drm: Add asm/cpufeature.h
[dragonfly.git] / usr.bin / fetch / fetch.c
blob98554fc6190da5ba69ae8e6aa993582a34f52f86
1 /*-
2 * Copyright (c) 2000-2014 Dag-Erling Smørgrav
3 * Copyright (c) 2013 Michael Gmelin <freebsd@grem.de>
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer
11 * in this position and unchanged.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 * $FreeBSD: head/usr.bin/fetch/fetch.c 261234 2014-01-28 14:32:04Z des $
32 #include <sys/param.h>
33 #include <sys/socket.h>
34 #include <sys/stat.h>
35 #include <sys/time.h>
37 #include <ctype.h>
38 #include <err.h>
39 #include <errno.h>
40 #include <getopt.h>
41 #include <signal.h>
42 #include <stdint.h>
43 #include <stdio.h>
44 #include <stdlib.h>
45 #include <string.h>
46 #include <termios.h>
47 #include <unistd.h>
49 #include <fetch.h>
51 #define MINBUFSIZE 16384
52 #define TIMEOUT 120
54 /* Option flags */
55 static int A_flag; /* -A: do not follow 302 redirects */
56 static int a_flag; /* -a: auto retry */
57 static off_t B_size; /* -B: buffer size */
58 static int b_flag; /*! -b: workaround TCP bug */
59 static char *c_dirname; /* -c: remote directory */
60 static int d_flag; /* -d: direct connection */
61 static int F_flag; /* -F: restart without checking mtime */
62 static char *f_filename; /* -f: file to fetch */
63 static char *h_hostname; /* -h: host to fetch from */
64 static int i_flag; /* -i: specify file for mtime comparison */
65 static char *i_filename; /* name of input file */
66 static int l_flag; /* -l: link rather than copy file: URLs */
67 static int m_flag; /* -[Mm]: mirror mode */
68 static char *N_filename; /* -N: netrc file name */
69 static int n_flag; /* -n: do not preserve modification time */
70 static int o_flag; /* -o: specify output file */
71 static int o_directory; /* output file is a directory */
72 static char *o_filename; /* name of output file */
73 static int o_stdout; /* output file is stdout */
74 static int once_flag; /* -1: stop at first successful file */
75 static int p_flag; /* -[Pp]: use passive FTP */
76 static int R_flag; /* -R: don't delete partial files */
77 static int r_flag; /* -r: restart previous transfer */
78 static off_t S_size; /* -S: require size to match */
79 static int s_flag; /* -s: show size, don't fetch */
80 static long T_secs; /* -T: transfer timeout in seconds */
81 static int t_flag; /*! -t: workaround TCP bug */
82 static int U_flag; /* -U: do not use high ports */
83 static int v_level = 1; /* -v: verbosity level */
84 static int v_tty; /* stdout is a tty */
85 static pid_t pgrp; /* our process group */
86 static long w_secs; /* -w: retry delay */
87 static int family = PF_UNSPEC; /* -[46]: address family to use */
89 static int sigalrm; /* SIGALRM received */
90 static int siginfo; /* SIGINFO received */
91 static int sigint; /* SIGINT received */
93 static long ftp_timeout = TIMEOUT; /* default timeout for FTP transfers */
94 static long http_timeout = TIMEOUT;/* default timeout for HTTP transfers */
95 static char *buf; /* transfer buffer */
97 enum options
99 OPTION_BIND_ADDRESS,
100 OPTION_NO_FTP_PASSIVE_MODE,
101 OPTION_HTTP_REFERER,
102 OPTION_HTTP_USER_AGENT,
103 OPTION_NO_PROXY,
104 OPTION_SSL_ALLOW_SSL2,
105 OPTION_SSL_CA_CERT_FILE,
106 OPTION_SSL_CA_CERT_PATH,
107 OPTION_SSL_CLIENT_CERT_FILE,
108 OPTION_SSL_CLIENT_KEY_FILE,
109 OPTION_SSL_CRL_FILE,
110 OPTION_SSL_NO_SSL3,
111 OPTION_SSL_NO_TLS1,
112 OPTION_SSL_NO_VERIFY_HOSTNAME,
113 OPTION_SSL_NO_VERIFY_PEER
117 static struct option longopts[] =
119 /* mapping to single character argument */
120 { "one-file", no_argument, NULL, '1' },
121 { "ipv4-only", no_argument, NULL, '4' },
122 { "ipv6-only", no_argument, NULL, '6' },
