ced4594599
[INTERPRETER] * BUG: Take care of components that modifiy the 'environ' variable. Using 'gb.httpd' does not crash anymore.
4376 lines
111 KiB
C
4376 lines
111 KiB
C
/* libhttpd.c - HTTP protocol library
|
|
**
|
|
** Copyright (c) 1995,1998,1999,2000,2001 by Jef Poskanzer <jef@mail.acme.com>.
|
|
** All rights reserved.
|
|
**
|
|
** Redistribution and use in source and binary forms, with or without
|
|
** modification, are permitted provided that the following conditions
|
|
** are met:
|
|
** 1. Redistributions of source code must retain the above copyright
|
|
** notice, this list of conditions and the following disclaimer.
|
|
** 2. Redistributions in binary form must reproduce the above copyright
|
|
** notice, this list of conditions and the following disclaimer in the
|
|
** documentation and/or other materials provided with the distribution.
|
|
**
|
|
** THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
** ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
** IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
** ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
** FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
** DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
** OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
** HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
** LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
** OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
** SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "main.h"
|
|
#include "thttpd.h"
|
|
#include "version.h"
|
|
|
|
#ifdef SHOW_SERVER_VERSION
|
|
#define EXPOSED_SERVER_SOFTWARE SERVER_SOFTWARE
|
|
#else /* SHOW_SERVER_VERSION */
|
|
#define EXPOSED_SERVER_SOFTWARE "gb.httpd"
|
|
#endif /* SHOW_SERVER_VERSION */
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/param.h>
|
|
#include <sys/stat.h>
|
|
|
|
#include <ctype.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <time.h>
|
|
#ifdef HAVE_MEMORY_H
|
|
#include <memory.h>
|
|
#endif /* HAVE_MEMORY_H */
|
|
#include <pwd.h>
|
|
#include <signal.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
//#include <syslog.h>
|
|
#include <unistd.h>
|
|
#include <stdarg.h>
|
|
|
|
#ifdef HAVE_OSRELDATE_H
|
|
#include <osreldate.h>
|
|
#endif /* HAVE_OSRELDATE_H */
|
|
|
|
#ifdef HAVE_DIRENT_H
|
|
#include <dirent.h>
|
|
#define NAMLEN(dirent) strlen((dirent)->d_name)
|
|
#else
|
|
#define dirent direct
|
|
#define NAMLEN(dirent) (dirent)->d_namlen
|
|
#ifdef HAVE_SYS_NDIR_H
|
|
#include <sys/ndir.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_DIR_H
|
|
#include <sys/dir.h>
|
|
#endif
|
|
#ifdef HAVE_NDIR_H
|
|
#include <ndir.h>
|
|
#endif
|
|
#endif
|
|
|
|
extern char *crypt(const char *key, const char *setting);
|
|
|
|
#include "libhttpd.h"
|
|
#include "timers.h"
|
|
#include "match.h"
|
|
#include "tdate_parse.h"
|
|
|
|
#ifndef STDIN_FILENO
|
|
#define STDIN_FILENO 0
|
|
#endif
|
|
#ifndef STDOUT_FILENO
|
|
#define STDOUT_FILENO 1
|
|
#endif
|
|
#ifndef STDERR_FILENO
|
|
#define STDERR_FILENO 2
|
|
#endif
|
|
|
|
#ifndef SHUT_WR
|
|
#define SHUT_WR 1
|
|
#endif
|
|
|
|
#ifndef HAVE_INT64T
|
|
typedef long long int64_t;
|
|
#endif
|
|
|
|
#ifndef HAVE_SOCKLENT
|
|
typedef int socklen_t;
|
|
#endif
|
|
|
|
#ifdef __CYGWIN__
|
|
#define timezone _timezone
|
|
#endif
|
|
|
|
#ifndef MAX
|
|
#define MAX(a,b) ((a) > (b) ? (a) : (b))
|
|
#endif
|
|
#ifndef MIN
|
|
#define MIN(a,b) ((a) < (b) ? (a) : (b))
|
|
#endif
|
|
|
|
extern char **environ;
|
|
|
|
/* Forwards. */
|
|
static void check_options(void);
|
|
static void free_httpd_server(httpd_server * hs);
|
|
static int initialize_listen_socket(httpd_sockaddr * saP);
|
|
static void add_response(httpd_conn * hc, char *str);
|
|
static void send_mime(httpd_conn * hc, int status, char *title,
|
|
char *encodings, char *extraheads, char *type,
|
|
off_t length, time_t mod);
|
|
static void send_response(httpd_conn * hc, int status, char *title,
|
|
char *extraheads, char *form, char *arg);
|
|
static void send_response_tail(httpd_conn * hc);
|
|
static void defang(char *str, char *dfstr, int dfsize);
|
|
#ifdef ERR_DIR
|
|
static int send_err_file(httpd_conn * hc, int status, char *title,
|
|
char *extraheads, char *filename);
|
|
#endif /* ERR_DIR */
|
|
#ifdef AUTH_FILE
|
|
static void send_authenticate(httpd_conn * hc, char *realm);
|
|
static int b64_decode(const char *str, unsigned char *space, int size);
|
|
//static int auth_check (httpd_conn * hc, char *dirname);
|
|
//static int auth_check2 (httpd_conn * hc, char *dirname);
|
|
#endif /* AUTH_FILE */
|
|
//static void send_dirredirect (httpd_conn * hc);
|
|
static int hexit(char c);
|
|
static void strdecode(char *to, char *from);
|
|
#ifdef GENERATE_INDEXES
|
|
static void strencode(char *to, int tosize, char *from);
|
|
#endif /* GENERATE_INDEXES */
|
|
#ifdef TILDE_MAP_1
|
|
static int tilde_map_1(httpd_conn * hc);
|
|
#endif /* TILDE_MAP_1 */
|
|
#ifdef TILDE_MAP_2
|
|
static int tilde_map_2(httpd_conn * hc);
|
|
#endif /* TILDE_MAP_2 */
|
|
static int vhost_map(httpd_conn * hc);
|
|
//static char *expand_symlinks (char *path, char **restP, int no_symlink_check, int tildemapped);
|
|
static char *bufgets(httpd_conn * hc);
|
|
static void de_dotdot(char *file);
|
|
static void init_mime(void);
|
|
static void figure_mime (httpd_conn * hc);
|
|
#ifdef CGI_TIMELIMIT
|
|
static void cgi_kill2(ClientData client_data, struct timeval *nowP);
|
|
static void cgi_kill(ClientData client_data, struct timeval *nowP);
|
|
#endif /* CGI_TIMELIMIT */
|
|
#ifdef GENERATE_INDEXES
|
|
static int ls(httpd_conn * hc);
|
|
#endif /* GENERATE_INDEXES */
|
|
static char *build_env(char *fmt, char *arg);
|
|
#ifdef SERVER_NAME_LIST
|
|
static char *hostname_map(char *hostname);
|
|
#endif /* SERVER_NAME_LIST */
|
|
static char **make_envp(httpd_conn * hc);
|
|
static char **make_argp(httpd_conn * hc);
|
|
static void cgi_interpose_input(httpd_conn * hc, int wfd);
|
|
static void post_post_garbage_hack(httpd_conn * hc);
|
|
static void cgi_interpose_output(httpd_conn * hc, int rfd);
|
|
static void cgi_child(httpd_conn * hc);
|
|
static int cgi(httpd_conn * hc);
|
|
static int really_start_request(httpd_conn * hc, struct timeval *nowP);
|
|
static void make_log_entry(httpd_conn * hc, struct timeval *nowP);
|
|
static int check_referer(httpd_conn * hc);
|
|
static int really_check_referer(httpd_conn * hc);
|
|
static int sockaddr_check(httpd_sockaddr * saP);
|
|
static size_t sockaddr_len(httpd_sockaddr * saP);
|
|
static int my_snprintf(char *str, size_t size, const char *format, ...);
|
|
#ifndef HAVE_ATOLL
|
|
static long long atoll(const char *str);
|
|
#endif /* HAVE_ATOLL */
|
|
|
|
|
|
/* This global keeps track of whether we are in the main process or a
|
|
** sub-process. The reason is that httpd_write_response() can get called
|
|
** in either context; when it is called from the main process it must use
|
|
** non-blocking I/O to avoid stalling the server, but when it is called
|
|
** from a sub-process it wants to use blocking I/O so that the whole
|
|
** response definitely gets written. So, it checks this variable. A bit
|
|
** of a hack but it seems to do the right thing.
|
|
*/
|
|
static int sub_process = 0;
|
|
|
|
|
|
static void check_options(void)
|
|
{
|
|
#if defined(TILDE_MAP_1) && defined(TILDE_MAP_2)
|
|
syslog(LOG_CRIT, "both TILDE_MAP_1 and TILDE_MAP_2 are defined");
|
|
exit(1);
|
|
#endif /* both */
|
|
}
|
|
|
|
|
|
static void free_httpd_server(httpd_server * hs)
|
|
{
|
|
if (hs->binding_hostname != (char *) 0)
|
|
free((void *) hs->binding_hostname);
|
|
if (hs->cwd != (char *) 0)
|
|
free((void *) hs->cwd);
|
|
if (hs->cgi_pattern != (char *) 0)
|
|
free((void *) hs->cgi_pattern);
|
|
if (hs->charset != (char *) 0)
|
|
free((void *) hs->charset);
|
|
if (hs->p3p != (char *) 0)
|
|
free((void *) hs->p3p);
|
|
if (hs->url_pattern != (char *) 0)
|
|
free((void *) hs->url_pattern);
|
|
if (hs->local_pattern != (char *) 0)
|
|
free((void *) hs->local_pattern);
|
|
free((void *) hs);
|
|
}
|
|
|
|
|
|
httpd_server *httpd_initialize(char *hostname, httpd_sockaddr * sa4P,
|
|
httpd_sockaddr * sa6P, unsigned short port,
|
|
char *cgi_pattern, int cgi_limit,
|
|
int cgi_timelimit, char *charset, char *p3p,
|
|
int max_age, char *cwd, int no_log,
|
|
FILE * logfp, int no_symlink_check, int vhost,
|
|
int global_passwd, char *url_pattern,
|
|
char *local_pattern, int no_empty_referers)
|
|
{
|
|
httpd_server *hs;
|
|
static char ghnbuf[256];
|
|
char *cp;
|
|
|
|
check_options();
|
|
|
|
hs = NEW(httpd_server, 1);
|
|
if (hs == (httpd_server *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "out of memory allocating an httpd_server");
|
|
return (httpd_server *) 0;
|
|
}
|
|
|
|
if (hostname != (char *) 0)
|
|
{
|
|
hs->binding_hostname = strdup(hostname);
|
|
if (hs->binding_hostname == (char *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "out of memory copying hostname");
|
|
return (httpd_server *) 0;
|
|
}
|
|
hs->server_hostname = hs->binding_hostname;
|
|
}
|
|
else
|
|
{
|
|
hs->binding_hostname = (char *) 0;
|
|
hs->server_hostname = (char *) 0;
|
|
if (gethostname(ghnbuf, sizeof(ghnbuf)) < 0)
|
|
ghnbuf[0] = '\0';
|
|
#ifdef SERVER_NAME_LIST
|
|
if (ghnbuf[0] != '\0')
|
|
hs->server_hostname = hostname_map(ghnbuf);
|
|
#endif /* SERVER_NAME_LIST */
|
|
if (hs->server_hostname == (char *) 0)
|
|
{
|
|
#ifdef SERVER_NAME
|
|
hs->server_hostname = SERVER_NAME;
|
|
#else /* SERVER_NAME */
|
|
if (ghnbuf[0] != '\0')
|
|
hs->server_hostname = ghnbuf;
|
|
#endif /* SERVER_NAME */
|
|
}
|
|
}
|
|
|
|
hs->port = port;
|
|
if (cgi_pattern == (char *) 0)
|
|
hs->cgi_pattern = (char *) 0;
|
|
else
|
|
{
|
|
/* Nuke any leading slashes. */
|
|
if (cgi_pattern[0] == '/')
|
|
++cgi_pattern;
|
|
hs->cgi_pattern = strdup(cgi_pattern);
|
|
if (hs->cgi_pattern == (char *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "out of memory copying cgi_pattern");
|
|
return (httpd_server *) 0;
|
|
}
|
|
/* Nuke any leading slashes in the cgi pattern. */
|
|
while ((cp = strstr(hs->cgi_pattern, "|/")) != (char *) 0)
|
|
(void) strcpy(cp + 1, cp + 2);
|
|
}
|
|
hs->cgi_limit = cgi_limit;
|
|
hs->cgi_timelimit = cgi_timelimit;
|
|
hs->cgi_count = 0;
|
|
hs->charset = strdup(charset);
|
|
hs->p3p = strdup(p3p);
|
|
hs->max_age = max_age;
|
|
hs->cwd = strdup(cwd);
|
|
if (hs->cwd == (char *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "out of memory copying cwd");
|
|
return (httpd_server *) 0;
|
|
}
|
|
if (url_pattern == (char *) 0)
|
|
hs->url_pattern = (char *) 0;
|
|
else
|
|
{
|
|
hs->url_pattern = strdup(url_pattern);
|
|
if (hs->url_pattern == (char *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "out of memory copying url_pattern");
|
|
return (httpd_server *) 0;
|
|
}
|
|
}
|
|
if (local_pattern == (char *) 0)
|
|
hs->local_pattern = (char *) 0;
|
|
else
|
|
{
|
|
hs->local_pattern = strdup(local_pattern);
|
|
if (hs->local_pattern == (char *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "out of memory copying local_pattern");
|
|
return (httpd_server *) 0;
|
|
}
|
|
}
|
|
hs->no_log = no_log;
|
|
hs->logfp = (FILE *) 0;
|
|
httpd_set_logfp(hs, logfp);
|
|
hs->no_symlink_check = no_symlink_check;
|
|
hs->vhost = vhost;
|
|
hs->global_passwd = global_passwd;
|
|
hs->no_empty_referers = no_empty_referers;
|
|
|
|
/* Initialize listen sockets. Try v6 first because of a Linux peculiarity;
|
|
** like some other systems, it has magical v6 sockets that also listen for
|
|
** v4, but in Linux if you bind a v4 socket first then the v6 bind fails.
|
|
*/
|
|
if (sa6P == (httpd_sockaddr *) 0)
|
|
hs->listen6_fd = -1;
|
|
else
|
|
hs->listen6_fd = initialize_listen_socket(sa6P);
|
|
if (sa4P == (httpd_sockaddr *) 0)
|
|
hs->listen4_fd = -1;
|
|
else
|
|
hs->listen4_fd = initialize_listen_socket(sa4P);
|
|
/* If we didn't get any valid sockets, fail. */
|
|
if (hs->listen4_fd == -1 && hs->listen6_fd == -1)
|
|
{
|
|
free_httpd_server(hs);
|
|
return (httpd_server *) 0;
|
|
}
|
|
|
|
init_mime();
|
|
|
|
/* Done initializing. */
|
|
if (hs->binding_hostname == (char *) 0)
|
|
syslog(LOG_NOTICE, "starting on port %d", (int) hs->port);
|
|
else
|
|
syslog(LOG_NOTICE, "starting on %.80s, port %d", httpd_ntoa(hs->listen4_fd != -1 ? sa4P : sa6P), (int) hs->port);
|
|
|
|
return hs;
|
|
}
|
|
|
|
|
|
static int initialize_listen_socket(httpd_sockaddr * saP)
|
|
{
|
|
int listen_fd;
|
|
int on, flags;
|
|
|
|
/* Check sockaddr. */
|
|
if (!sockaddr_check(saP))
|
|
{
|
|
syslog(LOG_CRIT, "unknown sockaddr family on listen socket");
|
|
return -1;
|
|
}
|
|
|
|
/* Create socket. */
|
|
listen_fd = socket(saP->sa.sa_family, SOCK_STREAM, 0);
|
|
if (listen_fd < 0)
|
|
{
|
|
syslog(LOG_CRIT, "socket %.80s - %m", httpd_ntoa(saP));
|
|
return -1;
|
|
}
|
|
(void) fcntl(listen_fd, F_SETFD, 1);
|
|
|
|
/* Allow reuse of local addresses. */
|
|
on = 1;
|
|
if (setsockopt(listen_fd, SOL_SOCKET, SO_REUSEADDR, (char *) &on,
|
|
sizeof(on)) < 0)
|
|
syslog(LOG_CRIT, "setsockopt SO_REUSEADDR - %m");
|
|
|
|
/* Bind to it. */
|
|
if (bind(listen_fd, &saP->sa, sockaddr_len(saP)) < 0)
|
|
{
|
|
syslog(LOG_CRIT, "bind %.80s - %m", httpd_ntoa(saP));
|
|
(void) close(listen_fd);
|
|
return -1;
|
|
}
|
|
|
|
/* Set the listen file descriptor to no-delay / non-blocking mode. */
|
|
flags = fcntl(listen_fd, F_GETFL, 0);
|
|
if (flags == -1)
|
|
{
|
|
syslog(LOG_CRIT, "fcntl F_GETFL - %m");
|
|
(void) close(listen_fd);
|
|
return -1;
|
|
}
|
|
if (fcntl(listen_fd, F_SETFL, flags | O_NDELAY) < 0)
|
|
{
|
|
syslog(LOG_CRIT, "fcntl O_NDELAY - %m");
|
|
(void) close(listen_fd);
|
|
return -1;
|
|
}
|
|
|
|
/* Start a listen going. */
|
|
if (listen(listen_fd, LISTEN_BACKLOG) < 0)
|
|
{
|
|
syslog(LOG_CRIT, "listen - %m");
|
|
(void) close(listen_fd);
|
|
return -1;
|
|
}
|
|
|
|
/* Use accept filtering, if available. */
|
|
#ifdef SO_ACCEPTFILTER
|
|
{
|
|
#if ( __FreeBSD_version >= 411000 )
|
|
#define ACCEPT_FILTER_NAME "httpready"
|
|
#else
|
|
#define ACCEPT_FILTER_NAME "dataready"
|
|
#endif
|
|
struct accept_filter_arg af;
|
|
(void) bzero(&af, sizeof(af));
|
|
(void) strcpy(af.af_name, ACCEPT_FILTER_NAME);
|
|
(void) setsockopt(listen_fd, SOL_SOCKET, SO_ACCEPTFILTER, (char *) &af,
|
|
sizeof(af));
|
|
}
|
|
#endif /* SO_ACCEPTFILTER */
|
|
|
|
return listen_fd;
|
|
}
|
|
|
|
|
|
void httpd_set_logfp(httpd_server * hs, FILE * logfp)
|
|
{
|
|
if (hs->logfp != (FILE *) 0)
|
|
(void) fclose(hs->logfp);
|
|
hs->logfp = logfp;
|
|
}
|
|
|
|
|
|
void httpd_terminate(httpd_server * hs)
|
|
{
|
|
httpd_unlisten(hs);
|
|
if (hs->logfp != (FILE *) 0)
|
|
(void) fclose(hs->logfp);
|
|
free_httpd_server(hs);
|
|
}
|
|
|
|
|
|
void httpd_unlisten(httpd_server * hs)
|
|
{
|
|
if (hs->listen4_fd != -1)
|
|
{
|
|
(void) close(hs->listen4_fd);
|
|
hs->listen4_fd = -1;
|
|
}
|
|
if (hs->listen6_fd != -1)
|
|
{
|
|
(void) close(hs->listen6_fd);
|
|
hs->listen6_fd = -1;
