2 * HTTP handling functions.
4 * Copyright 2003 Ferenc Wagner
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
28 #define USER_AGENT "Winetest Shell"
29 #define SERVER_NAME "test.winehq.org"
30 #define URL_PATH "/submit"
31 #define SEP "--8<--cut-here--8<--"
32 #define CONTENT_HEADERS "Content-Type: multipart/form-data; boundary=\"" SEP "\"\r\n" \
33 "Content-Length: %u\r\n\r\n"
34 static const char body1
[] = "--" SEP
"\r\n"
35 "Content-Disposition: form-data; name=\"reportfile\"; filename=\"%s\"\r\n"
36 "Content-Type: application/octet-stream\r\n\r\n";
37 static const char body2
[] = "\r\n--" SEP
"\r\n"
38 "Content-Disposition: form-data; name=\"submit\"\r\n\r\n"
43 open_http (const char *server
)
46 struct sockaddr_in sa
;
49 report (R_STATUS
, "Opening HTTP connection to %s", server
);
50 if (WSAStartup (MAKEWORD (2,2), &wsad
)) return INVALID_SOCKET
;
52 sa
.sin_family
= AF_INET
;
53 sa
.sin_port
= htons (80);
54 sa
.sin_addr
.s_addr
= inet_addr (server
);
55 memset (sa
.sin_zero
, 0, sizeof(sa
.sin_zero
));
56 if (sa
.sin_addr
.s_addr
== INADDR_NONE
) {
57 struct hostent
*host
= gethostbyname (server
);
59 report (R_ERROR
, "Hostname lookup failed for %s", server
);
62 sa
.sin_addr
.s_addr
= ((struct in_addr
*)host
->h_addr
)->s_addr
;
64 s
= socket (AF_INET
, SOCK_STREAM
, IPPROTO_TCP
);
65 if (s
== INVALID_SOCKET
) {
66 report (R_ERROR
, "Can't open network socket: %d",
70 if (!connect (s
, (struct sockaddr
*)&sa
, sizeof (struct sockaddr_in
)))
73 report (R_ERROR
, "Can't connect: %d", WSAGetLastError ());
77 return INVALID_SOCKET
;
85 ret
= closesocket (s
);
86 return (WSACleanup () || ret
);
90 send_buf (SOCKET s
, const char *buf
, size_t length
)
95 sent
= send (s
, buf
, length
, 0);
96 if (sent
== SOCKET_ERROR
) {
97 if (errno
== EINTR
) continue;
106 static int WINAPIV
send_str (SOCKET s
, ...)
114 p
= vstrmake (&len
, ap
);
116 ret
= send_buf (s
, p
, len
);
122 send_file_direct (const char * url
, const char *name
)
127 char buffer
[BUFLEN
+1];
128 DWORD bytes_read
, filesize
;
134 static const char head
[] = "POST " URL_PATH
" HTTP/1.0\r\n"
135 "Host: " SERVER_NAME
"\r\n"
136 "User-Agent: " USER_AGENT
"\r\n"
141 report (R_WARNING
, "Can't submit to an alternative URL");
145 s
= open_http (SERVER_NAME
);
146 if (s
== INVALID_SOCKET
) return 1;
148 file
= CreateFileA( name
, GENERIC_READ
,
149 FILE_SHARE_READ
| FILE_SHARE_WRITE
| FILE_SHARE_DELETE
,
150 NULL
, OPEN_EXISTING
, 0, NULL
);
152 if ((file
== INVALID_HANDLE_VALUE
) &&
153 (GetLastError() == ERROR_INVALID_PARAMETER
)) {
154 /* FILE_SHARE_DELETE not supported on win9x */
155 file
= CreateFileA( name
, GENERIC_READ
,
156 FILE_SHARE_READ
| FILE_SHARE_WRITE
,
157 NULL
, OPEN_EXISTING
, 0, NULL
);
159 if (file
== INVALID_HANDLE_VALUE
)
161 report (R_WARNING
, "Can't open file '%s': %u", name
, GetLastError());
165 report (R_STATUS
, "Sending header");
166 filesize
= GetFileSize( file
, NULL
);
167 str
= strmake (&total
, body1
, name
);
168 ret
= send_str (s
, head
, filesize
+ total
+ sizeof body2
- 1) ||
169 send_buf (s
, str
, total
);
172 report (R_WARNING
, "Error sending header: %d, %d",
173 errno
, WSAGetLastError ());
177 report (R_STATUS
, "Sending %u bytes of data", filesize
);
178 report (R_PROGRESS
