Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: support http range header #10

Merged
merged 42 commits into from
Mar 15, 2024
Merged
Show file tree
Hide file tree
Changes from 33 commits
Commits
Show all changes
42 commits
Select commit Hold shift + click to select a range
aa705a7
chore: limit body parameters to the types used
SgtPooki Mar 4, 2024
089ae24
chore: add response-header helper and tests
SgtPooki Mar 4, 2024
5af9252
feat: add range header parsing support
SgtPooki Mar 4, 2024
3b2e379
feat: verified-fetch supports range-requests
SgtPooki Mar 4, 2024
d805a51
test: fix dns test asserting test failure since we are catching it now
SgtPooki Mar 4, 2024
4d8e57d
fix: return 500 error when streaming unixfs content throws
SgtPooki Mar 4, 2024
aa25f0c
fix: cleanup code and unexecuting tests hiding errors
SgtPooki Mar 5, 2024
60b56c9
chore: some cleanup and code coverage
SgtPooki Mar 5, 2024
6da36fd
tmp: most things working
SgtPooki Mar 5, 2024
cac2b79
fix: stream slicing and test correctness
SgtPooki Mar 5, 2024
72618bc
chore: fixed some ByteRangeContext tests
SgtPooki Mar 6, 2024
698ee8f
test: add back header helpers
SgtPooki Mar 7, 2024
e413fa5
fix: unixfs tests are passing
SgtPooki Mar 7, 2024
96c7f00
fix: range-requests on raw content
SgtPooki Mar 7, 2024
deb2f2b
feat: tests are passing
SgtPooki Mar 7, 2024
f357a3d
chore: log string casing
SgtPooki Mar 7, 2024
83e80d8
chore: use 502 response instead of 500
SgtPooki Mar 7, 2024
121747b
chore: use libp2p/interface for types in src
SgtPooki Mar 7, 2024
05a6dfb
chore: failing to create range resp logs error
SgtPooki Mar 7, 2024
9dcd798
chore: Apply suggestions from code review
SgtPooki Mar 7, 2024
f296f0b
chore: fix broken tests from github PR patches (my own)
SgtPooki Mar 7, 2024
912ee47
chore: re-enable stream tests for ByteRangeContext
SgtPooki Mar 7, 2024
b0b6a4a
chore: clean up getBody a bit
SgtPooki Mar 8, 2024
f399bed
chore: ByteRangeContext getBody cleanup
SgtPooki Mar 8, 2024
607e5be
Merge branch 'main' into 9-heliaverified-fetch-http-range-request-sup…
SgtPooki Mar 8, 2024
eb0224b
chore: apply suggestions from code review
SgtPooki Mar 15, 2024
d1e6a82
fix: getSlicedBody uses correct types
SgtPooki Mar 15, 2024
07ab941
chore: remove extra stat call
SgtPooki Mar 15, 2024
ac621a2
chore: fix jsdoc with '*/'
SgtPooki Mar 15, 2024
46dc133
chore: fileSize is public property, but should not be used
SgtPooki Mar 15, 2024
36f6c96
test: fix blob comparisons that broke or were never worjing properly
SgtPooki Mar 15, 2024
acdd632
Merge branch 'main' into 9-heliaverified-fetch-http-range-request-sup…
SgtPooki Mar 15, 2024
b48c672
Merge branch 'main' into 9-heliaverified-fetch-http-range-request-sup…
SgtPooki Mar 15, 2024
5fc7ceb
chore: Update byte-range-context.ts
SgtPooki Mar 15, 2024
19c2713
chore: jsdoc cleanup
SgtPooki Mar 15, 2024
a1686a3
Revert "chore: fileSize is public property, but should not be used"
SgtPooki Mar 15, 2024
e7e3fd0
chore: jsdoc comments explaining .fileSize use
SgtPooki Mar 15, 2024
c184e2a
chore: isRangeRequest is public
SgtPooki Mar 15, 2024
d633456
chore: getters/setters update
SgtPooki Mar 15, 2024
314adca
chore: remove unnecessary _contentRangeHeaderValue
SgtPooki Mar 15, 2024
8837738
chore: ByteRangeContext uses setFileSize and getFileSize
SgtPooki Mar 15, 2024
3963006
chore: remove .stat changes that are no longer needed
SgtPooki Mar 15, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions packages/verified-fetch/src/types.ts
Original file line number Diff line number Diff line change
@@ -1 +1,3 @@
export type RequestFormatShorthand = 'raw' | 'car' | 'tar' | 'ipns-record' | 'dag-json' | 'dag-cbor' | 'json' | 'cbor'

export type SupportedBodyTypes = string | ArrayBuffer | Blob | ReadableStream<Uint8Array> | null
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Picking nits but Types is redundant in a type, Supported is a business-logic kind of decision not a type, so just Body?

