2017-07-18 20:38:19 +00:00
|
|
|
// @flow
|
2017-07-20 01:55:40 +00:00
|
|
|
import type {ResponseHeader, ResponseTimelineEntry} from '../models/response';
|
2017-11-10 10:50:39 +00:00
|
|
|
import type {Request, RequestHeader} from '../models/request';
|
2017-07-19 01:55:47 +00:00
|
|
|
import type {Workspace} from '../models/workspace';
|
2017-07-19 04:48:28 +00:00
|
|
|
import type {Settings} from '../models/settings';
|
2017-07-20 01:55:40 +00:00
|
|
|
import type {RenderedRequest} from '../common/render';
|
2017-12-21 14:01:51 +00:00
|
|
|
import {getRenderedRequest, getRenderedRequestAndContext, RENDER_PURPOSE_SEND} from '../common/render';
|
2017-03-16 17:51:56 +00:00
|
|
|
import mkdirp from 'mkdirp';
|
2017-07-12 21:20:31 +00:00
|
|
|
import clone from 'clone';
|
2017-06-15 17:52:51 +00:00
|
|
|
import {parse as urlParse, resolve as urlResolve} from 'url';
|
2017-11-30 16:43:30 +00:00
|
|
|
import {Curl} from 'insomnia-libcurl';
|
2017-04-07 18:10:15 +00:00
|
|
|
import {join as pathJoin} from 'path';
|
2017-11-21 17:49:17 +00:00
|
|
|
import uuid from 'uuid';
|
|
|
|
import * as electron from 'electron';
|
2017-03-16 17:51:56 +00:00
|
|
|
import * as models from '../models';
|
2017-11-04 20:10:06 +00:00
|
|
|
import {AUTH_AWS_IAM, AUTH_BASIC, AUTH_DIGEST, AUTH_NETRC, AUTH_NTLM, CONTENT_TYPE_FORM_DATA, CONTENT_TYPE_FORM_URLENCODED, getAppVersion, getTempDir, STATUS_CODE_PLUGIN_ERROR} from '../common/constants';
|
2018-02-08 09:09:13 +00:00
|
|
|
import {delay, describeByteSize, getContentTypeHeader, getHostHeader, getLocationHeader, getSetCookieHeaders, hasAcceptEncodingHeader, hasAcceptHeader, hasAuthHeader, hasContentTypeHeader, hasUserAgentHeader, waitForStreamToFinish} from '../common/misc';
|
2017-12-21 14:01:51 +00:00
|
|
|
import {buildQueryStringFromParams, joinUrlAndQueryString, setDefaultProtocol, smartEncodeUrl} from 'insomnia-url';
|
2017-03-16 17:51:56 +00:00
|
|
|
import fs from 'fs';
|
|
|
|
import * as db from '../common/database';
|
2017-03-28 22:45:23 +00:00
|
|
|
import * as CACerts from './cacert';
|
2017-07-20 01:55:40 +00:00
|
|
|
import * as plugins from '../plugins/index';
|
|
|
|
import * as pluginContexts from '../plugins/context/index';
|
2017-03-23 22:10:42 +00:00
|
|
|
import {getAuthHeader} from './authentication';
|
2017-11-26 20:45:40 +00:00
|
|
|
import {cookiesFromJar, jarFromCookies} from 'insomnia-cookies';
|
2017-09-17 14:04:56 +00:00
|
|
|
import {urlMatchesCertHost} from './url-matches-cert-host';
|
2017-07-12 21:01:14 +00:00
|
|
|
import aws4 from 'aws4';
|
2017-10-12 17:32:26 +00:00
|
|
|
import {buildMultipart} from './multipart';
|
2017-03-16 17:51:56 +00:00
|
|
|
|
2017-11-21 17:49:17 +00:00
|
|
|
const {app} = electron.remote || electron;
|
|
|
|
|
2017-07-20 01:55:40 +00:00
|
|
|
export type ResponsePatch = {
|
|
|
|
statusMessage?: string,
|
|
|
|
error?: string,
|
|
|
|
url?: string,
|
|
|
|
statusCode?: number,
|
2017-11-21 17:49:17 +00:00
|
|
|
bytesContent?: number,
|
|
|
|
bodyPath?: string,
|
2017-11-23 21:57:08 +00:00
|
|
|
bodyCompression?: 'zip' | null,
|
|
|
|
message?: string,
|
2017-11-13 23:10:53 +00:00
|
|
|
httpVersion?: string,
|
2017-07-20 01:55:40 +00:00
|
|
|
headers?: Array<ResponseHeader>,
|
|
|
|
elapsedTime?: number,
|
|
|
|
contentType?: string,
|
|
|
|
bytesRead?: number,
|
|
|
|
parentId?: string,
|
|
|
|
settingStoreCookies?: boolean,
|
|
|
|
settingSendCookies?: boolean,
|
|
|
|
timeline?: Array<ResponseTimelineEntry>
|
2017-07-18 20:38:19 +00:00
|
|
|
};
|
|
|
|
|
2017-06-09 03:02:16 +00:00
|
|
|
// Time since user's last keypress to wait before making the request
|
|
|
|
const MAX_DELAY_TIME = 1000;
|
|
|
|
|
2017-03-16 17:51:56 +00:00
|
|
|
let cancelRequestFunction = null;
|
2017-06-09 03:02:16 +00:00
|
|
|
let lastUserInteraction = Date.now();
|
2017-03-16 17:51:56 +00:00
|
|
|
|
|
|
|
export function cancelCurrentRequest () {
|
|
|
|
if (typeof cancelRequestFunction === 'function') {
|
|
|
|
cancelRequestFunction();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-20 16:07:36 +00:00
|
|
|
export async function _actuallySend (
|
2017-07-18 22:10:57 +00:00
|
|
|
renderedRequest: RenderedRequest,
|
|
|
|
workspace: Workspace,
|
|
|
|
settings: Settings
|
2017-11-21 17:49:17 +00:00
|
|
|
): Promise<ResponsePatch> {
|
2017-03-16 17:51:56 +00:00
|
|
|
return new Promise(async resolve => {
|
2017-07-18 22:10:57 +00:00
|
|
|
let timeline: Array<ResponseTimelineEntry> = [];
|
2017-07-11 00:23:40 +00:00
|
|
|
|
2017-07-19 04:48:28 +00:00
|
|
|
// Initialize the curl handle
|
|
|
|
const curl = new Curl();
|
|
|
|
|
|
|
|
/** Helper function to respond with a success */
|
2017-11-21 17:49:17 +00:00
|
|
|
function respond (patch: ResponsePatch, bodyPath: ?string): void {
|
2017-07-20 01:55:40 +00:00
|
|
|
const response = Object.assign(({
|
2017-07-11 00:23:40 +00:00
|
|
|
parentId: renderedRequest._id,
|
2017-11-23 21:57:08 +00:00
|
|
|
bodyCompression: null, // Will default to .zip otherwise
|
2017-07-11 00:23:40 +00:00
|
|
|
timeline: timeline,
|
2017-11-21 17:49:17 +00:00
|
|
|
bodyPath: bodyPath || '',
|
2017-07-11 00:23:40 +00:00
|
|
|
settingSendCookies: renderedRequest.settingSendCookies,
|
|
|
|
settingStoreCookies: renderedRequest.settingStoreCookies
|
2017-07-20 01:55:40 +00:00
|
|
|
}: ResponsePatch), patch);
