mirror of https://github.com/BOINC/boinc.git
1034 lines
36 KiB
C
1034 lines
36 KiB
C
// Berkeley Open Infrastructure for Network Computing
|
|
// http://boinc.berkeley.edu
|
|
// Copyright (C) 2005 University of California
|
|
//
|
|
// This is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
// License as published by the Free Software Foundation;
|
|
// either version 2.1 of the License, or (at your option) any later version.
|
|
//
|
|
// This software is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
// See the GNU Lesser General Public License for more details.
|
|
//
|
|
// To view the GNU Lesser General Public License visit
|
|
// http://www.gnu.org/copyleft/lesser.html
|
|
// or write to the Free Software Foundation, Inc.,
|
|
// 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
#include "cpp.h"
|
|
|
|
#ifdef _WIN32
|
|
#include "boinc_win.h"
|
|
#define SHUT_WR SD_SEND
|
|
using std::string;
|
|
#endif
|
|
|
|
#ifndef _WIN32
|
|
#include <cstring>
|
|
#include <sstream>
|
|
#include <algorithm>
|
|
|
|
#if HAVE_SYS_STAT_H
|
|
#include <sys/stat.h>
|
|
#endif
|
|
#if HAVE_SYS_SOCKET_H
|
|
#include <sys/socket.h>
|
|
#endif
|
|
#if HAVE_ERRNO_H
|
|
#include <errno.h>
|
|
#endif
|
|
#if HAVE_UNISTD_H
|
|
#include <unistd.h>
|
|
#endif
|
|
#endif
|
|
|
|
#include "error_numbers.h"
|
|
#include "filesys.h"
|
|
#include "util.h"
|
|
#include "client_msgs.h"
|
|
|
|
#include "http.h"
|
|
#include "base64.h"
|
|
|
|
#define HTTP_BLOCKSIZE 16384
|
|
|
|
#include "..\lib\base64.h"
|
|
|
|
using namespace INCSSL;
|
|
|
|
// Breaks a HTTP url down into its server and file path components
|
|
//
|
|
//void parse_url(const char* url, char* host, int &port, char* file) {
|
|
int parse_url(const char* url, char* host, int &port, char* file) {
|
|
char* p;
|
|
char buf[256];
|
|
int retval = 0;
|
|
|
|
// if (strncmp(url, "http://", 7) == 0) {
|
|
// safe_strcpy(buf, url+7);
|
|
// } else {
|
|
// safe_strcpy(buf, url);
|
|
// }
|
|
if (strncmp(url, "https://", 8) == 0) {
|
|
safe_strcpy(buf, url+8);
|
|
retval = URL_IS_SSL;
|
|
}else if (strncmp(url, "http://", 7) == 0) {
|
|
safe_strcpy(buf, url+7);
|
|
} else {
|
|
safe_strcpy(buf, url);
|
|
}
|
|
p = strchr(buf, '/');
|
|
if (p) {
|
|
strcpy(file, p+1);
|
|
*p = 0;
|
|
} else {
|
|
strcpy(file, "");
|
|
}
|
|
p=strchr(buf,':');
|
|
if (p) {
|
|
port = atol(p+1);
|
|
*p = 0;
|
|
} else {
|
|
port=80;
|
|
if(retval){
|
|
// SSL default
|
|
port = 443;
|
|
}
|
|
}
|
|
strcpy(host, buf);
|
|
return retval;
|
|
}
|
|
|
|
// Prints an HTTP 1.0 CONNECT request header into buf
|
|
// Hopefully there won't be chunked transfers in a CONNECT
|
|
//
|
|
static void http_connect_request_header_proxy(
|
|
char* buf, char* host, int port, char* file, char* enc_str
|
|
) {
|
|
sprintf(buf,
|
|
"CONNECT %s HTTP/1.0\015\012"
|
|
"User-Agent: BOINC client\015\012"
|
|
"Host: %s:%d\015\012"
|
|
"Proxy-Authorization: Basic %s\015\012"
|
|
"\015\012",
|
|
file,host,port,enc_str
|
|
);
|
|
}
|
|
|
|
// Prints an HTTP 1.1 GET request header into buf
|
|
// Hopefully there won't be chunked transfers in a GET
|
|
//
|
|
static void http_get_request_header(
|
|
char* buf, char* host, int port, char* file, double offset
|
|
) {
|
|
char offset_info[256];
|
|
if (offset) sprintf( offset_info, "Range: bytes=%.0f-\015\012", offset );
|
|
sprintf(buf,
|
|
"GET %s HTTP/1.0\015\012"
|
|
"User-Agent: BOINC client\015\012"
|
|
"Host: %s:%d\015\012"
|
|
"%s"
|
|
"Connection: close\015\012"
|
|
"Accept: */*\015\012"
|
|
"\015\012",
|
|
file, host, port, offset?offset_info:""
|
|
);
|
|
}
|
|
|
|
static void http_get_request_header_proxy(
|
|
char* buf, char* host, int port, char* file, double offset, char* encstr
|
|
) {
|
|
char offset_info[256];
|
|
if (offset) sprintf( offset_info, "Range: bytes=%.0f-\015\012", offset );
