Compare commits
	
		
			79 Commits
		
	
	
		
			69dfc562af
			...
			stable-4
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 081af44eba | |||
| 782c7440b0 | |||
| 88346fe722 | |||
| 0f75aeea7a | |||
| 933aac0f09 | |||
| 7f1299feb4 | |||
| 8435048150 | |||
| 206ae3264d | |||
| 5e050512ad | |||
| db053121f2 | |||
| 89a9d4b9d6 | |||
| bc7c3591a2 | |||
| 1859c432c8 | |||
| 33ec943e8b | |||
| b30f9fa56d | |||
| 90e324cf87 | |||
| e7e1e7b18f | |||
| 63b1ca5d6a | |||
| 54313551fc | |||
| 92779e5dba | |||
| 100eb1597d | |||
| f4c3345445 | |||
| 893316ebfa | |||
| 6a511732af | |||
| bb895c5bca | |||
| a2f4bf57e0 | |||
| 635271ec50 | |||
| 2b4569aabe | |||
| f361fce561 | |||
| c92742275a | |||
| 041e4d43a7 | |||
| 170337d4d5 | |||
| f0b27b3b37 | |||
| ee8aedce91 | |||
| 0648c75baa | |||
| b6ba58d406 | |||
| abe0e326cb | |||
| 4fe067ed7d | |||
| 41e12d6293 | |||
| a738f1abfe | |||
| b6309eec39 | |||
| 9923a76ba7 | |||
| ea4cdff233 | |||
| 6526b5cbcb | |||
| 0119945e03 | |||
| 3fe1fe023a | |||
| bc1c6d3498 | |||
| 50bb537074 | |||
| c060ee5bb6 | |||
| 4062883cb3 | |||
| e0e44e9c26 | |||
| f0d8a3db4c | |||
| 557e176d3d | |||
| cd3bc9aa90 | |||
| 6ab65abec9 | |||
| 7d6fa4682d | |||
| 6f4cbb6e24 | |||
| 174865b71c | |||
| 4a002d6c31 | |||
| 2a3f74e825 | |||
| 9eaa644fa1 | |||
| ce91fecc80 | |||
| 15c160a60a | |||
| fd5e2302d4 | |||
| 8c13eecc51 | |||
| ae751925fa | |||
| a1fee3d2ec | |||
| 8721f07d00 | |||
| 81ad3fea3c | |||
| 877ee12351 | |||
| dfbe3bbb95 | |||
| 6c13922f2f | |||
| 171bca55fa | |||
| fe0cdc9b1a | |||
| 930d4db2a2 | |||
| b37757fc73 | |||
| 61c645eca8 | |||
| 2fd71116ec | |||
| 495a3a6aaf | 
							
								
								
									
										6
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										6
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -1,8 +1,10 @@ | ||||
| * | ||||
| !src | ||||
| !src/** | ||||
| !docs | ||||
| !docs/** | ||||
| !doc | ||||
| !doc/** | ||||
| !test | ||||
| !test/** | ||||
| !Makefile | ||||
| !.gitignore | ||||
| !README.md | ||||
|   | ||||
							
								
								
									
										97
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										97
									
								
								Makefile
									
									
									
									
									
								
							| @@ -1,26 +1,85 @@ | ||||
|  | ||||
| CC=gcc | ||||
| CFLAGS=-std=gnu11 -Wall | ||||
| LIBS=-lssl -lcrypto -lmagic -lz -lmaxminddb -lbrotlienc | ||||
| CFLAGS=-std=gnu11 -Wno-unused-but-set-variable -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_SVID_SOURCE -D_POSIX_C_SOURCE=200809L | ||||
| LDFLAGS=-lssl -lcrypto -lmagic -lz -lmaxminddb -lbrotlienc | ||||
|  | ||||
| DEBIAN_OPTS=-D CACHE_MAGIC_FILE="\"/usr/share/file/magic.mgc\"" -D PHP_FPM_SOCKET="\"/var/run/php/php7.4-fpm.sock\"" | ||||
| DEBIAN_OPTS=-D CACHE_MAGIC_FILE="\"/usr/share/file/magic.mgc\"" -D PHP_FPM_SOCKET="\"/var/run/php/php8.2-fpm.sock\"" | ||||
|  | ||||
| .PHONY: all prod debug default debian permit clean test | ||||
| all: prod | ||||
| default: bin bin/lib bin/sesimos | ||||
|  | ||||
| prod: CFLAGS += -O3 | ||||
| prod: default | ||||
|  | ||||
| debug: CFLAGS += -Wall -pedantic | ||||
| debug: default | ||||
|  | ||||
| debian: CFLAGS += $(DEBIAN_OPTS) | ||||
| debian: prod | ||||
|  | ||||
| test: CFLAGS += -include test/mock_*.h | ||||
| test: bin bin/test | ||||
| 	bin/test | ||||
|  | ||||
|  | ||||
| bin: | ||||
| 	mkdir -p bin | ||||
|  | ||||
| bin/lib: | ||||
| 	mkdir -p bin/lib | ||||
|  | ||||
|  | ||||
| bin/test: test/mock_*.c test/test_*.c src/lib/utils.c src/lib/sock.c | ||||
| 	$(CC) -o $@ $(CFLAGS) $^ -lcriterion | ||||
|  | ||||
|  | ||||
| bin/%.o: src/%.c | ||||
| 	$(CC) -c -o $@ $(CFLAGS) $< | ||||
|  | ||||
| bin/lib/%.o: src/lib/%.c | ||||
| 	$(CC) -c -o $@ $(CFLAGS) $< | ||||
|  | ||||
| bin/sesimos: bin/server.o bin/client.o \ | ||||
| 			 bin/lib/cache.o bin/lib/compress.o bin/lib/config.o bin/lib/fastcgi.o bin/lib/geoip.o \ | ||||
| 			 bin/lib/http.o bin/lib/http_static.o bin/lib/rev_proxy.o bin/lib/sock.o bin/lib/uri.o \ | ||||
| 		     bin/lib/utils.o bin/lib/websocket.o | ||||
| 	$(CC) -o $@ $^ $(CFLAGS) $(LDFLAGS) | ||||
|  | ||||
|  | ||||
| bin/server.o: src/server.h src/defs.h src/client.h src/lib/cache.h src/lib/config.h src/lib/sock.h \ | ||||
|               src/lib/rev_proxy.h src/lib/geoip.h src/lib/utils.h | ||||
|  | ||||
| bin/client.o: src/client.h src/defs.h src/server.h src/lib/utils.h src/lib/config.h src/lib/sock.h \ | ||||
|               src/lib/http.h src/lib/rev_proxy.h src/lib/fastcgi.h src/lib/cache.h src/lib/geoip.h src/lib/compress.h \ | ||||
|               src/lib/websocket.h | ||||
|  | ||||
| bin/lib/cache.o: src/lib/cache.h src/lib/utils.h src/lib/uri.h src/lib/compress.h | ||||
|  | ||||
| bin/lib/compress.o: src/lib/compress.h | ||||
|  | ||||
| bin/lib/config.o: src/lib/config.h src/lib/utils.h src/lib/uri.h | ||||
|  | ||||
| bin/lib/fastcgi.o: src/lib/fastcgi.h src/server.h src/lib/utils.h src/lib/compress.h src/lib/http.h \ | ||||
|                    src/lib/uri.h src/lib/include/fastcgi.h | ||||
|  | ||||
| bin/lib/geoip.o: src/lib/geoip.h | ||||
|  | ||||
| bin/lib/http.o: src/lib/http.h src/lib/utils.h src/lib/compress.h src/lib/sock.h | ||||
|  | ||||
| bin/lib/rev_proxy.o: src/lib/rev_proxy.h src/defs.h src/server.h src/lib/compress.h | ||||
|  | ||||
| bin/lib/sock.o: src/lib/sock.h | ||||
|  | ||||
| bin/lib/uri.o: src/lib/uri.h src/lib/utils.h | ||||
|  | ||||
| bin/lib/utils.o: src/lib/utils.h | ||||
|  | ||||
| bin/lib/websocket.o: src/lib/websocket.h src/defs.h src/lib/utils.h src/lib/sock.h | ||||
|  | ||||
| packages: | ||||
| 	@echo "Installing packages..." | ||||
| 	sudo apt install gcc php-fpm libmagic-dev libssl-dev libmaxminddb-dev | ||||
| 	@echo "Finished downloading!" | ||||
|  | ||||
| permit: | ||||
| 	sudo setcap 'cap_net_bind_service=+ep' "$(shell pwd)/bin/necronda-server" | ||||
| 	sudo setcap 'cap_net_bind_service=+ep' "$(shell pwd)/bin/sesimos" | ||||
|  | ||||
| compile: | ||||
| 	@mkdir -p bin | ||||
| 	$(CC) src/lib/*.c -o bin/libnecrondaserver.so --shared -fPIC $(CFLAGS) $(LIBS) | ||||
| 	$(CC) src/necronda-server.c -o bin/necronda-server $(CFLAGS) $(LIBS) \ | ||||
| 		-Lbin -lnecronda-server -Wl,-rpath=$(shell pwd)/bin | ||||
|  | ||||
| compile-prod: | ||||
| 	@mkdir -p bin | ||||
| 	$(CC) src/lib/*.c -o bin/libnecrondaserver.so --shared -fPIC $(CFLAGS) $(LIBS) $(DEBIAN_OPTS) -O3 | ||||
| 	$(CC) src/necronda-server.c -o bin/necronda-server $(CFLAGS) $(LIBS) $(DEBIAN_OPTS) -O3 \ | ||||
| 		-Lbin -lnecrondaserver -Wl,-rpath=$(shell pwd)/bin | ||||
| clean: | ||||
| 	rm -rf bin/* | ||||
|   | ||||
							
								
								
									
										44
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										44
									
								
								README.md
									
									
									
									
									
								
							| @@ -1,14 +1,18 @@ | ||||
|  | ||||
| Necronda web server | ||||
| =================== | ||||
| Sesimos – Secure, simple, modern web server | ||||
| =========================================== | ||||
|  | ||||
| ## Features | ||||
|  | ||||
| * Full IPv4 and IPv6 support | ||||
| * TLS Server Name Inspection (SNI) | ||||
| * Serving local files via HTTP and HTTPS | ||||
|   * File compression ([gzip](https://www.gzip.org/), [Brotli](https://www.brotli.org/)) and disk cache for compressed files | ||||
|   * File compression ([gzip](https://www.gzip.org/), [Brotli](https://www.brotli.org/)) | ||||
|   * Disk cache for compressed files | ||||
| * Reverse proxy for other HTTP and HTTPS servers | ||||
|   * Transparent WebSocket reverse proxy | ||||
| * FastCGI support (e.g. [PHP-FPM](https://php-fpm.org/)) | ||||
|   * Automatic path info detection (e.g. `/my/file/extra/path` -> script: `/my/file.php`, path info: `extra/path`) | ||||
| * Support for [MaxMind's GeoIP Database](https://www.maxmind.com/en/geoip2-services-and-databases) | ||||
| * Optional DNS reverse lookup for connecting hosts | ||||
| * Automatic URL rewrite (e.g. `/index.html` -> `/`, `/test.php` -> `/test`) | ||||
| @@ -17,28 +21,30 @@ Necronda web server | ||||
|  | ||||
| ## Configuration | ||||
|  | ||||
| See [docs/example.conf](docs/example.conf) for more details. | ||||
| See [doc/example.conf](doc/example.conf) for more details. | ||||
|  | ||||
|  | ||||
| ### Global directives | ||||
|  | ||||
| * `certificate` - path to SSL certificate (or certificate chain) | ||||
| * `private_key` - path to SSL private key | ||||
| * `geoip_dir` (optional) - path to a directory containing GeoIP databases | ||||
| * `dns_server` (optional) - address of a DNS server | ||||
|  | ||||
|  | ||||
| ### Virtual host configuration | ||||
| ### Configuration | ||||
|  | ||||
| * `[<host>]` - begins section for the virtual host `<host>` | ||||
| * Local | ||||
|     * `webroot` - path to the root directory | ||||
|     * `dir_mode` - specify the behaviour for directories without an `index.html` or `index.php` | ||||
|         * `forbidden` - the server will respond with `403 Forbidden` | ||||
|         * `info` - try passing *path info* to an upper `.php` file. | ||||
|         * `list` - list contents of directory (**not implemented yet**) | ||||
| * Reverse proxy | ||||
|     * `hostname` - hostname of server to be reverse proxy of | ||||
|     * `port` - port to be used | ||||
|     * `http` - use HTTP to communicate with server | ||||
|     * `https` - use HTTPS to communicate with server | ||||
| * `[cert <cert-name>]` - begins section for a certificate | ||||
|   * `certificate` - path to SSL certificate (or certificate chain) | ||||
|   * `private_key` - path to SSL private key | ||||
| * `[host <host>]` - begins section for the virtual host `<host>` | ||||
|   * `cert` - the name of the certificate to use | ||||
|   * Local | ||||
|       * `webroot` - path to the root directory | ||||
|       * `dir_mode` - specify the behaviour for directories without an `index.html` or `index.php` | ||||
|           * `forbidden` - the server will respond with `403 Forbidden` | ||||
|           * `info` - try passing *path info* to an upper `.php` file. | ||||
|           * `list` - list contents of directory (**not implemented yet**) | ||||
|   * Reverse proxy | ||||
|       * `hostname` - hostname of server to be reverse proxy of | ||||
|       * `port` - port to be used | ||||
|       * `http` - use HTTP to communicate with server | ||||
|       * `https` - use HTTPS to communicate with server | ||||
|   | ||||
| @@ -1,19 +1,24 @@ | ||||
| 
 | ||||
| certificate /var/cert/cert.pem | ||||
| private_key /var/cert/cert.key | ||||
| #geoip_dir  /var/dir | ||||
| #dns_server 192.168.0.1 | ||||
| 
 | ||||
| [localhost] | ||||
| [cert cert1] | ||||
| certificate /var/cert/cert.pem | ||||
| private_key /var/cert/cert.key | ||||
| 
 | ||||
| [host localhost] | ||||
| webroot     /var/www/localhost | ||||
| dir_mode    forbidden | ||||
| cert        cert1 | ||||
| 
 | ||||
| [me.local] | ||||
| [host me.local] | ||||
| hostname    www.example.com | ||||
| port        80 | ||||
| cert        cert1 | ||||
| http | ||||
| 
 | ||||
| [secure.local] | ||||
| [host secure.local] | ||||
| hostname    www.example.com | ||||
| port        443 | ||||
| cert        cert1 | ||||
| https | ||||
							
								
								
									
										311
									
								
								src/client.c
									
									
									
									
									
								
							
							
						
						
									
										311
									
								
								src/client.c
									
									
									
									
									
