1 /*- 2 * Copyright (c) 2000-2014 Dag-Erling Smørgrav 3 * Copyright (c) 2013 Michael Gmelin <freebsd@grem.de> 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer 11 * in this position and unchanged. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. The name of the author may not be used to endorse or promote products 16 * derived from this software without specific prior written permission 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 28 */ 29 30 #include <sys/cdefs.h> 31 __FBSDID("$FreeBSD$"); 32 33 #include <sys/param.h> 34 #include <sys/socket.h> 35 #include <sys/stat.h> 36 #include <sys/time.h> 37 38 #include <ctype.h> 39 #include <err.h> 40 #include <errno.h> 41 #include <getopt.h> 42 #include <signal.h> 43 #include <stdint.h> 44 #include <stdio.h> 45 #include <stdlib.h> 46 #include <string.h> 47 #include <termios.h> 48 #include <unistd.h> 49 50 #include <fetch.h> 51 52 #define MINBUFSIZE 16384 53 #define TIMEOUT 120 54 55 /* Option flags */ 56 static int A_flag; /* -A: do not follow 302 redirects */ 57 static int a_flag; /* -a: auto retry */ 58 static off_t B_size; /* -B: buffer size */ 59 static int b_flag; /*! -b: workaround TCP bug */ 60 static char *c_dirname; /* -c: remote directory */ 61 static int d_flag; /* -d: direct connection */ 62 static int F_flag; /* -F: restart without checking mtime */ 63 static char *f_filename; /* -f: file to fetch */ 64 static char *h_hostname; /* -h: host to fetch from */ 65 static int i_flag; /* -i: specify file for mtime comparison */ 66 static char *i_filename; /* name of input file */ 67 static int l_flag; /* -l: link rather than copy file: URLs */ 68 static int m_flag; /* -[Mm]: mirror mode */ 69 static char *N_filename; /* -N: netrc file name */ 70 static int n_flag; /* -n: do not preserve modification time */ 71 static int o_flag; /* -o: specify output file */ 72 static int o_directory; /* output file is a directory */ 73 static char *o_filename; /* name of output file */ 74 static int o_stdout; /* output file is stdout */ 75 static int once_flag; /* -1: stop at first successful file */ 76 static int p_flag; /* -[Pp]: use passive FTP */ 77 static int R_flag; /* -R: don't delete partial files */ 78 static int r_flag; /* -r: restart previous transfer */ 79 static off_t S_size; /* -S: require size to match */ 80 static int s_flag; /* -s: show size, don't fetch */ 81 static long T_secs; /* -T: transfer timeout in seconds */ 82 static int t_flag; /*! -t: workaround TCP bug */ 83 static int U_flag; /* -U: do not use high ports */ 84 static int v_level = 1; /* -v: verbosity level */ 85 static int v_tty; /* stdout is a tty */ 86 static pid_t pgrp; /* our process group */ 87 static long w_secs; /* -w: retry delay */ 88 static int family = PF_UNSPEC; /* -[46]: address family to use */ 89 90 static int sigalrm; /* SIGALRM received */ 91 static int siginfo; /* SIGINFO received */ 92 static int sigint; /* SIGINT received */ 93 94 static long ftp_timeout = TIMEOUT; /* default timeout for FTP transfers */ 95 static long http_timeout = TIMEOUT;/* default timeout for HTTP transfers */ 96 static char *buf; /* transfer buffer */ 97 98 enum options 99 { 100 OPTION_BIND_ADDRESS, 101 OPTION_NO_FTP_PASSIVE_MODE, 102 OPTION_HTTP_REFERER, 103 OPTION_HTTP_USER_AGENT, 104 OPTION_NO_PROXY, 105 OPTION_SSL_CA_CERT_FILE, 106 OPTION_SSL_CA_CERT_PATH, 107 OPTION_SSL_CLIENT_CERT_FILE, 108 OPTION_SSL_CLIENT_KEY_FILE, 109 OPTION_SSL_CRL_FILE, 110 OPTION_SSL_NO_SSL3, 111 OPTION_SSL_NO_TLS1, 112 OPTION_SSL_NO_VERIFY_HOSTNAME, 113 OPTION_SSL_NO_VERIFY_PEER 114 }; 115 116 117 static struct option longopts[] = 118 { 119 /* mapping to single character argument */ 120 { "one-file", no_argument, NULL, '1' }, 121 { "ipv4-only", no_argument, NULL, '4' }, 122 { "ipv6-only", no_argument, NULL, '6' }, 123 { "no-redirect", no_argument, NULL, 'A' }, 124 { "retry", no_argument, NULL, 'a' }, 125 { "buffer-size", required_argument, NULL, 