| /** |
| * HTTP client-side implementation that uses forge.net sockets. |
| * |
| * @author Dave Longley |
| * |
| * Copyright (c) 2010-2014 Digital Bazaar, Inc. All rights reserved. |
| */ |
| (function() { |
| |
| // define http namespace |
| var http = {}; |
| |
| // logging category |
| var cat = 'forge.http'; |
| |
| // add array of clients to debug storage |
| if(forge.debug) { |
| forge.debug.set('forge.http', 'clients', []); |
| } |
| |
| // normalizes an http header field name |
| var _normalize = function(name) { |
| return name.toLowerCase().replace(/(^.)|(-.)/g, |
| function(a){return a.toUpperCase();}); |
| }; |
| |
| /** |
| * Gets the local storage ID for the given client. |
| * |
| * @param client the client to get the local storage ID for. |
| * |
| * @return the local storage ID to use. |
| */ |
| var _getStorageId = function(client) { |
| // TODO: include browser in ID to avoid sharing cookies between |
| // browsers (if this is undesirable) |
| // navigator.userAgent |
| return 'forge.http.' + |
| client.url.scheme + '.' + |
| client.url.host + '.' + |
| client.url.port; |
| }; |
| |
| /** |
| * Loads persistent cookies from disk for the given client. |
| * |
| * @param client the client. |
| */ |
| var _loadCookies = function(client) { |
| if(client.persistCookies) { |
| try { |
| var cookies = forge.util.getItem( |
| client.socketPool.flashApi, |
| _getStorageId(client), 'cookies'); |
| client.cookies = cookies || {}; |
| } catch(ex) { |
| // no flash storage available, just silently fail |
| // TODO: i assume we want this logged somewhere or |
| // should it actually generate an error |
| //forge.log.error(cat, ex); |
| } |
| } |
| }; |
| |
| /** |
| * Saves persistent cookies on disk for the given client. |
| * |
| * @param client the client. |
| */ |
| var _saveCookies = function(client) { |
| if(client.persistCookies) { |
| try { |
| forge.util.setItem( |
| client.socketPool.flashApi, |
| _getStorageId(client), 'cookies', client.cookies); |
| } catch(ex) { |
| // no flash storage available, just silently fail |
| // TODO: i assume we want this logged somewhere or |
| // should it actually generate an error |
| //forge.log.error(cat, ex); |
| } |
| } |
| |
| // FIXME: remove me |
| _loadCookies(client); |
| }; |
| |
| /** |
| * Clears persistent cookies on disk for the given client. |
| * |
| * @param client the client. |
| */ |
| var _clearCookies = function(client) { |
| if(client.persistCookies) { |
| try { |
| // only thing stored is 'cookies', so clear whole storage |
| forge.util.clearItems( |
| client.socketPool.flashApi, |
| _getStorageId(client)); |
| } catch(ex) { |
| // no flash storage available, just silently fail |
| // TODO: i assume we want this logged somewhere or |
| // should it actually generate an error |
| //forge.log.error(cat, ex); |
| } |
| } |
| }; |
| |
| /** |
| * Connects and sends a request. |
| * |
| * @param client the http client. |
| * @param socket the socket to use. |
| */ |
| var _doRequest = function(client, socket) { |
| if(socket.isConnected()) { |
| // already connected |
| socket.options.request.connectTime = +new Date(); |
| socket.connected({ |
| type: 'connect', |
| id: socket.id |
| }); |
| } else { |
| // connect |
| socket.options.request.connectTime = +new Date(); |
| socket.connect({ |
| host: client.url.host, |
| port: client.url.port, |
| policyPort: client.policyPort, |
| policyUrl: client.policyUrl |
| }); |
| } |
| }; |
| |
| /** |
| * Handles the next request or marks a socket as idle. |
| * |
| * @param client the http client. |
| * @param socket the socket. |
| */ |
| var _handleNextRequest = function(client, socket) { |
| // clear buffer |
| socket.buffer.clear(); |
| |
| // get pending request |
| var pending = null; |
| while(pending === null && client.requests.length > 0) { |
| pending = client.requests.shift(); |
| if(pending.request.aborted) { |
| pending = null; |
| } |
| } |
| |
| // mark socket idle if no pending requests |
| if(pending === null) { |
| if(socket.options !== null) { |
| socket.options = null; |
| } |
| client.idle.push(socket); |
| } else { |
| // handle pending request, allow 1 retry |
| socket.retries = 1; |
| socket.options = pending; |
| _doRequest(client, socket); |
| } |
| }; |
| |
| /** |
| * Sets up a socket for use with an http client. |
| * |
| * @param client the parent http client. |
| * @param socket the socket to set up. |
| * @param tlsOptions if the socket must use TLS, the TLS options. |
| */ |
| var _initSocket = function(client, socket, tlsOptions) { |
| // no socket options yet |
| socket.options = null; |
| |
| // set up handlers |
| socket.connected = function(e) { |
| // socket primed by caching TLS session, handle next request |
| if(socket.options === null) { |
| _handleNextRequest(client, socket); |
| } else { |
