]>
Commit | Line | Data |
---|---|---|
be4401bf AL |
1 | // -*- mode: cpp; mode: fold -*- |
2 | // Description /*{{{*/ | |
2cbcabd8 | 3 | // $Id: http.cc,v 1.59 2004/05/08 19:42:35 mdz Exp $ |
be4401bf AL |
4 | /* ###################################################################### |
5 | ||
1e3f4083 | 6 | HTTP Acquire Method - This is the HTTP acquire method for APT. |
be4401bf AL |
7 | |
8 | It uses HTTP/1.1 and many of the fancy options there-in, such as | |
e836f356 AL |
9 | pipelining, range, if-range and so on. |
10 | ||
11 | It is based on a doubly buffered select loop. A groupe of requests are | |
be4401bf AL |
12 | fed into a single output buffer that is constantly fed out the |
13 | socket. This provides ideal pipelining as in many cases all of the | |
14 | requests will fit into a single packet. The input socket is buffered | |
e836f356 | 15 | the same way and fed into the fd for the file (may be a pipe in future). |
be4401bf AL |
16 | |
17 | This double buffering provides fairly substantial transfer rates, | |
18 | compared to wget the http method is about 4% faster. Most importantly, | |
19 | when HTTP is compared with FTP as a protocol the speed difference is | |
20 | huge. In tests over the internet from two sites to llug (via ATM) this | |
21 | program got 230k/s sustained http transfer rates. FTP on the other | |
22 | hand topped out at 170k/s. That combined with the time to setup the | |
23 | FTP connection makes HTTP a vastly superior protocol. | |
24 | ||
25 | ##################################################################### */ | |
26 | /*}}}*/ | |
27 | // Include Files /*{{{*/ | |
ea542140 DK |
28 | #include <config.h> |
29 | ||
be4401bf | 30 | #include <apt-pkg/fileutl.h> |
472ff00e | 31 | #include <apt-pkg/configuration.h> |
be4401bf | 32 | #include <apt-pkg/error.h> |
63b1700f | 33 | #include <apt-pkg/hashes.h> |
592b7800 | 34 | #include <apt-pkg/netrc.h> |
453b82a3 | 35 | #include <apt-pkg/strutl.h> |
c6ee61ea | 36 | #include <apt-pkg/proxy.h> |
be4401bf | 37 | |
453b82a3 DK |
38 | #include <stddef.h> |
39 | #include <stdlib.h> | |
40 | #include <sys/select.h> | |
41 | #include <cstring> | |
be4401bf AL |
42 | #include <sys/stat.h> |
43 | #include <sys/time.h> | |
be4401bf AL |
44 | #include <unistd.h> |
45 | #include <stdio.h> | |
65a1e968 | 46 | #include <errno.h> |
61db4824 | 47 | #include <arpa/inet.h> |
42195eb2 | 48 | #include <iostream> |
b123b0ba | 49 | #include <sstream> |
be4401bf | 50 | |
59b46c41 | 51 | #include "config.h" |
0837bd25 | 52 | #include "connect.h" |
be4401bf | 53 | #include "http.h" |
ea542140 DK |
54 | |
55 | #include <apti18n.h> | |
be4401bf | 56 | /*}}}*/ |
42195eb2 | 57 | using namespace std; |
be4401bf | 58 | |
650faab0 DK |
59 | unsigned long long CircleBuf::BwReadLimit=0; |
60 | unsigned long long CircleBuf::BwTickReadData=0; | |
7c6e2dc7 MV |
61 | struct timeval CircleBuf::BwReadTick={0,0}; |
62 | const unsigned int CircleBuf::BW_HZ=10; | |
d3e8fbb3 | 63 | |
be4401bf AL |
64 | // CircleBuf::CircleBuf - Circular input buffer /*{{{*/ |
65 | // --------------------------------------------------------------------- | |
66 | /* */ | |
30060442 | 67 | CircleBuf::CircleBuf(HttpMethod const * const Owner, unsigned long long Size) |
9224ce3d | 68 | : Size(Size), Hash(NULL), TotalWriten(0) |
be4401bf AL |
69 | { |
70 | Buf = new unsigned char[Size]; | |
71 | Reset(); | |
7c6e2dc7 | 72 | |
30060442 | 73 | CircleBuf::BwReadLimit = Owner->ConfigFindI("Dl-Limit", 0) * 1024; |
be4401bf AL |
74 | } |
75 | /*}}}*/ | |
76 | // CircleBuf::Reset - Reset to the default state /*{{{*/ | |
77 | // --------------------------------------------------------------------- | |
78 | /* */ | |
79 | void CircleBuf::Reset() | |
80 | { | |
81 | InP = 0; | |
82 | OutP = 0; | |
83 | StrPos = 0; | |
dcd5856b | 84 | TotalWriten = 0; |
650faab0 | 85 | MaxGet = (unsigned long long)-1; |
be4401bf | 86 | OutQueue = string(); |
9224ce3d | 87 | if (Hash != NULL) |
be4401bf | 88 | { |
63b1700f | 89 | delete Hash; |
9224ce3d | 90 | Hash = NULL; |
d3e8fbb3 DK |
91 | } |
92 | } | |
be4401bf AL |
93 | /*}}}*/ |
94 | // CircleBuf::Read - Read from a FD into the circular buffer /*{{{*/ | |
95 | // --------------------------------------------------------------------- | |
96 | /* This fills up the buffer with as much data as is in the FD, assuming it | |
97 | is non-blocking.. */ | |
98 | bool CircleBuf::Read(int Fd) | |
99 | { | |
100 | while (1) | |
101 | { | |
102 | // Woops, buffer is full | |
103 | if (InP - OutP == Size) | |
104 | return true; | |
7c6e2dc7 MV |
105 | |
106 | // what's left to read in this tick | |
9ce3cfc9 | 107 | unsigned long long const BwReadMax = CircleBuf::BwReadLimit/BW_HZ; |
7c6e2dc7 MV |
108 | |
109 | if(CircleBuf::BwReadLimit) { | |
110 | struct timeval now; | |
111 | gettimeofday(&now,0); | |
112 | ||
650faab0 | 113 | unsigned long long d = (now.tv_sec-CircleBuf::BwReadTick.tv_sec)*1000000 + |
7c6e2dc7 MV |
114 | now.tv_usec-CircleBuf::BwReadTick.tv_usec; |
115 | if(d > 1000000/BW_HZ) { | |
116 | CircleBuf::BwReadTick = now; | |
117 | CircleBuf::BwTickReadData = 0; | |
118 | } | |
119 | ||
120 | if(CircleBuf::BwTickReadData >= BwReadMax) { | |
