Jerome Forissier <jerome.foriss...@linaro.org> writes:

> On 6/24/24 08:21, Jon Humphreys wrote:
>> Jerome Forissier <jerome.foriss...@linaro.org> writes:
>> 
>>> Add support for the wget command with NET_LWIP.
>>>
>>> Based on code initially developed by Maxim U.
>>>
>>> Signed-off-by: Jerome Forissier <jerome.foriss...@linaro.org>
>>> Co-developed-by: Maxim Uvarov <muva...@gmail.com>
>>> Cc: Maxim Uvarov <muva...@gmail.com>
>>> Signed-off-by: Jerome Forissier <jerome.foriss...@linaro.org>
>>> ---
>>>  cmd/Kconfig        |   7 ++
>>>  cmd/net-lwip.c     |   8 ++
>>>  include/net-lwip.h |  18 +++
>>>  net-lwip/Makefile  |   1 +
>>>  net-lwip/wget.c    | 269 +++++++++++++++++++++++++++++++++++++++++++++
>>>  5 files changed, 303 insertions(+)
>>>  create mode 100644 net-lwip/wget.c
>>>
>>> diff --git a/cmd/Kconfig b/cmd/Kconfig
>>> index 6ef0b52cd34..d9a86540be6 100644
>>> --- a/cmd/Kconfig
>>> +++ b/cmd/Kconfig
>>> @@ -2117,6 +2117,13 @@ config CMD_TFTPBOOT
>>>     help
>>>       tftpboot - load file via network using TFTP protocol
>>>  
>>> +config CMD_WGET
>>> +   bool "wget"
>>> +   select PROT_TCP_LWIP
>>> +   help
>>> +     wget is a simple command to download kernel, or other files,
>>> +     from a http server over TCP.
>>> +
>>>  endif
>>>  
>>>  endif
>>> diff --git a/cmd/net-lwip.c b/cmd/net-lwip.c
>>> index c021da6a674..42f8bd6b259 100644
>>> --- a/cmd/net-lwip.c
>>> +++ b/cmd/net-lwip.c
>>> @@ -35,3 +35,11 @@ U_BOOT_CMD(
>>>     "hostname [envvar]"
>>>  );
>>>  #endif
>>> +
>>> +#if defined(CONFIG_CMD_WGET)
>>> +U_BOOT_CMD(
>>> +   wget,   3,      1,      do_wget,
>>> +   "boot image via network using HTTP protocol",
>>> +   "[loadAddress] URL"
>>> +);
>>> +#endif
>>> diff --git a/include/net-lwip.h b/include/net-lwip.h
>>> index 4d41b0208a3..ddf25e61417 100644
>>> --- a/include/net-lwip.h
>>> +++ b/include/net-lwip.h
>>> @@ -11,8 +11,26 @@ struct netif *net_lwip_new_netif_noip(void);
>>>  void net_lwip_remove_netif(struct netif *netif);
>>>  struct netif *net_lwip_get_netif(void);
>>>  
>>> +/**
>>> + * wget_with_dns() - runs dns host IP address resulution before wget
>>> + *
>>> + * @dst_addr:      destination address to download the file
>>> + * @uri:   uri string of target file of wget
>>> + * Return: downloaded file size, negative if failed
>>> + */
>>> +
>>> +int wget_with_dns(ulong dst_addr, char *uri);
>>> +/**
>>> + * wget_validate_uri() - varidate the uri
>>> + *
>>> + * @uri:   uri string of target file of wget
>>> + * Return: true if uri is valid, false if uri is invalid
>>> + */
>>> +bool wget_validate_uri(char *uri);
>>> +
>>>  int do_dhcp(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[]);
>>>  int do_dns(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[]);
>>>  int do_ping(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[]);
>>> +int do_wget(struct cmd_tbl *cmdtp, int flag, int argc, char * const 
>>> argv[]);
>>>  
>>>  #endif /* __NET_LWIP_H__ */
>>> diff --git a/net-lwip/Makefile b/net-lwip/Makefile
>>> index aa247859483..bc011bb0e32 100644
>>> --- a/net-lwip/Makefile
>>> +++ b/net-lwip/Makefile
>>> @@ -10,6 +10,7 @@ obj-$(CONFIG_CMD_DHCP) += dhcp.o
>>>  obj-$(CONFIG_CMD_DNS) += dns.o
>>>  obj-$(CONFIG_CMD_PING) += ping.o
>>>  obj-$(CONFIG_CMD_TFTPBOOT) += tftp.o
>>> +obj-$(CONFIG_CMD_WGET) += wget.o
