mirror of
https://github.com/cesanta/mongoose.git
synced 2024-12-27 15:01:03 +08:00
removed partial copyright - no relevant code. adopted CGI code to no post_data. Embedded mode is still todo. FALSE -> MG_FALSE.
This commit is contained in:
parent
a0d765a6f0
commit
d87cd36beb
346
mongoose.c
346
mongoose.c
@ -1,5 +1,4 @@
|
||||
// Copyright (c) 2004-2010 Sergey Lyubka
|
||||
// Portions Copyright (c) 2009 Gilbert Wellisch
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
// of this software and associated documentation files (the "Software"), to deal
|
||||
@ -210,11 +209,7 @@ typedef int SOCKET;
|
||||
typedef int socklen_t;
|
||||
#endif // NO_SOCKLEN_T
|
||||
|
||||
#if !defined(FALSE)
|
||||
enum {FALSE, TRUE};
|
||||
#endif /* !FALSE */
|
||||
|
||||
typedef int bool_t;
|
||||
typedef enum {MG_FALSE, MG_TRUE} bool_t;
|
||||
typedef void * (*mg_thread_func_t)(void *);
|
||||
|
||||
static const char *http_500_error = "Internal Server Error";
|
||||
@ -320,42 +315,42 @@ struct usa {
|
||||
// Describes a string (chunk of memory).
|
||||
struct vec {
|
||||
const char *ptr;
|
||||
size_t len;
|
||||
size_t len;
|
||||
};
|
||||
|
||||
// Structure used by mg_stat() function. Uses 64 bit file length.
|
||||
struct mgstat {
|
||||
bool_t is_directory; // Directory marker
|
||||
int64_t size; // File size
|
||||
time_t mtime; // Modification time
|
||||
bool_t is_directory; // Directory marker
|
||||
int64_t size; // File size
|
||||
time_t mtime; // Modification time
|
||||
};
|
||||
|
||||
// Describes listening socket, or socket which was accept()-ed by the master
|
||||
// thread and queued for future handling by the worker thread.
|
||||
struct socket {
|
||||
struct socket *next; // Linkage
|
||||
SOCKET sock; // Listening socket
|
||||
SOCKET sock; // Listening socket
|
||||
struct usa lsa; // Local socket address
|
||||
struct usa rsa; // Remote socket address
|
||||
bool_t is_ssl; // Is socket SSL-ed
|
||||
bool_t is_ssl; // Is socket SSL-ed
|
||||
};
|
||||
|
||||
struct mg_context {
|
||||
int stop_flag; // Should we stop event loop
|
||||
SSL_CTX *ssl_ctx; // SSL context
|
||||
int stop_flag; // Should we stop event loop
|
||||
SSL_CTX *ssl_ctx; // SSL context
|
||||
const struct mg_config *config; // Mongoose configuration
|
||||
|
||||
struct socket *listening_sockets;
|
||||
|
||||
int num_threads; // Number of threads
|
||||
int num_idle; // Number of idle threads
|
||||
int num_threads; // Number of threads
|
||||
int num_idle; // Number of idle threads
|
||||
|
||||
pthread_mutex_t mutex; // Protects (max|num)_threads
|
||||
pthread_cond_t thr_cond; // Condvar for thread sync
|
||||
|
||||
struct socket queue[20]; // Accepted sockets
|
||||
int sq_head; // Head of the socket queue
|
||||
int sq_tail; // Tail of the socket queue
|
||||
int sq_head; // Head of the socket queue
|
||||
int sq_tail; // Tail of the socket queue
|
||||
pthread_cond_t empty_cond; // Socket queue empty condvar
|
||||
pthread_cond_t full_cond; // Socket queue full condvar
|
||||
};
|
||||
@ -363,11 +358,15 @@ struct mg_context {
|
||||
struct mg_connection {
|
||||
struct mg_request_info request_info;
|
||||
struct mg_context *ctx;
|
||||
SSL *ssl; // SSL descriptor
|
||||
struct socket client; // Connected client
|
||||
time_t birth_time; // Time connection was accepted
|
||||
bool_t free_post_data; // post_data was malloc-ed
|
||||
int64_t num_bytes_sent; // Total bytes sent to client
|
||||
SSL *ssl; // SSL descriptor
|
||||
struct socket client; // Connected client
|
||||
time_t birth_time; // Time connection was accepted
|
||||
int64_t num_bytes_sent; // Total bytes sent to client
|
||||
int64_t content_len; // Content-Length header value
|
||||
int64_t consumed_content; // How many bytes of content is already read
|
||||
char buf[MAX_REQUEST_SIZE]; // Buffer for received data
|
||||
int request_len; // Size of the request + headers in a buffer
|
||||
int data_len; // Total size of data in a buffer
|
||||
};
|
||||
|
||||
// Print error message to the opened error log stream.
|
||||
@ -611,9 +610,9 @@ static bool_t match_extension(const char *path, const char *ext_list) {
|
||||
if (ext_vec.len < path_len &&
|
||||
mg_strncasecmp(path + path_len - ext_vec.len,
|
||||
ext_vec.ptr, ext_vec.len) == 0)
|
||||
return TRUE;
|
||||
return MG_TRUE;
|
||||
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
}
|
||||
#endif // !NO_CGI
|
||||
|
||||
@ -630,21 +629,19 @@ static void send_http_error(struct mg_connection *conn, int status,
|
||||
|
||||
error_handler = conn->ctx->config->http_error_handler;
|
||||
handled = error_handler ?
