X-Git-Url: http://git.megacz.com/?a=blobdiff_plain;f=src%2Forg%2Fxwt%2FHTTP.java;h=526f0fcfde514ba961cb121ec6517a19fa5b3755;hb=677b804b810d8836fbf3c54118138c5a03c882ba;hp=6b054c5e433982bde9384de4db94c56f0f5d9ba9;hpb=fa18ff2c6785c96c00d19092338f404ad7f6240c;p=org.ibex.core.git diff --git a/src/org/xwt/HTTP.java b/src/org/xwt/HTTP.java index 6b054c5..526f0fc 100644 --- a/src/org/xwt/HTTP.java +++ b/src/org/xwt/HTTP.java @@ -1,4 +1,5 @@ // Copyright 2002 Adam Megacz, see the COPYING file for licensing [GPL]package org.xwt; +package org.xwt; import java.net.*; import java.io.*; @@ -55,44 +56,58 @@ public class HTTP { public HTTP(String url) throws MalformedURLException, IOException { this(url, false); } public HTTP(String url, boolean skipResolveCheck) throws MalformedURLException, IOException { - if (url.startsWith("https:")) { url = "http" + url.substring(5); ssl = true; } - if (!url.startsWith("http:")) throw new HTTPException("HTTP only supports http/https urls"); - this.url = new URL(url); + if (url.startsWith("https:")) { + this.url = new URL("http" + url.substring(5)); + ssl = true; + } else if (!url.startsWith("http:")) { + throw new HTTPException("HTTP only supports http/https urls"); + } else { + this.url = new URL(url); + } + if (!skipResolveCheck) resolveAndCheckIfFirewalled(this.url.getHost()); port = this.url.getPort(); path = this.url.getFile(); if (port == -1) port = ssl ? 443 : 80; host = this.url.getHost(); if (Log.on) Log.log(this, "creating HTTP object for connection to " + host + ":" + port); - addHeader("Host", host); // host header is always sent verbatim - if (!skipResolveCheck) host = resolveAndCheckIfFirewalled(host); // might have to use the strict IP if behind a proxy + init(); + } + /** this method initializes the HTTP object, resetting if needed (in case of a reconnect) */ + public void init() throws IOException { + headers = ""; + sock = null; + in = null; + out = null; + addHeader("Host", host); ProxyInfo pi = Platform.detectProxy(); if (sock == null && pi != null && pi.proxyAutoConfigFunction != null) sock = attemptPAC(pi.proxyAutoConfigFunction); if (sock == null && pi != null && ssl && pi.httpsProxyHost != null) sock = attemptHttpProxy(pi.httpsProxyHost, pi.httpsProxyPort); if (sock == null && pi != null && pi.httpProxyHost != null) sock = attemptHttpProxy(pi.httpProxyHost, pi.httpProxyPort); if (sock == null && pi != null && pi.socksProxyHost != null) sock = attemptSocksProxy(pi.socksProxyHost, pi.socksProxyPort); if (sock == null) sock = attemptDirect(); - if (sock == null) throw new HTTPException("all socket creation attempts have failed"); - sock.setTcpNoDelay(true); + if (sock == null) throw new HTTPException("unable to contact host " + host); } - // Safeguarded DNS Resolver /////////////////////////////////////////////////////////////////////////// /** * resolves the hostname and returns it as a string in the form "x.y.z.w", except for the special case "xmlrpc.xwt.org". * @throws HTTPException if the host falls within a firewalled netblock */ - private String resolveAndCheckIfFirewalled(String host) throws HTTPException { + private void resolveAndCheckIfFirewalled(String host) throws HTTPException { // special case - if (host.equals("xmlrpc.xwt.org")) return host; + if (host.equals("xmlrpc.xwt.org")) return; // cached - if (resolvedHosts.get(host) != null) return (String)resolvedHosts.get(host); + if (resolvedHosts.get(host) != null) return; if (Log.on) Log.log(this, " resolveAndCheckIfFirewalled: resolving " + host); + // if all scripts are trustworthy (local FS), continue + if (Main.originAddr == null) return; + // resolve using DNS try { InetAddress addr = InetAddress.getByName(host); @@ -101,7 +116,7 @@ public class HTTP { (quadbyte[0] == 192 && quadbyte[1] == 168) || (quadbyte[0] == 172 && (quadbyte[1] & 0xF0) == 16)) && !addr.equals(Main.originAddr)) throw new HTTPException("security violation: " + host + " [" + addr.getHostAddress() + "] is in a firewalled netblock"); - return addr.getHostAddress(); + return; } catch (UnknownHostException uhe) { } // resolve using xmlrpc.xwt.org @@ -111,7 +126,7 @@ public class HTTP { Object ret = new XMLRPC("http://xmlrpc.xwt.org/RPC2/", "dns.resolve").call(new Object[] { host }); if (ret == null || !(ret instanceof String)) throw new Exception(" xmlrpc.xwt.org returned non-String: " + ret); resolvedHosts.put(host, ret); - return (String)ret; + return; } catch (Throwable e) { throw new HTTPException("exception while attempting to use xmlrpc.xwt.org to resolve " + host + ": " + e); } @@ -140,10 +155,10 @@ public class HTTP { if (!ssl) { path = "http://" + host + ":" + port + path; } else { - if (Log.on) Log.log(this, "attempting to create HTTP proxied socket using proxy " + proxyHost + ":" + proxyPort); PrintWriter pw = new PrintWriter(new OutputStreamWriter(sock.getOutputStream())); BufferedReader br = new BufferedReader(new InputStreamReader(sock.getInputStream())); - pw.print("CONNECT " + host + ":" + port + " HTTP/1.0\r\n\r\n"); + pw.print("CONNECT " + host + ":" + port + " HTTP/1.1\r\n\r\n"); + pw.flush(); String s = br.readLine(); if (s.charAt(9) != '2') throw new HTTPException("proxy refused CONNECT method: \"" + s + "\""); while (br.readLine().length() > 0) { }; @@ -270,26 +285,32 @@ public class HTTP { out = sock.getOutputStream(); PrintWriter pw = new PrintWriter(new OutputStreamWriter(out)); pw.print("POST " + path + " HTTP/1.0\r\n"); - pw.print("Host: " + host + "\r\n"); pw.print("User-Agent: XWT\r\n"); pw.print("Content-length: " + contentLength + "\r\n"); pw.print(headers); + if (ProxyAuthorization.authorization != null) pw.print("Proxy-Authorization: " + ProxyAuthorization.authorization + "\r\n"); if (contentType != null) pw.print("Content-Type: " + contentType + "\r\n"); pw.print("\r\n"); + + // FIXME: check for HTTP "ok, go ahead" here, in case we need proxy authorization this can happen if the xwar is + // on the local disk and the first HTTP request is through an auth-requiring proxy + pw.flush(); return out; } public InputStream getInputStream() throws IOException { + if (in != null) return in; if (out != null) { out.flush(); } else { PrintWriter pw = new PrintWriter(new OutputStreamWriter(sock.getOutputStream())); pw.print("GET " + path + " HTTP/1.0\r\n"); - pw.print("Host: " + host + "\r\n"); pw.print("User-Agent: XWT\r\n"); pw.print(headers); + System.out.print(headers); + if (ProxyAuthorization.authorization != null) pw.print("Proxy-Authorization: " + ProxyAuthorization.authorization + "\r\n"); pw.print("\r\n"); pw.flush(); } @@ -297,7 +318,7 @@ public class HTTP { in = new BufferedInputStream(sock.getInputStream()); // we can't use a BufferedReader directly on the input stream, - // since it will buffer beyond the end of the headers + // since it will buffer past the end of the headers byte[] buf = new byte[4096]; int buflen = 0; while(true) { @@ -316,12 +337,38 @@ public class HTTP { String s = headerReader.readLine(); if (!s.startsWith("HTTP/")) throw new HTTPException("Expected reply to start with \"HTTP/\""); String reply = s.substring(s.indexOf(' ') + 1); - if (!reply.startsWith("2")) throw new HTTPException("HTTP Error: " + reply); - while((s = headerReader.readLine()) != null) { - if (s.length() > 15 && s.substring(0, 15).equalsIgnoreCase("content-length: ")) - contentLength = Integer.parseInt(s.substring(15)); + + if (reply.startsWith("407")) { + if (Log.on) Log.log(this, "Proxy Auth Required: HTTP " + reply); + String realm = ""; + String style = "Basic"; + + while((s = headerReader.readLine()) != null) + if (s.startsWith("Proxy-Authenticate:")) { + s = s.substring(19); + while(s.charAt(0) == ' ') s = s.substring(1); + style = s.substring(0, s.indexOf(' ')); + s = s.substring(s.indexOf(' ')); + s = s.substring(s.indexOf("realm")); + s = s.substring(s.indexOf('\"') + 1); + s = s.substring(0, s.indexOf('\"')); + realm = s; + } + + ProxyAuthorization.getPassword(realm, style, sock.getInetAddress().getHostAddress(), ProxyAuthorization.authorization); + + // reset and re-try + init(); + return getInputStream(); + + } else if (!reply.startsWith("2")) { + throw new HTTPException("HTTP Error: " + reply); } + while((s = headerReader.readLine()) != null) + if (s.length() > 15 && s.substring(0, 16).equalsIgnoreCase("content-length: ")) + contentLength = Integer.parseInt(s.substring(16)); + return in; } @@ -364,34 +411,56 @@ public class HTTP { /** the PAC script */ public Function proxyAutoConfigFunction = null; + // this method has been disabled because it was causing problems -- some domains are set up so that *.foo.com resolves + // to a single IP, for any value of *. If the client's home domain is foo.com, then xwt-proxy-httpHost will resolve erroneously. public static ProxyInfo detectProxyViaManual() { - try { - // continue iff one of the two resolves - try { InetAddress.getByName("xwt-proxy-httpHost"); } - catch (UnknownHostException e) { InetAddress.getByName("xwt-proxy-socksHost"); } - - if (Log.on) Log.log(Platform.class, "using xwt-proxy-* configuration"); - ProxyInfo ret = new ProxyInfo(); - try { - ret.httpProxyHost = InetAddress.getByName("xwt-proxy-httpHost").getHostAddress(); - byte[] quadbyte = InetAddress.getByName("xwt-proxy-httpPort").getAddress(); - ret.httpProxyPort = ((quadbyte[1] & 0xff) * 10000) + ((quadbyte[2] & 0xff) * 100) + (quadbyte[3] & 0xff); - } catch (UnknownHostException e) { } - try { - ret.httpsProxyHost = InetAddress.getByName("xwt-proxy-httpsHost").getHostAddress(); - byte[] quadbyte = InetAddress.getByName("xwt-proxy-httpsPort").getAddress(); - ret.httpsProxyPort = ((quadbyte[1] & 0xff) * 10000) + ((quadbyte[2] & 0xff) * 100) + (quadbyte[3] & 0xff); - } catch (UnknownHostException e) { } - try { - ret.socksProxyHost = InetAddress.getByName("xwt-proxy-socksHost").getHostAddress(); - byte[] quadbyte = InetAddress.getByName("xwt-proxy-socksPort").getAddress(); - ret.socksProxyPort = ((quadbyte[1] & 0xff) * 10000) + ((quadbyte[2] & 0xff) * 100) + (quadbyte[3] & 0xff); - } catch (UnknownHostException e) { } - return ret; - } catch (UnknownHostException e) { - if (Log.on) Log.log(Platform.class, "xwt-proxy-* detection failed due to: " + e); - return null; + ProxyInfo ret = new ProxyInfo(); + + ret.httpProxyHost = Platform.getEnv("http_proxy"); + if (ret.httpProxyHost != null) { + if (ret.httpProxyHost.startsWith("http://")) ret.httpProxyHost = ret.httpProxyHost.substring(7); + if (ret.httpProxyHost.endsWith("/")) ret.httpProxyHost = ret.httpProxyHost.substring(0, ret.httpProxyHost.length() - 1); + if (ret.httpProxyHost.indexOf(':') != -1) { + ret.httpProxyPort = Integer.parseInt(ret.httpProxyHost.substring(ret.httpProxyHost.indexOf(':') + 