mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-04-25 05:55:13 +00:00
This error is set by curl when, e.g., a gzipped response body has an invalid gzip encoding.
807 lines
32 KiB
C++
807 lines
32 KiB
C++
/*
|
|
* Copyright (c) 2018-2024, Andreas Kling <andreas@ladybird.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include "WebSocketImplCurl.h"
|
|
|
|
#include <AK/Badge.h>
|
|
#include <AK/IDAllocator.h>
|
|
#include <AK/NonnullOwnPtr.h>
|
|
#include <LibCore/ElapsedTimer.h>
|
|
#include <LibCore/EventLoop.h>
|
|
#include <LibCore/Proxy.h>
|
|
#include <LibCore/Socket.h>
|
|
#include <LibRequests/NetworkError.h>
|
|
#include <LibRequests/RequestTimingInfo.h>
|
|
#include <LibRequests/WebSocket.h>
|
|
#include <LibTLS/TLSv12.h>
|
|
#include <LibTextCodec/Decoder.h>
|
|
#include <LibWebSocket/ConnectionInfo.h>
|
|
#include <LibWebSocket/Message.h>
|
|
#include <RequestServer/ConnectionFromClient.h>
|
|
#include <RequestServer/RequestClientEndpoint.h>
|
|
#ifdef AK_OS_WINDOWS
|
|
// needed because curl.h includes winsock2.h
|
|
# include <AK/Windows.h>
|
|
#endif
|
|
#include <curl/curl.h>
|
|
|
|
namespace RequestServer {
|
|
|
|
ByteString g_default_certificate_path;
|
|
static HashMap<int, RefPtr<ConnectionFromClient>> s_connections;
|
|
static IDAllocator s_client_ids;
|
|
static long s_connect_timeout_seconds = 90L;
|
|
static struct {
|
|
Optional<Core::SocketAddress> server_address;
|
|
Optional<ByteString> server_hostname;
|
|
u16 port;
|
|
bool use_dns_over_tls = true;
|
|
} g_dns_info;
|
|
|
|
static WeakPtr<Resolver> s_resolver {};
|
|
static NonnullRefPtr<Resolver> default_resolver()
|
|
{
|
|
if (auto resolver = s_resolver.strong_ref())
|
|
return *resolver;
|
|
auto resolver = make_ref_counted<Resolver>([] -> ErrorOr<DNS::Resolver::SocketResult> {
|
|
if (!g_dns_info.server_address.has_value()) {
|
|
if (!g_dns_info.server_hostname.has_value())
|
|
return Error::from_string_literal("No DNS server configured");
|
|
|
|
auto resolved = TRY(default_resolver()->dns.lookup(*g_dns_info.server_hostname)->await());
|
|
if (resolved->cached_addresses().is_empty())
|
|
return Error::from_string_literal("Failed to resolve DNS server hostname");
|
|
auto address = resolved->cached_addresses().first().visit([](auto& addr) -> Core::SocketAddress { return { addr, g_dns_info.port }; });
|
|
g_dns_info.server_address = address;
|
|
}
|
|
|
|
if (g_dns_info.use_dns_over_tls) {
|
|
TLS::Options options;
|
|
options.set_blocking(false);
|
|
|
|
if (!g_default_certificate_path.is_empty())
|
|
options.set_root_certificates_path(g_default_certificate_path);
|
|
|
|
return DNS::Resolver::SocketResult {
|
|
MaybeOwned<Core::Socket>(TRY(TLS::TLSv12::connect(*g_dns_info.server_address, *g_dns_info.server_hostname, move(options)))),
|
|
DNS::Resolver::ConnectionMode::TCP,
|
|
};
|
|
}
|
|
|
|
return DNS::Resolver::SocketResult {
|
|
MaybeOwned<Core::Socket>(TRY(Core::BufferedUDPSocket::create(TRY(Core::UDPSocket::connect(*g_dns_info.server_address))))),
|
|
DNS::Resolver::ConnectionMode::UDP,
|
|
};
|
|
});
|
|
|
|
s_resolver = resolver;
|
|
return resolver;
|
|
}
|
|
|
|
ByteString build_curl_resolve_list(DNS::LookupResult const& dns_result, StringView host, u16 port)
|
|
{
|
|
StringBuilder resolve_opt_builder;
|
|
resolve_opt_builder.appendff("{}:{}:", host, port);
|
|
auto first = true;
|
|
for (auto& addr : dns_result.cached_addresses()) {
|
|
auto formatted_address = addr.visit(
|
|
[&](IPv4Address const& ipv4) { return ipv4.to_byte_string(); },
|
|
[&](IPv6Address const& ipv6) { return MUST(ipv6.to_string()).to_byte_string(); });
|
|
if (!first)
|
|
resolve_opt_builder.append(',');
|
|
first = false;
|
