| /*************************************************************************** |
| * _ _ ____ _ |
| * Project ___| | | | _ \| | |
| * / __| | | | |_) | | |
| * | (__| |_| | _ <| |___ |
| * \___|\___/|_| \_\_____| |
| * |
| * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al. |
| * |
| * This software is licensed as described in the file COPYING, which |
| * you should have received as part of this distribution. The terms |
| * are also available at https://curl.se/docs/copyright.html. |
| * |
| * You may opt to use, copy, modify, merge, publish, distribute and/or sell |
| * copies of the Software, and permit persons to whom the Software is |
| * furnished to do so, under the terms of the COPYING file. |
| * |
| * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY |
| * KIND, either express or implied. |
| * |
| * SPDX-License-Identifier: curl |
| * |
| ***************************************************************************/ |
| |
| #include "curl_setup.h" |
| |
| #if !defined(CURL_DISABLE_PROXY) && !defined(CURL_DISABLE_HTTP) |
| |
| #include <curl/curl.h> |
| #ifdef USE_HYPER |
| #include <hyper.h> |
| #endif |
| #include "urldata.h" |
| #include "dynbuf.h" |
| #include "sendf.h" |
| #include "http.h" |
| #include "http1.h" |
| #include "http_proxy.h" |
| #include "url.h" |
| #include "select.h" |
| #include "progress.h" |
| #include "cfilters.h" |
| #include "cf-h1-proxy.h" |
| #include "connect.h" |
| #include "curl_trc.h" |
| #include "curlx.h" |
| #include "vtls/vtls.h" |
| #include "transfer.h" |
| #include "multiif.h" |
| |
| /* The last 3 #include files should be in this order */ |
| #include "curl_printf.h" |
| #include "curl_memory.h" |
| #include "memdebug.h" |
| |
| |
| typedef enum { |
| H1_TUNNEL_INIT, /* init/default/no tunnel state */ |
| H1_TUNNEL_CONNECT, /* CONNECT request is being send */ |
| H1_TUNNEL_RECEIVE, /* CONNECT answer is being received */ |
| H1_TUNNEL_RESPONSE, /* CONNECT response received completely */ |
| H1_TUNNEL_ESTABLISHED, |
| H1_TUNNEL_FAILED |
| } h1_tunnel_state; |
| |
| /* struct for HTTP CONNECT tunneling */ |
| struct h1_tunnel_state { |
| struct HTTP CONNECT; |
| struct dynbuf rcvbuf; |
| struct dynbuf request_data; |
| size_t nsent; |
| size_t headerlines; |
| struct Curl_chunker ch; |
| enum keeponval { |
| KEEPON_DONE, |
| KEEPON_CONNECT, |
| KEEPON_IGNORE |
| } keepon; |
| curl_off_t cl; /* size of content to read and ignore */ |
| h1_tunnel_state tunnel_state; |
| BIT(chunked_encoding); |
| BIT(close_connection); |
| }; |
| |
| |
| static bool tunnel_is_established(struct h1_tunnel_state *ts) |
| { |
| return ts && (ts->tunnel_state == H1_TUNNEL_ESTABLISHED); |
| } |
| |
| static bool tunnel_is_failed(struct h1_tunnel_state *ts) |
| { |
| return ts && (ts->tunnel_state == H1_TUNNEL_FAILED); |
| } |
| |
| static CURLcode tunnel_reinit(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts) |
| { |
| (void)data; |
| (void)cf; |
| DEBUGASSERT(ts); |
| Curl_dyn_reset(&ts->rcvbuf); |
| Curl_dyn_reset(&ts->request_data); |
| ts->tunnel_state = H1_TUNNEL_INIT; |
| ts->keepon = KEEPON_CONNECT; |
| ts->cl = 0; |
| ts->close_connection = FALSE; |
| return CURLE_OK; |
| } |
| |
| static CURLcode tunnel_init(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state **pts) |
| { |
| struct h1_tunnel_state *ts; |
| CURLcode result; |
| |
| if(cf->conn->handler->flags & PROTOPT_NOTCPPROXY) { |
| failf(data, "%s cannot be done over CONNECT", cf->conn->handler->scheme); |
| return CURLE_UNSUPPORTED_PROTOCOL; |
| } |
| |
| /* we might need the upload buffer for streaming a partial request */ |
| result = Curl_get_upload_buffer(data); |
| if(result) |
| return result; |
| |
| ts = calloc(1, sizeof(*ts)); |
| if(!ts) |
| return CURLE_OUT_OF_MEMORY; |
| |
| infof(data, "allocate connect buffer"); |
| |
| Curl_dyn_init(&ts->rcvbuf, DYN_PROXY_CONNECT_HEADERS); |
