Annotation of libwww/Library/src/HTTP.c, revision 1.189
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
1.189 ! kahan 6: ** @(#) $Id: HTTP.c,v 1.188 2000年06月19日 14:35:15 kahan Exp $
1.74 frystyk 7: **
1.185 raff 8: ** This module implements the HTTP protocol as a state machine
1.55 frystyk 9: **
10: ** History:
1.59 frystyk 11: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 12: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
13: ** Forward, redirection, error handling and referer field
1.67 duns 14: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 15: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 16: **
1.1 timbl 17: */
18:
1.78 frystyk 19: /* Library include files */
1.161 frystyk 20: #include "wwwsys.h"
1.123 frystyk 21: #include "WWWUtil.h"
22: #include "WWWCore.h"
1.177 frystyk 23: #include "HTHeader.h"
24: #include "HTMIMERq.h"
1.94 frystyk 25: #include "HTReqMan.h"
1.179 frystyk 26: #include "HTNetMan.h"
1.109 frystyk 27: #include "HTTPUtil.h"
1.80 frystyk 28: #include "HTTPReq.h"
1.55 frystyk 29: #include "HTTP.h" /* Implements */
30:
31: /* Macros and other defines */
1.94 frystyk 32: #ifndef HTTP_PORT
33: #define HTTP_PORT 80 /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
34: #endif
35:
1.71 frystyk 36: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
37: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
38: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
39: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 40: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 41:
1.178 frystyk 42: #ifdef HTDEBUG
1.177 frystyk 43: #include "WWWStream.h"
1.147 frystyk 44: #define HTTP_OUTPUT "w3chttp.out"
1.162 frystyk 45: PRIVATE FILE * htfp = NULL;
1.140 frystyk 46: #endif
1.139 frystyk 47:
1.59 frystyk 48: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 49:
50: /* Final states have negative value */
1.59 frystyk 51: typedef enum _HTTPState {
1.167 frystyk 52: HTTP_KILL_PIPE = -4,
1.141 frystyk 53: HTTP_RECOVER_PIPE = -3,
1.134 frystyk 54: HTTP_ERROR = -2,
55: HTTP_OK = -1,
1.71 frystyk 56: HTTP_BEGIN = 0,
1.144 frystyk 57: HTTP_NEED_STREAM,
1.141 frystyk 58: HTTP_CONNECTED
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60:
1.94 frystyk 61: /* This is the context structure for the this module */
1.55 frystyk 62: typedef struct _http_info {
1.81 frystyk 63: HTTPState state; /* Current State of the connection */
64: HTTPState next; /* Next state */
1.134 frystyk 65: int result; /* Result to report to the after filter */
1.139 frystyk 66: BOOL lock; /* Block for writing */
1.141 frystyk 67: HTNet * net;
1.157 frystyk 68: HTRequest * request;
69: HTTimer * timer;
1.165 frystyk 70: BOOL usedTimer;
1.181 frystyk 71: BOOL repetitive_writing;
1.55 frystyk 72: } http_info;
73:
1.88 frystyk 74: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 75:
1.71 frystyk 76: struct _HTStream {
1.119 frystyk 77: const HTStreamClass * isa;
1.71 frystyk 78: HTStream * target;
1.157 frystyk 79: HTStream * info_target; /* For 100 codes */
1.71 frystyk 80: HTRequest * request;
81: http_info * http;
1.121 frystyk 82: HTEOLState state;
1.71 frystyk 83: BOOL transparent;
1.150 frystyk 84: BOOL cont;
1.81 frystyk 85: char * version; /* Should we save this? */
1.71 frystyk 86: int status;
1.81 frystyk 87: char * reason;
1.71 frystyk 88: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 89: int buflen;
1.146 frystyk 90: int startLen;/* buflen when put_block was called */
1.71 frystyk 91: };
1.21 luotonen 92:
1.123 frystyk 93: struct _HTInputStream {
94: const HTInputStreamClass * isa;
95: };
96:
1.169 frystyk 97: /* How long to wait before writing the body in PUT and POST requests */
98: #define DEFAULT_FIRST_WRITE_DELAY 2000
99: #define DEFAULT_SECOND_WRITE_DELAY 3000
1.181 frystyk 100: #define DEFAULT_REPEAT_WRITE 30
1.169 frystyk 101:
102: PRIVATE ms_t HTFirstWriteDelay = DEFAULT_FIRST_WRITE_DELAY;
103: PRIVATE ms_t HTSecondWriteDelay = DEFAULT_SECOND_WRITE_DELAY;
1.181 frystyk 104: PRIVATE ms_t HTRepeatWrite = DEFAULT_REPEAT_WRITE;
1.169 frystyk 105:
1.147 frystyk 106: #ifdef HT_NO_PIPELINING
1.156 frystyk 107: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_NO_PIPELINING;
1.147 frystyk 108: #else
1.156 frystyk 109: #ifdef HT_MUX
110: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_MUX;
111: #else
112: #ifdef HT_FORCE_10
113: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_FORCE_10;
114: #else
115: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_PIPELINING;
116: #endif
117: #endif
1.147 frystyk 118: #endif
119:
1.71 frystyk 120: /* ------------------------------------------------------------------------- */
121: /* Help Functions */
122: /* ------------------------------------------------------------------------- */
1.21 luotonen 123:
1.94 frystyk 124: /* HTTPCleanup
125: ** -----------
1.55 frystyk 126: ** This function closes the connection and frees memory.
1.94 frystyk 127: ** Returns YES on OK, else NO
1.1 timbl 128: */
1.94 frystyk 129: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 130: {
1.126 frystyk 131: HTNet * net = HTRequest_net(req);
132: http_info * http = (http_info *) HTNet_context(net);
133: HTStream * input = HTRequest_inputStream(req);
1.80 frystyk 134:
1.178 frystyk 135: HTTRACE(PROT_TRACE, "HTTP Clean.. Called with status %d, net %p\n" _ status _ net);
1.144 frystyk 136:
1.164 frystyk 137: if (status == HT_INTERRUPTED) {
138: HTAlertCallback * cbf = HTAlert_find(HT_PROG_INTERRUPT);
139: if (cbf) (*cbf)(req, HT_PROG_INTERRUPT,
140: HT_MSG_NULL, NULL, NULL, NULL);
1.166 frystyk 141: } else if (status == HT_TIMEOUT) {
142: HTAlertCallback * cbf = HTAlert_find(HT_PROG_TIMEOUT);
143: if (cbf) (*cbf)(req, HT_PROG_TIMEOUT,
144: HT_MSG_NULL, NULL, NULL, NULL);
1.164 frystyk 145: }
1.166 frystyk 146:
1.94 frystyk 147: /* Free stream with data TO network */
1.167 frystyk 148: if (input) {
1.187 kahan 149: if (input->isa) {
150: if (status==HT_INTERRUPTED || status==HT_RECOVER_PIPE || status==HT_TIMEOUT)
151: (*input->isa->abort)(input, NULL);
152: else
153: (*input->isa->_free)(input);
154: }
1.126 frystyk 155: HTRequest_setInputStream(req, NULL);
1.94 frystyk 156: }
1.88 frystyk 157:
1.144 frystyk 158: /*
1.157 frystyk 159: ** Remove if we have registered an upload function as a callback
160: */
1.187 kahan 161: if (http && http->timer) {
1.157 frystyk 162: HTTimer_delete(http->timer);
163: http->timer = NULL;
1.189 ! kahan 164: http->lock = NO;
1.157 frystyk 165: }
166:
167: /*
1.144 frystyk 168: ** Remove the request object and our own context structure for http.
