github.com/octohelm/cuemod@v0.9.4/internal/cmd/go/internals/web/http.go (about)

     1  // Copyright 2012 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  //go:build !cmd_go_bootstrap
     6  
     7  // This code is compiled into the real 'go' binary, but it is not
     8  // compiled into the binary that is built during all.bash, so as
     9  // to avoid needing to build net (and thus use cgo) during the
    10  // bootstrap process.
    11  
    12  package web
    13  
    14  import (
    15  	"crypto/tls"
    16  	"errors"
    17  	"fmt"
    18  	"io"
    19  	"mime"
    20  	"net"
    21  	"net/http"
    22  	urlpkg "net/url"
    23  	"os"
    24  	"strings"
    25  	"time"
    26  
    27  	"github.com/octohelm/cuemod/internal/cmd/go/internals/auth"
    28  	"github.com/octohelm/cuemod/internal/cmd/go/internals/base"
    29  	"github.com/octohelm/cuemod/internal/cmd/go/internals/cfg"
    30  	"github.com/octohelm/cuemod/internal/cmd/internals/browser"
    31  )
    32  
    33  // impatientInsecureHTTPClient is used with GOINSECURE,
    34  // when we're connecting to https servers that might not be there
    35  // or might be using self-signed certificates.
    36  var impatientInsecureHTTPClient = &http.Client{
    37  	CheckRedirect: checkRedirect,
    38  	Timeout:       5 * time.Second,
    39  	Transport: &http.Transport{
    40  		Proxy: http.ProxyFromEnvironment,
    41  		TLSClientConfig: &tls.Config{
    42  			InsecureSkipVerify: true,
    43  		},
    44  	},
    45  }
    46  
    47  var securityPreservingDefaultClient = securityPreservingHTTPClient(http.DefaultClient)
    48  
    49  // securityPreservingHTTPClient returns a client that is like the original
    50  // but rejects redirects to plain-HTTP URLs if the original URL was secure.
    51  func securityPreservingHTTPClient(original *http.Client) *http.Client {
    52  	c := new(http.Client)
    53  	*c = *original
    54  	c.CheckRedirect = func(req *http.Request, via []*http.Request) error {
    55  		if len(via) > 0 && via[0].URL.Scheme == "https" && req.URL.Scheme != "https" {
    56  			lastHop := via[len(via)-1].URL
    57  			return fmt.Errorf("redirected from secure URL %s to insecure URL %s", lastHop, req.URL)
    58  		}
    59  		return checkRedirect(req, via)
    60  	}
    61  	return c
    62  }
    63  
    64  func checkRedirect(req *http.Request, via []*http.Request) error {
    65  	// Go's http.DefaultClient allows 10 redirects before returning an error.
    66  	// Mimic that behavior here.
    67  	if len(via) >= 10 {
    68  		return errors.New("stopped after 10 redirects")
    69  	}
    70  
    71  	interceptRequest(req)
    72  	return nil
    73  }
    74  
    75  type Interceptor struct {
    76  	Scheme   string
    77  	FromHost string
    78  	ToHost   string
    79  	Client   *http.Client
    80  }
    81  
    82  func EnableTestHooks(interceptors []Interceptor) error {
    83  	if enableTestHooks {
    84  		return errors.New("web: test hooks already enabled")
    85  	}
    86  
    87  	for _, t := range interceptors {
    88  		if t.FromHost == "" {
    89  			panic("EnableTestHooks: missing FromHost")
    90  		}
    91  		if t.ToHost == "" {
    92  			panic("EnableTestHooks: missing ToHost")
    93  		}
    94  	}
    95  
    96  	testInterceptors = interceptors
    97  	enableTestHooks = true
    98  	return nil
    99  }
   100  
   101  func DisableTestHooks() {
   102  	if !enableTestHooks {
   103  		panic("web: test hooks not enabled")
   104  	}
   105  	enableTestHooks = false
   106  	testInterceptors = nil
   107  }
   108  
   109  var (
   110  	enableTestHooks  = false
   111  	testInterceptors []Interceptor
   112  )
   113  
   114  func interceptURL(u *urlpkg.URL) (*Interceptor, bool) {
   115  	if !enableTestHooks {
   116  		return nil, false
   117  	}
   118  	for i, t := range testInterceptors {
   119  		if u.Host == t.FromHost && (u.Scheme == "" || u.Scheme == t.Scheme) {
   120  			return &testInterceptors[i], true
   121  		}
   122  	}
   123  	return nil, false
   124  }
   125  
   126  func interceptRequest(req *http.Request) {
   127  	if t, ok := interceptURL(req.URL); ok {
   128  		req.Host = req.URL.Host
