… | |
… | |
122 | |
122 | |
123 | If the server sends a header multiple times, then their contents will be |
123 | If the server sends a header multiple times, then their contents will be |
124 | joined together with a comma (C<,>), as per the HTTP spec. |
124 | joined together with a comma (C<,>), as per the HTTP spec. |
125 | |
125 | |
126 | If an internal error occurs, such as not being able to resolve a hostname, |
126 | If an internal error occurs, such as not being able to resolve a hostname, |
127 | then C<$data> will be C<undef>, C<< $headers->{Status} >> will be C<59x> |
127 | then C<$data> will be C<undef>, C<< $headers->{Status} >> will be |
128 | (usually C<599>) and the C<Reason> pseudo-header will contain an error |
128 | C<590>-C<599> and the C<Reason> pseudo-header will contain an error |
129 | message. |
129 | message. Currently the following status codes are used: |
|
|
130 | |
|
|
131 | =over 4 |
|
|
132 | |
|
|
133 | =item 595 - errors during connection etsbalishment, proxy handshake. |
|
|
134 | |
|
|
135 | =item 596 - errors during TLS negotiation, request sending and header processing. |
|
|
136 | |
|
|
137 | =item 597 - errors during body receiving or processing. |
|
|
138 | |
|
|
139 | =item 598 - user aborted request via C<on_header> or C<on_body>. |
|
|
140 | |
|
|
141 | =item 599 - other, usually nonretryable, errors (garbled URL etc.). |
|
|
142 | |
|
|
143 | =back |
130 | |
144 | |
131 | A typical callback might look like this: |
145 | A typical callback might look like this: |
132 | |
146 | |
133 | sub { |
147 | sub { |
134 | my ($body, $hdr) = @_; |
148 | my ($body, $hdr) = @_; |
… | |
… | |
182 | =item cookie_jar => $hash_ref |
196 | =item cookie_jar => $hash_ref |
183 | |
197 | |
184 | Passing this parameter enables (simplified) cookie-processing, loosely |
198 | Passing this parameter enables (simplified) cookie-processing, loosely |
185 | based on the original netscape specification. |
199 | based on the original netscape specification. |
186 | |
200 | |
187 | The C<$hash_ref> must be an (initially empty) hash reference which will |
201 | The C<$hash_ref> must be an (initially empty) hash reference which |
188 | get updated automatically. It is possible to save the cookie_jar to |
202 | will get updated automatically. It is possible to save the cookie jar |
189 | persistent storage with something like JSON or Storable, but this is not |
203 | to persistent storage with something like JSON or Storable - see the |
190 | recommended, as expiry times are currently being ignored. |
204 | C<AnyEvent::HTTP::cookie_jar_expire> function if you wish to remove |
|
|
205 | expired or session-only cookies, and also for documentation on the format |
|
|
206 | of the cookie jar. |
191 | |
207 | |
192 | Note that this cookie implementation is not of very high quality, nor |
208 | Note that this cookie implementation is not meant to be complete. If |
193 | meant to be complete. If you want complete cookie management you have to |
209 | you want complete cookie management you have to do that on your |
194 | do that on your own. C<cookie_jar> is meant as a quick fix to get some |
210 | own. C<cookie_jar> is meant as a quick fix to get most cookie-using sites |
195 | cookie-using sites working. Cookies are a privacy disaster, do not use |
211 | working. Cookies are a privacy disaster, do not use them unless required |
196 | them unless required to. |
212 | to. |
197 | |
213 | |
198 | When cookie processing is enabled, the C<Cookie:> and C<Set-Cookie:> |
214 | When cookie processing is enabled, the C<Cookie:> and C<Set-Cookie:> |
