Annotation of libwww/Library/src/HTTP.c, revision 1.85
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
6: **
7: ** This module implments the HTTP protocol as a state machine
1.55 frystyk 8: **
9: ** History:
1.59 frystyk 10: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 11: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
12: ** Forward, redirection, error handling and referer field
1.67 duns 13: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 14: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 15: **
1.1 timbl 16: */
17:
1.78 frystyk 18: /* Library include files */
19: #include "tcp.h"
1.1 timbl 20: #include "HTUtils.h"
1.78 frystyk 21: #include "HTString.h"
1.71 frystyk 22: #include "HTParse.h"
1.1 timbl 23: #include "HTTCP.h"
24: #include "HTFormat.h"
1.85 ! frystyk 25: #include "HTSocket.h"
1.2 timbl 26: #include "HTAlert.h"
27: #include "HTMIME.h"
1.21 luotonen 28: #include "HTAccess.h" /* HTRequest */
1.14 luotonen 29: #include "HTAABrow.h" /* Access Authorization */
1.20 timbl 30: #include "HTTee.h" /* Tee off a cache stream */
1.78 frystyk 31: #include "HTFWrite.h" /* Write to cache file */
1.80 frystyk 32: #include "HTWriter.h"
1.54 luotonen 33: #include "HTError.h"
1.55 frystyk 34: #include "HTChunk.h"
1.71 frystyk 35: #include "HTGuess.h"
36: #include "HTThread.h"
1.80 frystyk 37: #include "HTTPReq.h"
1.55 frystyk 38: #include "HTTP.h" /* Implements */
39:
40: /* Macros and other defines */
1.71 frystyk 41: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
42: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
43: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
44: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 45: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 46:
1.59 frystyk 47: /* Type definitions and global variables etc. local to this module */
48: /* This is the local definition of HTRequest->net_info */
49: typedef enum _HTTPState {
1.81 frystyk 50: HTTP_RETRY = -4,
1.71 frystyk 51: HTTP_ERROR = -3,
52: HTTP_NO_DATA = -2,
53: HTTP_GOT_DATA = -1,
54: HTTP_BEGIN = 0,
55: HTTP_NEED_CONNECTION,
56: HTTP_NEED_REQUEST,
57: HTTP_REDIRECTION,
58: HTTP_AA
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60:
61: typedef struct _http_info {
1.78 frystyk 62: SOCKFD sockfd; /* Socket descripter */
1.71 frystyk 63: SockA sock_addr; /* SockA is defined in tcp.h */
1.68 frystyk 64: HTInputSocket * isoc; /* Input buffer */
1.80 frystyk 65: SocAction action; /* Result of the select call */
66: HTStream * target; /* Target stream */
1.71 frystyk 67: int addressCount; /* Attempts if multi-homed host */
68: time_t connecttime; /* Used on multihomed hosts */
69: struct _HTRequest * request; /* Link back to request structure */
1.68 frystyk 70:
1.81 frystyk 71: HTTPState state; /* Current State of the connection */
72: HTTPState next; /* Next state */
1.55 frystyk 73: } http_info;
74:
1.80 frystyk 75: #define MAX_STATUS_LEN 75 /* Max nb of chars to check StatusLine */
1.55 frystyk 76:
1.71 frystyk 77: struct _HTStream {
78: CONST HTStreamClass * isa;
79: HTStream * target;
80: HTRequest * request;
81: http_info * http;
82: HTSocketEOL state;
83: BOOL transparent;
1.81 frystyk 84: char * version; /* Should we save this? */
1.71 frystyk 85: int status;
1.81 frystyk 86: char * reason;
1.71 frystyk 87: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 88: int buflen;
1.71 frystyk 89: };
1.21 luotonen 90:
1.71 frystyk 91: /* ------------------------------------------------------------------------- */
92: /* Help Functions */
93: /* ------------------------------------------------------------------------- */
1.21 luotonen 94:
1.71 frystyk 95: /* HTTPCleanup
1.1 timbl 96: **
1.55 frystyk 97: ** This function closes the connection and frees memory.