| // socket in use |
| var request = socket.options.request; |
| request.connectTime = +new Date() - request.connectTime; |
| e.socket = socket; |
| socket.options.connected(e); |
| if(request.aborted) { |
| socket.close(); |
| } else { |
| var out = request.toString(); |
| if(request.body) { |
| out += request.body; |
| } |
| request.time = +new Date(); |
| socket.send(out); |
| request.time = +new Date() - request.time; |
| socket.options.response.time = +new Date(); |
| socket.sending = true; |
| } |
| } |
| }; |
| socket.closed = function(e) { |
| if(socket.sending) { |
| socket.sending = false; |
| if(socket.retries > 0) { |
| --socket.retries; |
| _doRequest(client, socket); |
| } else { |
| // error, closed during send |
| socket.error({ |
| id: socket.id, |
| type: 'ioError', |
| message: 'Connection closed during send. Broken pipe.', |
| bytesAvailable: 0 |
| }); |
| } |
| } else { |
| // handle unspecified content-length transfer |
| var response = socket.options.response; |
| if(response.readBodyUntilClose) { |
| response.time = +new Date() - response.time; |
| response.bodyReceived = true; |
| socket.options.bodyReady({ |
| request: socket.options.request, |
| response: response, |
| socket: socket |
| }); |
| } |
| socket.options.closed(e); |
| _handleNextRequest(client, socket); |
| } |
| }; |
| socket.data = function(e) { |
| socket.sending = false; |
| var request = socket.options.request; |
| if(request.aborted) { |
| socket.close(); |
| } else { |
| // receive all bytes available |
| var response = socket.options.response; |
| var bytes = socket.receive(e.bytesAvailable); |
| if(bytes !== null) { |
| // receive header and then body |
| socket.buffer.putBytes(bytes); |
| if(!response.headerReceived) { |
| response.readHeader(socket.buffer); |
| if(response.headerReceived) { |
| socket.options.headerReady({ |
| request: socket.options.request, |
| response: response, |
| socket: socket |
| }); |
| } |
| } |
| if(response.headerReceived && !response.bodyReceived) { |
| response.readBody(socket.buffer); |
| } |
| if(response.bodyReceived) { |
| socket.options.bodyReady({ |
| request: socket.options.request, |
| response: response, |
| socket: socket |
| }); |
| // close connection if requested or by default on http/1.0 |
| var value = response.getField('Connection') || ''; |
| if(value.indexOf('close') != -1 || |
| (response.version === 'HTTP/1.0' && |
| response.getField('Keep-Alive') === null)) { |
| socket.close(); |
| } else { |
| _handleNextRequest(client, socket); |
| } |
| } |
| } |
| } |
| }; |
| socket.error = function(e) { |
| // do error callback, include request |
| socket.options.error({ |
| type: e.type, |
| message: e.message, |
| request: socket.options.request, |
| response: socket.options.response, |
| socket: socket |
| }); |
| socket.close(); |
| }; |
| |
| // wrap socket for TLS |
| if(tlsOptions) { |
| socket = forge.tls.wrapSocket({ |
| sessionId: null, |
| sessionCache: {}, |
| caStore: tlsOptions.caStore, |
| cipherSuites: tlsOptions.cipherSuites, |
| socket: socket, |
| virtualHost: tlsOptions.virtualHost, |
| verify: tlsOptions.verify, |
| getCertificate: tlsOptions.getCertificate, |
| getPrivateKey: tlsOptions.getPrivateKey, |
| getSignature: tlsOptions.getSignature, |
| deflate: tlsOptions.deflate || null, |
| inflate: tlsOptions.inflate || null |
| }); |
| |
| socket.options = null; |
| socket.buffer = forge.util.createBuffer(); |
| client.sockets.push(socket); |
| if(tlsOptions.prime) { |
| // prime socket by connecting and caching TLS session, will do |
| // next request from there |
| socket.connect({ |
| host: client.url.host, |
| port: client.url.port, |
| policyPort: client.policyPort, |
| policyUrl: client.policyUrl |
| }); |
| } else { |
| // do not prime socket, just add as idle |
| client.idle.push(socket); |
| } |
| } else { |
| // no need to prime non-TLS sockets |
| socket.buffer = forge.util.createBuffer(); |
| client.sockets.push(socket); |
| client.idle.push(socket); |
| } |
| }; |
| |
| /** |
| * Checks to see if the given cookie has expired. If the cookie's max-age |
| * plus its created time is less than the time now, it has expired, unless |
| * its max-age is set to -1 which indicates it will never expire. |
| * |
| * @param cookie the cookie to check. |
| * |
| * @return true if it has expired, false if not. |
| */ |
| var _hasCookieExpired = function(cookie) { |
| var rval = false; |
| |
| if(cookie.maxAge !== -1) { |
| var now = _getUtcTime(new Date()); |
| var expires = cookie.created + cookie.maxAge; |
| if(expires <= now) { |
| rval = true; |
| } |
| } |
| |
| return rval; |
| }; |
| |
| /** |
| * Adds cookies in the given client to the given request. |
| * |
| * @param client the client. |
| * @param request the request. |
| */ |
| var _writeCookies = function(client, request) { |
