Annotation of libwww/Library/src/HTTP.c, revision 1.98
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
6: **
7: ** This module implments the HTTP protocol as a state machine
1.55 frystyk 8: **
9: ** History:
1.59 frystyk 10: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 11: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
12: ** Forward, redirection, error handling and referer field
1.67 duns 13: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 14: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 15: **
1.1 timbl 16: */
17:
1.78 frystyk 18: /* Library include files */
19: #include "tcp.h"
1.1 timbl 20: #include "HTUtils.h"
1.78 frystyk 21: #include "HTString.h"
1.71 frystyk 22: #include "HTParse.h"
1.1 timbl 23: #include "HTTCP.h"
24: #include "HTFormat.h"
1.85 frystyk 25: #include "HTSocket.h"
1.94 frystyk 26: #include "HTReqMan.h"
1.2 timbl 27: #include "HTAlert.h"
28: #include "HTMIME.h"
1.14 luotonen 29: #include "HTAABrow.h" /* Access Authorization */
1.20 timbl 30: #include "HTTee.h" /* Tee off a cache stream */
1.78 frystyk 31: #include "HTFWrite.h" /* Write to cache file */
1.90 frystyk 32: #include "HTCache.h"
1.80 frystyk 33: #include "HTWriter.h"
1.54 luotonen 34: #include "HTError.h"
1.94 frystyk 35: #include "HTAccess.h"
1.55 frystyk 36: #include "HTChunk.h"
1.71 frystyk 37: #include "HTGuess.h"
1.95 frystyk 38: #include "HTNetMan.h"
1.80 frystyk 39: #include "HTTPReq.h"
1.55 frystyk 40: #include "HTTP.h" /* Implements */
41:
42: /* Macros and other defines */
1.94 frystyk 43: #ifndef HTTP_PORT
44: #define HTTP_PORT 80 /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
45: #endif
46:
1.71 frystyk 47: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
48: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
49: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
50: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 51: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 52:
1.59 frystyk 53: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 54:
55: /* Final states have negative value */
1.59 frystyk 56: typedef enum _HTTPState {
1.81 frystyk 57: HTTP_RETRY = -4,
1.71 frystyk 58: HTTP_ERROR = -3,
59: HTTP_NO_DATA = -2,
60: HTTP_GOT_DATA = -1,
61: HTTP_BEGIN = 0,
62: HTTP_NEED_CONNECTION,
63: HTTP_NEED_REQUEST,
64: HTTP_REDIRECTION,
1.91 frystyk 65: HTTP_NOT_MODIFIED,
66: HTTP_EXPIRED,
1.71 frystyk 67: HTTP_AA
1.59 frystyk 68: } HTTPState;
1.55 frystyk 69:
1.94 frystyk 70: /* This is the context structure for the this module */
1.55 frystyk 71: typedef struct _http_info {
1.81 frystyk 72: HTTPState state; /* Current State of the connection */
73: HTTPState next; /* Next state */
1.55 frystyk 74: } http_info;
75:
1.88 frystyk 76: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 77:
1.71 frystyk 78: struct _HTStream {
79: CONST HTStreamClass * isa;
80: HTStream * target;
81: HTRequest * request;
82: http_info * http;
83: HTSocketEOL state;
84: BOOL transparent;
1.81 frystyk 85: char * version; /* Should we save this? */
1.71 frystyk 86: int status;
1.81 frystyk 87: char * reason;
1.71 frystyk 88: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 89: int buflen;
1.71 frystyk 90: };
1.21 luotonen 91:
1.71 frystyk 92: /* ------------------------------------------------------------------------- */
93: /* Help Functions */
94: /* ------------------------------------------------------------------------- */
1.21 luotonen 95:
1.94 frystyk 96: /* HTTPCleanup
97: ** -----------
1.55 frystyk 98: ** This function closes the connection and frees memory.
