diff options
Diffstat (limited to 'networking/httpd.c')
-rw-r--r-- | networking/httpd.c | 1970 |
1 files changed, 1970 insertions, 0 deletions
diff --git a/networking/httpd.c b/networking/httpd.c new file mode 100644 index 000000000..49c2c76be --- /dev/null +++ b/networking/httpd.c | |||
@@ -0,0 +1,1970 @@ | |||
1 | /* vi: set sw=4 ts=4: */ | ||
2 | /* | ||
3 | * httpd implementation for busybox | ||
4 | * | ||
5 | * Copyright (C) 2002,2003 Glenn Engel <glenne@engel.org> | ||
6 | * Copyright (C) 2003-2006 Vladimir Oleynik <dzo@simtreas.ru> | ||
7 | * | ||
8 | * simplify patch stolen from libbb without using strdup | ||
9 | * | ||
10 | * Licensed under GPLv2 or later, see file LICENSE in this tarball for details. | ||
11 | * | ||
12 | ***************************************************************************** | ||
13 | * | ||
14 | * Typical usage: | ||
15 | * for non root user | ||
16 | * httpd -p 8080 -h $HOME/public_html | ||
17 | * or for daemon start from rc script with uid=0: | ||
18 | * httpd -u www | ||
19 | * This is equivalent if www user have uid=80 to | ||
20 | * httpd -p 80 -u 80 -h /www -c /etc/httpd.conf -r "Web Server Authentication" | ||
21 | * | ||
22 | * | ||
23 | * When a url contains "cgi-bin" it is assumed to be a cgi script. The | ||
24 | * server changes directory to the location of the script and executes it | ||
25 | * after setting QUERY_STRING and other environment variables. | ||
26 | * | ||
27 | * Doc: | ||
28 | * "CGI Environment Variables": http://hoohoo.ncsa.uiuc.edu/cgi/env.html | ||
29 | * | ||
30 | * The server can also be invoked as a url arg decoder and html text encoder | ||
31 | * as follows: | ||
32 | * foo=`httpd -d $foo` # decode "Hello%20World" as "Hello World" | ||
33 | * bar=`httpd -e "<Hello World>"` # encode as "<Hello World>" | ||
34 | * Note that url encoding for arguments is not the same as html encoding for | ||
35 | * presentation. -d decodes a url-encoded argument while -e encodes in html | ||
36 | * for page display. | ||
37 | * | ||
38 | * httpd.conf has the following format: | ||
39 | * | ||
40 | * A:172.20. # Allow address from 172.20.0.0/16 | ||
41 | * A:10.0.0.0/25 # Allow any address from 10.0.0.0-10.0.0.127 | ||
42 | * A:10.0.0.0/255.255.255.128 # Allow any address that previous set | ||
43 | * A:127.0.0.1 # Allow local loopback connections | ||
44 | * D:* # Deny from other IP connections | ||
45 | * /cgi-bin:foo:bar # Require user foo, pwd bar on urls starting with /cgi-bin/ | ||
46 | * /adm:admin:setup # Require user admin, pwd setup on urls starting with /adm/ | ||
47 | * /adm:toor:PaSsWd # or user toor, pwd PaSsWd on urls starting with /adm/ | ||
48 | * .au:audio/basic # additional mime type for audio.au files | ||
49 | * *.php:/path/php # running cgi.php scripts through an interpreter | ||
50 | * | ||
51 | * A/D may be as a/d or allow/deny - first char case insensitive | ||
52 | * Deny IP rules take precedence over allow rules. | ||
53 | * | ||
54 | * | ||
55 | * The Deny/Allow IP logic: | ||
56 | * | ||
57 | * - Default is to allow all. No addresses are denied unless | ||
58 | * denied with a D: rule. | ||
59 | * - Order of Deny/Allow rules is significant | ||
60 | * - Deny rules take precedence over allow rules. | ||
61 | * - If a deny all rule (D:*) is used it acts as a catch-all for unmatched | ||
62 | * addresses. | ||
63 | * - Specification of Allow all (A:*) is a no-op | ||
64 | * | ||
65 | * Example: | ||
66 | * 1. Allow only specified addresses | ||
67 | * A:172.20 # Allow any address that begins with 172.20. | ||
68 | * A:10.10. # Allow any address that begins with 10.10. | ||
69 | * A:127.0.0.1 # Allow local loopback connections | ||
70 | * D:* # Deny from other IP connections | ||
71 | * | ||
72 | * 2. Only deny specified addresses | ||
73 | * D:1.2.3. # deny from 1.2.3.0 - 1.2.3.255 | ||
74 | * D:2.3.4. # deny from 2.3.4.0 - 2.3.4.255 | ||
75 | * A:* # (optional line added for clarity) | ||
76 | * | ||
77 | * If a sub directory contains a config file it is parsed and merged with | ||
78 | * any existing settings as if it was appended to the original configuration. | ||
79 | * | ||
80 | * subdir paths are relative to the containing subdir and thus cannot | ||
81 | * affect the parent rules. | ||
82 | * | ||
83 | * Note that since the sub dir is parsed in the forked thread servicing the | ||
84 | * subdir http request, any merge is discarded when the process exits. As a | ||
85 | * result, the subdir settings only have a lifetime of a single request. | ||
86 | * | ||
87 | * | ||
88 | * If -c is not set, an attempt will be made to open the default | ||
89 | * root configuration file. If -c is set and the file is not found, the | ||
90 | * server exits with an error. | ||
91 | * | ||
92 | */ | ||
93 | |||
94 | |||
95 | #include "busybox.h" | ||
96 | |||
97 | |||
98 | static const char httpdVersion[] = "busybox httpd/1.35 6-Oct-2004"; | ||
99 | static const char default_path_httpd_conf[] = "/etc"; | ||
100 | static const char httpd_conf[] = "httpd.conf"; | ||
101 | static const char home[] = "./"; | ||
102 | |||
103 | #define TIMEOUT 60 | ||
104 | |||
105 | // Note: busybox xfuncs are not used because we want the server to keep running | ||
106 | // if something bad happens due to a malformed user request. | ||
107 | // As a result, all memory allocation after daemonize | ||
108 | // is checked rigorously | ||
109 | |||
110 | //#define DEBUG 1 | ||
111 | |||
112 | #ifndef DEBUG | ||
113 | # define DEBUG 0 | ||
114 | #endif | ||
115 | |||
116 | #define MAX_MEMORY_BUFF 8192 /* IO buffer */ | ||
117 | |||
118 | typedef struct HT_ACCESS { | ||
119 | char *after_colon; | ||
120 | struct HT_ACCESS *next; | ||
121 | char before_colon[1]; /* really bigger, must last */ | ||
122 | } Htaccess; | ||
123 | |||
124 | typedef struct HT_ACCESS_IP { | ||
125 | unsigned int ip; | ||
126 | unsigned int mask; | ||
127 | int allow_deny; | ||
128 | struct HT_ACCESS_IP *next; | ||
129 | } Htaccess_IP; | ||
130 | |||
131 | typedef struct { | ||
132 | char buf[MAX_MEMORY_BUFF]; | ||
133 | |||
134 | USE_FEATURE_HTTPD_BASIC_AUTH(const char *realm;) | ||
135 | USE_FEATURE_HTTPD_BASIC_AUTH(char *remoteuser;) | ||
136 | |||
137 | const char *query; | ||
138 | |||
139 | USE_FEATURE_HTTPD_CGI(char *referer;) | ||
140 | |||
141 | const char *configFile; | ||
142 | |||
143 | unsigned int rmt_ip; | ||
144 | #if ENABLE_FEATURE_HTTPD_CGI || DEBUG | ||
145 | char rmt_ip_str[16]; /* for set env REMOTE_ADDR */ | ||
146 | #endif | ||
147 | unsigned port; /* server initial port and for | ||
148 | set env REMOTE_PORT */ | ||
149 | const char *found_mime_type; | ||
150 | const char *found_moved_temporarily; | ||
151 | |||
152 | off_t ContentLength; /* -1 - unknown */ | ||
153 | time_t last_mod; | ||
154 | |||
155 | Htaccess_IP *ip_a_d; /* config allow/deny lines */ | ||
156 | int flg_deny_all; | ||
157 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
158 | Htaccess *auth; /* config user:password lines */ | ||
159 | #endif | ||
160 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES | ||
161 | Htaccess *mime_a; /* config mime types */ | ||
162 | #endif | ||
163 | |||
164 | int server_socket; | ||
165 | int accepted_socket; | ||
166 | volatile int alarm_signaled; | ||
167 | |||
168 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_SCRIPT_INTERPR | ||
169 | Htaccess *script_i; /* config script interpreters */ | ||
170 | #endif | ||
171 | } HttpdConfig; | ||
172 | |||
173 | static HttpdConfig *config; | ||
174 | |||
175 | static const char request_GET[] = "GET"; /* size algorithmic optimize */ | ||
176 | |||
177 | static const char* const suffixTable [] = { | ||
178 | /* Warning: shorted equivalent suffix in one line must be first */ | ||
179 | ".htm.html", "text/html", | ||
180 | ".jpg.jpeg", "image/jpeg", | ||
181 | ".gif", "image/gif", | ||
182 | ".png", "image/png", | ||
183 | ".txt.h.c.cc.cpp", "text/plain", | ||
184 | ".css", "text/css", | ||
185 | ".wav", "audio/wav", | ||
186 | ".avi", "video/x-msvideo", | ||
187 | ".qt.mov", "video/quicktime", | ||
188 | ".mpe.mpeg", "video/mpeg", | ||
189 | ".mid.midi", "audio/midi", | ||
190 | ".mp3", "audio/mpeg", | ||
191 | #if 0 /* unpopular */ | ||
192 | ".au", "audio/basic", | ||
193 | ".pac", "application/x-ns-proxy-autoconfig", | ||
194 | ".vrml.wrl", "model/vrml", | ||
195 | #endif | ||
196 | 0, "application/octet-stream" /* default */ | ||
197 | }; | ||
198 | |||
199 | typedef enum { | ||
200 | HTTP_OK = 200, | ||
201 | HTTP_MOVED_TEMPORARILY = 302, | ||
202 | HTTP_BAD_REQUEST = 400, /* malformed syntax */ | ||
203 | HTTP_UNAUTHORIZED = 401, /* authentication needed, respond with auth hdr */ | ||
204 | HTTP_NOT_FOUND = 404, | ||
205 | HTTP_FORBIDDEN = 403, | ||
206 | HTTP_REQUEST_TIMEOUT = 408, | ||
207 | HTTP_NOT_IMPLEMENTED = 501, /* used for unrecognized requests */ | ||
208 | HTTP_INTERNAL_SERVER_ERROR = 500, | ||
209 | #if 0 /* future use */ | ||
210 | HTTP_CONTINUE = 100, | ||
211 | HTTP_SWITCHING_PROTOCOLS = 101, | ||
212 | HTTP_CREATED = 201, | ||
213 | HTTP_ACCEPTED = 202, | ||
