1
0
Fork 0
apt/methods/http.cc
Daniel Baumann 6810ba718b
Adding upstream version 3.0.2.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
2025-06-20 21:10:43 +02:00

1052 lines
30 KiB
C++

// -*- mode: cpp; mode: fold -*-
// Description /*{{{*/
/* ######################################################################
HTTP Acquire Method - This is the HTTP acquire method for APT.
It uses HTTP/1.1 and many of the fancy options there-in, such as
pipelining, range, if-range and so on.
It is based on a doubly buffered select loop. A groupe of requests are
fed into a single output buffer that is constantly fed out the
socket. This provides ideal pipelining as in many cases all of the
requests will fit into a single packet. The input socket is buffered
the same way and fed into the fd for the file (may be a pipe in future).
##################################################################### */
/*}}}*/
// Include Files /*{{{*/
#include <config.h>
#include <apt-pkg/configuration.h>
#include <apt-pkg/error.h>
#include <apt-pkg/fileutl.h>
#include <apt-pkg/hashes.h>
#include <apt-pkg/proxy.h>
#include <apt-pkg/strutl.h>
#include <cerrno>
#include <chrono>
#include <csignal>
#include <cstddef>
#include <cstdio>
#include <cstdlib>
#include <cstring>
#include <iostream>
#include <sstream>
#include <arpa/inet.h>
#include <sys/select.h>
#include <sys/stat.h>
#include <sys/time.h>
#include <unistd.h>
#include "config.h"
#include "connect.h"
#include "http.h"
#include <apti18n.h>
#ifdef HAVE_SYSTEMD
#include <systemd/sd-login.h>
#endif
/*}}}*/
using namespace std;
unsigned long long CircleBuf::BwReadLimit=0;
unsigned long long CircleBuf::BwTickReadData=0;
std::chrono::steady_clock::duration CircleBuf::BwReadTick{0};
const unsigned int CircleBuf::BW_HZ=10;
// CircleBuf::CircleBuf - Circular input buffer /*{{{*/
// ---------------------------------------------------------------------
/* */
CircleBuf::CircleBuf(HttpMethod const * const Owner, unsigned long long Size)
: Size(Size), Hash(NULL), TotalWriten(0)
{
Buf = new unsigned char[Size];
Reset();
CircleBuf::BwReadLimit = Owner->ConfigFindI("Dl-Limit", 0) * 1024;
}
/*}}}*/
// CircleBuf::Reset - Reset to the default state /*{{{*/
// ---------------------------------------------------------------------
/* */
void CircleBuf::Reset()
{
InP = 0;
OutP = 0;
StrPos = 0;
TotalWriten = 0;
MaxGet = (unsigned long long)-1;
OutQueue = string();
if (Hash != NULL)
{
delete Hash;
Hash = NULL;
}
}
/*}}}*/
// CircleBuf::Read - Read from a FD into the circular buffer /*{{{*/
// ---------------------------------------------------------------------
/* This fills up the buffer with as much data as is in the FD, assuming it
is non-blocking.. */
bool CircleBuf::Read(std::unique_ptr<MethodFd> const &Fd)
{
size_t ReadThisCycle = 0;
while (1)
{
// Woops, buffer is full
if (InP - OutP == Size)
return true;
// what's left to read in this tick
unsigned long long const BwReadMax = CircleBuf::BwReadLimit/BW_HZ;
if(CircleBuf::BwReadLimit) {
auto const now = std::chrono::steady_clock::now().time_since_epoch();
auto const d = now - CircleBuf::BwReadTick;
auto const tickLen = std::chrono::microseconds(std::chrono::seconds(1)) / BW_HZ;
if(d > tickLen) {
CircleBuf::BwReadTick = now;
CircleBuf::BwTickReadData = 0;
}
if(CircleBuf::BwTickReadData >= BwReadMax) {
usleep(tickLen.count());
return true;
}
}
// Write the buffer segment
ssize_t Res;
