2012-08-07 18:28:07 +08:00
|
|
|
/****************************************************************************
|
2014-01-07 11:47:11 +08:00
|
|
|
Copyright (c) 2012 greathqy
|
|
|
|
Copyright (c) 2012 cocos2d-x.org
|
2018-01-29 16:25:32 +08:00
|
|
|
Copyright (c) 2013-2016 Chukong Technologies Inc.
|
|
|
|
Copyright (c) 2017-2018 Xiamen Yaji Software Co., Ltd.
|
2021-06-24 12:33:07 +08:00
|
|
|
Copyright (c) 2021 Bytedance Inc.
|
2021-07-06 02:44:57 +08:00
|
|
|
|
2021-06-25 08:18:32 +08:00
|
|
|
https://adxe.org
|
2021-07-06 02:44:57 +08:00
|
|
|
|
2012-08-07 18:28:07 +08:00
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
of this software and associated documentation files (the "Software"), to deal
|
|
|
|
in the Software without restriction, including without limitation the rights
|
|
|
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
copies of the Software, and to permit persons to whom the Software is
|
|
|
|
furnished to do so, subject to the following conditions:
|
2021-07-06 02:44:57 +08:00
|
|
|
|
2012-08-07 18:28:07 +08:00
|
|
|
The above copyright notice and this permission notice shall be included in
|
|
|
|
all copies or substantial portions of the Software.
|
2021-07-06 02:44:57 +08:00
|
|
|
|
2012-08-07 18:28:07 +08:00
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
THE SOFTWARE.
|
|
|
|
****************************************************************************/
|
|
|
|
|
2016-03-20 21:53:44 +08:00
|
|
|
#include "network/HttpClient.h"
|
2012-08-07 18:28:07 +08:00
|
|
|
#include <errno.h>
|
2021-06-24 12:33:07 +08:00
|
|
|
#include "base/ccUtils.h"
|
2014-04-30 08:37:36 +08:00
|
|
|
#include "base/CCDirector.h"
|
2014-05-17 05:36:00 +08:00
|
|
|
#include "platform/CCFileUtils.h"
|
2021-06-24 12:33:07 +08:00
|
|
|
#include "yasio/yasio.hpp"
|
|
|
|
#include "yasio/obstream.hpp"
|
|
|
|
|
|
|
|
using namespace yasio;
|
2013-07-10 11:37:39 +08:00
|
|
|
|
2014-01-02 16:25:35 +08:00
|
|
|
NS_CC_BEGIN
|
2013-10-15 18:00:03 +08:00
|
|
|
|
|
|
|
namespace network {
|
2012-08-07 18:28:07 +08:00
|
|
|
|
2015-05-22 10:47:52 +08:00
|
|
|
static HttpClient* _httpClient = nullptr; // pointer to singleton
|
2012-08-07 18:28:07 +08:00
|
|
|
|
2021-07-06 02:44:57 +08:00
|
|
|
template <typename _Cont, typename _Fty>
|
2021-06-24 12:33:07 +08:00
|
|
|
static void __clearQueueUnsafe(_Cont& queue, _Fty pred) {
|
2021-07-06 02:44:57 +08:00
|
|
|
for (auto it = queue.unsafe_begin(); it != queue.unsafe_end();) {
|
|
|
|
if (!pred || pred((*it))) {
|
2020-10-05 02:40:38 +08:00
|
|
|
(*it)->release();
|
2021-06-24 12:33:07 +08:00
|
|
|
it = queue.unsafe_erase(it);
|
2021-07-06 02:44:57 +08:00
|
|
|
} else {
|
2020-10-05 02:40:38 +08:00
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:28:07 +08:00
|
|
|
// HttpClient implementation
|
2021-07-06 02:44:57 +08:00
|
|
|
HttpClient* HttpClient::getInstance() {
