ant-http/httpd.c

431 lines
11 KiB
C
Raw Normal View History

2020-08-25 16:40:24 +02:00
#include <pthread.h>
#include <signal.h>
#ifdef USE_OPENSSL
#include <openssl/ssl.h>
#include <openssl/err.h>
#endif
#include <unistd.h>
2020-08-25 16:40:24 +02:00
#include <netinet/in.h>
#include <arpa/inet.h>
#include <sys/socket.h>
2021-01-01 13:48:00 +01:00
#include <sys/select.h>
#include <errno.h>
2021-01-01 13:48:00 +01:00
#include <time.h>
2015-10-22 11:39:11 +02:00
#include "http_server.h"
2019-11-13 11:48:54 +01:00
#include "lib/ini.h"
2020-08-25 16:40:24 +02:00
#include "lib/scheduler.h"
#include "plugin_manager.h"
#include "lib/utils.h"
#define SEND_STAT(fd, buff, ret, ...) \
snprintf(buff, BUFFLEN, ##__VA_ARGS__); \
ret = write(fd, buff, strlen(buff));
2019-11-08 15:54:41 +01:00
2021-01-03 11:24:55 +01:00
static antd_scheduler_t* scheduler;
2019-12-11 23:17:42 +01:00
#ifdef USE_OPENSSL
2019-11-08 15:54:41 +01:00
// define the cipher suit used
// dirty hack, this should be configured by the configuration file
2019-12-15 12:10:06 +01:00
#define CIPHER_SUIT "HIGH"
2015-10-22 11:39:11 +02:00
2018-02-10 16:57:21 +01:00
static int ssl_session_ctx_id = 1;
2018-03-02 19:04:00 +01:00
SSL_CTX *ctx;
2020-08-19 12:26:17 +02:00
static void init_openssl()
{
SSL_load_error_strings();
OpenSSL_add_ssl_algorithms();
2018-02-10 11:22:41 +01:00
}
2020-08-19 12:26:17 +02:00
static SSL_CTX *create_context()
2018-02-10 11:22:41 +01:00
{
const SSL_METHOD *method;
SSL_CTX *ctx;
2018-02-10 11:22:41 +01:00
method = SSLv23_server_method();
2018-02-10 11:22:41 +01:00
ctx = SSL_CTX_new(method);
if (!ctx)
{
2019-12-11 23:17:42 +01:00
ERROR("Unable to create SSL context");
ERR_print_errors_fp(stderr);
exit(EXIT_FAILURE);
}
2018-02-10 11:22:41 +01:00
return ctx;
2018-02-10 11:22:41 +01:00
}
#if OPENSSL_VERSION_NUMBER >= 0x10002000L
static unsigned char antd_protocols[] = {
//TODO: add support to HTTP/2 protocol: 2,'h', '2',
8, 'h', 't', 't', 'p', '/', '1', '.', '1'};
static int alpn_advertise_protos_cb(SSL *ssl, const unsigned char **out, unsigned int *outlen, void *arg)
{
UNUSED(ssl);
UNUSED(arg);
*out = antd_protocols;
*outlen = sizeof(antd_protocols);
return SSL_TLSEXT_ERR_OK;
}
static int alpn_select_cb(SSL *ssl, const unsigned char **out, unsigned char *outlen, const unsigned char *in, unsigned int inlen, void *arg)
{
UNUSED(ssl);
UNUSED(arg);
if (SSL_select_next_proto((unsigned char **)out, outlen, antd_protocols, sizeof(antd_protocols), in, inlen) == OPENSSL_NPN_NEGOTIATED)
{
return SSL_TLSEXT_ERR_OK;
}
else
{
ERROR("No protocol support overlap found between client and server\n");
return SSL_TLSEXT_ERR_ALERT_FATAL;
}
}
#endif
2020-08-19 12:26:17 +02:00
static void configure_context(SSL_CTX *ctx)
2018-02-10 11:22:41 +01:00
{
2018-03-19 12:06:22 +01:00
#if defined(SSL_CTX_set_ecdh_auto)
SSL_CTX_set_ecdh_auto(ctx, 1);
2018-03-19 12:06:22 +01:00
#else
SSL_CTX_set_tmp_ecdh(ctx, EC_KEY_new_by_curve_name(NID_X9_62_prime256v1));
2018-03-19 12:06:22 +01:00
#endif
//SSL_CTX_set_ecdh_auto(ctx, 1);
2018-02-10 16:57:21 +01:00
/* Set some options and the session id.
* SSL_OP_NO_SSLv2: SSLv2 is insecure, disable it.
* SSL_OP_NO_TICKET: We don't want TLS tickets used because this is an SSL server caching example.
