hget.c 26 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489
  1. /*
  2. * This file is part of the UCB release of Plan 9. It is subject to the license
  3. * terms in the LICENSE file found in the top-level directory of this
  4. * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No
  5. * part of the UCB release of Plan 9, including this file, may be copied,
  6. * modified, propagated, or distributed except according to the terms contained
  7. * in the LICENSE file.
  8. */
  9. #include <u.h>
  10. #include <libc.h>
  11. #include <ctype.h>
  12. #include <bio.h>
  13. #include <ip.h>
  14. #include <libsec.h>
  15. #include <auth.h>
  16. typedef struct URL URL;
  17. struct URL
  18. {
  19. int method;
  20. char *host;
  21. char *port;
  22. char *page;
  23. char *etag;
  24. char *redirect;
  25. char *postbody;
  26. char *cred;
  27. char *rhead;
  28. int32_t mtime;
  29. };
  30. typedef struct Range Range;
  31. struct Range
  32. {
  33. int32_t start; /* only 2 gig supported, tdb */
  34. int32_t end;
  35. };
  36. typedef struct Out Out;
  37. struct Out
  38. {
  39. int fd;
  40. int offset; /* notional current offset in output */
  41. int written; /* number of bytes successfully transferred to output */
  42. DigestState *curr; /* digest state up to offset (if known) */
  43. DigestState *hiwat; /* digest state of all bytes written */
  44. };
  45. enum
  46. {
  47. Other,
  48. Http,
  49. Https,
  50. Ftp,
  51. };
  52. enum
  53. {
  54. Eof = 0,
  55. Error = -1,
  56. Server = -2,
  57. Changed = -3,
  58. };
  59. int debug;
  60. char *ofile;
  61. int doftp(URL*, URL*, Range*, Out*, int32_t);
  62. int dohttp(URL*, URL*, Range*, Out*, int32_t);
  63. int crackurl(URL*, char*);
  64. Range* crackrange(char*);
  65. int getheader(int, char*, int);
  66. int httpheaders(int, int, URL*, Range*);
  67. int httprcode(int);
  68. int cistrncmp(char*, char*, int);
  69. int cistrcmp(char*, char*);
  70. void initibuf(void);
  71. int readline(int, char*, int);
  72. int readibuf(int, char*, int);
  73. int dfprint(int, char*, ...);
  74. void unreadline(char*);
  75. int output(Out*, char*, int);
  76. void setoffset(Out*, int);
  77. int verbose;
  78. char *net;
  79. char tcpdir[NETPATHLEN];
  80. int headerprint;
  81. struct {
  82. char *name;
  83. int (*f)(URL*, URL*, Range*, Out*, int32_t);
  84. } method[] = {
  85. [Http] { "http", dohttp },
  86. [Https] { "https", dohttp },
  87. [Ftp] { "ftp", doftp },
  88. [Other] { "_______", nil },
  89. };
  90. void
  91. usage(void)
  92. {
  93. fprint(2, "usage: %s [-dhv] [-o outfile] [-p body] [-x netmtpt] [-r header] url\n", argv0);
  94. exits("usage");
  95. }
  96. void
  97. main(int argc, char **argv)
  98. {
  99. URL u;
  100. Range r;
  101. int errs, n;
  102. uint32_t mtime;
  103. Dir *d;
  104. char postbody[4096], *p, *e, *t, *hpx;
  105. URL px; // Proxy
  106. Out out;
  107. ofile = nil;
  108. p = postbody;
  109. e = p + sizeof(postbody);
  110. r.start = 0;
  111. r.end = -1;
  112. mtime = 0;
  113. memset(&u, 0, sizeof(u));
  114. memset(&px, 0, sizeof(px));
  115. hpx = getenv("httpproxy");
  116. ARGBEGIN {
  117. case 'o':
  118. ofile = EARGF(usage());
  119. break;
  120. case 'd':
  121. debug = 1;
  122. break;
  123. case 'h':
  124. headerprint = 1;
  125. break;
  126. case 'v':
  127. verbose = 1;
  128. break;
  129. case 'x':
  130. net = EARGF(usage());
  131. break;
  132. case 'r':
  133. u.rhead = EARGF(usage());
  134. break;
  135. case 'p':
  136. t = EARGF(usage());
  137. if(p != postbody)
  138. p = seprint(p, e, "&%s", t);
  139. else
  140. p = seprint(p, e, "%s", t);
  141. u.postbody = postbody;
  142. break;
  143. default:
  144. usage();
  145. } ARGEND;
  146. if(net != nil){
  147. if(strlen(net) > sizeof(tcpdir)-5)
  148. sysfatal("network mount point too int32_t");
  149. snprint(tcpdir, sizeof(tcpdir), "%s/tcp", net);
  150. } else
  151. snprint(tcpdir, sizeof(tcpdir), "tcp");
  152. if(argc != 1)
  153. usage();
  154. out.fd = 1;
  155. out.written = 0;
  156. out.offset = 0;
  157. out.curr = nil;
  158. out.hiwat = nil;
  159. if(ofile != nil){
  160. d = dirstat(ofile);
  161. if(d == nil){
  162. out.fd = create(ofile, OWRITE, 0664);
  163. if(out.fd < 0)
  164. sysfatal("creating %s: %r", ofile);
  165. } else {
