HttpsJob.cpp 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. /*
  2. * Copyright (c) 2020, the SerenityOS developers.
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Debug.h>
  7. #include <LibCore/EventLoop.h>
  8. #include <LibHTTP/HttpResponse.h>
  9. #include <LibHTTP/HttpsJob.h>
  10. #include <LibTLS/TLSv12.h>
  11. #include <stdio.h>
  12. #include <unistd.h>
  13. namespace HTTP {
  14. void HttpsJob::start()
  15. {
  16. VERIFY(!m_socket);
  17. m_socket = TLS::TLSv12::construct(this);
  18. m_socket->set_root_certificates(m_override_ca_certificates ? *m_override_ca_certificates : DefaultRootCACertificates::the().certificates());
  19. m_socket->on_tls_connected = [this] {
  20. dbgln_if(HTTPSJOB_DEBUG, "HttpsJob: on_connected callback");
  21. on_socket_connected();
  22. };
  23. m_socket->on_tls_error = [&](TLS::AlertDescription error) {
  24. if (error == TLS::AlertDescription::HandshakeFailure) {
  25. deferred_invoke([this] {
  26. return did_fail(Core::NetworkJob::Error::ProtocolFailed);
  27. });
  28. } else if (error == TLS::AlertDescription::DecryptError) {
  29. deferred_invoke([this] {
  30. return did_fail(Core::NetworkJob::Error::ConnectionFailed);
  31. });
  32. } else {
  33. deferred_invoke([this] {
  34. return did_fail(Core::NetworkJob::Error::TransmissionFailed);
  35. });
  36. }
  37. };
  38. m_socket->on_tls_finished = [this] {
  39. if (!m_has_scheduled_finish)
  40. finish_up();
  41. };
  42. m_socket->on_tls_certificate_request = [this](auto&) {
  43. if (on_certificate_requested)
  44. on_certificate_requested(*this);
  45. };
  46. bool success = ((TLS::TLSv12&)*m_socket).connect(m_request.url().host(), m_request.url().port());
  47. if (!success) {
  48. deferred_invoke([this] {
  49. return did_fail(Core::NetworkJob::Error::ConnectionFailed);
  50. });
  51. }
  52. }
  53. void HttpsJob::shutdown()
  54. {
  55. if (!m_socket)
  56. return;
  57. m_socket->on_tls_ready_to_read = nullptr;
  58. m_socket->on_tls_connected = nullptr;
  59. remove_child(*m_socket);
  60. m_socket = nullptr;
  61. }
  62. void HttpsJob::set_certificate(String certificate, String private_key)
  63. {
  64. if (!m_socket->add_client_key(certificate.bytes(), private_key.bytes())) {
  65. dbgln("LibHTTP: Failed to set a client certificate");
  66. // FIXME: Do something about this failure
  67. VERIFY_NOT_REACHED();
  68. }
  69. }
  70. void HttpsJob::read_while_data_available(Function<IterationDecision()> read)
  71. {
  72. while (m_socket->can_read()) {
  73. if (read() == IterationDecision::Break)
  74. break;
  75. }
  76. }
  77. void HttpsJob::register_on_ready_to_read(Function<void()> callback)
  78. {
  79. m_socket->on_tls_ready_to_read = [callback = move(callback)](auto&) {
  80. callback();
  81. };
  82. }
  83. void HttpsJob::register_on_ready_to_write(Function<void()> callback)
  84. {
  85. m_socket->on_tls_ready_to_write = [callback = move(callback)](auto&) {
  86. callback();
  87. };
  88. }
  89. bool HttpsJob::can_read_line() const
  90. {
  91. return m_socket->can_read_line();
  92. }
  93. String HttpsJob::read_line(size_t size)
  94. {
  95. return m_socket->read_line(size);
  96. }
  97. ByteBuffer HttpsJob::receive(size_t size)
  98. {
  99. return m_socket->read(size);
  100. }
  101. bool HttpsJob::can_read() const
  102. {
  103. return m_socket->can_read();
  104. }
  105. bool HttpsJob::eof() const
  106. {
  107. return m_socket->eof();
  108. }
  109. bool HttpsJob::write(ReadonlyBytes data)
  110. {
  111. return m_socket->write(data);
  112. }
  113. }