2021-04-23 22:45:52 +02:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <AK/Badge.h>
|
2024-04-10 16:02:40 -06:00
|
|
|
#include <AK/IDAllocator.h>
|
2022-03-17 19:33:13 +03:30
|
|
|
#include <AK/NonnullOwnPtr.h>
|
2024-01-04 16:40:20 +00:00
|
|
|
#include <AK/RefCounted.h>
|
|
|
|
#include <AK/Weakable.h>
|
2022-04-07 21:10:33 +04:30
|
|
|
#include <LibCore/Proxy.h>
|
2024-01-29 10:20:58 +01:00
|
|
|
#include <LibCore/Socket.h>
|
2024-03-06 01:50:52 +01:00
|
|
|
#include <LibWebSocket/ConnectionInfo.h>
|
|
|
|
#include <LibWebSocket/Message.h>
|
2022-02-25 12:18:30 +02:00
|
|
|
#include <RequestServer/ConnectionFromClient.h>
|
2021-04-23 22:45:52 +02:00
|
|
|
#include <RequestServer/Protocol.h>
|
|
|
|
#include <RequestServer/Request.h>
|
|
|
|
#include <RequestServer/RequestClientEndpoint.h>
|
2021-09-28 00:06:52 +03:30
|
|
|
#include <netdb.h>
|
2021-04-23 22:45:52 +02:00
|
|
|
|
|
|
|
namespace RequestServer {
|
|
|
|
|
2022-02-25 12:18:30 +02:00
|
|
|
static HashMap<int, RefPtr<ConnectionFromClient>> s_connections;
|
2024-04-10 16:02:40 -06:00
|
|
|
static IDAllocator s_client_ids;
|
2021-04-23 22:45:52 +02:00
|
|
|
|
2023-02-08 23:05:44 +01:00
|
|
|
ConnectionFromClient::ConnectionFromClient(NonnullOwnPtr<Core::LocalSocket> socket)
|
2024-04-10 16:02:40 -06:00
|
|
|
: IPC::ConnectionFromClient<RequestClientEndpoint, RequestServerEndpoint>(*this, move(socket), s_client_ids.allocate())
|
2024-05-08 20:15:05 +02:00
|
|
|
, m_thread_pool([this](Work work) { worker_do_work(move(work)); })
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2024-04-10 16:02:40 -06:00
|
|
|
s_connections.set(client_id(), *this);
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
|
|
|
|
2024-05-08 20:15:05 +02:00
|
|
|
class Job : public RefCounted<Job>
|
|
|
|
, public Weakable<Job> {
|
|
|
|
public:
|
|
|
|
static NonnullRefPtr<Job> ensure(URL::URL const& url)
|
|
|
|
{
|
|
|
|
RefPtr<Job> job;
|
|
|
|
if (auto it = s_jobs.find(url); it != s_jobs.end())
|
|
|
|
job = it->value.strong_ref();
|
|
|
|
if (job == nullptr) {
|
|
|
|
job = adopt_ref(*new Job(url));
|
|
|
|
s_jobs.set(url, job);
|
|
|
|
}
|
|
|
|
return *job;
|
|
|
|
}
|
|
|
|
|
|
|
|
void start(Core::Socket& socket)
|
|
|
|
{
|
|
|
|
auto is_connected = socket.is_open();
|
|
|
|
VERIFY(is_connected);
|
|
|
|
ConnectionCache::request_did_finish(m_url, &socket);
|
|
|
|
}
|
|
|
|
|
|
|
|
void fail(Core::NetworkJob::Error error)
|
|
|
|
{
|
|
|
|
dbgln("Pre-connect to {} failed: {}", m_url, Core::to_string(error));
|
|
|
|
}
|
|
|
|
|
|
|
|
void will_be_destroyed() const
|
|
|
|
{
|
|
|
|
s_jobs.remove(m_url);
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
explicit Job(URL::URL url)
|
|
|
|
: m_url(move(url))
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
URL::URL m_url;
|
|
|
|
inline static HashMap<URL::URL, WeakPtr<Job>> s_jobs {};
|
|
|
|
};
|
|
|
|
|
|
|
|
template<typename Pool>
|
|
|
|
IterationDecision ConnectionFromClient::Looper<Pool>::next(Pool& pool, bool wait)
|
|
|
|
{
|
|
|
|
bool should_exit = false;
|
|
|
|
auto timer = Core::Timer::create_repeating(100, [&] {
|
|
|
|
if (Threading::ThreadPoolLooper<Pool>::next(pool, false) == IterationDecision::Break) {
|
|
|
|
event_loop.quit(0);
|
|
|
|
should_exit = true;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
timer->start();
|
|
|
|
if (!wait) {
|
|
|
|
event_loop.deferred_invoke([&] {
|
|
|
|
