1 // 2 // Copyright (C) 2009 The Android Open Source Project 3 // 4 // Licensed under the Apache License, Version 2.0 (the "License"); 5 // you may not use this file except in compliance with the License. 6 // You may obtain a copy of the License at 7 // 8 // http://www.apache.org/licenses/LICENSE-2.0 9 // 10 // Unless required by applicable law or agreed to in writing, software 11 // distributed under the License is distributed on an "AS IS" BASIS, 12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 // See the License for the specific language governing permissions and 14 // limitations under the License. 15 // 16 17 #include "update_engine/common/libcurl_http_fetcher.h" 18 19 #include <algorithm> 20 #include <string> 21 22 #include <base/bind.h> 23 #include <base/format_macros.h> 24 #include <base/location.h> 25 #include <base/logging.h> 26 #include <base/strings/string_util.h> 27 #include <base/strings/stringprintf.h> 28 29 #include "update_engine/common/certificate_checker.h" 30 #include "update_engine/common/hardware_interface.h" 31 #include "update_engine/common/platform_constants.h" 32 33 using base::TimeDelta; 34 using brillo::MessageLoop; 35 using std::max; 36 using std::string; 37 38 // This is a concrete implementation of HttpFetcher that uses libcurl to do the 39 // http work. 40 41 namespace chromeos_update_engine { 42 43 namespace { 44 const int kNoNetworkRetrySeconds = 10; 45 } // namespace 46 47 LibcurlHttpFetcher::LibcurlHttpFetcher(ProxyResolver* proxy_resolver, 48 HardwareInterface* hardware) 49 : HttpFetcher(proxy_resolver), hardware_(hardware) { 50 // Dev users want a longer timeout (180 seconds) because they may 51 // be waiting on the dev server to build an image. 52 if (!hardware_->IsOfficialBuild()) 53 low_speed_time_seconds_ = kDownloadDevModeLowSpeedTimeSeconds; 54 if (!hardware_->IsOOBEComplete(nullptr)) 55 max_retry_count_ = kDownloadMaxRetryCountOobeNotComplete; 56 } 57 58 LibcurlHttpFetcher::~LibcurlHttpFetcher() { 59 LOG_IF(ERROR, transfer_in_progress_) 60 << "Destroying the fetcher while a transfer is in progress."; 61 CleanUp(); 62 } 63 64 bool LibcurlHttpFetcher::GetProxyType(const string& proxy, 65 curl_proxytype* out_type) { 66 if (base::StartsWith( 67 proxy, "socks5://", base::CompareCase::INSENSITIVE_ASCII) || 68 base::StartsWith( 69 proxy, "socks://", base::CompareCase::INSENSITIVE_ASCII)) { 70 *out_type = CURLPROXY_SOCKS5_HOSTNAME; 71 return true; 72 } 73 if (base::StartsWith( 74 proxy, "socks4://", base::CompareCase::INSENSITIVE_ASCII)) { 75 *out_type = CURLPROXY_SOCKS4A; 76 return true; 77 } 78 if (base::StartsWith( 79 proxy, "http://", base::CompareCase::INSENSITIVE_ASCII) || 80 base::StartsWith( 81 proxy, "https://", base::CompareCase::INSENSITIVE_ASCII)) { 82 *out_type = CURLPROXY_HTTP; 83 return true; 84 } 85 if (base::StartsWith(proxy, kNoProxy, base::CompareCase::INSENSITIVE_ASCII)) { 86 // known failure case. don't log. 87 return false; 88 } 89 LOG(INFO) << "Unknown proxy type: " << proxy; 90 return false; 91 } 92 93 void LibcurlHttpFetcher::ResumeTransfer(const string& url) { 94 LOG(INFO) << "Starting/Resuming transfer"; 95 CHECK(!transfer_in_progress_); 96 url_ = url; 97 curl_multi_handle_ = curl_multi_init(); 98 CHECK(curl_multi_handle_); 99 100 curl_handle_ = curl_easy_init(); 101 CHECK(curl_handle_); 102 ignore_failure_ = false; 103 104 CHECK(HasProxy()); 105 bool is_direct = (GetCurrentProxy() == kNoProxy); 106 LOG(INFO) << "Using proxy: " << (is_direct ? "no" : "yes"); 107 