| 1 | // -*- mode: cpp; mode: fold -*- |
| 2 | // Description /*{{{*/ |
| 3 | // $Id: ftp.cc,v 1.31.2.1 2004/01/16 18:58:50 mdz Exp $ |
| 4 | /* ###################################################################### |
| 5 | |
| 6 | FTP Aquire Method - This is the FTP aquire method for APT. |
| 7 | |
| 8 | This is a very simple implementation that does not try to optimize |
| 9 | at all. Commands are sent syncronously with the FTP server (as the |
| 10 | rfc recommends, but it is not really necessary..) and no tricks are |
| 11 | done to speed things along. |
| 12 | |
| 13 | RFC 2428 describes the IPv6 FTP behavior |
| 14 | |
| 15 | ##################################################################### */ |
| 16 | /*}}}*/ |
| 17 | // Include Files /*{{{*/ |
| 18 | #include <apt-pkg/fileutl.h> |
| 19 | #include <apt-pkg/acquire-method.h> |
| 20 | #include <apt-pkg/error.h> |
| 21 | #include <apt-pkg/hashes.h> |
| 22 | #include <apt-pkg/netrc.h> |
| 23 | |
| 24 | #include <sys/stat.h> |
| 25 | #include <sys/time.h> |
| 26 | #include <utime.h> |
| 27 | #include <unistd.h> |
| 28 | #include <signal.h> |
| 29 | #include <stdio.h> |
| 30 | #include <errno.h> |
| 31 | #include <stdarg.h> |
| 32 | #include <iostream> |
| 33 | #include <apti18n.h> |
| 34 | |
| 35 | // Internet stuff |
| 36 | #include <netinet/in.h> |
| 37 | #include <sys/socket.h> |
| 38 | #include <arpa/inet.h> |
| 39 | #include <netdb.h> |
| 40 | |
| 41 | #include "rfc2553emu.h" |
| 42 | #include "connect.h" |
| 43 | #include "ftp.h" |
| 44 | /*}}}*/ |
| 45 | |
| 46 | using namespace std; |
| 47 | |
| 48 | /* This table is for the EPRT and EPSV commands, it maps the OS address |
| 49 | family to the IETF address families */ |
| 50 | struct AFMap |
| 51 | { |
| 52 | unsigned long Family; |
| 53 | unsigned long IETFFamily; |
| 54 | }; |
| 55 | |
| 56 | #ifndef AF_INET6 |
| 57 | struct AFMap AFMap[] = {{AF_INET,1},{}}; |
| 58 | #else |
| 59 | struct AFMap AFMap[] = {{AF_INET,1},{AF_INET6,2},{}}; |
| 60 | #endif |
| 61 | |
| 62 | unsigned long TimeOut = 120; |
| 63 | URI Proxy; |
| 64 | string FtpMethod::FailFile; |
| 65 | int FtpMethod::FailFd = -1; |
| 66 | time_t FtpMethod::FailTime = 0; |
| 67 | |
| 68 | // FTPConn::FTPConn - Constructor /*{{{*/ |
| 69 | // --------------------------------------------------------------------- |
| 70 | /* */ |
| 71 | FTPConn::FTPConn(URI Srv) : Len(0), ServerFd(-1), DataFd(-1), |
| 72 | DataListenFd(-1), ServerName(Srv) |
| 73 | { |
| 74 | Debug = _config->FindB("Debug::Acquire::Ftp",false); |
| 75 | PasvAddr = 0; |
| 76 | } |
| 77 | /*}}}*/ |
| 78 | // FTPConn::~FTPConn - Destructor /*{{{*/ |
| 79 | // --------------------------------------------------------------------- |
| 80 | /* */ |
| 81 | FTPConn::~FTPConn() |
| 82 | { |
| 83 | Close(); |
| 84 | } |
| 85 | /*}}}*/ |
| 86 | // FTPConn::Close - Close down the connection /*{{{*/ |
| 87 | // --------------------------------------------------------------------- |
| 88 | /* Just tear down the socket and data socket */ |
| 89 | void FTPConn::Close() |
| 90 | { |
| 91 | close(ServerFd); |
| 92 | ServerFd = -1; |
| 93 | close(DataFd); |
| 94 | DataFd = -1; |
| 95 | close(DataListenFd); |
| 96 | DataListenFd = -1; |
| 97 | |
| 98 | if (PasvAddr != 0) |
| 99 | freeaddrinfo(PasvAddr); |
| 100 | PasvAddr = 0; |
| 101 | } |
| 102 | /*}}}*/ |
| 103 | // FTPConn::Open - Open a new connection /*{{{*/ |
| 104 | // --------------------------------------------------------------------- |
| 105 | /* Connect to the server using a non-blocking connection and perform a |
| 106 | login. */ |
| 107 | bool FTPConn::Open(pkgAcqMethod *Owner) |
| 108 | { |
| 109 | // Use the already open connection if possible. |
| 110 | if (ServerFd != -1) |
| 111 | return true; |
| 112 | |
| 113 | Close(); |
| 114 | |
| 115 | // Determine the proxy setting |
| 116 | string SpecificProxy = _config->Find("Acquire::ftp::Proxy::" + ServerName.Host); |
| 117 | if (!SpecificProxy.empty()) |
| 118 | { |
| 119 | if (SpecificProxy == "DIRECT") |
| 120 | Proxy = ""; |
| 121 | else |
| 122 | Proxy = SpecificProxy; |
| 123 | } |
| 124 | else |
| 125 | { |
| 126 | string DefProxy = _config->Find("Acquire::ftp::Proxy"); |
| 127 | if (!DefProxy.empty()) |
| 128 | { |
| 129 | Proxy = DefProxy; |
| 130 | } |
| 131 | else |
| 132 | { |
| 133 | char* result = getenv("ftp_proxy"); |
| 134 | Proxy = result ? result : ""; |
| 135 | } |
| 136 | } |
| 137 | |
| 138 | // Parse no_proxy, a , separated list of domains |
| 139 | if (getenv("no_proxy") != 0) |
| 140 | { |
| 141 | if (CheckDomainList(ServerName.Host,getenv("no_proxy")) == true) |
| 142 | Proxy = ""; |
| 143 | } |
| 144 | |
| 145 | // Determine what host and port to use based on the proxy settings |
| 146 | int Port = 0; |
| 147 | string Host; |
