Annotation of libwww/Library/src/HTTP.c, revision 1.103
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
6: **
7: ** This module implments the HTTP protocol as a state machine
1.55 frystyk 8: **
9: ** History:
1.59 frystyk 10: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 11: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
12: ** Forward, redirection, error handling and referer field
1.67 duns 13: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 14: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 15: **
1.1 timbl 16: */
17:
1.78 frystyk 18: /* Library include files */
19: #include "tcp.h"
1.1 timbl 20: #include "HTUtils.h"
1.78 frystyk 21: #include "HTString.h"
1.71 frystyk 22: #include "HTParse.h"
1.1 timbl 23: #include "HTTCP.h"
24: #include "HTFormat.h"
1.85 frystyk 25: #include "HTSocket.h"
1.94 frystyk 26: #include "HTReqMan.h"
1.2 timbl 27: #include "HTAlert.h"
1.14 luotonen 28: #include "HTAABrow.h" /* Access Authorization */
1.20 timbl 29: #include "HTTee.h" /* Tee off a cache stream */
1.78 frystyk 30: #include "HTFWrite.h" /* Write to cache file */
1.90 frystyk 31: #include "HTCache.h"
1.80 frystyk 32: #include "HTWriter.h"
1.54 luotonen 33: #include "HTError.h"
1.94 frystyk 34: #include "HTAccess.h"
1.55 frystyk 35: #include "HTChunk.h"
1.71 frystyk 36: #include "HTGuess.h"
1.95 frystyk 37: #include "HTNetMan.h"
1.80 frystyk 38: #include "HTTPReq.h"
1.55 frystyk 39: #include "HTTP.h" /* Implements */
40:
41: /* Macros and other defines */
1.94 frystyk 42: #ifndef HTTP_PORT
43: #define HTTP_PORT 80 /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
44: #endif
45:
1.71 frystyk 46: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
47: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
48: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
49: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 50: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 51:
1.59 frystyk 52: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 53:
54: /* Final states have negative value */
1.59 frystyk 55: typedef enum _HTTPState {
1.81 frystyk 56: HTTP_RETRY = -4,
1.71 frystyk 57: HTTP_ERROR = -3,
58: HTTP_NO_DATA = -2,
59: HTTP_GOT_DATA = -1,
60: HTTP_BEGIN = 0,
61: HTTP_NEED_CONNECTION,
62: HTTP_NEED_REQUEST,
63: HTTP_REDIRECTION,
1.91 frystyk 64: HTTP_NOT_MODIFIED,
65: HTTP_EXPIRED,
1.71 frystyk 66: HTTP_AA
1.59 frystyk 67: } HTTPState;
1.55 frystyk 68:
1.94 frystyk 69: /* This is the context structure for the this module */
1.55 frystyk 70: typedef struct _http_info {
1.81 frystyk 71: HTTPState state; /* Current State of the connection */
72: HTTPState next; /* Next state */
1.55 frystyk 73: } http_info;
74:
1.88 frystyk 75: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 76:
1.71 frystyk 77: struct _HTStream {
78: CONST HTStreamClass * isa;
79: HTStream * target;
80: HTRequest * request;
81: http_info * http;
82: HTSocketEOL state;
83: BOOL transparent;
1.81 frystyk 84: char * version; /* Should we save this? */
1.71 frystyk 85: int status;
1.81 frystyk 86: char * reason;
1.71 frystyk 87: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 88: int buflen;
1.71 frystyk 89: };
1.21 luotonen 90:
1.71 frystyk 91: /* ------------------------------------------------------------------------- */
92: /* Help Functions */
93: /* ------------------------------------------------------------------------- */
1.21 luotonen 94:
1.94 frystyk 95: /* HTTPCleanup
96: ** -----------
1.55 frystyk 97: ** This function closes the connection and frees memory.