if (is_direct) { 108 CHECK_EQ(curl_easy_setopt(curl_handle_, 109 CURLOPT_PROXY, 110 ""), CURLE_OK); 111 } else { 112 CHECK_EQ(curl_easy_setopt(curl_handle_, 113 CURLOPT_PROXY, 114 GetCurrentProxy().c_str()), CURLE_OK); 115 // Curl seems to require us to set the protocol 116 curl_proxytype type; 117 if (GetProxyType(GetCurrentProxy(), &type)) { 118 CHECK_EQ(curl_easy_setopt(curl_handle_, 119 CURLOPT_PROXYTYPE, 120 type), CURLE_OK); 121 } 122 } 123 124 if (post_data_set_) { 125 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_POST, 1), CURLE_OK); 126 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_POSTFIELDS, 127 post_data_.data()), 128 CURLE_OK); 129 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_POSTFIELDSIZE, 130 post_data_.size()), 131 CURLE_OK); 132 } 133 134 // Setup extra HTTP headers. 135 if (curl_http_headers_) { 136 curl_slist_free_all(curl_http_headers_); 137 curl_http_headers_ = nullptr; 138 } 139 for (const auto& header : extra_headers_) { 140 // curl_slist_append() copies the string. 141 curl_http_headers_ = 142 curl_slist_append(curl_http_headers_, header.second.c_str()); 143 } 144 if (post_data_set_) { 145 // Set the Content-Type HTTP header, if one was specifically set. 146 if (post_content_type_ != kHttpContentTypeUnspecified) { 147 const string content_type_attr = base::StringPrintf( 148 "Content-Type: %s", GetHttpContentTypeString(post_content_type_)); 149 curl_http_headers_ = 150 curl_slist_append(curl_http_headers_, content_type_attr.c_str()); 151 } else { 152 LOG(WARNING) << "no content type set, using libcurl default"; 153 } 154 } 155 CHECK_EQ( 156 curl_easy_setopt(curl_handle_, CURLOPT_HTTPHEADER, curl_http_headers_), 157 CURLE_OK); 158 159 if (bytes_downloaded_ > 0 || download_length_) { 160 // Resume from where we left off. 161 resume_offset_ = bytes_downloaded_; 162 CHECK_GE(resume_offset_, 0); 163 164 // Compute end offset, if one is specified. As per HTTP specification, this 165 // is an inclusive boundary. Make sure it doesn't overflow. 166 size_t end_offset = 0; 167 if (download_length_) { 168 end_offset = static_cast<size_t>(resume_offset_) + download_length_ - 1; 169 CHECK_LE((size_t) resume_offset_, end_offset); 170 } 171 172 // Create a string representation of the desired range. 173 string range_str = base::StringPrintf( 174 "%" PRIu64 "-", static_cast<uint64_t>(resume_offset_)); 175 if (end_offset) 176 range_str += std::to_string(end_offset); 177 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_RANGE, range_str.c_str()), 178 CURLE_OK); 179 } 180 181 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_WRITEDATA, this), CURLE_OK); 182 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_WRITEFUNCTION, 183 StaticLibcurlWrite), CURLE_OK); 184 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_URL, url_.c_str()), 185 CURLE_OK); 186 187 // If the connection drops under |low_speed_limit_bps_| (10 188 // bytes/sec by default) for |low_speed_time_seconds_| (90 seconds, 189 // 180 on non-official builds), reconnect. 190 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_LOW_SPEED_LIMIT, 191 low_speed_limit_bps_), 192 CURLE_OK); 193 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_LOW_SPEED_TIME, 194 low_speed_time_seconds_), 195 CURLE_OK); 196 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_CONNECTTIMEOUT, 197 connect_timeout_seconds_), 198 CURLE_OK); 199 200 // By default, libcurl doesn't follow redirections. Allow up to 201 // |kDownloadMaxRedirects| redirections. 