|
Packit |
3adb1e |
/* ====================================================================
|
|
Packit |
3adb1e |
* Licensed to the Apache Software Foundation (ASF) under one
|
|
Packit |
3adb1e |
* or more contributor license agreements. See the NOTICE file
|
|
Packit |
3adb1e |
* distributed with this work for additional information
|
|
Packit |
3adb1e |
* regarding copyright ownership. The ASF licenses this file
|
|
Packit |
3adb1e |
* to you under the Apache License, Version 2.0 (the
|
|
Packit |
3adb1e |
* "License"); you may not use this file except in compliance
|
|
Packit |
3adb1e |
* with the License. You may obtain a copy of the License at
|
|
Packit |
3adb1e |
*
|
|
Packit |
3adb1e |
* http://www.apache.org/licenses/LICENSE-2.0
|
|
Packit |
3adb1e |
*
|
|
Packit |
3adb1e |
* Unless required by applicable law or agreed to in writing,
|
|
Packit |
3adb1e |
* software distributed under the License is distributed on an
|
|
Packit |
3adb1e |
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
Packit |
3adb1e |
* KIND, either express or implied. See the License for the
|
|
Packit |
3adb1e |
* specific language governing permissions and limitations
|
|
Packit |
3adb1e |
* under the License.
|
|
Packit |
3adb1e |
* ====================================================================
|
|
Packit |
3adb1e |
*/
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
#include <stdlib.h>
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
#include <apr.h>
|
|
Packit |
3adb1e |
#include <apr_uri.h>
|
|
Packit |
3adb1e |
#include <apr_strings.h>
|
|
Packit |
3adb1e |
#include <apr_atomic.h>
|
|
Packit |
3adb1e |
#include <apr_base64.h>
|
|
Packit |
3adb1e |
#include <apr_getopt.h>
|
|
Packit |
3adb1e |
#include <apr_version.h>
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
#include "serf.h"
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* Add Connection: close header to each request. */
|
|
Packit |
3adb1e |
/* #define CONNECTION_CLOSE_HDR */
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
typedef struct {
|
|
Packit |
3adb1e |
const char *hostinfo;
|
|
Packit |
3adb1e |
int using_ssl;
|
|
Packit |
3adb1e |
int head_request;
|
|
Packit |
3adb1e |
serf_ssl_context_t *ssl_ctx;
|
|
Packit |
3adb1e |
serf_bucket_alloc_t *bkt_alloc;
|
|
Packit |
3adb1e |
} app_baton_t;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static void closed_connection(serf_connection_t *conn,
|
|
Packit |
3adb1e |
void *closed_baton,
|
|
Packit |
3adb1e |
apr_status_t why,
|
|
Packit |
3adb1e |
apr_pool_t *pool)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
app_baton_t *ctx = closed_baton;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
ctx->ssl_ctx = NULL;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (why) {
|
|
Packit |
3adb1e |
abort();
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static void print_ssl_cert_errors(int failures)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
if (failures) {
|
|
Packit |
3adb1e |
fprintf(stderr, "INVALID CERTIFICATE:\n");
|
|
Packit |
3adb1e |
if (failures & SERF_SSL_CERT_NOTYETVALID)
|
|
Packit |
3adb1e |
fprintf(stderr, "* The certificate is not yet valid.\n");
|
|
Packit |
3adb1e |
if (failures & SERF_SSL_CERT_EXPIRED)
|
|
Packit |
3adb1e |
fprintf(stderr, "* The certificate expired.\n");
|
|
Packit |
3adb1e |
if (failures & SERF_SSL_CERT_SELF_SIGNED)
|
|
Packit |
3adb1e |
fprintf(stderr, "* The certificate is self-signed.\n");
|
|
Packit |
3adb1e |
if (failures & SERF_SSL_CERT_UNKNOWNCA)
|
|
Packit |
3adb1e |
fprintf(stderr, "* The CA is unknown.\n");
|
|
Packit |
3adb1e |
if (failures & SERF_SSL_CERT_UNKNOWN_FAILURE)
|
|
Packit |
3adb1e |
fprintf(stderr, "* Unknown failure.\n");
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static apr_status_t ignore_all_cert_errors(void *data, int failures,
|
|
Packit |
3adb1e |
