http_client_tcp.cpp 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687
  1. /*************************************************************************/
  2. /* http_client_tcp.cpp */
  3. /*************************************************************************/
  4. /* This file is part of: */
  5. /* GODOT ENGINE */
  6. /* https://godotengine.org */
  7. /*************************************************************************/
  8. /* Copyright (c) 2007-2021 Juan Linietsky, Ariel Manzur. */
  9. /* Copyright (c) 2014-2021 Godot Engine contributors (cf. AUTHORS.md). */
  10. /* */
  11. /* Permission is hereby granted, free of charge, to any person obtaining */
  12. /* a copy of this software and associated documentation files (the */
  13. /* "Software"), to deal in the Software without restriction, including */
  14. /* without limitation the rights to use, copy, modify, merge, publish, */
  15. /* distribute, sublicense, and/or sell copies of the Software, and to */
  16. /* permit persons to whom the Software is furnished to do so, subject to */
  17. /* the following conditions: */
  18. /* */
  19. /* The above copyright notice and this permission notice shall be */
  20. /* included in all copies or substantial portions of the Software. */
  21. /* */
  22. /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
  23. /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
  24. /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.*/
  25. /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
  26. /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
  27. /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
  28. /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
  29. /*************************************************************************/
  30. #ifndef JAVASCRIPT_ENABLED
  31. #include "http_client_tcp.h"
  32. #include "core/io/stream_peer_ssl.h"
  33. #include "core/version.h"
  34. HTTPClient *HTTPClientTCP::_create_func() {
  35. return memnew(HTTPClientTCP);
  36. }
  37. Error HTTPClientTCP::connect_to_host(const String &p_host, int p_port, bool p_ssl, bool p_verify_host) {
  38. close();
  39. conn_port = p_port;
  40. conn_host = p_host;
  41. ip_candidates.clear();
  42. ssl = p_ssl;
  43. ssl_verify_host = p_verify_host;
  44. String host_lower = conn_host.to_lower();
  45. if (host_lower.begins_with("http://")) {
  46. conn_host = conn_host.substr(7, conn_host.length() - 7);
  47. } else if (host_lower.begins_with("https://")) {
  48. ssl = true;
  49. conn_host = conn_host.substr(8, conn_host.length() - 8);
  50. }
  51. ERR_FAIL_COND_V(conn_host.length() < HOST_MIN_LEN, ERR_INVALID_PARAMETER);
  52. if (conn_port < 0) {
  53. if (ssl) {
  54. conn_port = PORT_HTTPS;
  55. } else {
  56. conn_port = PORT_HTTP;
  57. }
  58. }
  59. connection = tcp_connection;
  60. if (conn_host.is_valid_ip_address()) {
  61. // Host contains valid IP
  62. Error err = tcp_connection->connect_to_host(IPAddress(conn_host), p_port);
  63. if (err) {
  64. status = STATUS_CANT_CONNECT;
  65. return err;
  66. }
  67. status = STATUS_CONNECTING;
  68. } else {
  69. // Host contains hostname and needs to be resolved to IP
  70. resolving = IP::get_singleton()->resolve_hostname_queue_item(conn_host);
  71. status = STATUS_RESOLVING;
  72. }
  73. return OK;
  74. }
