mirror of
https://github.com/curl/curl.git
synced 2024-12-21 06:50:10 +08:00
671158242d
New cfilter HTTP-CONNECT for h3/h2/http1.1 eyeballing. - filter is installed when `--http3` in the tool is used (or the equivalent CURLOPT_ done in the library) - starts a QUIC/HTTP/3 connect right away. Should that not succeed after 100ms (subject to change), a parallel attempt is started for HTTP/2 and HTTP/1.1 via TCP - both attempts are subject to IPv6/IPv4 eyeballing, same as happens for other connections - tie timeout to the ip-version HAPPY_EYEBALLS_TIMEOUT - use a `soft` timeout at half the value. When the soft timeout expires, the HTTPS-CONNECT filter checks if the QUIC filter has received any data from the server. If not, it will start the HTTP/2 attempt. HTTP/3(ngtcp2) improvements. - setting call_data in all cfilter calls similar to http/2 and vtls filters for use in callback where no stream data is available. - returning CURLE_PARTIAL_FILE for prematurely terminated transfers - enabling pytest test_05 for h3 - shifting functionality to "connect" UDP sockets from ngtcp2 implementation into the udp socket cfilter. Because unconnected UDP sockets are weird. For example they error when adding to a pollset. HTTP/3(quiche) improvements. - fixed upload bug in quiche implementation, now passes 251 and pytest - error codes on stream RESET - improved debug logs - handling of DRAIN during connect - limiting pending event queue HTTP/2 cfilter improvements. - use LOG_CF macros for dynamic logging in debug build - fix CURLcode on RST streams to be CURLE_PARTIAL_FILE - enable pytest test_05 for h2 - fix upload pytests and improve parallel transfer performance. GOAWAY handling for ngtcp2/quiche - during connect, when the remote server refuses to accept new connections and closes immediately (so the local conn goes into DRAIN phase), the connection is torn down and a another attempt is made after a short grace period. This is the behaviour observed with nghttpx when we tell it to shut down gracefully. Tested in pytest test_03_02. TLS improvements - ALPN selection for SSL/SSL-PROXY filters in one vtls set of functions, replaces copy of logic in all tls backends. - standardized the infof logging of offered ALPNs - ALPN negotiated: have common function for all backends that sets alpn proprty and connection related things based on the negotiated protocol (or lack thereof). - new tests/tests-httpd/scorecard.py for testing h3/h2 protocol implementation. Invoke: python3 tests/tests-httpd/scorecard.py --help for usage. Improvements on gathering connect statistics and socket access. - new CF_CTRL_CONN_REPORT_STATS cfilter control for having cfilters report connection statistics. This is triggered when the connection has completely connected. - new void Curl_pgrsTimeWas(..) method to report a timer update with a timestamp of when it happend. This allows for updating timers "later", e.g. a connect statistic after full connectivity has been reached. - in case of HTTP eyeballing, the previous changes will update statistics only from the filter chain that "won" the eyeballing. - new cfilter query CF_QUERY_SOCKET for retrieving the socket used by a filter chain. Added methods Curl_conn_cf_get_socket() and Curl_conn_get_socket() for convenient use of this query. - Change VTLS backend to query their sub-filters for the socket when checks during the handshake are made. HTTP/3 documentation on how https eyeballing works. TLS improvements - ALPN selection for SSL/SSL-PROXY filters in one vtls set of functions, replaces copy of logic in all tls backends. - standardized the infof logging of offered ALPNs - ALPN negotiated: have common function for all backends that sets alpn proprty and connection related things based on the negotiated protocol (or lack thereof). Scorecard with Caddy. - configure can be run with `--with-test-caddy=path` to specify which caddy to use for testing - tests/tests-httpd/scorecard.py now measures download speeds with caddy pytest improvements - adding Makfile to clean gen dir - adding nghttpx rundir creation on start - checking httpd version 2.4.55 for test_05 cases where it is needed. Skipping with message if too old. - catch exception when checking for caddy existance on system. Closes #10349
1393 lines
39 KiB
C
1393 lines
39 KiB
C
/***************************************************************************
|
|
* _ _ ____ _
|
|
* Project ___| | | | _ \| |
|
|
* / __| | | | |_) | |
|
|
* | (__| |_| | _ <| |___
|
|
* \___|\___/|_| \_\_____|
|
|
*
|
|
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
|
*
|
|
* This software is licensed as described in the file COPYING, which
|
|
* you should have received as part of this distribution. The terms
|
|
* are also available at https://curl.se/docs/copyright.html.
|
|
*
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
*
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
* KIND, either express or implied.
|
|
*
|
|
* SPDX-License-Identifier: curl
|
|
*
|
|
***************************************************************************/
|
|
|
|
#include "curl_setup.h"
|
|
|
|
#ifdef HAVE_NETINET_IN_H
|
|
#include <netinet/in.h> /* <netinet/tcp.h> may need it */
|
|
#endif
|
|
#ifdef HAVE_SYS_UN_H
|
|
#include <sys/un.h> /* for sockaddr_un */
|
|
#endif
|
|
#ifdef HAVE_LINUX_TCP_H
|
|
#include <linux/tcp.h>
|
|
#elif defined(HAVE_NETINET_TCP_H)
|
|
#include <netinet/tcp.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_IOCTL_H
|
|
#include <sys/ioctl.h>
|
|
#endif
|
|
#ifdef HAVE_NETDB_H
|
|
#include <netdb.h>
|
|
#endif
|
|
#ifdef HAVE_FCNTL_H
|
|
#include <fcntl.h>
|
|
#endif
|
|
#ifdef HAVE_ARPA_INET_H
|
|
#include <arpa/inet.h>
|
|
#endif
|
|
|
|
#ifdef __VMS
|
|
#include <in.h>
|
|
#include <inet.h>
|
|
#endif
|
|
|
|
#include "urldata.h"
|
|
#include "sendf.h"
|
|
#include "if2ip.h"
|
|
#include "strerror.h"
|
|
#include "cfilters.h"
|
|
#include "connect.h"
|
|
#include "cf-http.h"
|
|
#include "cf-socket.h"
|
|
#include "select.h"
|
|
#include "url.h" /* for Curl_safefree() */
|
|
#include "multiif.h"
|
|
#include "sockaddr.h" /* required for Curl_sockaddr_storage */
|
|
#include "inet_ntop.h"
|
|
#include "inet_pton.h"
|
|
#include "vtls/vtls.h" /* for vtsl cfilters */
|
|
#include "progress.h"
|
|
#include "warnless.h"
|
|
#include "conncache.h"
|
|
#include "multihandle.h"
|
|
#include "share.h"
|
|
#include "version_win32.h"
|
|
#include "vquic/vquic.h" /* for quic cfilters */
|
|
#include "http_proxy.h"
|
|
#include "socks.h"
|
|
|
|
/* The last 3 #include files should be in this order */
|
|
#include "curl_printf.h"
|
|
#include "curl_memory.h"
|
|
#include "memdebug.h"
|
|
|
|
|
|
/*
|
|
* Curl_timeleft() returns the amount of milliseconds left allowed for the
|
|
* transfer/connection. If the value is 0, there's no timeout (ie there's
|
|
* infinite time left). If the value is negative, the timeout time has already
|
|
* elapsed.
