socsvn commit: r253769 - soc2013/ambarisha/head/usr.bin/dmget

ambarisha at FreeBSD.org ambarisha at FreeBSD.org
Mon Jul 1 06:58:02 UTC 2013


Author: ambarisha
Date: Mon Jul  1 06:58:02 2013
New Revision: 253769
URL: http://svnweb.FreeBSD.org/socsvn/?view=rev&rev=253769

Log:
  Prototype commit of dmGet, a replacement for fetch.

Added:
  soc2013/ambarisha/head/usr.bin/dmget/
  soc2013/ambarisha/head/usr.bin/dmget/Makefile
  soc2013/ambarisha/head/usr.bin/dmget/dmget.c
  soc2013/ambarisha/head/usr.bin/dmget/dmget.h
  soc2013/ambarisha/head/usr.bin/dmget/fetch.c

Added: soc2013/ambarisha/head/usr.bin/dmget/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ soc2013/ambarisha/head/usr.bin/dmget/Makefile	Mon Jul  1 06:58:02 2013	(r253769)
@@ -0,0 +1,16 @@
+# $FreeBSD$
+
+.include <bsd.own.mk>
+
+SRCS=		fetch.c dmget.c
+PROG=		dmget
+CSTD?=		c99
+.if ${MK_OPENSSL} != "no"
+DPADD=		${LIBFETCH} ${LIBSSL} ${LIBCRYPTO}
+LDADD=		-lfetch -lssl -lcrypto
+.else
+DPADD=		${LIBFETCH} ${LIBMD}
+LDADD=		-lfetch -lmd
+.endif
+
+.include <bsd.prog.mk>

Added: soc2013/ambarisha/head/usr.bin/dmget/dmget.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ soc2013/ambarisha/head/usr.bin/dmget/dmget.c	Mon Jul  1 06:58:02 2013	(r253769)
@@ -0,0 +1,196 @@
+
+#include <sys/socket.h>
+#include <sys/time.h>
+#include <sys/un.h>
+
+#include <unistd.h>
+#include <errno.h>
+#include <stdlib.h>
+#include <string.h>
+
+
+#include "dmget.h"
+auth_t		 dmAuthMethod;
+int		 dmTimeout;
+int		 dmRestartCalls;
+int		 dmDebug;
+int		 dmLastErrCode;
+char		 dmLastErrString[MAXERRSTRING];
+
+static void *
+safe_malloc(size_t size)
+{
+	void *ptr = malloc(size);
+	if (ptr == NULL) {
+		/* Notifiy ENOMEM and exit gracefully */
+	}
+	return ptr;
+}
+
+static char
+mk_dmflags(void)
+{
+	char flags = 0;
+	if (dmRestartCalls != 0)
+		flags |= DM_RESTART_CALLS;
+	if (dmDebug != 0)
+		flags |= DM_DEBUG;
+
+	return flags;
+}
+
+static int
+mk_reqbuf(struct url *u, char **reqbuf, char op)
+{
+	int bufsize = 0;
+
+	bufsize += sizeof(bufsize); 		// Buffer size
+	bufsize += 1; 				// Opcode
+	bufsize += sizeof(struct url) - 4; 	// Struct url - doc pointer
+	bufsize += strlen(u->doc) + 1;		// Url document name
+	bufsize += sizeof(dmTimeout); 		// Timeout
+
+	*reqbuf = (char *) safe_malloc(bufsize);
+
+	int i = 0;
+
+	memcpy(*reqbuf, &(bufsize), sizeof(bufsize));
+	i += sizeof(bufsize);
+
+	reqbuf[i++] = op;
+
+	memcpy(*reqbuf + i, u->scheme, sizeof(u->scheme));
+	i += sizeof(u->scheme);
+
+	memcpy(*reqbuf + i, u->user, sizeof(u->user));
+	i += sizeof(u->user);
+
+	memcpy(*reqbuf + i, u->pwd, sizeof(u->pwd));
+	i += sizeof(u->pwd);
+
+	memcpy(*reqbuf + i, u->host, sizeof(u->host));
+	i += sizeof(u->host);
+
+	memcpy(*reqbuf + i, &(u->offset), sizeof(u->offset));
+	i += sizeof(u->offset);
+
+	memcpy(*reqbuf + i, &(u->length), sizeof(u->length));
+	i += sizeof(u->length);
+
+	memcpy(*reqbuf + i, &(u->ims_time), sizeof(u->ims_time));
+	i += sizeof(u->ims_time);
+
+	memcpy(*reqbuf + i, &dmTimeout, sizeof(dmTimeout));
