Spaces:
Configuration error
Configuration error
/** | |
* HTTP client-side implementation that uses forge.net sockets. | |
* | |
* @author Dave Longley | |
* | |
* Copyright (c) 2010-2014 Digital Bazaar, Inc. All rights reserved. | |
*/ | |
var forge = require('./forge'); | |
require('./tls'); | |
require('./util'); | |
// define http namespace | |
var http = module.exports = forge.http = forge.http || {}; | |
// logging category | |
var cat = 'forge.http'; | |
// normalizes an http header field name | |
var _normalize = function(name) { | |
return name.toLowerCase().replace(/(^.)|(-.)/g, | |
function(a) {return a.toUpperCase();}); | |
}; | |
/** | |
* Gets the local storage ID for the given client. | |
* | |
* @param client the client to get the local storage ID for. | |
* | |
* @return the local storage ID to use. | |
*/ | |
var _getStorageId = function(client) { | |
// TODO: include browser in ID to avoid sharing cookies between | |
// browsers (if this is undesirable) | |
// navigator.userAgent | |
return 'forge.http.' + | |
client.url.protocol.slice(0, -1) + '.' + | |
client.url.hostname + '.' + | |
client.url.port; | |
}; | |
/** | |
* Loads persistent cookies from disk for the given client. | |
* | |
* @param client the client. | |
*/ | |
var _loadCookies = function(client) { | |
if(client.persistCookies) { | |
try { | |
var cookies = forge.util.getItem( | |
client.socketPool.flashApi, | |
_getStorageId(client), 'cookies'); | |
client.cookies = cookies || {}; | |
} catch(ex) { | |
// no flash storage available, just silently fail | |
// TODO: i assume we want this logged somewhere or | |
// should it actually generate an error | |
//forge.log.error(cat, ex); | |
} | |
} | |
}; | |
/** | |
* Saves persistent cookies on disk for the given client. | |
* | |
* @param client the client. | |
*/ | |
var _saveCookies = function(client) { | |
if(client.persistCookies) { | |
try { | |
forge.util.setItem( | |
client.socketPool.flashApi, | |
_getStorageId(client), 'cookies', client.cookies); | |
} catch(ex) { | |
// no flash storage available, just silently fail | |
// TODO: i assume we want this logged somewhere or | |
// should it actually generate an error | |
//forge.log.error(cat, ex); | |
} | |
} | |
// FIXME: remove me | |
_loadCookies(client); | |
}; | |
/** | |
* Clears persistent cookies on disk for the given client. | |
* | |
* @param client the client. | |
*/ | |
var _clearCookies = function(client) { | |
if(client.persistCookies) { | |
try { | |
// only thing stored is 'cookies', so clear whole storage | |
forge.util.clearItems( | |
client.socketPool.flashApi, | |
_getStorageId(client)); | |
} catch(ex) { | |
// no flash storage available, just silently fail | |
// TODO: i assume we want this logged somewhere or | |
// should it actually generate an error | |
//forge.log.error(cat, ex); | |
} | |
} | |
}; | |
/** | |
* Connects and sends a request. | |
* | |
* @param client the http client. | |
* @param socket the socket to use. | |
*/ | |
var _doRequest = function(client, socket) { | |
if(socket.isConnected()) { | |
// already connected | |
socket.options.request.connectTime = +new Date(); | |
socket.connected({ | |
type: 'connect', | |
id: socket.id | |
}); | |
} else { | |
// connect | |
socket.options.request.connectTime = +new Date(); | |
socket.connect({ | |
host: client.url.hostname, | |
port: client.url.port, | |
policyPort: client.policyPort, | |
policyUrl: client.policyUrl | |
}); | |
} | |
}; | |
/** | |
* Handles the next request or marks a socket as idle. | |
* | |
* @param client the http client. | |
* @param socket the socket. | |
*/ | |
var _handleNextRequest = function(client, socket) { | |
// clear buffer | |
socket.buffer.clear(); | |
// get pending request | |
var pending = null; | |
while(pending === null && client.requests.length > 0) { | |
pending = client.requests.shift(); | |
if(pending.request.aborted) { | |
pending = null; | |
} | |
} | |
// mark socket idle if no pending requests | |
if(pending === null) { | |
if(socket.options !== null) { | |
socket.options = null; | |
} | |
client.idle.push(socket); | |
} else { | |
// handle pending request, allow 1 retry | |
socket.retries = 1; | |
socket.options = pending; | |
_doRequest(client, socket); | |
} | |
}; | |
/** | |
* Sets up a socket for use with an http client. | |
* | |
* @param client the parent http client. | |
* @param socket the socket to set up. | |
* @param tlsOptions if the socket must use TLS, the TLS options. | |
*/ | |
var _initSocket = function(client, socket, tlsOptions) { | |
// no socket options yet | |
socket.options = null; | |
// set up handlers | |
socket.connected = function(e) { | |
// socket primed by caching TLS session, handle next request | |
