From 088baa1ef5e563238573bab3b1fa6a3bbbed27a3 Mon Sep 17 00:00:00 2001 From: DanyLE Date: Sat, 27 Aug 2022 16:57:44 +0200 Subject: [PATCH] use open instead of fopen for fire readwarite --- http_server.c | 2862 +++++++++++++++++++++++++------------------------ lib/handle.c | 1587 ++++++++++++++------------- 2 files changed, 2226 insertions(+), 2223 deletions(-) diff --git a/http_server.c b/http_server.c index 5fa58e1..2ed225d 100644 --- a/http_server.c +++ b/http_server.c @@ -9,6 +9,7 @@ #include #include #include +#include #ifdef USE_OPENSSL #include @@ -30,876 +31,876 @@ //define all basic mime here static mime_t _mimes[] = { - {"image/bmp", "bmp"}, - {"image/jpeg", "jpg,jpeg"}, - {"text/css", "css"}, - {"text/markdown", "md"}, - {"text/csv", "csv"}, - {"application/pdf", "pdf"}, - {"image/gif", "gif"}, - {"text/html", "html"}, - {"application/json", "json"}, - {"application/javascript", "js"}, - {"image/png", "png"}, - {"text/plain", "txt"}, - {"application/xhtml+xml", "xhtml"}, - {"application/xml", "xml"}, - {"image/svg+xml", "svg"}, - {NULL, NULL}}; + {"image/bmp", "bmp"}, + {"image/jpeg", "jpg,jpeg"}, + {"text/css", "css"}, + {"text/markdown", "md"}, + {"text/csv", "csv"}, + {"application/pdf", "pdf"}, + {"image/gif", "gif"}, + {"text/html", "html"}, + {"application/json", "json"}, + {"application/javascript", "js"}, + {"image/png", "png"}, + {"text/plain", "txt"}, + {"application/xhtml+xml", "xhtml"}, + {"application/xml", "xml"}, + {"image/svg+xml", "svg"}, + {NULL, NULL}}; static pthread_mutex_t server_mux = PTHREAD_MUTEX_INITIALIZER; config_t server_config; config_t *config() { - return &server_config; + return &server_config; } void destroy_config() { - freedict(server_config.handlers); - if (server_config.plugins_dir) - free(server_config.plugins_dir); - if (server_config.plugins_ext) - free(server_config.plugins_ext); - if (server_config.db_path) - free(server_config.db_path); - if (server_config.tmpdir) - free(server_config.tmpdir); - if (server_config.ssl_cipher) - free(server_config.ssl_cipher); - if (server_config.gzip_types) - list_free(&server_config.gzip_types); - if (server_config.mimes) - freedict(server_config.mimes); - if (server_config.stat_fifo_path) - free(server_config.stat_fifo_path); - if (server_config.ports) - { - chain_t it; - port_config_t *cnf; - for_each_assoc(it, server_config.ports) - { - cnf = (port_config_t *)it->value; - if (cnf != NULL) - { - if (cnf->htdocs != NULL) - free(cnf->htdocs); - if (cnf->sock > 0) - { - close(cnf->sock); - } - freedict(cnf->rules); - } - } - freedict(server_config.ports); - } - LOG("Unclosed connection: %d", server_config.connection); + freedict(server_config.handlers); + if (server_config.plugins_dir) + free(server_config.plugins_dir); + if (server_config.plugins_ext) + free(server_config.plugins_ext); + if (server_config.db_path) + free(server_config.db_path); + if (server_config.tmpdir) + free(server_config.tmpdir); + if (server_config.ssl_cipher) + free(server_config.ssl_cipher); + if (server_config.gzip_types) + list_free(&server_config.gzip_types); + if (server_config.mimes) + freedict(server_config.mimes); + if (server_config.stat_fifo_path) + free(server_config.stat_fifo_path); + if (server_config.ports) + { + chain_t it; + port_config_t *cnf; + for_each_assoc(it, server_config.ports) + { + cnf = (port_config_t *)it->value; + if (cnf != NULL) + { + if (cnf->htdocs != NULL) + free(cnf->htdocs); + if (cnf->sock > 0) + { + close(cnf->sock); + } + freedict(cnf->rules); + } + } + freedict(server_config.ports); + } + LOG("Unclosed connection: %d", server_config.connection); } static int config_handler(void *conf, const char *section, const char *name, - const char *value) + const char *value) { - config_t *pconfig = (config_t *)conf; - regmatch_t port_matches[2]; - struct stat st; - //trim(section, ' '); - //trim(value,' '); - //trim(name,' '); - //char * ppath = NULL; - if (MATCH("SERVER", "plugins")) - { - if (pconfig->plugins_dir) - free(pconfig->plugins_dir); - pconfig->plugins_dir = strdup(value); - if (stat(pconfig->plugins_dir, &st) == -1) - mkdirp(pconfig->plugins_dir, 0755); - } - else if (MATCH("SERVER", "plugins_ext")) - { - if (pconfig->plugins_ext) - free(pconfig->plugins_ext); - pconfig->plugins_ext = strdup(value); - } - else if (MATCH("SERVER", "database")) - { - if (pconfig->db_path) - free(pconfig->db_path); - pconfig->db_path = strdup(value); - if (stat(pconfig->db_path, &st) == -1) - mkdirp(pconfig->db_path, 0755); - } - else if (MATCH("SERVER", "tmpdir")) - { - if (pconfig->tmpdir) - free(pconfig->tmpdir); - pconfig->tmpdir = strdup(value); - if (stat(pconfig->tmpdir, &st) == -1) - mkdirp(pconfig->tmpdir, 0755); - else - { - removeAll(pconfig->tmpdir, 0); - } - } - else if (MATCH("SERVER", "statistic_fifo")) - { - if (pconfig->stat_fifo_path) - free(pconfig->stat_fifo_path); - pconfig->stat_fifo_path = strdup(value); - } - else if (MATCH("SERVER", "max_upload_size")) - { - pconfig->max_upload_size = atoi(value); - } - else if (MATCH("SERVER", "maxcon")) - { - pconfig->maxcon = atoi(value); - } - else if (MATCH("SERVER", "backlog")) - { - pconfig->backlog = atoi(value); - } - else if (MATCH("SERVER", "workers")) - { - pconfig->n_workers = atoi(value); - } - else if (MATCH("SERVER", "debug_enable")) - { - pconfig->debug_enable = atoi(value); - } - else if (MATCH("SERVER", "scheduler_timeout")) - { - pconfig->scheduler_timeout = atoi(value); - } + config_t *pconfig = (config_t *)conf; + regmatch_t port_matches[2]; + struct stat st; + //trim(section, ' '); + //trim(value,' '); + //trim(name,' '); + //char * ppath = NULL; + if (MATCH("SERVER", "plugins")) + { + if (pconfig->plugins_dir) + free(pconfig->plugins_dir); + pconfig->plugins_dir = strdup(value); + if (stat(pconfig->plugins_dir, &st) == -1) + mkdirp(pconfig->plugins_dir, 0755); + } + else if (MATCH("SERVER", "plugins_ext")) + { + if (pconfig->plugins_ext) + free(pconfig->plugins_ext); + pconfig->plugins_ext = strdup(value); + } + else if (MATCH("SERVER", "database")) + { + if (pconfig->db_path) + free(pconfig->db_path); + pconfig->db_path = strdup(value); + if (stat(pconfig->db_path, &st) == -1) + mkdirp(pconfig->db_path, 0755); + } + else if (MATCH("SERVER", "tmpdir")) + { + if (pconfig->tmpdir) + free(pconfig->tmpdir); + pconfig->tmpdir = strdup(value); + if (stat(pconfig->tmpdir, &st) == -1) + mkdirp(pconfig->tmpdir, 0755); + else + { + removeAll(pconfig->tmpdir, 0); + } + } + else if (MATCH("SERVER", "statistic_fifo")) + { + if (pconfig->stat_fifo_path) + free(pconfig->stat_fifo_path); + pconfig->stat_fifo_path = strdup(value); + } + else if (MATCH("SERVER", "max_upload_size")) + { + pconfig->max_upload_size = atoi(value); + } + else if (MATCH("SERVER", "maxcon")) + { + pconfig->maxcon = atoi(value); + } + else if (MATCH("SERVER", "backlog")) + { + pconfig->backlog = atoi(value); + } + else if (MATCH("SERVER", "workers")) + { + pconfig->n_workers = atoi(value); + } + else if (MATCH("SERVER", "debug_enable")) + { + pconfig->debug_enable = atoi(value); + } + else if (MATCH("SERVER", "scheduler_timeout")) + { + pconfig->scheduler_timeout = atoi(value); + } #ifdef USE_ZLIB - else if (MATCH("SERVER", "gzip_enable")) - { - pconfig->gzip_enable = atoi(value); - } - else if (MATCH("SERVER", "gzip_types")) - { - pconfig->gzip_types = split(value, ","); - } + else if (MATCH("SERVER", "gzip_enable")) + { + pconfig->gzip_enable = atoi(value); + } + else if (MATCH("SERVER", "gzip_types")) + { + pconfig->gzip_types = split(value, ","); + } #endif #ifdef USE_OPENSSL - else if (MATCH("SERVER", "ssl.cert")) - { - if (pconfig->sslcert) - free(pconfig->sslcert); - pconfig->sslcert = strdup(value); - } - else if (MATCH("SERVER", "ssl.key")) - { - if (pconfig->sslkey) - free(pconfig->sslkey); - pconfig->sslkey = strdup(value); - } - else if (MATCH("SERVER", "ssl.cipher")) - { - if (pconfig->ssl_cipher) - free(pconfig->ssl_cipher); - pconfig->ssl_cipher = strdup(value); - } + else if (MATCH("SERVER", "ssl.cert")) + { + if (pconfig->sslcert) + free(pconfig->sslcert); + pconfig->sslcert = strdup(value); + } + else if (MATCH("SERVER", "ssl.key")) + { + if (pconfig->sslkey) + free(pconfig->sslkey); + pconfig->sslkey = strdup(value); + } + else if (MATCH("SERVER", "ssl.cipher")) + { + if (pconfig->ssl_cipher) + free(pconfig->ssl_cipher); + pconfig->ssl_cipher = strdup(value); + } #endif - else if (strcmp(section, "FILEHANDLER") == 0) - { - dput(pconfig->handlers, name, strdup(value)); - } - else if (strcmp(section, "AUTOSTART") == 0 || strcmp(section, "AUTOLOAD") == 0) - { - // The server section must be added before the autostart section - // auto start plugin - plugin_load((char *)value); - } - else if (strcmp(section, "MIMES") == 0) - { - dput(pconfig->mimes, name, strdup(value)); - } - else if (regex_match("PORT:\\s*([0-9]+)", section, 2, port_matches)) - { - char buf[20]; - memset(buf, '\0', sizeof(buf)); - memcpy(buf, section + port_matches[1].rm_so, port_matches[1].rm_eo - port_matches[1].rm_so); - port_config_t *p = dvalue(pconfig->ports, buf); - if (!p) - { - p = (port_config_t *)malloc(sizeof(port_config_t)); - p->htdocs = NULL; - p->sock = -1; - p->rules = dict_n(1); - dput(pconfig->ports, buf, p); - p->port = atoi(buf); - } - if (strcmp(name, "htdocs") == 0) - { - p->htdocs = strdup(value); - if (stat(p->htdocs, &st) == -1) - { - mkdirp(p->htdocs, 0755); - } - } - else if (strcmp(name, "ssl.enable") == 0) - { - p->usessl = atoi(value); - if (p->usessl) - pconfig->enable_ssl = 1; - } - else - { - // other thing should be rules - dput(p->rules, name, strdup(value)); - } - } - else - { - return 0; /* unknown section/name, error */ - } - return 1; + else if (strcmp(section, "FILEHANDLER") == 0) + { + dput(pconfig->handlers, name, strdup(value)); + } + else if (strcmp(section, "AUTOSTART") == 0 || strcmp(section, "AUTOLOAD") == 0) + { + // The server section must be added before the autostart section + // auto start plugin + plugin_load((char *)value); + } + else if (strcmp(section, "MIMES") == 0) + { + dput(pconfig->mimes, name, strdup(value)); + } + else if (regex_match("PORT:\\s*([0-9]+)", section, 2, port_matches)) + { + char buf[20]; + memset(buf, '\0', sizeof(buf)); + memcpy(buf, section + port_matches[1].rm_so, port_matches[1].rm_eo - port_matches[1].rm_so); + port_config_t *p = dvalue(pconfig->ports, buf); + if (!p) + { + p = (port_config_t *)malloc(sizeof(port_config_t)); + p->htdocs = NULL; + p->sock = -1; + p->rules = dict_n(1); + dput(pconfig->ports, buf, p); + p->port = atoi(buf); + } + if (strcmp(name, "htdocs") == 0) + { + p->htdocs = strdup(value); + if (stat(p->htdocs, &st) == -1) + { + mkdirp(p->htdocs, 0755); + } + } + else if (strcmp(name, "ssl.enable") == 0) + { + p->usessl = atoi(value); + if (p->usessl) + pconfig->enable_ssl = 1; + } + else + { + // other thing should be rules + dput(p->rules, name, strdup(value)); + } + } + else + { + return 0; /* unknown section/name, error */ + } + return 1; } void load_config(const char *file) { - server_config.ports = dict(); - server_config.plugins_dir = strdup("plugins/"); - server_config.plugins_ext = strdup(".dylib"); - server_config.db_path = strdup("databases/"); - //server_config.htdocs = "htdocs/"; - server_config.tmpdir = strdup("tmp/"); - server_config.stat_fifo_path = strdup("/var/run/antd_stat"); - server_config.n_workers = 4; - server_config.backlog = 1000; - server_config.handlers = dict(); - server_config.maxcon = 100; - server_config.max_upload_size = 10000000; //10Mb - server_config.connection = 0; - server_config.mimes = dict(); - server_config.enable_ssl = 0; - server_config.sslcert = strdup("cert.pem"); - server_config.sslkey = strdup("key.pem"); - server_config.ssl_cipher = NULL; - server_config.gzip_enable = 0; - server_config.gzip_types = NULL; - server_config.debug_enable = 0; - server_config.scheduler_timeout = 30; // 30 s - // put it default mimes - for (int i = 0; _mimes[i].type != NULL; i++) - { - dput(server_config.mimes, _mimes[i].type, strdup(_mimes[i].ext)); - } - if (ini_parse(file, config_handler, &server_config) < 0) - { - ERROR("Can't load '%s'. Used defaut configuration", file); - } - else - { - LOG("Using configuration : %s", file); + server_config.ports = dict(); + server_config.plugins_dir = strdup("plugins/"); + server_config.plugins_ext = strdup(".dylib"); + server_config.db_path = strdup("databases/"); + //server_config.htdocs = "htdocs/"; + server_config.tmpdir = strdup("tmp/"); + server_config.stat_fifo_path = strdup("/var/run/antd_stat"); + server_config.n_workers = 4; + server_config.backlog = 1000; + server_config.handlers = dict(); + server_config.maxcon = 100; + server_config.max_upload_size = 10000000; //10Mb + server_config.connection = 0; + server_config.mimes = dict(); + server_config.enable_ssl = 0; + server_config.sslcert = strdup("cert.pem"); + server_config.sslkey = strdup("key.pem"); + server_config.ssl_cipher = NULL; + server_config.gzip_enable = 0; + server_config.gzip_types = NULL; + server_config.debug_enable = 0; + server_config.scheduler_timeout = 30; // 30 s + // put it default mimes + for (int i = 0; _mimes[i].type != NULL; i++) + { + dput(server_config.mimes, _mimes[i].type, strdup(_mimes[i].ext)); + } + if (ini_parse(file, config_handler, &server_config) < 0) + { + ERROR("Can't load '%s'. Used defaut configuration", file); + } + else + { + LOG("Using configuration : %s", file); #ifdef USE_OPENSSL - LOG("SSL enable %d", server_config.enable_ssl); - LOG("SSL cert %s", server_config.sslcert); - LOG("SSL key %s", server_config.sslkey); - /*if(!server_config.ssl_cipher) - LOG("SSL Cipher suite: %s", "HIGH"); - else - LOG("SSL Cipher suite: %s", server_config.ssl_cipher);*/ + LOG("SSL enable %d", server_config.enable_ssl); + LOG("SSL cert %s", server_config.sslcert); + LOG("SSL key %s", server_config.sslkey); + /*if(!server_config.ssl_cipher) + LOG("SSL Cipher suite: %s", "HIGH"); + else + LOG("SSL Cipher suite: %s", server_config.ssl_cipher);*/ #endif - } - LOG("%d mimes entries found", server_config.mimes->size); + } + LOG("%d mimes entries found", server_config.mimes->size); } void *accept_request(void *data) { - char buf[BUFFLEN]; - char *token = NULL; - char *line = NULL; - antd_task_t *task; - antd_request_t *rq = (antd_request_t *)data; + char buf[BUFFLEN]; + char *token = NULL; + char *line = NULL; + antd_task_t *task; + antd_request_t *rq = (antd_request_t *)data; - task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); - // first verify if the socket is ready - antd_client_t *client = (antd_client_t *)rq->client; + task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); + // first verify if the socket is ready + antd_client_t *client = (antd_client_t *)rq->client; - struct pollfd pfd[1]; + struct pollfd pfd[1]; - pfd[0].fd = client->sock; - pfd[0].events = POLLIN | POLLOUT; + pfd[0].fd = client->sock; + pfd[0].events = POLLIN | POLLOUT; - int sel = poll(pfd, 1, POLL_EVENT_TO); - if (sel == -1) - { - antd_error(rq->client, 400, "Bad request"); - return task; - } - if (pfd[0].revents & POLLERR || pfd[0].revents & POLLHUP) - { - antd_error(rq->client, 400, "Bad request"); - return task; - } - if (sel == 0 || (!