Annotation of libwww/Library/src/HTTP.c, revision 1.88
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
6: **
7: ** This module implments the HTTP protocol as a state machine
1.55 frystyk 8: **
9: ** History:
1.59 frystyk 10: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 11: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
12: ** Forward, redirection, error handling and referer field
1.67 duns 13: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 14: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 15: **
1.1 timbl 16: */
17:
1.78 frystyk 18: /* Library include files */
19: #include "tcp.h"
1.1 timbl 20: #include "HTUtils.h"
1.78 frystyk 21: #include "HTString.h"
1.71 frystyk 22: #include "HTParse.h"
1.1 timbl 23: #include "HTTCP.h"
24: #include "HTFormat.h"
1.85 frystyk 25: #include "HTSocket.h"
1.2 timbl 26: #include "HTAlert.h"
27: #include "HTMIME.h"
1.21 luotonen 28: #include "HTAccess.h" /* HTRequest */
1.14 luotonen 29: #include "HTAABrow.h" /* Access Authorization */
1.20 timbl 30: #include "HTTee.h" /* Tee off a cache stream */
1.78 frystyk 31: #include "HTFWrite.h" /* Write to cache file */
1.80 frystyk 32: #include "HTWriter.h"
1.54 luotonen 33: #include "HTError.h"
1.55 frystyk 34: #include "HTChunk.h"
1.71 frystyk 35: #include "HTGuess.h"
36: #include "HTThread.h"
1.80 frystyk 37: #include "HTTPReq.h"
1.55 frystyk 38: #include "HTTP.h" /* Implements */
39:
40: /* Macros and other defines */
1.71 frystyk 41: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
42: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
43: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
44: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 45: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 46:
1.59 frystyk 47: /* Type definitions and global variables etc. local to this module */
48: /* This is the local definition of HTRequest->net_info */
49: typedef enum _HTTPState {
1.81 frystyk 50: HTTP_RETRY = -4,
1.71 frystyk 51: HTTP_ERROR = -3,
52: HTTP_NO_DATA = -2,
53: HTTP_GOT_DATA = -1,
54: HTTP_BEGIN = 0,
55: HTTP_NEED_CONNECTION,
56: HTTP_NEED_REQUEST,
57: HTTP_REDIRECTION,
58: HTTP_AA
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60:
61: typedef struct _http_info {
1.78 frystyk 62: SOCKFD sockfd; /* Socket descripter */
1.71 frystyk 63: SockA sock_addr; /* SockA is defined in tcp.h */
1.68 frystyk 64: HTInputSocket * isoc; /* Input buffer */
1.80 frystyk 65: SocAction action; /* Result of the select call */
66: HTStream * target; /* Target stream */
1.71 frystyk 67: int addressCount; /* Attempts if multi-homed host */
68: time_t connecttime; /* Used on multihomed hosts */
69: struct _HTRequest * request; /* Link back to request structure */
1.68 frystyk 70:
1.81 frystyk 71: HTTPState state; /* Current State of the connection */
72: HTTPState next; /* Next state */
1.55 frystyk 73: } http_info;
74:
1.88 ! frystyk 75: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 76:
1.71 frystyk 77: struct _HTStream {
78: CONST HTStreamClass * isa;
79: HTStream * target;
80: HTRequest * request;
81: http_info * http;
82: HTSocketEOL state;
83: BOOL transparent;
1.81 frystyk 84: char * version; /* Should we save this? */
1.71 frystyk 85: int status;
1.81 frystyk 86: char * reason;
1.71 frystyk 87: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 88: int buflen;
1.71 frystyk 89: };
1.21 luotonen 90:
1.71 frystyk 91: /* ------------------------------------------------------------------------- */
92: /* Help Functions */
93: /* ------------------------------------------------------------------------- */
1.21 luotonen 94:
1.71 frystyk 95: /* HTTPCleanup
1.1 timbl 96: **
1.55 frystyk 97: ** This function closes the connection and frees memory.