1.94 frystyk 98: ** Returns YES on OK, else NO
1.1 timbl 99: */
1.94 frystyk 100: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 101: {
1.94 frystyk 102: HTNet *net = req->net;
103: http_info *http = (http_info *) net->context;
1.80 frystyk 104:
1.94 frystyk 105: /* Free stream with data TO network */
106: if (!HTRequest_isDestination(req) && req->input_stream) {
107: if (status == HT_INTERRUPTED)
108: (*req->input_stream->isa->abort)(req->input_stream, NULL);
109: else
110: (*req->input_stream->isa->_free)(req->input_stream);
111: }
1.88 frystyk 112:
1.94 frystyk 113: /* Remove the request object and our own context structure for http */
114: HTNet_delete(net, status);
115: FREE(http);
116: return YES;
1.55 frystyk 117: }
118:
119:
1.94 frystyk 120: PRIVATE BOOL HTTPAuthentication (HTRequest * request)
1.71 frystyk 121: {
122: HTAAScheme scheme;
123: HTList *valid_schemes = HTList_new();
124: HTAssocList **scheme_specifics = NULL;
1.76 frystyk 125: char *tmplate = NULL;
1.71 frystyk 126:
127: if (request->WWWAAScheme) {
128: if ((scheme = HTAAScheme_enum(request->WWWAAScheme)) != HTAA_UNKNOWN) {
129: HTList_addObject(valid_schemes, (void *) scheme);
130: if (!scheme_specifics) {
131: int i;
132: scheme_specifics = (HTAssocList**)
133: malloc(HTAA_MAX_SCHEMES * sizeof(HTAssocList*));
134: if (!scheme_specifics)
135: outofmem(__FILE__, "HTTPAuthentication");
136: for (i=0; i < HTAA_MAX_SCHEMES; i++)
137: scheme_specifics[i] = NULL;
138: }
139: scheme_specifics[scheme] = HTAA_parseArgList(request->WWWAARealm);
140: } else if (PROT_TRACE) {
141: HTErrorAdd(request, ERR_INFO, NO, HTERR_UNKNOWN_AA,
142: (void *) request->WWWAAScheme, 0, "HTTPAuthentication");
143: return NO;
144: }
145: }
146: if (request->WWWprotection) {
147: if (PROT_TRACE)
1.102 frystyk 148: TTYPrint(TDEST, "Protection template set to `%s'\n",
1.71 frystyk 149: request->WWWprotection);
1.76 frystyk 150: StrAllocCopy(tmplate, request->WWWprotection);
1.71 frystyk 151: }
152: request->valid_schemes = valid_schemes;
153: request->scheme_specifics = scheme_specifics;
1.76 frystyk 154: request->prot_template = tmplate;
1.71 frystyk 155: return YES;
156: }
157:
158:
159: /*
160: ** This is a big switch handling all HTTP return codes. It puts in any
161: ** appropiate error message and decides whether we should expect data
1.78 frystyk 162: ** or not.
1.55 frystyk 163: */
1.100 frystyk 164: PRIVATE void HTTPNextState (HTStream * me)
1.55 frystyk 165: {
1.71 frystyk 166: switch (me->status) {
167:
1.78 frystyk 168: case 0: /* 0.9 response */
169: case 200:
170: case 201:
171: case 202:
172: case 203:
1.81 frystyk 173: me->http->next = HTTP_GOT_DATA;
1.71 frystyk 174: break;
1.78 frystyk 175:
176: case 204: /* No Response */
1.81 frystyk 177: me->http->next = HTTP_NO_DATA;
1.71 frystyk 178: break;
1.78 frystyk 179:
1.71 frystyk 180: case 301: /* Moved */
181: case 302: /* Found */
1.81 frystyk 182: me->http->next = HTTP_REDIRECTION;
1.71 frystyk 183: break;
1.55 frystyk 184:
1.71 frystyk 185: case 303: /* Method */
1.92 frystyk 186: HTAlert(me->request,
187: "This client doesn't support automatic redirection of type `Method'");
1.81 frystyk 188: me->http->next = HTTP_ERROR;
1.71 frystyk 189: break;
1.91 frystyk 190:
191: case 304: /* Not Modified */
192: me->http->next = HTTP_NOT_MODIFIED;
193: break;
1.55 frystyk 194:
1.78 frystyk 195: case 400: /* Bad Request */
196: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
1.100 frystyk 197: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 198: me->http->next = HTTP_ERROR;
1.71 frystyk 199: break;
1.70 howcome 200:
1.71 frystyk 201: case 401:
1.78 frystyk 202: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.100 frystyk 203: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 204: me->http->next = HTTP_AA;
1.71 frystyk 205: break;
206:
207: case 402: /* Payment required */
1.78 frystyk 208: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
1.100 frystyk 209: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 210: me->http->next = HTTP_ERROR;
1.71 frystyk 211: break;
1.55 frystyk 212:
1.71 frystyk 213: case 403: /* Forbidden */
1.78 frystyk 214: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
1.100 frystyk 215: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 216: me->http->next = HTTP_ERROR;
1.71 frystyk 217: break;
1.55 frystyk 218:
1.71 frystyk 219: case 404: /* Not Found */
1.78 frystyk 220: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
1.100 frystyk 221: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 222: me->http->next = HTTP_ERROR;
1.71 frystyk 223: break;
224:
1.78 frystyk 225: case 405: /* Not Allowed */
