htparser: More well-defined shutdown behavior.
[ashd.git] / src / htparser.c
CommitLineData
f0bbedf7
FT
1/*
2 ashd - A Sane HTTP Daemon
3 Copyright (C) 2008 Fredrik Tolf <fredrik@dolda2000.com>
4
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
17*/
18
19#include <stdlib.h>
20#include <unistd.h>
21#include <stdio.h>
d341283f 22#include <fcntl.h>
f4cdf919 23#include <string.h>
f4cdf919 24#include <sys/socket.h>
f0cbd8d7 25#include <pwd.h>
15fa3fe8 26#include <sys/signal.h>
f4cdf919 27#include <errno.h>
f0bbedf7
FT
28
29#ifdef HAVE_CONFIG_H
30#include <config.h>
31#endif
32#include <utils.h>
f4cdf919 33#include <mt.h>
83723896 34#include <mtio.h>
f4cdf919 35#include <log.h>
66987955 36#include <req.h>
9d87a119 37#include <proc.h>
f4cdf919 38
8774c31b 39#include "htparser.h"
f4cdf919 40
8774c31b 41static int plex;
43c58ba2 42static char *pidfile = NULL;
d341283f 43static int daemonize, usesyslog;
cac13158 44struct mtbuf listeners;
f4cdf919 45
df431d1d
FT
46static void trimx(struct hthead *req)
47{
48 int i;
49
50 i = 0;
51 while(i < req->noheaders) {
52 if(!strncasecmp(req->headers[i][0], "x-ash-", 6)) {
53 free(req->headers[i][0]);
54 free(req->headers[i][1]);
55 free(req->headers[i]);
56 memmove(req->headers + i, req->headers + i + 1, sizeof(*req->headers) * (--req->noheaders - i));
57 } else {
58 i++;
59 }
60 }
61}
62
5fc1bf9f 63static struct hthead *parsereq(FILE *in)
66987955 64{
5fc1bf9f
FT
65 struct hthead *req;
66 struct charbuf method, url, ver;
67 int c;
66987955 68
5fc1bf9f
FT
69 req = NULL;
70 bufinit(method);
71 bufinit(url);
72 bufinit(ver);
73 while(1) {
74 c = getc(in);
75 if(c == ' ') {
76 break;
77 } else if((c == EOF) || (c < 32) || (c >= 128)) {
78 goto fail;
79 } else {
80 bufadd(method, c);
90b0ba0f
FT
81 if(method.d >= 128)
82 goto fail;
66987955 83 }
c9955b14 84 }
c9955b14 85 while(1) {
5fc1bf9f
FT
86 c = getc(in);
87 if(c == ' ') {
c9955b14 88 break;
5fc1bf9f
FT
89 } else if((c == EOF) || (c < 32)) {
90 goto fail;
91 } else {
92 bufadd(url, c);
90b0ba0f
FT
93 if(url.d >= 65536)
94 goto fail;
66987955
FT
95 }
96 }
66987955 97 while(1) {
5fc1bf9f
FT
98 c = getc(in);
99 if(c == 10) {
66987955 100 break;
5fc1bf9f
FT
101 } else if(c == 13) {
102 } else if((c == EOF) || (c < 32) || (c >= 128)) {
c9955b14 103 goto fail;
5fc1bf9f
FT
104 } else {
105 bufadd(ver, c);
90b0ba0f
FT
106 if(ver.d >= 128)
107 goto fail;
5fc1bf9f 108 }
66987955 109 }
5fc1bf9f
FT
110 bufadd(method, 0);
111 bufadd(url, 0);
112 bufadd(ver, 0);
113 req = mkreq(method.b, url.b, ver.b);
114 if(parseheaders(req, in))
115 goto fail;
df431d1d 116 trimx(req);
5fc1bf9f 117 goto out;
c9955b14
FT
118
119fail:
5fc1bf9f
FT
120 if(req != NULL) {
121 freehthead(req);
122 req = NULL;
123 }
124out:
125 buffree(method);
126 buffree(url);
127 buffree(ver);
128 return(req);
66987955
FT
129}
130
5fc1bf9f 131static off_t passdata(FILE *in, FILE *out, off_t max)
9d87a119 132{
5fc1bf9f
FT
133 size_t read;
134 off_t total;
135 char buf[8192];
136
137 total = 0;
f9255ddd 138 while(!feof(in) && ((max < 0) || (total < max))) {
5fc1bf9f
FT
139 read = sizeof(buf);
