| /******************************************************************************* |
| * Copyright (c) 2004, 2010 Composent, Inc., IBM All rights reserved. This |
| * program and the accompanying materials are made available under the terms of |
| * the Eclipse Public License v1.0 which accompanies this distribution, and is |
| * available at http://www.eclipse.org/legal/epl-v10.html |
| * |
| * Contributors: |
| * Composent, Inc. - initial API and implementation |
| * Maarten Meijer - bug 237936, added gzip encoded transfer default |
| * Henrich Kraemer - bug 263869, testHttpsReceiveFile fails using HTTP proxy |
| * Henrich Kraemer - bug 263613, [transport] Update site contacting / downloading is not cancelable |
| * Thomas Joiner - HttpClient 4 implementation |
| ******************************************************************************/ |
| package org.eclipse.ecf.provider.filetransfer.httpclient4; |
| |
| import java.io.FilterInputStream; |
| import java.io.IOException; |
| import java.io.InputStream; |
| import java.net.HttpURLConnection; |
| import java.net.InetAddress; |
| import java.net.UnknownHostException; |
| import java.util.ArrayList; |
| import java.util.Collections; |
| import java.util.HashMap; |
| import java.util.Iterator; |
| import java.util.List; |
| import java.util.Map; |
| import javax.net.SocketFactory; |
| import javax.net.ssl.SSLSocketFactory; |
| import org.apache.http.Header; |
| import org.apache.http.HttpHost; |
| import org.apache.http.HttpResponse; |
| import org.apache.http.ProtocolVersion; |
| import org.apache.http.auth.AuthScope; |
| import org.apache.http.auth.Credentials; |
| import org.apache.http.auth.NTCredentials; |
| import org.apache.http.auth.UsernamePasswordCredentials; |
| import org.apache.http.auth.params.AuthPNames; |
| import org.apache.http.client.methods.HttpGet; |
| import org.apache.http.client.params.AuthPolicy; |
| import org.apache.http.client.protocol.RequestAcceptEncoding; |
| import org.apache.http.client.protocol.ResponseContentEncoding; |
| import org.apache.http.conn.params.ConnRouteParams; |
| import org.apache.http.conn.scheme.Scheme; |
| import org.apache.http.conn.scheme.SchemeRegistry; |
| import org.apache.http.impl.client.DefaultHttpClient; |
| import org.apache.http.impl.cookie.DateUtils; |
| import org.apache.http.params.CoreConnectionPNames; |
| import org.apache.http.protocol.BasicHttpContext; |
| import org.apache.http.protocol.HttpContext; |
| import org.apache.http.util.EntityUtils; |
| import org.eclipse.core.runtime.Assert; |
| import org.eclipse.core.runtime.IPath; |
| import org.eclipse.core.runtime.IProgressMonitor; |
| import org.eclipse.core.runtime.IStatus; |
| import org.eclipse.core.runtime.NullProgressMonitor; |
| import org.eclipse.core.runtime.Path; |
| import org.eclipse.core.runtime.Status; |
| import org.eclipse.ecf.core.identity.ID; |
| import org.eclipse.ecf.core.security.Callback; |
| import org.eclipse.ecf.core.security.CallbackHandler; |
| import org.eclipse.ecf.core.security.IConnectContext; |
| import org.eclipse.ecf.core.security.NameCallback; |
| import org.eclipse.ecf.core.security.ObjectCallback; |
| import org.eclipse.ecf.core.security.UnsupportedCallbackException; |
| import org.eclipse.ecf.core.util.ECFRuntimeException; |
| import org.eclipse.ecf.core.util.Proxy; |
| import org.eclipse.ecf.core.util.ProxyAddress; |
| import org.eclipse.ecf.core.util.Trace; |
| import org.eclipse.ecf.filetransfer.BrowseFileTransferException; |
| import org.eclipse.ecf.filetransfer.FileTransferJob; |
| import org.eclipse.ecf.filetransfer.IFileRangeSpecification; |
| import org.eclipse.ecf.filetransfer.IFileTransferPausable; |
| import org.eclipse.ecf.filetransfer.IFileTransferRunnable; |
| import org.eclipse.ecf.filetransfer.IRetrieveFileTransferOptions; |
| import org.eclipse.ecf.filetransfer.IncomingFileTransferException; |
| import org.eclipse.ecf.filetransfer.InvalidFileRangeSpecificationException; |
| import org.eclipse.ecf.filetransfer.events.IFileTransferConnectStartEvent; |
| import org.eclipse.ecf.filetransfer.events.socket.ISocketEventSource; |
| import org.eclipse.ecf.filetransfer.events.socket.ISocketListener; |
| import org.eclipse.ecf.filetransfer.identity.IFileID; |
| import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.Activator; |
| import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.ConnectingSocketMonitor; |
| import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.DebugOptions; |
| import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.ECFHttpClientProtocolSocketFactory; |
| import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.ECFHttpClientSecureProtocolSocketFactory; |
| import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.HttpClientProxyCredentialProvider; |
| import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.ISSLSocketFactoryModifier; |
| import org.eclipse.ecf.internal.provider.filetransfer.httpclient4.Messages; |
| import org.eclipse.ecf.provider.filetransfer.events.socket.SocketEventSource; |
| import org.eclipse.ecf.provider.filetransfer.identity.FileTransferID; |
| import org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer; |
| import org.eclipse.ecf.provider.filetransfer.retrieve.HttpHelper; |
| import org.eclipse.ecf.provider.filetransfer.util.JREProxyHelper; |
| import org.eclipse.ecf.provider.filetransfer.util.ProxySetupHelper; |
| import org.eclipse.osgi.util.NLS; |
| |
| public class HttpClientRetrieveFileTransfer extends AbstractRetrieveFileTransfer { |
| |
