@supraio/client-daemon-js 0.0.0-master.316 → 0.0.0-master.322
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/daemon.html +1 -1
- package/daemon.js +2 -2
- package/package.json +1 -1
- package/screen.html +1 -1
- package/screen.js +2 -2
- package/sdk.js +4 -4
- package/supra-client-daemon.js +395 -342
- package/supra-client-daemon.js.map +1 -1
- package/supra-client-daemon.wasm +0 -0
- package/supra-client-screen.js +420 -353
- package/supra-client-screen.js.map +1 -1
- package/supra-client-screen.wasm +0 -0
package/supra-client-daemon.js
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
(function() {
|
|
3
3
|
|
|
4
|
-
var $goVersion = "go1.19.
|
|
4
|
+
var $goVersion = "go1.19.13";
|
|
5
5
|
Error.stackTraceLimit = Infinity;
|
|
6
6
|
|
|
7
7
|
var $NaN = NaN;
|
|
@@ -107238,7 +107238,7 @@ $packages["vendor/golang.org/x/crypto/hkdf"] = (function() {
|
|
|
107238
107238
|
return $pkg;
|
|
107239
107239
|
})();
|
|
107240
107240
|
$packages["crypto/tls"] = (function() {
|
|
107241
|
-
var $pkg = {}, $init, bytes, list, context, crypto, aes, cipher, des, ecdsa, ed25519, elliptic, hmac, boring, md5, rand, rc4, rsa, sha1, sha256, sha512, subtle, x509, binary, pem, errors, fmt, hash, cpu, io, big, net, os, runtime, strconv, strings, sync, atomic, time, chacha20poly1305, cryptobyte, curve25519, hkdf, listener, Dialer, sessionState, sessionStateTLS13, finishedHash, ecdheParameters, nistParameters, x25519Parameters, keyAgreement, rsaKeyAgreement, ecdheKeyAgreement, serverHandshakeStateTLS13, serverHandshakeState, marshalingFunction, clientHelloMsg, serverHelloMsg, encryptedExtensionsMsg, endOfEarlyDataMsg, keyUpdateMsg, newSessionTicketMsgTLS13, certificateRequestMsgTLS13, certificateMsg, certificateMsgTLS13, serverKeyExchangeMsg, certificateStatusMsg, serverHelloDoneMsg, clientKeyExchangeMsg, finishedMsg, certificateRequestMsg, certificateVerifyMsg, newSessionTicketMsg, helloRequestMsg, transcriptHash, clientHandshakeStateTLS13, clientHandshakeState, Conn, halfConn, permanentError, cbcMode, RecordHeaderError, atLeastReader, recordType, CurveID, keyShare, pskIdentity, ConnectionState, ClientAuthType, ClientSessionState, ClientSessionCache, SignatureScheme, ClientHelloInfo, CertificateRequestInfo, RenegotiationSupport, Config, ticketKey, Certificate, handshakeMessage, cipherSuite, cipherSuiteTLS13, aead, prefixNonceAEAD, xorNonceAEAD, constantTimeHash, cthWrapper, alert, binaryMarshaler, sliceType, sliceType$1, ptrType, sliceType$2, sliceType$3, arrayType, sliceType$4, sliceType$5, sliceType$6, sliceType$7, ptrType$1, ptrType$2, sliceType$8, ptrType$3, sliceType$9, structType, sliceType$10, ptrType$4, sliceType$11, ptrType$5, sliceType$12, sliceType$13, arrayType$1, arrayType$2, arrayType$3, arrayType$4, ptrType$6, ptrType$7, ptrType$8, ptrType$9, ptrType$10, ptrType$11, ptrType$12, ptrType$13, ptrType$14, ptrType$15, ptrType$16, ptrType$17, ptrType$18, ptrType$19, ptrType$20, ptrType$21, ptrType$22, ptrType$23, ptrType$24, ptrType$25, ptrType$26, ptrType$27, ptrType$28, ptrType$29, ptrType$30, ptrType$31, ptrType$32, ptrType$33, ptrType$34, sliceType$14, sliceType$15, sliceType$16, ptrType$35, ptrType$36, ptrType$37, ptrType$38, ptrType$39, ptrType$40, ptrType$41, arrayType$5, ptrType$42, arrayType$6, ptrType$43, ptrType$44, ptrType$45, ptrType$46, structType$1, arrayType$7, ptrType$51, ptrType$52, ptrType$53, ptrType$54, ptrType$55, funcType, ptrType$56, ptrType$57, ptrType$58, ptrType$59, ptrType$60, ptrType$61, ptrType$62, ptrType$63, ptrType$64, funcType$1, funcType$2, ptrType$65, ptrType$66, ptrType$67, ptrType$68, ptrType$69, sliceType$18, funcType$3, mapType, funcType$4, funcType$5, funcType$6, funcType$7, funcType$8, funcType$9, funcType$10, funcType$11, funcType$12, ptrType$71, ptrType$72, ptrType$73, masterSecretLabel, keyExpansionLabel, clientFinishedLabel, serverFinishedLabel, fipsSupportedSignatureAlgorithms, errClientKeyExchange, errServerKeyExchange, testingOnlyForceClientHelloSignatureAlgorithms, outBufPool, errShutdown, errEarlyCloseWrite, _SignatureScheme_index_8, _CurveID_index_0, _ClientAuthType_index, directSigning, defaultSupportedSignatureAlgorithms, helloRetryRequestRandom, testingOnlyForceDowngradeCanary, deprecatedSessionTicketKey, supportedVersions, defaultCurvePreferences, errNoCertificates, writerMutex, emptyConfig, emptyConfig$24ptr, cipherSuites, cipherSuitesTLS13, cipherSuitesPreferenceOrder, cipherSuitesPreferenceOrderNoAES, disabledCipherSuites, defaultCipherSuitesLen, defaultCipherSuites, defaultCipherSuitesTLS13, defaultCipherSuitesTLS13NoAES, hasGCMAsmAMD64, hasGCMAsmARM64, hasGCMAsmS390X, hasAESGCMHardwareSupport, aesgcmCiphers, signaturePadding, rsaSignatureSchemes, alertText, Server, Client, NewListener, dial, LoadX509KeyPair, X509KeyPair, parsePrivateKey, splitPreMasterSecret, pHash, prf10, prf12, prfAndHashForVersion, prfForVersion, masterFromPreMasterSecret, keysFromMasterSecret, newFinishedHash, noExportedKeyingMaterial, ekmFromMasterSecret, needFIPS, supportedSignatureAlgorithms, fipsMinVersion, fipsMaxVersion, fipsCurvePreferences, fipsCipherSuites, generateECDHEParameters, curveForCurveID, sha1Hash, md5SHA1Hash, hashForServerKeyExchange, cloneHash, illegalClientHelloChange, negotiateALPN, supportsECDHE, clientHelloInfo, addBytesWithLength, addUint64, readUint64, readUint8LengthPrefixed, readUint16LengthPrefixed, readUint24LengthPrefixed, marshalCertificate, unmarshalCertificate, transcriptMsg, checkALPN, certificateRequestInfoFromMsg, clientSessionCacheKey, hostnameInSNI, extractPadding, roundUp, sliceForAppend, requiresClientCert, supportedVersionsFromMax, defaultConfig, unexpectedMessageError, isSupportedSignatureAlgorithm, selectCipherSuite, aesgcmPreferred, cipherRC4, cipher3DES, cipherAES, macSHA1, macSHA256, aeadAESGCM, aeadAESGCMTLS13, aeadChaCha20Poly1305, newConstantTimeHash, tls10MAC, rsaKA, ecdheECDSAKA, ecdheRSAKA, mutualCipherSuite, cipherSuiteByID, mutualCipherSuiteTLS13, cipherSuiteTLS13ByID, verifyHandshakeSignature, signedMessage, typeAndHashFromSignatureScheme, legacyTypeAndHashFromPublicKey, signatureSchemesForCertificate, selectSignatureScheme, unsupportedCertificateError;
|
|
107241
|
+
var $pkg = {}, $init, bytes, list, context, crypto, aes, cipher, des, ecdsa, ed25519, elliptic, hmac, boring, md5, rand, rc4, rsa, sha1, sha256, sha512, subtle, x509, binary, pem, errors, fmt, hash, cpu, godebug, io, big, net, os, runtime, strconv, strings, sync, atomic, time, chacha20poly1305, cryptobyte, curve25519, hkdf, listener, Dialer, sessionState, sessionStateTLS13, finishedHash, ecdheParameters, nistParameters, x25519Parameters, keyAgreement, rsaKeyAgreement, ecdheKeyAgreement, serverHandshakeStateTLS13, serverHandshakeState, marshalingFunction, clientHelloMsg, serverHelloMsg, encryptedExtensionsMsg, endOfEarlyDataMsg, keyUpdateMsg, newSessionTicketMsgTLS13, certificateRequestMsgTLS13, certificateMsg, certificateMsgTLS13, serverKeyExchangeMsg, certificateStatusMsg, serverHelloDoneMsg, clientKeyExchangeMsg, finishedMsg, certificateRequestMsg, certificateVerifyMsg, newSessionTicketMsg, helloRequestMsg, transcriptHash, clientHandshakeStateTLS13, clientHandshakeState, Conn, halfConn, permanentError, cbcMode, RecordHeaderError, atLeastReader, recordType, CurveID, keyShare, pskIdentity, ConnectionState, ClientAuthType, ClientSessionState, ClientSessionCache, SignatureScheme, ClientHelloInfo, CertificateRequestInfo, RenegotiationSupport, Config, ticketKey, Certificate, handshakeMessage, cipherSuite, cipherSuiteTLS13, aead, prefixNonceAEAD, xorNonceAEAD, constantTimeHash, cthWrapper, alert, binaryMarshaler, sliceType, sliceType$1, ptrType, sliceType$2, sliceType$3, arrayType, sliceType$4, sliceType$5, sliceType$6, sliceType$7, ptrType$1, ptrType$2, sliceType$8, ptrType$3, sliceType$9, structType, sliceType$10, ptrType$4, sliceType$11, ptrType$5, sliceType$12, sliceType$13, arrayType$1, arrayType$2, arrayType$3, arrayType$4, ptrType$6, ptrType$7, ptrType$8, ptrType$9, ptrType$10, ptrType$11, ptrType$12, ptrType$13, ptrType$14, ptrType$15, ptrType$16, ptrType$17, ptrType$18, ptrType$19, ptrType$20, ptrType$21, ptrType$22, ptrType$23, ptrType$24, ptrType$25, ptrType$26, ptrType$27, ptrType$28, ptrType$29, ptrType$30, ptrType$31, ptrType$32, ptrType$33, ptrType$34, sliceType$14, sliceType$15, sliceType$16, ptrType$35, ptrType$36, ptrType$37, ptrType$38, ptrType$39, ptrType$40, ptrType$41, arrayType$5, ptrType$42, arrayType$6, ptrType$43, ptrType$44, ptrType$45, ptrType$46, structType$1, arrayType$7, ptrType$51, ptrType$52, ptrType$53, ptrType$54, ptrType$55, funcType, ptrType$56, ptrType$57, ptrType$58, ptrType$59, ptrType$60, ptrType$61, ptrType$62, ptrType$63, ptrType$64, funcType$1, funcType$2, ptrType$65, ptrType$66, ptrType$67, ptrType$68, ptrType$69, sliceType$18, funcType$3, mapType, funcType$4, funcType$5, funcType$6, funcType$7, funcType$8, funcType$9, funcType$10, funcType$11, funcType$12, ptrType$71, ptrType$72, ptrType$73, masterSecretLabel, keyExpansionLabel, clientFinishedLabel, serverFinishedLabel, fipsSupportedSignatureAlgorithms, errClientKeyExchange, errServerKeyExchange, testingOnlyForceClientHelloSignatureAlgorithms, outBufPool, errShutdown, errEarlyCloseWrite, _SignatureScheme_index_8, _CurveID_index_0, _ClientAuthType_index, directSigning, defaultSupportedSignatureAlgorithms, helloRetryRequestRandom, testingOnlyForceDowngradeCanary, deprecatedSessionTicketKey, supportedVersions, defaultCurvePreferences, errNoCertificates, writerMutex, emptyConfig, emptyConfig$24ptr, cipherSuites, cipherSuitesTLS13, cipherSuitesPreferenceOrder, cipherSuitesPreferenceOrderNoAES, disabledCipherSuites, defaultCipherSuitesLen, defaultCipherSuites, defaultCipherSuitesTLS13, defaultCipherSuitesTLS13NoAES, hasGCMAsmAMD64, hasGCMAsmARM64, hasGCMAsmS390X, hasAESGCMHardwareSupport, aesgcmCiphers, signaturePadding, rsaSignatureSchemes, alertText, Server, Client, NewListener, dial, LoadX509KeyPair, X509KeyPair, parsePrivateKey, splitPreMasterSecret, pHash, prf10, prf12, prfAndHashForVersion, prfForVersion, masterFromPreMasterSecret, keysFromMasterSecret, newFinishedHash, noExportedKeyingMaterial, ekmFromMasterSecret, needFIPS, supportedSignatureAlgorithms, fipsMinVersion, fipsMaxVersion, fipsCurvePreferences, fipsCipherSuites, generateECDHEParameters, curveForCurveID, sha1Hash, md5SHA1Hash, hashForServerKeyExchange, cloneHash, illegalClientHelloChange, negotiateALPN, supportsECDHE, clientHelloInfo, addBytesWithLength, addUint64, readUint64, readUint8LengthPrefixed, readUint16LengthPrefixed, readUint24LengthPrefixed, marshalCertificate, unmarshalCertificate, transcriptMsg, checkALPN, checkKeySize, certificateRequestInfoFromMsg, clientSessionCacheKey, hostnameInSNI, extractPadding, roundUp, sliceForAppend, requiresClientCert, supportedVersionsFromMax, defaultConfig, unexpectedMessageError, isSupportedSignatureAlgorithm, selectCipherSuite, aesgcmPreferred, cipherRC4, cipher3DES, cipherAES, macSHA1, macSHA256, aeadAESGCM, aeadAESGCMTLS13, aeadChaCha20Poly1305, newConstantTimeHash, tls10MAC, rsaKA, ecdheECDSAKA, ecdheRSAKA, mutualCipherSuite, cipherSuiteByID, mutualCipherSuiteTLS13, cipherSuiteTLS13ByID, verifyHandshakeSignature, signedMessage, typeAndHashFromSignatureScheme, legacyTypeAndHashFromPublicKey, signatureSchemesForCertificate, selectSignatureScheme, unsupportedCertificateError;
|
|
107242
107242
|
bytes = $packages["bytes"];
|
|
107243
107243
|
list = $packages["container/list"];
|
|
107244
107244
|
context = $packages["context"];
|
|
@@ -107266,6 +107266,7 @@ $packages["crypto/tls"] = (function() {
|
|
|
107266
107266
|
fmt = $packages["fmt"];
|
|
107267
107267
|
hash = $packages["hash"];
|
|
