mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-30 17:42:45 +00:00 
			
		
		
		
	 f4eab69785
			
		
	
	
		f4eab69785
		
	
	
	
	
		
			
			...unless it has already been done. Otherwise we'd be spinning in RequestServer waiting for more read events.
		
			
				
	
	
		
			128 lines
		
	
	
	
		
			3.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			128 lines
		
	
	
	
		
			3.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2020, the SerenityOS developers.
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #include <AK/Debug.h>
 | |
| #include <LibCore/EventLoop.h>
 | |
| #include <LibHTTP/HttpResponse.h>
 | |
| #include <LibHTTP/HttpsJob.h>
 | |
| #include <LibTLS/TLSv12.h>
 | |
| #include <stdio.h>
 | |
| #include <unistd.h>
 | |
| 
 | |
| namespace HTTP {
 | |
| 
 | |
| void HttpsJob::start()
 | |
| {
 | |
|     VERIFY(!m_socket);
 | |
|     m_socket = TLS::TLSv12::construct(this);
 | |
|     m_socket->set_root_certificates(m_override_ca_certificates ? *m_override_ca_certificates : DefaultRootCACertificates::the().certificates());
 | |
|     m_socket->on_tls_connected = [this] {
 | |
|         dbgln_if(HTTPSJOB_DEBUG, "HttpsJob: on_connected callback");
 | |
|         on_socket_connected();
 | |
|     };
 | |
|     m_socket->on_tls_error = [&](TLS::AlertDescription error) {
 | |
|         if (error == TLS::AlertDescription::HandshakeFailure) {
 | |
|             deferred_invoke([this](auto&) {
 | |
|                 return did_fail(Core::NetworkJob::Error::ProtocolFailed);
 | |
|             });
 | |
|         } else if (error == TLS::AlertDescription::DecryptError) {
 | |
|             deferred_invoke([this](auto&) {
 | |
|                 return did_fail(Core::NetworkJob::Error::ConnectionFailed);
 | |
|             });
 | |
|         } else {
 | |
|             deferred_invoke([this](auto&) {
 | |
|                 return did_fail(Core::NetworkJob::Error::TransmissionFailed);
 | |
|             });
 | |
|         }
 | |
|     };
 | |
|     m_socket->on_tls_finished = [this] {
 | |
|         if (!m_has_scheduled_finish)
 | |
|             finish_up();
 | |
|     };
 | |
|     m_socket->on_tls_certificate_request = [this](auto&) {
 | |
|         if (on_certificate_requested)
 | |
|             on_certificate_requested(*this);
 | |
|     };
 | |
|     bool success = ((TLS::TLSv12&)*m_socket).connect(m_request.url().host(), m_request.url().port());
 | |
|     if (!success) {
 | |
|         deferred_invoke([this](auto&) {
 | |
|             return did_fail(Core::NetworkJob::Error::ConnectionFailed);
 | |
|         });
 | |
|     }
 | |
| }
 | |
| 
 | |
| void HttpsJob::shutdown()
 | |
| {
 | |
|     if (!m_socket)
 | |
|         return;
 | |
|     m_socket->on_tls_ready_to_read = nullptr;
 | |
|     m_socket->on_tls_connected = nullptr;
 | |
|     remove_child(*m_socket);
 | |
|     m_socket = nullptr;
 | |
| }
 | |
| 
 | |
| void HttpsJob::set_certificate(String certificate, String private_key)
 | |
| {
 | |
|     if (!m_socket->add_client_key(certificate.bytes(), private_key.bytes())) {
 | |
|         dbgln("LibHTTP: Failed to set a client certificate");
 | |
|         // FIXME: Do something about this failure
 | |
|         VERIFY_NOT_REACHED();
 | |
|     }
 | |
| }
 | |
| 
 | |
| void HttpsJob::read_while_data_available(Function<IterationDecision()> read)
 | |
| {
 | |
|     while (m_socket->can_read()) {
 | |
|         if (read() == IterationDecision::Break)
 | |
|             break;
 | |
|     }
 | |
| }
 | |
| 
 | |
| void HttpsJob::register_on_ready_to_read(Function<void()> callback)
 | |
| {
 | |
|     m_socket->on_tls_ready_to_read = [callback = move(callback)](auto&) {
 | |
|         callback();
 | |
|     };
 | |
| }
 | |
| 
 | |
| void HttpsJob::register_on_ready_to_write(Function<void()> callback)
 | |
| {
 | |
|     m_socket->on_tls_ready_to_write = [callback = move(callback)](auto&) {
 | |
|         callback();
 | |
|     };
 | |
| }
 | |
| 
 | |
| bool HttpsJob::can_read_line() const
 | |
| {
 | |
|     return m_socket->can_read_line();
 | |
| }
 | |
| 
 | |
| String HttpsJob::read_line(size_t size)
 | |
| {
 | |
|     return m_socket->read_line(size);
 | |
| }
 | |
| 
 | |
| ByteBuffer HttpsJob::receive(size_t size)
 | |
| {
 | |
|     return m_socket->read(size);
 | |
| }
 | |
| 
 | |
| bool HttpsJob::can_read() const
 | |
| {
 | |
|     return m_socket->can_read();
 | |
| }
 | |
| 
 | |
| bool HttpsJob::eof() const
 | |
| {
 | |
|     return m_socket->eof();
 | |
| }
 | |
| 
 | |
| bool HttpsJob::write(ReadonlyBytes data)
 | |
| {
 | |
|     return m_socket->write(data);
 | |
| }
 | |
| 
 | |
| }
 |