| private static final String USERNAME_PREFIX = Messages.HttpClientRetrieveFileTransfer_Username_Prefix; |
| |
| // changing to 2 minutes (120000) as per bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=266246 |
| // 10/26/2009: Added being able to set with system property with name org.eclipse.ecf.provider.filetransfer.httpclient4.retrieve.connectTimeout |
| // for https://bugs.eclipse.org/bugs/show_bug.cgi?id=292995 |
| protected static final int DEFAULT_CONNECTION_TIMEOUT = HttpClientOptions.RETRIEVE_DEFAULT_CONNECTION_TIMEOUT; |
| // changing to 2 minutes (120000) as per bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=266246 |
| // 10/26/2009: Added being able to set with system property with name org.eclipse.ecf.provider.filetransfer.httpclient4.retrieve.readTimeout |
| // for https://bugs.eclipse.org/bugs/show_bug.cgi?id=292995 |
| protected static final int DEFAULT_READ_TIMEOUT = HttpClientOptions.RETRIEVE_DEFAULT_READ_TIMEOUT; |
| |
| protected static final int HTTP_PORT = 80; |
| |
| protected static final int HTTPS_PORT = 443; |
| |
| protected static final int MAX_RETRY = 2; |
| |
| protected static final String HTTPS = Messages.FileTransferNamespace_Https_Protocol; |
| |
| protected static final String HTTP = Messages.FileTransferNamespace_Http_Protocol; |
| |
| protected static final String[] supportedProtocols = {HTTP, HTTPS}; |
| |
| private static final String LAST_MODIFIED_HEADER = "Last-Modified"; //$NON-NLS-1$ |
| |
| private HttpGet getMethod = null; |
| |
| private HttpResponse httpResponse = null; |
| |
| private HttpContext httpContext = null; |
| |
| private DefaultHttpClient httpClient = null; |
| |
| private String username; |
| |
| private String password; |
| |
| private int responseCode = -1; |
| private volatile boolean doneFired = false; |
| |
| private String remoteFileName; |
| |
| protected int httpVersion = 1; |
| |
| protected IFileID fileid = null; |
| |
| protected JREProxyHelper proxyHelper = null; |
| |
| private SocketEventSource socketEventSource; |
| |
| private ConnectingSocketMonitor connectingSockets; |
| private FileTransferJob connectJob; |
| |
| /** |
| * @since 5.0 |
| */ |
| public HttpClientRetrieveFileTransfer(DefaultHttpClient httpClient) { |
| this.httpClient = httpClient; |
| Assert.isNotNull(this.httpClient); |
| this.httpClient.setCredentialsProvider(new ECFCredentialsProvider()); |
| proxyHelper = new JREProxyHelper(); |
| connectingSockets = new ConnectingSocketMonitor(1); |
| socketEventSource = new SocketEventSource() { |
| public Object getAdapter(Class adapter) { |
| if (adapter == null) { |
| return null; |
| } |
| if (adapter.isInstance(this)) { |
| return this; |
| } |
| return HttpClientRetrieveFileTransfer.this.getAdapter(adapter); |
| } |
| |
| }; |
| |
| registerSchemes(socketEventSource, connectingSockets); |
| } |
| |
| private synchronized void registerSchemes(ISocketEventSource source, ISocketListener socketListener) { |
| SchemeRegistry schemeRegistry = this.httpClient.getConnectionManager().getSchemeRegistry(); |
| |
| Scheme http = new Scheme(HttpClientRetrieveFileTransfer.HTTP, HTTP_PORT, new ECFHttpClientProtocolSocketFactory(SocketFactory.getDefault(), source, socketListener)); |
| |
| Trace.trace(Activator.PLUGIN_ID, "registering http scheme"); //$NON-NLS-1$ |
| schemeRegistry.register(http); |
| |
| ISSLSocketFactoryModifier sslSocketFactoryModifier = Activator.getDefault().getSSLSocketFactoryModifier(); |
| |
| if (sslSocketFactoryModifier == null) { |
| sslSocketFactoryModifier = new HttpClientDefaultSSLSocketFactoryModifier(); |
| } |
| |
| SSLSocketFactory sslSocketFactory = null; |
| try { |
| sslSocketFactory = sslSocketFactoryModifier.getSSLSocketFactory(); |
| } catch (IOException e) { |
| Trace.catching(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_CATCHING, ISSLSocketFactoryModifier.class, "getSSLSocketFactory()", e); //$NON-NLS-1$ |
| Trace.throwing(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_THROWING, HttpClientRetrieveFileTransfer.class, "registerSchemes()", e); //$NON-NLS-1$ |
| throw new ECFRuntimeException("Unable to instantiate schemes for HttpClient.", e); //$NON-NLS-1$ |
| } |
| |
| Scheme https = new Scheme(HttpClientRetrieveFileTransfer.HTTPS, HTTPS_PORT, new ECFHttpClientSecureProtocolSocketFactory(sslSocketFactory, source, socketListener)); |
| Trace.trace(Activator.PLUGIN_ID, "registering https scheme; modifier=" + sslSocketFactoryModifier); //$NON-NLS-1$ |
| schemeRegistry.register(https); |
| |
| // SPNEGO is not supported, so remove it from the list |
| List authpref = new ArrayList(3); |
| authpref.add(AuthPolicy.NTLM); |
| authpref.add(AuthPolicy.DIGEST); |
| authpref.add(AuthPolicy.BASIC); |
| |
| httpClient.getParams().setParameter(AuthPNames.PROXY_AUTH_PREF, authpref); |
| httpClient.getParams().setParameter(AuthPNames.TARGET_AUTH_PREF, authpref); |
| } |
| |
| /* (non-Javadoc) |
| * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#getRemoteFileName() |
| */ |
| public String getRemoteFileName() { |
| return remoteFileName; |
| } |
| |
| public synchronized void cancel() { |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "cancel"); //$NON-NLS-1$ |
| if (isCanceled()) { |
| return; // break job cancel recursion |
| } |
| setDoneCanceled(exception); |
| boolean fireDoneEvent = true; |
| if (connectJob != null) { |
| Trace.trace(Activator.PLUGIN_ID, "calling connectJob.cancel()"); //$NON-NLS-1$ |
| connectJob.cancel(); |
| } |
| synchronized (jobLock) { |
| if (job != null) { |
| // Its the transfer jobs responsibility to throw the event. |
| fireDoneEvent = false; |
