| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433 | /* <!-- copyright *//* * aria2 - The high speed download utility * * Copyright (C) 2006 Tatsuhiro Tsujikawa * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA * * In addition, as a special exception, the copyright holders give * permission to link the code of portions of this program with the * OpenSSL library under certain conditions as described in each * individual source file, and distribute linked combinations * including the two. * You must obey the GNU General Public License in all respects * for all of the code used other than OpenSSL.  If you modify * file(s) with this exception, you may extend this exception to your * version of the file(s), but you are not obligated to do so.  If you * do not wish to do so, delete this exception statement from your * version.  If you delete this exception statement from all source * files in the program, then also delete it here. *//* copyright --> */#include "HttpRequest.h"#include <cassert>#include <numeric>#include <vector>#include "Segment.h"#include "Range.h"#include "CookieStorage.h"#include "Option.h"#include "util.h"#include "base64.h"#include "prefs.h"#include "AuthConfigFactory.h"#include "AuthConfig.h"#include "a2functional.h"#include "TimeA2.h"#include "array_fun.h"#include "Request.h"#include "DownloadHandlerConstants.h"#include "MessageDigest.h"namespace aria2 {const std::string HttpRequest::USER_AGENT("aria2");HttpRequest::HttpRequest()    : cookieStorage_(nullptr),      authConfigFactory_(nullptr),      option_(nullptr),      endOffsetOverride_(0),      userAgent_(USER_AGENT),      contentEncodingEnabled_(true),      acceptMetalink_(false),      noCache_(true),      acceptGzip_(false),      noWantDigest_(false){}HttpRequest::~HttpRequest() {}void HttpRequest::setSegment(std::shared_ptr<Segment> segment){  segment_ = std::move(segment);}void HttpRequest::setRequest(std::shared_ptr<Request> request){  request_ = std::move(request);}int64_t HttpRequest::getStartByte() const{  if (!segment_) {    return 0;  }  return fileEntry_->gtoloff(segment_->getPositionToWrite());}int64_t HttpRequest::getEndByte() const{  if (!segment_ || !request_) {    return 0;  }  if (request_->isPipeliningEnabled()) {    auto endByte = fileEntry_->gtoloff(segment_->getPosition() +                                       segment_->getLength() - 1);    return std::min(endByte, fileEntry_->getLength() - 1);  }  if (endOffsetOverride_ > 0) {    return endOffsetOverride_ - 1;  }  return 0;}Range HttpRequest::getRange() const{  // content-length is always 0  if (!segment_) {    return Range();  }  return Range(getStartByte(), getEndByte(), fileEntry_->getLength());}bool HttpRequest::isRangeSatisfied(const Range& range) const{  if (!segment_) {    return true;  }  return getStartByte() == range.startByte &&         (getEndByte() == 0 || getEndByte() == range.endByte) &&         (fileEntry_->getLength() == 0 ||          fileEntry_->getLength() == range.entityLength);}namespace {std::string getHostText(const std::string& host, uint16_t port){  auto hosttext = host;  if (!(port == 80 || port == 443)) {    hosttext += ':';    hosttext += util::uitos(port);  }  return hosttext;}} // namespacestd::string HttpRequest::createRequest(){  authConfig_ = authConfigFactory_->createAuthConfig(request_, option_);  auto requestLine = request_->getMethod();  requestLine += ' ';  if (proxyRequest_) {    if (getProtocol() == "ftp" && request_->getUsername().empty() &&        authConfig_) {      // Insert user into URI, like ftp://USER@host/      auto uri = getCurrentURI();      assert(uri.size() >= 6);      uri.insert(6, util::percentEncode(authConfig_->getUser()) + '@');      requestLine += uri;    }    else {      requestLine += getCurrentURI();    }  }  else {    requestLine += getDir();    requestLine += getFile();    requestLine += getQuery();  }  requestLine += " HTTP/1.1\r\n";  std::vector<std::pair<std::string, std::string>> builtinHds;  builtinHds.reserve(20);  builtinHds.emplace_back("User-Agent:", userAgent_);  std::string acceptTypes = "*/*";  if (acceptMetalink_) {    // The mime types of Metalink are used for "transparent metalink".    