1 //
2 // Copyright (C) 2009 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 // http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16
17 #include "update_engine/libcurl_http_fetcher.h"
18
19 #include <netinet/in.h>
20 #include <resolv.h>
21 #include <sys/types.h>
22 #include <unistd.h>
23
24 #include <algorithm>
25 #include <string>
26
27 #include <base/bind.h>
28 #include <base/format_macros.h>
29 #include <base/location.h>
30 #include <base/logging.h>
31 #include <base/strings/string_split.h>
32 #include <android-base/stringprintf.h>
33 #include <base/threading/thread_task_runner_handle.h>
34
35 #ifdef __ANDROID__
36 #include <cutils/qtaguid.h>
37 #include <private/android_filesystem_config.h>
38 #endif // __ANDROID__
39
40 #include "update_engine/certificate_checker.h"
41 #include "update_engine/common/hardware_interface.h"
42 #include "update_engine/common/platform_constants.h"
43 #include "update_engine/common/utils.h"
44
45 using base::TimeDelta;
46 using brillo::MessageLoop;
47 using std::max;
48 using std::string;
49
50 // This is a concrete implementation of HttpFetcher that uses libcurl to do the
51 // http work.
52
53 namespace chromeos_update_engine {
54
55 namespace {
56
57 const int kNoNetworkRetrySeconds = 10;
58
59 // libcurl's CURLOPT_SOCKOPTFUNCTION callback function. Called after the socket
60 // is created but before it is connected. This callback tags the created socket
61 // so the network usage can be tracked in Android.
LibcurlSockoptCallback(void *,curl_socket_t curlfd,curlsocktype)62 int LibcurlSockoptCallback(void* /* clientp */,
63 curl_socket_t curlfd,
64 curlsocktype /* purpose */) {
65 #ifdef __ANDROID__
66 // Socket tag used by all network sockets. See qtaguid kernel module for
67 // stats.
68 const int kUpdateEngineSocketTag = 0x55417243; // "CrAU" in little-endian.
69 qtaguid_tagSocket(curlfd, kUpdateEngineSocketTag, AID_OTA_UPDATE);
70 #endif // __ANDROID__
71 return CURL_SOCKOPT_OK;
72 }
73
74 } // namespace
75
76 // static
LibcurlCloseSocketCallback(void * clientp,curl_socket_t item)77 int LibcurlHttpFetcher::LibcurlCloseSocketCallback(void* clientp,
78 curl_socket_t item) {
79 #ifdef __ANDROID__
80 qtaguid_untagSocket(item);
81 #endif // __ANDROID__
82
83 LibcurlHttpFetcher* fetcher = static_cast<LibcurlHttpFetcher*>(clientp);
84 // Stop watching the socket before closing it.
85 for (size_t t = 0; t < std::size(fetcher->fd_controller_maps_); ++t) {
86 fetcher->fd_controller_maps_[t].erase(item);
87 }
88
89 // Documentation for this callback says to return 0 on success or 1 on error.
90 if (!IGNORE_EINTR(close(item)))
91 return 0;
92 return 1;
93 }
94
LibcurlHttpFetcher(HardwareInterface * hardware)95 LibcurlHttpFetcher::LibcurlHttpFetcher(HardwareInterface* hardware)
96 : hardware_(hardware) {
97 // Dev users want a longer timeout (180 seconds) because they may
98 // be waiting on the dev server to build an image.
99 if (!hardware_->IsOfficialBuild())
100 low_speed_time_seconds_ = kDownloadDevModeLowSpeedTimeSeconds;
101 if (hardware_->IsOOBEEnabled() && !hardware_->IsOOBEComplete(nullptr))
102 max_retry_count_ = kDownloadMaxRetryCountOobeNotComplete;
103 }
104
~LibcurlHttpFetcher()105 LibcurlHttpFetcher::~LibcurlHttpFetcher() {
106 LOG_IF(ERROR, transfer_in_progress_)
107 << "Destroying the fetcher while a transfer is in progress.";
108 CleanUp();
109 }
110
GetProxyType(const string & proxy_str,curl_proxytype * out_type)111 bool LibcurlHttpFetcher::GetProxyType(const string& proxy_str,
112 curl_proxytype* out_type) {
113 auto proxy = ToLower(proxy_str);
114 if (android::base::StartsWith(proxy, "socks5://") ||
115 android::base::StartsWith(proxy, "socks://")) {
116 *out_type = CURLPROXY_SOCKS5_HOSTNAME;
117 return true;
118 }
119 if (android::base::StartsWith(proxy, "socks4://")) {
120 *out_type = CURLPROXY_SOCKS4A;
121 return true;
122 }
123 if (android::base::StartsWith(proxy, "http://") ||
124 android::base::StartsWith(proxy, "https://")) {
125 *out_type = CURLPROXY_HTTP;
126 return true;
127 }
128 if (android::base::StartsWith(proxy, kNoProxy)) {
129 // known failure case. don't log.
