forked from dan/liminix
70 lines
1.8 KiB
C
70 lines
1.8 KiB
C
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include <lua.h>
|
|
#include <lualib.h>
|
|
#include <lauxlib.h>
|
|
#include "fetch.h"
|
|
|
|
/*
|
|
FIXME: "By default libfetch allows TLSv1 and newer when negotiating
|
|
the connecting with the remote peer. You can change this behavior
|
|
by setting the SSL_NO_TLS1, SSL_NO_TLS1_1 and SSL_NO_TLS1_2
|
|
environment variables to disable TLS 1.0, 1.1 and 1.2 respectively."
|
|
*/
|
|
|
|
int lp_error(lua_State *L, int code, char *message) {
|
|
lua_pushnil(L);
|
|
lua_pushinteger(L, code);
|
|
lua_pushlstring(L, message, strlen(message));
|
|
return 3;
|
|
}
|
|
|
|
int lp_fetched(lua_State *L, FXRETTYPE fp, struct url_stat *stat) {
|
|
void * content = malloc(stat->size);
|
|
size_t bytes_read;
|
|
es_read(fp, content, stat->size, &bytes_read);
|
|
|
|
if(bytes_read != stat->size) {
|
|
lp_error(L, -1, "bytes read does not match content-length");
|
|
}
|
|
lua_pushlstring(L, (const char *) content, stat->size);
|
|
lua_newtable(L);
|
|
lua_pushliteral(L, "last-modified");
|
|
lua_pushinteger(L, stat->mtime);
|
|
lua_settable(L, -3);
|
|
|
|
return 2;
|
|
}
|
|
|
|
int lp_fetch(lua_State *L) {
|
|
const char * url_string = luaL_checkstring(L, 1);
|
|
const char * flags = luaL_optstring(L, 2, "");
|
|
time_t if_modified_since = luaL_optinteger(L, 3, 0);
|
|
|
|
struct url *url = fetchParseURL(url_string);
|
|
if(url == NULL) {
|
|
return lp_error(L, -1, "url not parseable");
|
|
}
|
|
url->ims_time = if_modified_since;
|
|
struct url_stat stat;
|
|
|
|
FXRETTYPE fp = fetchXGet(url, &stat, flags);
|
|
fetchFreeURL(url);
|
|
if(fp == NULL) {
|
|
return lp_error(L, fetchLastErrCode, fetchLastErrString);
|
|
}
|
|
return lp_fetched(L, fp, &stat);
|
|
}
|
|
|
|
static const struct luaL_Reg funcs [] = {
|
|
{"fetch", lp_fetch},
|
|
{NULL, NULL} /* sentinel */
|
|
};
|
|
|
|
|
|
int luaopen_fetch (lua_State *L) {
|
|
luaL_newlib(L, funcs);
|
|
return 1;
|
|
}
|