2011-12-21 09:55:05 +00:00
|
|
|
/*
|
|
|
|
Serval Distributed Numbering Architecture (DNA)
|
|
|
|
Copyright (C) 2010 Paul Gardner-Stephen
|
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU General Public License
|
|
|
|
as published by the Free Software Foundation; either version 2
|
|
|
|
of the License, or (at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
2011-12-21 05:58:08 +00:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2011-12-22 11:28:18 +00:00
|
|
|
#include <signal.h>
|
2012-09-05 09:23:22 +00:00
|
|
|
#ifdef HAVE_SYS_FILIO_H
|
|
|
|
#include <sys/filio.h>
|
|
|
|
#endif
|
2011-12-21 05:58:08 +00:00
|
|
|
|
2012-02-23 02:15:42 +00:00
|
|
|
#include "serval.h"
|
2012-08-06 02:55:45 +00:00
|
|
|
#include "str.h"
|
2011-12-21 05:58:08 +00:00
|
|
|
#include "rhizome.h"
|
2012-07-02 03:49:54 +00:00
|
|
|
#define RHIZOME_SERVER_MAX_LIVE_REQUESTS 32
|
|
|
|
|
2012-07-02 05:50:30 +00:00
|
|
|
struct sched_ent server_alarm;
|
2012-07-02 06:34:00 +00:00
|
|
|
struct profile_total server_stats;
|
2012-07-02 05:50:30 +00:00
|
|
|
|
2012-07-02 06:34:00 +00:00
|
|
|
struct profile_total connection_stats;
|
2012-07-02 03:49:54 +00:00
|
|
|
|
2011-12-21 05:58:08 +00:00
|
|
|
/*
|
2012-08-28 04:26:47 +00:00
|
|
|
HTTP server and client code for rhizome transfers and rhizome direct.
|
|
|
|
Selection of either use is made when starting the HTTP server and
|
|
|
|
specifying the call-back function to use on client connections.
|
2011-12-21 05:58:08 +00:00
|
|
|
*/
|
|
|
|
|
2012-07-12 02:40:59 +00:00
|
|
|
unsigned short rhizome_http_server_port = 0;
|
2012-06-26 01:37:01 +00:00
|
|
|
static int rhizome_server_socket = -1;
|
2012-08-09 02:44:32 +00:00
|
|
|
static time_ms_t rhizome_server_last_start_attempt = -1;
|
2011-12-21 05:58:08 +00:00
|
|
|
|
2012-08-28 05:02:12 +00:00
|
|
|
int (*rhizome_http_parse_func)(rhizome_http_request *)=NULL;
|
|
|
|
const char *rhizome_http_parse_func_description="(null)";
|
2012-08-28 04:26:47 +00:00
|
|
|
|
2012-01-03 04:15:50 +00:00
|
|
|
// Format icon data using:
|
|
|
|
// od -vt u1 ~/Downloads/favicon.ico | cut -c9- | sed 's/ */,/g'
|
|
|
|
unsigned char favicon_bytes[]={
|
|
|
|
0,0,1,0,1,0,16,16,16,0,0,0,0,0,40,1
|
|
|
|
,0,0,22,0,0,0,40,0,0,0,16,0,0,0,32,0
|
|
|
|
,0,0,1,0,4,0,0,0,0,0,128,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,16,0,0,0,0,0,0,0,104,158
|
|
|
|
,168,0,163,233,247,0,104,161,118,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,17,17
|
|
|
|
,17,17,17,18,34,17,17,18,34,17,17,18,34,17,17,2
|
|
|
|
,34,17,17,18,34,17,16,18,34,1,17,17,1,17,1,17
|
|
|
|
,1,16,1,16,17,17,17,17,1,17,16,16,17,17,17,17
|
|
|
|
,1,17,18,34,17,17,17,16,17,17,2,34,17,17,17,16
|
|
|
|
,17,16,18,34,17,17,17,16,17,1,17,1,17,17,17,18
|
|
|
|
,34,17,17,16,17,17,17,18,34,17,17,18,34,17,17,18
|
|
|
|
,34,17,17,18,34,17,17,16,17,17,17,18,34,17,17,16
|
|
|
|
,17,17,17,17,17,0,17,1,17,17,17,17,17,17,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
|
|
|
|
,0,0,0,0,0,0,0,0,0,0,0,0,0,0};
|
|
|
|
int favicon_len=318;
|
|
|
|
|
2012-07-12 02:40:59 +00:00
|
|
|
int rhizome_http_server_running()
|
|
|
|
{
|
|
|
|
return rhizome_server_socket != -1;
|
|
|
|
}
|
|
|
|
|
2012-06-26 01:37:01 +00:00
|
|
|
/* Start the Rhizome HTTP server by creating a socket, binding it to an available port, and
|
|
|
|
marking it as passive. If called repeatedly and frequently, this function will only try to start
|
|
|
|
the server after a certain time has elapsed since the last attempt.
|
|
|
|
Return -1 if an error occurs (message logged).
|
|
|
|
Return 0 if the server was started.
|
|
|
|
Return 1 if the server is already started successfully.
|
|
|
|
Return 2 if the server was not started because it is too soon since last failed attempt.
