| /* |
| * |
| * Copyright 2016 gRPC authors. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| * |
| */ |
| |
| #include "test/core/end2end/fixtures/http_proxy_fixture.h" |
| |
| #include "src/core/lib/iomgr/sockaddr.h" |
| |
| #include <string.h> |
| |
| #include <grpc/grpc.h> |
| #include <grpc/slice_buffer.h> |
| #include <grpc/support/alloc.h> |
| #include <grpc/support/atm.h> |
| #include <grpc/support/host_port.h> |
| #include <grpc/support/log.h> |
| #include <grpc/support/string_util.h> |
| #include <grpc/support/sync.h> |
| #include <grpc/support/thd.h> |
| #include <grpc/support/useful.h> |
| |
| #include "src/core/lib/channel/channel_args.h" |
| #include "src/core/lib/http/parser.h" |
| #include "src/core/lib/iomgr/closure.h" |
| #include "src/core/lib/iomgr/combiner.h" |
| #include "src/core/lib/iomgr/endpoint.h" |
| #include "src/core/lib/iomgr/error.h" |
| #include "src/core/lib/iomgr/exec_ctx.h" |
| #include "src/core/lib/iomgr/pollset.h" |
| #include "src/core/lib/iomgr/pollset_set.h" |
| #include "src/core/lib/iomgr/resolve_address.h" |
| #include "src/core/lib/iomgr/sockaddr_utils.h" |
| #include "src/core/lib/iomgr/tcp_client.h" |
| #include "src/core/lib/iomgr/tcp_server.h" |
| #include "src/core/lib/iomgr/timer.h" |
| #include "src/core/lib/slice/b64.h" |
| #include "src/core/lib/slice/slice_internal.h" |
| #include "src/core/lib/support/string.h" |
| #include "test/core/util/port.h" |
| |
| struct grpc_end2end_http_proxy { |
| char* proxy_name; |
| gpr_thd_id thd; |
| grpc_tcp_server* server; |
| grpc_channel_args* channel_args; |
| gpr_mu* mu; |
| grpc_pollset* pollset; |
| gpr_refcount users; |
| |
| grpc_combiner* combiner; |
| }; |
| |
| // |
| // Connection handling |
| // |
| |
| // proxy_connection structure is only accessed in the closures which are all |
| // scheduled under the same combiner lock. So there is is no need for a mutex to |
| // protect this structure. |
| typedef struct proxy_connection { |
| grpc_end2end_http_proxy* proxy; |
| |
| grpc_endpoint* client_endpoint; |
| grpc_endpoint* server_endpoint; |
| |
| gpr_refcount refcount; |
| |
| grpc_pollset_set* pollset_set; |
| |
| // NOTE: All the closures execute under proxy->combiner lock. Which means |
| // there will not be any data-races between the closures |
| grpc_closure on_read_request_done; |
| grpc_closure on_server_connect_done; |
| grpc_closure on_write_response_done; |
| grpc_closure on_client_read_done; |
| grpc_closure on_client_write_done; |
| grpc_closure on_server_read_done; |
| grpc_closure on_server_write_done; |
| |
| bool client_read_failed : 1; |
| bool client_write_failed : 1; |
| bool client_shutdown : 1; |
| bool server_read_failed : 1; |
| bool server_write_failed : 1; |
| bool server_shutdown : 1; |
| |
| grpc_slice_buffer client_read_buffer; |
| grpc_slice_buffer client_deferred_write_buffer; |
| bool client_is_writing; |
| grpc_slice_buffer client_write_buffer; |
| grpc_slice_buffer server_read_buffer; |
| grpc_slice_buffer server_deferred_write_buffer; |
| bool server_is_writing; |
| grpc_slice_buffer server_write_buffer; |
| |
| grpc_http_parser http_parser; |
| grpc_http_request http_request; |
| } proxy_connection; |
| |
| static void proxy_connection_ref(proxy_connection* conn, const char* reason) { |
| gpr_ref(&conn->refcount); |
| } |
| |
| // Helper function to destroy the proxy connection. |
| static void proxy_connection_unref(grpc_exec_ctx* exec_ctx, |
