Implement Expect: 100-continue
This commit is contained in:
@ -387,6 +387,14 @@ int http_send_request(sock *server, http_req *req) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
int http_send_100_continue(sock *client) {
|
||||
char buf[256];
|
||||
char date_buf[64];
|
||||
int size = sprintf(buf, "HTTP/1.1 100 Continue\r\nDate: %s\r\nServer: " SERVER_STR "\r\n\r\n",
|
||||
http_get_date(date_buf, sizeof(date_buf)));
|
||||
return sock_send_x(client, buf, size, 0) == -1 ? -1 : 0;
|
||||
}
|
||||
|
||||
const http_status *http_get_status(status_code_t status_code) {
|
||||
for (int i = 0; i < http_statuses_size; i++) {
|
||||
if (http_statuses[i].code == status_code) {
|
||||
|
@ -174,6 +174,8 @@ int http_send_response(sock *client, http_res *res);
|
||||
|
||||
int http_send_request(sock *server, http_req *req);
|
||||
|
||||
int http_send_100_continue(sock *client);
|
||||
|
||||
const http_status *http_get_status(status_code_t status_code);
|
||||
|
||||
const http_status_msg *http_get_error_msg(status_code_t status_code);
|
||||
|
153
src/lib/proxy.c
153
src/lib/proxy.c
@ -440,35 +440,74 @@ int proxy_init(proxy_ctx_t **proxy_ptr, http_req *req, http_res *res, http_statu
|
||||
break;
|
||||
}
|
||||
|
||||
const char *content_length = http_get_header_field(&req->hdr, "Content-Length");
|
||||
unsigned long content_len = content_length != NULL ? strtoul(content_length, NULL, 10) : 0;
|
||||
const char *transfer_encoding = http_get_header_field(&req->hdr, "Transfer-Encoding");
|
||||
|
||||
ret = 0;
|
||||
if (content_len > 0) {
|
||||
ret = sock_splice(&proxy->proxy, client, buffer, sizeof(buffer), content_len);
|
||||
} else if (strcontains(transfer_encoding, "chunked")) {
|
||||
ret = sock_splice_chunked(&proxy->proxy, client, buffer, sizeof(buffer), SOCK_CHUNKED);
|
||||
}
|
||||
|
||||
if (ret < 0 || (content_len != 0 && ret != content_len)) {
|
||||
if (ret == -1 && errno != EPROTO) {
|
||||
res->status = http_get_status(502);
|
||||
ctx->origin = SERVER_REQ;
|
||||
error("Unable to send request to server (2)");
|
||||
sprintf(err_msg, "Unable to send request to server: %s.", error_str(errno, err_buf, sizeof(err_buf)));
|
||||
return -1;
|
||||
} else if (ret == -1) {
|
||||
res->status = http_get_status(400);
|
||||
ctx->origin = CLIENT_REQ;
|
||||
error("Unable to receive request from client");
|
||||
sprintf(err_msg, "Unable to receive request from client: %s.", error_str(errno, err_buf, sizeof(err_buf)));
|
||||
const char *client_expect = http_get_header_field(&req->hdr, "Expect");
|
||||
int expect_100_continue = (client_expect != NULL && strcasecmp(client_expect, "100-continue") == 0);
|
||||
int ignore_content = 0;
|
||||
if (expect_100_continue) {
|
||||
http_res tmp_res = {
|
||||
.version = "1.1",
|
||||
.status = http_get_status(501),
|
||||
};
|
||||
if (http_init_hdr(&tmp_res.hdr) != 0) {
|
||||
res->status = http_get_status(500);
|
||||
ctx->origin = INTERNAL;
|
||||
error("Unable to initialize http header");
|
||||
return -1;
|
||||
}
|
||||
|
||||
ret = proxy_peek_response(proxy, &tmp_res, ctx, custom_status, err_msg);
|
||||
if (ret < 0)
|
||||
return (int) ret;
|
||||
|
||||
if (tmp_res.status->code == 100) {
|
||||
if (sock_recv_x(&proxy->proxy, buffer, ret, 0) == -1) {
|
||||
res->status = http_get_status(502);
|
||||
ctx->origin = SERVER_RES;
|
||||
error("Unable to receive from server");
|
||||
return -1;
|
||||
}
|
||||
if (http_send_response(client, &tmp_res) != 0) {
|
||||
res->status = http_get_status(400);
|
||||
ctx->origin = CLIENT_RES;
|
||||
error("Unable to send to client");
|
||||
return -1;
|
||||
}
|
||||
} else {
|
||||
ignore_content = 1;
|
||||
}
|
||||
}
|
||||
|
||||
if (!ignore_content) {
|
||||
const char *content_length = http_get_header_field(&req->hdr, "Content-Length");
|
||||
unsigned long content_len = content_length != NULL ? strtoul(content_length, NULL, 10) : 0;
