uclient-fetch: fix potential memory leaks
[project/uclient.git] / uclient-fetch.c
index 6a27cde159ec0cfab90aee4cc9ece551a3dfb3ee..1c66ac6d33ae6d5cf24bd8379e7d5233746ca1b5 100644 (file)
  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  */
 
+#define _GNU_SOURCE
+#include <sys/stat.h>
+#include <sys/socket.h>
 #include <unistd.h>
 #include <stdio.h>
 #include <dlfcn.h>
 #include <getopt.h>
 #include <fcntl.h>
+#include <glob.h>
+#include <stdint.h>
+#include <inttypes.h>
+#include <signal.h>
 
 #include <libubox/blobmsg.h>
 
+#include "progress.h"
 #include "uclient.h"
 #include "uclient-utils.h"
 
 #define LIB_EXT "so"
 #endif
 
+static const char *user_agent = "uclient-fetch";
+static const char *post_data;
+static const char *post_file;
 static struct ustream_ssl_ctx *ssl_ctx;
 static const struct ustream_ssl_ops *ssl_ops;
 static int quiet = false;
 static bool verify = true;
-static const char *output_file;
+static bool proxy = true;
+static bool default_certs = false;
+static bool no_output;
+static const char *opt_output_file;
 static int output_fd = -1;
 static int error_ret;
+static off_t out_offset;
+static off_t out_bytes;
+static off_t out_len;
+static char *auth_str;
+static char **urls;
+static int n_urls;
+static int timeout;
+static bool resume, cur_resume;
+
+static struct progress pmt;
+static struct uloop_timeout pmt_timer;
+
+static int init_request(struct uclient *cl);
+static void request_done(struct uclient *cl);
+
+static void pmt_update(struct uloop_timeout *t)
+{
+       progress_update(&pmt, out_offset, out_bytes, out_len);
+       uloop_timeout_set(t, 1000);
+}
+
+static const char *
+get_proxy_url(char *url)
+{
+       char prefix[16];
+       char *sep;
+
+       if (!proxy)
+               return NULL;
 
-static int open_output_file(const char *path, bool create)
+       sep = strchr(url, ':');
+       if (!sep)
+               return NULL;
+
+       if (sep - url > 5)
+               return NULL;
+
+       memcpy(prefix, url, sep - url);
+       strcpy(prefix + (sep - url), "_proxy");
+       return getenv(prefix);
+}
+
+static int open_output_file(const char *path, uint64_t resume_offset)
 {
-       char *filename;
-       int flags = O_WRONLY;
+       const char *output_file = opt_output_file;
+       char *filename = NULL;
+       int flags;
        int ret;
 
-       if (create)
-               flags |= O_CREAT;
+       if (cur_resume)
+               flags = O_RDWR;
+       else
+               flags = O_WRONLY | O_TRUNC;
+
+       if (!cur_resume && !output_file)
+               flags |= O_EXCL;
+
+       flags |= O_CREAT;
 
        if (output_file) {
-               if (!strcmp(output_file, "-"))
-                       return STDOUT_FILENO;
+               if (!strcmp(output_file, "-")) {
+                       if (!quiet)
+                               fprintf(stderr, "Writing to stdout\n");
 
-               return open(output_file, flags, 0644);
-       }
+                       ret = STDOUT_FILENO;
+                       goto done;
+               }
+       } else {
+               filename = uclient_get_url_filename(path, "index.html");
+               if (!filename) {
+                       ret = -ENOMEM;
+                       goto out;
+               }
 
-       /* Don't automatically overwrite files if the name is derived from the URL */
-       if (create)
-               flags |= O_EXCL;
+               output_file = filename;
+       }
 
-       filename = uclient_get_url_filename(path, "index.html");
-       ret = open(filename, flags, 0644);
-       free(filename);
+       if (!quiet)
+               fprintf(stderr, "Writing to '%s'\n", output_file);
+       ret = open(output_file, flags, 0644);
+       if (ret < 0)
+               goto free;
 
