2021-02-19 03:20:41 +00:00
|
|
|
#if 0
|
|
|
|
/*─────────────────────────────────────────────────────────────────╗
|
|
|
|
│ To the extent possible under law, Justine Tunney has waived │
|
|
|
|
│ all copyright and related or neighboring rights to this file, │
|
|
|
|
│ as it is written in the following disclaimers: │
|
|
|
|
│ • http://unlicense.org/ │
|
|
|
|
│ • http://creativecommons.org/publicdomain/zero/1.0/ │
|
|
|
|
╚─────────────────────────────────────────────────────────────────*/
|
|
|
|
#endif
|
2021-07-06 20:39:18 +00:00
|
|
|
#include "libc/calls/calls.h"
|
2021-07-09 04:54:21 +00:00
|
|
|
#include "libc/calls/struct/iovec.h"
|
2021-07-08 04:44:27 +00:00
|
|
|
#include "libc/dce.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/dns/dns.h"
|
2021-07-06 20:39:18 +00:00
|
|
|
#include "libc/errno.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/fmt/conv.h"
|
|
|
|
#include "libc/fmt/fmt.h"
|
2022-09-13 06:10:38 +00:00
|
|
|
#include "libc/intrin/safemacros.internal.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/log/check.h"
|
|
|
|
#include "libc/log/log.h"
|
2021-03-01 07:42:35 +00:00
|
|
|
#include "libc/macros.internal.h"
|
2022-09-13 06:10:38 +00:00
|
|
|
#include "libc/mem/gc.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/runtime/runtime.h"
|
2021-08-14 13:17:56 +00:00
|
|
|
#include "libc/sock/goodsocket.internal.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/sock/sock.h"
|
2022-09-13 06:10:38 +00:00
|
|
|
#include "libc/stdio/append.h"
|
|
|
|
#include "libc/stdio/rand.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/stdio/stdio.h"
|
2021-08-14 13:17:56 +00:00
|
|
|
#include "libc/str/slice.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/str/str.h"
|
|
|
|
#include "libc/sysv/consts/af.h"
|
2021-07-06 20:39:18 +00:00
|
|
|
#include "libc/sysv/consts/dt.h"
|
2021-07-08 04:44:27 +00:00
|
|
|
#include "libc/sysv/consts/ex.h"
|
|
|
|
#include "libc/sysv/consts/exit.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/sysv/consts/ipproto.h"
|
|
|
|
#include "libc/sysv/consts/shut.h"
|
Make improvements to redbean
The following Lua APIs have been added:
- IsDaemon() → bool
- ProgramPidPath(str)
The following Lua hooks have been added:
- OnClientConnection(ip:int,port:int,serverip:int,serverport:int) → bool
- OnProcessCreate(pid:int,ip:int,port:int,serverip:int,serverport:int)
- OnProcessDestroy(pid:int)
- OnServerStart()
- OnServerStop()
- OnWorkerStart()
- OnWorkerStop()
redbean now does a better job at applying gzip on the fly from the local
filesystem, using a streaming chunked api with constant memory, which is
useful for doing things like serving a 4gb text file off NFS, and having
it start transmitting in milliseconds. redbean will also compute entropy
on the beginnings of files to determine if compression is profitable.
This change pays off technical debts relating to memory, such as relying
on exit() to free() allocations. That's now mostly fixed so it should be
easier now to spot memory leaks in malloc traces.
This change also fixes bugs and makes improvements to our SSL support.
Uniprocess mode failed handshakes are no longer an issue. Token Alpn is
offered so curl -v looks less weird. Hybrid SSL certificate loading is
now smarter about naming conflicts. Self-signed CA root anchors will no
longer be delivered to the client during the handshake.
