379 lines
11 KiB
C++
379 lines
11 KiB
C++
// Copyright 2020 Google LLC. All rights reserved.
|
|
//
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file or at
|
|
// https://developers.google.com/open-source/licenses/bsd
|
|
|
|
#include "packager/file/http_file.h"
|
|
|
|
#include <curl/curl.h>
|
|
|
|
#include "absl/flags/declare.h"
|
|
#include "absl/flags/flag.h"
|
|
#include "absl/strings/escaping.h"
|
|
#include "absl/strings/str_format.h"
|
|
#include "glog/logging.h"
|
|
|
|
#include "packager/file/thread_pool.h"
|
|
#include "packager/macros.h"
|
|
#include "packager/version/version.h"
|
|
|
|
ABSL_FLAG(std::string,
|
|
user_agent,
|
|
"",
|
|
"Set a custom User-Agent string for HTTP requests.");
|
|
ABSL_FLAG(std::string,
|
|
ca_file,
|
|
"",
|
|
"Absolute path to the Certificate Authority file for the "
|
|
"server cert. PEM format");
|
|
ABSL_FLAG(std::string,
|
|
client_cert_file,
|
|
"",
|
|
"Absolute path to client certificate file.");
|
|
ABSL_FLAG(std::string,
|
|
client_cert_private_key_file,
|
|
"",
|
|
"Absolute path to the Private Key file.");
|
|
ABSL_FLAG(std::string,
|
|
client_cert_private_key_password,
|
|
"",
|
|
"Password to the private key file.");
|
|
ABSL_FLAG(bool,
|
|
disable_peer_verification,
|
|
false,
|
|
"Disable peer verification. This is needed to talk to servers "
|
|
"without valid certificates.");
|
|
|
|
ABSL_DECLARE_FLAG(uint64_t, io_cache_size);
|
|
|
|
namespace shaka {
|
|
|
|
namespace {
|
|
|
|
constexpr const char* kBinaryContentType = "application/octet-stream";
|
|
constexpr const int kMinLogLevelForCurlDebugFunction = 2;
|
|
|
|
size_t CurlWriteCallback(char* buffer, size_t size, size_t nmemb, void* user) {
|
|
IoCache* cache = reinterpret_cast<IoCache*>(user);
|
|
size_t length = size * nmemb;
|
|
if (cache) {
|
|
length = cache->Write(buffer, length);
|
|
VLOG(3) << "CurlWriteCallback length=" << length;
|
|
} else {
|
|
// For the case of HTTP Put, the returned data may not be consumed. Return
|
|
// the size of the data to avoid curl errors.
|
|
}
|
|
return length;
|
|
}
|
|
|
|
size_t CurlReadCallback(char* buffer, size_t size, size_t nitems, void* user) {
|
|
IoCache* cache = reinterpret_cast<IoCache*>(user);
|
|
size_t length = cache->Read(buffer, size * nitems);
|
|
VLOG(3) << "CurlRead length=" << length;
|
|
return length;
|
|
}
|
|
|
|
int CurlDebugCallback(CURL* /* handle */,
|
|
curl_infotype type,
|
|
const char* data,
|
|
size_t size,
|
|
void* /* userptr */) {
|
|
const char* type_text;
|
|
int log_level;
|
|
bool in_hex;
|
|
switch (type) {
|
|
case CURLINFO_TEXT:
|
|
type_text = "== Info";
|
|
log_level = kMinLogLevelForCurlDebugFunction + 1;
|
|
in_hex = false;
|
|
break;
|
|
case CURLINFO_HEADER_IN:
|
|
type_text = "<= Recv header";
|
|
log_level = kMinLogLevelForCurlDebugFunction;
|
|
in_hex = false;
|
|
break;
|
|
case CURLINFO_HEADER_OUT:
|
|
type_text = "=> Send header";
|
|
log_level = kMinLogLevelForCurlDebugFunction;
|
|
in_hex = false;
|
|
break;
|
|
case CURLINFO_DATA_IN:
|
|
type_text = "<= Recv data";
|
|
log_level = kMinLogLevelForCurlDebugFunction + 1;
|
|
in_hex = true;
|
|
break;
|
|
case CURLINFO_DATA_OUT:
|
|
type_text = "=> Send data";
|
|
log_level = kMinLogLevelForCurlDebugFunction + 1;
|
|
in_hex = true;
|
|
break;
|
|
case CURLINFO_SSL_DATA_IN:
|
|
type_text = "<= Recv SSL data";
|
|
log_level = kMinLogLevelForCurlDebugFunction + 2;
|
|
in_hex = true;
|
|
break;
|
|
case CURLINFO_SSL_DATA_OUT:
|
|
type_text = "=> Send SSL data";
|
|
log_level = kMinLogLevelForCurlDebugFunction + 2;
|
|
in_hex = true;
|
|
break;
|
|
default:
|
|
// Ignore other debug data.
