233 lines
7.2 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
require "open3"
2017-08-08 18:10:13 +02:00
def curl_executable
@curl ||= [
ENV["HOMEBREW_CURL"],
which("curl"),
"/usr/bin/curl",
2018-03-17 16:46:44 -07:00
].compact.map { |c| Pathname(c) }.find(&:executable?)
raise "no executable curl was found" unless @curl
2018-09-17 02:45:00 +02:00
@curl
2017-08-08 18:10:13 +02:00
end
2017-08-08 18:10:13 +02:00
def curl_args(*extra_args, show_output: false, user_agent: :default)
2018-07-30 10:11:00 +02:00
args = []
2018-04-08 15:51:58 -07:00
# do not load .curlrc unless requested (must be the first argument)
2020-04-05 15:44:50 +01:00
args << "--disable" unless Homebrew::EnvConfig.curlrc?
2018-04-08 15:51:58 -07:00
2019-10-01 08:38:44 +02:00
args << "--globoff"
2018-04-08 15:51:58 -07:00
args << "--show-error"
2017-08-08 18:10:13 +02:00
args << "--user-agent" << case user_agent
when :browser, :fake
HOMEBREW_USER_AGENT_FAKE_SAFARI
when :default
HOMEBREW_USER_AGENT_CURL
else
2017-08-08 18:10:13 +02:00
user_agent
end
2017-08-08 18:10:13 +02:00
unless show_output
args << "--fail"
args << "--progress-bar" unless Homebrew.args.verbose?
2020-04-05 15:44:50 +01:00
args << "--verbose" if Homebrew::EnvConfig.curl_verbose?
args << "--silent" unless $stdout.tty?
end
2020-04-05 15:44:50 +01:00
args << "--retry" << Homebrew::EnvConfig.curl_retries
2019-05-17 10:14:54 +01:00
2017-08-08 18:10:13 +02:00
args + extra_args
end
def curl(*args, secrets: [], **options)
2017-11-03 18:58:59 +00:00
# SSL_CERT_FILE can be incorrectly set by users or portable-ruby and screw
# with SSL downloads so unset it here.
2018-07-30 10:11:00 +02:00
system_command! curl_executable,
args: curl_args(*args, **options),
2018-08-01 11:15:42 +02:00
print_stdout: true,
env: { "SSL_CERT_FILE" => nil },
secrets: secrets
2017-08-04 16:24:29 +02:00
end
def curl_download(*args, to: nil, partial: true, **options)
destination = Pathname(to)
destination.dirname.mkpath
if partial
range_stdout = curl_output("--location", "--range", "0-1",
"--dump-header", "-",
"--write-out", "%\{http_code}",
"--output", "/dev/null", *args, **options).stdout
headers, _, http_status = range_stdout.partition("\r\n\r\n")
supports_partial_download = http_status.to_i == 206 # Partial Content
if supports_partial_download &&
destination.exist? &&
destination.size == %r{^.*Content-Range: bytes \d+-\d+/(\d+)\r\n.*$}m.match(headers)&.[](1)&.to_i
return # We've already downloaded all the bytes
end
else
supports_partial_download = false
end
continue_at = if destination.exist? && supports_partial_download
"-"
else
0
end
curl("--location", "--remote-time", "--continue-at", continue_at.to_s, "--output", destination, *args, **options)
rescue ErrorDuringExecution => e
# This is a workaround for https://github.com/curl/curl/issues/1618.
raise unless e.status.exitstatus == 56 # Unexpected EOF
raise if args.include?("--http1.1")
out = curl_output("-V").stdout
# If `curl` doesn't support HTTP2, the exception is unrelated to this bug.
raise unless out.include?("HTTP2")