214 | HTTP_NON_AUTHORITATIVE_INFO = 203, | ||
215 | HTTP_NO_CONTENT = 204, | ||
216 | HTTP_MULTIPLE_CHOICES = 300, | ||
217 | HTTP_MOVED_PERMANENTLY = 301, | ||
218 | HTTP_NOT_MODIFIED = 304, | ||
219 | HTTP_PAYMENT_REQUIRED = 402, | ||
220 | HTTP_BAD_GATEWAY = 502, | ||
221 | HTTP_SERVICE_UNAVAILABLE = 503, /* overload, maintenance */ | ||
222 | HTTP_RESPONSE_SETSIZE = 0xffffffff | ||
223 | #endif | ||
224 | } HttpResponseNum; | ||
225 | |||
226 | typedef struct { | ||
227 | HttpResponseNum type; | ||
228 | const char *name; | ||
229 | const char *info; | ||
230 | } HttpEnumString; | ||
231 | |||
232 | static const HttpEnumString httpResponseNames[] = { | ||
233 | { HTTP_OK, "OK", NULL }, | ||
234 | { HTTP_MOVED_TEMPORARILY, "Found", "Directories must end with a slash." }, | ||
235 | { HTTP_REQUEST_TIMEOUT, "Request Timeout", | ||
236 | "No request appeared within a reasonable time period." }, | ||
237 | { HTTP_NOT_IMPLEMENTED, "Not Implemented", | ||
238 | "The requested method is not recognized by this server." }, | ||
239 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
240 | { HTTP_UNAUTHORIZED, "Unauthorized", "" }, | ||
241 | #endif | ||
242 | { HTTP_NOT_FOUND, "Not Found", | ||
243 | "The requested URL was not found on this server." }, | ||
244 | { HTTP_BAD_REQUEST, "Bad Request", "Unsupported method." }, | ||
245 | { HTTP_FORBIDDEN, "Forbidden", "" }, | ||
246 | { HTTP_INTERNAL_SERVER_ERROR, "Internal Server Error", | ||
247 | "Internal Server Error" }, | ||
248 | #if 0 /* not implemented */ | ||
249 | { HTTP_CREATED, "Created" }, | ||
250 | { HTTP_ACCEPTED, "Accepted" }, | ||
251 | { HTTP_NO_CONTENT, "No Content" }, | ||
252 | { HTTP_MULTIPLE_CHOICES, "Multiple Choices" }, | ||
253 | { HTTP_MOVED_PERMANENTLY, "Moved Permanently" }, | ||
254 | { HTTP_NOT_MODIFIED, "Not Modified" }, | ||
255 | { HTTP_BAD_GATEWAY, "Bad Gateway", "" }, | ||
256 | { HTTP_SERVICE_UNAVAILABLE, "Service Unavailable", "" }, | ||
257 | #endif | ||
258 | }; | ||
259 | |||
260 | |||
261 | static const char RFC1123FMT[] = "%a, %d %b %Y %H:%M:%S GMT"; | ||
262 | |||
263 | |||
264 | #define STRNCASECMP(a, str) strncasecmp((a), (str), sizeof(str)-1) | ||
265 | |||
266 | |||
267 | static int scan_ip(const char **ep, unsigned int *ip, unsigned char endc) | ||
268 | { | ||
269 | const char *p = *ep; | ||
270 | int auto_mask = 8; | ||
271 | int j; | ||
272 | |||
273 | *ip = 0; | ||
274 | for (j = 0; j < 4; j++) { | ||
275 | unsigned int octet; | ||
276 | |||
277 | if ((*p < '0' || *p > '9') && (*p != '/' || j == 0) && *p != 0) | ||
278 | return -auto_mask; | ||
279 | octet = 0; | ||
280 | while (*p >= '0' && *p <= '9') { | ||
281 | octet *= 10; | ||
282 | octet += *p - '0'; | ||
283 | if (octet > 255) | ||
284 | return -auto_mask; | ||
285 | p++; | ||
286 | } | ||
287 | if (*p == '.') | ||
288 | p++; | ||
289 | if (*p != '/' && *p != 0) | ||
290 | auto_mask += 8; | ||
291 | *ip = ((*ip) << 8) | octet; | ||
292 | } | ||
293 | if (*p != 0) { | ||
294 | if (*p != endc) | ||
295 | return -auto_mask; | ||
296 | p++; | ||
297 | if (*p == 0) | ||
298 | return -auto_mask; | ||
299 | } | ||
300 | *ep = p; | ||
301 | return auto_mask; | ||
302 | } | ||
303 | |||
304 | static int scan_ip_mask(const char *ipm, unsigned int *ip, unsigned int *mask) | ||
305 | { | ||
306 | int i; | ||
307 | unsigned int msk; | ||
308 | |||
309 | i = scan_ip(&ipm, ip, '/'); | ||
310 | if (i < 0) | ||
311 | return i; | ||
312 | if (*ipm) { | ||
313 | const char *p = ipm; | ||
314 | |||
315 | i = 0; | ||
316 | while (*p) { | ||
317 | if (*p < '0' || *p > '9') { | ||
318 | if (*p == '.') { | ||
319 | i = scan_ip(&ipm, mask, 0); | ||
320 | return i != 32; | ||
321 | } | ||
322 | return -1; | ||
323 | } | ||
324 | i *= 10; | ||
325 | i += *p - '0'; | ||
326 | p++; | ||
327 | } | ||
328 | } | ||
329 | if (i > 32 || i < 0) | ||
330 | return -1; | ||
331 | msk = 0x80000000; | ||
332 | *mask = 0; | ||
333 | while (i > 0) { | ||
334 | *mask |= msk; | ||
335 | msk >>= 1; | ||
336 | i--; | ||
337 | } | ||
338 | return 0; | ||
339 | } | ||
340 | |||
341 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH || ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES | ||
342 | static void free_config_lines(Htaccess **pprev) | ||
343 | { | ||
344 | Htaccess *prev = *pprev; | ||
345 | |||
346 | while (prev) { | ||
347 | Htaccess *cur = prev; | ||
348 | |||
349 | prev = cur->next; | ||
350 | free(cur); | ||
351 | } | ||
352 | *pprev = NULL; | ||
353 | } | ||
354 | #endif | ||
355 | |||
356 | /* flag */ | ||
357 | #define FIRST_PARSE 0 | ||
358 | #define SUBDIR_PARSE 1 | ||
359 | #define SIGNALED_PARSE 2 | ||
360 | #define FIND_FROM_HTTPD_ROOT 3 | ||
361 | /**************************************************************************** | ||
362 | * | ||
363 | > $Function: parse_conf() | ||
364 | * | ||
365 | * $Description: parse configuration file into in-memory linked list. | ||
366 | * | ||
367 | * The first non-white character is examined to determine if the config line | ||
368 | * is one of the following: | ||
369 | * .ext:mime/type # new mime type not compiled into httpd | ||
370 | * [adAD]:from # ip address allow/deny, * for wildcard | ||
371 | * /path:user:pass # username/password | ||
372 | * | ||
373 | * Any previous IP rules are discarded. | ||
374 | * If the flag argument is not SUBDIR_PARSE then all /path and mime rules | ||
375 | * are also discarded. That is, previous settings are retained if flag is | ||
376 | * SUBDIR_PARSE. | ||
377 | * | ||
378 | * $Parameters: | ||
379 | * (const char *) path . . null for ip address checks, path for password | ||
380 | * checks. | ||
381 | * (int) flag . . . . . . the source of the parse request. | ||
382 | * | ||
383 | * $Return: (None) | ||
384 | * | ||
385 | ****************************************************************************/ | ||
386 | static void parse_conf(const char *path, int flag) | ||
387 | { | ||
388 | FILE *f; | ||
389 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
390 | Htaccess *prev, *cur; | ||
391 | #elif ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES | ||
392 | Htaccess *cur; | ||
393 | #endif | ||
394 | |||
395 | const char *cf = config->configFile; | ||
396 | char buf[160]; | ||
397 | char *p0 = NULL; | ||
398 | char *c, *p; | ||
399 | |||
400 | /* free previous ip setup if present */ | ||
401 | Htaccess_IP *pip = config->ip_a_d; | ||
402 | |||
403 | while (pip) { | ||
404 | Htaccess_IP *cur_ipl = pip; | ||
405 | |||
406 | pip = cur_ipl->next; | ||
407 | free(cur_ipl); | ||
408 | } | ||
409 | config->ip_a_d = NULL; | ||
410 | |||
411 | config->flg_deny_all = 0; | ||
412 | |||
413 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH || ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES || ENABLE_FEATURE_HTTPD_CONFIG_WITH_SCRIPT_INTERPR | ||
414 | /* retain previous auth and mime config only for subdir parse */ | ||
415 | if (flag != SUBDIR_PARSE) { | ||
416 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
417 | free_config_lines(&config->auth); | ||
418 | #endif | ||
419 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES | ||
420 | free_config_lines(&config->mime_a); | ||
421 | #endif | ||
422 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_SCRIPT_INTERPR | ||
423 | free_config_lines(&config->script_i); | ||
424 | #endif | ||
425 | } | ||
426 | #endif | ||
427 | |||
428 | if (flag == SUBDIR_PARSE || cf == NULL) { | ||
429 | cf = alloca(strlen(path) + sizeof(httpd_conf) + 2); | ||
430 | if (cf == NULL) { | ||
431 | if (flag == FIRST_PARSE) | ||
432 | bb_error_msg_and_die(bb_msg_memory_exhausted); | ||
433 | return; | ||
434 | } | ||
435 | sprintf((char *)cf, "%s/%s", path, httpd_conf); | ||
436 | } | ||
437 | |||
438 | while ((f = fopen(cf, "r")) == NULL) { | ||
439 | if (flag == SUBDIR_PARSE || flag == FIND_FROM_HTTPD_ROOT) { | ||
440 | /* config file not found, no changes to config */ | ||
441 | return; | ||
442 | } | ||
443 | if (config->configFile && flag == FIRST_PARSE) /* if -c option given */ | ||
444 | bb_perror_msg_and_die("%s", cf); | ||
445 | flag = FIND_FROM_HTTPD_ROOT; | ||
446 | cf = httpd_conf; | ||
447 | } | ||
448 | |||
449 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
450 | prev = config->auth; | ||
451 | #endif | ||
452 | /* This could stand some work */ | ||
453 | while ((p0 = fgets(buf, sizeof(buf), f)) != NULL) { | ||
454 | c = NULL; | ||
455 | for (p = p0; *p0 != 0 && *p0 != '#'; p0++) { | ||
456 | if (!isspace(*p0)) { | ||
457 | *p++ = *p0; | ||
458 | if (*p0 == ':' && c == NULL) | ||
459 | c = p; | ||
460 | } | ||
461 | } | ||
462 | *p = 0; | ||
463 | |||
464 | /* test for empty or strange line */ | ||
465 | if (c == NULL || *c == 0) | ||
466 | continue; | ||
467 | p0 = buf; | ||
468 | if (*p0 == 'd') | ||
469 | *p0 = 'D'; | ||
470 | if (*c == '*') { | ||
471 | if (*p0 == 'D') { | ||
472 | /* memorize deny all */ | ||
473 | config->flg_deny_all++; | ||
474 | } | ||
475 | /* skip default other "word:*" config lines */ | ||
476 | continue; | ||
477 | } | ||
478 | |||
479 | if (*p0 == 'a') | ||
480 | *p0 = 'A'; | ||
