freebsd-nq/usr.bin/fetch/fetch.c
Stefan Eßer 32066c96fa fetch: make -S argument accept values > 2GB
Use strtoll() to parse the argument of the -S option.

FreeBSD has supported 64 bit file offsets for more than 25 years on
all architectures and off_t is a 64 bit integer type for that reason.

While strtol() returns a 64 bit value on 64 LP64 architectures, it
is limit to 32 bit on e.g. i386. The strtoll() function returns a 64
but result on all supported architectures and therefore supports the
possible file lengths and file offsets on 32 bit archtectures.

Reported by:	antoine
MFC after:	3 days
2022-02-20 15:24:43 +01:00

1230 lines
31 KiB
C

/*-
* SPDX-License-Identifier: BSD-3-Clause
*
* Copyright (c) 2000-2014 Dag-Erling Smørgrav
* Copyright (c) 2013 Michael Gmelin <freebsd@grem.de>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer
* in this position and unchanged.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
#include <sys/param.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/time.h>
#include <ctype.h>
#include <err.h>
#include <errno.h>
#include <getopt.h>
#include <signal.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <termios.h>
#include <unistd.h>
#include <fetch.h>
#define MINBUFSIZE 16384
#define TIMEOUT 120
/* Option flags */
static int A_flag; /* -A: do not follow 302 redirects */
static int a_flag; /* -a: auto retry */
static off_t B_size; /* -B: buffer size */
static int b_flag; /*! -b: workaround TCP bug */
static char *c_dirname; /* -c: remote directory */
static int d_flag; /* -d: direct connection */
static int F_flag; /* -F: restart without checking mtime */
static char *f_filename; /* -f: file to fetch */
static char *h_hostname; /* -h: host to fetch from */
static int i_flag; /* -i: specify file for mtime comparison */
static char *i_filename; /* name of input file */
static int l_flag; /* -l: link rather than copy file: URLs */
static int m_flag; /* -[Mm]: mirror mode */
static char *N_filename; /* -N: netrc file name */
static int n_flag; /* -n: do not preserve modification time */
static int o_flag; /* -o: specify output file */
static int o_directory; /* output file is a directory */
static char *o_filename; /* name of output file */
static int o_stdout; /* output file is stdout */
static int once_flag; /* -1: stop at first successful file */
static int p_flag; /* -[Pp]: use passive FTP */
static int R_flag; /* -R: don't delete partial files */
static int r_flag; /* -r: restart previous transfer */
static off_t S_size; /* -S: require size to match */
static int s_flag; /* -s: show size, don't fetch */
static long T_secs; /* -T: transfer timeout in seconds */
static int t_flag; /*! -t: workaround TCP bug */
static int U_flag; /* -U: do not use high ports */
static int v_level = 1; /* -v: verbosity level */
static int v_tty; /* stdout is a tty */
static int v_progress; /* whether to display progress */
static pid_t pgrp; /* our process group */
static long w_secs; /* -w: retry delay */
static int family = PF_UNSPEC; /* -[46]: address family to use */
static int sigalrm; /* SIGALRM received */
static int siginfo; /* SIGINFO received */
static int sigint; /* SIGINT received */
static long ftp_timeout = TIMEOUT; /* default timeout for FTP transfers */
static long http_timeout = TIMEOUT;/* default timeout for HTTP transfers */
static char *buf; /* transfer buffer */
enum options
{
OPTION_BIND_ADDRESS,
OPTION_NO_FTP_PASSIVE_MODE,
OPTION_HTTP_REFERER,
OPTION_HTTP_USER_AGENT,
OPTION_NO_PROXY,
OPTION_SSL_CA_CERT_FILE,
OPTION_SSL_CA_CERT_PATH,
OPTION_SSL_CLIENT_CERT_FILE,
OPTION_SSL_CLIENT_KEY_FILE,
OPTION_SSL_CRL_FILE,
OPTION_SSL_NO_SSL3,
OPTION_SSL_NO_TLS1,
OPTION_SSL_NO_VERIFY_HOSTNAME,
OPTION_SSL_NO_VERIFY_PEER
};
static struct option longopts[] =
{
