hget.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <ctype.h>
  4. #include <bio.h>
  5. #include <ip.h>
  6. #include <libsec.h>
  7. #include <auth.h>
  8. typedef struct URL URL;
  9. struct URL
  10. {
  11. int method;
  12. char *host;
  13. char *port;
  14. char *page;
  15. char *etag;
  16. char *redirect;
  17. char *postbody;
  18. char *cred;
  19. long mtime;
  20. };
  21. typedef struct Range Range;
  22. struct Range
  23. {
  24. long start; /* only 2 gig supported, tdb */
  25. long end;
  26. };
  27. typedef struct Out Out;
  28. struct Out
  29. {
  30. int fd;
  31. int offset; /* notional current offset in output */
  32. int written; /* number of bytes successfully transferred to output */
  33. DigestState *curr; /* digest state up to offset (if known) */
  34. DigestState *hiwat; /* digest state of all bytes written */
  35. };
  36. enum
  37. {
  38. Http,
  39. Https,
  40. Ftp,
  41. Other
  42. };
  43. enum
  44. {
  45. Eof = 0,
  46. Error = -1,
  47. Server = -2,
  48. Changed = -3,
  49. };
  50. int debug;
  51. char *ofile;
  52. int doftp(URL*, URL*, Range*, Out*, long);
  53. int dohttp(URL*, URL*, Range*, Out*, long);
  54. int crackurl(URL*, char*);
  55. Range* crackrange(char*);
  56. int getheader(int, char*, int);
  57. int httpheaders(int, int, URL*, Range*);
  58. int httprcode(int);
  59. int cistrncmp(char*, char*, int);
  60. int cistrcmp(char*, char*);
  61. void initibuf(void);
  62. int readline(int, char*, int);
  63. int readibuf(int, char*, int);
  64. int dfprint(int, char*, ...);
  65. void unreadline(char*);
  66. int output(Out*, char*, int);
  67. void setoffset(Out*, int);
  68. int verbose;
  69. char *net;
  70. char tcpdir[NETPATHLEN];
  71. int headerprint;
  72. struct {
  73. char *name;
  74. int (*f)(URL*, URL*, Range*, Out*, long);
  75. } method[] = {
  76. [Http] { "http", dohttp },
  77. [Https] { "https", dohttp },
  78. [Ftp] { "ftp", doftp },
  79. [Other] { "_______", nil },
  80. };
  81. void
  82. usage(void)
  83. {
  84. fprint(2, "usage: %s [-dhv] [-o outfile] [-p body] [-x netmtpt] url\n", argv0);
  85. exits("usage");
  86. }
  87. void
  88. main(int argc, char **argv)
  89. {
  90. URL u;
  91. Range r;
  92. int errs, n;
  93. ulong mtime;
  94. Dir *d;
  95. char postbody[4096], *p, *e, *t, *hpx;
  96. URL px; // Proxy
  97. Out out;
  98. ofile = nil;
  99. p = postbody;
  100. e = p + sizeof(postbody);
  101. r.start = 0;
  102. r.end = -1;
  103. mtime = 0;
  104. memset(&u, 0, sizeof(u));
  105. memset(&px, 0, sizeof(px));
  106. hpx = getenv("httpproxy");
  107. ARGBEGIN {
  108. case 'o':
  109. ofile = ARGF();
  110. break;
  111. case 'd':
  112. debug = 1;
  113. break;
  114. case 'h':
  115. headerprint = 1;
  116. break;
  117. case 'v':
  118. verbose = 1;
  119. break;
  120. case 'x':
  121. net = ARGF();
  122. if(net == nil)
  123. usage();
  124. break;
  125. case 'p':
  126. t = ARGF();
  127. if(t == nil)
  128. usage();
  129. if(p != postbody)
  130. p = seprint(p, e, "&%s", t);
  131. else
  132. p = seprint(p, e, "%s", t);
  133. u.postbody = postbody;
  134. break;
  135. default:
  136. usage();
  137. } ARGEND;
  138. if(net != nil){
  139. if(strlen(net) > sizeof(tcpdir)-5)
  140. sysfatal("network mount point too long");
  141. snprint(tcpdir, sizeof(tcpdir), "%s/tcp", net);
  142. } else
  143. snprint(tcpdir, sizeof(tcpdir), "tcp");
  144. if(argc != 1)
  145. usage();
  146. out.fd = 1;
  147. out.written = 0;
  148. out.offset = 0;
  149. out.curr = nil;
  150. out.hiwat = nil;
  151. if(ofile != nil){
  152. d = dirstat(ofile);
  153. if(d == nil){
  154. out.fd = create(ofile, OWRITE, 0664);
  155. if(out.fd < 0)
  156. sysfatal("creating %s: %r", ofile);
  157. } else {
  158. out.fd = open(ofile, OWRITE);
  159. if(out.fd < 0)
  160. sysfatal("can't open %s: %r", ofile);
  161. r.start = d->length;
  162. mtime = d->mtime;
  163. free(d);
  164. }
  165. }
  166. errs = 0;
  167. if(crackurl(&u, argv[0]) < 0)
  168. sysfatal("%r");
  169. if(hpx && crackurl(&px, hpx) < 0)
  170. sysfatal("%r");
  171. for(;;){
  172. setoffset(&out, 0);
  173. /* transfer data */