|
2017-07-11 00:23:40 +00:00
|
|
|
|
2017-11-21 17:49:17 +00:00
|
|
|
resolve(response);
|
2017-07-20 01:55:40 +00:00
|
|
|
|
|
|
|
// Apply plugin hooks and don't wait for them and don't throw from them
|
|
|
|
process.nextTick(async () => {
|
|
|
|
try {
|
2017-11-21 17:49:17 +00:00
|
|
|
await _applyResponsePluginHooks(response);
|
2017-07-20 01:55:40 +00:00
|
|
|
} catch (err) {
|
|
|
|
// TODO: Better error handling here
|
|
|
|
console.warn('Response plugin failed', err);
|
|
|
|
}
|
|
|
|
});
|
2017-07-18 20:38:19 +00:00
|
|
|
}
|
2017-07-11 00:23:40 +00:00
|
|
|
|
2017-07-19 04:48:28 +00:00
|
|
|
/** Helper function to respond with an error */
|
|
|
|
function handleError (err: Error): void {
|
2017-07-11 00:23:40 +00:00
|
|
|
respond({
|
2017-03-16 17:51:56 +00:00
|
|
|
url: renderedRequest.url,
|
|
|
|
parentId: renderedRequest._id,
|
2017-07-19 04:48:28 +00:00
|
|
|
error: err.message,
|
2017-03-16 17:51:56 +00:00
|
|
|
elapsedTime: 0,
|
2017-04-07 18:10:15 +00:00
|
|
|
statusMessage: 'Error',
|
|
|
|
settingSendCookies: renderedRequest.settingSendCookies,
|
|
|
|
settingStoreCookies: renderedRequest.settingStoreCookies
|
2017-03-16 17:51:56 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-07-19 04:48:28 +00:00
|
|
|
/** Helper function to set Curl options */
|
2017-07-26 00:49:22 +00:00
|
|
|
function setOpt (opt: number, val: any, optional: boolean = false) {
|
2017-07-19 04:48:28 +00:00
|
|
|
const name = Object.keys(Curl.option).find(name => Curl.option[name] === opt);
|
|
|
|
try {
|
|
|
|
curl.setOpt(opt, val);
|
|
|
|
} catch (err) {
|
|
|
|
if (!optional) {
|
|
|
|
throw new Error(`${err.message} (${opt} ${name || 'n/a'})`);
|
|
|
|
} else {
|
|
|
|
console.warn(`Failed to set optional Curl opt (${opt} ${name || 'n/a'})`);
|
2017-04-07 18:10:15 +00:00
|
|
|
}
|
2017-07-19 04:48:28 +00:00
|
|
|
}
|
|
|
|
}
|
2017-04-07 18:10:15 +00:00
|
|
|
|
2017-11-13 23:10:53 +00:00
|
|
|
function enable (feature: number) {
|
|
|
|
curl.enable(feature);
|
|
|
|
}
|
|
|
|
|
2017-07-19 04:48:28 +00:00
|
|
|
try {
|
2017-03-16 17:51:56 +00:00
|
|
|
// Setup the cancellation logic
|
|
|
|
cancelRequestFunction = () => {
|
2017-03-29 23:09:28 +00:00
|
|
|
respond({
|
2017-04-06 02:30:28 +00:00
|
|
|
elapsedTime: curl.getInfo(Curl.info.TOTAL_TIME) * 1000,
|
|
|
|
bytesRead: curl.getInfo(Curl.info.SIZE_DOWNLOAD),
|
|
|
|
url: curl.getInfo(Curl.info.EFFECTIVE_URL),
|
2017-03-23 22:10:42 +00:00
|
|
|
statusMessage: 'Cancelled',
|
|
|
|
error: 'Request was cancelled'
|
|
|
|
});
|
2017-03-16 17:51:56 +00:00
|
|
|
|
2017-03-23 22:10:42 +00:00
|
|
|
// Kill it!
|
|
|
|
curl.close();
|
|
|
|
};
|
2017-03-16 17:51:56 +00:00
|
|
|
|
|
|
|
// Set all the basic options
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.FOLLOWLOCATION, settings.followRedirects);
|
|
|
|
setOpt(Curl.option.TIMEOUT_MS, settings.timeout); // 0 for no timeout
|
|
|
|
setOpt(Curl.option.VERBOSE, true); // True so debug function works
|
|
|
|
setOpt(Curl.option.NOPROGRESS, false); // False so progress function works
|
2017-11-12 18:35:01 +00:00
|
|
|
setOpt(Curl.option.ACCEPT_ENCODING, ''); // Auto decode everything
|
2017-11-13 23:10:53 +00:00
|
|
|
enable(Curl.feature.NO_HEADER_PARSING);
|
2017-11-21 17:49:17 +00:00
|
|
|
enable(Curl.feature.NO_DATA_PARSING);
|
2017-03-28 22:45:23 +00:00
|
|
|
|
2017-10-31 18:05:35 +00:00
|
|
|
// Set maximum amount of redirects allowed
|
|
|
|
// NOTE: Setting this to -1 breaks some versions of libcurl
|
|
|
|
if (settings.maxRedirects > 0) {
|
|
|
|
setOpt(Curl.option.MAXREDIRS, settings.maxRedirects);
|
|
|
|
}
|
|
|
|
|
2018-03-26 17:43:42 +00:00
|
|
|
// Don't rebuild dot sequences in path
|
|
|
|
if (!renderedRequest.settingRebuildPath) {
|
|
|
|
setOpt(Curl.option.PATH_AS_IS, true);
|
|
|
|
}
|
|
|
|
|
2017-07-26 00:49:22 +00:00
|
|
|
// Only set CURLOPT_CUSTOMREQUEST if not HEAD or GET. This is because Curl
|
|
|
|
// See https://curl.haxx.se/libcurl/c/CURLOPT_CUSTOMREQUEST.html
|
|
|
|
switch (renderedRequest.method.toUpperCase()) {
|
|
|
|
case 'HEAD':
|
|
|
|
// This is how you tell Curl to send a HEAD request
|
|
|
|
setOpt(Curl.option.NOBODY, 1);
|
|
|
|
break;
|
|
|
|
case 'POST':
|
|
|
|
// This is how you tell Curl to send a POST request
|
|
|
|
setOpt(Curl.option.POST, 1);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
// IMPORTANT: Only use CUSTOMREQUEST for all but HEAD and POST
|
|
|
|
setOpt(Curl.option.CUSTOMREQUEST, renderedRequest.method);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-03-28 22:45:23 +00:00
|
|
|
// Setup debug handler
|
2017-07-18 22:10:57 +00:00
|
|
|
setOpt(Curl.option.DEBUGFUNCTION, (infoType: string, content: string) => {
|
|
|
|
const name = Object.keys(Curl.info.debug).find(k => Curl.info.debug[k] === infoType) || '';
|
2017-03-29 02:21:49 +00:00
|
|
|
|
2017-04-04 23:06:43 +00:00
|
|
|
if (
|
|
|
|
infoType === Curl.info.debug.SSL_DATA_IN ||
|
|
|
|
infoType === Curl.info.debug.SSL_DATA_OUT
|
|
|
|
) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-03-28 22:45:23 +00:00
|
|
|
// Ignore the possibly large data messages
|
2017-03-29 02:21:49 +00:00
|
|
|
if (infoType === Curl.info.debug.DATA_OUT) {
|
2017-06-21 20:58:41 +00:00
|
|
|
if (content.length === 0) {
|
|
|
|
// Sometimes this happens, but I'm not sure why. Just ignore it.
