2014-01-31 07:32:41 +00:00
|
|
|
/*
|
|
|
|
Serval DNA HTTP external interface
|
|
|
|
Copyright (C) 2014 Serval Project Inc.
|
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU General Public License
|
|
|
|
as published by the Free Software Foundation; either version 2
|
|
|
|
of the License, or (at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
2014-05-23 08:19:00 +00:00
|
|
|
#include <sys/ioctl.h>
|
2014-01-31 07:32:41 +00:00
|
|
|
#include "serval.h"
|
2014-02-03 11:10:05 +00:00
|
|
|
#include "httpd.h"
|
2014-05-23 08:19:00 +00:00
|
|
|
#include "conf.h"
|
2014-01-31 07:32:41 +00:00
|
|
|
#include "overlay_address.h"
|
|
|
|
#include "overlay_interface.h"
|
2014-05-23 08:19:00 +00:00
|
|
|
#include "mem.h"
|
|
|
|
#include "net.h"
|
2014-08-25 04:54:00 +00:00
|
|
|
#include "server.h"
|
2014-01-31 07:32:41 +00:00
|
|
|
|
|
|
|
#define RHIZOME_SERVER_MAX_LIVE_REQUESTS 32
|
|
|
|
|
|
|
|
static HTTP_HANDLER root_page;
|
|
|
|
static HTTP_HANDLER fav_icon_header;
|
|
|
|
static HTTP_HANDLER interface_page;
|
|
|
|
static HTTP_HANDLER neighbour_page;
|
2014-11-24 06:24:35 +00:00
|
|
|
static HTTP_HANDLER static_page;
|
2014-01-31 07:32:41 +00:00
|
|
|
|
|
|
|
HTTP_HANDLER restful_rhizome_bundlelist_json;
|
|
|
|
HTTP_HANDLER restful_rhizome_newsince;
|
|
|
|
HTTP_HANDLER restful_rhizome_insert;
|
|
|
|
HTTP_HANDLER restful_rhizome_;
|
|
|
|
HTTP_HANDLER restful_meshms_;
|
2014-07-23 08:01:47 +00:00
|
|
|
HTTP_HANDLER restful_keyring_;
|
2014-01-31 07:32:41 +00:00
|
|
|
|
|
|
|
HTTP_HANDLER rhizome_status_page;
|
|
|
|
HTTP_HANDLER rhizome_file_page;
|
|
|
|
HTTP_HANDLER manifest_by_prefix_page;
|
|
|
|
|
|
|
|
HTTP_HANDLER rhizome_direct_import;
|
|
|
|
HTTP_HANDLER rhizome_direct_enquiry;
|
|
|
|
HTTP_HANDLER rhizome_direct_dispatch;
|
|
|
|
|
|
|
|
struct http_handler {
|
|
|
|
const char *path;
|
|
|
|
HTTP_HANDLER *parser;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct http_handler paths[]={
|
|
|
|
{"/restful/rhizome/bundlelist.json", restful_rhizome_bundlelist_json},
|
|
|
|
{"/restful/rhizome/newsince/", restful_rhizome_newsince},
|
|
|
|
{"/restful/rhizome/insert", restful_rhizome_insert},
|
|
|
|
{"/restful/rhizome/", restful_rhizome_},
|
|
|
|
{"/restful/meshms/", restful_meshms_},
|
2014-07-23 08:01:47 +00:00
|
|
|
{"/restful/keyring/", restful_keyring_},
|
2014-01-31 07:32:41 +00:00
|
|
|
{"/rhizome/status", rhizome_status_page},
|
|
|
|
{"/rhizome/file/", rhizome_file_page},
|
|
|
|
{"/rhizome/import", rhizome_direct_import},
|
|
|
|
{"/rhizome/enquiry", rhizome_direct_enquiry},
|
|
|
|
{"/rhizome/manifestbyprefix/", manifest_by_prefix_page},
|
|
|
|
{"/rhizome/", rhizome_direct_dispatch},
|
2014-11-24 06:24:35 +00:00
|
|
|
{"/static/", static_page},
|
2014-01-31 07:32:41 +00:00
|
|
|
{"/interface/", interface_page},
|
|
|
|
{"/neighbour/", neighbour_page},
|
|
|
|
{"/favicon.ico", fav_icon_header},