+	i += sizeof(dmTimeout);
+
+	char dmFlags = mk_dmflags();
+	memcpy(*reqbuf + i, &dmFlags, sizeof(dmFlags));
+	i += sizeof(dmFlags);
+
+	strcpy(*reqbuf + i, u->doc);
+	//Assert i == bufsize - strlen(doc) - 1
+	
+	return bufsize;
+}
+
+static int
+send_request(int sock, struct url *u)
+{
+	char *reqbuf;
+	int bufsize = mk_reqbuf(u, &reqbuf, 0);
+	int err = write(sock, reqbuf, bufsize);
+	if (err == -1) {
+		perror("send_request write():");
+	}
+
+	free(reqbuf);
+	return (err);
+}
+
+static int
+parse_rcvbuf(char *rcvbuf, int bufsize, struct dmres *dmres)
+{
+	return 0;
+}
+
+static int
+recv_response(int sock, struct dmres *dmres)
+{
+	int bufsize;
+	int kbytes = read(sock, &bufsize, sizeof(bufsize));
+	if (kbytes == -1) {
+		perror("recv_response read():");
+	}
+
+	char *rcvbuf = (char *) safe_malloc(bufsize);
+	
+	kbytes = read(sock, &rcvbuf, bufsize);
+
+	return (parse_rcvbuf(rcvbuf, bufsize, dmres));
+}
+
+FILE *
+dmXGet(struct url *u, struct url_stat *us, const char *flags)
+{
+	int udsock = socket(AF_UNIX, SOCK_STREAM, 0);
+	struct sockaddr_un dms_addr;
+	dms_addr.sun_family = AF_UNIX;
+	strncpy(dms_addr.sun_path, DMS_UDS_PATH, sizeof(dms_addr.sun_path));
+
+	int err = connect(udsock, (struct sockaddr *) &dms_addr, sizeof(dms_addr));
+	if (err == -1) {
+		if (err == ENOENT) {
+			/* The DMS server process doesn't exist so start one */
+		} else {
+			perror("dmXGet connect():");
+			/* There was some error trying to connect to dms */
+		}
+	}
+
+	err = send_request(udsock, u);
+	if (err == -1) {
+		perror("send_request :");
+	}
+
+	struct dmres dmres;
+	for (;;) {
+		err = recv_response(udsock, &dmres);
+
+		if (err == -1){
+			perror("dmXGet read():");
+			dmLastErrCode = errno;
+			strcpy(dmLastErrString, strerror(errno));
+			return (NULL);
+		}
+
+		if (dmres.op == DM_COMPLETE) {
+			FILE *savedf = fopen(dmres.fname, "r");
+			if (savedf == NULL) {
+				dmLastErrCode = errno;
+				strcpy(dmLastErrString, strerror(errno));
+			}
+			return (savedf);
+		} else if (dmres.op == DM_AUTH_REQ) {
+			err = dmAuthMethod(u);
+			if (err == -1) {
+				/* do what libfetch does when auth fails */
+			}
+			send_request(udsock, u);
+			continue;
+		} else {
+			/* Received error code in response */
+		}
+	}
+
+	return (NULL);
+}
+
+int
+dmStat(struct url *u, struct url_stat *us, const char *flags)
+{
+	us->size = -1;
+	us->mtime = 0; // Epoch
+	us->atime = us->mtime;
+
+	return (-1);
+}

Added: soc2013/ambarisha/head/usr.bin/dmget/dmget.h
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ soc2013/ambarisha/head/usr.bin/dmget/dmget.h	Mon Jul  1 06:58:02 2013	(r253769)
@@ -0,0 +1,42 @@
+#ifndef _DMCLIENT_H
+#define _DMCLIENT_H
+
+#include <sys/param.h>
+#include <sys/time.h>
+
+#include <stdio.h>
+#include <fetch.h>
+
+/* TODO : Fix the path, make sure the perms on it are good */
+#define DMS_UDS_PATH	"/tmp/dms.uds"
+
+#define DM_COMPLETE		1
+#define DM_AUTH_REQ		2
+
+
+struct dmres {
+	int		op;
+	char		fname[];
+};
+
