920 lines
24 KiB
C++
920 lines
24 KiB
C++
/*
|
|
|
|
Copyright (c) 2007-2016, Arvid Norberg
|
|
All rights reserved.
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
modification, are permitted provided that the following conditions
|
|
are met:
|
|
|
|
* Redistributions of source code must retain the above copyright
|
|
notice, this list of conditions and the following disclaimer.
|
|
* Redistributions in binary form must reproduce the above copyright
|
|
notice, this list of conditions and the following disclaimer in
|
|
the documentation and/or other materials provided with the distribution.
|
|
* Neither the name of the author nor the names of its
|
|
contributors may be used to endorse or promote products derived
|
|
from this software without specific prior written permission.
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
#include "libtorrent/http_connection.hpp"
|
|
#include "libtorrent/aux_/escape_string.hpp"
|
|
#include "libtorrent/instantiate_connection.hpp"
|
|
#include "libtorrent/gzip.hpp"
|
|
#include "libtorrent/parse_url.hpp"
|
|
#include "libtorrent/socket.hpp"
|
|
#include "libtorrent/socket_type.hpp" // for async_shutdown
|
|
#include "libtorrent/resolver_interface.hpp"
|
|
#include "libtorrent/settings_pack.hpp"
|
|
#include "libtorrent/aux_/time.hpp"
|
|
#include "libtorrent/random.hpp"
|
|
#include "libtorrent/debug.hpp"
|
|
#include "libtorrent/time.hpp"
|
|
|
|
#include <functional>
|
|
#include <string>
|
|
#include <algorithm>
|
|
|
|
using namespace std::placeholders;
|
|
|
|
namespace libtorrent {
|
|
|
|
http_connection::http_connection(io_service& ios
|
|
, resolver_interface& resolver
|
|
, http_handler const& handler
|
|
, bool bottled
|
|
, int max_bottled_buffer_size
|
|
, http_connect_handler const& ch
|
|
, http_filter_handler const& fh
|
|
#ifdef TORRENT_USE_OPENSSL
|
|
, ssl::context* ssl_ctx
|
|
#endif
|
|
)
|
|
: m_next_ep(0)
|
|
, m_sock(ios)
|
|
#ifdef TORRENT_USE_OPENSSL
|
|
, m_ssl_ctx(ssl_ctx)
|
|
, m_own_ssl_context(false)
|
|
#endif
|
|
#if TORRENT_USE_I2P
|
|
, m_i2p_conn(nullptr)
|
|
#endif
|
|
, m_resolver(resolver)
|
|
, m_handler(handler)
|
|
, m_connect_handler(ch)
|
|
, m_filter_handler(fh)
|
|
, m_timer(ios)
|
|
, m_read_timeout(seconds(5))
|
|
, m_completion_timeout(seconds(5))
|
|
, m_limiter_timer(ios)
|
|
, m_last_receive(aux::time_now())
|
|
, m_start_time(aux::time_now())
|
|
, m_read_pos(0)
|
|
, m_redirects(5)
|
|
, m_max_bottled_buffer_size(max_bottled_buffer_size)
|
|
, m_rate_limit(0)
|
|
, m_download_quota(0)
|
|
, m_priority(0)
|
|
, m_resolve_flags{}
|
|
, m_port(0)
|
|
, m_bottled(bottled)
|
|
, m_called(false)
|
|
, m_limiter_timer_active(false)
|
|
, m_ssl(false)
|
|
, m_abort(false)
|
|
, m_connecting(false)
|
|
{
|
|
TORRENT_ASSERT(m_handler);
|
|
}
|
|
|
|
http_connection::~http_connection()
|
|
{
|
|
#ifdef TORRENT_USE_OPENSSL
|
|
if (m_own_ssl_context) delete m_ssl_ctx;
|
|
#endif
|
|
}
|
|
|
|
void http_connection::get(std::string const& url, time_duration timeout, int prio
|
|
, aux::proxy_settings const* ps, int handle_redirects, std::string const& user_agent
|
|
, boost::optional<address> const& bind_addr, resolver_flags const resolve_flags, std::string const& auth_
|
|
#if TORRENT_USE_I2P
|
|
, i2p_connection* i2p_conn
|
|
#endif
|
|
)
|
|
{
|
|
m_user_agent = user_agent;
|
|
m_resolve_flags = resolve_flags;
|
|
|
|
std::string protocol;
