1 /* vi: set sw=4 ts=4: */
3 * wget - retrieve a file using HTTP or FTP
5 * Chip Rosenthal Covad Communications <chip@laserlink.net>
6 * Licensed under GPLv2, see file LICENSE in this source tree.
8 * Copyright (C) 2010 Bradley M. Kuhn <bkuhn@ebb.org>
9 * Kuhn's copyrights are licensed GPLv2-or-later. File as a whole remains GPLv2.
12 //usage:#define wget_trivial_usage
13 //usage: IF_FEATURE_WGET_LONG_OPTIONS(
14 //usage: "[-c|--continue] [-s|--spider] [-q|--quiet] [-O|--output-document FILE]\n"
15 //usage: " [--header 'header: value'] [-Y|--proxy on/off] [-P DIR]\n"
16 /* Since we ignore these opts, we don't show them in --help */
17 /* //usage: " [--no-check-certificate] [--no-cache]" */
18 //usage: " [-U|--user-agent AGENT]" IF_FEATURE_WGET_TIMEOUT(" [-T SEC]") " URL..."
20 //usage: IF_NOT_FEATURE_WGET_LONG_OPTIONS(
21 //usage: "[-csq] [-O FILE] [-Y on/off] [-P DIR] [-U AGENT]"
22 //usage: IF_FEATURE_WGET_TIMEOUT(" [-T SEC]") " URL..."
24 //usage:#define wget_full_usage "\n\n"
25 //usage: "Retrieve files via HTTP or FTP\n"
26 //usage: "\n -s Spider mode - only check file existence"
27 //usage: "\n -c Continue retrieval of aborted transfer"
28 //usage: "\n -q Quiet"
29 //usage: "\n -P DIR Save to DIR (default .)"
30 //usage: IF_FEATURE_WGET_TIMEOUT(
31 //usage: "\n -T SEC Network read timeout is SEC seconds"
33 //usage: "\n -O FILE Save to FILE ('-' for stdout)"
34 //usage: "\n -U STR Use STR for User-Agent header"
35 //usage: "\n -Y Use proxy ('on' or 'off')"
40 # define log_io(...) bb_error_msg(__VA_ARGS__)
42 # define log_io(...) ((void)0)
58 off_t content_len; /* Content-length of the file */
59 off_t beg_range; /* Range at which continue begins */
60 #if ENABLE_FEATURE_WGET_STATUSBAR
61 off_t transferred; /* Number of bytes transferred so far */
62 const char *curfile; /* Name of current file being transferred */
66 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
70 char *fname_out; /* where to direct output (-O) */
71 const char *proxy_flag; /* Use proxies if env vars are set */
72 const char *user_agent; /* "User-Agent" header field */
73 #if ENABLE_FEATURE_WGET_TIMEOUT
74 unsigned timeout_seconds;
78 smallint chunked; /* chunked transfer encoding */
79 smallint got_clen; /* got content-length: from server */
80 /* Local downloads do benefit from big buffer.
81 * With 512 byte buffer, it was measured to be
82 * an order of magnitude slower than with big one.