202 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_FOLLOWLOCATION, 1), CURLE_OK); 203 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_MAXREDIRS, 204 kDownloadMaxRedirects), 205 CURLE_OK); 206 207 // Lock down the appropriate curl options for HTTP or HTTPS depending on 208 // the url. 209 if (hardware_->IsOfficialBuild()) { 210 if (base::StartsWith( 211 url_, "http://", base::CompareCase::INSENSITIVE_ASCII)) { 212 SetCurlOptionsForHttp(); 213 } else if (base::StartsWith( 214 url_, "https://", base::CompareCase::INSENSITIVE_ASCII)) { 215 SetCurlOptionsForHttps(); 216 #if !defined(__CHROMEOS__) && !defined(__BRILLO__) 217 } else if (base::StartsWith( 218 url_, "file://", base::CompareCase::INSENSITIVE_ASCII)) { 219 SetCurlOptionsForFile(); 220 #endif 221 } else { 222 LOG(ERROR) << "Received invalid URI: " << url_; 223 // Lock down to no protocol supported for the transfer. 224 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, 0), CURLE_OK); 225 } 226 } else { 227 LOG(INFO) << "Not setting http(s) curl options because we are " 228 << "running a dev/test image"; 229 } 230 231 CHECK_EQ(curl_multi_add_handle(curl_multi_handle_, curl_handle_), CURLM_OK); 232 transfer_in_progress_ = true; 233 } 234 235 // Lock down only the protocol in case of HTTP. 236 void LibcurlHttpFetcher::SetCurlOptionsForHttp() { 237 LOG(INFO) << "Setting up curl options for HTTP"; 238 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, CURLPROTO_HTTP), 239 CURLE_OK); 240 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_REDIR_PROTOCOLS, 241 CURLPROTO_HTTP), 242 CURLE_OK); 243 } 244 245 // Security lock-down in official builds: makes sure that peer certificate 246 // verification is enabled, restricts the set of trusted certificates, 247 // restricts protocols to HTTPS, restricts ciphers to HIGH. 248 void LibcurlHttpFetcher::SetCurlOptionsForHttps() { 249 LOG(INFO) << "Setting up curl options for HTTPS"; 250 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_VERIFYPEER, 1), 251 CURLE_OK); 252 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_CAPATH, 253 constants::kCACertificatesPath), 254 CURLE_OK); 255 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, CURLPROTO_HTTPS), 256 CURLE_OK); 257 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_REDIR_PROTOCOLS, 258 CURLPROTO_HTTPS), 259 CURLE_OK); 260 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_CIPHER_LIST, "HIGH:!ADH"), 261 CURLE_OK); 262 if (server_to_check_ != ServerToCheck::kNone) { 263 CHECK_EQ( 264 curl_easy_setopt(curl_handle_, CURLOPT_SSL_CTX_DATA, &server_to_check_), 265 CURLE_OK); 266 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_SSL_CTX_FUNCTION, 267 CertificateChecker::ProcessSSLContext), 268 CURLE_OK); 269 } 270 } 271 272 // Lock down only the protocol in case of a local file. 273 void LibcurlHttpFetcher::SetCurlOptionsForFile() { 274 LOG(INFO) << "Setting up curl options for FILE"; 275 CHECK_EQ(curl_easy_setopt(curl_handle_, CURLOPT_PROTOCOLS, CURLPROTO_FILE), 276 CURLE_OK); 277 CHECK_EQ( 278 curl_easy_setopt(curl_handle_, CURLOPT_REDIR_PROTOCOLS, CURLPROTO_FILE), 279 CURLE_OK); 280 } 281 282 // Begins the transfer, which must not have already been started. 