Annotation of libwww/Library/src/HTTP.c, revision 1.188
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
1.188 ! kahan 6: ** @(#) $Id: HTTP.c,v 1.187 2000年06月19日 10:38:58 kahan Exp $
1.74 frystyk 7: **
1.185 raff 8: ** This module implements the HTTP protocol as a state machine
1.55 frystyk 9: **
10: ** History:
1.59 frystyk 11: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 12: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
13: ** Forward, redirection, error handling and referer field
1.67 duns 14: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 15: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 16: **
1.1 timbl 17: */
18:
1.78 frystyk 19: /* Library include files */
1.161 frystyk 20: #include "wwwsys.h"
1.123 frystyk 21: #include "WWWUtil.h"
22: #include "WWWCore.h"
1.177 frystyk 23: #include "HTHeader.h"
24: #include "HTMIMERq.h"
1.94 frystyk 25: #include "HTReqMan.h"
1.179 frystyk 26: #include "HTNetMan.h"
1.109 frystyk 27: #include "HTTPUtil.h"
1.80 frystyk 28: #include "HTTPReq.h"
1.55 frystyk 29: #include "HTTP.h" /* Implements */
30:
31: /* Macros and other defines */
1.94 frystyk 32: #ifndef HTTP_PORT
33: #define HTTP_PORT 80 /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
34: #endif
35:
1.71 frystyk 36: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
37: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
38: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
39: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 40: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 41:
1.178 frystyk 42: #ifdef HTDEBUG
1.177 frystyk 43: #include "WWWStream.h"
1.147 frystyk 44: #define HTTP_OUTPUT "w3chttp.out"
1.162 frystyk 45: PRIVATE FILE * htfp = NULL;
1.140 frystyk 46: #endif
1.139 frystyk 47:
1.59 frystyk 48: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 49:
50: /* Final states have negative value */
1.59 frystyk 51: typedef enum _HTTPState {
1.167 frystyk 52: HTTP_KILL_PIPE = -4,
1.141 frystyk 53: HTTP_RECOVER_PIPE = -3,
1.134 frystyk 54: HTTP_ERROR = -2,
55: HTTP_OK = -1,
1.71 frystyk 56: HTTP_BEGIN = 0,
1.144 frystyk 57: HTTP_NEED_STREAM,
1.141 frystyk 58: HTTP_CONNECTED
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60:
1.94 frystyk 61: /* This is the context structure for the this module */
1.55 frystyk 62: typedef struct _http_info {
1.81 frystyk 63: HTTPState state; /* Current State of the connection */
64: HTTPState next; /* Next state */
1.134 frystyk 65: int result; /* Result to report to the after filter */
1.139 frystyk 66: BOOL lock; /* Block for writing */
1.141 frystyk 67: HTNet * net;
1.157 frystyk 68: HTRequest * request;
69: HTTimer * timer;
1.165 frystyk 70: BOOL usedTimer;
1.181 frystyk 71: BOOL repetitive_writing;
1.55 frystyk 72: } http_info;
73:
1.88 frystyk 74: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 75:
1.71 frystyk 76: struct _HTStream {
1.119 frystyk 77: const HTStreamClass * isa;
1.71 frystyk 78: HTStream * target;
1.157 frystyk 79: HTStream * info_target; /* For 100 codes */
1.71 frystyk 80: HTRequest * request;
81: http_info * http;
1.121 frystyk 82: HTEOLState state;
1.71 frystyk 83: BOOL transparent;
1.150 frystyk 84: BOOL cont;
1.81 frystyk 85: char * version; /* Should we save this? */
1.71 frystyk 86: int status;
1.81 frystyk 87: char * reason;
1.71 frystyk 88: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 89: int buflen;
1.146 frystyk 90: int startLen;/* buflen when put_block was called */
1.71 frystyk 91: };
1.21 luotonen 92:
1.123 frystyk 93: struct _HTInputStream {
94: const HTInputStreamClass * isa;
95: };
96:
1.169 frystyk 97: /* How long to wait before writing the body in PUT and POST requests */
98: #define DEFAULT_FIRST_WRITE_DELAY 2000
99: #define DEFAULT_SECOND_WRITE_DELAY 3000
1.181 frystyk 100: #define DEFAULT_REPEAT_WRITE 30
1.169 frystyk 101:
102: PRIVATE ms_t HTFirstWriteDelay = DEFAULT_FIRST_WRITE_DELAY;
103: PRIVATE ms_t HTSecondWriteDelay = DEFAULT_SECOND_WRITE_DELAY;
1.181 frystyk 104: PRIVATE ms_t HTRepeatWrite = DEFAULT_REPEAT_WRITE;
1.169 frystyk 105:
1.147 frystyk 106: #ifdef HT_NO_PIPELINING
1.156 frystyk 107: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_NO_PIPELINING;
1.147 frystyk 108: #else
1.156 frystyk 109: #ifdef HT_MUX
110: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_MUX;
111: #else
112: #ifdef HT_FORCE_10
113: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_FORCE_10;
114: #else
115: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_PIPELINING;
116: #endif
117: #endif
1.147 frystyk 118: #endif
119:
1.71 frystyk 120: /* ------------------------------------------------------------------------- */
121: /* Help Functions */
122: /* ------------------------------------------------------------------------- */
1.21 luotonen 123:
1.94 frystyk 124: /* HTTPCleanup
125: ** -----------
1.55 frystyk 126: ** This function closes the connection and frees memory.
1.94 frystyk 127: ** Returns YES on OK, else NO
1.1 timbl 128: */
1.94 frystyk 129: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 130: {
1.126 frystyk 131: HTNet * net = HTRequest_net(req);
132: http_info * http = (http_info *) HTNet_context(net);
133: HTStream * input = HTRequest_inputStream(req);
1.80 frystyk 134:
1.178 frystyk 135: HTTRACE(PROT_TRACE, "HTTP Clean.. Called with status %d, net %p\n" _ status _ net);
1.144 frystyk 136:
1.164 frystyk 137: if (status == HT_INTERRUPTED) {
138: HTAlertCallback * cbf = HTAlert_find(HT_PROG_INTERRUPT);
139: if (cbf) (*cbf)(req, HT_PROG_INTERRUPT,
140: HT_MSG_NULL, NULL, NULL, NULL);
1.166 frystyk 141: } else if (status == HT_TIMEOUT) {
142: HTAlertCallback * cbf = HTAlert_find(HT_PROG_TIMEOUT);
143: if (cbf) (*cbf)(req, HT_PROG_TIMEOUT,
144: HT_MSG_NULL, NULL, NULL, NULL);
1.164 frystyk 145: }
1.166 frystyk 146:
1.94 frystyk 147: /* Free stream with data TO network */
1.167 frystyk 148: if (input) {
1.187 kahan 149: if (input->isa) {
150: if (status==HT_INTERRUPTED || status==HT_RECOVER_PIPE || status==HT_TIMEOUT)
151: (*input->isa->abort)(input, NULL);
152: else
153: (*input->isa->_free)(input);
154: }
1.126 frystyk 155: HTRequest_setInputStream(req, NULL);
1.94 frystyk 156: }
1.88 frystyk 157:
1.144 frystyk 158: /*
1.157 frystyk 159: ** Remove if we have registered an upload function as a callback
160: */
1.187 kahan 161: if (http && http->timer) {
1.157 frystyk 162: HTTimer_delete(http->timer);
163: http->timer = NULL;
164: }
165:
166: /*
1.144 frystyk 167: ** Remove the request object and our own context structure for http.