| 148 | if (Proxy.empty() == true) |
| 149 | { |
| 150 | if (ServerName.Port != 0) |
| 151 | Port = ServerName.Port; |
| 152 | Host = ServerName.Host; |
| 153 | } |
| 154 | else |
| 155 | { |
| 156 | if (Proxy.Port != 0) |
| 157 | Port = Proxy.Port; |
| 158 | Host = Proxy.Host; |
| 159 | } |
| 160 | |
| 161 | /* Connect to the remote server. Since FTP is connection oriented we |
| 162 | want to make sure we get a new server every time we reconnect */ |
| 163 | RotateDNS(); |
| 164 | if (Connect(Host,Port,"ftp",21,ServerFd,TimeOut,Owner) == false) |
| 165 | return false; |
| 166 | |
| 167 | // Login must be before getpeername otherwise dante won't work. |
| 168 | Owner->Status(_("Logging in")); |
| 169 | bool Res = Login(); |
| 170 | |
| 171 | // Get the remote server's address |
| 172 | PeerAddrLen = sizeof(PeerAddr); |
| 173 | if (getpeername(ServerFd,(sockaddr *)&PeerAddr,&PeerAddrLen) != 0) |
| 174 | return _error->Errno("getpeername",_("Unable to determine the peer name")); |
| 175 | |
| 176 | // Get the local machine's address |
| 177 | ServerAddrLen = sizeof(ServerAddr); |
| 178 | if (getsockname(ServerFd,(sockaddr *)&ServerAddr,&ServerAddrLen) != 0) |
| 179 | return _error->Errno("getsockname",_("Unable to determine the local name")); |
| 180 | |
| 181 | return Res; |
| 182 | } |
| 183 | /*}}}*/ |
| 184 | // FTPConn::Login - Login to the remote server /*{{{*/ |
| 185 | // --------------------------------------------------------------------- |
| 186 | /* This performs both normal login and proxy login using a simples script |
| 187 | stored in the config file. */ |
| 188 | bool FTPConn::Login() |
| 189 | { |
| 190 | unsigned int Tag; |
| 191 | string Msg; |
| 192 | |
| 193 | // Setup the variables needed for authentication |
| 194 | string User = "anonymous"; |
| 195 | string Pass = "apt_get_ftp_2.1@debian.linux.user"; |
| 196 | |
| 197 | // Fill in the user/pass |
| 198 | if (ServerName.User.empty() == false) |
| 199 | User = ServerName.User; |
| 200 | if (ServerName.Password.empty() == false) |
| 201 | Pass = ServerName.Password; |
| 202 | |
| 203 | // Perform simple login |
| 204 | if (Proxy.empty() == true) |
| 205 | { |
| 206 | // Read the initial response |
| 207 | if (ReadResp(Tag,Msg) == false) |
| 208 | return false; |
| 209 | if (Tag >= 400) |
| 210 | return _error->Error(_("The server refused the connection and said: %s"),Msg.c_str()); |
| 211 | |
| 212 | // Send the user |
| 213 | if (WriteMsg(Tag,Msg,"USER %s",User.c_str()) == false) |
| 214 | return false; |
| 215 | if (Tag >= 400) |
| 216 | return _error->Error(_("USER failed, server said: %s"),Msg.c_str()); |
| 217 | |
| 218 | if (Tag == 331) { // 331 User name okay, need password. |
| 219 | // Send the Password |
| 220 | if (WriteMsg(Tag,Msg,"PASS %s",Pass.c_str()) == false) |
| 221 | return false; |
| 222 | if (Tag >= 400) |
| 223 | return _error->Error(_("PASS failed, server said: %s"),Msg.c_str()); |
| 224 | } |
| 225 | |
| 226 | // Enter passive mode |
| 227 | if (_config->Exists("Acquire::FTP::Passive::" + ServerName.Host) == true) |
| 228 | TryPassive = _config->FindB("Acquire::FTP::Passive::" + ServerName.Host,true); |
| 229 | else |
| 230 | TryPassive = _config->FindB("Acquire::FTP::Passive",true); |
| 231 | } |
| 232 | else |
| 233 | { |
| 234 | // Read the initial response |
| 235 | if (ReadResp(Tag,Msg) == false) |
| 236 | return false; |
| 237 | if (Tag >= 400) |
| 238 | return _error->Error(_("The server refused the connection and said: %s"),Msg.c_str()); |
| 239 | |
| 240 | // Perform proxy script execution |
| 241 | Configuration::Item const *Opts = _config->Tree("Acquire::ftp::ProxyLogin"); |
| 242 | if (Opts == 0 || Opts->Child == 0) |
| 243 | return _error->Error(_("A proxy server was specified but no login " |
| 244 | "script, Acquire::ftp::ProxyLogin is empty.")); |
| 245 | Opts = Opts->Child; |
| 246 | |
| 247 | // Iterate over the entire login script |
| 248 | for (; Opts != 0; Opts = Opts->Next) |
| 249 | { |
| 250 | if (Opts->Value.empty() == true) |
| 251 | continue; |
| 252 | |
| 253 | // Substitute the variables into the command |
| 254 | char SitePort[20]; |
| 255 | if (ServerName.Port != 0) |
| 256 | sprintf(SitePort,"%u",ServerName.Port); |
| 257 | else |
| 258 | strcpy(SitePort,"21"); |
| 259 | string Tmp = Opts->Value; |
| 260 | Tmp = SubstVar(Tmp,"$(PROXY_USER)",Proxy.User); |
| 261 | Tmp = SubstVar(Tmp,"$(PROXY_PASS)",Proxy.Password); |
| 262 | Tmp = SubstVar(Tmp,"$(SITE_USER)",User); |
| 263 | Tmp = SubstVar(Tmp,"$(SITE_PASS)",Pass); |
| 264 | Tmp = SubstVar(Tmp,"$(SITE_PORT)",SitePort); |
| 265 | Tmp = SubstVar(Tmp,"$(SITE)",ServerName.Host); |
| 266 | |
| 267 | // Send the command |
| 268 | if (WriteMsg(Tag,Msg,"%s",Tmp.c_str()) == false) |
| 269 | return false; |
| 270 | if (Tag >= 400) |
