hget.c 25 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <ctype.h>
  4. #include <bio.h>
  5. #include <ip.h>
  6. #include <libsec.h>
  7. #include <auth.h>
  8. typedef struct URL URL;
  9. struct URL
  10. {
  11. int method;
  12. char *host;
  13. char *port;
  14. char *page;
  15. char *etag;
  16. char *redirect;
  17. char *postbody;
  18. char *cred;
  19. long mtime;
  20. };
  21. typedef struct Range Range;
  22. struct Range
  23. {
  24. long start; /* only 2 gig supported, tdb */
  25. long end;
  26. };
  27. typedef struct Out Out;
  28. struct Out
  29. {
  30. int fd;
  31. int offset; /* notional current offset in output */
  32. int written; /* number of bytes successfully transferred to output */
  33. DigestState *curr; /* digest state up to offset (if known) */
  34. DigestState *hiwat; /* digest state of all bytes written */
  35. };
  36. enum
  37. {
  38. Http,
  39. Https,
  40. Ftp,
  41. Other
  42. };
  43. enum
  44. {
  45. Eof = 0,
  46. Error = -1,
  47. Server = -2,
  48. Changed = -3,
  49. };
  50. int debug;
  51. char *ofile;
  52. int doftp(URL*, URL*, Range*, Out*, long);
  53. int dohttp(URL*, URL*, Range*, Out*, long);
  54. int crackurl(URL*, char*);
  55. Range* crackrange(char*);
  56. int getheader(int, char*, int);
  57. int httpheaders(int, int, URL*, Range*);
  58. int httprcode(int);
  59. int cistrncmp(char*, char*, int);
  60. int cistrcmp(char*, char*);
  61. void initibuf(void);
  62. int readline(int, char*, int);
  63. int readibuf(int, char*, int);
  64. int dfprint(int, char*, ...);
  65. void unreadline(char*);
  66. int output(Out*, char*, int);
  67. void setoffset(Out*, int);
  68. int verbose;
  69. char *net;
  70. char tcpdir[NETPATHLEN];
  71. int headerprint;
  72. struct {
  73. char *name;
  74. int (*f)(URL*, URL*, Range*, Out*, long);
  75. } method[] = {
  76. [Http] { "http", dohttp },
  77. [Https] { "https", dohttp },
  78. [Ftp] { "ftp", doftp },
  79. [Other] { "_______", nil },
  80. };
  81. void
  82. usage(void)
  83. {
  84. fprint(2, "usage: %s [-hv] [-o outfile] [-p body] [-x netmtpt] url\n", argv0);
  85. exits("usage");
  86. }
  87. void
  88. main(int argc, char **argv)
  89. {
  90. URL u;
  91. Range r;
  92. int errs, n;
  93. ulong mtime;
  94. Dir *d;
  95. char postbody[4096], *p, *e, *t, *hpx;
  96. URL px; // Proxy
  97. Out out;
  98. ofile = nil;
  99. p = postbody;
  100. e = p + sizeof(postbody);
  101. r.start = 0;
  102. r.end = -1;
  103. mtime = 0;
  104. memset(&u, 0, sizeof(u));
  105. memset(&px, 0, sizeof(px));
  106. hpx = getenv("httpproxy");
  107. ARGBEGIN {
  108. case 'o':
  109. ofile = ARGF();
  110. break;
  111. case 'd':
  112. debug = 1;
  113. break;
  114. case 'h':
  115. headerprint = 1;
  116. break;
  117. case 'v':
  118. verbose = 1;
  119. break;
  120. case 'x':
  121. net = ARGF();
  122. if(net == nil)
  123. usage();
  124. break;
  125. case 'p':
  126. t = ARGF();
  127. if(t == nil)
  128. usage();
  129. if(p != postbody)
  130. p = seprint(p, e, "&%s", t);
  131. else
  132. p = seprint(p, e, "%s", t);
  133. u.postbody = postbody;
  134. break;
  135. default:
  136. usage();
  137. } ARGEND;
  138. if(net != nil){
  139. if(strlen(net) > sizeof(tcpdir)-5)
  140. sysfatal("network mount point too long");
  141. snprint(tcpdir, sizeof(tcpdir), "%s/tcp", net);
  142. } else
  143. snprint(tcpdir, sizeof(tcpdir), "tcp");
  144. if(argc != 1)
  145. usage();
  146. out.fd = 1;
  147. out.written = 0;
  148. out.offset = 0;
  149. out.curr = nil;
  150. out.hiwat = nil;
  151. if(ofile != nil){
  152. d = dirstat(ofile);
  153. if(d == nil){
  154. out.fd = create(ofile, OWRITE, 0664);
  155. if(out.fd < 0)
  156. sysfatal("creating %s: %r", ofile);
  157. } else {
  158. out.fd = open(ofile, OWRITE);
  159. if(out.fd < 0)
  160. sysfatal("can't open %s: %r", ofile);
  161. r.start = d->length;
  162. mtime = d->mtime;
  163. free(d);
  164. }
  165. }
  166. errs = 0;
  167. if(crackurl(&u, argv[0]) < 0)
  168. sysfatal("%r");
  169. if(hpx && crackurl(&px, hpx) < 0)
  170. sysfatal("%r");
  171. for(;;){
  172. setoffset(&out, 0);
  173. /* transfer data */