|
|
|
|
*/
|
2012-08-28 05:02:12 +00:00
|
|
|
int rhizome_http_server_start(int (*parse_func)(rhizome_http_request *),
|
|
|
|
const char *parse_func_desc,
|
2012-08-28 04:26:47 +00:00
|
|
|
int port_low,int port_high)
|
2011-12-21 05:58:08 +00:00
|
|
|
{
|
2012-06-26 01:37:01 +00:00
|
|
|
if (rhizome_server_socket != -1)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* Only try to start http server every five seconds. */
|
2012-08-09 02:44:32 +00:00
|
|
|
time_ms_t now = gettime_ms();
|
|
|
|
if (now < rhizome_server_last_start_attempt + 5000)
|
2012-06-26 01:37:01 +00:00
|
|
|
return 2;
|
2012-08-09 02:44:32 +00:00
|
|
|
rhizome_server_last_start_attempt = now;
|
2012-07-13 01:36:10 +00:00
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-06-26 01:37:01 +00:00
|
|
|
DEBUGF("Starting rhizome HTTP server");
|
|
|
|
|
2012-07-12 02:40:59 +00:00
|
|
|
unsigned short port;
|
2012-08-28 04:26:47 +00:00
|
|
|
for (port = port_low; port <= port_high; ++port) {
|
2012-07-12 02:40:59 +00:00
|
|
|
/* Create a new socket, reusable and non-blocking. */
|
|
|
|
if (rhizome_server_socket == -1) {
|
|
|
|
rhizome_server_socket = socket(AF_INET,SOCK_STREAM,0);
|
|
|
|
if (rhizome_server_socket == -1) {
|
|
|
|
WHY_perror("socket");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
int on=1;
|
|
|
|
if (setsockopt(rhizome_server_socket, SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) == -1) {
|
|
|
|
WHY_perror("setsockopt(REUSEADDR)");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
if (ioctl(rhizome_server_socket, FIONBIO, (char *)&on) == -1) {
|
|
|
|
WHY_perror("ioctl(FIONBIO)");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Bind it to the next port we want to try. */
|
|
|
|
struct sockaddr_in address;
|
|
|
|
bzero((char *) &address, sizeof(address));
|
|
|
|
address.sin_family = AF_INET;
|
|
|
|
address.sin_addr.s_addr = INADDR_ANY;
|
2012-07-02 06:54:07 +00:00
|
|
|
address.sin_port = htons(port);
|
2012-07-12 02:40:59 +00:00
|
|
|
if (bind(rhizome_server_socket, (struct sockaddr *) &address, sizeof(address)) == -1) {
|
|
|
|
if (errno != EADDRINUSE) {
|
|
|
|
WHY_perror("bind");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* We bound to a port. The battle is half won. Now we have to successfully listen on that
|
|
|
|
port, which could also fail with EADDRINUSE, in which case we have to scrap the socket and
|
|
|
|
create a new one, because once bound, a socket stays bound.
|
|
|
|
*/
|
|
|
|
if (listen(rhizome_server_socket, 20) != -1)
|
|
|
|
goto success;
|
|
|
|
if (errno != EADDRINUSE) {
|
|
|
|
WHY_perror("listen");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
close(rhizome_server_socket);
|
|
|
|
rhizome_server_socket = -1;
|
|
|
|
}
|
2012-06-26 01:37:01 +00:00
|
|
|
}
|
2012-07-12 02:40:59 +00:00
|
|
|
WHYF("No ports available in range %u to %u", RHIZOME_HTTP_PORT, RHIZOME_HTTP_PORT_MAX);
|
|
|
|
error:
|
|
|
|
if (rhizome_server_socket != -1) {
|
2012-06-26 01:37:01 +00:00
|
|
|
close(rhizome_server_socket);
|
|
|
|
rhizome_server_socket = -1;
|
|
|
|
}
|
2012-07-12 02:40:59 +00:00
|
|
|
return WHY("Failed to start rhizome HTTP server");
|
2011-12-22 11:28:18 +00:00
|
|
|
|
2012-07-12 02:40:59 +00:00
|
|
|
success:
|
2012-08-27 07:37:44 +00:00
|
|
|
INFOF("RHIZOME HTTP SERVER, START port=%d fd=%d", port, rhizome_server_socket);
|
2012-08-28 04:26:47 +00:00
|
|
|
|
|
|
|
/* Remember which function to call when handling client connections */
|
2012-08-28 05:02:12 +00:00
|
|
|
rhizome_http_parse_func=parse_func;
|
|
|
|
rhizome_http_parse_func_description=parse_func_desc;
|
2012-08-28 04:26:47 +00:00
|
|
|
|
2012-07-12 02:40:59 +00:00
|
|
|
rhizome_http_server_port = port;
|
2012-06-22 03:55:41 +00:00
|
|
|
/* Add Rhizome HTTPd server to list of file descriptors to watch */
|
2012-07-02 03:49:54 +00:00
|
|
|
server_alarm.function = rhizome_server_poll;
|
2012-07-02 05:50:30 +00:00
|
|
|
server_stats.name="rhizome_server_poll";
|
|
|
|
server_alarm.stats=&server_stats;
|
2012-07-02 03:49:54 +00:00
|
|
|
server_alarm.poll.fd = rhizome_server_socket;
|
|
|
|
server_alarm.poll.events = POLLIN;
|
|
|
|
watch(&server_alarm);
|
2011-12-21 05:58:08 +00:00
|
|
|
return 0;
|
2012-07-12 02:40:59 +00:00
|
|
|
|
2011-12-21 05:58:08 +00:00
|
|
|
}
|
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
void rhizome_client_poll(struct sched_ent *alarm)
|
2011-12-21 05:58:08 +00:00
|
|
|
{
|
2012-07-13 01:36:10 +00:00
|
|
|
rhizome_http_request *r = (rhizome_http_request *)alarm;
|
|
|
|
if (alarm->poll.revents == 0){
|
2012-07-02 03:49:54 +00:00
|
|
|
rhizome_server_free_http_request(r);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
switch(r->request_type)
|
2011-12-21 05:58:08 +00:00
|
|
|
{
|
2012-09-05 06:23:16 +00:00
|
|
|
case RHIZOME_HTTP_REQUEST_RECEIVING_MULTIPART:
|
|
|
|
{
|
|
|
|
/* Reading multi-part form data. Read some bytes and proces them. */
|
|
|
|
char buffer[16384];
|
|
|
|
sigPipeFlag=0;
|
|
|
|
int bytes = read_nonblock(r->alarm.poll.fd, buffer, 16384);
|
|
|
|
/* If we got some data, see if we have found the end of the HTTP request */
|
|
|
|
if (bytes > 0) {
|
|
|
|
// reset inactivity timer
|
|
|
|
r->alarm.alarm = gettime_ms() + RHIZOME_IDLE_TIMEOUT;
|
|
|
|
r->alarm.deadline = r->alarm.alarm + RHIZOME_IDLE_TIMEOUT;
|
|
|
|
unschedule(&r->alarm);
|
|
|
|
schedule(&r->alarm);
|
|
|
|
rhizome_direct_process_post_multipart_bytes(r,buffer,bytes);
|
|
|
|
}
|
2012-09-05 07:05:08 +00:00
|
|
|
/* We don't drop the connection on an empty read, because that results
|
|
|
|
in connections dropping when they shouldn't, including during testing.