| 271 | return _error->Error(_("Login script command '%s' failed, server said: %s"),Tmp.c_str(),Msg.c_str()); |
| 272 | } |
| 273 | |
| 274 | // Enter passive mode |
| 275 | TryPassive = false; |
| 276 | if (_config->Exists("Acquire::FTP::Passive::" + ServerName.Host) == true) |
| 277 | TryPassive = _config->FindB("Acquire::FTP::Passive::" + ServerName.Host,true); |
| 278 | else |
| 279 | { |
| 280 | if (_config->Exists("Acquire::FTP::Proxy::Passive") == true) |
| 281 | TryPassive = _config->FindB("Acquire::FTP::Proxy::Passive",true); |
| 282 | else |
| 283 | TryPassive = _config->FindB("Acquire::FTP::Passive",true); |
| 284 | } |
| 285 | } |
| 286 | |
| 287 | // Force the use of extended commands |
| 288 | if (_config->Exists("Acquire::FTP::ForceExtended::" + ServerName.Host) == true) |
| 289 | ForceExtended = _config->FindB("Acquire::FTP::ForceExtended::" + ServerName.Host,true); |
| 290 | else |
| 291 | ForceExtended = _config->FindB("Acquire::FTP::ForceExtended",false); |
| 292 | |
| 293 | // Binary mode |
| 294 | if (WriteMsg(Tag,Msg,"TYPE I") == false) |
| 295 | return false; |
| 296 | if (Tag >= 400) |
| 297 | return _error->Error(_("TYPE failed, server said: %s"),Msg.c_str()); |
| 298 | |
| 299 | return true; |
| 300 | } |
| 301 | /*}}}*/ |
| 302 | // FTPConn::ReadLine - Read a line from the server /*{{{*/ |
| 303 | // --------------------------------------------------------------------- |
| 304 | /* This performs a very simple buffered read. */ |
| 305 | bool FTPConn::ReadLine(string &Text) |
| 306 | { |
| 307 | if (ServerFd == -1) |
| 308 | return false; |
| 309 | |
| 310 | // Suck in a line |
| 311 | while (Len < sizeof(Buffer)) |
| 312 | { |
| 313 | // Scan the buffer for a new line |
| 314 | for (unsigned int I = 0; I != Len; I++) |
| 315 | { |
| 316 | // Escape some special chars |
| 317 | if (Buffer[I] == 0) |
| 318 | Buffer[I] = '?'; |
| 319 | |
| 320 | // End of line? |
| 321 | if (Buffer[I] != '\n') |
| 322 | continue; |
| 323 | |
| 324 | I++; |
| 325 | Text = string(Buffer,I); |
| 326 | memmove(Buffer,Buffer+I,Len - I); |
| 327 | Len -= I; |
| 328 | return true; |
| 329 | } |
| 330 | |
| 331 | // Wait for some data.. |
| 332 | if (WaitFd(ServerFd,false,TimeOut) == false) |
| 333 | { |
| 334 | Close(); |
| 335 | return _error->Error(_("Connection timeout")); |
| 336 | } |
| 337 | |
| 338 | // Suck it back |
| 339 | int Res = read(ServerFd,Buffer + Len,sizeof(Buffer) - Len); |
| 340 | if (Res == 0) |
| 341 | _error->Error(_("Server closed the connection")); |
| 342 | if (Res <= 0) |
| 343 | { |
| 344 | _error->Errno("read",_("Read error")); |
| 345 | Close(); |
| 346 | return false; |
| 347 | } |
| 348 | Len += Res; |
| 349 | } |
| 350 | |
| 351 | return _error->Error(_("A response overflowed the buffer.")); |
| 352 | } |
| 353 | /*}}}*/ |
| 354 | // FTPConn::ReadResp - Read a full response from the server /*{{{*/ |
| 355 | // --------------------------------------------------------------------- |
| 356 | /* This reads a reply code from the server, it handles both p */ |
| 357 | bool FTPConn::ReadResp(unsigned int &Ret,string &Text) |
| 358 | { |
| 359 | // Grab the first line of the response |
| 360 | string Msg; |
| 361 | if (ReadLine(Msg) == false) |
| 362 | return false; |
| 363 | |
| 364 | // Get the ID code |
| 365 | char *End; |
| 366 | Ret = strtol(Msg.c_str(),&End,10); |
| 367 | if (End - Msg.c_str() != 3) |
| 368 | return _error->Error(_("Protocol corruption")); |
| 369 | |
| 370 | // All done ? |
| 371 | Text = Msg.c_str()+4; |
| 372 | if (*End == ' ') |
| 373 | { |
| 374 | if (Debug == true) |
| 375 | cerr << "<- '" << QuoteString(Text,"") << "'" << endl; |
| 376 | return true; |
| 377 | } |
| 378 | |
| 379 | if (*End != '-') |
| 380 | return _error->Error(_("Protocol corruption")); |
| 381 | |
| 382 | /* Okay, here we do the continued message trick. This is foolish, but |
| 383 | proftpd follows the protocol as specified and wu-ftpd doesn't, so |
| 384 | we filter. I wonder how many clients break if you use proftpd and |
| 385 | put a '- in the 3rd spot in the message? */ |
| 386 | char Leader[4]; |
| 387 | strncpy(Leader,Msg.c_str(),3); |
| 388 | Leader[3] = 0; |
| 389 | while (ReadLine(Msg) == true) |
| 390 | { |
| 391 | // Short, it must be using RFC continuation.. |
| 392 | if (Msg.length() < 4) |
| 393 | { |
| 394 | Text += Msg; |
| 395 | continue; |
| 396 | } |
| 397 | |
| 398 | // Oops, finished |
| 399 | if (strncmp(Msg.c_str(),Leader,3) == 0 && Msg[3] == ' ') |
| 400 | { |
| 401 | Text += Msg.c_str()+4; |
| 402 | break; |
| 403 | } |
| 404 | |
| 405 | // This message has the wu-ftpd style reply code prefixed |
| 406 | if (strncmp(Msg.c_str(),Leader,3) == 0 && Msg[3] == '-') |
| 407 | { |
| 408 | Text += Msg.c_str()+4; |
| 409 | continue; |
| 410 | } |
| 411 | |