107268
107268
|
cpu = $packages["internal/cpu"];
|
|
107269
|
+
godebug = $packages["internal/godebug"];
|
|
107269
107270
|
io = $packages["io"];
|
|
107270
107271
|
big = $packages["math/big"];
|
|
107271
107272
|
net = $packages["net"];
|
|
@@ -112133,7 +112134,7 @@ $packages["crypto/tls"] = (function() {
|
|
|
112133
112134
|
};
|
|
112134
112135
|
serverHandshakeState.prototype.sendFinished = function(out) { return this.$val.sendFinished(out); };
|
|
112135
112136
|
Conn.ptr.prototype.processCertsFromClient = function(certificate) {
|
|
112136
|
-
var {$24r, $24r$1, $24r$2, _i, _i$1, _r, _r$1, _r$10, _r$11, _r$12, _r$13, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _ref, _ref$1, _ref$2, _tuple, _tuple$1, asn1Data, c, cert, certificate, certificates, certs, chains, err, err$1, err$2, i, opts, $s, $r, $c} = $restore(this, {certificate});
|
|
112137
|
+
var {$24r, $24r$1, $24r$2, $24r$3, _i, _i$1, _r, _r$1, _r$10, _r$11, _r$12, _r$13, _r$14, _r$15, _r$16, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _ref, _ref$1, _ref$2, _tuple, _tuple$1, _tuple$2, asn1Data, c, cert, certificate, certificates, certs, chains, err, err$1, err$2, i, max, n, ok, opts, $s, $r, $c} = $restore(this, {certificate});
|
|
112137
112138
|
/* */ $s = $s || 0; s: while (true) { switch ($s) { case 0:
|
|
112138
112139
|
c = this;
|
|
112139
112140
|
certificates = certificate.Certificate;
|
|
@@ -112159,21 +112160,39 @@ $packages["crypto/tls"] = (function() {
|
|
|
112159
112160
|
$24r = _r$3;
|
|
112160
112161
|
$s = 9; case 9: return $24r;
|
|
112161
112162
|
/* } */ case 5:
|
|
112163
|
+
/* */ if (((i < 0 || i >= certs.$length) ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + i]).PublicKeyAlgorithm === 1) { $s = 10; continue; }
|
|
112164
|
+
/* */ $s = 11; continue;
|
|
112165
|
+
/* if (((i < 0 || i >= certs.$length) ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + i]).PublicKeyAlgorithm === 1) { */ case 10:
|
|
112166
|
+
n = $assertType(((i < 0 || i >= certs.$length) ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + i]).PublicKey, ptrType$11).N.BitLen();
|
|
112167
|
+
_r$4 = checkKeySize(n); /* */ $s = 12; case 12: if($c) { $c = false; _r$4 = _r$4.$blk(); } if (_r$4 && _r$4.$blk !== undefined) { break s; }
|
|
112168
|
+
_tuple$1 = _r$4;
|
|
112169
|
+
max = _tuple$1[0];
|
|
112170
|
+
ok = _tuple$1[1];
|
|
112171
|
+
/* */ if (!ok) { $s = 13; continue; }
|
|
112172
|
+
/* */ $s = 14; continue;
|
|
112173
|
+
/* if (!ok) { */ case 13:
|
|
112174
|
+
_r$5 = c.sendAlert(42); /* */ $s = 15; case 15: if($c) { $c = false; _r$5 = _r$5.$blk(); } if (_r$5 && _r$5.$blk !== undefined) { break s; }
|
|
112175
|
+
_r$5;
|
|
112176
|
+
_r$6 = fmt.Errorf("tls: client sent certificate containing RSA key larger than %d bits", new sliceType$7([new $Int(max)])); /* */ $s = 16; case 16: if($c) { $c = false; _r$6 = _r$6.$blk(); } if (_r$6 && _r$6.$blk !== undefined) { break s; }
|
|
112177
|
+
$24r$1 = _r$6;
|
|
112178
|
+
$s = 17; case 17: return $24r$1;
|
|
112179
|
+
/* } */ case 14:
|
|
112180
|
+
/* } */ case 11:
|
|
112162
112181
|
_i++;
|
|
112163
112182
|
$s = 1; continue;
|
|
112164
112183
|
case 2:
|
|
112165
|
-
/* */ if ((certs.$length === 0) && requiresClientCert(c.config.ClientAuth)) { $s =
|
|
112166
|
-
/* */ $s =
|
|
112167
|
-
/* if ((certs.$length === 0) && requiresClientCert(c.config.ClientAuth)) { */ case
|
|
112168
|
-
_r$
|
|
112169
|
-
_r$
|
|
112184
|
+
/* */ if ((certs.$length === 0) && requiresClientCert(c.config.ClientAuth)) { $s = 18; continue; }
|
|
112185
|
+
/* */ $s = 19; continue;
|
|
112186
|
+
/* if ((certs.$length === 0) && requiresClientCert(c.config.ClientAuth)) { */ case 18:
|
|
112187
|
+
_r$7 = c.sendAlert(42); /* */ $s = 20; case 20: if($c) { $c = false; _r$7 = _r$7.$blk(); } if (_r$7 && _r$7.$blk !== undefined) { break s; }
|
|
112188
|
+
_r$7;
|
|
112170
112189
|
$s = -1; return errors.New("tls: client didn't provide a certificate");
|
|
112171
|
-
/* } */ case
|
|
112172
|
-
/* */ if (c.config.ClientAuth >= 3 && certs.$length > 0) { $s =
|
|
112173
|
-
/* */ $s =
|
|
112174
|
-
/* if (c.config.ClientAuth >= 3 && certs.$length > 0) { */ case
|
|
112175
|
-
_r$
|
|
112176
|
-
opts = new x509.VerifyOptions.ptr("", x509.NewCertPool(), c.config.ClientCAs, $clone(_r$
|
|
112190
|
+
/* } */ case 19:
|
|
112191
|
+
/* */ if (c.config.ClientAuth >= 3 && certs.$length > 0) { $s = 21; continue; }
|
|
112192
|
+
/* */ $s = 22; continue;
|
|
112193
|
+
/* if (c.config.ClientAuth >= 3 && certs.$length > 0) { */ case 21:
|
|
112194
|
+
_r$8 = c.config.time(); /* */ $s = 23; case 23: if($c) { $c = false; _r$8 = _r$8.$blk(); } if (_r$8 && _r$8.$blk !== undefined) { break s; }
|
|
112195
|
+
opts = new x509.VerifyOptions.ptr("", x509.NewCertPool(), c.config.ClientCAs, $clone(_r$8, time.Time), new sliceType$14([2]), 0);
|
|
112177
112196
|
_ref$1 = $subslice(certs, 1);
|
|
112178
112197
|
_i$1 = 0;
|
|
112179
112198
|
while (true) {
|
|
@@ -112182,56 +112201,56 @@ $packages["crypto/tls"] = (function() {
|
|
|
112182
112201
|
opts.Intermediates.AddCert(cert);
|
|
112183
112202
|
_i$1++;
|
|
112184
112203
|
}
|
|
112185
|
-
_r$
|
|
112186
|
-
_tuple$
|
|
112187
|
-
chains = _tuple$
|
|
112188
|
-
err$1 = _tuple$
|
|
112189
|
-
/* */ if (!($interfaceIsEqual(err$1, $ifaceNil))) { $s =
|
|
112190
|
-
/* */ $s =
|
|
112191
|
-
/* if (!($interfaceIsEqual(err$1, $ifaceNil))) { */ case
|
|
112192
|
-
_r$
|
|
112193
|
-
_r$
|
|
112194
|
-
_r$
|
|
112195
|
-
_r$
|
|
112196
|
-
$24r$
|
|
112197
|
-
$s =
|
|
112198
|
-
/* } */ case
|
|
112204
|
+
_r$9 = (0 >= certs.$length ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + 0]).Verify($clone(opts, x509.VerifyOptions)); /* */ $s = 24; case 24: if($c) { $c = false; _r$9 = _r$9.$blk(); } if (_r$9 && _r$9.$blk !== undefined) { break s; }
|
|
112205
|
+
_tuple$2 = _r$9;
|
|
112206
|
+
chains = _tuple$2[0];
|
|
112207
|
+
err$1 = _tuple$2[1];
|
|
112208
|
+
/* */ if (!($interfaceIsEqual(err$1, $ifaceNil))) { $s = 25; continue; }
|
|
112209
|
+
/* */ $s = 26; continue;
|
|
112210
|
+
/* if (!($interfaceIsEqual(err$1, $ifaceNil))) { */ case 25:
|
|
112211
|
+
_r$10 = c.sendAlert(42); /* */ $s = 27; case 27: if($c) { $c = false; _r$10 = _r$10.$blk(); } if (_r$10 && _r$10.$blk !== undefined) { break s; }
|
|
112212
|
+
_r$10;
|
|
112213
|
+
_r$11 = err$1.Error(); /* */ $s = 28; case 28: if($c) { $c = false; _r$11 = _r$11.$blk(); } if (_r$11 && _r$11.$blk !== undefined) { break s; }
|
|
112214
|
+
_r$12 = errors.New("tls: failed to verify client certificate: " + _r$11); /* */ $s = 29; case 29: if($c) { $c = false; _r$12 = _r$12.$blk(); } if (_r$12 && _r$12.$blk !== undefined) { break s; }
|
|
112215
|
+
$24r$2 = _r$12;
|
|
112216
|
+
$s = 30; case 30: return $24r$2;
|
|
112217
|
+
/* } */ case 26:
|
|
112199
112218
|
c.verifiedChains = chains;
|
|
112200
|
-
/* } */ case
|
|
112219
|
+
/* } */ case 22:
|
|
112201
112220
|
c.peerCertificates = certs;
|
|
112202
112221
|
c.ocspResponse = certificate.OCSPStaple;
|
|
112203
112222
|
c.scts = certificate.SignedCertificateTimestamps;
|
|
112204
|
-
/* */ if (certs.$length > 0) { $s =
|
|
112205
|
-
/* */ $s = 24; continue;
|
|
112206
|
-
/* if (certs.$length > 0) { */ case 23:
|
|
112207
|
-
_ref$2 = (0 >= certs.$length ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + 0]).PublicKey;
|
|
112208
|
-
/* */ if ($assertType(_ref$2, ptrType$12, true)[1] || $assertType(_ref$2, ptrType$11, true)[1] || $assertType(_ref$2, ed25519.PublicKey, true)[1]) { $s = 25; continue; }
|
|
112209
|
-
/* */ $s = 26; continue;
|
|
112210
|
-
/* if ($assertType(_ref$2, ptrType$12, true)[1] || $assertType(_ref$2, ptrType$11, true)[1] || $assertType(_ref$2, ed25519.PublicKey, true)[1]) { */ case 25:
|
|
112211
|
-
$s = 27; continue;
|
|
112212
|
-
/* } else { */ case 26:
|
|
112213
|
-
_r$10 = c.sendAlert(43); /* */ $s = 28; case 28: if($c) { $c = false; _r$10 = _r$10.$blk(); } if (_r$10 && _r$10.$blk !== undefined) { break s; }
|
|
112214
|
-
_r$10;
|
|
112215
|
-
_r$11 = fmt.Errorf("tls: client certificate contains an unsupported public key of type %T", new sliceType$7([(0 >= certs.$length ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + 0]).PublicKey])); /* */ $s = 29; case 29: if($c) { $c = false; _r$11 = _r$11.$blk(); } if (_r$11 && _r$11.$blk !== undefined) { break s; }
|
|
112216
|
-
$24r$2 = _r$11;
|
|
112217
|
-
$s = 30; case 30: return $24r$2;
|
|
112218
|
-
/* } */ case 27:
|
|
112219
|
-
/* } */ case 24:
|
|
112220
|
-
/* */ if (!(c.config.VerifyPeerCertificate === $throwNilPointerError)) { $s = 31; continue; }
|
|
112223
|
+
/* */ if (certs.$length > 0) { $s = 31; continue; }
|
|
112221
112224
|
/* */ $s = 32; continue;
|
|
112222
|
-
/* if (
|
|
112223
|
-
|
|
112224
|
-
|
|
112225
|
-
/* */
|
|
112226
|
-
/*
|
|
112227
|
-
|
|
112228
|
-
|
|
112225
|
+
/* if (certs.$length > 0) { */ case 31:
|
|
112226
|
+
_ref$2 = (0 >= certs.$length ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + 0]).PublicKey;
|
|
112227
|
+
/* */ if ($assertType(_ref$2, ptrType$12, true)[1] || $assertType(_ref$2, ptrType$11, true)[1] || $assertType(_ref$2, ed25519.PublicKey, true)[1]) { $s = 33; continue; }
|
|
112228
|
+
/* */ $s = 34; continue;
|
|
112229
|
+
/* if ($assertType(_ref$2, ptrType$12, true)[1] || $assertType(_ref$2, ptrType$11, true)[1] || $assertType(_ref$2, ed25519.PublicKey, true)[1]) { */ case 33:
|
|
112230
|
+
$s = 35; continue;
|
|
112231
|
+
/* } else { */ case 34:
|
|
112232
|
+
_r$13 = c.sendAlert(43); /* */ $s = 36; case 36: if($c) { $c = false; _r$13 = _r$13.$blk(); } if (_r$13 && _r$13.$blk !== undefined) { break s; }
|
|
112229
112233
|
_r$13;
|
|
112230
|
-
$s =
|
|
112234
|
+
_r$14 = fmt.Errorf("tls: client certificate contains an unsupported public key of type %T", new sliceType$7([(0 >= certs.$length ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + 0]).PublicKey])); /* */ $s = 37; case 37: if($c) { $c = false; _r$14 = _r$14.$blk(); } if (_r$14 && _r$14.$blk !== undefined) { break s; }
|
|
112235
|
+
$24r$3 = _r$14;
|
|
112236
|
+
$s = 38; case 38: return $24r$3;
|
|
112231
112237
|
/* } */ case 35:
|
|
112232
112238
|
/* } */ case 32:
|
|
112239
|
+
/* */ if (!(c.config.VerifyPeerCertificate === $throwNilPointerError)) { $s = 39; continue; }
|
|
112240
|
+
/* */ $s = 40; continue;
|
|
112241
|
+
/* if (!(c.config.VerifyPeerCertificate === $throwNilPointerError)) { */ case 39:
|
|
112242
|
+
_r$15 = c.config.VerifyPeerCertificate(certificates, c.verifiedChains); /* */ $s = 41; case 41: if($c) { $c = false; _r$15 = _r$15.$blk(); } if (_r$15 && _r$15.$blk !== undefined) { break s; }
|
|
112243
|
+
err$2 = _r$15;
|
|
112244
|
+
/* */ if (!($interfaceIsEqual(err$2, $ifaceNil))) { $s = 42; continue; }
|
|
112245
|
+
/* */ $s = 43; continue;
|
|
112246
|
+
/* if (!($interfaceIsEqual(err$2, $ifaceNil))) { */ case 42:
|
|
112247
|
+
_r$16 = c.sendAlert(42); /* */ $s = 44; case 44: if($c) { $c = false; _r$16 = _r$16.$blk(); } if (_r$16 && _r$16.$blk !== undefined) { break s; }
|
|
112248
|
+
_r$16;
|
|
112249
|
+
$s = -1; return err$2;
|
|
112250
|
+
/* } */ case 43:
|
|
112251
|
+
/* } */ case 40:
|
|
112233
112252
|
$s = -1; return $ifaceNil;
|
|
112234
|
-
/* */ } return; } var $f = {$blk: Conn.ptr.prototype.processCertsFromClient, $c: true, $r, $24r, $24r$1, $24r$2, _i, _i$1, _r, _r$1, _r$10, _r$11, _r$12, _r$13, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _ref, _ref$1, _ref$2, _tuple, _tuple$1, asn1Data, c, cert, certificate, certificates, certs, chains, err, err$1, err$2, i, opts, $s};return $f;
|
|
112253
|
+
