1
0
mirror of https://github.com/lxsang/ant-http synced 2024-06-29 11:59:48 +02:00
ant-http/http_server.c

1673 lines
41 KiB
C
Raw Normal View History

#ifndef _GNU_SOURCE
#define _GNU_SOURCE
#endif
2020-08-25 16:40:24 +02:00
#include <sys/socket.h>
#include <poll.h>
2020-08-25 16:40:24 +02:00
#include <netinet/in.h>
#include <dlfcn.h>
#include <sys/stat.h>
#include <unistd.h>
#include <string.h>
#include <errno.h>
2020-08-25 16:40:24 +02:00
#ifdef USE_OPENSSL
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <openssl/sha.h>
#else
2021-01-01 13:30:04 +01:00
#include "lib/sha1.h"
2020-08-25 16:40:24 +02:00
#endif
2015-10-22 11:39:11 +02:00
#include "http_server.h"
2020-08-25 16:40:24 +02:00
#include "lib/handle.h"
#include "plugin_manager.h"
#include "lib/scheduler.h"
#include "lib/utils.h"
#include "lib/ini.h"
#include "lib/base64.h"
2019-12-15 12:10:06 +01:00
2020-08-27 13:31:40 +02:00
#define HEADER_MAX_SIZE 8192
2019-12-15 12:10:06 +01:00
//define all basic mime here
static mime_t _mimes[] = {
2020-08-27 13:31:40 +02:00
{"image/bmp", "bmp"},
{"image/jpeg", "jpg,jpeg"},
{"text/css", "css"},
{"text/markdown", "md"},
{"text/csv", "csv"},
{"application/pdf", "pdf"},
{"image/gif", "gif"},
{"text/html", "html"},
{"application/json", "json"},
{"application/javascript", "js"},
{"image/png", "png"},
{"text/plain", "txt"},
{"application/xhtml+xml", "xhtml"},
{"application/xml", "xml"},
{"image/svg+xml", "svg"},
{NULL, NULL}};
2019-12-15 12:10:06 +01:00
static pthread_mutex_t server_mux = PTHREAD_MUTEX_INITIALIZER;
config_t server_config;
config_t *config()
{
return &server_config;
}
void destroy_config()
{
freedict(server_config.handlers);
if (server_config.plugins_dir)
free(server_config.plugins_dir);
if (server_config.plugins_ext)
free(server_config.plugins_ext);
if (server_config.db_path)
free(server_config.db_path);
if (server_config.tmpdir)
free(server_config.tmpdir);
2020-08-27 13:31:40 +02:00
if (server_config.ssl_cipher)
2019-12-15 12:10:06 +01:00
free(server_config.ssl_cipher);
2020-08-27 13:31:40 +02:00
if (server_config.gzip_types)
2020-01-08 19:17:51 +01:00
list_free(&server_config.gzip_types);
2020-08-27 13:31:40 +02:00
if (server_config.mimes)
2019-12-15 12:10:06 +01:00
freedict(server_config.mimes);
if (server_config.stat_fifo_path)
free(server_config.stat_fifo_path);
2020-08-27 13:31:40 +02:00
if (server_config.ports)
2019-12-20 16:49:41 +01:00
{
chain_t it;
2020-08-27 13:31:40 +02:00
port_config_t *cnf;
2019-12-20 16:49:41 +01:00
for_each_assoc(it, server_config.ports)
{
2020-08-27 13:31:40 +02:00
cnf = (port_config_t *)it->value;
if (cnf != NULL)
2019-12-20 16:49:41 +01:00
{
2020-08-27 13:31:40 +02:00
if (cnf->htdocs != NULL)
2020-08-19 12:26:17 +02:00
free(cnf->htdocs);
2020-08-27 13:31:40 +02:00
if (cnf->sock > 0)
2020-08-19 12:26:17 +02:00
{
close(cnf->sock);
}
freedict(cnf->rules);
2019-12-20 16:49:41 +01:00
}
}
freedict(server_config.ports);
}
2019-12-11 23:17:42 +01:00
LOG("Unclosed connection: %d", server_config.connection);
}
static int config_handler(void *conf, const char *section, const char *name,
2020-08-27 13:31:40 +02:00
const char *value)
{
config_t *pconfig = (config_t *)conf;
2019-12-20 16:49:41 +01:00
regmatch_t port_matches[2];
2020-08-03 18:56:51 +02:00
struct stat st;
2019-12-20 16:49:41 +01:00
//trim(section, ' ');
//trim(value,' ');
//trim(name,' ');
//char * ppath = NULL;
2019-12-20 16:49:41 +01:00
if (MATCH("SERVER", "plugins"))
{
if (pconfig->plugins_dir)
free(pconfig->plugins_dir);
pconfig->plugins_dir = strdup(value);
2020-08-03 18:56:51 +02:00
if (stat(pconfig->plugins_dir, &st) == -1)
mkdirp(pconfig->plugins_dir, 0755);
}
else if (MATCH("SERVER", "plugins_ext"))
{
2020-09-21 20:10:07 +02:00
if (pconfig->plugins_ext)
free(pconfig->plugins_ext);
pconfig->plugins_ext = strdup(value);
}
else if (MATCH("SERVER", "database"))
{
2020-09-21 20:10:07 +02:00
if (pconfig->db_path)
free(pconfig->db_path);
pconfig->db_path = strdup(value);
2020-08-03 18:56:51 +02:00
if (stat(pconfig->db_path, &st) == -1)
mkdirp(pconfig->db_path, 0755);
}
else if (MATCH("SERVER", "tmpdir"))
{
2020-09-21 20:10:07 +02:00
if (pconfig->tmpdir)
free(pconfig->tmpdir);
pconfig->tmpdir = strdup(value);
2020-08-03 18:56:51 +02:00
if (stat(pconfig->tmpdir, &st) == -1)
mkdirp(pconfig->tmpdir, 0755);
else
{
removeAll(pconfig->tmpdir, 0);
}
}
else if (MATCH("SERVER", "statistic_fifo"))
{
2020-09-21 20:10:07 +02:00
if (pconfig->stat_fifo_path)
free(pconfig->stat_fifo_path);
pconfig->stat_fifo_path = strdup(value);
}
2019-12-22 00:11:26 +01:00
else if (MATCH("SERVER", "max_upload_size"))
{
pconfig->max_upload_size = atoi(value);
}
else if (MATCH("SERVER", "maxcon"))
{
pconfig->maxcon = atoi(value);
}
else if (MATCH("SERVER", "backlog"))
{
pconfig->backlog = atoi(value);
}
else if (MATCH("SERVER", "workers"))
{
pconfig->n_workers = atoi(value);
}
else if (MATCH("SERVER", "debug_enable"))
{
pconfig->debug_enable = atoi(value);
}
else if (MATCH("SERVER", "scheduler_timeout"))
{
pconfig->scheduler_timeout = atoi(value);
}
2020-01-08 19:17:51 +01:00
#ifdef USE_ZLIB
else if (MATCH("SERVER", "gzip_enable"))
{
pconfig->gzip_enable = atoi(value);
}
else if (MATCH("SERVER", "gzip_types"))
{
2020-08-27 13:31:40 +02:00
pconfig->gzip_types = split(value, ",");
2020-01-08 19:17:51 +01:00
}
#endif
#ifdef USE_OPENSSL
else if (MATCH("SERVER", "ssl.cert"))
{
2020-09-21 20:10:07 +02:00
if (pconfig->sslcert)
free(pconfig->sslcert);
pconfig->sslcert = strdup(value);
}
else if (MATCH("SERVER", "ssl.key"))
{
2020-09-21 20:10:07 +02:00
if (pconfig->sslkey)
free(pconfig->sslkey);
pconfig->sslkey = strdup(value);
}
2020-08-27 13:31:40 +02:00
else if (MATCH("SERVER", "ssl.cipher"))
2019-12-15 12:10:06 +01:00
{
2020-09-21 20:10:07 +02:00
if (pconfig->ssl_cipher)
free(pconfig->ssl_cipher);
2019-12-15 12:10:06 +01:00
pconfig->ssl_cipher = strdup(value);
}
#endif
else if (strcmp(section, "FILEHANDLER") == 0)
{
dput(pconfig->handlers, name, strdup(value));
}
2018-10-08 23:16:15 +02:00
else if (strcmp(section, "AUTOSTART") == 0 || strcmp(section, "AUTOLOAD") == 0)
