// The contents of this file are subject to the BOINC Public License // Version 1.0 (the "License"); you may not use this file except in // compliance with the License. You may obtain a copy of the License at // http://boinc.berkeley.edu/license_1.0.txt // // Software distributed under the License is distributed on an "AS IS" // basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the // License for the specific language governing rights and limitations // under the License. // // The Original Code is the Berkeley Open Infrastructure for Network Computing. // // The Initial Developer of the Original Code is the SETI@home project. // Portions created by the SETI@home project are Copyright (C) 2002 // University of California at Berkeley. All Rights Reserved. // // Contributor(s): // #include "cpp.h" #ifdef _WIN32 #include "boinc_win.h" #define SHUT_WR SD_SEND using std::string; #endif #ifndef _WIN32 #include #include #include #if HAVE_SYS_STAT_H #include #endif #if HAVE_SYS_SOCKET_H #include #endif #if HAVE_ERRNO_H #include #endif #if HAVE_UNISTD_H #include #endif #endif #include "error_numbers.h" #include "filesys.h" #include "util.h" #include "client_msgs.h" #include "http.h" #include "base64.h" #define HTTP_BLOCKSIZE 16384 #include "..\lib\base64.h" using namespace INCSSL; // Breaks a HTTP url down into its server and file path components // //void parse_url(const char* url, char* host, int &port, char* file) { int parse_url(const char* url, char* host, int &port, char* file) { char* p; char buf[256]; int retval = 0; // if (strncmp(url, "http://", 7) == 0) { // safe_strcpy(buf, url+7); // } else { // safe_strcpy(buf, url); // } if (strncmp(url, "https://", 8) == 0) { safe_strcpy(buf, url+8); retval = URL_IS_SSL; }else if (strncmp(url, "http://", 7) == 0) { safe_strcpy(buf, url+7); } else { safe_strcpy(buf, url); } p = strchr(buf, '/'); if (p) { strcpy(file, p+1); *p = 0; } else { strcpy(file, ""); } p=strchr(buf,':'); if (p) { port = atol(p+1); *p = 0; } else { port=80; if(retval){ // SSL default port = 443; } } strcpy(host, buf); return retval; } // Prints an HTTP 1.0 CONNECT request header into buf // Hopefully there won't be chunked transfers in a CONNECT // static void http_connect_request_header_proxy( char* buf, char* host, int port, char* file, char* enc_str ) { sprintf(buf, "CONNECT %s HTTP/1.0\015\012" "User-Agent: BOINC client\015\012" "Host: %s:%d\015\012" "Proxy-Authorization: Basic %s\015\012" "\015\012", file,host,port,enc_str ); } // Prints an HTTP 1.1 GET request header into buf // Hopefully there won't be chunked transfers in a GET // static void http_get_request_header( char* buf, char* host, int port, char* file, double offset ) { char offset_info[256]; if (offset) sprintf( offset_info, "Range: bytes=%.0f-\015\012", offset ); sprintf(buf, "GET %s HTTP/1.0\015\012" "User-Agent: BOINC client\015\012" "Host: %s:%d\015\012" "%s" "Connection: close\015\012" "Accept: */*\015\012" "\015\012", file, host, port, offset?offset_info:"" ); } static void http_get_request_header_proxy( char* buf, char* host, int port, char* file, double offset, char* encstr ) { char offset_info[256]; if (offset) sprintf( offset_info, "Range: bytes=%.0f-\015\012", offset ); sprintf(buf, "GET %s HTTP/1.0\015\012" "User-Agent: BOINC client\015\012" "Host: %s:%d\015\012" "%s" "Connection: close\015\012" "Accept: */*\015\012" "Proxy-Authorization: Basic %s\015\012" "\015\012", file, host, port, offset?offset_info:"", encstr ); } // Prints an HTTP 1.1 HEAD request header into buf // static void http_head_request_header(char* buf, char* host, int port, char* file) { sprintf(buf, "HEAD %s HTTP/1.0\015\012" "User-Agent: BOINC client\015\012" "Host: %s:%d\015\012" "Connection: close\015\012" "Accept: */*\015\012" "\015\012", file, host, port ); } static void http_head_request_header_proxy(char* buf, char* host, int port, char* file, char* encstr ) { sprintf(buf, "HEAD %s HTTP/1.0\015\012" "User-Agent: BOINC client\015\012" "Host: %s:%d\015\012" "Connection: close\015\012" "Accept: */*\015\012" "Proxy-Authorization: Basic %s\015\012" "\015\012", file, host, port, encstr ); } // Prints an HTTP 1.0 POST request header into buf // Use HTTP 1.0 so we don't have to deal with chunked transfers // static void http_post_request_header( char* buf, char* host, int port, char* file, int size ) { sprintf(buf, "POST %s HTTP/1.0\015\012" "Pragma: no-cache\015\012" "Cache-Control: no-cache\015\012" "Host: %s:%d\015\012" "Connection: close\015\012" "Content-Type: application/octet-stream\015\012" "Content-Length: %d\015\012" "\015\012", file, host, port, size ); } static void http_post_request_header_proxy( char* buf, char* host, int port, char* file, int size, char* encstr ) { sprintf(buf, "POST %s HTTP/1.0\015\012" "Pragma: no-cache\015\012" "Cache-Control: no-cache\015\012" "Host: %s:%d\015\012" "Connection: close\015\012" "Content-Type: application/octet-stream\015\012" "Content-Length: %d\015\012" "Proxy-Authorization: Basic %s\015\012" "\015\012", file, host, port, size, encstr ); } void HTTP_REPLY_HEADER::init() { http_status = 500; content_length = 0; redirect_location.erase(); recv_buf.erase(); } void HTTP_REPLY_HEADER::parse() { SCOPE_MSG_LOG scope_messages(log_messages, CLIENT_MSG_LOG::DEBUG_HTTP); istringstream h(recv_buf); string line, w; if (getline(h, line)) { istringstream iline(line); iline >> w; if (!starts_with(w,"HTTP/")) { scope_messages.printf("HTTP_REPLY_HEADER::parse(): not HTTP\n"); return; } iline >> http_status; scope_messages.printf("HTTP_REPLY_HEADER::parse(): status=%d\n", http_status); } while (getline(h, line)) { istringstream iline(line); iline >> w; downcase_string(w); if (w == "content-length:") { iline >> content_length; scope_messages.printf("HTTP_REPLY_HEADER::parse(): content_length=%d\n", content_length); } else if (w == "location:") { iline >> redirect_location; scope_messages.printf("HTTP_REPLY_HEADER::parse(): redirect_location=%s\n", redirect_location.c_str()); } } } const unsigned int MAX_HEADER_SIZE = 1024; // Parse an http reply header into the header struct // // Returns 1 if not done yet, 0 if done (header.http_status indicates success) // int HTTP_REPLY_HEADER::read_reply(int socket) { SCOPE_MSG_LOG scope_messages(log_messages, CLIENT_MSG_LOG::DEBUG_HTTP); while (recv_buf.size() < MAX_HEADER_SIZE) { char c; errno = 0; int n = recv(socket, &c, 1, 0); if (n != 1) { scope_messages.printf( "HTTP_REPLY_HEADER::read_reply(): recv() on socket %d returned %d errno %d sockerr %d\n", socket, n, errno, get_socket_error(socket) ); } if (n == -1 && errno == EAGAIN) { return 1; } // if n is zero, we've reached EOF (and that's an error) // if (n != 1) { break; } if (c == '\r') continue; recv_buf += c; if (ends_with(recv_buf, "\n\n")) { scope_messages.printf_multiline(recv_buf.c_str(), "HTTP_REPLY_HEADER::read_reply(): header: " ); parse(); return 0; } } // error occurred; status will be 500 (from constructor) // scope_messages.printf( "HTTP_REPLY_HEADER::read_reply(): returning error (recv_buf=%s)\n", recv_buf.c_str() ); return 0; } // Read the contents of the socket into buf // static int read_reply(int socket, char* buf, int len) { int i, n; for (i=0; iinsert(ho); if (retval) return retval; http_ops.push_back(ho); return 0; } bool HTTP_OP_SET::poll() { unsigned int i; HTTP_OP* htp; int n, retval; bool action = false; char buf[MAX_BLOCKSIZE]; int ret; int ssl_ret=0; SCOPE_MSG_LOG