|
|
|
|
} else if (content.length < 1000) {
|
2017-03-29 02:21:49 +00:00
|
|
|
timeline.push({name, value: content});
|
|
|
|
} else {
|
|
|
|
timeline.push({name, value: `(${describeByteSize(content.length)} hidden)`});
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (infoType === Curl.info.debug.DATA_IN) {
|
2017-03-29 23:09:28 +00:00
|
|
|
timeline.push({
|
|
|
|
name: 'TEXT',
|
|
|
|
value: `Received ${describeByteSize(content.length)} chunk`
|
|
|
|
});
|
2017-03-28 22:45:23 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't show cookie setting because this will display every domain in the jar
|
|
|
|
if (infoType === Curl.info.debug.TEXT && content.indexOf('Added cookie') === 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
timeline.push({name, value: content});
|
|
|
|
|
|
|
|
return 0; // Must be here
|
|
|
|
});
|
2017-03-16 17:51:56 +00:00
|
|
|
|
2017-03-23 22:10:42 +00:00
|
|
|
// Set the headers (to be modified as we go)
|
2017-07-12 21:20:31 +00:00
|
|
|
const headers = clone(renderedRequest.headers);
|
2017-03-23 22:10:42 +00:00
|
|
|
|
2017-03-16 17:51:56 +00:00
|
|
|
let lastPercent = 0;
|
2017-04-07 18:10:15 +00:00
|
|
|
// NOTE: This option was added in 7.32.0 so make it optional
|
2017-07-19 04:48:28 +00:00
|
|
|
setOpt(Curl.option.XFERINFOFUNCTION, (dltotal, dlnow, ultotal, ulnow) => {
|
2017-03-16 17:51:56 +00:00
|
|
|
if (dltotal === 0) {
|
2017-03-23 22:10:42 +00:00
|
|
|
return 0;
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const percent = Math.round(dlnow / dltotal * 100);
|
|
|
|
if (percent !== lastPercent) {
|
2017-11-23 21:57:08 +00:00
|
|
|
// console.log(`[network] Request downloaded ${percent}%`);
|
2017-03-16 17:51:56 +00:00
|
|
|
lastPercent = percent;
|
|
|
|
}
|
|
|
|
|
2017-03-23 22:10:42 +00:00
|
|
|
return 0;
|
2017-07-19 04:48:28 +00:00
|
|
|
}, true);
|
2017-03-16 17:51:56 +00:00
|
|
|
|
|
|
|
// Set the URL, including the query parameters
|
2017-11-26 20:45:40 +00:00
|
|
|
const qs = buildQueryStringFromParams(renderedRequest.parameters);
|
|
|
|
const url = joinUrlAndQueryString(renderedRequest.url, qs);
|
2017-06-30 16:00:00 +00:00
|
|
|
const isUnixSocket = url.match(/https?:\/\/unix:\//);
|
2017-11-26 20:45:40 +00:00
|
|
|
const finalUrl = smartEncodeUrl(url, renderedRequest.settingEncodeUrl);
|
2017-06-22 18:43:00 +00:00
|
|
|
if (isUnixSocket) {
|
|
|
|
// URL prep will convert "unix:/path" hostname to "unix/path"
|
2017-06-22 19:43:11 +00:00
|
|
|
const match = finalUrl.match(/(https?:)\/\/unix:?(\/[^:]+):\/(.+)/);
|
|
|
|
const protocol = (match && match[1]) || '';
|
|
|
|
const socketPath = (match && match[2]) || '';
|
|
|
|
const socketUrl = (match && match[3]) || '';
|
2017-12-01 14:18:38 +00:00
|
|
|
curl.setUrl(`${protocol}//${socketUrl}`);
|
2017-06-22 18:43:00 +00:00
|
|
|
setOpt(Curl.option.UNIX_SOCKET_PATH, socketPath);
|
|
|
|
} else {
|
2017-12-01 14:18:38 +00:00
|
|
|
curl.setUrl(finalUrl);
|
2017-06-22 18:43:00 +00:00
|
|
|
}
|
2017-03-29 23:09:28 +00:00
|
|
|
timeline.push({name: 'TEXT', value: 'Preparing request to ' + finalUrl});
|
2017-11-02 12:40:58 +00:00
|
|
|
timeline.push({name: 'TEXT', value: `Using ${Curl.getVersion()}`});
|
2017-03-29 23:09:28 +00:00
|
|
|
|
|
|
|
// log some things
|
|
|
|
if (renderedRequest.settingEncodeUrl) {
|
|
|
|
timeline.push({name: 'TEXT', value: 'Enable automatic URL encoding'});
|
|
|
|
} else {
|
|
|
|
timeline.push({name: 'TEXT', value: 'Disable automatic URL encoding'});
|
|
|
|
}
|
2017-03-16 17:51:56 +00:00
|
|
|
|
2017-04-07 18:10:15 +00:00
|
|
|
// SSL Validation
|
|
|
|
if (settings.validateSSL) {
|
|
|
|
timeline.push({name: 'TEXT', value: 'Enable SSL validation'});
|
|
|
|
} else {
|
|
|
|
setOpt(Curl.option.SSL_VERIFYHOST, 0);
|
|
|
|
setOpt(Curl.option.SSL_VERIFYPEER, 0);
|
|
|
|
timeline.push({name: 'TEXT', value: 'Disable SSL validation'});
|
|
|
|
}
|
|
|
|
|
2017-03-16 17:51:56 +00:00
|
|
|
// Setup CA Root Certificates if not on Mac. Thanks to libcurl, Mac will use
|
|
|
|
// certificates form the OS.
|
|
|
|
if (process.platform !== 'darwin') {
|
2017-11-21 17:52:47 +00:00
|
|
|
const baseCAPath = getTempDir();
|
|
|
|
const fullCAPath = pathJoin(baseCAPath, CACerts.filename);
|
2017-03-28 22:45:23 +00:00
|
|
|
|
|
|
|
try {
|
|
|
|
fs.statSync(fullCAPath);
|
|
|
|
} catch (err) {
|
|
|
|
// Doesn't exist yet, so write it
|
2017-11-21 17:52:47 +00:00
|
|
|
mkdirp.sync(baseCAPath);
|
2017-03-28 22:45:23 +00:00
|
|
|
fs.writeFileSync(fullCAPath, CACerts.blob);
|
2017-11-22 00:07:28 +00:00
|
|
|
console.log('[net] Set CA to', fullCAPath);
|
2017-03-28 22:45:23 +00:00
|
|
|
}
|
2017-03-16 17:51:56 +00:00
|
|
|
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.CAINFO, fullCAPath);
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
2017-04-12 21:17:40 +00:00
|
|
|
// Set cookies from jar
|
2017-03-28 22:45:23 +00:00
|
|
|
if (renderedRequest.settingSendCookies) {
|
2017-06-15 17:52:51 +00:00
|
|
|
// Tell Curl to store cookies that it receives. This is only important if we receive
|
|
|
|
// a cookie on a redirect that needs to be sent on the next request in the chain.
