123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774 |
- /*
- * uclient - ustream based protocol client library
- *
- * Copyright (C) 2014 Felix Fietkau <nbd@openwrt.org>
- *
- * Permission to use, copy, modify, and/or distribute this software for any
- * purpose with or without fee is hereby granted, provided that the above
- * copyright notice and this permission notice appear in all copies.
- *
- * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
- * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
- * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
- * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
- * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
- * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
- * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
- */
- #define _GNU_SOURCE
- #include <sys/stat.h>
- #include <sys/socket.h>
- #include <unistd.h>
- #include <stdio.h>
- #include <dlfcn.h>
- #include <getopt.h>
- #include <fcntl.h>
- #include <glob.h>
- #include <stdint.h>
- #include <inttypes.h>
- #include <signal.h>
- #include <libubox/blobmsg.h>
- #include "progress.h"
- #include "uclient.h"
- #include "uclient-utils.h"
- #ifdef __APPLE__
- #define LIB_EXT "dylib"
- #else
- #define LIB_EXT "so"
- #endif
- #ifndef strdupa
- #define strdupa(x) strcpy(alloca(strlen(x)+1),x)
- #endif
- static const char *user_agent = "uclient-fetch";
- static const char *post_data;
- static const char *post_file;
- static struct ustream_ssl_ctx *ssl_ctx;
- static const struct ustream_ssl_ops *ssl_ops;
- static int quiet = false;
- static bool verify = true;
- static bool proxy = true;
- static bool default_certs = false;
- static bool no_output;
- static const char *opt_output_file;
- static int output_fd = -1;
- static int error_ret;
- static off_t out_offset;
- static off_t out_bytes;
- static off_t out_len;
- static char *auth_str;
- static char **urls;
- static int n_urls;
- static int timeout;
- static bool resume, cur_resume;
- static struct progress pmt;
- static struct uloop_timeout pmt_timer;
- static int init_request(struct uclient *cl);
- static void request_done(struct uclient *cl);
- static void pmt_update(struct uloop_timeout *t)
- {
- progress_update(&pmt, out_offset, out_bytes, out_len);
- uloop_timeout_set(t, 1000);
- }
- static const char *
- get_proxy_url(char *url)
- {
- char prefix[16];
- char *sep;
- if (!proxy)
- return NULL;
- sep = strchr(url, ':');
- if (!sep)
- return NULL;
- if (sep - url > 5)
- return NULL;
- memcpy(prefix, url, sep - url);
- strcpy(prefix + (sep - url), "_proxy");
- return getenv(prefix);
- }
- static int open_output_file(const char *path, uint64_t resume_offset)
- {
- const char *output_file = opt_output_file;
- char *filename = NULL;
- int flags;
- int ret;
- if (cur_resume)
- flags = O_RDWR;
- else
- flags = O_WRONLY | O_TRUNC;
- if (!cur_resume && !output_file)
- flags |= O_EXCL;
- flags |= O_CREAT;
- if (output_file) {
- if (!strcmp(output_file, "-")) {
- if (!quiet)
- fprintf(stderr, "Writing to stdout\n");
- ret = STDOUT_FILENO;
- goto done;
- }
- } else {
- filename = uclient_get_url_filename(path, "index.html");
- if (!filename) {
- ret = -ENOMEM;
- goto out;
- }
- output_file = filename;
- }
- if (!quiet)
- fprintf(stderr, "Writing to '%s'\n", output_file);
- ret = open(output_file, flags, 0644);