199 | headers will be ste and handled by this module, otherwise they will be |
215 | headers will be set and handled by this module, otherwise they will be |
200 | left untouched. |
216 | left untouched. |
201 | |
217 | |
202 | =item tls_ctx => $scheme | $tls_ctx |
218 | =item tls_ctx => $scheme | $tls_ctx |
203 | |
219 | |
204 | Specifies the AnyEvent::TLS context to be used for https connections. This |
220 | Specifies the AnyEvent::TLS context to be used for https connections. This |
… | |
… | |
364 | push @{ $CO_SLOT{$_[0]}[1] }, $_[1]; |
380 | push @{ $CO_SLOT{$_[0]}[1] }, $_[1]; |
365 | |
381 | |
366 | _slot_schedule $_[0]; |
382 | _slot_schedule $_[0]; |
367 | } |
383 | } |
368 | |
384 | |
|
|
385 | ############################################################################# |
|
|
386 | |
|
|
387 | # expire cookies |
|
|
388 | sub cookie_jar_expire($;$) { |
|
|
389 | my ($jar, $session_end) = @_; |
|
|
390 | |
|
|
391 | %$jar = () if $jar->{version} != 1; |
|
|
392 | |
|
|
393 | my $anow = AE::now; |
|
|
394 | |
|
|
395 | while (my ($chost, $paths) = each %$jar) { |
|
|
396 | next unless ref $paths; |
|
|
397 | |
|
|
398 | while (my ($cpath, $cookies) = each %$paths) { |
|
|
399 | while (my ($cookie, $kv) = each %$cookies) { |
|
|
400 | if (exists $kv->{_expires}) { |
|
|
401 | delete $cookies->{$cookie} |
|
|
402 | if $anow > $kv->{_expires}; |
|
|
403 | } elsif ($session_end) { |
|
|
404 | delete $cookies->{$cookie}; |
|
|
405 | } |
|
|
406 | } |
|
|
407 | |
|
|
408 | delete $paths->{$cpath} |
|
|
409 | unless %$cookies; |
|
|
410 | } |
|
|
411 | |
|
|
412 | delete $jar->{$chost} |
|
|
413 | unless %$paths; |
|
|
414 | } |
|
|
415 | } |
|
|
416 | |
|
|
417 | # extract cookies from jar |
|
|
418 | sub cookie_jar_extract($$$$) { |
|
|
419 | my ($jar, $uscheme, $uhost, $upath) = @_; |
|
|
420 | |
|
|
421 | %$jar = () if $jar->{version} != 1; |
|
|
422 | |
|
|
423 | my @cookies; |
|
|
424 | |
|
|
425 | while (my ($chost, $paths) = each %$jar) { |
|
|
426 | next unless ref $paths; |
|
|
427 | |
|
|
428 | if ($chost =~ /^\./) { |
|
|
429 | next unless $chost eq substr $uhost, -length $chost; |
|
|
430 | } elsif ($chost =~ /\./) { |
|
|
431 | next unless $chost eq $uhost; |
|
|
432 | } else { |
|
|
433 | next; |
|
|
434 | } |
|
|
435 | |
|
|
436 | while (my ($cpath, $cookies) = each %$paths) { |
|
|
437 | next unless $cpath eq substr $upath, 0, length $cpath; |
|
|
438 | |
|
|
439 | while (my ($cookie, $kv) = each %$cookies) { |
|
|
440 | next if $uscheme ne "https" && exists $kv->{secure}; |
|
|
441 | |
|
|
442 | if (exists $kv->{_expires} and AE::now > $kv->{_expires}) { |
|
|
443 | delete $cookies->{$cookie}; |
|
|
444 | next; |
|
|
445 | } |
|
|
446 | |
|
|
447 | my $value = $kv->{value}; |
|
|
448 | |
|
|
449 | if ($value =~ /[=;,[:space:]]/) { |
|
|
450 | $value =~ s/([\\"])/\\$1/g; |
|
|
451 | $value = "\"$value\""; |
|
|
452 | } |
|
|
453 | |
|
|
454 | push @cookies, "$cookie=$value"; |
|
|
455 | } |
|
|
456 | } |
|
|
457 | } |
|
|
458 | |
|
|
459 | \@cookies |
|
|
460 | } |
|
|
461 | |
|
|
462 | # parse set_cookie header into jar |
|
|
463 | sub cookie_jar_set_cookie($$$$) { |
|
|
464 | my ($jar, $set_cookie, $uhost, $date) = @_; |
|
|
465 | |
|
|
466 | my $anow = int AE::now; |
|
|
467 | my $snow; # server-now |
|
|
468 | |
|
|
469 | for ($set_cookie) { |
|
|
470 | # parse NAME=VALUE |
|
|
471 | my @kv; |
|
|
472 | |
|
|
473 | # expires is not http-compliant in the original cookie-spec, |
|
|
474 | # we support the official date format and some extensions |
