[BACK] Return to HTTP.c CVS log [TXT] [DIR] Up to [Public] / libwww / Library / src

Annotation of libwww/Library/src/HTTP.c, revision 1.88

1.74 frystyk 1: /*                                   HTTP.c
 2: **   MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: **   (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: **   Please first read the full copyright statement in the file COPYRIGH.
 6: **
 7: **   This module implments the HTTP protocol as a state machine
1.55 frystyk 8: **
 9: ** History:
1.59 frystyk 10: **  < May 24 94 ??  Unknown - but obviously written
1.56 frystyk 11: **   May 24 94 HF  Made reentrent and cleaned up a bit. Implemented
 12: **           Forward, redirection, error handling and referer field
1.67 duns 13: **   8 Jul 94 FM  Insulate free() from _free structure element.
1.71 frystyk 14: **   Jul 94 HFN   Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 15: **
1.1 timbl 16: */
 17: 
1.78 frystyk 18: /* Library include files */
 19: #include "tcp.h"
1.1 timbl 20: #include "HTUtils.h"
1.78 frystyk 21: #include "HTString.h"
1.71 frystyk 22: #include "HTParse.h"
1.1 timbl 23: #include "HTTCP.h"
 24: #include "HTFormat.h"
1.85 frystyk 25: #include "HTSocket.h"
1.2 timbl 26: #include "HTAlert.h"
 27: #include "HTMIME.h"
1.21 luotonen 28: #include "HTAccess.h"     /* HTRequest */
1.14 luotonen 29: #include "HTAABrow.h"     /* Access Authorization */
1.20 timbl 30: #include "HTTee.h"       /* Tee off a cache stream */
1.78 frystyk 31: #include "HTFWrite.h"     /* Write to cache file */
1.80 frystyk 32: #include "HTWriter.h"
1.54 luotonen 33: #include "HTError.h"
1.55 frystyk 34: #include "HTChunk.h"
1.71 frystyk 35: #include "HTGuess.h"
 36: #include "HTThread.h"
1.80 frystyk 37: #include "HTTPReq.h"
1.55 frystyk 38: #include "HTTP.h"                       /* Implements */
 39: 
 40: /* Macros and other defines */
1.71 frystyk 41: #define PUTC(c)        (*me->target->isa->put_character)(me->target, c)
 42: #define PUTS(s)        (*me->target->isa->put_string)(me->target, s)
 43: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
 44: #define FREE_TARGET  (*me->target->isa->_free)(me->target)
1.74 frystyk 45: #define ABORT_TARGET  (*me->target->isa->abort)(me->target, e)
1.2 timbl 46: 
1.59 frystyk 47: /* Type definitions and global variables etc. local to this module */
 48: /* This is the local definition of HTRequest->net_info */
 49: typedef enum _HTTPState {
1.81 frystyk 50:   HTTP_RETRY     = -4,
1.71 frystyk 51:   HTTP_ERROR     = -3,
 52:   HTTP_NO_DATA    = -2,
 53:   HTTP_GOT_DATA   = -1,
 54:   HTTP_BEGIN     = 0,
 55:   HTTP_NEED_CONNECTION,
 56:   HTTP_NEED_REQUEST,
 57:   HTTP_REDIRECTION,
 58:   HTTP_AA
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60: 
 61: typedef struct _http_info {
1.78 frystyk 62:   SOCKFD       sockfd;             /* Socket descripter */
1.71 frystyk 63:   SockA       sock_addr;       /* SockA is defined in tcp.h */
1.68 frystyk 64:   HTInputSocket *  isoc;                /* Input buffer */
1.80 frystyk 65:   SocAction     action;         /* Result of the select call */
 66:   HTStream *     target;               /* Target stream */
1.71 frystyk 67:   int        addressCount;    /* Attempts if multi-homed host */
 68:   time_t       connecttime;       /* Used on multihomed hosts */
 69:   struct _HTRequest *    request;      /* Link back to request structure */
1.68 frystyk 70: 
1.81 frystyk 71:   HTTPState     state;      /* Current State of the connection */
 72:   HTTPState     next;                 /* Next state */
1.55 frystyk 73: } http_info;
 74: 
1.88 ! frystyk 75: #define MAX_STATUS_LEN     100  /* Max nb of chars to check StatusLine */
1.55 frystyk 76: 
1.71 frystyk 77: struct _HTStream {
 78:   CONST HTStreamClass *   isa;
 79:   HTStream *         target;
 80:   HTRequest *            request;
 81:   http_info *            http;
 82:   HTSocketEOL            state;
 83:   BOOL            transparent;
1.81 frystyk 84:   char *           version;       /* Should we save this? */
1.71 frystyk 85:   int                status;
1.81 frystyk 86:   char *           reason;
1.71 frystyk 87:   char            buffer[MAX_STATUS_LEN+1];
1.80 frystyk 88:   int                buflen;
1.71 frystyk 89: };
1.21 luotonen 90: 
1.71 frystyk 91: /* ------------------------------------------------------------------------- */
 92: /*                Help Functions               */
 93: /* ------------------------------------------------------------------------- */
1.21 luotonen 94: 
1.71 frystyk 95: /*                                 HTTPCleanup
1.1 timbl 96: **
1.55 frystyk 97: **   This function closes the connection and frees memory.