- if (ret < 0)
- goto free;
- if (resume_offset &&
- lseek(ret, resume_offset, SEEK_SET) < 0) {
- if (!quiet)
- fprintf(stderr, "Failed to seek %"PRIu64" bytes in output file\n", resume_offset);
- close(ret);
- ret = -1;
- goto free;
- }
- out_offset = resume_offset;
- out_bytes += resume_offset;
- done:
- if (!quiet) {
- progress_init(&pmt, output_file);
- pmt_timer.cb = pmt_update;
- pmt_timer.cb(&pmt_timer);
- }
- free:
- free(filename);
- out:
- return ret;
- }
- static void header_done_cb(struct uclient *cl)
- {
- enum {
- H_RANGE,
- H_LEN,
- __H_MAX
- };
- static const struct blobmsg_policy policy[__H_MAX] = {
- [H_RANGE] = { .name = "content-range", .type = BLOBMSG_TYPE_STRING },
- [H_LEN] = { .name = "content-length", .type = BLOBMSG_TYPE_STRING },
- };
- struct blob_attr *tb[__H_MAX];
- uint64_t resume_offset = 0, resume_end, resume_size;
- static int retries;
- if (retries < 10) {
- int ret = uclient_http_redirect(cl);
- if (ret < 0) {
- if (!quiet)
- fprintf(stderr, "Failed to redirect to %s on %s\n", cl->url->location, cl->url->host);
- error_ret = 8;
- request_done(cl);
- return;
- }
- if (ret > 0) {
- if (!quiet)
- fprintf(stderr, "Redirected to %s on %s\n", cl->url->location, cl->url->host);
- retries++;
- return;
- }
- }
- if (cl->status_code == 204 && cur_resume) {
- /* Resume attempt failed, try normal download */
- cur_resume = false;
- init_request(cl);
- return;
- }
- blobmsg_parse(policy, __H_MAX, tb, blob_data(cl->meta), blob_len(cl->meta));
- switch (cl->status_code) {
- case 416:
- if (!quiet)
- fprintf(stderr, "File download already fully retrieved; nothing to do.\n");
- request_done(cl);
- break;
- case 206:
- if (!cur_resume) {
- if (!quiet)
- fprintf(stderr, "Error: Partial content received, full content requested\n");
- error_ret = 8;
- request_done(cl);
- break;
- }
- if (!tb[H_RANGE]) {
- if (!quiet)
- fprintf(stderr, "Content-Range header is missing\n");
- error_ret = 8;
- break;
- }
- if (sscanf(blobmsg_get_string(tb[H_RANGE]),
- "bytes %"PRIu64"-%"PRIu64"/%"PRIu64,
- &resume_offset, &resume_end, &resume_size) != 3) {
- if (!quiet)
- fprintf(stderr, "Content-Range header is invalid\n");
- error_ret = 8;
- break;
- }
- /* fall through */
- case 204:
- case 200:
- if (no_output)
- break;
- if (tb[H_LEN])
- out_len = strtoul(blobmsg_get_string(tb[H_LEN]), NULL, 10);
- output_fd = open_output_file(cl->url->location, resume_offset);
- if (output_fd < 0) {
- if (!quiet)
- perror("Cannot open output file");
- error_ret = 3;
- request_done(cl);
- }
- break;
- default:
- if (!quiet)
- fprintf(stderr, "HTTP error %d\n", cl->status_code);
- request_done(cl);
- error_ret = 8;
- break;
- }
- }
- static void read_data_cb(struct uclient *cl)
- {
- char buf[256];
- ssize_t n;
- int len;
- if (!no_output && output_fd < 0)
- return;
- while (1) {
- len = uclient_read(cl, buf, sizeof(buf));
- if (len <= 0)
- return;
- out_bytes += len;
- if (!no_output) {
- n = write(output_fd, buf, len);
- if (n < 0)
- return;
- }
- }
- }
- static void msg_connecting(struct uclient *cl)
- {
- char addr[INET6_ADDRSTRLEN];
- int port;
- if (quiet)
- return;
- uclient_get_addr(addr, &port, &cl->remote_addr);
- fprintf(stderr, "Connecting to %s:%d\n", addr, port);
- }
- static void check_resume_offset(struct uclient *cl)
- {
- char range_str[64];
- struct stat st;
