1/*-
2 * Copyright (c) 2000-2014 Dag-Erling Smørgrav
3 * Copyright (c) 2013 Michael Gmelin <freebsd@grem.de>
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 *    notice, this list of conditions and the following disclaimer
11 *    in this position and unchanged.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 * 3. The name of the author may not be used to endorse or promote products
16 *    derived from this software without specific prior written permission
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
30#include <sys/cdefs.h>
31__FBSDID("$FreeBSD$");
32
33#include <sys/param.h>
34#include <sys/socket.h>
35#include <sys/stat.h>
36#include <sys/time.h>
37
38#include <ctype.h>
39#include <err.h>
40#include <errno.h>
41#include <getopt.h>
42#include <signal.h>
43#include <stdint.h>
44#include <stdio.h>
45#include <stdlib.h>
46#include <string.h>
47#include <termios.h>
48#include <unistd.h>
49
50#include <fetch.h>
51
52#define MINBUFSIZE	16384
53#define TIMEOUT		120
54
55/* Option flags */
56static int	 A_flag;	/*    -A: do not follow 302 redirects */
57static int	 a_flag;	/*    -a: auto retry */
58static off_t	 B_size;	/*    -B: buffer size */
59static int	 b_flag;	/*!   -b: workaround TCP bug */
60static char    *c_dirname;	/*    -c: remote directory */
61static int	 d_flag;	/*    -d: direct connection */
62static int	 F_flag;	/*    -F: restart without checking mtime  */
63static char	*f_filename;	/*    -f: file to fetch */
64static char	*h_hostname;	/*    -h: host to fetch from */
65static int	 i_flag;	/*    -i: specify file for mtime comparison */
66static char	*i_filename;	/*        name of input file */
67static int	 l_flag;	/*    -l: link rather than copy file: URLs */
68static int	 m_flag;	/* -[Mm]: mirror mode */
69static char	*N_filename;	/*    -N: netrc file name */
70static int	 n_flag;	/*    -n: do not preserve modification time */
71static int	 o_flag;	/*    -o: specify output file */
72static int	 o_directory;	/*        output file is a directory */
73static char	*o_filename;	/*        name of output file */
74static int	 o_stdout;	/*        output file is stdout */
75static int	 once_flag;	/*    -1: stop at first successful file */
76static int	 p_flag;	/* -[Pp]: use passive FTP */
77static int	 R_flag;	/*    -R: don't delete partial files */
78static int	 r_flag;	/*    -r: restart previous transfer */
79static off_t	 S_size;        /*    -S: require size to match */
80static int	 s_flag;        /*    -s: show size, don't fetch */
81static long	 T_secs;	/*    -T: transfer timeout in seconds */
82static int	 t_flag;	/*!   -t: workaround TCP bug */
83static int	 U_flag;	/*    -U: do not use high ports */
84static int	 v_level = 1;	/*    -v: verbosity level */
85static int	 v_tty;		/*        stdout is a tty */
86static pid_t	 pgrp;		/*        our process group */
87static long	 w_secs;	/*    -w: retry delay */
88static int	 family = PF_UNSPEC;	/* -[46]: address family to use */
89
90static int	 sigalrm;	/* SIGALRM received */
91static int	 siginfo;	/* SIGINFO received */
92static int	 sigint;	/* SIGINT received */
93
94static long	 ftp_timeout = TIMEOUT;	/* default timeout for FTP transfers */
95static long	 http_timeout = TIMEOUT;/* default timeout for HTTP transfers */
96static char	*buf;		/* transfer buffer */
97
98enum options
99{
100	OPTION_BIND_ADDRESS,
101	OPTION_NO_FTP_PASSIVE_MODE,
102	OPTION_HTTP_REFERER,
103	OPTION_HTTP_USER_AGENT,
104	OPTION_NO_PROXY,
105	OPTION_SSL_ALLOW_SSL2,
106	OPTION_SSL_CA_CERT_FILE,
107	OPTION_SSL_CA_CERT_PATH,
108	OPTION_SSL_CLIENT_CERT_FILE,
109	OPTION_SSL_CLIENT_KEY_FILE,
110	OPTION_SSL_CRL_FILE,
111	OPTION_SSL_NO_SSL3,
112	OPTION_SSL_NO_TLS1,
113	OPTION_SSL_NO_VERIFY_HOSTNAME,
114	OPTION_SSL_NO_VERIFY_PEER
115};
116
117
118static struct option longopts[] =
119{
120	/* mapping to single character argument */
121	{ "one-file", no_argument, NULL, '1' },