if(CircleBuf::BwReadLimit) {
Res = Fd->Read(Buf + (InP % Size),
BwReadMax > LeftRead() ? LeftRead() : BwReadMax);
} else
Res = Fd->Read(Buf + (InP % Size), LeftRead());
if(Res > 0 && BwReadLimit > 0)
CircleBuf::BwTickReadData += Res;
if (Res == 0)
return ReadThisCycle != 0;
if (Res < 0)
{
if (errno == EAGAIN)
return true;
return false;
}
InP += Res;
ReadThisCycle += Res;
}
}
/*}}}*/
// CircleBuf::Read - Put the string into the buffer /*{{{*/
// ---------------------------------------------------------------------
/* This will hold the string in and fill the buffer with it as it empties */
bool CircleBuf::Read(string const &Data)
{
OutQueue.append(Data);
FillOut();
return true;
}
/*}}}*/
// CircleBuf::FillOut - Fill the buffer from the output queue /*{{{*/
// ---------------------------------------------------------------------
/* */
void CircleBuf::FillOut()
{
if (OutQueue.empty() == true)
return;
while (1)
{
// Woops, buffer is full
if (InP - OutP == Size)
return;
// Write the buffer segment
unsigned long long Sz = LeftRead();
if (OutQueue.length() - StrPos < Sz)
Sz = OutQueue.length() - StrPos;
memcpy(Buf + (InP%Size),OutQueue.c_str() + StrPos,Sz);
// Advance
StrPos += Sz;
InP += Sz;
if (OutQueue.length() == StrPos)
{
StrPos = 0;
OutQueue = "";
return;
}
}
}
/*}}}*/
// CircleBuf::Write - Write from the buffer into a FD /*{{{*/
// ---------------------------------------------------------------------
/* This empties the buffer into the FD. */
bool CircleBuf::Write(std::unique_ptr<MethodFd> const &Fd)
{
while (1)
{
FillOut();
// Woops, buffer is empty
if (OutP == InP)
return true;
if (OutP == MaxGet)
return true;
// Write the buffer segment
ssize_t Res;
Res = Fd->Write(Buf + (OutP % Size), LeftWrite());
if (Res < 0)
{
if (errno == EAGAIN)
return true;
return false;
}
TotalWriten += Res;
if (Hash != NULL)
Hash->Add(Buf + (OutP%Size),Res);
OutP += Res;
}
}
/*}}}*/
// CircleBuf::WriteTillEl - Write from the buffer to a string /*{{{*/
// ---------------------------------------------------------------------
/* This copies till the first empty line */
bool CircleBuf::WriteTillEl(string &Data,bool Single)
{
// We cheat and assume it is unneeded to have more than one buffer load
for (unsigned long long I = OutP; I < InP; I++)
{
if (Buf[I%Size] != '\n')
continue;
++I;
if (Single == false)
{
if (I < InP && Buf[I%Size] == '\r')
++I;
if (I >= InP || Buf[I%Size] != '\n')
continue;
++I;
}
Data = "";
while (OutP < I)
{
unsigned long long Sz = LeftWrite();
if (Sz == 0)
return false;
if (I - OutP < Sz)
Sz = I - OutP;
Data += string((char *)(Buf + (OutP%Size)),Sz);
OutP += Sz;
}
return true;
}
return false;
}
/*}}}*/
// CircleBuf::Write - Write from the buffer to a string /*{{{*/
// ---------------------------------------------------------------------
/* This copies everything */
bool CircleBuf::Write(string &Data)
{
Data = std::string((char *)Buf + (OutP % Size), LeftWrite());
OutP += LeftWrite();
return true;
}
/*}}}*/
CircleBuf::~CircleBuf() /*{{{*/
{
delete [] Buf;
delete Hash;
}
/*}}}*/
// UnwrapHTTPConnect - Does the HTTP CONNECT handshake /*{{{*/
// ---------------------------------------------------------------------
/* Performs a TLS handshake on the socket */
struct HttpConnectFd final : public MethodFd
{
std::unique_ptr<MethodFd> UnderlyingFd;
std::string Buffer;
int Fd() override { return UnderlyingFd->Fd(); }
ssize_t Read(void *buf, size_t count) override
{
