// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license. #![deny(warnings)] use deno_core::error::bad_resource_id; use deno_core::error::type_error; use deno_core::error::AnyError; use deno_core::serde_json; use deno_core::serde_json::json; use deno_core::serde_json::Value; use deno_core::url::Url; use deno_core::AsyncRefCell; use deno_core::BufVec; use deno_core::CancelFuture; use deno_core::CancelHandle; use deno_core::JsRuntime; use deno_core::OpState; use deno_core::RcRef; use deno_core::Resource; use deno_core::ZeroCopyBuf; use reqwest::header::HeaderName; use reqwest::header::HeaderValue; use reqwest::redirect::Policy; use reqwest::Client; use reqwest::Method; use reqwest::Response; use serde::Deserialize; use std::borrow::Cow; use std::cell::RefCell; use std::convert::From; use std::fs::File; use std::io::Read; use std::path::PathBuf; use std::rc::Rc; pub use reqwest; // Re-export reqwest /// Execute this crates' JS source files. pub fn init(isolate: &mut JsRuntime) { let files = vec![ ( "deno:op_crates/fetch/01_fetch_util.js", include_str!("01_fetch_util.js"), ), ( "deno:op_crates/fetch/03_dom_iterable.js", include_str!("03_dom_iterable.js"), ), ( "deno:op_crates/fetch/11_streams.js", include_str!("11_streams.js"), ), ( "deno:op_crates/fetch/20_headers.js", include_str!("20_headers.js"), ), ( "deno:op_crates/fetch/26_fetch.js", include_str!("26_fetch.js"), ), ]; for (url, source_code) in files { isolate.execute(url, source_code).unwrap(); } } pub trait FetchPermissions { fn check_net_url(&self, _url: &Url) -> Result<(), AnyError>; fn check_read(&self, _p: &PathBuf) -> Result<(), AnyError>; } /// For use with `op_fetch` when the user does not want permissions. pub struct NoFetchPermissions; impl FetchPermissions for NoFetchPermissions { fn check_net_url(&self, _url: &Url) -> Result<(), AnyError> { Ok(()) } fn check_read(&self, _p: &PathBuf) -> Result<(), AnyError> { Ok(()) } } pub fn get_declaration() -> PathBuf { PathBuf::from(env!("CARGO_MANIFEST_DIR")).join("lib.deno_fetch.d.ts") } pub async fn op_fetch( state: Rc>, args: Value, data: BufVec, ) -> Result where FP: FetchPermissions + 'static, { #[derive(Deserialize)] #[serde(rename_all = "camelCase")] struct FetchArgs { method: Option, url: String, base_url: Option, headers: Vec<(String, String)>, client_rid: Option, } let args: FetchArgs = serde_json::from_value(args)?; let client = if let Some(rid) = args.client_rid { let state_ = state.borrow(); let r = state_ .resource_table .get::(rid) .ok_or_else(bad_resource_id)?; r.client.clone() } else { let state_ = state.borrow(); let client = state_.borrow::(); client.clone() }; let method = match args.method { Some(method_str) => Method::from_bytes(method_str.as_bytes())?, None => Method::GET, }; let base_url = match args.base_url { Some(base_url) => Some(Url::parse(&base_url)?), _ => None, }; let url = Url::options() .base_url(base_url.as_ref()) .parse(&args.url)?; // Check scheme before asking for net permission let scheme = url.scheme(); if scheme != "http" && scheme != "https" { return Err(type_error(format!("scheme '{}' not supported", scheme))); } { let state_ = state.borrow(); let permissions = state_.borrow::(); permissions.check_net_url(&url)?; } let mut request = client.request(method, url); match data.len() { 0 => {} 1 => request = request.body(Vec::from(&*data[0])), _ => panic!("Invalid number of arguments"), } for (key, value) in args.headers { let name = HeaderName::from_bytes(key.as_bytes()).unwrap(); let v = HeaderValue::from_str(&value).unwrap(); request = request.header(name, v); } //debug!("Before fetch {}", url); let res = match request.send().await { Ok(res) => res, Err(e) => return Err(type_error(e.to_string())), }; //debug!("Fetch response {}", url); let status = res.status(); let mut res_headers = Vec::new(); for (key, val) in res.headers().iter() { let key_string = key.to_string(); if val.as_bytes().is_ascii() { res_headers.push((key_string, val.to_str().unwrap().to_owned())) } else { res_headers.push(( key_string, val .as_bytes() .iter() .map(|&c| c as char) .collect::(), )); } } let rid = state.borrow_mut().resource_table.add(HttpBodyResource { response: AsyncRefCell::new(res), cancel: Default::default(), }); Ok(json!({ "bodyRid": rid, "status": status.as_u16(), "statusText": status.canonical_reason().unwrap_or(""), "headers": res_headers })) } pub async fn op_fetch_read( state: Rc>, args: Value, _data: BufVec, ) -> Result { #[derive(Deserialize)] #[serde(rename_all = "camelCase")] struct Args { rid: u32, } let args: Args = serde_json::from_value(args)?; let rid = args.rid; let resource = state .borrow() .resource_table .get::(rid as u32) .ok_or_else(bad_resource_id)?; let mut response = RcRef::map(&resource, |r| &r.response).borrow_mut().await; let cancel = RcRef::map(resource, |r| &r.cancel); let maybe_chunk = response.chunk().or_cancel(cancel).await??; if let Some(chunk) = maybe_chunk { // TODO(ry) This is terribly inefficient. Make this zero-copy. Ok(json!({ "chunk": &*chunk })) } else { Ok(json!({ "chunk": null })) } } struct HttpBodyResource { response: AsyncRefCell, cancel: CancelHandle, } impl Resource for HttpBodyResource { fn name(&self) -> Cow { "httpBody".into() } } struct HttpClientResource { client: Client, } impl Resource for HttpClientResource { fn name(&self) -> Cow { "httpClient".into() } } impl HttpClientResource { fn new(client: Client) -> Self { Self { client } } } pub fn op_create_http_client( state: &mut OpState, args: Value, _zero_copy: &mut [ZeroCopyBuf], ) -> Result where FP: FetchPermissions + 'static, { #[derive(Deserialize, Default, Debug)] #[serde(rename_all = "camelCase")] #[serde(default)] struct CreateHttpClientOptions { ca_file: Option, ca_data: Option, } let args: CreateHttpClientOptions = serde_json::from_value(args)?; if let Some(ca_file) = args.ca_file.clone() { let permissions = state.borrow::(); permissions.check_read(&PathBuf::from(ca_file))?; } let client = create_http_client(args.ca_file.as_deref(), args.ca_data.as_deref()) .unwrap(); let rid = state.resource_table.add(HttpClientResource::new(client)); Ok(json!(rid)) } /// Create new instance of async reqwest::Client. This client supports /// proxies and doesn't follow redirects. fn create_http_client( ca_file: Option<&str>, ca_data: Option<&str>, ) -> Result { let mut builder = Client::builder().redirect(Policy::none()).use_rustls_tls(); if let Some(ca_data) = ca_data { let ca_data_vec = ca_data.as_bytes().to_vec(); let cert = reqwest::Certificate::from_pem(&ca_data_vec)?; builder = builder.add_root_certificate(cert); } else if let Some(ca_file) = ca_file { let mut buf = Vec::new(); File::open(ca_file)?.read_to_end(&mut buf)?; let cert = reqwest::Certificate::from_pem(&buf)?; builder = builder.add_root_certificate(cert); } builder .build() .map_err(|_| deno_core::error::generic_error("Unable to build http client")) }