| Curl_dyn_init(&ts->request_data, DYN_HTTP_REQUEST); |
| Curl_httpchunk_init(data, &ts->ch, TRUE); |
| |
| *pts = ts; |
| connkeep(cf->conn, "HTTP proxy CONNECT"); |
| return tunnel_reinit(cf, data, ts); |
| } |
| |
| static void h1_tunnel_go_state(struct Curl_cfilter *cf, |
| struct h1_tunnel_state *ts, |
| h1_tunnel_state new_state, |
| struct Curl_easy *data) |
| { |
| if(ts->tunnel_state == new_state) |
| return; |
| /* entering this one */ |
| switch(new_state) { |
| case H1_TUNNEL_INIT: |
| CURL_TRC_CF(data, cf, "new tunnel state 'init'"); |
| tunnel_reinit(cf, data, ts); |
| break; |
| |
| case H1_TUNNEL_CONNECT: |
| CURL_TRC_CF(data, cf, "new tunnel state 'connect'"); |
| ts->tunnel_state = H1_TUNNEL_CONNECT; |
| ts->keepon = KEEPON_CONNECT; |
| Curl_dyn_reset(&ts->rcvbuf); |
| break; |
| |
| case H1_TUNNEL_RECEIVE: |
| CURL_TRC_CF(data, cf, "new tunnel state 'receive'"); |
| ts->tunnel_state = H1_TUNNEL_RECEIVE; |
| break; |
| |
| case H1_TUNNEL_RESPONSE: |
| CURL_TRC_CF(data, cf, "new tunnel state 'response'"); |
| ts->tunnel_state = H1_TUNNEL_RESPONSE; |
| break; |
| |
| case H1_TUNNEL_ESTABLISHED: |
| CURL_TRC_CF(data, cf, "new tunnel state 'established'"); |
| infof(data, "CONNECT phase completed"); |
| data->state.authproxy.done = TRUE; |
| data->state.authproxy.multipass = FALSE; |
| FALLTHROUGH(); |
| case H1_TUNNEL_FAILED: |
| if(new_state == H1_TUNNEL_FAILED) |
| CURL_TRC_CF(data, cf, "new tunnel state 'failed'"); |
| ts->tunnel_state = new_state; |
| Curl_dyn_reset(&ts->rcvbuf); |
| Curl_dyn_reset(&ts->request_data); |
| /* restore the protocol pointer */ |
| data->info.httpcode = 0; /* clear it as it might've been used for the |
| proxy */ |
| /* If a proxy-authorization header was used for the proxy, then we should |
| make sure that it isn't accidentally used for the document request |
| after we've connected. So let's free and clear it here. */ |
| Curl_safefree(data->state.aptr.proxyuserpwd); |
| #ifdef USE_HYPER |
| data->state.hconnect = FALSE; |
| #endif |
| break; |
| } |
| } |
| |
| static void tunnel_free(struct Curl_cfilter *cf, |
| struct Curl_easy *data) |
| { |
| struct h1_tunnel_state *ts = cf->ctx; |
| if(ts) { |
| h1_tunnel_go_state(cf, ts, H1_TUNNEL_FAILED, data); |
| Curl_dyn_free(&ts->rcvbuf); |
| Curl_dyn_free(&ts->request_data); |
| Curl_httpchunk_free(data, &ts->ch); |
| free(ts); |
| cf->ctx = NULL; |
| } |
| } |
| |
| #ifndef USE_HYPER |
| static CURLcode start_CONNECT(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts) |
| { |
| struct httpreq *req = NULL; |
| int http_minor; |
| CURLcode result; |
| |
| /* This only happens if we've looped here due to authentication |
| reasons, and we don't really use the newly cloned URL here |
| then. Just free() it. */ |
| Curl_safefree(data->req.newurl); |
| |
| result = Curl_http_proxy_create_CONNECT(&req, cf, data, 1); |
| if(result) |
| goto out; |
| |
| infof(data, "Establish HTTP proxy tunnel to %s", req->authority); |
| |
| Curl_dyn_reset(&ts->request_data); |
| ts->nsent = 0; |
| ts->headerlines = 0; |
| http_minor = (cf->conn->http_proxy.proxytype == CURLPROXY_HTTP_1_0) ? 0 : 1; |
| |
| result = Curl_h1_req_write_head(req, http_minor, &ts->request_data); |
| |
| out: |
| if(result) |
| failf(data, "Failed sending CONNECT to proxy"); |
| if(req) |
| Curl_http_req_free(req); |
| return result; |
| } |
| |
| static CURLcode send_CONNECT(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts, |
| bool *done) |
| { |
| char *buf = Curl_dyn_ptr(&ts->request_data); |
| size_t request_len = Curl_dyn_len(&ts->request_data); |
| size_t blen = request_len; |
| CURLcode result = CURLE_OK; |
| ssize_t nwritten; |
| |
| if(blen <= ts->nsent) |
| goto out; /* we are done */ |
| |
| blen -= ts->nsent; |
| buf += ts->nsent; |
| |
| nwritten = cf->next->cft->do_send(cf->next, data, buf, blen, &result); |
| if(nwritten < 0) { |
| if(result == CURLE_AGAIN) { |