121 | usleep(1000000/BW_HZ); | |
122 | return true; | |
123 | } | |
124 | } | |
125 | ||
be4401bf | 126 | // Write the buffer segment |
650faab0 | 127 | ssize_t Res; |
7c6e2dc7 MV |
128 | if(CircleBuf::BwReadLimit) { |
129 | Res = read(Fd,Buf + (InP%Size), | |
130 | BwReadMax > LeftRead() ? LeftRead() : BwReadMax); | |
131 | } else | |
132 | Res = read(Fd,Buf + (InP%Size),LeftRead()); | |
be4401bf | 133 | |
7c6e2dc7 MV |
134 | if(Res > 0 && BwReadLimit > 0) |
135 | CircleBuf::BwTickReadData += Res; | |
136 | ||
be4401bf AL |
137 | if (Res == 0) |
138 | return false; | |
139 | if (Res < 0) | |
140 | { | |
141 | if (errno == EAGAIN) | |
142 | return true; | |
143 | return false; | |
144 | } | |
145 | ||
146 | if (InP == 0) | |
147 | gettimeofday(&Start,0); | |
148 | InP += Res; | |
149 | } | |
150 | } | |
151 | /*}}}*/ | |
152 | // CircleBuf::Read - Put the string into the buffer /*{{{*/ | |
153 | // --------------------------------------------------------------------- | |
154 | /* This will hold the string in and fill the buffer with it as it empties */ | |
61db4824 | 155 | bool CircleBuf::Read(string const &Data) |
be4401bf | 156 | { |
61db4824 | 157 | OutQueue.append(Data); |
be4401bf AL |
158 | FillOut(); |
159 | return true; | |
160 | } | |
161 | /*}}}*/ | |
162 | // CircleBuf::FillOut - Fill the buffer from the output queue /*{{{*/ | |
163 | // --------------------------------------------------------------------- | |
164 | /* */ | |
165 | void CircleBuf::FillOut() | |
166 | { | |
167 | if (OutQueue.empty() == true) | |
168 | return; | |
169 | while (1) | |
170 | { | |
171 | // Woops, buffer is full | |
172 | if (InP - OutP == Size) | |
173 | return; | |
174 | ||
175 | // Write the buffer segment | |
650faab0 | 176 | unsigned long long Sz = LeftRead(); |
be4401bf AL |
177 | if (OutQueue.length() - StrPos < Sz) |
178 | Sz = OutQueue.length() - StrPos; | |
42195eb2 | 179 | memcpy(Buf + (InP%Size),OutQueue.c_str() + StrPos,Sz); |
be4401bf AL |
180 | |
181 | // Advance | |
182 | StrPos += Sz; | |
183 | InP += Sz; | |
184 | if (OutQueue.length() == StrPos) | |
185 | { | |
186 | StrPos = 0; | |
187 | OutQueue = ""; | |
188 | return; | |
189 | } | |
190 | } | |
191 | } | |
192 | /*}}}*/ | |
193 | // CircleBuf::Write - Write from the buffer into a FD /*{{{*/ | |
194 | // --------------------------------------------------------------------- | |
195 | /* This empties the buffer into the FD. */ | |
196 | bool CircleBuf::Write(int Fd) | |
197 | { | |
198 | while (1) | |
199 | { | |
200 | FillOut(); | |
201 | ||
202 | // Woops, buffer is empty | |
203 | if (OutP == InP) | |
204 | return true; | |
205 | ||
206 | if (OutP == MaxGet) | |
207 | return true; | |
208 | ||
209 | // Write the buffer segment | |
650faab0 | 210 | ssize_t Res; |
be4401bf AL |
211 | Res = write(Fd,Buf + (OutP%Size),LeftWrite()); |
212 | ||
213 | if (Res == 0) | |
214 | return false; | |
215 | if (Res < 0) | |
216 | { | |
217 | if (errno == EAGAIN) | |
218 | return true; | |
219 | ||
220 | return false; | |
221 | } | |
dcd5856b MV |
222 | |
223 | TotalWriten += Res; | |
be4401bf | 224 | |
9224ce3d | 225 | if (Hash != NULL) |
63b1700f | 226 | Hash->Add(Buf + (OutP%Size),Res); |
be4401bf AL |
227 | |
228 | OutP += Res; | |
229 | } | |
230 | } | |
231 | /*}}}*/ | |
232 | // CircleBuf::WriteTillEl - Write from the buffer to a string /*{{{*/ | |
233 | // --------------------------------------------------------------------- | |
234 | /* This copies till the first empty line */ | |
235 | bool CircleBuf::WriteTillEl(string &Data,bool Single) | |
236 | { | |
237 | // We cheat and assume it is unneeded to have more than one buffer load | |
650faab0 | 238 | for (unsigned long long I = OutP; I < InP; I++) |
be4401bf AL |
239 | { |
240 | if (Buf[I%Size] != '\n') | |
241 | continue; | |
2cbcabd8 | 242 | ++I; |
be4401bf AL |
243 | |
244 | if (Single == false) | |
245 | { | |
2cbcabd8 AL |
246 | if (I < InP && Buf[I%Size] == '\r') |
247 | ++I; | |
927c393f MV |
248 | if (I >= InP || Buf[I%Size] != '\n') |
249 | continue; | |
250 | ++I; | |
be4401bf AL |
251 | } |
252 | ||
be4401bf AL |
253 | Data = ""; |
254 | while (OutP < I) | |
255 | { | |
650faab0 | 256 | unsigned long long Sz = LeftWrite(); |
be4401bf AL |
257 | if (Sz == 0) |
258 | return false; | |
927c393f | 259 | if (I - OutP < Sz) |
be4401bf AL |
260 | Sz = I - OutP; |
261 | Data += string((char *)(Buf + (OutP%Size)),Sz); | |
262 | OutP += Sz; | |
263 | } | |
264 | return true; | |
265 | } | |
266 | return false; | |
267 | } | |
268 | /*}}}*/ | |
269 | // CircleBuf::Stats - Print out stats information /*{{{*/ | |
270 | // --------------------------------------------------------------------- | |
271 | /* */ | |
272 | void CircleBuf::Stats() | |
273 | { | |
274 | if (InP == 0) | |
275 | return; | |
276 | ||
277 | struct timeval Stop; | |
278 | gettimeofday(&Stop,0); | |
279 | /* float Diff = Stop.tv_sec - Start.tv_sec + | |
280 | (float)(Stop.tv_usec - Start.tv_usec)/1000000; | |
281 | clog << "Got " << InP << " in " << Diff << " at " << InP/Diff << endl;*/ | |
282 | } | |
283 | /*}}}*/ | |
472ff00e DK |
284 | CircleBuf::~CircleBuf() |
285 | { | |
286 | delete [] Buf; | |
