1
0
mirror of https://github.com/lxsang/antd-cgi-plugin synced 2024-12-27 10:28:22 +01:00
antd-cgi-plugin/cgi.c

395 lines
10 KiB
C
Raw Normal View History

2019-11-19 17:16:05 +01:00
#define PLUGIN_IMPLEMENT 1
2020-08-25 17:16:53 +02:00
#include <string.h>
#include <errno.h>
#include <unistd.h>
2018-10-08 19:29:53 +02:00
#include <sys/wait.h>
2019-11-19 17:16:05 +01:00
#include <antd/plugin.h>
2020-08-25 17:16:53 +02:00
#include <antd/scheduler.h>
#include <antd/ini.h>
2021-01-02 20:03:30 +01:00
#include <antd/utils.h>
2020-08-25 17:16:53 +02:00
#include <ctype.h>
2019-12-30 17:19:48 +01:00
2020-01-02 11:56:05 +01:00
#define MAX_ENV_SIZE 100
2019-12-30 17:19:48 +01:00
2019-12-15 12:06:09 +01:00
dictionary_t cgi_bin = NULL;
2018-10-07 23:43:38 +02:00
2021-01-02 19:45:14 +01:00
typedef struct
{
2020-01-02 11:56:05 +01:00
int size;
2021-01-02 19:45:14 +01:00
char *env[MAX_ENV_SIZE];
2020-01-02 11:56:05 +01:00
} envar_arr_t;
2018-10-08 19:29:53 +02:00
static int ini_handle(void *user_data, const char *section, const char *name,
2018-10-08 22:30:13 +02:00
const char *value)
2018-10-07 23:43:38 +02:00
{
2018-10-08 19:29:53 +02:00
UNUSED(user_data);
2018-10-08 22:30:13 +02:00
if (EQU(section, "CGI"))
{
dput(cgi_bin, name, strdup(value));
2019-12-30 18:19:53 +01:00
LOG("put %s for %s", value, name);
2018-10-08 22:30:13 +02:00
}
2018-10-08 19:29:53 +02:00
else
{
return 0;
}
return 1;
}
2018-10-07 23:43:38 +02:00
2018-10-08 19:29:53 +02:00
void init()
{
use_raw_body();
cgi_bin = dict();
2018-10-08 22:30:13 +02:00
char *cnf = config_dir();
char *file = __s("%s/cgi.ini", cnf);
2018-10-08 19:29:53 +02:00
// read ini file
if (ini_parse(file, ini_handle, NULL) < 0)
2018-10-08 22:30:13 +02:00
{
2019-12-30 18:19:53 +01:00
ERROR("Can't load '%s'", file);
2018-10-08 22:30:13 +02:00
}
2019-11-13 16:59:44 +01:00
else
{
2019-12-30 18:19:53 +01:00
LOG("CGI config loaded");
2019-11-13 16:59:44 +01:00
}
2018-10-08 19:29:53 +02:00
free(cnf);
free(file);
2018-10-07 23:43:38 +02:00
}
void destroy()
{
2018-10-08 22:30:13 +02:00
if (cgi_bin)
2018-10-08 19:29:53 +02:00
freedict(cgi_bin);
2018-10-07 23:43:38 +02:00
}
2020-01-02 11:56:05 +01:00
static void add_vars(envar_arr_t *l, char *k, char *v)
2018-10-07 23:43:38 +02:00
{
2018-10-08 22:30:13 +02:00
if (!v || !l || !k)
return;
2021-01-02 19:45:14 +01:00
if (l->size >= MAX_ENV_SIZE - 1)
2020-01-02 11:56:05 +01:00
return;
2018-10-08 22:30:13 +02:00
char *data = __s("%s=%s", k, v);
2020-01-02 11:56:05 +01:00
l->env[l->size] = data;
l->size++;
//list_put_ptr(l, data);
2018-10-07 23:43:38 +02:00
}
2018-10-08 22:30:13 +02:00
static void write_request_body(antd_request_t *rq, int fd)
2018-10-07 23:43:38 +02:00
{
2018-10-08 22:30:13 +02:00