226: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
1.100 frystyk 227: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 228: me->http->next = HTTP_ERROR;
1.78 frystyk 229: break;
230:
231: case 406: /* None Acceptable */
232: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
1.100 frystyk 233: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 234: me->http->next = HTTP_ERROR;
1.78 frystyk 235: break;
236:
237: case 407: /* Proxy Authentication Required */
238: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PROXY,
1.100 frystyk 239: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 240: me->http->next = HTTP_ERROR;
1.78 frystyk 241: break;
242:
243: case 408: /* Request Timeout */
244: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
1.100 frystyk 245: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 246: me->http->next = HTTP_ERROR;
1.78 frystyk 247: break;
248:
1.71 frystyk 249: case 500:
1.78 frystyk 250: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
1.100 frystyk 251: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 252: me->http->next = HTTP_ERROR;
1.78 frystyk 253: break;
254:
1.71 frystyk 255: case 501:
1.78 frystyk 256: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
1.100 frystyk 257: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 258: me->http->next = HTTP_ERROR;
1.78 frystyk 259: break;
260:
261: case 502:
262: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
1.100 frystyk 263: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 264: me->http->next = HTTP_ERROR;
1.78 frystyk 265: break;
266:
267: case 503:
268: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_DOWN,
1.100 frystyk 269: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 270:
271: /* If Retry-After header is found then return HT_RETRY else HT_ERROR */
272: if (me->request->retry_after)
273: me->http->next = HTTP_RETRY;
274: else
275: me->http->next = HTTP_ERROR;
1.78 frystyk 276: break;
277:
278: case 504:
279: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
1.100 frystyk 280: me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 281: me->http->next = HTTP_ERROR;
1.71 frystyk 282: break;
1.78 frystyk 283:
1.71 frystyk 284: default: /* bad number */
285: HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.100 frystyk 286: (void *) me->buffer, me->buflen, "HTTPNextState");
1.81 frystyk 287: me->http->next = HTTP_ERROR;
1.71 frystyk 288: break;
1.55 frystyk 289: }
290: }
291:
1.71 frystyk 292: /* ------------------------------------------------------------------------- */
293: /* HTTP Status Line Stream */
294: /* ------------------------------------------------------------------------- */
1.55 frystyk 295:
1.71 frystyk 296: /*
1.80 frystyk 297: ** Analyse the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 298: ** then create a MIME-stream, else create a Guess stream to find out
299: ** what the 0.9 server is sending. We need to copy the buffer as we don't
300: ** know if we can modify the contents or not.
1.78 frystyk 301: **
302: ** Stream handling is a function of the status code returned from the
303: ** server:
304: ** 200: Use `output_stream' in HTRequest structure
1.94 frystyk 305: ** else: Use `debug_stream' in HTRequest structure
1.80 frystyk 306: **
307: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 308: */
1.100 frystyk 309: PRIVATE int stream_pipe (HTStream * me)
1.56 frystyk 310: {
1.71 frystyk 311: HTRequest *req = me->request;
1.95 frystyk 312: HTNet *net = req->net;
1.80 frystyk 313: if (me->target) {
314: int status = PUTBLOCK(me->buffer, me->buflen);
315: if (status == HT_OK)
316: me->transparent = YES;
317: return status;
1.88 frystyk 318: } else if (HTRequest_isSource(req) && !req->output_stream) {
319: /*
320: ** We need to wait for the destinations to get ready
321: */
322: return HT_WOULD_BLOCK;
1.80 frystyk 323: }
1.88 frystyk 324:
1.81 frystyk 325: if (strncasecomp(me->buffer, "http/", 5)) {
1.80 frystyk 326: int status;
327: HTErrorAdd(req, ERR_INFO, NO, HTERR_HTTP09,
328: (void *) me->buffer, me->buflen, "HTTPStatusStream");
329: me->target = HTGuess_new(req, NULL, WWW_UNKNOWN,
330: req->output_format, req->output_stream);
1.88 frystyk 331: me->http->next = HTTP_GOT_DATA;
1.80 frystyk 332: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
333: me->transparent = YES;
1.98 frystyk 334: HTDNS_setServerVersion(net->dns, HTTP_09);
1.80 frystyk 335: return status;
336: } else {
1.81 frystyk 337: char *ptr = me->buffer+5; /* Skip the HTTP part */
338: me->version = HTNextField(&ptr);
1.95 frystyk 339:
340: /* here we want to find out when to use persistent connection */