1.94 frystyk 99: ** Returns YES on OK, else NO
1.1 timbl 100: */
1.94 frystyk 101: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 102: {
1.94 frystyk 103: HTNet *net = req->net;
104: http_info *http = (http_info *) net->context;
1.80 frystyk 105:
1.94 frystyk 106: /* Free stream with data TO network */
107: if (!HTRequest_isDestination(req) && req->input_stream) {
108: if (status == HT_INTERRUPTED)
109: (*req->input_stream->isa->abort)(req->input_stream, NULL);
110: else
111: (*req->input_stream->isa->_free)(req->input_stream);
112: }
1.88 frystyk 113:
1.94 frystyk 114: /* Remove the request object and our own context structure for http */
115: HTNet_delete(net, status);
116: FREE(http);
117: return YES;
1.55 frystyk 118: }
119:
120:
1.94 frystyk 121: PRIVATE BOOL HTTPAuthentication (HTRequest * request)
1.71 frystyk 122: {
123: HTAAScheme scheme;
124: HTList *valid_schemes = HTList_new();
125: HTAssocList **scheme_specifics = NULL;
1.76 frystyk 126: char *tmplate = NULL;
1.71 frystyk 127:
128: if (request->WWWAAScheme) {
129: if ((scheme = HTAAScheme_enum(request->WWWAAScheme)) != HTAA_UNKNOWN) {
130: HTList_addObject(valid_schemes, (void *) scheme);
131: if (!scheme_specifics) {
132: int i;
133: scheme_specifics = (HTAssocList**)
134: malloc(HTAA_MAX_SCHEMES * sizeof(HTAssocList*));
135: if (!scheme_specifics)
136: outofmem(__FILE__, "HTTPAuthentication");
137: for (i=0; i < HTAA_MAX_SCHEMES; i++)
138: scheme_specifics[i] = NULL;
139: }
140: scheme_specifics[scheme] = HTAA_parseArgList(request->WWWAARealm);
141: } else if (PROT_TRACE) {
142: HTErrorAdd(request, ERR_INFO, NO, HTERR_UNKNOWN_AA,
143: (void *) request->WWWAAScheme, 0, "HTTPAuthentication");
144: return NO;
145: }
146: }
147: if (request->WWWprotection) {
148: if (PROT_TRACE)
1.78 frystyk 149: fprintf(TDEST, "Protection template set to `%s'\n",
1.71 frystyk 150: request->WWWprotection);
1.76 frystyk 151: StrAllocCopy(tmplate, request->WWWprotection);
1.71 frystyk 152: }
153: request->valid_schemes = valid_schemes;
154: request->scheme_specifics = scheme_specifics;
1.76 frystyk 155: request->prot_template = tmplate;
1.71 frystyk 156: return YES;
157: }
158:
159:
160: /*
161: ** This is a big switch handling all HTTP return codes. It puts in any
162: ** appropiate error message and decides whether we should expect data
1.78 frystyk 163: ** or not.
1.55 frystyk 164: */
1.81 frystyk 165: PRIVATE void HTTPNextState ARGS1(HTStream *, me)
1.55 frystyk 166: {
1.71 frystyk 167: switch (me->status) {
168:
1.78 frystyk 169: case 0: /* 0.9 response */
170: case 200:
171: case 201:
172: case 202:
173: case 203:
1.81 frystyk 174: me->http->next = HTTP_GOT_DATA;
1.71 frystyk 175: break;
1.78 frystyk 176:
177: case 204: /* No Response */
1.81 frystyk 178: me->http->next = HTTP_NO_DATA;
1.71 frystyk 179: break;
1.78 frystyk 180:
1.71 frystyk 181: case 301: /* Moved */
182: case 302: /* Found */
1.81 frystyk 183: me->http->next = HTTP_REDIRECTION;
1.71 frystyk 184: break;
1.55 frystyk 185:
1.71 frystyk 186: case 303: /* Method */
1.92 frystyk 187: HTAlert(me->request,
188: "This client doesn't support automatic redirection of type `Method'");
1.81 frystyk 189: me->http->next = HTTP_ERROR;
1.71 frystyk 190: break;
1.91 frystyk 191:
192: case 304: /* Not Modified */
193: me->http->next = HTTP_NOT_MODIFIED;
194: break;
1.55 frystyk 195:
1.78 frystyk 196: case 400: /* Bad Request */
197: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
1.81 frystyk 198: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
199: me->http->next = HTTP_ERROR;
1.71 frystyk 200: break;
1.70 howcome 201:
1.71 frystyk 202: case 401:
1.78 frystyk 203: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.81 frystyk 204: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
205: me->http->next = HTTP_AA;
1.71 frystyk 206: break;
207:
208: case 402: /* Payment required */
1.78 frystyk 209: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
1.81 frystyk 210: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
211: me->http->next = HTTP_ERROR;
1.71 frystyk 212: break;
1.55 frystyk 213:
1.71 frystyk 214: case 403: /* Forbidden */
1.78 frystyk 215: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