84 uint64_t just_to_align_next_member;
85 char wget_buf[CONFIG_FEATURE_COPYBUF_KB*1024];
87 #define G (*ptr_to_globals)
88 #define INIT_G() do { \
89 SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
90 IF_FEATURE_WGET_TIMEOUT(G.timeout_seconds = 900;) \
94 /* Must match option string! */
96 WGET_OPT_CONTINUE = (1 << 0),
97 WGET_OPT_SPIDER = (1 << 1),
98 WGET_OPT_QUIET = (1 << 2),
99 WGET_OPT_OUTNAME = (1 << 3),
100 WGET_OPT_PREFIX = (1 << 4),
101 WGET_OPT_PROXY = (1 << 5),
102 WGET_OPT_USER_AGENT = (1 << 6),
103 WGET_OPT_NETWORK_READ_TIMEOUT = (1 << 7),
104 WGET_OPT_RETRIES = (1 << 8),
105 WGET_OPT_PASSIVE = (1 << 9),
106 WGET_OPT_HEADER = (1 << 10) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
107 WGET_OPT_POST_DATA = (1 << 11) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
115 #if ENABLE_FEATURE_WGET_STATUSBAR
116 static void progress_meter(int flag)
118 if (option_mask32 & WGET_OPT_QUIET)
121 if (flag == PROGRESS_START)
122 bb_progress_init(&G.pmt, G.curfile);
124 bb_progress_update(&G.pmt,
127 (G.chunked || !G.got_clen) ? 0 : G.beg_range + G.transferred + G.content_len
130 if (flag == PROGRESS_END) {
131 bb_progress_free(&G.pmt);
132 bb_putchar_stderr('\n');
137 static ALWAYS_INLINE void progress_meter(int flag UNUSED_PARAM) { }
141 /* IPv6 knows scoped address types i.e. link and site local addresses. Link
142 * local addresses can have a scope identifier to specify the
143 * interface/link an address is valid on (e.g. fe80::1%eth0). This scope
144 * identifier is only valid on a single node.
146 * RFC 4007 says that the scope identifier MUST NOT be sent across the wire,
147 * unless all nodes agree on the semantic. Apache e.g. regards zone identifiers
148 * in the Host header as invalid requests, see
149 * https://issues.apache.org/bugzilla/show_bug.cgi?id=35122
151 static void strip_ipv6_scope_id(char *host)
155 /* bbox wget actually handles IPv6 addresses without [], like
156 * wget "http://::1/xxx", but this is not standard.
157 * To save code, _here_ we do not support it. */
160 return; /* not IPv6 */
162 scope = strchr(host, '%');
166 /* Remove the IPv6 zone identifier from the host address */
167 cp = strchr(host, ']');
168 if (!cp || (cp[1] != ':' && cp[1] != '\0')) {
169 /* malformed address (not "[xx]:nn" or "[xx]") */
173 /* cp points to "]...", scope points to "%eth0]..." */
174 overlapping_strcpy(scope, cp);
177 #if ENABLE_FEATURE_WGET_AUTHENTICATION
178 /* Base64-encode character string. */
179 static char *base64enc(const char *str)
181 unsigned len = strlen(str);
182 if (len > sizeof(G.wget_buf)/4*3 - 10) /* paranoia */
183 len = sizeof(G.wget_buf)/4*3 - 10;
184 bb_uuencode(G.wget_buf, str, len, bb_uuenc_tbl_base64);
189 static char* sanitize_string(char *s)
191 unsigned char *p = (void *) s;
198 static FILE *open_socket(len_and_sockaddr *lsa)
202 /* glibc 2.4 seems to try seeking on it - ??! */
203 /* hopefully it understands what ESPIPE means... */
204 fp = fdopen(xconnect_stream(lsa), "r+");
206 bb_perror_msg_and_die(bb_msg_memory_exhausted);
211 /* Returns '\n' if it was seen, else '\0'. Trims at first '\r' or '\n' */
212 static char fgets_and_trim(FILE *fp)
217 if (fgets(G.wget_buf, sizeof(G.wget_buf) - 1, fp) == NULL)
218 bb_perror_msg_and_die("error getting response");
220 buf_ptr = strchrnul(G.wget_buf, '\n');
223 buf_ptr = strchrnul(G.wget_buf, '\r');
226 log_io("< %s", G.wget_buf);
231 static int ftpcmd(const char *s1, const char *s2, FILE *fp)
237 fprintf(fp, "%s%s\r\n", s1, s2);
239 log_io("> %s%s", s1, s2);
244 } while (!isdigit(G.wget_buf[0]) || G.wget_buf[3] != ' ');
246 G.wget_buf[3] = '\0';
247 result = xatoi_positive(G.wget_buf);
252 static void parse_url(const char *src_url, struct host_info *h)
257 h->allocated = url = xstrdup(src_url);
259 if (strncmp(url, "http://", 7) == 0) {
260 h->port = bb_lookup_port("http", "tcp", 80);
263 } else if (strncmp(url, "ftp://", 6) == 0) {
264 h->port = bb_lookup_port("ftp", "tcp", 21);
268 bb_error_msg_and_die("not an http or ftp url: %s", sanitize_string(url));
271 // "Real" wget 'http://busybox.net?var=a/b' sends this request:
272 // 'GET /?var=a/b HTTP 1.0'
273 // and saves 'index.html?var=a%2Fb' (we save 'b')
274 // wget 'http://busybox.net?login=john@doe':
275 // request: 'GET /?login=john@doe HTTP/1.0'
276 // saves: 'index.html?login=john@doe' (we save '?login=john@doe')
277 // wget 'http://busybox.net#test/test':
278 // request: 'GET / HTTP/1.0'
279 // saves: 'index.html' (we save 'test')
281 // We also don't add unique .N suffix if file exists...