/* mapping to single character argument */
{ "one-file", no_argument, NULL, '1' },
{ "ipv4-only", no_argument, NULL, '4' },
{ "ipv6-only", no_argument, NULL, '6' },
{ "no-redirect", no_argument, NULL, 'A' },
{ "retry", no_argument, NULL, 'a' },
{ "buffer-size", required_argument, NULL, 'B' },
/* -c not mapped, since it's deprecated */
{ "direct", no_argument, NULL, 'd' },
{ "force-restart", no_argument, NULL, 'F' },
/* -f not mapped, since it's deprecated */
/* -h not mapped, since it's deprecated */
{ "if-modified-since", required_argument, NULL, 'i' },
{ "symlink", no_argument, NULL, 'l' },
/* -M not mapped since it's the same as -m */
{ "mirror", no_argument, NULL, 'm' },
{ "netrc", required_argument, NULL, 'N' },
{ "no-mtime", no_argument, NULL, 'n' },
{ "output", required_argument, NULL, 'o' },
/* -P not mapped since it's the same as -p */
{ "passive", no_argument, NULL, 'p' },
{ "quiet", no_argument, NULL, 'q' },
{ "keep-output", no_argument, NULL, 'R' },
{ "restart", no_argument, NULL, 'r' },
{ "require-size", required_argument, NULL, 'S' },
{ "print-size", no_argument, NULL, 's' },
{ "timeout", required_argument, NULL, 'T' },
{ "passive-portrange-default", no_argument, NULL, 'T' },
{ "verbose", no_argument, NULL, 'v' },
{ "retry-delay", required_argument, NULL, 'w' },
/* options without a single character equivalent */
{ "bind-address", required_argument, NULL, OPTION_BIND_ADDRESS },
{ "no-passive", no_argument, NULL, OPTION_NO_FTP_PASSIVE_MODE },
{ "referer", required_argument, NULL, OPTION_HTTP_REFERER },
{ "user-agent", required_argument, NULL, OPTION_HTTP_USER_AGENT },
{ "no-proxy", required_argument, NULL, OPTION_NO_PROXY },
{ "ca-cert", required_argument, NULL, OPTION_SSL_CA_CERT_FILE },
{ "ca-path", required_argument, NULL, OPTION_SSL_CA_CERT_PATH },
{ "cert", required_argument, NULL, OPTION_SSL_CLIENT_CERT_FILE },
{ "key", required_argument, NULL, OPTION_SSL_CLIENT_KEY_FILE },
{ "crl", required_argument, NULL, OPTION_SSL_CRL_FILE },
{ "no-sslv3", no_argument, NULL, OPTION_SSL_NO_SSL3 },
{ "no-tlsv1", no_argument, NULL, OPTION_SSL_NO_TLS1 },
{ "no-verify-hostname", no_argument, NULL, OPTION_SSL_NO_VERIFY_HOSTNAME },
{ "no-verify-peer", no_argument, NULL, OPTION_SSL_NO_VERIFY_PEER },
{ NULL, 0, NULL, 0 }
};
/*
* Signal handler
*/
static void
sig_handler(int sig)
{
switch (sig) {
case SIGALRM:
sigalrm = 1;
break;
case SIGINFO:
siginfo = 1;
break;
case SIGINT:
sigint = 1;
break;
}
}
struct xferstat {
char name[64];
struct timeval start; /* start of transfer */
struct timeval last; /* time of last update */
struct timeval last2; /* time of previous last update */
off_t size; /* size of file per HTTP hdr */
off_t offset; /* starting offset in file */
off_t rcvd; /* bytes already received */
off_t lastrcvd; /* bytes received since last update */
};
/*
* Format a number of seconds as either XXdYYh, XXhYYm, XXmYYs, or XXs
* depending on its magnitude
*/
static void
stat_seconds(char *str, size_t strsz, long seconds)
{
if (seconds > 86400)
snprintf(str, strsz, "%02ldd%02ldh",
seconds / 86400, (seconds % 86400) / 3600);
else if (seconds > 3600)
snprintf(str, strsz, "%02ldh%02ldm",
seconds / 3600, (seconds % 3600) / 60);
else if (seconds > 60)
snprintf(str, strsz, "%02ldm%02lds",
seconds / 60, seconds % 60);
else
snprintf(str, strsz, " %02lds",
seconds);
}
/*
* Compute and display ETA
*/
static void
stat_eta(char *str, size_t strsz, const struct xferstat *xs)
{
long elapsed, eta;
off_t received, expected;
elapsed = xs->last.tv_sec - xs->start.tv_sec;
received = xs->rcvd - xs->offset;
expected = xs->size - xs->rcvd;
eta = (long)((double)elapsed * expected / received);
if (eta > 0)
stat_seconds(str, strsz, eta);
else
stat_seconds(str, strsz, elapsed);
}
/*
* Format a number as "xxxx YB" where Y is ' ', 'k', 'M'...