- char *file;
- int ret;
- file = uclient_get_url_filename(cl->url->location, "index.html");
- if (!file)
- return;
- ret = stat(file, &st);
- free(file);
- if (ret)
- return;
- if (!st.st_size)
- return;
- snprintf(range_str, sizeof(range_str), "bytes=%"PRIu64"-", (uint64_t) st.st_size);
- uclient_http_set_header(cl, "Range", range_str);
- }
- static int init_request(struct uclient *cl)
- {
- int rc;
- out_offset = 0;
- out_bytes = 0;
- out_len = 0;
- uclient_http_set_ssl_ctx(cl, ssl_ops, ssl_ctx, verify);
- if (timeout)
- cl->timeout_msecs = timeout * 1000;
- rc = uclient_connect(cl);
- if (rc)
- return rc;
- msg_connecting(cl);
- rc = uclient_http_set_request_type(cl, post_data || post_file ? "POST" : "GET");
- if (rc)
- return rc;
- uclient_http_reset_headers(cl);
- uclient_http_set_header(cl, "User-Agent", user_agent);
- if (cur_resume)
- check_resume_offset(cl);
- if (post_data) {
- uclient_http_set_header(cl, "Content-Type", "application/x-www-form-urlencoded");
- uclient_write(cl, post_data, strlen(post_data));
- }
- else if(post_file)
- {
- FILE *input_file;
- uclient_http_set_header(cl, "Content-Type", "application/x-www-form-urlencoded");
- input_file = fopen(post_file, "r");
- if (!input_file)
- return errno;
- char tbuf[1024];
- size_t rlen = 0;
- do
- {
- rlen = fread(tbuf, 1, sizeof(tbuf), input_file);
- uclient_write(cl, tbuf, rlen);
- }
- while(rlen);
- fclose(input_file);
- }
- rc = uclient_request(cl);
- if (rc)
- return rc;
- return 0;
- }
- static void request_done(struct uclient *cl)
- {
- const char *proxy_url;
- if (n_urls) {
- proxy_url = get_proxy_url(*urls);
- if (proxy_url) {
- uclient_set_url(cl, proxy_url, NULL);
- uclient_set_proxy_url(cl, *urls, auth_str);
- } else {
- uclient_set_url(cl, *urls, auth_str);
- }
- n_urls--;
- cur_resume = resume;
- error_ret = init_request(cl);
- if (error_ret == 0)
- return;
- }
- if (output_fd >= 0 && !opt_output_file) {
- close(output_fd);
- output_fd = -1;
- }
- uclient_disconnect(cl);
- uloop_end();
- }
- static void eof_cb(struct uclient *cl)
- {
- if (!quiet) {
- pmt_update(&pmt_timer);
- uloop_timeout_cancel(&pmt_timer);
- fprintf(stderr, "\n");
- }
- if (!cl->data_eof) {
- if (!quiet)
- fprintf(stderr, "Connection reset prematurely\n");
- error_ret = 4;
- } else if (!quiet) {
- fprintf(stderr, "Download completed (%"PRIu64" bytes)\n", (uint64_t) out_bytes);
- }
- request_done(cl);
- }
- static void handle_uclient_error(struct uclient *cl, int code)
- {
- const char *type = "Unknown error";
- bool ignore = false;
- switch(code) {
- case UCLIENT_ERROR_CONNECT:
- type = "Connection failed";
- error_ret = 4;
- break;
- case UCLIENT_ERROR_TIMEDOUT:
- type = "Connection timed out";
- error_ret = 4;
- break;
- case UCLIENT_ERROR_SSL_INVALID_CERT:
- type = "Invalid SSL certificate";
- ignore = !verify;
- error_ret = 5;
- break;
- case UCLIENT_ERROR_SSL_CN_MISMATCH:
- type = "Server hostname does not match SSL certificate";
- ignore = !verify;
- error_ret = 5;
- break;
- default:
- error_ret = 1;
- break;
- }
- if (!quiet)
- fprintf(stderr, "Connection error: %s%s\n", type, ignore ? " (ignored)" : "");
- if (ignore)
- error_ret = 0;
- else
- request_done(cl);
- }
- static const struct uclient_cb cb = {
- .header_done = header_done_cb,
- .data_read = read_data_cb,
- .data_eof = eof_cb,
- .error = handle_uclient_error,