122	{ "ipv4-only", no_argument, NULL, '4' },
123	{ "ipv6-only", no_argument, NULL, '6' },
124	{ "no-redirect", no_argument, NULL, 'A' },
125	{ "retry", no_argument, NULL, 'a' },
126	{ "buffer-size", required_argument, NULL, 'B' },
127	/* -c not mapped, since it's deprecated */
128	{ "direct", no_argument, NULL, 'd' },
129	{ "force-restart", no_argument, NULL, 'F' },
130	/* -f not mapped, since it's deprecated */
131	/* -h not mapped, since it's deprecated */
132	{ "if-modified-since", required_argument, NULL, 'i' },
133	{ "symlink", no_argument, NULL, 'l' },
134	/* -M not mapped since it's the same as -m */
135	{ "mirror", no_argument, NULL, 'm' },
136	{ "netrc", required_argument, NULL, 'N' },
137	{ "no-mtime", no_argument, NULL, 'n' },
138	{ "output", required_argument, NULL, 'o' },
139	/* -P not mapped since it's the same as -p */
140	{ "passive", no_argument, NULL, 'p' },
141	{ "quiet", no_argument, NULL, 'q' },
142	{ "keep-output", no_argument, NULL, 'R' },
143	{ "restart", no_argument, NULL, 'r' },
144	{ "require-size", required_argument, NULL, 'S' },
145	{ "print-size", no_argument, NULL, 's' },
146	{ "timeout", required_argument, NULL, 'T' },
147	{ "passive-portrange-default", no_argument, NULL, 'T' },
148	{ "verbose", no_argument, NULL, 'v' },
149	{ "retry-delay", required_argument, NULL, 'w' },
150
151	/* options without a single character equivalent */
152	{ "bind-address", required_argument, NULL, OPTION_BIND_ADDRESS },
153	{ "no-passive", no_argument, NULL, OPTION_NO_FTP_PASSIVE_MODE },
154	{ "referer", required_argument, NULL, OPTION_HTTP_REFERER },
155	{ "user-agent", required_argument, NULL, OPTION_HTTP_USER_AGENT },
156	{ "no-proxy", required_argument, NULL, OPTION_NO_PROXY },
157	{ "allow-sslv2", no_argument, NULL, OPTION_SSL_ALLOW_SSL2 },
158	{ "ca-cert", required_argument, NULL, OPTION_SSL_CA_CERT_FILE },
159	{ "ca-path", required_argument, NULL, OPTION_SSL_CA_CERT_PATH },
160	{ "cert", required_argument, NULL, OPTION_SSL_CLIENT_CERT_FILE },
161	{ "key", required_argument, NULL, OPTION_SSL_CLIENT_KEY_FILE },
162	{ "crl", required_argument, NULL, OPTION_SSL_CRL_FILE },
163	{ "no-sslv3", no_argument, NULL, OPTION_SSL_NO_SSL3 },
164	{ "no-tlsv1", no_argument, NULL, OPTION_SSL_NO_TLS1 },
165	{ "no-verify-hostname", no_argument, NULL, OPTION_SSL_NO_VERIFY_HOSTNAME },
166	{ "no-verify-peer", no_argument, NULL, OPTION_SSL_NO_VERIFY_PEER },
167
168	{ NULL, 0, NULL, 0 }
169};
170
171/*
172 * Signal handler
173 */
174static void
175sig_handler(int sig)
176{
177	switch (sig) {
178	case SIGALRM:
179		sigalrm = 1;
180		break;
181	case SIGINFO:
182		siginfo = 1;
183		break;
184	case SIGINT:
185		sigint = 1;
186		break;
187	}
188}
189
190struct xferstat {
191	char		 name[64];
192	struct timeval	 start;		/* start of transfer */
193	struct timeval	 last;		/* time of last update */
194	struct timeval	 last2;		/* time of previous last update */
195	off_t		 size;		/* size of file per HTTP hdr */
196	off_t		 offset;	/* starting offset in file */
197	off_t		 rcvd;		/* bytes already received */
198	off_t		 lastrcvd;	/* bytes received since last update */
199};
200
201/*
202 * Compute and display ETA
203 */
204static const char *
205stat_eta(struct xferstat *xs)
206{
207	static char str[16];
208	long elapsed, eta;
209	off_t received, expected;
210
211	elapsed = xs->last.tv_sec - xs->start.tv_sec;
212	received = xs->rcvd - xs->offset;
213	expected = xs->size - xs->rcvd;
214	eta = (long)((double)elapsed * expected / received);
215	if (eta > 3600)
216		snprintf(str, sizeof str, "%02ldh%02ldm",
217		    eta / 3600, (eta % 3600) / 60);
218	else if (eta > 0)
219		snprintf(str, sizeof str, "%02ldm%02lds",
220		    eta / 60, eta % 60);
221	else
222		snprintf(str, sizeof str, "%02ldm%02lds",
223		    elapsed / 60, elapsed % 60);
224	return (str);
225}
226
227/*
228 * Format a number as "xxxx YB" where Y is ' ', 'k', 'M'...