|
|
|
|
The idle timeout should drop the connections instead.
|
|
|
|
*/
|
2012-09-05 06:23:16 +00:00
|
|
|
if (sigPipeFlag) {
|
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
|
|
|
DEBUG("Received SIGPIPE, closing connection");
|
|
|
|
rhizome_server_free_http_request(r);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2012-07-02 03:49:54 +00:00
|
|
|
case RHIZOME_HTTP_REQUEST_RECEIVING:
|
|
|
|
/* Keep reading until we have two CR/LFs in a row */
|
2012-07-13 01:36:10 +00:00
|
|
|
r->request[r->request_length] = '\0';
|
2012-07-02 03:49:54 +00:00
|
|
|
sigPipeFlag=0;
|
2012-07-13 08:36:55 +00:00
|
|
|
int bytes = read_nonblock(r->alarm.poll.fd, &r->request[r->request_length], RHIZOME_HTTP_REQUEST_MAXLEN - r->request_length);
|
2012-07-02 03:49:54 +00:00
|
|
|
/* If we got some data, see if we have found the end of the HTTP request */
|
2012-07-13 01:36:10 +00:00
|
|
|
if (bytes > 0) {
|
2012-07-02 03:49:54 +00:00
|
|
|
// reset inactivity timer
|
2012-07-30 07:52:38 +00:00
|
|
|
r->alarm.alarm = gettime_ms() + RHIZOME_IDLE_TIMEOUT;
|
2012-07-12 00:45:16 +00:00
|
|
|
r->alarm.deadline = r->alarm.alarm + RHIZOME_IDLE_TIMEOUT;
|
2012-07-02 03:49:54 +00:00
|
|
|
unschedule(&r->alarm);
|
|
|
|
schedule(&r->alarm);
|
2012-07-13 08:36:55 +00:00
|
|
|
r->request_length += bytes;
|
|
|
|
if (http_header_complete(r->request, r->request_length, bytes + 4)) {
|
2012-07-02 03:49:54 +00:00
|
|
|
/* We have the request. Now parse it to see if we can respond to it */
|
2012-08-28 05:02:12 +00:00
|
|
|
if (rhizome_http_parse_func!=NULL) rhizome_http_parse_func(r);
|
2012-07-02 03:49:54 +00:00
|
|
|
}
|
2012-07-13 01:36:10 +00:00
|
|
|
} else {
|
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
|
|
|
DEBUG("Empty read, closing connection");
|
2012-07-02 03:49:54 +00:00
|
|
|
rhizome_server_free_http_request(r);
|
|
|
|
return;
|
2012-07-13 01:36:10 +00:00
|
|
|
}
|
|
|
|
if (sigPipeFlag) {
|
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
|
|
|
DEBUG("Received SIGPIPE, closing connection");
|
|
|
|
rhizome_server_free_http_request(r);
|
|
|
|
return;
|
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* Socket already has request -- so just try to send some data. */
|
|
|
|
rhizome_server_http_send_bytes(r);
|
|
|
|
break;
|
|
|
|
}
|
2012-06-22 03:55:41 +00:00
|
|
|
return;
|
|
|
|
}
|
2011-12-22 11:28:18 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
void rhizome_server_poll(struct sched_ent *alarm)
|
2012-06-22 03:55:41 +00:00
|
|
|
{
|
|
|
|
struct sockaddr addr;
|
2012-07-10 10:29:46 +00:00
|
|
|
unsigned int addr_len = sizeof addr;
|
2012-06-22 03:55:41 +00:00
|
|
|
int sock;
|
2012-07-10 10:29:46 +00:00
|
|
|
while ((sock = accept(rhizome_server_socket, &addr, &addr_len)) != -1) {
|
|
|
|
if (addr.sa_family == AF_INET) {
|
|
|
|
struct sockaddr_in *peerip = (struct sockaddr_in *)&addr;
|
2012-08-17 10:12:11 +00:00
|
|
|
INFOF("RHIZOME HTTP SERVER, ACCEPT addrlen=%u family=%u port=%u addr=%u.%u.%u.%u",
|
2012-07-10 10:29:46 +00:00
|
|
|
addr_len, peerip->sin_family, peerip->sin_port,
|
|
|
|
((unsigned char*)&peerip->sin_addr.s_addr)[0],
|
|
|
|
((unsigned char*)&peerip->sin_addr.s_addr)[1],
|
|
|
|
((unsigned char*)&peerip->sin_addr.s_addr)[2],
|
|
|
|
((unsigned char*)&peerip->sin_addr.s_addr)[3]
|
|
|
|
);
|
|
|
|
} else {
|
2012-08-17 10:12:11 +00:00
|
|
|
INFOF("RHIZOME HTTP SERVER, ACCEPT addrlen=%u family=%u data=%s",
|
|
|
|
addr_len, addr.sa_family, alloca_tohex((unsigned char *)addr.sa_data, sizeof addr.sa_data)
|
|
|
|
);
|
2011-12-21 05:58:08 +00:00
|
|
|
}
|
2012-07-13 03:01:10 +00:00
|
|
|
rhizome_http_request *request = calloc(sizeof(rhizome_http_request), 1);
|
|
|
|
if (request == NULL) {
|
|
|
|
WHYF_perror("calloc(%u, 1)", sizeof(rhizome_http_request));
|
|
|
|
WHY("Cannot respond to request, out of memory");
|
|
|
|
} else {
|
|
|
|
/* We are now trying to read the HTTP request */
|
|
|
|
request->request_type=RHIZOME_HTTP_REQUEST_RECEIVING;
|
|
|
|
request->alarm.function = rhizome_client_poll;
|
|
|
|
connection_stats.name="rhizome_client_poll";
|
|
|
|
request->alarm.stats=&connection_stats;
|
|
|
|
request->alarm.poll.fd=sock;
|
|
|
|
request->alarm.poll.events=POLLIN;
|
2012-07-30 07:52:38 +00:00
|
|
|
request->alarm.alarm = gettime_ms()+RHIZOME_IDLE_TIMEOUT;
|
2012-07-17 06:09:55 +00:00
|
|
|
request->alarm.deadline = request->alarm.alarm+RHIZOME_IDLE_TIMEOUT;
|
2012-07-13 03:01:10 +00:00
|
|
|
// watch for the incoming http request
|
|
|
|
watch(&request->alarm);
|
|
|
|
// set an inactivity timeout to close the connection
|
|
|
|
schedule(&request->alarm);
|
|
|
|
}
|
2012-07-10 10:29:46 +00:00
|
|
|
}
|
|
|
|
if (errno != EAGAIN) {
|
|
|
|
WARN_perror("accept");
|
|
|
|
}
|
2011-12-22 11:28:18 +00:00
|
|
|
}
|
|