(pfd[0].revents & POLLIN) && !(pfd[0].revents & POLLOUT))) - { - task->handle = accept_request; - return task; - } - // perform the ssl handshake if enabled + int sel = poll(pfd, 1, POLL_EVENT_TO); + if (sel == -1) + { + antd_error(rq->client, 400, "Bad request"); + return task; + } + if (pfd[0].revents & POLLERR || pfd[0].revents & POLLHUP) + { + antd_error(rq->client, 400, "Bad request"); + return task; + } + if (sel == 0 || (!(pfd[0].revents & POLLIN) && !(pfd[0].revents & POLLOUT))) + { + task->handle = accept_request; + return task; + } + // perform the ssl handshake if enabled #ifdef USE_OPENSSL - int ret = -1, stat; - if (client->ssl && client->state == ANTD_CLIENT_ACCEPT) - { - //LOG("Atttempt %d\n", client->attempt); - if (SSL_accept((SSL *)client->ssl) == -1) - { - stat = SSL_get_error((SSL *)client->ssl, ret); - switch (stat) - { - case SSL_ERROR_WANT_READ: - case SSL_ERROR_WANT_WRITE: - case SSL_ERROR_NONE: - task->handle = accept_request; - return task; - default: - ERROR("Error performing SSL handshake %d %d %s", stat, ret, ERR_error_string(ERR_get_error(), NULL)); - antd_error(rq->client, 400, "Invalid SSL request"); - //server_config.connection++; - ERR_print_errors_fp(stderr); - return task; - } - } - client->state = ANTD_CLIENT_HANDSHAKE; - task->handle = accept_request; - //LOG("Handshake finish for %d\n", client->sock); - return task; - } - else - { - if (!((pfd[0].revents & POLLIN))) - { - task->handle = accept_request; - return task; - } - } + int ret = -1, stat; + if (client->ssl && client->state == ANTD_CLIENT_ACCEPT) + { + //LOG("Atttempt %d\n", client->attempt); + if (SSL_accept((SSL *)client->ssl) == -1) + { + stat = SSL_get_error((SSL *)client->ssl, ret); + switch (stat) + { + case SSL_ERROR_WANT_READ: + case SSL_ERROR_WANT_WRITE: + case SSL_ERROR_NONE: + task->handle = accept_request; + return task; + default: + ERROR("Error performing SSL handshake %d %d %s", stat, ret, ERR_error_string(ERR_get_error(), NULL)); + antd_error(rq->client, 400, "Invalid SSL request"); + //server_config.connection++; + ERR_print_errors_fp(stderr); + return task; + } + } + client->state = ANTD_CLIENT_HANDSHAKE; + task->handle = accept_request; + //LOG("Handshake finish for %d\n", client->sock); + return task; + } + else + { + if (!((pfd[0].revents & POLLIN))) + { + task->handle = accept_request; + return task; + } + } #endif - //LOG("Ready for reading %d\n", client->sock); - //server_config.connection++; - client->state = ANTD_CLIENT_PROTO_CHECK; - read_buf(rq->client, buf, sizeof(buf)); - line = buf; - LOG("Request (%d): %s", rq->client->sock, line); - // get the method string - token = strsep(&line, " "); - if (!line) - { - //LOG("No method found"); - antd_error(rq->client, 405, "No method found"); - return task; - } - trim(token, ' '); - trim(line, ' '); - dput(rq->request, "METHOD", strdup(token)); - // get the request - token = strsep(&line, " "); - if (!line) - { - //LOG("No request found"); - antd_error(rq->client, 400, "Bad request"); - return task; - } - trim(token, ' '); - trim(line, ' '); - trim(line, '\n'); - trim(line, '\r'); - dput(rq->request, "PROTOCOL", strdup(line)); - dput(rq->request, "REQUEST_QUERY", strdup(token)); - line = token; - token = strsep(&line, "?"); - dput(rq->request, "REQUEST_PATH", url_decode(token)); - // decode request - // now return the task - task->handle = decode_request_header; - return task; + //LOG("Ready for reading %d\n", client->sock); + //server_config.connection++; + client->state = ANTD_CLIENT_PROTO_CHECK; + read_buf(rq->client, buf, sizeof(buf)); + line = buf; + LOG("Request (%d): %s", rq->client->sock, line); + // get the method string + token = strsep(&line, " "); + if (!line) + { + //LOG("No method found"); + antd_error(rq->client, 405, "No method found"); + return task; + } + trim(token, ' '); + trim(line, ' '); + dput(rq->request, "METHOD", strdup(token)); + // get the request + token = strsep(&line, " "); + if (!line) + { + //LOG("No request found"); + antd_error(rq->client, 400, "Bad request"); + return task; + } + trim(token, ' '); + trim(line, ' '); + trim(line, '\n'); + trim(line, '\r'); + dput(rq->request, "PROTOCOL", strdup(line)); + dput(rq->request, "REQUEST_QUERY", strdup(token)); + line = token; + token = strsep(&line, "?"); + dput(rq->request, "REQUEST_PATH", url_decode(token)); + // decode request + // now return the task + task->handle = decode_request_header; + return task; } void *resolve_request(void *data) { - struct stat st; - char path[2 * BUFFLEN]; - antd_request_t *rq = (antd_request_t *)data; - antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - char *url = (char *)dvalue(rq->request, "RESOURCE_PATH"); - char *newurl = NULL; - char *rqp = NULL; - char *oldrqp = NULL; - rq->client->state = ANTD_CLIENT_RESOLVE_REQUEST; - htdocs(rq, path); - strcat(path, url); - LOG("URL is : %s", url); - LOG("Resource Path is : %s", path); - //if (path[strlen(path) - 1] == '/') - // strcat(path, "index.html"); - if (stat(path, &st) == -1) - { - free(task); - rqp = strdup(url); - oldrqp = rqp; - trim(rqp, '/'); - newurl = strsep(&rqp, "/"); - if (!rqp) - rqp = strdup("/"); - else - rqp = strdup(rqp); - dput(rq->request, "RESOURCE_PATH", rqp); - LOG("Execute plugin %s", newurl); - task = execute_plugin(rq, newurl); - free(oldrqp); - return task; - } - else - { - if (S_ISDIR(st.st_mode)) - { - strcat(path, "/index.html"); - if (stat(path, &st) == -1) - { - chain_t it; - for_each_assoc(it, server_config.handlers) - { - newurl = __s("%s/index.%s", url, it->key); - memset(path, 0, sizeof(path)); - htdocs(rq, path); - strcat(path, newurl); - if (stat(path, &st) != 0) - { - free(newurl); - newurl = NULL; - } - else - { - i = server_config.handlers->cap; - break; - } - } - if (!newurl) - { - antd_error(rq->client, 404, "Resource Not Found"); - return task; - } - //if(url) free(url); this is freed in the dput function - url = newurl; - dput(rq->request, "RESOURCE_PATH", url); - } - } - dput(rq->request, "ABS_RESOURCE_PATH", strdup(path)); - // check if the mime is supported - // if the mime is not supported - // find an handler plugin to process it - // if the plugin is not found, forbidden access to the file should be sent - char *mime_type = mime(path); - dput(rq->request, "RESOURCE_MIME", strdup(mime_type)); - if (strcmp(mime_type, "application/octet-stream") == 0) - { - char *ex = ext(path); - char *h = NULL; - if (ex) - { - h = dvalue(server_config.handlers, ex); - free(ex); - } - if (h) - { - //sprintf(path,"/%s%s",h,url); - //LOG("WARNING::::Access octetstream via handle %s", h); - //if(execute_plugin(client,buf,method,rq) < 0) - // cannot_execute(client); - free(task); - return execute_plugin(rq, h); - } - else - antd_error(rq->client, 403, "Access forbidden"); - } - else - { - // discard all request data - dictionary_t headers = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER"); - if (headers) - { - char *sclen = (char *)dvalue(headers, "Content-Length"); - unsigned clen = 0; - unsigned read = 0; - int count; - if (sclen) - { - clen = atoi(sclen); - while (read < clen) - { - count = antd_recv(rq->client, path, sizeof(path) < clen ? sizeof(path) : clen); - if (count <= 0) - break; - read += count; - } - } - } - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE); - task->handle = serve_file; - } - return task; - } + struct stat st; + char path[2 * BUFFLEN]; + antd_request_t *rq = (antd_request_t *)data; + antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + char *url = (char *)dvalue(rq->request, "RESOURCE_PATH"); + char *newurl = NULL; + char *rqp = NULL; + char *oldrqp = NULL; + rq->client->state = ANTD_CLIENT_RESOLVE_REQUEST; + htdocs(rq, path); + strcat(path, url); + LOG("URL is : %s", url); + LOG("Resource Path is : %s", path); + //if (path[strlen(path) - 1] == '/') + // strcat(path, "index.html"); + if (stat(path, &st) == -1) + { + free(task); + rqp = strdup(url); + oldrqp = rqp; + trim(rqp, '/'); + newurl = strsep(&rqp, "/"); + if (!rqp) + rqp = strdup("/"); + else + rqp = strdup(rqp); + dput(rq->request, "RESOURCE_PATH", rqp); + LOG("Execute plugin %s", newurl); + task = execute_plugin(rq, newurl); + free(oldrqp); + return task; + } + else + { + if (S_ISDIR(st.st_mode)) + { + strcat(path, "/index.html"); + if (stat(path, &st) == -1) + { + chain_t it; + for_each_assoc(it, server_config.handlers) + { + newurl = __s("%s/index.%s", url, it->key); + memset(path, 0, sizeof(path)); + htdocs(rq, path); + strcat(path, newurl); + if (stat(path, &st) != 0) + { + free(newurl); + newurl = NULL; + } + else + { + i = server_config.handlers->cap; + break; + } + } + if (!newurl) + { + antd_error(rq->client, 404, "Resource Not Found"); + return task; + } + //if(url) free(url); this is freed in the dput function + url = newurl; + dput(rq->request, "RESOURCE_PATH", url); + } + } + dput(rq->request, "ABS_RESOURCE_PATH", strdup(path)); + // check if the mime is supported + // if the mime is not supported + // find an handler plugin to process it + // if the plugin is not found, forbidden access to the file should be sent + char *mime_type = mime(path); + dput(rq->request, "RESOURCE_MIME", strdup(mime_type)); + if (strcmp(mime_type, "application/octet-stream") == 0) + { + char *ex = ext(path); + char *h = NULL; + if (ex) + { + h = dvalue(server_config.handlers, ex); + free(ex); + } + if (h) + { + //sprintf(path,"/%s%s",h,url); + //LOG("WARNING::::Access octetstream via handle %s", h); + //if(execute_plugin(client,buf,method,rq) < 0) + // cannot_execute(client); + free(task); + return execute_plugin(rq, h); + } + else + antd_error(rq->client, 403, "Access forbidden"); + } + else + { + // discard all request data + dictionary_t headers = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER"); + if (headers) + { + char *sclen = (char *)dvalue(headers, "Content-Length"); + unsigned clen = 0; + unsigned read = 0; + int count; + if (sclen) + { + clen = atoi(sclen); + while (read < clen) + { + count = antd_recv(rq->client, path, sizeof(path) < clen ? sizeof(path) : clen); + if (count <= 0) + break; + read += count; + } + } + } + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE); + task->handle = serve_file; + } + return task; + } } void *finish_request(void *data) { - if (!data) - return NULL; - destroy_request(data); - server_config.connection--; - LOG("Remaining connection %d", server_config.connection); - return NULL; + if (!data) + return NULL; + destroy_request(data); + server_config.connection--; + LOG("Remaining connection %d", server_config.connection); + return NULL; } int rule_check(const char *k, const char *v, const char *host, const char *_url, const char *_query, char *buf) { - // first perfom rule check on host, if not success, perform on url - regmatch_t key_matches[10]; - regmatch_t val_matches[2]; - char *query = strdup(_query); - char *url = strdup(_url); - int ret; - char *target; - char *tmp, rep[10]; - int idx = 0; - memset(rep, 0, 10); - LOG("Verify %s on %s or %s", k, url, host); - // 1 group - if (!host || !(ret = regex_match(k, host, 10, key_matches))) - { - target = url; - ret = regex_match(k, url, 10, key_matches); - } - else - target = (char *)host; + // first perfom rule check on host, if not success, perform on url + regmatch_t key_matches[10]; + regmatch_t val_matches[2]; + char *query = strdup(_query); + char *url = strdup(_url); + int ret; + char *target; + char *tmp, rep[10]; + int idx = 0; + memset(rep, 0, 10); + LOG("Verify %s on %s or %s", k, url, host); + // 1 group + if (!host || !(ret = regex_match(k, host, 10, key_matches))) + { + target = url; + ret = regex_match(k, url, 10, key_matches); + } + else + target = (char *)host; - if (!ret) - { - free(url); - free(query); - return 0; - } - LOG("Match found on %s", target); - tmp = (char *)v; - char *search = "<([a-zA-Z0-9]+)>"; - while ((ret = regex_match(search, tmp, 2, val_matches))) - { - memcpy(buf + idx, tmp, val_matches[1].rm_so - 1); - idx += val_matches[1].rm_so - 1; - memcpy(rep, tmp + val_matches[1].rm_so, val_matches[1].rm_eo - val_matches[1].rm_so); - if (strcasecmp(rep, "url") == 0) - { - memcpy(buf + idx, url, strlen(url)); - idx += strlen(url); - } - else if (strcasecmp(rep, "query") == 0) - { - memcpy(buf + idx, query, strlen(query)); - idx += strlen(query); - } - else if (match_int(rep)) - { - int i = atoi(rep); - memcpy(buf + idx, target + key_matches[i].rm_so, key_matches[i].rm_eo - key_matches[i].rm_so); - idx += key_matches[i].rm_eo - key_matches[i].rm_so; - } - else - { // just keep it - memcpy(buf + idx, tmp + val_matches[1].rm_so - 1, val_matches[1].rm_eo + 2 - val_matches[1].rm_so); - idx += val_matches[1].rm_eo + 2 - val_matches[1].rm_so; - } - tmp += val_matches[1].rm_eo + 1; - //break; - } - // now modify the match 2 group - if (idx > 0) - { - if (tmp) - { - // copy the remainning of tmp - memcpy(buf + idx, tmp, strlen(tmp)); - idx += strlen(tmp); - } - buf[idx] = '\0'; - } - free(url); - free(query); - LOG("New URI is %s", buf); - return 1; + if (!ret) + { + free(url); + free(query); + return 0; + } + LOG("Match found on %s", target); + tmp = (char *)v; + char *search = "<([a-zA-Z0-9]+)>"; + while ((ret = regex_match(search, tmp, 2, val_matches))) + { + memcpy(buf + idx, tmp, val_matches[1].rm_so - 1); + idx += val_matches[1].rm_so - 1; + memcpy(rep, tmp + val_matches[1].rm_so, val_matches[1].rm_eo - val_matches[1].rm_so); + if (strcasecmp(rep, "url") == 0) + { + memcpy(buf + idx, url, strlen(url)); + idx += strlen(url); + } + else if (strcasecmp(rep, "query") == 0) + { + memcpy(buf + idx, query, strlen(query)); + idx += strlen(query); + } + else if (match_int(rep)) + { + int i = atoi(rep); + memcpy(buf + idx, target + key_matches[i].rm_so, key_matches[i].rm_eo - key_matches[i].rm_so); + idx += key_matches[i].rm_eo - key_matches[i].rm_so; + } + else + { // just keep it + memcpy(buf + idx, tmp + val_matches[1].rm_so - 1, val_matches[1].rm_eo + 2 - val_matches[1].rm_so); + idx += val_matches[1].rm_eo + 