481 | else if (*p0 != 'D' && *p0 != 'A' | ||
482 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
483 | && *p0 != '/' | ||
484 | #endif | ||
485 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES | ||
486 | && *p0 != '.' | ||
487 | #endif | ||
488 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_SCRIPT_INTERPR | ||
489 | && *p0 != '*' | ||
490 | #endif | ||
491 | ) | ||
492 | continue; | ||
493 | if (*p0 == 'A' || *p0 == 'D') { | ||
494 | /* storing current config IP line */ | ||
495 | pip = calloc(1, sizeof(Htaccess_IP)); | ||
496 | if (pip) { | ||
497 | if (scan_ip_mask(c, &(pip->ip), &(pip->mask))) { | ||
498 | /* syntax IP{/mask} error detected, protect all */ | ||
499 | *p0 = 'D'; | ||
500 | pip->mask = 0; | ||
501 | } | ||
502 | pip->allow_deny = *p0; | ||
503 | if (*p0 == 'D') { | ||
504 | /* Deny:form_IP move top */ | ||
505 | pip->next = config->ip_a_d; | ||
506 | config->ip_a_d = pip; | ||
507 | } else { | ||
508 | /* add to bottom A:form_IP config line */ | ||
509 | Htaccess_IP *prev_IP = config->ip_a_d; | ||
510 | |||
511 | if (prev_IP == NULL) { | ||
512 | config->ip_a_d = pip; | ||
513 | } else { | ||
514 | while (prev_IP->next) | ||
515 | prev_IP = prev_IP->next; | ||
516 | prev_IP->next = pip; | ||
517 | } | ||
518 | } | ||
519 | } | ||
520 | continue; | ||
521 | } | ||
522 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
523 | if (*p0 == '/') { | ||
524 | /* make full path from httpd root / curent_path / config_line_path */ | ||
525 | cf = flag == SUBDIR_PARSE ? path : ""; | ||
526 | p0 = malloc(strlen(cf) + (c - buf) + 2 + strlen(c)); | ||
527 | if (p0 == NULL) | ||
528 | continue; | ||
529 | c[-1] = 0; | ||
530 | sprintf(p0, "/%s%s", cf, buf); | ||
531 | |||
532 | /* another call bb_simplify_path */ | ||
533 | cf = p = p0; | ||
534 | |||
535 | do { | ||
536 | if (*p == '/') { | ||
537 | if (*cf == '/') { /* skip duplicate (or initial) slash */ | ||
538 | continue; | ||
539 | } else if (*cf == '.') { | ||
540 | if (cf[1] == '/' || cf[1] == 0) { /* remove extra '.' */ | ||
541 | continue; | ||
542 | } else if ((cf[1] == '.') && (cf[2] == '/' || cf[2] == 0)) { | ||
543 | ++cf; | ||
544 | if (p > p0) { | ||
545 | while (*--p != '/') /* omit previous dir */; | ||
546 | } | ||
547 | continue; | ||
548 | } | ||
549 | } | ||
550 | } | ||
551 | *++p = *cf; | ||
552 | } while (*++cf); | ||
553 | |||
554 | if ((p == p0) || (*p != '/')) { /* not a trailing slash */ | ||
555 | ++p; /* so keep last character */ | ||
556 | } | ||
557 | *p = 0; | ||
558 | sprintf(p0, "%s:%s", p0, c); | ||
559 | } | ||
560 | #endif | ||
561 | |||
562 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH || ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES || ENABLE_FEATURE_HTTPD_CONFIG_WITH_SCRIPT_INTERPR | ||
563 | /* storing current config line */ | ||
564 | cur = calloc(1, sizeof(Htaccess) + strlen(p0)); | ||
565 | if (cur) { | ||
566 | cf = strcpy(cur->before_colon, p0); | ||
567 | c = strchr(cf, ':'); | ||
568 | *c++ = 0; | ||
569 | cur->after_colon = c; | ||
570 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES | ||
571 | if (*cf == '.') { | ||
572 | /* config .mime line move top for overwrite previous */ | ||
573 | cur->next = config->mime_a; | ||
574 | config->mime_a = cur; | ||
575 | continue; | ||
576 | } | ||
577 | #endif | ||
578 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_SCRIPT_INTERPR | ||
579 | if (*cf == '*' && cf[1] == '.') { | ||
580 | /* config script interpreter line move top for overwrite previous */ | ||
581 | cur->next = config->script_i; | ||
582 | config->script_i = cur; | ||
583 | continue; | ||
584 | } | ||
585 | #endif | ||
586 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
587 | free(p0); | ||
588 | if (prev == NULL) { | ||
589 | /* first line */ | ||
590 | config->auth = prev = cur; | ||
591 | } else { | ||
592 | /* sort path, if current lenght eq or bigger then move up */ | ||
593 | Htaccess *prev_hti = config->auth; | ||
594 | size_t l = strlen(cf); | ||
595 | Htaccess *hti; | ||
596 | |||
597 | for (hti = prev_hti; hti; hti = hti->next) { | ||
598 | if (l >= strlen(hti->before_colon)) { | ||
599 | /* insert before hti */ | ||
600 | cur->next = hti; | ||
601 | if (prev_hti != hti) { | ||
602 | prev_hti->next = cur; | ||
603 | } else { | ||
604 | /* insert as top */ | ||
605 | config->auth = cur; | ||
606 | } | ||
607 | break; | ||
608 | } | ||
609 | if (prev_hti != hti) | ||
610 | prev_hti = prev_hti->next; | ||
611 | } | ||
612 | if (!hti) { /* not inserted, add to bottom */ | ||
613 | prev->next = cur; | ||
614 | prev = cur; | ||
615 | } | ||
616 | } | ||
617 | #endif | ||
618 | } | ||
619 | #endif | ||
620 | } | ||
621 | fclose(f); | ||
622 | } | ||
623 | |||
624 | #if ENABLE_FEATURE_HTTPD_ENCODE_URL_STR | ||
625 | /**************************************************************************** | ||
626 | * | ||
627 | > $Function: encodeString() | ||
628 | * | ||
629 | * $Description: Given a string, html encode special characters. | ||
630 | * This is used for the -e command line option to provide an easy way | ||
631 | * for scripts to encode result data without confusing browsers. The | ||
632 | * returned string pointer is memory allocated by malloc(). | ||
633 | * | ||
634 | * $Parameters: | ||
635 | * (const char *) string . . The first string to encode. | ||
636 | * | ||
637 | * $Return: (char *) . . . .. . . A pointer to the encoded string. | ||
638 | * | ||
639 | * $Errors: Returns a null string ("") if memory is not available. | ||
640 | * | ||
641 | ****************************************************************************/ | ||
642 | static char *encodeString(const char *string) | ||
643 | { | ||
644 | /* take the simple route and encode everything */ | ||
645 | /* could possibly scan once to get length. */ | ||
646 | int len = strlen(string); | ||
647 | char *out = malloc(len * 6 + 1); | ||
648 | char *p = out; | ||
649 | char ch; | ||
650 | |||
651 | if (!out) return ""; | ||
652 | while ((ch = *string++)) { | ||
653 | // very simple check for what to encode | ||
654 | if (isalnum(ch)) *p++ = ch; | ||
655 | else p += sprintf(p, "&#%d;", (unsigned char) ch); | ||
656 | } | ||
657 | *p = 0; | ||
658 | return out; | ||
659 | } | ||
660 | #endif /* FEATURE_HTTPD_ENCODE_URL_STR */ | ||
661 | |||
662 | /**************************************************************************** | ||
663 | * | ||
664 | > $Function: decodeString() | ||
665 | * | ||
666 | * $Description: Given a URL encoded string, convert it to plain ascii. | ||
667 | * Since decoding always makes strings smaller, the decode is done in-place. | ||
668 | * Thus, callers should strdup() the argument if they do not want the | ||
669 | * argument modified. The return is the original pointer, allowing this | ||
670 | * function to be easily used as arguments to other functions. | ||
671 | * | ||
672 | * $Parameters: | ||
673 | * (char *) string . . . The first string to decode. | ||
674 | * (int) option_d . . 1 if called for httpd -d | ||
675 | * | ||
676 | * $Return: (char *) . . . . A pointer to the decoded string (same as input). | ||
677 | * | ||
678 | * $Errors: None | ||
679 | * | ||
680 | ****************************************************************************/ | ||
681 | static char *decodeString(char *orig, int option_d) | ||
682 | { | ||
683 | /* note that decoded string is always shorter than original */ | ||
684 | char *string = orig; | ||
685 | char *ptr = string; | ||
686 | char c; | ||
687 | |||
688 | while ((c = *ptr++) != '\0') { | ||
689 | unsigned value1, value2; | ||
690 | |||
691 | if (option_d && c == '+') { | ||
692 | *string++ = ' '; | ||
693 | continue; | ||
694 | } | ||
695 | if (c != '%') { | ||
696 | *string++ = c; | ||
697 | continue; | ||
698 | } | ||
699 | if (sscanf(ptr, "%1X", &value1) != 1 | ||
700 | || sscanf(ptr+1, "%1X", &value2) != 1 | ||
701 | ) { | ||
702 | if (!option_d) | ||
703 | return NULL; | ||
704 | *string++ = '%'; | ||
705 | continue; | ||
706 | } | ||
707 | value1 = value1 * 16 + value2; | ||
708 | if (!option_d && (value1 == '/' || value1 == '\0')) { | ||
709 | /* caller takes it as indication of invalid | ||
710 | * (dangerous wrt exploits) chars */ | ||
711 | return orig + 1; | ||
712 | } | ||
713 | *string++ = value1; | ||
714 | ptr += 2; | ||
715 | } | ||
716 | *string = '\0'; | ||
717 | return orig; | ||
718 | } | ||
719 | |||
720 | |||
721 | #if ENABLE_FEATURE_HTTPD_CGI | ||
722 | /**************************************************************************** | ||
723 | * setenv helpers | ||
724 | ****************************************************************************/ | ||
725 | static void setenv1(const char *name, const char *value) | ||
726 | { | ||
727 | if (!value) | ||
728 | value = ""; | ||
729 | setenv(name, value, 1); | ||
730 | } | ||
731 | static void setenv_long(const char *name, long value) | ||
732 | { | ||
733 | char buf[sizeof(value)*3 + 1]; | ||
734 | sprintf(buf, "%ld", value); | ||
735 | setenv(name, buf, 1); | ||
736 | } | ||
737 | #endif | ||
738 | |||