|
|
475 | while ( |
|
|
476 | m{ |
|
|
477 | \G\s* |
|
|
478 | (?: |
|
|
479 | expires \s*=\s* ([A-Z][a-z][a-z]+,\ [^,;]+) |
|
|
480 | | ([^=;,[:space:]]+) \s*=\s* (?: "((?:[^\\"]+|\\.)*)" | ([^=;,[:space:]]*) ) |
|
|
481 | ) |
|
|
482 | }gcxsi |
|
|
483 | ) { |
|
|
484 | my $name = $2; |
|
|
485 | my $value = $4; |
|
|
486 | |
|
|
487 | unless (defined $name) { |
|
|
488 | # expires |
|
|
489 | $name = "expires"; |
|
|
490 | $value = $1; |
|
|
491 | } elsif (!defined $value) { |
|
|
492 | # quoted |
|
|
493 | $value = $3; |
|
|
494 | $value =~ s/\\(.)/$1/gs; |
|
|
495 | } |
|
|
496 | |
|
|
497 | push @kv, lc $name, $value; |
|
|
498 | |
|
|
499 | last unless /\G\s*;/gc; |
|
|
500 | } |
|
|
501 | |
|
|
502 | last unless @kv; |
|
|
503 | |
|
|
504 | my $name = shift @kv; |
|
|
505 | my %kv = (value => shift @kv, @kv); |
|
|
506 | |
|
|
507 | if (exists $kv{"max-age"}) { |
|
|
508 | $kv{_expires} = $anow + delete $kv{"max-age"}; |
|
|
509 | } elsif (exists $kv{expires}) { |
|
|
510 | $snow ||= parse_date ($date) || $anow; |
|
|
511 | $kv{_expires} = $anow + (parse_date (delete $kv{expires}) - $snow); |
|
|
512 | } else { |
|
|
513 | delete $kv{_expires}; |
|
|
514 | } |
|
|
515 | |
|
|
516 | my $cdom; |
|
|
517 | my $cpath = (delete $kv{path}) || "/"; |
|
|
518 | |
|
|
519 | if (exists $kv{domain}) { |
|
|
520 | $cdom = delete $kv{domain}; |
|
|
521 | |
|
|
522 | $cdom =~ s/^\.?/./; # make sure it starts with a "." |
|
|
523 | |
|
|
524 | next if $cdom =~ /\.$/; |
|
|
525 | |
|
|
526 | # this is not rfc-like and not netscape-like. go figure. |
|
|
527 | my $ndots = $cdom =~ y/.//; |
|
|
528 | next if $ndots < ($cdom =~ /\.[^.][^.]\.[^.][^.]$/ ? 3 : 2); |
|
|
529 | } else { |
|
|
530 | $cdom = $uhost; |
|
|
531 | } |
|
|
532 | |
|
|
533 | # store it |
|
|
534 | $jar->{version} = 1; |
|
|
535 | $jar->{$cdom}{$cpath}{$name} = \%kv; |
|
|
536 | |
|
|
537 | redo if /\G\s*,/gc; |
|
|
538 | } |
|
|
539 | } |
|
|
540 | |
369 | # continue to parse $_ for headers and place them into the arg |
541 | # continue to parse $_ for headers and place them into the arg |
370 | sub parse_hdr() { |
542 | sub parse_hdr() { |
371 | my %hdr; |
543 | my %hdr; |
372 | |
544 | |
373 | # things seen, not parsed: |
545 | # things seen, not parsed: |
… | |
… | |
448 | |
620 | |
449 | $upath =~ s%^/?%/%; |
621 | $upath =~ s%^/?%/%; |
450 | |
622 | |
451 | # cookie processing |
623 | # cookie processing |
452 | if (my $jar = $arg{cookie_jar}) { |
624 | if (my $jar = $arg{cookie_jar}) { |
453 | %$jar = () if $jar->{version} != 1; |
625 | my $cookies = cookie_jar_extract $jar, $uscheme, $uhost, $upath; |
454 | |
626 | |
455 | my @cookie; |
|
|
456 | |
|
|
457 | while (my ($chost, $v) = each %$jar) { |
|
|
458 | if ($chost =~ /^\./) { |
|
|
459 | next unless $chost eq substr $uhost, -length $chost; |
|
|
460 | } elsif ($chost =~ /\./) { |
|
|
461 | next unless $chost eq $uhost; |
|
|
462 | } else { |
|
|
463 | next; |
|
|
464 | } |
|
|
465 | |
|
|
466 | while (my ($cpath, $v) = each %$v) { |
|
|
467 | next unless $cpath eq substr $upath, 0, length $cpath; |
|
|
468 | |
|
|
469 | while (my ($k, $v) = each %$v) { |
|
|
470 | next if $uscheme ne "https" && exists $v->{secure}; |
|
|
471 | my $value = $v->{value}; |
|
|
472 | $value =~ s/([\\"])/\\$1/g; |
|
|
473 | push @cookie, "$k=\"$value\""; |
|
|
474 | } |
|
|
475 | } |
|
|
476 | } |
|
|
477 | |
|
|
478 | $hdr{cookie} = join "; ", @cookie |
627 | $hdr{cookie} = join "; ", @$cookies |
479 | if @cookie; |
628 | if @$cookies; |
480 | } |
629 | } |
481 | |
630 | |