|
||||
error_handler(conn, &conn->request_info) : FALSE;
|
||||
error_handler(conn, &conn->request_info) : MG_ERROR;
|
||||
|
||||
if (handled == FALSE) {
|
||||
if (handled == MG_ERROR) {
|
||||
buf[0] = '\0';
|
||||
len = 0;
|
||||
|
||||
/* Errors 1xx, 204 and 304 MUST NOT send a body */
|
||||
if (status > 199 && status != 204 && status != 304) {
|
||||
len = mg_snprintf(conn, buf, sizeof(buf),
|
||||
"Error %d: %s\n", status, reason);
|
||||
len = mg_snprintf(conn, buf, sizeof(buf), "Error %d: %s", status, reason);
|
||||
cry(conn, "%s", buf);
|
||||
|
||||
va_start(ap, fmt);
|
||||
len += mg_vsnprintf(conn, buf + len, sizeof(buf) - len,
|
||||
fmt, ap);
|
||||
len += mg_vsnprintf(conn, buf + len, sizeof(buf) - len, fmt, ap);
|
||||
va_end(ap);
|
||||
conn->num_bytes_sent = len;
|
||||
}
|
||||
@ -661,7 +658,7 @@ static void send_http_error(struct mg_connection *conn, int status,
|
||||
#ifdef _WIN32
|
||||
static int pthread_mutex_init(pthread_mutex_t *mutex, void *unused) {
|
||||
unused = NULL;
|
||||
*mutex = CreateMutex(NULL, FALSE, NULL);
|
||||
*mutex = CreateMutex(NULL, MG_FALSE, NULL);
|
||||
return *mutex == NULL ? -1 : 0;
|
||||
}
|
||||
|
||||
@ -679,7 +676,7 @@ static int pthread_mutex_unlock(pthread_mutex_t *mutex) {
|
||||
|
||||
static int pthread_cond_init(pthread_cond_t *cv, const void *unused) {
|
||||
unused = NULL;
|
||||
*cv = CreateEvent(NULL, FALSE, FALSE, NULL);
|
||||
*cv = CreateEvent(NULL, MG_FALSE, MG_FALSE, NULL);
|
||||
return *cv == NULL ? -1 : 0;
|
||||
}
|
||||
|
||||
@ -1011,9 +1008,9 @@ static pid_t spawn_process(struct mg_connection *conn, const char *prog,
|
||||
|
||||
me = GetCurrentProcess();
|
||||
(void) DuplicateHandle(me, (HANDLE) _get_osfhandle(fd_stdin), me,
|
||||
&si.hStdInput, 0, TRUE, DUPLICATE_SAME_ACCESS);
|
||||
&si.hStdInput, 0, MG_TRUE, DUPLICATE_SAME_ACCESS);
|
||||
(void) DuplicateHandle(me, (HANDLE) _get_osfhandle(fd_stdout), me,
|
||||
&si.hStdOutput, 0, TRUE, DUPLICATE_SAME_ACCESS);
|
||||
&si.hStdOutput, 0, MG_TRUE, DUPLICATE_SAME_ACCESS);
|
||||
|
||||
// If CGI file is a script, try to read the interpreter line
|
||||
interp = conn->ctx->options[OPT_CGI_INTERPRETER];
|
||||
@ -1046,7 +1043,7 @@ static pid_t spawn_process(struct mg_connection *conn, const char *prog,
|
||||
change_slashes_to_backslashes(line);
|
||||
|
||||
DEBUG_TRACE((DEBUG_MGS_PREFIX "%s: Running [%s]", __func__, cmdline));
|
||||
if (CreateProcessA(NULL, cmdline, NULL, NULL, TRUE,
|
||||
if (CreateProcessA(NULL, cmdline, NULL, NULL, MG_TRUE,
|
||||
CREATE_NEW_PROCESS_GROUP, envblk, line, &si, &pi) == 0) {
|
||||
cry(conn, "%s: CreateProcess(%s): %d",
|
||||
__func__, cmdline, ERRNO);
|
||||
@ -1214,6 +1211,10 @@ static int pull(FILE *fp, SOCKET sock, SSL *ssl, char *buf, int len) {
|
||||
return nread;
|
||||
}
|
||||
|
||||
int mg_read(struct mg_connection *conn, void *buf, size_t len) {
|
||||
return pull(NULL, conn->client.sock, conn->ssl, (char *) buf, (int) len);
|
||||
}
|
||||
|
||||
int mg_write(struct mg_connection *conn, const void *buf, size_t len) {
|
||||
return (int) push(NULL, conn->client.sock, conn->ssl,
|
||||
(const char *) buf, (int64_t) len);
|
||||
@ -1231,13 +1232,6 @@ int mg_printf(struct mg_connection *conn, const char *fmt, ...) {
|
||||
return mg_write(conn, buf, len);
|
||||
}
|
||||
|
||||
// Return content length of the request, or -1 constant if
|
||||
// Content-Length header is not set.
