2020-01-18 08:38:21 +00:00
|
|
|
/*
|
2020-04-20 21:25:25 +00:00
|
|
|
* Copyright (c) 2020, The SerenityOS developers.
|
2020-01-18 08:38:21 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice, this
|
|
|
|
* list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
|
|
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
#include <LibCore/EventLoop.h>
|
2020-02-06 14:04:03 +00:00
|
|
|
#include <LibCore/Gzip.h>
|
2020-04-20 21:25:25 +00:00
|
|
|
#include <LibHTTP/HttpResponse.h>
|
|
|
|
#include <LibHTTP/HttpsJob.h>
|
|
|
|
#include <LibTLS/TLSv12.h>
|
2019-04-07 12:36:10 +00:00
|
|
|
#include <stdio.h>
|
2019-04-07 17:35:07 +00:00
|
|
|
#include <unistd.h>
|
2019-04-07 12:36:10 +00:00
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
//#define HTTPJOB_DEBUG
|
2019-10-15 17:14:11 +00:00
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
namespace HTTP {
|
2020-02-02 11:34:39 +00:00
|
|
|
|
2019-11-09 17:33:37 +00:00
|
|
|
static ByteBuffer handle_content_encoding(const ByteBuffer& buf, const String& content_encoding)
|
|
|
|
{
|
2019-12-14 10:30:18 +00:00
|
|
|
#ifdef CHTTPJOB_DEBUG
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "HttpsJob::handle_content_encoding: buf has content_encoding = " << content_encoding;
|
2019-12-14 10:30:18 +00:00
|
|
|
#endif
|
2019-11-09 17:33:37 +00:00
|
|
|
|
|
|
|
if (content_encoding == "gzip") {
|
2020-04-20 21:25:25 +00:00
|
|
|
if (!Core::Gzip::is_compressed(buf)) {
|
|
|
|
dbg() << "HttpsJob::handle_content_encoding: buf is not gzip compressed!";
|
2019-11-09 17:33:37 +00:00
|
|
|
}
|
|
|
|
|
2019-12-14 10:30:18 +00:00
|
|
|
#ifdef CHTTPJOB_DEBUG
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "HttpsJob::handle_content_encoding: buf is gzip compressed!";
|
2019-12-14 10:30:18 +00:00
|
|
|
#endif
|
2019-11-09 17:33:37 +00:00
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
auto uncompressed = Core::Gzip::decompress(buf);
|
2019-11-09 17:33:37 +00:00
|
|
|
if (!uncompressed.has_value()) {
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "HttpsJob::handle_content_encoding: Gzip::decompress() failed. Returning original buffer.";
|
2019-11-09 17:33:37 +00:00
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2019-12-14 10:30:18 +00:00
|
|
|
#ifdef CHTTPJOB_DEBUG
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "HttpsJob::handle_content_encoding: Gzip::decompress() successful.\n"
|
2019-11-09 17:33:37 +00:00
|
|
|
<< " Input size = " << buf.size() << "\n"
|
|
|
|
<< " Output size = " << uncompressed.value().size();
|
2019-12-14 10:30:18 +00:00
|
|
|
#endif
|
2019-11-09 17:33:37 +00:00
|
|
|
|
|
|
|
return uncompressed.value();
|
|
|
|
}
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
HttpsJob::HttpsJob(const HttpRequest& request)
|
2019-04-07 12:36:10 +00:00
|
|
|
: m_request(request)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
HttpsJob::~HttpsJob()
|
2019-04-07 12:36:10 +00:00
