2019-11-19 17:16:05 +01:00
|
|
|
#define PLUGIN_IMPLEMENT 1
|
2020-08-25 17:16:53 +02:00
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <unistd.h>
|
2018-10-08 19:29:53 +02:00
|
|
|
#include <sys/wait.h>
|
2019-11-19 17:16:05 +01:00
|
|
|
#include <antd/plugin.h>
|
2020-08-25 17:16:53 +02:00
|
|
|
#include <antd/scheduler.h>
|
|
|
|
#include <antd/ini.h>
|
2021-01-02 20:03:30 +01:00
|
|
|
#include <antd/utils.h>
|
2020-08-25 17:16:53 +02:00
|
|
|
#include <ctype.h>
|
2019-12-30 17:19:48 +01:00
|
|
|
|
2020-01-02 11:56:05 +01:00
|
|
|
#define MAX_ENV_SIZE 100
|
2019-12-30 17:19:48 +01:00
|
|
|
|
2019-12-15 12:06:09 +01:00
|
|
|
dictionary_t cgi_bin = NULL;
|
2018-10-07 23:43:38 +02:00
|
|
|
|
2021-01-02 19:45:14 +01:00
|
|
|
typedef struct
|
|
|
|
{
|
2020-01-02 11:56:05 +01:00
|
|
|
int size;
|
2021-01-02 19:45:14 +01:00
|
|
|
char *env[MAX_ENV_SIZE];
|
2020-01-02 11:56:05 +01:00
|
|
|
} envar_arr_t;
|
|
|
|
|
2018-10-08 19:29:53 +02:00
|
|
|
static int ini_handle(void *user_data, const char *section, const char *name,
|
2018-10-08 22:30:13 +02:00
|
|
|
const char *value)
|
2018-10-07 23:43:38 +02:00
|
|
|
{
|
2018-10-08 19:29:53 +02:00
|
|
|
UNUSED(user_data);
|
2018-10-08 22:30:13 +02:00
|
|
|
if (EQU(section, "CGI"))
|
|
|
|
{
|
|
|
|
dput(cgi_bin, name, strdup(value));
|
2019-12-30 18:19:53 +01:00
|
|
|
LOG("put %s for %s", value, name);
|
2018-10-08 22:30:13 +02:00
|
|
|
}
|
2018-10-08 19:29:53 +02:00
|
|
|
else
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
2018-10-07 23:43:38 +02:00
|
|
|
|
2018-10-08 19:29:53 +02:00
|
|
|
void init()
|
|
|
|
{
|
|
|
|
use_raw_body();
|
|
|
|
cgi_bin = dict();
|
2018-10-08 22:30:13 +02:00
|
|
|
char *cnf = config_dir();
|
|
|
|
char *file = __s("%s/cgi.ini", cnf);
|
2018-10-08 19:29:53 +02:00
|
|
|
// read ini file
|
|
|
|
if (ini_parse(file, ini_handle, NULL) < 0)
|
2018-10-08 22:30:13 +02:00
|
|
|
{
|
2019-12-30 18:19:53 +01:00
|
|
|
ERROR("Can't load '%s'", file);
|
2018-10-08 22:30:13 +02:00
|
|
|
}
|
2019-11-13 16:59:44 +01:00
|
|
|
else
|
|
|
|
{
|
2019-12-30 18:19:53 +01:00
|
|
|
LOG("CGI config loaded");
|
2019-11-13 16:59:44 +01:00
|
|
|
}
|
2018-10-08 19:29:53 +02:00
|
|
|
free(cnf);
|
|
|
|
free(file);
|
2018-10-07 23:43:38 +02:00
|
|
|
}
|
|
|
|
void destroy()
|
|
|
|
{
|
2018-10-08 22:30:13 +02:00
|
|
|
if (cgi_bin)
|
2018-10-08 19:29:53 +02:00
|
|
|
freedict(cgi_bin);
|
2018-10-07 23:43:38 +02:00
|
|
|
}
|
|
|
|
|
2020-01-02 11:56:05 +01:00
|
|
|
static void add_vars(envar_arr_t *l, char *k, char *v)
|
2018-10-07 23:43:38 +02:00
|
|
|
{
|
2018-10-08 22:30:13 +02:00
|
|
|
if (!v || !l || !k)
|
|
|
|
return;
|
2021-01-02 19:45:14 +01:00
|
|
|
if (l->size >= MAX_ENV_SIZE - 1)
|
2020-01-02 11:56:05 +01:00
|
|
|
return;
|
2018-10-08 22:30:13 +02:00
|
|
|
char *data = __s("%s=%s", k, v);