if (!Buffer.empty())
{
auto read = count < Buffer.size() ? count : Buffer.size();
memcpy(buf, Buffer.data(), read);
Buffer.erase(Buffer.begin(), Buffer.begin() + read);
return read;
}
return UnderlyingFd->Read(buf, count);
}
ssize_t Write(void *buf, size_t count) override
{
return UnderlyingFd->Write(buf, count);
}
int Close() override
{
return UnderlyingFd->Close();
}
bool HasPending() override
{
return !Buffer.empty();
}
};
static ResultState UnwrapHTTPConnect(std::string Host, int Port, URI Proxy, std::unique_ptr<MethodFd> &Fd,
unsigned long Timeout, aptAuthConfMethod *Owner)
{
Owner->Status(_("Connecting to %s (%s)"), "HTTP proxy", URI::SiteOnly(Proxy).c_str());
// The HTTP server expects a hostname with a trailing :port
std::stringstream Req;
std::string ProperHost;
if (Host.find(':') != std::string::npos)
ProperHost = '[' + Host + ']';
else
ProperHost = Host;
// Build the connect
Req << "CONNECT " << Host << ":" << std::to_string(Port) << " HTTP/1.1\r\n";
if (Proxy.Port != 0)
Req << "Host: " << ProperHost << ":" << std::to_string(Port) << "\r\n";
else
Req << "Host: " << ProperHost << "\r\n";
Owner->MaybeAddAuthTo(Proxy);
if (Proxy.User.empty() == false || Proxy.Password.empty() == false)
Req << "Proxy-Authorization: Basic "
<< Base64Encode(Proxy.User + ":" + Proxy.Password) << "\r\n";
Req << "User-Agent: " << Owner->ConfigFind("User-Agent", "Debian APT-HTTP/1.3 (" PACKAGE_VERSION ")") << "\r\n";
Req << "\r\n";
CircleBuf In(dynamic_cast<HttpMethod *>(Owner), 4096);
CircleBuf Out(dynamic_cast<HttpMethod *>(Owner), 4096);
std::string Headers;
if (Owner->DebugEnabled() == true)
cerr << Req.str() << endl;
Out.Read(Req.str());
// Writing from proxy
while (Out.WriteSpace())
{
if (WaitFd(Fd->Fd(), true, Timeout) == false)
{
_error->Errno("select", "Writing to proxy failed");
return ResultState::TRANSIENT_ERROR;
}
if (Out.Write(Fd) == false)
{
_error->Errno("write", "Writing to proxy failed");
return ResultState::TRANSIENT_ERROR;
}
}
while (In.ReadSpace())
{
if (WaitFd(Fd->Fd(), false, Timeout) == false)
{
_error->Errno("select", "Reading from proxy failed");
return ResultState::TRANSIENT_ERROR;
}
if (In.Read(Fd) == false)
{
_error->Errno("read", "Reading from proxy failed");
return ResultState::TRANSIENT_ERROR;
}
if (In.WriteTillEl(Headers))
break;
}
if (Owner->DebugEnabled() == true)
cerr << Headers << endl;
if (!(APT::String::Startswith(Headers, "HTTP/1.0 200") || APT::String::Startswith(Headers, "HTTP/1.1 200")))
{
_error->Error("Invalid response from proxy: %s", Headers.c_str());
return ResultState::TRANSIENT_ERROR;
}
if (In.WriteSpace())
{
// Maybe there is actual data already read, if so we need to buffer it
std::unique_ptr<HttpConnectFd> NewFd(new HttpConnectFd());
In.Write(NewFd->Buffer);
NewFd->UnderlyingFd = std::move(Fd);
Fd = std::move(NewFd);
}
return ResultState::SUCCESSFUL;
}
/*}}}*/
// HttpServerState::HttpServerState - Constructor /*{{{*/
HttpServerState::HttpServerState(URI Srv, HttpMethod *Owner) : ServerState(Srv, Owner), In(Owner, APT_BUFFER_SIZE), Out(Owner, 4 * 1024)
{
TimeOut = Owner->ConfigFindI("Timeout", TimeOut);
ServerFd = MethodFd::FromFd(-1);
Reset();
}
/*}}}*/
// HttpServerState::Open - Open a connection to the server /*{{{*/
// ---------------------------------------------------------------------
/* This opens a connection to the server. */
ResultState HttpServerState::Open()
{
// Use the already open connection if possible.
