blob: be5df4178f3b7d250c210a8f1a2334714ba34db5 [file] [log] [blame]
rspangler@google.com49fdf182009-10-10 00:57:34 +00001// Copyright (c) 2009 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
rspangler@google.com49fdf182009-10-10 00:57:34 +00005#include "update_engine/libcurl_http_fetcher.h"
Andrew de los Reyesd57d1472010-10-21 13:34:08 -07006
adlr@google.comc98a7ed2009-12-04 18:54:03 +00007#include <algorithm>
Andrew de los Reyesd57d1472010-10-21 13:34:08 -07008#include <string>
9
10#include <base/logging.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070011#include <base/strings/string_util.h>
12#include <base/strings/stringprintf.h>
Andrew de los Reyesd57d1472010-10-21 13:34:08 -070013
Bruno Rocha7f9aea22011-09-12 14:31:24 -070014#include "update_engine/certificate_checker.h"
J. Richard Barnette056b0ab2013-10-29 15:24:56 -070015#include "update_engine/hardware_interface.h"
Gilad Arnold1b9d6ae2014-03-03 13:46:07 -080016#include "update_engine/real_dbus_wrapper.h"
Andrew de los Reyesd57d1472010-10-21 13:34:08 -070017#include "update_engine/utils.h"
adlr@google.comc98a7ed2009-12-04 18:54:03 +000018
Alex Deymoc4acdf42014-05-28 21:07:10 -070019using google::protobuf::NewPermanentCallback;
adlr@google.comc98a7ed2009-12-04 18:54:03 +000020using std::make_pair;
Alex Deymoc4acdf42014-05-28 21:07:10 -070021using std::max;
Andrew de los Reyesd57d1472010-10-21 13:34:08 -070022using std::string;
rspangler@google.com49fdf182009-10-10 00:57:34 +000023
24// This is a concrete implementation of HttpFetcher that uses libcurl to do the
25// http work.
26
27namespace chromeos_update_engine {
28
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -070029namespace {
Andrew de los Reyes5d0783d2010-11-29 18:14:16 -080030const int kNoNetworkRetrySeconds = 10;
Ken Mixterb2bf1222010-11-18 17:29:38 -080031const char kCACertificatesPath[] = "/usr/share/chromeos-ca-certificates";
Andrew de los Reyesd57d1472010-10-21 13:34:08 -070032} // namespace {}
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -070033
rspangler@google.com49fdf182009-10-10 00:57:34 +000034LibcurlHttpFetcher::~LibcurlHttpFetcher() {
Darin Petkov9ce452b2010-11-17 14:33:28 -080035 LOG_IF(ERROR, transfer_in_progress_)
36 << "Destroying the fetcher while a transfer is in progress.";
rspangler@google.com49fdf182009-10-10 00:57:34 +000037 CleanUp();
38}
39
Andrew de los Reyesd57d1472010-10-21 13:34:08 -070040// On error, returns false.
Jay Srinivasan43488792012-06-19 00:25:31 -070041bool LibcurlHttpFetcher::IsUpdateAllowedOverCurrentConnection() const {
Andrew de los Reyesd57d1472010-10-21 13:34:08 -070042 NetworkConnectionType type;
Alex Deymo6ae91202014-03-10 19:21:25 -070043 NetworkTethering tethering;
Gilad Arnold1b9d6ae2014-03-03 13:46:07 -080044 RealDBusWrapper dbus_iface;
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080045 ConnectionManager* connection_manager = system_state_->connection_manager();
Alex Deymo6ae91202014-03-10 19:21:25 -070046 if (!connection_manager->GetConnectionProperties(&dbus_iface,
47 &type, &tethering)) {
Chris Sosa133f8922013-11-06 16:39:16 -080048 LOG(INFO) << "We could not determine our connection type. "
49 << "Defaulting to allow updates.";
50 return true;
51 }
Alex Deymo6ae91202014-03-10 19:21:25 -070052 bool is_allowed = connection_manager->IsUpdateAllowedOver(type, tethering);
Andrew de los Reyesd57d1472010-10-21 13:34:08 -070053 LOG(INFO) << "We are connected via "
Jay Srinivasan43488792012-06-19 00:25:31 -070054 << connection_manager->StringForConnectionType(type)
55 << ", Updates allowed: " << (is_allowed ? "Yes" : "No");
56 return is_allowed;
Andrew de los Reyesd57d1472010-10-21 13:34:08 -070057}
58
Gilad Arnold59d9e012013-07-23 16:41:43 -070059bool LibcurlHttpFetcher::GetProxyType(const std::string& proxy,
60 curl_proxytype* out_type) {
61 if (utils::StringHasPrefix(proxy, "socks5://") ||
62 utils::StringHasPrefix(proxy, "socks://")) {
63 *out_type = CURLPROXY_SOCKS5_HOSTNAME;
64 return true;
65 }
66 if (utils::StringHasPrefix(proxy, "socks4://")) {
67 *out_type = CURLPROXY_SOCKS4A;
68 return true;
69 }
70 if (utils::StringHasPrefix(proxy, "http://") ||
71 utils::StringHasPrefix(proxy, "https://")) {
72 *out_type = CURLPROXY_HTTP;
73 return true;
74 }
75 if (utils::StringHasPrefix(proxy, kNoProxy)) {
76 // known failure case. don't log.
