2018-02-04 03:22:01 +01:00
|
|
|
// Matrix Construct
|
|
|
|
//
|
|
|
|
// Copyright (C) Matrix Construct Developers, Authors & Contributors
|
|
|
|
// Copyright (C) 2016-2018 Jason Volk <jason@zemos.net>
|
|
|
|
//
|
|
|
|
// Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
// purpose with or without fee is hereby granted, provided that the above
|
|
|
|
// copyright notice and this permission notice is present in all copies. The
|
|
|
|
// full license for this software is available in the LICENSE file.
|
2016-09-06 01:05:16 +02:00
|
|
|
|
2017-11-30 20:44:23 +01:00
|
|
|
#include <ircd/m/m.h>
|
|
|
|
|
2017-12-24 08:34:11 +01:00
|
|
|
decltype(ircd::resource::resources)
|
|
|
|
ircd::resource::resources
|
2016-11-29 16:23:38 +01:00
|
|
|
{};
|
2016-09-06 01:05:16 +02:00
|
|
|
|
2017-08-23 23:06:14 +02:00
|
|
|
ircd::resource &
|
|
|
|
ircd::resource::find(string_view path)
|
|
|
|
{
|
2017-10-12 05:52:33 +02:00
|
|
|
path = rstrip(path, '/');
|
2017-08-23 23:06:14 +02:00
|
|
|
auto it(resources.lower_bound(path));
|
2017-08-23 23:47:54 +02:00
|
|
|
if(it == end(resources)) try
|
|
|
|
{
|
2017-10-03 13:13:52 +02:00
|
|
|
--it;
|
|
|
|
if(it == begin(resources) || !startswith(path, rstrip(it->first, '/')))
|
2017-10-16 06:26:05 +02:00
|
|
|
return *resources.at("/");
|
2017-08-23 23:47:54 +02:00
|
|
|
}
|
|
|
|
catch(const std::out_of_range &e)
|
|
|
|
{
|
2018-01-22 09:25:08 +01:00
|
|
|
throw http::error
|
|
|
|
{
|
|
|
|
http::code::NOT_FOUND
|
|
|
|
};
|
2017-08-23 23:47:54 +02:00
|
|
|
}
|
2016-09-06 01:05:16 +02:00
|
|
|
|
2017-08-23 23:06:14 +02:00
|
|
|
// Exact file or directory match
|
2017-10-03 13:13:52 +02:00
|
|
|
if(path == rstrip(it->first, '/'))
|
2017-08-23 23:06:14 +02:00
|
|
|
return *it->second;
|
|
|
|
|
|
|
|
// Directories handle all paths under them.
|
2017-10-03 13:13:52 +02:00
|
|
|
if(!startswith(path, rstrip(it->first, '/')))
|
2017-08-23 23:06:14 +02:00
|
|
|
{
|
|
|
|
// Walk the iterator back to find if there is a directory prefixing this path.
|
|
|
|
if(it == begin(resources))
|
2018-01-22 09:25:08 +01:00
|
|
|
throw http::error
|
|
|
|
{
|
|
|
|
http::code::NOT_FOUND
|
|
|
|
};
|
2017-08-23 23:06:14 +02:00
|
|
|
|
|
|
|
--it;
|
2017-10-03 13:13:52 +02:00
|
|
|
if(!startswith(path, rstrip(it->first, '/')))
|
2018-01-22 09:25:08 +01:00
|
|
|
throw http::error
|
|
|
|
{
|
|
|
|
http::code::NOT_FOUND
|
|
|
|
};
|
2017-08-23 23:06:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check if the resource is a directory; if not, it can only
|
|
|
|
// handle exact path matches.