if(socket.options === null) { | |
_handleNextRequest(client, socket); | |
} else { | |
// socket in use | |
var request = socket.options.request; | |
request.connectTime = +new Date() - request.connectTime; | |
e.socket = socket; | |
socket.options.connected(e); | |
if(request.aborted) { | |
socket.close(); | |
} else { | |
var out = request.toString(); | |
if(request.body) { | |
out += request.body; | |
} | |
request.time = +new Date(); | |
socket.send(out); | |
request.time = +new Date() - request.time; | |
socket.options.response.time = +new Date(); | |
socket.sending = true; | |
} | |
} | |
}; | |
socket.closed = function(e) { | |
if(socket.sending) { | |
socket.sending = false; | |
if(socket.retries > 0) { | |
--socket.retries; | |
_doRequest(client, socket); | |
} else { | |
// error, closed during send | |
socket.error({ | |
id: socket.id, | |
type: 'ioError', | |
message: 'Connection closed during send. Broken pipe.', | |
bytesAvailable: 0 | |
}); | |
} | |
} else { | |
// handle unspecified content-length transfer | |
var response = socket.options.response; | |
if(response.readBodyUntilClose) { | |
response.time = +new Date() - response.time; | |
response.bodyReceived = true; | |
socket.options.bodyReady({ | |
request: socket.options.request, | |
response: response, | |
socket: socket | |
}); | |
} | |
socket.options.closed(e); | |
_handleNextRequest(client, socket); | |
} | |
}; | |
socket.data = function(e) { | |
socket.sending = false; | |
var request = socket.options.request; | |
if(request.aborted) { | |
socket.close(); | |
} else { | |
// receive all bytes available | |
var response = socket.options.response; | |
var bytes = socket.receive(e.bytesAvailable); | |
if(bytes !== null) { | |
// receive header and then body | |
socket.buffer.putBytes(bytes); | |
if(!response.headerReceived) { | |
response.readHeader(socket.buffer); | |
if(response.headerReceived) { | |
socket.options.headerReady({ | |
request: socket.options.request, | |
response: response, | |
socket: socket | |
}); | |
} | |
} | |
if(response.headerReceived && !response.bodyReceived) { | |
response.readBody(socket.buffer); | |
} | |
if(response.bodyReceived) { | |
socket.options.bodyReady({ | |
request: socket.options.request, | |
response: response, | |
socket: socket | |
}); | |
// close connection if requested or by default on http/1.0 | |
var value = response.getField('Connection') || ''; | |
if(value.indexOf('close') != -1 || | |
(response.version === 'HTTP/1.0' && | |
response.getField('Keep-Alive') === null)) { | |
socket.close(); | |
} else { | |
_handleNextRequest(client, socket); | |
} | |
} | |
} | |
} | |
}; | |
socket.error = function(e) { | |
// do error callback, include request | |
socket.options.error({ | |
type: e.type, | |
message: e.message, | |
request: socket.options.request, | |
response: socket.options.response, | |
socket: socket | |
}); | |
socket.close(); | |
}; | |
// wrap socket for TLS | |
if(tlsOptions) { | |
socket = forge.tls.wrapSocket({ | |
sessionId: null, | |
sessionCache: {}, | |
caStore: tlsOptions.caStore, | |
cipherSuites: tlsOptions.cipherSuites, | |
socket: socket, | |
virtualHost: tlsOptions.virtualHost, | |
verify: tlsOptions.verify, | |
getCertificate: tlsOptions.getCertificate, | |
getPrivateKey: tlsOptions.getPrivateKey, | |
getSignature: tlsOptions.getSignature, | |
deflate: tlsOptions.deflate || null, | |
inflate: tlsOptions.inflate || null | |
}); | |
socket.options = null; | |
socket.buffer = forge.util.createBuffer(); | |
client.sockets.push(socket); | |
if(tlsOptions.prime) { | |
// prime socket by connecting and caching TLS session, will do | |
// next request from there | |
socket.connect({ | |
host: client.url.hostname, | |
port: client.url.port, | |
policyPort: client.policyPort, | |
policyUrl: client.policyUrl | |
}); | |
} else { | |
// do not prime socket, just add as idle | |
client.idle.push(socket); | |
} | |
} else { | |
// no need to prime non-TLS sockets | |
socket.buffer = forge.util.createBuffer(); | |
client.sockets.push(socket); | |
client.idle.push(socket); | |
} | |
}; | |
/** | |
* Checks to see if the given cookie has expired. If the cookie's max-age | |
* plus its created time is less than the time now, it has expired, unless | |
* its max-age is set to -1 which indicates it will never expire. | |
* | |
* @param cookie the cookie to check. | |
* | |
* @return true if it has expired, false if not. | |
*/ | |
var _hasCookieExpired = function(cookie) { | |
var rval = false; | |
if(cookie.maxAge !== -1) { | |
var now = _getUtcTime(new Date()); | |
var expires = cookie.created + cookie.maxAge; | |
if(expires <= now) { | |
rval = true; | |
} | |
} | |
return rval; | |
}; | |
