hget.c 26 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489
  1. /*
  2. * This file is part of the UCB release of Plan 9. It is subject to the license
  3. * terms in the LICENSE file found in the top-level directory of this
  4. * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No
  5. * part of the UCB release of Plan 9, including this file, may be copied,
  6. * modified, propagated, or distributed except according to the terms contained
  7. * in the LICENSE file.
  8. */
  9. #include <u.h>
  10. #include <libc.h>
  11. #include <ctype.h>
  12. #include <bio.h>
  13. #include <ip.h>
  14. #include <mp.h>
  15. #include <libsec.h>
  16. #include <auth.h>
  17. typedef struct URL URL;
  18. struct URL
  19. {
  20. int method;
  21. char *host;
  22. char *port;
  23. char *page;
  24. char *etag;
  25. char *redirect;
  26. char *postbody;
  27. char *cred;
  28. char *rhead;
  29. int32_t mtime;
  30. };
  31. typedef struct Range Range;
  32. struct Range
  33. {
  34. int32_t start; /* only 2 gig supported, tdb */
  35. int32_t end;
  36. };
  37. typedef struct Out Out;
  38. struct Out
  39. {
  40. int fd;
  41. int offset; /* notional current offset in output */
  42. int written; /* number of bytes successfully transferred to output */
  43. DigestState *curr; /* digest state up to offset (if known) */
  44. DigestState *hiwat; /* digest state of all bytes written */
  45. };
  46. enum
  47. {
  48. Other,
  49. Http,
  50. Https,
  51. Ftp,
  52. };
  53. enum
  54. {
  55. Eof = 0,
  56. Error = -1,
  57. Server = -2,
  58. Changed = -3,
  59. };
  60. int debug;
  61. char *ofile;
  62. int doftp(URL*, URL*, Range*, Out*, int32_t);
  63. int dohttp(URL*, URL*, Range*, Out*, int32_t);
  64. int crackurl(URL*, char*);
  65. Range* crackrange(char*);
  66. int getheader(int, char*, int);
  67. int httpheaders(int, int, URL*, Range*);
  68. int httprcode(int);
  69. int cistrncmp(char*, char*, int);
  70. int cistrcmp(char*, char*);
  71. void initibuf(void);
  72. int readline(int, char*, int);
  73. int readibuf(int, char*, int);
  74. int dfprint(int, char*, ...);
  75. void unreadline(char*);
  76. int output(Out*, char*, int);
  77. void setoffset(Out*, int);
  78. int verbose;
  79. char *net;
  80. char tcpdir[NETPATHLEN];
  81. int headerprint;
  82. struct {
  83. char *name;
  84. int (*f)(URL*, URL*, Range*, Out*, int32_t);
  85. } method[] = {
  86. [Http] = { "http", dohttp },
  87. [Https] = { "https", dohttp },
  88. [Ftp] = { "ftp", doftp },
  89. [Other] = { "_______", nil },
  90. };
  91. void
  92. usage(void)
  93. {
  94. fprint(2, "usage: %s [-dhv] [-o outfile] [-p body] [-x netmtpt] [-r header] url\n", argv0);
  95. exits("usage");
  96. }
  97. void
  98. main(int argc, char **argv)
  99. {
  100. URL u;
  101. Range r;
  102. int errs, n;
  103. uint32_t mtime;
  104. Dir *d;
  105. char postbody[4096], *p, *e, *t, *hpx;
  106. URL px; // Proxy
  107. Out out;
  108. ofile = nil;
  109. p = postbody;
  110. e = p + sizeof(postbody);
  111. r.start = 0;
  112. r.end = -1;
  113. mtime = 0;
  114. memset(&u, 0, sizeof(u));
  115. memset(&px, 0, sizeof(px));
  116. hpx = getenv("httpproxy");
  117. ARGBEGIN {
  118. case 'o':
  119. ofile = EARGF(usage());
  120. break;
  121. case 'd':
  122. debug = 1;
  123. break;
  124. case 'h':
  125. headerprint = 1;
  126. break;
  127. case 'v':
  128. verbose = 1;
  129. break;
  130. case 'x':
  131. net = EARGF(usage());
  132. break;
  133. case 'r':
  134. u.rhead = EARGF(usage());
  135. break;
  136. case 'p':
  137. t = EARGF(usage());
  138. if(p != postbody)
  139. p = seprint(p, e, "&%s", t);
  140. else
  141. p = seprint(p, e, "%s", t);
  142. u.postbody = postbody;
  143. break;
  144. default:
  145. usage();
  146. } ARGEND;
  147. if(net != nil){
  148. if(strlen(net) > sizeof(tcpdir)-5)
  149. sysfatal("network mount point too int32_t");
  150. snprint(tcpdir, sizeof(tcpdir), "%s/tcp", net);
  151. } else
  152. snprint(tcpdir, sizeof(tcpdir), "tcp");
  153. if(argc != 1)
  154. usage();
  155. out.fd = 1;
  156. out.written = 0;
  157. out.offset = 0;
  158. out.curr = nil;
  159. out.hiwat = nil;
  160. if(ofile != nil){
  161. d = dirstat(ofile);
  162. if(d == nil){
  163. out.fd = create(ofile, OWRITE, 0664);
  164. if(out.fd < 0)
  165. sysfatal("creating %s: %r", ofile);