|
2017-10-03 13:13:52 +02:00
|
|
|
if(~it->second->flags & it->second->DIRECTORY && path != rstrip(it->first, '/'))
|
2018-01-22 09:25:08 +01:00
|
|
|
throw http::error
|
|
|
|
{
|
|
|
|
http::code::NOT_FOUND
|
|
|
|
};
|
2017-08-23 23:06:14 +02:00
|
|
|
|
|
|
|
return *it->second;
|
|
|
|
}
|
|
|
|
|
2017-12-24 08:34:11 +01:00
|
|
|
//
|
|
|
|
// resource
|
|
|
|
//
|
|
|
|
|
2017-12-12 21:26:39 +01:00
|
|
|
ircd::resource::resource(const string_view &path)
|
2017-08-23 23:06:14 +02:00
|
|
|
:resource
|
|
|
|
{
|
2017-12-12 21:26:39 +01:00
|
|
|
path, opts{}
|
2017-08-23 23:06:14 +02:00
|
|
|
}
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
ircd::resource::resource(const string_view &path,
|
2017-12-12 21:26:39 +01:00
|
|
|
const opts &opts)
|
2017-08-23 23:06:14 +02:00
|
|
|
:path{path}
|
2017-12-12 21:26:39 +01:00
|
|
|
,description{opts.description}
|
2017-08-23 23:06:14 +02:00
|
|
|
,flags{opts.flags}
|
|
|
|
,resources_it{[this, &path]
|
2016-09-06 01:05:16 +02:00
|
|
|
{
|
2018-01-22 09:25:08 +01:00
|
|
|
const auto iit
|
|
|
|
{
|
|
|
|
resources.emplace(this->path, this)
|
|
|
|
};
|
|
|
|
|
2016-11-29 16:23:38 +01:00
|
|
|
if(!iit.second)
|
2018-01-22 09:25:08 +01:00
|
|
|
throw error
|
|
|
|
{
|
|
|
|
"resource \"%s\" already registered", path
|
|
|
|
};
|
2016-11-29 16:23:38 +01:00
|
|
|
|
2017-08-23 23:06:14 +02:00
|
|
|
return unique_const_iterator<decltype(resources)>
|
|
|
|
{
|
|
|
|
resources, iit.first
|
|
|
|
};
|
2016-11-29 16:23:38 +01:00
|
|
|
}()}
|
|
|
|
{
|
2018-01-26 02:29:37 +01:00
|
|
|
log::debug
|
2018-01-22 09:25:08 +01:00
|
|
|
{
|
|
|
|
"Registered resource \"%s\"", path.empty()? string_view{"/"} : path
|
|
|
|
};
|
2016-09-06 01:05:16 +02:00
|
|
|
}
|
|
|
|
|
2016-11-29 16:23:38 +01:00
|
|
|
ircd::resource::~resource()
|
2016-09-06 01:05:16 +02:00
|
|
|
noexcept
|
|
|
|
{
|
2018-01-26 02:29:37 +01:00
|
|
|
log::debug
|
2018-01-22 09:25:08 +01:00
|
|
|
{
|
|
|
|
"Unregistered resource \"%s\"", path.empty()? string_view{"/"} : path
|
|
|
|
};
|
2016-09-06 01:05:16 +02:00
|
|
|
}
|
|
|
|
|
2017-10-16 06:29:38 +02:00
|
|
|
namespace ircd
|
|
|
|
{
|
|
|
|
static void verify_origin(client &client, resource::method &method, resource::request &request);
|
|
|
|
static void authenticate(client &client, resource::method &method, resource::request &request);
|
|
|
|
}
|
2017-08-23 23:06:14 +02:00
|
|
|
|
2017-10-16 06:29:38 +02:00
|
|
|
void
|
|
|
|
ircd::authenticate(client &client,
|
|
|
|
resource::method &method,
|
|
|
|
resource::request &request)
|
2017-08-23 23:06:14 +02:00
|
|
|
try
|
|
|
|
{
|
2018-02-11 07:07:06 +01:00
|
|
|
request.access_token =
|
2017-09-17 00:22:54 +02:00
|
|
|
{
|
2018-02-11 07:03:39 +01:00
|
|
|
request.query["access_token"]
|
2017-09-17 00:22:54 +02:00
|
|
|
};
|
|
|
|
|
2018-02-11 07:07:06 +01:00
|
|
|
if(empty(request.access_token))
|
2018-02-11 07:03:39 +01:00
|
|
|
{
|
|
|
|
const auto authorization
|
|
|
|
{
|
|
|
|
split(request.head.authorization, ' ')
|
|
|
|
};
|
|
|
|
|
|
|
|
if(iequals(authorization.first, "bearer"_sv))
|
2018-02-11 07:07:06 +01:00
|
|
|
request.access_token = authorization.second;
|
2018-02-11 07:03:39 +01:00
|
|
|
}
|
|
|
|
|
2017-09-25 05:47:13 +02:00
|
|
|
const bool result
|
|
|
|
{
|
2018-02-11 07:07:06 +01:00
|
|
|
request.access_token &&
|
2018-02-11 22:37:00 +01:00
|
|
|
m::user::tokens.get(std::nothrow, "ircd.access_token"_sv, request.access_token, [&request]
|
2018-02-11 06:42:55 +01:00
|
|
|
(const m::event &event)
|
2017-09-25 05:47:13 +02:00
|
|
|
{
|
2018-02-11 22:37:00 +01:00
|
|
|
// The user sent this access token to the tokens room
|
2017-12-12 21:26:39 +01:00
|
|
|
request.user_id = m::user::id{at<"sender"_>(event)};
|
2017-09-25 05:47:13 +02:00
|
|
|
})
|
|
|
|
};
|
|
|
|
|
|
|
|
if(!result)
|
2017-08-23 23:06:14 +02:00
|
|
|
throw m::error
|
|
|
|
{
|
2017-09-08 11:17:06 +02:00
|
|
|
// When credentials are required but missing or invalid, the HTTP call will return with
|
|
|
|
// a status of 401 and the error code, M_MISSING_TOKEN or M_UNKNOWN_TOKEN respectively.