| 412 | // Must be RFC style prefixing |
| 413 | Text += Msg; |
| 414 | } |
| 415 | |
| 416 | if (Debug == true && _error->PendingError() == false) |
| 417 | cerr << "<- '" << QuoteString(Text,"") << "'" << endl; |
| 418 | |
| 419 | return !_error->PendingError(); |
| 420 | } |
| 421 | /*}}}*/ |
| 422 | // FTPConn::WriteMsg - Send a message to the server /*{{{*/ |
| 423 | // --------------------------------------------------------------------- |
| 424 | /* Simple printf like function.. */ |
| 425 | bool FTPConn::WriteMsg(unsigned int &Ret,string &Text,const char *Fmt,...) |
| 426 | { |
| 427 | va_list args; |
| 428 | va_start(args,Fmt); |
| 429 | |
| 430 | // sprintf the description |
| 431 | char S[400]; |
| 432 | vsnprintf(S,sizeof(S) - 4,Fmt,args); |
| 433 | strcat(S,"\r\n"); |
| 434 | |
| 435 | if (Debug == true) |
| 436 | cerr << "-> '" << QuoteString(S,"") << "'" << endl; |
| 437 | |
| 438 | // Send it off |
| 439 | unsigned long Len = strlen(S); |
| 440 | unsigned long Start = 0; |
| 441 | while (Len != 0) |
| 442 | { |
| 443 | if (WaitFd(ServerFd,true,TimeOut) == false) |
| 444 | { |
| 445 | Close(); |
| 446 | return _error->Error(_("Connection timeout")); |
| 447 | } |
| 448 | |
| 449 | int Res = write(ServerFd,S + Start,Len); |
| 450 | if (Res <= 0) |
| 451 | { |
| 452 | _error->Errno("write",_("Write error")); |
| 453 | Close(); |
| 454 | return false; |
| 455 | } |
| 456 | |
| 457 | Len -= Res; |
| 458 | Start += Res; |
| 459 | } |
| 460 | |
| 461 | return ReadResp(Ret,Text); |
| 462 | } |
| 463 | /*}}}*/ |
| 464 | // FTPConn::GoPasv - Enter Passive mode /*{{{*/ |
| 465 | // --------------------------------------------------------------------- |
| 466 | /* Try to enter passive mode, the return code does not indicate if passive |
| 467 | mode could or could not be established, only if there was a fatal error. |
| 468 | We have to enter passive mode every time we make a data connection :| */ |
| 469 | bool FTPConn::GoPasv() |
| 470 | { |
| 471 | /* The PASV command only works on IPv4 sockets, even though it could |
| 472 | in theory suppory IPv6 via an all zeros reply */ |
| 473 | if (((struct sockaddr *)&PeerAddr)->sa_family != AF_INET || |
| 474 | ForceExtended == true) |
| 475 | return ExtGoPasv(); |
| 476 | |
| 477 | if (PasvAddr != 0) |
| 478 | freeaddrinfo(PasvAddr); |
| 479 | PasvAddr = 0; |
| 480 | |
| 481 | // Try to enable pasv mode |
| 482 | unsigned int Tag; |
| 483 | string Msg; |
| 484 | if (WriteMsg(Tag,Msg,"PASV") == false) |
| 485 | return false; |
| 486 | |
| 487 | // Unsupported function |
| 488 | string::size_type Pos = Msg.find('('); |
| 489 | if (Tag >= 400 || Pos == string::npos) |
| 490 | return true; |
| 491 | |
| 492 | // Scan it |
| 493 | unsigned a0,a1,a2,a3,p0,p1; |
| 494 | if (sscanf(Msg.c_str() + Pos,"(%u,%u,%u,%u,%u,%u)",&a0,&a1,&a2,&a3,&p0,&p1) != 6) |
| 495 | return true; |
| 496 | |
| 497 | /* Some evil servers return 0 to mean their addr. We can actually speak |
| 498 | to these servers natively using IPv6 */ |
| 499 | if (a0 == 0 && a1 == 0 && a2 == 0 && a3 == 0) |
| 500 | { |
| 501 | // Get the IP in text form |
| 502 | char Name[NI_MAXHOST]; |
| 503 | char Service[NI_MAXSERV]; |
| 504 | getnameinfo((struct sockaddr *)&PeerAddr,PeerAddrLen, |
| 505 | Name,sizeof(Name),Service,sizeof(Service), |
| 506 | NI_NUMERICHOST|NI_NUMERICSERV); |
| 507 | |
| 508 | struct addrinfo Hints; |
| 509 | memset(&Hints,0,sizeof(Hints)); |
| 510 | Hints.ai_socktype = SOCK_STREAM; |
| 511 | Hints.ai_family = ((struct sockaddr *)&PeerAddr)->sa_family; |
| 512 | Hints.ai_flags |= AI_NUMERICHOST; |
| 513 | |
| 514 | // Get a new passive address. |
| 515 | char Port[100]; |
| 516 | snprintf(Port,sizeof(Port),"%u",(p0 << 8) + p1); |
| 517 | if (getaddrinfo(Name,Port,&Hints,&PasvAddr) != 0) |
| 518 | return true; |
| 519 | return true; |
| 520 | } |
| 521 | |
| 522 | struct addrinfo Hints; |
| 523 | memset(&Hints,0,sizeof(Hints)); |
| 524 | Hints.ai_socktype = SOCK_STREAM; |
| 525 | Hints.ai_family = AF_INET; |
| 526 | Hints.ai_flags |= AI_NUMERICHOST; |
| 527 | |
| 528 | // Get a new passive address. |
| 529 | char Port[100]; |
| 530 | snprintf(Port,sizeof(Port),"%u",(p0 << 8) + p1); |
| 531 | char Name[100]; |
| 532 | snprintf(Name,sizeof(Name),"%u.%u.%u.%u",a0,a1,a2,a3); |
| 533 | if (getaddrinfo(Name,Port,&Hints,&PasvAddr) != 0) |
| 534 | return true; |
| 535 | return true; |
| 536 | } |
| 537 | /*}}}*/ |
| 538 | // FTPConn::ExtGoPasv - Enter Extended Passive mode /*{{{*/ |
| 539 | // --------------------------------------------------------------------- |
| 540 | /* Try to enter extended passive mode. See GoPasv above and RFC 2428 */ |
| 541 | bool FTPConn::ExtGoPasv() |
| 542 | { |
| 543 | if (PasvAddr != 0) |
| 544 | freeaddrinfo(PasvAddr); |
| 545 | PasvAddr = 0; |
| 546 | |