, 2, filesize
);
180 while (total
< filesize
&& ReadFile( file
, buffer
, BUFLEN
/2, &bytes_read
, NULL
)) {
181 if (aborting
) goto abort2
;
182 if (!bytes_read
) break;
184 if (total
> filesize
) bytes_read
-= total
- filesize
;
185 if (send_buf (s
, buffer
, bytes_read
)) {
186 report (R_WARNING
, "Error sending body: %d, %d",
187 errno
, WSAGetLastError ());
190 report (R_DELTA
, bytes_read
, "Network transfer: In progress");
194 if (send_buf (s
, body2
, sizeof body2
- 1)) {
195 report (R_WARNING
, "Error sending trailer: %d, %d",
196 errno
, WSAGetLastError ());
199 report (R_DELTA
, 0, "Network transfer: Done");
202 while ((bytes_read
= recv (s
, buffer
+total
, BUFLEN
-total
, 0))) {
203 if ((signed)bytes_read
== SOCKET_ERROR
) {
204 if (errno
== EINTR
) continue;
205 report (R_WARNING
, "Error receiving reply: %d, %d",
206 errno
, WSAGetLastError ());
210 if (total
== BUFLEN
) {
211 report (R_WARNING
, "Buffer overflow");
215 if (close_http (s
)) {
216 report (R_WARNING
, "Error closing connection: %d, %d",
217 errno
, WSAGetLastError ());
221 str
= strmake (&count
, "Received %s (%d bytes).\n",
223 ret
= total
< count
|| memcmp (str
, buffer
+ total
- count
, count
) != 0;
227 str
= strstr (buffer
, "\r\n\r\n");
228 if (!str
) str
= buffer
;
230 report (R_ERROR
, "Can't submit logfile '%s'. "
231 "Server response: %s", name
, str
);
243 send_file_wininet (const char *url
, const char *name
)
246 HMODULE wininet_mod
= NULL
;
247 HINTERNET (WINAPI
*pInternetOpen
)(LPCSTR agent
, DWORD access_type
, LPCSTR proxy_name
, LPCSTR proxy_bypass
, DWORD flags
);
248 HINTERNET (WINAPI
*pInternetConnect
)(HINTERNET session
, LPCSTR server_name
, INTERNET_PORT server_port
, LPCSTR username
, LPCSTR password
, DWORD service
, DWORD flags
, DWORD_PTR
*context
);
249 HINTERNET (WINAPI
*pHttpOpenRequest
)(HINTERNET connection
, LPCSTR verb
, LPCSTR object_name
, LPCSTR version
, LPCSTR referer
, LPCSTR
*accept_types
, DWORD flags
, DWORD_PTR context
);
250 BOOL (WINAPI
*pHttpSendRequestEx
)(HINTERNET request
, LPINTERNET_BUFFERSA buffers_in
, LPINTERNET_BUFFERSA buffers_out
, DWORD flags
, DWORD_PTR context
);
251 BOOL (WINAPI
*pInternetWriteFile
)(HINTERNET file
, LPCVOID buffer
, DWORD number_of_bytes_to_write
, LPDWORD number_of_bytes_written
);
252 BOOL (WINAPI
*pHttpEndRequest
)(HINTERNET request
, LPINTERNET_BUFFERSA buffers_out
, DWORD flags
, DWORD_PTR context
);
253 BOOL (WINAPI
*pInternetReadFile
)(HINTERNET file
, LPCVOID buffer
, DWORD number_of_bytes_to_read
, LPDWORD number_of_bytes_read
);
254 BOOL (WINAPI
*pInternetCloseHandle
)(HINTERNET Handle
) = NULL
;
255 HANDLE file
= INVALID_HANDLE_VALUE
;
256 DWORD filesize
, bytes_read
, bytes_written
;
259 HINTERNET session
= NULL
;
260 HINTERNET connection
= NULL
;
261 HINTERNET request
= NULL
;
262 INTERNET_BUFFERSA buffers_in
= { 0 };
263 char buffer
[BUFLEN
+1];
264 URL_COMPONENTSA uc
= { 0 };
266 static const char extra_headers
[] =
269 wininet_mod
= LoadLibraryA("wininet.dll");
270 if (wininet_mod
== NULL
)
272 pInternetOpen
= (void *)GetProcAddress(wininet_mod
, "InternetOpenA");
273 pInternetConnect
= (void *)GetProcAddress(wininet_mod
, "InternetConnectA");
274 pHttpOpenRequest
= (void *)GetProcAddress(wininet_mod