739 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
740 | /**************************************************************************** | ||
741 | * | ||
742 | > $Function: decodeBase64() | ||
743 | * | ||
744 | > $Description: Decode a base 64 data stream as per rfc1521. | ||
745 | * Note that the rfc states that none base64 chars are to be ignored. | ||
746 | * Since the decode always results in a shorter size than the input, it is | ||
747 | * OK to pass the input arg as an output arg. | ||
748 | * | ||
749 | * $Parameter: | ||
750 | * (char *) Data . . . . A pointer to a base64 encoded string. | ||
751 | * Where to place the decoded data. | ||
752 | * | ||
753 | * $Return: void | ||
754 | * | ||
755 | * $Errors: None | ||
756 | * | ||
757 | ****************************************************************************/ | ||
758 | static void decodeBase64(char *Data) | ||
759 | { | ||
760 | |||
761 | const unsigned char *in = (const unsigned char *)Data; | ||
762 | // The decoded size will be at most 3/4 the size of the encoded | ||
763 | unsigned long ch = 0; | ||
764 | int i = 0; | ||
765 | |||
766 | while (*in) { | ||
767 | int t = *in++; | ||
768 | |||
769 | if (t >= '0' && t <= '9') | ||
770 | t = t - '0' + 52; | ||
771 | else if (t >= 'A' && t <= 'Z') | ||
772 | t = t - 'A'; | ||
773 | else if (t >= 'a' && t <= 'z') | ||
774 | t = t - 'a' + 26; | ||
775 | else if (t == '+') | ||
776 | t = 62; | ||
777 | else if (t == '/') | ||
778 | t = 63; | ||
779 | else if (t == '=') | ||
780 | t = 0; | ||
781 | else | ||
782 | continue; | ||
783 | |||
784 | ch = (ch << 6) | t; | ||
785 | i++; | ||
786 | if (i == 4) { | ||
787 | *Data++ = (char) (ch >> 16); | ||
788 | *Data++ = (char) (ch >> 8); | ||
789 | *Data++ = (char) ch; | ||
790 | i = 0; | ||
791 | } | ||
792 | } | ||
793 | *Data = 0; | ||
794 | } | ||
795 | #endif | ||
796 | |||
797 | |||
798 | /**************************************************************************** | ||
799 | * | ||
800 | > $Function: openServer() | ||
801 | * | ||
802 | * $Description: create a listen server socket on the designated port. | ||
803 | * | ||
804 | * $Return: (int) . . . A connection socket. -1 for errors. | ||
805 | * | ||
806 | * $Errors: None | ||
807 | * | ||
808 | ****************************************************************************/ | ||
809 | static int openServer(void) | ||
810 | { | ||
811 | struct sockaddr_in lsocket; | ||
812 | int fd; | ||
813 | |||
814 | /* create the socket right now */ | ||
815 | /* inet_addr() returns a value that is already in network order */ | ||
816 | memset(&lsocket, 0, sizeof(lsocket)); | ||
817 | lsocket.sin_family = AF_INET; | ||
818 | lsocket.sin_addr.s_addr = INADDR_ANY; | ||
819 | lsocket.sin_port = htons(config->port); | ||
820 | fd = xsocket(AF_INET, SOCK_STREAM, 0); | ||
821 | /* tell the OS it's OK to reuse a previous address even though */ | ||
822 | /* it may still be in a close down state. Allows bind to succeed. */ | ||
823 | #ifdef SO_REUSEPORT | ||
824 | { | ||
825 | static const int on = 1; | ||
826 | setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, | ||
827 | (void *)&on, sizeof(on)); | ||
828 | } | ||
829 | #else | ||
830 | setsockopt_reuseaddr(fd); | ||
831 | #endif | ||
832 | xbind(fd, (struct sockaddr *)&lsocket, sizeof(lsocket)); | ||
833 | xlisten(fd, 9); | ||
834 | signal(SIGCHLD, SIG_IGN); /* prevent zombie (defunct) processes */ | ||
835 | return fd; | ||
836 | } | ||
837 | |||
838 | /**************************************************************************** | ||
839 | * | ||
840 | > $Function: sendHeaders() | ||
841 | * | ||
842 | * $Description: Create and send HTTP response headers. | ||
843 | * The arguments are combined and sent as one write operation. Note that | ||
844 | * IE will puke big-time if the headers are not sent in one packet and the | ||
845 | * second packet is delayed for any reason. | ||
846 | * | ||
847 | * $Parameter: | ||
848 | * (HttpResponseNum) responseNum . . . The result code to send. | ||
849 | * | ||
850 | * $Return: (int) . . . . writing errors | ||
851 | * | ||
852 | ****************************************************************************/ | ||
853 | static int sendHeaders(HttpResponseNum responseNum) | ||
854 | { | ||
855 | char *buf = config->buf; | ||
856 | const char *responseString = ""; | ||
857 | const char *infoString = 0; | ||
858 | const char *mime_type; | ||
859 | unsigned int i; | ||
860 | time_t timer = time(0); | ||
861 | char timeStr[80]; | ||
862 | int len; | ||
863 | enum { | ||
864 | numNames = sizeof(httpResponseNames) / sizeof(httpResponseNames[0]) | ||
865 | }; | ||
866 | |||
867 | for (i = 0; i < numNames; i++) { | ||
868 | if (httpResponseNames[i].type == responseNum) { | ||
869 | responseString = httpResponseNames[i].name; | ||
870 | infoString = httpResponseNames[i].info; | ||
871 | break; | ||
872 | } | ||
873 | } | ||
874 | /* error message is HTML */ | ||
875 | mime_type = responseNum == HTTP_OK ? | ||
876 | config->found_mime_type : "text/html"; | ||
877 | |||
878 | /* emit the current date */ | ||
879 | strftime(timeStr, sizeof(timeStr), RFC1123FMT, gmtime(&timer)); | ||
880 | len = sprintf(buf, | ||
881 | "HTTP/1.0 %d %s\r\nContent-type: %s\r\n" | ||
882 | "Date: %s\r\nConnection: close\r\n", | ||
883 | responseNum, responseString, mime_type, timeStr); | ||
884 | |||
885 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
886 | if (responseNum == HTTP_UNAUTHORIZED) { | ||
887 | len += sprintf(buf+len, "WWW-Authenticate: Basic realm=\"%s\"\r\n", | ||
888 | config->realm); | ||
889 | } | ||
890 | #endif | ||
891 | if (responseNum == HTTP_MOVED_TEMPORARILY) { | ||
892 | len += sprintf(buf+len, "Location: %s/%s%s\r\n", | ||
893 | config->found_moved_temporarily, | ||
894 | (config->query ? "?" : ""), | ||
895 | (config->query ? config->query : "")); | ||
896 | } | ||
897 | |||
898 | if (config->ContentLength != -1) { /* file */ | ||
899 | strftime(timeStr, sizeof(timeStr), RFC1123FMT, gmtime(&config->last_mod)); | ||
900 | len += sprintf(buf+len, "Last-Modified: %s\r\n%s %"OFF_FMT"d\r\n", | ||
901 | timeStr, "Content-length:", config->ContentLength); | ||
902 | } | ||
903 | strcat(buf, "\r\n"); | ||
904 | len += 2; | ||
905 | if (infoString) { | ||
906 | len += sprintf(buf+len, | ||
907 | "<HEAD><TITLE>%d %s</TITLE></HEAD>\n" | ||
908 | "<BODY><H1>%d %s</H1>\n%s\n</BODY>\n", | ||
909 | responseNum, responseString, | ||
910 | responseNum, responseString, infoString); | ||
911 | } | ||
912 | if (DEBUG) | ||
913 | fprintf(stderr, "headers: '%s'\n", buf); | ||
914 | return full_write(config->accepted_socket, buf, len); | ||
915 | } | ||
916 | |||
917 | /**************************************************************************** | ||
918 | * | ||
919 | > $Function: getLine() | ||
920 | * | ||
921 | * $Description: Read from the socket until an end of line char found. | ||
922 | * | ||
923 | * Characters are read one at a time until an eol sequence is found. | ||
924 | * | ||
925 | * $Return: (int) . . . . number of characters read. -1 if error. | ||
926 | * | ||
927 | ****************************************************************************/ | ||
928 | static int getLine(void) | ||
929 | { | ||
930 | int count = 0; | ||
931 | char *buf = config->buf; | ||
932 | |||
933 | while (read(config->accepted_socket, buf + count, 1) == 1) { | ||
934 | if (buf[count] == '\r') continue; | ||
935 | if (buf[count] == '\n') { | ||
936 | buf[count] = 0; | ||
937 | return count; | ||
938 | } | ||
939 | if (count < (MAX_MEMORY_BUFF-1)) /* check overflow */ | ||
940 | count++; | ||
941 | } | ||
942 | if (count) return count; | ||
943 | else return -1; | ||
944 | } | ||
945 | |||
946 | #if ENABLE_FEATURE_HTTPD_CGI | ||
947 | /**************************************************************************** | ||
948 | * | ||
949 | > $Function: sendCgi() | ||
950 | * | ||
951 | * $Description: Execute a CGI script and send it's stdout back | ||
952 | * | ||
953 | * Environment variables are set up and the script is invoked with pipes | ||
954 | * for stdin/stdout. If a post is being done the script is fed the POST | ||
955 | * data in addition to setting the QUERY_STRING variable (for GETs or POSTs). | ||
956 | * | ||
957 | * $Parameters: | ||
958 | * (const char *) url . . . . . . The requested URL (with leading /). | ||
959 | * (int bodyLen) . . . . . . . . Length of the post body. | ||
960 | * (const char *cookie) . . . . . For set HTTP_COOKIE. | ||
961 | * (const char *content_type) . . For set CONTENT_TYPE. | ||
962 | |||
963 | * | ||
964 | * $Return: (char *) . . . . A pointer to the decoded string (same as input). | ||
965 | * | ||
966 | * $Errors: None | ||
967 | * | ||
968 | ****************************************************************************/ | ||
969 | static int sendCgi(const char *url, | ||
970 | const char *request, int bodyLen, const char *cookie, | ||
971 | const char *content_type) | ||
972 | { | ||
973 | int fromCgi[2]; /* pipe for reading data from CGI */ | ||
974 | int toCgi[2]; /* pipe for sending data to CGI */ | ||