  174. werrstr("");
  175. n = (*method[u.method].f)(&u, &px, &r, &out, mtime);
  176. switch(n){
  177. case Eof:
  178. exits(0);
  179. break;
  180. case Error:
  181. if(errs++ < 10)
  182. continue;
  183. sysfatal("too many errors with no progress %r");
  184. break;
  185. case Server:
  186. sysfatal("server returned: %r");
  187. break;
  188. }
  189. /* forward progress */
  190. errs = 0;
  191. r.start += n;
  192. if(r.start >= r.end)
  193. break;
  194. }
  195. exits(0);
  196. }
  197. int
  198. crackurl(URL *u, char *s)
  199. {
  200. char *p;
  201. int i;
  202. if(u->host != nil){
  203. free(u->host);
  204. u->host = nil;
  205. }
  206. if(u->page != nil){
  207. free(u->page);
  208. u->page = nil;
  209. }
  210. /* get type */
  211. u->method = Other;
  212. for(p = s; *p; p++){
  213. if(*p == '/'){
  214. u->method = Http;
  215. p = s;
  216. break;
  217. }
  218. if(*p == ':' && *(p+1)=='/' && *(p+2)=='/'){
  219. *p = 0;
  220. p += 3;
  221. for(i = 0; i < nelem(method); i++){
  222. if(cistrcmp(s, method[i].name) == 0){
  223. u->method = i;
  224. break;
  225. }
  226. }
  227. break;
  228. }
  229. }
  230. if(u->method == Other){
  231. werrstr("unsupported URL type %s", s);
  232. return -1;
  233. }
  234. /* get system */
  235. s = p;
  236. p = strchr(s, '/');
  237. if(p == nil){
  238. u->host = strdup(s);
  239. u->page = strdup("/");
  240. } else {
  241. u->page = strdup(p);
  242. *p = 0;
  243. u->host = strdup(s);
  244. *p = '/';
  245. }
  246. if(p = strchr(u->host, ':')) {
  247. *p++ = 0;
  248. u->port = p;
  249. } else
  250. u->port = method[u->method].name;
  251. if(*(u->host) == 0){
  252. werrstr("bad url, null host");
  253. return -1;
  254. }
  255. return 0;
  256. }
  257. char *day[] = {
  258. "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat"
  259. };
  260. char *month[] = {
  261. "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
  262. };
  263. struct
  264. {
  265. int fd;
  266. long mtime;
  267. } note;
  268. void
  269. catch(void*, char*)
  270. {
  271. Dir d;
  272. nulldir(&d);
  273. d.mtime = note.mtime;
  274. if(dirfwstat(note.fd, &d) < 0)
  275. sysfatal("catch: can't dirfwstat: %r");
  276. noted(NDFLT);
  277. }
  278. int
  279. dohttp(URL *u, URL *px, Range *r, Out *out, long mtime)
  280. {
  281. int fd, cfd;
  282. int redirect, auth, loop;
  283. int n, rv, code;
  284. long tot, vtime;
  285. Tm *tm;
  286. char buf[1024];
  287. char err[ERRMAX];
  288. /* always move back to a previous 512 byte bound because some
  289. * servers can't seem to deal with requests that start at the
  290. * end of the file
  291. */
  292. if(r->start)
  293. r->start = ((r->start-1)/512)*512;
  294. /* loop for redirects, requires reading both response code and headers */
  295. fd = -1;
  296. for(loop = 0; loop < 32; loop++){
  297. if(px->host == nil){
  298. fd = dial(netmkaddr(u->host, tcpdir, u->port), 0, 0, 0);
  299. } else {
  300. fd = dial(netmkaddr(px->host, tcpdir, px->port), 0, 0, 0);
  301. }
  302. if(fd < 0)
  303. return Error;
  304. if(u->method == Https){
  305. int tfd;
  306. TLSconn conn;
  307. memset(&conn, 0, sizeof conn);
  308. tfd = tlsClient(fd, &conn);
  309. if(tfd < 0){
  310. fprint(2, "tlsClient: %r\n");
  311. close(fd);
  312. return Error;
  313. }
  314. /* BUG: check cert here? */
  315. if(conn.cert)
  316. free(conn.cert);
  317. close(fd);
  318. fd = tfd;
  319. }
  320. /* write request, use range if not start of file */
  321. if(u->postbody == nil){
  322. if(px->host == nil){
  323. dfprint(fd, "GET %s HTTP/1.0\r\n"
  324. "Host: %s\r\n"
  325. "User-agent: Plan9/hget\r\n"
  326. "Cache-Control: no-cache\r\n"
  327. "Pragma: no-cache\r\n",
  328. u->page, u->host);
  329. } else {
  330. dfprint(fd, "GET http://%s%s HTTP/1.0\r\n"
  331. "Host: %s\r\n"
  332. "User-agent: Plan9/hget\r\n"
  333. "Cache-Control: no-cache\r\n"
  334. "Pragma: no-cache\r\n",
  335. u->host, u->page, u->host);
  336. }
  337. if(u->cred)
  338. dfprint(fd, "Authorization: Basic %s\r\n",
  339. u->cred);
  340. } else {
  341. dfprint(fd, "POST %s HTTP/1.0\r\n"