| result = CURLE_OK; |
| } |
| goto out; |
| } |
| |
| DEBUGASSERT(blen >= (size_t)nwritten); |
| ts->nsent += (size_t)nwritten; |
| Curl_debug(data, CURLINFO_HEADER_OUT, buf, (size_t)nwritten); |
| |
| out: |
| if(result) |
| failf(data, "Failed sending CONNECT to proxy"); |
| *done = (!result && (ts->nsent >= request_len)); |
| return result; |
| } |
| |
| static CURLcode on_resp_header(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts, |
| const char *header) |
| { |
| CURLcode result = CURLE_OK; |
| struct SingleRequest *k = &data->req; |
| (void)cf; |
| |
| if((checkprefix("WWW-Authenticate:", header) && |
| (401 == k->httpcode)) || |
| (checkprefix("Proxy-authenticate:", header) && |
| (407 == k->httpcode))) { |
| |
| bool proxy = (k->httpcode == 407) ? TRUE : FALSE; |
| char *auth = Curl_copy_header_value(header); |
| if(!auth) |
| return CURLE_OUT_OF_MEMORY; |
| |
| CURL_TRC_CF(data, cf, "CONNECT: fwd auth header '%s'", header); |
| result = Curl_http_input_auth(data, proxy, auth); |
| |
| free(auth); |
| |
| if(result) |
| return result; |
| } |
| else if(checkprefix("Content-Length:", header)) { |
| if(k->httpcode/100 == 2) { |
| /* A client MUST ignore any Content-Length or Transfer-Encoding |
| header fields received in a successful response to CONNECT. |
| "Successful" described as: 2xx (Successful). RFC 7231 4.3.6 */ |
| infof(data, "Ignoring Content-Length in CONNECT %03d response", |
| k->httpcode); |
| } |
| else { |
| (void)curlx_strtoofft(header + strlen("Content-Length:"), |
| NULL, 10, &ts->cl); |
| } |
| } |
| else if(Curl_compareheader(header, |
| STRCONST("Connection:"), STRCONST("close"))) |
| ts->close_connection = TRUE; |
| else if(checkprefix("Transfer-Encoding:", header)) { |
| if(k->httpcode/100 == 2) { |
| /* A client MUST ignore any Content-Length or Transfer-Encoding |
| header fields received in a successful response to CONNECT. |
| "Successful" described as: 2xx (Successful). RFC 7231 4.3.6 */ |
| infof(data, "Ignoring Transfer-Encoding in " |
| "CONNECT %03d response", k->httpcode); |
| } |
| else if(Curl_compareheader(header, |
| STRCONST("Transfer-Encoding:"), |
| STRCONST("chunked"))) { |
| infof(data, "CONNECT responded chunked"); |
| ts->chunked_encoding = TRUE; |
| /* reset our chunky engine */ |
| Curl_httpchunk_reset(data, &ts->ch, TRUE); |
| } |
| } |
| else if(Curl_compareheader(header, |
| STRCONST("Proxy-Connection:"), |
| STRCONST("close"))) |
| ts->close_connection = TRUE; |
| else if(!strncmp(header, "HTTP/1.", 7) && |
| ((header[7] == '0') || (header[7] == '1')) && |
| (header[8] == ' ') && |
| ISDIGIT(header[9]) && ISDIGIT(header[10]) && ISDIGIT(header[11]) && |
| !ISDIGIT(header[12])) { |
| /* store the HTTP code from the proxy */ |
| data->info.httpproxycode = k->httpcode = (header[9] - '0') * 100 + |
| (header[10] - '0') * 10 + (header[11] - '0'); |
| } |
| return result; |
| } |
| |
| static CURLcode recv_CONNECT_resp(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts, |
| bool *done) |
| { |
| CURLcode result = CURLE_OK; |
| struct SingleRequest *k = &data->req; |
| curl_socket_t tunnelsocket = Curl_conn_cf_get_socket(cf, data); |
| char *linep; |
| size_t line_len; |
| int error, writetype; |
| |
| #define SELECT_OK 0 |
| #define SELECT_ERROR 1 |
| |
| error = SELECT_OK; |
| *done = FALSE; |
| |
| if(!Curl_conn_data_pending(data, cf->sockindex)) |
| return CURLE_OK; |
| |
| while(ts->keepon) { |
| ssize_t nread; |
| char byte; |
| |
| /* Read one byte at a time to avoid a race condition. Wait at most one |
| second before looping to ensure continuous pgrsUpdates. */ |
| result = Curl_read(data, tunnelsocket, &byte, 1, &nread); |
| if(result == CURLE_AGAIN) |
| /* socket buffer drained, return */ |
| return CURLE_OK; |
| |
| if(Curl_pgrsUpdate(data)) |
| return CURLE_ABORTED_BY_CALLBACK; |
| |
| if(result) { |
| ts->keepon = KEEPON_DONE; |
| break; |
| } |
| |