169: */
170: if (status != HT_RECOVER_PIPE) {
1.153 frystyk 171: HTNet_delete(net, status);
1.141 frystyk 172: HT_FREE(http);
173: }
1.94 frystyk 174: return YES;
1.55 frystyk 175: }
176:
1.71 frystyk 177: /*
1.130 frystyk 178: ** Informational 1xx codes are handled separately
1.136 frystyk 179: ** Returns YES if we should continue, NO if we should stop
1.55 frystyk 180: */
1.130 frystyk 181: PRIVATE BOOL HTTPInformation (HTStream * me)
1.55 frystyk 182: {
1.136 frystyk 183: http_info * http = me->http;
1.71 frystyk 184: switch (me->status) {
185:
1.136 frystyk 186: case 100:
1.161 frystyk 187: #if 0
1.136 frystyk 188: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CONTINUE,
189: me->reason, (int) strlen(me->reason),
190: "HTTPInformation");
1.161 frystyk 191: #endif
1.182 frystyk 192: http->result = HT_CONTINUE;
1.136 frystyk 193: return YES;
194: break;
195:
1.130 frystyk 196: case 101:
1.136 frystyk 197: /*
198: ** We consider 101 Switching as a final state and exit this request
199: */
1.130 frystyk 200: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_SWITCHING,
1.127 frystyk 201: me->reason, (int) strlen(me->reason),
1.130 frystyk 202: "HTTPInformation");
1.136 frystyk 203: http->next = HTTP_OK;
204: http->result = HT_UPGRADE;
1.180 frystyk 205: return YES;
1.127 frystyk 206: break;
207:
1.130 frystyk 208: default:
1.136 frystyk 209: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
210: (void *) me->buffer, me->buflen, "HTTPNextState");
211: http->next = HTTP_ERROR;
212: http->result = HT_ERROR;
1.127 frystyk 213: break;
1.130 frystyk 214: }
1.136 frystyk 215: return NO;
1.130 frystyk 216: }
217:
1.158 frystyk 218:
219:
1.130 frystyk 220: /*
221: ** This is a big switch handling all HTTP return codes. It puts in any
222: ** appropiate error message and decides whether we should expect data
223: ** or not.
224: */
225: PRIVATE void HTTPNextState (HTStream * me)
226: {
1.134 frystyk 227: http_info * http = me->http;
1.158 frystyk 228: int error_class = me->status / 100;
229: switch (error_class) {
1.127 frystyk 230:
1.158 frystyk 231: case 0: /* 0.9 response */
232: case 2:
1.112 frystyk 233:
1.158 frystyk 234: switch (me->status) {
1.112 frystyk 235:
1.158 frystyk 236: case 201: /* Created */
237: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CREATED,
238: me->reason, (int) strlen(me->reason),
239: "HTTPNextState");
240: http->next = HTTP_OK;
241: http->result = HT_CREATED;
242: break;
243:
244: case 202: /* Accepted */
245: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_ACCEPTED,
246: me->reason, (int) strlen(me->reason),
247: "HTTPNextState");
248: http->next = HTTP_OK;
249: http->result = HT_ACCEPTED;
250: break;
251:
252: case 203: /* Non-authoritative information */
253: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NON_AUTHORITATIVE,
254: me->reason, (int) strlen(me->reason),
255: "HTTPNextState");
256: http->next = HTTP_OK;
257: http->result = HT_LOADED;
258: break;
259:
260: case 204: /* No Response */
261: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NO_CONTENT,
262: me->reason, (int) strlen(me->reason),
263: "HTTPNextState");
264: http->next = HTTP_OK;
265: http->result = HT_NO_DATA;
266: break;
267:
268: case 205: /* Reset Content */
269: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_RESET,
270: me->reason, (int) strlen(me->reason),
271: "HTTPNextState");
272: http->next = HTTP_OK;
273: http->result = HT_RESET_CONTENT;
274: break;
275:
276: case 206: /* Partial Content */
277: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL,
278: me->reason, (int) strlen(me->reason),
279: "HTTPNextState");
280: http->next = HTTP_OK;
281: http->result = HT_PARTIAL_CONTENT;
282: break;
283:
284: case 207: /* Partial Update OK */
285: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL_OK,
286: me->reason, (int) strlen(me->reason),
287: "HTTPNextState");
288: http->next = HTTP_OK;
289: http->result = HT_PARTIAL_CONTENT;
290: break;
291:
292: default:
293: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_OK,
294: me->reason, (int) strlen(me->reason),
295: "HTTPNextState");
296: http->next = HTTP_OK;
297: http->result = HT_LOADED;
298: break;
299: }
1.134 frystyk 300: break;
301:
1.158 frystyk 302: case 3:
1.134 frystyk 303:
1.158 frystyk 304: switch (me->status) {
1.78 frystyk 305:
1.158 frystyk 306: case 301: /* Moved */
307: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MOVED,
308: me->reason, (int) strlen(me->reason),
309: "HTTPNextState");
310: http->next = HTTP_ERROR;
311: http->result = HT_PERM_REDIRECT;
312: break;
313:
314: case 302: /* Found */
315: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_FOUND,
316: me->reason, (int) strlen(me->reason),
317: "HTTPNextState");
318: http->next = HTTP_ERROR;
319: http->result = HT_FOUND;
320: break;
1.55 frystyk 321:
1.158 frystyk 322: case 303: /* Method */
323: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_METHOD,
324: me->reason, (int) strlen(me->reason),
325: "HTTPNextState");
326: http->next = HTTP_ERROR;
327: http->result = HT_SEE_OTHER;
328: break;
329:
330: case 304: /* Not Modified */
331: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NOT_MODIFIED,
332: me->reason, (int) strlen(me->reason),
333: "HTTPNextState");
334: http->next = HTTP_OK;
335: http->result = HT_NOT_MODIFIED;
336: break;
1.134 frystyk 337:
1.158 frystyk 338: case 305: /* Use proxy */
339: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_USE_PROXY,
340: me->reason, (int) strlen(me->reason),
341: "HTTPNextState");
342: http->next = HTTP_ERROR;
343: http->result = HT_USE_PROXY;
344: break;
1.55 frystyk 345:
1.152 frystyk 346: #if 0
1.158 frystyk 347: case 306: /* Use proxy */
348: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PROXY_REDIRECT,
349: me->reason, (int) strlen(me->reason),
350: "HTTPNextState");
351: http->next = HTTP_ERROR;
352: http->result = HT_USE_PROXY;
353: break;
1.152 frystyk 354: #endif
355:
1.158 frystyk 356: case 307: /* Use proxy */
357: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_TEMP_REDIRECT,
358: me->reason, (int) strlen(me->reason),
359: "HTTPNextState");