1.1 timbl 98: **
1.55 frystyk 99: ** Returns 0 on OK, else -1
1.1 timbl 100: */
1.80 frystyk 101: PRIVATE int HTTPCleanup ARGS2(HTRequest *, req, BOOL, abort)
1.1 timbl 102: {
1.71 frystyk 103: http_info *http;
1.55 frystyk 104: int status = 0;
1.80 frystyk 105: if (!req || !req->net_info) {
1.78 frystyk 106: if (PROT_TRACE) fprintf(TDEST, "HTTPCleanup. Bad argument!\n");
1.55 frystyk 107: status = -1;
108: } else {
1.80 frystyk 109: http = (http_info *) req->net_info;
1.78 frystyk 110: if (http->sockfd != INVSOC) {
1.80 frystyk 111:
112: /* Free stream with data TO network */
1.85 ! frystyk 113: if (http->target) {
! 114: if (!req->PostCallBack) {
! 115: if (abort) {
! 116: (*req->input_stream->isa->abort)(req->input_stream,
! 117: NULL);
! 118: } else {
! 119: (*req->input_stream->isa->_free)(req->input_stream);
! 120: }
! 121: }
! 122:
! 123: /* Free stream with data FROM network */
1.80 frystyk 124: if (abort)
1.85 ! frystyk 125: (*http->target->isa->abort)(http->target, NULL);
1.80 frystyk 126: else
1.85 ! frystyk 127: (*http->target->isa->_free)(http->target);
1.80 frystyk 128: }
1.78 frystyk 129: if (PROT_TRACE)
130: fprintf(TDEST,"HTTP........ Closing socket %d\n",http->sockfd);
1.59 frystyk 131: if ((status = NETCLOSE(http->sockfd)) < 0)
1.78 frystyk 132: HTErrorSysAdd(http->request, ERR_FATAL, socerrno, NO,
133: "NETCLOSE");
1.71 frystyk 134: HTThreadState(http->sockfd, THD_CLOSE);
1.80 frystyk 135: http->sockfd = INVSOC;
1.71 frystyk 136: HTThread_clear((HTNetInfo *) http);
137: }
138: if (http->isoc)
139: HTInputSocket_free(http->isoc);
1.80 frystyk 140: free(http);
141: req->net_info = NULL;
1.55 frystyk 142: }
143: return status;
144: }
145:
146:
1.71 frystyk 147: PRIVATE BOOL HTTPAuthentication ARGS1(HTRequest *, request)
148: {
149: HTAAScheme scheme;
150: HTList *valid_schemes = HTList_new();
151: HTAssocList **scheme_specifics = NULL;
1.76 frystyk 152: char *tmplate = NULL;
1.71 frystyk 153:
154: if (request->WWWAAScheme) {
155: if ((scheme = HTAAScheme_enum(request->WWWAAScheme)) != HTAA_UNKNOWN) {
156: HTList_addObject(valid_schemes, (void *) scheme);
157: if (!scheme_specifics) {
158: int i;
159: scheme_specifics = (HTAssocList**)
160: malloc(HTAA_MAX_SCHEMES * sizeof(HTAssocList*));
161: if (!scheme_specifics)
162: outofmem(__FILE__, "HTTPAuthentication");
163: for (i=0; i < HTAA_MAX_SCHEMES; i++)
164: scheme_specifics[i] = NULL;
165: }
166: scheme_specifics[scheme] = HTAA_parseArgList(request->WWWAARealm);
167: } else if (PROT_TRACE) {
168: HTErrorAdd(request, ERR_INFO, NO, HTERR_UNKNOWN_AA,
169: (void *) request->WWWAAScheme, 0, "HTTPAuthentication");
170: return NO;
171: }
172: }
173: if (request->WWWprotection) {
174: if (PROT_TRACE)
1.78 frystyk 175: fprintf(TDEST, "Protection template set to `%s'\n",
1.71 frystyk 176: request->WWWprotection);
1.76 frystyk 177: StrAllocCopy(tmplate, request->WWWprotection);
1.71 frystyk 178: }
179: request->valid_schemes = valid_schemes;
180: request->scheme_specifics = scheme_specifics;
1.76 frystyk 181: request->prot_template = tmplate;
1.71 frystyk 182: return YES;
183: }
184:
185:
186: /*
187: ** This is a big switch handling all HTTP return codes. It puts in any
188: ** appropiate error message and decides whether we should expect data
1.78 frystyk 189: ** or not.