| if(nread <= 0) { |
| if(data->set.proxyauth && data->state.authproxy.avail && |
| data->state.aptr.proxyuserpwd) { |
| /* proxy auth was requested and there was proxy auth available, |
| then deem this as "mere" proxy disconnect */ |
| ts->close_connection = TRUE; |
| infof(data, "Proxy CONNECT connection closed"); |
| } |
| else { |
| error = SELECT_ERROR; |
| failf(data, "Proxy CONNECT aborted"); |
| } |
| ts->keepon = KEEPON_DONE; |
| break; |
| } |
| |
| if(ts->keepon == KEEPON_IGNORE) { |
| /* This means we are currently ignoring a response-body */ |
| |
| if(ts->cl) { |
| /* A Content-Length based body: simply count down the counter |
| and make sure to break out of the loop when we're done! */ |
| ts->cl--; |
| if(ts->cl <= 0) { |
| ts->keepon = KEEPON_DONE; |
| break; |
| } |
| } |
| else if(ts->chunked_encoding) { |
| /* chunked-encoded body, so we need to do the chunked dance |
| properly to know when the end of the body is reached */ |
| size_t consumed = 0; |
| |
| /* now parse the chunked piece of data so that we can |
| properly tell when the stream ends */ |
| result = Curl_httpchunk_read(data, &ts->ch, &byte, 1, &consumed); |
| if(result) |
| return result; |
| if(Curl_httpchunk_is_done(data, &ts->ch)) { |
| /* we're done reading chunks! */ |
| infof(data, "chunk reading DONE"); |
| ts->keepon = KEEPON_DONE; |
| } |
| } |
| continue; |
| } |
| |
| if(Curl_dyn_addn(&ts->rcvbuf, &byte, 1)) { |
| failf(data, "CONNECT response too large"); |
| return CURLE_RECV_ERROR; |
| } |
| |
| /* if this is not the end of a header line then continue */ |
| if(byte != 0x0a) |
| continue; |
| |
| ts->headerlines++; |
| linep = Curl_dyn_ptr(&ts->rcvbuf); |
| line_len = Curl_dyn_len(&ts->rcvbuf); /* amount of bytes in this line */ |
| |
| /* output debug if that is requested */ |
| Curl_debug(data, CURLINFO_HEADER_IN, linep, line_len); |
| |
| /* send the header to the callback */ |
| writetype = CLIENTWRITE_HEADER | CLIENTWRITE_CONNECT | |
| (ts->headerlines == 1 ? CLIENTWRITE_STATUS : 0); |
| result = Curl_client_write(data, writetype, linep, line_len); |
| if(result) |
| return result; |
| |
| result = Curl_bump_headersize(data, line_len, TRUE); |
| if(result) |
| return result; |
| |
| /* Newlines are CRLF, so the CR is ignored as the line isn't |
| really terminated until the LF comes. Treat a following CR |
| as end-of-headers as well.*/ |
| |
| if(('\r' == linep[0]) || |
| ('\n' == linep[0])) { |
| /* end of response-headers from the proxy */ |
| |
| if((407 == k->httpcode) && !data->state.authproblem) { |
| /* If we get a 407 response code with content length |
| when we have no auth problem, we must ignore the |
| whole response-body */ |
| ts->keepon = KEEPON_IGNORE; |
| |
| if(ts->cl) { |
| infof(data, "Ignore %" CURL_FORMAT_CURL_OFF_T |
| " bytes of response-body", ts->cl); |
| } |
| else if(ts->chunked_encoding) { |
| infof(data, "Ignore chunked response-body"); |
| } |
| else { |
| /* without content-length or chunked encoding, we |
| can't keep the connection alive since the close is |
| the end signal so we bail out at once instead */ |
| CURL_TRC_CF(data, cf, "CONNECT: no content-length or chunked"); |
| ts->keepon = KEEPON_DONE; |
| } |
| } |
| else { |
| ts->keepon = KEEPON_DONE; |
| } |
| |
| DEBUGASSERT(ts->keepon == KEEPON_IGNORE |
| || ts->keepon == KEEPON_DONE); |
| continue; |
| } |
| |
| result = on_resp_header(cf, data, ts, linep); |
| if(result) |
| return result; |
| |
| Curl_dyn_reset(&ts->rcvbuf); |
| } /* while there's buffer left and loop is requested */ |
| |
| if(error) |
| result = CURLE_RECV_ERROR; |
| *done = (ts->keepon == KEEPON_DONE); |
| if(!result && *done && data->info.httpproxycode/100 != 2) { |
| /* Deal with the possibly already received authenticate |
| headers. 'newurl' is set to a new URL if we must loop. */ |
| result = Curl_http_auth_act(data); |
| } |
| return result; |
| } |
| |