|
|
|
|
{"/", root_page},
|
|
|
|
};
|
|
|
|
|
|
|
|
static int httpd_dispatch(struct http_request *hr)
|
|
|
|
{
|
|
|
|
httpd_request *r = (httpd_request *) hr;
|
|
|
|
INFOF("HTTP SERVER, %s %s", r->http.verb, r->http.path);
|
|
|
|
r->http.response.content_generator = NULL;
|
|
|
|
unsigned i;
|
|
|
|
for (i = 0; i < NELS(paths); ++i) {
|
|
|
|
const char *remainder;
|
|
|
|
if (str_startswith(r->http.path, paths[i].path, &remainder)){
|
|
|
|
int result = paths[i].parser(r, remainder);
|
|
|
|
if (result == -1 || (result >= 200 && result < 600))
|
|
|
|
return result;
|
|
|
|
if (result == 1)
|
|
|
|
return 0;
|
|
|
|
if (result)
|
|
|
|
return WHYF("dispatch function for %s returned invalid result %d", paths[i].path, result);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 404;
|
|
|
|
}
|
|
|
|
|
|
|
|
void httpd_server_poll(struct sched_ent *);
|
|
|
|
struct sched_ent server_alarm;
|
|
|
|
struct profile_total server_stats = {
|
|
|
|
.name = "httpd_server_poll",
|
|
|
|
};
|
|
|
|
|
|
|
|
uint16_t httpd_server_port = 0;
|
|
|
|
unsigned int httpd_request_count = 0;
|
|
|
|
|
|
|
|
static int httpd_server_socket = -1;
|
|
|
|
static time_ms_t httpd_server_last_start_attempt = -1;
|
|
|
|
|
|
|
|
// Format icon data using:
|
|
|
|
// od -vt u1 ~/Downloads/favicon.ico | cut -c9- | sed 's/ */,/g'
|
|
|
|
unsigned char favicon_bytes[]={
|
|
|
|
0,0,1,0,1,0,16,16,16,0,0,0,0,0,40,1
|
|
|
|
,0,0,22,0,0,0,40,0,0,0,16,0,0,0,32,0
|
|
|
|
,0,0,1,0,4,0,0,0,0,0,128,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,16,0,0,0,0,0,0,0,104,158
|
|
|
|
,168,0,163,233,247,0,104,161,118,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,17,17
|
|
|
|
,17,17,17,18,34,17,17,18,34,17,17,18,34,17,17,2
|
|
|
|
,34,17,17,18,34,17,16,18,34,1,17,17,1,17,1,17
|
|
|
|
,1,16,1,16,17,17,17,17,1,17,16,16,17,17,17,17
|
|
|
|
,1,17,18,34,17,17,17,16,17,17,2,34,17,17,17,16
|
|
|
|
,17,16,18,34,17,17,17,16,17,1,17,1,17,17,17,18
|
|
|
|
,34,17,17,16,17,17,17,18,34,17,17,18,34,17,17,18
|
|
|
|
,34,17,17,18,34,17,17,16,17,17,17,18,34,17,17,16
|
|
|
|
,17,17,17,17,17,0,17,1,17,17,17,17,17,17,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0};
|
|
|
|
int favicon_len=318;
|
|
|
|
|
|
|
|
int is_httpd_server_running()
|
|
|
|
{
|
|
|
|
return httpd_server_socket != -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Start the Rhizome HTTP server by creating a socket, binding it to an available port, and
|
|
|
|
marking it as passive. If called repeatedly and frequently, this function will only try to start
|
|
|
|
the server after a certain time has elapsed since the last attempt.
|
|
|
|
Return -1 if an error occurs (message logged).
|
|
|
|
Return 0 if the server was started.
|
|
|
|
Return 1 if the server is already started successfully.
|
|
|
|
Return 2 if the server was not started because it is too soon since last failed attempt.
