aboutsummaryrefslogtreecommitdiff
path: root/v_windows/v/old/vlib/net/http/request.v
diff options
context:
space:
mode:
authorIndrajith K L2022-12-03 17:00:20 +0530
committerIndrajith K L2022-12-03 17:00:20 +0530
commitf5c4671bfbad96bf346bd7e9a21fc4317b4959df (patch)
tree2764fc62da58f2ba8da7ed341643fc359873142f /v_windows/v/old/vlib/net/http/request.v
downloadcli-tools-windows-f5c4671bfbad96bf346bd7e9a21fc4317b4959df.tar.gz
cli-tools-windows-f5c4671bfbad96bf346bd7e9a21fc4317b4959df.tar.bz2
cli-tools-windows-f5c4671bfbad96bf346bd7e9a21fc4317b4959df.zip
Adds most of the toolsHEADmaster
Diffstat (limited to 'v_windows/v/old/vlib/net/http/request.v')
-rw-r--r--v_windows/v/old/vlib/net/http/request.v324
1 files changed, 324 insertions, 0 deletions
diff --git a/v_windows/v/old/vlib/net/http/request.v b/v_windows/v/old/vlib/net/http/request.v
new file mode 100644
index 0000000..4664659
--- /dev/null
+++ b/v_windows/v/old/vlib/net/http/request.v
@@ -0,0 +1,324 @@
+// Copyright (c) 2019-2021 Alexander Medvednikov. All rights reserved.
+// Use of this source code is governed by an MIT license
+// that can be found in the LICENSE file.
+module http
+
+import io
+import net
+import net.urllib
+import strings
+import time
+
+// Request holds information about an HTTP request (either received by
+// a server or to be sent by a client)
+pub struct Request {
+pub mut:
+ version Version = .v1_1
+ method Method
+ header Header
+ cookies map[string]string
+ data string
+ url string
+ user_agent string = 'v.http'
+ verbose bool
+ user_ptr voidptr
+ // NOT implemented for ssl connections
+ // time = -1 for no timeout
+ read_timeout i64 = 30 * time.second
+ write_timeout i64 = 30 * time.second
+}
+
+fn (mut req Request) free() {
+ unsafe { req.header.free() }
+}
+
+// add_header adds the key and value of an HTTP request header
+// To add a custom header, use add_custom_header
+pub fn (mut req Request) add_header(key CommonHeader, val string) {
+ req.header.add(key, val)
+}
+
+// add_custom_header adds the key and value of an HTTP request header
+// This method may fail if the key contains characters that are not permitted
+pub fn (mut req Request) add_custom_header(key string, val string) ? {
+ return req.header.add_custom(key, val)
+}
+
+// do will send the HTTP request and returns `http.Response` as soon as the response is recevied
+pub fn (req &Request) do() ?Response {
+ mut url := urllib.parse(req.url) or { return error('http.Request.do: invalid url $req.url') }
+ mut rurl := url
+ mut resp := Response{}
+ mut no_redirects := 0
+ for {
+ if no_redirects == max_redirects {
+ return error('http.request.do: maximum number of redirects reached ($max_redirects)')
+ }
+ qresp := req.method_and_url_to_response(req.method, rurl) ?