1.1 timbl 98: **
1.55 frystyk 99: **   Returns 0 on OK, else -1
1.1 timbl 100: */
1.80 frystyk 101: PRIVATE int HTTPCleanup ARGS2(HTRequest *, req, BOOL, abort)
1.1 timbl 102: {
1.71 frystyk 103:   http_info *http;
1.55 frystyk 104:   int status = 0;
1.80 frystyk 105:   if (!req || !req->net_info) {
1.78 frystyk 106:    if (PROT_TRACE) fprintf(TDEST, "HTTPCleanup. Bad argument!\n");
1.55 frystyk 107:    status = -1;
 108:   } else {
1.80 frystyk 109:    http = (http_info *) req->net_info;
1.78 frystyk 110:    if (http->sockfd != INVSOC) {
1.80 frystyk 111: 
1.85 frystyk 112:      if (http->target) {
1.88 ! frystyk 113: 
 ! 114:        /* Free stream with data TO network */
 ! 115:        if (!HTRequest_isDestination(req)) {
 ! 116:          if (abort)
 ! 117:            (*req->input_stream->isa->abort)(req->input_stream, NULL);
 ! 118:          else
1.85 frystyk 119:            (*req->input_stream->isa->_free)(req->input_stream);
 120:        }
1.88 ! frystyk 121: 
1.85 frystyk 122:        /* Free stream with data FROM network */
1.80 frystyk 123:        if (abort)
1.85 frystyk 124:          (*http->target->isa->abort)(http->target, NULL);
1.80 frystyk 125:        else
1.85 frystyk 126:          (*http->target->isa->_free)(http->target);
1.80 frystyk 127:      }
1.78 frystyk 128:      if (PROT_TRACE)
 129:        fprintf(TDEST,"HTTP........ Closing socket %d\n",http->sockfd);
1.59 frystyk 130:      if ((status = NETCLOSE(http->sockfd)) < 0)
1.78 frystyk 131:        HTErrorSysAdd(http->request, ERR_FATAL, socerrno, NO,
 132:               "NETCLOSE");
1.71 frystyk 133:      HTThreadState(http->sockfd, THD_CLOSE);
1.80 frystyk 134:      http->sockfd = INVSOC;
1.71 frystyk 135:    }
1.88 ! frystyk 136:    HTThread_clear((HTNetInfo *) http);
1.71 frystyk 137:    if (http->isoc)
 138:      HTInputSocket_free(http->isoc);
1.80 frystyk 139:    free(http);
 140:    req->net_info = NULL;
1.55 frystyk 141:   } 
 142:   return status;
 143: }
 144: 
 145: 
1.71 frystyk 146: PRIVATE BOOL HTTPAuthentication ARGS1(HTRequest *, request)
 147: {
 148:   HTAAScheme scheme;
 149:   HTList *valid_schemes = HTList_new();
 150:   HTAssocList **scheme_specifics = NULL;
1.76 frystyk 151:   char *tmplate = NULL;
1.71 frystyk 152: 
 153:   if (request->WWWAAScheme) {
 154:    if ((scheme = HTAAScheme_enum(request->WWWAAScheme)) != HTAA_UNKNOWN) {
 155:      HTList_addObject(valid_schemes, (void *) scheme);
 156:      if (!scheme_specifics) {
 157:        int i;
 158:        scheme_specifics = (HTAssocList**)
 159:          malloc(HTAA_MAX_SCHEMES * sizeof(HTAssocList*));
 160:        if (!scheme_specifics)
 161:          outofmem(__FILE__, "HTTPAuthentication");
 162:        for (i=0; i < HTAA_MAX_SCHEMES; i++)
 163:          scheme_specifics[i] = NULL;
 164:      }
 165:      scheme_specifics[scheme] = HTAA_parseArgList(request->WWWAARealm);
 166:    } else if (PROT_TRACE) {
 167:      HTErrorAdd(request, ERR_INFO, NO, HTERR_UNKNOWN_AA,
 168:            (void *) request->WWWAAScheme, 0, "HTTPAuthentication");
 169:      return NO;
 170:    }
 171:   }
 172:   if (request->WWWprotection) {
 173:    if (PROT_TRACE)
1.78 frystyk 174:      fprintf(TDEST, "Protection template set to `%s'\n",
1.71 frystyk 175:          request->WWWprotection);
1.76 frystyk 176:    StrAllocCopy(tmplate, request->WWWprotection);
1.71 frystyk 177:   }
 178:   request->valid_schemes = valid_schemes;
 179:   request->scheme_specifics = scheme_specifics;
1.76 frystyk 180:   request->prot_template = tmplate;
1.71 frystyk 181:   return YES;
 182: }
 183: 
 184: 
 185: /*
 186: **   This is a big switch handling all HTTP return codes. It puts in any
 187: **   appropiate error message and decides whether we should expect data
1.78 frystyk 188: **   or not.