  342. "Host: %s\r\n"
  343. "Content-type: application/x-www-form-urlencoded\r\n"
  344. "Content-length: %d\r\n"
  345. "User-agent: Plan9/hget\r\n"
  346. "\r\n",
  347. u->page, u->host, strlen(u->postbody));
  348. dfprint(fd, "%s", u->postbody);
  349. }
  350. if(r->start != 0){
  351. dfprint(fd, "Range: bytes=%d-\n", r->start);
  352. if(u->etag != nil){
  353. dfprint(fd, "If-range: %s\n", u->etag);
  354. } else {
  355. tm = gmtime(mtime);
  356. dfprint(fd, "If-range: %s, %d %s %d %2d:%2.2d:%2.2d GMT\n",
  357. day[tm->wday], tm->mday, month[tm->mon],
  358. tm->year+1900, tm->hour, tm->min, tm->sec);
  359. }
  360. }
  361. if((cfd = open("/mnt/webcookies/http", ORDWR)) >= 0){
  362. if(fprint(cfd, "http://%s%s", u->host, u->page) > 0){
  363. while((n = read(cfd, buf, sizeof buf)) > 0){
  364. if(debug)
  365. write(2, buf, n);
  366. write(fd, buf, n);
  367. }
  368. }else{
  369. close(cfd);
  370. cfd = -1;
  371. }
  372. }
  373. dfprint(fd, "\r\n", u->host);
  374. auth = 0;
  375. redirect = 0;
  376. initibuf();
  377. code = httprcode(fd);
  378. switch(code){
  379. case Error: /* connection timed out */
  380. case Eof:
  381. close(fd);
  382. close(cfd);
  383. return code;
  384. case 200: /* OK */
  385. case 201: /* Created */
  386. case 202: /* Accepted */
  387. if(ofile == nil && r->start != 0)
  388. sysfatal("page changed underfoot");
  389. break;
  390. case 204: /* No Content */
  391. sysfatal("No Content");
  392. case 206: /* Partial Content */
  393. setoffset(out, r->start);
  394. break;
  395. case 301: /* Moved Permanently */
  396. case 302: /* Moved Temporarily */
  397. redirect = 1;
  398. u->postbody = nil;
  399. break;
  400. case 304: /* Not Modified */
  401. break;
  402. case 400: /* Bad Request */
  403. sysfatal("Bad Request");
  404. case 401: /* Unauthorized */
  405. if (auth)
  406. sysfatal("Authentication failed");
  407. auth = 1;
  408. break;
  409. case 402: /* ??? */
  410. sysfatal("Unauthorized");
  411. case 403: /* Forbidden */
  412. sysfatal("Forbidden by server");
  413. case 404: /* Not Found */
  414. sysfatal("Not found on server");
  415. case 407: /* Proxy Authentication */
  416. sysfatal("Proxy authentication required");
  417. case 500: /* Internal server error */
  418. sysfatal("Server choked");
  419. case 501: /* Not implemented */
  420. sysfatal("Server can't do it!");
  421. case 502: /* Bad gateway */
  422. sysfatal("Bad gateway");
  423. case 503: /* Service unavailable */
  424. sysfatal("Service unavailable");
  425. default:
  426. sysfatal("Unknown response code %d", code);
  427. }
  428. if(u->redirect != nil){
  429. free(u->redirect);
  430. u->redirect = nil;
  431. }
  432. rv = httpheaders(fd, cfd, u, r);
  433. close(cfd);
  434. if(rv != 0){
  435. close(fd);
  436. return rv;
  437. }
  438. if(!redirect && !auth)
  439. break;
  440. if (redirect){
  441. if(u->redirect == nil)
  442. sysfatal("redirect: no URL");
  443. if(crackurl(u, u->redirect) < 0)
  444. sysfatal("redirect: %r");
  445. }
  446. }
  447. /* transfer whatever you get */
  448. if(ofile != nil && u->mtime != 0){
  449. note.fd = out->fd;
  450. note.mtime = u->mtime;
  451. notify(catch);
  452. }
  453. tot = 0;
  454. vtime = 0;
  455. for(;;){
  456. n = readibuf(fd, buf, sizeof(buf));
  457. if(n <= 0)
  458. break;
  459. if(output(out, buf, n) != n)
  460. break;
  461. tot += n;
  462. if(verbose && vtime != time(0)) {
  463. vtime = time(0);
  464. fprint(2, "%ld %ld\n", r->start+tot, r->end);
  465. }
  466. }
  467. notify(nil);
  468. close(fd);
  469. if(ofile != nil && u->mtime != 0){
  470. Dir d;
  471. rerrstr(err, sizeof err);
  472. nulldir(&d);
  473. d.mtime = u->mtime;
  474. if(dirfwstat(out->fd, &d) < 0)
  475. fprint(2, "couldn't set mtime: %r\n");
  476. errstr(err, sizeof err);
  477. }
  478. return tot;
  479. }
  480. /* get the http response code */
  481. int
  482. httprcode(int fd)
  483. {
  484. int n;
  485. char *p;
  486. char buf[256];
  487. n = readline(fd, buf, sizeof(buf)-1);
  488. if(n <= 0)
  489. return n;
  490. if(debug)
  491. fprint(2, "%d <- %s\n", fd, buf);
  492. p = strchr(buf, ' ');