282 sp = strchr(h->host, '/');
283 p = strchr(h->host, '?'); if (!sp || (p && sp > p)) sp = p;
284 p = strchr(h->host, '#'); if (!sp || (p && sp > p)) sp = p;
287 } else if (*sp == '/') {
290 } else { // '#' or '?'
291 // http://busybox.net?login=john@doe is a valid URL
292 // memmove converts to:
293 // http:/busybox.nett?login=john@doe...
294 memmove(h->host - 1, h->host, sp - h->host);
300 // We used to set h->user to NULL here, but this interferes
301 // with handling of code 302 ("object was moved")
303 sp = strrchr(h->host, '@');
305 // URL-decode "user:password" string before base64-encoding:
306 // wget http://test:my%20pass@example.com should send
307 // Authorization: Basic dGVzdDpteSBwYXNz
308 // which decodes to "test:my pass".
309 // Standard wget and curl do this too.
311 h->user = percent_decode_in_place(h->host, /*strict:*/ 0);
318 static char *gethdr(FILE *fp)
323 /* retrieve header line */
324 c = fgets_and_trim(fp);
326 /* end of the headers? */
327 if (G.wget_buf[0] == '\0')
330 /* convert the header name to lower case */
331 for (s = G.wget_buf; isalnum(*s) || *s == '-' || *s == '.'; ++s) {
332 /* tolower for "A-Z", no-op for "0-9a-z-." */
336 /* verify we are at the end of the header name */
338 bb_error_msg_and_die("bad header line: %s", sanitize_string(G.wget_buf));
340 /* locate the start of the header value */
342 hdrval = skip_whitespace(s);
345 /* Rats! The buffer isn't big enough to hold the entire header value */
346 while (c = getc(fp), c != EOF && c != '\n')
353 static void reset_beg_range_to_zero(void)
355 //bb_error_msg("restart failed");
357 xlseek(G.output_fd, 0, SEEK_SET);
358 ftruncate(G.output_fd, 0);
361 static FILE* prepare_ftp_session(FILE **dfpp, struct host_info *target, len_and_sockaddr *lsa)
368 target->user = xstrdup("anonymous:busybox@");
370 sfp = open_socket(lsa);
371 if (ftpcmd(NULL, NULL, sfp) != 220)
372 bb_error_msg_and_die("%s", sanitize_string(G.wget_buf + 4));
375 * Splitting username:password pair,
378 str = strchr(target->user, ':');
381 switch (ftpcmd("USER ", target->user, sfp)) {
385 if (ftpcmd("PASS ", str, sfp) == 230)
387 /* fall through (failed login) */
389 bb_error_msg_and_die("ftp login: %s", sanitize_string(G.wget_buf + 4));
392 ftpcmd("TYPE I", NULL, sfp);
397 if (ftpcmd("SIZE ", target->path, sfp) == 213) {
398 G.content_len = BB_STRTOOFF(G.wget_buf + 4, NULL, 10);
399 if (G.content_len < 0 || errno) {
400 bb_error_msg_and_die("SIZE value is garbage");
406 * Entering passive mode
408 if (ftpcmd("PASV", NULL, sfp) != 227) {
410 bb_error_msg_and_die("bad response to %s: %s", "PASV", sanitize_string(G.wget_buf));
412 // Response is "227 garbageN1,N2,N3,N4,P1,P2[)garbage]