168: */
169: if (status != HT_RECOVER_PIPE) {
1.153 frystyk 170: HTNet_delete(net, status);
1.141 frystyk 171: HT_FREE(http);
172: }
1.94 frystyk 173: return YES;
1.55 frystyk 174: }
175:
1.71 frystyk 176: /*
1.130 frystyk 177: ** Informational 1xx codes are handled separately
1.136 frystyk 178: ** Returns YES if we should continue, NO if we should stop
1.55 frystyk 179: */
1.130 frystyk 180: PRIVATE BOOL HTTPInformation (HTStream * me)
1.55 frystyk 181: {
1.136 frystyk 182: http_info * http = me->http;
1.71 frystyk 183: switch (me->status) {
184:
1.136 frystyk 185: case 100:
1.161 frystyk 186: #if 0
1.136 frystyk 187: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CONTINUE,
188: me->reason, (int) strlen(me->reason),
189: "HTTPInformation");
1.161 frystyk 190: #endif
1.182 frystyk 191: http->result = HT_CONTINUE;
1.136 frystyk 192: return YES;
193: break;
194:
1.130 frystyk 195: case 101:
1.136 frystyk 196: /*
197: ** We consider 101 Switching as a final state and exit this request
198: */
1.130 frystyk 199: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_SWITCHING,
1.127 frystyk 200: me->reason, (int) strlen(me->reason),
1.130 frystyk 201: "HTTPInformation");
1.136 frystyk 202: http->next = HTTP_OK;
203: http->result = HT_UPGRADE;
1.180 frystyk 204: return YES;
1.127 frystyk 205: break;
206:
1.130 frystyk 207: default:
1.136 frystyk 208: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
209: (void *) me->buffer, me->buflen, "HTTPNextState");
210: http->next = HTTP_ERROR;
211: http->result = HT_ERROR;
1.127 frystyk 212: break;
1.130 frystyk 213: }
1.136 frystyk 214: return NO;
1.130 frystyk 215: }
216:
1.158 frystyk 217:
218:
1.130 frystyk 219: /*
220: ** This is a big switch handling all HTTP return codes. It puts in any
221: ** appropiate error message and decides whether we should expect data
222: ** or not.
223: */
224: PRIVATE void HTTPNextState (HTStream * me)
225: {
1.134 frystyk 226: http_info * http = me->http;
1.158 frystyk 227: int error_class = me->status / 100;
228: switch (error_class) {
1.127 frystyk 229:
1.158 frystyk 230: case 0: /* 0.9 response */
231: case 2:
1.112 frystyk 232:
1.158 frystyk 233: switch (me->status) {
1.112 frystyk 234:
1.158 frystyk 235: case 201: /* Created */
236: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CREATED,
237: me->reason, (int) strlen(me->reason),
238: "HTTPNextState");
239: http->next = HTTP_OK;
240: http->result = HT_CREATED;
241: break;
242:
243: case 202: /* Accepted */
244: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_ACCEPTED,
245: me->reason, (int) strlen(me->reason),
246: "HTTPNextState");
247: http->next = HTTP_OK;
248: http->result = HT_ACCEPTED;
249: break;
250:
251: case 203: /* Non-authoritative information */
252: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NON_AUTHORITATIVE,
253: me->reason, (int) strlen(me->reason),
254: "HTTPNextState");
255: http->next = HTTP_OK;
256: http->result = HT_LOADED;
257: break;
258:
259: case 204: /* No Response */
260: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NO_CONTENT,
261: me->reason, (int) strlen(me->reason),
262: "HTTPNextState");
263: http->next = HTTP_OK;
264: http->result = HT_NO_DATA;
265: break;
266:
267: case 205: /* Reset Content */
268: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_RESET,
269: me->reason, (int) strlen(me->reason),
270: "HTTPNextState");
271: http->next = HTTP_OK;
272: http->result = HT_RESET_CONTENT;
273: break;
274:
275: case 206: /* Partial Content */
276: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL,
277: me->reason, (int) strlen(me->reason),
278: "HTTPNextState");
279: http->next = HTTP_OK;
280: http->result = HT_PARTIAL_CONTENT;
281: break;
282:
283: case 207: /* Partial Update OK */
284: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL_OK,
285: me->reason, (int) strlen(me->reason),
286: "HTTPNextState");
287: http->next = HTTP_OK;
288: http->result = HT_PARTIAL_CONTENT;
289: break;
290:
291: default:
292: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_OK,
293: me->reason, (int) strlen(me->reason),
294: "HTTPNextState");
295: http->next = HTTP_OK;
296: http->result = HT_LOADED;
297: break;
298: }
1.134 frystyk 299: break;
300:
1.158 frystyk 301: case 3:
1.134 frystyk 302:
1.158 frystyk 303: switch (me->status) {
1.78 frystyk 304:
1.158 frystyk 305: case 301: /* Moved */
306: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MOVED,
307: me->reason, (int) strlen(me->reason),
308: "HTTPNextState");
309: http->next = HTTP_ERROR;
310: http->result = HT_PERM_REDIRECT;
311: break;
312:
313: case 302: /* Found */
314: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_FOUND,
315: me->reason, (int) strlen(me->reason),
316: "HTTPNextState");
317: http->next = HTTP_ERROR;
318: http->result = HT_FOUND;
319: break;
1.55 frystyk 320:
1.158 frystyk 321: case 303: /* Method */
322: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_METHOD,
323: me->reason, (int) strlen(me->reason),
324: "HTTPNextState");
325: http->next = HTTP_ERROR;
326: http->result = HT_SEE_OTHER;
327: break;
328:
329: case 304: /* Not Modified */
330: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NOT_MODIFIED,
331: me->reason, (int) strlen(me->reason),
332: "HTTPNextState");
333: http->next = HTTP_OK;
334: http->result = HT_NOT_MODIFIED;
335: break;
1.134 frystyk 336:
1.158 frystyk 337: case 305: /* Use proxy */
338: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_USE_PROXY,
339: me->reason, (int) strlen(me->reason),
340: "HTTPNextState");
341: http->next = HTTP_ERROR;
342: http->result = HT_USE_PROXY;
343: break;
1.55 frystyk 344:
1.152 frystyk 345: #if 0
1.158 frystyk 346: case 306: /* Use proxy */
347: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PROXY_REDIRECT,
348: me->reason, (int) strlen(me->reason),
349: "HTTPNextState");
350: http->next = HTTP_ERROR;
351: http->result = HT_USE_PROXY;
352: break;
1.152 frystyk 353: #endif
354:
1.158 frystyk 355: case 307: /* Use proxy */
356: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_TEMP_REDIRECT,
357: me->reason, (int) strlen(me->reason),
358: "HTTPNextState");