/* */ } return; } var $f = {$blk: Conn.ptr.prototype.processCertsFromClient, $c: true, $r, $24r, $24r$1, $24r$2, $24r$3, _i, _i$1, _r, _r$1, _r$10, _r$11, _r$12, _r$13, _r$14, _r$15, _r$16, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _ref, _ref$1, _ref$2, _tuple, _tuple$1, _tuple$2, asn1Data, c, cert, certificate, certificates, certs, chains, err, err$1, err$2, i, max, n, ok, opts, $s};return $f;
|
|
112235
112254
|
};
|
|
112236
112255
|
Conn.prototype.processCertsFromClient = function(certificate) { return this.$val.processCertsFromClient(certificate); };
|
|
112237
112256
|
clientHelloInfo = function(ctx, c, clientHello) {
|
|
@@ -116499,8 +116518,34 @@ $packages["crypto/tls"] = (function() {
|
|
|
116499
116518
|
/* */ } return; } var $f = {$blk: clientHandshakeState.ptr.prototype.sendFinished, $c: true, $r, _r, _r$1, _r$2, _tuple, c, err, err$1, finished, hs, out, $s};return $f;
|
|
116500
116519
|
};
|
|
116501
116520
|
clientHandshakeState.prototype.sendFinished = function(out) { return this.$val.sendFinished(out); };
|
|
116521
|
+
checkKeySize = function(n) {
|
|
116522
|
+
var {_r, _tmp, _tmp$1, _tmp$2, _tmp$3, _tuple, err, max, max$1, n, ok, v, $s, $r, $c} = $restore(this, {n});
|
|
116523
|
+
/* */ $s = $s || 0; s: while (true) { switch ($s) { case 0:
|
|
116524
|
+
max = 0;
|
|
116525
|
+
ok = false;
|
|
116526
|
+
_r = godebug.Get("tlsmaxrsasize"); /* */ $s = 1; case 1: if($c) { $c = false; _r = _r.$blk(); } if (_r && _r.$blk !== undefined) { break s; }
|
|
116527
|
+
v = _r;
|
|
116528
|
+
if (!(v === "")) {
|
|
116529
|
+
_tuple = strconv.Atoi(v);
|
|
116530
|
+
max$1 = _tuple[0];
|
|
116531
|
+
err = _tuple[1];
|
|
116532
|
+
if ($interfaceIsEqual(err, $ifaceNil)) {
|
|
116533
|
+
_tmp = max$1;
|
|
116534
|
+
_tmp$1 = n <= max$1;
|
|
116535
|
+
max = _tmp;
|
|
116536
|
+
ok = _tmp$1;
|
|
116537
|
+
$s = -1; return [max, ok];
|
|
116538
|
+
}
|
|
116539
|
+
}
|
|
116540
|
+
_tmp$2 = 8192;
|
|
116541
|
+
_tmp$3 = n <= 8192;
|
|
116542
|
+
max = _tmp$2;
|
|
116543
|
+
ok = _tmp$3;
|
|
116544
|
+
$s = -1; return [max, ok];
|
|
116545
|
+
/* */ } return; } var $f = {$blk: checkKeySize, $c: true, $r, _r, _tmp, _tmp$1, _tmp$2, _tmp$3, _tuple, err, max, max$1, n, ok, v, $s};return $f;
|
|
116546
|
+
};
|
|
116502
116547
|
Conn.ptr.prototype.verifyServerCertificate = function(certificates) {
|
|
116503
|
-
var {$24r, $24r$1, _i, _i$1, _r, _r$1, _r$10, _r$11, _r$12, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _ref, _ref$1, _ref$2, _tuple, _tuple$1, asn1Data, c, cert, cert$1, certificates, certs, err, err$1, err$2, err$3, i, opts, $s, $r, $c} = $restore(this, {certificates});
|
|
116548
|
+
var {$24r, $24r$1, $24r$2, _i, _i$1, _r, _r$1, _r$10, _r$11, _r$12, _r$13, _r$14, _r$15, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _ref, _ref$1, _ref$2, _tuple, _tuple$1, _tuple$2, asn1Data, c, cert, cert$1, certificates, certs, err, err$1, err$2, err$3, i, max, n, ok, opts, $s, $r, $c} = $restore(this, {certificates});
|
|
116504
116549
|
/* */ $s = $s || 0; s: while (true) { switch ($s) { case 0:
|
|
116505
116550
|
c = this;
|
|
116506
116551
|
certs = $makeSlice(sliceType$12, certificates.$length);
|
|
@@ -116524,15 +116569,33 @@ $packages["crypto/tls"] = (function() {
|
|
|
116524
116569
|
$24r = _r$3;
|
|
116525
116570
|
$s = 9; case 9: return $24r;
|
|
116526
116571
|
/* } */ case 5:
|
|
116572
|
+
/* */ if (cert.PublicKeyAlgorithm === 1) { $s = 10; continue; }
|
|
116573
|
+
/* */ $s = 11; continue;
|
|
116574
|
+
/* if (cert.PublicKeyAlgorithm === 1) { */ case 10:
|
|
116575
|
+
n = $assertType(cert.PublicKey, ptrType$11).N.BitLen();
|
|
116576
|
+
_r$4 = checkKeySize(n); /* */ $s = 12; case 12: if($c) { $c = false; _r$4 = _r$4.$blk(); } if (_r$4 && _r$4.$blk !== undefined) { break s; }
|
|
116577
|
+
_tuple$1 = _r$4;
|
|
116578
|
+
max = _tuple$1[0];
|
|
116579
|
+
ok = _tuple$1[1];
|
|
116580
|
+
/* */ if (!ok) { $s = 13; continue; }
|
|
116581
|
+
/* */ $s = 14; continue;
|
|
116582
|
+
/* if (!ok) { */ case 13:
|
|
116583
|
+
_r$5 = c.sendAlert(42); /* */ $s = 15; case 15: if($c) { $c = false; _r$5 = _r$5.$blk(); } if (_r$5 && _r$5.$blk !== undefined) { break s; }
|
|
116584
|
+
_r$5;
|
|
116585
|
+
_r$6 = fmt.Errorf("tls: server sent certificate containing RSA key larger than %d bits", new sliceType$7([new $Int(max)])); /* */ $s = 16; case 16: if($c) { $c = false; _r$6 = _r$6.$blk(); } if (_r$6 && _r$6.$blk !== undefined) { break s; }
|
|
116586
|
+
$24r$1 = _r$6;
|
|
116587
|
+
$s = 17; case 17: return $24r$1;
|
|
116588
|
+
/* } */ case 14:
|
|
116589
|
+
/* } */ case 11:
|
|
116527
116590
|
((i < 0 || i >= certs.$length) ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + i] = cert);
|
|
116528
116591
|
_i++;
|
|
116529
116592
|
$s = 1; continue;
|
|
116530
116593
|
case 2:
|
|
116531
|
-
/* */ if (!c.config.InsecureSkipVerify) { $s =
|
|
116532
|
-
/* */ $s =
|
|
116533
|
-
/* if (!c.config.InsecureSkipVerify) { */ case
|
|
116534
|
-
_r$
|
|
116535
|
-
opts = new x509.VerifyOptions.ptr(c.config.ServerName, x509.NewCertPool(), c.config.RootCAs, $clone(_r$
|
|
116594
|
+
/* */ if (!c.config.InsecureSkipVerify) { $s = 18; continue; }
|
|
116595
|
+
/* */ $s = 19; continue;
|
|
116596
|
+
/* if (!c.config.InsecureSkipVerify) { */ case 18:
|
|
116597
|
+
_r$7 = c.config.time(); /* */ $s = 20; case 20: if($c) { $c = false; _r$7 = _r$7.$blk(); } if (_r$7 && _r$7.$blk !== undefined) { break s; }
|
|
116598
|
+
opts = new x509.VerifyOptions.ptr(c.config.ServerName, x509.NewCertPool(), c.config.RootCAs, $clone(_r$7, time.Time), sliceType$14.nil, 0);
|
|
116536
116599
|
_ref$1 = $subslice(certs, 1);
|
|
116537
116600
|
_i$1 = 0;
|
|
116538
116601
|
while (true) {
|
|
@@ -116542,60 +116605,60 @@ $packages["crypto/tls"] = (function() {
|
|
|
116542
116605
|
_i$1++;
|
|
116543
116606
|
}
|
|
116544
116607
|
err$1 = $ifaceNil;
|
|
116545
|
-
_r$
|
|
116546
|
-
_tuple$
|
|
116547
|
-
c.verifiedChains = _tuple$
|
|
116548
|
-
err$1 = _tuple$
|
|
116549
|
-
/* */ if (!($interfaceIsEqual(err$1, $ifaceNil))) { $s =
|
|
116550
|
-
/* */ $s =
|
|
116551
|
-
/* if (!($interfaceIsEqual(err$1, $ifaceNil))) { */ case
|
|
116552
|
-
_r$
|
|
116553
|
-
_r$
|
|
116608
|
+
_r$8 = (0 >= certs.$length ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + 0]).Verify($clone(opts, x509.VerifyOptions)); /* */ $s = 21; case 21: if($c) { $c = false; _r$8 = _r$8.$blk(); } if (_r$8 && _r$8.$blk !== undefined) { break s; }
|
|
116609
|
+
_tuple$2 = _r$8;
|
|
116610
|
+
c.verifiedChains = _tuple$2[0];
|
|
116611
|
+
err$1 = _tuple$2[1];
|
|
116612
|
+
/* */ if (!($interfaceIsEqual(err$1, $ifaceNil))) { $s = 22; continue; }
|
|
116613
|
+
/* */ $s = 23; continue;
|
|
116614
|
+
/* if (!($interfaceIsEqual(err$1, $ifaceNil))) { */ case 22:
|
|
116615
|
+
_r$9 = c.sendAlert(42); /* */ $s = 24; case 24: if($c) { $c = false; _r$9 = _r$9.$blk(); } if (_r$9 && _r$9.$blk !== undefined) { break s; }
|
|
116616
|
+
_r$9;
|
|
116554
116617
|
$s = -1; return err$1;
|
|
116555
|
-
/* } */ case
|
|
116556
|
-
/* } */ case
|
|
116618
|
+
/* } */ case 23:
|
|
116619
|
+
/* } */ case 19:
|
|
116557
116620
|
_ref$2 = (0 >= certs.$length ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + 0]).PublicKey;
|
|
116558
|
-
/* */ if ($assertType(_ref$2, ptrType$11, true)[1] || $assertType(_ref$2, ptrType$12, true)[1] || $assertType(_ref$2, ed25519.PublicKey, true)[1]) { $s =
|
|
116559
|
-
/* */ $s =
|
|
116560
|
-
/* switch (0) { default: if ($assertType(_ref$2, ptrType$11, true)[1] || $assertType(_ref$2, ptrType$12, true)[1] || $assertType(_ref$2, ed25519.PublicKey, true)[1]) { */ case
|
|
116561
|
-
/* break; */ $s =
|
|
116562
|
-
$s =
|
|
116563
|
-
/* } else { */ case
|
|
116564
|
-
_r$
|
|
116565
|
-
_r$
|
|
116566
|
-
_r$
|
|
116567
|
-
$24r$
|
|
116568
|
-
$s =
|
|
116569
|
-
/* } } */ case
|
|
116621
|
+
/* */ if ($assertType(_ref$2, ptrType$11, true)[1] || $assertType(_ref$2, ptrType$12, true)[1] || $assertType(_ref$2, ed25519.PublicKey, true)[1]) { $s = 25; continue; }
|
|
116622
|
+
/* */ $s = 26; continue;
|
|
116623
|
+
/* switch (0) { default: if ($assertType(_ref$2, ptrType$11, true)[1] || $assertType(_ref$2, ptrType$12, true)[1] || $assertType(_ref$2, ed25519.PublicKey, true)[1]) { */ case 25:
|
|
116624
|
+
/* break; */ $s = 27; continue;
|
|
116625
|
+
$s = 27; continue;
|
|
116626
|
+
/* } else { */ case 26:
|
|
116627
|
+
_r$10 = c.sendAlert(43); /* */ $s = 28; case 28: if($c) { $c = false; _r$10 = _r$10.$blk(); } if (_r$10 && _r$10.$blk !== undefined) { break s; }
|
|
116628
|
+
_r$10;
|
|
116629
|
+
_r$11 = fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", new sliceType$7([(0 >= certs.$length ? ($throwRuntimeError("index out of range"), undefined) : certs.$array[certs.$offset + 0]).PublicKey])); /* */ $s = 29; case 29: if($c) { $c = false; _r$11 = _r$11.$blk(); } if (_r$11 && _r$11.$blk !== undefined) { break s; }
|
|
116630
|
+
$24r$2 = _r$11;
|
|
116631
|
+
$s = 30; case 30: return $24r$2;
|
|
116632
|
+
/* } } */ case 27:
|
|
116570
116633
|
c.peerCertificates = certs;
|
|
116571
|
-
/* */ if (!(c.config.VerifyPeerCertificate === $throwNilPointerError)) { $s =
|
|
116572
|
-
/* */ $s =
|
|
116573
|
-
/* if (!(c.config.VerifyPeerCertificate === $throwNilPointerError)) { */ case
|
|
116574
|
-
_r$
|
|
116575
|
-
err$2 = _r$
|
|
116576
|
-
/* */ if (!($interfaceIsEqual(err$2, $ifaceNil))) { $s =
|
|
116577
|
-
/* */ $s =
|
|
116578
|
-
/* if (!($interfaceIsEqual(err$2, $ifaceNil))) { */ case
|
|
116579
|
-
_r$
|
|
116580
|
-
_r$
|
|
116634
|
+
/* */ if (!(c.config.VerifyPeerCertificate === $throwNilPointerError)) { $s = 31; continue; }
|
|
116635
|
+
/* */ $s = 32; continue;
|
|
116636
|
+
/* if (!(c.config.VerifyPeerCertificate === $throwNilPointerError)) { */ case 31:
|
|
116637
|
+
_r$12 = c.config.VerifyPeerCertificate(certificates, c.verifiedChains); /* */ $s = 33; case 33: if($c) { $c = false; _r$12 = _r$12.$blk(); } if (_r$12 && _r$12.$blk !== undefined) { break s; }
|
|
116638
|
+
err$2 = _r$12;
|
|
116639
|
+
/* */ if (!($interfaceIsEqual(err$2, $ifaceNil))) { $s = 34; continue; }
|
|
116640
|
+
/* */ $s = 35; continue;
|
|
116641
|
+
/* if (!($interfaceIsEqual(err$2, $ifaceNil))) { */ case 34:
|
|
116642
|
+
_r$13 = c.sendAlert(42); /* */ $s = 36; case 36: if($c) { $c = false; _r$13 = _r$13.$blk(); } if (_r$13 && _r$13.$blk !== undefined) { break s; }
|
|
116643
|
+
_r$13;
|
|
116581
116644
|
$s = -1; return err$2;
|
|
116582
|
-
/* } */ case
|
|
116583
|
-
/* } */ case
|
|
116584
|
-
/* */ if (!(c.config.VerifyConnection === $throwNilPointerError)) { $s =
|
|
116585
|
-
/* */ $s =
|
|
116586
|
-
/* if (!(c.config.VerifyConnection === $throwNilPointerError)) { */ case
|
|
116587
|
-
_r$
|
|
116588
|
-
err$3 = _r$
|
|
116589
|
-
/* */ if (!($interfaceIsEqual(err$3, $ifaceNil))) { $s =
|
|
116590
|
-
/* */ $s =
|
|
116591
|
-
/* if (!($interfaceIsEqual(err$3, $ifaceNil))) { */ case
|
|
116592
|
-
_r$
|
|
116593
|
-
_r$
|
|
116645
|
+
/* } */ case 35:
|
|
116646
|
+
/* } */ case 32:
|
|
116647
|
+
/* */ if (!(c.config.VerifyConnection === $throwNilPointerError)) { $s = 37; continue; }
|
|
116648
|
+
/* */ $s = 38; continue;
|
|
116649
|
+
/* if (!(c.config.VerifyConnection === $throwNilPointerError)) { */ case 37:
|
|
116650
|
+
_r$14 = c.config.VerifyConnection($clone(c.connectionStateLocked(), ConnectionState)); /* */ $s = 39; case 39: if($c) { $c = false; _r$14 = _r$14.$blk(); } if (_r$14 && _r$14.$blk !== undefined) { break s; }
|
|
116651
|
+
err$3 = _r$14;
|
|
116652
|
+
/* */ if (!($interfaceIsEqual(err$3, $ifaceNil))) { $s = 40; continue; }
|
|
116653
|
+
/* */ $s = 41; continue;
|
|
116654
|
+
/* if (!($interfaceIsEqual(err$3, $ifaceNil))) { */ case 40:
|
|
116655
|
+
_r$15 = c.sendAlert(42); /* */ $s = 42; case 42: if($c) { $c = false; _r$15 = _r$15.$blk(); } if (_r$15 && _r$15.$blk !== undefined) { break s; }
