Left: | ||
Right: |
LEFT | RIGHT |
---|---|
1 package org.adblockplus.brazil; | 1 package org.adblockplus.brazil; |
2 | 2 |
3 import java.io.EOFException; | 3 import java.io.EOFException; |
4 import java.io.FilterInputStream; | 4 import java.io.FilterInputStream; |
5 import java.io.FilterOutputStream; | 5 import java.io.FilterOutputStream; |
6 import java.io.IOException; | 6 import java.io.IOException; |
7 import java.io.InterruptedIOException; | 7 import java.io.InterruptedIOException; |
8 import java.io.OutputStream; | 8 import java.io.OutputStream; |
9 import java.net.ConnectException; | 9 import java.net.ConnectException; |
10 import java.net.MalformedURLException; | 10 import java.net.MalformedURLException; |
11 import java.net.URL; | 11 import java.net.URL; |
12 import java.net.UnknownHostException; | 12 import java.net.UnknownHostException; |
13 import java.util.List; | 13 import java.util.List; |
14 import java.util.Properties; | 14 import java.util.regex.Pattern; |
15 import java.util.zip.GZIPInputStream; | 15 import java.util.zip.GZIPInputStream; |
16 import java.util.zip.InflaterInputStream; | 16 import java.util.zip.InflaterInputStream; |
17 | 17 |
18 import org.adblockplus.ChunkedOutputStream; | 18 import org.adblockplus.ChunkedOutputStream; |
19 import org.adblockplus.android.AdblockPlus; | 19 import org.adblockplus.android.AdblockPlus; |
20 import org.literateprograms.BoyerMoore; | 20 import org.literateprograms.BoyerMoore; |
21 | 21 |
22 import sunlabs.brazil.server.Handler; | |
23 import sunlabs.brazil.server.Request; | 22 import sunlabs.brazil.server.Request; |
24 import sunlabs.brazil.server.Server; | 23 import sunlabs.brazil.server.Server; |
25 import sunlabs.brazil.util.MatchString; | 24 import sunlabs.brazil.util.MatchString; |
26 import sunlabs.brazil.util.http.HttpInputStream; | 25 import sunlabs.brazil.util.http.HttpInputStream; |
27 import sunlabs.brazil.util.http.HttpRequest; | 26 import sunlabs.brazil.util.http.HttpRequest; |
28 import sunlabs.brazil.util.http.MimeHeaders; | 27 import sunlabs.brazil.util.http.MimeHeaders; |
29 import android.util.Log; | 28 import android.util.Log; |
30 | 29 |
31 /** | 30 /** |
32 * The <code>RequestHandler</code> implements a proxy service optionally | 31 * The <code>RequestHandler</code> implements a proxy service optionally |
(...skipping 22 matching lines...) Expand all Loading... | |
55 * | 54 * |
56 * <pre> | 55 * <pre> |
57 * handler=adblock | 56 * handler=adblock |
58 * adblock.class=org.adblockplus.brazil.RequestHandler | 57 * adblock.class=org.adblockplus.brazil.RequestHandler |
59 * </pre> | 58 * </pre> |
60 * | 59 * |
61 * See the description under {@link sunlabs.brazil.server.Handler#respond | 60 * See the description under {@link sunlabs.brazil.server.Handler#respond |
62 * respond} for a more detailed explanation. | 61 * respond} for a more detailed explanation. |
63 */ | 62 */ |
64 | 63 |
65 public class RequestHandler implements Handler | 64 public class RequestHandler extends BaseRequestHandler |
66 { | 65 { |
67 public static final String PROXY_HOST = "proxyHost"; | |
68 public static final String PROXY_PORT = "proxyPort"; | |
69 public static final String AUTH = "auth"; | |
70 | |
71 private AdblockPlus application; | 66 private AdblockPlus application; |
72 private String prefix; | |
73 | |
74 private String via; | 67 private String via; |
75 | 68 private static Pattern RE_HTTP = Pattern.compile("^https?:"); |
76 private String proxyHost; | 69 |
77 private int proxyPort = 80; | 70 private boolean shouldLogHeaders; |
78 private String auth; | |
79 | |
80 private boolean shouldLog; // if true, log all headers | |
Felix Dahlke
2012/11/09 06:04:32
Maybe call it shouldLogHeaders then? That'd make t
Andrey Novikov
2012/11/09 09:23:47
Done.