  174. werrstr("");
  175. n = (*method[u.method].f)(&u, &px, &r, &out, mtime);
  176. switch(n){
  177. case Eof:
  178. exits(0);
  179. break;
  180. case Error:
  181. if(errs++ < 10)
  182. continue;
  183. sysfatal("too many errors with no progress %r");
  184. break;
  185. case Server:
  186. sysfatal("server returned: %r");
  187. break;
  188. }
  189. /* forward progress */
  190. errs = 0;
  191. r.start += n;
  192. if(r.start >= r.end)
  193. break;
  194. }
  195. exits(0);
  196. }
  197. int
  198. crackurl(URL *u, char *s)
  199. {
  200. char *p;
  201. int i;
  202. if(u->host != nil){
  203. free(u->host);
  204. u->host = nil;
  205. }
  206. if(u->page != nil){
  207. free(u->page);
  208. u->page = nil;
  209. }
  210. /* get type */
  211. u->method = Other;
  212. for(p = s; *p; p++){
  213. if(*p == '/'){
  214. u->method = Http;
  215. p = s;
  216. break;
  217. }
  218. if(*p == ':' && *(p+1)=='/' && *(p+2)=='/'){
  219. *p = 0;
  220. p += 3;
  221. for(i = 0; i < nelem(method); i++){
  222. if(cistrcmp(s, method[i].name) == 0){
  223. u->method = i;
  224. break;
  225. }
  226. }
  227. break;
  228. }
  229. }
  230. if(u->method == Other){
  231. werrstr("unsupported URL type %s", s);
  232. return -1;
  233. }
  234. /* get system */
  235. s = p;
  236. p = strchr(s, '/');
  237. if(p == nil){
  238. u->host = strdup(s);
  239. u->page = strdup("/");
  240. } else {
  241. u->page = strdup(p);
  242. *p = 0;
  243. u->host = strdup(s);
  244. *p = '/';
  245. }
  246. if(p = strchr(u->host, ':')) {
  247. *p++ = 0;
  248. u->port = p;
  249. } else
  250. u->port = method[u->method].name;
  251. if(*(u->host) == 0){
  252. werrstr("bad url, null host");
  253. return -1;
  254. }
  255. return 0;
  256. }
  257. char *day[] = {
  258. "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat"
  259. };
  260. char *month[] = {
  261. "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
  262. };
  263. struct
  264. {
  265. int fd;
  266. long mtime;
  267. } note;
  268. void
  269. catch(void*, char*)
  270. {
  271. Dir d;
  272. nulldir(&d);
  273. d.mtime = note.mtime;
  274. if(dirfwstat(note.fd, &d) < 0)
  275. sysfatal("catch: can't dirfwstat: %r");
  276. noted(NDFLT);
  277. }
  278. int
  279. dohttp(URL *u, URL *px, Range *r, Out *out, long mtime)
  280. {
  281. int fd, cfd;
  282. int redirect, auth, loop;
  283. int n, rv, code;
  284. long tot, vtime;
  285. Tm *tm;
  286. char buf[1024];
  287. char err[ERRMAX];
  288. /* always move back to a previous 512 byte bound because some
  289. * servers can't seem to deal with requests that start at the
  290. * end of the file
  291. */
  292. if(r->start)
  293. r->start = ((r->start-1)/512)*512;
  294. /* loop for redirects, requires reading both response code and headers */
  295. fd = -1;
  296. for(loop = 0; loop < 32; loop++){
  297. if(px->host == nil){
  298. fd = dial(netmkaddr(u->host, tcpdir, u->port), 0, 0, 0);
  299. } else {
  300. fd = dial(netmkaddr(px->host, tcpdir, px->port), 0, 0, 0);
  301. }
  302. if(fd < 0)
  303. return Error;
  304. if(u->method == Https){
  305. int tfd;
  306. TLSconn conn;
  307. memset(&conn, 0, sizeof conn);
  308. tfd = tlsClient(fd, &conn);
  309. if(tfd < 0){
  310. fprint(2, "tlsClient: %r\n");
  311. close(fd);
  312. return Error;
  313. }
  314. /* BUG: check cert here? */
  315. if(conn.cert)
  316. free(conn.cert);
  317. close(fd);
  318. fd = tfd;
  319. }
  320. /* write request, use range if not start of file */
  321. if(u->postbody == nil){
  322. if(px->host == nil){
  323. dfprint(fd, "GET %s HTTP/1.0\r\n"
  324. "Host: %s\r\n"
  325. "User-agent: Plan9/hget\r\n"
  326. "Cache-Control: no-cache\r\n"
  327. "Pragma: no-cache\r\n",
  328. u->page, u->host);
  329. } else {
  330. dfprint(fd, "GET http://%s%s HTTP/1.0\r\n"
  331. "Host: %s\r\n"
  332. "User-agent: Plan9/hget\r\n"
  333. "Cache-Control: no-cache\r\n"
  334. "Pragma: no-cache\r\n",
  335. u->host, u->page, u->host);
  336. }
  337. if(u->cred)
  338. dfprint(fd, "Authorization: Basic %s\r\n",
  339. u->cred);
  340. } else {
  341. dfprint(fd, "POST %s HTTP/1.0\r\n"
  342. "Host: %s\r\n"