|
|
|
|
if (_httpClient == nullptr) {
|
2015-05-22 10:47:52 +08:00
|
|
|
_httpClient = new (std::nothrow) HttpClient();
|
2012-08-07 18:28:07 +08:00
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
|
2015-05-22 10:47:52 +08:00
|
|
|
return _httpClient;
|
2012-08-07 18:28:07 +08:00
|
|
|
}
|
|
|
|
|
2021-07-06 02:44:57 +08:00
|
|
|
void HttpClient::destroyInstance() {
|
|
|
|
if (nullptr == _httpClient) {
|
2017-03-16 14:09:51 +08:00
|
|
|
CCLOG("HttpClient singleton is nullptr");
|
|
|
|
return;
|
|
|
|
}
|
2015-05-22 10:47:52 +08:00
|
|
|
|
2017-03-16 14:09:51 +08:00
|
|
|
CCLOG("HttpClient::destroyInstance begin");
|
2021-06-24 12:33:07 +08:00
|
|
|
delete _httpClient;
|
2017-03-16 14:09:51 +08:00
|
|
|
_httpClient = nullptr;
|
2015-05-22 10:47:52 +08:00
|
|
|
|
2017-03-16 14:09:51 +08:00
|
|
|
CCLOG("HttpClient::destroyInstance() finished!");
|
2012-08-07 18:28:07 +08:00
|
|
|
}
|
|
|
|
|
2021-07-06 02:44:57 +08:00
|
|
|
void HttpClient::enableCookies(const char* cookieFile) {
|
2020-10-08 00:00:14 +08:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(_cookieFileMutex);
|
2021-07-06 02:44:57 +08:00
|
|
|
if (cookieFile) {
|
2021-07-19 00:17:50 +08:00
|
|
|
_cookieFilename = cookieFile;
|
2021-07-06 02:44:57 +08:00
|
|
|
} else {
|
2021-04-25 15:22:43 +08:00
|
|
|
_cookieFilename = (FileUtils::getInstance()->getNativeWritableAbsolutePath() + "cookieFile.txt");
|
2013-07-10 11:37:39 +08:00
|
|
|
}
|
2021-07-19 12:26:25 +08:00
|
|
|
|
|
|
|
if (!_cookie)
|
|
|
|
_cookie = new HttpCookie();
|
|
|
|
_cookie->setCookieFileName(_cookieFilename);
|
|
|
|
_cookie->readFile();
|
2013-07-10 11:37:39 +08:00
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
|
|
|
|
void HttpClient::setSSLVerification(const std::string& caFile) {
|
2020-10-08 00:00:14 +08:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(_sslCaFileMutex);
|
2015-05-22 10:47:52 +08:00
|
|
|
_sslCaFilename = caFile;
|
2021-06-24 12:33:07 +08:00
|
|
|
_service->set_option(yasio::YOPT_S_SSL_CACERT, _sslCaFilename.c_str());
|
2014-09-13 18:54:29 +08:00
|
|
|
}
|
2013-07-10 11:37:39 +08:00
|
|
|
|
2013-06-20 14:15:53 +08:00
|
|
|
HttpClient::HttpClient()
|
2021-07-19 00:17:50 +08:00
|
|
|
: _isInited(false)
|
|
|
|
, _dispatchOnWorkThread(false)
|
|
|
|
, _timeoutForConnect(30)
|
|
|
|
, _timeoutForRead(60)
|
|
|
|
, _cookie(nullptr)
|
|
|
|
, _clearResponsePredicate(nullptr)
|
|
|
|
{
|
2017-03-16 14:09:51 +08:00
|
|
|
CCLOG("In the constructor of HttpClient!");
|
|
|
|
_scheduler = Director::getInstance()->getScheduler();
|
2021-06-24 12:33:07 +08:00
|
|
|
|
|
|
|
_service = new yasio::io_service(HttpClient::MAX_CHANNELS);
|
|
|
|
_service->set_option(yasio::YOPT_S_DEFERRED_EVENT, 0);
|
2021-07-31 14:39:42 +08:00
|
|
|
_service->set_option(yasio::YOPT_S_DNS_QUERIES_TIMEOUT, 3);
|
|
|
|
_service->set_option(yasio::YOPT_S_DNS_QUERIES_TRIES, 1);
|