/** | |
* Adds cookies in the given client to the given request. | |
* | |
* @param client the client. | |
* @param request the request. | |
*/ | |
var _writeCookies = function(client, request) { | |
var expired = []; | |
var url = client.url; | |
var cookies = client.cookies; | |
for(var name in cookies) { | |
// get cookie paths | |
var paths = cookies[name]; | |
for(var p in paths) { | |
var cookie = paths[p]; | |
if(_hasCookieExpired(cookie)) { | |
// store for clean up | |
expired.push(cookie); | |
} else if(request.path.indexOf(cookie.path) === 0) { | |
// path or path's ancestor must match cookie.path | |
request.addCookie(cookie); | |
} | |
} | |
} | |
// clean up expired cookies | |
for(var i = 0; i < expired.length; ++i) { | |
var cookie = expired[i]; | |
client.removeCookie(cookie.name, cookie.path); | |
} | |
}; | |
/** | |
* Gets cookies from the given response and adds the to the given client. | |
* | |
* @param client the client. | |
* @param response the response. | |
*/ | |
var _readCookies = function(client, response) { | |
var cookies = response.getCookies(); | |
for(var i = 0; i < cookies.length; ++i) { | |
try { | |
client.setCookie(cookies[i]); | |
} catch(ex) { | |
// ignore failure to add other-domain, etc. cookies | |
} | |
} | |
}; | |
/** | |
* Creates an http client that uses forge.net sockets as a backend and | |
* forge.tls for security. | |
* | |
* @param options: | |
* url: the url to connect to (scheme://host:port). | |
* socketPool: the flash socket pool to use. | |
* policyPort: the flash policy port to use (if other than the | |
* socket pool default), use 0 for flash default. | |
* policyUrl: the flash policy file URL to use (if provided will | |
* be used instead of a policy port). | |
* connections: number of connections to use to handle requests. | |
* caCerts: an array of certificates to trust for TLS, certs may | |
* be PEM-formatted or cert objects produced via forge.pki. | |
* cipherSuites: an optional array of cipher suites to use, | |
* see forge.tls.CipherSuites. | |
* virtualHost: the virtual server name to use in a TLS SNI | |
* extension, if not provided the url host will be used. | |
* verify: a custom TLS certificate verify callback to use. | |
* getCertificate: an optional callback used to get a client-side | |
* certificate (see forge.tls for details). | |
* getPrivateKey: an optional callback used to get a client-side | |
* private key (see forge.tls for details). | |
* getSignature: an optional callback used to get a client-side | |
* signature (see forge.tls for details). | |
* persistCookies: true to use persistent cookies via flash local | |
* storage, false to only keep cookies in javascript. | |
* primeTlsSockets: true to immediately connect TLS sockets on | |
* their creation so that they will cache TLS sessions for reuse. | |
* | |
* @return the client. | |
*/ | |
http.createClient = function(options) { | |
// create CA store to share with all TLS connections | |
var caStore = null; | |
if(options.caCerts) { | |
caStore = forge.pki.createCaStore(options.caCerts); | |
} | |
// get scheme, host, and port from url | |
options.url = (options.url || | |
window.location.protocol + '//' + window.location.host); | |
var url; | |
try { | |
url = new URL(options.url); | |
} catch(e) { | |
var error = new Error('Invalid url.'); | |
error.details = {url: options.url}; | |
throw error; | |
} | |
// default to 1 connection | |
options.connections = options.connections || 1; | |
// create client | |
var sp = options.socketPool; | |
var client = { | |
// url | |
url: url, | |
// socket pool | |
socketPool: sp, | |
// the policy port to use | |
policyPort: options.policyPort, | |
// policy url to use | |
policyUrl: options.policyUrl, | |
// queue of requests to service | |
requests: [], | |
// all sockets | |
sockets: [], | |
// idle sockets | |
idle: [], | |
// whether or not the connections are secure | |
secure: (url.protocol === 'https:'), | |
// cookie jar (key'd off of name and then path, there is only 1 domain | |
// and one setting for secure per client so name+path is unique) | |
cookies: {}, | |
// default to flash storage of cookies | |
persistCookies: (typeof(options.persistCookies) === 'undefined') ? | |
true : options.persistCookies | |
}; | |
// load cookies from disk | |
_loadCookies(client); | |
/** | |
* A default certificate verify function that checks a certificate common | |
* name against the client's URL host. | |
* | |
* @param c the TLS connection. | |
* @param verified true if cert is verified, otherwise alert number. | |
* @param depth the chain depth. | |
* @param certs the cert chain. | |
* | |
* @return true if verified and the common name matches the host, error | |