  166. } else {
  167. out.fd = open(ofile, OWRITE);
  168. if(out.fd < 0)
  169. sysfatal("can't open %s: %r", ofile);
  170. r.start = d->length;
  171. mtime = d->mtime;
  172. free(d);
  173. }
  174. }
  175. errs = 0;
  176. if(crackurl(&u, argv[0]) < 0)
  177. sysfatal("%r");
  178. if(hpx && crackurl(&px, hpx) < 0)
  179. sysfatal("%r");
  180. for(;;){
  181. setoffset(&out, 0);
  182. /* transfer data */
  183. werrstr("");
  184. n = (*method[u.method].f)(&u, &px, &r, &out, mtime);
  185. switch(n){
  186. case Eof:
  187. exits(0);
  188. break;
  189. case Error:
  190. if(errs++ < 10)
  191. continue;
  192. sysfatal("too many errors with no progress %r");
  193. break;
  194. case Server:
  195. sysfatal("server returned: %r");
  196. break;
  197. }
  198. /* forward progress */
  199. errs = 0;
  200. r.start += n;
  201. if(r.start >= r.end)
  202. break;
  203. }
  204. exits(0);
  205. }
  206. int
  207. crackurl(URL *u, char *s)
  208. {
  209. char *p;
  210. int i;
  211. if(u->page != nil){
  212. free(u->page);
  213. u->page = nil;
  214. }
  215. /* get type */
  216. for(p = s; *p; p++){
  217. if(*p == '/'){
  218. p = s;
  219. if(u->method == Other){
  220. werrstr("missing method");
  221. return -1;
  222. }
  223. if(u->host == nil){
  224. werrstr("missing host");
  225. return -1;
  226. }
  227. u->page = strdup(p);
  228. return 0;
  229. }
  230. if(*p == ':' && *(p+1)=='/' && *(p+2)=='/'){
  231. *p = 0;
  232. p += 3;
  233. for(i = 0; i < nelem(method); i++){
  234. if(cistrcmp(s, method[i].name) == 0){
  235. u->method = i;
  236. break;
  237. }
  238. }
  239. break;
  240. }
  241. }
  242. if(u->method == Other){
  243. werrstr("unsupported URL type %s", s);
  244. return -1;
  245. }
  246. /* get system */
  247. free(u->host);
  248. s = p;
  249. p = strchr(s, '/');
  250. if(p == nil){
  251. u->host = strdup(s);
  252. u->page = strdup("/");
  253. } else {
  254. u->page = strdup(p);
  255. *p = 0;
  256. u->host = strdup(s);
  257. *p = '/';
  258. }
  259. if((p = strchr(u->host, ':')) != nil){
  260. *p++ = 0;
  261. u->port = p;
  262. } else
  263. u->port = method[u->method].name;
  264. if(*(u->host) == 0){
  265. werrstr("bad url, null host");
  266. return -1;
  267. }
  268. return 0;
  269. }
  270. char *day[] = {
  271. "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat"
  272. };
  273. char *month[] = {
  274. "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
  275. };
  276. struct
  277. {
  278. int fd;
  279. int32_t mtime;
  280. } note;
  281. void
  282. catch(void *v, char *c)
  283. {
  284. Dir d;
  285. nulldir(&d);
  286. d.mtime = note.mtime;
  287. if(dirfwstat(note.fd, &d) < 0)
  288. sysfatal("catch: can't dirfwstat: %r");
  289. noted(NDFLT);
  290. }
  291. int
  292. dohttp(URL *u, URL *px, Range *r, Out *out, int32_t mtime)
  293. {
  294. int fd, cfd;
  295. int redirect, auth, loop;
  296. int n, rv, code;
  297. int32_t tot, vtime;
  298. Tm *tm;
  299. char buf[1024];
  300. char err[ERRMAX];
  301. /* always move back to a previous 512 byte bound because some
  302. * servers can't seem to deal with requests that start at the
  303. * end of the file
  304. */
  305. if(r->start)
  306. r->start = ((r->start-1)/512)*512;
  307. /* loop for redirects, requires reading both response code and headers */
  308. fd = -1;
  309. for(loop = 0; loop < 32; loop++){
  310. if(px->host == nil){
  311. fd = dial(netmkaddr(u->host, tcpdir, u->port), 0, 0, 0);
  312. } else {
  313. fd = dial(netmkaddr(px->host, tcpdir, px->port), 0, 0, 0);
  314. }
  315. if(fd < 0)
  316. return Error;
  317. if(u->method == Https){
  318. int tfd;
  319. TLSconn conn;
  320. memset(&conn, 0, sizeof conn);
  321. tfd = tlsClient(fd, &conn);
  322. if(tfd < 0){
  323. fprint(2, "tlsClient: %r\n");
  324. close(fd);
  325. return Error;
  326. }
  327. /* BUG: check cert here? */
  328. if(conn.cert)
  329. free(conn.cert);
  330. close(fd);
  331. fd = tfd;
  332. }
  333. /* write request, use range if not start of file */
  334. if(u->postbody == nil){
  335. if(px->host == nil){
  336. dfprint(fd, "GET %s HTTP/1.0\r\n"
  337. "Host: %s\r\n"
  338. "User-agent: Plan9/hget\r\n"
  339. "Cache-Control: no-cache\r\n"
  340. "Pragma: no-cache\r\n",
  341. u->page, u->host);
  342. } else {
  343. dfprint(fd, "GET http://%s%s HTTP/1.0\r\n"