| var expired = []; |
| var url = client.url; |
| var cookies = client.cookies; |
| for(var name in cookies) { |
| // get cookie paths |
| var paths = cookies[name]; |
| for(var p in paths) { |
| var cookie = paths[p]; |
| if(_hasCookieExpired(cookie)) { |
| // store for clean up |
| expired.push(cookie); |
| } else if(request.path.indexOf(cookie.path) === 0) { |
| // path or path's ancestor must match cookie.path |
| request.addCookie(cookie); |
| } |
| } |
| } |
| |
| // clean up expired cookies |
| for(var i = 0; i < expired.length; ++i) { |
| var cookie = expired[i]; |
| client.removeCookie(cookie.name, cookie.path); |
| } |
| }; |
| |
| /** |
| * Gets cookies from the given response and adds the to the given client. |
| * |
| * @param client the client. |
| * @param response the response. |
| */ |
| var _readCookies = function(client, response) { |
| var cookies = response.getCookies(); |
| for(var i = 0; i < cookies.length; ++i) { |
| try { |
| client.setCookie(cookies[i]); |
| } catch(ex) { |
| // ignore failure to add other-domain, etc. cookies |
| } |
| } |
| }; |
| |
| /** |
| * Creates an http client that uses forge.net sockets as a backend and |
| * forge.tls for security. |
| * |
| * @param options: |
| * url: the url to connect to (scheme://host:port). |
| * socketPool: the flash socket pool to use. |
| * policyPort: the flash policy port to use (if other than the |
| * socket pool default), use 0 for flash default. |
| * policyUrl: the flash policy file URL to use (if provided will |
| * be used instead of a policy port). |
| * connections: number of connections to use to handle requests. |
| * caCerts: an array of certificates to trust for TLS, certs may |
| * be PEM-formatted or cert objects produced via forge.pki. |
| * cipherSuites: an optional array of cipher suites to use, |
| * see forge.tls.CipherSuites. |
| * virtualHost: the virtual server name to use in a TLS SNI |
| * extension, if not provided the url host will be used. |
| * verify: a custom TLS certificate verify callback to use. |
| * getCertificate: an optional callback used to get a client-side |
| * certificate (see forge.tls for details). |
| * getPrivateKey: an optional callback used to get a client-side |
| * private key (see forge.tls for details). |
| * getSignature: an optional callback used to get a client-side |
| * signature (see forge.tls for details). |
| * persistCookies: true to use persistent cookies via flash local |
| * storage, false to only keep cookies in javascript. |
| * primeTlsSockets: true to immediately connect TLS sockets on |
| * their creation so that they will cache TLS sessions for reuse. |
| * |
| * @return the client. |
| */ |
| http.createClient = function(options) { |
| // create CA store to share with all TLS connections |
| var caStore = null; |
| if(options.caCerts) { |
| caStore = forge.pki.createCaStore(options.caCerts); |
| } |
| |
| // get scheme, host, and port from url |
| options.url = (options.url || |
| window.location.protocol + '//' + window.location.host); |
| var url = http.parseUrl(options.url); |
| if(!url) { |
| var error = new Error('Invalid url.'); |
| error.details = {url: options.url}; |
| throw error; |
| } |
| |
| // default to 1 connection |
| options.connections = options.connections || 1; |
| |
| // create client |
| var sp = options.socketPool; |
| var client = { |
| // url |
| url: url, |
| // socket pool |
| socketPool: sp, |
| // the policy port to use |
| policyPort: options.policyPort, |
| // policy url to use |
| policyUrl: options.policyUrl, |
| // queue of requests to service |
| requests: [], |
| // all sockets |
| sockets: [], |
| // idle sockets |
| idle: [], |
| // whether or not the connections are secure |
| secure: (url.scheme === 'https'), |
| // cookie jar (key'd off of name and then path, there is only 1 domain |
| // and one setting for secure per client so name+path is unique) |
| cookies: {}, |
| // default to flash storage of cookies |
| persistCookies: (typeof(options.persistCookies) === 'undefined') ? |
| true : options.persistCookies |
| }; |
| |
| // add client to debug storage |
| if(forge.debug) { |
| forge.debug.get('forge.http', 'clients').push(client); |
| } |
| |
| // load cookies from disk |
| _loadCookies(client); |
| |
| /** |
| * A default certificate verify function that checks a certificate common |
| * name against the client's URL host. |
| * |
| * @param c the TLS connection. |
| * @param verified true if cert is verified, otherwise alert number. |
| * @param depth the chain depth. |
| * @param certs the cert chain. |
| * |
| * @return true if verified and the common name matches the host, error |
| * otherwise. |
| */ |
| var _defaultCertificateVerify = function(c, verified, depth, certs) { |
| if(depth === 0 && verified === true) { |
