1 /*-
2 * SPDX-License-Identifier: BSD-3-Clause
3 *
4 * Copyright (c) 2000-2014 Dag-Erling Smørgrav
5 * Copyright (c) 2013 Michael Gmelin <freebsd@grem.de>
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer
13 * in this position and unchanged.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
22 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
23 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
24 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
25 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
29 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 #include <sys/param.h>
33 #include <sys/socket.h>
34 #include <sys/stat.h>
35 #include <sys/time.h>
36
37 #include <ctype.h>
38 #include <err.h>
39 #include <errno.h>
40 #include <getopt.h>
41 #include <signal.h>
42 #include <stdint.h>
43 #include <stdio.h>
44 #include <stdlib.h>
45 #include <string.h>
46 #include <termios.h>
47 #include <unistd.h>
48
49 #include <fetch.h>
50
51 #define MINBUFSIZE 16384
52 #define TIMEOUT 120
53
54 /* Option flags */
55 static int A_flag; /* -A: do not follow 302 redirects */
56 static int a_flag; /* -a: auto retry */
57 static off_t B_size; /* -B: buffer size */
58 static int b_flag; /*! -b: workaround TCP bug */
59 static char *c_dirname; /* -c: remote directory */
60 static int d_flag; /* -d: direct connection */
61 static int F_flag; /* -F: restart without checking mtime */
62 static char *f_filename; /* -f: file to fetch */
63 static char *h_hostname; /* -h: host to fetch from */
64 static int i_flag; /* -i: specify file for mtime comparison */
65 static char *i_filename; /* name of input file */
66 static int l_flag; /* -l: link rather than copy file: URLs */
67 static int m_flag; /* -[Mm]: mirror mode */
68 static char *N_filename; /* -N: netrc file name */
69 static int n_flag; /* -n: do not preserve modification time */
70 static int o_flag; /* -o: specify output file */
71 static int o_directory; /* output file is a directory */
72 static char *o_filename; /* name of output file */
73 static int o_stdout; /* output file is stdout */
74 static int once_flag; /* -1: stop at first successful file */
75 static int p_flag; /* -[Pp]: use passive FTP */
76 static int R_flag; /* -R: don't delete partial files */
77 static int r_flag; /* -r: restart previous transfer */
78 static off_t S_size; /* -S: require size to match */
79 static int s_flag; /* -s: show size, don't fetch */
80 static long T_secs; /* -T: transfer timeout in seconds */
81 static int t_flag; /*! -t: workaround TCP bug */
82 static int U_flag; /* -U: do not use high ports */
83 static int v_level = 1; /* -v: verbosity level */
84 static int v_tty; /* stdout is a tty */
85 static int v_progress; /* whether to display progress */
86 static pid_t pgrp; /* our process group */
87 static long w_secs; /* -w: retry delay */
88 static int family = PF_UNSPEC; /* -[46]: address family to use */
89
90 static int sigalrm; /* SIGALRM received */
91 static int siginfo; /* SIGINFO received */
92 static int sigint; /* SIGINT received */
93
94 static long ftp_timeout = TIMEOUT; /* default timeout for FTP transfers */
95 static long http_timeout = TIMEOUT;/* default timeout for HTTP transfers */
96 static char *buf; /* transfer buffer */
97
98 enum options
99 {
100 OPTION_BIND_ADDRESS,
101 OPTION_NO_FTP_PASSIVE_MODE,
102 OPTION_HTTP_REFERER,
103 OPTION_HTTP_USER_AGENT,
104 OPTION_NO_PROXY,
105 OPTION_SSL_CA_CERT_FILE,
106 OPTION_SSL_CA_CERT_PATH,
107 OPTION_SSL_CLIENT_CERT_FILE,
108 OPTION_SSL_CLIENT_KEY_FILE,
109 OPTION_SSL_CRL_FILE,
110 OPTION_SSL_NO_SSL3,
111 OPTION_SSL_NO_TLS1,
112 OPTION_SSL_NO_VERIFY_HOSTNAME,
113 OPTION_SSL_NO_VERIFY_PEER
114 };
115
116
117 static struct option longopts[] =
118 {
119 /* mapping to single character argument */
120 { "one-file", no_argument, NULL, '1' },
121 { "ipv4-only", no_argument, NULL, '4' },
122 { "ipv6-only", no_argument, NULL, '6' },
123 { "no-redirect", no_argument, NULL, 'A' },
124 { "retry", no_argument, NULL, 'a' },
125 { "buffer-size", required_argument, NULL, 'B' },
