diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-30 03:59:35 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-30 03:59:35 +0000 |
commit | d1b2d29528b7794b41e66fc2136e395a02f8529b (patch) | |
tree | a4a17504b260206dec3cf55b2dca82929a348ac2 /vendor/reqwest/src/connect.rs | |
parent | Releasing progress-linux version 1.72.1+dfsg1-1~progress7.99u1. (diff) | |
download | rustc-d1b2d29528b7794b41e66fc2136e395a02f8529b.tar.xz rustc-d1b2d29528b7794b41e66fc2136e395a02f8529b.zip |
Merging upstream version 1.73.0+dfsg1.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'vendor/reqwest/src/connect.rs')
-rw-r--r-- | vendor/reqwest/src/connect.rs | 1156 |
1 files changed, 1156 insertions, 0 deletions
diff --git a/vendor/reqwest/src/connect.rs b/vendor/reqwest/src/connect.rs new file mode 100644 index 000000000..b80ffc767 --- /dev/null +++ b/vendor/reqwest/src/connect.rs @@ -0,0 +1,1156 @@ +#[cfg(feature = "__tls")] +use http::header::HeaderValue; +use http::uri::{Authority, Scheme}; +use http::Uri; +use hyper::client::connect::{Connected, Connection}; +use hyper::service::Service; +#[cfg(feature = "native-tls-crate")] +use native_tls_crate::{TlsConnector, TlsConnectorBuilder}; +use tokio::io::{AsyncRead, AsyncWrite, ReadBuf}; + +use pin_project_lite::pin_project; +use std::future::Future; +use std::io::{self, IoSlice}; +use std::net::IpAddr; +use std::pin::Pin; +use std::sync::Arc; +use std::task::{Context, Poll}; +use std::time::Duration; + +#[cfg(feature = "default-tls")] +use self::native_tls_conn::NativeTlsConn; +#[cfg(feature = "__rustls")] +use self::rustls_tls_conn::RustlsTlsConn; +use crate::dns::DynResolver; +use crate::error::BoxError; +use crate::proxy::{Proxy, ProxyScheme}; + +pub(crate) type HttpConnector = hyper::client::HttpConnector<DynResolver>; + +#[derive(Clone)] +pub(crate) struct Connector { + inner: Inner, + proxies: Arc<Vec<Proxy>>, + verbose: verbose::Wrapper, + timeout: Option<Duration>, + #[cfg(feature = "__tls")] + nodelay: bool, + #[cfg(feature = "__tls")] + user_agent: Option<HeaderValue>, +} + +#[derive(Clone)] +enum Inner { + #[cfg(not(feature = "__tls"))] + Http(HttpConnector), + #[cfg(feature = "default-tls")] + DefaultTls(HttpConnector, TlsConnector), + #[cfg(feature = "__rustls")] + RustlsTls { + http: HttpConnector, + tls: Arc<rustls::ClientConfig>, + tls_proxy: Arc<rustls::ClientConfig>, + }, +} + +impl Connector { + #[cfg(not(feature = "__tls"))] + pub(crate) fn new<T>( + mut http: HttpConnector, + proxies: Arc<Vec<Proxy>>, + local_addr: T, + nodelay: bool, + ) -> Connector + where + T: Into<Option<IpAddr>>, + { + http.set_local_address(local_addr.into()); + http.set_nodelay(nodelay); + Connector { + inner: Inner::Http(http), + verbose: verbose::OFF, + proxies, + timeout: None, + } + } + + #[cfg(feature = "default-tls")] + pub(crate) fn new_default_tls<T>( + http: HttpConnector, + tls: TlsConnectorBuilder, + proxies: Arc<Vec<Proxy>>, + user_agent: Option<HeaderValue>, + local_addr: T, + nodelay: bool, + ) -> crate::Result<Connector> + where + T: Into<Option<IpAddr>>, + { + let tls = tls.build().map_err(crate::error::builder)?; + Ok(Self::from_built_default_tls( + http, tls, proxies, user_agent, local_addr, nodelay, + )) + } + + #[cfg(feature = "default-tls")] + pub(crate) fn from_built_default_tls<T>( + mut http: HttpConnector, + tls: TlsConnector, + proxies: Arc<Vec<Proxy>>, + user_agent: Option<HeaderValue>, + local_addr: T, + nodelay: bool, + ) -> Connector + where + T: Into<Option<IpAddr>>, + { + http.set_local_address(local_addr.into()); + http.enforce_http(false); + + Connector { + inner: Inner::DefaultTls(http, tls), + proxies, + verbose: verbose::OFF, + timeout: None, + nodelay, + user_agent, + } + } + + #[cfg(feature = "__rustls")] + pub(crate) fn new_rustls_tls<T>( + mut http: HttpConnector, + tls: rustls::ClientConfig, + proxies: Arc<Vec<Proxy>>, + user_agent: Option<HeaderValue>, + local_addr: T, + nodelay: bool, + ) -> Connector + where + T: Into<Option<IpAddr>>, + { + http.set_local_address(local_addr.into()); + http.enforce_http(false); + + let (tls, tls_proxy) = if proxies.is_empty() { + let tls = Arc::new(tls); + (tls.clone(), tls) + } else { + let mut tls_proxy = tls.clone(); + tls_proxy.alpn_protocols.clear(); + (Arc::new(tls), Arc::new(tls_proxy)) + }; + + Connector { + inner: Inner::RustlsTls { + http, + tls, + tls_proxy, + }, + proxies, + verbose: verbose::OFF, + timeout: None, + nodelay, + user_agent, + } + } + + pub(crate) fn set_timeout(&mut self, timeout: Option<Duration>) { + self.timeout = timeout; + } + + pub(crate) fn set_verbose(&mut self, enabled: bool) { + self.verbose.0 = enabled; + } + + #[cfg(feature = "socks")] + async fn connect_socks(&self, dst: Uri, proxy: ProxyScheme) -> Result<Conn, BoxError> { + let dns = match proxy { + ProxyScheme::Socks5 { + remote_dns: false, .. + } => socks::DnsResolve::Local, + ProxyScheme::Socks5 { + remote_dns: true, .. + } => socks::DnsResolve::Proxy, + ProxyScheme::Http { .. } | ProxyScheme::Https { .. } => { + unreachable!("connect_socks is only called for socks proxies"); + } + }; + + match &self.inner { + #[cfg(feature = "default-tls")] + Inner::DefaultTls(_http, tls) => { + if dst.scheme() == Some(&Scheme::HTTPS) { + let host = dst.host().ok_or("no host in url")?.to_string(); + let conn = socks::connect(proxy, dst, dns).await?; + let tls_connector = tokio_native_tls::TlsConnector::from(tls.clone()); + let io = tls_connector.connect(&host, conn).await?; + return Ok(Conn { + inner: self.verbose.wrap(NativeTlsConn { inner: io }), + is_proxy: false, + }); + } + } + #[cfg(feature = "__rustls")] + Inner::RustlsTls { tls_proxy, .. } => { + if dst.scheme() == Some(&Scheme::HTTPS) { + use std::convert::TryFrom; + use tokio_rustls::TlsConnector as RustlsConnector; + + let tls = tls_proxy.clone(); + let host = dst.host().ok_or("no host in url")?.to_string(); + let conn = socks::connect(proxy, dst, dns).await?; + let server_name = rustls::ServerName::try_from(host.as_str()) + .map_err(|_| "Invalid Server Name")?; + let io = RustlsConnector::from(tls) + .connect(server_name, conn) + .await?; + return Ok(Conn { + inner: self.verbose.wrap(RustlsTlsConn { inner: io }), + is_proxy: false, + }); + } + } + #[cfg(not(feature = "__tls"))] + Inner::Http(_) => (), + } + + socks::connect(proxy, dst, dns).await.map(|tcp| Conn { + inner: self.verbose.wrap(tcp), + is_proxy: false, + }) + } + + async fn connect_with_maybe_proxy(self, dst: Uri, is_proxy: bool) -> Result<Conn, BoxError> { + match self.inner { + #[cfg(not(feature = "__tls"))] + Inner::Http(mut http) => { + let io = http.call(dst).await?; + Ok(Conn { + inner: self.verbose.wrap(io), + is_proxy, + }) + } + #[cfg(feature = "default-tls")] + Inner::DefaultTls(http, tls) => { + let mut http = http.clone(); + + // Disable Nagle's algorithm for TLS handshake + // + // https://www.openssl.org/docs/man1.1.1/man3/SSL_connect.html#NOTES + if !self.nodelay && (dst.scheme() == Some(&Scheme::HTTPS)) { + http.set_nodelay(true); + } + + let tls_connector = tokio_native_tls::TlsConnector::from(tls.clone()); + let mut http = hyper_tls::HttpsConnector::from((http, tls_connector)); + let io = http.call(dst).await?; + + if let hyper_tls::MaybeHttpsStream::Https(stream) = io { + if !self.nodelay { + stream.get_ref().get_ref().get_ref().set_nodelay(false)?; + } + Ok(Conn { + inner: self.verbose.wrap(NativeTlsConn { inner: stream }), + is_proxy, + }) + } else { + Ok(Conn { + inner: self.verbose.wrap(io), + is_proxy, + }) + } + } + #[cfg(feature = "__rustls")] + Inner::RustlsTls { http, tls, .. } => { + let mut http = http.clone(); + + // Disable Nagle's algorithm for TLS handshake + // + // https://www.openssl.org/docs/man1.1.1/man3/SSL_connect.html#NOTES + if !self.nodelay && (dst.scheme() == Some(&Scheme::HTTPS)) { + http.set_nodelay(true); + } + + let mut http = hyper_rustls::HttpsConnector::from((http, tls.clone())); + let io = http.call(dst).await?; + + if let hyper_rustls::MaybeHttpsStream::Https(stream) = io { + if !self.nodelay { + let (io, _) = stream.get_ref(); + io.set_nodelay(false)?; + } + Ok(Conn { + inner: self.verbose.wrap(RustlsTlsConn { inner: stream }), + is_proxy, + }) + } else { + Ok(Conn { + inner: self.verbose.wrap(io), + is_proxy, + }) + } + } + } + } + + async fn connect_via_proxy( + self, + dst: Uri, + proxy_scheme: ProxyScheme, + ) -> Result<Conn, BoxError> { + log::debug!("proxy({:?}) intercepts '{:?}'", proxy_scheme, dst); + + let (proxy_dst, _auth) = match proxy_scheme { + ProxyScheme::Http { host, auth } => (into_uri(Scheme::HTTP, host), auth), + ProxyScheme::Https { host, auth } => (into_uri(Scheme::HTTPS, host), auth), + #[cfg(feature = "socks")] + ProxyScheme::Socks5 { .. } => return self.connect_socks(dst, proxy_scheme).await, + }; + + #[cfg(feature = "__tls")] + let auth = _auth; + + match &self.inner { + #[cfg(feature = "default-tls")] + Inner::DefaultTls(http, tls) => { + if dst.scheme() == Some(&Scheme::HTTPS) { + let host = dst.host().to_owned(); + let port = dst.port().map(|p| p.as_u16()).unwrap_or(443); + let http = http.clone(); + let tls_connector = tokio_native_tls::TlsConnector::from(tls.clone()); + let mut http = hyper_tls::HttpsConnector::from((http, tls_connector)); + let conn = http.call(proxy_dst).await?; + log::trace!("tunneling HTTPS over proxy"); + let tunneled = tunnel( + conn, + host.ok_or("no host in url")?.to_string(), + port, + self.user_agent.clone(), + auth, + ) + .await?; + let tls_connector = tokio_native_tls::TlsConnector::from(tls.clone()); + let io = tls_connector + .connect(host.ok_or("no host in url")?, tunneled) + .await?; + return Ok(Conn { + inner: self.verbose.wrap(NativeTlsConn { inner: io }), + is_proxy: false, + }); + } + } + #[cfg(feature = "__rustls")] + Inner::RustlsTls { + http, + tls, + tls_proxy, + } => { + if dst.scheme() == Some(&Scheme::HTTPS) { + use rustls::ServerName; + use std::convert::TryFrom; + use tokio_rustls::TlsConnector as RustlsConnector; + + let host = dst.host().ok_or("no host in url")?.to_string(); + let port = dst.port().map(|r| r.as_u16()).unwrap_or(443); + let http = http.clone(); + let mut http = hyper_rustls::HttpsConnector::from((http, tls_proxy.clone())); + let tls = tls.clone(); + let conn = http.call(proxy_dst).await?; + log::trace!("tunneling HTTPS over proxy"); + let maybe_server_name = + ServerName::try_from(host.as_str()).map_err(|_| "Invalid Server Name"); + let tunneled = tunnel(conn, host, port, self.user_agent.clone(), auth).await?; + let server_name = maybe_server_name?; + let io = RustlsConnector::from(tls) + .connect(server_name, tunneled) + .await?; + + return Ok(Conn { + inner: self.verbose.wrap(RustlsTlsConn { inner: io }), + is_proxy: false, + }); + } + } + #[cfg(not(feature = "__tls"))] + Inner::Http(_) => (), + } + + self.connect_with_maybe_proxy(proxy_dst, true).await + } + + pub fn set_keepalive(&mut self, dur: Option<Duration>) { + match &mut self.inner { + #[cfg(feature = "default-tls")] + Inner::DefaultTls(http, _tls) => http.set_keepalive(dur), + #[cfg(feature = "__rustls")] + Inner::RustlsTls { http, .. } => http.set_keepalive(dur), + #[cfg(not(feature = "__tls"))] + Inner::Http(http) => http.set_keepalive(dur), + } + } +} + +fn into_uri(scheme: Scheme, host: Authority) -> Uri { + // TODO: Should the `http` crate get `From<(Scheme, Authority)> for Uri`? + http::Uri::builder() + .scheme(scheme) + .authority(host) + .path_and_query(http::uri::PathAndQuery::from_static("/")) + .build() + .expect("scheme and authority is valid Uri") +} + +async fn with_timeout<T, F>(f: F, timeout: Option<Duration>) -> Result<T, BoxError> +where + F: Future<Output = Result<T, BoxError>>, +{ + if let Some(to) = timeout { + match tokio::time::timeout(to, f).await { + Err(_elapsed) => Err(Box::new(crate::error::TimedOut) as BoxError), + Ok(Ok(try_res)) => Ok(try_res), + Ok(Err(e)) => Err(e), + } + } else { + f.await + } +} + +impl Service<Uri> for Connector { + type Response = Conn; + type Error = BoxError; + type Future = Connecting; + + fn poll_ready(&mut self, _cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> { + Poll::Ready(Ok(())) + } + + fn call(&mut self, dst: Uri) -> Self::Future { + log::debug!("starting new connection: {:?}", dst); + let timeout = self.timeout; + for prox in self.proxies.iter() { + if let Some(proxy_scheme) = prox.intercept(&dst) { + return Box::pin(with_timeout( + self.clone().connect_via_proxy(dst, proxy_scheme), + timeout, + )); + } + } + + Box::pin(with_timeout( + self.clone().connect_with_maybe_proxy(dst, false), + timeout, + )) + } +} + +pub(crate) trait AsyncConn: + AsyncRead + AsyncWrite + Connection + Send + Sync + Unpin + 'static +{ +} + +impl<T: AsyncRead + AsyncWrite + Connection + Send + Sync + Unpin + 'static> AsyncConn for T {} + +type BoxConn = Box<dyn AsyncConn>; + +pin_project! { + /// Note: the `is_proxy` member means *is plain text HTTP proxy*. + /// This tells hyper whether the URI should be written in + /// * origin-form (`GET /just/a/path HTTP/1.1`), when `is_proxy == false`, or + /// * absolute-form (`GET http://foo.bar/and/a/path HTTP/1.1`), otherwise. + pub(crate) struct Conn { + #[pin] + inner: BoxConn, + is_proxy: bool, + } +} + +impl Connection for Conn { + fn connected(&self) -> Connected { + self.inner.connected().proxy(self.is_proxy) + } +} + +impl AsyncRead for Conn { + fn poll_read( + self: Pin<&mut Self>, + cx: &mut Context, + buf: &mut ReadBuf<'_>, + ) -> Poll<io::Result<()>> { + let this = self.project(); + AsyncRead::poll_read(this.inner, cx, buf) + } +} + +impl AsyncWrite for Conn { + fn poll_write( + self: Pin<&mut Self>, + cx: &mut Context, + buf: &[u8], + ) -> Poll<Result<usize, io::Error>> { + let this = self.project(); + AsyncWrite::poll_write(this.inner, cx, buf) + } + + fn poll_write_vectored( + self: Pin<&mut Self>, + cx: &mut Context<'_>, + bufs: &[IoSlice<'_>], + ) -> Poll<Result<usize, io::Error>> { + let this = self.project(); + AsyncWrite::poll_write_vectored(this.inner, cx, bufs) + } + + fn is_write_vectored(&self) -> bool { + self.inner.is_write_vectored() + } + + fn poll_flush(self: Pin<&mut Self>, cx: &mut Context) -> Poll<Result<(), io::Error>> { + let this = self.project(); + AsyncWrite::poll_flush(this.inner, cx) + } + + fn poll_shutdown(self: Pin<&mut Self>, cx: &mut Context) -> Poll<Result<(), io::Error>> { + let this = self.project(); + AsyncWrite::poll_shutdown(this.inner, cx) + } +} + +pub(crate) type Connecting = Pin<Box<dyn Future<Output = Result<Conn, BoxError>> + Send>>; + +#[cfg(feature = "__tls")] +async fn tunnel<T>( + mut conn: T, + host: String, + port: u16, + user_agent: Option<HeaderValue>, + auth: Option<HeaderValue>, +) -> Result<T, BoxError> +where + T: AsyncRead + AsyncWrite + Unpin, +{ + use tokio::io::{AsyncReadExt, AsyncWriteExt}; + + let mut buf = format!