2016-09-11 02:17:43 +08:00
|
|
|
// The HTTP based parts of the config, Transport and Client
|
|
|
|
|
|
|
|
package fs
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"net/http/httputil"
|
|
|
|
"reflect"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
separatorReq = ">>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>"
|
|
|
|
separatorResp = "<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
transport http.RoundTripper
|
|
|
|
noTransport sync.Once
|
|
|
|
)
|
|
|
|
|
|
|
|
// A net.Conn that sets a deadline for every Read or Write operation
|
|
|
|
type timeoutConn struct {
|
|
|
|
net.Conn
|
|
|
|
readTimer *time.Timer
|
|
|
|
writeTimer *time.Timer
|
|
|
|
timeout time.Duration
|
|
|
|
off time.Time
|
|
|
|
}
|
|
|
|
|
|
|
|
// create a timeoutConn using the timeout
|
|
|
|
func newTimeoutConn(conn net.Conn, timeout time.Duration) *timeoutConn {
|
|
|
|
return &timeoutConn{
|
|
|
|
Conn: conn,
|
|
|
|
timeout: timeout,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-05 18:59:47 +08:00
|
|
|
// Nudge the deadline for an idle timeout on by c.timeout if non-zero
|
|
|
|
func (c *timeoutConn) nudgeDeadline() (err error) {
|
|
|
|
if c.timeout == 0 {
|
|
|
|
return nil
|
2016-09-11 02:17:43 +08:00
|
|
|
}
|
2016-10-05 18:59:47 +08:00
|
|
|
when := time.Now().Add(c.timeout)
|
|
|
|
return c.Conn.SetDeadline(when)
|
2016-09-11 02:17:43 +08:00
|
|
|
}
|
|
|
|
|
2016-10-05 18:59:47 +08:00
|
|
|
// readOrWrite bytes doing idle timeouts
|
|
|
|
func (c *timeoutConn) readOrWrite(f func([]byte) (int, error), b []byte) (n int, err error) {
|
|
|
|
err = c.nudgeDeadline()
|
2016-09-11 02:17:43 +08:00
|
|
|
if err != nil {
|
|
|
|
return n, err
|
|
|
|
}
|
2016-10-05 18:59:47 +08:00
|
|
|
n, err = f(b)
|
|
|
|
cerr := c.nudgeDeadline()
|
|
|
|
if err == nil && cerr != nil {
|
2016-09-11 02:17:43 +08:00
|
|
|
err = cerr
|
|
|
|
}
|
|
|
|
return n, err
|
|
|
|
}
|
|
|
|
|
2016-10-05 18:59:47 +08:00
|
|
|
// Read bytes doing idle timeouts
|
|
|
|
func (c *timeoutConn) Read(b []byte) (n int, err error) {
|
|
|
|
return c.readOrWrite(c.Conn.Read, b)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write bytes doing idle timeouts
|
|
|
|
func (c *timeoutConn) Write(b []byte) (n int, err error) {
|
|
|
|
return c.readOrWrite(c.Conn.Write, b)
|
|
|
|
}
|
|
|
|
|
2016-09-11 02:17:43 +08:00
|
|
|
// setDefaults for a from b
|
|
|
|
//
|
|
|
|
// Copy the public members from b to a. We can't just use a struct
|
|
|
|
// copy as Transport contains a private mutex.
|
|
|
|
func setDefaults(a, b interface{}) {
|
|
|
|
pt := reflect.TypeOf(a)
|
|
|
|
t := pt.Elem()
|
|
|
|
va := reflect.ValueOf(a).Elem()
|
|
|
|
vb := reflect.ValueOf(b).Elem()
|
|
|
|
for i := 0; i < t.NumField(); i++ {
|
|
|
|
aField := va.Field(i)
|
|
|
|
// Set a from b if it is public
|
|
|
|
if aField.CanSet() {
|
|
|
|
bField := vb.Field(i)
|
|
|
|
aField.Set(bField)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Transport returns an http.RoundTripper with the correct timeouts
|
|
|
|
func (ci *ConfigInfo) Transport() http.RoundTripper {
|
|
|
|
noTransport.Do(func() {
|
|
|
|
// Start with a sensible set of defaults then override.
|
|
|
|
// This also means we get new stuff when it gets added to go
|
|
|
|
t := new(http.Transport)
|
|
|
|
setDefaults(t, http.DefaultTransport.(*http.Transport))
|
|
|
|
t.Proxy = http.ProxyFromEnvironment
|
|
|
|
t.MaxIdleConnsPerHost = 4 * (ci.Checkers + ci.Transfers + 1)
|
|
|
|
t.TLSHandshakeTimeout = ci.ConnectTimeout
|
2016-10-08 17:12:19 +08:00
|
|
|
t.ResponseHeaderTimeout = ci.Timeout
|
2016-09-11 02:17:43 +08:00
|
|
|
t.TLSClientConfig = &tls.Config{InsecureSkipVerify: ci.InsecureSkipVerify}
|
|
|
|
t.DisableCompression = *noGzip
|
|
|
|
// Set in http_old.go initTransport
|
|
|
|
// t.Dial
|
|
|
|
// Set in http_new.go initTransport
|
|
|
|
// t.DialContext
|
|
|
|
// t.IdelConnTimeout
|
|
|
|
// t.ExpectContinueTimeout
|
|
|
|
ci.initTransport(t)
|
|
|
|
// Wrap that http.Transport in our own transport
|
|
|
|
transport = NewTransport(t, ci.DumpHeaders, ci.DumpBodies)
|
|
|
|
})
|
|
|
|
return transport
|
|
|
|
}
|
|
|
|
|
|
|
|
// Client returns an http.Client with the correct timeouts
|
|
|
|
func (ci *ConfigInfo) Client() *http.Client {
|
|
|
|
return &http.Client{
|
|
|
|
Transport: ci.Transport(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Transport is a our http Transport which wraps an http.Transport
|
|
|
|
// * Sets the User Agent
|
|
|
|
// * Does logging
|
|
|
|
type Transport struct {
|
|
|
|
*http.Transport
|
|
|
|
logHeader bool
|
|
|
|
logBody bool
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewTransport wraps the http.Transport passed in and logs all
|
|
|
|
// roundtrips including the body if logBody is set.
