|
|
/************************************************************************
Copyright (c) 2000 - 2000 Microsoft Corporation
Module Name :
downloader.cpp
Abstract :
Main Source file for downloader.
Author :
Revision History :
***********************************************************************/
#include "stdafx.h"
#include "malloc.h"
#if !defined(BITS_V12_ON_NT4)
#include "downloader.tmh"
#endif
void SafeCloseInternetHandle( HINTERNET & h ) { if (h) { InternetCloseHandle( h ); h = NULL; } }
#define ACCEPT_ENCODING_STRING _T("Accept-encoding: identity")
BOOL NeedRetry( QMErrInfo * ); bool NeedCredentials( HINTERNET hRequest, DWORD err ); bool IsPossibleProxyFailure( DWORD err );
DWORD GetRequestStatus( HINTERNET hRequest ) throw( ComError );
bool ApplyCredentials( HINTERNET hRequest, const CCredentialsContainer * Credentials, WCHAR UserName[], WCHAR Password[] ) throw( ComError );
bool ApplySchemeCredentials( HINTERNET hRequest, DWORD dwTarget, DWORD dwScheme, const CCredentialsContainer * Credentials, WCHAR UserName[], WCHAR Password[] ) throw( ComError );
HRESULT CheckReplyRange( HINTERNET hRequest, UINT64 CorrectStart, UINT64 CorrectEnd, UINT64 CorrectTotal );
HRESULT CheckReplyLength( HINTERNET hRequest, UINT64 CorrectOffset, UINT64 CorrectTotal );
#ifndef USE_WININET
VOID CALLBACK HttpRequestCallback( IN HINTERNET hInternet, IN DWORD_PTR dwContext, IN DWORD dwInternetStatus, IN LPVOID lpvStatusInformation OPTIONAL, IN DWORD dwStatusInformationLength );
DWORD MapSecureHttpErrorCode( DWORD flags );
#endif
CACHED_AUTOPROXY * g_ProxyCache;
BYTE g_FileDataBuffer[ FILE_DATA_BUFFER_LEN ];
HRESULT CreateHttpDownloader( Downloader **ppDownloader, QMErrInfo *pErrInfo ) { Downloader * pDownloader = 0;
try { *ppDownloader = NULL;
g_ProxyCache = new CACHED_AUTOPROXY; pDownloader = new CProgressiveDL( pErrInfo );
*ppDownloader = pDownloader; return S_OK; } catch ( ComError err ) { delete g_ProxyCache; g_ProxyCache = 0; delete pDownloader;
return err.Error(); } }
void DeleteHttpDownloader( Downloader *pDownloader ) { CProgressiveDL * ptr = (CProgressiveDL *) pDownloader;
delete ptr;
delete g_ProxyCache; g_ProxyCache = 0; }
/////////////////////////////////////////////////////////////////////////////
// CProgressiveDL
CProgressiveDL::CProgressiveDL( QMErrInfo *pErrInfo ) : m_bThrottle( TRUE ), m_wupdinfo( NULL ), m_hOpenRequest( NULL ), m_hFile( INVALID_HANDLE_VALUE ) { m_pQMInfo = pErrInfo; }
CProgressiveDL::~CProgressiveDL() { ASSERT( m_hFile == INVALID_HANDLE_VALUE ); }
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// Public function Download()
// Accepts a URL and destination to download, callback to report various status
// Input: url, destination, flags, callback for status
// Output: todo handle
// Return: hresult
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
HRESULT CProgressiveDL::Download( LPCTSTR szURL, LPCTSTR szDest, UINT64 Offset, ITransferCallback * Callbacks, QMErrInfo *pQMErrInfo, HANDLE hToken, BOOL bThrottle, const PROXY_SETTINGS * ProxySettings, const CCredentialsContainer * Credentials, const StringHandle HostId ) { HRESULT hr = S_OK; DWORD dwThreadID;
m_Callbacks = Callbacks; m_pQMInfo = pQMErrInfo; m_bThrottle = bThrottle; m_pQMInfo->result = QM_FILE_FATAL_ERROR;
ASSERT( Callbacks ); ASSERT( pQMErrInfo );
if (!m_pQMInfo) { return E_FAIL; }
if ((!szURL) || (!szDest)) { SetError( SOURCE_HTTP_UNKNOWN, ERROR_STYLE_HRESULT, E_INVALIDARG, "NULL file name" ); return E_FAIL; }
ASSERT( wcslen( szURL ) <= INTERNET_MAX_URL_LENGTH ); ASSERT( wcslen( szDest ) <= MAX_PATH );
LogDl( "---------------------------------------------------------------------" );
LogDl( "Downloading file %!ts! offset %d", szDest, DWORD(Offset) );
m_pQMInfo->result = QM_IN_PROGRESS;
do { hr = DownloadFile( hToken, ProxySettings, Credentials, szURL, szDest, Offset, HostId ); } while ( hr == E_RETRY );
if (hr == S_OK) { m_pQMInfo->result = QM_FILE_DONE; LogDl( "Done file %!ts!", szDest ); } else if ( hr == S_FALSE ) { m_pQMInfo->result = QM_FILE_ABORTED; LogDl( "File %!ts! aborted", szDest ); } else if ( m_pQMInfo->result != QM_SERVER_FILE_CHANGED ) { ASSERT( IsErrorSet() );
if (NeedRetry(m_pQMInfo)) { m_pQMInfo->result = QM_FILE_TRANSIENT_ERROR; } else { m_pQMInfo->result = QM_FILE_FATAL_ERROR; } }
ASSERT( m_pQMInfo->result != QM_IN_PROGRESS );
LogDl( "---------------------------------------------------------------------" );
// if abort request came in after file failed, overwrite failed flag.
if ( (QM_FILE_DONE != m_pQMInfo->result) && IsAbortRequested() ) { m_pQMInfo->result = QM_FILE_ABORTED; }
ASSERT( m_hFile == INVALID_HANDLE_VALUE );
return hr; }
HRESULT CProgressiveDL::DownloadFile( HANDLE hToken, const PROXY_SETTINGS * ProxySettings, const CCredentialsContainer * Credentials, LPCTSTR Url, LPCWSTR Path, UINT64 Offset, StringHandle HostId ) { HRESULT hr = S_OK;
ASSERT( m_wupdinfo == NULL ); ASSERT( m_hOpenRequest == NULL );
m_pQMInfo->Clear();
try { if (!ImpersonateLoggedOnUser(hToken)) { SetError( SOURCE_HTTP_UNKNOWN, ERROR_STYLE_WIN32, GetLastError(), "Impersonate" ); throw ComError( E_FAIL ); }
//
// Open a connection to the server, and use that data for our first estimate of the line speed.
//
m_wupdinfo = ConnectToUrl( Url, ProxySettings, Credentials, (const TCHAR*)HostId, m_pQMInfo ); if (!m_wupdinfo) { ASSERT( IsErrorSet() ); throw ComError( E_FAIL ); }
//
// Get file size and time stamp.
//
if (! GetRemoteResourceInformation( m_wupdinfo, m_pQMInfo )) { ASSERT( IsErrorSet() ); throw ComError( E_FAIL ); }
if (!OpenLocalDownloadFile(Path, Offset, m_wupdinfo->FileSize, m_wupdinfo->UrlModificationTime)) { ASSERT( IsErrorSet() ); throw ComError( E_FAIL ); }
// Be sure to check for an end of file before attempting
// to download more bytes.
if (IsFileComplete()) { LogDl( "File is done already.\n" );
if (!SetFileTimes()) { ASSERT( IsErrorSet() ); hr = E_FAIL; }
hr = S_OK; } //
// Transfer data from the server.
//
else if ( !m_bThrottle ) { hr = DownloadForegroundFile(); } else {
//
// Use either the server's host name or the proxy's host name to find the right network adapter..