|
|
}
|
|
}
|
|
|
|
|
|
/* Conditional macro to allow two alternate forms for use in the built-in
|
|
** error pages. If EXPLICIT_ERROR_PAGES is defined, the second and more
|
|
** explicit error form is used; otherwise, the first and more generic
|
|
** form is used.
|
|
*/
|
|
#ifdef EXPLICIT_ERROR_PAGES
|
|
#define ERROR_FORM(a,b) b
|
|
#else /* EXPLICIT_ERROR_PAGES */
|
|
#define ERROR_FORM(a,b) a
|
|
#endif /* EXPLICIT_ERROR_PAGES */
|
|
|
|
|
|
static char *ok200title = "OK";
|
|
static char *ok206title = "Partial Content";
|
|
|
|
static char *err302title = "Found";
|
|
//static char *err302form = "The actual URL is '%.80s'.\n";
|
|
|
|
static char *err304title = "Not Modified";
|
|
|
|
char *httpd_err400title = "Bad Request";
|
|
char *httpd_err400form =
|
|
"Your request has bad syntax or is inherently impossible to satisfy.\n";
|
|
|
|
#ifdef AUTH_FILE
|
|
static char *err401title = "Unauthorized";
|
|
static char *err401form = "Authorization required for the URL '%.80s'.\n";
|
|
#endif /* AUTH_FILE */
|
|
|
|
static char *err403title = "Forbidden";
|
|
#ifndef EXPLICIT_ERROR_PAGES
|
|
static char *err403form =
|
|
"You do not have permission to get URL '%.80s' from this server.\n";
|
|
#endif /* !EXPLICIT_ERROR_PAGES */
|
|
|
|
static char *err404title = "Not Found";
|
|
static char *err404form = "The requested URL '%.80s' was not found on this server.\n";
|
|
|
|
char *httpd_err408title = "Request Timeout";
|
|
char *httpd_err408form =
|
|
"No request appeared within a reasonable time period.\n";
|
|
|
|
static char *err500title = "Internal Error";
|
|
static char *err500form =
|
|
"There was an unusual problem serving the requested URL '%.80s'.\n";
|
|
|
|
static char *err501title = "Not Implemented";
|
|
static char *err501form =
|
|
"The requested method '%.80s' is not implemented by this server.\n";
|
|
|
|
char *httpd_err503title = "Service Temporarily Overloaded";
|
|
char *httpd_err503form =
|
|
"The requested URL '%.80s' is temporarily overloaded. Please try again later.\n";
|
|
|
|
|
|
/* Append a string to the buffer waiting to be sent as response. */
|
|
static void add_response(httpd_conn * hc, char *str)
|
|
{
|
|
size_t len;
|
|
|
|
len = strlen(str);
|
|
httpd_realloc_str(&hc->response, &hc->maxresponse, hc->responselen + len);
|
|
(void) memmove(&(hc->response[hc->responselen]), str, len);
|
|
hc->responselen += len;
|
|
}
|
|
|
|
/* Send the buffered response. */
|
|
void httpd_write_response(httpd_conn * hc)
|
|
{
|
|
/* If we are in a sub-process, turn off no-delay mode. */
|
|
if (sub_process)
|
|
httpd_clear_ndelay(hc->conn_fd);
|
|
/* Send the response, if necessary. */
|
|
if (hc->responselen > 0)
|
|
{
|
|
(void) httpd_write_fully(hc->conn_fd, hc->response, hc->responselen);
|
|
hc->responselen = 0;
|
|
}
|
|
}
|
|
|
|
|
|
/* Set no-delay / non-blocking mode on a socket. */
|
|
void httpd_set_ndelay(int fd)
|
|
{
|
|
int flags, newflags;
|
|
|
|
flags = fcntl(fd, F_GETFL, 0);
|
|
if (flags != -1)
|
|
{
|
|
newflags = flags | (int) O_NDELAY;
|
|
if (newflags != flags)
|
|
(void) fcntl(fd, F_SETFL, newflags);
|
|
}
|
|
}
|
|
|
|
|
|
/* Clear no-delay / non-blocking mode on a socket. */
|
|
void httpd_clear_ndelay(int fd)
|
|
{
|
|
int flags, newflags;
|
|
|
|
flags = fcntl(fd, F_GETFL, 0);
|
|
if (flags != -1)
|
|
{
|
|
newflags = flags & ~(int) O_NDELAY;
|
|
if (newflags != flags)
|
|
(void) fcntl(fd, F_SETFL, newflags);
|
|
}
|
|
}
|
|
|
|
|
|
static void
|
|
send_mime(httpd_conn * hc, int status, char *title, char *encodings,
|
|
char *extraheads, char *type, off_t length, time_t mod)
|
|
{
|
|
time_t now, expires;
|
|
const char *rfc1123fmt = "%a, %d %b %Y %H:%M:%S GMT";
|
|
char nowbuf[100];
|
|
char modbuf[100];
|
|
char expbuf[100];
|
|
char fixed_type[500];
|
|
char buf[1000];
|
|
int partial_content;
|
|
int s100;
|
|
|
|
hc->status = status;
|
|
hc->bytes_to_send = length;
|
|
if (hc->mime_flag)
|
|
{
|
|
if (status == 200 && hc->got_range &&
|
|
(hc->last_byte_index >= hc->first_byte_index) &&
|
|
((hc->last_byte_index != length - 1) ||
|
|
(hc->first_byte_index != 0)) &&
|
|
(hc->range_if == (time_t) - 1 || hc->range_if == hc->sb.mtime))
|
|
{
|
|
partial_content = 1;
|
|
hc->status = status = 206;
|
|
title = ok206title;
|
|
}
|
|
else
|
|
{
|
|
partial_content = 0;
|
|
hc->got_range = 0;
|
|
}
|
|
|
|
now = time((time_t *) 0);
|
|
if (mod == (time_t) 0)
|
|
mod = now;
|
|
(void) strftime(nowbuf, sizeof(nowbuf), rfc1123fmt, gmtime(&now));
|
|
(void) strftime(modbuf, sizeof(modbuf), rfc1123fmt, gmtime(&mod));
|
|
(void) my_snprintf(fixed_type, sizeof(fixed_type), type, hc->hs->charset);
|
|
(void) my_snprintf(buf, sizeof(buf),
|
|
"%.20s %d %s\015\012Server: %s\015\012Content-Type: %s\015\012Date: %s\015\012Last-Modified: %s\015\012Accept-Ranges: bytes\015\012Connection: close\015\012",
|
|
hc->protocol, status, title, EXPOSED_SERVER_SOFTWARE,
|
|
fixed_type, nowbuf, modbuf);
|
|
add_response(hc, buf);
|
|
s100 = status / 100;
|
|
if (s100 != 2 && s100 != 3)
|
|
{
|
|
(void) my_snprintf(buf, sizeof(buf),
|
|
"Cache-Control: no-cache,no-store\015\012");
|
|
add_response(hc, buf);
|
|
}
|
|
if (encodings[0] != '\0')
|
|
{
|
|
(void) my_snprintf(buf, sizeof(buf),
|
|
"Content-Encoding: %s\015\012", encodings);
|
|
add_response(hc, buf);
|
|
}
|
|
if (partial_content)
|
|
{
|
|
(void) my_snprintf(buf, sizeof(buf),
|
|
"Content-Range: bytes %lld-%lld/%lld\015\012Content-Length: %lld\015\012",
|
|
(int64_t) hc->first_byte_index,
|
|
(int64_t) hc->last_byte_index, (int64_t) length,
|
|
(int64_t) (hc->last_byte_index -
|
|
hc->first_byte_index + 1));
|
|
add_response(hc, buf);
|
|
}
|
|
else if (length >= 0)
|
|
{
|
|
(void) my_snprintf(buf, sizeof(buf),
|
|
"Content-Length: %lld\015\012", (int64_t) length);
|
|
add_response(hc, buf);
|
|
}
|
|
if (hc->hs->p3p[0] != '\0')
|
|
{
|
|
(void) my_snprintf(buf, sizeof(buf), "P3P: %s\015\012", hc->hs->p3p);
|
|
add_response(hc, buf);
|
|
}
|
|
if (hc->hs->max_age >= 0)
|
|
{
|
|
expires = now + hc->hs->max_age;
|
|
(void) strftime(expbuf, sizeof(expbuf), rfc1123fmt, gmtime(&expires));
|
|
(void) my_snprintf(buf, sizeof(buf),
|
|
"Cache-Control: max-age=%d\015\012Expires: %s\015\012",
|
|
hc->hs->max_age, expbuf);
|
|
add_response(hc, buf);
|
|
}
|
|
if (extraheads[0] != '\0')
|
|
add_response(hc, extraheads);
|
|
add_response(hc, "\015\012");
|
|
}
|
|
}
|
|
|
|
|
|
static int str_alloc_count = 0;
|
|
static size_t str_alloc_size = 0;
|
|
|
|
void httpd_realloc_str(char **strP, size_t * maxsizeP, size_t size)
|
|
{
|
|
if (*maxsizeP == 0)
|
|
{
|
|
*maxsizeP = MAX(200, size + 100);
|
|
*strP = NEW(char, *maxsizeP + 1);
|
|
++str_alloc_count;
|
|
str_alloc_size += *maxsizeP;
|
|
}
|
|
else if (size > *maxsizeP)
|
|
{
|
|
str_alloc_size -= *maxsizeP;
|
|
*maxsizeP = MAX(*maxsizeP * 2, size * 5 / 4);
|
|
*strP = RENEW(*strP, char, *maxsizeP + 1);
|
|
str_alloc_size += *maxsizeP;
|
|
}
|
|
else
|
|
return;
|
|
if (*strP == (char *) 0)
|
|
{
|
|
syslog(LOG_ERR, "out of memory reallocating a string to %d bytes",
|
|
*maxsizeP);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
|
|
static void
|
|
send_response(httpd_conn * hc, int status, char *title, char *extraheads,
|
|
char *form, char *arg)
|
|
{
|
|
char defanged_arg[1000], buf[2000];
|
|
|
|
send_mime(hc, status, title, "", extraheads, "text/html; charset=%s",
|
|
(off_t) - 1, (time_t) 0);
|
|
(void) my_snprintf(buf, sizeof(buf), "\
|
|
<html>\n\
|
|
<head><title>%d %s</title></head>\n\
|
|
<body>\n\
|
|
<h2>%d %s</h2>\n", status, title, status, title);
|
|
add_response(hc, buf);
|
|
defang(arg, defanged_arg, sizeof(defanged_arg));
|
|
(void) my_snprintf(buf, sizeof(buf), form, defanged_arg);
|
|
add_response(hc, buf);
|
|
if (match("**MSIE**", hc->useragent))
|
|
{
|
|
int n;
|
|
add_response(hc, "<!--\n");
|
|
for (n = 0; n < 6; ++n)
|
|
add_response(hc,
|
|
"Padding so that MSIE deigns to show this error instead of its own canned one.\n");
|
|
add_response(hc, "-->\n");
|
|
}
|
|
send_response_tail(hc);
|
|
}
|
|
|
|
|
|
static void send_response_tail(httpd_conn * hc)
|
|
{
|
|
#if 0
|
|
char buf[1000];
|
|
|
|
(void) my_snprintf(buf, sizeof(buf), "\
|
|
<HR>\n\
|
|
<ADDRESS><A HREF=\"%s\">%s</A></ADDRESS>\n\
|
|
</BODY>\n\
|
|
</HTML>\n", SERVER_ADDRESS, EXPOSED_SERVER_SOFTWARE);
|
|
add_response(hc, buf);
|
|
#endif
|
|
}
|
|
|
|
|
|
static void defang(char *str, char *dfstr, int dfsize)
|
|
{
|
|
char *cp1;
|
|
char *cp2;
|
|
|
|
for (cp1 = str, cp2 = dfstr;
|
|
*cp1 != '\0' && cp2 - dfstr < dfsize - 5; ++cp1, ++cp2)
|
|
{
|
|
switch (*cp1)
|
|
{
|
|
case '<':
|
|
*cp2++ = '&';
|
|
*cp2++ = 'l';
|
|
*cp2++ = 't';
|
|
*cp2 = ';';
|
|
break;
|
|
case '>':
|
|
*cp2++ = '&';
|
|
*cp2++ = 'g';
|
|
*cp2++ = 't';
|
|
*cp2 = ';';
|
|
break;
|
|
default:
|
|
*cp2 = *cp1;
|
|
break;
|
|
}
|
|
}
|
|
*cp2 = '\0';
|
|
}
|
|
|
|
|
|
void
|
|
httpd_send_err(httpd_conn * hc, int status, char *title, char *extraheads,
|
|
char *form, char *arg)
|
|
{
|
|
#ifdef ERR_DIR
|
|
|
|
char filename[1000];
|
|
|
|
/* Try virtual host error page. */
|
|
if (hc->hs->vhost && hc->hostdir[0] != '\0')
|
|
{
|
|
(void) my_snprintf(filename, sizeof(filename),
|
|
"%s/%s/err%d.html", hc->hostdir, ERR_DIR, status);
|
|
if (send_err_file(hc, status, title, extraheads, filename))
|
|
return;
|
|
}
|
|
|
|
/* Try server-wide error page. */
|
|
(void) my_snprintf(filename, sizeof(filename),
|
|
"%s/err%d.html", ERR_DIR, status);
|
|
if (send_err_file(hc, status, title, extraheads, filename))
|
|
return;
|
|
|
|
/* Fall back on built-in error page. */
|
|
send_response(hc, status, title, extraheads, form, arg);
|
|
|
|
#else /* ERR_DIR */
|
|
|
|
send_response(hc, status, title, extraheads, form, arg);
|
|
|
|
#endif /* ERR_DIR */
|
|
}
|
|
|
|
|
|
#ifdef ERR_DIR
|
|
static int
|
|
send_err_file(httpd_conn * hc, int status, char *title, char *extraheads,
|
|
char *filename)
|
|
{
|
|
FILE *fp;
|
|
char buf[1000];
|
|
size_t r;
|
|
|
|
fp = fopen(filename, "r");
|
|
if (fp == (FILE *) 0)
|
|
return 0;
|
|
send_mime(hc, status, title, "", extraheads, "text/html; charset=%s",
|
|
(off_t) - 1, (time_t) 0);
|
|
for (;;)
|
|
{
|
|
r = fread(buf, 1, sizeof(buf) - 1, fp);
|
|
if (r == 0)
|
|
break;
|
|
buf[r] = '\0';
|
|
add_response(hc, buf);
|
|
}
|
|
(void) fclose(fp);
|
|
|
|
#ifdef ERR_APPEND_SERVER_INFO
|
|
send_response_tail(hc);
|
|
#endif /* ERR_APPEND_SERVER_INFO */
|
|
|
|
return 1;
|
|
}
|
|
#endif /* ERR_DIR */
|
|
|
|
|
|
#ifdef AUTH_FILE
|
|
|
|
static void send_authenticate(httpd_conn * hc, char *realm)
|
|
{
|
|
static char *header;
|
|
static size_t maxheader = 0;
|
|
static char headstr[] = "WWW-Authenticate: Basic realm=\"";
|
|
|
|
httpd_realloc_str(&header, &maxheader, sizeof(headstr) + strlen(realm) + 3);
|
|
(void) my_snprintf(header, maxheader, "%s%s\"\015\012", headstr, realm);
|
|
httpd_send_err(hc, 401, err401title, header, err401form, hc->encodedurl);
|
|
/* If the request was a POST then there might still be data to be read,
|
|
** so we need to do a lingering close.
|
|
*/
|
|
if (hc->method == METHOD_POST)
|
|
hc->should_linger = 1;
|
|
}
|
|
|
|
|
|
/* Base-64 decoding. This represents binary data as printable ASCII
|
|
** characters. Three 8-bit binary bytes are turned into four 6-bit
|
|
** values, like so:
|
|
**
|
|
** [11111111] [22222222] [33333333]
|
|
**
|
|
** [111111] [112222] [222233] [333333]
|
|
**
|
|
** Then the 6-bit values are represented using the characters "A-Za-z0-9+/".
|
|
*/
|
|
|
|
static int b64_decode_table[256] = {
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* 00-0F */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* 10-1F */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 62, -1, -1, -1, 63, /* 20-2F */
|
|
52, 53, 54, 55, 56, 57, 58, 59, 60, 61, -1, -1, -1, -1, -1, -1, /* 30-3F */
|
|
-1, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, /* 40-4F */
|
|
15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, -1, -1, -1, -1, -1, /* 50-5F */
|
|
-1, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, /* 60-6F */
|
|
41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, -1, -1, -1, -1, -1, /* 70-7F */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* 80-8F */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* 90-9F */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* A0-AF */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* B0-BF */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* C0-CF */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* D0-DF */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /* E0-EF */
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1 /* F0-FF */
|
|
};
|
|
|
|
/* Do base-64 decoding on a string. Ignore any non-base64 bytes.
|
|
** Return the actual number of bytes generated. The decoded size will
|
|
** be at most 3/4 the size of the encoded, and may be smaller if there
|
|
** are padding characters (blanks, newlines).
|
|
*/
|
|
static int b64_decode(const char *str, unsigned char *space, int size)
|
|
{
|
|
const char *cp;
|
|
int space_idx, phase;
|
|
int d, prev_d = 0;
|
|
unsigned char c;
|
|
|
|
space_idx = 0;
|
|
phase = 0;
|
|
for (cp = str; *cp != '\0'; ++cp)
|
|
{
|
|
d = b64_decode_table[(int) *cp];
|
|
if (d != -1)
|
|
{
|
|
switch (phase)
|
|
{
|
|
case 0:
|
|
++phase;
|
|
break;
|
|
case 1:
|
|
c = ((prev_d << 2) | ((d & 0x30) >> 4));
|
|
if (space_idx < size)
|
|
space[space_idx++] = c;
|
|
++phase;
|
|
break;
|
|
case 2:
|
|
c = (((prev_d & 0xf) << 4) | ((d & 0x3c) >> 2));
|
|
if (space_idx < size)
|
|
space[space_idx++] = c;
|
|
++phase;
|
|
break;
|
|
case 3:
|
|
c = (((prev_d & 0x03) << 6) | d);
|
|
if (space_idx < size)
|
|
space[space_idx++] = c;
|
|
phase = 0;
|
|
break;
|
|
}
|
|
prev_d = d;
|
|
}
|
|
}
|
|
return space_idx;
|
|
}
|
|
|
|
/* Returns -1 == unauthorized, 0 == no auth file, 1 = authorized. */
|
|
static int auth_check(httpd_conn * hc, char *dirname)
|
|
{
|
|
if (hc->hs->global_passwd)
|
|
{
|
|
char *topdir;
|
|
if (hc->hs->vhost && hc->hostdir[0] != '\0')
|
|
topdir = hc->hostdir;
|
|
else
|
|
topdir = ".";
|
|
switch (auth_check2(hc, topdir))
|
|
{
|
|
case -1:
|
|
return -1;
|
|
case 1:
|
|
return 1;
|
|
}
|
|
}
|
|
return auth_check2(hc, dirname);
|
|
}
|
|
|
|
/* Returns -1 == unauthorized, 0 == no auth file, 1 = authorized. */
|
|
static int auth_check2(httpd_conn * hc, char *dirname)
|
|
{
|
|
static char *authpath;
|
|
static size_t maxauthpath = 0;
|
|
struct stat sb;
|
|
char authinfo[500];
|
|
char *authpass;
|
|
char *colon;
|
|
int l;
|
|
FILE *fp;
|
|
char line[500];
|
|
char *cryp;
|
|
static char *prevauthpath;
|
|
static size_t maxprevauthpath = 0;
|
|
static time_t prevmtime;
|
|
static char *prevuser;
|
|
static size_t maxprevuser = 0;
|
|
static char *prevcryp;
|
|
static size_t maxprevcryp = 0;
|
|
|
|
/* Construct auth filename. */
|
|
httpd_realloc_str(&authpath, &maxauthpath,
|
|
strlen(dirname) + 1 + sizeof(AUTH_FILE));
|
|
(void) my_snprintf(authpath, maxauthpath, "%s/%s", dirname, AUTH_FILE);
|
|
|
|
/* Does this directory have an auth file? */
|
|
if (stat(authpath, &sb) < 0)
|
|
/* Nope, let the request go through. */
|
|
return 0;
|
|
|
|
/* Does this request contain basic authorization info? */
|
|
if (hc->authorization[0] == '\0' ||
|
|
strncmp(hc->authorization, "Basic ", 6) != 0)
|
|
{
|
|
/* Nope, return a 401 Unauthorized. */
|
|
send_authenticate(hc, dirname);
|
|
return -1;
|
|
}
|
|
|
|
/* Decode it. */
|
|
l = b64_decode(&(hc->authorization[6]), (unsigned char *) authinfo,
|
|
sizeof(authinfo) - 1);
|
|
authinfo[l] = '\0';
|
|
/* Split into user and password. */
|
|
authpass = strchr(authinfo, ':');
|
|
if (authpass == (char *) 0)
|
|
{
|
|
/* No colon? Bogus auth info. */
|
|
send_authenticate(hc, dirname);
|
|
return -1;
|
|
}
|
|
*authpass++ = '\0';
|
|
/* If there are more fields, cut them off. */
|
|
colon = strchr(authpass, ':');
|
|
if (colon != (char *) 0)
|
|
*colon = '\0';
|
|
|
|
/* See if we have a cached entry and can use it. */
|
|
if (maxprevauthpath != 0 &&
|
|
strcmp(authpath, prevauthpath) == 0 &&
|
|
sb.st_mtime == prevmtime && strcmp(authinfo, prevuser) == 0)
|
|
{
|
|
/* Yes. Check against the cached encrypted password. */
|
|
if (strcmp(crypt(authpass, prevcryp), prevcryp) == 0)
|
|
{
|
|
/* Ok! */
|
|
httpd_realloc_str(&hc->remoteuser, &hc->maxremoteuser,
|
|
strlen(authinfo));
|
|
(void) strcpy(hc->remoteuser, authinfo);
|
|
return 1;
|
|
}
|
|
else
|
|
{
|
|
/* No. */
|
|
send_authenticate(hc, dirname);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
/* Open the password file. */
|
|
fp = fopen(authpath, "r");
|
|
if (fp == (FILE *) 0)
|
|
{
|
|
/* The file exists but we can't open it? Disallow access. */
|
|
syslog(LOG_ERR, "%.80s auth file %.80s could not be opened - %m",
|
|
httpd_ntoa(&hc->client_addr), authpath);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' is protected by an authentication file, but the authentication file cannot be opened.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
|
|
/* Read it. */
|
|
while (fgets(line, sizeof(line), fp) != (char *) 0)
|
|
{
|
|
/* Nuke newline. */
|
|
l = strlen(line);
|
|
if (line[l - 1] == '\n')
|
|
line[l - 1] = '\0';
|
|
/* Split into user and encrypted password. */
|
|
cryp = strchr(line, ':');
|
|
if (cryp == (char *) 0)
|
|
continue;
|
|
*cryp++ = '\0';
|
|
/* Is this the right user? */
|
|
if (strcmp(line, authinfo) == 0)
|
|
{
|
|
/* Yes. */
|
|
(void) fclose(fp);
|
|
/* So is the password right? */
|
|
if (strcmp(crypt(authpass, cryp), cryp) == 0)
|
|
{
|
|
/* Ok! */
|
|
httpd_realloc_str(&hc->remoteuser, &hc->maxremoteuser, strlen(line));
|
|
(void) strcpy(hc->remoteuser, line);
|
|
/* And cache this user's info for next time. */
|
|
httpd_realloc_str(&prevauthpath, &maxprevauthpath, strlen(authpath));
|
|
(void) strcpy(prevauthpath, authpath);
|
|
prevmtime = sb.st_mtime;
|
|
httpd_realloc_str(&prevuser, &maxprevuser, strlen(authinfo));
|
|
(void) strcpy(prevuser, authinfo);
|
|
httpd_realloc_str(&prevcryp, &maxprevcryp, strlen(cryp));
|
|
(void) strcpy(prevcryp, cryp);
|
|
return 1;
|
|
}
|
|
else
|
|
{
|
|
/* No. */
|
|
send_authenticate(hc, dirname);
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Didn't find that user. Access denied. */
|
|
(void) fclose(fp);
|
|
send_authenticate(hc, dirname);
|
|
return -1;
|
|
}
|
|
|
|
#endif /* AUTH_FILE */
|
|
|
|
#if 0
|
|
static void send_dirredirect(httpd_conn * hc)
|
|
{
|
|
static char *location;
|
|
static char *header;
|
|
static size_t maxlocation = 0, maxheader = 0;
|
|
static char headstr[] = "Location: ";
|
|
|
|
if (hc->query[0] != '\0')
|
|
{
|
|
char *cp = strchr(hc->encodedurl, '?');
|
|
if (cp != (char *) 0) /* should always find it */
|
|
*cp = '\0';
|
|
httpd_realloc_str(&location, &maxlocation,
|
|
strlen(hc->encodedurl) + 2 + strlen(hc->query));
|
|
(void) my_snprintf(location, maxlocation,
|
|
"%s/?%s", hc->encodedurl, hc->query);
|
|
}
|
|
else
|
|
{
|
|
httpd_realloc_str(&location, &maxlocation, strlen(hc->encodedurl) + 1);
|
|
(void) my_snprintf(location, maxlocation, "%s/", hc->encodedurl);
|
|
}
|
|
httpd_realloc_str(&header, &maxheader, sizeof(headstr) + strlen(location));
|
|
(void) my_snprintf(header, maxheader, "%s%s\015\012", headstr, location);
|
|
send_response(hc, 302, err302title, header, err302form, location);
|
|
}
|
|
#endif
|
|
|
|
char *httpd_method_str(int method)
|
|
{
|
|
switch (method)
|
|
{
|
|
case METHOD_GET:
|
|
return "GET";
|
|
case METHOD_HEAD:
|
|
return "HEAD";
|
|
case METHOD_POST:
|
|
return "POST";
|
|
default:
|
|
return "UNKNOWN";
|
|
}
|
|
}
|
|
|
|
|
|
static int hexit(char c)
|
|
{
|
|
if (c >= '0' && c <= '9')
|
|
return c - '0';
|
|
if (c >= 'a' && c <= 'f')
|
|
return c - 'a' + 10;
|
|
if (c >= 'A' && c <= 'F')
|
|
return c - 'A' + 10;