+#define DM_RESTART_CALLS	1
+#define DM_DEBUG		2
+
+/* Authentication */
+extern auth_t		 dmAuthMethod;
+
+/* Last error code */
+extern int		 dmLastErrCode;
+#define MAXERRSTRING 256
+extern char		 dmLastErrString[MAXERRSTRING];
+
+/* I/O timeout */
+extern int		 dmTimeout;
+
+/* Restart interrupted syscalls */
+extern int		 dmRestartCalls;
+
+/* Extra verbosity */
+extern int		 dmDebug;
+
+#endif /* _DMCLIENT_H */

Added: soc2013/ambarisha/head/usr.bin/dmget/fetch.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ soc2013/ambarisha/head/usr.bin/dmget/fetch.c	Mon Jul  1 06:58:02 2013	(r253769)
@@ -0,0 +1,1052 @@
+/*-
+ * Copyright (c) 2000-2011 Dag-Erling Smørgrav
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer
+ *    in this position and unchanged.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. The name of the author may not be used to endorse or promote products
+ *    derived from this software without specific prior written permission
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <sys/cdefs.h>
+__FBSDID("$FreeBSD$");
+
+#include <sys/param.h>
+#include <sys/socket.h>
+#include <sys/stat.h>
+#include <sys/time.h>
+
+#include <ctype.h>
+#include <err.h>
+#include <errno.h>
+#include <signal.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <termios.h>
+#include <unistd.h>
+
+#include <fetch.h>
+
+#include "dmget.h"
+
+#define MINBUFSIZE	4096
+#define TIMEOUT		120
+
+/* Option flags */
+static int	 A_flag;	/*    -A: do not follow 302 redirects */
+static int	 a_flag;	/*    -a: auto retry */
+static off_t	 B_size;	/*    -B: buffer size */
+static int	 b_flag;	/*!   -b: workaround TCP bug */
+static char    *c_dirname;	/*    -c: remote directory */
+static int	 d_flag;	/*    -d: direct connection */
+static int	 F_flag;	/*    -F: restart without checking mtime  */
+static char	*f_filename;	/*    -f: file to fetch */
+static char	*h_hostname;	/*    -h: host to fetch from */
+static int	 i_flag;	/*    -i: specify file for mtime comparison */
+static char	*i_filename;	/*        name of input file */
+static int	 l_flag;	/*    -l: link rather than copy file: URLs */
+static int	 m_flag;	/* -[Mm]: mirror mode */
+static char	*N_filename;	/*    -N: netrc file name */
+static int	 n_flag;	/*    -n: do not preserve modification time */
+static int	 o_flag;	/*    -o: specify output file */
+static int	 o_directory;	/*        output file is a directory */
+static char	*o_filename;	/*        name of output file */
+static int	 o_stdout;	/*        output file is stdout */
+static int	 once_flag;	/*    -1: stop at first successful file */
+static int	 p_flag;	/* -[Pp]: use passive FTP */
+static int	 R_flag;	/*    -R: don't delete partial files */
+static int	 r_flag;	/*    -r: restart previous transfer */
+static off_t	 S_size;        /*    -S: require size to match */
+static int	 s_flag;        /*    -s: show size, don't fetch */
+static long	 T_secs;	/*    -T: transfer timeout in seconds */
+static int	 t_flag;	/*!   -t: workaround TCP bug */