{
// The server section must be added before the autostart section
// auto start plugin
plugin_load((char *)value);
}
2020-08-27 13:31:40 +02:00
else if (strcmp(section, "MIMES") == 0)
2019-12-15 12:10:06 +01:00
{
2020-08-27 13:31:40 +02:00
dput(pconfig->mimes, name, strdup(value));
2019-12-15 12:10:06 +01:00
}
2020-08-27 13:31:40 +02:00
else if (regex_match("PORT:\\s*([0-9]+)", section, 2, port_matches))
2019-12-20 16:49:41 +01:00
{
char buf[20];
memset(buf, '\0', sizeof(buf));
memcpy(buf, section + port_matches[1].rm_so, port_matches[1].rm_eo - port_matches[1].rm_so);
2020-08-27 13:31:40 +02:00
port_config_t *p = dvalue(pconfig->ports, buf);
if (!p)
2019-12-20 16:49:41 +01:00
{
2020-08-27 13:31:40 +02:00
p = (port_config_t *)malloc(sizeof(port_config_t));
2019-12-20 16:49:41 +01:00
p->htdocs = NULL;
p->sock = -1;
2020-09-22 16:49:43 +02:00
p->rules = dict_n(1);
2020-08-27 13:31:40 +02:00
dput(pconfig->ports, buf, p);
2019-12-20 16:49:41 +01:00
p->port = atoi(buf);
}
2020-08-27 13:31:40 +02:00
if (strcmp(name, "htdocs") == 0)
2019-12-20 16:49:41 +01:00
{
p->htdocs = strdup(value);
2020-08-03 18:56:51 +02:00
if (stat(p->htdocs, &st) == -1)
{
mkdirp(p->htdocs, 0755);
}
2019-12-20 16:49:41 +01:00
}
2020-08-27 13:31:40 +02:00
else if (strcmp(name, "ssl.enable") == 0)
2019-12-20 16:49:41 +01:00
{
p->usessl = atoi(value);
2020-08-27 13:31:40 +02:00
if (p->usessl)
2019-12-20 16:49:41 +01:00
pconfig->enable_ssl = 1;
}
2019-12-20 19:26:45 +01:00
else
{
// other thing should be rules
2019-12-22 17:33:35 +01:00
dput(p->rules, name, strdup(value));
2019-12-20 19:26:45 +01:00
}
2019-12-20 16:49:41 +01:00
}
else
{
return 0; /* unknown section/name, error */
}
return 1;
}
2019-12-20 16:49:41 +01:00
void load_config(const char *file)
{
2019-12-20 16:49:41 +01:00
server_config.ports = dict();
server_config.plugins_dir = strdup("plugins/");
server_config.plugins_ext = strdup(".dylib");
server_config.db_path = strdup("databases/");
2019-12-20 16:49:41 +01:00
//server_config.htdocs = "htdocs/";
server_config.tmpdir = strdup("tmp/");
server_config.stat_fifo_path = strdup("/var/run/antd_stat");
server_config.n_workers = 4;
2019-12-20 16:49:41 +01:00
server_config.backlog = 1000;
server_config.handlers = dict();
2019-12-20 16:49:41 +01:00
server_config.maxcon = 100;
2019-12-22 00:11:26 +01:00
server_config.max_upload_size = 10000000; //10Mb
server_config.connection = 0;
2019-12-15 12:10:06 +01:00
server_config.mimes = dict();
2019-12-20 16:49:41 +01:00
server_config.enable_ssl = 0;
server_config.sslcert = strdup("cert.pem");
server_config.sslkey = strdup("key.pem");
2019-12-15 12:10:06 +01:00
server_config.ssl_cipher = NULL;
2020-01-08 19:17:51 +01:00
server_config.gzip_enable = 0;
server_config.gzip_types = NULL;
server_config.debug_enable = 0;
server_config.scheduler_timeout = 30; // 30 s
2019-12-15 12:10:06 +01:00
// put it default mimes
2020-08-27 13:31:40 +02:00
for (int i = 0; _mimes[i].type != NULL; i++)
2019-12-15 12:10:06 +01:00
{
2020-08-27 13:31:40 +02:00
dput(server_config.mimes, _mimes[i].type, strdup(_mimes[i].ext));
2019-12-15 12:10:06 +01:00
}
if (ini_parse(file, config_handler, &server_config) < 0)
{
2019-12-11 23:17:42 +01:00
ERROR("Can't load '%s'. Used defaut configuration", file);
}
else
{
2019-12-11 23:17:42 +01:00
LOG("Using configuration : %s", file);
#ifdef USE_OPENSSL
2019-12-20 16:49:41 +01:00
LOG("SSL enable %d", server_config.enable_ssl);
2019-12-11 23:17:42 +01:00
LOG("SSL cert %s", server_config.sslcert);
LOG("SSL key %s", server_config.sslkey);
2019-12-19 09:58:19 +01:00
/*if(!server_config.ssl_cipher)
2019-12-15 12:10:06 +01:00
LOG("SSL Cipher suite: %s", "HIGH");
else
2019-12-19 09:58:19 +01:00
LOG("SSL Cipher suite: %s", server_config.ssl_cipher);*/
#endif
}
2019-12-15 12:10:06 +01:00
LOG("%d mimes entries found", server_config.mimes->size);
}
void *accept_request(void *data)
2018-10-04 19:47:31 +02:00
{
char buf[BUFFLEN];
char *token = NULL;
char *line = NULL;
antd_task_t *task;
antd_request_t *rq = (antd_request_t *)data;
2019-07-31 15:11:59 +02:00
task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
2021-01-22 01:12:26 +01:00
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE);
// first verify if the socket is ready
antd_client_t *client = (antd_client_t *)rq->client;
struct pollfd pfd[1];
pfd[0].fd = client->sock;
pfd[0].events = POLLIN | POLLOUT;
int sel = poll(pfd, 1, POLL_EVENT_TO);
if (sel == -1)
{
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 400, "Bad request");
return task;
}
if (pfd[0].revents & POLLERR || pfd[0].revents & POLLHUP)
{
antd_error(rq->client, 400, "Bad request");
return task;
}
if (sel == 0 || (!(pfd[0].revents & POLLIN) && !(pfd[0].revents & POLLOUT)))
2018-03-14 11:55:15 +01:00
{
task->handle = accept_request;
2018-10-04 19:47:31 +02:00
return task;
2018-03-14 11:55:15 +01:00
}
2018-10-07 01:03:05 +02:00
// perform the ssl handshake if enabled
#ifdef USE_OPENSSL
int ret = -1, stat;
if (client->ssl && client->state == ANTD_CLIENT_ACCEPT)
2018-10-07 01:03:05 +02:00
{
2018-10-14 11:31:05 +02:00
//LOG("Atttempt %d\n", client->attempt);
if (SSL_accept((SSL *)client->ssl) == -1)
{
stat = SSL_get_error((SSL *)client->ssl, ret);
switch (stat)
2018-10-07 01:03:05 +02:00
{
case SSL_ERROR_WANT_READ:
case SSL_ERROR_WANT_WRITE:
case SSL_ERROR_NONE:
task->handle = accept_request;
return task;
default:
2019-12-20 16:49:41 +01:00
ERROR("Error performing SSL handshake %d %d %s", stat, ret, ERR_error_string(ERR_get_error(), NULL));
antd_error(rq->client, 400, "Invalid SSL request");
2019-07-31 15:11:59 +02:00
//server_config.connection++;
ERR_print_errors_fp(stderr);
return task;
2018-10-07 01:03:05 +02:00
}
}
client->state = ANTD_CLIENT_HANDSHAKE;
2018-10-07 01:03:05 +02:00
task->handle = accept_request;
2019-07-31 15:11:59 +02:00
//LOG("Handshake finish for %d\n", client->sock);
2018-10-07 01:03:05 +02:00
return task;
}
2018-10-15 21:35:57 +02:00
else
2018-10-07 01:03:05 +02:00
{
if (!((pfd[0].revents & POLLIN)))
2018-10-07 01:03:05 +02:00
{
task->handle = accept_request;
return task;