| Trace.trace(Activator.PLUGIN_ID, "calling transfer job.cancel()"); //$NON-NLS-1$ |
| job.cancel(); |
| } |
| } |
| if (getMethod != null) { |
| if (!getMethod.isAborted()) { |
| Trace.trace(Activator.PLUGIN_ID, "calling getMethod.abort()"); //$NON-NLS-1$ |
| getMethod.abort(); |
| } |
| } |
| if (connectingSockets != null) { |
| // Added to prevent CME in bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=430704 |
| connectingSockets.closeSockets(); |
| } |
| hardClose(); |
| if (fireDoneEvent) { |
| fireTransferReceiveDoneEvent(); |
| } |
| Trace.exiting(Activator.PLUGIN_ID, DebugOptions.METHODS_EXITING, this.getClass(), "cancel");//$NON-NLS-1$ |
| |
| } |
| |
| /* |
| * (non-Javadoc) |
| * |
| * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#hardClose() |
| */ |
| protected void hardClose() { |
| // changed for addressing bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=389292 |
| if (getMethod != null) { |
| // First, if !isDone and paused |
| if (!isDone() && isPaused()) |
| getMethod.abort(); |
| // release in any case |
| //getMethod.releaseConnection(); |
| // and set to null |
| getMethod = null; |
| } |
| // Close output stream...if we're supposed to |
| try { |
| if (localFileContents != null && closeOutputStream) |
| localFileContents.close(); |
| } catch (final IOException e) { |
| Activator.getDefault().log(new Status(IStatus.ERROR, Activator.PLUGIN_ID, IStatus.ERROR, "hardClose", e)); //$NON-NLS-1$ |
| } |
| // clear input and output streams |
| remoteFileContents = null; |
| localFileContents = null; |
| // reset response code |
| responseCode = -1; |
| // If we're done and proxy helper still exists, then dispose |
| if (proxyHelper != null && isDone()) { |
| proxyHelper.dispose(); |
| proxyHelper = null; |
| } |
| } |
| |
| /** |
| * @since 5.0 |
| */ |
| protected Credentials getFileRequestCredentials() throws UnsupportedCallbackException, IOException { |
| if (connectContext == null) |
| return null; |
| final CallbackHandler callbackHandler = connectContext.getCallbackHandler(); |
| if (callbackHandler == null) |
| return null; |
| final NameCallback usernameCallback = new NameCallback(USERNAME_PREFIX); |
| final ObjectCallback passwordCallback = new ObjectCallback(); |
| callbackHandler.handle(new Callback[] {usernameCallback, passwordCallback}); |
| username = usernameCallback.getName(); |
| password = (String) passwordCallback.getObject(); |
| return new UsernamePasswordCredentials(username, password); |
| } |
| |
| protected void setupProxies() { |
| // If it's been set directly (via ECF API) then this overrides platform settings |
| if (proxy == null) { |
| try { |
| // give SOCKS priority see https://bugs.eclipse.org/bugs/show_bug.cgi?id=295030#c61 |
| proxy = ProxySetupHelper.getSocksProxy(getRemoteFileURL()); |
| if (proxy == null) { |
| proxy = ProxySetupHelper.getProxy(getRemoteFileURL().toExternalForm()); |
| } |
| } catch (NoClassDefFoundError e) { |
| // If the proxy API is not available a NoClassDefFoundError will be thrown here. |
| // If that happens then we just want to continue on. |
| Activator.logNoProxyWarning(e); |
| } |
| } |
| if (proxy != null) |
| setupProxy(proxy); |
| } |
| |
| protected synchronized void resetDoneAndException() { |
| // Doesn't match the description, but since it should be cleared before it is |
| // reused, this is the best place. |
| clearProxy(); |
| |
| super.resetDoneAndException(); |
| } |
| |
| protected void setupAuthentication(String urlString) throws UnsupportedCallbackException, IOException { |
| Credentials credentials = null; |
| if (username == null) { |
| credentials = getFileRequestCredentials(); |
| } |
| |
| if (credentials != null && username != null) { |
| final AuthScope authScope = new AuthScope(getHostFromURL(urlString), getPortFromURL(urlString), AuthScope.ANY_REALM); |
| Trace.trace(Activator.PLUGIN_ID, "retrieve credentials=" + credentials); //$NON-NLS-1$ |
| httpClient.getCredentialsProvider().setCredentials(authScope, credentials); |
| } |
| } |
| |
| protected void setRequestHeaderValues() throws InvalidFileRangeSpecificationException { |
| final IFileRangeSpecification rangeSpec = getFileRangeSpecification(); |
| if (rangeSpec != null) { |
| final long startPosition = rangeSpec.getStartPosition(); |
| final long endPosition = rangeSpec.getEndPosition(); |
| if (startPosition < 0) |
| throw new InvalidFileRangeSpecificationException(Messages.HttpClientRetrieveFileTransfer_RESUME_START_POSITION_LESS_THAN_ZERO, rangeSpec); |
| if (endPosition != -1L && endPosition <= startPosition) |
| throw new InvalidFileRangeSpecificationException(Messages.HttpClientRetrieveFileTransfer_RESUME_ERROR_END_POSITION_LESS_THAN_START, rangeSpec); |
| String rangeHeader = "bytes=" + startPosition + "-" + ((endPosition == -1L) ? "" : ("" + endPosition)); //$NON-NLS-1$ //$NON-NLS-2$ //$NON-NLS-3$ //$NON-NLS-4$ |
| Trace.trace(Activator.PLUGIN_ID, "retrieve range header=" + rangeHeader); //$NON-NLS-1$ |
| setRangeHeader(rangeHeader); |
| } |
| int maxAge = Integer.getInteger("org.eclipse.ecf.http.cache.max-age", 0); //$NON-NLS-1$ |
| // set max-age for cache control to 0 for bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=249990 |
| // fix the fix for bug 249990 with bug 410813 |
| if (maxAge == 0) { |
| getMethod.addHeader("Cache-Control", "max-age=0"); //$NON-NLS-1$//$NON-NLS-2$ |
| } else if (maxAge > 0) { |
| getMethod.addHeader("Cache-Control", "max-age=" + maxAge); //$NON-NLS-1$//$NON-NLS-2$ |
| } |
| setRequestHeaderValuesFromOptions(); |
| } |
| |
| private void setRequestHeaderValuesFromOptions() { |
