]>
Commit | Line | Data |
---|---|---|
1 | // -*- mode: cpp; mode: fold -*- | |
2 | // Description /*{{{*/ | |
3 | // $Id: http.cc,v 1.59 2004/05/08 19:42:35 mdz Exp $ | |
4 | /* ###################################################################### | |
5 | ||
6 | HTTP Acquire Method - This is the HTTP acquire method for APT. | |
7 | ||
8 | It uses HTTP/1.1 and many of the fancy options there-in, such as | |
9 | pipelining, range, if-range and so on. | |
10 | ||
11 | It is based on a doubly buffered select loop. A groupe of requests are | |
12 | fed into a single output buffer that is constantly fed out the | |
13 | socket. This provides ideal pipelining as in many cases all of the | |
14 | requests will fit into a single packet. The input socket is buffered | |
15 | the same way and fed into the fd for the file (may be a pipe in future). | |
16 | ||
17 | This double buffering provides fairly substantial transfer rates, | |
18 | compared to wget the http method is about 4% faster. Most importantly, | |
19 | when HTTP is compared with FTP as a protocol the speed difference is | |
20 | huge. In tests over the internet from two sites to llug (via ATM) this | |
21 | program got 230k/s sustained http transfer rates. FTP on the other | |
22 | hand topped out at 170k/s. That combined with the time to setup the | |
23 | FTP connection makes HTTP a vastly superior protocol. | |
24 | ||
25 | ##################################################################### */ | |
26 | /*}}}*/ | |
27 | // Include Files /*{{{*/ | |
28 | #include <config.h> | |
29 | ||
30 | #include <apt-pkg/fileutl.h> | |
31 | #include <apt-pkg/configuration.h> | |
32 | #include <apt-pkg/error.h> | |
33 | #include <apt-pkg/hashes.h> | |
34 | #include <apt-pkg/netrc.h> | |
35 | #include <apt-pkg/strutl.h> | |
36 | #include <apt-pkg/proxy.h> | |
37 | ||
38 | #include <stddef.h> | |
39 | #include <stdlib.h> | |
40 | #include <sys/select.h> | |
41 | #include <cstring> | |
42 | #include <sys/stat.h> | |
43 | #include <sys/time.h> | |
44 | #include <unistd.h> | |
45 | #include <stdio.h> | |
46 | #include <errno.h> | |
47 | #include <arpa/inet.h> | |
48 | #include <iostream> | |
49 | #include <sstream> | |
50 | ||
51 | #include "config.h" | |
52 | #include "connect.h" | |
53 | #include "http.h" | |
54 | ||
55 | #include <apti18n.h> | |
56 | /*}}}*/ | |
57 | using namespace std; | |
58 | ||
59 | unsigned long long CircleBuf::BwReadLimit=0; | |
60 | unsigned long long CircleBuf::BwTickReadData=0; | |
61 | struct timeval CircleBuf::BwReadTick={0,0}; | |
62 | const unsigned int CircleBuf::BW_HZ=10; | |
63 | ||
64 | // CircleBuf::CircleBuf - Circular input buffer /*{{{*/ | |
65 | // --------------------------------------------------------------------- | |
66 | /* */ | |
67 | CircleBuf::CircleBuf(HttpMethod const * const Owner, unsigned long long Size) | |
68 | : Size(Size), Hash(NULL), TotalWriten(0) | |
69 | { | |
70 | Buf = new unsigned char[Size]; | |
71 | Reset(); | |
72 | ||
73 | CircleBuf::BwReadLimit = Owner->ConfigFindI("Dl-Limit", 0) * 1024; | |
74 | } | |
75 | /*}}}*/ | |
76 | // CircleBuf::Reset - Reset to the default state /*{{{*/ | |
77 | // --------------------------------------------------------------------- | |
78 | /* */ | |
79 | void CircleBuf::Reset() | |
80 | { | |
81 | InP = 0; | |
82 | OutP = 0; | |
83 | StrPos = 0; | |
84 | TotalWriten = 0; | |
85 | MaxGet = (unsigned long long)-1; | |
86 | OutQueue = string(); | |
87 | if (Hash != NULL) | |
88 | { | |
89 | delete Hash; | |
90 | Hash = NULL; | |
91 | } | |
92 | } | |
93 | /*}}}*/ | |
94 | // CircleBuf::Read - Read from a FD into the circular buffer /*{{{*/ | |
95 | // --------------------------------------------------------------------- | |
96 | /* This fills up the buffer with as much data as is in the FD, assuming it | |
97 | is non-blocking.. */ | |
98 | bool CircleBuf::Read(int Fd) | |
99 | { | |
100 | while (1) | |
101 | { | |
102 | // Woops, buffer is full | |
103 | if (InP - OutP == Size) | |
104 | return true; | |
105 | ||
106 | // what's left to read in this tick | |
107 | unsigned long long const BwReadMax = CircleBuf::BwReadLimit/BW_HZ; | |
108 | ||
109 | if(CircleBuf::BwReadLimit) { | |
110 | struct timeval now; | |
111 | gettimeofday(&now,0); | |
112 | ||
113 | unsigned long long d = (now.tv_sec-CircleBuf::BwReadTick.tv_sec)*1000000 + | |
114 | now.tv_usec-CircleBuf::BwReadTick.tv_usec; | |
115 | if(d > 1000000/BW_HZ) { | |
116 | CircleBuf::BwReadTick = now; | |
117 | CircleBuf::BwTickReadData = 0; | |
118 | } | |
119 | ||
120 | if(CircleBuf::BwTickReadData >= BwReadMax) { | |