126 /* -c not mapped, since it's deprecated */
127 { "direct", no_argument, NULL, 'd' },
128 { "force-restart", no_argument, NULL, 'F' },
129 /* -f not mapped, since it's deprecated */
130 /* -h not mapped, since it's deprecated */
131 { "if-modified-since", required_argument, NULL, 'i' },
132 { "symlink", no_argument, NULL, 'l' },
133 /* -M not mapped since it's the same as -m */
134 { "mirror", no_argument, NULL, 'm' },
135 { "netrc", required_argument, NULL, 'N' },
136 { "no-mtime", no_argument, NULL, 'n' },
137 { "output", required_argument, NULL, 'o' },
138 /* -P not mapped since it's the same as -p */
139 { "passive", no_argument, NULL, 'p' },
140 { "quiet", no_argument, NULL, 'q' },
141 { "keep-output", no_argument, NULL, 'R' },
142 { "restart", no_argument, NULL, 'r' },
143 { "require-size", required_argument, NULL, 'S' },
144 { "print-size", no_argument, NULL, 's' },
145 { "timeout", required_argument, NULL, 'T' },
146 { "passive-portrange-default", no_argument, NULL, 'T' },
147 { "verbose", no_argument, NULL, 'v' },
148 { "retry-delay", required_argument, NULL, 'w' },
149
150 /* options without a single character equivalent */
151 { "bind-address", required_argument, NULL, OPTION_BIND_ADDRESS },
152 { "no-passive", no_argument, NULL, OPTION_NO_FTP_PASSIVE_MODE },
153 { "referer", required_argument, NULL, OPTION_HTTP_REFERER },
154 { "user-agent", required_argument, NULL, OPTION_HTTP_USER_AGENT },
155 { "no-proxy", required_argument, NULL, OPTION_NO_PROXY },
156 { "ca-cert", required_argument, NULL, OPTION_SSL_CA_CERT_FILE },
157 { "ca-path", required_argument, NULL, OPTION_SSL_CA_CERT_PATH },
158 { "cert", required_argument, NULL, OPTION_SSL_CLIENT_CERT_FILE },
159 { "key", required_argument, NULL, OPTION_SSL_CLIENT_KEY_FILE },
160 { "crl", required_argument, NULL, OPTION_SSL_CRL_FILE },
161 { "no-sslv3", no_argument, NULL, OPTION_SSL_NO_SSL3 },
162 { "no-tlsv1", no_argument, NULL, OPTION_SSL_NO_TLS1 },
163 { "no-verify-hostname", no_argument, NULL, OPTION_SSL_NO_VERIFY_HOSTNAME },
164 { "no-verify-peer", no_argument, NULL, OPTION_SSL_NO_VERIFY_PEER },
165
166 { NULL, 0, NULL, 0 }
167 };
168
169 /*
170 * Signal handler
171 */
172 static void
sig_handler(int sig)173 sig_handler(int sig)
174 {
175 switch (sig) {
176 case SIGALRM:
177 sigalrm = 1;
178 break;
179 case SIGINFO:
180 siginfo = 1;
181 break;
182 case SIGINT:
183 sigint = 1;
184 break;
185 }
186 }
187
188 struct xferstat {
189 char name[64];
190 struct timeval start; /* start of transfer */
191 struct timeval last; /* time of last update */
192 struct timeval last2; /* time of previous last update */
193 off_t size; /* size of file per HTTP hdr */
194 off_t offset; /* starting offset in file */
195 off_t rcvd; /* bytes already received */
196 off_t lastrcvd; /* bytes received since last update */
197 };
198
199 /*
200 * Format a number of seconds as either XXdYYh, XXhYYm, XXmYYs, or XXs
201 * depending on its magnitude
202 */
203 static void
stat_seconds(char * str,size_t strsz,long seconds)204 stat_seconds(char *str, size_t strsz, long seconds)
205 {
206
207 if (seconds > 86400)
208 snprintf(str, strsz, "%02ldd%02ldh",
209 seconds / 86400, (seconds % 86400) / 3600);
210 else if (seconds > 3600)
211 snprintf(str, strsz, "%02ldh%02ldm",
212 seconds / 3600, (seconds % 3600) / 60);
213 else if (seconds > 60)
214 snprintf(str, strsz, "%02ldm%02lds",
215 seconds / 60, seconds % 60);
216 else
217 snprintf(str, strsz, " %02lds",
218 seconds);
219 }
220
221 /*
222 * Compute and display ETA
223 */
224 static void
stat_eta(char * str,size_t strsz,const struct xferstat * xs)225 stat_eta(char *str, size_t strsz, const struct xferstat *xs)
226 {
227 long elapsed, eta;
228 off_t received, expected;
229
230 elapsed = xs->last.tv_sec - xs->start.tv_sec;
231 received = xs->rcvd - xs->offset;
232 expected = xs->size - xs->rcvd;
233 eta = (long)((double)elapsed * expected / received);
234 if (eta > 0)
235 stat_seconds(str, strsz, eta);
236 else
237 stat_seconds(str, strsz, elapsed);
238 }
239
240 /*
241 * Format a number as "xxxx YB" where Y is ' ', 'k', 'M'...