  493. if(strncmp(buf, "HTTP/", 5) != 0 || p == nil){
  494. werrstr("bad response from server");
  495. return -1;
  496. }
  497. buf[n] = 0;
  498. return atoi(p+1);
  499. }
  500. /* read in and crack the http headers, update u and r */
  501. void hhetag(char*, URL*, Range*);
  502. void hhmtime(char*, URL*, Range*);
  503. void hhclen(char*, URL*, Range*);
  504. void hhcrange(char*, URL*, Range*);
  505. void hhuri(char*, URL*, Range*);
  506. void hhlocation(char*, URL*, Range*);
  507. void hhauth(char*, URL*, Range*);
  508. struct {
  509. char *name;
  510. void (*f)(char*, URL*, Range*);
  511. } headers[] = {
  512. { "etag:", hhetag },
  513. { "last-modified:", hhmtime },
  514. { "content-length:", hhclen },
  515. { "content-range:", hhcrange },
  516. { "uri:", hhuri },
  517. { "location:", hhlocation },
  518. { "WWW-Authenticate:", hhauth },
  519. };
  520. int
  521. httpheaders(int fd, int cfd, URL *u, Range *r)
  522. {
  523. char buf[2048];
  524. char *p;
  525. int i, n;
  526. for(;;){
  527. n = getheader(fd, buf, sizeof(buf));
  528. if(n <= 0)
  529. break;
  530. if(cfd >= 0)
  531. fprint(cfd, "%s\n", buf);
  532. for(i = 0; i < nelem(headers); i++){
  533. n = strlen(headers[i].name);
  534. if(cistrncmp(buf, headers[i].name, n) == 0){
  535. /* skip field name and leading white */
  536. p = buf + n;
  537. while(*p == ' ' || *p == '\t')
  538. p++;
  539. (*headers[i].f)(p, u, r);
  540. break;
  541. }
  542. }
  543. }
  544. return n;
  545. }
  546. /*
  547. * read a single mime header, collect continuations.
  548. *
  549. * this routine assumes that there is a blank line twixt
  550. * the header and the message body, otherwise bytes will
  551. * be lost.
  552. */
  553. int
  554. getheader(int fd, char *buf, int n)
  555. {
  556. char *p, *e;
  557. int i;
  558. n--;
  559. p = buf;
  560. for(e = p + n; ; p += i){
  561. i = readline(fd, p, e-p);
  562. if(i < 0)
  563. return i;
  564. if(p == buf){
  565. /* first line */
  566. if(strchr(buf, ':') == nil)
  567. break; /* end of headers */
  568. } else {
  569. /* continuation line */
  570. if(*p != ' ' && *p != '\t'){
  571. unreadline(p);
  572. *p = 0;
  573. break; /* end of this header */
  574. }
  575. }
  576. }
  577. if(headerprint)
  578. print("%s\n", buf);
  579. if(debug)
  580. fprint(2, "%d <- %s\n", fd, buf);
  581. return p-buf;
  582. }
  583. void
  584. hhetag(char *p, URL *u, Range*)
  585. {
  586. if(u->etag != nil){
  587. if(strcmp(u->etag, p) != 0)
  588. sysfatal("file changed underfoot");
  589. } else
  590. u->etag = strdup(p);
  591. }
  592. char* monthchars = "janfebmaraprmayjunjulaugsepoctnovdec";
  593. void
  594. hhmtime(char *p, URL *u, Range*)
  595. {
  596. char *month, *day, *yr, *hms;
  597. char *fields[6];
  598. Tm tm, now;
  599. int i;
  600. i = getfields(p, fields, 6, 1, " \t");
  601. if(i < 5)
  602. return;
  603. day = fields[1];
  604. month = fields[2];
  605. yr = fields[3];
  606. hms = fields[4];
  607. /* default time */
  608. now = *gmtime(time(0));
  609. tm = now;
  610. tm.yday = 0;
  611. /* convert ascii month to a number twixt 1 and 12 */
  612. if(*month >= '0' && *month <= '9'){
  613. tm.mon = atoi(month) - 1;
  614. if(tm.mon < 0 || tm.mon > 11)
  615. tm.mon = 5;
  616. } else {
  617. for(p = month; *p; p++)
  618. *p = tolower(*p);
  619. for(i = 0; i < 12; i++)
  620. if(strncmp(&monthchars[i*3], month, 3) == 0){
  621. tm.mon = i;
  622. break;
  623. }
  624. }
  625. tm.mday = atoi(day);
  626. if(hms) {
  627. tm.hour = strtoul(hms, &p, 10);
  628. if(*p == ':') {
  629. p++;
  630. tm.min = strtoul(p, &p, 10);
  631. if(*p == ':') {
  632. p++;
  633. tm.sec = strtoul(p, &p, 10);
  634. }
  635. }
  636. if(tolower(*p) == 'p')
  637. tm.hour += 12;
  638. }
  639. if(yr) {
  640. tm.year = atoi(yr);
  641. if(tm.year >= 1900)
  642. tm.year -= 1900;
  643. } else {
  644. if(tm.mon > now.mon || (tm.mon == now.mon && tm.mday > now.mday+1))
  645. tm.year--;
  646. }
  647. strcpy(tm.zone, "GMT");
  648. /* convert to epoch seconds */
  649. u->mtime = tm2sec(&tm);
  650. }
  651. void