  344. "Host: %s\r\n"
  345. "User-agent: Plan9/hget\r\n"
  346. "Cache-Control: no-cache\r\n"
  347. "Pragma: no-cache\r\n",
  348. u->host, u->page, u->host);
  349. }
  350. } else {
  351. dfprint(fd, "POST %s HTTP/1.0\r\n"
  352. "Host: %s\r\n"
  353. "Content-type: application/x-www-form-urlencoded\r\n"
  354. "Content-length: %d\r\n"
  355. "User-agent: Plan9/hget\r\n",
  356. u->page, u->host, strlen(u->postbody));
  357. }
  358. if(u->cred)
  359. dfprint(fd, "Authorization: Basic %s\r\n", u->cred);
  360. if(u->rhead)
  361. dfprint(fd, "%s\r\n", u->rhead);
  362. if(r->start != 0){
  363. dfprint(fd, "Range: bytes=%d-\n", r->start);
  364. if(u->etag != nil){
  365. dfprint(fd, "If-range: %s\n", u->etag);
  366. } else {
  367. tm = gmtime(mtime);
  368. dfprint(fd, "If-range: %s, %d %s %d %2d:%2.2d:%2.2d GMT\n",
  369. day[tm->wday], tm->mday, month[tm->mon],
  370. tm->year+1900, tm->hour, tm->min, tm->sec);
  371. }
  372. }
  373. if((cfd = open("/mnt/webcookies/http", ORDWR)) >= 0){
  374. if(fprint(cfd, "http://%s%s", u->host, u->page) > 0){
  375. while((n = read(cfd, buf, sizeof buf)) > 0){
  376. if(debug)
  377. write(2, buf, n);
  378. write(fd, buf, n);
  379. }
  380. }else{
  381. close(cfd);
  382. cfd = -1;
  383. }
  384. }
  385. dfprint(fd, "\r\n", u->host);
  386. if(u->postbody)
  387. dfprint(fd, "%s", u->postbody);
  388. auth = 0;
  389. redirect = 0;
  390. initibuf();
  391. code = httprcode(fd);
  392. switch(code){
  393. case Error: /* connection timed out */
  394. case Eof:
  395. close(fd);
  396. close(cfd);
  397. return code;
  398. case 200: /* OK */
  399. case 201: /* Created */
  400. case 202: /* Accepted */
  401. if(ofile == nil && r->start != 0)
  402. sysfatal("page changed underfoot");
  403. break;
  404. case 204: /* No Content */
  405. sysfatal("No Content");
  406. case 206: /* Partial Content */
  407. setoffset(out, r->start);
  408. break;
  409. case 301: /* Moved Permanently */
  410. case 302: /* Moved Temporarily (actually Found) */
  411. case 303: /* See Other */
  412. case 307: /* Temporary Redirect (HTTP/1.1) */
  413. redirect = 1;
  414. u->postbody = nil;
  415. break;
  416. case 304: /* Not Modified */
  417. break;
  418. case 400: /* Bad Request */
  419. sysfatal("Bad Request");
  420. case 401: /* Unauthorized */
  421. if (auth)
  422. sysfatal("Authentication failed");
  423. auth = 1;
  424. break;
  425. case 402: /* ??? */
  426. sysfatal("Unauthorized");
  427. case 403: /* Forbidden */
  428. sysfatal("Forbidden by server");
  429. case 404: /* Not Found */
  430. sysfatal("Not found on server");
  431. case 407: /* Proxy Authentication */
  432. sysfatal("Proxy authentication required");
  433. case 500: /* Internal server error */
  434. sysfatal("Server choked");
  435. case 501: /* Not implemented */
  436. sysfatal("Server can't do it!");
  437. case 502: /* Bad gateway */
  438. sysfatal("Bad gateway");
  439. case 503: /* Service unavailable */
  440. sysfatal("Service unavailable");
  441. default:
  442. sysfatal("Unknown response code %d", code);
  443. }
  444. if(u->redirect != nil){
  445. free(u->redirect);
  446. u->redirect = nil;
  447. }
  448. rv = httpheaders(fd, cfd, u, r);
  449. close(cfd);
  450. if(rv != 0){
  451. close(fd);
  452. return rv;
  453. }
  454. if(!redirect && !auth)
  455. break;
  456. if (redirect){
  457. if(u->redirect == nil)
  458. sysfatal("redirect: no URL");
  459. if(crackurl(u, u->redirect) < 0)
  460. sysfatal("redirect: %r");
  461. }
  462. }
  463. /* transfer whatever you get */
  464. if(ofile != nil && u->mtime != 0){
  465. note.fd = out->fd;
  466. note.mtime = u->mtime;
  467. notify(catch);
  468. }
  469. tot = 0;
  470. vtime = 0;
  471. for(;;){
  472. n = readibuf(fd, buf, sizeof(buf));
  473. if(n <= 0)
  474. break;
  475. if(output(out, buf, n) != n)
  476. break;
  477. tot += n;
  478. if(verbose && (vtime != time(0) || r->start == r->end)) {
  479. vtime = time(0);
  480. fprint(2, "%ld %ld\n", r->start+tot, r->end);
  481. }
  482. }
  483. notify(nil);
  484. close(fd);
  485. if(ofile != nil && u->mtime != 0){
  486. Dir d;
  487. rerrstr(err, sizeof err);
  488. nulldir(&d);
  489. d.mtime = u->mtime;
  490. if(dirfwstat(out->fd, &d) < 0)
  491. fprint(2, "couldn't set mtime: %r\n");
  492. errstr(err, sizeof err);