359: http->next = HTTP_ERROR;
360: http->result = HT_TEMP_REDIRECT;
361: break;
362:
363: default:
364: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MULTIPLE,
365: me->reason, (int) strlen(me->reason),
366: "HTTPNextState");
367: http->next = HTTP_OK;
368: http->result = HT_LOADED;
369: break;
370: }
371: break;
372:
373: case 4:
374:
375: switch (me->status) {
376: case 401:
377: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
378: me->reason, (int) strlen(me->reason), "HTTPNextState");
379: http->next = HTTP_ERROR;
380: http->result = HT_NO_ACCESS;
381: break;
1.152 frystyk 382:
1.158 frystyk 383: case 402: /* Payment required */
384: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
385: me->reason, (int) strlen(me->reason), "HTTPNextState");
386: http->next = HTTP_ERROR;
387: http->result = -402;
388: break;
1.71 frystyk 389:
1.158 frystyk 390: case 403: /* Forbidden */
391: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
392: me->reason, (int) strlen(me->reason), "HTTPNextState");
393: http->next = HTTP_ERROR;
394: http->result = HT_FORBIDDEN;
395: break;
1.55 frystyk 396:
1.158 frystyk 397: case 404: /* Not Found */
398: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
399: me->reason, (int) strlen(me->reason), "HTTPNextState");
400: http->next = HTTP_ERROR;
401: http->result = -404;
402: break;
1.55 frystyk 403:
1.158 frystyk 404: case 405: /* Not Allowed */
405: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
406: me->reason, (int) strlen(me->reason), "HTTPNextState");
407: http->next = HTTP_ERROR;
408: http->result = -405;
409: break;
410:
411: case 406: /* None Acceptable */
412: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
413: me->reason, (int) strlen(me->reason), "HTTPNextState");
414: http->next = HTTP_ERROR;
415: http->result = HT_NOT_ACCEPTABLE;
416: break;
417:
418: case 407: /* Proxy Authentication Required */
419: HTRequest_addError(me->request, ERR_FATAL, NO,HTERR_PROXY_UNAUTHORIZED,
420: me->reason, (int) strlen(me->reason), "HTTPNextState");
421: http->next = HTTP_ERROR;
422: http->result = HT_NO_PROXY_ACCESS;
423: break;
424:
425: case 408: /* Request Timeout */
426: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
427: me->reason, (int) strlen(me->reason), "HTTPNextState");
428: http->next = HTTP_ERROR;
429: http->result = -408;
430: break;
431:
432: case 409: /* Conflict */
433: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_CONFLICT,
434: me->reason, (int) strlen(me->reason), "HTTPNextState");
435: http->next = HTTP_ERROR;
436: http->result = HT_CONFLICT;
437: break;
438:
439: case 410: /* Gone */
440: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GONE,
441: me->reason, (int) strlen(me->reason), "HTTPNextState");
442: http->next = HTTP_ERROR;
443: http->result = -410;
444: break;
445:
446: case 411: /* Length Required */
447: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_LENGTH_REQUIRED,
448: me->reason, (int) strlen(me->reason), "HTTPNextState");
449: http->next = HTTP_ERROR;
450: http->result = HT_LENGTH_REQUIRED;
451: break;
452:
453: case 412: /* Precondition failed */
454: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PRECON_FAILED,
455: me->reason, (int) strlen(me->reason), "HTTPNextState");
456: http->next = HTTP_ERROR;
457: http->result = -412;
458: break;
459:
460: case 413: /* Request entity too large */
461: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TOO_BIG,
462: me->reason, (int) strlen(me->reason), "HTTPNextState");
463: http->next = HTTP_ERROR;
464: http->result = -413;
465: break;
466:
467: case 414: /* Request-URI too long */
468: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_URI_TOO_BIG,
469: me->reason, (int) strlen(me->reason), "HTTPNextState");
470: http->next = HTTP_ERROR;
471: http->result = -414;
472: break;
473:
474: case 415: /* Unsupported */
475: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNSUPPORTED,
476: me->reason, (int) strlen(me->reason), "HTTPNextState");
477: http->next = HTTP_ERROR;
478: http->result = -415;
479: break;
480:
481: case 416: /* Request Range not satisfiable */
482: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_RANGE,
483: me->reason, (int) strlen(me->reason), "HTTPNextState");
484: http->next = HTTP_ERROR;
485: http->result = -416;
486: break;
487:
488: case 417: /* Expectation Failed */
489: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_EXPECTATION_FAILED,
490: me->reason, (int) strlen(me->reason), "HTTPNextState");
491: http->next = HTTP_ERROR;
492: http->result = -417;
493: break;
494:
495: case 418: /* Reauthentication required */
496: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_REAUTH,
497: me->reason, (int) strlen(me->reason), "HTTPNextState");
498: http->next = HTTP_ERROR;
499: http->result = -418;
500: break;
501:
502: case 419: /* Proxy Reauthentication required */
503: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PROXY_REAUTH,
504: me->reason, (int) strlen(me->reason), "HTTPNextState");
505: http->next = HTTP_ERROR;
506: http->result = -419;
507: break;
508:
509: default:
510: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
511: me->reason, (int) strlen(me->reason), "HTTPNextState");
512: http->next = HTTP_ERROR;
513: http->result = -400;
514: break;
515: }
1.134 frystyk 516: break;
517:
1.158 frystyk 518: case 5:
1.134 frystyk 519:
1.158 frystyk 520: switch (me->status) {
521: case 501:
522: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
523: me->reason, (int) strlen(me->reason), "HTTPNextState");
524: http->next = HTTP_ERROR;
525: http->result = -501;
526: break;
527:
528: case 502:
529: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
530: me->reason, (int) strlen(me->reason), "HTTPNextState");
531: http->next = HTTP_ERROR;
532: http->result = -502;
533: break;
534:
535: case 503:
536: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_DOWN,
537: me->reason, (int) strlen(me->reason), "HTTPNextState");
538: http->next = HTTP_ERROR;
539:
540: /*
541: ** If Retry-After header is found then return HT_RETRY else HT_ERROR.
542: ** The caller may want to reissue the request at a later point in time.