1.98 frystyk 341: HTDNS_setServerVersion(net->dns, HTTP_10);
1.95 frystyk 342:
1.81 frystyk 343: me->status = atoi(HTNextField(&ptr));
344: me->reason = ptr;
345: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
346: *ptr = '\0';
347: else if ((ptr = strchr(me->reason, '\n')) != NULL)
348: *ptr = '\0';
349:
350: /* Set up the streams */
351: if (me->status==200) {
1.80 frystyk 352: HTStream *s;
1.103 ! frystyk 353: me->target = HTStreamStack(WWW_MIME, req->output_format,
! 354: req->output_stream, req, NO);
1.80 frystyk 355:
1.103 ! frystyk 356: /* howcome: test for return value from HTCacheWriter 12/1/95 */
! 357: if (req->method==METHOD_GET && HTCache_isEnabled() &&
! 358: (s = HTCacheWriter(req, NULL, WWW_MIME, req->output_format,
! 359: req->output_stream))) {
! 360: me->target = HTTee(me->target, s);
! 361: }
1.94 frystyk 362: } else if (req->debug_stream) {
363: me->target = HTStreamStack(WWW_MIME, req->debug_format,
364: req->debug_stream, req, NO);
1.71 frystyk 365: } else {
1.103 ! frystyk 366: /* We still need to parser the MIME part */
! 367: me->target = HTStreamStack(WWW_MIME, WWW_PRESENT,
! 368: HTBlackHole(), req, NO);
1.56 frystyk 369: }
1.103 ! frystyk 370: if (!me->target) me->target = HTBlackHole();
1.56 frystyk 371: }
1.81 frystyk 372: HTTPNextState(me); /* Get next state */
1.80 frystyk 373: me->transparent = YES;
374: return HT_OK;
1.71 frystyk 375: }
1.56 frystyk 376:
1.80 frystyk 377: /*
378: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
379: ** is found
380: */
1.100 frystyk 381: PRIVATE int HTTPStatus_put_block (HTStream * me, CONST char * b, int l)
1.71 frystyk 382: {
1.80 frystyk 383: while (!me->transparent && l-- > 0) {
384: int status;
385: if (me->target) {
386: if ((status = stream_pipe(me)) != HT_OK)
387: return status;
388: } else {
389: *(me->buffer+me->buflen++) = *b;
390: if (me->state == EOL_FCR) {
391: if (*b == LF) { /* Line found */
392: if ((status = stream_pipe(me)) != HT_OK)
393: return status;
394: } else {
395: me->state = EOL_BEGIN;
396: }
397: } else if (*b == CR) {
398: me->state = EOL_FCR;
399: } else if (*b == LF) {
400: if ((status = stream_pipe(me)) != HT_OK)
401: return status;
1.71 frystyk 402: } else {
1.80 frystyk 403: if (me->buflen >= MAX_STATUS_LEN) {
404: if ((status = stream_pipe(me)) != HT_OK)
405: return status;
406: }
1.71 frystyk 407: }
1.80 frystyk 408: b++;
1.71 frystyk 409: }
1.56 frystyk 410: }
1.99 frystyk 411: if (l > 0) return PUTBLOCK(b, l);
412: return HT_OK;
1.56 frystyk 413: }
414:
1.100 frystyk 415: PRIVATE int HTTPStatus_put_string (HTStream * me, CONST char * s)
1.71 frystyk 416: {
1.80 frystyk 417: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 418: }
1.56 frystyk 419:
1.100 frystyk 420: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 421: {
1.80 frystyk 422: return HTTPStatus_put_block(me, &c, 1);
423: }
424:
1.100 frystyk 425: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 426: {
427: return (*me->target->isa->flush)(me->target);
1.71 frystyk 428: }
429:
1.100 frystyk 430: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 431: {
1.87 frystyk 432: int status = HT_OK;
433: if (me->target) {
434: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
435: return HT_WOULD_BLOCK;
436: }
1.71 frystyk 437: free(me);
1.100 frystyk 438: return status;
1.71 frystyk 439: }
440:
1.100 frystyk 441: PRIVATE int HTTPStatus_abort (HTStream * me, HTError e)
1.71 frystyk 442: {
443: if (me->target)
1.74 frystyk 444: ABORT_TARGET;
1.71 frystyk 445: free(me);
1.74 frystyk 446: if (PROT_TRACE)
1.102 frystyk 447: TTYPrint(TDEST, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 448: return HT_ERROR;
1.71 frystyk 449: }
450:
451: /* HTTPStatus Stream
452: ** -----------------
453: */
454: PRIVATE CONST HTStreamClass HTTPStatusClass =
455: {
456: "HTTPStatus",
1.80 frystyk 457: HTTPStatus_flush,
1.71 frystyk 458: HTTPStatus_free,
459: HTTPStatus_abort,
460: HTTPStatus_put_character,
461: HTTPStatus_put_string,
462: HTTPStatus_put_block
463: };
464:
1.100 frystyk 465: PRIVATE HTStream * HTTPStatus_new (HTRequest * request, http_info * http)
1.71 frystyk 466: {
467: HTStream * me = (HTStream *) calloc(1, sizeof(HTStream));
468: if (!me) outofmem(__FILE__, "HTTPStatus_new");
469: me->isa = &HTTPStatusClass;
470: me->request = request;
471: me->http = http;
472: me->state = EOL_BEGIN;
473: return me;
474: }
475:
476: /* ------------------------------------------------------------------------- */
477:
478: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 479: ** ==============================
480: **
481: ** Given a hypertext address, this routine loads a document.