|
|
sprintf(buf,
|
|
"GET %s HTTP/1.0\015\012"
|
|
"User-Agent: BOINC client\015\012"
|
|
"Host: %s:%d\015\012"
|
|
"%s"
|
|
"Connection: close\015\012"
|
|
"Accept: */*\015\012"
|
|
"Proxy-Authorization: Basic %s\015\012"
|
|
"\015\012",
|
|
file, host, port, offset?offset_info:"", encstr
|
|
);
|
|
}
|
|
|
|
// Prints an HTTP 1.1 HEAD request header into buf
|
|
//
|
|
static void http_head_request_header(char* buf, char* host, int port, char* file) {
|
|
sprintf(buf,
|
|
"HEAD %s HTTP/1.0\015\012"
|
|
"User-Agent: BOINC client\015\012"
|
|
"Host: %s:%d\015\012"
|
|
"Connection: close\015\012"
|
|
"Accept: */*\015\012"
|
|
"\015\012",
|
|
file, host, port
|
|
);
|
|
}
|
|
|
|
static void http_head_request_header_proxy(char* buf, char* host, int port, char* file, char* encstr
|
|
) {
|
|
sprintf(buf,
|
|
"HEAD %s HTTP/1.0\015\012"
|
|
"User-Agent: BOINC client\015\012"
|
|
"Host: %s:%d\015\012"
|
|
"Connection: close\015\012"
|
|
"Accept: */*\015\012"
|
|
"Proxy-Authorization: Basic %s\015\012"
|
|
"\015\012",
|
|
file, host, port, encstr
|
|
);
|
|
}
|
|
|
|
// Prints an HTTP 1.0 POST request header into buf
|
|
// Use HTTP 1.0 so we don't have to deal with chunked transfers
|
|
//
|
|
static void http_post_request_header(
|
|
char* buf, char* host, int port, char* file, int size
|
|
) {
|
|
sprintf(buf,
|
|
"POST %s HTTP/1.0\015\012"
|
|
"Pragma: no-cache\015\012"
|
|
"Cache-Control: no-cache\015\012"
|
|
"Host: %s:%d\015\012"
|
|
"Connection: close\015\012"
|
|
"Content-Type: application/octet-stream\015\012"
|
|
"Content-Length: %d\015\012"
|
|
"\015\012",
|
|
file, host, port, size
|
|
);
|
|
}
|
|
|
|
static void http_post_request_header_proxy(
|
|
char* buf, char* host, int port, char* file, int size, char* encstr
|
|
) {
|
|
sprintf(buf,
|
|
"POST %s HTTP/1.0\015\012"
|
|
"Pragma: no-cache\015\012"
|
|
"Cache-Control: no-cache\015\012"
|
|
"Host: %s:%d\015\012"
|
|
"Connection: close\015\012"
|
|
"Content-Type: application/octet-stream\015\012"
|
|
"Content-Length: %d\015\012"
|
|
"Proxy-Authorization: Basic %s\015\012"
|
|
"\015\012",
|
|
file, host, port, size, encstr
|
|
);
|
|
}
|
|
|
|
void HTTP_REPLY_HEADER::init() {
|
|
http_status = 500;
|
|
content_length = 0;
|
|
redirect_location.erase();
|
|
recv_buf.erase();
|
|
}
|
|
|
|
void HTTP_REPLY_HEADER::parse() {
|
|
SCOPE_MSG_LOG scope_messages(log_messages, CLIENT_MSG_LOG::DEBUG_HTTP);
|
|
|
|
istringstream h(recv_buf);
|
|
string line, w;
|
|
|
|
if (getline(h, line)) {
|
|
istringstream iline(line);
|
|
|
|
iline >> w;
|
|
if (!starts_with(w,"HTTP/")) {
|
|
scope_messages.printf("HTTP_REPLY_HEADER::parse(): not HTTP\n");
|
|
return;
|
|
}
|
|
iline >> http_status;
|
|
scope_messages.printf("HTTP_REPLY_HEADER::parse(): status=%d\n", http_status);
|
|
}
|
|
|
|
while (getline(h, line)) {
|
|
istringstream iline(line);
|
|
|
|
iline >> w;
|
|
downcase_string(w);
|
|
if (w == "content-length:") {
|
|
iline >> content_length;
|
|
scope_messages.printf("HTTP_REPLY_HEADER::parse(): content_length=%d\n", content_length);
|
|
} else if (w == "location:") {
|
|
iline >> redirect_location;
|
|
scope_messages.printf("HTTP_REPLY_HEADER::parse(): redirect_location=%s\n", redirect_location.c_str());
|
|
}
|
|
}
|
|
}
|
|
|
|
const unsigned int MAX_HEADER_SIZE = 1024;
|
|
|
|
// Parse an http reply header into the header struct
|
|
//
|
|
// Returns 1 if not done yet, 0 if done (header.http_status indicates success)
|
|
//
|
|
int HTTP_REPLY_HEADER::read_reply(int socket) {
|
|
SCOPE_MSG_LOG scope_messages(log_messages, CLIENT_MSG_LOG::DEBUG_HTTP);
|
|
|
|
while (recv_buf.size() < MAX_HEADER_SIZE) {
|
|
char c;
|
|
errno = 0;
|
|
int n = recv(socket, &c, 1, 0);
|
|
if (n != 1) {
|
|
scope_messages.printf(
|
|