1.55 frystyk 189: */
1.81 frystyk 190: PRIVATE void HTTPNextState ARGS1(HTStream *, me)
1.55 frystyk 191: {
1.71 frystyk 192:   switch (me->status) {
 193: 
1.78 frystyk 194:    case 0:                        /* 0.9 response */
 195:    case 200:
 196:    case 201:
 197:    case 202:
 198:    case 203:
1.81 frystyk 199:    me->http->next = HTTP_GOT_DATA;
1.71 frystyk 200:    break;
1.78 frystyk 201: 
 202:    case 204:                           /* No Response */
1.81 frystyk 203:    me->http->next = HTTP_NO_DATA;
1.71 frystyk 204:    break;
1.78 frystyk 205: 
1.71 frystyk 206:    case 301:                              /* Moved */
 207:    case 302:                              /* Found */
1.81 frystyk 208:    me->http->next = HTTP_REDIRECTION;
1.71 frystyk 209:    break;
1.55 frystyk 210:    
1.71 frystyk 211:    case 303:                              /* Method */
 212:    HTAlert("This client doesn't support automatic redirection of type `Method'");
1.81 frystyk 213:    me->http->next = HTTP_ERROR;
1.71 frystyk 214:    break;
1.55 frystyk 215:    
1.78 frystyk 216:    case 400:                           /* Bad Request */
 217:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
1.81 frystyk 218:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 219:    me->http->next = HTTP_ERROR;
1.71 frystyk 220:    break;
1.70 howcome 221: 
1.71 frystyk 222:    case 401:
1.78 frystyk 223:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.81 frystyk 224:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 225:    me->http->next = HTTP_AA;
1.71 frystyk 226:    break;
 227:    
 228:    case 402:                         /* Payment required */
1.78 frystyk 229:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
1.81 frystyk 230:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 231:    me->http->next = HTTP_ERROR;
1.71 frystyk 232:    break;
1.55 frystyk 233:    
1.71 frystyk 234:    case 403:                            /* Forbidden */
1.78 frystyk 235:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
1.81 frystyk 236:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 237:    me->http->next = HTTP_ERROR;
1.71 frystyk 238:    break;
1.55 frystyk 239:    
1.71 frystyk 240:    case 404:                            /* Not Found */
1.78 frystyk 241:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
1.81 frystyk 242:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 243:    me->http->next = HTTP_ERROR;
1.71 frystyk 244:    break;
 245:    
1.78 frystyk 246:    case 405:                           /* Not Allowed */
 247:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
1.81 frystyk 248:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 249:    me->http->next = HTTP_ERROR;
1.78 frystyk 250:    break;
 251: 
 252:    case 406:                         /* None Acceptable */
 253:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
1.81 frystyk 254:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 255:    me->http->next = HTTP_ERROR;
1.78 frystyk 256:    break;
 257: 
 258:    case 407:                  /* Proxy Authentication Required */
 259:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PROXY,
1.81 frystyk 260:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 261:    me->http->next = HTTP_ERROR;
1.78 frystyk 262:    break;
 263: 
 264:    case 408:                         /* Request Timeout */
 265:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
1.81 frystyk 266:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 267:    me->http->next = HTTP_ERROR;
1.78 frystyk 268:    break;
 269: 
1.71 frystyk 270:    case 500:
1.78 frystyk 271:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
1.81 frystyk 272:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 273:    me->http->next = HTTP_ERROR;
1.78 frystyk 274:    break;
 275:    
1.71 frystyk 276:    case 501:
1.78 frystyk 277:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
1.81 frystyk 278:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 279:    me->http->next = HTTP_ERROR;
1.78 frystyk 280:    break;
 281: 
 282:    case 502:
 283:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
1.81 frystyk 284:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 285:    me->http->next = HTTP_ERROR;
1.78 frystyk 286:    break;
 287: 
 288:    case 503:
 289:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_DOWN,
1.81 frystyk 290:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 291: 
 292:    /* If Retry-After header is found then return HT_RETRY else HT_ERROR */
 293:    if (me->request->retry_after)
 294:      me->http->next = HTTP_RETRY;
 295:    else
 296:      me->http->next = HTTP_ERROR;
1.78 frystyk 297:    break;
 298: 
 299:    case 504:
 300:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
1.81 frystyk 301:          me->reason, (int) strlen(me->reason), "HTLoadHTTP");
 302:     me->http->next = HTTP_ERROR;
1.71 frystyk 303:    break;
1.78 frystyk 304: 
1.71 frystyk 305:    default:                        /* bad number */
 306:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.80 frystyk 307:          (void *) me->buffer, me->buflen, "HTLoadHTTP");
1.81 frystyk 308:    me->http->next = HTTP_ERROR;
1.71 frystyk 309:    break;
1.55 frystyk 310:   }
 311: }
 312: 
1.71 frystyk 313: /* ------------------------------------------------------------------------- */
 314: /*             HTTP Status Line Stream             */
 315: /* ------------------------------------------------------------------------- */
1.55 frystyk 316: 
1.71 frystyk 317: /*
1.80 frystyk 318: **   Analyse the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 319: **   then create a MIME-stream, else create a Guess stream to find out
 320: **   what the 0.9 server is sending. We need to copy the buffer as we don't
 321: **   know if we can modify the contents or not.