( + "\ + CONNECT {0}:{1} HTTP/1.1\r\n\ + Host: {0}:{1}\r\n\ + ", + host, port + ) + .into_bytes(); + + // user-agent + if let Some(user_agent) = user_agent { + buf.extend_from_slice(b"User-Agent: "); + buf.extend_from_slice(user_agent.as_bytes()); + buf.extend_from_slice(b"\r\n"); + } + + // proxy-authorization + if let Some(value) = auth { + log::debug!("tunnel to {}:{} using basic auth", host, port); + buf.extend_from_slice(b"Proxy-Authorization: "); + buf.extend_from_slice(value.as_bytes()); + buf.extend_from_slice(b"\r\n"); + } + + // headers end + buf.extend_from_slice(b"\r\n"); + + conn.write_all(&buf).await?; + + let mut buf = [0; 8192]; + let mut pos = 0; + + loop { + let n = conn.read(&mut buf[pos..]).await?; + + if n == 0 { + return Err(tunnel_eof()); + } + pos += n; + + let recvd = &buf[..pos]; + if recvd.starts_with(b"HTTP/1.1 200") || recvd.starts_with(b"HTTP/1.0 200") { + if recvd.ends_with(b"\r\n\r\n") { + return Ok(conn); + } + if pos == buf.len() { + return Err("proxy headers too long for tunnel".into()); + } + // else read more + } else if recvd.starts_with(b"HTTP/1.1 407") { + return Err("proxy authentication required".into()); + } else { + return Err("unsuccessful tunnel".into()); + } + } +} + +#[cfg(feature = "__tls")] +fn tunnel_eof() -> BoxError { + "unexpected eof while tunneling".into() +} + +#[cfg(feature = "default-tls")] +mod native_tls_conn { + use hyper::client::connect::{Connected, Connection}; + use pin_project_lite::pin_project; + use std::{ + io::{self, IoSlice}, + pin::Pin, + task::{Context, Poll}, + }; + use tokio::io::{AsyncRead, AsyncWrite, ReadBuf}; + use tokio_native_tls::TlsStream; + + pin_project! { + pub(super) struct NativeTlsConn<T> { + #[pin] pub(super) inner: TlsStream<T>, + } + } + + impl<T: Connection + AsyncRead + AsyncWrite + Unpin> Connection for NativeTlsConn<T> { + #[cfg(feature = "native-tls-alpn")] + fn connected(&self) -> Connected { + match self.inner.get_ref().negotiated_alpn().ok() { + Some(Some(alpn_protocol)) if alpn_protocol == b"h2" => self + .inner + .get_ref() + .get_ref() + .get_ref() + .connected() + .negotiated_h2(), + _ => self.inner.get_ref().get_ref().get_ref().connected(), + } + } + + #[cfg(not(feature = "native-tls-alpn"))] + fn connected(&self) -> Connected { + self.inner.get_ref().get_ref().get_ref().connected() + } + } + + impl<T: AsyncRead + AsyncWrite + Unpin> AsyncRead for NativeTlsConn<T> { + fn poll_read( + self: Pin<&mut Self>, + cx: &mut Context, + buf: &mut ReadBuf<'_>, + ) -> Poll<tokio::io::Result<()>> { + let this = self.project(); + AsyncRead::poll_read(this.inner, cx, buf) + } + } + + impl<T: AsyncRead + AsyncWrite + Unpin> AsyncWrite for NativeTlsConn<T> { + fn poll_write( + self: Pin<&mut Self>, + cx: &mut Context, + buf: &[u8], + ) -> Poll<Result<usize, tokio::io::Error>> { + let this = self.project(); + AsyncWrite::poll_write(this.inner, cx, buf) + } + + fn poll_write_vectored( + self: Pin<&mut Self>, + cx: &mut Context<'_>, + bufs: &[IoSlice<'_>], + ) -> Poll<Result<usize, io::Error>> { + let this = self.project(); + AsyncWrite::poll_write_vectored(this.inner, cx, bufs) + } + + fn is_write_vectored(&self) -> bool { + self.inner.is_write_vectored() + } + + fn poll_flush( + self: Pin<&mut Self>, + cx: &mut Context, + ) -> Poll<Result<(), tokio::io::Error>> { + let this = self.project(); + AsyncWrite::poll_flush(this.inner, cx) + } + + fn poll_shutdown( + self: Pin<&mut Self>, + cx: &mut Context, + ) -> Poll<Result<(), tokio::io::Error>> { + let this = self.project(); + AsyncWrite::poll_shutdown(this.inner, cx) + } + } +} + +#[cfg(feature = "__rustls")] +mod rustls_tls_conn { + use hyper::client::connect::{Connected, Connection}; + use pin_project_lite::pin_project; + use std::{ + io::{self, IoSlice}, + pin::Pin, + task::{Context, Poll}, + }; + use tokio::io::{AsyncRead, AsyncWrite, ReadBuf}; + use tokio_rustls::client::TlsStream; + + pin_project! { + pub(super) struct RustlsTlsConn<T> { + #[pin] pub(super) inner: TlsStream<T>, + } + } + + impl<T: Connection + AsyncRead + AsyncWrite + Unpin> Connection for RustlsTlsConn<T> { + fn connected(&self) -> Connected { + if self.inner.get_ref().1.alpn_protocol() == Some(b"h2") { + self.inner.get_ref().0.connected().negotiated_h2() + } else { + self.inner.get_ref().0.connected() + } + } + } + + impl<T: AsyncRead + AsyncWrite + Unpin> AsyncRead for RustlsTlsConn<T> { + fn poll_read( + self: Pin<&mut Self>, + cx: &mut Context, + buf: &mut ReadBuf<'_>, + ) -> Poll<tokio::io::Result<()>> { + let this = self.project(); + AsyncRead::poll_read(this.inner, cx, buf) + } + } + + impl<T: AsyncRead + AsyncWrite + Unpin> AsyncWrite for RustlsTlsConn<T> { + fn poll_write( + self: Pin<&mut Self>, + cx: &mut Context, + buf: &[u8], + ) -> Poll<Result<usize, tokio::io::Error>> { + let this = self.project(); + AsyncWrite::poll_write(this.inner, cx, buf) + } + + fn poll_write_vectored( + self: Pin<&mut Self>, + cx: &mut Context<'_>, + bufs: &[IoSlice<'_>], + ) -> Poll<Result<usize, io::Error>> { + let this = self.project(); + AsyncWrite::poll_write_vectored(this.inner, cx, bufs) + } + + fn is_write_vectored(&self) -> bool { + self.inner.is_write_vectored() + } + + fn poll_flush( + self: Pin<&mut Self>, + cx: &mut Context, + ) -> Poll<Result<(), tokio::io::Error>> { + let this = self.project(); + AsyncWrite::poll_flush(this.inner, cx) + } + + fn poll_shutdown( + self: Pin<&mut Self>, + cx: &mut Context, + ) -> Poll<Result<(), tokio::io::Error>> { + let this = self.project(); + AsyncWrite::poll_shutdown(this.inner, cx) + } + } +} + +#[cfg(feature = "socks")] +mod socks { + use std::io; + use std::net::ToSocketAddrs; + + use http::Uri; + use tokio::net::TcpStream; + use tokio_socks::tcp::Socks5Stream; + + use super::{BoxError, Scheme}; + use crate::proxy::ProxyScheme; + + pub(super) enum DnsResolve { + Local, + Proxy, + } + + pub(super) async fn connect( + proxy: ProxyScheme, + dst: Uri, + dns: DnsResolve, + ) -> Result<TcpStream, BoxError> { + let https = dst.scheme() == Some(&Scheme::HTTPS); + let original_host = dst + .host() + .ok_or(io::Error::new(io::ErrorKind::Other, "no host in url"))?; + let mut host = original_host.to_owned(); + let port = match dst.port() { + Some(p) => p.as_u16(), + None if https => 443u16, + _ => 80u16, + }; + + if let DnsResolve::Local = dns { + let maybe_new_target = (host.as_str(), port).to_socket_addrs()?.next(); + if let Some(new_target) = maybe_new_target { + host = new_target.ip().to_string(); + } + } + + let (socket_addr, auth) = match proxy { + ProxyScheme::Socks5 { addr, auth, .. } => (addr, auth), + _ => unreachable!(), + }; + + // Get a Tokio TcpStream + let stream = if let Some((username, password)) = auth { + Socks5Stream::connect_with_password( + socket_addr, + (host.as_str(), port), + &username, + &password, + ) + .await + .map_err(|e| format!("socks connect error: {}", e))? + } else { + Socks5Stream::connect(socket_addr, (host.as_str(), port)) + .await + .map_err(|e| format!