1 /* vi: set sw=4 ts=4: */
3 * wget - retrieve a file using HTTP or FTP
5 * Chip Rosenthal Covad Communications <chip@laserlink.net>
6 * Licensed under GPLv2, see file LICENSE in this source tree.
8 * Copyright (C) 2010 Bradley M. Kuhn <bkuhn@ebb.org>
9 * Kuhn's copyrights are licensed GPLv2-or-later. File as a whole remains GPLv2.
12 //usage:#define wget_trivial_usage
13 //usage: IF_FEATURE_WGET_LONG_OPTIONS(
14 //usage: "[-c|--continue] [-s|--spider] [-q|--quiet] [-O|--output-document FILE]\n"
15 //usage: " [--header 'header: value'] [-Y|--proxy on/off] [-P DIR]\n"
16 //usage: " [--no-check-certificate] [-U|--user-agent AGENT]"
17 //usage: IF_FEATURE_WGET_TIMEOUT(" [-T SEC]") " URL..."
19 //usage: IF_NOT_FEATURE_WGET_LONG_OPTIONS(
20 //usage: "[-csq] [-O FILE] [-Y on/off] [-P DIR] [-U AGENT]"
21 //usage: IF_FEATURE_WGET_TIMEOUT(" [-T SEC]") " URL..."
23 //usage:#define wget_full_usage "\n\n"
24 //usage: "Retrieve files via HTTP or FTP\n"
26 //usage: "\n -s Spider mode - only check file existence"
27 //usage: "\n -c Continue retrieval of aborted transfer"
28 //usage: "\n -q Quiet"
29 //usage: "\n -P DIR Save to DIR (default .)"
30 //usage: IF_FEATURE_WGET_TIMEOUT(
31 //usage: "\n -T SEC Network read timeout is SEC seconds"
33 //usage: "\n -O FILE Save to FILE ('-' for stdout)"
34 //usage: "\n -U STR Use STR for User-Agent header"
35 //usage: "\n -Y Use proxy ('on' or 'off')"
39 //#define log_io(...) bb_error_msg(__VA_ARGS__)
40 #define log_io(...) ((void)0)
55 off_t content_len; /* Content-length of the file */
56 off_t beg_range; /* Range at which continue begins */
57 #if ENABLE_FEATURE_WGET_STATUSBAR
58 off_t transferred; /* Number of bytes transferred so far */
59 const char *curfile; /* Name of current file being transferred */
63 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
67 char *fname_out; /* where to direct output (-O) */
68 const char *proxy_flag; /* Use proxies if env vars are set */
69 const char *user_agent; /* "User-Agent" header field */
70 #if ENABLE_FEATURE_WGET_TIMEOUT
71 unsigned timeout_seconds;
75 smallint chunked; /* chunked transfer encoding */
76 smallint got_clen; /* got content-length: from server */
77 /* Local downloads do benefit from big buffer.
78 * With 512 byte buffer, it was measured to be
79 * an order of magnitude slower than with big one.
