Annotation of libwww/Library/src/HTTP.c, revision 1.90
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
6: **
7: ** This module implments the HTTP protocol as a state machine
1.55 frystyk 8: **
9: ** History:
1.59 frystyk 10: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 11: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
12: ** Forward, redirection, error handling and referer field
1.67 duns 13: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 14: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 15: **
1.1 timbl 16: */
17:
1.78 frystyk 18: /* Library include files */
19: #include "tcp.h"
1.1 timbl 20: #include "HTUtils.h"
1.78 frystyk 21: #include "HTString.h"
1.71 frystyk 22: #include "HTParse.h"
1.1 timbl 23: #include "HTTCP.h"
24: #include "HTFormat.h"
1.85 frystyk 25: #include "HTSocket.h"
1.2 timbl 26: #include "HTAlert.h"
27: #include "HTMIME.h"
1.21 luotonen 28: #include "HTAccess.h" /* HTRequest */
1.14 luotonen 29: #include "HTAABrow.h" /* Access Authorization */
1.20 timbl 30: #include "HTTee.h" /* Tee off a cache stream */
1.78 frystyk 31: #include "HTFWrite.h" /* Write to cache file */
1.90 ! frystyk 32: #include "HTCache.h"
1.80 frystyk 33: #include "HTWriter.h"
1.54 luotonen 34: #include "HTError.h"
1.55 frystyk 35: #include "HTChunk.h"
1.71 frystyk 36: #include "HTGuess.h"
37: #include "HTThread.h"
1.80 frystyk 38: #include "HTTPReq.h"
1.55 frystyk 39: #include "HTTP.h" /* Implements */
40:
41: /* Macros and other defines */
1.71 frystyk 42: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
43: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
44: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
45: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 46: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 47:
1.59 frystyk 48: /* Type definitions and global variables etc. local to this module */
49: /* This is the local definition of HTRequest->net_info */
50: typedef enum _HTTPState {
1.81 frystyk 51: HTTP_RETRY = -4,
1.71 frystyk 52: HTTP_ERROR = -3,
53: HTTP_NO_DATA = -2,
54: HTTP_GOT_DATA = -1,
55: HTTP_BEGIN = 0,
56: HTTP_NEED_CONNECTION,
57: HTTP_NEED_REQUEST,
58: HTTP_REDIRECTION,
59: HTTP_AA
1.59 frystyk 60: } HTTPState;
1.55 frystyk 61:
62: typedef struct _http_info {
1.78 frystyk 63: SOCKFD sockfd; /* Socket descripter */
1.71 frystyk 64: SockA sock_addr; /* SockA is defined in tcp.h */
1.68 frystyk 65: HTInputSocket * isoc; /* Input buffer */
1.80 frystyk 66: SocAction action; /* Result of the select call */
67: HTStream * target; /* Target stream */
1.71 frystyk 68: int addressCount; /* Attempts if multi-homed host */
69: time_t connecttime; /* Used on multihomed hosts */
70: struct _HTRequest * request; /* Link back to request structure */
1.68 frystyk 71:
1.81 frystyk 72: HTTPState state; /* Current State of the connection */
73: HTTPState next; /* Next state */
1.55 frystyk 74: } http_info;
75:
1.88 frystyk 76: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 77:
1.71 frystyk 78: struct _HTStream {
79: CONST HTStreamClass * isa;
80: HTStream * target;
81: HTRequest * request;
82: http_info * http;
83: HTSocketEOL state;
84: BOOL transparent;
1.81 frystyk 85: char * version; /* Should we save this? */
1.71 frystyk 86: int status;
1.81 frystyk 87: char * reason;
1.71 frystyk 88: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 89: int buflen;
1.71 frystyk 90: };
1.21 luotonen 91:
1.71 frystyk 92: /* ------------------------------------------------------------------------- */
93: /* Help Functions */
94: /* ------------------------------------------------------------------------- */
1.21 luotonen 95:
1.71 frystyk 96: /* HTTPCleanup
1.1 timbl 97: **
1.55 frystyk 98: ** This function closes the connection and frees memory.