  652. hhclen(char *p, URL*, Range *r)
  653. {
  654. r->end = atoi(p);
  655. }
  656. void
  657. hhcrange(char *p, URL*, Range *r)
  658. {
  659. char *x;
  660. vlong l;
  661. l = 0;
  662. x = strchr(p, '/');
  663. if(x)
  664. l = atoll(x+1);
  665. if(l == 0)
  666. x = strchr(p, '-');
  667. if(x)
  668. l = atoll(x+1);
  669. if(l)
  670. r->end = l;
  671. }
  672. void
  673. hhuri(char *p, URL *u, Range*)
  674. {
  675. if(*p != '<')
  676. return;
  677. u->redirect = strdup(p+1);
  678. p = strchr(u->redirect, '>');
  679. if(p != nil)
  680. *p = 0;
  681. }
  682. void
  683. hhlocation(char *p, URL *u, Range*)
  684. {
  685. u->redirect = strdup(p);
  686. }
  687. void
  688. hhauth(char *p, URL *u, Range*)
  689. {
  690. char *f[4];
  691. UserPasswd *up;
  692. char *s, cred[64];
  693. if (cistrncmp(p, "basic ", 6) != 0)
  694. sysfatal("only Basic authentication supported");
  695. if (gettokens(p, f, nelem(f), "\"") < 2)
  696. sysfatal("garbled auth data");
  697. if ((up = auth_getuserpasswd(auth_getkey, "proto=pass service=http dom=%q relm=%q",
  698. u->host, f[1])) == nil)
  699. sysfatal("cannot authenticate");
  700. s = smprint("%s:%s", up->user, up->passwd);
  701. if(enc64(cred, sizeof(cred), (uchar *)s, strlen(s)) == -1)
  702. sysfatal("enc64");
  703. free(s);
  704. assert(u->cred = strdup(cred));
  705. }
  706. enum
  707. {
  708. /* ftp return codes */
  709. Extra= 1,
  710. Success= 2,
  711. Incomplete= 3,
  712. TempFail= 4,
  713. PermFail= 5,
  714. Nnetdir= 64, /* max length of network directory paths */
  715. Ndialstr= 64, /* max length of dial strings */
  716. };
  717. int ftpcmd(int, char*, ...);
  718. int ftprcode(int, char*, int);
  719. int hello(int);
  720. int logon(int);
  721. int xfertype(int, char*);
  722. int passive(int, URL*);
  723. int active(int, URL*);
  724. int ftpxfer(int, Out*, Range*);
  725. int terminateftp(int, int);
  726. int getaddrport(char*, uchar*, uchar*);
  727. int ftprestart(int, Out*, URL*, Range*, long);
  728. int
  729. doftp(URL *u, URL *px, Range *r, Out *out, long mtime)
  730. {
  731. int pid, ctl, data, rv;
  732. Waitmsg *w;
  733. char msg[64];
  734. char conndir[NETPATHLEN];
  735. char *p;
  736. /* untested, proxy dosn't work with ftp (I think) */
  737. if(px->host == nil){
  738. ctl = dial(netmkaddr(u->host, tcpdir, u->port), 0, conndir, 0);
  739. } else {
  740. ctl = dial(netmkaddr(px->host, tcpdir, px->port), 0, conndir, 0);
  741. }
  742. if(ctl < 0)
  743. return Error;
  744. if(net == nil){
  745. p = strrchr(conndir, '/');
  746. *p = 0;
  747. snprint(tcpdir, sizeof(tcpdir), conndir);
  748. }
  749. initibuf();
  750. rv = hello(ctl);
  751. if(rv < 0)
  752. return terminateftp(ctl, rv);
  753. rv = logon(ctl);
  754. if(rv < 0)
  755. return terminateftp(ctl, rv);
  756. rv = xfertype(ctl, "I");
  757. if(rv < 0)
  758. return terminateftp(ctl, rv);
  759. /* if file is up to date and the right size, stop */
  760. if(ftprestart(ctl, out, u, r, mtime) > 0){
  761. close(ctl);
  762. return Eof;
  763. }
  764. /* first try passive mode, then active */
  765. data = passive(ctl, u);
  766. if(data < 0){
  767. data = active(ctl, u);
  768. if(data < 0)
  769. return Error;
  770. }
  771. /* fork */
  772. switch(pid = rfork(RFPROC|RFFDG|RFMEM)){
  773. case -1:
  774. close(data);
  775. return terminateftp(ctl, Error);
  776. case 0:
  777. ftpxfer(data, out, r);
  778. close(data);
  779. _exits(0);
  780. default:
  781. close(data);
  782. break;
  783. }
  784. /* wait for reply message */
  785. rv = ftprcode(ctl, msg, sizeof(msg));
  786. close(ctl);
  787. /* wait for process to terminate */
  788. w = nil;
  789. for(;;){
  790. free(w);
  791. w = wait();
  792. if(w == nil)
  793. return Error;
  794. if(w->pid == pid){
  795. if(w->msg[0] == 0){
  796. free(w);
  797. break;
  798. }
  799. werrstr("xfer: %s", w->msg);
  800. free(w);
  801. return Error;
  802. }
  803. }
  804. switch(rv){
  805. case Success:
  806. return Eof;
  807. case TempFail:
  808. return Server;
  809. default:
  810. return Error;
  811. }
  812. }
  813. int
  814. ftpcmd(int ctl, char *fmt, ...)
