Commit graph

1509 commits

Author SHA1 Message Date
Kim Alvefur
4f7c829b1e net.http: Throw error if missing TLS context for HTTPS request
Prevents the mistake of creating a http context without any TLS context
and then trying to use HTTPS, which doesn't work right.

Thanks nils
2024-08-08 19:18:22 +02:00
Kim Alvefur
ca417ab776 net.server_event: Add 'wrapserver' API
This enables accepting admin stream socket (UNIX) connections trough the
same procedures as any other (TCP) socket, which avoids problems caused
by using the wrapclient API, which ends up discarding early data due to
only expecting early connection failure.

Fixes #1867
2024-07-07 18:28:17 +02:00
Kim Alvefur
f7b35d516f net.http.files: Validate argument to setup function
Fixes error in #1765 by throwing an error earlier
2024-02-27 17:14:16 +01:00
Kim Alvefur
674b91b82b net.http.parser: Reject overlarge header section earlier
This case would eventually be rejected by the buffer size limit.
2023-08-23 12:18:34 +02:00
Matthew Wild
87ee5a2300 net.http.parser: Fix off-by-one error in chunk parser 2023-02-17 17:01:19 +00:00
Matthew Wild
bc1e51eb83 net.http.server: Add new API to get HTTP request from a connection
This information is sometimes necessary in the context where we have a
connection that we know (or believe to be) associated with an incoming HTTP
request.

For example, it can be used to retrieve the IP address of a request (which may
differ from the IP address of the connection, due to X-Forwarded-For and co).

Thanks to the Jitsi team for highlighting this gap in the API.
2023-02-16 15:59:26 +00:00
Matthew Wild
0fd88a07a4 net.http.parser: Improve handling of responses without content-length
This ensures that we support responses without a content-length header, and
allow streaming them through the streaming handler interface. An example of
such a response would be Server-Sent Events streams.
2023-02-09 22:57:32 +00:00
Matthew Wild
28e3b19ca1 net.http: Add missing log parameter 2023-02-09 22:37:54 +00:00
Kim Alvefur
fe97c773a6 net.http.server: Fix #1789
Unregistering the response before sending the trailer of the chunked
transfer encoding prevents opportunistic writes from being invoked and
running this code again when, which may cause an error when closing the
file handle a second time.

Normally the file size is known, so no chuck headers are sent.
2023-01-08 13:35:04 +01:00
Kim Alvefur
4f3ba05b4d net.unbound: Merge luaunbound and prosody defaults in absence of user config (fixes #1763) (thanks rgd)
add_defaults() is supposed to merge 3 tables, the defaults in
luaunbound, the defaults from prosody and any config from the prosody
config file.  In the case where no `unbound={}` has been in the config,
it skips over the merge and returns only the prosody built-in defaults.

This results in libunbound skipping reading resolv.conf and uses its
default behavior of full recursive resolution.

Prior to #1737 there were only two tables, the luaunbound defaults and
the prosody config, where bypassing the merge and returning the former
did the right thing.
2022-06-19 19:49:32 +02:00
Kim Alvefur
24288146ae net.unbound: Adjust log level of error to error to error
This error is an error, therefore it should be at the error level
2022-05-16 14:51:01 +02:00
Kim Alvefur
5e95ed633a net.unbound: Disable use of hosts file by default (fixes #1737)
This mirrors the behaviour with net.dns and avoids the initialization
issue in #1737
2022-05-16 12:45:51 +02:00
Kim Alvefur
43351d2b54 Spelling: Fix various spelling mistakes (thanks timeless)
Words, sometimes I wonder how they even work