1.1 timbl 98: **
1.55 frystyk 99: ** Returns 0 on OK, else -1
1.1 timbl 100: */
1.80 frystyk 101: PRIVATE int HTTPCleanup ARGS2(HTRequest *, req, BOOL, abort)
1.1 timbl 102: {
1.71 frystyk 103: http_info *http;
1.55 frystyk 104: int status = 0;
1.80 frystyk 105: if (!req || !req->net_info) {
1.78 frystyk 106: if (PROT_TRACE) fprintf(TDEST, "HTTPCleanup. Bad argument!\n");
1.55 frystyk 107: status = -1;
108: } else {
1.80 frystyk 109: http = (http_info *) req->net_info;
1.78 frystyk 110: if (http->sockfd != INVSOC) {
1.80 frystyk 111:
1.85 frystyk 112: if (http->target) {
1.88 ! frystyk 113:
! 114: /* Free stream with data TO network */
! 115: if (!HTRequest_isDestination(req)) {
! 116: if (abort)
! 117: (*req->input_stream->isa->abort)(req->input_stream, NULL);
! 118: else
1.85 frystyk 119: (*req->input_stream->isa->_free)(req->input_stream);
120: }
1.88 ! frystyk 121:
1.85 frystyk 122: /* Free stream with data FROM network */
1.80 frystyk 123: if (abort)
1.85 frystyk 124: (*http->target->isa->abort)(http->target, NULL);
1.80 frystyk 125: else
1.85 frystyk 126: (*http->target->isa->_free)(http->target);
1.80 frystyk 127: }
1.78 frystyk 128: if (PROT_TRACE)
129: fprintf(TDEST,"HTTP........ Closing socket %d\n",http->sockfd);
1.59 frystyk 130: if ((status = NETCLOSE(http->sockfd)) < 0)
1.78 frystyk 131: HTErrorSysAdd(http->request, ERR_FATAL, socerrno, NO,
132: "NETCLOSE");
1.71 frystyk 133: HTThreadState(http->sockfd, THD_CLOSE);
1.80 frystyk 134: http->sockfd = INVSOC;
1.71 frystyk 135: }
1.88 ! frystyk 136: HTThread_clear((HTNetInfo *) http);
1.71 frystyk 137: if (http->isoc)
138: HTInputSocket_free(http->isoc);
1.80 frystyk 139: free(http);
140: req->net_info = NULL;
1.55 frystyk 141: }
142: return status;
143: }
144:
145:
1.71 frystyk 146: PRIVATE BOOL HTTPAuthentication ARGS1(HTRequest *, request)
147: {
148: HTAAScheme scheme;
149: HTList *valid_schemes = HTList_new();
150: HTAssocList **scheme_specifics = NULL;
1.76 frystyk 151: char *tmplate = NULL;
1.71 frystyk 152:
153: if (request->WWWAAScheme) {
154: if ((scheme = HTAAScheme_enum(request->WWWAAScheme)) != HTAA_UNKNOWN) {
155: HTList_addObject(valid_schemes, (void *) scheme);
156: if (!scheme_specifics) {
157: int i;
158: scheme_specifics = (HTAssocList**)
159: malloc(HTAA_MAX_SCHEMES * sizeof(HTAssocList*));
160: if (!scheme_specifics)
161: outofmem(__FILE__, "HTTPAuthentication");
162: for (i=0; i < HTAA_MAX_SCHEMES; i++)
163: scheme_specifics[i] = NULL;
164: }
165: scheme_specifics[scheme] = HTAA_parseArgList(request->WWWAARealm);
166: } else if (PROT_TRACE) {
167: HTErrorAdd(request, ERR_INFO, NO, HTERR_UNKNOWN_AA,
168: (void *) request->WWWAAScheme, 0, "HTTPAuthentication");
169: return NO;
170: }
171: }
172: if (request->WWWprotection) {
173: if (PROT_TRACE)
1.78 frystyk 174: fprintf(TDEST, "Protection template set to `%s'\n",
1.71 frystyk 175: request->WWWprotection);
1.76 frystyk 176: StrAllocCopy(tmplate, request->WWWprotection);
1.71 frystyk 177: }
178: request->valid_schemes = valid_schemes;
179: request->scheme_specifics = scheme_specifics;
1.76 frystyk 180: request->prot_template = tmplate;
1.71 frystyk 181: return YES;
182: }
183:
184:
185: /*
186: ** This is a big switch handling all HTTP return codes. It puts in any
187: ** appropiate error message and decides whether we should expect data
1.78 frystyk 188: ** or not.