| proxy_connection* conn, const char* reason) { |
| if (gpr_unref(&conn->refcount)) { |
| gpr_log(GPR_DEBUG, "endpoints: %p %p", conn->client_endpoint, |
| conn->server_endpoint); |
| grpc_endpoint_destroy(exec_ctx, conn->client_endpoint); |
| if (conn->server_endpoint != nullptr) { |
| grpc_endpoint_destroy(exec_ctx, conn->server_endpoint); |
| } |
| grpc_pollset_set_destroy(exec_ctx, conn->pollset_set); |
| grpc_slice_buffer_destroy_internal(exec_ctx, &conn->client_read_buffer); |
| grpc_slice_buffer_destroy_internal(exec_ctx, |
| &conn->client_deferred_write_buffer); |
| grpc_slice_buffer_destroy_internal(exec_ctx, &conn->client_write_buffer); |
| grpc_slice_buffer_destroy_internal(exec_ctx, &conn->server_read_buffer); |
| grpc_slice_buffer_destroy_internal(exec_ctx, |
| &conn->server_deferred_write_buffer); |
| grpc_slice_buffer_destroy_internal(exec_ctx, &conn->server_write_buffer); |
| grpc_http_parser_destroy(&conn->http_parser); |
| grpc_http_request_destroy(&conn->http_request); |
| gpr_unref(&conn->proxy->users); |
| gpr_free(conn); |
| } |
| } |
| |
| enum failure_type { |
| SETUP_FAILED, // To be used before we start proxying. |
| CLIENT_READ_FAILED, |
| CLIENT_WRITE_FAILED, |
| SERVER_READ_FAILED, |
| SERVER_WRITE_FAILED, |
| }; |
| |
| // Helper function to shut down the proxy connection. |
| static void proxy_connection_failed(grpc_exec_ctx* exec_ctx, |
| proxy_connection* conn, |
| failure_type failure, const char* prefix, |
| grpc_error* error) { |
| gpr_log(GPR_INFO, "%s: %s", prefix, grpc_error_string(error)); |
| // Decide whether we should shut down the client and server. |
| bool shutdown_client = false; |
| bool shutdown_server = false; |
| if (failure == SETUP_FAILED) { |
| shutdown_client = true; |
| shutdown_server = true; |
| } else { |
| if ((failure == CLIENT_READ_FAILED && conn->client_write_failed) || |
| (failure == CLIENT_WRITE_FAILED && conn->client_read_failed) || |
| (failure == SERVER_READ_FAILED && !conn->client_is_writing)) { |
| shutdown_client = true; |
| } |
| if ((failure == SERVER_READ_FAILED && conn->server_write_failed) || |
| (failure == SERVER_WRITE_FAILED && conn->server_read_failed) || |
| (failure == CLIENT_READ_FAILED && !conn->server_is_writing)) { |
| shutdown_server = true; |
| } |
| } |
| // If we decided to shut down either one and have not yet done so, do so. |
| if (shutdown_client && !conn->client_shutdown) { |
| grpc_endpoint_shutdown(exec_ctx, conn->client_endpoint, |
| GRPC_ERROR_REF(error)); |
| conn->client_shutdown = true; |
| } |
| if (shutdown_server && !conn->server_shutdown) { |
| grpc_endpoint_shutdown(exec_ctx, conn->server_endpoint, |
| GRPC_ERROR_REF(error)); |
| conn->server_shutdown = true; |
| } |
| // Unref the connection. |
| proxy_connection_unref(exec_ctx, conn, "conn_failed"); |
| GRPC_ERROR_UNREF(error); |
| } |
| |
| // Callback for writing proxy data to the client. |
| static void on_client_write_done(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_error* error) { |
| proxy_connection* conn = (proxy_connection*)arg; |
| conn->client_is_writing = false; |
| if (error != GRPC_ERROR_NONE) { |
| proxy_connection_failed(exec_ctx, conn, CLIENT_WRITE_FAILED, |
| "HTTP proxy client write", GRPC_ERROR_REF(error)); |
| return; |
| } |
| // Clear write buffer (the data we just wrote). |
| grpc_slice_buffer_reset_and_unref(&conn->client_write_buffer); |