| |
81 | 71 |
82 @Override | 72 @Override |
83 public boolean init(Server server, String prefix) | 73 public boolean init(Server server, String prefix) |
84 { | 74 { |
85 this.prefix = prefix; | 75 super.init(server, prefix); |
76 | |
86 application = AdblockPlus.getApplication(); | 77 application = AdblockPlus.getApplication(); |
87 | 78 shouldLogHeaders = (server.props.getProperty(prefix + "proxylog") != null); |
88 Properties props = server.props; | |
89 | |
90 proxyHost = props.getProperty(prefix + PROXY_HOST); | |
91 | |
92 String s = props.getProperty(prefix + PROXY_PORT); | |
93 try | |
94 { | |
95 proxyPort = Integer.decode(s).intValue(); | |
96 } | |
97 catch (Exception e) | |
98 { | |
Felix Dahlke
2012/11/09 06:04:32
It seems this case occurs when the port is not set
Andrey Novikov
2012/11/09 09:23:47
Done.
| |
99 } | |
100 | |
101 auth = props.getProperty(prefix + AUTH); | |
102 | |
103 shouldLog = (props.getProperty(prefix + "proxylog") != null); | |
104 | |
105 via = " " + server.hostName + ":" + server.listen.getLocalPort() + " (" + se rver.name + ")"; | 79 via = " " + server.hostName + ":" + server.listen.getLocalPort() + " (" + se rver.name + ")"; |
106 | 80 |
107 return true; | 81 return true; |
108 } | 82 } |
109 | 83 |
110 @Override | 84 @Override |
111 public boolean respond(Request request) throws IOException | 85 public boolean respond(Request request) throws IOException |
112 { | 86 { |
113 boolean block = false; | 87 boolean block = false; |
114 String reqHost = null; | 88 String reqHost = null; |
115 String refHost = null; | 89 String refHost = null; |
116 | 90 |
91 String referrer = request.getRequestHeader("referer"); | |
92 | |
117 try | 93 try |
118 { | 94 { |
119 reqHost = (new URL(request.url)).getHost(); | 95 reqHost = (new URL(request.url)).getHost(); |
120 refHost = (new URL(request.getRequestHeader("referer"))).getHost(); | 96 if (referrer != null) |
97 refHost = (new URL(referrer)).getHost(); | |
121 } | 98 } |
122 catch (MalformedURLException e) | 99 catch (MalformedURLException e) |
123 { | 100 { |
Felix Dahlke
2012/11/09 06:04:32
Can we really safely go on in this case? At least
Andrey Novikov
2012/11/09 09:23:47
We are transparent, it's not our deal if it's malf
Felix Dahlke
2012/11/09 14:40:46
Hm, but should we just go on with a null reqHost a
Andrey Novikov
2012/11/12 08:53:12
In fact this exception is for referrer, request ca
| |
101 // We are transparent, it's not our deal if it's malformed. | |
124 } | 102 } |
125 | 103 |
126 try | 104 try |
127 { | 105 { |
128 block = application.matches(request.url, request.query, reqHost, refHost, request.getRequestHeader("accept")); | 106 if (referrer != null) |
107 block = application.matches(request.url, request.query, reqHost, refHost , request.getRequestHeader("accept")); | |
129 } | 108 } |
130 catch (Exception e) | 109 catch (Exception e) |
131 { | 110 { |
132 Log.e(prefix, "Filter error", e); | 111 Log.e(prefix, "Filter error", e); |
133 } | 112 } |
134 | 113 |
135 request.log(Server.LOG_LOG, prefix, block + ": " + request.url); | 114 request.log(Server.LOG_LOG, prefix, block + ": " + request.url + " ("+ refHo st +")"); |
115 | |
116 int count = request.server.requestCount; | |
117 if (shouldLogHeaders) | |
118 { | |
119 System.err.println(dumpHeaders(count, request, request.headers, true)); | |
120 } | |
136 | 121 |
137 if (block) | 122 if (block) |
138 { | 123 { |
139 request.sendError(502, "Blocked by Adblock Plus"); | 124 request.sendHeaders(204, null, 0); |
140 return true; | 125 return true; |
141 } | 126 } |
142 | 127 |
143 // Do not further process non-http requests | 128 // Do not further process non-http requests |
144 if (request.url.startsWith("http:") == false && request.url.startsWith("http s:") == false) | 129 if (!RE_HTTP.matcher(request.url).find()) |
Felix Dahlke
2012/11/09 06:04:32
How about if (!request.url.matches("^https?:")) ?