event_loop.quit(0);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
event_loop.exec();
|
|
|
|
|
|
|
|
if (should_exit)
|
|
|
|
return IterationDecision::Break;
|
|
|
|
return IterationDecision::Continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
void ConnectionFromClient::worker_do_work(Work work)
|
|
|
|
{
|
|
|
|
work.visit(
|
|
|
|
[&](StartRequest& start_request) {
|
|
|
|
auto* protocol = Protocol::find_by_name(start_request.url.scheme().to_byte_string());
|
|
|
|
if (!protocol) {
|
|
|
|
dbgln("StartRequest: No protocol handler for URL: '{}'", start_request.url);
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-05-08 20:15:05 +02:00
|
|
|
(void)post_message(Messages::RequestClient::RequestFinished(start_request.request_id, false, 0));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto request = protocol->start_request(start_request.request_id, *this, start_request.method, start_request.url, start_request.request_headers, start_request.request_body, start_request.proxy_data);
|
|
|
|
if (!request) {
|
|
|
|
dbgln("StartRequest: Protocol handler failed to start request: '{}'", start_request.url);
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-05-08 20:15:05 +02:00
|
|
|
(void)post_message(Messages::RequestClient::RequestFinished(start_request.request_id, false, 0));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto id = request->id();
|
|
|
|
auto fd = request->request_fd();
|
|
|
|
m_requests.with_locked([&](auto& map) { map.set(id, move(request)); });
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-05-08 20:15:05 +02:00
|
|
|
(void)post_message(Messages::RequestClient::RequestStarted(start_request.request_id, IPC::File::adopt_fd(fd)));
|
|
|
|
},
|
|
|
|
[&](EnsureConnection& ensure_connection) {
|
|
|
|
auto& url = ensure_connection.url;
|
|
|
|
auto& cache_level = ensure_connection.cache_level;
|
|
|
|
|
|
|
|
if (cache_level == CacheLevel::ResolveOnly) {
|
|
|
|
Core::deferred_invoke([host = url.serialized_host().release_value_but_fixme_should_propagate_errors().to_byte_string()] {
|
|
|
|
dbgln("EnsureConnection: DNS-preload for {}", host);
|
|
|
|
auto resolved_host = Core::Socket::resolve_host(host, Core::Socket::SocketType::Stream);
|
|
|
|
if (resolved_host.is_error())
|
|
|
|
dbgln("EnsureConnection: DNS-preload failed for {}", host);
|
|
|
|
});
|
|
|
|
dbgln("EnsureConnection: DNS-preload for {} done", url);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto job = Job::ensure(url);
|
|
|
|
dbgln("EnsureConnection: Pre-connect to {}", url);
|
|
|
|
auto do_preconnect = [&](auto& cache) {
|
|
|
|
ConnectionCache::ensure_connection(cache, url, job);
|
|
|
|
};
|
|
|
|
|
|
|
|
if (url.scheme() == "http"sv)
|
|
|
|
do_preconnect(ConnectionCache::g_tcp_connection_cache);
|
|
|
|
else if (url.scheme() == "https"sv)
|
|
|
|
do_preconnect(ConnectionCache::g_tls_connection_cache);
|
|
|
|
else
|
|
|
|
dbgln("EnsureConnection: Invalid URL scheme: '{}'", url.scheme());
|
|
|
|
},
|
|
|
|
[&](Empty) {});
|
|
|
|
}
|
|
|
|
|
2022-02-25 12:18:30 +02:00
|
|
|
void ConnectionFromClient::die()
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2024-04-10 16:02:40 -06:00
|
|
|
auto client_id = this->client_id();
|
|
|
|
s_connections.remove(client_id);
|
|
|
|
s_client_ids.deallocate(client_id);
|
|
|
|
|
2021-04-23 22:45:52 +02:00
|
|
|
if (s_connections.is_empty())
|
|
|
|
Core::EventLoop::current().quit(0);
|
|
|
|
}
|
|
|
|
|
