2008-01-22 22:36:11 -05:00
|
|
|
/*
|
|
|
|
* download.c
|
|
|
|
*
|
2011-01-05 23:45:15 -05:00
|
|
|
* Copyright (c) 2006-2011 Pacman Development Team <pacman-dev@archlinux.org>
|
2009-07-01 03:08:33 -04:00
|
|
|
* Copyright (c) 2002-2006 by Judd Vinet <jvinet@zeroflux.org>
|
2008-01-22 22:36:11 -05:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
download: major refactor to address lingering issues
Sorry for this being such a huge patch, but I believe it is necessary for
quite a few reasons which I will attempt to explain herein. I've been
mulling this over for a while, but wasn't super happy with making the
download interface more complex. Instead, if we carefully order things in
the internal download code, we can actually make the interface simpler.
1. FS#15657 - This involves `name.db.tar.gz.part` files being left around the
filesystem, and then causing all sorts of issues when someone attempts to
rerun the operation they canceled. We need to ensure that if we resume a
download, we are resuming it on exactly the same file; if we cannot be
almost postive of that then we need to start over.
2. http://www.mail-archive.com/pacman-dev@archlinux.org/msg03536.html - Here
we have a lighttpd bug to ruin the day. If we send both a Range: header and
If-Modified-Since: header across the wire in a GET request, lighttpd doesn't
do what we want in several cases. If the file hadn't been modified, it
returns a '304 Not Modified' instead of a '206 Partial Content'. We need to
do a stat (e.g. HEAD in HTTP terms) operation here, and the proceed
accordingly based off the values we get back from it.
3. The mtime stuff was rather ugly, and relied on the called function to
write back to a passed in reference, which isn't the greatest. Instead, use
the power of the filesystem to contain this info. Every file downloaded
internally is now carefully timestamped with the remote file time. This
should allow the resume logic to work. In order to guarantee this, we need
to implement a signal handler that catches interrupts, notifies the running
code, and causes it to set the mtimes on the file. It then rethrows the
signal so the pacman signal handler (or any frontend) works as expected.
4. We did a lot of funky stuff in trying to track the DB last modified time.
It is a lot easier to just keep the downloaded DB file around and track the
time on that rather than in a funky dot file. It also kills a lot of code.
5. For GPG verification of the databases down the road, we are going to need
the DB file around for at least a short bit of time anyway, so this gets us
closer to that.
Signed-off-by: Dan McGee <dan@archlinux.org>
[Xav: fixed printf with off_t]
Signed-off-by: Xavier Chantry <shiningxc@gmail.com>
2009-11-12 00:39:26 -05:00
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2008-10-31 20:40:55 -04:00
|
|
|
#include <signal.h>
|
2008-04-19 13:36:18 -04:00
|
|
|
|
2010-12-15 19:57:31 -05:00
|
|
|
#ifdef HAVE_LIBCURL
|
|
|
|
#include <curl/curl.h>
|
|
|
|
#endif
|
|
|
|
|
2008-01-22 22:36:11 -05:00
|
|
|
/* libalpm */
|
|
|
|
#include "dload.h"
|
|
|
|
#include "alpm_list.h"
|
|
|
|
#include "alpm.h"
|
|
|
|
#include "log.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "handle.h"
|
|
|
|
|
2011-08-09 16:21:02 -04:00
|
|
|
#ifdef HAVE_LIBCURL
|
2011-08-24 20:48:03 -04:00
|
|
|
static off_t prevprogress; /* last download amount */
|
2011-08-09 16:21:02 -04:00
|
|
|
|
2011-04-21 16:39:31 -04:00
|
|
|
static const char *get_filename(const char *url)
|
2011-03-17 09:01:30 -04:00
|
|
|
{
|
2008-02-27 16:36:53 -05:00
|
|
|
char *filename = strrchr(url, '/');
|
|
|
|
if(filename != NULL) {
|
|
|
|
filename++;
|
|
|
|
}
|
2011-03-20 20:45:57 -04:00
|
|
|
return filename;
|
2008-02-27 16:36:53 -05:00
|
|
|
}
|
2008-01-22 23:00:12 -05:00
|
|
|
|
2011-03-25 08:37:02 -04:00
|
|
|
static char *get_fullpath(const char *path, const char *filename,
|
|
|
|
const char *suffix)
|
2011-02-10 11:19:41 -05:00
|
|
|
{
|
2011-03-25 08:37:02 -04:00
|
|
|
char *filepath;
|
|
|
|
/* len = localpath len + filename len + suffix len + null */
|
|
|
|
size_t len = strlen(path) + strlen(filename) + strlen(suffix) + 1;
|
2011-06-07 17:06:16 -04:00
|
|
|
CALLOC(filepath, len, sizeof(char), return NULL);
|
2011-03-25 08:37:02 -04:00
|
|
|
snprintf(filepath, len, "%s%s%s", path, filename, suffix);
|
2008-01-22 23:00:12 -05:00
|
|
|
|
2011-03-25 08:37:02 -04:00
|
|
|
return filepath;
|
2008-02-27 16:36:53 -05:00
|
|
|
}
|
|
|
|
|
2011-04-21 16:39:31 -04:00
|
|
|
static int dload_interrupted;
|
2011-04-29 07:10:09 -04:00
|
|
|
static void inthandler(int UNUSED signum)
|
2011-01-14 12:17:39 -05:00
|
|
|
{
|
|
|
|
dload_interrupted = 1;
|
|
|
|
}
|
download: major refactor to address lingering issues
Sorry for this being such a huge patch, but I believe it is necessary for
quite a few reasons which I will attempt to explain herein. I've been
mulling this over for a while, but wasn't super happy with making the
download interface more complex. Instead, if we carefully order things in
the internal download code, we can actually make the interface simpler.