283 void LibcurlHttpFetcher::BeginTransfer(const string& url) { 284 CHECK(!transfer_in_progress_); 285 url_ = url; 286 auto closure = base::Bind(&LibcurlHttpFetcher::ProxiesResolved, 287 base::Unretained(this)); 288 if (!ResolveProxiesForUrl(url_, closure)) { 289 LOG(ERROR) << "Couldn't resolve proxies"; 290 if (delegate_) 291 delegate_->TransferComplete(this, false); 292 } 293 } 294 295 void LibcurlHttpFetcher::ProxiesResolved() { 296 transfer_size_ = -1; 297 resume_offset_ = 0; 298 retry_count_ = 0; 299 no_network_retry_count_ = 0; 300 http_response_code_ = 0; 301 terminate_requested_ = false; 302 sent_byte_ = false; 303 304 // If we are paused, we delay these two operations until Unpause is called. 305 if (transfer_paused_) { 306 restart_transfer_on_unpause_ = true; 307 return; 308 } 309 ResumeTransfer(url_); 310 CurlPerformOnce(); 311 } 312 313 void LibcurlHttpFetcher::ForceTransferTermination() { 314 CleanUp(); 315 if (delegate_) { 316 // Note that after the callback returns this object may be destroyed. 317 delegate_->TransferTerminated(this); 318 } 319 } 320 321 void LibcurlHttpFetcher::TerminateTransfer() { 322 if (in_write_callback_) { 323 terminate_requested_ = true; 324 } else { 325 ForceTransferTermination(); 326 } 327 } 328 329 void LibcurlHttpFetcher::SetHeader(const string& header_name, 330 const string& header_value) { 331 string header_line = header_name + ": " + header_value; 332 // Avoid the space if no data on the right side of the semicolon. 333 if (header_value.empty()) 334 header_line = header_name + ":"; 335 TEST_AND_RETURN(header_line.find('\n') == string::npos); 336 TEST_AND_RETURN(header_name.find(':') == string::npos); 337 extra_headers_[base::ToLowerASCII(header_name)] = header_line; 338 } 339 340 void LibcurlHttpFetcher::CurlPerformOnce() { 341 CHECK(transfer_in_progress_); 342 int running_handles = 0; 343 CURLMcode retcode = CURLM_CALL_MULTI_PERFORM; 344 345 // libcurl may request that we immediately call curl_multi_perform after it 346 // returns, so we do. libcurl promises that curl_multi_perform will not block. 347 while (CURLM_CALL_MULTI_PERFORM == retcode) { 348 retcode = curl_multi_perform(curl_multi_handle_, &running_handles); 349 if (terminate_requested_) { 350 ForceTransferTermination(); 351 return; 352 } 353 } 354 355 // If the transfer completes while paused, we should ignore the failure once 356 // the fetcher is unpaused. 357 if (running_handles == 0 && transfer_paused_ && !ignore_failure_) { 358 LOG(INFO) << "Connection closed while paused, ignoring failure."; 359 ignore_failure_ = true; 360 } 361 362 if (running_handles != 0 || transfer_paused_) { 363 // There's either more work to do or we are paused, so we just keep the 364 // file descriptors to watch up to date and exit, until we are done with the 365 // work and we are not paused. 366 SetupMessageLoopSources(); 367 return; 368 } 369 370 // At this point, the transfer was completed in some way (error, connection 371 // closed or download finished). 372 373 GetHttpResponseCode(); 374 if (http_response_code_) { 375 LOG(INFO) << "HTTP response code: " << http_response_code_; 376 no_network_retry_count_ = 0; 377 } else { 378 LOG(ERROR) << "Unable to get http response code."; 379 } 380 381 // we're done! 382 CleanUp(); 383 384 // TODO(petkov): This temporary code tries to deal with the case where the 385 // update engine performs an update check while the network is not ready 386 // (e.g., right after resume). Longer term, we should check if the network 387 // is online/offline and return an appropriate error code. 388 if (!sent_byte_ && 389 http_response_code_ == 0 && 390 no_network_retry_count_ < no_network_max_retries_) { 391 no_network_retry_count_++; 392 MessageLoop::current()->PostDelayedTask( 393 FROM_HERE, 394 base::Bind(&LibcurlHttpFetcher::RetryTimeoutCallback, 395 base::Unretained(this)), 396 TimeDelta::FromSeconds(kNoNetworkRetrySeconds)); 397 LOG(INFO) << "No HTTP response, retry " << no_network_retry_count_; 398 } else if ((!sent_byte_ && !IsHttpResponseSuccess()) || 399 IsHttpResponseError()) { 400 // The transfer completed w/ error and we didn't get any bytes. 