}
2018-10-15 21:35:57 +02:00
}
2018-10-07 01:03:05 +02:00
#endif
2019-12-11 23:17:42 +01:00
//LOG("Ready for reading %d\n", client->sock);
2019-07-31 15:11:59 +02:00
//server_config.connection++;
client->state = ANTD_CLIENT_PROTO_CHECK;
read_buf(rq->client, buf, sizeof(buf));
2018-10-04 19:47:31 +02:00
line = buf;
2020-08-27 13:31:40 +02:00
LOG("Request (%d): %s", rq->client->sock, line);
2018-10-04 19:47:31 +02:00
// get the method string
token = strsep(&line, " ");
if (!line)
2015-10-22 11:39:11 +02:00
{
2019-12-15 15:40:23 +01:00
//LOG("No method found");
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 405, "No method found");
2018-10-04 19:47:31 +02:00
return task;
2015-10-22 11:39:11 +02:00
}
trim(token, ' ');
trim(line, ' ');
dput(rq->request, "METHOD", strdup(token));
2018-10-04 19:47:31 +02:00
// get the request
token = strsep(&line, " ");
if (!line)
2015-10-22 11:39:11 +02:00
{
2019-12-15 15:40:23 +01:00
//LOG("No request found");
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 400, "Bad request");
2018-10-04 19:47:31 +02:00
return task;
2015-10-22 11:39:11 +02:00
}
trim(token, ' ');
trim(line, ' ');
2018-10-04 19:47:31 +02:00
trim(line, '\n');
trim(line, '\r');
dput(rq->request, "PROTOCOL", strdup(line));
dput(rq->request, "REQUEST_QUERY", strdup(token));
2018-10-04 19:47:31 +02:00
line = token;
token = strsep(&line, "?");
2018-10-08 22:01:05 +02:00
dput(rq->request, "REQUEST_PATH", url_decode(token));
2018-10-04 19:47:31 +02:00
// decode request
// now return the task
task->handle = decode_request_header;
return task;
}
2015-10-22 11:39:11 +02:00
void *resolve_request(void *data)
2018-10-04 19:47:31 +02:00
{
struct stat st;
char path[2 * BUFFLEN];
antd_request_t *rq = (antd_request_t *)data;
2019-07-31 15:11:59 +02:00
antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
char *url = (char *)dvalue(rq->request, "RESOURCE_PATH");
char *newurl = NULL;
char *rqp = NULL;
char *oldrqp = NULL;
rq->client->state = ANTD_CLIENT_RESOLVE_REQUEST;
2020-01-08 19:17:51 +01:00
htdocs(rq, path);
2015-10-22 11:39:11 +02:00
strcat(path, url);
2019-12-15 15:40:23 +01:00
//LOG("Path is : %s", path);
2018-02-03 18:50:07 +01:00
//if (path[strlen(path) - 1] == '/')
// strcat(path, "index.html");
if (stat(path, &st) == -1)
{
2018-10-04 19:47:31 +02:00
free(task);
rqp = strdup((char *)dvalue(rq->request, "REQUEST_PATH"));
2018-10-07 23:41:37 +02:00
oldrqp = rqp;
trim(rqp, '/');
newurl = strsep(&rqp, "/");
if (!rqp)
rqp = strdup("/");
else
rqp = strdup(rqp);
2018-10-07 23:41:37 +02:00
dput(rq->request, "RESOURCE_PATH", rqp);
task = execute_plugin(rq, newurl);
free(oldrqp);
return task;
2015-10-22 11:39:11 +02:00
}
else
{
if (S_ISDIR(st.st_mode))
{
2015-10-22 11:39:11 +02:00
strcat(path, "/index.html");
if (stat(path, &st) == -1)
{
2019-12-15 12:10:06 +01:00
chain_t it;
2018-02-20 19:02:31 +01:00
for_each_assoc(it, server_config.handlers)
{
2018-10-04 19:47:31 +02:00
newurl = __s("%s/index.%s", url, it->key);
memset(path, 0, sizeof(path));
2020-08-27 13:31:40 +02:00
htdocs(rq, path);
2018-10-04 19:47:31 +02:00
strcat(path, newurl);
if (stat(path, &st) != 0)
2018-10-04 19:47:31 +02:00
{
free(newurl);
newurl = NULL;
}
else
2018-02-20 19:02:31 +01:00
{
2019-12-22 14:33:42 +01:00
i = server_config.handlers->cap;
2018-02-20 19:02:31 +01:00
break;
}
}
if (!newurl)
2018-02-20 19:02:31 +01:00
{
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 404, "Resource Not Found");
2018-10-04 19:47:31 +02:00
return task;
2018-02-20 19:02:31 +01:00
}
2018-10-06 01:30:38 +02:00
//if(url) free(url); this is freed in the dput function
2018-10-04 19:47:31 +02:00
url = newurl;
dput(rq->request, "RESOURCE_PATH", url);
}
}
2018-10-04 19:47:31 +02:00
dput(rq->request, "ABS_RESOURCE_PATH", strdup(path));
2016-12-07 10:57:14 +01:00
// check if the mime is supported
// if the mime is not supported
2016-12-07 10:57:14 +01:00
// find an handler plugin to process it
// if the plugin is not found, forbidden access to the file should be sent
char *mime_type = mime(path);
2018-10-04 19:47:31 +02:00
dput(rq->request, "RESOURCE_MIME", strdup(mime_type));
if (strcmp(mime_type, "application/octet-stream") == 0)
2016-12-07 10:57:14 +01:00
{
char *ex = ext(path);
2020-01-01 22:10:05 +01:00
char *h = NULL;
if (ex)
2020-01-01 22:10:05 +01:00
{
h = dvalue(server_config.handlers, ex);
free(ex);
2020-01-01 22:10:05 +01:00
}
if (h)
2018-02-20 19:02:31 +01:00
{
2018-10-07 23:41:37 +02:00
//sprintf(path,"/%s%s",h,url);
2019-12-15 15:40:23 +01:00
//LOG("WARNING::::Access octetstream via handle %s", h);
2018-10-04 19:47:31 +02:00
//if(execute_plugin(client,buf,method,rq) < 0)
// cannot_execute(client);
free(task);
2018-10-07 23:41:37 +02:00
return execute_plugin(rq, h);
2018-02-20 19:02:31 +01:00
}
else
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 403, "Access forbidden");
2016-12-07 10:57:14 +01:00
}
else
{
2020-01-02 11:54:09 +01:00
// discard all request data
2020-08-27 13:31:40 +02:00
dictionary_t headers = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER");
if (headers)
2020-01-02 11:54:09 +01:00
{
2020-08-27 13:31:40 +02:00
char *sclen = (char *)dvalue(headers, "Content-Length");
2020-01-02 11:54:09 +01:00
unsigned clen = 0;
unsigned read = 0;
int count;
2020-08-27 13:31:40 +02:00
if (sclen)
2020-01-02 11:54:09 +01:00
{
clen = atoi(sclen);
while (read < clen)
{
2020-08-27 13:31:40 +02:00
count = antd_recv(rq->client, path, sizeof(path) < clen ? sizeof(path) : clen);
if (count <= 0)
2020-01-02 11:54:09 +01:00
break;
read += count;
}
}
}
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE);
2018-10-04 19:47:31 +02:00
task->handle = serve_file;
}
2018-10-04 19:47:31 +02:00
return task;
2018-03-02 19:04:00 +01:00
}
2015-10-22 11:39:11 +02:00
}
void *finish_request(void *data)
2018-10-03 23:42:42 +02:00
{
if (!data)
return NULL;
destroy_request(data);
server_config.connection--;
2019-12-11 23:17:42 +01:00
LOG("Remaining connection %d", server_config.connection);
2018-10-03 23:42:42 +02:00
return NULL;
}