2 - val_matches[1].rm_so; + } + tmp += val_matches[1].rm_eo + 1; + //break; + } + // now modify the match 2 group + if (idx > 0) + { + if (tmp) + { + // copy the remainning of tmp + memcpy(buf + idx, tmp, strlen(tmp)); + idx += strlen(tmp); + } + buf[idx] = '\0'; + } + free(url); + free(query); + LOG("New URI is %s", buf); + return 1; } void *serve_file(void *data) { - antd_request_t *rq = (antd_request_t *)data; - antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - char *path = (char *)dvalue(rq->request, "ABS_RESOURCE_PATH"); - char *mime_type = (char *)dvalue(rq->request, "RESOURCE_MIME"); - rq->client->state = ANTD_CLIENT_SERVE_FILE; - struct stat st; - int s = stat(path, &st); + antd_request_t *rq = (antd_request_t *)data; + antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + char *path = (char *)dvalue(rq->request, "ABS_RESOURCE_PATH"); + char *mime_type = (char *)dvalue(rq->request, "RESOURCE_MIME"); + rq->client->state = ANTD_CLIENT_SERVE_FILE; + struct stat st; + int s = stat(path, &st); - if (s == -1) - { - antd_error(rq->client, 404, "File not found"); - } - else - { - // check if it is modified - dictionary_t header = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER"); - char *last_modif_since = (char *)dvalue(header, "If-Modified-Since"); - time_t t = st.st_ctime; - struct tm tm; - if (last_modif_since) - { - strptime(last_modif_since, "%a, %d %b %Y %H:%M:%S GMT", &tm); - t = timegm(&tm); - //t = mktime(localtime(&t)); - } + if (s == -1) + { + antd_error(rq->client, 404, "File not found"); + } + else + { + // check if it is modified + dictionary_t header = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER"); + char *last_modif_since = (char *)dvalue(header, "If-Modified-Since"); + time_t t = st.st_ctime; + struct tm tm; + if (last_modif_since) + { + strptime(last_modif_since, "%a, %d %b %Y %H:%M:%S GMT", &tm); + t = timegm(&tm); + //t = mktime(localtime(&t)); + } - if (last_modif_since && st.st_ctime == t) - { - // return the not changed - antd_error(rq->client, 304, ""); - } - else - { - int size = (int)st.st_size; - char ibuf[64]; - snprintf(ibuf, sizeof(ibuf), "%d", size); - antd_response_header_t rhd; - rhd.cookie = NULL; - rhd.status = 200; - rhd.header = dict(); - dput(rhd.header, "Content-Type", strdup(mime_type)); + if (last_modif_since && st.st_ctime == t) + { + // return the not changed + antd_error(rq->client, 304, ""); + } + else + { + int size = (int)st.st_size; + char ibuf[64]; + snprintf(ibuf, sizeof(ibuf), "%d", size); + antd_response_header_t rhd; + rhd.cookie = NULL; + rhd.status = 200; + rhd.header = dict(); + dput(rhd.header, "Content-Type", strdup(mime_type)); #ifdef USE_ZLIB - if (!compressable(mime_type) || rq->client->z_level == ANTD_CNONE) + if (!compressable(mime_type) || rq->client->z_level == ANTD_CNONE) #endif - dput(rhd.header, "Content-Length", strdup(ibuf)); - gmtime_r(&st.st_ctime, &tm); - strftime(ibuf, 64, "%a, %d %b %Y %H:%M:%S GMT", &tm); - dput(rhd.header, "Last-Modified", strdup(ibuf)); - dput(rhd.header, "Cache-Control", strdup("no-cache")); - antd_send_header(rq->client, &rhd); + dput(rhd.header, "Content-Length", strdup(ibuf)); + gmtime_r(&st.st_ctime, &tm); + strftime(ibuf, 64, "%a, %d %b %Y %H:%M:%S GMT", &tm); + dput(rhd.header, "Last-Modified", strdup(ibuf)); + dput(rhd.header, "Cache-Control", strdup("no-cache")); + antd_send_header(rq->client, &rhd); - __f(rq->client, path); - } - } + __f(rq->client, path); + } + } - return task; + return task; } int startup(unsigned *port) { - int httpd = 0; - struct sockaddr_in name; - httpd = socket(PF_INET, SOCK_STREAM, 0); - if (httpd == -1) - { - ERROR("Port %d - socket: %s", *port, strerror(errno)); - return -1; - } + int httpd = 0; + struct sockaddr_in name; + httpd = socket(PF_INET, SOCK_STREAM, 0); + if (httpd == -1) + { + ERROR("Port %d - socket: %s", *port, strerror(errno)); + return -1; + } - if (setsockopt(httpd, SOL_SOCKET, SO_REUSEADDR, &(int){1}, sizeof(int)) == -1) - { - ERROR("Unable to set reuse address on port %d - setsockopt: %s", *port, strerror(errno)); - } + if (setsockopt(httpd, SOL_SOCKET, SO_REUSEADDR, &(int){1}, sizeof(int)) == -1) + { + ERROR("Unable to set reuse address on port %d - setsockopt: %s", *port, strerror(errno)); + } - memset(&name, 0, sizeof(name)); - name.sin_family = AF_INET; - name.sin_port = htons(*port); - name.sin_addr.s_addr = htonl(INADDR_ANY); - if (bind(httpd, (struct sockaddr *)&name, sizeof(name)) < 0) - { - ERROR("Port %d -bind: %s", *port, strerror(errno)); - return -1; - } - if (*port == 0) /* if dynamically allocating a port */ - { - socklen_t namelen = sizeof(name); - if (getsockname(httpd, (struct sockaddr *)&name, &namelen) == -1) - { - ERROR("Port %d - getsockname: %s", *port, strerror(errno)); - return -1; - } - *port = ntohs(name.sin_port); - } + memset(&name, 0, sizeof(name)); + name.sin_family = AF_INET; + name.sin_port = htons(*port); + name.sin_addr.s_addr = htonl(INADDR_ANY); + if (bind(httpd, (struct sockaddr *)&name, sizeof(name)) < 0) + { + ERROR("Port %d -bind: %s", *port, strerror(errno)); + return -1; + } + if (*port == 0) /* if dynamically allocating a port */ + { + socklen_t namelen = sizeof(name); + if (getsockname(httpd, (struct sockaddr *)&name, &namelen) == -1) + { + ERROR("Port %d - getsockname: %s", *port, strerror(errno)); + return -1; + } + *port = ntohs(name.sin_port); + } - LOG("back log is %d", server_config.backlog); - if (listen(httpd, server_config.backlog) < 0) - { - ERROR("Port %d - listen: %s", *port, strerror(errno)); - return -1; - } - return (httpd); + LOG("back log is %d", server_config.backlog); + if (listen(httpd, server_config.backlog) < 0) + { + ERROR("Port %d - listen: %s", *port, strerror(errno)); + return -1; + } + return (httpd); } char *apply_rules(dictionary_t rules, const char *host, char *url) { - // rule check - char *query_string = url; - while ((*query_string != '?') && (*query_string != '\0')) - query_string++; - if (*query_string == '?') - { - *query_string = '\0'; - query_string++; - } - //char* oldurl = strdup(url); - chain_t it; - char *k; - char *v; - for_each_assoc(it, rules) - { - k = it->key; - v = (char *)it->value; - // 1 group - if (rule_check(k, v, host, url, query_string, url)) - { - query_string = url; + // rule check + char *query_string = url; + while ((*query_string != '?') && (*query_string != '\0')) + query_string++; + if (*query_string == '?') + { + *query_string = '\0'; + query_string++; + } + //char* oldurl = strdup(url); + chain_t it; + char *k; + char *v; + for_each_assoc(it, rules) + { + k = it->key; + v = (char *)it->value; + // 1 group + if (rule_check(k, v, host, url, query_string, url)) + { + query_string = url; - while ((*query_string != '?') && (*query_string != '\0')) - query_string++; - if (*query_string == '?') - { - *query_string = '\0'; - query_string++; - } - } - } + while ((*query_string != '?') && (*query_string != '\0')) + query_string++; + if (*query_string == '?') + { + *query_string = '\0'; + query_string++; + } + } + } - return strdup(query_string); + return strdup(query_string); } static void *proxy_monitor(void *data) { - antd_request_t *rq = (antd_request_t *)data; - rq->client->state = ANTD_CLIENT_PROXY_MONITOR; - antd_client_t *proxy = (antd_client_t *)dvalue(rq->request, "PROXY_HANDLE"); - antd_task_t *task = antd_create_task(NULL, data, NULL, rq->client->last_io); - int pret, ret, sz1 = 0, sz2 = 0; - char *buf = NULL; - buf = (char *)malloc(BUFFLEN); - struct pollfd pfd[1]; - memset(pfd, 0, sizeof(pfd)); - pfd[0].fd = proxy->sock; - pfd[0].events = POLLIN; - ret = 1; + antd_request_t *rq = (antd_request_t *)data; + rq->client->state = ANTD_CLIENT_PROXY_MONITOR; + antd_client_t *proxy = (antd_client_t *)dvalue(rq->request, "PROXY_HANDLE"); + antd_task_t *task = antd_create_task(NULL, data, NULL, rq->client->last_io); + int pret, ret, sz1 = 0, sz2 = 0; + char *buf = NULL; + buf = (char *)malloc(BUFFLEN); + struct pollfd pfd[1]; + memset(pfd, 0, sizeof(pfd)); + pfd[0].fd = proxy->sock; + pfd[0].events = POLLIN; + ret = 1; - do - { - sz1 = antd_recv_upto(rq->client, buf, BUFFLEN); + do + { + sz1 = antd_recv_upto(rq->client, buf, BUFFLEN); - if ((sz1 < 0) || (sz1 > 0 && antd_send(proxy, buf, sz1) != sz1)) - { - ret = 0; - break; - } - pret = poll(pfd, 1, 0); - if ( pret < 0) - { - (void)close(proxy->sock); - return task; - } - sz2 = 0; - if(pret > 0 && (pfd[0].revents & POLLIN)) - { - sz2 = antd_recv_upto(proxy, buf, BUFFLEN); - if (sz2 <= 0 || (sz2 > 0 && antd_send(rq->client, buf, sz2) != sz2)) - { - ret = 0; - break; - } - } - if ( (pret > 0) && ( - pfd[0].revents & POLLERR || - pfd[0].revents & POLLRDHUP || - pfd[0].revents & POLLHUP || - pfd[0].revents & POLLNVAL)) - { - ret = 0; - break; - } - } while (sz1 > 0 || sz2 > 0); - free(buf); + if ((sz1 < 0) || (sz1 > 0 && antd_send(proxy, buf, sz1) != sz1)) + { + ret = 0; + break; + } + pret = poll(pfd, 1, 0); + if ( pret < 0) + { + (void)close(proxy->sock); + return task; + } + sz2 = 0; + if(pret > 0 && (pfd[0].revents & POLLIN)) + { + sz2 = antd_recv_upto(proxy, buf, BUFFLEN); + if (sz2 <= 0 || (sz2 > 0 && antd_send(rq->client, buf, sz2) != sz2)) + { + ret = 0; + break; + } + } + if ( (pret > 0) && ( + pfd[0].revents & POLLERR || + pfd[0].revents & POLLRDHUP || + pfd[0].revents & POLLHUP || + pfd[0].revents & POLLNVAL)) + { + ret = 0; + break; + } + } while (sz1 > 0 || sz2 > 0); + free(buf); - if (ret == 0) - { - (void)close(proxy->sock); - return task; - } + if (ret == 0) + { + (void)close(proxy->sock); + return task; + } - if(pfd[0].revents & POLLIN) - { - antd_task_bind_event(task, proxy->sock, 0, TASK_EVT_ON_READABLE); - } - else - { - antd_task_bind_event(task, proxy->sock, 50u, TASK_EVT_ON_TIMEOUT); - } - task->handle = proxy_monitor; - task->access_time = rq->client->last_io; - - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE); - return task; + if(pfd[0].revents & POLLIN) + { + antd_task_bind_event(task, proxy->sock, 0, TASK_EVT_ON_READABLE); + } + else + { + antd_task_bind_event(task, proxy->sock, 50u, TASK_EVT_ON_TIMEOUT); + } + task->handle = proxy_monitor; + task->access_time = rq->client->last_io; + + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE); + return task; } static void *proxify(void *data) { - int sock_fd, size, ret; - char *str = NULL; - chain_t it; - antd_request_t *rq = (antd_request_t *)data; - antd_client_t *proxy = NULL; - rq->client->state = ANTD_CLIENT_RESOLVE_REQUEST; - char *host = dvalue(rq->request, "PROXY_HOST"); - int port = atoi(dvalue(rq->request, "PROXY_PORT")); - char *path = dvalue(rq->request, "PROXY_PATH"); - char *query = dvalue(rq->request, "PROXY_QUERY"); - char* ptr, *ip; - dictionary_t xheader = dvalue(rq->request, "REQUEST_HEADER"); - antd_task_t *task = antd_create_task(NULL, data, NULL, rq->client->last_io); - if (!xheader) - { - antd_error(rq->client, 400, "Badd Request"); - return task; - } - pthread_mutex_lock(&server_mux); - ip = NULL; - // ip_from_host is not threadsafe, need to lock it - ptr = ip_from_hostname(host); - if(ptr) - { - ip = strdup(ptr); - } - pthread_mutex_unlock(&server_mux); + int sock_fd, size, ret; + char *str = NULL; + chain_t it; + antd_request_t *rq = (antd_request_t *)data; + antd_client_t *proxy = NULL; + rq->client->state = ANTD_CLIENT_RESOLVE_REQUEST; + char *host = dvalue(rq->request, "PROXY_HOST"); + int port = atoi(dvalue(rq->request, "PROXY_PORT")); + char *path = dvalue(rq->request, "PROXY_PATH"); + char *query = dvalue(rq->request, "PROXY_QUERY"); + char* ptr, *ip; + dictionary_t xheader = dvalue(rq->request, "REQUEST_HEADER"); + antd_task_t *task = antd_create_task(NULL, data, NULL, rq->client->last_io); + if (!xheader) + { + antd_error(rq->client, 400, "Badd Request"); + return task; + } + pthread_mutex_lock(&server_mux); + ip = NULL; + // ip_from_host is not threadsafe, need to lock it + ptr = ip_from_hostname(host); + if(ptr) + { + ip = strdup(ptr); + } + pthread_mutex_unlock(&server_mux); - if(!ip) - { - antd_error(rq->client, 502, "Badd address"); - return task; - } + if(!ip) + { + antd_error(rq->client, 502, "Badd address"); + return task; + } - sock_fd = request_socket(ip, port); - free(ip); - if (sock_fd == -1) - { - antd_error(rq->client, 503, "Service Unavailable"); - return task; - } - set_nonblock(sock_fd); - /*struct timeval timeout; - timeout.tv_sec = 2; - timeout.tv_usec = 0; //POLL_EVENT_TO*1000; - if (setsockopt(sock_fd, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout, sizeof(timeout)) < 0) - { - ERROR("setsockopt failed:%s", strerror(errno)); - antd_error(rq->client, 500, "Internal proxy error"); - (void)close(sock_fd); - return task; - } + sock_fd = request_socket(ip, port); + free(ip); + if (sock_fd == -1) + { + antd_error(rq->client, 503, "Service Unavailable"); + return task; + } + set_nonblock(sock_fd); + /*struct timeval timeout; + timeout.tv_sec = 2; + timeout.tv_usec = 0; //POLL_EVENT_TO*1000; + if (setsockopt(sock_fd, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout, sizeof(timeout)) < 0) + { + ERROR("setsockopt failed:%s", strerror(errno)); + antd_error(rq->client, 500, "Internal proxy error"); + (void)close(sock_fd); + return task; + } - if (setsockopt(sock_fd, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout, sizeof(timeout)) < 0) + if (setsockopt(sock_fd, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout, sizeof(timeout)) < 0) { ERROR("setsockopt failed:%s", strerror(errno)); antd_error(rq->client, 500, "Internal proxy error"); @@ -907,46 +908,46 @@ static void *proxify(void *data) return task; }*/ - proxy = (antd_client_t *)malloc(sizeof(antd_client_t)); - proxy->sock = sock_fd; - proxy->ssl = NULL; - proxy->zstream = NULL; - proxy->z_level = ANTD_CNONE; - time(&proxy->last_io); + proxy = (antd_client_t *)malloc(sizeof(antd_client_t)); + proxy->sock = sock_fd; + proxy->ssl = NULL; + proxy->zstream = NULL; + proxy->z_level = ANTD_CNONE; + time(&proxy->last_io); - // store content length here - dput(rq->request, "PROXY_HANDLE", proxy); + // store content length here + dput(rq->request, "PROXY_HANDLE", proxy); - str = __s("%s %s?%s HTTP/1.1\r\n", (char *)dvalue(rq->request, "METHOD"), path, query); - size = strlen(str); - ret = antd_send(proxy, str, size); - free(str); - if (ret != size) - { - antd_error(rq->client, 500, ""); - (void)close(sock_fd); - return task; - } - for_each_assoc(it, xheader) - { - str = __s("%s: %s\r\n", it->key, (char *)it->value); - size = strlen(str); - ret = antd_send(proxy, str, size); - free(str); - if (ret != size) - { - antd_error(rq->client, 500, ""); - (void)close(sock_fd); - return task; - } - } - (void)antd_send(proxy, "\r\n", 2); - // now monitor the proxy - task->handle = proxy_monitor; - task->access_time = rq->client->last_io; - // register event - antd_task_bind_event(task, proxy->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE); - return task; + str = __s("%s %s?