229 */
230static const char *prefixes = " kMGTP";
231static const char *
232stat_bytes(off_t bytes)
233{
234	static char str[16];
235	const char *prefix = prefixes;
236
237	while (bytes > 9999 && prefix[1] != '\0') {
238		bytes /= 1024;
239		prefix++;
240	}
241	snprintf(str, sizeof str, "%4jd %cB", (intmax_t)bytes, *prefix);
242	return (str);
243}
244
245/*
246 * Compute and display transfer rate
247 */
248static const char *
249stat_bps(struct xferstat *xs)
250{
251	static char str[16];
252	double delta, bps;
253
254	delta = (xs->last.tv_sec + (xs->last.tv_usec / 1.e6))
255	    - (xs->last2.tv_sec + (xs->last2.tv_usec / 1.e6));
256
257	if (delta == 0.0) {
258		snprintf(str, sizeof str, "?? Bps");
259	} else {
260		bps = (xs->rcvd - xs->lastrcvd) / delta;
261		snprintf(str, sizeof str, "%sps", stat_bytes((off_t)bps));
262	}
263	return (str);
264}
265
266/*
267 * Update the stats display
268 */
269static void
270stat_display(struct xferstat *xs, int force)
271{
272	struct timeval now;
273	int ctty_pgrp;
274
275	/* check if we're the foreground process */
276	if (ioctl(STDERR_FILENO, TIOCGPGRP, &ctty_pgrp) == -1 ||
277	    (pid_t)ctty_pgrp != pgrp)
278		return;
279
280	gettimeofday(&now, NULL);
281	if (!force && now.tv_sec <= xs->last.tv_sec)
282		return;
283	xs->last2 = xs->last;
284	xs->last = now;
285
286	fprintf(stderr, "\r%-46.46s", xs->name);
287	if (xs->size <= 0) {
288		setproctitle("%s [%s]", xs->name, stat_bytes(xs->rcvd));
289		fprintf(stderr, "        %s", stat_bytes(xs->rcvd));
290	} else {
291		setproctitle("%s [%d%% of %s]", xs->name,
292		    (int)((100.0 * xs->rcvd) / xs->size),
293		    stat_bytes(xs->size));
294		fprintf(stderr, "%3d%% of %s",
295		    (int)((100.0 * xs->rcvd) / xs->size),
296		    stat_bytes(xs->size));
297	}
298	if (force == 2) {
299		xs->lastrcvd = xs->offset;
300		xs->last2 = xs->start;
301	}
302	fprintf(stderr, " %s", stat_bps(xs));
303	if ((xs->size > 0 && xs->rcvd > 0 &&
304	     xs->last.tv_sec >= xs->start.tv_sec + 3) ||
305	    force == 2)
306		fprintf(stderr, " %s", stat_eta(xs));
307	xs->lastrcvd = xs->rcvd;
308}
309
310/*
311 * Initialize the transfer statistics
312 */
313static void
314stat_start(struct xferstat *xs, const char *name, off_t size, off_t offset)
315{
316	snprintf(xs->name, sizeof xs->name, "%s", name);
317	gettimeofday(&xs->start, NULL);
318	xs->last.tv_sec = xs->last.tv_usec = 0;
319	xs->size = size;
320	xs->offset = offset;
321	xs->rcvd = offset;
322	xs->lastrcvd = offset;
323	if (v_tty && v_level > 0)
324		stat_display(xs, 1);
325	else if (v_level > 0)
326		fprintf(stderr, "%-46s", xs->name);
327}
328
329/*
330 * Update the transfer statistics
331 */
332static void
333stat_update(struct xferstat *xs, off_t rcvd)
334{
335	xs->rcvd = rcvd;
336	if (v_tty && v_level > 0)
337		stat_display(xs, 0);
338}
339
340/*
341 * Finalize the transfer statistics
342 */
343static void
344stat_end(struct xferstat *xs)
345{
346	gettimeofday(&xs->last, NULL);
347	if (v_tty && v_level > 0) {
348		stat_display(xs, 2);
349		putc('\n', stderr);
350	} else if (v_level > 0) {
351		fprintf(stderr, "        %s %s\n",
352		    stat_bytes(xs->size), stat_bps(xs));
353	}
354}
355
356/*
357 * Ask the user for authentication details
358 */
359static int
360query_auth(struct url *URL)
361{
362	struct termios tios;
363	tcflag_t saved_flags;
364	int i, nopwd;
365
366	fprintf(stderr, "Authentication required for <%s://%s:%d/>!\n",
367	    URL->scheme, URL->host, URL->port);
368
369	fprintf(stderr, "Login: ");
370	if (fgets(URL->user, sizeof URL->user, stdin) == NULL)
371		return (-1);
372	for (i = strlen(URL->user); i >= 0; --i)
373		if (URL->user[i] == '\r' || URL->user[i] == '\n')
374			URL->user[i] = '\0';
375
376	fprintf(stderr, "Password: ");
377	if (tcgetattr(STDIN_FILENO, &tios) == 0) {
378		saved_flags = tios.c_lflag;
379		tios.c_lflag &= ~ECHO;
380		tios.c_lflag |= ECHONL|ICANON;
381		tcsetattr(STDIN_FILENO, TCSAFLUSH|TCSASOFT, &tios);
382		nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
383		tios.c_lflag = saved_flags;
384		tcsetattr(STDIN_FILENO, TCSANOW|TCSASOFT, &tios);
385	} else {
386		nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
387	}
388	if (nopwd)
389		return (-1);
390	for (i = strlen(URL->pwd); i >= 0; --i)
391		if (URL->pwd[i] == '\r' || URL->pwd[i] == '\n')
392			URL->pwd[i] = '\0';
393
394	return (0);
395}
396
397/*
398 * Fetch a file
399 */
400static int
401fetch(char *URL, const char *path)
402{
403	struct url *url;
404	struct url_stat us;
405	struct stat sb, nsb;
406	struct xferstat xs;
407	FILE *f, *of;
408	size_t size, readcnt, wr;
409	off_t count;
410	char flags[8];
411	const char *slash;
412	char *tmppath;
413	int r;
414	unsigned timeout;
415	char *ptr;
416
417	f = of = NULL;
418	tmppath = NULL;
419
