1 # -*- encoding: binary -*-
3 # Writes a Rack response to your client using the HTTP/1.1 specification.
4 # You use it by simply doing:
6 # status, headers, body = rack_app.call(env)
7 # http_response_write(socket, status, headers, body)
9 # Most header correctness (including Content-Length and Content-Type)
10 # is the job of Rack, with the exception of the "Date" and "Status" header.
11 module Unicorn::HttpResponse
13 # Every standard HTTP code mapped to the appropriate message.
14 CODES = Rack::Utils::HTTP_STATUS_CODES.inject({}) { |hash,(code,msg)|
15 hash[code] = "#{code} #{msg}"
20 def err_response(code, response_start_sent)
21 "#{response_start_sent ? '' : 'HTTP/1.1 '}#{CODES[code]}\r\n\r\n"
24 # writes the rack_response to socket as an HTTP response
25 def http_response_write(socket, status, headers, body,
26 response_start_sent=false)
27 status = CODES[status.to_i] || status
30 http_response_start = response_start_sent ? '' : 'HTTP/1.1 '
32 buf = "#{http_response_start}#{status}\r\n" \
33 "Date: #{httpdate}\r\n" \
34 "Status: #{status}\r\n" \
35 "Connection: close\r\n"
36 headers.each do |key, value|
38 when %r{\A(?:Date\z|Connection\z)}i
41 # this was an illegal key in Rack < 1.5, so it should be
42 # OK to silently discard it for those older versions
43 hijack = hijack_prepare(value)
46 # avoiding blank, key-only cookies with /\n+/
47 buf << value.split(/\n+/).map! { |v| "#{key}: #{v}\r\n" }.join
49 buf << "#{key}: #{value}\r\n"
53 socket.write(buf << CRLF)
57 body = nil # ensure we do not close body
60 body.each { |chunk| socket.write(chunk) }
63 body.respond_to?(:close) and body.close
66 # Rack 1.5.0 (protocol version 1.2) adds response hijacking support
67 if ((Rack::VERSION[0] << 8) | Rack::VERSION[1]) >= 0x0102
68 def hijack_prepare(value)