|
|
|
2012-08-28 05:02:12 +00:00
|
|
|
int rhizome_server_free_http_request(rhizome_http_request *r)
|
2011-12-22 11:28:18 +00:00
|
|
|
{
|
2012-07-02 03:49:54 +00:00
|
|
|
unwatch(&r->alarm);
|
|
|
|
unschedule(&r->alarm);
|
|
|
|
close(r->alarm.poll.fd);
|
2012-07-13 03:01:10 +00:00
|
|
|
if (r->buffer)
|
|
|
|
free(r->buffer);
|
|
|
|
if (r->blob)
|
|
|
|
sqlite3_blob_close(r->blob);
|
2011-12-22 11:28:18 +00:00
|
|
|
free(r);
|
2011-12-21 05:58:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2011-12-22 11:28:18 +00:00
|
|
|
|
2012-08-28 05:02:12 +00:00
|
|
|
int rhizome_server_sql_query_http_response(rhizome_http_request *r,
|
2012-01-03 06:05:02 +00:00
|
|
|
char *column,char *table,char *query_body,
|
2012-01-03 04:24:32 +00:00
|
|
|
int bytes_per_row,int dehexP)
|
2012-01-03 04:15:50 +00:00
|
|
|
{
|
|
|
|
/* Run the provided SQL query progressively and return the values of the first
|
|
|
|
column it returns. As the result list may be very long, we will add the
|
|
|
|
LIMIT <skip>,<count> clause to do it piece by piece.
|
|
|
|
|
|
|
|
Otherwise, the response is prefixed by a 256 byte header, including the public
|
|
|
|
key of the sending node, and allowing space for information about encryption of
|
|
|
|
the body, although encryption is not yet implemented here.
|
|
|
|
*/
|
|
|
|
|
2012-07-13 03:01:10 +00:00
|
|
|
if (r->buffer == NULL || r->buffer_size < 16384) {
|
|
|
|
if (r->buffer)
|
|
|
|
free(r->buffer);
|
|
|
|
r->buffer_size = 16384;
|
|
|
|
r->buffer = malloc(r->buffer_size);
|
|
|
|
if (r->buffer == NULL) {
|
|
|
|
r->buffer_size = 0;
|
|
|
|
WHY_perror("malloc");
|
|
|
|
return WHY("Cannot send response, out of memory");
|
|
|
|
}
|
|
|
|
}
|
2012-01-03 04:15:50 +00:00
|
|
|
r->buffer_length=0;
|
|
|
|
r->buffer_offset=0;
|
|
|
|
r->source_record_size=bytes_per_row;
|
2012-06-08 03:43:26 +00:00
|
|
|
r->source_count = 0;
|
|
|
|
sqlite_exec_int64(&r->source_count, "SELECT COUNT(*) %s", query_body);
|
2012-01-03 04:15:50 +00:00
|
|
|
|
|
|
|
/* Work out total response length */
|
|
|
|
long long response_bytes=256+r->source_count*r->source_record_size;
|
2012-07-13 03:01:10 +00:00
|
|
|
rhizome_server_http_response_header(r, 200, "servalproject.org/rhizome-list", response_bytes);
|
2012-07-13 01:36:10 +00:00
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-07-13 03:01:10 +00:00
|
|
|
DEBUGF("headers consumed %d bytes", r->buffer_length);
|
2012-01-03 04:15:50 +00:00
|
|
|
|
|
|
|
/* Clear and prepare response header */
|
|
|
|
bzero(&r->buffer[r->buffer_length],256);
|
|
|
|
|
|
|
|
r->buffer[r->buffer_length]=0x01; /* type of response (list) */
|
|
|
|
r->buffer[r->buffer_length+1]=0x01; /* version of response */
|
|
|
|
|
2012-07-13 01:36:10 +00:00
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-07-12 07:12:41 +00:00
|
|
|
DEBUGF("Found %lld records",r->source_count);
|
2012-01-03 04:15:50 +00:00
|
|
|
/* Number of records we intend to return */
|
|
|
|
r->buffer[r->buffer_length+4]=(r->source_count>>0)&0xff;
|
|
|
|
r->buffer[r->buffer_length+5]=(r->source_count>>8)&0xff;
|
|
|
|
r->buffer[r->buffer_length+6]=(r->source_count>>16)&0xff;
|
|
|
|
r->buffer[r->buffer_length+7]=(r->source_count>>24)&0xff;
|
|
|
|
|
|
|
|
r->buffer_length+=256;
|
|
|
|
|
|
|
|
/* copy our public key in to bytes 32+ */
|
2012-07-12 07:12:41 +00:00
|
|
|
// TODO get out public key (SID) from keyring and copy into response packet
|
2012-01-03 04:15:50 +00:00
|
|
|
|
|
|
|
/* build templated query */
|
2012-06-08 03:43:26 +00:00
|
|
|
strbuf b = strbuf_local(r->source, sizeof r->source);
|
|
|
|
strbuf_sprintf(b, "SELECT %s,rowid %s", column, query_body);
|
|
|
|
if (strbuf_overrun(b))
|
|
|
|
WHYF("SQL query overrun: %s", strbuf_str(b));
|
2012-01-03 04:15:50 +00:00
|
|
|
r->source_index=0;
|
2012-01-03 04:24:32 +00:00
|
|
|
r->source_flags=dehexP;
|
2012-01-03 04:15:50 +00:00
|
|
|
|
2012-06-08 03:43:26 +00:00
|
|
|
DEBUGF("buffer_length=%d",r->buffer_length);
|
2012-01-03 04:15:50 +00:00
|
|
|
|
|
|
|
/* Populate spare space in buffer with rows of data */
|
2012-07-02 03:49:54 +00:00
|
|
|
return rhizome_server_sql_query_fill_buffer(r, table, column);
|
2012-01-03 04:15:50 +00:00
|
|
|
}
|
|
|
|
|
2012-08-28 05:02:12 +00:00
|
|
|
int rhizome_server_sql_query_fill_buffer(rhizome_http_request *r, char *table, char *column)
|
2012-01-03 04:15:50 +00:00
|
|
|
{
|
2012-01-03 06:05:02 +00:00
|
|
|
unsigned char blob_value[r->source_record_size*2+1];
|
|
|
|
|
2012-07-13 01:36:10 +00:00
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-07-12 07:12:41 +00:00
|
|
|
DEBUGF("populating with sql rows at offset %d",r->buffer_length);
|
2012-01-03 04:15:50 +00:00
|
|
|
if (r->source_index>=r->source_count)
|
|
|
|
{
|
|
|
|