'B' }, 126 /* -c not mapped, since it's deprecated */ 127 { "direct", no_argument, NULL, 'd' }, 128 { "force-restart", no_argument, NULL, 'F' }, 129 /* -f not mapped, since it's deprecated */ 130 /* -h not mapped, since it's deprecated */ 131 { "if-modified-since", required_argument, NULL, 'i' }, 132 { "symlink", no_argument, NULL, 'l' }, 133 /* -M not mapped since it's the same as -m */ 134 { "mirror", no_argument, NULL, 'm' }, 135 { "netrc", required_argument, NULL, 'N' }, 136 { "no-mtime", no_argument, NULL, 'n' }, 137 { "output", required_argument, NULL, 'o' }, 138 /* -P not mapped since it's the same as -p */ 139 { "passive", no_argument, NULL, 'p' }, 140 { "quiet", no_argument, NULL, 'q' }, 141 { "keep-output", no_argument, NULL, 'R' }, 142 { "restart", no_argument, NULL, 'r' }, 143 { "require-size", required_argument, NULL, 'S' }, 144 { "print-size", no_argument, NULL, 's' }, 145 { "timeout", required_argument, NULL, 'T' }, 146 { "passive-portrange-default", no_argument, NULL, 'T' }, 147 { "verbose", no_argument, NULL, 'v' }, 148 { "retry-delay", required_argument, NULL, 'w' }, 149 150 /* options without a single character equivalent */ 151 { "bind-address", required_argument, NULL, OPTION_BIND_ADDRESS }, 152 { "no-passive", no_argument, NULL, OPTION_NO_FTP_PASSIVE_MODE }, 153 { "referer", required_argument, NULL, OPTION_HTTP_REFERER }, 154 { "user-agent", required_argument, NULL, OPTION_HTTP_USER_AGENT }, 155 { "no-proxy", required_argument, NULL, OPTION_NO_PROXY }, 156 { "ca-cert", required_argument, NULL, OPTION_SSL_CA_CERT_FILE }, 157 { "ca-path", required_argument, NULL, OPTION_SSL_CA_CERT_PATH }, 158 { "cert", required_argument, NULL, OPTION_SSL_CLIENT_CERT_FILE }, 159 { "key", required_argument, NULL, OPTION_SSL_CLIENT_KEY_FILE }, 160 { "crl", required_argument, NULL, OPTION_SSL_CRL_FILE }, 161 { "no-sslv3", no_argument, NULL, OPTION_SSL_NO_SSL3 }, 162 { "no-tlsv1", no_argument, NULL, OPTION_SSL_NO_TLS1 }, 163 { "no-verify-hostname", no_argument, NULL, OPTION_SSL_NO_VERIFY_HOSTNAME }, 164 { "no-verify-peer", no_argument, NULL, OPTION_SSL_NO_VERIFY_PEER }, 165 166 { NULL, 0, NULL, 0 } 167 }; 168 169 /* 170 * Signal handler 171 */ 172 static void 173 sig_handler(int sig) 174 { 175 switch (sig) { 176 case SIGALRM: 177 sigalrm = 1; 178 break; 179 case SIGINFO: 180 siginfo = 1; 181 break; 182 case SIGINT: 183 sigint = 1; 184 break; 185 } 186 } 187 188 struct xferstat { 189 char name[64]; 190 struct timeval start; /* start of transfer */ 191 struct timeval last; /* time of last update */ 192 struct timeval last2; /* time of previous last update */ 193 off_t size; /* size of file per HTTP hdr */ 194 off_t offset; /* starting offset in file */ 195 off_t rcvd; /* bytes already received */ 196 off_t lastrcvd; /* bytes received since last update */ 197 }; 198 199 /* 200 * Compute and display ETA 201 */ 202 static const char * 203 stat_eta(struct xferstat *xs) 204 { 205 static char str[16]; 206 long elapsed, eta; 207 off_t received, expected; 208 209 elapsed = xs->last.tv_sec - xs->start.tv_sec; 210 received = xs->rcvd - xs->offset; 211 expected = xs->size - xs->rcvd; 212 eta = (long)((double)elapsed * expected / received); 213 if (eta > 3600) 214 snprintf(str, sizeof str, "%02ldh%02ldm", 215 eta / 3600, (eta % 3600) / 60); 216 else if (eta > 0) 217 snprintf(str, sizeof str, "%02ldm%02lds", 218 eta / 60, eta % 60); 219 else 220 snprintf(str, sizeof str, "%02ldm%02lds", 221 elapsed / 60, elapsed % 60); 222 return (str); 223 } 224 225 /* 226 * Format a number as "xxxx YB" where Y is ' ', 'k', 'M'... 