121 | usleep(1000000/BW_HZ); | |
122 | return true; | |
123 | } | |
124 | } | |
125 | ||
126 | // Write the buffer segment | |
127 | ssize_t Res; | |
128 | if(CircleBuf::BwReadLimit) { | |
129 | Res = read(Fd,Buf + (InP%Size), | |
130 | BwReadMax > LeftRead() ? LeftRead() : BwReadMax); | |
131 | } else | |
132 | Res = read(Fd,Buf + (InP%Size),LeftRead()); | |
133 | ||
134 | if(Res > 0 && BwReadLimit > 0) | |
135 | CircleBuf::BwTickReadData += Res; | |
136 | ||
137 | if (Res == 0) | |
138 | return false; | |
139 | if (Res < 0) | |
140 | { | |
141 | if (errno == EAGAIN) | |
142 | return true; | |
143 | return false; | |
144 | } | |
145 | ||
146 | if (InP == 0) | |
147 | gettimeofday(&Start,0); | |
148 | InP += Res; | |
149 | } | |
150 | } | |
151 | /*}}}*/ | |
152 | // CircleBuf::Read - Put the string into the buffer /*{{{*/ | |
153 | // --------------------------------------------------------------------- | |
154 | /* This will hold the string in and fill the buffer with it as it empties */ | |
155 | bool CircleBuf::Read(string const &Data) | |
156 | { | |
157 | OutQueue.append(Data); | |
158 | FillOut(); | |
159 | return true; | |
160 | } | |
161 | /*}}}*/ | |
162 | // CircleBuf::FillOut - Fill the buffer from the output queue /*{{{*/ | |
163 | // --------------------------------------------------------------------- | |
164 | /* */ | |
165 | void CircleBuf::FillOut() | |
166 | { | |
167 | if (OutQueue.empty() == true) | |
168 | return; | |
169 | while (1) | |
170 | { | |
171 | // Woops, buffer is full | |
172 | if (InP - OutP == Size) | |
173 | return; | |
174 | ||
175 | // Write the buffer segment | |
176 | unsigned long long Sz = LeftRead(); | |
177 | if (OutQueue.length() - StrPos < Sz) | |
178 | Sz = OutQueue.length() - StrPos; | |
179 | memcpy(Buf + (InP%Size),OutQueue.c_str() + StrPos,Sz); | |
180 | ||
181 | // Advance | |
182 | StrPos += Sz; | |
183 | InP += Sz; | |
184 | if (OutQueue.length() == StrPos) | |
185 | { | |
186 | StrPos = 0; | |
187 | OutQueue = ""; | |
188 | return; | |
189 | } | |
190 | } | |
191 | } | |
192 | /*}}}*/ | |
193 | // CircleBuf::Write - Write from the buffer into a FD /*{{{*/ | |
194 | // --------------------------------------------------------------------- | |
195 | /* This empties the buffer into the FD. */ | |
196 | bool CircleBuf::Write(int Fd) | |
197 | { | |
198 | while (1) | |
199 | { | |
200 | FillOut(); | |
201 | ||
202 | // Woops, buffer is empty | |
203 | if (OutP == InP) | |
204 | return true; | |
205 | ||
206 | if (OutP == MaxGet) | |
207 | return true; | |
208 | ||
209 | // Write the buffer segment | |
210 | ssize_t Res; | |
211 | Res = write(Fd,Buf + (OutP%Size),LeftWrite()); | |
212 | ||
213 | if (Res == 0) | |
214 | return false; | |
215 | if (Res < 0) | |
216 | { | |
217 | if (errno == EAGAIN) | |
218 | return true; | |
219 | ||
220 | return false; | |
221 | } | |
222 | ||
223 | TotalWriten += Res; | |
224 | ||
225 | if (Hash != NULL) | |
226 | Hash->Add(Buf + (OutP%Size),Res); | |
227 | ||
228 | OutP += Res; | |
229 | } | |
230 | } | |
231 | /*}}}*/ | |
232 | // CircleBuf::WriteTillEl - Write from the buffer to a string /*{{{*/ | |
233 | // --------------------------------------------------------------------- | |
234 | /* This copies till the first empty line */ | |
235 | bool CircleBuf::WriteTillEl(string &Data,bool Single) | |
236 | { | |
237 | // We cheat and assume it is unneeded to have more than one buffer load | |
238 | for (unsigned long long I = OutP; I < InP; I++) | |
239 | { | |
240 | if (Buf[I%Size] != '\n') | |
241 | continue; | |
242 | ++I; | |
243 | ||
244 | if (Single == false) | |
245 | { | |
246 | if (I < InP && Buf[I%Size] == '\r') | |
247 | ++I; | |
248 | if (I >= InP || Buf[I%Size] != '\n') | |
249 | continue; | |
250 | ++I; | |
251 | } | |
252 | ||
253 | Data = ""; | |
254 | while (OutP < I) | |
255 | { | |
256 | unsigned long long Sz = LeftWrite(); | |
257 | if (Sz == 0) | |
258 | return false; | |
259 | if (I - OutP < Sz) | |
260 | Sz = I - OutP; | |
261 | Data += string((char *)(Buf + (OutP%Size)),Sz); | |
262 | OutP += Sz; | |
263 | } | |
264 | return true; | |
265 | } | |
266 | return false; | |
267 | } | |
268 | /*}}}*/ | |
269 | // CircleBuf::Stats - Print out stats information /*{{{*/ | |
270 | // --------------------------------------------------------------------- | |
271 | /* */ | |
272 | void CircleBuf::Stats() | |
273 | { | |
274 | if (InP == 0) | |
275 | return; | |
276 | ||
277 | struct timeval Stop; | |
278 | gettimeofday(&Stop,0); | |
279 | /* float Diff = Stop.tv_sec - Start.tv_sec + | |