scope_messages(log_messages, CLIENT_MSG_LOG::DEBUG_HTTP); for (i=0; ierror) { htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = htp->error; action = true; continue; } switch(htp->http_op_state) { case HTTP_STATE_CONNECTING: if (htp->is_connected) { htp->http_op_state = HTTP_STATE_SOCKS_CONNECT; htp->want_upload = true; action = true; } break; case HTTP_STATE_SOCKS_CONNECT: // Since the HTTP layer is synchronous with the proxy layer, we // call proxy_poll() here instead of in do_something() htp->proxy_poll(); // After negotiation with the proxy is complete, advance to // the next step of the HTTP layer if (htp->proxy_negotiated()) { if (htp->proxy_retval) { htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = htp->proxy_retval; switch (htp->proxy_retval) { case ERR_SOCKS_UNKNOWN_FAILURE: msg_printf(NULL, MSG_ERROR, "An unknown SOCKS server error occurred\n"); break; case ERR_SOCKS_REQUEST_FAILED: msg_printf(NULL, MSG_ERROR, "The SOCKS server denied access for this computer\n"); break; case ERR_SOCKS_BAD_USER_PASS: msg_printf(NULL, MSG_ERROR, "Incorrect SOCKS user name and/or password\n"); break; case ERR_SOCKS_UNKNOWN_SERVER_VERSION: msg_printf(NULL, MSG_ERROR, "The SOCKS server is using an unknown version\n"); break; case ERR_SOCKS_UNSUPPORTED: msg_printf(NULL, MSG_ERROR, "The SOCKS server is using unsupported features unknown to BOINC\n"); break; case ERR_SOCKS_CANT_REACH_HOST: msg_printf(NULL, MSG_ERROR, "The SOCKS server is unable to contact the host\n"); break; case ERR_SOCKS_CONN_REFUSED: msg_printf(NULL, MSG_ERROR, "The connection from the SOCKS server to the host was refused\n"); break; } } else { htp->http_op_state = HTTP_STATE_REQUEST_HEADER; } } break; case HTTP_STATE_REQUEST_HEADER: if (htp->io_ready) { action = true; // n = send( // htp->socket, htp->request_header, // strlen(htp->request_header), 0 // ); // scope_messages.printf( // "HTTP_OP_SET::poll(): wrote HTTP header to socket %d: %d bytes\n", // htp->socket, n // ); if((htp->url_mode == URL_IS_SSL && htp->proxy_connect_finished) || (htp->url_mode == URL_IS_SSL && !htp->pi.use_http_proxy)){ htp->init_ssl(); ret = htp->ssl_connect(htp->socket,&ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll() REQUEST_HEADER", ret, ssl_ret); ret = htp->ssl_read_write(htp->socket, htp->request_header, SSL_WRITE_MODE, strlen(htp->request_header),&ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll() REQUEST_HEADER", ret, ssl_ret); scope_messages.printf( "HTTP_OP_SET::poll(): wrote HTTPS header to socket %d: error code: %d\n", htp->socket,ret); }else{ n = send( htp->socket, htp->request_header, strlen(htp->request_header), 0 ); scope_messages.printf( "HTTP_OP_SET::poll(): wrote HTTP header to socket %d: %d bytes\n", htp->socket, n ); } scope_messages.printf_multiline(htp->request_header, "HTTP_OP_SET::poll(): request header: "); htp->io_ready = false; switch(htp->http_op_type) { case HTTP_OP_POST: if(htp->url_mode == URL_IS_SSL && htp->pi.use_http_proxy && !htp->proxy_connect_finished ){ // you must not do_file_io equal true; htp->hrh.init(); htp->http_op_state = HTTP_STATE_REPLY_HEADER; htp->want_upload = false; htp->want_download = true; break; } htp->http_op_state = HTTP_STATE_REQUEST_BODY; htp->file = fopen(htp->infile, "rb"); if (!htp->file) { msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::poll(): no input file %s\n", htp->infile); htp->io_done = true; htp->http_op_retval = ERR_FOPEN; htp->http_op_state = HTTP_STATE_DONE; break; } htp->do_file_io = true; break; case HTTP_OP_GET: case HTTP_OP_HEAD: htp->hrh.init(); htp->http_op_state = HTTP_STATE_REPLY_HEADER; htp->want_upload = false; htp->want_download = true; // We don't need to write to the socket anymore. // Close