1.81 frystyk 216: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
217: me->http->next = HTTP_ERROR;
1.71 frystyk 218: break;
1.55 frystyk 219:
1.71 frystyk 220: case 404: /* Not Found */
1.78 frystyk 221: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
1.81 frystyk 222: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
223: me->http->next = HTTP_ERROR;
1.71 frystyk 224: break;
225:
1.78 frystyk 226: case 405: /* Not Allowed */
227: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
1.81 frystyk 228: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
229: me->http->next = HTTP_ERROR;
1.78 frystyk 230: break;
231:
232: case 406: /* None Acceptable */
233: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
1.81 frystyk 234: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
235: me->http->next = HTTP_ERROR;
1.78 frystyk 236: break;
237:
238: case 407: /* Proxy Authentication Required */
239: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PROXY,
1.81 frystyk 240: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
241: me->http->next = HTTP_ERROR;
1.78 frystyk 242: break;
243:
244: case 408: /* Request Timeout */
245: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
1.81 frystyk 246: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
247: me->http->next = HTTP_ERROR;
1.78 frystyk 248: break;
249:
1.71 frystyk 250: case 500:
1.78 frystyk 251: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
1.81 frystyk 252: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
253: me->http->next = HTTP_ERROR;
1.78 frystyk 254: break;
255:
1.71 frystyk 256: case 501:
1.78 frystyk 257: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
1.81 frystyk 258: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
259: me->http->next = HTTP_ERROR;
1.78 frystyk 260: break;
261:
262: case 502:
263: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
1.81 frystyk 264: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
265: me->http->next = HTTP_ERROR;
1.78 frystyk 266: break;
267:
268: case 503:
269: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_DOWN,
1.81 frystyk 270: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
271:
272: /* If Retry-After header is found then return HT_RETRY else HT_ERROR */
273: if (me->request->retry_after)
274: me->http->next = HTTP_RETRY;
275: else
276: me->http->next = HTTP_ERROR;
1.78 frystyk 277: break;
278:
279: case 504:
280: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
1.81 frystyk 281: me->reason, (int) strlen(me->reason), "HTLoadHTTP");
282: me->http->next = HTTP_ERROR;
1.71 frystyk 283: break;
1.78 frystyk 284:
1.71 frystyk 285: default: /* bad number */
286: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.80 frystyk 287: (void *) me->buffer, me->buflen, "HTLoadHTTP");
1.81 frystyk 288: me->http->next = HTTP_ERROR;
1.71 frystyk 289: break;
1.55 frystyk 290: }
291: }
292:
1.71 frystyk 293: /* ------------------------------------------------------------------------- */
294: /* HTTP Status Line Stream */
295: /* ------------------------------------------------------------------------- */
1.55 frystyk 296:
1.71 frystyk 297: /*
1.80 frystyk 298: ** Analyse the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 299: ** then create a MIME-stream, else create a Guess stream to find out
300: ** what the 0.9 server is sending. We need to copy the buffer as we don't
301: ** know if we can modify the contents or not.
1.78 frystyk 302: **
303: ** Stream handling is a function of the status code returned from the
304: ** server:
305: ** 200: Use `output_stream' in HTRequest structure
1.94 frystyk 306: ** else: Use `debug_stream' in HTRequest structure
1.80 frystyk 307: **
308: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 309: */
1.80 frystyk 310: PRIVATE int stream_pipe ARGS1(HTStream *, me)
1.56 frystyk 311: {
1.71 frystyk 312: HTRequest *req = me->request;
1.95 frystyk 313: HTNet *net = req->net;
1.80 frystyk 314: if (me->target) {
315: int status = PUTBLOCK(me->buffer, me->buflen);
316: if (status == HT_OK)
317: me->transparent = YES;
318: return status;
1.88 frystyk 319: } else if (HTRequest_isSource(req) && !req->output_stream) {
320: /*
321: ** We need to wait for the destinations to get ready