|
2020-01-02 11:56:05 +01:00
|
|
|
l->env[l->size] = data;
|
|
|
|
l->size++;
|
|
|
|
//list_put_ptr(l, data);
|
2018-10-07 23:43:38 +02:00
|
|
|
}
|
|
|
|
|
2018-10-08 22:30:13 +02:00
|
|
|
static void write_request_body(antd_request_t *rq, int fd)
|
2018-10-07 23:43:38 +02:00
|
|
|
{
|
2018-10-08 22:30:13 +02:00
|
|
|
char *tmp = (char *)dvalue(rq->request, "METHOD");
|
2021-01-02 19:45:14 +01:00
|
|
|
int ret;
|
2018-10-08 22:30:13 +02:00
|
|
|
if (!tmp || EQU(tmp, "GET") || EQU(tmp, "HEAD"))
|
|
|
|
return;
|
2018-10-08 19:29:53 +02:00
|
|
|
int clen = -1;
|
2019-12-15 12:06:09 +01:00
|
|
|
dictionary_t header = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER");
|
2018-10-08 22:30:13 +02:00
|
|
|
tmp = (char *)dvalue(header, "Content-Length");
|
|
|
|
if (tmp)
|
|
|
|
clen = atoi(tmp);
|
|
|
|
if (clen == -1)
|
|
|
|
return;
|
2018-10-08 19:29:53 +02:00
|
|
|
// read data and write to the fd
|
|
|
|
char buf[BUFFLEN];
|
2018-10-08 22:30:13 +02:00
|
|
|
int readlen = clen > BUFFLEN ? BUFFLEN : clen;
|
|
|
|
int read = 0, stat = 1;
|
|
|
|
while (readlen > 0 && stat > 0)
|
|
|
|
{
|
|
|
|
stat = antd_recv(rq->client, buf, readlen);
|
|
|
|
if (stat > 0)
|
|
|
|
{
|
|
|
|
read += stat;
|
|
|
|
readlen = (clen - read) > BUFFLEN ? BUFFLEN : (clen - read);
|
2021-01-02 19:45:14 +01:00
|
|
|
ret = guard_write(fd, buf, stat);
|
2018-10-08 22:30:13 +02:00
|
|
|
}
|
|
|
|
}
|
2021-01-02 19:45:14 +01:00
|
|
|
UNUSED(ret);
|
2018-10-08 19:29:53 +02:00
|
|
|
}
|
2018-10-08 22:30:13 +02:00
|
|
|
static char *get_cgi_bin(antd_request_t *rq)
|
2018-10-08 19:29:53 +02:00
|
|
|
{
|
2018-10-08 22:30:13 +02:00
|
|
|
char *tmp = (char *)dvalue(rq->request, "RESOURCE_PATH");
|
|
|
|
if (!tmp)
|
|
|
|
return NULL;
|
2018-10-08 19:29:53 +02:00
|
|
|
tmp = ext(tmp);
|
2018-10-08 22:30:13 +02:00
|
|
|
if (!tmp)
|
|
|
|
return NULL;
|
|
|
|
char *bin = (char *)dvalue(cgi_bin, tmp);
|
2019-12-30 18:19:53 +01:00
|
|
|
LOG("CGI CMD: %s", bin);
|
2018-10-08 19:29:53 +02:00
|
|
|
free(tmp);
|
|
|
|
return bin;
|
|
|
|
}
|
2021-01-02 19:45:14 +01:00
|
|
|
static void get_env_vars(antd_request_t *rq, envar_arr_t *env_vars)
|
2018-10-08 19:29:53 +02:00
|
|
|
{
|
2018-10-08 22:30:13 +02:00
|
|
|
char *tmp = NULL;
|
|
|
|
char *sub = NULL;
|
2021-01-02 19:45:14 +01:00
|
|
|
char *root;
|
2019-12-15 12:06:09 +01:00
|
|
|
dictionary_t request = (dictionary_t)rq->request;
|
|
|
|
dictionary_t header = (dictionary_t)dvalue(rq->request, "REQUEST_HEADER");
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "GATEWAY_INTERFACE", "CGI/1.1");
|
|
|
|
add_vars(env_vars, "SERVER_SOFTWARE", SERVER_NAME);
|
2021-01-22 01:14:36 +01:00
|
|
|
root = (char *)dvalue(request, "SERVER_WWW_ROOT");
|
2018-10-08 22:30:13 +02:00
|
|
|
tmp = (char *)dvalue(request, "REQUEST_QUERY");
|
|
|
|
if (!tmp)
