| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422 | /* <!-- copyright *//* * aria2 - The high speed download utility * * Copyright (C) 2006 Tatsuhiro Tsujikawa * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA * * In addition, as a special exception, the copyright holders give * permission to link the code of portions of this program with the * OpenSSL library under certain conditions as described in each * individual source file, and distribute linked combinations * including the two. * You must obey the GNU General Public License in all respects * for all of the code used other than OpenSSL.  If you modify * file(s) with this exception, you may extend this exception to your * version of the file(s), but you are not obligated to do so.  If you * do not wish to do so, delete this exception statement from your * version.  If you delete this exception statement from all source * files in the program, then also delete it here. *//* copyright --> */#include "HttpResponseCommand.h"#include "DownloadEngine.h"#include "DownloadContext.h"#include "FileEntry.h"#include "RequestGroup.h"#include "RequestGroupMan.h"#include "Request.h"#include "HttpRequest.h"#include "HttpResponse.h"#include "HttpConnection.h"#include "SegmentMan.h"#include "Segment.h"#include "HttpDownloadCommand.h"#include "DiskAdaptor.h"#include "PieceStorage.h"#include "DefaultBtProgressInfoFile.h"#include "DownloadFailureException.h"#include "DlAbortEx.h"#include "util.h"#include "File.h"#include "Option.h"#include "Logger.h"#include "Socket.h"#include "message.h"#include "prefs.h"#include "StringFormat.h"#include "HttpSkipResponseCommand.h"#include "HttpHeader.h"#include "LogFactory.h"#include "CookieStorage.h"#include "AuthConfigFactory.h"#include "AuthConfig.h"#include "a2functional.h"#include "URISelector.h"namespace aria2 {static SharedHandle<Decoder> getTransferEncodingDecoder(const SharedHandle<HttpResponse>& httpResponse);static SharedHandle<Decoder> getContentEncodingDecoder(const SharedHandle<HttpResponse>& httpResponse);HttpResponseCommand::HttpResponseCommand(int32_t cuid, const RequestHandle& req, const SharedHandle<FileEntry>& fileEntry, RequestGroup* requestGroup, const HttpConnectionHandle& httpConnection, DownloadEngine* e, const SocketHandle& s)  :AbstractCommand(cuid, req, fileEntry, requestGroup, e, s),   httpConnection(httpConnection){}HttpResponseCommand::~HttpResponseCommand() {}bool HttpResponseCommand::executeInternal(){  HttpRequestHandle httpRequest = httpConnection->getFirstHttpRequest();  HttpResponseHandle httpResponse = httpConnection->receiveResponse();  if(httpResponse.isNull()) {    // The server has not responded to our request yet.    // For socket->wantRead() == true, setReadCheckSocket(socket) is already    // done in the constructor.    setWriteCheckSocketIf(socket, socket->wantWrite());    e->commands.push_back(this);    return false;  }  // check HTTP status number  httpResponse->validateResponse();  httpResponse->retrieveCookie();  SharedHandle<HttpHeader> httpHeader = httpResponse->getHttpHeader();  // Disable persistent connection if:  //   Connection: close is received or the remote server is not HTTP/1.1.  // We don't care whether non-HTTP/1.1 server returns Connection: keep-alive.  req->supportsPersistentConnection    (httpResponse->supportsPersistentConnection());  if(req->isPipeliningEnabled()) {    req->setMaxPipelinedRequest(getOption()->getAsInt(PREF_MAX_HTTP_PIPELINING));  }  if(httpResponse->getResponseStatus() >= HttpHeader::S300) {    if(httpResponse->getResponseStatus() == HttpHeader::S404) {      _requestGroup->increaseAndValidateFileNotFoundCount();    }    return skipResponseBody(httpResponse);  }  if(!_fileEntry->isSingleHostMultiConnectionEnabled()) {    // TODO redirection should be considered here. We need to parse    // original URI to get hostname.    _fileEntry->removeURIWhoseHostnameIs(req->getHost());  }  if(_requestGroup->getPieceStorage().isNull()) {    uint64_t totalLength = httpResponse->getEntityLength();    _fileEntry->setLength(totalLength);    if(_fileEntry->getPath().empty()) {      _fileEntry->setPath        (util::applyDir         (getDownloadContext()->getDir(),          util::fixTaintedBasename(httpResponse->determinFilename())));    }    _fileEntry->setContentType(httpResponse->getContentType());    _requestGroup->preDownloadProcessing();    if(e->_requestGroupMan->isSameFileBeingDownloaded(_requestGroup)) {      throw DOWNLOAD_FAILURE_EXCEPTION        (StringFormat(EX_DUPLICATE_FILE_DOWNLOAD,                      _requestGroup->getFirstFilePath().c_str()).str());    }    // update last modified time    updateLastModifiedTime(httpResponse->getLastModifiedTime());    // If both transfer-encoding and total length is specified, we    // assume we can do segmented downloading    if(totalLength == 0 || shouldInflateContentEncoding(httpResponse)) {      // we ignore content-length when inflate is required      _fileEntry->setLength(0);      if(req->getMethod() == Request::METHOD_GET &&         (totalLength != 0 ||          !httpResponse->getHttpHeader()->defined(HttpHeader::CONTENT_LENGTH))){        // DownloadContext::knowsTotalLength() == true only when        // server says the size of file is 0 explicitly.        