• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

mendersoftware / mender / 2270824024

19 Jan 2026 08:32AM UTC coverage: 75.751% (-0.07%) from 75.817%
2270824024

Pull #1881

gitlab-ci

mender-test-bot
fix: ensure tcp_stream object doesn't hang

Ticket: None
Changelog: Added a 5 minute timeout to all async read, write and connect
operations that use Boost Beast's tcp stream socket to ensure recovery in case
of hanging async operations.

Signed-off-by: Daniel Skinstad Drabitzius <daniel.drabitzius@northern.tech>
(cherry picked from commit d8ddf6da2)
Pull Request #1881: [Cherry 5.0.x]: Fix use-after-free of stream object

15 of 18 new or added lines in 1 file covered. (83.33%)

10 existing lines in 1 file now uncovered.

7435 of 9815 relevant lines covered (75.75%)

13826.34 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

86.46
/src/common/http/platform/beast/http.cpp
1
// Copyright 2023 Northern.tech AS
2
//
3
//    Licensed under the Apache License, Version 2.0 (the "License");
4
//    you may not use this file except in compliance with the License.
5
//    You may obtain a copy of the License at
6
//
7
//        http://www.apache.org/licenses/LICENSE-2.0
8
//
9
//    Unless required by applicable law or agreed to in writing, software
10
//    distributed under the License is distributed on an "AS IS" BASIS,
11
//    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
//    See the License for the specific language governing permissions and
13
//    limitations under the License.
14

15
#include <common/http.hpp>
16

17
#include <algorithm>
18

19
#include <boost/asio.hpp>
20
#include <boost/asio/ip/tcp.hpp>
21
#include <boost/asio/ssl/host_name_verification.hpp>
22
#include <boost/asio/ssl/verify_mode.hpp>
23

24
#include <common/common.hpp>
25
#include <common/crypto.hpp>
26

27
namespace mender {
28
namespace common {
29
namespace http {
30

31
namespace common = mender::common;
32
namespace crypto = mender::common::crypto;
33

34
// At the time of writing, Beast only supports HTTP/1.1, and is unlikely to support HTTP/2
35
// according to this discussion: https://github.com/boostorg/beast/issues/1302.
36
const unsigned int BeastHttpVersion = 11;
37

38
namespace asio = boost::asio;
39
namespace http = boost::beast::http;
40

41
const int HTTP_BEAST_BUFFER_SIZE = MENDER_BUFSIZE;
42

43
static http::verb MethodToBeastVerb(Method method) {
249✔
44
        switch (method) {
249✔
45
        case Method::GET:
46
                return http::verb::get;
47
        case Method::HEAD:
48
                return http::verb::head;
49
        case Method::POST:
50
                return http::verb::post;
51
        case Method::PUT:
52
                return http::verb::put;
53
        case Method::PATCH:
54
                return http::verb::patch;
55
        case Method::CONNECT:
56
                return http::verb::connect;
57
        case Method::Invalid:
58
                // Fallthrough to end (no-op).
59
                break;
60
        }
61
        // Don't use "default" case. This should generate a warning if we ever add any methods. But
62
        // still assert here for safety.
63
        assert(false);
64
        return http::verb::get;
65
}
66

67
static expected::expected<Method, error::Error> BeastVerbToMethod(
228✔
68
        http::verb verb, const string &verb_string) {
69
        switch (verb) {
228✔
70
        case http::verb::get:
192✔
71
                return Method::GET;
72
        case http::verb::head:
×
73
                return Method::HEAD;
74
        case http::verb::post:
13✔
75
                return Method::POST;
76
        case http::verb::put:
23✔
77
                return Method::PUT;
78
        case http::verb::patch:
×
79
                return Method::PATCH;
80
        case http::verb::connect:
×
81
                return Method::CONNECT;
82
        default:
×
83
                return expected::unexpected(MakeError(UnsupportedMethodError, verb_string));
×
84
        }
85
}
86

87
template <typename StreamType>
88
class BodyAsyncReader : virtual public io::AsyncReader {
89
public:
90
        BodyAsyncReader(StreamType &stream, shared_ptr<bool> cancelled) :
156✔
91
                stream_ {stream},
92
                cancelled_ {cancelled} {
312✔
93
        }
156✔
94
        ~BodyAsyncReader() {
39✔
95
                Cancel();
39✔
96
        }
78✔
97

98
        error::Error AsyncRead(
2,187✔
99
                vector<uint8_t>::iterator start,
100
                vector<uint8_t>::iterator end,
101
                io::AsyncIoHandler handler) override {
102
                if (eof_) {
2,187✔
103
                        handler(0);
×
104
                        return error::NoError;
×
105
                }
106

107
                if (*cancelled_) {
2,187✔
108
                        return error::MakeError(
×
109
                                error::ProgrammingError,
110
                                "BodyAsyncReader::AsyncRead called after stream is destroyed");
×
111
                }
112
                stream_.AsyncReadNextBodyPart(start, end, [this, handler](io::ExpectedSize size) {
13,732✔
113
                        if (size && size.value() == 0) {
6,621✔
114
                                eof_ = true;
128✔
115
                        }
116
                        handler(size);
13,242✔
117
                });
118
                return error::NoError;
2,187✔
119
        }
120

121
        void Cancel() override {
39✔
122
                if (!*cancelled_) {
39✔
123
                        stream_.Cancel();
4✔
124
                }
125
        }
39✔
126

127
private:
128
        StreamType &stream_;
129
        shared_ptr<bool> cancelled_;
130
        bool eof_ {false};
131

132
        friend class Client;
133
        friend class Server;
134
};
135

136
template <typename StreamType>
137
class RawSocket : virtual public io::AsyncReadWriter {
138
public:
139
        RawSocket(shared_ptr<StreamType> stream, shared_ptr<beast::flat_buffer> buffered) :
×
140
                destroying_ {make_shared<bool>(false)},
×
141
                stream_ {stream},
142
                buffered_ {buffered} {
×
143
                // If there are no buffered bytes, then we don't need it.
144
                if (buffered_ && buffered_->size() == 0) {
×
145
                        buffered_.reset();
×
146
                }
147
        }
×
148

149
        ~RawSocket() {
8✔
150
                *destroying_ = true;
8✔
151
                Cancel();
8✔
152
        }
16✔
153

154
        error::Error AsyncRead(
159✔
155
                vector<uint8_t>::iterator start,
156
                vector<uint8_t>::iterator end,
157
                io::AsyncIoHandler handler) override {
158
                // If we have prebuffered bytes, which can happen if the HTTP parser read the
159
                // header and parts of the body in one block, return those first.
160
                if (buffered_) {
159✔
UNCOV
161
                        return DrainPrebufferedData(start, end, handler);
×
162
                }
163

164
                read_buffer_ = asio::buffer(&*start, end - start);
159✔
165
                auto &destroying = destroying_;
166
                stream_->async_read_some(
318✔
167
                        read_buffer_,
159✔
168
                        [destroying, handler](const boost::system::error_code &ec, size_t num_read) {
157✔
169
                                if (*destroying) {
313✔
170
                                        return;
171
                                }
172

173
                                if (ec == asio::error::operation_aborted) {
313✔
174
                                        handler(expected::unexpected(error::Error(
12✔
175
                                                make_error_condition(errc::operation_canceled),
6✔
176
                                                "Could not read from socket")));
177
                                } else if (ec) {
310✔
178
                                        handler(expected::unexpected(
12✔
179
                                                error::Error(ec.default_error_condition(), "Could not read from socket")));
12✔
180
                                } else {
181
                                        handler(num_read);
608✔
182
                                }
183
                        });
184
                return error::NoError;
159✔
185
        }
186

187
        error::Error AsyncWrite(
156✔
188
                vector<uint8_t>::const_iterator start,
189
                vector<uint8_t>::const_iterator end,
190
                io::AsyncIoHandler handler) override {
191
                write_buffer_ = asio::buffer(&*start, end - start);
156✔
192
                auto &destroying = destroying_;
193
                stream_->async_write_some(
312✔
194
                        write_buffer_,
156✔
195
                        [destroying, handler](const boost::system::error_code &ec, size_t num_written) {
154✔
196
                                if (*destroying) {
306✔
197
                                        return;
198
                                }
199

200
                                if (ec == asio::error::operation_aborted) {
306✔
201
                                        handler(expected::unexpected(error::Error(
×
202
                                                make_error_condition(errc::operation_canceled),
×
203
                                                "Could not write to socket")));
204
                                } else if (ec) {
306✔
205
                                        handler(expected::unexpected(
×
206
                                                error::Error(ec.default_error_condition(), "Could not write to socket")));
×
207
                                } else {
208
                                        handler(num_written);
612✔
209
                                }
210
                        });
211
                return error::NoError;
156✔
212
        }
213

214
        void Cancel() override {
15✔
215
                // close() is sufficient:
216
                // https://www.boost.org/doc/libs/latest/doc/html/boost_asio/reference/basic_stream_socket/close/overload1.html
217
                beast::close_socket(beast::get_lowest_layer(*stream_));
218
        }
15✔
219

220
private:
UNCOV
221
        error::Error DrainPrebufferedData(
×
222
                vector<uint8_t>::iterator start,
223
                vector<uint8_t>::iterator end,
224
                io::AsyncIoHandler handler) {
UNCOV
225
                size_t to_copy = min(static_cast<size_t>(end - start), buffered_->size());
×
226

227
                // These two lines are equivalent to:
228
                //   copy_n(static_cast<const uint8_t *>(buffered_->cdata().data()), to_copy, start);
229
                // but compatible with Boost 1.67.
230
                const beast::flat_buffer &cbuffered = *buffered_;
UNCOV
231
                copy_n(static_cast<const uint8_t *>(cbuffered.data().data()), to_copy, start);
×
UNCOV
232
                buffered_->consume(to_copy);
×
UNCOV
233
                if (buffered_->size() == 0) {
×
234
                        // We don't need it anymore.
UNCOV
235
                        buffered_.reset();
×
236
                }
UNCOV
237
                handler(to_copy);
×
UNCOV
238
                return error::NoError;
×
239
        }
240

241
        shared_ptr<bool> destroying_;
242
        shared_ptr<StreamType> stream_;
243
        shared_ptr<beast::flat_buffer> buffered_;
244
        asio::mutable_buffer read_buffer_;
245
        asio::const_buffer write_buffer_;
246
};
247

248
template <typename PARSER>
249
int64_t GetContentLength(const PARSER &parser) {
404✔
250
        auto content_length = parser.content_length();
404✔
251
        if (content_length) {
404✔
252
                return content_length.value();
353✔
253
        } else {
254
                return 0;
255
        }
256
}
257

258
expected::ExpectedBool HasBody(
453✔
259
        const expected::ExpectedString &content_length,
260
        const expected::ExpectedString &transfer_encoding) {
261
        if (transfer_encoding) {
453✔
262
                if (transfer_encoding.value() != "chunked") {
4✔
263
                        return expected::unexpected(error::Error(
×
264
                                make_error_condition(errc::not_supported),
×
265
                                "Unsupported Transfer-Encoding: " + transfer_encoding.value()));
×
266
                }
267
                return true;
268
        }
269

270
        if (content_length) {
449✔
271
                auto length = common::StringToLongLong(content_length.value());
220✔
272
                if (!length || length.value() < 0) {
220✔
273
                        return expected::unexpected(error::Error(
×
274
                                length.error().code,
275
                                "Content-Length contains invalid number: " + content_length.value()));
×
276
                }
277
                return length.value() > 0;
220✔
278
        }
279