|
|
*
|
|
* If 'nowp' is non-NULL, it points to the current time.
|
|
* 'duringconnect' is FALSE if not during a connect, as then of course the
|
|
* connect timeout is not taken into account!
|
|
*
|
|
* @unittest: 1303
|
|
*/
|
|
|
|
#define TIMEOUT_CONNECT 1
|
|
#define TIMEOUT_MAXTIME 2
|
|
|
|
timediff_t Curl_timeleft(struct Curl_easy *data,
|
|
struct curltime *nowp,
|
|
bool duringconnect)
|
|
{
|
|
unsigned int timeout_set = 0;
|
|
timediff_t connect_timeout_ms = 0;
|
|
timediff_t maxtime_timeout_ms = 0;
|
|
timediff_t timeout_ms = 0;
|
|
struct curltime now;
|
|
|
|
/* The duration of a connect and the total transfer are calculated from two
|
|
different time-stamps. It can end up with the total timeout being reached
|
|
before the connect timeout expires and we must acknowledge whichever
|
|
timeout that is reached first. The total timeout is set per entire
|
|
operation, while the connect timeout is set per connect. */
|
|
|
|
if(data->set.timeout > 0) {
|
|
timeout_set = TIMEOUT_MAXTIME;
|
|
maxtime_timeout_ms = data->set.timeout;
|
|
}
|
|
if(duringconnect) {
|
|
timeout_set |= TIMEOUT_CONNECT;
|
|
connect_timeout_ms = (data->set.connecttimeout > 0) ?
|
|
data->set.connecttimeout : DEFAULT_CONNECT_TIMEOUT;
|
|
}
|
|
if(!timeout_set)
|
|
/* no timeout */
|
|
return 0;
|
|
|
|
if(!nowp) {
|
|
now = Curl_now();
|
|
nowp = &now;
|
|
}
|
|
|
|
if(timeout_set & TIMEOUT_MAXTIME) {
|
|
maxtime_timeout_ms -= Curl_timediff(*nowp, data->progress.t_startop);
|
|
timeout_ms = maxtime_timeout_ms;
|
|
}
|
|
|
|
if(timeout_set & TIMEOUT_CONNECT) {
|
|
connect_timeout_ms -= Curl_timediff(*nowp, data->progress.t_startsingle);
|
|
|
|
if(!(timeout_set & TIMEOUT_MAXTIME) ||
|
|
(connect_timeout_ms < maxtime_timeout_ms))
|
|
timeout_ms = connect_timeout_ms;
|
|
}
|
|
|
|
if(!timeout_ms)
|
|
/* avoid returning 0 as that means no timeout! */
|
|
return -1;
|
|
|
|
return timeout_ms;
|
|
}
|
|
|
|
/* Copies connection info into the transfer handle to make it available when
|
|
the transfer handle is no longer associated with the connection. */
|
|
void Curl_persistconninfo(struct Curl_easy *data, struct connectdata *conn,
|
|
char *local_ip, int local_port)
|
|
{
|
|
memcpy(data->info.conn_primary_ip, conn->primary_ip, MAX_IPADR_LEN);
|
|
if(local_ip && local_ip[0])
|
|
memcpy(data->info.conn_local_ip, local_ip, MAX_IPADR_LEN);
|
|
else
|
|
data->info.conn_local_ip[0] = 0;
|
|
data->info.conn_scheme = conn->handler->scheme;
|
|
/* conn_protocol can only provide "old" protocols */
|
|
data->info.conn_protocol = (conn->handler->protocol) & CURLPROTO_MASK;
|
|
data->info.conn_primary_port = conn->port;
|
|
data->info.conn_remote_port = conn->remote_port;
|
|
data->info.conn_local_port = local_port;
|
|
}
|
|
|
|
static const struct Curl_addrinfo *
|
|
addr_first_match(const struct Curl_addrinfo *addr, int family)
|
|
{
|
|
while(addr) {
|
|
if(addr->ai_family == family)
|
|
return addr;
|
|
addr = addr->ai_next;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static const struct Curl_addrinfo *
|
|
addr_next_match(const struct Curl_addrinfo *addr, int family)
|
|
{
|
|
while(addr->ai_next) {
|
|
addr = addr->ai_next;
|
|
if(addr->ai_family == family)
|
|
return addr;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* retrieves ip address and port from a sockaddr structure.
|
|
note it calls Curl_inet_ntop which sets errno on fail, not SOCKERRNO. */
|
|
bool Curl_addr2string(struct sockaddr *sa, curl_socklen_t salen,
|
|
char *addr, int *port)
|
|
{
|
|
struct sockaddr_in *si = NULL;
|
|
#ifdef ENABLE_IPV6
|
|
struct sockaddr_in6 *si6 = NULL;
|
|
#endif
|
|
#if (defined(HAVE_SYS_UN_H) || defined(WIN32_SOCKADDR_UN)) && defined(AF_UNIX)
|
|
struct sockaddr_un *su = NULL;
|
|
#else
|
|
(void)salen;
|
|
#endif
|
|
|
|
switch(sa->sa_family) {
|
|
case AF_INET:
|
|
si = (struct sockaddr_in *)(void *) sa;
|
|
if(Curl_inet_ntop(sa->sa_family, &si->sin_addr,
|
|
addr, MAX_IPADR_LEN)) {
|
|
unsigned short us_port = ntohs(si->sin_port);
|
|
*port = us_port;
|
|
return TRUE;
|
|
}
|
|
break;
|
|
#ifdef ENABLE_IPV6
|
|
case AF_INET6:
|
|
si6 = (struct sockaddr_in6 *)(void *) sa;
|
|
if(Curl_inet_ntop(sa->sa_family, &si6->sin6_addr,
|
|
addr, MAX_IPADR_LEN)) {
|
|
unsigned short us_port = ntohs(si6->sin6_port);
|
|
*port = us_port;
|
|
return TRUE;
|
|
}
|
|
break;
|
|
#endif
|
|
#if (defined(HAVE_SYS_UN_H) || defined(WIN32_SOCKADDR_UN)) && defined(AF_UNIX)
|
|
case AF_UNIX:
|
|
if(salen > (curl_socklen_t)sizeof(CURL_SA_FAMILY_T)) {
|
|
su = (struct sockaddr_un*)sa;
|
|
msnprintf(addr, MAX_IPADR_LEN, "%s", su->sun_path);
|
|
}
|
|
else
|
|
addr[0] = 0; /* socket with no name */
|
|
*port = 0;
|
|
return TRUE;
|
|
#endif
|
|
default:
|
|
break;
|
|
}
|
|
|
|
addr[0] = '\0';
|
|
*port = 0;
|
|
errno = EAFNOSUPPORT;
|
|
return FALSE;
|
|
}
|
|
|
|
struct connfind {
|
|
long id_tofind;
|
|
struct connectdata *found;
|
|
};
|
|
|
|
static int conn_is_conn(struct Curl_easy *data,
|
|
struct connectdata *conn, void *param)
|
|
{
|
|
struct connfind *f = (struct connfind *)param;
|
|
(void)data;
|
|
if(conn->connection_id == f->id_tofind) {
|
|
f->found = conn;
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Used to extract socket and connectdata struct for the most recent
|
|
* transfer on the given Curl_easy.