322: */
323: return HT_WOULD_BLOCK;
1.80 frystyk 324: }
1.88 frystyk 325:
1.81 frystyk 326: if (strncasecomp(me->buffer, "http/", 5)) {
1.80 frystyk 327: int status;
328: HTErrorAdd(req, ERR_INFO, NO, HTERR_HTTP09,
329: (void *) me->buffer, me->buflen, "HTTPStatusStream");
330: me->target = HTGuess_new(req, NULL, WWW_UNKNOWN,
331: req->output_format, req->output_stream);
1.88 frystyk 332: me->http->next = HTTP_GOT_DATA;
1.80 frystyk 333: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
334: me->transparent = YES;
1.98 ! frystyk 335: HTDNS_setServerVersion(net->dns, HTTP_09);
1.80 frystyk 336: return status;
337: } else {
1.81 frystyk 338: char *ptr = me->buffer+5; /* Skip the HTTP part */
339: me->version = HTNextField(&ptr);
1.95 frystyk 340:
341: /* here we want to find out when to use persistent connection */
1.98 ! frystyk 342: HTDNS_setServerVersion(net->dns, HTTP_10);
1.95 frystyk 343:
1.81 frystyk 344: me->status = atoi(HTNextField(&ptr));
345: me->reason = ptr;
346: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
347: *ptr = '0円';
348: else if ((ptr = strchr(me->reason, '\n')) != NULL)
349: *ptr = '0円';
350:
351: /* Set up the streams */
352: if (me->status==200) {
1.80 frystyk 353: HTStream *s;
1.85 frystyk 354: if (req->output_format == WWW_SOURCE) {
355: me->target = HTMIMEConvert(req, NULL, WWW_MIME,
356: req->output_format,
357: req->output_stream);
358: } else {
359: me->target = HTStreamStack(WWW_MIME, req->output_format,
360: req->output_stream, req, NO);
1.80 frystyk 361:
1.85 frystyk 362: /* howcome: test for return value from HTCacheWriter 12/1/95 */
363: if (req->method==METHOD_GET && HTCache_isEnabled() &&
364: (s = HTCacheWriter(req, NULL, WWW_MIME, req->output_format,
365: req->output_stream))) {
366: me->target = HTTee(me->target, s);
367: }
1.89 frystyk 368: }
1.94 frystyk 369: } else if (req->debug_stream) {
370: me->target = HTStreamStack(WWW_MIME, req->debug_format,
371: req->debug_stream, req, NO);
1.71 frystyk 372: } else {
1.94 frystyk 373: me->target = HTMIMEConvert(req, NULL, WWW_MIME, WWW_PRESENT,
374: HTBlackHole());
1.56 frystyk 375: }
1.80 frystyk 376: if (!me->target)
377: me->target = HTBlackHole(); /* What else */
1.56 frystyk 378: }
1.81 frystyk 379: HTTPNextState(me); /* Get next state */
1.80 frystyk 380: me->transparent = YES;
381: return HT_OK;
1.71 frystyk 382: }
1.56 frystyk 383:
1.80 frystyk 384: /*
385: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
386: ** is found
387: */
388: PRIVATE int HTTPStatus_put_block ARGS3(HTStream *, me, CONST char*, b, int, l)
1.71 frystyk 389: {
1.80 frystyk 390: while (!me->transparent && l-- > 0) {
391: int status;
392: if (me->target) {
393: if ((status = stream_pipe(me)) != HT_OK)
394: return status;
395: } else {
396: *(me->buffer+me->buflen++) = *b;
397: if (me->state == EOL_FCR) {
398: if (*b == LF) { /* Line found */
399: if ((status = stream_pipe(me)) != HT_OK)
400: return status;
401: } else {
402: me->state = EOL_BEGIN;
403: }
404: } else if (*b == CR) {
405: me->state = EOL_FCR;
406: } else if (*b == LF) {
407: if ((status = stream_pipe(me)) != HT_OK)
408: return status;
1.71 frystyk 409: } else {
1.80 frystyk 410: if (me->buflen >= MAX_STATUS_LEN) {
411: if ((status = stream_pipe(me)) != HT_OK)
412: return status;
413: }
1.71 frystyk 414: }
1.80 frystyk 415: b++;
1.71 frystyk 416: }
1.56 frystyk 417: }
1.88 frystyk 418: if (me->target) { /* Is the stream set up? */
419: if (l > 0) /* Anything left? */
420: return PUTBLOCK(b, l);
421: return HT_OK;
422: }
423: return HT_WOULD_BLOCK;
1.56 frystyk 424: }
425:
1.80 frystyk 426: PRIVATE int HTTPStatus_put_string ARGS2(HTStream *, me, CONST char*, s)
1.71 frystyk 427: {
1.80 frystyk 428: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 429: }
1.56 frystyk 430:
1.80 frystyk 431: PRIVATE int HTTPStatus_put_character ARGS2(HTStream *, me, char, c)
1.71 frystyk 432: {
1.80 frystyk 433: return HTTPStatus_put_block(me, &c, 1);
434: }
435:
436: PRIVATE int HTTPStatus_flush ARGS1(HTStream *, me)
437: {
438: return (*me->target->isa->flush)(me->target);
1.71 frystyk 439: }
440:
441: PRIVATE int HTTPStatus_free ARGS1(HTStream *, me)
442: {
1.87 frystyk 443: int status = HT_OK;