|
|
116656
|
+
_r$15;
|
|
116594
116657
|
$s = -1; return err$3;
|
|
116595
|
-
/* } */ case
|
|
116596
|
-
/* } */ case
|
|
116658
|
+
/* } */ case 41:
|
|
116659
|
+
/* } */ case 38:
|
|
116597
116660
|
$s = -1; return $ifaceNil;
|
|
116598
|
-
/* */ } return; } var $f = {$blk: Conn.ptr.prototype.verifyServerCertificate, $c: true, $r, $24r, $24r$1, _i, _i$1, _r, _r$1, _r$10, _r$11, _r$12, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _ref, _ref$1, _ref$2, _tuple, _tuple$1, asn1Data, c, cert, cert$1, certificates, certs, err, err$1, err$2, err$3, i, opts, $s};return $f;
|
|
116661
|
+
/* */ } return; } var $f = {$blk: Conn.ptr.prototype.verifyServerCertificate, $c: true, $r, $24r, $24r$1, $24r$2, _i, _i$1, _r, _r$1, _r$10, _r$11, _r$12, _r$13, _r$14, _r$15, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _ref, _ref$1, _ref$2, _tuple, _tuple$1, _tuple$2, asn1Data, c, cert, cert$1, certificates, certs, err, err$1, err$2, err$3, i, max, n, ok, opts, $s};return $f;
|
|
116599
116662
|
};
|
|
116600
116663
|
Conn.prototype.verifyServerCertificate = function(certificates) { return this.$val.verifyServerCertificate(certificates); };
|
|
116601
116664
|
certificateRequestInfoFromMsg = function(ctx, vers, certReq) {
|
|
@@ -120478,20 +120541,21 @@ $packages["crypto/tls"] = (function() {
|
|
|
120478
120541
|
$r = fmt.$init(); /* */ $s = 25; case 25: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120479
120542
|
$r = hash.$init(); /* */ $s = 26; case 26: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120480
120543
|
$r = cpu.$init(); /* */ $s = 27; case 27: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120481
|
-
$r =
|
|
120482
|
-
$r =
|
|
120483
|
-
$r =
|
|
120484
|
-
$r =
|
|
120485
|
-
$r =
|
|
120486
|
-
$r =
|
|
120487
|
-
$r =
|
|
120488
|
-
$r =
|
|
120489
|
-
$r =
|
|
120490
|
-
$r =
|
|
120491
|
-
$r =
|
|
120492
|
-
$r =
|
|
120493
|
-
$r =
|
|
120494
|
-
$r =
|
|
120544
|
+
$r = godebug.$init(); /* */ $s = 28; case 28: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120545
|
+
$r = io.$init(); /* */ $s = 29; case 29: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120546
|
+
$r = big.$init(); /* */ $s = 30; case 30: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120547
|
+
$r = net.$init(); /* */ $s = 31; case 31: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120548
|
+
$r = os.$init(); /* */ $s = 32; case 32: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120549
|
+
$r = runtime.$init(); /* */ $s = 33; case 33: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120550
|
+
$r = strconv.$init(); /* */ $s = 34; case 34: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120551
|
+
$r = strings.$init(); /* */ $s = 35; case 35: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120552
|
+
$r = sync.$init(); /* */ $s = 36; case 36: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120553
|
+
$r = atomic.$init(); /* */ $s = 37; case 37: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120554
|
+
$r = time.$init(); /* */ $s = 38; case 38: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120555
|
+
$r = chacha20poly1305.$init(); /* */ $s = 39; case 39: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120556
|
+
$r = cryptobyte.$init(); /* */ $s = 40; case 40: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120557
|
+
$r = curve25519.$init(); /* */ $s = 41; case 41: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120558
|
+
$r = hkdf.$init(); /* */ $s = 42; case 42: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
120495
120559
|
fipsSupportedSignatureAlgorithms = sliceType.nil;
|
|
120496
120560
|
testingOnlyForceClientHelloSignatureAlgorithms = sliceType.nil;
|
|
120497
120561
|
testingOnlyForceDowngradeCanary = false;
|
|
@@ -130749,7 +130813,7 @@ $packages["vendor/golang.org/x/net/http2/hpack"] = (function() {
|
|
|
130749
130813
|
return $pkg;
|
|
130750
130814
|
})();
|
|
130751
130815
|
$packages["net/http"] = (function() {
|
|
130752
|
-
var $pkg = {}, $init, bufio, bytes, gzip, list, context, rand$1, tls, base64, binary, errors, fmt, js$1, godebug, safefilepath, io, fs, log, math, rand, mime, multipart, net, httptrace, internal, ascii, textproto, url, os, path, filepath, reflect, runtime, sort, strconv, strings, sync, atomic, js, time, utf8, httpguts, httpproxy, hpack, idna, Transport, cancelKey, h2Transport, transportRequest, readTrackingBody, transportReadFromServerError, wantConn, wantConnQueue, erringRoundTripper, persistConnWriter, connectMethod, connectMethodKey, persistConn, readWriteCloserBody, nothingWrittenError, responseAndError, requestAndChan, writeRequest, httpError, tLogKey, bodyEOFSignal, gzipReader, tlsHandshakeTimeoutError, fakeLocker, connLRU, errorReader, byteReader, transferWriter, transferReader, unsupportedTEError, body, bodyLocked, finishAsyncByteRead, bufioFlushWriter, socksCommand, socksAuthMethod, socksReply, socksAddr, socksConn, socksDialer, socksUsernamePassword, sniffSig, exactSig, maskedSig, htmlSig, mp4Sig, textSig, Handler, ResponseWriter, conn, chunkWriter, response, atomicBool, writerOnly, readResult, connReader, expectContinueReader, extraHeader, closeWriter, statusError, HandlerFunc, redirectHandler, ServeMux, muxEntry, Server, ConnState, serverHandler, onceCloseListener, globalOptionsHandler, initALPNRequest, loggingConn, checkConnErrorWriter, streamReader, arrayReader, Response, ProtocolError, Request, requestBodyReadError, MaxBytesError, maxBytesReader, incomparable, contextKey, noBody, PushOptions, Header, stringWriter, keyValues, headerSorter, http2ClientConnPool, http2clientConnPoolIdleCloser, http2clientConnPool, http2dialCall, http2addConnCall, http2noDialClientConnPool, http2dataBuffer, http2ErrCode, http2ConnectionError, http2StreamError, http2goAwayFlowError, http2connError, http2pseudoHeaderError, http2duplicatePseudoHeaderError, http2headerFieldNameError, http2headerFieldValueError, http2flow, http2FrameType, http2Flags, http2FrameHeader, http2Frame, http2Framer, http2frameCache, http2DataFrame, http2SettingsFrame, http2PingFrame, http2GoAwayFrame, http2UnknownFrame, http2WindowUpdateFrame, http2HeadersFrame, http2HeadersFrameParam, http2PriorityFrame, http2PriorityParam, http2RSTStreamFrame, http2ContinuationFrame, http2PushPromiseFrame, http2PushPromiseParam, http2MetaHeadersFrame, http2goroutineLock, http2streamState, http2Setting, http2SettingID, http2gate, http2closeWaiter, http2bufferedWriter, http2httpError, http2connectionStater, http2sorter, http2incomparable, http2pipe, http2pipeBuffer, http2Server, http2serverInternalState, http2ServeConnOpts, http2serverConn, http2stream, http2readFrameResult, http2frameWriteResult, http2serverMessage, http2requestParam, http2bodyReadMsg, http2requestBody, http2responseWriter, http2responseWriterState, http2chunkWriter, http2startPushRequest, http2Transport, http2ClientConn, http2clientStream, http2stickyErrWriter, http2noCachedConnError, http2RoundTripOpt, http2ClientConnState, http2clientConnIdleState, http2clientConnReadLoop, http2GoAwayError, http2transportResponseBody, http2noBodyReader, http2missingBody, http2erringRoundTripper, http2gzipReader, http2noDialH2RoundTripper, http2writeFramer, http2writeContext, http2flushFrameWriter, http2writeSettings, http2writeGoAway, http2writeData, http2handlerPanicRST, http2writePingAck, http2writeSettingsAck, http2writeResHeaders, http2writePushPromise, http2write100ContinueHeadersFrame, http2writeWindowUpdate, http2WriteScheduler, http2OpenStreamOptions, http2FrameWriteRequest, http2writeQueue, http2writeQueuePool, http2PriorityWriteSchedulerConfig, http2priorityNodeState, http2priorityNode, http2sortPriorityNodeSiblings, http2priorityWriteScheduler, noTransport, XHRTransport, Cookie, SameSite, RoundTripper, requestTooLarger, baseContexter, I, ptrType, ptrType$1, sliceType, sliceType$1, ptrType$2, sliceType$2, sliceType$3, structType, sliceType$4, ptrType$4, sliceType$5, sliceType$6, ptrType$7, sliceType$7, funcType, arrayType, ptrType$8, ptrType$9, ptrType$10, ptrType$11, ptrType$12, ptrType$13, chanType, ptrType$14, ptrType$15, ptrType$16, mapType, ptrType$17, ptrType$18, ptrType$19, ptrType$20, ptrType$21, ptrType$22, ptrType$23, ptrType$24, sliceType$8, sliceType$9, ptrType$25, structType$1, ptrType$26, sliceType$10, sliceType$11, ptrType$27, ptrType$28, ptrType$29, ptrType$30, sliceType$12, ptrType$31, ptrType$32, ptrType$33, funcType$1, sliceType$13, ptrType$34, sliceType$14, arrayType$1, sliceType$15, sliceType$16, ptrType$35, arrayType$2, sliceType$17, ptrType$36, ptrType$37, ptrType$38, ptrType$39, ptrType$40, ptrType$41, ptrType$42, ptrType$43, ptrType$44, ptrType$45, ptrType$46, ptrType$47, structType$2, ptrType$48, ptrType$49, ptrType$50, ptrType$51, ptrType$52, ptrType$53, arrayType$3, arrayType$4, arrayType$5, sliceType$18, ptrType$54, ptrType$55, ptrType$56, ptrType$57, arrayType$6, ptrType$58, sliceType$19, ptrType$59, ptrType$60, ptrType$61, structType$3, ptrType$62, ptrType$63, ptrType$64, ptrType$65, ptrType$66, sliceType$20, ptrType$67, ptrType$68, sliceType$21, ptrType$69, ptrType$70, ptrType$71, ptrType$72, ptrType$73, arrayType$7, ptrType$74, ptrType$75, arrayType$8, sliceType$22, ptrType$76, ptrType$77, ptrType$78, ptrType$79, ptrType$80, ptrType$81, ptrType$82, ptrType$83, ptrType$84, ptrType$85, ptrType$86, ptrType$87, ptrType$88, ptrType$89, ptrType$90, funcType$2, ptrType$91, ptrType$92, ptrType$93, ptrType$94, ptrType$95, ptrType$96, ptrType$97, ptrType$98, ptrType$99, ptrType$100, ptrType$101, ptrType$102, interfaceType, ptrType$103, sliceType$23, ptrType$104, sliceType$24, ptrType$105, ptrType$106, sliceType$25, ptrType$107, ptrType$108, ptrType$109, funcType$3, sliceType$29, ptrType$112, ptrType$114, funcType$4, mapType$1, mapType$2, mapType$3, mapType$4, funcType$5, funcType$6, funcType$7, funcType$8, mapType$5, funcType$9, chanType$1, ptrType$115, ptrType$116, chanType$2, funcType$10, chanType$3, chanType$4, funcType$11, ptrType$117, chanType$5, chanType$6, chanType$7, ptrType$118, funcType$12, funcType$13, ptrType$119, ptrType$120, mapType$6, ptrType$121, chanType$8, ptrType$122, ptrType$123, funcType$14, ptrType$124, ptrType$125, ptrType$126, chanType$9, ptrType$127, chanType$10, ptrType$128, funcType$15, ptrType$129, mapType$7, funcType$16, mapType$8, funcType$17, funcType$18, funcType$19, mapType$9, mapType$10, ptrType$131, ptrType$132, ptrType$133, ptrType$134, ptrType$135, funcType$20, ptrType$136, ptrType$137, mapType$11, mapType$12, mapType$13, mapType$14, mapType$15, ptrType$138, funcType$21, ptrType$139, funcType$22, funcType$23, ptrType$140, ptrType$141, funcType$24, mapType$16, chanType$11, chanType$12, chanType$13, chanType$14, chanType$15, mapType$17, mapType$18, funcType$25, mapType$19, mapType$20, funcType$26, ptrType$142, ptrType$143, ptrType$144, funcType$27, ptrType$145, funcType$28, ptrType$146, mapType$21, ptrType$148, mapType$23, errCannotRewind, errKeepAlivesDisabled, errConnBroken, errCloseIdle, errTooManyIdle, errTooManyIdleHost, errCloseIdleConns, errReadLoopExiting, errIdleConnTimeout, errServerClosedIdle, zeroDialer, errCallerOwnsConn, errTimeout, errRequestCanceled, errRequestCanceledConn, testHookEnterRoundTrip, testHookWaitResLoop, testHookRoundTripRetried, testHookPrePendingDial, testHookPostPendingDial, testHookMu, testHookReadLoopBeforeNextRead, portMap, errReadOnClosedResBody, suppressedHeaders304, suppressedHeadersNoBody, excludedHeadersNoBody, singleCRLF, doubleCRLF, errTrailerEOF, nopCloserType, nopCloserWriterToType, socksnoDeadline, socksaLongTimeAgo, sniffSignatures, mp4ftype, mp4, crlf, colonSpace, bufioReaderPool, bufioWriter2kPool, bufioWriter2kPool$24ptr, bufioWriter4kPool, bufioWriter4kPool$24ptr, copyBufPool, errTooLarge, extraHeaderKeys, headerContentLength, headerDate, htmlReplacer, defaultServeMux, defaultServeMux$24ptr, stateName, silenceSemWarnContextKey, testHookServerServe, uniqNameMu, uniqNameNext, uint8Array, jsFetchMissing, errClosed, respExcludeHeader, reqWriteExcludeHeader, multipartByReader, errMissingHost, textprotoReaderPool, aLongTimeAgo, omitBundledHTTP2, headerNewlineToSpace, headerSorterPool, http2dataChunkSizeClasses, http2dataChunkPools, http2errReadEmpty, http2errCodeName, http2errFromPeer, http2errMixPseudoHeaderTypes, http2errPseudoAfterRegular, http2padZeros, http2frameName, http2flagName, http2frameParsers, http2fhBytes, http2ErrFrameTooLarge, http2errStreamID, http2errDepStreamID, http2errPadLength, http2errPadBytes, http2DebugGoroutines, http2goroutineSpace, http2littleBuf, http2commonBuildOnce, http2commonLowerHeader, http2commonCanonHeader, http2VerboseLogs, http2logFrameWrites, http2logFrameReads, http2inTests, http2clientPreface, http2stateName, http2settingName, http2bufWriterPool, http2errTimeout, http2sorterPool, http2errClosedPipeWrite, http2errClientDisconnected, http2errClosedBody, http2errHandlerComplete, http2errStreamClosed, http2responseWriterStatePool, http2testHookOnConn, http2testHookGetServerConn, http2testHookOnPanicMu, http2testHookOnPanic, http2settingsTimerMsg, http2idleTimerMsg, http2shutdownTimerMsg, http2gracefulShutdownMsg, http2errPrefaceTimeout, http2errChanPool, http2writeDataPool, http2errHandlerPanicked, http2goAwayTimeout, http2ErrRecursivePush, http2ErrPushLimitReached, http2connHeaders, http2got1xxFuncForTests, http2ErrNoCachedConn, http2errClientConnClosed, http2errClientConnUnusable, http2errClientConnGotGoAway, http2shutdownEnterWaitStateHook, http2errRequestCanceled, http2errStopReqBodyWrite, http2errStopReqBodyWriteAndCancel, http2errReqBodyTooLong, http2bufPool, http2errNilRequestURL, http2errClosedResponseBody, http2errResponseHeaderListSize, http2errRequestHeaderListSize, http2noBody, errSeeker, errNoOverlap, unixEpochTime, errMissingSeek, errMissingReadDir, cookieNameSanitizer, x, x$1, x$2, x$3, _r, x$5, x$6, setupRewindBody, rewindBody, is408Message, newReadWriteCloserBody, nop, canonicalAddr, cloneTLSConfig, newTransferWriter, noResponseBodyExpected, bodyAllowedForStatus, suppressedHeaders, readTransfer, chunked, isIdentity, isUnsupportedTEError, fixLength, shouldClose, fixTrailer, seeUpcomingDoubleCRLF, mergeSetHeader, parseContentLength, unwrapNopCloser, isKnownInMemoryReader, StatusText, sockssplitHostPort, socksNewDialer, DetectContentType, isWS, isTT, bufioWriterPool, newBufioReader, putBufioReader, newBufioWriterSize, putBufioWriter, appendTime, http1ServerSupportsRequest, checkWriteHeaderCode, relevantCaller, foreachHeaderElement, writeStatusLine, validNextProto, badRequestError, isCommonNetReadError, registerOnHitEOF, requestBodyRemains, Error, NotFound, NotFoundHandler, Redirect, htmlEscape, RedirectHandler, cleanPath, stripHostPort, appendSorted, newLoggingConn, numLeadingCRorLF, strSliceContains, tlsRecordHeaderLooksLikeHTTP, ReadResponse, fixPragmaCacheControl, isProtocolSwitchResponse, isProtocolSwitchHeader, badStringError, valueOrDefault, idnaASCII, cleanHost, removeZone, ParseHTTPVersion, validMethod, parseBasicAuth, parseRequestLine, newTextprotoReader, putTextprotoReader, readRequest, MaxBytesReader, copyValues, parsePostForm, requestMethodUsuallyLacksBody, hasPort, isNotToken, stringContainsCTLByte, hexEscapeNonASCII, CanonicalHeaderKey, hasToken, isTokenBoundary, http2asciiEqualFold, http2lower, http2isASCIIPrint, http2asciiToLower, http2isBadCipher, http2filterOutClientConn, http2shouldRetryDial, http2getDataBufferChunk, http2putDataBufferChunk, http2streamError, http2typeFrameParser, http2readFrameHeader, http2NewFramer, http2terminalReadFrameError, http2parseDataFrame, http2validStreamIDOrZero, http2validStreamID, http2parseSettingsFrame, http2parsePingFrame, http2parseGoAwayFrame, http2parseUnknownFrame, http2parseWindowUpdateFrame, http2parseHeadersFrame, http2parsePriorityFrame, http2parseRSTStreamFrame, http2parseContinuationFrame, http2parsePushPromise, http2readByte, http2readUint32, http2summarizeFrame, http2traceHasWroteHeaderField, http2traceWroteHeaderField, http2traceGot1xxResponseFunc, http2tlsUnderlyingConn, http2newGoroutineLock, http2curGoroutineID, http2parseUintBytes, http2cutoff64, http2buildCommonHeaderMapsOnce, http2buildCommonHeaderMaps, http2lowerHeader, init, http2validWireHeaderFieldName, http2httpCodeString, http2newBufferedWriter, http2mustUint31, http2bodyAllowedForStatus, http2validPseudoPath, http2ConfigureServer, http2serverConnBaseContext, http2errno, http2isClosedConnError, http2handleHeaderListTooLong, http2checkWriteHeaderCode, http2cloneHeader, http2foreachHeaderElement, http2checkValidHTTP2RequestHeaders, http2new400Handler, http2h1ServerKeepAlivesDisabled, http2configureTransports, http2isNoCachedConnError, http2authorityAddr, http2shouldRetryRequest, http2canRetryError, http2commaSeparatedTrailers, http2checkConnHeaders, http2actualContentLength, http2shouldSendReqContentLength, http2isEOFOrNetReadError, http2strSliceContains, http2isConnectionCloseRequest, http2registerHTTPSProtocol, http2traceGetConn, http2traceGotConn, http2traceWroteHeaders, http2traceGot100Continue, http2traceWait100Continue, http2traceWroteRequest, http2traceFirstResponseByte, http2writeEndsStream, http2splitHeaderBlock, http2encKV, http2encodeHeaders, http2NewPriorityWriteScheduler, readSetCookies, readCookies, validCookieDomain, validCookieExpires, isCookieDomainName, sanitizeCookieName, sanitizeCookieValue, validCookieValueByte, sanitizeCookiePath, validCookiePathByte, sanitizeOrWarn, parseCookieValue, isCookieNameValid, cloneURLValues, cloneURL, cloneMultipartForm, cloneMultipartFileHeader, basicAuth;
|
|
130816
|
+
var $pkg = {}, $init, bufio, bytes, gzip, list, context, rand$1, tls, base64, binary, errors, fmt, js$1, godebug, safefilepath, io, fs, log, math, rand, mime, multipart, net, httptrace, internal, ascii, textproto, url, os, path, filepath, reflect, runtime, sort, strconv, strings, sync, atomic, js, time, utf8, httpguts, httpproxy, hpack, idna, Transport, cancelKey, h2Transport, transportRequest, readTrackingBody, transportReadFromServerError, wantConn, wantConnQueue, erringRoundTripper, persistConnWriter, connectMethod, connectMethodKey, persistConn, readWriteCloserBody, nothingWrittenError, responseAndError, requestAndChan, writeRequest, httpError, tLogKey, bodyEOFSignal, gzipReader, tlsHandshakeTimeoutError, fakeLocker, connLRU, errorReader, byteReader, transferWriter, transferReader, unsupportedTEError, body, bodyLocked, finishAsyncByteRead, bufioFlushWriter, socksCommand, socksAuthMethod, socksReply, socksAddr, socksConn, socksDialer, socksUsernamePassword, sniffSig, exactSig, maskedSig, htmlSig, mp4Sig, textSig, Handler, ResponseWriter, conn, chunkWriter, response, atomicBool, writerOnly, readResult, connReader, expectContinueReader, extraHeader, closeWriter, statusError, HandlerFunc, redirectHandler, ServeMux, muxEntry, Server, ConnState, serverHandler, onceCloseListener, globalOptionsHandler, initALPNRequest, loggingConn, checkConnErrorWriter, streamReader, arrayReader, Response, ProtocolError, Request, requestBodyReadError, MaxBytesError, maxBytesReader, incomparable, contextKey, noBody, PushOptions, Header, stringWriter, keyValues, headerSorter, http2ClientConnPool, http2clientConnPoolIdleCloser, http2clientConnPool, http2dialCall, http2addConnCall, http2noDialClientConnPool, http2dataBuffer, http2ErrCode, http2ConnectionError, http2StreamError, http2goAwayFlowError, http2connError, http2pseudoHeaderError, http2duplicatePseudoHeaderError, http2headerFieldNameError, http2headerFieldValueError, http2flow, http2FrameType, http2Flags, http2FrameHeader, http2Frame, http2Framer, http2frameCache, http2DataFrame, http2SettingsFrame, http2PingFrame, http2GoAwayFrame, http2UnknownFrame, http2WindowUpdateFrame, http2HeadersFrame, http2HeadersFrameParam, http2PriorityFrame, http2PriorityParam, http2RSTStreamFrame, http2ContinuationFrame, http2PushPromiseFrame, http2PushPromiseParam, http2MetaHeadersFrame, http2goroutineLock, http2streamState, http2Setting, http2SettingID, http2gate, http2closeWaiter, http2bufferedWriter, http2httpError, http2connectionStater, http2sorter, http2incomparable, http2pipe, http2pipeBuffer, http2Server, http2serverInternalState, http2ServeConnOpts, http2serverConn, http2stream, http2readFrameResult, http2frameWriteResult, http2serverMessage, http2requestParam, http2bodyReadMsg, http2requestBody, http2responseWriter, http2responseWriterState, http2chunkWriter, http2startPushRequest, http2Transport, http2ClientConn, http2clientStream, http2stickyErrWriter, http2noCachedConnError, http2RoundTripOpt, http2ClientConnState, http2clientConnIdleState, http2clientConnReadLoop, http2GoAwayError, http2transportResponseBody, http2noBodyReader, http2missingBody, http2erringRoundTripper, http2gzipReader, http2noDialH2RoundTripper, http2writeFramer, http2writeContext, http2flushFrameWriter, http2writeSettings, http2writeGoAway, http2writeData, http2handlerPanicRST, http2writePingAck, http2writeSettingsAck, http2writeResHeaders, http2writePushPromise, http2write100ContinueHeadersFrame, http2writeWindowUpdate, http2WriteScheduler, http2OpenStreamOptions, http2FrameWriteRequest, http2writeQueue, http2writeQueuePool, http2PriorityWriteSchedulerConfig, http2priorityNodeState, http2priorityNode, http2sortPriorityNodeSiblings, http2priorityWriteScheduler, noTransport, XHRTransport, Cookie, SameSite, RoundTripper, requestTooLarger, baseContexter, I, ptrType, ptrType$1, sliceType, sliceType$1, ptrType$2, sliceType$2, sliceType$3, structType, sliceType$4, ptrType$4, sliceType$5, sliceType$6, ptrType$7, sliceType$7, funcType, arrayType, ptrType$8, ptrType$9, ptrType$10, ptrType$11, ptrType$12, ptrType$13, chanType, ptrType$14, ptrType$15, ptrType$16, mapType, ptrType$17, ptrType$18, ptrType$19, ptrType$20, ptrType$21, ptrType$22, ptrType$23, ptrType$24, sliceType$8, sliceType$9, ptrType$25, structType$1, ptrType$26, sliceType$10, sliceType$11, ptrType$27, ptrType$28, ptrType$29, ptrType$30, sliceType$12, ptrType$31, ptrType$32, ptrType$33, funcType$1, sliceType$13, ptrType$34, sliceType$14, arrayType$1, sliceType$15, sliceType$16, ptrType$35, arrayType$2, sliceType$17, ptrType$36, ptrType$37, ptrType$38, ptrType$39, ptrType$40, ptrType$41, ptrType$42, ptrType$43, ptrType$44, ptrType$45, ptrType$46, ptrType$47, structType$2, ptrType$48, ptrType$49, ptrType$50, ptrType$51, ptrType$52, ptrType$53, arrayType$3, arrayType$4, arrayType$5, sliceType$18, ptrType$54, ptrType$55, ptrType$56, ptrType$57, arrayType$6, ptrType$58, sliceType$19, ptrType$59, ptrType$60, ptrType$61, structType$3, ptrType$62, ptrType$63, ptrType$64, ptrType$65, ptrType$66, sliceType$20, ptrType$67, ptrType$68, sliceType$21, ptrType$69, ptrType$70, ptrType$71, ptrType$72, ptrType$73, arrayType$7, ptrType$74, ptrType$75, arrayType$8, sliceType$22, ptrType$76, ptrType$77, ptrType$78, ptrType$79, ptrType$80, ptrType$81, ptrType$82, ptrType$83, ptrType$84, ptrType$85, ptrType$86, ptrType$87, ptrType$88, ptrType$89, ptrType$90, funcType$2, ptrType$91, ptrType$92, ptrType$93, ptrType$94, ptrType$95, ptrType$96, ptrType$97, ptrType$98, ptrType$99, ptrType$100, ptrType$101, ptrType$102, interfaceType, ptrType$103, sliceType$23, ptrType$104, sliceType$24, ptrType$105, ptrType$106, sliceType$25, ptrType$107, ptrType$108, ptrType$109, funcType$3, sliceType$29, ptrType$112, ptrType$114, funcType$4, mapType$1, mapType$2, mapType$3, mapType$4, funcType$5, funcType$6, funcType$7, funcType$8, mapType$5, funcType$9, chanType$1, ptrType$115, ptrType$116, chanType$2, funcType$10, chanType$3, chanType$4, funcType$11, ptrType$117, chanType$5, chanType$6, chanType$7, ptrType$118, funcType$12, funcType$13, ptrType$119, ptrType$120, mapType$6, ptrType$121, chanType$8, ptrType$122, ptrType$123, funcType$14, ptrType$124, ptrType$125, ptrType$126, chanType$9, ptrType$127, chanType$10, ptrType$128, funcType$15, ptrType$129, mapType$7, funcType$16, mapType$8, funcType$17, funcType$18, funcType$19, mapType$9, mapType$10, ptrType$131, ptrType$132, ptrType$133, ptrType$134, ptrType$135, funcType$20, ptrType$136, ptrType$137, mapType$11, mapType$12, mapType$13, mapType$14, mapType$15, ptrType$138, funcType$21, ptrType$139, funcType$22, funcType$23, ptrType$140, ptrType$141, funcType$24, mapType$16, chanType$11, chanType$12, chanType$13, chanType$14, chanType$15, mapType$17, mapType$18, funcType$25, mapType$19, mapType$20, funcType$26, ptrType$142, ptrType$143, ptrType$144, funcType$27, ptrType$145, funcType$28, ptrType$146, mapType$21, ptrType$148, mapType$23, errCannotRewind, errKeepAlivesDisabled, errConnBroken, errCloseIdle, errTooManyIdle, errTooManyIdleHost, errCloseIdleConns, errReadLoopExiting, errIdleConnTimeout, errServerClosedIdle, zeroDialer, errCallerOwnsConn, errTimeout, errRequestCanceled, errRequestCanceledConn, testHookEnterRoundTrip, testHookWaitResLoop, testHookRoundTripRetried, testHookPrePendingDial, testHookPostPendingDial, testHookMu, testHookReadLoopBeforeNextRead, portMap, errReadOnClosedResBody, suppressedHeaders304, suppressedHeadersNoBody, excludedHeadersNoBody, singleCRLF, doubleCRLF, errTrailerEOF, nopCloserType, nopCloserWriterToType, socksnoDeadline, socksaLongTimeAgo, sniffSignatures, mp4ftype, mp4, crlf, colonSpace, bufioReaderPool, bufioWriter2kPool, bufioWriter2kPool$24ptr, bufioWriter4kPool, bufioWriter4kPool$24ptr, copyBufPool, errTooLarge, extraHeaderKeys, headerContentLength, headerDate, htmlReplacer, defaultServeMux, defaultServeMux$24ptr, stateName, silenceSemWarnContextKey, testHookServerServe, uniqNameMu, uniqNameNext, uint8Array, jsFetchMissing, errClosed, respExcludeHeader, reqWriteExcludeHeader, multipartByReader, errMissingHost, textprotoReaderPool, aLongTimeAgo, omitBundledHTTP2, headerNewlineToSpace, headerSorterPool, http2dataChunkSizeClasses, http2dataChunkPools, http2errReadEmpty, http2errCodeName, http2errFromPeer, http2errMixPseudoHeaderTypes, http2errPseudoAfterRegular, http2padZeros, http2frameName, http2flagName, http2frameParsers, http2fhBytes, http2ErrFrameTooLarge, http2errStreamID, http2errDepStreamID, http2errPadLength, http2errPadBytes, http2DebugGoroutines, http2goroutineSpace, http2littleBuf, http2commonBuildOnce, http2commonLowerHeader, http2commonCanonHeader, http2VerboseLogs, http2logFrameWrites, http2logFrameReads, http2inTests, http2clientPreface, http2stateName, http2settingName, http2bufWriterPool, http2errTimeout, http2sorterPool, http2errClosedPipeWrite, http2errClientDisconnected, http2errClosedBody, http2errHandlerComplete, http2errStreamClosed, http2responseWriterStatePool, http2testHookOnConn, http2testHookGetServerConn, http2testHookOnPanicMu, http2testHookOnPanic, http2settingsTimerMsg, http2idleTimerMsg, http2shutdownTimerMsg, http2gracefulShutdownMsg, http2errPrefaceTimeout, http2errChanPool, http2writeDataPool, http2errHandlerPanicked, http2goAwayTimeout, http2ErrRecursivePush, http2ErrPushLimitReached, http2connHeaders, http2got1xxFuncForTests, http2ErrNoCachedConn, http2errClientConnClosed, http2errClientConnUnusable, http2errClientConnGotGoAway, http2shutdownEnterWaitStateHook, http2errRequestCanceled, http2errStopReqBodyWrite, http2errStopReqBodyWriteAndCancel, http2errReqBodyTooLong, http2bufPool, http2errNilRequestURL, http2errClosedResponseBody, http2errResponseHeaderListSize, http2errRequestHeaderListSize, http2noBody, errSeeker, errNoOverlap, unixEpochTime, errMissingSeek, errMissingReadDir, cookieNameSanitizer, x, x$1, x$2, x$3, _r, x$5, x$6, setupRewindBody, rewindBody, is408Message, newReadWriteCloserBody, nop, canonicalAddr, cloneTLSConfig, newTransferWriter, noResponseBodyExpected, bodyAllowedForStatus, suppressedHeaders, readTransfer, chunked, isIdentity, isUnsupportedTEError, fixLength, shouldClose, fixTrailer, seeUpcomingDoubleCRLF, mergeSetHeader, parseContentLength, unwrapNopCloser, isKnownInMemoryReader, StatusText, sockssplitHostPort, socksNewDialer, DetectContentType, isWS, isTT, bufioWriterPool, newBufioReader, putBufioReader, newBufioWriterSize, putBufioWriter, appendTime, http1ServerSupportsRequest, checkWriteHeaderCode, relevantCaller, foreachHeaderElement, writeStatusLine, validNextProto, badRequestError, isCommonNetReadError, registerOnHitEOF, requestBodyRemains, Error, NotFound, NotFoundHandler, Redirect, htmlEscape, RedirectHandler, cleanPath, stripHostPort, appendSorted, newLoggingConn, numLeadingCRorLF, strSliceContains, tlsRecordHeaderLooksLikeHTTP, ReadResponse, fixPragmaCacheControl, isProtocolSwitchResponse, isProtocolSwitchHeader, badStringError, valueOrDefault, idnaASCII, removeZone, ParseHTTPVersion, validMethod, parseBasicAuth, parseRequestLine, newTextprotoReader, putTextprotoReader, readRequest, MaxBytesReader, copyValues, parsePostForm, requestMethodUsuallyLacksBody, hasPort, isNotToken, stringContainsCTLByte, hexEscapeNonASCII, CanonicalHeaderKey, hasToken, isTokenBoundary, http2asciiEqualFold, http2lower, http2isASCIIPrint, http2asciiToLower, http2isBadCipher, http2filterOutClientConn, http2shouldRetryDial, http2getDataBufferChunk, http2putDataBufferChunk, http2streamError, http2typeFrameParser, http2readFrameHeader, http2NewFramer, http2terminalReadFrameError, http2parseDataFrame, http2validStreamIDOrZero, http2validStreamID, http2parseSettingsFrame, http2parsePingFrame, http2parseGoAwayFrame, http2parseUnknownFrame, http2parseWindowUpdateFrame, http2parseHeadersFrame, http2parsePriorityFrame, http2parseRSTStreamFrame, http2parseContinuationFrame, http2parsePushPromise, http2readByte, http2readUint32, http2summarizeFrame, http2traceHasWroteHeaderField, http2traceWroteHeaderField, http2traceGot1xxResponseFunc, http2tlsUnderlyingConn, http2newGoroutineLock, http2curGoroutineID, http2parseUintBytes, http2cutoff64, http2buildCommonHeaderMapsOnce, http2buildCommonHeaderMaps, http2lowerHeader, init, http2validWireHeaderFieldName, http2httpCodeString, http2newBufferedWriter, http2mustUint31, http2bodyAllowedForStatus, http2validPseudoPath, http2ConfigureServer, http2serverConnBaseContext, http2errno, http2isClosedConnError, http2handleHeaderListTooLong, http2checkWriteHeaderCode, http2cloneHeader, http2foreachHeaderElement, http2checkValidHTTP2RequestHeaders, http2new400Handler, http2h1ServerKeepAlivesDisabled, http2configureTransports, http2isNoCachedConnError, http2authorityAddr, http2shouldRetryRequest, http2canRetryError, http2commaSeparatedTrailers, http2checkConnHeaders, http2actualContentLength, http2shouldSendReqContentLength, http2isEOFOrNetReadError, http2strSliceContains, http2isConnectionCloseRequest, http2registerHTTPSProtocol, http2traceGetConn, http2traceGotConn, http2traceWroteHeaders, http2traceGot100Continue, http2traceWait100Continue, http2traceWroteRequest, http2traceFirstResponseByte, http2writeEndsStream, http2splitHeaderBlock, http2encKV, http2encodeHeaders, http2NewPriorityWriteScheduler, readSetCookies, readCookies, validCookieDomain, validCookieExpires, isCookieDomainName, sanitizeCookieName, sanitizeCookieValue, validCookieValueByte, sanitizeCookiePath, validCookiePathByte, sanitizeOrWarn, parseCookieValue, isCookieNameValid, cloneURLValues, cloneURL, cloneMultipartForm, cloneMultipartFileHeader, basicAuth;
|
|
130753
130817
|
bufio = $packages["bufio"];
|
|
130754
130818
|
bytes = $packages["bytes"];
|
|
130755
130819
|
gzip = $packages["compress/gzip"];
|
|
@@ -143392,7 +143456,7 @@ $packages["net/http"] = (function() {
|
|
|
143392
143456
|
};
|
|
143393
143457
|
Request.prototype.WriteProxy = function(w) { return this.$val.WriteProxy(w); };
|
|
143394
143458
|
Request.ptr.prototype.write = function(w, usingProxy, extraHeaders, waitForContinue) {
|
|
143395
|
-
var {$24r, $24r$1, $24r$10, $24r$11, $24r$12, $24r$13, $24r$14, $24r$15, $24r$2, $24r$3, $24r$4, $24r$5, $24r$6, $24r$7, $24r$8, $24r$9, _r$1, _r$10, _r$11, _r$12, _r$13, _r$14, _r$15, _r$16, _r$17, _r$
|
|
143459
|
+
var {$24r, $24r$1, $24r$10, $24r$11, $24r$12, $24r$13, $24r$14, $24r$15, $24r$16, $24r$17, $24r$2, $24r$3, $24r$4, $24r$5, $24r$6, $24r$7, $24r$8, $24r$9, _r$1, _r$10, _r$11, _r$12, _r$13, _r$14, _r$15, _r$16, _r$17, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _tuple, _tuple$1, _tuple$2, _tuple$3, _tuple$4, _tuple$5, _tuple$6, _tuple$7, _tuple$8, bw, bw$1, bw$2, closed, err, err$1, extraHeaders, host, ok, ok$1, ok$2, r, ruri, trace, tw, userAgent, usingProxy, w, waitForContinue, x$7, $s, $deferred, $r, $c} = $restore(this, {w, usingProxy, extraHeaders, waitForContinue});
|
|
143396
143460
|
/* */ $s = $s || 0; var $err = null; try { s: while (true) { switch ($s) { case 0: $deferred = []; $curGoroutine.deferStack.push($deferred);
|
|
143397
143461
|
closed = [closed];
|
|
143398
143462
|
err = [err];
|
|
@@ -143428,21 +143492,44 @@ $packages["net/http"] = (function() {
|
|
|
143428
143492
|
$s = -1; return;
|
|
143429
143493
|
/* */ } return; } var $f = {$blk: $b, $c: true, $r, _r$2, closeErr, $s};return $f;
|
|
143430
143494
|
}; })(closed, err, r, trace), []]);
|
|
143431
|
-
|
|
143432
|
-
host =
|
|
143433
|
-
/* */
|
|
143434
|
-
/*
|
|
143435
|
-
|
|
143436
|
-
/* */
|
|
143437
|
-
/*
|
|
143438
|
-
/* if (r[0].URL === ptrType$17.nil) { */ case 7:
|
|
143495
|
+
host = r[0].Host;
|
|
143496
|
+
/* */ if (host === "") { $s = 4; continue; }
|
|
143497
|
+
/* */ $s = 5; continue;
|
|
143498
|
+
/* if (host === "") { */ case 4:
|
|
143499
|
+
/* */ if (r[0].URL === ptrType$17.nil) { $s = 6; continue; }
|
|
143500
|
+
/* */ $s = 7; continue;
|
|
143501
|
+
/* if (r[0].URL === ptrType$17.nil) { */ case 6:
|
|
143439
143502
|
err[0] = errMissingHost;
|
|
143440
143503
|
$24r = err[0];
|
|
143441
|
-
$s =
|
|
143442
|
-
/* } */ case
|
|
143443
|
-
|
|
143444
|
-
|
|
143445
|
-
/*
|
|
143504
|
+
$s = 8; case 8: return $24r;
|
|
143505
|
+
/* } */ case 7:
|
|
143506
|
+
host = r[0].URL.Host;
|
|
143507
|
+
/* } */ case 5:
|
|
143508
|
+
_r$2 = httpguts.PunycodeHostPort(host); /* */ $s = 9; case 9: if($c) { $c = false; _r$2 = _r$2.$blk(); } if (_r$2 && _r$2.$blk !== undefined) { break s; }
|
|
143509
|
+
_tuple = _r$2;
|
|
143510
|
+
host = _tuple[0];
|
|
143511
|
+
err[0] = _tuple[1];
|
|
143512
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 10; continue; }
|
|
143513
|
+
/* */ $s = 11; continue;
|
|
143514
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 10:
|
|
143515
|
+
err[0] = err[0];
|
|
143516
|
+
$24r$1 = err[0];
|
|
143517
|
+
$s = 12; case 12: return $24r$1;
|
|
143518
|
+
/* } */ case 11:
|
|
143519
|
+
/* */ if (!httpguts.ValidHostHeader(host)) { $s = 13; continue; }
|
|
143520
|
+
/* */ $s = 14; continue;
|
|
143521
|
+
/* if (!httpguts.ValidHostHeader(host)) { */ case 13:
|
|
143522
|
+
/* */ if (!usingProxy) { $s = 15; continue; }
|
|
143523
|
+
/* */ $s = 16; continue;
|
|
143524
|
+
/* if (!usingProxy) { */ case 15:
|
|
143525
|
+
host = "";
|
|
143526
|
+
$s = 17; continue;
|
|
143527
|
+
/* } else { */ case 16:
|
|
143528
|
+
err[0] = errors.New("http: invalid Host header");
|
|
143529
|
+
$24r$2 = err[0];
|
|
143530
|
+
$s = 18; case 18: return $24r$2;
|