| // compare common name to url host |
| var cn = certs[depth].subject.getField('CN'); |
| if(cn === null || client.url.host !== cn.value) { |
| verified = { |
| message: 'Certificate common name does not match url host.' |
| }; |
| } |
| } |
| return verified; |
| }; |
| |
| // determine if TLS is used |
| var tlsOptions = null; |
| if(client.secure) { |
| tlsOptions = { |
| caStore: caStore, |
| cipherSuites: options.cipherSuites || null, |
| virtualHost: options.virtualHost || url.host, |
| verify: options.verify || _defaultCertificateVerify, |
| getCertificate: options.getCertificate || null, |
| getPrivateKey: options.getPrivateKey || null, |
| getSignature: options.getSignature || null, |
| prime: options.primeTlsSockets || false |
| }; |
| |
| // if socket pool uses a flash api, then add deflate support to TLS |
| if(sp.flashApi !== null) { |
| tlsOptions.deflate = function(bytes) { |
| // strip 2 byte zlib header and 4 byte trailer |
| return forge.util.deflate(sp.flashApi, bytes, true); |
| }; |
| tlsOptions.inflate = function(bytes) { |
| return forge.util.inflate(sp.flashApi, bytes, true); |
| }; |
| } |
| } |
| |
| // create and initialize sockets |
| for(var i = 0; i < options.connections; ++i) { |
| _initSocket(client, sp.createSocket(), tlsOptions); |
| } |
| |
| /** |
| * Sends a request. A method 'abort' will be set on the request that |
| * can be called to attempt to abort the request. |
| * |
| * @param options: |
| * request: the request to send. |
| * connected: a callback for when the connection is open. |
| * closed: a callback for when the connection is closed. |
| * headerReady: a callback for when the response header arrives. |
| * bodyReady: a callback for when the response body arrives. |
| * error: a callback for if an error occurs. |
| */ |
| client.send = function(options) { |
| // add host header if not set |
| if(options.request.getField('Host') === null) { |
| options.request.setField('Host', client.url.fullHost); |
| } |
| |
| // set default dummy handlers |
| var opts = {}; |
| opts.request = options.request; |
| opts.connected = options.connected || function(){}; |
| opts.closed = options.close || function(){}; |
| opts.headerReady = function(e) { |
| // read cookies |
| _readCookies(client, e.response); |
| if(options.headerReady) { |
| options.headerReady(e); |
| } |
| }; |
| opts.bodyReady = options.bodyReady || function(){}; |
| opts.error = options.error || function(){}; |
| |
| // create response |
| opts.response = http.createResponse(); |
| opts.response.time = 0; |
| opts.response.flashApi = client.socketPool.flashApi; |
| opts.request.flashApi = client.socketPool.flashApi; |
| |
| // create abort function |
| opts.request.abort = function() { |
| // set aborted, clear handlers |
| opts.request.aborted = true; |
| opts.connected = function(){}; |
| opts.closed = function(){}; |
| opts.headerReady = function(){}; |
| opts.bodyReady = function(){}; |
| opts.error = function(){}; |
| }; |
| |
| // add cookies to request |
| _writeCookies(client, opts.request); |
| |
| // queue request options if there are no idle sockets |
| if(client.idle.length === 0) { |
| client.requests.push(opts); |
| } else { |
| // use an idle socket, prefer an idle *connected* socket first |
| var socket = null; |
| var len = client.idle.length; |
| for(var i = 0; socket === null && i < len; ++i) { |
| socket = client.idle[i]; |
| if(socket.isConnected()) { |
| client.idle.splice(i, 1); |
| } else { |
| socket = null; |
| } |
| } |
| // no connected socket available, get unconnected socket |
| if(socket === null) { |
| socket = client.idle.pop(); |
| } |
| socket.options = opts; |
| _doRequest(client, socket); |
| } |
| }; |
| |
| /** |
| * Destroys this client. |
| */ |
| client.destroy = function() { |
| // clear pending requests, close and destroy sockets |
| client.requests = []; |
| for(var i = 0; i < client.sockets.length; ++i) { |
| client.sockets[i].close(); |
| client.sockets[i].destroy(); |
| } |
| client.socketPool = null; |
| client.sockets = []; |
| client.idle = []; |
| }; |
| |
| /** |
| * Sets a cookie for use with all connections made by this client. Any |
| * cookie with the same name will be replaced. If the cookie's value |
| * is undefined, null, or the blank string, the cookie will be removed. |
| * |
| * If the cookie's domain doesn't match this client's url host or the |
| * cookie's secure flag doesn't match this client's url scheme, then |
| * setting the cookie will fail with an exception. |
| * |
| * @param cookie the cookie with parameters: |
| * name: the name of the cookie. |
| * value: the value of the cookie. |
| * comment: an optional comment string. |
| * maxAge: the age of the cookie in seconds relative to created time. |
| * secure: true if the cookie must be sent over a secure protocol. |