2021-07-10 22:02:03 +00:00
|
|
|
#include "libc/sysv/consts/sig.h"
|
2021-07-08 04:44:27 +00:00
|
|
|
#include "libc/sysv/consts/so.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/sysv/consts/sock.h"
|
2021-07-08 04:44:27 +00:00
|
|
|
#include "libc/sysv/consts/sol.h"
|
|
|
|
#include "libc/sysv/consts/tcp.h"
|
|
|
|
#include "libc/time/struct/tm.h"
|
2021-02-19 03:20:41 +00:00
|
|
|
#include "libc/x/x.h"
|
2022-09-13 06:10:38 +00:00
|
|
|
#include "libc/x/xsigaction.h"
|
2021-04-21 02:14:21 +00:00
|
|
|
#include "net/http/http.h"
|
|
|
|
#include "net/http/url.h"
|
2021-07-08 04:44:27 +00:00
|
|
|
#include "net/https/https.h"
|
2021-07-19 21:55:20 +00:00
|
|
|
#include "net/https/sslcache.h"
|
2023-07-03 02:57:43 +00:00
|
|
|
#include "third_party/getopt/getopt.internal.h"
|
2021-07-06 20:39:18 +00:00
|
|
|
#include "third_party/mbedtls/ctr_drbg.h"
|
|
|
|
#include "third_party/mbedtls/debug.h"
|
|
|
|
#include "third_party/mbedtls/error.h"
|
2021-07-08 04:44:27 +00:00
|
|
|
#include "third_party/mbedtls/pk.h"
|
2021-07-06 20:39:18 +00:00
|
|
|
#include "third_party/mbedtls/ssl.h"
|
2021-07-19 21:55:20 +00:00
|
|
|
#include "third_party/mbedtls/ssl_ticket.h"
|
2022-12-22 00:12:02 +00:00
|
|
|
#include "tool/curl/cmd.h"
|
2021-07-06 20:39:18 +00:00
|
|
|
|
2021-02-19 03:20:41 +00:00
|
|
|
/**
|
|
|
|
* @fileoverview Downloads HTTP URL to stdout.
|
|
|
|
*/
|
|
|
|
|
2021-07-08 04:44:27 +00:00
|
|
|
#define HasHeader(H) (!!msg.headers[H].a)
|
|
|
|
#define HeaderData(H) (p + msg.headers[H].a)
|
|
|
|
#define HeaderLength(H) (msg.headers[H].b - msg.headers[H].a)
|
|
|
|
#define HeaderEqualCase(H, S) \
|
|
|
|
SlicesEqualCase(S, strlen(S), HeaderData(H), HeaderLength(H))
|
|
|
|
|
2022-03-16 20:33:13 +00:00
|
|
|
int sock;
|
|
|
|
|
2021-07-08 04:44:27 +00:00
|
|
|
static bool TuneSocket(int fd, int a, int b, int x) {
|
|
|
|
if (!b) return false;
|
|
|
|
return setsockopt(fd, a, b, &x, sizeof(x)) != -1;
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
|
|
|
|
2022-03-16 20:33:13 +00:00
|
|
|
static void Write(const void *p, size_t n) {
|
|
|
|
ssize_t rc;
|
|
|
|
rc = write(1, p, n);
|
|
|
|
if (rc == -1 && errno == EPIPE) {
|
|
|
|
close(sock);
|
|
|
|
exit(128 + SIGPIPE);
|
|
|
|
}
|
|
|
|
if (rc != n) {
|
|
|
|
fprintf(stderr, "write failed: %m\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-08 04:44:27 +00:00
|
|
|
static int TlsSend(void *c, const unsigned char *p, size_t n) {
|
2021-07-06 20:39:18 +00:00
|
|
|
int rc;
|
2021-07-19 21:55:20 +00:00
|
|
|
NOISEF("begin send %zu", n);
|
2021-07-08 04:44:27 +00:00
|
|
|
CHECK_NE(-1, (rc = write(*(int *)c, p, n)));
|
2021-07-19 21:55:20 +00:00
|
|
|
NOISEF("end send %zu", n);
|
2021-07-06 20:39:18 +00:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2021-07-09 04:54:21 +00:00
|
|
|
static int TlsRecv(void *c, unsigned char *p, size_t n, uint32_t o) {
|
|
|
|
int r;
|
|
|
|
struct iovec v[2];
|
|
|
|
static unsigned a, b;
|
|
|
|
static unsigned char t[4096];
|
|
|
|
if (a < b) {
|
|
|
|
r = MIN(n, b - a);
|
|
|
|
memcpy(p, t + a, r);
|
|
|
|
if ((a += r) == b) a = b = 0;
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
v[0].iov_base = p;
|
|
|
|
v[0].iov_len = n;
|
|
|
|
v[1].iov_base = t;
|
|
|
|
v[1].iov_len = sizeof(t);
|
2021-07-19 21:55:20 +00:00
|
|
|
NOISEF("begin recv %zu", n + sizeof(t) - b);
|
2021-07-09 04:54:21 +00:00
|
|
|
CHECK_NE(-1, (r = readv(*(int *)c, v, 2)));
|
2021-07-19 21:55:20 +00:00
|
|
|
NOISEF("end recv %zu", r);
|
2021-07-09 04:54:21 +00:00
|
|
|
if (r > n) b = r - n;
|
|
|
|
return MIN(n, r);
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
|
|
|
|
2021-07-08 04:44:27 +00:00
|
|
|
static wontreturn void PrintUsage(FILE *f, int rc) {
|
2022-12-24 01:06:48 +00:00
|
|
|
fprintf(f, "usage: %s [-iksvV] URL\n", program_invocation_name);
|
2021-07-08 04:44:27 +00:00
|
|
|
exit(rc);
|
|
|
|
}
|
|
|
|
|
2022-12-22 00:12:02 +00:00
|
|
|
int _curl(int argc, char *argv[]) {
|
2022-03-21 10:46:16 +00:00
|
|
|
if (!NoDebug()) ShowCrashReports();
|
2021-07-08 04:44:27 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Read flags.