|
||||
static int64_t get_content_length(const struct mg_connection *conn) {
|
||||
const char *cl = mg_get_header(conn, "Content-Length");
|
||||
return cl == NULL ? -1 : strtoll(cl, NULL, 10);
|
||||
}
|
||||
|
||||
// URL-decode input buffer into destination buffer.
|
||||
// 0-terminate the destination buffer. Return the length of decoded data.
|
||||
// form-url-encoded data differs from URI encoding in a way that it
|
||||
@ -1306,7 +1300,7 @@ enum mg_error_t mg_get_var(const char *buf, size_t buf_len,
|
||||
if (len >= var_value_len) {
|
||||
ret_val = MG_BUFFER_TOO_SMALL;
|
||||
} else {
|
||||
url_decode(p, len, var_value, len + 1, TRUE);
|
||||
url_decode(p, len, var_value, len + 1, MG_TRUE);
|
||||
ret_val = MG_SUCCESS;
|
||||
}
|
||||
break;
|
||||
@ -1445,7 +1439,7 @@ static SOCKET mg_open_listening_port(struct mg_context *ctx, const char *str,
|
||||
// -1 if request is malformed
|
||||
// 0 if request is not yet fully buffered
|
||||
// >0 actual request length, including last \r\n\r\n
|
||||
static int get_request_len(const char *buf, size_t buflen) {
|
||||
static int get_request_len(const char *buf, int buflen) {
|
||||
const char *s, *e;
|
||||
int len = 0;
|
||||
|
||||
@ -1855,7 +1849,7 @@ static bool_t check_password(const char *method, const char *ha1,
|
||||
strlen(response) != 32
|
||||
// || now - strtoul(dig->nonce, NULL, 10) > 3600
|
||||
) {
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
}
|
||||
|
||||
mg_md5(ha2, method, ":", uri, NULL);
|
||||
@ -1909,7 +1903,7 @@ static bool_t parse_auth_header(struct mg_connection *conn, char *buf,
|
||||
|
||||
if ((auth_header = mg_get_header(conn, "Authorization")) == NULL ||
|
||||
mg_strncasecmp(auth_header, "Digest ", 7) != 0) {
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
}
|
||||
|
||||
// Make modifiable copy of the auth header
|
||||
@ -1963,7 +1957,7 @@ static bool_t parse_auth_header(struct mg_connection *conn, char *buf,
|
||||
conn->request_info.remote_user = mg_strdup(ah->user);
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
return MG_TRUE;
|
||||
}
|
||||
|
||||
// Authorize against the opened passwords file. Return 1 if authorized.
|
||||
@ -1972,7 +1966,7 @@ static bool_t authorize(struct mg_connection *conn, FILE *fp) {
|
||||
char line[256], f_user[256], ha1[256], f_domain[256], buf[MAX_REQUEST_SIZE];
|
||||
|
||||
if (!parse_auth_header(conn, buf, sizeof(buf), &ah)) {
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
}
|
||||
|
||||
// Loop over passwords file
|
||||
@ -1989,10 +1983,10 @@ static bool_t authorize(struct mg_connection *conn, FILE *fp) {
|
||||
ah.response);
|
||||
}
|
||||
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
}
|
||||
|
||||
// Return TRUE if request is authorised, FALSE otherwise.
|
||||
// Return MG_TRUE if request is authorised, MG_FALSE otherwise.
|
||||
static bool_t check_authorization(struct mg_connection *conn,
|
||||
const char *path) {
|
||||
FILE *fp;
|
||||
@ -2002,7 +1996,7 @@ static bool_t check_authorization(struct mg_connection *conn,
|
||||
bool_t authorized;
|
||||
|
||||
fp = NULL;
|
||||
authorized = TRUE;
|
||||
authorized = MG_TRUE;
|
||||
|
||||
list = conn->ctx->config->protect;
|
||||
while ((list = next_option(list, &uri_vec, &filename_vec)) != NULL) {
|
||||
@ -2040,7 +2034,7 @@ static void send_authorization_request(struct mg_connection *conn) {
|
||||
|
||||
static bool_t is_authorized_for_put(struct mg_connection *conn) {
|
||||
FILE *fp;
|
||||
int ret = FALSE;
|
||||
int ret = MG_FALSE;
|
||||
|
||||
fp = conn->ctx->config->put_delete_passwords_file == NULL ? NULL :
|
||||
mg_fopen(conn->ctx->config->put_delete_passwords_file, "r");
|
||||
@ -2408,7 +2402,7 @@ static bool_t is_valid_http_method(const char *method) {
|
||||
|
||||
// Parse HTTP request, fill in mg_request_info structure.