const auto metalinkTypes = getMetalinkContentTypes();    for (size_t i = 0; metalinkTypes[i]; ++i) {      acceptTypes += ',';      acceptTypes += metalinkTypes[i];    }  }  builtinHds.emplace_back("Accept:", acceptTypes);  if (contentEncodingEnabled_) {    std::string acceptableEncodings;#ifdef HAVE_ZLIB    if (acceptGzip_) {      acceptableEncodings += "deflate, gzip";    }#endif // HAVE_ZLIB    if (!acceptableEncodings.empty()) {      builtinHds.emplace_back("Accept-Encoding:", acceptableEncodings);    }  }  builtinHds.emplace_back("Host:", getHostText(getURIHost(), getPort()));  if (noCache_) {    builtinHds.emplace_back("Pragma:", "no-cache");    builtinHds.emplace_back("Cache-Control:", "no-cache");  }  if (!request_->isKeepAliveEnabled() && !request_->isPipeliningEnabled()) {    builtinHds.emplace_back("Connection:", "close");  }  if (segment_ && segment_->getLength() > 0 &&      (request_->isPipeliningEnabled() || getStartByte() > 0 ||       getEndByte() > 0)) {    std::string rangeHeader = "bytes=";    rangeHeader += util::uitos(getStartByte());    rangeHeader += '-';    if (request_->isPipeliningEnabled() || getEndByte() > 0) {      // FTP via http proxy does not support endbytes, but in that      // case, request_->isPipeliningEnabled() is false and      // getEndByte() is 0.      rangeHeader += util::itos(getEndByte());    }    builtinHds.emplace_back("Range:", rangeHeader);  }  if (proxyRequest_) {    if (request_->isKeepAliveEnabled() || request_->isPipeliningEnabled()) {      builtinHds.emplace_back("Connection:", "Keep-Alive");    }  }  if (proxyRequest_ && !proxyRequest_->getUsername().empty()) {    builtinHds.push_back(getProxyAuthString());  }  if (authConfig_) {    auto authText = authConfig_->getAuthText();    std::string val = "Basic ";    val += base64::encode(std::begin(authText), std::end(authText));    builtinHds.emplace_back("Authorization:", val);  }  if (!request_->getReferer().empty()) {    builtinHds.emplace_back("Referer:", request_->getReferer());  }  if (cookieStorage_) {    std::string cookiesValue;    auto path = getDir();    path += getFile();    auto cookies = cookieStorage_->criteriaFind(        getHost(), path, Time().getTimeFromEpoch(), getProtocol() == "https");    for (auto c : cookies) {      cookiesValue += c->toString();      cookiesValue += ';';    }    if (!cookiesValue.empty()) {      builtinHds.emplace_back("Cookie:", cookiesValue);    }  }  if (!ifModSinceHeader_.empty()) {    builtinHds.emplace_back("If-Modified-Since:", ifModSinceHeader_);  }  if (!noWantDigest_) {    // Send Want-Digest header field with only limited hash algorithms:    // SHA-512, SHA-256, and SHA-1.    std::string wantDigest;    if (MessageDigest::supports("sha-512")) {      wantDigest += "SHA-512;q=1, ";    }    if (MessageDigest::supports("sha-256")) {      wantDigest += "SHA-256;q=1, ";    }    if (MessageDigest::supports("sha-1")) {      wantDigest += "SHA;q=0.1, ";    }    if (!wantDigest.empty()) {      wantDigest.erase(wantDigest.size() - 2);      builtinHds.emplace_back("Want-Digest:", wantDigest);    }  }  for (const auto& builtinHd : builtinHds) {    auto it = std::find_if(std::begin(headers_), std::end(headers_),                           [&builtinHd](const std::string& hd) {                             return util::istartsWith(hd, builtinHd.first);                           });    if (it == std::end(headers_)) {      requestLine += builtinHd.first;      requestLine += ' ';      requestLine += builtinHd.second;      requestLine += "\r\n";    }  }  // append additional headers given by user.  for (const auto& hd : headers_) {    requestLine += hd;    requestLine += "\r\n";  }  requestLine += "\r\n";  return requestLine;}std::string HttpRequest::createProxyRequest() const{  assert(proxyRequest_);  std::string requestLine = "CONNECT ";  requestLine += getURIHost();  requestLine += ':';  requestLine += util::uitos(getPort());  requestLine += " HTTP/1.1\r\nUser-Agent: ";  requestLine += userAgent_;  requestLine += "\r\nHost: ";  requestLine += getURIHost();  requestLine += ':';  requestLine += util::uitos(getPort());  requestLine += "\r\n";  if (!proxyRequest_->getUsername().empty()) {    auto auth = getProxyAuthString();    requestLine += auth.first;    requestLine += ' ';    requestLine += auth.second;    requestLine += "\r\n";  }  requestLine += "\r\n";  return requestLine;}std::pair<std::string, std::string> HttpRequest::getProxyAuthString() const{  auto authText = proxyRequest_->getUsername();  authText += ':';  authText += proxyRequest_->getPassword();  std::string val = "Basic ";  val += base64::encode(std::begin(authText), std::end(authText));  return std::make_pair("Proxy-Authorization:", val);}void HttpRequest::enableContentEncoding() { contentEncodingEnabled_ = true; }void HttpRequest::disableContentEncoding() { contentEncodingEnabled_ = false; }void HttpRequest::addHeader(const std::string& headersString){  util::split(std::begin(headersString), std::end(headersString),              std::back_inserter(headers_), '\n', true);}void HttpRequest::clearHeader() { headers_.clear(); }void HttpRequest::setCookieStorage(CookieStorage* cookieStorage){  cookieStorage_ = cookieStorage;}CookieStorage* HttpRequest::getCookieStorage() const { return cookieStorage_; }void HttpRequest::setAuthConfigFactory(AuthConfigFactory* factory){  authConfigFactory_ = factory;}void HttpRequest::setOption(const Option* option) { option_ = option; }void HttpRequest::setProxyRequest(std::shared_ptr<Request> proxyRequest){  proxyRequest_ = std::move(proxyRequest);}bool HttpRequest::isProxyRequestSet() const { return proxyRequest_.get(); }bool HttpRequest::authenticationUsed() const { return authConfig_.get(); }const std::unique_ptr<AuthConfig>& HttpRequest::getAuthConfig() const{  return authConfig_;}int64_t HttpRequest::getEntityLength() const{  assert(fileEntry_);  return fileEntry_->getLength();}const std::string& HttpRequest::getHost() const { return request_->getHost(); }uint16_t HttpRequest::getPort() const { return request_->getPort(); }const std::string& HttpRequest::getMethod() const{  return request_->getMethod();}const std::string& HttpRequest::getProtocol() const{  return request_->getProtocol();}const std::string& HttpRequest::getCurrentURI() const{  return request_->getCurrentUri();}const std::string& HttpRequest::getDir() const { return request_->getDir(); }const std::string& HttpRequest::getFile() const { return request_->getFile(); }const std::string& HttpRequest::getQuery() const{  return request_->getQuery();}std::string HttpRequest::getURIHost() const { return request_->getURIHost(); }void HttpRequest::setUserAgent(std::string userAgent){  userAgent_ = std::move(userAgent);}void HttpRequest::setFileEntry(std::shared_ptr<FileEntry> fileEntry){  fileEntry_ = std::move(fileEntry);}void HttpRequest::setIfModifiedSinceHeader(std::string value){  ifModSinceHeader_ = std::move(value);}bool HttpRequest::conditionalRequest() const{  if (!ifModSinceHeader_.empty()) {    return true;  }  for (auto& h : headers_) {    if (util::istartsWith(h, "if-modified-since") ||        util::istartsWith(h, "if-none-match")) {      return true;    }  }  return false;}} // namespace aria2
 |