1.55 frystyk 189: */
1.81 frystyk 190: PRIVATE void HTTPNextState ARGS1(HTStream *, me)
1.55 frystyk 191: {
1.71 frystyk 192: switch (me->status) {
193:
1.78 frystyk 194: case 0: /* 0.9 response */
195: case 200:
196: case 201:
197: case 202:
198: case 203:
1.81 frystyk 199: me->http->next = HTTP_GOT_DATA;
1.71 frystyk 200: break;
1.78 frystyk 201:
202: case 204: /* No Response */
1.81 frystyk 203: me->http->next = HTTP_NO_DATA;
1.71 frystyk 204: break;
1.78 frystyk 205:
1.71 frystyk 206: case 301: /* Moved */
207: case 302: /* Found */
1.81 frystyk 208: me->http->next = HTTP_REDIRECTION;
1.71 frystyk 209: break;
1.55 frystyk 210:
1.71 frystyk 211: case 303: /* Method */
212: HTAlert("This client doesn't support automatic redirection of type `Method'");
1.81 frystyk 213: me->http->next = HTTP_ERROR;
1.71 frystyk 214: break;
1.55 frystyk 215:
1.78 frystyk 216: case 400: /* Bad Request */
217: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
1.81 frystyk 218: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
219: me->http->next = HTTP_ERROR;
1.71 frystyk 220: break;
1.70 howcome 221:
1.71 frystyk 222: case 401:
1.78 frystyk 223: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.81 frystyk 224: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
225: me->http->next = HTTP_AA;
1.71 frystyk 226: break;
227:
228: case 402: /* Payment required */
1.78 frystyk 229: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
1.81 frystyk 230: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
231: me->http->next = HTTP_ERROR;
1.71 frystyk 232: break;
1.55 frystyk 233:
1.71 frystyk 234: case 403: /* Forbidden */
1.78 frystyk 235: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
1.81 frystyk 236: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
237: me->http->next = HTTP_ERROR;
1.71 frystyk 238: break;
1.55 frystyk 239:
1.71 frystyk 240: case 404: /* Not Found */
1.78 frystyk 241: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
1.81 frystyk 242: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
243: me->http->next = HTTP_ERROR;
1.71 frystyk 244: break;
245:
1.78 frystyk 246: case 405: /* Not Allowed */
247: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
1.81 frystyk 248: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
249: me->http->next = HTTP_ERROR;
1.78 frystyk 250: break;
251:
252: case 406: /* None Acceptable */
253: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
1.81 frystyk 254: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
255: me->http->next = HTTP_ERROR;
1.78 frystyk 256: break;
257:
258: case 407: /* Proxy Authentication Required */
259: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PROXY,
1.81 frystyk 260: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
261: me->http->next = HTTP_ERROR;
1.78 frystyk 262: break;
263:
264: case 408: /* Request Timeout */
265: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
1.81 frystyk 266: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
267: me->http->next = HTTP_ERROR;
1.78 frystyk 268: break;
269:
1.71 frystyk 270: case 500:
1.78 frystyk 271: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
1.81 frystyk 272: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
273: me->http->next = HTTP_ERROR;
1.78 frystyk 274: break;
275:
1.71 frystyk 276: case 501:
1.78 frystyk 277: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
1.81 frystyk 278: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
279: me->http->next = HTTP_ERROR;
1.78 frystyk 280: break;
281:
282: case 502:
283: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
1.81 frystyk 284: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
285: me->http->next = HTTP_ERROR;
1.78 frystyk 286: break;
287:
288: case 503:
289: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_DOWN,
1.81 frystyk 290: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
291:
292: /* If Retry-After header is found then return HT_RETRY else HT_ERROR */
293: if (me->request->retry_after)
294: me->http->next = HTTP_RETRY;
295: else
296: me->http->next = HTTP_ERROR;
1.78 frystyk 297: break;
298:
299: case 504:
300: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
1.81 frystyk 301: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
302: me->http->next = HTTP_ERROR;
1.71 frystyk 303: break;
1.78 frystyk 304:
1.71 frystyk 305: default: /* bad number */
306: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.80 frystyk 307: (void *) me->buffer, me->buflen, "HTLoadHTTP");
1.81 frystyk 308: me->http->next = HTTP_ERROR;
1.71 frystyk 309: break;
1.55 frystyk 310: }
311: }
312:
1.71 frystyk 313: /* ------------------------------------------------------------------------- */
314: /* HTTP Status Line Stream */
315: /* ------------------------------------------------------------------------- */
1.55 frystyk 316:
1.71 frystyk 317: /*
1.80 frystyk 318: ** Analyse the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 319: ** then create a MIME-stream, else create a Guess stream to find out
320: ** what the 0.9 server is sending. We need to copy the buffer as we don't
321: ** know if we can modify the contents or not.
