-
Notifications
You must be signed in to change notification settings - Fork 4.1k
Expand file tree
/
Copy pathNetworkTask.zig
More file actions
366 lines (313 loc) · 13.3 KB
/
NetworkTask.zig
File metadata and controls
366 lines (313 loc) · 13.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
unsafe_http_client: AsyncHTTP = undefined,
response: bun.http.HTTPClientResult = .{},
task_id: Task.Id,
url_buf: []const u8 = &[_]u8{},
retried: u16 = 0,
allocator: std.mem.Allocator,
request_buffer: MutableString = undefined,
response_buffer: MutableString = undefined,
package_manager: *PackageManager,
callback: union(Task.Tag) {
package_manifest: struct {
loaded_manifest: ?Npm.PackageManifest = null,
name: strings.StringOrTinyString,
},
extract: ExtractTarball,
git_clone: void,
git_checkout: void,
local_tarball: void,
},
/// Key in patchedDependencies in package.json
apply_patch_task: ?*PatchTask = null,
next: ?*NetworkTask = null,
pub const DedupeMapEntry = struct {
is_required: bool,
};
pub const DedupeMap = std.HashMap(Task.Id, DedupeMapEntry, IdentityContext(Task.Id), 80);
pub fn notify(this: *NetworkTask, async_http: *AsyncHTTP, result: bun.http.HTTPClientResult) void {
defer this.package_manager.wake();
async_http.real.?.* = async_http.*;
async_http.real.?.response_buffer = async_http.response_buffer;
this.response = result;
this.package_manager.async_network_task_queue.push(this);
}
pub const Authorization = enum {
no_authorization,
allow_authorization,
};
// We must use a less restrictive Accept header value
// https://github.com/oven-sh/bun/issues/341
// https://www.jfrog.com/jira/browse/RTFACT-18398
const accept_header_value = "application/vnd.npm.install-v1+json; q=1.0, application/json; q=0.8, */*";
const accept_header_value_unoptimised = "application/json; q=1.0, */*";
const default_headers_buf: string = "Accept" ++ accept_header_value;
const default_headers_buf_unoptimised: string = "Accept" ++ accept_header_value_unoptimised;
fn appendAuth(header_builder: *HeaderBuilder, scope: *const Npm.Registry.Scope) void {
if (scope.token.len > 0) {
header_builder.appendFmt("Authorization", "Bearer {s}", .{scope.token});
} else if (scope.auth.len > 0) {
header_builder.appendFmt("Authorization", "Basic {s}", .{scope.auth});
} else {
return;
}
header_builder.append("npm-auth-type", "legacy");
}
fn countAuth(header_builder: *HeaderBuilder, scope: *const Npm.Registry.Scope) void {
if (scope.token.len > 0) {
header_builder.count("Authorization", "");
header_builder.content.cap += "Bearer ".len + scope.token.len;
} else if (scope.auth.len > 0) {
header_builder.count("Authorization", "");
header_builder.content.cap += "Basic ".len + scope.auth.len;
} else {
return;
}
header_builder.count("npm-auth-type", "legacy");
}
// if this package is likely to have a "libc" field in its package.json.
// npm's optimised response doesn't include it, so we need to use the unoptimised one
fn isPlatformSpecificPackage(name: string) bool {
if (name.len < 5) return false;
const platform_keywords = [_][]const u8{
"musl", "linux", "x64", "aarch64", "glibc", "arm64",
};
if (name[0] == '@') {
if (strings.indexOfChar(name, '/')) |i| {
const scope_and_pkg = name[i + 1 ..];
inline for (platform_keywords) |keyword| {
if (strings.containsComptime(scope_and_pkg, keyword)) {
return true;
}
}
}
} else if (strings.indexOfChar(name, '-')) |i| {
const pkg_name = name[i + 1 ..];
inline for (platform_keywords) |keyword| {
if (strings.containsComptime(pkg_name, keyword)) {
return true;
}
}
}
return false;
}
pub fn forManifest(
this: *NetworkTask,
name: string,
allocator: std.mem.Allocator,
scope: *const Npm.Registry.Scope,
loaded_manifest: ?*const Npm.PackageManifest,
is_optional: bool,
) !void {
this.url_buf = blk: {
// Not all registries support scoped package names when fetching the manifest.
// registry.npmjs.org supports both "@storybook%2Faddons" and "@storybook/addons"
// Other registries like AWS codeartifact only support the former.