/* All done */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int record_count=(r->buffer_size-r->buffer_length)/r->source_record_size;
|
|
|
|
if (record_count<1) {
|
2012-07-13 01:36:10 +00:00
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-07-12 07:12:41 +00:00
|
|
|
DEBUGF("r->buffer_size=%d, r->buffer_length=%d, r->source_record_size=%d",
|
2012-01-03 04:15:50 +00:00
|
|
|
r->buffer_size, r->buffer_length, r->source_record_size);
|
|
|
|
return WHY("Not enough space to fit any records");
|
|
|
|
}
|
|
|
|
|
2012-08-24 05:56:25 +00:00
|
|
|
sqlite3_stmt *statement = sqlite_prepare("%s LIMIT %lld,%d", r->source, r->source_index, record_count);
|
|
|
|
if (!statement)
|
|
|
|
return -1;
|
2012-07-13 01:36:10 +00:00
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-08-24 05:56:25 +00:00
|
|
|
DEBUG(sqlite3_sql(statement));
|
|
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
|
|
while( r->buffer_length + r->source_record_size < r->buffer_size
|
|
|
|
&& sqlite_step_retry(&retry, statement) == SQLITE_ROW
|
|
|
|
) {
|
|
|
|
r->source_index++;
|
|
|
|
if (sqlite3_column_count(statement)!=2) {
|
2012-01-03 04:15:50 +00:00
|
|
|
sqlite3_finalize(statement);
|
2012-08-24 05:56:25 +00:00
|
|
|
return WHY("sqlite3 returned multiple columns for a single column query");
|
2012-01-03 04:15:50 +00:00
|
|
|
}
|
2012-08-24 05:56:25 +00:00
|
|
|
sqlite3_blob *blob;
|
|
|
|
const unsigned char *value;
|
|
|
|
int column_type=sqlite3_column_type(statement, 0);
|
|
|
|
switch(column_type) {
|
|
|
|
case SQLITE_TEXT: value=sqlite3_column_text(statement, 0); break;
|
|
|
|
case SQLITE_BLOB:
|
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
|
|
|
DEBUGF("table='%s',col='%s',rowid=%lld", table, column, sqlite3_column_int64(statement,1));
|
|
|
|
|
|
|
|
int ret;
|
|
|
|
int64_t rowid = sqlite3_column_int64(statement, 1);
|
|
|
|
do ret = sqlite3_blob_open(rhizome_db, "main", table, column, rowid, 0 /* read only */, &blob);
|
|
|
|
while (sqlite_code_busy(ret) && sqlite_retry(&retry, "sqlite3_blob_open"));
|
|
|
|
if (!sqlite_code_ok(ret)) {
|
|
|
|
WHYF("sqlite3_blob_open() failed, %s", sqlite3_errmsg(rhizome_db));
|
|
|
|
continue;
|
2012-01-03 04:15:50 +00:00
|
|
|
}
|
2012-08-24 05:56:25 +00:00
|
|
|
sqlite_retry_done(&retry, "sqlite3_blob_open");
|
|
|
|
if (sqlite3_blob_read(blob,&blob_value[0],
|
|
|
|
/* copy number of bytes based on whether we need to
|
|
|
|
de-hex the string or not */
|
|
|
|
r->source_record_size*(1+(r->source_flags&1)),0)
|
|
|
|
!=SQLITE_OK) {
|
|
|
|
WHYF("sqlite3_blob_read() failed, %s", sqlite3_errmsg(rhizome_db));
|
2012-01-03 06:05:02 +00:00
|
|
|
sqlite3_blob_close(blob);
|
2012-01-03 04:15:50 +00:00
|
|
|
continue;
|
2012-01-03 06:05:02 +00:00
|
|
|
}
|
2012-08-24 05:56:25 +00:00
|
|
|
value = blob_value;
|
|
|
|
sqlite3_blob_close(blob);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* improper column type, so don't include in report */
|
|
|
|
WHYF("Bad column type %d", column_type);
|
|
|
|
continue;
|
2012-01-03 04:15:50 +00:00
|
|
|
}
|
2012-08-24 05:56:25 +00:00
|
|
|
if (r->source_flags&1) {
|
|
|
|
/* hex string to be converted */
|
|
|
|
int i;
|
|
|
|
for(i=0;i<r->source_record_size;i++)
|
|
|
|
/* convert the two nybls and make a byte */
|
|
|
|
r->buffer[r->buffer_length+i]
|
|
|
|
=(hexvalue(value[i<<1])<<4)|hexvalue(value[(i<<1)+1]);
|
|
|
|
} else
|
|
|
|
/* direct binary value */
|
|
|
|
bcopy(value,&r->buffer[r->buffer_length],r->source_record_size);
|
|
|
|
r->buffer_length+=r->source_record_size;
|
|
|
|
|
|
|
|
}
|
2012-01-03 04:15:50 +00:00
|
|
|
sqlite3_finalize(statement);
|
2012-08-24 05:56:25 +00:00
|
|
|
return 0;
|
2012-01-03 04:15:50 +00:00
|
|
|
}
|
|
|
|
|
2012-07-13 08:36:55 +00:00
|
|
|
int http_header_complete(const char *buf, size_t len, size_t tail)
|
2012-07-13 01:36:10 +00:00
|
|
|
{
|
2012-07-13 08:36:55 +00:00
|
|
|
const char *bufend = buf + len;
|
|
|
|
if (tail < len)
|
|
|
|
buf = bufend - tail;
|
|
|
|
int count = 0;
|
|
|
|
for (; count < 2 && buf != bufend; ++buf) {
|
|
|
|
switch (*buf) {
|
|
|
|
case '\n': ++count; break;
|
|
|
|
case '\r': break;
|
|
|
|
case '\0': break; // ignore NUL (telnet inserts them)
|
|
|
|
default: count = 0; break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return count == 2;
|
|
|
|
}
|
|
|
|
|
2012-09-06 03:51:13 +00:00
|
|
|
int rhizome_direct_parse_http_request(rhizome_http_request *r);
|
2012-08-28 05:02:12 +00:00
|
|
|
int rhizome_server_parse_http_request(rhizome_http_request *r)
|
2011-12-22 17:55:18 +00:00
|
|
|
{
|
2012-06-22 03:55:41 +00:00
|
|
|
/* Switching to writing, so update the call-back */
|
2012-07-02 03:49:54 +00:00
|
|
|
r->alarm.poll.events=POLLOUT;
|
|
|
|
watch(&r->alarm);
|
2012-07-13 08:36:55 +00:00
|
|
|
// Start building up a response.