* otherwise. | |
*/ | |
var _defaultCertificateVerify = function(c, verified, depth, certs) { | |
if(depth === 0 && verified === true) { | |
// compare common name to url host | |
var cn = certs[depth].subject.getField('CN'); | |
if(cn === null || client.url.hostname !== cn.value) { | |
verified = { | |
message: 'Certificate common name does not match url host.' | |
}; | |
} | |
} | |
return verified; | |
}; | |
// determine if TLS is used | |
var tlsOptions = null; | |
if(client.secure) { | |
tlsOptions = { | |
caStore: caStore, | |
cipherSuites: options.cipherSuites || null, | |
virtualHost: options.virtualHost || url.hostname, | |
verify: options.verify || _defaultCertificateVerify, | |
getCertificate: options.getCertificate || null, | |
getPrivateKey: options.getPrivateKey || null, | |
getSignature: options.getSignature || null, | |
prime: options.primeTlsSockets || false | |
}; | |
// if socket pool uses a flash api, then add deflate support to TLS | |
if(sp.flashApi !== null) { | |
tlsOptions.deflate = function(bytes) { | |
// strip 2 byte zlib header and 4 byte trailer | |
return forge.util.deflate(sp.flashApi, bytes, true); | |
}; | |
tlsOptions.inflate = function(bytes) { | |
return forge.util.inflate(sp.flashApi, bytes, true); | |
}; | |
} | |
} | |
// create and initialize sockets | |
for(var i = 0; i < options.connections; ++i) { | |
_initSocket(client, sp.createSocket(), tlsOptions); | |
} | |
/** | |
* Sends a request. A method 'abort' will be set on the request that | |
* can be called to attempt to abort the request. | |
* | |
* @param options: | |
* request: the request to send. | |
* connected: a callback for when the connection is open. | |
* closed: a callback for when the connection is closed. | |
* headerReady: a callback for when the response header arrives. | |
* bodyReady: a callback for when the response body arrives. | |
* error: a callback for if an error occurs. | |
*/ | |
client.send = function(options) { | |
// add host header if not set | |
if(options.request.getField('Host') === null) { | |
options.request.setField('Host', client.url.origin); | |
} | |
// set default dummy handlers | |
var opts = {}; | |
opts.request = options.request; | |
opts.connected = options.connected || function() {}; | |
opts.closed = options.close || function() {}; | |
opts.headerReady = function(e) { | |
// read cookies | |
_readCookies(client, e.response); | |
if(options.headerReady) { | |
options.headerReady(e); | |
} | |
}; | |
opts.bodyReady = options.bodyReady || function() {}; | |
opts.error = options.error || function() {}; | |
// create response | |
opts.response = http.createResponse(); | |
opts.response.time = 0; | |
opts.response.flashApi = client.socketPool.flashApi; | |
opts.request.flashApi = client.socketPool.flashApi; | |
// create abort function | |
opts.request.abort = function() { | |
// set aborted, clear handlers | |
opts.request.aborted = true; | |
opts.connected = function() {}; | |
opts.closed = function() {}; | |
opts.headerReady = function() {}; | |
opts.bodyReady = function() {}; | |
opts.error = function() {}; | |
}; | |
// add cookies to request | |
_writeCookies(client, opts.request); | |
// queue request options if there are no idle sockets | |
if(client.idle.length === 0) { | |
client.requests.push(opts); | |
} else { | |
// use an idle socket, prefer an idle *connected* socket first | |
var socket = null; | |
var len = client.idle.length; | |
for(var i = 0; socket === null && i < len; ++i) { | |
socket = client.idle[i]; | |
if(socket.isConnected()) { | |
client.idle.splice(i, 1); | |
} else { | |
socket = null; | |
} | |
} | |
// no connected socket available, get unconnected socket | |
if(socket === null) { | |
socket = client.idle.pop(); | |
} | |
socket.options = opts; | |
_doRequest(client, socket); | |
} | |
}; | |
/** | |
* Destroys this client. | |
*/ | |
client.destroy = function() { | |
// clear pending requests, close and destroy sockets | |
client.requests = []; | |
for(var i = 0; i < client.sockets.length; ++i) { | |
client.sockets[i].close(); | |
client.sockets[i].destroy(); | |
} | |
client.socketPool = null; | |
client.sockets = []; | |
client.idle = []; | |
}; | |
/** | |
* Sets a cookie for use with all connections made by this client. Any | |
* cookie with the same name will be replaced. If the cookie's value | |
* is undefined, null, or the blank string, the cookie will be removed. | |
* | |
* If the cookie's domain doesn't match this client's url host or the | |
* cookie's secure flag doesn't match this client's url scheme, then | |
* setting the cookie will fail with an exception. | |
* | |
* @param cookie the cookie with parameters: | |
* name: the name of the cookie. | |