140 if(max >= 0)
a701d7b7 141 read = min(max - total, read);
5fc1bf9f
FT
142 read = fread(buf, 1, read, in);
143 if(ferror(in))
144 return(-1);
145 if(fwrite(buf, 1, read, out) != read)
146 return(-1);
147 total += read;
9d87a119 148 }
5fc1bf9f
FT
149 return(total);
150}
151
8d19a9ec
FT
152static int recvchunks(FILE *in, FILE *out)
153{
154 char buf[8192];
155 size_t read, chlen;
156 int c, r;
157
158 while(1) {
159 chlen = 0;
160 r = 0;
161 while(1) {
162 c = getc(in);
163 if(c == 10) {
164 if(!r)
165 return(-1);
166 break;
167 } else if(c == 13) {
168 } else if((c >= '0') && (c <= '9')) {
169 chlen = (chlen << 4) + (c - '0');
170 r = 1;
171 } else if((c >= 'A') && (c <= 'F')) {
172 chlen = (chlen << 4) + (c + 10 - 'A');
173 r = 1;
174 } else if((c >= 'a') && (c <= 'f')) {
175 chlen = (chlen << 4) + (c + 10 - 'a');
176 r = 1;
177 } else {
178 /* XXX: Technically, there may be chunk extensions to
179 * be read, but since that will likely never actually
180 * happen in practice, I can just as well add support
181 * for that if it actually does become relevant. */
182 return(-1);
183 }
184 }
185 if(chlen == 0)
186 break;
187 while(chlen > 0) {
188 read = fread(buf, 1, min(sizeof(buf), chlen), in);
189 if(feof(in) || ferror(in))
190 return(-1);
191 if(fwrite(buf, 1, read, out) != read)
192 return(-1);
193 chlen -= read;
194 }
195 if((getc(in) != 13) || (getc(in) != 10))
196 return(-1);
197 }
198 /* XXX: Technically, there may be trailers to be read, but that's
199 * just about as likely as chunk extensions. */
200 if((getc(in) != 13) || (getc(in) != 10))
201 return(-1);
202 return(0);
203}
204
5fc1bf9f
FT
205static int passchunks(FILE *in, FILE *out)
206{
207 char buf[8192];
208 size_t read;
209
210 do {
211 read = fread(buf, 1, sizeof(buf), in);
212 if(ferror(in))
213 return(-1);
f9255ddd 214 fprintf(out, "%zx\r\n", read);
5fc1bf9f
FT
215 if(fwrite(buf, 1, read, out) != read)
216 return(-1);
217 fprintf(out, "\r\n");
218 } while(read > 0);
219 return(0);
220}
221
222static int hasheader(struct hthead *head, char *name, char *val)
223{
224 char *hd;
225
226 if((hd = getheader(head, name)) == NULL)
227 return(0);
228 return(!strcasecmp(hd, val));
9d87a119
FT
229}
230
64a9096a
FT
231static int canonreq(struct hthead *req)
232{
233 char *p, *p2, *r;
234 int n;
235
236 if(req->url[0] == '/') {
237 replrest(req, req->url + 1);
238 if((p = strchr(req->rest, '?')) != NULL)
239 *p = 0;
240 return(1);
241 }
242 if((p = strstr(req->url, "://")) != NULL) {
243 n = p - req->url;
244 if(((n == 4) && !strncasecmp(req->url, "http", 4)) ||
245 ((n == 5) && !strncasecmp(req->url, "https", 5))) {
246 if(getheader(req, "host"))
247 return(0);
248 p += 3;
249 if((p2 = strchr(p, '/')) == NULL) {
250 headappheader(req, "Host", p);
251 free(req->url);
252 req->url = sstrdup("/");
253 } else {
254 r = sstrdup(p2);
255 *(p2++) = 0;
256 headappheader(req, "Host", p);
257 free(req->url);
258 req->url = r;
259 }
260 replrest(req, req->url + 1);
261 if((p = strchr(req->rest, '?')) != NULL)
262 *p = 0;
263 return(1);
264 }
265 }
266 return(0);
267}
268