* It should be fine to use tickets in addition to server side caching.
*/
SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 | SSL_OP_NO_SSLv2 | SSL_OP_NO_TICKET);
SSL_CTX_set_session_id_context(ctx, (void *)&ssl_session_ctx_id, sizeof(ssl_session_ctx_id));
// set the cipher suit
config_t *cnf = config();
const char *suit = cnf->ssl_cipher ? cnf->ssl_cipher : CIPHER_SUIT;
2019-12-19 09:58:19 +01:00
LOG("Cirpher suit used: %s", suit);
if (SSL_CTX_set_cipher_list(ctx, suit) != 1)
{
2019-12-20 16:49:41 +01:00
ERROR("Fail to set ssl cirpher suit: %s", suit);
ERR_print_errors_fp(stderr);
exit(EXIT_FAILURE);
}
/* Set the key and cert */
2018-06-26 13:40:53 +02:00
/* use the full chain bundle of certificate */
//if (SSL_CTX_use_certificate_file(ctx, server_config->sslcert, SSL_FILETYPE_PEM) <= 0) {
if (SSL_CTX_use_certificate_chain_file(ctx, cnf->sslcert) <= 0)
{
2019-12-20 16:49:41 +01:00
ERROR("Fail to read SSL certificate chain file: %s", cnf->sslcert);
ERR_print_errors_fp(stderr);
2018-02-10 16:57:21 +01:00
exit(EXIT_FAILURE);
}
2018-02-10 11:22:41 +01:00
if (SSL_CTX_use_PrivateKey_file(ctx, cnf->sslkey, SSL_FILETYPE_PEM) <= 0)
{
2019-12-20 16:49:41 +01:00
ERROR("Fail to read SSL private file: %s", cnf->sslkey);
ERR_print_errors_fp(stderr);
2018-02-10 16:57:21 +01:00
exit(EXIT_FAILURE);
}
if (!SSL_CTX_check_private_key(ctx))
{
ERROR("Failed to validate SSL certificate");
ERR_print_errors_fp(stderr);
2018-02-10 16:57:21 +01:00
exit(EXIT_FAILURE);
}
#if OPENSSL_VERSION_NUMBER >= 0x10002000L
SSL_CTX_set_alpn_select_cb(ctx, alpn_select_cb, NULL);
SSL_CTX_set_next_protos_advertised_cb(ctx, alpn_advertise_protos_cb, NULL);
#endif
2018-02-10 11:22:41 +01:00
}
#endif
static void stop_serve(int dummy)
{
2018-10-03 23:42:42 +02:00
UNUSED(dummy);
2020-02-12 12:08:36 +01:00
// close log server
closelog();
sigset_t mask;
sigemptyset(&mask);
//Blocks the SIG_IGN signal (by adding SIG_IGN to newMask)
sigaddset(&mask, SIGINT);
sigaddset(&mask, SIGPIPE);
sigaddset(&mask, SIGABRT);
sigprocmask(SIG_BLOCK, &mask, NULL);
2021-01-03 11:24:55 +01:00
antd_scheduler_destroy(scheduler);
unload_all_plugin();
2018-03-02 19:04:00 +01:00
#ifdef USE_OPENSSL
2018-10-09 12:15:48 +02:00
FIPS_mode_set(0);
2018-03-02 19:04:00 +01:00
SSL_CTX_free(ctx);
2018-10-09 12:15:48 +02:00
FIPS_mode_set(0);
2019-11-08 11:52:00 +01:00
// DEPRECATED: CONF_modules_unload(1);
2018-10-09 12:15:48 +02:00
EVP_cleanup();
2019-11-08 11:52:00 +01:00
EVP_PBE_cleanup();
// DEPRECATED:ENGINE_cleanup();
2018-10-09 12:15:48 +02:00
CRYPTO_cleanup_all_ex_data();
2019-11-08 11:52:00 +01:00
// DEPRECATED: ERR_remove_state(0);
2018-10-09 12:15:48 +02:00
ERR_free_strings();
2018-03-02 19:04:00 +01:00
#endif
destroy_config();
sigprocmask(SIG_UNBLOCK, &mask, NULL);
}
2019-07-31 15:11:59 +02:00
static void antd_monitor(port_config_t *pcnf)
2020-08-19 11:08:30 +02:00
{
antd_task_t *task = NULL;
2020-08-19 11:08:30 +02:00
int client_sock = -1;
struct sockaddr_in client_name;
socklen_t client_name_len = sizeof(client_name);
char *client_ip = NULL;
config_t *conf = config();
if (pcnf->sock > 0)
2020-08-19 11:08:30 +02:00
{
client_sock = accept(pcnf->sock, (struct sockaddr *)&client_name, &client_name_len);
if (client_sock > 0)
2020-08-19 11:08:30 +02:00
{
// just dump the scheduler when we have a connection