444: if (me->target) {
445: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
446: return HT_WOULD_BLOCK;
447: }
1.71 frystyk 448: free(me);
1.80 frystyk 449: return HT_OK;
1.71 frystyk 450: }
451:
452: PRIVATE int HTTPStatus_abort ARGS2(HTStream *, me, HTError, e)
453: {
454: if (me->target)
1.74 frystyk 455: ABORT_TARGET;
1.71 frystyk 456: free(me);
1.74 frystyk 457: if (PROT_TRACE)
1.80 frystyk 458: fprintf(TDEST, "HTTPStatus.. ABORTING...\n");
459: return HT_ERROR;
1.71 frystyk 460: }
461:
462: /* HTTPStatus Stream
463: ** -----------------
464: */
465: PRIVATE CONST HTStreamClass HTTPStatusClass =
466: {
467: "HTTPStatus",
1.80 frystyk 468: HTTPStatus_flush,
1.71 frystyk 469: HTTPStatus_free,
470: HTTPStatus_abort,
471: HTTPStatus_put_character,
472: HTTPStatus_put_string,
473: HTTPStatus_put_block
474: };
475:
1.94 frystyk 476: PRIVATE HTStream * HTTPStatus_new ARGS2(HTRequest *, request,
477: http_info *, http)
1.71 frystyk 478: {
479: HTStream * me = (HTStream *) calloc(1, sizeof(HTStream));
480: if (!me) outofmem(__FILE__, "HTTPStatus_new");
481: me->isa = &HTTPStatusClass;
482: me->request = request;
483: me->http = http;
484: me->state = EOL_BEGIN;
485: return me;
486: }
487:
488: /* ------------------------------------------------------------------------- */
489:
490: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 491: ** ==============================
492: **
493: ** Given a hypertext address, this routine loads a document.
494: **
495: ** On entry,
496: ** request This is the request structure
1.94 frystyk 497: ** returns HT_ERROR Error has occured in call back
498: ** HT_OK Call back was OK
1.55 frystyk 499: */
1.94 frystyk 500: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request, SockOps ops)
1.55 frystyk 501: {
1.71 frystyk 502: int status = HT_ERROR;
1.94 frystyk 503: HTNet *net = request->net; /* Generic protocol information */
1.55 frystyk 504: http_info *http; /* Specific protocol information */
1.17 timbl 505:
1.94 frystyk 506: /*
507: ** Initiate a new http structure and bind to request structure
508: ** This is actually state HTTP_BEGIN, but it can't be in the state
509: ** machine as we need the structure first.
510: */
511: if (ops == FD_NONE) {
512: if (PROT_TRACE) fprintf(TDEST, "HTTP........ Looking for `%s\'\n",
513: HTAnchor_physical(request->anchor));
1.71 frystyk 514: if ((http = (http_info *) calloc(1, sizeof(http_info))) == NULL)
515: outofmem(__FILE__, "HTLoadHTTP");
516: http->state = HTTP_BEGIN;
1.85 frystyk 517: http->next = HTTP_ERROR;
1.94 frystyk 518: net->context = http;
1.98 ! frystyk 519: } else if (ops == FD_CLOSE) { /* Interrupted */
1.94 frystyk 520: if(HTRequest_isPostWeb(request)&&!HTRequest_isMainDestination(request))
521: HTTPCleanup(request, HT_IGNORE);
522: else
523: HTTPCleanup(request, HT_INTERRUPTED);
524: return HT_OK;
525: } else
526: http = (http_info *) net->context; /* Get existing copy */
1.71 frystyk 527:
528: /* Now jump into the machine. We know the state from the previous run */
529: while (1) {
530: switch (http->state) {
531: case HTTP_BEGIN:
532: /*
533: ** Compose authorization information (this was moved here
534: ** from after the making of the connection so that the connection
535: ** wouldn't have to wait while prompting username and password
536: ** from the user). -- AL 13.10.93
537: */
538: HTAA_composeAuth(request);
539: if (PROT_TRACE) {
540: if (request->authorization)
1.78 frystyk 541: fprintf(TDEST, "HTTP........ Sending Authorization: %s\n",
1.71 frystyk 542: request->authorization);
543: else
1.78 frystyk 544: fprintf(TDEST,
1.71 frystyk 545: "HTTP........ Not sending authorization (yet)\n");
546: }
547: http->state = HTTP_NEED_CONNECTION;
548: break;
549:
550: case HTTP_NEED_CONNECTION: /* Now let's set up a connection */
1.94 frystyk 551: status = HTDoConnect(net, HTAnchor_physical(request->anchor),
1.95 frystyk 552: HTTP_PORT);
1.80 frystyk 553: if (status == HT_OK) {
1.95 frystyk 554:
555: /* Check the protocol class */
1.97 frystyk 556: char *s_class = HTDNS_serverClass(net->dns);
557: if (s_class && strcasecomp(s_class, "http")) {
1.95 frystyk 558: HTErrorAdd(request, ERR_FATAL, NO, HTERR_CLASS,
559: NULL, 0, "HTLoadHTTP");
560: http->state = HTTP_ERROR;