75bb20c8
FT
269static int http10keep(struct hthead *req, struct hthead *resp)
270{
271 int fc;
272
273 fc = hasheader(resp, "connection", "close");
274 headrmheader(resp, "connection");
275 if(!fc && hasheader(req, "connection", "keep-alive")) {
276 headappheader(resp, "Connection", "Keep-Alive");
277 return(1);
278 } else {
279 return(0);
280 }
281}
282
8774c31b 283void serve(FILE *in, struct conn *conn)
66987955 284{
af34331c 285 int pfds[2];
8774c31b 286 FILE *out;
9d87a119 287 struct hthead *req, *resp;
64a9096a 288 char *hd;
5fc1bf9f 289 off_t dlen;
75bb20c8 290 int keep;
66987955 291
5fc1bf9f 292 out = NULL;
3c296bd4 293 req = resp = NULL;
cac13158 294 while(plex >= 0) {
5fc1bf9f
FT
295 if((req = parsereq(in)) == NULL)
296 break;
64a9096a
FT
297 if(!canonreq(req))
298 break;
9d87a119 299
8774c31b
FT
300 if((conn->initreq != NULL) && conn->initreq(conn, req))
301 break;
302
cac13158 303 if((plex < 0) || block(plex, EV_WRITE, 60) <= 0)
5fc1bf9f 304 break;
af34331c 305 if(socketpair(PF_UNIX, SOCK_STREAM, 0, pfds))
5fc1bf9f 306 break;
af34331c 307 if(sendreq(plex, req, pfds[0]))
5fc1bf9f 308 break;
af34331c 309 close(pfds[0]);
5fc1bf9f 310 out = mtstdopen(pfds[1], 1, 600, "r+");
a0327573 311
8d19a9ec
FT
312 if(getheader(req, "content-type") != NULL) {
313 if((hd = getheader(req, "content-length")) != NULL) {
314 dlen = atoo(hd);
315 if(dlen > 0) {
316 if(passdata(in, out, dlen) != dlen)
317 break;
318 }
319 } else if(((hd = getheader(req, "transfer-encoding")) != NULL) && !strcasecmp(hd, "chunked")) {
320 if(recvchunks(in, out))
5fc1bf9f 321 break;
8d19a9ec 322 } else {
2dbb9937
FT
323 /* Ignore rather than abort, to be kinder to broken clients. */
324 headrmheader(req, "content-type");
a06a2fbd 325 }
a0327573 326 }
5fc1bf9f
FT
327 if(fflush(out))
328 break;
d93d9a05 329 /* Make sure to send EOF */
5fc1bf9f 330 shutdown(pfds[1], SHUT_WR);
9d87a119 331
3ef78895 332 if((resp = parseresponse(out)) == NULL)
f9255ddd 333 break;
5fc1bf9f 334 replstr(&resp->ver, req->ver);
1c3e0167
FT
335
336 if(!getheader(resp, "server"))
337 headappheader(resp, "Server", sprintf3("ashd/%s", VERSION));
5fc1bf9f 338
cefb0f7a 339 if(!strcasecmp(req->ver, "HTTP/1.0")) {
18fb436d 340 if(!strcasecmp(req->method, "head")) {
75bb20c8
FT
341 keep = http10keep(req, resp);
342 writeresp(in, resp);
343 fprintf(in, "\r\n");
18fb436d 344 } else if((hd = getheader(resp, "content-length")) != NULL) {
75bb20c8 345 keep = http10keep(req, resp);
5226f7c5 346 dlen = atoo(hd);
75bb20c8
FT
347 writeresp(in, resp);
348 fprintf(in, "\r\n");
5226f7c5 349 if(passdata(out, in, dlen) != dlen)
5fc1bf9f 350 break;
5fc1bf9f 351 } else {
75bb20c8
FT
352 headrmheader(resp, "connection");
353 writeresp(in, resp);
354 fprintf(in, "\r\n");
5fc1bf9f
FT
355 passdata(out, in, -1);
356 break;
9d87a119 357 }
75bb20c8 358 if(!keep)
5fc1bf9f 359 break;
cefb0f7a 360 } else if(!strcasecmp(req->ver, "HTTP/1.1")) {
18fb436d
FT
361 if(!strcasecmp(req->method, "head")) {
362 writeresp(in, resp);
363 fprintf(in, "\r\n");
364 } else if((hd = getheader(resp, "content-length")) != NULL) {
5fc1bf9f