const serf_ssl_certificate_t *cert)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
print_ssl_cert_errors(failures);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* In a real application, you would normally would not want to do this */
|
|
Packit |
3adb1e |
return APR_SUCCESS;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static char *
|
|
Packit |
3adb1e |
convert_organisation_to_str(apr_hash_t *org, apr_pool_t *pool)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
return apr_psprintf(pool, "%s, %s, %s, %s, %s (%s)",
|
|
Packit |
3adb1e |
(char*)apr_hash_get(org, "OU", APR_HASH_KEY_STRING),
|
|
Packit |
3adb1e |
(char*)apr_hash_get(org, "O", APR_HASH_KEY_STRING),
|
|
Packit |
3adb1e |
(char*)apr_hash_get(org, "L", APR_HASH_KEY_STRING),
|
|
Packit |
3adb1e |
(char*)apr_hash_get(org, "ST", APR_HASH_KEY_STRING),
|
|
Packit |
3adb1e |
(char*)apr_hash_get(org, "C", APR_HASH_KEY_STRING),
|
|
Packit |
3adb1e |
(char*)apr_hash_get(org, "E", APR_HASH_KEY_STRING));
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static apr_status_t print_certs(void *data, int failures, int error_depth,
|
|
Packit |
3adb1e |
const serf_ssl_certificate_t * const * certs,
|
|
Packit |
3adb1e |
apr_size_t certs_len)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
apr_pool_t *pool;
|
|
Packit |
3adb1e |
const serf_ssl_certificate_t *current;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
apr_pool_create(&pool, NULL);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
fprintf(stderr, "Received certificate chain with length %d\n",
|
|
Packit |
3adb1e |
(int)certs_len);
|
|
Packit |
3adb1e |
print_ssl_cert_errors(failures);
|
|
Packit |
3adb1e |
if (failures)
|
|
Packit |
3adb1e |
fprintf(stderr, "Error at depth=%d\n", error_depth);
|
|
Packit |
3adb1e |
else
|
|
Packit |
3adb1e |
fprintf(stderr, "Chain provided with depth=%d\n", error_depth);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
while ((current = *certs) != NULL)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
apr_hash_t *issuer, *subject, *serf_cert;
|
|
Packit |
3adb1e |
apr_array_header_t *san;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
subject = serf_ssl_cert_subject(current, pool);
|
|
Packit |
3adb1e |
issuer = serf_ssl_cert_issuer(current, pool);
|
|
Packit |
3adb1e |
serf_cert = serf_ssl_cert_certificate(current, pool);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
fprintf(stderr, "\n-----BEGIN CERTIFICATE-----\n");
|
|
Packit |
3adb1e |
fprintf(stderr, "Hostname: %s\n",
|
|
Packit |
3adb1e |
(const char *)apr_hash_get(subject, "CN", APR_HASH_KEY_STRING));
|
|
Packit |
3adb1e |
fprintf(stderr, "Sha1: %s\n",
|
|
Packit |
3adb1e |
(const char *)apr_hash_get(serf_cert, "sha1", APR_HASH_KEY_STRING));
|
|
Packit |
3adb1e |
fprintf(stderr, "Valid from: %s\n",
|
|
Packit |
3adb1e |
(const char *)apr_hash_get(serf_cert, "notBefore", APR_HASH_KEY_STRING));
|
|
Packit |
3adb1e |
fprintf(stderr, "Valid until: %s\n",
|
|
Packit |
3adb1e |
(const char *)apr_hash_get(serf_cert, "notAfter", APR_HASH_KEY_STRING));
|
|
Packit |
3adb1e |
fprintf(stderr, "Issuer: %s\n", convert_organisation_to_str(issuer, pool));
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
san = apr_hash_get(serf_cert, "subjectAltName", APR_HASH_KEY_STRING);
|
|
Packit |
3adb1e |
if (san) {
|
|
Packit |
3adb1e |
int i;
|
|
Packit |
3adb1e |
for (i = 0; i < san->nelts; i++) {
|
|
Packit |
3adb1e |
char *s = APR_ARRAY_IDX(san, i, char*);
|
|
Packit |
3adb1e |
fprintf(stderr, "SubjectAltName: %s\n", s);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
fprintf(stderr, "%s\n", serf_ssl_cert_export(current, pool));
|
|
Packit |
3adb1e |
fprintf(stderr, "-----END CERTIFICATE-----\n");
|
|
Packit |
3adb1e |
++certs;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
apr_pool_destroy(pool);
|
|
Packit |
3adb1e |