| #else /* USE_HYPER */ |
| |
| static CURLcode CONNECT_host(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| char **pauthority, |
| char **phost_header) |
| { |
| const char *hostname; |
| int port; |
| bool ipv6_ip; |
| CURLcode result; |
| char *authority; /* for CONNECT, the destination host + port */ |
| char *host_header = NULL; /* Host: authority */ |
| |
| result = Curl_http_proxy_get_destination(cf, &hostname, &port, &ipv6_ip); |
| if(result) |
| return result; |
| |
| authority = aprintf("%s%s%s:%d", ipv6_ip?"[":"", hostname, ipv6_ip?"]":"", |
| port); |
| if(!authority) |
| return CURLE_OUT_OF_MEMORY; |
| |
| /* If user is not overriding the Host header later */ |
| if(!Curl_checkProxyheaders(data, cf->conn, STRCONST("Host"))) { |
| host_header = aprintf("Host: %s\r\n", authority); |
| if(!host_header) { |
| free(authority); |
| return CURLE_OUT_OF_MEMORY; |
| } |
| } |
| *pauthority = authority; |
| *phost_header = host_header; |
| return CURLE_OK; |
| } |
| |
| /* The Hyper version of CONNECT */ |
| static CURLcode start_CONNECT(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts) |
| { |
| struct connectdata *conn = cf->conn; |
| struct hyptransfer *h = &data->hyp; |
| curl_socket_t tunnelsocket = Curl_conn_cf_get_socket(cf, data); |
| hyper_io *io = NULL; |
| hyper_request *req = NULL; |
| hyper_headers *headers = NULL; |
| hyper_clientconn_options *options = NULL; |
| hyper_task *handshake = NULL; |
| hyper_task *task = NULL; /* for the handshake */ |
| hyper_clientconn *client = NULL; |
| hyper_task *sendtask = NULL; /* for the send */ |
| char *authority = NULL; /* for CONNECT */ |
| char *host_header = NULL; /* Host: */ |
| CURLcode result = CURLE_OUT_OF_MEMORY; |
| (void)ts; |
| |
| io = hyper_io_new(); |
| if(!io) { |
| failf(data, "Couldn't create hyper IO"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| /* tell Hyper how to read/write network data */ |
| hyper_io_set_userdata(io, data); |
| hyper_io_set_read(io, Curl_hyper_recv); |
| hyper_io_set_write(io, Curl_hyper_send); |
| conn->sockfd = tunnelsocket; |
| |
| data->state.hconnect = TRUE; |
| |
| /* create an executor to poll futures */ |
| if(!h->exec) { |
| h->exec = hyper_executor_new(); |
| if(!h->exec) { |
| failf(data, "Couldn't create hyper executor"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| } |
| |
| options = hyper_clientconn_options_new(); |
| if(!options) { |
| failf(data, "Couldn't create hyper client options"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| hyper_clientconn_options_set_preserve_header_case(options, 1); |
| hyper_clientconn_options_set_preserve_header_order(options, 1); |
| |
| hyper_clientconn_options_exec(options, h->exec); |
| |
| /* "Both the `io` and the `options` are consumed in this function |
| call" */ |
| handshake = hyper_clientconn_handshake(io, options); |
| if(!handshake) { |
| failf(data, "Couldn't create hyper client handshake"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| io = NULL; |
| options = NULL; |
| |
| if(HYPERE_OK != hyper_executor_push(h->exec, handshake)) { |
| failf(data, "Couldn't hyper_executor_push the handshake"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| handshake = NULL; /* ownership passed on */ |
| |
| task = hyper_executor_poll(h->exec); |
| if(!task) { |
| failf(data, "Couldn't hyper_executor_poll the handshake"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| |
| client = hyper_task_value(task); |
| hyper_task_free(task); |
| |
| req = hyper_request_new(); |
| if(!req) { |
| failf(data, "Couldn't hyper_request_new"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| if(hyper_request_set_method(req, (uint8_t *)"CONNECT", |
| strlen("CONNECT"))) { |
| failf(data, "error setting method"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| |
| /* This only happens if we've looped here due to authentication |