|
|
|
|
func NewTransport(transport *http.Transport, logHeader, logBody bool) *Transport {
|
|
|
|
return &Transport{
|
|
|
|
Transport: transport,
|
|
|
|
logHeader: logHeader,
|
|
|
|
logBody: logBody,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-31 03:16:27 +08:00
|
|
|
// A mutex to protect this map
|
|
|
|
var checkedHostMu sync.RWMutex
|
|
|
|
|
2016-10-08 21:00:50 +08:00
|
|
|
// A map of servers we have checked for time
|
|
|
|
var checkedHost = make(map[string]struct{}, 1)
|
|
|
|
|
|
|
|
// Check the server time is the same as ours, once for each server
|
|
|
|
func checkServerTime(req *http.Request, resp *http.Response) {
|
|
|
|
host := req.URL.Host
|
|
|
|
if req.Host != "" {
|
|
|
|
host = req.Host
|
|
|
|
}
|
2016-10-31 03:16:27 +08:00
|
|
|
checkedHostMu.RLock()
|
|
|
|
_, ok := checkedHost[host]
|
|
|
|
checkedHostMu.RUnlock()
|
|
|
|
if ok {
|
2016-10-08 21:00:50 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
dateString := resp.Header.Get("Date")
|
|
|
|
if dateString == "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
date, err := http.ParseTime(dateString)
|
|
|
|
if err != nil {
|
|
|
|
Debug(nil, "Couldn't parse Date: from server %s: %q: %v", host, dateString, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
dt := time.Since(date)
|
|
|
|
const window = 5 * 60 * time.Second
|
|
|
|
if dt > window || dt < -window {
|
|
|
|
Log(nil, "Time may be set wrong - time from %q is %v different from this computer", host, dt)
|
|
|
|
}
|
2016-10-31 03:16:27 +08:00
|
|
|
checkedHostMu.Lock()
|
2016-10-08 21:00:50 +08:00
|
|
|
checkedHost[host] = struct{}{}
|
2016-10-31 03:16:27 +08:00
|
|
|
checkedHostMu.Unlock()
|
2016-10-08 21:00:50 +08:00
|
|
|
}
|
|
|
|
|
2016-09-11 02:17:43 +08:00
|
|
|
// RoundTrip implements the RoundTripper interface.
|
|
|
|
func (t *Transport) RoundTrip(req *http.Request) (resp *http.Response, err error) {
|
|
|
|
// Force user agent
|
|
|
|
req.Header.Set("User-Agent", UserAgent)
|
|
|
|
// Log request
|
2016-09-22 15:40:37 +08:00
|
|
|
if t.logHeader || t.logBody {
|
2016-09-11 02:17:43 +08:00
|
|
|
buf, _ := httputil.DumpRequestOut(req, t.logBody)
|
|
|
|
Debug(nil, "%s", separatorReq)
|
2016-10-31 20:01:28 +08:00
|
|
|
Debug(nil, "%s (req %p)", "HTTP REQUEST", req)
|
2016-09-11 02:17:43 +08:00
|
|
|
Debug(nil, "%s", string(buf))
|
|
|
|
Debug(nil, "%s", separatorReq)
|
|
|
|
}
|
|
|
|
// Do round trip
|
|
|
|
resp, err = t.Transport.RoundTrip(req)
|
|
|
|
// Log response
|
2016-09-22 15:40:37 +08:00
|
|
|
if t.logHeader || t.logBody {
|
2016-09-11 02:17:43 +08:00
|
|
|
Debug(nil, "%s", separatorResp)
|
2016-10-31 20:01:28 +08:00
|
|
|
Debug(nil, "%s (req %p)", "HTTP RESPONSE", req)
|
2016-09-11 02:17:43 +08:00
|
|
|
if err != nil {
|
|
|
|
Debug(nil, "Error: %v", err)
|
|
|
|
} else {
|
|
|
|
buf, _ := httputil.DumpResponse(resp, t.logBody)
|
|
|
|
Debug(nil, "%s", string(buf))
|
|
|
|
}
|
|
|
|
Debug(nil, "%s", separatorResp)
|
|
|
|
}
|
2016-10-08 21:00:50 +08:00
|
|
|
if err == nil {
|
|
|
|
checkServerTime(req, resp)
|
|
|
|
}
|
2016-09-11 02:17:43 +08:00
|
|
|
return resp, err
|
|
|
|
}
|