								
							| @@ -1,10 +1,15 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Client connection and request handlers | ||||
|  * src/client.c | ||||
|  * Lorenz Stechauner, 2020-12-03 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Client connection and request handlers | ||||
|  * @file src/client.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-03 | ||||
|  */ | ||||
|  | ||||
| #include "defs.h" | ||||
| #include "client.h" | ||||
| #include "server.h" | ||||
|  | ||||
| #include "lib/utils.h" | ||||
| #include "lib/config.h" | ||||
| #include "lib/sock.h" | ||||
| @@ -14,9 +19,9 @@ | ||||
| #include "lib/cache.h" | ||||
| #include "lib/geoip.h" | ||||
| #include "lib/compress.h" | ||||
| #include "lib/websocket.h" | ||||
|  | ||||
| #include <string.h> | ||||
| #include <sys/select.h> | ||||
| #include <errno.h> | ||||
| #include <unistd.h> | ||||
| #include <openssl/ssl.h> | ||||
| @@ -24,71 +29,70 @@ | ||||
| #include <signal.h> | ||||
| #include <arpa/inet.h> | ||||
|  | ||||
| int server_keep_alive = 1; | ||||
|  | ||||
| volatile sig_atomic_t server_keep_alive = 1; | ||||
| struct timeval client_timeout = {.tv_sec = CLIENT_TIMEOUT, .tv_usec = 0}; | ||||
|  | ||||
| int server_keep_alive; | ||||
| char *log_client_prefix, *log_conn_prefix, *log_req_prefix, *client_geoip; | ||||
| char *client_addr_str, *client_addr_str_ptr, *server_addr_str, *server_addr_str_ptr, *client_host_str; | ||||
| struct timeval client_timeout; | ||||
|  | ||||
| host_config *get_host_config(const char *host) { | ||||
|     for (int i = 0; i < CONFIG_MAX_HOST_CONFIG; i++) { | ||||
|         host_config *hc = &config[i]; | ||||
|         host_config *hc = &config->hosts[i]; | ||||
|         if (hc->type == CONFIG_TYPE_UNSET) break; | ||||
|         if (strcmp(hc->name, host) == 0) return hc; | ||||
|         if (hc->name[0] == '*' && hc->name[1] == '.') { | ||||
|             const char *pos = strstr(host, hc->name + 1); | ||||
|             if (pos != NULL && strlen(pos) == strlen(hc->name + 1)) return hc; | ||||
|         } | ||||
|     } | ||||
|     return NULL; | ||||
| } | ||||
|  | ||||
| void client_terminate() { | ||||
| void client_terminate(int _) { | ||||
|     server_keep_alive = 0; | ||||
| } | ||||
|  | ||||
| int client_websocket_handler() { | ||||
|     // TODO implement client_websocket_handler | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int client_request_handler(sock *client, unsigned long client_num, unsigned int req_num) { | ||||
|     struct timespec begin, end; | ||||
|     long ret; | ||||
|     int client_keep_alive; | ||||
|  | ||||
|     char buf0[1024], buf1[1024]; | ||||
|     char msg_buf[4096], msg_pre_buf[4096], err_msg[256]; | ||||
|     char msg_buf[8192], msg_pre_buf_1[4096], msg_pre_buf_2[4096], err_msg[256]; | ||||
|     char msg_content[1024]; | ||||
|     char buffer[CHUNK_SIZE]; | ||||
|     err_msg[0] = 0; | ||||
|     char host[256], *host_ptr, *hdr_connection; | ||||
|     host_config *conf = NULL; | ||||
|     long content_length = 0; | ||||
|     FILE *file = NULL; | ||||
|     char host[256]; | ||||
|     const char *host_ptr, *hdr_connection; | ||||
|  | ||||
|     msg_buf[0] = 0; | ||||
|     err_msg[0] = 0; | ||||
|     msg_content[0] = 0; | ||||
|  | ||||
|     host_config *conf = NULL; | ||||
|     FILE *file = NULL; | ||||
|  | ||||
|     long content_length = 0; | ||||
|     int accept_if_modified_since = 0; | ||||
|     int use_fastcgi = 0; | ||||
|     int use_rev_proxy = 0; | ||||
|     int p_len; | ||||
|  | ||||
|     fastcgi_conn fcgi_conn = {.socket = 0, .req_id = 0}; | ||||
|     http_status custom_status; | ||||
|  | ||||
|     http_res res; | ||||
|     sprintf(res.version, "1.1"); | ||||
|     res.status = http_get_status(501); | ||||
|     res.hdr.field_num = 0; | ||||
|     http_res res = {.version = "1.1", .status = http_get_status(501), .hdr.field_num = 0, .hdr.last_field_num = -1}; | ||||
|     http_status_ctx ctx = {.status = 0, .origin = NONE, .ws_key = NULL}; | ||||
|  | ||||
|     clock_gettime(CLOCK_MONOTONIC, &begin); | ||||
|  | ||||
|     fd_set socket_fds; | ||||
|     FD_ZERO(&socket_fds); | ||||
|     FD_SET(client->socket, &socket_fds); | ||||
|     client_timeout.tv_sec = CLIENT_TIMEOUT; | ||||
|     client_timeout.tv_usec = 0; | ||||
|     ret = select(client->socket + 1, &socket_fds, NULL, NULL, &client_timeout); | ||||
|     ret = sock_poll_read(&client, NULL, NULL, 1, NULL, NULL, CLIENT_TIMEOUT * 1000); | ||||
|  | ||||
|     http_add_header_field(&res.hdr, "Date", http_get_date(buf0, sizeof(buf0))); | ||||
|     http_add_header_field(&res.hdr, "Server", SERVER_STR); | ||||
|     if (ret <= 0) { | ||||
|         if (errno != 0) { | ||||
|             return 1; | ||||
|         } | ||||
|         if (errno != 0) return 1; | ||||
|  | ||||
|         client_keep_alive = 0; | ||||
|         res.status = http_get_status(408); | ||||
|         goto respond; | ||||
| @@ -117,8 +121,7 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|     } | ||||
|  | ||||
|     hdr_connection = http_get_header_field(&req.hdr, "Connection"); | ||||
|     client_keep_alive = hdr_connection != NULL && | ||||
|                         (strcmp(hdr_connection, "keep-alive") == 0 || strcmp(hdr_connection, "Keep-Alive") == 0); | ||||
|     client_keep_alive = (hdr_connection != NULL && (strstr(hdr_connection, "keep-alive") != NULL || strstr(hdr_connection, "Keep-Alive") != NULL)); | ||||
|     host_ptr = http_get_header_field(&req.hdr, "Host"); | ||||
|     if (host_ptr != NULL && strlen(host_ptr) > 255) { | ||||
|         host[0] = 0; | ||||
| @@ -144,7 +147,7 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|  | ||||
|     conf = get_host_config(host); | ||||
|     if (conf == NULL) { | ||||
|         print("Host unknown, redirecting to default"); | ||||
|         print("Unknown host, redirecting to default"); | ||||
|         res.status = http_get_status(307); | ||||
|         sprintf(buf0, "https://%s%s", DEFAULT_HOST, req.uri); | ||||
|         http_add_header_field(&res.hdr, "Location", buf0); | ||||
| @@ -152,7 +155,7 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|     } | ||||
|  | ||||
|     http_uri uri; | ||||
|     unsigned char dir_mode = conf->type == CONFIG_TYPE_LOCAL ? conf->local.dir_mode : URI_DIR_MODE_NO_VALIDATION; | ||||
|     unsigned char dir_mode = (conf->type == CONFIG_TYPE_LOCAL ? conf->local.dir_mode : URI_DIR_MODE_NO_VALIDATION); | ||||
|     ret = uri_init(&uri, conf->local.webroot, req.uri, dir_mode); | ||||
|     if (ret != 0) { | ||||
|         if (ret == 1) { | ||||
| @@ -176,8 +179,7 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|         int change_proto = strncmp(uri.uri, "/.well-known/", 13) != 0 && !client->enc; | ||||
|         if (strcmp(uri.uri, buf0) != 0 || change_proto) { | ||||
|             res.status = http_get_status(308); | ||||
|             size = sizeof(buf0); | ||||
|             url_encode(uri.uri, buf0, &size); | ||||
|             size = url_encode(uri.uri, strlen(uri.uri), buf0, sizeof(buf0)); | ||||
|             if (change_proto) { | ||||
|                 p_len = snprintf(buf1, sizeof(buf1), "https://%s%s", host, buf0); | ||||
|                 if (p_len < 0 || p_len >= sizeof(buf1)) { | ||||
| @@ -198,22 +200,15 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|         goto respond; | ||||
|     } | ||||
|  | ||||
|     if (http_get_header_field(&req.hdr, "Transfer-Encoding") != NULL) { | ||||
|         sprintf(err_msg, "This server is unable to process requests with the Transfer-Encoding header field."); | ||||
|         res.status = http_get_status(501); | ||||
|         goto respond; | ||||
|     } | ||||
|  | ||||
|     if (conf->type == CONFIG_TYPE_LOCAL) { | ||||
|         if (strcmp(req.method, "TRACE") == 0) { | ||||
|             res.status = http_get_status(200); | ||||
|             http_add_header_field(&res.hdr, "Content-Type", "message/http"); | ||||
|  | ||||
|             content_length = snprintf(msg_buf, sizeof(msg_buf) - content_length, "%s %s HTTP/%s\r\n", | ||||
|                                       req.method, req.uri, req.version); | ||||
|             content_length = snprintf(msg_buf, sizeof(msg_buf) - content_length, "%s %s HTTP/%s\r\n", req.method, req.uri, req.version); | ||||
|             for (int i = 0; i < req.hdr.field_num; i++) { | ||||
|                 content_length += snprintf(msg_buf + content_length, sizeof(msg_buf) - content_length, "%s: %s\r\n", | ||||
|                                            req.hdr.fields[i][0], req.hdr.fields[i][1]); | ||||
|                 const http_field *f = &req.hdr.fields[i]; | ||||
|                 content_length += snprintf(msg_buf + content_length, sizeof(msg_buf) - content_length, "%s: %s\r\n", http_field_get_name(f), http_field_get_value(f)); | ||||
|             } | ||||
|  | ||||
|             goto respond; | ||||
| @@ -252,7 +247,7 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|                 goto respond; | ||||
|             } | ||||
|  | ||||
|             if (http_get_header_field(&req.hdr, "Content-Length") != NULL) { | ||||
|             if (http_get_header_field(&req.hdr, "Content-Length") != NULL || http_get_header_field(&req.hdr, "Transfer-Encoding") != NULL) { | ||||
|                 res.status = http_get_status(400); | ||||
|                 sprintf(err_msg, "A GET request must not contain a payload"); | ||||
|                 goto respond; | ||||
| @@ -264,13 +259,13 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|                 sprintf(err_msg, "Unable to communicate with internal file cache."); | ||||
|                 goto respond; | ||||
|             } | ||||
|             char *last_modified = http_format_date(uri.meta->stat.st_mtime, buf0, sizeof(buf0)); | ||||
|             const char *last_modified = http_format_date(uri.meta->stat.st_mtime, buf0, sizeof(buf0)); | ||||
|             http_add_header_field(&res.hdr, "Last-Modified", last_modified); | ||||
|             sprintf(buf1, "%s; charset=%s", uri.meta->type, uri.meta->charset); | ||||
|             http_add_header_field(&res.hdr, "Content-Type", buf1); | ||||
|  | ||||
|  | ||||
|             char *accept_encoding = http_get_header_field(&req.hdr, "Accept-Encoding"); | ||||
|             const char *accept_encoding = http_get_header_field(&req.hdr, "Accept-Encoding"); | ||||
|             int enc = 0; | ||||
|             if (accept_encoding != NULL) { | ||||
|                 if (uri.meta->filename_comp_br[0] != 0 && strstr(accept_encoding, "br") != NULL) { | ||||
| @@ -297,8 +292,7 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|  | ||||
|             if (uri.meta->etag[0] != 0) { | ||||
|                 if (enc) { | ||||
|                     sprintf(buf0, "%s-%s", uri.meta->etag, | ||||
|                             (enc & COMPRESS_BR) ? "br" : (enc & COMPRESS_GZ) ? "gzip" : ""); | ||||
|                     sprintf(buf0, "%s-%s", uri.meta->etag, (enc & COMPRESS_BR) ? "br" : (enc & COMPRESS_GZ) ? "gzip" : ""); | ||||
|                     http_add_header_field(&res.hdr, "ETag", buf0); | ||||
|                 } else { | ||||
|                     http_add_header_field(&res.hdr, "ETag", uri.meta->etag); | ||||
| @@ -311,16 +305,16 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|                 http_add_header_field(&res.hdr, "Cache-Control", "public, max-age=86400"); | ||||
|             } | ||||
|  | ||||
|             char *if_modified_since = http_get_header_field(&req.hdr, "If-Modified-Since"); | ||||
|             char *if_none_match = http_get_header_field(&req.hdr, "If-None-Match"); | ||||
|             const char *if_modified_since = http_get_header_field(&req.hdr, "If-Modified-Since"); | ||||
|             const char *if_none_match = http_get_header_field(&req.hdr, "If-None-Match"); | ||||
|             if ((if_none_match != NULL && strstr(if_none_match, uri.meta->etag) == NULL) || | ||||
|                     (accept_if_modified_since && if_modified_since != NULL && | ||||
|                     strcmp(if_modified_since, last_modified) == 0)) { | ||||
|                 (accept_if_modified_since && if_modified_since != NULL && strcmp(if_modified_since, last_modified) == 0)) | ||||
|             { | ||||
|                 res.status = http_get_status(304); | ||||
|                 goto respond; | ||||
|             } | ||||
|  | ||||
|             char *range = http_get_header_field(&req.hdr, "Range"); | ||||
|             const char *range = http_get_header_field(&req.hdr, "Range"); | ||||
|             if (range != NULL) { | ||||
|                 if (strlen(range) <= 6 || strncmp(range, "bytes=", 6) != 0) { | ||||
|                     res.status = http_get_status(416); | ||||
| @@ -374,7 +368,7 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|         } else { | ||||
|             int mode; | ||||
|             if (strcmp(uri.filename + strlen(uri.filename) - 4, ".ncr") == 0) { | ||||
|                 mode = FASTCGI_NECRONDA; | ||||
|                 mode = FASTCGI_SESIMOS; | ||||
|             } else if (strcmp(uri.filename + strlen(uri.filename) - 4, ".php") == 0) { | ||||
|                 mode = FASTCGI_PHP; | ||||
|             } else { | ||||
| @@ -395,30 +389,34 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|                 goto respond; | ||||
|             } | ||||
|  | ||||
|             char *client_content_length = http_get_header_field(&req.hdr, "Content-Length"); | ||||
|             const char *client_content_length = http_get_header_field(&req.hdr, "Content-Length"); | ||||
|             const char *client_transfer_encoding = http_get_header_field(&req.hdr, "Transfer-Encoding"); | ||||
|             if (client_content_length != NULL) { | ||||
|                 unsigned long client_content_len = strtoul(client_content_length, NULL, 10); | ||||
|                 ret = fastcgi_receive(&fcgi_conn, client, client_content_len); | ||||
|                 if (ret != 0) { | ||||
|                     if (ret < 0) { | ||||
|                         goto abort; | ||||
|                     } else { | ||||
|                         sprintf(err_msg, "Unable to communicate with FastCGI socket."); | ||||
|                     } | ||||
|                     res.status = http_get_status(502); | ||||
|                     goto respond; | ||||
|             } else if (client_transfer_encoding != NULL && strstr(client_transfer_encoding, "chunked") != NULL) { | ||||
|                 ret = fastcgi_receive_chunked(&fcgi_conn, client); | ||||
|             } else { | ||||
|                 ret = 0; | ||||
|             } | ||||
|             if (ret != 0) { | ||||
|                 if (ret < 0) { | ||||
|                     goto abort; | ||||
|                 } else { | ||||
|                     sprintf(err_msg, "Unable to communicate with FastCGI socket."); | ||||
|                 } | ||||
|                 res.status = http_get_status(502); | ||||
|                 goto respond; | ||||
|             } | ||||
|             fastcgi_close_stdin(&fcgi_conn); | ||||
|  | ||||
|             ret = fastcgi_header(&fcgi_conn, &res, err_msg); | ||||
|             if (ret != 0) { | ||||
|                 if (ret < 0) { | ||||
|                     goto abort; | ||||
|                 } | ||||
|                 if (ret < 0) goto abort; | ||||
|                 goto respond; | ||||
|             } | ||||
|             char *status = http_get_header_field(&res.hdr, "Status"); | ||||
|  | ||||
|             const char *status = http_get_header_field(&res.hdr, "Status"); | ||||
|             if (status != NULL) { | ||||
|                 int status_code = (int) strtoul(status, NULL, 10); | ||||
|                 res.status = http_get_status(status_code); | ||||
| @@ -435,9 +433,29 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|                 } | ||||
|             } | ||||
|  | ||||
|             content_length = -1; | ||||
|             const char *content_length_f = http_get_header_field(&res.hdr, "Content-Length"); | ||||
|             content_length = (content_length_f == NULL) ? -1 : strtol(content_length_f, NULL, 10); | ||||
|  | ||||
|             const char *content_type = http_get_header_field(&res.hdr, "Content-Type"); | ||||
|             const char *content_encoding = http_get_header_field(&res.hdr, "Content-Encoding"); | ||||
|             if (content_encoding == NULL && | ||||
|                 content_type != NULL && | ||||
|                 strncmp(content_type, "text/html", 9) == 0 && | ||||
|                 content_length != -1 && | ||||
|                 content_length <= sizeof(msg_content) - 1) | ||||
|             { | ||||
|                 fastcgi_dump(&fcgi_conn, msg_content, sizeof(msg_content)); | ||||
|                 goto respond; | ||||
|             } | ||||
|  | ||||
|             use_fastcgi = 1; | ||||
|  | ||||
|             if (content_length != -1 && content_length < 1024000) { | ||||
|                 use_fastcgi |= FASTCGI_COMPRESS_HOLD; | ||||
|             } | ||||
|  | ||||
|             content_length = -1; | ||||
|  | ||||
|             int http_comp = http_get_compression(&req, &res); | ||||
|             if (http_comp & COMPRESS) { | ||||
|                 if (http_comp & COMPRESS_BR) { | ||||
| @@ -449,6 +467,7 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|                 } | ||||
|                 http_add_header_field(&res.hdr, "Vary", "Accept-Encoding"); | ||||
|                 http_add_header_field(&res.hdr, "Content-Encoding", buf0); | ||||
|                 http_remove_header_field(&res.hdr, "Content-Length", HTTP_REMOVE_ALL); | ||||
|             } | ||||
|  | ||||
|             if (http_get_header_field(&res.hdr, "Content-Length") == NULL) { | ||||
| @@ -460,9 +479,45 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|         http_remove_header_field(&res.hdr, "Date", HTTP_REMOVE_ALL); | ||||
|         http_remove_header_field(&res.hdr, "Server", HTTP_REMOVE_ALL); | ||||
|  | ||||
|         ret = rev_proxy_init(&req, &res, conf, client, &custom_status, err_msg); | ||||
|         ret = rev_proxy_init(&req, &res, &ctx, conf, client, &custom_status, err_msg); | ||||
|         use_rev_proxy = (ret == 0); | ||||
|  | ||||
|         if (res.status->code == 101) { | ||||
|             const char *connection = http_get_header_field(&res.hdr, "Connection"); | ||||
|             const char *upgrade = http_get_header_field(&res.hdr, "Upgrade"); | ||||
|             if (connection != NULL && upgrade != NULL && | ||||
|                 (strstr(connection, "upgrade") != NULL || strstr(connection, "Upgrade") != NULL) && | ||||
|                 strcmp(upgrade, "websocket") == 0) | ||||
|             { | ||||
|                 const char *ws_accept = http_get_header_field(&res.hdr, "Sec-WebSocket-Accept"); | ||||
|                 if (ws_calc_accept_key(ctx.ws_key, buf0) == 0) { | ||||
|                     use_rev_proxy = (strcmp(buf0, ws_accept) == 0) ? 2 : 1; | ||||
|                 } | ||||
|             } else { | ||||
|                 ctx.status = 101; | ||||
|                 ctx.origin = INTERNAL; | ||||
|                 res.status = http_get_status(501); | ||||
|             } | ||||
|         } | ||||
|  | ||||
|         // Let 300 be formatted by origin server | ||||
|         if (use_rev_proxy && res.status->code >= 301 && res.status->code < 600) { | ||||
|             const char *content_type = http_get_header_field(&res.hdr, "Content-Type"); | ||||
|             const char *content_length_f = http_get_header_field(&res.hdr, "Content-Length"); | ||||
|             const char *content_encoding = http_get_header_field(&res.hdr, "Content-Encoding"); | ||||
|             if (content_encoding == NULL && content_type != NULL && content_length_f != NULL && strncmp(content_type, "text/html", 9) == 0) { | ||||
|                 long content_len = strtol(content_length_f, NULL, 10); | ||||
|                 if (content_len <= sizeof(msg_content) - 1) { | ||||
|                     if (ctx.status != 101) { | ||||
|                         ctx.status = res.status->code; | ||||
|                         ctx.origin = res.status->code >= 400 ? SERVER : NONE; | ||||
|                     } | ||||
|                     use_rev_proxy = 0; | ||||
|                     rev_proxy_dump(msg_content, content_len); | ||||
|                 } | ||||
|             } | ||||
|         } | ||||
|  | ||||
|         /* | ||||
|         char *content_encoding = http_get_header_field(&res.hdr, "Content-Encoding"); | ||||
|         if (use_rev_proxy && content_encoding == NULL) { | ||||
| @@ -499,46 +554,88 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|         if (http_get_header_field(&res.hdr, "Accept-Ranges") == NULL) { | ||||
|             http_add_header_field(&res.hdr, "Accept-Ranges", "none"); | ||||
|         } | ||||
|         if (!use_fastcgi && !use_rev_proxy && file == NULL && | ||||
|                 ((res.status->code >= 400 && res.status->code < 600) || err_msg[0] != 0)) { | ||||
|         if (!use_fastcgi && file == NULL) { | ||||
|             http_remove_header_field(&res.hdr, "Date", HTTP_REMOVE_ALL); | ||||
|             http_remove_header_field(&res.hdr, "Server", HTTP_REMOVE_ALL); | ||||
|             http_remove_header_field(&res.hdr, "Cache-Control", HTTP_REMOVE_ALL); | ||||
|             http_remove_header_field(&res.hdr, "Content-Type", HTTP_REMOVE_ALL); | ||||
|             http_remove_header_field(&res.hdr, "Content-Encoding", HTTP_REMOVE_ALL); | ||||
|             http_add_header_field(&res.hdr, "Date", http_get_date(buf0, sizeof(buf0))); | ||||
|             http_add_header_field(&res.hdr, "Server", SERVER_STR); | ||||
|             http_add_header_field(&res.hdr, "Cache-Control", "no-cache"); | ||||
|             http_add_header_field(&res.hdr, "Content-Type", "text/html; charset=UTF-8"); | ||||
|  | ||||
|             // TODO list Locations on 3xx Redirects | ||||
|             const http_doc_info *info = http_get_status_info(res.status); | ||||
|             const http_status_msg *http_msg = http_get_error_msg(res.status); | ||||
|  | ||||
|             sprintf(msg_pre_buf, info->doc, res.status->code, res.status->msg, | ||||
|                     http_msg != NULL ? http_msg->msg : "", err_msg[0] != 0 ? err_msg : ""); | ||||
|             if (msg_content[0] == 0) { | ||||
|                 if (res.status->code >= 300 && res.status->code < 400) { | ||||
|                     const char *location = http_get_header_field(&res.hdr, "Location"); | ||||
|                     if (location != NULL) { | ||||
|                         snprintf(msg_content, sizeof(msg_content), "<ul>\n\t<li><a href=\"%1$s\">%1$s</a></li>\n</ul>\n", location); | ||||
|                     } | ||||
|                 } | ||||
|             } else if (strncmp(msg_content, "<!DOCTYPE html>", 15) == 0 || strncmp(msg_content, "<html", 5) == 0) { | ||||
|                 msg_content[0] = 0; | ||||
|                 // TODO let relevant information pass? | ||||
|             } | ||||
|  | ||||
|             char *rev_proxy_doc = ""; | ||||
|             if (conf != NULL && conf->type == CONFIG_TYPE_REVERSE_PROXY) { | ||||
|                 const http_status *status = http_get_status(ctx.status); | ||||
|                 char stat_str[8]; | ||||
|                 sprintf(stat_str, "%03i", ctx.status); | ||||
|                 sprintf(msg_pre_buf_2, http_rev_proxy_document, | ||||
|                         " success", | ||||
|                         (ctx.origin == CLIENT_REQ) ? " error" : " success", | ||||
|                         (ctx.origin == INTERNAL) ? " error" : " success", | ||||
|                         (ctx.origin == SERVER_REQ) ? " error" : (ctx.status == 0 ? "" : " success"), | ||||
|                         (ctx.origin == CLIENT_RES) ? " error" : " success", | ||||
|                         (ctx.origin == SERVER) ? " error" : (ctx.status == 0 ? "" : " success"), | ||||
|                         (ctx.origin == SERVER_RES) ? " error" : (ctx.status == 0 ? "" : " success"), | ||||
|                         (ctx.origin == INTERNAL) ? " error" : " success", | ||||
|                         (ctx.origin == INTERNAL || ctx.origin == SERVER) ? " error" : " success", | ||||
|                         res.status->code, | ||||
|                         res.status->msg, | ||||
|                         (ctx.status == 0) ? "???" : stat_str, | ||||
|                         (status != NULL) ? status->msg : "", | ||||
|                         host); | ||||
|                 rev_proxy_doc = msg_pre_buf_2; | ||||
|             } | ||||
|  | ||||
|             sprintf(msg_pre_buf_1, info->doc, res.status->code, res.status->msg, http_msg != NULL ? http_msg->msg : "", err_msg[0] != 0 ? err_msg : ""); | ||||
|             content_length = snprintf(msg_buf, sizeof(msg_buf), http_default_document, res.status->code, | ||||
|                                       res.status->msg, msg_pre_buf, info->mode, info->icon, info->color, host); | ||||
|             http_add_header_field(&res.hdr, "Content-Type", "text/html; charset=UTF-8"); | ||||
|                                       res.status->msg, msg_pre_buf_1, info->mode, info->icon, info->color, host, | ||||
|                                       rev_proxy_doc, msg_content[0] != 0 ? msg_content : ""); | ||||
|         } | ||||
|         if (content_length >= 0) { | ||||