360: http->next = HTTP_ERROR;
361: http->result = HT_TEMP_REDIRECT;
362: break;
363:
364: default:
365: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MULTIPLE,
366: me->reason, (int) strlen(me->reason),
367: "HTTPNextState");
368: http->next = HTTP_OK;
369: http->result = HT_LOADED;
370: break;
371: }
372: break;
373:
374: case 4:
375:
376: switch (me->status) {
377: case 401:
378: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
379: me->reason, (int) strlen(me->reason), "HTTPNextState");
380: http->next = HTTP_ERROR;
381: http->result = HT_NO_ACCESS;
382: break;
1.152 frystyk 383:
1.158 frystyk 384: case 402: /* Payment required */
385: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
386: me->reason, (int) strlen(me->reason), "HTTPNextState");
387: http->next = HTTP_ERROR;
388: http->result = -402;
389: break;
1.71 frystyk 390:
1.158 frystyk 391: case 403: /* Forbidden */
392: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
393: me->reason, (int) strlen(me->reason), "HTTPNextState");
394: http->next = HTTP_ERROR;
395: http->result = HT_FORBIDDEN;
396: break;
1.55 frystyk 397:
1.158 frystyk 398: case 404: /* Not Found */
399: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
400: me->reason, (int) strlen(me->reason), "HTTPNextState");
401: http->next = HTTP_ERROR;
402: http->result = -404;
403: break;
1.55 frystyk 404:
1.158 frystyk 405: case 405: /* Not Allowed */
406: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
407: me->reason, (int) strlen(me->reason), "HTTPNextState");
408: http->next = HTTP_ERROR;
409: http->result = -405;
410: break;
411:
412: case 406: /* None Acceptable */
413: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
414: me->reason, (int) strlen(me->reason), "HTTPNextState");
415: http->next = HTTP_ERROR;
416: http->result = HT_NOT_ACCEPTABLE;
417: break;
418:
419: case 407: /* Proxy Authentication Required */
420: HTRequest_addError(me->request, ERR_FATAL, NO,HTERR_PROXY_UNAUTHORIZED,
421: me->reason, (int) strlen(me->reason), "HTTPNextState");
422: http->next = HTTP_ERROR;
423: http->result = HT_NO_PROXY_ACCESS;
424: break;
425:
426: case 408: /* Request Timeout */
427: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
428: me->reason, (int) strlen(me->reason), "HTTPNextState");
429: http->next = HTTP_ERROR;
430: http->result = -408;
431: break;
432:
433: case 409: /* Conflict */
434: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_CONFLICT,
435: me->reason, (int) strlen(me->reason), "HTTPNextState");
436: http->next = HTTP_ERROR;
437: http->result = HT_CONFLICT;
438: break;
439:
440: case 410: /* Gone */
441: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GONE,
442: me->reason, (int) strlen(me->reason), "HTTPNextState");
443: http->next = HTTP_ERROR;
444: http->result = -410;
445: break;
446:
447: case 411: /* Length Required */
448: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_LENGTH_REQUIRED,
449: me->reason, (int) strlen(me->reason), "HTTPNextState");
450: http->next = HTTP_ERROR;
451: http->result = HT_LENGTH_REQUIRED;
452: break;
453:
454: case 412: /* Precondition failed */
455: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PRECON_FAILED,
456: me->reason, (int) strlen(me->reason), "HTTPNextState");
457: http->next = HTTP_ERROR;
458: http->result = -412;
459: break;
460:
461: case 413: /* Request entity too large */
462: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TOO_BIG,
463: me->reason, (int) strlen(me->reason), "HTTPNextState");
464: http->next = HTTP_ERROR;
465: http->result = -413;
466: break;
467:
468: case 414: /* Request-URI too long */
469: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_URI_TOO_BIG,
470: me->reason, (int) strlen(me->reason), "HTTPNextState");
471: http->next = HTTP_ERROR;
472: http->result = -414;
473: break;
474:
475: case 415: /* Unsupported */
476: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNSUPPORTED,
477: me->reason, (int) strlen(me->reason), "HTTPNextState");
478: http->next = HTTP_ERROR;
479: http->result = -415;
480: break;
481:
482: case 416: /* Request Range not satisfiable */
483: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_RANGE,
484: me->reason, (int) strlen(me->reason), "HTTPNextState");
485: http->next = HTTP_ERROR;
486: http->result = -416;
487: break;
488:
489: case 417: /* Expectation Failed */
490: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_EXPECTATION_FAILED,
491: me->reason, (int) strlen(me->reason), "HTTPNextState");
492: http->next = HTTP_ERROR;
493: http->result = -417;
494: break;
495:
496: case 418: /* Reauthentication required */
497: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_REAUTH,
498: me->reason, (int) strlen(me->reason), "HTTPNextState");
499: http->next = HTTP_ERROR;
500: http->result = -418;
501: break;
502:
503: case 419: /* Proxy Reauthentication required */
504: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PROXY_REAUTH,
505: me->reason, (int) strlen(me->reason), "HTTPNextState");
506: http->next = HTTP_ERROR;
507: http->result = -419;
508: break;
509:
510: default:
511: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
512: me->reason, (int) strlen(me->reason), "HTTPNextState");
513: http->next = HTTP_ERROR;
514: http->result = -400;
515: break;
516: }
1.134 frystyk 517: break;
518:
1.158 frystyk 519: case 5:
1.134 frystyk 520:
1.158 frystyk 521: switch (me->status) {
522: case 501:
523: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
524: me->reason, (int) strlen(me->reason), "HTTPNextState");
525: http->next = HTTP_ERROR;
526: http->result = -501;
527: break;
528:
529: case 502:
530: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
531: me->reason, (int) strlen(me->reason), "HTTPNextState");
532: http->next = HTTP_ERROR;
533: http->result = -502;
534: break;
535:
536: case 503:
537: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_DOWN,
538: me->reason, (int) strlen(me->reason), "HTTPNextState");
539: http->next = HTTP_ERROR;
540:
541: /*
542: ** If Retry-After header is found then return HT_RETRY else HT_ERROR.
543: ** The caller may want to reissue the request at a later point in time.