if (ServerFd->Fd() != -1)
return ResultState::SUCCESSFUL;
Close();
In.Reset();
Out.Reset();
Persistent = true;
bool tls = (ServerName.Access == "https" || APT::String::Endswith(ServerName.Access, "+https"));
// Determine the proxy setting
// Used to run AutoDetectProxy(ServerName) here, but we now send a Proxy
// header in the URI Acquire request and set "Acquire::"+uri.Access+"::proxy::"+uri.Host
// to it in BaseHttpMethod::Loop()
string SpecificProxy = Owner->ConfigFind("Proxy::" + ServerName.Host, "");
if (!SpecificProxy.empty())
{
if (SpecificProxy == "DIRECT")
Proxy = "";
else
Proxy = SpecificProxy;
}
else
{
string DefProxy = Owner->ConfigFind("Proxy", "");
if (!DefProxy.empty())
{
Proxy = DefProxy;
}
else
{
char *result = getenv("http_proxy");
Proxy = result ? result : "";
if (tls == true)
{
char *result = getenv("https_proxy");
if (result != nullptr)
{
Proxy = result;
}
}
}
}
// Parse no_proxy, a , separated list of domains
if (getenv("no_proxy") != 0)
{
if (CheckDomainList(ServerName.Host,getenv("no_proxy")) == true)
Proxy = "";
}
if (Proxy.empty() == false)
Owner->AddProxyAuth(Proxy, ServerName);
auto const DefaultService = tls ? "https" : "http";
auto const DefaultPort = tls ? 443 : 80;
if (Proxy.Access == "socks5h")
{
auto result = Connect(Proxy.Host, Proxy.Port, "socks", 1080, ServerFd, TimeOut, Owner);
if (result != ResultState::SUCCESSFUL)
return result;
result = UnwrapSocks(ServerName.Host, ServerName.Port == 0 ? DefaultPort : ServerName.Port,
Proxy, ServerFd, Owner->ConfigFindI("TimeOut", 30), Owner);
if (result != ResultState::SUCCESSFUL)
return result;
}
else
{
// Determine what host and port to use based on the proxy settings
int Port = 0;
string Host;
if (Proxy.empty() == true || Proxy.Host.empty() == true)
{
if (ServerName.Port != 0)
Port = ServerName.Port;
Host = ServerName.Host;
}
else if (Proxy.Access != "http" && Proxy.Access != "https")
{
_error->Error("Unsupported proxy configured: %s", URI::SiteOnly(Proxy).c_str());
return ResultState::FATAL_ERROR;
}
else
{
if (Proxy.Port != 0)
Port = Proxy.Port;
Host = Proxy.Host;
if (Proxy.Access == "https" && Port == 0)
Port = 443;
}
auto result = Connect(Host, Port, DefaultService, DefaultPort, ServerFd, TimeOut, Owner);
if (result != ResultState::SUCCESSFUL)
return result;
if (Host == Proxy.Host && Proxy.Access == "https")
{
aptConfigWrapperForMethods ProxyConf{std::vector<std::string>{"http", "https"}};
ProxyConf.setPostfixForMethodNames(Proxy.Host.c_str());
result = UnwrapTLS(Proxy.Host, ServerFd, TimeOut, Owner, &ProxyConf);
if (result != ResultState::SUCCESSFUL)
return result;
}
if (Host == Proxy.Host && tls)
{
result = UnwrapHTTPConnect(ServerName.Host, ServerName.Port == 0 ? DefaultPort : ServerName.Port, Proxy, ServerFd, Owner->ConfigFindI("TimeOut", 30), Owner);
if (result != ResultState::SUCCESSFUL)
return result;
}
}
if (tls)
return UnwrapTLS(ServerName.Host, ServerFd, TimeOut, Owner, Owner);
return ResultState::SUCCESSFUL;
}
/*}}}*/
// HttpServerState::Close - Close a connection to the server /*{{{*/
// ---------------------------------------------------------------------
/* */
bool HttpServerState::Close()
{
ServerFd->Close();
return true;
}
/*}}}*/
// HttpServerState::RunData - Transfer the data from the socket /*{{{*/
ResultState HttpServerState::RunData(RequestState &Req)
{
Req.State = RequestState::Data;
// Chunked transfer encoding is fun..