227 */ 228 static const char *prefixes = " kMGTP"; 229 static const char * 230 stat_bytes(off_t bytes) 231 { 232 static char str[16]; 233 const char *prefix = prefixes; 234 235 while (bytes > 9999 && prefix[1] != '\0') { 236 bytes /= 1024; 237 prefix++; 238 } 239 snprintf(str, sizeof str, "%4jd %cB", (intmax_t)bytes, *prefix); 240 return (str); 241 } 242 243 /* 244 * Compute and display transfer rate 245 */ 246 static const char * 247 stat_bps(struct xferstat *xs) 248 { 249 static char str[16]; 250 double delta, bps; 251 252 delta = (xs->last.tv_sec + (xs->last.tv_usec / 1.e6)) 253 - (xs->last2.tv_sec + (xs->last2.tv_usec / 1.e6)); 254 255 if (delta == 0.0) { 256 snprintf(str, sizeof str, "?? Bps"); 257 } else { 258 bps = (xs->rcvd - xs->lastrcvd) / delta; 259 snprintf(str, sizeof str, "%sps", stat_bytes((off_t)bps)); 260 } 261 return (str); 262 } 263 264 /* 265 * Update the stats display 266 */ 267 static void 268 stat_display(struct xferstat *xs, int force) 269 { 270 struct timeval now; 271 int ctty_pgrp; 272 273 /* check if we're the foreground process */ 274 if (ioctl(STDERR_FILENO, TIOCGPGRP, &ctty_pgrp) == -1 || 275 (pid_t)ctty_pgrp != pgrp) 276 return; 277 278 gettimeofday(&now, NULL); 279 if (!force && now.tv_sec <= xs->last.tv_sec) 280 return; 281 xs->last2 = xs->last; 282 xs->last = now; 283 284 fprintf(stderr, "\r%-46.46s", xs->name); 285 if (xs->size <= 0) { 286 setproctitle("%s [%s]", xs->name, stat_bytes(xs->rcvd)); 287 fprintf(stderr, " %s", stat_bytes(xs->rcvd)); 288 } else { 289 setproctitle("%s [%d%% of %s]", xs->name, 290 (int)((100.0 * xs->rcvd) / xs->size), 291 stat_bytes(xs->size)); 292 fprintf(stderr, "%3d%% of %s", 293 (int)((100.0 * xs->rcvd) / xs->size), 294 stat_bytes(xs->size)); 295 } 296 if (force == 2) { 297 xs->lastrcvd = xs->offset; 298 xs->last2 = xs->start; 299 } 300 fprintf(stderr, " %s", stat_bps(xs)); 301 if ((xs->size > 0 && xs->rcvd > 0 && 302 xs->last.tv_sec >= xs->start.tv_sec + 3) || 303 force == 2) 304 fprintf(stderr, " %s", stat_eta(xs)); 305 xs->lastrcvd = xs->rcvd; 306 } 307 308 /* 309 * Initialize the transfer statistics 310 */ 311 static void 312 stat_start(struct xferstat *xs, const char *name, off_t size, off_t offset) 313 { 314 snprintf(xs->name, sizeof xs->name, "%s", name); 315 gettimeofday(&xs->start, NULL); 316 xs->last.tv_sec = xs->last.tv_usec = 0; 317 xs->size = size; 318 xs->offset = offset; 319 xs->rcvd = offset; 320 xs->lastrcvd = offset; 321 if (v_tty && v_level > 0) 322 stat_display(xs, 1); 323 else if (v_level > 0) 324 fprintf(stderr, "%-46s", xs->name); 325 } 326 327 /* 328 * Update the transfer statistics 329 */ 330 static void 331 stat_update(struct xferstat *xs, off_t rcvd) 332 { 333 xs->rcvd = rcvd; 334 if (v_tty && v_level > 0) 335 stat_display(xs, 0); 336 } 337 338 /* 339 * Finalize the transfer statistics 340 */ 341 static void 342 stat_end(struct xferstat *xs) 343 { 344 gettimeofday(&xs->last, NULL); 345 if (v_tty && v_level > 0) { 346 stat_display(xs, 2); 347 putc('\n', stderr); 348 } else if (v_level > 0) { 349 fprintf(stderr, " %s %s\n", 350 stat_bytes(xs->size), stat_bps(xs)); 351 } 352 } 353 354 /* 355 * Ask the user for authentication details 356 */ 357 static int 358 query_auth(struct url *URL) 359 { 360 struct termios tios; 361 tcflag_t saved_flags; 362 int i, nopwd; 363 364 fprintf(stderr, "Authentication required for <%s://%s:%d/>!\n", 365 URL->scheme, URL->host, URL->port); 366 367 fprintf(stderr, "Login: "); 368 if (fgets(URL->user, sizeof URL->user, stdin) == NULL) 369 return (-1); 370 for (i = strlen(URL->user); i >= 0; --i) 371 if (URL->user[i] == '\r' || URL->user[i] == '\n') 372 URL->user[i] = '\0'; 373 374 fprintf(stderr, "Password: "); 375 if (tcgetattr(STDIN_FILENO, &tios) == 0) { 376 saved_flags = tios.c_lflag; 377 tios.c_lflag &= ~ECHO; 378 tios.c_lflag |= ECHONL|ICANON; 379 tcsetattr(STDIN_FILENO, TCSAFLUSH|TCSASOFT, &tios); 380 nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL); 381 tios.c_lflag = saved_flags; 382 tcsetattr(STDIN_FILENO, TCSANOW|TCSASOFT, &tios); 383 } else { 384 nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL); 385 } 386 if (nopwd) 387 return (-1); 388 for (i = strlen(URL->pwd); i >= 0; --i) 389 if (URL->pwd[i] == '\r' || URL->pwd[i] == '\n') 390 