280 | (float)(Stop.tv_usec - Start.tv_usec)/1000000; | |
281 | clog << "Got " << InP << " in " << Diff << " at " << InP/Diff << endl;*/ | |
282 | } | |
283 | /*}}}*/ | |
284 | CircleBuf::~CircleBuf() | |
285 | { | |
286 | delete [] Buf; | |
287 | delete Hash; | |
288 | } | |
289 | ||
290 | // HttpServerState::HttpServerState - Constructor /*{{{*/ | |
291 | HttpServerState::HttpServerState(URI Srv,HttpMethod *Owner) : ServerState(Srv, Owner), In(Owner, 64*1024), Out(Owner, 4*1024) | |
292 | { | |
293 | TimeOut = Owner->ConfigFindI("Timeout", TimeOut); | |
294 | Reset(); | |
295 | } | |
296 | /*}}}*/ | |
297 | // HttpServerState::Open - Open a connection to the server /*{{{*/ | |
298 | // --------------------------------------------------------------------- | |
299 | /* This opens a connection to the server. */ | |
300 | static bool TalkToSocksProxy(int const ServerFd, std::string const &Proxy, | |
301 | char const * const type, bool const ReadWrite, uint8_t * const ToFrom, | |
302 | unsigned int const Size, unsigned int const Timeout) | |
303 | { | |
304 | if (WaitFd(ServerFd, ReadWrite, Timeout) == false) | |
305 | return _error->Error("Waiting for the SOCKS proxy %s to %s timed out", URI::SiteOnly(Proxy).c_str(), type); | |
306 | if (ReadWrite == false) | |
307 | { | |
308 | if (FileFd::Read(ServerFd, ToFrom, Size) == false) | |
309 | return _error->Error("Reading the %s from SOCKS proxy %s failed", type, URI::SiteOnly(Proxy).c_str()); | |
310 | } | |
311 | else | |
312 | { | |
313 | if (FileFd::Write(ServerFd, ToFrom, Size) == false) | |
314 | return _error->Error("Writing the %s to SOCKS proxy %s failed", type, URI::SiteOnly(Proxy).c_str()); | |
315 | } | |
316 | return true; | |
317 | } | |
318 | bool HttpServerState::Open() | |
319 | { | |
320 | // Use the already open connection if possible. | |
321 | if (ServerFd != -1) | |
322 | return true; | |
323 | ||
324 | Close(); | |
325 | In.Reset(); | |
326 | Out.Reset(); | |
327 | Persistent = true; | |
328 | ||
329 | // Determine the proxy setting | |
330 | AutoDetectProxy(ServerName); | |
331 | string SpecificProxy = Owner->ConfigFind("Proxy::" + ServerName.Host, ""); | |
332 | if (!SpecificProxy.empty()) | |
333 | { | |
334 | if (SpecificProxy == "DIRECT") | |
335 | Proxy = ""; | |
336 | else | |
337 | Proxy = SpecificProxy; | |
338 | } | |
339 | else | |
340 | { | |
341 | string DefProxy = Owner->ConfigFind("Proxy", ""); | |
342 | if (!DefProxy.empty()) | |
343 | { | |
344 | Proxy = DefProxy; | |
345 | } | |
346 | else | |
347 | { | |
348 | char* result = getenv("http_proxy"); | |
349 | Proxy = result ? result : ""; | |
350 | } | |
351 | } | |
352 | ||
353 | // Parse no_proxy, a , separated list of domains | |
354 | if (getenv("no_proxy") != 0) | |
355 | { | |
356 | if (CheckDomainList(ServerName.Host,getenv("no_proxy")) == true) | |
357 | Proxy = ""; | |
358 | } | |
359 | ||
360 | if (Proxy.empty() == false) | |
361 | Owner->AddProxyAuth(Proxy, ServerName); | |
362 | ||
363 | if (Proxy.Access == "socks5h") | |
364 | { | |
365 | if (Connect(Proxy.Host, Proxy.Port, "socks", 1080, ServerFd, TimeOut, Owner) == false) | |
366 | return false; | |
367 | ||
368 | /* We implement a very basic SOCKS5 client here complying mostly to RFC1928 expect | |
369 | * for not offering GSSAPI auth which is a must (we only do no or user/pass auth). | |
370 | * We also expect the SOCKS5 server to do hostname lookup (aka socks5h) */ | |
371 | std::string const ProxyInfo = URI::SiteOnly(Proxy); | |
372 | Owner->Status(_("Connecting to %s (%s)"),"SOCKS5h proxy",ProxyInfo.c_str()); | |
373 | auto const Timeout = Owner->ConfigFindI("TimeOut", 120); | |
374 | #define APT_WriteOrFail(TYPE, DATA, LENGTH) if (TalkToSocksProxy(ServerFd, ProxyInfo, TYPE, true, DATA, LENGTH, Timeout) == false) return false | |
375 | #define APT_ReadOrFail(TYPE, DATA, LENGTH) if (TalkToSocksProxy(ServerFd, ProxyInfo, TYPE, false, DATA, LENGTH, Timeout) == false) return false | |
376 | if (ServerName.Host.length() > 255) | |
377 | return _error->Error("Can't use SOCKS5h as hostname %s is too long!", ServerName.Host.c_str()); | |
378 | if (Proxy.User.length() > 255 || Proxy.Password.length() > 255) | |
379 | return _error->Error("Can't use user&pass auth as they are too long (%lu and %lu) for the SOCKS5!", Proxy.User.length(), Proxy.Password.length()); | |
380 | if (Proxy.User.empty()) | |
381 | { | |
382 | uint8_t greeting[] = { 0x05, 0x01, 0x00 }; | |
383 | APT_WriteOrFail("greet-1", greeting, sizeof(greeting)); | |
384 | } | |
385 | else | |
386 | { | |
387 | uint8_t greeting[] = { 0x05, 0x02, 0x00, 0x02 }; | |