975 | |||
976 | static char * argp[] = { 0, 0 }; | ||
977 | int pid = 0; | ||
978 | int inFd; | ||
979 | int outFd; | ||
980 | int firstLine = 1; | ||
981 | int status; | ||
982 | size_t post_readed_size, post_readed_idx; | ||
983 | |||
984 | if (pipe(fromCgi) != 0) | ||
985 | return 0; | ||
986 | if (pipe(toCgi) != 0) | ||
987 | return 0; | ||
988 | |||
989 | pid = fork(); | ||
990 | if (pid < 0) | ||
991 | return 0; | ||
992 | |||
993 | if (!pid) { | ||
994 | /* child process */ | ||
995 | char *script; | ||
996 | char *purl = strdup(url); | ||
997 | char realpath_buff[MAXPATHLEN]; | ||
998 | |||
999 | if (purl == NULL) | ||
1000 | _exit(242); | ||
1001 | |||
1002 | inFd = toCgi[0]; | ||
1003 | outFd = fromCgi[1]; | ||
1004 | |||
1005 | dup2(inFd, 0); // replace stdin with the pipe | ||
1006 | dup2(outFd, 1); // replace stdout with the pipe | ||
1007 | if (!DEBUG) | ||
1008 | dup2(outFd, 2); // replace stderr with the pipe | ||
1009 | |||
1010 | close(toCgi[0]); | ||
1011 | close(toCgi[1]); | ||
1012 | close(fromCgi[0]); | ||
1013 | close(fromCgi[1]); | ||
1014 | |||
1015 | close(config->accepted_socket); | ||
1016 | close(config->server_socket); | ||
1017 | |||
1018 | /* | ||
1019 | * Find PATH_INFO. | ||
1020 | */ | ||
1021 | script = purl; | ||
1022 | while ((script = strchr(script + 1, '/')) != NULL) { | ||
1023 | /* have script.cgi/PATH_INFO or dirs/script.cgi[/PATH_INFO] */ | ||
1024 | struct stat sb; | ||
1025 | |||
1026 | *script = '\0'; | ||
1027 | if (is_directory(purl + 1, 1, &sb) == 0) { | ||
1028 | /* not directory, found script.cgi/PATH_INFO */ | ||
1029 | *script = '/'; | ||
1030 | break; | ||
1031 | } | ||
1032 | *script = '/'; /* is directory, find next '/' */ | ||
1033 | } | ||
1034 | setenv1("PATH_INFO", script); /* set /PATH_INFO or "" */ | ||
1035 | /* setenv1("PATH", getenv("PATH")); redundant */ | ||
1036 | setenv1("REQUEST_METHOD", request); | ||
1037 | if (config->query) { | ||
1038 | char *uri = alloca(strlen(purl) + 2 + strlen(config->query)); | ||
1039 | if (uri) | ||
1040 | sprintf(uri, "%s?%s", purl, config->query); | ||
1041 | setenv1("REQUEST_URI", uri); | ||
1042 | } else { | ||
1043 | setenv1("REQUEST_URI", purl); | ||
1044 | } | ||
1045 | if (script != NULL) | ||
1046 | *script = '\0'; /* cut off /PATH_INFO */ | ||
1047 | /* SCRIPT_FILENAME required by PHP in CGI mode */ | ||
1048 | if (!realpath(purl + 1, realpath_buff)) | ||
1049 | goto error_execing_cgi; | ||
1050 | setenv1("SCRIPT_FILENAME", realpath_buff); | ||
1051 | /* set SCRIPT_NAME as full path: /cgi-bin/dirs/script.cgi */ | ||
1052 | setenv1("SCRIPT_NAME", purl); | ||
1053 | /* http://hoohoo.ncsa.uiuc.edu/cgi/env.html: | ||
1054 | * QUERY_STRING: The information which follows the ? in the URL | ||
1055 | * which referenced this script. This is the query information. | ||
1056 | * It should not be decoded in any fashion. This variable | ||
1057 | * should always be set when there is query information, | ||
1058 | * regardless of command line decoding. */ | ||
1059 | /* (Older versions of bbox seemed to do some decoding) */ | ||
1060 | setenv1("QUERY_STRING", config->query); | ||
1061 | setenv1("SERVER_SOFTWARE", httpdVersion); | ||
1062 | putenv("SERVER_PROTOCOL=HTTP/1.0"); | ||
1063 | putenv("GATEWAY_INTERFACE=CGI/1.1"); | ||
1064 | setenv1("REMOTE_ADDR", config->rmt_ip_str); | ||
1065 | #if ENABLE_FEATURE_HTTPD_SET_REMOTE_PORT_TO_ENV | ||
1066 | setenv_long("REMOTE_PORT", config->port); | ||
1067 | #endif | ||
1068 | if (bodyLen) | ||
1069 | setenv_long("CONTENT_LENGTH", bodyLen); | ||
1070 | if (cookie) | ||
1071 | setenv1("HTTP_COOKIE", cookie); | ||
1072 | if (content_type) | ||
1073 | setenv1("CONTENT_TYPE", content_type); | ||
1074 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
1075 | if (config->remoteuser) { | ||
1076 | setenv1("REMOTE_USER", config->remoteuser); | ||
1077 | putenv("AUTH_TYPE=Basic"); | ||
1078 | } | ||
1079 | #endif | ||
1080 | if (config->referer) | ||
1081 | setenv1("HTTP_REFERER", config->referer); | ||
1082 | |||
1083 | /* set execve argp[0] without path */ | ||
1084 | argp[0] = strrchr(purl, '/') + 1; | ||
1085 | /* but script argp[0] must have absolute path and chdiring to this */ | ||
1086 | script = strrchr(realpath_buff, '/'); | ||
1087 | if (!script) | ||
1088 | goto error_execing_cgi; | ||
1089 | *script = '\0'; | ||
1090 | if (chdir(realpath_buff) == 0) { | ||
1091 | // now run the program. If it fails, | ||
1092 | // use _exit() so no destructors | ||
1093 | // get called and make a mess. | ||
1094 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_SCRIPT_INTERPR | ||
1095 | char *interpr = NULL; | ||
1096 | char *suffix = strrchr(purl, '.'); | ||
1097 | |||
1098 | if (suffix) { | ||
1099 | Htaccess *cur; | ||
1100 | for (cur = config->script_i; cur; cur = cur->next) { | ||
1101 | if (strcmp(cur->before_colon + 1, suffix) == 0) { | ||
1102 | interpr = cur->after_colon; | ||
1103 | break; | ||
1104 | } | ||
1105 | } | ||
1106 | } | ||
1107 | #endif | ||
1108 | *script = '/'; | ||
1109 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_SCRIPT_INTERPR | ||
1110 | if (interpr) | ||
1111 | execv(interpr, argp); | ||
1112 | else | ||
1113 | #endif | ||
1114 | execv(realpath_buff, argp); | ||
1115 | } | ||
1116 | error_execing_cgi: | ||
1117 | /* send to stdout (even if we are not from inetd) */ | ||
1118 | config->accepted_socket = 1; | ||
1119 | sendHeaders(HTTP_NOT_FOUND); | ||
1120 | _exit(242); | ||
1121 | } /* end child */ | ||
1122 | |||
1123 | /* parent process */ | ||
1124 | |||
1125 | post_readed_size = 0; | ||
1126 | post_readed_idx = 0; | ||
1127 | inFd = fromCgi[0]; | ||
1128 | outFd = toCgi[1]; | ||
1129 | close(fromCgi[1]); | ||
1130 | close(toCgi[0]); | ||
1131 | signal(SIGPIPE, SIG_IGN); | ||
1132 | |||
1133 | while (1) { | ||
1134 | fd_set readSet; | ||
1135 | fd_set writeSet; | ||
1136 | char wbuf[128]; | ||
1137 | int nfound; | ||
1138 | int count; | ||
1139 | |||
1140 | FD_ZERO(&readSet); | ||
1141 | FD_ZERO(&writeSet); | ||
1142 | FD_SET(inFd, &readSet); | ||
1143 | if (bodyLen > 0 || post_readed_size > 0) { | ||
1144 | FD_SET(outFd, &writeSet); | ||
1145 | nfound = outFd > inFd ? outFd : inFd; | ||
1146 | if (post_readed_size == 0) { | ||
1147 | FD_SET(config->accepted_socket, &readSet); | ||
1148 | if (nfound < config->accepted_socket) | ||
1149 | nfound = config->accepted_socket; | ||
1150 | } | ||
1151 | /* Now wait on the set of sockets! */ | ||
1152 | nfound = select(nfound + 1, &readSet, &writeSet, 0, NULL); | ||
1153 | } else { | ||
1154 | if (!bodyLen) { | ||
1155 | close(outFd); | ||
1156 | bodyLen = -1; | ||
1157 | } | ||
1158 | nfound = select(inFd + 1, &readSet, 0, 0, NULL); | ||
1159 | } | ||
1160 | |||
1161 | if (nfound <= 0) { | ||
1162 | if (waitpid(pid, &status, WNOHANG) > 0) { | ||
1163 | close(inFd); | ||
1164 | if (DEBUG && WIFEXITED(status)) | ||
1165 | bb_error_msg("piped has exited with status=%d", WEXITSTATUS(status)); | ||
1166 | if (DEBUG && WIFSIGNALED(status)) | ||
1167 | bb_error_msg("piped has exited with signal=%d", WTERMSIG(status)); | ||
1168 | break; | ||
1169 | } | ||
1170 | } else if (post_readed_size > 0 && FD_ISSET(outFd, &writeSet)) { | ||
1171 | count = full_write(outFd, wbuf + post_readed_idx, post_readed_size); | ||
1172 | if (count > 0) { | ||
1173 | post_readed_size -= count; | ||
1174 | post_readed_idx += count; | ||
1175 | if (post_readed_size == 0) | ||
1176 | post_readed_idx = 0; | ||
1177 | } else { | ||
1178 | post_readed_size = post_readed_idx = bodyLen = 0; /* broken pipe to CGI */ | ||
1179 | } | ||
1180 | } else if (bodyLen > 0 && post_readed_size == 0 && FD_ISSET(config->accepted_socket, &readSet)) { | ||
1181 | count = bodyLen > (int)sizeof(wbuf) ? (int)sizeof(wbuf) : bodyLen; | ||
1182 | count = safe_read(config->accepted_socket, wbuf, count); | ||
1183 | if (count > 0) { | ||
1184 | post_readed_size += count; | ||
1185 | bodyLen -= count; | ||
1186 | } else { | ||
1187 | bodyLen = 0; /* closed */ | ||
1188 | } | ||
1189 | } | ||
1190 | if (FD_ISSET(inFd, &readSet)) { | ||
1191 | int s = config->accepted_socket; | ||
1192 | char *rbuf = config->buf; | ||
1193 | |||
1194 | #ifndef PIPE_BUF | ||
1195 | # define PIPESIZE 4096 /* amount of buffering in a pipe */ | ||
1196 | #else | ||
1197 | # define PIPESIZE PIPE_BUF | ||
1198 | #endif | ||
1199 | #if PIPESIZE >= MAX_MEMORY_BUFF | ||
1200 | # error "PIPESIZE >= MAX_MEMORY_BUFF" | ||
1201 | #endif | ||
1202 | |||
1203 | /* There is something to read */ | ||
1204 | count = safe_read(inFd, rbuf, PIPESIZE); | ||
1205 | if (count == 0) | ||
1206 | break; /* closed */ | ||
1207 | if (count > 0) { | ||
1208 | if (firstLine) { | ||
1209 | rbuf[count] = 0; | ||
1210 | /* check to see if the user script added headers */ | ||
1211 | if (strncmp(rbuf, "HTTP/1.0 200 OK\r\n", 4) != 0) { | ||
1212 | full_write(s, "HTTP/1.0 200 OK\r\n", 17); | ||
1213 | } | ||
1214 | /* Sometimes CGI is writing to pipe in small chunks | ||
1215 | * and we don't see Content-type (because the read | ||
1216 | * is too short) and we emit bogus "text/plain"! | ||