the read fd on the receiving side. // This is needed by the scheduler "use_file" mechanism // NOTE: this is commented out because // - it seems to cause problems on all platforms // in Windows it exercises a problem with Norton Firewall #ifndef _WIN32 //shutdown(htp->socket, SHUT_WR); #endif break; case HTTP_OP_POST2: if(htp->url_mode == URL_IS_SSL && htp->pi.use_http_proxy && !htp->proxy_connect_finished ){ // you must not do_file_io equal true; htp->hrh.init(); htp->http_op_state = HTTP_STATE_REPLY_HEADER; htp->want_upload = false; htp->want_download = true; break; } htp->http_op_state = HTTP_STATE_REQUEST_BODY1; break; } } break; case HTTP_STATE_REQUEST_BODY1: if (htp->io_ready) { action = true; // n = send(htp->socket, htp->req1, strlen(htp->req1), 0); if((htp->url_mode == URL_IS_SSL && htp->proxy_connect_finished) || (htp->url_mode == URL_IS_SSL && !htp->pi.use_http_proxy)){ ret = htp->ssl_connect(htp->socket,&ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll():REQUEST_BODY1", ret, ssl_ret); ret = htp->ssl_read_write(htp->socket, htp->req1, SSL_WRITE_MODE, strlen(htp->req1), &ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll():REQUEST_BODY1", ret, ssl_ret); }else{ n = send(htp->socket, htp->req1, strlen(htp->req1), 0); } htp->http_op_state = HTTP_STATE_REQUEST_BODY; if (htp->infile && strlen(htp->infile) > 0) { htp->file = fopen(htp->infile, "rb"); if (!htp->file) { msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::poll(): no input2 file %s\n", htp->infile); htp->io_done = true; htp->http_op_retval = ERR_FOPEN; htp->http_op_state = HTTP_STATE_DONE; break; } fseek(htp->file, (long)htp->file_offset, SEEK_SET); htp->do_file_io = true; } else { htp->io_done = true; htp->do_file_io = false; } htp->io_ready = false; } break; case HTTP_STATE_REQUEST_BODY: if (htp->io_done) { action = true; scope_messages.printf("HTTP_OP_SET::poll(): finished sending request body\n"); htp->hrh.init(); htp->http_op_state = HTTP_STATE_REPLY_HEADER; if (htp->file) { fclose(htp->file); htp->file = 0; } htp->do_file_io = false; htp->want_upload = false; htp->want_download = true; htp->io_ready = false; htp->io_done = false; // We don't need to write to the socket anymore. // Close the read fd on the receiving side. // This is needed by the scheduler "use_file" mechanism // NOTE: this is commented out because // - it seems to cause problems on all platforms // in Windows it exercises a problem with Norton Firewall #ifndef _WIN32 //shutdown(htp->socket, SHUT_WR); #endif } break; case HTTP_STATE_REPLY_HEADER: if (htp->io_ready) { action = true; scope_messages.printf( "HTTP_OP_SET::poll(): reading reply header; io_ready %d io_done %d\n", htp->io_ready, htp->io_done ); // if (htp->hrh.read_reply(htp->socket)) { // // not done yet // htp->io_ready = false; // break; // } if((htp->url_mode == URL_IS_SSL && htp->proxy_connect_finished) || (htp->url_mode == URL_IS_SSL && !htp->pi.use_http_proxy)){ memset(buf,0,sizeof(buf)); ret = htp->ssl_connect(htp->socket,&ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll():REPLY_HEADER", ret, ssl_ret); ret = htp->ssl_read_write(htp->socket, buf, SSL_READ_MODE, 0, &ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll():REPLY_HEADER", ret, ssl_ret); htp->hrh.recv_buf = buf; htp->hrh.parse(); }else{ if (htp->hrh.read_reply(htp->socket)) { htp->io_ready = false; break; } } // TODO: handle all kinds of redirects here if (htp->hrh.http_status == HTTP_STATUS_MOVED_PERM || htp->hrh.http_status == HTTP_STATUS_MOVED_TEMP) { htp->close_socket(); switch (htp->http_op_type) { case HTTP_OP_HEAD: htp->init_head(htp->hrh.redirect_location.c_str()); break; case HTTP_OP_GET: htp->init_get(htp->hrh.redirect_location.c_str(), htp->outfile, false); break; case