* value: the value of the cookie. | |
* comment: an optional comment string. | |
* maxAge: the age of the cookie in seconds relative to created time. | |
* secure: true if the cookie must be sent over a secure protocol. | |
* httpOnly: true to restrict access to the cookie from javascript | |
* (inaffective since the cookies are stored in javascript). | |
* path: the path for the cookie. | |
* domain: optional domain the cookie belongs to (must start with dot). | |
* version: optional version of the cookie. | |
* created: creation time, in UTC seconds, of the cookie. | |
*/ | |
client.setCookie = function(cookie) { | |
var rval; | |
if(typeof(cookie.name) !== 'undefined') { | |
if(cookie.value === null || typeof(cookie.value) === 'undefined' || | |
cookie.value === '') { | |
// remove cookie | |
rval = client.removeCookie(cookie.name, cookie.path); | |
} else { | |
// set cookie defaults | |
cookie.comment = cookie.comment || ''; | |
cookie.maxAge = cookie.maxAge || 0; | |
cookie.secure = (typeof(cookie.secure) === 'undefined') ? | |
true : cookie.secure; | |
cookie.httpOnly = cookie.httpOnly || true; | |
cookie.path = cookie.path || '/'; | |
cookie.domain = cookie.domain || null; | |
cookie.version = cookie.version || null; | |
cookie.created = _getUtcTime(new Date()); | |
// do secure check | |
if(cookie.secure !== client.secure) { | |
var error = new Error('Http client url scheme is incompatible ' + | |
'with cookie secure flag.'); | |
error.url = client.url; | |
error.cookie = cookie; | |
throw error; | |
} | |
// make sure url host is within cookie.domain | |
if(!http.withinCookieDomain(client.url, cookie)) { | |
var error = new Error('Http client url scheme is incompatible ' + | |
'with cookie secure flag.'); | |
error.url = client.url; | |
error.cookie = cookie; | |
throw error; | |
} | |
// add new cookie | |
if(!(cookie.name in client.cookies)) { | |
client.cookies[cookie.name] = {}; | |
} | |
client.cookies[cookie.name][cookie.path] = cookie; | |
rval = true; | |
// save cookies | |
_saveCookies(client); | |
} | |
} | |
return rval; | |
}; | |
/** | |
* Gets a cookie by its name. | |
* | |
* @param name the name of the cookie to retrieve. | |
* @param path an optional path for the cookie (if there are multiple | |
* cookies with the same name but different paths). | |
* | |
* @return the cookie or null if not found. | |
*/ | |
client.getCookie = function(name, path) { | |
var rval = null; | |
if(name in client.cookies) { | |
var paths = client.cookies[name]; | |
// get path-specific cookie | |
if(path) { | |
if(path in paths) { | |
rval = paths[path]; | |
} | |
} else { | |
// get first cookie | |
for(var p in paths) { | |
rval = paths[p]; | |
break; | |
} | |
} | |
} | |
return rval; | |
}; | |
/** | |
* Removes a cookie. | |
* | |
* @param name the name of the cookie to remove. | |
* @param path an optional path for the cookie (if there are multiple | |
* cookies with the same name but different paths). | |
* | |
* @return true if a cookie was removed, false if not. | |
*/ | |
client.removeCookie = function(name, path) { | |
var rval = false; | |
if(name in client.cookies) { | |
// delete the specific path | |
if(path) { | |
var paths = client.cookies[name]; | |
if(path in paths) { | |
rval = true; | |
delete client.cookies[name][path]; | |
// clean up entry if empty | |
var empty = true; | |
for(var i in client.cookies[name]) { | |
empty = false; | |
break; | |
} | |
if(empty) { | |
delete client.cookies[name]; | |
} | |
} | |
} else { | |
// delete all cookies with the given name | |
rval = true; | |
delete client.cookies[name]; | |
} | |
} | |
if(rval) { | |
// save cookies | |
_saveCookies(client); | |
} | |
return rval; | |
}; | |
/** | |
* Clears all cookies stored in this client. | |
*/ | |
client.clearCookies = function() { | |
client.cookies = {}; | |
_clearCookies(client); | |
}; | |
if(forge.log) { | |
forge.log.debug('forge.http', 'created client', options); | |
} | |
return client; | |
}; | |
/** | |
* Trims the whitespace off of the beginning and end of a string. | |
* | |
* @param str the string to trim. | |
* | |
* @return the trimmed string. | |
*/ | |
var _trimString = function(str) { | |
return str.replace(/^\s*/, '').replace(/\s*$/, ''); | |
}; | |
/** | |
* Creates an http header object. | |
* | |
* @return the http header object. | |
*/ | |
var _createHeader = function() { | |
var header = { | |
fields: {}, | |
setField: function(name, value) { | |
// normalize field name, trim value | |
header.fields[_normalize(name)] = [_trimString('' + value)]; | |
}, | |
appendField: function(name, value) { | |
name = _normalize(name); | |
if(!(name in header.fields)) { | |
header.fields[name] = []; | |
} | |