  343. "Content-type: application/x-www-form-urlencoded\r\n"
  344. "Content-length: %d\r\n"
  345. "User-agent: Plan9/hget\r\n",
  346. u->page, u->host, strlen(u->postbody));
  347. }
  348. if(r->start != 0){
  349. dfprint(fd, "Range: bytes=%d-\n", r->start);
  350. if(u->etag != nil){
  351. dfprint(fd, "If-range: %s\n", u->etag);
  352. } else {
  353. tm = gmtime(mtime);
  354. dfprint(fd, "If-range: %s, %d %s %d %2d:%2.2d:%2.2d GMT\n",
  355. day[tm->wday], tm->mday, month[tm->mon],
  356. tm->year+1900, tm->hour, tm->min, tm->sec);
  357. }
  358. }
  359. if((cfd = open("/mnt/webcookies/http", ORDWR)) >= 0){
  360. if(fprint(cfd, "http://%s%s", u->host, u->page) > 0){
  361. while((n = read(cfd, buf, sizeof buf)) > 0){
  362. if(debug)
  363. write(2, buf, n);
  364. write(fd, buf, n);
  365. }
  366. }else{
  367. close(cfd);
  368. cfd = -1;
  369. }
  370. }
  371. dfprint(fd, "\r\n", u->host);
  372. if(u->postbody)
  373. dfprint(fd, "%s", u->postbody);
  374. auth = 0;
  375. redirect = 0;
  376. initibuf();
  377. code = httprcode(fd);
  378. switch(code){
  379. case Error: /* connection timed out */
  380. case Eof:
  381. close(fd);
  382. close(cfd);
  383. return code;
  384. case 200: /* OK */
  385. case 201: /* Created */
  386. case 202: /* Accepted */
  387. if(ofile == nil && r->start != 0)
  388. sysfatal("page changed underfoot");
  389. break;
  390. case 204: /* No Content */
  391. sysfatal("No Content");
  392. case 206: /* Partial Content */
  393. setoffset(out, r->start);
  394. break;
  395. case 301: /* Moved Permanently */
  396. case 302: /* Moved Temporarily */
  397. redirect = 1;
  398. u->postbody = nil;
  399. break;
  400. case 304: /* Not Modified */
  401. break;
  402. case 400: /* Bad Request */
  403. sysfatal("Bad Request");
  404. case 401: /* Unauthorized */
  405. if (auth)
  406. sysfatal("Authentication failed");
  407. auth = 1;
  408. break;
  409. case 402: /* ??? */
  410. sysfatal("Unauthorized");
  411. case 403: /* Forbidden */
  412. sysfatal("Forbidden by server");
  413. case 404: /* Not Found */
  414. sysfatal("Not found on server");
  415. case 407: /* Proxy Authentication */
  416. sysfatal("Proxy authentication required");
  417. case 500: /* Internal server error */
  418. sysfatal("Server choked");
  419. case 501: /* Not implemented */
  420. sysfatal("Server can't do it!");
  421. case 502: /* Bad gateway */
  422. sysfatal("Bad gateway");
  423. case 503: /* Service unavailable */
  424. sysfatal("Service unavailable");
  425. default:
  426. sysfatal("Unknown response code %d", code);
  427. }
  428. if(u->redirect != nil){
  429. free(u->redirect);
  430. u->redirect = nil;
  431. }
  432. rv = httpheaders(fd, cfd, u, r);
  433. close(cfd);
  434. if(rv != 0){
  435. close(fd);
  436. return rv;
  437. }
  438. if(!redirect && !auth)
  439. break;
  440. if (redirect){
  441. if(u->redirect == nil)
  442. sysfatal("redirect: no URL");
  443. if(crackurl(u, u->redirect) < 0)
  444. sysfatal("redirect: %r");
  445. }
  446. }
  447. /* transfer whatever you get */
  448. if(ofile != nil && u->mtime != 0){
  449. note.fd = out->fd;
  450. note.mtime = u->mtime;
  451. notify(catch);
  452. }
  453. tot = 0;
  454. vtime = 0;
  455. for(;;){
  456. n = readibuf(fd, buf, sizeof(buf));
  457. if(n <= 0)
  458. break;
  459. if(output(out, buf, n) != n)
  460. break;
  461. tot += n;
  462. if(verbose && vtime != time(0)) {
  463. vtime = time(0);
  464. fprint(2, "%ld %ld\n", r->start+tot, r->end);
  465. }
  466. }
  467. notify(nil);
  468. close(fd);
  469. if(ofile != nil && u->mtime != 0){
  470. Dir d;
  471. rerrstr(err, sizeof err);
  472. nulldir(&d);
  473. d.mtime = u->mtime;
  474. if(dirfwstat(out->fd, &d) < 0)
  475. fprint(2, "couldn't set mtime: %r\n");
  476. errstr(err, sizeof err);
  477. }
  478. return tot;
  479. }
  480. /* get the http response code */
  481. int
  482. httprcode(int fd)
  483. {
  484. int n;
  485. char *p;
  486. char buf[256];
  487. n = readline(fd, buf, sizeof(buf)-1);
  488. if(n <= 0)
  489. return n;
  490. if(debug)
  491. fprint(2, "%d <- %s\n", fd, buf);
  492. p = strchr(buf, ' ');