URL->pwd[i] = '\0'; 391 392 return (0); 393 } 394 395 /* 396 * Fetch a file 397 */ 398 static int 399 fetch(char *URL, const char *path) 400 { 401 struct url *url; 402 struct url_stat us; 403 struct stat sb, nsb; 404 struct xferstat xs; 405 FILE *f, *of; 406 size_t size, readcnt, wr; 407 off_t count; 408 char flags[8]; 409 const char *slash; 410 char *tmppath; 411 int r; 412 unsigned timeout; 413 char *ptr; 414 415 f = of = NULL; 416 tmppath = NULL; 417 418 timeout = 0; 419 *flags = 0; 420 count = 0; 421 422 /* set verbosity level */ 423 if (v_level > 1) 424 strcat(flags, "v"); 425 if (v_level > 2) 426 fetchDebug = 1; 427 428 /* parse URL */ 429 url = NULL; 430 if (*URL == '\0') { 431 warnx("empty URL"); 432 goto failure; 433 } 434 if ((url = fetchParseURL(URL)) == NULL) { 435 warnx("%s: parse error", URL); 436 goto failure; 437 } 438 439 /* if no scheme was specified, take a guess */ 440 if (!*url->scheme) { 441 if (!*url->host) 442 strcpy(url->scheme, SCHEME_FILE); 443 else if (strncasecmp(url->host, "ftp.", 4) == 0) 444 strcpy(url->scheme, SCHEME_FTP); 445 else if (strncasecmp(url->host, "www.", 4) == 0) 446 strcpy(url->scheme, SCHEME_HTTP); 447 } 448 449 /* common flags */ 450 switch (family) { 451 case PF_INET: 452 strcat(flags, "4"); 453 break; 454 case PF_INET6: 455 strcat(flags, "6"); 456 break; 457 } 458 459 /* FTP specific flags */ 460 if (strcmp(url->scheme, SCHEME_FTP) == 0) { 461 if (p_flag) 462 strcat(flags, "p"); 463 if (d_flag) 464 strcat(flags, "d"); 465 if (U_flag) 466 strcat(flags, "l"); 467 timeout = T_secs ? T_secs : ftp_timeout; 468 } 469 470 /* HTTP specific flags */ 471 if (strcmp(url->scheme, SCHEME_HTTP) == 0 || 472 strcmp(url->scheme, SCHEME_HTTPS) == 0) { 473 if (d_flag) 474 strcat(flags, "d"); 475 if (A_flag) 476 strcat(flags, "A"); 477 timeout = T_secs ? T_secs : http_timeout; 478 if (i_flag) { 479 if (stat(i_filename, &sb)) { 480 warn("%s: stat()", i_filename); 481 goto failure; 482 } 483 url->ims_time = sb.st_mtime; 484 strcat(flags, "i"); 485 } 486 } 487 488 /* set the protocol timeout. */ 489 fetchTimeout = timeout; 490 491 /* just print size */ 492 if (s_flag) { 493 if (timeout) 494 alarm(timeout); 495 r = fetchStat(url, &us, flags); 496 if (timeout) 497 alarm(0); 498 if (sigalrm || sigint) 499 goto signal; 500 if (r == -1) { 501 warnx("%s", fetchLastErrString); 502 goto failure; 503 } 504 if (us.size == -1) 505 printf("Unknown\n"); 506 else 507 printf("%jd\n", (intmax_t)us.size); 508 goto success; 509 } 510 511 /* 512 * If the -r flag was specified, we have to compare the local 513 * and remote files, so we should really do a fetchStat() 514 * first, but I know of at least one HTTP server that only 515 * sends the content size in response to GET requests, and 516 * leaves it out of replies to HEAD requests. Also, in the 517 * (frequent) case that the local and remote files match but 518 * the local file is truncated, we have sufficient information 519 * before the compare to issue a correct request. Therefore, 520 * we always issue a GET request as if we were sure the local 521 * file was a truncated copy of the remote file; we can drop 522 * the connection later if we change our minds. 523 */ 524 sb.st_size = -1; 525 if (!o_stdout) { 526 r = stat(path, &sb); 527 if (r == 0 && r_flag && S_ISREG(sb.st_mode)) { 528 url->offset = sb.st_size; 529 } else if (r == -1 || !S_ISREG(sb.st_mode)) { 530 /* 531 * Whatever value sb.st_size has now is either 532 * wrong (if stat(2) failed) or irrelevant (if the 533 * path does not refer to a regular file) 534 */ 535 sb.st_size = -1; 536 } 537 if (r == -1 && errno != ENOENT) { 538 warnx("%s: stat()", path); 539 goto failure; 540 } 541 } 542 543 /* start the transfer */ 544 if (timeout) 545 alarm(timeout); 546 f = fetchXGet(url, &us, flags); 547 if (timeout) 548 alarm(0); 549 if (sigalrm || sigint) 550 goto signal; 551 if (f == NULL) { 552 warnx("%s: %s", URL, fetchLastErrString); 