1.78 frystyk 322: **
323: ** Stream handling is a function of the status code returned from the
324: ** server:
325: ** 200: Use `output_stream' in HTRequest structure
1.80 frystyk 326: ** else: Use `error_stream' in HTRequest structure
327: **
328: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 329: */
1.80 frystyk 330: PRIVATE int stream_pipe ARGS1(HTStream *, me)
1.56 frystyk 331: {
1.71 frystyk 332: HTRequest *req = me->request;
1.80 frystyk 333: if (me->target) {
334: int status = PUTBLOCK(me->buffer, me->buflen);
335: if (status == HT_OK)
336: me->transparent = YES;
337: return status;
1.88 ! frystyk 338: } else if (HTRequest_isSource(req) && !req->output_stream) {
! 339: /*
! 340: ** We need to wait for the destinations to get ready
! 341: */
! 342: return HT_WOULD_BLOCK;
1.80 frystyk 343: }
1.88 ! frystyk 344:
1.81 frystyk 345: if (strncasecomp(me->buffer, "http/", 5)) {
1.80 frystyk 346: int status;
347: HTErrorAdd(req, ERR_INFO, NO, HTERR_HTTP09,
348: (void *) me->buffer, me->buflen, "HTTPStatusStream");
349: me->target = HTGuess_new(req, NULL, WWW_UNKNOWN,
350: req->output_format, req->output_stream);
1.88 ! frystyk 351: me->http->next = HTTP_GOT_DATA;
1.80 frystyk 352: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
353: me->transparent = YES;
354: return status;
355: } else {
1.81 frystyk 356: char *ptr = me->buffer+5; /* Skip the HTTP part */
357: me->version = HTNextField(&ptr);
358: me->status = atoi(HTNextField(&ptr));
359: me->reason = ptr;
360: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
361: *ptr = '0円';
362: else if ((ptr = strchr(me->reason, '\n')) != NULL)
363: *ptr = '0円';
364:
365: /* Set up the streams */
366: if (me->status==200) {
1.80 frystyk 367: HTStream *s;
1.85 frystyk 368: if (req->output_format == WWW_SOURCE) {
369: me->target = HTMIMEConvert(req, NULL, WWW_MIME,
370: req->output_format,
371: req->output_stream);
372: } else {
373: me->target = HTStreamStack(WWW_MIME, req->output_format,
374: req->output_stream, req, NO);
1.80 frystyk 375:
1.85 frystyk 376: /* howcome: test for return value from HTCacheWriter 12/1/95 */
377: if (req->method==METHOD_GET && HTCache_isEnabled() &&
378: (s = HTCacheWriter(req, NULL, WWW_MIME, req->output_format,
379: req->output_stream))) {
380: me->target = HTTee(me->target, s);
381: }
1.80 frystyk 382: }
1.71 frystyk 383: } else {
1.81 frystyk 384: me->target = HTMIMEConvert(req, NULL, WWW_MIME, req->error_format,
385: req->error_stream);
1.56 frystyk 386: }
1.80 frystyk 387: if (!me->target)
388: me->target = HTBlackHole(); /* What else */
1.56 frystyk 389: }
1.81 frystyk 390: HTTPNextState(me); /* Get next state */
1.80 frystyk 391: me->transparent = YES;
392: return HT_OK;
1.71 frystyk 393: }
1.56 frystyk 394:
1.80 frystyk 395: /*
396: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
397: ** is found
398: */
399: PRIVATE int HTTPStatus_put_block ARGS3(HTStream *, me, CONST char*, b, int, l)
1.71 frystyk 400: {
1.80 frystyk 401: while (!me->transparent && l-- > 0) {
402: int status;
403: if (me->target) {
404: if ((status = stream_pipe(me)) != HT_OK)
405: return status;
406: } else {
407: *(me->buffer+me->buflen++) = *b;
408: if (me->state == EOL_FCR) {
409: if (*b == LF) { /* Line found */
410: if ((status = stream_pipe(me)) != HT_OK)
411: return status;
412: } else {
413: me->state = EOL_BEGIN;
414: }
415: } else if (*b == CR) {
416: me->state = EOL_FCR;
417: } else if (*b == LF) {
418: if ((status = stream_pipe(me)) != HT_OK)
419: return status;
1.71 frystyk 420: } else {
1.80 frystyk 421: if (me->buflen >= MAX_STATUS_LEN) {
422: if ((status = stream_pipe(me)) != HT_OK)
423: return status;
424: }
1.71 frystyk 425: }
1.80 frystyk 426: b++;