544: */
545: {
546: HTResponse * response = HTRequest_response(me->request);
547: if (HTResponse_retryTime(response))
548: http->result = HT_RETRY;
549: else
550: http->result = -500;
551: }
552: break;
553:
554: case 504:
555: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
556: me->reason, (int) strlen(me->reason), "HTTPNextState");
557: http->next = HTTP_ERROR;
558: http->result = -504;
559: break;
560:
561: case 505: /* Unsupported protocol version */
562: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_VERSION,
563: me->reason, (int) strlen(me->reason), "HTTPNextState");
564: http->next = HTTP_ERROR;
565: http->result = HT_BAD_VERSION;
566: break;
567:
568: case 506: /* Partial update Not Implemented */
569: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NO_PARTIAL_UPDATE,
570: me->reason, (int) strlen(me->reason), "HTTPNextState");
571: http->next = HTTP_ERROR;
572: http->result = HT_BAD_VERSION;
573: break;
574:
575: default: /* bad number */
576: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
577: me->reason, (int) strlen(me->reason), "HTTPNextState");
578: http->next = HTTP_ERROR;
579: http->result = -500;
580: break;
1.140 frystyk 581: }
1.78 frystyk 582: break;
583:
1.158 frystyk 584: default:
1.104 frystyk 585: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.158 frystyk 586: (void *) me->buffer, me->buflen, "HTTPNextState");
1.134 frystyk 587: http->next = HTTP_ERROR;
1.155 frystyk 588: http->result = -(me->status);
1.71 frystyk 589: break;
1.55 frystyk 590: }
591: }
592:
1.71 frystyk 593: /* ------------------------------------------------------------------------- */
594: /* HTTP Status Line Stream */
595: /* ------------------------------------------------------------------------- */
1.55 frystyk 596:
1.71 frystyk 597: /*
1.141 frystyk 598: ** Analyze the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 599: ** then create a MIME-stream, else create a Guess stream to find out
600: ** what the 0.9 server is sending. We need to copy the buffer as we don't
601: ** know if we can modify the contents or not.
1.78 frystyk 602: **
603: ** Stream handling is a function of the status code returned from the
604: ** server:
605: ** 200: Use `output_stream' in HTRequest structure
1.94 frystyk 606: ** else: Use `debug_stream' in HTRequest structure
1.80 frystyk 607: **
608: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 609: */
1.157 frystyk 610: PRIVATE int stream_pipe (HTStream * me, int length)
1.56 frystyk 611: {
1.136 frystyk 612: HTRequest * request = me->request;
613: HTNet * net = HTRequest_net(request);
1.123 frystyk 614: HTHost * host = HTNet_host(net);
1.141 frystyk 615:
1.153 frystyk 616: #if 0
617: {
618: char * uri = HTAnchor_address((HTAnchor *) HTRequest_anchor(request));
619: fprintf(stderr, "HTTP header: %s for '%s'\n", me->buffer, uri);
620: HT_FREE(uri);
621: }
622: #endif
623:
1.132 frystyk 624: /*
625: ** Just check for HTTP and not HTTP/ as NCSA server chokes on 1.1 replies
626: ** Thanks to Markku Savela <msa@msa.tte.vtt.fi>
1.141 frystyk 627:
1.132 frystyk 628: */
629: if (strncasecomp(me->buffer, "http", 4)) {
1.80 frystyk 630: int status;
1.136 frystyk 631: HTRequest_addError(request, ERR_INFO, NO, HTERR_HTTP09,
1.80 frystyk 632: (void *) me->buffer, me->buflen, "HTTPStatusStream");
1.136 frystyk 633: me->target = HTStreamStack(WWW_UNKNOWN,
634: HTRequest_outputFormat(request),
635: HTRequest_outputStream(request),
636: request, NO);
1.134 frystyk 637: me->http->next = HTTP_OK;
1.80 frystyk 638: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
639: me->transparent = YES;
1.186 kahan 640: /* JK: in 2000, we don't expect many HTTP/0.9 servers to remain.
641: I removed this line which made the backward change as most of
642: the time we fall here more due to a network or server problem,
643: rather than because we are accessing an old server. */
644: /* HTHost_setVersion(host, HTTP_09); */
1.157 frystyk 645: if (length > 0) HTHost_setConsumed(host, length);
1.178 frystyk 646: HTTRACE(PROT_TRACE, "HTTP Status. `%s\' is probably a broken 1.0 server that doesn't understand HEAD\n" _
1.171 frystyk 647: HTHost_name(host));
648: return HT_ERROR;
1.80 frystyk 649: } else {
1.140 frystyk 650: HTResponse * response = HTRequest_response(request);
1.155 frystyk 651: char * ptr = me->buffer+5; /* Skip the HTTP part */
652: char * vptr = NULL;
653: int major = 0;
654: int minor = 0;
655: me->version = vptr = HTNextField(&ptr);
656: if (vptr) {
657: major = (int) strtol(me->version, &vptr, 10);
658: if (vptr++) minor = strtol(vptr, NULL, 10);
659: }
1.95 frystyk 660:
1.130 frystyk 661: /* Here we want to find out when to use persistent connection */
1.171 frystyk 662: if (major > 1 && major < 100) {
1.178 frystyk 663: HTTRACE(PROT_TRACE, "HTTP Status. Major version number is %d\n" _ major);
1.155 frystyk 664: me->target = HTErrorStream();
1.158 frystyk 665: me->status = 9999;
1.155 frystyk 666: HTTPNextState(me); /* Get next state */
1.158 frystyk 667: return HT_ERROR;
1.155 frystyk 668: } else if (minor <= 0) {
1.171 frystyk 669: if (major > 100) {
1.178 frystyk 670: HTTRACE(PROT_TRACE, "HTTP Status. This is a *BROKEN* HTTP/1.0 server\n");
1.171 frystyk 671: me->status = 200;
672: } else {
1.178 frystyk 673: HTTRACE(PROT_TRACE, "HTTP Status. This is an HTTP/1.0 server\n");
1.171 frystyk 674: me->status = atoi(HTNextField(&ptr));
675: }
1.128 frystyk 676: HTHost_setVersion(host, HTTP_10);
1.155 frystyk 677: } else { /* 1.x, x>0 family */
678: HTHost_setVersion(host, HTTP_11); /* Best we can do */
1.156 frystyk 679: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 680: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with NO PIPELINING\n");
1.147 frystyk 681: HTNet_setPersistent(net, YES, HT_TP_SINGLE);
1.156 frystyk 682: } else if (ConnectionMode & HTTP_11_MUX) {
1.178 frystyk 683: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with MUXING\n");
1.156 frystyk 684: HTNet_setPersistent(net, YES, HT_TP_INTERLEAVE);
1.147 frystyk 685: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 686: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 687: HTHost_setVersion(host, HTTP_10);
688: HTNet_setPersistent(net, NO, HT_TP_SINGLE);
689: } else
690: HTNet_setPersistent(net, YES, HT_TP_PIPELINE);
1.171 frystyk 691: me->status = atoi(HTNextField(&ptr));
1.128 frystyk 692: }
1.95 frystyk 693:
1.81 frystyk 694: me->reason = ptr;
695: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
696: *ptr = '0円';
697: else if ((ptr = strchr(me->reason, '\n')) != NULL)
698: *ptr = '0円';
699:
1.130 frystyk 700: /*
701: ** If it is a 1xx code then find out what to do and return until we
702: ** get the next code. In the case of Upgrade we may not get back here
703: ** at all. If we are uploading an entity then continue doing that
704: */
705: if (me->status/100 == 1) {
1.136 frystyk 706: if (HTTPInformation(me) == YES) {
1.180 frystyk 707: if (me->status==100) {
708: me->buflen = 0;
709: me->state = EOL_BEGIN;
710: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
711: me->info_target = HTStreamStack(WWW_MIME_CONT,
712: HTRequest_debugFormat(request),
713: HTRequest_debugStream(request),
714: request, NO);
715: if (length > 0) HTHost_setConsumed(host, length);
716: return HT_OK;
717: } else if (me->status==101) {
718: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
719: me->target = HTStreamStack(WWW_MIME_UPGRADE,
720: HTRequest_outputFormat(request),
721: HTRequest_outputStream(request),
722: request, NO);
723: if (length > 0) HTHost_setConsumed(host, length);
724: me->transparent = YES;
725: return HT_OK;
726: }
1.103 frystyk 727: }
1.56 frystyk 728: }
1.133 frystyk 729:
730: /*
731: ** As we are getting fresh metainformation in the HTTP response,
732: ** we clear the old metainfomation in order not to mix it with the new
733: ** one. This is particularly important for the content-length and the
1.139 frystyk 734: ** like. The TRACE and OPTIONS method just adds to the current
735: ** metainformation so in that case we don't clear the anchor.