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "QUERY_STRING", "");
|
2018-10-07 23:43:38 +02:00
|
|
|
else
|
|
|
|
{
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "REQUEST_URI", tmp);
|
2018-10-08 22:30:13 +02:00
|
|
|
sub = strchr(tmp, '?');
|
|
|
|
if (sub)
|
2018-10-07 23:43:38 +02:00
|
|
|
{
|
|
|
|
sub++;
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "QUERY_STRING", sub);
|
2018-10-07 23:43:38 +02:00
|
|
|
}
|
|
|
|
else
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "QUERY_STRING", "");
|
2018-10-07 23:43:38 +02:00
|
|
|
}
|
2018-10-08 22:30:13 +02:00
|
|
|
tmp = (char *)dvalue(request, "METHOD");
|
|
|
|
if (tmp)
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "REQUEST_METHOD", tmp);
|
2018-10-08 22:30:13 +02:00
|
|
|
tmp = (char *)dvalue(header, "Content-Type");
|
|
|
|
if (tmp)
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "CONTENT_TYPE", tmp);
|
2018-10-07 23:43:38 +02:00
|
|
|
else
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "CONTENT_TYPE", "");
|
2018-10-08 22:30:13 +02:00
|
|
|
tmp = (char *)dvalue(header, "Content-Length");
|
|
|
|
if (tmp)
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "CONTENT_LENGTH", tmp);
|
2018-10-07 23:43:38 +02:00
|
|
|
else
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "CONTENT_LENGTH", "");
|
2020-01-08 22:26:13 +01:00
|
|
|
add_vars(env_vars, "DOCUMENT_ROOT", root);
|
2018-10-08 22:30:13 +02:00
|
|
|
tmp = (char *)dvalue(request, "REQUEST_PATH");
|
|
|
|
if (tmp)
|
2019-12-30 13:02:27 +01:00
|
|
|
{
|
|
|
|
sub = tmp;
|
2021-01-02 19:45:14 +01:00
|
|
|
while (*sub == '/')
|
|
|
|
sub++;
|
|
|
|
if (sub)
|
2019-12-30 13:02:27 +01:00
|
|
|
{
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "PATH_INFO", sub);
|
2019-12-30 13:02:27 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "PATH_INFO", "");
|
2019-12-30 13:02:27 +01:00
|
|
|
}
|
|
|
|
}
|
2018-10-07 23:43:38 +02:00
|
|
|
else
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "PATH_INFO", "");
|
2021-01-22 01:14:36 +01:00
|
|
|
tmp = (char *)dvalue(request, "REMOTE_ADDR");
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "REMOTE_ADDR", tmp);
|
|
|
|
add_vars(env_vars, "REMOTE_HOST", tmp);
|
|
|
|
add_vars(env_vars, "SERVER_NAME", SERVER_NAME);
|
2021-01-22 01:14:36 +01:00
|
|
|
add_vars(env_vars, "SERVER_PORT", (char *)dvalue(request, "SERVER_PORT"));
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "SERVER_PROTOCOL", "HTTP/1.1");
|
2018-10-07 23:43:38 +02:00
|
|
|
// add remaining header to the vars
|
2019-12-15 12:06:09 +01:00
|
|
|
chain_t it;
|
2018-10-07 23:43:38 +02:00
|
|
|
for_each_assoc(it, header)
|
|
|
|
{
|
|
|
|
tmp = __s("HTTP_%s", it->key);
|
|
|
|
char *s = tmp;
|
2018-10-08 22:30:13 +02:00
|
|
|
while (*s)
|
|
|
|
{
|
|
|
|
if (*s == '-')
|
2018-10-07 23:43:38 +02:00