|
|
|
|
curl.setOpt(Curl.option.COOKIEFILE, '');
|
|
|
|
|
2017-03-29 23:09:28 +00:00
|
|
|
const cookies = renderedRequest.cookieJar.cookies || [];
|
|
|
|
for (const cookie of cookies) {
|
2017-03-28 22:45:23 +00:00
|
|
|
let expiresTimestamp = 0;
|
|
|
|
if (cookie.expires) {
|
|
|
|
const expiresDate = new Date(cookie.expires);
|
|
|
|
expiresTimestamp = Math.round(expiresDate.getTime() / 1000);
|
|
|
|
}
|
2017-05-16 17:45:09 +00:00
|
|
|
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.COOKIELIST, [
|
2017-03-28 22:45:23 +00:00
|
|
|
cookie.httpOnly ? `#HttpOnly_${cookie.domain}` : cookie.domain,
|
2017-05-16 17:45:09 +00:00
|
|
|
cookie.hostOnly ? 'FALSE' : 'TRUE',
|
2017-03-28 22:45:23 +00:00
|
|
|
cookie.path,
|
|
|
|
cookie.secure ? 'TRUE' : 'FALSE',
|
|
|
|
expiresTimestamp,
|
|
|
|
cookie.key,
|
|
|
|
cookie.value
|
|
|
|
].join('\t'));
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
2017-03-29 23:09:28 +00:00
|
|
|
|
2017-07-20 01:55:40 +00:00
|
|
|
for (const {name, value} of renderedRequest.cookies) {
|
|
|
|
setOpt(Curl.option.COOKIE, `${name}=${value}`);
|
|
|
|
}
|
|
|
|
|
2017-03-29 23:09:28 +00:00
|
|
|
timeline.push({
|
|
|
|
name: 'TEXT',
|
|
|
|
value: 'Enable cookie sending with jar of ' +
|
|
|
|
`${cookies.length} cookie${cookies.length !== 1 ? 's' : ''}`
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
timeline.push({
|
|
|
|
name: 'TEXT',
|
|
|
|
value: 'Disable cookie sending due to user setting'
|
|
|
|
});
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
2017-03-28 22:45:23 +00:00
|
|
|
// Set proxy settings if we have them
|
|
|
|
if (settings.proxyEnabled) {
|
|
|
|
const {protocol} = urlParse(renderedRequest.url);
|
2017-06-06 20:21:59 +00:00
|
|
|
const {httpProxy, httpsProxy, noProxy} = settings;
|
2017-03-28 22:45:23 +00:00
|
|
|
const proxyHost = protocol === 'https:' ? httpsProxy : httpProxy;
|
|
|
|
const proxy = proxyHost ? setDefaultProtocol(proxyHost) : null;
|
2017-07-18 20:38:19 +00:00
|
|
|
timeline.push({name: 'TEXT', value: `Enable network proxy for ${protocol || ''}`});
|
2017-03-28 22:45:23 +00:00
|
|
|
if (proxy) {
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.PROXY, proxy);
|
|
|
|
setOpt(Curl.option.PROXYAUTH, Curl.auth.ANY);
|
2017-03-28 22:45:23 +00:00
|
|
|
}
|
2017-06-06 20:21:59 +00:00
|
|
|
if (noProxy) {
|
|
|
|
setOpt(Curl.option.NOPROXY, noProxy);
|
|
|
|
}
|
2017-04-07 18:10:15 +00:00
|
|
|
} else {
|
|
|
|
setOpt(Curl.option.PROXY, '');
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Set client certs if needed
|
2017-10-31 18:05:35 +00:00
|
|
|
const clientCertificates = await models.clientCertificate.findByParentId(workspace._id);
|
|
|
|
for (const certificate of clientCertificates) {
|
2017-06-21 21:20:42 +00:00
|
|
|
if (certificate.disabled) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2017-03-16 17:51:56 +00:00
|
|
|
const cHostWithProtocol = setDefaultProtocol(certificate.host, 'https:');
|
|
|
|
|
2017-06-21 20:56:19 +00:00
|
|
|
if (urlMatchesCertHost(cHostWithProtocol, renderedRequest.url)) {
|
2017-03-16 17:51:56 +00:00
|
|
|
const ensureFile = blobOrFilename => {
|
2017-10-05 13:11:22 +00:00
|
|
|
try {
|
|
|
|
fs.statSync(blobOrFilename);
|
|
|
|
} catch (err) {
|
2017-11-21 17:52:47 +00:00
|
|
|
// Certificate file not found!
|
|
|
|
// LEGACY: Certs used to be stored in blobs (not as paths), so let's write it to
|
2017-03-16 17:51:56 +00:00
|
|
|
// the temp directory first.
|
2017-11-04 20:10:06 +00:00
|
|
|
const fullBase = getTempDir();
|
2017-03-16 17:51:56 +00:00
|
|
|
const name = `${renderedRequest._id}_${renderedRequest.modified}`;
|
|
|
|
const fullPath = pathJoin(fullBase, name);
|
2017-11-20 16:07:36 +00:00
|
|
|
fs.writeFileSync(fullPath, Buffer.from(blobOrFilename, 'base64'));
|
2017-03-16 17:51:56 +00:00
|
|
|
|
2017-10-05 13:11:22 +00:00
|
|
|
// Set filename to the one we just saved
|
|
|
|
blobOrFilename = fullPath;
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
2017-10-05 13:11:22 +00:00
|
|
|
|
|
|
|
return blobOrFilename;
|
2017-03-16 17:51:56 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
const {passphrase, cert, key, pfx} = certificate;
|
|
|
|
|
|
|
|
if (cert) {
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.SSLCERT, ensureFile(cert));
|
|
|
|
setOpt(Curl.option.SSLCERTTYPE, 'PEM');
|
2017-03-29 23:09:28 +00:00
|
|
|
timeline.push({name: 'TEXT', value: 'Adding SSL PEM certificate'});
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (pfx) {
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.SSLCERT, ensureFile(pfx));
|
|
|
|
setOpt(Curl.option.SSLCERTTYPE, 'P12');
|
2017-03-29 23:09:28 +00:00
|
|
|
timeline.push({name: 'TEXT', value: 'Adding SSL P12 certificate'});
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (key) {
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.SSLKEY, ensureFile(key));
|
2017-03-29 23:09:28 +00:00
|
|
|
timeline.push({name: 'TEXT', value: 'Adding SSL KEY certificate'});
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (passphrase) {
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.KEYPASSWD, passphrase);
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build the body
|
2017-04-09 21:53:46 +00:00
|
|
|
let noBody = false;
|
2017-07-12 21:20:31 +00:00
|
|
|
let requestBody = null;
|
2017-04-20 17:18:00 +00:00
|
|
|
const expectsBody = ['POST', 'PUT', 'PATCH'].includes(renderedRequest.method.toUpperCase());
|
2017-03-16 17:51:56 +00:00
|
|
|
if (renderedRequest.body.mimeType === CONTENT_TYPE_FORM_URLENCODED) {
|
2017-11-26 20:45:40 +00:00
|
|
|
requestBody = buildQueryStringFromParams(renderedRequest.body.params || [], false);
|
2017-03-16 17:51:56 +00:00
|
|