287 | delete Hash; | |
288 | } | |
be4401bf | 289 | |
7330f4df | 290 | // HttpServerState::HttpServerState - Constructor /*{{{*/ |
30060442 | 291 | HttpServerState::HttpServerState(URI Srv,HttpMethod *Owner) : ServerState(Srv, Owner), In(Owner, 64*1024), Out(Owner, 4*1024) |
be4401bf | 292 | { |
30060442 | 293 | TimeOut = Owner->ConfigFindI("Timeout", TimeOut); |
be4401bf AL |
294 | Reset(); |
295 | } | |
296 | /*}}}*/ | |
7330f4df | 297 | // HttpServerState::Open - Open a connection to the server /*{{{*/ |
be4401bf AL |
298 | // --------------------------------------------------------------------- |
299 | /* This opens a connection to the server. */ | |
61db4824 DK |
300 | static bool TalkToSocksProxy(int const ServerFd, std::string const &Proxy, |
301 | char const * const type, bool const ReadWrite, uint8_t * const ToFrom, | |
302 | unsigned int const Size, unsigned int const Timeout) | |
303 | { | |
304 | if (WaitFd(ServerFd, ReadWrite, Timeout) == false) | |
305 | return _error->Error("Waiting for the SOCKS proxy %s to %s timed out", URI::SiteOnly(Proxy).c_str(), type); | |
306 | if (ReadWrite == false) | |
307 | { | |
308 | if (FileFd::Read(ServerFd, ToFrom, Size) == false) | |
309 | return _error->Error("Reading the %s from SOCKS proxy %s failed", type, URI::SiteOnly(Proxy).c_str()); | |
310 | } | |
311 | else | |
312 | { | |
313 | if (FileFd::Write(ServerFd, ToFrom, Size) == false) | |
314 | return _error->Error("Writing the %s to SOCKS proxy %s failed", type, URI::SiteOnly(Proxy).c_str()); | |
315 | } | |
316 | return true; | |
317 | } | |
7330f4df | 318 | bool HttpServerState::Open() |
be4401bf | 319 | { |
92e889c8 AL |
320 | // Use the already open connection if possible. |
321 | if (ServerFd != -1) | |
322 | return true; | |
323 | ||
be4401bf | 324 | Close(); |
492f957a AL |
325 | In.Reset(); |
326 | Out.Reset(); | |
e836f356 AL |
327 | Persistent = true; |
328 | ||
492f957a | 329 | // Determine the proxy setting |
c6ee61ea | 330 | AutoDetectProxy(ServerName); |
30060442 | 331 | string SpecificProxy = Owner->ConfigFind("Proxy::" + ServerName.Host, ""); |
788a8f42 | 332 | if (!SpecificProxy.empty()) |
492f957a | 333 | { |
788a8f42 EL |
334 | if (SpecificProxy == "DIRECT") |
335 | Proxy = ""; | |
336 | else | |
337 | Proxy = SpecificProxy; | |
352c2768 | 338 | } |
492f957a | 339 | else |
788a8f42 | 340 | { |
30060442 | 341 | string DefProxy = Owner->ConfigFind("Proxy", ""); |
788a8f42 EL |
342 | if (!DefProxy.empty()) |
343 | { | |
344 | Proxy = DefProxy; | |
345 | } | |
346 | else | |
347 | { | |
348 | char* result = getenv("http_proxy"); | |
349 | Proxy = result ? result : ""; | |
350 | } | |
351 | } | |
352c2768 | 352 | |
f8081133 | 353 | // Parse no_proxy, a , separated list of domains |
9e2a06ff AL |
354 | if (getenv("no_proxy") != 0) |
355 | { | |
f8081133 AL |
356 | if (CheckDomainList(ServerName.Host,getenv("no_proxy")) == true) |
357 | Proxy = ""; | |
358 | } | |
61db4824 | 359 | |
0568d325 DK |
360 | if (Proxy.empty() == false) |
361 | Owner->AddProxyAuth(Proxy, ServerName); | |
362 | ||
61db4824 | 363 | if (Proxy.Access == "socks5h") |
be4401bf | 364 | { |
61db4824 DK |
365 | if (Connect(Proxy.Host, Proxy.Port, "socks", 1080, ServerFd, TimeOut, Owner) == false) |
366 | return false; | |
367 | ||
368 | /* We implement a very basic SOCKS5 client here complying mostly to RFC1928 expect | |
369 | * for not offering GSSAPI auth which is a must (we only do no or user/pass auth). | |
370 | * We also expect the SOCKS5 server to do hostname lookup (aka socks5h) */ | |
371 | std::string const ProxyInfo = URI::SiteOnly(Proxy); | |
372 | Owner->Status(_("Connecting to %s (%s)"),"SOCKS5h proxy",ProxyInfo.c_str()); | |
373 | auto const Timeout = Owner->ConfigFindI("TimeOut", 120); | |
374 | #define APT_WriteOrFail(TYPE, DATA, LENGTH) if (TalkToSocksProxy(ServerFd, ProxyInfo, TYPE, true, DATA, LENGTH, Timeout) == false) return false | |
375 | #define APT_ReadOrFail(TYPE, DATA, LENGTH) if (TalkToSocksProxy(ServerFd, ProxyInfo, TYPE, false, DATA, LENGTH, Timeout) == false) return false | |
376 | if (ServerName.Host.length() > 255) | |
377 | return _error->Error("Can't use SOCKS5h as hostname %s is too long!", ServerName.Host.c_str()); | |
378 | if (Proxy.User.length() > 255 || Proxy.Password.length() > 255) | |
379 | return _error->Error("Can't use user&pass auth as they are too long (%lu and %lu) for the SOCKS5!", Proxy.User.length(), Proxy.Password.length()); | |
380 | if (Proxy.User.empty()) | |
381 | { | |
382 | uint8_t greeting[] = { 0x05, 0x01, 0x00 }; | |
383 | APT_WriteOrFail("greet-1", greeting, sizeof(greeting)); | |
384 | } | |
385 | else | |
386 | { | |
387 | uint8_t greeting[] = { 0x05, 0x02, 0x00, 0x02 }; | |
388 | APT_WriteOrFail("greet-2", greeting, sizeof(greeting)); | |
389 | } | |
390 | uint8_t greeting[2]; | |
391 | APT_ReadOrFail("greet back", greeting, sizeof(greeting)); | |
392 | if (greeting[0] != 0x05) | |
393 | return _error->Error("SOCKS proxy %s greets back with wrong version: %d", ProxyInfo.c_str(), greeting[0]); | |
394 | if (greeting[1] == 0x00) | |
395 | ; // no auth has no method-dependent sub-negotiations | |