280
        return false;
281
}
282

283
Client::Client(
358✔
284
        const ClientConfig &client, events::EventLoop &event_loop, const string &logger_name) :
285
        event_loop_ {event_loop},
286
        logger_name_ {logger_name},
287
        client_config_ {client},
288
        http_proxy_ {client.http_proxy},
358✔
289
        https_proxy_ {client.https_proxy},
358✔
290
        no_proxy_ {client.no_proxy},
358✔
291
        cancelled_ {make_shared<bool>(true)},
×
292
        resolver_(GetAsioIoContext(event_loop)),
293
        body_buffer_(HTTP_BEAST_BUFFER_SIZE) {
1,432✔
294
}
358✔
295

296
Client::~Client() {
2,148✔
297
        if (!*cancelled_) {
358✔
298
                logger_.Warning("Client destroyed while request is still active!");
30✔
299
        }
300
        DoCancel();
358✔
301
}
358✔
302

303
error::Error Client::Initialize() {
287✔
304
        if (initialized_) {
287✔
305
                return error::NoError;
72✔
306
        }
307

308
        for (auto i = 0; i < MENDER_BOOST_BEAST_SSL_CTX_COUNT; i++) {
637✔
309
                ssl_ctx_[i].set_verify_mode(
850✔
310
                        client_config_.skip_verify ? ssl::verify_none : ssl::verify_peer);
311

312
                beast::error_code ec {};
426✔
313
                if (client_config_.client_cert_path != "" and client_config_.client_cert_key_path != "") {
426✔
314
                        ssl_ctx_[i].set_options(boost::asio::ssl::context::default_workarounds);
4✔
315
                        ssl_ctx_[i].use_certificate_file(
316
                                client_config_.client_cert_path, boost::asio::ssl::context_base::pem, ec);
4✔
317
                        if (ec) {
4✔
318
                                return error::Error(
319
                                        ec.default_error_condition(), "Could not load client certificate");
2✔
320
                        }
321
                        auto exp_key = crypto::PrivateKey::Load(
322
                                {client_config_.client_cert_key_path, "", client_config_.ssl_engine});
6✔
323
                        if (!exp_key) {
3✔
324
                                return exp_key.error().WithContext(
325
                                        "Error loading private key from " + client_config_.client_cert_key_path);
2✔
326
                        }
327

328
                        const int ret =
329
                                SSL_CTX_use_PrivateKey(ssl_ctx_[i].native_handle(), exp_key.value().Get());
2✔
330
                        if (ret != 1) {
2✔
331
                                return MakeError(
332
                                        HTTPInitError,
333
                                        "Failed to add the PrivateKey: " + client_config_.client_cert_key_path
×
334
                                                + " to the SSL CTX");
×
335
                        }
336
                } else if (
337
                        client_config_.client_cert_path != "" or client_config_.client_cert_key_path != "") {
422✔
338
                        return error::Error(
339
                                make_error_condition(errc::invalid_argument),
4✔
340
                                "Cannot set only one of client certificate, and client certificate private key");
4✔
341
                }
342

343
                ssl_ctx_[i].set_default_verify_paths(ec); // Load the default CAs
422✔
344
                if (ec) {
422✔
345
                        auto err = error::Error(
346
                                ec.default_error_condition(), "Failed to load the SSL default directory");
×
347
                        if (client_config_.server_cert_path == "") {
×
348
                                // We aren't going to have any valid certificates then.
349
                                return err;
×
350
                        } else {
351
                                // We have a dedicated certificate, so this is not fatal.
352
                                log::Info(err.String());
×
353
                        }
354
                }
355
                if (client_config_.server_cert_path != "") {
422✔
356
                        ssl_ctx_[i].load_verify_file(client_config_.server_cert_path, ec);
52✔
357
                        if (ec) {
52✔
358
                                log::Warning("Failed to load the server certificate! Falling back to the CA store");
4✔
359
                        }
360
                }
361
        }
362

363
        initialized_ = true;
211✔
364

365
        return error::NoError;
211✔
366
}
367

368
// Create the HOST header according to:
369
// https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.23
370
// In short: Add the port-number if it is non-standard HTTP
371
static string CreateHOSTAddress(OutgoingRequestPtr req) {
275✔
372
        if (req->GetPort() == 80 || req->GetPort() == 443) {
275✔
373
                return req->GetHost();
4✔
374
        }
375
        return req->GetHost() + ":" + to_string(req->GetPort());
542✔
376
}
377

378
error::Error Client::AsyncCall(
287✔
379
        OutgoingRequestPtr req, ResponseHandler header_handler, ResponseHandler body_handler) {
380
        auto err = Initialize();
287✔
381
        if (err != error::NoError) {
287✔
382
                return err;
4✔
383
        }
384

385
        if (!*cancelled_ && status_ != TransactionStatus::Done) {
283✔
386
                return error::Error(
387
                        make_error_condition(errc::operation_in_progress), "HTTP call already ongoing");
×
388
        }
389

390
        if (req->address_.protocol == "" || req->address_.host == "" || req->address_.port < 0) {
283✔
391
                return error::MakeError(error::ProgrammingError, "Request is not ready");
4✔
392
        }
393

394
        if (!header_handler || !body_handler) {
281✔
395
                return error::MakeError(
396
                        error::ProgrammingError, "header_handler and body_handler can not be nullptr");
2✔
397
        }
398

399
        if (req->address_.protocol != "http" && req->address_.protocol != "https") {
280✔
400
                return error::Error(
401
                        make_error_condition(errc::protocol_not_supported), req->address_.protocol);
2✔
402
        }
403

404
        logger_ = log::Logger(logger_name_).WithFields(log::LogField("url", req->orig_address_));
279✔
405

406
        request_ = req;
407

408
        err = HandleProxySetup();
279✔
409
        if (err != error::NoError) {
279✔
410
                return err;
4✔
411
        }
412

413
        // NOTE: The AWS loadbalancer requires that the HOST header always be set, in order for the
414
        // request to route to our k8s cluster. Set this in all cases.
415
        const string header_url = CreateHOSTAddress(req);
550✔
416
        req->SetHeader("HOST", header_url);
550✔
417

418
        log::Trace("Setting HOST address: " + header_url);
275✔
419

420
        header_handler_ = header_handler;
275✔
421
        body_handler_ = body_handler;
275✔
422
        status_ = TransactionStatus::None;
275✔
423

424
        cancelled_ = make_shared<bool>(false);
275✔
425

426
        auto &cancelled = cancelled_;
427

428
        resolver_.async_resolve(
550✔
429
                request_->address_.host,
430
                to_string(request_->address_.port),
550✔
431
                [this, cancelled](
546✔
432
                        const error_code &ec, const asio::ip::tcp::resolver::results_type &results) {
270✔
433
                        if (!*cancelled) {
271✔
434
                                ResolveHandler(ec, results);
270✔
435
                        }
436
                });
271✔
437

438
        return error::NoError;
275✔
439
}
440

441
static inline error::Error AddProxyAuthHeader(OutgoingRequest &req, BrokenDownUrl &proxy_address) {
22✔
442
        if (proxy_address.username == "") {
22✔
443
                // nothing to do
444
                return error::NoError;
19✔
445
        }
446
        auto ex_dec_username = URLDecode(proxy_address.username);
3✔
447
        auto ex_dec_password = URLDecode(proxy_address.password);
3✔
448
        if (!ex_dec_username) {
3✔
449
                return ex_dec_username.error();
×
450
        }
451
        if (!ex_dec_password) {
3✔
452
                return ex_dec_password.error();
×
453
        }
454
        auto creds = ex_dec_username.value() + ":" + ex_dec_password.value();
3✔
455
        auto ex_encoded_creds = crypto::EncodeBase64(common::ByteVectorFromString(creds));
6✔
456
        if (!ex_encoded_creds) {
3✔
457
                return ex_encoded_creds.error();
×
458
        }
459
        req.SetHeader("Proxy-Authorization", "Basic " + ex_encoded_creds.value());
6✔
460

461
        return error::NoError;
3✔
462
}
463

464
error::Error Client::HandleProxySetup() {
279✔
465
        secondary_req_.reset();
279✔
466

467
        if (request_->address_.protocol == "http") {
279✔
468
                socket_mode_ = SocketMode::Plain;
253✔
469

470
                if (http_proxy_ != "" && !HostNameMatchesNoProxy(request_->address_.host, no_proxy_)) {
253✔
471
                        // Make a modified proxy request.
472
                        BrokenDownUrl proxy_address;
20✔
473
                        auto err = BreakDownUrl(http_proxy_, proxy_address, true);
11✔
474
                        if (err != error::NoError) {
11✔
475
                                return err.WithContext("HTTP proxy URL is invalid");
2✔
476
                        }
477
                        if (proxy_address.path != "" && proxy_address.path != "/") {
10✔
478
                                return MakeError(
479
                                        InvalidUrlError, "A URL with a path is not legal for a proxy address");
2✔
480
                        }
481

482
                        request_->address_.path = request_->address_.protocol + "://" + request_->address_.host
18✔
483
                                                                          + ":" + to_string(request_->address_.port)
27✔
484
                                                                          + request_->address_.path;
27✔
485
                        request_->address_.host = proxy_address.host;
9✔
486
                        request_->address_.port = proxy_address.port;
9✔
487
                        request_->address_.protocol = proxy_address.protocol;
9✔
488

489
                        err = AddProxyAuthHeader(*request_, proxy_address);
9✔
490
                        if (err != error::NoError) {
9✔
491
                                return err;
×
492
                        }
493

494
                        if (proxy_address.protocol == "https") {
9✔
495
                                socket_mode_ = SocketMode::Tls;
5✔
496
                        } else if (proxy_address.protocol == "http") {
4✔
497
                                socket_mode_ = SocketMode::Plain;
4✔
498
                        } else {
499
                                // Should never get here.
500
                                assert(false);
501
                        }
502
                }
503
        } else if (request_->address_.protocol == "https") {
26✔
504
                socket_mode_ = SocketMode::Tls;
26✔
505

506
                if (https_proxy_ != "" && !HostNameMatchesNoProxy(request_->address_.host, no_proxy_)) {
26✔
507
                        // Save the original request for later, so that we can make a new request
508
                        // over the channel established by CONNECT.
509
                        secondary_req_ = std::move(request_);
510

511
                        request_ = make_shared<OutgoingRequest>();
30✔
512
                        request_->SetMethod(Method::CONNECT);
15✔
513
                        BrokenDownUrl proxy_address;
28✔
514
                        auto err = BreakDownUrl(https_proxy_, proxy_address, true);
15✔
515
                        if (err != error::NoError) {
15✔
516
                                return err.WithContext("HTTPS proxy URL is invalid");
2✔
517
                        }
518
                        if (proxy_address.path != "" && proxy_address.path != "/") {
14✔
519
                                return MakeError(
520
                                        InvalidUrlError, "A URL with a path is not legal for a proxy address");
2✔
521
                        }
522

523
                        request_->address_.path =
524
                                secondary_req_->address_.host + ":" + to_string(secondary_req_->address_.port);
26✔
525
                        request_->address_.host = proxy_address.host;
13✔
526
                        request_->address_.port = proxy_address.port;
13✔
527
                        request_->address_.protocol = proxy_address.protocol;
13✔
528