"HTTP_REPLY_HEADER::read_reply(): recv() on socket %d returned %d errno %d sockerr %d\n",
|
|
socket, n, errno, get_socket_error(socket)
|
|
);
|
|
}
|
|
if (n == -1 && errno == EAGAIN) {
|
|
return 1;
|
|
}
|
|
|
|
// if n is zero, we've reached EOF (and that's an error)
|
|
//
|
|
if (n != 1) {
|
|
break;
|
|
}
|
|
|
|
if (c == '\r') continue;
|
|
recv_buf += c;
|
|
|
|
if (ends_with(recv_buf, "\n\n")) {
|
|
scope_messages.printf_multiline(recv_buf.c_str(),
|
|
"HTTP_REPLY_HEADER::read_reply(): header: "
|
|
);
|
|
parse();
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
// error occurred; status will be 500 (from constructor)
|
|
//
|
|
scope_messages.printf(
|
|
"HTTP_REPLY_HEADER::read_reply(): returning error (recv_buf=%s)\n",
|
|
recv_buf.c_str()
|
|
);
|
|
return 0;
|
|
}
|
|
|
|
// Read the contents of the socket into buf
|
|
//
|
|
static int read_reply(int socket, char* buf, int len) {
|
|
int i, n;
|
|
for (i=0; i<len-1; i++) {
|
|
n = recv(socket, buf+i, 1, 0);
|
|
if (n != 1) break;
|
|
}
|
|
buf[i] = 0;
|
|
return 0;
|
|
}
|
|
|
|
HTTP_OP::HTTP_OP() {
|
|
strcpy(url_hostname, "");
|
|
strcpy(filename, "");
|
|
req1 = NULL;
|
|
strcpy(infile, "");
|
|
strcpy(outfile, "");
|
|
content_length = 0;
|
|
file_offset = 0;
|
|
strcpy(request_header, "");
|
|
http_op_state = HTTP_STATE_IDLE;
|
|
http_op_type = HTTP_OP_NONE;
|
|
http_op_retval = 0;
|
|
}
|
|
|
|
HTTP_OP::~HTTP_OP() {
|
|
}
|
|
|
|
void HTTP_OP::get_base64_str(bool auth, const char* u_name, const char* passwd, char* outstr) {
|
|
char id_passwd[512];
|
|
string enc_str = "";
|
|
memset(id_passwd,0,sizeof(id_passwd));
|
|
if(auth){
|
|
strcpy(id_passwd,u_name);
|
|
strcat(id_passwd,":");
|
|
strcat(id_passwd,passwd);
|
|
enc_str = r_base64_encode(id_passwd,strlen(id_passwd));
|
|
}
|
|
memcpy(outstr, enc_str.c_str(), enc_str.size() );
|
|
}
|
|
|
|
// Initialize HTTP HEAD operation
|
|
//
|
|
int HTTP_OP::init_head(const char* url) {
|
|
char proxy_buf[256];
|
|
char enc_str[512];
|
|
|
|
memset(enc_str,0,sizeof(enc_str));
|
|
url_mode = parse_url(url, url_hostname, port, filename);
|
|
PROXY::init(url_hostname, port);
|
|
NET_XFER::init(get_proxy_server_name(url_hostname),get_proxy_port(port), HTTP_BLOCKSIZE);
|
|
http_op_type = HTTP_OP_HEAD;
|
|
http_op_state = HTTP_STATE_CONNECTING;
|
|
|
|
if (pi.use_http_proxy) {
|
|
get_base64_str(pi.use_http_auth, pi.http_user_name, pi.http_user_passwd, enc_str);
|
|
if(url_mode == URL_IS_SSL){
|
|
if(proxy_connect_finished) {
|
|
sprintf( proxy_buf, "%s:%d", url_hostname, port );
|
|
http_head_request_header_proxy(request_header, url_hostname, port, proxy_buf, enc_str);
|
|
}else{
|
|
sprintf( proxy_buf, "%s:%d", url_hostname, port );
|
|
http_connect_request_header_proxy(request_header, url_hostname,
|
|
port, proxy_buf, enc_str );
|
|
}
|
|
}else{
|
|
sprintf( proxy_buf, "%s:%d", url_hostname, port );
|
|
http_head_request_header_proxy(request_header, url_hostname, port, proxy_buf, enc_str);
|
|
}
|
|
} else {
|
|
sprintf( proxy_buf, "/%s", filename );
|
|
http_head_request_header(request_header, url_hostname, port, proxy_buf);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
// Initialize HTTP GET operation
|
|
//
|
|
int HTTP_OP::init_get(const char* url, char* out, bool del_old_file, double off) {
|
|
char proxy_buf[256];
|
|
char enc_str[512];
|
|
|
|
memset(enc_str,0,sizeof(enc_str));
|
|
|
|
if (del_old_file) {
|
|
unlink(out);
|
|
}
|
|
file_offset = off;
|
|
url_mode = parse_url(url, url_hostname, port, filename);
|
|
|
|
PROXY::init(url_hostname, port);
|
|
NET_XFER::init(get_proxy_server_name(url_hostname),get_proxy_port(port), HTTP_BLOCKSIZE);
|
|
safe_strcpy(outfile, out);
|
|
if (off != 0){
|
|
bytes_xferred = off;
|
|
}
|
|
http_op_type = HTTP_OP_GET;
|
|
http_op_state = HTTP_STATE_CONNECTING;
|
|
if (pi.use_http_proxy) {