| 547 | // Try to enable pasv mode |
| 548 | unsigned int Tag; |
| 549 | string Msg; |
| 550 | if (WriteMsg(Tag,Msg,"EPSV") == false) |
| 551 | return false; |
| 552 | |
| 553 | // Unsupported function |
| 554 | string::size_type Pos = Msg.find('('); |
| 555 | if (Tag >= 400 || Pos == string::npos) |
| 556 | return true; |
| 557 | |
| 558 | // Scan it |
| 559 | string::const_iterator List[4]; |
| 560 | unsigned Count = 0; |
| 561 | Pos++; |
| 562 | for (string::const_iterator I = Msg.begin() + Pos; I < Msg.end(); I++) |
| 563 | { |
| 564 | if (*I != Msg[Pos]) |
| 565 | continue; |
| 566 | if (Count >= 4) |
| 567 | return true; |
| 568 | List[Count++] = I; |
| 569 | } |
| 570 | if (Count != 4) |
| 571 | return true; |
| 572 | |
| 573 | // Break it up .. |
| 574 | unsigned long Proto = 0; |
| 575 | unsigned long Port = 0; |
| 576 | string IP; |
| 577 | IP = string(List[1]+1,List[2]); |
| 578 | Port = atoi(string(List[2]+1,List[3]).c_str()); |
| 579 | if (IP.empty() == false) |
| 580 | Proto = atoi(string(List[0]+1,List[1]).c_str()); |
| 581 | |
| 582 | if (Port == 0) |
| 583 | return false; |
| 584 | |
| 585 | // String version of the port |
| 586 | char PStr[100]; |
| 587 | snprintf(PStr,sizeof(PStr),"%lu",Port); |
| 588 | |
| 589 | // Get the IP in text form |
| 590 | struct addrinfo Hints; |
| 591 | memset(&Hints,0,sizeof(Hints)); |
| 592 | Hints.ai_socktype = SOCK_STREAM; |
| 593 | Hints.ai_flags |= AI_NUMERICHOST; |
| 594 | |
| 595 | /* The RFC defined case, connect to the old IP/protocol using the |
| 596 | new port. */ |
| 597 | if (IP.empty() == true) |
| 598 | { |
| 599 | // Get the IP in text form |
| 600 | char Name[NI_MAXHOST]; |
| 601 | char Service[NI_MAXSERV]; |
| 602 | getnameinfo((struct sockaddr *)&PeerAddr,PeerAddrLen, |
| 603 | Name,sizeof(Name),Service,sizeof(Service), |
| 604 | NI_NUMERICHOST|NI_NUMERICSERV); |
| 605 | IP = Name; |
| 606 | Hints.ai_family = ((struct sockaddr *)&PeerAddr)->sa_family; |
| 607 | } |
| 608 | else |
| 609 | { |
| 610 | // Get the family.. |
| 611 | Hints.ai_family = 0; |
| 612 | for (unsigned J = 0; AFMap[J].Family != 0; J++) |
| 613 | if (AFMap[J].IETFFamily == Proto) |
| 614 | Hints.ai_family = AFMap[J].Family; |
| 615 | if (Hints.ai_family == 0) |
| 616 | return true; |
| 617 | } |
| 618 | |
| 619 | // Get a new passive address. |
| 620 | int Res; |
| 621 | if ((Res = getaddrinfo(IP.c_str(),PStr,&Hints,&PasvAddr)) != 0) |
| 622 | return true; |
| 623 | |
| 624 | return true; |
| 625 | } |
| 626 | /*}}}*/ |
| 627 | // FTPConn::Size - Return the size of a file /*{{{*/ |
| 628 | // --------------------------------------------------------------------- |
| 629 | /* Grab the file size from the server, 0 means no size or empty file */ |
| 630 | bool FTPConn::Size(const char *Path,unsigned long &Size) |
| 631 | { |
| 632 | // Query the size |
| 633 | unsigned int Tag; |
| 634 | string Msg; |
| 635 | Size = 0; |
| 636 | if (WriteMsg(Tag,Msg,"SIZE %s",Path) == false) |
| 637 | return false; |
| 638 | |
| 639 | char *End; |
| 640 | Size = strtol(Msg.c_str(),&End,10); |
| 641 | if (Tag >= 400 || End == Msg.c_str()) |
| 642 | Size = 0; |
| 643 | return true; |
| 644 | } |
| 645 | /*}}}*/ |
| 646 | // FTPConn::ModTime - Return the modification time of the file /*{{{*/ |
| 647 | // --------------------------------------------------------------------- |
| 648 | /* Like Size no error is returned if the command is not supported. If the |
| 649 | command fails then time is set to the current time of day to fool |
| 650 | date checks. */ |
| 651 | bool FTPConn::ModTime(const char *Path, time_t &Time) |
| 652 | { |
| 653 | Time = time(&Time); |
| 654 | |
| 655 | // Query the mod time |
| 656 | unsigned int Tag; |
| 657 | string Msg; |
| 658 | if (WriteMsg(Tag,Msg,"MDTM %s",Path) == false) |
| 659 | return false; |
| 660 | if (Tag >= 400 || Msg.empty() == true || isdigit(Msg[0]) == 0) |
| 661 | return true; |
| 662 | |
| 663 | // Parse it |
| 664 | return FTPMDTMStrToTime(Msg.c_str(), Time); |
| 665 | } |
| 666 | /*}}}*/ |
| 667 | // FTPConn::CreateDataFd - Get a data connection /*{{{*/ |
| 668 | // --------------------------------------------------------------------- |
| 669 | /* Create the data connection. Call FinalizeDataFd after this though.. */ |
| 670 | bool FTPConn::CreateDataFd() |
| 671 | { |
| 672 | close(DataFd); |
| 673 | DataFd = -1; |
| 674 | |
| 675 | // Attempt to enter passive mode. |
| 676 | if (TryPassive == true) |
| 677 | { |
| 678 | if (GoPasv() == false) |
| 679 | return false; |
| 680 | |
| 681 | // Oops, didn't work out, don't bother trying again. |
| 682 | if (PasvAddr == 0) |
| 683 | TryPassive = false; |
| 684 | } |
| 685 | |
| 686 | // Passive mode? |
| 687 | if (PasvAddr != 0) |
| 688 | { |
| 689 | // Get a socket |
| 690 | if ((DataFd = socket(PasvAddr->ai_family,PasvAddr->ai_socktype, |