529
                        err = AddProxyAuthHeader(*request_, proxy_address);
13✔
530
                        if (err != error::NoError) {
13✔
531
                                return err;
×
532
                        }
533

534
                        if (proxy_address.protocol == "https") {
13✔
535
                                socket_mode_ = SocketMode::Tls;
7✔
536
                        } else if (proxy_address.protocol == "http") {
6✔
537
                                socket_mode_ = SocketMode::Plain;
6✔
538
                        } else {
539
                                // Should never get here.
540
                                assert(false);
541
                        }
542
                }
543
        } else {
544
                // Should never get here
545
                assert(false);
546
        }
547

548
        return error::NoError;
275✔
549
}
550

551
io::ExpectedAsyncReaderPtr Client::MakeBodyAsyncReader(IncomingResponsePtr resp) {
175✔
552
        if (status_ != TransactionStatus::HeaderHandlerCalled) {
175✔
553
                return expected::unexpected(error::Error(
2✔
554
                        make_error_condition(errc::operation_in_progress),
4✔
555
                        "MakeBodyAsyncReader called while reading is in progress"));
6✔
556
        }
557

558
        if (GetContentLength(*response_data_.http_response_parser_) == 0
173✔
559
                && !response_data_.http_response_parser_->chunked()) {
173✔
560
                return expected::unexpected(
17✔
561
                        MakeError(BodyMissingError, "Response does not contain a body"));
51✔
562
        }
563

564
        status_ = TransactionStatus::ReaderCreated;
156✔
565
        return make_shared<BodyAsyncReader<Client>>(resp->client_.GetHttpClient(), resp->cancelled_);
312✔
566
}
567

568
io::ExpectedAsyncReadWriterPtr Client::SwitchProtocol(IncomingResponsePtr req) {
7✔
569
        if (*cancelled_) {
7✔
570
                return expected::unexpected(error::Error(
×
571
                        make_error_condition(errc::not_connected),
×
572
                        "Cannot switch protocols if endpoint is not connected"));
×
573
        }
574

575
        // Rest of the connection is done directly on the socket, we are done here.
576
        status_ = TransactionStatus::Done;
7✔
577
        *cancelled_ = true;
7✔
578
        cancelled_ = make_shared<bool>(false);
14✔
579

580
        auto stream = stream_;
581
        // This no longer belongs to us.
582
        stream_.reset();
7✔
583

584
        switch (socket_mode_) {
7✔
585
        case SocketMode::TlsTls:
×
NEW
586
                return make_shared<RawSocket<ssl::stream<ssl::stream<beast::tcp_stream>>>>(
×
587
                        stream, response_data_.response_buffer_);
×
588
        case SocketMode::Tls:
×
NEW
589
                return make_shared<RawSocket<ssl::stream<beast::tcp_stream>>>(
×
NEW
590
                        make_shared<ssl::stream<beast::tcp_stream>>(std::move(stream->next_layer())),
×
UNCOV
591
                        response_data_.response_buffer_);
×
592
        case SocketMode::Plain:
7✔
593
                return make_shared<RawSocket<beast::tcp_stream>>(
7✔
594
                        make_shared<beast::tcp_stream>(std::move(stream->next_layer().next_layer())),
14✔
595
                        response_data_.response_buffer_);
7✔
596
        }
597

598
        AssertOrReturnUnexpected(false);
×
599
        // This should not happen. It's here to silence compiler warnings.
600
        return expected::unexpected(MakeError(error::ProgrammingError, "Invalid socket mode"));
601
}
602

603
void Client::CallHandler(ResponseHandler handler) {
362✔
604
        // This function exists to make sure we have a copy of the handler we're calling (in the
605
        // argument list). This is important in case the handler owns the client instance through a
606
        // capture, and it replaces the handler with a different one (using `AsyncCall`). If it
607
        // does, then it destroys the final copy of the handler, and therefore also the client,
608
        // which is why we need to make a copy here, before calling it.
609
        handler(response_);
362✔
610
}
362✔
611

612
void Client::CallErrorHandler(
83✔
613
        const error_code &ec, const OutgoingRequestPtr &req, ResponseHandler handler) {
614
        CallErrorHandler(error::Error(ec.default_error_condition(), ""), req, handler);
249✔
615
}
83✔
616

617
void Client::CallErrorHandler(
125✔
618
        const error::Error &err, const OutgoingRequestPtr &req, ResponseHandler handler) {
619
        status_ = TransactionStatus::Done;
125✔
620
        DoCancel();
125✔
621
        handler(expected::unexpected(
250✔
622
                err.WithContext(MethodToString(req->method_) + " " + req->orig_address_)));
500✔
623
}
125✔
624

625
void Client::ResolveHandler(
270✔
626
        const error_code &ec, const asio::ip::tcp::resolver::results_type &results) {
627
        if (ec) {
270✔
628
                CallErrorHandler(ec, request_, header_handler_);
×
629
                return;
×
630
        }
631

632
        if (logger_.Level() >= log::LogLevel::Debug) {
270✔
633
                string ips = "[";
248✔
634
                string sep;
635
                for (auto r : results) {
1,040✔
636
                        ips += sep;
272✔
637
                        ips += r.endpoint().address().to_string();
272✔
638
                        sep = ", ";
272✔
639
                }
640
                ips += "]";
248✔
641
                logger_.Debug("Hostname " + request_->address_.host + " resolved to " + ips);
496✔
642
        }
643

644
        resolver_results_ = results;
645

646
        stream_ = make_shared<ssl::stream<ssl::stream<beast::tcp_stream>>>(
270✔
647
                ssl::stream<beast::tcp_stream>(
270✔
648
                        beast::tcp_stream(GetAsioIoContext(event_loop_)), ssl_ctx_[0]),
540✔
649
                ssl_ctx_[1]);
540✔
650

651
        if (response_data_.response_buffer_) {
270✔
652
                // We can reuse this if preexisting, just make sure we start with a
653
                // clean state (while avoiding shrinking/discarding the buffer, see
654
                // https://www.boost.org/doc/libs/1_70_0/libs/beast/doc/html/beast/ref/boost__beast__basic_flat_buffer/clear.html
655
                // for details).
656
                // Since there should be no leftover bytes from previous responses, we
657
                // log if there are some, but let's not bother all users with a warning,
658
                // there is nothing they could do about it. However, for
659
                // testing/debugging/CI, it can be useful to have this information.
660
                if (response_data_.response_buffer_->size() > 0) {
70✔
661
                        logger_.Debug(
1✔
662
                                "Leftover data from the previous response! ("
663
                                + to_string(response_data_.response_buffer_->size()) + " bytes)");
2✔
664
                }
665
                response_data_.response_buffer_->clear();
666
        } else {
667
                response_data_.response_buffer_ = make_shared<beast::flat_buffer>();
400✔
668

669
                // This is equivalent to:
670
                //   response_data_.response_buffer_.reserve(body_buffer_.size());
671
                // but compatible with Boost 1.67.
672
                response_data_.response_buffer_->prepare(
673
                        body_buffer_.size() - response_data_.response_buffer_->size());
200✔
674
        }
675

676
        auto &cancelled = cancelled_;
677

678
        // Set timeout to 5 minutes to ensure we don't hang during async connect
679
        // `next_layer().next_layer()` accesses the `beast::tcp_stream` from
680
        // `ssl::stream<ssl::stream<beast::tcp_stream>>`
681
        stream_->next_layer().next_layer().expires_after(chrono::minutes(5));
270✔
682

683
        asio::async_connect(
270✔
684
                stream_->lowest_layer(),
685
                resolver_results_,
270✔
686
                [this, cancelled](const error_code &ec, const asio::ip::tcp::endpoint &endpoint) {
540✔
687
                        if (!*cancelled) {
270✔
688
                                switch (socket_mode_) {
270✔
689
                                case SocketMode::TlsTls:
×
690
                                        // Should never happen because we always need to handshake
691
                                        // the innermost Tls first, then the outermost, but the
692
                                        // latter doesn't happen here.
693
                                        assert(false);
694
                                        CallErrorHandler(
×
695
                                                error::MakeError(
×
696
                                                        error::ProgrammingError, "TlsTls mode is invalid in ResolveHandler"),
×
697
                                                request_,
×
698
                                                header_handler_);
×
699
                                case SocketMode::Tls:
21✔
700
                                        return HandshakeHandler(stream_->next_layer(), ec, endpoint);
21✔
701
                                case SocketMode::Plain:
249✔
702
                                        return ConnectHandler(ec, endpoint);
249✔
703
                                }
704
                        }
705
                });
706
}
707

708
template <typename StreamType>
709
void Client::HandshakeHandler(
25✔
710
        StreamType &stream, const error_code &ec, const asio::ip::tcp::endpoint &endpoint) {
711
        if (ec) {
25✔
712
                CallErrorHandler(ec, request_, header_handler_);
2✔
713
                return;
2✔
714
        }
715

716
        // Enable TCP keepalive
717
        boost::asio::socket_base::keep_alive option(true);
718
        stream_->lowest_layer().set_option(option);
23✔
719

720
        // We can't avoid a C style cast on this next line. The usual method by which system headers
721
        // are excluded from warnings doesn't work, because `SSL_set_tlsext_host_name` is a macro,
722
        // containing a cast, which expands here, not in the original file. So just disable the
723
        // warning here.
724
#ifdef __clang__
725
#pragma clang diagnostic push
726
#pragma clang diagnostic ignored "-Wold-style-cast"
727
#else
728
#pragma GCC diagnostic push
729
#pragma GCC diagnostic ignored "-Wold-style-cast"
730
#endif
731
        // Set SNI Hostname (many hosts need this to handshake successfully)
732
        if (!SSL_set_tlsext_host_name(stream.native_handle(), request_->address_.host.c_str())) {
23✔
733
#ifdef __clang__
734
#pragma clang diagnostic pop
735
#else
736
#pragma GCC diagnostic pop
737
#endif
738
                beast::error_code ec2 {
×
739
                        static_cast<int>(::ERR_get_error()), asio::error::get_ssl_category()};
×
740
                logger_.Error("Failed to set SNI host name: " + ec2.message());
×
741
        }
742

743
        // Enable host name verification (not done automatically and we don't have
744
        // enough access to the TLS internals to use X509_VERIFY_PARAM_set1_host(),
745
        // hence the callback that boost provides).
746
        boost::system::error_code b_ec;
23✔
747
        stream.set_verify_callback(ssl::host_name_verification(request_->address_.host), b_ec);
46✔
748
        if (b_ec) {
23✔
749
                logger_.Error("Failed to enable host name verification: " + b_ec.message());
×
750
                CallErrorHandler(b_ec, request_, header_handler_);
×
751
                return;
×
752
        }
753

754
        auto &cancelled = cancelled_;
755

756
        stream.async_handshake(
46✔
757
                ssl::stream_base::client, [this, cancelled, endpoint](const error_code &ec) {
23✔
758
                        if (*cancelled) {
26✔
759
                                return;
760
                        }
761
                        if (ec) {
26✔
762
                                logger_.Error("https: Failed to perform the SSL handshake: " + ec.message());
20✔
763
                                CallErrorHandler(ec, request_, header_handler_);
10✔
764
                                return;
10✔
765
                        }
766
                        logger_.Debug("https: Successful SSL handshake");
32✔
767
                        ConnectHandler(ec, endpoint);
16✔
768
                });
769
}
770