  493. }
  494. return tot;
  495. }
  496. /* get the http response code */
  497. int
  498. httprcode(int fd)
  499. {
  500. int n;
  501. char *p;
  502. char buf[256];
  503. n = readline(fd, buf, sizeof(buf)-1);
  504. if(n <= 0)
  505. return n;
  506. if(debug)
  507. fprint(2, "%d <- %s\n", fd, buf);
  508. p = strchr(buf, ' ');
  509. if(strncmp(buf, "HTTP/", 5) != 0 || p == nil){
  510. werrstr("bad response from server");
  511. return -1;
  512. }
  513. buf[n] = 0;
  514. return atoi(p+1);
  515. }
  516. /* read in and crack the http headers, update u and r */
  517. void hhetag(char*, URL*, Range*);
  518. void hhmtime(char*, URL*, Range*);
  519. void hhclen(char*, URL*, Range*);
  520. void hhcrange(char*, URL*, Range*);
  521. void hhuri(char*, URL*, Range*);
  522. void hhlocation(char*, URL*, Range*);
  523. void hhauth(char*, URL*, Range*);
  524. struct {
  525. char *name;
  526. void (*f)(char*, URL*, Range*);
  527. } headers[] = {
  528. { "etag:", hhetag },
  529. { "last-modified:", hhmtime },
  530. { "content-length:", hhclen },
  531. { "content-range:", hhcrange },
  532. { "uri:", hhuri },
  533. { "location:", hhlocation },
  534. { "WWW-Authenticate:", hhauth },
  535. };
  536. int
  537. httpheaders(int fd, int cfd, URL *u, Range *r)
  538. {
  539. char buf[2048];
  540. char *p;
  541. int i, n;
  542. for(;;){
  543. n = getheader(fd, buf, sizeof(buf));
  544. if(n <= 0)
  545. break;
  546. if(cfd >= 0)
  547. fprint(cfd, "%s\n", buf);
  548. for(i = 0; i < nelem(headers); i++){
  549. n = strlen(headers[i].name);
  550. if(cistrncmp(buf, headers[i].name, n) == 0){
  551. /* skip field name and leading white */
  552. p = buf + n;
  553. while(*p == ' ' || *p == '\t')
  554. p++;
  555. (*headers[i].f)(p, u, r);
  556. break;
  557. }
  558. }
  559. }
  560. return n;
  561. }
  562. /*
  563. * read a single mime header, collect continuations.
  564. *
  565. * this routine assumes that there is a blank line twixt
  566. * the header and the message body, otherwise bytes will
  567. * be lost.
  568. */
  569. int
  570. getheader(int fd, char *buf, int n)
  571. {
  572. char *p, *e;
  573. int i;
  574. n--;
  575. p = buf;
  576. for(e = p + n; ; p += i){
  577. i = readline(fd, p, e-p);
  578. if(i < 0)
  579. return i;
  580. if(p == buf){
  581. /* first line */
  582. if(strchr(buf, ':') == nil)
  583. break; /* end of headers */
  584. } else {
  585. /* continuation line */
  586. if(*p != ' ' && *p != '\t'){
  587. unreadline(p);
  588. *p = 0;
  589. break; /* end of this header */
  590. }
  591. }
  592. }
  593. if(headerprint)
  594. print("%s\n", buf);
  595. if(debug)
  596. fprint(2, "%d <- %s\n", fd, buf);
  597. return p-buf;
  598. }
  599. void
  600. hhetag(char *p, URL *u, Range *r)
  601. {
  602. if(u->etag != nil){
  603. if(strcmp(u->etag, p) != 0)
  604. sysfatal("file changed underfoot");
  605. } else
  606. u->etag = strdup(p);
  607. }
  608. char* monthchars = "janfebmaraprmayjunjulaugsepoctnovdec";
  609. void
  610. hhmtime(char *p, URL *u, Range *r)
  611. {
  612. char *month, *day, *yr, *hms;
  613. char *fields[6];
  614. Tm tm, now;
  615. int i;
  616. i = getfields(p, fields, 6, 1, " \t");
  617. if(i < 5)
  618. return;
  619. day = fields[1];
  620. month = fields[2];
  621. yr = fields[3];
  622. hms = fields[4];
  623. /* default time */
  624. now = *gmtime(time(0));
  625. tm = now;
  626. tm.yday = 0;
  627. /* convert ascii month to a number twixt 1 and 12 */
  628. if(*month >= '0' && *month <= '9'){
  629. tm.mon = atoi(month) - 1;
  630. if(tm.mon < 0 || tm.mon > 11)
  631. tm.mon = 5;
  632. } else {
  633. for(p = month; *p; p++)
  634. *p = tolower(*p);
  635. for(i = 0; i < 12; i++)
  636. if(strncmp(&monthchars[i*3], month, 3) == 0){
  637. tm.mon = i;
  638. break;
  639. }
  640. }
  641. tm.mday = atoi(day);
  642. if(hms) {
  643. tm.hour = strtoul(hms, &p, 10);
  644. if(*p == ':') {
  645. p++;
  646. tm.min = strtoul(p, &p, 10);
  647. if(*p == ':') {
  648. p++;
  649. tm.sec = strtoul(p, &p, 10);
  650. }
  651. }
  652. if(tolower(*p) == 'p')
  653. tm.hour += 12;
  654. }
  655. if(yr) {
  656. tm.year = atoi(yr);
  657. if(tm.year >= 1900)
  658. tm.year -= 1900;
  659. } else {
  660. if(tm.mon > now.mon || (tm.mon == now.mon && tm.mday > now.mday+1))
  661. tm.year--;