  166. out.fd = open(ofile, OWRITE);
  167. if(out.fd < 0)
  168. sysfatal("can't open %s: %r", ofile);
  169. r.start = d->length;
  170. mtime = d->mtime;
  171. free(d);
  172. }
  173. }
  174. errs = 0;
  175. if(crackurl(&u, argv[0]) < 0)
  176. sysfatal("%r");
  177. if(hpx && crackurl(&px, hpx) < 0)
  178. sysfatal("%r");
  179. for(;;){
  180. setoffset(&out, 0);
  181. /* transfer data */
  182. werrstr("");
  183. n = (*method[u.method].f)(&u, &px, &r, &out, mtime);
  184. switch(n){
  185. case Eof:
  186. exits(0);
  187. break;
  188. case Error:
  189. if(errs++ < 10)
  190. continue;
  191. sysfatal("too many errors with no progress %r");
  192. break;
  193. case Server:
  194. sysfatal("server returned: %r");
  195. break;
  196. }
  197. /* forward progress */
  198. errs = 0;
  199. r.start += n;
  200. if(r.start >= r.end)
  201. break;
  202. }
  203. exits(0);
  204. }
  205. int
  206. crackurl(URL *u, char *s)
  207. {
  208. char *p;
  209. int i;
  210. if(u->page != nil){
  211. free(u->page);
  212. u->page = nil;
  213. }
  214. /* get type */
  215. for(p = s; *p; p++){
  216. if(*p == '/'){
  217. p = s;
  218. if(u->method == Other){
  219. werrstr("missing method");
  220. return -1;
  221. }
  222. if(u->host == nil){
  223. werrstr("missing host");
  224. return -1;
  225. }
  226. u->page = strdup(p);
  227. return 0;
  228. }
  229. if(*p == ':' && *(p+1)=='/' && *(p+2)=='/'){
  230. *p = 0;
  231. p += 3;
  232. for(i = 0; i < nelem(method); i++){
  233. if(cistrcmp(s, method[i].name) == 0){
  234. u->method = i;
  235. break;
  236. }
  237. }
  238. break;
  239. }
  240. }
  241. if(u->method == Other){
  242. werrstr("unsupported URL type %s", s);
  243. return -1;
  244. }
  245. /* get system */
  246. free(u->host);
  247. s = p;
  248. p = strchr(s, '/');
  249. if(p == nil){
  250. u->host = strdup(s);
  251. u->page = strdup("/");
  252. } else {
  253. u->page = strdup(p);
  254. *p = 0;
  255. u->host = strdup(s);
  256. *p = '/';
  257. }
  258. if(p = strchr(u->host, ':')) {
  259. *p++ = 0;
  260. u->port = p;
  261. } else
  262. u->port = method[u->method].name;
  263. if(*(u->host) == 0){
  264. werrstr("bad url, null host");
  265. return -1;
  266. }
  267. return 0;
  268. }
  269. char *day[] = {
  270. "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat"
  271. };
  272. char *month[] = {
  273. "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
  274. };
  275. struct
  276. {
  277. int fd;
  278. int32_t mtime;
  279. } note;
  280. void
  281. catch(void *v, char *c)
  282. {
  283. Dir d;
  284. nulldir(&d);
  285. d.mtime = note.mtime;
  286. if(dirfwstat(note.fd, &d) < 0)
  287. sysfatal("catch: can't dirfwstat: %r");
  288. noted(NDFLT);
  289. }
  290. int
  291. dohttp(URL *u, URL *px, Range *r, Out *out, int32_t mtime)
  292. {
  293. int fd, cfd;
  294. int redirect, auth, loop;
  295. int n, rv, code;
  296. int32_t tot, vtime;
  297. Tm *tm;
  298. char buf[1024];
  299. char err[ERRMAX];
  300. /* always move back to a previous 512 byte bound because some
  301. * servers can't seem to deal with requests that start at the
  302. * end of the file
  303. */
  304. if(r->start)
  305. r->start = ((r->start-1)/512)*512;
  306. /* loop for redirects, requires reading both response code and headers */
  307. fd = -1;
  308. for(loop = 0; loop < 32; loop++){
  309. if(px->host == nil){
  310. fd = dial(netmkaddr(u->host, tcpdir, u->port), 0, 0, 0);
  311. } else {
  312. fd = dial(netmkaddr(px->host, tcpdir, px->port), 0, 0, 0);
  313. }
  314. if(fd < 0)
  315. return Error;
  316. if(u->method == Https){
  317. int tfd;
  318. TLSconn conn;
  319. memset(&conn, 0, sizeof conn);
  320. tfd = tlsClient(fd, &conn);
  321. if(tfd < 0){
  322. fprint(2, "tlsClient: %r\n");
  323. close(fd);
  324. return Error;
  325. }
  326. /* BUG: check cert here? */
  327. if(conn.cert)
  328. free(conn.cert);
  329. close(fd);
  330. fd = tfd;
  331. }
  332. /* write request, use range if not start of file */
  333. if(u->postbody == nil){
  334. if(px->host == nil){
  335. dfprint(fd, "GET %s HTTP/1.0\r\n"
  336. "Host: %s\r\n"
  337. "User-agent: Plan9/hget\r\n"
  338. "Cache-Control: no-cache\r\n"
  339. "Pragma: no-cache\r\n",
  340. u->page, u->host);
  341. } else {
  342. dfprint(fd, "GET http://%s%s HTTP/1.0\r\n"