1.55 frystyk 190: */
1.81 frystyk 191: PRIVATE void HTTPNextState ARGS1(HTStream *, me)
1.55 frystyk 192: {
1.71 frystyk 193: switch (me->status) {
194:
1.78 frystyk 195: case 0: /* 0.9 response */
196: case 200:
197: case 201:
198: case 202:
199: case 203:
200: case 205:
201: case 206:
1.81 frystyk 202: me->http->next = HTTP_GOT_DATA;
1.71 frystyk 203: break;
1.78 frystyk 204:
205: case 204: /* No Response */
1.81 frystyk 206: me->http->next = HTTP_NO_DATA;
1.71 frystyk 207: break;
1.78 frystyk 208:
1.71 frystyk 209: case 301: /* Moved */
210: case 302: /* Found */
1.81 frystyk 211: me->http->next = HTTP_REDIRECTION;
1.71 frystyk 212: break;
1.55 frystyk 213:
1.71 frystyk 214: case 303: /* Method */
215: HTAlert("This client doesn't support automatic redirection of type `Method'");
1.81 frystyk 216: me->http->next = HTTP_ERROR;
1.71 frystyk 217: break;
1.55 frystyk 218:
1.78 frystyk 219: case 400: /* Bad Request */
220: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
1.81 frystyk 221: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
222: me->http->next = HTTP_ERROR;
1.71 frystyk 223: break;
1.70 howcome 224:
1.71 frystyk 225: case 401:
1.78 frystyk 226: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.81 frystyk 227: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
228: me->http->next = HTTP_AA;
1.71 frystyk 229: break;
230:
231: case 402: /* Payment required */
1.78 frystyk 232: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
1.81 frystyk 233: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
234: me->http->next = HTTP_ERROR;
1.71 frystyk 235: break;
1.55 frystyk 236:
1.71 frystyk 237: case 403: /* Forbidden */
1.78 frystyk 238: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
1.81 frystyk 239: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
240: me->http->next = HTTP_ERROR;
1.71 frystyk 241: break;
1.55 frystyk 242:
1.71 frystyk 243: case 404: /* Not Found */
1.78 frystyk 244: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
1.81 frystyk 245: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
246: me->http->next = HTTP_ERROR;
1.71 frystyk 247: break;
248:
1.78 frystyk 249: case 405: /* Not Allowed */
250: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
1.81 frystyk 251: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
252: me->http->next = HTTP_ERROR;
1.78 frystyk 253: break;
254:
255: case 406: /* None Acceptable */
256: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
1.81 frystyk 257: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
258: me->http->next = HTTP_ERROR;
1.78 frystyk 259: break;
260:
261: case 407: /* Proxy Authentication Required */
262: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PROXY,
1.81 frystyk 263: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
264: me->http->next = HTTP_ERROR;
1.78 frystyk 265: break;
266:
267: case 408: /* Request Timeout */
268: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
1.81 frystyk 269: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
270: me->http->next = HTTP_ERROR;
1.78 frystyk 271: break;
272:
1.71 frystyk 273: case 500:
1.78 frystyk 274: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
1.81 frystyk 275: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
276: me->http->next = HTTP_ERROR;
1.78 frystyk 277: break;
278:
1.71 frystyk 279: case 501:
1.78 frystyk 280: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
1.81 frystyk 281: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
282: me->http->next = HTTP_ERROR;
1.78 frystyk 283: break;
284:
285: case 502:
286: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
1.81 frystyk 287: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
288: me->http->next = HTTP_ERROR;
1.78 frystyk 289: break;
290:
291: case 503:
292: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_DOWN,
1.81 frystyk 293: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
294:
295: /* If Retry-After header is found then return HT_RETRY else HT_ERROR */
296: if (me->request->retry_after)
297: me->http->next = HTTP_RETRY;
298: else
299: me->http->next = HTTP_ERROR;
1.78 frystyk 300: break;
301:
302: case 504:
303: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
1.81 frystyk 304: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
305: me->http->next = HTTP_ERROR;
1.71 frystyk 306: break;
1.78 frystyk 307:
1.71 frystyk 308: default: /* bad number */
309: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.80 frystyk 310: (void *) me->buffer, me->buflen, "HTLoadHTTP");
1.81 frystyk 311: me->http->next = HTTP_ERROR;
1.71 frystyk 312: break;
1.55 frystyk 313: }
314: }
315:
1.71 frystyk 316: /* ------------------------------------------------------------------------- */
317: /* HTTP Status Line Stream */
318: /* ------------------------------------------------------------------------- */
1.55 frystyk 319:
1.71 frystyk 320: /*
1.80 frystyk 321: ** Analyse the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 322: ** then create a MIME-stream, else create a Guess stream to find out
323: ** what the 0.9 server is sending. We need to copy the buffer as we don't
324: ** know if we can modify the contents or not.
1.78 frystyk 325: **
326: ** Stream handling is a function of the status code returned from the
327: ** server:
328: ** 200: Use `output_stream' in HTRequest structure
1.80 frystyk 329: ** else: Use `error_stream' in HTRequest structure
330: **
331: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 332: */
1.80 frystyk 333: PRIVATE int stream_pipe ARGS1(HTStream *, me)
1.56 frystyk 334: {
1.71 frystyk 335: HTRequest *req = me->request;
1.80 frystyk 336: if (me->target) {
337: int status = PUTBLOCK(me->buffer, me->buflen);
338: if (status == HT_OK)
339: me->transparent = YES;
340: return status;
341: }
1.81 frystyk 342: if (strncasecomp(me->buffer, "http/", 5)) {
1.80 frystyk 343: int status;
344: HTErrorAdd(req, ERR_INFO, NO, HTERR_HTTP09,
345: (void *) me->buffer, me->buflen, "HTTPStatusStream");
346: me->target = HTGuess_new(req, NULL, WWW_UNKNOWN,
347: req->output_format, req->output_stream);
348: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
349: me->transparent = YES;
350: return status;
351: } else {
1.81 frystyk 352: char *ptr = me->buffer+5; /* Skip the HTTP part */
353: me->version = HTNextField(&ptr);
354: me->status = atoi(HTNextField(&ptr));
355: me->reason = ptr;
356: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
357: *ptr = '0円';
358: else if ((ptr = strchr(me->reason, '\n')) != NULL)
359: *ptr = '0円';
360:
361: /* Set up the streams */
362: if (me->status==200) {
1.80 frystyk 363: HTStream *s;
1.85 ! frystyk 364: if (req->output_format == WWW_SOURCE) {
! 365: me->target = HTMIMEConvert(req, NULL, WWW_MIME,
! 366: req->output_format,
! 367: req->output_stream);
! 368: } else {
! 369: me->target = HTStreamStack(WWW_MIME, req->output_format,
! 370: req->output_stream, req, NO);
1.80 frystyk 371:
1.85 ! frystyk 372: /* howcome: test for return value from HTCacheWriter 12/1/95 */
! 373: if (req->method==METHOD_GET && HTCache_isEnabled() &&
! 374: (s = HTCacheWriter(req, NULL, WWW_MIME, req->output_format,