int rule_check(const char *k, const char *v, const char *host, const char *_url, const char *_query, char *buf)
{
// first perfom rule check on host, if not success, perform on url
regmatch_t key_matches[10];
regmatch_t val_matches[2];
char *query = strdup(_query);
char *url = strdup(_url);
int ret;
char *target;
char *tmp, rep[10];
int idx = 0;
memset(rep, 0, 10);
// 1 group
if (!host || !(ret = regex_match(k, host, 10, key_matches)))
{
target = url;
ret = regex_match(k, url, 10, key_matches);
}
else
target = (char *)host;
if (!ret)
2018-03-02 19:04:00 +01:00
{
free(url);
free(query);
return 0;
}
tmp = (char *)v;
char *search = "<([a-zA-Z0-9]+)>";
while ((ret = regex_match(search, tmp, 2, val_matches)))
{
memcpy(buf + idx, tmp, val_matches[1].rm_so - 1);
idx += val_matches[1].rm_so - 1;
memcpy(rep, tmp + val_matches[1].rm_so, val_matches[1].rm_eo - val_matches[1].rm_so);
if (strcasecmp(rep, "url") == 0)
{
memcpy(buf + idx, url, strlen(url));
idx += strlen(url);
}
else if (strcasecmp(rep, "query") == 0)
{
memcpy(buf + idx, query, strlen(query));
idx += strlen(query);
}
else if (match_int(rep))
{
int i = atoi(rep);
memcpy(buf + idx, target + key_matches[i].rm_so, key_matches[i].rm_eo - key_matches[i].rm_so);
idx += key_matches[i].rm_eo - key_matches[i].rm_so;
}
else
{ // just keep it
memcpy(buf + idx, tmp + val_matches[1].rm_so - 1, val_matches[1].rm_eo + 2 - val_matches[1].rm_so);
idx += val_matches[1].rm_eo + 2 - val_matches[1].rm_so;
}
tmp += val_matches[1].rm_eo + 1;
//break;
}
// now modify the match 2 group
if (idx > 0)
2018-02-23 19:54:16 +01:00
{
if (tmp)
2018-02-23 19:54:16 +01:00
{
// copy the remainning of tmp
memcpy(buf + idx, tmp, strlen(tmp));
2018-02-23 19:54:16 +01:00
idx += strlen(tmp);
}
buf[idx] = '\0';
}
free(url);
free(query);
2018-02-23 19:54:16 +01:00
return 1;
}
void *serve_file(void *data)
2015-10-22 11:39:11 +02:00
{
antd_request_t *rq = (antd_request_t *)data;
2019-07-31 15:11:59 +02:00
antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
char *path = (char *)dvalue(rq->request, "ABS_RESOURCE_PATH");
char *mime_type = (char *)dvalue(rq->request, "RESOURCE_MIME");
rq->client->state = ANTD_CLIENT_SERVE_FILE;
2019-12-04 19:18:48 +01:00
struct stat st;
int s = stat(path, &st);
2020-08-27 13:31:40 +02:00
if (s == -1)
2019-12-04 19:18:48 +01:00
{
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 404, "File not found");
2019-12-04 19:18:48 +01:00
}
else
{
// check if it is modified
dictionary_t header = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER");
2020-08-27 13:31:40 +02:00
char *last_modif_since = (char *)dvalue(header, "If-Modified-Since");
time_t t = st.st_ctime;
struct tm tm;
2020-08-27 13:31:40 +02:00
if (last_modif_since)
{
strptime(last_modif_since, "%a, %d %b %Y %H:%M:%S GMT", &tm);
t = timegm(&tm);
//t = mktime(localtime(&t));
}
2019-12-15 12:10:06 +01:00
2020-08-27 13:31:40 +02:00
if (last_modif_since && st.st_ctime == t)
{
// return the not changed
2020-08-27 13:31:40 +02:00
antd_error(rq->client, 304, "");
}
else
{
int size = (int)st.st_size;
char ibuf[64];
2020-08-27 13:31:40 +02:00
snprintf(ibuf, sizeof(ibuf), "%d", size);
antd_response_header_t rhd;
rhd.cookie = NULL;
rhd.status = 200;
rhd.header = dict();
dput(rhd.header, "Content-Type", strdup(mime_type));
#ifdef USE_ZLIB
2020-08-27 13:31:40 +02:00
if (!compressable(mime_type) || rq->client->z_level == ANTD_CNONE)
#endif
2020-08-27 13:31:40 +02:00
dput(rhd.header, "Content-Length", strdup(ibuf));
gmtime_r(&st.st_ctime, &tm);
2020-08-25 16:40:24 +02:00
strftime(ibuf, 64, "%a, %d %b %Y %H:%M:%S GMT", &tm);
dput(rhd.header, "Last-Modified", strdup(ibuf));
dput(rhd.header, "Cache-Control", strdup("no-cache"));
antd_send_header(rq->client, &rhd);
__f(rq->client, path);
}
2019-12-04 19:18:48 +01:00
}
2020-08-27 13:31:40 +02:00
2018-10-04 19:47:31 +02:00
return task;
2015-10-22 11:39:11 +02:00
}
int startup(unsigned *port)
{
int httpd = 0;
struct sockaddr_in name;
httpd = socket(PF_INET, SOCK_STREAM, 0);
if (httpd == -1)
2019-12-20 16:49:41 +01:00
{
ERROR("Port %d - socket: %s", *port, strerror(errno));
return -1;
}
2021-01-03 11:24:55 +01:00
2020-12-28 13:49:44 +01:00
if (setsockopt(httpd, SOL_SOCKET, SO_REUSEADDR, &(int){1}, sizeof(int)) == -1)
2020-12-28 12:26:08 +01:00
{
ERROR("Unable to set reuse address on port %d - setsockopt: %s", *port, strerror(errno));
}
2015-10-22 11:39:11 +02:00
memset(&name, 0, sizeof(name));
name.sin_family = AF_INET;
name.sin_port = htons(*port);
name.sin_addr.s_addr = htonl(INADDR_ANY);
if (bind(httpd, (struct sockaddr *)&name, sizeof(name)) < 0)
2019-12-20 16:49:41 +01:00
{
ERROR("Port %d -bind: %s", *port, strerror(errno));
return -1;
}
if (*port == 0) /* if dynamically allocating a port */
2015-10-22 11:39:11 +02:00
{
socklen_t namelen = sizeof(name);
if (getsockname(httpd, (struct sockaddr *)&name, &namelen) == -1)
2019-12-20 16:49:41 +01:00
{
ERROR("Port %d - getsockname: %s", *port, strerror(errno));
return -1;
}
2015-10-22 11:39:11 +02:00
*port = ntohs(name.sin_port);
}
2020-12-28 12:26:08 +01:00
2019-12-20 16:49:41 +01:00
LOG("back log is %d", server_config.backlog);
2018-02-05 23:04:02 +01:00
if (listen(httpd, server_config.backlog) < 0)
2019-12-20 16:49:41 +01:00
{
ERROR("Port %d - listen: %s", *port, strerror(errno));
return -1;
}
return (httpd);
2015-10-22 11:39:11 +02:00
}
2019-12-22 17:33:35 +01:00
char *apply_rules(dictionary_t rules, const char *host, char *url)
{
// rule check
char *query_string = url;
while ((*query_string != '?') && (*query_string != '\0'))
query_string++;
if (*query_string == '?')
{
*query_string = '\0';
query_string++;
}
//char* oldurl = strdup(url);
2019-12-22 17:33:35 +01:00
chain_t it;
2020-08-27 13:31:40 +02:00
char *k;
char *v;
2019-12-22 17:33:35 +01:00
for_each_assoc(it, rules)
{
2019-12-22 17:33:35 +01:00
k = it->key;
2020-08-27 13:31:40 +02:00
v = (char *)it->value;
// 1 group
if (rule_check(k, v, host, url, query_string, url))
{
2018-02-23 19:54:16 +01:00
query_string = url;
2018-02-23 19:54:16 +01:00
while ((*query_string != '?') && (*query_string != '\0'))
query_string++;
if (*query_string == '?')