char *tmp = (char *)dvalue(rq->request, "METHOD");
2021-01-02 19:45:14 +01:00
int ret;
2018-10-08 22:30:13 +02:00
if (!tmp || EQU(tmp, "GET") || EQU(tmp, "HEAD"))
return;
2018-10-08 19:29:53 +02:00
int clen = -1;
2019-12-15 12:06:09 +01:00
dictionary_t header = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER");
2018-10-08 22:30:13 +02:00
tmp = (char *)dvalue(header, "Content-Length");
if (tmp)
clen = atoi(tmp);
if (clen == -1)
return;
2018-10-08 19:29:53 +02:00
// read data and write to the fd
char buf[BUFFLEN];
2018-10-08 22:30:13 +02:00
int readlen = clen > BUFFLEN ? BUFFLEN : clen;
int read = 0, stat = 1;
while (readlen > 0 && stat > 0)
{
stat = antd_recv(rq->client, buf, readlen);
if (stat > 0)
{
read += stat;
readlen = (clen - read) > BUFFLEN ? BUFFLEN : (clen - read);
2021-01-02 19:45:14 +01:00
ret = guard_write(fd, buf, stat);
2018-10-08 22:30:13 +02:00
}
}
2021-01-02 19:45:14 +01:00
UNUSED(ret);
2018-10-08 19:29:53 +02:00
}
2018-10-08 22:30:13 +02:00
static char *get_cgi_bin(antd_request_t *rq)
2018-10-08 19:29:53 +02:00
{
2018-10-08 22:30:13 +02:00
char *tmp = (char *)dvalue(rq->request, "RESOURCE_PATH");
if (!tmp)
return NULL;
2018-10-08 19:29:53 +02:00
tmp = ext(tmp);
2018-10-08 22:30:13 +02:00
if (!tmp)
return NULL;
char *bin = (char *)dvalue(cgi_bin, tmp);
2019-12-30 18:19:53 +01:00
LOG("CGI CMD: %s", bin);
2018-10-08 19:29:53 +02:00
free(tmp);
return bin;
}
2021-01-02 19:45:14 +01:00
static void get_env_vars(antd_request_t *rq, envar_arr_t *env_vars)
2018-10-08 19:29:53 +02:00
{
2018-10-08 22:30:13 +02:00
char *tmp = NULL;
char *sub = NULL;
2021-01-02 19:45:14 +01:00
char *root;
2019-12-15 12:06:09 +01:00
dictionary_t request = (dictionary_t)rq->request;
dictionary_t header = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER");
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "GATEWAY_INTERFACE", "CGI/1.1");
add_vars(env_vars, "SERVER_SOFTWARE", SERVER_NAME);
2021-01-22 01:14:36 +01:00
root = (char *)dvalue(request, "SERVER_WWW_ROOT");
2018-10-08 22:30:13 +02:00
tmp = (char *)dvalue(request, "REQUEST_QUERY");
if (!tmp)
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "QUERY_STRING", "");
2018-10-07 23:43:38 +02:00
else
{
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "REQUEST_URI", tmp);
2018-10-08 22:30:13 +02:00
sub = strchr(tmp, '?');
if (sub)
2018-10-07 23:43:38 +02:00
{
sub++;
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "QUERY_STRING", sub);
2018-10-07 23:43:38 +02:00
}
else
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "QUERY_STRING", "");
2018-10-07 23:43:38 +02:00
}
2018-10-08 22:30:13 +02:00
tmp = (char *)dvalue(request, "METHOD");
if (tmp)
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "REQUEST_METHOD", tmp);