return APR_SUCCESS;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static apr_status_t conn_setup(apr_socket_t *skt,
|
|
Packit |
3adb1e |
serf_bucket_t **input_bkt,
|
|
Packit |
3adb1e |
serf_bucket_t **output_bkt,
|
|
Packit |
3adb1e |
void *setup_baton,
|
|
Packit |
3adb1e |
apr_pool_t *pool)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
serf_bucket_t *c;
|
|
Packit |
3adb1e |
app_baton_t *ctx = setup_baton;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
c = serf_bucket_socket_create(skt, ctx->bkt_alloc);
|
|
Packit |
3adb1e |
if (ctx->using_ssl) {
|
|
Packit |
3adb1e |
c = serf_bucket_ssl_decrypt_create(c, ctx->ssl_ctx, ctx->bkt_alloc);
|
|
Packit |
3adb1e |
if (!ctx->ssl_ctx) {
|
|
Packit |
3adb1e |
ctx->ssl_ctx = serf_bucket_ssl_decrypt_context_get(c);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
serf_ssl_server_cert_chain_callback_set(ctx->ssl_ctx,
|
|
Packit |
3adb1e |
ignore_all_cert_errors,
|
|
Packit |
3adb1e |
print_certs, NULL);
|
|
Packit |
3adb1e |
serf_ssl_set_hostname(ctx->ssl_ctx, ctx->hostinfo);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
*output_bkt = serf_bucket_ssl_encrypt_create(*output_bkt, ctx->ssl_ctx,
|
|
Packit |
3adb1e |
ctx->bkt_alloc);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
*input_bkt = c;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
return APR_SUCCESS;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static serf_bucket_t* accept_response(serf_request_t *request,
|
|
Packit |
3adb1e |
serf_bucket_t *stream,
|
|
Packit |
3adb1e |
void *acceptor_baton,
|
|
Packit |
3adb1e |
apr_pool_t *pool)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
serf_bucket_t *c;
|
|
Packit |
3adb1e |
serf_bucket_t *response;
|
|
Packit |
3adb1e |
serf_bucket_alloc_t *bkt_alloc;
|
|
Packit |
3adb1e |
app_baton_t *app_ctx = acceptor_baton;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* get the per-request bucket allocator */
|
|
Packit |
3adb1e |
bkt_alloc = serf_request_get_alloc(request);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* Create a barrier so the response doesn't eat us! */
|
|
Packit |
3adb1e |
c = serf_bucket_barrier_create(stream, bkt_alloc);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
response = serf_bucket_response_create(c, bkt_alloc);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (app_ctx->head_request)
|
|
Packit |
3adb1e |
serf_bucket_response_set_head(response);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
return response;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
typedef struct {
|
|
Packit |
3adb1e |
#if APR_MAJOR_VERSION > 0
|
|
Packit |
3adb1e |
apr_uint32_t completed_requests;
|
|
Packit |
3adb1e |
#else
|
|
Packit |
3adb1e |
apr_atomic_t completed_requests;
|
|
Packit |
3adb1e |
#endif
|
|
Packit |
3adb1e |
int print_headers;
|
|
Packit |
3adb1e |
apr_file_t *output_file;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
serf_response_acceptor_t acceptor;
|
|
Packit |
3adb1e |
app_baton_t *acceptor_baton;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
serf_response_handler_t handler;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
const char *host;
|
|
Packit |
3adb1e |
const char *method;
|
|
Packit |
3adb1e |
const char *path;
|
|
Packit |
3adb1e |
const char *req_body_path;
|
|
Packit |
3adb1e |
const char *username;
|
|
Packit |
3adb1e |
const char *password;
|
|
Packit |
3adb1e |
int auth_attempts;
|
|
Packit |
3adb1e |
serf_bucket_t *req_hdrs;
|
|
Packit |
3adb1e |
} handler_baton_t;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* Kludges for APR 0.9 support. */
|
|
Packit |
3adb1e |
#if APR_MAJOR_VERSION == 0
|
|
Packit |
3adb1e |
#define apr_atomic_inc32 apr_atomic_inc
|
|
Packit |
3adb1e |
#define apr_atomic_dec32 apr_atomic_dec
|
|
Packit |
3adb1e |
#define apr_atomic_read32 apr_atomic_read
|
|
Packit |
3adb1e |
#endif