header.fields[name].push(_trimString('' + value)); | |
}, | |
getField: function(name, index) { | |
var rval = null; | |
name = _normalize(name); | |
if(name in header.fields) { | |
index = index || 0; | |
rval = header.fields[name][index]; | |
} | |
return rval; | |
} | |
}; | |
return header; | |
}; | |
/** | |
* Gets the time in utc seconds given a date. | |
* | |
* @param d the date to use. | |
* | |
* @return the time in utc seconds. | |
*/ | |
var _getUtcTime = function(d) { | |
var utc = +d + d.getTimezoneOffset() * 60000; | |
return Math.floor(+new Date() / 1000); | |
}; | |
/** | |
* Creates an http request. | |
* | |
* @param options: | |
* version: the version. | |
* method: the method. | |
* path: the path. | |
* body: the body. | |
* headers: custom header fields to add, | |
* eg: [{'Content-Length': 0}]. | |
* | |
* @return the http request. | |
*/ | |
http.createRequest = function(options) { | |
options = options || {}; | |
var request = _createHeader(); | |
request.version = options.version || 'HTTP/1.1'; | |
request.method = options.method || null; | |
request.path = options.path || null; | |
request.body = options.body || null; | |
request.bodyDeflated = false; | |
request.flashApi = null; | |
// add custom headers | |
var headers = options.headers || []; | |
if(!forge.util.isArray(headers)) { | |
headers = [headers]; | |
} | |
for(var i = 0; i < headers.length; ++i) { | |
for(var name in headers[i]) { | |
request.appendField(name, headers[i][name]); | |
} | |
} | |
/** | |
* Adds a cookie to the request 'Cookie' header. | |
* | |
* @param cookie a cookie to add. | |
*/ | |
request.addCookie = function(cookie) { | |
var value = ''; | |
var field = request.getField('Cookie'); | |
if(field !== null) { | |
// separate cookies by semi-colons | |
value = field + '; '; | |
} | |
// get current time in utc seconds | |
var now = _getUtcTime(new Date()); | |
// output cookie name and value | |
value += cookie.name + '=' + cookie.value; | |
request.setField('Cookie', value); | |
}; | |
/** | |
* Converts an http request into a string that can be sent as an | |
* HTTP request. Does not include any data. | |
* | |
* @return the string representation of the request. | |
*/ | |
request.toString = function() { | |
/* Sample request header: | |
GET /some/path/?query HTTP/1.1 | |
Host: www.someurl.com | |
Connection: close | |
Accept-Encoding: deflate | |
Accept: image/gif, text/html | |
User-Agent: Mozilla 4.0 | |
*/ | |
// set default headers | |
if(request.getField('User-Agent') === null) { | |
request.setField('User-Agent', 'forge.http 1.0'); | |
} | |
if(request.getField('Accept') === null) { | |
request.setField('Accept', '*/*'); | |
} | |
if(request.getField('Connection') === null) { | |
request.setField('Connection', 'keep-alive'); | |
request.setField('Keep-Alive', '115'); | |
} | |
// add Accept-Encoding if not specified | |
if(request.flashApi !== null && | |
request.getField('Accept-Encoding') === null) { | |
request.setField('Accept-Encoding', 'deflate'); | |
} | |
// if the body isn't null, deflate it if its larger than 100 bytes | |
if(request.flashApi !== null && request.body !== null && | |
request.getField('Content-Encoding') === null && | |
!request.bodyDeflated && request.body.length > 100) { | |
// use flash to compress data | |
request.body = forge.util.deflate(request.flashApi, request.body); | |
request.bodyDeflated = true; | |
request.setField('Content-Encoding', 'deflate'); | |
request.setField('Content-Length', request.body.length); | |
} else if(request.body !== null) { | |
// set content length for body | |
request.setField('Content-Length', request.body.length); | |
} | |
// build start line | |
var rval = | |
request.method.toUpperCase() + ' ' + request.path + ' ' + | |
request.version + '\r\n'; | |
// add each header | |
for(var name in request.fields) { | |
var fields = request.fields[name]; | |
for(var i = 0; i < fields.length; ++i) { | |
rval += name + ': ' + fields[i] + '\r\n'; | |
} | |
} | |
// final terminating CRLF | |
rval += '\r\n'; | |
return rval; | |
}; | |
return request; | |
}; | |
/** | |
* Creates an empty http response header. | |
* | |
* @return the empty http response header. | |
*/ | |
http.createResponse = function() { | |
// private vars | |
var _first = true; | |
var _chunkSize = 0; | |
var _chunksFinished = false; | |
// create response | |
var response = _createHeader(); | |
response.version = null; | |
response.code = 0; | |
response.message = null; | |
response.body = null; | |
response.headerReceived = false; | |
response.bodyReceived = false; | |
response.flashApi = null; | |
/** | |
* Reads a line that ends in CRLF from a byte buffer. | |
* | |
* @param b the byte buffer. | |
* | |