|
|
|
{
|
2020-04-20 21:25:25 +00:00
|
|
|
m_socket = nullptr;
|
2019-04-07 12:36:10 +00:00
|
|
|
}
|
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
void HttpsJob::on_socket_connected()
|
2019-04-07 12:36:10 +00:00
|
|
|
{
|
2020-04-20 21:25:25 +00:00
|
|
|
|
|
|
|
m_socket->on_tls_ready_to_write = [&](TLS::TLSv12& tls) {
|
|
|
|
if (m_sent_data)
|
|
|
|
return;
|
|
|
|
m_sent_data = true;
|
|
|
|
auto raw_request = m_request.to_raw_request();
|
2019-04-08 02:53:45 +00:00
|
|
|
#if 0
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "HttpsJob: raw_request:";
|
|
|
|
dbg() << String::copy(raw_request).characters();
|
2019-04-08 02:53:45 +00:00
|
|
|
#endif
|
2020-04-20 21:25:25 +00:00
|
|
|
bool success = tls.write(raw_request);
|
|
|
|
if (!success)
|
|
|
|
deferred_invoke([this](auto&) { did_fail(Core::NetworkJob::Error::TransmissionFailed); });
|
|
|
|
};
|
2019-04-07 12:36:10 +00:00
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
m_socket->on_tls_ready_to_read = [&](TLS::TLSv12& tls) {
|
|
|
|
dbg() << " ON TLS READY TO READ: " << (u16)m_state;
|
2019-09-21 15:32:26 +00:00
|
|
|
if (is_cancelled())
|
|
|
|
return;
|
2019-04-07 17:35:07 +00:00
|
|
|
if (m_state == State::InStatus) {
|
2020-04-20 21:25:25 +00:00
|
|
|
if (!tls.can_read_line()) {
|
|
|
|
dbg() << " cannot read line";
|
2019-08-04 16:55:52 +00:00
|
|
|
return;
|
2020-04-20 21:25:25 +00:00
|
|
|
}
|
|
|
|
auto line = tls.read_line(PAGE_SIZE);
|
2019-04-07 17:35:07 +00:00
|
|
|
if (line.is_null()) {
|
2020-04-20 21:25:25 +00:00
|
|
|
fprintf(stderr, "HttpsJob: Expected HTTP status\n");
|
|
|
|
return deferred_invoke([this](auto&) { did_fail(Core::NetworkJob::Error::TransmissionFailed); });
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
2019-04-20 12:13:40 +00:00
|
|
|
auto parts = String::copy(line, Chomp).split(' ');
|
2019-04-07 17:35:07 +00:00
|
|
|
if (parts.size() < 3) {
|
2020-04-20 21:25:25 +00:00
|
|
|
fprintf(stderr, "HttpsJob: Expected 3-part HTTP status, got '%s'\n", line.data());
|
|
|
|
return deferred_invoke([this](auto&) { did_fail(Core::NetworkJob::Error::ProtocolFailed); });
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
|
|
|
bool ok;
|
|
|
|
m_code = parts[1].to_uint(ok);
|
|
|
|
if (!ok) {
|
2020-04-20 21:25:25 +00:00
|
|
|
fprintf(stderr, "HttpsJob: Expected numeric HTTP status\n");
|
|
|
|
return deferred_invoke([this](auto&) { did_fail(Core::NetworkJob::Error::ProtocolFailed); });
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
|
|
|
m_state = State::InHeaders;
|
2019-08-04 16:55:52 +00:00
|
|
|
return;
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
|
|
|
if (m_state == State::InHeaders) {
|
2020-04-20 21:25:25 +00:00
|
|
|
if (!tls.can_read_line())
|
2019-08-04 16:55:52 +00:00
|
|
|
return;
|
2020-04-20 21:25:25 +00:00
|
|
|
auto line = tls.read_line(PAGE_SIZE);
|
2019-04-07 17:35:07 +00:00
|
|
|
if (line.is_null()) {
|
