Commit graph

1564 commits

Author SHA1 Message Date
Kim Alvefur
5764e73a65 net.server_epoll: Prevent traceback when checking TLS after connection gone
Unclear why this would be done, but an error is not great.
2024-01-21 22:59:50 +01:00
Kim Alvefur
a26b39e1b7 net.http.server: Fix whitespace-ignoring syntax 2023-12-01 22:00:18 +01:00
Kim Alvefur
6187c44ca9 Merge 0.12->trunk 2023-12-01 17:11:19 +01:00
Kim Alvefur
674b91b82b net.http.parser: Reject overlarge header section earlier
This case would eventually be rejected by the buffer size limit.
2023-08-23 12:18:34 +02:00
Matthew Wild
87ee5a2300 net.http.parser: Fix off-by-one error in chunk parser 2023-02-17 17:01:19 +00:00
Matthew Wild
bc1e51eb83 net.http.server: Add new API to get HTTP request from a connection
This information is sometimes necessary in the context where we have a
connection that we know (or believe to be) associated with an incoming HTTP
request.

For example, it can be used to retrieve the IP address of a request (which may
differ from the IP address of the connection, due to X-Forwarded-For and co).

Thanks to the Jitsi team for highlighting this gap in the API.
2023-02-16 15:59:26 +00:00
Matthew Wild
0fd88a07a4 net.http.parser: Improve handling of responses without content-length
This ensures that we support responses without a content-length header, and
allow streaming them through the streaming handler interface. An example of
such a response would be Server-Sent Events streams.
2023-02-09 22:57:32 +00:00
Matthew Wild
28e3b19ca1 net.http: Add missing log parameter 2023-02-09 22:37:54 +00:00
Kim Alvefur
fe97c773a6 net.http.server: Fix #1789
Unregistering the response before sending the trailer of the chunked
transfer encoding prevents opportunistic writes from being invoked and
running this code again when, which may cause an error when closing the
file handle a second time.

Normally the file size is known, so no chuck headers are sent.
2023-01-08 13:35:04 +01:00
Kim Alvefur
4f3ba05b4d net.unbound: Merge luaunbound and prosody defaults in absence of user config (fixes #1763) (thanks rgd)
add_defaults() is supposed to merge 3 tables, the defaults in
luaunbound, the defaults from prosody and any config from the prosody
config file.  In the case where no `unbound={}` has been in the config,
it skips over the merge and returns only the prosody built-in defaults.

This results in libunbound skipping reading resolv.conf and uses its
default behavior of full recursive resolution.

Prior to #1737 there were only two tables, the luaunbound defaults and
the prosody config, where bypassing the merge and returning the former
did the right thing.
2022-06-19 19:49:32 +02:00
Kim Alvefur
24288146ae net.unbound: Adjust log level of error to error to error
This error is an error, therefore it should be at the error level
2022-05-16 14:51:01 +02:00
Kim Alvefur
5e95ed633a net.unbound: Disable use of hosts file by default (fixes #1737)
This mirrors the behaviour with net.dns and avoids the initialization
issue in #1737
2022-05-16 12:45:51 +02:00
Kim Alvefur
43351d2b54 Spelling: Fix various spelling mistakes (thanks timeless)
Words, sometimes I wonder how they even work

Maybe I missed something.
2022-03-07 00:13:56 +01:00
Kim Alvefur
ece896d253 net.websocket.frames: Replace bit fiddling code with util.struct
Fallback code for not having either the string.pack and string.unpack
functions available in Lua 5.4 or the struct lib is no longer needed
since the struct lib was imported as util.struct in 3ce3633527af
2022-03-06 15:13:50 +01:00
Matthew Wild
fa68985f24 net.stun: Support for xor-relayed-address attribute 2022-03-05 11:30:55 +00:00
Matthew Wild
d405c11918 net.stun: Add xor-peer-address helper 2022-03-05 11:04:25 +00:00
Matthew Wild
ac06bd8c97 net.stun: Factor out address unpack, an operation common to multiple attributes 2022-03-05 11:03:44 +00:00
Matthew Wild
6e9d71259c net.stun: Name some more attributes from TURN 2022-03-05 11:00:08 +00:00
Matthew Wild
ab77f7fcdb net.stun: Add lookup table generation helper, reduces code duplication 2022-03-05 10:59:19 +00:00
Matthew Wild
572bff0087 net.stun: Hyphenate method names for consistency 2022-03-05 10:57:47 +00:00
Kim Alvefur
7579bee6bb net.stun: Use util.bitcompat to deal with bit module variances across Lua versions 2022-03-04 16:58:28 +01:00
Kim Alvefur
1f257ecbb4 net.stun: Use util.strbitop
Improves performance since the whole procedure is done in C
2022-03-04 16:55:32 +01:00
Matthew Wild
5cfe0d220d net.stun: New library that implements STUN/TURN parsing/serialization 2022-03-04 15:23:32 +00:00
Kim Alvefur
9fbf5bf7ad net.server_epoll: Disable verbose mode by default 2022-02-12 18:47:22 +01:00
Kim Alvefur
c41d63004a net.http.server: Complete async waiter for non-persistent connections
Otherwise requests with Connection: close would be stuck in the async
wait that starts after the handle_request() call.