388 | APT_WriteOrFail("greet-2", greeting, sizeof(greeting)); | |
389 | } | |
390 | uint8_t greeting[2]; | |
391 | APT_ReadOrFail("greet back", greeting, sizeof(greeting)); | |
392 | if (greeting[0] != 0x05) | |
393 | return _error->Error("SOCKS proxy %s greets back with wrong version: %d", ProxyInfo.c_str(), greeting[0]); | |
394 | if (greeting[1] == 0x00) | |
395 | ; // no auth has no method-dependent sub-negotiations | |
396 | else if (greeting[1] == 0x02) | |
397 | { | |
398 | if (Proxy.User.empty()) | |
399 | return _error->Error("SOCKS proxy %s negotiated user&pass auth, but we had not offered it!", ProxyInfo.c_str()); | |
400 | // user&pass auth sub-negotiations are defined by RFC1929 | |
401 | std::vector<uint8_t> auth = {{ 0x01, static_cast<uint8_t>(Proxy.User.length()) }}; | |
402 | std::copy(Proxy.User.begin(), Proxy.User.end(), std::back_inserter(auth)); | |
403 | auth.push_back(static_cast<uint8_t>(Proxy.Password.length())); | |
404 | std::copy(Proxy.Password.begin(), Proxy.Password.end(), std::back_inserter(auth)); | |
405 | APT_WriteOrFail("user&pass auth", auth.data(), auth.size()); | |
406 | uint8_t authstatus[2]; | |
407 | APT_ReadOrFail("auth report", authstatus, sizeof(authstatus)); | |
408 | if (authstatus[0] != 0x01) | |
409 | return _error->Error("SOCKS proxy %s auth status response with wrong version: %d", ProxyInfo.c_str(), authstatus[0]); | |
410 | if (authstatus[1] != 0x00) | |
411 | return _error->Error("SOCKS proxy %s reported authorization failure: username or password incorrect? (%d)", ProxyInfo.c_str(), authstatus[1]); | |
412 | } | |
413 | else | |
414 | return _error->Error("SOCKS proxy %s greets back having not found a common authorization method: %d", ProxyInfo.c_str(), greeting[1]); | |
415 | union { uint16_t * i; uint8_t * b; } portu; | |
416 | uint16_t port = htons(static_cast<uint16_t>(ServerName.Port == 0 ? 80 : ServerName.Port)); | |
417 | portu.i = &port; | |
418 | std::vector<uint8_t> request = {{ 0x05, 0x01, 0x00, 0x03, static_cast<uint8_t>(ServerName.Host.length()) }}; | |
419 | std::copy(ServerName.Host.begin(), ServerName.Host.end(), std::back_inserter(request)); | |
420 | request.push_back(portu.b[0]); | |
421 | request.push_back(portu.b[1]); | |
422 | APT_WriteOrFail("request", request.data(), request.size()); | |
423 | uint8_t response[4]; | |
424 | APT_ReadOrFail("first part of response", response, sizeof(response)); | |
425 | if (response[0] != 0x05) | |
426 | return _error->Error("SOCKS proxy %s response with wrong version: %d", ProxyInfo.c_str(), response[0]); | |
427 | if (response[2] != 0x00) | |
428 | return _error->Error("SOCKS proxy %s has unexpected non-zero reserved field value: %d", ProxyInfo.c_str(), response[2]); | |
429 | std::string bindaddr; | |
430 | if (response[3] == 0x01) // IPv4 address | |
431 | { | |
432 | uint8_t ip4port[6]; | |
433 | APT_ReadOrFail("IPv4+Port of response", ip4port, sizeof(ip4port)); | |
434 | portu.b[0] = ip4port[4]; | |
435 | portu.b[1] = ip4port[5]; | |
436 | port = ntohs(*portu.i); | |
437 | strprintf(bindaddr, "%d.%d.%d.%d:%d", ip4port[0], ip4port[1], ip4port[2], ip4port[3], port); | |
438 | } | |
439 | else if (response[3] == 0x03) // hostname | |
440 | { | |
441 | uint8_t namelength; | |
442 | APT_ReadOrFail("hostname length of response", &namelength, 1); | |
443 | uint8_t hostname[namelength + 2]; | |
444 | APT_ReadOrFail("hostname of response", hostname, sizeof(hostname)); | |
445 | portu.b[0] = hostname[namelength]; | |
446 | portu.b[1] = hostname[namelength + 1]; | |
447 | port = ntohs(*portu.i); | |
448 | hostname[namelength] = '\0'; | |
449 | strprintf(bindaddr, "%s:%d", hostname, port); | |
450 | } | |
451 | else if (response[3] == 0x04) // IPv6 address | |
452 | { | |
453 | uint8_t ip6port[18]; | |
454 | APT_ReadOrFail("IPv6+port of response", ip6port, sizeof(ip6port)); | |
455 | portu.b[0] = ip6port[16]; | |
456 | portu.b[1] = ip6port[17]; | |
457 | port = ntohs(*portu.i); | |
458 | strprintf(bindaddr, "[%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X]:%d", | |
459 | ip6port[0], ip6port[1], ip6port[2], ip6port[3], ip6port[4], ip6port[5], ip6port[6], ip6port[7], | |
460 | ip6port[8], ip6port[9], ip6port[10], ip6port[11], ip6port[12], ip6port[13], ip6port[14], ip6port[15], | |
461 | port); | |
462 | } | |
463 | else | |
464 | return _error->Error("SOCKS proxy %s destination address is of unknown type: %d", | |
465 | ProxyInfo.c_str(), response[3]); | |
466 | if (response[1] != 0x00) | |
467 | { | |
468 | char const * errstr; | |
469 | switch (response[1]) | |
470 | { | |
