Files
rippled/src/ripple/net/impl/SSLHTTPDownloader.cpp
2019-03-18 16:19:24 -07:00

304 lines
8.5 KiB
C++

//------------------------------------------------------------------------------
/*
This file is part of rippled: https://github.com/ripple/rippled
Copyright (c) 2012, 2013 Ripple Labs Inc.
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
//==============================================================================
#include <ripple/net/SSLHTTPDownloader.h>
#include <ripple/net/RegisterSSLCerts.h>
#include <boost/asio/ssl.hpp>
namespace ripple {
SSLHTTPDownloader::SSLHTTPDownloader(
boost::asio::io_service& io_service,
beast::Journal j)
: ctx_(boost::asio::ssl::context::tlsv12_client)
, strand_(io_service)
, j_(j)
{
}
bool
SSLHTTPDownloader::init(Config const& config)
{
boost::system::error_code ec;
if (config.SSL_VERIFY_FILE.empty())
{
registerSSLCerts(ctx_, ec, j_);
if (ec && config.SSL_VERIFY_DIR.empty())
{
JLOG(j_.error()) <<
"Failed to set_default_verify_paths: " <<
ec.message();
return false;
}
}
else
ctx_.load_verify_file(config.SSL_VERIFY_FILE);
if (!config.SSL_VERIFY_DIR.empty())
{
ctx_.add_verify_path(config.SSL_VERIFY_DIR, ec);
if (ec)
{
JLOG(j_.error()) <<
"Failed to add verify path: " <<
ec.message();
return false;
}
}
ssl_verify_ = config.SSL_VERIFY;
return true;
}
bool
SSLHTTPDownloader::download(
std::string const& host,
std::string const& port,
std::string const& target,
int version,
boost::filesystem::path const& dstPath,
std::function<void(boost::filesystem::path)> complete)
{
try
{
if (exists(dstPath))
{
JLOG(j_.error()) <<
"Destination file exists";
return false;
}
}
catch (std::exception const& e)
{
JLOG(j_.error()) <<
"exception: " << e.what();
return false;
}
if (!strand_.running_in_this_thread())
strand_.post(
std::bind(
&SSLHTTPDownloader::download,
this->shared_from_this(),
host,
port,
target,
version,
dstPath,
complete));
else
boost::asio::spawn(
strand_,
std::bind(
&SSLHTTPDownloader::do_session,
this->shared_from_this(),
host,
port,
target,
version,
dstPath,
complete,
std::placeholders::_1));
return true;
}
void
SSLHTTPDownloader::do_session(
std::string const host,
std::string const port,
std::string const target,
int version,
boost::filesystem::path dstPath,
std::function<void(boost::filesystem::path)> complete,
boost::asio::yield_context yield)
{
using namespace boost::asio;
using namespace boost::beast;
boost::system::error_code ec;
ip::tcp::resolver resolver {strand_.get_io_context()};
auto const results = resolver.async_resolve(host, port, yield[ec]);
if (ec)
return fail(dstPath, complete, ec, "async_resolve");
try
{
stream_.emplace(strand_.get_io_service(), ctx_);
}
catch (std::exception const& e)
{
return fail(dstPath, complete, ec,
std::string("exception: ") + e.what());
}
if (ssl_verify_)
{
// If we intend to verify the SSL connection, we need to set the
// default domain for server name indication *prior* to connecting
if (!SSL_set_tlsext_host_name(stream_->native_handle(), host.c_str()))
{
ec.assign(static_cast<int>(
::ERR_get_error()), boost::asio::error::get_ssl_category());
return fail(dstPath, complete, ec, "SSL_set_tlsext_host_name");
}
}
else
{
stream_->set_verify_mode(boost::asio::ssl::verify_none, ec);
if (ec)
return fail(dstPath, complete, ec, "set_verify_mode");
}
boost::asio::async_connect(
stream_->next_layer(), results.begin(), results.end(), yield[ec]);
if (ec)
return fail(dstPath, complete, ec, "async_connect");
if (ssl_verify_)
{
stream_->set_verify_mode(boost::asio::ssl::verify_peer, ec);
if (ec)
return fail(dstPath, complete, ec, "set_verify_mode");
stream_->set_verify_callback(
boost::asio::ssl::rfc2818_verification(host.c_str()), ec);
if (ec)
return fail(dstPath, complete, ec, "set_verify_callback");
}
stream_->async_handshake(ssl::stream_base::client, yield[ec]);
if (ec)
return fail(dstPath, complete, ec, "async_handshake");
// Set up an HTTP HEAD request message to find the file size
http::request<http::empty_body> req {http::verb::head, target, version};
req.set(http::field::host, host);
req.set(http::field::user_agent, BOOST_BEAST_VERSION_STRING);
http::async_write(*stream_, req, yield[ec]);
if(ec)
return fail(dstPath, complete, ec, "async_write");
{
// Check if available storage for file size
http::response_parser<http::empty_body> p;
p.skip(true);
http::async_read(*stream_, read_buf_, p, yield[ec]);
if(ec)
return fail(dstPath, complete, ec, "async_read");
if (auto len = p.content_length())
{
try
{
if (*len > space(dstPath.parent_path()).available)
{
return fail(dstPath, complete, ec,
"Insufficient disk space for download");
}
}
catch (std::exception const& e)
{
return fail(dstPath, complete, ec,
std::string("exception: ") + e.what());
}
}
}
// Set up an HTTP GET request message to download the file
req.method(http::verb::get);
http::async_write(*stream_, req, yield[ec]);
if(ec)
return fail(dstPath, complete, ec, "async_write");
// Download the file
http::response_parser<http::file_body> p;
p.body_limit(std::numeric_limits<std::uint64_t>::max());
p.get().body().open(
dstPath.string().c_str(),
boost::beast::file_mode::write,
ec);
if (ec)
{
p.get().body().close();
return fail(dstPath, complete, ec, "open");
}
http::async_read(*stream_, read_buf_, p, yield[ec]);
if (ec)
{
p.get().body().close();
return fail(dstPath, complete, ec, "async_read");
}
p.get().body().close();
// Gracefully close the stream
stream_->async_shutdown(yield[ec]);
if (ec == boost::asio::error::eof)
ec.assign(0, ec.category());
if (ec)
{
// Most web servers don't bother with performing
// the SSL shutdown handshake, for speed.
JLOG(j_.trace()) <<
"async_shutdown: " << ec.message();
}
// The socket cannot be reused
stream_ = boost::none;
JLOG(j_.trace()) <<
"download completed: " << dstPath.string();
// Notify the completion handler
complete(std::move(dstPath));
}
void
SSLHTTPDownloader::fail(
boost::filesystem::path dstPath,
std::function<void(boost::filesystem::path)> const& complete,
boost::system::error_code const& ec,
std::string const& errMsg)
{
if (!ec)
{
JLOG(j_.error()) <<
errMsg;
}
else if (ec != boost::asio::error::operation_aborted)
{
JLOG(j_.error()) <<
errMsg << ": " << ec.message();
}
try
{
remove(dstPath);
}
catch (std::exception const& e)
{
JLOG(j_.error()) <<
"exception: " << e.what();
}
complete(std::move(dstPath));
}
}// ripple