Annotation of libwww/Library/src/HTTP.c, revision 1.191
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
1.191 ! kirschpi 6: ** @(#) $Id: HTTP.c,v 1.190 2000年10月30日 10:04:23 kahan Exp $
1.74 frystyk 7: **
1.185 raff 8: ** This module implements the HTTP protocol as a state machine
1.55 frystyk 9: **
10: ** History:
1.59 frystyk 11: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 12: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
13: ** Forward, redirection, error handling and referer field
1.67 duns 14: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 15: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.191 ! kirschpi 16: ** Fev 02 MKP WebDAV status codes, Manuele Kirsch Pinheiro
! 17: ** (Manuele.Kirsch_Pinheiro@inrialpes.fr)
1.55 frystyk 18: **
1.1 timbl 19: */
20:
1.78 frystyk 21: /* Library include files */
1.161 frystyk 22: #include "wwwsys.h"
1.123 frystyk 23: #include "WWWUtil.h"
24: #include "WWWCore.h"
1.177 frystyk 25: #include "HTHeader.h"
26: #include "HTMIMERq.h"
1.94 frystyk 27: #include "HTReqMan.h"
1.179 frystyk 28: #include "HTNetMan.h"
1.109 frystyk 29: #include "HTTPUtil.h"
1.80 frystyk 30: #include "HTTPReq.h"
1.55 frystyk 31: #include "HTTP.h" /* Implements */
32:
33: /* Macros and other defines */
1.94 frystyk 34: #ifndef HTTP_PORT
35: #define HTTP_PORT 80 /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
36: #endif
37:
1.71 frystyk 38: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
39: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
40: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
41: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 42: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 43:
1.178 frystyk 44: #ifdef HTDEBUG
1.177 frystyk 45: #include "WWWStream.h"
1.147 frystyk 46: #define HTTP_OUTPUT "w3chttp.out"
1.162 frystyk 47: PRIVATE FILE * htfp = NULL;
1.140 frystyk 48: #endif
1.139 frystyk 49:
1.59 frystyk 50: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 51:
52: /* Final states have negative value */
1.59 frystyk 53: typedef enum _HTTPState {
1.167 frystyk 54: HTTP_KILL_PIPE = -4,
1.141 frystyk 55: HTTP_RECOVER_PIPE = -3,
1.134 frystyk 56: HTTP_ERROR = -2,
57: HTTP_OK = -1,
1.71 frystyk 58: HTTP_BEGIN = 0,
1.144 frystyk 59: HTTP_NEED_STREAM,
1.141 frystyk 60: HTTP_CONNECTED
1.59 frystyk 61: } HTTPState;
1.55 frystyk 62:
1.94 frystyk 63: /* This is the context structure for the this module */
1.55 frystyk 64: typedef struct _http_info {
1.81 frystyk 65: HTTPState state; /* Current State of the connection */
66: HTTPState next; /* Next state */
1.134 frystyk 67: int result; /* Result to report to the after filter */
1.139 frystyk 68: BOOL lock; /* Block for writing */
1.141 frystyk 69: HTNet * net;
1.157 frystyk 70: HTRequest * request;
71: HTTimer * timer;
1.165 frystyk 72: BOOL usedTimer;
1.181 frystyk 73: BOOL repetitive_writing;
1.55 frystyk 74: } http_info;
75:
1.88 frystyk 76: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 77:
1.71 frystyk 78: struct _HTStream {
1.119 frystyk 79: const HTStreamClass * isa;
1.71 frystyk 80: HTStream * target;
1.157 frystyk 81: HTStream * info_target; /* For 100 codes */
1.71 frystyk 82: HTRequest * request;
83: http_info * http;
1.121 frystyk 84: HTEOLState state;
1.71 frystyk 85: BOOL transparent;
1.150 frystyk 86: BOOL cont;
1.81 frystyk 87: char * version; /* Should we save this? */
1.71 frystyk 88: int status;
1.81 frystyk 89: char * reason;
1.71 frystyk 90: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 91: int buflen;
1.146 frystyk 92: int startLen;/* buflen when put_block was called */
1.71 frystyk 93: };
1.21 luotonen 94:
1.123 frystyk 95: struct _HTInputStream {
96: const HTInputStreamClass * isa;
97: };
98:
1.169 frystyk 99: /* How long to wait before writing the body in PUT and POST requests */
100: #define DEFAULT_FIRST_WRITE_DELAY 2000
101: #define DEFAULT_SECOND_WRITE_DELAY 3000
1.181 frystyk 102: #define DEFAULT_REPEAT_WRITE 30
1.169 frystyk 103:
104: PRIVATE ms_t HTFirstWriteDelay = DEFAULT_FIRST_WRITE_DELAY;
105: PRIVATE ms_t HTSecondWriteDelay = DEFAULT_SECOND_WRITE_DELAY;
1.181 frystyk 106: PRIVATE ms_t HTRepeatWrite = DEFAULT_REPEAT_WRITE;
1.169 frystyk 107:
1.147 frystyk 108: #ifdef HT_NO_PIPELINING
1.156 frystyk 109: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_NO_PIPELINING;
1.147 frystyk 110: #else
1.156 frystyk 111: #ifdef HT_MUX
112: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_MUX;
113: #else
114: #ifdef HT_FORCE_10
115: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_FORCE_10;
116: #else
117: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_PIPELINING;
118: #endif
119: #endif
1.147 frystyk 120: #endif
121:
1.71 frystyk 122: /* ------------------------------------------------------------------------- */
123: /* Help Functions */
124: /* ------------------------------------------------------------------------- */
1.21 luotonen 125:
1.94 frystyk 126: /* HTTPCleanup
127: ** -----------
1.55 frystyk 128: ** This function closes the connection and frees memory.
1.94 frystyk 129: ** Returns YES on OK, else NO
1.1 timbl 130: */
1.94 frystyk 131: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 132: {
1.126 frystyk 133: HTNet * net = HTRequest_net(req);
134: http_info * http = (http_info *) HTNet_context(net);
135: HTStream * input = HTRequest_inputStream(req);
1.80 frystyk 136:
1.178 frystyk 137: HTTRACE(PROT_TRACE, "HTTP Clean.. Called with status %d, net %p\n" _ status _ net);
1.144 frystyk 138:
1.164 frystyk 139: if (status == HT_INTERRUPTED) {
140: HTAlertCallback * cbf = HTAlert_find(HT_PROG_INTERRUPT);
141: if (cbf) (*cbf)(req, HT_PROG_INTERRUPT,
142: HT_MSG_NULL, NULL, NULL, NULL);
1.166 frystyk 143: } else if (status == HT_TIMEOUT) {
144: HTAlertCallback * cbf = HTAlert_find(HT_PROG_TIMEOUT);
145: if (cbf) (*cbf)(req, HT_PROG_TIMEOUT,
146: HT_MSG_NULL, NULL, NULL, NULL);
1.164 frystyk 147: }
1.166 frystyk 148:
1.94 frystyk 149: /* Free stream with data TO network */
1.167 frystyk 150: if (input) {
1.187 kahan 151: if (input->isa) {
152: if (status==HT_INTERRUPTED || status==HT_RECOVER_PIPE || status==HT_TIMEOUT)
153: (*input->isa->abort)(input, NULL);
154: else
155: (*input->isa->_free)(input);
156: }
1.126 frystyk 157: HTRequest_setInputStream(req, NULL);
1.94 frystyk 158: }
1.88 frystyk 159:
1.144 frystyk 160: /*
1.157 frystyk 161: ** Remove if we have registered an upload function as a callback
162: */
1.187 kahan 163: if (http && http->timer) {
1.157 frystyk 164: HTTimer_delete(http->timer);
165: http->timer = NULL;
1.189 kahan 166: http->lock = NO;
1.157 frystyk 167: }
168:
169: /*
1.144 frystyk 170: ** Remove the request object and our own context structure for http.