396 | else if (greeting[1] == 0x02) | |
397 | { | |
398 | if (Proxy.User.empty()) | |
399 | return _error->Error("SOCKS proxy %s negotiated user&pass auth, but we had not offered it!", ProxyInfo.c_str()); | |
400 | // user&pass auth sub-negotiations are defined by RFC1929 | |
401 | std::vector<uint8_t> auth = {{ 0x01, static_cast<uint8_t>(Proxy.User.length()) }}; | |
402 | std::copy(Proxy.User.begin(), Proxy.User.end(), std::back_inserter(auth)); | |
403 | auth.push_back(static_cast<uint8_t>(Proxy.Password.length())); | |
404 | std::copy(Proxy.Password.begin(), Proxy.Password.end(), std::back_inserter(auth)); | |
405 | APT_WriteOrFail("user&pass auth", auth.data(), auth.size()); | |
406 | uint8_t authstatus[2]; | |
407 | APT_ReadOrFail("auth report", authstatus, sizeof(authstatus)); | |
408 | if (authstatus[0] != 0x01) | |
409 | return _error->Error("SOCKS proxy %s auth status response with wrong version: %d", ProxyInfo.c_str(), authstatus[0]); | |
410 | if (authstatus[1] != 0x00) | |
411 | return _error->Error("SOCKS proxy %s reported authorization failure: username or password incorrect? (%d)", ProxyInfo.c_str(), authstatus[1]); | |
412 | } | |
413 | else | |
414 | return _error->Error("SOCKS proxy %s greets back having not found a common authorization method: %d", ProxyInfo.c_str(), greeting[1]); | |
415 | union { uint16_t * i; uint8_t * b; } portu; | |
416 | uint16_t port = htons(static_cast<uint16_t>(ServerName.Port == 0 ? 80 : ServerName.Port)); | |
417 | portu.i = &port; | |
418 | std::vector<uint8_t> request = {{ 0x05, 0x01, 0x00, 0x03, static_cast<uint8_t>(ServerName.Host.length()) }}; | |
419 | std::copy(ServerName.Host.begin(), ServerName.Host.end(), std::back_inserter(request)); | |
420 | request.push_back(portu.b[0]); | |
421 | request.push_back(portu.b[1]); | |
422 | APT_WriteOrFail("request", request.data(), request.size()); | |
423 | uint8_t response[4]; | |
424 | APT_ReadOrFail("first part of response", response, sizeof(response)); | |
425 | if (response[0] != 0x05) | |
426 | return _error->Error("SOCKS proxy %s response with wrong version: %d", ProxyInfo.c_str(), response[0]); | |
427 | if (response[2] != 0x00) | |
428 | return _error->Error("SOCKS proxy %s has unexpected non-zero reserved field value: %d", ProxyInfo.c_str(), response[2]); | |
429 | std::string bindaddr; | |
430 | if (response[3] == 0x01) // IPv4 address | |
431 | { | |
432 | uint8_t ip4port[6]; | |
433 | APT_ReadOrFail("IPv4+Port of response", ip4port, sizeof(ip4port)); | |
434 | portu.b[0] = ip4port[4]; | |
435 | portu.b[1] = ip4port[5]; | |
436 | port = ntohs(*portu.i); | |
437 | strprintf(bindaddr, "%d.%d.%d.%d:%d", ip4port[0], ip4port[1], ip4port[2], ip4port[3], port); | |
438 | } | |
439 | else if (response[3] == 0x03) // hostname | |
440 | { | |
441 | uint8_t namelength; | |
442 | APT_ReadOrFail("hostname length of response", &namelength, 1); | |
443 | uint8_t hostname[namelength + 2]; | |
444 | APT_ReadOrFail("hostname of response", hostname, sizeof(hostname)); | |
445 | portu.b[0] = hostname[namelength]; | |
446 | portu.b[1] = hostname[namelength + 1]; | |
447 | port = ntohs(*portu.i); | |
448 | hostname[namelength] = '\0'; | |
449 | strprintf(bindaddr, "%s:%d", hostname, port); | |
450 | } | |
451 | else if (response[3] == 0x04) // IPv6 address | |
452 | { | |
453 | uint8_t ip6port[18]; | |
454 | APT_ReadOrFail("IPv6+port of response", ip6port, sizeof(ip6port)); | |
455 | portu.b[0] = ip6port[16]; | |
456 | portu.b[1] = ip6port[17]; | |
457 | port = ntohs(*portu.i); | |
458 | strprintf(bindaddr, "[%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X]:%d", | |
459 | ip6port[0], ip6port[1], ip6port[2], ip6port[3], ip6port[4], ip6port[5], ip6port[6], ip6port[7], | |
460 | ip6port[8], ip6port[9], ip6port[10], ip6port[11], ip6port[12], ip6port[13], ip6port[14], ip6port[15], | |
461 | port); | |
462 | } | |
463 | else | |
464 | return _error->Error("SOCKS proxy %s destination address is of unknown type: %d", | |
465 | ProxyInfo.c_str(), response[3]); | |
466 | if (response[1] != 0x00) | |
467 | { | |
e40a4a3e DK |
468 | char const * errstr = nullptr; |
469 | auto errcode = response[1]; | |
470 | // Tor error reporting can be a bit arcane, lets try to detect & fix it up | |
471 | if (bindaddr == "0.0.0.0:0") | |
61db4824 | 472 | { |
e40a4a3e DK |
473 | auto const lastdot = ServerName.Host.rfind('.'); |
474 | if (lastdot == std::string::npos || ServerName.Host.substr(lastdot) != ".onion") | |
475 | ; | |
476 | else if (errcode == 0x01) | |
477 | { | |
478 | auto const prevdot = ServerName.Host.rfind('.', lastdot - 1); | |
479 | if (lastdot == 16 && prevdot == std::string::npos) | |
480 | ; // valid .onion address | |
481 | else if (prevdot != std::string::npos && (lastdot - prevdot) == 17) | |
482 | ; // valid .onion address with subdomain(s) | |
483 | else | |
484 | { | |
485 | errstr = "Invalid hostname: onion service name must be 16 characters long"; | |
486 | Owner->SetFailReason("SOCKS"); | |
487 | } | |
488 | } | |
489 | // in all likelihood the service is either down or the address has | |
490 | // a typo and so "Host unreachable" is the better understood error | |
491 | // compared to the technically correct "TLL expired". | |
