alexcrichton opened issue #8878:
My changes in https://github.com/bytecodealliance/wasmtime/pull/8861 introduced a change in the default behavior of
wasmtime serve
. Notably this program:use wasi::http::types::*; struct T; wasi::http::proxy::export!(T); impl wasi::exports::wasi::http::incoming_handler::Guest for T { fn handle(request: IncomingRequest, outparam: ResponseOutparam) { println!("request.method = {:?}", request.method()); println!("request.scheme = {:?}", request.scheme()); println!("request.authority = {:?}", request.authority()); let resp = OutgoingResponse::new(Fields::new()); ResponseOutparam::set(outparam, Ok(resp)); } }
When run with
wasmtime serve
and hit withcurl http://localhost:8080
it prints:Serving HTTP on http://0.0.0.0:8080/ stdout [0] :: request.method = Method::Get stdout [0] :: request.scheme = Some(Scheme::Http) stdout [0] :: request.authority = Some("localhost:8080")
On
main
, however, it printsServing HTTP on http://0.0.0.0:8080/ stdout [0] :: request.method = Method::Get stdout [0] :: request.scheme = None stdout [0] :: request.authority = None
This regression is due to these changes because I didn't understand what they were doing.
Now why wasn't this caught by the test suite? I tried writing a test for this and it passed, but apparently it's due to our usage of
hyper::Request::builder().uri("http://localhost/")
in the test suite. That creates an HTTP requests that looks like:GET http://localhost/ HTTP/1.1 ...
where using
curl
on the command line generates:GET / HTTP/1.1 ...
That leads me to this issue. What should
scheme
andauthority
report in these two cases forwasmtime serve
by default? The previous behavior means thatGET /
could not be distinguished fromGET http://localhost/
which naively seems like whatscheme
andauthority
are trying to map to.Is the previous behavior of
wasmtime serve
buggy? Is the current behavior buggy? Should the spec be clarified?cc @elliottt @pchickey
alexcrichton commented on issue #8878:
I'll note that the difference can be seen with:
$ curl -v --request-target http://localhost/ http://localhost:8080
vs
$ curl -v http://localhost:8080
in terms of how the headers are set. The former is basically what our test suite does while the latter is what the
curl
command line does by default.
lann commented on issue #8878:
The former (full URL in request) is incorrect; that form is only applicable to CONNECT methods.
lann edited a comment on issue #8878:
The former (full URL in first line of the request) is incorrect; that form is only applicable to CONNECT methods.
lann edited a comment on issue #8878:
The former (full URL in first line of the request) is incorrect; that form is only applicable to the CONNECT method and HTTP/1.0 iirc..
lann edited a comment on issue #8878:
The former (full URL in first line of the request) is incorrect; that form is only applicable to the CONNECT method and HTTP/1.0 iirc.
lann commented on issue #8878:
The former (full URL in request) is incorrect; that form is only applicable to CONNECT methods.
Edit: looks like I might be wrong about it being incorrect per se; it might just be very uncommon.
lann edited a comment on issue #8878:
The former (full URL in request) is incorrect; that form is only applicable to CONNECT methods.
Edit: looks like I might be wrong about it being incorrect per se; it might just be very uncommon.
alexcrichton commented on issue #8878:
That makes sense, and means we should probably update our tests, but I guess I'm also curious still what the behavior here should be. For example why do
scheme
andauthority
return anOption
at the WIT level? Are they intended to map to this or is it expected that they're effectively alwaysSome
?
lann commented on issue #8878:
scheme
is derived from out of band info: whether the request came in over TLS or not
lann edited a comment on issue #8878:
scheme
is derived from out of band info: whether the request came in over TLS or not.
authority
was optional in http/1.0 which I believe is why hyper makes it optional. I don't know if that is the reason here though.
tschneidereit commented on issue #8878:
my take is that we should have wasi:http either always provide an authority, or provide the
host
header. Otherwise there's no standard way for content to learn about the authority it's called under. I know that @lukewagner concluded that we must never provide thehost
header. If that stands, I conversely think that we must continue providing the authority for incoming requests.In effect, that means that for incoming requests what content sees is always the
absoluteURI
form, which the RFC seems to indicate is the way forward, too:To allow for transition to absoluteURIs in all requests in future
versions of HTTP, all HTTP/1.1 servers MUST accept the absoluteURI
form in requests, even though HTTP/1.1 clients will only generate
them in requests to proxies.
lann commented on issue #8878:
Don't pay too much attention to the 1.1 spec for future direction. HTTP/2 makes authority even more special by splitting it into a "pseudo-header".
lann edited a comment on issue #8878:
Don't pay too much attention to the 1.1 spec for future direction. HTTP/2 makes authority even more special by (usually) splitting it into a "pseudo-header".
lann edited a comment on issue #8878:
Don't pay too much attention to the 1.1 spec for future direction. HTTP/2 and /3 make authority even more special by (usually) splitting it into a "pseudo-header": https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#field.host
alexcrichton commented on issue #8878:
The previous logic for scheme and authority were:
- Scheme: If the HTTP request used an "absolute URI" then the scheme comes from that, otherwise it's hardcoded as Http
- Authority: If the HTTP request used an "absolute URI" use the hostname, otherwise if the "Host: " header is provided use that, otherwise consider it an invalid http request and don't even invoke wasm.