//
hr = m_Network.SetInterfaceIndex( m_wupdinfo->fProxy ? m_wupdinfo->ProxyHost.get() : m_wupdinfo->HostName ); if (FAILED(hr)) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "GetInterfaceIndex" ); throw ComError( E_FAIL ); }
while (1) { if (IsAbortRequested()) { hr = S_FALSE; break; }
hr = GetNextBlock();
if ( S_FALSE == hr ) break;
if (FAILED(hr) ) { ASSERT( hr == E_RETRY || IsErrorSet() ); break; }
if (IsFileComplete()) { if (!SetFileTimes()) { ASSERT( IsErrorSet() ); hr = E_FAIL; break; }
hr = S_OK; break; } } } } catch( ComError exception ) { ASSERT( IsErrorSet() ); hr = exception.Error(); }
if ( m_bThrottle ) { m_Network.StopTimer(); }
CloseLocalFile();
RevertToSelf();
delete m_wupdinfo; m_wupdinfo = NULL;
SafeCloseInternetHandle( m_hOpenRequest );
if (FAILED(hr)) { ASSERT( hr == E_RETRY || IsErrorSet() ); }
return hr; }
HRESULT CProgressiveDL::DownloadForegroundFile() { HRESULT hr = E_FAIL; LogDl( "Starting foreground file download" );
while( 1 ) {
//
// Loop of HTTP requests. This is to work around a wininet/winhttp limitation
// where request sizes can be a maximum of 4GB.
//
UINT64 BlockSize64 = m_wupdinfo->FileSize - m_CurrentOffset; DWORD BlockSize = (DWORD)min( BlockSize64, 2147483648 ); LogDl( "Starting foreground file download request block: file size %d, offset %d, block %d", DWORD( m_wupdinfo->FileSize ), DWORD(m_CurrentOffset), BlockSize );
//
// Send a block request and read the reply headers.
//
// hr = (m_wupdinfo->bRange) ? StartRangeRequest( BlockSize ) : StartEncodedRangeRequest( BlockSize );
hr = StartRangeRequest( BlockSize ); if (FAILED(hr)) { ASSERT( IsErrorSet() ); return hr; }
const DWORD MIN_FOREGROUND_BLOCK = 4096; const DWORD MAX_FOREGROUND_BLOCK = FILE_DATA_BUFFER_LEN; const DWORD FOREGROUND_BLOCK_INCREMENT = 1024; const DWORD FOREGROUND_UPDATE_RATE = 2000;
DWORD ForegroundBlockSize = min( MIN_FOREGROUND_BLOCK, BlockSize ); DWORD dwPrevTick = GetTickCount();
while( 1 ) {
//
// Loop of read blocks inside an individual request.
//
if (IsAbortRequested()) { return S_FALSE; }
if ( IsFileComplete() ) { LogDl( "File is done, exiting.\n" );
if (!SetFileTimes()) { ASSERT( IsErrorSet() ); return E_FAIL; } return S_OK; }
BYTE *p = g_FileDataBuffer; DWORD dwTotalBytesRead = 0; DWORD dwBytesToRead = ForegroundBlockSize; DWORD dwRead;
while( 1 ) {
if (! InternetReadFile(m_hOpenRequest, p, dwBytesToRead, &dwRead) ) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, GetLastError(), "InternetReadFile" );
LogWarning( "InternetReadFile failed: len=%d, offset=%I64d, err=%d", ForegroundBlockSize, m_CurrentOffset, GetLastError()); return E_FAIL; }
if ( !dwRead ) break;
dwTotalBytesRead += dwRead; dwBytesToRead -= dwRead; p += dwRead;
if ( !dwBytesToRead ) break; }
if (!WriteBlockToCache( (LPBYTE) g_FileDataBuffer, dwTotalBytesRead )) { ASSERT( IsErrorSet() ); return hr; }
if (dwTotalBytesRead != ForegroundBlockSize && m_CurrentOffset != m_wupdinfo->FileSize) { LogError("Download block : EOF after %d", dwRead ); SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, ERROR_INTERNET_CONNECTION_RESET, "DownloadBlock" ); return E_FAIL; }
if (m_Callbacks->DownloaderProgress( m_CurrentOffset, m_wupdinfo->FileSize )) { // abort was requested
return S_FALSE; }
DWORD dwNewTick = GetTickCount(); DWORD dwTimeDelta = dwNewTick - dwPrevTick;
if ( dwTimeDelta < FOREGROUND_UPDATE_RATE ) ForegroundBlockSize = min( ForegroundBlockSize + FOREGROUND_BLOCK_INCREMENT, MAX_FOREGROUND_BLOCK ); else if ( dwTimeDelta > FOREGROUND_UPDATE_RATE ) ForegroundBlockSize = max( ForegroundBlockSize - FOREGROUND_BLOCK_INCREMENT, MIN_FOREGROUND_BLOCK );
ForegroundBlockSize = min( ForegroundBlockSize, ( m_wupdinfo->FileSize - m_CurrentOffset ) ); dwPrevTick = dwNewTick;
//
// End loop of read blocks
//
}
//
// End loop of requests
//
} }
HRESULT CProgressiveDL::GetNextBlock() { HRESULT hr = E_FAIL;
LogDl( "file size %d, offset %d", DWORD(m_wupdinfo->FileSize), DWORD(m_CurrentOffset) );
m_Network.CalculateIntervalAndBlockSize( m_wupdinfo->FileSize - m_CurrentOffset );
DWORD BlockSize = m_Network.m_BlockSize;
if (BlockSize == 0) { m_Network.TakeSnapshot( CNetworkInterface::BLOCK_START ); m_Network.TakeSnapshot( CNetworkInterface::BLOCK_END ); } else { m_Network.TakeSnapshot( CNetworkInterface::BLOCK_START );
//
// Request a block from the server.
//
// hr = (m_wupdinfo->bRange) ? StartRangeRequest( BlockSize ) : StartEncodedRangeRequest( BlockSize );
hr = StartRangeRequest( BlockSize ); if (FAILED(hr)) { ASSERT( IsErrorSet() ); return hr; }
//
// A single call to InternetReadFile may return only part of the requested data,
// so loop until the entire block has arrived.
//
DWORD dwBytesRead = 0; while (dwBytesRead < BlockSize ) { DWORD dwSize = min( (BlockSize - dwBytesRead) , FILE_DATA_BUFFER_LEN ); DWORD dwRead = 0;
if (! InternetReadFile( m_hOpenRequest, g_FileDataBuffer, dwSize, &dwRead )) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, GetLastError(), "InternetReadFile" );
LogWarning( "InternetReadFile failed: len=%d, offset=%I64d, err=%d", dwSize, m_CurrentOffset, GetLastError());
return E_FAIL; } else if (dwRead == 0) { break; }
dwBytesRead += dwRead;
//
// Save the data.
//
if (!WriteBlockToCache( (LPBYTE) g_FileDataBuffer, dwRead )) { ASSERT( IsErrorSet() ); return hr; }
}
if (dwBytesRead != BlockSize) { LogError("Download block : EOF after %d", dwBytesRead );
SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, ERROR_INTERNET_CONNECTION_RESET, "DownloadBlock" );
return E_FAIL; }
m_Network.TakeSnapshot( CNetworkInterface::BLOCK_END );
if (m_Callbacks->DownloaderProgress( m_CurrentOffset, m_wupdinfo->FileSize )) { // abort was requested
return S_FALSE; } }
//
// Allow other apps to use the network for the rest of the time interval,
// then take the end-of-interval snapshot.
//
m_Network.Wait();
hr = m_Network.TakeSnapshot( CNetworkInterface::BLOCK_INTERVAL_END ); if (SUCCEEDED(hr)) { m_Network.SetInterfaceSpeed(); } else if (hr == HRESULT_FROM_WIN32( ERROR_INVALID_DATA )) { //
// If the snapshot fails with ERROR_INVALID_DATA and the downloads
// keep working, then our NIC has been removed and the networking
// layer has silently transferred our connection to another available
// NIC. We need to identify the NIC that we are now using.