|
|
|
|
*/
|
|
|
|
int httpd_server_start(uint16_t port_low, uint16_t port_high)
|
|
|
|
{
|
|
|
|
if (httpd_server_socket != -1)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* Only try to start http server every five seconds. */
|
|
|
|
time_ms_t now = gettime_ms();
|
|
|
|
if (now < httpd_server_last_start_attempt + 5000)
|
|
|
|
return 2;
|
|
|
|
httpd_server_last_start_attempt = now;
|
|
|
|
if (config.debug.httpd)
|
|
|
|
DEBUGF("Starting HTTP server");
|
|
|
|
|
|
|
|
uint16_t port;
|
|
|
|
for (port = port_low; port <= port_high; ++port) {
|
|
|
|
/* Create a new socket, reusable and non-blocking. */
|
|
|
|
if (httpd_server_socket == -1) {
|
|
|
|
httpd_server_socket = socket(AF_INET,SOCK_STREAM,0);
|
|
|
|
if (httpd_server_socket == -1) {
|
|
|
|
WHY_perror("socket");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
int on=1;
|
|
|
|
if (setsockopt(httpd_server_socket, SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) == -1) {
|
|
|
|
WHY_perror("setsockopt(REUSEADDR)");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
if (ioctl(httpd_server_socket, FIONBIO, (char *)&on) == -1) {
|
|
|
|
WHY_perror("ioctl(FIONBIO)");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Bind it to the next port we want to try. */
|
|
|
|
struct sockaddr_in address;
|
|
|
|
bzero((char *) &address, sizeof(address));
|
|
|
|
address.sin_family = AF_INET;
|
|
|
|
address.sin_addr.s_addr = INADDR_ANY;
|
|
|
|
address.sin_port = htons(port);
|
|
|
|
if (bind(httpd_server_socket, (struct sockaddr *) &address, sizeof(address)) == -1) {
|
|
|
|
if (errno != EADDRINUSE) {
|
|
|
|
WHY_perror("bind");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* We bound to a port. The battle is half won. Now we have to successfully listen on that
|
|
|
|
port, which could also fail with EADDRINUSE, in which case we have to scrap the socket and
|
|
|
|
create a new one, because once bound, a socket stays bound.
|
|
|
|
*/
|
|
|
|
if (listen(httpd_server_socket, 20) != -1)
|
|
|
|
goto success;
|
|
|
|
if (errno != EADDRINUSE) {
|
|
|
|
WHY_perror("listen");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
close(httpd_server_socket);
|
|
|
|
httpd_server_socket = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
WHYF("No ports available in range %u to %u", HTTPD_PORT, HTTPD_PORT_MAX);
|
|
|
|
error:
|
|
|
|
if (httpd_server_socket != -1) {
|
|
|
|
close(httpd_server_socket);
|
|
|
|
httpd_server_socket = -1;
|
|
|
|
}
|
|
|
|
return WHY("Failed to start HTTP server");
|
|
|
|
|
|
|
|
success:
|
2014-02-25 02:12:36 +00:00
|
|
|
server_write_proc_state("http_port", "%d", port);
|
2014-01-31 07:32:41 +00:00
|
|
|
INFOF("HTTP SERVER START port=%"PRIu16" fd=%d services=RESTful%s%s",
|
|
|
|
port,
|
|
|
|
httpd_server_socket,
|
|
|
|
config.rhizome.http.enable ? ",Rhizome" : "",
|
|
|
|
config.rhizome.api.addfile.uri_path[0] ? ",RhizomeDirect" : ""
|
|
|
|
);
|
|
|
|
httpd_server_port = port;
|
|
|
|
/* Add Rhizome HTTPd server to list of file descriptors to watch */
|
|
|
|
server_alarm.function = httpd_server_poll;
|
|
|
|
server_alarm.stats = &server_stats;
|
|
|
|
server_alarm.poll.fd = httpd_server_socket;
|
|
|
|
server_alarm.poll.events = POLLIN;
|
|
|
|
watch(&server_alarm);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void httpd_server_finalise_http_request(struct http_request *hr)
|
|
|
|
{
|
|
|
|
httpd_request *r = (httpd_request *) hr;
|
|
|
|
if (r->manifest) {
|
|
|
|
rhizome_manifest_free(r->manifest);
|
|
|
|
r->manifest = NULL;
|
|
|
|
}
|
|
|
|
if (r->finalise_union) {
|
|
|
|
r->finalise_union(r);
|
|
|
|