%s HTTP/1.1\r\n", (char *)dvalue(rq->request, "METHOD"), path, query); + size = strlen(str); + ret = antd_send(proxy, str, size); + free(str); + if (ret != size) + { + antd_error(rq->client, 500, ""); + (void)close(sock_fd); + return task; + } + for_each_assoc(it, xheader) + { + str = __s("%s: %s\r\n", it->key, (char *)it->value); + size = strlen(str); + ret = antd_send(proxy, str, size); + free(str); + if (ret != size) + { + antd_error(rq->client, 500, ""); + (void)close(sock_fd); + return task; + } + } + (void)antd_send(proxy, "\r\n", 2); + // now monitor the proxy + task->handle = proxy_monitor; + task->access_time = rq->client->last_io; + // register event + antd_task_bind_event(task, proxy->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE); + return task; } /** * Check if the current request is e reverse proxy @@ -954,42 +955,42 @@ static void *proxify(void *data) */ static void *check_proxy(antd_request_t *rq, const char *path, const char *query) { - char *pattern = "^(https?)://([^:]+):([0-9]+)(.*)$"; - antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - char buff[256]; - regmatch_t matches[5]; - int ret, size; - ret = regex_match(pattern, path, 5, matches); + char *pattern = "^(https?)://([^:]+):([0-9]+)(.*)$"; + antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + char buff[256]; + regmatch_t matches[5]; + int ret, size; + ret = regex_match(pattern, path, 5, matches); - if (!ret) - { - return NULL; - } + if (!ret) + { + return NULL; + } - if (matches[1].rm_eo - matches[1].rm_so == 5) - { - // https is not supported for now - // TODO add https support - antd_error(rq->client, 503, "Service Unavailable"); - return task; - } - // http proxy request - size = matches[2].rm_eo - matches[2].rm_so < (int)sizeof(buff) ? matches[2].rm_eo - matches[2].rm_so : (int)sizeof(buff); - (void)memcpy(buff, path + matches[2].rm_so, size); - buff[size] = '\0'; - dput(rq->request, "PROXY_HOST", strdup(buff)); + if (matches[1].rm_eo - matches[1].rm_so == 5) + { + // https is not supported for now + // TODO add https support + antd_error(rq->client, 503, "Service Unavailable"); + return task; + } + // http proxy request + size = matches[2].rm_eo - matches[2].rm_so < (int)sizeof(buff) ? matches[2].rm_eo - matches[2].rm_so : (int)sizeof(buff); + (void)memcpy(buff, path + matches[2].rm_so, size); + buff[size] = '\0'; + dput(rq->request, "PROXY_HOST", strdup(buff)); - size = matches[3].rm_eo - matches[3].rm_so < (int)sizeof(buff) ? matches[3].rm_eo - matches[3].rm_so : (int)sizeof(buff); - (void)memcpy(buff, path + matches[3].rm_so, size); - buff[size] = '\0'; - dput(rq->request, "PROXY_PORT", strdup(buff)); + size = matches[3].rm_eo - matches[3].rm_so < (int)sizeof(buff) ? matches[3].rm_eo - matches[3].rm_so : (int)sizeof(buff); + (void)memcpy(buff, path + matches[3].rm_so, size); + buff[size] = '\0'; + dput(rq->request, "PROXY_PORT", strdup(buff)); - dput(rq->request, "PROXY_PATH", strdup(path + matches[4].rm_so)); - dput(rq->request, "PROXY_QUERY", strdup(query)); + dput(rq->request, "PROXY_PATH", strdup(path + matches[4].rm_so)); + dput(rq->request, "PROXY_QUERY", strdup(query)); - task->handle = proxify; - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE); - return task; + task->handle = proxify; + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE); + return task; } /** * Decode the HTTP request header @@ -997,254 +998,254 @@ static void *check_proxy(antd_request_t *rq, const char *path, const char *query void *decode_request_header(void *data) { - antd_request_t *rq = (antd_request_t *)data; - rq->client->state = ANTD_CLIENT_HEADER_DECODE; - dictionary_t cookie = NULL; - char *line; - char *token; - char *query = NULL; - char *host = NULL; - char buf[2 * BUFFLEN]; - int header_size = 0; - int ret; - char *url = (char *)dvalue(rq->request, "REQUEST_QUERY"); - dictionary_t xheader = dvalue(rq->request, "REQUEST_HEADER"); - dictionary_t request = dvalue(rq->request, "REQUEST_DATA"); - char *port_s = (char *)dvalue(rq->request, "SERVER_PORT"); - port_config_t *pcnf = (port_config_t *)dvalue(server_config.ports, port_s); - antd_task_t *task; - // first real all header - // this for check if web socket is enabled + antd_request_t *rq = (antd_request_t *)data; + rq->client->state = ANTD_CLIENT_HEADER_DECODE; + dictionary_t cookie = NULL; + char *line; + char *token; + char *query = NULL; + char *host = NULL; + char buf[2 * BUFFLEN]; + int header_size = 0; + int ret; + char *url = (char *)dvalue(rq->request, "REQUEST_QUERY"); + dictionary_t xheader = dvalue(rq->request, "REQUEST_HEADER"); + dictionary_t request = dvalue(rq->request, "REQUEST_DATA"); + char *port_s = (char *)dvalue(rq->request, "SERVER_PORT"); + port_config_t *pcnf = (port_config_t *)dvalue(server_config.ports, port_s); + antd_task_t *task; + // first real all header + // this for check if web socket is enabled - while (((ret = read_buf(rq->client, buf, sizeof(buf))) > 0) && strcmp("\r\n", buf)) - { - header_size += ret; - line = buf; - trim(line, '\n'); - trim(line, '\r'); - token = strsep(&line, ":"); - trim(token, ' '); - trim(line, ' '); - if (token && line && strlen(line) > 0) - { - verify_header(token); - dput(xheader, token, strdup(line)); - } - if (token != NULL && strcasecmp(token, "Cookie") == 0) - { - if (!cookie) - { - cookie = dict(); - } - decode_cookie(line, cookie); - } - else if (token != NULL && strcasecmp(token, "Host") == 0) - { - host = strdup(line); - } - if (header_size > HEADER_MAX_SIZE) - { - antd_error(rq->client, 413, "Payload Too Large"); - ERROR("Header size too large (%d): %d vs %d", rq->client->sock, header_size, HEADER_MAX_SIZE); - task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - return task; - } - } - if (ret == 0) - { - //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); - task = antd_create_task(decode_request_header, (void *)rq, NULL, rq->client->last_io); - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE); - return task; - } - // check for content length size - line = (char *)dvalue(xheader, "Content-Length"); - if (line) - { - int clen = atoi(line); - if (clen > server_config.max_upload_size) - { - antd_error(rq->client, 413, "Request body data is too large"); - // dirty fix, wait for message to be sent - // 100 ms sleep - usleep(100000); - task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - return task; - } - } + while (((ret = read_buf(rq->client, buf, sizeof(buf))) > 0) && strcmp("\r\n", buf)) + { + header_size += ret; + line = buf; + trim(line, '\n'); + trim(line, '\r'); + token = strsep(&line, ":"); + trim(token, ' '); + trim(line, ' '); + if (token && line && strlen(line) > 0) + { + verify_header(token); + dput(xheader, token, strdup(line)); + } + if (token != NULL && strcasecmp(token, "Cookie") == 0) + { + if (!cookie) + { + cookie = dict(); + } + decode_cookie(line, cookie); + } + else if (token != NULL && strcasecmp(token, "Host") == 0) + { + host = strdup(line); + } + if (header_size > HEADER_MAX_SIZE) + { + antd_error(rq->client, 413, "Payload Too Large"); + ERROR("Header size too large (%d): %d vs %d", rq->client->sock, header_size, HEADER_MAX_SIZE); + task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + return task; + } + } + if (ret == 0) + { + //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); + task = antd_create_task(decode_request_header, (void *)rq, NULL, rq->client->last_io); + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE); + return task; + } + // check for content length size + line = (char *)dvalue(xheader, "Content-Length"); + if (line) + { + int clen = atoi(line); + if (clen > server_config.max_upload_size) + { + antd_error(rq->client, 413, "Request body data is too large"); + // dirty fix, wait for message to be sent + // 100 ms sleep + usleep(100000); + task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + return task; + } + } #ifdef USE_ZLIB - // check for gzip - line = (char *)dvalue(xheader, "Accept-Encoding"); - if (line) - { - if (regex_match("gzip", line, 0, NULL)) - { - rq->client->z_level = ANTD_CGZ; - } - else if (regex_match("deflate", line, 0, NULL)) - { - rq->client->z_level = ANTD_CDEFL; - } - else - { - rq->client->z_level = ANTD_CNONE; - } - } - else - { - rq->client->z_level = ANTD_CNONE; - } + // check for gzip + line = (char *)dvalue(xheader, "Accept-Encoding"); + if (line) + { + if (regex_match("gzip", line, 0, NULL)) + { + rq->client->z_level = ANTD_CGZ; + } + else if (regex_match("deflate", line, 0, NULL)) + { + rq->client->z_level = ANTD_CDEFL; + } + else + { + rq->client->z_level = ANTD_CNONE; + } + } + else + { + rq->client->z_level = ANTD_CNONE; + } #endif - //if(line) free(line); - memset(buf, 0, sizeof(buf)); - strncat(buf, url, sizeof(buf) - 1); - LOG("Original query (%d): %s", rq->client->sock, url); - query = apply_rules(pcnf->rules, host, buf); - LOG("Processed query: %s", query); - if (cookie) - dput(rq->request, "COOKIE", cookie); - if (host) - free(host); + //if(line) free(line); + memset(buf, 0, sizeof(buf)); + strncat(buf, url, sizeof(buf) - 1); + LOG("Original query (%d): %s", rq->client->sock, url); + query = apply_rules(pcnf->rules, host, buf); + LOG("Processed query: %s", query); + if (cookie) + dput(rq->request, "COOKIE", cookie); + if (host) + free(host); - // check if this is a reverse proxy ? - task = check_proxy(rq, buf, query); - if (task) - { - if (query) - free(query); - return task; - } + // check if this is a reverse proxy ? + task = check_proxy(rq, buf, query); + if (task) + { + if (query) + free(query); + return task; + } - dput(rq->request, "RESOURCE_PATH", url_decode(buf)); - if (query) - { - decode_url_request(query, request); - free(query); - } - // header ok, now checkmethod - task = antd_create_task(decode_request, (void *)rq, NULL, rq->client->last_io); - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); // - return task; + dput(rq->request, "RESOURCE_PATH", url_decode(buf)); + if (query) + { + decode_url_request(query, request); + free(query); + } + // header ok, now checkmethod + task = antd_create_task(decode_request, (void *)rq, NULL, rq->client->last_io); + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); // + return task; } void *decode_request(void *data) { - antd_request_t *rq = (antd_request_t *)data; - dictionary_t headers = dvalue(rq->request, "REQUEST_HEADER"); - int ws = 0; - char *ws_key = NULL; - char *method = NULL; - char *tmp; - antd_task_t *task = NULL; - ws_key = (char *)dvalue(headers, "Sec-WebSocket-Key"); - tmp = (char *)dvalue(headers, "Upgrade"); - if (tmp && strcasecmp(tmp, "websocket") == 0) - ws = 1; - method = (char *)dvalue(rq->request, "METHOD"); - task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); - if (EQU(method, "GET")) - { - //if(ctype) free(ctype); - if (ws && ws_key != NULL) - { - ws_confirm_request(rq->client, ws_key); - // insert wsocket flag to request - // plugin should handle this ugraded connection - // not the server - dput(rq->request, "__web_socket__", strdup("1")); - } - // resolve task - task->handle = resolve_request; - return task; - } - else if (EQU(method, "HEAD") || EQU(method, "OPTIONS") || EQU(method, "DELETE")) - { - task->handle = resolve_request; - return task; - } - else if (EQU(method, "POST") || EQU(method, "PUT") || EQU(method, "PATCH")) - { - task->handle = resolve_request; - return task; - } - else - { - antd_error(rq->client, 501, "Request Method Not Implemented"); - return task; - } + antd_request_t *rq = (antd_request_t *)data; + dictionary_t headers = dvalue(rq->request, "REQUEST_HEADER"); + int ws = 0; + char *ws_key = NULL; + char *method = NULL; + char *tmp; + antd_task_t *task = NULL; + ws_key = (char *)dvalue(headers, "Sec-WebSocket-Key"); + tmp = (char *)dvalue(headers, "Upgrade"); + if (tmp && strcasecmp(tmp, "websocket") == 0) + ws = 1; + method = (char *)dvalue(rq->request, "METHOD"); + task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); + if (EQU(method, "GET")) + { + //if(ctype) free(ctype); + if (ws && ws_key != NULL) + { + ws_confirm_request(rq->client, ws_key); + // insert wsocket flag to request + // plugin should handle this ugraded connection + // not the server + dput(rq->request, "__web_socket__", strdup("1")); + } + // resolve task + task->handle = resolve_request; + return task; + } + else if (EQU(method, "HEAD") || EQU(method, "OPTIONS") || EQU(method, "DELETE")) + { + task->handle = resolve_request; + return task; + } + else if (EQU(method, "POST") || EQU(method, "PUT") || EQU(method, "PATCH")) + { + task->handle = resolve_request; + return task; + } + else + { + antd_error(rq->client, 501, "Request Method Not Implemented"); + return task; + } } void *decode_post_request(void *data) { - antd_request_t *rq = (antd_request_t *)data; - rq->client->state = ANTD_CLIENT_RQ_DATA_DECODE; - dictionary_t request = dvalue(rq->request, "REQUEST_DATA"); - dictionary_t headers = dvalue(rq->request, "REQUEST_HEADER"); - char *ctype = NULL; - int clen = -1; - char *tmp; - antd_task_t *task = NULL; - ctype = (char *)dvalue(headers, "Content-Type"); - tmp = (char *)dvalue(headers, "Content-Length"); - if (tmp) - clen = atoi(tmp); - char *method = (char *)dvalue(rq->request, "METHOD"); - task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); - if (!method || (!EQU(method, "POST") && !EQU(method, "PUT") && !EQU(method, "PATCH"))) - return task; - if (ctype == NULL || clen == -1) - { - antd_error(rq->client, 400, "Bad Request, missing content description"); - return task; - } - // decide what to do with the data - if (strstr(ctype, FORM_URL_ENCODE)) - { - char *pquery = post_data_decode(rq->client, clen); - if (pquery) - { - decode_url_request(pquery, request); - free(pquery); - } - else if (clen > 0) - { - // WARN: this may not work on ssl socket - // antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE); - // task->handle = decode_post_request; - antd_error(rq->client, 400, "Bad Request, missing content data"); - return task; - } - } - else if (strstr(ctype, FORM_MULTI_PART)) - { - free(task); - return decode_multi_part_request(rq, ctype); - } - else - { - char *pquery = post_data_decode(rq->client, clen); - char *key = strstr(ctype, "/"); - if (key) - key++; - else - key = ctype; - if (pquery) - { - dput(request, key, pquery); - } - else