  662. }
  663. strcpy(tm.zone, "GMT");
  664. /* convert to epoch seconds */
  665. u->mtime = tm2sec(&tm);
  666. }
  667. void
  668. hhclen(char *p, URL *u, Range *r)
  669. {
  670. r->end = atoi(p);
  671. }
  672. void
  673. hhcrange(char *p, URL *u, Range *r)
  674. {
  675. char *x;
  676. int64_t l;
  677. l = 0;
  678. x = strchr(p, '/');
  679. if(x)
  680. l = atoll(x+1);
  681. if(l == 0) {
  682. x = strchr(p, '-');
  683. if(x)
  684. l = atoll(x+1);
  685. }
  686. if(l)
  687. r->end = l;
  688. }
  689. void
  690. hhuri(char *p, URL *u, Range *r)
  691. {
  692. if(*p != '<')
  693. return;
  694. u->redirect = strdup(p+1);
  695. p = strchr(u->redirect, '>');
  696. if(p != nil)
  697. *p = 0;
  698. }
  699. void
  700. hhlocation(char *p, URL *u, Range *r)
  701. {
  702. u->redirect = strdup(p);
  703. }
  704. void
  705. hhauth(char *p, URL *u, Range *r)
  706. {
  707. char *f[4];
  708. UserPasswd *up;
  709. char *s, cred[64];
  710. if (cistrncmp(p, "basic ", 6) != 0)
  711. sysfatal("only Basic authentication supported");
  712. if (gettokens(p, f, nelem(f), "\"") < 2)
  713. sysfatal("garbled auth data");
  714. if ((up = auth_getuserpasswd(auth_getkey, "proto=pass service=http server=%q realm=%q",
  715. u->host, f[1])) == nil)
  716. sysfatal("cannot authenticate");
  717. s = smprint("%s:%s", up->user, up->passwd);
  718. if(enc64(cred, sizeof(cred), (uint8_t *)s, strlen(s)) == -1)
  719. sysfatal("enc64");
  720. free(s);
  721. assert(u->cred = strdup(cred));
  722. }
  723. enum
  724. {
  725. /* ftp return codes */
  726. Extra= 1,
  727. Success= 2,
  728. Incomplete= 3,
  729. TempFail= 4,
  730. PermFail= 5,
  731. Nnetdir= 64, /* max length of network directory paths */
  732. Ndialstr= 64, /* max length of dial strings */
  733. };
  734. int ftpcmd(int, char*, ...);
  735. int ftprcode(int, char*, int);
  736. int hello(int);
  737. int logon(int);
  738. int xfertype(int, char*);
  739. int passive(int, URL*);
  740. int active(int, URL*);
  741. int ftpxfer(int, Out*, Range*);
  742. int terminateftp(int, int);
  743. int getaddrport(char*, uint8_t*, uint8_t*);
  744. int ftprestart(int, Out*, URL*, Range*, int32_t);
  745. int
  746. doftp(URL *u, URL *px, Range *r, Out *out, int32_t mtime)
  747. {
  748. int pid, ctl, data, rv;
  749. Waitmsg *w;
  750. char msg[64];
  751. char conndir[NETPATHLEN];
  752. char *p;
  753. /* untested, proxy doesn't work with ftp (I think) */
  754. if(px->host == nil){
  755. ctl = dial(netmkaddr(u->host, tcpdir, u->port), 0, conndir, 0);
  756. } else {
  757. ctl = dial(netmkaddr(px->host, tcpdir, px->port), 0, conndir, 0);
  758. }
  759. if(ctl < 0)
  760. return Error;
  761. if(net == nil){
  762. p = strrchr(conndir, '/');
  763. *p = 0;
  764. snprint(tcpdir, sizeof(tcpdir), conndir);
  765. }
  766. initibuf();
  767. rv = hello(ctl);
  768. if(rv < 0)
  769. return terminateftp(ctl, rv);
  770. rv = logon(ctl);
  771. if(rv < 0)
  772. return terminateftp(ctl, rv);
  773. rv = xfertype(ctl, "I");
  774. if(rv < 0)
  775. return terminateftp(ctl, rv);
  776. /* if file is up to date and the right size, stop */
  777. if(ftprestart(ctl, out, u, r, mtime) > 0){
  778. close(ctl);
  779. return Eof;
  780. }
  781. /* first try passive mode, then active */
  782. data = passive(ctl, u);
  783. if(data < 0){
  784. data = active(ctl, u);
  785. if(data < 0)
  786. return Error;
  787. }
  788. /* fork */
  789. switch(pid = rfork(RFPROC|RFFDG|RFMEM)){
  790. case -1:
  791. close(data);
  792. return terminateftp(ctl, Error);
  793. case 0:
  794. ftpxfer(data, out, r);
  795. close(data);
  796. _exits(0);
  797. default:
  798. close(data);
  799. break;
  800. }
  801. /* wait for reply message */
  802. rv = ftprcode(ctl, msg, sizeof(msg));
  803. close(ctl);
  804. /* wait for process to terminate */
  805. w = nil;
  806. for(;;){
  807. free(w);
  808. w = wait();
  809. if(w == nil)
  810. return Error;
  811. if(w->pid == pid){
  812. if(w->msg[0] == 0){
  813. free(w);
  814. break;
  815. }
  816. werrstr("xfer: %s", w->msg);
  817. free(w);
  818. return Error;
  819. }
  820. }
  821. switch(rv){
  822. case Success:
  823. return Eof;
  824. case TempFail:
  825. return Server;
  826. default:
  827. return Error;
  828. }
  829. }
  830. int
  831. ftpcmd(int ctl, char *fmt, ...)
