123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323 |
- /* <!-- copyright */
- /*
- * aria2 - The high speed download utility
- *
- * Copyright (C) 2006 Tatsuhiro Tsujikawa
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
- *
- * In addition, as a special exception, the copyright holders give
- * permission to link the code of portions of this program with the
- * OpenSSL library under certain conditions as described in each
- * individual source file, and distribute linked combinations
- * including the two.
- * You must obey the GNU General Public License in all respects
- * for all of the code used other than OpenSSL. If you modify
- * file(s) with this exception, you may extend this exception to your
- * version of the file(s), but you are not obligated to do so. If you
- * do not wish to do so, delete this exception statement from your
- * version. If you delete this exception statement from all source
- * files in the program, then also delete it here.
- */
- /* copyright --> */
- #include "HttpRequest.h"
- #include <cassert>
- #include <numeric>
- #include <vector>
- #include "Segment.h"
- #include "Range.h"
- #include "CookieStorage.h"
- #include "Option.h"
- #include "util.h"
- #include "Base64.h"
- #include "prefs.h"
- #include "AuthConfigFactory.h"
- #include "AuthConfig.h"
- #include "a2functional.h"
- #include "TimeA2.h"
- namespace aria2 {
- const std::string HttpRequest::USER_AGENT("aria2");
- HttpRequest::HttpRequest():_contentEncodingEnabled(true),
- userAgent(USER_AGENT)
- {}
- void HttpRequest::setSegment(const SharedHandle<Segment>& segment)
- {
- this->segment = segment;
- }
- void HttpRequest::setRequest(const SharedHandle<Request>& request)
- {
- this->request = request;
- }
- off_t HttpRequest::getStartByte() const
- {
- if(segment.isNull()) {
- return 0;
- } else {
- return _fileEntry->gtoloff(segment->getPositionToWrite());
- }
- }
- off_t HttpRequest::getEndByte() const
- {
- if(segment.isNull() || request.isNull()) {
- return 0;
- } else {
- if(request->isPipeliningEnabled()) {
- off_t endByte = _fileEntry->gtoloff(segment->getPosition()+segment->getLength()-1);
- return std::min(endByte, static_cast<off_t>(_fileEntry->getLength()-1));
- } else {
- return 0;
- }
- }
- }
- RangeHandle HttpRequest::getRange() const
- {
- // content-length is always 0
- if(segment.isNull()) {
- return SharedHandle<Range>(new Range());
- } else {
- return SharedHandle<Range>(new Range(getStartByte(), getEndByte(),
- _fileEntry->getLength()));
- }
- }
- bool HttpRequest::isRangeSatisfied(const RangeHandle& range) const
- {
- if(segment.isNull()) {
- return true;
- }
- if((getStartByte() == range->getStartByte()) &&
- ((getEndByte() == 0) ||
- (getEndByte() == range->getEndByte())) &&
- ((_fileEntry->getLength() == 0) ||
- (_fileEntry->getLength() == range->getEntityLength()))) {
- return true;
- } else {
- return false;
- }
- }
- static std::string getHostText(const std::string& host, uint16_t port)
- {
- std::string hosttext = host;
- if(!(port == 80 || port == 443)) {
- strappend(hosttext, ":", util::uitos(port));
- }
- return hosttext;
- }
- std::string HttpRequest::createRequest()
- {
- _authConfig = _authConfigFactory->createAuthConfig(request, _option);
- std::string requestLine = request->getMethod();
- requestLine += " ";
- if(!_proxyRequest.isNull()) {
- if(getProtocol() == Request::PROTO_FTP &&
- request->getUsername().empty() && !_authConfig.isNull()) {
- // Insert user into URI, like ftp://USER@host/
- std::string uri = getCurrentURI();
- assert(uri.size() >= 6);
- uri.insert(6, util::urlencode(_authConfig->getUser())+"@");
- requestLine += uri;
- } else {
- requestLine += getCurrentURI();
- }
- } else {
- if(getDir() == A2STR::SLASH_C) {
- requestLine += getDir();
- } else {
- requestLine += getDir();
- requestLine += A2STR::SLASH_C;
- }
- requestLine += getFile();
- requestLine += getQuery();
- }
- requestLine += " HTTP/1.1\r\n";
- strappend(requestLine, "User-Agent: ", userAgent, "\r\n");
-
- requestLine += "Accept: */*"; /* */
- for(std::deque<std::string>::const_iterator i = _acceptTypes.begin();
- i != _acceptTypes.end(); ++i) {
- strappend(requestLine, ",", (*i));
- }
- requestLine += "\r\n";
- if(_contentEncodingEnabled) {
- std::string acceptableEncodings;
- #ifdef HAVE_LIBZ
- acceptableEncodings += "deflate, gzip";