413 // Server's IP is N1.N2.N3.N4 (we ignore it)
414 // Server's port for data connection is P1*256+P2
415 str = strrchr(G.wget_buf, ')');
416 if (str) str[0] = '\0';
417 str = strrchr(G.wget_buf, ',');
418 if (!str) goto pasv_error;
419 port = xatou_range(str+1, 0, 255);
421 str = strrchr(G.wget_buf, ',');
422 if (!str) goto pasv_error;
423 port += xatou_range(str+1, 0, 255) * 256;
424 set_nport(&lsa->u.sa, htons(port));
426 *dfpp = open_socket(lsa);
428 if (G.beg_range != 0) {
429 sprintf(G.wget_buf, "REST %"OFF_FMT"u", G.beg_range);
430 if (ftpcmd(G.wget_buf, NULL, sfp) == 350)
431 G.content_len -= G.beg_range;
433 reset_beg_range_to_zero();
436 if (ftpcmd("RETR ", target->path, sfp) > 150)
437 bb_error_msg_and_die("bad response to %s: %s", "RETR", sanitize_string(G.wget_buf));
442 static void NOINLINE retrieve_file_data(FILE *dfp)
444 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
445 # if ENABLE_FEATURE_WGET_TIMEOUT
448 struct pollfd polldata;
450 polldata.fd = fileno(dfp);
451 polldata.events = POLLIN | POLLPRI;
453 progress_meter(PROGRESS_START);
458 /* Loops only if chunked */
461 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
462 /* Must use nonblocking I/O, otherwise fread will loop
463 * and *block* until it reads full buffer,
464 * which messes up progress bar and/or timeout logic.
465 * Because of nonblocking I/O, we need to dance
466 * very carefully around EAGAIN. See explanation at
469 ndelay_on(polldata.fd);
475 rdsz = sizeof(G.wget_buf);
477 if (G.content_len < (off_t)sizeof(G.wget_buf)) {
478 if ((int)G.content_len <= 0)
480 rdsz = (unsigned)G.content_len;
484 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
485 # if ENABLE_FEATURE_WGET_TIMEOUT
486 second_cnt = G.timeout_seconds;
489 if (safe_poll(&polldata, 1, 1000) != 0)
490 break; /* error, EOF, or data is available */
491 # if ENABLE_FEATURE_WGET_TIMEOUT
492 if (second_cnt != 0 && --second_cnt == 0) {
493 progress_meter(PROGRESS_END);
494 bb_error_msg_and_die("download timed out");
497 /* Needed for "stalled" indicator */
498 progress_meter(PROGRESS_BUMP);
501 /* fread internally uses read loop, which in our case
502 * is usually exited when we get EAGAIN.
503 * In this case, libc sets error marker on the stream.
504 * Need to clear it before next fread to avoid possible
505 * rare false positive ferror below. Rare because usually
506 * fread gets more than zero bytes, and we don't fall
507 * into if (n <= 0) ...
512 n = fread(G.wget_buf, 1, rdsz, dfp);
514 * If error occurs, or EOF is reached, the return value
515 * is a short item count (or zero).
516 * fread does not distinguish between EOF and error.