130 return false;
131 }
132 LOG(INFO) << "Unknown proxy type: " << proxy;
133 return false;
134 }
135
ResumeTransfer(const string & url)136 void LibcurlHttpFetcher::ResumeTransfer(const string& url) {
137 LOG(INFO) << "Starting/Resuming transfer";
138 CHECK(!transfer_in_progress_);
139 url_ = url;
140 curl_multi_handle_ = curl_multi_init();
141 CHECK(curl_multi_handle_);
142
143 curl_handle_ = curl_easy_init();
144 CHECK(curl_handle_);
145 ignore_failure_ = false;
146
147 // Tag and untag the socket for network usage stats.
148 curl_easy_setopt(
149 curl_handle_, CURLOPT_SOCKOPTFUNCTION, LibcurlSockoptCallback);
150 curl_easy_setopt(
151 curl_handle_, CURLOPT_CLOSESOCKETFUNCTION, LibcurlCloseSocketCallback);
152 curl_easy_setopt(curl_handle_, CURLOPT_CLOSESOCKETDATA, this);
153
154 CHECK(HasProxy());
155 bool is_direct = (GetCurrentProxy() == kNoProxy);
156 LOG(INFO) << "Using proxy: " << (is_direct ? "no" : "yes");
157 if (is_direct) {
158 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROXY, ""), CURLE_OK);
159 } else {
160 CHECK_EQ(curl_easy_setopt(
161 curl_handle_, CURLOPT_PROXY, GetCurrentProxy().c_str()),
162 CURLE_OK);
163 // Curl seems to require us to set the protocol
164 curl_proxytype type{};
165 if (GetProxyType(GetCurrentProxy(), &type)) {
166 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROXYTYPE, type),
167 CURLE_OK);
168 }
169 }
170
171 if (post_data_set_) {
172 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_POST, 1), CURLE_OK);
173 CHECK_EQ(
174 curl_easy_setopt(curl_handle_, CURLOPT_POSTFIELDS, post_data_.data()),
175 CURLE_OK);
176 CHECK_EQ(curl_easy_setopt(
177 curl_handle_, CURLOPT_POSTFIELDSIZE, post_data_.size()),
178 CURLE_OK);
179 }
180
181 // Setup extra HTTP headers.
182 if (curl_http_headers_) {
183 curl_slist_free_all(curl_http_headers_);
184 curl_http_headers_ = nullptr;
185 }
186 for (const auto& header : extra_headers_) {
187 // curl_slist_append() copies the string.
188 curl_http_headers_ =
189 curl_slist_append(curl_http_headers_, header.second.c_str());
190 }
191 if (post_data_set_) {
192 // Set the Content-Type HTTP header, if one was specifically set.
193 if (post_content_type_ != kHttpContentTypeUnspecified) {
194 const string content_type_attr = android::base::StringPrintf(
195 "Content-Type: %s", GetHttpContentTypeString(post_content_type_));
196 curl_http_headers_ =
197 curl_slist_append(curl_http_headers_, content_type_attr.c_str());
198 } else {
199 LOG(WARNING) << "no content type set, using libcurl default";
200 }
201 }
202 CHECK_EQ(
203 curl_easy_setopt(curl_handle_, CURLOPT_HTTPHEADER, curl_http_headers_),
204 CURLE_OK);
205
206 if (bytes_downloaded_ > 0 || download_length_) {
207 // Resume from where we left off.
208 resume_offset_ = bytes_downloaded_;
209 CHECK_GE(resume_offset_, 0);
210
211 // Compute end offset, if one is specified. As per HTTP specification, this
212 // is an inclusive boundary. Make sure it doesn't overflow.
213 size_t end_offset = 0;
214 if (download_length_) {
215 end_offset = static_cast<size_t>(resume_offset_) + download_length_ - 1;
216 CHECK_LE((size_t)resume_offset_, end_offset);
217 }
218
219 // Create a string representation of the desired range.
220 string range_str = android::base::StringPrintf(
221 "%" PRIu64 "-", static_cast<uint64_t>(resume_offset_));
222 if (end_offset)
223 range_str += std::to_string(end_offset);
224 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_RANGE, range_str.c_str()),
225 CURLE_OK);
226 }
227
228 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_WRITEDATA, this), CURLE_OK);
229 CHECK_EQ(
230 curl_easy_setopt(curl_handle_, CURLOPT_WRITEFUNCTION, StaticLibcurlWrite),
231 CURLE_OK);
232 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_URL, url_.c_str()), CURLE_OK);
233
234 // If the connection drops under |low_speed_limit_bps_| (10
235 // bytes/sec by default) for |low_speed_time_seconds_| (90 seconds,
236 // 180 on non-official builds), reconnect.