  493. if(strncmp(buf, "HTTP/", 5) != 0 || p == nil){
  494. werrstr("bad response from server");
  495. return -1;
  496. }
  497. buf[n] = 0;
  498. return atoi(p+1);
  499. }
  500. /* read in and crack the http headers, update u and r */
  501. void hhetag(char*, URL*, Range*);
  502. void hhmtime(char*, URL*, Range*);
  503. void hhclen(char*, URL*, Range*);
  504. void hhcrange(char*, URL*, Range*);
  505. void hhuri(char*, URL*, Range*);
  506. void hhlocation(char*, URL*, Range*);
  507. void hhauth(char*, URL*, Range*);
  508. struct {
  509. char *name;
  510. void (*f)(char*, URL*, Range*);
  511. } headers[] = {
  512. { "etag:", hhetag },
  513. { "last-modified:", hhmtime },
  514. { "content-length:", hhclen },
  515. { "content-range:", hhcrange },
  516. { "uri:", hhuri },
  517. { "location:", hhlocation },
  518. { "WWW-Authenticate:", hhauth },
  519. };
  520. int
  521. httpheaders(int fd, int cfd, URL *u, Range *r)
  522. {
  523. char buf[2048];
  524. char *p;
  525. int i, n;
  526. for(;;){
  527. n = getheader(fd, buf, sizeof(buf));
  528. if(n <= 0)
  529. break;
  530. if(cfd >= 0)
  531. fprint(cfd, "%s\n", buf);
  532. for(i = 0; i < nelem(headers); i++){
  533. n = strlen(headers[i].name);
  534. if(cistrncmp(buf, headers[i].name, n) == 0){
  535. /* skip field name and leading white */
  536. p = buf + n;
  537. while(*p == ' ' || *p == '\t')
  538. p++;
  539. (*headers[i].f)(p, u, r);
  540. break;
  541. }
  542. }
  543. }
  544. return n;
  545. }
  546. /*
  547. * read a single mime header, collect continuations.
  548. *
  549. * this routine assumes that there is a blank line twixt
  550. * the header and the message body, otherwise bytes will
  551. * be lost.
  552. */
  553. int
  554. getheader(int fd, char *buf, int n)
  555. {
  556. char *p, *e;
  557. int i;
  558. n--;
  559. p = buf;
  560. for(e = p + n; ; p += i){
  561. i = readline(fd, p, e-p);
  562. if(i < 0)
  563. return i;
  564. if(p == buf){
  565. /* first line */
  566. if(strchr(buf, ':') == nil)
  567. break; /* end of headers */
  568. } else {
  569. /* continuation line */
  570. if(*p != ' ' && *p != '\t'){
  571. unreadline(p);
  572. *p = 0;
  573. break; /* end of this header */
  574. }
  575. }
  576. }
  577. if(headerprint)
  578. print("%s\n", buf);
  579. if(debug)
  580. fprint(2, "%d <- %s\n", fd, buf);
  581. return p-buf;
  582. }
  583. void
  584. hhetag(char *p, URL *u, Range*)
  585. {
  586. if(u->etag != nil){
  587. if(strcmp(u->etag, p) != 0)
  588. sysfatal("file changed underfoot");
  589. } else
  590. u->etag = strdup(p);
  591. }
  592. char* monthchars = "janfebmaraprmayjunjulaugsepoctnovdec";
  593. void
  594. hhmtime(char *p, URL *u, Range*)
  595. {
  596. char *month, *day, *yr, *hms;
  597. char *fields[6];
  598. Tm tm, now;
  599. int i;
  600. i = getfields(p, fields, 6, 1, " \t");
  601. if(i < 5)
  602. return;
  603. day = fields[1];
  604. month = fields[2];
  605. yr = fields[3];
  606. hms = fields[4];
  607. /* default time */
  608. now = *gmtime(time(0));
  609. tm = now;
  610. tm.yday = 0;
  611. /* convert ascii month to a number twixt 1 and 12 */
  612. if(*month >= '0' && *month <= '9'){
  613. tm.mon = atoi(month) - 1;
  614. if(tm.mon < 0 || tm.mon > 11)
  615. tm.mon = 5;
  616. } else {
  617. for(p = month; *p; p++)
  618. *p = tolower(*p);
  619. for(i = 0; i < 12; i++)
  620. if(strncmp(&monthchars[i*3], month, 3) == 0){
  621. tm.mon = i;
  622. break;
  623. }
  624. }
  625. tm.mday = atoi(day);
  626. if(hms) {
  627. tm.hour = strtoul(hms, &p, 10);
  628. if(*p == ':') {
  629. p++;
  630. tm.min = strtoul(p, &p, 10);
  631. if(*p == ':') {
  632. p++;
  633. tm.sec = strtoul(p, &p, 10);
  634. }
  635. }
  636. if(tolower(*p) == 'p')
  637. tm.hour += 12;
  638. }
  639. if(yr) {
  640. tm.year = atoi(yr);
  641. if(tm.year >= 1900)
  642. tm.year -= 1900;
  643. } else {
  644. if(tm.mon > now.mon || (tm.mon == now.mon && tm.mday > now.mday+1))
  645. tm.year--;
  646. }
  647. strcpy(tm.zone, "GMT");
  648. /* convert to epoch seconds */
  649. u->mtime = tm2sec(&tm);
  650. }
  651. void
  652. hhclen(char *p, URL*, Range *r)