|
|
std::string auth;
|
|
std::string hostname;
|
|
std::string path;
|
|
error_code ec;
|
|
int port;
|
|
|
|
std::tie(protocol, auth, hostname, port, path)
|
|
= parse_url_components(url, ec);
|
|
|
|
if (auth.empty()) auth = auth_;
|
|
|
|
m_auth = auth;
|
|
|
|
int default_port = protocol == "https" ? 443 : 80;
|
|
if (port == -1) port = default_port;
|
|
|
|
// keep ourselves alive even if the callback function
|
|
// deletes this object
|
|
std::shared_ptr<http_connection> me(shared_from_this());
|
|
|
|
if (ec)
|
|
{
|
|
m_timer.get_io_service().post(std::bind(&http_connection::callback
|
|
, me, ec, static_cast<char*>(nullptr), 0));
|
|
return;
|
|
}
|
|
|
|
if (protocol != "http"
|
|
#ifdef TORRENT_USE_OPENSSL
|
|
&& protocol != "https"
|
|
#endif
|
|
)
|
|
{
|
|
error_code err(errors::unsupported_url_protocol);
|
|
m_timer.get_io_service().post(std::bind(&http_connection::callback
|
|
, me, err, static_cast<char*>(nullptr), 0));
|
|
return;
|
|
}
|
|
|
|
TORRENT_ASSERT(prio >= 0 && prio < 3);
|
|
|
|
bool ssl = false;
|
|
if (protocol == "https") ssl = true;
|
|
|
|
char request[4096];
|
|
char* end = request + sizeof(request);
|
|
char* ptr = request;
|
|
|
|
#define APPEND_FMT(fmt) ptr += std::snprintf(ptr, std::size_t(end - ptr), fmt)
|
|
#define APPEND_FMT1(fmt, arg) ptr += std::snprintf(ptr, std::size_t(end - ptr), fmt, arg)
|
|
#define APPEND_FMT2(fmt, arg1, arg2) ptr += std::snprintf(ptr, std::size_t(end - ptr), fmt, arg1, arg2)
|
|
|
|
// exclude ssl here, because SSL assumes CONNECT support in the
|
|
// proxy and is handled at the lower layer
|
|
if (ps && (ps->type == settings_pack::http
|
|
|| ps->type == settings_pack::http_pw)
|
|
&& !ssl)
|
|
{
|
|
// if we're using an http proxy and not an ssl
|
|
// connection, just do a regular http proxy request
|
|
APPEND_FMT1("GET %s HTTP/1.1\r\n", url.c_str());
|
|
if (ps->type == settings_pack::http_pw)
|
|
APPEND_FMT1("Proxy-Authorization: Basic %s\r\n", base64encode(
|
|
ps->username + ":" + ps->password).c_str());
|
|
|
|
hostname = ps->hostname;
|
|
port = ps->port;
|
|
|
|
APPEND_FMT1("Host: %s", hostname.c_str());
|
|
if (port != default_port) APPEND_FMT1(":%d\r\n", port);
|
|
else APPEND_FMT("\r\n");
|
|
}
|
|
else
|
|
{
|
|
APPEND_FMT2("GET %s HTTP/1.1\r\n"
|
|
"Host: %s", path.c_str(), hostname.c_str());
|
|
if (port != default_port) APPEND_FMT1(":%d\r\n", port);
|
|
else APPEND_FMT("\r\n");
|
|
}
|
|
|
|
// APPEND_FMT("Accept: */*\r\n");
|
|
|
|
if (!m_user_agent.empty())
|
|
APPEND_FMT1("User-Agent: %s\r\n", m_user_agent.c_str());
|
|
|
|
if (m_bottled)
|
|
APPEND_FMT("Accept-Encoding: gzip\r\n");
|
|
|
|
if (!auth.empty())
|
|
APPEND_FMT1("Authorization: Basic %s\r\n", base64encode(auth).c_str());
|
|
|
|
APPEND_FMT("Connection: close\r\n\r\n");
|
|
|
|
m_sendbuffer.assign(request);
|
|
m_url = url;
|
|
start(hostname, port, timeout, prio
|
|
, ps, ssl, handle_redirects, bind_addr, m_resolve_flags
|
|
#if TORRENT_USE_I2P
|
|
, i2p_conn
|
|
#endif
|
|
);
|
|
}
|
|
|
|
void http_connection::start(std::string const& hostname, int port
|
|
, time_duration timeout, int prio, aux::proxy_settings const* ps, bool ssl
|
|
, int handle_redirects
|
|
, boost::optional<address> const& bind_addr
|
|
, resolver_flags const resolve_flags
|
|
#if TORRENT_USE_I2P
|
|
, i2p_connection* i2p_conn
|
|
#endif
|
|
)
|
|
{
|
|
TORRENT_ASSERT(prio >= 0 && prio < 3);
|
|
|
|