123 { "no-redirect", no_argument, NULL, 'A' },
124 { "retry", no_argument, NULL, 'a' },
125 { "buffer-size", required_argument, NULL, 'B' },
126 /* -c not mapped, since it's deprecated */
127 { "direct", no_argument, NULL, 'd' },
128 { "force-restart", no_argument, NULL, 'F' },
129 /* -f not mapped, since it's deprecated */
130 /* -h not mapped, since it's deprecated */
131 { "if-modified-since", required_argument, NULL, 'i' },
132 { "symlink", no_argument, NULL, 'l' },
133 /* -M not mapped since it's the same as -m */
134 { "mirror", no_argument, NULL, 'm' },
135 { "netrc", required_argument, NULL, 'N' },
136 { "no-mtime", no_argument, NULL, 'n' },
137 { "output", required_argument, NULL, 'o' },
138 /* -P not mapped since it's the same as -p */
139 { "passive", no_argument, NULL, 'p' },
140 { "quiet", no_argument, NULL, 'q' },
141 { "keep-output", no_argument, NULL, 'R' },
142 { "restart", no_argument, NULL, 'r' },
143 { "require-size", required_argument, NULL, 'S' },
144 { "print-size", no_argument, NULL, 's' },
145 { "timeout", required_argument, NULL, 'T' },
146 { "passive-portrange-default", no_argument, NULL, 'T' },
147 { "verbose", no_argument, NULL, 'v' },
148 { "retry-delay", required_argument, NULL, 'w' },
150 /* options without a single character equivalent */
151 { "bind-address", required_argument, NULL, OPTION_BIND_ADDRESS },
152 { "no-passive", no_argument, NULL, OPTION_NO_FTP_PASSIVE_MODE },
153 { "referer", required_argument, NULL, OPTION_HTTP_REFERER },
154 { "user-agent", required_argument, NULL, OPTION_HTTP_USER_AGENT },
155 { "no-proxy", required_argument, NULL, OPTION_NO_PROXY },
156 { "allow-sslv2", no_argument, NULL, OPTION_SSL_ALLOW_SSL2 },
157 { "ca-cert", required_argument, NULL, OPTION_SSL_CA_CERT_FILE },
158 { "ca-path", required_argument, NULL, OPTION_SSL_CA_CERT_PATH },
159 { "cert", required_argument, NULL, OPTION_SSL_CLIENT_CERT_FILE },
160 { "key", required_argument, NULL, OPTION_SSL_CLIENT_KEY_FILE },
161 { "crl", required_argument, NULL, OPTION_SSL_CRL_FILE },
162 { "no-sslv3", no_argument, NULL, OPTION_SSL_NO_SSL3 },
163 { "no-tlsv1", no_argument, NULL, OPTION_SSL_NO_TLS1 },
164 { "no-verify-hostname", no_argument, NULL, OPTION_SSL_NO_VERIFY_HOSTNAME },
165 { "no-verify-peer", no_argument, NULL, OPTION_SSL_NO_VERIFY_PEER },
167 { NULL, 0, NULL, 0 }
171 * Signal handler
173 static void
174 sig_handler(int sig)
176 switch (sig) {
177 case SIGALRM:
178 sigalrm = 1;
179 break;
180 case SIGINFO:
181 siginfo = 1;
182 break;
183 case SIGINT:
184 sigint = 1;
185 break;
189 struct xferstat {
190 char name[64];
191 struct timeval start; /* start of transfer */
192 struct timeval last; /* time of last update */
193 struct timeval last2; /* time of previous last update */
194 off_t size; /* size of file per HTTP hdr */
195 off_t offset; /* starting offset in file */
196 off_t rcvd; /* bytes already received */
197 off_t lastrcvd; /* bytes received since last update */
201 * Compute and display ETA
203 static const char *
204 stat_eta(struct xferstat *xs)
206 static char str[16];
207 long elapsed, eta;
208 off_t received, expected;
210 elapsed = xs->last.tv_sec - xs->start.tv_sec;
211 received = xs->rcvd - xs->offset;
212 expected = xs->size - xs->rcvd;
213 eta = (long)((double)elapsed * expected / received);
214 if (eta > 3600)
215 snprintf(str, sizeof str, "%02ldh%02ldm",
216 eta / 3600, (eta % 3600) / 60);
217 else if (eta > 0)
218 snprintf(str, sizeof str, "%02ldm%02lds",
219 eta / 60, eta % 60);
220 else
221 snprintf(str, sizeof str, "%02ldm%02lds",
222 elapsed / 60, elapsed % 60);
223 return (str);
227 * Format a number as "xxxx YB" where Y is ' ', 'k', 'M'...
