Page Menu
Home
FreeBSD
Search
Configure Global Search
Log In
Files
F133385531
D26255.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Flag For Later
Award Token
Size
46 KB
Referenced Files
None
Subscribers
None
D26255.diff
View Options
Index: head/libexec/Makefile
===================================================================
--- head/libexec/Makefile
+++ head/libexec/Makefile
@@ -13,6 +13,7 @@
${_mail.local} \
${_makewhatis.local} \
${_mknetid} \
+ ${_phttpget} \
${_pppoed} \
rc \
revnetgroup \
@@ -46,6 +47,10 @@
.if ${MK_FINGER} != "no"
SUBDIR+= fingerd
+.endif
+
+.if ${MK_FREEBSD_UPDATE} != "no" || ${MK_PORTSNAP} != "no"
+_phttpget= phttpget
.endif
.if ${MK_FTP} != "no"
Index: head/libexec/phttpget/Makefile
===================================================================
--- head/libexec/phttpget/Makefile
+++ head/libexec/phttpget/Makefile
@@ -0,0 +1,6 @@
+# $FreeBSD$
+
+PROG= phttpget
+MAN= phttpget.8
+
+.include <bsd.prog.mk>
Index: head/libexec/phttpget/Makefile.depend
===================================================================
--- head/libexec/phttpget/Makefile.depend
+++ head/libexec/phttpget/Makefile.depend
@@ -0,0 +1,17 @@
+# $FreeBSD$
+# Autogenerated - do NOT edit!
+
+DIRDEPS = \
+ gnu/lib/csu \
+ include \
+ include/xlocale \
+ lib/${CSU_DIR} \
+ lib/libc \
+ lib/libcompiler_rt \
+
+
+.include <dirdeps.mk>
+
+.if ${DEP_RELDIR} == ${_DEP_RELDIR}
+# local dependencies - needed for -jN in clean tree
+.endif
Index: head/libexec/phttpget/phttpget.8
===================================================================
--- head/libexec/phttpget/phttpget.8
+++ head/libexec/phttpget/phttpget.8
@@ -0,0 +1,87 @@
+.\"-
+.\" Copyright (c) 2015 Xin LI <delphij@FreeBSD.org>
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" $FreeBSD$
+.\"
+.Dd January 3, 2015
+.Dt PHTTPGET 8
+.Os
+.Sh NAME
+.Nm phttpget
+.Nd retrieve multiple files via pipelined HTTP
+.Sh SYNOPSIS
+.Nm
+.Ar server
+.Ar file ...
+.Sh DESCRIPTION
+The
+.Nm
+utility is a minimalist pipelined HTTP client,
+which is used to retrieve multiple
+.Ar file Ns s
+from one
+.Ar server ,
+and saves the downloaded files in the current working directory,
+using the last portion of their download path as file names.
+.Pp
+By making several "in flight" HTTP requests,
+it can dramatically increase performance when a large number of
+small files need to be downloaded.
+.Pp
+The
+.Xr freebsd-update 8
+and
+.Xr portsnap 8
+tools use
+.Nm
+to download binary patch files.
+.Sh ENVIRONMENT
+.Bl -tag -width HTTP_PROXY_AUTH
+.It Ev HTTP_PROXY
+URL of the proxy to use for HTTP requests.
+.It Ev HTTP_PROXY_AUTH
+Authorization parameters for the HTTP proxy.
+.It Ev HTTP_USER_AGENT
+The User-Agent string to use for HTTP requests.
+The default is
+.Dq phttpget/0.1 .
+.It Ev HTTP_TIMEOUT
+Timeout for HTTP request in seconds.
+.El
+.Sh SEE ALSO
+.Xr fetch 1 ,
+.Xr freebsd-update 8 ,
+.Xr portsnap 8
+.Sh AUTHORS
+.An -nosplit
+The
+.Nm
+utility was written by
+.An Colin Percival Aq Mt cperciva@FreeBSD.org
+for use with
+.Xr portsnap 8
+and later with
+.Xr freebsd-update 8 .
+This manual page was written by
+.An Xin LI Aq Mt delphij@FreeBSD.org .
Index: head/libexec/phttpget/phttpget.c
===================================================================
--- head/libexec/phttpget/phttpget.c
+++ head/libexec/phttpget/phttpget.c
@@ -0,0 +1,732 @@
+/*-
+ * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
+ *
+ * Copyright 2005 Colin Percival
+ * All rights reserved
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted providing that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
+ * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <sys/cdefs.h>
+__FBSDID("$FreeBSD$");
+
+#include <sys/types.h>
+#include <sys/time.h>
+#include <sys/socket.h>
+
+#include <ctype.h>
+#include <err.h>
+#include <errno.h>
+#include <fcntl.h>
+#include <limits.h>
+#include <netdb.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sysexits.h>
+#include <unistd.h>
+
+static const char * env_HTTP_PROXY;
+static char * env_HTTP_PROXY_AUTH;
+static const char * env_HTTP_USER_AGENT;
+static char * env_HTTP_TIMEOUT;
+static const char * proxyport;
+static char * proxyauth;
+
+static struct timeval timo = { 15, 0};
+
+static void
+usage(void)
+{
+
+ fprintf(stderr, "usage: phttpget server [file ...]\n");
+ exit(EX_USAGE);
+}
+
+/*
+ * Base64 encode a string; the string returned, if non-NULL, is
+ * allocated using malloc() and must be freed by the caller.
+ */
+static char *
+b64enc(const char *ptext)
+{
+ static const char base64[] =
+ "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
+ "abcdefghijklmnopqrstuvwxyz"
+ "0123456789+/";
+ const char *pt;
+ char *ctext, *pc;
+ size_t ptlen, ctlen;
+ uint32_t t;
+ unsigned int j;
+
+ /*
+ * Encoded length is 4 characters per 3-byte block or partial
+ * block of plaintext, plus one byte for the terminating NUL
+ */
+ ptlen = strlen(ptext);
+ if (ptlen > ((SIZE_MAX - 1) / 4) * 3 - 2)
+ return NULL; /* Possible integer overflow */
+ ctlen = 4 * ((ptlen + 2) / 3) + 1;
+ if ((ctext = malloc(ctlen)) == NULL)
+ return NULL;
+ ctext[ctlen - 1] = 0;
+
+ /*
+ * Scan through ptext, reading up to 3 bytes from ptext and
+ * writing 4 bytes to ctext, until we run out of input.