1.78 frystyk 322: **
 323: **   Stream handling is a function of the status code returned from the 
 324: **   server:
 325: **       200:   Use `output_stream' in HTRequest structure
1.80 frystyk 326: **       else:  Use `error_stream' in HTRequest structure
 327: **
 328: **   Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 329: */
1.80 frystyk 330: PRIVATE int stream_pipe ARGS1(HTStream *, me)
1.56 frystyk 331: {
1.71 frystyk 332:   HTRequest *req = me->request;
1.80 frystyk 333:   if (me->target) {
 334:    int status = PUTBLOCK(me->buffer, me->buflen);
 335:    if (status == HT_OK)
 336:      me->transparent = YES;
 337:    return status;
1.88 ! frystyk 338:   } else if (HTRequest_isSource(req) && !req->output_stream) {
 ! 339:    /*
 ! 340:    ** We need to wait for the destinations to get ready
 ! 341:    */
 ! 342:    return HT_WOULD_BLOCK;
1.80 frystyk 343:   }
1.88 ! frystyk 344:    
1.81 frystyk 345:   if (strncasecomp(me->buffer, "http/", 5)) {
1.80 frystyk 346:    int status;
 347:    HTErrorAdd(req, ERR_INFO, NO, HTERR_HTTP09,
 348:          (void *) me->buffer, me->buflen, "HTTPStatusStream");
 349:    me->target = HTGuess_new(req, NULL, WWW_UNKNOWN,
 350:                 req->output_format, req->output_stream);
1.88 ! frystyk 351:    me->http->next = HTTP_GOT_DATA;
1.80 frystyk 352:    if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
 353:      me->transparent = YES;
 354:    return status;
 355:   } else {
1.81 frystyk 356:    char *ptr = me->buffer+5;           /* Skip the HTTP part */
 357:    me->version = HTNextField(&ptr);
 358:    me->status = atoi(HTNextField(&ptr));
 359:    me->reason = ptr;
 360:    if ((ptr = strchr(me->reason, '\r')) != NULL)   /* Strip \r and \n */
 361:      *ptr = '0円';
 362:    else if ((ptr = strchr(me->reason, '\n')) != NULL)
 363:      *ptr = '0円';
 364: 
 365:    /* Set up the streams */
 366:    if (me->status==200) {
1.80 frystyk 367:      HTStream *s;
1.85 frystyk 368:      if (req->output_format == WWW_SOURCE) {
 369:        me->target = HTMIMEConvert(req, NULL, WWW_MIME,
 370:                      req->output_format,
 371:                      req->output_stream);
 372:      } else {
 373:        me->target = HTStreamStack(WWW_MIME, req->output_format,
 374:                      req->output_stream, req, NO);
1.80 frystyk 375:      
1.85 frystyk 376:        /* howcome: test for return value from HTCacheWriter 12/1/95 */
 377:        if (req->method==METHOD_GET && HTCache_isEnabled() &&
 378:          (s = HTCacheWriter(req, NULL, WWW_MIME, req->output_format,
 379:                    req->output_stream))) {
 380:          me->target = HTTee(me->target, s);
 381:        }
1.80 frystyk 382:      }
1.71 frystyk 383:    } else {
1.81 frystyk 384:      me->target = HTMIMEConvert(req, NULL, WWW_MIME, req->error_format,
 385:                    req->error_stream);
1.56 frystyk 386:    }
1.80 frystyk 387:    if (!me->target)
 388:      me->target = HTBlackHole();             /* What else */
1.56 frystyk 389:   }
1.81 frystyk 390:   HTTPNextState(me);                  /* Get next state */
1.80 frystyk 391:   me->transparent = YES;
 392:   return HT_OK;
1.71 frystyk 393: }
1.56 frystyk 394: 
1.80 frystyk 395: /*
 396: **   Searches for HTTP header line until buffer fills up or a CRLF or LF
 397: **   is found
 398: */
 399: PRIVATE int HTTPStatus_put_block ARGS3(HTStream *, me, CONST char*, b, int, l)
1.71 frystyk 400: {
1.80 frystyk 401:   while (!me->transparent && l-- > 0) {
 402:    int status;
 403:    if (me->target) {
 404:      if ((status = stream_pipe(me)) != HT_OK)
 405:        return status;
 406:    } else {
 407:      *(me->buffer+me->buflen++) = *b;
 408:      if (me->state == EOL_FCR) {
 409:        if (*b == LF) { /* Line found */
 410:          if ((status = stream_pipe(me)) != HT_OK)
 411:            return status;
 412:        } else {
 413:          me->state = EOL_BEGIN;
 414:        }
 415:      } else if (*b == CR) {
 416:        me->state = EOL_FCR;
 417:      } else if (*b == LF) {
 418:        if ((status = stream_pipe(me)) != HT_OK)
 419:          return status;
1.71 frystyk 420:      } else {
1.80 frystyk 421:        if (me->buflen >= MAX_STATUS_LEN) {
 422:          if ((status = stream_pipe(me)) != HT_OK)