|
resolve_opt_builder.append(formatted_address);
|
|
}
|
|
|
|
return resolve_opt_builder.to_byte_string();
|
|
}
|
|
|
|
struct ConnectionFromClient::ActiveRequest {
|
|
CURLM* multi { nullptr };
|
|
CURL* easy { nullptr };
|
|
Vector<curl_slist*> curl_string_lists;
|
|
i32 request_id { 0 };
|
|
RefPtr<Core::Notifier> notifier;
|
|
WeakPtr<ConnectionFromClient> client;
|
|
int writer_fd { 0 };
|
|
HTTP::HeaderMap headers;
|
|
bool got_all_headers { false };
|
|
bool is_connect_only { false };
|
|
size_t downloaded_so_far { 0 };
|
|
String url;
|
|
Optional<String> reason_phrase;
|
|
ByteBuffer body;
|
|
|
|
ActiveRequest(ConnectionFromClient& client, CURLM* multi, CURL* easy, i32 request_id, int writer_fd)
|
|
: multi(multi)
|
|
, easy(easy)
|
|
, request_id(request_id)
|
|
, client(client)
|
|
, writer_fd(writer_fd)
|
|
{
|
|
}
|
|
|
|
~ActiveRequest()
|
|
{
|
|
if (writer_fd > 0)
|
|
MUST(Core::System::close(writer_fd));
|
|
|
|
auto result = curl_multi_remove_handle(multi, easy);
|
|
VERIFY(result == CURLM_OK);
|
|
curl_easy_cleanup(easy);
|
|
|
|
for (auto* string_list : curl_string_lists)
|
|
curl_slist_free_all(string_list);
|
|
}
|
|
|
|
void flush_headers_if_needed()
|
|
{
|
|
if (got_all_headers)
|
|
return;
|
|
got_all_headers = true;
|
|
long http_status_code = 0;
|
|
auto result = curl_easy_getinfo(easy, CURLINFO_RESPONSE_CODE, &http_status_code);
|
|
VERIFY(result == CURLE_OK);
|
|
client->async_headers_became_available(request_id, headers, http_status_code, reason_phrase);
|
|
}
|
|
};
|
|
|
|
size_t ConnectionFromClient::on_header_received(void* buffer, size_t size, size_t nmemb, void* user_data)
|
|
{
|
|
auto* request = static_cast<ActiveRequest*>(user_data);
|
|
size_t total_size = size * nmemb;
|
|
auto header_line = StringView { static_cast<char const*>(buffer), total_size };
|
|
|
|
// NOTE: We need to extract the HTTP reason phrase since it can be a custom value.
|
|
// Fetching infrastructure needs this value for setting the status message.
|
|
if (!request->reason_phrase.has_value() && header_line.starts_with("HTTP/"sv)) {
|
|
if (auto const space_positions = header_line.find_all(" "sv); space_positions.size() > 1) {
|
|
auto const second_space_offset = space_positions.at(1);
|
|
auto const reason_phrase_string_view = header_line.substring_view(second_space_offset + 1).trim_whitespace();
|
|
|
|
if (!reason_phrase_string_view.is_empty()) {
|
|
auto decoder = TextCodec::decoder_for_exact_name("ISO-8859-1"sv);
|
|
VERIFY(decoder.has_value());
|
|
|
|
request->reason_phrase = MUST(decoder->to_utf8(reason_phrase_string_view));
|
|
return total_size;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (auto colon_index = header_line.find(':'); colon_index.has_value()) {
|
|
auto name = header_line.substring_view(0, colon_index.value()).trim_whitespace();
|
|
auto value = header_line.substring_view(colon_index.value() + 1, header_line.length() - colon_index.value() - 1).trim_whitespace();
|
|
request->headers.set(name, value);
|
|
}
|
|
|
|
return total_size;
|
|
}
|
|
|
|
size_t ConnectionFromClient::on_data_received(void* buffer, size_t size, size_t nmemb, void* user_data)
|
|
{
|
|
auto* request = static_cast<ActiveRequest*>(user_data);
|
|
request->flush_headers_if_needed();
|
|
|
|
size_t total_size = size * nmemb;
|
|
|
|
size_t remaining_length = total_size;
|
|
u8 const* remaining_data = static_cast<u8 const*>(buffer);
|
|
while (remaining_length > 0) {
|
|
auto result = Core::System::write(request->writer_fd, { remaining_data, remaining_length });
|
|
if (result.is_error()) {
|
|
if (result.error().code() != EAGAIN) {
|
|
dbgln("on_data_received: write failed: {}", result.error());