482 | my ($rhost, $rport, $rscheme, $rpath); # request host, port, path |
631 | my ($rhost, $rport, $rscheme, $rpath); # request host, port, path |
483 | |
632 | |
484 | if ($proxy) { |
633 | if ($proxy) { |
… | |
… | |
508 | _get_slot $uhost, sub { |
657 | _get_slot $uhost, sub { |
509 | $state{slot_guard} = shift; |
658 | $state{slot_guard} = shift; |
510 | |
659 | |
511 | return unless $state{connect_guard}; |
660 | return unless $state{connect_guard}; |
512 | |
661 | |
|
|
662 | my $ae_error = 595; # connecting |
|
|
663 | |
513 | my $connect_cb = sub { |
664 | my $connect_cb = sub { |
514 | $state{fh} = shift |
665 | $state{fh} = shift |
515 | or do { |
666 | or do { |
516 | my $err = "$!"; |
667 | my $err = "$!"; |
517 | %state = (); |
668 | %state = (); |
518 | return $cb->(undef, { @pseudo, Status => 599, Reason => $err }); |
669 | return $cb->(undef, { @pseudo, Status => $ae_error, Reason => $err }); |
519 | }; |
670 | }; |
520 | |
|
|
521 | pop; # free memory, save a tree |
|
|
522 | |
671 | |
523 | return unless delete $state{connect_guard}; |
672 | return unless delete $state{connect_guard}; |
524 | |
673 | |
525 | # get handle |
674 | # get handle |
526 | $state{handle} = new AnyEvent::Handle |
675 | $state{handle} = new AnyEvent::Handle |
… | |
… | |
529 | tls_ctx => $arg{tls_ctx}, |
678 | tls_ctx => $arg{tls_ctx}, |
530 | # these need to be reconfigured on keepalive handles |
679 | # these need to be reconfigured on keepalive handles |
531 | timeout => $timeout, |
680 | timeout => $timeout, |
532 | on_error => sub { |
681 | on_error => sub { |
533 | %state = (); |
682 | %state = (); |
534 | $cb->(undef, { @pseudo, Status => 599, Reason => $_[2] }); |
683 | $cb->(undef, { @pseudo, Status => $ae_error, Reason => $_[2] }); |
535 | }, |
684 | }, |
536 | on_eof => sub { |
685 | on_eof => sub { |
537 | %state = (); |
686 | %state = (); |
538 | $cb->(undef, { @pseudo, Status => 599, Reason => "Unexpected end-of-file" }); |
687 | $cb->(undef, { @pseudo, Status => $ae_error, Reason => "Unexpected end-of-file" }); |
539 | }, |
688 | }, |
540 | ; |
689 | ; |
541 | |
690 | |
542 | # limit the number of persistent connections |
691 | # limit the number of persistent connections |
543 | # keepalive not yet supported |
692 | # keepalive not yet supported |
… | |
… | |
551 | |
700 | |
552 | $state{handle}->starttls ("connect") if $rscheme eq "https"; |
701 | $state{handle}->starttls ("connect") if $rscheme eq "https"; |
553 | |
702 | |
554 | # handle actual, non-tunneled, request |
703 | # handle actual, non-tunneled, request |
555 | my $handle_actual_request = sub { |
704 | my $handle_actual_request = sub { |
|
|
705 | $ae_error = 596; # request phase |
|
|
706 | |
556 | $state{handle}->starttls ("connect") if $uscheme eq "https" && !exists $state{handle}{tls}; |
707 | $state{handle}->starttls ("connect") if $uscheme eq "https" && !exists $state{handle}{tls}; |
557 | |
708 | |
558 | # send request |
709 | # send request |
559 | $state{handle}->push_write ( |
710 | $state{handle}->push_write ( |
560 | "$method $rpath HTTP/1.1\015\012" |
711 | "$method $rpath HTTP/1.1\015\012" |
… | |
… | |
571 | # status line and headers |
722 | # status line and headers |
572 | $state{read_response} = sub { |
723 | $state{read_response} = sub { |
573 | for ("$_[1]") { |
724 | for ("$_[1]") { |
574 | y/\015//d; # weed out any \015, as they show up in the weirdest of places. |
725 | y/\015//d; # weed out any \015, as they show up in the weirdest of places. |
575 | |
726 | |
576 | /^HTTP\/([0-9\.]+) \s+ ([0-9]{3}) (?: \s+ ([^\012]*) )? \012/igxc |
