1/*-
2 * SPDX-License-Identifier: BSD-3-Clause
3 *
4 * Copyright (c) 2000-2014 Dag-Erling Sm��rgrav
5 * Copyright (c) 2013 Michael Gmelin <freebsd@grem.de>
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 *    notice, this list of conditions and the following disclaimer
13 *    in this position and unchanged.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 *    notice, this list of conditions and the following disclaimer in the
16 *    documentation and/or other materials provided with the distribution.
17 * 3. The name of the author may not be used to endorse or promote products
18 *    derived from this software without specific prior written permission
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
22 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
23 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
24 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
25 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
29 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 */
31
32#include <sys/param.h>
33#include <sys/socket.h>
34#include <sys/stat.h>
35#include <sys/time.h>
36
37#include <ctype.h>
38#include <err.h>
39#include <errno.h>
40#include <getopt.h>
41#include <signal.h>
42#include <stdint.h>
43#include <stdio.h>
44#include <stdlib.h>
45#include <string.h>
46#include <termios.h>
47#include <unistd.h>
48
49#include <fetch.h>
50
51#define MINBUFSIZE	16384
52#define TIMEOUT		120
53
54/* Option flags */
55static int	 A_flag;	/*    -A: do not follow 302 redirects */
56static int	 a_flag;	/*    -a: auto retry */
57static off_t	 B_size;	/*    -B: buffer size */
58static int	 b_flag;	/*!   -b: workaround TCP bug */
59static char    *c_dirname;	/*    -c: remote directory */
60static int	 d_flag;	/*    -d: direct connection */
61static int	 F_flag;	/*    -F: restart without checking mtime  */
62static char	*f_filename;	/*    -f: file to fetch */
63static char	*h_hostname;	/*    -h: host to fetch from */
64static int	 i_flag;	/*    -i: specify file for mtime comparison */
65static char	*i_filename;	/*        name of input file */
66static int	 l_flag;	/*    -l: link rather than copy file: URLs */
67static int	 m_flag;	/* -[Mm]: mirror mode */
68static char	*N_filename;	/*    -N: netrc file name */
69static int	 n_flag;	/*    -n: do not preserve modification time */
70static int	 o_flag;	/*    -o: specify output file */
71static int	 o_directory;	/*        output file is a directory */
72static char	*o_filename;	/*        name of output file */
73static int	 o_stdout;	/*        output file is stdout */
74static int	 once_flag;	/*    -1: stop at first successful file */
75static int	 p_flag;	/* -[Pp]: use passive FTP */
76static int	 R_flag;	/*    -R: don't delete partial files */
77static int	 r_flag;	/*    -r: restart previous transfer */
78static off_t	 S_size;        /*    -S: require size to match */
79static int	 s_flag;        /*    -s: show size, don't fetch */
80static long	 T_secs;	/*    -T: transfer timeout in seconds */
81static int	 t_flag;	/*!   -t: workaround TCP bug */
82static int	 U_flag;	/*    -U: do not use high ports */
83static int	 v_level = 1;	/*    -v: verbosity level */
84static int	 v_tty;		/*        stdout is a tty */
85static int	 v_progress;	/*        whether to display progress */
86static pid_t	 pgrp;		/*        our process group */
87static long	 w_secs;	/*    -w: retry delay */
88static int	 family = PF_UNSPEC;	/* -[46]: address family to use */
89
90static int	 sigalrm;	/* SIGALRM received */
91static int	 siginfo;	/* SIGINFO received */
92static int	 sigint;	/* SIGINT received */
93
94static long	 ftp_timeout = TIMEOUT;	/* default timeout for FTP transfers */
95static long	 http_timeout = TIMEOUT;/* default timeout for HTTP transfers */
96static char	*buf;		/* transfer buffer */
97
98enum options
99{
100	OPTION_BIND_ADDRESS,
101	OPTION_NO_FTP_PASSIVE_MODE,
102	OPTION_HTTP_REFERER,
103	OPTION_HTTP_USER_AGENT,
104	OPTION_NO_PROXY,
105	OPTION_SSL_CA_CERT_FILE,
106	OPTION_SSL_CA_CERT_PATH,
107	OPTION_SSL_CLIENT_CERT_FILE,
108	OPTION_SSL_CLIENT_KEY_FILE,
109	OPTION_SSL_CRL_FILE,
110	OPTION_SSL_NO_SSL3,
111	OPTION_SSL_NO_TLS1,
112	OPTION_SSL_NO_VERIFY_HOSTNAME,
113	OPTION_SSL_NO_VERIFY_PEER
114};
115
116
117static struct option longopts[] =
118{
