/*
* ftp.c - ftp code
*
* Copyright (C) 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006
* Red Hat, Inc. All rights reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see .
*
* Author(s): Erik Troan
* Matt Wilson
* Jeremy Katz
* David Cantrell
*/
#define HAVE_ALLOCA_H 1
#define HAVE_NETINET_IN_SYSTM_H 1
#define HAVE_SYS_SOCKET_H 1
#if HAVE_ALLOCA_H
# include
#endif
#if HAVE_SYS_SOCKET_H
# include
#endif
#if HAVE_NETINET_IN_SYSTM_H
# include
# include
#endif
#if ! HAVE_HERRNO
extern int h_errno;
#endif
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#define TIMEOUT_SECS 60
#define BUFFER_SIZE 4096
#ifndef IPPORT_FTP
# define IPPORT_FTP 21
#endif
#include "ftp.h"
#include "log.h"
#include "net.h"
static int ftpCheckResponse(int sock, char ** str);
static int getHostAddress(const char * host, void * address, int family);
static int ftpCheckResponse(int sock, char ** str) {
static char buf[BUFFER_SIZE + 1];
int bufLength = 0;
fd_set emptySet, readSet;
char * chptr, * start;
struct timeval timeout;
int bytesRead, rc = 0;
int doesContinue = 1;
char errorCode[4];
errorCode[0] = '\0';
do {
FD_ZERO(&emptySet);
FD_ZERO(&readSet);
FD_SET(sock, &readSet);
timeout.tv_sec = TIMEOUT_SECS;
timeout.tv_usec = 0;
rc = select(sock + 1, &readSet, &emptySet, &emptySet, &timeout);
if (rc < 1) {
if (rc==0)
return FTPERR_BAD_SERVER_RESPONSE;
else
rc = FTPERR_UNKNOWN;
} else {
rc = 0;
}
bytesRead = read(sock, buf + bufLength, sizeof(buf) - bufLength - 1);
bufLength += bytesRead;
buf[bufLength] = '\0';
/* divide the response into lines, checking each one to see if
we are finished or need to continue */
start = chptr = buf;
do {
while (*chptr != '\n' && *chptr) chptr++;
if (*chptr == '\n') {
*chptr = '\0';
if (*(chptr - 1) == '\r') *(chptr - 1) = '\0';
if (str) *str = start;
if (errorCode[0]) {
if (!strncmp(start, errorCode, 3) && start[3] == ' ')
doesContinue = 0;
} else {
strncpy(errorCode, start, 3);
errorCode[3] = '\0';
if (start[3] != '-') {
doesContinue = 0;
}
}
start = chptr + 1;
chptr++;
} else {
chptr++;
}
} while (*chptr);
if (doesContinue && chptr > start) {
memcpy(buf, start, chptr - start - 1);
bufLength = chptr - start - 1;
} else {
bufLength = 0;
}
} while (doesContinue && !rc);
if (*errorCode == '4' || *errorCode == '5') {
if (!strncmp(errorCode, "421", 3)) {
return FTPERR_TOO_MANY_CONNECTIONS;
} else if (!strncmp(errorCode, "550", 3)) {
return FTPERR_FILE_NOT_FOUND;
}
return FTPERR_BAD_SERVER_RESPONSE;
}
if (rc) return rc;
return 0;
}
static int ftpCommand(int sock, char **response, char * command, ...) {
va_list ap;
int len;
char * s;
char * buf;
int rc;
va_start(ap, command);
len = strlen(command) + 2;
s = va_arg(ap, char *);
while (s) {
len += strlen(s) + 1;
s = va_arg(ap, char *);
}
va_end(ap);
buf = alloca(len + 1);
va_start(ap, command);
strcpy(buf, command);
strcat(buf, " ");
s = va_arg(ap, char *);
while (s) {
strcat(buf, s);
strcat(buf, " ");
s = va_arg(ap, char *);
}
va_end(ap);
buf[len - 2] = '\r';
buf[len - 1] = '\n';
buf[len] = '\0';
if (write(sock, buf, len) != len) {
return FTPERR_SERVER_IO_ERROR;
}
