blob: b7cb2e3eba77b89537a2a075f4bf295f10dfcfa5 [file] [log] [blame]
Mark D. Roth4623e1c2016-07-18 14:09:18 -07001/*
2 *
Jan Tattermusch7897ae92017-06-07 22:57:36 +02003 * Copyright 2016 gRPC authors.
Mark D. Roth4623e1c2016-07-18 14:09:18 -07004 *
Jan Tattermusch7897ae92017-06-07 22:57:36 +02005 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
Mark D. Roth4623e1c2016-07-18 14:09:18 -07008 *
Jan Tattermusch7897ae92017-06-07 22:57:36 +02009 * http://www.apache.org/licenses/LICENSE-2.0
Mark D. Roth4623e1c2016-07-18 14:09:18 -070010 *
Jan Tattermusch7897ae92017-06-07 22:57:36 +020011 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
Mark D. Roth4623e1c2016-07-18 14:09:18 -070016 *
17 */
18
Craig Tiller9eb0fde2017-03-31 16:59:30 -070019#include "src/core/ext/filters/client_channel/http_connect_handshaker.h"
Mark D. Roth0a05ab62016-08-04 13:10:13 -070020
Mark D. Roth4623e1c2016-07-18 14:09:18 -070021#include <string.h>
22
Craig Tiller28b72422016-10-26 21:15:29 -070023#include <grpc/slice_buffer.h>
Mark D. Roth5c280962016-09-16 13:23:58 -070024#include <grpc/support/alloc.h>
25#include <grpc/support/log.h>
Mark D. Roth77613b22016-07-22 09:41:10 -070026#include <grpc/support/string_util.h>
Mark D. Roth4623e1c2016-07-18 14:09:18 -070027
Craig Tiller9eb0fde2017-03-31 16:59:30 -070028#include "src/core/ext/filters/client_channel/client_channel.h"
29#include "src/core/ext/filters/client_channel/resolver_registry.h"
30#include "src/core/ext/filters/client_channel/uri_parser.h"
Mark D. Roth30f698f2016-11-29 14:02:32 -080031#include "src/core/lib/channel/channel_args.h"
Mark D. Roth1f0f23c2017-01-06 13:07:19 -080032#include "src/core/lib/channel/handshaker_registry.h"
Mark D. Rothf7250192016-07-22 08:06:09 -070033#include "src/core/lib/http/format_request.h"
34#include "src/core/lib/http/parser.h"
Craig Tiller6822a7a2016-12-06 19:28:52 -080035#include "src/core/lib/slice/slice_internal.h"
Mark D. Roth39b58712016-09-06 12:50:42 -070036#include "src/core/lib/support/env.h"
Mark D. Rothb3242872017-01-18 07:46:30 -080037#include "src/core/lib/support/string.h"
Mark D. Roth4623e1c2016-07-18 14:09:18 -070038
39typedef struct http_connect_handshaker {
40 // Base class. Must be first.
41 grpc_handshaker base;
42
Mark D. Rothb16c1e32016-11-14 12:08:13 -080043 gpr_refcount refcount;
44 gpr_mu mu;
45
Mark D. Roth30f698f2016-11-29 14:02:32 -080046 bool shutdown;
47 // Endpoint and read buffer to destroy after a shutdown.
48 grpc_endpoint* endpoint_to_destroy;
49 grpc_slice_buffer* read_buffer_to_destroy;
50
Mark D. Roth4623e1c2016-07-18 14:09:18 -070051 // State saved while performing the handshake.
Mark D. Roth27588bb2016-11-11 15:03:39 -080052 grpc_handshaker_args* args;
Mark D. Roth4b5cdb72016-11-14 11:37:36 -080053 grpc_closure* on_handshake_done;
Mark D. Roth4623e1c2016-07-18 14:09:18 -070054
55 // Objects for processing the HTTP CONNECT request and response.
Craig Tillerd41a4a72016-10-26 16:16:06 -070056 grpc_slice_buffer write_buffer;
Mark D. Roth4623e1c2016-07-18 14:09:18 -070057 grpc_closure request_done_closure;
Mark D. Roth4623e1c2016-07-18 14:09:18 -070058 grpc_closure response_read_closure;
Mark D. Rothf7250192016-07-22 08:06:09 -070059 grpc_http_parser http_parser;
60 grpc_http_response http_response;
Mark D. Roth4623e1c2016-07-18 14:09:18 -070061} http_connect_handshaker;
62
Mark D. Roth5b4768f2016-08-04 13:41:46 -070063// Unref and clean up handshaker.
