https-proxy-protocol.cpp   [plain text]


/*
 * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved.
 * 
 * The contents of this file constitute Original Code as defined in and are
 * subject to the Apple Public Source License Version 1.2 (the 'License').
 * You may not use this file except in compliance with the License. Please obtain
 * a copy of the License at http://www.apple.com/publicsource and read it before
 * using this file.
 * 
 * This Original Code and all software distributed under the License are
 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
 * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
 * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
 * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
 * specific language governing rights and limitations under the License.
 */


//
// https-proxy - CONNECT style transparent proxy connection to SSL host.
//
// This is the CONNECT method of an ordinary (proxying) HTTP server.
// Once it switches a connection to transparent proxying, there's no way to get out
// again. Hence, our Connection objects belong to the remote host, not the proxy.
//
#include "https-proxy-protocol.h"
#include "netparameters.h"


namespace Security {
namespace Network {


//
// Construct the protocol object
//
ConnectHTTPProtocol::ConnectHTTPProtocol(Manager &mgr, const HostTarget &proxy)
    : SecureHTTPProtocol(mgr), host(proxy.defaultPort(defaultHttpPort))
{
}


//
// Create a Transfer object for our protocol
//
ConnectHTTPProtocol::ConnectHTTPTransfer *ConnectHTTPProtocol::makeTransfer(const Target &target,
    Operation operation)
{
    return new ConnectHTTPTransfer(*this, target, operation, defaultHttpsPort);
}


//
// Construct an HTTPConnection object
//
ConnectHTTPProtocol::ConnectHTTPConnection::ConnectHTTPConnection(Protocol &proto,
    const HostTarget &hostTarget)
    : SecureHTTPConnection(proto, hostTarget)

{
    // SecureHTTPConnection already set up everything for talking to the server
    connectState = connectConnecting;
    deferStartSSL = true;	// tell parent protocol to break on connect-complete
}

ConnectHTTPProtocol::ConnectHTTPConnection::~ConnectHTTPConnection()
{
}


//
// Start a connection request
//
void ConnectHTTPProtocol::ConnectHTTPConnection::connectRequest()
{
    switch (connectState) {
    case connectConnecting:
        return;		// still waiting for TCP
    case connectStartup:
        {
            const HostTarget &host = target().host;
            flushOutput(false); // hold output
            printfe("CONNECT %s:%d HTTP/1.1",
                host.host().name().c_str(), target().host.port());
            hostHeader();
            authorizationHeader("Proxy-Authorization", hostTarget,
                kNetworkGenericProxyUsername, kNetworkGenericProxyPassword);
            printfe("");		// end of headers
            flushOutput();		// flush accumulated output
            mode(lineInput);
            connectState = connectPrimaryResponse;
        }
        break;
    case connectReady:			// already set; go ahead next layer (https)
        sslRequest();
        break;
    default:
        assert(false);			// huh?
    }
}


//
// Our state transit method controls only the initial SSL handshake.
// Think of it as a "prefix" to the HTTP protocol state engine. Once the handshake
// is complete, we hand off further state management to the HTTP machine.
//
void ConnectHTTPProtocol::ConnectHTTPConnection::transit(Event event, 
    char *input, size_t inputLength)
{
    if (event == endOfInput && connectState != connectReady)
        UnixError::throwMe(ECONNRESET);	// @@@ diagnostic?
    
    switch (connectState) {
    case connectConnecting:
        SecureHTTPConnection::transit(event, input, inputLength);
        if (SecureHTTPConnection::sslState == sslStartup) { // transport level ready
            connectState = connectStartup;
            connectRequest();
        }
        return;
    case connectPrimaryResponse:
        {
            // sketchily read proxy's primary response
            int major, minor, code;
            if (sscanf(input, "HTTP/%d.%d %u", &major, &minor, &code) != 3) {
                fail(input);	// malformed response header
            }
            if (major != 1 || minor < 0 || minor > 1)
                fail(input);
            switch (code) {
            case 200:		// okay, proceed
                connectState = connectReadHeaders;
                break;
            default:		// this didn't work
                transfer().httpResponse() = input;	// won't have a better one
                fail(input);
            }
        }
        break;
    case connectReadHeaders:
        {
            if (inputLength) {
                headers().add(input);
            } else {
                // end of proxy headers: start SSL now
                connectState = connectReady;
                try {
                    startSSL();
                } catch (const CssmCommonError &err) {
                    setError("SSL failed", err.osStatus());
                    throw;
                } catch (...) {
                    setError("SSL failed");
                    throw;
                }
            }
        }
        break;
    case connectReady:
        return SecureHTTPConnection::transit(event, input, inputLength);
    default:
        assert(false);						// huh?
    }
}


//
// HTTPS Transfer objects.
//
ConnectHTTPProtocol::ConnectHTTPTransfer::ConnectHTTPTransfer(Protocol &proto,
    const Target &tgt, Operation operation, IPPort defPort) 
    : SecureHTTPTransfer(proto, tgt, operation, defPort)
{
}

void ConnectHTTPProtocol::ConnectHTTPTransfer::start()
{
    ConnectHTTPConnection *connection =
        protocol.manager.findConnection<ConnectHTTPConnection>(target);
    if (connection == NULL)
        connection = new ConnectHTTPConnection(protocol, target);
    connection->dock(this);
    connection->connectRequest();
}


//
// Even though this is formally a proxy protocol, we should not use
// proxy headers, since the proxy is transparent and the remote system
// expects a direct request.
// 
bool ConnectHTTPProtocol::ConnectHTTPTransfer::useProxyHeaders() const
{
    return false;
}


//
// We are a proxy protocol
//
bool ConnectHTTPProtocol::isProxy() const
{ return true; }

const HostTarget &ConnectHTTPProtocol::proxyHost() const
{ return host; }


}	// end namespace Network
}	// end namespace Security