m_redirects = handle_redirects;
|
|
m_resolve_flags = resolve_flags;
|
|
if (ps) m_proxy = *ps;
|
|
|
|
// keep ourselves alive even if the callback function
|
|
// deletes this object
|
|
std::shared_ptr<http_connection> me(shared_from_this());
|
|
|
|
m_completion_timeout = timeout;
|
|
m_read_timeout = seconds(5);
|
|
if (m_read_timeout < timeout / 5) m_read_timeout = timeout / 5;
|
|
error_code ec;
|
|
m_timer.expires_from_now(std::min(
|
|
m_read_timeout, m_completion_timeout), ec);
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_timeout");
|
|
m_timer.async_wait(std::bind(&http_connection::on_timeout
|
|
, std::weak_ptr<http_connection>(me), _1));
|
|
m_called = false;
|
|
m_parser.reset();
|
|
m_recvbuffer.clear();
|
|
m_read_pos = 0;
|
|
m_priority = prio;
|
|
|
|
if (ec)
|
|
{
|
|
m_timer.get_io_service().post(std::bind(&http_connection::callback
|
|
, me, ec, nullptr, 0));
|
|
return;
|
|
}
|
|
|
|
if (m_sock.is_open() && m_hostname == hostname && m_port == port
|
|
&& m_ssl == ssl && m_bind_addr == bind_addr)
|
|
{
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_write");
|
|
async_write(m_sock, boost::asio::buffer(m_sendbuffer)
|
|
, std::bind(&http_connection::on_write, me, _1));
|
|
}
|
|
else
|
|
{
|
|
m_ssl = ssl;
|
|
m_bind_addr = bind_addr;
|
|
error_code err;
|
|
if (m_sock.is_open()) m_sock.close(err);
|
|
|
|
#if TORRENT_USE_I2P
|
|
bool is_i2p = false;
|
|
char const* top_domain = strrchr(hostname.c_str(), '.');
|
|
if (top_domain && top_domain == ".i2p"_sv && i2p_conn)
|
|
{
|
|
// this is an i2p name, we need to use the sam connection
|
|
// to do the name lookup
|
|
is_i2p = true;
|
|
m_i2p_conn = i2p_conn;
|
|
// quadruple the timeout for i2p destinations
|
|
// because i2p is sloooooow
|
|
m_completion_timeout *= 4;
|
|
m_read_timeout *= 4;
|
|
}
|
|
#endif
|
|
|
|
#if TORRENT_USE_I2P
|
|
if (is_i2p && i2p_conn->proxy().type != settings_pack::i2p_proxy)
|
|
{
|
|
m_timer.get_io_service().post(std::bind(&http_connection::callback
|
|
, me, error_code(errors::no_i2p_router), static_cast<char*>(nullptr), 0));
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
aux::proxy_settings const* proxy = ps;
|
|
#if TORRENT_USE_I2P
|
|
aux::proxy_settings i2p_proxy;
|
|
if (is_i2p)
|
|
{
|
|
i2p_proxy = i2p_conn->proxy();
|
|
proxy = &i2p_proxy;
|
|
}
|
|
#endif
|
|
|
|
// in this case, the upper layer is assumed to have taken
|
|
// care of the proxying already. Don't instantiate the socket
|
|
// with this proxy
|
|
if (proxy && (proxy->type == settings_pack::http
|
|
|| proxy->type == settings_pack::http_pw)
|
|
&& !ssl)
|
|
{
|
|
proxy = nullptr;
|
|
}
|
|
aux::proxy_settings null_proxy;
|
|
|
|
void* userdata = nullptr;
|
|
#ifdef TORRENT_USE_OPENSSL
|
|
if (m_ssl)
|
|
{
|
|
if (m_ssl_ctx == nullptr)
|
|
{
|
|
m_ssl_ctx = new (std::nothrow) ssl::context(
|
|
m_timer.get_io_service(), ssl::context::sslv23_client);
|
|
if (m_ssl_ctx)
|
|
{
|
|
m_own_ssl_context = true;
|
|
m_ssl_ctx->set_verify_mode(ssl::context::verify_none, ec);
|
|
if (ec)
|
|
{
|
|
m_timer.get_io_service().post(std::bind(&http_connection::callback
|
|
, me, ec, nullptr, 0));
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
userdata = m_ssl_ctx;
|
|
}
|
|
#endif
|
|
// assume this is not a tracker connection. Tracker connections that
|
|
// shouldn't be subject to the proxy should pass in nullptr as the proxy
|
|
// pointer.