if (Req.Encoding == RequestState::Chunked)
{
while (1)
{
// Grab the block size
ResultState Last = ResultState::SUCCESSFUL;
string Data;
In.Limit(-1);
do
{
if (In.WriteTillEl(Data,true) == true)
break;
} while ((Last = Go(false, Req)) == ResultState::SUCCESSFUL);
if (Last != ResultState::SUCCESSFUL)
return Last;
// See if we are done
unsigned long long Len = strtoull(Data.c_str(),0,16);
if (Len == 0)
{
In.Limit(-1);
// We have to remove the entity trailer
Last = ResultState::SUCCESSFUL;
do
{
if (In.WriteTillEl(Data,true) == true && Data.length() <= 2)
break;
} while ((Last = Go(false, Req)) == ResultState::SUCCESSFUL);
return Last;
}
// Transfer the block
In.Limit(Len);
while (Go(true, Req) == ResultState::SUCCESSFUL)
if (In.IsLimit() == true)
break;
// Error
if (In.IsLimit() == false)
return ResultState::TRANSIENT_ERROR;
// The server sends an extra new line before the next block specifier..
In.Limit(-1);
Last = ResultState::SUCCESSFUL;
do
{
if (In.WriteTillEl(Data,true) == true)
break;
} while ((Last = Go(false, Req)) == ResultState::SUCCESSFUL);
if (Last != ResultState::SUCCESSFUL)
return Last;
}
}
else
{
/* Closes encoding is used when the server did not specify a size, the
loss of the connection means we are done */
if (Req.JunkSize != 0)
In.Limit(Req.JunkSize);
else if (Req.DownloadSize != 0)
{
if (Req.MaximumSize != 0 && Req.DownloadSize > Req.MaximumSize)
{
Owner->SetFailReason("MaximumSizeExceeded");
_error->Error(_("File has unexpected size (%llu != %llu). Mirror sync in progress?"),
Req.DownloadSize, Req.MaximumSize);
return ResultState::FATAL_ERROR;
}
In.Limit(Req.DownloadSize);
}
else if (Persistent == false)
In.Limit(-1);
// Just transfer the whole block.
while (true)
{
if (In.IsLimit() == false)
{
auto const result = Go(true, Req);
if (result == ResultState::SUCCESSFUL)
continue;
return result;
}
In.Limit(-1);
return _error->PendingError() ? ResultState::FATAL_ERROR : ResultState::SUCCESSFUL;
}
}
if (Flush(&Req.File) == false)
return ResultState::TRANSIENT_ERROR;
return ResultState::SUCCESSFUL;
}
/*}}}*/
ResultState HttpServerState::RunDataToDevNull(RequestState &Req) /*{{{*/
{
// no need to clean up if we discard the connection anyhow
if (Persistent == false)
return ResultState::SUCCESSFUL;
Req.File.Open("/dev/null", FileFd::WriteOnly);
return RunData(Req);
}
/*}}}*/
bool HttpServerState::ReadHeaderLines(std::string &Data) /*{{{*/
{
return In.WriteTillEl(Data);
}
/*}}}*/
ResultState HttpServerState::LoadNextResponse(bool const ToFile, RequestState &Req) /*{{{*/
{
return Go(ToFile, Req);
}
/*}}}*/
bool HttpServerState::WriteResponse(const std::string &Data) /*{{{*/
{
return Out.Read(Data);
}
/*}}}*/
APT_PURE bool HttpServerState::IsOpen() /*{{{*/
{
return (ServerFd->Fd() != -1);
}
/*}}}*/
bool HttpServerState::InitHashes(HashStringList const &ExpectedHashes) /*{{{*/
{
delete In.Hash;
In.Hash = new Hashes(ExpectedHashes);
return true;
}
/*}}}*/
void HttpServerState::Reset() /*{{{*/
{
ServerState::Reset();
ServerFd->Close();
}
/*}}}*/
APT_PURE Hashes * HttpServerState::GetHashes() /*{{{*/
{
return In.Hash;
}
/*}}}*/
// HttpServerState::Die - The server has closed the connection. /*{{{*/
ResultState HttpServerState::Die(RequestState &Req)
{
unsigned int LErrno = errno;
Close();
switch (Req.State)
{
case RequestState::Data:
// We have read all data we could, or the connection is not persistent
if (In.IsLimit() == true || Persistent == false)
return ResultState::SUCCESSFUL;
break;
case RequestState::Header:
In.Limit(-1);
// We have read some headers, but we might also have read the content
// and an EOF and hence reached this point. This is fine.