+static int	 U_flag;	/*    -U: do not use high ports */
+static int	 v_level = 1;	/*    -v: verbosity level */
+static int	 v_tty;		/*        stdout is a tty */
+static pid_t	 pgrp;		/*        our process group */
+static long	 w_secs;	/*    -w: retry delay */
+static int	 family = PF_UNSPEC;	/* -[46]: address family to use */
+
+static int	 sigalrm;	/* SIGALRM received */
+static int	 siginfo;	/* SIGINFO received */
+static int	 sigint;	/* SIGINT received */
+
+static long	 ftp_timeout = TIMEOUT;	/* default timeout for FTP transfers */
+static long	 http_timeout = TIMEOUT;/* default timeout for HTTP transfers */
+static char	*buf;		/* transfer buffer */
+
+
+/*
+ * Signal handler
+ */
+static void
+sig_handler(int sig)
+{
+	switch (sig) {
+	case SIGALRM:
+		sigalrm = 1;
+		break;
+	case SIGINFO:
+		siginfo = 1;
+		break;
+	case SIGINT:
+		sigint = 1;
+		break;
+	}
+}
+
+struct xferstat {
+	char		 name[64];
+	struct timeval	 start;		/* start of transfer */
+	struct timeval	 last;		/* time of last update */
+	struct timeval	 last2;		/* time of previous last update */
+	off_t		 size;		/* size of file per HTTP hdr */
+	off_t		 offset;	/* starting offset in file */
+	off_t		 rcvd;		/* bytes already received */
+	off_t		 lastrcvd;	/* bytes received since last update */
+};
+
+/*
+ * Compute and display ETA
+ */
+static const char *
+stat_eta(struct xferstat *xs)
+{
+	static char str[16];
+	long elapsed, eta;
+	off_t received, expected;
+
+	elapsed = xs->last.tv_sec - xs->start.tv_sec;
+	received = xs->rcvd - xs->offset;
+	expected = xs->size - xs->rcvd;
+	eta = (long)((double)elapsed * expected / received);
+	if (eta > 3600)
+		snprintf(str, sizeof str, "%02ldh%02ldm",
+		    eta / 3600, (eta % 3600) / 60);
+	else if (eta > 0)
+		snprintf(str, sizeof str, "%02ldm%02lds",
+		    eta / 60, eta % 60);
+	else
+		snprintf(str, sizeof str, "%02ldm%02lds",
+		    elapsed / 60, elapsed % 60);
+	return (str);
+}
+
+/*
+ * Format a number as "xxxx YB" where Y is ' ', 'k', 'M'...
+ */
+static const char *prefixes = " kMGTP";
+static const char *
+stat_bytes(off_t bytes)
+{
+	static char str[16];
+	const char *prefix = prefixes;
+
+	while (bytes > 9999 && prefix[1] != '\0') {
+		bytes /= 1024;
+		prefix++;
+	}
+	snprintf(str, sizeof str, "%4jd %cB", (intmax_t)bytes, *prefix);
+	return (str);
+}
+
+/*
+ * Compute and display transfer rate
+ */
+static const char *
+stat_bps(struct xferstat *xs)
+{
+	static char str[16];
+	double delta, bps;
+
+	delta = (xs->last.tv_sec + (xs->last.tv_usec / 1.e6))
+	    - (xs->last2.tv_sec + (xs->last2.tv_usec / 1.e6));
+
+	if (delta == 0.0) {
+		snprintf(str, sizeof str, "?? Bps");
+	} else {
+		bps = (xs->rcvd - xs->lastrcvd) / delta;
+		snprintf(str, sizeof str, "%sps", stat_bytes((off_t)bps));
+	}
+	return (str);
+}
+
+/*
+ * Update the stats display
+ */
+static void
+stat_display(struct xferstat *xs, int force)
+{
+	struct timeval now;
+	int ctty_pgrp;
+
+	/* check if we're the foreground process */