Suggested change
export type SupportedBodyTypes = string | ArrayBuffer | Blob | ReadableStream<Uint8Array> | null
export type Body = string | ArrayBuffer | Blob | ReadableStream<Uint8Array> | null

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would rather do something like ResponseBody, but i'm good with any.

Body could easily be a type that comes from builtin/global types that could cause confusion. SupportedBody would be better I guess.. but it's explicitly informing devs reading the code that it's not just typical Response.body types.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ResponseBody would be fine. It's a minor point tbh.

307 changes: 307 additions & 0 deletions packages/verified-fetch/src/utils/byte-range-context.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,307 @@
import { calculateByteRangeIndexes, getHeader } from './request-headers.js'
import { getContentRangeHeader } from './response-headers.js'
import type { SupportedBodyTypes } from '../types.js'
import type { ComponentLogger, Logger } from '@libp2p/interface'

type SliceableBody = Exclude<SupportedBodyTypes, ReadableStream<Uint8Array> | null>

/**
* Gets the body size of a given body if it's possible to calculate it synchronously.
*/
function getBodySizeSync (body: SupportedBodyTypes): number | null {
if (typeof body === 'string') {
return body.length
}

Check warning on line 14 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L13-L14

Added lines #L13 - L14 were not covered by tests
if (body instanceof ArrayBuffer || body instanceof Uint8Array) {
return body.byteLength
}
if (body instanceof Blob) {
return body.size
}

if (body instanceof ReadableStream) {
return null
}

return null
}

Check warning on line 27 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L25-L27

Added lines #L25 - L27 were not covered by tests

function getByteRangeFromHeader (rangeHeader: string): { start: string, end: string } {
/**
* Range: bytes=<start>-<end> | bytes=<start2>- | bytes=-<end2>
*/
const match = rangeHeader.match(/^bytes=(?<start>\d+)?-(?<end>\d+)?$/)
if (match?.groups == null) {
throw new Error('Invalid range request')
}

const { start, end } = match.groups

return { start, end }
}

export class ByteRangeContext {
private readonly _isRangeRequest: boolean

/**
* This property should only be set by calling `setFileSize` or `setBody`.
*
* @access private
*/
public fileSize: Readonly<number | null | undefined>
private readonly _contentRangeHeaderValue: string | undefined
private _body: SupportedBodyTypes | null = null
SgtPooki marked this conversation as resolved.
Show resolved Hide resolved
private readonly _rangeRequestHeader: string | undefined
SgtPooki marked this conversation as resolved.
Show resolved Hide resolved
private readonly log: Logger
private _isValidRangeRequest: boolean | null = null
private readonly requestRangeStart: number | null
private readonly requestRangeEnd: number | null
private byteStart: number | undefined
private byteEnd: number | undefined
private byteSize: number | undefined

constructor (logger: ComponentLogger, private readonly headers?: HeadersInit) {
this.log = logger.forComponent('helia:verified-fetch:byte-range-context')
this._rangeRequestHeader = getHeader(this.headers, 'Range')
if (this._rangeRequestHeader != null) {
this.log.trace('range request detected')
this._isRangeRequest = true
SgtPooki marked this conversation as resolved.
Show resolved Hide resolved
try {
const { start, end } = getByteRangeFromHeader(this._rangeRequestHeader)
this.requestRangeStart = start != null ? parseInt(start) : null
this.requestRangeEnd = end != null ? parseInt(end) : null
} catch (e) {
this.log.error('error parsing range request header: %o', e)
this.isValidRangeRequest = false
this.requestRangeStart = null
this.requestRangeEnd = null
}

this.setOffsetDetails()
} else {
this.log.trace('no range request detected')
this._isRangeRequest = false
this.requestRangeStart = null
this.requestRangeEnd = null
}
}

/**
* When you get a body, it should be set here, and we will calculate the fileSize if possible.
*/
public setBody (body: SupportedBodyTypes): void {
this._body = body
// if fileSize was already set, don't recalculate it
this.setFileSize(this.fileSize ?? getBodySizeSync(body))

this.log.trace('set request body with fileSize %o', this.fileSize)
}

public getBody (): SupportedBodyTypes {
const body = this._body
if (body == null) {
this.log.trace('body is null')
return body
}

Check warning on line 105 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L103-L105

Added lines #L103 - L105 were not covered by tests
if (!this.isRangeRequest || !this.isValidRangeRequest) {
this.log.trace('returning body unmodified for non-range, or invalid range, request')
return body
}
const byteStart = this.byteStart
const byteEnd = this.byteEnd
const byteSize = this.byteSize
if (byteStart != null || byteEnd != null) {
this.log.trace('returning body with byteStart=%o, byteEnd=%o, byteSize=%o', byteStart, byteEnd, byteSize)
if (body instanceof ReadableStream) {
// stream should already be spliced by `unixfs.cat`
return body
}
return this.getSlicedBody(body)
}