171: */
172: if (status != HT_RECOVER_PIPE) {
1.153 frystyk 173: HTNet_delete(net, status);
1.141 frystyk 174: HT_FREE(http);
175: }
1.94 frystyk 176: return YES;
1.55 frystyk 177: }
178:
1.71 frystyk 179: /*
1.130 frystyk 180: ** Informational 1xx codes are handled separately
1.136 frystyk 181: ** Returns YES if we should continue, NO if we should stop
1.55 frystyk 182: */
1.130 frystyk 183: PRIVATE BOOL HTTPInformation (HTStream * me)
1.55 frystyk 184: {
1.136 frystyk 185: http_info * http = me->http;
1.71 frystyk 186: switch (me->status) {
187:
1.136 frystyk 188: case 100:
1.161 frystyk 189: #if 0
1.136 frystyk 190: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CONTINUE,
191: me->reason, (int) strlen(me->reason),
192: "HTTPInformation");
1.161 frystyk 193: #endif
1.182 frystyk 194: http->result = HT_CONTINUE;
1.136 frystyk 195: return YES;
196: break;
197:
1.130 frystyk 198: case 101:
1.136 frystyk 199: /*
200: ** We consider 101 Switching as a final state and exit this request
201: */
1.130 frystyk 202: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_SWITCHING,
1.127 frystyk 203: me->reason, (int) strlen(me->reason),
1.130 frystyk 204: "HTTPInformation");
1.136 frystyk 205: http->next = HTTP_OK;
206: http->result = HT_UPGRADE;
1.180 frystyk 207: return YES;
1.127 frystyk 208: break;
209:
1.191 ! kirschpi 210: #ifdef HT_DAV
! 211: case 102: /* 102 Processing */
! 212: /*
! 213: ** MKP: 102 Processing indicates that the server is processing the
! 214: ** request, and a final response will be sent later. So the client
! 215: ** should wait for this final response.
! 216: ** MKP: I'm not sure that it will work. Any suggestion??
! 217: */
! 218: http->result = HT_CONTINUE;
! 219: http->next = HTTP_CONNECTED;
! 220: return YES;
! 221: break;
! 222: #endif
! 223:
! 224:
1.130 frystyk 225: default:
1.136 frystyk 226: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
227: (void *) me->buffer, me->buflen, "HTTPNextState");
228: http->next = HTTP_ERROR;
229: http->result = HT_ERROR;
1.127 frystyk 230: break;
1.130 frystyk 231: }
1.136 frystyk 232: return NO;
1.130 frystyk 233: }
234:
1.158 frystyk 235:
236:
1.130 frystyk 237: /*
238: ** This is a big switch handling all HTTP return codes. It puts in any
239: ** appropiate error message and decides whether we should expect data
240: ** or not.
241: */
242: PRIVATE void HTTPNextState (HTStream * me)
243: {
1.134 frystyk 244: http_info * http = me->http;
1.158 frystyk 245: int error_class = me->status / 100;
246: switch (error_class) {
1.127 frystyk 247:
1.158 frystyk 248: case 0: /* 0.9 response */
249: case 2:
1.112 frystyk 250:
1.158 frystyk 251: switch (me->status) {
1.112 frystyk 252:
1.158 frystyk 253: case 201: /* Created */
254: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CREATED,
255: me->reason, (int) strlen(me->reason),
256: "HTTPNextState");
257: http->next = HTTP_OK;
258: http->result = HT_CREATED;
259: break;
260:
261: case 202: /* Accepted */
262: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_ACCEPTED,
263: me->reason, (int) strlen(me->reason),
264: "HTTPNextState");
265: http->next = HTTP_OK;
266: http->result = HT_ACCEPTED;
267: break;
268:
269: case 203: /* Non-authoritative information */
270: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NON_AUTHORITATIVE,
271: me->reason, (int) strlen(me->reason),
272: "HTTPNextState");
273: http->next = HTTP_OK;
274: http->result = HT_LOADED;
275: break;
276:
277: case 204: /* No Response */
278: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NO_CONTENT,
279: me->reason, (int) strlen(me->reason),
280: "HTTPNextState");
281: http->next = HTTP_OK;
282: http->result = HT_NO_DATA;
283: break;
284:
285: case 205: /* Reset Content */
286: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_RESET,
287: me->reason, (int) strlen(me->reason),
288: "HTTPNextState");
289: http->next = HTTP_OK;
290: http->result = HT_RESET_CONTENT;
291: break;
292:
293: case 206: /* Partial Content */
294: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL,
295: me->reason, (int) strlen(me->reason),
296: "HTTPNextState");
297: http->next = HTTP_OK;
298: http->result = HT_PARTIAL_CONTENT;
299: break;
300:
301: case 207: /* Partial Update OK */
302: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL_OK,
303: me->reason, (int) strlen(me->reason),
304: "HTTPNextState");
305: http->next = HTTP_OK;
1.191 ! kirschpi 306: #ifdef HT_DAV /* WebDAV : Multistatus status code */
! 307: http->result = HT_LOADED;
! 308: #else
1.158 frystyk 309: http->result = HT_PARTIAL_CONTENT;
1.191 ! kirschpi 310: #endif
1.158 frystyk 311: break;
312:
313: default:
314: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_OK,
315: me->reason, (int) strlen(me->reason),
316: "HTTPNextState");
317: http->next = HTTP_OK;
318: http->result = HT_LOADED;
319: break;
320: }
1.134 frystyk 321: break;
322:
1.158 frystyk 323: case 3:
1.134 frystyk 324:
1.158 frystyk 325: switch (me->status) {
1.78 frystyk 326:
1.158 frystyk 327: case 301: /* Moved */
328: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MOVED,
329: me->reason, (int) strlen(me->reason),
330: "HTTPNextState");
331: http->next = HTTP_ERROR;
332: http->result = HT_PERM_REDIRECT;
333: break;
334:
335: case 302: /* Found */
336: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_FOUND,
337: me->reason, (int) strlen(me->reason),
338: "HTTPNextState");
339: http->next = HTTP_ERROR;
340: http->result = HT_FOUND;
341: break;
1.55 frystyk 342:
1.158 frystyk 343: case 303: /* Method */
344: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_METHOD,
345: me->reason, (int) strlen(me->reason),
346: "HTTPNextState");
347: http->next = HTTP_ERROR;
348: http->result = HT_SEE_OTHER;
349: break;
350:
351: case 304: /* Not Modified */
352: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NOT_MODIFIED,
353: me->reason, (int) strlen(me->reason),
354: "HTTPNextState");
355: http->next = HTTP_OK;
356: http->result = HT_NOT_MODIFIED;
357: break;
1.134 frystyk 358:
1.158 frystyk 359: case 305: /* Use proxy */
360: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_USE_PROXY,
361: me->reason, (int) strlen(me->reason),
362: "HTTPNextState");
363: http->next = HTTP_ERROR;
364: http->result = HT_USE_PROXY;
365: break;
1.55 frystyk 366:
1.152 frystyk 367: #if 0
1.158 frystyk 368: case 306: /* Use proxy */
369: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PROXY_REDIRECT,
370: me->reason, (int) strlen(me->reason),
371: "HTTPNextState");
372: http->next = HTTP_ERROR;
373: http->result = HT_USE_PROXY;
374: break;
1.152 frystyk 375: #endif
376:
1.158 frystyk 377: case 307: /* Use proxy */
378: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_TEMP_REDIRECT,
379: me->reason, (int) strlen(me->reason),
380: "HTTPNextState");
381: http->next = HTTP_ERROR;
382: http->result = HT_TEMP_REDIRECT;
383: break;