2018-10-08 22:30:13 +02:00
tmp = (char *)dvalue(header, "Content-Type");
if (tmp)
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "CONTENT_TYPE", tmp);
2018-10-07 23:43:38 +02:00
else
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "CONTENT_TYPE", "");
2018-10-08 22:30:13 +02:00
tmp = (char *)dvalue(header, "Content-Length");
if (tmp)
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "CONTENT_LENGTH", tmp);
2018-10-07 23:43:38 +02:00
else
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "CONTENT_LENGTH", "");
2020-01-08 22:26:13 +01:00
add_vars(env_vars, "DOCUMENT_ROOT", root);
2018-10-08 22:30:13 +02:00
tmp = (char *)dvalue(request, "REQUEST_PATH");
if (tmp)
2019-12-30 13:02:27 +01:00
{
sub = tmp;
2021-01-02 19:45:14 +01:00
while (*sub == '/')
sub++;
if (sub)
2019-12-30 13:02:27 +01:00
{
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "PATH_INFO", sub);
2019-12-30 13:02:27 +01:00
}
else
{
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "PATH_INFO", "");
2019-12-30 13:02:27 +01:00
}
}
2018-10-07 23:43:38 +02:00
else
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "PATH_INFO", "");
2021-01-22 01:14:36 +01:00
tmp = (char *)dvalue(request, "REMOTE_ADDR");
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "REMOTE_ADDR", tmp);
add_vars(env_vars, "REMOTE_HOST", tmp);
add_vars(env_vars, "SERVER_NAME", SERVER_NAME);
2021-01-22 01:14:36 +01:00
add_vars(env_vars, "SERVER_PORT", (char *)dvalue(request, "SERVER_PORT"));
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "SERVER_PROTOCOL", "HTTP/1.1");
2018-10-07 23:43:38 +02:00
// add remaining header to the vars
2019-12-15 12:06:09 +01:00
chain_t it;
2018-10-07 23:43:38 +02:00
for_each_assoc(it, header)
{
tmp = __s("HTTP_%s", it->key);
char *s = tmp;
2018-10-08 22:30:13 +02:00
while (*s)
{
if (*s == '-')
2018-10-07 23:43:38 +02:00
*s = '_';
2018-10-08 22:30:13 +02:00
else if (*s != '_')
*s = toupper((char)*s);
2018-10-07 23:43:38 +02:00
s++;
}
2020-01-02 11:56:05 +01:00
add_vars(env_vars, tmp, (char *)it->value);
2018-10-07 23:43:38 +02:00
free(tmp);
}
2018-10-08 22:30:13 +02:00
tmp = (char *)dvalue(request, "RESOURCE_PATH");
if (tmp)
2018-10-07 23:43:38 +02:00
{
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "SCRIPT_NAME", tmp);
add_vars(env_vars, "SCRIPT_FILENAME", tmp);
2021-03-23 20:14:31 +01:00
tmp = __s("%s/%s", root, tmp);
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "PATH_TRANSLATED", tmp);
2018-10-07 23:43:38 +02:00
free(tmp);
}
else
{
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "SCRIPT_FILENAME", "");
add_vars(env_vars, "PATH_TRANSLATED", "");
add_vars(env_vars, "SCRIPT_NAME", "");
2018-10-07 23:43:38 +02:00
}
2018-10-08 19:29:53 +02:00
// redirect status for php