492 | else if (errcode == 0x06) | |
493 | errcode = 0x04; | |
61db4824 | 494 | } |
e40a4a3e DK |
495 | if (errstr == nullptr) |
496 | { | |
497 | switch (errcode) | |
498 | { | |
499 | case 0x01: errstr = "general SOCKS server failure"; Owner->SetFailReason("SOCKS"); break; | |
500 | case 0x02: errstr = "connection not allowed by ruleset"; Owner->SetFailReason("SOCKS"); break; | |
501 | case 0x03: errstr = "Network unreachable"; Owner->SetFailReason("ConnectionTimedOut"); break; | |
502 | case 0x04: errstr = "Host unreachable"; Owner->SetFailReason("ConnectionTimedOut"); break; | |
503 | case 0x05: errstr = "Connection refused"; Owner->SetFailReason("ConnectionRefused"); break; | |
504 | case 0x06: errstr = "TTL expired"; Owner->SetFailReason("Timeout"); break; | |
505 | case 0x07: errstr = "Command not supported"; Owner->SetFailReason("SOCKS"); break; | |
506 | case 0x08: errstr = "Address type not supported"; Owner->SetFailReason("SOCKS"); break; | |
507 | default: errstr = "Unknown error"; Owner->SetFailReason("SOCKS"); break; | |
508 | } | |
509 | } | |
510 | return _error->Error("SOCKS proxy %s could not connect to %s (%s) due to: %s (%d)", | |
511 | ProxyInfo.c_str(), ServerName.Host.c_str(), bindaddr.c_str(), errstr, response[1]); | |
61db4824 DK |
512 | } |
513 | else if (Owner->DebugEnabled()) | |
e40a4a3e DK |
514 | ioprintf(std::clog, "http: SOCKS proxy %s connection established to %s (%s)\n", |
515 | ProxyInfo.c_str(), ServerName.Host.c_str(), bindaddr.c_str()); | |
61db4824 DK |
516 | |
517 | if (WaitFd(ServerFd, true, Timeout) == false) | |
e40a4a3e DK |
518 | return _error->Error("SOCKS proxy %s reported connection to %s (%s), but timed out", |
519 | ProxyInfo.c_str(), ServerName.Host.c_str(), bindaddr.c_str()); | |
61db4824 DK |
520 | #undef APT_ReadOrFail |
521 | #undef APT_WriteOrFail | |
be4401bf AL |
522 | } |
523 | else | |
524 | { | |
61db4824 DK |
525 | // Determine what host and port to use based on the proxy settings |
526 | int Port = 0; | |
527 | string Host; | |
528 | if (Proxy.empty() == true || Proxy.Host.empty() == true) | |
529 | { | |
530 | if (ServerName.Port != 0) | |
531 | Port = ServerName.Port; | |
532 | Host = ServerName.Host; | |
533 | } | |
534 | else if (Proxy.Access != "http") | |
535 | return _error->Error("Unsupported proxy configured: %s", URI::SiteOnly(Proxy).c_str()); | |
536 | else | |
537 | { | |
538 | if (Proxy.Port != 0) | |
539 | Port = Proxy.Port; | |
540 | Host = Proxy.Host; | |
541 | } | |
542 | return Connect(Host,Port,"http",80,ServerFd,TimeOut,Owner); | |
be4401bf | 543 | } |
be4401bf AL |
544 | return true; |
545 | } | |
546 | /*}}}*/ | |
7330f4df | 547 | // HttpServerState::Close - Close a connection to the server /*{{{*/ |
be4401bf AL |
548 | // --------------------------------------------------------------------- |
549 | /* */ | |
7330f4df | 550 | bool HttpServerState::Close() |
be4401bf AL |
551 | { |
552 | close(ServerFd); | |
553 | ServerFd = -1; | |
be4401bf AL |
554 | return true; |
555 | } | |
556 | /*}}}*/ | |
7330f4df DK |
557 | // HttpServerState::RunData - Transfer the data from the socket /*{{{*/ |
558 | bool HttpServerState::RunData(FileFd * const File) | |
be4401bf AL |
559 | { |
560 | State = Data; | |
561 | ||
562 | // Chunked transfer encoding is fun.. | |
563 | if (Encoding == Chunked) | |
564 | { | |
565 | while (1) | |
566 | { | |
567 | // Grab the block size | |
568 | bool Last = true; | |
569 | string Data; | |
570 | In.Limit(-1); | |
571 | do | |
572 | { | |
573 | if (In.WriteTillEl(Data,true) == true) | |
574 | break; | |
575 | } | |
7330f4df | 576 | while ((Last = Go(false, File)) == true); |
be4401bf AL |
577 | |
578 | if (Last == false) | |
579 | return false; | |
580 | ||
581 | // See if we are done | |
650faab0 | 582 | unsigned long long Len = strtoull(Data.c_str(),0,16); |
be4401bf AL |
583 | if (Len == 0) |
584 | { | |
585 | In.Limit(-1); | |
586 | ||
587 | // We have to remove the entity trailer | |
588 | Last = true; | |
589 | do | |
590 | { | |
591 | if (In.WriteTillEl(Data,true) == true && Data.length() <= 2) | |
592 | break; | |
593 | } | |
7330f4df | 594 | while ((Last = Go(false, File)) == true); |
be4401bf AL |
595 | if (Last == false) |
596 | return false; | |
e1b96638 | 597 | return !_error->PendingError(); |
be4401bf AL |
598 | } |
599 | ||
600 | // Transfer the block | |
601 | In.Limit(Len); | |
7330f4df | 602 | while (Go(true, File) == true) |
be4401bf AL |
603 | if (In.IsLimit() == true) |
604 | break; | |
605 | ||
606 | // Error | |
607 | if (In.IsLimit() == false) | |
608 | return false; | |
609 | ||
610 | // The server sends an extra new line before the next block specifier.. | |
611 | In.Limit(-1); | |
612 | Last = true; | |
613 | do | |
614 | { | |
615 | if (In.WriteTillEl(Data,true) == true) | |
616 | break; | |
617 | } | |
7330f4df | 618 | while ((Last = Go(false, File)) == true); |
be4401bf AL |
619 | if (Last == false) |
620 | return false; | |
92e889c8 | 621 | } |
be4401bf AL |
622 | } |
623 | else | |
624 | { | |
625 | /* Closes encoding is used when the server did not specify a size, the | |
626 | loss of the connection means we are done */ | |