|
|
*
|
|
* The returned socket will be CURL_SOCKET_BAD in case of failure!
|
|
*/
|
|
curl_socket_t Curl_getconnectinfo(struct Curl_easy *data,
|
|
struct connectdata **connp)
|
|
{
|
|
DEBUGASSERT(data);
|
|
|
|
/* this works for an easy handle:
|
|
* - that has been used for curl_easy_perform()
|
|
* - that is associated with a multi handle, and whose connection
|
|
* was detached with CURLOPT_CONNECT_ONLY
|
|
*/
|
|
if((data->state.lastconnect_id != -1) && (data->multi_easy || data->multi)) {
|
|
struct connectdata *c;
|
|
struct connfind find;
|
|
find.id_tofind = data->state.lastconnect_id;
|
|
find.found = NULL;
|
|
|
|
Curl_conncache_foreach(data,
|
|
data->share && (data->share->specifier
|
|
& (1<< CURL_LOCK_DATA_CONNECT))?
|
|
&data->share->conn_cache:
|
|
data->multi_easy?
|
|
&data->multi_easy->conn_cache:
|
|
&data->multi->conn_cache, &find, conn_is_conn);
|
|
|
|
if(!find.found) {
|
|
data->state.lastconnect_id = -1;
|
|
return CURL_SOCKET_BAD;
|
|
}
|
|
|
|
c = find.found;
|
|
if(connp)
|
|
/* only store this if the caller cares for it */
|
|
*connp = c;
|
|
return c->sock[FIRSTSOCKET];
|
|
}
|
|
return CURL_SOCKET_BAD;
|
|
}
|
|
|
|
/*
|
|
* Curl_conncontrol() marks streams or connection for closure.
|
|
*/
|
|
void Curl_conncontrol(struct connectdata *conn,
|
|
int ctrl /* see defines in header */
|
|
#if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
|
|
, const char *reason
|
|
#endif
|
|
)
|
|
{
|
|
/* close if a connection, or a stream that isn't multiplexed. */
|
|
/* This function will be called both before and after this connection is
|
|
associated with a transfer. */
|
|
bool closeit, is_multiplex;
|
|
DEBUGASSERT(conn);
|
|
#if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
|
|
(void)reason; /* useful for debugging */
|
|
#endif
|
|
is_multiplex = Curl_conn_is_multiplex(conn, FIRSTSOCKET);
|
|
closeit = (ctrl == CONNCTRL_CONNECTION) ||
|
|
((ctrl == CONNCTRL_STREAM) && !is_multiplex);
|
|
if((ctrl == CONNCTRL_STREAM) && is_multiplex)
|
|
; /* stream signal on multiplex conn never affects close state */
|
|
else if((bit)closeit != conn->bits.close) {
|
|
conn->bits.close = closeit; /* the only place in the source code that
|
|
should assign this bit */
|
|
}
|
|
}
|
|
|
|
/**
|
|
* job walking the matching addr infos, creating a sub-cfilter with the
|
|
* provided method `cf_create` and running setup/connect on it.
|
|
*/
|
|
struct eyeballer {
|
|
const char *name;
|
|
const struct Curl_addrinfo *addr; /* List of addresses to try, not owned */
|
|
int ai_family; /* matching address family only */
|
|
cf_ip_connect_create *cf_create; /* for creating cf */
|
|
struct Curl_cfilter *cf; /* current sub-cfilter connecting */
|
|
struct eyeballer *primary; /* eyeballer this one is backup for */
|
|
timediff_t delay_ms; /* delay until start */
|
|
struct curltime started; /* start of current attempt */
|
|
timediff_t timeoutms; /* timeout for current attempt */
|
|
expire_id timeout_id; /* ID for Curl_expire() */
|
|
CURLcode result;
|
|
int error;
|
|
BIT(has_started); /* attempts have started */
|
|
BIT(is_done); /* out of addresses/time */
|
|
BIT(connected); /* cf has connected */
|
|
};
|
|
|
|
|
|
typedef enum {
|
|
SCFST_INIT,
|
|
SCFST_WAITING,
|
|
SCFST_DONE
|
|
} cf_connect_state;
|
|
|
|
struct cf_he_ctx {
|
|
int transport;
|
|
cf_ip_connect_create *cf_create;
|
|
const struct Curl_dns_entry *remotehost;
|
|
cf_connect_state state;
|
|
struct eyeballer *baller[2];
|
|
struct eyeballer *winner;
|
|
struct curltime started;
|
|
};
|
|
|
|
static CURLcode eyeballer_new(struct eyeballer **pballer,
|
|
cf_ip_connect_create *cf_create,
|
|
const struct Curl_addrinfo *addr,
|
|
int ai_family,
|
|
struct eyeballer *primary,
|
|
timediff_t delay_ms,
|
|
timediff_t timeout_ms,
|
|
expire_id timeout_id)
|
|
{
|
|
struct eyeballer *baller;
|
|
|
|
*pballer = NULL;
|
|
baller = calloc(1, sizeof(*baller) + 1000);
|
|
if(!baller)
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
baller->name = ((ai_family == AF_INET)? "ipv4" : (
|
|
#ifdef ENABLE_IPV6
|
|
(ai_family == AF_INET6)? "ipv6" :
|
|
#endif
|
|
"ip"));
|
|
baller->cf_create = cf_create;
|
|
baller->addr = addr;
|
|
baller->ai_family = ai_family;
|
|
baller->primary = primary;
|
|
baller->delay_ms = delay_ms;
|
|
baller->timeoutms = (addr && addr->ai_next)? timeout_ms / 2 : timeout_ms;
|
|
baller->timeout_id = timeout_id;
|
|
baller->result = CURLE_COULDNT_CONNECT;
|
|
|
|
*pballer = baller;
|
|
return CURLE_OK;
|
|
}
|
|
|
|
static void baller_close(struct eyeballer *baller,
|
|
struct Curl_easy *data)
|
|
{
|
|
if(baller && baller->cf) {
|
|
Curl_conn_cf_discard_chain(&baller->cf, data);
|
|
}
|
|
}
|
|
|
|
static void baller_free(struct eyeballer *baller,
|
|
struct Curl_easy *data)
|
|
{
|
|
if(baller) {
|
|
baller_close(baller, data);
|
|
free(baller);
|
|
}
|
|
}
|
|
|
|
static void baller_next_addr(struct eyeballer *baller)
|
|
{
|
|
baller->addr = addr_next_match(baller->addr, baller->ai_family);
|
|
}
|
|
|
|
/*
|
|
* Initiate a connect attempt walk.
|
|
*
|
|
* Note that even on connect fail it returns CURLE_OK, but with 'sock' set to
|
|
* CURL_SOCKET_BAD. Other errors will however return proper errors.