543: */
544: {
545: HTResponse * response = HTRequest_response(me->request);
546: if (HTResponse_retryTime(response))
547: http->result = HT_RETRY;
548: else
549: http->result = -500;
550: }
551: break;
552:
553: case 504:
554: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
555: me->reason, (int) strlen(me->reason), "HTTPNextState");
556: http->next = HTTP_ERROR;
557: http->result = -504;
558: break;
559:
560: case 505: /* Unsupported protocol version */
561: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_VERSION,
562: me->reason, (int) strlen(me->reason), "HTTPNextState");
563: http->next = HTTP_ERROR;
564: http->result = HT_BAD_VERSION;
565: break;
566:
567: case 506: /* Partial update Not Implemented */
568: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NO_PARTIAL_UPDATE,
569: me->reason, (int) strlen(me->reason), "HTTPNextState");
570: http->next = HTTP_ERROR;
571: http->result = HT_BAD_VERSION;
572: break;
573:
574: default: /* bad number */
575: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
576: me->reason, (int) strlen(me->reason), "HTTPNextState");
577: http->next = HTTP_ERROR;
578: http->result = -500;
579: break;
1.140 frystyk 580: }
1.78 frystyk 581: break;
582:
1.158 frystyk 583: default:
1.104 frystyk 584: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.158 frystyk 585: (void *) me->buffer, me->buflen, "HTTPNextState");
1.134 frystyk 586: http->next = HTTP_ERROR;
1.155 frystyk 587: http->result = -(me->status);
1.71 frystyk 588: break;
1.55 frystyk 589: }
590: }
591:
1.71 frystyk 592: /* ------------------------------------------------------------------------- */
593: /* HTTP Status Line Stream */
594: /* ------------------------------------------------------------------------- */
1.55 frystyk 595:
1.71 frystyk 596: /*
1.141 frystyk 597: ** Analyze the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 598: ** then create a MIME-stream, else create a Guess stream to find out
599: ** what the 0.9 server is sending. We need to copy the buffer as we don't
600: ** know if we can modify the contents or not.
1.78 frystyk 601: **
602: ** Stream handling is a function of the status code returned from the
603: ** server:
604: ** 200: Use `output_stream' in HTRequest structure
1.94 frystyk 605: ** else: Use `debug_stream' in HTRequest structure
1.80 frystyk 606: **
607: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 608: */
1.157 frystyk 609: PRIVATE int stream_pipe (HTStream * me, int length)
1.56 frystyk 610: {
1.136 frystyk 611: HTRequest * request = me->request;
612: HTNet * net = HTRequest_net(request);
1.123 frystyk 613: HTHost * host = HTNet_host(net);
1.141 frystyk 614:
1.153 frystyk 615: #if 0
616: {
617: char * uri = HTAnchor_address((HTAnchor *) HTRequest_anchor(request));
618: fprintf(stderr, "HTTP header: %s for '%s'\n", me->buffer, uri);
619: HT_FREE(uri);
620: }
621: #endif
622:
1.132 frystyk 623: /*
624: ** Just check for HTTP and not HTTP/ as NCSA server chokes on 1.1 replies
625: ** Thanks to Markku Savela <msa@msa.tte.vtt.fi>
1.141 frystyk 626:
1.132 frystyk 627: */
628: if (strncasecomp(me->buffer, "http", 4)) {
1.80 frystyk 629: int status;
1.136 frystyk 630: HTRequest_addError(request, ERR_INFO, NO, HTERR_HTTP09,
1.80 frystyk 631: (void *) me->buffer, me->buflen, "HTTPStatusStream");
1.136 frystyk 632: me->target = HTStreamStack(WWW_UNKNOWN,
633: HTRequest_outputFormat(request),
634: HTRequest_outputStream(request),
635: request, NO);
1.134 frystyk 636: me->http->next = HTTP_OK;
1.80 frystyk 637: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
638: me->transparent = YES;
1.186 kahan 639: /* JK: in 2000, we don't expect many HTTP/0.9 servers to remain.
640: I removed this line which made the backward change as most of
641: the time we fall here more due to a network or server problem,
642: rather than because we are accessing an old server. */
643: /* HTHost_setVersion(host, HTTP_09); */
1.157 frystyk 644: if (length > 0) HTHost_setConsumed(host, length);
1.178 frystyk 645: HTTRACE(PROT_TRACE, "HTTP Status. `%s\' is probably a broken 1.0 server that doesn't understand HEAD\n" _
1.171 frystyk 646: HTHost_name(host));
647: return HT_ERROR;
1.80 frystyk 648: } else {
1.140 frystyk 649: HTResponse * response = HTRequest_response(request);
1.155 frystyk 650: char * ptr = me->buffer+5; /* Skip the HTTP part */
651: char * vptr = NULL;
652: int major = 0;
653: int minor = 0;
654: me->version = vptr = HTNextField(&ptr);
655: if (vptr) {
656: major = (int) strtol(me->version, &vptr, 10);
657: if (vptr++) minor = strtol(vptr, NULL, 10);
658: }
1.95 frystyk 659:
1.130 frystyk 660: /* Here we want to find out when to use persistent connection */
1.171 frystyk 661: if (major > 1 && major < 100) {
1.178 frystyk 662: HTTRACE(PROT_TRACE, "HTTP Status. Major version number is %d\n" _ major);
1.155 frystyk 663: me->target = HTErrorStream();
1.158 frystyk 664: me->status = 9999;
1.155 frystyk 665: HTTPNextState(me); /* Get next state */
1.158 frystyk 666: return HT_ERROR;
1.155 frystyk 667: } else if (minor <= 0) {
1.171 frystyk 668: if (major > 100) {
1.178 frystyk 669: HTTRACE(PROT_TRACE, "HTTP Status. This is a *BROKEN* HTTP/1.0 server\n");
1.171 frystyk 670: me->status = 200;
671: } else {
1.178 frystyk 672: HTTRACE(PROT_TRACE, "HTTP Status. This is an HTTP/1.0 server\n");
1.171 frystyk 673: me->status = atoi(HTNextField(&ptr));
674: }
1.128 frystyk 675: HTHost_setVersion(host, HTTP_10);
1.155 frystyk 676: } else { /* 1.x, x>0 family */
677: HTHost_setVersion(host, HTTP_11); /* Best we can do */
1.156 frystyk 678: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 679: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with NO PIPELINING\n");
1.147 frystyk 680: HTNet_setPersistent(net, YES, HT_TP_SINGLE);
1.156 frystyk 681: } else if (ConnectionMode & HTTP_11_MUX) {
1.178 frystyk 682: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with MUXING\n");
1.156 frystyk 683: HTNet_setPersistent(net, YES, HT_TP_INTERLEAVE);
1.147 frystyk 684: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 685: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 686: HTHost_setVersion(host, HTTP_10);
687: HTNet_setPersistent(net, NO, HT_TP_SINGLE);
688: } else
689: HTNet_setPersistent(net, YES, HT_TP_PIPELINE);
1.171 frystyk 690: me->status = atoi(HTNextField(&ptr));
1.128 frystyk 691: }
1.95 frystyk 692:
1.81 frystyk 693: me->reason = ptr;
694: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
695: *ptr = '0円';
696: else if ((ptr = strchr(me->reason, '\n')) != NULL)
697: *ptr = '0円';
698:
1.130 frystyk 699: /*
700: ** If it is a 1xx code then find out what to do and return until we
701: ** get the next code. In the case of Upgrade we may not get back here
702: ** at all. If we are uploading an entity then continue doing that
703: */
704: if (me->status/100 == 1) {
1.136 frystyk 705: if (HTTPInformation(me) == YES) {
1.180 frystyk 706: if (me->status==100) {
707: me->buflen = 0;
708: me->state = EOL_BEGIN;
709: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
710: me->info_target = HTStreamStack(WWW_MIME_CONT,
711: HTRequest_debugFormat(request),
712: HTRequest_debugStream(request),
713: request, NO);
714: if (length > 0) HTHost_setConsumed(host, length);
715: return HT_OK;
716: } else if (me->status==101) {
717: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
718: me->target = HTStreamStack(WWW_MIME_UPGRADE,
719: HTRequest_outputFormat(request),
720: HTRequest_outputStream(request),
721: request, NO);
722: if (length > 0) HTHost_setConsumed(host, length);
723: me->transparent = YES;
724: return HT_OK;
725: }
1.103 frystyk 726: }
1.56 frystyk 727: }
1.133 frystyk 728:
729: /*
730: ** As we are getting fresh metainformation in the HTTP response,
731: ** we clear the old metainfomation in order not to mix it with the new
732: ** one. This is particularly important for the content-length and the
1.139 frystyk 733: ** like. The TRACE and OPTIONS method just adds to the current
734: ** metainformation so in that case we don't clear the anchor.