Andrey Novikov
2012/11/09 09:23:47
I thought it would be faster...
Felix Dahlke
2012/11/09 14:40:46
Premature optimisation? :) I think you should go w
Andrey Novikov
2012/11/12 08:53:12
Done.
| |
145 { | 130 { |
146 return false; | 131 return false; |
147 } | 132 } |
148 | 133 |
149 String url = request.url; | 134 String url = request.url; |
150 | 135 |
151 if ((request.query != null) && (request.query.length() > 0)) | 136 if ((request.query != null) && (request.query.length() > 0)) |
152 { | 137 { |
153 url += "?" + request.query; | 138 url += "?" + request.query; |
154 } | |
155 | |
156 int count = request.server.requestCount; | |
157 if (shouldLog) | |
158 { | |
159 System.err.println(dumpHeaders(count, request, request.headers, true)); | |
160 } | 139 } |
161 | 140 |
162 /* | 141 /* |
163 * "Proxy-Connection" may be used (instead of just "Connection") | 142 * "Proxy-Connection" may be used (instead of just "Connection") |
164 * to keep alive a connection between a client and this proxy. | 143 * to keep alive a connection between a client and this proxy. |
165 */ | 144 */ |
166 String pc = request.headers.get("Proxy-Connection"); | 145 String pc = request.headers.get("Proxy-Connection"); |
167 if (pc != null) | 146 if (pc != null) |
168 { | 147 { |
169 request.connectionHeader = "Proxy-Connection"; | 148 request.connectionHeader = "Proxy-Connection"; |
(...skipping 19 matching lines...) Expand all Loading... | |
189 | 168 |
190 if (request.postData != null) | 169 if (request.postData != null) |
191 { | 170 { |
192 OutputStream out = target.getOutputStream(); | 171 OutputStream out = target.getOutputStream(); |
193 out.write(request.postData); | 172 out.write(request.postData); |
194 out.close(); | 173 out.close(); |
195 } | 174 } |
196 | 175 |
197 target.connect(); | 176 target.connect(); |
198 | 177 |
199 if (shouldLog) | 178 if (shouldLogHeaders) |
200 { | 179 { |
201 System.err.println(" " + target.status + "\n" + dumpHeaders(count, request, target.responseHeaders, false)); | 180 System.err.println(" " + target.status + "\n" + dumpHeaders(count, request, target.responseHeaders, false)); |
202 } | 181 } |
203 HttpRequest.removePointToPointHeaders(target.responseHeaders, true); | 182 HttpRequest.removePointToPointHeaders(target.responseHeaders, true); |
204 | 183 |
205 request.setStatus(target.getResponseCode()); | 184 request.setStatus(target.getResponseCode()); |
206 target.responseHeaders.copyTo(request.responseHeaders); | 185 target.responseHeaders.copyTo(request.responseHeaders); |
207 try | 186 try |
208 { | 187 { |
209 request.responseHeaders.add("Via", target.status.substring(0, 8) + via); | 188 request.responseHeaders.add("Via", target.status.substring(0, 8) + via); |
(...skipping 70 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
280 request.responseHeaders.remove("Content-Length"); | 259 request.responseHeaders.remove("Content-Length"); |
281 request.responseHeaders.remove("Content-Encoding"); | 260 request.responseHeaders.remove("Content-Encoding"); |
282 out = new ChunkedOutputStream(request.out); | 261 out = new ChunkedOutputStream(request.out); |
283 request.responseHeaders.add("Transfer-Encoding", "chunked"); | 262 request.responseHeaders.add("Transfer-Encoding", "chunked"); |
284 size = Integer.MAX_VALUE; | 263 size = Integer.MAX_VALUE; |
285 } | 264 } |
286 | 265 |
287 request.sendHeaders(-1, null, -1); | 266 request.sendHeaders(-1, null, -1); |
288 | 267 |
289 byte[] buf = new byte[Math.min(4096, size)]; | 268 byte[] buf = new byte[Math.min(4096, size)]; |
290 | |
291 Log.e(prefix, request.url); | |
Felix Dahlke
2012/11/09 06:04:32
Log.d()?