>>>  
>>>  # Disable this warning as it is triggered by:
>>>  # sprintf(buf, index ? "foo%d" : "foo", index)
>>> diff --git a/net-lwip/wget.c b/net-lwip/wget.c
>>> new file mode 100644
>>> index 00000000000..069299bd469
>>> --- /dev/null
>>> +++ b/net-lwip/wget.c
>>> @@ -0,0 +1,269 @@
>>> +// SPDX-License-Identifier: GPL-2.0+
>>> +/* Copyright (C) 2024 Linaro Ltd. */
>>> +
>>> +#include <command.h>
>>> +#include <console.h>
>>> +#include <display_options.h>
>>> +#include <image.h>
>>> +#include <lwip/apps/http_client.h>
>>> +#include <lwip/timeouts.h>
>>> +#include <net.h>
>>> +#include <time.h>
>>> +
>>> +#define SERVER_NAME_SIZE 200
>>> +#define HTTP_PORT_DEFAULT 80
>>> +#define PROGRESS_PRINT_STEP_BYTES (100 * 1024)
>>> +
>>> +enum done_state {
>>> +        NOT_DONE = 0,
>>> +        SUCCESS = 1,
>>> +        FAILURE = 2
>>> +};
>>> +
>>> +struct wget_ctx {
>>> +   ulong daddr;
>>> +   ulong saved_daddr;
>>> +   ulong size;
>>> +   ulong prevsize;
>>> +   ulong start_time;
>>> +   enum done_state done;
>>> +};
>>> +
>>> +static int parse_url(char *url, char *host, u16 *port, char **path)
>>> +{
>>> +   char *p, *pp;
>>> +   long lport;
>>> +
>>> +   p = strstr(url, "http://";);
>>> +   if (!p)
>>> +           return -EINVAL;
>>> +
>>> +   p += strlen("http://";);
>>> +
>>> +   /* Parse hostname */
>>> +   pp = strchr(p, ':');
>>> +   if (!pp)
>>> +           pp = strchr(p, '/');
>>> +   if (!pp)
>>> +           return -EINVAL;
>>> +
>>> +   if (p + SERVER_NAME_SIZE <= pp)
>>> +           return -EINVAL;
>>> +
>>> +   memcpy(host, p, pp - p);
>>> +   host[pp - p + 1] = '\0';
>>> +
>>> +   if (*pp == ':') {
>>> +           /* Parse port number */
>>> +           p = pp + 1;
>>> +           lport = simple_strtol(p, &pp, 10);
>>> +           if (pp && *pp != '/')
>>> +                   return -EINVAL;
>>> +           if (lport > 65535)
>>> +                   return -EINVAL;
>>> +           *port = (u16)lport;
>>> +   } else {
>>> +           *port = HTTP_PORT_DEFAULT;
>>> +   }
>>> +   if (*pp != '/')
>>> +           return -EINVAL;
>>> +   *path = pp;
>>> +
>>> +   return 0;
>>> +}
>>> +
>>> +static err_t httpc_recv_cb(void *arg, struct altcp_pcb *pcb, struct pbuf 
>>> *pbuf,
>>> +                      err_t err)
>>> +{
>>> +   struct wget_ctx *ctx = arg;
>>> +   struct pbuf *buf;
>>> +
>>> +   if (!pbuf)
>>> +           return ERR_BUF;
>>> +
>>> +   for (buf = pbuf; buf; buf = buf->next) {
>>> +           memcpy((void *)ctx->daddr, buf->payload, buf->len);
>>> +           ctx->daddr += buf->len;
>>> +           ctx->size += buf->len;
>>> +           if (ctx->size - ctx->prevsize > PROGRESS_PRINT_STEP_BYTES) {
>>> +                   printf("#");
>>> +                   ctx->prevsize = ctx->size;
>>> +           }
>>> +   }
>>> +
>>> +   altcp_recved(pcb, pbuf->tot_len);
>>> +   pbuf_free(pbuf);
>>> +   return ERR_OK;
>>> +}
>>> +
>>> +static void httpc_result_cb(void *arg, httpc_result_t httpc_result,
>>> +                       u32_t rx_content_len, u32_t srv_res, err_t err)
>>> +{
>>> +   struct wget_ctx *ctx = arg;
>>> +   ulong elapsed;
>>> +
>>> +   if (httpc_result != HTTPC_RESULT_OK) {
>>> +           log_err("\nHTTP client error %d\n", httpc_result);
>>> +           ctx->done = FAILURE;
>>> +           return;