| 691 | PasvAddr->ai_protocol)) < 0) |
| 692 | return _error->Errno("socket",_("Could not create a socket")); |
| 693 | |
| 694 | // Connect to the server |
| 695 | SetNonBlock(DataFd,true); |
| 696 | if (connect(DataFd,PasvAddr->ai_addr,PasvAddr->ai_addrlen) < 0 && |
| 697 | errno != EINPROGRESS) |
| 698 | return _error->Errno("socket",_("Could not create a socket")); |
| 699 | |
| 700 | /* This implements a timeout for connect by opening the connection |
| 701 | nonblocking */ |
| 702 | if (WaitFd(DataFd,true,TimeOut) == false) |
| 703 | return _error->Error(_("Could not connect data socket, connection timed out")); |
| 704 | unsigned int Err; |
| 705 | unsigned int Len = sizeof(Err); |
| 706 | if (getsockopt(DataFd,SOL_SOCKET,SO_ERROR,&Err,&Len) != 0) |
| 707 | return _error->Errno("getsockopt",_("Failed")); |
| 708 | if (Err != 0) |
| 709 | return _error->Error(_("Could not connect passive socket.")); |
| 710 | |
| 711 | return true; |
| 712 | } |
| 713 | |
| 714 | // Port mode :< |
| 715 | close(DataListenFd); |
| 716 | DataListenFd = -1; |
| 717 | |
| 718 | // Get the information for a listening socket. |
| 719 | struct addrinfo *BindAddr = 0; |
| 720 | struct addrinfo Hints; |
| 721 | memset(&Hints,0,sizeof(Hints)); |
| 722 | Hints.ai_socktype = SOCK_STREAM; |
| 723 | Hints.ai_flags |= AI_PASSIVE; |
| 724 | Hints.ai_family = ((struct sockaddr *)&ServerAddr)->sa_family; |
| 725 | int Res; |
| 726 | if ((Res = getaddrinfo(0,"0",&Hints,&BindAddr)) != 0) |
| 727 | return _error->Error(_("getaddrinfo was unable to get a listening socket")); |
| 728 | |
| 729 | // Construct the socket |
| 730 | if ((DataListenFd = socket(BindAddr->ai_family,BindAddr->ai_socktype, |
| 731 | BindAddr->ai_protocol)) < 0) |
| 732 | { |
| 733 | freeaddrinfo(BindAddr); |
| 734 | return _error->Errno("socket",_("Could not create a socket")); |
| 735 | } |
| 736 | |
| 737 | // Bind and listen |
| 738 | if (bind(DataListenFd,BindAddr->ai_addr,BindAddr->ai_addrlen) < 0) |
| 739 | { |
| 740 | freeaddrinfo(BindAddr); |
| 741 | return _error->Errno("bind",_("Could not bind a socket")); |
| 742 | } |
| 743 | freeaddrinfo(BindAddr); |
| 744 | if (listen(DataListenFd,1) < 0) |
| 745 | return _error->Errno("listen",_("Could not listen on the socket")); |
| 746 | SetNonBlock(DataListenFd,true); |
| 747 | |
| 748 | // Determine the name to send to the remote |
| 749 | struct sockaddr_storage Addr; |
| 750 | socklen_t AddrLen = sizeof(Addr); |
| 751 | if (getsockname(DataListenFd,(sockaddr *)&Addr,&AddrLen) < 0) |
| 752 | return _error->Errno("getsockname",_("Could not determine the socket's name")); |
| 753 | |
| 754 | |
| 755 | // Reverse the address. We need the server address and the data port. |
| 756 | char Name[NI_MAXHOST]; |
| 757 | char Service[NI_MAXSERV]; |
| 758 | char Service2[NI_MAXSERV]; |
| 759 | getnameinfo((struct sockaddr *)&Addr,AddrLen, |
| 760 | Name,sizeof(Name),Service,sizeof(Service), |
| 761 | NI_NUMERICHOST|NI_NUMERICSERV); |
| 762 | getnameinfo((struct sockaddr *)&ServerAddr,ServerAddrLen, |
| 763 | Name,sizeof(Name),Service2,sizeof(Service2), |
| 764 | NI_NUMERICHOST|NI_NUMERICSERV); |
| 765 | |
| 766 | // Send off an IPv4 address in the old port format |
| 767 | if (((struct sockaddr *)&Addr)->sa_family == AF_INET && |
| 768 | ForceExtended == false) |
| 769 | { |
| 770 | // Convert the dots in the quad into commas |
| 771 | for (char *I = Name; *I != 0; I++) |
| 772 | if (*I == '.') |
| 773 | *I = ','; |
| 774 | unsigned long Port = atoi(Service); |
| 775 | |
| 776 | // Send the port command |
| 777 | unsigned int Tag; |
| 778 | string Msg; |
| 779 | if (WriteMsg(Tag,Msg,"PORT %s,%d,%d", |
| 780 | Name, |
| 781 | (int)(Port >> 8) & 0xff, (int)(Port & 0xff)) == false) |
| 782 | return false; |
| 783 | if (Tag >= 400) |
| 784 | return _error->Error(_("Unable to send PORT command")); |
| 785 | return true; |
| 786 | } |
| 787 | |
| 788 | // Construct an EPRT command |
| 789 | unsigned Proto = 0; |
| 790 | for (unsigned J = 0; AFMap[J].Family != 0; J++) |
| 791 | if (AFMap[J].Family == ((struct sockaddr *)&Addr)->sa_family) |
| 792 | Proto = AFMap[J].IETFFamily; |
| 793 | if (Proto == 0) |
| 794 | return _error->Error(_("Unknown address family %u (AF_*)"), |
| 795 | ((struct sockaddr *)&Addr)->sa_family); |
| 796 | |
| 797 | // Send the EPRT command |
| 798 | unsigned int Tag; |
| 799 | string Msg; |
| 800 | if (WriteMsg(Tag,Msg,"EPRT |%u|%s|%s|",Proto,Name,Service) == false) |
| 801 | return false; |
| 802 | if (Tag >= 400) |
| 803 | return _error->Error(_("EPRT failed, server said: %s"),Msg.c_str()); |
| 804 | return true; |
| 805 | } |
| 806 | /*}}}*/ |
| 807 | // FTPConn::Finalize - Complete the Data connection /*{{{*/ |
| 808 | // --------------------------------------------------------------------- |