| // If more data was read from the server since we started this write, |
| // write that data now. |
| if (conn->client_deferred_write_buffer.length > 0) { |
| grpc_slice_buffer_move_into(&conn->client_deferred_write_buffer, |
| &conn->client_write_buffer); |
| conn->client_is_writing = true; |
| grpc_endpoint_write(exec_ctx, conn->client_endpoint, |
| &conn->client_write_buffer, |
| &conn->on_client_write_done); |
| } else { |
| // No more writes. Unref the connection. |
| proxy_connection_unref(exec_ctx, conn, "write_done"); |
| } |
| } |
| |
| // Callback for writing proxy data to the backend server. |
| static void on_server_write_done(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_error* error) { |
| proxy_connection* conn = (proxy_connection*)arg; |
| conn->server_is_writing = false; |
| if (error != GRPC_ERROR_NONE) { |
| proxy_connection_failed(exec_ctx, conn, SERVER_WRITE_FAILED, |
| "HTTP proxy server write", GRPC_ERROR_REF(error)); |
| return; |
| } |
| // Clear write buffer (the data we just wrote). |
| grpc_slice_buffer_reset_and_unref(&conn->server_write_buffer); |
| // If more data was read from the client since we started this write, |
| // write that data now. |
| if (conn->server_deferred_write_buffer.length > 0) { |
| grpc_slice_buffer_move_into(&conn->server_deferred_write_buffer, |
| &conn->server_write_buffer); |
| conn->server_is_writing = true; |
| grpc_endpoint_write(exec_ctx, conn->server_endpoint, |
| &conn->server_write_buffer, |
| &conn->on_server_write_done); |
| } else { |
| // No more writes. Unref the connection. |
| proxy_connection_unref(exec_ctx, conn, "server_write"); |
| } |
| } |
| |
| // Callback for reading data from the client, which will be proxied to |
| // the backend server. |
| static void on_client_read_done(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_error* error) { |
| proxy_connection* conn = (proxy_connection*)arg; |
| if (error != GRPC_ERROR_NONE) { |
| proxy_connection_failed(exec_ctx, conn, CLIENT_READ_FAILED, |
| "HTTP proxy client read", GRPC_ERROR_REF(error)); |
| return; |
| } |
| // If there is already a pending write (i.e., server_write_buffer is |
| // not empty), then move the read data into server_deferred_write_buffer, |
| // and the next write will be requested in on_server_write_done(), when |
| // the current write is finished. |
| // |
| // Otherwise, move the read data into the write buffer and write it. |
| if (conn->server_is_writing) { |
| grpc_slice_buffer_move_into(&conn->client_read_buffer, |
| &conn->server_deferred_write_buffer); |
| } else { |
| grpc_slice_buffer_move_into(&conn->client_read_buffer, |
| &conn->server_write_buffer); |
| proxy_connection_ref(conn, "client_read"); |
| conn->server_is_writing = true; |
| grpc_endpoint_write(exec_ctx, conn->server_endpoint, |
| &conn->server_write_buffer, |
| &conn->on_server_write_done); |
| } |
| // Read more data. |
| grpc_endpoint_read(exec_ctx, conn->client_endpoint, &conn->client_read_buffer, |
| &conn->on_client_read_done); |
| } |
| |
| // Callback for reading data from the backend server, which will be |
| // proxied to the client. |
| static void on_server_read_done(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_error* error) { |
| proxy_connection* conn = (proxy_connection*)arg; |
| if (error != GRPC_ERROR_NONE) { |
| proxy_connection_failed(exec_ctx, conn, SERVER_READ_FAILED, |
| "HTTP proxy server read", GRPC_ERROR_REF(error)); |