|
||||
static bool_t parse_http_request(char *buf, struct mg_request_info *ri) {
|
||||
int status = FALSE;
|
||||
int status = MG_FALSE;
|
||||
|
||||
ri->request_method = skip(&buf, " ");
|
||||
ri->uri = skip(&buf, " ");
|
||||
@ -2416,10 +2410,12 @@ static bool_t parse_http_request(char *buf, struct mg_request_info *ri) {
|
||||
|
||||
if (is_valid_http_method(ri->request_method) &&
|
||||
ri->uri[0] == '/' &&
|
||||
strncmp(ri->http_version, "HTTP/", 5) == 0) {
|
||||
strncmp(ri->http_version, "HTTP/", 5) == 0 &&
|
||||
(strcmp(ri->http_version + 5, "1.0") == 0 ||
|
||||
strcmp(ri->http_version + 5, "1.1") == 0)) {
|
||||
ri->http_version += 5; /* Skip "HTTP/" */
|
||||
parse_http_headers(&buf, ri);
|
||||
status = TRUE;
|
||||
status = MG_TRUE;
|
||||
}
|
||||
|
||||
return status;
|
||||
@ -2441,7 +2437,7 @@ static int read_request(FILE *fp, SOCKET sock, SSL *ssl, char *buf, int bufsiz,
|
||||
break;
|
||||
} else {
|
||||
*nread += n;
|
||||
request_len = get_request_len(buf, (size_t) *nread);
|
||||
request_len = get_request_len(buf, *nread);
|
||||
}
|
||||
}
|
||||
|
||||
@ -2472,7 +2468,7 @@ static bool_t substitute_index_file(struct mg_connection *conn, char *path,
|
||||
// Traverse index files list. For each entry, append it to the given
|
||||
// path and see if the file exists. If it exists, break the loop
|
||||
list = conn->ctx->config->index_files;
|
||||
found = FALSE;
|
||||
found = MG_FALSE;
|
||||
|
||||
while ((list = next_option(list, &filename_vec, NULL)) != NULL) {
|
||||
|
||||
@ -2487,13 +2483,13 @@ static bool_t substitute_index_file(struct mg_connection *conn, char *path,
|
||||
if (mg_stat(path, &st) == 0) {
|
||||
// Yes it does, break the loop
|
||||
*stp = st;
|
||||
found = TRUE;
|
||||
found = MG_TRUE;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
// If no index file exists, restore directory path
|
||||
if (found == FALSE) {
|
||||
if (found == MG_FALSE) {
|
||||
path[n] = '\0';
|
||||
}
|
||||
|
||||
@ -2507,94 +2503,64 @@ static bool_t is_not_modified(const struct mg_connection *conn,
|
||||
return ims != NULL && stp->mtime <= parse_date_string(ims);
|
||||
}
|
||||
|
||||
static bool_t append_chunk(struct mg_request_info *ri, FILE *fp,
|
||||
const char *buf, int len) {
|
||||
bool_t ret_code = TRUE;
|
||||
|
||||
if (fp == NULL) {
|
||||
// TODO: check for NULL here
|
||||
ri->post_data = (char *) realloc(ri->post_data,
|
||||
ri->post_data_len + len);
|
||||
(void) memcpy(ri->post_data + ri->post_data_len, buf, len);
|
||||
ri->post_data_len += len;
|
||||
} else if (push(fp, INVALID_SOCKET, NULL, buf, (int64_t) len) !=
|
||||
(int64_t) len) {
|
||||
ret_code = FALSE;
|
||||
}
|
||||
|
||||
return ret_code;
|
||||
}
|
||||
|
||||
static bool_t handle_request_body(struct mg_connection *conn, FILE *fp) {
|
||||
struct mg_request_info *ri = &conn->request_info;
|
||||
const char *expect, *tmp;
|
||||
int64_t content_len;
|
||||
const char *expect, *data;
|
||||
char buf[BUFSIZ];
|
||||
int to_read, nread, already_read;
|
||||
bool_t success_code = FALSE;
|
||||
int to_read, nread, data_len;
|
||||
bool_t status = MG_FALSE;
|
||||
|
||||
content_len = get_content_length(conn);
|
||||
expect = mg_get_header(conn, "Expect");
|
||||
|
||||
if (content_len == -1) {
|
||||
if (conn->content_len == -1) {
|
||||
send_http_error(conn, 411, "Length Required", "");
|
||||
} else if (expect != NULL && mg_strcasecmp(expect, "100-continue")) {
|
||||
send_http_error(conn, 417, "Expectation Failed", "");
|
||||
} else {
|
||||
if (expect != NULL) {
|
||||
(void) mg_printf(conn, "HTTP/1.1 100 Continue\r\n\r\n");
|
||||
(void) mg_printf(conn, "%s", "HTTP/1.1 100 Continue\r\n\r\n");
|
||||
}
|
||||
data = conn->buf + conn->request_len;
|
||||
data_len = conn->data_len - conn->request_len;
|
||||
assert(data_len >= 0);
|
||||
|
||||
already_read = ri->post_data_len;
|
||||
assert(already_read >= 0);
|
||||
|
||||
if (content_len <= (int64_t) already_read) {
|
||||
if (conn->content_len <= (int64_t) data_len) {
|
||||
#if 0
|
||||
ri->post_data_len = (int) content_len;
|
||||
#endif
|
||||
// If fp is NULL, this is embedded mode, and we do not
|
||||
// have to do anything: POST data is already there,
|
||||
// no need to allocate a buffer and copy it in.
|
||||
// If fp != NULL, we need to write the data.
|
||||
success_code = fp == NULL || (push(fp, INVALID_SOCKET,
|
||||
NULL, ri->post_data, content_len) == content_len) ?