401 // If we have another proxy to try, try that. 402 // 403 // TODO(garnold) in fact there are two separate cases here: one case is an 404 // other-than-success return code (including no return code) and no 405 // received bytes, which is necessary due to the way callbacks are 406 // currently processing error conditions; the second is an explicit HTTP 407 // error code, where some data may have been received (as in the case of a 408 // semi-successful multi-chunk fetch). This is a confusing behavior and 409 // should be unified into a complete, coherent interface. 410 LOG(INFO) << "Transfer resulted in an error (" << http_response_code_ 411 << "), " << bytes_downloaded_ << " bytes downloaded"; 412 413 PopProxy(); // Delete the proxy we just gave up on. 414 415 if (HasProxy()) { 416 // We have another proxy. Retry immediately. 417 LOG(INFO) << "Retrying with next proxy setting"; 418 MessageLoop::current()->PostTask( 419 FROM_HERE, 420 base::Bind(&LibcurlHttpFetcher::RetryTimeoutCallback, 421 base::Unretained(this))); 422 } else { 423 // Out of proxies. Give up. 424 LOG(INFO) << "No further proxies, indicating transfer complete"; 425 if (delegate_) 426 delegate_->TransferComplete(this, false); // signal fail 427 } 428 } else if ((transfer_size_ >= 0) && (bytes_downloaded_ < transfer_size_)) { 429 if (!ignore_failure_) 430 retry_count_++; 431 LOG(INFO) << "Transfer interrupted after downloading " 432 << bytes_downloaded_ << " of " << transfer_size_ << " bytes. " 433 << transfer_size_ - bytes_downloaded_ << " bytes remaining " 434 << "after " << retry_count_ << " attempt(s)"; 435 436 if (retry_count_ > max_retry_count_) { 437 LOG(INFO) << "Reached max attempts (" << retry_count_ << ")"; 438 if (delegate_) 439 delegate_->TransferComplete(this, false); // signal fail 440 } else { 441 // Need to restart transfer 442 LOG(INFO) << "Restarting transfer to download the remaining bytes"; 443 MessageLoop::current()->PostDelayedTask( 444 FROM_HERE, 445 base::Bind(&LibcurlHttpFetcher::RetryTimeoutCallback, 446 base::Unretained(this)), 447 TimeDelta::FromSeconds(retry_seconds_)); 448 } 449 } else { 450 LOG(INFO) << "Transfer completed (" << http_response_code_ 451 << "), " << bytes_downloaded_ << " bytes downloaded"; 452 if (delegate_) { 453 bool success = IsHttpResponseSuccess(); 454 delegate_->TransferComplete(this, success); 455 } 456 } 457 ignore_failure_ = false; 458 } 459 460 size_t LibcurlHttpFetcher::LibcurlWrite(void *ptr, size_t size, size_t nmemb) { 461 // Update HTTP response first. 462 GetHttpResponseCode(); 463 const size_t payload_size = size * nmemb; 464 465 // Do nothing if no payload or HTTP response is an error. 