Andrey Novikov
2012/11/09 09:23:47
Done.
| |
292 | 269 |
293 boolean sent = selectors == null; | 270 boolean sent = selectors == null; |
294 // TODO Do we need to set encoding here? | 271 // TODO Do we need to set encoding here? |
295 BoyerMoore matcher = new BoyerMoore("<html".getBytes()); | 272 BoyerMoore matcher = new BoyerMoore("<html".getBytes()); |
296 | 273 |
297 while (size > 0) | 274 while (size > 0) |
298 { | 275 { |
299 out.flush(); | 276 out.flush(); |
300 | 277 |
301 count = in.read(buf, 0, Math.min(buf.length, size)); | 278 count = in.read(buf, 0, Math.min(buf.length, size)); |
(...skipping 24 matching lines...) Expand all Loading... | |
326 out.write(buf, 0, count); | 303 out.write(buf, 0, count); |
327 } | 304 } |
328 catch (IOException e) | 305 catch (IOException e) |
329 { | 306 { |
330 break; | 307 break; |
331 } | 308 } |
332 } | 309 } |
333 // The correct way would be to close ChunkedOutputStream | 310 // The correct way would be to close ChunkedOutputStream |
334 // but we can not do it because underlying output stream is | 311 // but we can not do it because underlying output stream is |
335 // used later in caller code. So we use this ugly hack: | 312 // used later in caller code. So we use this ugly hack: |
336 try | 313 if (out instanceof ChunkedOutputStream) |
337 { | |
338 ((ChunkedOutputStream) out).writeFinalChunk(); | 314 ((ChunkedOutputStream) out).writeFinalChunk(); |
Felix Dahlke
2012/11/09 06:04:32
Why use instanceof? That would avoid class cast ex
Andrey Novikov
2012/11/09 09:23:47
Done.
| |
339 } | |
340 catch (ClassCastException e) | |
341 { | |
342 // ignore | |
343 } | |
344 } | 315 } |
345 } | 316 } |
346 catch (InterruptedIOException e) | 317 catch (InterruptedIOException e) |
347 { | 318 { |
348 /* | 319 /* |
349 * Read timeout while reading from the remote side. We use a | 320 * Read timeout while reading from the remote side. We use a |
350 * read timeout in case the target never responds. | 321 * read timeout in case the target never responds. |
351 */ | 322 */ |
352 request.sendError(408, "Timeout / No response"); | 323 request.sendError(408, "Timeout / No response"); |
353 } | 324 } |
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
407 } | 378 } |
408 | 379 |
409 for (int i = 0; i < headers.size(); i++) | 380 for (int i = 0; i < headers.size(); i++) |
410 { | 381 { |
411 sb.append(prompt).append(headers.getKey(i)); | 382 sb.append(prompt).append(headers.getKey(i)); |
412 sb.append(": ").append(headers.get(i)).append("\n"); | 383 sb.append(": ").append(headers.get(i)).append("\n"); |
413 } | 384 } |
414 return (sb.toString()); | 385 return (sb.toString()); |
415 } | 386 } |
416 } | 387 } |
LEFT | RIGHT |