561: break;
562: }
563: HTDNS_setServerClass(net->dns, "http");
564:
1.71 frystyk 565: if (PROT_TRACE)
1.78 frystyk 566: fprintf(TDEST, "HTTP........ Connected, socket %d\n",
1.94 frystyk 567: net->sockfd);
1.80 frystyk 568:
1.88 frystyk 569: /* Set up stream TO network */
570: request->input_stream =
1.94 frystyk 571: HTTPRequest_new(request, HTWriter_new(net, YES));
1.88 frystyk 572:
573: /*
574: ** Set up concurrent read/write if this request isn't the
575: ** source for a PUT or POST. As source we don't start reading
576: ** before all destinations are ready. If destination then
577: ** register the input stream and get ready for read
578: */
579: if (HTRequest_isPostWeb(request)) {
1.94 frystyk 580: HTEvent_Register(net->sockfd, request, (SockOps) FD_READ,
581: HTLoadHTTP, net->priority);
1.88 frystyk 582: HTRequest_linkDestination(request);
583: }
584:
585: /* Set up stream FROM network and corresponding read buffer */
1.94 frystyk 586: net->isoc = HTInputSocket_new(net->sockfd);
587: net->target = HTImProxy ?
1.80 frystyk 588: request->output_stream : HTTPStatus_new(request, http);
1.88 frystyk 589:
1.71 frystyk 590: http->state = HTTP_NEED_REQUEST;
1.96 frystyk 591: } else if (status == HT_WOULD_BLOCK || status == HT_PERSISTENT)
1.94 frystyk 592: return HT_OK;
1.71 frystyk 593: else
594: http->state = HTTP_ERROR; /* Error or interrupt */
595: break;
596:
1.87 frystyk 597: /* As we can do simultanous read and write this is now one state */
1.80 frystyk 598: case HTTP_NEED_REQUEST:
1.94 frystyk 599: if (ops == FD_WRITE || ops == FD_NONE) {
1.88 frystyk 600: if (HTRequest_isDestination(request)) {
1.94 frystyk 601: HTNet *srcnet = request->source->net;
602: HTEvent_Register(srcnet->sockfd, request->source,
603: (SockOps) FD_READ,
604: HTLoadHTTP, srcnet->priority);
605: return HT_OK;
1.80 frystyk 606: }
1.88 frystyk 607: status = request->PostCallBack ?
608: request->PostCallBack(request, request->input_stream) :
609: (*request->input_stream->isa->flush)(request->input_stream);
1.71 frystyk 610: if (status == HT_WOULD_BLOCK)
1.94 frystyk 611: return HT_OK;
612: else
613: ops = FD_READ; /* Trick to ensure that we do READ */
614: } else if (ops == FD_READ) {
1.98 ! frystyk 615: status = HTSocketRead(request, net);
1.80 frystyk 616: if (status == HT_WOULD_BLOCK)
1.94 frystyk 617: return HT_OK;
618: else if (status == HT_LOADED)
619: http->state = http->next; /* Jump to next state */
1.91 frystyk 620: else if (status == HT_RELOAD)
621: http->state = HTTP_EXPIRED;
1.94 frystyk 622: else
623: http->state = HTTP_ERROR;
1.90 frystyk 624: } else {
1.78 frystyk 625: http->state = HTTP_ERROR;
1.90 frystyk 626: }
1.71 frystyk 627: break;
1.80 frystyk 628:
1.91 frystyk 629: case HTTP_NOT_MODIFIED:
630: http->state = HTTP_ERROR;
631: break;
632:
633: case HTTP_EXPIRED:
634: /* Dirty hack and fall through */
635: request->redirect = request->anchor->address;
636:
1.80 frystyk 637: case HTTP_REDIRECTION:
1.88 frystyk 638: /* Clean up the other connections or just this one */
639: if (HTRequest_isPostWeb(request))
640: HTRequest_killPostWeb(request);
641: else
1.94 frystyk 642: HTTPCleanup(request, HT_IGNORE);
1.88 frystyk 643:
644: /* If we found a new URL in the response */
1.71 frystyk 645: if (request->redirect) {
646: if (status == 301) {
647: HTErrorAdd(request, ERR_INFO, NO, HTERR_MOVED,
648: (void *) request->redirect,
649: (int) strlen(request->redirect), "HTLoadHTTP");
650: } else if (status == 302) {
651: HTErrorAdd(request, ERR_INFO, NO, HTERR_FOUND,
652: (void *) request->redirect,
653: (int) strlen(request->redirect), "HTLoadHTTP");
1.55 frystyk 654: }
1.88 frystyk 655:
656: /* If we haven't reached the limit for redirection */
1.94 frystyk 657: if (HTRequest_retry(request)) {
1.87 frystyk 658: HTAnchor *anchor = HTAnchor_findAddress(request->redirect);
1.88 frystyk 659: if (HTRequest_isPostWeb(request)) {
660: HTRequest *dest = HTRequest_mainDestination(request);
661: char *msg=(char*)malloc(strlen(request->redirect)+100);
1.87 frystyk 662: if (!msg) outofmem(__FILE__, "HTLoadHTTP");
1.88 frystyk 663: sprintf(msg, "\nLocation of %s has changed to %s for method %s, continue operation?",
664: HTRequest_isDestination(request) ?