|
|
return 0; /* shouldn't happen, we're guarded by isxdigit() */
|
|
}
|
|
|
|
|
|
/* Copies and decodes a string. It's ok for from and to to be the
|
|
** same string.
|
|
*/
|
|
static void strdecode(char *to, char *from)
|
|
{
|
|
for (; *from != '\0'; ++to, ++from)
|
|
{
|
|
if (from[0] == '%' && isxdigit(from[1]) && isxdigit(from[2]))
|
|
{
|
|
*to = hexit(from[1]) * 16 + hexit(from[2]);
|
|
from += 2;
|
|
}
|
|
else
|
|
*to = *from;
|
|
}
|
|
*to = '\0';
|
|
}
|
|
|
|
|
|
#ifdef GENERATE_INDEXES
|
|
/* Copies and encodes a string. */
|
|
static void strencode(char *to, int tosize, char *from)
|
|
{
|
|
int tolen;
|
|
|
|
for (tolen = 0; *from != '\0' && tolen + 4 < tosize; ++from)
|
|
{
|
|
if (isalnum(*from) || strchr("/_.-~", *from) != (char *) 0)
|
|
{
|
|
*to = *from;
|
|
++to;
|
|
++tolen;
|
|
}
|
|
else
|
|
{
|
|
(void) sprintf(to, "%%%02x", (int) *from & 0xff);
|
|
to += 3;
|
|
tolen += 3;
|
|
}
|
|
}
|
|
*to = '\0';
|
|
}
|
|
#endif /* GENERATE_INDEXES */
|
|
|
|
|
|
#ifdef TILDE_MAP_1
|
|
/* Map a ~username/whatever URL into <prefix>/username. */
|
|
static int tilde_map_1(httpd_conn * hc)
|
|
{
|
|
static char *temp;
|
|
static size_t maxtemp = 0;
|
|
int len;
|
|
static char *prefix = TILDE_MAP_1;
|
|
|
|
len = strlen(hc->expnfilename) - 1;
|
|
httpd_realloc_str(&temp, &maxtemp, len);
|
|
(void) strcpy(temp, &hc->expnfilename[1]);
|
|
httpd_realloc_str(&hc->expnfilename, &hc->maxexpnfilename,
|
|
strlen(prefix) + 1 + len);
|
|
(void) strcpy(hc->expnfilename, prefix);
|
|
if (prefix[0] != '\0')
|
|
(void) strcat(hc->expnfilename, "/");
|
|
(void) strcat(hc->expnfilename, temp);
|
|
return 1;
|
|
}
|
|
#endif /* TILDE_MAP_1 */
|
|
|
|
#ifdef TILDE_MAP_2
|
|
/* Map a ~username/whatever URL into <user's homedir>/<postfix>. */
|
|
static int tilde_map_2(httpd_conn * hc)
|
|
{
|
|
static char *temp;
|
|
static size_t maxtemp = 0;
|
|
static char *postfix = TILDE_MAP_2;
|
|
char *cp;
|
|
struct passwd *pw;
|
|
char *alt;
|
|
char *rest;
|
|
|
|
/* Get the username. */
|
|
httpd_realloc_str(&temp, &maxtemp, strlen(hc->expnfilename) - 1);
|
|
(void) strcpy(temp, &hc->expnfilename[1]);
|
|
cp = strchr(temp, '/');
|
|
if (cp != (char *) 0)
|
|
*cp++ = '\0';
|
|
else
|
|
cp = "";
|
|
|
|
/* Get the passwd entry. */
|
|
pw = getpwnam(temp);
|
|
if (pw == (struct passwd *) 0)
|
|
return 0;
|
|
|
|
/* Set up altdir. */
|
|
httpd_realloc_str(&hc->altdir, &hc->maxaltdir,
|
|
strlen(pw->pw_dir) + 1 + strlen(postfix));
|
|
(void) strcpy(hc->altdir, pw->pw_dir);
|
|
if (postfix[0] != '\0')
|
|
{
|
|
(void) strcat(hc->altdir, "/");
|
|
(void) strcat(hc->altdir, postfix);
|
|
}
|
|
alt = expand_symlinks(hc->altdir, &rest, 0, 1);
|
|
if (rest[0] != '\0')
|
|
return 0;
|
|
httpd_realloc_str(&hc->altdir, &hc->maxaltdir, strlen(alt));
|
|
(void) strcpy(hc->altdir, alt);
|
|
|
|
/* And the filename becomes altdir plus the post-~ part of the original. */
|
|
httpd_realloc_str(&hc->expnfilename, &hc->maxexpnfilename,
|
|
strlen(hc->altdir) + 1 + strlen(cp));
|
|
(void) my_snprintf(hc->expnfilename, hc->maxexpnfilename,
|
|
"%s/%s", hc->altdir, cp);
|
|
|
|
/* For this type of tilde mapping, we want to defeat vhost mapping. */
|
|
hc->tildemapped = 1;
|
|
|
|
return 1;
|
|
}
|
|
#endif /* TILDE_MAP_2 */
|
|
|
|
|
|
/* Virtual host mapping. */
|
|
static int vhost_map(httpd_conn * hc)
|
|
{
|
|
httpd_sockaddr sa;
|
|
socklen_t sz;
|
|
static char *tempfilename;
|
|
static size_t maxtempfilename = 0;
|
|
char *cp1;
|
|
int len;
|
|
#ifdef VHOST_DIRLEVELS
|
|
int i;
|
|
char *cp2;
|
|
#endif /* VHOST_DIRLEVELS */
|
|
|
|
/* Figure out the virtual hostname. */
|
|
if (hc->reqhost[0] != '\0')
|
|
hc->hostname = hc->reqhost;
|
|
else if (hc->hdrhost[0] != '\0')
|
|
hc->hostname = hc->hdrhost;
|
|
else
|
|
{
|
|
sz = sizeof(sa);
|
|
if (getsockname(hc->conn_fd, &sa.sa, &sz) < 0)
|
|
{
|
|
syslog(LOG_ERR, "getsockname - %m");
|
|
return 0;
|
|
}
|
|
hc->hostname = httpd_ntoa(&sa);
|
|
}
|
|
/* Pound it to lower case. */
|
|
for (cp1 = hc->hostname; *cp1 != '\0'; ++cp1)
|
|
if (isupper(*cp1))
|
|
*cp1 = tolower(*cp1);
|
|
|
|
if (hc->tildemapped)
|
|
return 1;
|
|
|
|
/* Figure out the host directory. */
|
|
#ifdef VHOST_DIRLEVELS
|
|
httpd_realloc_str(&hc->hostdir, &hc->maxhostdir,
|
|
strlen(hc->hostname) + 2 * VHOST_DIRLEVELS);
|
|
if (strncmp(hc->hostname, "www.", 4) == 0)
|
|
cp1 = &hc->hostname[4];
|
|
else
|
|
cp1 = hc->hostname;
|
|
for (cp2 = hc->hostdir, i = 0; i < VHOST_DIRLEVELS; ++i)
|
|
{
|
|
/* Skip dots in the hostname. If we don't, then we get vhost
|
|
** directories in higher level of filestructure if dot gets
|
|
** involved into path construction. It's `while' used here instead
|
|
** of `if' for it's possible to have a hostname formed with two
|
|
** dots at the end of it.
|
|
*/
|
|
while (*cp1 == '.')
|
|
++cp1;
|
|
/* Copy a character from the hostname, or '_' if we ran out. */
|
|
if (*cp1 != '\0')
|
|
*cp2++ = *cp1++;
|
|
else
|
|
*cp2++ = '_';
|
|
/* Copy a slash. */
|
|
*cp2++ = '/';
|
|
}
|
|
(void) strcpy(cp2, hc->hostname);
|
|
#else /* VHOST_DIRLEVELS */
|
|
httpd_realloc_str(&hc->hostdir, &hc->maxhostdir, strlen(hc->hostname));
|
|
(void) strcpy(hc->hostdir, hc->hostname);
|
|
#endif /* VHOST_DIRLEVELS */
|
|
|
|
/* Prepend hostdir to the filename. */
|
|
len = strlen(hc->expnfilename);
|
|
httpd_realloc_str(&tempfilename, &maxtempfilename, len);
|
|
(void) strcpy(tempfilename, hc->expnfilename);
|
|
httpd_realloc_str(&hc->expnfilename, &hc->maxexpnfilename,
|
|
strlen(hc->hostdir) + 1 + len);
|
|
(void) strcpy(hc->expnfilename, hc->hostdir);
|
|
(void) strcat(hc->expnfilename, "/");
|
|
(void) strcat(hc->expnfilename, tempfilename);
|
|
return 1;
|
|
}
|
|
|
|
|
|
#if 0
|
|
/* Expands all symlinks in the given filename, eliding ..'s and leading /'s.
|
|
** Returns the expanded path (pointer to static string), or (char*) 0 on
|
|
** errors. Also returns, in the string pointed to by restP, any trailing
|
|
** parts of the path that don't exist.
|
|
**
|
|
** This is a fairly nice little routine. It handles any size filenames
|
|
** without excessive mallocs.
|
|
*/
|
|
static char *expand_symlinks(char *path, char **restP, int no_symlink_check,
|
|
int tildemapped)
|
|
{
|
|
static char *checked;
|
|
static char *rest;
|
|
char link[5000];
|
|
static size_t maxchecked = 0, maxrest = 0;
|
|
size_t checkedlen, restlen, linklen, prevcheckedlen, prevrestlen;
|
|
int nlinks, i;
|
|
char *r;
|
|
char *cp1;
|
|
char *cp2;
|
|
|
|
if (no_symlink_check)
|
|
{
|
|
/* If we are chrooted, we can actually skip the symlink-expansion,
|
|
** since it's impossible to get out of the tree. However, we still
|
|
** need to do the pathinfo check, and the existing symlink expansion
|
|
** code is a pretty reasonable way to do this. So, what we do is
|
|
** a single stat() of the whole filename - if it exists, then we
|
|
** return it as is with nothing in restP. If it doesn't exist, we
|
|
** fall through to the existing code.
|
|
**
|
|
** One side-effect of this is that users can't symlink to central
|
|
** approved CGIs any more. The workaround is to use the central
|
|
** URL for the CGI instead of a local symlinked one.
|
|
*/
|
|
struct stat sb;
|
|
if (stat(path, &sb) != -1)
|
|
{
|
|
checkedlen = strlen(path);
|
|
httpd_realloc_str(&checked, &maxchecked, checkedlen);
|
|
(void) strcpy(checked, path);
|
|
/* Trim trailing slashes. */
|
|
while (checked[checkedlen - 1] == '/')
|
|
{
|
|
checked[checkedlen - 1] = '\0';
|
|
--checkedlen;
|
|
}
|
|
httpd_realloc_str(&rest, &maxrest, 0);
|
|
rest[0] = '\0';
|
|
*restP = rest;
|
|
return checked;
|
|
}
|
|
}
|
|
|
|
/* Start out with nothing in checked and the whole filename in rest. */
|
|
httpd_realloc_str(&checked, &maxchecked, 1);
|
|
checked[0] = '\0';
|
|
checkedlen = 0;
|
|
restlen = strlen(path);
|
|
httpd_realloc_str(&rest, &maxrest, restlen);
|
|
(void) strcpy(rest, path);
|
|
if (rest[restlen - 1] == '/')
|
|
rest[--restlen] = '\0'; /* trim trailing slash */
|
|
if (!tildemapped)
|
|
/* Remove any leading slashes. */
|
|
while (rest[0] == '/')
|
|
{
|
|
(void) strcpy(rest, &(rest[1]));
|
|
--restlen;
|
|
}
|
|
r = rest;
|
|
nlinks = 0;
|
|
|
|
/* While there are still components to check... */
|
|
while (restlen > 0)
|
|
{
|
|
/* Save current checkedlen in case we get a symlink. Save current
|
|
** restlen in case we get a non-existant component.
|
|
*/
|
|
prevcheckedlen = checkedlen;
|
|
prevrestlen = restlen;
|
|
|
|
/* Grab one component from r and transfer it to checked. */
|
|
cp1 = strchr(r, '/');
|
|
if (cp1 != (char *) 0)
|
|
{
|
|
i = cp1 - r;
|
|
if (i == 0)
|
|
{
|
|
/* Special case for absolute paths. */
|
|
httpd_realloc_str(&checked, &maxchecked, checkedlen + 1);
|
|
(void) strncpy(&checked[checkedlen], r, 1);
|
|
checkedlen += 1;
|
|
}
|
|
else if (strncmp(r, "..", MAX(i, 2)) == 0)
|
|
{
|
|
/* Ignore ..'s that go above the start of the path. */
|
|
if (checkedlen != 0)
|
|
{
|
|
cp2 = strrchr(checked, '/');
|
|
if (cp2 == (char *) 0)
|
|
checkedlen = 0;
|
|
else if (cp2 == checked)
|
|
checkedlen = 1;
|
|
else
|
|
checkedlen = cp2 - checked;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
httpd_realloc_str(&checked, &maxchecked, checkedlen + 1 + i);
|
|
if (checkedlen > 0 && checked[checkedlen - 1] != '/')
|
|
checked[checkedlen++] = '/';
|
|
(void) strncpy(&checked[checkedlen], r, i);
|
|
checkedlen += i;
|
|
}
|
|
checked[checkedlen] = '\0';
|
|
r += i + 1;
|
|
restlen -= i + 1;
|
|
}
|
|
else
|
|
{
|
|
/* No slashes remaining, r is all one component. */
|
|
if (strcmp(r, "..") == 0)
|
|
{
|
|
/* Ignore ..'s that go above the start of the path. */
|
|
if (checkedlen != 0)
|
|
{
|
|
cp2 = strrchr(checked, '/');
|
|
if (cp2 == (char *) 0)
|
|
checkedlen = 0;
|
|
else if (cp2 == checked)
|
|
checkedlen = 1;
|
|
else
|
|
checkedlen = cp2 - checked;
|
|
checked[checkedlen] = '\0';
|
|
}
|
|
}
|
|
else
|
|
{
|
|
httpd_realloc_str(&checked, &maxchecked, checkedlen + 1 + restlen);
|
|
if (checkedlen > 0 && checked[checkedlen - 1] != '/')
|
|
checked[checkedlen++] = '/';
|
|
(void) strcpy(&checked[checkedlen], r);
|
|
checkedlen += restlen;
|
|
}
|
|
r += restlen;
|
|
restlen = 0;
|
|
}
|
|
|
|
/* Try reading the current filename as a symlink */
|
|
if (checked[0] == '\0')
|
|
continue;
|
|
linklen = readlink(checked, link, sizeof(link) - 1);
|
|
if (linklen == -1)
|
|
{
|
|
if (errno == EINVAL)
|
|
continue; /* not a symlink */
|
|
if (errno == EACCES || errno == ENOENT || errno == ENOTDIR)
|
|
{
|
|
/* That last component was bogus. Restore and return. */
|
|
*restP = r - (prevrestlen - restlen);
|
|
if (prevcheckedlen == 0)
|
|
(void) strcpy(checked, ".");
|
|
else
|
|
checked[prevcheckedlen] = '\0';
|
|
return checked;
|
|
}
|
|
syslog(LOG_ERR, "readlink %.80s - %m", checked);
|
|
return (char *) 0;
|
|
}
|
|
++nlinks;
|
|
if (nlinks > MAX_LINKS)
|
|
{
|
|
syslog(LOG_ERR, "too many symlinks in %.80s", path);
|
|
return (char *) 0;
|
|
}
|
|
link[linklen] = '\0';
|
|
if (link[linklen - 1] == '/')
|
|
link[--linklen] = '\0'; /* trim trailing slash */
|
|
|
|
/* Insert the link contents in front of the rest of the filename. */
|
|
if (restlen != 0)
|
|
{
|
|
(void) strcpy(rest, r);
|
|
httpd_realloc_str(&rest, &maxrest, restlen + linklen + 1);
|
|
for (i = restlen; i >= 0; --i)
|
|
rest[i + linklen + 1] = rest[i];
|
|
(void) strcpy(rest, link);
|
|
rest[linklen] = '/';
|
|
restlen += linklen + 1;
|
|
r = rest;