2020-04-20 21:25:25 +00:00
|
|
|
fprintf(stderr, "HttpsJob: Expected HTTP header\n");
|
|
|
|
return did_fail(Core::NetworkJob::Error::ProtocolFailed);
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
2019-04-20 12:13:40 +00:00
|
|
|
auto chomped_line = String::copy(line, Chomp);
|
2019-04-07 17:35:07 +00:00
|
|
|
if (chomped_line.is_empty()) {
|
|
|
|
m_state = State::InBody;
|
2019-08-04 16:55:52 +00:00
|
|
|
return;
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
|
|
|
auto parts = chomped_line.split(':');
|
|
|
|
if (parts.is_empty()) {
|
2020-04-20 21:25:25 +00:00
|
|
|
fprintf(stderr, "HttpsJob: Expected HTTP header with key/value\n");
|
|
|
|
return deferred_invoke([this](auto&) { did_fail(Core::NetworkJob::Error::ProtocolFailed); });
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
|
|
|
auto name = parts[0];
|
|
|
|
if (chomped_line.length() < name.length() + 2) {
|
2020-04-20 21:25:25 +00:00
|
|
|
fprintf(stderr, "HttpsJob: Malformed HTTP header: '%s' (%zu)\n", chomped_line.characters(), chomped_line.length());
|
|
|
|
return deferred_invoke([this](auto&) { did_fail(Core::NetworkJob::Error::ProtocolFailed); });
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
2019-04-07 20:47:34 +00:00
|
|
|
auto value = chomped_line.substring(name.length() + 2, chomped_line.length() - name.length() - 2);
|
2019-04-07 17:35:07 +00:00
|
|
|
m_headers.set(name, value);
|
2019-10-15 17:14:11 +00:00
|
|
|
#ifdef CHTTPJOB_DEBUG
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "HttpsJob: [" << name << "] = '" << value << "'";
|
2019-10-15 17:14:11 +00:00
|
|
|
#endif
|
2019-08-04 16:55:52 +00:00
|
|
|
return;
|
2019-04-07 17:35:07 +00:00
|
|
|
}
|
|
|
|
ASSERT(m_state == State::InBody);
|
2020-04-20 21:25:25 +00:00
|
|
|
ASSERT(tls.can_read());
|
|
|
|
auto payload = tls.read(64 * KB);
|
2019-04-07 12:36:10 +00:00
|
|
|
if (!payload) {
|
2020-04-20 21:25:25 +00:00
|
|
|
if (tls.eof())
|
2019-08-04 16:55:52 +00:00
|
|
|
return finish_up();
|
2020-04-20 21:25:25 +00:00
|
|
|
return deferred_invoke([this](auto&) { did_fail(Core::NetworkJob::Error::ProtocolFailed); });
|
2019-04-07 12:36:10 +00:00
|
|
|
}
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "Read payload, " << payload.size() << " bytes";
|
2019-08-04 16:55:52 +00:00
|
|
|
m_received_buffers.append(payload);
|
|
|
|
m_received_size += payload.size();
|
2019-06-22 21:10:05 +00:00
|
|
|
|
2019-08-04 07:25:14 +00:00
|
|
|
auto content_length_header = m_headers.get("Content-Length");
|
|
|
|
if (content_length_header.has_value()) {
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "content length is " << content_length_header.value() << ", we have " << m_received_size;
|
2019-08-04 07:25:14 +00:00
|
|
|
bool ok;
|
2019-08-04 16:55:52 +00:00
|
|
|
if (m_received_size >= content_length_header.value().to_uint(ok) && ok)
|
2020-04-20 21:25:25 +00:00
|
|
|
finish_up();
|
|
|
|
} else {
|
|
|
|