Craig Tiller87a7e1f2016-11-09 09:42:19 -080064static void http_connect_handshaker_unref(grpc_exec_ctx* exec_ctx,
65 http_connect_handshaker* handshaker) {
Mark D. Roth5b4768f2016-08-04 13:41:46 -070066 if (gpr_unref(&handshaker->refcount)) {
Mark D. Rothb16c1e32016-11-14 12:08:13 -080067 gpr_mu_destroy(&handshaker->mu);
Craig Tiller4782d922017-11-10 09:53:21 -080068 if (handshaker->endpoint_to_destroy != nullptr) {
Mark D. Roth30f698f2016-11-29 14:02:32 -080069 grpc_endpoint_destroy(exec_ctx, handshaker->endpoint_to_destroy);
70 }
Craig Tiller4782d922017-11-10 09:53:21 -080071 if (handshaker->read_buffer_to_destroy != nullptr) {
Craig Tiller6822a7a2016-12-06 19:28:52 -080072 grpc_slice_buffer_destroy_internal(exec_ctx,
73 handshaker->read_buffer_to_destroy);
Mark D. Roth30f698f2016-11-29 14:02:32 -080074 gpr_free(handshaker->read_buffer_to_destroy);
75 }
Craig Tiller6822a7a2016-12-06 19:28:52 -080076 grpc_slice_buffer_destroy_internal(exec_ctx, &handshaker->write_buffer);
Mark D. Roth5b4768f2016-08-04 13:41:46 -070077 grpc_http_parser_destroy(&handshaker->http_parser);
78 grpc_http_response_destroy(&handshaker->http_response);
79 gpr_free(handshaker);
80 }
81}
82
Mark D. Roth30f698f2016-11-29 14:02:32 -080083// Set args fields to NULL, saving the endpoint and read buffer for
84// later destruction.
85static void cleanup_args_for_failure_locked(
Craig Tillerb6821f62016-12-06 15:10:42 -080086 grpc_exec_ctx* exec_ctx, http_connect_handshaker* handshaker) {
Mark D. Roth30f698f2016-11-29 14:02:32 -080087 handshaker->endpoint_to_destroy = handshaker->args->endpoint;
Craig Tiller4782d922017-11-10 09:53:21 -080088 handshaker->args->endpoint = nullptr;
Mark D. Roth30f698f2016-11-29 14:02:32 -080089 handshaker->read_buffer_to_destroy = handshaker->args->read_buffer;
Craig Tiller4782d922017-11-10 09:53:21 -080090 handshaker->args->read_buffer = nullptr;
Craig Tiller397bff32016-12-06 15:05:59 -080091 grpc_channel_args_destroy(exec_ctx, handshaker->args->args);
Craig Tiller4782d922017-11-10 09:53:21 -080092 handshaker->args->args = nullptr;
Mark D. Roth30f698f2016-11-29 14:02:32 -080093}
94
Mark D. Rothc584d992016-11-30 09:45:32 -080095// If the handshake failed or we're shutting down, clean up and invoke the
96// callback with the error.
97static void handshake_failed_locked(grpc_exec_ctx* exec_ctx,
98 http_connect_handshaker* handshaker,
99 grpc_error* error) {
100 if (error == GRPC_ERROR_NONE) {
101 // If we were shut down after an endpoint operation succeeded but
102 // before the endpoint callback was invoked, we need to generate our
103 // own error.
ncteisen4b36a3d2017-03-13 19:08:06 -0700104 error = GRPC_ERROR_CREATE_FROM_STATIC_STRING("Handshaker shutdown");
Mark D. Rotha47a2462016-08-11 09:02:30 -0700105 }
Mark D. Rothc584d992016-11-30 09:45:32 -0800106 if (!handshaker->shutdown) {
107 // TODO(ctiller): It is currently necessary to shutdown endpoints
108 // before destroying them, even if we know that there are no
109 // pending read/write callbacks. This should be fixed, at which
110 // point this can be removed.