if (In.WriteSpace())
return ResultState::SUCCESSFUL;
break;
}
// We have reached an actual error, tell the user about it.
if (LErrno == 0)
{
_error->Error(_("Error reading from server. Remote end closed connection"));
return ResultState::TRANSIENT_ERROR;
}
errno = LErrno;
_error->Errno("read", _("Error reading from server"));
return ResultState::TRANSIENT_ERROR;
}
/*}}}*/
// HttpServerState::Flush - Dump the buffer into the file /*{{{*/
// ---------------------------------------------------------------------
/* This takes the current input buffer from the Server FD and writes it
into the file */
bool HttpServerState::Flush(FileFd *const File, bool MustComplete)
{
if (File != nullptr)
{
if (In.WriteSpace() == false)
return true;
while (In.WriteSpace() == true)
{
if (In.Write(MethodFd::FromFd(File->Fd())) == false)
return _error->Errno("write",_("Error writing to file"));
if (In.IsLimit() == true)
return true;
}
if (In.IsLimit() == true || Persistent == false || not MustComplete)
return true;
}
return false;
}
/*}}}*/
// HttpServerState::Go - Run a single loop /*{{{*/
// ---------------------------------------------------------------------
/* This runs the select loop over the server FDs, Output file FDs and
stdin. */
ResultState HttpServerState::Go(bool ToFile, RequestState &Req)
{
// Server has closed the connection
if (ServerFd->Fd() == -1 && (In.WriteSpace() == false ||
ToFile == false))
return ResultState::TRANSIENT_ERROR;
// Record if we have data pending to read in the server, so that we can
// skip the wait in select(). This can happen if data has already been
// read into a methodfd's buffer - the TCP queue might be empty at that
// point.
bool ServerPending = ServerFd->HasPending();
fd_set rfds,wfds;
FD_ZERO(&rfds);
FD_ZERO(&wfds);
/* Add the server. We only send more requests if the connection will
be persisting */
if (Out.WriteSpace() == true && ServerFd->Fd() != -1 && Persistent == true)
FD_SET(ServerFd->Fd(), &wfds);
if (In.ReadSpace() == true && ServerFd->Fd() != -1)
FD_SET(ServerFd->Fd(), &rfds);
// Add the file. Note that we need to add the file to the select and
// then write before we read from the server so we do not have content
// left to write if the server closes the connection when we read from it.
//
// An alternative would be to just flush the file in those circumstances
// and then return. Because otherwise we might end up blocking indefinitely
// in the select() call if we were to continue but all that was left to do
// was write to the local file.
if (In.WriteSpace() == true && ToFile == true && Req.File.IsOpen())
FD_SET(Req.File.Fd(), &wfds);
// Add stdin
if (Owner->ConfigFindB("DependOnSTDIN", true) == true)
FD_SET(STDIN_FILENO,&rfds);
// Figure out the max fd
int MaxFd = Req.File.Fd();
if (MaxFd < ServerFd->Fd())
MaxFd = ServerFd->Fd();
// Select
struct timeval tv;
tv.tv_sec = ServerPending ? 0 : TimeOut;
tv.tv_usec = 0;
int Res = 0;
if ((Res = select(MaxFd+1,&rfds,&wfds,0,&tv)) < 0)
{
if (errno == EINTR)
return ResultState::SUCCESSFUL;
_error->Errno("select", _("Select failed"));
return ResultState::TRANSIENT_ERROR;
}
if (Res == 0 && not ServerPending)
{
_error->Error(_("Connection timed out"));
return ResultState::TRANSIENT_ERROR;
}
// Flush any data before talking to the server, in case the server
// closed the connection, we want to be done writing.