|             sprintf(buf0, "%li", content_length); | ||||
|             http_remove_header_field(&res.hdr, "Content-Length", HTTP_REMOVE_ALL); | ||||
|             http_add_header_field(&res.hdr, "Content-Length", buf0); | ||||
|         } else if (http_get_header_field(&res.hdr, "Transfer-Encoding") == NULL) { | ||||
|             server_keep_alive = 0; | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     char *conn = http_get_header_field(&res.hdr, "Connection"); | ||||
|     int close_proxy = conn == NULL || (strcmp(conn, "keep-alive") != 0 && strcmp(conn, "Keep-Alive") != 0); | ||||
|     http_remove_header_field(&res.hdr, "Connection", HTTP_REMOVE_ALL); | ||||
|     http_remove_header_field(&res.hdr, "Keep-Alive", HTTP_REMOVE_ALL); | ||||
|     if (server_keep_alive && client_keep_alive) { | ||||
|         http_add_header_field(&res.hdr, "Connection", "keep-alive"); | ||||
|         sprintf(buf0, "timeout=%i, max=%i", CLIENT_TIMEOUT, REQ_PER_CONNECTION); | ||||
|         http_add_header_field(&res.hdr, "Keep-Alive", buf0); | ||||
|     } else { | ||||
|         http_add_header_field(&res.hdr, "Connection", "close"); | ||||
|     int close_proxy = 0; | ||||
|     if (use_rev_proxy != 2) { | ||||
|         const char *conn = http_get_header_field(&res.hdr, "Connection"); | ||||
|         close_proxy = (conn == NULL || (strstr(conn, "keep-alive") == NULL && strstr(conn, "Keep-Alive") == NULL)); | ||||
|         http_remove_header_field(&res.hdr, "Connection", HTTP_REMOVE_ALL); | ||||
|         http_remove_header_field(&res.hdr, "Keep-Alive", HTTP_REMOVE_ALL); | ||||
|         if (server_keep_alive && client_keep_alive) { | ||||
|             http_add_header_field(&res.hdr, "Connection", "keep-alive"); | ||||
|             sprintf(buf0, "timeout=%i, max=%i", CLIENT_TIMEOUT, REQ_PER_CONNECTION); | ||||
|             http_add_header_field(&res.hdr, "Keep-Alive", buf0); | ||||
|         } else { | ||||
|             http_add_header_field(&res.hdr, "Connection", "close"); | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     http_send_response(client, &res); | ||||
|     clock_gettime(CLOCK_MONOTONIC, &end); | ||||
|     char *location = http_get_header_field(&res.hdr, "Location"); | ||||
|     const char *location = http_get_header_field(&res.hdr, "Location"); | ||||
|     unsigned long micros = (end.tv_nsec - begin.tv_nsec) / 1000 + (end.tv_sec - begin.tv_sec) * 1000000; | ||||
|     print("%s%s%03i %s%s%s (%s)%s", http_get_status_color(res.status), use_rev_proxy ? "-> " : "", res.status->code, | ||||
|           res.status->msg, location != NULL ? " -> " : "", location != NULL ? location : "", | ||||
| @@ -546,7 +643,17 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|  | ||||
|     // TODO access/error log file | ||||
|  | ||||
|     if (strcmp(req.method, "HEAD") != 0) { | ||||
|     if (use_rev_proxy == 2) { | ||||
|         // WebSocket | ||||
|         print("Upgrading connection to WebSocket connection"); | ||||
|         ret = ws_handle_connection(client, &rev_proxy); | ||||
|         if (ret != 0) { | ||||
|             client_keep_alive = 0; | ||||
|             close_proxy = 1; | ||||
|         } | ||||
|         print("WebSocket connection closed"); | ||||
|     } else if (strcmp(req.method, "HEAD") != 0) { | ||||
|         // default response | ||||
|         unsigned long snd_len = 0; | ||||
|         unsigned long len; | ||||
|         if (msg_buf[0] != 0) { | ||||
| @@ -569,16 +676,16 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|                 snd_len += ret; | ||||
|             } | ||||
|         } else if (use_fastcgi) { | ||||
|             char *transfer_encoding = http_get_header_field(&res.hdr, "Transfer-Encoding"); | ||||
|             int chunked = transfer_encoding != NULL && strcmp(transfer_encoding, "chunked") == 0; | ||||
|             const char *transfer_encoding = http_get_header_field(&res.hdr, "Transfer-Encoding"); | ||||
|             int chunked = (transfer_encoding != NULL && strstr(transfer_encoding, "chunked") != NULL); | ||||
|  | ||||
|             int flags = (chunked ? FASTCGI_CHUNKED : 0) | (use_fastcgi & FASTCGI_COMPRESS); | ||||
|             int flags = (chunked ? FASTCGI_CHUNKED : 0) | (use_fastcgi & (FASTCGI_COMPRESS | FASTCGI_COMPRESS_HOLD)); | ||||
|             ret = fastcgi_send(&fcgi_conn, client, flags); | ||||
|         } else if (use_rev_proxy) { | ||||
|             char *transfer_encoding = http_get_header_field(&res.hdr, "Transfer-Encoding"); | ||||
|             const char *transfer_encoding = http_get_header_field(&res.hdr, "Transfer-Encoding"); | ||||
|             int chunked = transfer_encoding != NULL && strstr(transfer_encoding, "chunked") != NULL; | ||||
|  | ||||
|             char *content_len = http_get_header_field(&res.hdr, "Content-Length"); | ||||
|             const char *content_len = http_get_header_field(&res.hdr, "Content-Length"); | ||||
|             unsigned long len_to_send = 0; | ||||
|             if (content_len != NULL) { | ||||
|                 len_to_send = strtol(content_len, NULL, 10); | ||||
| @@ -611,12 +718,6 @@ int client_request_handler(sock *client, unsigned long client_num, unsigned int | ||||
|     } | ||||
|     http_free_req(&req); | ||||
|     http_free_res(&res); | ||||
|     if (client->buf != NULL) { | ||||
|         free(client->buf); | ||||
|         client->buf = NULL; | ||||
|         client->buf_off = 0; | ||||
|         client->buf_len = 0; | ||||
|     } | ||||
|     return !client_keep_alive; | ||||
| } | ||||
|  | ||||
|   | ||||
							
								
								
									
										21
									
								
								src/client.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								src/client.h
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,21 @@ | ||||
| /** | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Client connection and request handlers (header file) | ||||
|  * @file src/client.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2022-08-16 | ||||
|  */ | ||||
|  | ||||
| #ifndef SESIMOS_CLIENT_H | ||||
| #define SESIMOS_CLIENT_H | ||||
|  | ||||
| #include "lib/config.h" | ||||
| #include "lib/sock.h" | ||||
|  | ||||
| #include <arpa/inet.h> | ||||
|  | ||||
| host_config *get_host_config(const char *host); | ||||
|  | ||||
| int client_handler(sock *client, unsigned long client_num, struct sockaddr_in6 *client_addr); | ||||
|  | ||||
| #endif //SESIMOS_CLIENT_H | ||||
							
								
								
									
										26
									
								
								src/defs.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								src/defs.h
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,26 @@ | ||||
| /** | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Definitions | ||||
|  * @file src/defs.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-05-04 | ||||
|  */ | ||||
|  | ||||
| #ifndef SESIMOS_DEF_H | ||||
| #define SESIMOS_DEF_H | ||||
|  | ||||
| #define SERVER_VERSION "4.6" | ||||
| #define SERVER_STR "Sesimos/" SERVER_VERSION | ||||
| #define SERVER_STR_HTML "Sesimos web server " SERVER_VERSION | ||||
|  | ||||
| #define CHUNK_SIZE 8192 | ||||
|  | ||||
| #ifndef DEFAULT_HOST | ||||
| #   define DEFAULT_HOST "www.necronda.net" | ||||
| #endif | ||||
|  | ||||
| #ifndef SERVER_NAME | ||||
| #   define SERVER_NAME DEFAULT_HOST | ||||
| #endif | ||||
|  | ||||
| #endif //SESIMOS_DEF_H | ||||
							
								
								
									
										118
									
								
								src/lib/cache.c
									
									
									
									
									
								
							
							
						
						
									
										118
									
								
								src/lib/cache.c
									
									
									
									
									
								
							| @@ -1,13 +1,15 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * File cache implementation | ||||
|  * src/lib/cache.c | ||||
|  * Lorenz Stechauner, 2020-12-19 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief File cache implementation | ||||
|  * @file src/lib/cache.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-19 | ||||
|  */ | ||||
|  | ||||
| #include "cache.h" | ||||
| #include "utils.h" | ||||
| #include "compress.h" | ||||
|  | ||||
| #include <stdio.h> | ||||
| #include <magic.h> | ||||
| #include <sys/ipc.h> | ||||
| @@ -15,14 +17,14 @@ | ||||
| #include <string.h> | ||||
| #include <errno.h> | ||||
| #include <signal.h> | ||||
| #include <openssl/sha.h> | ||||
| #include <malloc.h> | ||||
| #include <openssl/evp.h> | ||||
|  | ||||
|  | ||||
| int cache_continue = 1; | ||||
| magic_t magic; | ||||
| cache_entry *cache; | ||||
|  | ||||
| int magic_init() { | ||||
| int magic_init(void) { | ||||
|     magic = magic_open(MAGIC_MIME); | ||||
|     if (magic == NULL) { | ||||
|         fprintf(stderr, ERR_STR "Unable to open magic cookie: %s" CLR_STR "\n", strerror(errno)); | ||||
| @@ -35,39 +37,39 @@ int magic_init() { | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| void cache_process_term() { | ||||
| void cache_process_term(int _) { | ||||
|     cache_continue = 0; | ||||
| } | ||||
|  | ||||
| int cache_process() { | ||||
| int cache_process(void) { | ||||
|     signal(SIGINT, cache_process_term); | ||||
|     signal(SIGTERM, cache_process_term); | ||||
|  | ||||
|     int shm_id = shmget(CACHE_SHM_KEY, CACHE_ENTRIES * sizeof(cache_entry), 0); | ||||
|     if (shm_id < 0) { | ||||
|         fprintf(stderr, ERR_STR "Unable to create shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to create cache shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
|     shmdt(cache); | ||||
|     void *shm_rw = shmat(shm_id, NULL, 0); | ||||
|     if (shm_rw == (void *) -1) { | ||||
|         fprintf(stderr, ERR_STR "Unable to attach shared memory (rw): %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to attach cache shared memory (rw): %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -2; | ||||
|     } | ||||
|     cache = shm_rw; | ||||
|  | ||||
|     if (mkdir("/var/necronda/", 0755) < 0 && errno != EEXIST) { | ||||
|         fprintf(stderr, ERR_STR "Unable to create directory '/var/necronda/': %s" CLR_STR "\n", strerror(errno)); | ||||
|     if (mkdir("/var/sesimos/", 0755) < 0 && errno != EEXIST) { | ||||
|         fprintf(stderr, ERR_STR "Unable to create directory '/var/sesimos/': %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -3; | ||||
|     } | ||||
|  | ||||
|     if (mkdir("/var/necronda/server/", 0755) < 0 && errno != EEXIST) { | ||||
|         fprintf(stderr, ERR_STR "Unable to create directory '/var/necronda/server/': %s" CLR_STR "\n", strerror(errno)); | ||||
|     if (mkdir("/var/sesimos/server/", 0755) < 0 && errno != EEXIST) { | ||||
|         fprintf(stderr, ERR_STR "Unable to create directory '/var/sesimos/server/': %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -3; | ||||
|     } | ||||
|  | ||||
|     FILE *cache_file = fopen("/var/necronda/server/cache", "rb"); | ||||
|     FILE *cache_file = fopen("/var/sesimos/server/cache", "rb"); | ||||
|     if (cache_file != NULL) { | ||||
|         fread(cache, sizeof(cache_entry), CACHE_ENTRIES, cache_file); | ||||
|         fclose(cache_file); | ||||
| @@ -78,14 +80,12 @@ int cache_process() { | ||||
|     } | ||||
|  | ||||
|     FILE *file; | ||||
|     char *buf = malloc(CACHE_BUF_SIZE); | ||||
|     char *comp_buf = malloc(CACHE_BUF_SIZE); | ||||
|     char filename_comp_gz[256]; | ||||
|     char filename_comp_br[256]; | ||||
|     char buf[CACHE_BUF_SIZE], comp_buf[CACHE_BUF_SIZE], filename_comp_gz[256], filename_comp_br[256]; | ||||
|     unsigned long read; | ||||
|     int compress; | ||||
|     SHA_CTX ctx; | ||||
|     unsigned char hash[SHA_DIGEST_LENGTH]; | ||||
|     EVP_MD_CTX *ctx; | ||||
|     unsigned char hash[EVP_MAX_MD_SIZE]; | ||||
|     unsigned int md_len; | ||||
|     int cache_changed = 0; | ||||
|     int p_len_gz, p_len_br; | ||||
|     int ret; | ||||
| @@ -94,7 +94,9 @@ int cache_process() { | ||||
|             if (cache[i].filename[0] != 0 && cache[i].meta.etag[0] == 0 && !cache[i].is_updating) { | ||||
|                 cache[i].is_updating = 1; | ||||
|                 fprintf(stdout, "[cache] Hashing file %s\n", cache[i].filename); | ||||
|                 SHA1_Init(&ctx); | ||||
|  | ||||
|                 ctx = EVP_MD_CTX_new(); | ||||
|                 EVP_DigestInit(ctx, EVP_sha1()); | ||||
|                 file = fopen(cache[i].filename, "rb"); | ||||
|                 compress = mime_is_compressible(cache[i].meta.type); | ||||
|  | ||||
| @@ -102,30 +104,34 @@ int cache_process() { | ||||
|                 FILE *comp_file_gz = NULL; | ||||
|                 FILE *comp_file_br = NULL; | ||||
|                 if (compress) { | ||||
|                     sprintf(buf, "%.*s/.necronda-server", cache[i].webroot_len, cache[i].filename); | ||||
|                     mkdir(buf, 0755); | ||||
|                     sprintf(buf, "%.*s/.necronda-server/cache", cache[i].webroot_len, cache[i].filename); | ||||
|                     mkdir(buf, 0700); | ||||
|                     sprintf(buf, "%.*s/.sesimos", cache[i].webroot_len, cache[i].filename); | ||||
|                     if (mkdir(buf, 0755) != 0 && errno != EEXIST) { | ||||
|                         fprintf(stderr, ERR_STR "Unable to create directory %s: %s" CLR_STR "\n", buf, strerror(errno)); | ||||
|                         goto comp_err; | ||||
|                     } | ||||
|  | ||||
|                     sprintf(buf, "%.*s/.sesimos/cache", cache[i].webroot_len, cache[i].filename); | ||||
|                     if (mkdir(buf, 0700) != 0 && errno != EEXIST) { | ||||
|                         fprintf(stderr, ERR_STR "Unable to create directory %s: %s" CLR_STR "\n", buf, strerror(errno)); | ||||
|                         goto comp_err; | ||||
|                     } | ||||
|  | ||||
|                     char *rel_path = cache[i].filename + cache[i].webroot_len + 1; | ||||
|                     for (int j = 0; j < strlen(rel_path); j++) { | ||||
|                         char ch = rel_path[j]; | ||||
|                         if (ch == '/') { | ||||
|                             ch = '_'; | ||||
|                         } | ||||
|                         if (ch == '/') ch = '_'; | ||||
|                         buf[j] = ch; | ||||
|                     } | ||||
|                     buf[strlen(rel_path)] = 0; | ||||
|  | ||||
|                     p_len_gz = snprintf(filename_comp_gz, sizeof(filename_comp_gz), | ||||
|                                         "%.*s/.necronda-server/cache/%s.gz", | ||||
|                                         "%.*s/.sesimos/cache/%s.gz", | ||||
|                                         cache[i].webroot_len, cache[i].filename, buf); | ||||
|                     p_len_br = snprintf(filename_comp_br, sizeof(filename_comp_br), | ||||
|                                         "%.*s/.necronda-server/cache/%s.br", | ||||
|                                         "%.*s/.sesimos/cache/%s.br", | ||||
|                                         cache[i].webroot_len, cache[i].filename, buf); | ||||
|                     if (p_len_gz < 0 || p_len_gz >= sizeof(filename_comp_gz) || | ||||
|                             p_len_br < 0 || p_len_br >= sizeof(filename_comp_br)) { | ||||
|                         fprintf(stderr, ERR_STR "Unable to open cached file: " | ||||
|                                                 "File name for compressed file too long" CLR_STR "\n"); | ||||
|                     if (p_len_gz < 0 || p_len_gz >= sizeof(filename_comp_gz) || p_len_br < 0 || p_len_br >= sizeof(filename_comp_br)) { | ||||
|                         fprintf(stderr, ERR_STR "Unable to open cached file: File name for compressed file too long" CLR_STR "\n"); | ||||
|                         goto comp_err; | ||||
|                     } | ||||
|  | ||||
| @@ -149,21 +155,19 @@ int cache_process() { | ||||
|                 } | ||||
|  | ||||
|                 while ((read = fread(buf, 1, CACHE_BUF_SIZE, file)) > 0) { | ||||
|                     SHA1_Update(&ctx, buf, read); | ||||
|                     EVP_DigestUpdate(ctx, buf, read); | ||||
|                     if (compress) { | ||||
|                         unsigned long avail_in, avail_out; | ||||
|                         avail_in = read; | ||||
|                         do { | ||||
|                             avail_out = CACHE_BUF_SIZE; | ||||
|                             compress_compress_mode(&comp_ctx, COMPRESS_GZ,buf + read - avail_in, &avail_in, | ||||
|                                                    comp_buf, &avail_out, feof(file)); | ||||
|                             compress_compress_mode(&comp_ctx, COMPRESS_GZ,buf + read - avail_in, &avail_in, comp_buf, &avail_out, feof(file)); | ||||
|                             fwrite(comp_buf, 1, CACHE_BUF_SIZE - avail_out, comp_file_gz); | ||||
|                         } while (avail_in != 0 || avail_out != CACHE_BUF_SIZE); | ||||
|                         avail_in = read; | ||||
|                         do { | ||||
|                             avail_out = CACHE_BUF_SIZE; | ||||
|                             compress_compress_mode(&comp_ctx, COMPRESS_BR, buf + read - avail_in, &avail_in, | ||||
|                                                    comp_buf, &avail_out, feof(file)); | ||||
|                             compress_compress_mode(&comp_ctx, COMPRESS_BR, buf + read - avail_in, &avail_in, comp_buf, &avail_out, feof(file)); | ||||
|                             fwrite(comp_buf, 1, CACHE_BUF_SIZE - avail_out, comp_file_br); | ||||
|                         } while (avail_in != 0 || avail_out != CACHE_BUF_SIZE); | ||||
|                     } | ||||
| @@ -180,9 +184,12 @@ int cache_process() { | ||||
|                     memset(cache[i].meta.filename_comp_gz, 0, sizeof(cache[i].meta.filename_comp_gz)); | ||||
|                     memset(cache[i].meta.filename_comp_br, 0, sizeof(cache[i].meta.filename_comp_br)); | ||||
|                 } | ||||
|                 SHA1_Final(hash, &ctx); | ||||
|  | ||||
|                 EVP_DigestFinal(ctx, hash, &md_len); | ||||
|                 EVP_MD_CTX_free(ctx); | ||||
|  | ||||
|                 memset(cache[i].meta.etag, 0, sizeof(cache[i].meta.etag)); | ||||
|                 for (int j = 0; j < SHA_DIGEST_LENGTH; j++) { | ||||
|                 for (int j = 0; j < md_len; j++) { | ||||
|                     sprintf(cache[i].meta.etag + j * 2, "%02x", hash[j]); | ||||
|                 } | ||||
|                 fclose(file); | ||||
| @@ -194,11 +201,9 @@ int cache_process() { | ||||
|  | ||||
|         if (cache_changed) { | ||||
|             cache_changed = 0; | ||||
|             cache_file = fopen("/var/necronda/server/cache", "wb"); | ||||
|             cache_file = fopen("/var/sesimos/server/cache", "wb"); | ||||
|             if (cache_file == NULL) { | ||||
|                 fprintf(stderr, ERR_STR "Unable to open cache file: %s" CLR_STR "\n", strerror(errno)); | ||||
|                 free(buf); | ||||
|                 free(comp_buf); | ||||
|                 return -1; | ||||
|             } | ||||
|             fwrite(cache, sizeof(cache_entry), CACHE_ENTRIES, cache_file); | ||||
| @@ -207,32 +212,31 @@ int cache_process() { | ||||
|             sleep(1); | ||||
|         } | ||||
|     } | ||||
|     free(buf); | ||||
|     free(comp_buf); | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int cache_init() { | ||||
| int cache_init(void) { | ||||
|     if (magic_init() != 0) { | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
|     int shm_id = shmget(CACHE_SHM_KEY, CACHE_ENTRIES * sizeof(cache_entry), IPC_CREAT | IPC_EXCL | 0600); | ||||
|     if (shm_id < 0) { | ||||
|         fprintf(stderr, ERR_STR "Unable to create shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to create cache shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -2; | ||||
|     } | ||||
|  | ||||
|     void *shm = shmat(shm_id, NULL, SHM_RDONLY); | ||||
|     if (shm == (void *) -1) { | ||||
|         fprintf(stderr, ERR_STR "Unable to attach shared memory (ro): %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to attach cache shared memory (ro): %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -3; | ||||
|     } | ||||
|     cache = shm; | ||||
|  | ||||
|     void *shm_rw = shmat(shm_id, NULL, 0); | ||||
|     if (shm_rw == (void *) -1) { | ||||
|         fprintf(stderr, ERR_STR "Unable to attach shared memory (rw): %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to attach cache shared memory (rw): %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -4; | ||||
|     } | ||||
|     cache = shm_rw; | ||||
| @@ -258,14 +262,14 @@ int cache_init() { | ||||
|     } | ||||
| } | ||||
|  | ||||
| int cache_unload() { | ||||
| int cache_unload(void) { | ||||
|     int shm_id = shmget(CACHE_SHM_KEY, 0, 0); | ||||
|     if (shm_id < 0) { | ||||
|         fprintf(stderr, ERR_STR "Unable to get shared memory id: %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to get cache shared memory id: %s" CLR_STR "\n", strerror(errno)); | ||||
|         shmdt(cache); | ||||
|         return -1; | ||||
|     } else if (shmctl(shm_id, IPC_RMID, NULL) < 0) { | ||||
|         fprintf(stderr, ERR_STR "Unable to configure shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to configure cache shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         shmdt(cache); | ||||
|         return -1; | ||||
|     } | ||||
| @@ -278,7 +282,7 @@ int cache_update_entry(int entry_num, const char *filename, const char *webroot) | ||||
|     int shm_id = shmget(CACHE_SHM_KEY, 0, 0); | ||||
|     void *shm_rw = shmat(shm_id, NULL, 0); | ||||
|     if (shm_rw == (void *) -1) { | ||||
|         print(ERR_STR "Unable to attach shared memory (rw): %s" CLR_STR, strerror(errno)); | ||||
|         print(ERR_STR "Unable to attach cache shared memory (rw): %s" CLR_STR, strerror(errno)); | ||||
|         return -1; | ||||
|     } | ||||
|     cache = shm_rw; | ||||
| @@ -321,7 +325,7 @@ int cache_filename_comp_invalid(const char *filename) { | ||||
|     int shm_id = shmget(CACHE_SHM_KEY, 0, 0); | ||||
|     void *shm_rw = shmat(shm_id, NULL, 0); | ||||
|     if (shm_rw == (void *) -1) { | ||||
|         print(ERR_STR "Unable to attach shared memory (rw): %s" CLR_STR, strerror(errno)); | ||||
|         print(ERR_STR "Unable to attach cache shared memory (rw): %s" CLR_STR, strerror(errno)); | ||||
|         return -1; | ||||
|     } | ||||
|     cache = shm_rw; | ||||
|   | ||||
| @@ -1,12 +1,13 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * File cache implementation (header file) | ||||
|  * src/lib/cache.h | ||||
|  * Lorenz Stechauner, 2020-12-19 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief File cache implementation (header file) | ||||
|  * @file src/lib/cache.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-19 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_CACHE_H | ||||
| #define NECRONDA_SERVER_CACHE_H | ||||
| #ifndef SESIMOS_CACHE_H | ||||
| #define SESIMOS_CACHE_H | ||||
|  | ||||
| #include "uri.h" | ||||
|  | ||||
| @@ -30,15 +31,15 @@ extern cache_entry *cache; | ||||
|  | ||||
| extern int cache_continue; | ||||
|  | ||||
| int magic_init(); | ||||
| int magic_init(void); | ||||
|  | ||||
| void cache_process_term(); | ||||
| void cache_process_term(int _); | ||||
|  | ||||
| int cache_process(); | ||||
| int cache_process(void); | ||||
|  | ||||
| int cache_init(); | ||||
| int cache_init(void); | ||||
|  | ||||
| int cache_unload(); | ||||
| int cache_unload(void); | ||||
|  | ||||
| int cache_update_entry(int entry_num, const char *filename, const char *webroot); | ||||
|  | ||||
| @@ -46,4 +47,4 @@ int cache_filename_comp_invalid(const char *filename); | ||||
|  | ||||
| int uri_cache_init(http_uri *uri); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_CACHE_H | ||||
| #endif //SESIMOS_CACHE_H | ||||
|   | ||||
| @@ -1,14 +1,17 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Compression interface | ||||
|  * src/lib/compress.c | ||||
|  * Lorenz Stechauner, 2021-05-05 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Compression interface | ||||
|  * @file src/lib/compress.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-05-05 | ||||
|  */ | ||||
|  | ||||
| #include "compress.h" | ||||
|  | ||||
| #include <malloc.h> | ||||
| #include <errno.h> | ||||
|  | ||||
|  | ||||
| int compress_init(compress_ctx *ctx, int mode) { | ||||
|     ctx->gzip = NULL; | ||||
|     ctx->brotli = NULL; | ||||
|   | ||||
| @@ -1,12 +1,13 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Compression interface (header file) | ||||
|  * src/lib/compress.h | ||||
|  * Lorenz Stechauner, 2021-05-05 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Compression interface (header file) | ||||
|  * @file src/lib/compress.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-05-05 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_COMPRESS_H | ||||
| #define NECRONDA_SERVER_COMPRESS_H | ||||
| #ifndef SESIMOS_COMPRESS_H | ||||
| #define SESIMOS_COMPRESS_H | ||||
|  | ||||
| #include <zlib.h> | ||||
| #include <brotli/encode.h> | ||||
| @@ -34,4 +35,4 @@ int compress_compress_mode(compress_ctx *ctx, int mode, const char *in, unsigned | ||||
|  | ||||
| int compress_free(compress_ctx *ctx); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_COMPRESS_H | ||||
| #endif //SESIMOS_COMPRESS_H | ||||
|   | ||||
							