|
|
|
*s = '_';
|
2018-10-08 22:30:13 +02:00
|
|
|
else if (*s != '_')
|
|
|
|
*s = toupper((char)*s);
|
2018-10-07 23:43:38 +02:00
|
|
|
s++;
|
|
|
|
}
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, tmp, (char *)it->value);
|
2018-10-07 23:43:38 +02:00
|
|
|
free(tmp);
|
|
|
|
}
|
2018-10-08 22:30:13 +02:00
|
|
|
tmp = (char *)dvalue(request, "RESOURCE_PATH");
|
|
|
|
if (tmp)
|
2018-10-07 23:43:38 +02:00
|
|
|
{
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "SCRIPT_NAME", tmp);
|
2020-01-08 22:26:13 +01:00
|
|
|
tmp = __s("%s/%s", root, tmp);
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "SCRIPT_FILENAME", tmp);
|
|
|
|
add_vars(env_vars, "PATH_TRANSLATED", tmp);
|
2018-10-07 23:43:38 +02:00
|
|
|
free(tmp);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "SCRIPT_FILENAME", "");
|
|
|
|
add_vars(env_vars, "PATH_TRANSLATED", "");
|
|
|
|
add_vars(env_vars, "SCRIPT_NAME", "");
|
2018-10-07 23:43:38 +02:00
|
|
|
}
|
2018-10-08 19:29:53 +02:00
|
|
|
// redirect status for php
|
2020-01-02 11:56:05 +01:00
|
|
|
add_vars(env_vars, "REDIRECT_STATUS", "200");
|
2018-10-08 19:29:53 +02:00
|
|
|
}
|
|
|
|
|
2021-01-02 19:45:14 +01:00
|
|
|
int read_line(int fn, char *buf, int size)
|
2019-12-30 17:19:48 +01:00
|
|
|
{
|
2021-01-02 19:45:14 +01:00
|
|
|
int i = 0;
|
|
|
|
char c = '\0';
|
|
|
|
int n;
|
|
|
|
while ((i < size - 1) && (c != '\n'))
|
|
|
|
{
|
|
|
|
n = read(fn, &c, 1);
|
|
|
|
if (n > 0)
|
|
|
|
{
|
|
|
|
//LOG("Data : %c\n", c);
|
|
|
|
buf[i] = c;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
else
|
2019-12-30 18:19:53 +01:00
|
|
|
{
|
2021-01-02 19:45:14 +01:00
|
|
|
if (i == 0)
|
2019-12-30 18:19:53 +01:00
|
|
|
i = n;
|
|
|
|
c = '\n';
|
|
|
|
}
|
2021-01-02 19:45:14 +01:00
|
|
|
}
|
|
|
|
if (i >= 0)
|
|
|
|
buf[i] = '\0';
|
|
|
|
return i;
|
2019-12-30 17:19:48 +01:00
|
|
|
}
|
|
|
|
|
2018-10-08 22:30:13 +02:00
|
|
|
void *handle(void *data)
|
2018-10-08 19:29:53 +02:00
|
|
|
{
|
|
|
|
antd_request_t *rq = (antd_request_t *)data;
|
2018-10-08 22:30:13 +02:00
|
|
|
void *cl = (void *)rq->client;
|
|
|
|
pid_t pid = 0;
|
2018-10-08 19:29:53 +02:00
|
|
|
int inpipefd[2];
|
|
|
|
int outpipefd[2];
|
2018-10-08 22:30:13 +02:00
|
|
|
char *bin = get_cgi_bin(rq);
|
2020-01-02 11:56:05 +01:00
|
|
|
antd_task_t *task = NULL;
|
2020-01-09 14:24:51 +01:00
|
|
|
if (!bin || ws_enable(rq->request))
|
2018-10-08 19:29:53 +02:00
|
|
|
{
|
2021-01-02 19:45:14 +01:00
|
|
|
ERROR("No cgi bin found or connection is websocket");
|
|
|
|
antd_error(cl, 503, "Service unavailable");
|
|
|
|
return antd_create_task(NULL, data, NULL, rq->client->last_io);
|
2018-10-08 19:29:53 +02:00
|
|
|
}
|
|
|
|
// PIPE
|
2021-01-02 19:45:14 +01:00
|
|
|
if (pipe(inpipefd) == -1)
|
|
|
|
{
|
|
|
|
ERROR("Can not create inpipe: %s", strerror(errno));