229 static const char *prefixes = " kMGTP";
230 static const char *
231 stat_bytes(off_t bytes)
233 static char str[16];
234 const char *prefix = prefixes;
236 while (bytes > 9999 && prefix[1] != '\0') {
237 bytes /= 1024;
238 prefix++;
240 snprintf(str, sizeof str, "%4jd %cB", (intmax_t)bytes, *prefix);
241 return (str);
245 * Compute and display transfer rate
247 static const char *
248 stat_bps(struct xferstat *xs)
250 static char str[16];
251 double delta, bps;
253 delta = (xs->last.tv_sec + (xs->last.tv_usec / 1.e6))
254 - (xs->last2.tv_sec + (xs->last2.tv_usec / 1.e6));
256 if (delta == 0.0) {
257 snprintf(str, sizeof str, "?? Bps");
258 } else {
259 bps = (xs->rcvd - xs->lastrcvd) / delta;
260 snprintf(str, sizeof str, "%sps", stat_bytes((off_t)bps));
262 return (str);
266 * Update the stats display
268 static void
269 stat_display(struct xferstat *xs, int force)
271 struct timeval now;
272 int ctty_pgrp;
274 /* check if we're the foreground process */
275 if (ioctl(STDERR_FILENO, TIOCGPGRP, &ctty_pgrp) == -1 ||
276 (pid_t)ctty_pgrp != pgrp)
277 return;
279 gettimeofday(&now, NULL);
280 if (!force && now.tv_sec <= xs->last.tv_sec)
281 return;
282 xs->last2 = xs->last;
283 xs->last = now;
285 fprintf(stderr, "\r%-46.46s", xs->name);
286 if (xs->size <= 0) {
287 setproctitle("%s [%s]", xs->name, stat_bytes(xs->rcvd));
288 fprintf(stderr, " %s", stat_bytes(xs->rcvd));
289 } else {
290 setproctitle("%s [%d%% of %s]", xs->name,
291 (int)((100.0 * xs->rcvd) / xs->size),
292 stat_bytes(xs->size));
293 fprintf(stderr, "%3d%% of %s",
294 (int)((100.0 * xs->rcvd) / xs->size),
295 stat_bytes(xs->size));
297 if (force == 2) {
298 xs->lastrcvd = xs->offset;
299 xs->last2 = xs->start;
301 fprintf(stderr, " %s", stat_bps(xs));
302 if ((xs->size > 0 && xs->rcvd > 0 &&
303 xs->last.tv_sec >= xs->start.tv_sec + 3) ||
304 force == 2)
305 fprintf(stderr, " %s", stat_eta(xs));
306 xs->lastrcvd = xs->rcvd;
310 * Initialize the transfer statistics
312 static void
313 stat_start(struct xferstat *xs, const char *name, off_t size, off_t offset)
315 snprintf(xs->name, sizeof xs->name, "%s", name);
316 gettimeofday(&xs->start, NULL);
317 xs->last.tv_sec = xs->last.tv_usec = 0;
318 xs->size = size;
319 xs->offset = offset;
320 xs->rcvd = offset;
321 xs->lastrcvd = offset;
322 if (v_tty && v_level > 0)
323 stat_display(xs, 1);
324 else if (v_level > 0)
325 fprintf(stderr, "%-46s", xs->name);
329 * Update the transfer statistics
331 static void
332 stat_update(struct xferstat *xs, off_t rcvd)
334 xs->rcvd = rcvd;
335 if (v_tty && v_level > 0)
336 stat_display(xs, 0);
340 * Finalize the transfer statistics
342 static void
343 stat_end(struct xferstat *xs)
345 gettimeofday(&xs->last, NULL);
346 if (v_tty && v_level > 0) {
347 stat_display(xs, 2);
348 putc('\n', stderr);
349 } else if (v_level > 0) {
350 fprintf(stderr, " %s %s\n",
351 stat_bytes(xs->size), stat_bps(xs));
356 * Ask the user for authentication details
358 static int
359 query_auth(struct url *URL)
361 struct termios tios;
362 tcflag_t saved_flags;
363 int i, nopwd;
365 fprintf(stderr, "Authentication required for <%s://%s:%d/>!\n",
366 URL->scheme, URL->host, URL->port);
368 fprintf(stderr, "Login: ");
369 if (fgets(URL->user, sizeof URL->user, stdin) == NULL)
370 return (-1);
371 for (i = strlen(URL->user); i >= 0; --i)
372 if (URL->user[i] == '\r' || URL->user[i] == '\n')
373 URL->user[i] = '\0';
375 fprintf(stderr, "Password: ");
376 if (tcgetattr(STDIN_FILENO, &tios) == 0) {
377 saved_flags = tios.c_lflag;
378 tios.c_lflag &= ~ECHO;
379 tios.c_lflag |= ECHONL|ICANON;
380 tcsetattr(STDIN_FILENO, TCSAFLUSH|TCSASOFT, &tios);
381 nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
382 tios.c_lflag = saved_flags;
383 tcsetattr(STDIN_FILENO, TCSANOW|TCSASOFT, &tios);
384 } else {
385 nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
387 if (nopwd)
388 return (-1);
389 for (i = strlen(URL->pwd); i >= 0; --i)
390 if (URL->pwd[i] == '\r' || URL->pwd[i] == '\n')
391 URL->pwd[i] = '\0';
393 return (0);
397 * Fetch a file
399 static int
400 fetch(char *URL, const char *path)
402 struct url *url;
403 struct url_stat us;
404 struct stat sb, nsb;
405 struct xferstat xs;
406 FILE *f, *of;
407 size_t size, readcnt, wr;
408 off_t count;
409 char flags[8];
410 const char *slash;
411 char *tmppath;
412 int r;
413 unsigned timeout;