|
|
}
|
|
else
|
|
{
|
|
/* There's nothing left in the filename, so the link contents
|
|
** becomes the rest.
|
|
*/
|
|
httpd_realloc_str(&rest, &maxrest, linklen);
|
|
(void) strcpy(rest, link);
|
|
restlen = linklen;
|
|
r = rest;
|
|
}
|
|
|
|
if (rest[0] == '/')
|
|
{
|
|
/* There must have been an absolute symlink - zero out checked. */
|
|
checked[0] = '\0';
|
|
checkedlen = 0;
|
|
}
|
|
else
|
|
{
|
|
/* Re-check this component. */
|
|
checkedlen = prevcheckedlen;
|
|
checked[checkedlen] = '\0';
|
|
}
|
|
}
|
|
|
|
/* Ok. */
|
|
*restP = r;
|
|
if (checked[0] == '\0')
|
|
(void) strcpy(checked, ".");
|
|
return checked;
|
|
}
|
|
#endif
|
|
|
|
int httpd_get_conn(httpd_server * hs, int listen_fd, httpd_conn * hc)
|
|
{
|
|
httpd_sockaddr sa;
|
|
socklen_t sz;
|
|
|
|
if (!hc->initialized)
|
|
{
|
|
hc->read_size = 0;
|
|
httpd_realloc_str(&hc->read_buf, &hc->read_size, 500);
|
|
hc->maxdecodedurl =
|
|
hc->maxorigfilename = hc->maxexpnfilename = hc->maxencodings =
|
|
hc->maxpathinfo = hc->maxquery = hc->maxaccept =
|
|
hc->maxaccepte = hc->maxreqhost = hc->maxhostdir =
|
|
hc->maxremoteuser = hc->maxresponse = 0;
|
|
#ifdef TILDE_MAP_2
|
|
hc->maxaltdir = 0;
|
|
#endif /* TILDE_MAP_2 */
|
|
httpd_realloc_str(&hc->decodedurl, &hc->maxdecodedurl, 1);
|
|
httpd_realloc_str(&hc->origfilename, &hc->maxorigfilename, 1);
|
|
httpd_realloc_str(&hc->expnfilename, &hc->maxexpnfilename, 0);
|
|
httpd_realloc_str(&hc->encodings, &hc->maxencodings, 0);
|
|
httpd_realloc_str(&hc->pathinfo, &hc->maxpathinfo, 0);
|
|
httpd_realloc_str(&hc->query, &hc->maxquery, 0);
|
|
httpd_realloc_str(&hc->accept, &hc->maxaccept, 0);
|
|
httpd_realloc_str(&hc->accepte, &hc->maxaccepte, 0);
|
|
httpd_realloc_str(&hc->reqhost, &hc->maxreqhost, 0);
|
|
httpd_realloc_str(&hc->hostdir, &hc->maxhostdir, 0);
|
|
httpd_realloc_str(&hc->remoteuser, &hc->maxremoteuser, 0);
|
|
httpd_realloc_str(&hc->response, &hc->maxresponse, 0);
|
|
#ifdef TILDE_MAP_2
|
|
httpd_realloc_str(&hc->altdir, &hc->maxaltdir, 0);
|
|
#endif /* TILDE_MAP_2 */
|
|
hc->initialized = 1;
|
|
}
|
|
|
|
/* Accept the new connection. */
|
|
sz = sizeof(sa);
|
|
hc->conn_fd = accept(listen_fd, &sa.sa, &sz);
|
|
if (hc->conn_fd < 0)
|
|
{
|
|
if (errno == EWOULDBLOCK)
|
|
return GC_NO_MORE;
|
|
syslog(LOG_ERR, "accept - %m");
|
|
return GC_FAIL;
|
|
}
|
|
if (!sockaddr_check(&sa))
|
|
{
|
|
syslog(LOG_ERR, "unknown sockaddr family");
|
|
close(hc->conn_fd);
|
|
hc->conn_fd = -1;
|
|
return GC_FAIL;
|
|
}
|
|
(void) fcntl(hc->conn_fd, F_SETFD, 1);
|
|
hc->hs = hs;
|
|
(void) memset(&hc->client_addr, 0, sizeof(hc->client_addr));
|
|
(void) memmove(&hc->client_addr, &sa, sockaddr_len(&sa));
|
|
hc->read_idx = 0;
|
|
hc->checked_idx = 0;
|
|
hc->checked_state = CHST_FIRSTWORD;
|
|
hc->method = METHOD_UNKNOWN;
|
|
hc->status = 0;
|
|
hc->bytes_to_send = 0;
|
|
hc->bytes_sent = 0;
|
|
hc->encodedurl = "";
|
|
hc->decodedurl[0] = '\0';
|
|
hc->protocol = "UNKNOWN";
|
|
hc->origfilename[0] = '\0';
|
|
hc->expnfilename[0] = '\0';
|
|
hc->encodings[0] = '\0';
|
|
hc->pathinfo[0] = '\0';
|
|
hc->query[0] = '\0';
|
|
hc->referer = "";
|
|
hc->useragent = "";
|
|
hc->accept[0] = '\0';
|
|
hc->accepte[0] = '\0';
|
|
hc->acceptl = "";
|
|
hc->cookie = "";
|
|
hc->contenttype = "";
|
|
#ifdef X_CGI_HEADER
|
|
hc->xcgi = "";
|
|
#endif
|
|
hc->reqhost[0] = '\0';
|
|
hc->hdrhost = "";
|
|
hc->hostdir[0] = '\0';
|
|
hc->authorization = "";
|
|
hc->remoteuser[0] = '\0';
|
|
hc->response[0] = '\0';
|
|
#ifdef TILDE_MAP_2
|
|
hc->altdir[0] = '\0';
|
|
#endif /* TILDE_MAP_2 */
|
|
hc->responselen = 0;
|
|
hc->if_modified_since = (time_t) - 1;
|
|
hc->range_if = (time_t) - 1;
|
|
hc->contentlength = -1;
|
|
hc->type = "";
|
|
hc->hostname = (char *) 0;
|
|
hc->mime_flag = 1;
|
|
hc->one_one = 0;
|
|
hc->got_range = 0;
|
|
hc->tildemapped = 0;
|
|
hc->first_byte_index = 0;
|
|
hc->last_byte_index = -1;
|
|
hc->keep_alive = 0;
|
|
hc->should_linger = 0;
|
|
hc->file_address = (char *) 0;
|
|
return GC_OK;
|
|
}
|
|
|
|
|
|
/* Checks hc->read_buf to see whether a complete request has been read so far;
|
|
** either the first line has two words (an HTTP/0.9 request), or the first
|
|
** line has three words and there's a blank line present.
|
|
**
|
|
** hc->read_idx is how much has been read in; hc->checked_idx is how much we
|
|
** have checked so far; and hc->checked_state is the current state of the
|
|
** finite state machine.
|
|
*/
|
|
int httpd_got_request(httpd_conn * hc)
|
|
{
|
|
char c;
|
|
|
|
for (; hc->checked_idx < hc->read_idx; ++hc->checked_idx)
|
|
{
|
|
c = hc->read_buf[hc->checked_idx];
|
|
switch (hc->checked_state)
|
|
{
|
|
case CHST_FIRSTWORD:
|
|
switch (c)
|
|
{
|
|
case ' ':
|
|
case '\t':
|
|
hc->checked_state = CHST_FIRSTWS;
|
|
break;
|
|
case '\012':
|
|
case '\015':
|
|
hc->checked_state = CHST_BOGUS;
|
|
return GR_BAD_REQUEST;
|
|
}
|
|
break;
|
|
case CHST_FIRSTWS:
|
|
switch (c)
|
|
{
|
|
case ' ':
|
|
case '\t':
|
|
break;
|
|
case '\012':
|
|
case '\015':
|
|
hc->checked_state = CHST_BOGUS;
|
|
return GR_BAD_REQUEST;
|
|
default:
|
|
hc->checked_state = CHST_SECONDWORD;
|
|
break;
|
|
}
|
|
break;
|
|
case CHST_SECONDWORD:
|
|
switch (c)
|
|
{
|
|
case ' ':
|
|
case '\t':
|
|
hc->checked_state = CHST_SECONDWS;
|
|
break;
|
|
case '\012':
|
|
case '\015':
|
|
/* The first line has only two words - an HTTP/0.9 request. */
|
|
return GR_GOT_REQUEST;
|
|
}
|
|
break;
|
|
case CHST_SECONDWS:
|
|
switch (c)
|
|
{
|
|
case ' ':
|
|
case '\t':
|
|
break;
|
|
case '\012':
|
|
case '\015':
|
|
hc->checked_state = CHST_BOGUS;
|
|
return GR_BAD_REQUEST;
|
|
default:
|
|
hc->checked_state = CHST_THIRDWORD;
|
|
break;
|
|
}
|
|
break;
|
|
case CHST_THIRDWORD:
|
|
switch (c)
|
|
{
|
|
case ' ':
|
|
case '\t':
|
|
hc->checked_state = CHST_THIRDWS;
|
|
break;
|
|
case '\012':
|
|
hc->checked_state = CHST_LF;
|
|
break;
|
|
case '\015':
|
|
hc->checked_state = CHST_CR;
|
|
break;
|
|
}
|
|
break;
|
|
case CHST_THIRDWS:
|
|
switch (c)
|
|
{
|
|
case ' ':
|
|
case '\t':
|
|
break;
|
|
case '\012':
|
|
hc->checked_state = CHST_LF;
|
|
break;
|
|
case '\015':
|
|
hc->checked_state = CHST_CR;
|
|
break;
|
|
default:
|
|
hc->checked_state = CHST_BOGUS;
|
|
return GR_BAD_REQUEST;
|
|
}
|
|
break;
|
|
case CHST_LINE:
|
|
switch (c)
|
|
{
|
|
case '\012':
|
|
hc->checked_state = CHST_LF;
|
|
break;
|
|
case '\015':
|
|
hc->checked_state = CHST_CR;
|
|
break;
|
|
}
|
|
break;
|
|
case CHST_LF:
|
|
switch (c)
|
|
{
|
|
case '\012':
|
|
/* Two newlines in a row - a blank line - end of request. */
|
|
return GR_GOT_REQUEST;
|
|
case '\015':
|
|
hc->checked_state = CHST_CR;
|
|
break;
|
|
default:
|
|
hc->checked_state = CHST_LINE;
|
|
break;
|
|
}
|
|
break;
|
|
case CHST_CR:
|
|
switch (c)
|
|
{
|
|
case '\012':
|
|
hc->checked_state = CHST_CRLF;
|
|
break;
|
|
case '\015':
|
|
/* Two returns in a row - end of request. */
|
|
return GR_GOT_REQUEST;
|
|
default:
|
|
hc->checked_state = CHST_LINE;
|
|
break;
|
|
}
|
|
break;
|
|
case CHST_CRLF:
|
|
switch (c)
|
|
{
|
|
case '\012':
|
|
/* Two newlines in a row - end of request. */
|
|
return GR_GOT_REQUEST;
|
|
case '\015':
|
|
hc->checked_state = CHST_CRLFCR;
|
|
break;
|
|
default:
|
|
hc->checked_state = CHST_LINE;
|
|
break;
|
|
}
|
|
break;
|
|
case CHST_CRLFCR:
|
|
switch (c)
|
|
{
|
|
case '\012':
|
|
case '\015':
|
|
/* Two CRLFs or two CRs in a row - end of request. */
|
|
return GR_GOT_REQUEST;
|
|
default:
|
|
hc->checked_state = CHST_LINE;
|
|
break;
|
|
}
|
|
break;
|
|
case CHST_BOGUS:
|
|
return GR_BAD_REQUEST;
|
|
}
|
|
}
|
|
return GR_NO_REQUEST;
|
|
}
|
|
|
|
|
|
int httpd_parse_request(httpd_conn * hc)
|
|
{
|
|
char *buf;
|
|
char *method_str;
|
|
char *url;
|
|
char *protocol;
|
|
char *reqhost;
|
|
char *eol;
|
|
char *cp;
|
|
char *pi;
|
|
|
|
hc->checked_idx = 0; /* reset */
|
|
method_str = bufgets(hc);
|
|
url = strpbrk(method_str, " \t\012\015");
|
|
if (url == (char *) 0)
|
|
{
|
|
httpd_send_err(hc, 400, httpd_err400title, "", httpd_err400form, "");
|
|
return -1;
|
|
}
|
|
*url++ = '\0';
|
|
url += strspn(url, " \t\012\015");
|
|
protocol = strpbrk(url, " \t\012\015");
|
|
if (protocol == (char *) 0)
|
|
{
|
|
protocol = "HTTP/0.9";
|
|
hc->mime_flag = 0;
|
|
}
|
|
else
|
|
{
|
|
*protocol++ = '\0';
|
|
protocol += strspn(protocol, " \t\012\015");
|
|
if (*protocol != '\0')
|
|
{
|
|
eol = strpbrk(protocol, " \t\012\015");
|
|
if (eol != (char *) 0)
|
|
*eol = '\0';
|
|
if (strcasecmp(protocol, "HTTP/1.0") != 0)
|
|
hc->one_one = 1;
|
|
}
|
|
}
|
|
hc->protocol = protocol;
|
|
|
|
/* Check for HTTP/1.1 absolute URL. */
|
|
if (strncasecmp(url, "http://", 7) == 0)
|
|
{
|
|
if (!hc->one_one)
|
|
{
|
|
httpd_send_err(hc, 400, httpd_err400title, "", httpd_err400form, "");
|
|
return -1;
|
|
}
|
|
reqhost = url + 7;
|
|
url = strchr(reqhost, '/');
|
|
if (url == (char *) 0)
|
|
{
|
|
httpd_send_err(hc, 400, httpd_err400title, "", httpd_err400form, "");
|
|
return -1;
|
|
}
|
|
*url = '\0';
|
|
if (strchr(reqhost, '/') != (char *) 0 || reqhost[0] == '.')
|
|
{
|
|
httpd_send_err(hc, 400, httpd_err400title, "", httpd_err400form, "");
|
|
return -1;
|
|
}
|
|
httpd_realloc_str(&hc->reqhost, &hc->maxreqhost, strlen(reqhost));
|
|
(void) strcpy(hc->reqhost, reqhost);
|
|
*url = '/';
|
|
}
|
|
|
|
if (*url != '/')
|
|
{
|
|
httpd_send_err(hc, 400, httpd_err400title, "", httpd_err400form, "");
|
|
return -1;
|
|
}
|
|
|
|
if (strcasecmp(method_str, httpd_method_str(METHOD_GET)) == 0)
|
|
hc->method = METHOD_GET;
|
|
else if (strcasecmp(method_str, httpd_method_str(METHOD_HEAD)) == 0)
|
|
hc->method = METHOD_HEAD;
|
|
else if (strcasecmp(method_str, httpd_method_str(METHOD_POST)) == 0)
|
|
hc->method = METHOD_POST;
|
|
else
|
|
{
|
|
httpd_send_err(hc, 501, err501title, "", err501form, method_str);
|
|
return -1;
|
|
}
|
|
|
|
hc->encodedurl = url;
|
|
httpd_realloc_str(&hc->decodedurl, &hc->maxdecodedurl,
|
|
strlen(hc->encodedurl));
|
|
strdecode(hc->decodedurl, hc->encodedurl);
|
|
|
|
httpd_realloc_str(&hc->origfilename, &hc->maxorigfilename,
|
|
strlen(hc->decodedurl));
|
|
|
|
pi = &hc->decodedurl[1];
|
|
while (*pi == '/')
|
|
pi++;
|
|
|
|
(void) strcpy(hc->origfilename, pi);
|
|
|
|
/* Special case for top-level URL. */
|
|
//if ( hc->origfilename[0] == '\0' )
|
|
// (void) strcpy( hc->origfilename, "." );
|
|
|
|
/* Extract query string from encoded URL. */
|
|
cp = strchr(hc->encodedurl, '?');
|
|
if (cp != (char *) 0)
|
|
{
|
|
++cp;
|
|
httpd_realloc_str(&hc->query, &hc->maxquery, strlen(cp));
|
|
(void) strcpy(hc->query, cp);
|
|
/* Remove query from (decoded) origfilename. */
|
|
cp = strchr(hc->origfilename, '?');
|
|
if (cp != (char *) 0)
|
|
*cp = '\0';
|
|
}
|
|
|
|
de_dotdot(hc->origfilename);
|
|
|
|
if (hc->origfilename[0] == '/' ||
|
|
(hc->origfilename[0] == '.' && hc->origfilename[1] == '.' &&
|
|
(hc->origfilename[2] == '\0' || hc->origfilename[2] == '/')))
|
|
{
|
|
httpd_send_err(hc, 400, httpd_err400title, "", httpd_err400form, "");
|
|
return -1;
|
|
}
|
|
|
|
if (hc->mime_flag)
|
|
{
|
|
/* Read the MIME headers. */
|
|
while ((buf = bufgets(hc)) != (char *) 0)
|
|
{
|
|
if (buf[0] == '\0')
|
|
break;
|
|
if (strncasecmp(buf, "Referer:", 8) == 0)
|
|
{
|
|
cp = &buf[8];
|
|
cp += strspn(cp, " \t");
|
|
hc->referer = cp;
|
|
}
|
|
else if (strncasecmp(buf, "User-Agent:", 11) == 0)
|
|
{
|
|
cp = &buf[11];
|
|
cp += strspn(cp, " \t");
|
|
hc->useragent = cp;
|
|
}
|
|
else if (strncasecmp(buf, "Host:", 5) == 0)
|
|
{
|
|
cp = &buf[5];
|
|
cp += strspn(cp, " \t");
|
|
hc->hdrhost = cp;
|
|
cp = strchr(hc->hdrhost, ':');
|
|
if (cp != (char *) 0)
|
|
*cp = '\0';
|
|
if (strchr(hc->hdrhost, '/') != (char *) 0 || hc->hdrhost[0] == '.')
