mirror of
https://github.com/Unidata/netcdf-c.git
synced 2024-12-03 08:01:25 +08:00
185 lines
5.6 KiB
C
185 lines
5.6 KiB
C
/* Copyright 2009, UCAR/Unidata and OPeNDAP, Inc.
|
|
See the COPYRIGHT file for more information. */
|
|
|
|
|
|
#include "ocinternal.h"
|
|
#include "ocdebug.h"
|
|
#include "ocdata.h"
|
|
#include "occontent.h"
|
|
|
|
#include "rc.h"
|
|
|
|
/* Condition on libcurl version */
|
|
#ifndef HAVE_CURLOPT_KEYPASSWD
|
|
/* Set up an alias */
|
|
#define CURLOPT_KEYPASSWD CURLOPT_SSLKEYPASSWD
|
|
#endif
|
|
|
|
static char* combinecredentials(const char* user, const char* pwd);
|
|
|
|
|
|
/* Set various general curl flags */
|
|
int
|
|
ocset_curl_flags(CURL* curl, OCstate* state)
|
|
{
|
|
CURLcode cstat = CURLE_OK;
|
|
struct OCcurlflags* flags = &state->curlflags;
|
|
#ifdef CURLOPT_ENCODING
|
|
if (flags->compress) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_ENCODING, 'deflate, gzip');
|
|
if(cstat != CURLE_OK) goto fail;
|
|
DEBUG(1,"CURLOP_ENCODING=deflat, gzip");
|
|
}
|
|
#endif
|
|
if (flags->cookiejar || flags->cookiefile) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_COOKIESESSION, 1);
|
|
if (cstat != CURLE_OK) goto fail;
|
|
DEBUG(1,"CURLOP_COOKIESESSION=1");
|
|
}
|
|
if (flags->cookiejar) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_COOKIEJAR, flags->cookiejar);
|
|
if (cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOP_COOKIEJAR=%s",flags->cookiejar);
|
|
}
|
|
if (flags->cookiefile) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_COOKIEFILE, flags->cookiefile);
|
|
if (cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_COOKIEFILE=%s",flags->cookiefile);
|
|
}
|
|
if (flags->verbose) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L);
|
|
if (cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_VERBOSE=%ld",1L);
|
|
}
|
|
|
|
/* Following are always set */
|
|
cstat = curl_easy_setopt(curl, CURLOPT_FOLLOWLOCATION, 1L);
|
|
DEBUG1(1,"CURLOPT_FOLLOWLOCATION=%ld",1L);
|
|
return OC_NOERR;
|
|
fail:
|
|
return OC_ECURL;
|
|
}
|
|
|
|
int
|
|
ocset_proxy(CURL* curl, OCstate* state)
|
|
{
|
|
CURLcode cstat;
|
|
struct OCproxy *proxy = &state->proxy;
|
|
struct OCcredentials *creds = &state->creds;
|
|
|
|
cstat = curl_easy_setopt(curl, CURLOPT_PROXY, proxy->host);
|
|
if (cstat != CURLE_OK) return OC_ECURL;
|
|
DEBUG1(1,"CURLOPT_PROXY=%s",proxy->host);
|
|
|
|
cstat = curl_easy_setopt(curl, CURLOPT_PROXYPORT, proxy->port);
|
|
if (cstat != CURLE_OK) return OC_ECURL;
|
|
DEBUG1(1,"CURLOPT_PROXYPORT=%d",proxy->port);
|
|
|
|
if (creds->username) {
|
|
char *combined = combinecredentials(creds->username,creds->password);
|
|
if (!combined) return OC_ENOMEM;
|
|
cstat = curl_easy_setopt(curl, CURLOPT_PROXYUSERPWD, combined);
|
|
free(combined);
|
|
if (cstat != CURLE_OK) return OC_ECURL;
|
|
DEBUG1(1,"CURLOPT_PROXYUSERPWD=%s",combined);
|
|
#ifdef CURLOPT_PROXYAUTH
|
|
cstat = curl_easy_setopt(curl, CURLOPT_PROXYAUTH, (long)CURLAUTH_ANY);
|
|
if(cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_PROXYAUTH=%ld",(long)CURLAUTH_ANY);