r->finalise_union = NULL;
|
|
|
|
}
|
|
|
|
if (httpd_request_count)
|
|
|
|
--httpd_request_count;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int httpd_dispatch(struct http_request *);
|
|
|
|
|
|
|
|
static unsigned int http_request_uuid_counter = 0;
|
|
|
|
|
|
|
|
void httpd_server_poll(struct sched_ent *alarm)
|
|
|
|
{
|
|
|
|
if (alarm->poll.revents & (POLLIN | POLLOUT)) {
|
|
|
|
struct sockaddr addr;
|
|
|
|
unsigned int addr_len = sizeof addr;
|
|
|
|
int sock;
|
|
|
|
if ((sock = accept(httpd_server_socket, &addr, &addr_len)) == -1) {
|
|
|
|
if (errno && errno != EAGAIN)
|
|
|
|
WARN_perror("accept");
|
|
|
|
} else {
|
|
|
|
struct sockaddr_in *peerip=NULL;
|
|
|
|
if (addr.sa_family == AF_INET) {
|
|
|
|
peerip = (struct sockaddr_in *)&addr; // network order
|
|
|
|
INFOF("RHIZOME HTTP SERVER, ACCEPT addrlen=%u family=%u port=%u addr=%u.%u.%u.%u",
|
|
|
|
addr_len, peerip->sin_family, peerip->sin_port,
|
|
|
|
((unsigned char*)&peerip->sin_addr.s_addr)[0],
|
|
|
|
((unsigned char*)&peerip->sin_addr.s_addr)[1],
|
|
|
|
((unsigned char*)&peerip->sin_addr.s_addr)[2],
|
|
|
|
((unsigned char*)&peerip->sin_addr.s_addr)[3]
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
INFOF("RHIZOME HTTP SERVER, ACCEPT addrlen=%u family=%u data=%s",
|
|
|
|
addr_len, addr.sa_family, alloca_tohex((unsigned char *)addr.sa_data, sizeof addr.sa_data)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
httpd_request *request = emalloc_zero(sizeof(httpd_request));
|
|
|
|
if (request == NULL) {
|
|
|
|
WHY("Cannot respond to HTTP request, out of memory");
|
|
|
|
close(sock);
|
|
|
|
} else {
|
|
|
|
++httpd_request_count;
|
|
|
|
request->uuid = http_request_uuid_counter++;
|
2014-07-02 07:46:19 +00:00
|
|
|
request->payload_status = INVALID_RHIZOME_PAYLOAD_STATUS;
|
|
|
|
request->bundle_status = INVALID_RHIZOME_BUNDLE_STATUS;
|
2014-01-31 07:32:41 +00:00
|
|
|
if (peerip)
|
|
|
|
request->http.client_sockaddr_in = *peerip;
|
|
|
|
request->http.handle_headers = httpd_dispatch;
|
|
|
|
request->http.debug_flag = &config.debug.httpd;
|
|
|
|
request->http.disable_tx_flag = &config.debug.nohttptx;
|
|
|
|
request->http.finalise = httpd_server_finalise_http_request;
|
|
|
|
request->http.free = free;
|
|
|
|
request->http.idle_timeout = RHIZOME_IDLE_TIMEOUT;
|
|
|
|
http_request_init(&request->http, sock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (alarm->poll.revents & (POLLHUP | POLLERR)) {
|
|
|
|
INFO("Error on tcp listen socket");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int is_http_header_complete(const char *buf, size_t len, size_t read_since_last_call)
|
|
|
|
{
|
|
|
|
IN();
|
|
|
|
const char *bufend = buf + len;
|
|
|
|
const char *p = buf;
|
|
|
|
size_t tail = read_since_last_call + 4;
|
|
|
|
if (tail < len)
|
|
|
|
p = bufend - tail;
|
|
|
|
int count = 0;
|
|
|
|
for (; p != bufend; ++p) {
|
|
|
|
switch (*p) {
|
|
|
|
case '\n':
|
|
|
|
if (++count==2)
|
|
|
|
RETURN(p - buf);
|
|
|
|
case '\r': // ignore CR
|
|
|
|
case '\0': // ignore NUL (telnet inserts them)
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
count = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RETURN(0);
|
|
|
|
OUT();
|
|
|
|
}
|
|
|
|
|
2014-02-03 12:35:15 +00:00
|
|
|
static int is_from_loopback(const struct http_request *r)
|
|
|
|
{
|
|
|
|
return r->client_sockaddr_in.sin_family == AF_INET
|
|
|
|
&& ((unsigned char*)&r->client_sockaddr_in.sin_addr.s_addr)[0] == IN_LOOPBACKNET;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return 1 if the given authorization credentials are acceptable.
|
|
|
|
* Return 0 if not.