+	if (ioctl(STDERR_FILENO, TIOCGPGRP, &ctty_pgrp) == -1 ||
+	    (pid_t)ctty_pgrp != pgrp)
+		return;
+
+	gettimeofday(&now, NULL);
+	if (!force && now.tv_sec <= xs->last.tv_sec)
+		return;
+	xs->last2 = xs->last;
+	xs->last = now;
+
+	fprintf(stderr, "\r%-46.46s", xs->name);
+	if (xs->size <= 0) {
+		setproctitle("%s [%s]", xs->name, stat_bytes(xs->rcvd));
+		fprintf(stderr, "        %s", stat_bytes(xs->rcvd));
+	} else {
+		setproctitle("%s [%d%% of %s]", xs->name,
+		    (int)((100.0 * xs->rcvd) / xs->size),
+		    stat_bytes(xs->size));
+		fprintf(stderr, "%3d%% of %s",
+		    (int)((100.0 * xs->rcvd) / xs->size),
+		    stat_bytes(xs->size));
+	}
+	if (force == 2) {
+		xs->lastrcvd = xs->offset;
+		xs->last2 = xs->start;
+	}
+	fprintf(stderr, " %s", stat_bps(xs));
+	if ((xs->size > 0 && xs->rcvd > 0 &&
+	     xs->last.tv_sec >= xs->start.tv_sec + 3) ||
+	    force == 2)
+		fprintf(stderr, " %s", stat_eta(xs));
+	xs->lastrcvd = xs->rcvd;
+}
+
+/*
+ * Initialize the transfer statistics
+ */
+static void
+stat_start(struct xferstat *xs, const char *name, off_t size, off_t offset)
+{
+	snprintf(xs->name, sizeof xs->name, "%s", name);
+	gettimeofday(&xs->start, NULL);
+	xs->last.tv_sec = xs->last.tv_usec = 0;
+	xs->size = size;
+	xs->offset = offset;
+	xs->rcvd = offset;
+	xs->lastrcvd = offset;
+	if (v_tty && v_level > 0)
+		stat_display(xs, 1);
+	else if (v_level > 0)
+		fprintf(stderr, "%-46s", xs->name);
+}
+
+/*
+ * Update the transfer statistics
+ */
+static void
+stat_update(struct xferstat *xs, off_t rcvd)
+{
+	xs->rcvd = rcvd;
+	if (v_tty && v_level > 0)
+		stat_display(xs, 0);
+}
+
+/*
+ * Finalize the transfer statistics
+ */
+static void
+stat_end(struct xferstat *xs)
+{
+	gettimeofday(&xs->last, NULL);
+	if (v_tty && v_level > 0) {
+		stat_display(xs, 2);
+		putc('\n', stderr);
+	} else if (v_level > 0) {
+		fprintf(stderr, "        %s %s\n",
+		    stat_bytes(xs->size), stat_bps(xs));
+	}
+}
+
+/*
+ * Ask the user for authentication details
+ */
+static int
+query_auth(struct url *URL)
+{
+	struct termios tios;
+	tcflag_t saved_flags;
+	int i, nopwd;
+
+	fprintf(stderr, "Authentication required for <%s://%s:%d/>!\n",
+	    URL->scheme, URL->host, URL->port);
+
+	fprintf(stderr, "Login: ");
+	if (fgets(URL->user, sizeof URL->user, stdin) == NULL)
+		return (-1);
+	for (i = strlen(URL->user); i >= 0; --i)
+		if (URL->user[i] == '\r' || URL->user[i] == '\n')
+			URL->user[i] = '\0';
+
+	fprintf(stderr, "Password: ");
+	if (tcgetattr(STDIN_FILENO, &tios) == 0) {
+		saved_flags = tios.c_lflag;
+		tios.c_lflag &= ~ECHO;
+		tios.c_lflag |= ECHONL|ICANON;
+		tcsetattr(STDIN_FILENO, TCSAFLUSH|TCSASOFT, &tios);
+		nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
+		tios.c_lflag = saved_flags;
+		tcsetattr(STDIN_FILENO, TCSANOW|TCSASOFT, &tios);
+	} else {
+		nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
+	}
+	if (nopwd)
+		return (-1);
+	for (i = strlen(URL->pwd); i >= 0; --i)
+		if (URL->pwd[i] == '\r' || URL->pwd[i] == '\n')