119	/* mapping to single character argument */
120	{ "one-file", no_argument, NULL, '1' },
121	{ "ipv4-only", no_argument, NULL, '4' },
122	{ "ipv6-only", no_argument, NULL, '6' },
123	{ "no-redirect", no_argument, NULL, 'A' },
124	{ "retry", no_argument, NULL, 'a' },
125	{ "buffer-size", required_argument, NULL, 'B' },
126	/* -c not mapped, since it's deprecated */
127	{ "direct", no_argument, NULL, 'd' },
128	{ "force-restart", no_argument, NULL, 'F' },
129	/* -f not mapped, since it's deprecated */
130	/* -h not mapped, since it's deprecated */
131	{ "if-modified-since", required_argument, NULL, 'i' },
132	{ "symlink", no_argument, NULL, 'l' },
133	/* -M not mapped since it's the same as -m */
134	{ "mirror", no_argument, NULL, 'm' },
135	{ "netrc", required_argument, NULL, 'N' },
136	{ "no-mtime", no_argument, NULL, 'n' },
137	{ "output", required_argument, NULL, 'o' },
138	/* -P not mapped since it's the same as -p */
139	{ "passive", no_argument, NULL, 'p' },
140	{ "quiet", no_argument, NULL, 'q' },
141	{ "keep-output", no_argument, NULL, 'R' },
142	{ "restart", no_argument, NULL, 'r' },
143	{ "require-size", required_argument, NULL, 'S' },
144	{ "print-size", no_argument, NULL, 's' },
145	{ "timeout", required_argument, NULL, 'T' },
146	{ "passive-portrange-default", no_argument, NULL, 'T' },
147	{ "verbose", no_argument, NULL, 'v' },
148	{ "retry-delay", required_argument, NULL, 'w' },
149
150	/* options without a single character equivalent */
151	{ "bind-address", required_argument, NULL, OPTION_BIND_ADDRESS },
152	{ "no-passive", no_argument, NULL, OPTION_NO_FTP_PASSIVE_MODE },
153	{ "referer", required_argument, NULL, OPTION_HTTP_REFERER },
154	{ "user-agent", required_argument, NULL, OPTION_HTTP_USER_AGENT },
155	{ "no-proxy", required_argument, NULL, OPTION_NO_PROXY },
156	{ "ca-cert", required_argument, NULL, OPTION_SSL_CA_CERT_FILE },
157	{ "ca-path", required_argument, NULL, OPTION_SSL_CA_CERT_PATH },
158	{ "cert", required_argument, NULL, OPTION_SSL_CLIENT_CERT_FILE },
159	{ "key", required_argument, NULL, OPTION_SSL_CLIENT_KEY_FILE },
160	{ "crl", required_argument, NULL, OPTION_SSL_CRL_FILE },
161	{ "no-sslv3", no_argument, NULL, OPTION_SSL_NO_SSL3 },
162	{ "no-tlsv1", no_argument, NULL, OPTION_SSL_NO_TLS1 },
163	{ "no-verify-hostname", no_argument, NULL, OPTION_SSL_NO_VERIFY_HOSTNAME },
164	{ "no-verify-peer", no_argument, NULL, OPTION_SSL_NO_VERIFY_PEER },
165
166	{ NULL, 0, NULL, 0 }
167};
168
169/*
170 * Signal handler
171 */
172static void
173sig_handler(int sig)
174{
175	switch (sig) {
176	case SIGALRM:
177		sigalrm = 1;
178		break;
179	case SIGINFO:
180		siginfo = 1;
181		break;
182	case SIGINT:
183		sigint = 1;
184		break;
185	}
186}
187
188struct xferstat {
189	char		 name[64];
190	struct timeval	 start;		/* start of transfer */
191	struct timeval	 last;		/* time of last update */
192	struct timeval	 last2;		/* time of previous last update */
193	off_t		 size;		/* size of file per HTTP hdr */
194	off_t		 offset;	/* starting offset in file */
195	off_t		 rcvd;		/* bytes already received */
196	off_t		 lastrcvd;	/* bytes received since last update */
197};
198
199/*
200 * Format a number of seconds as either XXdYYh, XXhYYm, XXmYYs, or XXs
201 * depending on its magnitude
202 */
203static void
204stat_seconds(char *str, size_t strsz, long seconds)
205{
206
207	if (seconds > 86400)
208		snprintf(str, strsz, "%02ldd%02ldh",
209		    seconds / 86400, (seconds % 86400) / 3600);
210	else if (seconds > 3600)
211		snprintf(str, strsz, "%02ldh%02ldm",
212		    seconds / 3600, (seconds % 3600) / 60);
213	else if (seconds > 60)
214		snprintf(str, strsz, "%02ldm%02lds",
215		    seconds / 60, seconds % 60);
216	else
217		snprintf(str, strsz, "   %02lds",
218		    seconds);
219}
220
221/*
222 * Compute and display ETA
223 */
224static void
225stat_eta(char *str, size_t strsz, const struct xferstat *xs)
226{
227	long elapsed, eta;
228	off_t received, expected;
229
230	elapsed = xs->last.tv_sec - xs->start.tv_sec;
231	received = xs->rcvd - xs->offset;
232	expected = xs->size - xs->rcvd;
233	eta = (long)((double)elapsed * expected / received);
234	if (eta > 0)
235		stat_seconds(str, strsz, eta);
236	else
237		stat_seconds(str, strsz, elapsed);
238}
239
240/*
241 * Format a number as "xxxx YB" where Y is ' ', 'k', 'M'...