242 */
243 static const char *prefixes = " kMGTP";
244 static void
stat_bytes(char * str,size_t strsz,off_t bytes)245 stat_bytes(char *str, size_t strsz, off_t bytes)
246 {
247 const char *prefix = prefixes;
248
249 while (bytes > 9999 && prefix[1] != '\0') {
250 bytes /= 1024;
251 prefix++;
252 }
253 snprintf(str, strsz, "%4ju %cB", (uintmax_t)bytes, *prefix);
254 }
255
256 /*
257 * Compute and display transfer rate
258 */
259 static void
stat_bps(char * str,size_t strsz,struct xferstat * xs)260 stat_bps(char *str, size_t strsz, struct xferstat *xs)
261 {
262 char bytes[16];
263 double delta, bps;
264
265 delta = ((double)xs->last.tv_sec + (xs->last.tv_usec / 1.e6))
266 - ((double)xs->last2.tv_sec + (xs->last2.tv_usec / 1.e6));
267
268 if (delta == 0.0) {
269 snprintf(str, strsz, "?? Bps");
270 } else {
271 bps = (xs->rcvd - xs->lastrcvd) / delta;
272 stat_bytes(bytes, sizeof bytes, (off_t)bps);
273 snprintf(str, strsz, "%sps", bytes);
274 }
275 }
276
277 /*
278 * Update the stats display
279 */
280 static void
stat_display(struct xferstat * xs,int force)281 stat_display(struct xferstat *xs, int force)
282 {
283 char bytes[16], bps[16], eta[16];
284 struct timeval now;
285 int ctty_pgrp;
286
287 /* check if we're the foreground process */
288 if (ioctl(STDERR_FILENO, TIOCGPGRP, &ctty_pgrp) != 0 ||
289 (pid_t)ctty_pgrp != pgrp)
290 return;
291
292 gettimeofday(&now, NULL);
293 if (!force && now.tv_sec <= xs->last.tv_sec)
294 return;
295 xs->last2 = xs->last;
296 xs->last = now;
297
298 fprintf(stderr, "\r%-46.46s", xs->name);
299 if (xs->rcvd >= xs->size) {
300 stat_bytes(bytes, sizeof bytes, xs->rcvd);
301 setproctitle("%s [%s]", xs->name, bytes);
302 fprintf(stderr, " %s", bytes);
303 } else {
304 stat_bytes(bytes, sizeof bytes, xs->size);
305 setproctitle("%s [%d%% of %s]", xs->name,
306 (int)((100.0 * xs->rcvd) / xs->size),
307 bytes);
308 fprintf(stderr, "%3d%% of %s",
309 (int)((100.0 * xs->rcvd) / xs->size),
310 bytes);
311 }
312 if (force == 2) {
313 xs->lastrcvd = xs->offset;
314 xs->last2 = xs->start;
315 }
316 stat_bps(bps, sizeof bps, xs);
317 fprintf(stderr, " %s", bps);
318 if ((xs->size > 0 && xs->rcvd > 0 &&
319 xs->last.tv_sec >= xs->start.tv_sec + 3) ||
320 force == 2) {
321 stat_eta(eta, sizeof eta, xs);
322 fprintf(stderr, " %s", eta);
323 }
324 xs->lastrcvd = xs->rcvd;
325 }
326
327 /*
328 * Initialize the transfer statistics
329 */
330 static void
stat_start(struct xferstat * xs,const char * name,off_t size,off_t offset)331 stat_start(struct xferstat *xs, const char *name, off_t size, off_t offset)
332 {
333
334 memset(xs, 0, sizeof *xs);
335 snprintf(xs->name, sizeof xs->name, "%s", name);
336 gettimeofday(&xs->start, NULL);
337 xs->last2 = xs->last = xs->start;
338 xs->size = size;
339 xs->offset = offset;
340 xs->rcvd = offset;
341 xs->lastrcvd = offset;
342 if (v_progress)
343 stat_display(xs, 1);
344 else if (v_level > 0)
345 fprintf(stderr, "%-46s", xs->name);
346 }
347
348 /*
349 * Update the transfer statistics
350 */
351 static void
stat_update(struct xferstat * xs,off_t rcvd)352 stat_update(struct xferstat *xs, off_t rcvd)
353 {
354
355 xs->rcvd = rcvd;
356 if (v_progress)
357 stat_display(xs, 0);
358 }
359
360 /*
361 * Finalize the transfer statistics
362 */
363 static void
stat_end(struct xferstat * xs)364 stat_end(struct xferstat *xs)
365 {
366 char bytes[16], bps[16], eta[16];
367
368 gettimeofday(&xs->last, NULL);
369 if (v_progress) {
370 stat_display(xs, 2);
371 putc('\n', stderr);
372 } else if (v_level > 0) {
373 stat_bytes(bytes, sizeof bytes, xs->rcvd);
374 stat_bps(bps, sizeof bps, xs);
375 stat_eta(eta, sizeof eta, xs);
376 fprintf(stderr, " %s %s %s\n", bytes, bps, eta);
377 }
378 }
379
380 /*
381 * Ask the user for authentication details
382 */
383 static int
query_auth(struct url * URL)384 query_auth(struct url *URL)
385 {
386 struct termios tios;
387 tcflag_t saved_flags;
388 int i, nopwd;
389
390 fprintf(stderr, "Authentication required for <%s://%s:%d/>!\n",
391 URL->scheme, URL->host, URL->port);
392
393 fprintf(stderr, "Login: ");
394 if (fgets(URL->user, sizeof URL->user, stdin) == NULL)