// "npm" CLI requests the manifest with the encoded name.
var arena = std.heap.ArenaAllocator.init(bun.default_allocator);
defer arena.deinit();
var stack_fallback_allocator = std.heap.stackFallback(512, arena.allocator());
var encoded_name = name;
if (strings.containsChar(name, '/')) {
encoded_name = try std.mem.replaceOwned(u8, stack_fallback_allocator.get(), name, "/", "%2f");
}
const tmp = bun.jsc.URL.join(
bun.String.borrowUTF8(scope.url.href),
bun.String.borrowUTF8(encoded_name),
);
defer tmp.deref();
if (tmp.tag == .Dead) {
if (!is_optional) {
this.package_manager.log.addErrorFmt(
null,
logger.Loc.Empty,
allocator,
"Failed to join registry {} and package {} URLs",
.{ bun.fmt.QuotedFormatter{ .text = scope.url.href }, bun.fmt.QuotedFormatter{ .text = name } },
) catch bun.outOfMemory();
} else {
this.package_manager.log.addWarningFmt(
null,
logger.Loc.Empty,
allocator,
"Failed to join registry {} and package {} URLs",
.{ bun.fmt.QuotedFormatter{ .text = scope.url.href }, bun.fmt.QuotedFormatter{ .text = name } },
) catch bun.outOfMemory();
}
return error.InvalidURL;
}
if (!(tmp.hasPrefixComptime("https://") or tmp.hasPrefixComptime("http://"))) {
if (!is_optional) {
this.package_manager.log.addErrorFmt(
null,
logger.Loc.Empty,
allocator,
"Registry URL must be http:// or https://\nReceived: \"{}\"",
.{tmp},
) catch bun.outOfMemory();
} else {
this.package_manager.log.addWarningFmt(
null,
logger.Loc.Empty,
allocator,
"Registry URL must be http:// or https://\nReceived: \"{}\"",
.{tmp},
) catch bun.outOfMemory();
}
return error.InvalidURL;
}
// This actually duplicates the string! So we defer deref the WTF managed one above.
break :blk try tmp.toOwnedSlice(allocator);
};
var last_modified: string = "";
var etag: string = "";
if (loaded_manifest) |manifest| {
last_modified = manifest.pkg.last_modified.slice(manifest.string_buf);
etag = manifest.pkg.etag.slice(manifest.string_buf);
}
var header_builder = HeaderBuilder{};
countAuth(&header_builder, scope);
if (etag.len != 0) {
header_builder.count("If-None-Match", etag);
}
if (last_modified.len != 0) {
header_builder.count("If-Modified-Since", last_modified);
}
const use_unoptimized = is_optional and isPlatformSpecificPackage(name);
const accept_value = if (use_unoptimized) accept_header_value_unoptimised else accept_header_value;
const accept_buf = if (use_unoptimized) default_headers_buf_unoptimised else default_headers_buf;
if (header_builder.header_count > 0) {
header_builder.count("Accept", accept_value);
if (last_modified.len > 0 and etag.len > 0) {
header_builder.content.count(last_modified);
}
try header_builder.allocate(allocator);
appendAuth(&header_builder, scope);
if (etag.len != 0) {
header_builder.append("If-None-Match", etag);
} else if (last_modified.len != 0) {
header_builder.append("If-Modified-Since", last_modified);
}
header_builder.append("Accept", accept_value);
if (last_modified.len > 0 and etag.len > 0) {
last_modified = header_builder.content.append(last_modified);
}
} else {
try header_builder.entries.append(
allocator,
.{
.name = .{ .offset = 0, .length = @as(u32, @truncate("Accept".len)) },
.value = .{ .offset = "Accept".len, .length = @as(u32, @truncate(accept_buf.len - "Accept".len)) },
},
);
header_builder.header_count = 1;
header_builder.content = GlobalStringBuilder{ .ptr = @as([*]u8, @ptrFromInt(@intFromPtr(bun.span(accept_buf).ptr))), .len = accept_buf.len, .cap = accept_buf.len };
}
this.response_buffer = try MutableString.init(allocator, 0);
this.allocator = allocator;
const url = URL.parse(this.url_buf);
this.unsafe_http_client = AsyncHTTP.init(allocator, .GET, url, header_builder.entries, header_builder.content.ptr.?[0..header_builder.content.len], &this.response_buffer, "", this.getCompletionCallback(), HTTP.FetchRedirect.follow, .{
.http_proxy = this.package_manager.httpProxy(url),
});
this.unsafe_http_client.client.flags.reject_unauthorized = this.package_manager.tlsRejectUnauthorized();
if (PackageManager.verbose_install) {
this.unsafe_http_client.client.verbose = .headers;
}
this.callback = .{
.package_manifest = .{
.name = try strings.StringOrTinyString.initAppendIfNeeded(name, *FileSystem.FilenameStore, FileSystem.FilenameStore.instance),
.loaded_manifest = if (loaded_manifest) |manifest| manifest.* else null,
},
};
if (PackageManager.verbose_install) {
this.unsafe_http_client.verbose = .headers;
this.unsafe_http_client.client.verbose = .headers;
}
// Incase the ETag causes invalidation, we fallback to the last modified date.