1. FS#15657 - This involves `name.db.tar.gz.part` files being left around the
filesystem, and then causing all sorts of issues when someone attempts to
rerun the operation they canceled. We need to ensure that if we resume a
download, we are resuming it on exactly the same file; if we cannot be
almost postive of that then we need to start over.
2. http://www.mail-archive.com/pacman-dev@archlinux.org/msg03536.html - Here
we have a lighttpd bug to ruin the day. If we send both a Range: header and
If-Modified-Since: header across the wire in a GET request, lighttpd doesn't
do what we want in several cases. If the file hadn't been modified, it
returns a '304 Not Modified' instead of a '206 Partial Content'. We need to
do a stat (e.g. HEAD in HTTP terms) operation here, and the proceed
accordingly based off the values we get back from it.
3. The mtime stuff was rather ugly, and relied on the called function to
write back to a passed in reference, which isn't the greatest. Instead, use
the power of the filesystem to contain this info. Every file downloaded
internally is now carefully timestamped with the remote file time. This
should allow the resume logic to work. In order to guarantee this, we need
to implement a signal handler that catches interrupts, notifies the running
code, and causes it to set the mtimes on the file. It then rethrows the
signal so the pacman signal handler (or any frontend) works as expected.
4. We did a lot of funky stuff in trying to track the DB last modified time.
It is a lot easier to just keep the downloaded DB file around and track the
time on that rather than in a funky dot file. It also kills a lot of code.
5. For GPG verification of the databases down the road, we are going to need
the DB file around for at least a short bit of time anyway, so this gets us
closer to that.
Signed-off-by: Dan McGee <dan@archlinux.org>
[Xav: fixed printf with off_t]
Signed-off-by: Xavier Chantry <shiningxc@gmail.com>
2009-11-12 00:39:26 -05:00
|
|
|
|
2011-03-21 16:54:00 -04:00
|
|
|
static int curl_progress(void *file, double dltotal, double dlnow,
|
2011-04-29 07:10:09 -04:00
|
|
|
double UNUSED ultotal, double UNUSED ulnow)
|
2011-02-10 11:19:41 -05:00
|
|
|
{
|
2011-06-30 22:00:07 -04:00
|
|
|
struct dload_payload *payload = (struct dload_payload *)file;
|
2011-08-24 20:48:03 -04:00
|
|
|
off_t current_size, total_size;
|
2011-02-01 15:38:37 -05:00
|
|
|
|
2011-03-17 09:01:30 -04:00
|
|
|
/* SIGINT sent, abort by alerting curl */
|
|
|
|
if(dload_interrupted) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2011-08-24 20:58:14 -04:00
|
|
|
current_size = payload->initial_size + (off_t)dlnow;
|
|
|
|
|
|
|
|
/* is our filesize still under any set limit? */
|
|
|
|
if(payload->max_size && current_size > payload->max_size) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2011-03-17 09:01:30 -04:00
|
|
|
/* none of what follows matters if the front end has no callback */
|
2011-06-30 22:00:07 -04:00
|
|
|
if(payload->handle->dlcb == NULL) {
|
2011-03-17 09:01:30 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-08-24 20:48:03 -04:00
|
|
|
total_size = payload->initial_size + (off_t)dltotal;
|
2011-03-21 16:54:00 -04:00
|
|
|
|
2011-08-24 20:48:03 -04:00
|
|
|
if(DOUBLE_EQ(dltotal, 0.0) || prevprogress == total_size) {
|
2011-03-20 20:45:57 -04:00
|
|
|
return 0;
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
|
2011-03-17 09:01:30 -04:00
|
|
|
/* initialize the progress bar here to avoid displaying it when
|
|
|
|
* a repo is up to date and nothing gets downloaded */
|
2011-08-24 20:48:03 -04:00
|
|
|
if(prevprogress == 0) {
|
|
|
|
payload->handle->dlcb(payload->remote_name, 0, (off_t)dltotal);
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
|
2011-08-24 20:48:03 -04:00
|
|
|
payload->handle->dlcb(payload->remote_name, current_size, total_size);
|
2011-02-01 15:38:37 -05:00
|
|
|
|
2011-03-21 16:54:00 -04:00
|
|
|
prevprogress = current_size;
|
2011-03-17 09:01:30 -04:00
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return 0;
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
|
2011-02-10 11:19:41 -05:00
|
|
|
static int curl_gethost(const char *url, char *buffer)
|
|
|
|
{
|
2011-04-21 16:39:31 -04:00
|
|
|
size_t hostlen;
|
2011-02-01 15:38:37 -05:00
|
|
|
char *p;
|
|
|
|
|
|
|
|
if(strncmp(url, "file://", 7) == 0) {
|
|
|
|
strcpy(buffer, _("disk"));
