/******************************************************************************* * Copyright (c) 2004, 2010 Composent, Inc., IBM All rights reserved. This * program and the accompanying materials are made available under the terms of * the Eclipse Public License v1.0 which accompanies this distribution, and is * available at http://www.eclipse.org/legal/epl-v10.html * * Contributors: * Composent, Inc. - initial API and implementation * Maarten Meijer - bug 237936, added gzip encoded transfer default * Henrich Kraemer - bug 263869, testHttpsReceiveFile fails using HTTP proxy * Henrich Kraemer - bug 263613, [transport] Update site contacting / downloading is not cancelable * Thomas Joiner - HttpClient 4 implementation ******************************************************************************/ package org.eclipse.ecf.provider.filetransfer.httpclient4; import java.io.FilterInputStream; import java.io.IOException; import java.io.InputStream; import java.net.HttpURLConnection; import java.net.InetAddress; import java.net.UnknownHostException; import java.util.ArrayList; import java.util.Collections; import java.util.HashMap; import java.util.Iterator; import java.util.List; import java.util.Map; import javax.net.SocketFactory; import javax.net.ssl.SSLSocketFactory; import org.apache.http.Header; import org.apache.http.HttpHost; import org.apache.http.HttpResponse; import org.apache.http.ProtocolVersion; import org.apache.http.auth.AuthScope; import org.apache.http.auth.Credentials; import org.apache.http.auth.NTCredentials; import org.apache.http.auth.UsernamePasswordCredentials; import org.apache.http.auth.params.AuthPNames; import org.apache.http.client.methods.HttpGet; import org.apache.http.client.params.AuthPolicy; import org.apache.http.client.protocol.RequestAcceptEncoding; import org.apache.http.client.protocol.ResponseContentEncoding; import org.apache.http.conn.params.ConnRouteParams; import org.apache.http.conn.scheme.Scheme; import org.apache.http.conn.scheme.SchemeRegistry; import org.apache.http.impl.client.DefaultHttpClient; import org.apache.http.impl.cookie.DateUtils; import org.apache.http.params.CoreConnectionPNames; import org.apache.http.protocol.BasicHttpContext; import org.apache.http.protocol.HttpContext; import org.apache.http.util.EntityUtils; import org.eclipse.core.runtime.Assert; import org.eclipse.core.runtime.IPath; import org.eclipse.core.runtime.IProgressMonitor; import org.eclipse.core.runtime.IStatus; import org.eclipse.core.runtime.NullProgressMonitor; import org.eclipse.core.runtime.Path; import org.eclipse.core.runtime.Status; import org.eclipse.ecf.core.identity.ID; import org.eclipse.ecf.core.security.Callback; import org.eclipse.ecf.core.security.CallbackHandler; import org.eclipse.ecf.core.security.IConnectContext; import org.eclipse.ecf.core.security.NameCallback; import org.eclipse.ecf.core.security.ObjectCallback; import org.eclipse.ecf.core.security.UnsupportedCallbackException; import org.eclipse.ecf.core.util.ECFRuntimeException; import org.eclipse.ecf.core.util.Proxy; import org.eclipse.ecf.core.util.ProxyAddress; import org.eclipse.ecf.core.util.Trace; import org.eclipse.ecf.filetransfer.BrowseFileTransferException; import org.eclipse.ecf.filetransfer.FileTransferJob; import org.eclipse.ecf.filetransfer.IFileRangeSpecification; import org.eclipse.ecf.filetransfer.IFileTransferPausable; import org.eclipse.ecf.filetransfer.IFileTransferRunnable; import org.eclipse.ecf.filetransfer.IRetrieveFileTransferOptions; import org.eclipse.ecf.filetransfer.IncomingFileTransferException; import org.eclipse.ecf.filetransfer.InvalidFileRangeSpecificationException; import org.eclipse.ecf.filetransfer.events.IFileTransferConnectStartEvent; import org.eclipse.ecf.filetransfer.events.socket.ISocketEventSource; import org.eclipse.ecf.filetransfer.events.socket.ISocketListener; import org.eclipse.ecf.filetransfer.identity.IFileID; import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.Activator; import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.ConnectingSocketMonitor; import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.DebugOptions; import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.ECFHttpClientProtocolSocketFactory; import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.ECFHttpClientSecureProtocolSocketFactory; import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.HttpClientProxyCredentialProvider; import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.ISSLSocketFactoryModifier; import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.Messages; import org.eclipse.ecf.provider.filetransfer.events.socket.SocketEventSource; import org.eclipse.ecf.provider.filetransfer.identity.FileTransferID; import org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer; import org.eclipse.ecf.provider.filetransfer.retrieve.HttpHelper; import org.eclipse.ecf.provider.filetransfer.util.JREProxyHelper; import org.eclipse.ecf.provider.filetransfer.util.ProxySetupHelper; import org.eclipse.osgi.util.NLS; public