1.1 timbl 99: **
1.55 frystyk 100: ** Returns 0 on OK, else -1
1.1 timbl 101: */
1.80 frystyk 102: PRIVATE int HTTPCleanup ARGS2(HTRequest *, req, BOOL, abort)
1.1 timbl 103: {
1.71 frystyk 104: http_info *http;
1.55 frystyk 105: int status = 0;
1.80 frystyk 106: if (!req || !req->net_info) {
1.78 frystyk 107: if (PROT_TRACE) fprintf(TDEST, "HTTPCleanup. Bad argument!\n");
1.55 frystyk 108: status = -1;
109: } else {
1.80 frystyk 110: http = (http_info *) req->net_info;
1.78 frystyk 111: if (http->sockfd != INVSOC) {
1.80 frystyk 112:
1.85 frystyk 113: if (http->target) {
1.88 frystyk 114:
115: /* Free stream with data TO network */
116: if (!HTRequest_isDestination(req)) {
117: if (abort)
118: (*req->input_stream->isa->abort)(req->input_stream, NULL);
119: else
1.85 frystyk 120: (*req->input_stream->isa->_free)(req->input_stream);
121: }
1.88 frystyk 122:
1.85 frystyk 123: /* Free stream with data FROM network */
1.80 frystyk 124: if (abort)
1.85 frystyk 125: (*http->target->isa->abort)(http->target, NULL);
1.80 frystyk 126: else
1.85 frystyk 127: (*http->target->isa->_free)(http->target);
1.80 frystyk 128: }
1.78 frystyk 129: if (PROT_TRACE)
130: fprintf(TDEST,"HTTP........ Closing socket %d\n",http->sockfd);
1.59 frystyk 131: if ((status = NETCLOSE(http->sockfd)) < 0)
1.78 frystyk 132: HTErrorSysAdd(http->request, ERR_FATAL, socerrno, NO,
133: "NETCLOSE");
1.71 frystyk 134: HTThreadState(http->sockfd, THD_CLOSE);
1.80 frystyk 135: http->sockfd = INVSOC;
1.71 frystyk 136: }
1.88 frystyk 137: HTThread_clear((HTNetInfo *) http);
1.71 frystyk 138: if (http->isoc)
139: HTInputSocket_free(http->isoc);
1.80 frystyk 140: free(http);
141: req->net_info = NULL;
1.55 frystyk 142: }
143: return status;
144: }
145:
146:
1.71 frystyk 147: PRIVATE BOOL HTTPAuthentication ARGS1(HTRequest *, request)
148: {
149: HTAAScheme scheme;
150: HTList *valid_schemes = HTList_new();
151: HTAssocList **scheme_specifics = NULL;
1.76 frystyk 152: char *tmplate = NULL;
1.71 frystyk 153:
154: if (request->WWWAAScheme) {
155: if ((scheme = HTAAScheme_enum(request->WWWAAScheme)) != HTAA_UNKNOWN) {
156: HTList_addObject(valid_schemes, (void *) scheme);
157: if (!scheme_specifics) {
158: int i;
159: scheme_specifics = (HTAssocList**)
160: malloc(HTAA_MAX_SCHEMES * sizeof(HTAssocList*));
161: if (!scheme_specifics)
162: outofmem(__FILE__, "HTTPAuthentication");
163: for (i=0; i < HTAA_MAX_SCHEMES; i++)
164: scheme_specifics[i] = NULL;
165: }
166: scheme_specifics[scheme] = HTAA_parseArgList(request->WWWAARealm);
167: } else if (PROT_TRACE) {
168: HTErrorAdd(request, ERR_INFO, NO, HTERR_UNKNOWN_AA,
169: (void *) request->WWWAAScheme, 0, "HTTPAuthentication");
170: return NO;
171: }
172: }
173: if (request->WWWprotection) {
174: if (PROT_TRACE)
1.78 frystyk 175: fprintf(TDEST, "Protection template set to `%s'\n",
1.71 frystyk 176: request->WWWprotection);
1.76 frystyk 177: StrAllocCopy(tmplate, request->WWWprotection);
1.71 frystyk 178: }
179: request->valid_schemes = valid_schemes;
180: request->scheme_specifics = scheme_specifics;
1.76 frystyk 181: request->prot_template = tmplate;
1.71 frystyk 182: return YES;
183: }
184:
185:
186: /*
187: ** This is a big switch handling all HTTP return codes. It puts in any
188: ** appropiate error message and decides whether we should expect data
1.78 frystyk 189: ** or not.