1.133 frystyk 735: */
1.136 frystyk 736: if (me->status==200 || me->status==203 || me->status==300) {
1.140 frystyk 737: /*
738: ** 200, 203 and 300 are all fully cacheable responses. No byte
739: ** ranges or anything else make life hard in this case.
740: */
1.148 frystyk 741: HTAnchor_clearHeader(HTRequest_anchor(request));
1.166 frystyk 742: HTResponse_setCachable(response, HT_CACHE_ALL);
1.136 frystyk 743: me->target = HTStreamStack(WWW_MIME,
744: HTRequest_outputFormat(request),
745: HTRequest_outputStream(request),
746: request, NO);
1.176 frystyk 747: } else if (me->status==204) {
748: HTResponse_setCachable(response, HT_CACHE_ALL);
749: me->target = HTStreamStack(WWW_MIME_HEAD,
750: HTRequest_debugFormat(request),
751: HTRequest_debugStream(request),
752: request, NO);
1.140 frystyk 753: } else if (me->status==206) {
754: /*
755: ** We got a partial response and now we must check whether
756: ** we issued a cache If-Range request or it was a new
757: ** partial response which we don't have in cache. In the latter
758: ** case, we don't cache the object and in the former we append
759: ** the result to the already existing cache entry.
760: */
761: HTReload reload = HTRequest_reloadMode(request);
762: if (reload == HT_CACHE_RANGE_VALIDATE) {
1.166 frystyk 763: HTResponse_setCachable(response, HT_CACHE_ALL);
1.140 frystyk 764: me->target = HTStreamStack(WWW_MIME_PART,
765: HTRequest_outputFormat(request),
766: HTRequest_outputStream(request),
767: request, NO);
768: } else {
1.149 frystyk 769: HTAnchor_clearHeader(HTRequest_anchor(request));
1.140 frystyk 770: me->target = HTStreamStack(WWW_MIME,
771: HTRequest_outputFormat(request),
772: HTRequest_outputStream(request),
773: request, NO);
774: }
1.176 frystyk 775: } else if (me->status==304) {
776: HTResponse_setCachable(response, HT_CACHE_NOT_MODIFIED);
1.136 frystyk 777: me->target = HTStreamStack(WWW_MIME_HEAD,
778: HTRequest_debugFormat(request),
779: HTRequest_debugStream(request),
780: request, NO);
781: } else if (HTRequest_debugStream(request)) {
1.175 frystyk 782: HTResponse_setCachable(response,
783: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 784: me->target = HTStreamStack(WWW_MIME,
785: HTRequest_debugFormat(request),
786: HTRequest_debugStream(request),
787: request, NO);
788: } else {
1.140 frystyk 789: /*
790: ** We still need to parse the MIME part in order to find any
791: ** valuable meta information which is needed from the response.
792: */
1.175 frystyk 793: HTResponse_setCachable(response,
794: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 795: me->target = HTStreamStack(WWW_MIME,
796: HTRequest_debugFormat(request),
797: HTRequest_debugStream(request),
798: request, NO);
1.133 frystyk 799: }
1.56 frystyk 800: }
1.113 frystyk 801: if (!me->target) me->target = HTErrorStream();
1.81 frystyk 802: HTTPNextState(me); /* Get next state */
1.80 frystyk 803: me->transparent = YES;
1.157 frystyk 804: if (length > 0) HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length);
1.80 frystyk 805: return HT_OK;
1.71 frystyk 806: }
1.56 frystyk 807:
1.80 frystyk 808: /*
809: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
810: ** is found
811: */
1.119 frystyk 812: PRIVATE int HTTPStatus_put_block (HTStream * me, const char * b, int l)
1.71 frystyk 813: {
1.150 frystyk 814: int status = HT_OK;
1.153 frystyk 815: int length = l;
1.146 frystyk 816: me->startLen = me->buflen;
1.80 frystyk 817: while (!me->transparent && l-- > 0) {
1.157 frystyk 818: if (me->info_target) {
819:
820: /* Put data down the 1xx return code parser until we are done. */
821: status = (*me->info_target->isa->put_block)(me->info_target, b, l+1);
822: if (status != HT_CONTINUE) return status;
823:
824: /* Now free the info stream */
825: (*me->info_target->isa->_free)(me->info_target);
826: me->info_target = NULL;
827:
828: /* Update where we are in the stream */
829: l = HTHost_remainingRead(HTNet_host(HTRequest_net(me->request)));
1.163 frystyk 830: b += (length-l);
1.159 frystyk 831: length = l;
1.163 frystyk 832: if (l <= 0) break;
1.157 frystyk 833:
1.80 frystyk 834: } else {
835: *(me->buffer+me->buflen++) = *b;
836: if (me->state == EOL_FCR) {
837: if (*b == LF) { /* Line found */
1.157 frystyk 838: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 839: } else {
840: me->state = EOL_BEGIN;
841: }
842: } else if (*b == CR) {
843: me->state = EOL_FCR;
844: } else if (*b == LF) {
1.157 frystyk 845: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.71 frystyk 846: } else {
1.80 frystyk 847: if (me->buflen >= MAX_STATUS_LEN) {
1.157 frystyk 848: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 849: }
1.71 frystyk 850: }
1.80 frystyk 851: b++;
1.71 frystyk 852: }
1.56 frystyk 853: }
1.153 frystyk 854:
1.159 frystyk 855: if (!me->transparent && length != l)
856: HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length-l);
857:
1.99 frystyk 858: if (l > 0) return PUTBLOCK(b, l);
1.150 frystyk 859: return status;
1.56 frystyk 860: }
861:
1.119 frystyk 862: PRIVATE int HTTPStatus_put_string (HTStream * me, const char * s)
1.71 frystyk 863: {
1.80 frystyk 864: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 865: }
1.56 frystyk 866:
1.100 frystyk 867: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 868: {
1.80 frystyk 869: return HTTPStatus_put_block(me, &c, 1);
870: }
871:
1.100 frystyk 872: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 873: {
874: return (*me->target->isa->flush)(me->target);
1.71 frystyk 875: }
876:
1.100 frystyk 877: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 878: {
1.87 frystyk 879: int status = HT_OK;
880: if (me->target) {
881: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
882: return HT_WOULD_BLOCK;
883: }