|
|
instantiate_connection(m_timer.get_io_service()
|
|
, proxy ? *proxy : null_proxy, m_sock, userdata, nullptr, false, false);
|
|
|
|
if (m_bind_addr)
|
|
{
|
|
m_sock.open(m_bind_addr->is_v4() ? tcp::v4() : tcp::v6(), ec);
|
|
m_sock.bind(tcp::endpoint(*m_bind_addr, 0), ec);
|
|
if (ec)
|
|
{
|
|
m_timer.get_io_service().post(std::bind(&http_connection::callback
|
|
, me, ec, nullptr, 0));
|
|
return;
|
|
}
|
|
}
|
|
|
|
setup_ssl_hostname(m_sock, hostname, ec);
|
|
if (ec)
|
|
{
|
|
m_timer.get_io_service().post(std::bind(&http_connection::callback
|
|
, me, ec, nullptr, 0));
|
|
return;
|
|
}
|
|
|
|
m_endpoints.clear();
|
|
m_next_ep = 0;
|
|
|
|
#if TORRENT_USE_I2P
|
|
if (is_i2p)
|
|
{
|
|
if (hostname.length() < 516) // Base64 encoded destination with optional .i2p
|
|
{
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_i2p_resolve");
|
|
i2p_conn->async_name_lookup(hostname.c_str(), std::bind(&http_connection::on_i2p_resolve
|
|
, me, _1, _2));
|
|
}
|
|
else
|
|
connect_i2p_tracker(hostname.c_str());
|
|
}
|
|
else
|
|
#endif
|
|
if (ps && ps->proxy_hostnames
|
|
&& (ps->type == settings_pack::socks5
|
|
|| ps->type == settings_pack::socks5_pw))
|
|
{
|
|
m_hostname = hostname;
|
|
m_port = std::uint16_t(port);
|
|
m_endpoints.push_back({address(), m_port});
|
|
connect();
|
|
}
|
|
else
|
|
{
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_resolve");
|
|
m_resolver.async_resolve(hostname, m_resolve_flags
|
|
, std::bind(&http_connection::on_resolve
|
|
, me, _1, _2));
|
|
}
|
|
m_hostname = hostname;
|
|
m_port = std::uint16_t(port);
|
|
}
|
|
}
|
|
|
|
void http_connection::on_timeout(std::weak_ptr<http_connection> p
|
|
, error_code const& e)
|
|
{
|
|
COMPLETE_ASYNC("http_connection::on_timeout");
|
|
std::shared_ptr<http_connection> c = p.lock();
|
|
if (!c) return;
|
|
|
|
if (e == boost::asio::error::operation_aborted) return;
|
|
|
|
if (c->m_abort) return;
|
|
|
|
time_point const now = clock_type::now();
|
|
|
|
if (c->m_start_time + c->m_completion_timeout <= now
|
|
|| c->m_last_receive + c->m_read_timeout <= now)
|
|
{
|
|
// the connection timed out. If we have more endpoints to try, just
|
|
// close this connection. The on_connect handler will try the next
|
|
// endpoint in the list.