237 CHECK_EQ(curl_easy_setopt(
238 curl_handle_, CURLOPT_LOW_SPEED_LIMIT, low_speed_limit_bps_),
239 CURLE_OK);
240 CHECK_EQ(curl_easy_setopt(
241 curl_handle_, CURLOPT_LOW_SPEED_TIME, low_speed_time_seconds_),
242 CURLE_OK);
243 CHECK_EQ(curl_easy_setopt(
244 curl_handle_, CURLOPT_CONNECTTIMEOUT, connect_timeout_seconds_),
245 CURLE_OK);
246
247 // By default, libcurl doesn't follow redirections. Allow up to
248 // |kDownloadMaxRedirects| redirections.
249 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_FOLLOWLOCATION, 1), CURLE_OK);
250 CHECK_EQ(
251 curl_easy_setopt(curl_handle_, CURLOPT_MAXREDIRS, kDownloadMaxRedirects),
252 CURLE_OK);
253
254 // Lock down the appropriate curl options for HTTP or HTTPS depending on
255 // the url.
256 if (hardware_->IsOfficialBuild()) {
257 if (android::base::StartsWith(ToLower(url_), "http://")) {
258 SetCurlOptionsForHttp();
259 } else if (android::base::StartsWith(ToLower(url_), "https://")) {
260 SetCurlOptionsForHttps();
261 #ifdef __ANDROID__
262 } else if (android::base::StartsWith(ToLower(url_), "file://")) {
263 SetCurlOptionsForFile();
264 #endif // __ANDROID__
265 } else {
266 LOG(ERROR) << "Received invalid URI: " << url_;
267 // Lock down to no protocol supported for the transfer.
268 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, 0), CURLE_OK);
269 }
270 } else {
271 LOG(INFO) << "Not setting http(s) curl options because we are "
272 << "running a dev/test image";
273 }
274
275 CHECK_EQ(curl_multi_add_handle(curl_multi_handle_, curl_handle_), CURLM_OK);
276 transfer_in_progress_ = true;
277 }
278
279 // Lock down only the protocol in case of HTTP.
SetCurlOptionsForHttp()280 void LibcurlHttpFetcher::SetCurlOptionsForHttp() {
281 LOG(INFO) << "Setting up curl options for HTTP";
282 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, CURLPROTO_HTTP),
283 CURLE_OK);
284 CHECK_EQ(
285 curl_easy_setopt(curl_handle_, CURLOPT_REDIR_PROTOCOLS, CURLPROTO_HTTP),
286 CURLE_OK);
287 }
288
289 // Security lock-down in official builds: makes sure that peer certificate
290 // verification is enabled, restricts the set of trusted certificates,
291 // restricts protocols to HTTPS, restricts ciphers to HIGH.
SetCurlOptionsForHttps()292 void LibcurlHttpFetcher::SetCurlOptionsForHttps() {
293 LOG(INFO) << "Setting up curl options for HTTPS";
294 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_VERIFYPEER, 1), CURLE_OK);
295 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_VERIFYHOST, 2), CURLE_OK);
296 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_CAINFO, nullptr), CURLE_OK);
297 CHECK_EQ(curl_easy_setopt(
298 curl_handle_, CURLOPT_CAPATH, constants::kCACertificatesPath),
299 CURLE_OK);
300 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, CURLPROTO_HTTPS),
301 CURLE_OK);
302 CHECK_EQ(
303 curl_easy_setopt(curl_handle_, CURLOPT_REDIR_PROTOCOLS, CURLPROTO_HTTPS),
304 CURLE_OK);
305 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_CIPHER_LIST, "HIGH:!ADH"),
306 CURLE_OK);
307 if (server_to_check_ != ServerToCheck::kNone) {
308 CHECK_EQ(
309 curl_easy_setopt(curl_handle_, CURLOPT_SSL_CTX_DATA, &server_to_check_),
310 CURLE_OK);
311 CHECK_EQ(curl_easy_setopt(curl_handle_,
312 CURLOPT_SSL_CTX_FUNCTION,
313 CertificateChecker::ProcessSSLContext),
314 CURLE_OK);
315 }
316 }
317
318 // Lock down only the protocol in case of a local file.
SetCurlOptionsForFile()319 void LibcurlHttpFetcher::SetCurlOptionsForFile() {
320 LOG(INFO) << "Setting up curl options for FILE";
321 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, CURLPROTO_FILE),
322 CURLE_OK);
323 CHECK_EQ(
324 curl_easy_setopt(curl_handle_, CURLOPT_REDIR_PROTOCOLS, CURLPROTO_FILE),
325 CURLE_OK);
326 }
327
328 // Begins the transfer, which must not have already been started.