2020-01-02 11:56:05 +01:00
add_vars(env_vars, "REDIRECT_STATUS", "200");
2018-10-08 19:29:53 +02:00
}
2021-01-02 19:45:14 +01:00
int read_line(int fn, char *buf, int size)
2019-12-30 17:19:48 +01:00
{
2021-01-02 19:45:14 +01:00
int i = 0;
char c = '\0';
int n;
while ((i < size - 1) && (c != '\n'))
{
n = read(fn, &c, 1);
if (n > 0)
{
//LOG("Data : %c\n", c);
buf[i] = c;
i++;
}
else
2019-12-30 18:19:53 +01:00
{
2021-01-02 19:45:14 +01:00
if (i == 0)
2019-12-30 18:19:53 +01:00
i = n;
c = '\n';
}
2021-01-02 19:45:14 +01:00
}
if (i >= 0)
buf[i] = '\0';
return i;
2019-12-30 17:19:48 +01:00
}
2018-10-08 22:30:13 +02:00
void *handle(void *data)
2018-10-08 19:29:53 +02:00
{
antd_request_t *rq = (antd_request_t *)data;
2018-10-08 22:30:13 +02:00
void *cl = (void *)rq->client;
pid_t pid = 0;
2018-10-08 19:29:53 +02:00
int inpipefd[2];
int outpipefd[2];
2018-10-08 22:30:13 +02:00
char *bin = get_cgi_bin(rq);
2020-01-02 11:56:05 +01:00
antd_task_t *task = NULL;
2020-01-09 14:24:51 +01:00
if (!bin || ws_enable(rq->request))
2018-10-08 19:29:53 +02:00
{
2021-01-02 19:45:14 +01:00
ERROR("No cgi bin found or connection is websocket");
antd_error(cl, 503, "Service unavailable");
return antd_create_task(NULL, data, NULL, rq->client->last_io);
2018-10-08 19:29:53 +02:00
}
// PIPE
2021-01-02 19:45:14 +01:00
if (pipe(inpipefd) == -1)
{
ERROR("Can not create inpipe: %s", strerror(errno));
antd_error(cl, 503, "Service unavailable");
return antd_create_task(NULL, data, NULL, rq->client->last_io);
}
if (pipe(outpipefd) == -1)
{
ERROR("Can not create outpipe: %s", strerror(errno));
antd_error(cl, 503, "Service unavailable");
return antd_create_task(NULL, data, NULL, rq->client->last_io);
}
2018-10-07 23:43:38 +02:00
pid = fork();
if (pid == 0)
{
// Child
dup2(outpipefd[0], STDIN_FILENO);
dup2(inpipefd[1], STDOUT_FILENO);
2020-01-02 11:56:05 +01:00
// we dont wan't error message on stderr on the returned result
//dup2(inpipefd[1], STDERR_FILENO);
// now exec the cgi bin
LOG("Execute the cgi bin");
envar_arr_t envs;
envs.size = 0;
2021-01-02 19:45:14 +01:00
for (int i = 0; i < MAX_ENV_SIZE; i++)
2020-01-02 11:56:05 +01:00
{
envs.env[i] = NULL;
}
get_env_vars(rq, &envs);
2018-10-07 23:43:38 +02:00
//ask kernel to deliver SIGTERM in case the parent dies
//prctl(PR_SET_PDEATHSIG, SIGTERM);
2018-10-08 22:30:13 +02:00
char *argv[] = {bin, 0};
2020-01-02 11:56:05 +01:00
execve(argv[0], &argv[0], envs.env);
2018-10-08 22:30:13 +02:00
// Nothing below this line should be executed by child process. If so,
2018-10-07 23:43:38 +02:00
// it means that the execl function wasn't successfull, so lets exit:
_exit(1);
}
2020-01-02 11:56:05 +01:00
2018-10-08 19:29:53 +02:00
// The code below will be executed only by parent.