|
143531
|
+
/* } */ case 17:
|
|
143532
|
+
/* } */ case 14:
|
|
143446
143533
|
host = removeZone(host);
|
|
143447
143534
|
ruri = r[0].URL.RequestURI();
|
|
143448
143535
|
if (usingProxy && !(r[0].URL.Scheme === "") && r[0].URL.Opaque === "") {
|
|
@@ -143453,93 +143540,75 @@ $packages["net/http"] = (function() {
|
|
|
143453
143540
|
ruri = r[0].URL.Opaque;
|
|
143454
143541
|
}
|
|
143455
143542
|
}
|
|
143456
|
-
/* */ if (stringContainsCTLByte(ruri)) { $s =
|
|
143457
|
-
/* */ $s =
|
|
143458
|
-
/* if (stringContainsCTLByte(ruri)) { */ case
|
|
143543
|
+
/* */ if (stringContainsCTLByte(ruri)) { $s = 19; continue; }
|
|
143544
|
+
/* */ $s = 20; continue;
|
|
143545
|
+
/* if (stringContainsCTLByte(ruri)) { */ case 19:
|
|
143459
143546
|
err[0] = errors.New("net/http: can't write control character in Request.URL");
|
|
143460
|
-
$24r$
|
|
143461
|
-
$s =
|
|
143462
|
-
/* } */ case
|
|
143547
|
+
$24r$3 = err[0];
|
|
143548
|
+
$s = 21; case 21: return $24r$3;
|
|
143549
|
+
/* } */ case 20:
|
|
143463
143550
|
bw = ptrType$12.nil;
|
|
143464
|
-
_tuple = $assertType(w, io.ByteWriter, true);
|
|
143465
|
-
ok = _tuple[1];
|
|
143551
|
+
_tuple$1 = $assertType(w, io.ByteWriter, true);
|
|
143552
|
+
ok = _tuple$1[1];
|
|
143466
143553
|
if (!ok) {
|
|
143467
143554
|
bw = bufio.NewWriter(w);
|
|
143468
143555
|
w = bw;
|
|
143469
143556
|
}
|
|
143470
|
-
_r$
|
|
143471
|
-
_tuple$
|
|
143472
|
-
err[0] = _tuple$1[1];
|
|
143473
|
-
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 15; continue; }
|
|
143474
|
-
/* */ $s = 16; continue;
|
|
143475
|
-
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 15:
|
|
143476
|
-
err[0] = err[0];
|
|
143477
|
-
$24r$2 = err[0];
|
|
143478
|
-
$s = 17; case 17: return $24r$2;
|
|
143479
|
-
/* } */ case 16:
|
|
143480
|
-
_r$5 = fmt.Fprintf(w, "Host: %s\r\n", new sliceType([new $String(host)])); /* */ $s = 18; case 18: if($c) { $c = false; _r$5 = _r$5.$blk(); } if (_r$5 && _r$5.$blk !== undefined) { break s; }
|
|
143481
|
-
_tuple$2 = _r$5;
|
|
143557
|
+
_r$3 = fmt.Fprintf(w, "%s %s HTTP/1.1\r\n", new sliceType([new $String(valueOrDefault(r[0].Method, "GET")), new $String(ruri)])); /* */ $s = 22; case 22: if($c) { $c = false; _r$3 = _r$3.$blk(); } if (_r$3 && _r$3.$blk !== undefined) { break s; }
|
|
143558
|
+
_tuple$2 = _r$3;
|
|
143482
143559
|
err[0] = _tuple$2[1];
|
|
143483
|
-
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s =
|
|
143484
|
-
/* */ $s =
|
|
143485
|
-
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case
|
|
143560
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 23; continue; }
|
|
143561
|
+
/* */ $s = 24; continue;
|
|
143562
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 23:
|
|
143486
143563
|
err[0] = err[0];
|
|
143487
|
-
$24r$
|
|
143488
|
-
$s =
|
|
143489
|
-
/* } */ case
|
|
143490
|
-
|
|
143491
|
-
|
|
143492
|
-
|
|
143493
|
-
|
|
143494
|
-
/*
|
|
143495
|
-
|
|
143496
|
-
/* */ if (new Header(r[0].Header).has("User-Agent")) { $s = 25; continue; }
|
|
143497
|
-
/* */ $s = 26; continue;
|
|
143498
|
-
/* if (new Header(r[0].Header).has("User-Agent")) { */ case 25:
|
|
143499
|
-
_r$6 = new Header(r[0].Header).Get("User-Agent"); /* */ $s = 27; case 27: if($c) { $c = false; _r$6 = _r$6.$blk(); } if (_r$6 && _r$6.$blk !== undefined) { break s; }
|
|
143500
|
-
userAgent = _r$6;
|
|
143501
|
-
/* } */ case 26:
|
|
143502
|
-
/* */ if (!(userAgent === "")) { $s = 28; continue; }
|
|
143503
|
-
/* */ $s = 29; continue;
|
|
143504
|
-
/* if (!(userAgent === "")) { */ case 28:
|
|
143505
|
-
_r$7 = fmt.Fprintf(w, "User-Agent: %s\r\n", new sliceType([new $String(userAgent)])); /* */ $s = 30; case 30: if($c) { $c = false; _r$7 = _r$7.$blk(); } if (_r$7 && _r$7.$blk !== undefined) { break s; }
|
|
143506
|
-
_tuple$3 = _r$7;
|
|
143507
|
-
err[0] = _tuple$3[1];
|
|
143508
|
-
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 31; continue; }
|
|
143509
|
-
/* */ $s = 32; continue;
|
|
143510
|
-
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 31:
|
|
143511
|
-
err[0] = err[0];
|
|
143512
|
-
$24r$4 = err[0];
|
|
143513
|
-
$s = 33; case 33: return $24r$4;
|
|
143514
|
-
/* } */ case 32:
|
|
143515
|
-
/* */ if (!(trace[0] === ptrType$19.nil) && !(trace[0].WroteHeaderField === $throwNilPointerError)) { $s = 34; continue; }
|
|
143516
|
-
/* */ $s = 35; continue;
|
|
143517
|
-
/* if (!(trace[0] === ptrType$19.nil) && !(trace[0].WroteHeaderField === $throwNilPointerError)) { */ case 34:
|
|
143518
|
-
$r = trace[0].WroteHeaderField("User-Agent", new sliceType$2([userAgent])); /* */ $s = 36; case 36: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
143519
|
-
/* } */ case 35:
|
|
143520
|
-
/* } */ case 29:
|
|
143521
|
-
_r$8 = newTransferWriter(r[0]); /* */ $s = 37; case 37: if($c) { $c = false; _r$8 = _r$8.$blk(); } if (_r$8 && _r$8.$blk !== undefined) { break s; }
|
|
143522
|
-
_tuple$4 = _r$8;
|
|
143523
|
-
tw = _tuple$4[0];
|
|
143524
|
-
err[0] = _tuple$4[1];
|
|
143525
|
-
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 38; continue; }
|
|
143526
|
-
/* */ $s = 39; continue;
|
|
143527
|
-
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 38:
|
|
143564
|
+
$24r$4 = err[0];
|
|
143565
|
+
$s = 25; case 25: return $24r$4;
|
|
143566
|
+
/* } */ case 24:
|
|
143567
|
+
_r$4 = fmt.Fprintf(w, "Host: %s\r\n", new sliceType([new $String(host)])); /* */ $s = 26; case 26: if($c) { $c = false; _r$4 = _r$4.$blk(); } if (_r$4 && _r$4.$blk !== undefined) { break s; }
|
|
143568
|
+
_tuple$3 = _r$4;
|
|
143569
|
+
err[0] = _tuple$3[1];
|
|
143570
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 27; continue; }
|
|
143571
|
+
/* */ $s = 28; continue;
|
|
143572
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 27:
|
|
143528
143573
|
err[0] = err[0];
|
|
143529
143574
|
$24r$5 = err[0];
|
|
143530
|
-
$s =
|
|
143531
|
-
/* } */ case
|
|
143532
|
-
|
|
143533
|
-
|
|
143534
|
-
/*
|
|
143535
|
-
|
|
143536
|
-
/*
|
|
143537
|
-
|
|
143538
|
-
|
|
143539
|
-
|
|
143540
|
-
/*
|
|
143541
|
-
|
|
143542
|
-
|
|
143575
|
+
$s = 29; case 29: return $24r$5;
|
|
143576
|
+
/* } */ case 28:
|
|
143577
|
+
/* */ if (!(trace[0] === ptrType$19.nil) && !(trace[0].WroteHeaderField === $throwNilPointerError)) { $s = 30; continue; }
|
|
143578
|
+
/* */ $s = 31; continue;
|
|
143579
|
+
/* if (!(trace[0] === ptrType$19.nil) && !(trace[0].WroteHeaderField === $throwNilPointerError)) { */ case 30:
|
|
143580
|
+
$r = trace[0].WroteHeaderField("Host", new sliceType$2([host])); /* */ $s = 32; case 32: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
143581
|
+
/* } */ case 31:
|
|
143582
|
+
userAgent = "Go-http-client/1.1";
|
|
143583
|
+
/* */ if (new Header(r[0].Header).has("User-Agent")) { $s = 33; continue; }
|
|
143584
|
+
/* */ $s = 34; continue;
|
|
143585
|
+
/* if (new Header(r[0].Header).has("User-Agent")) { */ case 33:
|
|
143586
|
+
_r$5 = new Header(r[0].Header).Get("User-Agent"); /* */ $s = 35; case 35: if($c) { $c = false; _r$5 = _r$5.$blk(); } if (_r$5 && _r$5.$blk !== undefined) { break s; }
|
|
143587
|
+
userAgent = _r$5;
|
|
143588
|
+
/* } */ case 34:
|
|
143589
|
+
/* */ if (!(userAgent === "")) { $s = 36; continue; }
|
|
143590
|
+
/* */ $s = 37; continue;
|
|
143591
|
+
/* if (!(userAgent === "")) { */ case 36:
|
|
143592
|
+
_r$6 = fmt.Fprintf(w, "User-Agent: %s\r\n", new sliceType([new $String(userAgent)])); /* */ $s = 38; case 38: if($c) { $c = false; _r$6 = _r$6.$blk(); } if (_r$6 && _r$6.$blk !== undefined) { break s; }
|
|
143593
|
+
_tuple$4 = _r$6;
|
|
143594
|
+
err[0] = _tuple$4[1];
|
|
143595
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 39; continue; }
|
|
143596
|
+
/* */ $s = 40; continue;
|
|
143597
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 39:
|
|
143598
|
+
err[0] = err[0];
|
|
143599
|
+
$24r$6 = err[0];
|
|
143600
|
+
$s = 41; case 41: return $24r$6;
|
|
143601
|
+
/* } */ case 40:
|
|
143602
|
+
/* */ if (!(trace[0] === ptrType$19.nil) && !(trace[0].WroteHeaderField === $throwNilPointerError)) { $s = 42; continue; }
|
|
143603
|
+
/* */ $s = 43; continue;
|
|
143604
|
+
/* if (!(trace[0] === ptrType$19.nil) && !(trace[0].WroteHeaderField === $throwNilPointerError)) { */ case 42:
|
|
143605
|
+
$r = trace[0].WroteHeaderField("User-Agent", new sliceType$2([userAgent])); /* */ $s = 44; case 44: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
143606
|
+
/* } */ case 43:
|
|
143607
|
+
/* } */ case 37:
|
|
143608
|
+
_r$7 = newTransferWriter(r[0]); /* */ $s = 45; case 45: if($c) { $c = false; _r$7 = _r$7.$blk(); } if (_r$7 && _r$7.$blk !== undefined) { break s; }
|
|
143609
|
+
_tuple$5 = _r$7;
|
|
143610
|
+
tw = _tuple$5[0];
|
|
143611
|
+
err[0] = _tuple$5[1];
|
|
143543
143612
|
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 46; continue; }
|
|
143544
143613
|
/* */ $s = 47; continue;
|
|
143545
143614
|
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 46:
|
|
@@ -143547,111 +143616,129 @@ $packages["net/http"] = (function() {
|
|
|
143547
143616
|
$24r$7 = err[0];
|
|
143548
143617
|
$s = 48; case 48: return $24r$7;
|
|
143549
143618
|
/* } */ case 47:
|
|
143550
|
-
/* */
|
|
143551
|
-
|
|
143552
|
-
/* if (!(
|
|
143553
|
-
|
|
143554
|
-
|
|
143555
|
-
|
|
143556
|
-
|
|
143557
|
-
|
|
143558
|
-
|
|
143559
|
-
|
|
143560
|
-
|
|
143561
|
-
|
|
143562
|
-
/*
|
|
143563
|
-
|
|
143564
|
-
_tuple$5 = _r$12;
|
|
143565
|
-
err[0] = _tuple$5[1];
|
|
143566
|
-
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 56; continue; }
|
|
143567
|
-
/* */ $s = 57; continue;
|
|
143568
|
-
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 56:
|
|
143619
|
+
_r$8 = tw.writeHeader(w, trace[0]); /* */ $s = 49; case 49: if($c) { $c = false; _r$8 = _r$8.$blk(); } if (_r$8 && _r$8.$blk !== undefined) { break s; }
|
|
143620
|
+
err[0] = _r$8;
|
|
143621
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 50; continue; }
|
|
143622
|
+
/* */ $s = 51; continue;
|
|
143623
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 50:
|
|
143624
|
+
err[0] = err[0];
|
|
143625
|
+
$24r$8 = err[0];
|
|
143626
|
+
$s = 52; case 52: return $24r$8;
|
|
143627
|
+
/* } */ case 51:
|
|
143628
|
+
_r$9 = new Header(r[0].Header).writeSubset(w, reqWriteExcludeHeader, trace[0]); /* */ $s = 53; case 53: if($c) { $c = false; _r$9 = _r$9.$blk(); } if (_r$9 && _r$9.$blk !== undefined) { break s; }
|
|
143629
|
+
err[0] = _r$9;
|
|
143630
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 54; continue; }
|
|
143631
|
+
/* */ $s = 55; continue;
|
|
143632
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 54:
|
|
143569
143633
|
err[0] = err[0];
|
|
143570
143634
|
$24r$9 = err[0];
|
|
143571
|
-
$s =
|
|
143572
|
-
/* } */ case
|
|
143573
|
-
/* */ if (!(
|
|
143574
|
-
/* */ $s =
|
|
143575
|
-
/* if (!(
|
|
143576
|
-
$
|
|
143577
|
-
|
|
143578
|
-
|
|
143579
|
-
|
|
143580
|
-
|
|
143581
|
-
|
|
143582
|
-
|
|
143583
|
-
|
|
143584
|
-
/* */
|
|
143585
|
-
|
|
143586
|
-
|
|
143587
|
-
|
|
143588
|
-
|
|
143589
|
-
|
|
143590
|
-
|
|
143591
|
-
|
|
143635
|
+
$s = 56; case 56: return $24r$9;
|
|
143636
|
+
/* } */ case 55:
|
|
143637
|
+
/* */ if (!(extraHeaders === false)) { $s = 57; continue; }
|
|
143638
|
+
/* */ $s = 58; continue;
|
|
143639
|
+
/* if (!(extraHeaders === false)) { */ case 57:
|
|
143640
|
+
_r$10 = new Header(extraHeaders).write(w, trace[0]); /* */ $s = 59; case 59: if($c) { $c = false; _r$10 = _r$10.$blk(); } if (_r$10 && _r$10.$blk !== undefined) { break s; }
|
|
143641
|
+
err[0] = _r$10;
|
|
143642
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 60; continue; }
|
|
143643
|
+
/* */ $s = 61; continue;
|
|
143644