|
|
|
|
} else {
|
|
|
|
p = strstr(url, "//");
|
|
|
|
if(!p) {
|
2011-03-20 20:45:57 -04:00
|
|
|
return 1;
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
p += 2; /* jump over the found // */
|
|
|
|
hostlen = strcspn(p, "/");
|
|
|
|
if(hostlen > 255) {
|
|
|
|
/* buffer overflow imminent */
|
2011-03-20 20:45:57 -04:00
|
|
|
return 1;
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
snprintf(buffer, hostlen + 1, "%s", p);
|
|
|
|
}
|
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return 0;
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
|
2011-06-27 11:10:08 -04:00
|
|
|
static int utimes_long(const char *path, long seconds)
|
2011-03-25 09:15:30 -04:00
|
|
|
{
|
2011-06-27 11:10:08 -04:00
|
|
|
if(seconds != -1) {
|
2011-03-25 09:15:30 -04:00
|
|
|
struct timeval tv[2];
|
|
|
|
memset(&tv, 0, sizeof(tv));
|
2011-06-27 11:10:08 -04:00
|
|
|
tv[0].tv_sec = tv[1].tv_sec = seconds;
|
2011-03-25 09:15:30 -04:00
|
|
|
return utimes(path, tv);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-06-11 12:50:15 -04:00
|
|
|
static size_t parse_headers(void *ptr, size_t size, size_t nmemb, void *user)
|
|
|
|
{
|
|
|
|
size_t realsize = size * nmemb;
|
|
|
|
const char *fptr, *endptr = NULL;
|
|
|
|
const char * const cd_header = "Content-Disposition:";
|
|
|
|
const char * const fn_key = "filename=";
|
2011-06-30 22:00:07 -04:00
|
|
|
struct dload_payload *payload = (struct dload_payload *)user;
|
2011-06-11 12:50:15 -04:00
|
|
|
|
|
|
|
if(_alpm_raw_ncmp(cd_header, ptr, strlen(cd_header)) == 0) {
|
|
|
|
if((fptr = strstr(ptr, fn_key))) {
|
|
|
|
fptr += strlen(fn_key);
|
|
|
|
|
|
|
|
/* find the end of the field, which is either a semi-colon, or the end of
|
|
|
|
* the data. As per curl_easy_setopt(3), we cannot count on headers being
|
|
|
|
* null terminated, so we look for the closing \r\n */
|
|
|
|
endptr = fptr + strcspn(fptr, ";\r\n") - 1;
|
|
|
|
|
|
|
|
/* remove quotes */
|
|
|
|
if(*fptr == '"' && *endptr == '"') {
|
|
|
|
fptr++;
|
|
|
|
endptr--;
|
|
|
|
}
|
|
|
|
|
2011-08-19 11:58:45 -04:00
|
|
|
STRNDUP(payload->content_disp_name, fptr, endptr - fptr + 1,
|
2011-06-30 22:00:07 -04:00
|
|
|
RET_ERR(payload->handle, ALPM_ERR_MEMORY, realsize));
|
2011-06-11 12:50:15 -04:00
|
|
|
}
|
|
|
|
}
|
2011-03-25 09:15:30 -04:00
|
|
|
|
2011-06-11 12:50:15 -04:00
|
|
|
return realsize;
|
|
|
|
}
|
|
|
|
|
2011-08-19 13:46:37 -04:00
|
|
|
static void curl_set_handle_opts(struct dload_payload *payload,
|
|
|
|
char *error_buffer)
|
|
|
|
{
|
|
|
|
alpm_handle_t *handle = payload->handle;
|
|
|
|
const char *useragent = getenv("HTTP_USER_AGENT");
|
|
|
|
struct stat st;
|
|
|
|
|
|
|
|
/* the curl_easy handle is initialized with the alpm handle, so we only need
|
|
|
|
* to reset the curl handle set parameters for each time it's used. */
|
|
|
|
curl_easy_reset(handle->curl);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_URL, payload->fileurl);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_FAILONERROR, 1L);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_ERRORBUFFER, error_buffer);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_CONNECTTIMEOUT, 10L);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_FILETIME, 1L);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_NOPROGRESS, 0L);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_FOLLOWLOCATION, 1L);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_PROGRESSFUNCTION, curl_progress);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_PROGRESSDATA, (void *)payload);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_LOW_SPEED_LIMIT, 1024L);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_LOW_SPEED_TIME, 10L);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_HEADERFUNCTION, parse_headers);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_WRITEHEADER, (void *)payload);
|
|
|
|
|
|
|
|
if(payload->max_size) {
|
2011-08-27 09:45:39 -04:00
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_MAXFILESIZE_LARGE,
|
|
|
|
(curl_off_t)payload->max_size);
|
2011-08-19 13:46:37 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if(useragent != NULL) {
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_USERAGENT, useragent);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!payload->allow_resume && !payload->force && payload->destfile_name &&
|
|
|
|