81 uint64_t just_to_align_next_member;
82 char wget_buf[CONFIG_FEATURE_COPYBUF_KB*1024];
84 #define G (*ptr_to_globals)
85 #define INIT_G() do { \
86 SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
87 IF_FEATURE_WGET_TIMEOUT(G.timeout_seconds = 900;) \
91 /* Must match option string! */
93 WGET_OPT_CONTINUE = (1 << 0),
94 WGET_OPT_SPIDER = (1 << 1),
95 WGET_OPT_QUIET = (1 << 2),
96 WGET_OPT_OUTNAME = (1 << 3),
97 WGET_OPT_PREFIX = (1 << 4),
98 WGET_OPT_PROXY = (1 << 5),
99 WGET_OPT_USER_AGENT = (1 << 6),
100 WGET_OPT_NETWORK_READ_TIMEOUT = (1 << 7),
101 WGET_OPT_RETRIES = (1 << 8),
102 WGET_OPT_PASSIVE = (1 << 9),
103 WGET_OPT_HEADER = (1 << 10) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
104 WGET_OPT_POST_DATA = (1 << 11) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
112 #if ENABLE_FEATURE_WGET_STATUSBAR
113 static void progress_meter(int flag)
115 if (option_mask32 & WGET_OPT_QUIET)
118 if (flag == PROGRESS_START)
119 bb_progress_init(&G.pmt, G.curfile);
121 bb_progress_update(&G.pmt,
124 (G.chunked || !G.got_clen) ? 0 : G.beg_range + G.transferred + G.content_len
127 if (flag == PROGRESS_END) {
128 bb_progress_free(&G.pmt);
129 bb_putchar_stderr('\n');
134 static ALWAYS_INLINE void progress_meter(int flag UNUSED_PARAM) { }
138 /* IPv6 knows scoped address types i.e. link and site local addresses. Link
139 * local addresses can have a scope identifier to specify the
140 * interface/link an address is valid on (e.g. fe80::1%eth0). This scope
141 * identifier is only valid on a single node.
143 * RFC 4007 says that the scope identifier MUST NOT be sent across the wire,
144 * unless all nodes agree on the semantic. Apache e.g. regards zone identifiers
145 * in the Host header as invalid requests, see
146 * https://issues.apache.org/bugzilla/show_bug.cgi?id=35122
148 static void strip_ipv6_scope_id(char *host)
152 /* bbox wget actually handles IPv6 addresses without [], like
153 * wget "http://::1/xxx", but this is not standard.
154 * To save code, _here_ we do not support it. */
157 return; /* not IPv6 */
159 scope = strchr(host, '%');
163 /* Remove the IPv6 zone identifier from the host address */
164 cp = strchr(host, ']');
165 if (!cp || (cp[1] != ':' && cp[1] != '\0')) {
166 /* malformed address (not "[xx]:nn" or "[xx]") */
170 /* cp points to "]...", scope points to "%eth0]..." */
171 overlapping_strcpy(scope, cp);
174 #if ENABLE_FEATURE_WGET_AUTHENTICATION
175 /* Base64-encode character string. */
176 static char *base64enc(const char *str)
178 unsigned len = strlen(str);
179 if (len > sizeof(G.wget_buf)/4*3 - 10) /* paranoia */
180 len = sizeof(G.wget_buf)/4*3 - 10;
181 bb_uuencode(G.wget_buf, str, len, bb_uuenc_tbl_base64);
186 static char* sanitize_string(char *s)
188 unsigned char *p = (void *) s;
195 static FILE *open_socket(len_and_sockaddr *lsa)
199 /* glibc 2.4 seems to try seeking on it - ??! */
200 /* hopefully it understands what ESPIPE means... */
201 fp = fdopen(xconnect_stream(lsa), "r+");
203 bb_perror_msg_and_die(bb_msg_memory_exhausted);
208 /* Returns '\n' if it was seen, else '\0'. Trims at first '\r' or '\n' */
209 static char fgets_and_trim(FILE *fp)
214 if (fgets(G.wget_buf, sizeof(G.wget_buf) - 1, fp) == NULL)
215 bb_perror_msg_and_die("error getting response");
217 buf_ptr = strchrnul(G.wget_buf, '\n');
220 buf_ptr = strchrnul(G.wget_buf, '\r');
223 log_io("< %s", G.wget_buf);
228 static int ftpcmd(const char *s1, const char *s2, FILE *fp)
234 fprintf(fp, "%s%s\r\n", s1, s2);
236 log_io("> %s%s", s1, s2);
241 } while (!isdigit(G.wget_buf[0]) || G.wget_buf[3] != ' ');
243 G.wget_buf[3] = '\0';
244 result = xatoi_positive(G.wget_buf);
249 static void parse_url(const char *src_url, struct host_info *h)
254 h->allocated = url = xstrdup(src_url);
256 if (strncmp(url, "http://", 7) == 0) {
257 h->port = bb_lookup_port("http", "tcp", 80);
260 } else if (strncmp(url, "ftp://", 6) == 0) {
261 h->port = bb_lookup_port("ftp", "tcp", 21);
265 bb_error_msg_and_die("not an http or ftp url: %s", sanitize_string(url));
268 // "Real" wget 'http://busybox.net?var=a/b' sends this request:
269 // 'GET /?var=a/b HTTP 1.0'
270 // and saves 'index.html?var=a%2Fb' (we save 'b')
271 // wget 'http://busybox.net?login=john@doe':
272 // request: 'GET /?login=john@doe HTTP/1.0'
273 // saves: 'index.html?login=john@doe' (we save '?login=john@doe')
274 // wget 'http://busybox.net#test/test':
275 // request: 'GET / HTTP/1.0'
276 // saves: 'index.html' (we save 'test')
278 // We also don't add unique .N suffix if file exists...