  815. {
  816. va_list arg;
  817. char buf[2*1024], *s;
  818. va_start(arg, fmt);
  819. s = vseprint(buf, buf + (sizeof(buf)-4) / sizeof(*buf), fmt, arg);
  820. va_end(arg);
  821. if(debug)
  822. fprint(2, "%d -> %s\n", ctl, buf);
  823. *s++ = '\r';
  824. *s++ = '\n';
  825. if(write(ctl, buf, s - buf) != s - buf)
  826. return -1;
  827. return 0;
  828. }
  829. int
  830. ftprcode(int ctl, char *msg, int len)
  831. {
  832. int rv;
  833. int i;
  834. char *p;
  835. len--; /* room for terminating null */
  836. for(;;){
  837. *msg = 0;
  838. i = readline(ctl, msg, len);
  839. if(i < 0)
  840. break;
  841. if(debug)
  842. fprint(2, "%d <- %s\n", ctl, msg);
  843. /* stop if not a continuation */
  844. rv = strtol(msg, &p, 10);
  845. if(rv >= 100 && rv < 600 && p==msg+3 && *p == ' ')
  846. return rv/100;
  847. }
  848. *msg = 0;
  849. return -1;
  850. }
  851. int
  852. hello(int ctl)
  853. {
  854. char msg[1024];
  855. /* wait for hello from other side */
  856. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  857. werrstr("HELLO: %s", msg);
  858. return Server;
  859. }
  860. return 0;
  861. }
  862. int
  863. getdec(char *p, int n)
  864. {
  865. int x = 0;
  866. int i;
  867. for(i = 0; i < n; i++)
  868. x = x*10 + (*p++ - '0');
  869. return x;
  870. }
  871. int
  872. ftprestart(int ctl, Out *out, URL *u, Range *r, long mtime)
  873. {
  874. Tm tm;
  875. char msg[1024];
  876. long x, rmtime;
  877. ftpcmd(ctl, "MDTM %s", u->page);
  878. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  879. r->start = 0;
  880. return 0; /* need to do something */
  881. }
  882. /* decode modification time */
  883. if(strlen(msg) < 4 + 4 + 2 + 2 + 2 + 2 + 2){
  884. r->start = 0;
  885. return 0; /* need to do something */
  886. }
  887. memset(&tm, 0, sizeof(tm));
  888. tm.year = getdec(msg+4, 4) - 1900;
  889. tm.mon = getdec(msg+4+4, 2) - 1;
  890. tm.mday = getdec(msg+4+4+2, 2);
  891. tm.hour = getdec(msg+4+4+2+2, 2);
  892. tm.min = getdec(msg+4+4+2+2+2, 2);
  893. tm.sec = getdec(msg+4+4+2+2+2+2, 2);
  894. strcpy(tm.zone, "GMT");
  895. rmtime = tm2sec(&tm);
  896. if(rmtime > mtime)
  897. r->start = 0;
  898. /* get size */
  899. ftpcmd(ctl, "SIZE %s", u->page);
  900. if(ftprcode(ctl, msg, sizeof(msg)) == Success){
  901. x = atol(msg+4);
  902. if(r->start == x)
  903. return 1; /* we're up to date */
  904. r->end = x;
  905. }
  906. /* seek to restart point */
  907. if(r->start > 0){
  908. ftpcmd(ctl, "REST %lud", r->start);
  909. if(ftprcode(ctl, msg, sizeof(msg)) == Incomplete){
  910. setoffset(out, r->start);
  911. }else
  912. r->start = 0;
  913. }
  914. return 0; /* need to do something */
  915. }
  916. int
  917. logon(int ctl)
  918. {
  919. char msg[1024];
  920. /* login anonymous */
  921. ftpcmd(ctl, "USER anonymous");
  922. switch(ftprcode(ctl, msg, sizeof(msg))){
  923. case Success:
  924. return 0;
  925. case Incomplete:
  926. break; /* need password */
  927. default:
  928. werrstr("USER: %s", msg);
  929. return Server;
  930. }
  931. /* send user id as password */
  932. sprint(msg, "%s@closedmind.org", getuser());
  933. ftpcmd(ctl, "PASS %s", msg);
  934. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  935. werrstr("PASS: %s", msg);
  936. return Server;
  937. }
  938. return 0;
  939. }
  940. int
  941. xfertype(int ctl, char *t)
  942. {
  943. char msg[1024];
  944. ftpcmd(ctl, "TYPE %s", t);