Craig Tillercda759d2017-01-27 11:37:37 -0800111 grpc_endpoint_shutdown(exec_ctx, handshaker->args->endpoint,
112 GRPC_ERROR_REF(error));
Mark D. Rothc584d992016-11-30 09:45:32 -0800113 // Not shutting down, so the handshake failed. Clean up before
114 // invoking the callback.
Craig Tiller397bff32016-12-06 15:05:59 -0800115 cleanup_args_for_failure_locked(exec_ctx, handshaker);
Mark D. Roth8aa2f702016-12-02 11:00:27 -0800116 // Set shutdown to true so that subsequent calls to
117 // http_connect_handshaker_shutdown() do nothing.
118 handshaker->shutdown = true;
Mark D. Rothc584d992016-11-30 09:45:32 -0800119 }
120 // Invoke callback.
ncteisen274bbbe2017-06-08 14:57:11 -0700121 GRPC_CLOSURE_SCHED(exec_ctx, handshaker->on_handshake_done, error);
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700122}
123
Mark D. Roth4623e1c2016-07-18 14:09:18 -0700124// Callback invoked when finished writing HTTP CONNECT request.
125static void on_write_done(grpc_exec_ctx* exec_ctx, void* arg,
126 grpc_error* error) {
Craig Tillera6ca5712017-07-11 14:51:57 -0700127 http_connect_handshaker* handshaker = (http_connect_handshaker*)arg;
Mark D. Roth4cdcd122016-11-29 12:39:54 -0800128 gpr_mu_lock(&handshaker->mu);
Mark D. Roth30f698f2016-11-29 14:02:32 -0800129 if (error != GRPC_ERROR_NONE || handshaker->shutdown) {
130 // If the write failed or we're shutting down, clean up and invoke the
131 // callback with the error.
Mark D. Rothc584d992016-11-30 09:45:32 -0800132 handshake_failed_locked(exec_ctx, handshaker, GRPC_ERROR_REF(error));
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800133 gpr_mu_unlock(&handshaker->mu);
Mark D. Roth30f698f2016-11-29 14:02:32 -0800134 http_connect_handshaker_unref(exec_ctx, handshaker);
Mark D. Roth28ea7e22016-07-25 11:06:22 -0700135 } else {
136 // Otherwise, read the response.
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800137 // The read callback inherits our ref to the handshaker.
Mark D. Roth27588bb2016-11-11 15:03:39 -0800138 grpc_endpoint_read(exec_ctx, handshaker->args->endpoint,
139 handshaker->args->read_buffer,
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700140 &handshaker->response_read_closure);
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800141 gpr_mu_unlock(&handshaker->mu);
Mark D. Roth28ea7e22016-07-25 11:06:22 -0700142 }
Mark D. Roth4623e1c2016-07-18 14:09:18 -0700143}
144
Mark D. Rothf7250192016-07-22 08:06:09 -0700145// Callback invoked for reading HTTP CONNECT response.
146static void on_read_done(grpc_exec_ctx* exec_ctx, void* arg,
147 grpc_error* error) {
Craig Tillera6ca5712017-07-11 14:51:57 -0700148 http_connect_handshaker* handshaker = (http_connect_handshaker*)arg;
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800149 gpr_mu_lock(&handshaker->mu);
Mark D. Roth30f698f2016-11-29 14:02:32 -0800150 if (error != GRPC_ERROR_NONE || handshaker->shutdown) {
Mark D. Rothc584d992016-11-30 09:45:32 -0800151 // If the read failed or we're shutting down, clean up and invoke the
Mark D. Roth30f698f2016-11-29 14:02:32 -0800152 // callback with the error.
Mark D. Rothc584d992016-11-30 09:45:32 -0800153 handshake_failed_locked(exec_ctx, handshaker, GRPC_ERROR_REF(error));
Mark D. Rothb954df12016-08-01 09:53:52 -0700154 goto done;
155 }
156 // Add buffer to parser.