1.71 frystyk 427: }
1.56 frystyk 428: }
1.88 ! frystyk 429: if (me->target) { /* Is the stream set up? */
! 430: if (l > 0) /* Anything left? */
! 431: return PUTBLOCK(b, l);
! 432: return HT_OK;
! 433: }
! 434: return HT_WOULD_BLOCK;
1.56 frystyk 435: }
436:
1.80 frystyk 437: PRIVATE int HTTPStatus_put_string ARGS2(HTStream *, me, CONST char*, s)
1.71 frystyk 438: {
1.80 frystyk 439: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 440: }
1.56 frystyk 441:
1.80 frystyk 442: PRIVATE int HTTPStatus_put_character ARGS2(HTStream *, me, char, c)
1.71 frystyk 443: {
1.80 frystyk 444: return HTTPStatus_put_block(me, &c, 1);
445: }
446:
447: PRIVATE int HTTPStatus_flush ARGS1(HTStream *, me)
448: {
449: return (*me->target->isa->flush)(me->target);
1.71 frystyk 450: }
451:
452: PRIVATE int HTTPStatus_free ARGS1(HTStream *, me)
453: {
1.87 frystyk 454: int status = HT_OK;
455: if (me->target) {
456: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
457: return HT_WOULD_BLOCK;
458: }
1.71 frystyk 459: free(me);
1.80 frystyk 460: return HT_OK;
1.71 frystyk 461: }
462:
463: PRIVATE int HTTPStatus_abort ARGS2(HTStream *, me, HTError, e)
464: {
465: if (me->target)
1.74 frystyk 466: ABORT_TARGET;
1.71 frystyk 467: free(me);
1.74 frystyk 468: if (PROT_TRACE)
1.80 frystyk 469: fprintf(TDEST, "HTTPStatus.. ABORTING...\n");
470: return HT_ERROR;
1.71 frystyk 471: }
472:
473: /* HTTPStatus Stream
474: ** -----------------
475: */
476: PRIVATE CONST HTStreamClass HTTPStatusClass =
477: {
478: "HTTPStatus",
1.80 frystyk 479: HTTPStatus_flush,
1.71 frystyk 480: HTTPStatus_free,
481: HTTPStatus_abort,
482: HTTPStatus_put_character,
483: HTTPStatus_put_string,
484: HTTPStatus_put_block
485: };
486:
487: PUBLIC HTStream * HTTPStatus_new ARGS2(HTRequest *, request,
488: http_info *, http)
489: {
490: HTStream * me = (HTStream *) calloc(1, sizeof(HTStream));
491: if (!me) outofmem(__FILE__, "HTTPStatus_new");
492: me->isa = &HTTPStatusClass;
493: me->request = request;
494: me->http = http;
495: me->state = EOL_BEGIN;
496: return me;
497: }
498:
499: /* ------------------------------------------------------------------------- */
500:
501: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 502: ** ==============================
503: **
504: ** Given a hypertext address, this routine loads a document.
505: **
506: ** On entry,
507: ** request This is the request structure
508: ** On exit,
1.80 frystyk 509: ** returns HT_ERROR Error has occured or interrupted
1.88 ! frystyk 510: ** HT_OK Generic dummy: We are not finished!
1.71 frystyk 511: ** HT_WOULD_BLOCK if operation would have blocked
1.58 frystyk 512: ** HT_LOADED if return status 200 OK
513: ** HT_NO_DATA if return status 204 No Response
1.81 frystyk 514: ** HT_RETRY if return status 503 Service Unavail.
1.55 frystyk 515: */
516: PUBLIC int HTLoadHTTP ARGS1 (HTRequest *, request)
517: {
1.71 frystyk 518: int status = HT_ERROR;
519: char *url; /* Gets initialized on every entry */
1.55 frystyk 520: http_info *http; /* Specific protocol information */
521:
522: if (!request || !request->anchor) {
1.78 frystyk 523: if (PROT_TRACE) fprintf(TDEST, "HTLoadHTTP.. Bad argument\n");
1.71 frystyk 524: return HT_ERROR;
1.55 frystyk 525: }
526: url = HTAnchor_physical(request->anchor);
1.17 timbl 527:
1.71 frystyk 528: /* Only do the setup first time through. This is actually state HTTP_BEGIN
529: but it can't be in the state machine as we need the structure first */
530: if (!request->net_info) {
1.22 luotonen 531: /*
1.71 frystyk 532: ** Initiate a new http structure and bind to request structure
533: ** This is actually state HTTP_BEGIN, but it can't be in the state
534: ** machine as we need the structure first.
1.22 luotonen 535: */
1.80 frystyk 536: if (PROT_TRACE) fprintf(TDEST, "HTTP........ Looking for `%s\'\n",url);
1.71 frystyk 537: if ((http = (http_info *) calloc(1, sizeof(http_info))) == NULL)
538: outofmem(__FILE__, "HTLoadHTTP");
1.78 frystyk 539: http->sockfd = INVSOC; /* Invalid socket number */
1.71 frystyk 540: http->request = request;
541: http->state = HTTP_BEGIN;
1.85 frystyk 542: http->next = HTTP_ERROR;
1.71 frystyk 543: request->net_info = (HTNetInfo *) http;
544: HTThread_new((HTNetInfo *) http);
1.85 frystyk 545: } else {
1.71 frystyk 546: http = (http_info *) request->net_info; /* Get existing copy */
1.88 ! frystyk 547: if (HTThreadIntr(http->sockfd)) {
! 548: HTTPCleanup(request, YES);
! 549: return HTRequest_isMainDestination(request) ? HT_ERROR : HT_OK;
! 550: }
1.85 frystyk 551: }
1.71 frystyk 552:
553: /* Now jump into the machine. We know the state from the previous run */
554: while (1) {
555: switch (http->state) {
556: case HTTP_BEGIN:
557: /*
558: ** Compose authorization information (this was moved here
559: ** from after the making of the connection so that the connection
560: ** wouldn't have to wait while prompting username and password
561: ** from the user). -- AL 13.10.93
562: */
563: HTAA_composeAuth(request);
564: if (PROT_TRACE) {
565: if (request->authorization)
1.78 frystyk 566: fprintf(TDEST, "HTTP........ Sending Authorization: %s\n",
1.71 frystyk 567: request->authorization);
568: else
1.78 frystyk 569: fprintf(TDEST,
1.71 frystyk 570: "HTTP........ Not sending authorization (yet)\n");
571: }
572: http->state = HTTP_NEED_CONNECTION;
573: break;
574:
575: case HTTP_NEED_CONNECTION: /* Now let's set up a connection */
576: status = HTDoConnect((HTNetInfo *) http, url, TCP_PORT,
577: NULL, NO);
1.80 frystyk 578: if (status == HT_OK) {
1.71 frystyk 579: if (PROT_TRACE)
1.78 frystyk 580: fprintf(TDEST, "HTTP........ Connected, socket %d\n",
1.71 frystyk 581: http->sockfd);
1.80 frystyk 582:
1.88 ! frystyk 583: /* Set up stream TO network */
! 584: request->input_stream =
! 585: HTTPRequest_new(request, HTWriter_new(http->sockfd, YES));
! 586:
! 587: /*
! 588: ** Set up concurrent read/write if this request isn't the
! 589: ** source for a PUT or POST. As source we don't start reading
! 590: ** before all destinations are ready. If destination then
! 591: ** register the input stream and get ready for read
! 592: */
! 593: if (HTRequest_isPostWeb(request)) {
! 594: HTThreadState(http->sockfd, THD_SET_READ);
! 595: HTRequest_linkDestination(request);
! 596: }
! 597:
! 598: /* Set up stream FROM network and corresponding read buffer */
1.71 frystyk 599: http->isoc = HTInputSocket_new(http->sockfd);
1.80 frystyk 600: http->target = HTImProxy ?
601: request->output_stream : HTTPStatus_new(request, http);
1.88 ! frystyk 602:
1.71 frystyk 603: http->state = HTTP_NEED_REQUEST;
604: } else if (status == HT_WOULD_BLOCK)
605: return status;
606: else
607: http->state = HTTP_ERROR; /* Error or interrupt */
608: break;
609:
1.87 frystyk 610: /* As we can do simultanous read and write this is now one state */
1.80 frystyk 611: case HTTP_NEED_REQUEST:
612: if (http->action == SOC_WRITE) {
1.88 ! frystyk 613: if (HTRequest_isDestination(request)) {
! 614: HTThreadStateByRequest(request->source, THD_SET_READ);
! 615: return HT_WOULD_BLOCK;
1.80 frystyk 616: }
1.88 ! frystyk 617: status = request->PostCallBack ?