// no content-length, assume closed connection
|
|
|
|
finish_up();
|
2019-06-22 21:10:05 +00:00
|
|
|
}
|
2019-08-04 16:55:52 +00:00
|
|
|
};
|
|
|
|
}
|
2019-04-07 12:36:10 +00:00
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
void HttpsJob::finish_up()
|
2019-08-04 16:55:52 +00:00
|
|
|
{
|
|
|
|
m_state = State::Finished;
|
|
|
|
auto flattened_buffer = ByteBuffer::create_uninitialized(m_received_size);
|
2019-08-04 12:54:25 +00:00
|
|
|
u8* flat_ptr = flattened_buffer.data();
|
2019-08-04 16:55:52 +00:00
|
|
|
for (auto& received_buffer : m_received_buffers) {
|
2019-08-04 12:54:25 +00:00
|
|
|
memcpy(flat_ptr, received_buffer.data(), received_buffer.size());
|
|
|
|
flat_ptr += received_buffer.size();
|
|
|
|
}
|
2019-08-04 16:55:52 +00:00
|
|
|
m_received_buffers.clear();
|
2019-08-04 12:54:25 +00:00
|
|
|
|
2019-11-09 17:33:37 +00:00
|
|
|
auto content_encoding = m_headers.get("Content-Encoding");
|
|
|
|
if (content_encoding.has_value()) {
|
|
|
|
flattened_buffer = handle_content_encoding(flattened_buffer, content_encoding.value());
|
|
|
|
}
|
|
|
|
|
2020-02-02 11:34:39 +00:00
|
|
|
auto response = HttpResponse::create(m_code, move(m_headers), move(flattened_buffer));
|
2019-05-28 09:53:16 +00:00
|
|
|
deferred_invoke([this, response](auto&) {
|
2019-04-07 12:36:10 +00:00
|
|
|
did_finish(move(response));
|
|
|
|
});
|
|
|
|
}
|
2019-04-08 02:53:45 +00:00
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
void HttpsJob::start()
|
2019-04-08 02:53:45 +00:00
|
|
|
{
|
|
|
|
ASSERT(!m_socket);
|
2020-04-20 21:25:25 +00:00
|
|
|
m_socket = TLS::TLSv12::construct(this);
|
|
|
|
m_socket->on_tls_connected = [this] {
|
2019-10-15 17:14:11 +00:00
|
|
|
#ifdef CHTTPJOB_DEBUG
|
2020-04-20 21:25:25 +00:00
|
|
|
dbg() << "HttpsJob: on_connected callback";
|
2019-10-15 17:14:11 +00:00
|
|
|
#endif
|
2019-04-08 02:53:45 +00:00
|
|
|
on_socket_connected();
|
|
|
|
};
|
2020-04-20 21:25:25 +00:00
|
|
|
m_socket->on_tls_error = [&](auto) {
|
|
|
|
finish_up();
|
|
|
|
};
|
|
|
|
m_socket->on_tls_finished = [&] {
|
|
|
|
finish_up();
|
|
|
|
};
|
|
|
|
bool success = ((TLS::TLSv12&)*m_socket).connect(m_request.url().host(), m_request.url().port());
|
2019-10-08 17:32:34 +00:00
|
|
|
if (!success) {
|
|
|
|
deferred_invoke([this](auto&) {
|
2020-04-20 21:25:25 +00:00
|
|
|
return did_fail(Core::NetworkJob::Error::ConnectionFailed);
|
2019-10-08 17:32:34 +00:00
|
|
|
});
|
|
|
|
}
|
2019-04-08 02:53:45 +00:00
|
|
|
}
|
2019-09-21 15:32:26 +00:00
|
|
|
|
2020-04-20 21:25:25 +00:00
|
|
|
void HttpsJob::shutdown()
|
2019-09-21 15:32:26 +00:00
|
|
|
{
|
|
|
|
if (!m_socket)
|
|
|
|
return;
|
2020-04-20 21:25:25 +00:00
|
|
|
m_socket->on_tls_ready_to_read = nullptr;
|
|
|
|
m_socket->on_tls_connected = nullptr;
|
2019-09-21 16:05:34 +00:00
|
|
|
remove_child(*m_socket);
|
2019-09-21 15:32:26 +00:00
|
|
|
m_socket = nullptr;
|
|
|
|
}
|
2020-02-02 11:34:39 +00:00
|
|
|
}
|