! 375: req->output_stream))) {
! 376: me->target = HTTee(me->target, s);
! 377: }
1.80 frystyk 378: }
1.71 frystyk 379: } else {
1.81 frystyk 380: me->target = HTMIMEConvert(req, NULL, WWW_MIME, req->error_format,
381: req->error_stream);
1.56 frystyk 382: }
1.80 frystyk 383: if (!me->target)
384: me->target = HTBlackHole(); /* What else */
1.56 frystyk 385: }
1.81 frystyk 386: HTTPNextState(me); /* Get next state */
1.80 frystyk 387: me->transparent = YES;
388: return HT_OK;
1.71 frystyk 389: }
1.56 frystyk 390:
1.80 frystyk 391: /*
392: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
393: ** is found
394: */
395: PRIVATE int HTTPStatus_put_block ARGS3(HTStream *, me, CONST char*, b, int, l)
1.71 frystyk 396: {
1.80 frystyk 397: while (!me->transparent && l-- > 0) {
398: int status;
399: if (me->target) {
400: if ((status = stream_pipe(me)) != HT_OK)
401: return status;
402: } else {
403: *(me->buffer+me->buflen++) = *b;
404: if (me->state == EOL_FCR) {
405: if (*b == LF) { /* Line found */
406: if ((status = stream_pipe(me)) != HT_OK)
407: return status;
408: } else {
409: me->state = EOL_BEGIN;
410: }
411: } else if (*b == CR) {
412: me->state = EOL_FCR;
413: } else if (*b == LF) {
414: if ((status = stream_pipe(me)) != HT_OK)
415: return status;
1.71 frystyk 416: } else {
1.80 frystyk 417: if (me->buflen >= MAX_STATUS_LEN) {
418: if ((status = stream_pipe(me)) != HT_OK)
419: return status;
420: }
1.71 frystyk 421: }
1.80 frystyk 422: b++;
1.71 frystyk 423: }
1.56 frystyk 424: }
1.80 frystyk 425: if (l > 0)
426: return PUTBLOCK(b, l);
427: return HT_OK;
1.56 frystyk 428: }
429:
1.80 frystyk 430: PRIVATE int HTTPStatus_put_string ARGS2(HTStream *, me, CONST char*, s)
1.71 frystyk 431: {
1.80 frystyk 432: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 433: }
1.56 frystyk 434:
1.80 frystyk 435: PRIVATE int HTTPStatus_put_character ARGS2(HTStream *, me, char, c)
1.71 frystyk 436: {
1.80 frystyk 437: return HTTPStatus_put_block(me, &c, 1);
438: }
439:
440: PRIVATE int HTTPStatus_flush ARGS1(HTStream *, me)
441: {
442: return (*me->target->isa->flush)(me->target);
1.71 frystyk 443: }
444:
445: PRIVATE int HTTPStatus_free ARGS1(HTStream *, me)
446: {
447: if (me->target)
448: FREE_TARGET;
449: free(me);
1.80 frystyk 450: return HT_OK;
1.71 frystyk 451: }
452:
453: PRIVATE int HTTPStatus_abort ARGS2(HTStream *, me, HTError, e)
454: {
455: if (me->target)
1.74 frystyk 456: ABORT_TARGET;
1.71 frystyk 457: free(me);
1.74 frystyk 458: if (PROT_TRACE)
1.80 frystyk 459: fprintf(TDEST, "HTTPStatus.. ABORTING...\n");
460: return HT_ERROR;
1.71 frystyk 461: }
462:
463: /* HTTPStatus Stream
464: ** -----------------
465: */
466: PRIVATE CONST HTStreamClass HTTPStatusClass =
467: {
468: "HTTPStatus",
1.80 frystyk 469: HTTPStatus_flush,
1.71 frystyk 470: HTTPStatus_free,
471: HTTPStatus_abort,
472: HTTPStatus_put_character,
473: HTTPStatus_put_string,
474: HTTPStatus_put_block
475: };
476:
477: PUBLIC HTStream * HTTPStatus_new ARGS2(HTRequest *, request,
478: http_info *, http)
479: {
480: HTStream * me = (HTStream *) calloc(1, sizeof(HTStream));
481: if (!me) outofmem(__FILE__, "HTTPStatus_new");
482: me->isa = &HTTPStatusClass;
483: me->request = request;
484: me->http = http;
485: me->state = EOL_BEGIN;
486: return me;
487: }
488:
489: /* ------------------------------------------------------------------------- */
490:
491: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 492: ** ==============================
493: **
494: ** Given a hypertext address, this routine loads a document.