  343. "Host: %s\r\n"
  344. "User-agent: Plan9/hget\r\n"
  345. "Cache-Control: no-cache\r\n"
  346. "Pragma: no-cache\r\n",
  347. u->host, u->page, u->host);
  348. }
  349. } else {
  350. dfprint(fd, "POST %s HTTP/1.0\r\n"
  351. "Host: %s\r\n"
  352. "Content-type: application/x-www-form-urlencoded\r\n"
  353. "Content-length: %d\r\n"
  354. "User-agent: Plan9/hget\r\n",
  355. u->page, u->host, strlen(u->postbody));
  356. }
  357. if(u->cred)
  358. dfprint(fd, "Authorization: Basic %s\r\n", u->cred);
  359. if(u->rhead)
  360. dfprint(fd, "%s\r\n", u->rhead);
  361. if(r->start != 0){
  362. dfprint(fd, "Range: bytes=%d-\n", r->start);
  363. if(u->etag != nil){
  364. dfprint(fd, "If-range: %s\n", u->etag);
  365. } else {
  366. tm = gmtime(mtime);
  367. dfprint(fd, "If-range: %s, %d %s %d %2d:%2.2d:%2.2d GMT\n",
  368. day[tm->wday], tm->mday, month[tm->mon],
  369. tm->year+1900, tm->hour, tm->min, tm->sec);
  370. }
  371. }
  372. if((cfd = open("/mnt/webcookies/http", ORDWR)) >= 0){
  373. if(fprint(cfd, "http://%s%s", u->host, u->page) > 0){
  374. while((n = read(cfd, buf, sizeof buf)) > 0){
  375. if(debug)
  376. write(2, buf, n);
  377. write(fd, buf, n);
  378. }
  379. }else{
  380. close(cfd);
  381. cfd = -1;
  382. }
  383. }
  384. dfprint(fd, "\r\n", u->host);
  385. if(u->postbody)
  386. dfprint(fd, "%s", u->postbody);
  387. auth = 0;
  388. redirect = 0;
  389. initibuf();
  390. code = httprcode(fd);
  391. switch(code){
  392. case Error: /* connection timed out */
  393. case Eof:
  394. close(fd);
  395. close(cfd);
  396. return code;
  397. case 200: /* OK */
  398. case 201: /* Created */
  399. case 202: /* Accepted */
  400. if(ofile == nil && r->start != 0)
  401. sysfatal("page changed underfoot");
  402. break;
  403. case 204: /* No Content */
  404. sysfatal("No Content");
  405. case 206: /* Partial Content */
  406. setoffset(out, r->start);
  407. break;
  408. case 301: /* Moved Permanently */
  409. case 302: /* Moved Temporarily (actually Found) */
  410. case 303: /* See Other */
  411. case 307: /* Temporary Redirect (HTTP/1.1) */
  412. redirect = 1;
  413. u->postbody = nil;
  414. break;
  415. case 304: /* Not Modified */
  416. break;
  417. case 400: /* Bad Request */
  418. sysfatal("Bad Request");
  419. case 401: /* Unauthorized */
  420. if (auth)
  421. sysfatal("Authentication failed");
  422. auth = 1;
  423. break;
  424. case 402: /* ??? */
  425. sysfatal("Unauthorized");
  426. case 403: /* Forbidden */
  427. sysfatal("Forbidden by server");
  428. case 404: /* Not Found */
  429. sysfatal("Not found on server");
  430. case 407: /* Proxy Authentication */
  431. sysfatal("Proxy authentication required");
  432. case 500: /* Internal server error */
  433. sysfatal("Server choked");
  434. case 501: /* Not implemented */
  435. sysfatal("Server can't do it!");
  436. case 502: /* Bad gateway */
  437. sysfatal("Bad gateway");
  438. case 503: /* Service unavailable */
  439. sysfatal("Service unavailable");
  440. default:
  441. sysfatal("Unknown response code %d", code);
  442. }
  443. if(u->redirect != nil){
  444. free(u->redirect);
  445. u->redirect = nil;
  446. }
  447. rv = httpheaders(fd, cfd, u, r);
  448. close(cfd);
  449. if(rv != 0){
  450. close(fd);
  451. return rv;
  452. }
  453. if(!redirect && !auth)
  454. break;
  455. if (redirect){
  456. if(u->redirect == nil)
  457. sysfatal("redirect: no URL");
  458. if(crackurl(u, u->redirect) < 0)
  459. sysfatal("redirect: %r");
  460. }
  461. }
  462. /* transfer whatever you get */
  463. if(ofile != nil && u->mtime != 0){
  464. note.fd = out->fd;
  465. note.mtime = u->mtime;
  466. notify(catch);
  467. }
  468. tot = 0;
  469. vtime = 0;
  470. for(;;){
  471. n = readibuf(fd, buf, sizeof(buf));
  472. if(n <= 0)
  473. break;
  474. if(output(out, buf, n) != n)
  475. break;
  476. tot += n;
  477. if(verbose && (vtime != time(0) || r->start == r->end)) {
  478. vtime = time(0);
  479. fprint(2, "%ld %ld\n", r->start+tot, r->end);
  480. }
  481. }
  482. notify(nil);
  483. close(fd);
  484. if(ofile != nil && u->mtime != 0){
  485. Dir d;
  486. rerrstr(err, sizeof err);
  487. nulldir(&d);
  488. d.mtime = u->mtime;
  489. if(dirfwstat(out->fd, &d) < 0)
  490. fprint(2, "couldn't set mtime: %r\n");
  491. errstr(err, sizeof err);
  492. }