Mark D. Roth27588bb2016-11-11 15:03:39 -0800157 for (size_t i = 0; i < handshaker->args->read_buffer->count; ++i) {
158 if (GRPC_SLICE_LENGTH(handshaker->args->read_buffer->slices[i]) > 0) {
Mark D. Roth714c7ec2016-08-04 12:58:16 -0700159 size_t body_start_offset = 0;
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700160 error = grpc_http_parser_parse(&handshaker->http_parser,
Mark D. Roth27588bb2016-11-11 15:03:39 -0800161 handshaker->args->read_buffer->slices[i],
Mark D. Roth0a05ab62016-08-04 13:10:13 -0700162 &body_start_offset);
Mark D. Rothc584d992016-11-30 09:45:32 -0800163 if (error != GRPC_ERROR_NONE) {
164 handshake_failed_locked(exec_ctx, handshaker, error);
165 goto done;
166 }
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700167 if (handshaker->http_parser.state == GRPC_HTTP_BODY) {
Mark D. Roth714c7ec2016-08-04 12:58:16 -0700168 // Remove the data we've already read from the read buffer,
169 // leaving only the leftover bytes (if any).
Craig Tillerd41a4a72016-10-26 16:16:06 -0700170 grpc_slice_buffer tmp_buffer;
171 grpc_slice_buffer_init(&tmp_buffer);
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700172 if (body_start_offset <
Mark D. Roth27588bb2016-11-11 15:03:39 -0800173 GRPC_SLICE_LENGTH(handshaker->args->read_buffer->slices[i])) {
Craig Tillerd41a4a72016-10-26 16:16:06 -0700174 grpc_slice_buffer_add(
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700175 &tmp_buffer,
Mark D. Roth27588bb2016-11-11 15:03:39 -0800176 grpc_slice_split_tail(&handshaker->args->read_buffer->slices[i],
Craig Tiller28b72422016-10-26 21:15:29 -0700177 body_start_offset));
Mark D. Roth714c7ec2016-08-04 12:58:16 -0700178 }
Craig Tillerd41a4a72016-10-26 16:16:06 -0700179 grpc_slice_buffer_addn(&tmp_buffer,
Mark D. Roth27588bb2016-11-11 15:03:39 -0800180 &handshaker->args->read_buffer->slices[i + 1],
181 handshaker->args->read_buffer->count - i - 1);
182 grpc_slice_buffer_swap(handshaker->args->read_buffer, &tmp_buffer);
Craig Tiller6822a7a2016-12-06 19:28:52 -0800183 grpc_slice_buffer_destroy_internal(exec_ctx, &tmp_buffer);
Mark D. Roth714c7ec2016-08-04 12:58:16 -0700184 break;
185 }
Mark D. Rothf7250192016-07-22 08:06:09 -0700186 }
Mark D. Rothb954df12016-08-01 09:53:52 -0700187 }
188 // If we're not done reading the response, read more data.
189 // TODO(roth): In practice, I suspect that the response to a CONNECT
190 // request will never include a body, in which case this check is
191 // sufficient. However, the language of RFC-2817 doesn't explicitly
192 // forbid the response from including a body. If there is a body,
193 // it's possible that we might have parsed part but not all of the
194 // body, in which case this check will cause us to fail to parse the
195 // remainder of the body. If that ever becomes an issue, we may
196 // need to fix the HTTP parser to understand when the body is
197 // complete (e.g., handling chunked transfer encoding or looking
198 // at the Content-Length: header).
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700199 if (handshaker->http_parser.state != GRPC_HTTP_BODY) {
Craig Tiller6822a7a2016-12-06 19:28:52 -0800200 grpc_slice_buffer_reset_and_unref_internal(exec_ctx,
201 handshaker->args->read_buffer);
Mark D. Roth27588bb2016-11-11 15:03:39 -0800202 grpc_endpoint_read(exec_ctx, handshaker->args->endpoint,
203 handshaker->args->read_buffer,
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700204 &handshaker->response_read_closure);
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800205 gpr_mu_unlock(&handshaker->mu);
Mark D. Rothb954df12016-08-01 09:53:52 -0700206 return;
207 }
208 // Make sure we got a 2xx response.