BeginTransfer(const string & url)329 void LibcurlHttpFetcher::BeginTransfer(const string& url) {
330 CHECK(!transfer_in_progress_);
331 url_ = url;
332
333 transfer_size_ = -1;
334 resume_offset_ = 0;
335 retry_count_ = 0;
336 no_network_retry_count_ = 0;
337 http_response_code_ = 0;
338 terminate_requested_ = false;
339 sent_byte_ = false;
340
341 // If we are paused, we delay these two operations until Unpause is called.
342 if (transfer_paused_) {
343 restart_transfer_on_unpause_ = true;
344 return;
345 }
346 ResumeTransfer(url_);
347 CurlPerformOnce();
348 }
349
ForceTransferTermination()350 void LibcurlHttpFetcher::ForceTransferTermination() {
351 CleanUp();
352 if (delegate_) {
353 // Note that after the callback returns this object may be destroyed.
354 delegate_->TransferTerminated(this);
355 }
356 }
357
TerminateTransfer()358 void LibcurlHttpFetcher::TerminateTransfer() {
359 if (in_write_callback_) {
360 terminate_requested_ = true;
361 } else {
362 ForceTransferTermination();
363 }
364 }
365
SetHeader(const string & header_name,const string & header_value)366 void LibcurlHttpFetcher::SetHeader(const string& header_name,
367 const string& header_value) {
368 string header_line = header_name + ": " + header_value;
369 // Avoid the space if no data on the right side of the semicolon.
370 if (header_value.empty())
371 header_line = header_name + ":";
372 TEST_AND_RETURN(header_line.find('\n') == string::npos);
373 TEST_AND_RETURN(header_name.find(':') == string::npos);
374 extra_headers_[ToLower(header_name)] = header_line;
375 }
376
377 // Inputs: header_name, header_value
378 // Example:
379 // extra_headers_ = { {"foo":"foo: 123"}, {"bar":"bar:"} }
380 // string tmp = "gibberish";
381 // Case 1:
382 // GetHeader("foo", &tmp) -> tmp = "123", return true.
383 // Case 2:
384 // GetHeader("bar", &tmp) -> tmp = "", return true.
385 // Case 3:
386 // GetHeader("moo", &tmp) -> tmp = "", return false.
GetHeader(const string & header_name,string * header_value) const387 bool LibcurlHttpFetcher::GetHeader(const string& header_name,
388 string* header_value) const {
389 // Initially clear |header_value| to handle both success and failures without
390 // leaving |header_value| in a unclear state.
391 header_value->clear();
392 auto header_key = ToLower(header_name);
393 auto header_line_itr = extra_headers_.find(header_key);
394 // If the |header_name| was never set, indicate so by returning false.
395 if (header_line_itr == extra_headers_.end())
396 return false;
397 // From |SetHeader()| the check for |header_name| to not include ":" is
398 // verified, so finding the first index of ":" is a safe operation.
399 auto header_line = header_line_itr->second;
400 *header_value = header_line.substr(header_line.find(':') + 1);
401 // The following is neccessary to remove the leading ' ' before the header
402 // value that was place only if |header_value| passed to |SetHeader()| was
403 // a non-empty string.
404 header_value->erase(0, 1);
405 return true;
406 }
407
CurlPerformOnce()408 void LibcurlHttpFetcher::CurlPerformOnce() {
409 CHECK(transfer_in_progress_);
410 int running_handles = 0;
411 CURLMcode retcode = CURLM_CALL_MULTI_PERFORM;
412
413 // libcurl may request that we immediately call curl_multi_perform after it
414 // returns, so we do. libcurl promises that curl_multi_perform will not block.
415 while (CURLM_CALL_MULTI_PERFORM == retcode) {
416 retcode = curl_multi_perform(curl_multi_handle_, &running_handles);
417 if (terminate_requested_) {
418 ForceTransferTermination();
419 return;
420 }
421 }
422
423 // When retcode is not |CURLM_OK| at this point, libcurl has an internal error
424 // that it is less likely to recover from (libcurl bug, out-of-memory, etc.).
425 // In case of an update check, we send UMA metrics and log the error.
426 if (is_update_check_ &&
427 (retcode == CURLM_OUT_OF_MEMORY || retcode == CURLM_INTERNAL_ERROR)) {
428 auxiliary_error_code_ = ErrorCode::kInternalLibCurlError;
429 LOG(ERROR) << "curl_multi_perform is in an unrecoverable error condition: "
430 << retcode;
431 } else if (retcode != CURLM_OK) {
432 LOG(ERROR) << "curl_multi_perform returns error: " << retcode;
433 }
434
435 // If the transfer completes while paused, we should ignore the failure once
436 // the fetcher is unpaused.