| return; |
| } |
| // If there is already a pending write (i.e., client_write_buffer is |
| // not empty), then move the read data into client_deferred_write_buffer, |
| // and the next write will be requested in on_client_write_done(), when |
| // the current write is finished. |
| // |
| // Otherwise, move the read data into the write buffer and write it. |
| if (conn->client_is_writing) { |
| grpc_slice_buffer_move_into(&conn->server_read_buffer, |
| &conn->client_deferred_write_buffer); |
| } else { |
| grpc_slice_buffer_move_into(&conn->server_read_buffer, |
| &conn->client_write_buffer); |
| proxy_connection_ref(conn, "server_read"); |
| conn->client_is_writing = true; |
| grpc_endpoint_write(exec_ctx, conn->client_endpoint, |
| &conn->client_write_buffer, |
| &conn->on_client_write_done); |
| } |
| // Read more data. |
| grpc_endpoint_read(exec_ctx, conn->server_endpoint, &conn->server_read_buffer, |
| &conn->on_server_read_done); |
| } |
| |
| // Callback to write the HTTP response for the CONNECT request. |
| static void on_write_response_done(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_error* error) { |
| proxy_connection* conn = (proxy_connection*)arg; |
| conn->client_is_writing = false; |
| if (error != GRPC_ERROR_NONE) { |
| proxy_connection_failed(exec_ctx, conn, SETUP_FAILED, |
| "HTTP proxy write response", GRPC_ERROR_REF(error)); |
| return; |
| } |
| // Clear write buffer. |
| grpc_slice_buffer_reset_and_unref(&conn->client_write_buffer); |
| // Start reading from both client and server. One of the read |
| // requests inherits our ref to conn, but we need to take a new ref |
| // for the other one. |
| proxy_connection_ref(conn, "client_read"); |
| proxy_connection_ref(conn, "server_read"); |
| proxy_connection_unref(exec_ctx, conn, "write_response"); |
| grpc_endpoint_read(exec_ctx, conn->client_endpoint, &conn->client_read_buffer, |
| &conn->on_client_read_done); |
| grpc_endpoint_read(exec_ctx, conn->server_endpoint, &conn->server_read_buffer, |
| &conn->on_server_read_done); |
| } |
| |
| // Callback to connect to the backend server specified by the HTTP |
| // CONNECT request. |
| static void on_server_connect_done(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_error* error) { |
| proxy_connection* conn = (proxy_connection*)arg; |
| if (error != GRPC_ERROR_NONE) { |
| // TODO(roth): Technically, in this case, we should handle the error |
| // by returning an HTTP response to the client indicating that the |
| // connection failed. However, for the purposes of this test code, |
| // it's fine to pretend this is a client-side error, which will |
| // cause the client connection to be dropped. |
| proxy_connection_failed(exec_ctx, conn, SETUP_FAILED, |
| "HTTP proxy server connect", GRPC_ERROR_REF(error)); |
| return; |
| } |
| // We've established a connection, so send back a 200 response code to |
| // the client. |
| // The write callback inherits our reference to conn. |
| grpc_slice slice = |
| grpc_slice_from_copied_string("HTTP/1.0 200 connected\r\n\r\n"); |
| grpc_slice_buffer_add(&conn->client_write_buffer, slice); |
| conn->client_is_writing = true; |
| grpc_endpoint_write(exec_ctx, conn->client_endpoint, |
| &conn->client_write_buffer, |
| &conn->on_write_response_done); |
| } |
| |
| /** |
| * Parses the proxy auth header value to check if it matches :- |
| * Basic <base64_encoded_expected_cred> |