99968cf7 | 627 | if (JunkSize != 0) |
ed793a19 | 628 | In.Limit(JunkSize); |
99968cf7 | 629 | else if (DownloadSize != 0) |
ceafe8a6 | 630 | In.Limit(DownloadSize); |
99968cf7 DK |
631 | else if (Persistent == false) |
632 | In.Limit(-1); | |
be4401bf AL |
633 | |
634 | // Just transfer the whole block. | |
635 | do | |
636 | { | |
637 | if (In.IsLimit() == false) | |
638 | continue; | |
639 | ||
640 | In.Limit(-1); | |
e1b96638 | 641 | return !_error->PendingError(); |
be4401bf | 642 | } |
7330f4df | 643 | while (Go(true, File) == true); |
be4401bf AL |
644 | } |
645 | ||
7330f4df | 646 | return Owner->Flush() && !_error->PendingError(); |
be4401bf AL |
647 | } |
648 | /*}}}*/ | |
57401c48 DK |
649 | bool HttpServerState::RunDataToDevNull() /*{{{*/ |
650 | { | |
651 | FileFd DevNull("/dev/null", FileFd::WriteOnly); | |
652 | return RunData(&DevNull); | |
653 | } | |
654 | /*}}}*/ | |
7330f4df | 655 | bool HttpServerState::ReadHeaderLines(std::string &Data) /*{{{*/ |
be4401bf | 656 | { |
7330f4df DK |
657 | return In.WriteTillEl(Data); |
658 | } | |
659 | /*}}}*/ | |
660 | bool HttpServerState::LoadNextResponse(bool const ToFile, FileFd * const File)/*{{{*/ | |
661 | { | |
662 | return Go(ToFile, File); | |
663 | } | |
664 | /*}}}*/ | |
665 | bool HttpServerState::WriteResponse(const std::string &Data) /*{{{*/ | |
666 | { | |
667 | return Out.Read(Data); | |
668 | } | |
669 | /*}}}*/ | |
a02db58f | 670 | APT_PURE bool HttpServerState::IsOpen() /*{{{*/ |
7330f4df DK |
671 | { |
672 | return (ServerFd != -1); | |
673 | } | |
674 | /*}}}*/ | |
34faa8f7 | 675 | bool HttpServerState::InitHashes(HashStringList const &ExpectedHashes) /*{{{*/ |
7330f4df DK |
676 | { |
677 | delete In.Hash; | |
9224ce3d | 678 | In.Hash = new Hashes(ExpectedHashes); |
34faa8f7 | 679 | return true; |
7330f4df DK |
680 | } |
681 | /*}}}*/ | |
ebdb6f18 DK |
682 | void HttpServerState::Reset(bool const Everything) /*{{{*/ |
683 | { | |
684 | ServerState::Reset(Everything); | |
685 | if (Everything) | |
686 | ServerFd = -1; | |
687 | } | |
688 | /*}}}*/ | |
34faa8f7 | 689 | |
a02db58f | 690 | APT_PURE Hashes * HttpServerState::GetHashes() /*{{{*/ |
7330f4df DK |
691 | { |
692 | return In.Hash; | |
693 | } | |
694 | /*}}}*/ | |
695 | // HttpServerState::Die - The server has closed the connection. /*{{{*/ | |
44605518 | 696 | bool HttpServerState::Die(FileFd * const File) |
7330f4df DK |
697 | { |
698 | unsigned int LErrno = errno; | |
be4401bf | 699 | |
7330f4df DK |
700 | // Dump the buffer to the file |
701 | if (State == ServerState::Data) | |
be4401bf | 702 | { |
44605518 DK |
703 | if (File == nullptr) |
704 | return true; | |
7330f4df DK |
705 | // on GNU/kFreeBSD, apt dies on /dev/null because non-blocking |
706 | // can't be set | |
44605518 DK |
707 | if (File->Name() != "/dev/null") |
708 | SetNonBlock(File->Fd(),false); | |
7330f4df | 709 | while (In.WriteSpace() == true) |
be4401bf | 710 | { |
44605518 | 711 | if (In.Write(File->Fd()) == false) |
7330f4df | 712 | return _error->Errno("write",_("Error writing to the file")); |
e836f356 | 713 | |
7330f4df DK |
714 | // Done |
715 | if (In.IsLimit() == true) | |
716 | return true; | |
e836f356 | 717 | } |
7330f4df | 718 | } |
b2e465d6 | 719 | |
7330f4df DK |
720 | // See if this is because the server finished the data stream |
721 | if (In.IsLimit() == false && State != HttpServerState::Header && | |
117038ba | 722 | Persistent == true) |
be4401bf | 723 | { |
7330f4df DK |
724 | Close(); |
725 | if (LErrno == 0) | |
726 | return _error->Error(_("Error reading from server. Remote end closed connection")); | |
727 | errno = LErrno; | |
728 | return _error->Errno("read",_("Error reading from server")); | |
be4401bf | 729 | } |
7330f4df | 730 | else |
92e889c8 | 731 | { |
7330f4df DK |
732 | In.Limit(-1); |
733 | ||
734 | // Nothing left in the buffer | |
735 | if (In.WriteSpace() == false) | |
736 | return false; | |
737 | ||
738 | // We may have got multiple responses back in one packet.. | |
739 | Close(); | |
92e889c8 AL |
740 | return true; |
741 | } | |
331e8396 | 742 | |
7330f4df DK |
743 | return false; |
744 | } | |
745 | /*}}}*/ | |
746 | // HttpServerState::Flush - Dump the buffer into the file /*{{{*/ | |
747 | // --------------------------------------------------------------------- | |
748 | /* This takes the current input buffer from the Server FD and writes it | |
749 | into the file */ | |
750 | bool HttpServerState::Flush(FileFd * const File) | |
751 | { | |
752 | if (File != NULL) | |
753 | { | |
754 | // on GNU/kFreeBSD, apt dies on /dev/null because non-blocking | |
755 | // can't be set | |
756 | if (File->Name() != "/dev/null") | |
757 | SetNonBlock(File->Fd(),false); | |
758 | if (In.WriteSpace() == false) | |
759 | return true; | |
760 | ||
761 | while (In.WriteSpace() == true) | |
331e8396 | 762 | { |
7330f4df DK |
763 | if (In.Write(File->Fd()) == false) |
764 | return _error->Errno("write",_("Error writing to file")); | |
765 | if (In.IsLimit() == true) | |
766 | return true; | |
331e8396 | 767 | } |
7330f4df | 768 | |
117038ba | 769 | if (In.IsLimit() == true || Persistent == false) |
7330f4df | 770 | return true; |