*/
static const char *prefixes = " kMGTP";
static void
stat_bytes(char *str, size_t strsz, off_t bytes)
{
const char *prefix = prefixes;
while (bytes > 9999 && prefix[1] != '\0') {
bytes /= 1024;
prefix++;
}
snprintf(str, strsz, "%4ju %cB", (uintmax_t)bytes, *prefix);
}
/*
* Compute and display transfer rate
*/
static void
stat_bps(char *str, size_t strsz, struct xferstat *xs)
{
char bytes[16];
double delta, bps;
delta = ((double)xs->last.tv_sec + (xs->last.tv_usec / 1.e6))
- ((double)xs->last2.tv_sec + (xs->last2.tv_usec / 1.e6));
if (delta == 0.0) {
snprintf(str, strsz, "?? Bps");
} else {
bps = (xs->rcvd - xs->lastrcvd) / delta;
stat_bytes(bytes, sizeof bytes, (off_t)bps);
snprintf(str, strsz, "%sps", bytes);
}
}
/*
* Update the stats display
*/
static void
stat_display(struct xferstat *xs, int force)
{
char bytes[16], bps[16], eta[16];
struct timeval now;
int ctty_pgrp;
/* check if we're the foreground process */
if (ioctl(STDERR_FILENO, TIOCGPGRP, &ctty_pgrp) != 0 ||
(pid_t)ctty_pgrp != pgrp)
return;
gettimeofday(&now, NULL);
if (!force && now.tv_sec <= xs->last.tv_sec)
return;
xs->last2 = xs->last;
xs->last = now;
fprintf(stderr, "\r%-46.46s", xs->name);
if (xs->rcvd >= xs->size) {
stat_bytes(bytes, sizeof bytes, xs->rcvd);
setproctitle("%s [%s]", xs->name, bytes);
fprintf(stderr, " %s", bytes);
} else {
stat_bytes(bytes, sizeof bytes, xs->size);
setproctitle("%s [%d%% of %s]", xs->name,
(int)((100.0 * xs->rcvd) / xs->size),
bytes);
fprintf(stderr, "%3d%% of %s",
(int)((100.0 * xs->rcvd) / xs->size),
bytes);
}
if (force == 2) {
xs->lastrcvd = xs->offset;
xs->last2 = xs->start;
}
stat_bps(bps, sizeof bps, xs);
fprintf(stderr, " %s", bps);
if ((xs->size > 0 && xs->rcvd > 0 &&
xs->last.tv_sec >= xs->start.tv_sec + 3) ||
force == 2) {
stat_eta(eta, sizeof eta, xs);
fprintf(stderr, " %s", eta);
}
xs->lastrcvd = xs->rcvd;
}
/*
* Initialize the transfer statistics
*/
static void
stat_start(struct xferstat *xs, const char *name, off_t size, off_t offset)
{
memset(xs, 0, sizeof *xs);
snprintf(xs->name, sizeof xs->name, "%s", name);
gettimeofday(&xs->start, NULL);
xs->last2 = xs->last = xs->start;
xs->size = size;
xs->offset = offset;
xs->rcvd = offset;
xs->lastrcvd = offset;
if (v_progress)
stat_display(xs, 1);
else if (v_level > 0)
fprintf(stderr, "%-46s", xs->name);
}
/*
* Update the transfer statistics
*/
static void
stat_update(struct xferstat *xs, off_t rcvd)
{
xs->rcvd = rcvd;
if (v_progress)
stat_display(xs, 0);
}
/*
* Finalize the transfer statistics
*/
static void
stat_end(struct xferstat *xs)
{
char bytes[16], bps[16], eta[16];
gettimeofday(&xs->last, NULL);
if (v_progress) {
stat_display(xs, 2);
putc('\n', stderr);
} else if (v_level > 0) {
stat_bytes(bytes, sizeof bytes, xs->rcvd);
stat_bps(bps, sizeof bps, xs);
stat_eta(eta, sizeof eta, xs);
fprintf(stderr, " %s %s %s\n", bytes, bps, eta);
}
}
/*
* Ask the user for authentication details
*/
static int
query_auth(struct url *URL)
{
struct termios tios;
tcflag_t saved_flags;
int i, nopwd;
fprintf(stderr, "Authentication required for <%s://%s:%d/>!\n",
URL->scheme, URL->host, URL->port);
fprintf(stderr, "Login: ");
if (fgets(URL->user, sizeof URL->user, stdin) == NULL)
return (-1);
for (i = strlen(URL->user); i >= 0; --i)
if (URL->user[i] == '\r' || URL->user[i] == '\n')
URL->user[i] = '\0';