| * Returns true if it matches, false otherwise |
| */ |
| static bool proxy_auth_header_matches(grpc_exec_ctx* exec_ctx, |
| char* proxy_auth_header_val, |
| char* expected_cred) { |
| GPR_ASSERT(proxy_auth_header_val != nullptr); |
| GPR_ASSERT(expected_cred != nullptr); |
| if (strncmp(proxy_auth_header_val, "Basic ", 6) != 0) { |
| return false; |
| } |
| proxy_auth_header_val += 6; |
| grpc_slice decoded_slice = |
| grpc_base64_decode(exec_ctx, proxy_auth_header_val, 0); |
| const bool header_matches = |
| grpc_slice_str_cmp(decoded_slice, expected_cred) == 0; |
| grpc_slice_unref_internal(exec_ctx, decoded_slice); |
| return header_matches; |
| } |
| |
| // Callback to read the HTTP CONNECT request. |
| // TODO(roth): Technically, for any of the failure modes handled by this |
| // function, we should handle the error by returning an HTTP response to |
| // the client indicating that the request failed. However, for the purposes |
| // of this test code, it's fine to pretend this is a client-side error, |
| // which will cause the client connection to be dropped. |
| static void on_read_request_done(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_error* error) { |
| proxy_connection* conn = (proxy_connection*)arg; |
| gpr_log(GPR_DEBUG, "on_read_request_done: %p %s", conn, |
| grpc_error_string(error)); |
| if (error != GRPC_ERROR_NONE) { |
| proxy_connection_failed(exec_ctx, conn, SETUP_FAILED, |
| "HTTP proxy read request", GRPC_ERROR_REF(error)); |
| return; |
| } |
| // Read request and feed it to the parser. |
| for (size_t i = 0; i < conn->client_read_buffer.count; ++i) { |
| if (GRPC_SLICE_LENGTH(conn->client_read_buffer.slices[i]) > 0) { |
| error = grpc_http_parser_parse( |
| &conn->http_parser, conn->client_read_buffer.slices[i], nullptr); |
| if (error != GRPC_ERROR_NONE) { |
| proxy_connection_failed(exec_ctx, conn, SETUP_FAILED, |
| "HTTP proxy request parse", |
| GRPC_ERROR_REF(error)); |
| GRPC_ERROR_UNREF(error); |
| return; |
| } |
| } |
| } |
| grpc_slice_buffer_reset_and_unref(&conn->client_read_buffer); |
| // If we're not done reading the request, read more data. |
| if (conn->http_parser.state != GRPC_HTTP_BODY) { |
| grpc_endpoint_read(exec_ctx, conn->client_endpoint, |
| &conn->client_read_buffer, &conn->on_read_request_done); |
| return; |
| } |
| // Make sure we got a CONNECT request. |
| if (strcmp(conn->http_request.method, "CONNECT") != 0) { |
| char* msg; |
| gpr_asprintf(&msg, "HTTP proxy got request method %s", |
| conn->http_request.method); |
| error = GRPC_ERROR_CREATE_FROM_COPIED_STRING(msg); |
| gpr_free(msg); |
| proxy_connection_failed(exec_ctx, conn, SETUP_FAILED, |
| "HTTP proxy read request", GRPC_ERROR_REF(error)); |
| GRPC_ERROR_UNREF(error); |
| return; |
| } |
| // If proxy auth is being used, check if the header is present and as expected |
| const grpc_arg* proxy_auth_arg = grpc_channel_args_find( |
| conn->proxy->channel_args, GRPC_ARG_HTTP_PROXY_AUTH_CREDS); |
| if (proxy_auth_arg != nullptr && proxy_auth_arg->type == GRPC_ARG_STRING) { |
| bool client_authenticated = false; |
| for (size_t i = 0; i < conn->http_request.hdr_count; i++) { |
| if (strcmp(conn->http_request.hdrs[i].key, "Proxy-Authorization") == 0) { |
| client_authenticated = proxy_auth_header_matches( |
| exec_ctx, conn->http_request.hdrs[i].value, |
| proxy_auth_arg->value.string); |
| break; |
| } |
| } |
| if (!client_authenticated) { |
