代码拉取完成,页面将自动刷新
/*
* Copyright (c) 2015, Psiphon Inc.
* All rights reserved.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package psiphon
import (
"context"
"fmt"
"net/http"
"os"
"strconv"
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
)
// DownloadUpgrade performs a resumable download of client upgrade files.
//
// While downloading/resuming, a temporary file is used. Once the download is complete,
// a notice is issued and the upgrade is available at the destination specified in
// config.GetUpgradeDownloadFilename().
//
// The upgrade download may be either tunneled or untunneled. As the untunneled case may
// happen with no handshake request response, the downloader cannot rely on having the
// upgrade_client_version output from handshake and instead this logic performs a
// comparison between the config.ClientVersion and the client version recorded in the
// remote entity's UpgradeDownloadClientVersionHeader. A HEAD request is made to check the
// version before proceeding with a full download.
//
// NOTE: This code does not check that any existing file at config.GetUpgradeDownloadFilename()
// is actually the version specified in handshakeVersion.
//
// when there's already a downloaded upgrade pending. Because the outer client currently
// handles the authenticated package phase, and because the outer client deletes the
// intermediate files (including config.GetUpgradeDownloadFilename()), if the outer client
// does not omit config.GetUpgradeDownloadFilename() then the new version will be downloaded
// repeatedly. Implement a new scheme where tunnel core does the authenticated package phase
// and tracks the the output by version number so that (a) tunnel core knows when it's not
// necessary to re-download; (b) newer upgrades will be downloaded even when an older
// upgrade is still pending install by the outer client.
func DownloadUpgrade(
ctx context.Context,
config *Config,
attempt int,
handshakeVersion string,
tunnel *Tunnel,
untunneledDialConfig *DialConfig) error {
// Note: this downloader doesn't use ETags since many client binaries, with
// different embedded values, exist for a single version.
// Check if complete file already downloaded
if _, err := os.Stat(config.GetUpgradeDownloadFilename()); err == nil {
NoticeClientUpgradeDownloaded(config.GetUpgradeDownloadFilename())
return nil
}
p := config.GetParameters().Get()
urls := p.TransferURLs(parameters.UpgradeDownloadURLs)
clientVersionHeader := p.String(parameters.UpgradeDownloadClientVersionHeader)
downloadTimeout := p.Duration(parameters.FetchUpgradeTimeout)
p.Close()
var cancelFunc context.CancelFunc
ctx, cancelFunc = context.WithTimeout(ctx, downloadTimeout)
defer cancelFunc()
// Select tunneled or untunneled configuration
downloadURL := urls.Select(attempt)
httpClient, _, err := MakeDownloadHTTPClient(
ctx,
config,
tunnel,
untunneledDialConfig,
downloadURL.SkipVerify)
if err != nil {
return errors.Trace(err)
}
// If no handshake version is supplied, make an initial HEAD request
// to get the current version from the version header.
availableClientVersion := handshakeVersion
if availableClientVersion == "" {
request, err := http.NewRequest("HEAD", downloadURL.URL, nil)
if err != nil {
return errors.Trace(err)
}
request = request.WithContext(ctx)
response, err := httpClient.Do(request)
if err == nil && response.StatusCode != http.StatusOK {
response.Body.Close()
err = fmt.Errorf("unexpected response status code: %d", response.StatusCode)
}
if err != nil {
return errors.Trace(err)
}
defer response.Body.Close()
currentClientVersion, err := strconv.Atoi(config.ClientVersion)
if err != nil {
return errors.Trace(err)
}
// Note: if the header is missing, Header.Get returns "" and then
// strconv.Atoi returns a parse error.
availableClientVersion = response.Header.Get(clientVersionHeader)
checkAvailableClientVersion, err := strconv.Atoi(availableClientVersion)
if err != nil {
// If the header is missing or malformed, we can't determine the available
// version number. This is unexpected; but if it happens, it's likely due
// to a server-side configuration issue. In this one case, we don't
// return an error so that we don't go into a rapid retry loop making
// ineffective HEAD requests (the client may still signal an upgrade
// download later in the session).
NoticeWarning(
"failed to download upgrade: invalid %s header value %s: %s",
clientVersionHeader, availableClientVersion, err)
return nil
}
if currentClientVersion >= checkAvailableClientVersion {
NoticeClientIsLatestVersion(availableClientVersion)
return nil
}
}
// Proceed with download
// An intermediate filename is used since the presence of
// config.GetUpgradeDownloadFilename() indicates a completed download.
downloadFilename := fmt.Sprintf(
"%s.%s", config.GetUpgradeDownloadFilename(), availableClientVersion)
n, _, err := ResumeDownload(
ctx,
httpClient,
downloadURL.URL,
MakePsiphonUserAgent(config),
downloadFilename,
"")
NoticeClientUpgradeDownloadedBytes(n)
if err != nil {
return errors.Trace(err)
}
err = os.Rename(downloadFilename, config.GetUpgradeDownloadFilename())
if err != nil {
return errors.Trace(err)
}
NoticeClientUpgradeDownloaded(config.GetUpgradeDownloadFilename())
return nil
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。