279 sp = strchr(h->host, '/');
280 p = strchr(h->host, '?'); if (!sp || (p && sp > p)) sp = p;
281 p = strchr(h->host, '#'); if (!sp || (p && sp > p)) sp = p;
284 } else if (*sp == '/') {
287 } else { // '#' or '?'
288 // http://busybox.net?login=john@doe is a valid URL
289 // memmove converts to:
290 // http:/busybox.nett?login=john@doe...
291 memmove(h->host - 1, h->host, sp - h->host);
297 // We used to set h->user to NULL here, but this interferes
298 // with handling of code 302 ("object was moved")
300 sp = strrchr(h->host, '@');
310 static char *gethdr(FILE *fp)
317 /* retrieve header line */
318 c = fgets_and_trim(fp);
320 /* end of the headers? */
321 if (G.wget_buf[0] == '\0')
324 /* convert the header name to lower case */
325 for (s = G.wget_buf; isalnum(*s) || *s == '-' || *s == '.'; ++s) {
326 /* tolower for "A-Z", no-op for "0-9a-z-." */
330 /* verify we are at the end of the header name */
332 bb_error_msg_and_die("bad header line: %s", sanitize_string(G.wget_buf));
334 /* locate the start of the header value */
336 hdrval = skip_whitespace(s);
339 /* Rats! The buffer isn't big enough to hold the entire header value */
340 while (c = getc(fp), c != EOF && c != '\n')
347 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
348 static char *URL_escape(const char *str)
350 /* URL encode, see RFC 2396 */
352 char *res = dst = xmalloc(strlen(str) * 3 + 1);
358 /* || strchr("!&'()*-.=_~", c) - more code */
370 || (c >= '0' && c <= '9')
371 || ((c|0x20) >= 'a' && (c|0x20) <= 'z')
378 *dst++ = bb_hexdigits_upcase[c >> 4];
379 *dst++ = bb_hexdigits_upcase[c & 0xf];
385 static FILE* prepare_ftp_session(FILE **dfpp, struct host_info *target, len_and_sockaddr *lsa)
392 target->user = xstrdup("anonymous:busybox@");
394 sfp = open_socket(lsa);
395 if (ftpcmd(NULL, NULL, sfp) != 220)
396 bb_error_msg_and_die("%s", sanitize_string(G.wget_buf + 4));
399 * Splitting username:password pair,
402 str = strchr(target->user, ':');
405 switch (ftpcmd("USER ", target->user, sfp)) {
409 if (ftpcmd("PASS ", str, sfp) == 230)
411 /* fall through (failed login) */
413 bb_error_msg_and_die("ftp login: %s", sanitize_string(G.wget_buf + 4));
416 ftpcmd("TYPE I", NULL, sfp);
421 if (ftpcmd("SIZE ", target->path, sfp) == 213) {
422 G.content_len = BB_STRTOOFF(G.wget_buf + 4, NULL, 10);
423 if (G.content_len < 0 || errno) {
424 bb_error_msg_and_die("SIZE value is garbage");
430 * Entering passive mode
432 if (ftpcmd("PASV", NULL, sfp) != 227) {
434 bb_error_msg_and_die("bad response to %s: %s", "PASV", sanitize_string(G.wget_buf));
436 // Response is "227 garbageN1,N2,N3,N4,P1,P2[)garbage]