77 return false;
78 }
79 LOG(INFO) << "Unknown proxy type: " << proxy;
80 return false;
81}
82
adlr@google.comc98a7ed2009-12-04 18:54:03 +000083void LibcurlHttpFetcher::ResumeTransfer(const std::string& url) {
Andrew de los Reyes3270f742010-07-15 22:28:14 -070084 LOG(INFO) << "Starting/Resuming transfer";
rspangler@google.com49fdf182009-10-10 00:57:34 +000085 CHECK(!transfer_in_progress_);
86 url_ = url;
87 curl_multi_handle_ = curl_multi_init();
88 CHECK(curl_multi_handle_);
89
90 curl_handle_ = curl_easy_init();
91 CHECK(curl_handle_);
92
Andrew de los Reyes45168102010-11-22 11:13:50 -080093 CHECK(HasProxy());
Gilad Arnoldfbaee242012-04-04 15:59:43 -070094 bool is_direct = (GetCurrentProxy() == kNoProxy);
95 LOG(INFO) << "Using proxy: " << (is_direct ? "no" : "yes");
96 if (is_direct) {
Andrew de los Reyes45168102010-11-22 11:13:50 -080097 CHECK_EQ(curl_easy_setopt(curl_handle_,
98 CURLOPT_PROXY,
99 ""), CURLE_OK);
100 } else {
101 CHECK_EQ(curl_easy_setopt(curl_handle_,
102 CURLOPT_PROXY,
103 GetCurrentProxy().c_str()), CURLE_OK);
104 // Curl seems to require us to set the protocol
105 curl_proxytype type;
Gilad Arnold59d9e012013-07-23 16:41:43 -0700106 if (GetProxyType(GetCurrentProxy(), &type)) {
Andrew de los Reyes45168102010-11-22 11:13:50 -0800107 CHECK_EQ(curl_easy_setopt(curl_handle_,
108 CURLOPT_PROXYTYPE,
109 type), CURLE_OK);
110 }
111 }
112
rspangler@google.com49fdf182009-10-10 00:57:34 +0000113 if (post_data_set_) {
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000114 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_POST, 1), CURLE_OK);
115 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_POSTFIELDS,
116 &post_data_[0]),
117 CURLE_OK);
118 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_POSTFIELDSIZE,
119 post_data_.size()),
120 CURLE_OK);
Gilad Arnold9dd1e7c2012-02-16 12:13:36 -0800121
122 // Set the Content-Type HTTP header, if one was specifically set.
123 CHECK(!curl_http_headers_);
124 if (post_content_type_ != kHttpContentTypeUnspecified) {
125 const string content_type_attr =
126 base::StringPrintf("Content-Type: %s",
127 GetHttpContentTypeString(post_content_type_));
128 curl_http_headers_ = curl_slist_append(NULL, content_type_attr.c_str());
129 CHECK(curl_http_headers_);
130 CHECK_EQ(
131 curl_easy_setopt(curl_handle_, CURLOPT_HTTPHEADER,
132 curl_http_headers_),
133 CURLE_OK);
134 } else {
135 LOG(WARNING) << "no content type set, using libcurl default";
136 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000137 }
138
Gilad Arnolde4ad2502011-12-29 17:08:54 -0800139 if (bytes_downloaded_ > 0 || download_length_) {
140 // Resume from where we left off.