+			URL->pwd[i] = '\0';
+
+	return (0);
+}
+
+/*
+ * Fetch a file
+ */
+static int
+fetch(char *URL, const char *path)
+{
+	struct url *url;
+	struct url_stat us;
+	struct stat sb, nsb;
+	struct xferstat xs;
+	FILE *f, *of;
+	size_t size, readcnt, wr;
+	off_t count;
+	char flags[8];
+	const char *slash;
+	char *tmppath;
+	int r;
+	unsigned timeout;
+	char *ptr;
+
+	f = of = NULL;
+	tmppath = NULL;
+
+	timeout = 0;
+	*flags = 0;
+	count = 0;
+
+	/* set verbosity level */
+	if (v_level > 1)
+		strcat(flags, "v");
+	if (v_level > 2)
+		dmDebug = 1;
+
+	/* parse URL */
+	url = NULL;
+	if (*URL == '\0') {
+		warnx("empty URL");
+		goto failure;
+	}
+	if ((url = fetchParseURL(URL)) == NULL) {
+		warnx("%s: parse error", URL);
+		goto failure;
+	}
+
+	/* if no scheme was specified, take a guess */
+	if (!*url->scheme) {
+		if (!*url->host)
+			strcpy(url->scheme, SCHEME_FILE);
+		else if (strncasecmp(url->host, "ftp.", 4) == 0)
+			strcpy(url->scheme, SCHEME_FTP);
+		else if (strncasecmp(url->host, "www.", 4) == 0)
+			strcpy(url->scheme, SCHEME_HTTP);
+	}
+
+	/* common flags */
+	switch (family) {
+	case PF_INET:
+		strcat(flags, "4");
+		break;
+	case PF_INET6:
+		strcat(flags, "6");
+		break;
+	}
+
+	/* FTP specific flags */
+	if (strcmp(url->scheme, SCHEME_FTP) == 0) {
+		if (p_flag)
+			strcat(flags, "p");
+		if (d_flag)
+			strcat(flags, "d");
+		if (U_flag)
+			strcat(flags, "l");
+		timeout = T_secs ? T_secs : ftp_timeout;
+	}
+
+	/* HTTP specific flags */
+	if (strcmp(url->scheme, SCHEME_HTTP) == 0 ||
+	    strcmp(url->scheme, SCHEME_HTTPS) == 0) {
+		if (d_flag)
+			strcat(flags, "d");
+		if (A_flag)
+			strcat(flags, "A");
+		timeout = T_secs ? T_secs : http_timeout;
+		if (i_flag) {
+			if (stat(i_filename, &sb)) {
+				warn("%s: stat()", i_filename);
+				goto failure;
+			}
+			url->ims_time = sb.st_mtime;
+			strcat(flags, "i");
+		}
+	}
+
+	/* set the protocol timeout. */
+	dmTimeout = timeout;
+
+	/* just print size */
+	if (s_flag) {
+		if (timeout)
+			alarm(timeout);
+		r = dmStat(url, &us, flags);
+		if (timeout)
+			alarm(0);
+		if (sigalrm || sigint)
+			goto signal;
+		if (r == -1) {
+			warnx("%s", dmLastErrString);
+			goto failure;
+		}
+		if (us.size == -1)
+			printf("Unknown\n");
+		else
+			printf("%jd\n", (intmax_t)us.size);
+		goto success;
+	}
+
+	/*
+	 * If the -r flag was specified, we have to compare the local
+	 * and remote files, so we should really do a dmStat()
+	 * first, but I know of at least one HTTP server that only
+	 * sends the content size in response to GET requests, and
+	 * leaves it out of replies to HEAD requests.  Also, in the
+	 * (frequent) case that the local and remote files match but
+	 * the local file is truncated, we have sufficient information
+	 * before the compare to issue a correct request.  Therefore,
+	 * we always issue a GET request as if we were sure the local
+	 * file was a truncated copy of the remote file; we can drop
+	 * the connection later if we change our minds.
