* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
-#include <libubox/blobmsg.h>
+
#include <unistd.h>
#include <stdio.h>
+#include <dlfcn.h>
+#include <getopt.h>
+
+#include <libubox/blobmsg.h>
#include "uclient.h"
+#ifdef __APPLE__
+#define LIB_EXT "dylib"
+#else
+#define LIB_EXT "so"
+#endif
+
+static struct ustream_ssl_ctx *ssl_ctx;
+static const struct ustream_ssl_ops *ssl_ops;
+static int quiet = false;
+
static void example_header_done(struct uclient *cl)
{
struct blob_attr *cur;
int rem;
+ if (quiet)
+ return;
+
printf("Headers (%d): \n", cl->status_code);
blobmsg_for_each_attr(cur, cl->meta, rem) {
printf("%s=%s\n", blobmsg_name(cur), (char *) blobmsg_data(cur));
}
}
+static void msg_connecting(struct uclient *cl)
+{
+ char addr[INET6_ADDRSTRLEN];
+ int port;
+
+ if (quiet)
+ return;
+
+ uclient_get_addr(addr, &port, &cl->remote_addr);
+ fprintf(stderr, "Connecting to %s %s:%d\n", cl->url->host, addr, port);
+}
+
static void example_request_sm(struct uclient *cl)
{
static int i = 0;
switch (i++) {
case 0:
uclient_connect(cl);
+ msg_connecting(cl);
uclient_http_set_request_type(cl, "HEAD");
uclient_request(cl);
break;
static void example_error(struct uclient *cl, int code)
{
- fprintf(stderr, "Error %d!\n", code);
+ if (!quiet)
+ fprintf(stderr, "Error %d!\n", code);
example_request_sm(cl);
}
static int usage(const char *progname)
{
fprintf(stderr,
- "Usage: %s [options] <hostname> <port>\n"
+ "Usage: %s [options] <URL>\n"
"Options:\n"
- " -c <cert>: Load CA certificates from file <cert>\n"
- " -C: Skip certificate CN verification against hostname\n"
+ "\n"
+ "HTTPS options:\n"
+ " --ca-certificate=<cert>: Load CA certificates from file <cert>\n"
+ " --no-check-certificate: don't validate the server's certificate\n"
"\n", progname);
return 1;
}
+static void init_ustream_ssl(void)
+{
+ void *dlh;
+
+ dlh = dlopen("libustream-ssl." LIB_EXT, RTLD_LAZY | RTLD_LOCAL);
+ if (!dlh)
+ return;
+
+ ssl_ops = dlsym(dlh, "ustream_ssl_ops");
+ if (!ssl_ops)
+ return;
+
+ ssl_ctx = ssl_ops->context_new(false);
+}
+
+static int no_ssl(const char *progname)
+{
+ fprintf(stderr, "%s: SSL support not available, please install ustream-ssl\n", progname);
+ return 1;
+}
+
+enum {
+ L_NO_CHECK_CERTIFICATE,
+ L_CA_CERTIFICATE,
+};
+
+static const struct option longopts[] = {
+ [L_NO_CHECK_CERTIFICATE] = { "no-check-certificate", no_argument },
+ [L_CA_CERTIFICATE] = { "ca-certificate", required_argument },
+ {}
+};
+
int main(int argc, char **argv)
{
- struct ustream_ssl_ctx *ctx;
const char *progname = argv[0];
struct uclient *cl;
bool verify = true;
int ch;
+ int longopt_idx = 0;
- ctx = ustream_ssl_context_new(false);
+ init_ustream_ssl();
- while ((ch = getopt(argc, argv, "Cc:")) != -1) {
+ while ((ch = getopt_long(argc, argv, "q", longopts, &longopt_idx)) != -1) {
switch(ch) {
- case 'c':
- ustream_ssl_context_add_ca_crt_file(ctx, optarg);
+ case 0:
+ switch (longopt_idx) {
+ case L_NO_CHECK_CERTIFICATE:
+ verify = false;
+ break;
+ case L_CA_CERTIFICATE:
+ if (ssl_ctx)
+ ssl_ops->context_add_ca_crt_file(ssl_ctx, optarg);
+ break;
+ default:
+ return usage(progname);
+ }
break;
- case 'C':
- verify = false;
+ case 'q':
+ quiet = true;
break;
default:
return usage(progname);
if (argc != 1)
return usage(progname);
+ if (!strncmp(argv[0], "https", 5) && !ssl_ctx)
+ return no_ssl(progname);
+
uloop_init();
cl = uclient_new(argv[0], NULL, &cb);
return 1;
}
- uclient_http_set_ssl_ctx(cl, ctx, verify);
+ if (ssl_ctx)
+ uclient_http_set_ssl_ctx(cl, ssl_ops, ssl_ctx, verify);
+
example_request_sm(cl);
uloop_run();
uloop_done();
uclient_free(cl);
- ustream_ssl_context_free(ctx);
+ if (ssl_ctx)
+ ssl_ops->context_free(ssl_ctx);
return 0;
}