|
|
*/
|
|
static void baller_initiate(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
struct eyeballer *baller)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
struct Curl_cfilter *cf_prev = baller->cf;
|
|
struct Curl_cfilter *wcf;
|
|
CURLcode result;
|
|
|
|
|
|
/* Don't close a previous cfilter yet to ensure that the next IP's
|
|
socket gets a different file descriptor, which can prevent bugs when
|
|
the curl_multi_socket_action interface is used with certain select()
|
|
replacements such as kqueue. */
|
|
result = baller->cf_create(&baller->cf, data, cf->conn, baller->addr,
|
|
ctx->transport);
|
|
if(result)
|
|
goto out;
|
|
|
|
/* the new filter might have sub-filters */
|
|
for(wcf = baller->cf; wcf; wcf = wcf->next) {
|
|
wcf->conn = cf->conn;
|
|
wcf->sockindex = cf->sockindex;
|
|
}
|
|
|
|
if(baller->addr && baller->addr->ai_next) {
|
|
Curl_expire(data, baller->timeoutms, baller->timeout_id);
|
|
}
|
|
|
|
out:
|
|
if(result) {
|
|
DEBUGF(LOG_CF(data, cf, "%s failed", baller->name));
|
|
baller_close(baller, data);
|
|
}
|
|
if(cf_prev)
|
|
Curl_conn_cf_discard_chain(&cf_prev, data);
|
|
baller->result = result;
|
|
}
|
|
|
|
/**
|
|
* Start a connection attempt on the current baller address.
|
|
* Will return CURLE_OK on the first address where a socket
|
|
* could be created and the non-blocking connect started.
|
|
* Returns error when all remaining addresses have been tried.
|
|
*/
|
|
static CURLcode baller_start(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
struct eyeballer *baller,
|
|
timediff_t timeoutms)
|
|
{
|
|
baller->error = 0;
|
|
baller->connected = FALSE;
|
|
baller->has_started = TRUE;
|
|
|
|
while(baller->addr) {
|
|
baller->started = Curl_now();
|
|
baller->timeoutms = (baller->addr->ai_next == NULL) ?
|
|
timeoutms : timeoutms / 2;
|
|
baller_initiate(cf, data, baller);
|
|
if(!baller->result)
|
|
break;
|
|
baller_next_addr(baller);
|
|
}
|
|
if(!baller->addr) {
|
|
baller->is_done = TRUE;
|
|
}
|
|
return baller->result;
|
|
}
|
|
|
|
|
|
/* Used within the multi interface. Try next IP address, returns error if no
|
|
more address exists or error */
|
|
static CURLcode baller_start_next(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
struct eyeballer *baller,
|
|
timediff_t timeoutms)
|
|
{
|
|
if(cf->sockindex == FIRSTSOCKET) {
|
|
baller_next_addr(baller);
|
|
baller_start(cf, data, baller, timeoutms);
|
|
}
|
|
else {
|
|
baller->error = 0;
|
|
baller->connected = FALSE;
|
|
baller->has_started = TRUE;
|
|
baller->is_done = TRUE;
|
|
baller->result = CURLE_COULDNT_CONNECT;
|
|
}
|
|
return baller->result;
|
|
}
|
|
|
|
static CURLcode baller_connect(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
struct eyeballer *baller,
|
|
struct curltime *now,
|
|
bool *connected)
|
|
{
|
|
(void)cf;
|
|
*connected = baller->connected;
|
|
if(!baller->result && !*connected) {
|
|
/* evaluate again */
|
|
baller->result = Curl_conn_cf_connect(baller->cf, data, 0, connected);
|
|
|
|
if(!baller->result) {
|
|
if (*connected) {
|
|
baller->connected = TRUE;
|
|
baller->is_done = TRUE;
|
|
}
|
|
else if(Curl_timediff(*now, baller->started) >= baller->timeoutms) {
|
|
infof(data, "%s connect timeout after %" CURL_FORMAT_TIMEDIFF_T
|
|
"ms, move on!", baller->name, baller->timeoutms);
|
|
#if defined(ETIMEDOUT)
|
|
baller->error = ETIMEDOUT;
|
|
#endif
|
|
baller->result = CURLE_OPERATION_TIMEDOUT;
|
|
}
|
|
}
|
|
}
|
|
return baller->result;
|
|
}
|
|
|
|
/*
|
|
* is_connected() checks if the socket has connected.
|
|
*/
|
|
static CURLcode is_connected(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
bool *connected)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
struct connectdata *conn = cf->conn;
|
|
CURLcode result;
|
|
struct curltime now;
|
|
size_t i;
|
|
int ongoing, not_started;
|
|
const char *hostname;
|
|
|
|
/* Check if any of the conn->tempsock we use for establishing connections
|
|
* succeeded and, if so, close any ongoing other ones.
|
|
* Transfer the successful conn->tempsock to conn->sock[sockindex]
|
|
* and set conn->tempsock to CURL_SOCKET_BAD.
|
|
* If transport is QUIC, we need to shutdown the ongoing 'other'
|
|
* cot ballers in a QUIC appropriate way. */
|
|
evaluate:
|
|
*connected = FALSE; /* a very negative world view is best */
|
|
now = Curl_now();
|
|
ongoing = not_started = 0;
|
|
for(i = 0; i < sizeof(ctx->baller)/sizeof(ctx->baller[0]); i++) {
|
|
struct eyeballer *baller = ctx->baller[i];
|
|
|
|
if(!baller || baller->is_done)
|
|
continue;
|
|
|
|
if(!baller->has_started) {
|
|
++not_started;
|
|
continue;
|
|
}
|
|
baller->result = baller_connect(cf, data, baller, &now, connected);
|
|
DEBUGF(LOG_CF(data, cf, "%s connect -> %d, connected=%d",
|
|
baller->name, baller->result, *connected));
|
|
|
|
if(!baller->result) {
|
|
if(*connected) {
|
|
/* connected, declare the winner */
|
|
ctx->winner = baller;
|
|
ctx->baller[i] = NULL;
|
|
break;
|
|
}
|
|
else { /* still waiting */
|
|
++ongoing;
|
|
}
|
|
}
|
|
else if(!baller->is_done) {
|
|
/* The baller failed to connect, start its next attempt */
|
|
if(baller->error) {
|
|
data->state.os_errno = baller->error;
|
|
SET_SOCKERRNO(baller->error);
|
|
}
|
|
baller_start_next(cf, data, baller, Curl_timeleft(data, &now, TRUE));