471 | case 0x01: errstr = "general SOCKS server failure"; Owner->SetFailReason("SOCKS"); break; | |
472 | case 0x02: errstr = "connection not allowed by ruleset"; Owner->SetFailReason("SOCKS"); break; | |
473 | case 0x03: errstr = "Network unreachable"; Owner->SetFailReason("ConnectionTimedOut"); break; | |
474 | case 0x04: errstr = "Host unreachable"; Owner->SetFailReason("ConnectionTimedOut"); break; | |
475 | case 0x05: errstr = "Connection refused"; Owner->SetFailReason("ConnectionRefused"); break; | |
476 | case 0x06: errstr = "TTL expired"; Owner->SetFailReason("Timeout"); break; | |
477 | case 0x07: errstr = "Command not supported"; Owner->SetFailReason("SOCKS"); break; | |
478 | case 0x08: errstr = "Address type not supported"; Owner->SetFailReason("SOCKS"); break; | |
479 | default: errstr = "Unknown error"; Owner->SetFailReason("SOCKS"); break; | |
480 | } | |
481 | return _error->Error("SOCKS proxy %s didn't grant the connect to %s due to: %s (%d)", ProxyInfo.c_str(), bindaddr.c_str(), errstr, response[1]); | |
482 | } | |
483 | else if (Owner->DebugEnabled()) | |
484 | ioprintf(std::clog, "http: SOCKS proxy %s connection established to %s\n", ProxyInfo.c_str(), bindaddr.c_str()); | |
485 | ||
486 | if (WaitFd(ServerFd, true, Timeout) == false) | |
487 | return _error->Error("SOCKS proxy %s reported connection, but timed out", ProxyInfo.c_str()); | |
488 | #undef APT_ReadOrFail | |
489 | #undef APT_WriteOrFail | |
490 | } | |
491 | else | |
492 | { | |
493 | // Determine what host and port to use based on the proxy settings | |
494 | int Port = 0; | |
495 | string Host; | |
496 | if (Proxy.empty() == true || Proxy.Host.empty() == true) | |
497 | { | |
498 | if (ServerName.Port != 0) | |
499 | Port = ServerName.Port; | |
500 | Host = ServerName.Host; | |
501 | } | |
502 | else if (Proxy.Access != "http") | |
503 | return _error->Error("Unsupported proxy configured: %s", URI::SiteOnly(Proxy).c_str()); | |
504 | else | |
505 | { | |
506 | if (Proxy.Port != 0) | |
507 | Port = Proxy.Port; | |
508 | Host = Proxy.Host; | |
509 | } | |
510 | return Connect(Host,Port,"http",80,ServerFd,TimeOut,Owner); | |
511 | } | |
512 | return true; | |
513 | } | |
514 | /*}}}*/ | |
515 | // HttpServerState::Close - Close a connection to the server /*{{{*/ | |
516 | // --------------------------------------------------------------------- | |
517 | /* */ | |
518 | bool HttpServerState::Close() | |
519 | { | |
520 | close(ServerFd); | |
521 | ServerFd = -1; | |
522 | return true; | |
523 | } | |
524 | /*}}}*/ | |
525 | // HttpServerState::RunData - Transfer the data from the socket /*{{{*/ | |
526 | bool HttpServerState::RunData(FileFd * const File) | |
527 | { | |
528 | State = Data; | |
529 | ||
530 | // Chunked transfer encoding is fun.. | |
531 | if (Encoding == Chunked) | |
532 | { | |
533 | while (1) | |
534 | { | |
535 | // Grab the block size | |
536 | bool Last = true; | |
537 | string Data; | |
538 | In.Limit(-1); | |
539 | do | |
540 | { | |
541 | if (In.WriteTillEl(Data,true) == true) | |
542 | break; | |
543 | } | |
544 | while ((Last = Go(false, File)) == true); | |
545 | ||
546 | if (Last == false) | |
547 | return false; | |
548 | ||
549 | // See if we are done | |
550 | unsigned long long Len = strtoull(Data.c_str(),0,16); | |
551 | if (Len == 0) | |
552 | { | |
553 | In.Limit(-1); | |
554 | ||
555 | // We have to remove the entity trailer | |
556 | Last = true; | |
557 | do | |
558 | { | |
559 | if (In.WriteTillEl(Data,true) == true && Data.length() <= 2) | |
560 | break; | |
561 | } | |
562 | while ((Last = Go(false, File)) == true); | |
563 | if (Last == false) | |
564 | return false; | |
565 | return !_error->PendingError(); | |
566 | } | |
567 | ||
568 | // Transfer the block | |
569 | In.Limit(Len); | |
570 | while (Go(true, File) == true) | |
571 | if (In.IsLimit() == true) | |
572 | break; | |
573 | ||
574 | // Error | |
575 | if (In.IsLimit() == false) | |
576 | return false; | |
577 | ||
578 | // The server sends an extra new line before the next block specifier.. | |
579 | In.Limit(-1); | |
580 | Last = true; | |
581 | do | |
582 | { | |
583 | if (In.WriteTillEl(Data,true) == true) | |
584 | break; | |
585 | } | |
586 | while ((Last = Go(false, File)) == true); | |
587 | if (Last == false) | |
588 | return false; | |
589 | } | |
590 | } | |
591 | else | |
592 | { | |
593 | /* Closes encoding is used when the server did not specify a size, the | |
594 | loss of the connection means we are done */ | |
595 | if (JunkSize != 0) | |
596 | In.Limit(JunkSize); | |
597 | else if (DownloadSize != 0) | |