if (Req.File.IsOpen() && FD_ISSET(Req.File.Fd(), &wfds))
{
if (not Flush(&Req.File, false))
return ResultState::TRANSIENT_ERROR;
}
// Handle server IO
if (ServerPending || (ServerFd->Fd() != -1 && FD_ISSET(ServerFd->Fd(), &rfds)))
{
errno = 0;
if (In.Read(ServerFd) == false)
return Die(Req);
}
// Send data to the file
if (In.WriteSpace() == true && ToFile == true && Req.File.IsOpen())
{
if (not Flush(&Req.File, false))
return ResultState::TRANSIENT_ERROR;
}
if (ServerFd->Fd() != -1 && FD_ISSET(ServerFd->Fd(), &wfds))
{
errno = 0;
if (Out.Write(ServerFd) == false)
return Die(Req);
}
if (Req.MaximumSize > 0 && Req.File.IsOpen() && Req.File.Failed() == false && Req.File.Tell() > Req.MaximumSize)
{
Owner->SetFailReason("MaximumSizeExceeded");
_error->Error(_("File has unexpected size (%llu != %llu). Mirror sync in progress?"),
Req.File.Tell(), Req.MaximumSize);
return ResultState::FATAL_ERROR;
}
// Handle commands from APT
if (FD_ISSET(STDIN_FILENO,&rfds))
{
if (Owner->Run(true) != -1)
exit(100);
}
return ResultState::SUCCESSFUL;
}
/*}}}*/
// HttpMethod::SendReq - Send the HTTP request /*{{{*/
// ---------------------------------------------------------------------
/* This places the http request in the outbound buffer */
void HttpMethod::SendReq(FetchItem *Itm)
{
URI Uri(Itm->Uri);
{
auto const plus = Binary.find('+');
if (plus != std::string::npos)
Uri.Access = Binary.substr(plus + 1);
}
// The HTTP server expects a hostname with a trailing :port
std::stringstream Req;
string ProperHost;
if (Uri.Host.find(':') != string::npos)
ProperHost = '[' + Uri.Host + ']';
else
ProperHost = Uri.Host;
/* RFC 2616 §5.1.2 requires absolute URIs for requests to proxies,
but while its a must for all servers to accept absolute URIs,
it is assumed clients will sent an absolute path for non-proxies */
std::string requesturi;
if ((Server->Proxy.Access != "http" && Server->Proxy.Access != "https") || APT::String::Endswith(Uri.Access, "https") || Server->Proxy.empty() == true || Server->Proxy.Host.empty())
requesturi = Uri.Path;
else
requesturi = Uri;
if (not _config->FindB("Acquire::Send-URI-Encoded", false))
requesturi = URIEncode(requesturi);
/* Build the request. No keep-alive is included as it is the default
in 1.1, can cause problems with proxies, and we are an HTTP/1.1
client anyway.
C.f. https://tools.ietf.org/wg/httpbis/trac/ticket/158 */
Req << "GET " << requesturi << " HTTP/1.1\r\n";
if (Uri.Port != 0)
Req << "Host: " << ProperHost << ":" << std::to_string(Uri.Port) << "\r\n";
else
Req << "Host: " << ProperHost << "\r\n";
// generate a cache control header (if needed)
if (ConfigFindB("No-Cache",false) == true)
Req << "Cache-Control: no-cache\r\n"
<< "Pragma: no-cache\r\n";
else if (Itm->IndexFile == true)
Req << "Cache-Control: max-age=" << std::to_string(ConfigFindI("Max-Age", 0)) << "\r\n";
else if (ConfigFindB("No-Store", false) == true)
Req << "Cache-Control: no-store\r\n";
// If we ask for uncompressed files servers might respond with content-
// negotiation which lets us end up with compressed files we do not support,
// see 657029, 657560 and co, so if we have no extension on the request
// ask for text only. As a sidenote: If there is nothing to negotate servers
// seem to be nice and ignore it.