{
*query_string = '\0';
query_string++;
}
}
}
return strdup(query_string);
}
static void *proxy_monitor(void *data)
{
antd_request_t *rq = (antd_request_t *)data;
rq->client->state = ANTD_CLIENT_PROXY_MONITOR;
antd_client_t *proxy = (antd_client_t *)dvalue(rq->request, "PROXY_HANDLE");
antd_task_t *task = antd_create_task(NULL, data, NULL, rq->client->last_io);
2021-03-25 21:38:09 +01:00
int pret, ret, sz1 = 0, sz2 = 0;
char *buf = NULL;
buf = (char *)malloc(BUFFLEN);
struct pollfd pfd[1];
memset(pfd, 0, sizeof(pfd));
pfd[0].fd = proxy->sock;
pfd[0].events = POLLIN;
ret = 1;
do
{
sz1 = antd_recv_upto(rq->client, buf, BUFFLEN);
if ((sz1 < 0) || (sz1 > 0 && antd_send(proxy, buf, sz1) != sz1))
{
ret = 0;
break;
}
2021-03-25 21:38:09 +01:00
pret = poll(pfd, 1, 0);
if ( pret < 0)
{
(void)close(proxy->sock);
return task;
}
sz2 = 0;
if(pret > 0 && (pfd[0].revents & POLLIN))
{
sz2 = antd_recv_upto(proxy, buf, BUFFLEN);
if (sz2 <= 0 || (sz2 > 0 && antd_send(rq->client, buf, sz2) != sz2))
{
ret = 0;
break;
}
}
if ( (pret > 0) && (
pfd[0].revents & POLLERR ||
pfd[0].revents & POLLRDHUP ||
pfd[0].revents & POLLHUP ||
pfd[0].revents & POLLNVAL))
{
ret = 0;
break;
}
} while (sz1 > 0 || sz2 > 0);
free(buf);
if (ret == 0)
{
(void)close(proxy->sock);
return task;
}
2021-03-25 21:38:09 +01:00
if(pfd[0].revents & POLLIN)
{
antd_task_bind_event(task, proxy->sock, 0, TASK_EVT_ON_READABLE);
}
else
{
2021-03-28 19:24:16 +02:00
antd_task_bind_event(task, proxy->sock, 50u, TASK_EVT_ON_TIMEOUT);
}
task->handle = proxy_monitor;
task->access_time = rq->client->last_io;
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE);
return task;
}
static void *proxify(void *data)
{
int sock_fd, size, ret;
char *str = NULL;
chain_t it;
antd_request_t *rq = (antd_request_t *)data;
antd_client_t *proxy = NULL;
rq->client->state = ANTD_CLIENT_RESOLVE_REQUEST;
char *host = dvalue(rq->request, "PROXY_HOST");
int port = atoi(dvalue(rq->request, "PROXY_PORT"));
char *path = dvalue(rq->request, "PROXY_PATH");
char *query = dvalue(rq->request, "PROXY_QUERY");
char* ptr, *ip;
dictionary_t xheader = dvalue(rq->request, "REQUEST_HEADER");
antd_task_t *task = antd_create_task(NULL, data, NULL, rq->client->last_io);
if (!xheader)
{
antd_error(rq->client, 400, "Badd Request");
return task;
}
pthread_mutex_lock(&server_mux);
ip = NULL;
// ip_from_host is not threadsafe, need to lock it
ptr = ip_from_hostname(host);
if(ptr)
{
ip = strdup(ptr);
}
pthread_mutex_unlock(&server_mux);
if(!ip)
{
antd_error(rq->client, 502, "Badd address");
return task;
}
sock_fd = request_socket(ip, port);
free(ip);
if (sock_fd == -1)
{
antd_error(rq->client, 503, "Service Unavailable");
return task;
}
set_nonblock(sock_fd);
/*struct timeval timeout;
timeout.tv_sec = 2;
timeout.tv_usec = 0; //POLL_EVENT_TO*1000;
if (setsockopt(sock_fd, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout, sizeof(timeout)) < 0)
{
ERROR("setsockopt failed:%s", strerror(errno));
antd_error(rq->client, 500, "Internal proxy error");
(void)close(sock_fd);
return task;
}
if (setsockopt(sock_fd, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout, sizeof(timeout)) < 0)
{
ERROR("setsockopt failed:%s", strerror(errno));
antd_error(rq->client, 500, "Internal proxy error");
(void)close(sock_fd);
return task;
}*/
proxy = (antd_client_t *)malloc(sizeof(antd_client_t));
proxy->sock = sock_fd;
proxy->ssl = NULL;
proxy->zstream = NULL;
proxy->z_level = ANTD_CNONE;
time(&proxy->last_io);
// store content length here
dput(rq->request, "PROXY_HANDLE", proxy);
str = __s("%s %s?%s HTTP/1.1\r\n", (char *)dvalue(rq->request, "METHOD"), path, query);
size = strlen(str);
ret = antd_send(proxy, str, size);
free(str);
if (ret != size)
{
antd_error(rq->client, 500, "");
(void)close(sock_fd);
return task;
}
for_each_assoc(it, xheader)
{
str = __s("%s: %s\r\n", it->key, (char *)it->value);
size = strlen(str);
ret = antd_send(proxy, str, size);
free(str);
if (ret != size)
{
antd_error(rq->client, 500, "");
(void)close(sock_fd);
return task;
}
}
(void)antd_send(proxy, "\r\n", 2);
// now monitor the proxy
task->handle = proxy_monitor;
task->access_time = rq->client->last_io;
// register event
antd_task_bind_event(task, proxy->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE);
return task;
}
/**
* Check if the current request is e reverse proxy
* return a proxy task if this is the case
*/
static void *check_proxy(antd_request_t *rq, const char *path, const char *query)
{
char *pattern = "^(https?)://([^:]+):([0-9]+)(.*)$";
antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
char buff[256];
regmatch_t matches[5];
int ret, size;
ret = regex_match(pattern, path, 5, matches);
if (!ret)
{
return NULL;
}
if (matches[1].rm_eo - matches[1].rm_so == 5)
{
// https is not supported for now
// TODO add https support
antd_error(rq->client, 503, "Service Unavailable");
return task;
}
// http proxy request
size = matches[2].rm_eo - matches[2].rm_so < (int)sizeof(buff) ? matches[2].rm_eo - matches[2].rm_so : (int)sizeof(buff);
(void)memcpy(buff, path + matches[2].rm_so, size);
buff[size] = '\0';
dput(rq->request, "PROXY_HOST", strdup(buff));
size = matches[3].rm_eo - matches[3].rm_so < (int)sizeof(buff) ? matches[3].rm_eo - matches[3].rm_so : (int)sizeof(buff);
(void)memcpy(buff, path + matches[3].rm_so, size);
buff[size] = '\0';
dput(rq->request, "PROXY_PORT", strdup(buff));
dput(rq->request, "PROXY_PATH", strdup(path + matches[4].rm_so));
dput(rq->request, "PROXY_QUERY", strdup(query));
task->handle = proxify;
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE);
return task;
}
2017-07-29 22:00:34 +02:00
/**
* Decode the HTTP request header
2017-07-29 22:00:34 +02:00
*/
2018-10-04 19:47:31 +02:00
void *decode_request_header(void *data)
2017-07-29 22:00:34 +02:00
{
antd_request_t *rq = (antd_request_t *)data;
rq->client->state = ANTD_CLIENT_HEADER_DECODE;
2019-12-15 12:10:06 +01:00
dictionary_t cookie = NULL;
char *line;
char *token;
char *query = NULL;
char *host = NULL;
char buf[2 * BUFFLEN];
2020-08-27 13:31:40 +02:00
int header_size = 0;
int ret;
char *url = (char *)dvalue(rq->request, "REQUEST_QUERY");
2020-01-08 19:17:51 +01:00
dictionary_t xheader = dvalue(rq->request, "REQUEST_HEADER");
dictionary_t request = dvalue(rq->request, "REQUEST_DATA");
2021-01-22 01:12:26 +01:00
char *port_s = (char *)dvalue(rq->request, "SERVER_PORT");
2020-08-27 13:31:40 +02:00
port_config_t *pcnf = (port_config_t *)dvalue(server_config.ports, port_s);
2021-01-22 01:12:26 +01:00
antd_task_t *task;
// first real all header
// this for check if web socket is enabled
2020-08-27 13:31:40 +02:00
while (((ret = read_buf(rq->client, buf, sizeof(buf))) > 0) && strcmp("\r\n", buf))
{
2020-08-27 13:31:40 +02:00
header_size += ret;
2018-02-09 09:21:10 +01:00
line = buf;
trim(line, '\n');
trim(line, '\r');
token = strsep(&line, ":");
trim(token, ' ');
trim(line, ' ');
if (token && line && strlen(line) > 0)
2020-01-09 12:18:59 +01:00
{
verify_header(token);
dput(xheader, token, strdup(line));
2020-01-09 12:18:59 +01:00
}
if (token != NULL && strcasecmp(token, "Cookie") == 0)
{
2020-08-27 13:31:40 +02:00
if (!cookie)
2020-01-08 19:17:51 +01:00
{
cookie = dict();
}
decode_cookie(line, cookie);
}
else if (token != NULL && strcasecmp(token, "Host") == 0)
{
2018-02-09 09:21:10 +01:00
host = strdup(line);
}
if (header_size > HEADER_MAX_SIZE)
2020-08-27 13:31:40 +02:00
{
antd_error(rq->client, 413, "Payload Too Large");
2020-08-27 13:42:58 +02:00
ERROR("Header size too large (%d): %d vs %d", rq->client->sock, header_size, HEADER_MAX_SIZE);
2021-01-03 21:31:35 +01:00
task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
return task;
2020-08-27 13:31:40 +02:00
}
}
if (ret == 0)
{
//antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE);
task = antd_create_task(decode_request_header, (void *)rq, NULL, rq->client->last_io);
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE);
return task;
}
2019-12-22 14:33:42 +01:00
// check for content length size
line = (char *)dvalue(xheader, "Content-Length");
if (line)
{
int clen = atoi(line);
2020-08-27 13:31:40 +02:00
if (clen > server_config.max_upload_size)
2019-12-22 14:33:42 +01:00
{
antd_error(rq->client, 413, "Request body data is too large");
// dirty fix, wait for message to be sent
// 100 ms sleep
usleep(100000);
2021-01-03 21:31:35 +01:00
task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
return task;
2019-12-22 14:33:42 +01:00
}
}
2020-01-08 19:17:51 +01:00
#ifdef USE_ZLIB
// check for gzip
line = (char *)dvalue(xheader, "Accept-Encoding");
2020-08-27 13:31:40 +02:00
if (line)
2020-01-08 19:17:51 +01:00
{
2020-08-27 13:31:40 +02:00
if (regex_match("gzip", line, 0, NULL))
2020-01-08 19:17:51 +01:00
{
rq->client->z_level = ANTD_CGZ;
}
2020-08-27 13:31:40 +02:00
else if (regex_match("deflate", line, 0, NULL))
2020-01-08 19:17:51 +01:00
{
rq->client->z_level = ANTD_CDEFL;
}
else
{
rq->client->z_level = ANTD_CNONE;
}
}
else
{
rq->client->z_level = ANTD_CNONE;
}
#endif
2018-02-09 09:21:10 +01:00
//if(line) free(line);
2018-10-04 19:47:31 +02:00
memset(buf, 0, sizeof(buf));
2021-01-03 11:24:55 +01:00
strncat(buf, url, sizeof(buf) - 1);
2020-08-27 12:46:05 +02:00
LOG("Original query (%d): %s", rq->client->sock, url);
2020-01-08 19:17:51 +01:00
query = apply_rules(pcnf->rules, host, buf);
2019-12-20 16:49:41 +01:00
LOG("Processed query: %s", query);
2021-01-22 01:12:26 +01:00
if (cookie)
dput(rq->request, "COOKIE", cookie);
if (host)
free(host);
// check if this is a reverse proxy ?