|
|
{
|
|
httpd_send_err(hc, 400, httpd_err400title, "", httpd_err400form,
|
|
"");
|
|
return -1;
|
|
}
|
|
}
|
|
else if (strncasecmp(buf, "Accept:", 7) == 0)
|
|
{
|
|
cp = &buf[7];
|
|
cp += strspn(cp, " \t");
|
|
if (hc->accept[0] != '\0')
|
|
{
|
|
if (strlen(hc->accept) > 5000)
|
|
{
|
|
syslog(LOG_ERR, "%.80s way too much Accept: data",
|
|
httpd_ntoa(&hc->client_addr));
|
|
continue;
|
|
}
|
|
httpd_realloc_str(&hc->accept, &hc->maxaccept,
|
|
strlen(hc->accept) + 2 + strlen(cp));
|
|
(void) strcat(hc->accept, ", ");
|
|
}
|
|
else
|
|
httpd_realloc_str(&hc->accept, &hc->maxaccept, strlen(cp));
|
|
|
|
(void) strcat(hc->accept, cp);
|
|
}
|
|
else if (strncasecmp(buf, "Accept-Encoding:", 16) == 0)
|
|
{
|
|
cp = &buf[16];
|
|
cp += strspn(cp, " \t");
|
|
if (hc->accepte[0] != '\0')
|
|
{
|
|
if (strlen(hc->accepte) > 5000)
|
|
{
|
|
syslog(LOG_ERR, "%.80s way too much Accept-Encoding: data",
|
|
httpd_ntoa(&hc->client_addr));
|
|
continue;
|
|
}
|
|
httpd_realloc_str(&hc->accepte, &hc->maxaccepte,
|
|
strlen(hc->accepte) + 2 + strlen(cp));
|
|
(void) strcat(hc->accepte, ", ");
|
|
}
|
|
else
|
|
httpd_realloc_str(&hc->accepte, &hc->maxaccepte, strlen(cp));
|
|
|
|
(void) strcpy(hc->accepte, cp);
|
|
}
|
|
else if (strncasecmp(buf, "Accept-Language:", 16) == 0)
|
|
{
|
|
cp = &buf[16];
|
|
cp += strspn(cp, " \t");
|
|
hc->acceptl = cp;
|
|
}
|
|
else if (strncasecmp(buf, "If-Modified-Since:", 18) == 0)
|
|
{
|
|
cp = &buf[18];
|
|
hc->if_modified_since = tdate_parse(cp);
|
|
if (hc->if_modified_since == (time_t) - 1)
|
|
syslog(LOG_DEBUG, "unparsable time: %.80s", cp);
|
|
}
|
|
else if (strncasecmp(buf, "Cookie:", 7) == 0)
|
|
{
|
|
cp = &buf[7];
|
|
cp += strspn(cp, " \t");
|
|
hc->cookie = cp;
|
|
}
|
|
else if (strncasecmp(buf, "Range:", 6) == 0)
|
|
{
|
|
/* Only support %d- and %d-%d, not %d-%d,%d-%d or -%d. */
|
|
if (strchr(buf, ',') == (char *) 0)
|
|
{
|
|
char *cp_dash;
|
|
cp = strpbrk(buf, "=");
|
|
if (cp != (char *) 0)
|
|
{
|
|
cp_dash = strchr(cp + 1, '-');
|
|
if (cp_dash != (char *) 0 && cp_dash != cp + 1)
|
|
{
|
|
*cp_dash = '\0';
|
|
hc->got_range = 1;
|
|
hc->first_byte_index = atoll(cp + 1);
|
|
if (hc->first_byte_index < 0)
|
|
hc->first_byte_index = 0;
|
|
if (isdigit((int) cp_dash[1]))
|
|
{
|
|
hc->last_byte_index = atoll(cp_dash + 1);
|
|
if (hc->last_byte_index < 0)
|
|
hc->last_byte_index = -1;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else if (strncasecmp(buf, "Range-If:", 9) == 0 ||
|
|
strncasecmp(buf, "If-Range:", 9) == 0)
|
|
{
|
|
cp = &buf[9];
|
|
hc->range_if = tdate_parse(cp);
|
|
if (hc->range_if == (time_t) - 1)
|
|
syslog(LOG_DEBUG, "unparsable time: %.80s", cp);
|
|
}
|
|
else if (strncasecmp(buf, "Content-Type:", 13) == 0)
|
|
{
|
|
cp = &buf[13];
|
|
cp += strspn(cp, " \t");
|
|
hc->contenttype = cp;
|
|
}
|
|
else if (strncasecmp(buf, "Content-Length:", 15) == 0)
|
|
{
|
|
cp = &buf[15];
|
|
hc->contentlength = atol(cp);
|
|
}
|
|
else if (strncasecmp(buf, "Authorization:", 14) == 0)
|
|
{
|
|
cp = &buf[14];
|
|
cp += strspn(cp, " \t");
|
|
hc->authorization = cp;
|
|
}
|
|
else if (strncasecmp(buf, "Connection:", 11) == 0)
|
|
{
|
|
cp = &buf[11];
|
|
cp += strspn(cp, " \t");
|
|
if (strcasecmp(cp, "keep-alive") == 0)
|
|
hc->keep_alive = 1;
|
|
}
|
|
#ifdef X_CGI_HEADER
|
|
else if (strncasecmp(buf, "X-Cgi:", 6) == 0)
|
|
{
|
|
cp = &buf[6];
|
|
cp += strspn(cp, " \t");
|
|
hc->xcgi = cp;
|
|
}
|
|
#endif
|
|
#ifdef LOG_UNKNOWN_HEADERS
|
|
else if (strncasecmp(buf, "Accept-Charset:", 15) == 0 ||
|
|
strncasecmp(buf, "Accept-Language:", 16) == 0 ||
|
|
strncasecmp(buf, "Agent:", 6) == 0 ||
|
|
strncasecmp(buf, "Cache-Control:", 14) == 0 ||
|
|
strncasecmp(buf, "Cache-Info:", 11) == 0 ||
|
|
strncasecmp(buf, "Charge-To:", 10) == 0 ||
|
|
strncasecmp(buf, "Client-IP:", 10) == 0 ||
|
|
strncasecmp(buf, "Date:", 5) == 0 ||
|
|
strncasecmp(buf, "Extension:", 10) == 0 ||
|
|
strncasecmp(buf, "Forwarded:", 10) == 0 ||
|
|
strncasecmp(buf, "From:", 5) == 0 ||
|
|
strncasecmp(buf, "HTTP-Version:", 13) == 0 ||
|
|
strncasecmp(buf, "Max-Forwards:", 13) == 0 ||
|
|
strncasecmp(buf, "Message-Id:", 11) == 0 ||
|
|
strncasecmp(buf, "MIME-Version:", 13) == 0 ||
|
|
strncasecmp(buf, "Negotiate:", 10) == 0 ||
|
|
strncasecmp(buf, "Pragma:", 7) == 0 ||
|
|
strncasecmp(buf, "Proxy-Agent:", 12) == 0 ||
|
|
strncasecmp(buf, "Proxy-Connection:", 17) == 0 ||
|
|
strncasecmp(buf, "Security-Scheme:", 16) == 0 ||
|
|
strncasecmp(buf, "Session-Id:", 11) == 0 ||
|
|
strncasecmp(buf, "UA-Color:", 9) == 0 ||
|
|
strncasecmp(buf, "UA-CPU:", 7) == 0 ||
|
|
strncasecmp(buf, "UA-Disp:", 8) == 0 ||
|
|
strncasecmp(buf, "UA-OS:", 6) == 0 ||
|
|
strncasecmp(buf, "UA-Pixels:", 10) == 0 ||
|
|
strncasecmp(buf, "User:", 5) == 0 ||
|
|
strncasecmp(buf, "Via:", 4) == 0 ||
|
|
strncasecmp(buf, "X-", 2) == 0)
|
|
; /* ignore */
|
|
else
|
|
syslog(LOG_DEBUG, "unknown request header: %.80s", buf);
|
|
#endif /* LOG_UNKNOWN_HEADERS */
|
|
}
|
|
}
|
|
|
|
if (hc->one_one)
|
|
{
|
|
/* Check that HTTP/1.1 requests specify a host, as required. */
|
|
if (hc->reqhost[0] == '\0' && hc->hdrhost[0] == '\0')
|
|
{
|
|
httpd_send_err(hc, 400, httpd_err400title, "", httpd_err400form, "");
|
|
return -1;
|
|
}
|
|
|
|
/* If the client wants to do keep-alives, it might also be doing
|
|
** pipelining. There's no way for us to tell. Since we don't
|
|
** implement keep-alives yet, if we close such a connection there
|
|
** might be unread pipelined requests waiting. So, we have to
|
|
** do a lingering close.
|
|
*/
|
|
if (hc->keep_alive)
|
|
hc->should_linger = 1;
|
|
}
|
|
|
|
/* Ok, the request has been parsed. Now we resolve stuff that
|
|
** may require the entire request.
|
|
*/
|
|
|
|
/* Copy original filename to expanded filename. */
|
|
httpd_realloc_str(&hc->expnfilename, &hc->maxexpnfilename,
|
|
strlen(hc->origfilename));
|
|
(void) strcpy(hc->expnfilename, hc->origfilename);
|
|
|
|
/* Tilde mapping. */
|
|
if (hc->expnfilename[0] == '~')
|
|
{
|
|
#ifdef TILDE_MAP_1
|
|
if (!tilde_map_1(hc))
|
|
{
|
|
httpd_send_err(hc, 404, err404title, "", err404form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
#endif /* TILDE_MAP_1 */
|
|
#ifdef TILDE_MAP_2
|
|
if (!tilde_map_2(hc))
|
|
{
|
|
httpd_send_err(hc, 404, err404title, "", err404form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
#endif /* TILDE_MAP_2 */
|
|
}
|
|
|
|
/* Virtual host mapping. */
|
|
if (hc->hs->vhost)
|
|
if (!vhost_map(hc))
|
|
{
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
|
|
#if 0
|
|
/* Expand all symbolic links in the filename. This also gives us
|
|
** any trailing non-existing components, for pathinfo.
|
|
*/
|
|
cp =
|
|
expand_symlinks(hc->expnfilename, &pi, hc->hs->no_symlink_check,
|
|
hc->tildemapped);
|
|
|
|
//fprintf(stderr, "expnfilename: %s -> cp = %s pi = %s\n", hc->expnfilename, cp, pi);
|
|
|
|
if (cp == (char *) 0)
|
|
{
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
httpd_realloc_str(&hc->expnfilename, &hc->maxexpnfilename, strlen(cp));
|
|
(void) strcpy(hc->expnfilename, cp);
|
|
httpd_realloc_str(&hc->pathinfo, &hc->maxpathinfo, strlen(pi));
|
|
(void) strcpy(hc->pathinfo, pi);
|
|
|
|
/* Remove pathinfo stuff from the original filename too. */
|
|
if (hc->pathinfo[0] != '\0')
|
|
{
|
|
int i;
|
|
i = strlen(hc->origfilename) - strlen(hc->pathinfo);
|
|
if (i > 0 && strcmp(&hc->origfilename[i], hc->pathinfo) == 0)
|
|
hc->origfilename[i - 1] = '\0';
|
|
}
|
|
|
|
/* If the expanded filename is an absolute path, check that it's still
|
|
** within the current directory or the alternate directory.
|
|
*/
|
|
if (hc->expnfilename[0] == '/')
|
|
{
|
|
if (strncmp(hc->expnfilename, hc->hs->cwd, strlen(hc->hs->cwd)) == 0)
|
|
{
|
|
/* Elide the current directory. */
|
|
(void) strcpy(hc->expnfilename, &hc->expnfilename[strlen(hc->hs->cwd)]);
|
|
}
|
|
#ifdef TILDE_MAP_2
|
|
else if (hc->altdir[0] != '\0' &&
|
|
(strncmp(hc->expnfilename, hc->altdir,
|
|
strlen(hc->altdir)) == 0 &&
|
|
(hc->expnfilename[strlen(hc->altdir)] == '\0' ||
|
|
hc->expnfilename[strlen(hc->altdir)] == '/')))
|
|
{
|
|
}
|
|
#endif /* TILDE_MAP_2 */
|
|
else
|
|
{
|
|
syslog(LOG_NOTICE, "%.80s URL \"%.80s\" goes outside the web tree",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' resolves to a file outside the permitted web server directory tree.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static char *bufgets(httpd_conn * hc)
|
|
{
|
|
int i;
|
|
char c;
|
|
|
|
for (i = hc->checked_idx; hc->checked_idx < hc->read_idx; ++hc->checked_idx)
|
|
{
|
|
c = hc->read_buf[hc->checked_idx];
|
|
if (c == '\012' || c == '\015')
|
|
{
|
|
hc->read_buf[hc->checked_idx] = '\0';
|
|
++hc->checked_idx;
|
|
if (c == '\015' && hc->checked_idx < hc->read_idx &&
|
|
hc->read_buf[hc->checked_idx] == '\012')
|
|
{
|
|
hc->read_buf[hc->checked_idx] = '\0';
|
|
++hc->checked_idx;
|
|
}
|
|
return &(hc->read_buf[i]);
|
|
}
|
|
}
|
|
return (char *) 0;
|
|
}
|
|
|
|
|
|
static void de_dotdot(char *file)
|
|
{
|
|
char *cp;
|
|
char *cp2;
|
|
int l;
|
|
|
|
/* Collapse any multiple / sequences. */
|
|
while ((cp = strstr(file, "//")) != (char *) 0)
|
|
{
|
|
for (cp2 = cp + 2; *cp2 == '/'; ++cp2)
|
|
continue;
|
|
(void) strcpy(cp + 1, cp2);
|
|
}
|
|
|
|
/* Remove leading ./ and any /./ sequences. */
|
|
while (strncmp(file, "./", 2) == 0)
|
|
(void) strcpy(file, file + 2);
|
|
while ((cp = strstr(file, "/./")) != (char *) 0)
|
|
(void) strcpy(cp, cp + 2);
|
|
|
|
/* Alternate between removing leading ../ and removing xxx/../ */
|
|
for (;;)
|
|
{
|
|
while (strncmp(file, "../", 3) == 0)
|
|
(void) strcpy(file, file + 3);
|
|
cp = strstr(file, "/../");
|
|
if (cp == (char *) 0)
|
|
break;
|
|
for (cp2 = cp - 1; cp2 >= file && *cp2 != '/'; --cp2)
|
|
continue;
|
|
(void) strcpy(cp2 + 1, cp + 4);
|
|
}
|
|
|
|
/* Also elide any xxx/.. at the end. */
|
|
while ((l = strlen(file)) > 3 && strcmp((cp = file + l - 3), "/..") == 0)
|
|
{
|
|
for (cp2 = cp - 1; cp2 >= file && *cp2 != '/'; --cp2)
|
|
continue;
|
|
if (cp2 < file)
|
|
break;
|
|
*cp2 = '\0';
|
|
}
|
|
}
|
|
|
|
|
|
void httpd_close_conn(httpd_conn * hc, struct timeval *nowP)
|
|
{
|
|
make_log_entry(hc, nowP);
|
|
|
|
if (hc->file_address != (char *) 0)
|
|
{
|
|
GB.ReleaseFile(hc->file_address, hc->file_len);
|
|
//mmc_unmap(hc->file_address, &(hc->sb), nowP);
|
|
hc->file_address = (char *) 0;
|
|
}
|
|
if (hc->conn_fd >= 0)
|
|
{
|
|
(void) close(hc->conn_fd);
|
|
hc->conn_fd = -1;
|
|
}
|
|
}
|
|
|
|
void httpd_destroy_conn(httpd_conn * hc)
|
|
{
|
|
if (hc->initialized)
|
|
{
|
|
free((void *) hc->read_buf);
|
|
free((void *) hc->decodedurl);
|
|
free((void *) hc->origfilename);
|
|
free((void *) hc->expnfilename);
|
|
free((void *) hc->encodings);
|
|
free((void *) hc->pathinfo);
|
|
free((void *) hc->query);
|
|
free((void *) hc->accept);
|
|
free((void *) hc->accepte);
|
|
free((void *) hc->reqhost);
|
|
free((void *) hc->hostdir);
|
|
free((void *) hc->remoteuser);
|
|
free((void *) hc->response);
|
|
#ifdef TILDE_MAP_2
|
|
free((void *) hc->altdir);
|
|
#endif /* TILDE_MAP_2 */
|
|
hc->initialized = 0;
|
|
}
|
|
}
|
|
|
|
|
|
struct mime_entry
|
|
{
|
|
char *ext;
|
|
size_t ext_len;
|
|
char *val;
|
|
size_t val_len;
|
|
};
|
|
static struct mime_entry enc_tab[] = {
|
|
#include "mime_encodings.h"
|
|
};
|
|
|
|
static const int n_enc_tab = sizeof(enc_tab) / sizeof(*enc_tab);
|
|
static struct mime_entry typ_tab[] = {
|
|
#include "mime_types.h"
|
|
};
|
|
|
|
static const int n_typ_tab = sizeof(typ_tab) / sizeof(*typ_tab);
|
|
|
|
|
|
/* qsort comparison routine - declared old-style on purpose, for portability. */
|
|
static int ext_compare(a, b)
|
|
struct mime_entry *a;
|
|
struct mime_entry *b;
|
|
{
|
|
return strcmp(a->ext, b->ext);
|
|
}
|
|
|
|
|
|
static void init_mime(void)
|
|
{
|
|
int i;
|
|
|
|
/* Sort the tables so we can do binary search. */
|
|
qsort(enc_tab, n_enc_tab, sizeof(*enc_tab), ext_compare);
|
|
qsort(typ_tab, n_typ_tab, sizeof(*typ_tab), ext_compare);
|
|
|
|
/* Fill in the lengths. */
|
|
for (i = 0; i < n_enc_tab; ++i)
|
|
{
|
|
enc_tab[i].ext_len = strlen(enc_tab[i].ext);
|
|
enc_tab[i].val_len = strlen(enc_tab[i].val);
|
|
}
|
|
for (i = 0; i < n_typ_tab; ++i)
|
|
{
|
|
typ_tab[i].ext_len = strlen(typ_tab[i].ext);
|
|
typ_tab[i].val_len = strlen(typ_tab[i].val);
|
|
}
|
|
|
|
}
|
|
|
|
/* Figure out MIME encodings and type based on the filename. Multiple
|
|
** encodings are separated by commas, and are listed in the order in
|
|
** which they were applied to the file.
|
|
*/
|
|
static void figure_mime(httpd_conn * hc)
|
|
{
|
|
char *prev_dot;
|
|
char *dot;
|
|
char *ext;
|
|
int me_indexes[100], n_me_indexes;
|
|
size_t ext_len, encodings_len;
|
|
int i, top, bot, mid;
|
|
int r;
|
|
char *default_type = "text/plain; charset=%s";
|
|
|
|
/* Peel off encoding extensions until there aren't any more. */
|
|
n_me_indexes = 0;
|
|
for (prev_dot = &hc->expnfilename[strlen(hc->expnfilename)];;
|
|
prev_dot = dot)
|
|
{
|
|
for (dot = prev_dot - 1; dot >= hc->expnfilename && *dot != '.'; --dot)
|
|
;
|
|
if (dot < hc->expnfilename)
|
|
{
|
|
/* No dot found. No more encoding extensions, and no type
|
|
** extension either.
|
|
*/
|
|
hc->type = default_type;
|
|
goto done;
|
|
}
|
|
ext = dot + 1;
|
|
ext_len = prev_dot - ext;
|
|
/* Search the encodings table. Linear search is fine here, there
|
|
** are only a few entries.
|
|
*/
|
|
for (i = 0; i < n_enc_tab; ++i)
|
|
{
|
|
if (ext_len == enc_tab[i].ext_len
|
|
&& strncasecmp(ext, enc_tab[i].ext, ext_len) == 0)
|
|
{
|
|
if (n_me_indexes < sizeof(me_indexes) / sizeof(*me_indexes))
|
|
{
|
|
me_indexes[n_me_indexes] = i;
|
|
++n_me_indexes;
|
|
}
|
|
goto next;
|
|
}
|
|
}
|
|
/* No encoding extension found. Break and look for a type extension. */
|
|
break;
|
|
|
|
next:;
|
|
}
|
|
|
|
/* Binary search for a matching type extension. */
|
|
top = n_typ_tab - 1;
|
|
bot = 0;
|
|
while (top >= bot)
|
|
{
|
|
mid = (top + bot) / 2;
|
|
r = strncasecmp(ext, typ_tab[mid].ext, ext_len);
|
|
if (r < 0)
|
|
top = mid - 1;
|
|
else if (r > 0)
|
|
bot = mid + 1;
|
|
else if (ext_len < typ_tab[mid].ext_len)
|
|
top = mid - 1;
|
|
else if (ext_len > typ_tab[mid].ext_len)
|
|
bot = mid + 1;
|
|
else
|
|
{
|
|
hc->type = typ_tab[mid].val;
|
|
goto done;
|
|
}
|
|
}
|
|
hc->type = default_type;
|
|
|
|
done:
|
|
|
|
/* The last thing we do is actually generate the mime-encoding header. */
|
|
hc->encodings[0] = '\0';
|
|
encodings_len = 0;
|
|
for (i = n_me_indexes - 1; i >= 0; --i)
|
|
{
|
|
httpd_realloc_str(&hc->encodings, &hc->maxencodings,
|
|
encodings_len + enc_tab[me_indexes[i]].val_len + 1);
|
|
if (hc->encodings[0] != '\0')
|
|
{
|
|
(void) strcpy(&hc->encodings[encodings_len], ",");
|
|
++encodings_len;
|
|
}
|
|
(void) strcpy(&hc->encodings[encodings_len], enc_tab[me_indexes[i]].val);
|
|
encodings_len += enc_tab[me_indexes[i]].val_len;
|
|
}
|
|
|
|
}
|
|
|
|
#ifdef CGI_TIMELIMIT
|
|
static void cgi_kill2(ClientData client_data, struct timeval *nowP)
|
|
{
|
|
pid_t pid;
|
|
|
|
pid = (pid_t) client_data.i;
|
|
if (kill(pid, SIGKILL) == 0)
|
|
syslog(LOG_ERR, "hard-killed CGI process %d", pid);
|
|
}
|
|
|
|
static void cgi_kill(ClientData client_data, struct timeval *nowP)
|
|
{
|
|
pid_t pid;
|
|
|
|
pid = (pid_t) client_data.i;
|
|
if (kill(pid, SIGINT) == 0)
|
|
{
|
|
syslog(LOG_ERR, "killed CGI process %d", pid);
|
|
/* In case this isn't enough, schedule an uncatchable kill. */
|
|
if (tmr_create(nowP, cgi_kill2, client_data, 5 * 1000L, 0) == (Timer *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "tmr_create(cgi_kill2) failed");
|
|
exit(1);
|
|
}
|
|
}
|
|
}
|
|
#endif /* CGI_TIMELIMIT */
|
|
|
|
|
|
#ifdef GENERATE_INDEXES
|
|
|
|
/* qsort comparison routine - declared old-style on purpose, for portability. */
|
|
static int name_compare(a, b)
|
|
char **a;
|
|
char **b;
|
|
{
|
|
return strcmp(*a, *b);
|
|
}
|
|
|
|
#if 0
|
|
static int ls(httpd_conn * hc)
|
|
{
|
|
DIR *dirp;
|
|
struct dirent *de;
|
|
int namlen;
|
|
static int maxnames = 0;
|
|
int nnames;
|
|
static char *names;
|
|
static char **nameptrs;
|
|
static char *name;
|
|
static size_t maxname = 0;
|
|
static char *rname;
|
|
static size_t maxrname = 0;
|
|
static char *encrname;
|
|
static size_t maxencrname = 0;
|
|
FILE *fp;
|
|
int i, r;
|
|
struct stat sb;
|
|
struct stat lsb;
|
|
char modestr[20];
|
|
char *linkprefix;
|
|
char link[MAXPATHLEN + 1];
|
|
int linklen;
|
|
char *fileclass;
|
|
time_t now;
|
|
char *timestr;
|
|
ClientData client_data;
|
|
|
|
dirp = opendir(hc->expnfilename);
|
|
if (dirp == (DIR *) 0)
|
|
{
|
|
syslog(LOG_ERR, "opendir %.80s - %m", hc->expnfilename);
|
|
httpd_send_err(hc, 404, err404title, "", err404form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
|
|
if (hc->method == METHOD_HEAD)
|
|
{
|
|
closedir(dirp);
|
|
send_mime(hc, 200, ok200title, "", "", "text/html; charset=%s",
|
|
(off_t) - 1, hc->sb.mtime);
|
|
}
|
|
else if (hc->method == METHOD_GET)
|
|
{
|
|
if (hc->hs->cgi_limit != 0 && hc->hs->cgi_count >= hc->hs->cgi_limit)
|
|
{
|
|
closedir(dirp);
|
|
httpd_send_err(hc, 503, httpd_err503title, "", httpd_err503form,
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
++hc->hs->cgi_count;
|
|
r = fork();
|
|
if (r < 0)
|
|
{
|
|
syslog(LOG_ERR, "fork - %m");
|
|
closedir(dirp);
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
if (r == 0)
|
|
{
|
|
/* Child process. */
|
|
sub_process = 1;
|
|
httpd_unlisten(hc->hs);
|
|
send_mime(hc, 200, ok200title, "", "", "text/html; charset=%s",
|
|
(off_t) - 1, hc->sb.mtime);
|
|
httpd_write_response(hc);
|
|
|
|
#ifdef CGI_NICE
|
|
/* Set priority. */
|
|
(void) nice(CGI_NICE);