414 char *ptr;
416 f = of = NULL;
417 tmppath = NULL;
419 timeout = 0;
420 *flags = 0;
421 count = 0;
423 /* set verbosity level */
424 if (v_level > 1)
425 strcat(flags, "v");
426 if (v_level > 2)
427 fetchDebug = 1;
429 /* parse URL */
430 url = NULL;
431 if (*URL == '\0') {
432 warnx("empty URL");
433 goto failure;
435 if ((url = fetchParseURL(URL)) == NULL) {
436 warnx("%s: parse error", URL);
437 goto failure;
440 /* if no scheme was specified, take a guess */
441 if (!*url->scheme) {
442 if (!*url->host)
443 strcpy(url->scheme, SCHEME_FILE);
444 else if (strncasecmp(url->host, "ftp.", 4) == 0)
445 strcpy(url->scheme, SCHEME_FTP);
446 else if (strncasecmp(url->host, "www.", 4) == 0)
447 strcpy(url->scheme, SCHEME_HTTP);
450 /* common flags */
451 switch (family) {
452 case PF_INET:
453 strcat(flags, "4");
454 break;
455 case PF_INET6:
456 strcat(flags, "6");
457 break;
460 /* FTP specific flags */
461 if (strcmp(url->scheme, SCHEME_FTP) == 0) {
462 if (p_flag)
463 strcat(flags, "p");
464 if (d_flag)
465 strcat(flags, "d");
466 if (U_flag)
467 strcat(flags, "l");
468 timeout = T_secs ? T_secs : ftp_timeout;
471 /* HTTP specific flags */
472 if (strcmp(url->scheme, SCHEME_HTTP) == 0 ||
473 strcmp(url->scheme, SCHEME_HTTPS) == 0) {
474 if (d_flag)
475 strcat(flags, "d");
476 if (A_flag)
477 strcat(flags, "A");
478 timeout = T_secs ? T_secs : http_timeout;
479 if (i_flag) {
480 if (stat(i_filename, &sb)) {
481 warn("%s: stat()", i_filename);
482 goto failure;
484 url->ims_time = sb.st_mtime;
485 strcat(flags, "i");
489 /* set the protocol timeout. */
490 fetchTimeout = timeout;
492 /* just print size */
493 if (s_flag) {
494 if (timeout)
495 alarm(timeout);
496 r = fetchStat(url, &us, flags);
497 if (timeout)
498 alarm(0);
499 if (sigalrm || sigint)
500 goto signal;
501 if (r == -1) {
502 warnx("%s", fetchLastErrString);
503 goto failure;
505 if (us.size == -1)
506 printf("Unknown\n");
507 else
508 printf("%jd\n", (intmax_t)us.size);
509 goto success;
513 * If the -r flag was specified, we have to compare the local
514 * and remote files, so we should really do a fetchStat()
515 * first, but I know of at least one HTTP server that only
516 * sends the content size in response to GET requests, and
517 * leaves it out of replies to HEAD requests. Also, in the
518 * (frequent) case that the local and remote files match but
519 * the local file is truncated, we have sufficient information
520 * before the compare to issue a correct request. Therefore,
521 * we always issue a GET request as if we were sure the local
522 * file was a truncated copy of the remote file; we can drop
523 * the connection later if we change our minds.
525 sb.st_size = -1;
526 if (!o_stdout) {
527 r = stat(path, &sb);
528 if (r == 0 && r_flag && S_ISREG(sb.st_mode)) {
529 url->offset = sb.st_size;
530 } else if (r == -1 || !S_ISREG(sb.st_mode)) {
532 * Whatever value sb.st_size has now is either
533 * wrong (if stat(2) failed) or irrelevant (if the
534 * path does not refer to a regular file)
536 sb.st_size = -1;
538 if (r == -1 && errno != ENOENT) {
539 warnx("%s: stat()", path);
540 goto failure;
544 /* start the transfer */
545 if (timeout)
546 alarm(timeout);
547 f = fetchXGet(url, &us, flags);
548 if (timeout)
549 alarm(0);
550 if (sigalrm || sigint)
551 goto signal;
552 if (f == NULL) {
553 warnx("%s: %s", URL, fetchLastErrString);
554 if (i_flag && strcmp(url->scheme, SCHEME_HTTP) == 0
555 && fetchLastErrCode == FETCH_OK
556 && strcmp(fetchLastErrString, "Not Modified") == 0) {
557 /* HTTP Not Modified Response, return OK. */
558 r = 0;
559 goto done;
560 } else
561 goto failure;
563 if (sigint)
564 goto signal;
566 /* check that size is as expected */
567 if (S_size) {
568 if (us.size == -1) {
569 warnx("%s: size unknown", URL);
570 } else if (us.size != S_size) {
571 warnx("%s: size mismatch: expected %jd, actual %jd",
572 URL, (intmax_t)S_size, (intmax_t)us.size);
573 goto failure;
577 /* symlink instead of copy */
578 if (l_flag && strcmp(url->scheme, "file") == 0 && !o_stdout) {
579 if (symlink(url->doc, path) == -1) {
580 warn("%s: symlink()", path);
581 goto failure;
583 goto success;
586 if (us.size == -1 && !o_stdout && v_level > 0)
587 warnx("%s: size of remote file is not known", URL);
588 if (v_level > 1) {
589 if (sb.st_size != -1)
590 fprintf(stderr, "local size / mtime: %jd / %ld\n",