|
} else if (renderedRequest.body.mimeType === CONTENT_TYPE_FORM_DATA) {
|
2017-07-18 20:38:19 +00:00
|
|
|
const params = renderedRequest.body.params || [];
|
2017-10-28 22:16:34 +00:00
|
|
|
const {filePath: multipartBodyPath, boundary, contentLength} = await buildMultipart(params);
|
2017-10-12 17:32:26 +00:00
|
|
|
|
|
|
|
// Extend the Content-Type header
|
|
|
|
const contentTypeHeader = getContentTypeHeader(headers);
|
|
|
|
if (contentTypeHeader) {
|
|
|
|
contentTypeHeader.value = `multipart/form-data; boundary=${boundary}`;
|
|
|
|
} else {
|
|
|
|
headers.push({
|
|
|
|
name: 'Content-Type',
|
|
|
|
value: `multipart/form-data; boundary=${boundary}`
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2018-03-06 05:30:40 +00:00
|
|
|
const fd = fs.openSync(multipartBodyPath, 'r');
|
2017-10-28 22:16:34 +00:00
|
|
|
|
|
|
|
setOpt(Curl.option.INFILESIZE_LARGE, contentLength);
|
2017-10-12 17:32:26 +00:00
|
|
|
setOpt(Curl.option.UPLOAD, 1);
|
2017-10-28 22:16:34 +00:00
|
|
|
setOpt(Curl.option.READDATA, fd);
|
2017-10-12 17:32:26 +00:00
|
|
|
|
|
|
|
// We need this, otherwise curl will send it as a PUT
|
|
|
|
setOpt(Curl.option.CUSTOMREQUEST, renderedRequest.method);
|
|
|
|
|
2017-10-28 22:16:34 +00:00
|
|
|
const fn = () => {
|
|
|
|
fs.closeSync(fd);
|
2017-11-10 10:50:39 +00:00
|
|
|
fs.unlink(multipartBodyPath, () => {
|
|
|
|
});
|
2017-10-28 22:16:34 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
curl.on('end', fn);
|
|
|
|
curl.on('error', fn);
|
2017-03-16 17:51:56 +00:00
|
|
|
} else if (renderedRequest.body.fileName) {
|
2017-04-09 21:53:46 +00:00
|
|
|
const {size} = fs.statSync(renderedRequest.body.fileName);
|
2017-07-18 20:38:19 +00:00
|
|
|
const fileName = renderedRequest.body.fileName || '';
|
2018-03-06 05:30:40 +00:00
|
|
|
const fd = fs.openSync(fileName, 'r');
|
2017-07-26 02:40:32 +00:00
|
|
|
|
2017-09-09 12:48:27 +00:00
|
|
|
setOpt(Curl.option.INFILESIZE_LARGE, size);
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.UPLOAD, 1);
|
|
|
|
setOpt(Curl.option.READDATA, fd);
|
2017-07-26 02:40:32 +00:00
|
|
|
|
|
|
|
// We need this, otherwise curl will send it as a POST
|
|
|
|
setOpt(Curl.option.CUSTOMREQUEST, renderedRequest.method);
|
|
|
|
|
2017-03-16 17:51:56 +00:00
|
|
|
const fn = () => fs.closeSync(fd);
|
|
|
|
curl.on('end', fn);
|
|
|
|
curl.on('error', fn);
|
2017-04-20 17:18:00 +00:00
|
|
|
} else if (typeof renderedRequest.body.mimeType === 'string' || expectsBody) {
|
2017-07-12 21:20:31 +00:00
|
|
|
requestBody = renderedRequest.body.text || '';
|
2017-03-16 17:51:56 +00:00
|
|
|
} else {
|
|
|
|
// No body
|
2017-04-09 21:53:46 +00:00
|
|
|
noBody = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!noBody) {
|
|
|
|
// Don't chunk uploads
|
|
|
|
headers.push({name: 'Expect', value: ''});
|
|
|
|
headers.push({name: 'Transfer-Encoding', value: ''});
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
2017-07-12 21:20:31 +00:00
|
|
|
// If we calculated the body within Insomnia (ie. not computed by Curl)
|
|
|
|
if (requestBody !== null) {
|
|
|
|
setOpt(Curl.option.POSTFIELDS, requestBody);
|
|
|
|
}
|
|
|
|
|
2017-03-23 22:10:42 +00:00
|
|
|
// Handle Authorization header
|
2017-04-11 21:20:01 +00:00
|
|
|
if (!hasAuthHeader(headers) && !renderedRequest.authentication.disabled) {
|
2017-03-28 22:45:23 +00:00
|
|
|
if (renderedRequest.authentication.type === AUTH_BASIC) {
|
|
|
|
const {username, password} = renderedRequest.authentication;
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.HTTPAUTH, Curl.auth.BASIC);
|
|
|
|
setOpt(Curl.option.USERNAME, username || '');
|
|
|
|
setOpt(Curl.option.PASSWORD, password || '');
|
2017-03-28 22:45:23 +00:00
|
|
|
} else if (renderedRequest.authentication.type === AUTH_DIGEST) {
|
|
|
|
const {username, password} = renderedRequest.authentication;
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.HTTPAUTH, Curl.auth.DIGEST);
|
|
|
|
setOpt(Curl.option.USERNAME, username || '');
|
|
|
|
setOpt(Curl.option.PASSWORD, password || '');
|
2017-04-05 05:48:04 +00:00
|
|
|
} else if (renderedRequest.authentication.type === AUTH_NTLM) {
|
|
|
|
const {username, password} = renderedRequest.authentication;
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.HTTPAUTH, Curl.auth.NTLM);
|
|
|
|
setOpt(Curl.option.USERNAME, username || '');
|
|
|
|
setOpt(Curl.option.PASSWORD, password || '');
|
2017-07-12 21:01:14 +00:00
|
|
|
} else if (renderedRequest.authentication.type === AUTH_AWS_IAM) {
|
2017-08-01 22:13:24 +00:00
|
|
|
if (!noBody && !requestBody) {
|
2017-07-20 01:55:40 +00:00
|
|
|
return handleError(
|
|
|
|
new Error('AWS authentication not supported for provided body type'));
|
2017-07-12 21:01:14 +00:00
|
|
|
}
|
2018-01-24 17:51:13 +00:00
|
|
|
const credentials = {
|
|
|
|
accessKeyId: renderedRequest.authentication.accessKeyId || '',
|
|
|
|
secretAccessKey: renderedRequest.authentication.secretAccessKey || '',
|
|
|
|
sessionToken: renderedRequest.authentication.sessionToken || ''
|
|
|
|
};
|
2017-07-12 21:20:31 +00:00
|
|
|
const extraHeaders = _getAwsAuthHeaders(
|
2018-01-24 17:51:13 +00:00
|
|
|
credentials,
|
2017-07-12 21:20:31 +00:00
|
|
|
headers,
|
2017-08-01 22:13:24 +00:00
|
|
|
requestBody || '',
|
2017-10-10 08:58:13 +00:00
|
|
|
finalUrl,
|
|
|
|
renderedRequest.method
|
2017-07-12 21:20:31 +00:00
|
|
|
);
|
|
|
|
for (const header of extraHeaders) {
|
2017-07-12 21:01:14 +00:00
|
|
|
headers.push(header);
|
2017-07-12 21:20:31 +00:00
|
|
|
}
|
2017-07-31 17:29:36 +00:00
|
|
|
} else if (renderedRequest.authentication.type === AUTH_NETRC) {
|
|
|
|
setOpt(Curl.option.NETRC, Curl.netrc.REQUIRED);
|
2017-03-28 22:45:23 +00:00
|
|
|
} else {