|
|
if (c->m_next_ep < int(c->m_endpoints.size()))
|
|
{
|
|
error_code ec;
|
|
c->m_sock.close(ec);
|
|
if (!c->m_connecting) c->connect();
|
|
c->m_last_receive = now;
|
|
c->m_start_time = c->m_last_receive;
|
|
}
|
|
else
|
|
{
|
|
c->callback(boost::asio::error::timed_out);
|
|
return;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (!c->m_sock.is_open()) return;
|
|
}
|
|
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_timeout");
|
|
error_code ec;
|
|
c->m_timer.expires_at(std::min(
|
|
c->m_last_receive + c->m_read_timeout
|
|
, c->m_start_time + c->m_completion_timeout), ec);
|
|
c->m_timer.async_wait(std::bind(&http_connection::on_timeout, p, _1));
|
|
}
|
|
|
|
void http_connection::close(bool force)
|
|
{
|
|
if (m_abort) return;
|
|
|
|
error_code ec;
|
|
if (force)
|
|
m_sock.close(ec);
|
|
else
|
|
async_shutdown(m_sock, shared_from_this());
|
|
|
|
m_timer.cancel(ec);
|
|
m_limiter_timer.cancel(ec);
|
|
|
|
m_hostname.clear();
|
|
m_port = 0;
|
|
m_handler = nullptr;
|
|
m_abort = true;
|
|
}
|
|
|
|
#if TORRENT_USE_I2P
|
|
void http_connection::connect_i2p_tracker(char const* destination)
|
|
{
|
|
#ifdef TORRENT_USE_OPENSSL
|
|
TORRENT_ASSERT(m_ssl == false);
|
|
TORRENT_ASSERT(m_sock.get<socket_type>());
|
|
TORRENT_ASSERT(m_sock.get<socket_type>()->get<i2p_stream>());
|
|
m_sock.get<socket_type>()->get<i2p_stream>()->set_destination(destination);
|
|
m_sock.get<socket_type>()->get<i2p_stream>()->set_command(i2p_stream::cmd_connect);
|
|
m_sock.get<socket_type>()->get<i2p_stream>()->set_session_id(m_i2p_conn->session_id());
|
|
#else
|
|
m_sock.get<i2p_stream>()->set_destination(destination);
|
|
m_sock.get<i2p_stream>()->set_command(i2p_stream::cmd_connect);
|
|
m_sock.get<i2p_stream>()->set_session_id(m_i2p_conn->session_id());
|
|
#endif
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_connect");
|
|
m_sock.async_connect(tcp::endpoint(), std::bind(&http_connection::on_connect
|
|
, shared_from_this(), _1));
|
|
}
|
|
|
|
void http_connection::on_i2p_resolve(error_code const& e
|
|
, char const* destination)
|
|
{
|
|
COMPLETE_ASYNC("http_connection::on_i2p_resolve");
|
|
if (e)
|
|
{
|
|
callback(e);
|
|
return;
|
|
}
|
|
connect_i2p_tracker(destination);
|
|
}
|
|
#endif
|
|
|
|
void http_connection::on_resolve(error_code const& e
|
|
, std::vector<address> const& addresses)
|
|
{
|
|
COMPLETE_ASYNC("http_connection::on_resolve");
|
|
if (e)
|
|
{
|
|
callback(e);
|
|
return;
|
|
}
|
|
TORRENT_ASSERT(!addresses.empty());
|
|
|
|
for (auto const& addr : addresses)
|
|
m_endpoints.push_back({addr, m_port});
|
|
|
|
if (m_filter_handler) m_filter_handler(*this, m_endpoints);
|
|
if (m_endpoints.empty())
|
|
{
|
|
close();
|
|
return;
|
|
}
|
|
|
|
aux::random_shuffle(m_endpoints.begin(), m_endpoints.end());
|
|
|
|
// if we have been told to bind to a particular address
|
|
// only connect to addresses of the same family
|
|
if (m_bind_addr)
|
|
{
|
|
auto new_end = std::partition(m_endpoints.begin(), m_endpoints.end()
|
|
, [this] (tcp::endpoint const& ep)
|
|
{
|
|
if (ep.address().is_v4() != m_bind_addr->is_v4())
|
|
return false;
|
|
if (ep.address().is_v4() && m_bind_addr->is_v4())
|
|
return true;
|
|
TORRENT_ASSERT(ep.address().is_v6() && m_bind_addr->is_v6());
|
|
return ep.address().to_v6().scope_id() == m_bind_addr->to_v6().scope_id();
|
|
});
|
|
m_endpoints.erase(new_end, m_endpoints.end());