| const char* msg = "HTTP Connect could not verify authentication"; |
| error = GRPC_ERROR_CREATE_FROM_STATIC_STRING(msg); |
| proxy_connection_failed(exec_ctx, conn, SETUP_FAILED, |
| "HTTP proxy read request", GRPC_ERROR_REF(error)); |
| GRPC_ERROR_UNREF(error); |
| return; |
| } |
| } |
| // Resolve address. |
| grpc_resolved_addresses* resolved_addresses = nullptr; |
| error = grpc_blocking_resolve_address(conn->http_request.path, "80", |
| &resolved_addresses); |
| if (error != GRPC_ERROR_NONE) { |
| proxy_connection_failed(exec_ctx, conn, SETUP_FAILED, |
| "HTTP proxy DNS lookup", GRPC_ERROR_REF(error)); |
| GRPC_ERROR_UNREF(error); |
| return; |
| } |
| GPR_ASSERT(resolved_addresses->naddrs >= 1); |
| // Connect to requested address. |
| // The connection callback inherits our reference to conn. |
| const grpc_millis deadline = |
| grpc_exec_ctx_now(exec_ctx) + 10 * GPR_MS_PER_SEC; |
| grpc_tcp_client_connect(exec_ctx, &conn->on_server_connect_done, |
| &conn->server_endpoint, conn->pollset_set, nullptr, |
| &resolved_addresses->addrs[0], deadline); |
| grpc_resolved_addresses_destroy(resolved_addresses); |
| } |
| |
| static void on_accept(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_endpoint* endpoint, grpc_pollset* accepting_pollset, |
| grpc_tcp_server_acceptor* acceptor) { |
| gpr_free(acceptor); |
| grpc_end2end_http_proxy* proxy = (grpc_end2end_http_proxy*)arg; |
| // Instantiate proxy_connection. |
| proxy_connection* conn = (proxy_connection*)gpr_zalloc(sizeof(*conn)); |
| gpr_ref(&proxy->users); |
| conn->client_endpoint = endpoint; |
| conn->proxy = proxy; |
| gpr_ref_init(&conn->refcount, 1); |
| conn->pollset_set = grpc_pollset_set_create(); |
| grpc_pollset_set_add_pollset(exec_ctx, conn->pollset_set, proxy->pollset); |
| grpc_endpoint_add_to_pollset_set(exec_ctx, endpoint, conn->pollset_set); |
| GRPC_CLOSURE_INIT(&conn->on_read_request_done, on_read_request_done, conn, |
| grpc_combiner_scheduler(conn->proxy->combiner)); |
| GRPC_CLOSURE_INIT(&conn->on_server_connect_done, on_server_connect_done, conn, |
| grpc_combiner_scheduler(conn->proxy->combiner)); |
| GRPC_CLOSURE_INIT(&conn->on_write_response_done, on_write_response_done, conn, |
| grpc_combiner_scheduler(conn->proxy->combiner)); |
| GRPC_CLOSURE_INIT(&conn->on_client_read_done, on_client_read_done, conn, |
| grpc_combiner_scheduler(conn->proxy->combiner)); |
| GRPC_CLOSURE_INIT(&conn->on_client_write_done, on_client_write_done, conn, |
| grpc_combiner_scheduler(conn->proxy->combiner)); |
| GRPC_CLOSURE_INIT(&conn->on_server_read_done, on_server_read_done, conn, |
| grpc_combiner_scheduler(conn->proxy->combiner)); |
| GRPC_CLOSURE_INIT(&conn->on_server_write_done, on_server_write_done, conn, |
| grpc_combiner_scheduler(conn->proxy->combiner)); |
| grpc_slice_buffer_init(&conn->client_read_buffer); |
| grpc_slice_buffer_init(&conn->client_deferred_write_buffer); |
| conn->client_is_writing = false; |
| grpc_slice_buffer_init(&conn->client_write_buffer); |
| grpc_slice_buffer_init(&conn->server_read_buffer); |
| grpc_slice_buffer_init(&conn->server_deferred_write_buffer); |
| conn->server_is_writing = false; |
| grpc_slice_buffer_init(&conn->server_write_buffer); |
| grpc_http_parser_init(&conn->http_parser, GRPC_HTTP_REQUEST, |
| &conn->http_request); |
| grpc_endpoint_read(exec_ctx, conn->client_endpoint, &conn->client_read_buffer, |
| &conn->on_read_request_done); |
| } |
| |
| // |
| // Proxy class |