395 return (-1);
396 for (i = strlen(URL->user); i >= 0; --i)
397 if (URL->user[i] == '\r' || URL->user[i] == '\n')
398 URL->user[i] = '\0';
399
400 fprintf(stderr, "Password: ");
401 if (tcgetattr(STDIN_FILENO, &tios) == 0) {
402 saved_flags = tios.c_lflag;
403 tios.c_lflag &= ~ECHO;
404 tios.c_lflag |= ECHONL|ICANON;
405 tcsetattr(STDIN_FILENO, TCSAFLUSH|TCSASOFT, &tios);
406 nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
407 tios.c_lflag = saved_flags;
408 tcsetattr(STDIN_FILENO, TCSANOW|TCSASOFT, &tios);
409 } else {
410 nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
411 }
412 if (nopwd)
413 return (-1);
414 for (i = strlen(URL->pwd); i >= 0; --i)
415 if (URL->pwd[i] == '\r' || URL->pwd[i] == '\n')
416 URL->pwd[i] = '\0';
417
418 return (0);
419 }
420
421 /*
422 * Fetch a file
423 */
424 static int
fetch(char * URL,const char * path,int * is_http)425 fetch(char *URL, const char *path, int *is_http)
426 {
427 struct url *url;
428 struct url_stat us;
429 struct stat sb, nsb;
430 struct xferstat xs;
431 FILE *f, *of;
432 size_t size, readcnt, wr;
433 off_t count, size_prev;
434 char flags[8];
435 const char *slash;
436 char *tmppath;
437 int r, tries;
438 unsigned timeout;
439 char *ptr;
440
441 f = of = NULL;
442 tmppath = NULL;
443
444 timeout = 0;
445 *flags = 0;
446 count = 0;
447
448 /* set verbosity level */
449 if (v_level > 1)
450 strcat(flags, "v");
451 if (v_level > 2)
452 fetchDebug = 1;
453
454 /* parse URL */
455 url = NULL;
456 if (*URL == '\0') {
457 warnx("empty URL");
458 goto failure;
459 }
460 if ((url = fetchParseURL(URL)) == NULL) {
461 warnx("%s: parse error", URL);
462 goto failure;
463 }
464
465 /* if no scheme was specified, take a guess */
466 if (!*url->scheme) {
467 if (!*url->host)
468 strcpy(url->scheme, SCHEME_FILE);
469 else if (strncasecmp(url->host, "ftp.", 4) == 0)
470 strcpy(url->scheme, SCHEME_FTP);
471 else if (strncasecmp(url->host, "www.", 4) == 0)
472 strcpy(url->scheme, SCHEME_HTTP);
473 }
474
475 /* for both of http and https */
476 *is_http = strncmp(url->scheme, "http", 4) == 0;
477
478 /* common flags */
479 switch (family) {
480 case PF_INET:
481 strcat(flags, "4");
482 break;
483 case PF_INET6:
484 strcat(flags, "6");
485 break;
486 }
487
488 /* FTP specific flags */
489 if (strcmp(url->scheme, SCHEME_FTP) == 0) {
490 if (p_flag)
491 strcat(flags, "p");
492 if (d_flag)
493 strcat(flags, "d");
494 if (U_flag)
495 strcat(flags, "l");
496 timeout = T_secs ? T_secs : ftp_timeout;
497 }
498
499 /* HTTP specific flags */
500 if (strcmp(url->scheme, SCHEME_HTTP) == 0 ||
501 strcmp(url->scheme, SCHEME_HTTPS) == 0) {
502 if (d_flag)
503 strcat(flags, "d");
504 if (A_flag)
505 strcat(flags, "A");
506 timeout = T_secs ? T_secs : http_timeout;
507 if (i_flag) {
508 if (stat(i_filename, &sb)) {
509 warn("%s: stat()", i_filename);
510 goto failure;
511 }
512 url->ims_time = sb.st_mtime;
513 strcat(flags, "i");
514 }
515 }
516
517 /* set the protocol timeout. */
518 fetchTimeout = timeout;
519
520 /* just print size */
521 if (s_flag) {
522 if (timeout)
523 alarm(timeout);
524 r = fetchStat(url, &us, flags);
525 if (timeout)
526 alarm(0);
527 if (sigalrm || sigint)
528 goto signal;
529 if (r == -1) {
530 warnx("%s", fetchLastErrString);
531 goto failure;
532 }
533 if (us.size == -1)
534 printf("Unknown\n");
535 else
536 printf("%jd\n", (intmax_t)us.size);
537 goto success;
538 }
539
540 tries = 1;
541 again:
542 r = 0;
543 /*
544 * If the -r flag was specified, we have to compare the local
545 * and remote files, so we should really do a fetchStat()
546 * first, but I know of at least one HTTP server that only
547 * sends the content size in response to GET requests, and
548 * leaves it out of replies to HEAD requests. Also, in the
549 * (frequent) case that the local and remote files match but
550 * the local file is truncated, we have sufficient information
551 * before the compare to issue a correct request. Therefore,
552 * we always issue a GET request as if we were sure the local
553 * file was a truncated copy of the remote file; we can drop
554 * the connection later if we change our minds.