482: **
483: ** On entry,
484: ** request This is the request structure
1.94 frystyk 485: ** returns HT_ERROR Error has occured in call back
486: ** HT_OK Call back was OK
1.55 frystyk 487: */
1.94 frystyk 488: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request, SockOps ops)
1.55 frystyk 489: {
1.71 frystyk 490: int status = HT_ERROR;
1.94 frystyk 491: HTNet *net = request->net; /* Generic protocol information */
1.55 frystyk 492: http_info *http; /* Specific protocol information */
1.17 timbl 493:
1.94 frystyk 494: /*
495: ** Initiate a new http structure and bind to request structure
496: ** This is actually state HTTP_BEGIN, but it can't be in the state
497: ** machine as we need the structure first.
498: */
499: if (ops == FD_NONE) {
1.102 frystyk 500: if (PROT_TRACE) TTYPrint(TDEST, "HTTP........ Looking for `%s\'\n",
1.94 frystyk 501: HTAnchor_physical(request->anchor));
1.71 frystyk 502: if ((http = (http_info *) calloc(1, sizeof(http_info))) == NULL)
503: outofmem(__FILE__, "HTLoadHTTP");
504: http->state = HTTP_BEGIN;
1.85 frystyk 505: http->next = HTTP_ERROR;
1.94 frystyk 506: net->context = http;
1.98 frystyk 507: } else if (ops == FD_CLOSE) { /* Interrupted */
1.100 frystyk 508: #if 1
509: if (HTRequest_isPostWeb(request))
510: #else
1.94 frystyk 511: if(HTRequest_isPostWeb(request)&&!HTRequest_isMainDestination(request))
1.100 frystyk 512: #endif
1.94 frystyk 513: HTTPCleanup(request, HT_IGNORE);
514: else
515: HTTPCleanup(request, HT_INTERRUPTED);
516: return HT_OK;
517: } else
518: http = (http_info *) net->context; /* Get existing copy */
1.71 frystyk 519:
520: /* Now jump into the machine. We know the state from the previous run */
521: while (1) {
522: switch (http->state) {
523: case HTTP_BEGIN:
524: /*
525: ** Compose authorization information (this was moved here
526: ** from after the making of the connection so that the connection
527: ** wouldn't have to wait while prompting username and password
528: ** from the user). -- AL 13.10.93
529: */
530: HTAA_composeAuth(request);
531: if (PROT_TRACE) {
532: if (request->authorization)
1.102 frystyk 533: TTYPrint(TDEST, "HTTP........ Sending Authorization: %s\n",
1.71 frystyk 534: request->authorization);
535: else
1.102 frystyk 536: TTYPrint(TDEST,
1.71 frystyk 537: "HTTP........ Not sending authorization (yet)\n");
538: }
539: http->state = HTTP_NEED_CONNECTION;
540: break;
541:
542: case HTTP_NEED_CONNECTION: /* Now let's set up a connection */
1.94 frystyk 543: status = HTDoConnect(net, HTAnchor_physical(request->anchor),
1.95 frystyk 544: HTTP_PORT);
1.80 frystyk 545: if (status == HT_OK) {
1.95 frystyk 546:
547: /* Check the protocol class */
1.97 frystyk 548: char *s_class = HTDNS_serverClass(net->dns);
549: if (s_class && strcasecomp(s_class, "http")) {
1.95 frystyk 550: HTErrorAdd(request, ERR_FATAL, NO, HTERR_CLASS,
551: NULL, 0, "HTLoadHTTP");
552: http->state = HTTP_ERROR;
553: break;
554: }
555: HTDNS_setServerClass(net->dns, "http");
556:
1.71 frystyk 557: if (PROT_TRACE)
1.102 frystyk 558: TTYPrint(TDEST, "HTTP........ Connected, socket %d\n",
1.94 frystyk 559: net->sockfd);
1.80 frystyk 560:
1.88 frystyk 561: /* Set up stream TO network */
562: request->input_stream =
1.100 frystyk 563: HTTPRequest_new(request, HTBufWriter_new(net, YES, 512));
1.88 frystyk 564:
565: /*
566: ** Set up concurrent read/write if this request isn't the
567: ** source for a PUT or POST. As source we don't start reading
568: ** before all destinations are ready. If destination then
569: ** register the input stream and get ready for read
570: */
571: if (HTRequest_isPostWeb(request)) {
1.94 frystyk 572: HTEvent_Register(net->sockfd, request, (SockOps) FD_READ,
573: HTLoadHTTP, net->priority);
1.88 frystyk 574: HTRequest_linkDestination(request);
575: }
576:
577: /* Set up stream FROM network and corresponding read buffer */
1.94 frystyk 578: net->isoc = HTInputSocket_new(net->sockfd);
579: net->target = HTImProxy ?
