65ffc194442310a14a608d22d6aff6b6591e7ec1
[project/uclient.git] / uclient-example.c
1 /*
2 * uclient - ustream based protocol client library
3 *
4 * Copyright (C) 2014 Felix Fietkau <nbd@openwrt.org>
5 *
6 * Permission to use, copy, modify, and/or distribute this software for any
7 * purpose with or without fee is hereby granted, provided that the above
8 * copyright notice and this permission notice appear in all copies.
9 *
10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 */
18
19 #include <unistd.h>
20 #include <stdio.h>
21 #include <dlfcn.h>
22 #include <getopt.h>
23
24 #include <libubox/blobmsg.h>
25
26 #include "uclient.h"
27
28 #ifdef __APPLE__
29 #define LIB_EXT "dylib"
30 #else
31 #define LIB_EXT "so"
32 #endif
33
34 static struct ustream_ssl_ctx *ssl_ctx;
35 static const struct ustream_ssl_ops *ssl_ops;
36 static int quiet = false;
37
38 static void example_header_done(struct uclient *cl)
39 {
40 struct blob_attr *cur;
41 int rem;
42
43 if (quiet)
44 return;
45
46 printf("Headers (%d): \n", cl->status_code);
47 blobmsg_for_each_attr(cur, cl->meta, rem) {
48 printf("%s=%s\n", blobmsg_name(cur), (char *) blobmsg_data(cur));
49 }
50
51 printf("Contents:\n");
52 }
53
54 static void example_read_data(struct uclient *cl)
55 {
56 char buf[256];
57 int len;
58
59 while (1) {
60 len = uclient_read(cl, buf, sizeof(buf));
61 if (!len)
62 return;
63
64 write(STDOUT_FILENO, buf, len);
65 }
66 }
67
68 static void msg_connecting(struct uclient *cl)
69 {
70 char addr[INET6_ADDRSTRLEN];
71 int port;
72
73 if (quiet)
74 return;
75
76 uclient_get_addr(addr, &port, &cl->remote_addr);
77 fprintf(stderr, "Connecting to %s %s:%d\n", cl->url->host, addr, port);
78 }
79
80 static void init_request(struct uclient *cl)
81 {
82 uclient_connect(cl);
83 msg_connecting(cl);
84 uclient_http_set_request_type(cl, "GET");
85 uclient_request(cl);
86 }
87
88 static void request_done(struct uclient *cl)
89 {
90 uloop_end();
91 }
92
93 static void example_eof(struct uclient *cl)
94 {
95 static int retries;
96
97 if (retries < 10 && uclient_http_redirect(cl)) {
98 retries++;
99 return;
100 }
101
102 retries = 0;
103 request_done(cl);
104 }
105
106 static void example_error(struct uclient *cl, int code)
107 {
108 if (!quiet)
109 fprintf(stderr, "Error %d!\n", code);
110
111 request_done(cl);
112 }
113
114 static const struct uclient_cb cb = {
115 .header_done = example_header_done,
116 .data_read = example_read_data,
117 .data_eof = example_eof,
118 .error = example_error,
119 };
120
121 static int usage(const char *progname)
122 {
123 fprintf(stderr,
124 "Usage: %s [options] <URL>\n"
125 "Options:\n"
126 "\n"
127 "HTTPS options:\n"
128 " --ca-certificate=<cert>: Load CA certificates from file <cert>\n"
129 " --no-check-certificate: don't validate the server's certificate\n"
130 "\n", progname);
131 return 1;
132 }
133
134
135 static void init_ustream_ssl(void)
136 {
137 void *dlh;
138
139 dlh = dlopen("libustream-ssl." LIB_EXT, RTLD_LAZY | RTLD_LOCAL);
140 if (!dlh)
141 return;
142
143 ssl_ops = dlsym(dlh, "ustream_ssl_ops");
144 if (!ssl_ops)
145 return;
146
147 ssl_ctx = ssl_ops->context_new(false);
148 }
149
150 static int no_ssl(const char *progname)
151 {
152 fprintf(stderr, "%s: SSL support not available, please install ustream-ssl\n", progname);
153 return 1;
154 }
155
156 enum {
157 L_NO_CHECK_CERTIFICATE,
158 L_CA_CERTIFICATE,
159 };
160
161 static const struct option longopts[] = {
162 [L_NO_CHECK_CERTIFICATE] = { "no-check-certificate", no_argument },
163 [L_CA_CERTIFICATE] = { "ca-certificate", required_argument },
164 {}
165 };
166
167 int main(int argc, char **argv)
168 {
169 const char *progname = argv[0];
170 struct uclient *cl;
171 bool verify = true;
172 int ch;
173 int longopt_idx = 0;
174
175 init_ustream_ssl();
176
177 while ((ch = getopt_long(argc, argv, "q", longopts, &longopt_idx)) != -1) {
178 switch(ch) {
179 case 0:
180 switch (longopt_idx) {
181 case L_NO_CHECK_CERTIFICATE:
182 verify = false;
183 break;
184 case L_CA_CERTIFICATE:
185 if (ssl_ctx)
186 ssl_ops->context_add_ca_crt_file(ssl_ctx, optarg);
187 break;
188 default:
189 return usage(progname);
190 }
191 break;
192 case 'q':
193 quiet = true;
194 break;
195 default:
196 return usage(progname);
197 }
198 }
199
200 argv += optind;
201 argc -= optind;
202
203 if (argc != 1)
204 return usage(progname);
205
206 if (!strncmp(argv[0], "https", 5) && !ssl_ctx)
207 return no_ssl(progname);
208
209 uloop_init();
210
211 cl = uclient_new(argv[0], NULL, &cb);
212 if (!cl) {
213 fprintf(stderr, "Failed to allocate uclient context\n");
214 return 1;
215 }
216
217 if (ssl_ctx)
218 uclient_http_set_ssl_ctx(cl, ssl_ops, ssl_ctx, verify);
219
220 init_request(cl);
221 uloop_run();
222 uloop_done();
223
224 uclient_free(cl);
225
226 if (ssl_ctx)
227 ssl_ops->context_free(ssl_ctx);
228
229 return 0;
230 }