task = check_proxy(rq, buf, query);
if (task)
{
if (query)
free(query);
return task;
}
2018-10-08 22:01:05 +02:00
dput(rq->request, "RESOURCE_PATH", url_decode(buf));
if (query)
2018-09-05 23:26:21 +02:00
{
decode_url_request(query, request);
free(query);
}
2018-10-04 19:47:31 +02:00
// header ok, now checkmethod
2021-01-03 21:31:35 +01:00
task = antd_create_task(decode_request, (void *)rq, NULL, rq->client->last_io);
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); //
2018-10-04 19:47:31 +02:00
return task;
}
void *decode_request(void *data)
2018-10-04 19:47:31 +02:00
{
antd_request_t *rq = (antd_request_t *)data;
2019-12-15 12:10:06 +01:00
dictionary_t headers = dvalue(rq->request, "REQUEST_HEADER");
2018-10-04 19:47:31 +02:00
int ws = 0;
char *ws_key = NULL;
char *method = NULL;
char *tmp;
antd_task_t *task = NULL;
ws_key = (char *)dvalue(headers, "Sec-WebSocket-Key");
tmp = (char *)dvalue(headers, "Upgrade");
if (tmp && strcasecmp(tmp, "websocket") == 0)
ws = 1;
method = (char *)dvalue(rq->request, "METHOD");
2019-07-31 15:11:59 +02:00
task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
//antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE);
if (EQU(method, "GET"))
2018-03-02 19:04:00 +01:00
{
//if(ctype) free(ctype);
if (ws && ws_key != NULL)
2017-07-29 22:00:34 +02:00
{
2018-10-04 19:47:31 +02:00
ws_confirm_request(rq->client, ws_key);
2017-07-29 22:00:34 +02:00
// insert wsocket flag to request
// plugin should handle this ugraded connection
// not the server
dput(rq->request, "__web_socket__", strdup("1"));
2017-07-29 22:00:34 +02:00
}
2018-10-04 19:47:31 +02:00
// resolve task
task->handle = resolve_request;
return task;
}
else if (EQU(method, "HEAD") || EQU(method, "OPTIONS") || EQU(method, "DELETE"))
{
task->handle = resolve_request;
return task;
}
else if (EQU(method, "POST") || EQU(method, "PUT") || EQU(method, "PATCH"))
2018-10-04 19:47:31 +02:00
{
task->handle = resolve_request;
2018-10-04 19:47:31 +02:00
return task;
2017-07-29 22:00:34 +02:00
}
else
{
2020-08-27 13:31:40 +02:00
antd_error(rq->client, 501, "Request Method Not Implemented");
2018-10-04 19:47:31 +02:00
return task;
2017-07-29 22:00:34 +02:00
}
}
2018-10-04 19:47:31 +02:00
void *decode_post_request(void *data)
2017-07-29 22:00:34 +02:00
{
antd_request_t *rq = (antd_request_t *)data;
rq->client->state = ANTD_CLIENT_RQ_DATA_DECODE;
2019-12-15 12:10:06 +01:00
dictionary_t request = dvalue(rq->request, "REQUEST_DATA");
dictionary_t headers = dvalue(rq->request, "REQUEST_HEADER");
char *ctype = NULL;
2018-10-04 19:47:31 +02:00
int clen = -1;
char *tmp;
antd_task_t *task = NULL;
ctype = (char *)dvalue(headers, "Content-Type");
tmp = (char *)dvalue(headers, "Content-Length");
if (tmp)
2018-10-04 19:47:31 +02:00
clen = atoi(tmp);
char *method = (char *)dvalue(rq->request, "METHOD");
2019-07-31 15:11:59 +02:00
task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
//antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE);
if (!method || (!EQU(method, "POST") && !EQU(method, "PUT") && !EQU(method, "PATCH")))
return task;
if (ctype == NULL || clen == -1)
2018-10-04 19:47:31 +02:00
{
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 400, "Bad Request, missing content description");
2018-10-04 19:47:31 +02:00
return task;
}
// decide what to do with the data
if (strstr(ctype, FORM_URL_ENCODE))
2018-10-04 19:47:31 +02:00
{
char *pquery = post_data_decode(rq->client, clen);
if (pquery)
2021-01-22 13:12:23 +01:00
{
decode_url_request(pquery, request);
free(pquery);
}
else if (clen > 0)
2021-01-22 13:12:23 +01:00
{
// WARN: this may not work on ssl socket
// antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE);
// task->handle = decode_post_request;
antd_error(rq->client, 400, "Bad Request, missing content data");
return task;
2021-01-22 13:12:23 +01:00
}
}
else if (strstr(ctype, FORM_MULTI_PART))
2018-10-04 19:47:31 +02:00
{
free(task);
return decode_multi_part_request(rq, ctype);
2020-08-27 13:31:40 +02:00
}
2018-10-04 19:47:31 +02:00
else
{
char *pquery = post_data_decode(rq->client, clen);
char *key = strstr(ctype, "/");
if (key)
2018-10-04 19:47:31 +02:00
key++;
else
key = ctype;
2020-08-27 13:31:40 +02:00
if (pquery)
2019-12-15 12:10:06 +01:00
{
dput(request, key, strdup(pquery));
free(pquery);
}
else if (clen > 0)
2021-01-22 13:12:23 +01:00
{
//task->handle = decode_post_request;
//antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE);
antd_error(rq->client, 400, "Bad Request, missing content data");
return task;
2021-01-22 13:12:23 +01:00
}
2018-10-04 19:47:31 +02:00
}
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE);
2018-10-04 19:47:31 +02:00
return task;
2017-07-29 22:00:34 +02:00
}
2018-10-04 19:47:31 +02:00
2017-07-29 22:00:34 +02:00
/**
* Send header to the client to confirm
* that the websocket is accepted by
* our server
*/
void ws_confirm_request(void *client, const char *key)
2017-07-29 22:00:34 +02:00
{
char buf[256];
char rkey[128];
char sha_d[20];
char base64[64];
2021-01-22 01:12:26 +01:00
strncpy(rkey, key, sizeof(rkey) - 1);
2021-01-03 11:24:55 +01:00