|
|
VERIFY_NOT_REACHED();
|
|
}
|
|
sched_yield();
|
|
continue;
|
|
}
|
|
auto nwritten = result.value();
|
|
if (nwritten == 0) {
|
|
dbgln("on_data_received: write returned 0");
|
|
VERIFY_NOT_REACHED();
|
|
}
|
|
remaining_data += nwritten;
|
|
remaining_length -= nwritten;
|
|
}
|
|
|
|
request->downloaded_so_far += total_size;
|
|
|
|
return total_size;
|
|
}
|
|
|
|
int ConnectionFromClient::on_socket_callback(CURL*, int sockfd, int what, void* user_data, void*)
|
|
{
|
|
auto* client = static_cast<ConnectionFromClient*>(user_data);
|
|
|
|
if (what == CURL_POLL_REMOVE) {
|
|
client->m_read_notifiers.remove(sockfd);
|
|
client->m_write_notifiers.remove(sockfd);
|
|
return 0;
|
|
}
|
|
|
|
if (what & CURL_POLL_IN) {
|
|
client->m_read_notifiers.ensure(sockfd, [client, sockfd, multi = client->m_curl_multi] {
|
|
auto notifier = Core::Notifier::construct(sockfd, Core::NotificationType::Read);
|
|
notifier->on_activation = [client, sockfd, multi] {
|
|
int still_running = 0;
|
|
auto result = curl_multi_socket_action(multi, sockfd, CURL_CSELECT_IN, &still_running);
|
|
VERIFY(result == CURLM_OK);
|
|
client->check_active_requests();
|
|
};
|
|
notifier->set_enabled(true);
|
|
return notifier;
|
|
});
|
|
}
|
|
|
|
if (what & CURL_POLL_OUT) {
|
|
client->m_write_notifiers.ensure(sockfd, [client, sockfd, multi = client->m_curl_multi] {
|
|
auto notifier = Core::Notifier::construct(sockfd, Core::NotificationType::Write);
|
|
notifier->on_activation = [client, sockfd, multi] {
|
|
int still_running = 0;
|
|
auto result = curl_multi_socket_action(multi, sockfd, CURL_CSELECT_OUT, &still_running);
|
|
VERIFY(result == CURLM_OK);
|
|
client->check_active_requests();
|
|
};
|
|
notifier->set_enabled(true);
|
|
return notifier;
|
|
});
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int ConnectionFromClient::on_timeout_callback(void*, long timeout_ms, void* user_data)
|
|
{
|
|
auto* client = static_cast<ConnectionFromClient*>(user_data);
|
|
if (!client->m_timer)
|
|
return 0;
|
|
if (timeout_ms < 0) {
|
|
client->m_timer->stop();
|
|
} else {
|
|
client->m_timer->restart(timeout_ms);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
ConnectionFromClient::ConnectionFromClient(NonnullOwnPtr<IPC::Transport> transport)
|
|
: IPC::ConnectionFromClient<RequestClientEndpoint, RequestServerEndpoint>(*this, move(transport), s_client_ids.allocate())
|
|
, m_resolver(default_resolver())
|
|
{
|
|
s_connections.set(client_id(), *this);
|
|
|
|
m_curl_multi = curl_multi_init();
|
|
|
|
auto set_option = [this](auto option, auto value) {
|
|
auto result = curl_multi_setopt(m_curl_multi, option, value);
|
|
VERIFY(result == CURLM_OK);
|
|
};
|
|
set_option(CURLMOPT_SOCKETFUNCTION, &on_socket_callback);
|
|
set_option(CURLMOPT_SOCKETDATA, this);
|
|
set_option(CURLMOPT_TIMERFUNCTION, &on_timeout_callback);
|
|
set_option(CURLMOPT_TIMERDATA, this);
|
|
|
|
m_timer = Core::Timer::create_single_shot(0, [this] {
|
|
int still_running = 0;
|
|
auto result = curl_multi_socket_action(m_curl_multi, CURL_SOCKET_TIMEOUT, 0, &still_running);
|
|
VERIFY(result == CURLM_OK);
|
|
check_active_requests();
|
|
});
|
|
}
|
|
|
|
ConnectionFromClient::~ConnectionFromClient()
|
|
{
|
|
m_active_requests.clear();
|
|
|
|
curl_multi_cleanup(m_curl_multi);
|
|
m_curl_multi = nullptr;
|
|
}
|
|
|
|
void ConnectionFromClient::die()
|
|
{
|
|
auto client_id = this->client_id();
|
|
s_connections.remove(client_id);
|
|
s_client_ids.deallocate(client_id);
|
|
|
|
if (s_connections.is_empty())
|
|
Core::EventLoop::current().quit(0);
|
|
}
|
|
|
|
Messages::RequestServer::InitTransportResponse ConnectionFromClient::init_transport([[maybe_unused]] int peer_pid)