384:
385: default:
386: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MULTIPLE,
387: me->reason, (int) strlen(me->reason),
388: "HTTPNextState");
389: http->next = HTTP_OK;
390: http->result = HT_LOADED;
391: break;
392: }
393: break;
394:
395: case 4:
396:
397: switch (me->status) {
398: case 401:
399: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
400: me->reason, (int) strlen(me->reason), "HTTPNextState");
401: http->next = HTTP_ERROR;
402: http->result = HT_NO_ACCESS;
403: break;
1.152 frystyk 404:
1.158 frystyk 405: case 402: /* Payment required */
406: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
407: me->reason, (int) strlen(me->reason), "HTTPNextState");
408: http->next = HTTP_ERROR;
409: http->result = -402;
410: break;
1.71 frystyk 411:
1.158 frystyk 412: case 403: /* Forbidden */
413: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
414: me->reason, (int) strlen(me->reason), "HTTPNextState");
415: http->next = HTTP_ERROR;
416: http->result = HT_FORBIDDEN;
417: break;
1.55 frystyk 418:
1.158 frystyk 419: case 404: /* Not Found */
420: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
421: me->reason, (int) strlen(me->reason), "HTTPNextState");
422: http->next = HTTP_ERROR;
423: http->result = -404;
424: break;
1.55 frystyk 425:
1.158 frystyk 426: case 405: /* Not Allowed */
427: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
428: me->reason, (int) strlen(me->reason), "HTTPNextState");
429: http->next = HTTP_ERROR;
430: http->result = -405;
431: break;
432:
433: case 406: /* None Acceptable */
434: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
435: me->reason, (int) strlen(me->reason), "HTTPNextState");
436: http->next = HTTP_ERROR;
437: http->result = HT_NOT_ACCEPTABLE;
438: break;
439:
440: case 407: /* Proxy Authentication Required */
441: HTRequest_addError(me->request, ERR_FATAL, NO,HTERR_PROXY_UNAUTHORIZED,
442: me->reason, (int) strlen(me->reason), "HTTPNextState");
443: http->next = HTTP_ERROR;
444: http->result = HT_NO_PROXY_ACCESS;
445: break;
446:
447: case 408: /* Request Timeout */
448: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
449: me->reason, (int) strlen(me->reason), "HTTPNextState");
450: http->next = HTTP_ERROR;
451: http->result = -408;
452: break;
453:
454: case 409: /* Conflict */
455: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_CONFLICT,
456: me->reason, (int) strlen(me->reason), "HTTPNextState");
457: http->next = HTTP_ERROR;
458: http->result = HT_CONFLICT;
459: break;
460:
461: case 410: /* Gone */
462: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GONE,
463: me->reason, (int) strlen(me->reason), "HTTPNextState");
464: http->next = HTTP_ERROR;
465: http->result = -410;
466: break;
467:
468: case 411: /* Length Required */
469: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_LENGTH_REQUIRED,
470: me->reason, (int) strlen(me->reason), "HTTPNextState");
471: http->next = HTTP_ERROR;
472: http->result = HT_LENGTH_REQUIRED;
473: break;
474:
475: case 412: /* Precondition failed */
476: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PRECON_FAILED,
477: me->reason, (int) strlen(me->reason), "HTTPNextState");
478: http->next = HTTP_ERROR;
479: http->result = -412;
480: break;
481:
482: case 413: /* Request entity too large */
483: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TOO_BIG,
484: me->reason, (int) strlen(me->reason), "HTTPNextState");
485: http->next = HTTP_ERROR;
486: http->result = -413;
487: break;
488:
489: case 414: /* Request-URI too long */
490: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_URI_TOO_BIG,
491: me->reason, (int) strlen(me->reason), "HTTPNextState");
492: http->next = HTTP_ERROR;
493: http->result = -414;
494: break;
495:
496: case 415: /* Unsupported */
497: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNSUPPORTED,
498: me->reason, (int) strlen(me->reason), "HTTPNextState");
499: http->next = HTTP_ERROR;
500: http->result = -415;
501: break;
502:
503: case 416: /* Request Range not satisfiable */
504: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_RANGE,
505: me->reason, (int) strlen(me->reason), "HTTPNextState");
506: http->next = HTTP_ERROR;
507: http->result = -416;
508: break;
509:
510: case 417: /* Expectation Failed */
511: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_EXPECTATION_FAILED,
512: me->reason, (int) strlen(me->reason), "HTTPNextState");
513: http->next = HTTP_ERROR;
514: http->result = -417;
515: break;
516:
517: case 418: /* Reauthentication required */
518: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_REAUTH,
519: me->reason, (int) strlen(me->reason), "HTTPNextState");
520: http->next = HTTP_ERROR;
521: http->result = -418;
522: break;
523:
524: case 419: /* Proxy Reauthentication required */
525: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PROXY_REAUTH,
526: me->reason, (int) strlen(me->reason), "HTTPNextState");
527: http->next = HTTP_ERROR;
528: http->result = -419;
529: break;
530:
1.191 ! kirschpi 531: #ifdef HT_DAV
! 532: case 422: /* WebDAV Unprocessable Entity */
! 533: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNPROCESSABLE,
! 534: me->reason, (int) strlen(me->reason), "HTTPNextState");
! 535: http->next = HTTP_ERROR;
! 536: http->result = HT_UNPROCESSABLE;
! 537: break;
! 538:
! 539: case 423: /* WebDAV Locked */
! 540: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_LOCKED,
! 541: me->reason, (int) strlen(me->reason), "HTTPNextState");
! 542: http->next = HTTP_ERROR;
! 543: http->result = HT_LOCKED;
! 544: break;
! 545:
! 546: case 424: /* WebDAV Failed Dependency */
! 547: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_FAILED_DEPENDENCY,
! 548: me->reason, (int) strlen(me->reason), "HTTPNextState");
! 549: http->next = HTTP_ERROR;
! 550: http->result = HT_FAILED_DEPENDENCY;
! 551: break;
! 552: #endif
! 553:
1.158 frystyk 554: default:
555: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
556: me->reason, (int) strlen(me->reason), "HTTPNextState");
557: http->next = HTTP_ERROR;
558: http->result = -400;
559: break;
560: }
1.134 frystyk 561: break;
562:
1.158 frystyk 563: case 5:
1.134 frystyk 564:
1.158 frystyk 565: switch (me->status) {
566: case 501:
567: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
568: me->reason, (int) strlen(me->reason), "HTTPNextState");
569: http->next = HTTP_ERROR;
570: http->result = -501;
571: break;
572:
573: case 502:
574: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
575: me->reason, (int) strlen(me->reason), "HTTPNextState");
576: http->next = HTTP_ERROR;
577: http->result = -502;
578: break;
579:
580: case 503:
581: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_DOWN,
582: me->reason, (int) strlen(me->reason), "HTTPNextState");
583: http->next = HTTP_ERROR;
584:
585: /*
586: ** If Retry-After header is found then return HT_RETRY else HT_ERROR.