|
|
if (m_endpoints.empty())
|
|
{
|
|
callback(error_code(boost::system::errc::address_family_not_supported, generic_category()));
|
|
close();
|
|
return;
|
|
}
|
|
}
|
|
|
|
connect();
|
|
}
|
|
|
|
void http_connection::connect()
|
|
{
|
|
TORRENT_ASSERT(m_next_ep < int(m_endpoints.size()));
|
|
|
|
std::shared_ptr<http_connection> me(shared_from_this());
|
|
|
|
if (m_proxy.proxy_hostnames
|
|
&& (m_proxy.type == settings_pack::socks5
|
|
|| m_proxy.type == settings_pack::socks5_pw))
|
|
{
|
|
// test to see if m_hostname really just is an IP (and not a hostname). If it
|
|
// is, ec will be represent "success". If so, don't set it as the socks5
|
|
// hostname, just connect to the IP
|
|
error_code ec;
|
|
address adr = address::from_string(m_hostname, ec);
|
|
|
|
if (ec)
|
|
{
|
|
// we're using a socks proxy and we're resolving
|
|
// hostnames through it
|
|
#ifdef TORRENT_USE_OPENSSL
|
|
if (m_ssl)
|
|
{
|
|
TORRENT_ASSERT(m_sock.get<ssl_stream<socks5_stream>>());
|
|
m_sock.get<ssl_stream<socks5_stream>>()->next_layer().set_dst_name(m_hostname);
|
|
}
|
|
else
|
|
#endif
|
|
{
|
|
TORRENT_ASSERT(m_sock.get<socks5_stream>());
|
|
m_sock.get<socks5_stream>()->set_dst_name(m_hostname);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
m_endpoints[0].address(adr);
|
|
}
|
|
}
|
|
|
|
TORRENT_ASSERT(m_next_ep < int(m_endpoints.size()));
|
|
if (m_next_ep >= int(m_endpoints.size())) return;
|
|
|
|
tcp::endpoint target_address = m_endpoints[m_next_ep];
|
|
++m_next_ep;
|
|
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_connect");
|
|
TORRENT_ASSERT(!m_connecting);
|
|
m_connecting = true;
|
|
m_sock.async_connect(target_address, std::bind(&http_connection::on_connect
|
|
, shared_from_this(), _1));
|
|
}
|
|
|
|
void http_connection::on_connect(error_code const& e)
|
|
{
|
|
COMPLETE_ASYNC("http_connection::on_connect");
|
|
TORRENT_ASSERT(m_connecting);
|
|
m_connecting = false;
|
|
|
|
m_last_receive = clock_type::now();
|
|
m_start_time = m_last_receive;
|
|
if (!e)
|
|
{
|
|
if (m_connect_handler) m_connect_handler(*this);
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_write");
|
|
async_write(m_sock, boost::asio::buffer(m_sendbuffer)
|
|
, std::bind(&http_connection::on_write, shared_from_this(), _1));
|
|
}
|
|
else if (m_next_ep < int(m_endpoints.size()) && !m_abort)
|
|
{
|
|
// The connection failed. Try the next endpoint in the list.
|
|
error_code ec;
|
|
m_sock.close(ec);
|
|
connect();
|
|
}
|
|
else
|
|
{
|
|
callback(e);
|
|
}
|
|
}
|
|
|
|
// TODO: 3 use span<char> instead of data, size
|
|
void http_connection::callback(error_code e, char* data, int size)
|
|
{
|
|
if (m_bottled && m_called) return;
|
|
|
|
std::vector<char> buf;
|
|
if (data && m_bottled && m_parser.header_finished())
|
|
{
|
|
size = m_parser.collapse_chunk_headers(data, size);
|
|
|
|
std::string const& encoding = m_parser.header("content-encoding");
|
|
if ((encoding == "gzip" || encoding == "x-gzip") && size > 0 && data)
|
|
{
|
|
error_code ec;
|
|
inflate_gzip(data, size, buf, m_max_bottled_buffer_size, ec);
|
|
|
|
if (ec)
|
|
{
|
|
if (m_handler) m_handler(ec, m_parser, data, size, *this);
|
|
return;
|
|
}
|
|
size = int(buf.size());
|
|
data = size == 0 ? nullptr : &buf[0];
|
|
}
|
|
|
|
// if we completed the whole response, no need
|
|
// to tell the user that the connection was closed by
|
|