437 // Server's IP is N1.N2.N3.N4 (we ignore it)
438 // Server's port for data connection is P1*256+P2
439 str = strrchr(G.wget_buf, ')');
440 if (str) str[0] = '\0';
441 str = strrchr(G.wget_buf, ',');
442 if (!str) goto pasv_error;
443 port = xatou_range(str+1, 0, 255);
445 str = strrchr(G.wget_buf, ',');
446 if (!str) goto pasv_error;
447 port += xatou_range(str+1, 0, 255) * 256;
448 set_nport(lsa, htons(port));
450 *dfpp = open_socket(lsa);
453 sprintf(G.wget_buf, "REST %"OFF_FMT"u", G.beg_range);
454 if (ftpcmd(G.wget_buf, NULL, sfp) == 350)
455 G.content_len -= G.beg_range;
458 if (ftpcmd("RETR ", target->path, sfp) > 150)
459 bb_error_msg_and_die("bad response to %s: %s", "RETR", sanitize_string(G.wget_buf));
464 static void NOINLINE retrieve_file_data(FILE *dfp)
466 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
467 # if ENABLE_FEATURE_WGET_TIMEOUT
470 struct pollfd polldata;
472 polldata.fd = fileno(dfp);
473 polldata.events = POLLIN | POLLPRI;
475 progress_meter(PROGRESS_START);
480 /* Loops only if chunked */
483 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
484 /* Must use nonblocking I/O, otherwise fread will loop
485 * and *block* until it reads full buffer,
486 * which messes up progress bar and/or timeout logic.
487 * Because of nonblocking I/O, we need to dance
488 * very carefully around EAGAIN. See explanation at
491 ndelay_on(polldata.fd);
497 rdsz = sizeof(G.wget_buf);
499 if (G.content_len < (off_t)sizeof(G.wget_buf)) {
500 if ((int)G.content_len <= 0)
502 rdsz = (unsigned)G.content_len;
506 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
507 # if ENABLE_FEATURE_WGET_TIMEOUT
508 second_cnt = G.timeout_seconds;
511 if (safe_poll(&polldata, 1, 1000) != 0)
512 break; /* error, EOF, or data is available */
513 # if ENABLE_FEATURE_WGET_TIMEOUT
514 if (second_cnt != 0 && --second_cnt == 0) {
515 progress_meter(PROGRESS_END);
516 bb_error_msg_and_die("download timed out");
519 /* Needed for "stalled" indicator */
520 progress_meter(PROGRESS_BUMP);
523 /* fread internally uses read loop, which in our case
524 * is usually exited when we get EAGAIN.
525 * In this case, libc sets error marker on the stream.
526 * Need to clear it before next fread to avoid possible
527 * rare false positive ferror below. Rare because usually
528 * fread gets more than zero bytes, and we don't fall
529 * into if (n <= 0) ...
534 n = fread(G.wget_buf, 1, rdsz, dfp);
536 * If error occurs, or EOF is reached, the return value
537 * is a short item count (or zero).
538 * fread does not distinguish between EOF and error.