| Map localOptions = getOptions(); |
| if (localOptions != null) { |
| Object o = localOptions.get(IRetrieveFileTransferOptions.REQUEST_HEADERS); |
| if (o != null && o instanceof Map) { |
| Map requestHeaders = (Map) o; |
| for (Iterator i = requestHeaders.keySet().iterator(); i.hasNext();) { |
| Object n = i.next(); |
| Object v = requestHeaders.get(n); |
| if (n != null && n instanceof String && v != null && v instanceof String) |
| getMethod.addHeader((String) n, (String) v); |
| } |
| } |
| } |
| } |
| |
| private void setRangeHeader(String value) { |
| getMethod.addHeader("Range", value); //$NON-NLS-1$ |
| } |
| |
| private boolean isHTTP11() { |
| return (httpVersion >= 1); |
| } |
| |
| public int getResponseCode() { |
| if (responseCode != -1) |
| return responseCode; |
| ProtocolVersion version = getMethod.getProtocolVersion(); |
| if (version == null) { |
| responseCode = -1; |
| httpVersion = 1; |
| return responseCode; |
| } |
| httpVersion = version.getMinor(); |
| responseCode = httpResponse.getStatusLine().getStatusCode(); |
| return responseCode; |
| } |
| |
| /* |
| * (non-Javadoc) |
| * |
| * @see org.eclipse.ecf.core.identity.IIdentifiable#getID() |
| */ |
| public ID getID() { |
| return fileid; |
| } |
| |
| private long getLastModifiedTimeFromHeader() throws IOException { |
| Header lastModifiedHeader = httpResponse.getLastHeader(LAST_MODIFIED_HEADER); |
| if (lastModifiedHeader == null) |
| throw new IOException(Messages.HttpClientRetrieveFileTransfer_INVALID_LAST_MODIFIED_TIME); |
| |
| String lastModifiedString = lastModifiedHeader.getValue(); |
| long lastModified = 0; |
| if (lastModifiedString != null) { |
| try { |
| lastModified = DateUtils.parseDate(lastModifiedString).getTime(); |
| } catch (Exception e) { |
| throw new IOException(Messages.HttpClientRetrieveFileTransfer_EXCEPITION_INVALID_LAST_MODIFIED_FROM_SERVER); |
| } |
| } |
| return lastModified; |
| } |
| |
| protected void getResponseHeaderValues() throws IOException { |
| if (getResponseCode() == -1) |
| throw new IOException(Messages.HttpClientRetrieveFileTransfer_INVALID_SERVER_RESPONSE_TO_PARTIAL_RANGE_REQUEST); |
| Header lastModifiedHeader = httpResponse.getLastHeader(LAST_MODIFIED_HEADER); |
| if (lastModifiedHeader != null) { |
| setLastModifiedTime(getLastModifiedTimeFromHeader()); |
| } |
| setFileLength(httpResponse.getEntity().getContentLength()); |
| fileid = new FileTransferID(getRetrieveNamespace(), getRemoteFileURL()); |
| |
| // Get content disposition header and get remote file name from it if possible. |
| Header contentDispositionHeader = httpResponse.getLastHeader(HttpHelper.CONTENT_DISPOSITION_HEADER); |
| if (contentDispositionHeader != null) { |
| remoteFileName = HttpHelper.getRemoteFileNameFromContentDispositionHeader(contentDispositionHeader.getValue()); |
| } |
| // If still null, get the path from httpclient.getMethod() |
| if (remoteFileName == null) { |
| // No name could be extracted using Content-Disposition. Let's try the |
| // path from the getMethod. |
| String pathStr = getMethod.getRequestLine().getUri(); |
| if (pathStr != null && pathStr.length() > 0) { |
| IPath path = Path.fromPortableString(pathStr); |
| if (path.segmentCount() > 0) |
| remoteFileName = path.lastSegment(); |
| } |
| // If still null, use the input file name |
| if (remoteFileName == null) |
| // Last resort. Use the path of the initial URL request |
| remoteFileName = super.getRemoteFileName(); |
| } |
| } |
| |
| final class ECFCredentialsProvider extends HttpClientProxyCredentialProvider { |
| |
| protected Proxy getECFProxy() { |
| return getProxy(); |
| } |
| |
| protected Credentials getNTLMCredentials(Proxy lp) { |
| if (hasForceNTLMProxyOption()) |
| return HttpClientRetrieveFileTransfer.createNTLMCredentials(lp); |
| return null; |
| } |
| |
| } |
| |
| Proxy getProxy() { |
| return proxy; |
| } |
| |
| protected void setInputStream(InputStream ins) { |
| remoteFileContents = ins; |
| } |
| |
| protected InputStream wrapTransferReadInputStream(InputStream inputStream, IProgressMonitor monitor) { |
| // Added to address bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=389292 |
| return new NoCloseWrapperInputStream(inputStream); |
| } |
| |
| // Added to address bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=389292 |
| class NoCloseWrapperInputStream extends FilterInputStream { |
| |
| protected NoCloseWrapperInputStream(InputStream in) { |
| super(in); |
| } |
| |
| public void close() { |
| // do nothing |
| } |
| } |
| |
| protected boolean hasForceNTLMProxyOption() { |
| Map localOptions = getOptions(); |
| if (localOptions != null && localOptions.get(HttpClientOptions.FORCE_NTLM_PROP) != null) |
| return true; |
| return (System.getProperties().getProperty(HttpClientOptions.FORCE_NTLM_PROP) != null); |
| } |
| |
| protected int getSocketReadTimeout() { |
| int result = DEFAULT_READ_TIMEOUT; |
| Map localOptions = getOptions(); |
| if (localOptions != null) { |
| // See if the connect timeout option is present, if so set |
| Object o = localOptions.get(IRetrieveFileTransferOptions.READ_TIMEOUT); |
| if (o != null) { |
| if (o instanceof Integer) { |
| result = ((Integer) o).intValue(); |
| } else if (o instanceof String) { |
| result = new Integer(((String) o)).intValue(); |
| } |
| return result; |
| } |
| o = localOptions.get("org.eclipse.ecf.provider.filetransfer.httpclient4.retrieve.readTimeout"); //$NON-NLS-1$ |
| if (o != null) { |
| if (o instanceof Integer) { |
| result = ((Integer) o).intValue(); |
| } else if (o instanceof String) { |