|
|
{
|
|
#ifdef AK_OS_WINDOWS
|
|
m_transport.set_peer_pid(peer_pid);
|
|
return Core::System::getpid();
|
|
#endif
|
|
VERIFY_NOT_REACHED();
|
|
}
|
|
|
|
Messages::RequestServer::ConnectNewClientResponse ConnectionFromClient::connect_new_client()
|
|
{
|
|
// TODO: Mach IPC
|
|
|
|
int socket_fds[2] {};
|
|
if (auto err = Core::System::socketpair(AF_LOCAL, SOCK_STREAM, 0, socket_fds); err.is_error()) {
|
|
dbgln("Failed to create client socketpair: {}", err.error());
|
|
return IPC::File {};
|
|
}
|
|
|
|
auto client_socket_or_error = Core::LocalSocket::adopt_fd(socket_fds[0]);
|
|
if (client_socket_or_error.is_error()) {
|
|
close(socket_fds[0]);
|
|
close(socket_fds[1]);
|
|
dbgln("Failed to adopt client socket: {}", client_socket_or_error.error());
|
|
return IPC::File {};
|
|
}
|
|
auto client_socket = client_socket_or_error.release_value();
|
|
// Note: A ref is stored in the static s_connections map
|
|
auto client = adopt_ref(*new ConnectionFromClient(make<IPC::Transport>(move(client_socket))));
|
|
|
|
return IPC::File::adopt_fd(socket_fds[1]);
|
|
}
|
|
|
|
Messages::RequestServer::IsSupportedProtocolResponse ConnectionFromClient::is_supported_protocol(ByteString protocol)
|
|
{
|
|
return protocol == "http"sv || protocol == "https"sv;
|
|
}
|
|
|
|
void ConnectionFromClient::set_dns_server(ByteString host_or_address, u16 port, bool use_tls)
|
|
{
|
|
if (host_or_address == g_dns_info.server_hostname && port == g_dns_info.port && use_tls == g_dns_info.use_dns_over_tls)
|
|
return;
|
|
|
|
auto result = [&] -> ErrorOr<void> {
|
|
Core::SocketAddress addr;
|
|
if (auto v4 = IPv4Address::from_string(host_or_address); v4.has_value())
|
|
addr = { v4.value(), port };
|
|
else if (auto v6 = IPv6Address::from_string(host_or_address); v6.has_value())
|
|
addr = { v6.value(), port };
|
|
else
|
|
TRY(default_resolver()->dns.lookup(host_or_address)->await())->cached_addresses().first().visit([&](auto& address) { addr = { address, port }; });
|
|
|
|
g_dns_info.server_address = addr;
|
|
g_dns_info.server_hostname = host_or_address;
|
|
g_dns_info.port = port;
|
|
g_dns_info.use_dns_over_tls = use_tls;
|
|
return {};
|
|
}();
|
|
|
|
if (result.is_error())
|
|
dbgln("Failed to set DNS server: {}", result.error());
|
|
else
|
|
default_resolver()->dns.reset_connection();
|
|
}
|
|
|
|
#ifdef AK_OS_WINDOWS
|
|
void ConnectionFromClient::start_request(i32, ByteString, URL::URL, HTTP::HeaderMap, ByteBuffer, Core::ProxyData)
|
|
{
|
|
VERIFY(0 && "RequestServer::ConnectionFromClient::start_request is not implemented");
|
|
}
|
|
#else
|
|
void ConnectionFromClient::start_request(i32 request_id, ByteString method, URL::URL url, HTTP::HeaderMap request_headers, ByteBuffer request_body, Core::ProxyData proxy_data)
|
|
{
|
|
auto host = url.serialized_host().to_byte_string();
|
|
|
|
m_resolver->dns.lookup(host, DNS::Messages::Class::IN, { DNS::Messages::ResourceType::A, DNS::Messages::ResourceType::AAAA })
|
|
->when_rejected([this, request_id](auto const& error) {
|
|
dbgln("StartRequest: DNS lookup failed: {}", error);
|
|
// FIXME: Implement timing info for DNS lookup failure.
|
|
async_request_finished(request_id, 0, {}, Requests::NetworkError::UnableToResolveHost);
|
|
})
|
|
.when_resolved([this, request_id, host = move(host), url = move(url), method = move(method), request_body = move(request_body), request_headers = move(request_headers), proxy_data](auto const& dns_result) mutable {
|
|
if (dns_result->records().is_empty() || dns_result->cached_addresses().is_empty()) {
|
|
dbgln("StartRequest: DNS lookup failed for '{}'", host);
|
|
// FIXME: Implement timing info for DNS lookup failure.