242 */
243static const char *prefixes = " kMGTP";
244static void
245stat_bytes(char *str, size_t strsz, off_t bytes)
246{
247	const char *prefix = prefixes;
248
249	while (bytes > 9999 && prefix[1] != '\0') {
250		bytes /= 1024;
251		prefix++;
252	}
253	snprintf(str, strsz, "%4ju %cB", (uintmax_t)bytes, *prefix);
254}
255
256/*
257 * Compute and display transfer rate
258 */
259static void
260stat_bps(char *str, size_t strsz, struct xferstat *xs)
261{
262	char bytes[16];
263	double delta, bps;
264
265	delta = ((double)xs->last.tv_sec + (xs->last.tv_usec / 1.e6))
266	    - ((double)xs->last2.tv_sec + (xs->last2.tv_usec / 1.e6));
267
268	if (delta == 0.0) {
269		snprintf(str, strsz, "?? Bps");
270	} else {
271		bps = (xs->rcvd - xs->lastrcvd) / delta;
272		stat_bytes(bytes, sizeof bytes, (off_t)bps);
273		snprintf(str, strsz, "%sps", bytes);
274	}
275}
276
277/*
278 * Update the stats display
279 */
280static void
281stat_display(struct xferstat *xs, int force)
282{
283	char bytes[16], bps[16], eta[16];
284	struct timeval now;
285	int ctty_pgrp;
286
287	/* check if we're the foreground process */
288	if (ioctl(STDERR_FILENO, TIOCGPGRP, &ctty_pgrp) != 0 ||
289	    (pid_t)ctty_pgrp != pgrp)
290		return;
291
292	gettimeofday(&now, NULL);
293	if (!force && now.tv_sec <= xs->last.tv_sec)
294		return;
295	xs->last2 = xs->last;
296	xs->last = now;
297
298	fprintf(stderr, "\r%-46.46s", xs->name);
299	if (xs->rcvd >= xs->size) {
300		stat_bytes(bytes, sizeof bytes, xs->rcvd);
301		setproctitle("%s [%s]", xs->name, bytes);
302		fprintf(stderr, "        %s", bytes);
303	} else {
304		stat_bytes(bytes, sizeof bytes, xs->size);
305		setproctitle("%s [%d%% of %s]", xs->name,
306		    (int)((100.0 * xs->rcvd) / xs->size),
307		    bytes);
308		fprintf(stderr, "%3d%% of %s",
309		    (int)((100.0 * xs->rcvd) / xs->size),
310		    bytes);
311	}
312	if (force == 2) {
313		xs->lastrcvd = xs->offset;
314		xs->last2 = xs->start;
315	}
316	stat_bps(bps, sizeof bps, xs);
317	fprintf(stderr, " %s", bps);
318	if ((xs->size > 0 && xs->rcvd > 0 &&
319	     xs->last.tv_sec >= xs->start.tv_sec + 3) ||
320	    force == 2) {
321		stat_eta(eta, sizeof eta, xs);
322		fprintf(stderr, " %s", eta);
323	}
324	xs->lastrcvd = xs->rcvd;
325}
326
327/*
328 * Initialize the transfer statistics
329 */
330static void
331stat_start(struct xferstat *xs, const char *name, off_t size, off_t offset)
332{
333
334	memset(xs, 0, sizeof *xs);
335	snprintf(xs->name, sizeof xs->name, "%s", name);
336	gettimeofday(&xs->start, NULL);
337	xs->last2 = xs->last = xs->start;
338	xs->size = size;
339	xs->offset = offset;
340	xs->rcvd = offset;
341	xs->lastrcvd = offset;
342	if (v_progress)
343		stat_display(xs, 1);
344	else if (v_level > 0)
345		fprintf(stderr, "%-46s", xs->name);
346}
347
348/*
349 * Update the transfer statistics
350 */
351static void
352stat_update(struct xferstat *xs, off_t rcvd)
353{
354
355	xs->rcvd = rcvd;
356	if (v_progress)
357		stat_display(xs, 0);
358}
359
360/*
361 * Finalize the transfer statistics
362 */
363static void
364stat_end(struct xferstat *xs)
365{
366	char bytes[16], bps[16], eta[16];
367
368	gettimeofday(&xs->last, NULL);
369	if (v_progress) {
370		stat_display(xs, 2);
371		putc('\n', stderr);
372	} else if (v_level > 0) {
373		stat_bytes(bytes, sizeof bytes, xs->rcvd);
374		stat_bps(bps, sizeof bps, xs);
375		stat_eta(eta, sizeof eta, xs);
376		fprintf(stderr, "        %s %s %s\n", bytes, bps, eta);
377	}
378}
379
380/*
381 * Ask the user for authentication details
382 */
383static int
384query_auth(struct url *URL)
385{
386	struct termios tios;
387	tcflag_t saved_flags;
388	int i, nopwd;
389
390	fprintf(stderr, "Authentication required for <%s://%s:%d/>!\n",
391	    URL->scheme, URL->host, URL->port);
392
393	fprintf(stderr, "Login: ");
394	if (fgets(URL->user, sizeof URL->user, stdin) == NULL)
395		return (-1);
396	for (i = strlen(URL->user); i >= 0; --i)
397		if (URL->user[i] == '\r' || URL->user[i] == '\n')
398			URL->user[i] = '\0';
399
400	fprintf(stderr, "Password: ");