be4401bf | 771 | } |
7330f4df DK |
772 | return false; |
773 | } | |
774 | /*}}}*/ | |
775 | // HttpServerState::Go - Run a single loop /*{{{*/ | |
776 | // --------------------------------------------------------------------- | |
777 | /* This runs the select loop over the server FDs, Output file FDs and | |
778 | stdin. */ | |
779 | bool HttpServerState::Go(bool ToFile, FileFd * const File) | |
780 | { | |
781 | // Server has closed the connection | |
782 | if (ServerFd == -1 && (In.WriteSpace() == false || | |
783 | ToFile == false)) | |
784 | return false; | |
785 | ||
786 | fd_set rfds,wfds; | |
787 | FD_ZERO(&rfds); | |
788 | FD_ZERO(&wfds); | |
789 | ||
790 | /* Add the server. We only send more requests if the connection will | |
791 | be persisting */ | |
792 | if (Out.WriteSpace() == true && ServerFd != -1 | |
793 | && Persistent == true) | |
794 | FD_SET(ServerFd,&wfds); | |
795 | if (In.ReadSpace() == true && ServerFd != -1) | |
796 | FD_SET(ServerFd,&rfds); | |
be4401bf | 797 | |
7330f4df DK |
798 | // Add the file |
799 | int FileFD = -1; | |
800 | if (File != NULL) | |
801 | FileFD = File->Fd(); | |
802 | ||
803 | if (In.WriteSpace() == true && ToFile == true && FileFD != -1) | |
804 | FD_SET(FileFD,&wfds); | |
805 | ||
806 | // Add stdin | |
30060442 | 807 | if (Owner->ConfigFindB("DependOnSTDIN", true) == true) |
7330f4df DK |
808 | FD_SET(STDIN_FILENO,&rfds); |
809 | ||
810 | // Figure out the max fd | |
811 | int MaxFd = FileFD; | |
812 | if (MaxFd < ServerFd) | |
813 | MaxFd = ServerFd; | |
814 | ||
815 | // Select | |
816 | struct timeval tv; | |
817 | tv.tv_sec = TimeOut; | |
818 | tv.tv_usec = 0; | |
819 | int Res = 0; | |
820 | if ((Res = select(MaxFd+1,&rfds,&wfds,0,&tv)) < 0) | |
be4401bf | 821 | { |
7330f4df DK |
822 | if (errno == EINTR) |
823 | return true; | |
824 | return _error->Errno("select",_("Select failed")); | |
be4401bf | 825 | } |
7330f4df DK |
826 | |
827 | if (Res == 0) | |
e836f356 | 828 | { |
7330f4df | 829 | _error->Error(_("Connection timed out")); |
44605518 | 830 | return Die(File); |
e836f356 AL |
831 | } |
832 | ||
7330f4df DK |
833 | // Handle server IO |
834 | if (ServerFd != -1 && FD_ISSET(ServerFd,&rfds)) | |
be4401bf | 835 | { |
7330f4df DK |
836 | errno = 0; |
837 | if (In.Read(ServerFd) == false) | |
44605518 | 838 | return Die(File); |
7330f4df DK |
839 | } |
840 | ||
841 | if (ServerFd != -1 && FD_ISSET(ServerFd,&wfds)) | |
842 | { | |
843 | errno = 0; | |
844 | if (Out.Write(ServerFd) == false) | |
44605518 | 845 | return Die(File); |
be4401bf AL |
846 | } |
847 | ||
7330f4df DK |
848 | // Send data to the file |
849 | if (FileFD != -1 && FD_ISSET(FileFD,&wfds)) | |
15d7e515 | 850 | { |
7330f4df DK |
851 | if (In.Write(FileFD) == false) |
852 | return _error->Errno("write",_("Error writing to output file")); | |
15d7e515 MV |
853 | } |
854 | ||
c48eea97 | 855 | if (MaximumSize > 0 && File && File->Tell() > MaximumSize) |
a2d40703 | 856 | { |
ee279506 | 857 | Owner->SetFailReason("MaximumSizeExceeded"); |
dcd5856b | 858 | return _error->Error("Writing more data than expected (%llu > %llu)", |
c48eea97 | 859 | File->Tell(), MaximumSize); |
a2d40703 | 860 | } |
dcd5856b | 861 | |
7330f4df DK |
862 | // Handle commands from APT |
863 | if (FD_ISSET(STDIN_FILENO,&rfds)) | |
864 | { | |
865 | if (Owner->Run(true) != -1) | |
866 | exit(100); | |
867 | } | |
868 | ||
be4401bf AL |
869 | return true; |
870 | } | |
871 | /*}}}*/ | |
872 | ||
873 | // HttpMethod::SendReq - Send the HTTP request /*{{{*/ | |
874 | // --------------------------------------------------------------------- | |
875 | /* This places the http request in the outbound buffer */ | |
7330f4df | 876 | void HttpMethod::SendReq(FetchItem *Itm) |
be4401bf AL |
877 | { |
878 | URI Uri = Itm->Uri; | |
30060442 DK |
879 | { |
880 | auto const plus = Binary.find('+'); | |
881 | if (plus != std::string::npos) | |
882 | Uri.Access = Binary.substr(plus + 1); | |
883 | } | |
c1a22377 | 884 | |
be4401bf | 885 | // The HTTP server expects a hostname with a trailing :port |
b123b0ba | 886 | std::stringstream Req; |
5b63d2a9 MV |
887 | string ProperHost; |
888 | ||
889 | if (Uri.Host.find(':') != string::npos) | |
890 | ProperHost = '[' + Uri.Host + ']'; | |
891 | else | |
892 | ProperHost = Uri.Host; | |
f2380a78 DK |
893 | |
894 | /* RFC 2616 ยง5.1.2 requires absolute URIs for requests to proxies, | |
895 | but while its a must for all servers to accept absolute URIs, | |
896 | it is assumed clients will sent an absolute path for non-proxies */ | |
897 | std::string requesturi; | |
61db4824 | 898 | if (Server->Proxy.Access != "http" || Server->Proxy.empty() == true || Server->Proxy.Host.empty()) |
f2380a78 DK |
899 | requesturi = Uri.Path; |
900 | else | |
30060442 | 901 | requesturi = Uri; |
f2380a78 DK |
902 | |
903 | // The "+" is encoded as a workaround for a amazon S3 bug | |
904 | // see LP bugs #1003633 and #1086997. | |
905 | requesturi = QuoteString(requesturi, "+~ "); | |
906 | ||
2b9c9b7f RG |
907 | /* Build the request. No keep-alive is included as it is the default |
908 | in 1.1, can cause problems with proxies, and we are an HTTP/1.1 | |