>>> +   }
>>> +
>>> +   elapsed = get_timer(ctx->start_time);
>>> +   if (rx_content_len > PROGRESS_PRINT_STEP_BYTES)
>>> +           printf("\n");
>>> +        printf("%u bytes transferred in %lu ms (", rx_content_len,
>>> +          get_timer(ctx->start_time));
>>> +        print_size(rx_content_len / elapsed * 1000, "/s)\n");
>>> +
>>> +   if (env_set_hex("filesize", rx_content_len) ||
>>> +       env_set_hex("fileaddr", ctx->saved_daddr)) {
>>> +           log_err("Could not set filesize or fileaddr\n");
>>> +           ctx->done = FAILURE;
>>> +           return;
>>> +   }
>>> +
>>> +   ctx->done = SUCCESS;
>>> +}
>>> +
>>> +int wget_with_dns(ulong dst_addr, char *uri)
>>> +{
>>> +   char server_name[SERVER_NAME_SIZE];
>>> +   httpc_connection_t conn;
>>> +   httpc_state_t *state;
>>> +   struct netif *netif;
>>> +   struct wget_ctx ctx;
>>> +   char *path;
>>> +   u16 port;
>>> +
>>> +   ctx.daddr = dst_addr;
>>> +   ctx.saved_daddr = dst_addr;
>>> +   ctx.done = NOT_DONE;
>>> +   ctx.size = 0;
>>> +   ctx.prevsize = 0;
>>> +
>>> +   if (parse_url(uri, server_name, &port, &path))
>>> +           return CMD_RET_USAGE;
>>> +
>>> +   netif = net_lwip_new_netif();
>>> +   if (!netif)
>>> +           return -1;
>>> +
>>> +   memset(&conn, 0, sizeof(conn));
>>> +   conn.result_fn = httpc_result_cb;
>>> +   ctx.start_time = get_timer(0);
>>> +   if (httpc_get_file_dns(server_name, port, path, &conn, httpc_recv_cb,
>>> +                          &ctx, &state)) {
>>> +           net_lwip_remove_netif(netif);
>>> +           return CMD_RET_FAILURE;
>>> +   }
>>> +
>>> +   while (!ctx.done) {
>>> +           eth_rx();
>>> +           sys_check_timeouts();
>>> +           if (ctrlc())
>>> +                   break;
>>> +   }
>>> +
>>> +   net_lwip_remove_netif(netif);
>>> +
>>> +   if (ctx.done == SUCCESS)
>>> +           return 0;
>>> +
>>> +   return -1;
>>> +}
>>> +
>>> +int do_wget(struct cmd_tbl *cmdtp, int flag, int argc, char * const argv[])
>>> +{
>>> +   char *end;
>>> +   char *url;
>>> +   ulong dst_addr;
>>> +
>>> +   if (argc < 2 || argc > 3)
>>> +           return CMD_RET_USAGE;
>>> +
>>> +   dst_addr = hextoul(argv[1], &end);
>>> +        if (end == (argv[1] + strlen(argv[1]))) {
>>> +           if (argc < 3)
>>> +                   return CMD_RET_USAGE;
>>> +           url = argv[2];
>>> +   } else {
>>> +           dst_addr = image_load_addr;
>>> +           url = argv[1];
>>> +   }
>>> +
>>> +   if (wget_with_dns(dst_addr, url))
>>> +           return CMD_RET_FAILURE;
>>> +
>>> +   return CMD_RET_SUCCESS;
>>> +}
>>> +
>>> +/**
>>> + * wget_validate_uri() - validate the uri for wget
>>> + *
>>> + * @uri:   uri string
>>> + *
>>> + * This function follows the current U-Boot wget implementation.
>>> + * scheme: only "http:" is supported
>>> + * authority:
>>> + *   - user information: not supported
>>> + *   - host: supported
>>> + *   - port: not supported(always use the default port)
>>> + *
>>> + * Uri is expected to be correctly percent encoded.
>>> + * This is the minimum check, control codes(0x1-0x19, 0x7F, except '\0')
>>> + * and space character(0x20) are not allowed.
>>> + *
>>> + * TODO: stricter uri conformance check
>>> + *
>>> + * Return: true on success, false on failure
>>> + */
>>> +bool wget_validate_uri(char *uri)