727 | /^HTTP\/0*([0-9\.]+) \s+ ([0-9]{3}) (?: \s+ ([^\012]*) )? \012/gxci |
577 | or return (%state = (), $cb->(undef, { @pseudo, Status => 599, Reason => "Invalid server response" })); |
728 | or return (%state = (), $cb->(undef, { @pseudo, Status => 599, Reason => "Invalid server response" })); |
578 | |
729 | |
579 | # 100 Continue handling |
730 | # 100 Continue handling |
580 | # should not happen as we don't send expect: 100-continue, |
731 | # should not happen as we don't send expect: 100-continue, |
581 | # but we handle it just in case. |
732 | # but we handle it just in case. |
… | |
… | |
616 | |
767 | |
617 | if ($recurse) { |
768 | if ($recurse) { |
618 | my $status = $hdr{Status}; |
769 | my $status = $hdr{Status}; |
619 | |
770 | |
620 | # industry standard is to redirect POST as GET for |
771 | # industry standard is to redirect POST as GET for |
621 | # 301, 302 and 303, in contrast to http/1.0 and 1.1. |
772 | # 301, 302 and 303, in contrast to HTTP/1.0 and 1.1. |
622 | # also, the UA should ask the user for 301 and 307 and POST, |
773 | # also, the UA should ask the user for 301 and 307 and POST, |
623 | # industry standard seems to be to simply follow. |
774 | # industry standard seems to be to simply follow. |
624 | # we go with the industry standard. |
775 | # we go with the industry standard. |
625 | if ($status == 301 or $status == 302 or $status == 303) { |
776 | if ($status == 301 or $status == 302 or $status == 303) { |
626 | # HTTP/1.1 is unclear on how to mutate the method |
777 | # HTTP/1.1 is unclear on how to mutate the method |
… | |
… | |
630 | $redirect = 1; |
781 | $redirect = 1; |
631 | } |
782 | } |
632 | } |
783 | } |
633 | |
784 | |
634 | my $finish = sub { # ($data, $err_status, $err_reason[, $keepalive]) |
785 | my $finish = sub { # ($data, $err_status, $err_reason[, $keepalive]) |
635 | my $keepalive = pop; |
786 | my $may_keep_alive = $_[3]; |
636 | |
787 | |
637 | $state{handle}->destroy if $state{handle}; |
788 | $state{handle}->destroy if $state{handle}; |
638 | %state = (); |
789 | %state = (); |
639 | |
790 | |
640 | if (defined $_[1]) { |
791 | if (defined $_[1]) { |
… | |
… | |
642 | $hdr{OrigReason} = $hdr{Reason}; $hdr{Reason} = $_[2]; |
793 | $hdr{OrigReason} = $hdr{Reason}; $hdr{Reason} = $_[2]; |
643 | } |
794 | } |
644 | |
795 | |
645 | # set-cookie processing |
796 | # set-cookie processing |
646 | if ($arg{cookie_jar}) { |
797 | if ($arg{cookie_jar}) { |
647 | for ($hdr{"set-cookie"}) { |
798 | cookie_jar_set_cookie $arg{cookie_jar}, $hdr{"set-cookie"}, $uhost, $hdr{date}; |
648 | # parse NAME=VALUE |
|
|
649 | my @kv; |
|
|
650 | |
|
|
651 | while (/\G\s* ([^=;,[:space:]]+) \s*=\s* (?: "((?:[^\\"]+|\\.)*)" | ([^=;,[:space:]]*) )/gcxs) { |
|
|
652 | my $name = $1; |
|
|
653 | my $value = $3; |
|
|
654 | |
|
|
655 | unless ($value) { |
|
|
656 | $value = $2; |
|
|
657 | $value =~ s/\\(.)/$1/gs; |
|
|
658 | } |
|
|
659 | |
|
|
660 | push @kv, $name => $value; |
|
|
661 | |
|
|
662 | last unless /\G\s*;/gc; |
|
|
663 | } |
|
|
664 | |
|
|
665 | last unless @kv; |
|
|
666 | |
|
|
667 | my $name = shift @kv; |
|
|
668 | my %kv = (value => shift @kv, @kv); |
|
|
669 | |
|
|
670 | my $cdom; |
|
|
671 | my $cpath = (delete $kv{path}) || "/"; |
|
|
672 | |
|
|
673 | if (exists $kv{domain}) { |
|
|
674 | $cdom = delete $kv{domain}; |
|
|
675 | |
|
|
676 | $cdom =~ s/^\.?/./; # make sure it starts with a "." |
|
|
677 | |
|
|
678 | next if $cdom =~ /\.$/; |
|
|
679 | |
|
|
680 | # this is not rfc-like and not netscape-like. go figure. |
|
|
681 | my $ndots = $cdom =~ y/.//; |