class HttpClientRetrieveFileTransfer extends AbstractRetrieveFileTransfer { private static final String USERNAME_PREFIX = Messages.HttpClientRetrieveFileTransfer_Username_Prefix; // changing to 2 minutes (120000) as per bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=266246 // 10/26/2009: Added being able to set with system property with name org.eclipse.ecf.provider.filetransfer.httpclient4.retrieve.connectTimeout // for https://bugs.eclipse.org/bugs/show_bug.cgi?id=292995 protected static final int DEFAULT_CONNECTION_TIMEOUT = HttpClientOptions.RETRIEVE_DEFAULT_CONNECTION_TIMEOUT; // changing to 2 minutes (120000) as per bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=266246 // 10/26/2009: Added being able to set with system property with name org.eclipse.ecf.provider.filetransfer.httpclient4.retrieve.readTimeout // for https://bugs.eclipse.org/bugs/show_bug.cgi?id=292995 protected static final int DEFAULT_READ_TIMEOUT = HttpClientOptions.RETRIEVE_DEFAULT_READ_TIMEOUT; protected static final int HTTP_PORT = 80; protected static final int HTTPS_PORT = 443; protected static final int MAX_RETRY = 2; protected static final String HTTPS = Messages.FileTransferNamespace_Https_Protocol; protected static final String HTTP = Messages.FileTransferNamespace_Http_Protocol; protected static final String[] supportedProtocols = {HTTP, HTTPS}; private static final String LAST_MODIFIED_HEADER = "Last-Modified"; //$NON-NLS-1$ private HttpGet getMethod = null; private HttpResponse httpResponse = null; private HttpContext httpContext = null; private DefaultHttpClient httpClient = null; private String username; private String password; private int responseCode = -1; private volatile boolean doneFired = false; private String remoteFileName; protected int httpVersion = 1; protected IFileID fileid = null; protected JREProxyHelper proxyHelper = null; private SocketEventSource socketEventSource; private ConnectingSocketMonitor connectingSockets; private FileTransferJob connectJob; /** * @param httpClient http client * @since 5.0 */ public HttpClientRetrieveFileTransfer(DefaultHttpClient httpClient) { this.httpClient = httpClient; Assert.isNotNull(this.httpClient); this.httpClient.setCredentialsProvider(new ECFCredentialsProvider()); proxyHelper = new JREProxyHelper(); connectingSockets = new ConnectingSocketMonitor(1); socketEventSource = new SocketEventSource() { public Object getAdapter(Class adapter) { if (adapter == null) { return null; } if (adapter.isInstance(this)) { return this; } return HttpClientRetrieveFileTransfer.this.getAdapter(adapter); } }; registerSchemes(socketEventSource, connectingSockets); } private synchronized void registerSchemes(ISocketEventSource source, ISocketListener socketListener) { SchemeRegistry schemeRegistry = this.httpClient.getConnectionManager().getSchemeRegistry(); Scheme http = new Scheme(HttpClientRetrieveFileTransfer.HTTP, HTTP_PORT, new ECFHttpClientProtocolSocketFactory(SocketFactory.getDefault(), source, socketListener)); Trace.trace(Activator.PLUGIN_ID, "registering http scheme"); //$NON-NLS-1$ schemeRegistry.register(http); ISSLSocketFactoryModifier sslSocketFactoryModifier = Activator.getDefault().getSSLSocketFactoryModifier(); if (sslSocketFactoryModifier == null) { sslSocketFactoryModifier = new HttpClientDefaultSSLSocketFactoryModifier(); } SSLSocketFactory sslSocketFactory = null; try { sslSocketFactory = sslSocketFactoryModifier.getSSLSocketFactory(); } catch (IOException e) { Trace.catching(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_CATCHING, ISSLSocketFactoryModifier.class, "getSSLSocketFactory()", e); //$NON-NLS-1$ Trace.throwing(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_THROWING, HttpClientRetrieveFileTransfer.class, "registerSchemes()", e); //$NON-NLS-1$ throw new ECFRuntimeException("Unable to instantiate schemes for HttpClient.", e); //$NON-NLS-1$ } Scheme https = new Scheme(HttpClientRetrieveFileTransfer.HTTPS, HTTPS_PORT, new ECFHttpClientSecureProtocolSocketFactory(sslSocketFactory, source, socketListener)); Trace.trace(Activator.PLUGIN_ID, "registering https scheme; modifier=" + sslSocketFactoryModifier); //$NON-NLS-1$ schemeRegistry.register(https); // SPNEGO is not supported, so remove it from the list List authpref = new ArrayList(3); authpref.add(AuthPolicy.NTLM); authpref.add(AuthPolicy.DIGEST); authpref.add(AuthPolicy.BASIC); httpClient.getParams().setParameter(AuthPNames.PROXY_AUTH_PREF, authpref); httpClient.getParams().setParameter(AuthPNames.TARGET_AUTH_PREF, authpref); } /* (non-Javadoc) * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#getRemoteFileName() */ public String getRemoteFileName() { return remoteFileName; } public synchronized void cancel() { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "cancel"); //$NON-NLS-1$ if (isCanceled()) { return; // break job cancel recursion } setDoneCanceled(exception); boolean fireDoneEvent = true; if (connectJob != null) { Trace.trace(Activator.PLUGIN_ID, "calling connectJob.cancel()"); //$NON-NLS-1$ connectJob.cancel(); } synchronized (jobLock) { if (job != null) { // Its the transfer jobs responsibility to throw the event. fireDoneEvent = false; Trace.trace(Activator.PLUGIN_ID, "calling transfer job.cancel()"); //$NON-NLS-1$ job.cancel(); } } if (getMethod != null) { if (!getMethod.isAborted()) { Trace.trace(Activator.PLUGIN_ID, "calling getMethod.abort()"); //$NON-NLS-1$ getMethod.abort(); } } if (connectingSockets != null) { // Added to prevent CME in bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=430704 connectingSockets.closeSockets(); } hardClose(); if (fireDoneEvent) { fireTransferReceiveDoneEvent(); } Trace.exiting(Activator.PLUGIN_ID, DebugOptions.METHODS_EXITING, this.getClass(), "cancel");//$NON-NLS-1$ } /* * (non-Javadoc) * * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#hardClose() */ protected void hardClose() { // changed for addressing bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=389292 if (getMethod != null) { // First, if !isDone and paused if (!isDone() && isPaused()) getMethod.abort(); // release in any case //getMethod.releaseConnection(); // and set to null getMethod = null; } // Close output stream...if we're supposed to try { if (localFileContents != null && closeOutputStream) localFileContents.close(); } catch (final IOException e) { Activator.getDefault().log(new Status(IStatus.ERROR, Activator.PLUGIN_ID, IStatus.ERROR, "hardClose", e)); //$NON-NLS-1$ } // clear input and output streams remoteFileContents = null; localFileContents = null; // reset response code responseCode = -1; // If we're done and proxy helper still exists, then dispose if (proxyHelper != null && isDone()) { proxyHelper.dispose(); proxyHelper = null; } } /** * @return Credentials file request credentials * @throws UnsupportedCallbackException if some problem * @throws IOException if some problem * @since 5.0 */ protected Credentials getFileRequestCredentials() throws UnsupportedCallbackException, IOException { if (connectContext == null) return null; final CallbackHandler callbackHandler = connectContext.getCallbackHandler(); if (callbackHandler == null) return null; final NameCallback usernameCallback = new NameCallback(USERNAME_PREFIX); final ObjectCallback passwordCallback = new ObjectCallback(); callbackHandler.handle(new Callback[] {usernameCallback, passwordCallback}); username = usernameCallback.getName(); password = (String) passwordCallback.getObject(); return new UsernamePasswordCredentials(username, password); } protected void setupProxies() { // If it's been set directly (via ECF API) then this overrides platform settings if (proxy == null) { try { // give SOCKS priority see https://bugs.eclipse.org/bugs/show_bug.cgi?id=295030#c61 proxy = ProxySetupHelper.getSocksProxy(getRemoteFileURL()); if (proxy == null) { proxy = ProxySetupHelper.getProxy(getRemoteFileURL().toExternalForm()); } } catch (NoClassDefFoundError e) { // If the proxy API is not available a NoClassDefFoundError will be thrown here. // If that happens then we just want to continue on. Activator.logNoProxyWarning(e); } } if (proxy != null) setupProxy(proxy); } protected synchronized void resetDoneAndException() { // Doesn't match the description, but since it should be cleared before it is // reused, this is the best place. clearProxy(); super.resetDoneAndException(); } protected void setupAuthentication(String urlString) throws UnsupportedCallbackException, IOException { Credentials credentials = null; if (username == null) { credentials = getFileRequestCredentials(); } if (credentials != null && username != null) { final AuthScope authScope = new AuthScope(getHostFromURL(urlString), getPortFromURL(urlString), AuthScope.ANY_REALM); Trace.trace(Activator.PLUGIN_ID, "retrieve credentials=" + credentials); //$NON-NLS-1$ httpClient.getCredentialsProvider().setCredentials(authScope, credentials); } } protected void setRequestHeaderValues() throws InvalidFileRangeSpecificationException { final IFileRangeSpecification rangeSpec = getFileRangeSpecification(); if (rangeSpec != null) { final long startPosition = rangeSpec.getStartPosition(); final long endPosition = rangeSpec.getEndPosition(); if (startPosition < 0) throw new InvalidFileRangeSpecificationException(Messages.HttpClientRetrieveFileTransfer_RESUME_START_POSITION_LESS_THAN_ZERO, rangeSpec); if (endPosition != -1L && endPosition <= startPosition) throw new InvalidFileRangeSpecificationException(Messages.HttpClientRetrieveFileTransfer_RESUME_ERROR_END_POSITION_LESS_THAN_START, rangeSpec); String rangeHeader = "bytes=" + startPosition + "-" + ((endPosition == -1L) ? "" : ("" + endPosition)); //$NON-NLS-1$ //$NON-NLS-2$ //$NON-NLS-3$ //$NON-NLS-4$ Trace.trace(Activator.PLUGIN_ID, "retrieve range header=" + rangeHeader); //$NON-NLS-1$ setRangeHeader(rangeHeader); } int maxAge = Integer.getInteger("org.eclipse.ecf.http.cache.max-age", 0); //$NON-NLS-1$ // set max-age for cache control to 0 for bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=249990 // fix the fix for bug 249990 with bug 410813 if (maxAge == 