2017-07-29 22:00:34 +02:00
|
|
|
#include "handle.h"
|
|
|
|
|
2018-02-10 11:22:41 +01:00
|
|
|
#ifdef USE_OPENSSL
|
|
|
|
int usessl()
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
2017-07-29 22:00:34 +02:00
|
|
|
|
2018-02-10 11:22:41 +01:00
|
|
|
void set_status(void* client,int code,const char* msg)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
2018-03-02 19:04:00 +01:00
|
|
|
char *s = __s("HTTP/1.1 %d %s", code, msg);
|
|
|
|
response(client, s);
|
|
|
|
free(s);
|
|
|
|
s = __s("Server: %s ", SERVER_NAME);
|
|
|
|
response(client, s);
|
|
|
|
free(s);
|
2017-07-29 22:00:34 +02:00
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void redirect(void* client,const char*path)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
__t(client,"<html><head><meta http-equiv=\"refresh\" content=\"0; url=%s\"></head><body></body></html>",path);
|
|
|
|
}
|
|
|
|
|
2018-02-10 11:22:41 +01:00
|
|
|
void html(void* client)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
ctype(client,"text/html; charset=utf-8");
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void text(void* client)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
ctype(client,"text/plain; charset=utf-8");
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void json(void* client)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
ctype(client,"application/json");
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void textstream(void* client)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
ctype(client, "text/event-stream");
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void octstream(void* client, char* name)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
set_status(client,200,"OK");
|
|
|
|
__t(client,"Content-Type: application/octet-stream");
|
|
|
|
__t(client,"Content-Disposition: attachment; filename=\"%s\"", name);
|
|
|
|
response(client,"");
|
|
|
|
//Content-Disposition: attachment; filename="fname.ext"
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void jpeg(void* client)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
ctype(client,"image/jpeg");
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void ctype(void* client, const char* type)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
set_status(client,200,"OK");
|
|
|
|
__t(client,"Content-Type: %s",type);
|
|
|
|
response(client,"");
|
|
|
|
}
|
|
|
|
|
2018-02-10 11:22:41 +01:00
|
|
|
int response(void* client, const char* data)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
char buf[BUFFLEN+3];
|
|
|
|
strcpy(buf, data);
|
|
|
|
int nbytes;
|
|
|
|
int size = strlen(data);
|
|
|
|
buf[size] = '\r';
|
|
|
|
buf[size+1] = '\n';
|
2018-02-10 11:22:41 +01:00
|
|
|
buf[size+2] = '\0';
|
2018-02-10 13:44:25 +01:00
|
|
|
|
|
|
|
nbytes = antd_send(client, buf, strlen(buf));
|
2017-07-29 22:00:34 +02:00
|
|
|
return (nbytes ==-1?0:1);
|
|
|
|
}
|
2018-02-10 13:44:25 +01:00
|
|
|
int antd_send(const void *src, const void* data, int len)
|
2018-02-10 11:22:41 +01:00
|
|
|
{
|
2018-03-02 19:04:00 +01:00
|
|
|
if(!src || !data) return -1;
|
2018-02-10 11:22:41 +01:00
|
|
|
antd_client_t * source = (antd_client_t *) src;
|
|
|
|
#ifdef USE_OPENSSL
|
2018-02-10 13:44:25 +01:00
|
|
|
if(usessl())
|
2018-02-10 11:22:41 +01:00
|
|
|
{
|
2018-02-10 12:24:01 +01:00
|
|
|
//LOG("SSL WRITE\n");
|
2018-02-10 11:22:41 +01:00
|
|
|
return SSL_write((SSL*) source->ssl, data, len);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
#endif
|
|
|
|
return send(source->sock, data, len, 0);
|
|
|
|
#ifdef USE_OPENSSL
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
2018-02-10 13:44:25 +01:00
|
|
|
int antd_recv(const void *src, void* data, int len)
|
2018-02-10 11:22:41 +01:00
|
|
|
{
|
2018-02-10 12:24:01 +01:00
|
|
|
if(!src) return -1;
|
2018-02-10 11:22:41 +01:00
|
|
|
antd_client_t * source = (antd_client_t *) src;
|
|
|
|
#ifdef USE_OPENSSL
|
2018-02-10 13:44:25 +01:00
|
|
|
if(usessl())
|