   129  		req.URL.Host = t.ToHost
   130  	}
   131  }
   132  
   133  func get(security SecurityMode, url *urlpkg.URL) (*Response, error) {
   134  	start := time.Now()
   135  
   136  	if url.Scheme == "file" {
   137  		return getFile(url)
   138  	}
   139  
   140  	if enableTestHooks {
   141  		switch url.Host {
   142  		case "proxy.golang.org":
   143  			if os.Getenv("TESTGOPROXY404") == "1" {
   144  				res := &Response{
   145  					URL:        url.Redacted(),
   146  					Status:     "404 testing",
   147  					StatusCode: 404,
   148  					Header:     make(map[string][]string),
   149  					Body:       http.NoBody,
   150  				}
   151  				if cfg.BuildX {
   152  					fmt.Fprintf(os.Stderr, "# get %s: %v (%.3fs)\n", url.Redacted(), res.Status, time.Since(start).Seconds())
   153  				}
   154  				return res, nil
   155  			}
   156  
   157  		case "localhost.localdev":
   158  			return nil, fmt.Errorf("no such host localhost.localdev")
   159  
   160  		default:
   161  			if os.Getenv("TESTGONETWORK") == "panic" {
   162  				if _, ok := interceptURL(url); !ok {
   163  					host := url.Host
   164  					if h, _, err := net.SplitHostPort(url.Host); err == nil && h != "" {
   165  						host = h
   166  					}
   167  					addr := net.ParseIP(host)
   168  					if addr == nil || (!addr.IsLoopback() && !addr.IsUnspecified()) {
   169  						panic("use of network: " + url.String())
   170  					}
   171  				}
   172  			}
   173  		}
   174  	}
   175  
   176  	fetch := func(url *urlpkg.URL) (*http.Response, error) {
   177  		// Note: The -v build flag does not mean "print logging information",
   178  		// despite its historical misuse for this in GOPATH-based go get.
   179  		// We print extra logging in -x mode instead, which traces what
   180  		// commands are executed.
   181  		if cfg.BuildX {
   182  			fmt.Fprintf(os.Stderr, "# get %s\n", url.Redacted())
   183  		}
   184  
   185  		req, err := http.NewRequest("GET", url.String(), nil)
   186  		if err != nil {
   187  			return nil, err
   188  		}
   189  		if url.Scheme == "https" {
   190  			auth.AddCredentials(req)
   191  		}
   192  		t, intercepted := interceptURL(req.URL)
   193  		if intercepted {
   194  			req.Host = req.URL.Host
   195  			req.URL.Host = t.ToHost
   196  		}
   197  
   198  		release, err := base.AcquireNet()
   199  		if err != nil {
   200  			return nil, err
   201  		}
   202  
   203  		var res *http.Response
   204  		if security == Insecure && url.Scheme == "https" { // fail earlier
   205  			res, err = impatientInsecureHTTPClient.Do(req)
   206  		} else {
   207  			if intercepted && t.Client != nil {
   208  				client := securityPreservingHTTPClient(t.Client)
   209  				res, err = client.Do(req)
   210  			} else {
   211  				res, err = securityPreservingDefaultClient.Do(req)
   212  			}
   213  		}
   214  
   215  		if err != nil {
   216  			// Per the docs for [net/http.Client.Do], “On error, any Response can be
   217  			// ignored. A non-nil Response with a non-nil error only occurs when
   218  			// CheckRedirect fails, and even then the returned Response.Body is
   219  			// already closed.”
   220  			release()
   221  			return nil, err
   222  		}
   223  
   224  		// “If the returned error is nil, the Response will contain a non-nil Body
   225  		// which the user is expected to close.”
   226  		body := res.Body
   227  		res.Body = hookCloser{
   228  			ReadCloser: body,
   229  			afterClose: release,
   230  		}
   231  		return res, err
   232  	}
   233  
   234  	var (
   235  		fetched *urlpkg.URL
   236  		res     *http.Response
   237  		err     error
   238  	)
   239  	if url.Scheme == "" || url.Scheme == "https" {
   240  		secure := new(urlpkg.URL)
   241  		*secure = *url
   242  		secure.Scheme = "https"
   243  
   244  		res, err = fetch(secure)
   245  		if err == nil {
   246  			fetched = secure
   247  		} else {
   248  			if cfg.BuildX {
   249  				fmt.Fprintf(os.Stderr, "# get %s: %v\n", secure.Redacted(), err)
   250  			}
   251  			if security != Insecure || url.Scheme == "https" {
   252  				// HTTPS failed, and we can't fall back to plain HTTP.
   253  				// Report the error from the HTTPS attempt.