  653. {
  654. r->end = atoi(p);
  655. }
  656. void
  657. hhcrange(char *p, URL*, Range *r)
  658. {
  659. char *x;
  660. vlong l;
  661. l = 0;
  662. x = strchr(p, '/');
  663. if(x)
  664. l = atoll(x+1);
  665. if(l == 0) {
  666. x = strchr(p, '-');
  667. if(x)
  668. l = atoll(x+1);
  669. }
  670. if(l)
  671. r->end = l;
  672. }
  673. void
  674. hhuri(char *p, URL *u, Range*)
  675. {
  676. if(*p != '<')
  677. return;
  678. u->redirect = strdup(p+1);
  679. p = strchr(u->redirect, '>');
  680. if(p != nil)
  681. *p = 0;
  682. }
  683. void
  684. hhlocation(char *p, URL *u, Range*)
  685. {
  686. u->redirect = strdup(p);
  687. }
  688. void
  689. hhauth(char *p, URL *u, Range*)
  690. {
  691. char *f[4];
  692. UserPasswd *up;
  693. char *s, cred[64];
  694. if (cistrncmp(p, "basic ", 6) != 0)
  695. sysfatal("only Basic authentication supported");
  696. if (gettokens(p, f, nelem(f), "\"") < 2)
  697. sysfatal("garbled auth data");
  698. if ((up = auth_getuserpasswd(auth_getkey, "proto=pass service=http dom=%q relm=%q",
  699. u->host, f[1])) == nil)
  700. sysfatal("cannot authenticate");
  701. s = smprint("%s:%s", up->user, up->passwd);
  702. if(enc64(cred, sizeof(cred), (uchar *)s, strlen(s)) == -1)
  703. sysfatal("enc64");
  704. free(s);
  705. assert(u->cred = strdup(cred));
  706. }
  707. enum
  708. {
  709. /* ftp return codes */
  710. Extra= 1,
  711. Success= 2,
  712. Incomplete= 3,
  713. TempFail= 4,
  714. PermFail= 5,
  715. Nnetdir= 64, /* max length of network directory paths */
  716. Ndialstr= 64, /* max length of dial strings */
  717. };
  718. int ftpcmd(int, char*, ...);
  719. int ftprcode(int, char*, int);
  720. int hello(int);
  721. int logon(int);
  722. int xfertype(int, char*);
  723. int passive(int, URL*);
  724. int active(int, URL*);
  725. int ftpxfer(int, Out*, Range*);
  726. int terminateftp(int, int);
  727. int getaddrport(char*, uchar*, uchar*);
  728. int ftprestart(int, Out*, URL*, Range*, long);
  729. int
  730. doftp(URL *u, URL *px, Range *r, Out *out, long mtime)
  731. {
  732. int pid, ctl, data, rv;
  733. Waitmsg *w;
  734. char msg[64];
  735. char conndir[NETPATHLEN];
  736. char *p;
  737. /* untested, proxy doesn't work with ftp (I think) */
  738. if(px->host == nil){
  739. ctl = dial(netmkaddr(u->host, tcpdir, u->port), 0, conndir, 0);
  740. } else {
  741. ctl = dial(netmkaddr(px->host, tcpdir, px->port), 0, conndir, 0);
  742. }
  743. if(ctl < 0)
  744. return Error;
  745. if(net == nil){
  746. p = strrchr(conndir, '/');
  747. *p = 0;
  748. snprint(tcpdir, sizeof(tcpdir), conndir);
  749. }
  750. initibuf();
  751. rv = hello(ctl);
  752. if(rv < 0)
  753. return terminateftp(ctl, rv);
  754. rv = logon(ctl);
  755. if(rv < 0)
  756. return terminateftp(ctl, rv);
  757. rv = xfertype(ctl, "I");
  758. if(rv < 0)
  759. return terminateftp(ctl, rv);
  760. /* if file is up to date and the right size, stop */
  761. if(ftprestart(ctl, out, u, r, mtime) > 0){
  762. close(ctl);
  763. return Eof;
  764. }
  765. /* first try passive mode, then active */
  766. data = passive(ctl, u);
  767. if(data < 0){
  768. data = active(ctl, u);
  769. if(data < 0)
  770. return Error;
  771. }
  772. /* fork */
  773. switch(pid = rfork(RFPROC|RFFDG|RFMEM)){
  774. case -1:
  775. close(data);
  776. return terminateftp(ctl, Error);
  777. case 0:
  778. ftpxfer(data, out, r);
  779. close(data);
  780. _exits(0);
  781. default:
  782. close(data);
  783. break;
  784. }
  785. /* wait for reply message */
  786. rv = ftprcode(ctl, msg, sizeof(msg));
  787. close(ctl);
  788. /* wait for process to terminate */
  789. w = nil;
  790. for(;;){
  791. free(w);
  792. w = wait();
  793. if(w == nil)
  794. return Error;
  795. if(w->pid == pid){
  796. if(w->msg[0] == 0){
  797. free(w);
  798. break;
  799. }
  800. werrstr("xfer: %s", w->msg);
  801. free(w);
  802. return Error;
  803. }
  804. }
  805. switch(rv){
  806. case Success:
  807. return Eof;
  808. case TempFail:
  809. return Server;
  810. default:
  811. return Error;
  812. }
  813. }
  814. int
  815. ftpcmd(int ctl, char *fmt, ...)