fprintf(stderr, "Password: ");
if (tcgetattr(STDIN_FILENO, &tios) == 0) {
saved_flags = tios.c_lflag;
tios.c_lflag &= ~ECHO;
tios.c_lflag |= ECHONL|ICANON;
tcsetattr(STDIN_FILENO, TCSAFLUSH|TCSASOFT, &tios);
nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
tios.c_lflag = saved_flags;
tcsetattr(STDIN_FILENO, TCSANOW|TCSASOFT, &tios);
} else {
nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
}
if (nopwd)
return (-1);
for (i = strlen(URL->pwd); i >= 0; --i)
if (URL->pwd[i] == '\r' || URL->pwd[i] == '\n')
URL->pwd[i] = '\0';
return (0);
}
/*
* Fetch a file
*/
static int
fetch(char *URL, const char *path, int *is_http)
{
struct url *url;
struct url_stat us;
struct stat sb, nsb;
struct xferstat xs;
FILE *f, *of;
size_t size, readcnt, wr;
off_t count, size_prev;
char flags[8];
const char *slash;
char *tmppath;
int r, tries;
unsigned timeout;
char *ptr;
f = of = NULL;
tmppath = NULL;
timeout = 0;
*flags = 0;
count = 0;
/* set verbosity level */
if (v_level > 1)
strcat(flags, "v");
if (v_level > 2)
fetchDebug = 1;
/* parse URL */
url = NULL;
if (*URL == '\0') {
warnx("empty URL");
goto failure;
}
if ((url = fetchParseURL(URL)) == NULL) {
warnx("%s: parse error", URL);
goto failure;
}
/* if no scheme was specified, take a guess */
if (!*url->scheme) {
if (!*url->host)
strcpy(url->scheme, SCHEME_FILE);
else if (strncasecmp(url->host, "ftp.", 4) == 0)
strcpy(url->scheme, SCHEME_FTP);
else if (strncasecmp(url->host, "www.", 4) == 0)
strcpy(url->scheme, SCHEME_HTTP);
}
/* for both of http and https */
*is_http = strncmp(url->scheme, "http", 4) == 0;
/* common flags */
switch (family) {
case PF_INET:
strcat(flags, "4");
break;
case PF_INET6:
strcat(flags, "6");
break;
}
/* FTP specific flags */
if (strcmp(url->scheme, SCHEME_FTP) == 0) {
if (p_flag)
strcat(flags, "p");
if (d_flag)
strcat(flags, "d");
if (U_flag)
strcat(flags, "l");
timeout = T_secs ? T_secs : ftp_timeout;
}
/* HTTP specific flags */
if (strcmp(url->scheme, SCHEME_HTTP) == 0 ||
strcmp(url->scheme, SCHEME_HTTPS) == 0) {
if (d_flag)
strcat(flags, "d");
if (A_flag)
strcat(flags, "A");
timeout = T_secs ? T_secs : http_timeout;
if (i_flag) {
if (stat(i_filename, &sb)) {
warn("%s: stat()", i_filename);
goto failure;
}
url->ims_time = sb.st_mtime;
strcat(flags, "i");
}
}
/* set the protocol timeout. */
fetchTimeout = timeout;
/* just print size */
if (s_flag) {
if (timeout)
alarm(timeout);
r = fetchStat(url, &us, flags);
if (timeout)
alarm(0);
if (sigalrm || sigint)
goto signal;
if (r == -1) {
warnx("%s", fetchLastErrString);
goto failure;
}
if (us.size == -1)
printf("Unknown\n");
else
printf("%jd\n", (intmax_t)us.size);
goto success;
}
tries = 1;
again:
r = 0;
/*
* If the -r flag was specified, we have to compare the local
* and remote files, so we should really do a fetchStat()
* first, but I know of at least one HTTP server that only
* sends the content size in response to GET requests, and
* leaves it out of replies to HEAD requests. Also, in the
* (frequent) case that the local and remote files match but
* the local file is truncated, we have sufficient information
* before the compare to issue a correct request. Therefore,
* we always issue a GET request as if we were sure the local
* file was a truncated copy of the remote file; we can drop
* the connection later if we change our minds.