if (clen > 0) - { - //task->handle = decode_post_request; - //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE); - antd_error(rq->client, 400, "Bad Request, missing content data"); - return task; - } - } - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE); - return task; + antd_request_t *rq = (antd_request_t *)data; + rq->client->state = ANTD_CLIENT_RQ_DATA_DECODE; + dictionary_t request = dvalue(rq->request, "REQUEST_DATA"); + dictionary_t headers = dvalue(rq->request, "REQUEST_HEADER"); + char *ctype = NULL; + int clen = -1; + char *tmp; + antd_task_t *task = NULL; + ctype = (char *)dvalue(headers, "Content-Type"); + tmp = (char *)dvalue(headers, "Content-Length"); + if (tmp) + clen = atoi(tmp); + char *method = (char *)dvalue(rq->request, "METHOD"); + task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); + if (!method || (!EQU(method, "POST") && !EQU(method, "PUT") && !EQU(method, "PATCH"))) + return task; + if (ctype == NULL || clen == -1) + { + antd_error(rq->client, 400, "Bad Request, missing content description"); + return task; + } + // decide what to do with the data + if (strstr(ctype, FORM_URL_ENCODE)) + { + char *pquery = post_data_decode(rq->client, clen); + if (pquery) + { + decode_url_request(pquery, request); + free(pquery); + } + else if (clen > 0) + { + // WARN: this may not work on ssl socket + // antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE); + // task->handle = decode_post_request; + antd_error(rq->client, 400, "Bad Request, missing content data"); + return task; + } + } + else if (strstr(ctype, FORM_MULTI_PART)) + { + free(task); + return decode_multi_part_request(rq, ctype); + } + else + { + char *pquery = post_data_decode(rq->client, clen); + char *key = strstr(ctype, "/"); + if (key) + key++; + else + key = ctype; + if (pquery) + { + dput(request, key, pquery); + } + else if (clen > 0) + { + //task->handle = decode_post_request; + //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE | TASK_EVT_ON_WRITABLE); + antd_error(rq->client, 400, "Bad Request, missing content data"); + return task; + } + } + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE); + return task; } /** @@ -1254,38 +1255,38 @@ void *decode_post_request(void *data) */ void ws_confirm_request(void *client, const char *key) { - char buf[256]; - char rkey[128]; - char sha_d[20]; - char base64[64]; - strncpy(rkey, key, sizeof(rkey) - 1); - int n = (int)sizeof(rkey) - (int)strlen(key); - if (n < 0) - n = 0; - strncat(rkey, WS_MAGIC_STRING, n); + char buf[256]; + char rkey[128]; + char sha_d[20]; + char base64[64]; + strncpy(rkey, key, sizeof(rkey) - 1); + int n = (int)sizeof(rkey) - (int)strlen(key); + if (n < 0) + n = 0; + strncat(rkey, WS_MAGIC_STRING, n); #ifdef USE_OPENSSL - SHA_CTX context; + SHA_CTX context; #else - SHA1_CTX context; + SHA1_CTX context; #endif - SHA1_Init(&context); - SHA1_Update(&context, rkey, strlen(rkey)); - SHA1_Final((uint8_t *)sha_d, &context); - Base64encode(base64, sha_d, 20); - // send accept to client - sprintf(buf, "HTTP/1.1 101 Switching Protocols\r\n"); - antd_send(client, buf, strlen(buf)); - sprintf(buf, "Upgrade: websocket\r\n"); - antd_send(client, buf, strlen(buf)); - sprintf(buf, "Connection: Upgrade\r\n"); - antd_send(client, buf, strlen(buf)); - sprintf(buf, "Sec-WebSocket-Accept: %s\r\n", base64); - antd_send(client, buf, strlen(buf)); - sprintf(buf, "\r\n"); - antd_send(client, buf, strlen(buf)); + SHA1_Init(&context); + SHA1_Update(&context, rkey, strlen(rkey)); + SHA1_Final((uint8_t *)sha_d, &context); + Base64encode(base64, sha_d, 20); + // send accept to client + sprintf(buf, "HTTP/1.1 101 Switching Protocols\r\n"); + antd_send(client, buf, strlen(buf)); + sprintf(buf, "Upgrade: websocket\r\n"); + antd_send(client, buf, strlen(buf)); + sprintf(buf, "Connection: Upgrade\r\n"); + antd_send(client, buf, strlen(buf)); + sprintf(buf, "Sec-WebSocket-Accept: %s\r\n", base64); + antd_send(client, buf, strlen(buf)); + sprintf(buf, "\r\n"); + antd_send(client, buf, strlen(buf)); - LOG("%s", "Websocket is now enabled for plugin"); + LOG("%s", "Websocket is now enabled for plugin"); } /** * Decode the cookie header to a dictionary @@ -1294,23 +1295,23 @@ void ws_confirm_request(void *client, const char *key) */ void decode_cookie(const char *line, dictionary_t dic) { - char *token, *token1; - char *cpstr = strdup(line); - char *orgcpy = cpstr; - trim(cpstr, ' '); - trim(cpstr, '\n'); - trim(cpstr, '\r'); + char *token, *token1; + char *cpstr = strdup(line); + char *orgcpy = cpstr; + trim(cpstr, ' '); + trim(cpstr, '\n'); + trim(cpstr, '\r'); - while ((token = strsep(&cpstr, ";"))) - { - trim(token, ' '); - token1 = strsep(&token, "="); - if (token1 && token && strlen(token) > 0) - { - dput(dic, token1, strdup(token)); - } - } - free(orgcpy); + while ((token = strsep(&cpstr, ";"))) + { + trim(token, ' '); + token1 = strsep(&token, "="); + if (token1 && token && strlen(token) > 0) + { + dput(dic, token1, strdup(token)); + } + } + free(orgcpy); } /** * Decode the multi-part form data from the POST request @@ -1318,186 +1319,189 @@ void decode_cookie(const char *line, dictionary_t dic) */ void *decode_multi_part_request(void *data, const char *ctype) { - char *boundary; - char line[BUFFLEN]; - char *str_copy = (char *)ctype; - int len; - antd_request_t *rq = (antd_request_t *)data; - antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - //antd_task_bind_event(task, rq->client->sock, 0, ); - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); - //dictionary dic = NULL; - boundary = strsep(&str_copy, "="); //discard first part - boundary = str_copy; - if (boundary && strlen(boundary) > 0) - { - //dic = dict(); - trim(boundary, ' '); - dput(rq->request, "MULTI_PART_BOUNDARY", strdup(boundary)); - //find first boundary - while (((len = read_buf(rq->client, line, sizeof(line))) > 0) && !strstr(line, boundary)) - ; - if (len > 0) - { - task->handle = decode_multi_part_request_data; - } - } - return task; + char *boundary; + char line[BUFFLEN]; + char *str_copy = (char *)ctype; + int len; + antd_request_t *rq = (antd_request_t *)data; + antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + //antd_task_bind_event(task, rq->client->sock, 0, ); + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); + //dictionary dic = NULL; + boundary = strsep(&str_copy, "="); //discard first part + boundary = str_copy; + if (boundary && strlen(boundary) > 0) + { + //dic = dict(); + trim(boundary, ' '); + dput(rq->request, "MULTI_PART_BOUNDARY", strdup(boundary)); + //find first boundary + while (((len = read_buf(rq->client, line, sizeof(line))) > 0) && !strstr(line, boundary)) + ; + if (len > 0) + { + task->handle = decode_multi_part_request_data; + } + } + return task; } void *decode_multi_part_request_data(void *data) { - // loop through each part separated by the boundary - char *line; - char *part_name = NULL; - char *part_file = NULL; - char *file_path; - char buf[BUFFLEN]; - char *field; - int len; - //dictionary dic = NULL; - FILE *fp = NULL; - char *token, *keytoken, *valtoken; - antd_request_t *rq = (antd_request_t *)data; - antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); - char *boundary = (char *)dvalue(rq->request, "MULTI_PART_BOUNDARY"); - dictionary_t dic = (dictionary_t)dvalue(rq->request, "REQUEST_DATA"); - // search for content disposition: - while (((len = read_buf(rq->client, buf, sizeof(buf))) > 0) && !strstr(buf, "Content-Disposition:")) - ; - ; - if (len <= 0 || !strstr(buf, "Content-Disposition:")) - { - return task; - } - char *boundend = __s("%s--", boundary); - line = buf; - // extract parameters from header - while ((token = strsep(&line, ";"))) - { - keytoken = strsep(&token, "="); - if (keytoken && strlen(keytoken) > 0) - { - trim(keytoken, ' '); - valtoken = strsep(&token, "="); - if (valtoken) - { - trim(valtoken, ' '); - trim(valtoken, '\n'); - trim(valtoken, '\r'); - trim(valtoken, '\"'); - if (strcmp(keytoken, "name") == 0) - { - part_name = strdup(valtoken); - } - else if (strcmp(keytoken, "filename") == 0) - { - part_file = strdup(valtoken); - } - } - } - } - line = NULL; - // get the binary data - if (part_name != NULL) - { - // go to the beginning of data bock - while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && strcmp(buf, "\r\n") != 0) - ; - ; + // loop through each part separated by the boundary + char *line; + char *part_name = NULL; + char *part_file = NULL; + char *file_path; + char buf[BUFFLEN]; + char *field; + int len; + //dictionary dic = NULL; + int fd = -1; + char *token, *keytoken, *valtoken; + antd_request_t *rq = (antd_request_t *)data; + antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); + char *boundary = (char *)dvalue(rq->request, "MULTI_PART_BOUNDARY"); + dictionary_t dic = (dictionary_t)dvalue(rq->request, "REQUEST_DATA"); + // search for content disposition: + while (((len = read_buf(rq->client, buf, sizeof(buf))) > 0) && !strstr(buf, "Content-Disposition:")) + ; + ; + if (len <= 0 || !strstr(buf, "Content-Disposition:")) + { + return task; + } + char *boundend = __s("%s--", boundary); + line = buf; + // extract parameters from header + while ((token = strsep(&line, ";"))) + { + keytoken = strsep(&token, "="); + if (keytoken && strlen(keytoken) > 0) + { + trim(keytoken, ' '); + valtoken = strsep(&token, "="); + if (valtoken) + { + trim(valtoken, ' '); + trim(valtoken, '\n'); + trim(valtoken, '\r'); + trim(valtoken, '\"'); + if (strcmp(keytoken, "name") == 0) + { + part_name = strdup(valtoken); + } + else if (strcmp(keytoken, "filename") == 0) + { + part_file = strdup(valtoken); + } + } + } + } + line = NULL; + // get the binary data + LOG("Part file: %s part name: %s", part_file, part_name); + if (part_name != NULL) + { + // go to the beginning of data bock + while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && strncmp(buf, "\r\n",2) != 0) + ; + ; - if (part_file == NULL) - { - /** - * WARNING: - * This allow only 1024 bytes of data (max), - * out of this range, the data is cut out. - * Need an efficient way to handle this - */ - len = read_buf(rq->client, buf, sizeof(buf)); - if (len > 0) - { - line = buf; - trim(line, '\n'); - trim(line, '\r'); - trim(line, ' '); - dput(dic, part_name, strdup(line)); - } - // find the next boundary - while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && !strstr(buf, boundary)) - { - line = buf; - } - } - else - { - file_path = __s("%s%s.%u", server_config.tmpdir, part_file, (unsigned)time(NULL)); - fp = fopen(file_path, "wb"); - if (fp) - { - int totalsize = 0, len = 0; - //read until the next boundary - // TODO: this is not efficient for big file - // need a solution - while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && !strstr(buf, boundary)) - { - fwrite(buf, len, 1, fp); - totalsize += len; - } - //remove \r\n at the end - fseek(fp, 0, SEEK_SET); - //fseek(fp,-2, SEEK_CUR); - totalsize -= 2; - int stat = ftruncate(fileno(fp), totalsize); - UNUSED(stat); - fclose(fp); - line = buf; + if (part_file == NULL) + { + /** + * WARNING: + * This allow only 1024 bytes of data (max), + * out of this range, the data is cut out. + * Need an efficient way to handle this + */ + len = read_buf(rq->client, buf, sizeof(buf)); + if (len > 0) + { + line = buf; + trim(line, '\n'); + trim(line, '\r'); + trim(line, ' '); + dput(dic, part_name, strdup(line)); + } + // find the next boundary + while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && !strstr(buf, boundary)) + { + line = buf; + } + } + else + { + file_path = __s("%s%s.%u", server_config.tmpdir, part_file, (unsigned)time(NULL)); + fd = open(file_path, O_WRONLY | O_CREAT, 0600); + if (fd > 0) + { + int totalsize = 0, len = 0; + //read until the next boundary + // TODO: this is not efficient for big file + // need a solution + while ((len = read_buf(rq->client, buf, sizeof(buf))) > 0 && !strstr(buf, boundary)) + { + len = guard_write(fd, buf, len); + totalsize += len; + } + + //remove \r\n at the end + lseek(fd, 0, SEEK_SET); + //fseek(fp,-2, SEEK_CUR); + totalsize -= 2; + int stat = ftruncate(fd, totalsize); + LOG("Write %d bytes to %s", totalsize, file_path); + UNUSED(stat); + close(fd); + line = buf; - field = __s("%s.file", part_name); - dput(dic, field, strdup(part_file)); - free(field); - field = __s("%s.tmp", part_name); - dput(dic, field, strdup(file_path)); - free(field); - field = __s("%s.size", part_name); - dput(dic, field, __s("%d", totalsize)); - free(field); - field = __s("%s.ext", part_name); - dput(dic, field, ext(part_file)); - free(field); - } - else - { - ERROR("Cannot write file to :%s", file_path); - } - free(file_path); - free(part_file); - } - free(part_name); - } - /** - * The upload procedure may take time, the task access time should be updated - * after the procedure finish - */ - task->access_time = rq->client->last_io; - // check if end of request - if (line && strstr(line, boundend)) - { - //LOG("End request %s", boundend); - free(boundend); - //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE); - return task; - } - free(boundend); - if (line && strstr(line, boundary)) - { - // continue upload - //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE); - task->handle = decode_multi_part_request_data; - return task; - } - //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE); - return task; + field = __s("%s.file", part_name); + dput(dic, field, strdup(part_file)); + free(field); + field = __s("%s.tmp", part_name); + dput(dic, field, strdup(file_path)); + free(field); + field = __s("%s.size", part_name); + dput(dic, field, __s("%d", totalsize)); + free(field); + field = __s("%s.ext", part_name); + dput(dic, field, ext(part_file)); + free(field); + } + else + { + ERROR("Cannot write file to :%s", file_path); + } + free(file_path); + free(part_file); + } + free(part_name); + } + /** + * The upload procedure may take time, the task access time should be updated + * after the procedure finish + */ + task->access_time = rq->client->last_io; + // check if end of request + if (line && strstr(line, boundend)) + { + //LOG("End request %s", boundend); + free(boundend); + //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE); + return task; + } + free(boundend); + if (line && strstr(line, boundary)) + { + // continue upload + //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_READABLE); + task->handle = decode_multi_part_request_data; + return task; + } + //antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE); + return task; } /** * Decode a query string (GET request or POST URL