, "HttpOpenRequestA");
275 pHttpSendRequestEx
= (void *)GetProcAddress(wininet_mod
, "HttpSendRequestExA");
276 pInternetWriteFile
= (void *)GetProcAddress(wininet_mod
, "InternetWriteFile");
277 pHttpEndRequest
= (void *)GetProcAddress(wininet_mod
, "HttpEndRequestA");
278 pInternetReadFile
= (void *)GetProcAddress(wininet_mod
, "InternetReadFile");
279 pInternetCloseHandle
= (void *)GetProcAddress(wininet_mod
, "InternetCloseHandle");
280 if (pInternetOpen
== NULL
|| pInternetConnect
== NULL
|| pHttpOpenRequest
== NULL
|| pHttpSendRequestEx
== NULL
|| pHttpEndRequest
== NULL
||
281 pInternetWriteFile
== NULL
|| pInternetReadFile
== NULL
|| pInternetCloseHandle
== NULL
) {
285 BOOL (WINAPI
*pInternetCrackUrlA
)(const char *url
, DWORD url_length
, DWORD flags
, URL_COMPONENTSA
*ret_comp
);
286 pInternetCrackUrlA
= (void *)GetProcAddress(wininet_mod
, "InternetCrackUrlA");
287 if (pInternetCrackUrlA
== NULL
)
289 uc
.dwStructSize
= sizeof(uc
);
290 uc
.dwSchemeLength
= uc
.dwHostNameLength
= uc
.dwUserNameLength
=
291 uc
.dwPasswordLength
= uc
.dwUrlPathLength
= uc
.dwExtraInfoLength
=
293 uc
.lpszScheme
= xalloc(uc
.dwSchemeLength
);
294 uc
.lpszHostName
= xalloc(uc
.dwHostNameLength
);
295 uc
.lpszUserName
= xalloc(uc
.dwUserNameLength
);
296 uc
.lpszPassword
= xalloc(uc
.dwPasswordLength
);
297 uc
.lpszUrlPath
= xalloc(uc
.dwUrlPathLength
);
298 uc
.lpszExtraInfo
= xalloc(uc
.dwExtraInfoLength
);
299 if (!pInternetCrackUrlA(url
, 0, 0, &uc
)) {
300 report (R_WARNING
, "Can't parse submit URL '%s'", url
);
303 if ((uc
.nScheme
!= INTERNET_SCHEME_HTTP
&& uc
.nScheme
!= INTERNET_SCHEME_HTTPS
) || *uc
.lpszExtraInfo
) {
304 report (R_WARNING
, "Can't submit report to scheme %s or extra info '%s'", uc
.lpszScheme
, uc
.lpszExtraInfo
);
309 uc
.nScheme
= INTERNET_SCHEME_HTTP
;
310 uc
.lpszHostName
= xstrdup(SERVER_NAME
);
311 uc
.nPort
= INTERNET_DEFAULT_HTTP_PORT
;
312 uc
.lpszUserName
= xstrdup("");
313 uc
.lpszPassword
= xstrdup("");
314 uc
.lpszUrlPath
= xstrdup(URL_PATH
);
319 file
= CreateFileA( name
, GENERIC_READ
,
320 FILE_SHARE_READ
| FILE_SHARE_WRITE
| FILE_SHARE_DELETE
,
321 NULL
, OPEN_EXISTING
, 0, NULL
);
323 if ((file
== INVALID_HANDLE_VALUE
) &&
324 (GetLastError() == ERROR_INVALID_PARAMETER
)) {
325 /* FILE_SHARE_DELETE not supported on win9x */
326 file
= CreateFileA( name
, GENERIC_READ
,
327 FILE_SHARE_READ
| FILE_SHARE_WRITE
,
328 NULL
, OPEN_EXISTING
, 0, NULL
);
330 if (file
== INVALID_HANDLE_VALUE
) {
331 report (R_WARNING
, "Can't open file '%s': %u", name
, GetLastError());
335 report (R_STATUS
, "Opening %s connection to %s:%d",
336 (uc
.nScheme
== INTERNET_SCHEME_HTTP
? "http" : "https"),
337 uc
.lpszHostName
, uc
.nPort
);
338 session
= pInternetOpen (USER_AGENT
, INTERNET_OPEN_TYPE_PRECONFIG
, NULL
, NULL
, 0);
339 if (session
== NULL
) {
340 report (R_WARNING
, "Unable to open connection, error %u", GetLastError());
343 connection
= pInternetConnect (session
, uc
.lpszHostName
, uc
.nPort
, uc
.lpszUserName
, uc
.lpszPassword
, INTERNET_SERVICE_HTTP
, 0, 0);
344 if (connection
== NULL
) {
345 report (R_WARNING
, "Unable to connect, error %u", GetLastError());
348 request
= pHttpOpenRequest (connection
, "POST", uc
.lpszUrlPath
, NULL
, NULL
, NULL
,