|
||||
TRUE : FALSE;
|
||||
status = fp == NULL || (push(fp, INVALID_SOCKET, NULL, data,
|
||||
conn->content_len) == conn->content_len) ? MG_TRUE : MG_FALSE;
|
||||
} else {
|
||||
push(fp, INVALID_SOCKET, NULL, data, (int64_t) data_len);
|
||||
conn->consumed_content += data_len;
|
||||
|
||||
if (fp == NULL) {
|
||||
conn->free_post_data = TRUE;
|
||||
tmp = ri->post_data;
|
||||
/* +1 in case if already_read == 0 */
|
||||
ri->post_data = (char*)malloc(already_read + 1);
|
||||
(void) memcpy(ri->post_data, tmp, already_read);
|
||||
} else {
|
||||
(void) push(fp, INVALID_SOCKET, NULL,
|
||||
ri->post_data, (int64_t) already_read);
|
||||
}
|
||||
|
||||
content_len -= already_read;
|
||||
|
||||
while (content_len > 0) {
|
||||
while (conn->consumed_content < conn->content_len) {
|
||||
to_read = sizeof(buf);
|
||||
if ((int64_t) to_read > content_len)
|
||||
to_read = (int) content_len;
|
||||
nread = pull(NULL, conn->client.sock,
|
||||
conn->ssl, buf, to_read);
|
||||
if (nread <= 0)
|
||||
if ((int64_t) to_read > conn->content_len - conn->consumed_content) {
|
||||
to_read = (int) (conn->content_len - conn->consumed_content);
|
||||
}
|
||||
nread = pull(NULL, conn->client.sock, conn->ssl, buf, to_read);
|
||||
if (nread <= 0 || push(fp, INVALID_SOCKET, NULL, buf, nread) != nread) {
|
||||
break;
|
||||
if (!append_chunk(ri, fp, buf, nread))
|
||||
break;
|
||||
content_len -= nread;
|
||||
}
|
||||
conn->consumed_content += nread;
|
||||
}
|
||||
if (conn->consumed_content == conn->content_len) {
|
||||
status = MG_TRUE;
|
||||
}
|
||||
success_code = content_len == 0 ? TRUE : FALSE;
|
||||
}
|
||||
|
||||
// Each error code path in this function must send an error
|
||||
if (success_code != TRUE) {
|
||||
if (status != MG_TRUE) {
|
||||
send_http_error(conn, 577, http_500_error,
|
||||
"%s", "Error handling body data");
|
||||
}
|
||||
}
|
||||
|
||||
return success_code;
|
||||
return status;
|
||||
}
|
||||
|
||||
#if !defined(NO_CGI)
|
||||
@ -2833,7 +2799,7 @@ static void handle_cgi_request(struct mg_connection *conn, const char *prog) {
|
||||
|
||||
done:
|
||||
if (pid != (pid_t) -1) {
|
||||
kill(pid, SIGTERM);
|
||||
kill(pid, SIGKILL);
|
||||
}
|
||||
if (fd_stdin[0] != -1) {
|
||||
(void) close(fd_stdin[0]);
|
||||
@ -2991,12 +2957,12 @@ static void send_ssi_file(struct mg_connection *conn, const char *path,
|
||||
return;
|
||||
}
|
||||
|
||||
in_ssi_tag = FALSE;
|
||||
in_ssi_tag = MG_FALSE;
|
||||
len = 0;
|
||||
|
||||
while ((ch = fgetc(fp)) != EOF) {
|
||||
if (in_ssi_tag && ch == '>') {
|
||||
in_ssi_tag = FALSE;
|
||||
in_ssi_tag = MG_FALSE;
|
||||
buf[len++] = (char) ch;
|
||||
buf[len] = '\0';
|
||||
assert(len <= (int) sizeof(buf));
|
||||
@ -3016,14 +2982,14 @@ static void send_ssi_file(struct mg_connection *conn, const char *path,
|
||||
} else if (in_ssi_tag) {
|
||||
if (len == 5 && memcmp(buf, "<!--#", 5) != 0) {
|
||||
// Not an SSI tag
|
||||
in_ssi_tag = FALSE;
|
||||
in_ssi_tag = MG_FALSE;
|
||||
} else if (len == (int) sizeof(buf) - 2) {
|
||||
cry(conn, "%s: SSI tag is too large", path);
|
||||
len = 0;
|
||||
}
|
||||
buf[len++] = ch & 0xff;
|
||||
} else if (ch == '<') {
|
||||
in_ssi_tag = TRUE;
|
||||
in_ssi_tag = MG_TRUE;
|
||||
if (len > 0) {
|
||||
(void) mg_write(conn, buf, len);
|
||||
}
|
||||
@ -3077,11 +3043,12 @@ static void handle_request(struct mg_connection *conn) {