   254  				return nil, err
   255  			}
   256  		}
   257  	}
   258  
   259  	if res == nil {
   260  		switch url.Scheme {
   261  		case "http":
   262  			if security == SecureOnly {
   263  				if cfg.BuildX {
   264  					fmt.Fprintf(os.Stderr, "# get %s: insecure\n", url.Redacted())
   265  				}
   266  				return nil, fmt.Errorf("insecure URL: %s", url.Redacted())
   267  			}
   268  		case "":
   269  			if security != Insecure {
   270  				panic("should have returned after HTTPS failure")
   271  			}
   272  		default:
   273  			if cfg.BuildX {
   274  				fmt.Fprintf(os.Stderr, "# get %s: unsupported\n", url.Redacted())
   275  			}
   276  			return nil, fmt.Errorf("unsupported scheme: %s", url.Redacted())
   277  		}
   278  
   279  		insecure := new(urlpkg.URL)
   280  		*insecure = *url
   281  		insecure.Scheme = "http"
   282  		if insecure.User != nil && security != Insecure {
   283  			if cfg.BuildX {
   284  				fmt.Fprintf(os.Stderr, "# get %s: insecure credentials\n", insecure.Redacted())
   285  			}
   286  			return nil, fmt.Errorf("refusing to pass credentials to insecure URL: %s", insecure.Redacted())
   287  		}
   288  
   289  		res, err = fetch(insecure)
   290  		if err == nil {
   291  			fetched = insecure
   292  		} else {
   293  			if cfg.BuildX {
   294  				fmt.Fprintf(os.Stderr, "# get %s: %v\n", insecure.Redacted(), err)
   295  			}
   296  			// HTTP failed, and we already tried HTTPS if applicable.
   297  			// Report the error from the HTTP attempt.
   298  			return nil, err
   299  		}
   300  	}
   301  
   302  	// Note: accepting a non-200 OK here, so people can serve a
   303  	// meta import in their http 404 page.
   304  	if cfg.BuildX {
   305  		fmt.Fprintf(os.Stderr, "# get %s: %v (%.3fs)\n", fetched.Redacted(), res.Status, time.Since(start).Seconds())
   306  	}
   307  
   308  	r := &Response{
   309  		URL:        fetched.Redacted(),
   310  		Status:     res.Status,
   311  		StatusCode: res.StatusCode,
   312  		Header:     map[string][]string(res.Header),
   313  		Body:       res.Body,
   314  	}
   315  
   316  	if res.StatusCode != http.StatusOK {
   317  		contentType := res.Header.Get("Content-Type")
   318  		if mediaType, params, _ := mime.ParseMediaType(contentType); mediaType == "text/plain" {
   319  			switch charset := strings.ToLower(params["charset"]); charset {
   320  			case "us-ascii", "utf-8", "":
   321  				// Body claims to be plain text in UTF-8 or a subset thereof.
   322  				// Try to extract a useful error message from it.
   323  				r.errorDetail.r = res.Body
   324  				r.Body = &r.errorDetail
   325  			}
   326  		}
   327  	}
   328  
   329  	return r, nil
   330  }
   331  
   332  func getFile(u *urlpkg.URL) (*Response, error) {
   333  	path, err := urlToFilePath(u)
   334  	if err != nil {
   335  		return nil, err
   336  	}
   337  	f, err := os.Open(path)
   338  
   339  	if os.IsNotExist(err) {
   340  		return &Response{
   341  			URL:        u.Redacted(),
   342  			Status:     http.StatusText(http.StatusNotFound),
   343  			StatusCode: http.StatusNotFound,
   344  			Body:       http.NoBody,
   345  			fileErr:    err,
   346  		}, nil
   347  	}
   348  
   349  	if os.IsPermission(err) {
   350  		return &Response{
   351  			URL:        u.Redacted(),
   352  			Status:     http.StatusText(http.StatusForbidden),
   353  			StatusCode: http.StatusForbidden,
   354  			Body:       http.NoBody,
   355  			fileErr:    err,
   356  		}, nil
   357  	}
   358  
   359  	if err != nil {
   360  		return nil, err
   361  	}
   362  
   363  	return &Response{
   364  		URL:        u.Redacted(),
   365  		Status:     http.StatusText(http.StatusOK),
   366  		StatusCode: http.StatusOK,
   367  		Body:       f,
   368  	}, nil
   369  }
   370  
   371  func openBrowser(url string) bool { return browser.Open(url) }
   372  
   373  func isLocalHost(u *urlpkg.URL) bool {
   374  	// VCSTestRepoURL itself is secure, and it may redirect requests to other
   375  	// ports (such as a port serving the "svn" protocol) which should also be
   376  	// considered secure.
   377  	host, _, err := net.SplitHostPort(u.Host)
   378  	if err != nil {
   379  		host = u.Host
   380  	}
   381  	if host == "localhost" {
   382  		return true
   383  	}
   384  	if ip := net.ParseIP(host); ip != nil && ip.IsLoopback() {
   385  		return true
   386  	}
   387  	return false
   388  }
   389  
   390  type hookCloser struct {
   391  	io.ReadCloser
   392  	afterClose func()
   393  }
   394  
   395  func (c hookCloser) Close() error {
   396  	err := c.ReadCloser.Close()
   397  	c.afterClose()
   398  	return err
   399  }