  75. void HTTPClientTCP::set_connection(const Ref<StreamPeer> &p_connection) {
  76. ERR_FAIL_COND_MSG(p_connection.is_null(), "Connection is not a reference to a valid StreamPeer object.");
  77. if (ssl) {
  78. ERR_FAIL_NULL_MSG(Object::cast_to<StreamPeerSSL>(p_connection.ptr()),
  79. "Connection is not a reference to a valid StreamPeerSSL object.");
  80. }
  81. if (connection == p_connection) {
  82. return;
  83. }
  84. close();
  85. connection = p_connection;
  86. status = STATUS_CONNECTED;
  87. }
  88. Ref<StreamPeer> HTTPClientTCP::get_connection() const {
  89. return connection;
  90. }
  91. static bool _check_request_url(HTTPClientTCP::Method p_method, const String &p_url) {
  92. switch (p_method) {
  93. case HTTPClientTCP::METHOD_CONNECT: {
  94. // Authority in host:port format, as in RFC7231
  95. int pos = p_url.find_char(':');
  96. return 0 < pos && pos < p_url.length() - 1;
  97. }
  98. case HTTPClientTCP::METHOD_OPTIONS: {
  99. if (p_url == "*") {
  100. return true;
  101. }
  102. [[fallthrough]];
  103. }
  104. default:
  105. // Absolute path or absolute URL
  106. return p_url.begins_with("/") || p_url.begins_with("http://") || p_url.begins_with("https://");
  107. }
  108. }
  109. Error HTTPClientTCP::request(Method p_method, const String &p_url, const Vector<String> &p_headers, const uint8_t *p_body, int p_body_size) {
  110. ERR_FAIL_INDEX_V(p_method, METHOD_MAX, ERR_INVALID_PARAMETER);
  111. ERR_FAIL_COND_V(!_check_request_url(p_method, p_url), ERR_INVALID_PARAMETER);
  112. ERR_FAIL_COND_V(status != STATUS_CONNECTED, ERR_INVALID_PARAMETER);
  113. ERR_FAIL_COND_V(connection.is_null(), ERR_INVALID_DATA);
  114. String request = String(_methods[p_method]) + " " + p_url + " HTTP/1.1\r\n";
  115. bool add_host = true;
  116. bool add_clen = p_body_size > 0;
  117. bool add_uagent = true;
  118. bool add_accept = true;
  119. for (int i = 0; i < p_headers.size(); i++) {
  120. request += p_headers[i] + "\r\n";
  121. if (add_host && p_headers[i].findn("Host:") == 0) {
  122. add_host = false;
  123. }
  124. if (add_clen && p_headers[i].findn("Content-Length:") == 0) {
  125. add_clen = false;
  126. }
  127. if (add_uagent && p_headers[i].findn("User-Agent:") == 0) {
  128. add_uagent = false;
  129. }
  130. if (add_accept && p_headers[i].findn("Accept:") == 0) {
  131. add_accept = false;
  132. }
  133. }
  134. if (add_host) {
  135. if ((ssl && conn_port == PORT_HTTPS) || (!ssl && conn_port == PORT_HTTP)) {
  136. // Don't append the standard ports
  137. request += "Host: " + conn_host + "\r\n";
  138. } else {
  139. request += "Host: " + conn_host + ":" + itos(conn_port) + "\r\n";
  140. }
  141. }
  142. if (add_clen) {
  143. request += "Content-Length: " + itos(p_body_size) + "\r\n";
  144. // Should it add utf8 encoding?
  145. }
  146. if (add_uagent) {
  147. request += "User-Agent: GodotEngine/" + String(VERSION_FULL_BUILD) + " (" + OS::get_singleton()->get_name() + ")\r\n";
  148. }
  149. if (add_accept) {
  150. request += "Accept: */*\r\n";
  151. }
  152. request += "\r\n";
  153. CharString cs = request.utf8();
  154. Vector<uint8_t> data;
  155. data.resize(cs.length() + p_body_size);
  156. memcpy(data.ptrw(), cs.get_data(), cs.length());
  157. if (p_body_size > 0) {
  158. memcpy(data.ptrw() + cs.length(), p_body, p_body_size);
  159. }
  160. // TODO Implement non-blocking requests.