|
2017-08-23 23:06:14 +02:00
|
|
|
http::UNAUTHORIZED, "M_UNKNOWN_TOKEN", "Credentials for this method are required but invalid."
|
|
|
|
};
|
|
|
|
}
|
|
|
|
catch(const std::out_of_range &e)
|
|
|
|
{
|
|
|
|
throw m::error
|
|
|
|
{
|
2017-09-08 11:17:06 +02:00
|
|
|
// When credentials are required but missing or invalid, the HTTP call will return with
|
|
|
|
// a status of 401 and the error code, M_MISSING_TOKEN or M_UNKNOWN_TOKEN respectively.
|
2017-08-23 23:06:14 +02:00
|
|
|
http::UNAUTHORIZED, "M_MISSING_TOKEN", "Credentials for this method are required but missing."
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2017-10-16 06:29:38 +02:00
|
|
|
void
|
|
|
|
ircd::verify_origin(client &client,
|
|
|
|
resource::method &method,
|
|
|
|
resource::request &request)
|
2018-01-18 07:04:05 +01:00
|
|
|
try
|
2017-10-16 06:29:38 +02:00
|
|
|
{
|
2018-01-20 16:01:50 +01:00
|
|
|
const m::request::x_matrix x_matrix
|
2017-10-16 06:29:38 +02:00
|
|
|
{
|
|
|
|
request.head.authorization
|
|
|
|
};
|
|
|
|
|
2018-01-20 16:01:50 +01:00
|
|
|
const m::request object
|
2017-10-16 06:29:38 +02:00
|
|
|
{
|
2018-01-21 09:38:47 +01:00
|
|
|
x_matrix.origin, my_host(), method.name, request.head.uri, request.content
|
2017-10-16 06:29:38 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
const auto verified
|
|
|
|
{
|
2018-01-20 16:01:50 +01:00
|
|
|
object.verify(x_matrix.key, x_matrix.sig)
|
2017-10-16 06:29:38 +02:00
|
|
|
};
|
|
|
|
|
2018-01-18 07:04:05 +01:00
|
|
|
if(verified)
|
|
|
|
return;
|
|
|
|
|
|
|
|
throw m::error
|
|
|
|
{
|
|
|
|
http::UNAUTHORIZED, "M_INVALID_SIGNATURE",
|
|
|
|
"The X-Matrix Authorization is invalid."
|
|
|
|
};
|
|
|
|
}
|
|
|
|
catch(const m::error &)
|
|
|
|
{
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
catch(const std::exception &e)
|
|
|
|
{
|
2018-01-22 09:25:08 +01:00
|
|
|
log::error
|
|
|
|
{
|
|
|
|
"X-Matrix Authorization from %s: %s",
|
|
|
|
string(remote(client)),
|
|
|
|
e.what()
|
|
|
|
};
|
2018-01-20 16:01:50 +01:00
|
|
|
|
2018-01-18 07:04:05 +01:00
|
|
|
throw m::error
|
|
|
|
{
|
2018-01-20 16:01:50 +01:00
|
|
|
http::UNAUTHORIZED, "M_UNKNOWN_ERROR",
|
2018-01-18 07:04:05 +01:00
|
|
|
"An error has prevented authorization: %s",
|
|
|
|
e.what()
|
|
|
|
};
|
2017-10-16 06:29:38 +02:00
|
|
|
}
|
2017-08-23 23:06:14 +02:00
|
|
|
|
2016-09-06 01:05:16 +02:00
|
|
|
void
|
2016-11-29 16:23:38 +01:00
|
|
|
ircd::resource::operator()(client &client,
|
2018-02-12 20:58:40 +01:00
|
|
|
const http::request::head &head,
|
|
|
|
const string_view &content_partial)
|
2016-09-06 01:05:16 +02:00
|
|
|
{
|
2018-01-12 03:45:25 +01:00
|
|
|
// Find the method or METHOD_NOT_ALLOWED
|
|
|
|
auto &method
|
|
|
|
{
|
|
|
|
operator[](head.method)
|
|
|
|
};
|
|
|
|
|
|
|
|
// Bail out if the method limited the amount of content and it was exceeded.