  945. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  946. werrstr("TYPE %s: %s", t, msg);
  947. return Server;
  948. }
  949. return 0;
  950. }
  951. int
  952. passive(int ctl, URL *u)
  953. {
  954. char msg[1024];
  955. char ipaddr[32];
  956. char *f[6];
  957. char *p;
  958. int fd;
  959. int port;
  960. char aport[12];
  961. ftpcmd(ctl, "PASV");
  962. if(ftprcode(ctl, msg, sizeof(msg)) != Success)
  963. return Error;
  964. /* get address and port number from reply, this is AI */
  965. p = strchr(msg, '(');
  966. if(p == nil){
  967. for(p = msg+3; *p; p++)
  968. if(isdigit(*p))
  969. break;
  970. } else
  971. p++;
  972. if(getfields(p, f, 6, 0, ",)") < 6){
  973. werrstr("ftp protocol botch");
  974. return Server;
  975. }
  976. snprint(ipaddr, sizeof(ipaddr), "%s.%s.%s.%s",
  977. f[0], f[1], f[2], f[3]);
  978. port = ((atoi(f[4])&0xff)<<8) + (atoi(f[5])&0xff);
  979. sprint(aport, "%d", port);
  980. /* open data connection */
  981. fd = dial(netmkaddr(ipaddr, tcpdir, aport), 0, 0, 0);
  982. if(fd < 0){
  983. werrstr("passive mode failed: %r");
  984. return Error;
  985. }
  986. /* tell remote to send a file */
  987. ftpcmd(ctl, "RETR %s", u->page);
  988. if(ftprcode(ctl, msg, sizeof(msg)) != Extra){
  989. werrstr("RETR %s: %s", u->page, msg);
  990. return Error;
  991. }
  992. return fd;
  993. }
  994. int
  995. active(int ctl, URL *u)
  996. {
  997. char msg[1024];
  998. char dir[40], ldir[40];
  999. uchar ipaddr[4];
  1000. uchar port[2];
  1001. int lcfd, dfd, afd;
  1002. /* announce a port for the call back */
  1003. snprint(msg, sizeof(msg), "%s!*!0", tcpdir);
  1004. afd = announce(msg, dir);
  1005. if(afd < 0)
  1006. return Error;
  1007. /* get a local address/port of the annoucement */
  1008. if(getaddrport(dir, ipaddr, port) < 0){
  1009. close(afd);
  1010. return Error;
  1011. }
  1012. /* tell remote side address and port*/
  1013. ftpcmd(ctl, "PORT %d,%d,%d,%d,%d,%d", ipaddr[0], ipaddr[1], ipaddr[2],
  1014. ipaddr[3], port[0], port[1]);
  1015. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  1016. close(afd);
  1017. werrstr("active: %s", msg);
  1018. return Error;
  1019. }
  1020. /* tell remote to send a file */
  1021. ftpcmd(ctl, "RETR %s", u->page);
  1022. if(ftprcode(ctl, msg, sizeof(msg)) != Extra){
  1023. close(afd);
  1024. werrstr("RETR: %s", msg);
  1025. return Server;
  1026. }
  1027. /* wait for a connection */
  1028. lcfd = listen(dir, ldir);
  1029. if(lcfd < 0){
  1030. close(afd);
  1031. return Error;
  1032. }
  1033. dfd = accept(lcfd, ldir);
  1034. if(dfd < 0){
  1035. close(afd);
  1036. close(lcfd);
  1037. return Error;
  1038. }
  1039. close(afd);
  1040. close(lcfd);
  1041. return dfd;
  1042. }
  1043. int
  1044. ftpxfer(int in, Out *out, Range *r)
  1045. {
  1046. char buf[1024];
  1047. long vtime;
  1048. int i, n;
  1049. vtime = 0;
  1050. for(n = 0;;n += i){
  1051. i = read(in, buf, sizeof(buf));
  1052. if(i == 0)
  1053. break;
  1054. if(i < 0)
  1055. return Error;
  1056. if(output(out, buf, i) != i)
  1057. return Error;
  1058. r->start += i;
  1059. if(verbose && vtime != time(0)) {
  1060. vtime = time(0);
  1061. fprint(2, "%ld %ld\n", r->start, r->end);
  1062. }
  1063. }
  1064. return n;
  1065. }
  1066. int
  1067. terminateftp(int ctl, int rv)
  1068. {
  1069. close(ctl);
  1070. return rv;
  1071. }
  1072. /*
  1073. * case insensitive strcmp (why aren't these in libc?)