|
|
682 | next if $ndots < ($cdom =~ /\.[^.][^.]\.[^.][^.]$/ ? 3 : 2); |
|
|
683 | } else { |
|
|
684 | $cdom = $uhost; |
|
|
685 | } |
|
|
686 | |
|
|
687 | # store it |
|
|
688 | $arg{cookie_jar}{version} = 1; |
|
|
689 | $arg{cookie_jar}{$cdom}{$cpath}{$name} = \%kv; |
|
|
690 | |
|
|
691 | redo if /\G\s*,/gc; |
|
|
692 | } |
|
|
693 | } |
799 | } |
694 | |
800 | |
695 | if ($redirect && exists $hdr{location}) { |
801 | if ($redirect && exists $hdr{location}) { |
696 | # we ignore any errors, as it is very common to receive |
802 | # we ignore any errors, as it is very common to receive |
697 | # Content-Length != 0 but no actual body |
803 | # Content-Length != 0 but no actual body |
… | |
… | |
704 | $cb); |
810 | $cb); |
705 | } else { |
811 | } else { |
706 | $cb->($_[0], \%hdr); |
812 | $cb->($_[0], \%hdr); |
707 | } |
813 | } |
708 | }; |
814 | }; |
|
|
815 | |
|
|
816 | $ae_error = 597; # body phase |
709 | |
817 | |
710 | my $len = $hdr{"content-length"}; |
818 | my $len = $hdr{"content-length"}; |
711 | |
819 | |
712 | if (!$redirect && $arg{on_header} && !$arg{on_header}(\%hdr)) { |
820 | if (!$redirect && $arg{on_header} && !$arg{on_header}(\%hdr)) { |
713 | $finish->(undef, 598 => "Request cancelled by on_header"); |
821 | $finish->(undef, 598 => "Request cancelled by on_header"); |
… | |
… | |
735 | } elsif ($hdr{"transfer-encoding"} =~ /\bchunked\b/i) { |
843 | } elsif ($hdr{"transfer-encoding"} =~ /\bchunked\b/i) { |
736 | my $cl = 0; |
844 | my $cl = 0; |
737 | my $body = undef; |
845 | my $body = undef; |
738 | my $on_body = $arg{on_body} || sub { $body .= shift; 1 }; |
846 | my $on_body = $arg{on_body} || sub { $body .= shift; 1 }; |
739 | |
847 | |
740 | $_[0]->on_error (sub { $finish->(undef, 599 => $_[2]) }); |
|
|
741 | |
|
|
742 | my $read_chunk; $read_chunk = sub { |
848 | my $read_chunk; $read_chunk = sub { |
743 | $_[1] =~ /^([0-9a-fA-F]+)/ |
849 | $_[1] =~ /^([0-9a-fA-F]+)/ |
744 | or $finish->(undef, 599 => "Garbled chunked transfer encoding"); |
850 | or $finish->(undef, $ae_error => "Garbled chunked transfer encoding"); |
745 | |
851 | |
746 | my $len = hex $1; |
852 | my $len = hex $1; |
747 | |
853 | |
748 | if ($len) { |
854 | if ($len) { |
749 | $cl += $len; |
855 | $cl += $len; |
… | |
… | |
752 | $on_body->($_[1], \%hdr) |
858 | $on_body->($_[1], \%hdr) |
753 | or return $finish->(undef, 598 => "Request cancelled by on_body"); |
859 | or return $finish->(undef, 598 => "Request cancelled by on_body"); |
754 | |
860 | |
755 | $_[0]->push_read (line => sub { |
861 | $_[0]->push_read (line => sub { |
756 | length $_[1] |
862 | length $_[1] |
757 | and return $finish->(undef, 599 => "Garbled chunked transfer encoding"); |
863 | and return $finish->(undef, $ae_error => "Garbled chunked transfer encoding"); |
758 | $_[0]->push_read (line => $read_chunk); |
864 | $_[0]->push_read (line => $read_chunk); |
759 | }); |
865 | }); |
760 | }); |
866 | }); |
761 | } else { |
867 | } else { |
762 | $hdr{"content-length"} ||= $cl; |
868 | $hdr{"content-length"} ||= $cl; |
… | |
… | |
765 | if (length $_[1]) { |
871 | if (length $_[1]) { |
766 | for ("$_[1]") { |
872 | for ("$_[1]") { |
767 | y/\015//d; # weed out any \015, as they show up in the weirdest of places. |
873 | y/\015//d; # weed out any \015, as they show up in the weirdest of places. |
768 | |
874 | |
769 | my $hdr = parse_hdr |
875 | my $hdr = parse_hdr |
770 | or return $finish->(undef, 599 => "Garbled response trailers"); |
876 | or return $finish->(undef, $ae_error => "Garbled response trailers"); |
771 | |
877 | |