2024-04-10 16:02:40 -06:00
|
|
|
Messages::RequestServer::ConnectNewClientResponse ConnectionFromClient::connect_new_client()
|
|
|
|
{
|
|
|
|
int socket_fds[2] {};
|
|
|
|
if (auto err = Core::System::socketpair(AF_LOCAL, SOCK_STREAM, 0, socket_fds); err.is_error()) {
|
|
|
|
dbgln("Failed to create client socketpair: {}", err.error());
|
2024-04-17 18:44:39 -06:00
|
|
|
return IPC::File {};
|
2024-04-10 16:02:40 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
auto client_socket_or_error = Core::LocalSocket::adopt_fd(socket_fds[0]);
|
|
|
|
if (client_socket_or_error.is_error()) {
|
|
|
|
close(socket_fds[0]);
|
|
|
|
close(socket_fds[1]);
|
|
|
|
dbgln("Failed to adopt client socket: {}", client_socket_or_error.error());
|
2024-04-17 18:44:39 -06:00
|
|
|
return IPC::File {};
|
2024-04-10 16:02:40 -06:00
|
|
|
}
|
|
|
|
auto client_socket = client_socket_or_error.release_value();
|
|
|
|
// Note: A ref is stored in the static s_connections map
|
|
|
|
auto client = adopt_ref(*new ConnectionFromClient(move(client_socket)));
|
|
|
|
|
2024-04-17 18:44:39 -06:00
|
|
|
return IPC::File::adopt_fd(socket_fds[1]);
|
2024-04-10 16:02:40 -06:00
|
|
|
}
|
|
|
|
|
2024-05-08 20:15:05 +02:00
|
|
|
void ConnectionFromClient::enqueue(Work work)
|
|
|
|
{
|
|
|
|
m_thread_pool.submit(move(work));
|
|
|
|
}
|
|
|
|
|
2023-12-16 17:49:34 +03:30
|
|
|
Messages::RequestServer::IsSupportedProtocolResponse ConnectionFromClient::is_supported_protocol(ByteString const& protocol)
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2021-05-02 19:54:34 +02:00
|
|
|
bool supported = Protocol::find_by_name(protocol.to_lowercase());
|
2021-05-02 04:39:36 +02:00
|
|
|
return supported;
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
|
|
|
|
2024-06-09 13:46:04 +02:00
|
|
|
void ConnectionFromClient::start_request(i32 request_id, ByteString const& method, URL::URL const& url, HTTP::HeaderMap const& request_headers, ByteBuffer const& request_body, Core::ProxyData const& proxy_data)
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
|
|
|
if (!url.is_valid()) {
|
|
|
|
dbgln("StartRequest: Invalid URL requested: '{}'", url);
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-02-24 14:36:57 +01:00
|
|
|
(void)post_message(Messages::RequestClient::RequestFinished(request_id, false, 0));
|
|
|
|
return;
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
2024-02-24 14:36:57 +01:00
|
|
|
|
2024-07-16 10:21:31 +02:00
|
|
|
auto headers = request_headers;
|
|
|
|
if (!headers.contains("Accept-Encoding"))
|
|
|
|
headers.set("Accept-Encoding", "gzip, deflate, br");
|
|
|
|
|
2024-05-08 20:15:05 +02:00
|
|
|
enqueue(StartRequest {
|
|
|
|
.request_id = request_id,
|
|
|
|
.method = method,
|
|
|
|
.url = url,
|
2024-07-16 10:21:31 +02:00
|
|
|
.request_headers = move(headers),
|
2024-05-08 20:15:05 +02:00
|
|
|
.request_body = request_body,
|
|
|
|
.proxy_data = proxy_data,
|
|
|
|
});
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
|
|
|
|
2022-02-25 12:18:30 +02:00
|
|
|
Messages::RequestServer::StopRequestResponse ConnectionFromClient::stop_request(i32 request_id)
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2024-05-08 20:15:05 +02:00
|
|
|
return m_requests.with_locked([&](auto& map) {
|
|
|
|
auto* request = const_cast<Request*>(map.get(request_id).value_or(nullptr));
|
|
|
|
bool success = false;
|
|
|
|
if (request) {
|
|
|
|
request->stop();
|
|