int n = (int)sizeof(rkey) - (int)strlen(key);
if (n < 0)
n = 0;
strncat(rkey, WS_MAGIC_STRING, n);
2018-02-10 11:22:41 +01:00
#ifdef USE_OPENSSL
SHA_CTX context;
#else
2017-07-29 22:00:34 +02:00
SHA1_CTX context;
2018-02-10 11:22:41 +01:00
#endif
SHA1_Init(&context);
SHA1_Update(&context, rkey, strlen(rkey));
SHA1_Final((uint8_t *)sha_d, &context);
2017-07-29 22:00:34 +02:00
Base64encode(base64, sha_d, 20);
// send accept to client
sprintf(buf, "HTTP/1.1 101 Switching Protocols\r\n");
2018-02-10 13:44:25 +01:00
antd_send(client, buf, strlen(buf));
2017-07-29 22:00:34 +02:00
sprintf(buf, "Upgrade: websocket\r\n");
2018-02-10 13:44:25 +01:00
antd_send(client, buf, strlen(buf));
2017-07-29 22:00:34 +02:00
sprintf(buf, "Connection: Upgrade\r\n");
2018-02-10 13:44:25 +01:00
antd_send(client, buf, strlen(buf));
sprintf(buf, "Sec-WebSocket-Accept: %s\r\n", base64);
2018-02-10 13:44:25 +01:00
antd_send(client, buf, strlen(buf));
2017-07-29 22:00:34 +02:00
sprintf(buf, "\r\n");
2018-02-10 13:44:25 +01:00
antd_send(client, buf, strlen(buf));
2019-12-11 23:17:42 +01:00
LOG("%s", "Websocket is now enabled for plugin");
2017-07-29 22:00:34 +02:00
}
/**
* Decode the cookie header to a dictionary
* @param client The client socket
* @return The Dictionary socket or NULL
*/
2020-01-08 19:17:51 +01:00
void decode_cookie(const char *line, dictionary_t dic)
2017-07-29 22:00:34 +02:00
{
char *token, *token1;
2017-07-29 22:00:34 +02:00
char *cpstr = strdup(line);
2018-03-02 19:04:00 +01:00
char *orgcpy = cpstr;
trim(cpstr, ' ');
trim(cpstr, '\n');
trim(cpstr, '\r');
while ((token = strsep(&cpstr, ";")))
2017-07-29 22:00:34 +02:00
{
trim(token, ' ');
token1 = strsep(&token, "=");
if (token1 && token && strlen(token) > 0)
2017-07-29 22:00:34 +02:00
{
dput(dic, token1, strdup(token));
2017-07-29 22:00:34 +02:00
}
}
2018-03-02 19:04:00 +01:00
free(orgcpy);
2017-07-29 22:00:34 +02:00
}
/**
* Decode the multi-part form data from the POST request
* If it is a file upload, copy the file to tmp dir
*/
void *decode_multi_part_request(void *data, const char *ctype)
2017-07-29 22:00:34 +02:00
{
char *boundary;
2019-12-22 14:33:42 +01:00
char line[BUFFLEN];
2020-08-27 13:31:40 +02:00
char *str_copy = (char *)ctype;
2019-12-22 14:33:42 +01:00
int len;
antd_request_t *rq = (antd_request_t *)data;
2019-07-31 15:11:59 +02:00
antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
//antd_task_bind_event(task, rq->client->sock, 0, );
2021-01-22 01:12:26 +01:00
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE);
2018-09-05 23:26:21 +02:00
//dictionary dic = NULL;
boundary = strsep(&str_copy, "="); //discard first part
boundary = str_copy;
if (boundary && strlen(boundary) > 0)
2017-07-29 22:00:34 +02:00
{
2018-09-05 23:26:21 +02:00
//dic = dict();
trim(boundary, ' ');
dput(rq->request, "MULTI_PART_BOUNDARY", strdup(boundary));
2017-07-29 22:00:34 +02:00
//find first boundary
2020-08-27 13:31:40 +02:00
while (((len = read_buf(rq->client, line, sizeof(line))) > 0) && !strstr(line, boundary))
;
2019-12-22 14:33:42 +01:00
if (len > 0)
{
task->handle = decode_multi_part_request_data;
}
}
return task;
}
void *decode_multi_part_request_data(void *data)
{
// loop through each part separated by the boundary
char *line;
char *part_name = NULL;
char *part_file = NULL;
char *file_path;
char buf[BUFFLEN];
char *field;
2019-12-22 14:33:42 +01:00
int len;
//dictionary dic = NULL;
FILE *fp = NULL;
char *token, *keytoken, *valtoken;
antd_request_t *rq = (antd_request_t *)data;
2019-07-31 15:11:59 +02:00
antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
2021-01-22 01:12:26 +01:00
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE);
char *boundary = (char *)dvalue(rq->request, "MULTI_PART_BOUNDARY");
2019-12-15 12:10:06 +01:00
dictionary_t dic = (dictionary_t)dvalue(rq->request, "REQUEST_DATA");
// search for content disposition:
2020-08-27 13:31:40 +02:00
while (((len = read_buf(rq->client, buf, sizeof(buf))) > 0) && !strstr(buf, "Content-Disposition:"))
;
;
2019-12-22 14:33:42 +01:00
if (len <= 0 || !strstr(buf, "Content-Disposition:"))
{
return task;
}
2019-12-22 14:33:42 +01:00
char *boundend = __s("%s--", boundary);
line = buf;
// extract parameters from header
while ((token = strsep(&line, ";")))
{
keytoken = strsep(&token, "=");
if (keytoken && strlen(keytoken) > 0)
{
trim(keytoken, ' ');
valtoken = strsep(&token, "=");
if (valtoken)
2018-09-05 23:26:21 +02:00
{
trim(valtoken, ' ');
trim(valtoken, '\n');
trim(valtoken, '\r');
trim(valtoken, '\"');
if (strcmp(keytoken, "name") == 0)
{
part_name = strdup(valtoken);
}
else if (strcmp(keytoken, "filename") == 0)
{
part_file = strdup(valtoken);
}
2018-09-05 23:26:21 +02:00
}
}
}
line = NULL;
// get the binary data
if (part_name != NULL)
{
// go to the beginning of data bock
2020-08-27 13:31:40 +02:00
while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && strcmp(buf, "\r\n") != 0)
;
;
2019-12-22 14:33:42 +01:00
if (part_file == NULL)
{
/**
2019-12-22 14:33:42 +01:00
* WARNING:
* This allow only 1024 bytes of data (max),
* out of this range, the data is cut out.