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static int append_request_headers(void *baton,
|
|
Packit |
3adb1e |
const char *key,
|
|
Packit |
3adb1e |
const char *value)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
serf_bucket_t *hdrs_bkt = baton;
|
|
Packit |
3adb1e |
serf_bucket_headers_setc(hdrs_bkt, key, value);
|
|
Packit |
3adb1e |
return 0;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static apr_status_t setup_request(serf_request_t *request,
|
|
Packit |
3adb1e |
void *setup_baton,
|
|
Packit |
3adb1e |
serf_bucket_t **req_bkt,
|
|
Packit |
3adb1e |
serf_response_acceptor_t *acceptor,
|
|
Packit |
3adb1e |
void **acceptor_baton,
|
|
Packit |
3adb1e |
serf_response_handler_t *handler,
|
|
Packit |
3adb1e |
void **handler_baton,
|
|
Packit |
3adb1e |
apr_pool_t *pool)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
handler_baton_t *ctx = setup_baton;
|
|
Packit |
3adb1e |
serf_bucket_t *hdrs_bkt;
|
|
Packit |
3adb1e |
serf_bucket_t *body_bkt;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (ctx->req_body_path) {
|
|
Packit |
3adb1e |
apr_file_t *file;
|
|
Packit |
3adb1e |
apr_status_t status;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
status = apr_file_open(&file, ctx->req_body_path, APR_READ,
|
|
Packit |
3adb1e |
APR_OS_DEFAULT, pool);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (status) {
|
|
Packit |
3adb1e |
printf("Error opening file (%s)\n", ctx->req_body_path);
|
|
Packit |
3adb1e |
return status;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
body_bkt = serf_bucket_file_create(file,
|
|
Packit |
3adb1e |
serf_request_get_alloc(request));
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
else {
|
|
Packit |
3adb1e |
body_bkt = NULL;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
*req_bkt = serf_request_bucket_request_create(request, ctx->method,
|
|
Packit |
3adb1e |
ctx->path, body_bkt,
|
|
Packit |
3adb1e |
serf_request_get_alloc(request));
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
hdrs_bkt = serf_bucket_request_get_headers(*req_bkt);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
serf_bucket_headers_setn(hdrs_bkt, "User-Agent",
|
|
Packit |
3adb1e |
"Serf/" SERF_VERSION_STRING);
|
|
Packit |
3adb1e |
/* Shouldn't serf do this for us? */
|
|
Packit |
3adb1e |
serf_bucket_headers_setn(hdrs_bkt, "Accept-Encoding", "gzip");
|
|
Packit |
3adb1e |
#ifdef CONNECTION_CLOSE_HDR
|
|
Packit |
3adb1e |
serf_bucket_headers_setn(hdrs_bkt, "Connection", "close");
|
|
Packit |
3adb1e |
#endif
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* Add the extra headers from the command line */
|
|
Packit |
3adb1e |
if (ctx->req_hdrs != NULL) {
|
|
Packit |
3adb1e |
serf_bucket_headers_do(ctx->req_hdrs, append_request_headers, hdrs_bkt);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
*acceptor = ctx->acceptor;
|
|
Packit |
3adb1e |
*acceptor_baton = ctx->acceptor_baton;
|
|
Packit |
3adb1e |
*handler = ctx->handler;
|
|
Packit |
3adb1e |
*handler_baton = ctx;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
return APR_SUCCESS;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static apr_status_t handle_response(serf_request_t *request,
|
|
Packit |
3adb1e |
serf_bucket_t *response,
|
|
Packit |
3adb1e |
void *handler_baton,
|
|
Packit |
3adb1e |
apr_pool_t *pool)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
serf_status_line sl;
|
|
Packit |
3adb1e |
apr_status_t status;
|
|
Packit |
3adb1e |
handler_baton_t *ctx = handler_baton;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (!response) {
|
|
Packit |
3adb1e |
/* A NULL response probably means that the connection was closed while
|
|
Packit |
3adb1e |
this request was already written. Just requeue it. */
|
|
Packit |
3adb1e |
serf_connection_t *conn = serf_request_get_conn(request);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