1.115 frystyk 884: HT_FREE(me);
1.100 frystyk 885: return status;
1.71 frystyk 886: }
887:
1.104 frystyk 888: PRIVATE int HTTPStatus_abort (HTStream * me, HTList * e)
1.71 frystyk 889: {
890: if (me->target)
1.74 frystyk 891: ABORT_TARGET;
1.115 frystyk 892: HT_FREE(me);
1.178 frystyk 893: HTTRACE(PROT_TRACE, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 894: return HT_ERROR;
1.71 frystyk 895: }
896:
897: /* HTTPStatus Stream
898: ** -----------------
899: */
1.119 frystyk 900: PRIVATE const HTStreamClass HTTPStatusClass =
1.71 frystyk 901: {
902: "HTTPStatus",
1.80 frystyk 903: HTTPStatus_flush,
1.71 frystyk 904: HTTPStatus_free,
905: HTTPStatus_abort,
906: HTTPStatus_put_character,
907: HTTPStatus_put_string,
908: HTTPStatus_put_block
909: };
910:
1.113 frystyk 911: PUBLIC HTStream * HTTPStatus_new (HTRequest * request,
912: void * param,
913: HTFormat input_format,
914: HTFormat output_format,
915: HTStream * output_stream)
1.71 frystyk 916: {
1.115 frystyk 917: HTStream * me;
918: if ((me = (HTStream *) HT_CALLOC(1, sizeof(HTStream))) == NULL)
919: HT_OUTOFMEM("HTTPStatus_new");
1.71 frystyk 920: me->isa = &HTTPStatusClass;
1.113 frystyk 921: if (request) {
1.126 frystyk 922: HTNet * net = HTRequest_net(request);
1.125 frystyk 923: /* Get existing copy */
924: http_info * http = (http_info *) HTNet_context(net);
1.113 frystyk 925: me->request = request;
926: me->http = http;
927: http->next = HTTP_ERROR;
928: me->state = EOL_BEGIN;
929: return me;
930: } else
931: return HTErrorStream();
1.71 frystyk 932: }
933:
934: /* ------------------------------------------------------------------------- */
935:
936: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 937: ** ==============================
938: **
939: ** Given a hypertext address, this routine loads a document.
940: **
941: ** On entry,
942: ** request This is the request structure
1.94 frystyk 943: ** returns HT_ERROR Error has occured in call back
944: ** HT_OK Call back was OK
1.55 frystyk 945: */
1.141 frystyk 946: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type);
947:
948: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request)
1.55 frystyk 949: {
950: http_info *http; /* Specific protocol information */
1.112 frystyk 951: HTParentAnchor *anchor = HTRequest_anchor(request);
1.141 frystyk 952: HTNet * net = HTRequest_net(request);
1.112 frystyk 953:
1.94 frystyk 954: /*
955: ** Initiate a new http structure and bind to request structure
956: ** This is actually state HTTP_BEGIN, but it can't be in the state
957: ** machine as we need the structure first.
958: */
1.178 frystyk 959: HTTRACE(PROT_TRACE, "HTTP........ Looking for `%s\'\n" _
1.141 frystyk 960: HTAnchor_physical(anchor));
961: if ((http = (http_info *) HT_CALLOC(1, sizeof(http_info))) == NULL)
962: HT_OUTOFMEM("HTLoadHTTP");
963: http->net = net;
1.157 frystyk 964: http->request = request;
1.141 frystyk 965: HTNet_setContext(net, http);
966: HTNet_setEventCallback(net, HTTPEvent);
967: HTNet_setEventParam(net, http); /* callbacks get http* */
968:
1.157 frystyk 969: return HTTPEvent(soc, http, HTEvent_BEGIN); /* get it started - ops is ignored */
970: }
971:
972: PRIVATE int FlushPutEvent (HTTimer * timer, void * param, HTEventType type)
973: {
974: http_info * http = (http_info *) param;
975: HTStream * input = HTRequest_inputStream(http->request);
976: HTPostCallback * pcbf = HTRequest_postCallback(http->request);
1.181 frystyk 977: int status = HT_ERROR;
1.157 frystyk 978:
1.165 frystyk 979: http->usedTimer = YES;
1.160 frystyk 980: if (timer != http->timer)
1.178 frystyk 981: HTDEBUGBREAK("HTTP timer %p not in sync\n" _ timer);
982: HTTRACE(PROT_TRACE, "Uploading... Flushing %p with timer %p\n" _ http _ timer);
1.157 frystyk 983:
984: /*
1.181 frystyk 985: ** Call the callback that will provide the data to save
986: ** If the callback returns HT_OK then call it again until
987: ** it returns something else than HT_OK.
1.157 frystyk 988: */
1.181 frystyk 989: if (http && input && pcbf) {
990: status = (*pcbf)(http->request, input);
991: HTTRACE(PROT_TRACE, "Uploading... Callback returned %d\n" _ status);
992: }
1.157 frystyk 993:
994: /*
1.181 frystyk 995: ** If the callback returned something else than HT_OK then delete
996: ** the timer, otherwise update it to a much shorter expiration
997: ** time so that we can write some more data to the net.
1.157 frystyk 998: */
1.181 frystyk 999: if (status != HT_OK) {
1000: HTTimer_delete(http->timer);
1001: http->timer = NULL;
1002: } else if (!http->repetitive_writing) {
1003: http->timer = HTTimer_new(NULL, FlushPutEvent, http, HTRepeatWrite, YES, YES);
1004: http->repetitive_writing = YES;
1005: }
1.157 frystyk 1006: return HT_OK;
1.141 frystyk 1007: }
1008:
1009: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type)
1010: {
1011: http_info * http = (http_info *)pVoid;
1012: int status = HT_ERROR;
1013: HTNet * net = http->net;
1014: HTRequest * request = HTNet_request(net);
1.144 frystyk 1015: HTParentAnchor * anchor = HTRequest_anchor(request);
1016: HTHost * host = HTNet_host(net);
1.141 frystyk 1017:
1018: /*
1.166 frystyk 1019: ** Check whether we have been interrupted or timed out
1.141 frystyk 1020: */
1021: if (type == HTEvent_BEGIN) {
1.134 frystyk 1022: http->next = HTTP_OK;
1023: http->result = HT_ERROR;
1.141 frystyk 1024: } else if (type == HTEvent_CLOSE) {
1.179 frystyk 1025: long read_len = HTNet_bytesRead(net);
1026: long doc_len = HTAnchor_length(anchor);
1027:
1028: /*
1029: ** It is OK to get a close if a) we don't pipeline and b)
1.182 frystyk 1030: ** we have the expected amount of data, and c) we haven't
1031: ** recieved a 100 Continue code. In case we don't
1.179 frystyk 1032: ** know how much data to expect, we must accept it asis.