|
|
async_request_finished(request_id, 0, {}, Requests::NetworkError::UnableToResolveHost);
|
|
return;
|
|
}
|
|
|
|
auto* easy = curl_easy_init();
|
|
if (!easy) {
|
|
dbgln("StartRequest: Failed to initialize curl easy handle");
|
|
return;
|
|
}
|
|
|
|
auto fds_or_error = Core::System::pipe2(O_NONBLOCK);
|
|
if (fds_or_error.is_error()) {
|
|
dbgln("StartRequest: Failed to create pipe: {}", fds_or_error.error());
|
|
return;
|
|
}
|
|
|
|
auto fds = fds_or_error.release_value();
|
|
auto writer_fd = fds[1];
|
|
auto reader_fd = fds[0];
|
|
async_request_started(request_id, IPC::File::adopt_fd(reader_fd));
|
|
|
|
auto request = make<ActiveRequest>(*this, m_curl_multi, easy, request_id, writer_fd);
|
|
request->url = url.to_string();
|
|
|
|
auto set_option = [easy](auto option, auto value) {
|
|
auto result = curl_easy_setopt(easy, option, value);
|
|
if (result != CURLE_OK) {
|
|
dbgln("StartRequest: Failed to set curl option: {}", curl_easy_strerror(result));
|
|
return false;
|
|
}
|
|
return true;
|
|
};
|
|
|
|
set_option(CURLOPT_PRIVATE, request.ptr());
|
|
|
|
if (!g_default_certificate_path.is_empty())
|
|
set_option(CURLOPT_CAINFO, g_default_certificate_path.characters());
|
|
|
|
set_option(CURLOPT_ACCEPT_ENCODING, "gzip, deflate, br");
|
|
set_option(CURLOPT_URL, url.to_string().to_byte_string().characters());
|
|
set_option(CURLOPT_PORT, url.port_or_default());
|
|
set_option(CURLOPT_CONNECTTIMEOUT, s_connect_timeout_seconds);
|
|
|
|
bool did_set_body = false;
|
|
|
|
if (method == "GET"sv) {
|
|
set_option(CURLOPT_HTTPGET, 1L);
|
|
} else if (method.is_one_of("POST"sv, "PUT"sv, "PATCH"sv, "DELETE"sv)) {
|
|
request->body = move(request_body);
|
|
set_option(CURLOPT_POSTFIELDSIZE, request->body.size());
|
|
set_option(CURLOPT_POSTFIELDS, request->body.data());
|
|
did_set_body = true;
|
|
} else if (method == "HEAD") {
|
|
set_option(CURLOPT_NOBODY, 1L);
|
|
}
|
|
set_option(CURLOPT_CUSTOMREQUEST, method.characters());
|
|
|
|
set_option(CURLOPT_FOLLOWLOCATION, 0);
|
|
|
|
struct curl_slist* curl_headers = nullptr;
|
|
|
|
// NOTE: CURLOPT_POSTFIELDS automatically sets the Content-Type header.
|
|
// Set it to empty if the headers passed in don't contain a content type.
|
|
if (did_set_body && !request_headers.contains("Content-Type"))
|
|
curl_headers = curl_slist_append(curl_headers, "Content-Type:");
|
|
|
|
for (auto const& header : request_headers.headers()) {
|
|
if (header.value.is_empty()) {
|
|
// Special case for headers with an empty value. curl will discard the header unless we pass the
|
|
// header name followed by a semicolon.
|
|
//
|
|
// i.e. we need to pass "Content-Type;" instead of "Content-Type: "
|
|
//
|
|
// See: https://curl.se/libcurl/c/httpcustomheader.html
|
|
auto header_string = ByteString::formatted("{};", header.name);
|
|
curl_headers = curl_slist_append(curl_headers, header_string.characters());
|
|
continue;
|
|
}
|
|
|
|
auto header_string = ByteString::formatted("{}: {}", header.name, header.value);
|
|
curl_headers = curl_slist_append(curl_headers, header_string.characters());
|
|
}
|
|
|
|
if (curl_headers) {
|
|
set_option(CURLOPT_HTTPHEADER, curl_headers);
|
|
request->curl_string_lists.append(curl_headers);
|
|
}
|
|
|
|
// FIXME: Set up proxy if applicable
|
|
(void)proxy_data;
|
|
|
|
set_option(CURLOPT_WRITEFUNCTION, &on_data_received);
|
|
set_option(CURLOPT_WRITEDATA, reinterpret_cast<void*>(request.ptr()));
|
|
|
|
set_option(CURLOPT_HEADERFUNCTION, &on_header_received);
|
|
set_option(CURLOPT_HEADERDATA, reinterpret_cast<void*>(request.ptr()));
|
|
|
|
auto formatted_address = build_curl_resolve_list(*dns_result, host, url.port_or_default());
|
|
if (curl_slist* resolve_list = curl_slist_append(nullptr, formatted_address.characters())) {
|
|
set_option(CURLOPT_RESOLVE, resolve_list);
|
|
request->curl_string_lists.append(resolve_list);
|
|
} else
|
|
VERIFY_NOT_REACHED();
|
|
|
|
auto result = curl_multi_add_handle(m_curl_multi, easy);
|
|
VERIFY(result == CURLM_OK);
|
|
|
|
m_active_requests.set(request_id, move(request));
|
|
});
|
|
}
|
|
#endif
|
|
|
|
static Requests::NetworkError map_curl_code_to_network_error(CURLcode const& code)
|
|
{
|
|
switch (code) {
|
|
case CURLE_COULDNT_RESOLVE_HOST:
|
|
return Requests::NetworkError::UnableToResolveHost;
|
|
case CURLE_COULDNT_RESOLVE_PROXY:
|
|
return Requests::NetworkError::UnableToResolveProxy;
|
|
case CURLE_COULDNT_CONNECT:
|
|
return Requests::NetworkError::UnableToConnect;
|
|
case CURLE_OPERATION_TIMEDOUT:
|
|
return Requests::NetworkError::TimeoutReached;
|
|
case CURLE_TOO_MANY_REDIRECTS:
|
|
return Requests::NetworkError::TooManyRedirects;
|
|
case CURLE_SSL_CONNECT_ERROR:
|
|
return Requests::NetworkError::SSLHandshakeFailed;
|
|
case CURLE_PEER_FAILED_VERIFICATION:
|
|
return Requests::NetworkError::SSLVerificationFailed;