401	if (tcgetattr(STDIN_FILENO, &tios) == 0) {
402		saved_flags = tios.c_lflag;
403		tios.c_lflag &= ~ECHO;
404		tios.c_lflag |= ECHONL|ICANON;
405		tcsetattr(STDIN_FILENO, TCSAFLUSH|TCSASOFT, &tios);
406		nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
407		tios.c_lflag = saved_flags;
408		tcsetattr(STDIN_FILENO, TCSANOW|TCSASOFT, &tios);
409	} else {
410		nopwd = (fgets(URL->pwd, sizeof URL->pwd, stdin) == NULL);
411	}
412	if (nopwd)
413		return (-1);
414	for (i = strlen(URL->pwd); i >= 0; --i)
415		if (URL->pwd[i] == '\r' || URL->pwd[i] == '\n')
416			URL->pwd[i] = '\0';
417
418	return (0);
419}
420
421/*
422 * Fetch a file
423 */
424static int
425fetch(char *URL, const char *path, int *is_http)
426{
427	struct url *url;
428	struct url_stat us;
429	struct stat sb, nsb;
430	struct xferstat xs;
431	FILE *f, *of;
432	size_t size, readcnt, wr;
433	off_t count, size_prev;
434	char flags[8];
435	const char *slash;
436	char *tmppath;
437	int r, tries;
438	unsigned timeout;
439	char *ptr;
440
441	f = of = NULL;
442	tmppath = NULL;
443
444	timeout = 0;
445	*flags = 0;
446	count = 0;
447
448	/* set verbosity level */
449	if (v_level > 1)
450		strcat(flags, "v");
451	if (v_level > 2)
452		fetchDebug = 1;
453
454	/* parse URL */
455	url = NULL;
456	if (*URL == '\0') {
457		warnx("empty URL");
458		goto failure;
459	}
460	if ((url = fetchParseURL(URL)) == NULL) {
461		warnx("%s: parse error", URL);
462		goto failure;
463	}
464
465	/* if no scheme was specified, take a guess */
466	if (!*url->scheme) {
467		if (!*url->host)
468			strcpy(url->scheme, SCHEME_FILE);
469		else if (strncasecmp(url->host, "ftp.", 4) == 0)
470			strcpy(url->scheme, SCHEME_FTP);
471		else if (strncasecmp(url->host, "www.", 4) == 0)
472			strcpy(url->scheme, SCHEME_HTTP);
473	}
474
475	/* for both of http and https */
476	*is_http = strncmp(url->scheme, "http", 4) == 0;
477
478	/* common flags */
479	switch (family) {
480	case PF_INET:
481		strcat(flags, "4");
482		break;
483	case PF_INET6:
484		strcat(flags, "6");
485		break;
486	}
487
488	/* FTP specific flags */
489	if (strcmp(url->scheme, SCHEME_FTP) == 0) {
490		if (p_flag)
491			strcat(flags, "p");
492		if (d_flag)
493			strcat(flags, "d");
494		if (U_flag)
495			strcat(flags, "l");
496		timeout = T_secs ? T_secs : ftp_timeout;
497	}
498
499	/* HTTP specific flags */
500	if (strcmp(url->scheme, SCHEME_HTTP) == 0 ||
501	    strcmp(url->scheme, SCHEME_HTTPS) == 0) {
502		if (d_flag)
503			strcat(flags, "d");
504		if (A_flag)
505			strcat(flags, "A");
506		timeout = T_secs ? T_secs : http_timeout;
507		if (i_flag) {
508			if (stat(i_filename, &sb)) {
509				warn("%s: stat()", i_filename);
510				goto failure;
511			}
512			url->ims_time = sb.st_mtime;
513			strcat(flags, "i");
514		}
515	}
516
517	/* set the protocol timeout. */
518	fetchTimeout = timeout;
519
520	/* just print size */
521	if (s_flag) {
522		if (timeout)
523			alarm(timeout);
524		r = fetchStat(url, &us, flags);
525		if (timeout)
526			alarm(0);
527		if (sigalrm || sigint)
528			goto signal;
529		if (r == -1) {
530			warnx("%s", fetchLastErrString);
531			goto failure;
532		}
533		if (us.size == -1)
534			printf("Unknown\n");
535		else
536			printf("%jd\n", (intmax_t)us.size);
537		goto success;
538	}
539
540	tries = 1;
541again:
542	r = 0;
543	/*
544	 * If the -r flag was specified, we have to compare the local
545	 * and remote files, so we should really do a fetchStat()
546	 * first, but I know of at least one HTTP server that only
547	 * sends the content size in response to GET requests, and
548	 * leaves it out of replies to HEAD requests.  Also, in the
549	 * (frequent) case that the local and remote files match but
550	 * the local file is truncated, we have sufficient information
551	 * before the compare to issue a correct request.  Therefore,
552	 * we always issue a GET request as if we were sure the local
553	 * file was a truncated copy of the remote file; we can drop
554	 * the connection later if we change our minds.