|
||||
const char *transfer_encoding = http_get_header_field(&req->hdr, "Transfer-Encoding");
|
||||
|
||||
ret = 0;
|
||||
if (content_len > 0) {
|
||||
ret = sock_splice(&proxy->proxy, client, buffer, sizeof(buffer), content_len);
|
||||
} else if (strcontains(transfer_encoding, "chunked")) {
|
||||
ret = sock_splice_chunked(&proxy->proxy, client, buffer, sizeof(buffer), SOCK_CHUNKED);
|
||||
}
|
||||
|
||||
if (ret < 0 || (content_len != 0 && ret != content_len)) {
|
||||
if (ret == -1 && errno != EPROTO) {
|
||||
res->status = http_get_status(502);
|
||||
ctx->origin = SERVER_REQ;
|
||||
error("Unable to send request to server (2)");
|
||||
sprintf(err_msg, "Unable to send request to server: %s.", error_str(errno, err_buf, sizeof(err_buf)));
|
||||
return -1;
|
||||
} else if (ret == -1) {
|
||||
res->status = http_get_status(400);
|
||||
ctx->origin = CLIENT_REQ;
|
||||
error("Unable to receive request from client");
|
||||
sprintf(err_msg, "Unable to receive request from client: %s.", error_str(errno, err_buf, sizeof(err_buf)));
|
||||
return -1;
|
||||
}
|
||||
res->status = http_get_status(500);
|
||||
ctx->origin = INTERNAL;
|
||||
error("Unknown Error");
|
||||
return -1;
|
||||
}
|
||||
res->status = http_get_status(500);
|
||||
ctx->origin = INTERNAL;
|
||||
error("Unknown Error");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (sock_set_socket_timeout(&proxy->proxy, SERVER_SOCKET_TIMEOUT_RES) != 0) {
|
||||
@ -478,6 +517,48 @@ int proxy_init(proxy_ctx_t **proxy_ptr, http_req *req, http_res *res, http_statu
|
||||
return -1;
|
||||
}
|
||||
|
||||
while (1) {
|
||||
ret = proxy_peek_response(proxy, res, ctx, custom_status, err_msg);
|
||||
if (ret < 0) {
|
||||
return (int) ret;
|
||||
} else if (sock_recv_x(&proxy->proxy, buffer, ret, 0) == -1) {
|
||||
res->status = http_get_status(502);
|
||||
ctx->origin = SERVER_RES;
|
||||
error("Unable to receive from server");
|
||||
return -1;
|
||||
}
|
||||
if (res->status->code == 100) {
|
||||
if (http_send_response(client, res) != 0) {
|
||||
res->status = http_get_status(400);
|
||||
ctx->origin = CLIENT_RES;
|
||||
error("Unable to send to client");
|
||||
return -1;
|
||||
}
|
||||
} else {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
long keep_alive_timeout = http_get_keep_alive_timeout(&res->hdr);
|
||||
proxy->http_timeout = (keep_alive_timeout > 0) ? keep_alive_timeout * 1000000 : 0;
|
||||
|
||||
connection = http_get_header_field(&res->hdr, "Connection");
|
||||
proxy->close = !streq(res->version, "1.1") || strcontains(connection, "close") || strcontains(connection, "Close");
|
||||
|
||||
ret = proxy_response_header(req, res, conf);
|
||||
if (ret != 0) {
|
||||
res->status = http_get_status(500);
|
||||
ctx->origin = INTERNAL;
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int proxy_peek_response(proxy_ctx_t *proxy, http_res *res, http_status_ctx *ctx, http_status *custom_status, char *err_msg) {
|
||||
char buffer[CHUNK_SIZE], err_buf[256];
|
||||
long ret;
|
||||
|
||||
ret = sock_recv(&proxy->proxy, buffer, sizeof(buffer) - 1, MSG_PEEK);
|
||||
if (ret <= 0) {
|
||||
int e_sys = error_get_sys(), e_ssl = error_get_ssl();
|
||||
@ -569,23 +650,7 @@ int proxy_init(proxy_ctx_t **proxy_ptr, http_req *req, http_res *res, http_statu
|
||||
}
|
||||
ptr = pos0 + 2;
|
||||
}
|
||||
if (sock_recv_x(&proxy->proxy, buffer, header_len, 0) == -1)
|
||||
return -1;
|
||||
|
||||
long keep_alive_timeout = http_get_keep_alive_timeout(&res->hdr);
|
||||
proxy->http_timeout = (keep_alive_timeout > 0) ? keep_alive_timeout * 1000000 : 0;
|
||||
|
||||
connection = http_get_header_field(&res->hdr, "Connection");
|
||||
proxy->close = !streq(res->version, "1.1") || strcontains(connection, "close") || strcontains(connection, "Close");
|
||||
|
||||
ret = proxy_response_header(req, res, conf);
|
||||
if (ret != 0) {
|
||||