555 */
556 sb.st_size = -1;
557 if (!o_stdout) {
558 r = stat(path, &sb);
559 if (r == 0 && (r_flag || tries > 1) && S_ISREG(sb.st_mode)) {
560 url->offset = sb.st_size;
561 } else if (r == -1 || !S_ISREG(sb.st_mode)) {
562 /*
563 * Whatever value sb.st_size has now is either
564 * wrong (if stat(2) failed) or irrelevant (if the
565 * path does not refer to a regular file)
566 */
567 sb.st_size = -1;
568 }
569 if (r == -1 && errno != ENOENT) {
570 warnx("%s: stat()", path);
571 goto failure;
572 }
573 }
574 size_prev = sb.st_size;
575
576 /* start the transfer */
577 if (timeout)
578 alarm(timeout);
579 f = fetchXGet(url, &us, flags);
580 if (timeout)
581 alarm(0);
582 if (sigalrm || sigint)
583 goto signal;
584 if (f == NULL) {
585 if (i_flag && *is_http && fetchLastErrCode == FETCH_OK &&
586 strcmp(fetchLastErrString, "Not Modified") == 0) {
587 /* HTTP Not Modified Response, return OK. */
588 if (v_level > 0)
589 warnx("%s: %s", URL, fetchLastErrString);
590 r = 0;
591 goto done;
592 } else {
593 warnx("%s: %s", URL, fetchLastErrString);
594 goto failure;
595 }
596 }
597 if (sigint)
598 goto signal;
599
600 /* check that size is as expected */
601 if (S_size) {
602 if (us.size == -1) {
603 warnx("%s: size unknown", URL);
604 } else if (us.size != S_size) {
605 warnx("%s: size mismatch: expected %jd, actual %jd",
606 URL, (intmax_t)S_size, (intmax_t)us.size);
607 goto failure;
608 }
609 }
610
611 /* symlink instead of copy */
612 if (l_flag && strcmp(url->scheme, "file") == 0 && !o_stdout) {
613 if (symlink(url->doc, path) == -1) {
614 warn("%s: symlink()", path);
615 goto failure;
616 }
617 goto success;
618 }
619
620 if (us.size == -1 && !o_stdout && v_level > 0)
621 warnx("%s: size of remote file is not known", URL);
622 if (v_level > 1) {
623 if (sb.st_size != -1)
624 fprintf(stderr, "local size / mtime: %jd / %ld\n",
625 (intmax_t)sb.st_size, (long)sb.st_mtime);
626 if (us.size != -1)
627 fprintf(stderr, "remote size / mtime: %jd / %ld\n",
628 (intmax_t)us.size, (long)us.mtime);
629 }
630
631 /* open output file */
632 if (o_stdout) {
633 /* output to stdout */
634 of = stdout;
635 } else if (r_flag && sb.st_size != -1) {
636 /* resume mode, local file exists */
637 if (!F_flag && us.mtime && sb.st_mtime != us.mtime && tries == 1) {
638 /* no match! have to refetch */
639 fclose(f);
640 /* if precious, warn the user and give up */
641 if (R_flag) {
642 warnx("%s: local modification time "
643 "does not match remote", path);
644 goto failure_keep;
645 }
646 } else if (url->offset > sb.st_size) {
647 /* gap between what we asked for and what we got */
648 warnx("%s: gap in resume mode", URL);
649 fclose(of);
650 of = NULL;
651 /* picked up again later */
652 } else if (us.size != -1) {
653 if (us.size == sb.st_size)
654 /* nothing to do */
655 goto success;
656 if (sb.st_size > us.size) {
657 /* local file too long! */
658 warnx("%s: local file (%jd bytes) is longer "
659 "than remote file (%jd bytes)", path,
660 (intmax_t)sb.st_size, (intmax_t)us.size);
661 goto failure;
662 }
663 /* we got it, open local file */
664 if ((of = fopen(path, "r+")) == NULL) {
665 warn("%s: fopen()", path);
666 goto failure;
667 }
668 /* check that it didn't move under our feet */
669 if (fstat(fileno(of), &nsb) == -1) {
670 /* can't happen! */
671 warn("%s: fstat()", path);
672 goto failure;
673 }
674 if (nsb.st_dev != sb.st_dev ||
675 nsb.st_ino != sb.st_ino ||
676 nsb.st_size != sb.st_size) {
677 warnx("%s: file has changed", URL);
678 fclose(of);
679 of = NULL;
680 sb = nsb;
681 /* picked up again later */
682 }
683 }
684 /* seek to where we left off */
685 if (of != NULL && fseeko(of, url->offset, SEEK_SET) != 0) {
686 warn("%s: fseeko()", path);
687 fclose(of);
688 of = NULL;
689 /* picked up again later */
690 }
691 } else if (m_flag && sb.st_size != -1) {
692 /* mirror mode, local file exists */
693 if (sb.st_size == us.size && sb.st_mtime == us.mtime)
694 goto success;
695 }
696
697 if (of == NULL) {
698 /*
699 * We don't yet have an output file; either this is a
700 * vanilla run with no special flags, or the local and
701 * remote files didn't match.
702 */
703
704 if (url->offset > 0) {
705 /*
706 * We tried to restart a transfer, but for
707 * some reason gave up - so we have to restart
708 * from scratch if we want the whole file
709 */
710 url->offset = 0;
711 if ((f = fetchXGet(url, &us, flags)) == NULL) {
712 warnx("%s: %s", URL, fetchLastErrString);
713 goto failure;
714 }
715 if (sigint)
716 goto signal;
717 }
718
719 /* construct a temp file name */
720 if (sb.st_size != -1 && S_ISREG(sb.st_mode)) {
721 if ((slash = strrchr(path, '/')) == NULL)
722 slash = path;
723 else
724 ++slash;
725 if(tmppath != NULL)
726 free(tmppath);
727 asprintf(&tmppath, "%.*s.fetch.XXXXXX.%s",
728 (int)(slash - path), path, slash);
729 if (tmppath != NULL) {
730 if (mkstemps(tmppath, strlen(slash) + 1) == -1) {
731 warn("%s: mkstemps()", path);
732 goto failure;
733 }
734 of = fopen(tmppath, "w");
735 chown(tmppath, sb.st_uid, sb.st_gid);
736 chmod(tmppath, sb.st_mode & ALLPERMS);
737 }
738 }
739 if (of == NULL)
740 of = fopen(path, "w");
741 if (of == NULL) {
742 warn("%s: open()", path);
743 goto failure;
744 }
745 }
746 count = url->offset;
747
748 /* start the counter */
749 stat_start(&xs, path, us.size, count);
750
751 sigalrm = siginfo = sigint = 0;
752
753 /* suck in the data */
754 setvbuf(f, NULL, _IOFBF, B_size);
755 signal(SIGINFO, sig_handler);
756 while (!sigint) {
757 if (us.size != -1 && us.size - count < B_size &&
758 us.size - count >= 0)
759 size = us.size - count;
760 else
761 size = B_size;
762 if (siginfo) {
763 stat_end(&xs);
764 siginfo = 0;
765 }
766
767 if (size == 0)
768 break;
769
770 if ((readcnt = fread(buf, 1, size, f)) < size) {
771 if (ferror(f) && errno == EINTR && !sigint)
772 clearerr(f);
773 else if (readcnt == 0)
774 break;
775 }
776
777 stat_update(&xs, count += readcnt);
778 for (ptr = buf; readcnt > 0; ptr += wr, readcnt -= wr)
779 if ((wr = fwrite(ptr, 1, readcnt, of)) < readcnt) {
780 if (ferror(of) && errno == EINTR && !sigint)
781 clearerr(of);
782 else
783 break;
784 }
785 if (readcnt != 0)
786 break;
787 }
788 if (!sigalrm)
789 sigalrm = ferror(f) && errno == ETIMEDOUT;
790 signal(SIGINFO, SIG_DFL);
791
792 stat_end(&xs);
793
794 /*
795 * If the transfer timed out or was interrupted, we still want to
796 * set the mtime in case the file is not removed (-r or -R) and
797 * the user later restarts the transfer.