437 if (running_handles == 0 && transfer_paused_ && !ignore_failure_) {
438 LOG(INFO) << "Connection closed while paused, ignoring failure.";
439 ignore_failure_ = true;
440 }
441
442 if (running_handles != 0 || transfer_paused_) {
443 // There's either more work to do or we are paused, so we just keep the
444 // file descriptors to watch up to date and exit, until we are done with the
445 // work and we are not paused.
446 //
447 // When there's no |base::SingleThreadTaskRunner| on current thread, it's
448 // not possible to watch file descriptors. Just poll it later. This usually
449 // happens if |brillo::FakeMessageLoop| is used.
450 if (!base::ThreadTaskRunnerHandle::IsSet()) {
451 MessageLoop::current()->PostDelayedTask(
452 FROM_HERE,
453 base::Bind(&LibcurlHttpFetcher::CurlPerformOnce,
454 base::Unretained(this)),
455 TimeDelta::FromSeconds(1));
456 return;
457 }
458 SetupMessageLoopSources();
459 return;
460 }
461
462 // At this point, the transfer was completed in some way (error, connection
463 // closed or download finished).
464
465 GetHttpResponseCode();
466 if (http_response_code_) {
467 LOG(INFO) << "HTTP response code: " << http_response_code_;
468 no_network_retry_count_ = 0;
469 unresolved_host_state_machine_.UpdateState(false);
470 } else {
471 LOG(ERROR) << "Unable to get http response code.";
472 CURLcode curl_code = GetCurlCode();
473 LOG(ERROR) << "Return code for the transfer: " << curl_code;
474 if (curl_code == CURLE_COULDNT_RESOLVE_HOST) {
475 LOG(ERROR) << "libcurl can not resolve host.";
476 unresolved_host_state_machine_.UpdateState(true);
477 auxiliary_error_code_ = ErrorCode::kUnresolvedHostError;
478 }
479 }
480
481 // we're done!
482 CleanUp();
483
484 if (unresolved_host_state_machine_.GetState() ==
485 UnresolvedHostStateMachine::State::kRetry) {
486 // Based on
487 // https://curl.haxx.se/docs/todo.html#updated_DNS_server_while_running,
488 // update_engine process should call res_init() and unconditionally retry.
489 res_init();
490 no_network_max_retries_++;
491 LOG(INFO) << "Will retry after reloading resolv.conf because last attempt "
492 "failed to resolve host.";
493 } else if (unresolved_host_state_machine_.GetState() ==
494 UnresolvedHostStateMachine::State::kRetriedSuccess) {
495 auxiliary_error_code_ = ErrorCode::kUnresolvedHostRecovered;
496 }
497
498 // TODO(petkov): This temporary code tries to deal with the case where the
499 // update engine performs an update check while the network is not ready
500 // (e.g., right after resume). Longer term, we should check if the network
501 // is online/offline and return an appropriate error code.
502 if (!sent_byte_ && http_response_code_ == 0 &&
503 no_network_retry_count_ < no_network_max_retries_) {
504 no_network_retry_count_++;
505 retry_task_id_ = MessageLoop::current()->PostDelayedTask(
506 FROM_HERE,
507 base::Bind(&LibcurlHttpFetcher::RetryTimeoutCallback,
508 base::Unretained(this)),
509 TimeDelta::FromSeconds(kNoNetworkRetrySeconds));
510 LOG(INFO) << "No HTTP response, retry " << no_network_retry_count_;
511 } else if ((!sent_byte_ && !IsHttpResponseSuccess()) ||
512 IsHttpResponseError()) {
513 // The transfer completed w/ error and we didn't get any bytes.
514 // If we have another proxy to try, try that.
515 //
516 // TODO(garnold) in fact there are two separate cases here: one case is an
517 // other-than-success return code (including no return code) and no
518 // received bytes, which is necessary due to the way callbacks are
519 // currently processing error conditions; the second is an explicit HTTP
520 // error code, where some data may have been received (as in the case of a
521 // semi-successful multi-chunk fetch). This is a confusing behavior and
522 // should be unified into a complete, coherent interface.
523 LOG(INFO) << "Transfer resulted in an error (" << http_response_code_
524 << "), " << bytes_downloaded_ << " bytes downloaded";
525
526 PopProxy(); // Delete the proxy we just gave up on.
527
528 if (HasProxy()) {
529 // We have another proxy. Retry immediately.
530 LOG(INFO) << "Retrying with next proxy setting";
531 retry_task_id_ = MessageLoop::current()->PostTask(
532 FROM_HERE,
533 base::Bind(&LibcurlHttpFetcher::RetryTimeoutCallback,
534 base::Unretained(this)));
535 } else {
536 // Out of proxies. Give up.