// we should not reach this point, but return body untouched.
this.log.error('returning unmodified body for valid range request')
return body
}

Check warning on line 125 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L121-L125

Added lines #L121 - L125 were not covered by tests

private getSlicedBody <T extends SliceableBody>(body: T): SliceableBody {
if (this.isPrefixLengthRequest) {
this.log.trace('sliced body with byteStart %o', this.byteStart)
return body.slice(this.offset) satisfies SliceableBody
}
if (this.isSuffixLengthRequest && this.length != null) {
this.log.trace('sliced body with length %o', -this.length)
return body.slice(-this.length) satisfies SliceableBody
}
const offset = this.byteStart ?? 0
const length = this.byteEnd == null ? undefined : this.byteEnd + 1
this.log.trace('returning body with offset %o and length %o', offset, length)

return body.slice(offset, length) satisfies SliceableBody
}

private get isSuffixLengthRequest (): boolean {
return this.requestRangeStart == null && this.requestRangeEnd != null
}

private get isPrefixLengthRequest (): boolean {
return this.requestRangeStart != null && this.requestRangeEnd == null
}

/**
* Sometimes, we need to set the fileSize explicitly because we can't calculate
* the size of the body (e.g. for unixfs content where we call .stat).
*
* This fileSize should otherwise only be called from `setBody`, and `.fileSize`
* should not be set directly.
*/
public setFileSize (size: number | bigint | null): void {
this.fileSize = size != null ? Number(size) : null
this.log.trace('set _fileSize to %o', this.fileSize)
// when fileSize changes, we need to recalculate the offset details
this.setOffsetDetails()
}

public get isRangeRequest (): boolean {
return this._isRangeRequest
}

private isValidByteStart (): boolean {
if (this.byteStart != null) {
if (this.byteStart < 0) {
return false
}
if (this.fileSize != null && this.byteStart > this.fileSize) {
return false
}
}
return true
}

private isValidByteEnd (): boolean {
if (this.byteEnd != null) {
if (this.byteEnd < 0) {
return false
}

Check warning on line 185 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L184-L185

Added lines #L184 - L185 were not covered by tests
if (this.fileSize != null && this.byteEnd > this.fileSize) {
return false
}
}
return true
}

public set isValidRangeRequest (val: boolean) {
this._isValidRangeRequest = val
}

public get isValidRangeRequest (): boolean {
if (!this.isValidByteStart()) {
this.log.trace('invalid range request, byteStart is less than 0 or greater than fileSize')
this._isValidRangeRequest = false
} else if (!this.isValidByteEnd()) {
this.log.trace('invalid range request, byteEnd is less than 0 or greater than fileSize')
this._isValidRangeRequest = false
} else if (this.requestRangeEnd != null && this.requestRangeStart != null) {
// we may not have enough info.. base check on requested bytes
if (this.requestRangeStart > this.requestRangeEnd) {
this.log.trace('invalid range request, start is greater than end')
this._isValidRangeRequest = false

Check warning on line 208 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L207-L208

Added lines #L207 - L208 were not covered by tests
} else if (this.requestRangeStart < 0) {
this.log.trace('invalid range request, start is less than 0')
this._isValidRangeRequest = false

Check warning on line 211 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L210-L211

Added lines #L210 - L211 were not covered by tests
} else if (this.requestRangeEnd < 0) {
this.log.trace('invalid range request, end is less than 0')
this._isValidRangeRequest = false
}

Check warning on line 215 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L213-L215

Added lines #L213 - L215 were not covered by tests
}
this._isValidRangeRequest = this._isValidRangeRequest ?? true

return this._isValidRangeRequest
}

/**
* Given all the information we have, this function returns the offset that will be used when:
* 1. calling unixfs.cat
* 2. slicing the body
*/
public get offset (): number {
if (this.byteStart === 0) {
return 0
}
if (this.isPrefixLengthRequest || this.isSuffixLengthRequest) {
if (this.byteStart != null) {
// we have to subtract by 1 because the offset is inclusive
return this.byteStart - 1
}
}

return this.byteStart ?? 0
}

/**
* Given all the information we have, this function returns the length that will be used when:
* 1. calling unixfs.cat
* 2. slicing the body
*/
public get length (): number | undefined {
return this.byteSize ?? undefined
}