|
|
|
|
*/
|
2014-06-26 07:06:25 +00:00
|
|
|
static int is_authorized_restful(const struct http_client_authorization *auth)
|
2014-02-03 12:35:15 +00:00
|
|
|
{
|
|
|
|
if (auth->scheme != BASIC)
|
|
|
|
return 0;
|
|
|
|
unsigned i;
|
2014-06-26 06:55:19 +00:00
|
|
|
for (i = 0; i != config.api.restful.users.ac; ++i) {
|
|
|
|
if ( strcmp(config.api.restful.users.av[i].key, auth->credentials.basic.user) == 0
|
|
|
|
&& strcmp(config.api.restful.users.av[i].value.password, auth->credentials.basic.password) == 0
|
2014-02-03 12:35:15 +00:00
|
|
|
)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-06-26 07:06:25 +00:00
|
|
|
int authorize_restful(struct http_request *r)
|
2014-02-03 12:35:15 +00:00
|
|
|
{
|
|
|
|
if (!is_from_loopback(r))
|
|
|
|
return 403;
|
2014-07-28 03:24:57 +00:00
|
|
|
if (r->request_header.origin){
|
|
|
|
const char *remainder;
|
|
|
|
if (strcasecmp(r->request_header.origin, "null")==0
|
|
|
|
|| (strcase_startswith(r->request_header.origin, "http://localhost", &remainder)
|
|
|
|
&& (*remainder==':' || *remainder=='\0'))
|
|
|
|
|| (strcase_startswith(r->request_header.origin, "http://127.0.0.1", &remainder)
|
|
|
|
&& (*remainder==':' || *remainder=='\0'))
|
2014-09-12 05:59:01 +00:00
|
|
|
|| (strcase_startswith(r->request_header.origin, "file://", &remainder))
|
2014-07-28 03:24:57 +00:00
|
|
|
){
|
|
|
|
strncpy(r->response.header.allow_origin,r->request_header.origin, sizeof r->response.header.allow_origin);
|
|
|
|
r->response.header.allow_methods="GET, POST, OPTIONS";
|
|
|
|
r->response.header.allow_headers="Authorization";
|
|
|
|
}else
|
|
|
|
return 403;
|
|
|
|
}
|
|
|
|
if (r->verb == HTTP_VERB_OPTIONS){
|
|
|
|
http_request_simple_response(r, 200, NULL);
|
|
|
|
return 200;
|
|
|
|
}
|
2014-06-26 07:06:25 +00:00
|
|
|
if (!is_authorized_restful(&r->request_header.authorization)) {
|
2014-02-03 12:35:15 +00:00
|
|
|
r->response.header.www_authenticate.scheme = BASIC;
|
2014-06-26 07:06:25 +00:00
|
|
|
r->response.header.www_authenticate.realm = "Serval RESTful API";
|
2014-02-03 12:35:15 +00:00
|
|
|
return 401;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-02-05 03:58:15 +00:00
|
|
|
int accumulate_text(httpd_request *r, const char *partname, char *textbuf, size_t textsiz, size_t *textlenp, const char *buf, size_t len)
|
|
|
|
{
|
|
|
|
if (len) {
|
|
|
|
size_t newlen = *textlenp + len;
|
|
|
|
if (newlen > textsiz) {
|
|
|
|
if (config.debug.httpd)
|
|
|
|
DEBUGF("Form part \"%s\" too long, %zu bytes overflows maximum %zu by %zu",
|
|
|
|
partname, newlen, textsiz, (size_t)(newlen - textsiz)
|
|
|
|
);
|
|
|
|
strbuf msg = strbuf_alloca(100);
|
|
|
|
strbuf_sprintf(msg, "Overflow in \"%s\" form part", partname);
|
|
|
|
http_request_simple_response(&r->http, 403, strbuf_str(msg));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
memcpy(textbuf + *textlenp, buf, len);
|
|
|
|
*textlenp = newlen;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int form_buf_malloc_init(struct form_buf_malloc *f, size_t size_limit)
|
|
|
|
{
|
|
|
|
assert(f->buffer == NULL);
|
|
|
|
assert(f->buffer_alloc_size == 0);
|
|
|
|
assert(f->length == 0);
|
|
|
|
f->size_limit = size_limit;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int form_buf_malloc_accumulate(httpd_request *r, const char *partname, struct form_buf_malloc *f, const char *buf, size_t len)