serf_connection_request_create(conn, setup_request, handler_baton);
|
|
Packit |
3adb1e |
return APR_SUCCESS;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
status = serf_bucket_response_status(response, &sl);
|
|
Packit |
3adb1e |
if (status) {
|
|
Packit |
3adb1e |
return status;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
while (1) {
|
|
Packit |
3adb1e |
struct iovec vecs[64];
|
|
Packit |
3adb1e |
int vecs_read;
|
|
Packit |
3adb1e |
apr_size_t bytes_written;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
status = serf_bucket_read_iovec(response, 8000, 64, vecs, &vecs_read);
|
|
Packit |
3adb1e |
if (SERF_BUCKET_READ_ERROR(status))
|
|
Packit |
3adb1e |
return status;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* got some data. print it out. */
|
|
Packit |
3adb1e |
if (vecs_read) {
|
|
Packit |
3adb1e |
apr_file_writev(ctx->output_file, vecs, vecs_read, &bytes_written);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* are we done yet? */
|
|
Packit |
3adb1e |
if (APR_STATUS_IS_EOF(status)) {
|
|
Packit |
3adb1e |
if (ctx->print_headers) {
|
|
Packit |
3adb1e |
serf_bucket_t *hdrs;
|
|
Packit |
3adb1e |
hdrs = serf_bucket_response_get_headers(response);
|
|
Packit |
3adb1e |
while (1) {
|
|
Packit |
3adb1e |
status = serf_bucket_read_iovec(hdrs, 8000, 64, vecs,
|
|
Packit |
3adb1e |
&vecs_read);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (SERF_BUCKET_READ_ERROR(status))
|
|
Packit |
3adb1e |
return status;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (vecs_read) {
|
|
Packit |
3adb1e |
apr_file_writev(ctx->output_file, vecs, vecs_read,
|
|
Packit |
3adb1e |
&bytes_written);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
if (APR_STATUS_IS_EOF(status)) {
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
apr_atomic_inc32(&ctx->completed_requests);
|
|
Packit |
3adb1e |
return APR_EOF;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* have we drained the response so far? */
|
|
Packit |
3adb1e |
if (APR_STATUS_IS_EAGAIN(status))
|
|
Packit |
3adb1e |
return status;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* loop to read some more. */
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
/* NOTREACHED */
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static apr_status_t
|
|
Packit |
3adb1e |
credentials_callback(char **username,
|
|
Packit |
3adb1e |
char **password,
|
|
Packit |
3adb1e |
serf_request_t *request, void *baton,
|
|
Packit |
3adb1e |
int code, const char *authn_type,
|
|
Packit |
3adb1e |
const char *realm,
|
|
Packit |
3adb1e |
apr_pool_t *pool)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
handler_baton_t *ctx = baton;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (ctx->auth_attempts > 0)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
return SERF_ERROR_AUTHN_FAILED;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
else
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
*username = (char*)ctx->username;
|
|
Packit |
3adb1e |
*password = (char*)ctx->password;
|
|
Packit |
3adb1e |
ctx->auth_attempts++;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
return APR_SUCCESS;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
static void print_usage(apr_pool_t *pool)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
puts("serf_get [options] URL");
|
|
Packit |
3adb1e |
puts("-h\tDisplay this help");
|
|
Packit |
3adb1e |
puts("-v\tDisplay version");
|
|
Packit |
3adb1e |
puts("-H\tPrint response headers");
|
|
Packit |
3adb1e |
puts("-n <count> Fetch URL <count> times");
|
|
Packit |
3adb1e |
puts("-x <count> Number of maximum outstanding requests inflight");
|
|
Packit |
3adb1e |
puts("-U <user> Username for Basic/Digest authentication");
|
|
Packit |
3adb1e |
puts("-P <password> Password for Basic/Digest authentication");
|
|
Packit |
3adb1e |
puts("-m <method> Use the <method> HTTP Method");