0) { getMethod.addHeader("Cache-Control", "max-age=0"); //$NON-NLS-1$//$NON-NLS-2$ } else if (maxAge > 0) { getMethod.addHeader("Cache-Control", "max-age=" + maxAge); //$NON-NLS-1$//$NON-NLS-2$ } setRequestHeaderValuesFromOptions(); } private void setRequestHeaderValuesFromOptions() { Map localOptions = getOptions(); if (localOptions != null) { Object o = localOptions.get(IRetrieveFileTransferOptions.REQUEST_HEADERS); if (o != null && o instanceof Map) { Map requestHeaders = (Map) o; for (Iterator i = requestHeaders.keySet().iterator(); i.hasNext();) { Object n = i.next(); Object v = requestHeaders.get(n); if (n != null && n instanceof String && v != null && v instanceof String) getMethod.addHeader((String) n, (String) v); } } } } private void setRangeHeader(String value) { getMethod.addHeader("Range", value); //$NON-NLS-1$ } private boolean isHTTP11() { return (httpVersion >= 1); } public int getResponseCode() { if (responseCode != -1) return responseCode; ProtocolVersion version = getMethod.getProtocolVersion(); if (version == null) { responseCode = -1; httpVersion = 1; return responseCode; } httpVersion = version.getMinor(); responseCode = httpResponse.getStatusLine().getStatusCode(); return responseCode; } /* * (non-Javadoc) * * @see org.eclipse.ecf.core.identity.IIdentifiable#getID() */ public ID getID() { return fileid; } private long getLastModifiedTimeFromHeader() throws IOException { Header lastModifiedHeader = httpResponse.getLastHeader(LAST_MODIFIED_HEADER); if (lastModifiedHeader == null) throw new IOException(Messages.HttpClientRetrieveFileTransfer_INVALID_LAST_MODIFIED_TIME); String lastModifiedString = lastModifiedHeader.getValue(); long lastModified = 0; if (lastModifiedString != null) { try { lastModified = DateUtils.parseDate(lastModifiedString).getTime(); } catch (Exception e) { throw new IOException(Messages.HttpClientRetrieveFileTransfer_EXCEPITION_INVALID_LAST_MODIFIED_FROM_SERVER); } } return lastModified; } protected void getResponseHeaderValues() throws IOException { if (getResponseCode() == -1) throw new IOException(Messages.HttpClientRetrieveFileTransfer_INVALID_SERVER_RESPONSE_TO_PARTIAL_RANGE_REQUEST); Header lastModifiedHeader = httpResponse.getLastHeader(LAST_MODIFIED_HEADER); if (lastModifiedHeader != null) { setLastModifiedTime(getLastModifiedTimeFromHeader()); } setFileLength(httpResponse.getEntity().getContentLength()); fileid = new FileTransferID(getRetrieveNamespace(), getRemoteFileURL()); // Get content disposition header and get remote file name from it if possible. Header contentDispositionHeader = httpResponse.getLastHeader(HttpHelper.CONTENT_DISPOSITION_HEADER); if (contentDispositionHeader != null) { remoteFileName = HttpHelper.getRemoteFileNameFromContentDispositionHeader(contentDispositionHeader.getValue()); } // If still null, get the path from httpclient.getMethod() if (remoteFileName == null) { // No name could be extracted using Content-Disposition. Let's try the // path from the getMethod. String pathStr = getMethod.getRequestLine().getUri(); if (pathStr != null && pathStr.length() > 0) { IPath path = Path.fromPortableString(pathStr); if (path.segmentCount() > 0) remoteFileName = path.lastSegment(); } // If still null, use the input file name if (remoteFileName == null) // Last resort. Use the path of the initial URL request remoteFileName = super.getRemoteFileName(); } } final class ECFCredentialsProvider extends HttpClientProxyCredentialProvider { protected Proxy getECFProxy() { return getProxy(); } protected Credentials getNTLMCredentials(Proxy lp) { if (hasForceNTLMProxyOption()) return HttpClientRetrieveFileTransfer.createNTLMCredentials(lp); return null; } } Proxy getProxy() { return proxy; } protected void setInputStream(InputStream ins) { remoteFileContents = ins; } protected InputStream wrapTransferReadInputStream(InputStream inputStream, IProgressMonitor monitor) { // Added to address bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=389292 return new NoCloseWrapperInputStream(inputStream); } // Added to address bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=389292 class NoCloseWrapperInputStream extends FilterInputStream { protected NoCloseWrapperInputStream(InputStream in) { super(in); } public void close() { // do nothing } } protected boolean hasForceNTLMProxyOption() { Map localOptions = getOptions(); if (localOptions != null && localOptions.get(HttpClientOptions.FORCE_NTLM_PROP) != null) return true; return (System.getProperties().getProperty(HttpClientOptions.FORCE_NTLM_PROP) != null); } protected int getSocketReadTimeout() { int result = DEFAULT_READ_TIMEOUT; Map localOptions = getOptions(); if (localOptions != null) { // See if the connect timeout option is present, if so set Object o = localOptions.get(IRetrieveFileTransferOptions.READ_TIMEOUT); if (o != null) { if (o instanceof Integer) { result = ((Integer) o).intValue(); } else if (o instanceof String) { result = new Integer(((String) o)).intValue(); } return result; } o = localOptions.get("org.eclipse.ecf.provider.filetransfer.httpclient4.retrieve.readTimeout"); //$NON-NLS-1$ if (o != null) { if (o instanceof Integer) { result = ((Integer) o).intValue(); } else if (o instanceof String) { result = new Integer(((String) o)).intValue(); } } } return result; } /** * @return int connect timeout * @since 4.0 */ protected int getConnectTimeout() { int result = DEFAULT_CONNECTION_TIMEOUT; Map localOptions = getOptions(); if (localOptions != null) { // See if the connect timeout option is present, if so set Object o = localOptions.get(IRetrieveFileTransferOptions.CONNECT_TIMEOUT); if (o != null) { if (o instanceof Integer) { result = ((Integer) o).intValue(); } else if (o instanceof String) { result = new Integer(((String) o)).intValue(); } return result; } o = localOptions.get("org.eclipse.ecf.provider.filetransfer.httpclient4.retrieve.connectTimeout"); //$NON-NLS-1$ if (o != null) { if (o instanceof Integer) { result = ((Integer) o).intValue(); } else if (o instanceof String) { result = new Integer(((String) o)).intValue(); } } } return result; } /* (non-Javadoc) * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#openStreams() */ protected void openStreams() throws IncomingFileTransferException { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "openStreams"); //$NON-NLS-1$ final String urlString = getRemoteFileURL().toString(); this.doneFired = false; int code = -1; try { httpClient.getParams().setIntParameter(CoreConnectionPNames.SO_TIMEOUT, getSocketReadTimeout()); int connectTimeout = getConnectTimeout(); httpClient.getParams().setIntParameter(CoreConnectionPNames.CONNECTION_TIMEOUT, connectTimeout); setupAuthentication(urlString); getMethod = new HttpGet(urlString); // Define a CredentialsProvider - found that possibility while debugging in org.apache.commons.httpclient.HttpMethodDirector.processProxyAuthChallenge(HttpMethod) // Seems to be another way to select the credentials. setRequestHeaderValues(); Trace.trace(Activator.PLUGIN_ID, "retrieve=" + urlString); //$NON-NLS-1$ // Set request header for possible gzip encoding, but only if // 1) The file range specification is null (we want the whole file) // 2) The target remote file does *not* end in .gz (see bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=280205) if (getFileRangeSpecification() == null && !targetHasGzSuffix(super.getRemoteFileName())) { Trace.trace(Activator.PLUGIN_ID, "Accept-Encoding: gzip,deflate added to request header"); //$NON-NLS-1$ // Add the interceptors to provide the gzip httpClient.addRequestInterceptor(new RequestAcceptEncoding()); httpClient.addResponseInterceptor(new ResponseContentEncoding()); } else { Trace.trace(Activator.PLUGIN_ID, "Accept-Encoding NOT added to header"); //$NON-NLS-1$ } fireConnectStartEvent(); if (checkAndHandleDone()) { return; } connectingSockets.clear(); // Actually execute get and get response code (since redirect is set to true, then // redirect response code handled internally if (connectJob == null) { performConnect(new NullProgressMonitor()); } else { connectJob.schedule(); connectJob.join(); connectJob = null; } if (checkAndHandleDone()) { return; } code = responseCode; responseHeaders = getResponseHeaders(); Trace.trace(Activator.PLUGIN_ID, "retrieve resp=" + code); //$NON-NLS-1$ // Check for NTLM proxy in response headers // This check is to deal with bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=252002 boolean ntlmProxyFound = NTLMProxyDetector.detectNTLMProxy(httpContext); if (ntlmProxyFound && !hasForceNTLMProxyOption()) throw new IncomingFileTransferException("HttpClient Provider is not configured to support NTLM proxy authentication.", HttpClientOptions.NTLM_PROXY_RESPONSE_CODE); //$NON-NLS-1$ if (NTLMProxyDetector.detectSPNEGOProxy(httpContext)) throw new BrowseFileTransferException("HttpClient Provider does not support the use of SPNEGO proxy authentication."); //$NON-NLS-1$ if (code == HttpURLConnection.HTTP_PARTIAL || code == HttpURLConnection.HTTP_OK) { getResponseHeaderValues(); setInputStream(httpResponse.getEntity().getContent()); fireReceiveStartEvent(); } else if (code == HttpURLConnection.HTTP_NOT_FOUND) { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException(NLS.bind("File not found: {0}", urlString), code); //$NON-NLS-1$ } else if (code == HttpURLConnection.HTTP_UNAUTHORIZED) { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException(Messages.HttpClientRetrieveFileTransfer_Unauthorized, code); } else if (code == HttpURLConnection.HTTP_FORBIDDEN) { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException("Forbidden", code); //$NON-NLS-1$ } else if (code == HttpURLConnection.HTTP_PROXY_AUTH) { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException(Messages.HttpClientRetrieveFileTransfer_Proxy_Auth_Required, code); } else { Trace.trace(Activator.PLUGIN_ID, EntityUtils.toString(httpResponse.getEntity())); // EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException(NLS.bind(Messages.HttpClientRetrieveFileTransfer_ERROR_GENERAL_RESPONSE_CODE, new Integer(code)), code); } } catch (final Exception