|
|
|
|
if(head.content_length > method.opts.payload_max)
|
|
|
|
throw http::error
|
|
|
|
{
|
|
|
|
http::PAYLOAD_TOO_LARGE
|
|
|
|
};
|
|
|
|
|
|
|
|
const size_t content_remain
|
|
|
|
{
|
2018-02-12 20:58:40 +01:00
|
|
|
head.content_length - client.content_consumed
|
2018-01-12 03:45:25 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
unique_buffer<mutable_buffer> content_buffer;
|
2018-02-12 20:58:40 +01:00
|
|
|
string_view content{content_partial};
|
2018-01-12 03:45:25 +01:00
|
|
|
if(content_remain)
|
|
|
|
{
|
|
|
|
// Copy any partial content to the final contiguous allocated buffer;
|
|
|
|
content_buffer = unique_buffer<mutable_buffer>{head.content_length};
|
2018-02-12 20:58:40 +01:00
|
|
|
memcpy(data(content_buffer), data(content_partial), size(content_partial));
|
2018-01-12 03:45:25 +01:00
|
|
|
|
|
|
|
// Setup a window inside the buffer for the remaining socket read.
|
|
|
|
const mutable_buffer content_remain_buffer
|
|
|
|
{
|
2018-02-12 20:58:40 +01:00
|
|
|
data(content_buffer) + size(content_partial), content_remain
|
2018-01-12 03:45:25 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
//TODO: more discretion from the method.
|
|
|
|
// Read the remaining content off the socket.
|
2018-02-12 20:58:40 +01:00
|
|
|
client.content_consumed += read_all(*client.sock, content_remain_buffer);
|
|
|
|
assert(client.content_consumed == head.content_length);
|
2018-01-12 03:45:25 +01:00
|
|
|
content = string_view
|
|
|
|
{
|
|
|
|
data(content_buffer), head.content_length
|
|
|
|
};
|
|
|
|
}
|
2017-10-12 05:52:33 +02:00
|
|
|
|
|
|
|
const auto pathparm
|
|
|
|
{
|
|
|
|
lstrip(head.path, this->path)
|
|
|
|
};
|
|
|
|
|
|
|
|
string_view param[8];
|
|
|
|
const vector_view<string_view> parv
|
|
|
|
{
|
|
|
|
param, tokens(pathparm, '/', param)
|
|
|
|
};
|
|
|
|
|
2018-01-14 02:55:21 +01:00
|
|
|
resource::request resource_request
|
2017-03-11 02:46:25 +01:00
|
|
|
{
|
2017-10-12 05:52:33 +02:00
|
|
|
head, content, head.query, parv
|
2017-03-11 02:46:25 +01:00
|
|
|
};
|
|
|
|
|
2018-01-12 03:45:25 +01:00
|
|
|
if(method.opts.flags & method.REQUIRES_AUTH)
|
2018-01-14 02:55:21 +01:00
|
|
|
authenticate(client, method, resource_request);
|
2017-08-23 23:06:14 +02:00
|
|
|
|
2018-01-12 03:45:25 +01:00
|
|
|
if(method.opts.flags & method.VERIFY_ORIGIN)
|
2018-01-14 02:55:21 +01:00
|
|
|
verify_origin(client, method, resource_request);
|
2017-08-23 23:06:14 +02:00
|
|
|
|
2018-01-14 02:55:21 +01:00
|
|
|
handle_request(client, method, resource_request);
|
2017-03-21 03:30:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2017-08-23 23:06:14 +02:00
|
|
|
ircd::resource::handle_request(client &client,
|
|
|
|
method &method,
|
|
|
|
resource::request &request)
|
2017-03-21 03:30:07 +01:00
|
|
|
try
|
|
|
|
{
|
2017-09-08 11:17:06 +02:00
|
|
|
const auto response
|
|
|
|
{
|
|
|
|
method(client, request)
|
|
|
|
};
|
2017-03-21 03:30:07 +01:00
|
|
|
}
|
2017-09-15 21:07:07 +02:00
|
|
|
catch(const json::not_found &e)
|
2017-03-21 03:30:07 +01:00
|
|
|
{
|
|
|
|
throw m::error
|
|
|
|
{
|
2017-09-08 11:17:06 +02:00
|
|
|
http::BAD_REQUEST, "M_BAD_JSON", "Required JSON field: %s", e.what()
|
2017-03-21 03:30:07 +01:00
|
|
|
};
|
2016-09-06 01:05:16 +02:00
|
|
|
}
|
2017-09-15 21:07:07 +02:00
|
|
|
catch(const json::print_error &e)
|
|