772 | %hdr = (%hdr, %$hdr); |
878 | %hdr = (%hdr, %$hdr); |
773 | } |
879 | } |
774 | } |
880 | } |
775 | |
881 | |
… | |
… | |
779 | }; |
885 | }; |
780 | |
886 | |
781 | $_[0]->push_read (line => $read_chunk); |
887 | $_[0]->push_read (line => $read_chunk); |
782 | |
888 | |
783 | } elsif ($arg{on_body}) { |
889 | } elsif ($arg{on_body}) { |
784 | $_[0]->on_error (sub { $finish->(undef, 599 => $_[2]) }); |
|
|
785 | |
|
|
786 | if ($len) { |
890 | if ($len) { |
787 | $_[0]->on_read (sub { |
891 | $_[0]->on_read (sub { |
788 | $len -= length $_[0]{rbuf}; |
892 | $len -= length $_[0]{rbuf}; |
789 | |
893 | |
790 | $arg{on_body}(delete $_[0]{rbuf}, \%hdr) |
894 | $arg{on_body}(delete $_[0]{rbuf}, \%hdr) |
… | |
… | |
804 | } |
908 | } |
805 | } else { |
909 | } else { |
806 | $_[0]->on_eof (undef); |
910 | $_[0]->on_eof (undef); |
807 | |
911 | |
808 | if ($len) { |
912 | if ($len) { |
809 | $_[0]->on_error (sub { $finish->(undef, 599 => $_[2]) }); |
|
|
810 | $_[0]->on_read (sub { |
913 | $_[0]->on_read (sub { |
811 | $finish->((substr delete $_[0]{rbuf}, 0, $len, ""), undef, undef, 1) |
914 | $finish->((substr delete $_[0]{rbuf}, 0, $len, ""), undef, undef, 1) |
812 | if $len <= length $_[0]{rbuf}; |
915 | if $len <= length $_[0]{rbuf}; |
813 | }); |
916 | }); |
814 | } else { |
917 | } else { |
815 | $_[0]->on_error (sub { |
918 | $_[0]->on_error (sub { |
816 | ($! == Errno::EPIPE || !$!) |
919 | ($! == Errno::EPIPE || !$!) |
817 | ? $finish->(delete $_[0]{rbuf}) |
920 | ? $finish->(delete $_[0]{rbuf}) |
818 | : $finish->(undef, 599 => $_[2]); |
921 | : $finish->(undef, $ae_error => $_[2]); |
819 | }); |
922 | }); |
820 | $_[0]->on_read (sub { }); |
923 | $_[0]->on_read (sub { }); |
821 | } |
924 | } |
822 | } |
925 | } |
823 | } |
926 | } |
… | |
… | |
896 | string of the form C<http://host:port> (optionally C<https:...>), croaks |
999 | string of the form C<http://host:port> (optionally C<https:...>), croaks |
897 | otherwise. |
1000 | otherwise. |
898 | |
1001 | |
899 | To clear an already-set proxy, use C<undef>. |
1002 | To clear an already-set proxy, use C<undef>. |
900 | |
1003 | |
|
|
1004 | =item AnyEvent::HTTP::cookie_jar_expire $jar[, $session_end] |
|
|
1005 | |
|
|
1006 | Remove all cookies from the cookie jar that have been expired. If |
|
|
1007 | C<$session_end> is given and true, then additionally remove all session |
|
|
1008 | cookies. |
|
|
1009 | |
|
|
1010 | You should call this function (with a true C<$session_end>) before you |
|
|
1011 | save cookies to disk, and you should call this function after loading them |
|
|
1012 | again. If you have a long-running program you can additonally call this |
|
|
1013 | function from time to time. |
|
|
1014 | |
|
|
1015 | A cookie jar is initially an empty hash-reference that is managed by this |
|
|
1016 | module. It's format is subject to change, but currently it is like this: |
|
|
1017 | |
|
|
1018 | The key C<version> has to contain C<1>, otherwise the hash gets |
|
|
1019 | emptied. All other keys are hostnames or IP addresses pointing to |
|
|
1020 | hash-references. The key for these inner hash references is the |
|
|
1021 | server path for which this cookie is meant, and the values are again |
|
|
1022 | hash-references. The keys of those hash-references is the cookie name, and |
|
|
1023 | the value, you guessed it, is another hash-reference, this time with the |
|
|
1024 | key-value pairs from the cookie, except for C<expires> and C<max-age>, |
|
|
1025 | which have been replaced by a C<_expires> key that contains the cookie |
|
|