//
LogWarning("NIC is no longer valid. Requesting retry."); hr = E_RETRY; } else SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "TakeSnapshot" );
return hr; }
URL_INFO::URL_INFO( LPCTSTR Url, const PROXY_SETTINGS * a_ProxySettings, const CCredentialsContainer * a_Credentials, LPCTSTR HostId ) : hInternet( 0 ), hConnect( 0 ), FileSize( 0 ), dwFlags( 0 ), bHttp11( true ), ProxySettings( 0 ), fProxy( false ), Credentials( a_Credentials ) { try { LogInfo("new URL_INFO at %p", this );
//
// Split the URL into server, path, name, and password components.
//
URL_COMPONENTS UrlComponents;
ZeroMemory(&UrlComponents, sizeof(UrlComponents));
UrlComponents.dwStructSize = sizeof(UrlComponents); UrlComponents.lpszHostName = HostName; UrlComponents.dwHostNameLength = RTL_NUMBER_OF(HostName); UrlComponents.lpszUrlPath = UrlPath; UrlComponents.dwUrlPathLength = RTL_NUMBER_OF(UrlPath); UrlComponents.lpszUserName = UserName; UrlComponents.dwUserNameLength = RTL_NUMBER_OF(UserName); UrlComponents.lpszPassword = Password; UrlComponents.dwPasswordLength = RTL_NUMBER_OF(Password);
if (! InternetCrackUrl(Url, 0, 0, &UrlComponents)) { if (GetLastError() == ERROR_INSUFFICIENT_BUFFER) { THROW_HRESULT( HRESULT_FROM_WIN32( ERROR_WINHTTP_INVALID_URL )); } ThrowLastError(); }
if (-1 == UrlComponents.dwHostNameLength || -1 == UrlComponents.dwUrlPathLength || -1 == UrlComponents.dwUserNameLength || -1 == UrlComponents.dwPasswordLength) { THROW_HRESULT( HRESULT_FROM_WIN32( ERROR_WINHTTP_INVALID_URL )); }
Port = UrlComponents.nPort;
if (0 == _tcslen(HostName)) { THROW_HRESULT( E_INVALIDARG ); }
if ( HostId && *HostId ) { // redirected to another host.
THROW_HRESULT( StringCbCopy( HostName, sizeof(HostName), HostId ));
LogDl( "Stuck to %!ts!...", UrlComponents.lpszHostName ); }
//
// Set the connect flags.
//
dwFlags = INTERNET_FLAG_NO_UI | INTERNET_FLAG_RELOAD;
#if !defined( USE_WININET )
dwFlags |= WINHTTP_FLAG_ESCAPE_DISABLE_QUERY; #endif
if(UrlComponents.nScheme == INTERNET_SCHEME_HTTPS) { dwFlags |= INTERNET_FLAG_SECURE; }
ProxySettings = new PROXY_SETTINGS_CONTAINER( Url, a_ProxySettings ); } catch ( ComError err ) { Cleanup(); throw; } }
//
// Splitting the explicit cleanup into a separate function allows the constructor to re-use the code.
// The constructor *cannot* explicitly call the destructor if it is going to throw an exception,
// because the destructor will call the StringHandle member destructors and then the constructor
// will call them again (because it is throwing an exception and cleans up the already-constructed
// members).
//
URL_INFO::~URL_INFO() { Cleanup(); }
void URL_INFO::Cleanup() { LogInfo("deleting URL_INFO at %p", this );
Disconnect();
MySecureZeroMemory( UserName, sizeof(UserName) ); MySecureZeroMemory( Password, sizeof(Password) );
delete ProxySettings; ProxySettings = NULL; }
void URL_INFO::Disconnect() { SafeCloseInternetHandle( hConnect ); SafeCloseInternetHandle( hInternet ); }
QMErrInfo URL_INFO::Connect() { try { //
// The proxy stuff is ignored because we will set an explicit proxy on each request.
//
hInternet = InternetOpen( C_BITS_USER_AGENT, INTERNET_OPEN_TYPE_DIRECT, NULL, NULL, 0 );
if (! hInternet ) { ThrowLastError(); }
#ifdef USE_WININET
{ DWORD dwDisable = 1; if (!InternetSetOption(hInternet, INTERNET_OPTION_DISABLE_AUTODIAL, &dwDisable, sizeof(DWORD))) { ThrowLastError(); } } #endif
if (! (hConnect = WinHttpConnect( hInternet, HostName, Port, 0))) //context
{ ThrowLastError(); }
QMErrInfo Success;
return Success; } catch ( ComError err ) { LogError( "error %x connecting to server", err.Error() );
QMErrInfo QmError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, err.Error() );
return QmError; } }
URL_INFO * ConnectToUrl( LPCTSTR Url, const PROXY_SETTINGS * ProxySettings, const CCredentialsContainer * Credentials, const TCHAR * HostId, QMErrInfo * pErrInfo ) { //
// Open a connection to the server.
//
LogDl( "Connecting to %!ts!...", Url);
//
// This should have been checked by the caller.
//
ASSERT( HostId == NULL || wcslen(HostId) < INTERNET_MAX_HOST_NAME_LENGTH );
try { URL_INFO * Info = new URL_INFO( Url, ProxySettings, Credentials, HostId );
*pErrInfo = Info->Connect();
if (pErrInfo->IsSet()) { delete Info; return NULL; }
return Info; } catch ( ComError err ) { pErrInfo->Set( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, err.Error(), "untracked API" ); return NULL; } }
BOOL CProgressiveDL::GetRemoteResourceInformation( URL_INFO * Info, QMErrInfo *pQMErrInfo ) /*
We begin with an HTTP 1.1 HEAD request. If the server replies with version 1.1, we have a persistent connection and the proxy, if present, can cache our requests. If the server replies with version 1.0, we do not have either characteristic. Our GET requests will add "Connection: keep-alive" but it may not do any good. The proxy server, if present, may not understand ranges and if we allow caching then it will cache a range request as if it were the entire file. If the server replies with any other version or the call fails, then we should bail with BG_E_INSUFFICIENT_SERVER_SUPPORT. If an error occurs, we report it and bail.
*/ { HRESULT FailureCode = 0; unsigned FailureLine = 0;
#define CHECK_HRESULT( x ) \
{ \ HRESULT _hr_ = x; \ if (FAILED(_hr_)) \ { \ FailureCode = _hr_; \ FailureLine = __LINE__; \ goto exit; \ } \ }
#define CHECK_BOOL( x ) \
{ \ if (! x ) \ { \ FailureCode = HRESULT_FROM_WIN32( GetLastError() ); \ FailureLine = __LINE__; \ goto exit; \ } \ }
// Assume HTTP1.1 with no proxy until we determine otherwise.
//
Info->bHttp11 = TRUE; Info->bRange = TRUE; Info->fProxy = FALSE;
BOOL b = FALSE; HRESULT hr; HINTERNET hRequest = NULL; DWORD dwErr, dwLength = 0, dwStatus = 0, dwState = 0;
CHECK_HRESULT( OpenHttpRequest( _T("HEAD"), _T("HTTP/1.1"), *Info, &hRequest ) );
CHECK_HRESULT( SendRequest( hRequest, Info ));
// check status
dwLength = sizeof(dwStatus);
CHECK_BOOL( HttpQueryInfo( hRequest, HTTP_QUERY_STATUS_CODE | HTTP_QUERY_FLAG_NUMBER, (LPVOID)&dwStatus, &dwLength, NULL));
if (dwStatus != HTTP_STATUS_OK) { pQMErrInfo->Set( SOURCE_HTTP_SERVER, ERROR_STYLE_HTTP, dwStatus ); goto exit; }
//
// We know that the server replied with a success code. Now determine the HTTP version.