|
||||
}
|
||||
uri_len = strlen(ri->uri);
|
||||
new_request_callback = conn->ctx->config->new_request_handler;
|
||||
(void) url_decode(ri->uri, uri_len, ri->uri, uri_len + 1, FALSE);
|
||||
(void) url_decode(ri->uri, uri_len, ri->uri, uri_len + 1, MG_FALSE);
|
||||
remove_double_dots_and_double_slashes(ri->uri);
|
||||
convert_uri_to_file_name(conn, ri->uri, path, sizeof(path));
|
||||
|
||||
if (new_request_callback && new_request_callback(conn, ri) == TRUE) {
|
||||
DEBUG_TRACE((DEBUG_MGS_PREFIX "%s: %s", __func__, ri->uri));
|
||||
if (new_request_callback && new_request_callback(conn, ri) == MG_TRUE) {
|
||||
// Do nothing, callback has served the request
|
||||
} else if (!check_authorization(conn, path)) {
|
||||
send_authorization_request(conn);
|
||||
@ -3111,7 +3078,7 @@ static void handle_request(struct mg_connection *conn) {
|
||||
"HTTP/1.1 301 Moved Permanently\r\n"
|
||||
"Location: %s/\r\n\r\n", ri->uri);
|
||||
} else if (st.is_directory &&
|
||||
substitute_index_file(conn, path, sizeof(path), &st) == FALSE) {
|
||||
substitute_index_file(conn, path, sizeof(path), &st) == MG_FALSE) {
|
||||
if (conn->ctx->config->enable_directory_listing) {
|
||||
handle_directory_request(conn, path);
|
||||
} else {
|
||||
@ -3155,7 +3122,7 @@ static enum mg_error_t set_ports_option(struct mg_context *ctx) {
|
||||
const char *list = ctx->config->listening_ports;
|
||||
|
||||
while ((list = next_option(list, &vec, NULL)) != NULL) {
|
||||
is_ssl = vec.ptr[vec.len - 1] == 's' ? TRUE : FALSE;
|
||||
is_ssl = vec.ptr[vec.len - 1] == 's' ? MG_TRUE : MG_FALSE;
|
||||
|
||||
if ((listener = calloc(1, sizeof(*listener))) == NULL) {
|
||||
cry(fc(ctx), "%s", "Too many listeninig sockets");
|
||||
@ -3164,7 +3131,7 @@ static enum mg_error_t set_ports_option(struct mg_context *ctx) {
|
||||
vec.ptr, &listener->lsa)) == INVALID_SOCKET) {
|
||||
cry(fc(ctx), "cannot bind to %.*s", vec.len, vec.ptr);
|
||||
return MG_ERROR;
|
||||
} else if (is_ssl == TRUE && ctx->ssl_ctx == NULL) {
|
||||
} else if (is_ssl == MG_TRUE && ctx->ssl_ctx == NULL) {
|
||||
(void) closesocket(sock);
|
||||
cry(fc(ctx), "cannot add SSL socket, please specify "
|
||||
"-ssl_cert option BEFORE -ports option");
|
||||
@ -3228,7 +3195,7 @@ static void log_access(const struct mg_connection *conn) {
|
||||
}
|
||||
|
||||
static bool_t isbyte(int n) {
|
||||
return n >= 0 && n <= 255 ? TRUE : FALSE;
|
||||
return n >= 0 && n <= 255 ? MG_TRUE : MG_FALSE;
|
||||
}
|
||||
|
||||
// Verify given socket address against the ACL.
|
||||
@ -3338,7 +3305,7 @@ static bool_t load_dll(struct mg_context *ctx, const char *dll_name,
|
||||
|
||||
if ((dll_handle = dlopen(dll_name, RTLD_LAZY)) == NULL) {
|
||||
cry(fc(ctx), "%s: cannot load %s", __func__, dll_name);
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
}
|
||||
|
||||
for (fp = sw; fp->name != NULL; fp++) {
|
||||
@ -3352,13 +3319,13 @@ static bool_t load_dll(struct mg_context *ctx, const char *dll_name,
|
||||
#endif /* _WIN32 */
|
||||
if (u.fp == NULL) {
|
||||
cry(fc(ctx), "%s: cannot find %s", __func__, fp->name);
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
} else {
|
||||
fp->ptr = u.fp;
|
||||
}
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
return MG_TRUE;
|
||||
}
|
||||
|
||||
// Dynamically load SSL library. Set up ctx->ssl_ctx pointer.