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000141 resume_offset_ = bytes_downloaded_;
Gilad Arnolde4ad2502011-12-29 17:08:54 -0800142 CHECK_GE(resume_offset_, 0);
143
144 // Compute end offset, if one is specified. As per HTTP specification, this
145 // is an inclusive boundary. Make sure it doesn't overflow.
146 size_t end_offset = 0;
147 if (download_length_) {
148 end_offset = static_cast<size_t>(resume_offset_) + download_length_ - 1;
149 CHECK_LE((size_t) resume_offset_, end_offset);
150 }
151
152 // Create a string representation of the desired range.
153 std::string range_str = (end_offset ?
Alex Vakulenko75039d72014-03-25 12:36:28 -0700154 base::StringPrintf("%jd-%zu", resume_offset_,
155 end_offset) :
156 base::StringPrintf("%jd-", resume_offset_));
Gilad Arnolde4ad2502011-12-29 17:08:54 -0800157 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_RANGE, range_str.c_str()),
158 CURLE_OK);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000159 }
160
161 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_WRITEDATA, this), CURLE_OK);
162 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_WRITEFUNCTION,
163 StaticLibcurlWrite), CURLE_OK);
Andrew de los Reyesd57d1472010-10-21 13:34:08 -0700164
165 string url_to_use(url_);
Jay Srinivasan43488792012-06-19 00:25:31 -0700166 if (!IsUpdateAllowedOverCurrentConnection()) {
167 LOG(INFO) << "Not initiating HTTP connection b/c updates are disabled "
168 << "over this connection";
Andrew de los Reyesd57d1472010-10-21 13:34:08 -0700169 url_to_use = ""; // Sabotage the URL
170 }
171
Darin Petkovfc7a0ce2010-10-25 10:38:37 -0700172 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_URL, url_to_use.c_str()),
Andrew de los Reyesd57d1472010-10-21 13:34:08 -0700173 CURLE_OK);
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700174
David Zeuthen34135a92013-08-06 11:16:16 -0700175 // If the connection drops under |low_speed_limit_bps_| (10
176 // bytes/sec by default) for |low_speed_time_seconds_| (90 seconds,
177 // 180 on non-official builds), reconnect.
178 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_LOW_SPEED_LIMIT,
179 low_speed_limit_bps_),
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700180 CURLE_OK);
David Zeuthen34135a92013-08-06 11:16:16 -0700181 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_LOW_SPEED_TIME,
182 low_speed_time_seconds_),
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700183 CURLE_OK);
David Zeuthen34135a92013-08-06 11:16:16 -0700184 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_CONNECTTIMEOUT,
185 connect_timeout_seconds_),
Andrew de los Reyese72f9c02011-04-20 10:47:40 -0700186 CURLE_OK);
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700187
Darin Petkov41c2fcf2010-08-25 13:14:48 -0700188 // By default, libcurl doesn't follow redirections. Allow up to
David Zeuthen34135a92013-08-06 11:16:16 -0700189 // |kDownloadMaxRedirects| redirections.
Darin Petkov3a4016a2010-09-28 13:54:17 -0700190 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_FOLLOWLOCATION, 1), CURLE_OK);
David Zeuthen34135a92013-08-06 11:16:16 -0700191 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_MAXREDIRS,
192 kDownloadMaxRedirects),
Darin Petkov41c2fcf2010-08-25 13:14:48 -0700193 CURLE_OK);
194
Nam T. Nguyen7d623eb2014-05-13 16:06:28 -0700195 // Lock down the appropriate curl options for HTTP or HTTPS depending on
196 // the url.