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700209 if (handshaker->http_response.status < 200 ||
210 handshaker->http_response.status >= 300) {
Mark D. Rothb954df12016-08-01 09:53:52 -0700211 char* msg;
212 gpr_asprintf(&msg, "HTTP proxy returned response code %d",
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700213 handshaker->http_response.status);
ncteisen4b36a3d2017-03-13 19:08:06 -0700214 error = GRPC_ERROR_CREATE_FROM_COPIED_STRING(msg);
Mark D. Rothb954df12016-08-01 09:53:52 -0700215 gpr_free(msg);
Mark D. Rothc584d992016-11-30 09:45:32 -0800216 handshake_failed_locked(exec_ctx, handshaker, error);
217 goto done;
Mark D. Rothf7250192016-07-22 08:06:09 -0700218 }
Mark D. Rothc584d992016-11-30 09:45:32 -0800219 // Success. Invoke handshake-done callback.
ncteisen274bbbe2017-06-08 14:57:11 -0700220 GRPC_CLOSURE_SCHED(exec_ctx, handshaker->on_handshake_done, error);
Mark D. Roth0a05ab62016-08-04 13:10:13 -0700221done:
Mark D. Roth53bd6932016-12-01 08:00:38 -0800222 // Set shutdown to true so that subsequent calls to
223 // http_connect_handshaker_shutdown() do nothing.
224 handshaker->shutdown = true;
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800225 gpr_mu_unlock(&handshaker->mu);
Mark D. Roth30f698f2016-11-29 14:02:32 -0800226 http_connect_handshaker_unref(exec_ctx, handshaker);
Mark D. Rothf7250192016-07-22 08:06:09 -0700227}
228
Mark D. Roth9136bb12016-07-21 09:52:12 -0700229//
230// Public handshaker methods
231//
232
233static void http_connect_handshaker_destroy(grpc_exec_ctx* exec_ctx,
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700234 grpc_handshaker* handshaker_in) {
235 http_connect_handshaker* handshaker = (http_connect_handshaker*)handshaker_in;
Craig Tiller87a7e1f2016-11-09 09:42:19 -0800236 http_connect_handshaker_unref(exec_ctx, handshaker);
Mark D. Roth9136bb12016-07-21 09:52:12 -0700237}
238
239static void http_connect_handshaker_shutdown(grpc_exec_ctx* exec_ctx,
Craig Tillercda759d2017-01-27 11:37:37 -0800240 grpc_handshaker* handshaker_in,
241 grpc_error* why) {
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800242 http_connect_handshaker* handshaker = (http_connect_handshaker*)handshaker_in;
243 gpr_mu_lock(&handshaker->mu);
Mark D. Roth30f698f2016-11-29 14:02:32 -0800244 if (!handshaker->shutdown) {
245 handshaker->shutdown = true;
Craig Tillercda759d2017-01-27 11:37:37 -0800246 grpc_endpoint_shutdown(exec_ctx, handshaker->args->endpoint,
247 GRPC_ERROR_REF(why));
Craig Tiller397bff32016-12-06 15:05:59 -0800248 cleanup_args_for_failure_locked(exec_ctx, handshaker);
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800249 }
250 gpr_mu_unlock(&handshaker->mu);
Craig Tillercda759d2017-01-27 11:37:37 -0800251 GRPC_ERROR_UNREF(why);
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800252}
Mark D. Roth9136bb12016-07-21 09:52:12 -0700253
254static void http_connect_handshaker_do_handshake(
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700255 grpc_exec_ctx* exec_ctx, grpc_handshaker* handshaker_in,
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800256 grpc_tcp_server_acceptor* acceptor, grpc_closure* on_handshake_done,
257 grpc_handshaker_args* args) {
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700258 http_connect_handshaker* handshaker = (http_connect_handshaker*)handshaker_in;
Mark D. Roth37225c42017-01-18 07:23:36 -0800259 // Check for HTTP CONNECT channel arg.
260 // If not found, invoke on_handshake_done without doing anything.
261 const grpc_arg* arg =
262 grpc_channel_args_find(args->args, GRPC_ARG_HTTP_CONNECT_SERVER);
Craig Tiller4782d922017-11-10 09:53:21 -0800263 if (arg == nullptr) {
Mark D. Roth1339a382017-01-18 10:08:54 -0800264 // Set shutdown to true so that subsequent calls to
265 // http_connect_handshaker_shutdown() do nothing.
266 gpr_mu_lock(&handshaker->mu);
267 handshaker->shutdown = true;
268 gpr_mu_unlock(&handshaker->mu);
ncteisen274bbbe2017-06-08 14:57:11 -0700269 GRPC_CLOSURE_SCHED(exec_ctx, on_handshake_done, GRPC_ERROR_NONE);
Mark D. Roth37225c42017-01-18 07:23:36 -0800270 return;
271 }
Mark D. Rothb3242872017-01-18 07:46:30 -0800272 GPR_ASSERT(arg->type == GRPC_ARG_STRING);
Mark D. Roth37225c42017-01-18 07:23:36 -0800273 char* server_name = arg->value.string;
Mark D. Rothb3242872017-01-18 07:46:30 -0800274 // Get headers from channel args.