//
unsigned MajorVersion; unsigned MinorVersion;
CHECK_HRESULT( GetResponseVersion( hRequest, &MajorVersion, &MinorVersion ));
if (MajorVersion != 1) { LogWarning("server version %d.%d is outside our supported range", MajorVersion, MinorVersion ); pQMErrInfo->Set( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, BG_E_INSUFFICIENT_HTTP_SUPPORT ); goto exit; }
if (MinorVersion < 1) { Info->bHttp11 = FALSE; Info->dwFlags |= INTERNET_FLAG_DONT_CACHE; }
//
// Now determine the proxy server.
//
CHECK_BOOL( Info->GetProxyUsage( hRequest, pQMErrInfo ));
// check file size
WCHAR FileSizeText[ INT64_DIGITS+1 ]; dwLength = sizeof( FileSizeText );
if (!HttpQueryInfo( hRequest, HTTP_QUERY_CONTENT_LENGTH, FileSizeText, &dwLength, NULL)) { pQMErrInfo->Set( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, BG_E_MISSING_FILE_SIZE, "HttpQueryInfo: content length" ); goto exit; }
if ( 1 != swscanf( FileSizeText, L"%I64u", &Info->FileSize ) ) { pQMErrInfo->Set( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, BG_E_MISSING_FILE_SIZE, "swscanf: content length" ); goto exit; }
LogDl( "File size of %!ts! = %I64u", Info->UrlPath, Info->FileSize);
// check file time
//
SYSTEMTIME sysTime; dwLength = sizeof(sysTime); if (!HttpQueryInfo( hRequest, HTTP_QUERY_LAST_MODIFIED | HTTP_QUERY_FLAG_SYSTEMTIME, (LPVOID)&sysTime, &dwLength, NULL)) { LogWarning( "GetFileSize : HttpQueryInfo( LAST_MODIFIED ) failed with %d", GetLastError()); memset( &Info->UrlModificationTime, 0, sizeof(Info->UrlModificationTime) ); } else { SystemTimeToFileTime(&sysTime, &Info->UrlModificationTime); }
b = TRUE;
exit:
if (FailureCode) { LogError("failure at line %d; hresult = %x", FailureLine, FailureCode ); pQMErrInfo->Set( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, FailureCode ); }
// release allocated objects
//
SafeCloseInternetHandle( hRequest );
return b;
#undef CHECK_HRESULT
#undef CHECK_BOOL
}
BOOL URL_INFO::GetProxyUsage( HINTERNET hRequest, QMErrInfo *ErrInfo ) /*
This function determines whether the completed request in <hRequest> used a proxy server, and if so which one. In BITS 1.0 (Windows XP), it looked in the HTTP 1.1 Via header, but that header isn't present in HTTP 1.0 replies, and a server is allowed to return a fake host name. (see RFC 2616 section 14.45 for details.)
The current version parses the current proxy value in this->ProxySettings, which was calculated by the HTTP layer. The format of a proxy-server entry is as follows:
([<scheme>=][<scheme>"://"]<server>[":"<port>])
this->ProxyHost should include only the server name.
On exit:
if TRUE, fProxy and ProxyHost are set. if FALSE, fProxy and ProxyHost are unchanged and ErrInfo is set.
*/ { try { LPCWSTR p = ProxySettings->GetCurrentProxy();
if (!p) { fProxy = FALSE; return TRUE; }
LPCWSTR p2;
//
// Skip past the [<scheme>=] segment.
//
p2 = wcschr( p, '=' ); if (p2) { ++p2; p = p2; }
//
// Skip past the [<scheme>"://"] segment.
//
p2 = wcschr( p, '/' ); if (p2) { ++p2; if (*p2 == '/') { ++p2; }
p = p2; }
//
// p now points to the beginning of the server name. Copy it.
//
ProxyHost = CAutoString( CopyString( p ));
//
// Find the [":"<port>] segment.
//
LPWSTR pColon = wcschr( ProxyHost.get(), ':' ); if (pColon) { *pColon = '\0'; }
fProxy = TRUE; return TRUE; } catch ( ComError err ) { ErrInfo->Set( SOURCE_HTTP_UNKNOWN, ERROR_STYLE_HRESULT, err.Error() ); return FALSE; } }
//HRESULT
//CProgressiveDL::StartEncodedRangeRequest(
// DWORD Length
// )
//{
// HRESULT hr = S_OK;
// DWORD dwTotalRead = 0, dwRead = 0, dwErr, dwSize = 0, dwStatus;
//
// if (FAILED(hr = CreateBlockUrl(m_wupdinfo->BlockUrl, Length)))
// {
// return hr;
// }
//
// UINT64 Offset = m_CurrentOffset;
//
// //
// // Every block goes to a different URL, so open a new request each time.
// //
// SafeCloseInternetHandle( m_hOpenRequest );
//
// LPCTSTR AcceptTypes[] = {_T("*/*"), NULL};
//
// if (! (m_hOpenRequest = HttpOpenRequest(
// m_wupdinfo->hConnect,
// NULL, // "GET"
// m_wupdinfo->BlockUrl,
// _T("HTTP/1.0"),
// NULL, //referer
// AcceptTypes,
// m_wupdinfo->dwFlags,
// 0))) //context
// {
// SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, GetLastError(), "InternetOpenUrl" );
// return E_FAIL;
// }
//
// hr = AddIf_Unmodified_SinceHeader( m_hOpenRequest, m_wupdinfo->FileCreationTime );
// if (FAILED(hr))
// {
// SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "adding if-unmodifed-since header" );
// return E_FAIL;
// }
//
// if (! HttpAddRequestHeaders(m_hOpenRequest, ACCEPT_ENCODING_STRING, -1L, HTTP_ADDREQ_FLAG_ADD | HTTP_ADDREQ_FLAG_REPLACE ))
// {
// SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, GetLastError(), "add header: accept-encoding" );
// return E_FAIL;
// }
//
// hr = SendRequest( m_hOpenRequest, m_wupdinfo );
// if (FAILED(hr))
// {
// SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "HttpSendRequest" );
// LogError( "HttpSendRequest failed in progressive download loop - offset=%I64d",
// m_CurrentOffset );
// return E_FAIL;
// }
//
// dwSize = sizeof(dwStatus);
// if (! HttpQueryInfo(m_hOpenRequest,
// HTTP_QUERY_STATUS_CODE | HTTP_QUERY_FLAG_NUMBER,
// (void *)&dwStatus,
// &dwSize,
// NULL))
// {
// SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, GetLastError(), "HttpQueryInfo" );
// return E_FAIL;
// }
//
// if ( HTTP_STATUS_PRECOND_FAILED == dwStatus )
// {
// SetError( SOURCE_HTTP_SERVER, ERROR_STYLE_HTTP, dwStatus );
// m_pQMInfo->result = QM_SERVER_FILE_CHANGED;
// return E_FAIL;
// }
//
// if ((dwStatus != HTTP_STATUS_OK) && (dwStatus != HTTP_STATUS_PARTIAL_CONTENT))
// {
// if (DoesErrorIndicateNoISAPI( dwStatus ) )
// {
// LogError("HTTP 1.0 server returned %d, returning INSUFFICIENT_HTTP_SUPPORT", dwStatus);
// SetError( SOURCE_HTTP_SERVER, ERROR_STYLE_HRESULT, BG_E_INSUFFICIENT_HTTP_SUPPORT );
// return BG_E_INSUFFICIENT_HTTP_SUPPORT;
// }
// else
// {
// SetError( SOURCE_HTTP_SERVER, ERROR_STYLE_HTTP, dwStatus );
// return E_FAIL;
// }
// }
// return S_OK;
//}
//
//HRESULT
//CProgressiveDL::CreateBlockUrl(
// LPTSTR lpszNewUrl,
// DWORD Length
// )
//{
// HRESULT hr;
// UINT64 Offset = m_CurrentOffset;
//
// hr = StringCchPrintf( lpszNewUrl,
// INTERNET_MAX_URL_LENGTH,
// _T("%s@%I64d-%I64d@"),
// m_wupdinfo->UrlPath,
// Offset,
// Offset + Length - 1
// );
// if (FAILED(hr))
// {
// SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "printf" );
// return E_FAIL;
// }
//
// return S_OK;
//}
HRESULT CProgressiveDL::StartRangeRequest( DWORD Length ) { HRESULT hr; DWORD dwBegin, dwEnd, dwTotalRead = 0, dwRead = 0, dwErr, dwLength, dwStatus;
UINT64 Offset = m_CurrentOffset;
//todo cleanup by goto exit and close handles
if ( !m_hOpenRequest ) { HINTERNET hRequest;
hr = OpenHttpRequest( NULL, // default is "GET"
m_wupdinfo->bHttp11 ? _T("HTTP/1.1") : _T("HTTP/1.0"), *m_wupdinfo, &hRequest ); if (FAILED(hr)) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "CreateHttpRequest"); return E_FAIL; }
m_hOpenRequest = hRequest;
//
// These headers are constant for a particular file download attempt.