|
|
return 0;
|
|
}
|
|
|
|
const std::string data_string(data, size);
|
|
VLOG(log_level) << "\n\n"
|
|
<< type_text << " (0x" << std::hex << size << std::dec
|
|
<< " bytes)\n"
|
|
<< (in_hex ? absl::BytesToHexString(data_string)
|
|
: data_string);
|
|
return 0;
|
|
}
|
|
|
|
class LibCurlInitializer {
|
|
public:
|
|
LibCurlInitializer() {
|
|
curl_global_init(CURL_GLOBAL_DEFAULT);
|
|
}
|
|
|
|
~LibCurlInitializer() {
|
|
curl_global_cleanup();
|
|
}
|
|
|
|
LibCurlInitializer(const LibCurlInitializer&) = delete;
|
|
LibCurlInitializer& operator=(const LibCurlInitializer&) = delete;
|
|
};
|
|
|
|
template <typename List>
|
|
bool AppendHeader(const std::string& header, List* list) {
|
|
auto* temp = curl_slist_append(list->get(), header.c_str());
|
|
if (temp) {
|
|
list->release(); // Don't free old list since it's part of the new one.
|
|
list->reset(temp);
|
|
return true;
|
|
} else {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
|
|
HttpFile::HttpFile(HttpMethod method, const std::string& url)
|
|
: HttpFile(method, url, kBinaryContentType, {}, 0) {}
|
|
|
|
HttpFile::HttpFile(HttpMethod method,
|
|
const std::string& url,
|
|
const std::string& upload_content_type,
|
|
const std::vector<std::string>& headers,
|
|
int32_t timeout_in_seconds)
|
|
: File(url.c_str()),
|
|
url_(url),
|
|
upload_content_type_(upload_content_type),
|
|
timeout_in_seconds_(timeout_in_seconds),
|
|
method_(method),
|
|
download_cache_(absl::GetFlag(FLAGS_io_cache_size)),
|
|
upload_cache_(absl::GetFlag(FLAGS_io_cache_size)),
|
|
curl_(curl_easy_init()),
|
|
status_(Status::OK),
|
|
user_agent_(absl::GetFlag(FLAGS_user_agent)),
|
|
ca_file_(absl::GetFlag(FLAGS_ca_file)),
|
|
client_cert_file_(absl::GetFlag(FLAGS_client_cert_file)),
|
|
client_cert_private_key_file_(
|
|
absl::GetFlag(FLAGS_client_cert_private_key_file)),
|
|
client_cert_private_key_password_(
|
|
absl::GetFlag(FLAGS_client_cert_private_key_password)) {
|
|
static LibCurlInitializer lib_curl_initializer;
|
|
if (user_agent_.empty()) {
|
|
user_agent_ += "ShakaPackager/" + GetPackagerVersion();
|
|
}
|
|
|
|
// We will have at least one header, so use a null header to signal error
|
|
// to Open.
|
|
|
|
// Don't wait for 100-Continue.