								
								
									
										159
									
								
								src/lib/config.c
									
									
									
									
									
								
							
							
						
						
									
										159
									
								
								src/lib/config.c
									
									
									
									
									
								
							| @@ -1,12 +1,14 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Configuration file loader | ||||
|  * src/lib/config.c | ||||
|  * Lorenz Stechauner, 2021-01-05 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Configuration file loader | ||||
|  * @file src/lib/config.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-01-05 | ||||
|  */ | ||||
|  | ||||
| #include "config.h" | ||||
| #include "utils.h" | ||||
|  | ||||
| #include <stdio.h> | ||||
| #include <sys/ipc.h> | ||||
| #include <sys/shm.h> | ||||
| @@ -14,43 +16,44 @@ | ||||
| #include <errno.h> | ||||
| #include <stdlib.h> | ||||
|  | ||||
| host_config *config; | ||||
| char cert_file[256], key_file[256], geoip_dir[256], dns_server[256]; | ||||
|  | ||||
| int config_init() { | ||||
|     int shm_id = shmget(CONFIG_SHM_KEY, CONFIG_MAX_HOST_CONFIG * sizeof(host_config), IPC_CREAT | IPC_EXCL | 0640); | ||||
| t_config *config; | ||||
| char geoip_dir[256], dns_server[256]; | ||||
|  | ||||
| int config_init(void) { | ||||
|     int shm_id = shmget(CONFIG_SHM_KEY, sizeof(t_config), IPC_CREAT | IPC_EXCL | 0640); | ||||
|     if (shm_id < 0) { | ||||
|         fprintf(stderr, ERR_STR "Unable to create shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to create config shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
|     void *shm = shmat(shm_id, NULL, SHM_RDONLY); | ||||
|     if (shm == (void *) -1) { | ||||
|         fprintf(stderr, ERR_STR "Unable to attach shared memory (ro): %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to attach config shared memory (ro): %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -2; | ||||
|     } | ||||
|     config = shm; | ||||
|  | ||||
|     void *shm_rw = shmat(shm_id, NULL, 0); | ||||
|     if (shm_rw == (void *) -1) { | ||||
|         fprintf(stderr, ERR_STR "Unable to attach shared memory (rw): %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to attach config shared memory (rw): %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -3; | ||||
|     } | ||||
|     config = shm_rw; | ||||
|     memset(config, 0, CONFIG_MAX_HOST_CONFIG * sizeof(host_config)); | ||||
|     memset(config, 0, sizeof(t_config)); | ||||
|     shmdt(shm_rw); | ||||
|     config = shm; | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int config_unload() { | ||||
| int config_unload(void) { | ||||
|     int shm_id = shmget(CONFIG_SHM_KEY, 0, 0); | ||||
|     if (shm_id < 0) { | ||||
|         fprintf(stderr, ERR_STR "Unable to get shared memory id: %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to get config shared memory id: %s" CLR_STR "\n", strerror(errno)); | ||||
|         shmdt(config); | ||||
|         return -1; | ||||
|     } else if (shmctl(shm_id, IPC_RMID, NULL) < 0) { | ||||
|         fprintf(stderr, ERR_STR "Unable to configure shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to configure config shared memory: %s" CLR_STR "\n", strerror(errno)); | ||||
|         shmdt(config); | ||||
|         return -1; | ||||
|     } | ||||
| @@ -68,42 +71,82 @@ int config_load(const char *filename) { | ||||
|     fseek(file, 0, SEEK_END); | ||||
|     unsigned long len = ftell(file); | ||||
|     fseek(file, 0, SEEK_SET); | ||||
|     char *conf = malloc(len); | ||||
|     char *conf = alloca(len + 1); | ||||
|     fread(conf, 1, len, file); | ||||
|     conf[len] = 0; | ||||
|     fclose(file); | ||||
|  | ||||
|     host_config *tmp_config = malloc(CONFIG_MAX_HOST_CONFIG * sizeof(host_config)); | ||||
|     memset(tmp_config, 0, CONFIG_MAX_HOST_CONFIG * sizeof(host_config)); | ||||
|     t_config *tmp_config = malloc(sizeof(t_config)); | ||||
|     memset(tmp_config, 0, sizeof(t_config)); | ||||
|  | ||||
|     int i = 0; | ||||
|     int j = 0; | ||||
|     int line = 0; | ||||
|     int mode = 0; | ||||
|     char section = 0; | ||||
|     char *ptr = NULL; | ||||
|     char *source, *target; | ||||
|     while ((ptr = strtok(ptr == NULL ? conf :  NULL, "\n")) != NULL) { | ||||
|     while ((ptr = strsep(&conf, "\r\n")) != NULL) { | ||||
|         line++; | ||||
|         char *comment = strchr(ptr, '#'); | ||||
|         if (comment != NULL) comment[0] = 0; | ||||
|  | ||||
|         len = strlen(ptr); | ||||
|         char *end_ptr = ptr + len - 1; | ||||
|         while (end_ptr[0] == ' ' || end_ptr[0] == '\t') { | ||||
|             end_ptr[0] = 0; | ||||
|             end_ptr--; | ||||
|         } | ||||
|         len = strlen(ptr); | ||||
|         if (len == 0) continue; | ||||
|  | ||||
|         if (ptr[0] == '[') { | ||||
|             if (ptr[len - 1] != ']') goto err; | ||||
|             snprintf(tmp_config[i].name, sizeof(tmp_config[i].name), "%.*s", (int) len - 2, ptr + 1); | ||||
|             i++; | ||||
|             ptr++; | ||||
|             int l = 0; | ||||
|             if (strncmp(ptr, "host", 4) == 0 && (ptr[4] == ' ' || ptr[4] == '\t')) { | ||||
|                 ptr += 4; | ||||
|                 while (ptr[0] == ' ' || ptr[0] == '\t' || ptr[0] == ']') ptr++; | ||||
|                 while (ptr[l] != ' ' && ptr[l] != '\t' && ptr[l] != ']') l++; | ||||
|                 if (l == 0) goto err; | ||||
|                 snprintf(tmp_config->hosts[i].name, sizeof(tmp_config->hosts[i].name), "%.*s", l, ptr); | ||||
|                 i++; | ||||
|                 section = 'h'; | ||||
|             } else if (strncmp(ptr, "cert", 4) == 0 && (ptr[4] == ' ' || ptr[4] == '\t')) { | ||||
|                 ptr += 4; | ||||
|                 while (ptr[0] == ' ' || ptr[0] == '\t' || ptr[0] == ']') ptr++; | ||||
|                 while (ptr[l] != ' ' && ptr[l] != '\t' && ptr[l] != ']') l++; | ||||
|                 if (l == 0) goto err; | ||||
|                 snprintf(tmp_config->certs[j].name, sizeof(tmp_config->certs[j].name), "%.*s", l, ptr); | ||||
|                 j++; | ||||
|                 section = 'c'; | ||||
|             } else { | ||||
|                 goto err; | ||||
|             } | ||||
|             continue; | ||||
|         } else if (i == 0) { | ||||
|             if (len > 12 && strncmp(ptr, "certificate", 11) == 0 && (ptr[11] == ' ' || ptr[11] == '\t')) { | ||||
|                 source = ptr + 11; | ||||
|                 target = cert_file; | ||||
|             } else if (len > 12 && strncmp(ptr, "private_key", 11) == 0 && (ptr[11] == ' ' || ptr[11] == '\t')) { | ||||
|                 source = ptr + 11; | ||||
|                 target = key_file; | ||||
|             } else if (len > 10 && strncmp(ptr, "geoip_dir", 9) == 0 && (ptr[9] == ' ' || ptr[9] == '\t')) { | ||||
|         } else if (section == 0) { | ||||
|             if (len > 10 && strncmp(ptr, "geoip_dir", 9) == 0 && (ptr[9] == ' ' || ptr[9] == '\t')) { | ||||
|                 source = ptr + 9; | ||||
|                 target = geoip_dir; | ||||
|             } else if (len > 11 && strncmp(ptr, "dns_server", 10) == 0 && (ptr[10] == ' ' || ptr[10] == '\t')) { | ||||
|                 source = ptr + 10; | ||||
|                 target = dns_server; | ||||
|             } else { | ||||
|                 goto err; | ||||
|             } | ||||
|         } else { | ||||
|             host_config *hc = &tmp_config[i - 1]; | ||||
|         } else if (section == 'c') { | ||||
|             cert_config *cc = &tmp_config->certs[j - 1]; | ||||
|             if (len > 12 && strncmp(ptr, "certificate", 11) == 0 && (ptr[11] == ' ' || ptr[11] == '\t')) { | ||||
|                 source = ptr + 11; | ||||
|                 target = cc->full_chain; | ||||
|             } else if (len > 12 && strncmp(ptr, "private_key", 11) == 0 && (ptr[11] == ' ' || ptr[11] == '\t')) { | ||||
|                 source = ptr + 11; | ||||
|                 target = cc->priv_key; | ||||
|             } else { | ||||
|                 goto err; | ||||
|             } | ||||
|         } else if (section == 'h') { | ||||
|             host_config *hc = &tmp_config->hosts[i - 1]; | ||||
|             if (len > 8 && strncmp(ptr, "webroot", 7) == 0 && (ptr[7] == ' ' || ptr[7] == '\t')) { | ||||
|                 source = ptr + 7; | ||||
|                 target = hc->local.webroot; | ||||
| @@ -112,6 +155,9 @@ int config_load(const char *filename) { | ||||
|                 } else { | ||||
|                     hc->type = CONFIG_TYPE_LOCAL; | ||||
|                 } | ||||
|             } else if (len > 5 && strncmp(ptr, "cert", 4) == 0 && (ptr[4] == ' ' || ptr[4] == '\t')) { | ||||
|                 source = ptr + 4; | ||||
|                 target = hc->cert_name; | ||||
|             } else if (len > 9 && strncmp(ptr, "dir_mode", 8) == 0 && (ptr[8] == ' ' || ptr[8] == '\t')) { | ||||
|                 source = ptr + 8; | ||||
|                 target = NULL; | ||||
| @@ -154,49 +200,66 @@ int config_load(const char *filename) { | ||||
|                     hc->rev_proxy.enc = 1; | ||||
|                 } | ||||
|                 continue; | ||||
|             } else { | ||||
|                 goto err; | ||||
|             } | ||||
|         } else { | ||||
|             goto err; | ||||
|         } | ||||
|         char *end_ptr = source + strlen(source) - 1; | ||||
|  | ||||
|         while (source[0] == ' ' || source[0] == '\t') source++; | ||||
|         while (end_ptr[0] == ' ' || end_ptr[0] == '\t') end_ptr--; | ||||
|         if (end_ptr <= source) { | ||||
|         if (strlen(source) == 0) { | ||||
|             err: | ||||
|             free(conf); | ||||
|             free(tmp_config); | ||||
|             fprintf(stderr, ERR_STR "Unable to parse config file" CLR_STR "\n"); | ||||
|             fprintf(stderr, ERR_STR "Unable to parse config file (line %i)" CLR_STR "\n", line); | ||||
|             return -2; | ||||
|         } | ||||
|         end_ptr[1] = 0; | ||||
|  | ||||
|         if (target != NULL) { | ||||
|             strcpy(target, source); | ||||
|         } else if (mode == 1) { | ||||
|             if (strcmp(source, "forbidden") == 0) { | ||||
|                 tmp_config[i - 1].local.dir_mode = URI_DIR_MODE_FORBIDDEN; | ||||
|                 tmp_config->hosts[i - 1].local.dir_mode = URI_DIR_MODE_FORBIDDEN; | ||||
|             } else if (strcmp(source, "info") == 0) { | ||||
|                 tmp_config[i - 1].local.dir_mode = URI_DIR_MODE_INFO; | ||||
|                 tmp_config->hosts[i - 1].local.dir_mode = URI_DIR_MODE_INFO; | ||||
|             } else if (strcmp(source, "list") == 0) { | ||||
|                 tmp_config[i - 1].local.dir_mode = URI_DIR_MODE_LIST; | ||||
|                 tmp_config->hosts[i - 1].local.dir_mode = URI_DIR_MODE_LIST; | ||||
|             } else { | ||||
|                 goto err; | ||||
|             } | ||||
|         } else if (mode == 2) { | ||||
|             tmp_config[i - 1].rev_proxy.port = (unsigned short) strtoul(source, NULL, 10); | ||||
|             tmp_config->hosts[i - 1].rev_proxy.port = (unsigned short) strtoul(source, NULL, 10); | ||||
|         } | ||||
|     } | ||||
|     free(conf); | ||||
|  | ||||
|     for (int j = 0; j < i; j++) { | ||||
|         if (tmp_config[j].type == CONFIG_TYPE_LOCAL) { | ||||
|             char *webroot = tmp_config[j].local.webroot; | ||||
|     for (int k = 0; k < i; k++) { | ||||
|         host_config *hc = &tmp_config->hosts[k]; | ||||
|         if (hc->type == CONFIG_TYPE_LOCAL) { | ||||
|             char *webroot = tmp_config->hosts[k].local.webroot; | ||||
|             if (webroot[strlen(webroot) - 1] == '/') { | ||||
|                 webroot[strlen(webroot) - 1] = 0; | ||||
|             } | ||||
|         } | ||||
|         if (hc->cert_name[0] == 0) goto err2; | ||||
|         int found = 0; | ||||
|         for (int m = 0; m < j; m++) { | ||||
|             if (strcmp(tmp_config->certs[m].name, hc->cert_name) == 0) { | ||||
|                 hc->cert = m; | ||||
|                 found = 1; | ||||
|                 break; | ||||
|             } | ||||
|         } | ||||
|         if (!found) { | ||||
|             err2: | ||||
|             free(tmp_config); | ||||
|             fprintf(stderr, ERR_STR "Unable to parse config file" CLR_STR "\n"); | ||||
|             return -2; | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     int shm_id = shmget(CONFIG_SHM_KEY, 0, 0); | ||||
|     if (shm_id < 0) { | ||||
|         fprintf(stderr, ERR_STR "Unable to get shared memory id: %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to get config shared memory id: %s" CLR_STR "\n", strerror(errno)); | ||||
|         shmdt(config); | ||||
|         return -3; | ||||
|     } | ||||
| @@ -204,10 +267,10 @@ int config_load(const char *filename) { | ||||
|     void *shm_rw = shmat(shm_id, NULL, 0); | ||||
|     if (shm_rw == (void *) -1) { | ||||
|         free(tmp_config); | ||||
|         fprintf(stderr, ERR_STR "Unable to attach shared memory (rw): %s" CLR_STR "\n", strerror(errno)); | ||||
|         fprintf(stderr, ERR_STR "Unable to attach config shared memory (rw): %s" CLR_STR "\n", strerror(errno)); | ||||
|         return -4; | ||||
|     } | ||||
|     memcpy(shm_rw, tmp_config, CONFIG_MAX_HOST_CONFIG * sizeof(host_config)); | ||||
|     memcpy(shm_rw, tmp_config, sizeof(t_config)); | ||||
|     free(tmp_config); | ||||
|     shmdt(shm_rw); | ||||
|     return 0; | ||||
|   | ||||
| @@ -1,30 +1,34 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Configuration file loader (header file) | ||||
|  * src/lib/config.h | ||||
|  * Lorenz Stechauner, 2021-01-05 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Configuration file loader (header file) | ||||
|  * @file src/lib/config.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-01-05 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_CONFIG_H | ||||
| #define NECRONDA_SERVER_CONFIG_H | ||||
| #ifndef SESIMOS_CONFIG_H | ||||
| #define SESIMOS_CONFIG_H | ||||
|  | ||||
| #include "uri.h" | ||||
|  | ||||
| #define CONFIG_SHM_KEY 255642 | ||||
| #define CONFIG_MAX_HOST_CONFIG 64 | ||||
| #define CONFIG_MAX_CERT_CONFIG 64 | ||||
|  | ||||
| #define CONFIG_TYPE_UNSET 0 | ||||
| #define CONFIG_TYPE_LOCAL 1 | ||||
| #define CONFIG_TYPE_REVERSE_PROXY 2 | ||||
|  | ||||
| #ifndef DEFAULT_CONFIG_FILE | ||||
| #   define DEFAULT_CONFIG_FILE "/etc/necronda/server.conf" | ||||
| #   define DEFAULT_CONFIG_FILE "/etc/sesimos/server.conf" | ||||
| #endif | ||||
|  | ||||
|  | ||||
| typedef struct { | ||||
|     int type; | ||||
|     char name[256]; | ||||
|     char cert_name[256]; | ||||
|     int cert; | ||||
|     union { | ||||
|         struct { | ||||
|             char hostname[256]; | ||||
| @@ -38,13 +42,24 @@ typedef struct { | ||||
|     }; | ||||
| } host_config; | ||||
|  | ||||
| extern host_config *config; | ||||
| extern char cert_file[256], key_file[256], geoip_dir[256], dns_server[256]; | ||||
| typedef struct { | ||||
|     char name[256]; | ||||
|     char full_chain[256]; | ||||
|     char priv_key[256]; | ||||
| } cert_config; | ||||
|  | ||||
| int config_init(); | ||||
| typedef struct { | ||||
|     host_config hosts[CONFIG_MAX_HOST_CONFIG]; | ||||
|     cert_config certs[CONFIG_MAX_CERT_CONFIG]; | ||||
| } t_config; | ||||
|  | ||||
| extern t_config *config; | ||||
| extern char geoip_dir[256], dns_server[256]; | ||||
|  | ||||
| int config_init(void); | ||||
|  | ||||
| int config_load(const char *filename); | ||||
|  | ||||
| int config_unload(); | ||||
| int config_unload(void); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_CONFIG_H | ||||
| #endif //SESIMOS_CONFIG_H | ||||
|   | ||||
| @@ -1,19 +1,22 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * FastCGI interface implementation | ||||
|  * src/lib/fastcgi.c | ||||
|  * Lorenz Stechauner, 2020-12-26 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief FastCGI interface implementation | ||||
|  * @file src/lib/fastcgi.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-26 | ||||
|  */ | ||||
|  | ||||
| #include "fastcgi.h" | ||||
| #include "utils.h" | ||||
| #include "compress.h" | ||||
| #include "../necronda-server.h" | ||||
| #include "../server.h" | ||||
|  | ||||
| #include <sys/un.h> | ||||
| #include <sys/socket.h> | ||||
| #include <errno.h> | ||||
| #include <string.h> | ||||
|  | ||||
|  | ||||
| char *fastcgi_add_param(char *buf, const char *key, const char *value) { | ||||
|     char *ptr = buf; | ||||
|     unsigned long key_len = strlen(key); | ||||
| @@ -41,9 +44,9 @@ char *fastcgi_add_param(char *buf, const char *key, const char *value) { | ||||
|         ptr += 4; | ||||
|     } | ||||
|  | ||||
|     memcpy(ptr, key, key_len); | ||||
|     strcpy(ptr, key); | ||||
|     ptr += key_len; | ||||
|     memcpy(ptr, value, val_len); | ||||
|     strcpy(ptr, value); | ||||
|     ptr += val_len; | ||||
|  | ||||
|     return ptr; | ||||
| @@ -61,6 +64,7 @@ int fastcgi_init(fastcgi_conn *conn, int mode, unsigned int client_num, unsigned | ||||
|     conn->req_id = req_id; | ||||
|     conn->out_buf = NULL; | ||||
|     conn->out_off = 0; | ||||
|     conn->webroot = uri->webroot; | ||||
|  | ||||
|     int fcgi_sock = socket(AF_UNIX, SOCK_STREAM, 0); | ||||
|     if (fcgi_sock < 0) { | ||||
| @@ -70,8 +74,8 @@ int fastcgi_init(fastcgi_conn *conn, int mode, unsigned int client_num, unsigned | ||||
|     conn->socket = fcgi_sock; | ||||
|  | ||||
|     struct sockaddr_un sock_addr = {AF_UNIX}; | ||||
|     if (conn->mode == FASTCGI_NECRONDA) { | ||||
|         snprintf(sock_addr.sun_path, sizeof(sock_addr.sun_path) - 1, "%s", NECRONDA_BACKEND_SOCKET); | ||||
|     if (conn->mode == FASTCGI_SESIMOS) { | ||||
|         snprintf(sock_addr.sun_path, sizeof(sock_addr.sun_path) - 1, "%s", SESIMOS_BACKEND_SOCKET); | ||||
|     } else if (conn->mode == FASTCGI_PHP) { | ||||
|         snprintf(sock_addr.sun_path, sizeof(sock_addr.sun_path) - 1, "%s", PHP_FPM_SOCKET); | ||||
|     } | ||||
| @@ -148,19 +152,21 @@ int fastcgi_init(fastcgi_conn *conn, int mode, unsigned int client_num, unsigned | ||||
|     param_ptr = fastcgi_add_param(param_ptr, "PATH_INFO", buf0); | ||||
|  | ||||
|     //param_ptr = fastcgi_add_param(param_ptr, "AUTH_TYPE", ""); | ||||
|     char *content_length = http_get_header_field(&req->hdr, "Content-Length"); | ||||
|     const char *content_length = http_get_header_field(&req->hdr, "Content-Length"); | ||||
|     param_ptr = fastcgi_add_param(param_ptr, "CONTENT_LENGTH", content_length != NULL ? content_length : ""); | ||||
|     char *content_type = http_get_header_field(&req->hdr, "Content-Type"); | ||||
|     const char *content_type = http_get_header_field(&req->hdr, "Content-Type"); | ||||
|     param_ptr = fastcgi_add_param(param_ptr, "CONTENT_TYPE", content_type != NULL ? content_type : ""); | ||||
|     if (client_geoip != NULL) { | ||||
|         param_ptr = fastcgi_add_param(param_ptr, "REMOTE_INFO", client_geoip); | ||||
|     } | ||||
|  | ||||
|     for (int i = 0; i < req->hdr.field_num; i++) { | ||||
|         const http_field *f = &req->hdr.fields[i]; | ||||
|         const char *name = http_field_get_name(f); | ||||
|         char *ptr = buf0; | ||||
|         ptr += sprintf(ptr, "HTTP_"); | ||||
|         for (int j = 0; j < strlen(req->hdr.fields[i][0]); j++, ptr++) { | ||||
|             char ch = req->hdr.fields[i][0][j]; | ||||
|         for (int j = 0; j < strlen(name); j++, ptr++) { | ||||
|             char ch = name[j]; | ||||
|             if ((ch >= 'A' && ch <= 'Z') || (ch >= '0' && ch <= '9')) { | ||||
|                 ch = ch; | ||||
|             } else if (ch >= 'a' && ch <= 'z') { | ||||
| @@ -171,7 +177,7 @@ int fastcgi_init(fastcgi_conn *conn, int mode, unsigned int client_num, unsigned | ||||
|             ptr[0] = ch; | ||||
|             ptr[1] = 0; | ||||
|         } | ||||
|         param_ptr = fastcgi_add_param(param_ptr, buf0, req->hdr.fields[i][1]); | ||||
|         param_ptr = fastcgi_add_param(param_ptr, buf0, http_field_get_value(f)); | ||||
|     } | ||||
|  | ||||
|     unsigned short param_len = param_ptr - param_buf - sizeof(header); | ||||
| @@ -215,10 +221,11 @@ int fastcgi_close_stdin(fastcgi_conn *conn) { | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int fastcgi_php_error(const char *msg, int msg_len, char *err_msg) { | ||||
| int fastcgi_php_error(const fastcgi_conn *conn, const char *msg, int msg_len, char *err_msg) { | ||||
|     char *msg_str = malloc(msg_len + 1); | ||||
|     char *ptr0 = msg_str; | ||||
|     strncpy(msg_str, msg, msg_len); | ||||
|     memcpy(msg_str, msg, msg_len); | ||||
|     msg_str[msg_len] = 0; | ||||
|     char *ptr1 = NULL; | ||||
|     int len; | ||||
|     int err = 0; | ||||
| @@ -262,7 +269,7 @@ int fastcgi_php_error(const char *msg, int msg_len, char *err_msg) { | ||||
|             } | ||||
|             print("%s%.*s%s", msg_type == 1 ? WRN_STR : msg_type == 2 ? ERR_STR : "", len2, ptr2, CLR_STR); | ||||
|             if (msg_type == 2 && ptr2 == ptr0) { | ||||
|                 sprintf(err_msg, "%.*s", len2, ptr2); | ||||
|                 strcpy_rem_webroot(err_msg, ptr2, len2, conn->webroot); | ||||
|                 err = 1; | ||||
|             } | ||||
|             if (ptr3 == NULL) { | ||||
| @@ -291,12 +298,12 @@ int fastcgi_header(fastcgi_conn *conn, http_res *res, char *err_msg) { | ||||
|     while (1) { | ||||
|         ret = recv(conn->socket, &header, sizeof(header), 0); | ||||
|         if (ret < 0) { | ||||
|             res->status = http_get_status(502); | ||||
|             res->status = http_get_status(500); | ||||
|             sprintf(err_msg, "Unable to communicate with FastCGI socket."); | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket: %s" CLR_STR, strerror(errno)); | ||||
|             return 1; | ||||
|         } else if (ret != sizeof(header)) { | ||||
|             res->status = http_get_status(502); | ||||
|             res->status = http_get_status(500); | ||||
|             sprintf(err_msg, "Unable to communicate with FastCGI socket."); | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket" CLR_STR); | ||||
|             return 1; | ||||
| @@ -306,13 +313,13 @@ int fastcgi_header(fastcgi_conn *conn, http_res *res, char *err_msg) { | ||||
|         content = malloc(content_len + header.paddingLength); | ||||
|         ret = recv(conn->socket, content, content_len + header.paddingLength, 0); | ||||
|         if (ret < 0) { | ||||
|             res->status = http_get_status(502); | ||||
|             res->status = http_get_status(500); | ||||
|             sprintf(err_msg, "Unable to communicate with FastCGI socket."); | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket: %s" CLR_STR, strerror(errno)); | ||||
|             free(content); | ||||
|             return 1; | ||||
|         } else if (ret != (content_len + header.paddingLength)) { | ||||
|             res->status = http_get_status(502); | ||||
|             res->status = http_get_status(500); | ||||
|             sprintf(err_msg, "Unable to communicate with FastCGI socket."); | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket" CLR_STR); | ||||
|             free(content); | ||||
| @@ -338,9 +345,9 @@ int fastcgi_header(fastcgi_conn *conn, http_res *res, char *err_msg) { | ||||
|             free(content); | ||||
|             return 1; | ||||
|         } else if (header.type == FCGI_STDERR) { | ||||
|             // TODO implement Necronda backend error handling | ||||
|             // TODO implement Sesimos backend error handling | ||||
|             if (conn->mode == FASTCGI_PHP) { | ||||
|                 err = err || fastcgi_php_error(content, content_len, err_msg); | ||||
|                 err = err || fastcgi_php_error(conn, content, content_len, err_msg); | ||||
|             } | ||||
|         } else if (header.type == FCGI_STDOUT) { | ||||
|             break; | ||||
| @@ -381,7 +388,7 @@ int fastcgi_header(fastcgi_conn *conn, http_res *res, char *err_msg) { | ||||
|             return 1; | ||||
|         } | ||||
|  | ||||
|         ret = http_parse_header_field(&res->hdr, ptr, pos0); | ||||
|         ret = http_parse_header_field(&res->hdr, ptr, pos0, 0); | ||||
|         if (ret != 0) return (int) ret; | ||||
|         if (pos0[2] == '\r' && pos0[3] == '\n') { | ||||
|             return 0; | ||||
| @@ -430,7 +437,8 @@ int fastcgi_send(fastcgi_conn *conn, sock *client, int flags) { | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket: %s" CLR_STR, strerror(errno)); | ||||
|             return -1; | ||||
|         } else if (ret != sizeof(header)) { | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket" CLR_STR); | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket: received len (%li) != header len (%li)" CLR_STR, | ||||
|                   ret, sizeof(header)); | ||||
|             return -1; | ||||
|         } | ||||
|  | ||||
| @@ -438,15 +446,16 @@ int fastcgi_send(fastcgi_conn *conn, sock *client, int flags) { | ||||
|         content_len = (header.contentLengthB1 << 8) | header.contentLengthB0; | ||||
|         content = malloc(content_len + header.paddingLength); | ||||
|         ptr = content; | ||||
|         ret = recv(conn->socket, content, content_len + header.paddingLength, 0); | ||||
|         if (ret < 0) { | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket: %s" CLR_STR, strerror(errno)); | ||||
|             free(content); | ||||
|             return -1; | ||||
|         } else if (ret != (content_len + header.paddingLength)) { | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket" CLR_STR); | ||||
|             free(content); | ||||
|             return -1; | ||||
|  | ||||
|         long rcv_len = 0; | ||||
|         while (rcv_len < content_len + header.paddingLength) { | ||||
|             ret = recv(conn->socket, content + rcv_len, content_len + header.paddingLength - rcv_len, 0); | ||||
|             if (ret < 0) { | ||||
|                 print(ERR_STR "Unable to receive from FastCGI socket: %s" CLR_STR, strerror(errno)); | ||||
|                 free(content); | ||||
|                 return -1; | ||||
|             } | ||||
|             rcv_len += ret; | ||||
|         } | ||||
|  | ||||
|         if (header.type == FCGI_END_REQUEST) { | ||||
| @@ -477,9 +486,9 @@ int fastcgi_send(fastcgi_conn *conn, sock *client, int flags) { | ||||
|  | ||||
|             return 0; | ||||
|         } else if (header.type == FCGI_STDERR) { | ||||
|             // TODO implement Necronda backend error handling | ||||
|             // TODO implement Sesimos backend error handling | ||||
|             if (conn->mode == FASTCGI_PHP) { | ||||
|                 fastcgi_php_error(content, content_len, buf0); | ||||
|                 fastcgi_php_error(conn, content, content_len, buf0); | ||||
|             } | ||||
|         } else if (header.type == FCGI_STDOUT) { | ||||
|             unsigned long avail_in, avail_out; | ||||
| @@ -510,6 +519,72 @@ int fastcgi_send(fastcgi_conn *conn, sock *client, int flags) { | ||||
|     } | ||||
| } | ||||
|  | ||||
| int fastcgi_dump(fastcgi_conn *conn, char *buf, long len) { | ||||
|     FCGI_Header header; | ||||
|     long ret; | ||||
|     char buf0[256]; | ||||
|     char *content, *ptr = buf; | ||||
|     unsigned short req_id, content_len; | ||||
|  | ||||
|     if (conn->out_buf != NULL && conn->out_len > conn->out_off) { | ||||
|         ptr += snprintf(ptr, len, "%.*s", conn->out_len - conn->out_off, conn->out_buf + conn->out_off); | ||||
|     } | ||||
|  | ||||
|     while (1) { | ||||
|         ret = recv(conn->socket, &header, sizeof(header), 0); | ||||
|         if (ret < 0) { | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket: %s" CLR_STR, strerror(errno)); | ||||
|             return -1; | ||||
|         } else if (ret != sizeof(header)) { | ||||
|             print(ERR_STR "Unable to receive from FastCGI socket: received len (%li) != header len (%li)" CLR_STR, | ||||
|                   ret, sizeof(header)); | ||||
|             return -1; | ||||
|         } | ||||
|  | ||||
|         req_id = (header.requestIdB1 << 8) | header.requestIdB0; | ||||
|         content_len = (header.contentLengthB1 << 8) | header.contentLengthB0; | ||||
|         content = malloc(content_len + header.paddingLength); | ||||
|  | ||||
|         long rcv_len = 0; | ||||
|         while (rcv_len < content_len + header.paddingLength) { | ||||
|             ret = recv(conn->socket, content + rcv_len, content_len + header.paddingLength - rcv_len, 0); | ||||
|             if (ret < 0) { | ||||
|                 print(ERR_STR "Unable to receive from FastCGI socket: %s" CLR_STR, strerror(errno)); | ||||
|                 free(content); | ||||
|                 return -1; | ||||
|             } | ||||
|             rcv_len += ret; | ||||
|         } | ||||
|  | ||||
|         if (header.type == FCGI_END_REQUEST) { | ||||
|             FCGI_EndRequestBody *body = (FCGI_EndRequestBody *) content; | ||||
|             int app_status = (body->appStatusB3 << 24) | (body->appStatusB2 << 16) | (body->appStatusB1 << 8) | | ||||
|                              body->appStatusB0; | ||||
|             if (body->protocolStatus != FCGI_REQUEST_COMPLETE) { | ||||
|                 print(ERR_STR "FastCGI protocol error: %i" CLR_STR, body->protocolStatus); | ||||
|             } | ||||
|             if (app_status != 0) { | ||||
|                 print(ERR_STR "FastCGI app terminated with exit code %i" CLR_STR, app_status); | ||||
|             } | ||||
|             close(conn->socket); | ||||
|             conn->socket = 0; | ||||
|             free(content); | ||||
|  | ||||
|             return 0; | ||||
|         } else if (header.type == FCGI_STDERR) { | ||||
|             // TODO implement Sesimos backend error handling | ||||
|             if (conn->mode == FASTCGI_PHP) { | ||||
|                 fastcgi_php_error(conn, content, content_len, buf0); | ||||
|             } | ||||
|         } else if (header.type == FCGI_STDOUT) { | ||||
|             ptr += snprintf(ptr, len - (ptr - buf), "%.*s", content_len, content); | ||||
|         } else { | ||||
|             print(ERR_STR "Unknown FastCGI type: %i" CLR_STR, header.type); | ||||
|         } | ||||
|         free(content); | ||||
|     } | ||||
| } | ||||
|  | ||||
| int fastcgi_receive(fastcgi_conn *conn, sock *client, unsigned long len) { | ||||
|     unsigned long rcv_len = 0; | ||||
|     char *buf[16384]; | ||||
| @@ -525,12 +600,6 @@ int fastcgi_receive(fastcgi_conn *conn, sock *client, unsigned long len) { | ||||
|             .reserved = 0 | ||||
|     }; | ||||
|  | ||||
|     if (client->buf != NULL && client->buf_len - client->buf_off > 0) { | ||||
|         ret = (int) (client->buf_len - client->buf_off); | ||||
|         memcpy(buf, client->buf + client->buf_off, ret); | ||||
|         goto send; | ||||
|     } | ||||
|  | ||||
|     while (rcv_len < len) { | ||||
|         ret = sock_recv(client, buf, sizeof(buf), 0); | ||||
|         if (ret <= 0) { | ||||
| @@ -538,7 +607,6 @@ int fastcgi_receive(fastcgi_conn *conn, sock *client, unsigned long len) { | ||||
|             return -1; | ||||
|         } | ||||
|  | ||||
|         send: | ||||
|         rcv_len += ret; | ||||
|         header.contentLengthB1 = (ret >> 8) & 0xFF; | ||||
|         header.contentLengthB0 = ret & 0xFF; | ||||
| @@ -551,3 +619,21 @@ int fastcgi_receive(fastcgi_conn *conn, sock *client, unsigned long len) { | ||||
|     } | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int fastcgi_receive_chunked(fastcgi_conn *conn, sock *client) { | ||||
|     long ret; | ||||
|     unsigned long next_len; | ||||
|  | ||||
|     while (1) { | ||||
|         ret = sock_get_chunk_header(client); | ||||
|         if (ret < 0) return (int) ret; | ||||
|  | ||||
|         next_len = ret; | ||||
|         if (next_len <= 0) break; | ||||
|  | ||||
|         ret = fastcgi_receive(conn, client, next_len); | ||||
|         if (ret < 0) return (int) ret; | ||||
|     } | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|   | ||||
| @@ -1,12 +1,13 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * FastCGI interface implementation (header file) | ||||
|  * src/lib/fastcgi.h | ||||
|  * Lorenz Stechauner, 2020-12-26 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief FastCGI interface implementation (header file) | ||||
|  * @file src/lib/fastcgi.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-26 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_FASTCGI_H | ||||
| #define NECRONDA_SERVER_FASTCGI_H | ||||
| #ifndef SESIMOS_FASTCGI_H | ||||
| #define SESIMOS_FASTCGI_H | ||||
|  | ||||
| #include "include/fastcgi.h" | ||||
| #include "http.h" | ||||
| @@ -16,21 +17,23 @@ | ||||
| #define FASTCGI_COMPRESS_GZ 2 | ||||
| #define FASTCGI_COMPRESS_BR 4 | ||||
| #define FASTCGI_COMPRESS 6 | ||||
| #define FASTCGI_COMPRESS_HOLD 8 | ||||
|  | ||||
| #define FASTCGI_PHP 1 | ||||
| #define FASTCGI_NECRONDA 2 | ||||
| #define FASTCGI_SESIMOS 2 | ||||
|  | ||||
| #ifndef PHP_FPM_SOCKET | ||||
| #   define PHP_FPM_SOCKET "/var/run/php-fpm/php-fpm.sock" | ||||
| #endif | ||||
|  | ||||
| #define NECRONDA_BACKEND_SOCKET "/var/run/necronda/necronda-backend.sock" | ||||
| #define SESIMOS_BACKEND_SOCKET "/var/run/sesimos/backend.sock" | ||||
|  | ||||
| typedef struct { | ||||
|     int mode; | ||||
|     int socket; | ||||
|     unsigned short req_id; | ||||
|     char *out_buf; | ||||
|     const char *webroot; | ||||
|     unsigned short out_len; | ||||
|     unsigned short out_off; | ||||
| } fastcgi_conn; | ||||
| @@ -42,12 +45,16 @@ int fastcgi_init(fastcgi_conn *conn, int mode, unsigned int client_num, unsigned | ||||
|  | ||||
| int fastcgi_close_stdin(fastcgi_conn *conn); | ||||
|  | ||||
| int fastcgi_php_error(const char *msg, int msg_len, char *err_msg); | ||||
| int fastcgi_php_error(const fastcgi_conn *conn, const char *msg, int msg_len, char *err_msg); | ||||
|  | ||||
| int fastcgi_header(fastcgi_conn *conn, http_res *res, char *err_msg); | ||||
|  | ||||
| int fastcgi_send(fastcgi_conn *conn, sock *client, int flags); | ||||
|  | ||||
| int fastcgi_dump(fastcgi_conn *conn, char *buf, long len); | ||||
|  | ||||
| int fastcgi_receive(fastcgi_conn *conn, sock *client, unsigned long len); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_FASTCGI_H | ||||
| int fastcgi_receive_chunked(fastcgi_conn *conn, sock *client); | ||||
|  | ||||
| #endif //SESIMOS_FASTCGI_H | ||||
|   | ||||
| @@ -1,12 +1,14 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * MaxMind GeoIP Database interface | ||||
|  * src/lib/geoip.c | ||||
|  * Lorenz Stechauner, 2021-05-04 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief MaxMind GeoIP Database interface | ||||
|  * @file src/lib/geoip.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-05-04 | ||||
|  */ | ||||
|  | ||||
| #include "geoip.h" | ||||
|  | ||||
|  | ||||
| MMDB_entry_data_list_s *mmdb_json(MMDB_entry_data_list_s *list, char *str, long *str_off, long str_len) { | ||||
|     switch (list->entry_data.type) { | ||||
|         case MMDB_DATA_TYPE_MAP: | ||||
|   | ||||
| @@ -1,13 +1,14 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * MaxMind GeoIP Database interface (header file) | ||||
|  * src/lib/geoip.h | ||||
|  * Lorenz Stechauner, 2021-05-04 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief MaxMind GeoIP Database interface (header file) | ||||
|  * @file src/lib/geoip.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-05-04 | ||||
|  */ | ||||
|  | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_GEOIP_H | ||||
| #define NECRONDA_SERVER_GEOIP_H | ||||
| #ifndef SESIMOS_GEOIP_H | ||||
| #define SESIMOS_GEOIP_H | ||||
|  | ||||
| #include <maxminddb.h> | ||||
|  | ||||
| @@ -15,4 +16,4 @@ | ||||
|  | ||||
| MMDB_entry_data_list_s *mmdb_json(MMDB_entry_data_list_s *list, char *str, long *str_off, long str_len); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_GEOIP_H | ||||
| #endif //SESIMOS_GEOIP_H | ||||
|   | ||||
							