349 INTERNET_FLAG_NO_CACHE_WRITE
| INTERNET_FLAG_NO_COOKIES
| INTERNET_FLAG_NO_UI
|
350 INTERNET_FLAG_PRAGMA_NOCACHE
| INTERNET_FLAG_RELOAD
| (uc
.nScheme
== INTERNET_SCHEME_HTTPS
? INTERNET_FLAG_SECURE
: 0), 0);
351 if (request
== NULL
) {
352 report (R_WARNING
, "Unable to open request, error %u", GetLastError());
356 report (R_STATUS
, "Sending request");
357 filesize
= GetFileSize( file
, NULL
);
358 str
= strmake (&total
, body1
, name
);
359 memset(&buffers_in
, 0, sizeof(INTERNET_BUFFERSA
));
360 buffers_in
.dwStructSize
= sizeof(INTERNET_BUFFERSA
);
361 buffers_in
.dwBufferTotal
= filesize
+ total
+ sizeof body2
- 1;
362 buffers_in
.lpcszHeader
= strmake (&count
, extra_headers
, buffers_in
.dwBufferTotal
);
363 buffers_in
.dwHeadersLength
= count
;
364 if (! pHttpSendRequestEx(request
, &buffers_in
, NULL
, 0, 0)) {
365 report (R_WARNING
, "Unable to send request, error %u", GetLastError());
369 if (! pInternetWriteFile(request
, str
, total
, &bytes_written
) || bytes_written
!= total
) {
370 report (R_WARNING
, "Unable to write body data, error %u", GetLastError());
374 report (R_STATUS
, "Sending %u bytes of data", filesize
);
375 report (R_PROGRESS
, 2, filesize
);
377 while (total
< filesize
&& ReadFile( file
, buffer
, BUFLEN
/2, &bytes_read
, NULL
)) {
378 if (aborting
) goto done
;
379 if (!bytes_read
) break;
381 if (total
> filesize
) bytes_read
-= total
- filesize
;
382 if (! pInternetWriteFile (request
, buffer
, bytes_read
, &bytes_written
) || bytes_written
!= bytes_read
) {
383 report (R_WARNING
, "Error sending body: %u", GetLastError ());
386 report (R_DELTA
, bytes_read
, "Network transfer: In progress");
389 if (! pInternetWriteFile(request
, body2
, sizeof body2
- 1, &bytes_written
) || bytes_written
!= sizeof body2
- 1) {
390 report (R_WARNING
, "Unable to write final body data, error %u", GetLastError());
393 if (! pHttpEndRequest(request
, NULL
, 0, 0)) {
394 report (R_WARNING
, "Unable to end request, error %u", GetLastError());
397 report (R_DELTA
, 0, "Network transfer: Done");
402 if (! pInternetReadFile(request
, buffer
+total
, BUFLEN
-total
, &bytes_read
)) {
403 report (R_WARNING
, "Error receiving reply: %u", GetLastError ());
407 if (total
== BUFLEN
) {
408 report (R_WARNING
, "Buffer overflow");
412 while (bytes_read
!= 0);
415 str
= strmake (&count
, "Received %s (%d bytes).\n",
417 if (total
< count
|| memcmp (str
, buffer
+ total
- count
, count
) != 0) {
419 report (R_ERROR
, "Can't submit logfile '%s'. "
420 "Server response: %s", name
, buffer
);
425 free(uc
.lpszHostName
);
426 free(uc
.lpszUserName
);
427 free(uc
.lpszPassword
);
428 free(uc
.lpszUrlPath
);
429 free(uc
.lpszExtraInfo
);
430 free((void *)buffers_in
.lpcszHeader
);
432 if (pInternetCloseHandle
!= NULL
&& request
!= NULL
)
433 pInternetCloseHandle (request
);
434 if (pInternetCloseHandle
!= NULL
&& connection
!= NULL
)
435 pInternetCloseHandle (connection
);
436 if (pInternetCloseHandle
!= NULL
&& session
!= NULL
)
437 pInternetCloseHandle (session
);
438 if (file
!= INVALID_HANDLE_VALUE
)
440 if (wininet_mod
!= NULL
)
441 FreeLibrary (wininet_mod
);
447 send_file (const char *url
, const char *name
)
449 return send_file_wininet( url
, name
) || send_file_direct( url
, name
);