//
hr = AddIf_Unmodified_SinceHeader( m_hOpenRequest, m_wupdinfo->FileCreationTime ); if (FAILED(hr)) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr ); LogError( "unable to add If-Unmodified-Since header: %x", hr); return E_FAIL; }
if (! HttpAddRequestHeaders(m_hOpenRequest, ACCEPT_ENCODING_STRING, -1L, HTTP_ADDREQ_FLAG_ADD | HTTP_ADDREQ_FLAG_REPLACE )) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, GetLastError(), "add header: accept-encoding" ); return E_FAIL; } }
hr = AddRangeHeader( m_hOpenRequest, Offset, Offset + Length - 1 ); if (FAILED(hr)) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "AddRangeHeader" ); return E_FAIL; }
hr = SendRequest( m_hOpenRequest, m_wupdinfo ); if (FAILED(hr)) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "HttpSendRequest" ); LogError( "HttpSendRequest failed in progressive download loop - offset=%I64d", m_CurrentOffset ); return E_FAIL; }
//
// The server sent a reply. See if it was successful.
//
dwLength = sizeof(dwStatus); if (! HttpQueryInfo(m_hOpenRequest, HTTP_QUERY_STATUS_CODE | HTTP_QUERY_FLAG_NUMBER, (LPVOID)&dwStatus, &dwLength, NULL)) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_WIN32, GetLastError(), "HttpQueryInfo" ); return E_FAIL; }
//
// If the server file changed, stop downloading and indicate that to the caller.
//
if ( HTTP_STATUS_PRECOND_FAILED == dwStatus ) { SetError( SOURCE_HTTP_SERVER, ERROR_STYLE_HTTP, dwStatus ); m_pQMInfo->result = QM_SERVER_FILE_CHANGED; return E_FAIL; }
//
// If the server sent an error, fail.
//
if ( dwStatus != HTTP_STATUS_PARTIAL_CONTENT && dwStatus != HTTP_STATUS_OK) { SetError( SOURCE_HTTP_SERVER, ERROR_STYLE_HTTP, dwStatus ); return E_FAIL; }
if (dwStatus == HTTP_STATUS_PARTIAL_CONTENT) { //
// Now see whether the server understood the range request.
// If it understands ranges, then it should have responded with a Content-Range header
// matching our request.
//
hr = CheckReplyRange( m_hOpenRequest, m_CurrentOffset, m_CurrentOffset + Length - 1, m_wupdinfo->FileSize ); if (FAILED(hr)) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "Reply range" ); return hr; }
//
// If the server appears not to support ranges, give up.
//
if (S_FALSE == hr) { m_wupdinfo->Disconnect(); SetError( SOURCE_HTTP_SERVER, ERROR_STYLE_HRESULT, BG_E_INSUFFICIENT_RANGE_SUPPORT ); return BG_E_INSUFFICIENT_RANGE_SUPPORT; } } else { //
// The server replied with status 200. This could mean that the server doesn't understand
// range requests, or that the request encompassed the entire file.
// (In this situation, IIS 5.0 and 6.0 return 206, but some Apache versions return 200.)
// To distinguish them, make sure the starting offset of the request was zero and the
// file length is equal to the original request length.
//
hr = CheckReplyLength( m_hOpenRequest, m_CurrentOffset, Length ); if (FAILED(hr)) { SetError( SOURCE_HTTP_CLIENT_CONN, ERROR_STYLE_HRESULT, hr, "content length" ); return hr; }
//
// If the server did not include a Content-Length header, give up.
//
if (S_FALSE == hr) { m_wupdinfo->Disconnect(); SetError( SOURCE_HTTP_SERVER, ERROR_STYLE_HRESULT, BG_E_INSUFFICIENT_RANGE_SUPPORT ); return BG_E_INSUFFICIENT_RANGE_SUPPORT; } }
//
// Here is the code to switch to encoded range format, in case we need it later.
//
// if (S_FALSE == hr)
// {
// LogDl( "server does not support ranges." );
//
// m_wupdinfo->bHttp11 = FALSE;
// m_wupdinfo->bRange = FALSE;
//
// //
// // We can't just drain the rest of the server response and send again, because the server
// // response is very likely the entire file. Closing the connection will prevent the server
// // from writing, at max, any more than the client socket buffer size (16K).
// //
// m_wupdinfo->Disconnect();
//
// *m_pQMInfo = m_wupdinfo->Connect();
// if (m_pQMInfo->IsSet())
// {
// return E_FAIL;
// }
//
// HRESULT HrReadUrl = StartEncodedRangeRequest( Length );
//
// if ( BG_E_INSUFFICIENT_HTTP_SUPPORT == HrReadUrl )
// {
// SetError( SOURCE_HTTP_SERVER, ERROR_STYLE_HRESULT, BG_E_INSUFFICIENT_RANGE_SUPPORT );
// return BG_E_INSUFFICIENT_RANGE_SUPPORT;
// }
//
// return HrReadUrl;
// }
//
// Getting here means the range request succeeded.
//
return S_OK; }
bool CProgressiveDL::DoesErrorIndicateNoISAPI( DWORD dwHttpError ) { // This function is used on the HTTP return code on an attept
// to use the isapi dll to estimate if the isapi is installed.
// Note, that the ISAPI should only be used after trying
// native HTTP/1.1 and this table assume 1.1 was tried first.
// From RFC 2616
switch( dwHttpError ) { case 100: return false; // Continue
case 101: return false; // Switching Protocols
case 200: return false; // OK
case 201: return false; // Created
case 202: return false; // Accepted
case 203: return false; // Non-Authoritative
case 204: return false; // No Content
case 205: return false; // Reset Context
case 206: return false; // Partial Content
case 300: return false; // Multiple Choices
case 301: return false; // Moved Permanently
case 302: return false; // Found
case 303: return false; // See other
case 304: return false; // Not Modified
case 305: return false; // Use Proxy
case 306: return false; // Unused
case 307: return false; // Temporary Redirect
case 400: return true; // Bad Request
case 401: return false; // Unauthorized
case 402: return false; // Payment Required
case 403: return false; // Forbidden
case 404: return true; // Not Found
case 405: return false; // Method Not Allowed
case 406: return false; // Not Acceptable
case 407: return false; // Proxy Authentication Required
case 408: return false; // Request Timeout
case 409: return false; // Conflict
case 410: return true; // Gone
case 411: return false; // Length Required
case 412: return false; // Precondition Failed
case 413: return false; // Request Entity Too Large
case 414: return false; // Request URI too long
case 415: return false; // Unsupported Media Type
case 416: return false; // Requested Range Not Satisfiable
case 417: return false; // Expectation Failed
case 500: return true; // Internal Server Error
case 501: return true; // Not Implemented
case 502: return true; // Bad Gateway
case 503: return false; // Service Unavailable
case 504: return false; // Gateway Timeout
case 505: return false; // HTTP Version Not Supported
default: // As indicated in the spec, map unknown codes
// to first code in the catagory
if ( dwHttpError >= 100 && dwHttpError < 200 ) return DoesErrorIndicateNoISAPI( 100 ); else if ( dwHttpError >= 200 && dwHttpError < 300 ) return DoesErrorIndicateNoISAPI( 200 ); else if ( dwHttpError >= 300 && dwHttpError < 400 ) return DoesErrorIndicateNoISAPI( 300 ); else if ( dwHttpError >= 400 && dwHttpError < 500 ) return DoesErrorIndicateNoISAPI( 400 ); else if ( dwHttpError >= 500 && dwHttpError < 500 ) return DoesErrorIndicateNoISAPI( 500 ); else // No clue what the error is, assume this has nothing to do with the ISAPI
return false; }
}
BOOL NeedRetry( QMErrInfo * ErrInfo )
{ BOOL bRetry = FALSE;
if (ErrInfo->Source == SOURCE_HTTP_SERVER) { // Almost all of the 400 series HTTP errors( client errors ) are
// fatal. A few such as request timeout may happen during
// stress conditions...