Maybe I missed something.
2022-03-07 00:13:56 +01:00
Kim Alvefur
ece896d253 net.websocket.frames: Replace bit fiddling code with util.struct
Fallback code for not having either the string.pack and string.unpack
functions available in Lua 5.4 or the struct lib is no longer needed
since the struct lib was imported as util.struct in 3ce3633527af
2022-03-06 15:13:50 +01:00
Matthew Wild
fa68985f24 net.stun: Support for xor-relayed-address attribute 2022-03-05 11:30:55 +00:00
Matthew Wild
d405c11918 net.stun: Add xor-peer-address helper 2022-03-05 11:04:25 +00:00
Matthew Wild
ac06bd8c97 net.stun: Factor out address unpack, an operation common to multiple attributes 2022-03-05 11:03:44 +00:00
Matthew Wild
6e9d71259c net.stun: Name some more attributes from TURN 2022-03-05 11:00:08 +00:00
Matthew Wild
ab77f7fcdb net.stun: Add lookup table generation helper, reduces code duplication 2022-03-05 10:59:19 +00:00
Matthew Wild
572bff0087 net.stun: Hyphenate method names for consistency 2022-03-05 10:57:47 +00:00
Kim Alvefur
7579bee6bb net.stun: Use util.bitcompat to deal with bit module variances across Lua versions 2022-03-04 16:58:28 +01:00
Kim Alvefur
1f257ecbb4 net.stun: Use util.strbitop
Improves performance since the whole procedure is done in C
2022-03-04 16:55:32 +01:00
Matthew Wild
5cfe0d220d net.stun: New library that implements STUN/TURN parsing/serialization 2022-03-04 15:23:32 +00:00
Kim Alvefur
9fbf5bf7ad net.server_epoll: Disable verbose mode by default 2022-02-12 18:47:22 +01:00
Kim Alvefur
4441528b1f net.http: Allow using DANE via options or per request settings
Dare to enable by default?
2022-02-05 01:32:08 +01:00
Kim Alvefur
9f1af0be2e net.connect: Allow passing TLS context from resolver
Only allowing it to be passed directly makes it hard to combine plain
(i.e. starttls) and Direct TLS connections in the same connection
resolution procedure. But now we can, using chained resolvers!
2022-01-21 17:57:47 +01:00
Kim Alvefur
f31762a075 net.resolvers.chain: A resolver for combining other resolvers
Say if you wanted to try both _xmpp and _xmpps services
2022-01-21 17:56:20 +01:00
Kim Alvefur
e469d015af net.resolvers: Report DNSSEC validation errors instead of NoError
Thanks Martin bringing this case to attention
2021-12-28 14:58:09 +01:00
Kim Alvefur
a3ea469ed9 util.id: Adjust entropy levels, with rationales
Modules using ids for logging should not need the now pretty large
medium one.
2021-12-02 01:14:55 +01:00
Kim Alvefur
96b6f68b23 net.resolvers: Report when hostname fails IDNA
Not a particularly user-friendly error message, but better than "unable
to resolve service" and having no clue where it came from.
2021-12-07 21:43:36 +01:00
Kim Alvefur
05a9010c85 net.server_epoll: Ensure calls to :write() return something
With opportunistic writes enabled, writes can return what :onwritable()
returns, thus :onwritable() should return something sensible at each
spot.

Should prevent whatever caused
> Error writing to connection: (nil)
Tho this was probably harmless
2021-12-06 10:59:14 +01:00
Kim Alvefur
61348c0a7d net.server_epoll: Prevent loop attempting to send last data after close
If the connection is closed by the peer, any buffered data is given a
last chance to be sent (see f27b9319e0da). If the connection is Really
closed, no attempt to write will occur, instead epoll will raise the
error flag and :onreadable() will be invoked again, where it will try to
:close() again for the same reason, thus looping until the connection
somehow gets destroyed.

By clearing the _connected flag, the second time it passes :onreadable()
it should go directly to :destroy(), breaking the loop.

Thanks Link Mauve for reporting
2021-11-30 18:19:40 +01:00
Kim Alvefur
8ac98af8b8 net.server_epoll: Fix streaming downloads (thanks Menel)
ff4e34c448a4 broke the way net.http.server streams downloads from disk
because it made writes from the ondrain callback no longer reset the
want-write flag, causing the download to halt.

Writes from the predrain handler still must not trigger anything but
additions to the buffer, since it is about to do all the socket writing
already.
2021-11-19 15:45:01 +01:00
Kim Alvefur
4704104049 net.server_epoll: Try harder to avoid reentrant opportunistic writes
Opportunistic writes sure do complicate things. This is especially
intended to avoid opportunistic_writes from within the onpredrain
callback.
2021-11-18 16:21:43 +01:00
Kim Alvefur
068388d9c7 net.connect: Prefer last connection error over last resolver error
E.g. "connection refused" over one IP version instead of NoError for the
other IP version.
2021-11-13 13:32:43 +01:00
Kim Alvefur
93121127fa net.connect: Propagate last error message from resolvers
Previously it would only say "unable to resolve server" for all DNS
problems. While "NoError in A lookup" might not make much sense to
users, it should help in debugging more than the previous generic error.