|
|
|
|
const authHeader = await getAuthHeader(
|
|
|
|
renderedRequest._id,
|
2017-08-21 17:43:12 +00:00
|
|
|
finalUrl,
|
|
|
|
renderedRequest.method,
|
2017-03-28 22:45:23 +00:00
|
|
|
renderedRequest.authentication
|
|
|
|
);
|
|
|
|
|
|
|
|
if (authHeader) {
|
2017-11-06 20:44:55 +00:00
|
|
|
headers.push({
|
|
|
|
name: authHeader.name,
|
|
|
|
value: authHeader.value
|
|
|
|
});
|
2017-03-28 22:45:23 +00:00
|
|
|
}
|
2017-03-23 22:10:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-12 18:35:01 +00:00
|
|
|
// Send a default Accept headers of anything
|
|
|
|
if (!hasAcceptHeader(headers)) {
|
|
|
|
headers.push({name: 'Accept', value: '*/*'}); // Default to anything
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't auto-send Accept-Encoding header
|
|
|
|
if (!hasAcceptEncodingHeader(headers)) {
|
|
|
|
headers.push({name: 'Accept-Encoding', value: ''});
|
|
|
|
}
|
|
|
|
|
2017-03-23 22:10:42 +00:00
|
|
|
// Set User-Agent if it't not already in headers
|
2017-04-11 21:20:01 +00:00
|
|
|
if (!hasUserAgentHeader(headers)) {
|
2017-04-07 18:10:15 +00:00
|
|
|
setOpt(Curl.option.USERAGENT, `insomnia/${getAppVersion()}`);
|
2017-03-23 22:10:42 +00:00
|
|
|
}
|
2017-03-16 17:51:56 +00:00
|
|
|
|
2017-04-11 21:20:01 +00:00
|
|
|
// Prevent curl from adding default content-type header
|
|
|
|
if (!hasContentTypeHeader(headers)) {
|
|
|
|
headers.push({name: 'content-type', value: ''});
|
|
|
|
}
|
|
|
|
|
|
|
|
// NOTE: This is last because headers might be modified multiple times
|
|
|
|
const headerStrings = headers
|
|
|
|
.filter(h => h.name)
|
|
|
|
.map(h => `${(h.name || '').trim()}: ${h.value}`);
|
|
|
|
setOpt(Curl.option.HTTPHEADER, headerStrings);
|
|
|
|
|
2017-11-30 11:06:04 +00:00
|
|
|
let responseBodyBytes = 0;
|
|
|
|
const responsesDir = pathJoin(app.getPath('userData'), 'responses');
|
|
|
|
mkdirp.sync(responsesDir);
|
|
|
|
const responseBodyPath = pathJoin(responsesDir, uuid.v4() + '.response');
|
|
|
|
const responseBodyWriteStream = fs.createWriteStream(responseBodyPath);
|
|
|
|
curl.on('end', () => responseBodyWriteStream.end());
|
|
|
|
curl.on('error', () => responseBodyWriteStream.end());
|
|
|
|
setOpt(Curl.option.WRITEFUNCTION, (buff: Buffer) => {
|
|
|
|
responseBodyBytes += buff.length;
|
|
|
|
responseBodyWriteStream.write(buff);
|
|
|
|
return buff.length;
|
|
|
|
});
|
|
|
|
|
2017-03-16 17:51:56 +00:00
|
|
|
// Handle the response ending
|
2017-11-13 23:10:53 +00:00
|
|
|
curl.on('end', async (_1, _2, rawHeaders) => {
|
|
|
|
const allCurlHeadersObjects = _parseHeaders(rawHeaders);
|
2017-03-16 17:51:56 +00:00
|
|
|
// Headers are an array (one for each redirect)
|
2017-06-15 03:59:03 +00:00
|
|
|
const lastCurlHeadersObject = allCurlHeadersObjects[allCurlHeadersObjects.length - 1];
|
2017-03-16 17:51:56 +00:00
|
|
|
|
|
|
|
// Collect various things
|
2017-12-18 18:10:34 +00:00
|
|
|
const httpVersion = lastCurlHeadersObject.version || '';
|
2017-11-13 23:10:53 +00:00
|
|
|
const statusCode = lastCurlHeadersObject.code || -1;
|
2017-12-18 18:10:34 +00:00
|
|
|
const statusMessage = lastCurlHeadersObject.reason || '';
|
2017-03-16 17:51:56 +00:00
|
|
|
|
|
|
|
// Collect the headers
|
2017-11-13 23:10:53 +00:00
|
|
|
const headers = lastCurlHeadersObject.headers;
|
2017-03-16 17:51:56 +00:00
|
|
|
|
|
|
|
// Calculate the content type
|
2017-11-20 16:07:36 +00:00
|
|
|
const contentTypeHeader = getContentTypeHeader(headers);
|
2017-03-16 17:51:56 +00:00
|
|
|
const contentType = contentTypeHeader ? contentTypeHeader.value : '';
|
|
|
|
|
|
|
|
// Update Cookie Jar
|
2017-06-15 17:52:51 +00:00
|
|
|
let currentUrl = finalUrl;
|
2017-11-13 23:10:53 +00:00
|
|
|
let setCookieStrings: Array<string> = [];
|
2017-06-15 17:52:51 +00:00
|
|
|
const jar = jarFromCookies(renderedRequest.cookieJar.cookies);
|
|
|
|
|
2017-11-13 23:10:53 +00:00
|
|
|
for (const {headers} of allCurlHeadersObjects) {
|
2017-06-15 17:52:51 +00:00
|
|
|
// Collect Set-Cookie headers
|
2017-11-13 23:10:53 +00:00
|
|
|
const setCookieHeaders = getSetCookieHeaders(headers);
|
|
|
|
setCookieStrings = [...setCookieStrings, ...setCookieHeaders.map(h => h.value)];
|
2017-06-15 17:52:51 +00:00
|
|
|
|
|
|
|
// Pull out new URL if there is a redirect
|
2017-11-13 23:10:53 +00:00
|
|
|
const newLocation = getLocationHeader(headers);
|
2017-06-15 17:52:51 +00:00
|
|
|
if (newLocation !== null) {
|
2017-11-13 23:10:53 +00:00
|
|
|
currentUrl = urlResolve(currentUrl, newLocation.value);
|
2017-06-15 17:52:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update jar with Set-Cookie headers
|
|
|
|
for (const setCookieStr of setCookieStrings) {
|
|
|
|
try {
|
|
|
|
jar.setCookieSync(setCookieStr, currentUrl);
|
|
|
|
} catch (err) {
|
|
|
|
timeline.push({name: 'TEXT', value: `Rejected cookie: ${err.message}`});
|
2017-05-16 17:45:09 +00:00
|
|
|
}
|
2017-06-15 17:52:51 +00:00
|
|
|
}
|
2017-03-28 22:45:23 +00:00
|
|
|
|
2017-06-15 17:52:51 +00:00
|
|
|
// Update cookie jar if we need to and if we found any cookies
|
|
|
|
if (renderedRequest.settingStoreCookies && setCookieStrings.length) {
|
2017-05-16 17:45:09 +00:00
|
|
|
const cookies = await cookiesFromJar(jar);
|
|
|
|
models.cookieJar.update(renderedRequest.cookieJar, {cookies});
|
2017-06-15 17:52:51 +00:00
|
|
|
}
|
2017-05-16 17:45:09 +00:00
|
|
|
|
2017-06-15 17:52:51 +00:00
|
|
|
// Print informational message
|
|
|
|
if (setCookieStrings.length > 0) {
|
|
|
|
const n = setCookieStrings.length;
|
|
|
|
if (renderedRequest.settingStoreCookies) {
|
|
|
|
timeline.push({name: 'TEXT', value: `Saved ${n} cookie${n === 1 ? '' : 's'}`});
|
|
|
|
} else {
|
|
|
|
timeline.push({name: 'TEXT', value: `Ignored ${n} cookie${n === 1 ? '' : 's'}`});