598 | In.Limit(DownloadSize); | |
599 | else if (Persistent == false) | |
600 | In.Limit(-1); | |
601 | ||
602 | // Just transfer the whole block. | |
603 | do | |
604 | { | |
605 | if (In.IsLimit() == false) | |
606 | continue; | |
607 | ||
608 | In.Limit(-1); | |
609 | return !_error->PendingError(); | |
610 | } | |
611 | while (Go(true, File) == true); | |
612 | } | |
613 | ||
614 | return Owner->Flush() && !_error->PendingError(); | |
615 | } | |
616 | /*}}}*/ | |
617 | bool HttpServerState::RunDataToDevNull() /*{{{*/ | |
618 | { | |
619 | FileFd DevNull("/dev/null", FileFd::WriteOnly); | |
620 | return RunData(&DevNull); | |
621 | } | |
622 | /*}}}*/ | |
623 | bool HttpServerState::ReadHeaderLines(std::string &Data) /*{{{*/ | |
624 | { | |
625 | return In.WriteTillEl(Data); | |
626 | } | |
627 | /*}}}*/ | |
628 | bool HttpServerState::LoadNextResponse(bool const ToFile, FileFd * const File)/*{{{*/ | |
629 | { | |
630 | return Go(ToFile, File); | |
631 | } | |
632 | /*}}}*/ | |
633 | bool HttpServerState::WriteResponse(const std::string &Data) /*{{{*/ | |
634 | { | |
635 | return Out.Read(Data); | |
636 | } | |
637 | /*}}}*/ | |
638 | APT_PURE bool HttpServerState::IsOpen() /*{{{*/ | |
639 | { | |
640 | return (ServerFd != -1); | |
641 | } | |
642 | /*}}}*/ | |
643 | bool HttpServerState::InitHashes(HashStringList const &ExpectedHashes) /*{{{*/ | |
644 | { | |
645 | delete In.Hash; | |
646 | In.Hash = new Hashes(ExpectedHashes); | |
647 | return true; | |
648 | } | |
649 | /*}}}*/ | |
650 | void HttpServerState::Reset(bool const Everything) /*{{{*/ | |
651 | { | |
652 | ServerState::Reset(Everything); | |
653 | if (Everything) | |
654 | ServerFd = -1; | |
655 | } | |
656 | /*}}}*/ | |
657 | ||
658 | APT_PURE Hashes * HttpServerState::GetHashes() /*{{{*/ | |
659 | { | |
660 | return In.Hash; | |
661 | } | |
662 | /*}}}*/ | |
663 | // HttpServerState::Die - The server has closed the connection. /*{{{*/ | |
664 | bool HttpServerState::Die(FileFd * const File) | |
665 | { | |
666 | unsigned int LErrno = errno; | |
667 | ||
668 | // Dump the buffer to the file | |
669 | if (State == ServerState::Data) | |
670 | { | |
671 | if (File == nullptr) | |
672 | return true; | |
673 | // on GNU/kFreeBSD, apt dies on /dev/null because non-blocking | |
674 | // can't be set | |
675 | if (File->Name() != "/dev/null") | |
676 | SetNonBlock(File->Fd(),false); | |
677 | while (In.WriteSpace() == true) | |
678 | { | |
679 | if (In.Write(File->Fd()) == false) | |
680 | return _error->Errno("write",_("Error writing to the file")); | |
681 | ||
682 | // Done | |
683 | if (In.IsLimit() == true) | |
684 | return true; | |
685 | } | |
686 | } | |
687 | ||
688 | // See if this is because the server finished the data stream | |
689 | if (In.IsLimit() == false && State != HttpServerState::Header && | |
690 | Persistent == true) | |
691 | { | |
692 | Close(); | |
693 | if (LErrno == 0) | |
694 | return _error->Error(_("Error reading from server. Remote end closed connection")); | |
695 | errno = LErrno; | |
696 | return _error->Errno("read",_("Error reading from server")); | |
697 | } | |
698 | else | |
699 | { | |
700 | In.Limit(-1); | |
701 | ||
702 | // Nothing left in the buffer | |
703 | if (In.WriteSpace() == false) | |
704 | return false; | |
705 | ||
706 | // We may have got multiple responses back in one packet.. | |
707 | Close(); | |
708 | return true; | |
709 | } | |
710 | ||
711 | return false; | |
712 | } | |
713 | /*}}}*/ | |
714 | // HttpServerState::Flush - Dump the buffer into the file /*{{{*/ | |
715 | // --------------------------------------------------------------------- | |
716 | /* This takes the current input buffer from the Server FD and writes it | |
717 | into the file */ | |
718 | bool HttpServerState::Flush(FileFd * const File) | |
719 | { | |
720 | if (File != NULL) | |
721 | { | |
722 | // on GNU/kFreeBSD, apt dies on /dev/null because non-blocking | |
723 | // can't be set | |
724 | if (File->Name() != "/dev/null") | |
725 | SetNonBlock(File->Fd(),false); | |
726 | if (In.WriteSpace() == false) | |
727 | return true; | |
728 | ||
729 | while (In.WriteSpace() == true) | |
730 | { | |
731 | if (In.Write(File->Fd()) == false) | |
732 | return _error->Errno("write",_("Error writing to file")); | |
733 | if (In.IsLimit() == true) | |
734 | return true; | |
735 | } | |
736 | ||
737 | if (In.IsLimit() == true || Persistent == false) | |
738 | return true; | |
739 | } | |
740 | return false; | |
741 | } | |
742 | /*}}}*/ | |
743 | // HttpServerState::Go - Run a single loop /*{{{*/ | |