// the server or by us. Just clear any error
|
|
if (m_parser.finished()) e.clear();
|
|
}
|
|
m_called = true;
|
|
error_code ec;
|
|
m_timer.cancel(ec);
|
|
if (m_handler) m_handler(e, m_parser, data, size, *this);
|
|
}
|
|
|
|
void http_connection::on_write(error_code const& e)
|
|
{
|
|
COMPLETE_ASYNC("http_connection::on_write");
|
|
|
|
if (e == boost::asio::error::operation_aborted) return;
|
|
|
|
if (e)
|
|
{
|
|
callback(e);
|
|
return;
|
|
}
|
|
|
|
if (m_abort) return;
|
|
|
|
std::string().swap(m_sendbuffer);
|
|
m_recvbuffer.resize(4096);
|
|
|
|
int amount_to_read = int(m_recvbuffer.size()) - m_read_pos;
|
|
if (m_rate_limit > 0 && amount_to_read > m_download_quota)
|
|
{
|
|
amount_to_read = m_download_quota;
|
|
if (m_download_quota == 0)
|
|
{
|
|
if (!m_limiter_timer_active)
|
|
{
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_assign_bandwidth");
|
|
on_assign_bandwidth(error_code());
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_read");
|
|
m_sock.async_read_some(boost::asio::buffer(m_recvbuffer.data() + m_read_pos
|
|
, std::size_t(amount_to_read))
|
|
, std::bind(&http_connection::on_read
|
|
, shared_from_this(), _1, _2));
|
|
}
|
|
|
|
void http_connection::on_read(error_code const& e
|
|
, std::size_t bytes_transferred)
|
|
{
|
|
COMPLETE_ASYNC("http_connection::on_read");
|
|
|
|
if (m_rate_limit)
|
|
{
|
|
m_download_quota -= int(bytes_transferred);
|
|
TORRENT_ASSERT(m_download_quota >= 0);
|
|
}
|
|
|
|
if (e == boost::asio::error::operation_aborted) return;
|
|
|
|
if (m_abort) return;
|
|
|
|
// keep ourselves alive even if the callback function
|
|
// deletes this object
|
|
std::shared_ptr<http_connection> me(shared_from_this());
|
|
|
|
// when using the asio SSL wrapper, it seems like
|
|
// we get the shut_down error instead of EOF
|
|
if (e == boost::asio::error::eof || e == boost::asio::error::shut_down)
|
|
{
|
|
error_code ec = boost::asio::error::eof;
|
|
TORRENT_ASSERT(bytes_transferred == 0);
|
|
span<char> body;
|
|
if (m_bottled && m_parser.header_finished())
|
|
{
|
|
body = span<char>(m_recvbuffer.data() + m_parser.body_start()
|
|
, m_parser.get_body().size());
|
|
}
|
|
callback(ec, body.data(), int(body.size()));
|
|
return;
|
|
}
|
|
|
|
if (e)
|
|
{
|
|
TORRENT_ASSERT(bytes_transferred == 0);
|
|
callback(e);
|
|
return;
|
|
}
|
|
|
|
m_read_pos += int(bytes_transferred);
|
|
TORRENT_ASSERT(m_read_pos <= int(m_recvbuffer.size()));
|
|
|
|
if (m_bottled || !m_parser.header_finished())
|
|
{
|
|
span<char const> rcv_buf(m_recvbuffer);
|
|
bool error = false;
|
|
m_parser.incoming(rcv_buf.first(std::size_t(m_read_pos)), error);
|
|
if (error)
|
|
{
|
|
// HTTP parse error
|
|
error_code ec = errors::http_parse_error;
|
|
callback(ec, nullptr, 0);
|
|
return;
|
|
}
|
|
|
|
// having a nonempty path means we should handle redirects
|
|
if (m_redirects && m_parser.header_finished())
|
|
{
|
|
int code = m_parser.status_code();
|
|
|
|
if (is_redirect(code))
|
|
{
|
|
// attempt a redirect
|
|
std::string const& location = m_parser.header("location");
|
|
if (location.empty())
|
|
{
|
|
// missing location header
|
|
callback(error_code(errors::http_missing_location));
|
|
return;
|
|
}
|
|
|
|
error_code ec;
|
|
// it would be nice to gracefully shut down SSL here
|
|
// but then we'd have to do all the reconnect logic
|
|
// in its handler. For now, just kill the connection.