+ resp = qresp
+ if resp.status() !in [.moved_permanently, .found, .see_other, .temporary_redirect,
+ .permanent_redirect,
+ ] {
+ break
+ }
+ // follow any redirects
+ mut redirect_url := resp.header.get(.location) or { '' }
+ if redirect_url.len > 0 && redirect_url[0] == `/` {
+ url.set_path(redirect_url) or {
+ return error('http.request.do: invalid path in redirect: "$redirect_url"')
+ }
+ redirect_url = url.str()
+ }
+ qrurl := urllib.parse(redirect_url) or {
+ return error('http.request.do: invalid URL in redirect "$redirect_url"')
+ }
+ rurl = qrurl
+ no_redirects++
+ }
+ return resp
+}
+
+fn (req &Request) method_and_url_to_response(method Method, url urllib.URL) ?Response {
+ host_name := url.hostname()
+ scheme := url.scheme
+ p := url.escaped_path().trim_left('/')
+ path := if url.query().len > 0 { '/$p?$url.query().encode()' } else { '/$p' }
+ mut nport := url.port().int()
+ if nport == 0 {
+ if scheme == 'http' {
+ nport = 80
+ }
+ if scheme == 'https' {
+ nport = 443
+ }
+ }
+ // println('fetch $method, $scheme, $host_name, $nport, $path ')
+ if scheme == 'https' {
+ // println('ssl_do( $nport, $method, $host_name, $path )')
+ res := req.ssl_do(nport, method, host_name, path) ?
+ return res
+ } else if scheme == 'http' {
+ // println('http_do( $nport, $method, $host_name, $path )')
+ res := req.http_do('$host_name:$nport', method, path) ?
+ return res
+ }
+ return error('http.request.method_and_url_to_response: unsupported scheme: "$scheme"')
+}
+
+fn (req &Request) build_request_headers(method Method, host_name string, path string) string {
+ ua := req.user_agent
+ mut uheaders := []string{}
+ if !req.header.contains(.host) {
+ uheaders << 'Host: $host_name\r\n'
+ }
+ if !req.header.contains(.user_agent) {
+ uheaders << 'User-Agent: $ua\r\n'
+ }
+ if req.data.len > 0 && !req.header.contains(.content_length) {
+ uheaders << 'Content-Length: $req.data.len\r\n'
+ }
+ for key in req.header.keys() {
+ if key == CommonHeader.cookie.str() {
+ continue
+ }
+ val := req.header.custom_values(key).join('; ')
+ uheaders << '$key: $val\r\n'
+ }
+ uheaders << req.build_request_cookies_header()
+ version := if req.version == .unknown { Version.v1_1 } else { req.version }
+ return '$method $path $version\r\n' + uheaders.join('') + 'Connection: close\r\n\r\n' + req.data
+}
+
+fn (req &Request) build_request_cookies_header() string {
+ if req.cookies.keys().len < 1 {
+ return ''
+ }
+ mut cookie := []string{}
+ for key, val in req.cookies {
+ cookie << '$key=$val'
+ }
+ cookie << req.header.values(.cookie)
+ return 'Cookie: ' + cookie.join('; ') + '\r\n'
+}
+
+fn (req &Request) http_do(host string, method Method, path string) ?Response {
+ host_name, _ := net.split_address(host) ?
+ s := req.build_request_headers(method, host_name, path)
+ mut client := net.dial_tcp(host) ?
+ client.set_read_timeout(req.read_timeout)
+ client.set_write_timeout(req.write_timeout)
+ // TODO this really needs to be exposed somehow
+ client.write(s.bytes()) ?
+ $if trace_http_request ? {
+ eprintln('> $s')
+ }
+ mut bytes := io.read_all(reader: client) ?
+ client.close() ?
+ response_text := bytes.bytestr()
+ $if trace_http_response ? {
+ eprintln('< $response_text')
+ }
+ return parse_response(response_text)
+}
+
+// referer returns 'Referer' header value of the given request
+pub fn (req &Request) referer() string {
+ return req.header.get(.referer) or { '' }
+}
+
+// Parse a raw HTTP request into a Request object
+pub fn parse_request(mut reader io.BufferedReader) ?Request {
+ // request line
+ mut line := reader.read_line() ?
+ method, target, version := parse_request_line(line) ?
+
+ // headers
+ mut header := new_header()
+ line = reader.read_line() ?
+ for line != '' {
+ key, value := parse_header(line) ?
+ header.add_custom(key, value) ?
+ line = reader.read_line() ?