1.133 frystyk 736: */
1.136 frystyk 737: if (me->status==200 || me->status==203 || me->status==300) {
1.140 frystyk 738: /*
739: ** 200, 203 and 300 are all fully cacheable responses. No byte
740: ** ranges or anything else make life hard in this case.
741: */
1.148 frystyk 742: HTAnchor_clearHeader(HTRequest_anchor(request));
1.166 frystyk 743: HTResponse_setCachable(response, HT_CACHE_ALL);
1.136 frystyk 744: me->target = HTStreamStack(WWW_MIME,
745: HTRequest_outputFormat(request),
746: HTRequest_outputStream(request),
747: request, NO);
1.176 frystyk 748: } else if (me->status==204) {
749: HTResponse_setCachable(response, HT_CACHE_ALL);
750: me->target = HTStreamStack(WWW_MIME_HEAD,
751: HTRequest_debugFormat(request),
752: HTRequest_debugStream(request),
753: request, NO);
1.140 frystyk 754: } else if (me->status==206) {
755: /*
756: ** We got a partial response and now we must check whether
757: ** we issued a cache If-Range request or it was a new
758: ** partial response which we don't have in cache. In the latter
759: ** case, we don't cache the object and in the former we append
760: ** the result to the already existing cache entry.
761: */
762: HTReload reload = HTRequest_reloadMode(request);
763: if (reload == HT_CACHE_RANGE_VALIDATE) {
1.166 frystyk 764: HTResponse_setCachable(response, HT_CACHE_ALL);
1.140 frystyk 765: me->target = HTStreamStack(WWW_MIME_PART,
766: HTRequest_outputFormat(request),
767: HTRequest_outputStream(request),
768: request, NO);
769: } else {
1.149 frystyk 770: HTAnchor_clearHeader(HTRequest_anchor(request));
1.140 frystyk 771: me->target = HTStreamStack(WWW_MIME,
772: HTRequest_outputFormat(request),
773: HTRequest_outputStream(request),
774: request, NO);
775: }
1.176 frystyk 776: } else if (me->status==304) {
777: HTResponse_setCachable(response, HT_CACHE_NOT_MODIFIED);
1.136 frystyk 778: me->target = HTStreamStack(WWW_MIME_HEAD,
779: HTRequest_debugFormat(request),
780: HTRequest_debugStream(request),
781: request, NO);
782: } else if (HTRequest_debugStream(request)) {
1.175 frystyk 783: HTResponse_setCachable(response,
784: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 785: me->target = HTStreamStack(WWW_MIME,
786: HTRequest_debugFormat(request),
787: HTRequest_debugStream(request),
788: request, NO);
789: } else {
1.140 frystyk 790: /*
791: ** We still need to parse the MIME part in order to find any
792: ** valuable meta information which is needed from the response.
793: */
1.175 frystyk 794: HTResponse_setCachable(response,
795: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 796: me->target = HTStreamStack(WWW_MIME,
797: HTRequest_debugFormat(request),
798: HTRequest_debugStream(request),
799: request, NO);
1.133 frystyk 800: }
1.56 frystyk 801: }
1.113 frystyk 802: if (!me->target) me->target = HTErrorStream();
1.81 frystyk 803: HTTPNextState(me); /* Get next state */
1.80 frystyk 804: me->transparent = YES;
1.157 frystyk 805: if (length > 0) HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length);
1.80 frystyk 806: return HT_OK;
1.71 frystyk 807: }
1.56 frystyk 808:
1.80 frystyk 809: /*
810: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
811: ** is found
812: */
1.119 frystyk 813: PRIVATE int HTTPStatus_put_block (HTStream * me, const char * b, int l)
1.71 frystyk 814: {
1.150 frystyk 815: int status = HT_OK;
1.153 frystyk 816: int length = l;
1.146 frystyk 817: me->startLen = me->buflen;
1.80 frystyk 818: while (!me->transparent && l-- > 0) {
1.157 frystyk 819: if (me->info_target) {
820:
821: /* Put data down the 1xx return code parser until we are done. */
822: status = (*me->info_target->isa->put_block)(me->info_target, b, l+1);
823: if (status != HT_CONTINUE) return status;
824:
825: /* Now free the info stream */
826: (*me->info_target->isa->_free)(me->info_target);
827: me->info_target = NULL;
828:
829: /* Update where we are in the stream */
830: l = HTHost_remainingRead(HTNet_host(HTRequest_net(me->request)));
1.163 frystyk 831: b += (length-l);
1.159 frystyk 832: length = l;
1.163 frystyk 833: if (l <= 0) break;
1.157 frystyk 834:
1.80 frystyk 835: } else {
836: *(me->buffer+me->buflen++) = *b;
837: if (me->state == EOL_FCR) {
838: if (*b == LF) { /* Line found */
1.157 frystyk 839: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 840: } else {
841: me->state = EOL_BEGIN;
842: }
843: } else if (*b == CR) {
844: me->state = EOL_FCR;
845: } else if (*b == LF) {
1.157 frystyk 846: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.71 frystyk 847: } else {
1.80 frystyk 848: if (me->buflen >= MAX_STATUS_LEN) {
1.157 frystyk 849: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 850: }
1.71 frystyk 851: }
1.80 frystyk 852: b++;
1.71 frystyk 853: }
1.56 frystyk 854: }
1.153 frystyk 855:
1.159 frystyk 856: if (!me->transparent && length != l)
857: HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length-l);
858:
1.99 frystyk 859: if (l > 0) return PUTBLOCK(b, l);
1.150 frystyk 860: return status;
1.56 frystyk 861: }
862:
1.119 frystyk 863: PRIVATE int HTTPStatus_put_string (HTStream * me, const char * s)
1.71 frystyk 864: {
1.80 frystyk 865: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 866: }
1.56 frystyk 867:
1.100 frystyk 868: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 869: {
1.80 frystyk 870: return HTTPStatus_put_block(me, &c, 1);
871: }
872:
1.100 frystyk 873: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 874: {
875: return (*me->target->isa->flush)(me->target);
1.71 frystyk 876: }
877:
1.100 frystyk 878: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 879: {
1.87 frystyk 880: int status = HT_OK;
881: if (me->target) {
882: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
883: return HT_WOULD_BLOCK;
884: }