|
|
Packit |
3adb1e |
puts("-f <file> Use the <file> as the request body");
|
|
Packit |
3adb1e |
puts("-p <hostname:port> Use the <host:port> as proxy server");
|
|
Packit |
3adb1e |
puts("-r <header:value> Use <header:value> as request header");
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
int main(int argc, const char **argv)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
apr_status_t status;
|
|
Packit |
3adb1e |
apr_pool_t *pool;
|
|
Packit |
3adb1e |
serf_bucket_alloc_t *bkt_alloc;
|
|
Packit |
3adb1e |
serf_context_t *context;
|
|
Packit |
3adb1e |
serf_connection_t *connection;
|
|
Packit |
3adb1e |
serf_request_t *request;
|
|
Packit |
3adb1e |
app_baton_t app_ctx;
|
|
Packit |
3adb1e |
handler_baton_t handler_ctx;
|
|
Packit |
3adb1e |
serf_bucket_t *req_hdrs = NULL;
|
|
Packit |
3adb1e |
apr_uri_t url;
|
|
Packit |
3adb1e |
const char *proxy = NULL;
|
|
Packit |
3adb1e |
const char *raw_url, *method, *req_body_path = NULL;
|
|
Packit |
3adb1e |
int count, inflight;
|
|
Packit |
3adb1e |
int i;
|
|
Packit |
3adb1e |
int print_headers;
|
|
Packit |
3adb1e |
const char *username = NULL;
|
|
Packit |
3adb1e |
const char *password = "";
|
|
Packit |
3adb1e |
apr_getopt_t *opt;
|
|
Packit |
3adb1e |
char opt_c;
|
|
Packit |
3adb1e |
const char *opt_arg;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
apr_initialize();
|
|
Packit |
3adb1e |
atexit(apr_terminate);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
apr_pool_create(&pool, NULL);
|
|
Packit |
3adb1e |
/* serf_initialize(); */
|
|
Packit |
3adb1e |
bkt_alloc = serf_bucket_allocator_create(pool, NULL, NULL);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* Default to one round of fetching with no limit to max inflight reqs. */
|
|
Packit |
3adb1e |
count = 1;
|
|
Packit |
3adb1e |
inflight = 0;
|
|
Packit |
3adb1e |
/* Default to GET. */
|
|
Packit |
3adb1e |
method = "GET";
|
|
Packit |
3adb1e |
/* Do not print headers by default. */
|
|
Packit |
3adb1e |
print_headers = 0;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
apr_getopt_init(&opt, pool, argc, argv);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
while ((status = apr_getopt(opt, "U:P:f:hHm:n:vp:x:r:", &opt_c, &opt_arg)) ==
|
|
Packit |
3adb1e |
APR_SUCCESS) {
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
switch (opt_c) {
|
|
Packit |
3adb1e |
case 'U':
|
|
Packit |
3adb1e |
username = opt_arg;
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'P':
|
|
Packit |
3adb1e |
password = opt_arg;
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'f':
|
|
Packit |
3adb1e |
req_body_path = opt_arg;
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'h':
|
|
Packit |
3adb1e |
print_usage(pool);
|
|
Packit |
3adb1e |
exit(0);
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'H':
|
|
Packit |
3adb1e |
print_headers = 1;
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'm':
|
|
Packit |
3adb1e |
method = opt_arg;
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'n':
|
|
Packit |
3adb1e |
errno = 0;
|
|
Packit |
3adb1e |
count = apr_strtoi64(opt_arg, NULL, 10);
|
|
Packit |
3adb1e |
if (errno) {
|
|
Packit |
3adb1e |
printf("Problem converting number of times to fetch URL (%d)\n",
|
|
Packit |
3adb1e |
errno);
|
|
Packit |
3adb1e |
return errno;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'x':
|
|
Packit |
3adb1e |
errno = 0;
|
|
Packit |
3adb1e |
inflight = apr_strtoi64(opt_arg, NULL, 10);
|
|
Packit |
3adb1e |
if (errno) {
|
|
Packit |
3adb1e |
printf("Problem converting number of requests to have outstanding (%d)\n",
|
|
Packit |
3adb1e |
errno);
|
|
Packit |
3adb1e |
return errno;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'p':
|
|
Packit |
3adb1e |
proxy = opt_arg;
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'r':
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