|
|
|
|
antd_error(cl, 503, "Service unavailable");
|
|
|
|
return antd_create_task(NULL, data, NULL, rq->client->last_io);
|
|
|
|
}
|
|
|
|
if (pipe(outpipefd) == -1)
|
|
|
|
{
|
|
|
|
ERROR("Can not create outpipe: %s", strerror(errno));
|
|
|
|
antd_error(cl, 503, "Service unavailable");
|
|
|
|
return antd_create_task(NULL, data, NULL, rq->client->last_io);
|
|
|
|
}
|
2018-10-07 23:43:38 +02:00
|
|
|
pid = fork();
|
|
|
|
if (pid == 0)
|
|
|
|
{
|
|
|
|
// Child
|
|
|
|
dup2(outpipefd[0], STDIN_FILENO);
|
|
|
|
dup2(inpipefd[1], STDOUT_FILENO);
|
2020-01-02 11:56:05 +01:00
|
|
|
// we dont wan't error message on stderr on the returned result
|
|
|
|
//dup2(inpipefd[1], STDERR_FILENO);
|
|
|
|
// now exec the cgi bin
|
|
|
|
LOG("Execute the cgi bin");
|
|
|
|
envar_arr_t envs;
|
|
|
|
envs.size = 0;
|
2021-01-02 19:45:14 +01:00
|
|
|
for (int i = 0; i < MAX_ENV_SIZE; i++)
|
2020-01-02 11:56:05 +01:00
|
|
|
{
|
|
|
|
envs.env[i] = NULL;
|
|
|
|
}
|
|
|
|
get_env_vars(rq, &envs);
|
2018-10-07 23:43:38 +02:00
|
|
|
//ask kernel to deliver SIGTERM in case the parent dies
|
|
|
|
//prctl(PR_SET_PDEATHSIG, SIGTERM);
|
2018-10-08 22:30:13 +02:00
|
|
|
char *argv[] = {bin, 0};
|
2020-01-02 11:56:05 +01:00
|
|
|
execve(argv[0], &argv[0], envs.env);
|
2018-10-08 22:30:13 +02:00
|
|
|
// Nothing below this line should be executed by child process. If so,
|
2018-10-07 23:43:38 +02:00
|
|
|
// it means that the execl function wasn't successfull, so lets exit:
|
|
|
|
_exit(1);
|
|
|
|
}
|
2020-01-02 11:56:05 +01:00
|
|
|
|
2018-10-08 19:29:53 +02:00
|
|
|
// The code below will be executed only by parent.
|
2018-10-07 23:43:38 +02:00
|
|
|
|
2020-01-02 11:56:05 +01:00
|
|
|
char buf[BUFFLEN];
|
|
|
|
int status;
|
2018-10-07 23:43:38 +02:00
|
|
|
//close unused pipe ends
|
|
|
|
close(outpipefd[0]);
|
|
|
|
close(inpipefd[1]);
|
|
|
|
|
2018-10-08 19:29:53 +02:00
|
|
|
// Now, we can write to outpipefd[1] and read from inpipefd[0] :
|
2018-10-08 22:30:13 +02:00
|
|
|
write_request_body(rq, outpipefd[1]);
|
2020-01-09 14:24:51 +01:00
|
|
|
regmatch_t matches[3];
|
2020-01-05 19:36:54 +01:00
|
|
|
//fd_set rfd;
|
|
|
|
//struct timeval timeout;
|
2021-01-02 19:45:14 +01:00
|
|
|
|
2020-01-09 14:24:51 +01:00
|
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
antd_response_header_t rhd;
|
|
|
|
rhd.header = dict();
|
|
|
|
rhd.cookie = list_init();
|
|
|
|
rhd.status = 200;
|
2021-01-02 19:45:14 +01:00
|
|
|
char *k;
|
|
|
|
char *v;
|
2020-01-09 14:24:51 +01:00
|
|
|
int len;
|
|
|
|
ssize_t count;
|
2021-01-02 19:45:14 +01:00
|
|
|
|
|
|
|
while (read_line(inpipefd[0], buf, BUFFLEN) > 0 && strcmp(buf, "\r\n") != 0)
|
2020-01-09 14:24:51 +01:00
|
|
|
{
|
2021-01-02 19:45:14 +01:00
|
|
|
trim(buf, '\n');
|
|
|
|
trim(buf, '\r');
|