  493. return tot;
  494. }
  495. /* get the http response code */
  496. int
  497. httprcode(int fd)
  498. {
  499. int n;
  500. char *p;
  501. char buf[256];
  502. n = readline(fd, buf, sizeof(buf)-1);
  503. if(n <= 0)
  504. return n;
  505. if(debug)
  506. fprint(2, "%d <- %s\n", fd, buf);
  507. p = strchr(buf, ' ');
  508. if(strncmp(buf, "HTTP/", 5) != 0 || p == nil){
  509. werrstr("bad response from server");
  510. return -1;
  511. }
  512. buf[n] = 0;
  513. return atoi(p+1);
  514. }
  515. /* read in and crack the http headers, update u and r */
  516. void hhetag(char*, URL*, Range*);
  517. void hhmtime(char*, URL*, Range*);
  518. void hhclen(char*, URL*, Range*);
  519. void hhcrange(char*, URL*, Range*);
  520. void hhuri(char*, URL*, Range*);
  521. void hhlocation(char*, URL*, Range*);
  522. void hhauth(char*, URL*, Range*);
  523. struct {
  524. char *name;
  525. void (*f)(char*, URL*, Range*);
  526. } headers[] = {
  527. { "etag:", hhetag },
  528. { "last-modified:", hhmtime },
  529. { "content-length:", hhclen },
  530. { "content-range:", hhcrange },
  531. { "uri:", hhuri },
  532. { "location:", hhlocation },
  533. { "WWW-Authenticate:", hhauth },
  534. };
  535. int
  536. httpheaders(int fd, int cfd, URL *u, Range *r)
  537. {
  538. char buf[2048];
  539. char *p;
  540. int i, n;
  541. for(;;){
  542. n = getheader(fd, buf, sizeof(buf));
  543. if(n <= 0)
  544. break;
  545. if(cfd >= 0)
  546. fprint(cfd, "%s\n", buf);
  547. for(i = 0; i < nelem(headers); i++){
  548. n = strlen(headers[i].name);
  549. if(cistrncmp(buf, headers[i].name, n) == 0){
  550. /* skip field name and leading white */
  551. p = buf + n;
  552. while(*p == ' ' || *p == '\t')
  553. p++;
  554. (*headers[i].f)(p, u, r);
  555. break;
  556. }
  557. }
  558. }
  559. return n;
  560. }
  561. /*
  562. * read a single mime header, collect continuations.
  563. *
  564. * this routine assumes that there is a blank line twixt
  565. * the header and the message body, otherwise bytes will
  566. * be lost.
  567. */
  568. int
  569. getheader(int fd, char *buf, int n)
  570. {
  571. char *p, *e;
  572. int i;
  573. n--;
  574. p = buf;
  575. for(e = p + n; ; p += i){
  576. i = readline(fd, p, e-p);
  577. if(i < 0)
  578. return i;
  579. if(p == buf){
  580. /* first line */
  581. if(strchr(buf, ':') == nil)
  582. break; /* end of headers */
  583. } else {
  584. /* continuation line */
  585. if(*p != ' ' && *p != '\t'){
  586. unreadline(p);
  587. *p = 0;
  588. break; /* end of this header */
  589. }
  590. }
  591. }
  592. if(headerprint)
  593. print("%s\n", buf);
  594. if(debug)
  595. fprint(2, "%d <- %s\n", fd, buf);
  596. return p-buf;
  597. }
  598. void
  599. hhetag(char *p, URL *u, Range *r)
  600. {
  601. if(u->etag != nil){
  602. if(strcmp(u->etag, p) != 0)
  603. sysfatal("file changed underfoot");
  604. } else
  605. u->etag = strdup(p);
  606. }
  607. char* monthchars = "janfebmaraprmayjunjulaugsepoctnovdec";
  608. void
  609. hhmtime(char *p, URL *u, Range *r)
  610. {
  611. char *month, *day, *yr, *hms;
  612. char *fields[6];
  613. Tm tm, now;
  614. int i;
  615. i = getfields(p, fields, 6, 1, " \t");
  616. if(i < 5)
  617. return;
  618. day = fields[1];
  619. month = fields[2];
  620. yr = fields[3];
  621. hms = fields[4];
  622. /* default time */
  623. now = *gmtime(time(0));
  624. tm = now;
  625. tm.yday = 0;
  626. /* convert ascii month to a number twixt 1 and 12 */
  627. if(*month >= '0' && *month <= '9'){
  628. tm.mon = atoi(month) - 1;
  629. if(tm.mon < 0 || tm.mon > 11)
  630. tm.mon = 5;
  631. } else {
  632. for(p = month; *p; p++)
  633. *p = tolower(*p);
  634. for(i = 0; i < 12; i++)
  635. if(strncmp(&monthchars[i*3], month, 3) == 0){
  636. tm.mon = i;
  637. break;
  638. }
  639. }
  640. tm.mday = atoi(day);
  641. if(hms) {
  642. tm.hour = strtoul(hms, &p, 10);
  643. if(*p == ':') {
  644. p++;
  645. tm.min = strtoul(p, &p, 10);
  646. if(*p == ':') {
  647. p++;
  648. tm.sec = strtoul(p, &p, 10);
  649. }
  650. }
  651. if(tolower(*p) == 'p')
  652. tm.hour += 12;
  653. }
  654. if(yr) {
  655. tm.year = atoi(yr);
  656. if(tm.year >= 1900)
  657. tm.year -= 1900;
  658. } else {
  659. if(tm.mon > now.mon || (tm.mon == now.mon && tm.mday > now.mday+1))
  660. tm.year--;