>>> +{
>>> +   char c;
>>> +   bool ret = true;
>>> +   char *str_copy, *s, *authority;
>>> +
>>> +   for (c = 0x1; c < 0x21; c++) {
>>> +           if (strchr(uri, c)) {
>>> +                   log_err("invalid character is used\n");
>>> +                   return false;
>>> +           }
>>> +   }
>>> +   if (strchr(uri, 0x7f)) {
>>> +           log_err("invalid character is used\n");
>>> +           return false;
>>> +   }
>>> +
>>> +   if (strncmp(uri, "http://";, 7)) {
>>> +           log_err("only http:// is supported\n");
>>> +           return false;
>>> +   }
>>> +   str_copy = strdup(uri);
>>> +   if (!str_copy)
>>> +           return false;
>>> +
>>> +   s = str_copy + strlen("http://";);
>>> +   authority = strsep(&s, "/");
>>> +   if (!s) {
>>> +           log_err("invalid uri, no file path\n");
>>> +           ret = false;
>>> +           goto out;
>>> +   }
>>> +   s = strchr(authority, '@');
>>> +   if (s) {
>>> +           log_err("user information is not supported\n");
>>> +           ret = false;
>>> +           goto out;
>>> +   }
>>> +   s = strchr(authority, ':');
>>> +   if (s) {
>>> +           log_err("user defined port is not supported\n");
>>> +           ret = false;
>>> +           goto out;
>>> +   }
>>> +
>>> +out:
>>> +   free(str_copy);
>>> +
>>> +   return ret;
>>> +}
>>> -- 
>>> 2.40.1
>
> Hi Jon,
>
>> Hi Jerome, I am trying out the lwIP stack on TI boards.
>> 
>> For wget, I noticed a bug and a user experience improvement. The bug is an
>> off-by-one array access when parsing the url.
>
> Indeed, someone reported this bug to me off-list and it's already fixed in
> my WIP branch.
>
>> The improvement emits a
>> message if the url isn't an http://, since that is all we are supporting,
>> and without the message, the wget command silently fails, which is
>> confusing to the user.
>
> I agree.
>
>> I will post the 2 patches as a reply to this email. LMK if you want to use
>> another method to collaborate. I can already see that efi http boot support
>> will not work. wget_validate_uri() looks to be copied vertabim from the
>> current implementation, and IMO we should completely remove it.
>
> It is indeed copied. It is needed to avoid an unresolved symbol but I
> understand more work may be needed for EFI HTTP boot support (not tested by
> me).
>
> If you are willing to help with this then you are welcome to post patches as
> replies and I will integrate them in the series.
>
> Thanks,
> -- 
> Jerome

Jerome, here is a patch to allow a port specifier in wget's uri, which lwIP
supports.

thanks
Jon

Subject: [PATCH] net-lwip: lwIP wget supports user defined port in the uri, so
 allow it.

Signed-off-by: Jonathan Humphreys <j-humphr...@ti.com>
---
 net-lwip/wget.c | 6 ------
 1 file changed, 6 deletions(-)

diff --git a/net-lwip/wget.c b/net-lwip/wget.c
index 6b9c953ef51..d3fdd44a29e 100644
--- a/net-lwip/wget.c
+++ b/net-lwip/wget.c
@@ -257,12 +257,6 @@ bool wget_validate_uri(char *uri)
                ret = false;
                goto out;
        }
-       s = strchr(authority, ':');
-       if (s) {
-               log_err("user defined port is not supported\n");
-               ret = false;
-               goto out;
-       }
 
 out:
        free(str_copy);
-- 
2.34.1

Reply via email to