1.80 frystyk 580: request->output_stream : HTTPStatus_new(request, http);
1.88 frystyk 581:
1.71 frystyk 582: http->state = HTTP_NEED_REQUEST;
1.96 frystyk 583: } else if (status == HT_WOULD_BLOCK || status == HT_PERSISTENT)
1.94 frystyk 584: return HT_OK;
1.71 frystyk 585: else
586: http->state = HTTP_ERROR; /* Error or interrupt */
587: break;
588:
1.87 frystyk 589: /* As we can do simultanous read and write this is now one state */
1.80 frystyk 590: case HTTP_NEED_REQUEST:
1.94 frystyk 591: if (ops == FD_WRITE || ops == FD_NONE) {
1.88 frystyk 592: if (HTRequest_isDestination(request)) {
1.94 frystyk 593: HTNet *srcnet = request->source->net;
594: HTEvent_Register(srcnet->sockfd, request->source,
595: (SockOps) FD_READ,
1.100 frystyk 596: srcnet->cbf, srcnet->priority);
1.94 frystyk 597: return HT_OK;
1.80 frystyk 598: }
1.101 frystyk 599: status = request->PostCallback ?
600: request->PostCallback(request, request->input_stream) :
1.88 frystyk 601: (*request->input_stream->isa->flush)(request->input_stream);
1.71 frystyk 602: if (status == HT_WOULD_BLOCK)
1.94 frystyk 603: return HT_OK;
604: else
605: ops = FD_READ; /* Trick to ensure that we do READ */
606: } else if (ops == FD_READ) {
1.98 frystyk 607: status = HTSocketRead(request, net);
1.80 frystyk 608: if (status == HT_WOULD_BLOCK)
1.94 frystyk 609: return HT_OK;
610: else if (status == HT_LOADED)
611: http->state = http->next; /* Jump to next state */
1.91 frystyk 612: else if (status == HT_RELOAD)
613: http->state = HTTP_EXPIRED;
1.94 frystyk 614: else
615: http->state = HTTP_ERROR;
1.90 frystyk 616: } else {
1.78 frystyk 617: http->state = HTTP_ERROR;
1.90 frystyk 618: }
1.71 frystyk 619: break;
1.80 frystyk 620:
1.91 frystyk 621: case HTTP_NOT_MODIFIED:
622: http->state = HTTP_ERROR;
623: break;
624:
625: case HTTP_EXPIRED:
626: /* Dirty hack and fall through */
1.102 frystyk 627: if (PROT_TRACE) TTYPrint(TDEST, "HTTP........ Expired\n");
1.91 frystyk 628: request->redirect = request->anchor->address;
629:
1.80 frystyk 630: case HTTP_REDIRECTION:
1.88 frystyk 631: /* Clean up the other connections or just this one */
632: if (HTRequest_isPostWeb(request))
633: HTRequest_killPostWeb(request);
634: else
1.94 frystyk 635: HTTPCleanup(request, HT_IGNORE);
1.88 frystyk 636:
637: /* If we found a new URL in the response */
1.71 frystyk 638: if (request->redirect) {
639: if (status == 301) {
640: HTErrorAdd(request, ERR_INFO, NO, HTERR_MOVED,
641: (void *) request->redirect,
642: (int) strlen(request->redirect), "HTLoadHTTP");
643: } else if (status == 302) {
644: HTErrorAdd(request, ERR_INFO, NO, HTERR_FOUND,
645: (void *) request->redirect,
646: (int) strlen(request->redirect), "HTLoadHTTP");
1.55 frystyk 647: }
1.88 frystyk 648:
649: /* If we haven't reached the limit for redirection */
1.94 frystyk 650: if (HTRequest_retry(request)) {
1.87 frystyk 651: HTAnchor *anchor = HTAnchor_findAddress(request->redirect);
1.88 frystyk 652: if (HTRequest_isPostWeb(request)) {
653: HTRequest *dest = HTRequest_mainDestination(request);
654: char *msg=(char*)malloc(strlen(request->redirect)+100);
1.87 frystyk 655: if (!msg) outofmem(__FILE__, "HTLoadHTTP");
1.88 frystyk 656: sprintf(msg, "\nLocation of %s has changed to %s for method %s, continue operation?",
657: HTRequest_isDestination(request) ?