771

772
void Client::ConnectHandler(const error_code &ec, const asio::ip::tcp::endpoint &endpoint) {
265✔
773
        if (ec) {
265✔
774
                CallErrorHandler(ec, request_, header_handler_);
16✔
775
                return;
16✔
776
        }
777

778
        // Enable TCP keepalive
779
        boost::asio::socket_base::keep_alive option(true);
780
        stream_->lowest_layer().set_option(option);
249✔
781

782
        logger_.Debug("Connected to " + endpoint.address().to_string());
498✔
783

784
        request_data_.http_request_ = make_shared<http::request<http::buffer_body>>(
249✔
785
                MethodToBeastVerb(request_->method_), request_->address_.path, BeastHttpVersion);
498✔
786

787
        for (const auto &header : request_->headers_) {
652✔
788
                request_data_.http_request_->set(header.first, header.second);
403✔
789
        }
790

791
        request_data_.http_request_serializer_ =
792
                make_shared<http::request_serializer<http::buffer_body>>(*request_data_.http_request_);
249✔
793

794
        response_data_.http_response_parser_ = make_shared<http::response_parser<http::buffer_body>>();
498✔
795

796
        // Don't enforce limits. Since we stream everything, limits don't generally apply, and
797
        // if they do, they should be handled higher up in the application logic.
798
        //
799
        // Note: There is a bug in Beast here (tested on 1.74): One is supposed to be able to
800
        // pass an uninitialized `optional` to mean unlimited, but they do not check for
801
        // `has_value()` in their code, causing their subsequent comparison operation to
802
        // misbehave. So pass highest possible value instead.
803
        response_data_.http_response_parser_->body_limit(numeric_limits<uint64_t>::max());
804

805
        auto &cancelled = cancelled_;
806
        auto &request_data = request_data_;
249✔
807

808
        auto handler = [this, cancelled, request_data](const error_code &ec, size_t num_written) {
249✔
809
                if (!*cancelled) {
249✔
810
                        WriteHeaderHandler(ec, num_written);
249✔
811
                }
812
        };
498✔
813

814
        // Set timeout to 5 minutes to ensure we don't hang during async write
815
        // `next_layer().next_layer()` accesses the `beast::tcp_stream` from
816
        // `ssl::stream<ssl::stream<beast::tcp_stream>>`
817
        stream_->next_layer().next_layer().expires_after(chrono::minutes(5));
249✔
818

819
        switch (socket_mode_) {
249✔
820
        case SocketMode::TlsTls:
2✔
821
                http::async_write_header(*stream_, *request_data_.http_request_serializer_, handler);
2✔
822
                break;
823
        case SocketMode::Tls:
14✔
824
                http::async_write_header(
14✔
825
                        stream_->next_layer(), *request_data_.http_request_serializer_, handler);
826
                break;
827
        case SocketMode::Plain:
233✔
828
                http::async_write_header(
233✔
829
                        stream_->next_layer().next_layer(), *request_data_.http_request_serializer_, handler);
830
                break;
831
        }
832
}
833

834
void Client::WriteHeaderHandler(const error_code &ec, size_t num_written) {
249✔
835
        if (num_written > 0) {
249✔
836
                logger_.Trace("Wrote " + to_string(num_written) + " bytes of header data to stream.");
498✔
837
        }
838

839
        if (ec) {
249✔
840
                CallErrorHandler(ec, request_, header_handler_);
×
841
                return;
209✔
842
        }
843

844
        auto exp_has_body =
845
                HasBody(request_->GetHeader("Content-Length"), request_->GetHeader("Transfer-Encoding"));
498✔
846
        if (!exp_has_body) {
249✔
847
                CallErrorHandler(exp_has_body.error(), request_, header_handler_);
×
848
                return;
×
849
        }
850
        if (!exp_has_body.value()) {
249✔
851
                ReadHeader();
208✔
852
                return;
853
        }
854

855
        if (!request_->body_gen_ && !request_->async_body_gen_) {
41✔
856
                auto err = MakeError(BodyMissingError, "No body generator");
2✔
857
                CallErrorHandler(err, request_, header_handler_);
2✔
858
                return;
859
        }
860

861
        assert(!(request_->body_gen_ && request_->async_body_gen_));
862

863
        if (request_->body_gen_) {
40✔
864
                auto body_reader = request_->body_gen_();
34✔
865
                if (!body_reader) {
34✔
866
                        CallErrorHandler(body_reader.error(), request_, header_handler_);
×
867
                        return;
868
                }
869
                request_->body_reader_ = body_reader.value();
34✔
870
        } else {
871
                auto body_reader = request_->async_body_gen_();
6✔
872
                if (!body_reader) {
6✔
873
                        CallErrorHandler(body_reader.error(), request_, header_handler_);
×
874
                        return;
875
                }
876
                request_->async_body_reader_ = body_reader.value();
6✔
877
        }
878

879
        PrepareAndWriteNewBodyBuffer();
40✔
880
}
881

882
void Client::WriteBodyHandler(const error_code &ec, size_t num_written) {
2,278✔
883
        if (num_written > 0) {
2,278✔
884
                logger_.Trace("Wrote " + to_string(num_written) + " bytes of body data to stream.");
2,242✔
885
        }
886

887
        if (ec == http::make_error_code(http::error::need_buffer)) {
2,278✔
888
                // Write next block of the body.
889
                PrepareAndWriteNewBodyBuffer();
1,120✔
890
        } else if (ec) {
1,158✔
891
                CallErrorHandler(ec, request_, header_handler_);
8✔
892
        } else if (num_written > 0) {
1,154✔
893
                // We are still writing the body.
894
                WriteBody();
1,121✔
895
        } else {
896
                // We are ready to receive the response.
897
                ReadHeader();
33✔
898
        }
899
}
2,278✔
900

901
void Client::PrepareAndWriteNewBodyBuffer() {
1,160✔
902
        // request_->body_reader_ XOR request_->async_body_reader_
903
        assert(
904
                (request_->body_reader_ || request_->async_body_reader_)
905
                && !(request_->body_reader_ && request_->async_body_reader_));
906

907
        auto cancelled = cancelled_;
908
        auto read_handler = [this, cancelled](io::ExpectedSize read) {
3,592✔
909
                if (!*cancelled) {
1,160✔
910
                        if (!read) {
1,159✔
911
                                CallErrorHandler(read.error(), request_, header_handler_);
2✔
912
                                return;
2✔
913
                        }
914
                        WriteNewBodyBuffer(read.value());
1,157✔
915
                }
916
        };
1,160✔
917

918

919
        if (request_->body_reader_) {
1,160✔
920
                read_handler(request_->body_reader_->Read(body_buffer_.begin(), body_buffer_.end()));
1,470✔
921
        } else {
922
                auto err = request_->async_body_reader_->AsyncRead(
923
                        body_buffer_.begin(), body_buffer_.end(), read_handler);
850✔
924
                if (err != error::NoError) {
425✔
925
                        CallErrorHandler(err, request_, header_handler_);
×
926
                }
927
        }
928
}
1,160✔
929

930
void Client::WriteNewBodyBuffer(size_t size) {
1,157✔
931
        request_data_.http_request_->body().data = body_buffer_.data();
1,157✔
932
        request_data_.http_request_->body().size = size;
1,157✔
933

934
        if (size > 0) {
1,157✔
935
                request_data_.http_request_->body().more = true;
1,124✔
936
        } else {
937
                // Release ownership of Body reader.
938
                request_->body_reader_.reset();
33✔
939
                request_->async_body_reader_.reset();
33✔
940
                request_data_.http_request_->body().more = false;
33✔
941
        }
942

943
        WriteBody();
1,157✔
944
}
1,157✔
945

946
void Client::WriteBody() {
2,278✔
947
        auto &cancelled = cancelled_;
948
        auto &request_data = request_data_;
2,278✔
949

950
        auto handler = [this, cancelled, request_data](const error_code &ec, size_t num_written) {
2,278✔
951
                if (!*cancelled) {
2,278✔
952
                        WriteBodyHandler(ec, num_written);
2,278✔
953
                }
954
        };
4,556✔
955

956
        // Set timeout to 5 minutes to ensure we don't hang during async write
957
        // `next_layer().next_layer()` accesses the `beast::tcp_stream` from
958
        // `ssl::stream<ssl::stream<beast::tcp_stream>>`
959
        stream_->next_layer().next_layer().expires_after(chrono::minutes(5));
2,278✔
960

961
        switch (socket_mode_) {
2,278✔
962
        case SocketMode::TlsTls:
×
963
                http::async_write_some(*stream_, *request_data_.http_request_serializer_, handler);
964
                break;
965
        case SocketMode::Tls:
×
966
                http::async_write_some(
967
                        stream_->next_layer(), *request_data_.http_request_serializer_, handler);
968
                break;
969
        case SocketMode::Plain:
2,278✔
970
                http::async_write_some(
971
                        stream_->next_layer().next_layer(), *request_data_.http_request_serializer_, handler);
972
                break;
973
        }
974
}
2,278✔
975

976
void Client::ReadHeader() {
241✔
977
        auto &cancelled = cancelled_;
978
        auto &response_data = response_data_;
241✔
979

980
        auto handler = [this, cancelled, response_data](const error_code &ec, size_t num_read) {
238✔
981
                if (!*cancelled) {
238✔
982
                        ReadHeaderHandler(ec, num_read);
238✔
983
                }
984
        };
482✔
985

986
        // Set timeout to 5 minutes to ensure we don't hang during async read
987
        // `next_layer().next_layer()` accesses the `beast::tcp_stream` from
988
        // `ssl::stream<ssl::stream<beast::tcp_stream>>`
989
        stream_->next_layer().next_layer().expires_after(chrono::minutes(5));
241✔
990

991
        switch (socket_mode_) {
241✔
992
        case SocketMode::TlsTls:
2✔
993
                http::async_read_some(
2✔
994
                        *stream_,
995
                        *response_data_.response_buffer_,
996
                        *response_data_.http_response_parser_,
997
                        handler);
998
                break;
999
        case SocketMode::Tls:
14✔
1000
                http::async_read_some(
14✔
1001
                        stream_->next_layer(),
1002
                        *response_data_.response_buffer_,
1003
                        *response_data_.http_response_parser_,
1004
                        handler);
1005
                break;
1006
        case SocketMode::Plain:
225✔
1007
                http::async_read_some(
225✔
1008
                        stream_->next_layer().next_layer(),
1009
                        *response_data_.response_buffer_,
1010
                        *response_data_.http_response_parser_,
1011
                        handler);
1012
                break;
1013
        }
1014
}
241✔
1015

1016
void Client::ReadHeaderHandler(const error_code &ec, size_t num_read) {
238✔
1017
        if (num_read > 0) {
238✔
1018
                logger_.Trace("Read " + to_string(num_read) + " bytes of header data from stream.");
466✔
1019
        }
1020

1021
        if (ec) {
238✔
1022
                CallErrorHandler(ec, request_, header_handler_);
5✔
1023
                return;
65✔
1024
        }
1025

1026
        if (!response_data_.http_response_parser_->is_header_done()) {
233✔
1027
                ReadHeader();
×
1028
                return;
×
1029
        }
1030

1031
        if (secondary_req_) {
233✔
1032
                HandleSecondaryRequest();
9✔
1033
                return;
9✔
1034
        }
1035