2021-06-24 12:33:07 +08:00
|
|
|
_service->start([=](yasio::event_ptr&& e) { handleNetworkEvent(e.get()); });
|
|
|
|
|
|
|
|
for (int i = 0; i < HttpClient::MAX_CHANNELS; ++i) {
|
2021-08-03 14:41:30 +08:00
|
|
|
_availChannelQueue.unsafe_push_back(i);
|
2021-06-24 12:33:07 +08:00
|
|
|
}
|
|
|
|
|
2021-07-19 13:43:59 +08:00
|
|
|
_scheduler->schedule([=](float) { dispatchResponseCallbacks(); }, this, 0, false, "#");
|
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
_isInited = true;
|
2012-08-07 18:28:07 +08:00
|
|
|
}
|
|
|
|
|
2021-07-06 02:44:57 +08:00
|
|
|
HttpClient::~HttpClient() {
|
2021-07-19 13:43:59 +08:00
|
|
|
_scheduler->unscheduleAllForTarget(this);
|
|
|
|
|
|
|
|
clearPendingResponseQueue();
|
|
|
|
clearFinishedResponseQueue();
|
2021-07-19 12:26:25 +08:00
|
|
|
if (_cookie) {
|
|
|
|
_cookie->writeFile();
|
|
|
|
delete _cookie;
|
|
|
|
}
|
2021-06-24 12:33:07 +08:00
|
|
|
delete _service;
|
2017-03-16 14:09:51 +08:00
|
|
|
CCLOG("HttpClient destructor");
|
2012-08-07 18:28:07 +08:00
|
|
|
}
|
|
|
|
|
2021-07-19 13:43:59 +08:00
|
|
|
void HttpClient::setDispatchOnWorkThread(bool bVal)
|
|
|
|
{
|
|
|
|
_scheduler->unscheduleAllForTarget(this);
|
|
|
|
_dispatchOnWorkThread = bVal;
|
|
|
|
if(!bVal)
|
|
|
|
_scheduler->schedule([=](float) { dispatchResponseCallbacks(); }, this, 0, false, "#");
|
|
|
|
}
|
|
|
|
|
2021-07-31 14:39:42 +08:00
|
|
|
void HttpClient::handleNetworkStatusChanged()
|
|
|
|
{
|
|
|
|
_service->set_option(YOPT_S_DNS_DIRTY, 1);
|
|
|
|
}
|
|
|
|
|
2021-09-05 22:18:42 +08:00
|
|
|
yasio::io_service* HttpClient::getInternalService()
|
|
|
|
{
|
|
|
|
return _service;
|
|
|
|
}
|
|
|
|
|
2021-07-06 02:44:57 +08:00
|
|
|
bool HttpClient::send(HttpRequest* request) {
|
2012-08-07 18:28:07 +08:00
|
|
|
if (!request)
|
2021-06-24 12:33:07 +08:00
|
|
|
return false;
|
2015-05-22 10:47:52 +08:00
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
auto response = new HttpResponse(request);
|
|
|
|
processResponse(response, request->getUrl());
|
|
|
|
response->release();
|
|
|
|
return true;
|
2012-08-07 18:28:07 +08:00
|
|
|
}
|
|
|
|
|
2021-07-06 02:57:13 +08:00
|
|
|
HttpResponse* HttpClient::sendSync(HttpRequest* request) {
|
|
|
|
request->setSync(true);
|
|
|
|
if (this->send(request))
|
|
|
|
return request->wait();
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
int HttpClient::tryTakeAvailChannel() {
|
|
|
|
auto lck = _availChannelQueue.get_lock();
|
|
|
|
if (!_availChannelQueue.empty()) {
|
|
|
|
int channel = _availChannelQueue.front();
|
|
|
|
_availChannelQueue.pop_front();
|
|
|
|
return channel;
|
2014-05-21 10:44:07 +08:00
|
|
|
}
|
2021-06-24 12:33:07 +08:00
|
|
|
return -1;
|
2014-05-20 20:08:26 +08:00
|
|
|
}
|
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
void HttpClient::processResponse(HttpResponse* response, const std::string& url) {
|
|
|
|