197 if (GetSystemState()->hardware()->IsOfficialBuild()) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800198 if (StartsWithASCII(url_to_use, "http://", false))
Jay Srinivasanb3f55402012-12-03 18:12:04 -0800199 SetCurlOptionsForHttp();
200 else
201 SetCurlOptionsForHttps();
202 } else {
Nam T. Nguyen7d623eb2014-05-13 16:06:28 -0700203 LOG(INFO) << "Not setting http(s) curl options because we are "
204 << "running a dev/test image";
Darin Petkovfc7a0ce2010-10-25 10:38:37 -0700205 }
206
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000207 CHECK_EQ(curl_multi_add_handle(curl_multi_handle_, curl_handle_), CURLM_OK);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000208 transfer_in_progress_ = true;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000209}
210
Jay Srinivasanb3f55402012-12-03 18:12:04 -0800211// Lock down only the protocol in case of HTTP.
212void LibcurlHttpFetcher::SetCurlOptionsForHttp() {
213 LOG(INFO) << "Setting up curl options for HTTP";
214 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, CURLPROTO_HTTP),
215 CURLE_OK);
216 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_REDIR_PROTOCOLS,
217 CURLPROTO_HTTP),
218 CURLE_OK);
219}
220
221// Security lock-down in official builds: makes sure that peer certificate
222// verification is enabled, restricts the set of trusted certificates,
223// restricts protocols to HTTPS, restricts ciphers to HIGH.
224void LibcurlHttpFetcher::SetCurlOptionsForHttps() {
225 LOG(INFO) << "Setting up curl options for HTTPS";
226 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_VERIFYPEER, 1),
227 CURLE_OK);
228 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_CAPATH, kCACertificatesPath),
229 CURLE_OK);
230 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, CURLPROTO_HTTPS),
231 CURLE_OK);
232 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_REDIR_PROTOCOLS,
233 CURLPROTO_HTTPS),
234 CURLE_OK);
235 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_CIPHER_LIST, "HIGH:!ADH"),
236 CURLE_OK);
237 if (check_certificate_ != CertificateChecker::kNone) {
238 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_CTX_DATA,
239 &check_certificate_),
240 CURLE_OK);
241 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_CTX_FUNCTION,
242 CertificateChecker::ProcessSSLContext),
243 CURLE_OK);
244 }
245}
246
247
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000248// Begins the transfer, which must not have already been started.
249void LibcurlHttpFetcher::BeginTransfer(const std::string& url) {
Andrew de los Reyesf3ed8e72011-02-16 10:35:46 -0800250 CHECK(!transfer_in_progress_);
251 url_ = url;
252 if (!ResolveProxiesForUrl(
253 url_,
Alex Deymoc4acdf42014-05-28 21:07:10 -0700254 NewPermanentCallback(this, &LibcurlHttpFetcher::ProxiesResolved))) {
Andrew de los Reyesf3ed8e72011-02-16 10:35:46 -0800255 LOG(ERROR) << "Couldn't resolve proxies";
256 if (delegate_)
257 delegate_->TransferComplete(this, false);
258 }
259}
260
261void LibcurlHttpFetcher::ProxiesResolved() {
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000262 transfer_size_ = -1;
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000263 resume_offset_ = 0;
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700264 retry_count_ = 0;
Darin Petkova0929552010-11-29 14:19:06 -0800265 no_network_retry_count_ = 0;
Darin Petkovcb466212010-08-26 09:40:11 -0700266 http_response_code_ = 0;
Andrew de los Reyes819fef22010-12-17 11:33:58 -0800267 terminate_requested_ = false;
Gilad Arnolda2dee1d2012-04-12 11:50:37 -0700268 sent_byte_ = false;
Andrew de los Reyesf3ed8e72011-02-16 10:35:46 -0800269 ResumeTransfer(url_);
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700270 CurlPerformOnce();
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000271}
272
Darin Petkov9ce452b2010-11-17 14:33:28 -0800273void LibcurlHttpFetcher::ForceTransferTermination() {
274 CleanUp();
275 if (delegate_) {
276 // Note that after the callback returns this object may be destroyed.