  661. }
  662. strcpy(tm.zone, "GMT");
  663. /* convert to epoch seconds */
  664. u->mtime = tm2sec(&tm);
  665. }
  666. void
  667. hhclen(char *p, URL *u, Range *r)
  668. {
  669. r->end = atoi(p);
  670. }
  671. void
  672. hhcrange(char *p, URL *u, Range *r)
  673. {
  674. char *x;
  675. int64_t l;
  676. l = 0;
  677. x = strchr(p, '/');
  678. if(x)
  679. l = atoll(x+1);
  680. if(l == 0) {
  681. x = strchr(p, '-');
  682. if(x)
  683. l = atoll(x+1);
  684. }
  685. if(l)
  686. r->end = l;
  687. }
  688. void
  689. hhuri(char *p, URL *u, Range *r)
  690. {
  691. if(*p != '<')
  692. return;
  693. u->redirect = strdup(p+1);
  694. p = strchr(u->redirect, '>');
  695. if(p != nil)
  696. *p = 0;
  697. }
  698. void
  699. hhlocation(char *p, URL *u, Range *r)
  700. {
  701. u->redirect = strdup(p);
  702. }
  703. void
  704. hhauth(char *p, URL *u, Range *r)
  705. {
  706. char *f[4];
  707. UserPasswd *up;
  708. char *s, cred[64];
  709. if (cistrncmp(p, "basic ", 6) != 0)
  710. sysfatal("only Basic authentication supported");
  711. if (gettokens(p, f, nelem(f), "\"") < 2)
  712. sysfatal("garbled auth data");
  713. if ((up = auth_getuserpasswd(auth_getkey, "proto=pass service=http server=%q realm=%q",
  714. u->host, f[1])) == nil)
  715. sysfatal("cannot authenticate");
  716. s = smprint("%s:%s", up->user, up->passwd);
  717. if(enc64(cred, sizeof(cred), (uint8_t *)s, strlen(s)) == -1)
  718. sysfatal("enc64");
  719. free(s);
  720. assert(u->cred = strdup(cred));
  721. }
  722. enum
  723. {
  724. /* ftp return codes */
  725. Extra= 1,
  726. Success= 2,
  727. Incomplete= 3,
  728. TempFail= 4,
  729. PermFail= 5,
  730. Nnetdir= 64, /* max length of network directory paths */
  731. Ndialstr= 64, /* max length of dial strings */
  732. };
  733. int ftpcmd(int, char*, ...);
  734. int ftprcode(int, char*, int);
  735. int hello(int);
  736. int logon(int);
  737. int xfertype(int, char*);
  738. int passive(int, URL*);
  739. int active(int, URL*);
  740. int ftpxfer(int, Out*, Range*);
  741. int terminateftp(int, int);
  742. int getaddrport(char*, uint8_t*, uint8_t*);
  743. int ftprestart(int, Out*, URL*, Range*, int32_t);
  744. int
  745. doftp(URL *u, URL *px, Range *r, Out *out, int32_t mtime)
  746. {
  747. int pid, ctl, data, rv;
  748. Waitmsg *w;
  749. char msg[64];
  750. char conndir[NETPATHLEN];
  751. char *p;
  752. /* untested, proxy doesn't work with ftp (I think) */
  753. if(px->host == nil){
  754. ctl = dial(netmkaddr(u->host, tcpdir, u->port), 0, conndir, 0);
  755. } else {
  756. ctl = dial(netmkaddr(px->host, tcpdir, px->port), 0, conndir, 0);
  757. }
  758. if(ctl < 0)
  759. return Error;
  760. if(net == nil){
  761. p = strrchr(conndir, '/');
  762. *p = 0;
  763. snprint(tcpdir, sizeof(tcpdir), conndir);
  764. }
  765. initibuf();
  766. rv = hello(ctl);
  767. if(rv < 0)
  768. return terminateftp(ctl, rv);
  769. rv = logon(ctl);
  770. if(rv < 0)
  771. return terminateftp(ctl, rv);
  772. rv = xfertype(ctl, "I");
  773. if(rv < 0)
  774. return terminateftp(ctl, rv);
  775. /* if file is up to date and the right size, stop */
  776. if(ftprestart(ctl, out, u, r, mtime) > 0){
  777. close(ctl);
  778. return Eof;
  779. }
  780. /* first try passive mode, then active */
  781. data = passive(ctl, u);
  782. if(data < 0){
  783. data = active(ctl, u);
  784. if(data < 0)
  785. return Error;
  786. }
  787. /* fork */
  788. switch(pid = rfork(RFPROC|RFFDG|RFMEM)){
  789. case -1:
  790. close(data);
  791. return terminateftp(ctl, Error);
  792. case 0:
  793. ftpxfer(data, out, r);
  794. close(data);
  795. _exits(0);
  796. default:
  797. close(data);
  798. break;
  799. }
  800. /* wait for reply message */
  801. rv = ftprcode(ctl, msg, sizeof(msg));
  802. close(ctl);
  803. /* wait for process to terminate */
  804. w = nil;
  805. for(;;){
  806. free(w);
  807. w = wait();
  808. if(w == nil)
  809. return Error;
  810. if(w->pid == pid){
  811. if(w->msg[0] == 0){
  812. free(w);
  813. break;
  814. }
  815. werrstr("xfer: %s", w->msg);
  816. free(w);
  817. return Error;
  818. }
  819. }
  820. switch(rv){
  821. case Success:
  822. return Eof;
  823. case TempFail:
  824. return Server;
  825. default:
  826. return Error;
  827. }
  828. }
  829. int
  830. ftpcmd(int ctl, char *fmt, ...)