|
|
|
|
r->request_type = 0;
|
|
|
|
// Parse the HTTP "GET" line.
|
|
|
|
char *path = NULL;
|
|
|
|
size_t pathlen = 0;
|
2012-09-06 03:51:13 +00:00
|
|
|
if (str_startswith(r->request, "POST ", &path)) {
|
|
|
|
return rhizome_direct_parse_http_request(r);
|
|
|
|
} else if (str_startswith(r->request, "GET ", &path)) {
|
2012-07-13 08:36:55 +00:00
|
|
|
char *p;
|
|
|
|
// This loop is guaranteed to terminate before the end of the buffer, because we know that the
|
|
|
|
// buffer contains at least "\n\n" and maybe "\r\n\r\n" at the end of the header block.
|
|
|
|
for (p = path; !isspace(*p); ++p)
|
|
|
|
;
|
|
|
|
pathlen = p - path;
|
|
|
|
if ( str_startswith(p, " HTTP/1.", &p)
|
|
|
|
&& (str_startswith(p, "0", &p) || str_startswith(p, "1", &p))
|
|
|
|
&& (str_startswith(p, "\r\n", &p) || str_startswith(p, "\n", &p))
|
|
|
|
)
|
|
|
|
path[pathlen] = '\0';
|
|
|
|
else
|
|
|
|
path = NULL;
|
|
|
|
}
|
|
|
|
if (path) {
|
2012-07-13 01:36:10 +00:00
|
|
|
char *id = NULL;
|
2012-08-17 10:12:11 +00:00
|
|
|
INFOF("RHIZOME HTTP SERVER, GET %s", alloca_toprint(1024, path, pathlen));
|
2012-07-13 01:36:10 +00:00
|
|
|
if (strcmp(path, "/favicon.ico") == 0) {
|
|
|
|
r->request_type = RHIZOME_HTTP_REQUEST_FAVICON;
|
2012-07-13 03:01:10 +00:00
|
|
|
rhizome_server_http_response_header(r, 200, "image/vnd.microsoft.icon", favicon_len);
|
2012-07-13 01:36:10 +00:00
|
|
|
} else if (strcmp(path, "/rhizome/groups") == 0) {
|
|
|
|
/* Return the list of known groups */
|
|
|
|
rhizome_server_sql_query_http_response(r, "id", "groups", "from groups", 32, 1);
|
|
|
|
} else if (strcmp(path, "/rhizome/files") == 0) {
|
|
|
|
/* Return the list of known files */
|
|
|
|
rhizome_server_sql_query_http_response(r, "id", "files", "from files", 32, 1);
|
|
|
|
} else if (strcmp(path, "/rhizome/bars") == 0) {
|
|
|
|
/* Return the list of known BARs */
|
|
|
|
rhizome_server_sql_query_http_response(r, "bar", "manifests", "from manifests", 32, 0);
|
2012-07-13 08:36:55 +00:00
|
|
|
} else if (str_startswith(path, "/rhizome/file/", &id)) {
|
2012-07-13 01:36:10 +00:00
|
|
|
/* Stream the specified payload */
|
|
|
|
if (!rhizome_str_is_file_hash(id)) {
|
|
|
|
rhizome_server_simple_http_response(r, 400, "<html><h1>Invalid payload ID</h1></html>\r\n");
|
|
|
|
} else {
|
|
|
|
// TODO: Check for Range: header and return 206 if returning partial content
|
|
|
|
str_toupper_inplace(id);
|
|
|
|
long long rowid = -1;
|
|
|
|
sqlite_exec_int64(&rowid, "select rowid from files where id='%s';", id);
|
|
|
|
if (rowid >= 0 && sqlite3_blob_open(rhizome_db, "main", "files", "data", rowid, 0, &r->blob) != SQLITE_OK)
|
|
|
|
rowid = -1;
|
|
|
|
if (rowid == -1) {
|
|
|
|
rhizome_server_simple_http_response(r, 404, "<html><h1>Payload not found</h1></html>\r\n");
|
|
|
|
} else {
|
|
|
|
r->source_index = 0;
|
|
|
|
r->blob_end = sqlite3_blob_bytes(r->blob);
|
|
|
|
rhizome_server_http_response_header(r, 200, "application/binary", r->blob_end - r->source_index);
|
|
|
|
r->request_type |= RHIZOME_HTTP_REQUEST_BLOB;
|
2012-01-02 22:27:52 +00:00
|
|
|
}
|
2011-12-28 23:41:03 +00:00
|
|
|
}
|
2012-07-13 08:36:55 +00:00
|
|
|
} else if (str_startswith(path, "/rhizome/manifest/", &id)) {
|
|
|
|
// TODO: Stream the specified manifest
|
2012-07-13 01:36:10 +00:00
|
|
|
rhizome_server_simple_http_response(r, 500, "<html><h1>Not implemented</h1></html>\r\n");
|
|
|
|
} else {
|
|
|
|
rhizome_server_simple_http_response(r, 404, "<html><h1>Not found</h1></html>\r\n");
|
|
|
|
}
|
2012-07-13 08:36:55 +00:00
|
|
|
} else {
|
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-07-20 08:47:43 +00:00
|
|
|
DEBUGF("Received malformed HTTP request: %s", alloca_toprint(120, (const char *)r->request, r->request_length));
|
2012-07-13 08:36:55 +00:00
|
|
|
rhizome_server_simple_http_response(r, 400, "<html><h1>Malformed request</h1></html>\r\n");
|
2011-12-28 23:41:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Try sending data immediately. */
|
2012-07-02 03:49:54 +00:00
|
|
|
rhizome_server_http_send_bytes(r);
|
2011-12-22 17:55:18 +00:00
|
|
|
|
2011-12-28 23:41:03 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-01-02 22:27:52 +00:00
|
|
|
|
|
|
|
/* Return appropriate message for HTTP response codes, both known and unknown. */
|