stat(payload->destfile_name, &st) == 0) {
|
|
|
|
/* start from scratch, but only download if our local is out of date. */
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_TIMECONDITION, CURL_TIMECOND_IFMODSINCE);
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_TIMEVALUE, (long)st.st_mtime);
|
|
|
|
} else if(stat(payload->tempfile_name, &st) == 0 && payload->allow_resume) {
|
|
|
|
/* a previous partial download exists, resume from end of file. */
|
|
|
|
payload->tempfile_openmode = "ab";
|
2011-08-27 09:45:39 -04:00
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_RESUME_FROM_LARGE,
|
|
|
|
(curl_off_t)st.st_size);
|
2011-08-19 13:46:37 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "tempfile found, attempting continuation\n");
|
2011-08-24 20:48:03 -04:00
|
|
|
payload->initial_size = st.st_size;
|
2011-08-19 13:46:37 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-22 10:27:13 -04:00
|
|
|
static void mask_signal(int signal, void (*handler)(int),
|
|
|
|
struct sigaction *origaction)
|
2011-08-19 13:51:47 -04:00
|
|
|
{
|
2011-08-22 10:27:13 -04:00
|
|
|
struct sigaction newaction;
|
2011-08-19 13:51:47 -04:00
|
|
|
|
|
|
|
newaction.sa_handler = handler;
|
|
|
|
sigemptyset(&newaction.sa_mask);
|
|
|
|
newaction.sa_flags = 0;
|
|
|
|
|
2011-08-22 10:27:13 -04:00
|
|
|
sigaction(signal, NULL, origaction);
|
2011-08-19 13:51:47 -04:00
|
|
|
sigaction(signal, &newaction, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unmask_signal(int signal, struct sigaction sa)
|
|
|
|
{
|
|
|
|
sigaction(signal, &sa, NULL);
|
|
|
|
}
|
|
|
|
|
2011-08-19 14:22:14 -04:00
|
|
|
static FILE *create_tempfile(struct dload_payload *payload, const char *localpath)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
FILE *fp;
|
|
|
|
char randpath[PATH_MAX];
|
|
|
|
alpm_handle_t *handle = payload->handle;
|
|
|
|
|
|
|
|
/* create a random filename, which is opened with O_EXCL */
|
|
|
|
snprintf(randpath, PATH_MAX, "%salpmtmp.XXXXXX", localpath);
|
|
|
|
if((fd = mkstemp(randpath)) == -1 ||
|
|
|
|
!(fp = fdopen(fd, payload->tempfile_openmode))) {
|
|
|
|
unlink(randpath);
|
|
|
|
close(fd);
|
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR,
|
|
|
|
_("failed to create temporary file for download\n"));
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
/* fp now points to our alpmtmp.XXXXXX */
|
|
|
|
STRDUP(payload->tempfile_name, randpath, RET_ERR(handle, ALPM_ERR_MEMORY, NULL));
|
|
|
|
payload->remote_name = strrchr(randpath, '/') + 1;
|
|
|
|
|
|
|
|
return fp;
|
|
|
|
}
|
|
|
|
|
2011-06-30 21:19:25 -04:00
|
|
|
static int curl_download_internal(struct dload_payload *payload,
|
|
|
|
const char *localpath, char **final_file)
|
2011-02-10 11:19:41 -05:00
|
|
|
{
|
2011-08-18 14:17:30 -04:00
|
|
|
int ret = -1;
|
2011-02-01 15:38:37 -05:00
|
|
|
FILE *localf = NULL;
|
2011-08-19 11:56:37 -04:00
|
|
|
char *effective_url;
|
2011-04-21 18:24:04 -04:00
|
|
|
/* RFC1123 states applications should support this length */
|
|
|
|
char hostname[256];
|
2011-08-19 13:46:37 -04:00
|
|
|
char error_buffer[CURL_ERROR_SIZE] = {0};
|
2011-02-01 15:38:37 -05:00
|
|
|
struct stat st;
|
2011-08-18 15:21:58 -04:00
|
|
|
long timecond, respcode = 0, remote_time = -1;
|
2011-02-01 15:38:37 -05:00
|
|
|
double remote_size, bytes_dl;
|
2011-08-19 13:51:47 -04:00
|
|
|
struct sigaction orig_sig_pipe, orig_sig_int;
|
2011-06-30 21:19:25 -04:00
|
|
|
/* shortcut to our handle within the payload */
|
|
|
|
alpm_handle_t *handle = payload->handle;
|
2011-08-16 20:10:22 -04:00
|
|
|
handle->pm_errno = 0;
|
2011-02-01 15:38:37 -05:00
|
|
|
|
2011-08-19 13:42:53 -04:00
|
|
|
payload->tempfile_openmode = "wb";
|
2011-08-19 11:43:27 -04:00
|
|
|
if(!payload->remote_name) {
|
|
|
|
payload->remote_name = get_filename(payload->fileurl);
|
2011-06-30 22:00:07 -04:00
|
|
|
}
|
2011-08-19 11:43:27 -04:00
|
|
|
if(!payload->remote_name || curl_gethost(payload->fileurl, hostname) != 0) {
|
2011-06-24 00:18:01 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("url '%s' is invalid\n"), payload->fileurl);
|
2011-07-01 12:01:39 -04:00
|
|
|
RET_ERR(handle, ALPM_ERR_SERVER_BAD_URL, -1);
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
|
2011-08-19 11:43:27 -04:00
|
|
|
if(strlen(payload->remote_name) > 0 && strcmp(payload->remote_name, ".sig") != 0) {
|
2011-08-19 11:56:37 -04:00
|
|
|