| reasons, and we don't really use the newly cloned URL here |
| then. Just free() it. */ |
| Curl_safefree(data->req.newurl); |
| |
| result = CONNECT_host(cf, data, &authority, &host_header); |
| if(result) |
| goto error; |
| |
| infof(data, "Establish HTTP proxy tunnel to %s", authority); |
| |
| if(hyper_request_set_uri(req, (uint8_t *)authority, |
| strlen(authority))) { |
| failf(data, "error setting path"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| if(data->set.verbose) { |
| char *se = aprintf("CONNECT %s HTTP/1.1\r\n", authority); |
| if(!se) { |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| Curl_debug(data, CURLINFO_HEADER_OUT, se, strlen(se)); |
| free(se); |
| } |
| /* Setup the proxy-authorization header, if any */ |
| result = Curl_http_output_auth(data, conn, "CONNECT", HTTPREQ_GET, |
| authority, TRUE); |
| if(result) |
| goto error; |
| Curl_safefree(authority); |
| |
| /* default is 1.1 */ |
| if((conn->http_proxy.proxytype == CURLPROXY_HTTP_1_0) && |
| (HYPERE_OK != hyper_request_set_version(req, |
| HYPER_HTTP_VERSION_1_0))) { |
| failf(data, "error setting HTTP version"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| |
| headers = hyper_request_headers(req); |
| if(!headers) { |
| failf(data, "hyper_request_headers"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| if(host_header) { |
| result = Curl_hyper_header(data, headers, host_header); |
| if(result) |
| goto error; |
| Curl_safefree(host_header); |
| } |
| |
| if(data->state.aptr.proxyuserpwd) { |
| result = Curl_hyper_header(data, headers, |
| data->state.aptr.proxyuserpwd); |
| if(result) |
| goto error; |
| } |
| |
| if(!Curl_checkProxyheaders(data, conn, STRCONST("User-Agent")) && |
| data->set.str[STRING_USERAGENT] && *data->set.str[STRING_USERAGENT]) { |
| struct dynbuf ua; |
| Curl_dyn_init(&ua, DYN_HTTP_REQUEST); |
| result = Curl_dyn_addf(&ua, "User-Agent: %s\r\n", |
| data->set.str[STRING_USERAGENT]); |
| if(result) |
| goto error; |
| result = Curl_hyper_header(data, headers, Curl_dyn_ptr(&ua)); |
| if(result) |
| goto error; |
| Curl_dyn_free(&ua); |
| } |
| |
| if(!Curl_checkProxyheaders(data, conn, STRCONST("Proxy-Connection"))) { |
| result = Curl_hyper_header(data, headers, |
| "Proxy-Connection: Keep-Alive"); |
| if(result) |
| goto error; |
| } |
| |
| result = Curl_add_custom_headers(data, TRUE, headers); |
| if(result) |
| goto error; |
| |
| sendtask = hyper_clientconn_send(client, req); |
| if(!sendtask) { |
| failf(data, "hyper_clientconn_send"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| req = NULL; |
| |
| if(HYPERE_OK != hyper_executor_push(h->exec, sendtask)) { |
| failf(data, "Couldn't hyper_executor_push the send"); |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| sendtask = NULL; /* ownership passed on */ |
| |
| hyper_clientconn_free(client); |
| client = NULL; |
| |
| error: |
| free(host_header); |
| free(authority); |
| if(io) |
| hyper_io_free(io); |
| if(options) |
| hyper_clientconn_options_free(options); |
| if(handshake) |
| hyper_task_free(handshake); |
| if(client) |
| hyper_clientconn_free(client); |
| if(req) |
| hyper_request_free(req); |
| |
| return result; |
| } |
| |
| static CURLcode send_CONNECT(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts, |
| bool *done) |
| { |
| struct hyptransfer *h = &data->hyp; |
| struct connectdata *conn = cf->conn; |
| hyper_task *task = NULL; |
| hyper_error *hypererr = NULL; |
| CURLcode result = CURLE_OK; |
| |
| (void)ts; |
| (void)conn; |
| do { |
| task = hyper_executor_poll(h->exec); |
| if(task) { |
| bool error = hyper_task_type(task) == HYPER_TASK_ERROR; |
| if(error) |
| hypererr = hyper_task_value(task); |
| hyper_task_free(task); |
| if(error) { |
| /* this could probably use a better error code? */ |
| result = CURLE_OUT_OF_MEMORY; |
| goto error; |
| } |
| } |
| } while(task); |
| error: |
| *done = (result == CURLE_OK); |