auto channelIndex = tryTakeAvailChannel();
|
|
|
|
response->retain();
|
|
|
|
|
|
|
|
if (channelIndex != -1) {
|
|
|
|
if (response->prepareForProcess(url)) {
|
2021-07-06 02:44:57 +08:00
|
|
|
response->_responseHeaders.clear(); // redirect needs clear old response headers
|
|
|
|
auto& requestUri = response->getRequestUri();
|
|
|
|
auto channelHandle = _service->channel_at(channelIndex);
|
2021-06-24 12:33:07 +08:00
|
|
|
channelHandle->ud_.ptr = response;
|
2021-07-06 02:44:57 +08:00
|
|
|
_service->set_option(
|
|
|
|
YOPT_C_REMOTE_ENDPOINT, channelIndex, requestUri.getHost().c_str(), (int) requestUri.getPort());
|
2021-06-24 12:33:07 +08:00
|
|
|
if (requestUri.isSecure())
|
|
|
|
_service->open(channelIndex, YCK_SSL_CLIENT);
|
|
|
|
else
|
|
|
|
_service->open(channelIndex, YCK_TCP_CLIENT);
|
|
|
|
} else {
|
|
|
|
finishResponse(response);
|
2012-08-07 18:28:07 +08:00
|
|
|
}
|
2021-06-24 12:33:07 +08:00
|
|
|
} else {
|
2021-07-19 13:43:59 +08:00
|
|
|
_pendingResponseQueue.push_back(response);
|
2012-08-07 18:28:07 +08:00
|
|
|
}
|
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
void HttpClient::handleNetworkEvent(yasio::io_event* event) {
|
2021-07-06 02:44:57 +08:00
|
|
|
int channelIndex = event->cindex();
|
|
|
|
auto channel = _service->channel_at(event->cindex());
|
2021-06-24 12:33:07 +08:00
|
|
|
HttpResponse* response = (HttpResponse*) channel->ud_.ptr;
|
|
|
|
if (!response)
|
|
|
|
return;
|
2012-08-07 18:28:07 +08:00
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
bool responseFinished = response->isFinished();
|
|
|
|
switch (event->kind()) {
|
|
|
|
case YEK_ON_PACKET:
|
|
|
|
if (!responseFinished)
|
|
|
|
response->handleInput(event->packet());
|
2017-03-16 14:09:51 +08:00
|
|
|
|
2021-06-25 18:29:16 +08:00
|
|
|
if (response->isFinished()) {
|
|
|
|
response->updateInternalCode(yasio::errc::eof);
|
2021-06-24 12:33:07 +08:00
|
|
|
_service->close(event->cindex());
|
2021-06-25 18:29:16 +08:00
|
|
|
}
|
2017-03-16 14:09:51 +08:00
|
|
|
break;
|
2021-06-24 12:33:07 +08:00
|
|
|
case YEK_ON_OPEN:
|
|
|
|
if (event->status() == 0) {
|
|
|
|
obstream obs;
|
2021-06-25 08:18:32 +08:00
|
|
|
bool usePostData = false;
|
2021-07-06 02:44:57 +08:00
|
|
|
auto request = response->getHttpRequest();
|
|
|
|
switch (request->getRequestType()) {
|
2021-06-24 12:33:07 +08:00
|
|
|
case HttpRequest::Type::GET:
|
|
|
|
obs.write_bytes("GET");
|
|
|
|
break;
|
|
|
|
case HttpRequest::Type::POST:
|
|
|
|
obs.write_bytes("POST");
|
2021-06-25 07:07:59 +08:00
|
|
|
usePostData = true;
|
2021-06-24 12:33:07 +08:00
|
|
|
break;
|
|
|
|
case HttpRequest::Type::DELETE:
|
|
|
|
obs.write_bytes("DELETE");
|
|
|
|
break;
|
|
|
|
case HttpRequest::Type::PUT:
|
|
|
|
obs.write_bytes("PUT");
|
2021-06-25 07:07:59 +08:00
|
|
|
usePostData = true;
|
2021-06-24 12:33:07 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