encoded) to @@ -1507,72 +1511,72 @@ void *decode_multi_part_request_data(void *data) */ void decode_url_request(const char *query, dictionary_t dic) { - if (query == NULL) - return; - //str_copy = ; - char *token; - if (strlen(query) == 0) - return; - char *str_copy = strdup(query); - char *org_copy = str_copy; - //dictionary dic = dict(); - while ((token = strsep(&str_copy, "&"))) - { - char *key; - char *val = NULL; - if (strlen(token) > 0) - { - key = strsep(&token, "="); - if (key && strlen(key) > 0) - { - val = strsep(&token, "="); - if (!val) - val = ""; - dput(dic, key, url_decode(val)); - } - } - } - free(org_copy); - //return dic; + if (query == NULL) + return; + //str_copy = ; + char *token; + if (strlen(query) == 0) + return; + char *str_copy = strdup(query); + char *org_copy = str_copy; + //dictionary dic = dict(); + while ((token = strsep(&str_copy, "&"))) + { + char *key; + char *val = NULL; + if (strlen(token) > 0) + { + key = strsep(&token, "="); + if (key && strlen(key) > 0) + { + val = strsep(&token, "="); + if (!val) + val = ""; + dput(dic, key, url_decode(val)); + } + } + } + free(org_copy); + //return dic; } /** * Decode post query string to string */ char *post_data_decode(void *client, int len) { - char *query = (char *)malloc((len + 1) * sizeof(char)); - char *ptr = query; - int readlen = len > BUFFLEN ? BUFFLEN : len; - int read = 0, stat = 1; - while (readlen > 0 && stat >= 0) - { - stat = antd_recv_upto(client, ptr + read, readlen); - if (stat > 0) - { - read += stat; - readlen = (len - read) > BUFFLEN ? BUFFLEN : (len - read); - } - if (stat == 0) - { - if (difftime(time(NULL), ((antd_client_t*)client)->last_io) > MAX_IO_WAIT_TIME) - { - stat = -1; - } - else - { - usleep(POLL_EVENT_TO*1000); - } - } - } + char *query = (char *)malloc((len + 1) * sizeof(char)); + char *ptr = query; + int readlen = len > BUFFLEN ? BUFFLEN : len; + int read = 0, stat = 1; + while (readlen > 0 && stat >= 0) + { + stat = antd_recv_upto(client, ptr + read, readlen); + if (stat > 0) + { + read += stat; + readlen = (len - read) > BUFFLEN ? BUFFLEN : (len - read); + } + if (stat == 0) + { + if (difftime(time(NULL), ((antd_client_t*)client)->last_io) > MAX_IO_WAIT_TIME) + { + stat = -1; + } + else + { + usleep(POLL_EVENT_TO*1000); + } + } + } - if (read > 0) - query[read] = '\0'; - else - { - free(query); - query = NULL; - } - return query; + if (read > 0) + query[read] = '\0'; + else + { + free(query); + query = NULL; + } + return query; } /** @@ -1591,86 +1595,86 @@ char *post_data_decode(void *client, int len) */ void *execute_plugin(void *data, const char *pname) { - void *(*fn)(void *); - plugin_header_t *(*metafn)(); - plugin_header_t *meta = NULL; - struct plugin_entry *plugin; - char *error; - antd_request_t *rq = (antd_request_t *)data; - antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); - antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); - //LOG("Plugin name '%s'", pname); - rq->client->state = ANTD_CLIENT_PLUGIN_EXEC; - //load the plugin - if ((plugin = plugin_lookup((char *)pname)) == NULL) - { - pthread_mutex_lock(&server_mux); - plugin = plugin_load((char *)pname); - pthread_mutex_unlock(&server_mux); - if (plugin == NULL) - { - antd_error(rq->client, 503, "Requested service not found"); - return task; - } - } - // check if the plugin want rawbody or decoded body - metafn = (plugin_header_t * (*)()) dlsym(plugin->handle, "meta"); - if ((error = dlerror()) == NULL) - { - meta = metafn(); - } - // load the function - fn = (void *(*)(void *))dlsym(plugin->handle, PLUGIN_HANDLER); - if ((error = dlerror()) != NULL) - { - ERROR("Problem when finding %s method from %s : %s", PLUGIN_HANDLER, pname, error); - antd_error(rq->client, 503, "Requested service not found"); - return task; - } - // check if we need the raw data or not - if (meta && meta->raw_body == 1) - { - task->handle = fn; - } - else - { - free(task); - task = antd_create_task(decode_post_request, (void *)rq, fn, rq->client->last_io); - } - return task; + void *(*fn)(void *); + plugin_header_t *(*metafn)(); + plugin_header_t *meta = NULL; + struct plugin_entry *plugin; + char *error; + antd_request_t *rq = (antd_request_t *)data; + antd_task_t *task = antd_create_task(NULL, (void *)rq, NULL, rq->client->last_io); + antd_task_bind_event(task, rq->client->sock, 0, TASK_EVT_ON_WRITABLE | TASK_EVT_ON_READABLE); + //LOG("Plugin name '%s'", pname); + rq->client->state = ANTD_CLIENT_PLUGIN_EXEC; + //load the plugin + if ((plugin = plugin_lookup((char *)pname)) == NULL) + { + pthread_mutex_lock(&server_mux); + plugin = plugin_load((char *)pname); + pthread_mutex_unlock(&server_mux); + if (plugin == NULL) + { + antd_error(rq->client, 503, "Requested service not found"); + return task; + } + } + // check if the plugin want rawbody or decoded body + metafn = (plugin_header_t * (*)()) dlsym(plugin->handle, "meta"); + if ((error = dlerror()) == NULL) + { + meta = metafn(); + } + // load the function + fn = (void *(*)(void *))dlsym(plugin->handle, PLUGIN_HANDLER); + if ((error = dlerror()) != NULL) + { + ERROR("Problem when finding %s method from %s : %s", PLUGIN_HANDLER, pname, error); + antd_error(rq->client, 503, "Requested service not found"); + return task; + } + // check if we need the raw data or not + if (meta && meta->raw_body == 1) + { + task->handle = fn; + } + else + { + free(task); + task = antd_create_task(decode_post_request, (void *)rq, fn, rq->client->last_io); + } + return task; } dictionary_t mimes_list() { - return server_config.mimes; + return server_config.mimes; } void dbdir(char *dest) { - strncpy(dest, server_config.db_path, 512); + strncpy(dest, server_config.db_path, 512); } void tmpdir(char *dest) { - strncpy(dest, server_config.tmpdir, 512); + strncpy(dest, server_config.tmpdir, 512); } void plugindir(char *dest) { - strncpy(dest, server_config.plugins_dir, 512); + strncpy(dest, server_config.plugins_dir, 512); } #ifdef USE_ZLIB int compressable(char *ctype) { - if (!server_config.gzip_enable || server_config.gzip_types == NULL) - return 0; - item_t it; - list_for_each(it, server_config.gzip_types) - { - if (it->type == LIST_TYPE_POINTER && it->value.ptr && regex_match((const char *)it->value.ptr, ctype, 0, NULL)) - { - return 1; - } - } - return 0; + if (!server_config.gzip_enable || server_config.gzip_types == NULL) + return 0; + item_t it; + list_for_each(it, server_config.gzip_types) + { + if (it->type == LIST_TYPE_POINTER && it->value.ptr && regex_match((const char *)it->value.ptr, ctype, 0, NULL)) + { + return 1; + } + } + return 0; } #endif diff --git a/lib/handle.c b/lib/handle.c index bbdce36..9c1802d 100644 --- a/lib/handle.c +++ b/lib/handle.c @@ -95,452 +95,452 @@ static const char *S_UNOF = "Unofficial Status"; int require_plugin(const char *name) { - UNUSED(name); - return 0; + UNUSED(name); + return 0; } int compressable(char *ctype) { - UNUSED(ctype); - return 0; + UNUSED(ctype); + return 0; } void htdocs(antd_request_t *rq, char *dest) { - //dictionary_t xheader = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER"); - char *www = (char *)dvalue(rq->request, "SERVER_WWW_ROOT"); - if (www) - { - strcpy(dest, www); - } + //dictionary_t xheader = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER"); + char *www = (char *)dvalue(rq->request, "SERVER_WWW_ROOT"); + if (www) + { + strcpy(dest, www); + } } void dbdir(char *dest) { - UNUSED(dest); + UNUSED(dest); } void tmpdir(char *dest) { - UNUSED(dest); + UNUSED(dest); } void plugindir(char *dest) { - UNUSED(dest); + UNUSED(dest); } const char *get_status_str(int stat) { - switch (stat) - { - case 100: - return S_100; - case 101: - return S_101; - case 102: - return S_102; - case 103: - return S_103; + switch (stat) + { + case 100: + return S_100; + case 101: + return S_101; + case 102: + return S_102; + case 103: + return S_103; - case 200: - return S_200; - case 201: - return S_201; - case 202: - return S_202; - case 203: - return S_203; - case 204: - return S_204; - case 205: - return S_205; - case 206: - return S_206; - case 207: - return S_207; - case 208: - return S_208; - case 226: - return S_226; + case 200: + return S_200; + case 201: + return S_201; + case 202: + return S_202; + case 203: + return S_203; + case 204: + return S_204; + case 205: + return S_205; + case 206: + return S_206; + case 207: + return S_207; + case 208: + return S_208; + case 226: + return S_226; - case 300: - return S_300; - case 301: - return S_301; - case 302: - return S_302; - case 303: - return S_303; - case 304: - return S_304; - case 305: - return S_305; - case 306: - return S_306; - case 307: - return S_307; - case 308: - return S_308; + case 300: + return S_300; + case 301: + return S_301; + case 302: + return S_302; + case 303: + return S_303; + case 304: + return S_304; + case 305: + return S_305; + case 306: + return S_306; + case 307: + return S_307; + case 308: + return S_308; - case 400: - return S_400; - case 401: - return S_401; - case 402: - return S_402; - case 403: - return S_403; - case 404: - return S_404; - case 405: - return S_405; - case 406: - return S_406; - case 407: - return S_407; - case 408: - return S_408; - case 409: - return S_409; - case 410: - return S_410; - case 411: - return S_411; - case 412: - return S_412; - case 413: - return S_413; - case 414: - return S_414; - case 415: - return S_415; - case 416: - return S_416; - case 417: - return S_417; - case 421: - return S_421; - case 422: - return S_422; - case 423: - return S_423; - case 424: - return S_424; - case 425: - return S_425; - case 426: - return S_426; - case 428: - return S_428; - case 429: - return S_429; - case 431: - return S_431; - case 451: - return S_451; + case 400: + return S_400; + case 401: + return S_401; + case 402: + return S_402; + case 403: + return S_403; + case 404: + return S_404; + case 405: + return S_405; + case 406: + return S_406; + case 407: + return S_407; + case 408: + return S_408; + case 409: + return S_409; + case 410: + return S_410; + case 411: + return S_411; + case 412: + return S_412; + case 413: + return S_413; + case 414: + return S_414; + case 415: + return S_415; + case 416: + return S_416; + case 417: + return S_417; + case 421: + return S_421; + case 422: + return S_422; + case 423: + return S_423; + case 424: + return S_424; + case 425: + return S_425; + case 426: + return S_426; + case 428: + return S_428; + case 429: + return S_429; + case 431: + return S_431; + case 451: + return S_451; - case 500: - return S_500; - case 501: - return S_501; - case 502: - return S_502; - case 503: - return S_503; - case 504: - return S_504; - case 505: - return S_505; - case 506: - return S_506; - case 507: - return S_507; - case 508: - return S_508; - case 510: - return S_510; - case 511: - return S_511; - default: - return S_UNOF; - } + case 500: + return S_500; + case 501: + return S_501; + case 502: + return S_502; + case 503: + return S_503; + case 504: + return S_504; + case 505: + return S_505; + case 506: + return S_506; + case 507: + return S_507; + case 508: + return S_508; + case 510: + return S_510; + case 511: + return S_511; + default: + return S_UNOF; + } } void antd_send_header(void *cl, antd_response_header_t *res) { - if (!res->header) - res->header = dict(); - antd_client_t *client = (antd_client_t *)cl; + if (!res->header) + res->header = dict(); + antd_client_t *client = (antd_client_t *)cl; #ifdef USE_ZLIB - antd_compress_t current_zlevel = client->z_level; - char *str = dvalue(res->header, "Content-Encoding"); - if (!str) - { - // check for compress - str = dvalue(res->header, "Content-Type"); - if (str) - { - if (compressable(str) && client->z_level != ANTD_CNONE) - { - client->zstream = (z_stream *)malloc(sizeof(z_stream)); - if (client->zstream) - { - ((z_stream *)client->zstream)->zalloc = Z_NULL; - ((z_stream *)client->zstream)->zfree = Z_NULL; - ((z_stream *)client->zstream)->opaque = Z_NULL; - if (client->z_level == ANTD_CGZ) - { - if (deflateInit2(client->zstream, Z_BEST_COMPRESSION, Z_DEFLATED, 15 | 16, 8, Z_DEFAULT_STRATEGY) != Z_OK) - { - ERROR("Cannot init gzip stream"); - free(client->zstream); - client->zstream = NULL; - } - else - { - client->z_status = Z_NO_FLUSH; - dput(res->header, "Content-Encoding", strdup("gzip")); - } - } - else - { - if (deflateInit(client->zstream, Z_BEST_COMPRESSION) != Z_OK) - { - ERROR("Cannot init deflate stream"); - free(client->zstream); - client->zstream = NULL; - } - else - { - client->z_status = Z_NO_FLUSH; - dput(res->header, "Content-Encoding", strdup("deflate")); - } - } - } - } - } - } - client->z_level = ANTD_CNONE; + antd_compress_t current_zlevel = client->z_level; + char *str = dvalue(res->header, "Content-Encoding"); + if (!str) + { + // check for compress + str = dvalue(res->header, "Content-Type"); + if (str) + { + if (compressable(str) && client->z_level != ANTD_CNONE) + { + client->zstream = (z_stream *)malloc(sizeof(z_stream)); + if (client->zstream) + { + ((z_stream *)client->zstream)->zalloc = Z_NULL; + ((z_stream *)client->zstream)->zfree = Z_NULL; + ((z_stream *)client->zstream)->opaque = Z_NULL; + if (client->z_level == ANTD_CGZ) + { + if (deflateInit2(client->zstream, Z_BEST_COMPRESSION, Z_DEFLATED, 15 | 16, 8, Z_DEFAULT_STRATEGY) != Z_OK) + { + ERROR("Cannot init gzip stream"); + free(client->zstream); + client->zstream = NULL; + } + else + { + client->z_status = Z_NO_FLUSH; + dput(res->header, "Content-Encoding", strdup("gzip")); + } + } + else + { + if (deflateInit(client->zstream, Z_BEST_COMPRESSION) != Z_OK) + { + ERROR("Cannot init deflate stream"); + free(client->zstream); + client->zstream = NULL; + } + else + { + client->z_status = Z_NO_FLUSH; + dput(res->header, "Content-Encoding", strdup("deflate")); + } + } + } + } + } + } + client->z_level = ANTD_CNONE; #endif - dput(res->header, "Server", strdup(SERVER_NAME)); - const char *stat_str = get_status_str(res->status); - __t(client, "HTTP/1.1 %d %s", res->status, stat_str); - chain_t it; - for_each_assoc(it, res->header) - { - __t(client, "%s: %s", it->key, (const char *)it->value); - } - // send out cookie - if (res->cookie) - { - item_t el; - list_for_each(el, res->cookie) - { - if (el->type == LIST_TYPE_POINTER && el->value.ptr) - { - __t(client, "Set-Cookie: %s", (char *)el->value.ptr); - } - } - list_free(&res->cookie); - res->cookie = NULL; - } - __b(client, (unsigned char *)"\r\n", 2); + dput(res->header, "Server", strdup(SERVER_NAME)); + const char *stat_str = get_status_str(res->status); + __t(client, "HTTP/1.1 %d %s", res->status, stat_str); + chain_t