1.55 frystyk 190: */
1.81 frystyk 191: PRIVATE void HTTPNextState ARGS1(HTStream *, me)
1.55 frystyk 192: {
1.71 frystyk 193: switch (me->status) {
194:
1.78 frystyk 195: case 0: /* 0.9 response */
196: case 200:
197: case 201:
198: case 202:
199: case 203:
1.81 frystyk 200: me->http->next = HTTP_GOT_DATA;
1.71 frystyk 201: break;
1.78 frystyk 202:
203: case 204: /* No Response */
1.81 frystyk 204: me->http->next = HTTP_NO_DATA;
1.71 frystyk 205: break;
1.78 frystyk 206:
1.71 frystyk 207: case 301: /* Moved */
208: case 302: /* Found */
1.81 frystyk 209: me->http->next = HTTP_REDIRECTION;
1.71 frystyk 210: break;
1.55 frystyk 211:
1.71 frystyk 212: case 303: /* Method */
213: HTAlert("This client doesn't support automatic redirection of type `Method'");
1.81 frystyk 214: me->http->next = HTTP_ERROR;
1.71 frystyk 215: break;
1.55 frystyk 216:
1.78 frystyk 217: case 400: /* Bad Request */
218: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
1.81 frystyk 219: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
220: me->http->next = HTTP_ERROR;
1.71 frystyk 221: break;
1.70 howcome 222:
1.71 frystyk 223: case 401:
1.78 frystyk 224: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.81 frystyk 225: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
226: me->http->next = HTTP_AA;
1.71 frystyk 227: break;
228:
229: case 402: /* Payment required */
1.78 frystyk 230: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
1.81 frystyk 231: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
232: me->http->next = HTTP_ERROR;
1.71 frystyk 233: break;
1.55 frystyk 234:
1.71 frystyk 235: case 403: /* Forbidden */
1.78 frystyk 236: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
1.81 frystyk 237: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
238: me->http->next = HTTP_ERROR;
1.71 frystyk 239: break;
1.55 frystyk 240:
1.71 frystyk 241: case 404: /* Not Found */
1.78 frystyk 242: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
1.81 frystyk 243: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
244: me->http->next = HTTP_ERROR;
1.71 frystyk 245: break;
246:
1.78 frystyk 247: case 405: /* Not Allowed */
248: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
1.81 frystyk 249: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
250: me->http->next = HTTP_ERROR;
1.78 frystyk 251: break;
252:
253: case 406: /* None Acceptable */
254: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
1.81 frystyk 255: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
256: me->http->next = HTTP_ERROR;
1.78 frystyk 257: break;
258:
259: case 407: /* Proxy Authentication Required */
260: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PROXY,
1.81 frystyk 261: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
262: me->http->next = HTTP_ERROR;
1.78 frystyk 263: break;
264:
265: case 408: /* Request Timeout */
266: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
1.81 frystyk 267: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
268: me->http->next = HTTP_ERROR;
1.78 frystyk 269: break;
270:
1.71 frystyk 271: case 500:
1.78 frystyk 272: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
1.81 frystyk 273: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
274: me->http->next = HTTP_ERROR;
1.78 frystyk 275: break;
276:
1.71 frystyk 277: case 501:
1.78 frystyk 278: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
1.81 frystyk 279: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
280: me->http->next = HTTP_ERROR;
1.78 frystyk 281: break;
282:
283: case 502:
284: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
1.81 frystyk 285: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
286: me->http->next = HTTP_ERROR;
1.78 frystyk 287: break;
288:
289: case 503:
290: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_DOWN,
1.81 frystyk 291: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
292:
293: /* If Retry-After header is found then return HT_RETRY else HT_ERROR */
294: if (me->request->retry_after)
295: me->http->next = HTTP_RETRY;
296: else
297: me->http->next = HTTP_ERROR;
1.78 frystyk 298: break;
299:
300: case 504:
301: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
1.81 frystyk 302: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
303: me->http->next = HTTP_ERROR;
1.71 frystyk 304: break;
1.78 frystyk 305:
1.71 frystyk 306: default: /* bad number */
307: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.80 frystyk 308: (void *) me->buffer, me->buflen, "HTLoadHTTP");
1.81 frystyk 309: me->http->next = HTTP_ERROR;
1.71 frystyk 310: break;
1.55 frystyk 311: }
312: }
313:
1.71 frystyk 314: /* ------------------------------------------------------------------------- */
315: /* HTTP Status Line Stream */
316: /* ------------------------------------------------------------------------- */
1.55 frystyk 317:
1.71 frystyk 318: /*
1.80 frystyk 319: ** Analyse the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 320: ** then create a MIME-stream, else create a Guess stream to find out
321: ** what the 0.9 server is sending. We need to copy the buffer as we don't
322: ** know if we can modify the contents or not.