|
|
|
|
{
|
|
|
|
if (len == 0)
|
|
|
|
return 0;
|
|
|
|
size_t newlen = f->length + len;
|
|
|
|
if (newlen > f->size_limit) {
|
|
|
|
if (config.debug.httpd)
|
|
|
|
DEBUGF("form part \"%s\" overflow, %zu bytes exceeds limit %zu by %zu",
|
|
|
|
partname, newlen, f->size_limit, (size_t)(newlen - f->size_limit)
|
|
|
|
);
|
|
|
|
strbuf msg = strbuf_alloca(100);
|
|
|
|
strbuf_sprintf(msg, "Overflow in \"%s\" form part", partname);
|
|
|
|
http_request_simple_response(&r->http, 403, strbuf_str(msg));
|
|
|
|
return 403;
|
|
|
|
}
|
|
|
|
if (newlen > f->buffer_alloc_size) {
|
|
|
|
if ((f->buffer = erealloc(f->buffer, newlen)) == NULL) {
|
|
|
|
http_request_simple_response(&r->http, 500, NULL);
|
|
|
|
return 500;
|
|
|
|
}
|
|
|
|
f->buffer_alloc_size = newlen;
|
|
|
|
}
|
|
|
|
memcpy(f->buffer + f->length, buf, len);
|
|
|
|
f->length = newlen;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void form_buf_malloc_release(struct form_buf_malloc *f)
|
|
|
|
{
|
|
|
|
if (f->buffer) {
|
|
|
|
free(f->buffer);
|
|
|
|
f->buffer = NULL;
|
|
|
|
}
|
|
|
|
f->buffer_alloc_size = 0;
|
|
|
|
f->length = 0;
|
|
|
|
f->size_limit = 0;
|
|
|
|
}
|
|
|
|
|
2014-06-19 07:54:16 +00:00
|
|
|
int http_response_content_type(httpd_request *r, const char *what, const struct mime_content_type *ct)
|
|
|
|
{
|
|
|
|
if (config.debug.httpd)
|
|
|
|
DEBUGF("%s Content-Type: %s/%s%s%s%s%s", what, ct->type, ct->subtype,
|
|
|
|
ct->charset[0] ? "; charset=" : "",
|
|
|
|
ct->charset,
|
|
|
|
ct->multipart_boundary[0] ? "; boundary=" : "",
|
|
|
|
ct->multipart_boundary
|
|
|
|
);
|
|
|
|
strbuf msg = strbuf_alloca(200);
|
|
|
|
strbuf_sprintf(msg, "%s Content-Type:", what);
|
|
|
|
if (ct->type[0])
|
|
|
|
strbuf_sprintf(msg, " %s", ct->type);
|
|
|
|
if (ct->subtype[0])
|
|
|
|
strbuf_sprintf(msg, "/%s", ct->subtype);
|
|
|
|
if (ct->charset[0])
|
|
|
|
strbuf_sprintf(msg, "; charset=%s", ct->charset);
|
|
|
|
if (ct->multipart_boundary[0])
|
|
|
|
strbuf_sprintf(msg, "; boundary=%s", ct->multipart_boundary);
|
|
|
|
http_request_simple_response(&r->http, 403, strbuf_str(msg));
|
|
|
|
return 403;
|
|
|
|
}
|
|
|
|
|
|
|
|
int http_response_content_disposition(httpd_request *r, const char *what, const char *type)
|
|
|
|
{
|
|
|
|
if (config.debug.httpd)
|
|
|
|
DEBUGF("%s Content-Disposition: %s %s", what, type);
|
|
|
|
strbuf msg = strbuf_alloca(100);
|
|
|
|
strbuf_sprintf(msg, "%s Content-Disposition: %s", what, type);
|
|
|
|
http_request_simple_response(&r->http, 403, strbuf_str(msg));
|
|
|
|
return 403;
|
|
|
|
}
|
|
|
|
|
2014-02-05 03:58:15 +00:00
|
|
|
int http_response_form_part(httpd_request *r, const char *what, const char *partname, const char *text, size_t textlen)
|
|
|
|
{
|
|
|
|
if (config.debug.httpd)
|
|
|
|
DEBUGF("%s \"%s\" form part %s", what, partname, text ? alloca_toprint(-1, text, textlen) : "");
|
|
|
|
strbuf msg = strbuf_alloca(100);
|
|
|
|
strbuf_sprintf(msg, "%s \"%s\" form part", what, partname);
|
|
|
|
http_request_simple_response(&r->http, 403, strbuf_str(msg));
|
|
|
|
return 403;
|
|
|
|
}
|
|
|
|
|
2014-11-24 06:24:35 +00:00
|
|
|
int http_response_init_content_range(httpd_request *r, size_t resource_length)
|
|
|
|
{
|
|
|
|
r->http.response.header.resource_length = resource_length;