								
								
									
										256
									
								
								src/lib/http.c
									
									
									
									
									
								
							
							
						
						
									
										256
									
								
								src/lib/http.c
									
									
									
									
									
								
							| @@ -1,18 +1,23 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * HTTP implementation | ||||
|  * src/lib/http.c | ||||
|  * Lorenz Stechauner, 2020-12-09 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief HTTP implementation | ||||
|  * @file src/lib/http.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-09 | ||||
|  */ | ||||
|  | ||||
| #include "http.h" | ||||
| #include "utils.h" | ||||
| #include "compress.h" | ||||
|  | ||||
| #include <string.h> | ||||
|  | ||||
|  | ||||
| void http_to_camel_case(char *str, int mode) { | ||||
|     char last = '-'; | ||||
|     char ch; | ||||
|     if (mode == HTTP_PRESERVE) | ||||
|         return; | ||||
|  | ||||
|     char ch, last = '-'; | ||||
|     for (int i = 0; i < strlen(str); i++) { | ||||
|         ch = str[i]; | ||||
|         if (mode == HTTP_CAMEL && last == '-' && ch >= 'a' && ch <= 'z') { | ||||
| @@ -24,12 +29,50 @@ void http_to_camel_case(char *str, int mode) { | ||||
|     } | ||||
| } | ||||
|  | ||||
| const char *http_field_get_name(const http_field *field) { | ||||
|     if (field->type == HTTP_FIELD_NORMAL) { | ||||
|         return field->normal.name; | ||||
|     } else if (field->type == HTTP_FIELD_EX_VALUE) { | ||||
|         return field->ex_value.name; | ||||
|     } else if (field->type == HTTP_FIELD_EX_NAME) { | ||||
|         return field->ex_name.name; | ||||
|     } | ||||
|     return NULL; | ||||
| } | ||||
|  | ||||
| const char *http_field_get_value(const http_field *field) { | ||||
|     if (field->type == HTTP_FIELD_NORMAL) { | ||||
|         return field->normal.value; | ||||
|     } else if (field->type == HTTP_FIELD_EX_VALUE) { | ||||
|         return field->ex_value.value; | ||||
|     } else if (field->type == HTTP_FIELD_EX_NAME) { | ||||
|         return field->ex_name.value; | ||||
|     } | ||||
|     return NULL; | ||||
| } | ||||
|  | ||||
| void http_free_field(http_field *f) { | ||||
|     if (f->type == HTTP_FIELD_NORMAL) { | ||||
|         f->normal.name[0] = 0; | ||||
|         f->normal.value[0] = 0; | ||||
|     } else if (f->type == HTTP_FIELD_EX_VALUE) { | ||||
|         f->ex_value.name[0] = 0; | ||||
|         free(f->ex_value.value); | ||||
|         f->ex_value.value = NULL; | ||||
|     } else if (f->type == HTTP_FIELD_EX_NAME) { | ||||
|         free(f->ex_name.name); | ||||
|         free(f->ex_name.value); | ||||
|         f->ex_name.name = NULL; | ||||
|         f->ex_name.value = NULL; | ||||
|     } | ||||
| } | ||||
|  | ||||
| void http_free_hdr(http_hdr *hdr) { | ||||
|     for (int i = 0; i < hdr->field_num; i++) { | ||||
|         free(hdr->fields[i][0]); | ||||
|         free(hdr->fields[i][1]); | ||||
|         http_free_field(&hdr->fields[i]); | ||||
|     } | ||||
|     hdr->field_num = 0; | ||||
|     hdr->last_field_num = -1; | ||||
| } | ||||
|  | ||||
| void http_free_req(http_req *req) { | ||||
| @@ -42,48 +85,67 @@ void http_free_res(http_res *res) { | ||||
|     http_free_hdr(&res->hdr); | ||||
| } | ||||
|  | ||||
| int http_parse_header_field(http_hdr *hdr, const char *buf, const char *end_ptr) { | ||||
|     char *pos1 = memchr(buf, ':', end_ptr - buf); | ||||
|     char *pos2; | ||||
| int http_parse_header_field(http_hdr *hdr, const char *buf, const char *end_ptr, int flags) { | ||||
|     if (hdr->last_field_num > hdr->field_num) { | ||||
|         print(ERR_STR "Unable to parse header: Invalid state" CLR_STR); | ||||
|         return 3; | ||||
|     } | ||||
|  | ||||
|     char *pos1 = (char *) buf, *pos2 = (char *) end_ptr; | ||||
|     if (buf[0] == ' ' || buf[0] == '\t') { | ||||
|         if (hdr->last_field_num == -1) { | ||||
|             print(ERR_STR "Unable to parse header" CLR_STR); | ||||
|             return 3; | ||||
|         } | ||||
|         http_field *f = &hdr->fields[(int) hdr->last_field_num]; | ||||
|  | ||||
|         str_trim_lws(&pos1, &pos2); | ||||
|         http_append_to_header_field(f, pos1, pos2 - pos1); | ||||
|  | ||||
|         return 0; | ||||
|     } | ||||
|  | ||||
|     pos1 = memchr(buf, ':', end_ptr - buf); | ||||
|     if (pos1 == NULL) { | ||||
|         print(ERR_STR "Unable to parse header" CLR_STR); | ||||
|         return 3; | ||||
|     } | ||||
|  | ||||
|     long len = pos1 - buf; | ||||
|     hdr->fields[(int) hdr->field_num][0] = malloc(len + 1); | ||||
|     sprintf(hdr->fields[(int) hdr->field_num][0], "%.*s", (int) len, buf); | ||||
|     http_to_camel_case(hdr->fields[(int) hdr->field_num][0], HTTP_CAMEL); | ||||
|     long len1 = pos1 - buf; | ||||
|  | ||||
|     pos1++; | ||||
|     pos2 = (char *) end_ptr - 1; | ||||
|     while (pos1[0] == ' ') pos1++; | ||||
|     while (pos2[0] == ' ') pos2--; | ||||
|     len = pos2 - pos1 + 1; | ||||
|     str_trim_lws(&pos1, &pos2); | ||||
|     long len2 = pos2 - pos1; | ||||
|  | ||||
|     if (len <= 0) { | ||||
|         hdr->fields[(int) hdr->field_num][1] = malloc(1); | ||||
|         hdr->fields[(int) hdr->field_num][1][0] = 0; | ||||
|     char field_num = hdr->field_num; | ||||
|     int found = http_get_header_field_num_len(hdr, buf, len1); | ||||
|     if (!(flags & HTTP_MERGE_FIELDS) || found == -1) { | ||||
|         if (http_add_header_field_len(hdr, buf, len1, pos1, len2 < 0 ? 0 : len2) != 0) { | ||||
|             print(ERR_STR "Unable to parse header: Too many header fields" CLR_STR); | ||||
|             return 3; | ||||
|         } | ||||
|     } else { | ||||
|         hdr->fields[(int) hdr->field_num][1] = malloc(len + 1); | ||||
|         sprintf(hdr->fields[(int) hdr->field_num][1], "%.*s", (int) len, pos1); | ||||
|         field_num = (char) found; | ||||
|         http_append_to_header_field(&hdr->fields[found], ", ", 2); | ||||
|         http_append_to_header_field(&hdr->fields[found], pos1, len2); | ||||
|     } | ||||
|     hdr->field_num++; | ||||
|  | ||||
|     hdr->last_field_num = (char) field_num; | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int http_receive_request(sock *client, http_req *req) { | ||||
|     long rcv_len, len; | ||||
|     char *ptr, *pos0, *pos1, *pos2; | ||||
|     char buf[CLIENT_MAX_HEADER_SIZE]; | ||||
|     char *ptr, *pos0 = buf, *pos1, *pos2; | ||||
|     memset(buf, 0, sizeof(buf)); | ||||
|     memset(req->method, 0, sizeof(req->method)); | ||||
|     memset(req->version, 0, sizeof(req->version)); | ||||
|     req->uri = NULL; | ||||
|     req->hdr.field_num = 0; | ||||
|     req->hdr.last_field_num = -1; | ||||
|  | ||||
|     while (1) { | ||||
|         rcv_len  = sock_recv(client, buf, CLIENT_MAX_HEADER_SIZE, 0); | ||||
|         rcv_len = sock_recv(client, buf, CLIENT_MAX_HEADER_SIZE, MSG_PEEK); | ||||
|         if (rcv_len <= 0) { | ||||
|             print("Unable to receive http header: %s", sock_strerror(client)); | ||||
|             return -1; | ||||
| @@ -93,6 +155,8 @@ int http_receive_request(sock *client, http_req *req) { | ||||
|         if (header_len <= 0) { | ||||
|             print(ERR_STR "Unable to parse http header: End of header not found" CLR_STR); | ||||
|             return 5; | ||||
|         } else { | ||||
|             rcv_len = sock_recv(client, buf, header_len, 0); | ||||
|         } | ||||
|  | ||||
|         for (int i = 0; i < header_len; i++) { | ||||
| @@ -144,7 +208,7 @@ int http_receive_request(sock *client, http_req *req) { | ||||
|                 sprintf(req->uri, "%.*s", (int) len, pos1); | ||||
|                 sprintf(req->version, "%.3s", pos2 + 5); | ||||
|             } else { | ||||
|                 int ret = http_parse_header_field(&req->hdr, ptr, pos0); | ||||
|                 int ret = http_parse_header_field(&req->hdr, ptr, pos0, HTTP_MERGE_FIELDS); | ||||
|                 if (ret != 0) return ret; | ||||
|             } | ||||
|             ptr = pos0 + 2; | ||||
| @@ -154,41 +218,98 @@ int http_receive_request(sock *client, http_req *req) { | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     client->buf_len = rcv_len - (pos0 - buf + 4); | ||||
|     if (client->buf_len > 0) { | ||||
|         client->buf = malloc(client->buf_len); | ||||
|         client->buf_off = 0; | ||||
|         memcpy(client->buf, pos0 + 4, client->buf_len); | ||||
|     } | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| char *http_get_header_field(const http_hdr *hdr, const char *field_name) { | ||||
|     char field_name_1[256], field_name_2[256]; | ||||
|     strcpy(field_name_1, field_name); | ||||
|     http_to_camel_case(field_name_1, HTTP_LOWER); | ||||
|     for (int i = 0; i < hdr->field_num; i++) { | ||||
|         strcpy(field_name_2, hdr->fields[i][0]); | ||||
|         http_to_camel_case(field_name_2, HTTP_LOWER); | ||||
|         if (strcmp(field_name_1, field_name_2) == 0) { | ||||
|             return hdr->fields[i][1]; | ||||
|         } | ||||
|     } | ||||
|     return NULL; | ||||
| const char *http_get_header_field(const http_hdr *hdr, const char *field_name) { | ||||
|     return http_get_header_field_len(hdr, field_name, strlen(field_name)); | ||||
| } | ||||
|  | ||||
| void http_add_header_field(http_hdr *hdr, const char *field_name, const char *field_value) { | ||||
|     size_t len_name = strlen(field_name); | ||||
|     size_t len_value = strlen(field_value); | ||||
|     char *_field_name = malloc(len_name + 1); | ||||
|     char *_field_value = malloc(len_value + 1); | ||||
|     strcpy(_field_name, field_name); | ||||
|     strcpy(_field_value, field_value); | ||||
|     http_to_camel_case(_field_name, HTTP_PRESERVE); | ||||
|     hdr->fields[(int) hdr->field_num][0] = _field_name; | ||||
|     hdr->fields[(int) hdr->field_num][1] = _field_value; | ||||
| const char *http_get_header_field_len(const http_hdr *hdr, const char *field_name, unsigned long len) { | ||||
|     int num = http_get_header_field_num_len(hdr, field_name, len); | ||||
|     return (num >= 0 && num < HTTP_MAX_HEADER_FIELD_NUM) ? http_field_get_value(&hdr->fields[num]) : NULL; | ||||
| } | ||||
|  | ||||
| int http_get_header_field_num(const http_hdr *hdr, const char *field_name) { | ||||
|     return http_get_header_field_num_len(hdr, field_name, strlen(field_name)); | ||||
| } | ||||
|  | ||||
| int http_get_header_field_num_len(const http_hdr *hdr, const char *field_name, unsigned long len) { | ||||
|     char field_name_1[256], field_name_2[256]; | ||||
|     memcpy(field_name_1, field_name, len); | ||||
|     field_name_1[len] = 0; | ||||
|     http_to_camel_case(field_name_1, HTTP_LOWER); | ||||
|  | ||||
|     for (int i = 0; i < hdr->field_num; i++) { | ||||
|         strcpy(field_name_2, http_field_get_name(&hdr->fields[i])); | ||||
|         http_to_camel_case(field_name_2, HTTP_LOWER); | ||||
|  | ||||
|         if (strcmp(field_name_1, field_name_2) == 0) | ||||
|             return i; | ||||
|     } | ||||
|  | ||||
|     return -1; | ||||
| } | ||||
|  | ||||
| int http_add_header_field(http_hdr *hdr, const char *field_name, const char *field_value) { | ||||
|     return http_add_header_field_len(hdr, field_name, strlen(field_name), field_value, strlen(field_value)); | ||||
| } | ||||
|  | ||||
| int http_add_header_field_len(http_hdr *hdr, const char *name, unsigned long name_len, const char *value, unsigned long value_len) { | ||||
|     if (hdr->field_num >= HTTP_MAX_HEADER_FIELD_NUM) | ||||
|         return -1; | ||||
|  | ||||
|     http_field *f = &hdr->fields[(int) hdr->field_num]; | ||||
|  | ||||
|     if (name_len < sizeof(f->normal.name) && value_len < sizeof(f->normal.value)) { | ||||
|         f->type = HTTP_FIELD_NORMAL; | ||||
|         memcpy(f->normal.name, name, name_len); | ||||
|         memcpy(f->normal.value, value, value_len); | ||||
|         f->normal.name[name_len] = 0; | ||||
|         f->normal.value[value_len] = 0; | ||||
|         http_to_camel_case(f->normal.name, HTTP_PRESERVE); | ||||
|     } else if (name_len < sizeof(f->ex_value.name)) { | ||||
|         f->type = HTTP_FIELD_EX_VALUE; | ||||
|         f->ex_value.value = malloc(value_len + 1); | ||||
|         memcpy(f->ex_value.name, name, name_len); | ||||
|         memcpy(f->ex_value.value, value, value_len); | ||||
|         f->ex_value.name[name_len] = 0; | ||||
|         f->ex_value.value[value_len] = 0; | ||||
|         http_to_camel_case(f->ex_value.name, HTTP_PRESERVE); | ||||
|     } else { | ||||
|         f->type = HTTP_FIELD_EX_NAME; | ||||
|         f->ex_name.name = malloc(name_len + 1); | ||||
|         f->ex_name.value = malloc(value_len + 1); | ||||
|         memcpy(f->ex_name.name, name, name_len); | ||||
|         memcpy(f->ex_name.value, value, value_len); | ||||
|         f->ex_name.name[name_len] = 0; | ||||
|         f->ex_name.value[value_len] = 0; | ||||
|         http_to_camel_case(f->ex_name.name, HTTP_PRESERVE); | ||||
|     } | ||||
|  | ||||
|     hdr->field_num++; | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| void http_append_to_header_field(http_field *field, const char *value, unsigned long len) { | ||||
|     if (field->type == HTTP_FIELD_NORMAL) { | ||||
|         unsigned long total_len = strlen(field->normal.value) + len + 1; | ||||
|         if (total_len < sizeof(field->normal.value)) { | ||||
|             strncat(field->normal.value, value, len); | ||||
|         } else { | ||||
|             field->type = HTTP_FIELD_EX_VALUE; | ||||
|             char *new = malloc(total_len); | ||||
|             strcpy(new, field->normal.value); | ||||
|             strncat(new, value, len); | ||||
|             field->ex_value.value = new; | ||||
|         } | ||||
|     } else if (field->type == HTTP_FIELD_EX_VALUE) { | ||||
|         field->ex_value.value = realloc(field->ex_value.value, strlen(field->ex_value.value) + len + 1); | ||||
|         strncat(field->ex_value.value, value, len); | ||||
|     } else if (field->type == HTTP_FIELD_EX_NAME) { | ||||
|         field->ex_name.value = realloc(field->ex_name.value, strlen(field->ex_name.value) + len + 1); | ||||
|         strncat(field->ex_name.value, value, len); | ||||
|     } | ||||
| } | ||||
|  | ||||
| void http_remove_header_field(http_hdr *hdr, const char *field_name, int mode) { | ||||
| @@ -203,12 +324,11 @@ void http_remove_header_field(http_hdr *hdr, const char *field_name, int mode) { | ||||
|         diff = -1; | ||||
|     } | ||||
|     for (; i < hdr->field_num && i >= 0; i += diff) { | ||||
|         strcpy(field_name_2, hdr->fields[i][0]); | ||||
|         strcpy(field_name_2, http_field_get_name(&hdr->fields[i])); | ||||
|         http_to_camel_case(field_name_2, HTTP_LOWER); | ||||
|         if (strcmp(field_name_1, field_name_2) == 0) { | ||||
|             for (int j = i; j < hdr->field_num - 1; j++) { | ||||
|                 memcpy(hdr->fields[j], hdr->fields[j + 1], sizeof(hdr->fields[0])); | ||||
|             } | ||||
|             http_free_field(&hdr->fields[i]); | ||||
|             memmove(&hdr->fields[i], &hdr->fields[i + 1], sizeof(hdr->fields[0]) * (hdr->field_num - i)); | ||||
|             hdr->field_num--; | ||||
|             if (mode == HTTP_REMOVE_ALL) { | ||||
|                 i -= diff; | ||||
| @@ -223,7 +343,8 @@ int http_send_response(sock *client, http_res *res) { | ||||
|     char buf[CLIENT_MAX_HEADER_SIZE]; | ||||
|     long off = sprintf(buf, "HTTP/%s %03i %s\r\n", res->version, res->status->code, res->status->msg); | ||||
|     for (int i = 0; i < res->hdr.field_num; i++) { | ||||
|         off += sprintf(buf + off, "%s: %s\r\n", res->hdr.fields[i][0], res->hdr.fields[i][1]); | ||||
|         const http_field *f = &res->hdr.fields[i]; | ||||
|         off += sprintf(buf + off, "%s: %s\r\n", http_field_get_name(f), http_field_get_value(f)); | ||||
|     } | ||||
|     off += sprintf(buf + off, "\r\n"); | ||||
|     if (sock_send(client, buf, off, 0) < 0) { | ||||
| @@ -236,7 +357,8 @@ int http_send_request(sock *server, http_req *req) { | ||||
|     char buf[CLIENT_MAX_HEADER_SIZE]; | ||||
|     long off = sprintf(buf, "%s %s HTTP/%s\r\n", req->method, req->uri, req->version); | ||||
|     for (int i = 0; i < req->hdr.field_num; i++) { | ||||
|         off += sprintf(buf + off, "%s: %s\r\n", req->hdr.fields[i][0], req->hdr.fields[i][1]); | ||||
|         const http_field *f = &req->hdr.fields[i]; | ||||
|         off += sprintf(buf + off, "%s: %s\r\n", http_field_get_name(f), http_field_get_value(f)); | ||||
|     } | ||||
|     off += sprintf(buf + off, "\r\n"); | ||||
|     long ret = sock_send(server, buf, off, 0); | ||||
| @@ -314,9 +436,9 @@ const http_doc_info *http_get_status_info(const http_status *status) { | ||||
| } | ||||
|  | ||||
| int http_get_compression(const http_req *req, const http_res *res) { | ||||
|     char *accept_encoding = http_get_header_field(&req->hdr, "Accept-Encoding"); | ||||
|     char *content_type = http_get_header_field(&res->hdr, "Content-Type"); | ||||
|     char *content_encoding = http_get_header_field(&res->hdr, "Content-Encoding"); | ||||
|     const char *accept_encoding = http_get_header_field(&req->hdr, "Accept-Encoding"); | ||||
|     const char *content_type = http_get_header_field(&res->hdr, "Content-Type"); | ||||
|     const char *content_encoding = http_get_header_field(&res->hdr, "Content-Encoding"); | ||||
|     if (mime_is_compressible(content_type) && content_encoding == NULL && accept_encoding != NULL) { | ||||
|         if (strstr(accept_encoding, "br") != NULL) { | ||||
|             return COMPRESS_BR; | ||||
|   | ||||
| @@ -1,12 +1,13 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * HTTP implementation (header file) | ||||
|  * src/lib/http.h | ||||
|  * Lorenz Stechauner, 2020-12-09 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief HTTP implementation (header file) | ||||
|  * @file src/lib/http.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-09 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_HTTP_H | ||||
| #define NECRONDA_SERVER_HTTP_H | ||||
| #ifndef SESIMOS_HTTP_H | ||||
| #define SESIMOS_HTTP_H | ||||
|  | ||||
| #include "sock.h" | ||||
|  | ||||
| @@ -18,6 +19,12 @@ | ||||
| #define HTTP_REMOVE_ALL 1 | ||||
| #define HTTP_REMOVE_LAST 2 | ||||
|  | ||||
| #define HTTP_FIELD_NORMAL 0 | ||||
| #define HTTP_FIELD_EX_VALUE 1 | ||||
| #define HTTP_FIELD_EX_NAME 2 | ||||
|  | ||||
| #define HTTP_MERGE_FIELDS 1 | ||||
|  | ||||
| #define HTTP_1XX_STR "\x1B[1;32m" | ||||
| #define HTTP_2XX_STR "\x1B[1;32m" | ||||
| #define HTTP_3XX_STR "\x1B[1;33m" | ||||
| @@ -30,13 +37,14 @@ | ||||
| #define HTTP_COLOR_ERROR "#C00000" | ||||
|  | ||||
| #define CLIENT_MAX_HEADER_SIZE 8192 | ||||
| #define HTTP_MAX_HEADER_FIELD_NUM 64 | ||||
|  | ||||
| #ifndef SERVER_STR | ||||
| #   define SERVER_STR "Necronda" | ||||
| #   define SERVER_STR "Sesimos" | ||||
| #endif | ||||
|  | ||||
| #ifndef SERVER_STR_HTML | ||||
| #   define SERVER_STR_HTML "Necronda web server" | ||||
| #   define SERVER_STR_HTML "Sesimos web server" | ||||
| #endif | ||||
|  | ||||
| typedef struct { | ||||
| @@ -57,9 +65,28 @@ typedef struct { | ||||
|     const char *doc; | ||||
| } http_doc_info; | ||||
|  | ||||
| typedef struct { | ||||
|     char type; | ||||
|     union { | ||||
|         struct { | ||||
|             char name[64]; | ||||
|             char value[192]; | ||||
|         } normal; | ||||
|         struct { | ||||
|             char name[192]; | ||||
|             char *value; | ||||
|         } ex_value; | ||||
|         struct { | ||||
|             char *name; | ||||
|             char *value; | ||||
|         } ex_name; | ||||
|     }; | ||||
| } http_field; | ||||
|  | ||||
| typedef struct { | ||||
|     char field_num; | ||||
|     char *fields[64][2]; | ||||
|     char last_field_num; | ||||
|     http_field fields[HTTP_MAX_HEADER_FIELD_NUM]; | ||||
| } http_hdr; | ||||
|  | ||||
| typedef struct { | ||||
| @@ -75,12 +102,23 @@ typedef struct { | ||||
|     http_hdr hdr; | ||||
| } http_res; | ||||
|  | ||||
| typedef enum { | ||||
|     NONE, INTERNAL, CLIENT_REQ, SERVER_REQ, SERVER, SERVER_RES, CLIENT_RES | ||||
| } http_error_origin; | ||||
|  | ||||
| typedef struct { | ||||
|     unsigned short status; | ||||
|     http_error_origin origin; | ||||
|     const char* ws_key; | ||||
| } http_status_ctx; | ||||
|  | ||||
| extern const http_status http_statuses[]; | ||||
| extern const http_status_msg http_status_messages[]; | ||||
| extern const int http_statuses_size; | ||||
| extern const int http_status_messages_size; | ||||
|  | ||||
| extern const char http_default_document[]; | ||||
| extern const char http_rev_proxy_document[]; | ||||
| extern const char http_error_document[]; | ||||
| extern const char http_error_icon[]; | ||||
| extern const char http_warning_document[]; | ||||
| @@ -92,6 +130,12 @@ extern const char http_info_icon[]; | ||||
|  | ||||
| void http_to_camel_case(char *str, int mode); | ||||
|  | ||||
| const char *http_field_get_name(const http_field *field); | ||||
|  | ||||
| const char *http_field_get_value(const http_field *field); | ||||
|  | ||||
| void http_free_field(http_field *f); | ||||
|  | ||||
| void http_free_hdr(http_hdr *hdr); | ||||
|  | ||||
| void http_free_req(http_req *req); | ||||
| @@ -100,11 +144,21 @@ void http_free_res(http_res *res); | ||||
|  | ||||
| int http_receive_request(sock *client, http_req *req); | ||||
|  | ||||
| int http_parse_header_field(http_hdr *hdr, const char *buf, const char *end_ptr) ; | ||||
| int http_parse_header_field(http_hdr *hdr, const char *buf, const char *end_ptr, int flags); | ||||
|  | ||||
| char *http_get_header_field(const http_hdr *hdr, const char *field_name); | ||||
| const char *http_get_header_field(const http_hdr *hdr, const char *field_name); | ||||
|  | ||||
| void http_add_header_field(http_hdr *hdr, const char *field_name, const char *field_value); | ||||
| const char *http_get_header_field_len(const http_hdr *hdr, const char *field_name, unsigned long len); | ||||
|  | ||||
| int http_get_header_field_num(const http_hdr *hdr, const char *field_name); | ||||
|  | ||||
| int http_get_header_field_num_len(const http_hdr *hdr, const char *field_name, unsigned long len); | ||||
|  | ||||
| int http_add_header_field(http_hdr *hdr, const char *field_name, const char *field_value); | ||||
|  | ||||
| int http_add_header_field_len(http_hdr *hdr, const char *name, unsigned long name_len, const char *value, unsigned long value_len); | ||||
|  | ||||
| void http_append_to_header_field(http_field *field, const char *value, unsigned long len); | ||||
|  | ||||
| void http_remove_header_field(http_hdr *hdr, const char *field_name, int mode); | ||||
|  | ||||
| @@ -126,4 +180,4 @@ const http_doc_info *http_get_status_info(const http_status *status); | ||||
|  | ||||
| int http_get_compression(const http_req *req, const http_res *res); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_HTTP_H | ||||
| #endif //SESIMOS_HTTP_H | ||||
|   | ||||
| @@ -1,13 +1,15 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * HTTP static implementation | ||||
|  * src/lib/http_static.c | ||||
|  * Lorenz Stechauner, 2021-05-03 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief HTTP static implementation | ||||
|  * @file src/lib/http_static.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-05-03 | ||||
|  */ | ||||
|  | ||||
| #include "../necronda.h" | ||||
| #include "../defs.h" | ||||
| #include "http.h" | ||||
|  | ||||
|  | ||||
| const http_status http_statuses[] = { | ||||
|         {100, "Informational", "Continue"}, | ||||
|         {101, "Informational", "Switching Protocols"}, | ||||
| @@ -116,20 +118,85 @@ const char http_default_document[] = | ||||
|         "\t<link rel=\"shortcut icon\" type=\"image/x-icon\" href=\"/favicon.ico\"/>\n" | ||||
|         "%5$s" | ||||
|         "\t<style>\n" | ||||
|         "\t\thtml{font-family:\"Arial\",sans-serif;--error:" HTTP_COLOR_ERROR ";--warning:" HTTP_COLOR_WARNING ";--success:" HTTP_COLOR_SUCCESS ";--info:" HTTP_COLOR_INFO ";--color:var(--%4$s);}\n" | ||||
|         "\t\thtml{font-family:\"Arial\",sans-serif;--error:" HTTP_COLOR_ERROR ";--warning:" HTTP_COLOR_WARNING ";--success:" HTTP_COLOR_SUCCESS ";--info:" HTTP_COLOR_INFO ";--soft:#808080;--color:var(--%4$s);}\n" | ||||
|         "\t\tbody{background-color:#F0F0F0;margin:0;}\n" | ||||
|         "\t\tmain{max-width:650px;margin:2em auto;}\n" | ||||
|         "\t\tsection{margin:1em;background-color:#FFFFFF;border: 1px solid var(--color);border-radius:4px;padding:1em;}\n" | ||||
|         "\t\th1,h2,h3,h4,h5,h6,h7{text-align:center;color:var(--color);font-weight:normal;}\n" | ||||
|         "\t\th1{font-size:3em;margin:0.125em 0 0.125em 0;}\n" | ||||
|         "\t\tsection{margin:2em 1em;background-color:#FFFFFF;border: 1px solid var(--color);border-radius:4px;padding:1em;}\n" | ||||
|         "\t\th1,h2,h3,h4,h5,h6{text-align:center;color:var(--color);font-weight:normal;}\n" | ||||
|         "\t\th1{font-size:3em;margin:0.125em 0;}\n" | ||||
|         "\t\th2{font-size:1.5em;margin:0.25em 0 1em 0;}\n" | ||||
|         "\t\tp{text-align:center;font-size:0.875em;}\n" | ||||
|         "\t\tdiv.footer{color:#808080;font-size:0.75em;text-align:center;margin:2em 0 0.5em 0;}\n" | ||||
|         "\t\tdiv.footer a{color:#808080;}\n" | ||||
|         "\t\tdiv.footer{color:var(--soft);font-size:0.75em;text-align:center;margin:2em 0 0.5em 0;}\n" | ||||
|         "\t\tdiv.footer a{color:var(--soft);}\n" | ||||
|         "\t\tul,ol{width:fit-content;margin:auto;}\n" | ||||
|         "\t\tpre{width:fit-content;margin:2em auto 0 auto;}\n" | ||||
|         "\n" | ||||
|         "\t\tsection.error-ctx{display:flex;padding:0;border:none;}\n" | ||||
|         "\t\tdiv.box{flex:100%% 1 1;border:1px solid var(--info);color:var(--info);position:relative;padding:1em;box-sizing:border-box;text-align:center;}\n" | ||||
|         "\t\tdiv.box.error{border-color:var(--error);color:var(--error);}\n" | ||||
|         "\t\tdiv.box.success{border-color:var(--success);color:var(--success);}\n" | ||||
|         "\t\tdiv.arrow{position:absolute;height:20px;width:30px;z-index:10;background-repeat:no-repeat;background-size:contain;}\n" | ||||
|         "\t\tdiv.arrow.response{left:-17.5px;bottom:calc(33.3333%% - 10px);}\n" | ||||
|         "\t\tdiv.arrow.request{right:-17.5px;top:calc(33.3333%% - 10px);}\n" | ||||
|         "\t\tdiv.border{flex:1px 0 0;background-color:var(--info);}\n" | ||||
|         "\t\tdiv.border.error{background-color:var(--error);}\n" | ||||
|         "\t\tdiv.border.success{background-color:var(--success);}\n" | ||||
|         "\t\tdiv.content>span{display:block;color:var(--soft);font-size:0.75em;}\n" | ||||
|         "\t\tdiv.content>img{height:3.75rem;margin:0.75rem auto;display:block;}\n" | ||||
|         "\t\th3{font-size:2.25em;margin:0.75rem 0 0 0;color:unset;height:2.5rem;}\n" | ||||
|         "\t\th4{font-size:1em;margin:0 0 0.75rem 0;color:unset;height:1.25rem;}\n" | ||||
|         "\n" | ||||
|         "\t\tdiv.arrow.request.success{background-image:url('data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTEsMSBMMjUsMSBMMjksMTAgTDI1LDE5IEwxLDE5IiBmaWxsPSIjRkZG" | ||||
|         "RkZGIiBzdHJva2U9IiMwMDgwMDAiIHN0cm9rZS13aWR0aD0iMiIvPjwvc3ZnPgo=');}\n" | ||||
|         "\t\tdiv.arrow.request.error{background-image:url('data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTEsMSBMMjUsMSBMMjksMTAgTDI1LDE5IEwxLDE5IiBmaWxsPSIjRkZG" | ||||
|         "RkZGIiBzdHJva2U9IiNDMDAwMDAiIHN0cm9rZS13aWR0aD0iMiIvPjwvc3ZnPgo=');}\n" | ||||
|         "\t\tdiv.arrow.response.success{background-image:url('data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTI5LDE5IEw1LDE5IEwxLDEwIEw1LDEgTDI5LDEiIGZpbGw9IiNGRkZG" | ||||
|         "RkYiIHN0cm9rZT0iIzAwODAwMCIgc3Ryb2tlLXdpZHRoPSIyIi8+PC9zdmc+Cg==');}\n" | ||||
|         "\t\tdiv.arrow.response.error{background-image:url('data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTI5LDE5IEw1LDE5IEwxLDEwIEw1LDEgTDI5LDEiIGZpbGw9IiNGRkZG" | ||||
|         "RkYiIHN0cm9rZT0iI0MwMDAwMCIgc3Ryb2tlLXdpZHRoPSIyIi8+PC9zdmc+Cg==');}\n" | ||||
|         "\n" | ||||
|         "\t\t@media(prefers-color-scheme:dark){\n" | ||||
|         "\t\t\thtml{color:#FFFFFF;}\n" | ||||
|         "\t\t\thtml{color:#FFFFFF;--soft:#404040;}\n" | ||||
|         "\t\t\tbody{background-color:#101010;}\n" | ||||
|         "\t\t\tsection{background-color:#181818;}\n" | ||||
|         "\n" | ||||
|         "\t\t\tdiv.arrow.request.success{background-image:url('data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTEsMSBMMjUsMSBMMjksMTAgTDI1LDE5IEwxLDE5IiBmaWxsPSIjMTgx" | ||||
|         "ODE4IiBzdHJva2U9IiMwMDgwMDAiIHN0cm9rZS13aWR0aD0iMiIvPjwvc3ZnPgo=');}\n" | ||||
|         "\t\t\tdiv.arrow.request.error{background-image:url('data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTEsMSBMMjUsMSBMMjksMTAgTDI1LDE5IEwxLDE5IiBmaWxsPSIjMTgx" | ||||
|         "ODE4IiBzdHJva2U9IiNDMDAwMDAiIHN0cm9rZS13aWR0aD0iMiIvPjwvc3ZnPgo=');}\n" | ||||
|         "\t\t\tdiv.arrow.response.success{background-image:url('data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTI5LDE5IEw1LDE5IEwxLDEwIEw1LDEgTDI5LDEiIGZpbGw9IiMxODE4" | ||||
|         "MTgiIHN0cm9rZT0iIzAwODAwMCIgc3Ryb2tlLXdpZHRoPSIyIi8+PC9zdmc+Cg==');}\n" | ||||
|         "\t\t\tdiv.arrow.response.error{background-image:url('data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTI5LDE5IEw1LDE5IEwxLDEwIEw1LDEgTDI5LDEiIGZpbGw9IiMxODE4" | ||||
|         "MTgiIHN0cm9rZT0iI0MwMDAwMCIgc3Ryb2tlLXdpZHRoPSIyIi8+PC9zdmc+Cg==');}\n" | ||||
|         "\t\t}\n" | ||||
|         "\t\t@media(min-width:650px){\n" | ||||
|         "\t\t\tdiv.box:first-child{border-top-left-radius:4px;border-bottom-left-radius:4px;border-right:none;}\n" | ||||
|         "\t\t\tdiv.box:last-child{border-top-right-radius:4px;border-bottom-right-radius:4px;border-left:none;}\n" | ||||
|         "\t\t\tdiv.box:not(:last-child):not(:first-child){border-left:none;border-right:none;}\n" | ||||
|         "\t\t}\n" | ||||
|         "\t\t@media(max-width:650px){\n" | ||||
|         "\t\t\tsection.error-ctx{flex-direction:column;height:unset;}\n" | ||||
|         "\t\t\tdiv.box:first-child{border-top-left-radius:4px;border-top-right-radius:4px;border-bottom:none;padding-top:1em;}\n" | ||||
|         "\t\t\tdiv.box:last-child{border-bottom-right-radius:4px;border-bottom-left-radius:4px;border-top:none;padding-bottom:1em;}\n" | ||||
|         "\t\t\tdiv.box:not(:last-child):not(:first-child){border-top:none;border-bottom:none;}\n" | ||||
|         "\t\t\tdiv.arrow.response{transform:rotate(90deg);top:-10px;left:calc(33.3333%% - 22.5px);right:unset;}\n" | ||||
|         "\t\t\tdiv.arrow.request{transform:rotate(90deg);bottom:-10px;right:calc(33.3333%% - 22.5px);top:unset;}\n" | ||||
|         "\t\t}\n" | ||||
|         "\t</style>\n" | ||||
|         "</head>\n" | ||||
| @@ -137,12 +204,52 @@ const char http_default_document[] = | ||||
|         "\t<main>\n" | ||||
|         "\t\t<section>\n" | ||||
|         "%3$s" | ||||
|         "%9$s" | ||||
|         "\t\t\t<div class=\"footer\"><a href=\"https://%7$s/\">%7$s</a> - " SERVER_STR_HTML "</div>\n" | ||||
|         "\t\t</section>\n" | ||||
|         "%8$s" | ||||
|         "\t</main>\n" | ||||
|         "</body>\n" | ||||
|         "</html>\n"; | ||||
|  | ||||
| const char http_rev_proxy_document[] = | ||||
|         "\t\t<section class=\"error-ctx\">\n" | ||||
|         "\t\t\t<div class=\"box%1$s\">\n" | ||||
|         "\t\t\t\t<div class=\"content\">\n" | ||||
|         "\t\t\t\t\t<span>Client</span>\n" | ||||
|         "\t\t\t\t\t<img src=\"data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iNjQiIGhlaWdodD0iNjQiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHBhdGggZD0iTTIsMzIgYTMwLDMwLDAsMSwwLDYwLDAgYTMwLDMwLDAsMSwwLC02MCww" | ||||
|         "IEw2MiwzMiBNNiwxNiBMNTgsMTYgTTYsNDggTDU4LDQ4IE0zMiwyIEwzMiw2MiBhMTUsMzAsMCwx" | ||||
|         "LDAsMCwtNjAgYTE1LDMwLDAsMSwwLDAsNjAgWiIgc3Ryb2tlPSIjMDA4MDAwIiBzdHJva2Utd2lk" | ||||
|         "dGg9IjIiIGZpbGw9IiMwMDAwMDAwMCIvPjwvc3ZnPgo=\"/>\n" | ||||
|         "\t\t\t\t\t<span>Your Browser</span>\n" | ||||
|         "\t\t\t\t</div>\n" | ||||
|         "\t\t\t\t<div class=\"arrow request%2$s\"></div>\n" | ||||