1.78 frystyk 323: **
324: ** Stream handling is a function of the status code returned from the
325: ** server:
326: ** 200: Use `output_stream' in HTRequest structure
1.80 frystyk 327: ** else: Use `error_stream' in HTRequest structure
328: **
329: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 330: */
1.80 frystyk 331: PRIVATE int stream_pipe ARGS1(HTStream *, me)
1.56 frystyk 332: {
1.71 frystyk 333: HTRequest *req = me->request;
1.80 frystyk 334: if (me->target) {
335: int status = PUTBLOCK(me->buffer, me->buflen);
336: if (status == HT_OK)
337: me->transparent = YES;
338: return status;
1.88 frystyk 339: } else if (HTRequest_isSource(req) && !req->output_stream) {
340: /*
341: ** We need to wait for the destinations to get ready
342: */
343: return HT_WOULD_BLOCK;
1.80 frystyk 344: }
1.88 frystyk 345:
1.81 frystyk 346: if (strncasecomp(me->buffer, "http/", 5)) {
1.80 frystyk 347: int status;
348: HTErrorAdd(req, ERR_INFO, NO, HTERR_HTTP09,
349: (void *) me->buffer, me->buflen, "HTTPStatusStream");
350: me->target = HTGuess_new(req, NULL, WWW_UNKNOWN,
351: req->output_format, req->output_stream);
1.88 frystyk 352: me->http->next = HTTP_GOT_DATA;
1.80 frystyk 353: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
354: me->transparent = YES;
355: return status;
356: } else {
1.81 frystyk 357: char *ptr = me->buffer+5; /* Skip the HTTP part */
358: me->version = HTNextField(&ptr);
359: me->status = atoi(HTNextField(&ptr));
360: me->reason = ptr;
361: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
362: *ptr = '0円';
363: else if ((ptr = strchr(me->reason, '\n')) != NULL)
364: *ptr = '0円';
365:
366: /* Set up the streams */
367: if (me->status==200) {
1.80 frystyk 368: HTStream *s;
1.85 frystyk 369: if (req->output_format == WWW_SOURCE) {
370: me->target = HTMIMEConvert(req, NULL, WWW_MIME,
371: req->output_format,
372: req->output_stream);
373: } else {
374: me->target = HTStreamStack(WWW_MIME, req->output_format,
375: req->output_stream, req, NO);
1.80 frystyk 376:
1.85 frystyk 377: /* howcome: test for return value from HTCacheWriter 12/1/95 */
378: if (req->method==METHOD_GET && HTCache_isEnabled() &&
379: (s = HTCacheWriter(req, NULL, WWW_MIME, req->output_format,
380: req->output_stream))) {
381: me->target = HTTee(me->target, s);
382: }
1.89 frystyk 383: }
1.71 frystyk 384: } else {
1.81 frystyk 385: me->target = HTMIMEConvert(req, NULL, WWW_MIME, req->error_format,
386: req->error_stream);
1.56 frystyk 387: }
1.80 frystyk 388: if (!me->target)
389: me->target = HTBlackHole(); /* What else */
1.56 frystyk 390: }
1.81 frystyk 391: HTTPNextState(me); /* Get next state */
1.80 frystyk 392: me->transparent = YES;
393: return HT_OK;
1.71 frystyk 394: }
1.56 frystyk 395:
1.80 frystyk 396: /*
397: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
398: ** is found
399: */
400: PRIVATE int HTTPStatus_put_block ARGS3(HTStream *, me, CONST char*, b, int, l)
1.71 frystyk 401: {
1.80 frystyk 402: while (!me->transparent && l-- > 0) {
403: int status;
404: if (me->target) {
405: if ((status = stream_pipe(me)) != HT_OK)
406: return status;
407: } else {
408: *(me->buffer+me->buflen++) = *b;
409: if (me->state == EOL_FCR) {
410: if (*b == LF) { /* Line found */
411: if ((status = stream_pipe(me)) != HT_OK)
412: return status;
413: } else {
414: me->state = EOL_BEGIN;
415: }
416: } else if (*b == CR) {
417: me->state = EOL_FCR;
418: } else if (*b == LF) {
419: if ((status = stream_pipe(me)) != HT_OK)
420: return status;
1.71 frystyk 421: } else {
1.80 frystyk 422: if (me->buflen >= MAX_STATUS_LEN) {
423: if ((status = stream_pipe(me)) != HT_OK)
424: return status;
425: }
1.71 frystyk 426: }
1.80 frystyk 427: b++;