| result = new Integer(((String) o)).intValue(); |
| } |
| } |
| } |
| return result; |
| } |
| |
| /** |
| * @since 4.0 |
| */ |
| protected int getConnectTimeout() { |
| int result = DEFAULT_CONNECTION_TIMEOUT; |
| Map localOptions = getOptions(); |
| if (localOptions != null) { |
| // See if the connect timeout option is present, if so set |
| Object o = localOptions.get(IRetrieveFileTransferOptions.CONNECT_TIMEOUT); |
| if (o != null) { |
| if (o instanceof Integer) { |
| result = ((Integer) o).intValue(); |
| } else if (o instanceof String) { |
| result = new Integer(((String) o)).intValue(); |
| } |
| return result; |
| } |
| o = localOptions.get("org.eclipse.ecf.provider.filetransfer.httpclient4.retrieve.connectTimeout"); //$NON-NLS-1$ |
| if (o != null) { |
| if (o instanceof Integer) { |
| result = ((Integer) o).intValue(); |
| } else if (o instanceof String) { |
| result = new Integer(((String) o)).intValue(); |
| } |
| } |
| } |
| return result; |
| } |
| |
| /* (non-Javadoc) |
| * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#openStreams() |
| */ |
| protected void openStreams() throws IncomingFileTransferException { |
| |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "openStreams"); //$NON-NLS-1$ |
| final String urlString = getRemoteFileURL().toString(); |
| this.doneFired = false; |
| |
| int code = -1; |
| |
| try { |
| httpClient.getParams().setIntParameter(CoreConnectionPNames.SO_TIMEOUT, getSocketReadTimeout()); |
| int connectTimeout = getConnectTimeout(); |
| httpClient.getParams().setIntParameter(CoreConnectionPNames.CONNECTION_TIMEOUT, connectTimeout); |
| |
| setupAuthentication(urlString); |
| |
| getMethod = new HttpGet(urlString); |
| // Define a CredentialsProvider - found that possibility while debugging in org.apache.commons.httpclient.HttpMethodDirector.processProxyAuthChallenge(HttpMethod) |
| // Seems to be another way to select the credentials. |
| setRequestHeaderValues(); |
| |
| Trace.trace(Activator.PLUGIN_ID, "retrieve=" + urlString); //$NON-NLS-1$ |
| // Set request header for possible gzip encoding, but only if |
| // 1) The file range specification is null (we want the whole file) |
| // 2) The target remote file does *not* end in .gz (see bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=280205) |
| if (getFileRangeSpecification() == null && !targetHasGzSuffix(super.getRemoteFileName())) { |
| Trace.trace(Activator.PLUGIN_ID, "Accept-Encoding: gzip,deflate added to request header"); //$NON-NLS-1$ |
| |
| // Add the interceptors to provide the gzip |
| httpClient.addRequestInterceptor(new RequestAcceptEncoding()); |
| httpClient.addResponseInterceptor(new ResponseContentEncoding()); |
| } else { |
| Trace.trace(Activator.PLUGIN_ID, "Accept-Encoding NOT added to header"); //$NON-NLS-1$ |
| } |
| |
| fireConnectStartEvent(); |
| if (checkAndHandleDone()) { |
| return; |
| } |
| |
| connectingSockets.clear(); |
| // Actually execute get and get response code (since redirect is set to true, then |
| // redirect response code handled internally |
| if (connectJob == null) { |
| performConnect(new NullProgressMonitor()); |
| } else { |
| connectJob.schedule(); |
| connectJob.join(); |
| connectJob = null; |
| } |
| if (checkAndHandleDone()) { |
| return; |
| } |
| |
| code = responseCode; |
| |
| responseHeaders = getResponseHeaders(); |
| |
| Trace.trace(Activator.PLUGIN_ID, "retrieve resp=" + code); //$NON-NLS-1$ |
| |
| // Check for NTLM proxy in response headers |
| // This check is to deal with bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=252002 |
| boolean ntlmProxyFound = NTLMProxyDetector.detectNTLMProxy(httpContext); |
| if (ntlmProxyFound && !hasForceNTLMProxyOption()) |
| throw new IncomingFileTransferException("HttpClient Provider is not configured to support NTLM proxy authentication.", HttpClientOptions.NTLM_PROXY_RESPONSE_CODE); //$NON-NLS-1$ |
| |
| if (NTLMProxyDetector.detectSPNEGOProxy(httpContext)) |
| throw new BrowseFileTransferException("HttpClient Provider does not support the use of SPNEGO proxy authentication."); //$NON-NLS-1$ |
| |
| if (code == HttpURLConnection.HTTP_PARTIAL || code == HttpURLConnection.HTTP_OK) { |
| getResponseHeaderValues(); |
| setInputStream(httpResponse.getEntity().getContent()); |
| fireReceiveStartEvent(); |
| } else if (code == HttpURLConnection.HTTP_NOT_FOUND) { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException(NLS.bind("File not found: {0}", urlString), code); //$NON-NLS-1$ |
| } else if (code == HttpURLConnection.HTTP_UNAUTHORIZED) { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException(Messages.HttpClientRetrieveFileTransfer_Unauthorized, code); |
| } else if (code == HttpURLConnection.HTTP_FORBIDDEN) { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException("Forbidden", code); //$NON-NLS-1$ |
| } else if (code == HttpURLConnection.HTTP_PROXY_AUTH) { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException(Messages.HttpClientRetrieveFileTransfer_Proxy_Auth_Required, code); |
| } else { |
| Trace.trace(Activator.PLUGIN_ID, EntityUtils.toString(httpResponse.getEntity())); |
| // EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException(NLS.bind(Messages.HttpClientRetrieveFileTransfer_ERROR_GENERAL_RESPONSE_CODE, new Integer(code)), code); |
| } |
| } catch (final Exception e) { |
| Trace.throwing(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_THROWING, this.getClass(), "openStreams", e); //$NON-NLS-1$ |
| if (code == -1) { |
| if (!isDone()) { |
| setDoneException(e); |
| } |
| fireTransferReceiveDoneEvent(); |