553 if (i_flag && strcmp(url->scheme, SCHEME_HTTP) == 0 554 && fetchLastErrCode == FETCH_OK 555 && strcmp(fetchLastErrString, "Not Modified") == 0) { 556 /* HTTP Not Modified Response, return OK. */ 557 r = 0; 558 goto done; 559 } else 560 goto failure; 561 } 562 if (sigint) 563 goto signal; 564 565 /* check that size is as expected */ 566 if (S_size) { 567 if (us.size == -1) { 568 warnx("%s: size unknown", URL); 569 } else if (us.size != S_size) { 570 warnx("%s: size mismatch: expected %jd, actual %jd", 571 URL, (intmax_t)S_size, (intmax_t)us.size); 572 goto failure; 573 } 574 } 575 576 /* symlink instead of copy */ 577 if (l_flag && strcmp(url->scheme, "file") == 0 && !o_stdout) { 578 if (symlink(url->doc, path) == -1) { 579 warn("%s: symlink()", path); 580 goto failure; 581 } 582 goto success; 583 } 584 585 if (us.size == -1 && !o_stdout && v_level > 0) 586 warnx("%s: size of remote file is not known", URL); 587 if (v_level > 1) { 588 if (sb.st_size != -1) 589 fprintf(stderr, "local size / mtime: %jd / %ld\n", 590 (intmax_t)sb.st_size, (long)sb.st_mtime); 591 if (us.size != -1) 592 fprintf(stderr, "remote size / mtime: %jd / %ld\n", 593 (intmax_t)us.size, (long)us.mtime); 594 } 595 596 /* open output file */ 597 if (o_stdout) { 598 /* output to stdout */ 599 of = stdout; 600 } else if (r_flag && sb.st_size != -1) { 601 /* resume mode, local file exists */ 602 if (!F_flag && us.mtime && sb.st_mtime != us.mtime) { 603 /* no match! have to refetch */ 604 fclose(f); 605 /* if precious, warn the user and give up */ 606 if (R_flag) { 607 warnx("%s: local modification time " 608 "does not match remote", path); 609 goto failure_keep; 610 } 611 } else if (url->offset > sb.st_size) { 612 /* gap between what we asked for and what we got */ 613 warnx("%s: gap in resume mode", URL); 614 fclose(of); 615 of = NULL; 616 /* picked up again later */ 617 } else if (us.size != -1) { 618 if (us.size == sb.st_size) 619 /* nothing to do */ 620 goto success; 621 if (sb.st_size > us.size) { 622 /* local file too long! */ 623 warnx("%s: local file (%jd bytes) is longer " 624 "than remote file (%jd bytes)", path, 625 (intmax_t)sb.st_size, (intmax_t)us.size); 626 goto failure; 627 } 628 /* we got it, open local file */ 629 if ((of = fopen(path, "r+")) == NULL) { 630 warn("%s: fopen()", path); 631 goto failure; 632 } 633 /* check that it didn't move under our feet */ 634 if (fstat(fileno(of), &nsb) == -1) { 635 /* can't happen! */ 636 warn("%s: fstat()", path); 637 goto failure; 638 } 639 if (nsb.st_dev != sb.st_dev || 640 nsb.st_ino != sb.st_ino || 641 nsb.st_size != sb.st_size) { 642 warnx("%s: file has changed", URL); 643 fclose(of); 644 of = NULL; 645 sb = nsb; 646 /* picked up again later */ 647 } 648 } 649 /* seek to where we left off */ 650 if (of != NULL && fseeko(of, url->offset, SEEK_SET) != 0) { 651 warn("%s: fseeko()", path); 652 fclose(of); 653 of = NULL; 654 /* picked up again later */ 655 } 656 } else if (m_flag && sb.st_size != -1) { 657 /* mirror mode, local file exists */ 658 if (sb.st_size == us.size && sb.st_mtime == us.mtime) 659 goto success; 660 } 661 662 if (of == NULL) { 663 /* 664 * We don't yet have an output file; either this is a 665 * vanilla run with no special flags, or the local and 666 * remote files didn't match. 667 */ 668 669 if (url->offset > 0) { 670 /* 671 * We tried to restart a transfer, but for 672 * some reason gave up - so we have to restart 673 * from scratch if we want the whole file 674 */ 675 url->offset = 0; 676 if ((f = fetchXGet(url, &us, flags)) == NULL) { 677 warnx("%s: %s", URL, fetchLastErrString); 678 goto failure; 679 } 680 if (sigint) 681 goto signal; 682 } 683 684 /* construct a temp file name */ 685 if (sb.st_size != -1 && S_ISREG(sb.st_mode)) { 686 if ((slash = strrchr(path, '/')) == NULL) 687 slash = path; 688 else 689 ++slash; 690 asprintf(&tmppath, "%.*s.fetch.XXXXXX.