1.71 frystyk 428: }
1.56 frystyk 429: }
1.88 frystyk 430: if (me->target) { /* Is the stream set up? */
431: if (l > 0) /* Anything left? */
432: return PUTBLOCK(b, l);
433: return HT_OK;
434: }
435: return HT_WOULD_BLOCK;
1.56 frystyk 436: }
437:
1.80 frystyk 438: PRIVATE int HTTPStatus_put_string ARGS2(HTStream *, me, CONST char*, s)
1.71 frystyk 439: {
1.80 frystyk 440: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 441: }
1.56 frystyk 442:
1.80 frystyk 443: PRIVATE int HTTPStatus_put_character ARGS2(HTStream *, me, char, c)
1.71 frystyk 444: {
1.80 frystyk 445: return HTTPStatus_put_block(me, &c, 1);
446: }
447:
448: PRIVATE int HTTPStatus_flush ARGS1(HTStream *, me)
449: {
450: return (*me->target->isa->flush)(me->target);
1.71 frystyk 451: }
452:
453: PRIVATE int HTTPStatus_free ARGS1(HTStream *, me)
454: {
1.87 frystyk 455: int status = HT_OK;
456: if (me->target) {
457: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
458: return HT_WOULD_BLOCK;
459: }
1.71 frystyk 460: free(me);
1.80 frystyk 461: return HT_OK;
1.71 frystyk 462: }
463:
464: PRIVATE int HTTPStatus_abort ARGS2(HTStream *, me, HTError, e)
465: {
466: if (me->target)
1.74 frystyk 467: ABORT_TARGET;
1.71 frystyk 468: free(me);
1.74 frystyk 469: if (PROT_TRACE)
1.80 frystyk 470: fprintf(TDEST, "HTTPStatus.. ABORTING...\n");
471: return HT_ERROR;
1.71 frystyk 472: }
473:
474: /* HTTPStatus Stream
475: ** -----------------
476: */
477: PRIVATE CONST HTStreamClass HTTPStatusClass =
478: {
479: "HTTPStatus",
1.80 frystyk 480: HTTPStatus_flush,
1.71 frystyk 481: HTTPStatus_free,
482: HTTPStatus_abort,
483: HTTPStatus_put_character,
484: HTTPStatus_put_string,
485: HTTPStatus_put_block
486: };
487:
488: PUBLIC HTStream * HTTPStatus_new ARGS2(HTRequest *, request,
489: http_info *, http)
490: {
491: HTStream * me = (HTStream *) calloc(1, sizeof(HTStream));
492: if (!me) outofmem(__FILE__, "HTTPStatus_new");
493: me->isa = &HTTPStatusClass;
494: me->request = request;
495: me->http = http;
496: me->state = EOL_BEGIN;
497: return me;
498: }
499:
500: /* ------------------------------------------------------------------------- */
501:
502: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 503: ** ==============================
504: **
505: ** Given a hypertext address, this routine loads a document.
506: **
507: ** On entry,
508: ** request This is the request structure
509: ** On exit,
1.80 frystyk 510: ** returns HT_ERROR Error has occured or interrupted
1.88 frystyk 511: ** HT_OK Generic dummy: We are not finished!
1.71 frystyk 512: ** HT_WOULD_BLOCK if operation would have blocked
1.58 frystyk 513: ** HT_LOADED if return status 200 OK
514: ** HT_NO_DATA if return status 204 No Response
1.81 frystyk 515: ** HT_RETRY if return status 503 Service Unavail.
1.55 frystyk 516: */
517: PUBLIC int HTLoadHTTP ARGS1 (HTRequest *, request)
518: {
1.71 frystyk 519: int status = HT_ERROR;
520: char *url; /* Gets initialized on every entry */
1.55 frystyk 521: http_info *http; /* Specific protocol information */
522:
523: if (!request || !request->anchor) {
1.78 frystyk 524: if (PROT_TRACE) fprintf(TDEST, "HTLoadHTTP.. Bad argument\n");
1.71 frystyk 525: return HT_ERROR;
1.55 frystyk 526: }
527: url = HTAnchor_physical(request->anchor);
1.17 timbl 528:
1.71 frystyk 529: /* Only do the setup first time through. This is actually state HTTP_BEGIN
530: but it can't be in the state machine as we need the structure first */
531: if (!request->net_info) {
1.22 luotonen 532: /*
1.71 frystyk 533: ** Initiate a new http structure and bind to request structure
534: ** This is actually state HTTP_BEGIN, but it can't be in the state
535: ** machine as we need the structure first.