payload->destfile_name = get_fullpath(localpath, payload->remote_name, "");
|
|
|
|
payload->tempfile_name = get_fullpath(localpath, payload->remote_name, ".part");
|
|
|
|
if(!payload->destfile_name || !payload->tempfile_name) {
|
2011-06-11 12:50:15 -04:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
} else {
|
2011-08-19 14:22:14 -04:00
|
|
|
/* URL doesn't contain a filename, so make a tempfile. We can't support
|
|
|
|
* resuming this kind of download; partial transfers will be destroyed */
|
2011-08-18 14:17:30 -04:00
|
|
|
payload->unlink_on_fail = 1;
|
2011-06-11 12:50:15 -04:00
|
|
|
|
2011-08-19 14:22:14 -04:00
|
|
|
localf = create_tempfile(payload, localpath);
|
|
|
|
if(localf == NULL) {
|
2011-06-11 12:50:15 -04:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2011-03-25 08:37:02 -04:00
|
|
|
}
|
2011-02-01 15:38:37 -05:00
|
|
|
|
2011-08-19 13:46:37 -04:00
|
|
|
curl_set_handle_opts(payload, error_buffer);
|
2011-02-01 15:38:37 -05:00
|
|
|
|
|
|
|
if(localf == NULL) {
|
2011-08-19 13:42:53 -04:00
|
|
|
localf = fopen(payload->tempfile_name, payload->tempfile_openmode);
|
2011-06-11 12:50:15 -04:00
|
|
|
if(localf == NULL) {
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_WRITEDATA, localf);
|
|
|
|
|
|
|
|
/* ignore any SIGPIPE signals- these may occur if our FTP socket dies or
|
|
|
|
* something along those lines. Store the old signal handler first. */
|
2011-08-22 10:27:13 -04:00
|
|
|
mask_signal(SIGPIPE, SIG_IGN, &orig_sig_pipe);
|
|
|
|
mask_signal(SIGINT, &inthandler, &orig_sig_int);
|
2011-02-01 15:38:37 -05:00
|
|
|
|
2011-03-17 09:01:30 -04:00
|
|
|
/* Progress 0 - initialize */
|
|
|
|
prevprogress = 0;
|
2011-02-01 15:38:37 -05:00
|
|
|
|
|
|
|
/* perform transfer */
|
|
|
|
handle->curlerr = curl_easy_perform(handle->curl);
|
|
|
|
|
2011-08-11 08:19:39 -04:00
|
|
|
/* immediately unhook the progress callback */
|
|
|
|
curl_easy_setopt(handle->curl, CURLOPT_NOPROGRESS, 1L);
|
|
|
|
|
2011-04-21 18:24:04 -04:00
|
|
|
/* was it a success? */
|
2011-08-12 15:03:45 -04:00
|
|
|
switch(handle->curlerr) {
|
|
|
|
case CURLE_OK:
|
2011-08-18 15:21:58 -04:00
|
|
|
/* get http/ftp response code */
|
|
|
|
curl_easy_getinfo(handle->curl, CURLINFO_RESPONSE_CODE, &respcode);
|
|
|
|
if(respcode >=400) {
|
|
|
|
payload->unlink_on_fail = 1;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2011-08-12 15:03:45 -04:00
|
|
|
break;
|
|
|
|
case CURLE_ABORTED_BY_CALLBACK:
|
2011-08-24 20:58:14 -04:00
|
|
|
/* two cases here- interrupted by user, or we exceeded max file size. */
|
|
|
|
if(!dload_interrupted) {
|
|
|
|
handle->curlerr = CURLE_FILESIZE_EXCEEDED;
|
|
|
|
handle->pm_errno = ALPM_ERR_LIBCURL;
|
|
|
|
/* the hardcoded 'size exceeded' message is same as libcurl's normal */
|
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR,
|
|
|
|
_("failed retrieving file '%s' from %s : %s\n"),
|
|
|
|
payload->remote_name, hostname, "Maximum file size exceeded");
|
|
|
|
}
|
2011-08-12 15:03:45 -04:00
|
|
|
goto cleanup;
|
|
|
|
default:
|
2011-08-19 14:07:29 -04:00
|
|
|
/* delete zero length downloads */
|
2011-08-19 11:56:37 -04:00
|
|
|
if(stat(payload->tempfile_name, &st) == 0 && st.st_size == 0) {
|
2011-08-19 14:07:29 -04:00
|
|
|
payload->unlink_on_fail = 1;
|
|
|
|
}
|
2011-08-12 15:03:45 -04:00
|
|
|
if(!payload->errors_ok) {
|
|
|
|
handle->pm_errno = ALPM_ERR_LIBCURL;
|
2011-08-24 20:58:14 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR,
|
|
|
|
_("failed retrieving file '%s' from %s : %s\n"),
|
2011-08-19 11:43:27 -04:00
|
|
|
payload->remote_name, hostname, error_buffer);
|
2011-08-12 15:03:45 -04:00
|
|
|
} else {
|
2011-08-24 20:58:14 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG,
|
|
|
|
"failed retrieving file '%s' from %s : %s\n",
|
2011-08-19 11:43:27 -04:00
|
|
|
payload->remote_name, hostname, error_buffer);
|
2011-08-12 15:03:45 -04:00
|
|
|
}
|
|
|
|
goto cleanup;
|
2011-04-21 18:24:04 -04:00
|
|
|
}
|
|
|
|
|
2011-02-01 15:38:37 -05:00
|
|
|
/* retrieve info about the state of the transfer */
|
|
|
|
curl_easy_getinfo(handle->curl, CURLINFO_FILETIME, &remote_time);
|
|
|
|
curl_easy_getinfo(handle->curl, CURLINFO_CONTENT_LENGTH_DOWNLOAD, &remote_size);
|
|
|
|
curl_easy_getinfo(handle->curl, CURLINFO_SIZE_DOWNLOAD, &bytes_dl);
|
|
|
|
curl_easy_getinfo(handle->curl, CURLINFO_CONDITION_UNMET, &timecond);
|
2011-06-11 12:50:15 -04:00
|
|
|