%s", 691 (int)(slash - path), path, slash); 692 if (tmppath != NULL) { 693 if (mkstemps(tmppath, strlen(slash) + 1) == -1) { 694 warn("%s: mkstemps()", path); 695 goto failure; 696 } 697 of = fopen(tmppath, "w"); 698 chown(tmppath, sb.st_uid, sb.st_gid); 699 chmod(tmppath, sb.st_mode & ALLPERMS); 700 } 701 } 702 if (of == NULL) 703 of = fopen(path, "w"); 704 if (of == NULL) { 705 warn("%s: open()", path); 706 goto failure; 707 } 708 } 709 count = url->offset; 710 711 /* start the counter */ 712 stat_start(&xs, path, us.size, count); 713 714 sigalrm = siginfo = sigint = 0; 715 716 /* suck in the data */ 717 setvbuf(f, NULL, _IOFBF, B_size); 718 signal(SIGINFO, sig_handler); 719 while (!sigint) { 720 if (us.size != -1 && us.size - count < B_size && 721 us.size - count >= 0) 722 size = us.size - count; 723 else 724 size = B_size; 725 if (siginfo) { 726 stat_end(&xs); 727 siginfo = 0; 728 } 729 730 if (size == 0) 731 break; 732 733 if ((readcnt = fread(buf, 1, size, f)) < size) { 734 if (ferror(f) && errno == EINTR && !sigint) 735 clearerr(f); 736 else if (readcnt == 0) 737 break; 738 } 739 740 stat_update(&xs, count += readcnt); 741 for (ptr = buf; readcnt > 0; ptr += wr, readcnt -= wr) 742 if ((wr = fwrite(ptr, 1, readcnt, of)) < readcnt) { 743 if (ferror(of) && errno == EINTR && !sigint) 744 clearerr(of); 745 else 746 break; 747 } 748 if (readcnt != 0) 749 break; 750 } 751 if (!sigalrm) 752 sigalrm = ferror(f) && errno == ETIMEDOUT; 753 signal(SIGINFO, SIG_DFL); 754 755 stat_end(&xs); 756 757 /* 758 * If the transfer timed out or was interrupted, we still want to 759 * set the mtime in case the file is not removed (-r or -R) and 760 * the user later restarts the transfer. 761 */ 762 signal: 763 /* set mtime of local file */ 764 if (!n_flag && us.mtime && !o_stdout && of != NULL && 765 (stat(path, &sb) != -1) && sb.st_mode & S_IFREG) { 766 struct timeval tv[2]; 767 768 fflush(of); 769 tv[0].tv_sec = (long)(us.atime ? us.atime : us.mtime); 770 tv[1].tv_sec = (long)us.mtime; 771 tv[0].tv_usec = tv[1].tv_usec = 0; 772 if (utimes(tmppath ? tmppath : path, tv)) 773 warn("%s: utimes()", tmppath ? tmppath : path); 774 } 775 776 /* timed out or interrupted? */ 777 if (sigalrm) 778 warnx("transfer timed out"); 779 if (sigint) { 780 warnx("transfer interrupted"); 781 goto failure; 782 } 783 784 /* timeout / interrupt before connection completley established? */ 785 if (f == NULL) 786 goto failure; 787 788 if (!sigalrm) { 789 /* check the status of our files */ 790 if (ferror(f)) 791 warn("%s", URL); 792 if (ferror(of)) 793 warn("%s", path); 794 if (ferror(f) || ferror(of)) 795 goto failure; 796 } 797 798 /* did the transfer complete normally? */ 799 if (us.size != -1 && count < us.size) { 800 warnx("%s appears to be truncated: %jd/%jd bytes", 801 path, (intmax_t)count, (intmax_t)us.size); 802 goto failure_keep; 803 } 804 805 /* 806 * If the transfer timed out and we didn't know how much to 807 * expect, assume the worst (i.e. we didn't get all of it) 808 */ 809 if (sigalrm && us.size == -1) { 810 warnx("%s may be truncated", path); 811 goto failure_keep; 812 } 813 814 success: 815 r = 0; 816 if (tmppath != NULL && rename(tmppath, path) == -1) { 817 warn("%s: rename()", path); 818 goto failure_keep; 819 } 820 goto done; 821 failure: 822 if (of && of != stdout && !R_flag && !r_flag) 823 if (stat(path, &sb) != -1 && (sb.st_mode & S_IFREG)) 824 unlink(tmppath ? tmppath : path); 825 if (R_flag && tmppath != NULL && sb.st_size == -1) 826 rename(tmppath, path); /* ignore errors here */ 827 failure_keep: 828 r = -1; 829 goto done; 830 done: 831 if (f) 832 fclose(f); 833 if (of && of != stdout) 834 fclose(of); 835 if (url) 836 fetchFreeURL(url); 837 if (tmppath != NULL) 838 free(tmppath); 839 return (r); 840 } 841 842 static void 843 usage(void) 844 { 845 fprintf(stderr, "%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n", 846 "usage: fetch [-146AadFlMmnPpqRrsUv] [-B bytes] [--bind-address=host]", 