1.22 luotonen 536: */
1.80 frystyk 537: if (PROT_TRACE) fprintf(TDEST, "HTTP........ Looking for `%s\'\n",url);
1.71 frystyk 538: if ((http = (http_info *) calloc(1, sizeof(http_info))) == NULL)
539: outofmem(__FILE__, "HTLoadHTTP");
1.78 frystyk 540: http->sockfd = INVSOC; /* Invalid socket number */
1.71 frystyk 541: http->request = request;
542: http->state = HTTP_BEGIN;
1.85 frystyk 543: http->next = HTTP_ERROR;
1.71 frystyk 544: request->net_info = (HTNetInfo *) http;
545: HTThread_new((HTNetInfo *) http);
1.85 frystyk 546: } else {
1.71 frystyk 547: http = (http_info *) request->net_info; /* Get existing copy */
1.88 frystyk 548: if (HTThreadIntr(http->sockfd)) {
549: HTTPCleanup(request, YES);
550: return HTRequest_isMainDestination(request) ? HT_ERROR : HT_OK;
551: }
1.85 frystyk 552: }
1.71 frystyk 553:
554: /* Now jump into the machine. We know the state from the previous run */
555: while (1) {
556: switch (http->state) {
557: case HTTP_BEGIN:
558: /*
559: ** Compose authorization information (this was moved here
560: ** from after the making of the connection so that the connection
561: ** wouldn't have to wait while prompting username and password
562: ** from the user). -- AL 13.10.93
563: */
564: HTAA_composeAuth(request);
565: if (PROT_TRACE) {
566: if (request->authorization)
1.78 frystyk 567: fprintf(TDEST, "HTTP........ Sending Authorization: %s\n",
1.71 frystyk 568: request->authorization);
569: else
1.78 frystyk 570: fprintf(TDEST,
1.71 frystyk 571: "HTTP........ Not sending authorization (yet)\n");
572: }
573: http->state = HTTP_NEED_CONNECTION;
574: break;
575:
576: case HTTP_NEED_CONNECTION: /* Now let's set up a connection */
577: status = HTDoConnect((HTNetInfo *) http, url, TCP_PORT,
578: NULL, NO);
1.80 frystyk 579: if (status == HT_OK) {
1.71 frystyk 580: if (PROT_TRACE)
1.78 frystyk 581: fprintf(TDEST, "HTTP........ Connected, socket %d\n",
1.71 frystyk 582: http->sockfd);
1.80 frystyk 583:
1.88 frystyk 584: /* Set up stream TO network */
585: request->input_stream =
586: HTTPRequest_new(request, HTWriter_new(http->sockfd, YES));
587:
588: /*
589: ** Set up concurrent read/write if this request isn't the
590: ** source for a PUT or POST. As source we don't start reading
591: ** before all destinations are ready. If destination then
592: ** register the input stream and get ready for read
593: */
594: if (HTRequest_isPostWeb(request)) {
595: HTThreadState(http->sockfd, THD_SET_READ);
596: HTRequest_linkDestination(request);
597: }
598:
599: /* Set up stream FROM network and corresponding read buffer */
1.71 frystyk 600: http->isoc = HTInputSocket_new(http->sockfd);
1.80 frystyk 601: http->target = HTImProxy ?
602: request->output_stream : HTTPStatus_new(request, http);
1.88 frystyk 603:
1.71 frystyk 604: http->state = HTTP_NEED_REQUEST;
605: } else if (status == HT_WOULD_BLOCK)
606: return status;
607: else
608: http->state = HTTP_ERROR; /* Error or interrupt */
609: break;
610:
1.87 frystyk 611: /* As we can do simultanous read and write this is now one state */
1.80 frystyk 612: case HTTP_NEED_REQUEST:
613: if (http->action == SOC_WRITE) {
1.88 frystyk 614: if (HTRequest_isDestination(request)) {
615: HTThreadStateByRequest(request->source, THD_SET_READ);
616: return HT_WOULD_BLOCK;
1.80 frystyk 617: }
1.88 frystyk 618: status = request->PostCallBack ?