("socks connect error: {}", e))? + }; + + Ok(stream.into_inner()) + } +} + +mod verbose { + use hyper::client::connect::{Connected, Connection}; + use std::cmp::min; + use std::fmt; + use std::io::{self, IoSlice}; + use std::pin::Pin; + use std::task::{Context, Poll}; + use tokio::io::{AsyncRead, AsyncWrite, ReadBuf}; + + pub(super) const OFF: Wrapper = Wrapper(false); + + #[derive(Clone, Copy)] + pub(super) struct Wrapper(pub(super) bool); + + impl Wrapper { + pub(super) fn wrap<T: super::AsyncConn>(&self, conn: T) -> super::BoxConn { + if self.0 && log::log_enabled!(log::Level::Trace) { + Box::new(Verbose { + // truncate is fine + id: crate::util::fast_random() as u32, + inner: conn, + }) + } else { + Box::new(conn) + } + } + } + + struct Verbose<T> { + id: u32, + inner: T, + } + + impl<T: Connection + AsyncRead + AsyncWrite + Unpin> Connection for Verbose<T> { + fn connected(&self) -> Connected { + self.inner.connected() + } + } + + impl<T: AsyncRead + AsyncWrite + Unpin> AsyncRead for Verbose<T> { + fn poll_read( + mut self: Pin<&mut Self>, + cx: &mut Context, + buf: &mut ReadBuf<'_>, + ) -> Poll<std::io::Result<()>> { + match Pin::new(&mut self.inner).poll_read(cx, buf) { + Poll::Ready(Ok(())) => { + log::trace!("{:08x} read: {:?}", self.id, Escape(buf.filled())); + Poll::Ready(Ok(())) + } + Poll::Ready(Err(e)) => Poll::Ready(Err(e)), + Poll::Pending => Poll::Pending, + } + } + } + + impl<T: AsyncRead + AsyncWrite + Unpin> AsyncWrite for Verbose<T> { + fn poll_write( + mut self: Pin<&mut Self>, + cx: &mut Context, + buf: &[u8], + ) -> Poll<Result<usize, std::io::Error>> { + match Pin::new(&mut self.inner).poll_write(cx, buf) { + Poll::Ready(Ok(n)) => { + log::trace!("{:08x} write: {:?}", self.id, Escape(&buf[..n])); + Poll::Ready(Ok(n)) + } + Poll::Ready(Err(e)) => Poll::Ready(Err(e)), + Poll::Pending => Poll::Pending, + } + } + + fn poll_write_vectored( + mut self: Pin<&mut Self>, + cx: &mut Context<'_>, + bufs: &[IoSlice<'_>], + ) -> Poll<Result<usize, io::Error>> { + match Pin::new(&mut self.inner).poll_write_vectored(cx, bufs) { + Poll::Ready(Ok(nwritten)) => { + log::trace!( + "{:08x} write (vectored): {:?}", + self.id, + Vectored { bufs, nwritten } + ); + Poll::Ready(Ok(nwritten)) + } + Poll::Ready(Err(e)) => Poll::Ready(Err(e)), + Poll::Pending => Poll::Pending, + } + } + + fn is_write_vectored(&self) -> bool { + self.inner.is_write_vectored() + } + + fn poll_flush( + mut self: Pin<&mut Self>, + cx: &mut Context, + ) -> Poll<Result<(), std::io::Error>> { + Pin::new(&mut self.inner).poll_flush(cx) + } + + fn poll_shutdown( + mut self: Pin<&mut Self>, + cx: &mut Context, + ) -> Poll<Result<(), std::io::Error>> { + Pin::new(&mut self.inner).poll_shutdown(cx) + } + } + + struct Escape<'a>(&'a [u8]); + + impl fmt::Debug for Escape<'_> { + fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { + write!(f, "b\"")?; + for &c in self.0 { + // https://doc.rust-lang.org/reference.html#byte-escapes + if c == b'\n' { + write!(f, "\\n")?; + } else if c == b'\r' { + write!(f, "\\r")?; + } else if c == b'\t' { + write!(f, "\\t")?; + } else if c == b'\\' || c == b'"' { + write!(f, "\\{}", c as char)?; + } else if c == b'\0' { + write!(f, "\\0")?; + // ASCII printable + } else if c >= 0x20 && c < 0x7f { + write!(f, "{}", c as char)?; + } else { + write!(f, "\\x{:02x}", c)?; + } + } + write!