// Note that RFC 2616 says to handle unknown 400 errors as error 400.
if ( ( ErrInfo->Code >= 400 ) && ( ErrInfo->Code < 500 ) ) {
switch( ErrInfo->Code ) { case 408: // request timeout
case 409: // Conflict - Isn't really clear what this is about...
return TRUE; // retry these error
default: return FALSE; // don't retry other 400
} } }
if ( ErrInfo->Style == ERROR_STYLE_HRESULT ) {
switch( LONG(ErrInfo->Code) ) { // These codes indicate dynamic content or
// an unsupported server so no retries are necessary.
case BG_E_MISSING_FILE_SIZE: case BG_E_INSUFFICIENT_HTTP_SUPPORT: case BG_E_INSUFFICIENT_RANGE_SUPPORT: case HRESULT_FROM_WIN32( ERROR_INTERNET_SEC_CERT_ERRORS ): case HRESULT_FROM_WIN32( ERROR_INTERNET_INVALID_CA ): case HRESULT_FROM_WIN32( ERROR_INTERNET_SEC_CERT_CN_INVALID ): case HRESULT_FROM_WIN32( ERROR_INTERNET_SEC_CERT_DATE_INVALID ): case HRESULT_FROM_WIN32( ERROR_INTERNET_SEC_CERT_REV_FAILED ): case HRESULT_FROM_WIN32( ERROR_INTERNET_SEC_CERT_NO_REV ): case HRESULT_FROM_WIN32( ERROR_WINHTTP_SECURE_CERT_REVOKED ): case HRESULT_FROM_WIN32( ERROR_WINHTTP_SECURE_INVALID_CERT ):
return FALSE; }
}
if (COMPONENT_TRANS == (ErrInfo->Source & COMPONENT_MASK)) { return TRUE; }
switch (ErrInfo->Style) { case ERROR_STYLE_WIN32: { switch (ErrInfo->Code) { case ERROR_NOT_ENOUGH_MEMORY: return TRUE; } } }
return FALSE; }
HRESULT CProgressiveDL::GetRemoteFileInformation( HANDLE hToken, LPCTSTR szURL, UINT64 * pFileSize, FILETIME *pFileTime, QMErrInfo *pErrInfo, const PROXY_SETTINGS * pProxySettings, const CCredentialsContainer * Credentials, StringHandle HostId ) { *pFileSize = 0; memset( pFileTime, 0, sizeof(FILETIME) ); pErrInfo->result = QM_IN_PROGRESS;
HRESULT Hr = S_OK;
try { CNestedImpersonation imp( hToken );
auto_ptr<URL_INFO> UrlInfo = auto_ptr<URL_INFO>( ConnectToUrl( szURL, pProxySettings, Credentials, (const WCHAR*)HostId, pErrInfo ));
if (!UrlInfo.get()) { ASSERT( pErrInfo->IsSet() ); throw ComError( E_FAIL ); }
//
// Get file size and time stamp.
//
if (! GetRemoteResourceInformation( UrlInfo.get(), pErrInfo )) { ASSERT( pErrInfo->IsSet() ); throw ComError( E_FAIL ); }
*pFileTime = UrlInfo.get()->UrlModificationTime; *pFileSize = UrlInfo.get()->FileSize;
pErrInfo->result = QM_FILE_DONE; return S_OK; } catch( ComError Error ) { Hr = Error.Error();
if (!pErrInfo->IsSet()) { pErrInfo->Set( SOURCE_HTTP_UNKNOWN, ERROR_STYLE_HRESULT, Hr ); }
if (NeedRetry(pErrInfo)) { pErrInfo->result = QM_FILE_TRANSIENT_ERROR; } else { pErrInfo->result = QM_FILE_FATAL_ERROR; } return E_FAIL; }
return Hr; }
void CProgressiveDL::SetError( ERROR_SOURCE Source, ERROR_STYLE Style, UINT64 Code, char * comment ) { m_pQMInfo->Set( Source, Style, Code, comment ); }
void QMErrInfo::Log() { LogDl( "errinfo: result=%d, error style=%d, code=0x%x, source=%x, description='%S'", result, (DWORD) Style, (DWORD) Code, (DWORD) Source, Description ? Description : L"" ); }
QMErrInfo::QMErrInfo( ERROR_SOURCE Source, ERROR_STYLE Style, UINT64 Code, char * comment ) { result = QM_FILE_TRANSIENT_ERROR; Description = NULL;
Set( Source, Style, Code, comment ); }
void QMErrInfo::Set( ERROR_SOURCE Source, ERROR_STYLE Style, UINT64 Code, char * comment ) { this->Source = Source; this->Style = Style; this->Code = Code;
LogWarning( " errinfo: error %s %s : style %d, source %x, code 0x%x", comment ? "in" : "", comment ? comment : "", (DWORD) Style, (DWORD) Source, (DWORD) Code ); }
HRESULT OpenHttpRequest( LPCTSTR Verb, LPCTSTR Protocol, URL_INFO & Info, HINTERNET * phRequest ) { HINTERNET hRequest = 0;
*phRequest = 0;
try { LPCTSTR AcceptTypes[] = {_T("*/*"), NULL};
if (! (hRequest = HttpOpenRequest( Info.hConnect, Verb, Info.UrlPath, Protocol, NULL, //referer
AcceptTypes, Info.dwFlags, 0))) //context
{ ThrowLastError(); }
#ifndef USE_WININET
//
// BUGBUG jroberts, 10-2-2001:
// WinHttp sometimes mistakenly thinks a site is outside the org, and disallows NTLM.
//
DWORD flag = WINHTTP_AUTOLOGON_SECURITY_LEVEL_LOW;
if (!WinHttpSetOption( hRequest, WINHTTP_OPTION_AUTOLOGON_POLICY, &flag, sizeof(DWORD) )) { ThrowLastError(); } #endif
*phRequest = hRequest; return S_OK; } catch ( ComError err ) { SafeCloseInternetHandle( hRequest ); return err.Error(); } }
HRESULT SendRequest( HINTERNET hRequest, URL_INFO * Info ) { DWORD err = 0;
PVOID Address = &err;
try { if (!WinHttpSetOption( hRequest, WINHTTP_OPTION_CONTEXT_VALUE, &Address, sizeof(PVOID) )) { err = GetLastError();
LogWarning( "can't set context option: %!winerr!", err ); throw ComError( HRESULT_FROM_WIN32( err )); }
//
// Catch errors in the server certificate.
//
if (WINHTTP_INVALID_STATUS_CALLBACK == WinHttpSetStatusCallback( hRequest, HttpRequestCallback, WINHTTP_CALLBACK_FLAG_SECURE_FAILURE, NULL )) { err = GetLastError(); LogError("WinHttpSetStatusCallback failed %d", err ); throw ComError( HRESULT_FROM_WIN32( err )); }
bool fProxyCredentials = false; bool fServerCredentials = false;
retry:
err = 0;
RETURN_HRESULT( SetRequestProxy( hRequest, Info->ProxySettings )); RETURN_HRESULT( SetRequestProxy( Info->hInternet, Info->ProxySettings ));
BOOL b = HttpSendRequest( hRequest, NULL, 0, NULL, 0 );
// err is modified by the callback routine if something was wrong with the server certificate
if (!b) { if (!err) { err = GetLastError(); } LogError("SendRequest failed %d", err ); }
//
// If the proxy failed, try the next proxy in the list.