curl_easy_getinfo(handle->curl, CURLINFO_EFFECTIVE_URL, &effective_url);
|
2011-02-01 15:38:37 -05:00
|
|
|
|
|
|
|
/* time condition was met and we didn't download anything. we need to
|
|
|
|
* clean up the 0 byte .part file that's left behind. */
|
2011-04-21 18:24:04 -04:00
|
|
|
if(timecond == 1 && DOUBLE_EQ(bytes_dl, 0)) {
|
2011-02-01 15:38:37 -05:00
|
|
|
ret = 1;
|
2011-08-19 11:56:37 -04:00
|
|
|
unlink(payload->tempfile_name);
|
2011-02-01 15:38:37 -05:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remote_size isn't necessarily the full size of the file, just what the
|
|
|
|
* server reported as remaining to download. compare it to what curl reported
|
|
|
|
* as actually being transferred during curl_easy_perform() */
|
2011-03-17 22:56:17 -04:00
|
|
|
if(!DOUBLE_EQ(remote_size, -1) && !DOUBLE_EQ(bytes_dl, -1) &&
|
|
|
|
!DOUBLE_EQ(bytes_dl, remote_size)) {
|
2011-07-01 12:01:39 -04:00
|
|
|
handle->pm_errno = ALPM_ERR_RETRIEVE;
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("%s appears to be truncated: %jd/%jd bytes\n"),
|
2011-08-19 11:43:27 -04:00
|
|
|
payload->remote_name, (intmax_t)bytes_dl, (intmax_t)remote_size);
|
2011-02-01 15:38:37 -05:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2011-08-19 11:58:45 -04:00
|
|
|
if(payload->content_disp_name) {
|
2011-06-11 12:50:15 -04:00
|
|
|
/* content-disposition header has a better name for our file */
|
2011-08-19 11:56:37 -04:00
|
|
|
free(payload->destfile_name);
|
2011-08-19 11:58:45 -04:00
|
|
|
payload->destfile_name = get_fullpath(localpath, payload->content_disp_name, "");
|
2011-06-11 12:50:15 -04:00
|
|
|
} else {
|
|
|
|
const char *effective_filename = strrchr(effective_url, '/');
|
2011-08-17 17:57:47 -04:00
|
|
|
if(effective_filename && strlen(effective_filename) > 2) {
|
2011-06-11 12:50:15 -04:00
|
|
|
effective_filename++;
|
|
|
|
|
|
|
|
/* if destfile was never set, we wrote to a tempfile. even if destfile is
|
|
|
|
* set, we may have followed some redirects and the effective url may
|
|
|
|
* have a better suggestion as to what to name our file. in either case,
|
|
|
|
* refactor destfile to this newly derived name. */
|
2011-08-19 11:56:37 -04:00
|
|
|
if(!payload->destfile_name || strcmp(effective_filename,
|
|
|
|
strrchr(payload->destfile_name, '/') + 1) != 0) {
|
|
|
|
free(payload->destfile_name);
|
|
|
|
payload->destfile_name = get_fullpath(localpath, effective_filename, "");
|
2011-06-11 12:50:15 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-02-01 15:38:37 -05:00
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
if(localf != NULL) {
|
|
|
|
fclose(localf);
|
2011-08-19 11:56:37 -04:00
|
|
|
utimes_long(payload->tempfile_name, remote_time);
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
|
2011-03-25 09:15:30 -04:00
|
|
|
if(ret == 0) {
|
2011-08-19 11:56:37 -04:00
|
|
|
const char *realname = payload->tempfile_name;
|
|
|
|
if(payload->destfile_name) {
|
|
|
|
realname = payload->destfile_name;
|
|
|
|
if(rename(payload->tempfile_name, payload->destfile_name)) {
|
2011-08-17 10:45:35 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not rename %s to %s (%s)\n"),
|
2011-08-19 11:56:37 -04:00
|
|
|
payload->tempfile_name, payload->destfile_name, strerror(errno));
|
2011-08-17 10:45:35 -04:00
|
|
|
ret = -1;
|
|
|
|
}
|
2011-08-19 14:25:09 -04:00
|
|
|
}
|
|
|
|
if(ret != -1 && final_file) {
|
|
|
|
STRDUP(*final_file, strrchr(realname, '/') + 1,
|
2011-08-18 03:42:20 -04:00
|
|
|
RET_ERR(handle, ALPM_ERR_MEMORY, -1));
|
2011-06-11 12:50:15 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-19 11:56:37 -04:00
|
|
|
if((ret == -1 || dload_interrupted) && payload->unlink_on_fail &&
|
|
|
|
payload->tempfile_name) {
|
|
|
|
unlink(payload->tempfile_name);
|
2011-03-25 09:15:30 -04:00
|
|
|
}
|
|
|
|
|
2011-02-01 15:38:37 -05:00
|
|
|
/* restore the old signal handlers */
|
2011-08-19 13:51:47 -04:00
|
|
|
unmask_signal(SIGINT, orig_sig_int);
|
|
|
|
unmask_signal(SIGPIPE, orig_sig_pipe);
|
2011-02-01 15:38:37 -05:00
|
|
|
/* if we were interrupted, trip the old handler */
|
|
|
|
if(dload_interrupted) {
|
|
|
|
raise(SIGINT);
|
|
|
|
}
|
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return ret;
|
2011-02-01 15:38:37 -05:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2011-06-19 00:24:05 -04:00
|
|
|
/** Download a file given by a URL to a local directory.