|
|
{
|
|
|
|
throw m::error
|
|
|
|
{
|
|
|
|
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Generator Protection: %s", e.what()
|
|
|
|
};
|
|
|
|
}
|
|
|
|
catch(const json::error &e)
|
|
|
|
{
|
|
|
|
throw m::error
|
|
|
|
{
|
|
|
|
http::BAD_REQUEST, "M_NOT_JSON", "%s", e.what()
|
|
|
|
};
|
|
|
|
}
|
2017-09-25 03:05:42 +02:00
|
|
|
catch(const std::out_of_range &e)
|
|
|
|
{
|
|
|
|
throw m::error
|
|
|
|
{
|
|
|
|
http::NOT_FOUND, "M_NOT_FOUND", "%s", e.what()
|
|
|
|
};
|
|
|
|
}
|
2016-09-06 01:05:16 +02:00
|
|
|
|
2017-10-16 06:29:38 +02:00
|
|
|
ircd::resource::method &
|
|
|
|
ircd::resource::operator[](const string_view &name)
|
|
|
|
try
|
|
|
|
{
|
|
|
|
return *methods.at(name);
|
|
|
|
}
|
|
|
|
catch(const std::out_of_range &e)
|
|
|
|
{
|
2017-12-24 22:35:36 +01:00
|
|
|
size_t len(0);
|
|
|
|
char buf[128]; buf[0] = '\0';
|
|
|
|
auto it(begin(methods));
|
|
|
|
if(it != end(methods))
|
|
|
|
{
|
|
|
|
len = strlcat(buf, it->first);
|
|
|
|
for(++it; it != end(methods); ++it)
|
|
|
|
{
|
|
|
|
len = strlcat(buf, " ");
|
|
|
|
len = strlcat(buf, it->first);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-16 06:29:38 +02:00
|
|
|
throw http::error
|
|
|
|
{
|
2017-12-24 22:35:36 +01:00
|
|
|
http::METHOD_NOT_ALLOWED, {},
|
|
|
|
{
|
|
|
|
{ "Allow", string_view{buf, len} }
|
|
|
|
}
|
2017-10-16 06:29:38 +02:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2018-01-12 03:45:25 +01:00
|
|
|
ircd::resource::method::method(struct resource &resource,
|
|
|
|
const string_view &name,
|
|
|
|
const handler &handler)
|
|
|
|
:method
|
|
|
|
{
|
|
|
|
resource, name, handler, {}
|
|
|
|
}
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2016-11-29 16:23:38 +01:00
|
|
|
ircd::resource::method::method(struct resource &resource,
|
2017-08-23 23:06:14 +02:00
|
|
|
const string_view &name,
|
2016-11-29 16:23:38 +01:00
|
|
|
const handler &handler,
|
2018-01-12 03:45:25 +01:00
|
|
|
const struct opts &opts)
|
2017-08-23 23:06:14 +02:00
|
|
|
:name{name}
|
2016-11-29 16:23:38 +01:00
|
|
|
,resource{&resource}
|
2017-08-23 23:06:14 +02:00
|
|
|
,function{handler}
|
2018-01-12 03:45:25 +01:00
|
|
|
,opts{opts}
|
2016-11-29 16:23:38 +01:00
|
|
|
,methods_it{[this, &name]
|
2016-09-06 01:05:16 +02:00
|
|
|
{
|
2018-01-22 09:25:08 +01:00
|
|
|
const auto iit
|
|
|
|
{
|
|
|
|
this->resource->methods.emplace(this->name, this)
|
|
|
|
};
|
|
|
|
|
2016-09-06 01:05:16 +02:00
|
|
|
if(!iit.second)
|
2018-01-22 09:25:08 +01:00
|
|
|
throw error
|
|
|
|
{
|
|
|
|
"resource \"%s\" already registered", name
|
|
|
|
};
|
2016-09-06 01:05:16 +02:00
|
|
|
|
2017-08-23 23:06:14 +02:00
|
|
|
return unique_const_iterator<decltype(resource::methods)>
|
|
|
|
{
|
|
|
|
this->resource->methods,
|
|
|
|
iit.first
|
|
|
|
};
|
2016-11-29 16:23:38 +01:00
|
|
|
}()}
|
|
|
|
{
|
2016-09-06 01:05:16 +02:00
|
|
|
}
|
|
|
|
|
2016-11-29 16:23:38 +01:00
|
|
|
ircd::resource::method::~method()
|
|
|
|
noexcept
|
2016-09-06 01:05:16 +02:00
|
|
|
{
|
2017-08-23 23:06:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
ircd::resource::response
|
|
|
|
ircd::resource::method::operator()(client &client,
|
|
|
|
request &request)
|
|
|
|
try
|
|
|
|
{
|
|
|
|
return function(client, request);
|
|
|
|
}
|
|
|
|
catch(const std::bad_function_call &e)
|
|
|
|
{
|
|
|
|