1217 | * Is it a bug or CGI *has to* write it in one piece? */ | ||
1218 | if (strstr(rbuf, "ontent-") == 0) { | ||
1219 | full_write(s, "Content-type: text/plain\r\n\r\n", 28); | ||
1220 | } | ||
1221 | firstLine = 0; | ||
1222 | } | ||
1223 | if (full_write(s, rbuf, count) != count) | ||
1224 | break; | ||
1225 | |||
1226 | if (DEBUG) | ||
1227 | fprintf(stderr, "cgi read %d bytes: '%.*s'\n", count, count, rbuf); | ||
1228 | } | ||
1229 | } | ||
1230 | } | ||
1231 | return 0; | ||
1232 | } | ||
1233 | #endif /* FEATURE_HTTPD_CGI */ | ||
1234 | |||
1235 | /**************************************************************************** | ||
1236 | * | ||
1237 | > $Function: sendFile() | ||
1238 | * | ||
1239 | * $Description: Send a file response to a HTTP request | ||
1240 | * | ||
1241 | * $Parameter: | ||
1242 | * (const char *) url . . The URL requested. | ||
1243 | * | ||
1244 | * $Return: (int) . . . . . . Always 0. | ||
1245 | * | ||
1246 | ****************************************************************************/ | ||
1247 | static int sendFile(const char *url) | ||
1248 | { | ||
1249 | char * suffix; | ||
1250 | int f; | ||
1251 | const char * const * table; | ||
1252 | const char * try_suffix; | ||
1253 | |||
1254 | suffix = strrchr(url, '.'); | ||
1255 | |||
1256 | for (table = suffixTable; *table; table += 2) | ||
1257 | if (suffix != NULL && (try_suffix = strstr(*table, suffix)) != 0) { | ||
1258 | try_suffix += strlen(suffix); | ||
1259 | if (*try_suffix == 0 || *try_suffix == '.') | ||
1260 | break; | ||
1261 | } | ||
1262 | /* also, if not found, set default as "application/octet-stream"; */ | ||
1263 | config->found_mime_type = table[1]; | ||
1264 | #if ENABLE_FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES | ||
1265 | if (suffix) { | ||
1266 | Htaccess * cur; | ||
1267 | |||
1268 | for (cur = config->mime_a; cur; cur = cur->next) { | ||
1269 | if (strcmp(cur->before_colon, suffix) == 0) { | ||
1270 | config->found_mime_type = cur->after_colon; | ||
1271 | break; | ||
1272 | } | ||
1273 | } | ||
1274 | } | ||
1275 | #endif /* FEATURE_HTTPD_CONFIG_WITH_MIME_TYPES */ | ||
1276 | |||
1277 | if (DEBUG) | ||
1278 | fprintf(stderr, "sending file '%s' content-type: %s\n", | ||
1279 | url, config->found_mime_type); | ||
1280 | |||
1281 | f = open(url, O_RDONLY); | ||
1282 | if (f >= 0) { | ||
1283 | int count; | ||
1284 | char *buf = config->buf; | ||
1285 | |||
1286 | sendHeaders(HTTP_OK); | ||
1287 | /* TODO: sendfile() */ | ||
1288 | while ((count = full_read(f, buf, MAX_MEMORY_BUFF)) > 0) { | ||
1289 | if (full_write(config->accepted_socket, buf, count) != count) | ||
1290 | break; | ||
1291 | } | ||
1292 | close(f); | ||
1293 | } else { | ||
1294 | if (DEBUG) | ||
1295 | bb_perror_msg("cannot open '%s'", url); | ||
1296 | sendHeaders(HTTP_NOT_FOUND); | ||
1297 | } | ||
1298 | |||
1299 | return 0; | ||
1300 | } | ||
1301 | |||
1302 | static int checkPermIP(void) | ||
1303 | { | ||
1304 | Htaccess_IP * cur; | ||
1305 | |||
1306 | /* This could stand some work */ | ||
1307 | for (cur = config->ip_a_d; cur; cur = cur->next) { | ||
1308 | if (DEBUG) | ||
1309 | fprintf(stderr, "checkPermIP: '%s' ? ", config->rmt_ip_str); | ||
1310 | if (DEBUG) | ||
1311 | fprintf(stderr, "'%u.%u.%u.%u/%u.%u.%u.%u'\n", | ||
1312 | (unsigned char)(cur->ip >> 24), | ||
1313 | (unsigned char)(cur->ip >> 16), | ||
1314 | (unsigned char)(cur->ip >> 8), | ||
1315 | cur->ip & 0xff, | ||
1316 | (unsigned char)(cur->mask >> 24), | ||
1317 | (unsigned char)(cur->mask >> 16), | ||
1318 | (unsigned char)(cur->mask >> 8), | ||
1319 | cur->mask & 0xff); | ||
1320 | if ((config->rmt_ip & cur->mask) == cur->ip) | ||
1321 | return cur->allow_deny == 'A'; /* Allow/Deny */ | ||
1322 | } | ||
1323 | |||
1324 | /* if unconfigured, return 1 - access from all */ | ||
1325 | return !config->flg_deny_all; | ||
1326 | } | ||
1327 | |||
1328 | /**************************************************************************** | ||
1329 | * | ||
1330 | > $Function: checkPerm() | ||
1331 | * | ||
1332 | * $Description: Check the permission file for access password protected. | ||
1333 | * | ||
1334 | * If config file isn't present, everything is allowed. | ||
1335 | * Entries are of the form you can see example from header source | ||
1336 | * | ||
1337 | * $Parameters: | ||
1338 | * (const char *) path . . . . The file path. | ||
1339 | * (const char *) request . . . User information to validate. | ||
1340 | * | ||
1341 | * $Return: (int) . . . . . . . . . 1 if request OK, 0 otherwise. | ||
1342 | * | ||
1343 | ****************************************************************************/ | ||
1344 | |||
1345 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
1346 | static int checkPerm(const char *path, const char *request) | ||
1347 | { | ||
1348 | Htaccess * cur; | ||
1349 | const char *p; | ||
1350 | const char *p0; | ||
1351 | |||
1352 | const char *prev = NULL; | ||
1353 | |||
1354 | /* This could stand some work */ | ||
1355 | for (cur = config->auth; cur; cur = cur->next) { | ||
1356 | size_t l; | ||
1357 | |||
1358 | p0 = cur->before_colon; | ||
1359 | if (prev != NULL && strcmp(prev, p0) != 0) | ||
1360 | continue; /* find next identical */ | ||
1361 | p = cur->after_colon; | ||
1362 | if (DEBUG) | ||
1363 | fprintf(stderr, "checkPerm: '%s' ? '%s'\n", p0, request); | ||
1364 | |||
1365 | l = strlen(p0); | ||
1366 | if (strncmp(p0, path, l) == 0 | ||
1367 | && (l == 1 || path[l] == '/' || path[l] == '\0') | ||
1368 | ) { | ||
1369 | char *u; | ||
1370 | /* path match found. Check request */ | ||
1371 | /* for check next /path:user:password */ | ||
1372 | prev = p0; | ||
1373 | u = strchr(request, ':'); | ||
1374 | if (u == NULL) { | ||
1375 | /* bad request, ':' required */ | ||
1376 | break; | ||
1377 | } | ||
1378 | |||
1379 | if (ENABLE_FEATURE_HTTPD_AUTH_MD5) { | ||
1380 | char *cipher; | ||
1381 | char *pp; | ||
1382 | |||
1383 | if (strncmp(p, request, u-request) != 0) { | ||
1384 | /* user uncompared */ | ||
1385 | continue; | ||
1386 | } | ||
1387 | pp = strchr(p, ':'); | ||
1388 | if (pp && pp[1] == '$' && pp[2] == '1' && | ||
1389 | pp[3] == '$' && pp[4]) { | ||
1390 | pp++; | ||
1391 | cipher = pw_encrypt(u+1, pp); | ||
1392 | if (strcmp(cipher, pp) == 0) | ||
1393 | goto set_remoteuser_var; /* Ok */ | ||
1394 | /* unauthorized */ | ||
1395 | continue; | ||
1396 | } | ||
1397 | } | ||
1398 | |||
1399 | if (strcmp(p, request) == 0) { | ||
1400 | set_remoteuser_var: | ||
1401 | config->remoteuser = strdup(request); | ||
1402 | if (config->remoteuser) | ||
1403 | config->remoteuser[(u - request)] = 0; | ||
1404 | return 1; /* Ok */ | ||
1405 | } | ||
1406 | /* unauthorized */ | ||
1407 | } | ||
1408 | } /* for */ | ||
1409 | |||
1410 | return prev == NULL; | ||
1411 | } | ||
1412 | |||
1413 | #endif /* FEATURE_HTTPD_BASIC_AUTH */ | ||
1414 | |||
1415 | /**************************************************************************** | ||
1416 | * | ||
1417 | > $Function: handle_sigalrm() | ||
1418 | * | ||
1419 | * $Description: Handle timeouts | ||
1420 | * | ||
1421 | ****************************************************************************/ | ||
1422 | |||
1423 | static void handle_sigalrm(int sig) | ||
1424 | { | ||
1425 | sendHeaders(HTTP_REQUEST_TIMEOUT); | ||
1426 | config->alarm_signaled = sig; | ||
1427 | } | ||
1428 | |||
1429 | /**************************************************************************** | ||
1430 | * | ||
1431 | > $Function: handleIncoming() | ||
1432 | * | ||
1433 | * $Description: Handle an incoming http request. | ||
1434 | * | ||
1435 | ****************************************************************************/ | ||
1436 | static void handleIncoming(void) | ||
1437 | { | ||
1438 | char *buf = config->buf; | ||
1439 | char *url; | ||
1440 | char *purl; | ||
1441 | int blank = -1; | ||
1442 | char *test; | ||
1443 | struct stat sb; | ||
1444 | int ip_allowed; | ||
1445 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1446 | const char *prequest = request_GET; | ||
1447 | unsigned long length = 0; | ||
1448 | char *cookie = 0; | ||
1449 | char *content_type = 0; | ||
1450 | #endif | ||
1451 | fd_set s_fd; | ||
1452 | struct timeval tv; | ||
1453 | int retval; | ||
1454 | struct sigaction sa; | ||
1455 | |||
1456 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
1457 | int credentials = -1; /* if not required this is Ok */ | ||
1458 | #endif | ||
1459 | |||
1460 | sa.sa_handler = handle_sigalrm; | ||
1461 | sigemptyset(&sa.sa_mask); | ||
1462 | sa.sa_flags = 0; /* no SA_RESTART */ | ||
1463 | sigaction(SIGALRM, &sa, NULL); | ||
1464 | |||
1465 | do { | ||
1466 | int count; | ||
1467 | |||
1468 | (void) alarm(TIMEOUT); | ||
1469 | if (getLine() <= 0) | ||
1470 | break; /* closed */ | ||
1471 | |||
1472 | purl = strpbrk(buf, " \t"); | ||
1473 | if (purl == NULL) { | ||
1474 | BAD_REQUEST: | ||
1475 | sendHeaders(HTTP_BAD_REQUEST); | ||
1476 | break; | ||
1477 | } | ||
1478 | *purl = '\0'; | ||
1479 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1480 | if (strcasecmp(buf, prequest) != 0) { | ||