  831. {
  832. va_list arg;
  833. char buf[2*1024], *s;
  834. va_start(arg, fmt);
  835. s = vseprint(buf, buf + (sizeof(buf)-4) / sizeof(*buf), fmt, arg);
  836. va_end(arg);
  837. if(debug)
  838. fprint(2, "%d -> %s\n", ctl, buf);
  839. *s++ = '\r';
  840. *s++ = '\n';
  841. if(write(ctl, buf, s - buf) != s - buf)
  842. return -1;
  843. return 0;
  844. }
  845. int
  846. ftprcode(int ctl, char *msg, int len)
  847. {
  848. int rv;
  849. int i;
  850. char *p;
  851. len--; /* room for terminating null */
  852. for(;;){
  853. *msg = 0;
  854. i = readline(ctl, msg, len);
  855. if(i < 0)
  856. break;
  857. if(debug)
  858. fprint(2, "%d <- %s\n", ctl, msg);
  859. /* stop if not a continuation */
  860. rv = strtol(msg, &p, 10);
  861. if(rv >= 100 && rv < 600 && p==msg+3 && *p == ' ')
  862. return rv/100;
  863. }
  864. *msg = 0;
  865. return -1;
  866. }
  867. int
  868. hello(int ctl)
  869. {
  870. char msg[1024];
  871. /* wait for hello from other side */
  872. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  873. werrstr("HELLO: %s", msg);
  874. return Server;
  875. }
  876. return 0;
  877. }
  878. int
  879. getdec(char *p, int n)
  880. {
  881. int x = 0;
  882. int i;
  883. for(i = 0; i < n; i++)
  884. x = x*10 + (*p++ - '0');
  885. return x;
  886. }
  887. int
  888. ftprestart(int ctl, Out *out, URL *u, Range *r, int32_t mtime)
  889. {
  890. Tm tm;
  891. char msg[1024];
  892. int32_t x, rmtime;
  893. ftpcmd(ctl, "MDTM %s", u->page);
  894. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  895. r->start = 0;
  896. return 0; /* need to do something */
  897. }
  898. /* decode modification time */
  899. if(strlen(msg) < 4 + 4 + 2 + 2 + 2 + 2 + 2){
  900. r->start = 0;
  901. return 0; /* need to do something */
  902. }
  903. memset(&tm, 0, sizeof(tm));
  904. tm.year = getdec(msg+4, 4) - 1900;
  905. tm.mon = getdec(msg+4+4, 2) - 1;
  906. tm.mday = getdec(msg+4+4+2, 2);
  907. tm.hour = getdec(msg+4+4+2+2, 2);
  908. tm.min = getdec(msg+4+4+2+2+2, 2);
  909. tm.sec = getdec(msg+4+4+2+2+2+2, 2);
  910. strcpy(tm.zone, "GMT");
  911. rmtime = tm2sec(&tm);
  912. if(rmtime > mtime)
  913. r->start = 0;
  914. /* get size */
  915. ftpcmd(ctl, "SIZE %s", u->page);
  916. if(ftprcode(ctl, msg, sizeof(msg)) == Success){
  917. x = atol(msg+4);
  918. if(r->start == x)
  919. return 1; /* we're up to date */
  920. r->end = x;
  921. }
  922. /* seek to restart point */
  923. if(r->start > 0){
  924. ftpcmd(ctl, "REST %lud", r->start);
  925. if(ftprcode(ctl, msg, sizeof(msg)) == Incomplete){
  926. setoffset(out, r->start);
  927. }else
  928. r->start = 0;
  929. }
  930. return 0; /* need to do something */
  931. }
  932. int
  933. logon(int ctl)
  934. {
  935. char msg[1024];
  936. /* login anonymous */
  937. ftpcmd(ctl, "USER anonymous");
  938. switch(ftprcode(ctl, msg, sizeof(msg))){
  939. case Success:
  940. return 0;
  941. case Incomplete:
  942. break; /* need password */
  943. default:
  944. werrstr("USER: %s", msg);
  945. return Server;
  946. }
  947. /* send user id as password */
  948. sprint(msg, "%s@closedmind.org", getuser());
  949. ftpcmd(ctl, "PASS %s", msg);
  950. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  951. werrstr("PASS: %s", msg);
  952. return Server;
  953. }
  954. return 0;
  955. }
  956. int
  957. xfertype(int ctl, char *t)
  958. {
  959. char msg[1024];
  960. ftpcmd(ctl, "TYPE %s", t);