| * httpOnly: true to restrict access to the cookie from javascript |
| * (inaffective since the cookies are stored in javascript). |
| * path: the path for the cookie. |
| * domain: optional domain the cookie belongs to (must start with dot). |
| * version: optional version of the cookie. |
| * created: creation time, in UTC seconds, of the cookie. |
| */ |
| client.setCookie = function(cookie) { |
| var rval; |
| if(typeof(cookie.name) !== 'undefined') { |
| if(cookie.value === null || typeof(cookie.value) === 'undefined' || |
| cookie.value === '') { |
| // remove cookie |
| rval = client.removeCookie(cookie.name, cookie.path); |
| } else { |
| // set cookie defaults |
| cookie.comment = cookie.comment || ''; |
| cookie.maxAge = cookie.maxAge || 0; |
| cookie.secure = (typeof(cookie.secure) === 'undefined') ? |
| true : cookie.secure; |
| cookie.httpOnly = cookie.httpOnly || true; |
| cookie.path = cookie.path || '/'; |
| cookie.domain = cookie.domain || null; |
| cookie.version = cookie.version || null; |
| cookie.created = _getUtcTime(new Date()); |
| |
| // do secure check |
| if(cookie.secure !== client.secure) { |
| var error = new Error('Http client url scheme is incompatible ' + |
| 'with cookie secure flag.'); |
| error.url = client.url; |
| error.cookie = cookie; |
| throw error; |
| } |
| // make sure url host is within cookie.domain |
| if(!http.withinCookieDomain(client.url, cookie)) { |
| var error = new Error('Http client url scheme is incompatible ' + |
| 'with cookie secure flag.'); |
| error.url = client.url; |
| error.cookie = cookie; |
| throw error; |
| } |
| |
| // add new cookie |
| if(!(cookie.name in client.cookies)) { |
| client.cookies[cookie.name] = {}; |
| } |
| client.cookies[cookie.name][cookie.path] = cookie; |
| rval = true; |
| |
| // save cookies |
| _saveCookies(client); |
| } |
| } |
| |
| return rval; |
| }; |
| |
| /** |
| * Gets a cookie by its name. |
| * |
| * @param name the name of the cookie to retrieve. |
| * @param path an optional path for the cookie (if there are multiple |
| * cookies with the same name but different paths). |
| * |
| * @return the cookie or null if not found. |
| */ |
| client.getCookie = function(name, path) { |
| var rval = null; |
| if(name in client.cookies) { |
| var paths = client.cookies[name]; |
| |
| // get path-specific cookie |
| if(path) { |
| if(path in paths) { |
| rval = paths[path]; |
| } |
| } else { |
| // get first cookie |
| for(var p in paths) { |
| rval = paths[p]; |
| break; |
| } |
| } |
| } |
| return rval; |
| }; |
| |
| /** |
| * Removes a cookie. |
| * |
| * @param name the name of the cookie to remove. |
| * @param path an optional path for the cookie (if there are multiple |
| * cookies with the same name but different paths). |
| * |
| * @return true if a cookie was removed, false if not. |
| */ |
| client.removeCookie = function(name, path) { |
| var rval = false; |
| if(name in client.cookies) { |
| // delete the specific path |
| if(path) { |
| var paths = client.cookies[name]; |
| if(path in paths) { |
| rval = true; |
| delete client.cookies[name][path]; |
| // clean up entry if empty |
| var empty = true; |
| for(var i in client.cookies[name]) { |
| empty = false; |
| break; |
| } |
| if(empty) { |
| delete client.cookies[name]; |
| } |
| } |
| } else { |
| // delete all cookies with the given name |
| rval = true; |
| delete client.cookies[name]; |
| } |
| } |
| if(rval) { |
| // save cookies |
| _saveCookies(client); |
| } |
| return rval; |
| }; |
| |
| /** |
| * Clears all cookies stored in this client. |
| */ |
| client.clearCookies = function() { |
| client.cookies = {}; |
| _clearCookies(client); |
| }; |
| |
| if(forge.log) { |
| forge.log.debug('forge.http', 'created client', options); |
| } |
| |
| return client; |
| }; |
| |
| /** |
| * Trims the whitespace off of the beginning and end of a string. |
| * |
| * @param str the string to trim. |
| * |
| * @return the trimmed string. |
| */ |
| var _trimString = function(str) { |
| return str.replace(/^\s*/, '').replace(/\s*$/, ''); |
| }; |
| |
| /** |
| * Creates an http header object. |
| * |
| * @return the http header object. |
| */ |
| var _createHeader = function() { |
| var header = { |
| fields: {}, |
| setField: function(name, value) { |
| // normalize field name, trim value |
| header.fields[_normalize(name)] = [_trimString('' + value)]; |
| }, |
| appendField: function(name, value) { |
| name = _normalize(name); |
| if(!(name in header.fields)) { |
| header.fields[name] = []; |
| } |
| header.fields[name].push(_trimString('' + value)); |
| }, |
| getField: function(name, index) { |
| var rval = null; |
| name = _normalize(name); |
| if(name in header.fields) { |
| index = index || 0; |
| rval = header.fields[name][index]; |
| } |
| return rval; |
| } |
| }; |