-       return ret;
-}
+       if (resume_offset &&
+           lseek(ret, resume_offset, SEEK_SET) < 0) {
+               if (!quiet)
+                       fprintf(stderr, "Failed to seek %"PRIu64" bytes in output file\n", resume_offset);
+               close(ret);
+               ret = -1;
+               goto free;
+       }
 
-static void request_done(struct uclient *cl)
-{
-       if (output_fd >= 0 && !output_file) {
-               close(output_fd);
-               output_fd = -1;
+       out_offset = resume_offset;
+       out_bytes += resume_offset;
+done:
+       if (!quiet) {
+               progress_init(&pmt, output_file);
+               pmt_timer.cb = pmt_update;
+               pmt_timer.cb(&pmt_timer);
        }
-       uclient_disconnect(cl);
-       uloop_end();
+
+free:
+       free(filename);
+out:
+       return ret;
 }
 
 static void header_done_cb(struct uclient *cl)
 {
+       enum {
+               H_RANGE,
+               H_LEN,
+               __H_MAX
+       };
+       static const struct blobmsg_policy policy[__H_MAX] = {
+               [H_RANGE] = { .name = "content-range", .type = BLOBMSG_TYPE_STRING },
+               [H_LEN] = { .name = "content-length", .type = BLOBMSG_TYPE_STRING },
+       };
+       struct blob_attr *tb[__H_MAX];
+       uint64_t resume_offset = 0, resume_end, resume_size;
        static int retries;
 
-       if (retries < 10 && uclient_http_redirect(cl)) {
-               if (!quiet)
-                       fprintf(stderr, "Redirected to %s on %s\n", cl->url->location, cl->url->host);
+       if (retries < 10) {
+               int ret = uclient_http_redirect(cl);
+               if (ret < 0) {
+                       if (!quiet)
+                               fprintf(stderr, "Failed to redirect to %s on %s\n", cl->url->location, cl->url->host);
+                       error_ret = 8;
+                       request_done(cl);
+                       return;
+               }
+               if (ret > 0) {
+                       if (!quiet)
+                               fprintf(stderr, "Redirected to %s on %s\n", cl->url->location, cl->url->host);
 
-               retries++;
+                       retries++;
+                       return;
+               }
+       }
+
+       if (cl->status_code == 204 && cur_resume) {
+               /* Resume attempt failed, try normal download */
+               cur_resume = false;
+               init_request(cl);
                return;
        }
 
-       retries = 0;
+       blobmsg_parse(policy, __H_MAX, tb, blob_data(cl->meta), blob_len(cl->meta));
+
        switch (cl->status_code) {
+       case 416:
+               if (!quiet)
+                       fprintf(stderr, "File download already fully retrieved; nothing to do.\n");
+               request_done(cl);
+               break;
+       case 206:
+               if (!cur_resume) {
+                       if (!quiet)
+                               fprintf(stderr, "Error: Partial content received, full content requested\n");
+                       error_ret = 8;
+                       request_done(cl);
+                       break;
+               }
+
+               if (!tb[H_RANGE]) {
+                       if (!quiet)
+                               fprintf(stderr, "Content-Range header is missing\n");
+                       error_ret = 8;
+                       break;
+               }
+
+               if (sscanf(blobmsg_get_string(tb[H_RANGE]),
+                          "bytes %"PRIu64"-%"PRIu64"/%"PRIu64,
+                          &resume_offset, &resume_end, &resume_size) != 3) {
+                       if (!quiet)
+                               fprintf(stderr, "Content-Range header is invalid\n");
+                       error_ret = 8;
+                       break;
+               }
+               /* fall through */
        case 204:
        case 200:
-               output_fd = open_output_file(cl->url->location, true);
+               if (no_output)
+                       break;
+
+               if (tb[H_LEN])
+                       out_len = strtoul(blobmsg_get_string(tb[H_LEN]), NULL, 10);
+
+               output_fd = open_output_file(cl->url->location, resume_offset);
                if (output_fd < 0) {
                        if (!quiet)
                                perror("Cannot open output file");
@@ -115,17 +263,23 @@ static void header_done_cb(struct uclient *cl)
 static void read_data_cb(struct uclient *cl)
 {
        char buf[256];
+       ssize_t n;
        int len;
 