* Need an efficient way to handle this
*/
2019-12-22 14:33:42 +01:00
len = read_buf(rq->client, buf, sizeof(buf));
2020-08-27 13:31:40 +02:00
if (len > 0)
2019-12-22 14:33:42 +01:00
{
line = buf;
trim(line, '\n');
trim(line, '\r');
trim(line, ' ');
dput(dic, part_name, strdup(line));
}
// find the next boundary
2020-08-27 13:31:40 +02:00
while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && !strstr(buf, boundary))
2018-03-02 19:04:00 +01:00
{
2019-12-22 14:33:42 +01:00
line = buf;
2018-03-02 19:04:00 +01:00
}
}
else
{
file_path = __s("%s%s.%u", server_config.tmpdir, part_file, (unsigned)time(NULL));
fp = fopen(file_path, "wb");
if (fp)
2017-07-29 22:00:34 +02:00
{
int totalsize = 0, len = 0;
//read until the next boundary
2018-10-07 01:03:05 +02:00
// TODO: this is not efficient for big file
// need a solution
while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && !strstr(buf, boundary))
2018-09-05 23:26:21 +02:00
{
fwrite(buf, len, 1, fp);
totalsize += len;
2018-03-02 19:04:00 +01:00
}
//remove \r\n at the end
fseek(fp, 0, SEEK_SET);
//fseek(fp,-2, SEEK_CUR);
totalsize -= 2;
2019-12-11 23:17:42 +01:00
int stat = ftruncate(fileno(fp), totalsize);
UNUSED(stat);
fclose(fp);
2019-12-22 14:33:42 +01:00
line = buf;
2017-07-29 22:00:34 +02:00
field = __s("%s.file", part_name);
dput(dic, field, strdup(part_file));
free(field);
field = __s("%s.tmp", part_name);
dput(dic, field, strdup(file_path));
free(field);
field = __s("%s.size", part_name);
dput(dic, field, __s("%d", totalsize));
free(field);
field = __s("%s.ext", part_name);
dput(dic, field, ext(part_file));
free(field);
2017-07-29 22:00:34 +02:00
}
else
2017-07-29 22:00:34 +02:00
{
2019-12-11 23:17:42 +01:00
ERROR("Cannot write file to :%s", file_path);
2017-07-29 22:00:34 +02:00
}
free(file_path);
free(part_file);
2018-03-02 19:04:00 +01:00
}
free(part_name);
}
/**
* The upload procedure may take time, the task access time should be updated
* after the procedure finish
*/
task->access_time = rq->client->last_io;
// check if end of request
if (line && strstr(line, boundend))
{
2019-12-15 15:40:23 +01:00
//LOG("End request %s", boundend);
2018-03-02 19:04:00 +01:00
free(boundend);
//antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE);
return task;
2017-07-29 22:00:34 +02:00
}
free(boundend);
if (line && strstr(line, boundary))
{
// continue upload
//antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE);
task->handle = decode_multi_part_request_data;
return task;
}
//antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE);
return task;
2017-07-29 22:00:34 +02:00
}
/**
* Decode a query string (GET request or POST URL encoded) to
* a dictionary of key-value
* @param query : the query string
* @return a dictionary of key-value
*/
2019-12-15 12:10:06 +01:00
void decode_url_request(const char *query, dictionary_t dic)
2017-07-29 22:00:34 +02:00
{
if (query == NULL)
return;
2017-07-29 22:00:34 +02:00
//str_copy = ;
char *token;
if (strlen(query) == 0)
return;
char *str_copy = strdup(query);
char *org_copy = str_copy;
2018-09-05 23:26:21 +02:00
//dictionary dic = dict();
2017-07-29 22:00:34 +02:00
while ((token = strsep(&str_copy, "&")))
{
char *key;
char *val = NULL;
if (strlen(token) > 0)
2017-07-29 22:00:34 +02:00
{
key = strsep(&token, "=");
if (key && strlen(key) > 0)
2017-07-29 22:00:34 +02:00
{
val = strsep(&token, "=");
if (!val)
2018-03-17 15:49:37 +01:00
val = "";
dput(dic, key, url_decode(val));
2017-07-29 22:00:34 +02:00
}
}
}
2018-03-02 19:04:00 +01:00
free(org_copy);
2018-09-05 23:26:21 +02:00
//return dic;
2017-07-29 22:00:34 +02:00
}
/**
2018-02-19 17:44:45 +01:00
* Decode post query string to string
2017-07-29 22:00:34 +02:00
*/
char *post_data_decode(void *client, int len)
2017-07-29 22:00:34 +02:00
{
char *query = (char *)malloc((len + 1) * sizeof(char));
char *ptr = query;
int readlen = len > BUFFLEN ? BUFFLEN : len;
2018-10-07 13:57:52 +02:00
int read = 0, stat = 1;
while (readlen > 0 && stat >= 0)
2018-10-07 01:03:05 +02:00
{
2021-01-22 13:12:23 +01:00
stat = antd_recv_upto(client, ptr + read, readlen);
if (stat > 0)
2018-10-07 13:57:52 +02:00
{
read += stat;
readlen = (len - read) > BUFFLEN ? BUFFLEN : (len - read);
2018-10-07 13:57:52 +02:00
}
if (stat == 0)
{
if (difftime(time(NULL), ((antd_client_t*)client)->last_io) > MAX_IO_WAIT_TIME)
{
stat = -1;
}
else
{
usleep(POLL_EVENT_TO*1000);
}
}
2018-10-07 13:57:52 +02:00
}
if (read > 0)
query[read] = '\0';
2018-10-07 13:57:52 +02:00
else
{
free(query);
query = NULL;
2018-10-07 01:03:05 +02:00
}
return query;
2017-07-29 22:00:34 +02:00
}
/**
* Execute a plugin based on the http requeset
* First decode the http request header to find the correct plugin
* and the correct function on the plugin
* Second, decode all parameters necessary of the request and pass it
* to the callback function.
* Execute the callback function if sucess
* @param client soket client
* @param path request path
* @param method request method
* @param query_string GET query string
* @return -1 if failure
* 1 if sucess
*/
void *execute_plugin(void *data, const char *pname)
2017-07-29 22:00:34 +02:00
{
void *(*fn)(void *);
plugin_header_t *(*metafn)();
plugin_header_t *meta = NULL;
struct plugin_entry *plugin;
2017-07-29 22:00:34 +02:00
char *error;
antd_request_t *rq = (antd_request_t *)data;
2019-07-31 15:11:59 +02:00
antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io);
2021-01-22 01:12:26 +01:00
antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE);
2019-12-15 15:40:23 +01:00
//LOG("Plugin name '%s'", pname);
rq->client->state = ANTD_CLIENT_PLUGIN_EXEC;
2017-07-29 22:00:34 +02:00
//load the plugin
if ((plugin = plugin_lookup((char *)pname)) == NULL)
{
pthread_mutex_lock(&server_mux);
plugin = plugin_load((char *)pname);
pthread_mutex_unlock(&server_mux);
if (plugin == NULL)
2018-03-14 10:51:46 +01:00
{
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 503, "Requested service not found");
return task;
2018-03-14 10:51:46 +01:00
}
}
// check if the plugin want rawbody or decoded body
metafn = (plugin_header_t * (*)()) dlsym(plugin->handle, "meta");
if ((error = dlerror()) == NULL)
{
meta = metafn();
}
2017-07-29 22:00:34 +02:00
// load the function
fn = (void *(*)(void *))dlsym(plugin->handle, PLUGIN_HANDLER);
if ((error = dlerror()) != NULL)
2017-07-29 22:00:34 +02:00
{
2019-12-11 23:17:42 +01:00
ERROR("Problem when finding %s method from %s : %s", PLUGIN_HANDLER, pname, error);
2019-12-15 12:10:06 +01:00
antd_error(rq->client, 503, "Requested service not found");
2018-10-04 19:47:31 +02:00
return task;
}
// check if we need the raw data or not
if (meta && meta->raw_body == 1)
{
task->handle = fn;
}
else
{
free(task);
2019-07-31 15:11:59 +02:00
task = antd_create_task(decode_post_request, (void *)rq, fn, rq->client->last_io);
}
return task;
2017-07-29 22:00:34 +02:00
}
2018-02-10 11:22:41 +01:00
2019-12-15 12:10:06 +01:00
dictionary_t mimes_list()
{
return server_config.mimes;
2020-01-08 19:17:51 +01:00
}
2020-08-27 13:31:40 +02:00
void dbdir(char *dest)
2020-01-08 19:17:51 +01:00
{
2020-08-27 13:31:40 +02:00
strncpy(dest, server_config.db_path, 512);
2020-01-08 19:17:51 +01:00
}
2020-08-27 13:31:40 +02:00
void tmpdir(char *dest)
2020-01-08 19:17:51 +01:00
{
2020-08-19 11:08:30 +02:00
strncpy(dest, server_config.tmpdir, 512);
2020-01-08 19:17:51 +01:00
}
2020-08-27 13:31:40 +02:00
void plugindir(char *dest)
2020-01-08 19:17:51 +01:00
{
2020-08-19 11:08:30 +02:00
strncpy(dest, server_config.plugins_dir, 512);
2020-01-08 19:17:51 +01:00
}
#ifdef USE_ZLIB
2020-08-27 13:31:40 +02:00
int compressable(char *ctype)
2020-01-08 19:17:51 +01:00
{
2020-08-27 13:31:40 +02:00
if (!server_config.gzip_enable || server_config.gzip_types == NULL)
2020-01-08 22:04:10 +01:00
return 0;
2020-01-08 19:17:51 +01:00
item_t it;
list_for_each(it, server_config.gzip_types)
{
2020-08-27 13:31:40 +02:00
if (it->type == LIST_TYPE_POINTER && it->value.ptr && regex_match((const char *)it->value.ptr, ctype, 0, NULL))
2020-01-08 19:17:51 +01:00
{
return 1;
}
}
return 0;
}
#endif