  961. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  962. werrstr("TYPE %s: %s", t, msg);
  963. return Server;
  964. }
  965. return 0;
  966. }
  967. int
  968. passive(int ctl, URL *u)
  969. {
  970. char msg[1024];
  971. char ipaddr[32];
  972. char *f[6];
  973. char *p;
  974. int fd;
  975. int port;
  976. char aport[12];
  977. ftpcmd(ctl, "PASV");
  978. if(ftprcode(ctl, msg, sizeof(msg)) != Success)
  979. return Error;
  980. /* get address and port number from reply, this is AI */
  981. p = strchr(msg, '(');
  982. if(p == nil){
  983. for(p = msg+3; *p; p++)
  984. if(isdigit(*p))
  985. break;
  986. } else
  987. p++;
  988. if(getfields(p, f, 6, 0, ",)") < 6){
  989. werrstr("ftp protocol botch");
  990. return Server;
  991. }
  992. snprint(ipaddr, sizeof(ipaddr), "%s.%s.%s.%s",
  993. f[0], f[1], f[2], f[3]);
  994. port = ((atoi(f[4])&0xff)<<8) + (atoi(f[5])&0xff);
  995. sprint(aport, "%d", port);
  996. /* open data connection */
  997. fd = dial(netmkaddr(ipaddr, tcpdir, aport), 0, 0, 0);
  998. if(fd < 0){
  999. werrstr("passive mode failed: %r");
  1000. return Error;
  1001. }
  1002. /* tell remote to send a file */
  1003. ftpcmd(ctl, "RETR %s", u->page);
  1004. if(ftprcode(ctl, msg, sizeof(msg)) != Extra){
  1005. werrstr("RETR %s: %s", u->page, msg);
  1006. return Error;
  1007. }
  1008. return fd;
  1009. }
  1010. int
  1011. active(int ctl, URL *u)
  1012. {
  1013. char msg[1024];
  1014. char dir[40], ldir[40];
  1015. uint8_t ipaddr[4];
  1016. uint8_t port[2];
  1017. int lcfd, dfd, afd;
  1018. /* announce a port for the call back */
  1019. snprint(msg, sizeof(msg), "%s!*!0", tcpdir);
  1020. afd = announce(msg, dir);
  1021. if(afd < 0)
  1022. return Error;
  1023. /* get a local address/port of the annoucement */
  1024. if(getaddrport(dir, ipaddr, port) < 0){
  1025. close(afd);
  1026. return Error;
  1027. }
  1028. /* tell remote side address and port*/
  1029. ftpcmd(ctl, "PORT %d,%d,%d,%d,%d,%d", ipaddr[0], ipaddr[1], ipaddr[2],
  1030. ipaddr[3], port[0], port[1]);
  1031. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  1032. close(afd);
  1033. werrstr("active: %s", msg);
  1034. return Error;
  1035. }
  1036. /* tell remote to send a file */
  1037. ftpcmd(ctl, "RETR %s", u->page);
  1038. if(ftprcode(ctl, msg, sizeof(msg)) != Extra){
  1039. close(afd);
  1040. werrstr("RETR: %s", msg);
  1041. return Server;
  1042. }
  1043. /* wait for a connection */
  1044. lcfd = listen(dir, ldir);
  1045. if(lcfd < 0){
  1046. close(afd);
  1047. return Error;
  1048. }
  1049. dfd = accept(lcfd, ldir);
  1050. if(dfd < 0){
  1051. close(afd);
  1052. close(lcfd);
  1053. return Error;
  1054. }
  1055. close(afd);
  1056. close(lcfd);
  1057. return dfd;
  1058. }
  1059. int
  1060. ftpxfer(int in, Out *out, Range *r)
  1061. {
  1062. char buf[1024];
  1063. int32_t vtime;
  1064. int i, n;
  1065. vtime = 0;
  1066. for(n = 0;;n += i){
  1067. i = read(in, buf, sizeof(buf));
  1068. if(i == 0)
  1069. break;
  1070. if(i < 0)
  1071. return Error;
  1072. if(output(out, buf, i) != i)
  1073. return Error;
  1074. r->start += i;
  1075. if(verbose && (vtime != time(0) || r->start == r->end)) {
  1076. vtime = time(0);
  1077. fprint(2, "%ld %ld\n", r->start, r->end);
  1078. }
  1079. }
  1080. return n;
  1081. }
  1082. int
  1083. terminateftp(int ctl, int rv)
  1084. {
  1085. close(ctl);
  1086. return rv;
  1087. }
  1088. /*
  1089. * case insensitive strcmp (why aren't these in libc?)