591 (intmax_t)sb.st_size, (long)sb.st_mtime);
592 if (us.size != -1)
593 fprintf(stderr, "remote size / mtime: %jd / %ld\n",
594 (intmax_t)us.size, (long)us.mtime);
597 /* open output file */
598 if (o_stdout) {
599 /* output to stdout */
600 of = stdout;
601 } else if (r_flag && sb.st_size != -1) {
602 /* resume mode, local file exists */
603 if (!F_flag && us.mtime && sb.st_mtime != us.mtime) {
604 /* no match! have to refetch */
605 fclose(f);
606 /* if precious, warn the user and give up */
607 if (R_flag) {
608 warnx("%s: local modification time "
609 "does not match remote", path);
610 goto failure_keep;
612 } else if (url->offset > sb.st_size) {
613 /* gap between what we asked for and what we got */
614 warnx("%s: gap in resume mode", URL);
615 fclose(of);
616 of = NULL;
617 /* picked up again later */
618 } else if (us.size != -1) {
619 if (us.size == sb.st_size)
620 /* nothing to do */
621 goto success;
622 if (sb.st_size > us.size) {
623 /* local file too long! */
624 warnx("%s: local file (%jd bytes) is longer "
625 "than remote file (%jd bytes)", path,
626 (intmax_t)sb.st_size, (intmax_t)us.size);
627 goto failure;
629 /* we got it, open local file */
630 if ((of = fopen(path, "r+")) == NULL) {
631 warn("%s: fopen()", path);
632 goto failure;
634 /* check that it didn't move under our feet */
635 if (fstat(fileno(of), &nsb) == -1) {
636 /* can't happen! */
637 warn("%s: fstat()", path);
638 goto failure;
640 if (nsb.st_dev != sb.st_dev ||
641 nsb.st_ino != sb.st_ino ||
642 nsb.st_size != sb.st_size) {
643 warnx("%s: file has changed", URL);
644 fclose(of);
645 of = NULL;
646 sb = nsb;
647 /* picked up again later */
650 /* seek to where we left off */
651 if (of != NULL && fseeko(of, url->offset, SEEK_SET) != 0) {
652 warn("%s: fseeko()", path);
653 fclose(of);
654 of = NULL;
655 /* picked up again later */
657 } else if (m_flag && sb.st_size != -1) {
658 /* mirror mode, local file exists */
659 if (sb.st_size == us.size && sb.st_mtime == us.mtime)
660 goto success;
663 if (of == NULL) {
665 * We don't yet have an output file; either this is a
666 * vanilla run with no special flags, or the local and
667 * remote files didn't match.
670 if (url->offset > 0) {
672 * We tried to restart a transfer, but for
673 * some reason gave up - so we have to restart
674 * from scratch if we want the whole file
676 url->offset = 0;
677 if ((f = fetchXGet(url, &us, flags)) == NULL) {
678 warnx("%s: %s", URL, fetchLastErrString);
679 goto failure;
681 if (sigint)
682 goto signal;
685 /* construct a temp file name */
686 if (sb.st_size != -1 && S_ISREG(sb.st_mode)) {
687 if ((slash = strrchr(path, '/')) == NULL)
688 slash = path;
689 else
690 ++slash;
691 asprintf(&tmppath, "%.*s.fetch.XXXXXX.%s",
692 (int)(slash - path), path, slash);
693 if (tmppath != NULL) {
694 if (mkstemps(tmppath, strlen(slash) + 1) == -1) {
695 warn("%s: mkstemps()", path);
696 goto failure;
698 of = fopen(tmppath, "w");
699 chown(tmppath, sb.st_uid, sb.st_gid);
700 chmod(tmppath, sb.st_mode & ALLPERMS);
703 if (of == NULL)
704 of = fopen(path, "w");
705 if (of == NULL) {
706 warn("%s: open()", path);
707 goto failure;
710 count = url->offset;
712 /* start the counter */
713 stat_start(&xs, path, us.size, count);
715 sigalrm = siginfo = sigint = 0;
717 /* suck in the data */
718 setvbuf(f, NULL, _IOFBF, B_size);
719 signal(SIGINFO, sig_handler);
720 while (!sigint) {
721 if (us.size != -1 && us.size - count < B_size &&
722 us.size - count >= 0)
723 size = us.size - count;
724 else
725 size = B_size;
726 if (siginfo) {
727 stat_end(&xs);
728 siginfo = 0;
731 if (size == 0)
732 break;
734 if ((readcnt = fread(buf, 1, size, f)) < size) {
735 if (ferror(f) && errno == EINTR && !sigint)
736 clearerr(f);
737 else if (readcnt == 0)
738 break;
741 stat_update(&xs, count += readcnt);
742 for (ptr = buf; readcnt > 0; ptr += wr, readcnt -= wr)
743 if ((wr = fwrite(ptr, 1, readcnt, of)) < readcnt) {
744 if (ferror(of) && errno == EINTR && !sigint)
745 clearerr(of);
746 else
747 break;
749 if (readcnt != 0)
750 break;
752 if (!sigalrm)
753 sigalrm = ferror(f) && errno == ETIMEDOUT;
754 signal(SIGINFO, SIG_DFL);
756 stat_end(&xs);
759 * If the transfer timed out or was interrupted, we still want to
760 * set the mtime in case the file is not removed (-r or -R) and
761 * the user later restarts the transfer.