555	 */
556	sb.st_size = -1;
557	if (!o_stdout) {
558		r = stat(path, &sb);
559		if (r == 0 && (r_flag || tries > 1) && S_ISREG(sb.st_mode)) {
560			url->offset = sb.st_size;
561		} else if (r == -1 || !S_ISREG(sb.st_mode)) {
562			/*
563			 * Whatever value sb.st_size has now is either
564			 * wrong (if stat(2) failed) or irrelevant (if the
565			 * path does not refer to a regular file)
566			 */
567			sb.st_size = -1;
568		}
569		if (r == -1 && errno != ENOENT) {
570			warnx("%s: stat()", path);
571			goto failure;
572		}
573	}
574	size_prev = sb.st_size;
575
576	/* start the transfer */
577	if (timeout)
578		alarm(timeout);
579	f = fetchXGet(url, &us, flags);
580	if (timeout)
581		alarm(0);
582	if (sigalrm || sigint)
583		goto signal;
584	if (f == NULL) {
585		warnx("%s: %s", URL, fetchLastErrString);
586		if (i_flag && (strcmp(url->scheme, SCHEME_HTTP) == 0 ||
587		    strcmp(url->scheme, SCHEME_HTTPS) == 0) &&
588		    fetchLastErrCode == FETCH_OK &&
589		    strcmp(fetchLastErrString, "Not Modified") == 0) {
590			/* HTTP Not Modified Response, return OK. */
591			r = 0;
592			goto done;
593		} else
594			goto failure;
595	}
596	if (sigint)
597		goto signal;
598
599	/* check that size is as expected */
600	if (S_size) {
601		if (us.size == -1) {
602			warnx("%s: size unknown", URL);
603		} else if (us.size != S_size) {
604			warnx("%s: size mismatch: expected %jd, actual %jd",
605			    URL, (intmax_t)S_size, (intmax_t)us.size);
606			goto failure;
607		}
608	}
609
610	/* symlink instead of copy */
611	if (l_flag && strcmp(url->scheme, "file") == 0 && !o_stdout) {
612		if (symlink(url->doc, path) == -1) {
613			warn("%s: symlink()", path);
614			goto failure;
615		}
616		goto success;
617	}
618
619	if (us.size == -1 && !o_stdout && v_level > 0)
620		warnx("%s: size of remote file is not known", URL);
621	if (v_level > 1) {
622		if (sb.st_size != -1)
623			fprintf(stderr, "local size / mtime: %jd / %ld\n",
624			    (intmax_t)sb.st_size, (long)sb.st_mtime);
625		if (us.size != -1)
626			fprintf(stderr, "remote size / mtime: %jd / %ld\n",
627			    (intmax_t)us.size, (long)us.mtime);
628	}
629
630	/* open output file */
631	if (o_stdout) {
632		/* output to stdout */
633		of = stdout;
634	} else if (r_flag && sb.st_size != -1) {
635		/* resume mode, local file exists */
636		if (!F_flag && us.mtime && sb.st_mtime != us.mtime && tries == 1) {
637			/* no match! have to refetch */
638			fclose(f);
639			/* if precious, warn the user and give up */
640			if (R_flag) {
641				warnx("%s: local modification time "
642				    "does not match remote", path);
643				goto failure_keep;
644			}
645		} else if (url->offset > sb.st_size) {
646			/* gap between what we asked for and what we got */
647			warnx("%s: gap in resume mode", URL);
648			fclose(of);
649			of = NULL;
650			/* picked up again later */
651		} else if (us.size != -1) {
652			if (us.size == sb.st_size)
653				/* nothing to do */
654				goto success;
655			if (sb.st_size > us.size) {
656				/* local file too long! */
657				warnx("%s: local file (%jd bytes) is longer "
658				    "than remote file (%jd bytes)", path,
659				    (intmax_t)sb.st_size, (intmax_t)us.size);
660				goto failure;
661			}
662			/* we got it, open local file */
663			if ((of = fopen(path, "r+")) == NULL) {
664				warn("%s: fopen()", path);
665				goto failure;
666			}
667			/* check that it didn't move under our feet */
668			if (fstat(fileno(of), &nsb) == -1) {
669				/* can't happen! */
670				warn("%s: fstat()", path);
671				goto failure;
672			}
673			if (nsb.st_dev != sb.st_dev ||
674			    nsb.st_ino != sb.st_ino ||
675			    nsb.st_size != sb.st_size) {
676				warnx("%s: file has changed", URL);
677				fclose(of);
678				of = NULL;
679				sb = nsb;
680				/* picked up again later */
681			}
682		}
683		/* seek to where we left off */
684		if (of != NULL && fseeko(of, url->offset, SEEK_SET) != 0) {
685			warn("%s: fseeko()", path);
686			fclose(of);
687			of = NULL;
688			/* picked up again later */
689		}
690	} else if (m_flag && sb.st_size != -1) {
691		/* mirror mode, local file exists */
692		if (sb.st_size == us.size && sb.st_mtime == us.mtime)
693			goto success;
694	}
695
696	if (of == NULL) {
697		/*
698		 * We don't yet have an output file; either this is a
699		 * vanilla run with no special flags, or the local and
700		 * remote files didn't match.
701		 */
702
703		if (url->offset > 0) {
704			/*
705			 * We tried to restart a transfer, but for
706			 * some reason gave up - so we have to restart
707			 * from scratch if we want the whole file
708			 */
709			url->offset = 0;
710			if ((f = fetchXGet(url, &us, flags)) == NULL) {
711				warnx("%s: %s", URL, fetchLastErrString);
712				goto failure;
713			}
714			if (sigint)
715				goto signal;
716		}
717
718		/* construct a temp file name */
719		if (sb.st_size != -1 && S_ISREG(sb.st_mode)) {
720			if ((slash = strrchr(path, '/')) == NULL)
721				slash = path;
722			else
723				++slash;
724			if(tmppath != NULL)
725				free(tmppath);
726			asprintf(&tmppath, "%.*s.fetch.XXXXXX.%s",
727			    (int)(slash - path), path, slash);
728			if (tmppath != NULL) {
729				if (mkstemps(tmppath, strlen(slash) + 1) == -1) {
730					warn("%s: mkstemps()", path);
731					goto failure;
732				}
733				of = fopen(tmppath, "w");
734				chown(tmppath, sb.st_uid, sb.st_gid);
735				chmod(tmppath, sb.st_mode & ALLPERMS);
736			}
737		}
738		if (of == NULL)
739			of = fopen(path, "w");
740		if (of == NULL) {
741			warn("%s: open()", path);
742			goto failure;
743		}
744	}
745	count = url->offset;
746
747	/* start the counter */
748	stat_start(&xs, path, us.size, count);
749
750	sigalrm = siginfo = sigint = 0;
751
752	/* suck in the data */
753	setvbuf(f, NULL, _IOFBF, B_size);
754	signal(SIGINFO, sig_handler);
755	while (!sigint) {
756		if (us.size != -1 && us.size - count < B_size &&
757		    us.size - count >= 0)
758			size = us.size - count;
759		else
760			size = B_size;
761		if (siginfo) {
762			stat_end(&xs);
763			siginfo = 0;
764		}
765
766		if (size == 0)
767			break;
768
769		if ((readcnt = fread(buf, 1, size, f)) < size) {
770			if (ferror(f) && errno == EINTR && !sigint)
771				clearerr(f);
772			else if (readcnt == 0)
773				break;
774		}
775
776		stat_update(&xs, count += readcnt);
777		for (ptr = buf; readcnt > 0; ptr += wr, readcnt -= wr)
778			if ((wr = fwrite(ptr, 1, readcnt, of)) < readcnt) {
779				if (ferror(of) && errno == EINTR && !sigint)
780					clearerr(of);
781				else
782					break;
783			}
784		if (readcnt != 0)
785			break;
786	}
787	if (!sigalrm)
788		sigalrm = ferror(f) && errno == ETIMEDOUT;
789	signal(SIGINFO, SIG_DFL);
790
791	stat_end(&xs);
792
793	/*
794	 * If the transfer timed out or was interrupted, we still want to
795	 * set the mtime in case the file is not removed (-r or -R) and
796	 * the user later restarts the transfer.