519 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
520 if (errno == EAGAIN) /* poll lied, there is no data? */
524 bb_perror_msg_and_die(bb_msg_read_error);
525 break; /* EOF, not error */
528 xwrite(G.output_fd, G.wget_buf, n);
530 #if ENABLE_FEATURE_WGET_STATUSBAR
532 progress_meter(PROGRESS_BUMP);
536 if (G.content_len == 0)
540 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
542 ndelay_off(polldata.fd); /* else fgets can get very unhappy */
547 fgets_and_trim(dfp); /* Eat empty line */
550 G.content_len = STRTOOFF(G.wget_buf, NULL, 16);
551 /* FIXME: error check? */
552 if (G.content_len == 0)
553 break; /* all done! */
557 /* Draw full bar and free its resources */
558 G.chunked = 0; /* makes it show 100% even for chunked download */
559 G.got_clen = 1; /* makes it show 100% even for download of (formerly) unknown size */
560 progress_meter(PROGRESS_END);
563 static void download_one_url(const char *url)
565 bool use_proxy; /* Use proxies if env vars are set */
567 len_and_sockaddr *lsa;
568 FILE *sfp; /* socket to web/ftp server */
569 FILE *dfp; /* socket to ftp server (data) */
571 char *fname_out_alloc;
572 char *redirected_path = NULL;
573 struct host_info server;
574 struct host_info target;
576 server.allocated = NULL;
577 target.allocated = NULL;
581 parse_url(url, &target);
583 /* Use the proxy if necessary */
584 use_proxy = (strcmp(G.proxy_flag, "off") != 0);
586 proxy = getenv(target.is_ftp ? "ftp_proxy" : "http_proxy");
587 use_proxy = (proxy && proxy[0]);
589 parse_url(proxy, &server);
592 server.port = target.port;
593 if (ENABLE_FEATURE_IPV6) {
594 //free(server.allocated); - can't be non-NULL
595 server.host = server.allocated = xstrdup(target.host);
597 server.host = target.host;
601 if (ENABLE_FEATURE_IPV6)
602 strip_ipv6_scope_id(target.host);
604 /* If there was no -O FILE, guess output filename */
605 fname_out_alloc = NULL;
606 if (!(option_mask32 & WGET_OPT_OUTNAME)) {
607 G.fname_out = bb_get_last_path_component_nostrip(target.path);
608 /* handle "wget http://kernel.org//" */
609 if (G.fname_out[0] == '/' || !G.fname_out[0])
610 G.fname_out = (char*)"index.html";
611 /* -P DIR is considered only if there was no -O FILE */
614 G.fname_out = fname_out_alloc = concat_path_file(G.dir_prefix, G.fname_out);
616 /* redirects may free target.path later, need to make a copy */
617 G.fname_out = fname_out_alloc = xstrdup(G.fname_out);
621 #if ENABLE_FEATURE_WGET_STATUSBAR
622 G.curfile = bb_get_last_path_component_nostrip(G.fname_out);
625 /* Determine where to start transfer */
627 if (option_mask32 & WGET_OPT_CONTINUE) {
628 G.output_fd = open(G.fname_out, O_WRONLY);
629 if (G.output_fd >= 0) {
630 G.beg_range = xlseek(G.output_fd, 0, SEEK_END);
632 /* File doesn't exist. We do not create file here yet.
633 * We are not sure it exists on remote side */
638 lsa = xhost2sockaddr(server.host, server.port);
639 if (!(option_mask32 & WGET_OPT_QUIET)) {
640 char *s = xmalloc_sockaddr2dotted(&lsa->u.sa);
641 fprintf(stderr, "Connecting to %s (%s)\n", server.host, s);
645 /*G.content_len = 0; - redundant, got_clen = 0 is enough */
648 if (use_proxy || !target.is_ftp) {
656 /* Open socket to http server */
657 sfp = open_socket(lsa);
659 /* Send HTTP request */
661 fprintf(sfp, "GET %stp://%s/%s HTTP/1.1\r\n",
662 target.is_ftp ? "f" : "ht", target.host,
665 if (option_mask32 & WGET_OPT_POST_DATA)
666 fprintf(sfp, "POST /%s HTTP/1.1\r\n", target.path);
668 fprintf(sfp, "GET /%s HTTP/1.1\r\n", target.path);
671 fprintf(sfp, "Host: %s\r\nUser-Agent: %s\r\n",
672 target.host, G.user_agent);
674 /* Ask server to close the connection as soon as we are done
675 * (IOW: we do not intend to send more requests)
677 fprintf(sfp, "Connection: close\r\n");
679 #if ENABLE_FEATURE_WGET_AUTHENTICATION
681 fprintf(sfp, "Proxy-Authorization: Basic %s\r\n"+6,
682 base64enc(target.user));
684 if (use_proxy && server.user) {
685 fprintf(sfp, "Proxy-Authorization: Basic %s\r\n",
686 base64enc(server.user));
690 if (G.beg_range != 0)
691 fprintf(sfp, "Range: bytes=%"OFF_FMT"u-\r\n", G.beg_range);
693 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
695 fputs(G.extra_headers, sfp);
697 if (option_mask32 & WGET_OPT_POST_DATA) {
699 "Content-Type: application/x-www-form-urlencoded\r\n"
700 "Content-Length: %u\r\n"
703 (int) strlen(G.post_data), G.post_data
708 fprintf(sfp, "\r\n");
714 * Retrieve HTTP response line and check for "200" status code.