| 809 | /* If the connection is in port mode this waits for the other end to hook |
| 810 | up to us. */ |
| 811 | bool FTPConn::Finalize() |
| 812 | { |
| 813 | // Passive mode? Do nothing |
| 814 | if (PasvAddr != 0) |
| 815 | return true; |
| 816 | |
| 817 | // Close any old socket.. |
| 818 | close(DataFd); |
| 819 | DataFd = -1; |
| 820 | |
| 821 | // Wait for someone to connect.. |
| 822 | if (WaitFd(DataListenFd,false,TimeOut) == false) |
| 823 | return _error->Error(_("Data socket connect timed out")); |
| 824 | |
| 825 | // Accept the connection |
| 826 | struct sockaddr_in Addr; |
| 827 | socklen_t Len = sizeof(Addr); |
| 828 | DataFd = accept(DataListenFd,(struct sockaddr *)&Addr,&Len); |
| 829 | if (DataFd < 0) |
| 830 | return _error->Errno("accept",_("Unable to accept connection")); |
| 831 | |
| 832 | close(DataListenFd); |
| 833 | DataListenFd = -1; |
| 834 | |
| 835 | return true; |
| 836 | } |
| 837 | /*}}}*/ |
| 838 | // FTPConn::Get - Get a file /*{{{*/ |
| 839 | // --------------------------------------------------------------------- |
| 840 | /* This opens a data connection, sends REST and RETR and then |
| 841 | transfers the file over. */ |
| 842 | bool FTPConn::Get(const char *Path,FileFd &To,unsigned long Resume, |
| 843 | Hashes &Hash,bool &Missing) |
| 844 | { |
| 845 | Missing = false; |
| 846 | if (CreateDataFd() == false) |
| 847 | return false; |
| 848 | |
| 849 | unsigned int Tag; |
| 850 | string Msg; |
| 851 | if (Resume != 0) |
| 852 | { |
| 853 | if (WriteMsg(Tag,Msg,"REST %u",Resume) == false) |
| 854 | return false; |
| 855 | if (Tag >= 400) |
| 856 | Resume = 0; |
| 857 | } |
| 858 | |
| 859 | if (To.Truncate(Resume) == false) |
| 860 | return false; |
| 861 | |
| 862 | if (To.Seek(0) == false) |
| 863 | return false; |
| 864 | |
| 865 | if (Resume != 0) |
| 866 | { |
| 867 | if (Hash.AddFD(To.Fd(),Resume) == false) |
| 868 | { |
| 869 | _error->Errno("read",_("Problem hashing file")); |
| 870 | return false; |
| 871 | } |
| 872 | } |
| 873 | |
| 874 | // Send the get command |
| 875 | if (WriteMsg(Tag,Msg,"RETR %s",Path) == false) |
| 876 | return false; |
| 877 | |
| 878 | if (Tag >= 400) |
| 879 | { |
| 880 | if (Tag == 550) |
| 881 | Missing = true; |
| 882 | return _error->Error(_("Unable to fetch file, server said '%s'"),Msg.c_str()); |
| 883 | } |
| 884 | |
| 885 | // Finish off the data connection |
| 886 | if (Finalize() == false) |
| 887 | return false; |
| 888 | |
| 889 | // Copy loop |
| 890 | unsigned char Buffer[4096]; |
| 891 | while (1) |
| 892 | { |
| 893 | // Wait for some data.. |
| 894 | if (WaitFd(DataFd,false,TimeOut) == false) |
| 895 | { |
| 896 | Close(); |
| 897 | return _error->Error(_("Data socket timed out")); |
| 898 | } |
| 899 | |
| 900 | // Read the data.. |
| 901 | int Res = read(DataFd,Buffer,sizeof(Buffer)); |
| 902 | if (Res == 0) |
| 903 | break; |
| 904 | if (Res < 0) |
| 905 | { |
| 906 | if (errno == EAGAIN) |
| 907 | continue; |
| 908 | break; |
| 909 | } |
| 910 | |
| 911 | Hash.Add(Buffer,Res); |
| 912 | if (To.Write(Buffer,Res) == false) |
| 913 | { |
| 914 | Close(); |
| 915 | return false; |
| 916 | } |
| 917 | } |
| 918 | |
| 919 | // All done |
| 920 | close(DataFd); |
| 921 | DataFd = -1; |
| 922 | |
| 923 | // Read the closing message from the server |
| 924 | if (ReadResp(Tag,Msg) == false) |
| 925 | return false; |
| 926 | if (Tag >= 400) |
| 927 | return _error->Error(_("Data transfer failed, server said '%s'"),Msg.c_str()); |
| 928 | return true; |
| 929 | } |
| 930 | /*}}}*/ |
| 931 | |
| 932 | // FtpMethod::FtpMethod - Constructor /*{{{*/ |
| 933 | // --------------------------------------------------------------------- |
| 934 | /* */ |
| 935 | FtpMethod::FtpMethod() : pkgAcqMethod("1.0",SendConfig) |
| 936 | { |
| 937 | signal(SIGTERM,SigTerm); |
| 938 | signal(SIGINT,SigTerm); |
| 939 | |
| 940 | Server = 0; |
| 941 | FailFd = -1; |
| 942 | } |
| 943 | /*}}}*/ |
| 944 | // FtpMethod::SigTerm - Handle a fatal signal /*{{{*/ |
| 945 | // --------------------------------------------------------------------- |
| 946 | /* This closes and timestamps the open file. This is neccessary to get |
| 947 | resume behavoir on user abort */ |
| 948 | void FtpMethod::SigTerm(int) |
| 949 | { |
| 950 | if (FailFd == -1) |
| 951 | _exit(100); |
| 952 | close(FailFd); |
| 953 | |
| 954 | // Timestamp |
| 955 | struct utimbuf UBuf; |
| 956 | UBuf.actime = FailTime; |
| 957 | UBuf.modtime = FailTime; |
| 958 | utime(FailFile.c_str(),&UBuf); |
| 959 | |
| 960 | _exit(100); |
| 961 | } |
| 962 | /*}}}*/ |
| 963 | // FtpMethod::Configuration - Handle a configuration message /*{{{*/ |
| 964 | // --------------------------------------------------------------------- |
| 965 | /* We stash the desired pipeline depth */ |