*/
sb.st_size = -1;
if (!o_stdout) {
r = stat(path, &sb);
if (r == 0 && (r_flag || tries > 1) && S_ISREG(sb.st_mode)) {
url->offset = sb.st_size;
} else if (r == -1 || !S_ISREG(sb.st_mode)) {
/*
* Whatever value sb.st_size has now is either
* wrong (if stat(2) failed) or irrelevant (if the
* path does not refer to a regular file)
*/
sb.st_size = -1;
}
if (r == -1 && errno != ENOENT) {
warnx("%s: stat()", path);
goto failure;
}
}
size_prev = sb.st_size;
/* start the transfer */
if (timeout)
alarm(timeout);
f = fetchXGet(url, &us, flags);
if (timeout)
alarm(0);
if (sigalrm || sigint)
goto signal;
if (f == NULL) {
warnx("%s: %s", URL, fetchLastErrString);
if (i_flag && (strcmp(url->scheme, SCHEME_HTTP) == 0 ||
strcmp(url->scheme, SCHEME_HTTPS) == 0) &&
fetchLastErrCode == FETCH_OK &&
strcmp(fetchLastErrString, "Not Modified") == 0) {
/* HTTP Not Modified Response, return OK. */
r = 0;
goto done;
} else
goto failure;
}
if (sigint)
goto signal;
/* check that size is as expected */
if (S_size) {
if (us.size == -1) {
warnx("%s: size unknown", URL);
} else if (us.size != S_size) {
warnx("%s: size mismatch: expected %jd, actual %jd",
URL, (intmax_t)S_size, (intmax_t)us.size);
goto failure;
}
}
/* symlink instead of copy */
if (l_flag && strcmp(url->scheme, "file") == 0 && !o_stdout) {
if (symlink(url->doc, path) == -1) {
warn("%s: symlink()", path);
goto failure;
}
goto success;
}
if (us.size == -1 && !o_stdout && v_level > 0)
warnx("%s: size of remote file is not known", URL);
if (v_level > 1) {
if (sb.st_size != -1)
fprintf(stderr, "local size / mtime: %jd / %ld\n",
(intmax_t)sb.st_size, (long)sb.st_mtime);
if (us.size != -1)
fprintf(stderr, "remote size / mtime: %jd / %ld\n",
(intmax_t)us.size, (long)us.mtime);
}
/* open output file */
if (o_stdout) {
/* output to stdout */
of = stdout;
} else if (r_flag && sb.st_size != -1) {
/* resume mode, local file exists */
if (!F_flag && us.mtime && sb.st_mtime != us.mtime && tries == 1) {
/* no match! have to refetch */
fclose(f);
/* if precious, warn the user and give up */
if (R_flag) {
warnx("%s: local modification time "
"does not match remote", path);
goto failure_keep;
}
} else if (url->offset > sb.st_size) {
/* gap between what we asked for and what we got */
warnx("%s: gap in resume mode", URL);
fclose(of);
of = NULL;
/* picked up again later */
} else if (us.size != -1) {
if (us.size == sb.st_size)
/* nothing to do */
goto success;
if (sb.st_size > us.size) {
/* local file too long! */
warnx("%s: local file (%jd bytes) is longer "
"than remote file (%jd bytes)", path,
(intmax_t)sb.st_size, (intmax_t)us.size);
goto failure;
}
/* we got it, open local file */
if ((of = fopen(path, "r+")) == NULL) {
warn("%s: fopen()", path);
goto failure;
}
/* check that it didn't move under our feet */
if (fstat(fileno(of), &nsb) == -1) {
/* can't happen! */
warn("%s: fstat()", path);
goto failure;
}
if (nsb.st_dev != sb.st_dev ||
nsb.st_ino != sb.st_ino ||
nsb.st_size != sb.st_size) {
warnx("%s: file has changed", URL);
fclose(of);
of = NULL;
sb = nsb;
/* picked up again later */
}
}
/* seek to where we left off */
if (of != NULL && fseeko(of, url->offset, SEEK_SET) != 0) {
warn("%s: fseeko()", path);
fclose(of);
of = NULL;
/* picked up again later */
}
} else if (m_flag && sb.st_size != -1) {
/* mirror mode, local file exists */
if (sb.st_size == us.size && sb.st_mtime == us.mtime)
goto success;
}
if (of == NULL) {
/*
* We don't yet have an output file; either this is a
* vanilla run with no special flags, or the local and
* remote files didn't match.