# The bug is fixed in `curl` >= 7.60.0.
curl_version = out[/curl (\d+(\.\d+)+)/, 1]
raise if Gem::Version.new(curl_version) >= Gem::Version.new("7.60.0")
args << "--http1.1"
retry
2017-08-08 18:10:13 +02:00
end
def curl_output(*args, secrets: [], **options)
system_command curl_executable,
2018-11-02 17:18:07 +00:00
args: curl_args(*args, show_output: true, **options),
print_stderr: false,
secrets: secrets
end
def curl_check_http_content(url, user_agents: [:default], check_content: false, strict: false)
return unless url.start_with? "http"
details = nil
user_agent = nil
hash_needed = url.start_with?("http:")
user_agents.each do |ua|
details = curl_http_content_headers_and_checksum(url, hash_needed: hash_needed, user_agent: ua)
user_agent = ua
break if http_status_ok?(details[:status])
end
unless details[:status]
# Hack around https://github.com/Homebrew/brew/issues/3199
return if MacOS.version == :el_capitan
2018-09-17 02:45:00 +02:00
return "The URL #{url} is not reachable"
end
2020-07-24 00:20:28 -04:00
return "#{url} permanently redirects to #{details[:permanent_redirect]}" if url != details[:permanent_redirect]
unless http_status_ok?(details[:status])
return "The URL #{url} is not reachable (HTTP status code #{details[:status]})"
end
2020-04-05 15:44:50 +01:00
if url.start_with?("https://") && Homebrew::EnvConfig.no_insecure_redirect? &&
2018-11-24 01:46:55 +00:00
!details[:final_url].start_with?("https://")
return "The URL #{url} redirects back to HTTP"
end
return unless hash_needed
secure_url = url.sub "http", "https"
secure_details =
curl_http_content_headers_and_checksum(secure_url, hash_needed: true, user_agent: user_agent)
if !http_status_ok?(details[:status]) ||
!http_status_ok?(secure_details[:status])
return
end
etag_match = details[:etag] &&
details[:etag] == secure_details[:etag]
content_length_match =
details[:content_length] &&
details[:content_length] == secure_details[:content_length]
file_match = details[:file_hash] == secure_details[:file_hash]
2018-11-24 01:46:55 +00:00
if (etag_match || content_length_match || file_match) &&
2018-11-24 11:21:52 +00:00
secure_details[:final_url].start_with?("https://") &&
url.start_with?("http://")
return "The URL #{url} should use HTTPS rather than HTTP"
end
return unless check_content
no_protocol_file_contents = %r{https?:\\?/\\?/}
details[:file] = details[:file].gsub(no_protocol_file_contents, "/")
secure_details[:file] = secure_details[:file].gsub(no_protocol_file_contents, "/")
# Check for the same content after removing all protocols
2018-11-24 01:46:55 +00:00
if (details[:file] == secure_details[:file]) &&
2018-11-24 11:21:52 +00:00
secure_details[:final_url].start_with?("https://") &&
url.start_with?("http://")
return "The URL #{url} should use HTTPS rather than HTTP"
end
return unless strict
# Same size, different content after normalization
# (typical causes: Generated ID, Timestamp, Unix time)
if details[:file].length == secure_details[:file].length
return "The URL #{url} may be able to use HTTPS rather than HTTP. Please verify it in a browser."
end
lenratio = (100 * secure_details[:file].length / details[:file].length).to_i
return unless (90..110).cover?(lenratio)
2018-09-17 02:45:00 +02:00
"The URL #{url} may be able to use HTTPS rather than HTTP. Please verify it in a browser."
end
def curl_http_content_headers_and_checksum(url, hash_needed: false, user_agent: :default)
2019-10-29 19:06:57 +01:00
file = Tempfile.new.tap(&:close)
max_time = hash_needed ? "600" : "25"
output, = curl_output(
2019-10-29 19:06:57 +01:00
"--dump-header", "-", "--output", file.path, "--include", "--location",
"--connect-timeout", "15", "--max-time", max_time, url,
user_agent: user_agent
)
status_code = :unknown
while status_code == :unknown || status_code.to_s.start_with?("3")
headers, _, output = output.partition("\r\n\r\n")
2020-06-02 09:49:23 +01:00
status_code = headers[%r{HTTP/.* (\d+)}, 1]
location = headers[/^Location:\s*(.*)$/i, 1]
final_url = location.chomp if location
2020-07-24 00:20:28 -04:00
permanent_redirect = location.chomp if status_code == "301"
end
2019-10-29 19:06:57 +01:00
output_hash = Digest::SHA256.file(file.path) if hash_needed
2018-11-24 01:46:55 +00:00
final_url ||= url
2020-07-24 00:20:28 -04:00
permanent_redirect ||= url
{
2020-07-24 00:20:28 -04:00
url: url,
final_url: final_url,
permanent_redirect: permanent_redirect,
status: status_code,
etag: headers[%r{ETag: ([wW]/)?"(([^"]|\\")*)"}, 2],
content_length: headers[/Content-Length: (\d+)/, 1],
file_hash: output_hash,
file: output,
}
2019-10-29 19:06:57 +01:00
ensure
file.unlink
end
def http_status_ok?(status)
(100..299).cover?(status.to_i)
end