+ */
+ for (pt = ptext, pc = ctext; ptlen; ptlen -= 3, pc += 4) {
+ /* Read 3 bytes */
+ for (t = j = 0; j < 3; j++) {
+ t <<= 8;
+ if (j < ptlen)
+ t += *pt++;
+ }
+
+ /* Write 4 bytes */
+ for (j = 0; j < 4; j++) {
+ if (j <= ptlen + 1)
+ pc[j] = base64[(t >> 18) & 0x3f];
+ else
+ pc[j] = '=';
+ t <<= 6;
+ }
+
+ /* If we're done, exit the loop */
+ if (ptlen <= 3)
+ break;
+ }
+
+ return (ctext);
+}
+
+static void
+readenv(void)
+{
+ char *proxy_auth_userpass, *proxy_auth_userpass64, *p;
+ char *proxy_auth_user = NULL;
+ char *proxy_auth_pass = NULL;
+ long http_timeout;
+
+ env_HTTP_PROXY = getenv("HTTP_PROXY");
+ if (env_HTTP_PROXY == NULL)
+ env_HTTP_PROXY = getenv("http_proxy");
+ if (env_HTTP_PROXY != NULL) {
+ if (strncmp(env_HTTP_PROXY, "http://", 7) == 0)
+ env_HTTP_PROXY += 7;
+ p = strchr(env_HTTP_PROXY, '/');
+ if (p != NULL)
+ *p = 0;
+ p = strchr(env_HTTP_PROXY, ':');
+ if (p != NULL) {
+ *p = 0;
+ proxyport = p + 1;
+ } else
+ proxyport = "3128";
+ }
+
+ env_HTTP_PROXY_AUTH = getenv("HTTP_PROXY_AUTH");
+ if ((env_HTTP_PROXY != NULL) &&
+ (env_HTTP_PROXY_AUTH != NULL) &&
+ (strncasecmp(env_HTTP_PROXY_AUTH, "basic:" , 6) == 0)) {
+ /* Ignore authentication scheme */
+ (void) strsep(&env_HTTP_PROXY_AUTH, ":");
+
+ /* Ignore realm */
+ (void) strsep(&env_HTTP_PROXY_AUTH, ":");
+
+ /* Obtain username and password */
+ proxy_auth_user = strsep(&env_HTTP_PROXY_AUTH, ":");
+ proxy_auth_pass = env_HTTP_PROXY_AUTH;
+ }
+
+ if ((proxy_auth_user != NULL) && (proxy_auth_pass != NULL)) {
+ asprintf(&proxy_auth_userpass, "%s:%s",
+ proxy_auth_user, proxy_auth_pass);
+ if (proxy_auth_userpass == NULL)
+ err(1, "asprintf");
+
+ proxy_auth_userpass64 = b64enc(proxy_auth_userpass);
+ if (proxy_auth_userpass64 == NULL)
+ err(1, "malloc");
+
+ asprintf(&proxyauth, "Proxy-Authorization: Basic %s\r\n",
+ proxy_auth_userpass64);
+ if (proxyauth == NULL)
+ err(1, "asprintf");
+
+ free(proxy_auth_userpass);
+ free(proxy_auth_userpass64);
+ } else
+ proxyauth = NULL;
+
+ env_HTTP_USER_AGENT = getenv("HTTP_USER_AGENT");
+ if (env_HTTP_USER_AGENT == NULL)
+ env_HTTP_USER_AGENT = "phttpget/0.1";
+
+ env_HTTP_TIMEOUT = getenv("HTTP_TIMEOUT");
+ if (env_HTTP_TIMEOUT != NULL) {
+ http_timeout = strtol(env_HTTP_TIMEOUT, &p, 10);
+ if ((*env_HTTP_TIMEOUT == '\0') || (*p != '\0') ||
+ (http_timeout < 0))
+ warnx("HTTP_TIMEOUT (%s) is not a positive integer",
+ env_HTTP_TIMEOUT);
+ else
+ timo.tv_sec = http_timeout;
+ }
+}
+
+static int
+makerequest(char ** buf, char * path, char * server, int connclose)
+{
+ int buflen;
+
+ buflen = asprintf(buf,
+ "GET %s%s/%s HTTP/1.1\r\n"
+ "Host: %s\r\n"
+ "User-Agent: %s\r\n"
+ "%s"
+ "%s"
+ "\r\n",
+ env_HTTP_PROXY ? "http://" : "",
+ env_HTTP_PROXY ? server : "",
+ path, server, env_HTTP_USER_AGENT,
+ proxyauth ? proxyauth : "",
+ connclose ? "Connection: Close\r\n" : "Connection: Keep-Alive\r\n");
+ if (buflen == -1)
+ err(1, "asprintf");
+ return(buflen);
+}
+
+static int
+readln(int sd, char * resbuf, int * resbuflen, int * resbufpos)
+{
+ ssize_t len;
+
+ while (strnstr(resbuf + *resbufpos, "\r\n",
+ *resbuflen - *resbufpos) == NULL) {
+ /* Move buffered data to the start of the buffer */
+ if (*resbufpos != 0) {
+ memmove(resbuf, resbuf + *resbufpos,
+ *resbuflen - *resbufpos);
+ *resbuflen -= *resbufpos;
+ *resbufpos = 0;
+ }
+
+ /* If the buffer is full, complain */
+ if (*resbuflen == BUFSIZ)
+ return -1;
+
+ /* Read more data into the buffer */
+ len = recv(sd, resbuf + *resbuflen, BUFSIZ - *resbuflen, 0);
+ if ((len == 0) ||
+ ((len == -1) && (errno != EINTR)))
+ return -1;
+
+ if (len != -1)
+ *resbuflen += len;
+ }
+
+ return 0;
+}
+
+static int
+copybytes(int sd, int fd, off_t copylen, char * resbuf, int * resbuflen,
+ int * resbufpos)
+{
+ ssize_t len;
+
+ while (copylen) {
+ /* Write data from resbuf to fd */
+ len = *resbuflen - *resbufpos;
+ if (copylen < len)
+ len = copylen;
+ if (len > 0) {
+ if (fd != -1)
+ len = write(fd, resbuf + *resbufpos, len);
+ if (len == -1)
+ err(1, "write");
+ *resbufpos += len;
+ copylen -= len;
+ continue;
+ }
+
+ /* Read more data into buffer */
+ len = recv(sd, resbuf, BUFSIZ, 0);
+ if (len == -1) {
+ if (errno == EINTR)
+ continue;
+ return -1;
+ } else if (len == 0) {
+ return -2;
+ } else {
+ *resbuflen = len;
+ *resbufpos = 0;
+ }
+ }
+
+ return 0;
+}
+
+int
+main(int argc, char *argv[])
+{
+ struct addrinfo hints; /* Hints to getaddrinfo */
+ struct addrinfo *res; /* Pointer to server address being used */
+ struct addrinfo *res0; /* Pointer to server addresses */
+ char * resbuf = NULL; /* Response buffer */
+ int resbufpos = 0; /* Response buffer position */
+ int resbuflen = 0; /* Response buffer length */
+ char * eolp; /* Pointer to "\r\n" within resbuf */
+ char * hln; /* Pointer within header line */
+ char * servername; /* Name of server */
+ char * fname = NULL; /* Name of downloaded file */