 423:            return status;
 424:        }
1.71 frystyk 425:      }
1.80 frystyk 426:      b++;
1.71 frystyk 427:    }
1.56 frystyk 428:   }
1.88 ! frystyk 429:   if (me->target) {               /* Is the stream set up? */
 ! 430:    if (l > 0)                     /* Anything left? */
 ! 431:      return PUTBLOCK(b, l);
 ! 432:    return HT_OK;
 ! 433:   }
 ! 434:   return HT_WOULD_BLOCK;
1.56 frystyk 435: }
 436: 
1.80 frystyk 437: PRIVATE int HTTPStatus_put_string ARGS2(HTStream *, me, CONST char*, s)
1.71 frystyk 438: {
1.80 frystyk 439:   return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 440: }
1.56 frystyk 441: 
1.80 frystyk 442: PRIVATE int HTTPStatus_put_character ARGS2(HTStream *, me, char, c)
1.71 frystyk 443: {
1.80 frystyk 444:   return HTTPStatus_put_block(me, &c, 1);
 445: }
 446: 
 447: PRIVATE int HTTPStatus_flush ARGS1(HTStream *, me)
 448: {
 449:   return (*me->target->isa->flush)(me->target);
1.71 frystyk 450: }
 451: 
 452: PRIVATE int HTTPStatus_free ARGS1(HTStream *, me)
 453: {
1.87 frystyk 454:   int status = HT_OK;
 455:   if (me->target) {
 456:    if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
 457:      return HT_WOULD_BLOCK;
 458:   }
1.71 frystyk 459:   free(me);
1.80 frystyk 460:   return HT_OK;
1.71 frystyk 461: }
 462: 
 463: PRIVATE int HTTPStatus_abort ARGS2(HTStream *, me, HTError, e)
 464: {
 465:   if (me->target)
1.74 frystyk 466:    ABORT_TARGET;
1.71 frystyk 467:   free(me);
1.74 frystyk 468:   if (PROT_TRACE)
1.80 frystyk 469:    fprintf(TDEST, "HTTPStatus.. ABORTING...\n");
 470:   return HT_ERROR;
1.71 frystyk 471: }
 472: 
 473: /*   HTTPStatus Stream
 474: **   -----------------
 475: */
 476: PRIVATE CONST HTStreamClass HTTPStatusClass =
 477: {       
 478:   "HTTPStatus",
1.80 frystyk 479:   HTTPStatus_flush,
1.71 frystyk 480:   HTTPStatus_free,
 481:   HTTPStatus_abort,
 482:   HTTPStatus_put_character,
 483:   HTTPStatus_put_string,
 484:   HTTPStatus_put_block
 485: };
 486: 
 487: PUBLIC HTStream * HTTPStatus_new ARGS2(HTRequest *, request,
 488:                    http_info *, http)
 489: {
 490:   HTStream * me = (HTStream *) calloc(1, sizeof(HTStream));
 491:   if (!me) outofmem(__FILE__, "HTTPStatus_new");
 492:   me->isa = &HTTPStatusClass;
 493:   me->request = request;
 494:   me->http = http;
 495:   me->state = EOL_BEGIN;
 496:   return me;
 497: }
 498: 
 499: /* ------------------------------------------------------------------------- */
 500: 
 501: /*       Load Document from HTTP Server            HTLoadHTTP
1.55 frystyk 502: **       ==============================
 503: **
 504: **   Given a hypertext address, this routine loads a document.
 505: **
 506: ** On entry,
 507: **   request        This is the request structure
 508: ** On exit,
1.80 frystyk 509: **   returns     HT_ERROR    Error has occured or interrupted
1.88 ! frystyk 510: **           HT_OK      Generic dummy: We are not finished!
1.71 frystyk 511: **           HT_WOULD_BLOCK if operation would have blocked
1.58 frystyk 512: **           HT_LOADED    if return status 200 OK
 513: **           HT_NO_DATA   if return status 204 No Response
1.81 frystyk 514: **           HT_RETRY    if return status 503 Service Unavail.
1.55 frystyk 515: */
 516: PUBLIC int HTLoadHTTP ARGS1 (HTRequest *, request)
 517: {
1.71 frystyk 518:   int status = HT_ERROR;
 519:   char *url;              /* Gets initialized on every entry */
1.55 frystyk 520:   http_info *http;            /* Specific protocol information */
 521: 
 522:   if (!request || !request->anchor) {
1.78 frystyk 523:     if (PROT_TRACE) fprintf(TDEST, "HTLoadHTTP.. Bad argument\n");
1.71 frystyk 524:     return HT_ERROR;
1.55 frystyk 525:   }
 526:   url = HTAnchor_physical(request->anchor);
1.17 timbl 527:   
1.71 frystyk 528:   /* Only do the setup first time through. This is actually state HTTP_BEGIN
 529:    but it can't be in the state machine as we need the structure first */
 530:   if (!request->net_info) {
1.22 luotonen 531:    /*
1.71 frystyk 532:    ** Initiate a new http structure and bind to request structure
 533:    ** This is actually state HTTP_BEGIN, but it can't be in the state
 534:    ** machine as we need the structure first.