|
|
|
|
* Does not overwrite an existing file if the download fails.
|
2011-06-30 21:19:25 -04:00
|
|
|
* @param payload the payload context
|
2011-06-19 00:24:05 -04:00
|
|
|
* @param localpath the directory to save the file in
|
2011-06-11 12:50:15 -04:00
|
|
|
* @param final_file the real name of the downloaded file (may be NULL)
|
2011-06-19 00:24:05 -04:00
|
|
|
* @return 0 on success, -1 on error (pm_errno is set accordingly if errors_ok == 0)
|
|
|
|
*/
|
2011-06-30 21:19:25 -04:00
|
|
|
int _alpm_download(struct dload_payload *payload, const char *localpath,
|
|
|
|
char **final_file)
|
2011-02-10 11:19:41 -05:00
|
|
|
{
|
2011-06-30 21:19:25 -04:00
|
|
|
alpm_handle_t *handle = payload->handle;
|
|
|
|
|
2009-04-04 04:17:30 -04:00
|
|
|
if(handle->fetchcb == NULL) {
|
2011-02-08 21:05:53 -05:00
|
|
|
#ifdef HAVE_LIBCURL
|
2011-06-30 21:19:25 -04:00
|
|
|
return curl_download_internal(payload, localpath, final_file);
|
2008-04-06 22:00:11 -04:00
|
|
|
#else
|
2011-07-01 12:01:39 -04:00
|
|
|
RET_ERR(handle, ALPM_ERR_EXTERNAL_DOWNLOAD, -1);
|
2008-04-06 22:00:11 -04:00
|
|
|
#endif
|
2008-02-27 16:36:53 -05:00
|
|
|
} else {
|
2011-06-30 21:19:25 -04:00
|
|
|
int ret = handle->fetchcb(payload->fileurl, localpath, payload->force);
|
|
|
|
if(ret == -1 && !payload->errors_ok) {
|
2011-07-01 12:01:39 -04:00
|
|
|
RET_ERR(handle, ALPM_ERR_EXTERNAL_DOWNLOAD, -1);
|
2009-04-04 04:17:30 -04:00
|
|
|
}
|
2011-03-20 20:45:57 -04:00
|
|
|
return ret;
|
2008-02-27 16:36:53 -05:00
|
|
|
}
|
|
|
|
}
|
2008-01-22 23:00:12 -05:00
|
|
|
|
2011-03-06 13:07:25 -05:00
|
|
|
/** Fetch a remote pkg. */
|
2011-06-28 00:04:00 -04:00
|
|
|
char SYMEXPORT *alpm_fetch_pkgurl(alpm_handle_t *handle, const char *url)
|
2008-01-22 22:36:11 -05:00
|
|
|
{
|
2011-04-21 16:39:31 -04:00
|
|
|
char *filepath;
|
2011-06-11 12:50:15 -04:00
|
|
|
const char *cachedir;
|
|
|
|
char *final_file = NULL;
|
2011-06-24 00:18:01 -04:00
|
|
|
struct dload_payload *payload;
|
2008-02-27 16:36:53 -05:00
|
|
|
int ret;
|
2008-01-22 22:36:11 -05:00
|
|
|
|
2011-06-14 11:01:08 -04:00
|
|
|
CHECK_HANDLE(handle, return NULL);
|
2011-08-18 03:42:21 -04:00
|
|
|
ASSERT(url, RET_ERR(handle, ALPM_ERR_WRONG_ARGS, NULL));
|
2011-06-14 11:01:08 -04:00
|
|
|
|
2008-01-22 22:36:11 -05:00
|
|
|
/* find a valid cache dir to download to */
|
2011-06-07 14:15:43 -04:00
|
|
|
cachedir = _alpm_filecache_setup(handle);
|
2008-01-22 22:36:11 -05:00
|
|
|
|
2011-06-24 00:18:01 -04:00
|
|
|
CALLOC(payload, 1, sizeof(*payload), RET_ERR(handle, ALPM_ERR_MEMORY, NULL));
|
2011-06-30 21:19:25 -04:00
|
|
|
payload->handle = handle;
|
2011-08-18 03:42:20 -04:00
|
|
|
STRDUP(payload->fileurl, url, RET_ERR(handle, ALPM_ERR_MEMORY, NULL));
|
2011-06-30 21:19:25 -04:00
|
|
|
payload->allow_resume = 1;
|
2011-06-24 00:18:01 -04:00
|
|
|
|
2008-01-22 22:36:11 -05:00
|
|
|
/* download the file */
|
2011-06-30 21:19:25 -04:00
|
|
|
ret = _alpm_download(payload, cachedir, &final_file);
|
2008-02-27 16:36:53 -05:00
|
|
|
if(ret == -1) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_WARNING, _("failed to download %s\n"), url);