|
|
if(baller->is_done) {
|
|
DEBUGF(LOG_CF(data, cf, "%s done", baller->name));
|
|
}
|
|
else {
|
|
/* next attempt was started */
|
|
DEBUGF(LOG_CF(data, cf, "%s trying next", baller->name));
|
|
++ongoing;
|
|
}
|
|
}
|
|
}
|
|
|
|
if(ctx->winner) {
|
|
*connected = TRUE;
|
|
return CURLE_OK;
|
|
}
|
|
|
|
/* Nothing connected, check the time before we might
|
|
* start new ballers or return ok. */
|
|
if((ongoing || not_started) && Curl_timeleft(data, &now, TRUE) < 0) {
|
|
failf(data, "Connection timeout after %ld ms",
|
|
Curl_timediff(now, data->progress.t_startsingle));
|
|
return CURLE_OPERATION_TIMEDOUT;
|
|
}
|
|
|
|
/* Check if we have any waiting ballers to start now. */
|
|
if(not_started > 0) {
|
|
int added = 0;
|
|
|
|
for(i = 0; i < sizeof(ctx->baller)/sizeof(ctx->baller[0]); i++) {
|
|
struct eyeballer *baller = ctx->baller[i];
|
|
|
|
if(!baller || baller->has_started)
|
|
continue;
|
|
/* We start its primary baller has failed to connect or if
|
|
* its start delay_ms have expired */
|
|
if((baller->primary && baller->primary->is_done) ||
|
|
Curl_timediff(now, ctx->started) >= baller->delay_ms) {
|
|
baller_start(cf, data, baller, Curl_timeleft(data, &now, TRUE));
|
|
if(baller->is_done) {
|
|
DEBUGF(LOG_CF(data, cf, "%s done", baller->name));
|
|
}
|
|
else {
|
|
DEBUGF(LOG_CF(data, cf, "%s starting", baller->name));
|
|
++ongoing;
|
|
++added;
|
|
}
|
|
}
|
|
}
|
|
if(added > 0)
|
|
goto evaluate;
|
|
}
|
|
|
|
if(ongoing > 0) {
|
|
/* We are still trying, return for more waiting */
|
|
*connected = FALSE;
|
|
return CURLE_OK;
|
|
}
|
|
|
|
/* all ballers have failed to connect. */
|
|
DEBUGF(LOG_CF(data, cf, "all eyeballers failed"));
|
|
result = CURLE_COULDNT_CONNECT;
|
|
for(i = 0; i < sizeof(ctx->baller)/sizeof(ctx->baller[0]); i++) {
|
|
struct eyeballer *baller = ctx->baller[i];
|
|
DEBUGF(LOG_CF(data, cf, "%s assess started=%d, result=%d",
|
|
baller?baller->name:NULL,
|
|
baller?baller->has_started:0,
|
|
baller?baller->result:0));
|
|
if(baller && baller->has_started && baller->result) {
|
|
result = baller->result;
|
|
break;
|
|
}
|
|
}
|
|
|
|
#ifndef CURL_DISABLE_PROXY
|
|
if(conn->bits.socksproxy)
|
|
hostname = conn->socks_proxy.host.name;
|
|
else if(conn->bits.httpproxy)
|
|
hostname = conn->http_proxy.host.name;
|
|
else
|
|
#endif
|
|
if(conn->bits.conn_to_host)
|
|
hostname = conn->conn_to_host.name;
|
|
else
|
|
hostname = conn->host.name;
|
|
|
|
failf(data, "Failed to connect to %s port %u after "
|
|
"%" CURL_FORMAT_TIMEDIFF_T " ms: %s",
|
|
hostname, conn->port,
|
|
Curl_timediff(now, data->progress.t_startsingle),
|
|
curl_easy_strerror(result));
|
|
|
|
#ifdef WSAETIMEDOUT
|
|
if(WSAETIMEDOUT == data->state.os_errno)
|
|
result = CURLE_OPERATION_TIMEDOUT;
|
|
#elif defined(ETIMEDOUT)
|
|
if(ETIMEDOUT == data->state.os_errno)
|
|
result = CURLE_OPERATION_TIMEDOUT;
|
|
#endif
|
|
|
|
return result;
|
|
}
|
|
|
|
/*
|
|
* Connect to the given host with timeout, proxy or remote doesn't matter.
|
|
* There might be more than one IP address to try out.
|
|
*/
|
|
static CURLcode start_connect(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
const struct Curl_dns_entry *remotehost)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
struct connectdata *conn = cf->conn;
|
|
CURLcode result = CURLE_COULDNT_CONNECT;
|
|
int ai_family0, ai_family1;
|
|
timediff_t timeout_ms = Curl_timeleft(data, NULL, TRUE);
|
|
const struct Curl_addrinfo *addr0, *addr1;
|
|
|
|
if(timeout_ms < 0) {
|
|
/* a precaution, no need to continue if time already is up */
|
|
failf(data, "Connection time-out");
|
|
return CURLE_OPERATION_TIMEDOUT;
|
|
}
|
|
|
|
ctx->started = Curl_now();
|
|
|
|
/* remotehost->addr is the list of addresses from the resolver, each
|
|
* with an address family. The list has at least one entry, possibly
|
|
* many more.
|
|
* We try at most 2 at a time, until we either get a connection or
|
|
* run out of addresses to try. Since likelihood of success is tied
|
|
* to the address family (e.g. IPV6 might not work at all ), we want
|
|
* the 2 connect attempt ballers to try different families, if possible.
|
|
*
|
|
*/
|
|
if(conn->ip_version == CURL_IPRESOLVE_WHATEVER) {
|
|
/* any IP version is allowed */
|
|
ai_family0 = remotehost->addr?
|
|
remotehost->addr->ai_family : 0;
|
|
#ifdef ENABLE_IPV6
|
|
ai_family1 = ai_family0 == AF_INET6 ?
|
|
AF_INET : AF_INET6;
|
|
#else
|
|
ai_family1 = AF_UNSPEC;
|
|
#endif
|
|
}
|
|
else {
|
|
/* only one IP version is allowed */
|
|
ai_family0 = (conn->ip_version == CURL_IPRESOLVE_V4) ?
|
|
AF_INET :
|
|
#ifdef ENABLE_IPV6
|
|
AF_INET6;
|
|
#else
|
|
AF_UNSPEC;
|
|
#endif
|
|
ai_family1 = AF_UNSPEC;
|
|
}
|
|
|
|
/* Get the first address in the list that matches the family,
|
|
* this might give NULL, if we do not have any matches. */
|
|
addr0 = addr_first_match(remotehost->addr, ai_family0);
|
|
addr1 = addr_first_match(remotehost->addr, ai_family1);
|
|
if(!addr0 && addr1) {
|
|
/* switch around, so a single baller always uses addr0 */
|
|
addr0 = addr1;
|
|
ai_family0 = ai_family1;
|
|
addr1 = NULL;
|
|
}
|
|
|
|
/* We found no address that matches our criteria, we cannot connect */
|
|
if(!addr0) {
|
|
return CURLE_COULDNT_CONNECT;
|