throw http::error
|
|
|
|
{
|
|
|
|
http::SERVICE_UNAVAILABLE
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
ircd::resource::request::request(const http::request::head &head,
|
2018-01-12 03:45:25 +01:00
|
|
|
const string_view &content,
|
2017-10-12 05:52:33 +02:00
|
|
|
http::query::string query,
|
|
|
|
const vector_view<string_view> &parv)
|
2017-08-23 23:48:28 +02:00
|
|
|
:json::object{content}
|
2017-08-23 23:06:14 +02:00
|
|
|
,head{head}
|
|
|
|
,content{content}
|
|
|
|
,query{std::move(query)}
|
2017-10-12 05:52:33 +02:00
|
|
|
,parv{parv}
|
2017-08-23 23:06:14 +02:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2017-09-25 02:00:05 +02:00
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const http::code &code)
|
|
|
|
:response{client, json::object{"{}"}, code}
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2017-08-23 23:06:14 +02:00
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const http::code &code,
|
2017-09-09 21:20:00 +02:00
|
|
|
const json::iov &members)
|
2017-09-08 17:15:14 +02:00
|
|
|
:response{client, members, code}
|
2017-08-23 23:06:14 +02:00
|
|
|
{
|
2016-09-06 01:05:16 +02:00
|
|
|
}
|
2016-11-29 16:23:38 +01:00
|
|
|
|
2017-09-12 22:34:21 +02:00
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const json::members &members,
|
|
|
|
const http::code &code)
|
|
|
|
:response{client, code, members}
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2017-09-25 02:00:05 +02:00
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const json::value &value,
|
|
|
|
const http::code &code)
|
|
|
|
:response{client, code, value}
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const http::code &code,
|
|
|
|
const json::value &value)
|
|
|
|
try
|
|
|
|
{
|
|
|
|
const auto size
|
|
|
|
{
|
|
|
|
serialized(value)
|
|
|
|
};
|
|
|
|
|
2017-10-28 21:31:26 +02:00
|
|
|
const unique_buffer<mutable_buffer> buffer
|
2017-09-25 02:00:05 +02:00
|
|
|
{
|
2017-10-28 21:31:26 +02:00
|
|
|
size
|
2017-09-25 02:00:05 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
switch(type(value))
|
|
|
|
{
|
|
|
|
case json::ARRAY:
|
|
|
|
{
|
2017-10-28 21:31:26 +02:00
|
|
|
response(client, json::array{stringify(mutable_buffer{buffer}, value)}, code);
|
2017-09-25 02:00:05 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
case json::OBJECT:
|
|
|
|
{
|
2017-10-28 21:31:26 +02:00
|
|
|
response(client, json::object{stringify(mutable_buffer{buffer}, value)}, code);
|
2017-09-25 02:00:05 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
default: throw m::error
|
|
|
|
{
|
|
|
|
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Cannot send json::%s as response content", type(value)
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch(const json::error &e)
|
|
|
|
{
|
|
|
|
throw m::error
|
|
|
|
{
|
|
|
|
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Generator Protection: %s", e.what()
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2017-09-12 22:34:21 +02:00
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const http::code &code,
|
|
|
|
const json::members &members)
|
2017-09-25 02:00:05 +02:00
|
|
|
try
|
2017-09-12 22:34:21 +02:00
|
|
|
{
|
2017-09-15 21:07:07 +02:00
|
|
|
const auto size
|
|
|
|
{
|
|
|
|
serialized(members)
|
|
|
|
};
|
|
|
|
|
2017-10-28 21:31:26 +02:00
|
|
|