if (last_modified.len != 0 and bun.getRuntimeFeatureFlag(.BUN_FEATURE_FLAG_LAST_MODIFIED_PRETEND_304)) {
this.unsafe_http_client.client.flags.force_last_modified = true;
this.unsafe_http_client.client.if_modified_since = last_modified;
}
}
pub fn getCompletionCallback(this: *NetworkTask) HTTP.HTTPClientResult.Callback {
return HTTP.HTTPClientResult.Callback.New(*NetworkTask, notify).init(this);
}
pub fn schedule(this: *NetworkTask, batch: *ThreadPool.Batch) void {
this.unsafe_http_client.schedule(this.allocator, batch);
}
pub const ForTarballError = OOM || error{
InvalidURL,
};
pub fn forTarball(
this: *NetworkTask,
allocator: std.mem.Allocator,
tarball_: *const ExtractTarball,
scope: *const Npm.Registry.Scope,
authorization: NetworkTask.Authorization,
) ForTarballError!void {
this.callback = .{ .extract = tarball_.* };
const tarball = &this.callback.extract;
const tarball_url = tarball.url.slice();
if (tarball_url.len == 0) {
this.url_buf = try ExtractTarball.buildURL(
scope.url.href,
tarball.name,
tarball.resolution.value.npm.version,
this.package_manager.lockfile.buffers.string_bytes.items,
);
} else {
this.url_buf = tarball_url;
}
if (!(strings.hasPrefixComptime(this.url_buf, "https://") or strings.hasPrefixComptime(this.url_buf, "http://"))) {
const msg = .{
.fmt = "Expected tarball URL to start with https:// or http://, got {} while fetching package {}",
.args = .{ bun.fmt.QuotedFormatter{ .text = this.url_buf }, bun.fmt.QuotedFormatter{ .text = tarball.name.slice() } },
};
try this.package_manager.log.addErrorFmt(null, .{}, allocator, msg.fmt, msg.args);
return error.InvalidURL;
}
this.response_buffer = MutableString.initEmpty(allocator);
this.allocator = allocator;
var header_builder = HeaderBuilder{};
var header_buf: string = "";
if (authorization == .allow_authorization) {
countAuth(&header_builder, scope);
}
if (header_builder.header_count > 0) {
try header_builder.allocate(allocator);
if (authorization == .allow_authorization) {
appendAuth(&header_builder, scope);
}
header_buf = header_builder.content.ptr.?[0..header_builder.content.len];
}
const url = URL.parse(this.url_buf);
this.unsafe_http_client = AsyncHTTP.init(allocator, .GET, url, header_builder.entries, header_buf, &this.response_buffer, "", this.getCompletionCallback(), HTTP.FetchRedirect.follow, .{
.http_proxy = this.package_manager.httpProxy(url),
});
this.unsafe_http_client.client.flags.reject_unauthorized = this.package_manager.tlsRejectUnauthorized();
if (PackageManager.verbose_install) {
this.unsafe_http_client.client.verbose = .headers;
}
}
const string = []const u8;
const std = @import("std");
const install = @import("./install.zig");
const ExtractTarball = install.ExtractTarball;
const NetworkTask = install.NetworkTask;
const Npm = install.Npm;
const PackageManager = install.PackageManager;
const PatchTask = install.PatchTask;
const Task = install.Task;
const bun = @import("bun");
const GlobalStringBuilder = bun.StringBuilder;
const IdentityContext = bun.IdentityContext;
const MutableString = bun.MutableString;
const OOM = bun.OOM;
const ThreadPool = bun.ThreadPool;
const URL = bun.URL;
const logger = bun.logger;
const strings = bun.strings;
const Fs = bun.fs;
const FileSystem = Fs.FileSystem;
const HTTP = bun.http;
const AsyncHTTP = HTTP.AsyncHTTP;
const HeaderBuilder = HTTP.HeaderBuilder;