|
|
get_base64_str(pi.use_http_auth, pi.http_user_name, pi.http_user_passwd, enc_str);
|
|
if(url_mode == URL_IS_SSL){
|
|
if(proxy_connect_finished) {
|
|
sprintf( proxy_buf, "http://%s:%d/%s", url_hostname, get_proxy_port(port), filename );
|
|
http_get_request_header_proxy(request_header, url_hostname, port, proxy_buf, (int)file_offset, enc_str);
|
|
}else{
|
|
sprintf( proxy_buf, "%s:%d", url_hostname, port );
|
|
http_connect_request_header_proxy(request_header, url_hostname,
|
|
port, proxy_buf, enc_str );
|
|
}
|
|
}else{
|
|
sprintf( proxy_buf, "http://%s:%d/%s", url_hostname, port, filename );
|
|
http_get_request_header_proxy(request_header, url_hostname, port, proxy_buf, (int)file_offset, enc_str);
|
|
}
|
|
} else {
|
|
sprintf( proxy_buf, "/%s", filename );
|
|
http_get_request_header(request_header, url_hostname, port, proxy_buf, (int)file_offset);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
// Initialize HTTP POST operation
|
|
//
|
|
int HTTP_OP::init_post(const char* url, char* in, char* out) {
|
|
int retval;
|
|
double size;
|
|
char proxy_buf[256];
|
|
char enc_str[512];
|
|
|
|
memset(enc_str,0,sizeof(enc_str));
|
|
|
|
SCOPE_MSG_LOG scope_messages(log_messages, CLIENT_MSG_LOG::DEBUG_HTTP);
|
|
|
|
url_mode = parse_url(url, url_hostname, port, filename);
|
|
|
|
PROXY::init(url_hostname, port);
|
|
NET_XFER::init(get_proxy_server_name(url_hostname),get_proxy_port(port), HTTP_BLOCKSIZE);
|
|
safe_strcpy(infile, in);
|
|
safe_strcpy(outfile, out);
|
|
retval = file_size(infile, size);
|
|
if (retval) return retval;
|
|
content_length = (int)size;
|
|
http_op_type = HTTP_OP_POST;
|
|
http_op_state = HTTP_STATE_CONNECTING;
|
|
|
|
if (pi.use_http_proxy){
|
|
get_base64_str(pi.use_http_auth, pi.http_user_name, pi.http_user_passwd, enc_str);
|
|
if(url_mode == URL_IS_SSL){
|
|
if(proxy_connect_finished) {
|
|
sprintf( proxy_buf, "http://%s:%d/%s", url_hostname, get_proxy_port(port), filename );
|
|
http_post_request_header_proxy(request_header, url_hostname, port, proxy_buf, content_length, enc_str);
|
|
}else{
|
|
sprintf( proxy_buf, "%s:%d", url_hostname, port );
|
|
http_connect_request_header_proxy(request_header, url_hostname,
|
|
port, proxy_buf, enc_str );
|
|
}
|
|
}else{
|
|
sprintf( proxy_buf, "http://%s:%d/%s", url_hostname, port, filename );
|
|
http_post_request_header_proxy(request_header, url_hostname, port, proxy_buf, content_length, enc_str);
|
|
}
|
|
} else {
|
|
sprintf( proxy_buf, "/%s", filename );
|
|
http_post_request_header(request_header, url_hostname, port, proxy_buf, content_length);
|
|
}
|
|
|
|
scope_messages.printf("HTTP_OP::init_post(): %p io_done %d\n", this, io_done);
|
|
return 0;
|
|
}
|
|
|
|
// Initialize HTTP POST operation
|
|
//
|
|
int HTTP_OP::init_post2(
|
|
const char* url, char* r1, char* in, double offset
|
|
) {
|
|
int retval;
|
|
double size;
|
|
char proxy_buf[256];
|
|
char enc_str[512];
|
|
|
|
url_mode = parse_url(url, url_hostname, port, filename);
|
|
PROXY::init(url_hostname, port);
|
|
NET_XFER::init(get_proxy_server_name(url_hostname),get_proxy_port(port), HTTP_BLOCKSIZE);
|
|
req1 = r1;
|
|
content_length = 0; //
|
|
if (in) {
|
|
safe_strcpy(infile, in);
|
|
file_offset = offset;
|
|
retval = file_size(infile, size);
|
|
if (retval) {
|
|
printf("HTTP::init_post2: couldn't get file size\n");
|
|
return retval;
|
|
}
|
|
content_length = (int)size - (int)offset;
|
|
}
|
|
content_length += strlen(req1);
|
|
http_op_type = HTTP_OP_POST2;
|
|
http_op_state = HTTP_STATE_CONNECTING;
|
|
|
|
if (pi.use_http_proxy){
|
|
get_base64_str(pi.use_http_auth, pi.http_user_name, pi.http_user_passwd, enc_str);
|
|
if(url_mode == URL_IS_SSL){
|
|
if(proxy_connect_finished) {
|
|
sprintf( proxy_buf, "http://%s:%d/%s", url_hostname, get_proxy_port(port), filename );