1036
        response_.reset(new IncomingResponse(*this, cancelled_));
448✔
1037
        response_->status_code_ = response_data_.http_response_parser_->get().result_int();
224✔
1038
        response_->status_message_ = string {response_data_.http_response_parser_->get().reason()};
224✔
1039

1040
        logger_.Debug(
448✔
1041
                "Received response: " + to_string(response_->status_code_) + " "
448✔
1042
                + response_->status_message_);
672✔
1043

1044
        string debug_str;
1045
        for (auto header = response_data_.http_response_parser_->get().cbegin();
258✔
1046
                 header != response_data_.http_response_parser_->get().cend();
482✔
1047
                 header++) {
1048
                response_->headers_[string {header->name_string()}] = string {header->value()};
774✔
1049
                if (logger_.Level() >= log::LogLevel::Debug) {
258✔
1050
                        debug_str += string {header->name_string()};
243✔
1051
                        debug_str += ": ";
243✔
1052
                        debug_str += string {header->value()};
243✔
1053
                        debug_str += "\n";
243✔
1054
                }
1055
        }
1056

1057
        logger_.Debug("Received headers:\n" + debug_str);
448✔
1058
        debug_str.clear();
1059

1060
        if (GetContentLength(*response_data_.http_response_parser_) == 0
224✔
1061
                && !response_data_.http_response_parser_->chunked()) {
224✔
1062
                auto cancelled = cancelled_;
1063
                status_ = TransactionStatus::HeaderHandlerCalled;
48✔
1064
                CallHandler(header_handler_);
96✔
1065
                if (!*cancelled) {
48✔
1066
                        status_ = TransactionStatus::Done;
43✔
1067
                        if (response_->status_code_ != StatusCode::StatusSwitchingProtocols) {
43✔
1068
                                // Make an exception for 101 Switching Protocols response, where the TCP connection
1069
                                // is meant to be reused.
1070
                                DoCancel();
39✔
1071
                        }
1072
                        CallHandler(body_handler_);
86✔
1073
                }
1074
                return;
1075
        }
1076

1077
        auto cancelled = cancelled_;
1078
        status_ = TransactionStatus::HeaderHandlerCalled;
176✔
1079
        CallHandler(header_handler_);
352✔
1080
        if (*cancelled) {
176✔
1081
                return;
1082
        }
1083

1084
        // We know that a body reader is required here, because of the check for body above.
1085
        if (status_ == TransactionStatus::HeaderHandlerCalled) {
173✔
1086
                CallErrorHandler(MakeError(BodyIgnoredError, ""), request_, body_handler_);
36✔
1087
        }
1088
}
1089

1090
void Client::HandleSecondaryRequest() {
9✔
1091
        logger_.Debug(
18✔
1092
                "Received proxy response: "
1093
                + to_string(response_data_.http_response_parser_->get().result_int()) + " "
18✔
1094
                + string {response_data_.http_response_parser_->get().reason()});
36✔
1095

1096
        request_ = std::move(secondary_req_);
1097

1098
        if (response_data_.http_response_parser_->get().result_int() != StatusOK) {
9✔
1099
                auto err = MakeError(
1100
                        ProxyError,
1101
                        "Proxy returned unexpected response: "
1102
                                + to_string(response_data_.http_response_parser_->get().result_int()) + " "
4✔
1103
                                + string {response_data_.http_response_parser_->get().reason()});
6✔
1104
                CallErrorHandler(err, request_, header_handler_);
4✔
1105
                return;
1106
        }
1107

1108
        if (GetContentLength(*response_data_.http_response_parser_) != 0
7✔
1109
                || response_data_.http_response_parser_->chunked()) {
7✔
1110
                auto err = MakeError(ProxyError, "Body not allowed in proxy response");
×
1111
                CallErrorHandler(err, request_, header_handler_);
×
1112
                return;
1113
        }
1114

1115
        // We are connected. Now repeat the request cycle with the original request. Pretend
1116
        // we were just connected.
1117

1118
        assert(request_->GetProtocol() == "https");
1119

1120
        // Make sure that no data is "lost" inside the buffering mechanism, since when switching to
1121
        // a different layer, this will get out of sync.
1122
        assert(response_data_.response_buffer_->size() == 0);
1123

1124
        switch (socket_mode_) {
7✔
1125
        case SocketMode::TlsTls:
×
1126
                // Should never get here, because this is the only place where TlsTls mode
1127
                // is supposed to be turned on.
1128
                assert(false);
1129
                CallErrorHandler(
×
1130
                        error::MakeError(
×
1131
                                error::ProgrammingError,
1132
                                "Any other mode than Tls is not valid when handling secondary request"),
×
1133
                        request_,
×
1134
                        header_handler_);
×
1135
                break;
×
1136
        case SocketMode::Tls:
3✔
1137
                // Upgrade to TLS inside TLS.
1138
                socket_mode_ = SocketMode::TlsTls;
3✔
1139
                HandshakeHandler(*stream_, error_code {}, stream_->lowest_layer().remote_endpoint());
3✔
1140
                break;
3✔
1141
        case SocketMode::Plain:
4✔
1142
                // Upgrade to TLS.
1143
                socket_mode_ = SocketMode::Tls;
4✔
1144
                HandshakeHandler(
4✔
1145
                        stream_->next_layer(), error_code {}, stream_->lowest_layer().remote_endpoint());
4✔
1146
                break;
4✔
1147
        }
1148
}
1149

1150
void Client::AsyncReadNextBodyPart(
4,666✔
1151
        vector<uint8_t>::iterator start, vector<uint8_t>::iterator end, io::AsyncIoHandler handler) {
1152
        assert(AtLeast(status_, TransactionStatus::ReaderCreated));
1153

1154
        if (status_ == TransactionStatus::ReaderCreated) {
4,666✔
1155
                status_ = TransactionStatus::BodyReadingInProgress;
154✔
1156
        }
1157

1158
        if (AtLeast(status_, TransactionStatus::BodyReadingFinished)) {
4,666✔
1159
                auto cancelled = cancelled_;
1160
                handler(0);
190✔
1161
                if (!*cancelled && status_ == TransactionStatus::BodyReadingFinished) {
95✔
1162
                        status_ = TransactionStatus::Done;
95✔
1163
                        DoCancel();
95✔
1164
                        CallHandler(body_handler_);
190✔
1165
                }
1166
                return;
1167
        }
1168

1169
        reader_buf_start_ = start;
4,571✔
1170
        reader_buf_end_ = end;
4,571✔
1171
        reader_handler_ = handler;
4,571✔
1172
        size_t read_size = end - start;
4,571✔
1173
        size_t smallest = min(body_buffer_.size(), read_size);
6,684✔
1174

1175
        response_data_.http_response_parser_->get().body().data = body_buffer_.data();
4,571✔
1176
        response_data_.http_response_parser_->get().body().size = smallest;
4,571✔
1177
        response_data_.last_buffer_size_ = smallest;
4,571✔
1178

1179
        auto &cancelled = cancelled_;
1180
        auto &response_data = response_data_;
4,571✔
1181

1182
        // Set timeout to 5 minutes to ensure we don't hang during async read
1183
        // `next_layer().next_layer()` accesses the `beast::tcp_stream` from
1184
        // `ssl::stream<ssl::stream<beast::tcp_stream>>`
1185
        stream_->next_layer().next_layer().expires_after(chrono::minutes(5));
4,571✔
1186

1187
        auto async_handler = [this, cancelled, response_data](const error_code &ec, size_t num_read) {
4,570✔
1188
                if (!*cancelled) {
4,570✔
1189
                        ReadBodyHandler(ec, num_read);
4,570✔
1190
                }
1191
        };
9,142✔
1192

1193
        switch (socket_mode_) {
4,571✔
1194
        case SocketMode::TlsTls:
2✔
1195
                http::async_read_some(
2✔
1196
                        *stream_,
1197
                        *response_data_.response_buffer_,
1198
                        *response_data_.http_response_parser_,
1199
                        async_handler);
1200
                break;
1201
        case SocketMode::Tls:
4✔
1202
                http::async_read_some(
4✔
1203
                        stream_->next_layer(),
1204
                        *response_data_.response_buffer_,
1205
                        *response_data_.http_response_parser_,
1206
                        async_handler);
1207
                break;
1208
        case SocketMode::Plain:
4,565✔
1209
                http::async_read_some(
4,565✔
1210
                        stream_->next_layer().next_layer(),
1211
                        *response_data_.response_buffer_,
1212
                        *response_data_.http_response_parser_,
1213
                        async_handler);
1214
                break;
1215
        }
1216
}
1217

1218
void Client::ReadBodyHandler(error_code ec, size_t num_read) {
4,570✔
1219
        if (num_read > 0) {
4,570✔
1220
                logger_.Trace("Read " + to_string(num_read) + " bytes of body data from stream.");
9,040✔
1221
        }
1222

1223
        if (ec == http::make_error_code(http::error::need_buffer)) {
4,570✔
1224
                // This can be ignored. We always reset the buffer between reads anyway.
1225
                ec = error_code();
1,958✔
1226
        }
1227

1228
        assert(reader_handler_);
1229

1230
        if (response_data_.http_response_parser_->is_done()) {
4,570✔
1231
                status_ = TransactionStatus::BodyReadingFinished;
101✔
1232
        }
1233

1234
        auto cancelled = cancelled_;
1235

1236
        if (ec) {
4,570✔
1237
                auto err = error::Error(ec.default_error_condition(), "Could not read body");
100✔
1238
                reader_handler_(expected::unexpected(err));
150✔
1239
                if (!*cancelled) {
50✔
1240
                        CallErrorHandler(ec, request_, body_handler_);
92✔
1241
                }
1242
                return;
1243
        }
1244

1245
        // The num_read from above includes out of band payload data, such as chunk headers, which
1246
        // we are not interested in. So we need to calculate the payload size from the remaining
1247
        // buffer space.
1248
        size_t payload_read =
1249
                response_data_.last_buffer_size_ - response_data_.http_response_parser_->get().body().size;
4,520✔
1250

1251
        size_t buf_size = reader_buf_end_ - reader_buf_start_;
4,520✔
1252
        size_t smallest = min(payload_read, buf_size);
4,520✔
1253

1254
        if (smallest == 0) {
4,520✔
1255
                // We read nothing, which can happen if all we read was a chunk header. We cannot
1256
                // return 0 to the handler however, because in `io::Reader` context this means
1257
                // EOF. So just repeat the request instead, until we get actual payload data.
1258
                AsyncReadNextBodyPart(reader_buf_start_, reader_buf_end_, reader_handler_);
462✔
1259
        } else {
1260
                copy_n(body_buffer_.begin(), smallest, reader_buf_start_);
4,289✔
1261
                reader_handler_(smallest);
8,578✔
1262
        }
1263
}
1264

1265
void Client::Cancel() {
205✔
1266
        auto cancelled = cancelled_;
1267

1268
        if (!*cancelled) {
205✔
1269
                auto err =
1270
                        error::Error(make_error_condition(errc::operation_canceled), "HTTP request cancelled");
40✔
1271
                switch (status_) {
20✔
1272
                case TransactionStatus::None:
3✔
1273
                        CallErrorHandler(err, request_, header_handler_);
3✔
1274
                        break;
3✔
1275
                case TransactionStatus::HeaderHandlerCalled:
16✔
1276
                case TransactionStatus::ReaderCreated:
1277
                case TransactionStatus::BodyReadingInProgress:
1278
                case TransactionStatus::BodyReadingFinished:
1279
                        CallErrorHandler(err, request_, body_handler_);
16✔
1280
                        break;
16✔
1281
                case TransactionStatus::Replying:
1282
                case TransactionStatus::SwitchingProtocol:
1283
                        // Not used by client.
1284
                        assert(false);
1285
                        break;
1286
                case TransactionStatus::BodyHandlerCalled:
1287
                case TransactionStatus::Done:
1288
                        break;
1289
                }
1290
        }
1291

