2 * Copyright (C) 2005-2009 Atsushi Konno All rights reserved.
3 * Copyright (C) 2005 QSDN,Inc. All rights reserved.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
17 #include "chxj_serf.h"
19 #include "apr_pools.h"
21 typedef struct __app_ctx_t app_ctx_t;
22 typedef struct __handler_ctx_t handler_ctx_t;
26 serf_ssl_context_t *ssl_ctx;
27 serf_bucket_alloc_t *bkt_alloc;
30 struct __handler_ctx_t {
31 #if APR_MAJOR_VERSION > 0
32 apr_uint32_t requests_outstanding;
34 apr_atomic_t requests_outstanding;
37 serf_response_acceptor_t acceptor;
38 app_ctx_t *acceptor_ctx;
40 serf_response_handler_t handler;
45 const char *user_agent;
52 apr_size_t response_len;
54 apr_size_t post_data_len;
55 apr_table_t *headers_out;
60 char *default_chxj_serf_get(request_rec *r, apr_pool_t *ppool, const char *url_path, int set_headers_flag, apr_size_t *response_len);
61 char *(*chxj_serf_get)(request_rec *r, apr_pool_t *ppool, const char *url_path, int set_headers_flag, apr_size_t *response_len) = default_chxj_serf_get;
62 char *default_chxj_serf_post(request_rec *r, apr_pool_t *ppool, const char *url_path, char *post_data, apr_size_t post_data_len, int set_headers_flag, apr_size_t *response_len, int *response_code);
63 char *(*chxj_serf_post)(request_rec *r, apr_pool_t *ppool, const char *url_path, char *post_data, apr_size_t post_data_len, int set_headers_flag, apr_size_t *response_len, int *response_code) = default_chxj_serf_post;
67 s_init(apr_pool_t *ppool, apr_pool_t **pool)
69 apr_pool_create(pool, ppool);
70 apr_atomic_init(*pool);
75 static serf_bucket_t *
76 s_connection_setup(apr_socket_t *skt, void *setup_ctx, apr_pool_t *UNUSED(pool))
79 app_ctx_t *ctx = (app_ctx_t *)setup_ctx;
81 c = serf_bucket_socket_create(skt, ctx->bkt_alloc);
83 c = serf_bucket_ssl_decrypt_create(c, ctx->ssl_ctx, ctx->bkt_alloc);
85 ctx->ssl_ctx = serf_bucket_ssl_decrypt_context_get(c);
86 serf_ssl_use_default_certificates(ctx->ssl_ctx);
87 serf_ssl_server_cert_callback_set(ctx->ssl_ctx, NULL, NULL);
96 s_connection_closed(serf_connection_t *UNUSED(conn), void *UNUSED(closed_baton), apr_status_t UNUSED(why), apr_pool_t *UNUSED(pool))
102 static serf_bucket_t *
103 s_accept_response(serf_request_t *request, serf_bucket_t *stream, void *UNUSED(acceptor_baton), apr_pool_t *UNUSED(pool))
105 serf_bucket_alloc_t *bkt_alloc;
108 bkt_alloc = serf_request_get_alloc(request);
109 c = serf_bucket_barrier_create(stream, bkt_alloc);
110 return serf_bucket_response_create(c, bkt_alloc);
115 s_handle_response(serf_request_t *UNUSED(request), serf_bucket_t *response, void *handler_ctx, apr_pool_t *UNUSED(pool))
121 handler_ctx_t *ctx = handler_ctx;
123 rv = serf_bucket_response_status(response, &sl);
124 if (rv != APR_SUCCESS) {
125 if (APR_STATUS_IS_EAGAIN(rv)) {
129 apr_atomic_dec32(&ctx->requests_outstanding);
132 ctx->reason = sl.reason;
133 ctx->response_code = sl.code;
136 rv = serf_bucket_read(response, 2048, &data, &len);
137 if (SERF_BUCKET_READ_ERROR(rv)) {
139 apr_atomic_dec32(&ctx->requests_outstanding);
140 DBG(ctx->r, "REQ[%X] end of s_handle_response() (ERROR)", (unsigned int)(apr_size_t)ctx->r);
143 if (APR_STATUS_IS_EAGAIN(rv)) {