e) { Trace.throwing(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_THROWING, this.getClass(), "openStreams", e); //$NON-NLS-1$ if (code == -1) { if (!isDone()) { setDoneException(e); } fireTransferReceiveDoneEvent(); } else { IncomingFileTransferException ex = (IncomingFileTransferException) ((e instanceof IncomingFileTransferException) ? e : new IncomingFileTransferException(NLS.bind(Messages.HttpClientRetrieveFileTransfer_EXCEPTION_COULD_NOT_CONNECT, urlString), e, code)); throw ex; } } Trace.exiting(Activator.PLUGIN_ID, DebugOptions.METHODS_EXITING, this.getClass(), "openStreams"); //$NON-NLS-1$ } private Map getResponseHeaders() { if (getMethod == null) return null; Header[] headers = httpResponse.getAllHeaders(); Map result = null; if (headers != null && headers.length > 0) { result = new HashMap(); for (int i = 0; i < headers.length; i++) { String name = headers[i].getName(); String val = headers[i].getValue(); if (name != null && val != null) result.put(name, val); } } return Collections.unmodifiableMap(result); } private boolean checkAndHandleDone() { if (isDone()) { // for cancel the done event should have been fired always. if (!doneFired) { fireTransferReceiveDoneEvent(); } return true; } return false; } /* * (non-Javadoc) * * @see org.eclipse.ecf.filetransfer.IRetrieveFileTransferContainerAdapter#setConnectContextForAuthentication(org.eclipse.ecf.core.security.IConnectContext) */ public void setConnectContextForAuthentication(IConnectContext connectContext) { super.setConnectContextForAuthentication(connectContext); this.username = null; this.password = null; } protected static String getHostFromURL(String url) { String result = url; final int colonSlashSlash = url.indexOf("://"); //$NON-NLS-1$ if (colonSlashSlash < 0) return ""; //$NON-NLS-1$ if (colonSlashSlash >= 0) { result = url.substring(colonSlashSlash + 3); } final int colonPort = result.indexOf(':'); final int requestPath = result.indexOf('/'); int substringEnd; if (colonPort > 0 && requestPath > 0) substringEnd = Math.min(colonPort, requestPath); else if (colonPort > 0) substringEnd = colonPort; else if (requestPath > 0) substringEnd = requestPath; else substringEnd = result.length(); return result.substring(0, substringEnd); } protected static int getPortFromURL(String url) { final int colonSlashSlash = url.indexOf("://"); //$NON-NLS-1$ if (colonSlashSlash < 0) return urlUsesHttps(url) ? HTTPS_PORT : HTTP_PORT; // This is wrong as if the url has no colonPort before '?' then it should return the default int colonPort = url.indexOf(':', colonSlashSlash + 1); if (colonPort < 0) return urlUsesHttps(url) ? HTTPS_PORT : HTTP_PORT; // Make sure that the colonPort is not from some part of the rest of the URL int nextSlash = url.indexOf('/', colonSlashSlash + 3); if (nextSlash != -1 && colonPort > nextSlash) return urlUsesHttps(url) ? HTTPS_PORT : HTTP_PORT; // Make sure the colonPort is not part of the credentials in URI final int atServer = url.indexOf('@', colonSlashSlash + 1); if (atServer != -1 && colonPort < atServer && atServer < nextSlash) colonPort = url.indexOf(':', atServer + 1); if (colonPort < 0) return urlUsesHttps(url) ? HTTPS_PORT : HTTP_PORT; final int requestPath = url.indexOf('/', colonPort + 1); int end; if (requestPath < 0) end = url.length(); else end = requestPath; return Integer.parseInt(url.substring(colonPort + 1, end)); } protected static boolean urlUsesHttps(String url) { url = url.trim(); return url.startsWith(HTTPS); } /* * (non-Javadoc) * * @see org.eclipse.ecf.internal.provider.filetransfer.AbstractRetrieveFileTransfer#supportsProtocol(java.lang.String) */ public static boolean supportsProtocol(String protocolString) { for (int i = 0; i < supportedProtocols.length; i++) if (supportedProtocols[i].equalsIgnoreCase(protocolString)) return true; return false; } protected boolean isConnected() { return (getMethod != null); } /* * (non-Javadoc) * * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#doPause() */ protected boolean doPause() { if (isPaused() || !isConnected() || isDone()) return false; this.paused = true; return this.paused; } /* * (non-Javadoc) * * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#doResume() */ protected boolean doResume() { if (!isPaused() || isConnected()) return false; return openStreamsForResume(); } protected void setResumeRequestHeaderValues() throws IOException { if (this.bytesReceived <= 0 || this.fileLength <= this.bytesReceived) throw new IOException(Messages.HttpClientRetrieveFileTransfer_RESUME_START_ERROR); setRangeHeader("bytes=" + this.bytesReceived + "-"); //$NON-NLS-1$ //$NON-NLS-2$ int maxAge = Integer.getInteger("org.eclipse.ecf.http.cache.max-age", 0); //$NON-NLS-1$ // set max-age for cache control to 0 for bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=249990 // fix the fix for bug 249990 with bug 410813 if (maxAge == 0) { getMethod.addHeader("Cache-Control", "max-age=0"); //$NON-NLS-1$//$NON-NLS-2$ } else if (maxAge > 0) { getMethod.addHeader("Cache-Control", "max-age=" + maxAge); //$NON-NLS-1$//$NON-NLS-2$ } setRequestHeaderValuesFromOptions(); } private boolean