  832. {
  833. va_list arg;
  834. char buf[2*1024], *s;
  835. va_start(arg, fmt);
  836. s = vseprint(buf, buf + (sizeof(buf)-4) / sizeof(*buf), fmt, arg);
  837. va_end(arg);
  838. if(debug)
  839. fprint(2, "%d -> %s\n", ctl, buf);
  840. *s++ = '\r';
  841. *s++ = '\n';
  842. if(write(ctl, buf, s - buf) != s - buf)
  843. return -1;
  844. return 0;
  845. }
  846. int
  847. ftprcode(int ctl, char *msg, int len)
  848. {
  849. int rv;
  850. int i;
  851. char *p;
  852. len--; /* room for terminating null */
  853. for(;;){
  854. *msg = 0;
  855. i = readline(ctl, msg, len);
  856. if(i < 0)
  857. break;
  858. if(debug)
  859. fprint(2, "%d <- %s\n", ctl, msg);
  860. /* stop if not a continuation */
  861. rv = strtol(msg, &p, 10);
  862. if(rv >= 100 && rv < 600 && p==msg+3 && *p == ' ')
  863. return rv/100;
  864. }
  865. *msg = 0;
  866. return -1;
  867. }
  868. int
  869. hello(int ctl)
  870. {
  871. char msg[1024];
  872. /* wait for hello from other side */
  873. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  874. werrstr("HELLO: %s", msg);
  875. return Server;
  876. }
  877. return 0;
  878. }
  879. int
  880. getdec(char *p, int n)
  881. {
  882. int x = 0;
  883. int i;
  884. for(i = 0; i < n; i++)
  885. x = x*10 + (*p++ - '0');
  886. return x;
  887. }
  888. int
  889. ftprestart(int ctl, Out *out, URL *u, Range *r, int32_t mtime)
  890. {
  891. Tm tm;
  892. char msg[1024];
  893. int32_t x, rmtime;
  894. ftpcmd(ctl, "MDTM %s", u->page);
  895. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  896. r->start = 0;
  897. return 0; /* need to do something */
  898. }
  899. /* decode modification time */
  900. if(strlen(msg) < 4 + 4 + 2 + 2 + 2 + 2 + 2){
  901. r->start = 0;
  902. return 0; /* need to do something */
  903. }
  904. memset(&tm, 0, sizeof(tm));
  905. tm.year = getdec(msg+4, 4) - 1900;
  906. tm.mon = getdec(msg+4+4, 2) - 1;
  907. tm.mday = getdec(msg+4+4+2, 2);
  908. tm.hour = getdec(msg+4+4+2+2, 2);
  909. tm.min = getdec(msg+4+4+2+2+2, 2);
  910. tm.sec = getdec(msg+4+4+2+2+2+2, 2);
  911. strcpy(tm.zone, "GMT");
  912. rmtime = tm2sec(&tm);
  913. if(rmtime > mtime)
  914. r->start = 0;
  915. /* get size */
  916. ftpcmd(ctl, "SIZE %s", u->page);
  917. if(ftprcode(ctl, msg, sizeof(msg)) == Success){
  918. x = atol(msg+4);
  919. if(r->start == x)
  920. return 1; /* we're up to date */
  921. r->end = x;
  922. }
  923. /* seek to restart point */
  924. if(r->start > 0){
  925. ftpcmd(ctl, "REST %lu", r->start);
  926. if(ftprcode(ctl, msg, sizeof(msg)) == Incomplete){
  927. setoffset(out, r->start);
  928. }else
  929. r->start = 0;
  930. }
  931. return 0; /* need to do something */
  932. }
  933. int
  934. logon(int ctl)
  935. {
  936. char msg[1024];
  937. /* login anonymous */
  938. ftpcmd(ctl, "USER anonymous");
  939. switch(ftprcode(ctl, msg, sizeof(msg))){
  940. case Success:
  941. return 0;
  942. case Incomplete:
  943. break; /* need password */
  944. default:
  945. werrstr("USER: %s", msg);
  946. return Server;
  947. }
  948. /* send user id as password */
  949. sprint(msg, "%s@closedmind.org", getuser());
  950. ftpcmd(ctl, "PASS %s", msg);
  951. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  952. werrstr("PASS: %s", msg);
  953. return Server;
  954. }
  955. return 0;
  956. }
  957. int
  958. xfertype(int ctl, char *t)
  959. {
  960. char msg[1024];
  961. ftpcmd(ctl, "TYPE %s", t);
  962. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  963. werrstr("TYPE %s: %s", t, msg);
  964. return Server;
  965. }
  966. return 0;
  967. }
  968. int
  969. passive(int ctl, URL *u)
  970. {
  971. char msg[1024];
  972. char ipaddr[32];
  973. char *f[6];
  974. char *p;
  975. int fd;
  976. int port;
  977. char aport[12];
  978. ftpcmd(ctl, "PASV");
  979. if(ftprcode(ctl, msg, sizeof(msg)) != Success)
  980. return Error;
  981. /* get address and port number from reply, this is AI */
  982. p = strchr(msg, '(');
  983. if(p == nil){
  984. for(p = msg+3; *p; p++)
  985. if(isdigit(*p))
  986. break;
  987. } else
  988. p++;
  989. if(getfields(p, f, 6, 0, ",)") < 6){
  990. werrstr("ftp protocol botch");
  991. return Server;
  992. }
  993. snprint(ipaddr, sizeof(ipaddr), "%s.%s.%s.%s",
  994. f[0], f[1], f[2], f[3]);
  995. port = ((atoi(f[4])&0xff)<<8) + (atoi(f[5])&0xff);
  996. sprint(aport, "%d", port);
  997. /* open data connection */
  998. fd = dial(netmkaddr(ipaddr, tcpdir, aport), 0, 0, 0);
  999. if(fd < 0){
  1000. werrstr("passive mode failed: %r");
  1001. return Error;
  1002. }
  1003. /* tell remote to send a file */
  1004. ftpcmd(ctl, "RETR %s", u->page);
  1005. if(ftprcode(ctl, msg, sizeof(msg)) != Extra){
  1006. werrstr("RETR %s: %s", u->page, msg);
  1007. return Error;
  1008. }
  1009. return fd;
  1010. }
  1011. int
  1012. active(int ctl, URL *u)
  1013. {
  1014. char msg[1024];
  1015. char dir[40], ldir[40];
  1016. uint8_t ipaddr[4];
  1017. uint8_t port[2];
  1018. int lcfd, dfd, afd;
  1019. /* announce a port for the call back */
  1020. snprint(msg, sizeof(msg), "%s!*!0", tcpdir);
  1021. afd = announce(msg, dir);
  1022. if(afd < 0)
  1023. return Error;
  1024. /* get a local address/port of the annoucement */
  1025. if(getaddrport(dir, ipaddr, port) < 0){
  1026. close(afd);
  1027. return Error;
  1028. }
  1029. /* tell remote side address and port*/
  1030. ftpcmd(ctl, "PORT %d,%d,%d,%d,%d,%d", ipaddr[0], ipaddr[1], ipaddr[2],
  1031. ipaddr[3], port[0], port[1]);
  1032. if(ftprcode(ctl, msg, sizeof(msg)) != Success){
  1033. close(afd);
  1034. werrstr("active: %s", msg);
  1035. return Error;
  1036. }
  1037. /* tell remote to send a file */
  1038. ftpcmd(ctl, "RETR %s", u->page);
  1039. if(ftprcode(ctl, msg, sizeof(msg)) != Extra){
  1040. close(afd);
  1041. werrstr("RETR: %s", msg);
  1042. return Server;
  1043. }
  1044. /* wait for a connection */
  1045. lcfd = listen(dir, ldir);
  1046. if(lcfd < 0){
  1047. close(afd);
  1048. return Error;
  1049. }
  1050. dfd = accept(lcfd, ldir);
  1051. if(dfd < 0){
  1052. close(afd);
  1053. close(lcfd);
  1054. return Error;
  1055. }
  1056. close(afd);
  1057. close(lcfd);
  1058. return dfd;
  1059. }
  1060. int
  1061. ftpxfer(int in, Out *out, Range *r)
  1062. {
  1063. char buf[1024];
  1064. int32_t vtime;
  1065. int i, n;
  1066. vtime = 0;
  1067. for(n = 0;;n += i){
  1068. i = read(in, buf, sizeof(buf));
  1069. if(i == 0)
  1070. break;
  1071. if(i < 0)
  1072. return Error;
  1073. if(output(out, buf, i) != i)
  1074. return Error;
  1075. r->start += i;
  1076. if(verbose && (vtime != time(0) || r->start == r->end)) {
  1077. vtime = time(0);
  1078. fprint(2, "%ld %ld\n", r->start, r->end);
  1079. }
  1080. }
  1081. return n;
  1082. }
  1083. int
  1084. terminateftp(int ctl, int rv)
  1085. {
  1086. close(ctl);
  1087. return rv;
  1088. }
  1089. /*
  1090. * case insensitive strcmp (why aren't these in libc?)
  1091. */
  1092. int
  1093. cistrncmp(char *a, char *b, int n)
  1094. {
  1095. while(n-- > 0){
  1096. if(tolower(*a++) != tolower(*b++))
  1097. return -1;
  1098. }
  1099. return 0;
  1100. }
  1101. int
  1102. cistrcmp(char *a, char *b)
  1103. {
  1104. while(*a || *b)
  1105. if(tolower(*a++) != tolower(*b++))
  1106. return -1;
  1107. return 0;
  1108. }
  1109. /*
  1110. * buffered io
  1111. */
  1112. struct
  1113. {
  1114. char *rp;
  1115. char *wp;
  1116. char buf[4*1024];
  1117. } b;
  1118. void
  1119. initibuf(void)
  1120. {
  1121. b.rp = b.wp = b.buf;
  1122. }
  1123. /*
  1124. * read a possibly buffered line, strip off trailing while
  1125. */
  1126. int
  1127. readline(int fd, char *buf, int len)
  1128. {
  1129. int n;
  1130. char *p;
  1131. int eof = 0;
  1132. len--;
  1133. for(p = buf;;){
  1134. if(b.rp >= b.wp){
  1135. n = read(fd, b.wp, sizeof(b.buf)/2);
  1136. if(n < 0)
  1137. return -1;
  1138. if(n == 0){
  1139. eof = 1;
  1140. break;
  1141. }
  1142. b.wp += n;
  1143. }
  1144. n = *b.rp++;
  1145. if(len > 0){
  1146. *p++ = n;
  1147. len--;
  1148. }
  1149. if(n == '\n')
  1150. break;
  1151. }
  1152. /* drop trailing white */
  1153. for(;;){
  1154. if(p <= buf)
  1155. break;
  1156. n = *(p-1);
  1157. if(n != ' ' && n != '\t' && n != '\r' && n != '\n')
  1158. break;
  1159. p--;
  1160. }
  1161. *p = 0;
  1162. if(eof && p == buf)
  1163. return -1;
  1164. return p-buf;
  1165. }
  1166. void
  1167. unreadline(char *line)
  1168. {
  1169. int i, n;
  1170. i = strlen(line);
  1171. n = b.wp-b.rp;
  1172. memmove(&b.buf[i+1], b.rp, n);
  1173. memmove(b.buf, line, i);
  1174. b.buf[i] = '\n';
  1175. b.rp = b.buf;
  1176. b.wp = b.rp + i + 1 + n;
  1177. }
  1178. int
  1179. readibuf(int fd, char *buf, int len)
  1180. {
  1181. int n;
  1182. n = b.wp-b.rp;
  1183. if(n > 0){
  1184. if(n > len)
  1185. n = len;
  1186. memmove(buf, b.rp, n);
  1187. b.rp += n;
  1188. return n;
  1189. }
  1190. return read(fd, buf, len);
  1191. }
  1192. int
  1193. dfprint(int fd, char *fmt, ...)
  1194. {
  1195. char buf[4*1024];
  1196. va_list arg;
  1197. va_start(arg, fmt);
  1198. vseprint(buf, buf+sizeof(buf), fmt, arg);
  1199. va_end(arg);
  1200. if(debug)
  1201. fprint(2, "%d -> %s", fd, buf);
  1202. return fprint(fd, "%s", buf);
  1203. }
  1204. int
  1205. getaddrport(char *dir, uint8_t *ipaddr, uint8_t *port)
  1206. {
  1207. char buf[256];
  1208. int fd, i;
  1209. char *p;
  1210. snprint(buf, sizeof(buf), "%s/local", dir);
  1211. fd = open(buf, OREAD);
  1212. if(fd < 0)
  1213. return -1;
  1214. i = read(fd, buf, sizeof(buf)-1);
  1215. close(fd);
  1216. if(i <= 0)
  1217. return -1;
  1218. buf[i] = 0;
  1219. p = strchr(buf, '!');
  1220. if(p != nil)
  1221. *p++ = 0;
  1222. v4parseip(ipaddr, buf);
  1223. i = atoi(p);
  1224. port[0] = i>>8;
  1225. port[1] = i;
  1226. return 0;
  1227. }
  1228. void
  1229. md5free(DigestState *state)
  1230. {
  1231. uint8_t x[MD5dlen];
  1232. md5(nil, 0, x, state);
  1233. }
  1234. DigestState*
  1235. md5dup(DigestState *state)
  1236. {
  1237. char *p;
  1238. p = md5pickle(state);
  1239. if(p == nil)
  1240. sysfatal("md5pickle: %r");
  1241. state = md5unpickle(p);
  1242. if(state == nil)
  1243. sysfatal("md5unpickle: %r");
  1244. free(p);
  1245. return state;
  1246. }
  1247. void
  1248. setoffset(Out *out, int offset)
  1249. {
  1250. md5free(out->curr);
  1251. if(offset == 0)
  1252. out->curr = md5(nil, 0, nil, nil);
  1253. else
  1254. out->curr = nil;
  1255. out->offset = offset;
  1256. out->written = offset;
  1257. if(ofile != nil)
  1258. if(seek(out->fd, offset, 0) != offset)
  1259. sysfatal("seek: %r");
  1260. }
  1261. /*
  1262. * write some output, discarding it (but keeping track)
  1263. * if we've already written it. if we've gone backwards,
  1264. * verify that everything previously written matches
  1265. * that which would have been written from the current
  1266. * output.
  1267. */
  1268. int
  1269. output(Out *out, char *buf, int nb)
  1270. {
  1271. int n, d;
  1272. uint8_t m0[MD5dlen], m1[MD5dlen];
  1273. n = nb;
  1274. d = out->written - out->offset;
  1275. assert(d >= 0);
  1276. if(d > 0){
  1277. if(n < d){
  1278. if(out->curr != nil)
  1279. md5((uint8_t*)buf, n, nil, out->curr);
  1280. out->offset += n;
  1281. return n;
  1282. }
  1283. if(out->curr != nil){
  1284. md5((uint8_t*)buf, d, m0, out->curr);
  1285. out->curr = nil;
  1286. md5(nil, 0, m1, md5dup(out->hiwat));
  1287. if(memcmp(m0, m1, MD5dlen) != 0){
  1288. fprint(2, "integrity check failure at offset %d\n", out->written);
  1289. return -1;
  1290. }
  1291. }
  1292. buf += d;
  1293. n -= d;
  1294. out->offset += d;
  1295. }
  1296. if(n > 0){
  1297. out->hiwat = md5((uint8_t*)buf, n, nil, out->hiwat);
  1298. n = write(out->fd, buf, n);
  1299. if(n > 0){
  1300. out->offset += n;
  1301. out->written += n;
  1302. }
  1303. }
  1304. return n + d;
  1305. }