797	 */
798 signal:
799	/* set mtime of local file */
800	if (!n_flag && us.mtime && !o_stdout && of != NULL &&
801	    (stat(path, &sb) != -1) && sb.st_mode & S_IFREG) {
802		struct timeval tv[2];
803
804		fflush(of);
805		tv[0].tv_sec = (long)(us.atime ? us.atime : us.mtime);
806		tv[1].tv_sec = (long)us.mtime;
807		tv[0].tv_usec = tv[1].tv_usec = 0;
808		if (utimes(tmppath ? tmppath : path, tv))
809			warn("%s: utimes()", tmppath ? tmppath : path);
810	}
811
812	/* timed out or interrupted? */
813	if (sigalrm)
814		warnx("transfer timed out");
815	if (sigint) {
816		warnx("transfer interrupted");
817		goto failure;
818	}
819
820	/* timeout / interrupt before connection completley established? */
821	if (f == NULL)
822		goto failure;
823
824	if (!sigalrm) {
825		/* check the status of our files */
826		if (ferror(f))
827			warn("%s", URL);
828		if (ferror(of))
829			warn("%s", path);
830		if (ferror(f) || ferror(of))
831			goto failure;
832	}
833
834	/* did the transfer complete normally? */
835	if (us.size != -1 && count < us.size) {
836		warnx("%s appears to be truncated: %jd/%jd bytes",
837		    path, (intmax_t)count, (intmax_t)us.size);
838		if(!o_stdout && a_flag && count > size_prev) {
839			fclose(f);
840			if (w_secs)
841				sleep(w_secs);
842			tries++;
843			goto again;
844		}
845		goto failure_keep;
846	}
847
848	/*
849	 * If the transfer timed out and we didn't know how much to
850	 * expect, assume the worst (i.e. we didn't get all of it)
851	 */
852	if (sigalrm && us.size == -1) {
853		warnx("%s may be truncated", path);
854		goto failure_keep;
855	}
856
857 success:
858	r = 0;
859	if (tmppath != NULL && rename(tmppath, path) == -1) {
860		warn("%s: rename()", path);
861		goto failure_keep;
862	}
863	goto done;
864 failure:
865	if (of && of != stdout && !R_flag && !r_flag)
866		if (stat(path, &sb) != -1 && (sb.st_mode & S_IFREG))
867			unlink(tmppath ? tmppath : path);
868	if (R_flag && tmppath != NULL && sb.st_size == -1)
869		rename(tmppath, path); /* ignore errors here */
870 failure_keep:
871	r = -1;
872	goto done;
873 done:
874	if (f)
875		fclose(f);
876	if (of && of != stdout)
877		fclose(of);
878	if (url)
879		fetchFreeURL(url);
880	if (tmppath != NULL)
881		free(tmppath);
882	return (r);
883}
884
885static void
886usage(void)
887{
888	fprintf(stderr, "%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
889"usage: fetch [-146AadFlMmnPpqRrsUv] [-B bytes] [--bind-address=host]",
890"       [--ca-cert=file] [--ca-path=dir] [--cert=file] [--crl=file]",
891"       [-i file] [--key=file] [-N file] [--no-passive] [--no-proxy=list]",
892"       [--no-sslv3] [--no-tlsv1] [--no-verify-hostname] [--no-verify-peer]",
893"       [-o file] [--referer=URL] [-S bytes] [-T seconds]",
894"       [--user-agent=agent-string] [-w seconds] URL ...",
895"       fetch [-146AadFlMmnPpqRrsUv] [-B bytes] [--bind-address=host]",
896"       [--ca-cert=file] [--ca-path=dir] [--cert=file] [--crl=file]",
897"       [-i file] [--key=file] [-N file] [--no-passive] [--no-proxy=list]",
898"       [--no-sslv3] [--no-tlsv1] [--no-verify-hostname] [--no-verify-peer]",
899"       [-o file] [--referer=URL] [-S bytes] [-T seconds]",
900"       [--user-agent=agent-string] [-w seconds] -h host -f file [-c dir]");
901}
902
903
904/*
905 * Entry point
906 */
907int
908main(int argc, char *argv[])
909{
910	struct stat sb;
911	struct sigaction sa;
912	const char *p, *s;
913	char *end, *q;
914	int c, e, is_http, r;
915
916
917	while ((c = getopt_long(argc, argv,
918	    "146AaB:bc:dFf:Hh:i:lMmN:nPpo:qRrS:sT:tUvw:",
919	    longopts, NULL)) != -1)
920		switch (c) {
921		case '1':
922			once_flag = 1;
923			break;
924		case '4':
925			family = PF_INET;
926			break;
927		case '6':
928			family = PF_INET6;