2012-07-13 03:01:10 +00:00
|
|
|
static const char *httpResultString(int response_code) {
|
|
|
|
switch (response_code) {
|
|
|
|
case 200: return "OK";
|
|
|
|
case 206: return "Partial Content";
|
|
|
|
case 404: return "Not found";
|
|
|
|
case 500: return "Internal server error";
|
2012-09-05 07:05:08 +00:00
|
|
|
default:
|
|
|
|
if (response_code<=4)
|
|
|
|
return "Unknown status code";
|
|
|
|
else
|
|
|
|
return "A suffusion of yellow";
|
2012-01-02 22:27:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-13 03:01:10 +00:00
|
|
|
static strbuf strbuf_build_http_response(strbuf sb, const struct http_response *h)
|
|
|
|
{
|
|
|
|
strbuf_sprintf(sb, "HTTP/1.0 %03u %s\r\n", h->result_code, httpResultString(h->result_code));
|
|
|
|
strbuf_sprintf(sb, "Content-type: %s\r\n", h->content_type);
|
|
|
|
strbuf_sprintf(sb, "Content-length: %llu\r\n", h->content_length);
|
|
|
|
strbuf_puts(sb, "\r\n");
|
|
|
|
if (h->body)
|
|
|
|
strbuf_puts(sb, h->body);
|
|
|
|
return sb;
|
|
|
|
}
|
2011-12-22 17:55:18 +00:00
|
|
|
|
2012-09-11 03:39:40 +00:00
|
|
|
int rhizome_server_set_response(rhizome_http_request *r, const struct http_response *h)
|
2012-07-13 03:01:10 +00:00
|
|
|
{
|
|
|
|
strbuf b = strbuf_local((char *) r->buffer, r->buffer_size);
|
|
|
|
strbuf_build_http_response(b, h);
|
|
|
|
if (r->buffer == NULL || strbuf_overrun(b)) {
|
|
|
|
// Need a bigger buffer
|
|
|
|
if (r->buffer)
|
|
|
|
free(r->buffer);
|
|
|
|
r->buffer_size = strbuf_count(b) + 1;
|
|
|
|
r->buffer = malloc(r->buffer_size);
|
|
|
|
if (r->buffer == NULL) {
|
|
|
|
WHYF_perror("malloc(%u)", r->buffer_size);
|
|
|
|
r->buffer_size = 0;
|
|
|
|
return WHY("Cannot send response, out of memory");
|
|
|
|
}
|
|
|
|
strbuf_init(b, (char *) r->buffer, r->buffer_size);
|
|
|
|
strbuf_build_http_response(b, h);
|
|
|
|
if (strbuf_overrun(b))
|
|
|
|
return WHYF("Bug! Cannot send response, buffer not big enough");
|
|
|
|
}
|
|
|
|
r->buffer_length = strbuf_len(b);
|
|
|
|
r->buffer_offset = 0;
|
|
|
|
r->request_type |= RHIZOME_HTTP_REQUEST_FROMBUFFER;
|
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-09-28 08:23:20 +00:00
|
|
|
DEBUGF("Sending HTTP response: %s", alloca_toprint(160, (const char *)r->buffer, r->buffer_length));
|
2011-12-22 17:55:18 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-08-28 05:02:12 +00:00
|
|
|
int rhizome_server_simple_http_response(rhizome_http_request *r, int result, const char *response)
|
2012-07-13 03:01:10 +00:00
|
|
|
{
|
|
|
|
struct http_response hr;
|
|
|
|
hr.result_code = result;
|
|
|
|
hr.content_type = "text/html";
|
|
|
|
hr.content_length = strlen(response);
|
|
|
|
hr.body = response;
|
2012-09-05 07:05:08 +00:00
|
|
|
if (result==400) {
|
|
|
|
DEBUGF("Rejecting http request as malformed due to: %s",
|
|
|
|
response);
|
|
|
|
}
|
2012-09-05 20:39:16 +00:00
|
|
|
r->request_type=0;
|
2012-07-13 03:01:10 +00:00
|
|
|
return rhizome_server_set_response(r, &hr);
|
|
|
|
}
|
|
|
|
|
2012-08-28 05:02:12 +00:00
|
|
|
int rhizome_server_http_response_header(rhizome_http_request *r, int result, const char *mime_type, unsigned long long bytes)
|
2012-07-13 03:01:10 +00:00
|
|
|
{
|
|
|
|
struct http_response hr;
|
|
|
|
hr.result_code = result;
|
|
|
|
hr.content_type = mime_type;
|
|
|
|
hr.content_length = bytes;
|
|
|
|
hr.body = NULL;
|
|
|
|
return rhizome_server_set_response(r, &hr);
|
|
|
|
}
|
|
|
|
|
2012-01-02 22:27:52 +00:00
|
|
|
/*
|
|
|
|
return codes:
|
|
|
|
1: connection still open.
|
|
|
|
0: connection finished.
|
|
|
|
<0: an error occurred.
|
|
|
|
*/
|
2012-08-28 05:02:12 +00:00
|
|
|
int rhizome_server_http_send_bytes(rhizome_http_request *r)
|
2011-12-22 17:55:18 +00:00
|
|
|
{
|
2012-06-27 07:24:42 +00:00
|
|
|
// keep writing until the write would block or we run out of data
|
|
|
|
while(r->request_type){
|
|
|
|
|
|
|
|
/* Flush anything out of the buffer if present, before doing any further
|
|
|
|
processing */
|
|
|
|
if (r->request_type&RHIZOME_HTTP_REQUEST_FROMBUFFER)
|
|
|
|
{
|
|
|
|
int bytes=r->buffer_length-r->buffer_offset;
|
2012-07-02 03:49:54 +00:00
|
|
|
bytes=write(r->alarm.poll.fd,&r->buffer[r->buffer_offset],bytes);
|
2012-06-27 07:24:42 +00:00
|
|
|
if (bytes<=0){
|
|
|
|
// stop writing when the tcp buffer is full
|
|
|
|
// TODO errors?