//
if (IsPossibleProxyFailure( err )) { if (Info->ProxySettings->UseNextProxy()) { fProxyCredentials = false; goto retry; }
throw ComError( HRESULT_FROM_WIN32( err )); }
//
// If the request wasn't sent or the security callback routine reported an error, fail.
//
if (err) { throw ComError( HRESULT_FROM_WIN32( err )); }
//
// If the server or proxy server asked for auth information and we haven't already set it,
// find matching credentials and try again.
//
switch (GetRequestStatus( hRequest )) { case HTTP_STATUS_PROXY_AUTH_REQ: { LogInfo("server returned HTTP_STATUS_PROXY_AUTH_REQ" );
if (!fProxyCredentials && ApplyCredentials( hRequest, Info->Credentials, Info->UserName, Info->Password )) { fProxyCredentials = true; goto retry; } else { // return S_OK and the caller will find the status code
} break; }
case HTTP_STATUS_DENIED: { LogInfo("server returned HTTP_STATUS_DENIED");
if (!fServerCredentials && ApplyCredentials( hRequest, Info->Credentials, Info->UserName, Info->Password )) { fServerCredentials = true; goto retry; } else { // return S_OK and the caller will find the status code
} break; } }
return S_OK; } catch ( ComError err ) { return err.Error(); } }
HRESULT GetResponseVersion( HINTERNET hRequest, unsigned * MajorVersion, unsigned * MinorVersion ) { HRESULT hr;
CAutoString Value;
wchar_t Template[] = L"HTTP/%u.%u"; const MaxChars = RTL_NUMBER_OF( Template ) + INT_DIGITS + INT_DIGITS;
hr = GetRequestHeader( hRequest, WINHTTP_QUERY_VERSION, WINHTTP_HEADER_NAME_BY_INDEX, Value, MaxChars ); if (FAILED(hr)) { LogError("error %x retrieving the response version", hr); return BG_E_INSUFFICIENT_RANGE_SUPPORT; }
if (hr == S_FALSE) { LogError("no response version!"); return BG_E_INSUFFICIENT_RANGE_SUPPORT; }
if (2 != swscanf(Value.get(), Template, MajorVersion, MinorVersion )) { LogError("invalid response version"); return BG_E_INSUFFICIENT_RANGE_SUPPORT; }
LogInfo("server HTTP version is %d.%d", *MajorVersion, *MinorVersion );
return S_OK; }
HRESULT CheckReplyLength( HINTERNET hRequest, UINT64 CorrectOffset, UINT64 CorrectTotal ) { HRESULT hr;
UINT64 ReplyTotal;
CAutoString Value;
if (CorrectOffset != 0) { LogError( "received a 200 reply when the requested offset is nonzero: %I64d", CorrectOffset ); return BG_E_INSUFFICIENT_RANGE_SUPPORT; }
wchar_t Template[] = L"%I64d"; const MaxChars = RTL_NUMBER_OF( Template ) + INT64_DIGITS;
hr = GetRequestHeader( hRequest, WINHTTP_QUERY_CONTENT_LENGTH, WINHTTP_HEADER_NAME_BY_INDEX, Value, MaxChars ); if (FAILED(hr)) { LogError("error %x retrieving the content-length header", hr); return hr; }
if (hr == S_FALSE) { LogWarning("no content-length header"); return S_FALSE; }
if (1 != swscanf(Value.get(), Template, &ReplyTotal)) { LogError("invalid content-length header"); return BG_E_INSUFFICIENT_RANGE_SUPPORT; }
if (ReplyTotal != CorrectTotal) { LogError("incorrect content-length header: %S", Value.get()); return BG_E_INSUFFICIENT_RANGE_SUPPORT; }
return S_OK; }
HRESULT CheckReplyRange( HINTERNET hRequest, UINT64 CorrectStart, UINT64 CorrectEnd, UINT64 CorrectTotal ) { HRESULT hr;
UINT64 RangeStart; UINT64 RangeEnd; UINT64 RangeTotal;
CAutoString Value;
wchar_t Template[] = L"bytes %I64d-%I64d/%I64d"; const MaxChars = RTL_NUMBER_OF( Template ) + INT64_DIGITS + INT64_DIGITS + INT64_DIGITS;
hr = GetRequestHeader( hRequest, WINHTTP_QUERY_CONTENT_RANGE, WINHTTP_HEADER_NAME_BY_INDEX, Value, MaxChars ); if (FAILED(hr)) { LogError("error %x retrieving the content-range header", hr); return hr; }
if (hr == S_FALSE) { LogWarning("no reply range header"); return S_FALSE; }
if (3 != swscanf(Value.get(), Template, &RangeStart, &RangeEnd, &RangeTotal)) { LogError("invalid reply range header"); return BG_E_INSUFFICIENT_RANGE_SUPPORT; }
if (RangeStart != CorrectStart || RangeEnd != CorrectEnd || RangeTotal != CorrectTotal) { LogError("incorrect reply range header: %I64d-%I64d/%I64d", RangeStart, RangeEnd, RangeTotal); return BG_E_INSUFFICIENT_RANGE_SUPPORT; }
return S_OK; }
HRESULT GetRequestHeader( HINTERNET hRequest, DWORD HeaderIndex, LPCWSTR HeaderName, CAutoString & Destination, size_t MaxChars ) /*
Fetch an arbitrary header's value from the request, allocating a string to hold it.
Input:
HeaderIndex and HeaderName follow the rules for WinHttpQueryHeaders() parameters dwInfoLevel and pwszName respectively.