847 " [--ca-cert=file] [--ca-path=dir] [--cert=file] [--crl=file]", 848 " [-i file] [--key=file] [-N file] [--no-passive] [--no-proxy=list]", 849 " [--no-sslv3] [--no-tlsv1] [--no-verify-hostname] [--no-verify-peer]", 850 " [-o file] [--referer=URL] [-S bytes] [-T seconds]", 851 " [--user-agent=agent-string] [-w seconds] URL ...", 852 " fetch [-146AadFlMmnPpqRrsUv] [-B bytes] [--bind-address=host]", 853 " [--ca-cert=file] [--ca-path=dir] [--cert=file] [--crl=file]", 854 " [-i file] [--key=file] [-N file] [--no-passive] [--no-proxy=list]", 855 " [--no-sslv3] [--no-tlsv1] [--no-verify-hostname] [--no-verify-peer]", 856 " [-o file] [--referer=URL] [-S bytes] [-T seconds]", 857 " [--user-agent=agent-string] [-w seconds] -h host -f file [-c dir]"); 858 } 859 860 861 /* 862 * Entry point 863 */ 864 int 865 main(int argc, char *argv[]) 866 { 867 struct stat sb; 868 struct sigaction sa; 869 const char *p, *s; 870 char *end, *q; 871 int c, e, r; 872 873 874 while ((c = getopt_long(argc, argv, 875 "146AaB:bc:dFf:Hh:i:lMmN:nPpo:qRrS:sT:tUvw:", 876 longopts, NULL)) != -1) 877 switch (c) { 878 case '1': 879 once_flag = 1; 880 break; 881 case '4': 882 family = PF_INET; 883 break; 884 case '6': 885 family = PF_INET6; 886 break; 887 case 'A': 888 A_flag = 1; 889 break; 890 case 'a': 891 a_flag = 1; 892 break; 893 case 'B': 894 B_size = (off_t)strtol(optarg, &end, 10); 895 if (*optarg == '\0' || *end != '\0') 896 errx(1, "invalid buffer size (%s)", optarg); 897 break; 898 case 'b': 899 warnx("warning: the -b option is deprecated"); 900 b_flag = 1; 901 break; 902 case 'c': 903 c_dirname = optarg; 904 break; 905 case 'd': 906 d_flag = 1; 907 break; 908 case 'F': 909 F_flag = 1; 910 break; 911 case 'f': 912 f_filename = optarg; 913 break; 914 case 'H': 915 warnx("the -H option is now implicit, " 916 "use -U to disable"); 917 break; 918 case 'h': 919 h_hostname = optarg; 920 break; 921 case 'i': 922 i_flag = 1; 923 i_filename = optarg; 924 break; 925 case 'l': 926 l_flag = 1; 927 break; 928 case 'o': 929 o_flag = 1; 930 o_filename = optarg; 931 break; 932 case 'M': 933 case 'm': 934 if (r_flag) 935 errx(1, "the -m and -r flags " 936 "are mutually exclusive"); 937 m_flag = 1; 938 break; 939 case 'N': 940 N_filename = optarg; 941 break; 942 case 'n': 943 n_flag = 1; 944 break; 945 case 'P': 946 case 'p': 947 p_flag = 1; 948 break; 949 case 'q': 950 v_level = 0; 951 break; 952 case 'R': 953 R_flag = 1; 954 break; 955 case 'r': 956 if (m_flag) 957 errx(1, "the -m and -r flags " 958 "are mutually exclusive"); 959 r_flag = 1; 960 break; 961 case 'S': 962 S_size = (off_t)strtol(optarg, &end, 10); 963 if (*optarg == '\0' || *end != '\0') 964 errx(1, "invalid size (%s)", optarg); 965 break; 966 case 's': 967 s_flag = 1; 968 break; 969 case 'T': 970 T_secs = strtol(optarg, &end, 10); 971 if (*optarg == '\0' || *end != '\0') 972 errx(1, "invalid timeout (%s)", optarg); 973 break; 974 case 't': 975 t_flag = 1; 976 warnx("warning: the -t option is deprecated"); 977 break; 978 case 'U': 979 U_flag = 1; 980 break; 981 case 'v': 982 v_level++; 983 break; 984 case 'w': 985 a_flag = 1; 986 w_secs = strtol(optarg, &end, 10); 987 if (*optarg == '\0' || *end != '\0') 988 errx(1, "invalid delay (%s)", optarg); 989 break; 990 case OPTION_BIND_ADDRESS: 991 setenv("FETCH_BIND_ADDRESS", optarg, 1); 992 break; 993 case OPTION_NO_FTP_PASSIVE_MODE: 994 setenv("FTP_PASSIVE_MODE", "no", 1); 995 break; 996 case OPTION_HTTP_REFERER: 997 setenv("HTTP_REFERER", optarg, 1); 998 break; 999 case OPTION_HTTP_USER_AGENT: 1000 setenv("HTTP_USER_AGENT", optarg, 1); 1001 break; 1002 case OPTION_NO_PROXY: 1003 setenv("NO_PROXY", optarg, 1); 1004 break; 1005 case OPTION_SSL_CA_CERT_FILE: 1006 setenv("SSL_CA_CERT_FILE", optarg, 1); 1007 break; 1008 case OPTION_SSL_CA_CERT_PATH: 1009 setenv("SSL_CA_CERT_PATH", optarg, 1); 1010 break; 1011 case OPTION_SSL_CLIENT_CERT_FILE: 1012 setenv("SSL_CLIENT_CERT_FILE", optarg, 