*/
if (url->offset > 0) {
/*
* We tried to restart a transfer, but for
* some reason gave up - so we have to restart
* from scratch if we want the whole file
*/
url->offset = 0;
if ((f = fetchXGet(url, &us, flags)) == NULL) {
warnx("%s: %s", URL, fetchLastErrString);
goto failure;
}
if (sigint)
goto signal;
}
/* construct a temp file name */
if (sb.st_size != -1 && S_ISREG(sb.st_mode)) {
if ((slash = strrchr(path, '/')) == NULL)
slash = path;
else
++slash;
if(tmppath != NULL)
free(tmppath);
asprintf(&tmppath, "%.*s.fetch.XXXXXX.%s",
(int)(slash - path), path, slash);
if (tmppath != NULL) {
if (mkstemps(tmppath, strlen(slash) + 1) == -1) {
warn("%s: mkstemps()", path);
goto failure;
}
of = fopen(tmppath, "w");
chown(tmppath, sb.st_uid, sb.st_gid);
chmod(tmppath, sb.st_mode & ALLPERMS);
}
}
if (of == NULL)
of = fopen(path, "w");
if (of == NULL) {
warn("%s: open()", path);
goto failure;
}
}
count = url->offset;
/* start the counter */
stat_start(&xs, path, us.size, count);
sigalrm = siginfo = sigint = 0;
/* suck in the data */
setvbuf(f, NULL, _IOFBF, B_size);
signal(SIGINFO, sig_handler);
while (!sigint) {
if (us.size != -1 && us.size - count < B_size &&
us.size - count >= 0)
size = us.size - count;
else
size = B_size;
if (siginfo) {
stat_end(&xs);
siginfo = 0;
}
if (size == 0)
break;
if ((readcnt = fread(buf, 1, size, f)) < size) {
if (ferror(f) && errno == EINTR && !sigint)
clearerr(f);
else if (readcnt == 0)
break;
}
stat_update(&xs, count += readcnt);
for (ptr = buf; readcnt > 0; ptr += wr, readcnt -= wr)
if ((wr = fwrite(ptr, 1, readcnt, of)) < readcnt) {
if (ferror(of) && errno == EINTR && !sigint)
clearerr(of);
else
break;
}
if (readcnt != 0)
break;
}
if (!sigalrm)
sigalrm = ferror(f) && errno == ETIMEDOUT;
signal(SIGINFO, SIG_DFL);
stat_end(&xs);
/*
* If the transfer timed out or was interrupted, we still want to
* set the mtime in case the file is not removed (-r or -R) and
* the user later restarts the transfer.
*/
signal:
/* set mtime of local file */
if (!n_flag && us.mtime && !o_stdout && of != NULL &&
(stat(path, &sb) != -1) && sb.st_mode & S_IFREG) {
struct timeval tv[2];
fflush(of);
tv[0].tv_sec = (long)(us.atime ? us.atime : us.mtime);
tv[1].tv_sec = (long)us.mtime;
tv[0].tv_usec = tv[1].tv_usec = 0;
if (utimes(tmppath ? tmppath : path, tv))
warn("%s: utimes()", tmppath ? tmppath : path);
}
/* timed out or interrupted? */
if (sigalrm)
warnx("transfer timed out");
if (sigint) {
warnx("transfer interrupted");
goto failure;
}
/* timeout / interrupt before connection completley established? */
if (f == NULL)
goto failure;
if (!sigalrm) {
/* check the status of our files */
if (ferror(f))
warn("%s", URL);
if (ferror(of))
warn("%s", path);
if (ferror(f) || ferror(of))
goto failure;
}
/* did the transfer complete normally? */
if (us.size != -1 && count < us.size) {
warnx("%s appears to be truncated: %jd/%jd bytes",
path, (intmax_t)count, (intmax_t)us.size);
if(!o_stdout && a_flag && count > size_prev) {
fclose(f);
if (w_secs)
sleep(w_secs);
tries++;
goto again;
}
goto failure_keep;
}
/*
* If the transfer timed out and we didn't know how much to
* expect, assume the worst (i.e. we didn't get all of it)
*/
if (sigalrm && us.size == -1) {
warnx("%s may be truncated", path);
goto failure_keep;
}
success:
r = 0;
if (tmppath != NULL && rename(tmppath, path) == -1) {
warn("%s: rename()", path);
goto failure_keep;
}
goto done;
failure:
if (of && of != stdout && !R_flag && !r_flag)
if (stat(path, &sb) != -1 && (sb.st_mode & S_IFREG))
unlink(tmppath ? tmppath : path);