|
}
|
|
|
|
memset(ctx->baller, 0, sizeof(ctx->baller));
|
|
result = eyeballer_new(&ctx->baller[0], ctx->cf_create, addr0, ai_family0,
|
|
NULL, 0, /* no primary/delay, start now */
|
|
timeout_ms, EXPIRE_DNS_PER_NAME);
|
|
if(result)
|
|
return result;
|
|
if(addr1) {
|
|
/* second one gets a delayed start */
|
|
result = eyeballer_new(&ctx->baller[1], ctx->cf_create, addr1, ai_family1,
|
|
ctx->baller[0], /* wait on that to fail */
|
|
/* or start this delayed */
|
|
data->set.happy_eyeballs_timeout,
|
|
timeout_ms, EXPIRE_DNS_PER_NAME2);
|
|
if(result)
|
|
return result;
|
|
}
|
|
|
|
Curl_expire(data, data->set.happy_eyeballs_timeout,
|
|
EXPIRE_HAPPY_EYEBALLS);
|
|
|
|
return CURLE_OK;
|
|
}
|
|
|
|
static void cf_he_ctx_clear(struct Curl_cfilter *cf, struct Curl_easy *data)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
size_t i;
|
|
|
|
DEBUGASSERT(ctx);
|
|
DEBUGASSERT(data);
|
|
for(i = 0; i < sizeof(ctx->baller)/sizeof(ctx->baller[0]); i++) {
|
|
baller_free(ctx->baller[i], data);
|
|
ctx->baller[i] = NULL;
|
|
}
|
|
baller_free(ctx->winner, data);
|
|
ctx->winner = NULL;
|
|
}
|
|
|
|
static int cf_he_get_select_socks(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
curl_socket_t *socks)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
size_t i, s;
|
|
int wrc, rc = GETSOCK_BLANK;
|
|
curl_socket_t wsocks[MAX_SOCKSPEREASYHANDLE];
|
|
|
|
if(cf->connected)
|
|
return cf->next->cft->get_select_socks(cf->next, data, socks);
|
|
|
|
for(i = s = 0; i < sizeof(ctx->baller)/sizeof(ctx->baller[0]); i++) {
|
|
struct eyeballer *baller = ctx->baller[i];
|
|
if(!baller || !baller->cf)
|
|
continue;
|
|
|
|
wrc = Curl_conn_cf_get_select_socks(baller->cf, data, wsocks);
|
|
if(wrc) {
|
|
/* TODO: we assume we get at most one socket back */
|
|
socks[s] = wsocks[0];
|
|
if(wrc & GETSOCK_WRITESOCK(0))
|
|
rc |= GETSOCK_WRITESOCK(s);
|
|
if(wrc & GETSOCK_READSOCK(0))
|
|
rc |= GETSOCK_READSOCK(s);
|
|
s++;
|
|
}
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
static CURLcode cf_he_connect(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
bool blocking, bool *done)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
CURLcode result = CURLE_OK;
|
|
|
|
if(cf->connected) {
|
|
*done = TRUE;
|
|
return CURLE_OK;
|
|
}
|
|
|
|
(void)blocking; /* TODO: do we want to support this? */
|
|
DEBUGASSERT(ctx);
|
|
*done = FALSE;
|
|
|
|
switch(ctx->state) {
|
|
case SCFST_INIT:
|
|
DEBUGASSERT(CURL_SOCKET_BAD == Curl_conn_cf_get_socket(cf, data));
|
|
DEBUGASSERT(!cf->connected);
|
|
result = start_connect(cf, data, ctx->remotehost);
|
|
if(result)
|
|
return result;
|
|
ctx->state = SCFST_WAITING;
|
|
/* FALLTHROUGH */
|
|
case SCFST_WAITING:
|
|
result = is_connected(cf, data, done);
|
|
if(!result && *done) {
|
|
DEBUGASSERT(ctx->winner);
|
|
DEBUGASSERT(ctx->winner->cf);
|
|
DEBUGASSERT(ctx->winner->cf->connected);
|
|
/* we have a winner. Install and activate it.
|
|
* close/free all others. */
|
|
ctx->state = SCFST_DONE;
|
|
cf->connected = TRUE;
|
|
cf->next = ctx->winner->cf;
|
|
ctx->winner->cf = NULL;
|
|
cf_he_ctx_clear(cf, data);
|
|
Curl_conn_cf_cntrl(cf->next, data, TRUE,
|
|
CF_CTRL_CONN_INFO_UPDATE, 0, NULL);
|
|
|
|
if(cf->conn->handler->protocol & PROTO_FAMILY_SSH)
|
|
Curl_pgrsTime(data, TIMER_APPCONNECT); /* we're connected already */
|
|
Curl_verboseconnect(data, cf->conn);
|
|
data->info.numconnects++; /* to track the # of connections made */
|
|
}
|
|
break;
|
|
case SCFST_DONE:
|
|
*done = TRUE;
|
|
break;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
static void cf_he_close(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
|
|
DEBUGF(LOG_CF(data, cf, "close"));
|
|
cf_he_ctx_clear(cf, data);
|
|
cf->connected = FALSE;
|
|
ctx->state = SCFST_INIT;
|
|
|
|
if(cf->next) {
|
|
cf->next->cft->close(cf->next, data);
|
|
Curl_conn_cf_discard_chain(&cf->next, data);
|
|
}
|
|
}
|
|
|
|
static bool cf_he_data_pending(struct Curl_cfilter *cf,
|
|
const struct Curl_easy *data)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
size_t i;
|
|
|
|
if(cf->connected)
|
|
return cf->next->cft->has_data_pending(cf->next, data);
|
|
|
|
for(i = 0; i < sizeof(ctx->baller)/sizeof(ctx->baller[0]); i++) {
|
|
struct eyeballer *baller = ctx->baller[i];
|
|
if(!baller || !baller->cf)
|
|
continue;
|
|
if(baller->cf->cft->has_data_pending(baller->cf, data))
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
static CURLcode cf_he_query(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
int query, int *pres1, void *pres2)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
|
|
if(!cf->connected) {
|
|
switch(query) {
|
|
case CF_QUERY_CONNECT_REPLY_MS: {
|
|
int reply_ms = -1;
|
|
size_t i;
|
|
|
|
for(i = 0; i < sizeof(ctx->baller)/sizeof(ctx->baller[0]); i++) {
|
|
struct eyeballer *baller = ctx->baller[i];
|
|
int breply_ms;
|
|
|
|
if(baller && baller->cf &&
|
|
!baller->cf->cft->query(baller->cf, data, query,
|
|
&breply_ms, NULL)) {
|
|
if(breply_ms >= 0 && (reply_ms < 0 || breply_ms < reply_ms))
|
|
reply_ms = breply_ms;
|
|
}
|
|
}
|
|
*pres1 = reply_ms;
|
|
DEBUGF(LOG_CF(data, cf, "query connect reply: %dms", *pres1));
|
|
return CURLE_OK;
|
|
}
|
|
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
return cf->next?