658: "destination" : "source", request->redirect,
659: HTMethod_name(request->method));
1.92 frystyk 660: if (HTConfirm(request, msg)) {
1.87 frystyk 661: free(msg);
1.88 frystyk 662:
663: /* The new anchor inherits the Post Web */
1.91 frystyk 664: HTAnchor_moveAllLinks((HTAnchor *) request->anchor,
665: anchor);
1.88 frystyk 666: if (HTRequest_isSource(request))
667: HTRequest_delete(request);
1.94 frystyk 668: return HTCopyAnchor((HTAnchor *) anchor, dest) ?
669: HT_OK : HT_ERROR;
1.87 frystyk 670: }
671: free(msg);
1.94 frystyk 672: return HT_OK;
1.101 frystyk 673: } if (request->PostCallback) {
1.87 frystyk 674: #if 0
1.94 frystyk 675: return HTUploadAnchor((HTAnchor*) anchor, request) ?
676: HT_OK : HT_ERROR;
1.87 frystyk 677: #endif
678: } else {
1.94 frystyk 679: return HTLoadAnchor((HTAnchor *) anchor, request) ?
680: HT_OK : HT_ERROR;
1.87 frystyk 681: }
1.71 frystyk 682: } else {
683: HTErrorAdd(request, ERR_FATAL, NO, HTERR_MAX_REDIRECT,
1.58 frystyk 684: NULL, 0, "HTLoadHTTP");
1.88 frystyk 685: if (HTRequest_isPostWeb(request)) {
686: BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 687: if (HTRequest_isDestination(request)) {
688: HTLink *link =
689: HTAnchor_findLink((HTAnchor *) request->source->anchor,
690: (HTAnchor *) request->anchor);
691: HTAnchor_setLinkResult(link, HT_LINK_ERROR);
692: }
1.94 frystyk 693: HTNet_callback(request, main ? HT_ERROR : HT_IGNORE);
1.88 frystyk 694: HTRequest_removeDestination(request);
695: }
1.94 frystyk 696: return HT_OK;
1.58 frystyk 697: }
1.71 frystyk 698: } else {
699: HTErrorAdd(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
700: NULL, 0, "HTLoadHTTP");
1.94 frystyk 701: return HT_OK;
1.71 frystyk 702: }
703: break;
1.80 frystyk 704:
1.71 frystyk 705: case HTTP_AA:
1.88 frystyk 706: /* Clean up the other connections or just this one */
707: if (HTRequest_isPostWeb(request))
708: HTRequest_killPostWeb(request);
709: else
1.94 frystyk 710: HTTPCleanup(request, HT_IGNORE);
1.88 frystyk 711:
712: /* Ask the user for a UserID and a passwd */
713: if (HTTPAuthentication(request) && HTAA_retryWithAuth(request)) {
1.94 frystyk 714: int ret;
1.88 frystyk 715: if (HTRequest_isPostWeb(request)) {
716: HTRequest *dest = HTRequest_mainDestination(request);
717: HTAnchor_appendMethods(request->anchor, request->method);
1.94 frystyk 718: ret=HTCopyAnchor((HTAnchor*)request->source->anchor, dest);
719: return ret ? HT_OK : HT_ERROR;
1.101 frystyk 720: } else if (request->PostCallback) {
1.85 frystyk 721: #if 0
1.94 frystyk 722: ret = HTUploadAnchor((HTAnchor*) request->anchor,request);
723: return ret ? HT_OK : HT_ERROR;
1.85 frystyk 724: #endif
725: } else {
1.94 frystyk 726: ret = HTLoadAnchor((HTAnchor *) request->anchor, request);
727: return ret ? HT_OK : HT_ERROR;
1.85 frystyk 728: }
1.88 frystyk 729: } else { /* If the guy said no :-( */
1.71 frystyk 730: HTErrorAdd(request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.94 frystyk 731: NULL, 0, "HTLoadHTTP");
1.88 frystyk 732: if (HTRequest_isPostWeb(request)) {
733: BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 734: if (HTRequest_isDestination(request)) {
735: HTLink *link =
736: HTAnchor_findLink((HTAnchor *) request->source->anchor,
737: (HTAnchor *) request->anchor);
738: HTAnchor_setLinkResult(link, HT_LINK_ERROR);
739: }
1.94 frystyk 740: HTNet_callback(request, main ? HT_ERROR : HT_IGNORE);
1.88 frystyk 741: HTRequest_removeDestination(request);
742: }
1.94 frystyk 743: return HT_OK;
1.71 frystyk 744: }
745: break;
1.80 frystyk 746:
1.71 frystyk 747: case HTTP_GOT_DATA:
1.88 frystyk 748: if (HTRequest_isPostWeb(request)) {
1.100 frystyk 749: HTTPCleanup(request, HTRequest_isMainDestination(request) ?