1033: */
1034: if (HTHost_numberOfOutstandingNetObjects(host) == 1 &&
1.182 frystyk 1035: http->result != HT_CONTINUE && (doc_len<0 || doc_len==read_len)) {
1.183 frystyk 1036: HTTPCleanup(request, http->result); /* Raffaele Sena: was HT_LOADED */
1.179 frystyk 1037: } else {
1038: HTRequest_addError(request, ERR_FATAL, NO, HTERR_INTERRUPTED,
1039: NULL, 0, "HTLoadHTTP");
1040: HTTPCleanup(request, HT_INTERRUPTED);
1041: }
1.166 frystyk 1042: return HT_OK;
1043: } else if (type == HTEvent_TIMEOUT) {
1044: HTRequest_addError(request, ERR_FATAL, NO, HTERR_TIME_OUT,
1045: NULL, 0, "HTLoadHTTP");
1046: HTTPCleanup(request, HT_TIMEOUT);
1.94 frystyk 1047: return HT_OK;
1.141 frystyk 1048: } else if (type == HTEvent_END) {
1049: HTTPCleanup(request, http->result);
1050: return HT_OK;
1051: } else if (type == HTEvent_RESET) {
1052: HTTPCleanup(request, HT_RECOVER_PIPE);
1.145 frystyk 1053: http->state = HTTP_BEGIN;
1.141 frystyk 1054: return HT_OK;
1055: }
1056:
1.71 frystyk 1057: /* Now jump into the machine. We know the state from the previous run */
1058: while (1) {
1059: switch (http->state) {
1.134 frystyk 1060: case HTTP_BEGIN:
1.184 frystyk 1061: status = HTHost_connect(host, net, HTAnchor_physical(anchor));
1.144 frystyk 1062: host = HTNet_host(net);
1.153 frystyk 1063: if (status == HT_OK) {
1.140 frystyk 1064:
1.123 frystyk 1065: /*
1.140 frystyk 1066: ** Check the protocol class to see if we have connected to a
1067: ** the right class of server, in this case HTTP. If we don't
1068: ** know the server then assume a HTTP/1.0
1.123 frystyk 1069: */
1070: {
1071: char * s_class = HTHost_class(host);
1.140 frystyk 1072: if (!s_class) {
1.174 frystyk 1073: if (HTRequest_proxy(request) == NULL) {
1074: HTAssocList * alist = HTRequest_connection(request);
1075: if (!(alist && HTAssocList_findObject(alist, "close")))
1076: HTRequest_addConnection(request, "Keep-Alive", "");
1077: }
1.140 frystyk 1078: HTHost_setClass(host, "http");
1079: } else if (strcasecomp(s_class, "http")) {
1.123 frystyk 1080: HTRequest_addError(request, ERR_FATAL, NO, HTERR_CLASS,
1081: NULL, 0, "HTLoadHTTP");
1082: http->state = HTTP_ERROR;
1083: break;
1084: }
1.95 frystyk 1085: }
1.147 frystyk 1086:
1.156 frystyk 1087: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 1088: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 WITH NO PIPELINING\n");
1.147 frystyk 1089: HTRequest_setFlush(request, YES);
1090: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 1091: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 1092: HTHost_setVersion(host, HTTP_10);
1093: }
1094:
1.151 frystyk 1095: if (HTNet_preemptive(net)) {
1.178 frystyk 1096: HTTRACE(PROT_TRACE, "HTTP........ Force flush on preemptive load\n");
1.151 frystyk 1097: HTRequest_setFlush(request, YES);
1098: }
1099:
1.147 frystyk 1100: /* Jump to next state */
1.144 frystyk 1101: http->state = HTTP_NEED_STREAM;
1.159 frystyk 1102: } else if (status == HT_WOULD_BLOCK || status == HT_PENDING) {
1.144 frystyk 1103: return HT_OK;
1.171 frystyk 1104: } else if (status == HT_NO_HOST) {
1105: http->result = HT_NO_HOST;
1106: http->state = HTTP_ERROR;
1.159 frystyk 1107: } else
1.144 frystyk 1108: http->state = HTTP_ERROR; /* Error or interrupt */
1109: break;
1110:
1111: case HTTP_NEED_STREAM:
1.138 frystyk 1112:
1.144 frystyk 1113: /*
1114: ** Create the stream pipe FROM the channel to the application.
1115: ** The target for the input stream pipe is set up using the
1116: ** stream stack.
1117: */
1.167 frystyk 1118: {
1119: /*
1120: ** during a recovery, we might keep the same HTNet object.
1121: ** if so, reuse it's read stream
1122: */
1.176 frystyk 1123: HTStream * me = HTNet_readStream( net );
1.167 frystyk 1124: if ( me == NULL ) {
1.173 frystyk 1125: me = HTStreamStack(WWW_HTTP,
1126: HTRequest_outputFormat(request),
1127: HTRequest_outputStream(request),
1128: request, YES);
1.178 frystyk 1129: #ifdef HTDEBUG
1.173 frystyk 1130: if (PROT_TRACE) {
1131: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1132: if (htfp) {
1133: me = HTTee(me, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1134: HTTRACE(PROT_TRACE, "HTTP........ Dumping response to `%s\'\n" _ HTTP_OUTPUT);
1.173 frystyk 1135: }
1136: }
1.178 frystyk 1137: #endif /* HTDEBUG */
1.173 frystyk 1138:
1139: HTNet_setReadStream(net, me);
1.167 frystyk 1140: }
1141: HTRequest_setOutputConnected(request, YES);
1.144 frystyk 1142: }
1.127 frystyk 1143:
1.144 frystyk 1144: /*
1145: ** Create the stream pipe TO the channel from the application
1146: ** and hook it up to the request object
1147: */
1148: {
1149: HTChannel * channel = HTHost_channel(host);
1150: HTOutputStream * output = HTChannel_getChannelOStream(channel);
1151: int version = HTHost_version(host);
1152: HTStream * app = NULL;
1153:
1.178 frystyk 1154: #ifdef HTDEBUG
1.144 frystyk 1155: if (PROT_TRACE) {
1.162 frystyk 1156: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1157: if (htfp) {
1.144 frystyk 1158: output = (HTOutputStream *)
1.162 frystyk 1159: HTTee((HTStream *) output, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1160: HTTRACE(PROT_TRACE, "HTTP........ Dumping request to `%s\'\n" _ HTTP_OUTPUT);
1.144 frystyk 1161: }
1162: }
1.178 frystyk 1163: #endif /* HTDEBUG */
1.144 frystyk 1164: app = HTMethod_hasEntity(HTRequest_method(request)) ?