antd_client_t *client = (antd_client_t *)malloc(sizeof(antd_client_t));
antd_request_t *request = (antd_request_t *)malloc(sizeof(*request));
request->client = client;
request->request = dict();
client->zstream = NULL;
client->z_level = ANTD_CNONE;
dictionary_t xheader = dict();
dput(request->request, "REQUEST_HEADER", xheader);
dput(request->request, "REQUEST_DATA", dict());
dput(xheader, "SERVER_PORT", (void *)__s("%d", pcnf->port));
dput(xheader, "SERVER_WWW_ROOT", (void *)strdup(pcnf->htdocs));
/*
2020-08-19 11:08:30 +02:00
get the remote IP
*/
if (client_name.sin_family == AF_INET)
{
client_ip = inet_ntoa(client_name.sin_addr);
LOG("Connect to client IP: %s on port:%d (%d)", client_ip, pcnf->port, client_sock);
// ip address
dput(xheader, "REMOTE_ADDR", (void *)strdup(client_ip));
//LOG("socket: %d\n", client_sock);
}
2020-08-19 11:08:30 +02:00
// set timeout to socket
set_nonblock(client_sock);
client->sock = client_sock;
time(&client->last_io);
client->ssl = NULL;
client->state = ANTD_CLIENT_ACCEPT;
client->z_status = 0;
2020-08-19 11:08:30 +02:00
#ifdef USE_OPENSSL
if (pcnf->usessl == 1)
{
client->ssl = (void *)SSL_new(ctx);
if (!client->ssl)
2020-08-19 11:08:30 +02:00
{
finish_request(request);
return;
}
SSL_set_fd((SSL *)client->ssl, client->sock);
// this can be used in the protocol select callback to
// set the protocol selected by the server
if (!SSL_set_ex_data((SSL *)client->ssl, client->sock, client))
{
ERROR("Cannot set ex data to ssl client:%d", client->sock);
}
/*if (SSL_accept((SSL*)client->ssl) <= 0) {
2020-08-19 11:08:30 +02:00
LOG("EROOR accept\n");
ERR_print_errors_fp(stderr);
antd_close(client);
continue;
}*/
}
#endif
2021-01-03 11:24:55 +01:00
antd_scheduler_lock(scheduler);
conf->connection++;
2021-01-03 11:24:55 +01:00
antd_scheduler_unlock(scheduler);
// create callback for the server
task = antd_create_task(accept_request, (void *)request, finish_request, client->last_io);
2021-01-03 21:31:35 +01:00
antd_task_bind_event(task,client->sock,0, TASK_EVT_ON_WRITABLE| TASK_EVT_ON_READABLE);
2021-01-03 11:24:55 +01:00
antd_scheduler_add_task(scheduler, task);
2020-08-19 11:08:30 +02:00
}
}
}
2021-01-03 11:24:55 +01:00
void antd_scheduler_ext_statistic(int fd, void *user_data)
{
antd_request_t *request = (antd_request_t *)user_data;
chain_t it, it1;
dictionary_t tmp;
int ret;
char buff[BUFFLEN];
if (request == NULL)
{
SEND_STAT(fd, buff, ret, "Data is null\n");
return;
}
// send client general infomation
SEND_STAT(fd, buff, ret, "Client id: %d\n", request->client->sock);
SEND_STAT(fd, buff, ret, "Last IO: %lu\n", (unsigned long)request->client->last_io);
SEND_STAT(fd, buff, ret, "Current state: %d\n", request->client->state);
SEND_STAT(fd, buff, ret, "z_level: %d\n", request->client->z_level);
if (request->client->ssl)
{
SEND_STAT(fd, buff, ret, "SSL is enabled\n");
}
// send client request detail
if (request->request)
{
for_each_assoc(it, request->request)
{
if (strcmp(it->key, "REQUEST_HEADER") == 0 ||
strcmp(it->key, "REQUEST_DATA") == 0 ||
strcmp(it->key, "COOKIE") == 0)
{
tmp = (dictionary_t)it->value;
if (tmp)
{
for_each_assoc(it1, tmp)
{
SEND_STAT(fd, buff, ret, "%s: %s\n", it1->key, (char *)it1->value);
}
}
}
else
{
SEND_STAT(fd, buff, ret, "%s: %s\n", it->key, (char *)it->value);
}
}
}
UNUSED(ret);
}
2021-01-03 11:24:55 +01:00
