, |
+ grpc_channel_element_args *args) { |
+ GPR_ASSERT(!args->is_last); |
+} |
+ |
+/* Destructor for channel data */ |
+static void destroy_channel_elem(grpc_exec_ctx *exec_ctx, |
+ grpc_channel_element *elem) {} |
+ |
+const grpc_channel_filter grpc_http_server_filter = { |
+ hs_start_transport_op, grpc_channel_next_op, sizeof(call_data), |
+ init_call_elem, grpc_call_stack_ignore_set_pollset, destroy_call_elem, |
+ sizeof(channel_data), init_channel_elem, destroy_channel_elem, |
+ grpc_call_next_get_peer, "http-server"}; |