495: **
496: ** On entry,
497: ** request This is the request structure
498: ** On exit,
1.80 frystyk 499: ** returns HT_ERROR Error has occured or interrupted
1.71 frystyk 500: ** HT_WOULD_BLOCK if operation would have blocked
1.58 frystyk 501: ** HT_LOADED if return status 200 OK
502: ** HT_NO_DATA if return status 204 No Response
1.81 frystyk 503: ** HT_RETRY if return status 503 Service Unavail.
1.55 frystyk 504: */
505: PUBLIC int HTLoadHTTP ARGS1 (HTRequest *, request)
506: {
1.71 frystyk 507: int status = HT_ERROR;
508: char *url; /* Gets initialized on every entry */
1.55 frystyk 509: http_info *http; /* Specific protocol information */
510:
511: if (!request || !request->anchor) {
1.78 frystyk 512: if (PROT_TRACE) fprintf(TDEST, "HTLoadHTTP.. Bad argument\n");
1.71 frystyk 513: return HT_ERROR;
1.55 frystyk 514: }
515: url = HTAnchor_physical(request->anchor);
1.17 timbl 516:
1.71 frystyk 517: /* Only do the setup first time through. This is actually state HTTP_BEGIN
518: but it can't be in the state machine as we need the structure first */
519: if (!request->net_info) {
1.22 luotonen 520: /*
1.71 frystyk 521: ** Initiate a new http structure and bind to request structure
522: ** This is actually state HTTP_BEGIN, but it can't be in the state
523: ** machine as we need the structure first.
1.22 luotonen 524: */
1.80 frystyk 525: if (PROT_TRACE) fprintf(TDEST, "HTTP........ Looking for `%s\'\n",url);
1.71 frystyk 526: if ((http = (http_info *) calloc(1, sizeof(http_info))) == NULL)
527: outofmem(__FILE__, "HTLoadHTTP");
1.78 frystyk 528: http->sockfd = INVSOC; /* Invalid socket number */
1.71 frystyk 529: http->request = request;
530: http->state = HTTP_BEGIN;
1.85 ! frystyk 531: http->next = HTTP_ERROR;
1.71 frystyk 532: request->net_info = (HTNetInfo *) http;
533: HTThread_new((HTNetInfo *) http);
1.80 frystyk 534: request->input_stream = HTTPRequest_new(request,request->input_stream);
1.85 ! frystyk 535: } else {
1.71 frystyk 536: http = (http_info *) request->net_info; /* Get existing copy */
1.85 ! frystyk 537: if (http->sockfd != INVSOC && HTThreadIntr(http->sockfd))
! 538: http->state = HTTP_ERROR;
! 539: }
1.71 frystyk 540:
541: /* Now jump into the machine. We know the state from the previous run */
542: while (1) {
543: switch (http->state) {
544: case HTTP_BEGIN:
545: /*
546: ** Compose authorization information (this was moved here
547: ** from after the making of the connection so that the connection
548: ** wouldn't have to wait while prompting username and password
549: ** from the user). -- AL 13.10.93
550: */
551: HTAA_composeAuth(request);
552: if (PROT_TRACE) {
553: if (request->authorization)
1.78 frystyk 554: fprintf(TDEST, "HTTP........ Sending Authorization: %s\n",
1.71 frystyk 555: request->authorization);
556: else
1.78 frystyk 557: fprintf(TDEST,
1.71 frystyk 558: "HTTP........ Not sending authorization (yet)\n");
559: }
560: http->state = HTTP_NEED_CONNECTION;
561: break;
562:
563: case HTTP_NEED_CONNECTION: /* Now let's set up a connection */
564: status = HTDoConnect((HTNetInfo *) http, url, TCP_PORT,
565: NULL, NO);
1.80 frystyk 566: if (status == HT_OK) {
1.71 frystyk 567: if (PROT_TRACE)
1.78 frystyk 568: fprintf(TDEST, "HTTP........ Connected, socket %d\n",
1.71 frystyk 569: http->sockfd);
1.80 frystyk 570:
571: /* Set up read buffer, streams and concurrent read/write */
1.71 frystyk 572: http->isoc = HTInputSocket_new(http->sockfd);
1.80 frystyk 573: request->input_stream->target=HTWriter_new(http->sockfd, YES);
574: http->target = HTImProxy ?