+ }
+ header.coerce(canonicalize: true)
+
+ // body
+ mut body := []byte{}
+ if length := header.get(.content_length) {
+ n := length.int()
+ if n > 0 {
+ body = []byte{len: n}
+ mut count := 0
+ for count < body.len {
+ count += reader.read(mut body[count..]) or { break }
+ }
+ }
+ }
+
+ return Request{
+ method: method
+ url: target.str()
+ header: header
+ data: body.bytestr()
+ version: version
+ }
+}
+
+fn parse_request_line(s string) ?(Method, urllib.URL, Version) {
+ words := s.split(' ')
+ if words.len != 3 {
+ return error('malformed request line')
+ }
+ method := method_from_str(words[0])
+ target := urllib.parse(words[1]) ?
+ version := version_from_str(words[2])
+ if version == .unknown {
+ return error('unsupported version')
+ }
+
+ return method, target, version
+}
+
+// Parse URL encoded key=value&key=value forms
+fn parse_form(body string) map[string]string {
+ words := body.split('&')
+ mut form := map[string]string{}
+ for word in words {
+ kv := word.split_nth('=', 2)
+ if kv.len != 2 {
+ continue
+ }
+ key := urllib.query_unescape(kv[0]) or { continue }
+ val := urllib.query_unescape(kv[1]) or { continue }
+ form[key] = val
+ }
+ return form
+ // }
+ // todo: parse form-data and application/json
+ // ...
+}
+
+struct FileData {
+pub:
+ filename string
+ content_type string
+ data string
+}
+
+struct UnexpectedExtraAttributeError {
+ msg string
+ code int
+}
+
+struct MultiplePathAttributesError {
+ msg string = 'Expected at most one path attribute'
+ code int
+}
+
+fn parse_multipart_form(body string, boundary string) (map[string]string, map[string][]FileData) {
+ sections := body.split(boundary)
+ fields := sections[1..sections.len - 1]
+ mut form := map[string]string{}
+ mut files := map[string][]FileData{}
+
+ for field in fields {
+ // TODO: do not split into lines; do same parsing for HTTP body
+ lines := field.split_into_lines()[1..]
+ disposition := parse_disposition(lines[0])
+ // Grab everything between the double quotes
+ name := disposition['name'] or { continue }
+ // Parse files
+ // TODO: filename*
+ if 'filename' in disposition {
+ filename := disposition['filename']
+ // Parse Content-Type header
+ if lines.len == 1 || !lines[1].to_lower().starts_with('content-type:') {
+ continue
+ }
+ mut ct := lines[1].split_nth(':', 2)[1]
+ ct = ct.trim_left(' \t')
+ data := lines_to_string(field.len, lines, 3, lines.len - 1)
+ files[name] << FileData{
+ filename: filename
+ content_type: ct
+ data: data
+ }
+ continue
+ }
+ data := lines_to_string(field.len, lines, 2, lines.len - 1)
+ form[name] = data
+ }
+ return form, files
+}
+
+// Parse the Content-Disposition header of a multipart form
+// Returns a map of the key="value" pairs
+// Example: parse_disposition('Content-Disposition: form-data; name="a"; filename="b"') == {'name': 'a', 'filename': 'b'}
+fn parse_disposition(line string) map[string]string {
+ mut data := map[string]string{}
+ for word in line.split(';') {
+ kv := word.split_nth('=', 2)
+ if kv.len != 2 {
+ continue
+ }
+ key, value := kv[0].to_lower().trim_left(' \t'), kv[1]
+ if value.starts_with('"') && value.ends_with('"') {
+ data[key] = value[1..value.len - 1]
+ } else {
+ data[key] = value
+ }
+ }
+ return data
+}
+
+[manualfree]
+fn lines_to_string(len int, lines []string, start int, end int) string {
+ mut sb := strings.new_builder(len)
+ for i in start .. end {
+ sb.writeln(lines[i])
+ }
+ sb.cut_last(1) // last newline
+ res := sb.str()
+ unsafe { sb.free() }
+ return res
+}