| return header; |
| }; |
| |
| /** |
| * Gets the time in utc seconds given a date. |
| * |
| * @param d the date to use. |
| * |
| * @return the time in utc seconds. |
| */ |
| var _getUtcTime = function(d) { |
| var utc = +d + d.getTimezoneOffset() * 60000; |
| return Math.floor(+new Date() / 1000); |
| }; |
| |
| /** |
| * Creates an http request. |
| * |
| * @param options: |
| * version: the version. |
| * method: the method. |
| * path: the path. |
| * body: the body. |
| * headers: custom header fields to add, |
| * eg: [{'Content-Length': 0}]. |
| * |
| * @return the http request. |
| */ |
| http.createRequest = function(options) { |
| options = options || {}; |
| var request = _createHeader(); |
| request.version = options.version || 'HTTP/1.1'; |
| request.method = options.method || null; |
| request.path = options.path || null; |
| request.body = options.body || null; |
| request.bodyDeflated = false; |
| request.flashApi = null; |
| |
| // add custom headers |
| var headers = options.headers || []; |
| if(!forge.util.isArray(headers)) { |
| headers = [headers]; |
| } |
| for(var i = 0; i < headers.length; ++i) { |
| for(var name in headers[i]) { |
| request.appendField(name, headers[i][name]); |
| } |
| } |
| |
| /** |
| * Adds a cookie to the request 'Cookie' header. |
| * |
| * @param cookie a cookie to add. |
| */ |
| request.addCookie = function(cookie) { |
| var value = ''; |
| var field = request.getField('Cookie'); |
| if(field !== null) { |
| // separate cookies by semi-colons |
| value = field + '; '; |
| } |
| |
| // get current time in utc seconds |
| var now = _getUtcTime(new Date()); |
| |
| // output cookie name and value |
| value += cookie.name + '=' + cookie.value; |
| request.setField('Cookie', value); |
| }; |
| |
| /** |
| * Converts an http request into a string that can be sent as an |
| * HTTP request. Does not include any data. |
| * |
| * @return the string representation of the request. |
| */ |
| request.toString = function() { |
| /* Sample request header: |
| GET /some/path/?query HTTP/1.1 |
| Host: www.someurl.com |
| Connection: close |
| Accept-Encoding: deflate |
| Accept: image/gif, text/html |
| User-Agent: Mozilla 4.0 |
| */ |
| |
| // set default headers |
| if(request.getField('User-Agent') === null) { |
| request.setField('User-Agent', 'forge.http 1.0'); |
| } |
| if(request.getField('Accept') === null) { |
| request.setField('Accept', '*/*'); |
| } |
| if(request.getField('Connection') === null) { |
| request.setField('Connection', 'keep-alive'); |
| request.setField('Keep-Alive', '115'); |
| } |
| |
| // add Accept-Encoding if not specified |
| if(request.flashApi !== null && |
| request.getField('Accept-Encoding') === null) { |
| request.setField('Accept-Encoding', 'deflate'); |
| } |
| |
| // if the body isn't null, deflate it if its larger than 100 bytes |
| if(request.flashApi !== null && request.body !== null && |
| request.getField('Content-Encoding') === null && |
| !request.bodyDeflated && request.body.length > 100) { |
| // use flash to compress data |
| request.body = forge.util.deflate(request.flashApi, request.body); |
| request.bodyDeflated = true; |
| request.setField('Content-Encoding', 'deflate'); |
| request.setField('Content-Length', request.body.length); |
| } else if(request.body !== null) { |
| // set content length for body |
| request.setField('Content-Length', request.body.length); |
| } |
| |
| // build start line |
| var rval = |
| request.method.toUpperCase() + ' ' + request.path + ' ' + |
| request.version + '\r\n'; |
| |
| // add each header |
| for(var name in request.fields) { |
| var fields = request.fields[name]; |
| for(var i = 0; i < fields.length; ++i) { |
| rval += name + ': ' + fields[i] + '\r\n'; |
| } |
| } |
| // final terminating CRLF |
| rval += '\r\n'; |
| |
| return rval; |
| }; |
| |
| return request; |
| }; |
| |
| /** |
| * Creates an empty http response header. |
| * |
| * @return the empty http response header. |
| */ |
| http.createResponse = function() { |
| // private vars |
| var _first = true; |
| var _chunkSize = 0; |
| var _chunksFinished = false; |
| |
| // create response |
| var response = _createHeader(); |
| response.version = null; |
| response.code = 0; |
| response.message = null; |
| response.body = null; |
| response.headerReceived = false; |
| response.bodyReceived = false; |
| response.flashApi = null; |
| |
| /** |
| * Reads a line that ends in CRLF from a byte buffer. |
| * |
| * @param b the byte buffer. |
| * |
| * @return the line or null if none was found. |
| */ |
| var _readCrlf = function(b) { |
| var line = null; |
| var i = b.data.indexOf('\r\n', b.read); |
| if(i != -1) { |
| // read line, skip CRLF |
| line = b.getBytes(i - b.read); |
| b.getBytes(2); |
| } |
| return line; |
| }; |
| |
| /** |