1292
        if (!*cancelled) {
205✔
1293
                DoCancel();
1✔
1294
        }
1295
}
205✔
1296

1297
void Client::DoCancel() {
618✔
1298
        resolver_.cancel();
618✔
1299
        if (stream_) {
618✔
1300
                beast::error_code ec;
263✔
1301
                stream_->lowest_layer().cancel(ec);
263✔
1302
                stream_->lowest_layer().close(ec);
263✔
1303
                stream_.reset();
263✔
1304
        }
1305

1306
        // Reset logger to no connection.
1307
        logger_ = log::Logger(logger_name_);
618✔
1308

1309
        // Set cancel state and then make a new one. Those who are interested should have their own
1310
        // pointer to the old one.
1311
        *cancelled_ = true;
618✔
1312
        cancelled_ = make_shared<bool>(true);
618✔
1313
}
618✔
1314

1315
Stream::Stream(Server &server) :
447✔
1316
        server_ {server},
1317
        logger_ {"http"},
1318
        cancelled_(make_shared<bool>(true)),
447✔
1319
        socket_(server_.GetAsioIoContext(server_.event_loop_)),
447✔
1320
        body_buffer_(HTTP_BEAST_BUFFER_SIZE) {
1,341✔
1321
        request_data_.request_buffer_ = make_shared<beast::flat_buffer>();
894✔
1322

1323
        // This is equivalent to:
1324
        //   request_data_.request_buffer_.reserve(body_buffer_.size());
1325
        // but compatible with Boost 1.67.
1326
        request_data_.request_buffer_->prepare(
1327
                body_buffer_.size() - request_data_.request_buffer_->size());
447✔
1328

1329
        request_data_.http_request_parser_ = make_shared<http::request_parser<http::buffer_body>>();
894✔
1330

1331
        // Don't enforce limits. Since we stream everything, limits don't generally apply, and if
1332
        // they do, they should be handled higher up in the application logic.
1333
        //
1334
        // Note: There is a bug in Beast here (tested on 1.74): One is supposed to be able to pass
1335
        // an uninitialized `optional` to mean unlimited, but they do not check for `has_value()` in
1336
        // their code, causing their subsequent comparison operation to misbehave. So pass highest
1337
        // possible value instead.
1338
        request_data_.http_request_parser_->body_limit(numeric_limits<uint64_t>::max());
1339
}
447✔
1340

1341
Stream::~Stream() {
1,341✔
1342
        DoCancel();
447✔
1343
}
447✔
1344

1345
void Stream::Cancel() {
7✔
1346
        auto cancelled = cancelled_;
1347

1348
        if (!*cancelled) {
7✔
1349
                auto err =
1350
                        error::Error(make_error_condition(errc::operation_canceled), "HTTP response cancelled");
14✔
1351
                switch (status_) {
7✔
1352
                case TransactionStatus::None:
×
1353
                        CallErrorHandler(err, request_, server_.header_handler_);
×
1354
                        break;
×
1355
                case TransactionStatus::HeaderHandlerCalled:
5✔
1356
                case TransactionStatus::ReaderCreated:
1357
                case TransactionStatus::BodyReadingInProgress:
1358
                case TransactionStatus::BodyReadingFinished:
1359
                        CallErrorHandler(err, request_, server_.body_handler_);
5✔
1360
                        break;
5✔
1361
                case TransactionStatus::BodyHandlerCalled:
×
1362
                        // In between body handler and reply finished. No one to handle the status
1363
                        // here.
1364
                        server_.RemoveStream(shared_from_this());
×
1365
                        break;
×
1366
                case TransactionStatus::Replying:
1✔
1367
                        CallErrorHandler(err, request_, reply_finished_handler_);
3✔
1368
                        break;
1✔
1369
                case TransactionStatus::SwitchingProtocol:
1✔
1370
                        CallErrorHandler(err, request_, switch_protocol_handler_);
3✔
1371
                        break;
1✔
1372
                case TransactionStatus::Done:
1373
                        break;
1374
                }
1375
        }
1376

1377
        if (!*cancelled) {
7✔
1378
                DoCancel();
×
1379
        }
1380
}
7✔
1381

1382
void Stream::DoCancel() {
809✔
1383
        if (socket_.is_open()) {
809✔
1384
                socket_.cancel();
220✔
1385
                socket_.close();
220✔
1386
        }
1387

1388
        // Set cancel state and then make a new one. Those who are interested should have their own
1389
        // pointer to the old one.
1390
        *cancelled_ = true;
809✔
1391
        cancelled_ = make_shared<bool>(true);
809✔
1392
}
809✔
1393

1394
void Stream::CallErrorHandler(const error_code &ec, const RequestPtr &req, RequestHandler handler) {
×
1395
        CallErrorHandler(error::Error(ec.default_error_condition(), ""), req, handler);
×
1396
}
×
1397

1398
void Stream::CallErrorHandler(
×
1399
        const error::Error &err, const RequestPtr &req, RequestHandler handler) {
1400
        status_ = TransactionStatus::Done;
×
1401
        DoCancel();
×
1402
        handler(expected::unexpected(err.WithContext(
×
1403
                req->address_.host + ": " + MethodToString(req->method_) + " " + request_->GetPath())));
×
1404

1405
        server_.RemoveStream(shared_from_this());
×
1406
}
×
1407

1408
void Stream::CallErrorHandler(
2✔
1409
        const error_code &ec, const IncomingRequestPtr &req, IdentifiedRequestHandler handler) {
1410
        CallErrorHandler(error::Error(ec.default_error_condition(), ""), req, handler);
6✔
1411
}
2✔
1412

1413
void Stream::CallErrorHandler(
8✔
1414
        const error::Error &err, const IncomingRequestPtr &req, IdentifiedRequestHandler handler) {
1415
        status_ = TransactionStatus::Done;
8✔
1416
        DoCancel();
8✔
1417
        handler(
8✔
1418
                req,
1419
                err.WithContext(
8✔
1420
                        req->address_.host + ": " + MethodToString(req->method_) + " " + request_->GetPath()));
24✔
1421

1422
        server_.RemoveStream(shared_from_this());
8✔
1423
}
8✔
1424

1425
void Stream::CallErrorHandler(
4✔
1426
        const error_code &ec, const RequestPtr &req, ReplyFinishedHandler handler) {
1427
        CallErrorHandler(error::Error(ec.default_error_condition(), ""), req, handler);
12✔
1428
}
4✔
1429

1430
void Stream::CallErrorHandler(
7✔
1431
        const error::Error &err, const RequestPtr &req, ReplyFinishedHandler handler) {
1432
        status_ = TransactionStatus::Done;
7✔
1433
        DoCancel();
7✔
1434
        handler(err.WithContext(
14✔
1435
                req->address_.host + ": " + MethodToString(req->method_) + " " + request_->GetPath()));
14✔
1436

1437
        server_.RemoveStream(shared_from_this());
7✔
1438
}
7✔
1439

1440
void Stream::CallErrorHandler(
×
1441
        const error_code &ec, const RequestPtr &req, SwitchProtocolHandler handler) {
1442
        CallErrorHandler(error::Error(ec.default_error_condition(), ""), req, handler);
×
1443
}
×
1444

1445
void Stream::CallErrorHandler(
1✔
1446
        const error::Error &err, const RequestPtr &req, SwitchProtocolHandler handler) {
1447
        status_ = TransactionStatus::Done;
1✔
1448
        DoCancel();
1✔
1449
        handler(expected::unexpected(err.WithContext(
2✔
1450
                req->address_.host + ": " + MethodToString(req->method_) + " " + request_->GetPath())));
4✔
1451

1452
        server_.RemoveStream(shared_from_this());
1✔
1453
}
1✔
1454

1455
void Stream::AcceptHandler(const error_code &ec) {
228✔
1456
        if (ec) {
228✔
1457
                log::Error("Error while accepting HTTP connection: " + ec.message());
×
1458
                return;
×
1459
        }
1460

1461
        auto ip = socket_.remote_endpoint().address().to_string();
456✔
1462

1463
        // Use IP as context for logging.
1464
        logger_ = log::Logger("http_server").WithFields(log::LogField("ip", ip));
228✔
1465

1466
        logger_.Debug("Accepted connection.");
456✔
1467

1468
        request_.reset(new IncomingRequest(*this, cancelled_));
456✔
1469

1470
        request_->address_.host = ip;
228✔
1471

1472
        *cancelled_ = false;
228✔
1473

1474
        ReadHeader();
228✔
1475
}
1476

1477
void Stream::ReadHeader() {
228✔
1478
        auto &cancelled = cancelled_;
1479
        auto &request_data = request_data_;
228✔
1480

1481
        http::async_read_some(
456✔
1482
                socket_,
228✔
1483
                *request_data_.request_buffer_,
1484
                *request_data_.http_request_parser_,
1485
                [this, cancelled, request_data](const error_code &ec, size_t num_read) {
228✔
1486
                        if (!*cancelled) {
228✔
1487
                                ReadHeaderHandler(ec, num_read);
228✔
1488
                        }
1489
                });
228✔
1490
}
228✔
1491

1492
void Stream::ReadHeaderHandler(const error_code &ec, size_t num_read) {
228✔
1493
        if (num_read > 0) {
228✔
1494
                logger_.Trace("Read " + to_string(num_read) + " bytes of header data from stream.");
456✔
1495
        }
1496

1497
        if (ec) {
228✔
1498
                CallErrorHandler(ec, request_, server_.header_handler_);
×
1499
                return;
188✔
1500
        }
1501

1502
        if (!request_data_.http_request_parser_->is_header_done()) {
228✔
1503
                ReadHeader();
×
1504
                return;
×
1505
        }
1506

1507
        auto method_result = BeastVerbToMethod(
1508
                request_data_.http_request_parser_->get().base().method(),
1509
                string {request_data_.http_request_parser_->get().base().method_string()});
456✔
1510
        if (!method_result) {
228✔
1511
                CallErrorHandler(method_result.error(), request_, server_.header_handler_);
×
1512
                return;
×
1513
        }
1514
        request_->method_ = method_result.value();
228✔
1515
        request_->address_.path = string(request_data_.http_request_parser_->get().base().target());
228✔
1516

1517
        logger_ = logger_.WithFields(log::LogField("path", request_->address_.path));
228✔
1518

1519
        string debug_str;
1520
        for (auto header = request_data_.http_request_parser_->get().cbegin();
394✔
1521
                 header != request_data_.http_request_parser_->get().cend();
622✔
1522
                 header++) {
1523
                request_->headers_[string {header->name_string()}] = string {header->value()};
1,182✔
1524
                if (logger_.Level() >= log::LogLevel::Debug) {
394✔
1525
                        debug_str += string {header->name_string()};
329✔
1526
                        debug_str += ": ";
329✔
1527
                        debug_str += string {header->value()};
329✔
1528
                        debug_str += "\n";
329✔
1529
                }
1530
        }
1531