-       if (output_fd < 0)
+       if (!no_output && output_fd < 0)
                return;
 
        while (1) {
                len = uclient_read(cl, buf, sizeof(buf));
-               if (!len)
+               if (len <= 0)
                        return;
 
-               write(output_fd, buf, len);
+               out_bytes += len;
+               if (!no_output) {
+                       n = write(output_fd, buf, len);
+                       if (n < 0)
+                               return;
+               }
        }
 }
 
@@ -138,23 +292,133 @@ static void msg_connecting(struct uclient *cl)
                return;
 
        uclient_get_addr(addr, &port, &cl->remote_addr);
-       fprintf(stderr, "Connecting to %s %s:%d\n", cl->url->host, addr, port);
+       fprintf(stderr, "Connecting to %s:%d\n", addr, port);
+}
+
+static void check_resume_offset(struct uclient *cl)
+{
+       char range_str[64];
+       struct stat st;
+       char *file;
+       int ret;
+
+       file = uclient_get_url_filename(cl->url->location, "index.html");
+       if (!file)
+               return;
+
+       ret = stat(file, &st);
+       free(file);
+       if (ret)
+               return;
+
+       if (!st.st_size)
+               return;
+
+       snprintf(range_str, sizeof(range_str), "bytes=%"PRIu64"-", (uint64_t) st.st_size);
+       uclient_http_set_header(cl, "Range", range_str);
 }
 
-static void init_request(struct uclient *cl)
+static int init_request(struct uclient *cl)
 {
-       uclient_connect(cl);
+       int rc;
+
+       out_offset = 0;
+       out_bytes = 0;
+       out_len = 0;
+       uclient_http_set_ssl_ctx(cl, ssl_ops, ssl_ctx, verify);
+
+       if (timeout)
+               cl->timeout_msecs = timeout * 1000;
+
+       rc = uclient_connect(cl);
+       if (rc)
+               return rc;
+
        msg_connecting(cl);
-       uclient_http_set_request_type(cl, "GET");
-       uclient_request(cl);
+
+       rc = uclient_http_set_request_type(cl, post_data || post_file ? "POST" : "GET");
+       if (rc)
+               return rc;
+
+       uclient_http_reset_headers(cl);
+       uclient_http_set_header(cl, "User-Agent", user_agent);
+       if (cur_resume)
+               check_resume_offset(cl);
+
+       if (post_data) {
+               uclient_http_set_header(cl, "Content-Type", "application/x-www-form-urlencoded");
+               uclient_write(cl, post_data, strlen(post_data));
+       }
+       else if(post_file)
+       {
+               FILE *input_file;
+               uclient_http_set_header(cl, "Content-Type", "application/x-www-form-urlencoded");
+
+               input_file = fopen(post_file, "r");
+               if (!input_file)
+                       return errno;
+
+               char tbuf[1024];
+               size_t rlen = 0;
+               do
+               {
+                       rlen = fread(tbuf, 1, sizeof(tbuf), input_file);
+                       uclient_write(cl, tbuf, rlen);
+               }
+               while(rlen);
+
+               fclose(input_file);
+       }
+
+       rc = uclient_request(cl);
+       if (rc)
+               return rc;
+
+       return 0;
 }
 