587: ** The caller may want to reissue the request at a later point in time.
588: */
589: {
590: HTResponse * response = HTRequest_response(me->request);
591: if (HTResponse_retryTime(response))
592: http->result = HT_RETRY;
593: else
594: http->result = -500;
595: }
596: break;
597:
598: case 504:
599: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
600: me->reason, (int) strlen(me->reason), "HTTPNextState");
601: http->next = HTTP_ERROR;
602: http->result = -504;
603: break;
604:
605: case 505: /* Unsupported protocol version */
606: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_VERSION,
607: me->reason, (int) strlen(me->reason), "HTTPNextState");
608: http->next = HTTP_ERROR;
609: http->result = HT_BAD_VERSION;
610: break;
611:
612: case 506: /* Partial update Not Implemented */
613: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NO_PARTIAL_UPDATE,
614: me->reason, (int) strlen(me->reason), "HTTPNextState");
615: http->next = HTTP_ERROR;
616: http->result = HT_BAD_VERSION;
617: break;
618:
1.191 ! kirschpi 619: #ifdef HT_DAV
! 620: case 507: /* WebDAV Insufficient Storage */
! 621: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_INSUFFICIENT_STORAGE,
! 622: me->reason, (int) strlen(me->reason), "HTTPNextState");
! 623: http->next = HTTP_ERROR;
! 624: http->result = HT_INSUFFICIENT_STORAGE;
! 625: break;
! 626: #endif
! 627:
1.158 frystyk 628: default: /* bad number */
629: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
630: me->reason, (int) strlen(me->reason), "HTTPNextState");
631: http->next = HTTP_ERROR;
632: http->result = -500;
633: break;
1.140 frystyk 634: }
1.78 frystyk 635: break;
636:
1.158 frystyk 637: default:
1.104 frystyk 638: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.158 frystyk 639: (void *) me->buffer, me->buflen, "HTTPNextState");
1.134 frystyk 640: http->next = HTTP_ERROR;
1.155 frystyk 641: http->result = -(me->status);
1.71 frystyk 642: break;
1.55 frystyk 643: }
644: }
645:
1.71 frystyk 646: /* ------------------------------------------------------------------------- */
647: /* HTTP Status Line Stream */
648: /* ------------------------------------------------------------------------- */
1.55 frystyk 649:
1.71 frystyk 650: /*
1.141 frystyk 651: ** Analyze the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 652: ** then create a MIME-stream, else create a Guess stream to find out
653: ** what the 0.9 server is sending. We need to copy the buffer as we don't
654: ** know if we can modify the contents or not.
1.78 frystyk 655: **
656: ** Stream handling is a function of the status code returned from the
657: ** server:
658: ** 200: Use `output_stream' in HTRequest structure
1.94 frystyk 659: ** else: Use `debug_stream' in HTRequest structure
1.80 frystyk 660: **
661: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 662: */
1.157 frystyk 663: PRIVATE int stream_pipe (HTStream * me, int length)
1.56 frystyk 664: {
1.136 frystyk 665: HTRequest * request = me->request;
666: HTNet * net = HTRequest_net(request);
1.123 frystyk 667: HTHost * host = HTNet_host(net);
1.141 frystyk 668:
1.153 frystyk 669: #if 0
670: {
671: char * uri = HTAnchor_address((HTAnchor *) HTRequest_anchor(request));
672: fprintf(stderr, "HTTP header: %s for '%s'\n", me->buffer, uri);
673: HT_FREE(uri);
674: }
675: #endif
676:
1.132 frystyk 677: /*
678: ** Just check for HTTP and not HTTP/ as NCSA server chokes on 1.1 replies
679: ** Thanks to Markku Savela <msa@msa.tte.vtt.fi>
1.141 frystyk 680:
1.132 frystyk 681: */
682: if (strncasecomp(me->buffer, "http", 4)) {
1.80 frystyk 683: int status;
1.136 frystyk 684: HTRequest_addError(request, ERR_INFO, NO, HTERR_HTTP09,
1.80 frystyk 685: (void *) me->buffer, me->buflen, "HTTPStatusStream");
1.136 frystyk 686: me->target = HTStreamStack(WWW_UNKNOWN,
687: HTRequest_outputFormat(request),
688: HTRequest_outputStream(request),
689: request, NO);
1.134 frystyk 690: me->http->next = HTTP_OK;
1.80 frystyk 691: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
692: me->transparent = YES;
1.186 kahan 693: /* JK: in 2000, we don't expect many HTTP/0.9 servers to remain.
694: I removed this line which made the backward change as most of
695: the time we fall here more due to a network or server problem,
696: rather than because we are accessing an old server. */
697: /* HTHost_setVersion(host, HTTP_09); */
1.157 frystyk 698: if (length > 0) HTHost_setConsumed(host, length);
1.178 frystyk 699: HTTRACE(PROT_TRACE, "HTTP Status. `%s\' is probably a broken 1.0 server that doesn't understand HEAD\n" _
1.171 frystyk 700: HTHost_name(host));
701: return HT_ERROR;
1.80 frystyk 702: } else {
1.140 frystyk 703: HTResponse * response = HTRequest_response(request);
1.155 frystyk 704: char * ptr = me->buffer+5; /* Skip the HTTP part */
705: char * vptr = NULL;
706: int major = 0;
707: int minor = 0;
708: me->version = vptr = HTNextField(&ptr);
709: if (vptr) {
710: major = (int) strtol(me->version, &vptr, 10);
711: if (vptr++) minor = strtol(vptr, NULL, 10);
712: }
1.95 frystyk 713:
1.130 frystyk 714: /* Here we want to find out when to use persistent connection */
1.171 frystyk 715: if (major > 1 && major < 100) {
1.178 frystyk 716: HTTRACE(PROT_TRACE, "HTTP Status. Major version number is %d\n" _ major);
1.155 frystyk 717: me->target = HTErrorStream();
1.158 frystyk 718: me->status = 9999;
1.155 frystyk 719: HTTPNextState(me); /* Get next state */
1.158 frystyk 720: return HT_ERROR;
1.155 frystyk 721: } else if (minor <= 0) {
1.171 frystyk 722: if (major > 100) {
1.178 frystyk 723: HTTRACE(PROT_TRACE, "HTTP Status. This is a *BROKEN* HTTP/1.0 server\n");