|
|
#endif
|
|
}
|
|
return OC_NOERR;
|
|
}
|
|
|
|
int
|
|
ocset_ssl(CURL* curl, OCstate* state)
|
|
{
|
|
CURLcode cstat = CURLE_OK;
|
|
struct OCSSL* ssl = &state->ssl;
|
|
long verify = (ssl->validate?1L:0L);
|
|
cstat=curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, verify);
|
|
if (cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_SSL_VERIFYPEER=%ld",verify);
|
|
cstat=curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, (verify?2L:0L));
|
|
if (cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_SSL_VERIFYHOST=%ld",(verify?2L:0L));
|
|
#ifdef IGNORE
|
|
if(verify)
|
|
#endif
|
|
{
|
|
if(ssl->certificate) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_SSLCERT, ssl->certificate);
|
|
if(cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_SSLCERT=%s",ssl->certificate);
|
|
}
|
|
if(ssl->key) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_SSLKEY, ssl->key);
|
|
if(cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_SSLKEY=%s",ssl->key);
|
|
}
|
|
if(ssl->keypasswd) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_KEYPASSWD, ssl->keypasswd);
|
|
if(cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_SSLKEY=%s",ssl->key);
|
|
}
|
|
if(ssl->cainfo) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_CAINFO, ssl->cainfo);
|
|
if(cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_CAINFO=%s",ssl->cainfo);
|
|
}
|
|
if(ssl->capath) {
|
|
cstat = curl_easy_setopt(curl, CURLOPT_CAPATH, ssl->capath);
|
|
if(cstat != CURLE_OK) goto fail;
|
|
DEBUG1(1,"CURLOPT_CAPATH=%s",ssl->capath);
|
|
}
|
|
}
|
|
return OC_NOERR;
|
|
|
|
fail:
|
|
return OC_ECURL;
|
|
}
|
|
|
|
/* This is called with arguments while the other functions in this file are
|
|
* used with global values read from the.dodsrc file. The reason is that
|
|
* we may have multiple password sources.
|
|
*/
|
|
int
|
|
ocset_user_password(CURL* curl, const char *userC, const char *passwordC)
|
|
{
|
|
CURLcode cstat;
|
|
char* combined = NULL;
|
|
|
|
if(userC == NULL && passwordC == NULL) return OC_NOERR;
|
|
if(userC == NULL) userC = "";
|
|
if(passwordC == NULL) passwordC = "";
|
|
|
|
combined = combinecredentials(userC,passwordC);
|
|
if (!combined) return OC_ENOMEM;
|
|
cstat = curl_easy_setopt(curl, CURLOPT_USERPWD, combined);
|
|
if (cstat != CURLE_OK) goto done;
|
|
DEBUG1(1,"CURLOPT_USERPWD=%s",combined);
|
|
cstat = curl_easy_setopt(curl, CURLOPT_HTTPAUTH, (long) CURLAUTH_ANY);
|
|
if (cstat != CURLE_OK) goto done;
|
|
DEBUG1(1,"CURLOPT_HTTPAUTH=%ld",(long)CURLAUTH_ANY);
|
|
|
|
done:
|
|
if(combined != NULL) free(combined);
|
|
return (cstat == CURLE_OK?OC_NOERR:OC_ECURL);
|
|
}
|
|
|
|
|
|
static char*
|
|
combinecredentials(const char* user, const char* pwd)
|
|
{
|
|
int userPassSize = strlen(user) + strlen(pwd) + 2;
|
|
char *userPassword = malloc(sizeof(char) * userPassSize);
|
|
if (!userPassword) {
|
|
oc_log(LOGERR,"Out of Memory\n");
|
|
return NULL;
|
|
}
|
|
strcpy(userPassword, user);
|
|
strcat(userPassword, ":");
|
|
strcat(userPassword, pwd);
|
|
return userPassword;
|
|
}
|