|
|
#endif /* CGI_NICE */
|
|
|
|
/* Open a stdio stream so that we can use fprintf, which is more
|
|
** efficient than a bunch of separate write()s. We don't have
|
|
** to worry about double closes or file descriptor leaks cause
|
|
** we're in a subprocess.
|
|
*/
|
|
fp = fdopen(hc->conn_fd, "w");
|
|
if (fp == (FILE *) 0)
|
|
{
|
|
syslog(LOG_ERR, "fdopen - %m");
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
httpd_write_response(hc);
|
|
closedir(dirp);
|
|
exit(1);
|
|
}
|
|
|
|
(void) fprintf(fp, "\
|
|
<HTML>\n\
|
|
<HEAD><TITLE>Index of %.80s</TITLE></HEAD>\n\
|
|
<BODY BGCOLOR=\"#99cc99\" TEXT=\"#000000\" LINK=\"#2020ff\" VLINK=\"#4040cc\">\n\
|
|
<H2>Index of %.80s</H2>\n\
|
|
<PRE>\n\
|
|
mode links bytes last-changed name\n\
|
|
<HR>", hc->encodedurl, hc->encodedurl);
|
|
|
|
/* Read in names. */
|
|
nnames = 0;
|
|
while ((de = readdir(dirp)) != 0) /* dirent or direct */
|
|
{
|
|
if (nnames >= maxnames)
|
|
{
|
|
if (maxnames == 0)
|
|
{
|
|
maxnames = 100;
|
|
names = NEW(char, maxnames * (MAXPATHLEN + 1));
|
|
nameptrs = NEW(char *, maxnames);
|
|
}
|
|
else
|
|
{
|
|
maxnames *= 2;
|
|
names = RENEW(names, char, maxnames * (MAXPATHLEN + 1));
|
|
nameptrs = RENEW(nameptrs, char *, maxnames);
|
|
}
|
|
if (names == (char *) 0 || nameptrs == (char **) 0)
|
|
{
|
|
syslog(LOG_ERR, "out of memory reallocating directory names");
|
|
exit(1);
|
|
}
|
|
for (i = 0; i < maxnames; ++i)
|
|
nameptrs[i] = &names[i * (MAXPATHLEN + 1)];
|
|
}
|
|
namlen = NAMLEN(de);
|
|
(void) strncpy(nameptrs[nnames], de->d_name, namlen);
|
|
nameptrs[nnames][namlen] = '\0';
|
|
++nnames;
|
|
}
|
|
closedir(dirp);
|
|
|
|
/* Sort the names. */
|
|
qsort(nameptrs, nnames, sizeof(*nameptrs), name_compare);
|
|
|
|
/* Generate output. */
|
|
for (i = 0; i < nnames; ++i)
|
|
{
|
|
httpd_realloc_str(&name, &maxname,
|
|
strlen(hc->expnfilename) + 1 + strlen(nameptrs[i]));
|
|
httpd_realloc_str(&rname, &maxrname,
|
|
strlen(hc->origfilename) + 1 + strlen(nameptrs[i]));
|
|
if (hc->expnfilename[0] == '\0' || strcmp(hc->expnfilename, ".") == 0)
|
|
{
|
|
(void) strcpy(name, nameptrs[i]);
|
|
(void) strcpy(rname, nameptrs[i]);
|
|
}
|
|
else
|
|
{
|
|
(void) my_snprintf(name, maxname,
|
|
"%s/%s", hc->expnfilename, nameptrs[i]);
|
|
if (strcmp(hc->origfilename, ".") == 0)
|
|
(void) my_snprintf(rname, maxrname, "%s", nameptrs[i]);
|
|
else
|
|
(void) my_snprintf(rname, maxrname,
|
|
"%s%s", hc->origfilename, nameptrs[i]);
|
|
}
|
|
httpd_realloc_str(&encrname, &maxencrname, 3 * strlen(rname) + 1);
|
|
strencode(encrname, maxencrname, rname);
|
|
|
|
if (stat(name, &sb) < 0 || lstat(name, &lsb) < 0)
|
|
continue;
|
|
|
|
linkprefix = "";
|
|
link[0] = '\0';
|
|
/* Break down mode word. First the file type. */
|
|
switch (lsb.st_mode & S_IFMT)
|
|
{
|
|
case S_IFIFO:
|
|
modestr[0] = 'p';
|
|
break;
|
|
case S_IFCHR:
|
|
modestr[0] = 'c';
|
|
break;
|
|
case S_IFDIR:
|
|
modestr[0] = 'd';
|
|
break;
|
|
case S_IFBLK:
|
|
modestr[0] = 'b';
|
|
break;
|
|
case S_IFREG:
|
|
modestr[0] = '-';
|
|
break;
|
|
case S_IFSOCK:
|
|
modestr[0] = 's';
|
|
break;
|
|
case S_IFLNK:
|
|
modestr[0] = 'l';
|
|
linklen = readlink(name, link, sizeof(link) - 1);
|
|
if (linklen != -1)
|
|
{
|
|
link[linklen] = '\0';
|
|
linkprefix = " -> ";
|
|
}
|
|
break;
|
|
default:
|
|
modestr[0] = '?';
|
|
break;
|
|
}
|
|
/* Now the world permissions. Owner and group permissions
|
|
** are not of interest to web clients.
|
|
*/
|
|
modestr[1] = (lsb.st_mode & S_IROTH) ? 'r' : '-';
|
|
modestr[2] = (lsb.st_mode & S_IWOTH) ? 'w' : '-';
|
|
modestr[3] = (lsb.st_mode & S_IXOTH) ? 'x' : '-';
|
|
modestr[4] = '\0';
|
|
|
|
/* We also leave out the owner and group name, they are
|
|
** also not of interest to web clients. Plus if we're
|
|
** running under chroot(), they would require a copy
|
|
** of /etc/passwd and /etc/group, which we want to avoid.
|
|
*/
|
|
|
|
/* Get time string. */
|
|
now = time((time_t *) 0);
|
|
timestr = ctime(&lsb.st_mtime);
|
|
timestr[0] = timestr[4];
|
|
timestr[1] = timestr[5];
|
|
timestr[2] = timestr[6];
|
|
timestr[3] = ' ';
|
|
timestr[4] = timestr[8];
|
|
timestr[5] = timestr[9];
|
|
timestr[6] = ' ';
|
|
if (now - lsb.st_mtime > 60 * 60 * 24 * 182) /* 1/2 year */
|
|
{
|
|
timestr[7] = ' ';
|
|
timestr[8] = timestr[20];
|
|
timestr[9] = timestr[21];
|
|
timestr[10] = timestr[22];
|
|
timestr[11] = timestr[23];
|
|
}
|
|
else
|
|
{
|
|
timestr[7] = timestr[11];
|
|
timestr[8] = timestr[12];
|
|
timestr[9] = ':';
|
|
timestr[10] = timestr[14];
|
|
timestr[11] = timestr[15];
|
|
}
|
|
timestr[12] = '\0';
|
|
|
|
/* The ls -F file class. */
|
|
switch (sb.st_mode & S_IFMT)
|
|
{
|
|
case S_IFDIR:
|
|
fileclass = "/";
|
|
break;
|
|
case S_IFSOCK:
|
|
fileclass = "=";
|
|
break;
|
|
case S_IFLNK:
|
|
fileclass = "@";
|
|
break;
|
|
default:
|
|
fileclass = (sb.st_mode & S_IXOTH) ? "*" : "";
|
|
break;
|
|
}
|
|
|
|
/* And print. */
|
|
(void) fprintf(fp,
|
|
"%s %3ld %10ld %s <A HREF=\"/%.500s%s\">%.80s</A>%s%s%s\n",
|
|
modestr, (long) lsb.st_nlink, (int64_t) lsb.st_size,
|
|
timestr, encrname, S_ISDIR(sb.st_mode) ? "/" : "",
|
|
nameptrs[i], linkprefix, link, fileclass);
|
|
}
|
|
|
|
(void) fprintf(fp, "</PRE></BODY>\n</HTML>\n");
|
|
(void) fclose(fp);
|
|
exit(0);
|
|
}
|
|
|
|
/* Parent process. */
|
|
closedir(dirp);
|
|
syslog(LOG_INFO, "spawned indexing process %d for directory '%.200s'", r,
|
|
hc->expnfilename);
|
|
#ifdef CGI_TIMELIMIT
|
|
/* Schedule a kill for the child process, in case it runs too long */
|
|
if (hc->hs->cgi_timelimit)
|
|
{
|
|
client_data.i = r;
|
|
if (tmr_create
|
|
((struct timeval *) 0, cgi_kill, client_data,
|
|
hc->hs->cgi_timelimit * 1000L, 0) == (Timer *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "tmr_create(cgi_kill ls) failed");
|
|
exit(1);
|
|
}
|
|
}
|
|
#endif /* CGI_TIMELIMIT */
|
|
hc->status = 200;
|
|
hc->bytes_sent = CGI_BYTECOUNT;
|
|
hc->should_linger = 0;
|
|
}
|
|
else
|
|
{
|
|
closedir(dirp);
|
|
httpd_send_err(hc, 501, err501title, "", err501form,
|
|
httpd_method_str(hc->method));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#endif /* GENERATE_INDEXES */
|
|
|
|
|
|
static char *build_env(char *fmt, char *arg)
|
|
{
|
|
char *cp;
|
|
size_t size;
|
|
static char *buf;
|
|
static size_t maxbuf = 0;
|
|
|
|
size = strlen(fmt) + strlen(arg);
|
|
if (size > maxbuf)
|
|
httpd_realloc_str(&buf, &maxbuf, size);
|
|
|
|
(void) my_snprintf(buf, maxbuf, fmt, arg);
|
|
cp = strdup(buf);
|
|
if (cp == (char *) 0)
|
|
{
|
|
syslog(LOG_ERR, "out of memory copying environment variable");
|
|
exit(1);
|
|
}
|
|
//fprintf(stderr, "build_env: %s\n", cp);
|
|
return cp;
|
|
}
|
|
|
|
|
|
#ifdef SERVER_NAME_LIST
|
|
static char *hostname_map(char *hostname)
|
|
{
|
|
int len, n;
|
|
static char *list[] = { SERVER_NAME_LIST };
|
|
|
|
len = strlen(hostname);
|
|
for (n = sizeof(list) / sizeof(*list) - 1; n >= 0; --n)
|
|
if (strncasecmp(hostname, list[n], len) == 0)
|
|
if (list[n][len] == '/') /* check in case of a substring match */
|
|
return &list[n][len + 1];
|
|
return (char *) 0;
|
|
}
|
|
#endif /* SERVER_NAME_LIST */
|
|
|
|
|
|
/* Set up environment variables. Be real careful here to avoid
|
|
** letting malicious clients overrun a buffer. We don't have
|
|
** to worry about freeing stuff since we're a sub-process.
|
|
*/
|
|
static char **make_envp(httpd_conn * hc)
|
|
{
|
|
static char *envp[50];
|
|
int envn;
|
|
char *cp;
|
|
char buf[256];
|
|
|
|
envn = 0;
|
|
//envp[envn++] = build_env("PATH=%s", CGI_PATH);
|
|
#ifdef CGI_LD_LIBRARY_PATH
|
|
envp[envn++] = build_env("LD_LIBRARY_PATH=%s", CGI_LD_LIBRARY_PATH);
|
|
#endif /* CGI_LD_LIBRARY_PATH */
|
|
envp[envn++] = build_env("SERVER_SOFTWARE=%s", SERVER_SOFTWARE);
|
|
/* If vhosting, use that server-name here. */
|
|
if (hc->hs->vhost && hc->hostname != (char *) 0)
|
|
cp = hc->hostname;
|
|
else
|
|
cp = hc->hs->server_hostname;
|
|
if (cp != (char *) 0)
|
|
envp[envn++] = build_env("SERVER_NAME=%s", cp);
|
|
envp[envn++] = "GATEWAY_INTERFACE=CGI/1.1";
|
|
envp[envn++] = build_env("SERVER_PROTOCOL=%s", hc->protocol);
|
|
(void) my_snprintf(buf, sizeof(buf), "%d", (int) hc->hs->port);
|
|
envp[envn++] = build_env("SERVER_PORT=%s", buf);
|
|
envp[envn++] = build_env("REQUEST_METHOD=%s", httpd_method_str(hc->method));
|
|
|
|
/*if ( hc->pathinfo[0] != '\0' )
|
|
{
|
|
char* cp2;
|
|
size_t l;
|
|
envp[envn++] = build_env( "PATH_INFO=/%s", hc->pathinfo );
|
|
l = strlen( hc->hs->cwd ) + strlen( hc->pathinfo ) + 1;
|
|
cp2 = NEW( char, l );
|
|
if ( cp2 != (char*) 0 )
|
|
{
|
|
(void) my_snprintf( cp2, l, "%s%s", hc->hs->cwd, hc->pathinfo );
|
|
envp[envn++] = build_env( "PATH_TRANSLATED=%s", cp2 );
|
|
}
|
|
} */
|
|
|
|
envp[envn++] = "SCRIPT_NAME=/";
|
|
|
|
envp[envn++] = build_env("PATH_INFO=/%s", hc->expnfilename);
|
|
//envp[envn++] = build_env( "SCRIPT_NAME=%s", "");
|
|
|
|
if (hc->query[0] != '\0')
|
|
envp[envn++] = build_env("QUERY_STRING=%s", hc->query);
|
|
envp[envn++] = build_env("REMOTE_ADDR=%s", httpd_ntoa(&hc->client_addr));
|
|
if (hc->referer[0] != '\0')
|
|
envp[envn++] = build_env("HTTP_REFERER=%s", hc->referer);
|
|
if (hc->useragent[0] != '\0')
|
|
envp[envn++] = build_env("HTTP_USER_AGENT=%s", hc->useragent);
|
|
if (hc->accept[0] != '\0')
|
|
envp[envn++] = build_env("HTTP_ACCEPT=%s", hc->accept);
|
|
if (hc->accepte[0] != '\0')
|
|
envp[envn++] = build_env("HTTP_ACCEPT_ENCODING=%s", hc->accepte);
|
|
if (hc->acceptl[0] != '\0')
|
|
envp[envn++] = build_env("HTTP_ACCEPT_LANGUAGE=%s", hc->acceptl);
|
|
if (hc->cookie[0] != '\0')
|
|
envp[envn++] = build_env("HTTP_COOKIE=%s", hc->cookie);
|
|
if (hc->contenttype[0] != '\0')
|
|
envp[envn++] = build_env("CONTENT_TYPE=%s", hc->contenttype);
|
|
if (hc->hdrhost[0] != '\0')
|
|
envp[envn++] = build_env("HTTP_HOST=%s", hc->hdrhost);
|
|
|
|
if (hc->contentlength != -1)
|
|
{
|
|
(void) my_snprintf(buf, sizeof(buf), "%lu",
|
|
(unsigned long) hc->contentlength);
|
|
envp[envn++] = build_env("CONTENT_LENGTH=%s", buf);
|
|
}
|
|
if (hc->remoteuser[0] != '\0')
|
|
envp[envn++] = build_env("REMOTE_USER=%s", hc->remoteuser);
|
|
if (hc->authorization[0] != '\0')
|
|
envp[envn++] = build_env("AUTH_TYPE=%s", "Basic");
|
|
|
|
/* We only support Basic auth at the moment. */
|
|
if (getenv("TZ") != (char *) 0)
|
|
envp[envn++] = build_env("TZ=%s", getenv("TZ"));
|
|
|
|
//fprintf(stderr, "make_envp #2.4: %d %p\n", getpid(), hc->hs->cgi_pattern);
|
|
//envp[envn++] = build_env( "CGI_PATTERN=%s", hc->hs->cgi_pattern );
|
|
|
|
#ifdef X_CGI_HEADER
|
|
//if (hc->xcgi[0])
|
|
envp[envn++] = build_env("X_CGI=%s", hc->xcgi);
|
|
if (hc->if_modified_since != (time_t) - 1)
|
|
{
|
|
my_snprintf(buf, sizeof(buf), "%lld", (int64_t) (hc->if_modified_since));
|
|
envp[envn++] = build_env("HTTP_IF_MODIFIED_SINCE=%s", buf);
|
|
}
|
|
#endif
|
|
|
|
envp[envn] = (char *) 0;
|
|
return envp;
|
|
}
|
|
|
|
|
|
/* Set up argument vector. Again, we don't have to worry about freeing stuff
|
|
** since we're a sub-process. This gets done after make_envp() because we
|
|
** scribble on hc->query.
|
|
*/
|
|
static char **make_argp(httpd_conn * hc)
|
|
{
|
|
char **argp;
|
|
int argn;
|
|
char *cp1;
|
|
char *cp2;
|
|
|
|
/* By allocating an arg slot for every character in the query, plus
|
|
** one for the filename and one for the NULL, we are guaranteed to
|
|
** have enough. We could actually use strlen/2.
|
|
*/
|
|
argp = NEW(char *, strlen(hc->query) + 2);
|
|
if (argp == (char **) 0)
|
|
return (char **) 0;
|
|
|
|
argp[0] = strrchr(hc->expnfilename, '/');
|
|
if (argp[0] != (char *) 0)
|
|
++argp[0];
|
|
else
|
|
argp[0] = hc->expnfilename;
|
|
|
|
argn = 1;
|
|
/* According to the CGI spec at http://hoohoo.ncsa.uiuc.edu/cgi/cl.html,
|
|
** "The server should search the query information for a non-encoded =
|
|
** character to determine if the command line is to be used, if it finds
|
|
** one, the command line is not to be used."
|
|
*/
|
|
if (strchr(hc->query, '=') == (char *) 0)
|
|
{
|
|
for (cp1 = cp2 = hc->query; *cp2 != '\0'; ++cp2)
|
|
{
|
|
if (*cp2 == '+')
|
|
{
|
|
*cp2 = '\0';
|
|
strdecode(cp1, cp1);
|
|
argp[argn++] = cp1;
|
|
cp1 = cp2 + 1;
|
|
}
|
|
}
|
|
if (cp2 != cp1)
|
|
{
|
|
strdecode(cp1, cp1);
|
|
argp[argn++] = cp1;
|
|
}
|
|
}
|
|
|
|
argp[argn] = (char *) 0;
|
|
return argp;
|
|
}
|
|
|
|
|
|
/* This routine is used only for POST requests. It reads the data
|
|
** from the request and sends it to the child process. The only reason
|
|
** we need to do it this way instead of just letting the child read
|
|
** directly is that we have already read part of the data into our
|
|
** buffer.
|
|
*/
|
|
static void cgi_interpose_input(httpd_conn * hc, int wfd)
|
|
{
|
|
size_t c;
|
|
ssize_t r;
|
|
char buf[1024];
|
|
|
|
c = hc->read_idx - hc->checked_idx;
|
|
if (c > 0)
|
|
{
|
|
if (httpd_write_fully(wfd, &(hc->read_buf[hc->checked_idx]), c) != c)
|
|
return;
|
|
}
|
|
while (c < hc->contentlength)
|
|
{
|
|
r = read(hc->conn_fd, buf, MIN(sizeof(buf), hc->contentlength - c));
|
|
if (r < 0 && (errno == EINTR || errno == EAGAIN))
|
|
{
|
|
sleep(1);
|
|
continue;
|
|
}
|
|
if (r <= 0)
|
|
return;
|
|
if (httpd_write_fully(wfd, buf, r) != r)
|
|
return;
|
|
c += r;
|
|
}
|
|
post_post_garbage_hack(hc);