if (ConfigFindB("SendAccept", true) == true)
{
size_t const filepos = Itm->Uri.find_last_of('/');
string const file = Itm->Uri.substr(filepos + 1);
if (flExtension(file) == file)
Req << "Accept: text/*\r\n";
}
// Check for a partial file and send if-queries accordingly
struct stat SBuf;
if (Server->RangesAllowed && stat(Itm->DestFile.c_str(),&SBuf) >= 0 && SBuf.st_size > 0)
Req << "Range: bytes=" << std::to_string(SBuf.st_size) << "-\r\n"
<< "If-Range: " << TimeRFC1123(SBuf.st_mtime, false) << "\r\n";
else if (Itm->LastModified != 0)
Req << "If-Modified-Since: " << TimeRFC1123(Itm->LastModified, false).c_str() << "\r\n";
if ((Server->Proxy.Access == "http" || Server->Proxy.Access == "https") &&
(Server->Proxy.User.empty() == false || Server->Proxy.Password.empty() == false))
Req << "Proxy-Authorization: Basic "
<< Base64Encode(Server->Proxy.User + ":" + Server->Proxy.Password) << "\r\n";
MaybeAddAuthTo(Uri);
if (Uri.User.empty() == false || Uri.Password.empty() == false)
Req << "Authorization: Basic "
<< Base64Encode(Uri.User + ":" + Uri.Password) << "\r\n";
Req << "User-Agent: " << ConfigFind("User-Agent",
"Debian APT-HTTP/1.3 (" PACKAGE_VERSION ")");
#ifdef HAVE_SYSTEMD
if (ConfigFindB("User-Agent-Non-Interactive", false))
{
using std::literals::operator""sv;
char *unit = nullptr;
sd_pid_get_unit(getpid(), &unit);
if (unit != nullptr && *unit != '\0' && not APT::String::Startswith(unit, "user@") // user@ _is_ interactive
&& "packagekit.service"sv != unit // packagekit likely is interactive
&& "dbus.service"sv != unit) // aptdaemon and qapt don't have systemd services
Req << " non-interactive";
free(unit);
}
#endif
Req << "\r\n";
// the famously typoed HTTP header field
auto const referrer = ConfigFind("Referer", "");
if (referrer.empty() == false)
Req << "Referer: " << referrer << "\r\n";
Req << "\r\n";
if (Debug == true)
cerr << Req.str() << endl;
Server->WriteResponse(Req.str());
}
/*}}}*/
std::unique_ptr<ServerState> HttpMethod::CreateServerState(URI const &uri)/*{{{*/
{
return std::unique_ptr<ServerState>(new HttpServerState(uri, this));
}
/*}}}*/
void HttpMethod::RotateDNS() /*{{{*/
{
::RotateDNS();
}
/*}}}*/
BaseHttpMethod::DealWithHeadersResult HttpMethod::DealWithHeaders(FetchResult &Res, RequestState &Req)/*{{{*/
{
auto ret = BaseHttpMethod::DealWithHeaders(Res, Req);
if (ret != BaseHttpMethod::FILE_IS_OPEN)
return ret;
if (Req.File.Open(Queue->DestFile, FileFd::WriteAny) == false)
return ERROR_NOT_FROM_SERVER;
FailFile = Queue->DestFile;
(void)(FailFile.c_str()); // Make sure we don't do a malloc in the signal handler
FailFd = Req.File.Fd();
FailTime = Req.Date;
if (Server->InitHashes(Queue->ExpectedHashes) == false || Req.AddPartialFileToHashes(Req.File) == false)
{
_error->Errno("read",_("Problem hashing file"));
return ERROR_NOT_FROM_SERVER;
}
if (Req.StartPos > 0)
Res.ResumePoint = Req.StartPos;
return FILE_IS_OPEN;
}
/*}}}*/
HttpMethod::HttpMethod(std::string &&pProg) : BaseHttpMethod(std::move(pProg), "1.2", Pipeline | SendConfig | SendURIEncoded) /*{{{*/
{
SeccompFlags = aptMethod::BASE | aptMethod::NETWORK | aptMethod::DIRECTORY;
auto addName = std::inserter(methodNames, methodNames.begin());
if (Binary != "http")
addName = "http";
auto const plus = Binary.find('+');
if (plus != std::string::npos)
{
auto name2 = Binary.substr(plus + 1);
if (std::find(methodNames.begin(), methodNames.end(), name2) == methodNames.end())
addName = std::move(name2);
addName = Binary.substr(0, plus);
}
}
/*}}}*/
int main(int, const char *argv[])
{
// ignore SIGPIPE, this can happen on write() if the socket
// closes the connection (this is dealt with via ServerDie())
signal(SIGPIPE, SIG_IGN);
std::string Binary{flNotDir(argv[0])};
if (Binary.find('+') == std::string::npos && Binary != "https" && Binary != "http")
Binary.append("+http");
return HttpMethod(std::move(Binary)).Loop();
}