277 delegate_->TransferTerminated(this);
278 }
279}
280
rspangler@google.com49fdf182009-10-10 00:57:34 +0000281void LibcurlHttpFetcher::TerminateTransfer() {
Darin Petkov9ce452b2010-11-17 14:33:28 -0800282 if (in_write_callback_) {
Andrew de los Reyes3fd5d302010-10-07 20:07:18 -0700283 terminate_requested_ = true;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800284 } else {
285 ForceTransferTermination();
286 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000287}
288
Andrew de los Reyescb319332010-07-19 10:55:01 -0700289void LibcurlHttpFetcher::CurlPerformOnce() {
rspangler@google.com49fdf182009-10-10 00:57:34 +0000290 CHECK(transfer_in_progress_);
291 int running_handles = 0;
292 CURLMcode retcode = CURLM_CALL_MULTI_PERFORM;
293
294 // libcurl may request that we immediately call curl_multi_perform after it
295 // returns, so we do. libcurl promises that curl_multi_perform will not block.
296 while (CURLM_CALL_MULTI_PERFORM == retcode) {
297 retcode = curl_multi_perform(curl_multi_handle_, &running_handles);
Andrew de los Reyes3fd5d302010-10-07 20:07:18 -0700298 if (terminate_requested_) {
Darin Petkov9ce452b2010-11-17 14:33:28 -0800299 ForceTransferTermination();
Andrew de los Reyes3fd5d302010-10-07 20:07:18 -0700300 return;
301 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000302 }
303 if (0 == running_handles) {
Andrew de los Reyes3fd5d302010-10-07 20:07:18 -0700304 GetHttpResponseCode();
305 if (http_response_code_) {
306 LOG(INFO) << "HTTP response code: " << http_response_code_;
Darin Petkova0929552010-11-29 14:19:06 -0800307 no_network_retry_count_ = 0;
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700308 } else {
309 LOG(ERROR) << "Unable to get http response code.";
310 }
Darin Petkov192ced42010-07-23 16:20:24 -0700311
rspangler@google.com49fdf182009-10-10 00:57:34 +0000312 // we're done!
313 CleanUp();
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000314
Darin Petkova0929552010-11-29 14:19:06 -0800315 // TODO(petkov): This temporary code tries to deal with the case where the
316 // update engine performs an update check while the network is not ready
317 // (e.g., right after resume). Longer term, we should check if the network
318 // is online/offline and return an appropriate error code.
319 if (!sent_byte_ &&
320 http_response_code_ == 0 &&
321 no_network_retry_count_ < no_network_max_retries_) {
322 no_network_retry_count_++;
323 g_timeout_add_seconds(kNoNetworkRetrySeconds,
324 &LibcurlHttpFetcher::StaticRetryTimeoutCallback,
325 this);
326 LOG(INFO) << "No HTTP response, retry " << no_network_retry_count_;
327 return;
328 }
329
Gilad Arnold9bedeb52011-11-17 16:19:57 -0800330 if ((!sent_byte_ && !IsHttpResponseSuccess()) || IsHttpResponseError()) {
Andrew de los Reyes45168102010-11-22 11:13:50 -0800331 // The transfer completed w/ error and we didn't get any bytes.
332 // If we have another proxy to try, try that.
Gilad Arnold9bedeb52011-11-17 16:19:57 -0800333 //
334 // TODO(garnold) in fact there are two separate cases here: one case is an
335 // other-than-success return code (including no return code) and no
336 // received bytes, which is necessary due to the way callbacks are
337 // currently processing error conditions; the second is an explicit HTTP
338 // error code, where some data may have been received (as in the case of a
339 // semi-successful multi-chunk fetch). This is a confusing behavior and
340 // should be unified into a complete, coherent interface.
341 LOG(INFO) << "Transfer resulted in an error (" << http_response_code_
342 << "), " << bytes_downloaded_ << " bytes downloaded";
Andrew de los Reyes45168102010-11-22 11:13:50 -0800343
344 PopProxy(); // Delete the proxy we just gave up on.
345
346 if (HasProxy()) {
347 // We have another proxy. Retry immediately.
Gilad Arnoldfbaee242012-04-04 15:59:43 -0700348 LOG(INFO) << "Retrying with next proxy setting";
Andrew de los Reyes45168102010-11-22 11:13:50 -0800349 g_idle_add(&LibcurlHttpFetcher::StaticRetryTimeoutCallback, this);
350 } else {
351 // Out of proxies. Give up.