! 618: request->PostCallBack(request, request->input_stream) :
! 619: (*request->input_stream->isa->flush)(request->input_stream);
1.71 frystyk 620: if (status == HT_WOULD_BLOCK)
1.80 frystyk 621: return HT_WOULD_BLOCK;
622: else if (status == HT_INTERRUPTED)
623: http->state = HTTP_ERROR;
1.88 ! frystyk 624: else {
1.80 frystyk 625: http->action = SOC_READ;
1.88 ! frystyk 626: }
1.80 frystyk 627: } else if (http->action == SOC_READ) {
628: status = HTSocketRead(request, http->target);
629: if (status == HT_WOULD_BLOCK)
630: return HT_WOULD_BLOCK;
631: else if (status == HT_INTERRUPTED)
1.71 frystyk 632: http->state = HTTP_ERROR;
1.85 frystyk 633: else {
634: http->state = http->next; /* Jump to next state */
635: }
1.80 frystyk 636: } else
1.78 frystyk 637: http->state = HTTP_ERROR;
1.71 frystyk 638: break;
1.80 frystyk 639:
640: case HTTP_REDIRECTION:
1.88 ! frystyk 641: /* Clean up the other connections or just this one */
! 642: if (HTRequest_isPostWeb(request))
! 643: HTRequest_killPostWeb(request);
! 644: else
! 645: HTTPCleanup(request, NO);
! 646:
! 647: /* If we found a new URL in the response */
1.71 frystyk 648: if (request->redirect) {
649: if (status == 301) {
650: HTErrorAdd(request, ERR_INFO, NO, HTERR_MOVED,
651: (void *) request->redirect,
652: (int) strlen(request->redirect), "HTLoadHTTP");
653: } else if (status == 302) {
654: HTErrorAdd(request, ERR_INFO, NO, HTERR_FOUND,
655: (void *) request->redirect,
656: (int) strlen(request->redirect), "HTLoadHTTP");
1.55 frystyk 657: }
1.88 ! frystyk 658:
! 659: /* If we haven't reached the limit for redirection */
1.71 frystyk 660: if (++request->redirections < HTMaxRedirections) {
1.87 frystyk 661: HTAnchor *anchor = HTAnchor_findAddress(request->redirect);
1.88 ! frystyk 662: if (HTRequest_isPostWeb(request)) {
! 663: HTRequest *dest = HTRequest_mainDestination(request);
! 664: char *msg=(char*)malloc(strlen(request->redirect)+100);
1.87 frystyk 665: if (!msg) outofmem(__FILE__, "HTLoadHTTP");
1.88 ! frystyk 666: sprintf(msg, "\nLocation of %s has changed to %s for method %s, continue operation?",
! 667: HTRequest_isDestination(request) ?
! 668: "destination" : "source", request->redirect,
! 669: HTMethod_name(request->method));
! 670: if (HTConfirm(msg)) {
1.87 frystyk 671: free(msg);
1.88 ! frystyk 672:
! 673: /* The new anchor inherits the Post Web */
! 674: HTAnchor_moveLinks((HTAnchor *) request->anchor,
! 675: anchor);
! 676: if (HTRequest_isSource(request))
! 677: HTRequest_delete(request);
! 678: return HTCopyAnchor((HTAnchor *) anchor, dest);
1.87 frystyk 679: }
680: free(msg);
1.88 ! frystyk 681: return HT_ERROR;
! 682: } if (request->PostCallBack) {
1.87 frystyk 683: #if 0
1.88 ! frystyk 684: return HTUploadAnchor((HTAnchor*) anchor, request);
1.87 frystyk 685: #endif
686: } else {
687: return HTLoadAnchor((HTAnchor *) anchor, request);
688: }
1.71 frystyk 689: } else {
690: HTErrorAdd(request, ERR_FATAL, NO, HTERR_MAX_REDIRECT,
1.58 frystyk 691: NULL, 0, "HTLoadHTTP");
1.88 ! frystyk 692: if (HTRequest_isPostWeb(request)) {
! 693: BOOL main = HTRequest_isMainDestination(request);
! 694: HTRequest_removeDestination(request);
! 695: return main ? HT_ERROR : HT_OK;
! 696: }
! 697: return HT_ERROR;
1.58 frystyk 698: }
1.71 frystyk 699: } else {
700: HTErrorAdd(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
701: NULL, 0, "HTLoadHTTP");
1.88 ! frystyk 702: return HT_ERROR;
1.71 frystyk 703: }
704: break;