420	timeout = 0;
421	*flags = 0;
422	count = 0;
423
424	/* set verbosity level */
425	if (v_level > 1)
426		strcat(flags, "v");
427	if (v_level > 2)
428		fetchDebug = 1;
429
430	/* parse URL */
431	url = NULL;
432	if (*URL == '\0') {
433		warnx("empty URL");
434		goto failure;
435	}
436	if ((url = fetchParseURL(URL)) == NULL) {
437		warnx("%s: parse error", URL);
438		goto failure;
439	}
440
441	/* if no scheme was specified, take a guess */
442	if (!*url->scheme) {
443		if (!*url->host)
444			strcpy(url->scheme, SCHEME_FILE);
445		else if (strncasecmp(url->host, "ftp.", 4) == 0)
446			strcpy(url->scheme, SCHEME_FTP);
447		else if (strncasecmp(url->host, "www.", 4) == 0)
448			strcpy(url->scheme, SCHEME_HTTP);
449	}
450
451	/* common flags */
452	switch (family) {
453	case PF_INET:
454		strcat(flags, "4");
455		break;
456	case PF_INET6:
457		strcat(flags, "6");
458		break;
459	}
460
461	/* FTP specific flags */
462	if (strcmp(url->scheme, SCHEME_FTP) == 0) {
463		if (p_flag)
464			strcat(flags, "p");
465		if (d_flag)
466			strcat(flags, "d");
467		if (U_flag)
468			strcat(flags, "l");
469		timeout = T_secs ? T_secs : ftp_timeout;
470	}
471
472	/* HTTP specific flags */
473	if (strcmp(url->scheme, SCHEME_HTTP) == 0 ||
474	    strcmp(url->scheme, SCHEME_HTTPS) == 0) {
475		if (d_flag)
476			strcat(flags, "d");
477		if (A_flag)
478			strcat(flags, "A");
479		timeout = T_secs ? T_secs : http_timeout;
480		if (i_flag) {
481			if (stat(i_filename, &sb)) {
482				warn("%s: stat()", i_filename);
483				goto failure;
484			}
485			url->ims_time = sb.st_mtime;
486			strcat(flags, "i");
487		}
488	}
489
490	/* set the protocol timeout. */
491	fetchTimeout = timeout;
492
493	/* just print size */
494	if (s_flag) {
495		if (timeout)
496			alarm(timeout);
497		r = fetchStat(url, &us, flags);
498		if (timeout)
499			alarm(0);
500		if (sigalrm || sigint)
501			goto signal;
502		if (r == -1) {
503			warnx("%s", fetchLastErrString);
504			goto failure;
505		}
506		if (us.size == -1)
507			printf("Unknown\n");
508		else
509			printf("%jd\n", (intmax_t)us.size);
510		goto success;
511	}
512
513	/*
514	 * If the -r flag was specified, we have to compare the local
515	 * and remote files, so we should really do a fetchStat()
516	 * first, but I know of at least one HTTP server that only
517	 * sends the content size in response to GET requests, and
518	 * leaves it out of replies to HEAD requests.  Also, in the
519	 * (frequent) case that the local and remote files match but
520	 * the local file is truncated, we have sufficient information
521	 * before the compare to issue a correct request.  Therefore,
522	 * we always issue a GET request as if we were sure the local
523	 * file was a truncated copy of the remote file; we can drop
524	 * the connection later if we change our minds.
525	 */
526	sb.st_size = -1;
527	if (!o_stdout) {
528		r = stat(path, &sb);
529		if (r == 0 && r_flag && S_ISREG(sb.st_mode)) {
530			url->offset = sb.st_size;
531		} else if (r == -1 || !S_ISREG(sb.st_mode)) {
532			/*
533			 * Whatever value sb.st_size has now is either
534			 * wrong (if stat(2) failed) or irrelevant (if the
535			 * path does not refer to a regular file)
536			 */
537			sb.st_size = -1;
538		}
539		if (r == -1 && errno != ENOENT) {
540			warnx("%s: stat()", path);
541			goto failure;
542		}
543	}
544
545	/* start the transfer */
546	if (timeout)
547		alarm(timeout);
548	f = fetchXGet(url, &us, flags);
549	if (timeout)
550		alarm(0);
551	if (sigalrm || sigint)
552		goto signal;
553	if (f == NULL) {
554		warnx("%s: %s", URL, fetchLastErrString);
555		if (i_flag && strcmp(url->scheme, SCHEME_HTTP) == 0
556		    && fetchLastErrCode == FETCH_OK
557		    && strcmp(fetchLastErrString, "Not Modified") == 0) {
558			/* HTTP Not Modified Response, return OK. */
559			r = 0;
560			goto done;
561		} else
562			goto failure;
563	}
564	if (sigint)
565		goto signal;
566
567	/* check that size is as expected */
568	if (S_size) {
569		if (us.size == -1) {
570			warnx("%s: size unknown", URL);
571		} else if (us.size != S_size) {
572			warnx("%s: size mismatch: expected %jd, actual %jd",
573			    URL, (intmax_t)S_size, (intmax_t)us.size);
574			goto failure;
575		}
576	}
577
578	/* symlink instead of copy */
579	if (l_flag && strcmp(url->scheme, "file") == 0 && !o_stdout) {
580		if (symlink(url->doc, path) == -1) {
581			warn("%s: symlink()", path);
582			goto failure;
583		}
584		goto success;
585	}
586
587	if (us.size == -1 && !o_stdout && v_level > 0)
588		warnx("%s: size of remote file is not known", URL);
589	if (v_level > 1) {
590		if (sb.st_size != -1)
591			fprintf(stderr, "local size / mtime: %jd / %ld\n",
592			    (intmax_t)sb.st_size, (long)sb.st_mtime);
593		if (us.size != -1)