/**
* Converts a range request header into helia/unixfs supported range options
* Note that the gateway specification says we "MAY" support multiple ranges (https://specs.ipfs.tech/http-gateways/path-gateway/#range-request-header) but we don't
*
* Also note that @helia/unixfs and ipfs-unixfs-exporter expect length and offset to be numbers, the range header is a string, and the size of the resource is likely a bigint.
*
* SUPPORTED:
* Range: bytes=<range-start>-<range-end>
* Range: bytes=<range-start>-
* Range: bytes=-<suffix-length> // must pass size so we can calculate the offset. suffix-length is the number of bytes from the end of the file.
*
* NOT SUPPORTED:
* Range: bytes=<range-start>-<range-end>, <range-start>-<range-end>
* Range: bytes=<range-start>-<range-end>, <range-start>-<range-end>, <range-start>-<range-end>
*
* @see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Range#directives
*/
private setOffsetDetails (): void {
if (this.requestRangeStart == null && this.requestRangeEnd == null) {
this.log.trace('requestRangeStart and requestRangeEnd are null')
return
}

const { start, end, byteSize } = calculateByteRangeIndexes(this.requestRangeStart ?? undefined, this.requestRangeEnd ?? undefined, this.fileSize ?? undefined)
this.log.trace('set byteStart to %o, byteEnd to %o, byteSize to %o', start, end, byteSize)
this.byteStart = start
this.byteEnd = end
this.byteSize = byteSize
}

/**
* This function returns the values of the "content-range" header.
*
* @see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Range
*
* Returns data to support the following content ranges:
*
* @example
* - Content-Range: <unit> <byteStart>-<byteEnd>/<byteSize>
* - Content-Range: <unit> <byteStart>-<byteEnd>/&#8205;*
SgtPooki marked this conversation as resolved.
Show resolved Hide resolved
*/
// - Content-Range: <unit> */<byteSize> // this is purposefully not in jsdoc block
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@achingbrain is this better than all as single line comments?

public get contentRangeHeaderValue (): string {
if (this._contentRangeHeaderValue != null) {
return this._contentRangeHeaderValue
}

Check warning on line 295 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L294-L295

Added lines #L294 - L295 were not covered by tests
if (!this.isValidRangeRequest) {
this.log.error('cannot get contentRangeHeaderValue for invalid range request')
throw new Error('Invalid range request')
}

Check warning on line 299 in packages/verified-fetch/src/utils/byte-range-context.ts

View check run for this annotation

Codecov / codecov/patch

packages/verified-fetch/src/utils/byte-range-context.ts#L297-L299

Added lines #L297 - L299 were not covered by tests

return getContentRangeHeader({
byteStart: this.byteStart,
byteEnd: this.byteEnd,
byteSize: this.fileSize ?? undefined
})
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ export async function getStreamFromAsyncIterable (iterator: AsyncIterable<Uint8A
const { value: firstChunk, done } = await reader.next()

if (done === true) {
log.error('No content found for path', path)
log.error('no content found for path', path)
throw new Error('No content found')
}

Expand Down
8 changes: 4 additions & 4 deletions packages/verified-fetch/src/utils/parse-url-string.ts
Original file line number Diff line number Diff line change
Expand Up @@ -106,7 +106,7 @@ export async function parseUrlString ({ urlString, ipns, logger }: ParseUrlStrin
log.trace('resolved %s to %c from cache', cidOrPeerIdOrDnsLink, cid)
} else {
// protocol is ipns
log.trace('Attempting to resolve PeerId for %s', cidOrPeerIdOrDnsLink)
log.trace('attempting to resolve PeerId for %s', cidOrPeerIdOrDnsLink)
let peerId = null
try {
peerId = peerIdFromString(cidOrPeerIdOrDnsLink)
Expand All @@ -117,10 +117,10 @@ export async function parseUrlString ({ urlString, ipns, logger }: ParseUrlStrin
ipnsCache.set(cidOrPeerIdOrDnsLink, resolveResult, 60 * 1000 * 2)
} catch (err) {
if (peerId == null) {
log.error('Could not parse PeerId string "%s"', cidOrPeerIdOrDnsLink, err)
log.error('could not parse PeerId string "%s"', cidOrPeerIdOrDnsLink, err)
errors.push(new TypeError(`Could not parse PeerId in ipns url "${cidOrPeerIdOrDnsLink}", ${(err as Error).message}`))
} else {
log.error('Could not resolve PeerId %c', peerId, err)
log.error('could not resolve PeerId %c', peerId, err)
errors.push(new TypeError(`Could not resolve PeerId "${cidOrPeerIdOrDnsLink}", ${(err as Error).message}`))
}
}
Expand All @@ -140,7 +140,7 @@ export async function parseUrlString ({ urlString, ipns, logger }: ParseUrlStrin
log.trace('resolved %s to %c', decodedDnsLinkLabel, cid)
ipnsCache.set(cidOrPeerIdOrDnsLink, resolveResult, 60 * 1000 * 2)
} catch (err: any) {
log.error('Could not resolve DnsLink for "%s"', cidOrPeerIdOrDnsLink, err)
log.error('could not resolve DnsLink for "%s"', cidOrPeerIdOrDnsLink, err)
errors.push(err)
}
}
Expand Down
Loading
Loading