  161. Error err = connection->put_data(data.ptr(), data.size());
  162. if (err) {
  163. close();
  164. status = STATUS_CONNECTION_ERROR;
  165. return err;
  166. }
  167. status = STATUS_REQUESTING;
  168. head_request = p_method == METHOD_HEAD;
  169. return OK;
  170. }
  171. bool HTTPClientTCP::has_response() const {
  172. return response_headers.size() != 0;
  173. }
  174. bool HTTPClientTCP::is_response_chunked() const {
  175. return chunked;
  176. }
  177. int HTTPClientTCP::get_response_code() const {
  178. return response_num;
  179. }
  180. Error HTTPClientTCP::get_response_headers(List<String> *r_response) {
  181. if (!response_headers.size()) {
  182. return ERR_INVALID_PARAMETER;
  183. }
  184. for (int i = 0; i < response_headers.size(); i++) {
  185. r_response->push_back(response_headers[i]);
  186. }
  187. response_headers.clear();
  188. return OK;
  189. }
  190. void HTTPClientTCP::close() {
  191. if (tcp_connection->get_status() != StreamPeerTCP::STATUS_NONE) {
  192. tcp_connection->disconnect_from_host();
  193. }
  194. connection.unref();
  195. status = STATUS_DISCONNECTED;
  196. head_request = false;
  197. if (resolving != IP::RESOLVER_INVALID_ID) {
  198. IP::get_singleton()->erase_resolve_item(resolving);
  199. resolving = IP::RESOLVER_INVALID_ID;
  200. }
  201. ip_candidates.clear();
  202. response_headers.clear();
  203. response_str.clear();
  204. body_size = -1;
  205. body_left = 0;
  206. chunk_left = 0;
  207. chunk_trailer_part = false;
  208. read_until_eof = false;
  209. response_num = 0;
  210. handshaking = false;
  211. }
  212. Error HTTPClientTCP::poll() {
  213. switch (status) {
  214. case STATUS_RESOLVING: {
  215. ERR_FAIL_COND_V(resolving == IP::RESOLVER_INVALID_ID, ERR_BUG);
  216. IP::ResolverStatus rstatus = IP::get_singleton()->get_resolve_item_status(resolving);
  217. switch (rstatus) {
  218. case IP::RESOLVER_STATUS_WAITING:
  219. return OK; // Still resolving
  220. case IP::RESOLVER_STATUS_DONE: {
  221. ip_candidates = IP::get_singleton()->get_resolve_item_addresses(resolving);
  222. IP::get_singleton()->erase_resolve_item(resolving);
  223. resolving = IP::RESOLVER_INVALID_ID;
  224. Error err = ERR_BUG; // Should be at least one entry.
  225. while (ip_candidates.size() > 0) {
  226. err = tcp_connection->connect_to_host(ip_candidates.front(), conn_port);
  227. if (err == OK) {
  228. break;
  229. }
  230. }
  231. if (err) {
  232. status = STATUS_CANT_CONNECT;
  233. return err;
  234. }
  235. status = STATUS_CONNECTING;
  236. } break;
  237. case IP::RESOLVER_STATUS_NONE:
  238. case IP::RESOLVER_STATUS_ERROR: {
  239. IP::get_singleton()->erase_resolve_item(resolving);
  240. resolving = IP::RESOLVER_INVALID_ID;
  241. close();
  242. status = STATUS_CANT_RESOLVE;
  243. return ERR_CANT_RESOLVE;
  244. } break;
  245. }
  246. } break;
  247. case STATUS_CONNECTING: {
  248. StreamPeerTCP::Status s = tcp_connection->get_status();
  249. switch (s) {
  250. case StreamPeerTCP::STATUS_CONNECTING: {
  251. return OK;
  252. } break;
  253. case StreamPeerTCP::STATUS_CONNECTED: {
  254. if (ssl) {
  255. Ref<StreamPeerSSL> ssl;
  256. if (!handshaking) {
  257. // Connect the StreamPeerSSL and start handshaking
  258. ssl = Ref<StreamPeerSSL>(StreamPeerSSL::create());
  259. ssl->set_blocking_handshake_enabled(false);
  260. Error err = ssl->connect_to_stream(tcp_connection, ssl_verify_host, conn_host);
  261. if (err != OK) {
  262. close();
  263. status = STATUS_SSL_HANDSHAKE_ERROR;
  264. return ERR_CANT_CONNECT;
  265. }
  266. connection = ssl;
  267. handshaking = true;
  268. } else {
  269. // We are already handshaking, which means we can use your already active SSL connection
  270. ssl = static_cast<Ref<StreamPeerSSL>>(connection);
  271. if (ssl.is_null()) {
  272. close();
  273. status = STATUS_SSL_HANDSHAKE_ERROR;
  274. return ERR_CANT_CONNECT;
  275. }
  276. ssl->poll(); // Try to finish the handshake