|
|
|
|
if (r->http.request_header.content_range_count == 1) {
|
|
|
|
struct http_range closed;
|
|
|
|
unsigned n = http_range_close(&closed, r->http.request_header.content_ranges, 1, resource_length);
|
|
|
|
if (n == 0 || http_range_bytes(&closed, 1) == 0)
|
|
|
|
return 416; // Request Range Not Satisfiable
|
|
|
|
r->http.response.header.content_range_start = closed.first;
|
|
|
|
r->http.response.header.content_length = closed.last - closed.first + 1;
|
|
|
|
}else{
|
|
|
|
r->http.response.header.content_range_start = 0;
|
|
|
|
r->http.response.header.content_length = resource_length;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-01-31 07:32:41 +00:00
|
|
|
static int root_page(httpd_request *r, const char *remainder)
|
|
|
|
{
|
|
|
|
if (*remainder)
|
|
|
|
return 404;
|
|
|
|
if (r->http.verb != HTTP_VERB_GET)
|
|
|
|
return 405;
|
|
|
|
char temp[8192];
|
|
|
|
strbuf b = strbuf_local(temp, sizeof temp);
|
|
|
|
strbuf_sprintf(b, "<html><head><meta http-equiv=\"refresh\" content=\"5\" ></head><body>"
|
2014-04-29 04:27:29 +00:00
|
|
|
"<h1>Hello, I'm %s*</h1>",
|
2014-01-31 07:32:41 +00:00
|
|
|
alloca_tohex_sid_t_trunc(my_subscriber->sid, 16));
|
2014-04-29 04:27:29 +00:00
|
|
|
if (config.server.motd[0]) {
|
|
|
|
strbuf_puts(b, "<p>");
|
|
|
|
strbuf_html_escape(b, config.server.motd, strlen(config.server.motd));
|
|
|
|
strbuf_puts(b, "</p>");
|
|
|
|
}
|
|
|
|
strbuf_puts(b, "Interfaces;<br />");
|
2014-01-31 07:32:41 +00:00
|
|
|
int i;
|
|
|
|
for (i=0;i<OVERLAY_MAX_INTERFACES;i++){
|
|
|
|
if (overlay_interfaces[i].state==INTERFACE_STATE_UP)
|
2014-04-29 04:27:29 +00:00
|
|
|
strbuf_sprintf(b, "<a href=\"/interface/%d\">%d: %s, TX: %d, RX: %d</a><br />",
|
2014-01-31 07:32:41 +00:00
|
|
|
i, i, overlay_interfaces[i].name, overlay_interfaces[i].tx_count, overlay_interfaces[i].recv_count);
|
|
|
|
}
|
2014-04-29 04:27:29 +00:00
|
|
|
strbuf_puts(b, "Neighbours;<br />");
|
2014-01-31 07:32:41 +00:00
|
|
|
link_neighbour_short_status_html(b, "/neighbour");
|
|
|
|
if (is_rhizome_http_enabled()){
|
2014-04-29 04:27:29 +00:00
|
|
|
strbuf_puts(b, "<a href=\"/rhizome/status\">Rhizome Status</a><br />");
|
2014-01-31 07:32:41 +00:00
|
|
|
}
|
|
|
|
strbuf_puts(b, "</body></html>");
|
|
|
|
if (strbuf_overrun(b)) {
|
|
|
|
WHY("HTTP Root page buffer overrun");
|
|
|
|
return 500;
|
|
|
|
}
|
2014-02-07 05:58:40 +00:00
|
|
|
http_request_response_static(&r->http, 200, CONTENT_TYPE_HTML, temp, strbuf_len(b));
|
2014-01-31 07:32:41 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fav_icon_header(httpd_request *r, const char *remainder)
|
|
|
|
{
|
|
|
|
if (*remainder)
|
|
|
|
return 404;
|
|
|
|
http_request_response_static(&r->http, 200, "image/vnd.microsoft.icon", (const char *)favicon_bytes, favicon_len);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int neighbour_page(httpd_request *r, const char *remainder)
|
|
|
|
{
|
|
|
|
if (r->http.verb != HTTP_VERB_GET)
|
|
|
|
return 405;
|
|
|
|
char buf[8*1024];
|
|
|
|
strbuf b = strbuf_local(buf, sizeof buf);
|
|
|
|
sid_t neighbour_sid;
|
|
|
|
if (str_to_sid_t(&neighbour_sid, remainder) == -1)
|
|
|
|
return 404;
|
|
|
|
struct subscriber *neighbour = find_subscriber(neighbour_sid.binary, sizeof(neighbour_sid.binary), 0);
|
|
|
|
if (!neighbour)
|
|
|
|
return 404;
|