1.22 luotonen 535:    */
1.80 frystyk 536:    if (PROT_TRACE) fprintf(TDEST, "HTTP........ Looking for `%s\'\n",url);
1.71 frystyk 537:    if ((http = (http_info *) calloc(1, sizeof(http_info))) == NULL)
 538:      outofmem(__FILE__, "HTLoadHTTP");
1.78 frystyk 539:    http->sockfd = INVSOC;           /* Invalid socket number */
1.71 frystyk 540:    http->request = request;
 541:    http->state = HTTP_BEGIN;
1.85 frystyk 542:    http->next = HTTP_ERROR;
1.71 frystyk 543:    request->net_info = (HTNetInfo *) http;
 544:    HTThread_new((HTNetInfo *) http);
1.85 frystyk 545:   } else {
1.71 frystyk 546:    http = (http_info *) request->net_info;     /* Get existing copy */
1.88 ! frystyk 547:    if (HTThreadIntr(http->sockfd)) {
 ! 548:      HTTPCleanup(request, YES);
 ! 549:      return HTRequest_isMainDestination(request) ? HT_ERROR : HT_OK;
 ! 550:    }
1.85 frystyk 551:   }
1.71 frystyk 552: 
 553:   /* Now jump into the machine. We know the state from the previous run */
 554:   while (1) {
 555:    switch (http->state) {
 556:     case HTTP_BEGIN:
 557:      /*
 558:       ** Compose authorization information (this was moved here
 559:       ** from after the making of the connection so that the connection
 560:       ** wouldn't have to wait while prompting username and password
 561:       ** from the user).             -- AL 13.10.93
 562:       */
 563:      HTAA_composeAuth(request);
 564:      if (PROT_TRACE) {
 565:        if (request->authorization)
1.78 frystyk 566:          fprintf(TDEST, "HTTP........ Sending Authorization: %s\n",
1.71 frystyk 567:              request->authorization);
 568:        else
1.78 frystyk 569:          fprintf(TDEST,
1.71 frystyk 570:              "HTTP........ Not sending authorization (yet)\n");
 571:      }
 572:      http->state = HTTP_NEED_CONNECTION;
 573:      break;
 574:      
 575:     case HTTP_NEED_CONNECTION:    /* Now let's set up a connection */
 576:      status = HTDoConnect((HTNetInfo *) http, url, TCP_PORT,
 577:                 NULL, NO);
1.80 frystyk 578:      if (status == HT_OK) {
1.71 frystyk 579:        if (PROT_TRACE)
1.78 frystyk 580:          fprintf(TDEST, "HTTP........ Connected, socket %d\n",
1.71 frystyk 581:              http->sockfd);
1.80 frystyk 582: 
1.88 ! frystyk 583:        /* Set up stream TO network */
 ! 584:        request->input_stream =
 ! 585:          HTTPRequest_new(request, HTWriter_new(http->sockfd, YES));
 ! 586: 
 ! 587:        /*
 ! 588:        ** Set up concurrent read/write if this request isn't the
 ! 589:        ** source for a PUT or POST. As source we don't start reading
 ! 590:        ** before all destinations are ready. If destination then
 ! 591:        ** register the input stream and get ready for read
 ! 592:        */
 ! 593:        if (HTRequest_isPostWeb(request)) {
 ! 594:          HTThreadState(http->sockfd, THD_SET_READ);
 ! 595:          HTRequest_linkDestination(request);
 ! 596:        }
 ! 597: 
 ! 598:        /* Set up stream FROM network and corresponding read buffer */
1.71 frystyk 599:        http->isoc = HTInputSocket_new(http->sockfd);
1.80 frystyk 600:        http->target = HTImProxy ?
 601:          request->output_stream : HTTPStatus_new(request, http);
1.88 ! frystyk 602: 
1.71 frystyk 603:        http->state = HTTP_NEED_REQUEST;
 604:      } else if (status == HT_WOULD_BLOCK)
 605:        return status;
 606:      else
 607:        http->state = HTTP_ERROR;       /* Error or interrupt */
 608:      break;
 609: 
1.87 frystyk 610:      /* As we can do simultanous read and write this is now one state */
1.80 frystyk 611:     case HTTP_NEED_REQUEST:
 612:      if (http->action == SOC_WRITE) {
1.88 ! frystyk 613:        if (HTRequest_isDestination(request)) {
 ! 614:          HTThreadStateByRequest(request->source, THD_SET_READ);
 ! 615:          return HT_WOULD_BLOCK;
1.80 frystyk 616:        }
1.88 ! frystyk 617:        status = request->PostCallBack ?