1165: HTMIMERequest_new(request,
1166: HTTPRequest_new(request, (HTStream *) output, NO,
1167: version),
1168: YES) :
1169: HTTPRequest_new(request, (HTStream *) output, YES, version);
1170: HTRequest_setInputStream(request, app);
1171: }
1.88 frystyk 1172:
1.144 frystyk 1173: /*
1174: ** Set up concurrent read/write if this request isn't the
1175: ** source for a PUT or POST. As source we don't start reading
1176: ** before all destinations are ready. If destination then
1177: ** register the input stream and get ready for read
1178: */
1179: if (HTRequest_isDestination(request)) {
1180: HTHost_register(host, net, HTEvent_READ);
1181: HTRequest_linkDestination(request);
1182: }
1183: http->state = HTTP_CONNECTED;
1184: type = HTEvent_WRITE; /* fresh, so try a write */
1.71 frystyk 1185: break;
1186:
1.87 frystyk 1187: /* As we can do simultanous read and write this is now one state */
1.141 frystyk 1188: case HTTP_CONNECTED:
1189: if (type == HTEvent_WRITE) {
1.157 frystyk 1190: HTStream * input = HTRequest_inputStream(request);
1191: HTPostCallback * pcbf = HTRequest_postCallback(request);
1192: status = HTRequest_flush(request) ?
1193: HTHost_forceFlush(host) : (*input->isa->flush)(input);
1194:
1195: /*
1196: ** Check to see if we are uploading something or just a normal
1197: ** GET kind of thing.
1198: */
1.187 kahan 1199:
1200: /*
1201: ** JK: don't continue sending things thru the network
1202: ** if the flush resulted in an error or if the connection
1203: ** is closed
1204: */
1205: if ((status != HT_ERROR) && status != HT_CLOSED) {
1206: if (pcbf) {
1207: if (http->lock == NO) {
1208: int retrys = HTRequest_retrys(request);
1209: ms_t delay = retrys > 3 ? HTSecondWriteDelay : HTFirstWriteDelay;
1210: if (!http->timer && !http->usedTimer) {
1211: http->timer = HTTimer_new(NULL, FlushPutEvent,
1.162 frystyk 1212: http, delay, YES, NO);
1.187 kahan 1213: HTTRACE(PROT_TRACE, "Uploading... Holding %p for %lu ms using time %p\n" _
1.178 frystyk 1214: http _ delay _ http->timer);
1.187 kahan 1215: HTHost_register(host, net, HTEvent_READ);
1216: }
1217: http->lock = YES;
1.157 frystyk 1218: }
1.187 kahan 1219: type = HTEvent_READ;
1220: } else {
1221:
1222: /*
1223: ** Check to see if we can start a new request
1224: ** pending in the host object.
1225: */
1226: HTHost_launchPending(host);
1227: type = HTEvent_READ;
1.157 frystyk 1228: }
1229: }
1.188 ! kahan 1230:
1.157 frystyk 1231: /* Now check the status code */
1232: if (status == HT_WOULD_BLOCK)
1233: return HT_OK;
1234: else if (status == HT_PAUSE || status == HT_LOADED) {
1235: type = HTEvent_READ;
1.168 frystyk 1236: } else if (status==HT_ERROR)
1.157 frystyk 1237: http->state = HTTP_RECOVER_PIPE;
1238: } else if (type == HTEvent_FLUSH) {
1239: HTStream * input = HTRequest_inputStream(request);
1240: if (input == NULL)
1241: return HT_ERROR;
1242: return (*input->isa->flush)(input);
1243: } else if (type == HTEvent_READ) {
1244: status = HTHost_read(host, net);
1245: if (status == HT_WOULD_BLOCK)
1246: return HT_OK;
1247: else if (status == HT_CONTINUE) {
1.178 frystyk 1248: HTTRACE(PROT_TRACE, "HTTP........ Continuing\n");
1.157 frystyk 1249: http->lock = NO;
1250: continue;
1251: } else if (status==HT_LOADED)
1252: http->state = http->next; /* Jump to next state (OK or ERROR) */
1253: else if (status==HT_CLOSED)
1254: http->state = HTTP_RECOVER_PIPE;
1.167 frystyk 1255: else if (status == HT_ERROR)
1256: http->state = HTTP_KILL_PIPE;
1.157 frystyk 1257: else
1258: http->state = HTTP_ERROR;
1259: } else {
1260: http->state = HTTP_ERROR; /* don't know how to handle OOB */
1261: }
1262: break;
1.141 frystyk 1263:
1.134 frystyk 1264: case HTTP_OK:
1265: HTTPCleanup(request, http->result);
1.94 frystyk 1266: return HT_OK;
1.71 frystyk 1267: break;
1.141 frystyk 1268:
1269: case HTTP_RECOVER_PIPE:
1270: {
1271: /*
1272: ** If this is a persistent connection and we get a close
1273: ** then it is an error and we should recover from it by
1274: ** restarting the pipe line of requests if any
1275: */
1.151 frystyk 1276: if (HTHost_isPersistent(host) && !HTHost_closeNotification(host)) {
1.143 frystyk 1277: if (host == NULL) return HT_ERROR;
1.144 frystyk 1278: HTRequest_setFlush(request, YES);
1.182 frystyk 1279:
1280: /*
1281: ** If we already have recovered more than we want and
1282: ** this call returns NO then simply kill the pipe.
1283: ** Otherwise we may loop forever.
1284: */
1285: if (HTHost_recoverPipe(host) != YES) {
1286: HTRequest_addError(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1287: NULL, 0, "HTTPEvent");
1288: http->state = HTTP_KILL_PIPE;
1289: break;
1290: }
1.144 frystyk 1291: return HT_OK;
1.141 frystyk 1292: } else
1293: http->state = HTTP_OK;
1294: }
1.143 frystyk 1295: break;
1.141 frystyk 1296:
1.167 frystyk 1297: case HTTP_KILL_PIPE:
1298: if (host == NULL) return HT_ERROR;
1299: HTHost_killPipe(host);
1300: return HT_OK;
1301: break;
1302:
1.71 frystyk 1303: case HTTP_ERROR:
1.143 frystyk 1304: HTTPCleanup(request, http->result);
1305: return HT_OK;
1306: break;
1307:
1.141 frystyk 1308: default:
1.178 frystyk 1309: HTDEBUGBREAK("Bad http state %d\n" _ http->state);
1.71 frystyk 1310: }
1311: } /* End of while(1) */
1312: }
1.88 frystyk 1313:
1.147 frystyk 1314: PUBLIC void HTTP_setConnectionMode (HTTPConnectionMode mode)
1315: {
1316: ConnectionMode = mode;
1317: }
1318:
1319: PUBLIC HTTPConnectionMode HTTP_connectionMode (void)
1320: {
1321: return ConnectionMode;
1322: }
1.21 luotonen 1323:
1.169 frystyk 1324: PUBLIC BOOL HTTP_setBodyWriteDelay (ms_t first_try, ms_t second_try)
1325: {
1326: if (first_try > 20 && second_try >= first_try) {
1327: HTFirstWriteDelay = first_try;
1328: HTSecondWriteDelay = second_try;
1329: return YES;
1330: }
1331: return NO;
1332: }
1333:
1334: PUBLIC void HTTP_bodyWriteDelay (ms_t * first_try, ms_t * second_try)
1335: {
1336: *first_try = HTFirstWriteDelay;
1337: *second_try = HTSecondWriteDelay;
1.170 frystyk 1338: }
1339:
Webmaster