|
|
|
strbuf_puts(b, "<html><head><meta http-equiv=\"refresh\" content=\"5\" ></head><body>");
|
|
|
|
link_neighbour_status_html(b, neighbour);
|
|
|
|
strbuf_puts(b, "</body></html>");
|
|
|
|
if (strbuf_overrun(b))
|
|
|
|
return -1;
|
2014-02-07 05:58:40 +00:00
|
|
|
http_request_response_static(&r->http, 200, CONTENT_TYPE_HTML, buf, strbuf_len(b));
|
2014-01-31 07:32:41 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int interface_page(httpd_request *r, const char *remainder)
|
|
|
|
{
|
|
|
|
if (r->http.verb != HTTP_VERB_GET)
|
|
|
|
return 405;
|
|
|
|
char buf[8*1024];
|
|
|
|
strbuf b=strbuf_local(buf, sizeof buf);
|
|
|
|
int index=atoi(remainder);
|
|
|
|
if (index<0 || index>=OVERLAY_MAX_INTERFACES)
|
|
|
|
return 404;
|
|
|
|
strbuf_puts(b, "<html><head><meta http-equiv=\"refresh\" content=\"5\" ></head><body>");
|
|
|
|
interface_state_html(b, &overlay_interfaces[index]);
|
|
|
|
strbuf_puts(b, "</body></html>");
|
|
|
|
if (strbuf_overrun(b))
|
|
|
|
return -1;
|
2014-02-07 05:58:40 +00:00
|
|
|
http_request_response_static(&r->http, 200, CONTENT_TYPE_HTML, buf, strbuf_len(b));
|
2014-01-31 07:32:41 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2014-11-24 06:24:35 +00:00
|
|
|
|
|
|
|
static void finalise_union_close_file(httpd_request *r)
|
|
|
|
{
|
|
|
|
if (r->u.file.fd==-1)
|
|
|
|
return;
|
|
|
|
close(r->u.file.fd);
|
|
|
|
r->u.file.fd=-1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int static_file_generator(struct http_request *hr, unsigned char *buf, size_t bufsz, struct http_content_generator_result *result)
|
|
|
|
{
|
|
|
|
struct httpd_request *r=(struct httpd_request *)hr;
|
|
|
|
uint64_t remain = r->http.response.header.content_length + r->http.response.header.content_range_start - r->u.file.offset;
|
|
|
|
if (bufsz < remain)
|
|
|
|
remain = bufsz;
|
|
|
|
ssize_t bytes = read(r->u.file.fd, buf, remain);
|
|
|
|
if (bytes == -1)
|
|
|
|
return -1;
|
|
|
|
r->u.file.offset+=bytes;
|
|
|
|
result->generated = bytes;
|
|
|
|
return (r->u.file.offset >= r->http.response.header.content_length + r->http.response.header.content_range_start)?0:1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int static_page(httpd_request *r, const char *remainder)
|
|
|
|
{
|
|
|
|
if (r->http.verb != HTTP_VERB_GET)
|
|
|
|
return 405;
|
|
|
|
char path[PATH_MAX];
|
|
|
|
|
|
|
|
if (!*remainder)
|
|
|
|
remainder="index.html";
|
|
|
|
if (FORMF_SERVAL_ETC_PATH(path, "static/%s", remainder)==0)
|
|
|
|
return 500;
|
|
|
|
struct stat stat;
|
|
|
|
if (lstat(path, &stat))
|
|
|
|
return 404;
|
|
|
|
|
|
|
|
r->u.file.fd = open(path, O_RDONLY);
|
|
|
|
if (r->u.file.fd==-1)
|
|
|
|
return 404;
|
|
|
|
|
|
|
|
r->finalise_union=finalise_union_close_file;
|
|
|
|
|
|
|
|
// TODO find extension and set content type properly
|
|
|
|
http_response_init_content_range(r, stat.st_size);
|
|
|
|
if (r->http.response.header.content_range_start){
|
|
|
|
if (lseek64(r->u.file.fd, r->http.response.header.content_range_start, SEEK_SET)){
|
|
|
|
WARNF_perror("lseek(%s)", path);
|
|
|
|
return 500;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
r->u.file.offset=r->http.response.header.content_range_start;
|
|
|
|
http_request_response_generated(&r->http, 200, CONTENT_TYPE_HTML, static_file_generator);
|
|
|
|
return 1;
|
|
|
|
}
|