Gilad Arnold9bedeb52011-11-17 16:19:57 -0800352 LOG(INFO) << "No further proxies, indicating transfer complete";
Andrew de los Reyes45168102010-11-22 11:13:50 -0800353 if (delegate_)
Gilad Arnold9bedeb52011-11-17 16:19:57 -0800354 delegate_->TransferComplete(this, false); // signal fail
Andrew de los Reyes45168102010-11-22 11:13:50 -0800355 }
Gilad Arnold9bedeb52011-11-17 16:19:57 -0800356 } else if ((transfer_size_ >= 0) && (bytes_downloaded_ < transfer_size_)) {
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700357 retry_count_++;
Jay Srinivasan32f23572012-06-05 13:45:07 -0700358 LOG(INFO) << "Transfer interrupted after downloading "
359 << bytes_downloaded_ << " of " << transfer_size_ << " bytes. "
360 << transfer_size_ - bytes_downloaded_ << " bytes remaining "
361 << "after " << retry_count_ << " attempt(s)";
362
363 if (retry_count_ > max_retry_count_) {
364 LOG(INFO) << "Reached max attempts (" << retry_count_ << ")";
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700365 if (delegate_)
Gilad Arnold9bedeb52011-11-17 16:19:57 -0800366 delegate_->TransferComplete(this, false); // signal fail
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700367 } else {
Jay Srinivasan32f23572012-06-05 13:45:07 -0700368 // Need to restart transfer
369 LOG(INFO) << "Restarting transfer to download the remaining bytes";
Darin Petkovb83371f2010-08-17 09:34:49 -0700370 g_timeout_add_seconds(retry_seconds_,
Darin Petkov9b111652010-08-16 11:46:25 -0700371 &LibcurlHttpFetcher::StaticRetryTimeoutCallback,
372 this);
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700373 }
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000374 } else {
Gilad Arnold9bedeb52011-11-17 16:19:57 -0800375 LOG(INFO) << "Transfer completed (" << http_response_code_
376 << "), " << bytes_downloaded_ << " bytes downloaded";
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000377 if (delegate_) {
Gilad Arnold48085ba2011-11-16 09:36:08 -0800378 bool success = IsHttpResponseSuccess();
Andrew de los Reyesfb4ad7d2010-07-19 10:43:46 -0700379 delegate_->TransferComplete(this, success);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000380 }
381 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000382 } else {
383 // set up callback
384 SetupMainloopSources();
385 }
386}
387
388size_t LibcurlHttpFetcher::LibcurlWrite(void *ptr, size_t size, size_t nmemb) {
Gilad Arnold48085ba2011-11-16 09:36:08 -0800389 // Update HTTP response first.
Andrew de los Reyes3fd5d302010-10-07 20:07:18 -0700390 GetHttpResponseCode();
Gilad Arnold48085ba2011-11-16 09:36:08 -0800391 const size_t payload_size = size * nmemb;
392
393 // Do nothing if no payload or HTTP response is an error.