| } else { |
| IncomingFileTransferException ex = (IncomingFileTransferException) ((e instanceof IncomingFileTransferException) ? e : new IncomingFileTransferException(NLS.bind(Messages.HttpClientRetrieveFileTransfer_EXCEPTION_COULD_NOT_CONNECT, urlString), e, code)); |
| throw ex; |
| } |
| } |
| Trace.exiting(Activator.PLUGIN_ID, DebugOptions.METHODS_EXITING, this.getClass(), "openStreams"); //$NON-NLS-1$ |
| } |
| |
| private Map getResponseHeaders() { |
| if (getMethod == null) |
| return null; |
| Header[] headers = httpResponse.getAllHeaders(); |
| Map result = null; |
| if (headers != null && headers.length > 0) { |
| result = new HashMap(); |
| for (int i = 0; i < headers.length; i++) { |
| String name = headers[i].getName(); |
| String val = headers[i].getValue(); |
| if (name != null && val != null) |
| result.put(name, val); |
| } |
| } |
| return Collections.unmodifiableMap(result); |
| } |
| |
| private boolean checkAndHandleDone() { |
| if (isDone()) { |
| // for cancel the done event should have been fired always. |
| if (!doneFired) { |
| fireTransferReceiveDoneEvent(); |
| } |
| return true; |
| } |
| return false; |
| } |
| |
| /* |
| * (non-Javadoc) |
| * |
| * @see org.eclipse.ecf.filetransfer.IRetrieveFileTransferContainerAdapter#setConnectContextForAuthentication(org.eclipse.ecf.core.security.IConnectContext) |
| */ |
| public void setConnectContextForAuthentication(IConnectContext connectContext) { |
| super.setConnectContextForAuthentication(connectContext); |
| this.username = null; |
| this.password = null; |
| } |
| |
| protected static String getHostFromURL(String url) { |
| String result = url; |
| final int colonSlashSlash = url.indexOf("://"); //$NON-NLS-1$ |
| if (colonSlashSlash < 0) |
| return ""; //$NON-NLS-1$ |
| if (colonSlashSlash >= 0) { |
| result = url.substring(colonSlashSlash + 3); |
| } |
| |
| final int colonPort = result.indexOf(':'); |
| final int requestPath = result.indexOf('/'); |
| |
| int substringEnd; |
| |
| if (colonPort > 0 && requestPath > 0) |
| substringEnd = Math.min(colonPort, requestPath); |
| else if (colonPort > 0) |
| substringEnd = colonPort; |
| else if (requestPath > 0) |
| substringEnd = requestPath; |
| else |
| substringEnd = result.length(); |
| |
| return result.substring(0, substringEnd); |
| |
| } |
| |
| protected static int getPortFromURL(String url) { |
| final int colonSlashSlash = url.indexOf("://"); //$NON-NLS-1$ |
| if (colonSlashSlash < 0) |
| return urlUsesHttps(url) ? HTTPS_PORT : HTTP_PORT; |
| // This is wrong as if the url has no colonPort before '?' then it should return the default |
| |
| int colonPort = url.indexOf(':', colonSlashSlash + 1); |
| if (colonPort < 0) |
| return urlUsesHttps(url) ? HTTPS_PORT : HTTP_PORT; |
| // Make sure that the colonPort is not from some part of the rest of the URL |
| int nextSlash = url.indexOf('/', colonSlashSlash + 3); |
| if (nextSlash != -1 && colonPort > nextSlash) |
| return urlUsesHttps(url) ? HTTPS_PORT : HTTP_PORT; |
| // Make sure the colonPort is not part of the credentials in URI |
| final int atServer = url.indexOf('@', colonSlashSlash + 1); |
| if (atServer != -1 && colonPort < atServer && atServer < nextSlash) |
| colonPort = url.indexOf(':', atServer + 1); |
| if (colonPort < 0) |
| return urlUsesHttps(url) ? HTTPS_PORT : HTTP_PORT; |
| |
| final int requestPath = url.indexOf('/', colonPort + 1); |
| |
| int end; |
| if (requestPath < 0) |
| end = url.length(); |
| else |
| end = requestPath; |
| |
| return Integer.parseInt(url.substring(colonPort + 1, end)); |
| } |
| |
| protected static boolean urlUsesHttps(String url) { |
| url = url.trim(); |
| return url.startsWith(HTTPS); |
| } |
| |
| /* |
| * (non-Javadoc) |
| * |
| * @see org.eclipse.ecf.internal.provider.filetransfer.AbstractRetrieveFileTransfer#supportsProtocol(java.lang.String) |
| */ |
| public static boolean supportsProtocol(String protocolString) { |
| for (int i = 0; i < supportedProtocols.length; i++) |
| if (supportedProtocols[i].equalsIgnoreCase(protocolString)) |
| return true; |
| return false; |
| } |
| |
| protected boolean isConnected() { |
| return (getMethod != null); |
| } |
| |
| /* |
| * (non-Javadoc) |
| * |
| * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#doPause() |
| */ |
| protected boolean doPause() { |
| if (isPaused() || !isConnected() || isDone()) |
| return false; |
| this.paused = true; |
| return this.paused; |
| } |
| |
| /* |
| * (non-Javadoc) |
| * |
| * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#doResume() |
| */ |
| protected boolean doResume() { |
| if (!isPaused() || isConnected()) |
| return false; |
| return openStreamsForResume(); |
| } |
| |
| protected void setResumeRequestHeaderValues() throws IOException { |
| if (this.bytesReceived <= 0 || this.fileLength <= this.bytesReceived) |
| throw new IOException(Messages.HttpClientRetrieveFileTransfer_RESUME_START_ERROR); |
| setRangeHeader("bytes=" + this.bytesReceived + "-"); //$NON-NLS-1$ //$NON-NLS-2$ |
| int maxAge = Integer.getInteger("org.eclipse.ecf.http.cache.max-age", 0); //$NON-NLS-1$ |
| // set max-age for cache control to 0 for bug https://bugs.eclipse.org/bugs/show_bug.cgi?id=249990 |
| // fix the fix for bug 249990 with bug 410813 |
| if (maxAge == 0) { |
| getMethod.addHeader("Cache-Control", "max-age=0"); //$NON-NLS-1$//$NON-NLS-2$ |
| } else if (maxAge > 0) { |
| getMethod.addHeader("Cache-Control", "max-age=" + maxAge); //$NON-NLS-1$//$NON-NLS-2$ |
| } |
| setRequestHeaderValuesFromOptions(); |
| } |
| |
| private boolean openStreamsForResume() { |