537 LOG(INFO) << "No further proxies, indicating transfer complete";
538 if (delegate_)
539 delegate_->TransferComplete(this, false); // signal fail
540 return;
541 }
542 } else if ((transfer_size_ >= 0) && (bytes_downloaded_ < transfer_size_)) {
543 if (!ignore_failure_)
544 retry_count_++;
545 LOG(INFO) << "Transfer interrupted after downloading " << bytes_downloaded_
546 << " of " << transfer_size_ << " bytes. "
547 << transfer_size_ - bytes_downloaded_ << " bytes remaining "
548 << "after " << retry_count_ << " attempt(s)";
549
550 if (retry_count_ > max_retry_count_) {
551 LOG(INFO) << "Reached max attempts (" << retry_count_ << ")";
552 if (delegate_)
553 delegate_->TransferComplete(this, false); // signal fail
554 return;
555 }
556 // Need to restart transfer
557 LOG(INFO) << "Restarting transfer to download the remaining bytes";
558 retry_task_id_ = MessageLoop::current()->PostDelayedTask(
559 FROM_HERE,
560 base::Bind(&LibcurlHttpFetcher::RetryTimeoutCallback,
561 base::Unretained(this)),
562 TimeDelta::FromSeconds(retry_seconds_));
563 } else {
564 LOG(INFO) << "Transfer completed (" << http_response_code_ << "), "
565 << bytes_downloaded_ << " bytes downloaded";
566 if (delegate_) {
567 bool success = IsHttpResponseSuccess();
568 delegate_->TransferComplete(this, success);
569 }
570 return;
571 }
572 // If we reach this point is because TransferComplete() was not called in any
573 // of the previous branches. The delegate is allowed to destroy the object
574 // once TransferComplete is called so this would be illegal.
575 ignore_failure_ = false;
576 }
577
LibcurlWrite(void * ptr,size_t size,size_t nmemb)578 size_t LibcurlHttpFetcher::LibcurlWrite(void* ptr, size_t size, size_t nmemb) {
579 // Update HTTP response first.
580 GetHttpResponseCode();
581 const size_t payload_size = size * nmemb;
582
583 // Do nothing if no payload or HTTP response is an error.
584 if (payload_size == 0 || !IsHttpResponseSuccess()) {
585 LOG(INFO) << "HTTP response unsuccessful (" << http_response_code_
586 << ") or no payload (" << payload_size << "), nothing to do";
587 return 0;
588 }
589
590 sent_byte_ = true;
591 {
592 double transfer_size_double{};
593 CHECK_EQ(curl_easy_getinfo(curl_handle_,
594 CURLINFO_CONTENT_LENGTH_DOWNLOAD,
595 &transfer_size_double),
596 CURLE_OK);
597 off_t new_transfer_size = static_cast<off_t>(transfer_size_double);
598 if (new_transfer_size > 0) {
599 transfer_size_ = resume_offset_ + new_transfer_size;
600 }
601 }
602 bytes_downloaded_ += payload_size;
603 if (delegate_) {
604 in_write_callback_ = true;
605 auto should_terminate = !delegate_->ReceivedBytes(this, ptr, payload_size);
606 in_write_callback_ = false;
607 if (should_terminate) {
608 LOG(INFO) << "Requesting libcurl to terminate transfer.";
609 // Returning an amount that differs from the received size signals an
610 // error condition to libcurl, which will cause the transfer to be
611 // aborted.
612 return 0;
613 }
614 }
615 return payload_size;
616 }
617
Pause()618 void LibcurlHttpFetcher::Pause() {
619 if (transfer_paused_) {
620 LOG(ERROR) << "Fetcher already paused.";
621 return;
622 }
623 transfer_paused_ = true;
624 if (!transfer_in_progress_) {
625 // If pause before we started a connection, we don't need to notify curl
626 // about that, we will simply not start the connection later.
627 return;
628 }
629 CHECK(curl_handle_);
630 CHECK_EQ(curl_easy_pause(curl_handle_, CURLPAUSE_ALL), CURLE_OK);
631 }
632
Unpause()633 void LibcurlHttpFetcher::Unpause() {
634 if (!transfer_paused_) {
635 LOG(ERROR) << "Resume attempted when fetcher not paused.";
636 return;
637 }
638 transfer_paused_ = false;
639 if (restart_transfer_on_unpause_) {
640 restart_transfer_on_unpause_ = false;
641 ResumeTransfer(url_);
642 CurlPerformOnce();
643 return;
644 }
645 if (!transfer_in_progress_) {
646 // If resumed before starting the connection, there's no need to notify
647 // anybody. We will simply start the connection once it is time.