+static void request_done(struct uclient *cl)
+{
+       const char *proxy_url;
+
+       if (n_urls) {
+               proxy_url = get_proxy_url(*urls);
+               if (proxy_url) {
+                       uclient_set_url(cl, proxy_url, NULL);
+                       uclient_set_proxy_url(cl, *urls, auth_str);
+               } else {
+                       uclient_set_url(cl, *urls, auth_str);
+               }
+               n_urls--;
+               cur_resume = resume;
+               error_ret = init_request(cl);
+               if (error_ret == 0)
+                       return;
+       }
+
+       if (output_fd >= 0 && !opt_output_file) {
+               close(output_fd);
+               output_fd = -1;
+       }
+       uclient_disconnect(cl);
+       uloop_end();
+}
+
+
 static void eof_cb(struct uclient *cl)
 {
+       if (!quiet) {
+               pmt_update(&pmt_timer);
+               uloop_timeout_cancel(&pmt_timer);
+               fprintf(stderr, "\n");
+       }
+
        if (!cl->data_eof) {
                if (!quiet)
                        fprintf(stderr, "Connection reset prematurely\n");
                error_ret = 4;
+       } else if (!quiet) {
+               fprintf(stderr, "Download completed (%"PRIu64" bytes)\n", (uint64_t) out_bytes);
        }
        request_done(cl);
 }
@@ -169,6 +433,10 @@ static void handle_uclient_error(struct uclient *cl, int code)
                type = "Connection failed";
                error_ret = 4;
                break;
+       case UCLIENT_ERROR_TIMEDOUT:
+               type = "Connection timed out";
+               error_ret = 4;
+               break;
        case UCLIENT_ERROR_SSL_INVALID_CERT:
                type = "Invalid SSL certificate";
                ignore = !verify;
@@ -205,16 +473,37 @@ static int usage(const char *progname)
        fprintf(stderr,
                "Usage: %s [options] <URL>\n"
                "Options:\n"
-               "       -q:                             Turn off status messages\n"
-               "       -O <file>:                      Redirect output to file (use \"-\" for stdout)\n"
+               "       -4                              Use IPv4 only\n"
+               "       -6                              Use IPv6 only\n"
+               "       -q                              Turn off status messages\n"
+               "       -O <file>                       Redirect output to file (use \"-\" for stdout)\n"
+               "       -P <dir>                        Set directory for output files\n"
+               "       --user=<user>                   HTTP authentication username\n"
+               "       --password=<password>           HTTP authentication password\n"
+               "       --user-agent|-U <str>           Set HTTP user agent\n"
+               "       --post-data=STRING              use the POST method; send STRING as the data\n"
+               "       --post-file=FILE                use the POST method; send FILE as the data\n"
+               "       --spider|-s                     Spider mode - only check file existence\n"
+               "       --timeout=N|-T N                Set connect/request timeout to N seconds\n"
+               "       --proxy=on|off|-Y on|off        Enable/disable env var configured proxy\n"
                "\n"
                "HTTPS options:\n"
-               "       --ca-certificate=<cert>:        Load CA certificates from file <cert>\n"
-               "       --no-check-certificate:         don't validate the server's certificate\n"
+               "       --ca-certificate=<cert>         Load CA certificates from file <cert>\n"
+               "       --no-check-certificate          don't validate the server's certificate\n"
+               "       --ciphers=<cipherlist>          Set the cipher list string\n"
                "\n", progname);
        return 1;
 }
 
+static void init_ca_cert(void)
+{
+       glob_t gl;
+       unsigned int i;
+
+       glob("/etc/ssl/certs/*.crt", 0, NULL, &gl);
+       for (i = 0; i < gl.gl_pathc; i++)
+               ssl_ops->context_add_ca_crt_file(ssl_ctx, gl.gl_pathv[i]);
+}
 
 static void init_ustream_ssl(void)
 {
@@ -233,31 +522,69 @@ static void init_ustream_ssl(void)
 
 static int no_ssl(const char *progname)
 {
-       fprintf(stderr, "%s: SSL support not available, please install ustream-ssl\n", progname);
+       fprintf(stderr,
+               "%s: SSL support not available, please install one of the "
+               "libustream-.*[ssl|tls] packages as well as the ca-bundle and "
+               "ca-certificates packages.\n",
+               progname);
+
        return 1;
 }
 