|
|
}
|
|
|
|
|
|
/* Special hack to deal with broken browsers that send a LF or CRLF
|
|
** after POST data, causing TCP resets - we just read and discard up
|
|
** to 2 bytes. Unfortunately this doesn't fix the problem for CGIs
|
|
** which avoid the interposer process due to their POST data being
|
|
** short. Creating an interposer process for all POST CGIs is
|
|
** unacceptably expensive. The eventual fix will come when interposing
|
|
** gets integrated into the main loop as a tasklet instead of a process.
|
|
*/
|
|
static void post_post_garbage_hack(httpd_conn * hc)
|
|
{
|
|
char buf[2];
|
|
|
|
/* If we are in a sub-process, turn on no-delay mode in case we
|
|
** previously cleared it.
|
|
*/
|
|
if (sub_process)
|
|
httpd_set_ndelay(hc->conn_fd);
|
|
/* And read up to 2 bytes. */
|
|
(void) read(hc->conn_fd, buf, sizeof(buf));
|
|
}
|
|
|
|
|
|
/* This routine is used for parsed-header CGIs. The idea here is that the
|
|
** CGI can return special headers such as "Status:" and "Location:" which
|
|
** change the return status of the response. Since the return status has to
|
|
** be the very first line written out, we have to accumulate all the headers
|
|
** and check for the special ones before writing the status. Then we write
|
|
** out the saved headers and proceed to echo the rest of the response.
|
|
*/
|
|
static void cgi_interpose_output(httpd_conn * hc, int rfd)
|
|
{
|
|
int r;
|
|
char buf[1024];
|
|
size_t headers_size, headers_len;
|
|
char *headers;
|
|
char *br;
|
|
int status;
|
|
char *title;
|
|
char *cp;
|
|
|
|
/* Make sure the connection is in blocking mode. It should already
|
|
** be blocking, but we might as well be sure.
|
|
*/
|
|
httpd_clear_ndelay(hc->conn_fd);
|
|
|
|
/* Slurp in all headers. */
|
|
headers_size = 0;
|
|
httpd_realloc_str(&headers, &headers_size, 500);
|
|
headers_len = 0;
|
|
for (;;)
|
|
{
|
|
r = read(rfd, buf, sizeof(buf));
|
|
if (r < 0 && (errno == EINTR || errno == EAGAIN))
|
|
{
|
|
sleep(1);
|
|
continue;
|
|
}
|
|
if (r <= 0)
|
|
{
|
|
br = &(headers[headers_len]);
|
|
break;
|
|
}
|
|
httpd_realloc_str(&headers, &headers_size, headers_len + r);
|
|
(void) memmove(&(headers[headers_len]), buf, r);
|
|
headers_len += r;
|
|
headers[headers_len] = '\0';
|
|
if ((br = strstr(headers, "\015\012\015\012")) != (char *) 0 ||
|
|
(br = strstr(headers, "\012\012")) != (char *) 0)
|
|
break;
|
|
}
|
|
|
|
/* If there were no headers, bail. */
|
|
if (headers[0] == '\0')
|
|
return;
|
|
|
|
/* Figure out the status. Look for a Status: or Location: header;
|
|
** else if there's an HTTP header line, get it from there; else
|
|
** default to 200.
|
|
*/
|
|
status = 200;
|
|
if (strncmp(headers, "HTTP/", 5) == 0)
|
|
{
|
|
cp = headers;
|
|
cp += strcspn(cp, " \t");
|
|
status = atoi(cp);
|
|
}
|
|
if ((cp = strstr(headers, "Status:")) != (char *) 0 &&
|
|
cp < br && (cp == headers || *(cp - 1) == '\012'))
|
|
{
|
|
cp += 7;
|
|
cp += strspn(cp, " \t");
|
|
status = atoi(cp);
|
|
}
|
|
if ((cp = strstr(headers, "Location:")) != (char *) 0 &&
|
|
cp < br && (cp == headers || *(cp - 1) == '\012'))
|
|
status = 302;
|
|
|
|
/* Write the status line. */
|
|
switch (status)
|
|
{
|
|
case 200:
|
|
title = ok200title;
|
|
break;
|
|
case 302:
|
|
title = err302title;
|
|
break;
|
|
case 304:
|
|
title = err304title;
|
|
break;
|
|
case 400:
|
|
title = httpd_err400title;
|
|
break;
|
|
#ifdef AUTH_FILE
|
|
case 401:
|
|
title = err401title;
|
|
break;
|
|
#endif /* AUTH_FILE */
|
|
case 403:
|
|
title = err403title;
|
|
break;
|
|
case 404:
|
|
title = err404title;
|
|
break;
|
|
case 408:
|
|
title = httpd_err408title;
|
|
break;
|
|
case 500:
|
|
title = err500title;
|
|
break;
|
|
case 501:
|
|
title = err501title;
|
|
break;
|
|
case 503:
|
|
title = httpd_err503title;
|
|
break;
|
|
default:
|
|
title = "Something";
|
|
break;
|
|
}
|
|
(void) my_snprintf(buf, sizeof(buf), "HTTP/1.0 %d %s\015\012", status,
|
|
title);
|
|
(void) httpd_write_fully(hc->conn_fd, buf, strlen(buf));
|
|
|
|
/* Write the saved headers. */
|
|
(void) httpd_write_fully(hc->conn_fd, headers, headers_len);
|
|
|
|
/* Echo the rest of the output. */
|
|
for (;;)
|
|
{
|
|
r = read(rfd, buf, sizeof(buf));
|
|
if (r < 0 && (errno == EINTR || errno == EAGAIN))
|
|
{
|
|
sleep(1);
|
|
continue;
|
|
}
|
|
if (r <= 0)
|
|
break;
|
|
if (httpd_write_fully(hc->conn_fd, buf, r) != r)
|
|
break;
|
|
}
|
|
shutdown(hc->conn_fd, SHUT_WR);
|
|
}
|
|
|
|
|
|
/* CGI child process. */
|
|
static void cgi_child(httpd_conn * hc)
|
|
{
|
|
int r;
|
|
char **argp;
|
|
char **envp;
|
|
//char* binary;
|
|
//char* directory;
|
|
|
|
/* Unset close-on-exec flag for this socket. This actually shouldn't
|
|
** be necessary, according to POSIX a dup()'d file descriptor does
|
|
** *not* inherit the close-on-exec flag, its flag is always clear.
|
|
** However, Linux messes this up and does copy the flag to the
|
|
** dup()'d descriptor, so we have to clear it. This could be
|
|
** ifdeffed for Linux only.
|
|
*/
|
|
(void) fcntl(hc->conn_fd, F_SETFD, 0);
|
|
|
|
/* Close the syslog descriptor so that the CGI program can't
|
|
** mess with it. All other open descriptors should be either
|
|
** the listen socket(s), sockets from accept(), or the file-logging
|
|
** fd, and all of those are set to close-on-exec, so we don't
|
|
** have to close anything else.
|
|
*/
|
|
closelog();
|
|
|
|
/* If the socket happens to be using one of the stdin/stdout/stderr
|
|
** descriptors, move it to another descriptor so that the dup2 calls
|
|
** below don't screw things up. We arbitrarily pick fd 3 - if there
|
|
** was already something on it, we clobber it, but that doesn't matter
|
|
** since at this point the only fd of interest is the connection.
|
|
** All others will be closed on exec.
|
|
*/
|
|
if (hc->conn_fd == STDIN_FILENO || hc->conn_fd == STDOUT_FILENO
|
|
|| hc->conn_fd == STDERR_FILENO)
|
|
{
|
|
int newfd = dup2(hc->conn_fd, STDERR_FILENO + 1);
|
|
if (newfd >= 0)
|
|
hc->conn_fd = newfd;
|
|
/* If the dup2 fails, shrug. We'll just take our chances.
|
|
** Shouldn't happen though.
|
|
*/
|
|
}
|
|
|
|
/* Make the environment vector. */
|
|
envp = make_envp(hc);
|
|
|
|
/* Make the argument vector. */
|
|
argp = make_argp(hc);
|
|
|
|
/* Set up stdin. For POSTs we may have to set up a pipe from an
|
|
** interposer process, depending on if we've read some of the data
|
|
** into our buffer.
|
|
*/
|
|
if (hc->method == METHOD_POST && hc->read_idx > hc->checked_idx)
|
|
{
|
|
int p[2];
|
|
|
|
if (pipe(p) < 0)
|
|
{
|
|
syslog(LOG_ERR, "pipe - %m");
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
httpd_write_response(hc);
|
|
exit(1);
|
|
}
|
|
|
|
r = fork();
|
|
|
|
if (r < 0)
|
|
{
|
|
syslog(LOG_ERR, "fork - %m");
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
httpd_write_response(hc);
|
|
exit(1);
|
|
}
|
|
|
|
if (r == 0)
|
|
{
|
|
/* Interposer process. */
|
|
sub_process = 1;
|
|
(void) close(p[0]);
|
|
cgi_interpose_input(hc, p[1]);
|
|
exit(0);
|
|
}
|
|
|
|
/* Need to schedule a kill for process r; but in the main process! */
|
|
(void) close(p[1]);
|
|
if (p[0] != STDIN_FILENO)
|
|
{
|
|
(void) dup2(p[0], STDIN_FILENO);
|
|
(void) close(p[0]);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
/* Otherwise, the request socket is stdin. */
|
|
if (hc->conn_fd != STDIN_FILENO)
|
|
(void) dup2(hc->conn_fd, STDIN_FILENO);
|
|
}
|
|
|
|
/* Set up stdout/stderr. If we're doing CGI header parsing,
|
|
** we need an output interposer too.
|
|
*/
|
|
if (strncmp(argp[0], "nph-", 4) != 0 && hc->mime_flag)
|
|
{
|
|
int p[2];
|
|
|
|
if (pipe(p) < 0)
|
|
{
|
|
syslog(LOG_ERR, "pipe - %m");
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
httpd_write_response(hc);
|
|
exit(1);
|
|
}
|
|
r = fork();
|
|
if (r < 0)
|
|
{
|
|
syslog(LOG_ERR, "fork - %m");
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
httpd_write_response(hc);
|
|
exit(1);
|
|
}
|
|
if (r == 0)
|
|
{
|
|
/* Interposer process. */
|
|
sub_process = 1;
|
|
(void) close(p[1]);
|
|
cgi_interpose_output(hc, p[0]);
|
|
exit(0);
|
|
}
|
|
/* Need to schedule a kill for process r; but in the main process! */
|
|
(void) close(p[0]);
|
|
if (p[1] != STDOUT_FILENO)
|
|
(void) dup2(p[1], STDOUT_FILENO);
|
|
// BM: let stderr go to the IDE
|
|
//if (p[1] != STDERR_FILENO)
|
|
// (void) dup2(p[1], STDERR_FILENO);
|
|
if (p[1] != STDOUT_FILENO && p[1] != STDERR_FILENO)
|
|
(void) close(p[1]);
|
|
}
|
|
else
|
|
{
|
|
/* Otherwise, the request socket is stdout/stderr. */
|
|
if (hc->conn_fd != STDOUT_FILENO)
|
|
(void) dup2(hc->conn_fd, STDOUT_FILENO);
|
|
// BM: let stderr go to the IDE
|
|
// if (hc->conn_fd != STDERR_FILENO)
|
|
// (void) dup2(hc->conn_fd, STDERR_FILENO);
|
|
}
|
|
|
|
/* At this point we would like to set close-on-exec again for hc->conn_fd
|
|
** (see previous comments on Linux's broken behavior re: close-on-exec
|
|
** and dup.) Unfortunately there seems to be another Linux problem, or
|
|
** perhaps a different aspect of the same problem - if we do this
|
|
** close-on-exec in Linux, the socket stays open but stderr gets
|
|
** closed - the last fd duped from the socket. What a mess. So we'll
|
|
** just leave the socket as is, which under other OSs means an extra
|
|
** file descriptor gets passed to the child process. Since the child
|
|
** probably already has that file open via stdin stdout and/or stderr,
|
|
** this is not a problem.
|
|
*/
|
|
/* (void) fcntl( hc->conn_fd, F_SETFD, 1 ); */
|
|
|
|
#ifdef CGI_NICE
|
|
/* Set priority. */
|
|
(void)nice(CGI_NICE);
|
|
#endif /* CGI_NICE */
|
|
|
|
#if 0
|
|
/* Split the program into directory and binary, so we can chdir()
|
|
** to the program's own directory. This isn't in the CGI 1.1
|
|
** spec, but it's what other HTTP servers do.
|
|
*/
|
|
directory = strdup(hc->expnfilename);
|
|
if (directory == (char *) 0)
|
|
binary = hc->expnfilename; /* ignore errors */
|
|
else
|
|
{
|
|
binary = strrchr(directory, '/');
|
|
if (binary == (char *) 0)
|
|
binary = hc->expnfilename;
|
|
else
|
|
{
|
|
*binary++ = '\0';
|
|
(void) chdir(directory); /* ignore errors */
|
|
}
|
|
}
|
|
#endif
|
|
|
|
// Reset signal handlers
|
|
|
|
(void) signal(SIGTERM, SIG_DFL);
|
|
(void) signal(SIGINT, SIG_DFL);
|
|
(void) signal(SIGCHLD, SIG_DFL);
|
|
(void) signal(SIGPIPE, SIG_DFL);
|
|
(void) signal(SIGHUP, SIG_DFL);
|
|
(void) signal(SIGUSR1, SIG_DFL);
|
|
(void) signal(SIGUSR2, SIG_DFL);
|
|
(void) signal(SIGALRM, SIG_DFL);
|
|
|
|
#if 0
|
|
/* Run the program. */
|
|
(void) execve(binary, argp, envp);
|
|
|
|
/* Something went wrong. */
|
|
syslog(LOG_ERR, "execve %.80s - %m", hc->expnfilename);
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
httpd_write_response(hc);
|
|
exit(1);
|
|
#endif
|
|
|
|
environ = envp;
|
|
//fprintf(stderr, "%s\n", hc->encodedurl);
|
|
run_cgi();
|
|
|
|
}
|
|
|
|
static int cgi_start(httpd_conn *hc)
|
|
{
|
|
int r;
|
|
ClientData client_data;
|
|
|
|
++hc->hs->cgi_count;
|
|
httpd_clear_ndelay(hc->conn_fd);
|
|
r = fork();
|
|
if (r < 0)
|
|
{
|
|
syslog(LOG_ERR, "fork - %m");
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
|
|
if (r == 0)
|
|
{
|
|
/* Child process. */
|
|
sub_process = 1;
|
|
httpd_unlisten(hc->hs);
|
|
cgi_child(hc);
|
|
}
|
|
else
|
|
{
|
|
/* Parent process. */
|
|
syslog(LOG_INFO, "spawned CGI process %d for path '%.200s'", r, hc->expnfilename);
|
|
#ifdef CGI_TIMELIMIT
|
|
/* Schedule a kill for the child process, in case it runs too long */
|
|
if (hc->hs->cgi_timelimit)
|
|
{
|
|
client_data.i = r;
|
|
if (tmr_create
|
|
((struct timeval *) 0, cgi_kill, client_data,
|
|
hc->hs->cgi_timelimit * 1000L, 0) == (Timer *) 0)
|
|
{
|
|
syslog(LOG_CRIT, "tmr_create(cgi_kill child) failed");
|
|
exit(1);
|
|
}
|
|
}
|
|
#endif /* CGI_TIMELIMIT */
|
|
hc->status = 200;
|
|
hc->bytes_sent = CGI_BYTECOUNT;
|
|
hc->should_linger = 0;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int httpd_check_paused(httpd_conn *hc)
|
|
{
|
|
//syslog(LOG_INFO, "[%p] try again cgi script '%.200s'", hc, hc->expnfilename);
|
|
|
|
if (hc->hs->cgi_count >= 1)
|
|
{
|
|
//syslog(LOG_INFO, "[%p] postponed cgi script '%.200s'", hc, hc->expnfilename);
|
|
return 1;
|
|
}
|
|
|
|
return cgi_start(hc);
|
|
}
|
|
|
|
static int cgi(httpd_conn * hc)
|
|
{
|
|
if (hc->method == METHOD_GET || hc->method == METHOD_POST)
|
|
{
|
|
if (hc->hs->cgi_limit != 0 && hc->hs->cgi_count >= hc->hs->cgi_limit)
|
|
{
|
|
if (hc->hs->debug)
|
|
{
|
|
//syslog(LOG_INFO, "postponed cgi script '%.200s'", hc->expnfilename);
|
|
return 1;
|
|
}
|
|
else
|
|
{
|
|
httpd_send_err(hc, 503, httpd_err503title, "", httpd_err503form,
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
cgi_start(hc);
|
|
}
|
|
else
|
|
{
|
|
httpd_send_err(hc, 501, err501title, "", err501form, httpd_method_str(hc->method));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int really_start_request(httpd_conn * hc, struct timeval *nowP)
|
|
{
|
|
//static char *indexname;
|
|
//static size_t maxindexname = 0;
|
|
//static const char *index_names[] = { INDEX_NAMES };
|
|
//int i;
|
|
#ifdef AUTH_FILE
|
|
//static char *dirname;
|
|
//static size_t maxdirname = 0;
|
|
#endif /* AUTH_FILE */
|
|
//size_t expnlen, indxlen;
|
|
//char *cp;
|
|
//char *pi;
|
|
char *public_file = NULL;
|
|
int public_file_len = 0;
|
|
|
|
if (hc->method != METHOD_GET && hc->method != METHOD_HEAD &&
|
|
hc->method != METHOD_POST)
|
|
{
|
|
httpd_send_err(hc, 501, err501title, "", err501form, httpd_method_str(hc->method));
|
|
return -1;
|
|
}
|
|
|
|
//--------------------------------------------------------------
|
|
|
|
if (strlen(hc->expnfilename) == 0)
|
|
{
|
|
public_file = NULL;
|
|
}
|
|
else
|
|
{
|
|
public_file_len = strlen(hc->expnfilename) + strlen(PUBLIC_PREFIX);
|
|
public_file = alloca(public_file_len + 1);
|
|
strcpy(public_file, PUBLIC_PREFIX);
|
|
strcpy(&public_file[strlen(PUBLIC_PREFIX)], hc->expnfilename);
|
|
}
|
|
|
|
/* Stat the file. */
|
|
//if (stat(hc->expnfilename, &hc->sb) < 0)
|
|
/*{
|
|
httpd_send_err(hc, 404, err404title, "", err404form, hc->encodedurl);
|
|
//httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
return -1;
|
|
}*/
|
|
|
|
#if 0
|
|
/* Is it world-readable or world-executable? We check explicitly instead
|
|
** of just trying to open it, so that no one ever gets surprised by
|
|
** a file that's not set world-readable and yet somehow is
|
|
** readable by the HTTP server and therefore the *whole* world.
|
|
*/
|
|
if (!(hc->sb.st_mode & (S_IROTH | S_IXOTH)))
|
|
{
|
|
syslog(LOG_INFO,
|
|
"%.80s URL \"%.80s\" resolves to a non world-readable file",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' resolves to a file that is not world-readable.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
if (public_file && !GB.StatFile(public_file, &hc->sb, FALSE))
|
|
{
|
|
/* Is it a directory? */
|
|
if (hc->sb.type == GB_STAT_DIRECTORY)
|
|
{
|
|
httpd_send_err(hc, 404, err404title, "", err404form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
|
|
/* Fill in last_byte_index, if necessary. */
|
|
if (hc->got_range &&
|
|
(hc->last_byte_index == -1 || hc->last_byte_index >= hc->sb.size))
|
|
hc->last_byte_index = hc->sb.size - 1;
|
|
|
|
figure_mime(hc);
|
|
|
|
if (hc->method == METHOD_HEAD)
|
|
{
|
|
send_mime(hc, 200, ok200title, hc->encodings, "", hc->type, hc->sb.size, hc->sb.mtime);
|
|
}
|
|
else if (hc->if_modified_since != (time_t) - 1 &&
|
|
hc->if_modified_since >= hc->sb.mtime)
|
|
{
|
|
send_mime(hc, 304, err304title, hc->encodings, "", hc->type, (off_t) - 1, hc->sb.mtime);
|
|
}
|
|
else
|
|
{
|
|
//hc->file_address = mmc_map(hc->expnfilename, &(hc->sb), nowP);
|
|
//if (hc->file_address == (char *) 0)
|
|
|
|
//syslog(LOG_DEBUG, "%.*s", public_file_len, public_file);
|
|
|
|
if (GB.LoadFile(public_file, public_file_len, &hc->file_address, &hc->file_len))
|
|
{
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
send_mime(hc, 200, ok200title, hc->encodings, "", hc->type, hc->sb.size, hc->sb.mtime);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#if 0
|
|
/* If there's pathinfo, it's just a non-existent file. */
|
|
/*if (hc->pathinfo[0] != '\0')
|
|
{
|
|
httpd_send_err(hc, 404, err404title, "", err404form, hc->encodedurl);
|
|
return -1;
|
|
}*/
|
|
|
|
/* Special handling for directory URLs that don't end in a slash.