| if(hypererr) { |
| uint8_t errbuf[256]; |
| size_t errlen = hyper_error_print(hypererr, errbuf, sizeof(errbuf)); |
| failf(data, "Hyper: %.*s", (int)errlen, errbuf); |
| hyper_error_free(hypererr); |
| } |
| return result; |
| } |
| |
| static CURLcode recv_CONNECT_resp(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts, |
| bool *done) |
| { |
| struct hyptransfer *h = &data->hyp; |
| CURLcode result; |
| int didwhat; |
| |
| (void)ts; |
| *done = FALSE; |
| result = Curl_hyper_stream(data, cf->conn, &didwhat, done, |
| CURL_CSELECT_IN | CURL_CSELECT_OUT); |
| if(result || !*done) |
| return result; |
| if(h->exec) { |
| hyper_executor_free(h->exec); |
| h->exec = NULL; |
| } |
| if(h->read_waker) { |
| hyper_waker_free(h->read_waker); |
| h->read_waker = NULL; |
| } |
| if(h->write_waker) { |
| hyper_waker_free(h->write_waker); |
| h->write_waker = NULL; |
| } |
| return result; |
| } |
| |
| #endif /* USE_HYPER */ |
| |
| static CURLcode H1_CONNECT(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct h1_tunnel_state *ts) |
| { |
| struct connectdata *conn = cf->conn; |
| CURLcode result; |
| bool done; |
| |
| if(tunnel_is_established(ts)) |
| return CURLE_OK; |
| if(tunnel_is_failed(ts)) |
| return CURLE_RECV_ERROR; /* Need a cfilter close and new bootstrap */ |
| |
| do { |
| timediff_t check; |
| |
| check = Curl_timeleft(data, NULL, TRUE); |
| if(check <= 0) { |
| failf(data, "Proxy CONNECT aborted due to timeout"); |
| result = CURLE_OPERATION_TIMEDOUT; |
| goto out; |
| } |
| |
| switch(ts->tunnel_state) { |
| case H1_TUNNEL_INIT: |
| /* Prepare the CONNECT request and make a first attempt to send. */ |
| CURL_TRC_CF(data, cf, "CONNECT start"); |
| result = start_CONNECT(cf, data, ts); |
| if(result) |
| goto out; |
| h1_tunnel_go_state(cf, ts, H1_TUNNEL_CONNECT, data); |
| FALLTHROUGH(); |
| |
| case H1_TUNNEL_CONNECT: |
| /* see that the request is completely sent */ |
| CURL_TRC_CF(data, cf, "CONNECT send"); |
| result = send_CONNECT(cf, data, ts, &done); |
| if(result || !done) |
| goto out; |
| h1_tunnel_go_state(cf, ts, H1_TUNNEL_RECEIVE, data); |
| FALLTHROUGH(); |
| |
| case H1_TUNNEL_RECEIVE: |
| /* read what is there */ |
| CURL_TRC_CF(data, cf, "CONNECT receive"); |
| result = recv_CONNECT_resp(cf, data, ts, &done); |
| if(Curl_pgrsUpdate(data)) { |
| result = CURLE_ABORTED_BY_CALLBACK; |
| goto out; |
| } |
| /* error or not complete yet. return for more multi-multi */ |
| if(result || !done) |
| goto out; |
| /* got it */ |
| h1_tunnel_go_state(cf, ts, H1_TUNNEL_RESPONSE, data); |
| FALLTHROUGH(); |
| |
| case H1_TUNNEL_RESPONSE: |
| CURL_TRC_CF(data, cf, "CONNECT response"); |
| if(data->req.newurl) { |
| /* not the "final" response, we need to do a follow up request. |
| * If the other side indicated a connection close, or if someone |
| * else told us to close this connection, do so now. |
| */ |
| if(ts->close_connection || conn->bits.close) { |
| /* Close this filter and the sub-chain, re-connect the |
| * sub-chain and continue. Closing this filter will |
| * reset our tunnel state. To avoid recursion, we return |
| * and expect to be called again. |
| */ |
| CURL_TRC_CF(data, cf, "CONNECT need to close+open"); |
| infof(data, "Connect me again please"); |
| Curl_conn_cf_close(cf, data); |
| connkeep(conn, "HTTP proxy CONNECT"); |
| result = Curl_conn_cf_connect(cf->next, data, FALSE, &done); |
| goto out; |
| } |
| else { |
| /* staying on this connection, reset state */ |
| h1_tunnel_go_state(cf, ts, H1_TUNNEL_INIT, data); |
| } |
| } |
| break; |
| |
| default: |
| break; |
| } |
| |
| } while(data->req.newurl); |
| |
| DEBUGASSERT(ts->tunnel_state == H1_TUNNEL_RESPONSE); |
| if(data->info.httpproxycode/100 != 2) { |
| /* a non-2xx response and we have no next url to try. */ |
| Curl_safefree(data->req.newurl); |
| /* failure, close this connection to avoid reuse */ |
| streamclose(conn, "proxy CONNECT failure"); |