char *sep;
|
|
Packit |
3adb1e |
char *hdr_val;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (req_hdrs == NULL) {
|
|
Packit |
3adb1e |
/* first request header, allocate bucket */
|
|
Packit |
3adb1e |
req_hdrs = serf_bucket_headers_create(bkt_alloc);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
sep = strchr(opt_arg, ':');
|
|
Packit |
3adb1e |
if ((sep == NULL) || (sep == opt_arg) || (strlen(sep) <= 1)) {
|
|
Packit |
3adb1e |
printf("Invalid request header string (%s)\n", opt_arg);
|
|
Packit |
3adb1e |
return EINVAL;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
hdr_val = sep + 1;
|
|
Packit |
3adb1e |
while (*hdr_val == ' ') {
|
|
Packit |
3adb1e |
hdr_val++;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
serf_bucket_headers_setx(req_hdrs, opt_arg, (sep - opt_arg), 1,
|
|
Packit |
3adb1e |
hdr_val, strlen(hdr_val), 1);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
case 'v':
|
|
Packit |
3adb1e |
puts("Serf version: " SERF_VERSION_STRING);
|
|
Packit |
3adb1e |
exit(0);
|
|
Packit |
3adb1e |
default:
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (opt->ind != opt->argc - 1) {
|
|
Packit |
3adb1e |
print_usage(pool);
|
|
Packit |
3adb1e |
exit(-1);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
raw_url = argv[opt->ind];
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
apr_uri_parse(pool, raw_url, &url;;
|
|
Packit |
3adb1e |
if (!url.port) {
|
|
Packit |
3adb1e |
url.port = apr_uri_port_of_scheme(url.scheme);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
if (!url.path) {
|
|
Packit |
3adb1e |
url.path = "/";
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (strcasecmp(url.scheme, "https") == 0) {
|
|
Packit |
3adb1e |
app_ctx.using_ssl = 1;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
else {
|
|
Packit |
3adb1e |
app_ctx.using_ssl = 0;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (strcasecmp(method, "HEAD") == 0) {
|
|
Packit |
3adb1e |
app_ctx.head_request = 1;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
else {
|
|
Packit |
3adb1e |
app_ctx.head_request = 0;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
app_ctx.hostinfo = url.hostinfo;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
context = serf_context_create(pool);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (proxy)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
apr_sockaddr_t *proxy_address = NULL;
|
|
Packit |
3adb1e |
apr_port_t proxy_port;
|
|
Packit |
3adb1e |
char *proxy_host;
|
|
Packit |
3adb1e |
char *proxy_scope;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
status = apr_parse_addr_port(&proxy_host, &proxy_scope, &proxy_port, proxy, pool);
|
|
Packit |
3adb1e |
if (status)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
printf("Cannot parse proxy hostname/port: %d\n", status);
|
|
Packit |
3adb1e |
apr_pool_destroy(pool);
|
|
Packit |
3adb1e |
exit(1);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (!proxy_host)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
printf("Proxy hostname must be specified\n");
|
|
Packit |
3adb1e |
apr_pool_destroy(pool);
|
|
Packit |
3adb1e |
exit(1);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (!proxy_port)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
printf("Proxy port must be specified\n");
|
|
Packit |
3adb1e |
apr_pool_destroy(pool);
|
|
Packit |
3adb1e |
exit(1);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
status = apr_sockaddr_info_get(&proxy_address, proxy_host, APR_UNSPEC,
|
|
Packit |
3adb1e |
proxy_port, 0, pool);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (status)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
printf("Cannot resolve proxy address '%s': %d\n", proxy_host, status);
|
|
Packit |
3adb1e |
apr_pool_destroy(pool);
|
|
Packit |
3adb1e |
exit(1);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