Returns:
S_OK: header found, and Destination holds the value. S_FALSE: header not found all others: an error occurred along the way
*/ { try { DWORD s; HRESULT hr; DWORD ValueLength; CAutoString Value;
WinHttpQueryHeaders( hRequest, HeaderIndex, HeaderName, NULL, &ValueLength, WINHTTP_NO_HEADER_INDEX );
s = GetLastError(); if (s == ERROR_WINHTTP_HEADER_NOT_FOUND) { return S_FALSE; }
if (s != ERROR_INSUFFICIENT_BUFFER) { return HRESULT_FROM_WIN32( s ); }
if (ValueLength > ((MaxChars+1) * sizeof(wchar_t))) { return E_FAIL; }
Value = CAutoString( new wchar_t[ ValueLength ] );
if (!WinHttpQueryHeaders( hRequest, HeaderIndex, HeaderName, Value.get(), &ValueLength, WINHTTP_NO_HEADER_INDEX )) { return HRESULT_FROM_WIN32( GetLastError() ); }
Destination = Value;
return S_OK; } catch ( ComError err ) { return err.Error(); } }
HRESULT AddRangeHeader( HINTERNET hRequest, UINT64 Start, UINT64 End ) { static const TCHAR RangeTemplate[] =_T("Range: bytes=%I64d-%I64d\r\n");
HRESULT hr; TCHAR szHeader[ RTL_NUMBER_OF(RangeTemplate) + INT64_DIGITS + INT64_DIGITS ];
hr = StringCbPrintf(szHeader, sizeof(szHeader), RangeTemplate, Start, End); if (FAILED(hr)) { LogError( "range header is too large for its buffer. start %I64d, end %I64d", Start, End ); return hr; }
if (! HttpAddRequestHeaders( hRequest, szHeader, -1L, HTTP_ADDREQ_FLAG_ADD | HTTP_ADDREQ_FLAG_REPLACE)) { return HRESULT_FROM_WIN32( GetLastError() ); }
return S_OK; }
HRESULT AddIf_Unmodified_SinceHeader( HINTERNET hRequest, const FILETIME &Time ) { const TCHAR szIfModifiedTemplate[] = _T("If-Unmodified-Since: %s\r\n"); static TCHAR szIfModifiedHeader[ (sizeof(szIfModifiedTemplate) / sizeof(TCHAR)) + INTERNET_RFC1123_BUFSIZE*2 ]; static TCHAR szIfModifiedTime[ INTERNET_RFC1123_BUFSIZE*2 ];
HRESULT hr;
SYSTEMTIME stFileCreationTime; if ( !FileTimeToSystemTime( &Time, &stFileCreationTime ) ) { return HRESULT_FROM_WIN32( GetLastError() ); }
if ( !InternetTimeFromSystemTime( &stFileCreationTime, INTERNET_RFC1123_FORMAT, szIfModifiedTime, sizeof( szIfModifiedTime ) ) ) { return HRESULT_FROM_WIN32( GetLastError() ); }
hr = StringCbPrintf( szIfModifiedHeader, sizeof(szIfModifiedHeader), szIfModifiedTemplate, szIfModifiedTime ); if (FAILED(hr)) { return HRESULT_FROM_WIN32( GetLastError() ); }
if (! HttpAddRequestHeaders( hRequest, szIfModifiedHeader, -1L, HTTP_ADDREQ_FLAG_ADD | HTTP_ADDREQ_FLAG_REPLACE )) { return HRESULT_FROM_WIN32( GetLastError() ); }
return S_OK; }
bool ApplyCredentials( HINTERNET hRequest, const CCredentialsContainer * Credentials, WCHAR UserName[], WCHAR Password[] ) { HRESULT hr; DWORD dwSupportedSchemes; DWORD dwPreferredScheme; DWORD dwTarget;
if (!WinHttpQueryAuthSchemes( hRequest, &dwSupportedSchemes, &dwPreferredScheme, &dwTarget )) { if (GetLastError() == ERROR_INVALID_OPERATION) { // no schemes available at all
LogWarning("the server listed no auth schemes"); return false; }
ThrowLastError(); }
LogInfo("target %d, preferred scheme %x, supported schemes %x", dwTarget, dwPreferredScheme, dwSupportedSchemes );
//
// First look for credentials supporting the preferred scheme.
//
if (ApplySchemeCredentials( hRequest, dwTarget, dwPreferredScheme, Credentials, UserName, Password )) { return true; }
//
// Look for any other credential scheme supported by both sides.
//
signed bit; for (bit=31; bit >= 0; --bit) { DWORD dwScheme = (1 << bit);
if (0 != (dwSupportedSchemes & dwScheme)) { if (ApplySchemeCredentials( hRequest, dwTarget, dwScheme, Credentials, UserName, Password )) { return true; } } }
//
// No matching security credential.
//
return false; }
DWORD GetRequestStatus( HINTERNET hRequest ) { DWORD Status; DWORD dwLength = sizeof(Status); if (! HttpQueryInfo( hRequest, HTTP_QUERY_STATUS_CODE | HTTP_QUERY_FLAG_NUMBER, (LPVOID)&Status, &dwLength, NULL)) { ThrowLastError(); }
return Status; }
bool SchemeFromWinHttp( DWORD Scheme, BG_AUTH_SCHEME * pScheme ) { switch (Scheme) { case WINHTTP_AUTH_SCHEME_BASIC: *pScheme = BG_AUTH_SCHEME_BASIC; return true; case WINHTTP_AUTH_SCHEME_DIGEST: *pScheme = BG_AUTH_SCHEME_DIGEST; return true; case WINHTTP_AUTH_SCHEME_NTLM: *pScheme = BG_AUTH_SCHEME_NTLM; return true; case WINHTTP_AUTH_SCHEME_NEGOTIATE: *pScheme = BG_AUTH_SCHEME_NEGOTIATE; return true; case WINHTTP_AUTH_SCHEME_PASSPORT: *pScheme = BG_AUTH_SCHEME_PASSPORT; return true; default: LogWarning("unknown WinHttp scheme 0x%x", Scheme ); return false; } }
BG_AUTH_TARGET TargetFromWinHttp( DWORD Target ) { if (Target == WINHTTP_AUTH_TARGET_PROXY) { return BG_AUTH_TARGET_PROXY; }
if (Target == WINHTTP_AUTH_TARGET_SERVER) { return BG_AUTH_TARGET_SERVER; }
LogWarning("unknown WinHttp target 0x%x", Target ); ASSERT( 0 );
return BG_AUTH_TARGET_SERVER; }
bool ApplySchemeCredentials( HINTERNET hRequest, DWORD dwTarget, DWORD dwScheme, const CCredentialsContainer * Credentials, WCHAR UserName[], WCHAR Password[] ) { BG_AUTH_TARGET BitsTarget; BG_AUTH_SCHEME BitsScheme; BG_AUTH_CREDENTIALS * cred = 0;
BitsTarget = TargetFromWinHttp( dwTarget );
//
// Translate the scheme into the BITS ID and see if a matching credential is available.
//
if (!SchemeFromWinHttp( dwScheme, &BitsScheme )) { // BITS doesn't understand this scheme.
return false; }
if (BitsScheme == BG_AUTH_SCHEME_BASIC && UserName && UserName[0]) { // use credentials embedded in URL
//
} else { HRESULT hr; THROW_HRESULT( hr = Credentials->Find( BitsTarget, BitsScheme, &cred ));
if (hr != S_OK) { // no credential available for this scheme.
return false; }
// use the credential in the dictionary.
//
UserName = cred->Credentials.Basic.UserName; Password = cred->Credentials.Basic.Password; }
//
// Apply the credentials we found.
//
LogInfo("found credentials for scheme %d", BitsScheme );
if (!WinHttpSetCredentials( hRequest, dwTarget, dwScheme, UserName, Password, NULL )) { if (cred) { ScrubCredentials( *cred ); }
ThrowLastError(); }
if (cred) { ScrubCredentials( *cred ); }
return true; }
#ifndef USE_WININET
DWORD MapSecureHttpErrorCode( DWORD flags ) { if (flags & WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CERT) { return ERROR_INTERNET_SEC_CERT_ERRORS; }
if (flags & WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CA) { return ERROR_INTERNET_INVALID_CA; }
if (flags & WINHTTP_CALLBACK_STATUS_FLAG_CERT_CN_INVALID) { return ERROR_INTERNET_SEC_CERT_CN_INVALID; }
if (flags & WINHTTP_CALLBACK_STATUS_FLAG_CERT_DATE_INVALID) { return ERROR_INTERNET_SEC_CERT_DATE_INVALID; }
if (flags & WINHTTP_CALLBACK_STATUS_FLAG_CERT_REVOKED) { return ERROR_ACCESS_DENIED; }
if (flags & WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED) { return ERROR_INTERNET_SEC_CERT_REV_FAILED; }
if (flags & WINHTTP_CALLBACK_STATUS_FLAG_SECURITY_CHANNEL_ERROR) { return ERROR_INTERNET_INTERNAL_ERROR; }
ASSERT( flags );
if (flags) { return ERROR_ACCESS_DENIED; }
return 0; }
VOID CALLBACK HttpRequestCallback( IN HINTERNET hInternet, IN DWORD_PTR dwContext, IN DWORD dwInternetStatus, IN LPVOID lpvStatusInformation OPTIONAL, IN DWORD dwStatusInformationLength ) { switch (dwInternetStatus) { case WINHTTP_CALLBACK_STATUS_SECURE_FAILURE: { DWORD * pErr = LPDWORD( dwContext ); DWORD * pFlags = LPDWORD( lpvStatusInformation );
ASSERT( pErr != NULL );
LogWarning("SSL error: flags %x", *pFlags );
*pErr = MapSecureHttpErrorCode( *pFlags ); break; } default: LogWarning("bogus HTTP notification %x", dwInternetStatus ); break; } }
#endif
|