getDownloadContext()->markTotalLengthIsUnknown();      }      return handleOtherEncoding(httpResponse);    } else {      return handleDefaultEncoding(httpResponse);    }  } else {    // validate totalsize    _requestGroup->validateTotalLength(_fileEntry->getLength(),                                       httpResponse->getEntityLength());    // update last modified time    updateLastModifiedTime(httpResponse->getLastModifiedTime());    if(_requestGroup->getTotalLength() == 0) {      // Since total length is unknown, the file size in previously      // failed download could be larger than the size this time.      // Also we can't resume in this case too.  So truncate the file      // anyway.      _requestGroup->getPieceStorage()->getDiskAdaptor()->truncate(0);      e->commands.push_back        (createHttpDownloadCommand(httpResponse,                                   getTransferEncodingDecoder(httpResponse),                                   getContentEncodingDecoder(httpResponse)));    } else {      e->commands.push_back(createHttpDownloadCommand(httpResponse,                                                      getTransferEncodingDecoder(httpResponse)));    }    return true;  }}void HttpResponseCommand::updateLastModifiedTime(const Time& lastModified){  if(getOption()->getAsBool(PREF_REMOTE_TIME)) {    _requestGroup->updateLastModifiedTime(lastModified);  }}static bool fileIsGzipped(const SharedHandle<HttpResponse>& httpResponse){  std::string filename =    util::toLower(httpResponse->getHttpRequest()->getRequest()->getFile());  return util::endsWith(filename, ".gz") || util::endsWith(filename, ".tgz");}bool HttpResponseCommand::shouldInflateContentEncoding(const SharedHandle<HttpResponse>& httpResponse){  // Basically, on the fly inflation cannot be made with segment download,  // because in each segment we don't know where the date should be written.  // So turn off segmented downloading.  // Meanwhile, Some server returns content-encoding: gzip for .tgz files.  // I think those files should not be inflated by clients, because it is the  // original format of those files. So I made filename ending ".gz" or ".tgz"  // (case-insensitive) not inflated.  return httpResponse->isContentEncodingSpecified() &&    !fileIsGzipped(httpResponse);}bool HttpResponseCommand::handleDefaultEncoding(const HttpResponseHandle& httpResponse){  HttpRequestHandle httpRequest = httpResponse->getHttpRequest();  _requestGroup->adjustFilename    (SharedHandle<BtProgressInfoFile>(new DefaultBtProgressInfoFile                                      (_requestGroup->getDownloadContext(),                                       SharedHandle<PieceStorage>(),                                       getOption().get())));  _requestGroup->initPieceStorage();  if(getOption()->getAsBool(PREF_DRY_RUN)) {    onDryRunFileFound();    return true;  }  BtProgressInfoFileHandle infoFile(new DefaultBtProgressInfoFile(_requestGroup->getDownloadContext(), _requestGroup->getPieceStorage(), getOption().get()));  if(!infoFile->exists() && _requestGroup->downloadFinishedByFileLength()) {    _requestGroup->getPieceStorage()->markAllPiecesDone();    logger->notice(MSG_DOWNLOAD_ALREADY_COMPLETED,                   _requestGroup->getGID(),                   _requestGroup->getFirstFilePath().c_str());    return true;  }  DownloadCommand* command = 0;  try {    _requestGroup->loadAndOpenFile(infoFile);    File file(_requestGroup->getFirstFilePath());    SegmentHandle segment = _requestGroup->getSegmentMan()->getSegment(cuid, 0);    // pipelining requires implicit range specified. But the request for    // this response most likely dones't contains range header. This means    // we can't continue to use this socket because server sends all entity    // body instead of a segment.    // Therefore, we shutdown the socket here if pipelining is enabled.    