144 /* 0 byte return if EAGAIN returned. */
145 DBG(ctx->r, "REQ[%X] end of s_handle_response() (EAGAIN) len:[%d]", (unsigned int)(apr_size_t)ctx->r, (int)len);
150 if (! ctx->response) {
151 ctx->response = apr_palloc(ctx->pool, len);
152 ctx->response[0] = 0;
153 ctx->response_len = 0;
156 char *tmp = apr_palloc(ctx->pool, ctx->response_len);
157 memcpy(tmp, ctx->response, ctx->response_len);
158 ctx->response = apr_palloc(ctx->pool, ctx->response_len + len);
159 memcpy(ctx->response, tmp, ctx->response_len);
161 memcpy(&ctx->response[ctx->response_len], data, len);
162 ctx->response_len += len;
163 ctx->response[ctx->response_len] = 0;
166 if (APR_STATUS_IS_EOF(rv)) {
168 char *tmp_headers = "";
169 hdrs = serf_bucket_response_get_headers(response);
171 rv = serf_bucket_read(hdrs, 2048, &data, &len);
172 if (SERF_BUCKET_READ_ERROR(rv))
174 tmp_headers = apr_pstrcat(ctx->pool, tmp_headers, apr_psprintf(ctx->pool , "%.*s", (unsigned int)len, data), NULL);
175 if (APR_STATUS_IS_EOF(rv)) {
179 ctx->headers_out = apr_table_make(ctx->pool, 0);
184 pair = apr_strtok(tmp_headers, "\n", &pstat);
190 char *tpair = apr_pstrdup(ctx->pool, pair);
192 val = strchr(tpair, ':');
196 key = qs_trim_string(ctx->pool, key);
197 val = qs_trim_string(ctx->pool, val);
198 DBG(ctx->r, "key:[%s], val:[%s]", key, val);
199 apr_table_add(ctx->headers_out, key, val);
202 ctx->rv = APR_SUCCESS;
203 apr_atomic_dec32(&ctx->requests_outstanding);
204 DBG(ctx->r, "REQ[%X] end of s_handle_response()(NORMAL)", (unsigned int)(apr_size_t)ctx->r);
208 if (APR_STATUS_IS_EAGAIN(rv)) {
209 DBG(ctx->r, "REQ[%X] end of s_handle_response() (EAGAIN)", (unsigned int)(apr_size_t)ctx->r);
216 s_setup_request(serf_request_t *request,
218 serf_bucket_t **req_bkt,
219 serf_response_acceptor_t *acceptor,
221 serf_response_handler_t *handler,
223 apr_pool_t *UNUSED(pool))
225 handler_ctx_t *ctx = setup_ctx;
226 serf_bucket_t *hdrs_bkt;
227 serf_bucket_t *body_bkt = NULL;
228 request_rec *r = ctx->r;
231 if (ctx->post_data) {
232 body_bkt = serf_bucket_simple_create(ctx->post_data, ctx->post_data_len, NULL, NULL, serf_request_get_alloc(request));
235 *req_bkt = serf_bucket_request_create(ctx->method, ctx->path, body_bkt, serf_request_get_alloc(request));
236 hdrs_bkt = serf_bucket_request_get_headers(*req_bkt);
239 apr_array_header_t *headers = (apr_array_header_t*)apr_table_elts(r->headers_in);
240 apr_table_entry_t *hentryp = (apr_table_entry_t*)headers->elts;
241 for (ii=headers->nelts-1; ii>=0; ii--) {
242 serf_bucket_headers_setc(hdrs_bkt, hentryp[ii].key, hentryp[ii].val);
243 DBG(ctx->r, "REQ[%X] REQUEST key:[%s], val:[%s]", (unsigned int)(apr_size_t)ctx->r, hentryp[ii].key, hentryp[ii].val);
245 if (ctx->post_data) {
246 serf_bucket_headers_setc(hdrs_bkt, "X-Chxj-Forward", "Done");
247 serf_bucket_headers_setc(hdrs_bkt, "X-Chxj-Content-Length", apr_psprintf(r->pool, "%" APR_SIZE_T_FMT , ctx->post_data_len));
248 DBG(ctx->r, "REQ[%X] REQUEST key:[%s], val:[%s]", (unsigned int)(apr_size_t)ctx->r, "X-Chxj-Forward", "Done");
249 DBG(ctx->r, "REQ[%X] REQUEST key:[%s], val:[%s]", (unsigned int)(apr_size_t)ctx->r, "X-Chxj-Content-Length", apr_psprintf(r->pool, "%" APR_SIZE_T_FMT, ctx->post_data_len));