if ((rc = ftpCheckResponse(sock, response)))
return rc;
return 0;
}
static int getHostAddress(const char * host, void * address, int family) {
char *hostname, *port;
struct hostent *hostent;
splitHostname((char *) host, &hostname, &port);
if (family == AF_INET) {
if (isdigit(host[0])) {
if (inet_pton(AF_INET, hostname, (struct in_addr *)address) >= 1) {
return 0;
} else {
return FTPERR_BAD_HOST_ADDR;
}
} else {
if ((hostent = gethostbyname(hostname)) != NULL) {
memcpy((struct in_addr *) address, hostent->h_addr_list[0], hostent->h_length);
return 0;
} else {
errno = h_errno;
return FTPERR_BAD_HOSTNAME;
}
}
} else if (family == AF_INET6) {
if (strchr(hostname, ':')) {
if (inet_pton(AF_INET6, hostname, (struct in_addr6 *)address) >= 1) {
return 0;
} else
return FTPERR_BAD_HOST_ADDR;
} else {
if ((hostent = gethostbyname(hostname)) != NULL) {
memcpy((struct in_addr6 *) address, hostent->h_addr_list[0], hostent->h_length);
return 0;
} else {
errno = h_errno;
return FTPERR_BAD_HOSTNAME;
}
}
} else {
return FTPERR_UNSUPPORTED_FAMILY;
}
}
int ftpOpen(char *host, int family, char *name, char *password,
int port) {
static int sock;
struct in_addr addr;
struct in6_addr addr6;
struct sockaddr_in destPort;
struct sockaddr_in6 destPort6;
struct passwd * pw;
int rc = 0;
char *userReply;
if (port < 0) port = IPPORT_FTP;
if (!name)
name = "anonymous";
if (!password) {
password = "root@";
if (getuid()) {
pw = getpwuid(getuid());
if (pw) {
password = alloca(strlen(pw->pw_name) + 2);
strcpy(password, pw->pw_name);
strcat(password, "@");
}
}
}
if (family == AF_INET)
rc = getHostAddress(host, &addr, AF_INET);
else if (family == AF_INET6)
rc = getHostAddress(host, &addr6, AF_INET6);
if (rc)
return rc;
sock = socket(family, SOCK_STREAM, IPPROTO_IP);
if (sock < 0) {
return FTPERR_FAILED_CONNECT;
}
if (family == AF_INET) {
destPort.sin_family = family;
destPort.sin_port = htons(port);
destPort.sin_addr = addr;
if (connect(sock, (struct sockaddr *) &destPort, sizeof(destPort))) {
close(sock);
return FTPERR_FAILED_CONNECT;
}
} else if (family == AF_INET6) {
destPort6.sin6_family = family;
destPort6.sin6_port = htons(port);
destPort6.sin6_addr = addr6;
if (connect(sock, (struct sockaddr *) &destPort6, sizeof(destPort6))) {
close(sock);
return FTPERR_FAILED_CONNECT;
}
}
/* ftpCheckResponse() assumes the socket is nonblocking */
if (fcntl(sock, F_SETFL, O_NONBLOCK)) {
close(sock);
return FTPERR_FAILED_CONNECT;
}
if ((rc = ftpCheckResponse(sock, NULL))) {
return rc;
}
if ((rc = ftpCommand(sock, &userReply, "USER", name, NULL))) {
close(sock);
return rc;
}
/* FTP does not require that USER be followed by PASS. Anonymous logins
* in particular do not need any password.
*/
if (!strncmp(userReply, "230", 3)) {
if ((rc = ftpCommand(sock, NULL, "PASS", password, NULL))) {
close(sock);
return rc;
}
}
if ((rc = ftpCommand(sock, NULL, "TYPE", "I", NULL))) {
close(sock);
return rc;
}
return sock;
}
/*
* FTP specification:
* RFC 959 FILE TRANSFER PROTOCOL (FTP)
* RFC 2428 FTP Extensions for IPv6 and NATs
*/
int ftpGetFileDesc(int sock, struct in6_addr host, int family,