594			fprintf(stderr, "remote size / mtime: %jd / %ld\n",
595			    (intmax_t)us.size, (long)us.mtime);
596	}
597
598	/* open output file */
599	if (o_stdout) {
600		/* output to stdout */
601		of = stdout;
602	} else if (r_flag && sb.st_size != -1) {
603		/* resume mode, local file exists */
604		if (!F_flag && us.mtime && sb.st_mtime != us.mtime) {
605			/* no match! have to refetch */
606			fclose(f);
607			/* if precious, warn the user and give up */
608			if (R_flag) {
609				warnx("%s: local modification time "
610				    "does not match remote", path);
611				goto failure_keep;
612			}
613		} else if (url->offset > sb.st_size) {
614			/* gap between what we asked for and what we got */
615			warnx("%s: gap in resume mode", URL);
616			fclose(of);
617			of = NULL;
618			/* picked up again later */
619		} else if (us.size != -1) {
620			if (us.size == sb.st_size)
621				/* nothing to do */
622				goto success;
623			if (sb.st_size > us.size) {
624				/* local file too long! */
625				warnx("%s: local file (%jd bytes) is longer "
626				    "than remote file (%jd bytes)", path,
627				    (intmax_t)sb.st_size, (intmax_t)us.size);
628				goto failure;
629			}
630			/* we got it, open local file */
631			if ((of = fopen(path, "r+")) == NULL) {
632				warn("%s: fopen()", path);
633				goto failure;
634			}
635			/* check that it didn't move under our feet */
636			if (fstat(fileno(of), &nsb) == -1) {
637				/* can't happen! */
638				warn("%s: fstat()", path);
639				goto failure;
640			}
641			if (nsb.st_dev != sb.st_dev ||
642			    nsb.st_ino != sb.st_ino ||
643			    nsb.st_size != sb.st_size) {
644				warnx("%s: file has changed", URL);
645				fclose(of);
646				of = NULL;
647				sb = nsb;
648				/* picked up again later */
649			}
650		}
651		/* seek to where we left off */
652		if (of != NULL && fseeko(of, url->offset, SEEK_SET) != 0) {
653			warn("%s: fseeko()", path);
654			fclose(of);
655			of = NULL;
656			/* picked up again later */
657		}
658	} else if (m_flag && sb.st_size != -1) {
659		/* mirror mode, local file exists */
660		if (sb.st_size == us.size && sb.st_mtime == us.mtime)
661			goto success;
662	}
663
664	if (of == NULL) {
665		/*
666		 * We don't yet have an output file; either this is a
667		 * vanilla run with no special flags, or the local and
668		 * remote files didn't match.
669		 */
670
671		if (url->offset > 0) {
672			/*
673			 * We tried to restart a transfer, but for
674			 * some reason gave up - so we have to restart
675			 * from scratch if we want the whole file
676			 */
677			url->offset = 0;
678			if ((f = fetchXGet(url, &us, flags)) == NULL) {
679				warnx("%s: %s", URL, fetchLastErrString);
680				goto failure;
681			}
682			if (sigint)
683				goto signal;
684		}
685
686		/* construct a temp file name */
687		if (sb.st_size != -1 && S_ISREG(sb.st_mode)) {
688			if ((slash = strrchr(path, '/')) == NULL)
689				slash = path;
690			else
691				++slash;
692			asprintf(&tmppath, "%.*s.fetch.XXXXXX.%s",
693			    (int)(slash - path), path, slash);
694			if (tmppath != NULL) {
695				if (mkstemps(tmppath, strlen(slash) + 1) == -1) {
696					warn("%s: mkstemps()", path);
697					goto failure;
698				}
699				of = fopen(tmppath, "w");
700				chown(tmppath, sb.st_uid, sb.st_gid);
701				chmod(tmppath, sb.st_mode & ALLPERMS);
702			}
703		}
704		if (of == NULL)
705			of = fopen(path, "w");
706		if (of == NULL) {
707			warn("%s: open()", path);
708			goto failure;
709		}
710	}
711	count = url->offset;
712
713	/* start the counter */
714	stat_start(&xs, path, us.size, count);
715
716	sigalrm = siginfo = sigint = 0;
717
718	/* suck in the data */
719	setvbuf(f, NULL, _IOFBF, B_size);
720	signal(SIGINFO, sig_handler);
721	while (!sigint) {
722		if (us.size != -1 && us.size - count < B_size &&
723		    us.size - count >= 0)
724			size = us.size - count;
725		else
726			size = B_size;
727		if (siginfo) {
728			stat_end(&xs);
729			siginfo = 0;
730		}
731
732		if (size == 0)
733			break;
734
735		if ((readcnt = fread(buf, 1, size, f)) < size) {
736			if (ferror(f) && errno == EINTR && !sigint)
737				clearerr(f);
738			else if (readcnt == 0)
739				break;
740		}
741
742		stat_update(&xs, count += readcnt);
743		for (ptr = buf; readcnt > 0; ptr += wr, readcnt -= wr)
744			if ((wr = fwrite(ptr, 1, readcnt, of)) < readcnt) {
745				if (ferror(of) && errno == EINTR && !sigint)
746					clearerr(of);
747				else
748					break;
749			}
750		if (readcnt != 0)
751			break;
752	}
753	if (!sigalrm)
754		sigalrm = ferror(f) && errno == ETIMEDOUT;
755	signal(SIGINFO, SIG_DFL);
756
757	stat_end(&xs);
758
759	/*
760	 * If the transfer timed out or was interrupted, we still want to
761	 * set the mtime in case the file is not removed (-r or -R) and
762	 * the user later restarts the transfer.