 ! 618:          request->PostCallBack(request, request->input_stream) :
 ! 619:            (*request->input_stream->isa->flush)(request->input_stream);
1.71 frystyk 620:        if (status == HT_WOULD_BLOCK)
1.80 frystyk 621:          return HT_WOULD_BLOCK;
 622:        else if (status == HT_INTERRUPTED)
 623:          http->state = HTTP_ERROR;
1.88 ! frystyk 624:        else {
1.80 frystyk 625:          http->action = SOC_READ;
1.88 ! frystyk 626:        }
1.80 frystyk 627:      } else if (http->action == SOC_READ) {
 628:        status = HTSocketRead(request, http->target);
 629:        if (status == HT_WOULD_BLOCK)
 630:          return HT_WOULD_BLOCK;
 631:        else if (status == HT_INTERRUPTED)
1.71 frystyk 632:          http->state = HTTP_ERROR;
1.85 frystyk 633:        else {
 634:          http->state = http->next;     /* Jump to next state */
 635:        }
1.80 frystyk 636:      } else
1.78 frystyk 637:        http->state = HTTP_ERROR;
1.71 frystyk 638:      break;
1.80 frystyk 639:      
 640:     case HTTP_REDIRECTION:
1.88 ! frystyk 641:      /* Clean up the other connections or just this one */
 ! 642:      if (HTRequest_isPostWeb(request))
 ! 643:        HTRequest_killPostWeb(request);
 ! 644:      else
 ! 645:        HTTPCleanup(request, NO);
 ! 646: 
 ! 647:      /* If we found a new URL in the response */
1.71 frystyk 648:      if (request->redirect) {
 649:        if (status == 301) {
 650:          HTErrorAdd(request, ERR_INFO, NO, HTERR_MOVED,
 651:                (void *) request->redirect,
 652:                (int) strlen(request->redirect), "HTLoadHTTP");
 653:        } else if (status == 302) {
 654:          HTErrorAdd(request, ERR_INFO, NO, HTERR_FOUND,
 655:                (void *) request->redirect,
 656:                (int) strlen(request->redirect), "HTLoadHTTP");
1.55 frystyk 657:        }
1.88 ! frystyk 658: 
 ! 659:        /* If we haven't reached the limit for redirection */
1.71 frystyk 660:        if (++request->redirections < HTMaxRedirections) {
1.87 frystyk 661:          HTAnchor *anchor = HTAnchor_findAddress(request->redirect);
1.88 ! frystyk 662:          if (HTRequest_isPostWeb(request)) {
 ! 663:            HTRequest *dest = HTRequest_mainDestination(request);
 ! 664:            char *msg=(char*)malloc(strlen(request->redirect)+100);
1.87 frystyk 665:            if (!msg) outofmem(__FILE__, "HTLoadHTTP");
1.88 ! frystyk 666:            sprintf(msg, "\nLocation of %s has changed to %s for method %s, continue operation?",
 ! 667:                HTRequest_isDestination(request) ?
 ! 668:                "destination" : "source", request->redirect,
 ! 669:                HTMethod_name(request->method));
 ! 670:            if (HTConfirm(msg)) {
1.87 frystyk 671:              free(msg);
1.88 ! frystyk 672: 
 ! 673:              /* The new anchor inherits the Post Web */
 ! 674:              HTAnchor_moveLinks((HTAnchor *) request->anchor,
 ! 675:                        anchor);
 ! 676:              if (HTRequest_isSource(request))
 ! 677:                HTRequest_delete(request);
 ! 678:              return HTCopyAnchor((HTAnchor *) anchor, dest);
1.87 frystyk 679:            }
 680:            free(msg);
1.88 ! frystyk 681:            return HT_ERROR;
 ! 682:          } if (request->PostCallBack) {
1.87 frystyk 683: #if 0
1.88 ! frystyk 684:            return HTUploadAnchor((HTAnchor*) anchor, request);
1.87 frystyk 685: #endif
 686:          } else {
 687:            return HTLoadAnchor((HTAnchor *) anchor, request);
 688:          }
1.71 frystyk 689:        } else {
 690:          HTErrorAdd(request, ERR_FATAL, NO, HTERR_MAX_REDIRECT,
1.58 frystyk 691:                NULL, 0, "HTLoadHTTP");
1.88 ! frystyk 692:          if (HTRequest_isPostWeb(request)) {
 ! 693:            BOOL main = HTRequest_isMainDestination(request);
 ! 694:            HTRequest_removeDestination(request);
 ! 695:            return main ? HT_ERROR : HT_OK;
 ! 696:          }
 ! 697:          return HT_ERROR;
1.58 frystyk 698:        }
1.71 frystyk 699:      } else {
 700:        HTErrorAdd(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
 701:              NULL, 0, "HTLoadHTTP");
1.88 ! frystyk 702:        return HT_ERROR;