1); 1013 break; 1014 case OPTION_SSL_CLIENT_KEY_FILE: 1015 setenv("SSL_CLIENT_KEY_FILE", optarg, 1); 1016 break; 1017 case OPTION_SSL_CRL_FILE: 1018 setenv("SSL_CLIENT_CRL_FILE", optarg, 1); 1019 break; 1020 case OPTION_SSL_NO_SSL3: 1021 setenv("SSL_NO_SSL3", "", 1); 1022 break; 1023 case OPTION_SSL_NO_TLS1: 1024 setenv("SSL_NO_TLS1", "", 1); 1025 break; 1026 case OPTION_SSL_NO_VERIFY_HOSTNAME: 1027 setenv("SSL_NO_VERIFY_HOSTNAME", "", 1); 1028 break; 1029 case OPTION_SSL_NO_VERIFY_PEER: 1030 setenv("SSL_NO_VERIFY_PEER", "", 1); 1031 break; 1032 default: 1033 usage(); 1034 exit(1); 1035 } 1036 1037 argc -= optind; 1038 argv += optind; 1039 1040 if (h_hostname || f_filename || c_dirname) { 1041 if (!h_hostname || !f_filename || argc) { 1042 usage(); 1043 exit(1); 1044 } 1045 /* XXX this is a hack. */ 1046 if (strcspn(h_hostname, "@:/") != strlen(h_hostname)) 1047 errx(1, "invalid hostname"); 1048 if (asprintf(argv, "ftp://%s/%s/%s", h_hostname, 1049 c_dirname ? c_dirname : "", f_filename) == -1) 1050 errx(1, "%s", strerror(ENOMEM)); 1051 argc++; 1052 } 1053 1054 if (!argc) { 1055 usage(); 1056 exit(1); 1057 } 1058 1059 /* allocate buffer */ 1060 if (B_size < MINBUFSIZE) 1061 B_size = MINBUFSIZE; 1062 if ((buf = malloc(B_size)) == NULL) 1063 errx(1, "%s", strerror(ENOMEM)); 1064 1065 /* timeouts */ 1066 if ((s = getenv("FTP_TIMEOUT")) != NULL) { 1067 ftp_timeout = strtol(s, &end, 10); 1068 if (*s == '\0' || *end != '\0' || ftp_timeout < 0) { 1069 warnx("FTP_TIMEOUT (%s) is not a positive integer", s); 1070 ftp_timeout = 0; 1071 } 1072 } 1073 if ((s = getenv("HTTP_TIMEOUT")) != NULL) { 1074 http_timeout = strtol(s, &end, 10); 1075 if (*s == '\0' || *end != '\0' || http_timeout < 0) { 1076 warnx("HTTP_TIMEOUT (%s) is not a positive integer", s); 1077 http_timeout = 0; 1078 } 1079 } 1080 1081 /* signal handling */ 1082 sa.sa_flags = 0; 1083 sa.sa_handler = sig_handler; 1084 sigemptyset(&sa.sa_mask); 1085 sigaction(SIGALRM, &sa, NULL); 1086 sa.sa_flags = SA_RESETHAND; 1087 sigaction(SIGINT, &sa, NULL); 1088 fetchRestartCalls = 0; 1089 1090 /* output file */ 1091 if (o_flag) { 1092 if (strcmp(o_filename, "-") == 0) { 1093 o_stdout = 1; 1094 } else if (stat(o_filename, &sb) == -1) { 1095 if (errno == ENOENT) { 1096 if (argc > 1) 1097 errx(1, "%s is not a directory", 1098 o_filename); 1099 } else { 1100 err(1, "%s", o_filename); 1101 } 1102 } else { 1103 if (sb.st_mode & S_IFDIR) 1104 o_directory = 1; 1105 } 1106 } 1107 1108 /* check if output is to a tty (for progress report) */ 1109 v_tty = isatty(STDERR_FILENO); 1110 if (v_tty) 1111 pgrp = getpgrp(); 1112 1113 r = 0; 1114 1115 /* authentication */ 1116 if (v_tty) 1117 fetchAuthMethod = query_auth; 1118 if (N_filename != NULL) 1119 if (setenv("NETRC", N_filename, 1) == -1) 1120 err(1, "setenv: cannot set NETRC=%s", N_filename); 1121 1122 while (argc) { 1123 if ((p = strrchr(*argv, '/')) == NULL) 1124 p = *argv; 1125 else 1126 p++; 1127 1128 if (!*p) 1129 p = "fetch.out"; 1130 1131 fetchLastErrCode = 0; 1132 1133 if (o_flag) { 1134 if (o_stdout) { 1135 e = fetch(*argv, "-"); 1136 } else if (o_directory) { 1137 asprintf(&q, "%s/%s", o_filename, p); 1138 e = fetch(*argv, q); 1139 free(q); 1140 } else { 1141 e = fetch(*argv, o_filename); 1142 } 1143 } else { 1144 e = fetch(*argv, p); 1145 } 1146 1147 if (sigint) 1148 kill(getpid(), SIGINT); 1149 1150 if (e == 0 && once_flag) 1151 exit(0); 1152 1153 if (e) { 1154 r = 1; 1155 if ((fetchLastErrCode 1156 && fetchLastErrCode != FETCH_UNAVAIL 1157 && fetchLastErrCode != FETCH_MOVED 1158 && fetchLastErrCode != FETCH_URL 1159 && fetchLastErrCode != FETCH_RESOLV 1160 && fetchLastErrCode != FETCH_UNKNOWN)) { 1161 if (w_secs && v_level) 1162 fprintf(stderr, "Waiting %ld seconds " 1163 "before retrying\n", w_secs); 1164 if (w_secs) 1165 sleep(w_secs); 1166 if (a_flag) 1167 continue; 1168 } 1169 } 1170 1171 argc--, argv++; 1172 } 1173 1174 exit(r); 1175 } 1176