541 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
542 if (errno == EAGAIN) /* poll lied, there is no data? */
546 bb_perror_msg_and_die(bb_msg_read_error);
547 break; /* EOF, not error */
550 xwrite(G.output_fd, G.wget_buf, n);
552 #if ENABLE_FEATURE_WGET_STATUSBAR
554 progress_meter(PROGRESS_BUMP);
558 if (G.content_len == 0)
562 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
564 ndelay_off(polldata.fd); /* else fgets can get very unhappy */
569 fgets_and_trim(dfp); /* Eat empty line */
572 G.content_len = STRTOOFF(G.wget_buf, NULL, 16);
573 /* FIXME: error check? */
574 if (G.content_len == 0)
575 break; /* all done! */
579 /* Draw full bar and free its resources */
580 G.chunked = 0; /* makes it show 100% even for chunked download */
581 G.got_clen = 1; /* makes it show 100% even for download of (formerly) unknown size */
582 progress_meter(PROGRESS_END);
585 static void download_one_url(const char *url)
587 bool use_proxy; /* Use proxies if env vars are set */
589 len_and_sockaddr *lsa;
590 FILE *sfp; /* socket to web/ftp server */
591 FILE *dfp; /* socket to ftp server (data) */
593 char *fname_out_alloc;
594 struct host_info server;
595 struct host_info target;
597 server.allocated = NULL;
598 target.allocated = NULL;
602 parse_url(url, &target);
604 /* Use the proxy if necessary */
605 use_proxy = (strcmp(G.proxy_flag, "off") != 0);
607 proxy = getenv(target.is_ftp ? "ftp_proxy" : "http_proxy");
608 use_proxy = (proxy && proxy[0]);
610 parse_url(proxy, &server);
613 server.port = target.port;
614 if (ENABLE_FEATURE_IPV6) {
615 //free(server.allocated); - can't be non-NULL
616 server.host = server.allocated = xstrdup(target.host);
618 server.host = target.host;
622 if (ENABLE_FEATURE_IPV6)
623 strip_ipv6_scope_id(target.host);
625 /* If there was no -O FILE, guess output filename */
626 fname_out_alloc = NULL;
627 if (!(option_mask32 & WGET_OPT_OUTNAME)) {
628 G.fname_out = bb_get_last_path_component_nostrip(target.path);
629 /* handle "wget http://kernel.org//" */
630 if (G.fname_out[0] == '/' || !G.fname_out[0])
631 G.fname_out = (char*)"index.html";
632 /* -P DIR is considered only if there was no -O FILE */
635 G.fname_out = fname_out_alloc = concat_path_file(G.dir_prefix, G.fname_out);
637 /* redirects may free target.path later, need to make a copy */
638 G.fname_out = fname_out_alloc = xstrdup(G.fname_out);
642 #if ENABLE_FEATURE_WGET_STATUSBAR
643 G.curfile = bb_get_last_path_component_nostrip(G.fname_out);
646 /* Determine where to start transfer */
648 if (option_mask32 & WGET_OPT_CONTINUE) {
649 G.output_fd = open(G.fname_out, O_WRONLY);
650 if (G.output_fd >= 0) {
651 G.beg_range = xlseek(G.output_fd, 0, SEEK_END);
653 /* File doesn't exist. We do not create file here yet.
654 * We are not sure it exists on remote side */
659 lsa = xhost2sockaddr(server.host, server.port);
660 if (!(option_mask32 & WGET_OPT_QUIET)) {
661 char *s = xmalloc_sockaddr2dotted(&lsa->u.sa);
662 fprintf(stderr, "Connecting to %s (%s)\n", server.host, s);
666 /*G.content_len = 0; - redundant, got_clen = 0 is enough */
669 if (use_proxy || !target.is_ftp) {
677 /* Open socket to http server */
678 sfp = open_socket(lsa);
680 /* Send HTTP request */
682 fprintf(sfp, "GET %stp://%s/%s HTTP/1.1\r\n",
683 target.is_ftp ? "f" : "ht", target.host,
686 if (option_mask32 & WGET_OPT_POST_DATA)
687 fprintf(sfp, "POST /%s HTTP/1.1\r\n", target.path);
689 fprintf(sfp, "GET /%s HTTP/1.1\r\n", target.path);
692 fprintf(sfp, "Host: %s\r\nUser-Agent: %s\r\n",
693 target.host, G.user_agent);
695 /* Ask server to close the connection as soon as we are done
696 * (IOW: we do not intend to send more requests)
698 fprintf(sfp, "Connection: close\r\n");
700 #if ENABLE_FEATURE_WGET_AUTHENTICATION
702 fprintf(sfp, "Proxy-Authorization: Basic %s\r\n"+6,
703 base64enc(target.user));
705 if (use_proxy && server.user) {
706 fprintf(sfp, "Proxy-Authorization: Basic %s\r\n",
707 base64enc(server.user));
712 fprintf(sfp, "Range: bytes=%"OFF_FMT"u-\r\n", G.beg_range);
714 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
716 fputs(G.extra_headers, sfp);
718 if (option_mask32 & WGET_OPT_POST_DATA) {
719 char *estr = URL_escape(G.post_data);
721 "Content-Type: application/x-www-form-urlencoded\r\n"
722 "Content-Length: %u\r\n"
725 (int) strlen(estr), estr
731 fprintf(sfp, "\r\n");
737 * Retrieve HTTP response line and check for "200" status code.