|         "\t\t\t</div>\n" | ||||
|         "\t\t\t<div class=\"border%8$s\"></div>\n" | ||||
|         "\t\t\t<div class=\"box%3$s\">\n" | ||||
|         "\t\t\t\t<div class=\"content\">\n" | ||||
|         "\t\t\t\t\t<span>Reverse Proxy</span>\n" | ||||
|         "\t\t\t\t\t<h3>%10$03i</h3>\n" | ||||
|         "\t\t\t\t\t<h4>%11$s</h4>\n" | ||||
|         "\t\t\t\t\t<span>" SERVER_NAME "</span>\n" | ||||
|         "\t\t\t\t</div>\n" | ||||
|         "\t\t\t\t<div class=\"arrow request%4$s\"></div>\n" | ||||
|         "\t\t\t\t<div class=\"arrow response%5$s\"></div>\n" | ||||
|         "\t\t\t</div>\n" | ||||
|         "\t\t\t<div class=\"border%9$s\"></div>\n" | ||||
|         "\t\t\t<div class=\"box%6$s\">\n" | ||||
|         "\t\t\t\t<div class=\"content\">\n" | ||||
|         "\t\t\t\t\t<span>Server</span>\n" | ||||
|         "\t\t\t\t\t<h3>%12$s</h3>\n" | ||||
|         "\t\t\t\t\t<h4>%13$s</h4>\n" | ||||
|         "\t\t\t\t\t<span>%14$s</span>\n" | ||||
|         "\t\t\t\t</div>\n" | ||||
|         "\t\t\t\t<div class=\"arrow response%7$s\"></div>\n" | ||||
|         "\t\t\t</div>\n" | ||||
|         "\t\t</section>\n"; | ||||
|  | ||||
| const char http_error_document[] = | ||||
|         "\t\t\t<h1>%1$i</h1>\n" | ||||
|         "\t\t\t<h2>%2$s :(</h2>\n" | ||||
| @@ -158,7 +265,7 @@ const char http_error_icon[] = | ||||
|  | ||||
| const char http_warning_document[] = | ||||
|         "\t\t\t<h1>%1$i</h1>\n" | ||||
|         "\t\t\t<h2>%2$s :o</h2>\n" | ||||
|         "\t\t\t<h2>%2$s :)</h2>\n" | ||||
|         "\t\t\t<p>%3$s</p>\n" | ||||
|         "\t\t\t<p>%4$s</p>\n"; | ||||
|  | ||||
| @@ -166,7 +273,7 @@ const char http_warning_icon[] = | ||||
|         "\t<link rel=\"alternate icon\" type=\"image/svg+xml\" sizes=\"any\" href=\"data:image/svg+xml;base64," | ||||
|         "PHN2ZyB3aWR0aD0iMTYiIGhlaWdodD0iMTYiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAw" | ||||
|         "L3N2ZyI+PHRleHQgeD0iNCIgeT0iMTIiIGZpbGw9IiNFMEMwMDAiIHN0eWxlPSJmb250LWZhbWls" | ||||
|         "eTonQXJpYWwnLHNhbnMtc2VyaWYiPjpvPC90ZXh0Pjwvc3ZnPgo=\"/>\n"; | ||||
|         "eTonQXJpYWwnLHNhbnMtc2VyaWYiPjopPC90ZXh0Pjwvc3ZnPgo=\"/>\n"; | ||||
|  | ||||
|  | ||||
| const char http_success_document[] = | ||||
|   | ||||
| @@ -1,12 +1,11 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * FastCGI header file | ||||
|  * src/lib/include/fastcgi.h | ||||
|  * Lorenz Stechauner, 2021-05-03 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief FastCGI header file | ||||
|  * @file src/lib/include/fastcgi.h | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_EXTERN_FASTCGI_H | ||||
| #define NECRONDA_SERVER_EXTERN_FASTCGI_H | ||||
| #ifndef SESIMOS_EXTERN_FASTCGI_H | ||||
| #define SESIMOS_EXTERN_FASTCGI_H | ||||
|  | ||||
| /* | ||||
|  * Listening socket file number | ||||
| @@ -119,4 +118,4 @@ typedef struct { | ||||
|     FCGI_UnknownTypeBody body; | ||||
| } FCGI_UnknownTypeRecord; | ||||
|  | ||||
| #endif //NECRONDA_SERVER_EXTERN_FASTCGI_H | ||||
| #endif //SESIMOS_EXTERN_FASTCGI_H | ||||
|   | ||||
| @@ -1,14 +1,17 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Reverse proxy | ||||
|  * src/lib/rev_proxy.c | ||||
|  * Lorenz Stechauner, 2021-01-07 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Reverse proxy | ||||
|  * @file src/lib/rev_proxy.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-01-07 | ||||
|  */ | ||||
|  | ||||
| #include "../defs.h" | ||||
| #include "../server.h" | ||||
| #include "rev_proxy.h" | ||||
| #include "utils.h" | ||||
| #include "compress.h" | ||||
| #include "../necronda-server.h" | ||||
|  | ||||
| #include <openssl/ssl.h> | ||||
| #include <string.h> | ||||
| #include <errno.h> | ||||
| @@ -16,27 +19,22 @@ | ||||
| #include <arpa/inet.h> | ||||
| #include <sys/time.h> | ||||
|  | ||||
|  | ||||
| sock rev_proxy; | ||||
| char *rev_proxy_host = NULL; | ||||
| struct timeval server_timeout = {.tv_sec = SERVER_TIMEOUT, .tv_usec = 0}; | ||||
|  | ||||
| int rev_proxy_preload() { | ||||
|     rev_proxy.buf = NULL; | ||||
|     rev_proxy.buf_len = 0; | ||||
|     rev_proxy.buf_off = 0; | ||||
| int rev_proxy_preload(void) { | ||||
|     rev_proxy.ctx = SSL_CTX_new(TLS_client_method()); | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int rev_proxy_request_header(http_req *req, int enc) { | ||||
|     char buf1[256]; | ||||
|     char buf2[256]; | ||||
|     char buf1[256], buf2[256]; | ||||
|     int p_len; | ||||
|     http_remove_header_field(&req->hdr, "Connection", HTTP_REMOVE_ALL); | ||||
|     http_add_header_field(&req->hdr, "Connection", "keep-alive"); | ||||
|  | ||||
|     char *via = http_get_header_field(&req->hdr, "Via"); | ||||
|     sprintf(buf1, "HTTP/%s %s", req->version, DEFAULT_HOST); | ||||
|     const char *via = http_get_header_field(&req->hdr, "Via"); | ||||
|     sprintf(buf1, "HTTP/%s %s", req->version, SERVER_NAME); | ||||
|     if (via == NULL) { | ||||
|         http_add_header_field(&req->hdr, "Via", buf1); | ||||
|     } else { | ||||
| @@ -49,10 +47,10 @@ int rev_proxy_request_header(http_req *req, int enc) { | ||||
|         http_add_header_field(&req->hdr, "Via", buf2); | ||||
|     } | ||||
|  | ||||
|     char *host = http_get_header_field(&req->hdr, "Host"); | ||||
|     char *forwarded = http_get_header_field(&req->hdr, "Forwarded"); | ||||
|     const char *host = http_get_header_field(&req->hdr, "Host"); | ||||
|     const char *forwarded = http_get_header_field(&req->hdr, "Forwarded"); | ||||
|     int client_ipv6 = strchr(client_addr_str, ':') != NULL; | ||||
|     int server_ipv6 =  strchr(server_addr_str, ':') != NULL; | ||||
|     int server_ipv6 = strchr(server_addr_str, ':') != NULL; | ||||
|  | ||||
|     p_len = snprintf(buf1, sizeof(buf1), "by=%s%s%s;for=%s%s%s;host=%s;proto=%s", | ||||
|                      server_ipv6 ? "\"[" : "", server_addr_str, server_ipv6 ? "]\"" : "", | ||||
| @@ -62,6 +60,7 @@ int rev_proxy_request_header(http_req *req, int enc) { | ||||
|         print(ERR_STR "Appended part of header field 'Forwarded' too long" CLR_STR); | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
|     if (forwarded == NULL) { | ||||
|         http_add_header_field(&req->hdr, "Forwarded", buf1); | ||||
|     } else { | ||||
| @@ -74,7 +73,7 @@ int rev_proxy_request_header(http_req *req, int enc) { | ||||
|         http_add_header_field(&req->hdr, "Forwarded", buf2); | ||||
|     } | ||||
|  | ||||
|     char *xff = http_get_header_field(&req->hdr, "X-Forwarded-For"); | ||||
|     const char *xff = http_get_header_field(&req->hdr, "X-Forwarded-For"); | ||||
|     if (xff == NULL) { | ||||
|         http_add_header_field(&req->hdr, "X-Forwarded-For", client_addr_str); | ||||
|     } else { | ||||
| @@ -83,7 +82,7 @@ int rev_proxy_request_header(http_req *req, int enc) { | ||||
|         http_add_header_field(&req->hdr, "X-Forwarded-For", buf1); | ||||
|     } | ||||
|  | ||||
|     char *xfh = http_get_header_field(&req->hdr, "X-Forwarded-Host"); | ||||
|     const char *xfh = http_get_header_field(&req->hdr, "X-Forwarded-Host"); | ||||
|     if (xfh == NULL) { | ||||
|         if (forwarded == NULL) { | ||||
|             http_add_header_field(&req->hdr, "X-Forwarded-Host", host); | ||||
| @@ -104,7 +103,7 @@ int rev_proxy_request_header(http_req *req, int enc) { | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     char *xfp = http_get_header_field(&req->hdr, "X-Forwarded-Proto"); | ||||
|     const char *xfp = http_get_header_field(&req->hdr, "X-Forwarded-Proto"); | ||||
|     if (xfp == NULL) { | ||||
|         if (forwarded == NULL) { | ||||
|             http_add_header_field(&req->hdr, "X-Forwarded-Proto", enc ? "https" : "http"); | ||||
| @@ -128,13 +127,12 @@ int rev_proxy_request_header(http_req *req, int enc) { | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int rev_proxy_response_header(http_req *req, http_res *res) { | ||||
|     char buf1[256]; | ||||
|     char buf2[256]; | ||||
| int rev_proxy_response_header(http_req *req, http_res *res, host_config *conf) { | ||||
|     char buf1[256], buf2[256]; | ||||
|     int p_len; | ||||
|  | ||||
|     char *via = http_get_header_field(&res->hdr, "Via"); | ||||
|     p_len = snprintf(buf1, sizeof(buf1), "HTTP/%s %s", req->version, DEFAULT_HOST); | ||||
|     const char *via = http_get_header_field(&res->hdr, "Via"); | ||||
|     p_len = snprintf(buf1, sizeof(buf1), "HTTP/%s %s", req->version, SERVER_NAME); | ||||
|     if (p_len < 0 || p_len >= sizeof(buf1)) { | ||||
|         print(ERR_STR "Appended part of header field 'Via' too long" CLR_STR); | ||||
|         return -1; | ||||
| @@ -151,19 +149,44 @@ int rev_proxy_response_header(http_req *req, http_res *res) { | ||||
|         http_add_header_field(&res->hdr, "Via", buf2); | ||||
|     } | ||||
|  | ||||
|     const char *location = http_get_header_field(&res->hdr, "Location"); | ||||
|     if (location != NULL) { | ||||
|         char *hostnames[] = {conf->name, conf->rev_proxy.hostname}; | ||||
|         for (int i = 0; i < sizeof(hostnames) / sizeof(hostnames[0]); i++) { | ||||
|             char *hostname = hostnames[i]; | ||||
|  | ||||
|             p_len = snprintf(buf1, sizeof(buf1), "http://%s/", hostname); | ||||
|             if (strncmp(location, buf1, p_len) == 0) goto match; | ||||
|  | ||||
|             p_len = snprintf(buf1, sizeof(buf1), "https://%s/", hostname); | ||||
|             if (strncmp(location, buf1, p_len) == 0) goto match; | ||||
|  | ||||
|             p_len = snprintf(buf1, sizeof(buf1), "http://%s:%i/", hostname, conf->rev_proxy.port); | ||||
|             if (strncmp(location, buf1, p_len) == 0) goto match; | ||||
|  | ||||
|             p_len = snprintf(buf1, sizeof(buf1), "https://%s:%i/", hostname, conf->rev_proxy.port); | ||||
|             if (strncmp(location, buf1, p_len) == 0) goto match; | ||||
|         } | ||||
|  | ||||
|         if (0) { | ||||
|             match: | ||||
|             strcpy(buf1, location + p_len - 1); | ||||
|             http_remove_header_field(&res->hdr, "Location", HTTP_REMOVE_ALL); | ||||
|             http_add_header_field(&res->hdr, "Location", buf1); | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client, http_status *custom_status, | ||||
|                    char *err_msg) { | ||||
| int rev_proxy_init(http_req *req, http_res *res, http_status_ctx *ctx, host_config *conf, sock *client, http_status *custom_status, char *err_msg) { | ||||
|     char buffer[CHUNK_SIZE]; | ||||
|     const char *connection, *upgrade, *ws_version; | ||||
|     long ret; | ||||
|     int tries = 0; | ||||
|     int retry = 0; | ||||
|     int tries = 0, retry = 0; | ||||
|  | ||||
|     if (rev_proxy.socket != 0 && strcmp(rev_proxy_host, conf->name) == 0 && sock_check(&rev_proxy) == 0) { | ||||
|     if (rev_proxy.socket != 0 && strcmp(rev_proxy_host, conf->name) == 0 && sock_check(&rev_proxy) == 0) | ||||
|         goto rev_proxy; | ||||
|     } | ||||
|  | ||||
|     retry: | ||||
|     if (rev_proxy.socket != 0) { | ||||
| @@ -177,26 +200,23 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|     if (rev_proxy.socket  < 0) { | ||||
|         print(ERR_STR "Unable to create socket: %s" CLR_STR, strerror(errno)); | ||||
|         res->status = http_get_status(500); | ||||
|         ctx->origin = INTERNAL; | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
|     server_timeout.tv_sec = SERVER_TIMEOUT; | ||||
|     server_timeout.tv_sec = SERVER_TIMEOUT_INIT; | ||||
|     server_timeout.tv_usec = 0; | ||||
|     if (setsockopt(client->socket, SOL_SOCKET, SO_RCVTIMEO, &server_timeout, sizeof(server_timeout)) < 0) | ||||
|     if (setsockopt(rev_proxy.socket, SOL_SOCKET, SO_RCVTIMEO, &server_timeout, sizeof(server_timeout)) < 0) | ||||
|         goto rev_proxy_timeout_err; | ||||
|     if (setsockopt(rev_proxy.socket, SOL_SOCKET, SO_SNDTIMEO, &server_timeout, sizeof(server_timeout)) < 0) | ||||
|         goto rev_proxy_timeout_err; | ||||
|     if (setsockopt(client->socket, SOL_SOCKET, SO_SNDTIMEO, &server_timeout, sizeof(server_timeout)) < 0) { | ||||
|         rev_proxy_timeout_err: | ||||
|         res->status = http_get_status(500); | ||||
|         print(ERR_STR "Unable to set timeout for socket: %s" CLR_STR, strerror(errno)); | ||||
|         sprintf(err_msg, "Unable to set timeout for socket: %s", strerror(errno)); | ||||
|         goto proxy_err; | ||||
|     } | ||||
|  | ||||
|     struct hostent *host_ent = gethostbyname2(conf->rev_proxy.hostname, AF_INET6); | ||||
|     if (host_ent == NULL) { | ||||
|         host_ent = gethostbyname2(conf->rev_proxy.hostname, AF_INET); | ||||
|         if (host_ent == NULL) { | ||||
|             res->status = http_get_status(503); | ||||
|             ctx->origin = SERVER_REQ; | ||||
|             print(ERR_STR "Unable to connect to server: Name or service not known" CLR_STR); | ||||
|             sprintf(err_msg, "Unable to connect to server: Name or service not known."); | ||||
|             goto proxy_err; | ||||
| @@ -216,18 +236,34 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|  | ||||
|     print(BLUE_STR "Connecting to " BLD_STR "[%s]:%i" CLR_STR BLUE_STR "..." CLR_STR, buffer, conf->rev_proxy.port); | ||||
|     if (connect(rev_proxy.socket, (struct sockaddr *) &address, sizeof(address)) < 0) { | ||||
|         if (errno == ETIMEDOUT) { | ||||
|         if (errno == ETIMEDOUT || errno == EINPROGRESS) { | ||||
|             res->status = http_get_status(504); | ||||
|             ctx->origin = SERVER_REQ; | ||||
|         } else if (errno == ECONNREFUSED) { | ||||
|             res->status = http_get_status(503); | ||||
|             ctx->origin = SERVER_REQ; | ||||
|         } else { | ||||
|             res->status = http_get_status(500); | ||||
|             ctx->origin = INTERNAL; | ||||
|         } | ||||
|         print(ERR_STR "Unable to connect to [%s]:%i: %s" CLR_STR, buffer, conf->rev_proxy.port, strerror(errno)); | ||||
|         sprintf(err_msg, "Unable to connect to server: %s.", strerror(errno)); | ||||
|         goto proxy_err; | ||||
|     } | ||||
|  | ||||
|     server_timeout.tv_sec = SERVER_TIMEOUT; | ||||
|     server_timeout.tv_usec = 0; | ||||
|     if (setsockopt(rev_proxy.socket, SOL_SOCKET, SO_RCVTIMEO, &server_timeout, sizeof(server_timeout)) < 0) | ||||
|         goto rev_proxy_timeout_err; | ||||
|     if (setsockopt(rev_proxy.socket, SOL_SOCKET, SO_SNDTIMEO, &server_timeout, sizeof(server_timeout)) < 0) { | ||||
|         rev_proxy_timeout_err: | ||||
|         res->status = http_get_status(500); | ||||
|         ctx->origin = INTERNAL; | ||||
|         print(ERR_STR "Unable to set timeout for reverse proxy socket: %s" CLR_STR, strerror(errno)); | ||||
|         sprintf(err_msg, "Unable to set timeout for reverse proxy socket: %s", strerror(errno)); | ||||
|         goto proxy_err; | ||||
|     } | ||||
|  | ||||
|     if (conf->rev_proxy.enc) { | ||||
|         rev_proxy.ssl = SSL_new(rev_proxy.ctx); | ||||
|         SSL_set_fd(rev_proxy.ssl, rev_proxy.socket); | ||||
| @@ -240,6 +276,7 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|         rev_proxy.enc = 1; | ||||
|         if (ret < 0) { | ||||
|             res->status = http_get_status(502); | ||||
|             ctx->origin = SERVER_REQ; | ||||
|             print(ERR_STR "Unable to perform handshake: %s" CLR_STR, sock_strerror(&rev_proxy)); | ||||
|             sprintf(err_msg, "Unable to perform handshake: %s.", sock_strerror(&rev_proxy)); | ||||
|             goto proxy_err; | ||||
| @@ -250,65 +287,86 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|     print(BLUE_STR "Established new connection with " BLD_STR "[%s]:%i" CLR_STR, buffer, conf->rev_proxy.port); | ||||
|  | ||||
|     rev_proxy: | ||||
|     connection = http_get_header_field(&req->hdr, "Connection"); | ||||
|     if (connection != NULL && (strstr(connection, "upgrade") != NULL || strstr(connection, "Upgrade") != NULL)) { | ||||
|         upgrade = http_get_header_field(&req->hdr, "Upgrade"); | ||||
|         ws_version = http_get_header_field(&req->hdr, "Sec-WebSocket-Version"); | ||||
|         if (upgrade != NULL && ws_version != NULL && strcmp(upgrade, "websocket") == 0 && strcmp(ws_version, "13") == 0) { | ||||
|             ctx->ws_key = http_get_header_field(&req->hdr, "Sec-WebSocket-Key"); | ||||
|         } else { | ||||
|             res->status = http_get_status(501); | ||||
|             ctx->origin = INTERNAL; | ||||
|             return -1; | ||||
|         } | ||||
|     } else { | ||||
|         http_remove_header_field(&req->hdr, "Connection", HTTP_REMOVE_ALL); | ||||
|         http_add_header_field(&req->hdr, "Connection", "keep-alive"); | ||||
|     } | ||||
|  | ||||
|     ret = rev_proxy_request_header(req, (int) client->enc); | ||||
|     if (ret != 0) { | ||||
|         res->status = http_get_status(500); | ||||
|         ctx->origin = INTERNAL; | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
|     ret = http_send_request(&rev_proxy, req); | ||||
|     if (ret < 0) { | ||||
|         res->status = http_get_status(502); | ||||
|         ctx->origin = SERVER_REQ; | ||||
|         print(ERR_STR "Unable to send request to server (1): %s" CLR_STR, sock_strerror(&rev_proxy)); | ||||
|         sprintf(err_msg, "Unable to send request to server: %s.", sock_strerror(&rev_proxy)); | ||||
|         retry = tries < 4; | ||||
|         goto proxy_err; | ||||
|     } | ||||
|  | ||||
|     char *content_length = http_get_header_field(&req->hdr, "Content-Length"); | ||||
|     if (content_length != NULL) { | ||||
|         unsigned long content_len = strtoul(content_length, NULL, 10); | ||||
|         if (client->buf_len - client->buf_off > 0) { | ||||
|             unsigned long len = client->buf_len - client->buf_off; | ||||
|             if (len > content_len) { | ||||
|                 len = content_len; | ||||
|             } | ||||
|             ret = sock_send(&rev_proxy, client->buf, len, 0); | ||||
|             if (ret <= 0) { | ||||
|                 res->status = http_get_status(502); | ||||
|                 print(ERR_STR "Unable to send request to server (2): %s" CLR_STR, sock_strerror(&rev_proxy)); | ||||
|                 sprintf(err_msg, "Unable to send request to server: %s.", sock_strerror(&rev_proxy)); | ||||
|                 retry = tries < 4; | ||||
|                 goto proxy_err; | ||||
|             } | ||||
|             content_len -= len; | ||||
|         } | ||||
|         if (content_len > 0) { | ||||
|             ret = sock_splice(&rev_proxy, client, buffer, sizeof(buffer), content_len); | ||||
|             if (ret <= 0) { | ||||
|                 if (ret == -1) { | ||||
|                     res->status = http_get_status(502); | ||||
|                     print(ERR_STR "Unable to send request to server (3): %s" CLR_STR, sock_strerror(&rev_proxy)); | ||||
|                     sprintf(err_msg, "Unable to send request to server: %s.", sock_strerror(&rev_proxy)); | ||||
|                     goto proxy_err; | ||||
|                 } else if (ret == -2) { | ||||
|                     res->status = http_get_status(400); | ||||
|                     print(ERR_STR "Unable to receive request from client: %s" CLR_STR, sock_strerror(client)); | ||||
|                     sprintf(err_msg, "Unable to receive request from client: %s.", sock_strerror(client)); | ||||
|                     return -1; | ||||
|                 } | ||||
|                 res->status = http_get_status(500); | ||||
|                 print(ERR_STR "Unknown Error" CLR_STR); | ||||
|                 return -1; | ||||
|             } | ||||
|     const char *content_length = http_get_header_field(&req->hdr, "Content-Length"); | ||||
|     unsigned long content_len = content_length != NULL ? strtoul(content_length, NULL, 10) : 0; | ||||
|     const char *transfer_encoding = http_get_header_field(&req->hdr, "Transfer-Encoding"); | ||||
|  | ||||
|     ret = 0; | ||||
|     if (content_len > 0) { | ||||
|         ret = sock_splice(&rev_proxy, client, buffer, sizeof(buffer), content_len); | ||||
|     } else if (transfer_encoding != NULL && strstr(transfer_encoding, "chunked") != NULL) { | ||||
|         ret = sock_splice_chunked(&rev_proxy, client, buffer, sizeof(buffer)); | ||||
|     } | ||||
|  | ||||
|     if (ret < 0 || (content_len != 0 && ret != content_len)) { | ||||
|         if (ret == -1) { | ||||
|             res->status = http_get_status(502); | ||||
|             ctx->origin = SERVER_REQ; | ||||
|             print(ERR_STR "Unable to send request to server (2): %s" CLR_STR, sock_strerror(&rev_proxy)); | ||||
|             sprintf(err_msg, "Unable to send request to server: %s.", sock_strerror(&rev_proxy)); | ||||
|             retry = tries < 4; | ||||
|             goto proxy_err; | ||||
|         } else if (ret == -2) { | ||||
|             res->status = http_get_status(400); | ||||
|             ctx->origin = CLIENT_REQ; | ||||
|             print(ERR_STR "Unable to receive request from client: %s" CLR_STR, sock_strerror(client)); | ||||
|             sprintf(err_msg, "Unable to receive request from client: %s.", sock_strerror(client)); | ||||
|             return -1; | ||||
|         } | ||||
|         res->status = http_get_status(500); | ||||
|         ctx->origin = INTERNAL; | ||||
|         print(ERR_STR "Unknown Error" CLR_STR); | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
|     ret = sock_recv(&rev_proxy, buffer, sizeof(buffer), MSG_PEEK); | ||||
|     if (ret <= 0) { | ||||
|         res->status = http_get_status(502); | ||||
|         int enc_err = sock_enc_error(&rev_proxy); | ||||
|         if (errno == EAGAIN || errno == EINPROGRESS || enc_err == SSL_ERROR_WANT_READ || | ||||
|             enc_err == SSL_ERROR_WANT_WRITE) | ||||
|         { | ||||
|             res->status = http_get_status(504); | ||||
|             ctx->origin = SERVER_RES; | ||||
|         } else { | ||||
|             res->status = http_get_status(502); | ||||
|             ctx->origin = SERVER_RES; | ||||
|         } | ||||
|         print(ERR_STR "Unable to receive response from server: %s" CLR_STR, sock_strerror(&rev_proxy)); | ||||
|         sprintf(err_msg, "Unable to receive response from server: %s.", sock_strerror(&rev_proxy)); | ||||
|         retry = tries < 4; | ||||
|         goto proxy_err; | ||||
|     } | ||||
|  | ||||
| @@ -317,6 +375,7 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|  | ||||
|     if (header_len <= 0) { | ||||
|         res->status = http_get_status(502); | ||||
|         ctx->origin = SERVER_RES; | ||||
|         print(ERR_STR "Unable to parse header: End of header not found" CLR_STR); | ||||
|         sprintf(err_msg, "Unable to parser header: End of header not found."); | ||||
|         goto proxy_err; | ||||
| @@ -325,6 +384,7 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|     for (int i = 0; i < header_len; i++) { | ||||
|         if ((buf[i] >= 0x00 && buf[i] <= 0x1F && buf[i] != '\r' && buf[i] != '\n') || buf[i] == 0x7F) { | ||||
|             res->status = http_get_status(502); | ||||
|             ctx->origin = SERVER_RES; | ||||
|             print(ERR_STR "Unable to parse header: Header contains illegal characters" CLR_STR); | ||||
|             sprintf(err_msg, "Unable to parse header: Header contains illegal characters."); | ||||
|             goto proxy_err; | ||||
| @@ -336,6 +396,7 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|         char *pos0 = strstr(ptr, "\r\n"); | ||||
|         if (pos0 == NULL) { | ||||
|             res->status = http_get_status(502); | ||||
|             ctx->origin = SERVER_RES; | ||||
|             print(ERR_STR "Unable to parse header: Invalid header format" CLR_STR); | ||||
|             sprintf(err_msg, "Unable to parse header: Invalid header format."); | ||||
|             goto proxy_err; | ||||
| @@ -343,6 +404,7 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|         if (ptr == buf) { | ||||
|             if (strncmp(ptr, "HTTP/", 5) != 0) { | ||||
|                 res->status = http_get_status(502); | ||||
|                 ctx->origin = SERVER_RES; | ||||
|                 print(ERR_STR "Unable to parse header: Invalid header format" CLR_STR); | ||||
|                 sprintf(err_msg, "Unable to parse header: Invalid header format."); | ||||
|                 goto proxy_err; | ||||
| @@ -357,14 +419,16 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|                 res->status = custom_status; | ||||
|             } else if (res->status == NULL) { | ||||
|                 res->status = http_get_status(502); | ||||
|                 ctx->origin = SERVER_RES; | ||||
|                 print(ERR_STR "Unable to parse header: Invalid or unknown status code" CLR_STR); | ||||
|                 sprintf(err_msg, "Unable to parse header: Invalid or unknown status code."); | ||||
|                 goto proxy_err; | ||||
|             } | ||||
|         } else { | ||||
|             ret = http_parse_header_field(&res->hdr, ptr, pos0); | ||||
|             ret = http_parse_header_field(&res->hdr, ptr, pos0, 0); | ||||
|             if (ret != 0) { | ||||
|                 res->status = http_get_status(502); | ||||
|                 ctx->origin = SERVER_RES; | ||||
|                 print(ERR_STR "Unable to parse header" CLR_STR); | ||||
|                 sprintf(err_msg, "Unable to parse header."); | ||||
|                 goto proxy_err; | ||||
| @@ -377,9 +441,10 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
|     } | ||||
|     sock_recv(&rev_proxy, buffer, header_len, 0); | ||||
|  | ||||
|     ret = rev_proxy_response_header(req, res); | ||||
|     ret = rev_proxy_response_header(req, res, conf); | ||||
|     if (ret != 0) { | ||||
|         res->status = http_get_status(500); | ||||
|         ctx->origin = INTERNAL; | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
| @@ -391,14 +456,9 @@ int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client | ||||
| } | ||||
|  | ||||
| int rev_proxy_send(sock *client, unsigned long len_to_send, int flags) { | ||||
|     // TODO handle websockets | ||||
|     long ret; | ||||
|     char buffer[CHUNK_SIZE]; | ||||
|     char comp_out[CHUNK_SIZE]; | ||||
|     char buf[256]; | ||||
|     long len, snd_len; | ||||
|     char buffer[CHUNK_SIZE], comp_out[CHUNK_SIZE], buf[256], *ptr; | ||||
|     long ret = 0, len, snd_len; | ||||
|     int finish_comp = 0; | ||||
|     char *ptr; | ||||
|  | ||||
|     compress_ctx comp_ctx; | ||||
|     if (flags & REV_PROXY_COMPRESS_BR) { | ||||
| @@ -418,23 +478,22 @@ int rev_proxy_send(sock *client, unsigned long len_to_send, int flags) { | ||||
|     do { | ||||
|         snd_len = 0; | ||||
|         if (flags & REV_PROXY_CHUNKED) { | ||||
|             char *pos; | ||||
|             ret = sock_recv(&rev_proxy, buffer, 16, MSG_PEEK); | ||||
|             if (ret <= 0) goto err0; | ||||
|  | ||||
|             len_to_send = strtol(buffer, NULL, 16); | ||||
|             pos = strstr(buffer, "\r\n"); | ||||
|             len = pos - buffer + 2; | ||||
|             sock_recv(&rev_proxy, buffer, len, 0); | ||||
|             if (ret <= 0) { | ||||
|                 err0: | ||||
|                 print("Unable to receive from server: %s", sock_strerror(&rev_proxy)); | ||||
|             ret = sock_get_chunk_header(&rev_proxy); | ||||
|             if (ret < 0) { | ||||
|                 if (ret == -1) { | ||||
|                     print("Unable to receive from server: Malformed chunk header"); | ||||
|                 } else { | ||||
|                     print("Unable to receive from server: %s", sock_strerror(&rev_proxy)); | ||||
|                 } | ||||
|                 break; | ||||
|             } | ||||
|  | ||||
|             len_to_send = ret; | ||||
|             ret = 1; | ||||
|             if (len_to_send == 0 && (flags & REV_PROXY_COMPRESS)) { | ||||
|                 finish_comp = 1; | ||||
|                 len = 0; | ||||
|                 ptr = NULL; | ||||
|                 goto out; | ||||
|                 finish: | ||||
|                 compress_free(&comp_ctx); | ||||
| @@ -456,8 +515,7 @@ int rev_proxy_send(sock *client, unsigned long len_to_send, int flags) { | ||||
|                 long buf_len = len; | ||||
|                 if (flags & REV_PROXY_COMPRESS) { | ||||
|                     avail_out = sizeof(comp_out); | ||||
|                     compress_compress(&comp_ctx, next_in + len - avail_in, &avail_in, comp_out, &avail_out, | ||||
|                                       finish_comp); | ||||
|                     compress_compress(&comp_ctx, next_in + len - avail_in, &avail_in, comp_out, &avail_out, finish_comp); | ||||
|                     ptr = comp_out; | ||||
|                     buf_len = (int) (sizeof(comp_out) - avail_out); | ||||
|                     snd_len += (long) (len - avail_in); | ||||
| @@ -465,11 +523,14 @@ int rev_proxy_send(sock *client, unsigned long len_to_send, int flags) { | ||||
|                 if (buf_len != 0) { | ||||
|                     len = sprintf(buf, "%lX\r\n", buf_len); | ||||
|                     ret = 1; | ||||
|  | ||||
|                     if (flags & REV_PROXY_CHUNKED) ret = sock_send(client, buf, len, 0); | ||||
|                     if (ret <= 0) goto err; | ||||
|  | ||||
|                     ret = sock_send(client, ptr, buf_len, 0); | ||||
|                     if (ret <= 0) goto err; | ||||
|                     if (!(flags & REV_PROXY_COMPRESS)) snd_len += ret; | ||||
|  | ||||
|                     if (flags & REV_PROXY_CHUNKED) ret = sock_send(client, "\r\n", 2, 0); | ||||
|                     if (ret <= 0) { | ||||
|                         err: | ||||
| @@ -485,7 +546,7 @@ int rev_proxy_send(sock *client, unsigned long len_to_send, int flags) { | ||||
|         if (flags & REV_PROXY_CHUNKED) sock_recv(&rev_proxy, buffer, 2, 0); | ||||
|     } while ((flags & REV_PROXY_CHUNKED) && len_to_send > 0); | ||||
|  | ||||
|     if (ret <= 0) return (int) -1; | ||||
|     if (ret <= 0) return -1; | ||||
|  | ||||
|     if (flags & REV_PROXY_CHUNKED) { | ||||
|         ret = sock_send(client, "0\r\n\r\n", 5, 0); | ||||
| @@ -497,3 +558,9 @@ int rev_proxy_send(sock *client, unsigned long len_to_send, int flags) { | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int rev_proxy_dump(char *buf, long len) { | ||||
|     sock_recv(&rev_proxy, buf, len, 0); | ||||
|     sock_close(&rev_proxy); | ||||
|     return 0; | ||||
| } | ||||
|   | ||||
| @@ -1,32 +1,39 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Reverse proxy (header file) | ||||
|  * src/lib/rev_proxy.h | ||||
|  * Lorenz Stechauner, 2021-01-07 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Reverse proxy (header file) | ||||
|  * @file src/lib/rev_proxy.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-01-07 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_REV_PROXY_H | ||||
| #define NECRONDA_SERVER_REV_PROXY_H | ||||
| #ifndef SESIMOS_REV_PROXY_H | ||||
| #define SESIMOS_REV_PROXY_H | ||||
|  | ||||
| #define REV_PROXY_CHUNKED 1 | ||||
| #define REV_PROXY_COMPRESS_GZ 2 | ||||
| #define REV_PROXY_COMPRESS_BR 4 | ||||
| #define REV_PROXY_COMPRESS 6 | ||||
|  | ||||
| #ifndef SERVER_NAME | ||||
| #   define SERVER_NAME "revproxy" | ||||
| #endif | ||||
|  | ||||
| #include "http.h" | ||||
| #include "config.h" | ||||
|  | ||||
| extern sock rev_proxy; | ||||
|  | ||||
| int rev_proxy_preload(); | ||||
| int rev_proxy_preload(void); | ||||
|  | ||||
| int rev_proxy_request_header(http_req *req, int enc); | ||||
|  | ||||
| int rev_proxy_response_header(http_req *req, http_res *res); | ||||
| int rev_proxy_response_header(http_req *req, http_res *res, host_config *conf); | ||||
|  | ||||
| int rev_proxy_init(http_req *req, http_res *res, host_config *conf, sock *client, http_status *custom_status, | ||||
|                    char *err_msg); | ||||
| int rev_proxy_init(http_req *req, http_res *res, http_status_ctx *ctx, host_config *conf, sock *client, | ||||
|                    http_status *custom_status, char *err_msg); | ||||
|  | ||||
| int rev_proxy_send(sock *client, unsigned long len_to_send, int flags); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_REV_PROXY_H | ||||
| int rev_proxy_dump(char *buf, long len); | ||||
|  | ||||
| #endif //SESIMOS_REV_PROXY_H | ||||
|   | ||||
							