obs.write_bytes("GET");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
obs.write_bytes(" ");
|
2021-06-25 07:07:59 +08:00
|
|
|
|
|
|
|
auto& uri = response->getRequestUri();
|
2021-06-24 12:33:07 +08:00
|
|
|
obs.write_bytes(uri.getPath());
|
2021-06-25 07:07:59 +08:00
|
|
|
if (!usePostData) {
|
2021-06-24 12:33:07 +08:00
|
|
|
auto& query = uri.getQuery();
|
|
|
|
if (!query.empty()) {
|
|
|
|
obs.write_byte('?');
|
2021-06-25 07:07:59 +08:00
|
|
|
obs.write_bytes(query);
|
2021-06-24 12:33:07 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
obs.write_bytes(" HTTP/1.1\r\n");
|
|
|
|
|
|
|
|
obs.write_bytes("Host: ");
|
|
|
|
obs.write_bytes(uri.getHost());
|
|
|
|
obs.write_bytes("\r\n");
|
|
|
|
|
2021-08-05 14:56:40 +08:00
|
|
|
// process custom headers
|
|
|
|
struct HeaderFlag {
|
|
|
|
enum {
|
|
|
|
UESR_AGENT = 1,
|
|
|
|
CONTENT_TYPE = 1 << 1,
|
|
|
|
ACCEPT = 1 << 2,
|
|
|
|
};
|
|
|
|
};
|
|
|
|
int headerFlags = 0;
|
2021-06-24 12:33:07 +08:00
|
|
|
auto& headers = request->getHeaders();
|
2021-07-06 02:44:57 +08:00
|
|
|
if (!headers.empty()) {
|
2021-07-05 14:24:04 +08:00
|
|
|
using namespace cxx17; // for string_view literal
|
|
|
|
for (auto& header : headers) {
|
2021-06-24 12:33:07 +08:00
|
|
|
obs.write_bytes(header);
|
|
|
|
obs.write_bytes("\r\n");
|
2021-07-05 20:42:22 +08:00
|
|
|
|
|
|
|
if (cxx20::ic::starts_with(cxx17::string_view{header}, "User-Agent:"_sv))
|
2021-08-05 14:56:40 +08:00
|
|
|
headerFlags |= HeaderFlag::UESR_AGENT;
|
2021-07-05 20:42:22 +08:00
|
|
|
else if (cxx20::ic::starts_with(cxx17::string_view{header}, "Content-Type:"_sv))
|
2021-08-05 14:56:40 +08:00
|
|
|
headerFlags |= HeaderFlag::CONTENT_TYPE;
|
|
|
|
else if (cxx20::ic::starts_with(cxx17::string_view{header}, "Accept:"_sv))
|
|
|
|
headerFlags |= HeaderFlag::ACCEPT;
|
2021-06-24 12:33:07 +08:00
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
}
|
|
|
|
|
2021-08-05 14:56:40 +08:00
|
|
|
if (_cookie) {
|
2021-07-19 12:26:25 +08:00
|
|
|
auto cookies = _cookie->checkAndGetFormatedMatchCookies(uri);
|
|
|
|
if (!cookies.empty())
|
|
|
|
{
|
|
|
|
obs.write_bytes("Cookie: ");
|
|
|
|
obs.write_bytes(cookies);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-05 14:56:40 +08:00
|
|
|
if (!(headerFlags & HeaderFlag::UESR_AGENT))
|
|
|
|
obs.write_bytes("User-Agent: yasio-http\r\n");
|
|
|
|
|
|
|
|
if (!(headerFlags & HeaderFlag::ACCEPT))
|
|
|
|
obs.write_bytes("Accept: */*;q=0.8\r\n");
|
2021-06-25 07:07:59 +08:00
|
|
|
|
|
|
|
if (usePostData) {
|
2021-08-05 14:56:40 +08:00
|
|
|
if (!(headerFlags & HeaderFlag::CONTENT_TYPE))
|
2021-07-05 14:24:04 +08:00
|
|
|
obs.write_bytes("Content-Type: application/x-www-form-urlencoded;charset=UTF-8\r\n");
|
2021-06-25 07:07:59 +08:00
|
|
|
|
|
|
|
char strContentLength[128] = {0};
|
|
|
|
auto requestData = request->getRequestData();
|
|
|
|