HTTP_OP_POST: htp->init_post(htp->hrh.redirect_location.c_str(), htp->infile, htp->outfile); break; case HTTP_OP_POST2: htp->init_post2(htp->hrh.redirect_location.c_str(), htp->req1, htp->infile, htp->file_offset); break; } // Open connection to the redirected server // retval = htp->open_server(); if (retval) { htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = retval; } break; } if (htp->hrh.http_status == HTTP_STATUS_PROXY_AUTH_REQ) { htp->close_socket(); htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = htp->hrh.http_status; msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::poll(): Proxy Authentication Failed\n"); break; } if ((htp->hrh.http_status/100)*100 != HTTP_STATUS_OK) { htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = htp->hrh.http_status; break; } else{ // status (200-299) if(htp->pi.use_http_proxy){ if(htp->url_mode == URL_IS_SSL && !htp->proxy_connect_finished){ htp->proxy_connect_finished = true; htp->is_connected = false; htp->init_ssl(); ret = htp->ssl_connect(htp->socket,&ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll():REPLY_HEADER[AFTER CONNECT]", ret, ssl_ret); switch (htp->http_op_type) { case HTTP_OP_HEAD: htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = 0; break; case HTTP_OP_GET: htp->init_ssl_get(htp->outfile, false); htp->http_op_retval = htp->hrh.http_status; break; case HTTP_OP_POST: htp->init_ssl_post(htp->infile, htp->outfile); break; case HTTP_OP_POST2: if(!strcmp(htp->infile,"")){ htp->init_ssl_post2(htp->req1, NULL, htp->file_offset); }else{ htp->init_ssl_post2(htp->req1, htp->infile, htp->file_offset); } break; } break; } } } switch (htp->http_op_type) { case HTTP_OP_HEAD: htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = 0; break; case HTTP_OP_POST: retval = unlink(htp->outfile); // no error check here because file need not already exist // // fall through case HTTP_OP_GET: htp->http_op_state = HTTP_STATE_REPLY_BODY; htp->file = boinc_fopen(htp->outfile, "ab"); if (!htp->file) { msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::poll(): can't open output file %s\n", htp->outfile ); htp->io_done = true; htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = ERR_FOPEN; break; } htp->do_file_io = true; break; case HTTP_OP_POST2: htp->http_op_state = HTTP_STATE_REPLY_BODY; htp->io_ready = false; htp->io_done = true; break; } } break; case HTTP_STATE_REPLY_BODY: if (htp->io_done) { action = true; switch(htp->http_op_type) { case HTTP_OP_POST2: // read_reply(htp->socket, htp->req1, 256); if((htp->url_mode == URL_IS_SSL && htp->proxy_connect_finished) || (htp->url_mode == URL_IS_SSL && !htp->pi.use_http_proxy)){ ret = htp->ssl_connect(htp->socket,&ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll() REPLY_BODY", ret, ssl_ret); ret = htp->ssl_read_write(htp->socket, htp->req1, SSL_READ_MODE, 0, &ssl_ret); htp->ssl_error_print("HTTP_OP_SET::poll() REPLY_BODY", ret, ssl_ret); }else{ read_reply(htp->socket, htp->req1, 256); } // parse reply here? break; default: fclose(htp->file); htp->file = 0; break; } scope_messages.printf("HTTP_OP_SET::poll(): got reply body\n"); htp->http_op_state = HTTP_STATE_DONE; htp->http_op_retval = 0; } break; } if(htp->http_op_state == HTTP_STATE_DONE){ htp->proxy_connect_finished = false; } } return action; } // Remove an HTTP_OP from the set // int HTTP_OP_SET::remove(HTTP_OP* p) { vector::iterator iter; net_xfers->remove(p); iter = http_ops.begin(); while (iter != http_ops.end()) { if (*iter == p) { http_ops.erase(iter); return 0; } iter++; } msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::remove(): not found\n"); return ERR_NOT_FOUND; } const char *BOINC_RCSID_1358be159f = "$Id$";