char * remotename, long long *size) {
int dataSocket;
struct sockaddr_in dataAddress;
struct sockaddr_in6 dataAddress6;
int i, j;
char * passReply;
char * chptr;
char * sizeCommand;
char * sizeReply;
char * retrCommand;
int rc;
if (family == AF_INET) {
if (write(sock, "PASV\r\n", 6) != 6) {
return FTPERR_SERVER_IO_ERROR;
}
} else if (family == AF_INET6) {
if (write(sock, "EPSV\r\n", 6) != 6) {
return FTPERR_SERVER_IO_ERROR;
}
}
if ((rc = ftpCheckResponse(sock, &passReply))) {
return FTPERR_PASSIVE_ERROR;
}
/* get IP address and port number from server response */
if (family == AF_INET) {
/* we have a PASV response of the form:
* 227 Entering Passive Mode (209,132,176,30,57,229)
* where 209.132.176.30 is the IP, and 57 & 229 are the ports
*/
chptr = passReply;
while (*chptr && *chptr != '(') chptr++;
if (*chptr != '(') {
return FTPERR_PASSIVE_ERROR;
}
chptr++;
passReply = chptr;
while (*chptr && *chptr != ')') chptr++;
if (*chptr != ')') {
return FTPERR_PASSIVE_ERROR;
}
*chptr-- = '\0';
while (*chptr && *chptr != ',') chptr--;
if (*chptr != ',') {
return FTPERR_PASSIVE_ERROR;
}
chptr--;
while (*chptr && *chptr != ',') chptr--;
if (*chptr != ',') {
return FTPERR_PASSIVE_ERROR;
}
*chptr++ = '\0';
/* now passReply points to the IP portion
* and chptr points to the port number portion
*/
if (sscanf(chptr, "%d,%d", &i, &j) != 2) {
return FTPERR_PASSIVE_ERROR;
}
} else if (family == AF_INET6) {
/* we have an EPSV response of the form:
* 229 Entering Extended Passive Mode (|||51626|)
* where 51626 is the port
*/
chptr = passReply;
while (*chptr && *chptr != '(') chptr++;
if (*chptr != '(') {
return FTPERR_PASSIVE_ERROR;
}
chptr++;
while (*chptr && *chptr == '|') chptr++;
passReply = chptr;
while (*chptr && *chptr != '|') chptr++;
*chptr = '\0';
chptr = passReply;
/* now chptr contains our port number */
if (sscanf(chptr, "%d", &i) != 1) {
return FTPERR_PASSIVE_ERROR;
}
}
/* build our sockaddr */
if (family == AF_INET) {
dataAddress.sin_family = family;
dataAddress.sin_port = htons((i << 8) + j);
/* passReply contains the IP address, but with commands insteaad of
* periods, so change those
*/
chptr = passReply;
while (*chptr++) {
if (*chptr == ',') *chptr = '.';
}
if (!inet_pton(family, passReply, &dataAddress.sin_addr)) {
return FTPERR_PASSIVE_ERROR;
}
} else if (family == AF_INET6) {
dataAddress6.sin6_family = family;
dataAddress6.sin6_port = htons(i);
/* we don't get this in an EPSV reply, but we got it as a param */
memset(&dataAddress6.sin6_addr, 0, sizeof(struct in6_addr));
memcpy(&dataAddress6.sin6_addr, &host, sizeof(host));
}
dataSocket = socket(family, SOCK_STREAM, IPPROTO_IP);
if (dataSocket < 0) {
return FTPERR_FAILED_CONNECT;
}
sizeCommand = alloca(strlen(remotename) + 20);
sprintf(sizeCommand, "SIZE %s\r\n", remotename);
i = strlen(sizeCommand);
if (write(sock, sizeCommand, i) != i) {
return FTPERR_SERVER_IO_ERROR;
}
if (ftpCheckResponse(sock, &sizeReply)) {
/* No worries, the SIZE command isn't in RFC 959 anyway. */
*size = 0;
} else {
/* We have a SIZE response of the form:
* 213 95600640
* where 95600640 is the size in bytes.