it; + for_each_assoc(it, res->header) + { + __t(client, "%s: %s", it->key, (const char *)it->value); + } + // send out cookie + if (res->cookie) + { + item_t el; + list_for_each(el, res->cookie) + { + if (el->type == LIST_TYPE_POINTER && el->value.ptr) + { + __t(client, "Set-Cookie: %s", (char *)el->value.ptr); + } + } + list_free(&res->cookie); + res->cookie = NULL; + } + __b(client, (unsigned char *)"\r\n", 2); #ifdef USE_ZLIB - client->z_level = current_zlevel; + client->z_level = current_zlevel; #endif - freedict(res->header); - res->header = NULL; + freedict(res->header); + res->header = NULL; } /* void octstream(void* client, char* name) { - set_status(client,200,"OK"); - __t(client,"Content-Type: application/octet-stream"); - __t(client,"Content-Disposition: attachment; filename=\"%s\"", name); - response(client,""); - //Content-Disposition: attachment; filename="fname.ext" + set_status(client,200,"OK"); + __t(client,"Content-Type: application/octet-stream"); + __t(client,"Content-Disposition: attachment; filename=\"%s\"", name); + response(client,""); + //Content-Disposition: attachment; filename="fname.ext" }*/ int antd_send(void *src, const void *data_in, int len_in) { - uint8_t *data = (uint8_t *)data_in; - int len = len_in; - antd_client_t *source = (antd_client_t *)src; - if (!src || !data) - { - return -1; - } + uint8_t *data = (uint8_t *)data_in; + int len = len_in; + antd_client_t *source = (antd_client_t *)src; + if (!src || !data) + { + return -1; + } #ifdef USE_ZLIB - if (source->zstream && source->z_level != ANTD_CNONE) - { - antd_compress_t current_zlevel = source->z_level; - source->z_level = ANTD_CNONE; - uint8_t buf[BUFFLEN]; - z_stream *zstream = (z_stream *)source->zstream; - zstream->avail_in = (uInt)len; - zstream->next_in = (Bytef *)data_in; - len = 0; - int have = 0; - do - { - zstream->avail_out = BUFFLEN; - zstream->next_out = buf; - if (deflate(zstream, source->z_status) == Z_STREAM_ERROR) - { - source->z_level = current_zlevel; - data = NULL; - return -1; - } - else - { - have = BUFFLEN - zstream->avail_out; - antd_send(source, buf, have); - len += have; - } - } while (zstream->avail_out == 0); - source->z_level = current_zlevel; - return len; - } + if (source->zstream && source->z_level != ANTD_CNONE) + { + antd_compress_t current_zlevel = source->z_level; + source->z_level = ANTD_CNONE; + uint8_t buf[BUFFLEN]; + z_stream *zstream = (z_stream *)source->zstream; + zstream->avail_in = (uInt)len; + zstream->next_in = (Bytef *)data_in; + len = 0; + int have = 0; + do + { + zstream->avail_out = BUFFLEN; + zstream->next_out = buf; + if (deflate(zstream, source->z_status) == Z_STREAM_ERROR) + { + source->z_level = current_zlevel; + data = NULL; + return -1; + } + else + { + have = BUFFLEN - zstream->avail_out; + antd_send(source, buf, have); + len += have; + } + } while (zstream->avail_out == 0); + source->z_level = current_zlevel; + return len; + } #endif - int written; - char *ptr; - int writelen = 0; - int count; + int written; + char *ptr; + int writelen = 0; + int count; #ifdef USE_OPENSSL - if (source->ssl) - { - //LOG("SSL WRITE\n"); - //ret = SSL_write((SSL*) source->ssl, data, len); - ptr = (char *)data; - writelen = len > BUFFLEN ? BUFFLEN : len; - written = 0; - fd_set fds; - struct timeval timeout; - while (writelen > 0) //source->attempt < MAX_ATTEMPT - { - // clear the error queue - ERR_clear_error(); - count = SSL_write(source->ssl, ptr + written, writelen); - int err = SSL_get_error(source->ssl, count); - if (count > 0) - { - written += count; - writelen = (len - written) > BUFFLEN ? BUFFLEN : (len - written); - time(&source->last_io); - } - else - { - if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) - { - if (written == 0) - written = count; - break; - } - //printf(" received equal to or less than 0\n") - switch (err) - { - case SSL_ERROR_NONE: - { - // no real error, just try again... - //LOG("SSL_ERROR_NONE \n"); - //source->attempt++; - continue; - } + if (source->ssl) + { + //LOG("SSL WRITE\n"); + //ret = SSL_write((SSL*) source->ssl, data, len); + ptr = (char *)data; + writelen = len > BUFFLEN ? BUFFLEN : len; + written = 0; + fd_set fds; + struct timeval timeout; + while (writelen > 0) //source->attempt < MAX_ATTEMPT + { + // clear the error queue + ERR_clear_error(); + count = SSL_write(source->ssl, ptr + written, writelen); + int err = SSL_get_error(source->ssl, count); + if (count > 0) + { + written += count; + writelen = (len - written) > BUFFLEN ? BUFFLEN : (len - written); + time(&source->last_io); + } + else + { + if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) + { + if (written == 0) + written = count; + break; + } + //printf(" received equal to or less than 0\n") + switch (err) + { + case SSL_ERROR_NONE: + { + // no real error, just try again... + //LOG("SSL_ERROR_NONE \n"); + //source->attempt++; + continue; + } - case SSL_ERROR_ZERO_RETURN: - { - // peer disconnected... - // ERROR("SSLWRITE: SSL_ERROR_ZERO_RETURN: peer disconected: %d", source->sock); - break; - } + case SSL_ERROR_ZERO_RETURN: + { + // peer disconnected... + // ERROR("SSLWRITE: SSL_ERROR_ZERO_RETURN: peer disconected: %d", source->sock); + break; + } - case SSL_ERROR_WANT_READ: - { - // no data available right now, wait a few seconds in case new data arrives... - //printf("SSL_ERROR_WANT_READ\n"); + case SSL_ERROR_WANT_READ: + { + // no data available right now, wait a few seconds in case new data arrives... + //printf("SSL_ERROR_WANT_READ\n"); - int sock = SSL_get_rfd(source->ssl); - FD_ZERO(&fds); - FD_SET(sock, &fds); + int sock = SSL_get_rfd(source->ssl); + FD_ZERO(&fds); + FD_SET(sock, &fds); - timeout.tv_sec = 0; - timeout.tv_usec = 500; - err = select(sock + 1, &fds, NULL, NULL, &timeout); - if (err == 0 || (err > 0 && FD_ISSET(sock, &fds))) - { - //source->attempt++; - continue; // more data to read... - } - //ERROR("SSL WRITE: want read but select error on the socket %d: %s", source->sock, strerror(errno)); - break; - } + timeout.tv_sec = 0; + timeout.tv_usec = 500; + err = select(sock + 1, &fds, NULL, NULL, &timeout); + if (err == 0 || (err > 0 && FD_ISSET(sock, &fds))) + { + //source->attempt++; + continue; // more data to read... + } + //ERROR("SSL WRITE: want read but select error on the socket %d: %s", source->sock, strerror(errno)); + break; + } - case SSL_ERROR_WANT_WRITE: - { - // socket not writable right now, wait a few seconds and try again... - //printf("SSL_ERROR_WANT_WRITE \n"); - int sock = SSL_get_wfd(source->ssl); - FD_ZERO(&fds); - FD_SET(sock, &fds); + case SSL_ERROR_WANT_WRITE: + { + // socket not writable right now, wait a few seconds and try again... + //printf("SSL_ERROR_WANT_WRITE \n"); + int sock = SSL_get_wfd(source->ssl); + FD_ZERO(&fds); + FD_SET(sock, &fds); - timeout.tv_sec = 0; - timeout.tv_usec = 500; + timeout.tv_sec = 0; + timeout.tv_usec = 500; - err = select(sock + 1, NULL, &fds, NULL, &timeout); - if (err == 0 || (err > 0 && FD_ISSET(sock, &fds))) - { - //source->attempt++; - continue; // can write more data now... - } - //ERROR("SSL WRITE: want write but select error on the socket %d: %s", source->sock, strerror(errno)); - break; - } + err = select(sock + 1, NULL, &fds, NULL, &timeout); + if (err == 0 || (err > 0 && FD_ISSET(sock, &fds))) + { + //source->attempt++; + continue; // can write more data now... + } + //ERROR("SSL WRITE: want write but select error on the socket %d: %s", source->sock, strerror(errno)); + break; + } - default: - { - // other error - //ERROR("SSL WRITE: Unknown error on %d: %s", source->sock, ERR_error_string(ERR_get_error(), NULL) ); - break; - } - } - if (written == 0) - written = count; - break; - } - } - //source->attempt = 0; - } - else - { + default: + { + // other error + //ERROR("SSL WRITE: Unknown error on %d: %s", source->sock, ERR_error_string(ERR_get_error(), NULL) ); + break; + } + } + if (written == 0) + written = count; + break; + } + } + //source->attempt = 0; + } + else + { #endif - ptr = (char *)data; - writelen = len > BUFFLEN ? BUFFLEN : len; - written = 0; - while (writelen > 0) - { - count = send(source->sock, ptr + written, writelen, 0); - if (count > 0) - { - written += count; - writelen = (len - written) > BUFFLEN ? BUFFLEN : (len - written); - time(&source->last_io); - } - else if ((difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) || (count == -1 && errno != EAGAIN && errno != EWOULDBLOCK)) - { - if (written == 0) - written = count; - //ERROR("Error while writing: %s", strerror(errno)); - break; - //return written; - } - } + ptr = (char *)data; + writelen = len > BUFFLEN ? BUFFLEN : len; + written = 0; + while (writelen > 0) + { + count = send(source->sock, ptr + written, writelen, 0); + if (count > 0) + { + written += count; + writelen = (len - written) > BUFFLEN ? BUFFLEN : (len - written); + time(&source->last_io); + } + else if ((difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) || (count == -1 && errno != EAGAIN && errno != EWOULDBLOCK)) + { + if (written == 0) + written = count; + //ERROR("Error while writing: %s", strerror(errno)); + break; + //return written; + } + } #ifdef USE_OPENSSL - } + } #endif - return written; + return written; } /** * Read up to n bytes, not guaranty to have exactly nbytes @@ -548,443 +548,442 @@ int antd_send(void *src, const void *data_in, int len_in) * */ int antd_recv_upto(void *src, void *data, int len) { - if (!src) - return -1; - int received = 0; - antd_client_t *source = (antd_client_t *)src; + if (!src) + return -1; + int received = 0; + antd_client_t *source = (antd_client_t *)src; #ifdef USE_OPENSSL - if (source->ssl) - { - ERR_clear_error(); - received = SSL_read(source->ssl, data, len); - int err = SSL_get_error(source->ssl, received); - if (received > 0) - { - time(&source->last_io); - return received; - } - else - { - /*if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) - { - return -1; - }*/ - switch (err) - { - case SSL_ERROR_NONE: - { - return 0; - } + if (source->ssl) + { + ERR_clear_error(); + received = SSL_read(source->ssl, data, len); + int err = SSL_get_error(source->ssl, received); + if (received > 0) + { + time(&source->last_io); + return received; + } + else + { + /*if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) + { + return -1; + }*/ + switch (err) + { + case SSL_ERROR_NONE: + { + return 0; + } - case SSL_ERROR_ZERO_RETURN: - { - // peer disconnected... - return -1; - } + case SSL_ERROR_ZERO_RETURN: + { + // peer disconnected... + return -1; + } - case SSL_ERROR_WANT_READ: - { - return 0; - } + case SSL_ERROR_WANT_READ: + { + return 0; + } - case SSL_ERROR_WANT_WRITE: - { - return 0; - } + case SSL_ERROR_WANT_WRITE: + { + return 0; + } - default: - return -1; - } - } - } - else - { + default: + return -1; + } + } + } + else + { #endif - received = recv(((int)source->sock), data, len, 0); - //LOG("Read : %c\n", *ptr); - if (received > 0) - { - time(&source->last_io); - return received; - } - /*else if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) - { - return -1; - }*/ - if (received <= 0 && (errno == EAGAIN || errno == EWOULDBLOCK)) - { - return 0; - } - return -1; + received = recv(((int)source->sock), data, len, 0); + //LOG("Read : %c\n", *ptr); + if (received > 0) + { + time(&source->last_io); + return received; + } + /*else if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) + { + return -1; + }*/ + if (received < 0 && (errno == EAGAIN || errno == EWOULDBLOCK)) + { + return 0; + } + return -1; #ifdef USE_OPENSSL - } + } #endif } int antd_recv(void *src, void *data, int len) { - if (!src) - return -1; - int read = 0; - char *ptr = NULL; - int received = 0; - int readlen = 0; - antd_client_t *source = (antd_client_t *)src; + if (!src) + return -1; + int read = 0; + char *ptr = NULL; + int received = 0; + int readlen = 0; + antd_client_t *source = (antd_client_t *)src; #ifdef USE_OPENSSL - if (source->ssl) - { - ptr = (char *)data; - readlen = len > BUFFLEN ? BUFFLEN : len; - read = 0; - fd_set fds; - struct timeval timeout; - while (readlen > 0) //&& source->attempt < MAX_ATTEMPT - { - ERR_clear_error(); - received = SSL_read(source->ssl, ptr + read, readlen); - int err = SSL_get_error(source->ssl, received); - if (received > 0) - { - read += received; - readlen = (len - read) > BUFFLEN ? BUFFLEN : (len - read); - time(&source->last_io); - } - else - { - // Timeout, quit - if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) - { - if (read == 0) - read = received; - break; - } - //printf(" received equal to or less than 0\n") - switch (err) - { - case SSL_ERROR_NONE: - { - // no real error, just try again... - //LOG("SSL_ERROR_NONE \n"); - //source->attempt++; - continue; - } + if (source->ssl) + { + ptr = (char *)data; + readlen = len > BUFFLEN ? BUFFLEN : len; + read = 0; + fd_set fds; + struct timeval timeout; + while (readlen > 0) //&& source->attempt < MAX_ATTEMPT + { + ERR_clear_error(); + received = SSL_read(source->ssl, ptr + read, readlen); + int err = SSL_get_error(source->ssl, received); + if (received > 0) + { + read += received; + readlen = (len - read) > BUFFLEN ? BUFFLEN : (len - read); + time(&source->last_io); + } + else + { + // Timeout, quit + if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME) + { + if (read == 0) + read = received; + break; + } + //printf(" received equal to or less than 0\n") + switch (err) + { + case SSL_ERROR_NONE: + { + // no real error, just try again... + //LOG("SSL_ERROR_NONE \n"); + //source->attempt++; + continue; + } - case SSL_ERROR_ZERO_RETURN: - { - // peer disconnected... - //ERROR("SSL READ: SSL_ERROR_ZERO_RETURN, peer disconnected %d", source->sock); - break; - } + case SSL_ERROR_ZERO_RETURN: + { + // peer disconnected... + //ERROR("SSL READ: SSL_ERROR_ZERO_RETURN, peer disconnected %d", source->sock); + break; + } - case SSL_ERROR_WANT_READ: - { - // no data available right now, wait a few seconds in case new data arrives... - //printf("SSL_ERROR_WANT_READ\n"); + case SSL_ERROR_WANT_READ: + { + // no data available right now, wait a few seconds in case new data arrives... + //printf("SSL_ERROR_WANT_READ\n"); - int sock = SSL_get_rfd(source->ssl); - FD_ZERO(&fds); - FD_SET(sock, &fds); + int sock = SSL_get_rfd(source->ssl); + FD_ZERO(&fds); + FD_SET(sock, &fds); - timeout.tv_sec = 0; - timeout.tv_usec = 500; - err = select(sock + 1, &fds, NULL, NULL, &timeout); - if (err == 0 || (err > 0 && FD_ISSET(sock, &fds))) - { - //source->attempt++; - continue; // more data to read... - } - //ERROR("SSL READ: want read but select error on the socket %d: %s", source->sock, strerror(errno)); - break; - } + timeout.tv_sec = 0; + timeout.tv_usec = 500; + err = select(sock + 1, &fds, NULL, NULL, &timeout); + if (err == 0 || (err > 0 && FD_ISSET(sock, &fds))) + { + //source->attempt++; + continue; // more data to read... + } + //ERROR("SSL READ: want read but select error on the socket %d: %s", source->sock, strerror(errno)); + break; + } - case SSL_ERROR_WANT_WRITE: - { - // socket not writable right now, wait a few seconds and try again... - //printf("SSL_ERROR_WANT_WRITE \n"); - int sock = SSL_get_wfd(source->ssl); - FD_ZERO(&fds); - FD_SET(sock, &fds); + case SSL_ERROR_WANT_WRITE: + { + // socket not writable right now, wait a few seconds and try again... + //printf("SSL_ERROR_WANT_WRITE \n"); + int sock = SSL_get_wfd(source->ssl); + FD_ZERO(&fds); + FD_SET(sock, &fds); - timeout.tv_sec = 0; - timeout.tv_usec = 500; + timeout.tv_sec = 0; + timeout.tv_usec = 500; - err = select(sock + 1, NULL, &fds, NULL, &timeout); - if (err == 0 || (err > 0 && FD_ISSET(sock, &fds))) - { - //source->attempt++; - continue; // can write more data now... - } - //ERROR("SSL READ: want write but select error on the socket %d: %s", source->sock, strerror(errno)); - break; - } + err = select(sock + 1, NULL, &fds, NULL, &timeout); + if (err == 0 || (err > 0 && FD_ISSET(sock, &fds))) + { + //source->attempt++; + continue; // can write more data now... + } + //ERROR("SSL READ: want write but select error on the socket %d: %s", source->sock, strerror(errno)); + break; + } - default: - { - // other error - //ERROR("SSL READ: unkown error on %d: %s", source->sock, ERR_error_string(ERR_get_error(), NULL)); - break; - } - } - if (read == 0) - read = received; - break; - } - } - //source->attempt = 0; - /* - int stat, r, st; - do{ - ret = SSL_read((SSL*) source->ssl, data, len); - stat = SSL_get_error((SSL*)source->ssl, r); - } while(ret == -1 && - ( - stat == SSL_ERROR_WANT_READ || - stat == SSL_ERROR_WANT_WRITE || - stat == SSL_ERROR_NONE || - (stat == SSL_ERROR_SYSCALL && r== 0 && !ERR_get_error()) - )); - if(ret == -1) - { - LOG("Problem reading %d %d %d\n", ret, stat, r); - } - //set_nonblock(source->sock); - */ - } - else - { + default: + { + // other error + //ERROR("SSL READ: unkown error on %d: %s", source->sock, ERR_error_string(ERR_get_error(), NULL)); + break; + } + } + if (read == 0) + read = received; + break; + } + } + //source->attempt = 0; + /* + int stat, r, st; + do{ + ret = SSL_read((SSL*) source->ssl, data, len); + stat = SSL_get_error((SSL*)source->ssl, r); + } while(ret == -1 && + ( + stat == SSL_ERROR_WANT_READ || + stat == SSL_ERROR_WANT_WRITE || + stat == SSL_ERROR_NONE || + (stat == SSL_ERROR_SYSCALL && r== 0 && !ERR_get_error()) + )); + if(ret == -1) + { + LOG("Problem reading %d %d %d\n", ret, stat, r); + } + //set_nonblock(source->sock); + */ + } + else + { #endif - ptr = (char *)data; - readlen = len > BUFFLEN ? BUFFLEN : len; - read = 0; - while (readlen > 0) - { - received = recv(((int)source->sock), ptr + read, readlen, 0); - //LOG("Read : %c\n", *ptr); - if (received > 0) - { - read += received; - readlen = (len - read) > BUFFLEN ? BUFFLEN : (len - read); - time(&source->last_io); - //LOG("Read len is %d\n", readlen); - } - else if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME || (errno != EAGAIN && errno != EWOULDBLOCK)) - { - //ERROR("Error while reading: %s", strerror(errno)); - if (read == 0) - read = received; - break; - } - } - //read = recv(((int) source->sock), data, len, 0); + ptr = (char *)data; + readlen = len > BUFFLEN ? BUFFLEN : len; + read = 0; + while (readlen > 0) + { + received = recv(((int)source->sock), ptr + read, readlen, 0); + //LOG("Read : %c\n", *ptr); + if (received > 0) + { + read += received; + readlen = (len - read) > BUFFLEN ? BUFFLEN : (len - read); + time(&source->last_io); + //LOG("Read len is %d\n", readlen); + } + else if (difftime(time(NULL), source->last_io) > MAX_IO_WAIT_TIME || (errno != EAGAIN && errno != EWOULDBLOCK)) + { + //ERROR("Error while reading: %s", strerror(errno)); + if (read == 0) + read = received; + break; + } + } + //read = recv(((int) source->sock), data, len, 0); #ifdef USE_OPENSSL - } + } #endif - //LOG("Received %d bytes\n", read); - /*if(ret == 0) - { - antd_close(src); - }*/ - return read; + //LOG("Received %d bytes\n", read); + /*if(ret == 0) + { + antd_close(src); + }*/ + return read; } void set_nonblock(int socket) { - int flags; - flags = fcntl(socket, F_GETFL, 0); - //assert(flags != -1); - fcntl(socket, F_SETFL, flags | O_NONBLOCK); + int flags; + flags = fcntl(socket, F_GETFL, 0); + //assert(flags != -1); + fcntl(socket, F_SETFL, flags | O_NONBLOCK); } /*void set_block() { - int flags; + int flags; flags = fcntl(socket,F_GETFL,0); //assert(flags != -1); fcntl(socket, F_SETFL, flags & (~O_NONBLOCK)); }*/ int antd_close(void *src) { - if (!src) - return -1; - antd_client_t *source = (antd_client_t *)src; + if (!src) + return -1; + antd_client_t *source = (antd_client_t *)src; #ifdef USE_ZLIB - //TODO: send finish data to the socket before quit - if (source->zstream) - { - if (source->z_status == Z_NO_FLUSH && source->z_level != ANTD_CNONE) - { - source->z_status = Z_FINISH; - antd_send(source, "", 0); - } - deflateEnd(source->zstream); - free(source->zstream); - source->zstream = NULL; - source->z_level = ANTD_CNONE; - } + //TODO: send finish data to the socket before quit + if (source->zstream) + { + if (source->z_status == Z_NO_FLUSH && source->z_level != ANTD_CNONE) + { + source->z_status = Z_FINISH; + antd_send(source, "", 0); + } + deflateEnd(source->zstream); + free(source->zstream); + source->zstream = NULL; + source->z_level = ANTD_CNONE; + } #endif #ifdef USE_OPENSSL - if (source->ssl) - { - //printf("SSL:Shutdown ssl\n"); - //SSL_shutdown((SSL*) source->ssl); - SSL_set_shutdown((SSL *)source->ssl, SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN); - //printf("SSL:Free ssl\n"); - SSL_free((SSL *)source->ssl); + if (source->ssl) + { + //printf("SSL:Shutdown ssl\n"); + //SSL_shutdown((SSL*) source->ssl); + SSL_set_shutdown((SSL *)source->ssl, SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN); + //printf("SSL:Free ssl\n"); + SSL_free((SSL *)source->ssl); - //EVP_cleanup(); - //ENGINE_cleanup(); - CRYPTO_cleanup_all_ex_data(); - ERR_remove_state(0); - ERR_free_strings(); - source->ssl = NULL; - //LOG("Freeing SSL\n"); - } + //EVP_cleanup(); + //ENGINE_cleanup(); + CRYPTO_cleanup_all_ex_data(); + ERR_remove_state(0); + ERR_free_strings(); + source->ssl = NULL; + //LOG("Freeing SSL\n"); + } #endif - //printf("Close sock %d\n", source->sock); - int ret = close(source->sock); - free(src); - src = NULL; - return ret; + //printf("Close sock %d\n", source->sock); + int ret = close(source->sock); + free(src); + src = NULL; + return ret; } int __t(void *client, const char *fstring, ...) { - int dlen; - int st; - va_list arguments; - char *data; - va_start(arguments, fstring); - dlen = vsnprintf(0, 0, fstring, arguments) + 1; - va_end(arguments); - if ((data = (char *)malloc(dlen * sizeof(char))) != 0) - { - va_start(arguments, fstring); - vsnprintf(data, dlen, fstring, arguments); - va_end(arguments); - st = __b(client, (const unsigned char *)data, strlen(data)); - if (st) - __b(client, (unsigned char *)"\r\n", 2); - free(data); - return st; - } - return 0; - // + int dlen; + int st; + va_list arguments; + char *data; + va_start(arguments, fstring); + dlen = vsnprintf(0, 0, fstring, arguments) + 1; + va_end(arguments); + if ((data = (char *)malloc(dlen * sizeof(char))) != 0) + { + va_start(arguments, fstring); + vsnprintf(data, dlen, fstring, arguments); + va_end(arguments); + st = __b(client, (const unsigned char *)data, strlen(data)); + if (st) + __b(client, (unsigned char *)"\r\n", 2); + free(data); + return st; + } + return 0; + // } int __b(void *client, const unsigned char *data, int size) { - int sent = 0; - int buflen = 0; - int nbytes = 0; - char *ptr = (char *)data; - /*if(size <= BUFFLEN) - { - nbytes = antd_send(client,data,size); - return (nbytes==-1?0:1); - } - else - {*/ - while (sent < size) - { - if (size - sent > BUFFLEN) - buflen = BUFFLEN; - else - buflen = size - sent; - nbytes = antd_send(client, ptr, buflen); - if (nbytes == -1) - { - return 0; - } - sent += buflen; - ptr += buflen; - } - //} - return 1; + int sent = 0; + int buflen = 0; + int nbytes = 0; + char *ptr = (char *)data; + /*if(size <= BUFFLEN) + { + nbytes = antd_send(client,data,size); + return (nbytes==-1?0:1); + } + else + {*/ + while (sent < size) + { + if (size - sent > BUFFLEN) + buflen = BUFFLEN; + else + buflen = size - sent; + nbytes = antd_send(client, ptr, buflen); + if (nbytes == -1) + { + return 0; + } + sent += buflen; + ptr += buflen; + } + //} + return 1; } int __f(void *client, const char *file) { - unsigned char buffer[BUFFLEN]; - FILE *ptr; - ptr = fopen(file, "rb"); - if (!ptr) - { - LOG("Cannot read : %s", file); - return 0; - } - size_t size; - while (!feof(ptr)) - { - size = fread(buffer, 1, BUFFLEN, ptr); - if (antd_send(client, buffer, size) == -1) - return 0; - } - fclose(ptr); - return 1; + unsigned char buffer[BUFFLEN]; + int fd; + fd = open(file, O_RDONLY); + if (fd < 0) + { + LOG("Cannot read : %s", file); + return 0; + } + int size; + while ((size = read(fd, buffer, BUFFLEN)) > 0) + { + if (antd_send(client, buffer, size) == -1) + return 0; + } + close(fd); + return 1; } int upload(const char *tmp, const char *path) { - return !rename(tmp, path); + return !rename(tmp, path); } /* void set_cookie(void* client,const char* type, dictionary_t dic, const char* name) { - set_status(client,200,"OK"); - __t(client,"Content-Type: %s",type); - chain_t assoc; - for_each_assoc(assoc,dic){ - __t(client,"Set-Cookie: %s=%s; Path=/%s",assoc->key, (char*)assoc->value, name); - } - response(client,""); + set_status(client,200,"OK"); + __t(client,"Content-Type: %s",type); + chain_t assoc; + for_each_assoc(assoc,dic){ + __t(client,"Set-Cookie: %s=%s; Path=/%s",assoc->key, (char*)assoc->value, name); + } + response(client,""); } void clear_cookie(void* client, dictionary_t dic) { - set_status(client,200,"OK"); - __t(client,"Content-Type: text/html; charset=utf-8"); - chain_t assoc; - for_each_assoc(assoc,dic){ - __t(client,"Set-Cookie: %s=%s;expires=%s",assoc->key, (char*)assoc->value, server_time()); - } - response(client,""); + set_status(client,200,"OK"); + __t(client,"Content-Type: text/html; charset=utf-8"); + chain_t assoc; + for_each_assoc(assoc,dic){ + __t(client,"Set-Cookie: %s=%s;expires=%s",assoc->key, (char*)assoc->value, server_time()); + } + response(client,""); } */ void antd_error(void *client, int status, const char *msg) { - antd_response_header_t rsh; - rsh.header = dict(); - rsh.cookie = NULL; - const char *stat_str = get_status_str(status); - rsh.status = status; - char *ctype = "text/html; charset=utf-8"; - dput(rsh.header, "Content-Type", strdup(ctype)); - char *res_str = __s(HTML_TPL, stat_str, msg); - int clen = 0; - if (res_str) - { - clen = strlen(res_str); - } - char ibuf[20]; - snprintf(ibuf, sizeof(ibuf), "%d", clen); + antd_response_header_t rsh; + rsh.header = dict(); + rsh.cookie = NULL; + const char *stat_str = get_status_str(status); + rsh.status = status; + char *ctype = "text/html; charset=utf-8"; + dput(rsh.header, "Content-Type", strdup(ctype)); + char *res_str = __s(HTML_TPL, stat_str, msg); + int clen = 0; + if (res_str) + { + clen = strlen(res_str); + } + char ibuf[20]; + snprintf(ibuf, sizeof(ibuf), "%d", clen); #ifdef USE_ZLIB - if (((antd_client_t *)client)->z_level == ANTD_CNONE || !compressable(ctype)) + if (((antd_client_t *)client)->z_level == ANTD_CNONE || !compressable(ctype)) #endif - dput(rsh.header, "Content-Length", strdup(ibuf)); - antd_send_header(client, &rsh); - if (res_str) - { - //printf("%s\n", res_str); - __b(client, (unsigned char *)res_str, clen); - //__t(client, HTML_TPL, stat_str, msg); - free(res_str); - } + dput(rsh.header, "Content-Length", strdup(ibuf)); + antd_send_header(client, &rsh); + if (res_str) + { + //printf("%s\n", res_str); + __b(client, (unsigned char *)res_str, clen); + //__t(client, HTML_TPL, stat_str, msg); + free(res_str); + } } int ws_enable(dictionary_t dic) { - if (!dic) - return 0; - char *v = (char *)dvalue(dic, "__web_socket__"); - if (!v) - return 0; - return atoi(v) == 1; + if (!dic) + return 0; + char *v = (char *)dvalue(dic, "__web_socket__"); + if (!v) + return 0; + return atoi(v) == 1; } /** @@ -998,53 +997,53 @@ int ws_enable(dictionary_t dic) */ int read_buf(void *sock, char *buf, int size) { - int i = 0; - char c = '\0'; - int n; - while ((i < size - 1) && (c != '\n')) - { - n = antd_recv(sock, &c, 1); - if (n > 0) - { - //LOG("Data : %c\n", c); - buf[i] = c; - i++; - } - else - c = '\n'; - } - buf[i] = '\0'; - return i; + int i = 0; + char c = '\0'; + int n; + while ((i < size - 1) && (c != '\n')) + { + n = antd_recv(sock, &c, 1); + if (n > 0) + { + //LOG("Data : %c\n", c); + buf[i] = c; + i++; + } + else + c = '\n'; + } + buf[i] = '\0'; + return i; } /* - We put it here since we want the plugin is able - to destroy the request if it want to - in this case, the plugin should return an empty - with no data + We put it here since we want the plugin is able + to destroy the request if it want to + in this case, the plugin should return an empty + with no data */ void destroy_request(void *data) { - if (!data) - return; - antd_request_t *rq = (antd_request_t *)data; - //LOG("Close request %d", rq->client->sock); - // free all other thing - if (rq->request) - { - dictionary_t tmp = dvalue(rq->request, "COOKIE"); - if (tmp) - freedict(tmp); - tmp = dvalue(rq->request, "REQUEST_HEADER"); - if (tmp) - freedict(tmp); - tmp = dvalue(rq->request, "REQUEST_DATA"); - if (tmp) - freedict(tmp); - dput(rq->request, "REQUEST_HEADER", NULL); - dput(rq->request, "REQUEST_DATA", NULL); - dput(rq->request, "COOKIE", NULL); - freedict(rq->request); - } - antd_close(rq->client); - free(rq); + if (!data) + return; + antd_request_t *rq = (antd_request_t *)data; + //LOG("Close request %d", rq->client->sock); + // free all other thing + if (rq->request) + { + dictionary_t tmp = dvalue(rq->request, "COOKIE"); + if (tmp) + freedict(tmp); + tmp = dvalue(rq->request, "REQUEST_HEADER"); + if (tmp) + freedict(tmp); + tmp = dvalue(rq->request, "REQUEST_DATA"); + if (tmp) + freedict(tmp); + dput(rq->request, "REQUEST_HEADER", NULL); + dput(rq->request, "REQUEST_DATA", NULL); + dput(rq->request, "COOKIE", NULL); + freedict(rq->request); + } + antd_close(rq->client); + free(rq); } \ No newline at end of file