|
|
map.remove(request_id);
|
|
|
|
success = true;
|
|
|
|
}
|
|
|
|
return success;
|
|
|
|
});
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
|
|
|
|
2022-02-25 12:18:30 +02:00
|
|
|
void ConnectionFromClient::did_receive_headers(Badge<Request>, Request& request)
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-06-09 11:28:37 +02:00
|
|
|
async_headers_became_available(request.id(), request.response_headers(), request.status_code());
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
|
|
|
|
2022-02-25 12:18:30 +02:00
|
|
|
void ConnectionFromClient::did_finish_request(Badge<Request>, Request& request, bool success)
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2024-05-19 18:12:28 +02:00
|
|
|
if (request.total_size().has_value()) {
|
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2022-06-20 17:43:35 +02:00
|
|
|
async_request_finished(request.id(), success, request.total_size().value());
|
2024-05-19 18:12:28 +02:00
|
|
|
}
|
2021-04-23 22:45:52 +02:00
|
|
|
|
2024-05-08 20:15:05 +02:00
|
|
|
m_requests.with_locked([&](auto& map) { map.remove(request.id()); });
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
|
|
|
|
2022-02-25 12:18:30 +02:00
|
|
|
void ConnectionFromClient::did_progress_request(Badge<Request>, Request& request)
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2021-05-03 13:33:59 +02:00
|
|
|
async_request_progress(request.id(), request.total_size(), request.downloaded_size());
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
|
|
|
|
2022-02-25 12:18:30 +02:00
|
|
|
void ConnectionFromClient::did_request_certificates(Badge<Request>, Request& request)
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2021-05-03 13:33:59 +02:00
|
|
|
async_certificate_requested(request.id());
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|
|
|
|
|
2023-12-16 17:49:34 +03:30
|
|
|
Messages::RequestServer::SetCertificateResponse ConnectionFromClient::set_certificate(i32 request_id, ByteString const& certificate, ByteString const& key)
|
2021-04-23 22:45:52 +02:00
|
|
|
{
|
2024-05-08 20:15:05 +02:00
|
|
|
return m_requests.with_locked([&](auto& map) {
|
|
|
|
auto* request = const_cast<Request*>(map.get(request_id).value_or(nullptr));
|
|
|
|
bool success = false;
|
|
|
|
if (request) {
|
|
|
|
request->set_certificate(certificate, key);
|
|
|
|
success = true;
|
2022-03-17 19:33:13 +03:30
|
|
|
}
|
2024-05-08 20:15:05 +02:00
|
|
|
return success;
|
|
|
|
});
|
|
|
|
}
|
2022-03-17 19:33:13 +03:30
|
|
|
|
2024-03-18 16:22:27 +13:00
|
|
|
void ConnectionFromClient::ensure_connection(URL::URL const& url, ::RequestServer::CacheLevel const& cache_level)
|
2021-09-28 00:06:52 +03:30
|
|
|
{
|
|
|
|
if (!url.is_valid()) {
|
|
|
|
dbgln("EnsureConnection: Invalid URL requested: '{}'", url);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2024-05-08 20:15:05 +02:00
|
|
|
enqueue(EnsureConnection {
|
|
|
|
.url = url,
|
|
|
|
.cache_level = cache_level,
|
|
|
|
});
|
2021-09-28 00:06:52 +03:30
|
|
|
}
|
|
|
|
|
2024-03-06 01:50:52 +01:00
|
|
|
static i32 s_next_websocket_id = 1;
|
2024-06-22 10:28:14 +02:00
|
|
|
Messages::RequestServer::WebsocketConnectResponse ConnectionFromClient::websocket_connect(URL::URL const& url, ByteString const& origin, Vector<ByteString> const& protocols, Vector<ByteString> const& extensions, HTTP::HeaderMap const& additional_request_headers)
|
2024-03-06 01:50:52 +01:00
|
|