1481 | prequest = "POST"; | ||
1482 | if (strcasecmp(buf, prequest) != 0) { | ||
1483 | sendHeaders(HTTP_NOT_IMPLEMENTED); | ||
1484 | break; | ||
1485 | } | ||
1486 | } | ||
1487 | #else | ||
1488 | if (strcasecmp(buf, request_GET) != 0) { | ||
1489 | sendHeaders(HTTP_NOT_IMPLEMENTED); | ||
1490 | break; | ||
1491 | } | ||
1492 | #endif | ||
1493 | *purl = ' '; | ||
1494 | count = sscanf(purl, " %[^ ] HTTP/%d.%*d", buf, &blank); | ||
1495 | |||
1496 | if (count < 1 || buf[0] != '/') { | ||
1497 | /* Garbled request/URL */ | ||
1498 | goto BAD_REQUEST; | ||
1499 | } | ||
1500 | url = alloca(strlen(buf) + sizeof("/index.html")); | ||
1501 | if (url == NULL) { | ||
1502 | sendHeaders(HTTP_INTERNAL_SERVER_ERROR); | ||
1503 | break; | ||
1504 | } | ||
1505 | strcpy(url, buf); | ||
1506 | /* extract url args if present */ | ||
1507 | test = strchr(url, '?'); | ||
1508 | config->query = NULL; | ||
1509 | if (test) { | ||
1510 | *test++ = '\0'; | ||
1511 | config->query = test; | ||
1512 | } | ||
1513 | |||
1514 | test = decodeString(url, 0); | ||
1515 | if (test == NULL) | ||
1516 | goto BAD_REQUEST; | ||
1517 | if (test == url+1) { | ||
1518 | /* '/' or NUL is encoded */ | ||
1519 | sendHeaders(HTTP_NOT_FOUND); | ||
1520 | break; | ||
1521 | } | ||
1522 | |||
1523 | /* algorithm stolen from libbb bb_simplify_path(), | ||
1524 | but don't strdup and reducing trailing slash and protect out root */ | ||
1525 | purl = test = url; | ||
1526 | do { | ||
1527 | if (*purl == '/') { | ||
1528 | /* skip duplicate (or initial) slash */ | ||
1529 | if (*test == '/') { | ||
1530 | continue; | ||
1531 | } | ||
1532 | if (*test == '.') { | ||
1533 | /* skip extra '.' */ | ||
1534 | if (test[1] == '/' || test[1] == 0) { | ||
1535 | continue; | ||
1536 | } else | ||
1537 | /* '..': be careful */ | ||
1538 | if (test[1] == '.' && (test[2] == '/' || test[2] == 0)) { | ||
1539 | ++test; | ||
1540 | if (purl == url) { | ||
1541 | /* protect out root */ | ||
1542 | goto BAD_REQUEST; | ||
1543 | } | ||
1544 | while (*--purl != '/') /* omit previous dir */; | ||
1545 | continue; | ||
1546 | } | ||
1547 | } | ||
1548 | } | ||
1549 | *++purl = *test; | ||
1550 | } while (*++test); | ||
1551 | *++purl = '\0'; /* so keep last character */ | ||
1552 | test = purl; /* end ptr */ | ||
1553 | |||
1554 | /* If URL is directory, adding '/' */ | ||
1555 | if (test[-1] != '/') { | ||
1556 | if (is_directory(url + 1, 1, &sb)) { | ||
1557 | config->found_moved_temporarily = url; | ||
1558 | } | ||
1559 | } | ||
1560 | if (DEBUG) | ||
1561 | fprintf(stderr, "url='%s', args=%s\n", url, config->query); | ||
1562 | |||
1563 | test = url; | ||
1564 | ip_allowed = checkPermIP(); | ||
1565 | while (ip_allowed && (test = strchr(test + 1, '/')) != NULL) { | ||
1566 | /* have path1/path2 */ | ||
1567 | *test = '\0'; | ||
1568 | if (is_directory(url + 1, 1, &sb)) { | ||
1569 | /* may be having subdir config */ | ||
1570 | parse_conf(url + 1, SUBDIR_PARSE); | ||
1571 | ip_allowed = checkPermIP(); | ||
1572 | } | ||
1573 | *test = '/'; | ||
1574 | } | ||
1575 | if (blank >= 0) { | ||
1576 | /* read until blank line for HTTP version specified, else parse immediate */ | ||
1577 | while (1) { | ||
1578 | alarm(TIMEOUT); | ||
1579 | count = getLine(); | ||
1580 | if (count <= 0) | ||
1581 | break; | ||
1582 | |||
1583 | if (DEBUG) | ||
1584 | fprintf(stderr, "header: '%s'\n", buf); | ||
1585 | |||
1586 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1587 | /* try and do our best to parse more lines */ | ||
1588 | if ((STRNCASECMP(buf, "Content-length:") == 0)) { | ||
1589 | /* extra read only for POST */ | ||
1590 | if (prequest != request_GET) { | ||
1591 | test = buf + sizeof("Content-length:")-1; | ||
1592 | if (!test[0]) goto bail_out; | ||
1593 | errno = 0; | ||
1594 | /* not using strtoul: it ignores leading munis! */ | ||
1595 | length = strtol(test, &test, 10); | ||
1596 | /* length is "ulong", but we need to pass it to int later */ | ||
1597 | /* so we check for negative or too large values in one go: */ | ||
1598 | /* (long -> ulong conv caused negatives to be seen as > INT_MAX) */ | ||
1599 | if (test[0] || errno || length > INT_MAX) | ||
1600 | goto bail_out; | ||
1601 | } | ||
1602 | } else if ((STRNCASECMP(buf, "Cookie:") == 0)) { | ||
1603 | cookie = strdup(skip_whitespace(buf + sizeof("Cookie:")-1)); | ||
1604 | } else if ((STRNCASECMP(buf, "Content-Type:") == 0)) { | ||
1605 | content_type = strdup(skip_whitespace(buf + sizeof("Content-Type:")-1)); | ||
1606 | } else if ((STRNCASECMP(buf, "Referer:") == 0)) { | ||
1607 | config->referer = strdup(skip_whitespace(buf + sizeof("Referer:")-1)); | ||
1608 | } | ||
1609 | #endif | ||
1610 | |||
1611 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
1612 | if (STRNCASECMP(buf, "Authorization:") == 0) { | ||
1613 | /* We only allow Basic credentials. | ||
1614 | * It shows up as "Authorization: Basic <userid:password>" where | ||
1615 | * the userid:password is base64 encoded. | ||
1616 | */ | ||
1617 | test = skip_whitespace(buf + sizeof("Authorization:")-1); | ||
1618 | if (STRNCASECMP(test, "Basic") != 0) | ||
1619 | continue; | ||
1620 | test += sizeof("Basic")-1; | ||
1621 | /* decodeBase64() skips whitespace itself */ | ||
1622 | decodeBase64(test); | ||
1623 | credentials = checkPerm(url, test); | ||
1624 | } | ||
1625 | #endif /* FEATURE_HTTPD_BASIC_AUTH */ | ||
1626 | |||
1627 | } /* while extra header reading */ | ||
1628 | } | ||
1629 | alarm(0); | ||
1630 | if (config->alarm_signaled) | ||
1631 | break; | ||
1632 | |||
1633 | if (strcmp(strrchr(url, '/') + 1, httpd_conf) == 0 || ip_allowed == 0) { | ||
1634 | /* protect listing [/path]/httpd_conf or IP deny */ | ||
1635 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1636 | FORBIDDEN: /* protect listing /cgi-bin */ | ||
1637 | #endif | ||
1638 | sendHeaders(HTTP_FORBIDDEN); | ||
1639 | break; | ||
1640 | } | ||
1641 | |||
1642 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
1643 | if (credentials <= 0 && checkPerm(url, ":") == 0) { | ||
1644 | sendHeaders(HTTP_UNAUTHORIZED); | ||
1645 | break; | ||
1646 | } | ||
1647 | #endif | ||
1648 | |||
1649 | if (config->found_moved_temporarily) { | ||
1650 | sendHeaders(HTTP_MOVED_TEMPORARILY); | ||
1651 | /* clear unforked memory flag */ | ||
1652 | config->found_moved_temporarily = NULL; | ||
1653 | break; | ||
1654 | } | ||
1655 | |||
1656 | test = url + 1; /* skip first '/' */ | ||
1657 | |||
1658 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1659 | if (strncmp(test, "cgi-bin", 7) == 0) { | ||
1660 | if (test[7] == '/' && test[8] == 0) | ||
1661 | goto FORBIDDEN; /* protect listing cgi-bin/ */ | ||
1662 | sendCgi(url, prequest, length, cookie, content_type); | ||
1663 | break; | ||
1664 | } | ||
1665 | if (prequest != request_GET) { | ||
1666 | sendHeaders(HTTP_NOT_IMPLEMENTED); | ||
1667 | break; | ||
1668 | } | ||
1669 | #endif /* FEATURE_HTTPD_CGI */ | ||
1670 | if (purl[-1] == '/') | ||
1671 | strcpy(purl, "index.html"); | ||
1672 | if (stat(test, &sb) == 0) { | ||
1673 | /* It's a dir URL and there is index.html */ | ||
1674 | config->ContentLength = sb.st_size; | ||
1675 | config->last_mod = sb.st_mtime; | ||
1676 | } | ||
1677 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1678 | else if (purl[-1] == '/') { | ||
1679 | /* It's a dir URL and there is no index.html | ||
1680 | * Try cgi-bin/index.cgi */ | ||
1681 | if (access("/cgi-bin/index.cgi"+1, X_OK) == 0) { | ||
1682 | purl[0] = '\0'; | ||
1683 | config->query = url; | ||
1684 | sendCgi("/cgi-bin/index.cgi", prequest, length, cookie, content_type); | ||
1685 | break; | ||
1686 | } | ||
1687 | } | ||
1688 | #endif /* FEATURE_HTTPD_CGI */ | ||
1689 | sendFile(test); | ||
1690 | config->ContentLength = -1; | ||
1691 | } while (0); | ||
1692 | |||
1693 | bail_out: | ||
1694 | |||
1695 | if (DEBUG) | ||
1696 | fprintf(stderr, "closing socket\n\n"); | ||
1697 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1698 | free(cookie); | ||
1699 | free(content_type); | ||
1700 | free(config->referer); | ||
1701 | config->referer = NULL; | ||
1702 | # if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
1703 | free(config->remoteuser); | ||
1704 | config->remoteuser = NULL; | ||
1705 | # endif | ||
1706 | #endif | ||
1707 | shutdown(config->accepted_socket, SHUT_WR); | ||
1708 | |||
1709 | /* Properly wait for remote to closed */ | ||
1710 | FD_ZERO(&s_fd); | ||
1711 | FD_SET(config->accepted_socket, &s_fd); | ||
1712 | |||
1713 | do { | ||
1714 | tv.tv_sec = 2; | ||
1715 | tv.tv_usec = 0; | ||
1716 | retval = select(config->accepted_socket + 1, &s_fd, NULL, NULL, &tv); | ||
1717 | } while (retval > 0 && read(config->accepted_socket, buf, sizeof(config->buf) > 0)); | ||
1718 | |||
1719 | shutdown(config->accepted_socket, SHUT_RD); | ||
1720 | /* In inetd case, we close fd 1 (stdout) here. We will exit soon anyway */ | ||
1721 | close(config->accepted_socket); | ||
1722 | } | ||
1723 | |||
1724 | /**************************************************************************** | ||