798 */
799 signal:
800 /* set mtime of local file */
801 if (!n_flag && us.mtime && !o_stdout && of != NULL &&
802 (stat(path, &sb) != -1) && sb.st_mode & S_IFREG) {
803 struct timeval tv[2];
804
805 fflush(of);
806 tv[0].tv_sec = (long)(us.atime ? us.atime : us.mtime);
807 tv[1].tv_sec = (long)us.mtime;
808 tv[0].tv_usec = tv[1].tv_usec = 0;
809 if (utimes(tmppath ? tmppath : path, tv))
810 warn("%s: utimes()", tmppath ? tmppath : path);
811 }
812
813 /* timed out or interrupted? */
814 if (sigalrm)
815 warnx("transfer timed out");
816 if (sigint) {
817 warnx("transfer interrupted");
818 goto failure;
819 }
820
821 /* timeout / interrupt before connection completley established? */
822 if (f == NULL)
823 goto failure;
824
825 if (!sigalrm) {
826 /* check the status of our files */
827 if (ferror(f))
828 warn("%s", URL);
829 if (ferror(of))
830 warn("%s", path);
831 if (ferror(f) || ferror(of))
832 goto failure;
833 }
834
835 /* did the transfer complete normally? */
836 if (us.size != -1 && count < us.size) {
837 warnx("%s appears to be truncated: %jd/%jd bytes",
838 path, (intmax_t)count, (intmax_t)us.size);
839 if(!o_stdout && a_flag && count > size_prev) {
840 fclose(f);
841 if (w_secs)
842 sleep(w_secs);
843 tries++;
844 goto again;
845 }
846 goto failure_keep;
847 }
848
849 /*
850 * If the transfer timed out and we didn't know how much to
851 * expect, assume the worst (i.e. we didn't get all of it)
852 */
853 if (sigalrm && us.size == -1) {
854 warnx("%s may be truncated", path);
855 goto failure_keep;
856 }
857
858 success:
859 r = 0;
860 if (tmppath != NULL && rename(tmppath, path) == -1) {
861 warn("%s: rename()", path);
862 goto failure_keep;
863 }
864 goto done;
865 failure:
866 if (of && of != stdout && !R_flag && !r_flag)
867 if (stat(path, &sb) != -1 && (sb.st_mode & S_IFREG))
868 unlink(tmppath ? tmppath : path);
869 if (R_flag && tmppath != NULL && sb.st_size == -1)
870 rename(tmppath, path); /* ignore errors here */
871 failure_keep:
872 r = -1;
873 goto done;
874 done:
875 if (f)
876 fclose(f);
877 if (of && of != stdout)
878 fclose(of);
879 if (url)
880 fetchFreeURL(url);
881 if (tmppath != NULL)
882 free(tmppath);
883 return (r);
884 }
885
886 static void
usage(void)887 usage(void)
888 {
889 fprintf(stderr, "%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
890 "usage: fetch [-146AadFlMmnPpqRrsUv] [-B bytes] [--bind-address=host]",
891 " [--ca-cert=file] [--ca-path=dir] [--cert=file] [--crl=file]",
892 " [-i file] [--key=file] [-N file] [--no-passive] [--no-proxy=list]",
893 " [--no-sslv3] [--no-tlsv1] [--no-verify-hostname] [--no-verify-peer]",
894 " [-o file] [--referer=URL] [-S bytes] [-T seconds]",
895 " [--user-agent=agent-string] [-w seconds] URL ...",
896 " fetch [-146AadFlMmnPpqRrsUv] [-B bytes] [--bind-address=host]",
897 " [--ca-cert=file] [--ca-path=dir] [--cert=file] [--crl=file]",
898 " [-i file] [--key=file] [-N file] [--no-passive] [--no-proxy=list]",
899 " [--no-sslv3] [--no-tlsv1] [--no-verify-hostname] [--no-verify-peer]",
900 " [-o file] [--referer=URL] [-S bytes] [-T seconds]",
901 " [--user-agent=agent-string] [-w seconds] -h host -f file [-c dir]");
902 }
903
904
905 /*
906 * Entry point
907 */
908 int
main(int argc,char * argv[])909 main(int argc, char *argv[])
910 {
911 struct stat sb;
912 struct sigaction sa;
913 const char *p, *s;
914 char *end, *q;
915 int c, e, is_http, r;
916
917
918 while ((c = getopt_long(argc, argv,
919 "146AaB:bc:dFf:Hh:i:lMmN:nPpo:qRrS:sT:tUvw:",
920 longopts, NULL)) != -1)
921 switch (c) {