909 | client anyway. | |
910 | C.f. https://tools.ietf.org/wg/httpbis/trac/ticket/158 */ | |
b123b0ba DK |
911 | Req << "GET " << requesturi << " HTTP/1.1\r\n"; |
912 | if (Uri.Port != 0) | |
b58e2c7c | 913 | Req << "Host: " << ProperHost << ":" << std::to_string(Uri.Port) << "\r\n"; |
b123b0ba DK |
914 | else |
915 | Req << "Host: " << ProperHost << "\r\n"; | |
f2380a78 | 916 | |
c9cd3b70 | 917 | // generate a cache control header (if needed) |
30060442 | 918 | if (ConfigFindB("No-Cache",false) == true) |
b123b0ba DK |
919 | Req << "Cache-Control: no-cache\r\n" |
920 | << "Pragma: no-cache\r\n"; | |
921 | else if (Itm->IndexFile == true) | |
30060442 DK |
922 | Req << "Cache-Control: max-age=" << std::to_string(ConfigFindI("Max-Age", 0)) << "\r\n"; |
923 | else if (ConfigFindB("No-Store", false) == true) | |
b123b0ba | 924 | Req << "Cache-Control: no-store\r\n"; |
106e6740 | 925 | |
6f4501f9 | 926 | // If we ask for uncompressed files servers might respond with content- |
1e3f4083 | 927 | // negotiation which lets us end up with compressed files we do not support, |
6f4501f9 DK |
928 | // see 657029, 657560 and co, so if we have no extension on the request |
929 | // ask for text only. As a sidenote: If there is nothing to negotate servers | |
930 | // seem to be nice and ignore it. | |
30060442 | 931 | if (ConfigFindB("SendAccept", true) == true) |
6f4501f9 DK |
932 | { |
933 | size_t const filepos = Itm->Uri.find_last_of('/'); | |
934 | string const file = Itm->Uri.substr(filepos + 1); | |
935 | if (flExtension(file) == file) | |
b123b0ba | 936 | Req << "Accept: text/*\r\n"; |
6f4501f9 DK |
937 | } |
938 | ||
b123b0ba | 939 | // Check for a partial file and send if-queries accordingly |
be4401bf | 940 | struct stat SBuf; |
d94b1d80 | 941 | if (Server->RangesAllowed && stat(Itm->DestFile.c_str(),&SBuf) >= 0 && SBuf.st_size > 0) |
7303e11f | 942 | Req << "Range: bytes=" << std::to_string(SBuf.st_size) << "-\r\n" |
0b45b6e5 | 943 | << "If-Range: " << TimeRFC1123(SBuf.st_mtime, false) << "\r\n"; |
b123b0ba | 944 | else if (Itm->LastModified != 0) |
0b45b6e5 | 945 | Req << "If-Modified-Since: " << TimeRFC1123(Itm->LastModified, false).c_str() << "\r\n"; |
be4401bf | 946 | |
61db4824 DK |
947 | if (Server->Proxy.Access == "http" && |
948 | (Server->Proxy.User.empty() == false || Server->Proxy.Password.empty() == false)) | |
b123b0ba DK |
949 | Req << "Proxy-Authorization: Basic " |
950 | << Base64Encode(Server->Proxy.User + ":" + Server->Proxy.Password) << "\r\n"; | |
be4401bf | 951 | |
1de1f703 | 952 | maybe_add_auth (Uri, _config->FindFile("Dir::Etc::netrc")); |
b2e465d6 | 953 | if (Uri.User.empty() == false || Uri.Password.empty() == false) |
b123b0ba DK |
954 | Req << "Authorization: Basic " |
955 | << Base64Encode(Uri.User + ":" + Uri.Password) << "\r\n"; | |
956 | ||
30060442 | 957 | Req << "User-Agent: " << ConfigFind("User-Agent", |
b123b0ba DK |
958 | "Debian APT-HTTP/1.3 (" PACKAGE_VERSION ")") << "\r\n"; |
959 | ||
960 | Req << "\r\n"; | |
961 | ||
c98b1307 | 962 | if (Debug == true) |
7b734b09 | 963 | cerr << Req.str() << endl; |
c1a22377 | 964 | |
b123b0ba | 965 | Server->WriteResponse(Req.str()); |
be4401bf AL |
966 | } |
967 | /*}}}*/ | |
830a1b8c | 968 | std::unique_ptr<ServerState> HttpMethod::CreateServerState(URI const &uri)/*{{{*/ |
7330f4df | 969 | { |
830a1b8c | 970 | return std::unique_ptr<ServerState>(new HttpServerState(uri, this)); |
7330f4df DK |
971 | } |
972 | /*}}}*/ | |
fd46d305 DK |
973 | void HttpMethod::RotateDNS() /*{{{*/ |
974 | { | |
975 | ::RotateDNS(); | |
976 | } | |
977 | /*}}}*/ | |
4bba5a88 DK |
978 | ServerMethod::DealWithHeadersResult HttpMethod::DealWithHeaders(FetchResult &Res)/*{{{*/ |
979 | { | |
980 | auto ret = ServerMethod::DealWithHeaders(Res); | |
981 | if (ret != ServerMethod::FILE_IS_OPEN) | |
982 | return ret; | |
983 | ||
984 | // Open the file | |
985 | delete File; | |
986 | File = new FileFd(Queue->DestFile,FileFd::WriteAny); | |
987 | if (_error->PendingError() == true) | |
988 | return ERROR_NOT_FROM_SERVER; | |
989 | ||
990 | FailFile = Queue->DestFile; | |
991 | FailFile.c_str(); // Make sure we don't do a malloc in the signal handler | |
992 | FailFd = File->Fd(); | |
993 | FailTime = Server->Date; | |
994 | ||
995 | if (Server->InitHashes(Queue->ExpectedHashes) == false || Server->AddPartialFileToHashes(*File) == false) | |
996 | { | |
997 | _error->Errno("read",_("Problem hashing file")); | |
998 | return ERROR_NOT_FROM_SERVER; | |
999 | } | |
1000 | if (Server->StartPos > 0) | |
1001 | Res.ResumePoint = Server->StartPos; | |
1002 | ||
1003 | SetNonBlock(File->Fd(),true); | |
1004 | return FILE_IS_OPEN; | |
1005 | } | |
1006 | /*}}}*/ | |
30060442 DK |
1007 | HttpMethod::HttpMethod(std::string &&pProg) : ServerMethod(pProg.c_str(), "1.2", Pipeline | SendConfig)/*{{{*/ |
1008 | { | |
1009 | auto addName = std::inserter(methodNames, methodNames.begin()); | |
1010 | if (Binary != "http") | |
1011 | addName = "http"; | |
1012 | auto const plus = Binary.find('+'); | |
1013 | if (plus != std::string::npos) | |
1014 | addName = Binary.substr(0, plus); | |
1015 | File = 0; | |
1016 | Server = 0; | |
1017 | } | |
1018 | /*}}}*/ |