1026 | expiry timestamp. |
|
|
1027 | |
|
|
1028 | Here is an example of a cookie jar with a single cookie, so you have a |
|
|
1029 | chance of understanding the above paragraph: |
|
|
1030 | |
|
|
1031 | { |
|
|
1032 | version => 1, |
|
|
1033 | "10.0.0.1" => { |
|
|
1034 | "/" => { |
|
|
1035 | "mythweb_id" => { |
|
|
1036 | _expires => 1293917923, |
|
|
1037 | value => "ooRung9dThee3ooyXooM1Ohm", |
|
|
1038 | }, |
|
|
1039 | }, |
|
|
1040 | }, |
|
|
1041 | } |
|
|
1042 | |
901 | =item $date = AnyEvent::HTTP::format_date $timestamp |
1043 | =item $date = AnyEvent::HTTP::format_date $timestamp |
902 | |
1044 | |
903 | Takes a POSIX timestamp (seconds since the epoch) and formats it as a HTTP |
1045 | Takes a POSIX timestamp (seconds since the epoch) and formats it as a HTTP |
904 | Date (RFC 2616). |
1046 | Date (RFC 2616). |
905 | |
1047 | |
906 | =item $timestamp = AnyEvent::HTTP::parse_date $date |
1048 | =item $timestamp = AnyEvent::HTTP::parse_date $date |
907 | |
1049 | |
908 | Takes a HTTP Date (RFC 2616) and returns the corresponding POSIX |
1050 | Takes a HTTP Date (RFC 2616) or a Cookie date (netscape cookie spec) or a |
|
|
1051 | bunch of minor variations of those, and returns the corresponding POSIX |
909 | timestamp, or C<undef> if the date cannot be parsed. |
1052 | timestamp, or C<undef> if the date cannot be parsed. |
910 | |
1053 | |
911 | =item $AnyEvent::HTTP::MAX_RECURSE |
1054 | =item $AnyEvent::HTTP::MAX_RECURSE |
912 | |
1055 | |
913 | The default value for the C<recurse> request parameter (default: C<10>). |
1056 | The default value for the C<recurse> request parameter (default: C<10>). |
… | |
… | |
953 | sub parse_date($) { |
1096 | sub parse_date($) { |
954 | my ($date) = @_; |
1097 | my ($date) = @_; |
955 | |
1098 | |
956 | my ($d, $m, $y, $H, $M, $S); |
1099 | my ($d, $m, $y, $H, $M, $S); |
957 | |
1100 | |
958 | if ($date =~ /^[A-Z][a-z][a-z], ([0-9][0-9]) ([A-Z][a-z][a-z]) ([0-9][0-9][0-9][0-9]) ([0-9][0-9]):([0-9][0-9]):([0-9][0-9]) GMT$/) { |
1101 | if ($date =~ /^[A-Z][a-z][a-z]+, ([0-9][0-9]?)[\- ]([A-Z][a-z][a-z])[\- ]([0-9][0-9][0-9][0-9]) ([0-9][0-9]?):([0-9][0-9]?):([0-9][0-9]?) GMT$/) { |
959 | # RFC 822/1123, required by RFC 2616 |
1102 | # RFC 822/1123, required by RFC 2616 (with " ") |
|
|
1103 | # cookie dates (with "-") |
|
|
1104 | |
960 | ($d, $m, $y, $H, $M, $S) = ($1, $2, $3, $4, $5, $6); |
1105 | ($d, $m, $y, $H, $M, $S) = ($1, $2, $3, $4, $5, $6); |
961 | |
1106 | |
962 | } elsif ($date =~ /^[A-Z][a-z]+, ([0-9][0-9])-([A-Z][a-z][a-z])-([0-9][0-9]) ([0-9][0-9]):([0-9][0-9]):([0-9][0-9]) GMT$/) { |
1107 | } elsif ($date =~ /^[A-Z][a-z][a-z]+, ([0-9][0-9]?)-([A-Z][a-z][a-z])-([0-9][0-9]) ([0-9][0-9]?):([0-9][0-9]?):([0-9][0-9]?) GMT$/) { |
963 | # RFC 850 |
1108 | # RFC 850 |
964 | ($d, $m, $y, $H, $M, $S) = ($1, $2, $3 < 69 ? $3 + 2000 : $3 + 1900, $4, $5, $6); |
1109 | ($d, $m, $y, $H, $M, $S) = ($1, $2, $3 < 69 ? $3 + 2000 : $3 + 1900, $4, $5, $6); |
965 | |
1110 | |
966 | } elsif ($date =~ /^[A-Z][a-z][a-z] ([A-Z][a-z][a-z]) ([0-9 ][0-9]) ([0-9][0-9]):([0-9][0-9]):([0-9][0-9]) ([0-9][0-9][0-9][0-9])$/) { |
1111 | } elsif ($date =~ /^[A-Z][a-z][a-z]+ ([A-Z][a-z][a-z]) ([0-9 ]?[0-9]) ([0-9][0-9]?):([0-9][0-9]?):([0-9][0-9]?) ([0-9][0-9][0-9][0-9])$/) { |
967 | # ISO C's asctime |
1112 | # ISO C's asctime |
968 | ($d, $m, $y, $H, $M, $S) = ($2, $1, $6, $3, $4, $5); |
1113 | ($d, $m, $y, $H, $M, $S) = ($2, $1, $6, $3, $4, $5); |
969 | } |
1114 | } |
970 | # other formats fail in the loop below |
1115 | # other formats fail in the loop below |
971 | |
1116 | |