if (R_flag && tmppath != NULL && sb.st_size == -1)
rename(tmppath, path); /* ignore errors here */
failure_keep:
r = -1;
goto done;
done:
if (f)
fclose(f);
if (of && of != stdout)
fclose(of);
if (url)
fetchFreeURL(url);
if (tmppath != NULL)
free(tmppath);
return (r);
}
static void
usage(void)
{
fprintf(stderr, "%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
"usage: fetch [-146AadFlMmnPpqRrsUv] [-B bytes] [--bind-address=host]",
" [--ca-cert=file] [--ca-path=dir] [--cert=file] [--crl=file]",
" [-i file] [--key=file] [-N file] [--no-passive] [--no-proxy=list]",
" [--no-sslv3] [--no-tlsv1] [--no-verify-hostname] [--no-verify-peer]",
" [-o file] [--referer=URL] [-S bytes] [-T seconds]",
" [--user-agent=agent-string] [-w seconds] URL ...",
" fetch [-146AadFlMmnPpqRrsUv] [-B bytes] [--bind-address=host]",
" [--ca-cert=file] [--ca-path=dir] [--cert=file] [--crl=file]",
" [-i file] [--key=file] [-N file] [--no-passive] [--no-proxy=list]",
" [--no-sslv3] [--no-tlsv1] [--no-verify-hostname] [--no-verify-peer]",
" [-o file] [--referer=URL] [-S bytes] [-T seconds]",
" [--user-agent=agent-string] [-w seconds] -h host -f file [-c dir]");
}
/*
* Entry point
*/
int
main(int argc, char *argv[])
{
struct stat sb;
struct sigaction sa;
const char *p, *s;
char *end, *q;
int c, e, is_http, r;
while ((c = getopt_long(argc, argv,
"146AaB:bc:dFf:Hh:i:lMmN:nPpo:qRrS:sT:tUvw:",
longopts, NULL)) != -1)
switch (c) {
case '1':
once_flag = 1;
break;
case '4':
family = PF_INET;
break;
case '6':
family = PF_INET6;
break;
case 'A':
A_flag = 1;
break;
case 'a':
a_flag = 1;
break;
case 'B':
B_size = (off_t)strtol(optarg, &end, 10);
if (*optarg == '\0' || *end != '\0')
errx(1, "invalid buffer size (%s)", optarg);
break;
case 'b':
warnx("warning: the -b option is deprecated");
b_flag = 1;
break;
case 'c':
c_dirname = optarg;
break;
case 'd':
d_flag = 1;
break;
case 'F':
F_flag = 1;
break;
case 'f':
f_filename = optarg;
break;
case 'H':
warnx("the -H option is now implicit, "
"use -U to disable");
break;
case 'h':
h_hostname = optarg;
break;
case 'i':
i_flag = 1;
i_filename = optarg;
break;
case 'l':
l_flag = 1;
break;
case 'o':
o_flag = 1;
o_filename = optarg;
break;
case 'M':
case 'm':
if (r_flag)
errx(1, "the -m and -r flags "
"are mutually exclusive");
m_flag = 1;
break;
case 'N':
N_filename = optarg;
break;
case 'n':
n_flag = 1;
break;
case 'P':
case 'p':
p_flag = 1;
break;
case 'q':
v_level = 0;
break;
case 'R':
R_flag = 1;
break;
case 'r':
if (m_flag)
errx(1, "the -m and -r flags "
"are mutually exclusive");
r_flag = 1;
break;
case 'S':
S_size = strtoll(optarg, &end, 10);
if (*optarg == '\0' || *end != '\0')
errx(1, "invalid size (%s)", optarg);
break;
case 's':
s_flag = 1;
break;
case 'T':
T_secs = strtol(optarg, &end, 10);
if (*optarg == '\0' || *end != '\0')
errx(1, "invalid timeout (%s)", optarg);
break;
case 't':
t_flag = 1;
warnx("warning: the -t option is deprecated");
break;
case 'U':
U_flag = 1;
break;
case 'v':
v_level++;
break;
case 'w':
a_flag = 1;
w_secs = strtol(optarg, &end, 10);
if (*optarg == '\0' || *end != '\0')
errx(1, "invalid delay (%s)", optarg);
break;
case OPTION_BIND_ADDRESS:
setenv("FETCH_BIND_ADDRESS", optarg, 1);
break;
case OPTION_NO_FTP_PASSIVE_MODE:
setenv("FTP_PASSIVE_MODE", "no", 1);
break;
case OPTION_HTTP_REFERER:
setenv("HTTP_REFERER", optarg, 1);
break;
case OPTION_HTTP_USER_AGENT:
setenv("HTTP_USER_AGENT", optarg, 1);
break;
case OPTION_NO_PROXY:
setenv("NO_PROXY", optarg, 1);
break;
case OPTION_SSL_CA_CERT_FILE:
setenv("SSL_CA_CERT_FILE", optarg, 1);