|
2011-03-20 20:45:57 -04:00
|
|
|
return NULL;
|
2008-01-22 22:36:11 -05:00
|
|
|
}
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "successfully downloaded %s\n", url);
|
2008-01-22 22:36:11 -05:00
|
|
|
|
2011-04-21 19:31:19 -04:00
|
|
|
/* attempt to download the signature */
|
2011-06-27 17:29:49 -04:00
|
|
|
if(ret == 0 && (handle->siglevel & ALPM_SIG_PACKAGE)) {
|
2011-06-11 12:50:15 -04:00
|
|
|
char *sig_final_file = NULL;
|
2011-04-21 19:31:19 -04:00
|
|
|
size_t len;
|
2011-06-24 00:18:01 -04:00
|
|
|
struct dload_payload *sig_payload;
|
2011-04-21 19:31:19 -04:00
|
|
|
|
2011-06-24 00:18:01 -04:00
|
|
|
CALLOC(sig_payload, 1, sizeof(*sig_payload), RET_ERR(handle, ALPM_ERR_MEMORY, NULL));
|
2011-04-21 19:31:19 -04:00
|
|
|
len = strlen(url) + 5;
|
2011-06-24 00:18:01 -04:00
|
|
|
CALLOC(sig_payload->fileurl, len, sizeof(char), RET_ERR(handle, ALPM_ERR_MEMORY, NULL));
|
|
|
|
snprintf(sig_payload->fileurl, len, "%s.sig", url);
|
2011-06-30 21:19:25 -04:00
|
|
|
sig_payload->handle = handle;
|
|
|
|
sig_payload->force = 1;
|
|
|
|
sig_payload->errors_ok = (handle->siglevel & ALPM_SIG_PACKAGE_OPTIONAL);
|
2011-04-21 19:31:19 -04:00
|
|
|
|
2011-06-30 21:19:25 -04:00
|
|
|
ret = _alpm_download(sig_payload, cachedir, &sig_final_file);
|
|
|
|
if(ret == -1 && !sig_payload->errors_ok) {
|
2011-06-24 00:18:01 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_WARNING, _("failed to download %s\n"), sig_payload->fileurl);
|
2011-04-21 19:31:19 -04:00
|
|
|
/* Warn now, but don't return NULL. We will fail later during package
|
|
|
|
* load time. */
|
|
|
|
} else if(ret == 0) {
|
2011-06-24 00:18:01 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "successfully downloaded %s\n", sig_payload->fileurl);
|
2011-04-21 19:31:19 -04:00
|
|
|
}
|
2011-06-11 12:50:15 -04:00
|
|
|
FREE(sig_final_file);
|
2011-06-24 00:18:01 -04:00
|
|
|
_alpm_dload_payload_free(sig_payload);
|
2011-04-21 19:31:19 -04:00
|
|
|
}
|
|
|
|
|
2008-01-22 22:36:11 -05:00
|
|
|
/* we should be able to find the file the second time around */
|
2011-06-11 12:50:15 -04:00
|
|
|
filepath = _alpm_filecache_find(handle, final_file);
|
|
|
|
FREE(final_file);
|
2011-06-24 00:18:01 -04:00
|
|
|
_alpm_dload_payload_free(payload);
|
2011-06-11 12:50:15 -04:00
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return filepath;
|
2008-01-22 22:36:11 -05:00
|
|
|
}
|
|
|
|
|
2011-06-24 00:18:01 -04:00
|
|
|
void _alpm_dload_payload_free(struct dload_payload *payload) {
|
2011-08-11 08:15:24 -04:00
|
|
|
ASSERT(payload, return);
|
2011-06-24 00:18:01 -04:00
|
|
|
|
2011-08-11 08:15:24 -04:00
|
|
|
FREE(payload->fileurl);
|
2011-08-19 11:58:45 -04:00
|
|
|
FREE(payload->content_disp_name);
|
2011-08-19 11:56:37 -04:00
|
|
|
FREE(payload->tempfile_name);
|
|
|
|
FREE(payload->destfile_name);
|
2011-08-11 08:15:24 -04:00
|
|
|
FREE(payload);
|
2011-08-19 11:56:37 -04:00
|
|
|
|
2011-06-24 00:18:01 -04:00
|
|
|
}
|
|
|
|
|
2008-01-22 22:36:11 -05:00
|
|
|
/* vim: set ts=2 sw=2 noet: */
|