1532
        logger_.Debug("Received headers:\n" + debug_str);
456✔
1533
        debug_str.clear();
1534

1535
        if (GetContentLength(*request_data_.http_request_parser_) == 0
228✔
1536
                && !request_data_.http_request_parser_->chunked()) {
228✔
1537
                auto cancelled = cancelled_;
1538
                status_ = TransactionStatus::HeaderHandlerCalled;
187✔
1539
                server_.header_handler_(request_);
374✔
1540
                if (!*cancelled) {
187✔
1541
                        status_ = TransactionStatus::BodyHandlerCalled;
187✔
1542
                        CallBodyHandler();
187✔
1543
                }
1544
                return;
1545
        }
1546

1547
        assert(!request_data_.http_request_parser_->is_done());
1548

1549
        auto cancelled = cancelled_;
1550
        status_ = TransactionStatus::HeaderHandlerCalled;
41✔
1551
        server_.header_handler_(request_);
82✔
1552
        if (*cancelled) {
41✔
1553
                return;
1554
        }
1555

1556
        // We know that a body reader is required here, because of the check for body above.
1557
        if (status_ == TransactionStatus::HeaderHandlerCalled) {
40✔
1558
                CallErrorHandler(MakeError(BodyIgnoredError, ""), request_, server_.body_handler_);
2✔
1559
        }
1560
}
1561

1562
void Stream::AsyncReadNextBodyPart(
2,264✔
1563
        vector<uint8_t>::iterator start, vector<uint8_t>::iterator end, io::AsyncIoHandler handler) {
1564
        assert(AtLeast(status_, TransactionStatus::ReaderCreated));
1565

1566
        if (status_ == TransactionStatus::ReaderCreated) {
2,264✔
1567
                status_ = TransactionStatus::BodyReadingInProgress;
39✔
1568
        }
1569

1570
        if (status_ != TransactionStatus::BodyReadingInProgress) {
2,264✔
1571
                auto cancelled = cancelled_;
1572
                handler(0);
66✔
1573
                if (!*cancelled && status_ == TransactionStatus::BodyReadingFinished) {
33✔
1574
                        status_ = TransactionStatus::BodyHandlerCalled;
33✔
1575
                        CallBodyHandler();
33✔
1576
                }
1577
                return;
1578
        }
1579

1580
        reader_buf_start_ = start;
2,231✔
1581
        reader_buf_end_ = end;
2,231✔
1582
        reader_handler_ = handler;
2,231✔
1583
        size_t read_size = end - start;
2,231✔
1584
        size_t smallest = min(body_buffer_.size(), read_size);
3,287✔
1585

1586
        request_data_.http_request_parser_->get().body().data = body_buffer_.data();
2,231✔
1587
        request_data_.http_request_parser_->get().body().size = smallest;
2,231✔
1588
        request_data_.last_buffer_size_ = smallest;
2,231✔
1589

1590
        auto &cancelled = cancelled_;
1591
        auto &request_data = request_data_;
2,231✔
1592

1593
        http::async_read_some(
4,462✔
1594
                socket_,
2,231✔
1595
                *request_data_.request_buffer_,
1596
                *request_data_.http_request_parser_,
1597
                [this, cancelled, request_data](const error_code &ec, size_t num_read) {
2,231✔
1598
                        if (!*cancelled) {
2,231✔
1599
                                ReadBodyHandler(ec, num_read);
2,231✔
1600
                        }
1601
                });
2,231✔
1602
}
1603

1604
void Stream::ReadBodyHandler(error_code ec, size_t num_read) {
2,231✔
1605
        if (num_read > 0) {
2,231✔
1606
                logger_.Trace("Read " + to_string(num_read) + " bytes of body data from stream.");
4,454✔
1607
        }
1608

1609
        if (ec == http::make_error_code(http::error::need_buffer)) {
2,231✔
1610
                // This can be ignored. We always reset the buffer between reads anyway.
1611
                ec = error_code();
979✔
1612
        }
1613

1614
        assert(reader_handler_);
1615

1616
        if (request_data_.http_request_parser_->is_done()) {
2,231✔
1617
                status_ = TransactionStatus::BodyReadingFinished;
33✔
1618
        }
1619

1620
        auto cancelled = cancelled_;
1621

1622
        if (ec) {
2,231✔
1623
                auto err = error::Error(ec.default_error_condition(), "Could not read body");
8✔
1624
                reader_handler_(expected::unexpected(err));
12✔
1625
                if (!*cancelled) {
4✔
1626
                        CallErrorHandler(ec, request_, server_.body_handler_);
4✔
1627
                }
1628
                return;
1629
        }
1630

1631
        // The num_read from above includes out of band payload data, such as chunk headers, which
1632
        // we are not interested in. So we need to calculate the payload size from the remaining
1633
        // buffer space.
1634
        size_t payload_read =
1635
                request_data_.last_buffer_size_ - request_data_.http_request_parser_->get().body().size;
2,227✔
1636

1637
        size_t buf_size = reader_buf_end_ - reader_buf_start_;
2,227✔
1638
        size_t smallest = min(payload_read, buf_size);
2,227✔
1639

1640
        if (smallest == 0) {
2,227✔
1641
                // We read nothing, which can happen if all we read was a chunk header. We cannot
1642
                // return 0 to the handler however, because in `io::Reader` context this means
1643
                // EOF. So just repeat the request instead, until we get actual payload data.
1644
                AsyncReadNextBodyPart(reader_buf_start_, reader_buf_end_, reader_handler_);
154✔
1645
        } else {
1646
                copy_n(body_buffer_.begin(), smallest, reader_buf_start_);
2,150✔
1647
                reader_handler_(smallest);
4,300✔
1648
        }
1649
}
1650

1651
void Stream::AsyncReply(ReplyFinishedHandler reply_finished_handler) {
205✔
1652
        SetupResponse();
205✔
1653

1654
        reply_finished_handler_ = reply_finished_handler;
205✔
1655

1656
        auto &cancelled = cancelled_;
1657
        auto &response_data = response_data_;
205✔
1658

1659
        http::async_write_header(
410✔
1660
                socket_,
205✔
1661
                *response_data_.http_response_serializer_,
1662
                [this, cancelled, response_data](const error_code &ec, size_t num_written) {
205✔
1663
                        if (!*cancelled) {
205✔
1664
                                WriteHeaderHandler(ec, num_written);
204✔
1665
                        }
1666
                });
205✔
1667
}
205✔
1668

1669
void Stream::SetupResponse() {
214✔
1670
        auto response = maybe_response_.lock();
214✔
1671
        // Only called from existing responses, so this should always be true.
1672
        assert(response);
1673

1674
        assert(status_ == TransactionStatus::BodyHandlerCalled);
1675
        status_ = TransactionStatus::Replying;
214✔
1676

1677
        // From here on we take shared ownership.
1678
        response_ = response;
1679

1680
        response_data_.http_response_ = make_shared<http::response<http::buffer_body>>();
428✔
1681

1682
        for (const auto &header : response->headers_) {
444✔
1683
                response_data_.http_response_->base().set(header.first, header.second);
230✔
1684
        }
1685

1686
        response_data_.http_response_->result(response->GetStatusCode());
214✔
1687
        response_data_.http_response_->reason(response->GetStatusMessage());
428✔
1688

1689
        response_data_.http_response_serializer_ =
1690
                make_shared<http::response_serializer<http::buffer_body>>(*response_data_.http_response_);
428✔
1691
}
214✔
1692

1693
void Stream::WriteHeaderHandler(const error_code &ec, size_t num_written) {
204✔
1694
        if (num_written > 0) {
204✔
1695
                logger_.Trace("Wrote " + to_string(num_written) + " bytes of header data to stream.");
408✔
1696
        }
1697

1698
        if (ec) {
204✔
1699
                CallErrorHandler(ec, request_, reply_finished_handler_);
×
1700
                return;
37✔
1701
        }
1702

1703
        auto exp_has_body =
1704
                HasBody(response_->GetHeader("Content-Length"), response_->GetHeader("Transfer-Encoding"));
408✔
1705
        if (!exp_has_body) {
204✔
1706
                CallErrorHandler(exp_has_body.error(), request_, reply_finished_handler_);
×
1707
                return;
×
1708
        }
1709
        if (!exp_has_body.value()) {
204✔
1710
                FinishReply();
36✔
1711
                return;
1712
        }
1713

1714
        if (!response_->body_reader_ && !response_->async_body_reader_) {
168✔
1715
                auto err = MakeError(BodyMissingError, "No body reader");
2✔
1716
                CallErrorHandler(err, request_, reply_finished_handler_);
3✔
1717
                return;
1718
        }
1719

1720
        PrepareAndWriteNewBodyBuffer();
167✔
1721
}
1722

1723
void Stream::PrepareAndWriteNewBodyBuffer() {
2,236✔
1724
        // response_->body_reader_ XOR response_->async_body_reader_
1725
        assert(
1726
                (response_->body_reader_ || response_->async_body_reader_)
1727
                && !(response_->body_reader_ && response_->async_body_reader_));
1728

1729
        auto read_handler = [this](io::ExpectedSize read) {
2,237✔
1730
                if (!read) {
2,236✔
1731
                        CallErrorHandler(read.error(), request_, reply_finished_handler_);
3✔
1732
                        return;
1✔
1733
                }
1734
                WriteNewBodyBuffer(read.value());
2,235✔
1735
        };
2,236✔
1736

1737
        if (response_->body_reader_) {
2,236✔
1738
                read_handler(response_->body_reader_->Read(body_buffer_.begin(), body_buffer_.end()));
3,924✔
1739
        } else {
1740
                auto err = response_->async_body_reader_->AsyncRead(
1741
                        body_buffer_.begin(), body_buffer_.end(), read_handler);
274✔
1742
                if (err != error::NoError) {
274✔
1743
                        CallErrorHandler(err, request_, reply_finished_handler_);
×
1744
                }
1745
        }
1746
}
2,236✔
1747

1748
void Stream::WriteNewBodyBuffer(size_t size) {
2,235✔
1749
        response_data_.http_response_->body().data = body_buffer_.data();
2,235✔
1750
        response_data_.http_response_->body().size = size;
2,235✔
1751

1752
        if (size > 0) {
2,235✔
1753
                response_data_.http_response_->body().more = true;
2,105✔
1754
        } else {
1755
                response_data_.http_response_->body().more = false;
130✔
1756
        }
1757

1758
        WriteBody();
2,235✔
1759
}
2,235✔
1760

1761
void Stream::WriteBody() {
4,322✔
1762
        auto &cancelled = cancelled_;
1763
        auto &response_data = response_data_;
4,322✔
1764

1765
        http::async_write_some(
8,644✔
1766
                socket_,
4,322✔
1767
                *response_data_.http_response_serializer_,
1768
                [this, cancelled, response_data](const error_code &ec, size_t num_written) {
4,281✔
1769
                        if (!*cancelled) {
4,281✔
1770
                                WriteBodyHandler(ec, num_written);
4,281✔
1771
                        }
1772
                });
4,281✔
1773
}
4,322✔
1774

1775
void Stream::WriteBodyHandler(const error_code &ec, size_t num_written) {
4,281✔
1776
        if (num_written > 0) {
4,281✔
1777
                logger_.Trace("Wrote " + to_string(num_written) + " bytes of body data to stream.");
4,174✔
1778
        }
1779