+ char * reqbuf = NULL; /* Request buffer */
+ int reqbufpos = 0; /* Request buffer position */
+ int reqbuflen = 0; /* Request buffer length */
+ ssize_t len; /* Length sent or received */
+ int nreq = 0; /* Number of next request to send */
+ int nres = 0; /* Number of next reply to receive */
+ int pipelined = 0; /* != 0 if connection in pipelined mode. */
+ int keepalive; /* != 0 if HTTP/1.0 keep-alive rcvd. */
+ int sd = -1; /* Socket descriptor */
+ int sdflags = 0; /* Flags on the socket sd */
+ int fd = -1; /* Descriptor for download target file */
+ int error; /* Error code */
+ int statuscode; /* HTTP Status code */
+ off_t contentlength; /* Value from Content-Length header */
+ int chunked; /* != if transfer-encoding is chunked */
+ off_t clen; /* Chunk length */
+ int firstreq = 0; /* # of first request for this connection */
+ int val; /* Value used for setsockopt call */
+
+ /* Check that the arguments are sensible */
+ if (argc < 2)
+ usage();
+
+ /* Read important environment variables */
+ readenv();
+
+ /* Get server name and adjust arg[cv] to point at file names */
+ servername = argv[1];
+ argv += 2;
+ argc -= 2;
+
+ /* Allocate response buffer */
+ resbuf = malloc(BUFSIZ);
+ if (resbuf == NULL)
+ err(1, "malloc");
+
+ /* Look up server */
+ memset(&hints, 0, sizeof(hints));
+ hints.ai_family = PF_UNSPEC;
+ hints.ai_socktype = SOCK_STREAM;
+ error = getaddrinfo(env_HTTP_PROXY ? env_HTTP_PROXY : servername,
+ env_HTTP_PROXY ? proxyport : "http", &hints, &res0);
+ if (error)
+ errx(1, "host = %s, port = %s: %s",
+ env_HTTP_PROXY ? env_HTTP_PROXY : servername,
+ env_HTTP_PROXY ? proxyport : "http",
+ gai_strerror(error));
+ if (res0 == NULL)
+ errx(1, "could not look up %s", servername);
+ res = res0;
+
+ /* Do the fetching */
+ while (nres < argc) {
+ /* Make sure we have a connected socket */
+ for (; sd == -1; res = res->ai_next) {
+ /* No addresses left to try :-( */
+ if (res == NULL)
+ errx(1, "Could not connect to %s", servername);
+
+ /* Create a socket... */
+ sd = socket(res->ai_family, res->ai_socktype,
+ res->ai_protocol);
+ if (sd == -1)
+ continue;
+
+ /* ... set 15-second timeouts ... */
+ setsockopt(sd, SOL_SOCKET, SO_SNDTIMEO,
+ (void *)&timo, (socklen_t)sizeof(timo));
+ setsockopt(sd, SOL_SOCKET, SO_RCVTIMEO,
+ (void *)&timo, (socklen_t)sizeof(timo));
+
+ /* ... disable SIGPIPE generation ... */
+ val = 1;
+ setsockopt(sd, SOL_SOCKET, SO_NOSIGPIPE,
+ (void *)&val, sizeof(int));
+
+ /* ... and connect to the server. */
+ if(connect(sd, res->ai_addr, res->ai_addrlen)) {
+ close(sd);
+ sd = -1;
+ continue;
+ }
+
+ firstreq = nres;
+ }
+
+ /*
+ * If in pipelined HTTP mode, put socket into non-blocking
+ * mode, since we're probably going to want to try to send
+ * several HTTP requests.
+ */
+ if (pipelined) {
+ sdflags = fcntl(sd, F_GETFL);
+ if (fcntl(sd, F_SETFL, sdflags | O_NONBLOCK) == -1)
+ err(1, "fcntl");
+ }
+
+ /* Construct requests and/or send them without blocking */
+ while ((nreq < argc) && ((reqbuf == NULL) || pipelined)) {
+ /* If not in the middle of a request, make one */
+ if (reqbuf == NULL) {
+ reqbuflen = makerequest(&reqbuf, argv[nreq],
+ servername, (nreq == argc - 1));
+ reqbufpos = 0;
+ }
+
+ /* If in pipelined mode, try to send the request */
+ if (pipelined) {
+ while (reqbufpos < reqbuflen) {
+ len = send(sd, reqbuf + reqbufpos,
+ reqbuflen - reqbufpos, 0);
+ if (len == -1)
+ break;
+ reqbufpos += len;
+ }
+ if (reqbufpos < reqbuflen) {
+ if (errno != EAGAIN)
+ goto conndied;
+ break;
+ } else {
+ free(reqbuf);
+ reqbuf = NULL;
+ nreq++;
+ }
+ }
+ }
+
+ /* Put connection back into blocking mode */
+ if (pipelined) {
+ if (fcntl(sd, F_SETFL, sdflags) == -1)
+ err(1, "fcntl");
+ }
+
+ /* Do we need to blocking-send a request? */
+ if (nres == nreq) {
+ while (reqbufpos < reqbuflen) {
+ len = send(sd, reqbuf + reqbufpos,
+ reqbuflen - reqbufpos, 0);
+ if (len == -1)
+ goto conndied;
+ reqbufpos += len;
+ }
+ free(reqbuf);
+ reqbuf = NULL;
+ nreq++;
+ }
+
+ /* Scan through the response processing headers. */
+ statuscode = 0;
+ contentlength = -1;
+ chunked = 0;
+ keepalive = 0;
+ do {
+ /* Get a header line */
+ error = readln(sd, resbuf, &resbuflen, &resbufpos);
+ if (error)
+ goto conndied;
+ hln = resbuf + resbufpos;
+ eolp = strnstr(hln, "\r\n", resbuflen - resbufpos);
+ resbufpos = (eolp - resbuf) + 2;
+ *eolp = '\0';
+
+ /* Make sure it doesn't contain a NUL character */
+ if (strchr(hln, '\0') != eolp)
+ goto conndied;
+
+ if (statuscode == 0) {
+ /* The first line MUST be HTTP/1.x xxx ... */
+ if ((strncmp(hln, "HTTP/1.", 7) != 0) ||
+ ! isdigit(hln[7]))
+ goto conndied;
+
+ /*
+ * If the minor version number isn't zero,
+ * then we can assume that pipelining our
+ * requests is OK -- as long as we don't
+ * see a "Connection: close" line later
+ * and we either have a Content-Length or
+ * Transfer-Encoding: chunked header to
+ * tell us the length.
+ */
+ if (hln[7] != '0')
+ pipelined = 1;
+
+ /* Skip over the minor version number */
+ hln = strchr(hln + 7, ' ');
+ if (hln == NULL)
+ goto conndied;
+ else
+ hln++;
+
+ /* Read the status code */
+ while (isdigit(*hln)) {
+ statuscode = statuscode * 10 +
+ *hln - '0';
+ hln++;
+ }
+
+ if (statuscode < 100 || statuscode > 599)
+ goto conndied;
+
+ /* Ignore the rest of the line */
+ continue;
+ }
+
+ /*
+ * Check for "Connection: close" or
+ * "Connection: Keep-Alive" header
+ */
+ if (strncasecmp(hln, "Connection:", 11) == 0) {
+ hln += 11;
+ if (strcasestr(hln, "close") != NULL)
+ pipelined = 0;
+ if (strcasestr(hln, "Keep-Alive") != NULL)
+ keepalive = 1;
+
+ /* Next header... */
+ continue;
+ }
+
+ /* Check for "Content-Length:" header */
+ if (strncasecmp(hln, "Content-Length:", 15) == 0) {
+ hln += 15;
+ contentlength = 0;
+
+ /* Find the start of the length */
+ while (!isdigit(*hln) && (*hln != '\0'))
+ hln++;
+
+ /* Compute the length */
+ while (isdigit(*hln)) {
+ if (contentlength >= OFF_MAX / 10) {
+ /* Nasty people... */
+ goto conndied;
+ }
+ contentlength = contentlength * 10 +
+ *hln - '0';
+ hln++;
+ }
+
+ /* Next header... */
+ continue;
+ }
+
+ /* Check for "Transfer-Encoding: chunked" header */
+ if (strncasecmp(hln, "Transfer-Encoding:", 18) == 0) {
+ hln += 18;
+ if (strcasestr(hln, "chunked") != NULL)
+ chunked = 1;
+
+ /* Next header... */
+ continue;
+ }
+
+ /* We blithely ignore any other header lines */
+
+ /* No more header lines */
+ if (strlen(hln) == 0) {
+ /*
+ * If the status code was 1xx, then there will
+ * be a real header later. Servers may emit
+ * 1xx header blocks at will, but since we
+ * don't expect one, we should just ignore it.
+ */
+ if (100 <= statuscode && statuscode <= 199) {
+ statuscode = 0;
+ continue;
+ }
+
+ /* End of header; message body follows */
+ break;
+ }
+ } while (1);
+
+ /* No message body for 204 or 304 */
+ if (statuscode == 204 || statuscode == 304) {
+ nres++;
+ continue;
+ }
+
+ /*
+ * There should be a message body coming, but we only want
+ * to send it to a file if the status code is 200
+ */
+ if (statuscode == 200) {
+ /* Generate a file name for the download */
+ fname = strrchr(argv[nres], '/');
+ if (fname == NULL)
+ fname = argv[nres];
+ else
+ fname++;
+ if (strlen(fname) == 0)
+ errx(1, "Cannot obtain file name from %s\n",
+ argv[nres]);
+
+ fd = open(fname, O_CREAT | O_TRUNC | O_WRONLY, 0644);
+ if (fd == -1)
+ errx(1, "open(%s)", fname);
+ }
+
+ /* Read the message and send data to fd if appropriate */
+ if (chunked) {
+ /* Handle a chunked-encoded entity */
+
+ /* Read chunks */
+ do {
+ error = readln(sd, resbuf, &resbuflen,
+ &resbufpos);
+ if (error)
+ goto conndied;
+ hln = resbuf + resbufpos;
+ eolp = strstr(hln, "\r\n");
+ resbufpos = (eolp - resbuf) + 2;
+
+ clen = 0;
+ while (isxdigit(*hln)) {
+ if (clen >= OFF_MAX / 16) {
+ /* Nasty people... */
+ goto conndied;
+ }
+ if (isdigit(*hln))
+ clen = clen * 16 + *hln - '0';
+ else
+ clen = clen * 16 + 10 +
+ tolower(*hln) - 'a';
+ hln++;
+ }
+
+ error = copybytes(sd, fd, clen, resbuf,
+ &resbuflen, &resbufpos);
+ if (error) {
+ goto conndied;
+ }
+ } while (clen != 0);
+
+ /* Read trailer and final CRLF */
+ do {
+ error = readln(sd, resbuf, &resbuflen,
+ &resbufpos);
+ if (error)
+ goto conndied;
+ hln = resbuf + resbufpos;
+ eolp = strstr(hln, "\r\n");
+ resbufpos = (eolp - resbuf) + 2;
+ } while (hln != eolp);
+ } else if (contentlength != -1) {
+ error = copybytes(sd, fd, contentlength, resbuf,
+ &resbuflen, &resbufpos);
+ if (error)
+ goto conndied;
+ } else {
+ /*
+ * Not chunked, and no content length header.
+ * Read everything until the server closes the
+ * socket.
+ */
+ error = copybytes(sd, fd, OFF_MAX, resbuf,
+ &resbuflen, &resbufpos);
+ if (error == -1)
+ goto conndied;
+ pipelined = 0;
+ }
+
+ if (fd != -1) {
+ close(fd);
+ fd = -1;
+ }
+
+ fprintf(stderr, "http://%s/%s: %d ", servername, argv[nres],
+ statuscode);
+ if (statuscode == 200)
+ fprintf(stderr, "OK\n");
+ else if (statuscode < 300)
+ fprintf(stderr, "Successful (ignored)\n");
+ else if (statuscode < 400)
+ fprintf(stderr, "Redirection (ignored)\n");
+ else
+ fprintf(stderr, "Error (ignored)\n");
+
+ /* We've finished this file! */
+ nres++;
+
+ /*
+ * If necessary, clean up this connection so that we
+ * can start a new one.
+ */
+ if (pipelined == 0 && keepalive == 0)
+ goto cleanupconn;
+ continue;
+
+conndied:
+ /*
+ * Something went wrong -- our connection died, the server
+ * sent us garbage, etc. If this happened on the first
+ * request we sent over this connection, give up. Otherwise,
+ * close this connection, open a new one, and reissue the
+ * request.
+ */
+ if (nres == firstreq)
+ errx(1, "Connection failure");
+
+cleanupconn:
+ /*
+ * Clean up our connection and keep on going
+ */
+ shutdown(sd, SHUT_RDWR);
+ close(sd);
+ sd = -1;
+ if (fd != -1) {
+ close(fd);
+ fd = -1;
+ }
+ if (reqbuf != NULL) {
+ free(reqbuf);
+ reqbuf = NULL;
+ }
+ nreq = nres;
+ res = res0;
+ pipelined = 0;
+ resbufpos = resbuflen = 0;
+ continue;
+ }
+
+ free(resbuf);
+ freeaddrinfo(res0);
+
+ return 0;
+}
Index: head/tools/build/mk/OptionalObsoleteFiles.inc
===================================================================
--- head/tools/build/mk/OptionalObsoleteFiles.inc
+++ head/tools/build/mk/OptionalObsoleteFiles.inc
@@ -2043,6 +2043,11 @@
OLD_FILES+=usr/share/man/man8/freebsd-update.8.gz
.endif
+.if ${MK_FREEBSD_UPDATE} == no && ${MK_PORTSNAP} == no
+OLD_FILES+=usr/libexec/phttpget
+OLD_FILES+=usr/share/man/man8/phttpget.8.gz
+.endif
+
.if ${MK_GAMES} == no
OLD_FILES+=usr/bin/caesar
OLD_FILES+=usr/bin/factor
@@ -7330,10 +7335,8 @@
.if ${MK_PORTSNAP} == no
OLD_FILES+=etc/portsnap.conf
OLD_FILES+=usr/libexec/make_index
-OLD_FILES+=usr/libexec/phttpget
OLD_FILES+=usr/sbin/portsnap
OLD_FILES+=usr/share/examples/etc/portsnap.conf
-OLD_FILES+=usr/share/man/man8/phttpget.8.gz
OLD_FILES+=usr/share/man/man8/portsnap.8.gz
.endif
Index: head/usr.sbin/portsnap/Makefile
===================================================================
--- head/usr.sbin/portsnap/Makefile
+++ head/usr.sbin/portsnap/Makefile
@@ -1,5 +1,5 @@
# $FreeBSD$
-SUBDIR= portsnap make_index phttpget
+SUBDIR= portsnap make_index
.include <bsd.subdir.mk>
Index: head/usr.sbin/portsnap/phttpget/Makefile
===================================================================
--- head/usr.sbin/portsnap/phttpget/Makefile
+++ head/usr.sbin/portsnap/phttpget/Makefile
@@ -1,8 +0,0 @@
-# $FreeBSD$
-
-PROG= phttpget
-MAN= phttpget.8
-
-BINDIR= ${LIBEXECDIR}
-
-.include <bsd.prog.mk>
Index: head/usr.sbin/portsnap/phttpget/Makefile.depend
===================================================================
--- head/usr.sbin/portsnap/phttpget/Makefile.depend
+++ head/usr.sbin/portsnap/phttpget/Makefile.depend
@@ -1,17 +0,0 @@
-# $FreeBSD$
-# Autogenerated - do NOT edit!
-
-DIRDEPS = \
- gnu/lib/csu \
- include \
- include/xlocale \
- lib/${CSU_DIR} \
- lib/libc \
- lib/libcompiler_rt \
-
-
-.include <dirdeps.mk>
-
-.if ${DEP_RELDIR} == ${_DEP_RELDIR}
-# local dependencies - needed for -jN in clean tree
-.endif
Index: head/usr.sbin/portsnap/phttpget/phttpget.8
===================================================================
--- head/usr.sbin/portsnap/phttpget/phttpget.8
+++ head/usr.sbin/portsnap/phttpget/phttpget.8
@@ -1,87 +0,0 @@
-.\"-
-.\" Copyright (c) 2015 Xin LI <delphij@FreeBSD.org>
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $FreeBSD$
-.\"
-.Dd January 3, 2015
-.Dt PHTTPGET 8
-.Os
-.Sh NAME
-.Nm phttpget
-.Nd retrieve multiple files via pipelined HTTP
-.Sh SYNOPSIS
-.Nm
-.Ar server
-.Ar file ...
-.Sh DESCRIPTION
-The
-.Nm
-utility is a minimalist pipelined HTTP client,
-which is used to retrieve multiple
-.Ar file Ns s
-from one
-.Ar server ,
-and saves the downloaded files in the current working directory,
-using the last portion of their download path as file names.
-.Pp
-By making several "in flight" HTTP requests,
-it can dramatically increase performance when a large number of
-small files need to be downloaded.
-.Pp
-The
-.Xr freebsd-update 8
-and
-.Xr portsnap 8
-tools use
-.Nm
-to download binary patch files.
-.Sh ENVIRONMENT
-.Bl -tag -width HTTP_PROXY_AUTH
-.It Ev HTTP_PROXY
-URL of the proxy to use for HTTP requests.
-.It Ev HTTP_PROXY_AUTH
-Authorization parameters for the HTTP proxy.
-.It Ev HTTP_USER_AGENT
-The User-Agent string to use for HTTP requests.
-The default is
-.Dq phttpget/0.1 .
-.It Ev HTTP_TIMEOUT
-Timeout for HTTP request in seconds.
-.El
-.Sh SEE ALSO
-.Xr fetch 1 ,
-.Xr freebsd-update 8 ,
-.Xr portsnap 8
-.Sh AUTHORS
-.An -nosplit
-The
-.Nm
-utility was written by
-.An Colin Percival Aq Mt cperciva@FreeBSD.org
-for use with
-.Xr portsnap 8
-and later with
-.Xr freebsd-update 8 .
-This manual page was written by
-.An Xin LI Aq Mt delphij@FreeBSD.org .
Index: head/usr.sbin/portsnap/phttpget/phttpget.c
===================================================================
--- head/usr.sbin/portsnap/phttpget/phttpget.c
+++ head/usr.sbin/portsnap/phttpget/phttpget.c
@@ -1,732 +0,0 @@
-/*-
- * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
- *
- * Copyright 2005 Colin Percival
- * All rights reserved
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted providing that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
- * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
- * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
- * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
- * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
- * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
- * POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <sys/cdefs.h>
-__FBSDID("$FreeBSD$");
-
-#include <sys/types.h>
-#include <sys/time.h>
-#include <sys/socket.h>
-
-#include <ctype.h>
-#include <err.h>
-#include <errno.h>
-#include <fcntl.h>
-#include <limits.h>
-#include <netdb.h>
-#include <stdint.h>
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <sysexits.h>
-#include <unistd.h>
-
-static const char * env_HTTP_PROXY;
-static char * env_HTTP_PROXY_AUTH;
-static const char * env_HTTP_USER_AGENT;
-static char * env_HTTP_TIMEOUT;
-static const char * proxyport;
-static char * proxyauth;
-
-static struct timeval timo = { 15, 0};
-
-static void
-usage(void)
-{
-
- fprintf(stderr, "usage: phttpget server [file ...]\n");
- exit(EX_USAGE);
-}
-
-/*
- * Base64 encode a string; the string returned, if non-NULL, is
- * allocated using malloc() and must be freed by the caller.