|
|
|
|
*/
|
|
|
|
int opt;
|
|
|
|
struct Headers {
|
|
|
|
size_t n;
|
|
|
|
char **p;
|
|
|
|
} headers = {0};
|
2022-12-24 01:06:48 +00:00
|
|
|
int method = 0;
|
2021-07-08 04:44:27 +00:00
|
|
|
bool authmode = MBEDTLS_SSL_VERIFY_REQUIRED;
|
2022-12-24 01:06:48 +00:00
|
|
|
bool includeheaders = false;
|
|
|
|
const char *postdata = NULL;
|
2021-07-08 04:44:27 +00:00
|
|
|
const char *agent = "hurl/1.o (https://github.com/jart/cosmopolitan)";
|
2021-07-19 21:55:20 +00:00
|
|
|
__log_level = kLogWarn;
|
2022-12-24 01:06:48 +00:00
|
|
|
while ((opt = getopt(argc, argv, "qiksvVIX:H:A:d:")) != -1) {
|
2021-07-08 04:44:27 +00:00
|
|
|
switch (opt) {
|
|
|
|
case 's':
|
|
|
|
case 'q':
|
|
|
|
break;
|
|
|
|
case 'v':
|
2021-07-09 04:54:21 +00:00
|
|
|
++__log_level;
|
2021-07-08 04:44:27 +00:00
|
|
|
break;
|
2022-12-24 01:06:48 +00:00
|
|
|
case 'i':
|
|
|
|
includeheaders = true;
|
|
|
|
break;
|
2021-07-08 04:44:27 +00:00
|
|
|
case 'I':
|
|
|
|
method = kHttpHead;
|
|
|
|
break;
|
|
|
|
case 'A':
|
|
|
|
agent = optarg;
|
|
|
|
break;
|
|
|
|
case 'H':
|
|
|
|
headers.p = realloc(headers.p, ++headers.n * sizeof(*headers.p));
|
|
|
|
headers.p[headers.n - 1] = optarg;
|
|
|
|
break;
|
2022-12-24 01:06:48 +00:00
|
|
|
case 'd':
|
|
|
|
postdata = optarg;
|
|
|
|
break;
|
2021-07-08 04:44:27 +00:00
|
|
|
case 'X':
|
|
|
|
CHECK((method = GetHttpMethod(optarg, strlen(optarg))));
|
|
|
|
break;
|
|
|
|
case 'V':
|
|
|
|
++mbedtls_debug_threshold;
|
|
|
|
break;
|
|
|
|
case 'k':
|
|
|
|
authmode = MBEDTLS_SSL_VERIFY_NONE;
|
|
|
|
break;
|
|
|
|
case 'h':
|
|
|
|
PrintUsage(stdout, EXIT_SUCCESS);
|
|
|
|
default:
|
|
|
|
PrintUsage(stderr, EX_USAGE);
|
|
|
|
}
|
|
|
|
}
|
2021-04-21 02:14:21 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Get argument.
|
|
|
|
*/
|
|
|
|
const char *urlarg;
|
2021-07-08 04:44:27 +00:00
|
|
|
if (optind == argc) PrintUsage(stderr, EX_USAGE);
|
|
|
|
urlarg = argv[optind];
|
2021-04-21 02:14:21 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Parse URL.