- };
- static int usage(const char *progname)
- {
- fprintf(stderr,
- "Usage: %s [options] <URL>\n"
- "Options:\n"
- " -4 Use IPv4 only\n"
- " -6 Use IPv6 only\n"
- " -O <file> Redirect output to file (use \"-\" for stdout)\n"
- " -P <dir> Set directory for output files\n"
- " --quiet | -q Turn off status messages\n"
- " --continue | -c Continue a partially-downloaded file\n"
- " --user=<user> HTTP authentication username\n"
- " --password=<password> HTTP authentication password\n"
- " --user-agent | -U <str> Set HTTP user agent\n"
- " --post-data=STRING use the POST method; send STRING as the data\n"
- " --post-file=FILE use the POST method; send FILE as the data\n"
- " --spider | -s Spider mode - only check file existence\n"
- " --timeout=N | -T N Set connect/request timeout to N seconds\n"
- " --proxy=on | -Y on Enable interpretation of proxy env vars (default)\n"
- " --proxy=off | -Y off |\n"
- " --no-proxy Disable interpretation of proxy env vars\n"
- "\n"
- "HTTPS options:\n"
- " --ca-certificate=<cert> Load CA certificates from file <cert>\n"
- " --no-check-certificate don't validate the server's certificate\n"
- " --ciphers=<cipherlist> Set the cipher list string\n"
- "\n", progname);
- return 1;
- }
- static void init_ca_cert(void)
- {
- glob_t gl;
- unsigned int i;
- glob("/etc/ssl/certs/*.crt", 0, NULL, &gl);
- for (i = 0; i < gl.gl_pathc; i++)
- ssl_ops->context_add_ca_crt_file(ssl_ctx, gl.gl_pathv[i]);
- globfree(&gl);
- }
- static void init_ustream_ssl(void)
- {
- void *dlh;
- dlh = dlopen("libustream-ssl." LIB_EXT, RTLD_LAZY | RTLD_LOCAL);
- if (!dlh)
- return;
- ssl_ops = dlsym(dlh, "ustream_ssl_ops");
- if (!ssl_ops)
- return;
- ssl_ctx = ssl_ops->context_new(false);
- }
- static int no_ssl(const char *progname)
- {
- fprintf(stderr,
- "%s: SSL support not available, please install one of the "
- "libustream-.*[ssl|tls] packages as well as the ca-bundle and "
- "ca-certificates packages.\n",
- progname);
- return 1;
- }
- enum {
- L_NO_CHECK_CERTIFICATE,
- L_CA_CERTIFICATE,
- L_CIPHERS,
- L_USER,
- L_PASSWORD,
- L_USER_AGENT,
- L_POST_DATA,
- L_POST_FILE,
- L_SPIDER,
- L_TIMEOUT,
- L_CONTINUE,
- L_PROXY,
- L_NO_PROXY,
- L_QUIET,
- };
- static const struct option longopts[] = {
- [L_NO_CHECK_CERTIFICATE] = { "no-check-certificate", no_argument, NULL, 0 },
- [L_CA_CERTIFICATE] = { "ca-certificate", required_argument, NULL, 0 },
- [L_CIPHERS] = { "ciphers", required_argument, NULL, 0 },
- [L_USER] = { "user", required_argument, NULL, 0 },
- [L_PASSWORD] = { "password", required_argument, NULL, 0 },
- [L_USER_AGENT] = { "user-agent", required_argument, NULL, 0 },
- [L_POST_DATA] = { "post-data", required_argument, NULL, 0 },
- [L_POST_FILE] = { "post-file", required_argument, NULL, 0 },
- [L_SPIDER] = { "spider", no_argument, NULL, 0 },
- [L_TIMEOUT] = { "timeout", required_argument, NULL, 0 },
- [L_CONTINUE] = { "continue", no_argument, NULL, 0 },
- [L_PROXY] = { "proxy", required_argument, NULL, 0 },
- [L_NO_PROXY] = { "no-proxy", no_argument, NULL, 0 },
- [L_QUIET] = { "quiet", no_argument, NULL, 0 },
- {}
- };
- int main(int argc, char **argv)
- {
- const char *progname = argv[0];
- const char *proxy_url;
- char *username = NULL;
- char *password = NULL;
- struct uclient *cl;
- int longopt_idx = 0;
- bool has_cert = false;
- int i, ch;