720 str = skip_non_whitespace(str);
721 str = skip_whitespace(str);
722 // FIXME: no error check
723 // xatou wouldn't work: "200 OK"
728 while (gethdr(sfp) != NULL)
729 /* eat all remaining headers */;
733 Response 204 doesn't say "null file", it says "metadata
734 has changed but data didn't":
736 "10.2.5 204 No Content
737 The server has fulfilled the request but does not need to return
738 an entity-body, and might want to return updated metainformation.
739 The response MAY include new or updated metainformation in the form
740 of entity-headers, which if present SHOULD be associated with
741 the requested variant.
743 If the client is a user agent, it SHOULD NOT change its document
744 view from that which caused the request to be sent. This response
745 is primarily intended to allow input for actions to take place
746 without causing a change to the user agent's active document view,
747 although any new or updated metainformation SHOULD be applied
748 to the document currently in the user agent's active view.
750 The 204 response MUST NOT include a message-body, and thus
751 is always terminated by the first empty line after the header fields."
753 However, in real world it was observed that some web servers
754 (e.g. Boa/0.94.14rc21) simply use code 204 when file size is zero.
757 if (G.beg_range != 0) {
758 /* "Range:..." was not honored by the server.
759 * Restart download from the beginning.
761 reset_beg_range_to_zero();
764 case 300: /* redirection */
769 case 206: /* Partial Content */
770 if (G.beg_range != 0)
771 /* "Range:..." worked. Good. */
773 /* Partial Content even though we did not ask for it??? */
776 bb_error_msg_and_die("server returned error: %s", sanitize_string(G.wget_buf));
780 * Retrieve HTTP headers.
782 while ((str = gethdr(sfp)) != NULL) {
783 static const char keywords[] ALIGN1 =
784 "content-length\0""transfer-encoding\0""location\0";
786 KEY_content_length = 1, KEY_transfer_encoding, KEY_location
790 /* gethdr converted "FOO:" string to lowercase */
792 /* strip trailing whitespace */
793 char *s = strchrnul(str, '\0') - 1;
794 while (s >= str && (*s == ' ' || *s == '\t')) {
798 key = index_in_strings(keywords, G.wget_buf) + 1;
799 if (key == KEY_content_length) {
800 G.content_len = BB_STRTOOFF(str, NULL, 10);
801 if (G.content_len < 0 || errno) {
802 bb_error_msg_and_die("content-length %s is garbage", sanitize_string(str));
807 if (key == KEY_transfer_encoding) {
808 if (strcmp(str_tolower(str), "chunked") != 0)
809 bb_error_msg_and_die("transfer encoding '%s' is not supported", sanitize_string(str));
812 if (key == KEY_location && status >= 300) {
813 if (--redir_limit == 0)
814 bb_error_msg_and_die("too many redirections");
817 free(redirected_path);
818 target.path = redirected_path = xstrdup(str+1);
819 /* lsa stays the same: it's on the same server */
821 parse_url(str, &target);
823 free(server.allocated);
824 server.allocated = NULL;
825 server.host = target.host;
826 /* strip_ipv6_scope_id(target.host); - no! */
827 /* we assume remote never gives us IPv6 addr with scope id */
828 server.port = target.port;
831 } /* else: lsa stays the same: we use proxy */