575: request->output_stream : HTTPStatus_new(request, http);
1.85 ! frystyk 576: HTThreadState(http->sockfd, THD_SET_READ);
1.71 frystyk 577: http->state = HTTP_NEED_REQUEST;
578: } else if (status == HT_WOULD_BLOCK)
579: return status;
580: else
581: http->state = HTTP_ERROR; /* Error or interrupt */
582: break;
583:
1.80 frystyk 584: /* As we can do simultanous read and write this is now 1 state */
585: case HTTP_NEED_REQUEST:
586: if (http->action == SOC_WRITE) {
587:
588: /* Find the right way to call back */
589: if (request->CopyRequest) {
590: if (!HTAnchor_headerParsed(request->CopyRequest->anchor))
591: return HT_WOULD_BLOCK;
592: status = request->PostCallBack(request->CopyRequest,
593: request->input_stream);
594: } else if (request->PostCallBack) {
595: status = request->PostCallBack(request,
596: request->input_stream);
597: } else {
598: status = (*request->input_stream->isa->flush)
599: (request->input_stream);
600: }
1.71 frystyk 601: if (status == HT_WOULD_BLOCK)
1.80 frystyk 602: return HT_WOULD_BLOCK;
603: else if (status == HT_INTERRUPTED)
604: http->state = HTTP_ERROR;
1.71 frystyk 605: else
1.80 frystyk 606: http->action = SOC_READ;
607: } else if (http->action == SOC_READ) {
608: status = HTSocketRead(request, http->target);
609: if (status == HT_WOULD_BLOCK)
610: return HT_WOULD_BLOCK;
611: else if (status == HT_INTERRUPTED)
1.71 frystyk 612: http->state = HTTP_ERROR;
1.85 ! frystyk 613: #if 0
1.80 frystyk 614: else if (status == HT_LOADED) {
1.81 frystyk 615: http->state = http->next; /* Jump to next state */
1.80 frystyk 616: } else
617: http->state = HTTP_ERROR;
1.85 ! frystyk 618: #else
! 619: else {
! 620: if (PROT_TRACE)
! 621: fprintf(TDEST, "TESTTESTTEST Jumpingto bext state\n");
! 622: http->state = http->next; /* Jump to next state */
! 623: }
! 624: #endif
1.80 frystyk 625: } else
1.78 frystyk 626: http->state = HTTP_ERROR;
1.71 frystyk 627: break;
1.80 frystyk 628:
629: case HTTP_REDIRECTION:
1.71 frystyk 630: if (request->redirect) {
631: HTAnchor *anchor;
632: if (status == 301) {
633: HTErrorAdd(request, ERR_INFO, NO, HTERR_MOVED,
634: (void *) request->redirect,
635: (int) strlen(request->redirect), "HTLoadHTTP");
636: } else if (status == 302) {
637: HTErrorAdd(request, ERR_INFO, NO, HTERR_FOUND,
638: (void *) request->redirect,
639: (int) strlen(request->redirect), "HTLoadHTTP");
1.55 frystyk 640: }
1.71 frystyk 641: anchor = HTAnchor_findAddress(request->redirect);
642: if (++request->redirections < HTMaxRedirections) {
1.80 frystyk 643: HTTPCleanup(request, NO);