const unique_buffer<mutable_buffer> buffer
|
|
|
|
{
|
|
|
|
size
|
|
|
|
};
|
|
|
|
|
2017-09-15 21:07:07 +02:00
|
|
|
const json::object object
|
|
|
|
{
|
2017-10-28 21:31:26 +02:00
|
|
|
stringify(mutable_buffer{buffer}, members)
|
2017-09-15 21:07:07 +02:00
|
|
|
};
|
2017-09-12 22:34:21 +02:00
|
|
|
|
2017-09-15 21:07:07 +02:00
|
|
|
response(client, object, code);
|
2017-09-12 22:34:21 +02:00
|
|
|
}
|
2017-09-25 02:00:05 +02:00
|
|
|
catch(const json::error &e)
|
2017-09-09 21:20:00 +02:00
|
|
|
{
|
2017-09-25 02:00:05 +02:00
|
|
|
throw m::error
|
|
|
|
{
|
|
|
|
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Generator Protection: %s", e.what()
|
|
|
|
};
|
2017-09-09 21:20:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const json::iov &members,
|
2017-03-11 04:31:20 +01:00
|
|
|
const http::code &code)
|
2017-03-21 03:30:07 +01:00
|
|
|
try
|
2016-09-06 01:05:16 +02:00
|
|
|
{
|
2017-09-15 21:07:07 +02:00
|
|
|
const auto size
|
|
|
|
{
|
|
|
|
serialized(members)
|
|
|
|
};
|
|
|
|
|
2017-10-28 21:31:26 +02:00
|
|
|
const unique_buffer<mutable_buffer> buffer
|
|
|
|
{
|
|
|
|
size
|
|
|
|
};
|
|
|
|
|
2017-09-15 21:07:07 +02:00
|
|
|
const json::object object
|
|
|
|
{
|
2017-10-28 21:31:26 +02:00
|
|
|
stringify(mutable_buffer{buffer}, members)
|
2017-09-15 21:07:07 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
response(client, object, code);
|
2017-03-21 03:30:07 +01:00
|
|
|
}
|
|
|
|
catch(const json::error &e)
|
|
|
|
{
|
|
|
|
throw m::error
|
|
|
|
{
|
|
|
|
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Generator Protection: %s", e.what()
|
|
|
|
};
|
2017-03-11 04:31:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
ircd::resource::response::response(client &client,
|
2017-08-23 23:48:28 +02:00
|
|
|
const json::object &object,
|
2017-03-11 04:31:20 +01:00
|
|
|
const http::code &code)
|
|
|
|
{
|
2017-11-30 19:31:13 +01:00
|
|
|
static const auto content_type
|
2017-03-11 04:31:20 +01:00
|
|
|
{
|
2017-08-23 23:06:14 +02:00
|
|
|
"application/json; charset=utf-8"
|
2017-03-11 04:31:20 +01:00
|
|
|
};
|
2016-09-06 01:05:16 +02:00
|
|
|
|
2017-11-30 19:31:13 +01:00
|
|
|
assert(json::valid(object, std::nothrow));
|
2017-08-23 23:48:28 +02:00
|
|
|
response(client, object, content_type, code);
|
2016-09-06 01:05:16 +02:00
|
|
|
}
|
|
|
|
|
2017-09-25 02:00:05 +02:00
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const json::array &array,
|
|
|
|
const http::code &code)
|
|
|
|
{
|
2017-11-30 19:31:13 +01:00
|
|
|
static const auto content_type
|
2017-09-25 02:00:05 +02:00
|
|
|
{
|
|
|
|
"application/json; charset=utf-8"
|
|
|
|
};
|
|
|
|
|
2017-11-30 19:31:13 +01:00
|
|
|
assert(json::valid(array, std::nothrow));
|
2017-09-25 02:00:05 +02:00
|
|
|
response(client, array, content_type, code);
|
|
|
|
}
|
|
|
|
|
2017-08-23 23:06:14 +02:00
|
|
|
ircd::resource::response::response(client &client,
|
2017-12-23 01:40:44 +01:00
|
|
|
const string_view &content,
|
2017-08-23 23:06:14 +02:00
|
|
|
const string_view &content_type,
|
2017-12-24 22:25:09 +01:00
|
|
|
const http::code &code,
|
|
|
|
const vector_view<const http::header> &headers)
|
|
|
|
{
|
2018-01-12 03:41:27 +01:00
|
|
|
// contents of this buffer get copied again when further passed to
|
|
|
|
// response{}; we can get this off the stack if that remains true.