1725 | * | ||
1726 | > $Function: miniHttpd() | ||
1727 | * | ||
1728 | * $Description: The main http server function. | ||
1729 | * | ||
1730 | * Given an open socket fildes, listen for new connections and farm out | ||
1731 | * the processing as a forked process. | ||
1732 | * | ||
1733 | * $Parameters: | ||
1734 | * (int) server. . . The server socket fildes. | ||
1735 | * | ||
1736 | * $Return: (int) . . . . Always 0. | ||
1737 | * | ||
1738 | ****************************************************************************/ | ||
1739 | static int miniHttpd(int server) | ||
1740 | { | ||
1741 | fd_set readfd, portfd; | ||
1742 | |||
1743 | FD_ZERO(&portfd); | ||
1744 | FD_SET(server, &portfd); | ||
1745 | |||
1746 | /* copy the ports we are watching to the readfd set */ | ||
1747 | while (1) { | ||
1748 | int on, s; | ||
1749 | socklen_t fromAddrLen; | ||
1750 | struct sockaddr_in fromAddr; | ||
1751 | |||
1752 | /* Now wait INDEFINITELY on the set of sockets! */ | ||
1753 | readfd = portfd; | ||
1754 | if (select(server + 1, &readfd, 0, 0, 0) <= 0) | ||
1755 | continue; | ||
1756 | if (!FD_ISSET(server, &readfd)) | ||
1757 | continue; | ||
1758 | fromAddrLen = sizeof(fromAddr); | ||
1759 | s = accept(server, (struct sockaddr *)&fromAddr, &fromAddrLen); | ||
1760 | if (s < 0) | ||
1761 | continue; | ||
1762 | config->accepted_socket = s; | ||
1763 | config->rmt_ip = ntohl(fromAddr.sin_addr.s_addr); | ||
1764 | #if ENABLE_FEATURE_HTTPD_CGI || DEBUG | ||
1765 | sprintf(config->rmt_ip_str, "%u.%u.%u.%u", | ||
1766 | (unsigned char)(config->rmt_ip >> 24), | ||
1767 | (unsigned char)(config->rmt_ip >> 16), | ||
1768 | (unsigned char)(config->rmt_ip >> 8), | ||
1769 | config->rmt_ip & 0xff); | ||
1770 | config->port = ntohs(fromAddr.sin_port); | ||
1771 | #if DEBUG | ||
1772 | bb_error_msg("connection from IP=%s, port %u", | ||
1773 | config->rmt_ip_str, config->port); | ||
1774 | #endif | ||
1775 | #endif /* FEATURE_HTTPD_CGI */ | ||
1776 | |||
1777 | /* set the KEEPALIVE option to cull dead connections */ | ||
1778 | on = 1; | ||
1779 | setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, (void *)&on, sizeof(on)); | ||
1780 | |||
1781 | if (DEBUG || fork() == 0) { | ||
1782 | /* child */ | ||
1783 | #if ENABLE_FEATURE_HTTPD_RELOAD_CONFIG_SIGHUP | ||
1784 | /* protect reload config, may be confuse checking */ | ||
1785 | signal(SIGHUP, SIG_IGN); | ||
1786 | #endif | ||
1787 | handleIncoming(); | ||
1788 | if (!DEBUG) | ||
1789 | exit(0); | ||
1790 | } | ||
1791 | close(s); | ||
1792 | } /* while (1) */ | ||
1793 | return 0; | ||
1794 | } | ||
1795 | |||
1796 | /* from inetd */ | ||
1797 | static int miniHttpd_inetd(void) | ||
1798 | { | ||
1799 | struct sockaddr_in fromAddrLen; | ||
1800 | socklen_t sinlen = sizeof(struct sockaddr_in); | ||
1801 | |||
1802 | getpeername(0, (struct sockaddr *)&fromAddrLen, &sinlen); | ||
1803 | config->rmt_ip = ntohl(fromAddrLen.sin_addr.s_addr); | ||
1804 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1805 | sprintf(config->rmt_ip_str, "%u.%u.%u.%u", | ||
1806 | (unsigned char)(config->rmt_ip >> 24), | ||
1807 | (unsigned char)(config->rmt_ip >> 16), | ||
1808 | (unsigned char)(config->rmt_ip >> 8), | ||
1809 | config->rmt_ip & 0xff); | ||
1810 | #endif | ||
1811 | config->port = ntohs(fromAddrLen.sin_port); | ||
1812 | handleIncoming(); | ||
1813 | return 0; | ||
1814 | } | ||
1815 | |||
1816 | #if ENABLE_FEATURE_HTTPD_RELOAD_CONFIG_SIGHUP | ||
1817 | static void sighup_handler(int sig) | ||
1818 | { | ||
1819 | /* set and reset */ | ||
1820 | struct sigaction sa; | ||
1821 | |||
1822 | parse_conf(default_path_httpd_conf, sig == SIGHUP ? SIGNALED_PARSE : FIRST_PARSE); | ||
1823 | sa.sa_handler = sighup_handler; | ||
1824 | sigemptyset(&sa.sa_mask); | ||
1825 | sa.sa_flags = SA_RESTART; | ||
1826 | sigaction(SIGHUP, &sa, NULL); | ||
1827 | } | ||
1828 | #endif | ||
1829 | |||
1830 | enum { | ||
1831 | c_opt_config_file = 0, | ||
1832 | d_opt_decode_url, | ||
1833 | h_opt_home_httpd, | ||
1834 | USE_FEATURE_HTTPD_ENCODE_URL_STR(e_opt_encode_url,) | ||
1835 | USE_FEATURE_HTTPD_BASIC_AUTH( r_opt_realm ,) | ||
1836 | USE_FEATURE_HTTPD_AUTH_MD5( m_opt_md5 ,) | ||
1837 | USE_FEATURE_HTTPD_SETUID( u_opt_setuid ,) | ||
1838 | p_opt_port , | ||
1839 | p_opt_inetd , | ||
1840 | p_opt_foreground, | ||
1841 | OPT_CONFIG_FILE = 1 << c_opt_config_file, | ||
1842 | OPT_DECODE_URL = 1 << d_opt_decode_url, | ||
1843 | OPT_HOME_HTTPD = 1 << h_opt_home_httpd, | ||
1844 | OPT_ENCODE_URL = USE_FEATURE_HTTPD_ENCODE_URL_STR((1 << e_opt_encode_url)) + 0, | ||
1845 | OPT_REALM = USE_FEATURE_HTTPD_BASIC_AUTH( (1 << r_opt_realm )) + 0, | ||
1846 | OPT_MD5 = USE_FEATURE_HTTPD_AUTH_MD5( (1 << m_opt_md5 )) + 0, | ||
1847 | OPT_SETUID = USE_FEATURE_HTTPD_SETUID( (1 << u_opt_setuid )) + 0, | ||
1848 | OPT_PORT = 1 << p_opt_port, | ||
1849 | OPT_INETD = 1 << p_opt_inetd, | ||
1850 | OPT_FOREGROUND = 1 << p_opt_foreground, | ||
1851 | }; | ||
1852 | |||
1853 | static const char httpd_opts[] = "c:d:h:" | ||
1854 | USE_FEATURE_HTTPD_ENCODE_URL_STR("e:") | ||
1855 | USE_FEATURE_HTTPD_BASIC_AUTH("r:") | ||
1856 | USE_FEATURE_HTTPD_AUTH_MD5("m:") | ||
1857 | USE_FEATURE_HTTPD_SETUID("u:") | ||
1858 | "p:if"; | ||
1859 | |||
1860 | |||
1861 | int httpd_main(int argc, char *argv[]) | ||
1862 | { | ||
1863 | unsigned opt; | ||
1864 | const char *home_httpd = home; | ||
1865 | char *url_for_decode; | ||
1866 | USE_FEATURE_HTTPD_ENCODE_URL_STR(const char *url_for_encode;) | ||
1867 | const char *s_port; | ||
1868 | USE_FEATURE_HTTPD_SETUID(const char *s_ugid = NULL;) | ||
1869 | USE_FEATURE_HTTPD_SETUID(struct bb_uidgid_t ugid;) | ||
1870 | USE_FEATURE_HTTPD_AUTH_MD5(const char *pass;) | ||
1871 | |||
1872 | #if ENABLE_LOCALE_SUPPORT | ||
1873 | /* Undo busybox.c: we want to speak English in http (dates etc) */ | ||
1874 | setlocale(LC_TIME, "C"); | ||
1875 | #endif | ||
1876 | |||
1877 | config = xzalloc(sizeof(*config)); | ||
1878 | #if ENABLE_FEATURE_HTTPD_BASIC_AUTH | ||
1879 | config->realm = "Web Server Authentication"; | ||
1880 | #endif | ||
1881 | config->port = 80; | ||
1882 | config->ContentLength = -1; | ||
1883 | |||
1884 | opt = getopt32(argc, argv, httpd_opts, | ||
1885 | &(config->configFile), &url_for_decode, &home_httpd | ||
1886 | USE_FEATURE_HTTPD_ENCODE_URL_STR(, &url_for_encode) | ||
1887 | USE_FEATURE_HTTPD_BASIC_AUTH(, &(config->realm)) | ||
1888 | USE_FEATURE_HTTPD_AUTH_MD5(, &pass) | ||
1889 | USE_FEATURE_HTTPD_SETUID(, &s_ugid) | ||
1890 | , &s_port | ||
1891 | ); | ||
1892 | if (opt & OPT_DECODE_URL) { | ||
1893 | printf("%s", decodeString(url_for_decode, 1)); | ||
1894 | return 0; | ||
1895 | } | ||
1896 | #if ENABLE_FEATURE_HTTPD_ENCODE_URL_STR | ||
1897 | if (opt & OPT_ENCODE_URL) { | ||
1898 | printf("%s", encodeString(url_for_encode)); | ||
1899 | return 0; | ||
1900 | } | ||
1901 | #endif | ||
1902 | #if ENABLE_FEATURE_HTTPD_AUTH_MD5 | ||
1903 | if (opt & OPT_MD5) { | ||
1904 | puts(pw_encrypt(pass, "$1$")); | ||
1905 | return 0; | ||
1906 | } | ||
1907 | #endif | ||
1908 | if (opt & OPT_PORT) | ||
1909 | config->port = xatou16(s_port); | ||
1910 | |||
1911 | #if ENABLE_FEATURE_HTTPD_SETUID | ||
1912 | if (opt & OPT_SETUID) { | ||
1913 | char *e; | ||
1914 | // FIXME: what the default group should be? | ||
1915 | ugid.gid = -1; | ||
1916 | ugid.uid = bb_strtoul(s_ugid, &e, 0); | ||
1917 | if (*e == ':') { | ||
1918 | e++; | ||
1919 | ugid.gid = bb_strtoul(e, NULL, 0); | ||
1920 | } | ||
1921 | if (errno) { | ||
1922 | /* not integer */ | ||
1923 | if (!uidgid_get(&ugid, s_ugid)) | ||
1924 | bb_error_msg_and_die("unrecognized user[:group] " | ||
1925 | "name '%s'", s_ugid); | ||
1926 | } | ||
1927 | } | ||
1928 | #endif | ||
1929 | |||
1930 | xchdir(home_httpd); | ||
1931 | if (!(opt & OPT_INETD)) { | ||
1932 | config->server_socket = openServer(); | ||
1933 | #if ENABLE_FEATURE_HTTPD_SETUID | ||
1934 | /* drop privileges */ | ||
1935 | if (opt & OPT_SETUID) { | ||
1936 | if (ugid.gid != (gid_t)-1) { | ||
1937 | if (setgroups(1, &ugid.gid) == -1) | ||
1938 | bb_perror_msg_and_die("setgroups"); | ||
1939 | xsetgid(ugid.gid); | ||
1940 | } | ||
1941 | xsetuid(ugid.uid); | ||
1942 | } | ||
1943 | #endif | ||
1944 | } | ||
1945 | |||
1946 | #if ENABLE_FEATURE_HTTPD_CGI | ||
1947 | { | ||
1948 | char *p = getenv("PATH"); | ||
1949 | p = xstrdup(p); /* if gets NULL, returns NULL */ | ||
1950 | clearenv(); | ||
1951 | if (p) | ||
1952 | setenv1("PATH", p); | ||
1953 | if (!(opt & OPT_INETD)) | ||
1954 | setenv_long("SERVER_PORT", config->port); | ||
1955 | } | ||
1956 | #endif | ||
1957 | |||
1958 | #if ENABLE_FEATURE_HTTPD_RELOAD_CONFIG_SIGHUP | ||
1959 | sighup_handler(0); | ||
1960 | #else | ||
1961 | parse_conf(default_path_httpd_conf, FIRST_PARSE); | ||
1962 | #endif | ||
1963 | |||
1964 | if (opt & OPT_INETD) | ||
1965 | return miniHttpd_inetd(); | ||
1966 | |||
1967 | if (!(opt & OPT_FOREGROUND)) | ||
1968 | xdaemon(1, 0); /* don't change current directory */ | ||
1969 | return miniHttpd(config->server_socket); | ||
1970 | } | ||