|
|
// async_shutdown(m_sock, shared_from_this());
|
|
m_sock.close(ec);
|
|
|
|
std::string url = resolve_redirect_location(m_url, location);
|
|
get(url, m_completion_timeout, m_priority, &m_proxy, m_redirects - 1
|
|
, m_user_agent, m_bind_addr, m_resolve_flags, m_auth
|
|
#if TORRENT_USE_I2P
|
|
, m_i2p_conn
|
|
#endif
|
|
);
|
|
return;
|
|
}
|
|
|
|
m_redirects = 0;
|
|
}
|
|
|
|
if (!m_bottled && m_parser.header_finished())
|
|
{
|
|
if (m_read_pos > m_parser.body_start())
|
|
callback(e, m_recvbuffer.data() + m_parser.body_start()
|
|
, m_read_pos - m_parser.body_start());
|
|
m_read_pos = 0;
|
|
m_last_receive = clock_type::now();
|
|
}
|
|
else if (m_bottled && m_parser.finished())
|
|
{
|
|
error_code ec;
|
|
m_timer.cancel(ec);
|
|
span<char> body(m_recvbuffer.data() + m_parser.body_start()
|
|
, m_parser.get_body().size());
|
|
callback(e, body.data(), int(body.size()));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TORRENT_ASSERT(!m_bottled);
|
|
callback(e, m_recvbuffer.data(), m_read_pos);
|
|
m_read_pos = 0;
|
|
m_last_receive = clock_type::now();
|
|
}
|
|
|
|
// if we've hit the limit, double the buffer size
|
|
if (int(m_recvbuffer.size()) == m_read_pos)
|
|
m_recvbuffer.resize(std::min(m_read_pos * 2, m_max_bottled_buffer_size));
|
|
|
|
if (m_read_pos == m_max_bottled_buffer_size)
|
|
{
|
|
// if we've reached the size limit, terminate the connection and
|
|
// report the error
|
|
callback(error_code(boost::system::errc::file_too_large, generic_category()));
|
|
return;
|
|
}
|
|
int amount_to_read = int(m_recvbuffer.size()) - m_read_pos;
|
|
if (m_rate_limit > 0 && amount_to_read > m_download_quota)
|
|
{
|
|
amount_to_read = m_download_quota;
|
|
if (m_download_quota == 0)
|
|
{
|
|
if (!m_limiter_timer_active)
|
|
{
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_assign_bandwidth");
|
|
on_assign_bandwidth(error_code());
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_read");
|
|
m_sock.async_read_some(boost::asio::buffer(m_recvbuffer.data() + m_read_pos
|
|
, std::size_t(amount_to_read))
|
|
, std::bind(&http_connection::on_read
|
|
, me, _1, _2));
|
|
}
|
|
|
|
void http_connection::on_assign_bandwidth(error_code const& e)
|
|
{
|
|
COMPLETE_ASYNC("http_connection::on_assign_bandwidth");
|
|
if ((e == boost::asio::error::operation_aborted
|
|
&& m_limiter_timer_active)
|
|
|| !m_sock.is_open())
|
|
{
|
|
callback(boost::asio::error::eof);
|
|
return;
|
|
}
|
|
m_limiter_timer_active = false;
|
|
if (e) return;
|
|
|
|
if (m_download_quota > 0) return;
|
|
|
|
m_download_quota = m_rate_limit / 4;
|
|
|
|
int amount_to_read = int(m_recvbuffer.size()) - m_read_pos;
|
|
if (amount_to_read > m_download_quota)
|
|
amount_to_read = m_download_quota;
|
|
|
|
if (!m_sock.is_open()) return;
|
|
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_read");
|
|
m_sock.async_read_some(boost::asio::buffer(m_recvbuffer.data() + m_read_pos
|
|
, std::size_t(amount_to_read))
|
|
, std::bind(&http_connection::on_read
|
|
, shared_from_this(), _1, _2));
|
|
|
|
error_code ec;
|
|
m_limiter_timer_active = true;
|
|
m_limiter_timer.expires_from_now(milliseconds(250), ec);
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_assign_bandwidth");
|
|
m_limiter_timer.async_wait(std::bind(&http_connection::on_assign_bandwidth
|
|
, shared_from_this(), _1));
|
|
}
|
|
|
|
void http_connection::rate_limit(int limit)
|
|
{
|
|
if (!m_sock.is_open()) return;
|
|
|
|
if (!m_limiter_timer_active)
|
|
{
|
|
error_code ec;
|
|
m_limiter_timer_active = true;
|
|
m_limiter_timer.expires_from_now(milliseconds(250), ec);
|
|
ADD_OUTSTANDING_ASYNC("http_connection::on_assign_bandwidth");
|
|
m_limiter_timer.async_wait(std::bind(&http_connection::on_assign_bandwidth
|
|
, shared_from_this(), _1));
|
|
}
|
|
m_rate_limit = limit;
|
|
}
|
|
|
|
}
|