- int rc;
- int af = -1;
- signal(SIGPIPE, SIG_IGN);
- init_ustream_ssl();
- while ((ch = getopt_long(argc, argv, "46cO:P:qsT:U:Y:", longopts, &longopt_idx)) != -1) {
- switch(ch) {
- case 0:
- switch (longopt_idx) {
- case L_NO_CHECK_CERTIFICATE:
- verify = false;
- if (ssl_ctx)
- ssl_ops->context_set_require_validation(ssl_ctx, verify);
- break;
- case L_CA_CERTIFICATE:
- has_cert = true;
- if (ssl_ctx)
- ssl_ops->context_add_ca_crt_file(ssl_ctx, optarg);
- break;
- case L_CIPHERS:
- if (ssl_ctx) {
- if (ssl_ops->context_set_ciphers(ssl_ctx, optarg)) {
- if (!quiet)
- fprintf(stderr, "No recognized ciphers in cipher list\n");
- exit(1);
- }
- }
- break;
- case L_USER:
- if (!strlen(optarg))
- break;
- username = strdupa(optarg);
- memset(optarg, '*', strlen(optarg));
- break;
- case L_PASSWORD:
- if (!strlen(optarg))
- break;
- password = strdupa(optarg);
- memset(optarg, '*', strlen(optarg));
- break;
- case L_USER_AGENT:
- user_agent = optarg;
- break;
- case L_POST_DATA:
- post_data = optarg;
- break;
- case L_POST_FILE:
- post_file = optarg;
- break;
- case L_SPIDER:
- no_output = true;
- break;
- case L_TIMEOUT:
- timeout = atoi(optarg);
- break;
- case L_CONTINUE:
- resume = true;
- break;
- case L_PROXY:
- if (strcmp(optarg, "on") != 0)
- proxy = false;
- break;
- case L_NO_PROXY:
- proxy = false;
- break;
- case L_QUIET:
- quiet = true;
- break;
- default:
- return usage(progname);
- }
- break;
- case '4':
- af = AF_INET;
- break;
- case '6':
- af = AF_INET6;
- break;
- case 'c':
- resume = true;
- break;
- case 'U':
- user_agent = optarg;
- break;
- case 'O':
- opt_output_file = optarg;
- break;
- case 'P':
- if (chdir(optarg)) {
- if (!quiet)
- perror("Change output directory");
- exit(1);
- }
- break;
- case 'q':
- quiet = true;
- break;
- case 's':
- no_output = true;
- break;
- case 'T':
- timeout = atoi(optarg);
- break;
- case 'Y':
- if (strcmp(optarg, "on") != 0)
- proxy = false;
- break;
- default:
- return usage(progname);
- }
- }
- argv += optind;
- argc -= optind;
- if (verify && !has_cert)
- default_certs = true;
- if (argc < 1)
- return usage(progname);
- if (!ssl_ctx) {
- for (i = 0; i < argc; i++) {
- if (!strncmp(argv[i], "https", 5))
- return no_ssl(progname);
- }
- }
- urls = argv + 1;
- n_urls = argc - 1;
- uloop_init();
- if (username) {
- if (password) {
- rc = asprintf(&auth_str, "%s:%s", username, password);
- if (rc < 0)
- return rc;
- } else
- auth_str = username;
- }
- if (!quiet)
- fprintf(stderr, "Downloading '%s'\n", argv[0]);
- proxy_url = get_proxy_url(argv[0]);
- if (proxy_url) {
- cl = uclient_new(proxy_url, auth_str, &cb);
- if (cl)
- uclient_set_proxy_url(cl, argv[0], NULL);
- } else {
- cl = uclient_new(argv[0], auth_str, &cb);
- }
- if (!cl) {
- fprintf(stderr, "Failed to allocate uclient context\n");
- return 1;
- }
- if (af >= 0)
- uclient_http_set_address_family(cl, af);
- if (ssl_ctx && default_certs)
- init_ca_cert();
- cur_resume = resume;
- rc = init_request(cl);
- if (!rc) {
- /* no error received, we can enter main loop */
- uloop_run();
- } else {
- fprintf(stderr, "Failed to send request: %s\n", strerror(rc));
- error_ret = 4;
- }
- uloop_done();
- uclient_free(cl);
- if (output_fd >= 0 && output_fd != STDOUT_FILENO)
- close(output_fd);
- if (ssl_ctx)
- ssl_ops->context_free(ssl_ctx);
- return error_ret;
- }
|