648 return;
649 }
650 CHECK(curl_handle_);
651 CHECK_EQ(curl_easy_pause(curl_handle_, CURLPAUSE_CONT), CURLE_OK);
652 // Since the transfer is in progress, we need to dispatch a CurlPerformOnce()
653 // now to let the connection continue, otherwise it would be called by the
654 // TimeoutCallback but with a delay.
655 CurlPerformOnce();
656 }
657
658 // This method sets up callbacks with the MessageLoop.
SetupMessageLoopSources()659 void LibcurlHttpFetcher::SetupMessageLoopSources() {
660 fd_set fd_read;
661 fd_set fd_write;
662 fd_set fd_exc;
663
664 FD_ZERO(&fd_read);
665 FD_ZERO(&fd_write);
666 FD_ZERO(&fd_exc);
667
668 int fd_max = 0;
669
670 // Ask libcurl for the set of file descriptors we should track on its
671 // behalf.
672 CHECK_EQ(curl_multi_fdset(
673 curl_multi_handle_, &fd_read, &fd_write, &fd_exc, &fd_max),
674 CURLM_OK);
675
676 // We should iterate through all file descriptors up to libcurl's fd_max or
677 // the highest one we're tracking, whichever is larger.
678 for (size_t t = 0; t < std::size(fd_controller_maps_); ++t) {
679 if (!fd_controller_maps_[t].empty())
680 fd_max = max(fd_max, fd_controller_maps_[t].rbegin()->first);
681 }
682
683 // For each fd, if we're not tracking it, track it. If we are tracking it, but
684 // libcurl doesn't care about it anymore, stop tracking it. After this loop,
685 // there should be exactly as many tasks scheduled in
686 // fd_controller_maps_[0|1] as there are read/write fds that we're tracking.
687 for (int fd = 0; fd <= fd_max; ++fd) {
688 // Note that fd_exc is unused in the current version of libcurl so is_exc
689 // should always be false.
690 bool is_exc = FD_ISSET(fd, &fd_exc) != 0;
691 bool must_track[2] = {
692 is_exc || (FD_ISSET(fd, &fd_read) != 0), // track 0 -- read
693 is_exc || (FD_ISSET(fd, &fd_write) != 0) // track 1 -- write
694 };
695
696 for (size_t t = 0; t < std::size(fd_controller_maps_); ++t) {
697 bool tracked =
698 fd_controller_maps_[t].find(fd) != fd_controller_maps_[t].end();
699
700 if (!must_track[t]) {
701 // If we have an outstanding io_channel, remove it.
702 fd_controller_maps_[t].erase(fd);
703 continue;
704 }
705
706 // If we are already tracking this fd, continue -- nothing to do.
707 if (tracked)
708 continue;
709
710 // Track a new fd.
711 switch (t) {
712 case 0: // Read
713 fd_controller_maps_[t][fd] =
714 base::FileDescriptorWatcher::WatchReadable(
715 fd,
716 base::BindRepeating(&LibcurlHttpFetcher::CurlPerformOnce,
717 base::Unretained(this)));
718 break;
719 case 1: // Write
720 fd_controller_maps_[t][fd] =
721 base::FileDescriptorWatcher::WatchWritable(
722 fd,
723 base::BindRepeating(&LibcurlHttpFetcher::CurlPerformOnce,
724 base::Unretained(this)));
725 }
726 static int io_counter = 0;
727 io_counter++;
728 if (io_counter % 50 == 0) {
729 LOG(INFO) << "io_counter = " << io_counter;
730 }
731 }
732 }
733
734 // Set up a timeout callback for libcurl.
735 if (timeout_id_ == MessageLoop::kTaskIdNull) {
736 VLOG(1) << "Setting up timeout source: " << idle_seconds_ << " seconds.";
737 timeout_id_ = MessageLoop::current()->PostDelayedTask(
738 FROM_HERE,
739 base::Bind(&LibcurlHttpFetcher::TimeoutCallback,
740 base::Unretained(this)),
741 TimeDelta::FromSeconds(idle_seconds_));
742 }
743 }
744
RetryTimeoutCallback()745 void LibcurlHttpFetcher::RetryTimeoutCallback() {
746 retry_task_id_ = MessageLoop::kTaskIdNull;
747 if (transfer_paused_) {
748 restart_transfer_on_unpause_ = true;
749 return;
750 }
751 ResumeTransfer(url_);
752 CurlPerformOnce();
753 }
754
TimeoutCallback()755 void LibcurlHttpFetcher::TimeoutCallback() {
756 // We always re-schedule the callback, even if we don't want to be called
757 // anymore. We will remove the event source separately if we don't want to
758 // be called back.