|
|
case CURLE_URL_MALFORMAT:
|
|
return Requests::NetworkError::MalformedUrl;
|
|
case CURLE_BAD_CONTENT_ENCODING:
|
|
return Requests::NetworkError::InvalidContentEncoding;
|
|
default:
|
|
return Requests::NetworkError::Unknown;
|
|
}
|
|
}
|
|
|
|
static Requests::RequestTimingInfo get_timing_info_from_curl_easy_handle(CURL* easy_handle)
|
|
{
|
|
/*
|
|
* curl_easy_perform()
|
|
* |
|
|
* |--QUEUE
|
|
* |--|--NAMELOOKUP
|
|
* |--|--|--CONNECT
|
|
* |--|--|--|--APPCONNECT
|
|
* |--|--|--|--|--PRETRANSFER
|
|
* |--|--|--|--|--|--POSTTRANSFER
|
|
* |--|--|--|--|--|--|--STARTTRANSFER
|
|
* |--|--|--|--|--|--|--|--TOTAL
|
|
* |--|--|--|--|--|--|--|--REDIRECT
|
|
*/
|
|
|
|
auto get_timing_info = [easy_handle](auto option) {
|
|
curl_off_t time_value = 0;
|
|
auto result = curl_easy_getinfo(easy_handle, option, &time_value);
|
|
VERIFY(result == CURLE_OK);
|
|
return time_value;
|
|
};
|
|
|
|
auto queue_time = get_timing_info(CURLINFO_QUEUE_TIME_T);
|
|
auto domain_lookup_time = get_timing_info(CURLINFO_NAMELOOKUP_TIME_T);
|
|
auto connect_time = get_timing_info(CURLINFO_CONNECT_TIME_T);
|
|
auto secure_connect_time = get_timing_info(CURLINFO_APPCONNECT_TIME_T);
|
|
auto request_start_time = get_timing_info(CURLINFO_PRETRANSFER_TIME_T);
|
|
auto response_start_time = get_timing_info(CURLINFO_STARTTRANSFER_TIME_T);
|
|
auto response_end_time = get_timing_info(CURLINFO_TOTAL_TIME_T);
|
|
auto encoded_body_size = get_timing_info(CURLINFO_SIZE_DOWNLOAD_T);
|
|
|
|
long http_version = 0;
|
|
auto get_version_result = curl_easy_getinfo(easy_handle, CURLINFO_HTTP_VERSION, &http_version);
|
|
VERIFY(get_version_result == CURLE_OK);
|
|
|
|
auto http_version_alpn = Requests::ALPNHttpVersion::None;
|
|
switch (http_version) {
|
|
case CURL_HTTP_VERSION_1_0:
|
|
http_version_alpn = Requests::ALPNHttpVersion::Http1_0;
|
|
break;
|
|
case CURL_HTTP_VERSION_1_1:
|
|
http_version_alpn = Requests::ALPNHttpVersion::Http1_1;
|
|
break;
|
|
case CURL_HTTP_VERSION_2_0:
|
|
http_version_alpn = Requests::ALPNHttpVersion::Http2_TLS;
|
|
break;
|
|
case CURL_HTTP_VERSION_3:
|
|
http_version_alpn = Requests::ALPNHttpVersion::Http3;
|
|
break;
|
|
default:
|
|
http_version_alpn = Requests::ALPNHttpVersion::None;
|
|
break;
|
|
}
|
|
|
|
return Requests::RequestTimingInfo {
|
|
.domain_lookup_start_microseconds = queue_time,
|
|
.domain_lookup_end_microseconds = queue_time + domain_lookup_time,
|
|
.connect_start_microseconds = queue_time + domain_lookup_time,
|
|
.connect_end_microseconds = queue_time + domain_lookup_time + connect_time + secure_connect_time,
|
|
.secure_connect_start_microseconds = queue_time + domain_lookup_time + connect_time,
|
|
.request_start_microseconds = queue_time + domain_lookup_time + connect_time + secure_connect_time + request_start_time,
|
|
.response_start_microseconds = queue_time + domain_lookup_time + connect_time + secure_connect_time + response_start_time,
|
|
.response_end_microseconds = queue_time + domain_lookup_time + connect_time + secure_connect_time + response_end_time,
|
|
.encoded_body_size = encoded_body_size,
|
|
.http_version_alpn_identifier = http_version_alpn,
|
|
};
|
|
}
|
|
|
|
void ConnectionFromClient::check_active_requests()
|
|
{
|
|
int msgs_in_queue = 0;
|
|
while (auto* msg = curl_multi_info_read(m_curl_multi, &msgs_in_queue)) {
|
|
if (msg->msg != CURLMSG_DONE)
|
|
continue;
|
|
|
|
void* application_private = nullptr;
|
|
auto result = curl_easy_getinfo(msg->easy_handle, CURLINFO_PRIVATE, &application_private);
|
|
VERIFY(result == CURLE_OK);
|
|
VERIFY(application_private != nullptr);
|
|
|
|
// FIXME: Come up with a unified way to track websockets and standard fetches instead of this nasty tagged pointer
|
|
if (reinterpret_cast<uintptr_t>(application_private) & websocket_private_tag) {
|
|
auto* websocket_impl = reinterpret_cast<WebSocketImplCurl*>(reinterpret_cast<uintptr_t>(application_private) & ~websocket_private_tag);
|
|
if (msg->data.result == CURLE_OK)
|
|
websocket_impl->did_connect();
|
|
else
|
|
websocket_impl->on_connection_error();
|
|
continue;
|
|
}
|
|
|
|
auto* request = static_cast<ActiveRequest*>(application_private);
|
|
|
|
if (!request->is_connect_only) {
|
|
auto timing_info = get_timing_info_from_curl_easy_handle(msg->easy_handle);
|
|
request->flush_headers_if_needed();
|
|
|
|
auto result_code = msg->data.result;
|
|
|
|
// HTTPS servers might terminate their connection without proper notice of shutdown - i.e. they do not send
|
|
// a "close notify" alert. OpenSSL version 3.2 began treating this as an error, which curl translates to
|
|
// CURLE_RECV_ERROR in the absence of a Content-Length response header. The Python server used by WPT is one
|
|
// such server. We ignore this error if we were actually able to download some response data.