openStreamsForResume() { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "openStreamsForResume"); //$NON-NLS-1$ final String urlString = getRemoteFileURL().toString(); this.doneFired = false; int code = -1; try { httpClient.getParams().setIntParameter(CoreConnectionPNames.SO_TIMEOUT, getSocketReadTimeout()); int connectTimeout = getConnectTimeout(); httpClient.getParams().setIntParameter(CoreConnectionPNames.CONNECTION_TIMEOUT, connectTimeout); setupAuthentication(urlString); getMethod = new HttpGet(urlString); // Define a CredentialsProvider - found that possibility while debugging in org.apache.commons.httpclient.HttpMethodDirector.processProxyAuthChallenge(HttpMethod) // Seems to be another way to select the credentials. setResumeRequestHeaderValues(); Trace.trace(Activator.PLUGIN_ID, "resume=" + urlString); //$NON-NLS-1$ // Gzip encoding is not an option for resume fireConnectStartEvent(); if (checkAndHandleDone()) { return false; } connectingSockets.clear(); // Actually execute get and get response code (since redirect is set to true, then // redirect response code handled internally if (connectJob == null) { performConnect(new NullProgressMonitor()); } else { connectJob.schedule(); connectJob.join(); connectJob = null; } if (checkAndHandleDone()) { return false; } code = responseCode; responseHeaders = getResponseHeaders(); Trace.trace(Activator.PLUGIN_ID, "retrieve resp=" + code); //$NON-NLS-1$ if (code == HttpURLConnection.HTTP_PARTIAL || code == HttpURLConnection.HTTP_OK) { getResumeResponseHeaderValues(); setInputStream(httpResponse.getEntity().getContent()); this.paused = false; fireReceiveResumedEvent(); } else if (code == HttpURLConnection.HTTP_NOT_FOUND) { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException(NLS.bind("File not found: {0}", urlString), code, responseHeaders); //$NON-NLS-1$ } else if (code == HttpURLConnection.HTTP_UNAUTHORIZED) { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException(Messages.HttpClientRetrieveFileTransfer_Unauthorized, code, responseHeaders); } else if (code == HttpURLConnection.HTTP_FORBIDDEN) { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException("Forbidden", code, responseHeaders); //$NON-NLS-1$ } else if (code == HttpURLConnection.HTTP_PROXY_AUTH) { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException(Messages.HttpClientRetrieveFileTransfer_Proxy_Auth_Required, code, responseHeaders); } else { EntityUtils.consume(httpResponse.getEntity()); throw new IncomingFileTransferException(NLS.bind(Messages.HttpClientRetrieveFileTransfer_ERROR_GENERAL_RESPONSE_CODE, new Integer(code)), code, responseHeaders); } Trace.exiting(Activator.PLUGIN_ID, DebugOptions.METHODS_EXITING, this.getClass(), "openStreamsForResume", Boolean.TRUE); //$NON-NLS-1$ return true; } catch (final Exception e) { Trace.catching(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_CATCHING, this.getClass(), "openStreamsForResume", e); //$NON-NLS-1$ if (code == -1) { if (!isDone()) { setDoneException(e); } } else { setDoneException((e instanceof IncomingFileTransferException) ? e : new IncomingFileTransferException(NLS.bind(Messages.HttpClientRetrieveFileTransfer_EXCEPTION_COULD_NOT_CONNECT, urlString), e, code, responseHeaders)); } fireTransferReceiveDoneEvent(); Trace.exiting(Activator.PLUGIN_ID, DebugOptions.METHODS_EXITING, this.getClass(), "openStreamsForResume", Boolean.FALSE); //$NON-NLS-1$ return false; } } protected void getResumeResponseHeaderValues() throws IOException { if (getResponseCode() != HttpURLConnection.HTTP_PARTIAL) throw new IOException(); if (lastModifiedTime != getLastModifiedTimeFromHeader()) throw new IOException(Messages.HttpClientRetrieveFileTransfer_EXCEPTION_FILE_MODIFIED_SINCE_LAST_ACCESS); } /* * (non-Javadoc) * * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#getAdapter(java.lang.Class) */ public Object getAdapter(Class adapter) { if (adapter == null) return null; if (adapter.equals(IFileTransferPausable.class) && isHTTP11()) return this; if (adapter.equals(ISocketEventSource.class)) return this.socketEventSource; return super.getAdapter(adapter); } /* (non-Javadoc) * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#setupProxy(org.eclipse.ecf.core.util.Proxy) */ protected void setupProxy(Proxy proxy) { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, HttpClientRetrieveFileTransfer.class, "setupProxy " + proxy); //$NON-NLS-1$ if (proxy.getType().equals(Proxy.Type.HTTP)) { final ProxyAddress address = proxy.getAddress(); ConnRouteParams.setDefaultProxy(httpClient.getParams(), new HttpHost(address.getHostName(), address.getPort())); // getHostConfiguration().setProxy(address.getHostName(), address.getPort()); } else if (proxy.getType().equals(Proxy.Type.SOCKS)) { Trace.trace(Activator.PLUGIN_ID, "retrieve socksproxy=" + proxy.getAddress()); //$NON-NLS-1$ proxyHelper.setupProxy(proxy); } } /** * This method will clear out the proxy information (so that if this is * reused for a request without a proxy, it will work correctly). * @since 5.0 */ protected void