743 str = skip_non_whitespace(str);
744 str = skip_whitespace(str);
745 // FIXME: no error check
746 // xatou wouldn't work: "200 OK"
751 while (gethdr(sfp) != NULL)
752 /* eat all remaining headers */;
756 Response 204 doesn't say "null file", it says "metadata
757 has changed but data didn't":
759 "10.2.5 204 No Content
760 The server has fulfilled the request but does not need to return
761 an entity-body, and might want to return updated metainformation.
762 The response MAY include new or updated metainformation in the form
763 of entity-headers, which if present SHOULD be associated with
764 the requested variant.
766 If the client is a user agent, it SHOULD NOT change its document
767 view from that which caused the request to be sent. This response
768 is primarily intended to allow input for actions to take place
769 without causing a change to the user agent's active document view,
770 although any new or updated metainformation SHOULD be applied
771 to the document currently in the user agent's active view.
773 The 204 response MUST NOT include a message-body, and thus
774 is always terminated by the first empty line after the header fields."
776 However, in real world it was observed that some web servers
777 (e.g. Boa/0.94.14rc21) simply use code 204 when file size is zero.
781 case 300: /* redirection */
791 bb_error_msg_and_die("server returned error: %s", sanitize_string(G.wget_buf));
795 * Retrieve HTTP headers.
797 while ((str = gethdr(sfp)) != NULL) {
798 static const char keywords[] ALIGN1 =
799 "content-length\0""transfer-encoding\0""location\0";
801 KEY_content_length = 1, KEY_transfer_encoding, KEY_location
805 /* gethdr converted "FOO:" string to lowercase */
807 /* strip trailing whitespace */
808 char *s = strchrnul(str, '\0') - 1;
809 while (s >= str && (*s == ' ' || *s == '\t')) {
813 key = index_in_strings(keywords, G.wget_buf) + 1;
814 if (key == KEY_content_length) {
815 G.content_len = BB_STRTOOFF(str, NULL, 10);
816 if (G.content_len < 0 || errno) {
817 bb_error_msg_and_die("content-length %s is garbage", sanitize_string(str));
822 if (key == KEY_transfer_encoding) {
823 if (strcmp(str_tolower(str), "chunked") != 0)
824 bb_error_msg_and_die("transfer encoding '%s' is not supported", sanitize_string(str));
827 if (key == KEY_location && status >= 300) {
828 if (--redir_limit == 0)
829 bb_error_msg_and_die("too many redirections");
832 free(target.allocated);
833 target.path = target.allocated = xstrdup(str+1);
834 /* lsa stays the same: it's on the same server */
836 parse_url(str, &target);
838 free(server.allocated);
839 server.allocated = NULL;
840 server.host = target.host;
841 /* strip_ipv6_scope_id(target.host); - no! */
842 /* we assume remote never gives us IPv6 addr with scope id */
843 server.port = target.port;
846 } /* else: lsa stays the same: we use proxy */
848 goto establish_session;
851 // if (status >= 300)