| |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "openStreamsForResume"); //$NON-NLS-1$ |
| final String urlString = getRemoteFileURL().toString(); |
| this.doneFired = false; |
| |
| int code = -1; |
| |
| try { |
| httpClient.getParams().setIntParameter(CoreConnectionPNames.SO_TIMEOUT, getSocketReadTimeout()); |
| int connectTimeout = getConnectTimeout(); |
| httpClient.getParams().setIntParameter(CoreConnectionPNames.CONNECTION_TIMEOUT, connectTimeout); |
| |
| setupAuthentication(urlString); |
| |
| getMethod = new HttpGet(urlString); |
| // Define a CredentialsProvider - found that possibility while debugging in org.apache.commons.httpclient.HttpMethodDirector.processProxyAuthChallenge(HttpMethod) |
| // Seems to be another way to select the credentials. |
| setResumeRequestHeaderValues(); |
| |
| Trace.trace(Activator.PLUGIN_ID, "resume=" + urlString); //$NON-NLS-1$ |
| |
| // Gzip encoding is not an option for resume |
| fireConnectStartEvent(); |
| if (checkAndHandleDone()) { |
| return false; |
| } |
| |
| connectingSockets.clear(); |
| // Actually execute get and get response code (since redirect is set to true, then |
| // redirect response code handled internally |
| if (connectJob == null) { |
| performConnect(new NullProgressMonitor()); |
| } else { |
| connectJob.schedule(); |
| connectJob.join(); |
| connectJob = null; |
| } |
| if (checkAndHandleDone()) { |
| return false; |
| } |
| |
| code = responseCode; |
| |
| responseHeaders = getResponseHeaders(); |
| |
| Trace.trace(Activator.PLUGIN_ID, "retrieve resp=" + code); //$NON-NLS-1$ |
| |
| if (code == HttpURLConnection.HTTP_PARTIAL || code == HttpURLConnection.HTTP_OK) { |
| getResumeResponseHeaderValues(); |
| setInputStream(httpResponse.getEntity().getContent()); |
| this.paused = false; |
| fireReceiveResumedEvent(); |
| } else if (code == HttpURLConnection.HTTP_NOT_FOUND) { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException(NLS.bind("File not found: {0}", urlString), code, responseHeaders); //$NON-NLS-1$ |
| } else if (code == HttpURLConnection.HTTP_UNAUTHORIZED) { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException(Messages.HttpClientRetrieveFileTransfer_Unauthorized, code, responseHeaders); |
| } else if (code == HttpURLConnection.HTTP_FORBIDDEN) { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException("Forbidden", code, responseHeaders); //$NON-NLS-1$ |
| } else if (code == HttpURLConnection.HTTP_PROXY_AUTH) { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException(Messages.HttpClientRetrieveFileTransfer_Proxy_Auth_Required, code, responseHeaders); |
| } else { |
| EntityUtils.consume(httpResponse.getEntity()); |
| throw new IncomingFileTransferException(NLS.bind(Messages.HttpClientRetrieveFileTransfer_ERROR_GENERAL_RESPONSE_CODE, new Integer(code)), code, responseHeaders); |
| } |
| Trace.exiting(Activator.PLUGIN_ID, DebugOptions.METHODS_EXITING, this.getClass(), "openStreamsForResume", Boolean.TRUE); //$NON-NLS-1$ |
| return true; |
| } catch (final Exception e) { |
| Trace.catching(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_CATCHING, this.getClass(), "openStreamsForResume", e); //$NON-NLS-1$ |
| if (code == -1) { |
| if (!isDone()) { |
| setDoneException(e); |
| } |
| } else { |
| setDoneException((e instanceof IncomingFileTransferException) ? e : new IncomingFileTransferException(NLS.bind(Messages.HttpClientRetrieveFileTransfer_EXCEPTION_COULD_NOT_CONNECT, urlString), e, code, responseHeaders)); |
| } |
| fireTransferReceiveDoneEvent(); |
| Trace.exiting(Activator.PLUGIN_ID, DebugOptions.METHODS_EXITING, this.getClass(), "openStreamsForResume", Boolean.FALSE); //$NON-NLS-1$ |
| return false; |
| } |
| } |
| |
| protected void getResumeResponseHeaderValues() throws IOException { |
| if (getResponseCode() != HttpURLConnection.HTTP_PARTIAL) |
| throw new IOException(); |
| if (lastModifiedTime != getLastModifiedTimeFromHeader()) |
| throw new IOException(Messages.HttpClientRetrieveFileTransfer_EXCEPTION_FILE_MODIFIED_SINCE_LAST_ACCESS); |
| } |
| |
| /* |
| * (non-Javadoc) |
| * |
| * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#getAdapter(java.lang.Class) |
| */ |
| public Object getAdapter(Class adapter) { |
| if (adapter == null) |
| return null; |
| if (adapter.equals(IFileTransferPausable.class) && isHTTP11()) |
| return this; |
| if (adapter.equals(ISocketEventSource.class)) |
| return this.socketEventSource; |
| return super.getAdapter(adapter); |
| } |
| |
| /* (non-Javadoc) |
| * @see org.eclipse.ecf.provider.filetransfer.retrieve.AbstractRetrieveFileTransfer#setupProxy(org.eclipse.ecf.core.util.Proxy) |
| */ |
| protected void setupProxy(Proxy proxy) { |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, HttpClientRetrieveFileTransfer.class, "setupProxy " + proxy); //$NON-NLS-1$ |
| if (proxy.getType().equals(Proxy.Type.HTTP)) { |
| final ProxyAddress address = proxy.getAddress(); |
| ConnRouteParams.setDefaultProxy(httpClient.getParams(), new HttpHost(address.getHostName(), address.getPort())); |
| // getHostConfiguration().setProxy(address.getHostName(), address.getPort()); |
| } else if (proxy.getType().equals(Proxy.Type.SOCKS)) { |
| Trace.trace(Activator.PLUGIN_ID, "retrieve socksproxy=" + proxy.getAddress()); //$NON-NLS-1$ |
| proxyHelper.setupProxy(proxy); |
| } |
| } |
| |
| /** |
| * This method will clear out the proxy information (so that if this is |
| * reused for a request without a proxy, it will work correctly). |
| * @since 5.0 |
| */ |