								
								
									
										112
									
								
								src/lib/sock.c
									
									
									
									
									
								
							
							
						
						
									
										112
									
								
								src/lib/sock.c
									
									
									
									
									
								
							| @@ -1,16 +1,25 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Basic TCP and TLS socket | ||||
|  * src/lib/sock.c | ||||
|  * Lorenz Stechauner, 2021-01-07 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Basic TCP and TLS socket | ||||
|  * @file src/lib/sock.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-01-07 | ||||
|  */ | ||||
|  | ||||
| #include "sock.h" | ||||
| #include "utils.h" | ||||
|  | ||||
| #include <openssl/err.h> | ||||
| #include <openssl/ssl.h> | ||||
| #include <string.h> | ||||
| #include <sys/socket.h> | ||||
| #include <unistd.h> | ||||
| #include <poll.h> | ||||
|  | ||||
|  | ||||
| int sock_enc_error(sock *s) { | ||||
|     return (int) s->enc ? SSL_get_error(s->ssl, (int) s->_last_ret) : 0; | ||||
| } | ||||
|  | ||||
| const char *sock_strerror(sock *s) { | ||||
|     if (s->_last_ret == 0) { | ||||
| @@ -21,7 +30,7 @@ const char *sock_strerror(sock *s) { | ||||
|         } | ||||
|         const char *err1 = ERR_reason_error_string(s->_ssl_error); | ||||
|         const char *err2 = strerror(errno); | ||||
|         switch (SSL_get_error(s->ssl, (int) s->_last_ret)) { | ||||
|         switch (sock_enc_error(s)) { | ||||
|             case SSL_ERROR_NONE: | ||||
|                 return NULL; | ||||
|             case SSL_ERROR_ZERO_RETURN: | ||||
| @@ -64,11 +73,8 @@ long sock_send(sock *s, void *buf, unsigned long len, int flags) { | ||||
| long sock_recv(sock *s, void *buf, unsigned long len, int flags) { | ||||
|     long ret; | ||||
|     if (s->enc) { | ||||
|         if (flags & MSG_PEEK) { | ||||
|             ret = SSL_peek(s->ssl, buf, (int) len); | ||||
|         } else { | ||||
|             ret = SSL_read(s->ssl, buf, (int) len); | ||||
|         } | ||||
|         int (*func)(SSL*, void*, int) = (flags & MSG_PEEK) ? SSL_peek : SSL_read; | ||||
|         ret = func(s->ssl, buf, (int) len); | ||||
|         s->_ssl_error = ERR_get_error(); | ||||
|     } else { | ||||
|         ret = recv(s->socket, buf, len, flags); | ||||
| @@ -85,7 +91,7 @@ long sock_splice(sock *dst, sock *src, void *buf, unsigned long buf_len, unsigne | ||||
|     while (send_len < len) { | ||||
|         next_len = (buf_len < (len - send_len)) ? buf_len : (len - send_len); | ||||
|         ret = sock_recv(src, buf, next_len, 0); | ||||
|         if (ret < 0) return -2; | ||||
|         if (ret <= 0) return -2; | ||||
|         next_len = ret; | ||||
|         ret = sock_send(dst, buf, next_len, send_len + next_len < len ? MSG_MORE : 0); | ||||
|         if (ret < 0) return -1; | ||||
| @@ -95,6 +101,25 @@ long sock_splice(sock *dst, sock *src, void *buf, unsigned long buf_len, unsigne | ||||
|     return (long) send_len; | ||||
| } | ||||
|  | ||||
| long sock_splice_chunked(sock *dst, sock *src, void *buf, unsigned long buf_len) { | ||||
|     long ret; | ||||
|     unsigned long send_len = 0; | ||||
|     unsigned long next_len; | ||||
|  | ||||
|     while (1) { | ||||
|         ret = sock_get_chunk_header(src); | ||||
|         if (ret < 0) return -2; | ||||
|  | ||||
|         next_len = ret; | ||||
|         if (next_len <= 0) break; | ||||
|  | ||||
|         ret = sock_splice(dst, src, buf, buf_len, next_len); | ||||
|         if (ret < 0) return ret; | ||||
|     } | ||||
|  | ||||
|     return (long) send_len; | ||||
| } | ||||
|  | ||||
| int sock_close(sock *s) { | ||||
|     if ((int) s->enc && s->ssl != NULL) { | ||||
|         if (s->_last_ret >= 0) SSL_shutdown(s->ssl); | ||||
| @@ -112,3 +137,68 @@ int sock_check(sock *s) { | ||||
|     char buf; | ||||
|     return recv(s->socket, &buf, 1, MSG_PEEK | MSG_DONTWAIT) == 1; | ||||
| } | ||||
|  | ||||
| int sock_poll(sock *sockets[], sock *ready[], sock *error[], int n_sock, int *n_ready, int *n_error, short events, int timeout_ms) { | ||||
|     struct pollfd fds[n_sock]; | ||||
|     for (int i = 0; i < n_sock; i++) { | ||||
|         fds[i].fd = sockets[i]->socket; | ||||
|         fds[i].events = events; | ||||
|     } | ||||
|  | ||||
|     int ret = poll(fds, n_sock, timeout_ms); | ||||
|     if (ret < 0 || ready == NULL || error == NULL) return ret; | ||||
|  | ||||
|     *n_ready = 0, *n_error = 0; | ||||
|     for (int i = 0; i < n_sock; i++) { | ||||
|         if (fds[i].revents & events) | ||||
|             ready[(*n_ready)++] = sockets[i]; | ||||
|         if (fds[i].revents & (POLLERR | POLLHUP | POLLNVAL)) | ||||
|             error[(*n_error)++] = sockets[i]; | ||||
|     } | ||||
|  | ||||
|     return ret; | ||||
| } | ||||
|  | ||||
| int sock_poll_read(sock *sockets[], sock *readable[], sock *error[], int n_sock, int *n_readable, int *n_error, int timeout_ms) { | ||||
|     return sock_poll(sockets, readable, error, n_sock, n_readable, n_error, POLLIN, timeout_ms); | ||||
| } | ||||
|  | ||||
| int sock_poll_write(sock *sockets[], sock *writable[], sock *error[], int n_sock, int *n_writable, int *n_error, int timeout_ms) { | ||||
|     return sock_poll(sockets, writable, error, n_sock, n_writable, n_error, POLLOUT, timeout_ms); | ||||
| } | ||||
|  | ||||
| long sock_parse_chunk_header(const char *buf, long len, long *ret_len) { | ||||
|     for (int i = 0; i < len; i++) { | ||||
|         char ch = buf[i]; | ||||
|         if (ch == '\r') { | ||||
|             continue; | ||||
|         } else if (ch == '\n') { | ||||
|             if (ret_len != NULL) *ret_len = i + 1; | ||||
|             return strtol(buf, NULL, 16); | ||||
|         } else if (!((ch >= '0' && ch <= '9') || (ch >= 'a' && ch <= 'f') || (ch >= 'A' && ch <= 'F'))) { | ||||
|             return -2; | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     return -1; | ||||
| } | ||||
|  | ||||
| long sock_get_chunk_header(sock *s) { | ||||
|     long ret, len; | ||||
|     char buf[16]; | ||||
|  | ||||
|     do { | ||||
|         print("debug1");  // TODO remove | ||||
|         ret = sock_recv(s, buf, sizeof(buf), MSG_PEEK); | ||||
|         if (ret <= 0) return -2; | ||||
|         else if (ret < 2) continue; | ||||
|  | ||||
|         ret = sock_parse_chunk_header(buf, ret, &len); | ||||
|         if (ret == -2) return -1; | ||||
|     } while (ret < 0); | ||||
|  | ||||
|     if (sock_recv(s, buf, len, 0) != len) | ||||
|         return -2; | ||||
|  | ||||
|     return ret; | ||||
| } | ||||
|   | ||||
| @@ -1,28 +1,29 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Basic TCP and TLS socket (header file) | ||||
|  * src/lib/sock.h | ||||
|  * Lorenz Stechauner, 2021-01-07 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Basic TCP and TLS socket (header file) | ||||
|  * @file src/lib/sock.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2021-01-07 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_SOCK_H | ||||
| #define NECRONDA_SERVER_SOCK_H | ||||
| #ifndef SESIMOS_SOCK_H | ||||
| #define SESIMOS_SOCK_H | ||||
|  | ||||
| #include <openssl/crypto.h> | ||||
| #include <sys/socket.h> | ||||
|  | ||||
| typedef struct { | ||||
|     unsigned int enc:1; | ||||
|     int socket; | ||||
|     SSL_CTX *ctx; | ||||
|     SSL *ssl; | ||||
|     char *buf; | ||||
|     unsigned long buf_len; | ||||
|     unsigned long buf_off; | ||||
|     long _last_ret; | ||||
|     int _errno; | ||||
|     unsigned long _ssl_error; | ||||
| } sock; | ||||
|  | ||||
| int sock_enc_error(sock *s); | ||||
|  | ||||
| const char *sock_strerror(sock *s); | ||||
|  | ||||
| long sock_send(sock *s, void *buf, unsigned long len, int flags); | ||||
| @@ -31,8 +32,20 @@ long sock_recv(sock *s, void *buf, unsigned long len, int flags); | ||||
|  | ||||
| long sock_splice(sock *dst, sock *src, void *buf, unsigned long buf_len, unsigned long len); | ||||
|  | ||||
| long sock_splice_chunked(sock *dst, sock *src, void *buf, unsigned long buf_len); | ||||
|  | ||||
| int sock_close(sock *s); | ||||
|  | ||||
| int sock_check(sock *s); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_SOCK_H | ||||
| int sock_poll(sock *sockets[], sock *ready[], sock *error[], int n_sock, int *n_ready, int *n_error, short events, int timeout_ms); | ||||
|  | ||||
| int sock_poll_read(sock *sockets[], sock *readable[], sock *error[], int n_sock, int *n_readable, int *n_error, int timeout_ms); | ||||
|  | ||||
| int sock_poll_write(sock *sockets[], sock *writable[], sock *error[], int n_sock, int *n_writable, int *n_error, int timeout_ms); | ||||
|  | ||||
| long sock_parse_chunk_header(const char *buf, long len, long *ret_len); | ||||
|  | ||||
| long sock_get_chunk_header(sock *s); | ||||
|  | ||||
| #endif //SESIMOS_SOCK_H | ||||
|   | ||||
| @@ -1,15 +1,18 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * URI and path handlers | ||||
|  * src/lib/uri.c | ||||
|  * Lorenz Stechauner, 2020-12-13 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief URI and path handlers | ||||
|  * @file src/lib/uri.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-13 | ||||
|  */ | ||||
|  | ||||
| #include "uri.h" | ||||
| #include "utils.h" | ||||
|  | ||||
| #include <stdlib.h> | ||||
| #include <string.h> | ||||
|  | ||||
|  | ||||
| int path_is_directory(const char *path) { | ||||
|     struct stat statbuf; | ||||
|     return stat(path, &statbuf) == 0 && S_ISDIR(statbuf.st_mode) != 0; | ||||
|   | ||||
| @@ -1,12 +1,13 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * URI and path handlers (header file) | ||||
|  * src/lib/uri.h | ||||
|  * Lorenz Stechauner, 2020-12-13 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief URI and path handlers (header file) | ||||
|  * @file src/lib/uri.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-13 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_URI_H | ||||
| #define NECRONDA_SERVER_URI_H | ||||
| #ifndef SESIMOS_URI_H | ||||
| #define SESIMOS_URI_H | ||||
|  | ||||
| #include <sys/stat.h> | ||||
|  | ||||
| @@ -44,4 +45,4 @@ int uri_init_cache(http_uri *uri); | ||||
|  | ||||
| void uri_free(http_uri *uri); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_URI_H | ||||
| #endif //SESIMOS_URI_H | ||||
|   | ||||
							
								
								
									
										172
									
								
								src/lib/utils.c
									
									
									
									
									
								
							
							
						
						
									
										172
									
								
								src/lib/utils.c
									
									
									
									
									
								
							| @@ -1,80 +1,91 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Utilities | ||||
|  * src/lib/utils.c | ||||
|  * Lorenz Stechauner, 2020-12-03 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Utilities | ||||
|  * @file src/lib/utils.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-03 | ||||
|  */ | ||||
|  | ||||
| #include "utils.h" | ||||
|  | ||||
| #include <stdio.h> | ||||
| #include <string.h> | ||||
| #include <stdlib.h> | ||||
|  | ||||
|  | ||||
| char *log_prefix; | ||||
|  | ||||
| static const char base64_encode_table[64] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; | ||||
| static const int base64_mod_table[3] = {0, 2, 1}; | ||||
|  | ||||
|  | ||||
| char *format_duration(unsigned long micros, char *buf) { | ||||
|     if (micros < 10000) { | ||||
|         sprintf(buf, "%.1f ms", (double) micros / 1000); | ||||
|     } else if (micros < 1000000) { | ||||
|         sprintf(buf, "%li ms", micros / 1000); | ||||
|     } else if (micros < 60000000) { | ||||
|     } else if (micros < 1000000 - 1000) { | ||||
|         sprintf(buf, "%.0f ms", (double) micros / 1000); | ||||
|     } else if (micros < 60000000 - 1000000) { | ||||
|         sprintf(buf, "%.1f s", (double) micros / 1000000); | ||||
|     } else if (micros < 6000000000) { | ||||
|         sprintf(buf, "%.1f min", (double) micros / 1000000 / 60); | ||||
|     } else { | ||||
|         sprintf(buf, "%li min", micros / 1000000 / 60); | ||||
|         sprintf(buf, "%.0f min", (double) micros / 1000000 / 60); | ||||
|     } | ||||
|     return buf; | ||||
| } | ||||
|  | ||||
| int url_encode_component(const char *str, char *enc, long *size) { | ||||
|     char *ptr = enc; | ||||
|     char ch; | ||||
|     memset(enc, 0, *size); | ||||
|     for (int i = 0; i < strlen(str); i++, ptr++) { | ||||
|         if ((ptr - enc) >= *size) { | ||||
|             return -1; | ||||
| int url_encode_component(const void *in, size_t size_in, char *out, size_t size_out) { | ||||
|     int size = 0; | ||||
|  | ||||
|     // Encode control characters | ||||
|     for (int i = 0; i < size_in; i++) { | ||||
|         unsigned char ch = ((unsigned char *) in)[i]; | ||||
|         if (ch == ' ') { | ||||
|             ch = '+'; | ||||
|         } else if ( | ||||
|                 ch <= 0x20 || ch >= 0x7F || | ||||
|                 !((ch >= 'A' && ch <= 'Z') || (ch >= 'a' && ch <= 'z') || (ch >= '0' && ch <= '9') || | ||||
|                   ch == '-' || ch == '_' || ch == '.' || ch == '!' || ch == '~' || ch == '*' || ch == '\'' || | ||||
|                   ch == '(' || ch == ')') | ||||
|         ) { | ||||
|             size += 3; | ||||
|             if (size < size_out) sprintf(out + size - 3, "%%%02X", ch); | ||||
|             ch = 0; | ||||
|         } | ||||
|         ch = str[i]; | ||||
|         if (ch == ':' || ch == '/' || ch == '?' || ch == '#' || ch == '[' || ch == ']' || ch == '@' || ch == '!' || | ||||
|                 ch == '$' || ch == '&' || ch == '\'' || ch == '(' || ch == ')' || ch == '*' || ch == '+' || ch == ',' || | ||||
|                 ch == ';' || ch == '=' || ch < ' ' || ch > '~') { | ||||
|             if ((ptr - enc + 2) >= *size) { | ||||
|                 return -1; | ||||
|             } | ||||
|             sprintf(ptr, "%%%02X", ch); | ||||
|             ptr += 2; | ||||
|         } else if (ch == ' ') { | ||||
|             ptr[0] = '+'; | ||||
|         } else { | ||||
|             ptr[0] = ch; | ||||
|  | ||||
|         if (ch != 0) { | ||||
|             size++; | ||||
|             if (size < size_out) out[size - 1] = (char) ch; | ||||
|         } | ||||
|     } | ||||
|     *size = ptr - enc; | ||||
|     return 0; | ||||
|  | ||||
|     // Set terminating null byte | ||||
|     if (size_out > 0) out[size < size_out ? size : size_out - 1] = 0; | ||||
|  | ||||
|     // Return theoretical size | ||||
|     return size; | ||||
| } | ||||
|  | ||||
| int url_encode(const char *str, char *enc, long *size) { | ||||
|     char *ptr = enc; | ||||
|     unsigned char ch; | ||||
|     memset(enc, 0, *size); | ||||
|     for (int i = 0; i < strlen(str); i++, ptr++) { | ||||
|         if ((ptr - enc) >= *size) { | ||||
|             return -1; | ||||
|         } | ||||
|         ch = str[i]; | ||||
|         if (ch > 0x7F || ch == ' ') { | ||||
|             if ((ptr - enc + 2) >= *size) { | ||||
|                 return -1; | ||||
|             } | ||||
|             sprintf(ptr, "%%%02X", ch); | ||||
|             ptr += 2; | ||||
| int url_encode(const void *in, size_t size_in, char *out, size_t size_out) { | ||||
|     int size = 0; | ||||
|  | ||||
|     // Encode control characters | ||||
|     for (int i = 0; i < size_in; i++) { | ||||
|         unsigned char ch = ((unsigned char *) in)[i]; | ||||
|         if (ch <= 0x20 || ch >= 0x7F) { | ||||
|             size += 3; | ||||
|             if (size < size_out) sprintf(out + size - 3, "%%%02X", ch); | ||||
|         } else { | ||||
|             ptr[0] = (char) ch; | ||||
|             size++; | ||||
|             if (size < size_out) out[size - 1] = (char) ch; | ||||
|         } | ||||
|     } | ||||
|     *size = ptr - enc; | ||||
|     return 0; | ||||
|  | ||||
|     // Set terminating null byte | ||||
|     if (size_out > 0) out[size < size_out ? size : size_out - 1] = 0; | ||||
|  | ||||
|     // Return theoretical size | ||||
|     return size; | ||||
| } | ||||
|  | ||||
| int url_decode(const char *str, char *dec, long *size) { | ||||
| @@ -124,10 +135,73 @@ int mime_is_compressible(const char *type) { | ||||
|         strcmp(type_parsed, "application/vnd.ms-fontobject") == 0 || | ||||
|         strcmp(type_parsed, "application/x-font-ttf") == 0 || | ||||
|         strcmp(type_parsed, "application/x-javascript") == 0 || | ||||
|         strcmp(type_parsed, "application/x-web-app-manifest+json") == 0 || | ||||
|         strcmp(type_parsed, "font/eot") == 0 || | ||||
|         strcmp(type_parsed, "font/opentype") == 0 || | ||||
|         strcmp(type_parsed, "image/bmp") == 0 || | ||||
|         strcmp(type_parsed, "image/gif") == 0 || | ||||
|         strcmp(type_parsed, "image/vnd.microsoft.icon") == 0 || | ||||
|         strcmp(type_parsed, "image/vnd.microsoft.iconbinary") == 0 || | ||||
|         strcmp(type_parsed, "image/x-icon") == 0; | ||||
| } | ||||
|  | ||||
| int strcpy_rem_webroot(char *dst, const char *src, long len, const char *webroot) { | ||||
|     memcpy(dst, src, len); | ||||
|     dst[len] = 0; | ||||
|     if (webroot == NULL) | ||||
|         return 0; | ||||
|  | ||||
|     char *pos; | ||||
|     const unsigned long webroot_len = strlen(webroot); | ||||
|     if (webroot_len == 0) | ||||
|         return 0; | ||||
|  | ||||
|     while ((pos = strstr(dst, webroot)) != NULL) { | ||||
|         strcpy(pos, pos + webroot_len); | ||||
|     } | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int str_trim(char **start, char **end) { | ||||
|     if (start == NULL || end == NULL || *start == NULL || *end == NULL) | ||||
|         return -1; | ||||
|  | ||||
|     (*end)--; | ||||
|     while (*start[0] == ' ' || *start[0] == '\t' || *start[0] == '\r' || *start[0] == '\n') (*start)++; | ||||
|     while (*end[0] == ' ' || *end[0] == '\t' || *end[0] == '\r' || *end[0] == '\n') (*end)--; | ||||
|     (*end)++; | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int str_trim_lws(char **start, char **end) { | ||||
|     if (start == NULL || end == NULL || *start == NULL || *end == NULL) | ||||
|         return -1; | ||||
|  | ||||
|     (*end)--; | ||||
|     while (*start[0] == ' ' || *start[0] == '\t') (*start)++; | ||||
|     while (*end[0] == ' ' || *end[0] == '\t') (*end)--; | ||||
|     (*end)++; | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int base64_encode(void *data, unsigned long data_len, char *output, unsigned long *output_len) { | ||||
|     unsigned long out_len = 4 * ((data_len + 2) / 3); | ||||
|     if (output_len != NULL) *output_len = out_len; | ||||
|  | ||||
|     for (int i = 0, j = 0; i < data_len;) { | ||||
|         unsigned int octet_a = (i < data_len) ? ((unsigned char *) data)[i++] : 0; | ||||
|         unsigned int octet_b = (i < data_len) ? ((unsigned char *) data)[i++] : 0; | ||||
|         unsigned int octet_c = (i < data_len) ? ((unsigned char *) data)[i++] : 0; | ||||
|         unsigned int triple = (octet_a << 0x10) + (octet_b << 0x08) + octet_c; | ||||
|         output[j++] = base64_encode_table[(triple >> 3 * 6) & 0x3F]; | ||||
|         output[j++] = base64_encode_table[(triple >> 2 * 6) & 0x3F]; | ||||
|         output[j++] = base64_encode_table[(triple >> 1 * 6) & 0x3F]; | ||||
|         output[j++] = base64_encode_table[(triple >> 0 * 6) & 0x3F]; | ||||
|     } | ||||
|  | ||||
|     for (int i = 0; i < base64_mod_table[data_len % 3]; i++) | ||||
|         output[out_len - 1 - i] = '='; | ||||
|     output[out_len] = 0; | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|   | ||||
| @@ -1,12 +1,13 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Utilities (header file) | ||||
|  * src/lib/utils.h | ||||
|  * Lorenz Stechauner, 2020-12-03 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Utilities (header file) | ||||
|  * @file src/lib/utils.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-03 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_UTILS_H | ||||
| #define NECRONDA_SERVER_UTILS_H | ||||
| #ifndef SESIMOS_UTILS_H | ||||
| #define SESIMOS_UTILS_H | ||||
|  | ||||
| #include <stdio.h> | ||||
|  | ||||
| @@ -20,6 +21,7 @@ | ||||
|  | ||||
| extern char *log_prefix; | ||||
|  | ||||
|  | ||||
| #define out_1(fmt) fprintf(stdout, "%s" fmt "\n", log_prefix) | ||||
| #define out_2(fmt, args...) fprintf(stdout, "%s" fmt "\n", log_prefix, args) | ||||
|  | ||||
| @@ -32,12 +34,20 @@ extern char *log_prefix; | ||||
|  | ||||
| char *format_duration(unsigned long micros, char *buf); | ||||
|  | ||||
| int url_encode_component(const char *str, char *enc, long *size); | ||||
| int url_encode_component(const void *in, size_t size_in, char *out, size_t size_out); | ||||
|  | ||||
| int url_encode(const char *str, char *enc, long *size); | ||||
| int url_encode(const void *in, size_t size_in, char *out, size_t size_out); | ||||
|  | ||||
| int url_decode(const char *str, char *dec, long *size); | ||||
|  | ||||
| int mime_is_compressible(const char *type); | ||||
|  | ||||
| #endif //NECRONDA_SERVER_UTILS_H | ||||
| int strcpy_rem_webroot(char *dst, const char *str, long len, const char *webroot); | ||||
|  | ||||
| int str_trim(char **start, char **end); | ||||
|  | ||||
| int str_trim_lws(char **start, char **end); | ||||
|  | ||||
| int base64_encode(void *data, unsigned long data_len, char *output, unsigned long *output_len); | ||||
|  | ||||
| #endif //SESIMOS_UTILS_H | ||||
|   | ||||
							
								
								
									
										207
									
								
								src/lib/websocket.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										207
									
								
								src/lib/websocket.c
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,207 @@ | ||||
| /** | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief WebSocket reverse proxy | ||||
|  * @file src/lib/websocket.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2022-08-16 | ||||
|  */ | ||||
|  | ||||
| #include "../defs.h" | ||||
| #include "websocket.h" | ||||
| #include "utils.h" | ||||
|  | ||||
| #include <string.h> | ||||
| #include <openssl/sha.h> | ||||
| #include <errno.h> | ||||
| #include <signal.h> | ||||
|  | ||||
| static const char ws_key_uuid[] = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; | ||||
| static volatile sig_atomic_t terminate = 0; | ||||
|  | ||||
| void ws_terminate(int _) { | ||||
|     terminate = 1; | ||||
| } | ||||
|  | ||||
| int ws_calc_accept_key(const char *key, char *accept_key) { | ||||
|     if (key == NULL || accept_key == NULL) | ||||
|         return -1; | ||||
|  | ||||
|     char input[256] = ""; | ||||
|     unsigned char output[SHA_DIGEST_LENGTH]; | ||||
|     strcat(input, key); | ||||
|     strcat(input, ws_key_uuid); | ||||
|  | ||||
|     if (SHA1((unsigned char *) input, strlen(input), output) == NULL) { | ||||
|         return -2; | ||||
|     } | ||||
|  | ||||
|     base64_encode(output, sizeof(output), accept_key, NULL); | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int ws_recv_frame_header(sock *s, ws_frame *frame) { | ||||
|     unsigned char buf[12]; | ||||
|  | ||||
|     long ret = sock_recv(s, buf, 2, 0); | ||||
|     if (ret < 0) { | ||||
|         print(ERR_STR "Unable to receive from socket: %s" CLR_STR, strerror(errno)); | ||||
|         return -1; | ||||
|     } else if (ret != 2) { | ||||
|         print(ERR_STR "Unable to receive 2 bytes from socket" CLR_STR); | ||||
|         return -2; | ||||
|     } | ||||
|  | ||||
|     unsigned short bits = (buf[0] << 8) | buf[1]; | ||||
|     frame->f_fin = (bits >> 15) & 1; | ||||
|     frame->f_rsv1 = (bits >> 14) & 1; | ||||
|     frame->f_rsv2 = (bits >> 13) & 1; | ||||
|     frame->f_rsv3 = (bits >> 12) & 1; | ||||
|     frame->opcode = (bits >> 8) & 0xF; | ||||
|     frame->f_mask = (bits >> 7) & 1; | ||||
|     unsigned short len = (bits & 0x7F); | ||||
|  | ||||
|     int remaining = frame->f_mask ? 4 : 0; | ||||
|     if (len == 126) { | ||||
|         remaining += 2; | ||||
|     } else if (len == 127) { | ||||
|         remaining += 8; | ||||
|     } | ||||
|  | ||||
|     ret = sock_recv(s, buf, remaining, 0); | ||||
|     if (ret < 0) { | ||||
|         print(ERR_STR "Unable to receive from socket: %s" CLR_STR, strerror(errno)); | ||||
|         return -1; | ||||
|     } else if (ret != remaining) { | ||||
|         print(ERR_STR "Unable to receive correct number of bytes from socket" CLR_STR); | ||||
|         return -2; | ||||
|     } | ||||
|  | ||||
|     if (len == 126) { | ||||
|         frame->len = (((unsigned long) buf[0]) << 8) | ((unsigned long) buf[1]); | ||||
|     } else if (len == 127) { | ||||
|         frame->len = | ||||
|                 (((unsigned long) buf[0]) << 56) | | ||||
|                 (((unsigned long) buf[1]) << 48) | | ||||
|                 (((unsigned long) buf[2]) << 40) | | ||||
|                 (((unsigned long) buf[3]) << 32) | | ||||
|                 (((unsigned long) buf[4]) << 24) | | ||||
|                 (((unsigned long) buf[5]) << 16) | | ||||
|                 (((unsigned long) buf[6]) << 8) | | ||||
|                 (((unsigned long) buf[7]) << 0); | ||||
|     } else { | ||||
|         frame->len = len; | ||||
|     } | ||||
|  | ||||
|     if (frame->f_mask) memcpy(frame->masking_key, buf + (remaining - 4), 4); | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int ws_send_frame_header(sock *s, ws_frame *frame) { | ||||
|     unsigned char buf[14], *ptr = buf; | ||||
|  | ||||
|     unsigned short len; | ||||
|     if (frame->len > 0x7FFF) { | ||||
|         len = 127; | ||||
|     } else if (frame->len > 125) { | ||||
|         len = 126; | ||||
|     } else { | ||||
|         len = frame->len; | ||||
|     } | ||||
|  | ||||
|     unsigned short bits = | ||||
|             (frame->f_fin << 15) | | ||||
|             (frame->f_rsv1 << 14) | | ||||
|             (frame->f_rsv2 << 13) | | ||||
|             (frame->f_rsv3 << 12) | | ||||
|             (frame->opcode << 8) | | ||||
|             (frame->f_mask << 7) | | ||||
|             len; | ||||
|  | ||||
|     ptr++[0] = bits >> 8; | ||||
|     ptr++[0] = bits & 0xFF; | ||||
|  | ||||
|     if (len >= 126) { | ||||
|         for (int i = (len == 126 ? 2 : 8) - 1; i >= 0; i--) | ||||
|             ptr++[0] = (unsigned char) ((frame->len >> (i * 8)) & 0xFF); | ||||
|     } | ||||
|  | ||||
|     if (frame->f_mask) { | ||||
|         memcpy(ptr, frame->masking_key, 4); | ||||
|         ptr += 4; | ||||
|     } | ||||
|  | ||||
|     long ret = sock_send(s, buf, ptr - buf, frame->len != 0 ? MSG_MORE : 0); | ||||
|     if (ret < 0) { | ||||
|         print(ERR_STR "Unable to send to socket: %s" CLR_STR, strerror(errno)); | ||||
|         return -1; | ||||
|     } else if (ret != ptr - buf) { | ||||
|         print(ERR_STR "Unable to send to socket" CLR_STR); | ||||
|         return -2; | ||||
|     } | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| int ws_handle_connection(sock *s1, sock *s2) { | ||||
|     sock *poll_socks[2] = {s1, s2}; | ||||
|     sock *readable[2], *error[2]; | ||||
|     int n_sock = 2, n_readable = 0, n_error = 0; | ||||
|     ws_frame frame; | ||||
|     char buf[CHUNK_SIZE]; | ||||
|     int closes = 0; | ||||
|     long ret; | ||||
|  | ||||
|     signal(SIGINT, ws_terminate); | ||||
|     signal(SIGTERM, ws_terminate); | ||||
|  | ||||
|     while (!terminate && closes != 3) { | ||||
|         ret = sock_poll_read(poll_socks, readable, error, n_sock, &n_readable, &n_error, WS_TIMEOUT * 1000); | ||||
|         if (terminate) { | ||||
|             break; | ||||
|         } else if (ret < 0) { | ||||
|             print(ERR_STR "Unable to poll sockets: %s" CLR_STR, strerror(errno)); | ||||
|             return -1; | ||||
|         } else if (n_readable == 0) { | ||||
|             print(ERR_STR "Connection timed out" CLR_STR); | ||||
|             return -2; | ||||
|         } else if (n_error > 0) { | ||||
|             print(ERR_STR "Peer closed connection" CLR_STR); | ||||
|             return -3; | ||||
|         } | ||||
|  | ||||
|         for (int i = 0; i < n_readable; i++) { | ||||
|             sock *s = readable[i]; | ||||
|             sock *o = (s == s1) ? s2 : s1; | ||||
|             if (ws_recv_frame_header(s, &frame) != 0) return -3; | ||||
|  | ||||
|             // print("WebSocket: Peer %s, Opcode=0x%X, Len=%li", (s == s1) ? "1" : "2", frame.opcode, frame.len); | ||||
|  | ||||
|             if (frame.opcode == 0x8) { | ||||
|                 n_sock--; | ||||
|                 if (s == s1) { | ||||
|                     poll_socks[0] = s2; | ||||
|                     closes |= 1; | ||||
|                 } else { | ||||
|                     closes |= 2; | ||||
|                 } | ||||
|             } | ||||
|  | ||||
|             if (ws_send_frame_header(o, &frame) != 0) return -3; | ||||
|  | ||||
|             if (frame.len > 0) { | ||||
|                 ret = sock_splice(o, s, buf, sizeof(buf), frame.len); | ||||
|                 if (ret < 0) { | ||||
|                     print(ERR_STR "Unable to forward data in WebSocket: %s" CLR_STR, strerror(errno)); | ||||
|                     return -4; | ||||
|                 } else if (ret != frame.len) { | ||||
|                     print(ERR_STR "Unable to forward correct number of bytes in WebSocket" CLR_STR); | ||||
|                     return -4; | ||||
|                 } | ||||
|             } | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     return 0; | ||||
| } | ||||
							