* @return the line or null if none was found. | |
*/ | |
var _readCrlf = function(b) { | |
var line = null; | |
var i = b.data.indexOf('\r\n', b.read); | |
if(i != -1) { | |
// read line, skip CRLF | |
line = b.getBytes(i - b.read); | |
b.getBytes(2); | |
} | |
return line; | |
}; | |
/** | |
* Parses a header field and appends it to the response. | |
* | |
* @param line the header field line. | |
*/ | |
var _parseHeader = function(line) { | |
var tmp = line.indexOf(':'); | |
var name = line.substring(0, tmp++); | |
response.appendField( | |
name, (tmp < line.length) ? line.substring(tmp) : ''); | |
}; | |
/** | |
* Reads an http response header from a buffer of bytes. | |
* | |
* @param b the byte buffer to parse the header from. | |
* | |
* @return true if the whole header was read, false if not. | |
*/ | |
response.readHeader = function(b) { | |
// read header lines (each ends in CRLF) | |
var line = ''; | |
while(!response.headerReceived && line !== null) { | |
line = _readCrlf(b); | |
if(line !== null) { | |
// parse first line | |
if(_first) { | |
_first = false; | |
var tmp = line.split(' '); | |
if(tmp.length >= 3) { | |
response.version = tmp[0]; | |
response.code = parseInt(tmp[1], 10); | |
response.message = tmp.slice(2).join(' '); | |
} else { | |
// invalid header | |
var error = new Error('Invalid http response header.'); | |
error.details = {'line': line}; | |
throw error; | |
} | |
} else if(line.length === 0) { | |
// handle final line, end of header | |
response.headerReceived = true; | |
} else { | |
_parseHeader(line); | |
} | |
} | |
} | |
return response.headerReceived; | |
}; | |
/** | |
* Reads some chunked http response entity-body from the given buffer of | |
* bytes. | |
* | |
* @param b the byte buffer to read from. | |
* | |
* @return true if the whole body was read, false if not. | |
*/ | |
var _readChunkedBody = function(b) { | |
/* Chunked transfer-encoding sends data in a series of chunks, | |
followed by a set of 0-N http trailers. | |
The format is as follows: | |
chunk-size (in hex) CRLF | |
chunk data (with "chunk-size" many bytes) CRLF | |
... (N many chunks) | |
chunk-size (of 0 indicating the last chunk) CRLF | |
N many http trailers followed by CRLF | |
blank line + CRLF (terminates the trailers) | |
If there are no http trailers, then after the chunk-size of 0, | |
there is still a single CRLF (indicating the blank line + CRLF | |
that terminates the trailers). In other words, you always terminate | |
the trailers with blank line + CRLF, regardless of 0-N trailers. */ | |
/* From RFC-2616, section 3.6.1, here is the pseudo-code for | |
implementing chunked transfer-encoding: | |
length := 0 | |
read chunk-size, chunk-extension (if any) and CRLF | |
while (chunk-size > 0) { | |
read chunk-data and CRLF | |
append chunk-data to entity-body | |
length := length + chunk-size | |
read chunk-size and CRLF | |
} | |
read entity-header | |
while (entity-header not empty) { | |
append entity-header to existing header fields | |
read entity-header | |
} | |
Content-Length := length | |
Remove "chunked" from Transfer-Encoding | |
*/ | |
var line = ''; | |
while(line !== null && b.length() > 0) { | |
// if in the process of reading a chunk | |
if(_chunkSize > 0) { | |
// if there are not enough bytes to read chunk and its | |
// trailing CRLF, we must wait for more data to be received | |
if(_chunkSize + 2 > b.length()) { | |
break; | |
} | |
// read chunk data, skip CRLF | |
response.body += b.getBytes(_chunkSize); | |
b.getBytes(2); | |
_chunkSize = 0; | |
} else if(!_chunksFinished) { | |
// more chunks, read next chunk-size line | |
line = _readCrlf(b); | |
if(line !== null) { | |
// parse chunk-size (ignore any chunk extension) | |
_chunkSize = parseInt(line.split(';', 1)[0], 16); | |
_chunksFinished = (_chunkSize === 0); | |
} | |
} else { | |
// chunks finished, read next trailer | |
line = _readCrlf(b); | |
while(line !== null) { | |
if(line.length > 0) { | |
// parse trailer | |
_parseHeader(line); | |
// read next trailer | |
line = _readCrlf(b); | |
} else { | |
// body received | |
response.bodyReceived = true; | |
line = null; | |
} | |
} | |
} | |
} | |
return response.bodyReceived; | |
}; | |
/** | |
* Reads an http response body from a buffer of bytes. | |
* | |
* @param b the byte buffer to read from. | |
* | |
* @return true if the whole body was read, false if not. | |
*/ | |
response.readBody = function(b) { | |
var contentLength = response.getField('Content-Length'); | |
var transferEncoding = response.getField('Transfer-Encoding'); | |
if(contentLength !== null) { | |
contentLength = parseInt(contentLength); | |
} | |
// read specified length | |
if(contentLength !== null && contentLength >= 0) { | |