|
||||
@ -3371,8 +3338,8 @@ static enum mg_error_t set_ssl_option(struct mg_context *ctx) {
|
||||
return MG_SUCCESS;
|
||||
}
|
||||
|
||||
if (load_dll(ctx, SSL_LIB, ssl_sw) == FALSE ||
|
||||
load_dll(ctx, CRYPTO_LIB, crypto_sw) == FALSE) {
|
||||
if (load_dll(ctx, SSL_LIB, ssl_sw) == MG_FALSE ||
|
||||
load_dll(ctx, CRYPTO_LIB, crypto_sw) == MG_FALSE) {
|
||||
return MG_ERROR;
|
||||
}
|
||||
|
||||
@ -3421,7 +3388,6 @@ static enum mg_error_t set_ssl_option(struct mg_context *ctx) {
|
||||
static enum mg_error_t set_gpass_option(struct mg_context *ctx) {
|
||||
struct mgstat mgstat;
|
||||
const char *path = ctx->config->global_passwords_file;
|
||||
|
||||
return path == NULL || mg_stat(path, &mgstat) == 0 ? MG_SUCCESS : MG_ERROR;
|
||||
}
|
||||
|
||||
@ -3442,9 +3408,9 @@ static bool_t verify_document_root(struct mg_context *ctx, const char *root) {
|
||||
|
||||
if (mg_stat(path, &buf) != 0) {
|
||||
cry(fc(ctx), "Invalid root directory: \"%s\"", root);
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
}
|
||||
return TRUE;
|
||||
return MG_TRUE;
|
||||
}
|
||||
|
||||
static void reset_per_request_attributes(struct mg_connection *conn) {
|
||||
@ -3452,10 +3418,11 @@ static void reset_per_request_attributes(struct mg_connection *conn) {
|
||||
free((void *) conn->request_info.remote_user);
|
||||
conn->request_info.remote_user = NULL;
|
||||
}
|
||||
if (conn->free_post_data && conn->request_info.post_data != NULL) {
|
||||
free((void *) conn->request_info.post_data);
|
||||
conn->request_info.post_data = NULL;
|
||||
}
|
||||
conn->request_info.status_code = -1;
|
||||
conn->num_bytes_sent = 0;
|
||||
conn->content_len = -1;
|
||||
conn->consumed_content = 0;
|
||||
conn->request_len = conn->data_len = 0;
|
||||
}
|
||||
|
||||
static void close_socket_gracefully(SOCKET sock) {
|
||||
@ -3492,75 +3459,56 @@ static void close_connection(struct mg_connection *conn) {
|
||||
}
|
||||
}
|
||||
|
||||
static void reset_connection_attributes(struct mg_connection *conn) {
|
||||
reset_per_request_attributes(conn);
|
||||
conn->free_post_data = FALSE;
|
||||
conn->request_info.status_code = -1;
|
||||
conn->num_bytes_sent = 0;
|
||||
(void) memset(&conn->request_info, 0, sizeof(conn->request_info));
|
||||
}
|
||||
|
||||
static void shift_to_next(struct mg_connection *conn, char *buf, int req_len,
|
||||
int *nread) {
|
||||
int64_t cl;
|
||||
static void discard_current_request_from_buffer(struct mg_connection *conn) {
|
||||
int over_len, body_len;
|
||||
|
||||
cl = get_content_length(conn);
|
||||
over_len = *nread - req_len;
|
||||
over_len = conn->data_len - conn->request_len;
|
||||
assert(over_len >= 0);
|
||||
|
||||
if (cl == -1) {
|
||||
if (conn->content_len == -1) {
|
||||
body_len = 0;
|
||||
} else if (cl < (int64_t) over_len) {
|
||||
body_len = (int) cl;
|
||||
} else if (conn->content_len < (int64_t) over_len) {
|
||||
body_len = (int) conn->content_len;
|
||||
} else {
|
||||
body_len = over_len;
|
||||
}
|
||||
|
||||
*nread -= req_len + body_len;
|
||||
(void) memmove(buf, buf + req_len + body_len, *nread);
|
||||
conn->data_len -= conn->request_len + body_len;
|
||||
memmove(conn->buf, conn->buf + conn->request_len + body_len, conn->data_len);
|
||||
}
|
||||
|
||||
static void process_new_connection(struct mg_connection *conn) {
|
||||
struct mg_request_info *ri = &conn->request_info;
|
||||
char buf[MAX_REQUEST_SIZE];
|
||||
int request_len, nread;
|
||||
const char *cl;
|
||||
|
||||
nread = 0;
|
||||
reset_connection_attributes(conn);
|
||||
// TODO(lsm): do not clear everything, since it deletes IP address
|
||||
// info set up by worker_thread().
|
||||
(void) memset(&conn->request_info, 0, sizeof(conn->request_info));
|
||||
reset_per_request_attributes(conn);
|
||||
|
||||
// If next request is not pipelined, read it in
|
||||
if ((request_len = get_request_len(buf, (size_t) nread)) == 0)
|
||||
request_len = read_request(NULL, conn->client.sock,
|
||||
conn->ssl, buf, sizeof(buf), &nread);
|
||||
assert(nread >= request_len);
|
||||
|
||||
if (request_len <= 0) {
|
||||
if ((conn->request_len = get_request_len(conn->buf, conn->data_len)) == 0) {
|
||||
conn->request_len = read_request(NULL, conn->client.sock, conn->ssl,
|
||||
conn->buf, sizeof(conn->buf), &conn->data_len);
|
||||
}
|
||||
assert(conn->data_len >= conn->request_len);
|
||||
if (conn->request_len <= 0) {
|
||||
return; // Remote end closed the connection
|
||||
}
|
||||
|
||||
// 0-terminate the request: parse_request uses sscanf
|
||||
buf[request_len - 1] = '\0';