								
								
									
										35
									
								
								src/lib/websocket.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										35
									
								
								src/lib/websocket.h
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,35 @@ | ||||
| /** | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief WebSocket reverse proxy (header file) | ||||
|  * @file src/lib/websocket.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2022-08-16 | ||||
|  */ | ||||
|  | ||||
| #ifndef SESIMOS_WEBSOCKET_H | ||||
| #define SESIMOS_WEBSOCKET_H | ||||
|  | ||||
| #include "sock.h" | ||||
|  | ||||
| #define WS_TIMEOUT 3600 | ||||
|  | ||||
| typedef struct { | ||||
|     unsigned char f_fin:1; | ||||
|     unsigned char f_rsv1:1; | ||||
|     unsigned char f_rsv2:1; | ||||
|     unsigned char f_rsv3:1; | ||||
|     unsigned char opcode:4; | ||||
|     unsigned char f_mask:1; | ||||
|     unsigned long len; | ||||
|     char masking_key[4]; | ||||
| } ws_frame; | ||||
|  | ||||
| int ws_calc_accept_key(const char *key, char *accept_key); | ||||
|  | ||||
| int ws_recv_frame_header(sock *s, ws_frame *frame); | ||||
|  | ||||
| int ws_send_frame_header(sock *s, ws_frame *frame); | ||||
|  | ||||
| int ws_handle_connection(sock *s1, sock *s2); | ||||
|  | ||||
| #endif //SESIMOS_WEBSOCKET_H | ||||
| @@ -1,15 +0,0 @@ | ||||
| /** | ||||
|  * Necronda Web Server | ||||
|  * Definitions | ||||
|  * src/necronda.h | ||||
|  * Lorenz Stechauner, 2021-05-04 | ||||
|  */ | ||||
|  | ||||
| #ifndef NECRONDA_SERVER_NECRONDA_H | ||||
| #define NECRONDA_SERVER_NECRONDA_H | ||||
|  | ||||
| #define NECRONDA_VERSION "4.4" | ||||
| #define SERVER_STR "Necronda/" NECRONDA_VERSION | ||||
| #define SERVER_STR_HTML "Necronda web server " NECRONDA_VERSION | ||||
|  | ||||
| #endif //NECRONDA_SERVER_NECRONDA_H | ||||
| @@ -1,27 +1,27 @@ | ||||
| /**
 | ||||
|  * Necronda Web Server | ||||
|  * Main executable | ||||
|  * src/necronda-server.c | ||||
|  * Lorenz Stechauner, 2020-12-03 | ||||
|  * Sesimos - secure, simple, modern web server | ||||
|  * @brief Main executable | ||||
|  * @file src/server.c | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-03 | ||||
|  */ | ||||
| 
 | ||||
| #define _POSIX_C_SOURCE 199309L | ||||
| 
 | ||||
| #include "necronda.h" | ||||
| #include "necronda-server.h" | ||||
| #include "client.c" | ||||
| #include "defs.h" | ||||
| #include "server.h" | ||||
| #include "client.h" | ||||
| 
 | ||||
| #include "lib/cache.h" | ||||
| #include "lib/config.h" | ||||
| #include "lib/sock.h" | ||||
| #include "lib/rev_proxy.h" | ||||
| #include "lib/geoip.h" | ||||
| #include "lib/utils.h" | ||||
| 
 | ||||
| #include <stdio.h> | ||||
| #include <sys/socket.h> | ||||
| #include <signal.h> | ||||
| #include <unistd.h> | ||||
| #include <sys/select.h> | ||||
| #include <poll.h> | ||||
| #include <string.h> | ||||
| #include <errno.h> | ||||
| #include <arpa/inet.h> | ||||
| @@ -33,20 +33,31 @@ | ||||
| #include <openssl/conf.h> | ||||
| #include <dirent.h> | ||||
| 
 | ||||
| int active = 1; | ||||
| 
 | ||||
| volatile sig_atomic_t active = 1; | ||||
| const char *config_file; | ||||
| int sockets[NUM_SOCKETS]; | ||||
| pid_t children[MAX_CHILDREN]; | ||||
| MMDB_s mmdbs[MAX_MMDB]; | ||||
| SSL_CTX *contexts[CONFIG_MAX_CERT_CONFIG]; | ||||
| 
 | ||||
| void openssl_init() { | ||||
| void openssl_init(void) { | ||||
|     SSL_library_init(); | ||||
|     SSL_load_error_strings(); | ||||
|     ERR_load_BIO_strings(); | ||||
|     OpenSSL_add_all_algorithms(); | ||||
| } | ||||
| 
 | ||||
| void destroy() { | ||||
| static int ssl_servername_cb(SSL *ssl, int *ad, void *arg) { | ||||
|     const char *servername = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name); | ||||
|     if (servername != NULL) { | ||||
|         const host_config *conf = get_host_config(servername); | ||||
|         if (conf != NULL) SSL_set_SSL_CTX(ssl, contexts[conf->cert]); | ||||
|     } | ||||
|     return SSL_TLSEXT_ERR_OK; | ||||
| } | ||||
| 
 | ||||
| void destroy(int _) { | ||||
|     fprintf(stderr, "\n" ERR_STR "Terminating forcefully!" CLR_STR "\n"); | ||||
|     int status = 0; | ||||
|     int ret; | ||||
| @@ -55,13 +66,11 @@ void destroy() { | ||||
|         if (children[i] != 0) { | ||||
|             ret = waitpid(children[i], &status, WNOHANG); | ||||
|             if (ret < 0) { | ||||
|                 fprintf(stderr, ERR_STR "Unable to wait for child process (PID %i): %s" CLR_STR "\n", | ||||
|                         children[i], strerror(errno)); | ||||
|                 fprintf(stderr, ERR_STR "Unable to wait for child process (PID %i): %s" CLR_STR "\n", children[i], strerror(errno)); | ||||
|             } else if (ret == children[i]) { | ||||
|                 children[i] = 0; | ||||
|                 if (status != 0) { | ||||
|                     fprintf(stderr, ERR_STR "Child process with PID %i terminated with exit code %i" CLR_STR "\n", | ||||
|                             ret, status); | ||||
|                     fprintf(stderr, ERR_STR "Child process with PID %i terminated with exit code %i" CLR_STR "\n", ret, status); | ||||
|                 } | ||||
|             } else { | ||||
|                 kill(children[i], SIGKILL); | ||||
| @@ -77,7 +86,7 @@ void destroy() { | ||||
|     exit(2); | ||||
| } | ||||
| 
 | ||||
| void terminate() { | ||||
| void terminate(int _) { | ||||
|     fprintf(stderr, "\nTerminating gracefully...\n"); | ||||
|     active = 0; | ||||
| 
 | ||||
| @@ -96,13 +105,11 @@ void terminate() { | ||||
|         if (children[i] != 0) { | ||||
|             ret = waitpid(children[i], &status, WNOHANG); | ||||
|             if (ret < 0) { | ||||
|                 fprintf(stderr, ERR_STR "Unable to wait for child process (PID %i): %s" CLR_STR "\n", | ||||
|                         children[i], strerror(errno)); | ||||
|                 fprintf(stderr, ERR_STR "Unable to wait for child process (PID %i): %s" CLR_STR "\n", children[i], strerror(errno)); | ||||
|             } else if (ret == children[i]) { | ||||
|                 children[i] = 0; | ||||
|                 if (status != 0) { | ||||
|                     fprintf(stderr, ERR_STR "Child process with PID %i terminated with exit code %i" CLR_STR "\n", | ||||
|                             ret, status); | ||||
|                     fprintf(stderr, ERR_STR "Child process with PID %i terminated with exit code %i" CLR_STR "\n", ret, status); | ||||
|                 } | ||||
|             } else { | ||||
|                 kill(children[i], SIGTERM); | ||||
| @@ -119,13 +126,11 @@ void terminate() { | ||||
|         if (children[i] != 0) { | ||||
|             ret = waitpid(children[i], &status, 0); | ||||
|             if (ret < 0) { | ||||
|                 fprintf(stderr, ERR_STR "Unable to wait for child process (PID %i): %s" CLR_STR "\n", | ||||
|                         children[i], strerror(errno)); | ||||
|                 fprintf(stderr, ERR_STR "Unable to wait for child process (PID %i): %s" CLR_STR "\n", children[i], strerror(errno)); | ||||
|             } else if (ret == children[i]) { | ||||
|                 children[i] = 0; | ||||
|                 if (status != 0) { | ||||
|                     fprintf(stderr, ERR_STR "Child process with PID %i terminated with exit code %i" CLR_STR "\n", | ||||
|                             ret, status); | ||||
|                     fprintf(stderr, ERR_STR "Child process with PID %i terminated with exit code %i" CLR_STR "\n", ret, status); | ||||
|                 } | ||||
|             } | ||||
|         } | ||||
| @@ -148,8 +153,7 @@ void terminate() { | ||||
| 
 | ||||
| int main(int argc, const char *argv[]) { | ||||
|     const int YES = 1; | ||||
|     fd_set socket_fds, read_socket_fds; | ||||
|     int max_socket_fd = 0; | ||||
|     struct pollfd poll_fds[NUM_SOCKETS]; | ||||
|     int ready_sockets_num; | ||||
|     long client_num = 0; | ||||
|     char buf[1024]; | ||||
| @@ -164,8 +168,6 @@ int main(int argc, const char *argv[]) { | ||||
|     memset(children, 0, sizeof(children)); | ||||
|     memset(mmdbs, 0, sizeof(mmdbs)); | ||||
| 
 | ||||
|     struct timeval timeout; | ||||
| 
 | ||||
|     const struct sockaddr_in6 addresses[2] = { | ||||
|             {.sin6_family = AF_INET6, .sin6_addr = IN6ADDR_ANY_INIT, .sin6_port = htons(80)}, | ||||
|             {.sin6_family = AF_INET6, .sin6_addr = IN6ADDR_ANY_INIT, .sin6_port = htons(443)} | ||||
| @@ -175,7 +177,7 @@ int main(int argc, const char *argv[]) { | ||||
|         fprintf(stderr, ERR_STR "Unable to set stdout to line-buffered mode: %s" CLR_STR, strerror(errno)); | ||||
|         return 1; | ||||
|     } | ||||
|     printf("Necronda Web Server " NECRONDA_VERSION "\n"); | ||||
|     printf("Sesimos web server " SERVER_VERSION "\n"); | ||||
| 
 | ||||
|     ret = config_init(); | ||||
|     if (ret != 0) { | ||||
| @@ -186,7 +188,7 @@ int main(int argc, const char *argv[]) { | ||||
|     for (int i = 1; i < argc; i++) { | ||||
|         const char *arg = argv[i]; | ||||
|         if (strcmp(arg, "-h") == 0 || strcmp(arg, "--help") == 0) { | ||||
|             printf("Usage: necronda-server [-h] [-c <CONFIG-FILE>]\n" | ||||
|             printf("Usage: sesimos [-h] [-c <CONFIG-FILE>]\n" | ||||
|                    "\n" | ||||
|                    "Options:\n" | ||||
|                    "  -c, --config <CONFIG-FILE>  path to the config file. If not provided, default will be used\n" | ||||
| @@ -287,63 +289,65 @@ int main(int argc, const char *argv[]) { | ||||
| 
 | ||||
|     openssl_init(); | ||||
| 
 | ||||
|     client.buf = NULL; | ||||
|     client.buf_len = 0; | ||||
|     client.buf_off = 0; | ||||
|     client.ctx = SSL_CTX_new(TLS_server_method()); | ||||
|     SSL_CTX_set_options(client.ctx, SSL_OP_SINGLE_DH_USE); | ||||
|     SSL_CTX_set_verify(client.ctx, SSL_VERIFY_NONE, NULL); | ||||
|     SSL_CTX_set_min_proto_version(client.ctx, TLS1_2_VERSION); | ||||
|     SSL_CTX_set_mode(client.ctx, SSL_MODE_ENABLE_PARTIAL_WRITE); | ||||
|     SSL_CTX_set_cipher_list(client.ctx, "HIGH:!aNULL:!kRSA:!PSK:!SRP:!MD5:!RC4"); | ||||
|     SSL_CTX_set_ecdh_auto(client.ctx, 1); | ||||
|     for (int i = 0; i < CONFIG_MAX_CERT_CONFIG; i++) { | ||||
|         const cert_config *conf = &config->certs[i]; | ||||
|         if (conf->name[0] == 0) break; | ||||
| 
 | ||||
|         contexts[i] = SSL_CTX_new(TLS_server_method()); | ||||
|         SSL_CTX *ctx = contexts[i]; | ||||
|         SSL_CTX_set_options(ctx, SSL_OP_SINGLE_DH_USE); | ||||
|         SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL); | ||||
|         SSL_CTX_set_min_proto_version(ctx, TLS1_2_VERSION); | ||||
|         SSL_CTX_set_mode(ctx, SSL_MODE_ENABLE_PARTIAL_WRITE); | ||||
|         SSL_CTX_set_cipher_list(ctx, "HIGH:!aNULL:!kRSA:!PSK:!SRP:!MD5:!RC4"); | ||||
|         SSL_CTX_set_ecdh_auto(ctx, 1); | ||||
|         SSL_CTX_set_tlsext_servername_callback(ctx, ssl_servername_cb); | ||||
| 
 | ||||
|         if (SSL_CTX_use_certificate_chain_file(ctx, conf->full_chain) != 1) { | ||||
|             fprintf(stderr, ERR_STR "Unable to load certificate chain file: %s: %s" CLR_STR "\n", ERR_reason_error_string(ERR_get_error()), conf->full_chain); | ||||
|             config_unload(); | ||||
|             cache_unload(); | ||||
|             return 1; | ||||
|         } | ||||
|         if (SSL_CTX_use_PrivateKey_file(ctx, conf->priv_key, SSL_FILETYPE_PEM) != 1) { | ||||
|             fprintf(stderr, ERR_STR "Unable to load private key file: %s: %s" CLR_STR "\n", ERR_reason_error_string(ERR_get_error()), conf->priv_key); | ||||
|             config_unload(); | ||||
|             cache_unload(); | ||||
|             return 1; | ||||
|         } | ||||
|     } | ||||
| 
 | ||||
|     client.ctx = contexts[0]; | ||||
| 
 | ||||
| 
 | ||||
|     rev_proxy_preload(); | ||||
| 
 | ||||
|     if (SSL_CTX_use_certificate_chain_file(client.ctx, cert_file) != 1) { | ||||
|         fprintf(stderr, ERR_STR "Unable to load certificate chain file: %s: %s" CLR_STR "\n", | ||||
|                 ERR_reason_error_string(ERR_get_error()), cert_file); | ||||
|         config_unload(); | ||||
|         return 1; | ||||
|     } | ||||
|     if (SSL_CTX_use_PrivateKey_file(client.ctx, key_file, SSL_FILETYPE_PEM) != 1) { | ||||
|         fprintf(stderr, ERR_STR "Unable to load private key file: %s: %s" CLR_STR "\n", | ||||
|                 ERR_reason_error_string(ERR_get_error()), key_file); | ||||
|         config_unload(); | ||||
|         return 1; | ||||
|     } | ||||
| 
 | ||||
|     for (int i = 0; i < NUM_SOCKETS; i++) { | ||||
|         if (listen(sockets[i], LISTEN_BACKLOG) < 0) { | ||||
|             fprintf(stderr, ERR_STR "Unable to listen on socket %i: %s" CLR_STR "\n", i, strerror(errno)); | ||||
|             config_unload(); | ||||
|             cache_unload(); | ||||
|             return 1; | ||||
|         } | ||||
|     } | ||||
| 
 | ||||
|     FD_ZERO(&socket_fds); | ||||
|     for (int i = 0; i < NUM_SOCKETS; i++) { | ||||
|         FD_SET(sockets[i], &socket_fds); | ||||
|         if (sockets[i] > max_socket_fd) { | ||||
|             max_socket_fd = sockets[i]; | ||||
|         } | ||||
|         poll_fds[i].fd = sockets[i]; | ||||
|         poll_fds[i].events = POLLIN; | ||||
|     } | ||||
| 
 | ||||
|     fprintf(stderr, "Ready to accept connections\n"); | ||||
| 
 | ||||
|     while (active) { | ||||
|         timeout.tv_sec = 1; | ||||
|         timeout.tv_usec = 0; | ||||
|         read_socket_fds = socket_fds; | ||||
|         ready_sockets_num = select(max_socket_fd + 1, &read_socket_fds, NULL, NULL, &timeout); | ||||
|         ready_sockets_num = poll(poll_fds, NUM_SOCKETS, 1000); | ||||
|         if (ready_sockets_num < 0) { | ||||
|             fprintf(stderr, ERR_STR "Unable to select sockets: %s" CLR_STR "\n", strerror(errno)); | ||||
|             terminate(); | ||||
|             fprintf(stderr, ERR_STR "Unable to poll sockets: %s" CLR_STR "\n", strerror(errno)); | ||||
|             terminate(0); | ||||
|             return 1; | ||||
|         } | ||||
| 
 | ||||
|         for (int i = 0; i < NUM_SOCKETS; i++) { | ||||
|             if (FD_ISSET(sockets[i], &read_socket_fds)) { | ||||
|             if (poll_fds[i].revents & POLLIN) { | ||||
|                 client_fd = accept(sockets[i], (struct sockaddr *) &client_addr, &client_addr_len); | ||||
|                 if (client_fd < 0) { | ||||
|                     fprintf(stderr, ERR_STR "Unable to accept connection: %s" CLR_STR "\n", strerror(errno)); | ||||
| @@ -357,7 +361,7 @@ int main(int argc, const char *argv[]) { | ||||
|                     signal(SIGTERM, SIG_IGN); | ||||
| 
 | ||||
|                     client.socket = client_fd; | ||||
|                     client.enc = i == 1; | ||||
|                     client.enc = (i == 1); | ||||
|                     return client_handler(&client, client_num, &client_addr); | ||||
|                 } else if (pid > 0) { | ||||
|                     // parent
 | ||||
| @@ -381,18 +385,18 @@ int main(int argc, const char *argv[]) { | ||||
|             if (children[i] != 0) { | ||||
|                 ret = waitpid(children[i], &status, WNOHANG); | ||||
|                 if (ret < 0) { | ||||
|                     fprintf(stderr, ERR_STR "Unable to wait for child process (PID %i): %s" CLR_STR "\n", | ||||
|                             children[i], strerror(errno)); | ||||
|                     fprintf(stderr, ERR_STR "Unable to wait for child process (PID %i): %s" CLR_STR "\n", children[i], strerror(errno)); | ||||
|                 } else if (ret == children[i]) { | ||||
|                     children[i] = 0; | ||||
|                     if (status != 0) { | ||||
|                         fprintf(stderr, ERR_STR "Child process with PID %i terminated with exit code %i" CLR_STR "\n", | ||||
|                                 ret, status); | ||||
|                         fprintf(stderr, ERR_STR "Child process with PID %i terminated with exit code %i" CLR_STR "\n", ret, status); | ||||
|                     } | ||||
|                 } | ||||
|             } | ||||
|         } | ||||
|     } | ||||
| 
 | ||||
|     config_unload(); | ||||
|     cache_unload(); | ||||
|     return 0; | ||||
| } | ||||
| @@ -1,15 +1,17 @@ | ||||
| /**
 | ||||
|  * Necronda Web Server | ||||
|  * Main executable (header file) | ||||
|  * src/necronda-server.h | ||||
|  * Lorenz Stechauner, 2020-12-03 | ||||
|  * sesimos - secure, simple, modern web server | ||||
|  * @brief Main executable (header file) | ||||
|  * @file src/server.h | ||||
|  * @author Lorenz Stechauner | ||||
|  * @date 2020-12-03 | ||||
|  */ | ||||
| 
 | ||||
| #ifndef NECRONDA_SERVER_NECRONDA_SERVER_H | ||||
| #define NECRONDA_SERVER_NECRONDA_SERVER_H | ||||
| #ifndef SESIMOS_SERVER_H | ||||
| #define SESIMOS_SERVER_H | ||||
| 
 | ||||
| #include <sys/time.h> | ||||
| #include <maxminddb.h> | ||||
| #include <signal.h> | ||||
| 
 | ||||
| #define NUM_SOCKETS 2 | ||||
| #define MAX_CHILDREN 1024 | ||||
| @@ -17,21 +19,17 @@ | ||||
| #define LISTEN_BACKLOG 16 | ||||
| #define REQ_PER_CONNECTION 200 | ||||
| #define CLIENT_TIMEOUT 3600 | ||||
| #define SERVER_TIMEOUT 4 | ||||
| #define SERVER_TIMEOUT_INIT 4 | ||||
| #define SERVER_TIMEOUT 3600 | ||||
| 
 | ||||
| #define CHUNK_SIZE 8192 | ||||
| 
 | ||||
| #ifndef DEFAULT_HOST | ||||
| #   define DEFAULT_HOST "www.necronda.net" | ||||
| #endif | ||||
| 
 | ||||
| extern int sockets[NUM_SOCKETS]; | ||||
| extern pid_t children[MAX_CHILDREN]; | ||||
| extern MMDB_s mmdbs[MAX_MMDB]; | ||||
| 
 | ||||
| extern int server_keep_alive; | ||||
| extern volatile sig_atomic_t server_keep_alive; | ||||
| extern char *log_client_prefix, *log_conn_prefix, *log_req_prefix, *client_geoip; | ||||
| extern char *client_addr_str, *client_addr_str_ptr, *server_addr_str, *server_addr_str_ptr, *client_host_str; | ||||
| extern struct timeval client_timeout; | ||||
| 
 | ||||
| #endif //NECRONDA_SERVER_NECRONDA_SERVER_H
 | ||||
| #endif //SESIMOS_SERVER_H
 | ||||
							
								
								
									
										28
									
								
								test/mock_socket.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								test/mock_socket.c
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,28 @@ | ||||
|  | ||||
| #include <stdio.h> | ||||
| #include <errno.h> | ||||
|  | ||||
| #include "mock_socket.h" | ||||
|  | ||||
| int mock_socket_send_mode; | ||||
|  | ||||
| static int sockets[256] = {0}; | ||||
| static int n_sockets = 0; | ||||
|  | ||||
| int mock_socket(int domain, int type, int protocol) { | ||||
|     printf("SOCKET\n"); | ||||
|     return (n_sockets++) + 100; | ||||
| } | ||||
|  | ||||
| ssize_t mock_send(int fd, const void *buf, size_t n, int flags) { | ||||
|     printf("SEND\n"); | ||||
|     if (mock_socket_send_mode == MOCK_SOCKET_MODE_EINTR) { | ||||
|         errno = EINTR; | ||||
|         return rand() % ((ssize_t) n) - 1; | ||||
|     } else if (mock_socket_send_mode == MOCK_SOCKET_MODE_CLOSED) { | ||||
|         errno = 0; // TODO | ||||
|         return -1; | ||||
|     } | ||||
|  | ||||
|     return (ssize_t) n; | ||||
| } | ||||
							
								
								
									
										20
									
								
								test/mock_socket.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								test/mock_socket.h
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,20 @@ | ||||
|  | ||||
| #ifndef SESIMOS_MOCK_SOCKET_H | ||||
| #define SESIMOS_MOCK_SOCKET_H | ||||
|  | ||||
| #include <stdlib.h> | ||||
|  | ||||
| #define MOCK_SOCKET_MODE_SUCCESS 0 | ||||
| #define MOCK_SOCKET_MODE_EINTR 1 | ||||
| #define MOCK_SOCKET_MODE_CLOSED 2 | ||||
|  | ||||
| #define socket(args...) mock_socket(args) | ||||
| #define send(args...) mock_send(args) | ||||
|  | ||||
| extern int mock_socket_send_mode; | ||||
|  | ||||
| int mock_socket(int domain, int type, int protocol); | ||||
|  | ||||
| ssize_t mock_send(int fd, const void *buf, size_t n, int flags); | ||||
|  | ||||
| #endif //SESIMOS_MOCK_SOCKET_H | ||||
							
								
								
									
										33
									
								
								test/mock_ssl.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										33
									
								
								test/mock_ssl.c
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,33 @@ | ||||
|  | ||||
| #include <openssl/crypto.h> | ||||
|  | ||||
|  | ||||
| int SSL_write(SSL *ssl, const void *buf, int num) { | ||||
|     return num; | ||||
| } | ||||
|  | ||||
| int SSL_read(SSL *ssl, void *buf, int num) { | ||||
|     return num; | ||||
| } | ||||
|  | ||||
| int SSL_peek(SSL *ssl, void *buf, int num) { | ||||
|     return num; | ||||
| } | ||||
|  | ||||
| int SSL_get_error(const SSL *s, int ret_code) { | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| const char *ERR_reason_error_string(unsigned long e) { | ||||
|     return ""; | ||||
| } | ||||
|  | ||||
| int SSL_shutdown(SSL *s) { | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| void SSL_free(SSL *ssl) {} | ||||
|  | ||||
| unsigned long ERR_get_error(void) { | ||||
|     return 0; | ||||
| } | ||||
							
								
								
									
										15
									
								
								test/test_sock.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								test/test_sock.c
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,15 @@ | ||||
|  | ||||
| #include <criterion/criterion.h> | ||||
| #include "mock_socket.h" | ||||
| #include "../src/lib/sock.h" | ||||
|  | ||||
|  | ||||
| Test(sock, sock_send_1) { | ||||
|     int fd = socket(AF_INET6, SOCK_STREAM, 0); | ||||
|     sock s; | ||||
|     s.enc = 0; | ||||
|     s.socket = fd; | ||||
|  | ||||
|     long ret = sock_send(&s, "Hello", 5, 0); | ||||
|     cr_assert_eq(ret, 5); | ||||
| } | ||||
							
								
								
									
										86
									
								
								test/test_utils.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										86
									
								
								test/test_utils.c
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,86 @@ | ||||
|  | ||||
| #include <criterion/criterion.h> | ||||
| #include <criterion/parameterized.h> | ||||
|  | ||||
| #include "../src/lib/utils.h" | ||||
|  | ||||
| struct url_encode_t { | ||||
|     long in_size; | ||||
|     char in[256]; | ||||
|     long exp_size; | ||||
|     char exp[256]; | ||||
| }; | ||||
|  | ||||
| struct format_duration_t { | ||||
|     unsigned long micros; | ||||
|     char exp[16]; | ||||
| }; | ||||
|  | ||||
| ParameterizedTestParameters(utils, url_encode) { | ||||
|     static struct url_encode_t params[] = { | ||||
|             {0, "", 0, ""}, | ||||
|             {9, "Test Text", 11, "Test%20Text"}, | ||||
|             {21, "Text\0with\0null\0bytes\0", 29, "Text%00with%00null%00bytes%00"}, | ||||
|             {59, "Text&with+some/strange_symbols-or#something?I%don't|know...", 59, "Text&with+some/strange_symbols-or#something?I%don't|know..."}, | ||||
|             {33, "Data\x12With\x13Some" "\xFF" "Control" "\xFE" "Characters", 41, "Data%12With%13Some%FFControl%FECharacters"} | ||||
|     }; | ||||
|     return cr_make_param_array(struct url_encode_t, params, sizeof(params) / sizeof(struct url_encode_t)); | ||||
| } | ||||
|  | ||||
| ParameterizedTest(struct url_encode_t *param, utils, url_encode) { | ||||
|     char out[256]; | ||||
|     cr_assert_eq(url_encode(param->in, param->in_size, out, sizeof(out)), param->exp_size); | ||||
|     cr_assert_arr_eq(out, param->exp, param->exp_size + 1); | ||||
| } | ||||
|  | ||||
| Test(utils, url_encode_bytes) { | ||||
|     char out[4]; | ||||
|     char exp[4]; | ||||
|  | ||||
|     for (int i = 0; i < 256; i++) { | ||||
|         unsigned char ch = i; | ||||
|         if (ch <= 0x20 || ch >= 0x7F) { | ||||
|             cr_assert_eq(url_encode(&ch, 1, out, sizeof(out)), 3); | ||||
|             sprintf(exp, "%%%02X", ch); | ||||
|             cr_assert_str_eq(out, exp); | ||||
|         } else { | ||||
|             cr_assert_eq(url_encode(&ch, 1, out, sizeof(out)), 1); | ||||
|             sprintf(exp, "%c", ch); | ||||
|             cr_assert_str_eq(out, exp); | ||||
|         } | ||||
|     } | ||||
| } | ||||
|  | ||||
| Test(utils, url_encode_invalid) { | ||||
|     cr_assert_eq(url_encode("Hello", 5, NULL, 0), 5); | ||||
| } | ||||
|  | ||||
| ParameterizedTestParameters(utils, format_duration) { | ||||
|     static struct format_duration_t params[] = { | ||||
|             {0, "0.0 ms"}, | ||||
|             {1, "0.0 ms"}, | ||||
|             {90, "0.1 ms"}, | ||||
|             {100, "0.1 ms"}, | ||||
|             {110, "0.1 ms"}, | ||||
|             {900, "0.9 ms"}, | ||||
|             {1000, "1.0 ms"}, | ||||
|             {9000, "9.0 ms"}, | ||||
|             {9899, "9.9 ms"}, | ||||
|             {9999, "10.0 ms"}, | ||||
|             {10000, "10 ms"}, | ||||
|             {11999, "12 ms"}, | ||||
|             {999999, "1.0 s"}, | ||||
|             {1000000, "1.0 s"}, | ||||
|             {3000000, "3.0 s"}, | ||||
|             {1000000 * 60, "1.0 min"}, | ||||
|             {1000000 * 60 * 30L - 30000000, "29.5 min"}, | ||||
|             {1000000 * 60 * 60L, "60.0 min"}, | ||||
|             {1000000 * 60 * 120L, "120 min"}, | ||||
|     }; | ||||
|     return cr_make_param_array(struct format_duration_t, params, sizeof(params) / sizeof(struct format_duration_t)); | ||||
| } | ||||
|  | ||||
| ParameterizedTest(struct format_duration_t *param, utils, format_duration) { | ||||
|     char buf[16]; | ||||
|     cr_assert_str_eq(format_duration(param->micros, buf), param->exp); | ||||
| } | ||||
		Reference in New Issue
	
	Block a user