|
|
|
|
*/
|
|
|
|
struct Url url;
|
|
|
|
char *host, *port;
|
2021-07-06 20:39:18 +00:00
|
|
|
bool usessl = false;
|
2022-09-20 02:23:24 +00:00
|
|
|
_gc(ParseUrl(urlarg, -1, &url, kUrlPlus));
|
2021-04-21 02:14:21 +00:00
|
|
|
_gc(url.params.p);
|
2021-07-06 20:39:18 +00:00
|
|
|
if (url.scheme.n) {
|
|
|
|
if (url.scheme.n == 5 && !memcasecmp(url.scheme.p, "https", 5)) {
|
|
|
|
usessl = true;
|
|
|
|
} else if (!(url.scheme.n == 4 && !memcasecmp(url.scheme.p, "http", 4))) {
|
|
|
|
fprintf(stderr, "error: not an http/https url: %s\n", urlarg);
|
|
|
|
exit(1);
|
|
|
|
}
|
2021-04-21 02:14:21 +00:00
|
|
|
}
|
2021-07-08 04:44:27 +00:00
|
|
|
if (url.host.n) {
|
|
|
|
host = _gc(strndup(url.host.p, url.host.n));
|
|
|
|
if (url.port.n) {
|
|
|
|
port = _gc(strndup(url.port.p, url.port.n));
|
|
|
|
} else {
|
|
|
|
port = usessl ? "443" : "80";
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
host = "127.0.0.1";
|
|
|
|
port = usessl ? "443" : "80";
|
|
|
|
}
|
2021-04-21 02:14:21 +00:00
|
|
|
if (!IsAcceptableHost(host, -1)) {
|
2021-07-06 20:39:18 +00:00
|
|
|
fprintf(stderr, "error: invalid host: %s\n", urlarg);
|
2021-04-21 02:14:21 +00:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
url.fragment.p = 0, url.fragment.n = 0;
|
|
|
|
url.scheme.p = 0, url.scheme.n = 0;
|
|
|
|
url.user.p = 0, url.user.n = 0;
|
|
|
|
url.pass.p = 0, url.pass.n = 0;
|
|
|
|
url.host.p = 0, url.host.n = 0;
|
|
|
|
url.port.p = 0, url.port.n = 0;
|
|
|
|
if (!url.path.n || url.path.p[0] != '/') {
|
|
|
|
char *p = _gc(xmalloc(1 + url.path.n));
|
|
|
|
mempcpy(mempcpy(p, "/", 1), url.path.p, url.path.n);
|
|
|
|
url.path.p = p;
|
|
|
|
++url.path.n;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create HTTP message.
|
|
|
|
*/
|
2022-12-24 01:06:48 +00:00
|
|
|
if (!method) method = postdata ? kHttpPost : kHttpGet;
|
|
|
|
|
2021-07-19 21:55:20 +00:00
|
|
|
char *request = 0;
|
|
|
|
appendf(&request,
|
|
|
|
"%s %s HTTP/1.1\r\n"
|
|
|
|
"Connection: close\r\n"
|
|
|
|
"User-Agent: %s\r\n",
|
2022-12-24 01:06:48 +00:00
|
|
|
kHttpMethod[method], _gc(EncodeUrl(&url, 0)), agent);
|
|
|
|
|
|
|
|
bool senthost = false, sentcontenttype = false, sentcontentlength = false;
|
2021-07-08 04:44:27 +00:00
|
|
|
for (int i = 0; i < headers.n; ++i) {
|
2021-07-19 21:55:20 +00:00
|
|
|
appendf(&request, "%s\r\n", headers.p[i]);
|
2023-04-27 03:45:01 +00:00
|
|
|
if (!strncasecmp("Host:", headers.p[i], 5))
|
|
|
|
senthost = true;
|
|
|
|
else if (!strncasecmp("Content-Type:", headers.p[i], 13))
|
|
|
|
sentcontenttype = true;
|
|
|
|
else if (!strncasecmp("Content-Length:", headers.p[i], 15))
|
|
|
|
sentcontentlength = true;
|
2022-12-24 01:06:48 +00:00
|
|
|
}
|
|
|
|
if (!senthost) appendf(&request, "Host: %s:%s\r\n", host, port);
|
|
|
|
if (postdata) {
|
2023-04-27 03:45:01 +00:00
|
|
|
if (!sentcontenttype)
|
|
|
|
appends(&request, "Content-Type: application/x-www-form-urlencoded\r\n");
|
|
|
|
if (!sentcontentlength)
|
|
|
|
appendf(&request, "Content-Length: %d\r\n", strlen(postdata));
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
2021-07-19 21:55:20 +00:00
|
|
|
appendf(&request, "\r\n");
|
2022-12-24 01:06:48 +00:00
|
|
|
if (postdata) appends(&request, postdata);
|
2021-07-06 20:39:18 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Setup crypto.
|
|
|
|
*/
|
|
|
|
mbedtls_ssl_config conf;
|
|
|
|
mbedtls_ssl_context ssl;
|
|
|
|
mbedtls_ctr_drbg_context drbg;
|
|
|
|
if (usessl) {
|
|
|
|
mbedtls_ssl_init(&ssl);
|
|
|
|
mbedtls_ctr_drbg_init(&drbg);
|
|
|
|
mbedtls_ssl_config_init(&conf);
|
2021-07-08 04:44:27 +00:00
|
|
|
CHECK_EQ(0, mbedtls_ctr_drbg_seed(&drbg, GetEntropy, 0, "justine", 7));
|
2021-07-06 20:39:18 +00:00
|
|
|
CHECK_EQ(0, mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_CLIENT,
|
|
|
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
|
|
|
MBEDTLS_SSL_PRESET_DEFAULT));
|
2021-07-08 04:44:27 +00:00
|
|
|
mbedtls_ssl_conf_authmode(&conf, authmode);
|
2022-03-18 09:33:37 +00:00
|
|
|
mbedtls_ssl_conf_ca_chain(&conf, GetSslRoots(), 0);
|
2021-07-06 20:39:18 +00:00
|
|
|
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &drbg);
|
2021-07-08 04:44:27 +00:00
|
|
|
if (!IsTiny()) mbedtls_ssl_conf_dbg(&conf, TlsDebug, 0);
|
2021-07-06 20:39:18 +00:00
|
|
|
CHECK_EQ(0, mbedtls_ssl_setup(&ssl, &conf));
|
|
|
|
CHECK_EQ(0, mbedtls_ssl_set_hostname(&ssl, host));
|
|
|
|
}
|
|
|
|
|
2021-04-21 02:14:21 +00:00
|
|
|
/*
|
|
|
|
* Perform DNS lookup.
|
|
|
|
*/
|
2021-07-06 20:39:18 +00:00
|
|
|
struct addrinfo *addr;
|
2022-12-24 01:06:48 +00:00
|
|
|
struct addrinfo hints = {.ai_family = AF_UNSPEC,
|
2021-02-19 03:20:41 +00:00
|
|
|
.ai_socktype = SOCK_STREAM,
|
|
|
|
.ai_protocol = IPPROTO_TCP,
|
|
|
|
.ai_flags = AI_NUMERICSERV};
|
2021-07-06 20:39:18 +00:00
|
|
|
CHECK_EQ(EAI_SUCCESS, getaddrinfo(host, port, &hints, &addr));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Connect to server.
|
|
|
|
*/
|
2022-03-16 20:33:13 +00:00
|
|
|
int ret;
|
2021-08-14 13:17:56 +00:00
|
|
|
CHECK_NE(-1, (sock = GoodSocket(addr->ai_family, addr->ai_socktype,
|
|
|
|
addr->ai_protocol, false,
|
|
|
|
&(struct timeval){-60})));
|
2021-07-06 20:39:18 +00:00
|
|
|
CHECK_NE(-1, connect(sock, addr->ai_addr, addr->ai_addrlen));
|
2021-07-08 04:44:27 +00:00
|
|
|
freeaddrinfo(addr);
|
2021-07-06 20:39:18 +00:00
|
|
|
if (usessl) {
|
|
|
|
mbedtls_ssl_set_bio(&ssl, &sock, TlsSend, 0, TlsRecv);
|
|
|
|
if ((ret = mbedtls_ssl_handshake(&ssl))) {
|
2021-07-08 04:44:27 +00:00
|
|
|
TlsDie("ssl handshake", ret);
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Send HTTP Message.