252 DBG(ctx->r, "REQ[%X] REQUEST Content-Length:[%s]", (unsigned int)(apr_size_t)r, serf_bucket_headers_get(hdrs_bkt, "Content-Length"));
254 apr_atomic_inc32(&(ctx->requests_outstanding));
255 if (ctx->acceptor_ctx->ssl_flag) {
256 serf_bucket_alloc_t *req_alloc;
257 app_ctx_t *app_ctx = ctx->acceptor_ctx;
259 req_alloc = serf_request_get_alloc(request);
261 if (app_ctx->ssl_ctx == NULL) {
262 *req_bkt = serf_bucket_ssl_encrypt_create(*req_bkt, NULL, app_ctx->bkt_alloc);
263 app_ctx->ssl_ctx = serf_bucket_ssl_encrypt_context_get(*req_bkt);
266 *req_bkt = serf_bucket_ssl_encrypt_create(*req_bkt, app_ctx->ssl_ctx, app_ctx->bkt_alloc);
269 *acceptor = ctx->acceptor;
270 *acceptor_ctx = ctx->acceptor_ctx;
271 *handler = ctx->handler;
278 default_chxj_serf_get(request_rec *r, apr_pool_t *ppool, const char *url_path, int set_headers_flag, apr_size_t *response_len)
283 apr_sockaddr_t *address = NULL;
285 serf_context_t *context;
286 serf_connection_t *connection;
289 handler_ctx_t handler_ctx;
293 s_init(ppool, &pool);
295 apr_uri_parse(pool, url_path, &url);
297 url.port = apr_uri_port_of_scheme(url.scheme);
306 url.hostname = "localhost";
309 url.path = apr_psprintf(pool, "%s?%s", url.path, url.query);
312 rv = apr_sockaddr_info_get(&address, url.hostname, APR_UNSPEC, url.port, 0, pool);
313 if (rv != APR_SUCCESS) {
315 ERR(r, "REQ[%X] %s:%d apr_sockaddr_info_get() failed: rv:[%d|%s] - Please check DNS settings.",
316 (unsigned int)(apr_size_t)r, __FILE__,__LINE__, rv, apr_strerror(rv, buf, 256));
319 memset(&app_ctx, 0, sizeof(app_ctx_t));
321 app_ctx.bkt_alloc = serf_bucket_allocator_create(pool, NULL, NULL);
322 if (strcasecmp(url.scheme, "https") == 0) {
323 app_ctx.ssl_flag = 1;
326 context = serf_context_create(pool);
327 connection = serf_connection_create(context, address, s_connection_setup, &app_ctx, s_connection_closed, &app_ctx, pool);
329 memset(&handler_ctx, 0, sizeof(handler_ctx_t));
330 handler_ctx.requests_outstanding = 0;
331 handler_ctx.host = url.hostinfo;
332 handler_ctx.method = "GET";
333 handler_ctx.path = url.path;
334 handler_ctx.user_agent = (char *)apr_table_get(r->headers_in, "User-Agent");
335 handler_ctx.post_data = NULL;
336 handler_ctx.post_data_len = 0;
338 handler_ctx.acceptor = s_accept_response;
339 handler_ctx.acceptor_ctx = &app_ctx;
340 handler_ctx.handler = s_handle_response;
341 handler_ctx.pool = pool;
343 handler_ctx.response_len = 0;
344 handler_ctx.response = NULL;
346 serf_connection_request_create(connection, s_setup_request, &handler_ctx);
349 rv = serf_context_run(context, SERF_DURATION_FOREVER, pool);
350 if (APR_STATUS_IS_TIMEUP(rv))
354 ERR(r, "Error running context: (%d) %s\n", rv, apr_strerror(rv, buf, sizeof(buf)));
357 if (!apr_atomic_read32(&handler_ctx.requests_outstanding)) {
358 if (handler_ctx.rv != APR_SUCCESS) {
360 ERR(r, "Error running context: (%d) %s\n", handler_ctx.rv, apr_strerror(handler_ctx.rv, buf, sizeof(buf)));
366 serf_connection_close(connection);
367 ret = apr_pstrdup(ppool, handler_ctx.response);
368 if (set_headers_flag) {
369 r->headers_out = apr_table_copy(pool, handler_ctx.headers_out);