1.171 frystyk 724: me->status = 200;
725: } else {
1.178 frystyk 726: HTTRACE(PROT_TRACE, "HTTP Status. This is an HTTP/1.0 server\n");
1.171 frystyk 727: me->status = atoi(HTNextField(&ptr));
728: }
1.128 frystyk 729: HTHost_setVersion(host, HTTP_10);
1.155 frystyk 730: } else { /* 1.x, x>0 family */
731: HTHost_setVersion(host, HTTP_11); /* Best we can do */
1.156 frystyk 732: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 733: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with NO PIPELINING\n");
1.147 frystyk 734: HTNet_setPersistent(net, YES, HT_TP_SINGLE);
1.156 frystyk 735: } else if (ConnectionMode & HTTP_11_MUX) {
1.178 frystyk 736: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with MUXING\n");
1.156 frystyk 737: HTNet_setPersistent(net, YES, HT_TP_INTERLEAVE);
1.147 frystyk 738: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 739: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 740: HTHost_setVersion(host, HTTP_10);
741: HTNet_setPersistent(net, NO, HT_TP_SINGLE);
742: } else
743: HTNet_setPersistent(net, YES, HT_TP_PIPELINE);
1.171 frystyk 744: me->status = atoi(HTNextField(&ptr));
1.128 frystyk 745: }
1.95 frystyk 746:
1.81 frystyk 747: me->reason = ptr;
748: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
749: *ptr = '0円';
750: else if ((ptr = strchr(me->reason, '\n')) != NULL)
751: *ptr = '0円';
752:
1.130 frystyk 753: /*
754: ** If it is a 1xx code then find out what to do and return until we
755: ** get the next code. In the case of Upgrade we may not get back here
756: ** at all. If we are uploading an entity then continue doing that
757: */
758: if (me->status/100 == 1) {
1.136 frystyk 759: if (HTTPInformation(me) == YES) {
1.180 frystyk 760: if (me->status==100) {
761: me->buflen = 0;
762: me->state = EOL_BEGIN;
763: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
764: me->info_target = HTStreamStack(WWW_MIME_CONT,
765: HTRequest_debugFormat(request),
766: HTRequest_debugStream(request),
767: request, NO);
768: if (length > 0) HTHost_setConsumed(host, length);
769: return HT_OK;
770: } else if (me->status==101) {
771: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
772: me->target = HTStreamStack(WWW_MIME_UPGRADE,
773: HTRequest_outputFormat(request),
774: HTRequest_outputStream(request),
775: request, NO);
776: if (length > 0) HTHost_setConsumed(host, length);
777: me->transparent = YES;
778: return HT_OK;
779: }
1.103 frystyk 780: }
1.56 frystyk 781: }
1.190 kahan 782:
783: /* 2000/Oct/27 JK: copying the current reason info into the
784: response object. */
785: HTResponse_setReason (response, me->reason);
1.133 frystyk 786:
787: /*
788: ** As we are getting fresh metainformation in the HTTP response,
789: ** we clear the old metainfomation in order not to mix it with the new
790: ** one. This is particularly important for the content-length and the
1.139 frystyk 791: ** like. The TRACE and OPTIONS method just adds to the current
792: ** metainformation so in that case we don't clear the anchor.
1.133 frystyk 793: */
1.191 ! kirschpi 794: #ifdef HT_DAV
! 795: if (me->status==200 || me->status==203 ||
! 796: me->status==207 || me->status==300) {
! 797: #else
1.136 frystyk 798: if (me->status==200 || me->status==203 || me->status==300) {
1.191 ! kirschpi 799: #endif
1.140 frystyk 800: /*
801: ** 200, 203 and 300 are all fully cacheable responses. No byte
802: ** ranges or anything else make life hard in this case.
803: */
1.148 frystyk 804: HTAnchor_clearHeader(HTRequest_anchor(request));
1.166 frystyk 805: HTResponse_setCachable(response, HT_CACHE_ALL);
1.136 frystyk 806: me->target = HTStreamStack(WWW_MIME,
807: HTRequest_outputFormat(request),
808: HTRequest_outputStream(request),
809: request, NO);
1.176 frystyk 810: } else if (me->status==204) {
811: HTResponse_setCachable(response, HT_CACHE_ALL);
812: me->target = HTStreamStack(WWW_MIME_HEAD,
813: HTRequest_debugFormat(request),
814: HTRequest_debugStream(request),
815: request, NO);
1.140 frystyk 816: } else if (me->status==206) {
817: /*
818: ** We got a partial response and now we must check whether
819: ** we issued a cache If-Range request or it was a new
820: ** partial response which we don't have in cache. In the latter
821: ** case, we don't cache the object and in the former we append
822: ** the result to the already existing cache entry.
823: */
824: HTReload reload = HTRequest_reloadMode(request);
825: if (reload == HT_CACHE_RANGE_VALIDATE) {
1.166 frystyk 826: HTResponse_setCachable(response, HT_CACHE_ALL);
1.140 frystyk 827: me->target = HTStreamStack(WWW_MIME_PART,
828: HTRequest_outputFormat(request),
829: HTRequest_outputStream(request),
830: request, NO);
831: } else {
1.149 frystyk 832: HTAnchor_clearHeader(HTRequest_anchor(request));
1.140 frystyk 833: me->target = HTStreamStack(WWW_MIME,
834: HTRequest_outputFormat(request),
835: HTRequest_outputStream(request),
836: request, NO);
837: }
1.176 frystyk 838: } else if (me->status==304) {
839: HTResponse_setCachable(response, HT_CACHE_NOT_MODIFIED);
1.136 frystyk 840: me->target = HTStreamStack(WWW_MIME_HEAD,
841: HTRequest_debugFormat(request),
842: HTRequest_debugStream(request),
843: request, NO);
844: } else if (HTRequest_debugStream(request)) {
1.175 frystyk 845: HTResponse_setCachable(response,
846: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 847: me->target = HTStreamStack(WWW_MIME,
848: HTRequest_debugFormat(request),
849: HTRequest_debugStream(request),
850: request, NO);
851: } else {
1.140 frystyk 852: /*
853: ** We still need to parse the MIME part in order to find any
854: ** valuable meta information which is needed from the response.