|
||||
|
||||
if (parse_http_request(buf, ri)) {
|
||||
if (strcmp(ri->http_version, "1.0") != 0 &&
|
||||
strcmp(ri->http_version, "1.1") != 0) {
|
||||
send_http_error(conn, 505,
|
||||
"HTTP version not supported",
|
||||
"%s", "Weird HTTP version");
|
||||
log_access(conn);
|
||||
} else {
|
||||
ri->post_data = buf + request_len;
|
||||
ri->post_data_len = nread - request_len;
|
||||
conn->birth_time = time(NULL);
|
||||
handle_request(conn);
|
||||
log_access(conn);
|
||||
shift_to_next(conn, buf, request_len, &nread);
|
||||
}
|
||||
// Nul-terminate the request cause parse_http_request() uses sscanf
|
||||
conn->buf[conn->request_len - 1] = '\0';
|
||||
if (parse_http_request(conn->buf, ri)) {
|
||||
cl = get_header(ri, "Content-Length");
|
||||
conn->content_len = cl == NULL ? -1 : strtoll(cl, NULL, 10);
|
||||
conn->birth_time = time(NULL);
|
||||
handle_request(conn);
|
||||
log_access(conn);
|
||||
discard_current_request_from_buffer(conn);
|
||||
} else {
|
||||
// Do not put garbage in the access log
|
||||
// Do not put garbage in the access log, just send it back to the client
|
||||
send_http_error(conn, 400, "Bad Request",
|
||||
"Can not parse request: [%.*s]", nread, buf);
|
||||
"Can not parse request: [%.*s]", conn->data_len, conn->buf);
|
||||
}
|
||||
}
|
||||
|
||||
@ -3580,7 +3528,7 @@ static bool_t get_socket(struct mg_context *ctx, struct socket *sp) {
|
||||
if (pthread_cond_timedwait(&ctx->empty_cond, &ctx->mutex, &ts) != 0) {
|
||||
// Timeout! release the mutex and return
|
||||
(void) pthread_mutex_unlock(&ctx->mutex);
|
||||
return FALSE;
|
||||
return MG_FALSE;
|
||||
}
|
||||
}
|
||||
assert(ctx->sq_head > ctx->sq_tail);
|
||||
@ -3604,7 +3552,7 @@ static bool_t get_socket(struct mg_context *ctx, struct socket *sp) {
|
||||
(void) pthread_cond_signal(&ctx->full_cond);
|
||||
(void) pthread_mutex_unlock(&ctx->mutex);
|
||||
|
||||
return TRUE;
|
||||
return MG_TRUE;
|
||||
}
|
||||
|
||||
static void worker_thread(struct mg_context *ctx) {
|
||||
@ -3615,19 +3563,17 @@ static void worker_thread(struct mg_context *ctx) {
|
||||
|
||||
(void) memset(&conn, 0, sizeof(conn));
|
||||
|
||||
while (ctx->stop_flag == 0 && get_socket(ctx, &conn.client) == TRUE) {
|
||||
while (ctx->stop_flag == 0 && get_socket(ctx, &conn.client) == MG_TRUE) {
|
||||
conn.birth_time = time(NULL);
|
||||
conn.ctx = ctx;
|
||||
|
||||
// Fill in IP, port info early so even if SSL setup below fails,
|
||||
// error handler would have the corresponding info.
|
||||
// Thanks to Johannes Winkelmann for the patch.
|
||||
conn.request_info.remote_port =
|
||||
ntohs(conn.client.rsa.u.sin.sin_port);
|
||||
conn.request_info.remote_port = ntohs(conn.client.rsa.u.sin.sin_port);
|
||||
(void) memcpy(&conn.request_info.remote_ip,
|
||||
&conn.client.rsa.u.sin.sin_addr.s_addr, 4);
|
||||
conn.request_info.remote_ip =
|
||||
ntohl(conn.request_info.remote_ip);
|
||||
conn.request_info.remote_ip = ntohl(conn.request_info.remote_ip);
|
||||
conn.request_info.is_ssl = conn.client.is_ssl;
|
||||
|
||||
if (conn.client.is_ssl && (conn.ssl = SSL_new(conn.ctx->ssl_ctx)) == NULL) {
|
||||
@ -3698,7 +3644,7 @@ static void accept_new_connection(const struct socket *listener,
|
||||
|
||||
allowed = check_acl(ctx, &accepted.rsa) == MG_SUCCESS;
|
||||
|
||||
if (allowed == TRUE) {
|
||||
if (allowed == MG_SUCCESS) {
|
||||
// Put accepted socket structure into the queue
|
||||
DEBUG_TRACE((DEBUG_MGS_PREFIX "%s: accepted socket %d",
|
||||
__func__, accepted.sock));
|
||||
@ -3791,6 +3737,7 @@ struct mg_context * mg_start(struct mg_config *config) {
|
||||
WSAStartup(MAKEWORD(2,2), &data);
|
||||
#endif // _WIN32
|
||||
|
||||
// TODO(lsm): make a copy of the config
|
||||
fake_ctx.config = config;
|
||||
|
||||
if (config->listening_ports == NULL ||
|
||||
@ -3800,9 +3747,8 @@ struct mg_context * mg_start(struct mg_config *config) {
|
||||
"num_threads, listening_ports, auth_domain");
|
||||
return NULL;
|
||||
} else if (config->document_root != NULL &&
|
||||
verify_document_root(&fake_ctx, config->document_root) != TRUE) {
|
||||
cry(fc(&fake_ctx), "Invalid root directory: \"%s\"",
|
||||
config->document_root);
|
||||
verify_document_root(&fake_ctx, config->document_root) != MG_TRUE) {
|
||||
cry(fc(&fake_ctx), "Invalid root directory: \"%s\"", config->document_root);
|
||||
return NULL;
|
||||
} else if ((ctx = calloc(1, sizeof(*ctx))) == NULL) {
|
||||
cry(fc(&fake_ctx), "Cannot allocate mongoose context");
|
||||
|
Loading…
x
Reference in New Issue
Block a user