275 arg = grpc_channel_args_find(args->args, GRPC_ARG_HTTP_CONNECT_HEADERS);
Craig Tiller4782d922017-11-10 09:53:21 -0800276 grpc_http_header* headers = nullptr;
Mark D. Rothb3242872017-01-18 07:46:30 -0800277 size_t num_headers = 0;
Craig Tiller4782d922017-11-10 09:53:21 -0800278 char** header_strings = nullptr;
Mark D. Rothb3242872017-01-18 07:46:30 -0800279 size_t num_header_strings = 0;
Craig Tiller4782d922017-11-10 09:53:21 -0800280 if (arg != nullptr) {
Mark D. Rothb3242872017-01-18 07:46:30 -0800281 GPR_ASSERT(arg->type == GRPC_ARG_STRING);
282 gpr_string_split(arg->value.string, "\n", &header_strings,
283 &num_header_strings);
Craig Tillera6ca5712017-07-11 14:51:57 -0700284 headers = (grpc_http_header*)gpr_malloc(sizeof(grpc_http_header) *
285 num_header_strings);
Mark D. Rothb3242872017-01-18 07:46:30 -0800286 for (size_t i = 0; i < num_header_strings; ++i) {
287 char* sep = strchr(header_strings[i], ':');
Craig Tiller4782d922017-11-10 09:53:21 -0800288 if (sep == nullptr) {
Mark D. Rothb3242872017-01-18 07:46:30 -0800289 gpr_log(GPR_ERROR, "skipping unparseable HTTP CONNECT header: %s",
290 header_strings[i]);
291 continue;
292 }
293 *sep = '\0';
294 headers[num_headers].key = header_strings[i];
295 headers[num_headers].value = sep + 1;
296 ++num_headers;
297 }
298 }
Mark D. Roth4623e1c2016-07-18 14:09:18 -0700299 // Save state in the handshaker object.
Mark D. Roth201db7d2016-12-12 09:36:02 -0800300 gpr_mu_lock(&handshaker->mu);
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700301 handshaker->args = args;
Mark D. Roth4b5cdb72016-11-14 11:37:36 -0800302 handshaker->on_handshake_done = on_handshake_done;
Mark D. Rothb3242872017-01-18 07:46:30 -0800303 // Log connection via proxy.
Mark D. Roth37225c42017-01-18 07:23:36 -0800304 char* proxy_name = grpc_endpoint_get_peer(args->endpoint);
Mark D. Roth201db7d2016-12-12 09:36:02 -0800305 gpr_log(GPR_INFO, "Connecting to server %s via HTTP proxy %s", server_name,
Mark D. Roth37225c42017-01-18 07:23:36 -0800306 proxy_name);
307 gpr_free(proxy_name);
Mark D. Rothb3242872017-01-18 07:46:30 -0800308 // Construct HTTP CONNECT request.
Mark D. Rothf7250192016-07-22 08:06:09 -0700309 grpc_httpcli_request request;
310 memset(&request, 0, sizeof(request));
Mark D. Roth201db7d2016-12-12 09:36:02 -0800311 request.host = server_name;
Craig Tillera6ca5712017-07-11 14:51:57 -0700312 request.http.method = (char*)"CONNECT";
Mark D. Roth201db7d2016-12-12 09:36:02 -0800313 request.http.path = server_name;
Mark D. Rothb3242872017-01-18 07:46:30 -0800314 request.http.hdrs = headers;
315 request.http.hdr_count = num_headers;
Mark D. Roth77613b22016-07-22 09:41:10 -0700316 request.handshaker = &grpc_httpcli_plaintext;
Craig Tillerd41a4a72016-10-26 16:16:06 -0700317 grpc_slice request_slice = grpc_httpcli_format_connect_request(&request);
318 grpc_slice_buffer_add(&handshaker->write_buffer, request_slice);
Mark D. Rothb3242872017-01-18 07:46:30 -0800319 // Clean up.