855: */
1.175 frystyk 856: HTResponse_setCachable(response,
857: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 858: me->target = HTStreamStack(WWW_MIME,
859: HTRequest_debugFormat(request),
860: HTRequest_debugStream(request),
861: request, NO);
1.133 frystyk 862: }
1.56 frystyk 863: }
1.113 frystyk 864: if (!me->target) me->target = HTErrorStream();
1.81 frystyk 865: HTTPNextState(me); /* Get next state */
1.80 frystyk 866: me->transparent = YES;
1.157 frystyk 867: if (length > 0) HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length);
1.80 frystyk 868: return HT_OK;
1.71 frystyk 869: }
1.56 frystyk 870:
1.80 frystyk 871: /*
872: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
873: ** is found
874: */
1.119 frystyk 875: PRIVATE int HTTPStatus_put_block (HTStream * me, const char * b, int l)
1.71 frystyk 876: {
1.150 frystyk 877: int status = HT_OK;
1.153 frystyk 878: int length = l;
1.146 frystyk 879: me->startLen = me->buflen;
1.80 frystyk 880: while (!me->transparent && l-- > 0) {
1.157 frystyk 881: if (me->info_target) {
882:
883: /* Put data down the 1xx return code parser until we are done. */
884: status = (*me->info_target->isa->put_block)(me->info_target, b, l+1);
885: if (status != HT_CONTINUE) return status;
886:
887: /* Now free the info stream */
888: (*me->info_target->isa->_free)(me->info_target);
889: me->info_target = NULL;
890:
891: /* Update where we are in the stream */
892: l = HTHost_remainingRead(HTNet_host(HTRequest_net(me->request)));
1.163 frystyk 893: b += (length-l);
1.159 frystyk 894: length = l;
1.163 frystyk 895: if (l <= 0) break;
1.157 frystyk 896:
1.80 frystyk 897: } else {
898: *(me->buffer+me->buflen++) = *b;
899: if (me->state == EOL_FCR) {
900: if (*b == LF) { /* Line found */
1.157 frystyk 901: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 902: } else {
903: me->state = EOL_BEGIN;
904: }
905: } else if (*b == CR) {
906: me->state = EOL_FCR;
907: } else if (*b == LF) {
1.157 frystyk 908: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.71 frystyk 909: } else {
1.80 frystyk 910: if (me->buflen >= MAX_STATUS_LEN) {
1.157 frystyk 911: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 912: }
1.71 frystyk 913: }
1.80 frystyk 914: b++;
1.71 frystyk 915: }
1.56 frystyk 916: }
1.153 frystyk 917:
1.159 frystyk 918: if (!me->transparent && length != l)
919: HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length-l);
920:
1.99 frystyk 921: if (l > 0) return PUTBLOCK(b, l);
1.150 frystyk 922: return status;
1.56 frystyk 923: }
924:
1.119 frystyk 925: PRIVATE int HTTPStatus_put_string (HTStream * me, const char * s)
1.71 frystyk 926: {
1.80 frystyk 927: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 928: }
1.56 frystyk 929:
1.100 frystyk 930: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 931: {
1.80 frystyk 932: return HTTPStatus_put_block(me, &c, 1);
933: }
934:
1.100 frystyk 935: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 936: {
937: return (*me->target->isa->flush)(me->target);
1.71 frystyk 938: }
939:
1.100 frystyk 940: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 941: {
1.87 frystyk 942: int status = HT_OK;
943: if (me->target) {
944: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
945: return HT_WOULD_BLOCK;
946: }
1.115 frystyk 947: HT_FREE(me);
1.100 frystyk 948: return status;
1.71 frystyk 949: }
950:
1.104 frystyk 951: PRIVATE int HTTPStatus_abort (HTStream * me, HTList * e)
1.71 frystyk 952: {
953: if (me->target)
1.74 frystyk 954: ABORT_TARGET;
1.115 frystyk 955: HT_FREE(me);
1.178 frystyk 956: HTTRACE(PROT_TRACE, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 957: return HT_ERROR;
1.71 frystyk 958: }
959:
960: /* HTTPStatus Stream
961: ** -----------------
962: */
1.119 frystyk 963: PRIVATE const HTStreamClass HTTPStatusClass =
1.71 frystyk 964: {
965: "HTTPStatus",
1.80 frystyk 966: HTTPStatus_flush,
1.71 frystyk 967: HTTPStatus_free,
968: HTTPStatus_abort,
969: HTTPStatus_put_character,
970: HTTPStatus_put_string,
971: HTTPStatus_put_block
972: };
973:
1.113 frystyk 974: PUBLIC HTStream * HTTPStatus_new (HTRequest * request,
975: void * param,
976: HTFormat input_format,
977: HTFormat output_format,
978: HTStream * output_stream)
1.71 frystyk 979: {
1.115 frystyk 980: HTStream * me;
981: if ((me = (HTStream *) HT_CALLOC(1, sizeof(HTStream))) == NULL)
982: HT_OUTOFMEM("HTTPStatus_new");
1.71 frystyk 983: me->isa = &HTTPStatusClass;
1.113 frystyk 984: if (request) {
1.126 frystyk 985: HTNet * net = HTRequest_net(request);
1.125 frystyk 986: /* Get existing copy */
987: http_info * http = (http_info *) HTNet_context(net);
1.113 frystyk 988: me->request = request;
989: me->http = http;
990: http->next = HTTP_ERROR;
991: me->state = EOL_BEGIN;
992: return me;
993: } else
994: return HTErrorStream();
1.71 frystyk 995: }
996:
997: /* ------------------------------------------------------------------------- */
998:
999: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 1000: ** ==============================
1001: **
1002: ** Given a hypertext address, this routine loads a document.
1003: **
1004: ** On entry,
1005: ** request This is the request structure
1.94 frystyk 1006: ** returns HT_ERROR Error has occured in call back
1007: ** HT_OK Call back was OK
1.55 frystyk 1008: */
1.141 frystyk 1009: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type);
1010:
1011: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request)
1.55 frystyk 1012: {
1013: http_info *http; /* Specific protocol information */
1.112 frystyk 1014: HTParentAnchor *anchor = HTRequest_anchor(request);
1.141 frystyk 1015: HTNet * net = HTRequest_net(request);
1.112 frystyk 1016:
1.94 frystyk 1017: /*
1018: ** Initiate a new http structure and bind to request structure
1019: ** This is actually state HTTP_BEGIN, but it can't be in the state
1020: ** machine as we need the structure first.
1021: */
1.178 frystyk 1022: HTTRACE(PROT_TRACE, "HTTP........ Looking for `%s\'\n" _
1.141 frystyk 1023: HTAnchor_physical(anchor));
1024: if ((http = (http_info *) HT_CALLOC(1, sizeof(http_info))) == NULL)
1025: HT_OUTOFMEM("HTLoadHTTP");
1026: http->net = net;
1.157 frystyk 1027: http->request = request;
1.141 frystyk 1028: HTNet_setContext(net, http);
1029: HTNet_setEventCallback(net, HTTPEvent);
1030: HTNet_setEventParam(net, http); /* callbacks get http* */
1031:
1.157 frystyk 1032: return HTTPEvent(soc, http, HTEvent_BEGIN); /* get it started - ops is ignored */
1033: }
1034:
1035: PRIVATE int FlushPutEvent (HTTimer * timer, void * param, HTEventType type)
1036: {
1037: http_info * http = (http_info *) param;
1038: HTStream * input = HTRequest_inputStream(http->request);
1039: HTPostCallback * pcbf = HTRequest_postCallback(http->request);
1.181 frystyk 1040: int status = HT_ERROR;
1.157 frystyk 1041:
1.165 frystyk 1042: http->usedTimer = YES;
1.160 frystyk 1043: if (timer != http->timer)
1.178 frystyk 1044: HTDEBUGBREAK("HTTP timer %p not in sync\n" _ timer);
1045: HTTRACE(PROT_TRACE, "Uploading... Flushing %p with timer %p\n" _ http _ timer);
1.157 frystyk 1046:
1047: /*
1.181 frystyk 1048: ** Call the callback that will provide the data to save
1049: ** If the callback returns HT_OK then call it again until
1050: ** it returns something else than HT_OK.
1.157 frystyk 1051: */
1.181 frystyk 1052: if (http && input && pcbf) {
1053: status = (*pcbf)(http->request, input);
1054: HTTRACE(PROT_TRACE, "Uploading... Callback returned %d\n" _ status);
1055: }
1.157 frystyk 1056:
1057: /*
1.181 frystyk 1058: ** If the callback returned something else than HT_OK then delete
1059: ** the timer, otherwise update it to a much shorter expiration
1060: ** time so that we can write some more data to the net.
1.157 frystyk 1061: */
1.181 frystyk 1062: if (status != HT_OK) {
1063: HTTimer_delete(http->timer);
1064: http->timer = NULL;
1065: } else if (!http->repetitive_writing) {
1066: http->timer = HTTimer_new(NULL, FlushPutEvent, http, HTRepeatWrite, YES, YES);
1067: http->repetitive_writing = YES;
1068: }
1.157 frystyk 1069: return HT_OK;
1.141 frystyk 1070: }
1071:
1072: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type)
1073: {
1074: http_info * http = (http_info *)pVoid;
1075: int status = HT_ERROR;
1076: HTNet * net = http->net;
1077: HTRequest * request = HTNet_request(net);
1.144 frystyk 1078: HTParentAnchor * anchor = HTRequest_anchor(request);
1079: HTHost * host = HTNet_host(net);
1.141 frystyk 1080:
1081: /*
1.166 frystyk 1082: ** Check whether we have been interrupted or timed out
1.141 frystyk 1083: */
1084: if (type == HTEvent_BEGIN) {
1.134 frystyk 1085: http->next = HTTP_OK;
1086: http->result = HT_ERROR;
1.141 frystyk 1087: } else if (type == HTEvent_CLOSE) {
1.179 frystyk 1088: long read_len = HTNet_bytesRead(net);
1089: long doc_len = HTAnchor_length(anchor);
1090:
1091: /*
1092: ** It is OK to get a close if a) we don't pipeline and b)
1.182 frystyk 1093: ** we have the expected amount of data, and c) we haven't
1094: ** recieved a 100 Continue code. In case we don't
1.179 frystyk 1095: ** know how much data to expect, we must accept it asis.