- #endif // HAVE_LIBZ
- if(!acceptableEncodings.empty()) {
- strappend(requestLine, "Accept-Encoding: ", acceptableEncodings, "\r\n");
- }
- }
- strappend(requestLine, "Host: ", getHostText(getURIHost(), getPort()), "\r\n");
- requestLine += "Pragma: no-cache\r\n";
- requestLine += "Cache-Control: no-cache\r\n";
- if(!request->isKeepAliveEnabled() && !request->isPipeliningEnabled()) {
- requestLine += "Connection: close\r\n";
- }
- if(!segment.isNull() && segment->getLength() > 0 &&
- (request->isPipeliningEnabled() || getStartByte() > 0)) {
- requestLine += "Range: bytes=";
- requestLine += util::itos(getStartByte());
- requestLine += "-";
- if(request->isPipeliningEnabled()) {
- requestLine += util::itos(getEndByte());
- }
- requestLine += "\r\n";
- }
- if(!_proxyRequest.isNull()) {
- if(request->isKeepAliveEnabled() || request->isPipeliningEnabled()) {
- requestLine += "Proxy-Connection: Keep-Alive\r\n";
- } else {
- requestLine += "Proxy-Connection: close\r\n";
- }
- }
- if(!_proxyRequest.isNull() && !_proxyRequest->getUsername().empty()) {
- requestLine += getProxyAuthString();
- }
- if(!_authConfig.isNull()) {
- strappend(requestLine, "Authorization: Basic ",
- Base64::encode(_authConfig->getAuthText()), "\r\n");
- }
- if(getPreviousURI().size()) {
- strappend(requestLine, "Referer: ", getPreviousURI(), "\r\n");
- }
- if(!_cookieStorage.isNull()) {
- std::string cookiesValue;
- std::deque<Cookie> cookies =
- _cookieStorage->criteriaFind(getHost(),
- getDir(),
- Time().getTime(),
- getProtocol() == Request::PROTO_HTTPS ?
- true : false);
- for(std::deque<Cookie>::const_iterator itr = cookies.begin();
- itr != cookies.end(); ++itr) {
- strappend(cookiesValue, (*itr).toString(), ";");
- }
- if(!cookiesValue.empty()) {
- strappend(requestLine, "Cookie: ", cookiesValue, "\r\n");
- }
- }
- // append additional headers given by user.
- for(std::deque<std::string>::const_iterator i = _headers.begin();
- i != _headers.end(); ++i) {
- strappend(requestLine, (*i), "\r\n");
- }
- requestLine += "\r\n";
- return requestLine;
- }
- std::string HttpRequest::createProxyRequest() const
- {
- assert(!_proxyRequest.isNull());
- std::string hostport = getURIHost();
- strappend(hostport, ":", util::uitos(getPort()));
- std::string requestLine = "CONNECT ";
- strappend(requestLine, hostport, " HTTP/1.1\r\n");
- strappend(requestLine, "User-Agent: ", userAgent, "\r\n");
- strappend(requestLine, "Host: ", hostport, "\r\n");
- // TODO Is "Proxy-Connection" needed here?
- // if(request->isKeepAliveEnabled() || request->isPipeliningEnabled()) {
- // requestLine += "Proxy-Connection: Keep-Alive\r\n";
- // }else {
- // requestLine += "Proxy-Connection: close\r\n";
- // }
- if(!_proxyRequest->getUsername().empty()) {
- requestLine += getProxyAuthString();
- }
- requestLine += "\r\n";
- return requestLine;
- }
- std::string HttpRequest::getProxyAuthString() const
- {
- return strconcat("Proxy-Authorization: Basic ",
- Base64::encode(strconcat(_proxyRequest->getUsername(),
- ":",
- _proxyRequest->getPassword())),
- "\r\n");
- }
- void HttpRequest::enableContentEncoding()
- {
- _contentEncodingEnabled = true;
- }
- void HttpRequest::disableContentEncoding()
- {
- _contentEncodingEnabled = false;
- }
- void HttpRequest::addHeader(const std::string& headersString)
- {
- std::vector<std::string> headers;
- util::split(headersString, std::back_inserter(headers), "\n", true);
- _headers.insert(_headers.end(), headers.begin(), headers.end());
- }
- void HttpRequest::addAcceptType(const std::string& type)
- {
- _acceptTypes.push_back(type);
- }
- void HttpRequest::setCookieStorage
- (const SharedHandle<CookieStorage>& cookieStorage)
- {
- _cookieStorage = cookieStorage;
- }
- void HttpRequest::setAuthConfigFactory
- (const SharedHandle<AuthConfigFactory>& factory, const Option* option)
- {
- _authConfigFactory = factory;
- _option = option;
- }
- void HttpRequest::setProxyRequest(const SharedHandle<Request>& proxyRequest)
- {
- _proxyRequest = proxyRequest;
- }
- bool HttpRequest::isProxyRequestSet() const
- {
- return !_proxyRequest.isNull();
- }
- bool HttpRequest::authenticationUsed() const
- {
- return !_authConfig.isNull();
- }
- const SharedHandle<AuthConfig>& HttpRequest::getAuthConfig() const
- {
- return _authConfig;
- }
- } // namespace aria2
|