619: request->PostCallBack(request, request->input_stream) :
620: (*request->input_stream->isa->flush)(request->input_stream);
1.71 frystyk 621: if (status == HT_WOULD_BLOCK)
1.80 frystyk 622: return HT_WOULD_BLOCK;
623: else if (status == HT_INTERRUPTED)
624: http->state = HTTP_ERROR;
1.88 frystyk 625: else {
1.80 frystyk 626: http->action = SOC_READ;
1.88 frystyk 627: }
1.80 frystyk 628: } else if (http->action == SOC_READ) {
629: status = HTSocketRead(request, http->target);
630: if (status == HT_WOULD_BLOCK)
631: return HT_WOULD_BLOCK;
632: else if (status == HT_INTERRUPTED)
1.71 frystyk 633: http->state = HTTP_ERROR;
1.85 frystyk 634: else {
635: http->state = http->next; /* Jump to next state */
636: }
1.90 ! frystyk 637: } else {
1.78 frystyk 638: http->state = HTTP_ERROR;
1.90 ! frystyk 639: }
1.71 frystyk 640: break;
1.80 frystyk 641:
642: case HTTP_REDIRECTION:
1.88 frystyk 643: /* Clean up the other connections or just this one */
644: if (HTRequest_isPostWeb(request))
645: HTRequest_killPostWeb(request);
646: else
647: HTTPCleanup(request, NO);
648:
649: /* If we found a new URL in the response */
1.71 frystyk 650: if (request->redirect) {
651: if (status == 301) {
652: HTErrorAdd(request, ERR_INFO, NO, HTERR_MOVED,
653: (void *) request->redirect,
654: (int) strlen(request->redirect), "HTLoadHTTP");
655: } else if (status == 302) {
656: HTErrorAdd(request, ERR_INFO, NO, HTERR_FOUND,
657: (void *) request->redirect,
658: (int) strlen(request->redirect), "HTLoadHTTP");
1.55 frystyk 659: }
1.88 frystyk 660:
661: /* If we haven't reached the limit for redirection */
1.71 frystyk 662: if (++request->redirections < HTMaxRedirections) {
1.87 frystyk 663: HTAnchor *anchor = HTAnchor_findAddress(request->redirect);
1.88 frystyk 664: if (HTRequest_isPostWeb(request)) {
665: HTRequest *dest = HTRequest_mainDestination(request);
666: char *msg=(char*)malloc(strlen(request->redirect)+100);
1.87 frystyk 667: if (!msg) outofmem(__FILE__, "HTLoadHTTP");
1.88 frystyk 668: sprintf(msg, "\nLocation of %s has changed to %s for method %s, continue operation?",
669: HTRequest_isDestination(request) ?
670: "destination" : "source", request->redirect,
671: HTMethod_name(request->method));
672: if (HTConfirm(msg)) {
1.87 frystyk 673: free(msg);
1.88 frystyk 674:
675: /* The new anchor inherits the Post Web */
676: HTAnchor_moveLinks((HTAnchor *) request->anchor,
677: anchor);
678: if (HTRequest_isSource(request))
679: HTRequest_delete(request);
680: return HTCopyAnchor((HTAnchor *) anchor, dest);
1.87 frystyk 681: }
682: free(msg);
1.88 frystyk 683: return HT_ERROR;
684: } if (request->PostCallBack) {
1.87 frystyk 685: #if 0
1.88 frystyk 686: return HTUploadAnchor((HTAnchor*) anchor, request);
1.87 frystyk 687: #endif
688: } else {
689: return HTLoadAnchor((HTAnchor *) anchor, request);
690: }
1.71 frystyk 691: } else {
692: HTErrorAdd(request, ERR_FATAL, NO, HTERR_MAX_REDIRECT,
1.58 frystyk 693: NULL, 0, "HTLoadHTTP");
1.88 frystyk 694: if (HTRequest_isPostWeb(request)) {
695: BOOL main = HTRequest_isMainDestination(request);
696: HTRequest_removeDestination(request);
697: return main ? HT_ERROR : HT_OK;
698: }
699: return HT_ERROR;
1.58 frystyk 700: }
1.71 frystyk 701: } else {
702: HTErrorAdd(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
703: NULL, 0, "HTLoadHTTP");
1.88 frystyk 704: return HT_ERROR;