665: "destination" : "source", request->redirect,
666: HTMethod_name(request->method));
1.92 frystyk 667: if (HTConfirm(request, msg)) {
1.87 frystyk 668: free(msg);
1.88 frystyk 669:
670: /* The new anchor inherits the Post Web */
1.91 frystyk 671: HTAnchor_moveAllLinks((HTAnchor *) request->anchor,
672: anchor);
1.88 frystyk 673: if (HTRequest_isSource(request))
674: HTRequest_delete(request);
1.94 frystyk 675: return HTCopyAnchor((HTAnchor *) anchor, dest) ?
676: HT_OK : HT_ERROR;
1.87 frystyk 677: }
678: free(msg);
1.94 frystyk 679: return HT_OK;
1.88 frystyk 680: } if (request->PostCallBack) {
1.87 frystyk 681: #if 0
1.94 frystyk 682: return HTUploadAnchor((HTAnchor*) anchor, request) ?
683: HT_OK : HT_ERROR;
1.87 frystyk 684: #endif
685: } else {
1.94 frystyk 686: return HTLoadAnchor((HTAnchor *) anchor, request) ?
687: HT_OK : HT_ERROR;
1.87 frystyk 688: }
1.71 frystyk 689: } else {
690: HTErrorAdd(request, ERR_FATAL, NO, HTERR_MAX_REDIRECT,
1.58 frystyk 691: NULL, 0, "HTLoadHTTP");
1.88 frystyk 692: if (HTRequest_isPostWeb(request)) {
693: BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 694: if (HTRequest_isDestination(request)) {
695: HTLink *link =
696: HTAnchor_findLink((HTAnchor *) request->source->anchor,
697: (HTAnchor *) request->anchor);
698: HTAnchor_setLinkResult(link, HT_LINK_ERROR);
699: }
1.94 frystyk 700: HTNet_callback(request, main ? HT_ERROR : HT_IGNORE);
1.88 frystyk 701: HTRequest_removeDestination(request);
702: }
1.94 frystyk 703: return HT_OK;
1.58 frystyk 704: }
1.71 frystyk 705: } else {
706: HTErrorAdd(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
707: NULL, 0, "HTLoadHTTP");
1.94 frystyk 708: return HT_OK;
1.71 frystyk 709: }
710: break;
1.80 frystyk 711:
1.71 frystyk 712: case HTTP_AA:
1.88 frystyk 713: /* Clean up the other connections or just this one */
714: if (HTRequest_isPostWeb(request))
715: HTRequest_killPostWeb(request);
716: else
1.94 frystyk 717: HTTPCleanup(request, HT_IGNORE);
1.88 frystyk 718:
719: /* Ask the user for a UserID and a passwd */
720: if (HTTPAuthentication(request) && HTAA_retryWithAuth(request)) {
1.94 frystyk 721: int ret;
1.88 frystyk 722: if (HTRequest_isPostWeb(request)) {
723: HTRequest *dest = HTRequest_mainDestination(request);
724: HTAnchor_appendMethods(request->anchor, request->method);
1.94 frystyk 725: ret=HTCopyAnchor((HTAnchor*)request->source->anchor, dest);
726: return ret ? HT_OK : HT_ERROR;
1.85 frystyk 727: } else if (request->PostCallBack) {
728: #if 0
1.94 frystyk 729: ret = HTUploadAnchor((HTAnchor*) request->anchor,request);
730: return ret ? HT_OK : HT_ERROR;
1.85 frystyk 731: #endif
732: } else {
1.94 frystyk 733: ret = HTLoadAnchor((HTAnchor *) request->anchor, request);
734: return ret ? HT_OK : HT_ERROR;
1.85 frystyk 735: }
1.88 frystyk 736: } else { /* If the guy said no :-( */
1.71 frystyk 737: HTErrorAdd(request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.94 frystyk 738: NULL, 0, "HTLoadHTTP");
1.88 frystyk 739: if (HTRequest_isPostWeb(request)) {
740: BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 741: if (HTRequest_isDestination(request)) {