| 966 | bool FtpMethod::Configuration(string Message) |
| 967 | { |
| 968 | if (pkgAcqMethod::Configuration(Message) == false) |
| 969 | return false; |
| 970 | |
| 971 | TimeOut = _config->FindI("Acquire::Ftp::Timeout",TimeOut); |
| 972 | return true; |
| 973 | } |
| 974 | /*}}}*/ |
| 975 | // FtpMethod::Fetch - Fetch a file /*{{{*/ |
| 976 | // --------------------------------------------------------------------- |
| 977 | /* Fetch a single file, called by the base class.. */ |
| 978 | bool FtpMethod::Fetch(FetchItem *Itm) |
| 979 | { |
| 980 | URI Get = Itm->Uri; |
| 981 | const char *File = Get.Path.c_str(); |
| 982 | FetchResult Res; |
| 983 | Res.Filename = Itm->DestFile; |
| 984 | Res.IMSHit = false; |
| 985 | |
| 986 | maybe_add_auth (Get, _config->FindFile("Dir::Etc::netrc")); |
| 987 | |
| 988 | // Connect to the server |
| 989 | if (Server == 0 || Server->Comp(Get) == false) |
| 990 | { |
| 991 | delete Server; |
| 992 | Server = new FTPConn(Get); |
| 993 | } |
| 994 | |
| 995 | // Could not connect is a transient error.. |
| 996 | if (Server->Open(this) == false) |
| 997 | { |
| 998 | Server->Close(); |
| 999 | Fail(true); |
| 1000 | return true; |
| 1001 | } |
| 1002 | |
| 1003 | // Get the files information |
| 1004 | Status(_("Query")); |
| 1005 | unsigned long Size; |
| 1006 | if (Server->Size(File,Size) == false || |
| 1007 | Server->ModTime(File,FailTime) == false) |
| 1008 | { |
| 1009 | Fail(true); |
| 1010 | return true; |
| 1011 | } |
| 1012 | Res.Size = Size; |
| 1013 | |
| 1014 | // See if it is an IMS hit |
| 1015 | if (Itm->LastModified == FailTime) |
| 1016 | { |
| 1017 | Res.Size = 0; |
| 1018 | Res.IMSHit = true; |
| 1019 | URIDone(Res); |
| 1020 | return true; |
| 1021 | } |
| 1022 | |
| 1023 | // See if the file exists |
| 1024 | struct stat Buf; |
| 1025 | if (stat(Itm->DestFile.c_str(),&Buf) == 0) |
| 1026 | { |
| 1027 | if (Size == (unsigned)Buf.st_size && FailTime == Buf.st_mtime) |
| 1028 | { |
| 1029 | Res.Size = Buf.st_size; |
| 1030 | Res.LastModified = Buf.st_mtime; |
| 1031 | Res.ResumePoint = Buf.st_size; |
| 1032 | URIDone(Res); |
| 1033 | return true; |
| 1034 | } |
| 1035 | |
| 1036 | // Resume? |
| 1037 | if (FailTime == Buf.st_mtime && Size > (unsigned)Buf.st_size) |
| 1038 | Res.ResumePoint = Buf.st_size; |
| 1039 | } |
| 1040 | |
| 1041 | // Open the file |
| 1042 | Hashes Hash; |
| 1043 | { |
| 1044 | FileFd Fd(Itm->DestFile,FileFd::WriteAny); |
| 1045 | if (_error->PendingError() == true) |
| 1046 | return false; |
| 1047 | |
| 1048 | URIStart(Res); |
| 1049 | |
| 1050 | FailFile = Itm->DestFile; |
| 1051 | FailFile.c_str(); // Make sure we dont do a malloc in the signal handler |
| 1052 | FailFd = Fd.Fd(); |
| 1053 | |
| 1054 | bool Missing; |
| 1055 | if (Server->Get(File,Fd,Res.ResumePoint,Hash,Missing) == false) |
| 1056 | { |
| 1057 | Fd.Close(); |
| 1058 | |
| 1059 | // Timestamp |
| 1060 | struct utimbuf UBuf; |
| 1061 | UBuf.actime = FailTime; |
| 1062 | UBuf.modtime = FailTime; |
| 1063 | utime(FailFile.c_str(),&UBuf); |
| 1064 | |
| 1065 | // If the file is missing we hard fail and delete the destfile |
| 1066 | // otherwise transient fail |
| 1067 | if (Missing == true) { |
| 1068 | unlink(FailFile.c_str()); |
| 1069 | return false; |
| 1070 | } |
| 1071 | Fail(true); |
| 1072 | return true; |
| 1073 | } |
| 1074 | |
| 1075 | Res.Size = Fd.Size(); |
| 1076 | } |
| 1077 | |
| 1078 | Res.LastModified = FailTime; |
| 1079 | Res.TakeHashes(Hash); |
| 1080 | |
| 1081 | // Timestamp |
| 1082 | struct utimbuf UBuf; |
| 1083 | UBuf.actime = FailTime; |
| 1084 | UBuf.modtime = FailTime; |
| 1085 | utime(Queue->DestFile.c_str(),&UBuf); |
| 1086 | FailFd = -1; |
| 1087 | |
| 1088 | URIDone(Res); |
| 1089 | |
| 1090 | return true; |
| 1091 | } |
| 1092 | /*}}}*/ |
| 1093 | |
| 1094 | int main(int argc,const char *argv[]) |
| 1095 | { |
| 1096 | setlocale(LC_ALL, ""); |
| 1097 | |
| 1098 | /* See if we should be come the http client - we do this for http |
| 1099 | proxy urls */ |
| 1100 | if (getenv("ftp_proxy") != 0) |
| 1101 | { |
| 1102 | URI Proxy = string(getenv("ftp_proxy")); |
| 1103 | |
| 1104 | // Run the HTTP method |
| 1105 | if (Proxy.Access == "http") |
| 1106 | { |
| 1107 | // Copy over the environment setting |
| 1108 | char S[300]; |
| 1109 | snprintf(S,sizeof(S),"http_proxy=%s",getenv("ftp_proxy")); |
| 1110 | putenv(S); |
| 1111 | putenv((char *)"no_proxy="); |
| 1112 | |
| 1113 | // Run the http method |
| 1114 | string Path = flNotFile(argv[0]) + "http"; |
| 1115 | execl(Path.c_str(),Path.c_str(),(char *)NULL); |
| 1116 | cerr << _("Unable to invoke ") << Path << endl; |
| 1117 | exit(100); |
| 1118 | } |
| 1119 | } |
| 1120 | |
| 1121 | FtpMethod Mth; |
| 1122 | |
| 1123 | return Mth.Run(); |
| 1124 | } |