  816. {
  817. va_list arg;
  818. char buf[2*1024], *s;
  819. va_start(arg, fmt);
  820. s = vseprint(buf, buf + (sizeof(buf)-4) / sizeof(*buf), fmt, arg);
  821. va_end(arg);
  822. if(debug)
  823. fprint(2, "%d -> %s\n", ctl, buf);
  824. *s++ = '\r';
  825. *s++ = '\n';
  826. if(write(ctl, buf, s - buf) != s - buf)
  827. return -1;
  828. return 0;
  829. }
  830. int
  831. ftprcode(int ctl, char *msg, int len)
  832. {
  833. int rv;
  834. int i;
  835. char *p;
  836. len--; /* room for terminating null */
  837. for(;;){
  838. *msg = 0;
  839. i = readline(ctl, msg, len);
  840. if(i < 0)
  841. break;
  842. if(debug)
  843. fprint(2, "%d <- %s\n", ctl, msg);
  844. /* stop if not a continuation */
  845. rv = strtol(msg, &p, 10);
  846. if(rv >= 100 && rv < 600 && p==msg+3 && *p == ' ')
  847. return rv/100;
  848. }
  849. *msg = 0;
  850. return -1;
  851. }
  852. int
  853. hello(int ctl)
  854. {
  855. char msg[1024];
  856. /* wait for hello from other side */
  857. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  858. werrstr("HELLO: %s", msg);
  859. return Server;
  860. }
  861. return 0;
  862. }
  863. int
  864. getdec(char *p, int n)
  865. {
  866. int x = 0;
  867. int i;
  868. for(i = 0; i < n; i++)
  869. x = x*10 + (*p++ - '0');
  870. return x;
  871. }
  872. int
  873. ftprestart(int ctl, Out *out, URL *u, Range *r, long mtime)
  874. {
  875. Tm tm;
  876. char msg[1024];
  877. long x, rmtime;
  878. ftpcmd(ctl, "MDTM %s", u->page);
  879. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  880. r->start = 0;
  881. return 0; /* need to do something */
  882. }
  883. /* decode modification time */
  884. if(strlen(msg) < 4 + 4 + 2 + 2 + 2 + 2 + 2){
  885. r->start = 0;
  886. return 0; /* need to do something */
  887. }
  888. memset(&tm, 0, sizeof(tm));
  889. tm.year = getdec(msg+4, 4) - 1900;
  890. tm.mon = getdec(msg+4+4, 2) - 1;
  891. tm.mday = getdec(msg+4+4+2, 2);
  892. tm.hour = getdec(msg+4+4+2+2, 2);
  893. tm.min = getdec(msg+4+4+2+2+2, 2);
  894. tm.sec = getdec(msg+4+4+2+2+2+2, 2);
  895. strcpy(tm.zone, "GMT");
  896. rmtime = tm2sec(&tm);
  897. if(rmtime > mtime)
  898. r->start = 0;
  899. /* get size */
  900. ftpcmd(ctl, "SIZE %s", u->page);
  901. if(ftprcode(ctl, msg, sizeof(msg)) == Success){
  902. x = atol(msg+4);
  903. if(r->start == x)
  904. return 1; /* we're up to date */
  905. r->end = x;
  906. }
  907. /* seek to restart point */
  908. if(r->start > 0){
  909. ftpcmd(ctl, "REST %lud", r->start);
  910. if(ftprcode(ctl, msg, sizeof(msg)) == Incomplete){
  911. setoffset(out, r->start);
  912. }else
  913. r->start = 0;
  914. }
  915. return 0; /* need to do something */
  916. }
  917. int
  918. logon(int ctl)
  919. {
  920. char msg[1024];
  921. /* login anonymous */
  922. ftpcmd(ctl, "USER anonymous");
  923. switch(ftprcode(ctl, msg, sizeof(msg))){
  924. case Success:
  925. return 0;
  926. case Incomplete:
  927. break; /* need password */
  928. default:
  929. werrstr("USER: %s", msg);
  930. return Server;
  931. }
  932. /* send user id as password */
  933. sprint(msg, "%s@closedmind.org", getuser());
  934. ftpcmd(ctl, "PASS %s", msg);
  935. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  936. werrstr("PASS: %s", msg);
  937. return Server;
  938. }
  939. return 0;
  940. }
  941. int
  942. xfertype(int ctl, char *t)
  943. {
  944. char msg[1024];
  945. ftpcmd(ctl, "TYPE %s", t);
  946. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  947. werrstr("TYPE %s: %s", t, msg);
  948. return Server;
  949. }
  950. return 0;
  951. }
  952. int
  953. passive(int ctl, URL *u)
  954. {
  955. char msg[1024];
  956. char ipaddr[32];
  957. char *f[6];
  958. char *p;
  959. int fd;
  960. int port;
  961. char aport[12];
  962. ftpcmd(ctl, "PASV");
  963. if(ftprcode(ctl, msg, sizeof(msg)) != Success)
  964. return Error;
  965. /* get address and port number from reply, this is AI */
  966. p = strchr(msg, '(');
  967. if(p == nil){
  968. for(p = msg+3; *p; p++)
  969. if(isdigit(*p))
  970. break;
  971. } else
  972. p++;
  973. if(getfields(p, f, 6, 0, ",)") < 6){
  974. werrstr("ftp protocol botch");
  975. return Server;
  976. }
  977. snprint(ipaddr, sizeof(ipaddr), "%s.%s.%s.%s",
  978. f[0], f[1], f[2], f[3]);
  979. port = ((atoi(f[4])&0xff)<<8) + (atoi(f[5])&0xff);
  980. sprint(aport, "%d", port);
  981. /* open data connection */
  982. fd = dial(netmkaddr(ipaddr, tcpdir, aport), 0, 0, 0);
  983. if(fd < 0){