929			break;
930		case 'A':
931			A_flag = 1;
932			break;
933		case 'a':
934			a_flag = 1;
935			break;
936		case 'B':
937			B_size = (off_t)strtol(optarg, &end, 10);
938			if (*optarg == '\0' || *end != '\0')
939				errx(1, "invalid buffer size (%s)", optarg);
940			break;
941		case 'b':
942			warnx("warning: the -b option is deprecated");
943			b_flag = 1;
944			break;
945		case 'c':
946			c_dirname = optarg;
947			break;
948		case 'd':
949			d_flag = 1;
950			break;
951		case 'F':
952			F_flag = 1;
953			break;
954		case 'f':
955			f_filename = optarg;
956			break;
957		case 'H':
958			warnx("the -H option is now implicit, "
959			    "use -U to disable");
960			break;
961		case 'h':
962			h_hostname = optarg;
963			break;
964		case 'i':
965			i_flag = 1;
966			i_filename = optarg;
967			break;
968		case 'l':
969			l_flag = 1;
970			break;
971		case 'o':
972			o_flag = 1;
973			o_filename = optarg;
974			break;
975		case 'M':
976		case 'm':
977			if (r_flag)
978				errx(1, "the -m and -r flags "
979				    "are mutually exclusive");
980			m_flag = 1;
981			break;
982		case 'N':
983			N_filename = optarg;
984			break;
985		case 'n':
986			n_flag = 1;
987			break;
988		case 'P':
989		case 'p':
990			p_flag = 1;
991			break;
992		case 'q':
993			v_level = 0;
994			break;
995		case 'R':
996			R_flag = 1;
997			break;
998		case 'r':
999			if (m_flag)
1000				errx(1, "the -m and -r flags "
1001				    "are mutually exclusive");
1002			r_flag = 1;
1003			break;
1004		case 'S':
1005			S_size = strtoll(optarg, &end, 10);
1006			if (*optarg == '\0' || *end != '\0')
1007				errx(1, "invalid size (%s)", optarg);
1008			break;
1009		case 's':
1010			s_flag = 1;
1011			break;
1012		case 'T':
1013			T_secs = strtol(optarg, &end, 10);
1014			if (*optarg == '\0' || *end != '\0')
1015				errx(1, "invalid timeout (%s)", optarg);
1016			break;
1017		case 't':
1018			t_flag = 1;
1019			warnx("warning: the -t option is deprecated");
1020			break;
1021		case 'U':
1022			U_flag = 1;
1023			break;
1024		case 'v':
1025			v_level++;
1026			break;
1027		case 'w':
1028			a_flag = 1;
1029			w_secs = strtol(optarg, &end, 10);
1030			if (*optarg == '\0' || *end != '\0')
1031				errx(1, "invalid delay (%s)", optarg);
1032			break;
1033		case OPTION_BIND_ADDRESS:
1034			setenv("FETCH_BIND_ADDRESS", optarg, 1);
1035			break;
1036		case OPTION_NO_FTP_PASSIVE_MODE:
1037			setenv("FTP_PASSIVE_MODE", "no", 1);
1038			break;
1039		case OPTION_HTTP_REFERER:
1040			setenv("HTTP_REFERER", optarg, 1);
1041			break;
1042		case OPTION_HTTP_USER_AGENT:
1043			setenv("HTTP_USER_AGENT", optarg, 1);
1044			break;
1045		case OPTION_NO_PROXY:
1046			setenv("NO_PROXY", optarg, 1);
1047			break;
1048		case OPTION_SSL_CA_CERT_FILE:
1049			setenv("SSL_CA_CERT_FILE", optarg, 1);
1050			break;
1051		case OPTION_SSL_CA_CERT_PATH:
1052			setenv("SSL_CA_CERT_PATH", optarg, 1);
1053			break;
1054		case OPTION_SSL_CLIENT_CERT_FILE:
1055			setenv("SSL_CLIENT_CERT_FILE", optarg, 1);
1056			break;
1057		case OPTION_SSL_CLIENT_KEY_FILE:
1058			setenv("SSL_CLIENT_KEY_FILE", optarg, 1);
1059			break;
1060		case OPTION_SSL_CRL_FILE:
1061			setenv("SSL_CLIENT_CRL_FILE", optarg, 1);
1062			break;
1063		case OPTION_SSL_NO_SSL3:
1064			setenv("SSL_NO_SSL3", "", 1);
1065			break;
1066		case OPTION_SSL_NO_TLS1:
1067			setenv("SSL_NO_TLS1", "", 1);
1068			break;
1069		case OPTION_SSL_NO_VERIFY_HOSTNAME:
1070			setenv("SSL_NO_VERIFY_HOSTNAME", "", 1);
1071			break;
1072		case OPTION_SSL_NO_VERIFY_PEER:
1073			setenv("SSL_NO_VERIFY_PEER", "", 1);
1074			break;
1075		default:
1076			usage();
1077			exit(1);
1078		}
1079
1080	argc -= optind;
1081	argv += optind;
1082
1083	if (h_hostname || f_filename || c_dirname) {