1.71 frystyk 703:      }
 704:      break;
1.80 frystyk 705:      
1.71 frystyk 706:     case HTTP_AA:
1.88 ! frystyk 707:      /* Clean up the other connections or just this one */
 ! 708:      if (HTRequest_isPostWeb(request))
 ! 709:        HTRequest_killPostWeb(request);
 ! 710:      else
 ! 711:        HTTPCleanup(request, NO);
 ! 712: 
 ! 713:      /* Ask the user for a UserID and a passwd */
 ! 714:      if (HTTPAuthentication(request) && HTAA_retryWithAuth(request)) {
 ! 715:        if (HTRequest_isPostWeb(request)) {
 ! 716:          HTRequest *dest = HTRequest_mainDestination(request);
 ! 717:          HTAnchor_appendMethods(request->anchor, request->method);
 ! 718:          return HTCopyAnchor((HTAnchor *) request->source->anchor,
 ! 719:                    dest);
1.85 frystyk 720:        } else if (request->PostCallBack) {
 721: #if 0
1.88 ! frystyk 722:          return HTUploadAnchor((HTAnchor*) request->anchor,request);
1.85 frystyk 723: #endif
 724:        } else {
 725:          return HTLoadAnchor((HTAnchor *) request->anchor, request);
 726:        }
1.88 ! frystyk 727:      } else {                /* If the guy said no :-( */
1.71 frystyk 728:        char *unescaped = NULL;
 729:        StrAllocCopy(unescaped, url);
 730:        HTUnEscape(unescaped);
 731:        HTErrorAdd(request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
 732:              (void *) unescaped,
 733:              (int) strlen(unescaped), "HTLoadHTTP");
 734:        free(unescaped);
1.88 ! frystyk 735:        if (HTRequest_isPostWeb(request)) {
 ! 736:          BOOL main = HTRequest_isMainDestination(request);
 ! 737:          HTRequest_removeDestination(request);
 ! 738:          return main ? HT_ERROR : HT_OK;
 ! 739:        }
1.80 frystyk 740:        return HT_ERROR;
1.71 frystyk 741:      }
 742:      break;
1.80 frystyk 743:      
1.71 frystyk 744:     case HTTP_GOT_DATA:
1.80 frystyk 745:      HTTPCleanup(request, NO);
1.88 ! frystyk 746:      if (HTRequest_isPostWeb(request)) {
 ! 747:        BOOL main = HTRequest_isMainDestination(request);
 ! 748:        HTRequest_removeDestination(request);
 ! 749:        return main ? HT_LOADED : HT_OK;
 ! 750:      }
 ! 751:      return HT_LOADED;
1.71 frystyk 752:      break;
 753:      
 754:     case HTTP_NO_DATA:
1.80 frystyk 755:      HTTPCleanup(request, NO);
1.88 ! frystyk 756:      if (HTRequest_isPostWeb(request)) {
 ! 757:        BOOL main = HTRequest_isMainDestination(request);
 ! 758:        HTRequest_removeDestination(request);
 ! 759:        return main ? HT_NO_DATA : HT_OK;
 ! 760:      }
1.71 frystyk 761:      return HT_NO_DATA;
 762:      break;
1.80 frystyk 763:      
1.88 ! frystyk 764:     case HTTP_RETRY:      /* Treat this as an error state for now */
 ! 765:      if (HTRequest_isPostWeb(request))
 ! 766:        HTRequest_killPostWeb(request);
 ! 767:      else
 ! 768:        HTTPCleanup(request, YES);
 ! 769:      if (HTRequest_isPostWeb(request)) {
 ! 770:        BOOL main = HTRequest_isMainDestination(request);
 ! 771:        HTRequest_removeDestination(request);
 ! 772:        return main ? HT_RETRY : HT_OK;
 ! 773:      }
1.81 frystyk 774:      return HT_RETRY;
 775:      break;
 776: 
1.71 frystyk 777:     case HTTP_ERROR:
1.88 ! frystyk 778:      /* Clean up the other connections or just this one */
 ! 779:      if (HTRequest_isPostWeb(request)) {
 ! 780:        if (http->sockfd == INVSOC)
 ! 781:          HTTPCleanup(request, YES);     /* If no valid socket */
 ! 782:        HTRequest_killPostWeb(request);
 ! 783:      } else
 ! 784:        HTTPCleanup(request, YES);
 ! 785:      if (HTRequest_isPostWeb(request)) {
 ! 786:        BOOL main = HTRequest_isMainDestination(request);
 ! 787:        HTRequest_removeDestination(request);
 ! 788:        return main ? HT_ERROR : HT_OK;
 ! 789:      }
1.71 frystyk 790:      return HT_ERROR;
 791:      break;
 792:    }
 793:   } /* End of while(1) */
 794: }  
 795: 
 796: /* Protocol descriptor */
 797: 
 798: GLOBALDEF PUBLIC HTProtocol HTTP = {
 799:   "http", SOC_NON_BLOCK, HTLoadHTTP, NULL, NULL
 800: };
1.88 ! frystyk 801: 
1.21 luotonen 802: 

Webmaster

AltStyle によって変換されたページ (->オリジナル) /