response.body = response.body || ''; | |
response.body += b.getBytes(contentLength); | |
response.bodyReceived = (response.body.length === contentLength); | |
} else if(transferEncoding !== null) { | |
// read chunked encoding | |
if(transferEncoding.indexOf('chunked') != -1) { | |
response.body = response.body || ''; | |
_readChunkedBody(b); | |
} else { | |
var error = new Error('Unknown Transfer-Encoding.'); | |
error.details = {'transferEncoding': transferEncoding}; | |
throw error; | |
} | |
} else if((contentLength !== null && contentLength < 0) || | |
(contentLength === null && | |
response.getField('Content-Type') !== null)) { | |
// read all data in the buffer | |
response.body = response.body || ''; | |
response.body += b.getBytes(); | |
response.readBodyUntilClose = true; | |
} else { | |
// no body | |
response.body = null; | |
response.bodyReceived = true; | |
} | |
if(response.bodyReceived) { | |
response.time = +new Date() - response.time; | |
} | |
if(response.flashApi !== null && | |
response.bodyReceived && response.body !== null && | |
response.getField('Content-Encoding') === 'deflate') { | |
// inflate using flash api | |
response.body = forge.util.inflate( | |
response.flashApi, response.body); | |
} | |
return response.bodyReceived; | |
}; | |
/** | |
* Parses an array of cookies from the 'Set-Cookie' field, if present. | |
* | |
* @return the array of cookies. | |
*/ | |
response.getCookies = function() { | |
var rval = []; | |
// get Set-Cookie field | |
if('Set-Cookie' in response.fields) { | |
var field = response.fields['Set-Cookie']; | |
// get current local time in seconds | |
var now = +new Date() / 1000; | |
// regex for parsing 'name1=value1; name2=value2; name3' | |
var regex = /\s*([^=]*)=?([^;]*)(;|$)/g; | |
// examples: | |
// Set-Cookie: cookie1_name=cookie1_value; max-age=0; path=/ | |
// Set-Cookie: c2=v2; expires=Thu, 21-Aug-2008 23:47:25 GMT; path=/ | |
for(var i = 0; i < field.length; ++i) { | |
var fv = field[i]; | |
var m; | |
regex.lastIndex = 0; | |
var first = true; | |
var cookie = {}; | |
do { | |
m = regex.exec(fv); | |
if(m !== null) { | |
var name = _trimString(m[1]); | |
var value = _trimString(m[2]); | |
// cookie_name=value | |
if(first) { | |
cookie.name = name; | |
cookie.value = value; | |
first = false; | |
} else { | |
// property_name=value | |
name = name.toLowerCase(); | |
switch(name) { | |
case 'expires': | |
// replace hyphens w/spaces so date will parse | |
value = value.replace(/-/g, ' '); | |
var secs = Date.parse(value) / 1000; | |
cookie.maxAge = Math.max(0, secs - now); | |
break; | |
case 'max-age': | |
cookie.maxAge = parseInt(value, 10); | |
break; | |
case 'secure': | |
cookie.secure = true; | |
break; | |
case 'httponly': | |
cookie.httpOnly = true; | |
break; | |
default: | |
if(name !== '') { | |
cookie[name] = value; | |
} | |
} | |
} | |
} | |
} while(m !== null && m[0] !== ''); | |
rval.push(cookie); | |
} | |
} | |
return rval; | |
}; | |
/** | |
* Converts an http response into a string that can be sent as an | |
* HTTP response. Does not include any data. | |
* | |
* @return the string representation of the response. | |
*/ | |
response.toString = function() { | |
/* Sample response header: | |
HTTP/1.0 200 OK | |
Host: www.someurl.com | |
Connection: close | |
*/ | |
// build start line | |
var rval = | |
response.version + ' ' + response.code + ' ' + response.message + '\r\n'; | |
// add each header | |
for(var name in response.fields) { | |
var fields = response.fields[name]; | |
for(var i = 0; i < fields.length; ++i) { | |
rval += name + ': ' + fields[i] + '\r\n'; | |
} | |
} | |
// final terminating CRLF | |
rval += '\r\n'; | |
return rval; | |
}; | |
return response; | |
}; | |
/** | |
* Returns true if the given url is within the given cookie's domain. | |
* | |
* @param url the url to check. | |
* @param cookie the cookie or cookie domain to check. | |
*/ | |
http.withinCookieDomain = function(url, cookie) { | |
var rval = false; | |
// cookie may be null, a cookie object, or a domain string | |
var domain = (cookie === null || typeof cookie === 'string') ? | |
cookie : cookie.domain; | |
// any domain will do | |
if(domain === null) { | |
rval = true; | |
} else if(domain.charAt(0) === '.') { | |
// ensure domain starts with a '.' | |
// parse URL as necessary | |
if(typeof url === 'string') { | |
url = new URL(url); | |
} | |
// add '.' to front of URL hostname to match against domain | |
var host = '.' + url.hostname; | |
// if the host ends with domain then it falls within it | |
var idx = host.lastIndexOf(domain); | |
if(idx !== -1 && (idx + domain.length === host.length)) { | |
rval = true; | |
} | |
} | |
return rval; | |
}; | |