320 gpr_free(headers);
321 for (size_t i = 0; i < num_header_strings; ++i) {
322 gpr_free(header_strings[i]);
323 }
324 gpr_free(header_strings);
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800325 // Take a new ref to be held by the write callback.
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700326 gpr_ref(&handshaker->refcount);
Mark D. Roth27588bb2016-11-11 15:03:39 -0800327 grpc_endpoint_write(exec_ctx, args->endpoint, &handshaker->write_buffer,
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700328 &handshaker->request_done_closure);
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800329 gpr_mu_unlock(&handshaker->mu);
Mark D. Roth4623e1c2016-07-18 14:09:18 -0700330}
331
Mark D. Roth27588bb2016-11-11 15:03:39 -0800332static const grpc_handshaker_vtable http_connect_handshaker_vtable = {
Mark D. Roth4623e1c2016-07-18 14:09:18 -0700333 http_connect_handshaker_destroy, http_connect_handshaker_shutdown,
334 http_connect_handshaker_do_handshake};
335
Mark D. Rothb3242872017-01-18 07:46:30 -0800336static grpc_handshaker* grpc_http_connect_handshaker_create() {
Craig Tillera6ca5712017-07-11 14:51:57 -0700337 http_connect_handshaker* handshaker =
338 (http_connect_handshaker*)gpr_malloc(sizeof(*handshaker));
Mark D. Roth4623e1c2016-07-18 14:09:18 -0700339 memset(handshaker, 0, sizeof(*handshaker));
Mark D. Roth77613b22016-07-22 09:41:10 -0700340 grpc_handshaker_init(&http_connect_handshaker_vtable, &handshaker->base);
Mark D. Rothb16c1e32016-11-14 12:08:13 -0800341 gpr_mu_init(&handshaker->mu);
342 gpr_ref_init(&handshaker->refcount, 1);
Craig Tillerd41a4a72016-10-26 16:16:06 -0700343 grpc_slice_buffer_init(&handshaker->write_buffer);
ncteisen274bbbe2017-06-08 14:57:11 -0700344 GRPC_CLOSURE_INIT(&handshaker->request_done_closure, on_write_done,
Craig Tiller91031da2016-12-28 15:44:25 -0800345 handshaker, grpc_schedule_on_exec_ctx);
ncteisen274bbbe2017-06-08 14:57:11 -0700346 GRPC_CLOSURE_INIT(&handshaker->response_read_closure, on_read_done,
Craig Tiller91031da2016-12-28 15:44:25 -0800347 handshaker, grpc_schedule_on_exec_ctx);
Mark D. Roth5b4768f2016-08-04 13:41:46 -0700348 grpc_http_parser_init(&handshaker->http_parser, GRPC_HTTP_RESPONSE,
349 &handshaker->http_response);
Mark D. Rotha47a2462016-08-11 09:02:30 -0700350 return &handshaker->base;
Mark D. Roth4623e1c2016-07-18 14:09:18 -0700351}
Mark D. Roth39b58712016-09-06 12:50:42 -0700352
Mark D. Roth1f0f23c2017-01-06 13:07:19 -0800353//
354// handshaker factory
355//
356
357static void handshaker_factory_add_handshakers(
358 grpc_exec_ctx* exec_ctx, grpc_handshaker_factory* factory,
359 const grpc_channel_args* args, grpc_handshake_manager* handshake_mgr) {
Mark D. Roth37225c42017-01-18 07:23:36 -0800360 grpc_handshake_manager_add(handshake_mgr,
Mark D. Rothb3242872017-01-18 07:46:30 -0800361 grpc_http_connect_handshaker_create());
Mark D. Roth1f0f23c2017-01-06 13:07:19 -0800362}
363
364static void handshaker_factory_destroy(grpc_exec_ctx* exec_ctx,
365 grpc_handshaker_factory* factory) {}
366
367static const grpc_handshaker_factory_vtable handshaker_factory_vtable = {
368 handshaker_factory_add_handshakers, handshaker_factory_destroy};
369
370static grpc_handshaker_factory handshaker_factory = {
371 &handshaker_factory_vtable};
372
373void grpc_http_connect_register_handshaker_factory() {
374 grpc_handshaker_factory_register(true /* at_start */, HANDSHAKER_CLIENT,
375 &handshaker_factory);
376}