1)); + ret.httpProxyHost = ret.httpProxyHost.substring(0, ret.httpProxyHost.indexOf(':')); + } else { + ret.httpProxyPort = 80; + } + } + + ret.httpsProxyHost = Platform.getEnv("https_proxy"); + if (ret.httpsProxyHost != null) { + if (ret.httpsProxyHost.startsWith("https://")) ret.httpsProxyHost = ret.httpsProxyHost.substring(7); + if (ret.httpsProxyHost.endsWith("/")) ret.httpsProxyHost = ret.httpsProxyHost.substring(0, ret.httpsProxyHost.length() - 1); + if (ret.httpsProxyHost.indexOf(':') != -1) { + ret.httpsProxyPort = Integer.parseInt(ret.httpsProxyHost.substring(ret.httpsProxyHost.indexOf(':') + 1)); + ret.httpsProxyHost = ret.httpsProxyHost.substring(0, ret.httpsProxyHost.indexOf(':')); + } else { + ret.httpsProxyPort = 80; + } + } + + ret.socksProxyHost = Platform.getEnv("socks_proxy"); + if (ret.socksProxyHost != null) { + if (ret.socksProxyHost.startsWith("socks://")) ret.socksProxyHost = ret.socksProxyHost.substring(7); + if (ret.socksProxyHost.endsWith("/")) ret.socksProxyHost = ret.socksProxyHost.substring(0, ret.socksProxyHost.length() - 1); + if (ret.socksProxyHost.indexOf(':') != -1) { + ret.socksProxyPort = Integer.parseInt(ret.socksProxyHost.substring(ret.socksProxyHost.indexOf(':') + 1)); + ret.socksProxyHost = ret.socksProxyHost.substring(0, ret.socksProxyHost.indexOf(':')); + } else { + ret.socksProxyPort = 80; + } + } + + String noproxy = Platform.getEnv("no_proxy"); + if (noproxy != null) { + StringTokenizer st = new StringTokenizer(noproxy, ","); + ret.excluded = new String[st.countTokens()]; + for(int i=0; st.hasMoreTokens(); i++) ret.excluded[i] = st.nextToken(); } + + if (ret.httpProxyHost == null && ret.socksProxyHost == null) return null; + return ret; } // FIXME: search up from default domain @@ -418,8 +487,26 @@ public class HTTP { String s = null; String script = ""; while((s = br.readLine()) != null) script += s + "\n"; - if (Log.on) Log.log(HTTP.ProxyInfo.class, "successfully retrieved WPAD PAC:"); - if (Log.on) Log.log(HTTP.ProxyInfo.class, script); + if (Log.on) Log.log(ProxyInfo.class, "successfully retrieved WPAD PAC:"); + if (Log.on) Log.log(ProxyInfo.class, script); + + // MS CARP hack + Vector carpHosts = new Vector(); + for(int i=0; i= d1 && day <= d2) || + (d1 > d2 && (day >= d1 || day <= d2))) ? + Boolean.TRUE : Boolean.FALSE; } }; @@ -585,4 +697,34 @@ public class HTTP { } + // ProxyAuthorization /////////////////////////////////////////////////////////////////////////////////// + + public static class ProxyAuthorization { + + static public String authorization = null; + static public Semaphore waitingForUser = new Semaphore(); + + // FIXME: Digest and NTLM + public static synchronized void getPassword(final String realm, final String style, final String proxyIP, String oldAuth) { + + // this handles cases where multiple threads hit the proxy auth at the same time -- all but one will block on the + // synchronized keyword. If 'authorization' changed while the thread was blocked, it means that the user entered + // a password, so we should reattempt authorization. + + if (authorization != oldAuth) return; + if (Log.on) Log.log(ProxyAuthorization.class, "displaying proxy authorization dialog"); + MessageQueue.add(new Message() { + public void perform() { + Box b = new Box("org.xwt.builtin.proxy_authorization", null); + b.put("realm", realm); + b.put("proxyIP", proxyIP); + } + }); + + waitingForUser.block(); + if (Log.on) Log.log(ProxyAuthorization.class, "got proxy authorization info; re-attempting connection"); + + } + } + }