- */
-static char *
-b64enc(const char *ptext)
-{
- static const char base64[] =
- "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
- "abcdefghijklmnopqrstuvwxyz"
- "0123456789+/";
- const char *pt;
- char *ctext, *pc;
- size_t ptlen, ctlen;
- uint32_t t;
- unsigned int j;
-
- /*
- * Encoded length is 4 characters per 3-byte block or partial
- * block of plaintext, plus one byte for the terminating NUL
- */
- ptlen = strlen(ptext);
- if (ptlen > ((SIZE_MAX - 1) / 4) * 3 - 2)
- return NULL; /* Possible integer overflow */
- ctlen = 4 * ((ptlen + 2) / 3) + 1;
- if ((ctext = malloc(ctlen)) == NULL)
- return NULL;
- ctext[ctlen - 1] = 0;
-
- /*
- * Scan through ptext, reading up to 3 bytes from ptext and
- * writing 4 bytes to ctext, until we run out of input.
- */
- for (pt = ptext, pc = ctext; ptlen; ptlen -= 3, pc += 4) {
- /* Read 3 bytes */
- for (t = j = 0; j < 3; j++) {
- t <<= 8;
- if (j < ptlen)
- t += *pt++;
- }
-
- /* Write 4 bytes */
- for (j = 0; j < 4; j++) {
- if (j <= ptlen + 1)
- pc[j] = base64[(t >> 18) & 0x3f];
- else
- pc[j] = '=';
- t <<= 6;
- }
-
- /* If we're done, exit the loop */
- if (ptlen <= 3)
- break;
- }
-
- return (ctext);
-}
-
-static void
-readenv(void)
-{
- char *proxy_auth_userpass, *proxy_auth_userpass64, *p;
- char *proxy_auth_user = NULL;
- char *proxy_auth_pass = NULL;
- long http_timeout;
-
- env_HTTP_PROXY = getenv("HTTP_PROXY");
- if (env_HTTP_PROXY == NULL)
- env_HTTP_PROXY = getenv("http_proxy");
- if (env_HTTP_PROXY != NULL) {
- if (strncmp(env_HTTP_PROXY, "http://", 7) == 0)
- env_HTTP_PROXY += 7;
- p = strchr(env_HTTP_PROXY, '/');
- if (p != NULL)
- *p = 0;
- p = strchr(env_HTTP_PROXY, ':');
- if (p != NULL) {
- *p = 0;
- proxyport = p + 1;
- } else
- proxyport = "3128";
- }
-
- env_HTTP_PROXY_AUTH = getenv("HTTP_PROXY_AUTH");
- if ((env_HTTP_PROXY != NULL) &&
- (env_HTTP_PROXY_AUTH != NULL) &&
- (strncasecmp(env_HTTP_PROXY_AUTH, "basic:" , 6) == 0)) {
- /* Ignore authentication scheme */
- (void) strsep(&env_HTTP_PROXY_AUTH, ":");
-
- /* Ignore realm */
- (void) strsep(&env_HTTP_PROXY_AUTH, ":");
-
- /* Obtain username and password */
- proxy_auth_user = strsep(&env_HTTP_PROXY_AUTH, ":");
- proxy_auth_pass = env_HTTP_PROXY_AUTH;
- }
-
- if ((proxy_auth_user != NULL) && (proxy_auth_pass != NULL)) {
- asprintf(&proxy_auth_userpass, "%s:%s",
- proxy_auth_user, proxy_auth_pass);
- if (proxy_auth_userpass == NULL)
- err(1, "asprintf");
-
- proxy_auth_userpass64 = b64enc(proxy_auth_userpass);
- if (proxy_auth_userpass64 == NULL)
- err(1, "malloc");
-
- asprintf(&proxyauth, "Proxy-Authorization: Basic %s\r\n",
- proxy_auth_userpass64);
- if (proxyauth == NULL)
- err(1, "asprintf");
-
- free(proxy_auth_userpass);
- free(proxy_auth_userpass64);
- } else
- proxyauth = NULL;
-
- env_HTTP_USER_AGENT = getenv("HTTP_USER_AGENT");
- if (env_HTTP_USER_AGENT == NULL)
- env_HTTP_USER_AGENT = "phttpget/0.1";
-
- env_HTTP_TIMEOUT = getenv("HTTP_TIMEOUT");
- if (env_HTTP_TIMEOUT != NULL) {
- http_timeout = strtol(env_HTTP_TIMEOUT, &p, 10);
- if ((*env_HTTP_TIMEOUT == '\0') || (*p != '\0') ||
- (http_timeout < 0))
- warnx("HTTP_TIMEOUT (%s) is not a positive integer",
- env_HTTP_TIMEOUT);
- else
- timo.tv_sec = http_timeout;
- }
-}
-
-static int
-makerequest(char ** buf, char * path, char * server, int connclose)
-{
- int buflen;
-
- buflen = asprintf(buf,
- "GET %s%s/%s HTTP/1.1\r\n"
- "Host: %s\r\n"
- "User-Agent: %s\r\n"
- "%s"
- "%s"
- "\r\n",
- env_HTTP_PROXY ? "http://" : "",
- env_HTTP_PROXY ? server : "",
- path, server, env_HTTP_USER_AGENT,
- proxyauth ? proxyauth : "",
- connclose ? "Connection: Close\r\n" : "Connection: Keep-Alive\r\n");
- if (buflen == -1)
- err(1, "asprintf");
- return(buflen);
-}
-
-static int
-readln(int sd, char * resbuf, int * resbuflen, int * resbufpos)
-{
- ssize_t len;
-
- while (strnstr(resbuf + *resbufpos, "\r\n",
- *resbuflen - *resbufpos) == NULL) {
- /* Move buffered data to the start of the buffer */
- if (*resbufpos != 0) {
- memmove(resbuf, resbuf + *resbufpos,
- *resbuflen - *resbufpos);
- *resbuflen -= *resbufpos;
- *resbufpos = 0;
- }
-
- /* If the buffer is full, complain */
- if (*resbuflen == BUFSIZ)
- return -1;
-
- /* Read more data into the buffer */
- len = recv(sd, resbuf + *resbuflen, BUFSIZ - *resbuflen, 0);
- if ((len == 0) ||
- ((len == -1) && (errno != EINTR)))
- return -1;
-
- if (len != -1)
- *resbuflen += len;
- }
-
- return 0;
-}
-
-static int
-copybytes(int sd, int fd, off_t copylen, char * resbuf, int * resbuflen,
- int * resbufpos)
-{
- ssize_t len;
-
- while (copylen) {
- /* Write data from resbuf to fd */
- len = *resbuflen - *resbufpos;
- if (copylen < len)
- len = copylen;
- if (len > 0) {
- if (fd != -1)
- len = write(fd, resbuf + *resbufpos, len);
- if (len == -1)
- err(1, "write");
- *resbufpos += len;
- copylen -= len;
- continue;
- }
-
- /* Read more data into buffer */
- len = recv(sd, resbuf, BUFSIZ, 0);
- if (len == -1) {
- if (errno == EINTR)
- continue;
- return -1;
- } else if (len == 0) {
- return -2;
- } else {
- *resbuflen = len;
- *resbufpos = 0;
- }
- }
-
- return 0;
-}
-
-int
-main(int argc, char *argv[])
-{
- struct addrinfo hints; /* Hints to getaddrinfo */
- struct addrinfo *res; /* Pointer to server address being used */
- struct addrinfo *res0; /* Pointer to server addresses */
- char * resbuf = NULL; /* Response buffer */
- int resbufpos = 0; /* Response buffer position */
- int resbuflen = 0; /* Response buffer length */
- char * eolp; /* Pointer to "\r\n" within resbuf */
- char * hln; /* Pointer within header line */
- char * servername; /* Name of server */
- char * fname = NULL; /* Name of downloaded file */
- char * reqbuf = NULL; /* Request buffer */
- int reqbufpos = 0; /* Request buffer position */
- int reqbuflen = 0; /* Request buffer length */
- ssize_t len; /* Length sent or received */
- int nreq = 0; /* Number of next request to send */
- int nres = 0; /* Number of next reply to receive */
- int pipelined = 0; /* != 0 if connection in pipelined mode. */
- int keepalive; /* != 0 if HTTP/1.0 keep-alive rcvd. */
- int sd = -1; /* Socket descriptor */
- int sdflags = 0; /* Flags on the socket sd */
- int fd = -1; /* Descriptor for download target file */
- int error; /* Error code */
- int statuscode; /* HTTP Status code */
- off_t contentlength; /* Value from Content-Length header */
- int chunked; /* != if transfer-encoding is chunked */
- off_t clen; /* Chunk length */
- int firstreq = 0; /* # of first request for this connection */
- int val; /* Value used for setsockopt call */
-
- /* Check that the arguments are sensible */
- if (argc < 2)
- usage();
-
- /* Read important environment variables */
- readenv();
-
- /* Get server name and adjust arg[cv] to point at file names */
- servername = argv[1];
- argv += 2;
- argc -= 2;
-
- /* Allocate response buffer */
- resbuf = malloc(BUFSIZ);
- if (resbuf == NULL)
- err(1, "malloc");
-
- /* Look up server */
- memset(&hints, 0, sizeof(hints));
- hints.ai_family = PF_UNSPEC;
- hints.ai_socktype = SOCK_STREAM;
- error = getaddrinfo(env_HTTP_PROXY ? env_HTTP_PROXY : servername,
- env_HTTP_PROXY ? proxyport : "http", &hints, &res0);
- if (error)
- errx(1, "host = %s, port = %s: %s",
- env_HTTP_PROXY ? env_HTTP_PROXY : servername,
- env_HTTP_PROXY ? proxyport : "http",
- gai_strerror(error));
- if (res0 == NULL)
- errx(1, "could not look up %s", servername);
- res = res0;
-
- /* Do the fetching */
- while (nres < argc) {
- /* Make sure we have a connected socket */
- for (; sd == -1; res = res->ai_next) {
- /* No addresses left to try :-( */
- if (res == NULL)
- errx(1, "Could not connect to %s", servername);
-
- /* Create a socket... */
- sd = socket(res->ai_family, res->ai_socktype,
- res->ai_protocol);
- if (sd == -1)
- continue;
-
- /* ... set 15-second timeouts ... */
- setsockopt(sd, SOL_SOCKET, SO_SNDTIMEO,
- (void *)&timo, (socklen_t)sizeof(timo));
- setsockopt(sd, SOL_SOCKET, SO_RCVTIMEO,
- (void *)&timo, (socklen_t)sizeof(timo));
-
- /* ... disable SIGPIPE generation ... */
- val = 1;
- setsockopt(sd, SOL_SOCKET, SO_NOSIGPIPE,
- (void *)&val, sizeof(int));
-
- /* ... and connect to the server. */
- if(connect(sd, res->ai_addr, res->ai_addrlen)) {
- close(sd);
- sd = -1;
- continue;
- }
-
- firstreq = nres;
- }
-
- /*
- * If in pipelined HTTP mode, put socket into non-blocking
- * mode, since we're probably going to want to try to send
- * several HTTP requests.
- */
- if (pipelined) {
- sdflags = fcntl(sd, F_GETFL);
- if (fcntl(sd, F_SETFL, sdflags | O_NONBLOCK) == -1)
- err(1, "fcntl");
- }
-
- /* Construct requests and/or send them without blocking */
- while ((nreq < argc) && ((reqbuf == NULL) || pipelined)) {
- /* If not in the middle of a request, make one */
- if (reqbuf == NULL) {
- reqbuflen = makerequest(&reqbuf, argv[nreq],
- servername, (nreq == argc - 1));
- reqbufpos = 0;
- }
-
- /* If in pipelined mode, try to send the request */
- if (pipelined) {
- while (reqbufpos < reqbuflen) {
- len = send(sd, reqbuf + reqbufpos,
- reqbuflen - reqbufpos, 0);
- if (len == -1)
- break;
- reqbufpos += len;
- }
- if (reqbufpos < reqbuflen) {
- if (errno != EAGAIN)
- goto conndied;
- break;
- } else {
- free(reqbuf);
- reqbuf = NULL;
- nreq++;
- }
- }
- }
-
- /* Put connection back into blocking mode */
- if (pipelined) {
- if (fcntl(sd, F_SETFL, sdflags) == -1)
- err(1, "fcntl");
- }
-
- /* Do we need to blocking-send a request? */
- if (nres == nreq) {
- while (reqbufpos < reqbuflen) {
- len = send(sd, reqbuf + reqbufpos,
- reqbuflen - reqbufpos, 0);
- if (len == -1)
- goto conndied;
- reqbufpos += len;
- }
- free(reqbuf);
- reqbuf = NULL;
- nreq++;
- }
-
- /* Scan through the response processing headers. */
- statuscode = 0;
- contentlength = -1;
- chunked = 0;
- keepalive = 0;
- do {
- /* Get a header line */
- error = readln(sd, resbuf, &resbuflen, &resbufpos);
- if (error)
- goto conndied;
- hln = resbuf + resbufpos;
- eolp = strnstr(hln, "\r\n", resbuflen - resbufpos);
- resbufpos = (eolp - resbuf) + 2;
- *eolp = '\0';
-
- /* Make sure it doesn't contain a NUL character */
- if (strchr(hln, '\0') != eolp)
- goto conndied;
-
- if (statuscode == 0) {
- /* The first line MUST be HTTP/1.x xxx ... */
- if ((strncmp(hln, "HTTP/1.", 7) != 0) ||
- ! isdigit(hln[7]))
- goto conndied;
-
- /*
- * If the minor version number isn't zero,
- * then we can assume that pipelining our
- * requests is OK -- as long as we don't
- * see a "Connection: close" line later
- * and we either have a Content-Length or
- * Transfer-Encoding: chunked header to
- * tell us the length.
- */
- if (hln[7] != '0')
- pipelined = 1;
-
- /* Skip over the minor version number */
- hln = strchr(hln + 7, ' ');
- if (hln == NULL)
- goto conndied;
- else
- hln++;
-
- /* Read the status code */
- while (isdigit(*hln)) {
- statuscode = statuscode * 10 +
- *hln - '0';
- hln++;
- }
-
- if (statuscode < 100 || statuscode > 599)
- goto conndied;
-
- /* Ignore the rest of the line */
- continue;
- }
-
- /*
- * Check for "Connection: close" or
- * "Connection: Keep-Alive" header
- */
- if (strncasecmp(hln, "Connection:", 11) == 0) {
- hln += 11;
- if (strcasestr(hln, "close") != NULL)
- pipelined = 0;
- if (strcasestr(hln, "Keep-Alive") != NULL)
- keepalive = 1;
-
- /* Next header... */
- continue;
- }
-
- /* Check for "Content-Length:" header */
- if (strncasecmp(hln, "Content-Length:", 15) == 0) {
- hln += 15;
- contentlength = 0;
-
- /* Find the start of the length */
- while (!isdigit(*hln) && (*hln != '\0'))
- hln++;
-
- /* Compute the length */
- while (isdigit(*hln)) {
- if (contentlength >= OFF_MAX / 10) {
- /* Nasty people... */
- goto conndied;
- }
- contentlength = contentlength * 10 +
- *hln - '0';
- hln++;
- }
-
- /* Next header... */
- continue;
- }
-
- /* Check for "Transfer-Encoding: chunked" header */
- if (strncasecmp(hln, "Transfer-Encoding:", 18) == 0) {
- hln += 18;
- if (strcasestr(hln, "chunked") != NULL)
- chunked = 1;
-
- /* Next header... */
- continue;
- }
-
- /* We blithely ignore any other header lines */
-
- /* No more header lines */
- if (strlen(hln) == 0) {
- /*
- * If the status code was 1xx, then there will
- * be a real header later. Servers may emit
- * 1xx header blocks at will, but since we
- * don't expect one, we should just ignore it.
- */
- if (100 <= statuscode && statuscode <= 199) {
- statuscode = 0;
- continue;
- }
-
- /* End of header; message body follows */
- break;
- }
- } while (1);
-
- /* No message body for 204 or 304 */
- if (statuscode == 204 || statuscode == 304) {
- nres++;
- continue;
- }
-
- /*
- * There should be a message body coming, but we only want
- * to send it to a file if the status code is 200
- */
- if (statuscode == 200) {
- /* Generate a file name for the download */
- fname = strrchr(argv[nres], '/');
- if (fname == NULL)
- fname = argv[nres];
- else
- fname++;
- if (strlen(fname) == 0)
- errx(1, "Cannot obtain file name from %s\n",
- argv[nres]);
-
- fd = open(fname, O_CREAT | O_TRUNC | O_WRONLY, 0644);
- if (fd == -1)
- errx(1, "open(%s)", fname);
- }
-
- /* Read the message and send data to fd if appropriate */
- if (chunked) {
- /* Handle a chunked-encoded entity */
-
- /* Read chunks */
- do {
- error = readln(sd, resbuf, &resbuflen,
- &resbufpos);
- if (error)
- goto conndied;
- hln = resbuf + resbufpos;
- eolp = strstr(hln, "\r\n");
- resbufpos = (eolp - resbuf) + 2;
-
- clen = 0;
- while (isxdigit(*hln)) {
- if (clen >= OFF_MAX / 16) {
- /* Nasty people... */
- goto conndied;
- }
- if (isdigit(*hln))
- clen = clen * 16 + *hln - '0';
- else
- clen = clen * 16 + 10 +
- tolower(*hln) - 'a';
- hln++;
- }
-
- error = copybytes(sd, fd, clen, resbuf,
- &resbuflen, &resbufpos);
- if (error) {
- goto conndied;
- }
- } while (clen != 0);
-
- /* Read trailer and final CRLF */
- do {
- error = readln(sd, resbuf, &resbuflen,
- &resbufpos);
- if (error)
- goto conndied;
- hln = resbuf + resbufpos;
- eolp = strstr(hln, "\r\n");
- resbufpos = (eolp - resbuf) + 2;
- } while (hln != eolp);
- } else if (contentlength != -1) {
- error = copybytes(sd, fd, contentlength, resbuf,
- &resbuflen, &resbufpos);
- if (error)
- goto conndied;
- } else {
- /*
- * Not chunked, and no content length header.
- * Read everything until the server closes the
- * socket.
- */
- error = copybytes(sd, fd, OFF_MAX, resbuf,
- &resbuflen, &resbufpos);
- if (error == -1)
- goto conndied;
- pipelined = 0;
- }
-
- if (fd != -1) {
- close(fd);
- fd = -1;
- }
-
- fprintf(stderr, "http://%s/%s: %d ", servername, argv[nres],
- statuscode);
- if (statuscode == 200)
- fprintf(stderr, "OK\n");
- else if (statuscode < 300)
- fprintf(stderr, "Successful (ignored)\n");
- else if (statuscode < 400)
- fprintf(stderr, "Redirection (ignored)\n");
- else
- fprintf(stderr, "Error (ignored)\n");
-
- /* We've finished this file! */
- nres++;
-
- /*
- * If necessary, clean up this connection so that we
- * can start a new one.
- */
- if (pipelined == 0 && keepalive == 0)
- goto cleanupconn;
- continue;
-
-conndied:
- /*
- * Something went wrong -- our connection died, the server
- * sent us garbage, etc. If this happened on the first
- * request we sent over this connection, give up. Otherwise,
- * close this connection, open a new one, and reissue the
- * request.
- */
- if (nres == firstreq)
- errx(1, "Connection failure");
-
-cleanupconn:
- /*
- * Clean up our connection and keep on going
- */
- shutdown(sd, SHUT_RDWR);
- close(sd);
- sd = -1;
- if (fd != -1) {
- close(fd);
- fd = -1;
- }
- if (reqbuf != NULL) {
- free(reqbuf);
- reqbuf = NULL;
- }
- nreq = nres;
- res = res0;
- pipelined = 0;
- resbufpos = resbuflen = 0;
- continue;
- }
-
- free(resbuf);
- freeaddrinfo(res0);
-
- return 0;
-}
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Sun, Oct 26, 9:28 AM (5 h, 34 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
24224252
Default Alt Text
D26255.diff (46 KB)
Attached To
Mode
D26255: phttpget: move out of portsnap
Attached
Detach File
Event Timeline
Log In to Comment