1.115 frystyk 885: HT_FREE(me);
1.100 frystyk 886: return status;
1.71 frystyk 887: }
888:
1.104 frystyk 889: PRIVATE int HTTPStatus_abort (HTStream * me, HTList * e)
1.71 frystyk 890: {
891: if (me->target)
1.74 frystyk 892: ABORT_TARGET;
1.115 frystyk 893: HT_FREE(me);
1.178 frystyk 894: HTTRACE(PROT_TRACE, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 895: return HT_ERROR;
1.71 frystyk 896: }
897:
898: /* HTTPStatus Stream
899: ** -----------------
900: */
1.119 frystyk 901: PRIVATE const HTStreamClass HTTPStatusClass =
1.71 frystyk 902: {
903: "HTTPStatus",
1.80 frystyk 904: HTTPStatus_flush,
1.71 frystyk 905: HTTPStatus_free,
906: HTTPStatus_abort,
907: HTTPStatus_put_character,
908: HTTPStatus_put_string,
909: HTTPStatus_put_block
910: };
911:
1.113 frystyk 912: PUBLIC HTStream * HTTPStatus_new (HTRequest * request,
913: void * param,
914: HTFormat input_format,
915: HTFormat output_format,
916: HTStream * output_stream)
1.71 frystyk 917: {
1.115 frystyk 918: HTStream * me;
919: if ((me = (HTStream *) HT_CALLOC(1, sizeof(HTStream))) == NULL)
920: HT_OUTOFMEM("HTTPStatus_new");
1.71 frystyk 921: me->isa = &HTTPStatusClass;
1.113 frystyk 922: if (request) {
1.126 frystyk 923: HTNet * net = HTRequest_net(request);
1.125 frystyk 924: /* Get existing copy */
925: http_info * http = (http_info *) HTNet_context(net);
1.113 frystyk 926: me->request = request;
927: me->http = http;
928: http->next = HTTP_ERROR;
929: me->state = EOL_BEGIN;
930: return me;
931: } else
932: return HTErrorStream();
1.71 frystyk 933: }
934:
935: /* ------------------------------------------------------------------------- */
936:
937: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 938: ** ==============================
939: **
940: ** Given a hypertext address, this routine loads a document.
941: **
942: ** On entry,
943: ** request This is the request structure
1.94 frystyk 944: ** returns HT_ERROR Error has occured in call back
945: ** HT_OK Call back was OK
1.55 frystyk 946: */
1.141 frystyk 947: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type);
948:
949: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request)
1.55 frystyk 950: {
951: http_info *http; /* Specific protocol information */
1.112 frystyk 952: HTParentAnchor *anchor = HTRequest_anchor(request);
1.141 frystyk 953: HTNet * net = HTRequest_net(request);
1.112 frystyk 954:
1.94 frystyk 955: /*
956: ** Initiate a new http structure and bind to request structure
957: ** This is actually state HTTP_BEGIN, but it can't be in the state
958: ** machine as we need the structure first.
959: */
1.178 frystyk 960: HTTRACE(PROT_TRACE, "HTTP........ Looking for `%s\'\n" _
1.141 frystyk 961: HTAnchor_physical(anchor));
962: if ((http = (http_info *) HT_CALLOC(1, sizeof(http_info))) == NULL)
963: HT_OUTOFMEM("HTLoadHTTP");
964: http->net = net;
1.157 frystyk 965: http->request = request;
1.141 frystyk 966: HTNet_setContext(net, http);
967: HTNet_setEventCallback(net, HTTPEvent);
968: HTNet_setEventParam(net, http); /* callbacks get http* */
969:
1.157 frystyk 970: return HTTPEvent(soc, http, HTEvent_BEGIN); /* get it started - ops is ignored */
971: }
972:
973: PRIVATE int FlushPutEvent (HTTimer * timer, void * param, HTEventType type)
974: {
975: http_info * http = (http_info *) param;
976: HTStream * input = HTRequest_inputStream(http->request);
977: HTPostCallback * pcbf = HTRequest_postCallback(http->request);
1.181 frystyk 978: int status = HT_ERROR;
1.157 frystyk 979:
1.165 frystyk 980: http->usedTimer = YES;
1.160 frystyk 981: if (timer != http->timer)
1.178 frystyk 982: HTDEBUGBREAK("HTTP timer %p not in sync\n" _ timer);
983: HTTRACE(PROT_TRACE, "Uploading... Flushing %p with timer %p\n" _ http _ timer);
1.157 frystyk 984:
985: /*
1.181 frystyk 986: ** Call the callback that will provide the data to save
987: ** If the callback returns HT_OK then call it again until
988: ** it returns something else than HT_OK.
1.157 frystyk 989: */
1.181 frystyk 990: if (http && input && pcbf) {
991: status = (*pcbf)(http->request, input);
992: HTTRACE(PROT_TRACE, "Uploading... Callback returned %d\n" _ status);
993: }
1.157 frystyk 994:
995: /*
1.181 frystyk 996: ** If the callback returned something else than HT_OK then delete
997: ** the timer, otherwise update it to a much shorter expiration
998: ** time so that we can write some more data to the net.
1.157 frystyk 999: */
1.181 frystyk 1000: if (status != HT_OK) {
1001: HTTimer_delete(http->timer);
1002: http->timer = NULL;
1003: } else if (!http->repetitive_writing) {
1004: http->timer = HTTimer_new(NULL, FlushPutEvent, http, HTRepeatWrite, YES, YES);
1005: http->repetitive_writing = YES;
1006: }
1.157 frystyk 1007: return HT_OK;
1.141 frystyk 1008: }
1009:
1010: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type)
1011: {
1012: http_info * http = (http_info *)pVoid;
1013: int status = HT_ERROR;
1014: HTNet * net = http->net;
1015: HTRequest * request = HTNet_request(net);
1.144 frystyk 1016: HTParentAnchor * anchor = HTRequest_anchor(request);
1017: HTHost * host = HTNet_host(net);
1.141 frystyk 1018:
1019: /*
1.166 frystyk 1020: ** Check whether we have been interrupted or timed out
1.141 frystyk 1021: */
1022: if (type == HTEvent_BEGIN) {
1.134 frystyk 1023: http->next = HTTP_OK;
1024: http->result = HT_ERROR;
1.141 frystyk 1025: } else if (type == HTEvent_CLOSE) {
1.179 frystyk 1026: long read_len = HTNet_bytesRead(net);
1027: long doc_len = HTAnchor_length(anchor);
1028:
1029: /*
1030: ** It is OK to get a close if a) we don't pipeline and b)
1.182 frystyk 1031: ** we have the expected amount of data, and c) we haven't
1032: ** recieved a 100 Continue code. In case we don't
1.179 frystyk 1033: ** know how much data to expect, we must accept it asis.