|
|
|
|
}
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Return the response data
|
2017-07-20 01:55:40 +00:00
|
|
|
const responsePatch = {
|
2017-03-16 17:51:56 +00:00
|
|
|
headers,
|
|
|
|
contentType,
|
|
|
|
statusCode,
|
2017-11-13 23:10:53 +00:00
|
|
|
httpVersion,
|
2017-04-06 02:30:28 +00:00
|
|
|
statusMessage,
|
|
|
|
elapsedTime: curl.getInfo(Curl.info.TOTAL_TIME) * 1000,
|
|
|
|
bytesRead: curl.getInfo(Curl.info.SIZE_DOWNLOAD),
|
2017-11-21 17:49:17 +00:00
|
|
|
bytesContent: responseBodyBytes,
|
2017-04-06 02:30:28 +00:00
|
|
|
url: curl.getInfo(Curl.info.EFFECTIVE_URL)
|
2017-07-20 01:55:40 +00:00
|
|
|
};
|
2017-03-16 17:51:56 +00:00
|
|
|
|
|
|
|
// Close the request
|
2017-11-13 23:10:53 +00:00
|
|
|
curl.close();
|
2017-07-20 01:55:40 +00:00
|
|
|
|
2017-11-21 17:49:17 +00:00
|
|
|
// Make sure the response body has been fully written first
|
|
|
|
await waitForStreamToFinish(responseBodyWriteStream);
|
|
|
|
|
|
|
|
respond(responsePatch, responseBodyPath);
|
2017-03-16 17:51:56 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
curl.on('error', function (err, code) {
|
|
|
|
let error = err + '';
|
|
|
|
let statusMessage = 'Error';
|
|
|
|
|
|
|
|
if (code === Curl.code.CURLE_ABORTED_BY_CALLBACK) {
|
|
|
|
error = 'Request aborted';
|
|
|
|
statusMessage = 'Abort';
|
|
|
|
}
|
|
|
|
|
2017-03-29 23:09:28 +00:00
|
|
|
respond({statusMessage, error});
|
2017-03-16 17:51:56 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
curl.perform();
|
|
|
|
} catch (err) {
|
|
|
|
handleError(err);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-11-10 10:50:39 +00:00
|
|
|
export async function sendWithSettings (
|
|
|
|
requestId: string,
|
|
|
|
requestPatch: Object
|
2017-11-21 17:49:17 +00:00
|
|
|
): Promise<ResponsePatch> {
|
2017-11-10 10:50:39 +00:00
|
|
|
const request = await models.request.getById(requestId);
|
|
|
|
if (!request) {
|
|
|
|
throw new Error(`Failed to find request: ${requestId}`);
|
|
|
|
}
|
|
|
|
|
|
|
|
const settings = await models.settings.getOrCreate();
|
|
|
|
const ancestors = await db.withAncestors(request, [
|
2018-01-17 04:20:45 +00:00
|
|
|
models.request.type,
|
2017-11-10 10:50:39 +00:00
|
|
|
models.requestGroup.type,
|
|
|
|
models.workspace.type
|
|
|
|
]);
|
|
|
|
|
|
|
|
const workspaceDoc = ancestors.find(doc => doc.type === models.workspace.type);
|
|
|
|
const workspaceId = workspaceDoc ? workspaceDoc._id : 'n/a';
|
|
|
|
const workspace = await models.workspace.getById(workspaceId);
|
|
|
|
if (!workspace) {
|
|
|
|
throw new Error(`Failed to find workspace for: ${requestId}`);
|
|
|
|
}
|
|
|
|
|
|
|
|
const workspaceMeta = await models.workspaceMeta.getOrCreateByParentId(workspace._id);
|
|
|
|
const environmentId: string = workspaceMeta.activeEnvironmentId || 'n/a';
|
|
|
|
|
|
|
|
const newRequest: Request = await models.initModel(models.request.type, requestPatch, {
|
|
|
|
_id: request._id + '.other',
|
|
|
|
parentId: request._id
|
|
|
|
});
|
|
|
|
|
|
|
|
let renderedRequest: RenderedRequest;
|
|
|
|
try {
|
|
|
|
renderedRequest = await getRenderedRequest(newRequest, environmentId);
|
|
|
|
} catch (err) {
|
|
|
|
throw new Error(`Failed to render request: ${requestId}`);
|
|
|
|
}
|
|
|
|
|
2017-11-20 16:07:36 +00:00
|
|
|
return _actuallySend(renderedRequest, workspace, settings);
|
2017-11-10 10:50:39 +00:00
|
|
|
}
|
|
|
|
|
2017-11-20 16:07:36 +00:00
|
|
|
export async function send (
|
|
|
|
requestId: string,
|
|
|
|
environmentId: string
|
2017-11-21 17:49:17 +00:00
|
|
|
): Promise<ResponsePatch> {
|
2017-06-09 03:02:16 +00:00
|
|
|
// HACK: wait for all debounces to finish
|
|
|
|
/*
|
|
|
|
* TODO: Do this in a more robust way
|
|
|
|
* The following block adds a "long" delay to let potential debounces and
|
|
|
|
* database updates finish before making the request. This is done by tracking
|
|
|
|
* the time of the user's last keypress and making sure the request is sent a
|
|
|
|
* significant time after the last press.
|
|
|
|
*/
|
|
|
|
const timeSinceLastInteraction = Date.now() - lastUserInteraction;
|
|
|
|
const delayMillis = Math.max(0, MAX_DELAY_TIME - timeSinceLastInteraction);
|
|
|
|
if (delayMillis > 0) {
|
2017-11-20 16:07:36 +00:00
|
|
|
await delay(delayMillis);
|
2017-06-09 03:02:16 +00:00
|
|
|
}
|
2017-03-16 17:51:56 +00:00
|
|
|
|
2017-06-09 03:02:16 +00:00
|
|
|
// Fetch some things
|
2017-03-16 17:51:56 +00:00
|
|
|
const request = await models.request.getById(requestId);
|
|
|
|
const settings = await models.settings.getOrCreate();
|
2017-04-21 04:30:52 +00:00
|
|
|
const ancestors = await db.withAncestors(request, [
|
2018-03-06 02:26:59 +00:00
|
|
|
models.request.type,
|
2017-04-21 04:30:52 +00:00
|
|
|
models.requestGroup.type,
|
|
|
|
models.workspace.type
|
|
|
|
]);
|
2017-06-15 17:52:51 +00:00
|
|
|
|
2017-07-20 01:55:40 +00:00
|
|
|
if (!request) {
|
|
|
|
throw new Error(`Failed to find request to send for ${requestId}`);
|
|
|
|
}
|
|
|
|
|
2017-12-21 14:01:51 +00:00
|
|
|
const renderResult = await getRenderedRequestAndContext(
|
|
|
|
request,
|
|
|
|
environmentId,
|
|
|
|
RENDER_PURPOSE_SEND
|
|
|
|
);
|
|
|
|
|
|
|
|
const renderedRequestBeforePlugins = renderResult.request;
|
|
|
|
const renderedContextBeforePlugins = renderResult.context;
|
2017-07-20 01:55:40 +00:00
|
|
|
|
2017-11-26 13:42:43 +00:00
|
|
|
const workspaceDoc = ancestors.find(doc => doc.type === models.workspace.type);
|
|
|
|
const workspace = await models.workspace.getById(workspaceDoc ? workspaceDoc._id : 'n/a');
|
|
|
|
if (!workspace) {
|
|
|
|
throw new Error(`Failed to find workspace for request: ${requestId}`);
|
|
|
|
}