1780
        if (ec == http::make_error_code(http::error::need_buffer)) {
4,281✔
1781
                // Write next body block.
1782
                PrepareAndWriteNewBodyBuffer();
2,069✔
1783
        } else if (ec) {
2,212✔
1784
                CallErrorHandler(ec, request_, reply_finished_handler_);
12✔
1785
        } else if (num_written > 0) {
2,208✔
1786
                // We are still writing the body.
1787
                WriteBody();
2,087✔
1788
        } else {
1789
                // We are finished.
1790
                FinishReply();
121✔
1791
        }
1792
}
4,281✔
1793

1794
void Stream::FinishReply() {
157✔
1795
        // We are done.
1796
        status_ = TransactionStatus::Done;
157✔
1797
        DoCancel();
157✔
1798
        // Release ownership of Body reader.
1799
        response_->body_reader_.reset();
157✔
1800
        response_->async_body_reader_.reset();
157✔
1801
        reply_finished_handler_(error::NoError);
157✔
1802
        server_.RemoveStream(shared_from_this());
157✔
1803
}
157✔
1804

1805
error::Error Stream::AsyncSwitchProtocol(SwitchProtocolHandler handler) {
9✔
1806
        SetupResponse();
9✔
1807

1808
        switch_protocol_handler_ = handler;
9✔
1809
        status_ = TransactionStatus::SwitchingProtocol;
9✔
1810

1811
        auto &cancelled = cancelled_;
1812
        auto &response_data = response_data_;
9✔
1813

1814
        http::async_write_header(
18✔
1815
                socket_,
9✔
1816
                *response_data_.http_response_serializer_,
1817
                [this, cancelled, response_data](const error_code &ec, size_t num_written) {
9✔
1818
                        if (!*cancelled) {
9✔
1819
                                SwitchingProtocolHandler(ec, num_written);
8✔
1820
                        }
1821
                });
9✔
1822

1823
        return error::NoError;
9✔
1824
}
1825

1826
void Stream::SwitchingProtocolHandler(error_code ec, size_t num_written) {
8✔
1827
        if (num_written > 0) {
8✔
1828
                logger_.Trace("Wrote " + to_string(num_written) + " bytes of header data to stream.");
16✔
1829
        }
1830

1831
        if (ec) {
8✔
1832
                CallErrorHandler(ec, request_, switch_protocol_handler_);
×
1833
                return;
×
1834
        }
1835

1836
        auto socket = make_shared<RawSocket<tcp::socket>>(
1837
                make_shared<tcp::socket>(std::move(socket_)), request_data_.request_buffer_);
8✔
1838

1839
        auto switch_protocol_handler = switch_protocol_handler_;
8✔
1840

1841
        // Rest of the connection is done directly on the socket, set cancelled_ but don't close it.
1842
        *cancelled_ = true;
8✔
1843
        cancelled_ = make_shared<bool>(true);
8✔
1844
        server_.RemoveStream(shared_from_this());
16✔
1845

1846
        switch_protocol_handler(socket);
16✔
1847
}
1848

1849
void Stream::CallBodyHandler() {
220✔
1850
        // Get a pointer to ourselves. This is just in case the body handler make a response, which
1851
        // it immediately destroys, which would destroy this stream as well. At the end of this
1852
        // function, it's ok to destroy it.
1853
        auto stream_ref = shared_from_this();
1854

1855
        server_.body_handler_(request_, error::NoError);
660✔
1856

1857
        // MakeResponse() should have been called inside body handler. It can use this to generate a
1858
        // response, either immediately, or later. Therefore it should still exist, otherwise the
1859
        // request has not been handled correctly.
1860
        auto response = maybe_response_.lock();
220✔
1861
        if (!response) {
220✔
1862
                logger_.Error("Handler produced no response. Closing stream prematurely.");
6✔
1863
                *cancelled_ = true;
3✔
1864
                cancelled_ = make_shared<bool>(true);
3✔
1865
                server_.RemoveStream(shared_from_this());
9✔
1866
        }
1867
}
220✔
1868

1869
Server::Server(const ServerConfig &server, events::EventLoop &event_loop) :
240✔
1870
        event_loop_ {event_loop},
1871
        acceptor_(GetAsioIoContext(event_loop_)) {
433✔
1872
}
240✔
1873

1874
Server::~Server() {
480✔
1875
        Cancel();
240✔
1876
}
240✔
1877

1878
error::Error Server::AsyncServeUrl(
205✔
1879
        const string &url, RequestHandler header_handler, RequestHandler body_handler) {
1880
        return AsyncServeUrl(
1881
                url, header_handler, [body_handler](IncomingRequestPtr req, error::Error err) {
834✔
1882
                        if (err != error::NoError) {
215✔
1883
                                body_handler(expected::unexpected(err));
12✔
1884
                        } else {
1885
                                body_handler(req);
418✔
1886
                        }
1887
                });
625✔
1888
}
1889

1890
error::Error Server::AsyncServeUrl(
220✔
1891
        const string &url, RequestHandler header_handler, IdentifiedRequestHandler body_handler) {
1892
        auto err = BreakDownUrl(url, address_);
220✔
1893
        if (error::NoError != err) {
220✔
1894
                return MakeError(InvalidUrlError, "Could not parse URL " + url + ": " + err.String());
×
1895
        }
1896

1897
        if (address_.protocol != "http") {
220✔
1898
                return error::Error(make_error_condition(errc::protocol_not_supported), address_.protocol);
×
1899
        }
1900

1901
        if (address_.path.size() > 0 && address_.path != "/") {
220✔
1902
                return MakeError(InvalidUrlError, "URLs with paths are not supported when listening.");
2✔
1903
        }
1904

1905
        boost::system::error_code ec;
219✔
1906
        auto address = asio::ip::make_address(address_.host, ec);
219✔
1907
        if (ec) {
219✔
1908
                return error::Error(
1909
                        ec.default_error_condition(),
×
1910
                        "Could not construct endpoint from address " + address_.host);
×
1911
        }
1912

1913
        asio::ip::tcp::endpoint endpoint(address, address_.port);
219✔
1914

1915
        ec.clear();
1916
        acceptor_.open(endpoint.protocol(), ec);
219✔
1917
        if (ec) {
219✔
1918
                return error::Error(ec.default_error_condition(), "Could not open acceptor");
×
1919
        }
1920

1921
        // Allow address reuse, otherwise we can't re-bind later.
1922
        ec.clear();
1923
        acceptor_.set_option(asio::socket_base::reuse_address(true), ec);
219✔
1924
        if (ec) {
219✔
1925
                return error::Error(ec.default_error_condition(), "Could not set socket options");
×
1926
        }
1927

1928
        ec.clear();
1929
        acceptor_.bind(endpoint, ec);
219✔
1930
        if (ec) {
219✔
1931
                return error::Error(ec.default_error_condition(), "Could not bind socket");
×
1932
        }
1933

1934
        ec.clear();
1935
        acceptor_.listen(asio::socket_base::max_listen_connections, ec);
219✔
1936
        if (ec) {
219✔
1937
                return error::Error(ec.default_error_condition(), "Could not start listening");
×
1938
        }
1939

1940
        header_handler_ = header_handler;
219✔
1941
        body_handler_ = body_handler;
219✔
1942

1943
        PrepareNewStream();
219✔
1944

1945
        return error::NoError;
219✔
1946
}
1947

1948
void Server::Cancel() {
260✔
1949
        if (acceptor_.is_open()) {
260✔
1950
                acceptor_.cancel();
219✔
1951
                acceptor_.close();
219✔
1952
        }
1953
        streams_.clear();
1954
}
260✔
1955

1956
uint16_t Server::GetPort() const {
17✔
1957
        return acceptor_.local_endpoint().port();
17✔
1958
}
1959

1960
string Server::GetUrl() const {
16✔
1961
        return "http://127.0.0.1:" + to_string(GetPort());
32✔
1962
}
1963

1964
ExpectedOutgoingResponsePtr Server::MakeResponse(IncomingRequestPtr req) {
219✔
1965
        if (*req->cancelled_) {
219✔
1966
                return expected::unexpected(MakeError(StreamCancelledError, "Cannot make response"));
×
1967
        }
1968
        OutgoingResponsePtr response {new OutgoingResponse(req->stream_, req->cancelled_)};
438✔
1969
        req->stream_.maybe_response_ = response;
219✔
1970
        return response;
219✔
1971
}
1972

1973
error::Error Server::AsyncReply(
205✔
1974
        OutgoingResponsePtr resp, ReplyFinishedHandler reply_finished_handler) {
1975
        if (*resp->cancelled_) {
205✔
1976
                return MakeError(StreamCancelledError, "Cannot send response");
×
1977
        }
1978

1979
        resp->stream_.AsyncReply(reply_finished_handler);
205✔
1980
        return error::NoError;
205✔
1981
}
1982

1983
io::ExpectedAsyncReaderPtr Server::MakeBodyAsyncReader(IncomingRequestPtr req) {
58✔
1984
        if (*req->cancelled_) {
58✔
1985
                return expected::unexpected(MakeError(StreamCancelledError, "Cannot make body reader"));
×
1986
        }
1987

1988
        auto &stream = req->stream_;
58✔
1989
        if (stream.status_ != TransactionStatus::HeaderHandlerCalled) {
58✔
1990
                return expected::unexpected(error::Error(
1✔
1991
                        make_error_condition(errc::operation_in_progress),
2✔
1992
                        "MakeBodyAsyncReader called while reading is in progress"));
3✔
1993
        }
1994

1995
        if (GetContentLength(*stream.request_data_.http_request_parser_) == 0
57✔
1996
                && !stream.request_data_.http_request_parser_->chunked()) {
57✔
1997
                return expected::unexpected(MakeError(BodyMissingError, "Request does not contain a body"));
54✔
1998
        }
1999

2000
        stream.status_ = TransactionStatus::ReaderCreated;
39✔
2001
        return make_shared<BodyAsyncReader<Stream>>(stream, req->cancelled_);
78✔
2002
}
2003

2004
error::Error Server::AsyncSwitchProtocol(OutgoingResponsePtr resp, SwitchProtocolHandler handler) {
9✔
2005
        return resp->stream_.AsyncSwitchProtocol(handler);
18✔
2006
}
2007

2008
void Server::PrepareNewStream() {
447✔
2009
        StreamPtr new_stream {new Stream(*this)};
447✔
2010
        streams_.insert(new_stream);
2011
        AsyncAccept(new_stream);
894✔
2012
}
447✔
2013

2014
void Server::AsyncAccept(StreamPtr stream) {
447✔
2015
        acceptor_.async_accept(stream->socket_, [this, stream](const error_code &ec) {
678✔
2016
                if (ec) {
231✔
2017
                        if (ec != errc::operation_canceled) {
3✔
2018
                                log::Error("Could not accept connection: " + ec.message());
×
2019
                        }
2020
                        return;
3✔
2021
                }
2022

2023
                stream->AcceptHandler(ec);
228✔
2024

2025
                this->PrepareNewStream();
228✔
2026
        });
2027
}
447✔
2028

2029
void Server::RemoveStream(StreamPtr stream) {
189✔
2030
        streams_.erase(stream);
189✔
2031

2032
        stream->DoCancel();
189✔
2033
}
189✔
2034

2035
} // namespace http
2036
} // namespace common
2037
} // namespace mender
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc