2 ashd - A Sane HTTP Daemon
3 Copyright (C) 2008 Fredrik Tolf <fredrik@dolda2000.com>
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
33 static char **environ;
35 static void passdata(FILE *in, FILE *out)
42 ret = fread(buf, 1, 65536, in);
44 flog(LOG_ERR, "sendfile: could not read input: %s", strerror(errno));
47 if(fwrite(buf, 1, ret, out) != ret) {
48 flog(LOG_ERR, "sendfile: could not write output: %s", strerror(errno));
55 static char *absolutify(char *file)
60 getcwd(cwd, sizeof(cwd));
61 return(sprintf2("%s/%s", cwd, file));
63 return(sstrdup(file));
66 static void forkchild(int inpath, char *prog, char *file, char *method, char *url, char *rest, int *infd, int *outfd)
69 char *qp, **env, *name;
75 if((pid = fork()) < 0) {
76 flog(LOG_ERR, "callcgi: could not fork");
84 for(i = 3; i < FD_SETSIZE; i++)
86 if((qp = strchr(url, '?')) != NULL)
88 putenv(sprintf2("SERVER_SOFTWARE=ashd/%s", VERSION));
89 putenv("GATEWAY_INTERFACE=CGI/1.1");
90 if(getenv("HTTP_VERSION"))
91 putenv(sprintf2("SERVER_PROTOCOL=%s", getenv("HTTP_VERSION")));
92 putenv(sprintf2("REQUEST_METHOD=%s", method));
94 putenv(sprintf2("PATH_INFO=/%s", rest));
98 /* XXX: This is an ugly hack (I think), but though I can think
99 * of several alternatives, none seem to be better. */
100 if(*rest && (strlen(url) > strlen(rest)) &&
101 !strcmp(rest, url + strlen(url) - strlen(rest)) &&
102 (url[strlen(url) - strlen(rest) - 1] == '/')) {
103 name = sprintf2("%.*s", (int)(strlen(url) - strlen(rest) - 1), url);
105 putenv(sprintf2("SCRIPT_NAME=%s", name));
106 putenv(sprintf2("QUERY_STRING=%s", qp?qp:""));
107 if(getenv("REQ_HOST"))
108 putenv(sprintf2("SERVER_NAME=%s", getenv("REQ_HOST")));
109 if(getenv("REQ_X_ASH_SERVER_PORT"))
110 putenv(sprintf2("SERVER_PORT=%s", getenv("REQ_X_ASH_SERVER_PORT")));
111 if(getenv("REQ_X_ASH_PROTOCOL") && !strcmp(getenv("REQ_X_ASH_PROTOCOL"), "https"))
113 if(getenv("REQ_X_ASH_ADDRESS"))
114 putenv(sprintf2("REMOTE_ADDR=%s", getenv("REQ_X_ASH_ADDRESS")));
115 if(getenv("REQ_CONTENT_TYPE"))
116 putenv(sprintf2("CONTENT_TYPE=%s", getenv("REQ_CONTENT_TYPE")));
117 if(getenv("REQ_CONTENT_LENGTH"))
118 putenv(sprintf2("CONTENT_LENGTH=%s", getenv("REQ_CONTENT_LENGTH")));
119 for(env = environ; *env; env++) {
120 if(!strncmp(*env, "REQ_", 4))
121 putenv(sprintf2("HTTP_%s", (*env) + 4));
124 * This is (understandably) missing from the CGI
125 * specification, but PHP seems to require it.
127 putenv(sprintf2("SCRIPT_FILENAME=%s", absolutify(file)));
129 execlp(prog, prog, file, NULL);
131 execl(prog, prog, file, NULL);
140 static void trim(struct charbuf *buf)
144 for(p = buf->b; (p - buf->b < buf->d) && isspace(*p); p++);
145 memmove(buf->b, p, buf->d -= (p - buf->b));
146 for(p = buf->b + buf->d - 1; (p > buf->b) && isspace(*p); p--, buf->d--);
149 static char **parseheaders(FILE *s)
152 struct charvbuf hbuf;
163 } else if(c == '\n') {
165 } else if(c == EOF) {
171 } else if(state == 1) {
178 } else if(c == '\r') {
179 } else if(c == '\n') {
181 } else if(c == EOF) {
186 } else if(state == 2) {
188 } else if(c == '\n') {
194 } else if(c == EOF) {
210 static char *defstatus(int code)
219 return("No Content");
221 return("Multiple Choices");
223 return("Moved Permanently");
229 return("Not Modified");
231 return("Moved Temporarily");
233 return("Bad Request");
235 return("Unauthorized");
241 return("Internal Server Error");
243 return("Not Implemented");
245 return("Service Unavailable");
247 return("Unknown status");
250 static void sendstatus(char **headers, FILE *out)
253 char *status, *location;
256 status = location = NULL;
258 if(!strcasecmp(hp[0], "status")) {
260 /* Clear this header, so that it is not transmitted by sendheaders. */
262 } else if(!strcasecmp(hp[0], "location")) {
270 if(strchr(status, ' '))
271 fprintf(out, "HTTP/1.1 %s\n", status);
273 fprintf(out, "HTTP/1.1 %i %s\n", atoi(status), defstatus(atoi(status)));
274 } else if(location) {
275 fprintf(out, "HTTP/1.1 303 See Other\n");
277 fprintf(out, "HTTP/1.1 200 OK\n");
281 static void sendheaders(char **headers, FILE *out)
285 fprintf(out, "%s: %s\n", headers[0], headers[1]);
290 static void usage(void)
292 flog(LOG_ERR, "usage: callcgi [-c] [-p PROGRAM] METHOD URL REST");
295 int main(int argc, char **argv, char **envp)
298 char *file, *prog, *sp;
305 signal(SIGPIPE, SIG_IGN);
310 while((c = getopt(argc, argv, "cp:")) >= 0) {
325 if(argc - optind < 3) {
329 if((file = getenv("REQ_X_ASH_FILE")) == NULL) {
330 flog(LOG_ERR, "callcgi: needs to be called with the X-Ash-File header");
335 /* This behavior is encouraged by the CGI specification (RFC 3875, 7.2),
336 * but not strictly required, and I get the feeling it might break some
337 * relative paths here or there, so it's not the default for now. */
338 if((sp = strrchr(file, '/')) != NULL) {
350 forkchild(inpath, prog, file, argv[optind], argv[optind + 1], argv[optind + 2], &infd, &outfd);
351 in = fdopen(infd, "w");
354 out = fdopen(outfd, "r");
355 if((headers = parseheaders(out)) == NULL) {
356 flog(LOG_WARNING, "CGI handler returned invalid headers");
359 sendstatus(headers, stdout);
360 sendheaders(headers, stdout);
362 passdata(out, stdout);