2018-10-07 23:43:38 +02:00
2020-01-02 11:56:05 +01:00
char buf[BUFFLEN];
int status;
2018-10-07 23:43:38 +02:00
//close unused pipe ends
close(outpipefd[0]);
close(inpipefd[1]);
2018-10-08 19:29:53 +02:00
// Now, we can write to outpipefd[1] and read from inpipefd[0] :
2018-10-08 22:30:13 +02:00
write_request_body(rq, outpipefd[1]);
2020-01-09 14:24:51 +01:00
regmatch_t matches[3];
2020-01-05 19:36:54 +01:00
//fd_set rfd;
//struct timeval timeout;
2021-01-02 19:45:14 +01:00
2020-01-09 14:24:51 +01:00
memset(buf, 0, sizeof(buf));
antd_response_header_t rhd;
rhd.header = dict();
rhd.cookie = list_init();
rhd.status = 200;
2021-01-02 19:45:14 +01:00
char *k;
char *v;
2020-01-09 14:24:51 +01:00
int len;
ssize_t count;
2021-01-02 19:45:14 +01:00
while (read_line(inpipefd[0], buf, BUFFLEN) > 0 && strcmp(buf, "\r\n") != 0)
2020-01-09 14:24:51 +01:00
{
2021-01-02 19:45:14 +01:00
trim(buf, '\n');
trim(buf, '\r');
if (regex_match("\\s*Status\\s*:\\s+([0-9]{3})\\s+([a-zA-Z0-9 ]*)", buf, 3, matches))
2020-01-09 14:24:51 +01:00
{
len = matches[1].rm_eo - matches[1].rm_so;
2021-01-02 19:45:14 +01:00
k = (char *)malloc(len);
2020-01-09 14:24:51 +01:00
memset(k, 0, len);
memcpy(k, buf + matches[1].rm_so, len);
rhd.status = atoi(k);
free(k);
}
2021-01-02 19:45:14 +01:00
else if (regex_match("^([a-zA-Z0-9\\-]+)\\s*:\\s*(.*)$", buf, 3, matches))
2020-01-09 14:24:51 +01:00
{
len = matches[1].rm_eo - matches[1].rm_so;
2021-01-02 19:45:14 +01:00
k = (char *)malloc(len + 1);
2020-01-09 14:24:51 +01:00
memcpy(k, buf + matches[1].rm_so, len);
k[len] = '\0';
verify_header(k);
2021-01-02 19:45:14 +01:00
len = matches[2].rm_eo - matches[2].rm_so;
v = (char *)malloc(len + 1);
2020-01-09 14:24:51 +01:00
memcpy(v, buf + matches[2].rm_so, len);
v[len] = '\0';
2021-01-02 19:45:14 +01:00
if (strcmp(k, "Set-Cookie") == 0)
2020-01-09 14:24:51 +01:00
{
2021-01-02 19:45:14 +01:00
list_put_ptr(&rhd.cookie, v);
2020-01-09 14:24:51 +01:00
}
else
{
dput(rhd.header, k, v);
}
free(k);
}
else
{
LOG("Ignore invalid header: %s", buf);
}
}
antd_send_header(rq->client, &rhd);
// send out the rest of data
2020-01-05 19:36:54 +01:00
while (1)
2018-10-08 22:30:13 +02:00
{
2021-01-03 00:27:24 +01:00
count = read(inpipefd[0], buf, BUFFLEN);
2021-01-02 19:45:14 +01:00
2018-10-08 22:30:13 +02:00
if (count == -1)
{
if (errno == EINTR)
{
continue;
}
else
{
2020-01-05 19:36:54 +01:00
ERROR("Read: %s", strerror(errno));
2018-10-08 22:30:13 +02:00
break;
}
}
2020-01-09 14:24:51 +01:00
2018-10-08 22:30:13 +02:00
else if (count == 0)
{
2021-01-02 19:45:14 +01:00
if (waitpid(pid, &status, WNOHANG) != 0)
2020-01-05 19:36:54 +01:00
{
break;
}
2021-01-02 19:45:14 +01:00
continue;
2018-10-08 22:30:13 +02:00
}
else
{
2020-08-25 17:16:53 +02:00
UNUSED(antd_send(cl, buf, count));
2018-10-08 22:30:13 +02:00
}
}
2020-01-09 14:24:51 +01:00
2020-01-05 19:36:54 +01:00
kill(pid, SIGKILL);
2019-12-30 13:02:27 +01:00
//waitpid(pid, &status, 0);
2021-01-02 19:45:14 +01:00
task = antd_create_task(NULL, data, NULL, rq->client->last_io);
2018-10-07 23:43:38 +02:00
return task;
2019-11-13 16:59:44 +01:00
}