FT
365 writeresp(in, resp);
366 fprintf(in, "\r\n");
5226f7c5
FT
367 dlen = atoo(hd);
368 if(passdata(out, in, dlen) != dlen)
5fc1bf9f
FT
369 break;
370 } else if(!getheader(resp, "transfer-encoding")) {
371 headappheader(resp, "Transfer-Encoding", "chunked");
372 writeresp(in, resp);
373 fprintf(in, "\r\n");
374 if(passchunks(out, in))
375 break;
376 } else {
377 writeresp(in, resp);
378 fprintf(in, "\r\n");
379 passdata(out, in, -1);
9d87a119 380 break;
5fc1bf9f
FT
381 }
382 if(hasheader(req, "connection", "close") || hasheader(resp, "connection", "close"))
9d87a119 383 break;
5fc1bf9f
FT
384 } else {
385 break;
9d87a119 386 }
5fc1bf9f
FT
387
388 fclose(out);
389 out = NULL;
9d87a119 390 freehthead(req);
9d87a119 391 freehthead(resp);
5fc1bf9f 392 req = resp = NULL;
66987955
FT
393 }
394
5fc1bf9f
FT
395 if(out != NULL)
396 fclose(out);
9d87a119
FT
397 if(req != NULL)
398 freehthead(req);
399 if(resp != NULL)
400 freehthead(resp);
5fc1bf9f 401 fclose(in);
66987955
FT
402}
403
32e24c19
FT
404static void plexwatch(struct muth *muth, va_list args)
405{
406 vavar(int, fd);
407 char *buf;
408 int ret;
409
410 while(1) {
cac13158
FT
411 if(block(fd, EV_READ, 0) == 0)
412 break;
32e24c19
FT
413 buf = smalloc(65536);
414 ret = recv(fd, buf, 65536, 0);
415 if(ret < 0) {
416 flog(LOG_WARNING, "received error on rootplex read channel: %s", strerror(errno));
417 exit(1);
418 } else if(ret == 0) {
419 exit(0);
420 }
421 /* Maybe I'd like to implement some protocol in this direction
422 * some day... */
423 free(buf);
424 }
cac13158
FT
425 close(plex);
426 plex = -1;
32e24c19
FT
427}
428
d341283f
FT
429static void initroot(void *uu)
430{
431 int fd;
432
cf91aa53 433 setsid();
d341283f 434 if(daemonize) {
d341283f
FT
435 chdir("/");
436 if((fd = open("/dev/null", O_RDWR)) >= 0) {
437 dup2(fd, 0);
438 dup2(fd, 1);
439 dup2(fd, 2);
440 close(fd);
441 }
442 }
443 if(usesyslog)
444 putenv("ASHD_USESYSLOG=1");
445 else
446 unsetenv("ASHD_USESYSLOG");
447}
448
8774c31b
FT
449static void usage(FILE *out)
450{
43c58ba2 451 fprintf(out, "usage: htparser [-hSf] [-u USER] [-r ROOT] [-p PIDFILE] PORTSPEC... -- ROOT [ARGS...]\n");
8774c31b 452 fprintf(out, "\twhere PORTSPEC is HANDLER[:PAR[=VAL][(,PAR[=VAL])...]] (try HANDLER:help)\n");
6ca53b2e 453 fprintf(out, "\tavailable handlers are `plain' and `ssl'.\n");
8774c31b
FT
454}
455
456static void addport(char *spec)
457{
458 char *nm, *p, *p2, *n;
459 struct charvbuf pars, vals;
460
461 bufinit(pars);
462 bufinit(vals);
463 if((p = strchr(spec, ':')) == NULL) {
464 nm = spec;
465 } else {
466 nm = spec;
467 *(p++) = 0;
468 do {
469 if((n = strchr(p, ',')) != NULL)
470 *(n++) = 0;
471 if((p2 = strchr(p, '=')) != NULL)
472 *(p2++) = 0;
473 if(!*p) {
474 usage(stderr);
475 exit(1);
476 }
477 bufadd(pars, p);
478 if(p2)
479 bufadd(vals, p2);
480 else
481 bufadd(vals, "");
482 } while((p = n) != NULL);
483 }
484
485 /* XXX: It would be nice to decentralize this, but, meh... */
486 if(!strcmp(nm, "plain")) {
487 handleplain(pars.d, pars.b, vals.b);
6ca53b2e
FT
488#ifdef HAVE_GNUTLS
489 } else if(!strcmp(nm, "ssl")) {
490 handlegnussl(pars.d, pars.b, vals.b);
491#endif
8774c31b
FT
492 } else {
493 flog(LOG_ERR, "htparser: unknown port handler `%s'", nm);
494 exit(1);
495 }
496
497 buffree(pars);
498 buffree(vals);
499}
500
cac13158
FT
501static void sighandler(int sig)
502{
503 exitioloop(1);
504}
505
f0bbedf7
FT
506int main(int argc, char **argv)
507{
cac13158 508 int c, d;
8774c31b 509 int i, s1;
f0cbd8d7 510 char *root;
43c58ba2 511 FILE *pidout;
f0cbd8d7 512 struct passwd *pwent;
f4cdf919 513
d341283f 514 daemonize = usesyslog = 0;
f0cbd8d7
FT
515 root = NULL;
516 pwent = NULL;
43c58ba2 517 while((c = getopt(argc, argv, "+hSfu:r:p:")) >= 0) {
8774c31b
FT
518 switch(c) {
519 case 'h':
520 usage(stdout);
521 exit(0);
f0cbd8d7
FT
522 case 'f':
523 daemonize = 1;
524 break;
525 case 'S':
d341283f 526 usesyslog = 1;
f0cbd8d7
FT
527 break;
528 case 'u':
529 if((pwent = getpwnam(optarg)) == NULL) {
530 flog(LOG_ERR, "could not find user %s", optarg);
531 exit(1);
532 }
533 break;
534 case 'r':
535 root = optarg;
536 break;
43c58ba2
FT
537 case 'p':
538 pidfile = optarg;
539 break;
8774c31b
FT
540 default:
541 usage(stderr);
542 exit(1);
543 }
544 }
8774c31b
FT
545 s1 = 0;
546 for(i = optind; i < argc; i++) {
547 if(!strcmp(argv[i], "--"))
548 break;
549 s1 = 1;
550 addport(argv[i]);
9d87a119 551 }
8774c31b
FT
552 if(!s1 || (i == argc)) {
553 usage(stderr);
554 exit(1);
f4cdf919 555 }
d341283f 556 if((plex = stdmkchild(argv + ++i, initroot, NULL)) < 0) {
8774c31b
FT
557 flog(LOG_ERR, "could not spawn root multiplexer: %s", strerror(errno));
558 return(1);
f4cdf919 559 }
cac13158 560 bufadd(listeners, mustart(plexwatch, plex));
43c58ba2
FT
561 pidout = NULL;
562 if(pidfile != NULL) {
563 if((pidout = fopen(pidfile, "w")) == NULL) {
564 flog(LOG_ERR, "could not open %s for writing: %s", pidfile, strerror(errno));
565 return(1);
566 }
567 }
d341283f 568 if(usesyslog)
f0cbd8d7
FT
569 opensyslog();
570 if(root) {
0370bd82 571 if(chdir(root) || chroot(root)) {
f0cbd8d7
FT
572 flog(LOG_ERR, "could not chroot to %s: %s", root, strerror(errno));
573 exit(1);
574 }
575 }
576 if(pwent) {
577 if(setgid(pwent->pw_gid)) {
578 flog(LOG_ERR, "could not switch group to %i: %s", (int)pwent->pw_gid, strerror(errno));
579 exit(1);
580 }
581 if(setuid(pwent->pw_uid)) {
582 flog(LOG_ERR, "could not switch user to %i: %s", (int)pwent->pw_uid, strerror(errno));
583 exit(1);
584 }
585 }
15fa3fe8 586 signal(SIGPIPE, SIG_IGN);
cac13158
FT
587 signal(SIGCHLD, SIG_IGN);
588 signal(SIGINT, sighandler);
589 signal(SIGTERM, sighandler);
f0cbd8d7
FT
590 if(daemonize) {
591 daemon(0, 0);
592 }
ee036f74 593 if(pidout != NULL) {
43c58ba2 594 fprintf(pidout, "%i\n", getpid());
ee036f74
FT
595 fclose(pidout);
596 }
cac13158
FT
597 d = 0;
598 while(!d) {
599 switch(ioloop()) {
600 case 0:
601 d = 1;
602 break;
603 case 1:
604 if(listeners.d > 0) {
605 for(i = 0; i < listeners.d; i++)
606 resume(listeners.b[i], 0);
607 listeners.d = 0;
608 flog(LOG_INFO, "no longer listening");
609 } else {
610 d = 1;
611 }
612 break;
613 }
614 }
f4cdf919 615 return(0);
f0bbedf7 616}