2018-02-10 11:22:41 +01:00
|
|
|
{
|
2018-02-10 12:24:01 +01:00
|
|
|
//LOG("SSL READ\n");
|
2018-02-10 11:22:41 +01:00
|
|
|
return SSL_read((SSL*) source->ssl, data, len);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
#endif
|
|
|
|
return recv(((int) source->sock), data, len, 0);
|
|
|
|
#ifdef USE_OPENSSL
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
int antd_close(void* src)
|
|
|
|
{
|
2018-02-10 12:24:01 +01:00
|
|
|
if(!src) return -1;
|
2018-02-10 11:22:41 +01:00
|
|
|
antd_client_t * source = (antd_client_t *) src;
|
|
|
|
#ifdef USE_OPENSSL
|
|
|
|
if(source->ssl && usessl()){
|
2018-02-10 16:57:21 +01:00
|
|
|
//printf("SSL:Shutdown ssl\n");
|
|
|
|
//SSL_shutdown((SSL*) source->ssl);
|
|
|
|
SSL_set_shutdown((SSL*) source->ssl, SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
|
|
|
|
//printf("SSL:Free ssl\n");
|
2018-02-10 11:22:41 +01:00
|
|
|
SSL_free((SSL*) source->ssl);
|
2018-02-10 12:24:01 +01:00
|
|
|
//LOG("Freeing SSL\n");
|
2018-02-10 11:22:41 +01:00
|
|
|
}
|
|
|
|
#endif
|
2018-02-10 12:24:01 +01:00
|
|
|
//printf("Close sock %d\n", source->sock);
|
|
|
|
int ret = close(source->sock);
|
2018-03-08 11:39:44 +01:00
|
|
|
server_config.connection--;
|
|
|
|
LOG("Remaining connection %d\n", server_config.connection);
|
2018-02-10 12:24:01 +01:00
|
|
|
free(src);
|
|
|
|
return ret;
|
2018-02-10 11:22:41 +01:00
|
|
|
}
|
|
|
|
int __ti(void* client,int data)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
char str[15];
|
|
|
|
sprintf(str, "%d", data);
|
|
|
|
return response(client,str);
|
|
|
|
}
|
|
|
|
|
2018-02-10 11:22:41 +01:00
|
|
|
int __t(void* client, const char* fstring,...)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
int nbytes;
|
|
|
|
int dlen;
|
|
|
|
int sent = 0;
|
|
|
|
int buflen = 0;
|
|
|
|
va_list arguments;
|
|
|
|
char * data;
|
|
|
|
char* chunk;
|
|
|
|
va_start( arguments, fstring);
|
|
|
|
dlen = vsnprintf(0,0,fstring,arguments) + 1;
|
|
|
|
va_end(arguments);
|
|
|
|
if ((data = (char*)malloc(dlen*sizeof(char))) != 0)
|
|
|
|
{
|
|
|
|
va_start(arguments, fstring);
|
|
|
|
vsnprintf(data, dlen, fstring, arguments);
|
|
|
|
va_end(arguments);
|
|
|
|
|
|
|
|
if(dlen < BUFFLEN)
|
2018-03-02 19:04:00 +01:00
|
|
|
{
|
|
|
|
int ret = response(client,data);
|
|
|
|
free(data);
|
|
|
|
return ret;
|
|
|
|
}
|
2017-07-29 22:00:34 +02:00
|
|
|
else
|
|
|
|
{
|
|
|
|
while(sent < dlen - 1)
|
|
|
|
{
|
|
|
|
if(dlen - sent > BUFFLEN)
|
|
|
|
buflen = BUFFLEN;
|
|
|
|
else
|
|
|
|
buflen = dlen - sent - 1;
|
|
|
|
//LOG("BUFFLEN %d\n",buflen);
|
|
|
|
chunk = (char*) malloc((buflen)*sizeof(char));
|
|
|
|
memcpy(chunk,data+sent,buflen);
|
|
|
|
//chunk[buflen-1] = '\0';
|
|
|
|
//response(client,chunk);
|
|
|
|
sent += buflen;
|
2018-02-10 13:44:25 +01:00
|
|
|
nbytes = antd_send(client, chunk, buflen);
|
2017-07-29 22:00:34 +02:00
|
|
|
free(chunk);
|
2018-03-02 19:04:00 +01:00
|
|
|
if(nbytes == -1)
|
|
|
|
{
|
|
|
|
//free(data);
|
|
|
|
//return 0;
|
|
|
|
break;
|
|
|
|
}
|
2017-07-29 22:00:34 +02:00
|
|
|
}
|
|
|
|
chunk = "\r\n";
|
2018-02-10 13:44:25 +01:00
|
|
|
antd_send(client, chunk, strlen(chunk));
|
2017-07-29 22:00:34 +02:00
|
|
|
}
|
|
|
|
free(data);
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
//
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
int __b(void* client, const unsigned char* data, int size)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
char buf[BUFFLEN];
|
|
|
|
int sent = 0;
|
|
|
|
int buflen = 0;
|
|
|
|
int nbytes;
|
2018-02-10 13:44:25 +01:00
|
|
|
|
2017-07-29 22:00:34 +02:00
|
|
|
if(size <= BUFFLEN)
|
|
|
|
{
|
2018-02-10 13:44:25 +01:00
|
|
|
nbytes = antd_send(client,data,size);
|
2017-07-29 22:00:34 +02:00
|
|
|
return (nbytes==-1?0:1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
while(sent < size)
|
|
|
|
{
|
|
|
|
if(size - sent > BUFFLEN)
|
|
|
|
buflen = BUFFLEN;
|
|
|
|
else
|
|
|
|
buflen = size - sent;
|
|
|
|
memcpy(buf,data+sent,buflen);
|