|
|
http_post_request_header_proxy(request_header, url_hostname, port, proxy_buf, content_length, enc_str);
|
|
}else{
|
|
sprintf( proxy_buf, "%s:%d", url_hostname, port );
|
|
http_connect_request_header_proxy(request_header, url_hostname,
|
|
port, proxy_buf, enc_str );
|
|
}
|
|
}else{
|
|
sprintf( proxy_buf, "http://%s:%d/%s", url_hostname, port, filename );
|
|
http_post_request_header_proxy(request_header, url_hostname, port, proxy_buf, content_length, enc_str);
|
|
}
|
|
} else {
|
|
sprintf( proxy_buf, "/%s", filename );
|
|
http_post_request_header(request_header, url_hostname, port, proxy_buf, content_length);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int HTTP_OP::init_ssl_get(char* out, bool del_old_file, double off) {
|
|
char proxy_buf[256];
|
|
|
|
if (del_old_file) {
|
|
unlink(out);
|
|
}
|
|
file_offset = off;
|
|
safe_strcpy(outfile, out);
|
|
if (off != 0){
|
|
bytes_xferred = off;
|
|
}
|
|
http_op_type = HTTP_OP_GET;
|
|
http_op_state = HTTP_STATE_CONNECTING;
|
|
|
|
sprintf( proxy_buf, "/%s", filename );
|
|
|
|
http_get_request_header(request_header, url_hostname, port, proxy_buf, (int)file_offset);
|
|
return 0;
|
|
}
|
|
|
|
int HTTP_OP::init_ssl_post(char* in, char* out) {
|
|
int retval;
|
|
double size;
|
|
char proxy_buf[256];
|
|
|
|
SCOPE_MSG_LOG scope_messages(log_messages, CLIENT_MSG_LOG::DEBUG_HTTP);
|
|
|
|
NET_XFER::init_2();
|
|
|
|
safe_strcpy(infile, in);
|
|
safe_strcpy(outfile, out);
|
|
retval = file_size(infile, size);
|
|
if (retval) return retval;
|
|
content_length = (int)size;
|
|
http_op_type = HTTP_OP_POST;
|
|
http_op_state = HTTP_STATE_CONNECTING;
|
|
|
|
sprintf( proxy_buf, "/%s", filename );
|
|
http_post_request_header(request_header, url_hostname, port, proxy_buf, content_length);
|
|
|
|
scope_messages.printf("HTTP_OP::init_ssl_post(): %p io_done %d\n", this, io_done);
|
|
return 0;
|
|
}
|
|
|
|
int HTTP_OP::init_ssl_post2(
|
|
char* r1, char* in, double offset
|
|
) {
|
|
int retval;
|
|
double size;
|
|
char proxy_buf[256];
|
|
|
|
NET_XFER::init_2();
|
|
|
|
req1 = r1;
|
|
content_length = 0;
|
|
if (in) {
|
|
safe_strcpy(infile, in);
|
|
file_offset = offset;
|
|
retval = file_size(infile, size);
|
|
if (retval) {
|
|
printf("HTTP::init_post2: couldn't get file size\n");
|
|
return retval;
|
|
}
|
|
content_length = (int)size - (int)offset;
|
|
}
|
|
content_length += strlen(req1);
|
|
http_op_type = HTTP_OP_POST2;
|
|
http_op_state = HTTP_STATE_CONNECTING;
|
|
|
|
sprintf( proxy_buf, "/%s", filename );
|
|
http_post_request_header(request_header, url_hostname, port, proxy_buf, content_length);
|
|
return 0;
|
|
}
|
|
|
|
// Returns true if the HTTP operation is complete
|
|
//
|
|
bool HTTP_OP::http_op_done() {
|
|
return (http_op_state == HTTP_STATE_DONE);
|
|
}
|
|
|
|
HTTP_OP_SET::HTTP_OP_SET(NET_XFER_SET* p) {
|
|
net_xfers = p;
|
|
}
|
|
|
|
// Adds an HTTP_OP to the set
|
|
//
|
|
int HTTP_OP_SET::insert(HTTP_OP* ho) {
|
|
int retval;
|
|
|
|
retval = net_xfers->insert(ho);
|
|
if (retval) return retval;
|
|
http_ops.push_back(ho);
|
|
return 0;
|
|
}
|
|
|
|
bool HTTP_OP_SET::poll() {
|
|
unsigned int i;
|
|
HTTP_OP* htp;
|
|
int n, retval;
|
|
bool action = false;
|
|
char buf[MAX_BLOCKSIZE];
|
|
int ret;
|
|
int ssl_ret=0;
|
|
|
|
SCOPE_MSG_LOG scope_messages(log_messages, CLIENT_MSG_LOG::DEBUG_HTTP);
|
|
|
|
for (i=0; i<http_ops.size(); i++) {
|
|
htp = http_ops[i];
|
|
if (htp->error) {
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = htp->error;
|
|
action = true;
|
|
continue;
|
|
}
|
|
switch(htp->http_op_state) {
|
|
case HTTP_STATE_CONNECTING:
|
|
if (htp->is_connected) {
|
|
htp->http_op_state = HTTP_STATE_SOCKS_CONNECT;
|
|
htp->want_upload = true;
|
|
action = true;
|
|
}
|
|
break;
|
|
case HTTP_STATE_SOCKS_CONNECT:
|
|
// Since the HTTP layer is synchronous with the proxy layer, we
|
|
// call proxy_poll() here instead of in do_something()
|
|
htp->proxy_poll();
|
|
|
|
// After negotiation with the proxy is complete, advance to
|
|
// the next step of the HTTP layer
|
|
if (htp->proxy_negotiated()) {
|
|
if (htp->proxy_retval) {
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = htp->proxy_retval;
|
|
switch (htp->proxy_retval) {
|
|
case ERR_SOCKS_UNKNOWN_FAILURE:
|
|
msg_printf(NULL, MSG_ERROR, "An unknown SOCKS server error occurred\n");
|
|
break;
|
|
case ERR_SOCKS_REQUEST_FAILED:
|
|
msg_printf(NULL, MSG_ERROR, "The SOCKS server denied access for this computer\n");
|
|
break;
|
|
case ERR_SOCKS_BAD_USER_PASS:
|
|
msg_printf(NULL, MSG_ERROR, "Incorrect SOCKS user name and/or password\n");
|
|
break;
|
|
case ERR_SOCKS_UNKNOWN_SERVER_VERSION:
|
|
msg_printf(NULL, MSG_ERROR, "The SOCKS server is using an unknown version\n");
|
|
break;
|
|
case ERR_SOCKS_UNSUPPORTED:
|
|
msg_printf(NULL, MSG_ERROR, "The SOCKS server is using unsupported features unknown to BOINC\n");
|
|
break;
|
|
case ERR_SOCKS_CANT_REACH_HOST:
|
|
msg_printf(NULL, MSG_ERROR, "The SOCKS server is unable to contact the host\n");
|
|
break;
|
|
case ERR_SOCKS_CONN_REFUSED:
|
|
msg_printf(NULL, MSG_ERROR, "The connection from the SOCKS server to the host was refused\n");
|
|
break;
|
|
}
|
|
} else {
|
|
htp->http_op_state = HTTP_STATE_REQUEST_HEADER;
|
|
}
|
|
}
|
|
break;
|
|
case HTTP_STATE_REQUEST_HEADER:
|
|
if (htp->io_ready) {
|
|
action = true;
|
|
// n = send(
|
|
// htp->socket, htp->request_header,
|
|
// strlen(htp->request_header), 0
|
|
// );
|
|
// scope_messages.printf(
|
|
// "HTTP_OP_SET::poll(): wrote HTTP header to socket %d: %d bytes\n",
|
|
// htp->socket, n
|
|
// );
|
|
if((htp->url_mode == URL_IS_SSL && htp->proxy_connect_finished) ||
|
|
(htp->url_mode == URL_IS_SSL && !htp->pi.use_http_proxy)){
|
|
htp->init_ssl();
|
|
ret = htp->ssl_connect(htp->socket,&ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll() REQUEST_HEADER", ret, ssl_ret);
|
|
ret = htp->ssl_read_write(htp->socket, htp->request_header, SSL_WRITE_MODE, strlen(htp->request_header),&ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll() REQUEST_HEADER", ret, ssl_ret);
|
|
scope_messages.printf(
|
|
"HTTP_OP_SET::poll(): wrote HTTPS header to socket %d: error code: %d\n",
|
|
htp->socket,ret);
|
|
}else{
|
|
n = send(
|
|
htp->socket, htp->request_header,
|
|
strlen(htp->request_header), 0
|
|
);
|
|
scope_messages.printf(
|
|
"HTTP_OP_SET::poll(): wrote HTTP header to socket %d: %d bytes\n",
|
|
htp->socket, n
|
|
);
|
|
}
|
|
scope_messages.printf_multiline(htp->request_header, "HTTP_OP_SET::poll(): request header: ");
|
|
htp->io_ready = false;
|
|
switch(htp->http_op_type) {
|
|
case HTTP_OP_POST:
|
|
if(htp->url_mode == URL_IS_SSL &&
|
|
htp->pi.use_http_proxy &&
|
|
!htp->proxy_connect_finished ){
|
|
// you must not do_file_io equal true;
|
|
htp->hrh.init();
|
|
htp->http_op_state = HTTP_STATE_REPLY_HEADER;
|
|
htp->want_upload = false;
|
|
htp->want_download = true;
|
|
break;
|
|
}
|
|
htp->http_op_state = HTTP_STATE_REQUEST_BODY;
|
|
htp->file = fopen(htp->infile, "rb");
|
|
if (!htp->file) {
|
|
msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::poll(): no input file %s\n", htp->infile);
|
|
htp->io_done = true;
|
|
htp->http_op_retval = ERR_FOPEN;
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
break;
|
|
}
|
|
htp->do_file_io = true;
|
|
break;
|
|
case HTTP_OP_GET:
|
|
case HTTP_OP_HEAD:
|
|
htp->hrh.init();
|
|
htp->http_op_state = HTTP_STATE_REPLY_HEADER;
|
|
htp->want_upload = false;
|
|
htp->want_download = true;
|
|
|
|
// We don't need to write to the socket anymore.
|
|
// Close the read fd on the receiving side.