| * Parses a header field and appends it to the response. |
| * |
| * @param line the header field line. |
| */ |
| var _parseHeader = function(line) { |
| var tmp = line.indexOf(':'); |
| var name = line.substring(0, tmp++); |
| response.appendField( |
| name, (tmp < line.length) ? line.substring(tmp) : ''); |
| }; |
| |
| /** |
| * Reads an http response header from a buffer of bytes. |
| * |
| * @param b the byte buffer to parse the header from. |
| * |
| * @return true if the whole header was read, false if not. |
| */ |
| response.readHeader = function(b) { |
| // read header lines (each ends in CRLF) |
| var line = ''; |
| while(!response.headerReceived && line !== null) { |
| line = _readCrlf(b); |
| if(line !== null) { |
| // parse first line |
| if(_first) { |
| _first = false; |
| var tmp = line.split(' '); |
| if(tmp.length >= 3) { |
| response.version = tmp[0]; |
| response.code = parseInt(tmp[1], 10); |
| response.message = tmp.slice(2).join(' '); |
| } else { |
| // invalid header |
| var error = new Error('Invalid http response header.'); |
| error.details = {'line': line}; |
| throw error; |
| } |
| } else if(line.length === 0) { |
| // handle final line, end of header |
| response.headerReceived = true; |
| } else { |
| _parseHeader(line); |
| } |
| } |
| } |
| |
| return response.headerReceived; |
| }; |
| |
| /** |
| * Reads some chunked http response entity-body from the given buffer of |
| * bytes. |
| * |
| * @param b the byte buffer to read from. |
| * |
| * @return true if the whole body was read, false if not. |
| */ |
| var _readChunkedBody = function(b) { |
| /* Chunked transfer-encoding sends data in a series of chunks, |
| followed by a set of 0-N http trailers. |
| The format is as follows: |
| |
| chunk-size (in hex) CRLF |
| chunk data (with "chunk-size" many bytes) CRLF |
| ... (N many chunks) |
| chunk-size (of 0 indicating the last chunk) CRLF |
| N many http trailers followed by CRLF |
| blank line + CRLF (terminates the trailers) |
| |
| If there are no http trailers, then after the chunk-size of 0, |
| there is still a single CRLF (indicating the blank line + CRLF |
| that terminates the trailers). In other words, you always terminate |
| the trailers with blank line + CRLF, regardless of 0-N trailers. */ |
| |
| /* From RFC-2616, section 3.6.1, here is the pseudo-code for |
| implementing chunked transfer-encoding: |
| |
| length := 0 |
| read chunk-size, chunk-extension (if any) and CRLF |
| while (chunk-size > 0) { |
| read chunk-data and CRLF |
| append chunk-data to entity-body |
| length := length + chunk-size |
| read chunk-size and CRLF |
| } |
| read entity-header |
| while (entity-header not empty) { |
| append entity-header to existing header fields |
| read entity-header |
| } |
| Content-Length := length |
| Remove "chunked" from Transfer-Encoding |
| */ |
| |
| var line = ''; |
| while(line !== null && b.length() > 0) { |
| // if in the process of reading a chunk |
| if(_chunkSize > 0) { |
| // if there are not enough bytes to read chunk and its |
| // trailing CRLF, we must wait for more data to be received |
| if(_chunkSize + 2 > b.length()) { |
| break; |
| } |
| |
| // read chunk data, skip CRLF |
| response.body += b.getBytes(_chunkSize); |
| b.getBytes(2); |
| _chunkSize = 0; |
| } else if(!_chunksFinished) { |
| // more chunks, read next chunk-size line |
| line = _readCrlf(b); |
| if(line !== null) { |
| // parse chunk-size (ignore any chunk extension) |
| _chunkSize = parseInt(line.split(';', 1)[0], 16); |
| _chunksFinished = (_chunkSize === 0); |
| } |
| } else { |
| // chunks finished, read next trailer |
| line = _readCrlf(b); |
| while(line !== null) { |
| if(line.length > 0) { |
| // parse trailer |
| _parseHeader(line); |
| // read next trailer |
| line = _readCrlf(b); |
| } else { |
| // body received |
| response.bodyReceived = true; |
| line = null; |
| } |
| } |
| } |
| } |
| |
| return response.bodyReceived; |
| }; |
| |
| /** |
| * Reads an http response body from a buffer of bytes. |
| * |
| * @param b the byte buffer to read from. |
| * |
| * @return true if the whole body was read, false if not. |
| */ |
| response.readBody = function(b) { |
| var contentLength = response.getField('Content-Length'); |
| var transferEncoding = response.getField('Transfer-Encoding'); |
| if(contentLength !== null) { |
| contentLength = parseInt(contentLength); |
| } |
| |
| // read specified length |
| if(contentLength !== null && contentLength >= 0) { |
| response.body = response.body || ''; |
| response.body += b.getBytes(contentLength); |
| response.bodyReceived = (response.body.length === contentLength); |
| } else if(transferEncoding !== null) { |
| // read chunked encoding |
| if(transferEncoding.indexOf('chunked') != -1) { |
| response.body = response.body || ''; |
| _readChunkedBody(b); |