|
|
std::unique_ptr<curl_slist, CurlDelete> temp_headers;
|
|
if (!AppendHeader("Expect:", &temp_headers))
|
|
return;
|
|
if (!upload_content_type.empty() &&
|
|
!AppendHeader("Content-Type: " + upload_content_type_, &temp_headers)) {
|
|
return;
|
|
}
|
|
if (method != HttpMethod::kGet &&
|
|
!AppendHeader("Transfer-Encoding: chunked", &temp_headers)) {
|
|
return;
|
|
}
|
|
for (const auto& item : headers) {
|
|
if (!AppendHeader(item, &temp_headers)) {
|
|
return;
|
|
}
|
|
}
|
|
request_headers_ = std::move(temp_headers);
|
|
}
|
|
|
|
HttpFile::~HttpFile() {}
|
|
|
|
bool HttpFile::Open() {
|
|
VLOG(2) << "Opening " << url_;
|
|
|
|
if (!curl_ || !request_headers_) {
|
|
LOG(ERROR) << "curl_easy_init() failed.";
|
|
return false;
|
|
}
|
|
// TODO: Try to connect initially so we can return connection error here.
|
|
|
|
// TODO: Implement retrying with exponential backoff, see
|
|
// "widevine_key_source.cc"
|
|
|
|
ThreadPool::instance.PostTask(std::bind(&HttpFile::ThreadMain, this));
|
|
|
|
return true;
|
|
}
|
|
|
|
Status HttpFile::CloseWithStatus() {
|
|
VLOG(2) << "Closing " << url_;
|
|
|
|
// Close the upload cache first so the thread will finish uploading.
|
|
// Otherwise it will wait for more data forever.
|
|
// Don't close the download cache, so that the server's response (HTTP status
|
|
// code at minimum) can still be written after uploading is complete.
|
|
// The task will close the download cache when it is complete.
|
|
upload_cache_.Close();
|
|
task_exit_event_.WaitForNotification();
|
|
|
|
const Status result = status_;
|
|
LOG_IF(ERROR, !result.ok()) << "HttpFile request failed: " << result;
|
|
delete this;
|
|
return result;
|
|
}
|
|
|
|
bool HttpFile::Close() {
|
|
return CloseWithStatus().ok();
|
|
}
|
|
|
|
int64_t HttpFile::Read(void* buffer, uint64_t length) {
|
|
VLOG(2) << "Reading from " << url_ << ", length=" << length;
|
|
return download_cache_.Read(buffer, length);
|
|
}
|
|
|
|
int64_t HttpFile::Write(const void* buffer, uint64_t length) {
|
|
DCHECK(!upload_cache_.closed());
|
|
VLOG(2) << "Writing to " << url_ << ", length=" << length;
|
|
return upload_cache_.Write(buffer, length);
|
|
}
|
|
|
|
void HttpFile::CloseForWriting() {
|
|
VLOG(2) << "Closing further writes to " << url_;
|
|
upload_cache_.Close();
|
|
}
|
|
|
|
int64_t HttpFile::Size() {
|
|
VLOG(1) << "HttpFile does not support Size().";
|
|
return -1;
|
|
}
|
|
|
|
bool HttpFile::Flush() {
|
|
// Wait for curl to read any data we may have buffered.