466 if (payload_size == 0 || !IsHttpResponseSuccess()) { 467 LOG(INFO) << "HTTP response unsuccessful (" << http_response_code_ 468 << ") or no payload (" << payload_size << "), nothing to do"; 469 return 0; 470 } 471 472 sent_byte_ = true; 473 { 474 double transfer_size_double; 475 CHECK_EQ(curl_easy_getinfo(curl_handle_, 476 CURLINFO_CONTENT_LENGTH_DOWNLOAD, 477 &transfer_size_double), CURLE_OK); 478 off_t new_transfer_size = static_cast<off_t>(transfer_size_double); 479 if (new_transfer_size > 0) { 480 transfer_size_ = resume_offset_ + new_transfer_size; 481 } 482 } 483 bytes_downloaded_ += payload_size; 484 in_write_callback_ = true; 485 if (delegate_) 486 delegate_->ReceivedBytes(this, ptr, payload_size); 487 in_write_callback_ = false; 488 return payload_size; 489 } 490 491 void LibcurlHttpFetcher::Pause() { 492 if (transfer_paused_) { 493 LOG(ERROR) << "Fetcher already paused."; 494 return; 495 } 496 transfer_paused_ = true; 497 if (!transfer_in_progress_) { 498 // If pause before we started a connection, we don't need to notify curl 499 // about that, we will simply not start the connection later. 500 return; 501 } 502 CHECK(curl_handle_); 503 CHECK_EQ(curl_easy_pause(curl_handle_, CURLPAUSE_ALL), CURLE_OK); 504 } 505 506 void LibcurlHttpFetcher::Unpause() { 507 if (!transfer_paused_) { 508 LOG(ERROR) << "Resume attempted when fetcher not paused."; 509 return; 510 } 511 transfer_paused_ = false; 512 if (restart_transfer_on_unpause_) { 513 restart_transfer_on_unpause_ = false; 514 ResumeTransfer(url_); 515 CurlPerformOnce(); 516 return; 517 } 518 if (!transfer_in_progress_) { 519 // If resumed before starting the connection, there's no need to notify 520 // anybody. We will simply start the connection once it is time. 521 return; 522 } 523 CHECK(curl_handle_); 524 CHECK_EQ(curl_easy_pause(curl_handle_, CURLPAUSE_CONT), CURLE_OK); 525 // Since the transfer is in progress, we need to dispatch a CurlPerformOnce() 526 // now to let the connection continue, otherwise it would be called by the 527 // TimeoutCallback but with a delay. 528 CurlPerformOnce(); 529 } 530 531 // This method sets up callbacks with the MessageLoop. 532 void LibcurlHttpFetcher::SetupMessageLoopSources() { 533 fd_set fd_read; 534 fd_set fd_write; 535 fd_set fd_exc; 536 537 FD_ZERO(&fd_read); 538 FD_ZERO(&fd_write); 539 FD_ZERO(&fd_exc); 540 541 int fd_max = 0; 542 543 // Ask libcurl for the set of file descriptors we should track on its 544 // behalf. 545 CHECK_EQ(curl_multi_fdset(curl_multi_handle_, &fd_read, &fd_write, 546 &fd_exc, &fd_max), CURLM_OK); 547 548 // We should iterate through all file descriptors up to libcurl's fd_max or 549 // the highest one we're tracking, whichever is larger. 550 for (size_t t = 0; t < arraysize(fd_task_maps_); ++t) { 551 if (!fd_task_maps_[t].empty()) 552 fd_max = max(fd_max, fd_task_maps_[t].rbegin()->first); 553 } 554 555 // For each fd, if we're not tracking it, track it. If we are tracking it, but 556 // libcurl doesn't care about it anymore, stop tracking it. After this loop, 557 // there should be exactly as many tasks scheduled in fd_task_maps_[0|1] as 558 // there are read/write fds that we're tracking. 559 for (int fd = 0; fd <= fd_max; ++fd) { 560 // Note that fd_exc is unused in the current version of libcurl so is_exc 561 // should always be false. 562 bool is_exc = FD_ISSET(fd, &fd_exc) != 0; 563 bool must_track[2] = { 564 is_exc || (FD_ISSET(fd, &fd_read) != 0), // track 0 -- read 565 is_exc || (FD_ISSET(fd, &fd_write) != 0) // track 1 -- write 566 }; 567 MessageLoop::WatchMode watch_modes[2] = { 568 MessageLoop::WatchMode::kWatchRead, 569 MessageLoop::WatchMode::kWatchWrite, 570 }; 571 572 for (size_t t = 0; t < arraysize(fd_task_maps_); ++t) { 573 auto fd_task_it = fd_task_maps_[t].find(fd); 574 bool tracked = fd_task_it != fd_task_maps_[t].end(); 575 576 if (!must_track[t]) { 577 // If we have an outstanding io_channel, remove it. 578 if (tracked) { 579 