| protected void clearProxy() { |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, HttpClientRetrieveFileTransfer.class, "clearProxy()"); //$NON-NLS-1$ |
| ConnRouteParams.setDefaultProxy(httpClient.getParams(), null); |
| } |
| |
| /** |
| * @since 5.0 |
| */ |
| public static NTCredentials createNTLMCredentials(Proxy p) { |
| if (p == null) { |
| return null; |
| } |
| String un = getNTLMUserName(p); |
| String domain = getNTLMDomainName(p); |
| if (un == null || domain == null) |
| return null; |
| |
| String workstation = null; |
| try { |
| workstation = InetAddress.getLocalHost().getHostName(); |
| } catch (UnknownHostException e) { |
| Trace.catching(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_CATCHING, HttpClientRetrieveFileTransfer.class, "createNTLMCredentials", e); //$NON-NLS-1$ |
| } |
| |
| return new NTCredentials(un, p.getPassword(), workstation, domain); |
| } |
| |
| protected static String getNTLMDomainName(Proxy p) { |
| String domainUsername = p.getUsername(); |
| if (domainUsername == null) |
| return null; |
| int slashloc = domainUsername.indexOf('\\'); |
| if (slashloc == -1) |
| return null; |
| return domainUsername.substring(0, slashloc); |
| } |
| |
| protected static String getNTLMUserName(Proxy p) { |
| String domainUsername = p.getUsername(); |
| if (domainUsername == null) |
| return null; |
| int slashloc = domainUsername.indexOf('\\'); |
| if (slashloc == -1) |
| return null; |
| return domainUsername.substring(slashloc + 1); |
| } |
| |
| protected void fireConnectStartEvent() { |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireConnectStartEvent"); //$NON-NLS-1$ |
| // TODO: should the following be in super.fireReceiveStartEvent(); |
| listener.handleTransferEvent(new IFileTransferConnectStartEvent() { |
| public IFileID getFileID() { |
| return remoteFileID; |
| } |
| |
| public void cancel() { |
| HttpClientRetrieveFileTransfer.this.cancel(); |
| } |
| |
| public FileTransferJob prepareConnectJob(FileTransferJob j) { |
| return HttpClientRetrieveFileTransfer.this.prepareConnectJob(j); |
| } |
| |
| public void connectUsingJob(FileTransferJob j) { |
| HttpClientRetrieveFileTransfer.this.connectUsingJob(j); |
| } |
| |
| public String toString() { |
| final StringBuffer sb = new StringBuffer("IFileTransferConnectStartEvent["); //$NON-NLS-1$ |
| sb.append(getFileID()); |
| sb.append("]"); //$NON-NLS-1$ |
| return sb.toString(); |
| } |
| |
| public Object getAdapter(Class adapter) { |
| return HttpClientRetrieveFileTransfer.this.getAdapter(adapter); |
| } |
| }); |
| } |
| |
| protected String createConnectJobName() { |
| return getRemoteFileURL().toString() + createRangeName() + Messages.HttpClientRetrieveFileTransfer_CONNECTING_JOB_NAME; |
| } |
| |
| protected FileTransferJob prepareConnectJob(FileTransferJob cjob) { |
| if (cjob == null) { |
| // Create our own |
| cjob = new FileTransferJob(createJobName()); |
| } |
| cjob.setFileTransfer(this); |
| cjob.setFileTransferRunnable(fileConnectRunnable); |
| return cjob; |
| } |
| |
| protected void connectUsingJob(FileTransferJob cjob) { |
| Assert.isNotNull(cjob); |
| this.connectJob = cjob; |
| } |
| |
| private IFileTransferRunnable fileConnectRunnable = new IFileTransferRunnable() { |
| public IStatus performFileTransfer(IProgressMonitor monitor) { |
| return performConnect(monitor); |
| } |
| }; |
| |
| private IStatus performConnect(IProgressMonitor monitor) { |
| // there might be more ticks in the future perhaps for |
| // connect socket, certificate validation, send request, authenticate, |
| int ticks = 1; |
| monitor.beginTask(getRemoteFileURL().toString() + Messages.HttpClientRetrieveFileTransfer_CONNECTING_TASK_NAME, ticks); |
| try { |
| if (monitor.isCanceled()) |
| throw newUserCancelledException(); |
| httpContext = new BasicHttpContext(); |
| httpResponse = httpClient.execute(getMethod, httpContext); |
| responseCode = httpResponse.getStatusLine().getStatusCode(); |
| Trace.trace(Activator.PLUGIN_ID, "retrieve resp=" + responseCode); //$NON-NLS-1$ |
| } catch (final Exception e) { |
| Trace.catching(Activator.PLUGIN_ID, DebugOptions.EXCEPTIONS_CATCHING, this.getClass(), "performConnect", e); //$NON-NLS-1$ |
| if (!isDone()) { |
| setDoneException(e); |
| } |
| } finally { |
| monitor.done(); |
| } |
| return Status.OK_STATUS; |
| |
| } |
| |
| protected void finalize() throws Throwable { |
| try { |
| if (this.httpClient != null) { |
| this.httpClient.getConnectionManager().shutdown(); |
| } |
| } finally { |
| super.finalize(); |
| } |
| } |
| |
| protected void fireReceiveResumedEvent() { |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireReceiveResumedEvent len=" + fileLength + ";rcvd=" + bytesReceived); //$NON-NLS-1$ //$NON-NLS-2$ |
| super.fireReceiveResumedEvent(); |
| } |
| |
| protected void fireTransferReceiveDataEvent() { |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireTransferReceiveDataEvent len=" + fileLength + ";rcvd=" + bytesReceived); //$NON-NLS-1$ //$NON-NLS-2$ |
| super.fireTransferReceiveDataEvent(); |
| } |
| |
| protected void fireTransferReceiveDoneEvent() { |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireTransferReceiveDoneEvent len=" + fileLength + ";rcvd=" + bytesReceived); //$NON-NLS-1$ //$NON-NLS-2$ |
| this.doneFired = true; |
| super.fireTransferReceiveDoneEvent(); |
| } |
| |
| protected void fireTransferReceivePausedEvent() { |
| Trace.entering(Activator.PLUGIN_ID, DebugOptions.METHODS_ENTERING, this.getClass(), "fireTransferReceivePausedEvent len=" + fileLength + ";rcvd=" + bytesReceived); //$NON-NLS-1$ //$NON-NLS-2$ |
| super.fireTransferReceivePausedEvent(); |
| } |
| |
| } |