Together with the new async debugging, this makes the async thread stay
in the set of waiting runners forever, where previously it would simply
be garbage collected.
2023-11-24 00:31:08 +01:00
Kim Alvefur
07d2f9f2e8 net.server_epoll: Avoid call to update socket watch flags when nothing changed
Should skip a syscall for each write when using epoll.
2023-11-21 22:06:28 +01:00
Kim Alvefur
019549e738 net.http: Set Connection header based on connection pool usage
Connection: keep-alive is implicit in HTTP/1.1 but explicit > implicit
2023-11-11 23:48:45 +01:00
Kim Alvefur
8e2ecac95b net.http: Add simple connection pooling
This should speed up repeated requests to the same site by keeping their
connections around and sending more requests on them.

Sending multiple requests at the same time is not supported, instead a
request started while another to the same authority is in progress would
open a new one and the first one to complete would go back in the pool.
This could be investigated in the future.

Some http servers limit the number of requests per connection and this
is not tested and could cause one request to fail, but hopefully it will
close the connection and prevent it from being reused.
2023-11-11 23:08:34 +01:00
Kim Alvefur
adfd306e6e net.http.server: Fix typo in previous commit 2023-09-23 15:48:21 +02:00
Kim Alvefur
e1128dbdbc net.http.server: Support setting Content-Type of uncaught HTTP errors
mod_http_errors normally sets the Content-Type header via the response
object, which isn't available when handling these uncaught errors.

Without a Content-Type header the browser is forced to guess, which may
or may not result in something sensible.
2023-09-22 01:47:21 +02:00
Kim Alvefur
6ac58a4d1c net.websocket.frames: Remove completed TODO
The XOR is done in C since 4e5a2af9dd19
2023-07-29 01:42:19 +02:00
Kim Alvefur
c468bd12c9 net.server: Handle loading from outside Prosody (e.g. Verse)
server_select only depending on LuaSocket generally makes it more
portable, so fall back to that if util.poll can't be found.
2023-05-20 20:44:20 +02:00
Kim Alvefur
4d9931786d net.http.server: Return request ID in header to aid debugging
Eases locating the request in logs
2023-05-29 01:42:31 +02:00
Kim Alvefur
e6f0e0b9d0 net.tls_luasec: Expose method for loading a certificate
Further isolates LuaSec from Prosody core, with the ultimate goal of
allowing LuaSec to be replaced more easily.
2023-05-27 15:40:49 +02:00
Kim Alvefur
296710c701 net.certmanager: Move LuaSec feature detection to net.tls_luasec
Further isolates LuaSec from Prosody core, with the ultimate goal of
allowing LuaSec to be replaced more easily.
2023-05-27 15:39:26 +02:00
Kim Alvefur
223a8b69a4 net.http.server: Remove "Firing event" logs, use event logging instead
Since these are noisy and we have the thing in util.helpers to log
events fired.

The new status line events are meant to replace these as they include
more useful info.
2023-05-14 18:48:20 +02:00
Kim Alvefur
ff0b9242e3 net.http.server: Log request and response status lines
Points out the beginning and end of a request.
2023-05-14 18:44:38 +02:00
Kim Alvefur
fe8e6dc8ca net.http.server: Assign each request its own log source 2023-05-14 18:44:11 +02:00
Kim Alvefur
f064c099a2 net.http.server: Assign an ID to each request, shared with response
Goal is improve tracking of individual HTTP requests throughout its
life-cycle. Having a single ID to use in logging should help here.
2023-05-14 18:38:22 +02:00
Kim Alvefur
869581384d net: Prefix module imports with prosody namespace 2023-03-17 16:23:12 +01:00
Matthew Wild
ff51890910 Merge 0.12->trunk 2023-02-17 17:02:41 +00:00
Matthew Wild
424a334450 Merge 0.12->trunk 2023-02-16 16:00:07 +00:00
Matthew Wild
fbfe255e12 Merge 0.12->trunk 2023-02-09 22:58:01 +00:00
Kim Alvefur
d364693166 net.http.server: Close file handle earlier
Frees unneeded resources earlier, so they're not held on to while
potentially sending the chunk trailer.
2023-01-08 13:51:30 +01:00
Kim Alvefur
2d7eb38bde Merge 0.12->trunk 2023-01-08 13:39:24 +01:00
Kim Alvefur
f5006b1202 net.server_epoll: Remove delay on last main loop iteration when quitting
Main difference is that timers are not checked unconditionally before
each poll, only when running out of previous poll results (hidden by
util.poll).  This removes a final poll at shutdown that usually delays
the 'not quitting' condition check by one second.
2023-01-06 04:38:39 +01:00
Kim Alvefur
5acb354989 net.server_epoll: Factor out single main loop step into its own function
This isn't actually used in Prosody, so no value in complicating the
real main loop because of it
2023-01-06 02:31:21 +01:00
Kim Alvefur
d257416abe net.resolvers.basic: Record hostname coming from secure SRV records
Will be useful even later...
2022-12-22 00:11:23 +01:00
Kim Alvefur
3c7f73e6c8 net.resolvers.service: Record DNSSEC security status of SRV records
Will be useful later.
2022-12-22 00:10:49 +01:00
Kim Alvefur
325464eb11 net.resolvers.service: Fix reporting of Bogus DNSSEC results
The order of checks led to Bogus results being reported with a generic
"unable to resolve service".  This had no practical effects as such
results are simply empty and the process would stop there.

Tested by attempting to establish s2s with dnssec-bogus.sg and observing
the error reply.
2022-12-21 23:46:37 +01:00