|
|
|
|
|
2017-07-20 01:55:40 +00:00
|
|
|
let renderedRequest: RenderedRequest;
|
|
|
|
try {
|
2017-11-26 13:42:43 +00:00
|
|
|
renderedRequest = await _applyRequestPluginHooks(
|
|
|
|
renderedRequestBeforePlugins,
|
|
|
|
renderedContextBeforePlugins
|
|
|
|
);
|
2017-07-20 01:55:40 +00:00
|
|
|
} catch (err) {
|
|
|
|
return {
|
2018-04-05 12:35:56 +00:00
|
|
|
url: renderedRequestBeforePlugins.url,
|
|
|
|
parentId: renderedRequestBeforePlugins._id,
|
|
|
|
error: err.message,
|
|
|
|
statusCode: STATUS_CODE_PLUGIN_ERROR,
|
|
|
|
statusMessage: err.plugin ? `Plugin ${err.plugin.name}` : 'Plugin',
|
|
|
|
settingSendCookies: renderedRequestBeforePlugins.settingSendCookies,
|
|
|
|
settingStoreCookies: renderedRequestBeforePlugins.settingStoreCookies
|
2017-07-20 01:55:40 +00:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2017-04-07 18:10:15 +00:00
|
|
|
return _actuallySend(renderedRequest, workspace, settings);
|
2017-03-16 17:51:56 +00:00
|
|
|
}
|
2017-06-09 03:02:16 +00:00
|
|
|
|
2017-10-10 08:58:13 +00:00
|
|
|
async function _applyRequestPluginHooks (
|
|
|
|
renderedRequest: RenderedRequest,
|
|
|
|
renderedContext: Object
|
|
|
|
): Promise<RenderedRequest> {
|
2017-07-20 01:55:40 +00:00
|
|
|
let newRenderedRequest = renderedRequest;
|
|
|
|
for (const {plugin, hook} of await plugins.getRequestHooks()) {
|
|
|
|
newRenderedRequest = clone(newRenderedRequest);
|
|
|
|
|
|
|
|
const context = {
|
2017-12-21 14:01:51 +00:00
|
|
|
...pluginContexts.app.init(),
|
|
|
|
...pluginContexts.request.init(newRenderedRequest, renderedContext)
|
2017-07-20 01:55:40 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
try {
|
|
|
|
await hook(context);
|
|
|
|
} catch (err) {
|
|
|
|
err.plugin = plugin;
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return newRenderedRequest;
|
|
|
|
}
|
|
|
|
|
|
|
|
async function _applyResponsePluginHooks (
|
2017-11-21 17:49:17 +00:00
|
|
|
response: ResponsePatch
|
2017-07-20 01:55:40 +00:00
|
|
|
): Promise<void> {
|
|
|
|
for (const {plugin, hook} of await plugins.getResponseHooks()) {
|
|
|
|
const context = {
|
2017-12-21 14:01:51 +00:00
|
|
|
...pluginContexts.app.init(),
|
|
|
|
...pluginContexts.response.init(response)
|
2017-07-20 01:55:40 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
try {
|
|
|
|
await hook(context);
|
|
|
|
} catch (err) {
|
|
|
|
err.plugin = plugin;
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-13 23:10:53 +00:00
|
|
|
export function _parseHeaders (
|
|
|
|
buffer: Buffer
|
|
|
|
): Array<{headers: Array<ResponseHeader>, version: string, code: number, reason: string}> {
|
|
|
|
const results = [];
|
|
|
|
|
|
|
|
const lines = buffer.toString('utf8').split(/\r?\n|\r/g);
|
|
|
|
|
|
|
|
for (let i = 0, currentResult = null; i < lines.length; i++) {
|
|
|
|
const line = lines[i];
|
|
|
|
const isEmptyLine = line.trim() === '';
|
|
|
|
|
|
|
|
// If we hit an empty line, start parsing the next response
|
|
|
|
if (isEmptyLine && currentResult) {
|
|
|
|
results.push(currentResult);
|
|
|
|
currentResult = null;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!currentResult) {
|
|
|
|
const [version, code, ...other] = line.split(/ +/g);
|
|
|
|
currentResult = {
|
|
|
|
version,
|
|
|
|
code: parseInt(code, 10),
|
|
|
|
reason: other.join(' '),
|
|
|
|
headers: []
|
|
|
|
};
|
|
|
|
} else {
|
|
|
|
const [name, value] = line.split(/:\s(.+)/);
|
|
|
|
const header: ResponseHeader = {name, value: value || ''};
|
|
|
|
currentResult.headers.push(header);
|
|
|
|
}
|
2017-06-15 17:52:51 +00:00
|
|
|
}
|
2017-11-13 23:10:53 +00:00
|
|
|
|
|
|
|
return results;
|
2017-06-15 17:52:51 +00:00
|
|
|
}
|
|
|
|
|
2017-07-12 21:01:14 +00:00
|
|
|
// exported for unit tests only
|
2017-07-18 22:10:57 +00:00
|
|
|
export function _getAwsAuthHeaders (
|
2018-01-24 17:51:13 +00:00
|
|
|
credentials: Object,
|
2017-07-19 02:54:03 +00:00
|
|
|
headers: Array<RequestHeader>,
|
2017-07-18 22:10:57 +00:00
|
|
|
body: string,
|
2017-10-10 08:58:13 +00:00
|
|
|
url: string,
|
|
|
|
method: string
|
2017-07-18 22:10:57 +00:00
|
|
|
) {
|
2017-07-12 21:01:14 +00:00
|
|
|
const parsedUrl = urlParse(url);
|
2017-11-20 16:07:36 +00:00
|
|
|
const contentTypeHeader = getContentTypeHeader(headers);
|
2017-07-12 21:20:31 +00:00
|
|
|
|
2018-02-08 09:09:13 +00:00
|
|
|
// AWS uses host header for signing so prioritize that if the user set it manually
|
|
|
|
const hostHeader = getHostHeader(headers);
|
|
|
|
const host = hostHeader ? hostHeader.value : parsedUrl.host;
|
|
|
|
|
2017-07-12 21:20:31 +00:00
|
|
|
const awsSignOptions = {
|
|
|
|
body,
|
2017-10-10 08:58:13 +00:00
|
|
|
method,
|
2018-02-08 09:09:13 +00:00
|
|
|
host,
|
2017-07-12 21:01:14 +00:00
|
|
|
path: parsedUrl.path,
|
|
|
|
headers: {
|
|
|
|
'content-type': contentTypeHeader ? contentTypeHeader.value : ''
|
|
|
|
}
|
|
|
|
};
|
2017-07-12 21:20:31 +00:00
|
|
|
|
|
|
|
const signature = aws4.sign(awsSignOptions, credentials);
|
|
|
|
|
2017-07-12 21:01:14 +00:00
|
|
|
return Object.keys(signature.headers)
|
2017-07-12 21:20:31 +00:00
|
|
|
.filter(name => name !== 'content-type') // Don't add this because we already have it
|
|
|
|
.map(name => ({name, value: signature.headers[name]}));
|
2017-07-12 21:01:14 +00:00
|
|
|
}
|
|
|
|
|
2017-07-18 20:38:19 +00:00
|
|
|
document.addEventListener('keydown', (e: KeyboardEvent) => {
|
2017-06-09 03:02:16 +00:00
|
|
|
if (e.ctrlKey || e.metaKey || e.altKey) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
lastUserInteraction = Date.now();
|
|
|
|
});
|
2017-07-10 22:34:22 +00:00
|
|
|
|
|
|
|
document.addEventListener('paste', e => {
|
|
|
|
lastUserInteraction = Date.now();
|
|
|
|
});
|