MessageLoop::current()->CancelTask(fd_task_it->second); 580 fd_task_maps_[t].erase(fd_task_it); 581 } 582 continue; 583 } 584 585 // If we are already tracking this fd, continue -- nothing to do. 586 if (tracked) 587 continue; 588 589 // Track a new fd. 590 fd_task_maps_[t][fd] = MessageLoop::current()->WatchFileDescriptor( 591 FROM_HERE, 592 fd, 593 watch_modes[t], 594 true, // persistent 595 base::Bind(&LibcurlHttpFetcher::CurlPerformOnce, 596 base::Unretained(this))); 597 598 static int io_counter = 0; 599 io_counter++; 600 if (io_counter % 50 == 0) { 601 LOG(INFO) << "io_counter = " << io_counter; 602 } 603 } 604 } 605 606 // Set up a timeout callback for libcurl. 607 if (timeout_id_ == MessageLoop::kTaskIdNull) { 608 VLOG(1) << "Setting up timeout source: " << idle_seconds_ << " seconds."; 609 timeout_id_ = MessageLoop::current()->PostDelayedTask( 610 FROM_HERE, 611 base::Bind(&LibcurlHttpFetcher::TimeoutCallback, 612 base::Unretained(this)), 613 TimeDelta::FromSeconds(idle_seconds_)); 614 } 615 } 616 617 void LibcurlHttpFetcher::RetryTimeoutCallback() { 618 if (transfer_paused_) { 619 restart_transfer_on_unpause_ = true; 620 return; 621 } 622 ResumeTransfer(url_); 623 CurlPerformOnce(); 624 } 625 626 void LibcurlHttpFetcher::TimeoutCallback() { 627 // We always re-schedule the callback, even if we don't want to be called 628 // anymore. We will remove the event source separately if we don't want to 629 // be called back. 630 timeout_id_ = MessageLoop::current()->PostDelayedTask( 631 FROM_HERE, 632 base::Bind(&LibcurlHttpFetcher::TimeoutCallback, base::Unretained(this)), 633 TimeDelta::FromSeconds(idle_seconds_)); 634 635 // CurlPerformOnce() may call CleanUp(), so we need to schedule our callback 636 // first, since it could be canceled by this call. 637 if (transfer_in_progress_) 638 CurlPerformOnce(); 639 } 640 641 void LibcurlHttpFetcher::CleanUp() { 642 MessageLoop::current()->CancelTask(timeout_id_); 643 timeout_id_ = MessageLoop::kTaskIdNull; 644 645 for (size_t t = 0; t < arraysize(fd_task_maps_); ++t) { 646 for (const auto& fd_taks_pair : fd_task_maps_[t]) { 647 if (!MessageLoop::current()->CancelTask(fd_taks_pair.second)) { 648 LOG(WARNING) << "Error canceling the watch task " 649 << fd_taks_pair.second << " for " 650 << (t ? "writing" : "reading") << " the fd " 651 << fd_taks_pair.first; 652 } 653 } 654 fd_task_maps_[t].clear(); 655 } 656 657 if (curl_http_headers_) { 658 curl_slist_free_all(curl_http_headers_); 659 curl_http_headers_ = nullptr; 660 } 661 if (curl_handle_) { 662 if (curl_multi_handle_) { 663 CHECK_EQ(curl_multi_remove_handle(curl_multi_handle_, curl_handle_), 664 CURLM_OK); 665 } 666 curl_easy_cleanup(curl_handle_); 667 curl_handle_ = nullptr; 668 } 669 if (curl_multi_handle_) { 670 CHECK_EQ(curl_multi_cleanup(curl_multi_handle_), CURLM_OK); 671 curl_multi_handle_ = nullptr; 672 } 673 transfer_in_progress_ = false; 674 transfer_paused_ = false; 675 restart_transfer_on_unpause_ = false; 676 } 677 678 void LibcurlHttpFetcher::GetHttpResponseCode() { 679 long http_response_code = 0; // NOLINT(runtime/int) - curl needs long. 680 if (base::StartsWith(url_, "file://", base::CompareCase::INSENSITIVE_ASCII)) { 681 // Fake out a valid response code for file:// URLs. 682 http_response_code_ = 299; 683 } else if (curl_easy_getinfo(curl_handle_, 684 CURLINFO_RESPONSE_CODE, 685 &http_response_code) == CURLE_OK) { 686 http_response_code_ = static_cast<int>(http_response_code); 687 } 688 } 689 690 } // namespace chromeos_update_engine 691