1084		if (!h_hostname || !f_filename || argc) {
1085			usage();
1086			exit(1);
1087		}
1088		/* XXX this is a hack. */
1089		if (strcspn(h_hostname, "@:/") != strlen(h_hostname))
1090			errx(1, "invalid hostname");
1091		if (asprintf(argv, "ftp://%s/%s/%s", h_hostname,
1092		    c_dirname ? c_dirname : "", f_filename) == -1)
1093			errx(1, "%s", strerror(ENOMEM));
1094		argc++;
1095	}
1096
1097	if (!argc) {
1098		usage();
1099		exit(1);
1100	}
1101
1102	/* allocate buffer */
1103	if (B_size < MINBUFSIZE)
1104		B_size = MINBUFSIZE;
1105	if ((buf = malloc(B_size)) == NULL)
1106		errx(1, "%s", strerror(ENOMEM));
1107
1108	/* timeouts */
1109	if ((s = getenv("FTP_TIMEOUT")) != NULL) {
1110		ftp_timeout = strtol(s, &end, 10);
1111		if (*s == '\0' || *end != '\0' || ftp_timeout < 0) {
1112			warnx("FTP_TIMEOUT (%s) is not a positive integer", s);
1113			ftp_timeout = 0;
1114		}
1115	}
1116	if ((s = getenv("HTTP_TIMEOUT")) != NULL) {
1117		http_timeout = strtol(s, &end, 10);
1118		if (*s == '\0' || *end != '\0' || http_timeout < 0) {
1119			warnx("HTTP_TIMEOUT (%s) is not a positive integer", s);
1120			http_timeout = 0;
1121		}
1122	}
1123
1124	/* signal handling */
1125	sa.sa_flags = 0;
1126	sa.sa_handler = sig_handler;
1127	sigemptyset(&sa.sa_mask);
1128	sigaction(SIGALRM, &sa, NULL);
1129	sa.sa_flags = SA_RESETHAND;
1130	sigaction(SIGINT, &sa, NULL);
1131	fetchRestartCalls = 0;
1132
1133	/* output file */
1134	if (o_flag) {
1135		if (strcmp(o_filename, "-") == 0) {
1136			o_stdout = 1;
1137		} else if (stat(o_filename, &sb) == -1) {
1138			if (errno == ENOENT) {
1139				if (argc > 1)
1140					errx(1, "%s is not a directory",
1141					    o_filename);
1142			} else {
1143				err(1, "%s", o_filename);
1144			}
1145		} else {
1146			if (sb.st_mode & S_IFDIR)
1147				o_directory = 1;
1148		}
1149	}
1150
1151	/* check if output is to a tty (for progress report) */
1152	v_tty = isatty(STDERR_FILENO);
1153	v_progress = v_tty && v_level > 0;
1154	if (v_progress)
1155		pgrp = getpgrp();
1156
1157	r = 0;
1158
1159	/* authentication */
1160	if (v_tty)
1161		fetchAuthMethod = query_auth;
1162	if (N_filename != NULL)
1163		if (setenv("NETRC", N_filename, 1) == -1)
1164			err(1, "setenv: cannot set NETRC=%s", N_filename);
1165
1166	while (argc) {
1167		if ((p = strrchr(*argv, '/')) == NULL)
1168			p = *argv;
1169		else
1170			p++;
1171
1172		if (!*p)
1173			p = "fetch.out";
1174
1175		fetchLastErrCode = 0;
1176
1177		if (o_flag) {
1178			if (o_stdout) {
1179				e = fetch(*argv, "-", &is_http);
1180			} else if (o_directory) {
1181				asprintf(&q, "%s/%s", o_filename, p);
1182				e = fetch(*argv, q, &is_http);
1183				free(q);
1184			} else {
1185				e = fetch(*argv, o_filename, &is_http);
1186			}
1187		} else {
1188			e = fetch(*argv, p, &is_http);
1189		}
1190
1191		if (sigint)
1192			kill(getpid(), SIGINT);
1193
1194		if (e == 0 && once_flag)
1195			exit(0);
1196
1197		if (e) {
1198			r = 1;
1199			if ((fetchLastErrCode
1200			    && fetchLastErrCode != FETCH_AUTH
1201			    && fetchLastErrCode != FETCH_UNAVAIL
1202			    && fetchLastErrCode != FETCH_MOVED
1203			    && fetchLastErrCode != FETCH_URL
1204			    && fetchLastErrCode != FETCH_RESOLV
1205			    && fetchLastErrCode != FETCH_UNKNOWN
1206			    && (!is_http || (
1207			    	   fetchLastErrCode != FETCH_PROTO
1208			    	&& fetchLastErrCode != FETCH_SERVER
1209			    	&& fetchLastErrCode != FETCH_TEMP
1210			    	&& fetchLastErrCode != FETCH_TIMEOUT
1211			    )))) {
1212				if (w_secs && v_level)
1213					fprintf(stderr, "Waiting %ld seconds "
1214					    "before retrying\n", w_secs);
1215				if (w_secs)
1216					sleep(w_secs);
1217				if (a_flag)
1218					continue;
1219			}
1220		}
1221
1222		argc--, argv++;
1223	}
1224
1225	exit(r);
1226}
1227