922 case '1':
923 once_flag = 1;
924 break;
925 case '4':
926 family = PF_INET;
927 break;
928 case '6':
929 family = PF_INET6;
930 break;
931 case 'A':
932 A_flag = 1;
933 break;
934 case 'a':
935 a_flag = 1;
936 break;
937 case 'B':
938 B_size = (off_t)strtol(optarg, &end, 10);
939 if (*optarg == '\0' || *end != '\0')
940 errx(1, "invalid buffer size (%s)", optarg);
941 break;
942 case 'b':
943 warnx("warning: the -b option is deprecated");
944 b_flag = 1;
945 break;
946 case 'c':
947 c_dirname = optarg;
948 break;
949 case 'd':
950 d_flag = 1;
951 break;
952 case 'F':
953 F_flag = 1;
954 break;
955 case 'f':
956 f_filename = optarg;
957 break;
958 case 'H':
959 warnx("the -H option is now implicit, "
960 "use -U to disable");
961 break;
962 case 'h':
963 h_hostname = optarg;
964 break;
965 case 'i':
966 i_flag = 1;
967 i_filename = optarg;
968 break;
969 case 'l':
970 l_flag = 1;
971 break;
972 case 'o':
973 o_flag = 1;
974 o_filename = optarg;
975 break;
976 case 'M':
977 case 'm':
978 if (r_flag)
979 errx(1, "the -m and -r flags "
980 "are mutually exclusive");
981 m_flag = 1;
982 break;
983 case 'N':
984 N_filename = optarg;
985 break;
986 case 'n':
987 n_flag = 1;
988 break;
989 case 'P':
990 case 'p':
991 p_flag = 1;
992 break;
993 case 'q':
994 v_level = 0;
995 break;
996 case 'R':
997 R_flag = 1;
998 break;
999 case 'r':
1000 if (m_flag)
1001 errx(1, "the -m and -r flags "
1002 "are mutually exclusive");
1003 r_flag = 1;
1004 break;
1005 case 'S':
1006 S_size = strtoll(optarg, &end, 10);
1007 if (*optarg == '\0' || *end != '\0')
1008 errx(1, "invalid size (%s)", optarg);
1009 break;
1010 case 's':
1011 s_flag = 1;
1012 break;
1013 case 'T':
1014 T_secs = strtol(optarg, &end, 10);
1015 if (*optarg == '\0' || *end != '\0')
1016 errx(1, "invalid timeout (%s)", optarg);
1017 break;
1018 case 't':
1019 t_flag = 1;
1020 warnx("warning: the -t option is deprecated");
1021 break;
1022 case 'U':
1023 U_flag = 1;
1024 break;
1025 case 'v':
1026 v_level++;
1027 break;
1028 case 'w':
1029 a_flag = 1;
1030 w_secs = strtol(optarg, &end, 10);
1031 if (*optarg == '\0' || *end != '\0')
1032 errx(1, "invalid delay (%s)", optarg);
1033 break;
1034 case OPTION_BIND_ADDRESS:
1035 setenv("FETCH_BIND_ADDRESS", optarg, 1);
1036 break;
1037 case OPTION_NO_FTP_PASSIVE_MODE:
1038 setenv("FTP_PASSIVE_MODE", "no", 1);
1039 break;
1040 case OPTION_HTTP_REFERER:
1041 setenv("HTTP_REFERER", optarg, 1);
1042 break;
1043 case OPTION_HTTP_USER_AGENT:
1044 setenv("HTTP_USER_AGENT", optarg, 1);
1045 break;
1046 case OPTION_NO_PROXY:
1047 setenv("NO_PROXY", optarg, 1);
1048 break;
1049 case OPTION_SSL_CA_CERT_FILE:
1050 setenv("SSL_CA_CERT_FILE", optarg, 1);
1051 break;
1052 case OPTION_SSL_CA_CERT_PATH:
1053 setenv("SSL_CA_CERT_PATH", optarg, 1);
1054 break;
1055 case OPTION_SSL_CLIENT_CERT_FILE:
1056 setenv("SSL_CLIENT_CERT_FILE", optarg, 1);
1057 break;
1058 case OPTION_SSL_CLIENT_KEY_FILE:
1059 setenv("SSL_CLIENT_KEY_FILE", optarg, 1);
1060 break;
1061 case OPTION_SSL_CRL_FILE:
1062 setenv("SSL_CRL_FILE", optarg, 1);
1063 break;
1064 case OPTION_SSL_NO_SSL3:
1065 setenv("SSL_NO_SSL3", "", 1);
1066 break;
1067 case OPTION_SSL_NO_TLS1:
1068 setenv("SSL_NO_TLS1", "", 1);
1069 break;
1070 case OPTION_SSL_NO_VERIFY_HOSTNAME:
1071 setenv("SSL_NO_VERIFY_HOSTNAME", "", 1);
1072 break;
1073 case OPTION_SSL_NO_VERIFY_PEER:
1074 setenv("SSL_NO_VERIFY_PEER", "", 1);
1075 break;
1076 default:
1077 usage();
1078 exit(1);
1079 }
1080
1081 argc -= optind;
1082 argv += optind;
1083
1084 if (h_hostname || f_filename || c_dirname) {