*/
/* Skip to first non-space character */
while (isspace(*sizeReply) && *sizeReply) sizeReply++;
/* Skip reply code */
while (!isspace(*sizeReply) && *sizeReply) sizeReply++;
/* Skip any remaining whitespace */
while (isspace(*sizeReply) && *sizeReply) sizeReply++;
/* sizeReply now points to the beginning of the size */
if (sscanf(sizeReply, "%lld", size) != 1) *size = 0;
if (*size < 0) *size = 0;
}
retrCommand = alloca(strlen(remotename) + 20);
sprintf(retrCommand, "RETR %s\r\n", remotename);
i = strlen(retrCommand);
if (write(sock, retrCommand, i) != i) {
return FTPERR_SERVER_IO_ERROR;
}
if (family == AF_INET) {
if (connect(dataSocket, (struct sockaddr *) &dataAddress,
sizeof(dataAddress))) {
close(dataSocket);
return FTPERR_FAILED_DATA_CONNECT;
}
} else if (family == AF_INET6) {
if (connect(dataSocket, (struct sockaddr *) &dataAddress6,
sizeof(dataAddress6))) {
close(dataSocket);
return FTPERR_FAILED_DATA_CONNECT;
}
}
if ((rc = ftpCheckResponse(sock, NULL))) {
close(dataSocket);
return rc;
}
return dataSocket;
}
int ftpGetFileDone(int sock) {
if (ftpCheckResponse(sock, NULL)) {
return FTPERR_BAD_SERVER_RESPONSE;
}
return 0;
}
const char *ftpStrerror(int errorNumber, urlprotocol protocol) {
switch (errorNumber) {
case FTPERR_PERMISSION_DENIED:
return(protocol == URL_METHOD_FTP ? "FTP permission denied" :
"HTTP permission denied");
case FTPERR_BAD_SERVER_RESPONSE:
return(protocol == URL_METHOD_FTP ? "Bad FTP server response" :
"Bad HTTP server response");
case FTPERR_SERVER_IO_ERROR:
return(protocol == URL_METHOD_FTP ? "FTP IO error" :
"HTTP IO error");
case FTPERR_SERVER_TIMEOUT:
return(protocol == URL_METHOD_FTP ? "FTP server timeout" :
"HTTP server timeout");
case FTPERR_BAD_HOST_ADDR:
return(protocol == URL_METHOD_FTP ?
"Unable to lookup FTP server host address" :
"Unable to lookup HTTP server host address");
case FTPERR_BAD_HOSTNAME:
return(protocol == URL_METHOD_FTP ?
"Unable to lookup FTP server host name" :
"Unable to lookup HTTP server host name");
case FTPERR_FAILED_CONNECT:
return(protocol == URL_METHOD_FTP ?
"Failed to connect to FTP server" :
"Failed to connect to HTTP server");
case FTPERR_FAILED_DATA_CONNECT:
return(protocol == URL_METHOD_FTP ?
"Failed to establish data connection to FTP server" :
"Failed to establish data connection to HTTP server");
case FTPERR_FILE_IO_ERROR:
return("IO error to local file");
case FTPERR_PASSIVE_ERROR:
return("Error setting remote server to passive mode");
case FTPERR_FILE_NOT_FOUND:
return("File not found on server");
case FTPERR_TOO_MANY_CONNECTIONS:
return(protocol == URL_METHOD_FTP ?
"Too many connections to FTP server" :
"Too many connections to HTTP server");
case FTPERR_UNSUPPORTED_FAMILY:
return(protocol == URL_METHOD_FTP ?
"Unsupported address family on FTP server" :
"Unsupported address family on HTTP server");
case FTPERR_UNKNOWN:
default:
return("Unknown or unexpected error");
}
}
static int read_headers (char **headers, fd_set *readSet, int sock)
{
char *nextChar;
struct timeval timeout;
int n = 4096;
int rc;
*headers = malloc(n);
nextChar = *headers;
*nextChar = '\0';
while (!strstr(*headers, "\r\n\r\n")) {
FD_ZERO(readSet);
FD_SET(sock, readSet);
timeout.tv_sec = TIMEOUT_SECS;
timeout.tv_usec = 0;
rc = select(sock + 1, readSet, NULL, NULL, &timeout);
if (rc == 0) {
close(sock);
free(*headers);
*headers = NULL;
return FTPERR_SERVER_TIMEOUT;
} else if (rc < 0) {
close(sock);
free(*headers);
*headers = NULL;
return FTPERR_SERVER_IO_ERROR;
}
if (read(sock, nextChar, 1) != 1) {
close(sock);
free(*headers);
*headers = NULL;
return FTPERR_SERVER_IO_ERROR;
}
nextChar++;
*nextChar = '\0';
if (nextChar - *headers == n) {
n += 4096;
*headers = realloc (*headers, sizeof(**headers)*n);
}
}
return 0;
}
static char *find_header (char *headers, char *to_find)
{
char *start, *end, *searching_for, *retval;
if (asprintf(&searching_for, "\r\n%s:", to_find) == -1)
return NULL;
if ((start = strcasestr(headers, searching_for)) == NULL) {
free(searching_for);
return NULL;
}
/* Trim off what we were searching for so we only return the value. */
start += strlen(searching_for);
free(searching_for);
while (isspace(*start) && *start) start++;
if (start == NULL)
return NULL;
/* Now find the end of the header. */
end = strstr (start, "\r\n");
if (end == NULL)
return NULL;
retval = strndup (start, end-start);
return retval;
}
static char *find_status_code (char *headers)
{
char *start, *end, *retval;
start = headers;
/* Skip ahead to the first whitespace in the header. */
while (!isspace(*start) && *start) start++;
if (start == NULL)
return NULL;
/* Now skip over the whitespace. What's next is the status code number,
* followed by a text description of the code.