|
|
// This is needed by the scheduler "use_file" mechanism
|
|
// NOTE: this is commented out because
|
|
// - it seems to cause problems on all platforms
|
|
// in Windows it exercises a problem with Norton Firewall
|
|
#ifndef _WIN32
|
|
//shutdown(htp->socket, SHUT_WR);
|
|
#endif
|
|
break;
|
|
case HTTP_OP_POST2:
|
|
if(htp->url_mode == URL_IS_SSL &&
|
|
htp->pi.use_http_proxy &&
|
|
!htp->proxy_connect_finished ){
|
|
// you must not do_file_io equal true;
|
|
htp->hrh.init();
|
|
htp->http_op_state = HTTP_STATE_REPLY_HEADER;
|
|
htp->want_upload = false;
|
|
htp->want_download = true;
|
|
break;
|
|
}
|
|
htp->http_op_state = HTTP_STATE_REQUEST_BODY1;
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case HTTP_STATE_REQUEST_BODY1:
|
|
if (htp->io_ready) {
|
|
action = true;
|
|
// n = send(htp->socket, htp->req1, strlen(htp->req1), 0);
|
|
if((htp->url_mode == URL_IS_SSL && htp->proxy_connect_finished) ||
|
|
(htp->url_mode == URL_IS_SSL && !htp->pi.use_http_proxy)){
|
|
ret = htp->ssl_connect(htp->socket,&ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll():REQUEST_BODY1", ret, ssl_ret);
|
|
ret = htp->ssl_read_write(htp->socket, htp->req1, SSL_WRITE_MODE, strlen(htp->req1), &ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll():REQUEST_BODY1", ret, ssl_ret);
|
|
}else{
|
|
n = send(htp->socket, htp->req1, strlen(htp->req1), 0);
|
|
}
|
|
htp->http_op_state = HTTP_STATE_REQUEST_BODY;
|
|
|
|
if (htp->infile && strlen(htp->infile) > 0) {
|
|
htp->file = fopen(htp->infile, "rb");
|
|
if (!htp->file) {
|
|
msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::poll(): no input2 file %s\n", htp->infile);
|
|
htp->io_done = true;
|
|
htp->http_op_retval = ERR_FOPEN;
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
break;
|
|
}
|
|
fseek(htp->file, (long)htp->file_offset, SEEK_SET);
|
|
htp->do_file_io = true;
|
|
} else {
|
|
htp->io_done = true;
|
|
htp->do_file_io = false;
|
|
}
|
|
htp->io_ready = false;
|
|
}
|
|
break;
|
|
case HTTP_STATE_REQUEST_BODY:
|
|
if (htp->io_done) {
|
|
action = true;
|
|
scope_messages.printf("HTTP_OP_SET::poll(): finished sending request body\n");
|
|
htp->hrh.init();
|
|
htp->http_op_state = HTTP_STATE_REPLY_HEADER;
|
|
if (htp->file) {
|
|
fclose(htp->file);
|
|
htp->file = 0;
|
|
}
|
|
htp->do_file_io = false;
|
|
htp->want_upload = false;
|
|
htp->want_download = true;
|
|
htp->io_ready = false;
|
|
htp->io_done = false;
|
|
|
|
// We don't need to write to the socket anymore.
|
|
// Close the read fd on the receiving side.
|
|
// This is needed by the scheduler "use_file" mechanism
|
|
// NOTE: this is commented out because
|
|
// - it seems to cause problems on all platforms
|
|
// in Windows it exercises a problem with Norton Firewall
|
|
#ifndef _WIN32
|
|
//shutdown(htp->socket, SHUT_WR);
|
|
#endif
|
|
}
|
|
break;
|
|
case HTTP_STATE_REPLY_HEADER:
|
|
if (htp->io_ready) {
|
|
action = true;
|
|
scope_messages.printf(
|
|
"HTTP_OP_SET::poll(): reading reply header; io_ready %d io_done %d\n",
|
|
htp->io_ready, htp->io_done
|
|
);
|
|
// if (htp->hrh.read_reply(htp->socket)) {
|
|
// // not done yet
|
|
// htp->io_ready = false;
|
|
// break;
|
|
// }
|
|
if((htp->url_mode == URL_IS_SSL && htp->proxy_connect_finished) ||
|
|
(htp->url_mode == URL_IS_SSL && !htp->pi.use_http_proxy)){
|
|
memset(buf,0,sizeof(buf));
|
|
ret = htp->ssl_connect(htp->socket,&ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll():REPLY_HEADER", ret, ssl_ret);
|
|
ret = htp->ssl_read_write(htp->socket, buf, SSL_READ_MODE, 0, &ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll():REPLY_HEADER", ret, ssl_ret);
|
|
htp->hrh.recv_buf = buf;
|
|
htp->hrh.parse();
|
|
}else{
|
|
if (htp->hrh.read_reply(htp->socket)) {
|
|
htp->io_ready = false;
|
|
break;
|
|
}
|
|
}
|
|
|
|
// TODO: handle all kinds of redirects here
|
|
|
|
if (htp->hrh.http_status == HTTP_STATUS_MOVED_PERM || htp->hrh.http_status == HTTP_STATUS_MOVED_TEMP) {
|
|
htp->close_socket();
|
|
switch (htp->http_op_type) {
|
|
case HTTP_OP_HEAD:
|
|
htp->init_head(htp->hrh.redirect_location.c_str());
|
|
break;
|
|
case HTTP_OP_GET:
|
|
htp->init_get(htp->hrh.redirect_location.c_str(), htp->outfile, false);
|
|
break;
|
|
case HTTP_OP_POST:
|
|
htp->init_post(htp->hrh.redirect_location.c_str(), htp->infile, htp->outfile);
|
|
break;
|
|
case HTTP_OP_POST2:
|
|
htp->init_post2(htp->hrh.redirect_location.c_str(), htp->req1, htp->infile, htp->file_offset);
|
|
break;
|
|
}
|
|
|
|
// Open connection to the redirected server
|
|
//
|
|
retval = htp->open_server();
|
|
if (retval) {
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = retval;
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (htp->hrh.http_status == HTTP_STATUS_PROXY_AUTH_REQ) {
|
|
htp->close_socket();
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = htp->hrh.http_status;
|
|
msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::poll(): Proxy Authentication Failed\n");
|
|
break;
|
|
}
|
|
|
|
if ((htp->hrh.http_status/100)*100 != HTTP_STATUS_OK) {
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = htp->hrh.http_status;
|
|
break;
|
|
}
|
|
else{ // status (200-299)
|
|
if(htp->pi.use_http_proxy){
|
|
if(htp->url_mode == URL_IS_SSL && !htp->proxy_connect_finished){
|
|
htp->proxy_connect_finished = true;
|
|
htp->is_connected = false;
|
|
htp->init_ssl();
|
|
ret = htp->ssl_connect(htp->socket,&ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll():REPLY_HEADER[AFTER CONNECT]", ret, ssl_ret);
|
|
switch (htp->http_op_type) {
|
|
case HTTP_OP_HEAD:
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = 0;
|
|
break;
|
|
case HTTP_OP_GET:
|
|
htp->init_ssl_get(htp->outfile, false);
|
|
htp->http_op_retval = htp->hrh.http_status;
|
|
break;
|
|
case HTTP_OP_POST:
|
|
htp->init_ssl_post(htp->infile, htp->outfile);
|
|
break;
|
|
case HTTP_OP_POST2:
|
|
if(!strcmp(htp->infile,"")){
|
|
htp->init_ssl_post2(htp->req1, NULL, htp->file_offset);
|
|
}else{
|
|
htp->init_ssl_post2(htp->req1, htp->infile, htp->file_offset);
|
|
}
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
switch (htp->http_op_type) {
|
|
case HTTP_OP_HEAD:
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = 0;
|
|
break;
|
|
case HTTP_OP_POST:
|
|
retval = unlink(htp->outfile);
|
|
// no error check here because file need not already exist
|
|
//
|
|
// fall through
|
|
case HTTP_OP_GET:
|
|
htp->http_op_state = HTTP_STATE_REPLY_BODY;
|
|
|
|
htp->file = boinc_fopen(htp->outfile, "ab");
|
|
if (!htp->file) {
|
|
msg_printf(NULL, MSG_ERROR,
|
|
"HTTP_OP_SET::poll(): can't open output file %s\n",
|
|
htp->outfile
|
|
);
|
|
htp->io_done = true;
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = ERR_FOPEN;
|
|
break;
|
|
}
|
|
htp->do_file_io = true;
|
|
break;
|
|
case HTTP_OP_POST2:
|
|
htp->http_op_state = HTTP_STATE_REPLY_BODY;
|
|
htp->io_ready = false;
|
|
htp->io_done = true;
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case HTTP_STATE_REPLY_BODY:
|
|
if (htp->io_done) {
|
|
action = true;
|
|
switch(htp->http_op_type) {
|
|
case HTTP_OP_POST2:
|
|
// read_reply(htp->socket, htp->req1, 256);
|
|
if((htp->url_mode == URL_IS_SSL && htp->proxy_connect_finished) ||
|
|
(htp->url_mode == URL_IS_SSL && !htp->pi.use_http_proxy)){
|
|
ret = htp->ssl_connect(htp->socket,&ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll() REPLY_BODY", ret, ssl_ret);
|
|
ret = htp->ssl_read_write(htp->socket, htp->req1, SSL_READ_MODE, 0, &ssl_ret);
|
|
htp->ssl_error_print("HTTP_OP_SET::poll() REPLY_BODY", ret, ssl_ret);
|
|
}else{
|
|
read_reply(htp->socket, htp->req1, 256);
|
|
}
|
|
// parse reply here?
|
|
break;
|
|
default:
|
|
fclose(htp->file);
|
|
htp->file = 0;
|
|
break;
|
|
}
|
|
scope_messages.printf("HTTP_OP_SET::poll(): got reply body\n");
|
|
htp->http_op_state = HTTP_STATE_DONE;
|
|
htp->http_op_retval = 0;
|
|
}
|
|
break;
|
|
}
|
|
if(htp->http_op_state == HTTP_STATE_DONE){
|
|
htp->proxy_connect_finished = false;
|
|
}
|
|
}
|
|
return action;
|
|
}
|
|
|
|
// Remove an HTTP_OP from the set
|
|
//
|
|
int HTTP_OP_SET::remove(HTTP_OP* p) {
|
|
vector<HTTP_OP*>::iterator iter;
|
|
|
|
net_xfers->remove(p);
|
|
|
|
iter = http_ops.begin();
|
|
while (iter != http_ops.end()) {
|
|
if (*iter == p) {
|
|
http_ops.erase(iter);
|
|
return 0;
|
|
}
|
|
iter++;
|
|
}
|
|
msg_printf(NULL, MSG_ERROR, "HTTP_OP_SET::remove(): not found\n");
|
|
return ERR_NOT_FOUND;
|
|
}
|
|
|
|
const char *BOINC_RCSID_1358be159f = "$Id$";
|