370 *response_len = handler_ctx.response_len;
371 char *contentType = (char *)apr_table_get(handler_ctx.headers_out, "Content-Type");
373 chxj_set_content_type(r, contentType);
381 default_chxj_serf_post(request_rec *r, apr_pool_t *ppool, const char *url_path, char *post_data, apr_size_t post_data_len, int set_headers_flag, apr_size_t *response_len, int *response_code)
386 apr_sockaddr_t *address = NULL;
388 serf_context_t *context;
389 serf_connection_t *connection;
392 handler_ctx_t handler_ctx;
395 DBG(r, "REQ:[%X] start chxj_serf_post()", (unsigned int)(apr_size_t)r);
398 s_init(ppool, &pool);
400 apr_uri_parse(pool, url_path, &url);
402 url.port = apr_uri_port_of_scheme(url.scheme);
411 url.hostname = "localhost";
414 url.path = apr_psprintf(pool, "%s?%s", url.path, url.query);
417 rv = apr_sockaddr_info_get(&address, url.hostname, APR_UNSPEC, url.port, 0, pool);
418 if (rv != APR_SUCCESS) {
420 ERR(r, "apr_sockaddr_info_get() failed: rv:[%d|%s]", rv, apr_strerror(rv, buf, 256));
423 memset(&app_ctx, 0, sizeof(app_ctx_t));
425 app_ctx.bkt_alloc = serf_bucket_allocator_create(pool, NULL, NULL);
426 if (strcasecmp(url.scheme, "https") == 0) {
427 app_ctx.ssl_flag = 1;
430 context = serf_context_create(pool);
431 connection = serf_connection_create(context, address, s_connection_setup, &app_ctx, s_connection_closed, &app_ctx, pool);
433 memset(&handler_ctx, 0, sizeof(handler_ctx_t));
434 handler_ctx.requests_outstanding = 0;
435 handler_ctx.host = url.hostinfo;
436 handler_ctx.method = "POST";
437 handler_ctx.path = url.path;
438 handler_ctx.user_agent = (char *)apr_table_get(r->headers_in, "User-Agent");
439 handler_ctx.post_data = post_data;
440 handler_ctx.post_data_len = post_data_len;
442 handler_ctx.acceptor = s_accept_response;
443 handler_ctx.acceptor_ctx = &app_ctx;
444 handler_ctx.handler = s_handle_response;
445 handler_ctx.pool = pool;
447 handler_ctx.response_len = 0;
448 handler_ctx.response = NULL;
450 serf_connection_request_create(connection, s_setup_request, &handler_ctx);
453 rv = serf_context_run(context, SERF_DURATION_FOREVER, pool);
454 if (APR_STATUS_IS_TIMEUP(rv))
458 ERR(r, "Error running context: (%d) %s\n", rv, apr_strerror(rv, buf, sizeof(buf)));
461 if (!apr_atomic_read32(&handler_ctx.requests_outstanding)) {
462 if (handler_ctx.rv != APR_SUCCESS) {
464 ERR(r, "Error running context: (%d) %s\n", handler_ctx.rv, apr_strerror(handler_ctx.rv, buf, sizeof(buf)));
470 DBG(r, "end of serf request");
471 DBG(r, "response_code:[%d]", handler_ctx.response_code);
472 DBG(r, "response:[%s][%" APR_SIZE_T_FMT "]", handler_ctx.response, handler_ctx.response_len);
473 serf_connection_close(connection);
474 ret = apr_pstrdup(ppool, handler_ctx.response);
475 if (set_headers_flag) {
476 r->headers_out = apr_table_copy(pool, handler_ctx.headers_out);
477 *response_len = handler_ctx.response_len;
478 char *contentType = (char *)apr_table_get(handler_ctx.headers_out, "Content-Type");
480 DBG(r, "response content type[%s]", contentType);
481 chxj_set_content_type(r, apr_pstrdup(r->pool, contentType));
484 *response_code = handler_ctx.response_code;
485 DBG(r, "REQ:[%X] end chxj_serf_post()", (unsigned int)(apr_size_t)r);