2018-02-10 13:44:25 +01:00
|
|
|
nbytes = antd_send(client,buf,buflen);
|
2017-07-29 22:00:34 +02:00
|
|
|
sent += buflen;
|
|
|
|
if(nbytes == -1) return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
int __fb(void* client, const char* file)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
printf("Open file %s\n",file );
|
|
|
|
unsigned char buffer[BUFFLEN];
|
|
|
|
FILE *ptr;
|
|
|
|
ptr = fopen(file,"rb");
|
|
|
|
if(!ptr)
|
|
|
|
{
|
|
|
|
LOG("Cannot read : %s\n", file);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
size_t size;
|
|
|
|
while(!feof(ptr))
|
|
|
|
{
|
|
|
|
size = fread(buffer,1,BUFFLEN,ptr);
|
|
|
|
if(!__b(client,buffer,size)) return 0;
|
|
|
|
}
|
|
|
|
fclose(ptr);
|
|
|
|
return 1;
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
int __f(void* client, const char* file)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
unsigned char buf[BUFFLEN];
|
|
|
|
FILE *ptr;
|
|
|
|
int nbytes;
|
|
|
|
ptr = fopen(file,"r");
|
|
|
|
if(!ptr)
|
|
|
|
{
|
|
|
|
LOG("Cannot read : %s\n", file);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
while(fgets(buf, sizeof(buf), ptr) != NULL)
|
|
|
|
{
|
2018-02-10 13:44:25 +01:00
|
|
|
nbytes = antd_send(client, buf, strlen(buf));
|
2017-07-29 22:00:34 +02:00
|
|
|
if(nbytes == -1) return 0;
|
|
|
|
//LOG("READ : %s\n", buf);
|
|
|
|
//fgets(buf, sizeof(buf), ptr);
|
|
|
|
}
|
|
|
|
fclose(ptr);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int upload(const char* tmp, const char* path)
|
|
|
|
{
|
|
|
|
return !rename(tmp, path);
|
|
|
|
}
|
|
|
|
// __plugin__.name
|
2018-02-10 11:22:41 +01:00
|
|
|
void set_cookie(void* client,const char* type, dictionary dic, const char* name)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
set_status(client,200,"OK");
|
|
|
|
__t(client,"Content-Type: %s",type);
|
|
|
|
association assoc;
|
|
|
|
for_each_assoc(assoc,dic){
|
|
|
|
__t(client,"Set-Cookie: %s=%s; Path=/%s",assoc->key, (char*)assoc->value, name);
|
|
|
|
}
|
|
|
|
response(client,"");
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void clear_cookie(void* client, dictionary dic)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
set_status(client,200,"OK");
|
|
|
|
__t(client,"Content-Type: text/html; charset=utf-8");
|
|
|
|
association assoc;
|
|
|
|
for_each_assoc(assoc,dic){
|
|
|
|
__t(client,"Set-Cookie: %s=%s;expires=",assoc->key, (char*)assoc->value, server_time());
|
|
|
|
}
|
|
|
|
response(client,"");
|
|
|
|
}
|
2018-02-10 11:22:41 +01:00
|
|
|
void unknow(void* client)
|
2017-07-29 22:00:34 +02:00
|
|
|
{
|
|
|
|
html(client);
|
|
|
|
__t(client,"404 API not found");
|
|
|
|
}
|
|
|
|
int ws_enable(dictionary dic)
|
|
|
|
{
|
|
|
|
return (dic != NULL && R_INT(dic,"__web_socket__") == 1);
|
2017-07-29 23:54:43 +02:00
|
|
|
}
|
|
|
|
/**
|
|
|
|
* read the request as a string line format
|
|
|
|
* @param sock socket
|
|
|
|
* @return a request string
|
|
|
|
*/
|
2018-02-10 11:22:41 +01:00
|
|
|
char* read_line(void* sock)
|
2017-07-29 23:54:43 +02:00
|
|
|
{
|
|
|
|
char buf[BUFFLEN];
|
|
|
|
read_buf(sock,buf,sizeof(buf));
|
|
|
|
return strdup(buf);
|
|
|
|
}
|
|
|
|
/**
|
|
|
|
* Read the socket request in to a buffer or size
|
|
|
|
* The data is read until the buffer is full or
|
|
|
|
* there are a carrier return character
|
|
|
|
* @param sock socket
|
|
|
|
* @param buf buffer
|
|
|
|
* @param size size of buffer
|
|
|
|
* @return number of bytes read
|
|
|
|
*/
|
2018-02-10 11:22:41 +01:00
|
|
|
int read_buf(void* sock, char*buf,int size)
|
2017-07-29 23:54:43 +02:00
|
|
|
{
|
|
|
|
int i = 0;
|
|
|
|
char c = '\0';
|
|
|
|
int n;
|
|
|
|
while ((i < size - 1) && (c != '\n'))
|
|
|
|
{
|
2018-02-10 13:44:25 +01:00
|
|
|
n = antd_recv(sock, &c, 1);
|
2017-07-29 23:54:43 +02:00
|
|
|
if (n > 0)
|
|
|
|
{
|
|
|
|
buf[i] = c;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
c = '\n';
|
|
|
|
}
|
|
|
|
buf[i] = '\0';
|
|
|
|
return i;
|
2017-07-29 22:00:34 +02:00
|
|
|
}
|