1.71 frystyk 644: return HTLoadAnchorRecursive((HTAnchor *) anchor, request);
645: } else {
646: HTErrorAdd(request, ERR_FATAL, NO, HTERR_MAX_REDIRECT,
1.58 frystyk 647: NULL, 0, "HTLoadHTTP");
1.71 frystyk 648: http->state = HTTP_ERROR;
1.58 frystyk 649: }
1.71 frystyk 650: } else {
651: HTErrorAdd(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
652: NULL, 0, "HTLoadHTTP");
653: http->state = HTTP_ERROR;
654: }
655: break;
1.80 frystyk 656:
1.71 frystyk 657: case HTTP_AA:
1.80 frystyk 658: HTTPCleanup(request, NO); /* Close connection */
1.85 ! frystyk 659:
! 660: /*
! 661: ** We must also kill the source request. As now the whole stream
! 662: ** get's freed (this input stream is identical to the copyrequest
! 663: ** output stream, we must re-initialize the input_stream
! 664: */
! 665: if (request->CopyRequest) {
! 666: HTThread_kill(request->CopyRequest->net_info);
! 667: request->input_stream = NULL;
! 668: }
! 669:
1.71 frystyk 670: if (HTTPAuthentication(request) == YES &&
671: HTAA_retryWithAuth(request) == YES) {
1.85 ! frystyk 672:
! 673: /* We have to figure out where we were called from */
! 674: if (request->CopyRequest) {
! 675: return HTCopyAnchor((HTAnchor *)
! 676: request->CopyRequest->anchor,
! 677: request->CopyRequest,
! 678: request->anchor,
! 679: request);
! 680: } else if (request->PostCallBack) {
! 681: #if 0
! 682: return HTUploadAnchor((HTAnchor *)request->anchor,request);
! 683: #endif
! 684: } else {
! 685: return HTLoadAnchor((HTAnchor *) request->anchor, request);
! 686: }
1.71 frystyk 687: } else {
688: char *unescaped = NULL;
689: StrAllocCopy(unescaped, url);
690: HTUnEscape(unescaped);
691: HTErrorAdd(request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
692: (void *) unescaped,
693: (int) strlen(unescaped), "HTLoadHTTP");
694: free(unescaped);
1.80 frystyk 695: return HT_ERROR;
1.71 frystyk 696: }
697: break;
1.80 frystyk 698:
1.71 frystyk 699: case HTTP_GOT_DATA:
1.80 frystyk 700: HTTPCleanup(request, NO);
1.71 frystyk 701: return HT_LOADED;
702: break;
703:
704: case HTTP_NO_DATA:
1.80 frystyk 705: HTTPCleanup(request, NO);
1.71 frystyk 706: return HT_NO_DATA;
707: break;
1.80 frystyk 708:
1.81 frystyk 709: case HTTP_RETRY:
710: HTTPCleanup(request, YES);
711: return HT_RETRY;
712: break;
713:
1.71 frystyk 714: case HTTP_ERROR:
1.80 frystyk 715: HTTPCleanup(request, YES);
1.71 frystyk 716: return HT_ERROR;
717: break;
718: }
719: } /* End of while(1) */
720: }
721:
722: /* Protocol descriptor */
723:
724: GLOBALDEF PUBLIC HTProtocol HTTP = {
725: "http", SOC_NON_BLOCK, HTLoadHTTP, NULL, NULL
726: };
1.21 luotonen 727:
Webmaster