852 // bb_error_msg_and_die("bad redirection (no Location: header from server)");
854 /* For HTTP, data is pumped over the same connection */
861 sfp = prepare_ftp_session(&dfp, &target, lsa);
866 if (!(option_mask32 & WGET_OPT_SPIDER)) {
868 G.output_fd = xopen(G.fname_out, G.o_flags);
869 retrieve_file_data(dfp);
870 if (!(option_mask32 & WGET_OPT_OUTNAME)) {
877 /* It's ftp. Close data connection properly */
879 if (ftpcmd(NULL, NULL, sfp) != 226)
880 bb_error_msg_and_die("ftp error: %s", sanitize_string(G.wget_buf + 4));
881 /* ftpcmd("QUIT", NULL, sfp); - why bother? */
885 free(server.allocated);
886 free(target.allocated);
887 free(fname_out_alloc);
890 int wget_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
891 int wget_main(int argc UNUSED_PARAM, char **argv)
893 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
894 static const char wget_longopts[] ALIGN1 =
895 /* name, has_arg, val */
896 "continue\0" No_argument "c"
897 //FIXME: -s isn't --spider, it's --save-headers!
898 "spider\0" No_argument "s"
899 "quiet\0" No_argument "q"
900 "output-document\0" Required_argument "O"
901 "directory-prefix\0" Required_argument "P"
902 "proxy\0" Required_argument "Y"
903 "user-agent\0" Required_argument "U"
904 #if ENABLE_FEATURE_WGET_TIMEOUT
905 "timeout\0" Required_argument "T"
908 // "tries\0" Required_argument "t"
909 /* Ignored (we always use PASV): */
910 "passive-ftp\0" No_argument "\xff"
911 "header\0" Required_argument "\xfe"
912 "post-data\0" Required_argument "\xfd"
913 /* Ignored (we don't do ssl) */
914 "no-check-certificate\0" No_argument "\xfc"
918 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
919 llist_t *headers_llist = NULL;
924 IF_FEATURE_WGET_TIMEOUT(G.timeout_seconds = 900;)
925 G.proxy_flag = "on"; /* use proxies if env vars are set */
926 G.user_agent = "Wget"; /* "User-Agent" header field */
928 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
929 applet_long_options = wget_longopts;
931 opt_complementary = "-1" IF_FEATURE_WGET_TIMEOUT(":T+") IF_FEATURE_WGET_LONG_OPTIONS(":\xfe::");
932 getopt32(argv, "csqO:P:Y:U:T:" /*ignored:*/ "t:",
933 &G.fname_out, &G.dir_prefix,
934 &G.proxy_flag, &G.user_agent,
935 IF_FEATURE_WGET_TIMEOUT(&G.timeout_seconds) IF_NOT_FEATURE_WGET_TIMEOUT(NULL),
936 NULL /* -t RETRIES */
937 IF_FEATURE_WGET_LONG_OPTIONS(, &headers_llist)
938 IF_FEATURE_WGET_LONG_OPTIONS(, &G.post_data)
942 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
946 llist_t *ll = headers_llist;
948 size += strlen(ll->data) + 2;
951 G.extra_headers = cp = xmalloc(size);
952 while (headers_llist) {
953 cp += sprintf(cp, "%s\r\n", (char*)llist_pop(&headers_llist));
959 G.o_flags = O_WRONLY | O_CREAT | O_TRUNC | O_EXCL;
960 if (G.fname_out) { /* -O FILE ? */
961 if (LONE_DASH(G.fname_out)) { /* -O - ? */
963 option_mask32 &= ~WGET_OPT_CONTINUE;
965 /* compat with wget: -O FILE can overwrite */
966 G.o_flags = O_WRONLY | O_CREAT | O_TRUNC;
970 download_one_url(*argv++);
972 if (G.output_fd >= 0)