  277. }
  278. if (ssl->get_status() == StreamPeerSSL::STATUS_CONNECTED) {
  279. // Handshake has been successful
  280. handshaking = false;
  281. ip_candidates.clear();
  282. status = STATUS_CONNECTED;
  283. return OK;
  284. } else if (ssl->get_status() != StreamPeerSSL::STATUS_HANDSHAKING) {
  285. // Handshake has failed
  286. close();
  287. status = STATUS_SSL_HANDSHAKE_ERROR;
  288. return ERR_CANT_CONNECT;
  289. }
  290. // ... we will need to poll more for handshake to finish
  291. } else {
  292. ip_candidates.clear();
  293. status = STATUS_CONNECTED;
  294. }
  295. return OK;
  296. } break;
  297. case StreamPeerTCP::STATUS_ERROR:
  298. case StreamPeerTCP::STATUS_NONE: {
  299. Error err = ERR_CANT_CONNECT;
  300. while (ip_candidates.size() > 0) {
  301. tcp_connection->disconnect_from_host();
  302. err = tcp_connection->connect_to_host(ip_candidates.pop_front(), conn_port);
  303. if (err == OK) {
  304. return OK;
  305. }
  306. }
  307. close();
  308. status = STATUS_CANT_CONNECT;
  309. return err;
  310. } break;
  311. }
  312. } break;
  313. case STATUS_BODY:
  314. case STATUS_CONNECTED: {
  315. // Check if we are still connected
  316. if (ssl) {
  317. Ref<StreamPeerSSL> tmp = connection;
  318. tmp->poll();
  319. if (tmp->get_status() != StreamPeerSSL::STATUS_CONNECTED) {
  320. status = STATUS_CONNECTION_ERROR;
  321. return ERR_CONNECTION_ERROR;
  322. }
  323. } else if (tcp_connection->get_status() != StreamPeerTCP::STATUS_CONNECTED) {
  324. status = STATUS_CONNECTION_ERROR;
  325. return ERR_CONNECTION_ERROR;
  326. }
  327. // Connection established, requests can now be made
  328. return OK;
  329. } break;
  330. case STATUS_REQUESTING: {
  331. while (true) {
  332. uint8_t byte;
  333. int rec = 0;
  334. Error err = _get_http_data(&byte, 1, rec);
  335. if (err != OK) {
  336. close();
  337. status = STATUS_CONNECTION_ERROR;
  338. return ERR_CONNECTION_ERROR;
  339. }
  340. if (rec == 0) {
  341. return OK; // Still requesting, keep trying!
  342. }
  343. response_str.push_back(byte);
  344. int rs = response_str.size();
  345. if (
  346. (rs >= 2 && response_str[rs - 2] == '\n' && response_str[rs - 1] == '\n') ||
  347. (rs >= 4 && response_str[rs - 4] == '\r' && response_str[rs - 3] == '\n' && response_str[rs - 2] == '\r' && response_str[rs - 1] == '\n')) {
  348. // End of response, parse.
  349. response_str.push_back(0);
  350. String response;
  351. response.parse_utf8((const char *)response_str.ptr());
  352. Vector<String> responses = response.split("\n");
  353. body_size = -1;
  354. chunked = false;
  355. body_left = 0;
  356. chunk_left = 0;
  357. chunk_trailer_part = false;
  358. read_until_eof = false;
  359. response_str.clear();
  360. response_headers.clear();
  361. response_num = RESPONSE_OK;
  362. // Per the HTTP 1.1 spec, keep-alive is the default.
  363. // Not following that specification breaks standard implementations.
  364. // Broken web servers should be fixed.
  365. bool keep_alive = true;
  366. for (int i = 0; i < responses.size(); i++) {
  367. String header = responses[i].strip_edges();
  368. String s = header.to_lower();
  369. if (s.length() == 0) {
  370. continue;
  371. }
  372. if (s.begins_with("content-length:")) {
  373. body_size = s.substr(s.find(":") + 1, s.length()).strip_edges().to_int();
  374. body_left = body_size;
  375. } else if (s.begins_with("transfer-encoding:")) {
  376. String encoding = header.substr(header.find(":") + 1, header.length()).strip_edges();
  377. if (encoding == "chunked") {
  378. chunked = true;
  379. }
  380. } else if (s.begins_with("connection: close")) {
  381. keep_alive = false;
  382. }
  383. if (i == 0 && responses[i].begins_with("HTTP")) {
  384. String num = responses[i].get_slicec(' ', 1);
  385. response_num = num.to_int();
  386. } else {
  387. response_headers.push_back(header);
  388. }
  389. }
  390. // This is a HEAD request, we won't receive anything.