1034: */
1035: if (HTHost_numberOfOutstandingNetObjects(host) == 1 &&
1.182 frystyk 1036: http->result != HT_CONTINUE && (doc_len<0 || doc_len==read_len)) {
1.183 frystyk 1037: HTTPCleanup(request, http->result); /* Raffaele Sena: was HT_LOADED */
1.179 frystyk 1038: } else {
1039: HTRequest_addError(request, ERR_FATAL, NO, HTERR_INTERRUPTED,
1040: NULL, 0, "HTLoadHTTP");
1041: HTTPCleanup(request, HT_INTERRUPTED);
1042: }
1.166 frystyk 1043: return HT_OK;
1044: } else if (type == HTEvent_TIMEOUT) {
1045: HTRequest_addError(request, ERR_FATAL, NO, HTERR_TIME_OUT,
1046: NULL, 0, "HTLoadHTTP");
1047: HTTPCleanup(request, HT_TIMEOUT);
1.94 frystyk 1048: return HT_OK;
1.141 frystyk 1049: } else if (type == HTEvent_END) {
1050: HTTPCleanup(request, http->result);
1051: return HT_OK;
1052: } else if (type == HTEvent_RESET) {
1053: HTTPCleanup(request, HT_RECOVER_PIPE);
1.145 frystyk 1054: http->state = HTTP_BEGIN;
1.141 frystyk 1055: return HT_OK;
1056: }
1057:
1.71 frystyk 1058: /* Now jump into the machine. We know the state from the previous run */
1059: while (1) {
1060: switch (http->state) {
1.134 frystyk 1061: case HTTP_BEGIN:
1.184 frystyk 1062: status = HTHost_connect(host, net, HTAnchor_physical(anchor));
1.144 frystyk 1063: host = HTNet_host(net);
1.153 frystyk 1064: if (status == HT_OK) {
1.140 frystyk 1065:
1.123 frystyk 1066: /*
1.140 frystyk 1067: ** Check the protocol class to see if we have connected to a
1068: ** the right class of server, in this case HTTP. If we don't
1069: ** know the server then assume a HTTP/1.0
1.123 frystyk 1070: */
1071: {
1072: char * s_class = HTHost_class(host);
1.140 frystyk 1073: if (!s_class) {
1.174 frystyk 1074: if (HTRequest_proxy(request) == NULL) {
1075: HTAssocList * alist = HTRequest_connection(request);
1076: if (!(alist && HTAssocList_findObject(alist, "close")))
1077: HTRequest_addConnection(request, "Keep-Alive", "");
1078: }
1.140 frystyk 1079: HTHost_setClass(host, "http");
1080: } else if (strcasecomp(s_class, "http")) {
1.123 frystyk 1081: HTRequest_addError(request, ERR_FATAL, NO, HTERR_CLASS,
1082: NULL, 0, "HTLoadHTTP");
1083: http->state = HTTP_ERROR;
1084: break;
1085: }
1.95 frystyk 1086: }
1.147 frystyk 1087:
1.156 frystyk 1088: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 1089: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 WITH NO PIPELINING\n");
1.147 frystyk 1090: HTRequest_setFlush(request, YES);
1091: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 1092: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 1093: HTHost_setVersion(host, HTTP_10);
1094: }
1095:
1.151 frystyk 1096: if (HTNet_preemptive(net)) {
1.178 frystyk 1097: HTTRACE(PROT_TRACE, "HTTP........ Force flush on preemptive load\n");
1.151 frystyk 1098: HTRequest_setFlush(request, YES);
1099: }
1100:
1.147 frystyk 1101: /* Jump to next state */
1.144 frystyk 1102: http->state = HTTP_NEED_STREAM;
1.159 frystyk 1103: } else if (status == HT_WOULD_BLOCK || status == HT_PENDING) {
1.144 frystyk 1104: return HT_OK;
1.171 frystyk 1105: } else if (status == HT_NO_HOST) {
1106: http->result = HT_NO_HOST;
1107: http->state = HTTP_ERROR;
1.159 frystyk 1108: } else
1.144 frystyk 1109: http->state = HTTP_ERROR; /* Error or interrupt */
1110: break;
1111:
1112: case HTTP_NEED_STREAM:
1.138 frystyk 1113:
1.144 frystyk 1114: /*
1115: ** Create the stream pipe FROM the channel to the application.
1116: ** The target for the input stream pipe is set up using the
1117: ** stream stack.
1118: */
1.167 frystyk 1119: {
1120: /*
1121: ** during a recovery, we might keep the same HTNet object.
1122: ** if so, reuse it's read stream
1123: */
1.176 frystyk 1124: HTStream * me = HTNet_readStream( net );
1.167 frystyk 1125: if ( me == NULL ) {
1.173 frystyk 1126: me = HTStreamStack(WWW_HTTP,
1127: HTRequest_outputFormat(request),
1128: HTRequest_outputStream(request),
1129: request, YES);
1.178 frystyk 1130: #ifdef HTDEBUG
1.173 frystyk 1131: if (PROT_TRACE) {
1132: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1133: if (htfp) {
1134: me = HTTee(me, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1135: HTTRACE(PROT_TRACE, "HTTP........ Dumping response to `%s\'\n" _ HTTP_OUTPUT);
1.173 frystyk 1136: }
1137: }
1.178 frystyk 1138: #endif /* HTDEBUG */
1.173 frystyk 1139:
1140: HTNet_setReadStream(net, me);
1.167 frystyk 1141: }
1142: HTRequest_setOutputConnected(request, YES);
1.144 frystyk 1143: }
1.127 frystyk 1144:
1.144 frystyk 1145: /*
1146: ** Create the stream pipe TO the channel from the application
1147: ** and hook it up to the request object
1148: */
1149: {
1150: HTChannel * channel = HTHost_channel(host);
1151: HTOutputStream * output = HTChannel_getChannelOStream(channel);
1152: int version = HTHost_version(host);
1153: HTStream * app = NULL;
1154:
1.178 frystyk 1155: #ifdef HTDEBUG
1.144 frystyk 1156: if (PROT_TRACE) {
1.162 frystyk 1157: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1158: if (htfp) {
1.144 frystyk 1159: output = (HTOutputStream *)
1.162 frystyk 1160: HTTee((HTStream *) output, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1161: HTTRACE(PROT_TRACE, "HTTP........ Dumping request to `%s\'\n" _ HTTP_OUTPUT);
1.144 frystyk 1162: }
1163: }
1.178 frystyk 1164: #endif /* HTDEBUG */
1.144 frystyk 1165: app = HTMethod_hasEntity(HTRequest_method(request)) ?