*/
while (isspace(*start) && *start) start++;
if (start == NULL)
return NULL;
if ((end = strstr (start, "\r\n")) == NULL)
return NULL;
retval = strndup (start, end-start);
return retval;
}
/* extraHeaders is either NULL or a string with extra headers separated
* by '\r\n', ending with '\r\n'.
*/
int httpGetFileDesc(char * hostname, int port, char * remotename,
char *extraHeaders, long long *size) {
char * buf, *headers = NULL;
char *status;
char *hstr;
char *contlen;
int family;
struct in_addr addr;
struct in6_addr addr6;
int sock;
int rc;
struct sockaddr_in destPort;
struct sockaddr_in6 destPort6;
fd_set readSet;
if (port < 0)
port = 80;
family = AF_INET;
rc = getHostAddress(hostname, &addr, family);
if (rc) {
family = AF_INET6;
rc = getHostAddress(hostname, &addr6, family);
if (rc)
return rc;
}
sock = socket(family, SOCK_STREAM, IPPROTO_IP);
if (sock < 0) {
return FTPERR_FAILED_CONNECT;
}
if (family == AF_INET) {
destPort.sin_family = family;
destPort.sin_port = htons(port);
destPort.sin_addr = addr;
if (connect(sock, (struct sockaddr *) &destPort, sizeof(destPort))) {
close(sock);
return FTPERR_FAILED_CONNECT;
}
} else if (family == AF_INET6) {
destPort6.sin6_family = family;
destPort6.sin6_port = htons(port);
destPort6.sin6_addr = addr6;
if (connect(sock, (struct sockaddr *) &destPort6, sizeof(destPort6))) {
close(sock);
return FTPERR_FAILED_CONNECT;
}
}
if (extraHeaders)
hstr = extraHeaders;
else
hstr = "";
buf = alloca(strlen(remotename) + strlen(hostname) + strlen(hstr) + 25);
sprintf(buf, "GET %s HTTP/1.0\r\nHost: %s\r\n%s\r\n", remotename, hostname, hstr);
rc = write(sock, buf, strlen(buf));
rc = read_headers (&headers, &readSet, sock);
if (rc < 0)
return rc;
status = find_status_code (headers);
if (status == NULL) {
close(sock);
if (status) free(status);
if (headers) free(headers);
return FTPERR_SERVER_IO_ERROR;
} else if (!strncmp(status, "200", 3)) {
contlen = find_header(headers, "Content-Length");
if (contlen == NULL) {
*size = 0;
} else {
errno = 0;
*size = strtoll(contlen, NULL, 10);
if ((errno == ERANGE && (*size == LLONG_MIN || *size == LLONG_MAX)) ||
(errno != 0 && *size == 0)) {
logMessage(ERROR, "%s: %d: %m", __func__, __LINE__);
abort();
}
}
if (*size < 0) *size = 0;
if (status) free(status);
if (headers) free(headers);
return sock;
} else if (!strncmp(status, "301", 3) || !strncmp(status, "302", 3) ||
!strncmp(status, "303", 3) || !strncmp(status, "307", 3)) {
struct iurlinfo ui;
char *redir_loc = find_header (headers, "Location");
int retval;
if (status) free(status);
if (headers) free(headers);
if (redir_loc == NULL) {
logMessage(WARNING, "got a redirect response, but Location header is NULL");
close(sock);
return FTPERR_FILE_NOT_FOUND;
}
logMessage(INFO, "redirecting to %s", redir_loc);
convertURLToUI(redir_loc, &ui);
retval = httpGetFileDesc (ui.address, -1, ui.prefix, extraHeaders, size);
free(redir_loc);
return retval;
} else if (!strncmp(status, "403", 3)) {
if (status) free(status);
if (headers) free(headers);
close(sock);
return FTPERR_PERMISSION_DENIED;
} else if (!strncmp(status, "404", 3)) {
if (status) free(status);
if (headers) free(headers);
close(sock);
return FTPERR_FILE_NOT_FOUND;
} else {
if (status) free(status);
if (headers) free(headers);
close(sock);
logMessage(ERROR, "bad HTTP response code: %s", status);
return FTPERR_BAD_SERVER_RESPONSE;
}
}
/* vim:set shiftwidth=4 softtabstop=4: */