Friendlier errors will be future work.
2021-11-12 16:52:55 +01:00
Kim Alvefur
2408c299f0 net.server_epoll: Process all queued events from epoll before timers
Should call timers less frequently when many sockets are waiting for
processing. May help under heavy load.

Requested by Ge0rG
2021-10-21 15:59:16 +02:00
Kim Alvefur
14c6c3dbf0 net.server_epoll: Prevent starttls on direct TLS connections
This is not a pretty way to signal this... but it is the current API

interface:inittls() is a new code path which did not go past the point
in interface:starttls() where it set starttls to false, leading mod_tls
to offer starttls on direct TLS connections

Thanks Martin for discovering.
2021-10-05 19:56:36 +02:00
Kim Alvefur
d22a31530a net.server_epoll: Separate handling of "closed" from other errors
The intent is to ensure 'ondisconnect' only gets called once, while
giving buffered outgoing data a last chance to be delivered via the
:close() path in case the connection was only shutdown in one direction.
2021-09-22 13:29:47 +02:00
Kim Alvefur
7e8a3af45f net.server_epoll: Skip attempt to flush write buffer when not connected
Before 22825cb5dcd8 connection attempts that failed (e.g. connection
refused) would be immediately destroyed.  After, it would schedule
another write cycle and then report 'ondisconnect' again when failing.

Thanks Martin for reporting
2021-09-22 11:27:55 +02:00
Kim Alvefur
da8329037d Merge 0.11->trunk 2021-09-20 15:51:43 +02:00
Kim Alvefur
24111569bb net.server_epoll: Add a hard deadline on shutdown to extra-fix #1670
Should ensure shutdown even if sockets somehow take a very long to get closed.
2021-09-20 14:38:08 +02:00
Kim Alvefur
6d5ff6d2be net.server_epoll: Close sockets added after shutdown signal (fixes #1670)
This should ensure that sockets get closed even if they are added after
the quit signal. Otherwise they may keep the server alive.
2021-09-20 14:42:18 +02:00
Kim Alvefur
b97b295d03 net.server_epoll: Fix indentation messed up in last merge
Seems to have happened in 6427e2642976, probably because of Meld
2021-09-17 12:42:04 +02:00
Kim Alvefur
c85afe7827 net.server_epoll: Don't immediately destroy upon getting closed on read
Instead try to write any remaining buffered data. If the write attempt
also fails with "closed" then there's nothing we can do and the socket
is gone.

This reverts what appears to be a mistakenly included part of c8aa66595072

Thanks jonas’ for noticing
2021-09-15 18:39:37 +02:00
Kim Alvefur
db40eba655 net.server_epoll: Try to make port number related methods sane
Previously it was unclear whether "client port" was the port that the
client connected to, or from. I hereby declare that the client port is
the source port and the server port is the destination port.

Incoming and outgoing connections can be distinguished by looking at
the_server reference, which only incoming connections have.
2021-09-12 15:47:06 +02:00
Kim Alvefur
6be7cf935f net.server_epoll: Fix to preserve ids of readded timers
Likely affected rescheduling but have no reports of this.

After readding a timer, it would have been issued a new id. Rescheduling
would use the previous id, thus not working.
2021-08-31 12:58:38 +02:00
Kim Alvefur
6322b7c97e net.server_select: Deprecate and warn about it
To be removed in the future, but not right now. Give the log warning a
chance to prod anyone who might have network_backend="select" in their
config first.

There's also things built on Verse which uses server_select.lua, which
will need to be updated somehow.
2021-09-03 17:46:55 +02:00
Kim Alvefur
627df9737c net.server: Pikc server_epoll as unconditional default
Previously it would have gone for server_select if util.poll was for
some reason not available, which should be never these days. And even if
it was, best to flush it out by throwing loud errors so users notice.
Then they can work around it by using select until we delete that one.
2021-09-03 17:39:00 +02:00
Kim Alvefur
598e93a600 net.server: Fall back to default backend from libevent instead of always select
Fixes that selecting libevent when unavaibalbe would fall back to select
instead of epoll, even if that's available.

This way, we only have to update it in once place when choosing a new
default.
2021-09-03 17:35:34 +02:00