  984. werrstr("passive mode failed: %r");
  985. return Error;
  986. }
  987. /* tell remote to send a file */
  988. ftpcmd(ctl, "RETR %s", u->page);
  989. if(ftprcode(ctl, msg, sizeof(msg)) != Extra){
  990. werrstr("RETR %s: %s", u->page, msg);
  991. return Error;
  992. }
  993. return fd;
  994. }
  995. int
  996. active(int ctl, URL *u)
  997. {
  998. char msg[1024];
  999. char dir[40], ldir[40];
  1000. uchar ipaddr[4];
  1001. uchar port[2];
  1002. int lcfd, dfd, afd;
  1003. /* announce a port for the call back */
  1004. snprint(msg, sizeof(msg), "%s!*!0", tcpdir);
  1005. afd = announce(msg, dir);
  1006. if(afd < 0)
  1007. return Error;
  1008. /* get a local address/port of the annoucement */
  1009. if(getaddrport(dir, ipaddr, port) < 0){
  1010. close(afd);
  1011. return Error;
  1012. }
  1013. /* tell remote side address and port*/
  1014. ftpcmd(ctl, "PORT %d,%d,%d,%d,%d,%d", ipaddr[0], ipaddr[1], ipaddr[2],
  1015. ipaddr[3], port[0], port[1]);
  1016. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  1017. close(afd);
  1018. werrstr("active: %s", msg);
  1019. return Error;
  1020. }
  1021. /* tell remote to send a file */
  1022. ftpcmd(ctl, "RETR %s", u->page);
  1023. if(ftprcode(ctl, msg, sizeof(msg)) != Extra){
  1024. close(afd);
  1025. werrstr("RETR: %s", msg);
  1026. return Server;
  1027. }
  1028. /* wait for a connection */
  1029. lcfd = listen(dir, ldir);
  1030. if(lcfd < 0){
  1031. close(afd);
  1032. return Error;
  1033. }
  1034. dfd = accept(lcfd, ldir);
  1035. if(dfd < 0){
  1036. close(afd);
  1037. close(lcfd);
  1038. return Error;
  1039. }
  1040. close(afd);
  1041. close(lcfd);
  1042. return dfd;
  1043. }
  1044. int
  1045. ftpxfer(int in, Out *out, Range *r)
  1046. {
  1047. char buf[1024];
  1048. long vtime;
  1049. int i, n;
  1050. vtime = 0;
  1051. for(n = 0;;n += i){
  1052. i = read(in, buf, sizeof(buf));
  1053. if(i == 0)
  1054. break;
  1055. if(i < 0)
  1056. return Error;
  1057. if(output(out, buf, i) != i)
  1058. return Error;
  1059. r->start += i;
  1060. if(verbose && vtime != time(0)) {
  1061. vtime = time(0);
  1062. fprint(2, "%ld %ld\n", r->start, r->end);
  1063. }
  1064. }
  1065. return n;
  1066. }
  1067. int
  1068. terminateftp(int ctl, int rv)
  1069. {
  1070. close(ctl);
  1071. return rv;
  1072. }
  1073. /*
  1074. * case insensitive strcmp (why aren't these in libc?)
  1075. */
  1076. int
  1077. cistrncmp(char *a, char *b, int n)
  1078. {
  1079. while(n-- > 0){
  1080. if(tolower(*a++) != tolower(*b++))
  1081. return -1;
  1082. }
  1083. return 0;
  1084. }
  1085. int
  1086. cistrcmp(char *a, char *b)
  1087. {
  1088. while(*a || *b)
  1089. if(tolower(*a++) != tolower(*b++))
  1090. return -1;
  1091. return 0;
  1092. }
  1093. /*
  1094. * buffered io
  1095. */
  1096. struct
  1097. {
  1098. char *rp;
  1099. char *wp;
  1100. char buf[4*1024];
  1101. } b;
  1102. void
  1103. initibuf(void)
  1104. {
  1105. b.rp = b.wp = b.buf;
  1106. }
  1107. /*
  1108. * read a possibly buffered line, strip off trailing while
  1109. */
  1110. int
  1111. readline(int fd, char *buf, int len)
  1112. {
  1113. int n;
  1114. char *p;
  1115. int eof = 0;
  1116. len--;
  1117. for(p = buf;;){
  1118. if(b.rp >= b.wp){
  1119. n = read(fd, b.wp, sizeof(b.buf)/2);
  1120. if(n < 0)
  1121. return -1;
  1122. if(n == 0){
  1123. eof = 1;
  1124. break;
  1125. }
  1126. b.wp += n;
  1127. }
  1128. n = *b.rp++;
  1129. if(len > 0){
  1130. *p++ = n;
  1131. len--;
  1132. }
  1133. if(n == '\n')
  1134. break;
  1135. }
  1136. /* drop trailing white */
  1137. for(;;){
  1138. if(p <= buf)
  1139. break;
  1140. n = *(p-1);
  1141. if(n != ' ' && n != '\t' && n != '\r' && n != '\n')
  1142. break;
  1143. p--;
  1144. }
  1145. *p = 0;
  1146. if(eof && p == buf)
  1147. return -1;
  1148. return p-buf;
  1149. }
  1150. void
  1151. unreadline(char *line)
  1152. {
  1153. int i, n;
  1154. i = strlen(line);
  1155. n = b.wp-b.rp;
  1156. memmove(&b.buf[i+1], b.rp, n);
  1157. memmove(b.buf, line, i);
  1158. b.buf[i] = '\n';
  1159. b.rp = b.buf;
  1160. b.wp = b.rp + i + 1 + n;
  1161. }
  1162. int
  1163. readibuf(int fd, char *buf, int len)
  1164. {
  1165. int n;
  1166. n = b.wp-b.rp;
  1167. if(n > 0){
  1168. if(n > len)
  1169. n = len;
  1170. memmove(buf, b.rp, n);
  1171. b.rp += n;
  1172. return n;
  1173. }
  1174. return read(fd, buf, len);
  1175. }
  1176. int
  1177. dfprint(int fd, char *fmt, ...)