  1074. */
  1075. int
  1076. cistrncmp(char *a, char *b, int n)
  1077. {
  1078. while(n-- > 0){
  1079. if(tolower(*a++) != tolower(*b++))
  1080. return -1;
  1081. }
  1082. return 0;
  1083. }
  1084. int
  1085. cistrcmp(char *a, char *b)
  1086. {
  1087. while(*a || *b)
  1088. if(tolower(*a++) != tolower(*b++))
  1089. return -1;
  1090. return 0;
  1091. }
  1092. /*
  1093. * buffered io
  1094. */
  1095. struct
  1096. {
  1097. char *rp;
  1098. char *wp;
  1099. char buf[4*1024];
  1100. } b;
  1101. void
  1102. initibuf(void)
  1103. {
  1104. b.rp = b.wp = b.buf;
  1105. }
  1106. /*
  1107. * read a possibly buffered line, strip off trailing while
  1108. */
  1109. int
  1110. readline(int fd, char *buf, int len)
  1111. {
  1112. int n;
  1113. char *p;
  1114. int eof = 0;
  1115. len--;
  1116. for(p = buf;;){
  1117. if(b.rp >= b.wp){
  1118. n = read(fd, b.wp, sizeof(b.buf)/2);
  1119. if(n < 0)
  1120. return -1;
  1121. if(n == 0){
  1122. eof = 1;
  1123. break;
  1124. }
  1125. b.wp += n;
  1126. }
  1127. n = *b.rp++;
  1128. if(len > 0){
  1129. *p++ = n;
  1130. len--;
  1131. }
  1132. if(n == '\n')
  1133. break;
  1134. }
  1135. /* drop trailing white */
  1136. for(;;){
  1137. if(p <= buf)
  1138. break;
  1139. n = *(p-1);
  1140. if(n != ' ' && n != '\t' && n != '\r' && n != '\n')
  1141. break;
  1142. p--;
  1143. }
  1144. *p = 0;
  1145. if(eof && p == buf)
  1146. return -1;
  1147. return p-buf;
  1148. }
  1149. void
  1150. unreadline(char *line)
  1151. {
  1152. int i, n;
  1153. i = strlen(line);
  1154. n = b.wp-b.rp;
  1155. memmove(&b.buf[i+1], b.rp, n);
  1156. memmove(b.buf, line, i);
  1157. b.buf[i] = '\n';
  1158. b.rp = b.buf;
  1159. b.wp = b.rp + i + 1 + n;
  1160. }
  1161. int
  1162. readibuf(int fd, char *buf, int len)
  1163. {
  1164. int n;
  1165. n = b.wp-b.rp;
  1166. if(n > 0){
  1167. if(n > len)
  1168. n = len;
  1169. memmove(buf, b.rp, n);
  1170. b.rp += n;
  1171. return n;
  1172. }
  1173. return read(fd, buf, len);
  1174. }
  1175. int
  1176. dfprint(int fd, char *fmt, ...)
  1177. {
  1178. char buf[4*1024];
  1179. va_list arg;
  1180. va_start(arg, fmt);
  1181. vseprint(buf, buf+sizeof(buf), fmt, arg);
  1182. va_end(arg);
  1183. if(debug)
  1184. fprint(2, "%d -> %s", fd, buf);
  1185. return fprint(fd, "%s", buf);
  1186. }
  1187. int
  1188. getaddrport(char *dir, uchar *ipaddr, uchar *port)
  1189. {
  1190. char buf[256];
  1191. int fd, i;
  1192. char *p;
  1193. snprint(buf, sizeof(buf), "%s/local", dir);
  1194. fd = open(buf, OREAD);
  1195. if(fd < 0)
  1196. return -1;
  1197. i = read(fd, buf, sizeof(buf)-1);
  1198. close(fd);
  1199. if(i <= 0)
  1200. return -1;
  1201. buf[i] = 0;
  1202. p = strchr(buf, '!');
  1203. if(p != nil)
  1204. *p++ = 0;
  1205. v4parseip(ipaddr, buf);
  1206. i = atoi(p);
  1207. port[0] = i>>8;
  1208. port[1] = i;
  1209. return 0;
  1210. }
  1211. void
  1212. md5free(DigestState *state)
  1213. {
  1214. uchar x[MD5dlen];
  1215. md5(nil, 0, x, state);
  1216. }
  1217. DigestState*
  1218. md5dup(DigestState *state)
  1219. {
  1220. char *p;
  1221. p = md5pickle(state);
  1222. if(p == nil)
  1223. sysfatal("md5pickle: %r");
  1224. state = md5unpickle(p);
  1225. if(state == nil)
  1226. sysfatal("md5unpickle: %r");
  1227. free(p);
  1228. return state;
  1229. }
  1230. void
  1231. setoffset(Out *out, int offset)
  1232. {
  1233. md5free(out->curr);
  1234. if(offset == 0)
  1235. out->curr = md5(nil, 0, nil, nil);
  1236. else
  1237. out->curr = nil;
  1238. out->offset = offset;
  1239. }
  1240. /*
  1241. * write some output, discarding it (but keeping track)
  1242. * if we've already written it. if we've gone backwards,
  1243. * verify that everything previously written matches
  1244. * that which would have been written from the current
  1245. * output.
  1246. */
  1247. int
  1248. output(Out *out, char *buf, int nb)
  1249. {
  1250. int n, d;
  1251. uchar m0[MD5dlen], m1[MD5dlen];
  1252. n = nb;
  1253. d = out->written - out->offset;
  1254. assert(d >= 0);
  1255. if(d > 0){
  1256. if(n < d){
  1257. if(out->curr != nil)
  1258. md5((uchar*)buf, n, nil, out->curr);
  1259. out->offset += n;
  1260. return n;
  1261. }
  1262. if(out->curr != nil){
  1263. md5((uchar*)buf, d, m0, out->curr);
  1264. out->curr = nil;
  1265. md5(nil, 0, m1, md5dup(out->hiwat));
  1266. if(memcmp(m0, m1, MD5dlen) != 0){
  1267. fprint(2, "integrity check failure at offset %d\n", out->written);
  1268. return -1;
  1269. }
  1270. }
  1271. buf += d;
  1272. n -= d;
  1273. out->offset += d;
  1274. }
  1275. if(n > 0){
  1276. out->hiwat = md5((uchar*)buf, n, nil, out->hiwat);
  1277. n = write(out->fd, buf, n);
  1278. if(n > 0){
  1279. out->offset += n;
  1280. out->written += n;
  1281. }
  1282. }
  1283. return n + d;
  1284. }