1096: */
1097: if (HTHost_numberOfOutstandingNetObjects(host) == 1 &&
1.182 frystyk 1098: http->result != HT_CONTINUE && (doc_len<0 || doc_len==read_len)) {
1.183 frystyk 1099: HTTPCleanup(request, http->result); /* Raffaele Sena: was HT_LOADED */
1.179 frystyk 1100: } else {
1101: HTRequest_addError(request, ERR_FATAL, NO, HTERR_INTERRUPTED,
1102: NULL, 0, "HTLoadHTTP");
1103: HTTPCleanup(request, HT_INTERRUPTED);
1104: }
1.166 frystyk 1105: return HT_OK;
1106: } else if (type == HTEvent_TIMEOUT) {
1107: HTRequest_addError(request, ERR_FATAL, NO, HTERR_TIME_OUT,
1108: NULL, 0, "HTLoadHTTP");
1109: HTTPCleanup(request, HT_TIMEOUT);
1.94 frystyk 1110: return HT_OK;
1.141 frystyk 1111: } else if (type == HTEvent_END) {
1112: HTTPCleanup(request, http->result);
1113: return HT_OK;
1114: } else if (type == HTEvent_RESET) {
1115: HTTPCleanup(request, HT_RECOVER_PIPE);
1.145 frystyk 1116: http->state = HTTP_BEGIN;
1.141 frystyk 1117: return HT_OK;
1118: }
1119:
1.71 frystyk 1120: /* Now jump into the machine. We know the state from the previous run */
1121: while (1) {
1122: switch (http->state) {
1.134 frystyk 1123: case HTTP_BEGIN:
1.184 frystyk 1124: status = HTHost_connect(host, net, HTAnchor_physical(anchor));
1.144 frystyk 1125: host = HTNet_host(net);
1.153 frystyk 1126: if (status == HT_OK) {
1.140 frystyk 1127:
1.123 frystyk 1128: /*
1.140 frystyk 1129: ** Check the protocol class to see if we have connected to a
1130: ** the right class of server, in this case HTTP. If we don't
1131: ** know the server then assume a HTTP/1.0
1.123 frystyk 1132: */
1133: {
1134: char * s_class = HTHost_class(host);
1.140 frystyk 1135: if (!s_class) {
1.174 frystyk 1136: if (HTRequest_proxy(request) == NULL) {
1137: HTAssocList * alist = HTRequest_connection(request);
1138: if (!(alist && HTAssocList_findObject(alist, "close")))
1139: HTRequest_addConnection(request, "Keep-Alive", "");
1140: }
1.140 frystyk 1141: HTHost_setClass(host, "http");
1142: } else if (strcasecomp(s_class, "http")) {
1.123 frystyk 1143: HTRequest_addError(request, ERR_FATAL, NO, HTERR_CLASS,
1144: NULL, 0, "HTLoadHTTP");
1145: http->state = HTTP_ERROR;
1146: break;
1147: }
1.95 frystyk 1148: }
1.147 frystyk 1149:
1.156 frystyk 1150: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 1151: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 WITH NO PIPELINING\n");
1.147 frystyk 1152: HTRequest_setFlush(request, YES);
1153: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 1154: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 1155: HTHost_setVersion(host, HTTP_10);
1156: }
1157:
1.151 frystyk 1158: if (HTNet_preemptive(net)) {
1.178 frystyk 1159: HTTRACE(PROT_TRACE, "HTTP........ Force flush on preemptive load\n");
1.151 frystyk 1160: HTRequest_setFlush(request, YES);
1161: }
1162:
1.147 frystyk 1163: /* Jump to next state */
1.144 frystyk 1164: http->state = HTTP_NEED_STREAM;
1.159 frystyk 1165: } else if (status == HT_WOULD_BLOCK || status == HT_PENDING) {
1.144 frystyk 1166: return HT_OK;
1.171 frystyk 1167: } else if (status == HT_NO_HOST) {
1168: http->result = HT_NO_HOST;
1169: http->state = HTTP_ERROR;
1.159 frystyk 1170: } else
1.144 frystyk 1171: http->state = HTTP_ERROR; /* Error or interrupt */
1172: break;
1173:
1174: case HTTP_NEED_STREAM:
1.138 frystyk 1175:
1.144 frystyk 1176: /*
1177: ** Create the stream pipe FROM the channel to the application.
1178: ** The target for the input stream pipe is set up using the
1179: ** stream stack.
1180: */
1.167 frystyk 1181: {
1182: /*
1183: ** during a recovery, we might keep the same HTNet object.
1184: ** if so, reuse it's read stream
1185: */
1.176 frystyk 1186: HTStream * me = HTNet_readStream( net );
1.167 frystyk 1187: if ( me == NULL ) {
1.173 frystyk 1188: me = HTStreamStack(WWW_HTTP,
1189: HTRequest_outputFormat(request),
1190: HTRequest_outputStream(request),
1191: request, YES);
1.178 frystyk 1192: #ifdef HTDEBUG
1.173 frystyk 1193: if (PROT_TRACE) {
1194: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1195: if (htfp) {
1196: me = HTTee(me, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1197: HTTRACE(PROT_TRACE, "HTTP........ Dumping response to `%s\'\n" _ HTTP_OUTPUT);
1.173 frystyk 1198: }
1199: }
1.178 frystyk 1200: #endif /* HTDEBUG */
1.173 frystyk 1201:
1202: HTNet_setReadStream(net, me);
1.167 frystyk 1203: }
1204: HTRequest_setOutputConnected(request, YES);
1.144 frystyk 1205: }
1.127 frystyk 1206:
1.144 frystyk 1207: /*
1208: ** Create the stream pipe TO the channel from the application
1209: ** and hook it up to the request object
1210: */
1211: {
1212: HTChannel * channel = HTHost_channel(host);
1213: HTOutputStream * output = HTChannel_getChannelOStream(channel);
1214: int version = HTHost_version(host);
1215: HTStream * app = NULL;
1216:
1.178 frystyk 1217: #ifdef HTDEBUG
1.144 frystyk 1218: if (PROT_TRACE) {
1.162 frystyk 1219: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1220: if (htfp) {
1.144 frystyk 1221: output = (HTOutputStream *)
1.162 frystyk 1222: HTTee((HTStream *) output, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1223: HTTRACE(PROT_TRACE, "HTTP........ Dumping request to `%s\'\n" _ HTTP_OUTPUT);
1.144 frystyk 1224: }
1225: }
1.178 frystyk 1226: #endif /* HTDEBUG */
1.144 frystyk 1227: app = HTMethod_hasEntity(HTRequest_method(request)) ?