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 60:
|
|
143645
|
+
err[0] = err[0];
|
|
143646
|
+
$24r$10 = err[0];
|
|
143647
|
+
$s = 62; case 62: return $24r$10;
|
|
143648
|
+
/* } */ case 61:
|
|
143649
|
+
/* } */ case 58:
|
|
143650
|
+
_r$11 = io.WriteString(w, "\r\n"); /* */ $s = 63; case 63: if($c) { $c = false; _r$11 = _r$11.$blk(); } if (_r$11 && _r$11.$blk !== undefined) { break s; }
|
|
143651
|
+
_tuple$6 = _r$11;
|
|
143652
|
+
err[0] = _tuple$6[1];
|
|
143653
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 64; continue; }
|
|
143654
|
+
/* */ $s = 65; continue;
|
|
143655
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 64:
|
|
143656
|
+
err[0] = err[0];
|
|
143657
|
+
$24r$11 = err[0];
|
|
143658
|
+
$s = 66; case 66: return $24r$11;
|
|
143659
|
+
/* } */ case 65:
|
|
143660
|
+
/* */ if (!(trace[0] === ptrType$19.nil) && !(trace[0].WroteHeaders === $throwNilPointerError)) { $s = 67; continue; }
|
|
143661
|
+
/* */ $s = 68; continue;
|
|
143662
|
+
/* if (!(trace[0] === ptrType$19.nil) && !(trace[0].WroteHeaders === $throwNilPointerError)) { */ case 67:
|
|
143663
|
+
$r = trace[0].WroteHeaders(); /* */ $s = 69; case 69: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
143664
|
+
/* } */ case 68:
|
|
143665
|
+
/* */ if (!(waitForContinue === $throwNilPointerError)) { $s = 70; continue; }
|
|
143666
|
+
/* */ $s = 71; continue;
|
|
143667
|
+
/* if (!(waitForContinue === $throwNilPointerError)) { */ case 70:
|
|
143668
|
+
_tuple$7 = $assertType(w, ptrType$12, true);
|
|
143669
|
+
bw$1 = _tuple$7[0];
|
|
143670
|
+
ok$1 = _tuple$7[1];
|
|
143671
|
+
/* */ if (ok$1) { $s = 72; continue; }
|
|
143672
|
+
/* */ $s = 73; continue;
|
|
143673
|
+
/* if (ok$1) { */ case 72:
|
|
143674
|
+
_r$12 = bw$1.Flush(); /* */ $s = 74; case 74: if($c) { $c = false; _r$12 = _r$12.$blk(); } if (_r$12 && _r$12.$blk !== undefined) { break s; }
|
|
143675
|
+
err[0] = _r$12;
|
|
143676
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 75; continue; }
|
|
143677
|
+
/* */ $s = 76; continue;
|
|
143678
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 75:
|
|
143592
143679
|
err[0] = err[0];
|
|
143593
|
-
$24r$
|
|
143594
|
-
$s =
|
|
143595
|
-
/* } */ case
|
|
143596
|
-
/* } */ case
|
|
143597
|
-
/* */ if (!(trace[0] === ptrType$19.nil) && !(trace[0].Wait100Continue === $throwNilPointerError)) { $s =
|
|
143598
|
-
/* */ $s =
|
|
143599
|
-
/* if (!(trace[0] === ptrType$19.nil) && !(trace[0].Wait100Continue === $throwNilPointerError)) { */ case
|
|
143600
|
-
$r = trace[0].Wait100Continue(); /* */ $s =
|
|
143601
|
-
/* } */ case
|
|
143602
|
-
_r$
|
|
143603
|
-
/* */ if (!_r$
|
|
143604
|
-
/* */ $s =
|
|
143605
|
-
/* if (!_r$
|
|
143680
|
+
$24r$12 = err[0];
|
|
143681
|
+
$s = 77; case 77: return $24r$12;
|
|
143682
|
+
/* } */ case 76:
|
|
143683
|
+
/* } */ case 73:
|
|
143684
|
+
/* */ if (!(trace[0] === ptrType$19.nil) && !(trace[0].Wait100Continue === $throwNilPointerError)) { $s = 78; continue; }
|
|
143685
|
+
/* */ $s = 79; continue;
|
|
143686
|
+
/* if (!(trace[0] === ptrType$19.nil) && !(trace[0].Wait100Continue === $throwNilPointerError)) { */ case 78:
|
|
143687
|
+
$r = trace[0].Wait100Continue(); /* */ $s = 80; case 80: if($c) { $c = false; $r = $r.$blk(); } if ($r && $r.$blk !== undefined) { break s; }
|
|
143688
|
+
/* } */ case 79:
|
|
143689
|
+
_r$13 = waitForContinue(); /* */ $s = 83; case 83: if($c) { $c = false; _r$13 = _r$13.$blk(); } if (_r$13 && _r$13.$blk !== undefined) { break s; }
|
|
143690
|
+
/* */ if (!_r$13) { $s = 81; continue; }
|
|
143691
|
+
/* */ $s = 82; continue;
|
|
143692
|
+
/* if (!_r$13) { */ case 81:
|
|
143606
143693
|
closed[0] = true;
|
|
143607
|
-
_r$
|
|
143608
|
-
_r$
|
|
143694
|
+
_r$14 = r[0].closeBody(); /* */ $s = 84; case 84: if($c) { $c = false; _r$14 = _r$14.$blk(); } if (_r$14 && _r$14.$blk !== undefined) { break s; }
|
|
143695
|
+
_r$14;
|
|
143609
143696
|
err[0] = $ifaceNil;
|
|
143610
|
-
$24r$
|
|
143611
|
-
$s =
|
|
143612
|
-
/* } */ case 74:
|
|
143613
|
-
/* } */ case 63:
|
|
143614
|
-
_tuple$7 = $assertType(w, ptrType$12, true);
|
|
143615
|
-
bw$2 = _tuple$7[0];
|
|
143616
|
-
ok$2 = _tuple$7[1];
|
|
143617
|
-
/* */ if (ok$2 && tw.FlushHeaders) { $s = 78; continue; }
|
|
143618
|
-
/* */ $s = 79; continue;
|
|
143619
|
-
/* if (ok$2 && tw.FlushHeaders) { */ case 78:
|
|
143620
|
-
_r$16 = bw$2.Flush(); /* */ $s = 80; case 80: if($c) { $c = false; _r$16 = _r$16.$blk(); } if (_r$16 && _r$16.$blk !== undefined) { break s; }
|
|
143621
|
-
err$1 = _r$16;
|
|
143622
|
-
/* */ if (!($interfaceIsEqual(err$1, $ifaceNil))) { $s = 81; continue; }
|
|
143623
|
-
/* */ $s = 82; continue;
|
|
143624
|
-
/* if (!($interfaceIsEqual(err$1, $ifaceNil))) { */ case 81:
|
|
143625
|
-
err[0] = err$1;
|
|
143626
|
-
$24r$12 = err[0];
|
|
143627
|
-
$s = 83; case 83: return $24r$12;
|
|
143697
|
+
$24r$13 = err[0];
|
|
143698
|
+
$s = 85; case 85: return $24r$13;
|
|
143628
143699
|
/* } */ case 82:
|
|
143629
|
-
/* } */ case
|
|
143700
|
+
/* } */ case 71:
|
|
143701
|
+
_tuple$8 = $assertType(w, ptrType$12, true);
|
|
143702
|
+
bw$2 = _tuple$8[0];
|
|
143703
|
+
ok$2 = _tuple$8[1];
|
|
143704
|
+
/* */ if (ok$2 && tw.FlushHeaders) { $s = 86; continue; }
|
|
143705
|
+
/* */ $s = 87; continue;
|
|
143706
|
+
/* if (ok$2 && tw.FlushHeaders) { */ case 86:
|
|
143707
|
+
_r$15 = bw$2.Flush(); /* */ $s = 88; case 88: if($c) { $c = false; _r$15 = _r$15.$blk(); } if (_r$15 && _r$15.$blk !== undefined) { break s; }
|
|
143708
|
+
err$1 = _r$15;
|
|
143709
|
+
/* */ if (!($interfaceIsEqual(err$1, $ifaceNil))) { $s = 89; continue; }
|
|
143710
|
+
/* */ $s = 90; continue;
|
|
143711
|
+
/* if (!($interfaceIsEqual(err$1, $ifaceNil))) { */ case 89:
|
|
143712
|
+
err[0] = err$1;
|
|
143713
|
+
$24r$14 = err[0];
|
|
143714
|
+
$s = 91; case 91: return $24r$14;
|
|
143715
|
+
/* } */ case 90:
|
|
143716
|
+
/* } */ case 87:
|
|
143630
143717
|
closed[0] = true;
|
|
143631
|
-
_r$
|
|
143632
|
-
err[0] = _r$
|
|
143633
|
-
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s =
|
|
143634
|
-
/* */ $s =
|
|
143635
|
-
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case
|
|
143718
|
+
_r$16 = tw.writeBody(w); /* */ $s = 92; case 92: if($c) { $c = false; _r$16 = _r$16.$blk(); } if (_r$16 && _r$16.$blk !== undefined) { break s; }
|
|
143719
|
+
err[0] = _r$16;
|
|
143720
|
+
/* */ if (!($interfaceIsEqual(err[0], $ifaceNil))) { $s = 93; continue; }
|
|
143721
|
+
/* */ $s = 94; continue;
|
|
143722
|
+
/* if (!($interfaceIsEqual(err[0], $ifaceNil))) { */ case 93:
|
|
143636
143723
|
if ($interfaceIsEqual(tw.bodyReadError, err[0])) {
|
|
143637
143724
|
err[0] = (x$7 = new requestBodyReadError.ptr(err[0]), new x$7.constructor.elem(x$7));
|
|
143638
143725
|
}
|
|
143639
143726
|
err[0] = err[0];
|
|
143640
|
-
$24r$
|
|
143641
|
-
$s =
|
|
143642
|
-
/* } */ case
|
|
143643
|
-
/* */ if (!(bw === ptrType$12.nil)) { $s =
|
|
143644
|
-
/* */ $s =
|
|
143645
|
-
/* if (!(bw === ptrType$12.nil)) { */ case
|
|
143646
|
-
_r$
|
|
143647
|
-
err[0] = _r$
|
|
143648
|
-
$24r$
|
|
143649
|
-
$s =
|
|
143650
|
-
/* } */ case
|
|
143727
|
+
$24r$15 = err[0];
|
|
143728
|
+
$s = 95; case 95: return $24r$15;
|
|
143729
|
+
/* } */ case 94:
|
|
143730
|
+
/* */ if (!(bw === ptrType$12.nil)) { $s = 96; continue; }
|
|
143731
|
+
/* */ $s = 97; continue;
|
|
143732
|
+
/* if (!(bw === ptrType$12.nil)) { */ case 96:
|
|
143733
|
+
_r$17 = bw.Flush(); /* */ $s = 98; case 98: if($c) { $c = false; _r$17 = _r$17.$blk(); } if (_r$17 && _r$17.$blk !== undefined) { break s; }
|
|
143734
|
+
err[0] = _r$17;
|
|
143735
|
+
$24r$16 = err[0];
|
|
143736
|
+
$s = 99; case 99: return $24r$16;
|
|
143737
|
+
/* } */ case 97:
|
|
143651
143738
|
err[0] = $ifaceNil;
|
|
143652
|
-
$24r$
|
|
143653
|
-
$s =
|
|
143654
|
-
/* */ } return; } } catch(err) { $err = err; $s = -1; } finally { $callDeferred($deferred, $err); if (!$curGoroutine.asleep) { return err[0]; } if($curGoroutine.asleep) { var $f = {$blk: Request.ptr.prototype.write, $c: true, $r, $24r, $24r$1, $24r$10, $24r$11, $24r$12, $24r$13, $24r$14, $24r$15, $24r$2, $24r$3, $24r$4, $24r$5, $24r$6, $24r$7, $24r$8, $24r$9, _r$1, _r$10, _r$11, _r$12, _r$13, _r$14, _r$15, _r$16, _r$17, _r$
|
|
143739
|
+
$24r$17 = err[0];
|
|
143740
|
+
$s = 100; case 100: return $24r$17;
|
|
143741
|
+
/* */ } return; } } catch(err) { $err = err; $s = -1; } finally { $callDeferred($deferred, $err); if (!$curGoroutine.asleep) { return err[0]; } if($curGoroutine.asleep) { var $f = {$blk: Request.ptr.prototype.write, $c: true, $r, $24r, $24r$1, $24r$10, $24r$11, $24r$12, $24r$13, $24r$14, $24r$15, $24r$16, $24r$17, $24r$2, $24r$3, $24r$4, $24r$5, $24r$6, $24r$7, $24r$8, $24r$9, _r$1, _r$10, _r$11, _r$12, _r$13, _r$14, _r$15, _r$16, _r$17, _r$2, _r$3, _r$4, _r$5, _r$6, _r$7, _r$8, _r$9, _tuple, _tuple$1, _tuple$2, _tuple$3, _tuple$4, _tuple$5, _tuple$6, _tuple$7, _tuple$8, bw, bw$1, bw$2, closed, err, err$1, extraHeaders, host, ok, ok$1, ok$2, r, ruri, trace, tw, userAgent, usingProxy, w, waitForContinue, x$7, $s, $deferred};return $f; } }
|
|
143655
143742
|
};
|
|
143656
143743
|
Request.prototype.write = function(w, usingProxy, extraHeaders, waitForContinue) { return this.$val.write(w, usingProxy, extraHeaders, waitForContinue); };
|
|
143657
143744
|
idnaASCII = function(v) {
|
|
@@ -143665,40 +143752,6 @@ $packages["net/http"] = (function() {
|
|
|
143665
143752
|
$s = 2; case 2: return $24r;
|
|
143666
143753
|
/* */ } return; } var $f = {$blk: idnaASCII, $c: true, $r, $24r, _r$1, v, $s};return $f;
|
|
143667
143754
|
};
|
|
143668
|
-
cleanHost = function(in$1) {
|
|
143669
|
-
var {_r$1, _r$2, _r$3, _tuple, _tuple$1, _tuple$2, a, a$1, err, err$1, host, i, in$1, port, $s, $r, $c} = $restore(this, {in$1});
|
|
143670
|
-
/* */ $s = $s || 0; s: while (true) { switch ($s) { case 0:
|
|
143671
|
-
i = strings.IndexAny(in$1, " /");
|
|
143672
|
-
if (!((i === -1))) {
|
|
143673
|
-
in$1 = $substring(in$1, 0, i);
|
|
143674
|
-
}
|
|
143675
|
-
_r$1 = net.SplitHostPort(in$1); /* */ $s = 1; case 1: if($c) { $c = false; _r$1 = _r$1.$blk(); } if (_r$1 && _r$1.$blk !== undefined) { break s; }
|
|
143676
|
-
_tuple = _r$1;
|
|
143677
|
-
host = _tuple[0];
|
|
143678
|
-
port = _tuple[1];
|
|
143679
|
-
err = _tuple[2];
|
|
143680
|
-
/* */ if (!($interfaceIsEqual(err, $ifaceNil))) { $s = 2; continue; }
|
|
143681
|
-
/* */ $s = 3; continue;
|
|
143682
|
-
/* if (!($interfaceIsEqual(err, $ifaceNil))) { */ case 2:
|
|
143683
|
-
_r$2 = idnaASCII(in$1); /* */ $s = 4; case 4: if($c) { $c = false; _r$2 = _r$2.$blk(); } if (_r$2 && _r$2.$blk !== undefined) { break s; }
|
|
143684
|
-
_tuple$1 = _r$2;
|
|
143685
|
-
a = _tuple$1[0];
|
|
143686
|
-
err$1 = _tuple$1[1];
|
|
143687
|
-
if (!($interfaceIsEqual(err$1, $ifaceNil))) {
|
|
143688
|
-
$s = -1; return in$1;
|
|
143689
|
-
}
|
|
143690
|
-
$s = -1; return a;
|
|
143691
|
-
/* } */ case 3:
|
|
143692
|
-
_r$3 = idnaASCII(host); /* */ $s = 5; case 5: if($c) { $c = false; _r$3 = _r$3.$blk(); } if (_r$3 && _r$3.$blk !== undefined) { break s; }
|
|
143693
|
-
_tuple$2 = _r$3;
|
|
143694
|
-
a$1 = _tuple$2[0];
|
|
143695
|
-
err = _tuple$2[1];
|
|
143696
|
-
if (!($interfaceIsEqual(err, $ifaceNil))) {
|
|
143697
|
-
$s = -1; return in$1;
|
|
143698
|
-
}
|
|
143699
|
-
$s = -1; return net.JoinHostPort(a$1, port);
|
|
143700
|
-
/* */ } return; } var $f = {$blk: cleanHost, $c: true, $r, _r$1, _r$2, _r$3, _tuple, _tuple$1, _tuple$2, a, a$1, err, err$1, host, i, in$1, port, $s};return $f;
|
|
143701
|
-
};
|
|
143702
143755
|
removeZone = function(host) {
|
|
143703
143756
|
var host, i, j;
|
|
143704
143757
|
if (!strings.HasPrefix(host, "[")) {
|