|
{
|
|
|
|
if (!url.is_valid()) {
|
|
|
|
dbgln("WebSocket::Connect: Invalid URL requested: '{}'", url);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
WebSocket::ConnectionInfo connection_info(url);
|
|
|
|
connection_info.set_origin(origin);
|
|
|
|
connection_info.set_protocols(protocols);
|
|
|
|
connection_info.set_extensions(extensions);
|
2024-06-22 10:28:14 +02:00
|
|
|
connection_info.set_headers(additional_request_headers);
|
2024-03-06 01:50:52 +01:00
|
|
|
|
|
|
|
auto id = ++s_next_websocket_id;
|
|
|
|
auto connection = WebSocket::WebSocket::create(move(connection_info));
|
|
|
|
connection->on_open = [this, id]() {
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-03-06 01:50:52 +01:00
|
|
|
async_websocket_connected(id);
|
|
|
|
};
|
|
|
|
connection->on_message = [this, id](auto message) {
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-03-06 01:50:52 +01:00
|
|
|
async_websocket_received(id, message.is_text(), message.data());
|
|
|
|
};
|
|
|
|
connection->on_error = [this, id](auto message) {
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-03-06 01:50:52 +01:00
|
|
|
async_websocket_errored(id, (i32)message);
|
|
|
|
};
|
|
|
|
connection->on_close = [this, id](u16 code, ByteString reason, bool was_clean) {
|
2024-05-19 18:12:28 +02:00
|
|
|
auto lock = Threading::MutexLocker(m_ipc_mutex);
|
2024-03-06 01:50:52 +01:00
|
|
|
async_websocket_closed(id, code, move(reason), was_clean);
|
|
|
|
};
|
|
|
|
|
|
|
|
connection->start();
|
|
|
|
m_websockets.set(id, move(connection));
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
|
|
|
Messages::RequestServer::WebsocketReadyStateResponse ConnectionFromClient::websocket_ready_state(i32 connection_id)
|
|
|
|
{
|
|
|
|
if (auto connection = m_websockets.get(connection_id).value_or({}))
|
|
|
|
return (u32)connection->ready_state();
|
|
|
|
return (u32)WebSocket::ReadyState::Closed;
|
|
|
|
}
|
|
|
|
|
|
|
|
Messages::RequestServer::WebsocketSubprotocolInUseResponse ConnectionFromClient::websocket_subprotocol_in_use(i32 connection_id)
|
|
|
|
{
|
|
|
|
if (auto connection = m_websockets.get(connection_id).value_or({}))
|
|
|
|
return connection->subprotocol_in_use();
|
|
|
|
return ByteString::empty();
|
|
|
|
}
|
|
|
|
|
|
|
|
void ConnectionFromClient::websocket_send(i32 connection_id, bool is_text, ByteBuffer const& data)
|
|
|
|
{
|
|
|
|
if (auto connection = m_websockets.get(connection_id).value_or({}); connection && connection->ready_state() == WebSocket::ReadyState::Open)
|
|
|
|
connection->send(WebSocket::Message { data, is_text });
|
|
|
|
}
|
|
|
|
|
|
|
|
void ConnectionFromClient::websocket_close(i32 connection_id, u16 code, ByteString const& reason)
|
|
|
|
{
|
|
|
|
if (auto connection = m_websockets.get(connection_id).value_or({}); connection && connection->ready_state() == WebSocket::ReadyState::Open)
|
|
|
|
connection->close(code, reason);
|
|
|
|
}
|
|
|
|
|
|
|
|
Messages::RequestServer::WebsocketSetCertificateResponse ConnectionFromClient::websocket_set_certificate(i32 connection_id, ByteString const&, ByteString const&)
|
|
|
|
{
|
|
|
|
auto success = false;
|
|
|
|
if (auto connection = m_websockets.get(connection_id).value_or({}); connection) {
|
|
|
|
// NO OP here
|
|
|
|
// connection->set_certificate(certificate, key);
|
|
|
|
success = true;
|
|
|
|
}
|
|
|
|
return success;
|
|
|
|
}
|
|
|
|
|
2021-04-23 22:45:52 +02:00
|
|
|
}
|