763 signal:
764 /* set mtime of local file */
765 if (!n_flag && us.mtime && !o_stdout && of != NULL &&
766 (stat(path, &sb) != -1) && sb.st_mode & S_IFREG) {
767 struct timeval tv[2];
769 fflush(of);
770 tv[0].tv_sec = (long)(us.atime ? us.atime : us.mtime);
771 tv[1].tv_sec = (long)us.mtime;
772 tv[0].tv_usec = tv[1].tv_usec = 0;
773 if (utimes(tmppath ? tmppath : path, tv))
774 warn("%s: utimes()", tmppath ? tmppath : path);
777 /* timed out or interrupted? */
778 if (sigalrm)
779 warnx("transfer timed out");
780 if (sigint) {
781 warnx("transfer interrupted");
782 goto failure;
785 /* timeout / interrupt before connection completley established? */
786 if (f == NULL)
787 goto failure;
789 if (!sigalrm) {
790 /* check the status of our files */
791 if (ferror(f))
792 warn("%s", URL);
793 if (ferror(of))
794 warn("%s", path);
795 if (ferror(f) || ferror(of))
796 goto failure;
799 /* did the transfer complete normally? */
800 if (us.size != -1 && count < us.size) {
801 warnx("%s appears to be truncated: %jd/%jd bytes",
802 path, (intmax_t)count, (intmax_t)us.size);
803 goto failure_keep;
807 * If the transfer timed out and we didn't know how much to
808 * expect, assume the worst (i.e. we didn't get all of it)
810 if (sigalrm && us.size == -1) {
811 warnx("%s may be truncated", path);
812 goto failure_keep;
815 success:
816 r = 0;
817 if (tmppath != NULL && rename(tmppath, path) == -1) {
818 warn("%s: rename()", path);
819 goto failure_keep;
821 goto done;
822 failure:
823 if (of && of != stdout && !R_flag && !r_flag)
824 if (stat(path, &sb) != -1 && (sb.st_mode & S_IFREG))
825 unlink(tmppath ? tmppath : path);
826 if (R_flag && tmppath != NULL && sb.st_size == -1)
827 rename(tmppath, path); /* ignore errors here */
828 failure_keep:
829 r = -1;
830 goto done;
831 done:
832 if (f)
833 fclose(f);
834 if (of && of != stdout)
835 fclose(of);
836 if (url)
837 fetchFreeURL(url);
838 if (tmppath != NULL)
839 free(tmppath);
840 return (r);
843 static void
844 usage(void)
846 fprintf(stderr, "%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
847 "usage: fetch [-146AadFlMmnPpqRrsUv] [--allow-sslv2] [-B bytes]",
848 " [--bind-address=host] [--ca-cert=file] [--ca-path=dir] [--cert=file]",
849 " [--crl=file] [-i file] [--key=file] [-N file] [--no-passive]",
850 " [--no-proxy=list] [--no-sslv3] [--no-tlsv1] [--no-verify-hostname]",
851 " [--no-verify-peer] [-o file] [--referer=URL] [-S bytes] [-T seconds]",
852 " [--user-agent=agent-string] [-w seconds] URL ...",
853 " fetch [-146AadFlMmnPpqRrsUv] [--allow-sslv2] [-B bytes]",
854 " [--bind-address=host] [--ca-cert=file] [--ca-path=dir] [--cert=file]",
855 " [--crl=file] [-i file] [--key=file] [-N file] [--no-passive]",
856 " [--no-proxy=list] [--no-sslv3] [--no-tlsv1] [--no-verify-hostname]",
857 " [--no-verify-peer] [-o file] [--referer=URL] [-S bytes] [-T seconds]",
858 " [--user-agent=agent-string] [-w seconds] -h host -f file [-c dir]");
863 * Entry point
866 main(int argc, char *argv[])
868 struct stat sb;
869 struct sigaction sa;
870 const char *p, *s;
871 char *end, *q;
872 int c, e, r;
875 while ((c = getopt_long(argc, argv,
876 "146AaB:bc:dFf:Hh:i:lMmN:nPpo:qRrS:sT:tUvw:",
877 longopts, NULL)) != -1)
878 switch (c) {
879 case '1':
880 once_flag = 1;
881 break;