|
|
upload_cache_.WaitUntilEmptyOrClosed();
|
|
return true;
|
|
}
|
|
|
|
bool HttpFile::Seek(uint64_t position) {
|
|
UNUSED(position);
|
|
LOG(ERROR) << "HttpFile does not support Seek().";
|
|
return false;
|
|
}
|
|
|
|
bool HttpFile::Tell(uint64_t* position) {
|
|
UNUSED(position);
|
|
LOG(ERROR) << "HttpFile does not support Tell().";
|
|
return false;
|
|
}
|
|
|
|
void HttpFile::CurlDelete::operator()(CURL* curl) {
|
|
curl_easy_cleanup(curl);
|
|
}
|
|
|
|
void HttpFile::CurlDelete::operator()(curl_slist* headers) {
|
|
curl_slist_free_all(headers);
|
|
}
|
|
|
|
void HttpFile::SetupRequest() {
|
|
auto* curl = curl_.get();
|
|
|
|
switch (method_) {
|
|
case HttpMethod::kGet:
|
|
curl_easy_setopt(curl, CURLOPT_HTTPGET, 1L);
|
|
break;
|
|
case HttpMethod::kPost:
|
|
curl_easy_setopt(curl, CURLOPT_POST, 1L);
|
|
break;
|
|
case HttpMethod::kPut:
|
|
curl_easy_setopt(curl, CURLOPT_PUT, 1L);
|
|
break;
|
|
}
|
|
|
|
curl_easy_setopt(curl, CURLOPT_URL, url_.c_str());
|
|
curl_easy_setopt(curl, CURLOPT_USERAGENT, user_agent_.c_str());
|
|
curl_easy_setopt(curl, CURLOPT_TIMEOUT, timeout_in_seconds_);
|
|
curl_easy_setopt(curl, CURLOPT_FAILONERROR, 1L);
|
|
curl_easy_setopt(curl, CURLOPT_FOLLOWLOCATION, 1L);
|
|
curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, &CurlWriteCallback);
|
|
curl_easy_setopt(curl, CURLOPT_WRITEDATA, &download_cache_);
|
|
if (method_ != HttpMethod::kGet) {
|
|
curl_easy_setopt(curl, CURLOPT_READFUNCTION, &CurlReadCallback);
|
|
curl_easy_setopt(curl, CURLOPT_READDATA, &upload_cache_);
|
|
}
|
|
|
|
curl_easy_setopt(curl, CURLOPT_HTTPHEADER, request_headers_.get());
|
|
|
|
if (absl::GetFlag(FLAGS_disable_peer_verification))
|
|
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L);
|
|
|
|
// Client authentication
|
|
if (!client_cert_private_key_file_.empty() && !client_cert_file_.empty()) {
|
|
curl_easy_setopt(curl, CURLOPT_SSLKEY,
|
|
client_cert_private_key_file_.data());
|
|
curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert_file_.data());
|
|
curl_easy_setopt(curl, CURLOPT_SSLKEYTYPE, "PEM");
|
|
curl_easy_setopt(curl, CURLOPT_SSLCERTTYPE, "PEM");
|
|
|
|
if (!client_cert_private_key_password_.empty()) {
|
|
curl_easy_setopt(curl, CURLOPT_KEYPASSWD,
|
|
client_cert_private_key_password_.data());
|
|
}
|
|
}
|
|
if (!ca_file_.empty()) {
|
|
curl_easy_setopt(curl, CURLOPT_CAINFO, ca_file_.data());
|
|
}
|
|
|
|
if (VLOG_IS_ON(kMinLogLevelForCurlDebugFunction)) {
|
|
curl_easy_setopt(curl, CURLOPT_DEBUGFUNCTION, CurlDebugCallback);
|
|
curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L);
|
|
}
|
|
}
|
|
|
|
void HttpFile::ThreadMain() {
|
|
SetupRequest();
|
|
|
|
CURLcode res = curl_easy_perform(curl_.get());
|
|
if (res != CURLE_OK) {
|
|
std::string error_message = curl_easy_strerror(res);
|
|
if (res == CURLE_HTTP_RETURNED_ERROR) {
|
|
long response_code = 0;
|
|
curl_easy_getinfo(curl_.get(), CURLINFO_RESPONSE_CODE, &response_code);
|
|
error_message += absl::StrFormat(", response code: %ld.", response_code);
|
|
}
|
|
|
|
status_ = Status(
|
|
res == CURLE_OPERATION_TIMEDOUT ? error::TIME_OUT : error::HTTP_FAILURE,
|
|
error_message);
|
|
}
|
|
|
|
download_cache_.Close();
|
|
task_exit_event_.Notify();
|
|
}
|
|
|
|
} // namespace shaka
|