Gilad Arnold9bedeb52011-11-17 16:19:57 -0800394 if (payload_size == 0 || !IsHttpResponseSuccess()) {
Gilad Arnold48085ba2011-11-16 09:36:08 -0800395 LOG(INFO) << "HTTP response unsuccessful (" << http_response_code_
396 << ") or no payload (" << payload_size << "), nothing to do";
397 return 0;
398 }
399
400 sent_byte_ = true;
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000401 {
402 double transfer_size_double;
403 CHECK_EQ(curl_easy_getinfo(curl_handle_,
404 CURLINFO_CONTENT_LENGTH_DOWNLOAD,
405 &transfer_size_double), CURLE_OK);
406 off_t new_transfer_size = static_cast<off_t>(transfer_size_double);
407 if (new_transfer_size > 0) {
408 transfer_size_ = resume_offset_ + new_transfer_size;
409 }
410 }
Gilad Arnold48085ba2011-11-16 09:36:08 -0800411 bytes_downloaded_ += payload_size;
Andrew de los Reyes3fd5d302010-10-07 20:07:18 -0700412 in_write_callback_ = true;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000413 if (delegate_)
Gilad Arnold48085ba2011-11-16 09:36:08 -0800414 delegate_->ReceivedBytes(this, reinterpret_cast<char*>(ptr), payload_size);
Andrew de los Reyes3fd5d302010-10-07 20:07:18 -0700415 in_write_callback_ = false;
Gilad Arnold48085ba2011-11-16 09:36:08 -0800416 return payload_size;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000417}
418
419void LibcurlHttpFetcher::Pause() {
420 CHECK(curl_handle_);
421 CHECK(transfer_in_progress_);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000422 CHECK_EQ(curl_easy_pause(curl_handle_, CURLPAUSE_ALL), CURLE_OK);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000423}
424
425void LibcurlHttpFetcher::Unpause() {
426 CHECK(curl_handle_);
427 CHECK(transfer_in_progress_);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000428 CHECK_EQ(curl_easy_pause(curl_handle_, CURLPAUSE_CONT), CURLE_OK);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000429}
430
431// This method sets up callbacks with the glib main loop.
432void LibcurlHttpFetcher::SetupMainloopSources() {
433 fd_set fd_read;
434 fd_set fd_write;
Darin Petkov60e14152010-10-27 16:57:04 -0700435 fd_set fd_exc;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000436
437 FD_ZERO(&fd_read);
438 FD_ZERO(&fd_write);
Darin Petkov60e14152010-10-27 16:57:04 -0700439 FD_ZERO(&fd_exc);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000440
441 int fd_max = 0;
442
443 // Ask libcurl for the set of file descriptors we should track on its
444 // behalf.
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000445 CHECK_EQ(curl_multi_fdset(curl_multi_handle_, &fd_read, &fd_write,
Darin Petkov60e14152010-10-27 16:57:04 -0700446 &fd_exc, &fd_max), CURLM_OK);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000447
448 // We should iterate through all file descriptors up to libcurl's fd_max or
Darin Petkov60e14152010-10-27 16:57:04 -0700449 // the highest one we're tracking, whichever is larger.
450 for (size_t t = 0; t < arraysize(io_channels_); ++t) {
451 if (!io_channels_[t].empty())
452 fd_max = max(fd_max, io_channels_[t].rbegin()->first);
453 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000454
Darin Petkov60e14152010-10-27 16:57:04 -0700455 // For each fd, if we're not tracking it, track it. If we are tracking it, but
456 // libcurl doesn't care about it anymore, stop tracking it. After this loop,
457 // there should be exactly as many GIOChannel objects in io_channels_[0|1] as
458 // there are read/write fds that we're tracking.
459 for (int fd = 0; fd <= fd_max; ++fd) {
460 // Note that fd_exc is unused in the current version of libcurl so is_exc
461 // should always be false.
462 bool is_exc = FD_ISSET(fd, &fd_exc) != 0;
463 bool must_track[2] = {
464 is_exc || (FD_ISSET(fd, &fd_read) != 0), // track 0 -- read
465 is_exc || (FD_ISSET(fd, &fd_write) != 0) // track 1 -- write
466 };
467
468 for (size_t t = 0; t < arraysize(io_channels_); ++t) {
469 bool tracked = io_channels_[t].find(fd) != io_channels_[t].end();
470
471 if (!must_track[t]) {
472 // If we have an outstanding io_channel, remove it.
473 if (tracked) {
474 g_source_remove(io_channels_[t][fd].second);
475 g_io_channel_unref(io_channels_[t][fd].first);
476 io_channels_[t].erase(io_channels_[t].find(fd));
477 }
478 continue;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000479 }
Darin Petkov60e14152010-10-27 16:57:04 -0700480
481 // If we are already tracking this fd, continue -- nothing to do.
482 if (tracked)
483 continue;
484
485 // Set conditions appropriately -- read for track 0, write for track 1.
486 GIOCondition condition = static_cast<GIOCondition>(
487 ((t == 0) ? (G_IO_IN | G_IO_PRI) : G_IO_OUT) | G_IO_ERR | G_IO_HUP);
488
489 // Track a new fd.