|
|
|
if (regex_match("\\s*Status\\s*:\\s+([0-9]{3})\\s+([a-zA-Z0-9 ]*)", buf, 3, matches))
|
2020-01-09 14:24:51 +01:00
|
|
|
{
|
|
|
|
len = matches[1].rm_eo - matches[1].rm_so;
|
2021-01-02 19:45:14 +01:00
|
|
|
k = (char *)malloc(len);
|
2020-01-09 14:24:51 +01:00
|
|
|
memset(k, 0, len);
|
|
|
|
memcpy(k, buf + matches[1].rm_so, len);
|
|
|
|
rhd.status = atoi(k);
|
|
|
|
free(k);
|
|
|
|
}
|
2021-01-02 19:45:14 +01:00
|
|
|
else if (regex_match("^([a-zA-Z0-9\\-]+)\\s*:\\s*(.*)$", buf, 3, matches))
|
2020-01-09 14:24:51 +01:00
|
|
|
{
|
|
|
|
len = matches[1].rm_eo - matches[1].rm_so;
|
2021-01-02 19:45:14 +01:00
|
|
|
k = (char *)malloc(len + 1);
|
2020-01-09 14:24:51 +01:00
|
|
|
memcpy(k, buf + matches[1].rm_so, len);
|
|
|
|
k[len] = '\0';
|
|
|
|
verify_header(k);
|
2021-01-02 19:45:14 +01:00
|
|
|
len = matches[2].rm_eo - matches[2].rm_so;
|
|
|
|
v = (char *)malloc(len + 1);
|
2020-01-09 14:24:51 +01:00
|
|
|
memcpy(v, buf + matches[2].rm_so, len);
|
|
|
|
v[len] = '\0';
|
2021-01-02 19:45:14 +01:00
|
|
|
if (strcmp(k, "Set-Cookie") == 0)
|
2020-01-09 14:24:51 +01:00
|
|
|
{
|
2021-01-02 19:45:14 +01:00
|
|
|
list_put_ptr(&rhd.cookie, v);
|
2020-01-09 14:24:51 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
dput(rhd.header, k, v);
|
|
|
|
}
|
|
|
|
free(k);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG("Ignore invalid header: %s", buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
antd_send_header(rq->client, &rhd);
|
|
|
|
// send out the rest of data
|
2020-01-05 19:36:54 +01:00
|
|
|
while (1)
|
2018-10-08 22:30:13 +02:00
|
|
|
{
|
2021-01-03 00:27:24 +01:00
|
|
|
count = read(inpipefd[0], buf, BUFFLEN);
|
2021-01-02 19:45:14 +01:00
|
|
|
|
2018-10-08 22:30:13 +02:00
|
|
|
if (count == -1)
|
|
|
|
{
|
|
|
|
if (errno == EINTR)
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2020-01-05 19:36:54 +01:00
|
|
|
ERROR("Read: %s", strerror(errno));
|
2018-10-08 22:30:13 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2020-01-09 14:24:51 +01:00
|
|
|
|
2018-10-08 22:30:13 +02:00
|
|
|
else if (count == 0)
|
|
|
|
{
|
2021-01-02 19:45:14 +01:00
|
|
|
if (waitpid(pid, &status, WNOHANG) != 0)
|
2020-01-05 19:36:54 +01:00
|
|
|
{
|
|
|
|
break;
|
|
|
|
}
|
2021-01-02 19:45:14 +01:00
|
|
|
continue;
|
2018-10-08 22:30:13 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2020-08-25 17:16:53 +02:00
|
|
|
UNUSED(antd_send(cl, buf, count));
|
2018-10-08 22:30:13 +02:00
|
|
|
}
|
|
|
|
}
|
2020-01-09 14:24:51 +01:00
|
|
|
|
2020-01-05 19:36:54 +01:00
|
|
|
kill(pid, SIGKILL);
|
2019-12-30 13:02:27 +01:00
|
|
|
//waitpid(pid, &status, 0);
|
2021-01-02 19:45:14 +01:00
|
|
|
task = antd_create_task(NULL, data, NULL, rq->client->last_io);
|
2018-10-07 23:43:38 +02:00
|
|
|
return task;
|
2019-11-13 16:59:44 +01:00
|
|
|
}
|