|
|
|
|
*/
|
2021-07-19 21:55:20 +00:00
|
|
|
size_t n;
|
|
|
|
n = appendz(request).i;
|
2021-07-06 20:39:18 +00:00
|
|
|
if (usessl) {
|
2021-07-19 21:55:20 +00:00
|
|
|
ret = mbedtls_ssl_write(&ssl, request, n);
|
|
|
|
if (ret != n) TlsDie("ssl write", ret);
|
2021-07-06 20:39:18 +00:00
|
|
|
} else {
|
2021-07-19 21:55:20 +00:00
|
|
|
CHECK_EQ(n, write(sock, request, n));
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
2021-04-21 02:14:21 +00:00
|
|
|
|
2022-03-16 20:33:13 +00:00
|
|
|
xsigaction(SIGPIPE, SIG_IGN, 0, 0, 0);
|
|
|
|
|
2021-07-06 20:39:18 +00:00
|
|
|
/*
|
|
|
|
* Handle response.
|
|
|
|
*/
|
2021-07-08 04:44:27 +00:00
|
|
|
int t;
|
|
|
|
char *p;
|
|
|
|
ssize_t rc;
|
|
|
|
struct HttpMessage msg;
|
|
|
|
struct HttpUnchunker u;
|
2021-07-19 21:55:20 +00:00
|
|
|
size_t g, i, hdrlen, paylen;
|
2021-07-08 04:44:27 +00:00
|
|
|
InitHttpMessage(&msg, kHttpResponse);
|
|
|
|
for (p = 0, hdrlen = paylen = t = i = n = 0;;) {
|
|
|
|
if (i == n) {
|
|
|
|
n += 1000;
|
|
|
|
n += n >> 1;
|
|
|
|
p = realloc(p, n);
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
|
|
|
if (usessl) {
|
2021-07-08 04:44:27 +00:00
|
|
|
if ((rc = mbedtls_ssl_read(&ssl, p + i, n - i)) < 0) {
|
2021-07-06 20:39:18 +00:00
|
|
|
if (rc == MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY) {
|
2021-07-08 04:44:27 +00:00
|
|
|
rc = 0;
|
2021-07-06 20:39:18 +00:00
|
|
|
} else {
|
2021-07-08 04:44:27 +00:00
|
|
|
TlsDie("ssl read", rc);
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2021-07-08 04:44:27 +00:00
|
|
|
CHECK_NE(-1, (rc = read(sock, p + i, n - i)));
|
|
|
|
}
|
|
|
|
g = rc;
|
|
|
|
i += g;
|
|
|
|
switch (t) {
|
|
|
|
case kHttpClientStateHeaders:
|
|
|
|
CHECK(g);
|
|
|
|
CHECK_NE(-1, (rc = ParseHttpMessage(&msg, p, i)));
|
|
|
|
if (rc) {
|
|
|
|
hdrlen = rc;
|
|
|
|
if (100 <= msg.status && msg.status <= 199) {
|
|
|
|
CHECK(!HasHeader(kHttpContentLength) ||
|
|
|
|
HeaderEqualCase(kHttpContentLength, "0"));
|
|
|
|
CHECK(!HasHeader(kHttpTransferEncoding) ||
|
|
|
|
HeaderEqualCase(kHttpTransferEncoding, "identity"));
|
|
|
|
DestroyHttpMessage(&msg);
|
|
|
|
InitHttpMessage(&msg, kHttpResponse);
|
|
|
|
memmove(p, p + hdrlen, i - hdrlen);
|
|
|
|
i -= hdrlen;
|
|
|
|
break;
|
|
|
|
}
|
2022-12-24 01:06:48 +00:00
|
|
|
if (method == kHttpHead || includeheaders) {
|
2022-03-16 20:33:13 +00:00
|
|
|
Write(p, hdrlen);
|
2022-12-24 01:06:48 +00:00
|
|
|
}
|
|
|
|
if (method == kHttpHead || msg.status == 204 || msg.status == 304) {
|
2021-07-08 04:44:27 +00:00
|
|
|
goto Finished;
|
|
|
|
}
|
|
|
|
if (HasHeader(kHttpTransferEncoding) &&
|
|
|
|
!HeaderEqualCase(kHttpTransferEncoding, "identity")) {
|
|
|
|
CHECK(HeaderEqualCase(kHttpTransferEncoding, "chunked"));
|
|
|
|
t = kHttpClientStateBodyChunked;
|
|
|
|
memset(&u, 0, sizeof(u));
|
|
|
|
goto Chunked;
|
|
|
|
} else if (HasHeader(kHttpContentLength)) {
|
|
|
|
CHECK_NE(-1, (rc = ParseContentLength(
|
|
|
|
HeaderData(kHttpContentLength),
|
|
|
|
HeaderLength(kHttpContentLength))));
|
|
|
|
t = kHttpClientStateBodyLengthed;
|
|
|
|
paylen = rc;
|
|
|
|
if (paylen > i - hdrlen) {
|
2022-03-16 20:33:13 +00:00
|
|
|
Write(p + hdrlen, i - hdrlen);
|