serf_config_proxy(context, proxy_address);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
if (username)
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
serf_config_authn_types(context, SERF_AUTHN_ALL);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
else
|
|
Packit |
3adb1e |
{
|
|
Packit |
3adb1e |
serf_config_authn_types(context, SERF_AUTHN_NTLM | SERF_AUTHN_NEGOTIATE);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
serf_config_credentials_callback(context, credentials_callback);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
/* ### Connection or Context should have an allocator? */
|
|
Packit |
3adb1e |
app_ctx.bkt_alloc = bkt_alloc;
|
|
Packit |
3adb1e |
app_ctx.ssl_ctx = NULL;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
status = serf_connection_create2(&connection, context, url,
|
|
Packit |
3adb1e |
conn_setup, &app_ctx,
|
|
Packit |
3adb1e |
closed_connection, &app_ctx,
|
|
Packit |
3adb1e |
pool);
|
|
Packit |
3adb1e |
if (status) {
|
|
Packit |
3adb1e |
printf("Error creating connection: %d\n", status);
|
|
Packit |
3adb1e |
apr_pool_destroy(pool);
|
|
Packit |
3adb1e |
exit(1);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
handler_ctx.completed_requests = 0;
|
|
Packit |
3adb1e |
handler_ctx.print_headers = print_headers;
|
|
Packit |
3adb1e |
apr_file_open_stdout(&handler_ctx.output_file, pool);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
handler_ctx.host = url.hostinfo;
|
|
Packit |
3adb1e |
handler_ctx.method = method;
|
|
Packit |
3adb1e |
handler_ctx.path = apr_pstrcat(pool,
|
|
Packit |
3adb1e |
url.path,
|
|
Packit |
3adb1e |
url.query ? "?" : "",
|
|
Packit |
3adb1e |
url.query ? url.query : "",
|
|
Packit |
3adb1e |
NULL);
|
|
Packit |
3adb1e |
handler_ctx.username = username;
|
|
Packit |
3adb1e |
handler_ctx.password = password;
|
|
Packit |
3adb1e |
handler_ctx.auth_attempts = 0;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
handler_ctx.req_body_path = req_body_path;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
handler_ctx.acceptor = accept_response;
|
|
Packit |
3adb1e |
handler_ctx.acceptor_baton = &app_ctx;
|
|
Packit |
3adb1e |
handler_ctx.handler = handle_response;
|
|
Packit |
3adb1e |
handler_ctx.req_hdrs = req_hdrs;
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
serf_connection_set_max_outstanding_requests(connection, inflight);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
for (i = 0; i < count; i++) {
|
|
Packit |
3adb1e |
request = serf_connection_request_create(connection, setup_request,
|
|
Packit |
3adb1e |
&handler_ctx);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
while (1) {
|
|
Packit |
3adb1e |
status = serf_context_run(context, SERF_DURATION_FOREVER, pool);
|
|
Packit |
3adb1e |
if (APR_STATUS_IS_TIMEUP(status))
|
|
Packit |
3adb1e |
continue;
|
|
Packit |
3adb1e |
if (status) {
|
|
Packit |
3adb1e |
char buf[200];
|
|
Packit |
3adb1e |
const char *err_string;
|
|
Packit |
3adb1e |
err_string = serf_error_string(status);
|
|
Packit |
3adb1e |
if (!err_string) {
|
|
Packit |
3adb1e |
err_string = apr_strerror(status, buf, sizeof(buf));
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
printf("Error running context: (%d) %s\n", status, err_string);
|
|
Packit |
3adb1e |
apr_pool_destroy(pool);
|
|
Packit |
3adb1e |
exit(1);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
if (apr_atomic_read32(&handler_ctx.completed_requests) >= count) {
|
|
Packit |
3adb1e |
break;
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
/* Debugging purposes only! */
|
|
Packit |
3adb1e |
serf_debug__closed_conn(app_ctx.bkt_alloc);
|
|
Packit |
3adb1e |
}
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
serf_connection_close(connection);
|
|
Packit |
3adb1e |
|
|
Packit |
3adb1e |
apr_pool_destroy(pool);
|
|
Packit |
3adb1e |
return 0;
|
|
Packit |
3adb1e |
}
|