  391. if (head_request) {
  392. body_size = 0;
  393. body_left = 0;
  394. }
  395. if (body_size != -1 || chunked) {
  396. status = STATUS_BODY;
  397. } else if (!keep_alive) {
  398. read_until_eof = true;
  399. status = STATUS_BODY;
  400. } else {
  401. status = STATUS_CONNECTED;
  402. }
  403. return OK;
  404. }
  405. }
  406. } break;
  407. case STATUS_DISCONNECTED: {
  408. return ERR_UNCONFIGURED;
  409. } break;
  410. case STATUS_CONNECTION_ERROR:
  411. case STATUS_SSL_HANDSHAKE_ERROR: {
  412. return ERR_CONNECTION_ERROR;
  413. } break;
  414. case STATUS_CANT_CONNECT: {
  415. return ERR_CANT_CONNECT;
  416. } break;
  417. case STATUS_CANT_RESOLVE: {
  418. return ERR_CANT_RESOLVE;
  419. } break;
  420. }
  421. return OK;
  422. }
  423. int HTTPClientTCP::get_response_body_length() const {
  424. return body_size;
  425. }
  426. PackedByteArray HTTPClientTCP::read_response_body_chunk() {
  427. ERR_FAIL_COND_V(status != STATUS_BODY, PackedByteArray());
  428. PackedByteArray ret;
  429. Error err = OK;
  430. if (chunked) {
  431. while (true) {
  432. if (chunk_trailer_part) {
  433. // We need to consume the trailer part too or keep-alive will break
  434. uint8_t b;
  435. int rec = 0;
  436. err = _get_http_data(&b, 1, rec);
  437. if (rec == 0) {
  438. break;
  439. }
  440. chunk.push_back(b);
  441. int cs = chunk.size();
  442. if ((cs >= 2 && chunk[cs - 2] == '\r' && chunk[cs - 1] == '\n')) {
  443. if (cs == 2) {
  444. // Finally over
  445. chunk_trailer_part = false;
  446. status = STATUS_CONNECTED;
  447. chunk.clear();
  448. break;
  449. } else {
  450. // We do not process nor return the trailer data
  451. chunk.clear();
  452. }
  453. }
  454. } else if (chunk_left == 0) {
  455. // Reading length
  456. uint8_t b;
  457. int rec = 0;
  458. err = _get_http_data(&b, 1, rec);
  459. if (rec == 0) {
  460. break;
  461. }
  462. chunk.push_back(b);
  463. if (chunk.size() > 32) {
  464. ERR_PRINT("HTTP Invalid chunk hex len");
  465. status = STATUS_CONNECTION_ERROR;
  466. break;
  467. }
  468. if (chunk.size() > 2 && chunk[chunk.size() - 2] == '\r' && chunk[chunk.size() - 1] == '\n') {
  469. int len = 0;
  470. for (int i = 0; i < chunk.size() - 2; i++) {
  471. char c = chunk[i];
  472. int v = 0;
  473. if (c >= '0' && c <= '9') {
  474. v = c - '0';
  475. } else if (c >= 'a' && c <= 'f') {
  476. v = c - 'a' + 10;
  477. } else if (c >= 'A' && c <= 'F') {
  478. v = c - 'A' + 10;
  479. } else {
  480. ERR_PRINT("HTTP Chunk len not in hex!!");
  481. status = STATUS_CONNECTION_ERROR;
  482. break;
  483. }
  484. len <<= 4;
  485. len |= v;
  486. if (len > (1 << 24)) {
  487. ERR_PRINT("HTTP Chunk too big!! >16mb");
  488. status = STATUS_CONNECTION_ERROR;
  489. break;
  490. }
  491. }
  492. if (len == 0) {
  493. // End reached!