1085 if (!h_hostname || !f_filename || argc) {
1086 usage();
1087 exit(1);
1088 }
1089 /* XXX this is a hack. */
1090 if (strcspn(h_hostname, "@:/") != strlen(h_hostname))
1091 errx(1, "invalid hostname");
1092 if (asprintf(argv, "ftp://%s/%s/%s", h_hostname,
1093 c_dirname ? c_dirname : "", f_filename) == -1)
1094 errx(1, "%s", strerror(ENOMEM));
1095 argc++;
1096 }
1097
1098 if (!argc) {
1099 usage();
1100 exit(1);
1101 }
1102
1103 /* allocate buffer */
1104 if (B_size < MINBUFSIZE)
1105 B_size = MINBUFSIZE;
1106 if ((buf = malloc(B_size)) == NULL)
1107 errx(1, "%s", strerror(ENOMEM));
1108
1109 /* timeouts */
1110 if ((s = getenv("FTP_TIMEOUT")) != NULL) {
1111 ftp_timeout = strtol(s, &end, 10);
1112 if (*s == '\0' || *end != '\0' || ftp_timeout < 0) {
1113 warnx("FTP_TIMEOUT (%s) is not a positive integer", s);
1114 ftp_timeout = 0;
1115 }
1116 }
1117 if ((s = getenv("HTTP_TIMEOUT")) != NULL) {
1118 http_timeout = strtol(s, &end, 10);
1119 if (*s == '\0' || *end != '\0' || http_timeout < 0) {
1120 warnx("HTTP_TIMEOUT (%s) is not a positive integer", s);
1121 http_timeout = 0;
1122 }
1123 }
1124
1125 /* signal handling */
1126 sa.sa_flags = 0;
1127 sa.sa_handler = sig_handler;
1128 sigemptyset(&sa.sa_mask);
1129 sigaction(SIGALRM, &sa, NULL);
1130 sa.sa_flags = SA_RESETHAND;
1131 sigaction(SIGINT, &sa, NULL);
1132 fetchRestartCalls = 0;
1133
1134 /* output file */
1135 if (o_flag) {
1136 if (strcmp(o_filename, "-") == 0) {
1137 o_stdout = 1;
1138 } else if (stat(o_filename, &sb) == -1) {
1139 if (errno == ENOENT) {
1140 if (argc > 1)
1141 errx(1, "%s is not a directory",
1142 o_filename);
1143 } else {
1144 err(1, "%s", o_filename);
1145 }
1146 } else {
1147 if (sb.st_mode & S_IFDIR)
1148 o_directory = 1;
1149 }
1150 }
1151
1152 /* check if output is to a tty (for progress report) */
1153 v_tty = isatty(STDERR_FILENO);
1154 v_progress = v_tty && v_level > 0;
1155 if (v_progress)
1156 pgrp = getpgrp();
1157
1158 r = 0;
1159
1160 /* authentication */
1161 if (v_tty)
1162 fetchAuthMethod = query_auth;
1163 if (N_filename != NULL)
1164 if (setenv("NETRC", N_filename, 1) == -1)
1165 err(1, "setenv: cannot set NETRC=%s", N_filename);
1166
1167 while (argc) {
1168 if ((p = strrchr(*argv, '/')) == NULL)
1169 p = *argv;
1170 else
1171 p++;
1172
1173 if (!*p)
1174 p = "fetch.out";
1175
1176 fetchLastErrCode = 0;
1177
1178 if (o_flag) {
1179 if (o_stdout) {
1180 e = fetch(*argv, "-", &is_http);
1181 } else if (o_directory) {
1182 asprintf(&q, "%s/%s", o_filename, p);
1183 e = fetch(*argv, q, &is_http);
1184 free(q);
1185 } else {
1186 e = fetch(*argv, o_filename, &is_http);
1187 }
1188 } else {
1189 e = fetch(*argv, p, &is_http);
1190 }
1191
1192 if (sigint)
1193 kill(getpid(), SIGINT);
1194
1195 if (e == 0 && once_flag)
1196 exit(0);
1197
1198 if (e) {
1199 r = 1;
1200 if ((fetchLastErrCode
1201 && fetchLastErrCode != FETCH_AUTH
1202 && fetchLastErrCode != FETCH_UNAVAIL
1203 && fetchLastErrCode != FETCH_MOVED
1204 && fetchLastErrCode != FETCH_URL
1205 && fetchLastErrCode != FETCH_RESOLV
1206 && fetchLastErrCode != FETCH_UNKNOWN
1207 && (!is_http || (
1208 fetchLastErrCode != FETCH_PROTO
1209 && fetchLastErrCode != FETCH_SERVER
1210 && fetchLastErrCode != FETCH_TEMP
1211 && fetchLastErrCode != FETCH_TIMEOUT
1212 )))) {
1213 if (w_secs && v_level)
1214 fprintf(stderr, "Waiting %ld seconds "
1215 "before retrying\n", w_secs);
1216 if (w_secs)
1217 sleep(w_secs);
1218 if (a_flag)
1219 continue;
1220 }
1221 }
1222
1223 argc--, argv++;
1224 }
1225
1226 exit(r);
1227 }
1228