|
|
|
|
thread_local char buffer[2_KiB];
|
2018-02-08 06:30:20 +01:00
|
|
|
window_buffer sb{buffer};
|
2018-01-12 03:41:27 +01:00
|
|
|
{
|
|
|
|
const critical_assertion ca;
|
|
|
|
http::write(sb, headers);
|
|
|
|
}
|
|
|
|
|
2017-12-24 22:25:09 +01:00
|
|
|
response
|
|
|
|
{
|
|
|
|
client, content, content_type, code, sb.completed()
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
ircd::resource::response::response(client &client,
|
|
|
|
const string_view &content,
|
|
|
|
const string_view &content_type,
|
|
|
|
const http::code &code,
|
|
|
|
const string_view &headers)
|
2016-09-06 01:05:16 +02:00
|
|
|
{
|
2017-09-25 02:00:05 +02:00
|
|
|
const auto request_time
|
|
|
|
{
|
2018-02-12 20:58:40 +01:00
|
|
|
client.timer.at<microseconds>().count()
|
2017-09-30 08:09:03 +02:00
|
|
|
};
|
|
|
|
|
2017-12-24 22:25:09 +01:00
|
|
|
const fmt::bsprintf<64> rtime
|
2017-09-30 08:09:03 +02:00
|
|
|
{
|
2018-01-12 03:46:04 +01:00
|
|
|
"%zd$us", request_time
|
2017-12-24 22:25:09 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
const string_view cache_control
|
|
|
|
{
|
|
|
|
(code >= 200 && code < 300) ||
|
|
|
|
(code >= 403 && code <= 405) ||
|
|
|
|
(code >= 300 && code < 400)? "no-cache":
|
|
|
|
""
|
2017-09-25 02:00:05 +02:00
|
|
|
};
|
|
|
|
|
2018-01-12 03:41:27 +01:00
|
|
|
// This buffer will be passed to the socket and sent out;
|
|
|
|
// cannot be static/tls.
|
|
|
|
char head_buf[2_KiB];
|
2018-02-08 06:30:20 +01:00
|
|
|
window_buffer head{head_buf};
|
2017-08-23 23:06:14 +02:00
|
|
|
http::response
|
|
|
|
{
|
2017-12-23 01:40:44 +01:00
|
|
|
head,
|
|
|
|
code,
|
|
|
|
content.size(),
|
|
|
|
content_type,
|
2017-12-24 22:25:09 +01:00
|
|
|
headers,
|
2017-08-23 23:06:14 +02:00
|
|
|
{
|
2018-01-12 03:46:04 +01:00
|
|
|
{ "Access-Control-Allow-Origin", "*" }, //TODO: XXX
|
|
|
|
{ "Cache-Control", cache_control },
|
|
|
|
{ "X-IRCd-Request-Timer", rtime, },
|
2017-12-24 22:25:09 +01:00
|
|
|
},
|
2017-08-23 23:06:14 +02:00
|
|
|
};
|
|
|
|
|
2018-01-12 03:46:04 +01:00
|
|
|
// Maximum size is 2_KiB which is realistically ok but ideally a small
|
|
|
|
// maximum; this exception should hit the developer in testing.
|
|
|
|
if(unlikely(!head.remaining()))
|
|
|
|
throw assertive
|
|
|
|
{
|
|
|
|
"HTTP headers too large for buffer of %zu", sizeof(head_buf)
|
|
|
|
};
|
|
|
|
|
2018-01-07 06:36:17 +01:00
|
|
|
const ilist<const const_buffer> vector
|
2017-12-23 01:40:44 +01:00
|
|
|
{
|
|
|
|
head.completed(),
|
|
|
|
content
|
|
|
|
};
|
|
|
|
|
|
|
|
write_closure(client)(vector);
|
|
|
|
|
2018-01-22 09:25:08 +01:00
|
|
|
log::debug
|
|
|
|
{
|
|
|
|
"socket(%p) local[%s] remote[%s] HTTP %d %s in %ld$us; response in %ld$us (%s) content-length:%zu",
|
|
|
|
client.sock.get(),
|
|
|
|
string(local(client)),
|
|
|
|
string(remote(client)),
|
|
|
|
int(code),
|
|
|
|
http::status(code),
|
|
|
|
request_time,
|
2018-02-12 20:58:40 +01:00
|
|
|
(client.timer.at<microseconds>().count() - request_time),
|
2018-01-22 09:25:08 +01:00
|
|
|
content_type,
|
|
|
|
content.size()
|
|
|
|
};
|
2016-09-06 01:05:16 +02:00
|
|
|
}
|