2021-07-08 04:44:27 +00:00
|
|
|
} else {
|
2022-03-16 20:33:13 +00:00
|
|
|
Write(p + hdrlen, paylen);
|
2021-07-08 04:44:27 +00:00
|
|
|
goto Finished;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
t = kHttpClientStateBody;
|
2022-03-16 20:33:13 +00:00
|
|
|
Write(p + hdrlen, i - hdrlen);
|
2021-07-08 04:44:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case kHttpClientStateBody:
|
|
|
|
if (!g) goto Finished;
|
2022-03-16 20:33:13 +00:00
|
|
|
Write(p + i - g, g);
|
2021-07-08 04:44:27 +00:00
|
|
|
break;
|
|
|
|
case kHttpClientStateBodyLengthed:
|
|
|
|
CHECK(g);
|
|
|
|
if (i - hdrlen > paylen) g = hdrlen + paylen - (i - g);
|
2022-03-16 20:33:13 +00:00
|
|
|
Write(p + i - g, g);
|
2021-07-08 04:44:27 +00:00
|
|
|
if (i - hdrlen >= paylen) goto Finished;
|
|
|
|
break;
|
|
|
|
case kHttpClientStateBodyChunked:
|
|
|
|
Chunked:
|
|
|
|
CHECK_NE(-1, (rc = Unchunk(&u, p + hdrlen, i - hdrlen, &paylen)));
|
|
|
|
if (rc) {
|
2022-03-16 20:33:13 +00:00
|
|
|
Write(p + hdrlen, paylen);
|
2021-07-08 04:44:27 +00:00
|
|
|
goto Finished;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
abort();
|
2021-02-19 03:20:41 +00:00
|
|
|
}
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
|
|
|
|
2021-07-08 04:44:27 +00:00
|
|
|
/*
|
|
|
|
* Close connection.
|
|
|
|
*/
|
|
|
|
Finished:
|
|
|
|
CHECK_NE(-1, close(sock));
|
|
|
|
|
2021-07-06 20:39:18 +00:00
|
|
|
/*
|
2021-07-08 04:44:27 +00:00
|
|
|
* Free memory.
|
2021-07-06 20:39:18 +00:00
|
|
|
*/
|
2021-07-08 04:44:27 +00:00
|
|
|
free(p);
|
|
|
|
free(headers.p);
|
2021-07-06 20:39:18 +00:00
|
|
|
if (usessl) {
|
|
|
|
mbedtls_ssl_free(&ssl);
|
|
|
|
mbedtls_ctr_drbg_free(&drbg);
|
2021-07-08 04:44:27 +00:00
|
|
|
mbedtls_ssl_config_free(&conf);
|
Make improvements to redbean
The following Lua APIs have been added:
- IsDaemon() → bool
- ProgramPidPath(str)
The following Lua hooks have been added:
- OnClientConnection(ip:int,port:int,serverip:int,serverport:int) → bool
- OnProcessCreate(pid:int,ip:int,port:int,serverip:int,serverport:int)
- OnProcessDestroy(pid:int)
- OnServerStart()
- OnServerStop()
- OnWorkerStart()
- OnWorkerStop()
redbean now does a better job at applying gzip on the fly from the local
filesystem, using a streaming chunked api with constant memory, which is
useful for doing things like serving a 4gb text file off NFS, and having
it start transmitting in milliseconds. redbean will also compute entropy
on the beginnings of files to determine if compression is profitable.
This change pays off technical debts relating to memory, such as relying
on exit() to free() allocations. That's now mostly fixed so it should be
easier now to spot memory leaks in malloc traces.
This change also fixes bugs and makes improvements to our SSL support.
Uniprocess mode failed handshakes are no longer an issue. Token Alpn is
offered so curl -v looks less weird. Hybrid SSL certificate loading is
now smarter about naming conflicts. Self-signed CA root anchors will no
longer be delivered to the client during the handshake.
2021-07-10 22:02:03 +00:00
|
|
|
mbedtls_ctr_drbg_free(&drbg);
|
2021-07-06 20:39:18 +00:00
|
|
|
}
|
|
|
|
|
2021-02-19 03:20:41 +00:00
|
|
|
return 0;
|
|
|
|
}
|