+	 */
+	sb.st_size = -1;
+	if (!o_stdout) {
+		r = stat(path, &sb);
+		if (r == 0 && r_flag && S_ISREG(sb.st_mode)) {
+			url->offset = sb.st_size;
+		} else if (r == -1 || !S_ISREG(sb.st_mode)) {
+			/*
+			 * Whatever value sb.st_size has now is either
+			 * wrong (if stat(2) failed) or irrelevant (if the
+			 * path does not refer to a regular file)
+			 */
+			sb.st_size = -1;
+		}
+		if (r == -1 && errno != ENOENT) {
+			warnx("%s: stat()", path);
+			goto failure;
+		}
+	}
+
+	/* start the transfer */
+	if (timeout)
+		alarm(timeout);
+	f = dmXGet(url, &us, flags);
+	if (timeout)
+		alarm(0);
+	if (sigalrm || sigint)
+		goto signal;
+	if (f == NULL) {
+		warnx("%s: %s", URL, dmLastErrString);
+		if (i_flag && strcmp(url->scheme, SCHEME_HTTP) == 0
+		    && dmLastErrCode == FETCH_OK
+		    && strcmp(dmLastErrString, "Not Modified") == 0) {
+			/* HTTP Not Modified Response, return OK. */
+			r = 0;
+			goto done;
+		} else
+			goto failure;
+	}
+	if (sigint)
+		goto signal;
+
+	/* check that size is as expected */
+	if (S_size) {
+		if (us.size == -1) {
+			warnx("%s: size unknown", URL);
+		} else if (us.size != S_size) {
+			warnx("%s: size mismatch: expected %jd, actual %jd",
+			    URL, (intmax_t)S_size, (intmax_t)us.size);
+			goto failure;
+		}
+	}
+
+	/* symlink instead of copy */
+	if (l_flag && strcmp(url->scheme, "file") == 0 && !o_stdout) {
+		if (symlink(url->doc, path) == -1) {
+			warn("%s: symlink()", path);
+			goto failure;
+		}
+		goto success;
+	}
+
+	if (us.size == -1 && !o_stdout && v_level > 0)
+		warnx("%s: size of remote file is not known", URL);
+	if (v_level > 1) {
+		if (sb.st_size != -1)
+			fprintf(stderr, "local size / mtime: %jd / %ld\n",
+			    (intmax_t)sb.st_size, (long)sb.st_mtime);
+		if (us.size != -1)
+			fprintf(stderr, "remote size / mtime: %jd / %ld\n",
+			    (intmax_t)us.size, (long)us.mtime);
+	}
+
+	/* open output file */
+	if (o_stdout) {
+		/* output to stdout */
+		of = stdout;
+	} else if (r_flag && sb.st_size != -1) {
+		/* resume mode, local file exists */
+		if (!F_flag && us.mtime && sb.st_mtime != us.mtime) {
+			/* no match! have to refetch */
+			fclose(f);
+			/* if precious, warn the user and give up */
+			if (R_flag) {
+				warnx("%s: local modification time "
+				    "does not match remote", path);
+				goto failure_keep;
+			}
+		} else if (url->offset > sb.st_size) {
+			/* gap between what we asked for and what we got */
+			warnx("%s: gap in resume mode", URL);
+			fclose(of);
+			of = NULL;
+			/* picked up again later */
+		} else if (us.size != -1) {
+			if (us.size == sb.st_size)
+				/* nothing to do */
+				goto success;
+			if (sb.st_size > us.size) {
+				/* local file too long! */
+				warnx("%s: local file (%jd bytes) is longer "
+				    "than remote file (%jd bytes)", path,
+				    (intmax_t)sb.st_size, (intmax_t)us.size);
+				goto failure;
+			}
+			/* we got it, open local file */
+			if ((of = fopen(path, "r+")) == NULL) {
+				warn("%s: fopen()", path);
+				goto failure;
+			}
+			/* check that it didn't move under our feet */
+			if (fstat(fileno(of), &nsb) == -1) {
+				/* can't happen! */
+				warn("%s: fstat()", path);
+				goto failure;
+			}
+			if (nsb.st_dev != sb.st_dev ||
+			    nsb.st_ino != nsb.st_ino ||
+			    nsb.st_size != sb.st_size) {
+				warnx("%s: file has changed", URL);
+				fclose(of);
+				of = NULL;
+				sb = nsb;
+				/* picked up again later */
+			}
+		}
+		/* seek to where we left off */
+		if (of != NULL && fseeko(of, url->offset, SEEK_SET) != 0) {
+			warn("%s: fseeko()", path);
+			fclose(of);
+			of = NULL;
+			/* picked up again later */
+		}
+	} else if (m_flag && sb.st_size != -1) {
+		/* mirror mode, local file exists */
+		if (sb.st_size == us.size && sb.st_mtime == us.mtime)
+			goto success;
+	}
+
+	if (of == NULL) {
+		/*
+		 * We don't yet have an output file; either this is a
+		 * vanilla run with no special flags, or the local and
+		 * remote files didn't match.