1166: HTMIMERequest_new(request,
1167: HTTPRequest_new(request, (HTStream *) output, NO,
1168: version),
1169: YES) :
1170: HTTPRequest_new(request, (HTStream *) output, YES, version);
1171: HTRequest_setInputStream(request, app);
1172: }
1.88 frystyk 1173:
1.144 frystyk 1174: /*
1175: ** Set up concurrent read/write if this request isn't the
1176: ** source for a PUT or POST. As source we don't start reading
1177: ** before all destinations are ready. If destination then
1178: ** register the input stream and get ready for read
1179: */
1180: if (HTRequest_isDestination(request)) {
1181: HTHost_register(host, net, HTEvent_READ);
1182: HTRequest_linkDestination(request);
1183: }
1184: http->state = HTTP_CONNECTED;
1185: type = HTEvent_WRITE; /* fresh, so try a write */
1.71 frystyk 1186: break;
1187:
1.87 frystyk 1188: /* As we can do simultanous read and write this is now one state */
1.141 frystyk 1189: case HTTP_CONNECTED:
1190: if (type == HTEvent_WRITE) {
1.157 frystyk 1191: HTStream * input = HTRequest_inputStream(request);
1192: HTPostCallback * pcbf = HTRequest_postCallback(request);
1193: status = HTRequest_flush(request) ?
1194: HTHost_forceFlush(host) : (*input->isa->flush)(input);
1195:
1196: /*
1197: ** Check to see if we are uploading something or just a normal
1198: ** GET kind of thing.
1199: */
1.187 kahan 1200:
1201: /*
1202: ** JK: don't continue sending things thru the network
1203: ** if the flush resulted in an error or if the connection
1204: ** is closed
1205: */
1206: if ((status != HT_ERROR) && status != HT_CLOSED) {
1207: if (pcbf) {
1208: if (http->lock == NO) {
1209: int retrys = HTRequest_retrys(request);
1210: ms_t delay = retrys > 3 ? HTSecondWriteDelay : HTFirstWriteDelay;
1211: if (!http->timer && !http->usedTimer) {
1212: http->timer = HTTimer_new(NULL, FlushPutEvent,
1.162 frystyk 1213: http, delay, YES, NO);
1.187 kahan 1214: HTTRACE(PROT_TRACE, "Uploading... Holding %p for %lu ms using time %p\n" _
1.178 frystyk 1215: http _ delay _ http->timer);
1.187 kahan 1216: HTHost_register(host, net, HTEvent_READ);
1217: }
1218: http->lock = YES;
1.157 frystyk 1219: }
1.187 kahan 1220: type = HTEvent_READ;
1221: } else {
1222:
1223: /*
1224: ** Check to see if we can start a new request
1225: ** pending in the host object.
1226: */
1227: HTHost_launchPending(host);
1228: type = HTEvent_READ;
1.157 frystyk 1229: }
1230: }
1.188 kahan 1231:
1.157 frystyk 1232: /* Now check the status code */
1233: if (status == HT_WOULD_BLOCK)
1234: return HT_OK;
1235: else if (status == HT_PAUSE || status == HT_LOADED) {
1236: type = HTEvent_READ;
1.168 frystyk 1237: } else if (status==HT_ERROR)
1.157 frystyk 1238: http->state = HTTP_RECOVER_PIPE;
1239: } else if (type == HTEvent_FLUSH) {
1240: HTStream * input = HTRequest_inputStream(request);
1241: if (input == NULL)
1242: return HT_ERROR;
1243: return (*input->isa->flush)(input);
1244: } else if (type == HTEvent_READ) {
1245: status = HTHost_read(host, net);
1246: if (status == HT_WOULD_BLOCK)
1247: return HT_OK;
1248: else if (status == HT_CONTINUE) {
1.178 frystyk 1249: HTTRACE(PROT_TRACE, "HTTP........ Continuing\n");
1.157 frystyk 1250: http->lock = NO;
1251: continue;
1252: } else if (status==HT_LOADED)
1253: http->state = http->next; /* Jump to next state (OK or ERROR) */
1254: else if (status==HT_CLOSED)
1255: http->state = HTTP_RECOVER_PIPE;
1.167 frystyk 1256: else if (status == HT_ERROR)
1257: http->state = HTTP_KILL_PIPE;
1.157 frystyk 1258: else
1259: http->state = HTTP_ERROR;
1260: } else {
1261: http->state = HTTP_ERROR; /* don't know how to handle OOB */
1262: }
1263: break;
1.141 frystyk 1264:
1.134 frystyk 1265: case HTTP_OK:
1266: HTTPCleanup(request, http->result);
1.94 frystyk 1267: return HT_OK;
1.71 frystyk 1268: break;
1.141 frystyk 1269:
1270: case HTTP_RECOVER_PIPE:
1271: {
1272: /*
1273: ** If this is a persistent connection and we get a close
1274: ** then it is an error and we should recover from it by
1275: ** restarting the pipe line of requests if any
1276: */
1.151 frystyk 1277: if (HTHost_isPersistent(host) && !HTHost_closeNotification(host)) {
1.143 frystyk 1278: if (host == NULL) return HT_ERROR;
1.144 frystyk 1279: HTRequest_setFlush(request, YES);
1.182 frystyk 1280:
1281: /*
1282: ** If we already have recovered more than we want and
1283: ** this call returns NO then simply kill the pipe.
1284: ** Otherwise we may loop forever.
1285: */
1286: if (HTHost_recoverPipe(host) != YES) {
1287: HTRequest_addError(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1288: NULL, 0, "HTTPEvent");
1289: http->state = HTTP_KILL_PIPE;
1290: break;
1291: }
1.144 frystyk 1292: return HT_OK;
1.141 frystyk 1293: } else
1294: http->state = HTTP_OK;
1295: }
1.143 frystyk 1296: break;
1.141 frystyk 1297:
1.167 frystyk 1298: case HTTP_KILL_PIPE:
1299: if (host == NULL) return HT_ERROR;
1300: HTHost_killPipe(host);
1301: return HT_OK;
1302: break;
1303:
1.71 frystyk 1304: case HTTP_ERROR:
1.143 frystyk 1305: HTTPCleanup(request, http->result);
1306: return HT_OK;
1307: break;
1308:
1.141 frystyk 1309: default:
1.178 frystyk 1310: HTDEBUGBREAK("Bad http state %d\n" _ http->state);
1.71 frystyk 1311: }
1312: } /* End of while(1) */
1313: }
1.88 frystyk 1314:
1.147 frystyk 1315: PUBLIC void HTTP_setConnectionMode (HTTPConnectionMode mode)
1316: {
1317: ConnectionMode = mode;
1318: }
1319:
1320: PUBLIC HTTPConnectionMode HTTP_connectionMode (void)
1321: {
1322: return ConnectionMode;
1323: }
1.21 luotonen 1324:
1.169 frystyk 1325: PUBLIC BOOL HTTP_setBodyWriteDelay (ms_t first_try, ms_t second_try)
1326: {
1327: if (first_try > 20 && second_try >= first_try) {
1328: HTFirstWriteDelay = first_try;
1329: HTSecondWriteDelay = second_try;
1330: return YES;
1331: }
1332: return NO;
1333: }
1334:
1335: PUBLIC void HTTP_bodyWriteDelay (ms_t * first_try, ms_t * second_try)
1336: {
1337: *first_try = HTFirstWriteDelay;
1338: *second_try = HTSecondWriteDelay;
1.170 frystyk 1339: }
1340:
Webmaster