 enum {
        L_NO_CHECK_CERTIFICATE,
        L_CA_CERTIFICATE,
+       L_CIPHERS,
+       L_USER,
+       L_PASSWORD,
+       L_USER_AGENT,
+       L_POST_DATA,
+       L_POST_FILE,
+       L_SPIDER,
+       L_TIMEOUT,
+       L_CONTINUE,
+       L_PROXY,
+       L_NO_PROXY,
+       L_QUIET,
 };
 
 static const struct option longopts[] = {
-       [L_NO_CHECK_CERTIFICATE] = { "no-check-certificate", no_argument },
-       [L_CA_CERTIFICATE] = { "ca-certificate", required_argument },
+       [L_NO_CHECK_CERTIFICATE] = { "no-check-certificate", no_argument, NULL, 0 },
+       [L_CA_CERTIFICATE] = { "ca-certificate", required_argument, NULL, 0 },
+       [L_CIPHERS] = { "ciphers", required_argument, NULL, 0 },
+       [L_USER] = { "user", required_argument, NULL, 0 },
+       [L_PASSWORD] = { "password", required_argument, NULL, 0 },
+       [L_USER_AGENT] = { "user-agent", required_argument, NULL, 0 },
+       [L_POST_DATA] = { "post-data", required_argument, NULL, 0 },
+       [L_POST_FILE] = { "post-file", required_argument, NULL, 0 },
+       [L_SPIDER] = { "spider", no_argument, NULL, 0 },
+       [L_TIMEOUT] = { "timeout", required_argument, NULL, 0 },
+       [L_CONTINUE] = { "continue", no_argument, NULL, 0 },
+       [L_PROXY] = { "proxy", required_argument, NULL, 0 },
+       [L_NO_PROXY] = { "no-proxy", no_argument, NULL, 0 },
+       [L_QUIET] = { "quiet", no_argument, NULL, 0 },
        {}
 };
 
+
+
 int main(int argc, char **argv)
 {
        const char *progname = argv[0];
+       const char *proxy_url;
+       char *username = NULL;
+       char *password = NULL;
        struct uclient *cl;
-       int ch;
        int longopt_idx = 0;
+       bool has_cert = false;
+       int i, ch;
+       int rc;
+       int af = -1;
 
+       signal(SIGPIPE, SIG_IGN);
        init_ustream_ssl();
 