|
|
** We send back an explicit redirect with the slash, because
|
|
** otherwise many clients can't build relative URLs properly.
|
|
*/
|
|
if (strcmp(hc->origfilename, "") != 0 &&
|
|
strcmp(hc->origfilename, ".") != 0 &&
|
|
hc->origfilename[strlen(hc->origfilename) - 1] != '/')
|
|
{
|
|
send_dirredirect(hc);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
#if 0
|
|
/* Check for an index file. */
|
|
for (i = 0; i < sizeof(index_names) / sizeof(char *); ++i)
|
|
{
|
|
httpd_realloc_str(&indexname, &maxindexname,
|
|
expnlen + 1 + strlen(index_names[i]));
|
|
(void) strcpy(indexname, hc->expnfilename);
|
|
indxlen = strlen(indexname);
|
|
if (indxlen == 0 || indexname[indxlen - 1] != '/')
|
|
(void) strcat(indexname, "/");
|
|
if (strcmp(indexname, "./") == 0)
|
|
indexname[0] = '\0';
|
|
(void) strcat(indexname, index_names[i]);
|
|
if (stat(indexname, &hc->sb) >= 0)
|
|
goto got_one;
|
|
}
|
|
|
|
/* Nope, no index file, so it's an actual directory request. */
|
|
#ifdef GENERATE_INDEXES
|
|
/* Directories must be readable for indexing. */
|
|
if (!(hc->sb.st_mode & S_IROTH))
|
|
{
|
|
syslog(LOG_INFO,
|
|
"%.80s URL \"%.80s\" tried to index a directory with indexing disabled",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' resolves to a directory that has indexing disabled.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
#ifdef AUTH_FILE
|
|
/* Check authorization for this directory. */
|
|
if (auth_check(hc, hc->expnfilename) == -1)
|
|
return -1;
|
|
#endif /* AUTH_FILE */
|
|
/* Referer check. */
|
|
if (!check_referer(hc))
|
|
return -1;
|
|
/* Ok, generate an index. */
|
|
return ls(hc);
|
|
#else /* GENERATE_INDEXES */
|
|
syslog(LOG_INFO, "%.80s URL \"%.80s\" tried to index a directory",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' is a directory, and directory indexing is disabled on this server.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
#endif /* GENERATE_INDEXES */
|
|
|
|
got_one:;
|
|
/* Got an index file. Expand symlinks again. More pathinfo means
|
|
** something went wrong.
|
|
*/
|
|
cp =
|
|
expand_symlinks(indexname, &pi, hc->hs->no_symlink_check,
|
|
hc->tildemapped);
|
|
if (cp == (char *) 0 || pi[0] != '\0')
|
|
{
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
expnlen = strlen(cp);
|
|
httpd_realloc_str(&hc->expnfilename, &hc->maxexpnfilename, expnlen);
|
|
(void) strcpy(hc->expnfilename, cp);
|
|
|
|
/* Now, is the index version world-readable or world-executable? */
|
|
if (!(hc->sb.st_mode & (S_IROTH | S_IXOTH)))
|
|
{
|
|
syslog(LOG_INFO,
|
|
"%.80s URL \"%.80s\" resolves to a non-world-readable index file",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' resolves to an index file that is not world-readable.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
#ifdef AUTH_FILE
|
|
/* Check authorization for this directory. */
|
|
httpd_realloc_str(&dirname, &maxdirname, expnlen);
|
|
(void) strcpy(dirname, hc->expnfilename);
|
|
cp = strrchr(dirname, '/');
|
|
if (cp == (char *) 0)
|
|
(void) strcpy(dirname, ".");
|
|
else
|
|
*cp = '\0';
|
|
if (auth_check(hc, dirname) == -1)
|
|
return -1;
|
|
|
|
/* Check if the filename is the AUTH_FILE itself - that's verboten. */
|
|
if (expnlen == sizeof(AUTH_FILE) - 1)
|
|
{
|
|
if (strcmp(hc->expnfilename, AUTH_FILE) == 0)
|
|
{
|
|
syslog(LOG_NOTICE,
|
|
"%.80s URL \"%.80s\" tried to retrieve an auth file",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' is an authorization file, retrieving it is not permitted.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
}
|
|
else if (expnlen >= sizeof(AUTH_FILE) &&
|
|
strcmp(&(hc->expnfilename[expnlen - sizeof(AUTH_FILE) + 1]),
|
|
AUTH_FILE) == 0
|
|
&& hc->expnfilename[expnlen - sizeof(AUTH_FILE)] == '/')
|
|
{
|
|
syslog(LOG_NOTICE,
|
|
"%.80s URL \"%.80s\" tried to retrieve an auth file",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' is an authorization file, retrieving it is not permitted.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
#endif /* AUTH_FILE */
|
|
#endif
|
|
|
|
//--------------------------------------------------------------
|
|
|
|
/* Referer check. */
|
|
if (!check_referer(hc))
|
|
return -1;
|
|
|
|
/* Is it world-executable and in the CGI area? */
|
|
//if ( hc->hs->cgi_pattern != (char*) 0 && ( hc->sb.st_mode & S_IXOTH ) && match( hc->hs->cgi_pattern, hc->expnfilename ) )
|
|
return cgi(hc);
|
|
|
|
#if 0
|
|
/* Is it world-executable and in the CGI area? */
|
|
if (hc->hs->cgi_pattern != (char *) 0 &&
|
|
(hc->sb.st_mode & S_IXOTH) &&
|
|
match(hc->hs->cgi_pattern, hc->expnfilename))
|
|
return cgi(hc);
|
|
|
|
/* It's not CGI. If it's executable or there's pathinfo, someone's
|
|
** trying to either serve or run a non-CGI file as CGI. Either case
|
|
** is prohibited.
|
|
*/
|
|
if (hc->sb.st_mode & S_IXOTH)
|
|
{
|
|
syslog(LOG_NOTICE, "%.80s URL \"%.80s\" is executable but isn't CGI",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' resolves to a file which is marked executable but is not a CGI file; retrieving it is forbidden.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
if (hc->pathinfo[0] != '\0')
|
|
{
|
|
syslog(LOG_INFO, "%.80s URL \"%.80s\" has pathinfo but isn't CGI",
|
|
httpd_ntoa(&hc->client_addr), hc->encodedurl);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"The requested URL '%.80s' resolves to a file plus CGI-style pathinfo, but the file is not a valid CGI file.\n"),
|
|
hc->encodedurl);
|
|
return -1;
|
|
}
|
|
|
|
/* Fill in last_byte_index, if necessary. */
|
|
if (hc->got_range &&
|
|
(hc->last_byte_index == -1 || hc->last_byte_index >= hc->sb.size))
|
|
hc->last_byte_index = hc->sb.size - 1;
|
|
|
|
figure_mime(hc);
|
|
|
|
if (hc->method == METHOD_HEAD)
|
|
{
|
|
send_mime(hc, 200, ok200title, hc->encodings, "", hc->type,
|
|
hc->sb.size, hc->sb.mtime);
|
|
}
|
|
else if (hc->if_modified_since != (time_t) - 1 &&
|
|
hc->if_modified_since >= hc->sb.mtime)
|
|
{
|
|
send_mime(hc, 304, err304title, hc->encodings, "", hc->type, (off_t) - 1,
|
|
hc->sb.mtime);
|
|
}
|
|
else
|
|
{
|
|
hc->file_address = mmc_map(hc->expnfilename, &(hc->sb), nowP);
|
|
if (hc->file_address == (char *) 0)
|
|
{
|
|
httpd_send_err(hc, 500, err500title, "", err500form, hc->encodedurl);
|
|
return -1;
|
|
}
|
|
send_mime(hc, 200, ok200title, hc->encodings, "", hc->type,
|
|
hc->sb.size, hc->sb.mtime);
|
|
}
|
|
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
|
|
int httpd_start_request(httpd_conn * hc, struct timeval *nowP)
|
|
{
|
|
int r;
|
|
|
|
/* Really start the request. */
|
|
r = really_start_request(hc, nowP);
|
|
|
|
/* And return the status. */
|
|
return r;
|
|
}
|
|
|
|
|
|
static void make_log_entry(httpd_conn * hc, struct timeval *nowP)
|
|
{
|
|
char *ru;
|
|
char url[305];
|
|
char bytes[40];
|
|
|
|
if (hc->hs->no_log)
|
|
return;
|
|
|
|
/* This is straight CERN Combined Log Format - the only tweak
|
|
** being that if we're using syslog() we leave out the date, because
|
|
** syslogd puts it in. The included syslogtocern script turns the
|
|
** results into true CERN format.
|
|
*/
|
|
|
|
/* Format remote user. */
|
|
if (hc->remoteuser[0] != '\0')
|
|
ru = hc->remoteuser;
|
|
else
|
|
ru = "-";
|
|
/* If we're vhosting, prepend the hostname to the url. This is
|
|
** a little weird, perhaps writing separate log files for
|
|
** each vhost would make more sense.
|
|
*/
|
|
if (hc->hs->vhost && !hc->tildemapped)
|
|
(void) my_snprintf(url, sizeof(url),
|
|
"/%.100s%.200s",
|
|
hc->hostname ==
|
|
(char *) 0 ? hc->hs->server_hostname : hc->hostname,
|
|
hc->encodedurl);
|
|
else
|
|
(void) my_snprintf(url, sizeof(url), "%.200s", hc->encodedurl);
|
|
/* Format the bytes. */
|
|
if (hc->bytes_sent >= 0)
|
|
(void) my_snprintf(bytes, sizeof(bytes), "%lld",
|
|
(int64_t) hc->bytes_sent);
|
|
else
|
|
(void) strcpy(bytes, "-");
|
|
|
|
/* Logfile or syslog? */
|
|
if (hc->hs->logfp != (FILE *) 0)
|
|
{
|
|
time_t now;
|
|
struct tm *t;
|
|
const char *cernfmt_nozone = "%d/%b/%Y:%H:%M:%S";
|
|
char date_nozone[100];
|
|
int zone;
|
|
char sign;
|
|
char date[100];
|
|
|
|
/* Get the current time, if necessary. */
|
|
if (nowP != (struct timeval *) 0)
|
|
now = nowP->tv_sec;
|
|
else
|
|
now = time((time_t *) 0);
|
|
/* Format the time, forcing a numeric timezone (some log analyzers
|
|
** are stoooopid about this).
|
|
*/
|
|
t = localtime(&now);
|
|
(void) strftime(date_nozone, sizeof(date_nozone), cernfmt_nozone, t);
|
|
#ifdef HAVE_TM_GMTOFF
|
|
zone = t->tm_gmtoff / 60L;
|
|
#else
|
|
zone = -timezone / 60L;
|
|
/* Probably have to add something about daylight time here. */
|
|
#endif
|
|
if (zone >= 0)
|
|
sign = '+';
|
|
else
|
|
{
|
|
sign = '-';
|
|
zone = -zone;
|
|
}
|
|
zone = (zone / 60) * 100 + zone % 60;
|
|
(void) my_snprintf(date, sizeof(date),
|
|
"%s %c%04d", date_nozone, sign, zone);
|
|
/* And write the log entry. */
|
|
(void) fprintf(hc->hs->logfp,
|
|
"%.80s - %.80s [%s] \"%.80s %.300s %.80s\" %d %s \"%.200s\" \"%.200s\"\n",
|
|
httpd_ntoa(&hc->client_addr), ru, date,
|
|
httpd_method_str(hc->method), url, hc->protocol,
|
|
hc->status, bytes, hc->referer, hc->useragent);
|
|
#ifdef FLUSH_LOG_EVERY_TIME
|
|
(void) fflush(hc->hs->logfp);
|
|
#endif
|
|
}
|
|
else
|
|
syslog(LOG_INFO,
|
|
"%.80s - %.80s \"%.80s %.200s %.80s\" %d %s \"%.200s\" \"%.200s\"",
|
|
httpd_ntoa(&hc->client_addr), ru,
|
|
httpd_method_str(hc->method), url, hc->protocol,
|
|
hc->status, bytes, hc->referer, hc->useragent);
|
|
}
|
|
|
|
|
|
/* Returns 1 if ok to serve the url, 0 if not. */
|
|
static int check_referer(httpd_conn * hc)
|
|
{
|
|
int r;
|
|
char *cp;
|
|
|
|
/* Are we doing referer checking at all? */
|
|
if (hc->hs->url_pattern == (char *) 0)
|
|
return 1;
|
|
|
|
r = really_check_referer(hc);
|
|
|
|
if (!r)
|
|
{
|
|
if (hc->hs->vhost && hc->hostname != (char *) 0)
|
|
cp = hc->hostname;
|
|
else
|
|
cp = hc->hs->server_hostname;
|
|
if (cp == (char *) 0)
|
|
cp = "";
|
|
syslog(LOG_INFO, "%.80s non-local referer \"%.80s%.80s\" \"%.80s\"",
|
|
httpd_ntoa(&hc->client_addr), cp, hc->encodedurl, hc->referer);
|
|
httpd_send_err(hc, 403, err403title, "",
|
|
ERROR_FORM(err403form,
|
|
"You must supply a local referer to get URL '%.80s' from this server.\n"),
|
|
hc->encodedurl);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
|
|
/* Returns 1 if ok to serve the url, 0 if not. */
|
|
static int really_check_referer(httpd_conn * hc)
|
|
{
|
|
httpd_server *hs;
|
|
char *cp1;
|
|
char *cp2;
|
|
char *cp3;
|
|
static char *refhost = (char *) 0;
|
|
static size_t refhost_size = 0;
|
|
char *lp;
|
|
|
|
hs = hc->hs;
|
|
|
|
/* Check for an empty referer. */
|
|
if (hc->referer == (char *) 0 || hc->referer[0] == '\0' ||
|
|
(cp1 = strstr(hc->referer, "//")) == (char *) 0)
|
|
{
|
|
/* Disallow if we require a referer and the url matches. */
|
|
if (hs->no_empty_referers && match(hs->url_pattern, hc->origfilename))
|
|
return 0;
|
|
/* Otherwise ok. */
|
|
return 1;
|
|
}
|
|
|
|
/* Extract referer host. */
|
|
cp1 += 2;
|
|
for (cp2 = cp1; *cp2 != '/' && *cp2 != ':' && *cp2 != '\0'; ++cp2)
|
|
continue;
|
|
httpd_realloc_str(&refhost, &refhost_size, cp2 - cp1);
|
|
for (cp3 = refhost; cp1 < cp2; ++cp1, ++cp3)
|
|
if (isupper(*cp1))
|
|
*cp3 = tolower(*cp1);
|
|
else
|
|
*cp3 = *cp1;
|
|
*cp3 = '\0';
|
|
|
|
/* Local pattern? */
|
|
if (hs->local_pattern != (char *) 0)
|
|
lp = hs->local_pattern;
|
|
else
|
|
{
|
|
/* No local pattern. What's our hostname? */
|
|
if (!hs->vhost)
|
|
{
|
|
/* Not vhosting, use the server name. */
|
|
lp = hs->server_hostname;
|
|
if (lp == (char *) 0)
|
|
/* Couldn't figure out local hostname - give up. */
|
|
return 1;
|
|
}
|
|
else
|
|
{
|
|
/* We are vhosting, use the hostname on this connection. */
|
|
lp = hc->hostname;
|
|
if (lp == (char *) 0)
|
|
/* Oops, no hostname. Maybe it's an old browser that
|
|
** doesn't send a Host: header. We could figure out
|
|
** the default hostname for this IP address, but it's
|
|
** not worth it for the few requests like this.
|
|
*/
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
/* If the referer host doesn't match the local host pattern, and
|
|
** the filename does match the url pattern, it's an illegal reference.
|
|
*/
|
|
if (!match(lp, refhost) && match(hs->url_pattern, hc->origfilename))
|
|
return 0;
|
|
/* Otherwise ok. */
|
|
return 1;
|
|
}
|
|
|
|
|
|
char *httpd_ntoa(httpd_sockaddr * saP)
|
|
{
|
|
#ifdef USE_IPV6
|
|
static char str[200];
|
|
|
|
if (getnameinfo
|
|
(&saP->sa, sockaddr_len(saP), str, sizeof(str), 0, 0,
|
|
NI_NUMERICHOST) != 0)
|
|
{
|
|
str[0] = '?';
|
|
str[1] = '\0';
|
|
}
|
|
else if (IN6_IS_ADDR_V4MAPPED(&saP->sa_in6.sin6_addr)
|
|
&& strncmp(str, "::ffff:", 7) == 0)
|
|
/* Elide IPv6ish prefix for IPv4 addresses. */
|
|
(void) strcpy(str, &str[7]);
|
|
|
|
return str;
|
|
|
|
#else /* USE_IPV6 */
|
|
|
|
return inet_ntoa(saP->sa_in.sin_addr);
|
|
|
|
#endif /* USE_IPV6 */
|
|
}
|
|
|
|
|
|
static int sockaddr_check(httpd_sockaddr * saP)
|
|
{
|
|
switch (saP->sa.sa_family)
|
|
{
|
|
case AF_INET:
|
|
return 1;
|
|
#ifdef USE_IPV6
|
|
case AF_INET6:
|
|
return 1;
|
|
#endif /* USE_IPV6 */
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
static size_t sockaddr_len(httpd_sockaddr * saP)
|
|
{
|
|
switch (saP->sa.sa_family)
|
|
{
|
|
case AF_INET:
|
|
return sizeof(struct sockaddr_in);
|
|
#ifdef USE_IPV6
|
|
case AF_INET6:
|
|
return sizeof(struct sockaddr_in6);
|
|
#endif /* USE_IPV6 */
|
|
default:
|
|
return 0; /* shouldn't happen */
|
|
}
|
|
}
|
|
|
|
|
|
/* Some systems don't have snprintf(), so we make our own that uses
|
|
** either vsnprintf() or vsprintf(). If your system doesn't have
|
|
** vsnprintf(), it is probably vulnerable to buffer overruns.
|
|
** Upgrade!
|
|
*/
|
|
static int my_snprintf(char *str, size_t size, const char *format, ...)
|
|
{
|
|
va_list ap;
|
|
int r;
|
|
|
|
va_start(ap, format);
|
|
#ifdef HAVE_VSNPRINTF
|
|
r = vsnprintf(str, size, format, ap);
|
|
#else /* HAVE_VSNPRINTF */
|
|
r = vsprintf(str, format, ap);
|
|
#endif /* HAVE_VSNPRINTF */
|
|
va_end(ap);
|
|
return r;
|
|
}
|
|
|
|
|
|
#ifndef HAVE_ATOLL
|
|
static long long atoll(const char *str)
|
|
{
|
|
long long value;
|
|
long long sign;
|
|
|
|
while (isspace(*str))
|
|
++str;
|
|
switch (*str)
|
|
{
|
|
case '-':
|
|
sign = -1;
|
|
++str;
|
|
break;
|
|
case '+':
|
|
sign = 1;
|
|
++str;
|
|
break;
|
|
default:
|
|
sign = 1;
|
|
break;
|
|
}
|
|
value = 0;
|
|
while (isdigit(*str))
|
|
{
|
|
value = value * 10 + (*str - '0');
|
|
++str;
|
|
}
|
|
return sign * value;
|
|
}
|
|
#endif /* HAVE_ATOLL */
|
|
|
|
|
|
/* Read the requested buffer completely, accounting for interruptions. */
|
|
int httpd_read_fully(int fd, void *buf, size_t nbytes)
|
|
{
|
|
int nread;
|
|
|
|
nread = 0;
|
|
while (nread < nbytes)
|
|
{
|
|
int r;
|
|
|
|
r = read(fd, (char *) buf + nread, nbytes - nread);
|
|
if (r < 0 && (errno == EINTR || errno == EAGAIN))
|
|
{
|
|
sleep(1);
|
|
continue;
|
|
}
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
break;
|
|
nread += r;
|
|
}
|
|
|
|
return nread;
|
|
}
|
|
|
|
|
|
/* Write the requested buffer completely, accounting for interruptions. */
|
|
int httpd_write_fully(int fd, const void *buf, size_t nbytes)
|
|
{
|
|
int nwritten;
|
|
|
|
nwritten = 0;
|
|
while (nwritten < nbytes)
|
|
{
|
|
int r;
|
|
|
|
r = write(fd, (char *) buf + nwritten, nbytes - nwritten);
|
|
if (r < 0 && (errno == EINTR || errno == EAGAIN))
|
|
{
|
|
sleep(1);
|
|
continue;
|
|
}
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
break;
|
|
nwritten += r;
|
|
}
|
|
|
|
return nwritten;
|
|
}
|
|
|
|
|
|
/* Generate debugging statistics syslog message. */
|
|
void httpd_logstats(long secs)
|
|
{
|
|
if (str_alloc_count > 0)
|
|
syslog(LOG_INFO,
|
|
" libhttpd - %d strings allocated, %lu bytes (%g bytes/str)",
|
|
str_alloc_count, (unsigned long) str_alloc_size,
|
|
(float) str_alloc_size / str_alloc_count);
|
|
}
|