auto requestDataSize = request->getRequestDataSize();
|
|
|
|
sprintf(strContentLength, "Content-Length: %d\r\n\r\n", static_cast<int>(requestDataSize));
|
|
|
|
obs.write_bytes(strContentLength);
|
2017-03-16 14:09:51 +08:00
|
|
|
|
2021-06-25 07:07:59 +08:00
|
|
|
if (requestData && requestDataSize > 0)
|
|
|
|
obs.write_bytes(cxx17::string_view{requestData, static_cast<size_t>(requestDataSize)});
|
|
|
|
} else {
|
|
|
|
obs.write_bytes("\r\n");
|
2021-06-24 12:33:07 +08:00
|
|
|
}
|
2017-03-16 14:09:51 +08:00
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
_service->write(event->transport(), std::move(obs.buffer()));
|
|
|
|
|
|
|
|
auto& timerForRead = channel->get_user_timer();
|
|
|
|
timerForRead.cancel(*_service);
|
|
|
|
timerForRead.expires_from_now(std::chrono::seconds(this->_timeoutForRead));
|
|
|
|
timerForRead.async_wait(*_service, [=](io_service& s) {
|
2021-06-25 18:29:16 +08:00
|
|
|
response->updateInternalCode(yasio::errc::read_timeout);
|
2021-06-24 12:33:07 +08:00
|
|
|
s.close(channelIndex); // timeout
|
|
|
|
return true;
|
2021-07-06 02:44:57 +08:00
|
|
|
});
|
2021-06-24 12:33:07 +08:00
|
|
|
} else {
|
2021-06-25 18:29:16 +08:00
|
|
|
handleNetworkEOF(response, channel, event->status());
|
2021-06-24 12:33:07 +08:00
|
|
|
}
|
2017-03-16 14:09:51 +08:00
|
|
|
break;
|
2021-06-24 12:33:07 +08:00
|
|
|
case YEK_ON_CLOSE:
|
2021-06-25 18:29:16 +08:00
|
|
|
handleNetworkEOF(response, channel, event->status());
|
2017-03-16 14:09:51 +08:00
|
|
|
break;
|
|
|
|
}
|
2021-06-24 12:33:07 +08:00
|
|
|
}
|
2017-03-16 14:09:51 +08:00
|
|
|
|
2021-06-25 18:29:16 +08:00
|
|
|
void HttpClient::handleNetworkEOF(HttpResponse* response, yasio::io_channel* channel, int internalErrorCode) {
|
2021-06-24 12:33:07 +08:00
|
|
|
channel->get_user_timer().cancel(*_service);
|
2021-06-25 18:29:16 +08:00
|
|
|
response->updateInternalCode(internalErrorCode);
|
2021-06-24 12:33:07 +08:00
|
|
|
auto responseCode = response->getResponseCode();
|
|
|
|
switch (responseCode) {
|
|
|
|
case 301:
|
|
|
|
case 302:
|
2021-07-19 00:17:50 +08:00
|
|
|
case 307:
|
2021-06-24 12:33:07 +08:00
|
|
|
if (response->increaseRedirectCount() < HttpClient::MAX_REDIRECT_COUNT) {
|
2021-07-19 08:04:12 +08:00
|
|
|
auto iter = response->_responseHeaders.find("location");
|
2021-06-24 12:33:07 +08:00
|
|
|
if (iter != response->_responseHeaders.end()) {
|
2021-07-19 00:17:50 +08:00
|
|
|
if (responseCode == 302)
|
|
|
|
response->getHttpRequest()->setRequestType(HttpRequest::Type::GET);
|
|
|
|
CCLOG("Process url redirect (%d): %s", responseCode, iter->second.c_str());
|
2021-08-03 14:41:30 +08:00
|
|
|
_availChannelQueue.push_front(channel->index());
|
2021-06-24 12:33:07 +08:00
|
|
|
processResponse(response, iter->second);
|
|
|
|
response->release();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2017-03-16 14:09:51 +08:00
|
|
|
}