  1178. {
  1179. char buf[4*1024];
  1180. va_list arg;
  1181. va_start(arg, fmt);
  1182. vseprint(buf, buf+sizeof(buf), fmt, arg);
  1183. va_end(arg);
  1184. if(debug)
  1185. fprint(2, "%d -> %s", fd, buf);
  1186. return fprint(fd, "%s", buf);
  1187. }
  1188. int
  1189. getaddrport(char *dir, uchar *ipaddr, uchar *port)
  1190. {
  1191. char buf[256];
  1192. int fd, i;
  1193. char *p;
  1194. snprint(buf, sizeof(buf), "%s/local", dir);
  1195. fd = open(buf, OREAD);
  1196. if(fd < 0)
  1197. return -1;
  1198. i = read(fd, buf, sizeof(buf)-1);
  1199. close(fd);
  1200. if(i <= 0)
  1201. return -1;
  1202. buf[i] = 0;
  1203. p = strchr(buf, '!');
  1204. if(p != nil)
  1205. *p++ = 0;
  1206. v4parseip(ipaddr, buf);
  1207. i = atoi(p);
  1208. port[0] = i>>8;
  1209. port[1] = i;
  1210. return 0;
  1211. }
  1212. void
  1213. md5free(DigestState *state)
  1214. {
  1215. uchar x[MD5dlen];
  1216. md5(nil, 0, x, state);
  1217. }
  1218. DigestState*
  1219. md5dup(DigestState *state)
  1220. {
  1221. char *p;
  1222. p = md5pickle(state);
  1223. if(p == nil)
  1224. sysfatal("md5pickle: %r");
  1225. state = md5unpickle(p);
  1226. if(state == nil)
  1227. sysfatal("md5unpickle: %r");
  1228. free(p);
  1229. return state;
  1230. }
  1231. void
  1232. setoffset(Out *out, int offset)
  1233. {
  1234. md5free(out->curr);
  1235. if(offset == 0)
  1236. out->curr = md5(nil, 0, nil, nil);
  1237. else
  1238. out->curr = nil;
  1239. out->offset = offset;
  1240. out->written = offset;
  1241. if(ofile != nil)
  1242. if(seek(out->fd, offset, 0) != offset)
  1243. sysfatal("seek: %r");
  1244. }
  1245. /*
  1246. * write some output, discarding it (but keeping track)
  1247. * if we've already written it. if we've gone backwards,
  1248. * verify that everything previously written matches
  1249. * that which would have been written from the current
  1250. * output.
  1251. */
  1252. int
  1253. output(Out *out, char *buf, int nb)
  1254. {
  1255. int n, d;
  1256. uchar m0[MD5dlen], m1[MD5dlen];
  1257. n = nb;
  1258. d = out->written - out->offset;
  1259. assert(d >= 0);
  1260. if(d > 0){
  1261. if(n < d){
  1262. if(out->curr != nil)
  1263. md5((uchar*)buf, n, nil, out->curr);
  1264. out->offset += n;
  1265. return n;
  1266. }
  1267. if(out->curr != nil){
  1268. md5((uchar*)buf, d, m0, out->curr);
  1269. out->curr = nil;
  1270. md5(nil, 0, m1, md5dup(out->hiwat));
  1271. if(memcmp(m0, m1, MD5dlen) != 0){
  1272. fprint(2, "integrity check failure at offset %d\n", out->written);
  1273. return -1;
  1274. }
  1275. }
  1276. buf += d;
  1277. n -= d;
  1278. out->offset += d;
  1279. }
  1280. if(n > 0){
  1281. out->hiwat = md5((uchar*)buf, n, nil, out->hiwat);
  1282. n = write(out->fd, buf, n);
  1283. if(n > 0){
  1284. out->offset += n;
  1285. out->written += n;
  1286. }
  1287. }
  1288. return n + d;
  1289. }