res->status = http_get_status(500);
|
||||
ctx->origin = INTERNAL;
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
return header_len;
|
||||
}
|
||||
|
||||
int proxy_send(proxy_ctx_t *proxy, sock *client, unsigned long len_to_send, int flags) {
|
||||
|
@ -43,6 +43,8 @@ int proxy_response_header(http_req *req, http_res *res, host_config_t *conf);
|
||||
|
||||
int proxy_init(proxy_ctx_t **proxy, http_req *req, http_res *res, http_status_ctx *ctx, host_config_t *conf, sock *client, http_status *custom_status, char *err_msg);
|
||||
|
||||
int proxy_peek_response(proxy_ctx_t *proxy, http_res *res, http_status_ctx *ctx, http_status *custom_status, char *err_msg);
|
||||
|
||||
int proxy_send(proxy_ctx_t *proxy, sock *client, unsigned long len_to_send, int flags);
|
||||
|
||||
int proxy_dump(proxy_ctx_t *proxy, char *buf, long len);
|
||||
|
@ -211,15 +211,8 @@ long sock_send(sock *s, void *buf, unsigned long len, int flags) {
|
||||
|
||||
long ret;
|
||||
if (s->enc) {
|
||||
while (1) {
|
||||
ret = SSL_write(s->ssl, buf, (int) len);
|
||||
if (ret <= 0) {
|
||||
sock_error(s, (int) ret);
|
||||
if (error_get_ssl() == SSL_ERROR_WANT_WRITE)
|
||||
continue;
|
||||
}
|
||||
break;
|
||||
}
|
||||
ret = SSL_write(s->ssl, buf, (int) len);
|
||||
if (ret <= 0) sock_error(s, (int) ret);
|
||||
} else if (s->pipe) {
|
||||
if (flags & ~MSG_MORE) {
|
||||
errno = EINVAL;
|
||||
@ -262,15 +255,8 @@ long sock_recv(sock *s, void *buf, unsigned long len, int flags) {
|
||||
long ret;
|
||||
if (s->enc) {
|
||||
int (*func)(SSL *, void *, int) = (flags & MSG_PEEK) ? SSL_peek : SSL_read;
|
||||
while (1) {
|
||||
ret = func(s->ssl, buf, (int) len);
|
||||
if (ret <= 0) {
|
||||
sock_error(s, (int) ret);
|
||||
if (error_get_ssl() == SSL_ERROR_WANT_READ)
|
||||
continue;
|
||||
}
|
||||
break;
|
||||
}
|
||||
ret = func(s->ssl, buf, (int) len);
|
||||
if (ret <= 0) sock_error(s, (int) ret);
|
||||
} else if (s->pipe) {
|
||||
if (flags & ~MSG_WAITALL) {
|
||||
errno = EINVAL;
|
||||
|
@ -77,13 +77,32 @@ static int fastcgi_handler_1(client_ctx_t *ctx, fastcgi_cnx_t **fcgi_cnx) {
|
||||
(*fcgi_cnx) = &fcgi_cnx_buf;
|
||||
fastcgi_handle_connection(ctx, fcgi_cnx);
|
||||
|
||||
int expect_100_continue = 0;
|
||||
const char *client_expect = http_get_header_field(&req->hdr, "Expect");
|
||||
if (client_expect != NULL && strcasecmp(client_expect, "100-continue") == 0) {
|
||||
expect_100_continue = 1;
|
||||
} else if (client_expect != NULL) {
|
||||
fastcgi_close_cnx((&fcgi_cnx_buf));
|
||||
res->status = http_get_status(417);
|
||||
return 3;
|
||||
}
|
||||
const char *client_content_length = http_get_header_field(&req->hdr, "Content-Length");
|
||||
const char *client_transfer_encoding = http_get_header_field(&req->hdr, "Transfer-Encoding");
|
||||
if (client_content_length != NULL) {
|
||||
if (expect_100_continue) {
|
||||
http_send_100_continue(client);
|
||||
}
|
||||
unsigned long client_content_len = strtoul(client_content_length, NULL, 10);
|
||||
ret = fastcgi_receive(*fcgi_cnx, client, client_content_len);
|
||||
} else if (strcontains(client_transfer_encoding, "chunked")) {
|
||||
if (expect_100_continue) {
|
||||
http_send_100_continue(client);
|
||||
}
|
||||
ret = fastcgi_receive_chunked(*fcgi_cnx, client);
|
||||
} else if (expect_100_continue) {
|
||||
fastcgi_close_cnx((&fcgi_cnx_buf));
|
||||
res->status = http_get_status(417);
|
||||
return 3;
|
||||
} else {
|
||||
ret = 0;
|
||||
}
|
||||
|
@ -159,6 +159,12 @@ static int local_handler(client_ctx_t *ctx) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
const char *client_expect = http_get_header_field(&req->hdr, "Expect");
|
||||
if (client_expect != NULL) {
|
||||
res->status = http_get_status(417);
|
||||
return 0;
|
||||
}
|
||||
|
||||
res->status = http_get_status(200);
|
||||
cache_init_uri(ctx->conf->cache, uri);
|
||||
|
||||
|
Reference in New Issue
Block a user