clearProxy() { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, HttpClientRetrieveFileTransfer.class, "clearProxy()"); //$NON-NLS-1$ ConnRouteParams.setDefaultProxy(httpClient.getParams(), null); } /** * @param p proxy to create NTCredentials for * @return NTCredentials new ntlm credentials given proxy * @since 5.0 */ public static NTCredentials createNTLMCredentials(Proxy p) { if (p == null) { return null; } String un = getNTLMUserName(p); String domain = getNTLMDomainName(p); if (un == null || domain == null) return null; String workstation = null; try { workstation = InetAddress.getLocalHost().getHostName(); } catch (UnknownHostException e) { Trace.catching(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_CATCHING, HttpClientRetrieveFileTransfer.class, "createNTLMCredentials", e); //$NON-NLS-1$ } return new NTCredentials(un, p.getPassword(), workstation, domain); } protected static String getNTLMDomainName(Proxy p) { String domainUsername = p.getUsername(); if (domainUsername == null) return null; int slashloc = domainUsername.indexOf('\\'); if (slashloc == -1) return null; return domainUsername.substring(0, slashloc); } protected static String getNTLMUserName(Proxy p) { String domainUsername = p.getUsername(); if (domainUsername == null) return null; int slashloc = domainUsername.indexOf('\\'); if (slashloc == -1) return null; return domainUsername.substring(slashloc + 1); } protected void fireConnectStartEvent() { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireConnectStartEvent"); //$NON-NLS-1$ // TODO: should the following be in super.fireReceiveStartEvent(); listener.handleTransferEvent(new IFileTransferConnectStartEvent() { public IFileID getFileID() { return remoteFileID; } public void cancel() { HttpClientRetrieveFileTransfer.this.cancel(); } public FileTransferJob prepareConnectJob(FileTransferJob j) { return HttpClientRetrieveFileTransfer.this.prepareConnectJob(j); } public void connectUsingJob(FileTransferJob j) { HttpClientRetrieveFileTransfer.this.connectUsingJob(j); } public String toString() { final StringBuffer sb = new StringBuffer("IFileTransferConnectStartEvent["); //$NON-NLS-1$ sb.append(getFileID()); sb.append("]"); //$NON-NLS-1$ return sb.toString(); } public Object getAdapter(Class adapter) { return HttpClientRetrieveFileTransfer.this.getAdapter(adapter); } }); } protected String createConnectJobName() { return getRemoteFileURL().toString() + createRangeName() + Messages.HttpClientRetrieveFileTransfer_CONNECTING_JOB_NAME; } protected FileTransferJob prepareConnectJob(FileTransferJob cjob) { if (cjob == null) { // Create our own cjob = new FileTransferJob(createJobName()); } cjob.setFileTransfer(this); cjob.setFileTransferRunnable(fileConnectRunnable); return cjob; } protected void connectUsingJob(FileTransferJob cjob) { Assert.isNotNull(cjob); this.connectJob = cjob; } private IFileTransferRunnable fileConnectRunnable = new IFileTransferRunnable() { public IStatus performFileTransfer(IProgressMonitor monitor) { return performConnect(monitor); } }; private IStatus performConnect(IProgressMonitor monitor) { // there might be more ticks in the future perhaps for // connect socket, certificate validation, send request, authenticate, int ticks = 1; monitor.beginTask(getRemoteFileURL().toString() + Messages.HttpClientRetrieveFileTransfer_CONNECTING_TASK_NAME, ticks); try { if (monitor.isCanceled()) throw newUserCancelledException(); httpContext = new BasicHttpContext(); httpResponse = httpClient.execute(getMethod, httpContext); responseCode = httpResponse.getStatusLine().getStatusCode(); Trace.trace(Activator.PLUGIN_ID, "retrieve resp=" + responseCode); //$NON-NLS-1$ } catch (final Exception e) { Trace.catching(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_CATCHING, this.getClass(), "performConnect", e); //$NON-NLS-1$ if (!isDone()) { setDoneException(e); } } finally { monitor.done(); } return Status.OK_STATUS; } protected void finalize() throws Throwable { try { if (this.httpClient != null) { this.httpClient.getConnectionManager().shutdown(); } } finally { super.finalize(); } } protected void fireReceiveResumedEvent() { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireReceiveResumedEvent len=" + fileLength + ";rcvd=" + bytesReceived); //$NON-NLS-1$ //$NON-NLS-2$ super.fireReceiveResumedEvent(); } protected void fireTransferReceiveDataEvent() { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireTransferReceiveDataEvent len=" + fileLength + ";rcvd=" + bytesReceived); //$NON-NLS-1$ //$NON-NLS-2$ super.fireTransferReceiveDataEvent(); } protected void fireTransferReceiveDoneEvent() { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireTransferReceiveDoneEvent len=" + fileLength + ";rcvd=" + bytesReceived); //$NON-NLS-1$ //$NON-NLS-2$ this.doneFired = true; super.fireTransferReceiveDoneEvent(); } protected void fireTransferReceivePausedEvent() { Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireTransferReceivePausedEvent len=" + fileLength + ";rcvd=" + bytesReceived); //$NON-NLS-1$ //$NON-NLS-2$ super.fireTransferReceivePausedEvent(); } }