+		 */
+
+		if (url->offset > 0) {
+			/*
+			 * We tried to restart a transfer, but for
+			 * some reason gave up - so we have to restart
+			 * from scratch if we want the whole file
+			 */
+			url->offset = 0;
+			if ((f = dmXGet(url, &us, flags)) == NULL) {
+				warnx("%s: %s", URL, dmLastErrString);
+				goto failure;
+			}
+			if (sigint)
+				goto signal;
+		}
+
+		/* construct a temp file name */
+		if (sb.st_size != -1 && S_ISREG(sb.st_mode)) {
+			if ((slash = strrchr(path, '/')) == NULL)
+				slash = path;
+			else
+				++slash;
+			asprintf(&tmppath, "%.*s.dm.XXXXXX.%s",
+			    (int)(slash - path), path, slash);
+			if (tmppath != NULL) {
+				if (mkstemps(tmppath, strlen(slash) + 1) == -1) {
+					warn("%s: mkstemps()", path);
+					goto failure;
+				}
+				of = fopen(tmppath, "w");
+				chown(tmppath, sb.st_uid, sb.st_gid);
+				chmod(tmppath, sb.st_mode & ALLPERMS);
+			}
+		}
+		if (of == NULL)
+			of = fopen(path, "w");
+		if (of == NULL) {
+			warn("%s: open()", path);
+			goto failure;
+		}
+	}
+	count = url->offset;
+
+	/* start the counter */
+	stat_start(&xs, path, us.size, count);
+
+	sigalrm = siginfo = sigint = 0;
+
+	/* suck in the data */
+	signal(SIGINFO, sig_handler);
+	while (!sigint) {
+		if (us.size != -1 && us.size - count < B_size &&
+		    us.size - count >= 0)
+			size = us.size - count;
+		else
+			size = B_size;
+		if (siginfo) {
+			stat_end(&xs);
+			siginfo = 0;
+		}
+
+		if (size == 0)
+			break;
+
+		if ((readcnt = fread(buf, 1, size, f)) < size) {
+			if (ferror(f) && errno == EINTR && !sigint)
+				clearerr(f);
+			else if (readcnt == 0)
+				break;
+		}
+
+		stat_update(&xs, count += readcnt);
+		for (ptr = buf; readcnt > 0; ptr += wr, readcnt -= wr)
+			if ((wr = fwrite(ptr, 1, readcnt, of)) < readcnt) {
+				if (ferror(of) && errno == EINTR && !sigint)
+					clearerr(of);
+				else
+					break;
+			}
+		if (readcnt != 0)
+			break;
+	}
+	if (!sigalrm)
+		sigalrm = ferror(f) && errno == ETIMEDOUT;
+	signal(SIGINFO, SIG_DFL);
+
+	stat_end(&xs);
+
+	/*
+	 * If the transfer timed out or was interrupted, we still want to
+	 * set the mtime in case the file is not removed (-r or -R) and
+	 * the user later restarts the transfer.
+	 */
+ signal:
+	/* set mtime of local file */
+	if (!n_flag && us.mtime && !o_stdout && of != NULL &&
+	    (stat(path, &sb) != -1) && sb.st_mode & S_IFREG) {
+		struct timeval tv[2];
+
+		fflush(of);
+		tv[0].tv_sec = (long)(us.atime ? us.atime : us.mtime);
+		tv[1].tv_sec = (long)us.mtime;
+		tv[0].tv_usec = tv[1].tv_usec = 0;
+		if (utimes(tmppath ? tmppath : path, tv))
+			warn("%s: utimes()", tmppath ? tmppath : path);
+	}
+
+	/* timed out or interrupted? */
+	if (sigalrm)
+		warnx("transfer timed out");
+	if (sigint) {
+		warnx("transfer interrupted");
+		goto failure;
+	}
+
+	/* timeout / interrupt before connection completley established? */
+	if (f == NULL)
+		goto failure;
+
+	if (!sigalrm) {
+		/* check the status of our files */
+		if (ferror(f))
+			warn("%s", URL);
+		if (ferror(of))
+			warn("%s", path);
+		if (ferror(f) || ferror(of))
+			goto failure;
+	}
+
+	/* did the transfer complete normally? */
+	if (us.size != -1 && count < us.size) {
+		warnx("%s appears to be truncated: %jd/%jd bytes",
+		    path, (intmax_t)count, (intmax_t)us.size);
+		goto failure_keep;
+	}
+
+	/*

*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***


More information about the svn-soc-all mailing list