|
2021-06-24 12:33:07 +08:00
|
|
|
|
|
|
|
finishResponse(response);
|
|
|
|
|
|
|
|
// recycle channel
|
2021-08-31 15:53:46 +08:00
|
|
|
channel->ud_.ptr = nullptr;
|
2021-08-03 14:41:30 +08:00
|
|
|
_availChannelQueue.push_front(channel->index());
|
2021-06-24 12:33:07 +08:00
|
|
|
|
|
|
|
// try process pending response
|
2021-07-19 13:43:59 +08:00
|
|
|
auto lck = _pendingResponseQueue.get_lock();
|
|
|
|
if (!_pendingResponseQueue.unsafe_empty())
|
|
|
|
{
|
|
|
|
auto pendingResponse = _pendingResponseQueue.unsafe_front();
|
|
|
|
_pendingResponseQueue.unsafe_pop_front();
|
2021-06-24 12:33:07 +08:00
|
|
|
lck.unlock();
|
|
|
|
|
|
|
|
processResponse(pendingResponse, pendingResponse->getHttpRequest()->getUrl());
|
|
|
|
pendingResponse->release();
|
2017-03-16 14:09:51 +08:00
|
|
|
}
|
2015-05-22 10:47:52 +08:00
|
|
|
}
|
|
|
|
|
2021-07-19 13:43:59 +08:00
|
|
|
// Poll and notify main thread if responses exists in queue
|
|
|
|
void HttpClient::dispatchResponseCallbacks()
|
|
|
|
{
|
|
|
|
if (_finishedResponseQueue.unsafe_empty())
|
|
|
|
return;
|
|
|
|
|
2021-07-19 14:49:38 +08:00
|
|
|
auto CC_UNUSED lck = _finishedResponseQueue.get_lock();
|
2021-07-19 13:43:59 +08:00
|
|
|
if (!_finishedResponseQueue.unsafe_empty())
|
|
|
|
{
|
|
|
|
HttpResponse* response = _finishedResponseQueue.front();
|
|
|
|
_finishedResponseQueue.pop_front();
|
|
|
|
invokeResposneCallbackAndRelease(response);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
void HttpClient::finishResponse(HttpResponse* response) {
|
2021-07-06 02:57:13 +08:00
|
|
|
auto request = response->getHttpRequest();
|
|
|
|
auto syncState = request->getSyncState();
|
2021-07-19 12:26:25 +08:00
|
|
|
|
|
|
|
if (_cookie) {
|
|
|
|
auto cookieRange = response->getResponseHeaders().equal_range("set-cookie");
|
|
|
|
for (auto cookieIt = cookieRange.first; cookieIt != cookieRange.second; ++cookieIt)
|
|
|
|
_cookie->updateOrAddCookie(cookieIt->second, response->_requestUri);
|
|
|
|
}
|
|
|
|
|
2021-07-06 02:57:13 +08:00
|
|
|
if (!syncState) {
|
|
|
|
if (_dispatchOnWorkThread || std::this_thread::get_id() == Director::getInstance()->getCocos2dThreadId())
|
2021-07-19 13:43:59 +08:00
|
|
|
invokeResposneCallbackAndRelease(response);
|
2021-07-06 02:57:13 +08:00
|
|
|
else
|
2021-07-19 13:43:59 +08:00
|
|
|
_finishedResponseQueue.push_back(response);
|
2021-07-06 02:57:13 +08:00
|
|
|
} else {
|
|
|
|
syncState->set_value(response);
|
|
|
|
}
|
2021-06-24 12:33:07 +08:00
|
|
|
}
|
2021-07-06 02:57:13 +08:00
|
|
|
|
2021-07-19 13:43:59 +08:00
|
|
|
void HttpClient::invokeResposneCallbackAndRelease(HttpResponse* response)
|
|
|
|
{
|
|
|
|
HttpRequest* request = response->getHttpRequest();
|
|
|
|
const ccHttpRequestCallback& callback = request->getCallback();
|
|
|
|
Ref* pTarget = request->getTarget();
|
|
|
|
SEL_HttpResponse pSelector = request->getSelector();