if(req->getMethod() == Request::METHOD_GET &&       !segment.isNull() && segment->getPositionToWrite() == 0 &&       !req->isPipeliningEnabled()) {      command = createHttpDownloadCommand(httpResponse);    } else {      _requestGroup->getSegmentMan()->cancelSegment(cuid);      _fileEntry->poolRequest(req);    }    prepareForNextAction(command);    if(req->getMethod() == Request::METHOD_HEAD) {      poolConnection();      req->setMethod(Request::METHOD_GET);    }  } catch(Exception& e) {    delete command;    throw;  }  return true;}static SharedHandle<Decoder> getTransferEncodingDecoder(const SharedHandle<HttpResponse>& httpResponse){  SharedHandle<Decoder> decoder;  if(httpResponse->isTransferEncodingSpecified()) {    decoder = httpResponse->getTransferEncodingDecoder();    if(decoder.isNull()) {      throw DL_ABORT_EX        (StringFormat(EX_TRANSFER_ENCODING_NOT_SUPPORTED,                      httpResponse->getTransferEncoding().c_str()).str());    }    decoder->init();  }  return decoder;}static SharedHandle<Decoder> getContentEncodingDecoder(const SharedHandle<HttpResponse>& httpResponse){  SharedHandle<Decoder> decoder;  if(httpResponse->isContentEncodingSpecified()) {    decoder = httpResponse->getContentEncodingDecoder();    if(decoder.isNull()) {      LogFactory::getInstance()->info        ("Content-Encoding %s is specified, but the current implementation"         "doesn't support it. The decoding process is skipped and the"         "downloaded content will be still encoded.",         httpResponse->getContentEncoding().c_str());    } else {      decoder->init();    }  }  return decoder;}bool HttpResponseCommand::handleOtherEncoding(const HttpResponseHandle& httpResponse) {  // We assume that RequestGroup::getTotalLength() == 0 here  HttpRequestHandle httpRequest = httpResponse->getHttpRequest();  if(getOption()->getAsBool(PREF_DRY_RUN)) {    _requestGroup->initPieceStorage();    onDryRunFileFound();    return true;  }  if(req->getMethod() == Request::METHOD_HEAD) {    poolConnection();    req->setMethod(Request::METHOD_GET);    return prepareForRetry(0);  }  // For zero-length file, check existing file comparing its size  if(_requestGroup->downloadFinishedByFileLength()) {    _requestGroup->initPieceStorage();    _requestGroup->getPieceStorage()->markAllPiecesDone();    logger->notice(MSG_DOWNLOAD_ALREADY_COMPLETED,                   _requestGroup->getGID(),                   _requestGroup->getFirstFilePath().c_str());    poolConnection();    return true;  }  _requestGroup->shouldCancelDownloadForSafety();  _requestGroup->initPieceStorage();  _requestGroup->getPieceStorage()->getDiskAdaptor()->initAndOpenFile();  // In this context, knowsTotalLength() is true only when the file is  // really zero-length.  if(_requestGroup->getDownloadContext()->knowsTotalLength()) {    poolConnection();    return true;  }  e->commands.push_back    (createHttpDownloadCommand(httpResponse,                               getTransferEncodingDecoder(httpResponse),                               getContentEncodingDecoder(httpResponse)));  return true;}bool HttpResponseCommand::skipResponseBody(const SharedHandle<HttpResponse>& httpResponse){  SharedHandle<Decoder> decoder = getTransferEncodingDecoder(httpResponse);  // We don't use Content-Encoding here because this response body is just  // thrown away.  HttpSkipResponseCommand* command = new HttpSkipResponseCommand    (cuid, req, _fileEntry, _requestGroup, httpConnection, httpResponse, e, socket);  command->setTransferEncodingDecoder(decoder);  // If request method is HEAD or the response body is zero-length,  // set command's status to real time so that avoid read check blocking  if(req->getMethod() == Request::METHOD_HEAD ||     (httpResponse->getEntityLength() == 0 &&      !httpResponse->isTransferEncodingSpecified())) {    command->setStatusRealtime();    // If entity length == 0, then socket read/write check must be disabled.    command->disableSocketCheck();    e->setNoWait(true);  }  e->commands.push_back(command);  return true;}HttpDownloadCommand* HttpResponseCommand::createHttpDownloadCommand(const HttpResponseHandle& httpResponse, const SharedHandle<Decoder>& transferEncodingDecoder, const SharedHandle<Decoder>& contentEncodingDecoder){  HttpDownloadCommand* command =    new HttpDownloadCommand(cuid, req, _fileEntry, _requestGroup,                            httpResponse, httpConnection, e, socket);  command->setStartupIdleTime(getOption()->getAsInt(PREF_STARTUP_IDLE_TIME));  command->setLowestDownloadSpeedLimit    (getOption()->getAsInt(PREF_LOWEST_SPEED_LIMIT));  command->setTransferEncodingDecoder(transferEncodingDecoder);  if(!contentEncodingDecoder.isNull()) {    command->setContentEncodingDecoder(contentEncodingDecoder);    // Since the compressed file's length are returned in the response header    // and the decompressed file size is unknown at this point, disable file    // allocation here.    _requestGroup->setFileAllocationEnabled(false);  }  _requestGroup->getURISelector()->tuneDownloadCommand    (_fileEntry->getRemainingUris(), command);  return command;}void HttpResponseCommand::poolConnection(){  if(req->supportsPersistentConnection()) {    e->poolSocket(req, isProxyDefined(), socket);  }}void HttpResponseCommand::onDryRunFileFound(){  _requestGroup->getPieceStorage()->markAllPiecesDone();  poolConnection();}} // namespace aria2
 |