| } else { |
| var error = new Error('Unknown Transfer-Encoding.'); |
| error.details = {'transferEncoding': transferEncoding}; |
| throw error; |
| } |
| } else if((contentLength !== null && contentLength < 0) || |
| (contentLength === null && |
| response.getField('Content-Type') !== null)) { |
| // read all data in the buffer |
| response.body = response.body || ''; |
| response.body += b.getBytes(); |
| response.readBodyUntilClose = true; |
| } else { |
| // no body |
| response.body = null; |
| response.bodyReceived = true; |
| } |
| |
| if(response.bodyReceived) { |
| response.time = +new Date() - response.time; |
| } |
| |
| if(response.flashApi !== null && |
| response.bodyReceived && response.body !== null && |
| response.getField('Content-Encoding') === 'deflate') { |
| // inflate using flash api |
| response.body = forge.util.inflate( |
| response.flashApi, response.body); |
| } |
| |
| return response.bodyReceived; |
| }; |
| |
| /** |
| * Parses an array of cookies from the 'Set-Cookie' field, if present. |
| * |
| * @return the array of cookies. |
| */ |
| response.getCookies = function() { |
| var rval = []; |
| |
| // get Set-Cookie field |
| if('Set-Cookie' in response.fields) { |
| var field = response.fields['Set-Cookie']; |
| |
| // get current local time in seconds |
| var now = +new Date() / 1000; |
| |
| // regex for parsing 'name1=value1; name2=value2; name3' |
| var regex = /\s*([^=]*)=?([^;]*)(;|$)/g; |
| |
| // examples: |
| // Set-Cookie: cookie1_name=cookie1_value; max-age=0; path=/ |
| // Set-Cookie: c2=v2; expires=Thu, 21-Aug-2008 23:47:25 GMT; path=/ |
| for(var i = 0; i < field.length; ++i) { |
| var fv = field[i]; |
| var m; |
| regex.lastIndex = 0; |
| var first = true; |
| var cookie = {}; |
| do { |
| m = regex.exec(fv); |
| if(m !== null) { |
| var name = _trimString(m[1]); |
| var value = _trimString(m[2]); |
| |
| // cookie_name=value |
| if(first) { |
| cookie.name = name; |
| cookie.value = value; |
| first = false; |
| } else { |
| // property_name=value |
| name = name.toLowerCase(); |
| switch(name) { |
| case 'expires': |
| // replace hyphens w/spaces so date will parse |
| value = value.replace(/-/g, ' '); |
| var secs = Date.parse(value) / 1000; |
| cookie.maxAge = Math.max(0, secs - now); |
| break; |
| case 'max-age': |
| cookie.maxAge = parseInt(value, 10); |
| break; |
| case 'secure': |
| cookie.secure = true; |
| break; |
| case 'httponly': |
| cookie.httpOnly = true; |
| break; |
| default: |
| if(name !== '') { |
| cookie[name] = value; |
| } |
| } |
| } |
| } |
| } while(m !== null && m[0] !== ''); |
| rval.push(cookie); |
| } |
| } |
| |
| return rval; |
| }; |
| |
| /** |
| * Converts an http response into a string that can be sent as an |
| * HTTP response. Does not include any data. |
| * |
| * @return the string representation of the response. |
| */ |
| response.toString = function() { |
| /* Sample response header: |
| HTTP/1.0 200 OK |
| Host: www.someurl.com |
| Connection: close |
| */ |
| |
| // build start line |
| var rval = |
| response.version + ' ' + response.code + ' ' + response.message + '\r\n'; |
| |
| // add each header |
| for(var name in response.fields) { |
| var fields = response.fields[name]; |
| for(var i = 0; i < fields.length; ++i) { |
| rval += name + ': ' + fields[i] + '\r\n'; |
| } |
| } |
| // final terminating CRLF |
| rval += '\r\n'; |
| |
| return rval; |
| }; |
| |
| return response; |
| }; |
| |
| /** |
| * Parses the scheme, host, and port from an http(s) url. |
| * |
| * @param str the url string. |
| * |
| * @return the parsed url object or null if the url is invalid. |
| */ |
| http.parseUrl = forge.util.parseUrl; |
| |
| /** |
| * Returns true if the given url is within the given cookie's domain. |
| * |
| * @param url the url to check. |
| * @param cookie the cookie or cookie domain to check. |
| */ |
| http.withinCookieDomain = function(url, cookie) { |
| var rval = false; |
| |
| // cookie may be null, a cookie object, or a domain string |
| var domain = (cookie === null || typeof cookie === 'string') ? |
| cookie : cookie.domain; |
| |
| // any domain will do |
| if(domain === null) { |
| rval = true; |
| } else if(domain.charAt(0) === '.') { |
| // ensure domain starts with a '.' |
| // parse URL as necessary |
| if(typeof url === 'string') { |
| url = http.parseUrl(url); |
| } |
| |
| // add '.' to front of URL host to match against domain |
| var host = '.' + url.host; |
| |
| // if the host ends with domain then it falls within it |
| var idx = host.lastIndexOf(domain); |
| if(idx !== -1 && (idx + domain.length === host.length)) { |
| rval = true; |
| } |
| } |
| |
| return rval; |
| }; |
| |
| // public access to http namespace |
| if(typeof forge === 'undefined') { |
| forge = {}; |
| } |
| forge.http = http; |
| |
| })(); |