  494. chunk_trailer_part = true;
  495. chunk.clear();
  496. break;
  497. }
  498. chunk_left = len + 2;
  499. chunk.resize(chunk_left);
  500. }
  501. } else {
  502. int rec = 0;
  503. err = _get_http_data(&chunk.write[chunk.size() - chunk_left], chunk_left, rec);
  504. if (rec == 0) {
  505. break;
  506. }
  507. chunk_left -= rec;
  508. if (chunk_left == 0) {
  509. if (chunk[chunk.size() - 2] != '\r' || chunk[chunk.size() - 1] != '\n') {
  510. ERR_PRINT("HTTP Invalid chunk terminator (not \\r\\n)");
  511. status = STATUS_CONNECTION_ERROR;
  512. break;
  513. }
  514. ret.resize(chunk.size() - 2);
  515. uint8_t *w = ret.ptrw();
  516. memcpy(w, chunk.ptr(), chunk.size() - 2);
  517. chunk.clear();
  518. }
  519. break;
  520. }
  521. }
  522. } else {
  523. int to_read = !read_until_eof ? MIN(body_left, read_chunk_size) : read_chunk_size;
  524. ret.resize(to_read);
  525. int _offset = 0;
  526. while (to_read > 0) {
  527. int rec = 0;
  528. {
  529. uint8_t *w = ret.ptrw();
  530. err = _get_http_data(w + _offset, to_read, rec);
  531. }
  532. if (rec <= 0) { // Ended up reading less
  533. ret.resize(_offset);
  534. break;
  535. } else {
  536. _offset += rec;
  537. to_read -= rec;
  538. if (!read_until_eof) {
  539. body_left -= rec;
  540. }
  541. }
  542. if (err != OK) {
  543. ret.resize(_offset);
  544. break;
  545. }
  546. }
  547. }
  548. if (err != OK) {
  549. close();
  550. if (err == ERR_FILE_EOF) {
  551. status = STATUS_DISCONNECTED; // Server disconnected
  552. } else {
  553. status = STATUS_CONNECTION_ERROR;
  554. }
  555. } else if (body_left == 0 && !chunked && !read_until_eof) {
  556. status = STATUS_CONNECTED;
  557. }
  558. return ret;
  559. }
  560. HTTPClientTCP::Status HTTPClientTCP::get_status() const {
  561. return status;
  562. }
  563. void HTTPClientTCP::set_blocking_mode(bool p_enable) {
  564. blocking = p_enable;
  565. }
  566. bool HTTPClientTCP::is_blocking_mode_enabled() const {
  567. return blocking;
  568. }
  569. Error HTTPClientTCP::_get_http_data(uint8_t *p_buffer, int p_bytes, int &r_received) {
  570. if (blocking) {
  571. // We can't use StreamPeer.get_data, since when reaching EOF we will get an
  572. // error without knowing how many bytes we received.
  573. Error err = ERR_FILE_EOF;
  574. int read = 0;
  575. int left = p_bytes;
  576. r_received = 0;
  577. while (left > 0) {
  578. err = connection->get_partial_data(p_buffer + r_received, left, read);
  579. if (err == OK) {
  580. r_received += read;
  581. } else if (err == ERR_FILE_EOF) {
  582. r_received += read;
  583. return err;
  584. } else {
  585. return err;
  586. }
  587. left -= read;
  588. }
  589. return err;
  590. } else {
  591. return connection->get_partial_data(p_buffer, p_bytes, r_received);
  592. }
  593. }
  594. void HTTPClientTCP::set_read_chunk_size(int p_size) {
  595. ERR_FAIL_COND(p_size < 256 || p_size > (1 << 24));
  596. read_chunk_size = p_size;
  597. }
  598. int HTTPClientTCP::get_read_chunk_size() const {
  599. return read_chunk_size;
  600. }
  601. HTTPClientTCP::HTTPClientTCP() {
  602. tcp_connection.instantiate();
  603. }
  604. HTTPClient *(*HTTPClient::_create)() = HTTPClientTCP::_create_func;
  605. #endif // #ifndef JAVASCRIPT_ENABLED