742: HTLink *link =
743: HTAnchor_findLink((HTAnchor *) request->source->anchor,
744: (HTAnchor *) request->anchor);
745: HTAnchor_setLinkResult(link, HT_LINK_ERROR);
746: }
1.94 frystyk 747: HTNet_callback(request, main ? HT_ERROR : HT_IGNORE);
1.88 frystyk 748: HTRequest_removeDestination(request);
749: }
1.94 frystyk 750: return HT_OK;
1.71 frystyk 751: }
752: break;
1.80 frystyk 753:
1.71 frystyk 754: case HTTP_GOT_DATA:
1.88 frystyk 755: if (HTRequest_isPostWeb(request)) {
756: BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 757: if (HTRequest_isDestination(request)) {
758: HTLink *link =
759: HTAnchor_findLink((HTAnchor *) request->source->anchor,
760: (HTAnchor *) request->anchor);
761: HTAnchor_setLinkResult(link, HT_LINK_OK);
762: }
1.88 frystyk 763: HTRequest_removeDestination(request);
1.94 frystyk 764: HTTPCleanup(request, main ? HT_LOADED : HT_IGNORE);
765: } else
766: HTTPCleanup(request, HT_LOADED);
767: return HT_OK;
1.71 frystyk 768: break;
769:
770: case HTTP_NO_DATA:
1.88 frystyk 771: if (HTRequest_isPostWeb(request)) {
772: BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 773: if (HTRequest_isDestination(request)) {
774: HTLink *link =
775: HTAnchor_findLink((HTAnchor *) request->source->anchor,
776: (HTAnchor *) request->anchor);
777: HTAnchor_setLinkResult(link, HT_LINK_OK);
778: }
1.88 frystyk 779: HTRequest_removeDestination(request);
1.94 frystyk 780: HTTPCleanup(request, main ? HT_NO_DATA : HT_IGNORE);
781: } else
782: HTTPCleanup(request, HT_NO_DATA);
783: return HT_OK;
1.71 frystyk 784: break;
1.80 frystyk 785:
1.94 frystyk 786: case HTTP_RETRY:
1.88 frystyk 787: if (HTRequest_isPostWeb(request)) {
788: BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 789: HTRequest_killPostWeb(request);
790: if (HTRequest_isDestination(request)) {
791: HTLink *link =
792: HTAnchor_findLink((HTAnchor*) request->source->anchor,
793: (HTAnchor*) request->anchor);
794: HTAnchor_setLinkResult(link, HT_LINK_ERROR);
795: }
1.88 frystyk 796: HTRequest_removeDestination(request);
1.94 frystyk 797: HTTPCleanup(request, main ? HT_RETRY : HT_IGNORE);
1.91 frystyk 798: } else
1.94 frystyk 799: HTTPCleanup(request, HT_RETRY);
800: return HT_OK;
1.81 frystyk 801: break;
802:
1.71 frystyk 803: case HTTP_ERROR:
1.88 frystyk 804: /* Clean up the other connections or just this one */
805: if (HTRequest_isPostWeb(request)) {
1.91 frystyk 806: BOOL main = HTRequest_isMainDestination(request);
1.88 frystyk 807: HTRequest_killPostWeb(request);
1.91 frystyk 808: if (HTRequest_isDestination(request)) {
809: HTLink *link =
810: HTAnchor_findLink((HTAnchor *) request->source->anchor,
811: (HTAnchor *) request->anchor);
812: HTAnchor_setLinkResult(link, HT_LINK_ERROR);
813: }
814: HTRequest_removeDestination(request);
1.94 frystyk 815: HTTPCleanup(request, main ? HT_ERROR : HT_IGNORE);
1.88 frystyk 816: } else
1.94 frystyk 817: HTTPCleanup(request, HT_ERROR);
818: return HT_OK;
1.71 frystyk 819: break;
820: }
821: } /* End of while(1) */
822: }
1.88 frystyk 823:
1.21 luotonen 824:
Webmaster