750: HT_ERROR : HT_IGNORE);
1.91 frystyk 751: if (HTRequest_isDestination(request)) {
752: HTLink *link =
753: HTAnchor_findLink((HTAnchor *) request->source->anchor,
754: (HTAnchor *) request->anchor);
755: HTAnchor_setLinkResult(link, HT_LINK_OK);
756: }
1.88 frystyk 757: HTRequest_removeDestination(request);
1.94 frystyk 758: } else
759: HTTPCleanup(request, HT_LOADED);
760: return HT_OK;
1.71 frystyk 761: break;
762:
763: case HTTP_NO_DATA:
1.88 frystyk 764: if (HTRequest_isPostWeb(request)) {
1.100 frystyk 765: HTTPCleanup(request, HTRequest_isMainDestination(request) ?
766: HT_ERROR : HT_IGNORE);
1.91 frystyk 767: if (HTRequest_isDestination(request)) {
768: HTLink *link =
769: HTAnchor_findLink((HTAnchor *) request->source->anchor,
770: (HTAnchor *) request->anchor);
771: HTAnchor_setLinkResult(link, HT_LINK_OK);
772: }
1.88 frystyk 773: HTRequest_removeDestination(request);
1.94 frystyk 774: } else
775: HTTPCleanup(request, HT_NO_DATA);
776: return HT_OK;
1.71 frystyk 777: break;
1.80 frystyk 778:
1.94 frystyk 779: case HTTP_RETRY:
1.88 frystyk 780: if (HTRequest_isPostWeb(request)) {
1.100 frystyk 781: HTTPCleanup(request, HTRequest_isMainDestination(request) ?
782: HT_ERROR : HT_IGNORE);
1.91 frystyk 783: HTRequest_killPostWeb(request);
784: if (HTRequest_isDestination(request)) {
785: HTLink *link =
786: HTAnchor_findLink((HTAnchor*) request->source->anchor,
787: (HTAnchor*) request->anchor);
788: HTAnchor_setLinkResult(link, HT_LINK_ERROR);
789: }
1.88 frystyk 790: HTRequest_removeDestination(request);
1.91 frystyk 791: } else
1.94 frystyk 792: HTTPCleanup(request, HT_RETRY);
793: return HT_OK;
1.81 frystyk 794: break;
795:
1.71 frystyk 796: case HTTP_ERROR:
1.88 frystyk 797: /* Clean up the other connections or just this one */
798: if (HTRequest_isPostWeb(request)) {
1.100 frystyk 799: HTTPCleanup(request, HTRequest_isMainDestination(request) ?
800: HT_ERROR : HT_IGNORE);
1.88 frystyk 801: HTRequest_killPostWeb(request);
1.91 frystyk 802: if (HTRequest_isDestination(request)) {
803: HTLink *link =
804: HTAnchor_findLink((HTAnchor *) request->source->anchor,
805: (HTAnchor *) request->anchor);
806: HTAnchor_setLinkResult(link, HT_LINK_ERROR);
807: }
808: HTRequest_removeDestination(request);
1.88 frystyk 809: } else
1.94 frystyk 810: HTTPCleanup(request, HT_ERROR);
811: return HT_OK;
1.71 frystyk 812: break;
813: }
814: } /* End of while(1) */
815: }
1.88 frystyk 816:
1.21 luotonen 817:
Webmaster