-       while ((ch = getopt_long(argc, argv, "qO:", longopts, &longopt_idx)) != -1) {
+       while ((ch = getopt_long(argc, argv, "46cO:P:qsT:U:Y:", longopts, &longopt_idx)) != -1) {
                switch(ch) {
                case 0:
                        switch (longopt_idx) {
@@ -265,19 +592,98 @@ int main(int argc, char **argv)
                                verify = false;
                                break;
                        case L_CA_CERTIFICATE:
+                               has_cert = true;
                                if (ssl_ctx)
                                        ssl_ops->context_add_ca_crt_file(ssl_ctx, optarg);
                                break;
+                       case L_CIPHERS:
+                               if (ssl_ctx) {
+                                       if (ssl_ops->context_set_ciphers(ssl_ctx, optarg)) {
+                                               if (!quiet)
+                                                       fprintf(stderr, "No recognized ciphers in cipher list\n");
+                                               exit(1);
+                                       }
+                               }
+                               break;
+                       case L_USER:
+                               if (!strlen(optarg))
+                                       break;
+                               username = strdupa(optarg);
+                               memset(optarg, '*', strlen(optarg));
+                               break;
+                       case L_PASSWORD:
+                               if (!strlen(optarg))
+                                       break;
+                               password = strdupa(optarg);
+                               memset(optarg, '*', strlen(optarg));
+                               break;
+                       case L_USER_AGENT:
+                               user_agent = optarg;
+                               break;
+                       case L_POST_DATA:
+                               post_data = optarg;
+                               break;
+                       case L_POST_FILE:
+                               post_file = optarg;
+                               break;
+                       case L_SPIDER:
+                               no_output = true;
+                               break;
+                       case L_TIMEOUT:
+                               timeout = atoi(optarg);
+                               break;
+                       case L_CONTINUE:
+                               resume = true;
+                               break;
+                       case L_PROXY:
+                               if (strcmp(optarg, "on") != 0)
+                                       proxy = false;
+                               break;
+                       case L_NO_PROXY:
+                               proxy = false;
+                               break;
+                       case L_QUIET:
+                               quiet = true;
+                               break;
                        default:
                                return usage(progname);
                        }
                        break;
+               case '4':
+                       af = AF_INET;
+                       break;
+               case '6':
+                       af = AF_INET6;
+                       break;
+               case 'c':
+                       resume = true;
+                       break;
+               case 'U':
+                       user_agent = optarg;
+                       break;
                case 'O':
-                       output_file = optarg;
+                       opt_output_file = optarg;
+                       break;
+               case 'P':
+                       if (chdir(optarg)) {
+                               if (!quiet)
+                                       perror("Change output directory");
+                               exit(1);
+                       }
                        break;
                case 'q':
                        quiet = true;
                        break;
+               case 's':
+                       no_output = true;
+                       break;
+               case 'T':
+                       timeout = atoi(optarg);
+                       break;
+               case 'Y':
+                       if (strcmp(optarg, "on") != 0)
+                               proxy = false;
+                       break;
                default:
                        return usage(progname);
                }
@@ -286,25 +692,64 @@ int main(int argc, char **argv)
        argv += optind;
        argc -= optind;
 
-       if (argc != 1)
+       if (verify && !has_cert)
+               default_certs = true;
+
+       if (argc < 1)
                return usage(progname);
 
-       if (!strncmp(argv[0], "https", 5) && !ssl_ctx)
-               return no_ssl(progname);
+       if (!ssl_ctx) {
+               for (i = 0; i < argc; i++) {
+                       if (!strncmp(argv[i], "https", 5))
+                               return no_ssl(progname);
+               }
+       }
+
+       urls = argv + 1;
+       n_urls = argc - 1;
 
        uloop_init();
 
-       cl = uclient_new(argv[0], NULL, &cb);
+       if (username) {
+               if (password) {
+                       rc = asprintf(&auth_str, "%s:%s", username, password);
+                       if (rc < 0)
+                               return rc;
+               } else
+                       auth_str = username;
+       }
+
+       if (!quiet)
+               fprintf(stderr, "Downloading '%s'\n", argv[0]);
+
+       proxy_url = get_proxy_url(argv[0]);
+       if (proxy_url) {
+               cl = uclient_new(proxy_url, auth_str, &cb);
+               if (cl)
+                   uclient_set_proxy_url(cl, argv[0], NULL);
+       } else {
+               cl = uclient_new(argv[0], auth_str, &cb);
+       }
        if (!cl) {
                fprintf(stderr, "Failed to allocate uclient context\n");
                return 1;
        }
+       if (af >= 0)
+           uclient_http_set_address_family(cl, af);
+
+       if (ssl_ctx && default_certs)
+               init_ca_cert();
+
+       cur_resume = resume;
+       rc = init_request(cl);
+       if (!rc) {
+               /* no error received, we can enter main loop */
+               uloop_run();
+       } else {
+               fprintf(stderr, "Failed to send request: %s\n", strerror(rc));
+               error_ret = 4;
+       }
 
-       if (ssl_ctx)
-               uclient_http_set_ssl_ctx(cl, ssl_ops, ssl_ctx, verify);
-
-       init_request(cl);
-       uloop_run();
        uloop_done();
 
        uclient_free(cl);