Given that
wasmtime serve
does not itself support HTTPS, should the scheme always be HTTP in this case regardless of what the "absolute URI" says? Similarlywasmtime serve
has no support for multi-domain hosting or anything like that so is it correct to lookup the authority based on the request?A related but orthogonal question is that right now the in-memory store for this information is
hyper::Request<T>
and I'm not sure if that's the right choice here either.Basically I'm still personally very confused about what the desired behavior is and how we would go about implementing it.
lukewagner commented on issue #8878:
Great question. First of all, from asking some HTTP folks, I believe it is the case that we could tighten the spec wording to say that for methods other than CONNECT and OPTIONS, there must always be an
authority
(i.e., the return value issome
). Apparently, CONNECT and OPTIONS have an unfortunate*
option that simply has no authority.Next, my understanding from RFC 9110 is that the
authority
either comes from the:authority
pseudo-header in H/2/3 or theHost
header in H/1, and if both are present, they are not allowed to disagree (and this is Web-compatible). Thus, I think what WASI HTTP should say is that:
Host
is in the definitely-forbidden headers list- The
request.authority
field is derived in a transport-dependent manner (and required to be present for non-CONNECT/OPTIONS)This allows the host implementation to do the transport-appropriate thing for requests coming in or out over the wire.
alexcrichton commented on issue #8878:
Ok so for the use case of
wasmtime serve
specifically:
[method]incoming-request.scheme
is alwayssome(http)
because we don't implement https yet[method]incoming-request.authority
uses the incoming URI's host if it's there (probably only for CONNECT and OPTIONS). Otherwise it usesHost
, otherwise it returns .... None?"127.0.0.1"
? The value of--addr
?This all indicates to me that
new_incoming_request
should take both ascheme
and anauthority
argument rather than inferring these from theRequest
as well?(sorry I'm really looking for guidance/second opinions here, I don't know why things were originally constructed the way they are or if they're just how things got shaken out)
lann commented on issue #8878:
otherwise it returns .... None?
Do we want/need to support HTTP/1.0? afaik
host
is mandatory for 1.1
lann edited a comment on issue #8878:
otherwise it returns .... None?
Do we want/need to support HTTP/1.0? afaik
host
is mandatory for 1.1; we could just 400 if a request has no host/authority.
lann edited a comment on issue #8878:
otherwise it returns .... None?
Do we want/need to support HTTP/1.0? afaik
host
is mandatory for 1.1; we could just 400 if a request has no host/authority.Alternatively, it appears that it is valid for
host
to be empty, so a 1.0 request withouthost
could just imply that.
lann edited a comment on issue #8878:
otherwise it returns .... None?
Do we want/need to support HTTP/1.0? afaik
host
is mandatory for 1.1; we could just 400 if a request has no host/authority.Alternatively, it appears that it is valid for
host
to be empty, so an HTTP/1.0 request withouthost
could just imply that.
alexcrichton commented on issue #8878:
Ah ok I didn't realize that was a 1.0 thing. Sounds like it should search for
Host
as a header in the host-sidehyper::Request
for the authority if it's not present in the URI. I try to make a PR with these changes tomorrow.
lukewagner commented on issue #8878:
The impression that I got talking to an HTTP server maintainer is that it's web-compatible to require the
Host
field (rejecting if it's absent in HTTP 1.0 or 1.1) and that allowing an emptyauthority
in cases other than CONNECT/OPTIONS can transitively lead to security issues (random googling found this e.g.). Similarly, RFC 9110 (which also intends to be Web-compatible) says that there MUST be aHost
header (when there is no:authority
pseudo-header) without making an exception for HTTP 1.0. Thus, I'd suggest making it an error inwasmtime serve
if there is noHost
in HTTP 1.0, at least to start with, and see if anyone complains.
alexcrichton closed issue #8878:
My changes in https://github.com/bytecodealliance/wasmtime/pull/8861 introduced a change in the default behavior of
wasmtime serve
. Notably this program:use wasi::http::types::*; struct T; wasi::http::proxy::export!(T); impl wasi::exports::wasi::http::incoming_handler::Guest for T { fn handle(request: IncomingRequest, outparam: ResponseOutparam) { println!("request.method = {:?}", request.method()); println!("request.scheme = {:?}", request.scheme()); println!("request.authority = {:?}", request.authority()); let resp = OutgoingResponse::new(Fields::new()); ResponseOutparam::set(outparam, Ok(resp)); } }
When run with
wasmtime serve
and hit withcurl http://localhost:8080
it prints:Serving HTTP on http://0.0.0.0:8080/ stdout [0] :: request.method = Method::Get stdout [0] :: request.scheme = Some(Scheme::Http) stdout [0] :: request.authority = Some("localhost:8080")
On
main
, however, it printsServing HTTP on http://0.0.0.0:8080/ stdout [0] :: request.method = Method::Get stdout [0] :: request.scheme = None stdout [0] :: request.authority = None
This regression is due to these changes because I didn't understand what they were doing.
Now why wasn't this caught by the test suite? I tried writing a test for this and it passed, but apparently it's due to our usage of
hyper::Request::builder().uri("http://localhost/")
in the test suite. That creates an HTTP requests that looks like:GET http://localhost/ HTTP/1.1 ...
where using
curl
on the command line generates:GET / HTTP/1.1 ...
That leads me to this issue. What should
scheme
andauthority
report in these two cases forwasmtime serve
by default? The previous behavior means thatGET /
could not be distinguished fromGET http://localhost/
which naively seems like whatscheme
andauthority
are trying to map to.Is the previous behavior of
wasmtime serve
buggy? Is the current behavior buggy? Should the spec be clarified?cc @elliottt @pchickey
Last updated: Nov 22 2024 at 16:03 UTC