882 case '4':
883 family = PF_INET;
884 break;
885 case '6':
886 family = PF_INET6;
887 break;
888 case 'A':
889 A_flag = 1;
890 break;
891 case 'a':
892 a_flag = 1;
893 break;
894 case 'B':
895 B_size = (off_t)strtol(optarg, &end, 10);
896 if (*optarg == '\0' || *end != '\0')
897 errx(1, "invalid buffer size (%s)", optarg);
898 break;
899 case 'b':
900 warnx("warning: the -b option is deprecated");
901 b_flag = 1;
902 break;
903 case 'c':
904 c_dirname = optarg;
905 break;
906 case 'd':
907 d_flag = 1;
908 break;
909 case 'F':
910 F_flag = 1;
911 break;
912 case 'f':
913 f_filename = optarg;
914 break;
915 case 'H':
916 warnx("the -H option is now implicit, "
917 "use -U to disable");
918 break;
919 case 'h':
920 h_hostname = optarg;
921 break;
922 case 'i':
923 i_flag = 1;
924 i_filename = optarg;
925 break;
926 case 'l':
927 l_flag = 1;
928 break;
929 case 'o':
930 o_flag = 1;
931 o_filename = optarg;
932 break;
933 case 'M':
934 case 'm':
935 if (r_flag)
936 errx(1, "the -m and -r flags "
937 "are mutually exclusive");
938 m_flag = 1;
939 break;
940 case 'N':
941 N_filename = optarg;
942 break;
943 case 'n':
944 n_flag = 1;
945 break;
946 case 'P':
947 case 'p':
948 p_flag = 1;
949 break;
950 case 'q':
951 v_level = 0;
952 break;
953 case 'R':
954 R_flag = 1;
955 break;
956 case 'r':
957 if (m_flag)
958 errx(1, "the -m and -r flags "
959 "are mutually exclusive");
960 r_flag = 1;
961 break;
962 case 'S':
963 S_size = (off_t)strtol(optarg, &end, 10);
964 if (*optarg == '\0' || *end != '\0')
965 errx(1, "invalid size (%s)", optarg);
966 break;
967 case 's':
968 s_flag = 1;
969 break;
970 case 'T':
971 T_secs = strtol(optarg, &end, 10);
972 if (*optarg == '\0' || *end != '\0')
973 errx(1, "invalid timeout (%s)", optarg);
974 break;
975 case 't':
976 t_flag = 1;
977 warnx("warning: the -t option is deprecated");
978 break;
979 case 'U':
980 U_flag = 1;
981 break;
982 case 'v':
983 v_level++;
984 break;
985 case 'w':
986 a_flag = 1;
987 w_secs = strtol(optarg, &end, 10);
988 if (*optarg == '\0' || *end != '\0')
989 errx(1, "invalid delay (%s)", optarg);
990 break;
991 case OPTION_BIND_ADDRESS:
992 setenv("FETCH_BIND_ADDRESS", optarg, 1);
993 break;
994 case OPTION_NO_FTP_PASSIVE_MODE:
995 setenv("FTP_PASSIVE_MODE", "no", 1);
996 break;
997 case OPTION_HTTP_REFERER:
998 setenv("HTTP_REFERER", optarg, 1);
999 break;
1000 case OPTION_HTTP_USER_AGENT:
1001 setenv("HTTP_USER_AGENT", optarg, 1);
1002 break;
1003 case OPTION_NO_PROXY:
1004 setenv("NO_PROXY", optarg, 1);
1005 break;
1006 case OPTION_SSL_ALLOW_SSL2:
1007 setenv("SSL_ALLOW_SSL2", "", 1);
1008 break;
1009 case OPTION_SSL_CA_CERT_FILE:
1010 setenv("SSL_CA_CERT_FILE", optarg, 1);
1011 break;
1012 case OPTION_SSL_CA_CERT_PATH:
1013 setenv("SSL_CA_CERT_PATH", optarg, 1);
1014 break;
1015 case OPTION_SSL_CLIENT_CERT_FILE:
1016 setenv("SSL_CLIENT_CERT_FILE", optarg, 1);
1017 break;
1018 case OPTION_SSL_CLIENT_KEY_FILE:
1019 setenv("SSL_CLIENT_KEY_FILE", optarg, 1);
1020 break;
1021 case OPTION_SSL_CRL_FILE:
1022 setenv("SSL_CLIENT_CRL_FILE", optarg, 1);
1023 break;
1024 case OPTION_SSL_NO_SSL3:
1025 setenv("SSL_NO_SSL3", "", 1);
1026 break;
1027 case OPTION_SSL_NO_TLS1:
1028 setenv("SSL_NO_TLS1", "", 1);
1029 break;
1030 case OPTION_SSL_NO_VERIFY_HOSTNAME:
1031 setenv("SSL_NO_VERIFY_HOSTNAME", "", 1);
1032 break;
1033 case OPTION_SSL_NO_VERIFY_PEER:
1034 setenv("SSL_NO_VERIFY_PEER", "", 1);
1035 break;
1036 default:
1037 usage();
1038 exit(1);
1041 argc -= optind;
1042 argv += optind;
1044 if (h_hostname || f_filename || c_dirname) {
1045 if (!h_hostname || !f_filename || argc) {
1046 usage();
1047 exit(1);
1049 /* XXX this is a hack. */
1050 if (strcspn(h_hostname, "@:/") != strlen(h_hostname))
1051 errx(1, "invalid hostname");
1052 if (asprintf(argv, "ftp://%s/%s/%s", h_hostname,
1053 c_dirname ? c_dirname : "", f_filename) == -1)
1054 errx(1, "%s", strerror(ENOMEM));
1055 argc++;
1058 if (!argc) {
1059 usage();
1060 exit(1);
1063 /* allocate buffer */
1064 if (B_size < MINBUFSIZE)
1065 B_size = MINBUFSIZE;
1066 if ((buf = malloc(B_size)) == NULL)
1067 errx(1, "%s", strerror(ENOMEM));
1069 /* timeouts */
1070 if ((s = getenv("FTP_TIMEOUT")) != NULL) {
1071 ftp_timeout = strtol(s, &end, 10);
1072 if (*s == '\0' || *end != '\0' || ftp_timeout < 0) {
1073 warnx("FTP_TIMEOUT (%s) is not a positive integer", s);
1074 ftp_timeout = 0;
1077 if ((s = getenv("HTTP_TIMEOUT")) != NULL) {
1078 http_timeout = strtol(s, &end, 10);
1079 if (*s == '\0' || *end != '\0' || http_timeout < 0) {
1080 warnx("HTTP_TIMEOUT (%s) is not a positive integer", s);
1081 http_timeout = 0;
1085 /* signal handling */
1086 sa.sa_flags = 0;
1087 sa.sa_handler = sig_handler;
1088 sigemptyset(&sa.sa_mask);
1089 sigaction(SIGALRM, &sa, NULL);
1090 sa.sa_flags = SA_RESETHAND;
1091 sigaction(SIGINT, &sa, NULL);
1092 fetchRestartCalls = 0;
1094 /* output file */
1095 if (o_flag) {
1096 if (strcmp(o_filename, "-") == 0) {
1097 o_stdout = 1;
1098 } else if (stat(o_filename, &sb) == -1) {
1099 if (errno == ENOENT) {
1100 if (argc > 1)
1101 errx(1, "%s is not a directory",
1102 o_filename);
1103 } else {
1104 err(1, "%s", o_filename);
1106 } else {
1107 if (sb.st_mode & S_IFDIR)
1108 o_directory = 1;
1112 /* check if output is to a tty (for progress report) */
1113 v_tty = isatty(STDERR_FILENO);
1114 if (v_tty)
1115 pgrp = getpgrp();
1117 r = 0;
1119 /* authentication */
1120 if (v_tty)
1121 fetchAuthMethod = query_auth;
1122 if (N_filename != NULL) {
1123 if (setenv("NETRC", N_filename, 1) == -1)
1124 err(1, "setenv: cannot set NETRC=%s", N_filename);
1127 while (argc) {
1128 if ((p = strrchr(*argv, '/')) == NULL)
1129 p = *argv;
1130 else
1131 p++;
1133 if (!*p)
1134 p = "fetch.out";
1136 fetchLastErrCode = 0;
1138 if (o_flag) {
1139 if (o_stdout) {
1140 e = fetch(*argv, "-");
1141 } else if (o_directory) {
1142 asprintf(&q, "%s/%s", o_filename, p);
1143 e = fetch(*argv, q);
1144 free(q);
1145 } else {
1146 e = fetch(*argv, o_filename);
1148 } else {
1149 e = fetch(*argv, p);
1152 if (sigint)
1153 kill(getpid(), SIGINT);
1155 if (e == 0 && once_flag)
1156 exit(0);
1158 if (e) {
1159 r = 1;
1160 if ((fetchLastErrCode
1161 && fetchLastErrCode != FETCH_UNAVAIL
1162 && fetchLastErrCode != FETCH_MOVED
1163 && fetchLastErrCode != FETCH_URL
1164 && fetchLastErrCode != FETCH_RESOLV
1165 && fetchLastErrCode != FETCH_UNKNOWN)) {
1166 if (w_secs && v_level)
1167 fprintf(stderr, "Waiting %ld seconds "
1168 "before retrying\n", w_secs);
1169 if (w_secs)
1170 sleep(w_secs);
1171 if (a_flag)
1172 continue;
1176 argc--, argv++;
1179 exit(r);