diff --git a/http2.d b/http2.d index 47552c2..8a111ab 100644 --- a/http2.d +++ b/http2.d @@ -535,16 +535,20 @@ class HttpRequest { switch(name) { case "Connection": + case "connection": if(value == "close") closeSocketWhenComplete = true; break; case "Content-Type": + case "content-type": responseData.contentType = value; break; case "Content-Length": + case "content-length": bodyReadingState.contentLengthRemaining = to!int(value); break; case "Transfer-Encoding": + case "transfer-encoding": // note that if it is gzipped, it zips first, then chunks the compressed stream. // so we should always dechunk first, then feed into the decompressor if(value.strip == "chunked") @@ -552,6 +556,7 @@ class HttpRequest { else throw new Exception("Unknown Transfer-Encoding: " ~ value); break; case "Content-Encoding": + case "content-encoding": if(value == "gzip") { bodyReadingState.isGzipped = true; uncompress = new UnCompress(); @@ -561,6 +566,7 @@ class HttpRequest { } else throw new Exception("Unknown Content-Encoding: " ~ value); break; case "Set-Cookie": + case "set-cookie": // FIXME handle break; default: @@ -713,7 +719,7 @@ class HttpRequest { // responseData.content ~= cast(ubyte[]) uncompress.uncompress(data); //else responseData.content ~= data; - assert(data.length <= bodyReadingState.contentLengthRemaining); + assert(data.length <= bodyReadingState.contentLengthRemaining, format("%d <= %d\n%s", data.length, bodyReadingState.contentLengthRemaining, cast(string)data)); bodyReadingState.contentLengthRemaining -= data.length; if(bodyReadingState.contentLengthRemaining == 0) { if(bodyReadingState.isGzipped || bodyReadingState.isDeflated) { diff --git a/joystick.d b/joystick.d index aa9c39b..9cf1a09 100644 --- a/joystick.d +++ b/joystick.d @@ -168,7 +168,7 @@ version(linux) { js_event event; while(true) { - int r = read(fd, &event, event.sizeof); + auto r = read(fd, &event, event.sizeof); if(r == -1) { import core.stdc.errno; if(errno == EAGAIN || errno == EWOULDBLOCK) @@ -177,7 +177,7 @@ version(linux) { } assert(r == event.sizeof); - int player = -1; + ptrdiff_t player = -1; foreach(i, f; joystickFds) if(f == fd) { player = i; @@ -306,7 +306,7 @@ int enableJoystickInput( return 4; } else static assert(0, "Unsupported OS"); - return 0; + // return 0; } void closeJoysticks() { diff --git a/simpledisplay.d b/simpledisplay.d index 895a359..89ba918 100644 --- a/simpledisplay.d +++ b/simpledisplay.d @@ -8773,7 +8773,9 @@ enum _NET_WM_STATE_TOGGLE = 2; /// X-specific void demandAttention(SimpleWindow window, bool needs = true) { auto display = XDisplayConnection.get(); - auto atom = GetAtom!"_NET_WM_STATE_DEMANDS_ATTENTION"(display); + auto atom = XInternAtom(display, "_NET_WM_STATE_DEMANDS_ATTENTION", true); + if(atom == None) + return; // non-failure error //auto atom2 = GetAtom!"_NET_WM_STATE_SHADED"(display); XClientMessageEvent xclient; diff --git a/sslsocket.d b/sslsocket.d index 16c4966..cdc84b9 100644 --- a/sslsocket.d +++ b/sslsocket.d @@ -14,6 +14,7 @@ btw, interesting: http://msdn.microsoft.com/en-us/library/windows/desktop/aa364510%28v=vs.85%29.aspx */ +module sslsocket; public import std.socket; @@ -82,6 +83,10 @@ version(use_openssl) { SSL_set_fd(ssl, this.handle); } + bool dataPending() { + return SSL_pending(ssl) > 0; + } + @trusted override void connect(Address to) { super.connect(to); @@ -96,14 +101,31 @@ version(use_openssl) { @trusted override ptrdiff_t send(const(void)[] buf, SocketFlags flags) { - return SSL_write(ssl, buf.ptr, cast(uint) buf.length); + auto retval = SSL_write(ssl, buf.ptr, cast(uint) buf.length); + if(retval == -1) { + ERR_print_errors_fp(stderr); + int i; + printf("wtf\n"); + scanf("%d\n", i); + throw new Exception("ssl send"); + } + return retval; + } override ptrdiff_t send(const(void)[] buf) { return send(buf, SocketFlags.NONE); } @trusted override ptrdiff_t receive(void[] buf, SocketFlags flags) { - return SSL_read(ssl, buf.ptr, cast(int)buf.length); + auto retval = SSL_read(ssl, buf.ptr, cast(int)buf.length); + if(retval == -1) { + ERR_print_errors_fp(stderr); + int i; + printf("wtf\n"); + scanf("%d\n", i); + throw new Exception("ssl send"); + } + return retval; } override ptrdiff_t receive(void[] buf) { return receive(buf, SocketFlags.NONE);