744 | // --------------------------------------------------------------------- | |
745 | /* This runs the select loop over the server FDs, Output file FDs and | |
746 | stdin. */ | |
747 | bool HttpServerState::Go(bool ToFile, FileFd * const File) | |
748 | { | |
749 | // Server has closed the connection | |
750 | if (ServerFd == -1 && (In.WriteSpace() == false || | |
751 | ToFile == false)) | |
752 | return false; | |
753 | ||
754 | fd_set rfds,wfds; | |
755 | FD_ZERO(&rfds); | |
756 | FD_ZERO(&wfds); | |
757 | ||
758 | /* Add the server. We only send more requests if the connection will | |
759 | be persisting */ | |
760 | if (Out.WriteSpace() == true && ServerFd != -1 | |
761 | && Persistent == true) | |
762 | FD_SET(ServerFd,&wfds); | |
763 | if (In.ReadSpace() == true && ServerFd != -1) | |
764 | FD_SET(ServerFd,&rfds); | |
765 | ||
766 | // Add the file | |
767 | int FileFD = -1; | |
768 | if (File != NULL) | |
769 | FileFD = File->Fd(); | |
770 | ||
771 | if (In.WriteSpace() == true && ToFile == true && FileFD != -1) | |
772 | FD_SET(FileFD,&wfds); | |
773 | ||
774 | // Add stdin | |
775 | if (Owner->ConfigFindB("DependOnSTDIN", true) == true) | |
776 | FD_SET(STDIN_FILENO,&rfds); | |
777 | ||
778 | // Figure out the max fd | |
779 | int MaxFd = FileFD; | |
780 | if (MaxFd < ServerFd) | |
781 | MaxFd = ServerFd; | |
782 | ||
783 | // Select | |
784 | struct timeval tv; | |
785 | tv.tv_sec = TimeOut; | |
786 | tv.tv_usec = 0; | |
787 | int Res = 0; | |
788 | if ((Res = select(MaxFd+1,&rfds,&wfds,0,&tv)) < 0) | |
789 | { | |
790 | if (errno == EINTR) | |
791 | return true; | |
792 | return _error->Errno("select",_("Select failed")); | |
793 | } | |
794 | ||
795 | if (Res == 0) | |
796 | { | |
797 | _error->Error(_("Connection timed out")); | |
798 | return Die(File); | |
799 | } | |
800 | ||
801 | // Handle server IO | |
802 | if (ServerFd != -1 && FD_ISSET(ServerFd,&rfds)) | |
803 | { | |
804 | errno = 0; | |
805 | if (In.Read(ServerFd) == false) | |
806 | return Die(File); | |
807 | } | |
808 | ||
809 | if (ServerFd != -1 && FD_ISSET(ServerFd,&wfds)) | |
810 | { | |
811 | errno = 0; | |
812 | if (Out.Write(ServerFd) == false) | |
813 | return Die(File); | |
814 | } | |
815 | ||
816 | // Send data to the file | |
817 | if (FileFD != -1 && FD_ISSET(FileFD,&wfds)) | |
818 | { | |
819 | if (In.Write(FileFD) == false) | |
820 | return _error->Errno("write",_("Error writing to output file")); | |
821 | } | |
822 | ||
823 | if (MaximumSize > 0 && File && File->Tell() > MaximumSize) | |
824 | { | |
825 | Owner->SetFailReason("MaximumSizeExceeded"); | |
826 | return _error->Error("Writing more data than expected (%llu > %llu)", | |
827 | File->Tell(), MaximumSize); | |
828 | } | |
829 | ||
830 | // Handle commands from APT | |
831 | if (FD_ISSET(STDIN_FILENO,&rfds)) | |
832 | { | |
833 | if (Owner->Run(true) != -1) | |
834 | exit(100); | |
835 | } | |
836 | ||
837 | return true; | |
838 | } | |
839 | /*}}}*/ | |
840 | ||
841 | // HttpMethod::SendReq - Send the HTTP request /*{{{*/ | |
842 | // --------------------------------------------------------------------- | |
843 | /* This places the http request in the outbound buffer */ | |
844 | void HttpMethod::SendReq(FetchItem *Itm) | |
845 | { | |
846 | URI Uri = Itm->Uri; | |
847 | { | |
848 | auto const plus = Binary.find('+'); | |
849 | if (plus != std::string::npos) | |
850 | Uri.Access = Binary.substr(plus + 1); | |
851 | } | |
852 | ||
853 | // The HTTP server expects a hostname with a trailing :port | |
854 | std::stringstream Req; | |
855 | string ProperHost; | |
856 | ||
857 | if (Uri.Host.find(':') != string::npos) | |
858 | ProperHost = '[' + Uri.Host + ']'; | |
859 | else | |
860 | ProperHost = Uri.Host; | |
861 | ||
862 | /* RFC 2616 ยง5.1.2 requires absolute URIs for requests to proxies, | |
863 | but while its a must for all servers to accept absolute URIs, | |
864 | it is assumed clients will sent an absolute path for non-proxies */ | |
865 | std::string requesturi; | |
866 | if (Server->Proxy.Access != "http" || Server->Proxy.empty() == true || Server->Proxy.Host.empty()) | |
867 | requesturi = Uri.Path; | |
868 | else | |
869 | requesturi = Uri; | |
870 | ||
871 | // The "+" is encoded as a workaround for a amazon S3 bug | |
872 | // see LP bugs #1003633 and #1086997. | |
873 | requesturi = QuoteString(requesturi, "+~ "); | |
874 | ||
875 | /* Build the request. No keep-alive is included as it is the default | |
876 | in 1.1, can cause problems with proxies, and we are an HTTP/1.1 | |
877 | client anyway. | |
878 | C.f. https://tools.ietf.org/wg/httpbis/trac/ticket/158 */ | |