1.80 frystyk 705:
1.71 frystyk 706: case HTTP_AA:
1.88 ! frystyk 707: /* Clean up the other connections or just this one */
! 708: if (HTRequest_isPostWeb(request))
! 709: HTRequest_killPostWeb(request);
! 710: else
! 711: HTTPCleanup(request, NO);
! 712:
! 713: /* Ask the user for a UserID and a passwd */
! 714: if (HTTPAuthentication(request) && HTAA_retryWithAuth(request)) {
! 715: if (HTRequest_isPostWeb(request)) {
! 716: HTRequest *dest = HTRequest_mainDestination(request);
! 717: HTAnchor_appendMethods(request->anchor, request->method);
! 718: return HTCopyAnchor((HTAnchor *) request->source->anchor,
! 719: dest);
1.85 frystyk 720: } else if (request->PostCallBack) {
721: #if 0
1.88 ! frystyk 722: return HTUploadAnchor((HTAnchor*) request->anchor,request);
1.85 frystyk 723: #endif
724: } else {
725: return HTLoadAnchor((HTAnchor *) request->anchor, request);
726: }
1.88 ! frystyk 727: } else { /* If the guy said no :-( */
1.71 frystyk 728: char *unescaped = NULL;
729: StrAllocCopy(unescaped, url);
730: HTUnEscape(unescaped);
731: HTErrorAdd(request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
732: (void *) unescaped,
733: (int) strlen(unescaped), "HTLoadHTTP");
734: free(unescaped);
1.88 ! frystyk 735: if (HTRequest_isPostWeb(request)) {
! 736: BOOL main = HTRequest_isMainDestination(request);
! 737: HTRequest_removeDestination(request);
! 738: return main ? HT_ERROR : HT_OK;
! 739: }
1.80 frystyk 740: return HT_ERROR;
1.71 frystyk 741: }
742: break;
1.80 frystyk 743:
1.71 frystyk 744: case HTTP_GOT_DATA:
1.80 frystyk 745: HTTPCleanup(request, NO);
1.88 ! frystyk 746: if (HTRequest_isPostWeb(request)) {
! 747: BOOL main = HTRequest_isMainDestination(request);
! 748: HTRequest_removeDestination(request);
! 749: return main ? HT_LOADED : HT_OK;
! 750: }
! 751: return HT_LOADED;
1.71 frystyk 752: break;
753:
754: case HTTP_NO_DATA:
1.80 frystyk 755: HTTPCleanup(request, NO);
1.88 ! frystyk 756: if (HTRequest_isPostWeb(request)) {
! 757: BOOL main = HTRequest_isMainDestination(request);
! 758: HTRequest_removeDestination(request);
! 759: return main ? HT_NO_DATA : HT_OK;
! 760: }
1.71 frystyk 761: return HT_NO_DATA;
762: break;
1.80 frystyk 763:
1.88 ! frystyk 764: case HTTP_RETRY: /* Treat this as an error state for now */
! 765: if (HTRequest_isPostWeb(request))
! 766: HTRequest_killPostWeb(request);
! 767: else
! 768: HTTPCleanup(request, YES);
! 769: if (HTRequest_isPostWeb(request)) {
! 770: BOOL main = HTRequest_isMainDestination(request);
! 771: HTRequest_removeDestination(request);
! 772: return main ? HT_RETRY : HT_OK;
! 773: }
1.81 frystyk 774: return HT_RETRY;
775: break;
776:
1.71 frystyk 777: case HTTP_ERROR:
1.88 ! frystyk 778: /* Clean up the other connections or just this one */
! 779: if (HTRequest_isPostWeb(request)) {
! 780: if (http->sockfd == INVSOC)
! 781: HTTPCleanup(request, YES); /* If no valid socket */
! 782: HTRequest_killPostWeb(request);
! 783: } else
! 784: HTTPCleanup(request, YES);
! 785: if (HTRequest_isPostWeb(request)) {
! 786: BOOL main = HTRequest_isMainDestination(request);
! 787: HTRequest_removeDestination(request);
! 788: return main ? HT_ERROR : HT_OK;
! 789: }
1.71 frystyk 790: return HT_ERROR;
791: break;
792: }
793: } /* End of while(1) */
794: }
795:
796: /* Protocol descriptor */
797:
798: GLOBALDEF PUBLIC HTProtocol HTTP = {
799: "http", SOC_NON_BLOCK, HTLoadHTTP, NULL, NULL
800: };
1.88 ! frystyk 801:
1.21 luotonen 802:
Webmaster