763	 */
764 signal:
765	/* set mtime of local file */
766	if (!n_flag && us.mtime && !o_stdout && of != NULL &&
767	    (stat(path, &sb) != -1) && sb.st_mode & S_IFREG) {
768		struct timeval tv[2];
769
770		fflush(of);
771		tv[0].tv_sec = (long)(us.atime ? us.atime : us.mtime);
772		tv[1].tv_sec = (long)us.mtime;
773		tv[0].tv_usec = tv[1].tv_usec = 0;
774		if (utimes(tmppath ? tmppath : path, tv))
775			warn("%s: utimes()", tmppath ? tmppath : path);
776	}
777
778	/* timed out or interrupted? */
779	if (sigalrm)
780		warnx("transfer timed out");
781	if (sigint) {
782		warnx("transfer interrupted");
783		goto failure;
784	}
785
786	/* timeout / interrupt before connection completley established? */
787	if (f == NULL)
788		goto failure;
789
790	if (!sigalrm) {
791		/* check the status of our files */
792		if (ferror(f))
793			warn("%s", URL);
794		if (ferror(of))
795			warn("%s", path);
796		if (ferror(f) || ferror(of))
797			goto failure;
798	}
799
800	/* did the transfer complete normally? */
801	if (us.size != -1 && count < us.size) {
802		warnx("%s appears to be truncated: %jd/%jd bytes",
803		    path, (intmax_t)count, (intmax_t)us.size);
804		goto failure_keep;
805	}
806
807	/*
808	 * If the transfer timed out and we didn't know how much to
809	 * expect, assume the worst (i.e. we didn't get all of it)
810	 */
811	if (sigalrm && us.size == -1) {
812		warnx("%s may be truncated", path);
813		goto failure_keep;
814	}
815
816 success:
817	r = 0;
818	if (tmppath != NULL && rename(tmppath, path) == -1) {
819		warn("%s: rename()", path);
820		goto failure_keep;
821	}
822	goto done;
823 failure:
824	if (of && of != stdout && !R_flag && !r_flag)
825		if (stat(path, &sb) != -1 && (sb.st_mode & S_IFREG))
826			unlink(tmppath ? tmppath : path);
827	if (R_flag && tmppath != NULL && sb.st_size == -1)
828		rename(tmppath, path); /* ignore errors here */
829 failure_keep:
830	r = -1;
831	goto done;
832 done:
833	if (f)
834		fclose(f);
835	if (of && of != stdout)
836		fclose(of);
837	if (url)
838		fetchFreeURL(url);
839	if (tmppath != NULL)
840		free(tmppath);
841	return (r);
842}
843
844static void
845usage(void)
846{
847	fprintf(stderr, "%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
848"usage: fetch [-146AadFlMmnPpqRrsUv] [--allow-sslv2] [-B bytes]",
849"       [--bind-address=host] [--ca-cert=file] [--ca-path=dir] [--cert=file]",
850"       [--crl=file] [-i file] [--key=file] [-N file] [--no-passive]",
851"       [--no-proxy=list] [--no-sslv3] [--no-tlsv1] [--no-verify-hostname]",
852"       [--no-verify-peer] [-o file] [--referer=URL] [-S bytes] [-T seconds]",
853"       [--user-agent=agent-string] [-w seconds] URL ...",
854"       fetch [-146AadFlMmnPpqRrsUv] [--allow-sslv2] [-B bytes]",
855"       [--bind-address=host] [--ca-cert=file] [--ca-path=dir] [--cert=file]",
856"       [--crl=file] [-i file] [--key=file] [-N file] [--no-passive]",
857"       [--no-proxy=list] [--no-sslv3] [--no-tlsv1] [--no-verify-hostname]",
858"       [--no-verify-peer] [-o file] [--referer=URL] [-S bytes] [-T seconds]",
859"       [--user-agent=agent-string] [-w seconds] -h host -f file [-c dir]");
860}
861
862
863/*
864 * Entry point
865 */
866int
867main(int argc, char *argv[])
868{
869	struct stat sb;
870	struct sigaction sa;
871	const char *p, *s;
872	char *end, *q;
873	int c, e, r;
874
875
876	while ((c = getopt_long(argc, argv,
877	    "146AaB:bc:dFf:Hh:i:lMmN:nPpo:qRrS:sT:tUvw:",
878	    longopts, NULL)) != -1)
879		switch (c) {
880		case '1':
881			once_flag = 1;
882			break;
883		case '4':
884			family = PF_INET;
885			break;
886		case '6':