1.71 frystyk 705: }
706: break;
1.80 frystyk 707:
1.71 frystyk 708: case HTTP_AA:
1.88 frystyk 709: /* Clean up the other connections or just this one */
710: if (HTRequest_isPostWeb(request))
711: HTRequest_killPostWeb(request);
712: else
713: HTTPCleanup(request, NO);
714:
715: /* Ask the user for a UserID and a passwd */
716: if (HTTPAuthentication(request) && HTAA_retryWithAuth(request)) {
717: if (HTRequest_isPostWeb(request)) {
718: HTRequest *dest = HTRequest_mainDestination(request);
719: HTAnchor_appendMethods(request->anchor, request->method);
720: return HTCopyAnchor((HTAnchor *) request->source->anchor,
721: dest);
1.85 frystyk 722: } else if (request->PostCallBack) {
723: #if 0
1.88 frystyk 724: return HTUploadAnchor((HTAnchor*) request->anchor,request);
1.85 frystyk 725: #endif
726: } else {
727: return HTLoadAnchor((HTAnchor *) request->anchor, request);
728: }
1.88 frystyk 729: } else { /* If the guy said no :-( */
1.71 frystyk 730: char *unescaped = NULL;
731: StrAllocCopy(unescaped, url);
732: HTUnEscape(unescaped);
733: HTErrorAdd(request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
734: (void *) unescaped,
735: (int) strlen(unescaped), "HTLoadHTTP");
736: free(unescaped);
1.88 frystyk 737: if (HTRequest_isPostWeb(request)) {
738: BOOL main = HTRequest_isMainDestination(request);
739: HTRequest_removeDestination(request);
740: return main ? HT_ERROR : HT_OK;
741: }
1.80 frystyk 742: return HT_ERROR;
1.71 frystyk 743: }
744: break;
1.80 frystyk 745:
1.71 frystyk 746: case HTTP_GOT_DATA:
1.80 frystyk 747: HTTPCleanup(request, NO);
1.88 frystyk 748: if (HTRequest_isPostWeb(request)) {
749: BOOL main = HTRequest_isMainDestination(request);
750: HTRequest_removeDestination(request);
751: return main ? HT_LOADED : HT_OK;
752: }
753: return HT_LOADED;
1.71 frystyk 754: break;
755:
756: case HTTP_NO_DATA:
1.80 frystyk 757: HTTPCleanup(request, NO);
1.88 frystyk 758: if (HTRequest_isPostWeb(request)) {
759: BOOL main = HTRequest_isMainDestination(request);
760: HTRequest_removeDestination(request);
761: return main ? HT_NO_DATA : HT_OK;
762: }
1.71 frystyk 763: return HT_NO_DATA;
764: break;
1.80 frystyk 765:
1.88 frystyk 766: case HTTP_RETRY: /* Treat this as an error state for now */
767: if (HTRequest_isPostWeb(request))
768: HTRequest_killPostWeb(request);
769: else
770: HTTPCleanup(request, YES);
771: if (HTRequest_isPostWeb(request)) {
772: BOOL main = HTRequest_isMainDestination(request);
773: HTRequest_removeDestination(request);
774: return main ? HT_RETRY : HT_OK;
775: }
1.81 frystyk 776: return HT_RETRY;
777: break;
778:
1.71 frystyk 779: case HTTP_ERROR:
1.88 frystyk 780: /* Clean up the other connections or just this one */
781: if (HTRequest_isPostWeb(request)) {
782: if (http->sockfd == INVSOC)
783: HTTPCleanup(request, YES); /* If no valid socket */
784: HTRequest_killPostWeb(request);
785: } else
786: HTTPCleanup(request, YES);
787: if (HTRequest_isPostWeb(request)) {
788: BOOL main = HTRequest_isMainDestination(request);
789: HTRequest_removeDestination(request);
790: return main ? HT_ERROR : HT_OK;
791: }
1.71 frystyk 792: return HT_ERROR;
793: break;
794: }
795: } /* End of while(1) */
796: }
797:
798: /* Protocol descriptor */
799:
800: GLOBALDEF PUBLIC HTProtocol HTTP = {
801: "http", SOC_NON_BLOCK, HTLoadHTTP, NULL, NULL
802: };
1.88 frystyk 803:
1.21 luotonen 804:
Webmaster