1228: HTMIMERequest_new(request,
1229: HTTPRequest_new(request, (HTStream *) output, NO,
1230: version),
1231: YES) :
1232: HTTPRequest_new(request, (HTStream *) output, YES, version);
1233: HTRequest_setInputStream(request, app);
1234: }
1.88 frystyk 1235:
1.144 frystyk 1236: /*
1237: ** Set up concurrent read/write if this request isn't the
1238: ** source for a PUT or POST. As source we don't start reading
1239: ** before all destinations are ready. If destination then
1240: ** register the input stream and get ready for read
1241: */
1242: if (HTRequest_isDestination(request)) {
1243: HTHost_register(host, net, HTEvent_READ);
1244: HTRequest_linkDestination(request);
1245: }
1246: http->state = HTTP_CONNECTED;
1247: type = HTEvent_WRITE; /* fresh, so try a write */
1.71 frystyk 1248: break;
1249:
1.87 frystyk 1250: /* As we can do simultanous read and write this is now one state */
1.141 frystyk 1251: case HTTP_CONNECTED:
1252: if (type == HTEvent_WRITE) {
1.157 frystyk 1253: HTStream * input = HTRequest_inputStream(request);
1254: HTPostCallback * pcbf = HTRequest_postCallback(request);
1255: status = HTRequest_flush(request) ?
1256: HTHost_forceFlush(host) : (*input->isa->flush)(input);
1257:
1258: /*
1259: ** Check to see if we are uploading something or just a normal
1260: ** GET kind of thing.
1261: */
1.187 kahan 1262:
1263: /*
1264: ** JK: don't continue sending things thru the network
1265: ** if the flush resulted in an error or if the connection
1266: ** is closed
1267: */
1268: if ((status != HT_ERROR) && status != HT_CLOSED) {
1269: if (pcbf) {
1270: if (http->lock == NO) {
1271: int retrys = HTRequest_retrys(request);
1272: ms_t delay = retrys > 3 ? HTSecondWriteDelay : HTFirstWriteDelay;
1273: if (!http->timer && !http->usedTimer) {
1274: http->timer = HTTimer_new(NULL, FlushPutEvent,
1.162 frystyk 1275: http, delay, YES, NO);
1.187 kahan 1276: HTTRACE(PROT_TRACE, "Uploading... Holding %p for %lu ms using time %p\n" _
1.178 frystyk 1277: http _ delay _ http->timer);
1.187 kahan 1278: HTHost_register(host, net, HTEvent_READ);
1279: }
1280: http->lock = YES;
1.157 frystyk 1281: }
1.187 kahan 1282: type = HTEvent_READ;
1283: } else {
1284:
1285: /*
1286: ** Check to see if we can start a new request
1287: ** pending in the host object.
1288: */
1289: HTHost_launchPending(host);
1290: type = HTEvent_READ;
1.157 frystyk 1291: }
1292: }
1.188 kahan 1293:
1.157 frystyk 1294: /* Now check the status code */
1295: if (status == HT_WOULD_BLOCK)
1296: return HT_OK;
1297: else if (status == HT_PAUSE || status == HT_LOADED) {
1298: type = HTEvent_READ;
1.168 frystyk 1299: } else if (status==HT_ERROR)
1.157 frystyk 1300: http->state = HTTP_RECOVER_PIPE;
1301: } else if (type == HTEvent_FLUSH) {
1302: HTStream * input = HTRequest_inputStream(request);
1303: if (input == NULL)
1304: return HT_ERROR;
1305: return (*input->isa->flush)(input);
1306: } else if (type == HTEvent_READ) {
1307: status = HTHost_read(host, net);
1308: if (status == HT_WOULD_BLOCK)
1309: return HT_OK;
1310: else if (status == HT_CONTINUE) {
1.178 frystyk 1311: HTTRACE(PROT_TRACE, "HTTP........ Continuing\n");
1.157 frystyk 1312: http->lock = NO;
1313: continue;
1314: } else if (status==HT_LOADED)
1315: http->state = http->next; /* Jump to next state (OK or ERROR) */
1316: else if (status==HT_CLOSED)
1317: http->state = HTTP_RECOVER_PIPE;
1.167 frystyk 1318: else if (status == HT_ERROR)
1319: http->state = HTTP_KILL_PIPE;
1.157 frystyk 1320: else
1321: http->state = HTTP_ERROR;
1322: } else {
1323: http->state = HTTP_ERROR; /* don't know how to handle OOB */
1324: }
1325: break;
1.141 frystyk 1326:
1.134 frystyk 1327: case HTTP_OK:
1328: HTTPCleanup(request, http->result);
1.94 frystyk 1329: return HT_OK;
1.71 frystyk 1330: break;
1.141 frystyk 1331:
1332: case HTTP_RECOVER_PIPE:
1333: {
1334: /*
1335: ** If this is a persistent connection and we get a close
1336: ** then it is an error and we should recover from it by
1337: ** restarting the pipe line of requests if any
1338: */
1.151 frystyk 1339: if (HTHost_isPersistent(host) && !HTHost_closeNotification(host)) {
1.143 frystyk 1340: if (host == NULL) return HT_ERROR;
1.144 frystyk 1341: HTRequest_setFlush(request, YES);
1.182 frystyk 1342:
1343: /*
1344: ** If we already have recovered more than we want and
1345: ** this call returns NO then simply kill the pipe.
1346: ** Otherwise we may loop forever.
1347: */
1348: if (HTHost_recoverPipe(host) != YES) {
1349: HTRequest_addError(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1350: NULL, 0, "HTTPEvent");
1351: http->state = HTTP_KILL_PIPE;
1352: break;
1353: }
1.144 frystyk 1354: return HT_OK;
1.141 frystyk 1355: } else
1356: http->state = HTTP_OK;
1357: }
1.143 frystyk 1358: break;
1.141 frystyk 1359:
1.167 frystyk 1360: case HTTP_KILL_PIPE:
1361: if (host == NULL) return HT_ERROR;
1362: HTHost_killPipe(host);
1363: return HT_OK;
1364: break;
1365:
1.71 frystyk 1366: case HTTP_ERROR:
1.143 frystyk 1367: HTTPCleanup(request, http->result);
1368: return HT_OK;
1369: break;
1370:
1.141 frystyk 1371: default:
1.178 frystyk 1372: HTDEBUGBREAK("Bad http state %d\n" _ http->state);
1.71 frystyk 1373: }
1374: } /* End of while(1) */
1375: }
1.88 frystyk 1376:
1.147 frystyk 1377: PUBLIC void HTTP_setConnectionMode (HTTPConnectionMode mode)
1378: {
1379: ConnectionMode = mode;
1380: }
1381:
1382: PUBLIC HTTPConnectionMode HTTP_connectionMode (void)
1383: {
1384: return ConnectionMode;
1385: }
1.21 luotonen 1386:
1.169 frystyk 1387: PUBLIC BOOL HTTP_setBodyWriteDelay (ms_t first_try, ms_t second_try)
1388: {
1389: if (first_try > 20 && second_try >= first_try) {
1390: HTFirstWriteDelay = first_try;
1391: HTSecondWriteDelay = second_try;
1392: return YES;
1393: }
1394: return NO;
1395: }
1396:
1397: PUBLIC void HTTP_bodyWriteDelay (ms_t * first_try, ms_t * second_try)
1398: {
1399: *first_try = HTFirstWriteDelay;
1400: *second_try = HTSecondWriteDelay;
1.170 frystyk 1401: }
1402:
Webmaster