759 timeout_id_ = MessageLoop::current()->PostDelayedTask(
760 FROM_HERE,
761 base::Bind(&LibcurlHttpFetcher::TimeoutCallback, base::Unretained(this)),
762 TimeDelta::FromSeconds(idle_seconds_));
763
764 // CurlPerformOnce() may call CleanUp(), so we need to schedule our callback
765 // first, since it could be canceled by this call.
766 if (transfer_in_progress_)
767 CurlPerformOnce();
768 }
769
CleanUp()770 void LibcurlHttpFetcher::CleanUp() {
771 MessageLoop::current()->CancelTask(retry_task_id_);
772 retry_task_id_ = MessageLoop::kTaskIdNull;
773
774 MessageLoop::current()->CancelTask(timeout_id_);
775 timeout_id_ = MessageLoop::kTaskIdNull;
776
777 for (size_t t = 0; t < std::size(fd_controller_maps_); ++t) {
778 fd_controller_maps_[t].clear();
779 }
780
781 if (curl_http_headers_) {
782 curl_slist_free_all(curl_http_headers_);
783 curl_http_headers_ = nullptr;
784 }
785 if (curl_handle_) {
786 if (curl_multi_handle_) {
787 CHECK_EQ(curl_multi_remove_handle(curl_multi_handle_, curl_handle_),
788 CURLM_OK);
789 }
790 curl_easy_cleanup(curl_handle_);
791 curl_handle_ = nullptr;
792 }
793 if (curl_multi_handle_) {
794 CHECK_EQ(curl_multi_cleanup(curl_multi_handle_), CURLM_OK);
795 curl_multi_handle_ = nullptr;
796 }
797 transfer_in_progress_ = false;
798 transfer_paused_ = false;
799 restart_transfer_on_unpause_ = false;
800 }
801
GetHttpResponseCode()802 void LibcurlHttpFetcher::GetHttpResponseCode() {
803 long http_response_code = 0; // NOLINT(runtime/int) - curl needs long.
804 if (android::base::StartsWith(ToLower(url_), "file://")) {
805 // Fake out a valid response code for file:// URLs.
806 http_response_code_ = 299;
807 } else if (curl_easy_getinfo(curl_handle_,
808 CURLINFO_RESPONSE_CODE,
809 &http_response_code) == CURLE_OK) {
810 http_response_code_ = static_cast<int>(http_response_code);
811 } else {
812 LOG(ERROR) << "Unable to get http response code from curl_easy_getinfo";
813 }
814 }
815
GetCurlCode()816 CURLcode LibcurlHttpFetcher::GetCurlCode() {
817 CURLcode curl_code = CURLE_OK;
818 while (true) {
819 // Repeated calls to |curl_multi_info_read| will return a new struct each
820 // time, until a NULL is returned as a signal that there is no more to get
821 // at this point.
822 int msgs_in_queue{};
823 CURLMsg* curl_msg =
824 curl_multi_info_read(curl_multi_handle_, &msgs_in_queue);
825 if (curl_msg == nullptr)
826 break;
827 // When |curl_msg| is |CURLMSG_DONE|, a transfer of an easy handle is done,
828 // and then data contains the return code for this transfer.
829 if (curl_msg->msg == CURLMSG_DONE) {
830 // Make sure |curl_multi_handle_| has one and only one easy handle
831 // |curl_handle_|.
832 CHECK_EQ(curl_handle_, curl_msg->easy_handle);
833 // Transfer return code reference:
834 // https://curl.haxx.se/libcurl/c/libcurl-errors.html
835 curl_code = curl_msg->data.result;
836 }
837 }
838
839 // Gets connection error if exists.
840 long connect_error = 0; // NOLINT(runtime/int) - curl needs long.
841 CURLcode res =
842 curl_easy_getinfo(curl_handle_, CURLINFO_OS_ERRNO, &connect_error);
843 if (res == CURLE_OK && connect_error) {
844 LOG(ERROR) << "Connect error code from the OS: " << connect_error;
845 }
846
847 return curl_code;
848 }
849
UpdateState(bool failed_to_resolve_host)850 void UnresolvedHostStateMachine::UpdateState(bool failed_to_resolve_host) {
851 switch (state_) {
852 case State::kInit:
853 if (failed_to_resolve_host) {
854 state_ = State::kRetry;
855 }
856 break;
857 case State::kRetry:
858 if (failed_to_resolve_host) {
859 state_ = State::kNotRetry;
860 } else {
861 state_ = State::kRetriedSuccess;
862 }
863 break;
864 case State::kNotRetry:
865 break;
866 case State::kRetriedSuccess:
867 break;
868 default:
869 NOTREACHED();
870 break;
871 }
872 }
873
874 } // namespace chromeos_update_engine
875