887			family = PF_INET6;
888			break;
889		case 'A':
890			A_flag = 1;
891			break;
892		case 'a':
893			a_flag = 1;
894			break;
895		case 'B':
896			B_size = (off_t)strtol(optarg, &end, 10);
897			if (*optarg == '\0' || *end != '\0')
898				errx(1, "invalid buffer size (%s)", optarg);
899			break;
900		case 'b':
901			warnx("warning: the -b option is deprecated");
902			b_flag = 1;
903			break;
904		case 'c':
905			c_dirname = optarg;
906			break;
907		case 'd':
908			d_flag = 1;
909			break;
910		case 'F':
911			F_flag = 1;
912			break;
913		case 'f':
914			f_filename = optarg;
915			break;
916		case 'H':
917			warnx("the -H option is now implicit, "
918			    "use -U to disable");
919			break;
920		case 'h':
921			h_hostname = optarg;
922			break;
923		case 'i':
924			i_flag = 1;
925			i_filename = optarg;
926			break;
927		case 'l':
928			l_flag = 1;
929			break;
930		case 'o':
931			o_flag = 1;
932			o_filename = optarg;
933			break;
934		case 'M':
935		case 'm':
936			if (r_flag)
937				errx(1, "the -m and -r flags "
938				    "are mutually exclusive");
939			m_flag = 1;
940			break;
941		case 'N':
942			N_filename = optarg;
943			break;
944		case 'n':
945			n_flag = 1;
946			break;
947		case 'P':
948		case 'p':
949			p_flag = 1;
950			break;
951		case 'q':
952			v_level = 0;
953			break;
954		case 'R':
955			R_flag = 1;
956			break;
957		case 'r':
958			if (m_flag)
959				errx(1, "the -m and -r flags "
960				    "are mutually exclusive");
961			r_flag = 1;
962			break;
963		case 'S':
964			S_size = (off_t)strtol(optarg, &end, 10);
965			if (*optarg == '\0' || *end != '\0')
966				errx(1, "invalid size (%s)", optarg);
967			break;
968		case 's':
969			s_flag = 1;
970			break;
971		case 'T':
972			T_secs = strtol(optarg, &end, 10);
973			if (*optarg == '\0' || *end != '\0')
974				errx(1, "invalid timeout (%s)", optarg);
975			break;
976		case 't':
977			t_flag = 1;
978			warnx("warning: the -t option is deprecated");
979			break;
980		case 'U':
981			U_flag = 1;
982			break;
983		case 'v':
984			v_level++;
985			break;
986		case 'w':
987			a_flag = 1;
988			w_secs = strtol(optarg, &end, 10);
989			if (*optarg == '\0' || *end != '\0')
990				errx(1, "invalid delay (%s)", optarg);
991			break;
992		case OPTION_BIND_ADDRESS:
993			setenv("FETCH_BIND_ADDRESS", optarg, 1);
994			break;
995		case OPTION_NO_FTP_PASSIVE_MODE:
996			setenv("FTP_PASSIVE_MODE", "no", 1);
997			break;
998		case OPTION_HTTP_REFERER:
999			setenv("HTTP_REFERER", optarg, 1);
1000			break;
1001		case OPTION_HTTP_USER_AGENT:
1002			setenv("HTTP_USER_AGENT", optarg, 1);
1003			break;
1004		case OPTION_NO_PROXY:
1005			setenv("NO_PROXY", optarg, 1);
1006			break;
1007		case OPTION_SSL_ALLOW_SSL2:
1008			setenv("SSL_ALLOW_SSL2", "", 1);
1009			break;
1010		case OPTION_SSL_CA_CERT_FILE:
1011			setenv("SSL_CA_CERT_FILE", optarg, 1);
1012			break;
1013		case OPTION_SSL_CA_CERT_PATH:
1014			setenv("SSL_CA_CERT_PATH", optarg, 1);
1015			break;
1016		case OPTION_SSL_CLIENT_CERT_FILE:
1017			setenv("SSL_CLIENT_CERT_FILE", optarg, 1);
1018			break;
1019		case OPTION_SSL_CLIENT_KEY_FILE:
1020			setenv("SSL_CLIENT_KEY_FILE", optarg, 1);
1021			break;
1022		case OPTION_SSL_CRL_FILE:
1023			setenv("SSL_CLIENT_CRL_FILE", optarg, 1);
1024			break;
1025		case OPTION_SSL_NO_SSL3:
1026			setenv("SSL_NO_SSL3", "", 1);
1027			break;
1028		case OPTION_SSL_NO_TLS1:
1029			setenv("SSL_NO_TLS1", "", 1);
1030			break;
1031		case OPTION_SSL_NO_VERIFY_HOSTNAME:
1032			setenv("SSL_NO_VERIFY_HOSTNAME", "", 1);
1033			break;
1034		case OPTION_SSL_NO_VERIFY_PEER:
1035			setenv("SSL_NO_VERIFY_PEER", "", 1);
1036			break;
1037		default:
1038			usage();
1039			exit(1);
1040		}
1041
1042	argc -= optind;
1043	argv += optind;
1044
1045	if (h_hostname || f_filename || c_dirname) {
1046		if (!h_hostname || !f_filename || argc) {
1047			usage();
1048			exit(1);
1049		}
1050		/* XXX this is a hack. */
1051		if (strcspn(h_hostname, "@:/") != strlen(h_hostname))
1052			errx(1, "invalid hostname");
1053		if (asprintf(argv, "ftp://%s/%s/%s", h_hostname,
1054		    c_dirname ? c_dirname : "", f_filename) == -1)
1055			errx(1, "%s", strerror(ENOMEM));
1056		argc++;
1057	}
1058
1059	if (!argc) {
1060		usage();
1061		exit(1);
1062	}
1063
1064	/* allocate buffer */
1065	if (B_size < MINBUFSIZE)
1066		B_size = MINBUFSIZE;
1067	if ((buf = malloc(B_size)) == NULL)
1068		errx(1, "%s", strerror(ENOMEM));
1069
1070	/* timeouts */
1071	if ((s = getenv("FTP_TIMEOUT")) != NULL) {
1072		ftp_timeout = strtol(s, &end, 10);
1073		if (*s == '\0' || *end != '\0' || ftp_timeout < 0) {
1074			warnx("FTP_TIMEOUT (%s) is not a positive integer", s);
1075			ftp_timeout = 0;
1076		}
1077	}
1078	if ((s = getenv("HTTP_TIMEOUT")) != NULL) {
1079		http_timeout = strtol(s, &end, 10);
1080		if (*s == '\0' || *end != '\0' || http_timeout < 0) {
1081			warnx("HTTP_TIMEOUT (%s) is not a positive integer", s);
1082			http_timeout = 0;
1083		}
1084	}
1085
1086	/* signal handling */
1087	sa.sa_flags = 0;
1088	sa.sa_handler = sig_handler;
1089	sigemptyset(&sa.sa_mask);
1090	sigaction(SIGALRM, &sa, NULL);
1091	sa.sa_flags = SA_RESETHAND;
1092	sigaction(SIGINT, &sa, NULL);
1093	fetchRestartCalls = 0;
1094
1095	/* output file */
1096	if (o_flag) {
1097		if (strcmp(o_filename, "-") == 0) {
1098			o_stdout = 1;
1099		} else if (stat(o_filename, &sb) == -1) {
1100			if (errno == ENOENT) {
1101				if (argc > 1)
1102					errx(1, "%s is not a directory",
1103					    o_filename);
1104			} else {
1105				err(1, "%s", o_filename);
1106			}
1107		} else {
1108			if (sb.st_mode & S_IFDIR)
1109				o_directory = 1;
1110		}
1111	}
1112
1113	/* check if output is to a tty (for progress report) */
1114	v_tty = isatty(STDERR_FILENO);
1115	if (v_tty)
1116		pgrp = getpgrp();
1117
1118	r = 0;
1119
1120	/* authentication */
1121	if (v_tty)
1122		fetchAuthMethod = query_auth;
1123	if (N_filename != NULL)
1124		if (setenv("NETRC", N_filename, 1) == -1)
1125			err(1, "setenv: cannot set NETRC=%s", N_filename);
1126
1127	while (argc) {
1128		if ((p = strrchr(*argv, '/')) == NULL)
1129			p = *argv;
1130		else
1131			p++;
1132
1133		if (!*p)
1134			p = "fetch.out";
1135
1136		fetchLastErrCode = 0;
1137
1138		if (o_flag) {
1139			if (o_stdout) {
1140				e = fetch(*argv, "-");
1141			} else if (o_directory) {
1142				asprintf(&q, "%s/%s", o_filename, p);
1143				e = fetch(*argv, q);
1144				free(q);
1145			} else {
1146				e = fetch(*argv, o_filename);
1147			}
1148		} else {
1149			e = fetch(*argv, p);
1150		}
1151
1152		if (sigint)
1153			kill(getpid(), SIGINT);
1154
1155		if (e == 0 && once_flag)
1156			exit(0);
1157
1158		if (e) {
1159			r = 1;
1160			if ((fetchLastErrCode
1161			    && fetchLastErrCode != FETCH_UNAVAIL
1162			    && fetchLastErrCode != FETCH_MOVED
1163			    && fetchLastErrCode != FETCH_URL
1164			    && fetchLastErrCode != FETCH_RESOLV
1165			    && fetchLastErrCode != FETCH_UNKNOWN)) {
1166				if (w_secs && v_level)
1167					fprintf(stderr, "Waiting %ld seconds "
1168					    "before retrying\n", w_secs);
1169				if (w_secs)
1170					sleep(w_secs);
1171				if (a_flag)
1172					continue;
1173			}
1174		}
1175
1176		argc--, argv++;
1177	}
1178
1179	exit(r);
1180}
1181