|
|
cf->next->cft->query(cf->next, data, query, pres1, pres2) :
|
|
CURLE_UNKNOWN_OPTION;
|
|
}
|
|
|
|
static void cf_he_destroy(struct Curl_cfilter *cf, struct Curl_easy *data)
|
|
{
|
|
struct cf_he_ctx *ctx = cf->ctx;
|
|
|
|
DEBUGF(LOG_CF(data, cf, "destroy"));
|
|
if(ctx) {
|
|
cf_he_ctx_clear(cf, data);
|
|
}
|
|
/* release any resources held in state */
|
|
Curl_safefree(ctx);
|
|
}
|
|
|
|
struct Curl_cftype Curl_cft_happy_eyeballs = {
|
|
"HAPPY-EYEBALLS",
|
|
0,
|
|
CURL_LOG_DEFAULT,
|
|
cf_he_destroy,
|
|
cf_he_connect,
|
|
cf_he_close,
|
|
Curl_cf_def_get_host,
|
|
cf_he_get_select_socks,
|
|
cf_he_data_pending,
|
|
Curl_cf_def_send,
|
|
Curl_cf_def_recv,
|
|
Curl_cf_def_cntrl,
|
|
Curl_cf_def_conn_is_alive,
|
|
Curl_cf_def_conn_keep_alive,
|
|
cf_he_query,
|
|
};
|
|
|
|
CURLcode Curl_cf_happy_eyeballs_create(struct Curl_cfilter **pcf,
|
|
struct Curl_easy *data,
|
|
struct connectdata *conn,
|
|
cf_ip_connect_create *cf_create,
|
|
const struct Curl_dns_entry *remotehost,
|
|
int transport)
|
|
{
|
|
struct cf_he_ctx *ctx = NULL;
|
|
CURLcode result;
|
|
|
|
(void)data;
|
|
(void)conn;
|
|
*pcf = NULL;
|
|
ctx = calloc(sizeof(*ctx), 1);
|
|
if(!ctx) {
|
|
result = CURLE_OUT_OF_MEMORY;
|
|
goto out;
|
|
}
|
|
ctx->transport = transport;
|
|
ctx->cf_create = cf_create;
|
|
ctx->remotehost = remotehost;
|
|
|
|
result = Curl_cf_create(pcf, &Curl_cft_happy_eyeballs, ctx);
|
|
|
|
out:
|
|
if(result) {
|
|
Curl_safefree(*pcf);
|
|
Curl_safefree(ctx);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
struct transport_provider {
|
|
int transport;
|
|
cf_ip_connect_create *cf_create;
|
|
};
|
|
|
|
static
|
|
#ifndef DEBUGBUILD
|
|
const
|
|
#endif
|
|
struct transport_provider transport_providers[] = {
|
|
{ TRNSPRT_TCP, Curl_cf_tcp_create },
|
|
#ifdef ENABLE_QUIC
|
|
{ TRNSPRT_QUIC, Curl_cf_quic_create },
|
|
#endif
|
|
{ TRNSPRT_UDP, Curl_cf_udp_create },
|
|
{ TRNSPRT_UNIX, Curl_cf_unix_create },
|
|
};
|
|
|
|
#ifndef ARRAYSIZE
|
|
#define ARRAYSIZE(A) (sizeof(A)/sizeof((A)[0]))
|
|
#endif
|
|
|
|
static cf_ip_connect_create *get_cf_create(int transport)
|
|
{
|
|
size_t i;
|
|
for(i = 0; i < ARRAYSIZE(transport_providers); ++i) {
|
|
if(transport == transport_providers[i].transport)
|
|
return transport_providers[i].cf_create;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
#ifdef DEBUGBUILD
|
|
void Curl_debug_set_transport_provider(int transport,
|
|
cf_ip_connect_create *cf_create)
|
|
{
|
|
size_t i;
|
|
for(i = 0; i < ARRAYSIZE(transport_providers); ++i) {
|
|
if(transport == transport_providers[i].transport) {
|
|
transport_providers[i].cf_create = cf_create;
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
#endif /* DEBUGBUILD */
|
|
|
|
static CURLcode cf_he_insert_after(struct Curl_cfilter *cf_at,
|
|
struct Curl_easy *data,
|
|
const struct Curl_dns_entry *remotehost,
|
|
int transport)
|
|
{
|
|
cf_ip_connect_create *cf_create;
|
|
struct Curl_cfilter *cf;
|
|
CURLcode result;
|
|
|
|
/* Need to be first */
|
|
DEBUGASSERT(cf_at);
|
|
cf_create = get_cf_create(transport);
|
|
if(!cf_create) {
|
|
DEBUGF(LOG_CF(data, cf_at, "unsupported transport type %d", transport));
|
|
return CURLE_UNSUPPORTED_PROTOCOL;
|
|
}
|
|
result = Curl_cf_happy_eyeballs_create(&cf, data, cf_at->conn,
|
|
cf_create, remotehost,
|
|
transport);
|
|
if(result)
|
|
return result;
|
|
|
|
Curl_conn_cf_insert_after(cf_at, cf);
|
|
return CURLE_OK;
|
|
}
|
|
|
|
typedef enum {
|
|
CF_SETUP_INIT,
|
|
CF_SETUP_CNNCT_EYEBALLS,
|
|
CF_SETUP_CNNCT_SOCKS,
|
|
CF_SETUP_CNNCT_HTTP_PROXY,
|
|
CF_SETUP_CNNCT_HAPROXY,
|
|
CF_SETUP_CNNCT_SSL,
|
|
CF_SETUP_DONE
|
|
} cf_setup_state;
|
|
|
|
struct cf_setup_ctx {
|
|
cf_setup_state state;
|
|
const struct Curl_dns_entry *remotehost;
|
|
int ssl_mode;
|
|
int transport;
|
|
};
|
|
|
|
static CURLcode cf_setup_connect(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data,
|
|
bool blocking, bool *done)
|
|
{
|
|
struct cf_setup_ctx *ctx = cf->ctx;
|
|
CURLcode result = CURLE_OK;
|
|
|
|
if(cf->connected) {
|
|
*done = TRUE;
|
|
return CURLE_OK;
|
|
}
|
|
|
|
/* connect current sub-chain */
|
|
connect_sub_chain:
|
|
if(cf->next && !cf->next->connected) {
|
|
result = Curl_conn_cf_connect(cf->next, data, blocking, done);
|
|
if(result || !*done)
|
|
return result;
|
|
}
|
|
|
|
if(ctx->state < CF_SETUP_CNNCT_EYEBALLS) {
|
|
result = cf_he_insert_after(cf, data, ctx->remotehost, ctx->transport);
|
|
if(result)
|
|
return result;
|
|
ctx->state = CF_SETUP_CNNCT_EYEBALLS;
|
|
if(!cf->next || !cf->next->connected)
|
|
goto connect_sub_chain;
|
|
}
|
|
|
|
/* sub-chain connected, do we need to add more? */
|
|
#ifndef CURL_DISABLE_PROXY
|
|
if(ctx->state < CF_SETUP_CNNCT_SOCKS && cf->conn->bits.socksproxy) {
|
|
result = Curl_cf_socks_proxy_insert_after(cf, data);
|
|
if(result)
|
|
return result;
|
|
ctx->state = CF_SETUP_CNNCT_SOCKS;
|
|
if(!cf->next || !cf->next->connected)
|
|
goto connect_sub_chain;
|
|
}
|
|
|
|
if(ctx->state < CF_SETUP_CNNCT_HTTP_PROXY && cf->conn->bits.httpproxy) {
|
|
#ifdef USE_SSL
|
|
if(cf->conn->http_proxy.proxytype == CURLPROXY_HTTPS
|
|
&& !Curl_conn_is_ssl(cf->conn, cf->sockindex)) {
|
|
result = Curl_cf_ssl_proxy_insert_after(cf, data);
|
|