833 goto establish_session;
836 // if (status >= 300)
837 // bb_error_msg_and_die("bad redirection (no Location: header from server)");
839 /* For HTTP, data is pumped over the same connection */
846 sfp = prepare_ftp_session(&dfp, &target, lsa);
851 if (!(option_mask32 & WGET_OPT_SPIDER)) {
853 G.output_fd = xopen(G.fname_out, G.o_flags);
854 retrieve_file_data(dfp);
855 if (!(option_mask32 & WGET_OPT_OUTNAME)) {
862 /* It's ftp. Close data connection properly */
864 if (ftpcmd(NULL, NULL, sfp) != 226)
865 bb_error_msg_and_die("ftp error: %s", sanitize_string(G.wget_buf + 4));
866 /* ftpcmd("QUIT", NULL, sfp); - why bother? */
870 free(server.allocated);
871 free(target.allocated);
872 free(fname_out_alloc);
873 free(redirected_path);
876 int wget_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
877 int wget_main(int argc UNUSED_PARAM, char **argv)
879 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
880 static const char wget_longopts[] ALIGN1 =
881 /* name, has_arg, val */
882 "continue\0" No_argument "c"
883 //FIXME: -s isn't --spider, it's --save-headers!
884 "spider\0" No_argument "s"
885 "quiet\0" No_argument "q"
886 "output-document\0" Required_argument "O"
887 "directory-prefix\0" Required_argument "P"
888 "proxy\0" Required_argument "Y"
889 "user-agent\0" Required_argument "U"
890 #if ENABLE_FEATURE_WGET_TIMEOUT
891 "timeout\0" Required_argument "T"
894 // "tries\0" Required_argument "t"
895 /* Ignored (we always use PASV): */
896 "passive-ftp\0" No_argument "\xff"
897 "header\0" Required_argument "\xfe"
898 "post-data\0" Required_argument "\xfd"
899 /* Ignored (we don't do ssl) */
900 "no-check-certificate\0" No_argument "\xfc"
901 /* Ignored (we don't support caching) */
902 "no-cache\0" No_argument "\xfb"
906 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
907 llist_t *headers_llist = NULL;
912 IF_FEATURE_WGET_TIMEOUT(G.timeout_seconds = 900;)
913 G.proxy_flag = "on"; /* use proxies if env vars are set */
914 G.user_agent = "Wget"; /* "User-Agent" header field */
916 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
917 applet_long_options = wget_longopts;
919 opt_complementary = "-1" IF_FEATURE_WGET_TIMEOUT(":T+") IF_FEATURE_WGET_LONG_OPTIONS(":\xfe::");
920 getopt32(argv, "csqO:P:Y:U:T:" /*ignored:*/ "t:",
921 &G.fname_out, &G.dir_prefix,
922 &G.proxy_flag, &G.user_agent,
923 IF_FEATURE_WGET_TIMEOUT(&G.timeout_seconds) IF_NOT_FEATURE_WGET_TIMEOUT(NULL),
924 NULL /* -t RETRIES */
925 IF_FEATURE_WGET_LONG_OPTIONS(, &headers_llist)
926 IF_FEATURE_WGET_LONG_OPTIONS(, &G.post_data)
930 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
934 llist_t *ll = headers_llist;
936 size += strlen(ll->data) + 2;
939 G.extra_headers = cp = xmalloc(size);
940 while (headers_llist) {
941 cp += sprintf(cp, "%s\r\n", (char*)llist_pop(&headers_llist));
947 G.o_flags = O_WRONLY | O_CREAT | O_TRUNC | O_EXCL;
948 if (G.fname_out) { /* -O FILE ? */
949 if (LONE_DASH(G.fname_out)) { /* -O - ? */
951 option_mask32 &= ~WGET_OPT_CONTINUE;
953 /* compat with wget: -O FILE can overwrite */
954 G.o_flags = O_WRONLY | O_CREAT | O_TRUNC;
958 download_one_url(*argv++);
960 if (G.output_fd >= 0)