490 GIOChannel* io_channel = g_io_channel_unix_new(fd);
491 guint tag =
492 g_io_add_watch(io_channel, condition, &StaticFDCallback, this);
493
494 io_channels_[t][fd] = make_pair(io_channel, tag);
495 static int io_counter = 0;
496 io_counter++;
497 if (io_counter % 50 == 0) {
498 LOG(INFO) << "io_counter = " << io_counter;
499 }
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700500 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000501 }
502
Darin Petkovb83371f2010-08-17 09:34:49 -0700503 // Set up a timeout callback for libcurl.
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700504 if (!timeout_source_) {
Darin Petkovb83371f2010-08-17 09:34:49 -0700505 LOG(INFO) << "Setting up timeout source: " << idle_seconds_ << " seconds.";
506 timeout_source_ = g_timeout_source_new_seconds(idle_seconds_);
507 g_source_set_callback(timeout_source_, StaticTimeoutCallback, this, NULL);
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700508 g_source_attach(timeout_source_, NULL);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000509 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000510}
511
512bool LibcurlHttpFetcher::FDCallback(GIOChannel *source,
513 GIOCondition condition) {
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700514 CurlPerformOnce();
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700515 // We handle removing of this source elsewhere, so we always return true.
516 // The docs say, "the function should return FALSE if the event source
517 // should be removed."
518 // http://www.gtk.org/api/2.6/glib/glib-IO-Channels.html#GIOFunc
519 return true;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000520}
521
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700522gboolean LibcurlHttpFetcher::RetryTimeoutCallback() {
523 ResumeTransfer(url_);
524 CurlPerformOnce();
525 return FALSE; // Don't have glib auto call this callback again
526}
527
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700528gboolean LibcurlHttpFetcher::TimeoutCallback() {
Andrew de los Reyescb319332010-07-19 10:55:01 -0700529 // We always return true, even if we don't want glib to call us back.
530 // We will remove the event source separately if we don't want to
531 // be called back.
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700532 if (!transfer_in_progress_)
533 return TRUE;
Andrew de los Reyes9bbd1872010-07-16 14:52:29 -0700534 CurlPerformOnce();
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700535 return TRUE;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000536}
537
538void LibcurlHttpFetcher::CleanUp() {
539 if (timeout_source_) {
540 g_source_destroy(timeout_source_);
541 timeout_source_ = NULL;
542 }
543
Darin Petkov60e14152010-10-27 16:57:04 -0700544 for (size_t t = 0; t < arraysize(io_channels_); ++t) {
545 for (IOChannels::iterator it = io_channels_[t].begin();
546 it != io_channels_[t].end(); ++it) {
547 g_source_remove(it->second.second);
548 g_io_channel_unref(it->second.first);
549 }
550 io_channels_[t].clear();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000551 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000552
Gilad Arnold9dd1e7c2012-02-16 12:13:36 -0800553 if (curl_http_headers_) {
554 curl_slist_free_all(curl_http_headers_);
555 curl_http_headers_ = NULL;
556 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000557 if (curl_handle_) {
558 if (curl_multi_handle_) {
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000559 CHECK_EQ(curl_multi_remove_handle(curl_multi_handle_, curl_handle_),
560 CURLM_OK);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000561 }
562 curl_easy_cleanup(curl_handle_);
563 curl_handle_ = NULL;
564 }
565 if (curl_multi_handle_) {
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000566 CHECK_EQ(curl_multi_cleanup(curl_multi_handle_), CURLM_OK);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000567 curl_multi_handle_ = NULL;
568 }
569 transfer_in_progress_ = false;
570}
571
Andrew de los Reyes3fd5d302010-10-07 20:07:18 -0700572void LibcurlHttpFetcher::GetHttpResponseCode() {
573 long http_response_code = 0;
574 if (curl_easy_getinfo(curl_handle_,
575 CURLINFO_RESPONSE_CODE,
576 &http_response_code) == CURLE_OK) {
577 http_response_code_ = static_cast<int>(http_response_code);
578 }
579}
580
rspangler@google.com49fdf182009-10-10 00:57:34 +0000581} // namespace chromeos_update_engine