| h1_tunnel_go_state(cf, ts, H1_TUNNEL_FAILED, data); |
| failf(data, "CONNECT tunnel failed, response %d", data->req.httpcode); |
| return CURLE_RECV_ERROR; |
| } |
| /* 2xx response, SUCCESS! */ |
| h1_tunnel_go_state(cf, ts, H1_TUNNEL_ESTABLISHED, data); |
| infof(data, "CONNECT tunnel established, response %d", |
| data->info.httpproxycode); |
| result = CURLE_OK; |
| |
| out: |
| if(result) |
| h1_tunnel_go_state(cf, ts, H1_TUNNEL_FAILED, data); |
| return result; |
| } |
| |
| static CURLcode cf_h1_proxy_connect(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| bool blocking, bool *done) |
| { |
| CURLcode result; |
| struct h1_tunnel_state *ts = cf->ctx; |
| |
| if(cf->connected) { |
| *done = TRUE; |
| return CURLE_OK; |
| } |
| |
| CURL_TRC_CF(data, cf, "connect"); |
| result = cf->next->cft->do_connect(cf->next, data, blocking, done); |
| if(result || !*done) |
| return result; |
| |
| *done = FALSE; |
| if(!ts) { |
| result = tunnel_init(cf, data, &ts); |
| if(result) |
| return result; |
| cf->ctx = ts; |
| } |
| |
| /* TODO: can we do blocking? */ |
| /* We want "seamless" operations through HTTP proxy tunnel */ |
| |
| result = H1_CONNECT(cf, data, ts); |
| if(result) |
| goto out; |
| Curl_safefree(data->state.aptr.proxyuserpwd); |
| |
| out: |
| *done = (result == CURLE_OK) && tunnel_is_established(cf->ctx); |
| if(*done) { |
| cf->connected = TRUE; |
| /* Restore `data->req` fields that may habe been touched */ |
| data->req.header = TRUE; /* assume header */ |
| data->req.bytecount = 0; |
| data->req.ignorebody = FALSE; |
| Curl_client_cleanup(data); |
| Curl_pgrsSetUploadCounter(data, 0); |
| Curl_pgrsSetDownloadCounter(data, 0); |
| |
| tunnel_free(cf, data); |
| } |
| return result; |
| } |
| |
| static void cf_h1_proxy_adjust_pollset(struct Curl_cfilter *cf, |
| struct Curl_easy *data, |
| struct easy_pollset *ps) |
| { |
| struct h1_tunnel_state *ts = cf->ctx; |
| |
| if(!cf->connected) { |
| /* If we are not connected, but the filter "below" is |
| * and not waiting on something, we are tunneling. */ |
| curl_socket_t sock = Curl_conn_cf_get_socket(cf, data); |
| if(ts) { |
| /* when we've sent a CONNECT to a proxy, we should rather either |
| wait for the socket to become readable to be able to get the |
| response headers or if we're still sending the request, wait |
| for write. */ |
| if(ts->CONNECT.sending == HTTPSEND_REQUEST) |
| Curl_pollset_set_out_only(data, ps, sock); |
| else |
| Curl_pollset_set_in_only(data, ps, sock); |
| } |
| else |
| Curl_pollset_set_out_only(data, ps, sock); |
| } |
| } |
| |
| static void cf_h1_proxy_destroy(struct Curl_cfilter *cf, |
| struct Curl_easy *data) |
| { |
| CURL_TRC_CF(data, cf, "destroy"); |
| tunnel_free(cf, data); |
| } |
| |
| static void cf_h1_proxy_close(struct Curl_cfilter *cf, |
| struct Curl_easy *data) |
| { |
| CURL_TRC_CF(data, cf, "close"); |
| cf->connected = FALSE; |
| if(cf->ctx) { |
| h1_tunnel_go_state(cf, cf->ctx, H1_TUNNEL_INIT, data); |
| } |
| if(cf->next) |
| cf->next->cft->do_close(cf->next, data); |
| } |
| |
| |
| struct Curl_cftype Curl_cft_h1_proxy = { |
| "H1-PROXY", |
| CF_TYPE_IP_CONNECT, |
| 0, |
| cf_h1_proxy_destroy, |
| cf_h1_proxy_connect, |
| cf_h1_proxy_close, |
| Curl_cf_http_proxy_get_host, |
| cf_h1_proxy_adjust_pollset, |
| Curl_cf_def_data_pending, |
| Curl_cf_def_send, |
| Curl_cf_def_recv, |
| Curl_cf_def_cntrl, |
| Curl_cf_def_conn_is_alive, |
| Curl_cf_def_conn_keep_alive, |
| Curl_cf_def_query, |
| }; |
| |
| CURLcode Curl_cf_h1_proxy_insert_after(struct Curl_cfilter *cf_at, |
| struct Curl_easy *data) |
| { |
| struct Curl_cfilter *cf; |
| CURLcode result; |
| |
| (void)data; |
| result = Curl_cf_create(&cf, &Curl_cft_h1_proxy, NULL); |
| if(!result) |
| Curl_conn_cf_insert_after(cf_at, cf); |
| return result; |
| } |
| |
| #endif /* !CURL_DISABLE_PROXY && ! CURL_DISABLE_HTTP */ |