| // |
| |
| static void thread_main(void* arg) { |
| grpc_end2end_http_proxy* proxy = (grpc_end2end_http_proxy*)arg; |
| grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT; |
| do { |
| gpr_ref(&proxy->users); |
| grpc_pollset_worker* worker = nullptr; |
| gpr_mu_lock(proxy->mu); |
| GRPC_LOG_IF_ERROR( |
| "grpc_pollset_work", |
| grpc_pollset_work(&exec_ctx, proxy->pollset, &worker, |
| grpc_exec_ctx_now(&exec_ctx) + GPR_MS_PER_SEC)); |
| gpr_mu_unlock(proxy->mu); |
| grpc_exec_ctx_flush(&exec_ctx); |
| } while (!gpr_unref(&proxy->users)); |
| grpc_exec_ctx_finish(&exec_ctx); |
| } |
| |
| grpc_end2end_http_proxy* grpc_end2end_http_proxy_create( |
| grpc_channel_args* args) { |
| grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT; |
| grpc_end2end_http_proxy* proxy = |
| (grpc_end2end_http_proxy*)gpr_malloc(sizeof(*proxy)); |
| memset(proxy, 0, sizeof(*proxy)); |
| proxy->combiner = grpc_combiner_create(); |
| gpr_ref_init(&proxy->users, 1); |
| // Construct proxy address. |
| const int proxy_port = grpc_pick_unused_port_or_die(); |
| gpr_join_host_port(&proxy->proxy_name, "localhost", proxy_port); |
| gpr_log(GPR_INFO, "Proxy address: %s", proxy->proxy_name); |
| // Create TCP server. |
| proxy->channel_args = grpc_channel_args_copy(args); |
| grpc_error* error = grpc_tcp_server_create( |
| &exec_ctx, nullptr, proxy->channel_args, &proxy->server); |
| GPR_ASSERT(error == GRPC_ERROR_NONE); |
| // Bind to port. |
| grpc_resolved_address resolved_addr; |
| struct sockaddr_in* addr = (struct sockaddr_in*)resolved_addr.addr; |
| memset(&resolved_addr, 0, sizeof(resolved_addr)); |
| addr->sin_family = AF_INET; |
| grpc_sockaddr_set_port(&resolved_addr, proxy_port); |
| int port; |
| error = grpc_tcp_server_add_port(proxy->server, &resolved_addr, &port); |
| GPR_ASSERT(error == GRPC_ERROR_NONE); |
| GPR_ASSERT(port == proxy_port); |
| // Start server. |
| proxy->pollset = (grpc_pollset*)gpr_zalloc(grpc_pollset_size()); |
| grpc_pollset_init(proxy->pollset, &proxy->mu); |
| grpc_tcp_server_start(&exec_ctx, proxy->server, &proxy->pollset, 1, on_accept, |
| proxy); |
| grpc_exec_ctx_finish(&exec_ctx); |
| // Start proxy thread. |
| gpr_thd_options opt = gpr_thd_options_default(); |
| gpr_thd_options_set_joinable(&opt); |
| GPR_ASSERT(gpr_thd_new(&proxy->thd, thread_main, proxy, &opt)); |
| return proxy; |
| } |
| |
| static void destroy_pollset(grpc_exec_ctx* exec_ctx, void* arg, |
| grpc_error* error) { |
| grpc_pollset* pollset = (grpc_pollset*)arg; |
| grpc_pollset_destroy(exec_ctx, pollset); |
| gpr_free(pollset); |
| } |
| |
| void grpc_end2end_http_proxy_destroy(grpc_end2end_http_proxy* proxy) { |
| gpr_unref(&proxy->users); // Signal proxy thread to shutdown. |
| grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT; |
| gpr_thd_join(proxy->thd); |
| grpc_tcp_server_shutdown_listeners(&exec_ctx, proxy->server); |
| grpc_tcp_server_unref(&exec_ctx, proxy->server); |
| gpr_free(proxy->proxy_name); |
| grpc_channel_args_destroy(&exec_ctx, proxy->channel_args); |
| grpc_pollset_shutdown(&exec_ctx, proxy->pollset, |
| GRPC_CLOSURE_CREATE(destroy_pollset, proxy->pollset, |
| grpc_schedule_on_exec_ctx)); |
| GRPC_COMBINER_UNREF(&exec_ctx, proxy->combiner, "test"); |
| gpr_free(proxy); |
| grpc_exec_ctx_finish(&exec_ctx); |
| } |
| |
| const char* grpc_end2end_http_proxy_get_proxy_name( |
| grpc_end2end_http_proxy* proxy) { |
| return proxy->proxy_name; |
| } |