(f, "\"")?; + Ok(()) + } + } + + struct Vectored<'a, 'b> { + bufs: &'a [IoSlice<'b>], + nwritten: usize, + } + + impl fmt::Debug for Vectored<'_, '_> { + fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { + let mut left = self.nwritten; + for buf in self.bufs.iter() { + if left == 0 { + break; + } + let n = min(left, buf.len()); + Escape(&buf[..n]).fmt(f)?; + left -= n; + } + Ok(()) + } + } +} + +#[cfg(feature = "__tls")] +#[cfg(test)] +mod tests { + use super::tunnel; + use crate::proxy; + use std::io::{Read, Write}; + use std::net::TcpListener; + use std::thread; + use tokio::net::TcpStream; + use tokio::runtime; + + static TUNNEL_UA: &str = "tunnel-test/x.y"; + static TUNNEL_OK: &[u8] = b"\ + HTTP/1.1 200 OK\r\n\ + \r\n\ + "; + + macro_rules! mock_tunnel { + () => {{ + mock_tunnel!(TUNNEL_OK) + }}; + ($write:expr) => {{ + mock_tunnel!($write, "") + }}; + ($write:expr, $auth:expr) => {{ + let listener = TcpListener::bind("127.0.0.1:0").unwrap(); + let addr = listener.local_addr().unwrap(); + let connect_expected = format!( + "\ + CONNECT {0}:{1} HTTP/1.1\r\n\ + Host: {0}:{1}\r\n\ + User-Agent: {2}\r\n\ + {3}\ + \r\n\ + ", + addr.ip(), + addr.port(), + TUNNEL_UA, + $auth + ) + .into_bytes(); + + thread::spawn(move || { + let (mut sock, _) = listener.accept().unwrap(); + let mut buf = [0u8; 4096]; + let n = sock.read(&mut buf).unwrap(); + assert_eq!(&buf[..n], &connect_expected[..]); + + sock.write_all($write).unwrap(); + }); + addr + }}; + } + + fn ua() -> Option<http::header::HeaderValue> { + Some(http::header::HeaderValue::from_static(TUNNEL_UA)) + } + + #[test] + fn test_tunnel() { + let addr = mock_tunnel!(); + + let rt = runtime::Builder::new_current_thread() + .enable_all() + .build() + .expect("new rt"); + let f = async move { + let tcp = TcpStream::connect(&addr).await?; + let host = addr.ip().to_string(); + let port = addr.port(); + tunnel(tcp, host, port, ua(), None).await + }; + + rt.block_on(f).unwrap(); + } + + #[test] + fn test_tunnel_eof() { + let addr = mock_tunnel!(b"HTTP/1.1 200 OK"); + + let rt = runtime::Builder::new_current_thread() + .enable_all() + .build() + .expect("new rt"); + let f = async move { + let tcp = TcpStream::connect(&addr).await?; + let host = addr.ip().to_string(); + let port = addr.port(); + tunnel(tcp, host, port, ua(), None).await + }; + + rt.block_on(f).unwrap_err(); + } + + #[test] + fn test_tunnel_non_http_response() { + let addr = mock_tunnel!(b"foo bar baz hallo"); + + let rt = runtime::Builder::new_current_thread() + .enable_all() + .build() + .expect("new rt"); + let f = async move { + let tcp = TcpStream::connect(&addr).await?; + let host = addr.ip().to_string(); + let port = addr.port(); + tunnel(tcp, host, port, ua(), None).await + }; + + rt.block_on(f).unwrap_err(); + } + + #[test] + fn test_tunnel_proxy_unauthorized() { + let addr = mock_tunnel!( + b"\ + HTTP/1.1 407 Proxy Authentication Required\r\n\ + Proxy-Authenticate: Basic realm=\"nope\"\r\n\ + \r\n\ + " + ); + + let rt = runtime::Builder::new_current_thread() + .enable_all() + .build() + .expect("new rt"); + let f = async move { + let tcp = TcpStream::connect(&addr).await?; + let host = addr.ip().to_string(); + let port = addr.port(); + tunnel(tcp, host, port, ua(), None).await + }; + + let error = rt.block_on(f).unwrap_err(); + assert_eq!(error.to_string(), "proxy authentication required"); + } + + #[test] + fn test_tunnel_basic_auth() { + let addr = mock_tunnel!( + TUNNEL_OK, + "Proxy-Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==\r\n" + ); + + let rt = runtime::Builder::new_current_thread() + .enable_all() + .build() + .expect("new rt"); + let f = async move { + let tcp = TcpStream::connect(&addr).await?; + let host = addr.ip().to_string(); + let port = addr.port(); + tunnel( + tcp, + host, + port, + ua(), + Some(proxy::encode_basic_auth("Aladdin", "open sesame")), + ) + .await + }; + + rt.block_on(f).unwrap(); + } +} |