break;
case OPTION_SSL_CA_CERT_PATH:
setenv("SSL_CA_CERT_PATH", optarg, 1);
break;
case OPTION_SSL_CLIENT_CERT_FILE:
setenv("SSL_CLIENT_CERT_FILE", optarg, 1);
break;
case OPTION_SSL_CLIENT_KEY_FILE:
setenv("SSL_CLIENT_KEY_FILE", optarg, 1);
break;
case OPTION_SSL_CRL_FILE:
setenv("SSL_CLIENT_CRL_FILE", optarg, 1);
break;
case OPTION_SSL_NO_SSL3:
setenv("SSL_NO_SSL3", "", 1);
break;
case OPTION_SSL_NO_TLS1:
setenv("SSL_NO_TLS1", "", 1);
break;
case OPTION_SSL_NO_VERIFY_HOSTNAME:
setenv("SSL_NO_VERIFY_HOSTNAME", "", 1);
break;
case OPTION_SSL_NO_VERIFY_PEER:
setenv("SSL_NO_VERIFY_PEER", "", 1);
break;
default:
usage();
exit(1);
}
argc -= optind;
argv += optind;
if (h_hostname || f_filename || c_dirname) {
if (!h_hostname || !f_filename || argc) {
usage();
exit(1);
}
/* XXX this is a hack. */
if (strcspn(h_hostname, "@:/") != strlen(h_hostname))
errx(1, "invalid hostname");
if (asprintf(argv, "ftp://%s/%s/%s", h_hostname,
c_dirname ? c_dirname : "", f_filename) == -1)
errx(1, "%s", strerror(ENOMEM));
argc++;
}
if (!argc) {
usage();
exit(1);
}
/* allocate buffer */
if (B_size < MINBUFSIZE)
B_size = MINBUFSIZE;
if ((buf = malloc(B_size)) == NULL)
errx(1, "%s", strerror(ENOMEM));
/* timeouts */
if ((s = getenv("FTP_TIMEOUT")) != NULL) {
ftp_timeout = strtol(s, &end, 10);
if (*s == '\0' || *end != '\0' || ftp_timeout < 0) {
warnx("FTP_TIMEOUT (%s) is not a positive integer", s);
ftp_timeout = 0;
}
}
if ((s = getenv("HTTP_TIMEOUT")) != NULL) {
http_timeout = strtol(s, &end, 10);
if (*s == '\0' || *end != '\0' || http_timeout < 0) {
warnx("HTTP_TIMEOUT (%s) is not a positive integer", s);
http_timeout = 0;
}
}
/* signal handling */
sa.sa_flags = 0;
sa.sa_handler = sig_handler;
sigemptyset(&sa.sa_mask);
sigaction(SIGALRM, &sa, NULL);
sa.sa_flags = SA_RESETHAND;
sigaction(SIGINT, &sa, NULL);
fetchRestartCalls = 0;
/* output file */
if (o_flag) {
if (strcmp(o_filename, "-") == 0) {
o_stdout = 1;
} else if (stat(o_filename, &sb) == -1) {
if (errno == ENOENT) {
if (argc > 1)
errx(1, "%s is not a directory",
o_filename);
} else {
err(1, "%s", o_filename);
}
} else {
if (sb.st_mode & S_IFDIR)
o_directory = 1;
}
}
/* check if output is to a tty (for progress report) */
v_tty = isatty(STDERR_FILENO);
v_progress = v_tty && v_level > 0;
if (v_progress)
pgrp = getpgrp();
r = 0;
/* authentication */
if (v_tty)
fetchAuthMethod = query_auth;
if (N_filename != NULL)
if (setenv("NETRC", N_filename, 1) == -1)
err(1, "setenv: cannot set NETRC=%s", N_filename);
while (argc) {
if ((p = strrchr(*argv, '/')) == NULL)
p = *argv;
else
p++;
if (!*p)
p = "fetch.out";
fetchLastErrCode = 0;
if (o_flag) {
if (o_stdout) {
e = fetch(*argv, "-", &is_http);
} else if (o_directory) {
asprintf(&q, "%s/%s", o_filename, p);
e = fetch(*argv, q, &is_http);
free(q);
} else {
e = fetch(*argv, o_filename, &is_http);
}
} else {
e = fetch(*argv, p, &is_http);
}
if (sigint)
kill(getpid(), SIGINT);
if (e == 0 && once_flag)
exit(0);
if (e) {
r = 1;
if ((fetchLastErrCode
&& fetchLastErrCode != FETCH_AUTH
&& fetchLastErrCode != FETCH_UNAVAIL
&& fetchLastErrCode != FETCH_MOVED
&& fetchLastErrCode != FETCH_URL
&& fetchLastErrCode != FETCH_RESOLV
&& fetchLastErrCode != FETCH_UNKNOWN
&& (!is_http || (
fetchLastErrCode != FETCH_PROTO
&& fetchLastErrCode != FETCH_SERVER
&& fetchLastErrCode != FETCH_TEMP
&& fetchLastErrCode != FETCH_TIMEOUT
)))) {
if (w_secs && v_level)
fprintf(stderr, "Waiting %ld seconds "
"before retrying\n", w_secs);
if (w_secs)
sleep(w_secs);
if (a_flag)
continue;
}
}
argc--, argv++;
}
exit(r);
}