void antd_scheduler_destroy_data(void *data)
{
finish_request(data);
}
int antd_task_data_id(void *data)
{
antd_request_t *rq = (antd_request_t *)data;
if(!rq)
return 0;
return antd_scheduler_next_id(scheduler,rq->client->sock);
}
int main(int argc, char *argv[])
2015-10-22 11:39:11 +02:00
{
pthread_t sched_th;
2020-08-25 16:40:24 +02:00
// startup port
chain_t it;
struct timeval timeout;
port_config_t *pcnf;
fd_set master_set, working_set;
int status, maxfd = 0;
2020-08-25 16:40:24 +02:00
int nlisten = 0;
// load the config first
if (argc == 1)
2019-11-13 14:22:25 +01:00
load_config(CONFIG_FILE);
2015-10-22 11:39:11 +02:00
else
load_config(argv[1]);
// ignore the broken PIPE error when writing
2015-10-22 11:39:11 +02:00
//or reading to/from a closed socked connection
signal(SIGPIPE, SIG_IGN);
2015-10-22 13:31:35 +02:00
signal(SIGABRT, SIG_IGN);
signal(SIGINT, stop_serve);
2018-02-10 11:22:41 +01:00
config_t *conf = config();
2020-02-12 12:08:36 +01:00
// start syslog
setlogmask(LOG_UPTO(LOG_NOTICE));
openlog(SERVER_NAME, LOG_CONS | LOG_PID | LOG_NDELAY, LOG_DAEMON);
2019-12-20 16:49:41 +01:00
2018-02-10 11:22:41 +01:00
#ifdef USE_OPENSSL
if (conf->enable_ssl == 1)
2018-02-10 11:22:41 +01:00
{
init_openssl();
ctx = create_context();
2018-02-10 11:22:41 +01:00
configure_context(ctx);
2018-02-10 11:22:41 +01:00
}
2018-02-10 11:22:41 +01:00
#endif
2020-08-19 11:08:30 +02:00
// enable scheduler
// default to 4 workers
2021-01-03 11:24:55 +01:00
scheduler = antd_scheduler_init( conf->n_workers, conf->stat_fifo_path);
if (scheduler == NULL)
2020-08-25 16:40:24 +02:00
{
ERROR("Unable to initialise scheduler. Exit");
stop_serve(0);
exit(1);
}
FD_ZERO(&master_set);
2019-12-20 16:49:41 +01:00
for_each_assoc(it, conf->ports)
{
pcnf = (port_config_t *)it->value;
if (pcnf)
2019-12-20 16:49:41 +01:00
{
pcnf->sock = startup(&pcnf->port);
if (pcnf->sock > 0)
2019-12-20 16:49:41 +01:00
{
set_nonblock(pcnf->sock);
FD_SET(pcnf->sock, &master_set);
LOG("Listening on port %d", pcnf->port);
maxfd = pcnf->sock > maxfd ? pcnf->sock : maxfd;
2019-12-20 16:49:41 +01:00
nlisten++;
}
else
{
ERROR("Port %d is disabled", pcnf->port);
}
}
}
if (nlisten == 0)
2019-12-20 16:49:41 +01:00
{
ERROR("No port is listenned, quit!!");
stop_serve(0);
exit(1);
}
// Start scheduler
2021-01-03 11:24:55 +01:00
if (pthread_create(&sched_th, NULL, (void *(*)(void *))antd_scheduler_wait, (void *)scheduler) != 0)
{
ERROR("pthread_create: cannot start scheduler thread");
stop_serve(0);
exit(1);
}
else
{
// reclaim data when exit
pthread_detach(sched_th);
}
2021-01-03 11:24:55 +01:00
while (antd_scheduler_ok(scheduler))
{
if (conf->connection > conf->maxcon)
{
//ERROR("Reach max connection %d", conf->connection);
timeout.tv_sec = 0;
timeout.tv_usec = 10000; // 5 ms
select(0, NULL, NULL, NULL, &timeout);
continue;
}
FD_ZERO(&working_set);
memcpy(&working_set, &master_set, sizeof(master_set));
// blocking select
status = select(maxfd + 1, &working_set, NULL, NULL, NULL);
if (status < 0)
{
ERROR("select() error: %s", strerror(errno));
break;
}
if (status == 0)
{
continue;
}
for_each_assoc(it, conf->ports)
{
pcnf = (port_config_t *)it->value;
if (pcnf && pcnf->sock > 0 && FD_ISSET(pcnf->sock, &working_set))
{
antd_monitor(pcnf);
}
}
}
2019-12-20 16:49:41 +01:00
stop_serve(0);
return (0);
2019-11-08 15:26:10 +01:00
}