879 | Req << "GET " << requesturi << " HTTP/1.1\r\n"; | |
880 | if (Uri.Port != 0) | |
881 | Req << "Host: " << ProperHost << ":" << std::to_string(Uri.Port) << "\r\n"; | |
882 | else | |
883 | Req << "Host: " << ProperHost << "\r\n"; | |
884 | ||
885 | // generate a cache control header (if needed) | |
886 | if (ConfigFindB("No-Cache",false) == true) | |
887 | Req << "Cache-Control: no-cache\r\n" | |
888 | << "Pragma: no-cache\r\n"; | |
889 | else if (Itm->IndexFile == true) | |
890 | Req << "Cache-Control: max-age=" << std::to_string(ConfigFindI("Max-Age", 0)) << "\r\n"; | |
891 | else if (ConfigFindB("No-Store", false) == true) | |
892 | Req << "Cache-Control: no-store\r\n"; | |
893 | ||
894 | // If we ask for uncompressed files servers might respond with content- | |
895 | // negotiation which lets us end up with compressed files we do not support, | |
896 | // see 657029, 657560 and co, so if we have no extension on the request | |
897 | // ask for text only. As a sidenote: If there is nothing to negotate servers | |
898 | // seem to be nice and ignore it. | |
899 | if (ConfigFindB("SendAccept", true) == true) | |
900 | { | |
901 | size_t const filepos = Itm->Uri.find_last_of('/'); | |
902 | string const file = Itm->Uri.substr(filepos + 1); | |
903 | if (flExtension(file) == file) | |
904 | Req << "Accept: text/*\r\n"; | |
905 | } | |
906 | ||
907 | // Check for a partial file and send if-queries accordingly | |
908 | struct stat SBuf; | |
909 | if (stat(Itm->DestFile.c_str(),&SBuf) >= 0 && SBuf.st_size > 0) | |
910 | Req << "Range: bytes=" << std::to_string(SBuf.st_size) << "-\r\n" | |
911 | << "If-Range: " << TimeRFC1123(SBuf.st_mtime, false) << "\r\n"; | |
912 | else if (Itm->LastModified != 0) | |
913 | Req << "If-Modified-Since: " << TimeRFC1123(Itm->LastModified, false).c_str() << "\r\n"; | |
914 | ||
915 | if (Server->Proxy.Access == "http" && | |
916 | (Server->Proxy.User.empty() == false || Server->Proxy.Password.empty() == false)) | |
917 | Req << "Proxy-Authorization: Basic " | |
918 | << Base64Encode(Server->Proxy.User + ":" + Server->Proxy.Password) << "\r\n"; | |
919 | ||
920 | maybe_add_auth (Uri, _config->FindFile("Dir::Etc::netrc")); | |
921 | if (Uri.User.empty() == false || Uri.Password.empty() == false) | |
922 | Req << "Authorization: Basic " | |
923 | << Base64Encode(Uri.User + ":" + Uri.Password) << "\r\n"; | |
924 | ||
925 | Req << "User-Agent: " << ConfigFind("User-Agent", | |
926 | "Debian APT-HTTP/1.3 (" PACKAGE_VERSION ")") << "\r\n"; | |
927 | ||
928 | Req << "\r\n"; | |
929 | ||
930 | if (Debug == true) | |
931 | cerr << Req.str() << endl; | |
932 | ||
933 | Server->WriteResponse(Req.str()); | |
934 | } | |
935 | /*}}}*/ | |
936 | std::unique_ptr<ServerState> HttpMethod::CreateServerState(URI const &uri)/*{{{*/ | |
937 | { | |
938 | return std::unique_ptr<ServerState>(new HttpServerState(uri, this)); | |
939 | } | |
940 | /*}}}*/ | |
941 | void HttpMethod::RotateDNS() /*{{{*/ | |
942 | { | |
943 | ::RotateDNS(); | |
944 | } | |
945 | /*}}}*/ | |
946 | ServerMethod::DealWithHeadersResult HttpMethod::DealWithHeaders(FetchResult &Res)/*{{{*/ | |
947 | { | |
948 | auto ret = ServerMethod::DealWithHeaders(Res); | |
949 | if (ret != ServerMethod::FILE_IS_OPEN) | |
950 | return ret; | |
951 | ||
952 | // Open the file | |
953 | delete File; | |
954 | File = new FileFd(Queue->DestFile,FileFd::WriteAny); | |
955 | if (_error->PendingError() == true) | |
956 | return ERROR_NOT_FROM_SERVER; | |
957 | ||
958 | FailFile = Queue->DestFile; | |
959 | FailFile.c_str(); // Make sure we don't do a malloc in the signal handler | |
960 | FailFd = File->Fd(); | |
961 | FailTime = Server->Date; | |
962 | ||
963 | if (Server->InitHashes(Queue->ExpectedHashes) == false || Server->AddPartialFileToHashes(*File) == false) | |
964 | { | |
965 | _error->Errno("read",_("Problem hashing file")); | |
966 | return ERROR_NOT_FROM_SERVER; | |
967 | } | |
968 | if (Server->StartPos > 0) | |
969 | Res.ResumePoint = Server->StartPos; | |
970 | ||
971 | SetNonBlock(File->Fd(),true); | |
972 | return FILE_IS_OPEN; | |
973 | } | |
974 | /*}}}*/ | |
975 | HttpMethod::HttpMethod(std::string &&pProg) : ServerMethod(pProg.c_str(), "1.2", Pipeline | SendConfig)/*{{{*/ | |
976 | { | |
977 | auto addName = std::inserter(methodNames, methodNames.begin()); | |
978 | if (Binary != "http") | |
979 | addName = "http"; | |
980 | auto const plus = Binary.find('+'); | |
981 | if (plus != std::string::npos) | |
982 | addName = Binary.substr(0, plus); | |
983 | File = 0; | |
984 | Server = 0; | |
985 | } | |
986 | /*}}}*/ |