|
|
|
|
|
|
|
|
if (callback != nullptr)
|
|
|
|
callback(this, response);
|
|
|
|
else if (pTarget && pSelector)
|
|
|
|
(pTarget->*pSelector)(this, response);
|
|
|
|
|
|
|
|
response->release();
|
|
|
|
}
|
|
|
|
|
2021-06-24 12:33:07 +08:00
|
|
|
void HttpClient::clearResponseQueue() {
|
2021-07-19 13:43:59 +08:00
|
|
|
clearPendingResponseQueue();
|
|
|
|
clearFinishedResponseQueue();
|
|
|
|
}
|
|
|
|
|
|
|
|
void HttpClient::clearPendingResponseQueue()
|
|
|
|
{
|
2021-07-19 14:49:38 +08:00
|
|
|
auto CC_UNUSED lck = _pendingResponseQueue.get_lock();
|
2021-07-19 13:43:59 +08:00
|
|
|
__clearQueueUnsafe(_pendingResponseQueue, ClearResponsePredicate{});
|
|
|
|
}
|
|
|
|
|
|
|
|
void HttpClient::clearFinishedResponseQueue() {
|
2021-07-19 14:49:38 +08:00
|
|
|
auto CC_UNUSED lck = _finishedResponseQueue.get_lock();
|
2021-07-19 13:43:59 +08:00
|
|
|
__clearQueueUnsafe(_finishedResponseQueue, ClearResponsePredicate{});
|
2015-05-22 10:47:52 +08:00
|
|
|
}
|
|
|
|
|
2021-07-06 02:44:57 +08:00
|
|
|
void HttpClient::setTimeoutForConnect(int value) {
|
2020-10-08 00:00:14 +08:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(_timeoutForConnectMutex);
|
2015-05-22 10:47:52 +08:00
|
|
|
_timeoutForConnect = value;
|
2021-06-24 12:33:07 +08:00
|
|
|
_service->set_option(YOPT_S_CONNECT_TIMEOUT, value);
|
2015-05-22 10:47:52 +08:00
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
|
|
|
|
int HttpClient::getTimeoutForConnect() {
|
2020-10-08 00:00:14 +08:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(_timeoutForConnectMutex);
|
2015-05-22 10:47:52 +08:00
|
|
|
return _timeoutForConnect;
|
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
|
|
|
|
void HttpClient::setTimeoutForRead(int value) {
|
2020-10-08 00:00:14 +08:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(_timeoutForReadMutex);
|
2015-05-22 10:47:52 +08:00
|
|
|
_timeoutForRead = value;
|
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
|
|
|
|
int HttpClient::getTimeoutForRead() {
|
2020-10-08 00:00:14 +08:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(_timeoutForReadMutex);
|
2015-05-22 10:47:52 +08:00
|
|
|
return _timeoutForRead;
|
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
|
|
|
|
const std::string& HttpClient::getCookieFilename() {
|
2020-10-08 00:00:14 +08:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(_cookieFileMutex);
|
2015-05-22 10:47:52 +08:00
|
|
|
return _cookieFilename;
|
|
|
|
}
|
2021-07-06 02:44:57 +08:00
|
|
|
|
|
|
|
const std::string& HttpClient::getSSLVerification() {
|
2020-10-08 00:00:14 +08:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(_sslCaFileMutex);
|
2015-05-22 10:47:52 +08:00
|
|
|
return _sslCaFilename;
|
|
|
|
}
|
|
|
|
|
2021-07-06 02:44:57 +08:00
|
|
|
} // namespace network
|
2012-08-07 18:28:07 +08:00
|
|
|
|
2014-01-02 16:25:35 +08:00
|
|
|
NS_CC_END
|