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (0)
|
|
|
|
dump("bytes written",&r->buffer[r->buffer_offset],bytes);
|
2011-12-22 17:55:18 +00:00
|
|
|
r->buffer_offset+=bytes;
|
2012-06-27 07:24:42 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
// reset inactivity timer
|
2012-07-30 07:52:38 +00:00
|
|
|
r->alarm.alarm = gettime_ms()+RHIZOME_IDLE_TIMEOUT;
|
2012-07-12 00:45:16 +00:00
|
|
|
r->alarm.deadline = r->alarm.alarm+RHIZOME_IDLE_TIMEOUT;
|
2012-07-02 03:49:54 +00:00
|
|
|
unschedule(&r->alarm);
|
|
|
|
schedule(&r->alarm);
|
|
|
|
|
2011-12-22 17:55:18 +00:00
|
|
|
if (r->buffer_offset>=r->buffer_length) {
|
2012-06-27 07:24:42 +00:00
|
|
|
/* Buffer's cleared */
|
2012-01-02 22:27:52 +00:00
|
|
|
r->request_type&=~RHIZOME_HTTP_REQUEST_FROMBUFFER;
|
2012-01-03 04:15:50 +00:00
|
|
|
r->buffer_offset=0; r->buffer_length=0;
|
2011-12-22 17:55:18 +00:00
|
|
|
}
|
2012-06-27 07:24:42 +00:00
|
|
|
|
|
|
|
// go around the loop again to work out what we should do next
|
|
|
|
continue;
|
|
|
|
|
2011-12-22 17:55:18 +00:00
|
|
|
}
|
2012-01-02 22:27:52 +00:00
|
|
|
|
2012-06-27 07:24:42 +00:00
|
|
|
switch(r->request_type&(~RHIZOME_HTTP_REQUEST_FROMBUFFER))
|
2012-01-03 04:15:50 +00:00
|
|
|
{
|
2012-06-27 07:24:42 +00:00
|
|
|
case RHIZOME_HTTP_REQUEST_FAVICON:
|
|
|
|
if (r->buffer_size<favicon_len) {
|
|
|
|
free(r->buffer);
|
|
|
|
r->buffer_size=0;
|
|
|
|
r->buffer=malloc(favicon_len);
|
|
|
|
if (!r->buffer) r->request_type=0;
|
2012-01-13 10:43:17 +00:00
|
|
|
}
|
2012-06-27 07:24:42 +00:00
|
|
|
if (r->buffer)
|
2012-01-13 10:43:17 +00:00
|
|
|
{
|
2012-06-27 07:24:42 +00:00
|
|
|
int i;
|
|
|
|
for(i=0;i<favicon_len;i++)
|
|
|
|
r->buffer[i]=favicon_bytes[i];
|
|
|
|
r->buffer_length=i;
|
2012-07-13 01:36:10 +00:00
|
|
|
if (debug & DEBUG_RHIZOME_TX)
|
2012-07-12 07:12:41 +00:00
|
|
|
DEBUGF("favicon buffer_length=%d\n", r->buffer_length);
|
2012-06-27 07:24:42 +00:00
|
|
|
r->request_type=RHIZOME_HTTP_REQUEST_FROMBUFFER;
|
2012-01-13 10:43:17 +00:00
|
|
|
}
|
2012-06-27 07:24:42 +00:00
|
|
|
break;
|
|
|
|
case RHIZOME_HTTP_REQUEST_BLOB:
|
2012-01-13 10:43:17 +00:00
|
|
|
{
|
2012-06-27 07:24:42 +00:00
|
|
|
/* Get more data from the file and put it in the buffer */
|
|
|
|
int read_size = 65536;
|
|
|
|
if (r->blob_end-r->source_index < read_size)
|
|
|
|
read_size = r->blob_end-r->source_index;
|
|
|
|
|
2012-01-13 10:43:17 +00:00
|
|
|
r->request_type=0;
|
2012-06-27 07:24:42 +00:00
|
|
|
if (read_size>0){
|
|
|
|
|
|
|
|
if (r->buffer_size < read_size) {
|
|
|
|
if (r->buffer)
|
|
|
|
free(r->buffer);
|
|
|
|
r->buffer=malloc(read_size);
|
|
|
|
if (!r->buffer) {
|
2012-07-12 07:12:41 +00:00
|
|
|
WHY_perror("malloc");
|
2012-06-27 07:24:42 +00:00
|
|
|
r->request_type=0; break;
|
|
|
|
}
|
|
|
|
r->buffer_size=read_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(sqlite3_blob_read(r->blob,&r->buffer[0],read_size,r->source_index)
|
|
|
|
==SQLITE_OK)
|
|
|
|
{
|
|
|
|
r->buffer_length = read_size;
|
|
|
|
r->source_index+=read_size;
|
|
|
|
r->request_type|=RHIZOME_HTTP_REQUEST_FROMBUFFER;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (r->source_index >= r->blob_end){
|
|
|
|
sqlite3_blob_close(r->blob);
|
|
|
|
r->blob=0;
|
|
|
|
}else
|
|
|
|
r->request_type|=RHIZOME_HTTP_REQUEST_BLOB;
|
2012-01-13 10:43:17 +00:00
|
|
|
}
|
2012-06-27 07:24:42 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
WHY("sending data from this type of HTTP request not implemented");
|
|
|
|
r->request_type=0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
if (!r->request_type) return rhizome_server_free_http_request(r);
|
2012-01-02 22:27:52 +00:00
|
|
|
return 1;
|
|
|
|
}
|