|
|
if (result_code == CURLE_RECV_ERROR && request->downloaded_so_far != 0 && !request->headers.contains("Content-Length"sv))
|
|
result_code = CURLE_OK;
|
|
|
|
Optional<Requests::NetworkError> network_error;
|
|
bool const request_was_successful = result_code == CURLE_OK;
|
|
if (!request_was_successful) {
|
|
network_error = map_curl_code_to_network_error(result_code);
|
|
|
|
if (network_error.has_value() && network_error.value() == Requests::NetworkError::Unknown) {
|
|
char const* curl_error_message = curl_easy_strerror(result_code);
|
|
dbgln("ConnectionFromClient: Unable to map error ({}), message: \"\033[31;1m{}\033[0m\"", static_cast<int>(result_code), curl_error_message);
|
|
}
|
|
}
|
|
|
|
async_request_finished(request->request_id, request->downloaded_so_far, timing_info, network_error);
|
|
}
|
|
|
|
m_active_requests.remove(request->request_id);
|
|
}
|
|
}
|
|
|
|
Messages::RequestServer::StopRequestResponse ConnectionFromClient::stop_request(i32 request_id)
|
|
{
|
|
auto request = m_active_requests.take(request_id);
|
|
if (!request.has_value()) {
|
|
dbgln("StopRequest: Request ID {} not found", request_id);
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
Messages::RequestServer::SetCertificateResponse ConnectionFromClient::set_certificate(i32 request_id, ByteString certificate, ByteString key)
|
|
{
|
|
(void)request_id;
|
|
(void)certificate;
|
|
(void)key;
|
|
TODO();
|
|
}
|
|
|
|
void ConnectionFromClient::ensure_connection(URL::URL url, ::RequestServer::CacheLevel cache_level)
|
|
{
|
|
auto const url_string_value = url.to_string();
|
|
|
|
if (cache_level == CacheLevel::CreateConnection) {
|
|
auto* easy = curl_easy_init();
|
|
if (!easy) {
|
|
dbgln("EnsureConnection: Failed to initialize curl easy handle");
|
|
return;
|
|
}
|
|
|
|
auto set_option = [easy](auto option, auto value) {
|
|
auto result = curl_easy_setopt(easy, option, value);
|
|
if (result != CURLE_OK) {
|
|
dbgln("EnsureConnection: Failed to set curl option: {}", curl_easy_strerror(result));
|
|
return false;
|
|
}
|
|
return true;
|
|
};
|
|
|
|
auto connect_only_request_id = get_random<i32>();
|
|
|
|
auto request = make<ActiveRequest>(*this, m_curl_multi, easy, connect_only_request_id, 0);
|
|
request->url = url_string_value;
|
|
request->is_connect_only = true;
|
|
|
|
set_option(CURLOPT_PRIVATE, request.ptr());
|
|
set_option(CURLOPT_URL, url_string_value.to_byte_string().characters());
|
|
set_option(CURLOPT_PORT, url.port_or_default());
|
|
set_option(CURLOPT_CONNECTTIMEOUT, s_connect_timeout_seconds);
|
|
set_option(CURLOPT_CONNECT_ONLY, 1L);
|
|
|
|
auto const result = curl_multi_add_handle(m_curl_multi, easy);
|
|
VERIFY(result == CURLM_OK);
|
|
|
|
m_active_requests.set(connect_only_request_id, move(request));
|
|
|
|
return;
|
|
}
|
|
|
|
if (cache_level == CacheLevel::ResolveOnly) {
|
|
[[maybe_unused]] auto promise = m_resolver->dns.lookup(url.serialized_host().to_byte_string(), DNS::Messages::Class::IN, { DNS::Messages::ResourceType::A, DNS::Messages::ResourceType::AAAA });
|
|
if constexpr (REQUESTSERVER_DEBUG) {
|
|
Core::ElapsedTimer timer;
|
|
timer.start();
|
|
promise->when_resolved([url, timer](auto const& results) -> ErrorOr<void> {
|
|
dbgln("ensure_connection::ResolveOnly({}) OK {} entrie(s) in {}ms", url, results->cached_addresses().size(), timer.elapsed_milliseconds());
|
|
return {};
|
|
});
|
|
promise->when_rejected([url](auto const&) { dbgln("ensure_connection::ResolveOnly({}) rejected", url); });
|
|
}
|
|
}
|
|
}
|
|
|
|