  1090. */
  1091. int
  1092. cistrncmp(char *a, char *b, int n)
  1093. {
  1094. while(n-- > 0){
  1095. if(tolower(*a++) != tolower(*b++))
  1096. return -1;
  1097. }
  1098. return 0;
  1099. }
  1100. int
  1101. cistrcmp(char *a, char *b)
  1102. {
  1103. while(*a || *b)
  1104. if(tolower(*a++) != tolower(*b++))
  1105. return -1;
  1106. return 0;
  1107. }
  1108. /*
  1109. * buffered io
  1110. */
  1111. struct
  1112. {
  1113. char *rp;
  1114. char *wp;
  1115. char buf[4*1024];
  1116. } b;
  1117. void
  1118. initibuf(void)
  1119. {
  1120. b.rp = b.wp = b.buf;
  1121. }
  1122. /*
  1123. * read a possibly buffered line, strip off trailing while
  1124. */
  1125. int
  1126. readline(int fd, char *buf, int len)
  1127. {
  1128. int n;
  1129. char *p;
  1130. int eof = 0;
  1131. len--;
  1132. for(p = buf;;){
  1133. if(b.rp >= b.wp){
  1134. n = read(fd, b.wp, sizeof(b.buf)/2);
  1135. if(n < 0)
  1136. return -1;
  1137. if(n == 0){
  1138. eof = 1;
  1139. break;
  1140. }
  1141. b.wp += n;
  1142. }
  1143. n = *b.rp++;
  1144. if(len > 0){
  1145. *p++ = n;
  1146. len--;
  1147. }
  1148. if(n == '\n')
  1149. break;
  1150. }
  1151. /* drop trailing white */
  1152. for(;;){
  1153. if(p <= buf)
  1154. break;
  1155. n = *(p-1);
  1156. if(n != ' ' && n != '\t' && n != '\r' && n != '\n')
  1157. break;
  1158. p--;
  1159. }
  1160. *p = 0;
  1161. if(eof && p == buf)
  1162. return -1;
  1163. return p-buf;
  1164. }
  1165. void
  1166. unreadline(char *line)
  1167. {
  1168. int i, n;
  1169. i = strlen(line);
  1170. n = b.wp-b.rp;
  1171. memmove(&b.buf[i+1], b.rp, n);
  1172. memmove(b.buf, line, i);
  1173. b.buf[i] = '\n';
  1174. b.rp = b.buf;
  1175. b.wp = b.rp + i + 1 + n;
  1176. }
  1177. int
  1178. readibuf(int fd, char *buf, int len)
  1179. {
  1180. int n;
  1181. n = b.wp-b.rp;
  1182. if(n > 0){
  1183. if(n > len)
  1184. n = len;
  1185. memmove(buf, b.rp, n);
  1186. b.rp += n;
  1187. return n;
  1188. }
  1189. return read(fd, buf, len);
  1190. }
  1191. int
  1192. dfprint(int fd, char *fmt, ...)
  1193. {
  1194. char buf[4*1024];
  1195. va_list arg;
  1196. va_start(arg, fmt);
  1197. vseprint(buf, buf+sizeof(buf), fmt, arg);
  1198. va_end(arg);
  1199. if(debug)
  1200. fprint(2, "%d -> %s", fd, buf);
  1201. return fprint(fd, "%s", buf);
  1202. }
  1203. int
  1204. getaddrport(char *dir, uint8_t *ipaddr, uint8_t *port)
  1205. {
  1206. char buf[256];
  1207. int fd, i;
  1208. char *p;
  1209. snprint(buf, sizeof(buf), "%s/local", dir);
  1210. fd = open(buf, OREAD);
  1211. if(fd < 0)
  1212. return -1;
  1213. i = read(fd, buf, sizeof(buf)-1);
  1214. close(fd);
  1215. if(i <= 0)
  1216. return -1;
  1217. buf[i] = 0;
  1218. p = strchr(buf, '!');
  1219. if(p != nil)
  1220. *p++ = 0;
  1221. v4parseip(ipaddr, buf);
  1222. i = atoi(p);
  1223. port[0] = i>>8;
  1224. port[1] = i;
  1225. return 0;
  1226. }
  1227. void
  1228. md5free(DigestState *state)
  1229. {
  1230. uint8_t x[MD5dlen];
  1231. md5(nil, 0, x, state);
  1232. }
  1233. DigestState*
  1234. md5dup(DigestState *state)
  1235. {
  1236. char *p;
  1237. p = md5pickle(state);
  1238. if(p == nil)
  1239. sysfatal("md5pickle: %r");
  1240. state = md5unpickle(p);
  1241. if(state == nil)
  1242. sysfatal("md5unpickle: %r");
  1243. free(p);
  1244. return state;
  1245. }
  1246. void
  1247. setoffset(Out *out, int offset)
  1248. {
  1249. md5free(out->curr);
  1250. if(offset == 0)
  1251. out->curr = md5(nil, 0, nil, nil);
  1252. else
  1253. out->curr = nil;
  1254. out->offset = offset;
  1255. out->written = offset;
  1256. if(ofile != nil)
  1257. if(seek(out->fd, offset, 0) != offset)
  1258. sysfatal("seek: %r");
  1259. }
  1260. /*
  1261. * write some output, discarding it (but keeping track)
  1262. * if we've already written it. if we've gone backwards,
  1263. * verify that everything previously written matches
  1264. * that which would have been written from the current
  1265. * output.
  1266. */
  1267. int
  1268. output(Out *out, char *buf, int nb)
  1269. {
  1270. int n, d;
  1271. uint8_t m0[MD5dlen], m1[MD5dlen];
  1272. n = nb;
  1273. d = out->written - out->offset;
  1274. assert(d >= 0);
  1275. if(d > 0){
  1276. if(n < d){
  1277. if(out->curr != nil)
  1278. md5((uint8_t*)buf, n, nil, out->curr);
  1279. out->offset += n;
  1280. return n;
  1281. }
  1282. if(out->curr != nil){
  1283. md5((uint8_t*)buf, d, m0, out->curr);
  1284. out->curr = nil;
  1285. md5(nil, 0, m1, md5dup(out->hiwat));
  1286. if(memcmp(m0, m1, MD5dlen) != 0){
  1287. fprint(2, "integrity check failure at offset %d\n", out->written);
  1288. return -1;
  1289. }
  1290. }
  1291. buf += d;
  1292. n -= d;
  1293. out->offset += d;
  1294. }
  1295. if(n > 0){
  1296. out->hiwat = md5((uint8_t*)buf, n, nil, out->hiwat);
  1297. n = write(out->fd, buf, n);
  1298. if(n > 0){
  1299. out->offset += n;
  1300. out->written += n;
  1301. }
  1302. }
  1303. return n + d;
  1304. }