if(result)
|
|
return result;
|
|
}
|
|
#endif /* USE_SSL */
|
|
|
|
#if !defined(CURL_DISABLE_HTTP)
|
|
if(cf->conn->bits.tunnel_proxy) {
|
|
result = Curl_cf_http_proxy_insert_after(cf, data);
|
|
if(result)
|
|
return result;
|
|
}
|
|
#endif /* !CURL_DISABLE_HTTP */
|
|
ctx->state = CF_SETUP_CNNCT_HTTP_PROXY;
|
|
if(!cf->next || !cf->next->connected)
|
|
goto connect_sub_chain;
|
|
}
|
|
#endif /* !CURL_DISABLE_PROXY */
|
|
|
|
if(ctx->state < CF_SETUP_CNNCT_HAPROXY) {
|
|
#if !defined(CURL_DISABLE_PROXY)
|
|
if(data->set.haproxyprotocol) {
|
|
if(Curl_conn_is_ssl(cf->conn, cf->sockindex)) {
|
|
failf(data, "haproxy protocol not support with SSL "
|
|
"encryption in place (QUIC?)");
|
|
return CURLE_UNSUPPORTED_PROTOCOL;
|
|
}
|
|
result = Curl_cf_haproxy_insert_after(cf, data);
|
|
if(result)
|
|
return result;
|
|
}
|
|
#endif /* !CURL_DISABLE_PROXY */
|
|
ctx->state = CF_SETUP_CNNCT_HAPROXY;
|
|
if(!cf->next || !cf->next->connected)
|
|
goto connect_sub_chain;
|
|
}
|
|
|
|
if(ctx->state < CF_SETUP_CNNCT_SSL) {
|
|
#ifdef USE_SSL
|
|
if((ctx->ssl_mode == CURL_CF_SSL_ENABLE
|
|
|| (ctx->ssl_mode != CURL_CF_SSL_DISABLE
|
|
&& cf->conn->handler->flags & PROTOPT_SSL)) /* we want SSL */
|
|
&& !Curl_conn_is_ssl(cf->conn, cf->sockindex)) { /* it is missing */
|
|
result = Curl_cf_ssl_insert_after(cf, data);
|
|
if(result)
|
|
return result;
|
|
}
|
|
#endif /* USE_SSL */
|
|
ctx->state = CF_SETUP_CNNCT_SSL;
|
|
if(!cf->next || !cf->next->connected)
|
|
goto connect_sub_chain;
|
|
}
|
|
|
|
ctx->state = CF_SETUP_DONE;
|
|
cf->connected = TRUE;
|
|
*done = TRUE;
|
|
return CURLE_OK;
|
|
}
|
|
|
|
static void cf_setup_close(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data)
|
|
{
|
|
struct cf_setup_ctx *ctx = cf->ctx;
|
|
|
|
DEBUGF(LOG_CF(data, cf, "close"));
|
|
cf->connected = FALSE;
|
|
ctx->state = CF_SETUP_INIT;
|
|
|
|
if(cf->next) {
|
|
cf->next->cft->close(cf->next, data);
|
|
Curl_conn_cf_discard_chain(&cf->next, data);
|
|
}
|
|
}
|
|
|
|
static void cf_setup_destroy(struct Curl_cfilter *cf, struct Curl_easy *data)
|
|
{
|
|
struct cf_setup_ctx *ctx = cf->ctx;
|
|
|
|
(void)data;
|
|
DEBUGF(LOG_CF(data, cf, "destroy"));
|
|
Curl_safefree(ctx);
|
|
}
|
|
|
|
|
|
struct Curl_cftype Curl_cft_setup = {
|
|
"SETUP",
|
|
0,
|
|
CURL_LOG_DEFAULT,
|
|
cf_setup_destroy,
|
|
cf_setup_connect,
|
|
cf_setup_close,
|
|
Curl_cf_def_get_host,
|
|
Curl_cf_def_get_select_socks,
|
|
Curl_cf_def_data_pending,
|
|
Curl_cf_def_send,
|
|
Curl_cf_def_recv,
|
|
Curl_cf_def_cntrl,
|
|
Curl_cf_def_conn_is_alive,
|
|
Curl_cf_def_conn_keep_alive,
|
|
Curl_cf_def_query,
|
|
};
|
|
|
|
static CURLcode cf_setup_create(struct Curl_cfilter **pcf,
|
|
struct Curl_easy *data,
|
|
const struct Curl_dns_entry *remotehost,
|
|
int transport,
|
|
int ssl_mode)
|
|
{
|
|
struct Curl_cfilter *cf = NULL;
|
|
struct cf_setup_ctx *ctx;
|
|
CURLcode result = CURLE_OK;
|
|
|
|
(void)data;
|
|
ctx = calloc(sizeof(*ctx), 1);
|
|
if(!ctx) {
|
|
result = CURLE_OUT_OF_MEMORY;
|
|
goto out;
|
|
}
|
|
ctx->state = CF_SETUP_INIT;
|
|
ctx->remotehost = remotehost;
|
|
ctx->ssl_mode = ssl_mode;
|
|
ctx->transport = transport;
|
|
|
|
result = Curl_cf_create(&cf, &Curl_cft_setup, ctx);
|
|
if(result)
|
|
goto out;
|
|
ctx = NULL;
|
|
|
|
out:
|
|
*pcf = result? NULL : cf;
|
|
free(ctx);
|
|
return result;
|
|
}
|
|
|
|
CURLcode Curl_cf_setup_add(struct Curl_easy *data,
|
|
struct connectdata *conn,
|
|
int sockindex,
|
|
const struct Curl_dns_entry *remotehost,
|
|
int transport,
|
|
int ssl_mode)
|
|
{
|
|
struct Curl_cfilter *cf;
|
|
CURLcode result = CURLE_OK;
|
|
|
|
DEBUGASSERT(data);
|
|
result = cf_setup_create(&cf, data, remotehost, transport, ssl_mode);
|
|
if(result)
|
|
goto out;
|
|
Curl_conn_cf_add(data, conn, sockindex, cf);
|
|
out:
|
|
return result;
|
|
}
|
|
|
|
CURLcode Curl_cf_setup_insert_after(struct Curl_cfilter *cf_at,
|
|
struct Curl_easy *data,
|
|
const struct Curl_dns_entry *remotehost,
|
|
int transport,
|
|
int ssl_mode)
|
|
{
|
|
struct Curl_cfilter *cf;
|
|
CURLcode result;
|
|
|
|
DEBUGASSERT(data);
|
|
result = cf_setup_create(&cf, data, remotehost, transport, ssl_mode);
|
|
if(result)
|
|
goto out;
|
|
Curl_conn_cf_insert_after(cf_at, cf);
|
|
out:
|
|
return result;
|
|
}
|
|
|
|
CURLcode Curl_conn_setup(struct Curl_easy *data,
|
|
struct connectdata *conn,
|
|
int sockindex,
|
|
const struct Curl_dns_entry *remotehost,
|
|
int ssl_mode)
|
|
{
|
|
CURLcode result = CURLE_OK;
|
|
|
|
DEBUGASSERT(data);
|
|
DEBUGASSERT(conn->handler);
|
|
|
|
#if !defined(CURL_DISABLE_HTTP) && !defined(USE_HYPER)
|
|
if(!conn->cfilter[sockindex] &&
|
|
conn->handler->protocol == CURLPROTO_HTTPS &&
|
|
(ssl_mode == CURL_CF_SSL_ENABLE || ssl_mode != CURL_CF_SSL_DISABLE)) {
|
|
|
|
result = Curl_cf_https_setup(data, conn, sockindex, remotehost);
|
|
if(result)
|
|
goto out;
|
|
}
|
|
#endif /* !defined(CURL_DISABLE_HTTP) && !defined(USE_HYPER) */
|
|
|
|
/* Still no cfilter set, apply default. */
|
|
if(!conn->cfilter[sockindex]) {
|
|
result = Curl_cf_setup_add(data, conn, sockindex, remotehost,
|
|
conn->transport, ssl_mode);
|
|
if(result)
|
|
goto out;
|
|
}
|
|
|
|
DEBUGASSERT(conn->cfilter[sockindex]);
|
|
out:
|
|
return result;
|
|
}
|
|
|