void ConnectionFromClient::websocket_connect(i64 websocket_id, URL::URL url, ByteString origin, Vector<ByteString> protocols, Vector<ByteString> extensions, HTTP::HeaderMap additional_request_headers)
|
|
{
|
|
auto host = url.serialized_host().to_byte_string();
|
|
|
|
m_resolver->dns.lookup(host, DNS::Messages::Class::IN, { DNS::Messages::ResourceType::A, DNS::Messages::ResourceType::AAAA })
|
|
->when_rejected([this, websocket_id](auto const& error) {
|
|
dbgln("WebSocketConnect: DNS lookup failed: {}", error);
|
|
async_websocket_errored(websocket_id, static_cast<i32>(Requests::WebSocket::Error::CouldNotEstablishConnection));
|
|
})
|
|
.when_resolved([this, websocket_id, host = move(host), url = move(url), origin = move(origin), protocols = move(protocols), extensions = move(extensions), additional_request_headers = move(additional_request_headers)](auto const& dns_result) mutable {
|
|
if (dns_result->records().is_empty() || dns_result->cached_addresses().is_empty()) {
|
|
dbgln("WebSocketConnect: DNS lookup failed for '{}'", host);
|
|
async_websocket_errored(websocket_id, static_cast<i32>(Requests::WebSocket::Error::CouldNotEstablishConnection));
|
|
return;
|
|
}
|
|
|
|
WebSocket::ConnectionInfo connection_info(move(url));
|
|
connection_info.set_origin(move(origin));
|
|
connection_info.set_protocols(move(protocols));
|
|
connection_info.set_extensions(move(extensions));
|
|
connection_info.set_headers(move(additional_request_headers));
|
|
connection_info.set_dns_result(move(dns_result));
|
|
|
|
if (!g_default_certificate_path.is_empty())
|
|
connection_info.set_root_certificates_path(g_default_certificate_path);
|
|
|
|
auto impl = WebSocketImplCurl::create(m_curl_multi);
|
|
auto connection = WebSocket::WebSocket::create(move(connection_info), move(impl));
|
|
|
|
connection->on_open = [this, websocket_id]() {
|
|
async_websocket_connected(websocket_id);
|
|
};
|
|
connection->on_message = [this, websocket_id](auto message) {
|
|
async_websocket_received(websocket_id, message.is_text(), message.data());
|
|
};
|
|
connection->on_error = [this, websocket_id](auto message) {
|
|
async_websocket_errored(websocket_id, (i32)message);
|
|
};
|
|
connection->on_close = [this, websocket_id](u16 code, ByteString reason, bool was_clean) {
|
|
async_websocket_closed(websocket_id, code, move(reason), was_clean);
|
|
};
|
|
connection->on_ready_state_change = [this, websocket_id](auto state) {
|
|
async_websocket_ready_state_changed(websocket_id, (u32)state);
|
|
};
|
|
|
|
connection->start();
|
|
m_websockets.set(websocket_id, move(connection));
|
|
});
|
|
}
|
|
|
|
void ConnectionFromClient::websocket_send(i64 websocket_id, bool is_text, ByteBuffer data)
|
|
{
|
|
if (auto connection = m_websockets.get(websocket_id).value_or({}); connection && connection->ready_state() == WebSocket::ReadyState::Open)
|
|
connection->send(WebSocket::Message { move(data), is_text });
|
|
}
|
|
|
|
void ConnectionFromClient::websocket_close(i64 websocket_id, u16 code, ByteString reason)
|
|
{
|
|
if (auto connection = m_websockets.get(websocket_id).value_or({}); connection && connection->ready_state() == WebSocket::ReadyState::Open)
|
|
connection->close(code, reason);
|
|
}
|
|
|
|
Messages::RequestServer::WebsocketSetCertificateResponse ConnectionFromClient::websocket_set_certificate(i64 websocket_id, ByteString, ByteString)
|
|
{
|
|
auto success = false;
|
|
if (auto connection = m_websockets.get(websocket_id).value_or({}); connection) {
|
|
// NO OP here
|
|
// connection->set_certificate(certificate, key);
|
|
success = true;
|
|
}
|
|
return success;
|
|
}
|
|
|
|
}
|