htparser: Shut down root handler socket instead of closing it.
[ashd.git] / src / htparser.c
CommitLineData
f0bbedf7
FT
1/*
2 ashd - A Sane HTTP Daemon
3 Copyright (C) 2008 Fredrik Tolf <fredrik@dolda2000.com>
4
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
17*/
18
19#include <stdlib.h>
20#include <unistd.h>
21#include <stdio.h>
d341283f 22#include <fcntl.h>
f4cdf919 23#include <string.h>
f4cdf919 24#include <sys/socket.h>
f0cbd8d7 25#include <pwd.h>
15fa3fe8 26#include <sys/signal.h>
f4cdf919 27#include <errno.h>
f0bbedf7
FT
28
29#ifdef HAVE_CONFIG_H
30#include <config.h>
31#endif
32#include <utils.h>
f4cdf919 33#include <mt.h>
83723896 34#include <mtio.h>
f4cdf919 35#include <log.h>
66987955 36#include <req.h>
9d87a119 37#include <proc.h>
f4cdf919 38
8774c31b 39#include "htparser.h"
f4cdf919 40
8774c31b 41static int plex;
43c58ba2 42static char *pidfile = NULL;
d341283f 43static int daemonize, usesyslog;
cac13158 44struct mtbuf listeners;
f4cdf919 45
df431d1d
FT
46static void trimx(struct hthead *req)
47{
48 int i;
49
50 i = 0;
51 while(i < req->noheaders) {
52 if(!strncasecmp(req->headers[i][0], "x-ash-", 6)) {
53 free(req->headers[i][0]);
54 free(req->headers[i][1]);
55 free(req->headers[i]);
56 memmove(req->headers + i, req->headers + i + 1, sizeof(*req->headers) * (--req->noheaders - i));
57 } else {
58 i++;
59 }
60 }
61}
62
5fc1bf9f 63static struct hthead *parsereq(FILE *in)
66987955 64{
5fc1bf9f
FT
65 struct hthead *req;
66 struct charbuf method, url, ver;
67 int c;
66987955 68
5fc1bf9f
FT
69 req = NULL;
70 bufinit(method);
71 bufinit(url);
72 bufinit(ver);
73 while(1) {
74 c = getc(in);
75 if(c == ' ') {
76 break;
77 } else if((c == EOF) || (c < 32) || (c >= 128)) {
78 goto fail;
79 } else {
80 bufadd(method, c);
90b0ba0f
FT
81 if(method.d >= 128)
82 goto fail;
66987955 83 }
c9955b14 84 }
c9955b14 85 while(1) {
5fc1bf9f
FT
86 c = getc(in);
87 if(c == ' ') {
c9955b14 88 break;
5fc1bf9f
FT
89 } else if((c == EOF) || (c < 32)) {
90 goto fail;
91 } else {
92 bufadd(url, c);
90b0ba0f
FT
93 if(url.d >= 65536)
94 goto fail;
66987955
FT
95 }
96 }
66987955 97 while(1) {
5fc1bf9f
FT
98 c = getc(in);
99 if(c == 10) {
66987955 100 break;
5fc1bf9f
FT
101 } else if(c == 13) {
102 } else if((c == EOF) || (c < 32) || (c >= 128)) {
c9955b14 103 goto fail;
5fc1bf9f
FT
104 } else {
105 bufadd(ver, c);
90b0ba0f
FT
106 if(ver.d >= 128)
107 goto fail;
5fc1bf9f 108 }
66987955 109 }
5fc1bf9f
FT
110 bufadd(method, 0);
111 bufadd(url, 0);
112 bufadd(ver, 0);
113 req = mkreq(method.b, url.b, ver.b);
114 if(parseheaders(req, in))
115 goto fail;
df431d1d 116 trimx(req);
5fc1bf9f 117 goto out;
c9955b14
FT
118
119fail:
5fc1bf9f
FT
120 if(req != NULL) {
121 freehthead(req);
122 req = NULL;
123 }
124out:
125 buffree(method);
126 buffree(url);
127 buffree(ver);
128 return(req);
66987955
FT
129}
130
5fc1bf9f 131static off_t passdata(FILE *in, FILE *out, off_t max)
9d87a119 132{
5fc1bf9f
FT
133 size_t read;
134 off_t total;
135 char buf[8192];
136
137 total = 0;
f9255ddd 138 while(!feof(in) && ((max < 0) || (total < max))) {
5fc1bf9f
FT
139 read = sizeof(buf);
140 if(max >= 0)
a701d7b7 141 read = min(max - total, read);
5fc1bf9f
FT
142 read = fread(buf, 1, read, in);
143 if(ferror(in))
144 return(-1);
145 if(fwrite(buf, 1, read, out) != read)
146 return(-1);
147 total += read;
9d87a119 148 }
5fc1bf9f
FT
149 return(total);
150}
151
8d19a9ec
FT
152static int recvchunks(FILE *in, FILE *out)
153{
154 char buf[8192];
155 size_t read, chlen;
156 int c, r;
157
158 while(1) {
159 chlen = 0;
160 r = 0;
161 while(1) {
162 c = getc(in);
163 if(c == 10) {
164 if(!r)
165 return(-1);
166 break;
167 } else if(c == 13) {
168 } else if((c >= '0') && (c <= '9')) {
169 chlen = (chlen << 4) + (c - '0');
170 r = 1;
171 } else if((c >= 'A') && (c <= 'F')) {
172 chlen = (chlen << 4) + (c + 10 - 'A');
173 r = 1;
174 } else if((c >= 'a') && (c <= 'f')) {
175 chlen = (chlen << 4) + (c + 10 - 'a');
176 r = 1;
177 } else {
178 /* XXX: Technically, there may be chunk extensions to
179 * be read, but since that will likely never actually
180 * happen in practice, I can just as well add support
181 * for that if it actually does become relevant. */
182 return(-1);
183 }
184 }
185 if(chlen == 0)
186 break;
187 while(chlen > 0) {
188 read = fread(buf, 1, min(sizeof(buf), chlen), in);
189 if(feof(in) || ferror(in))
190 return(-1);
191 if(fwrite(buf, 1, read, out) != read)
192 return(-1);
193 chlen -= read;
194 }
195 if((getc(in) != 13) || (getc(in) != 10))
196 return(-1);
197 }
198 /* XXX: Technically, there may be trailers to be read, but that's
199 * just about as likely as chunk extensions. */
200 if((getc(in) != 13) || (getc(in) != 10))
201 return(-1);
202 return(0);
203}
204
5fc1bf9f
FT
205static int passchunks(FILE *in, FILE *out)
206{
207 char buf[8192];
208 size_t read;
209
210 do {
211 read = fread(buf, 1, sizeof(buf), in);
212 if(ferror(in))
213 return(-1);
f9255ddd 214 fprintf(out, "%zx\r\n", read);
5fc1bf9f
FT
215 if(fwrite(buf, 1, read, out) != read)
216 return(-1);
217 fprintf(out, "\r\n");
218 } while(read > 0);
219 return(0);
220}
221
222static int hasheader(struct hthead *head, char *name, char *val)
223{
224 char *hd;
225
226 if((hd = getheader(head, name)) == NULL)
227 return(0);
228 return(!strcasecmp(hd, val));
9d87a119
FT
229}
230
64a9096a
FT
231static int canonreq(struct hthead *req)
232{
233 char *p, *p2, *r;
234 int n;
235
236 if(req->url[0] == '/') {
237 replrest(req, req->url + 1);
238 if((p = strchr(req->rest, '?')) != NULL)
239 *p = 0;
240 return(1);
241 }
242 if((p = strstr(req->url, "://")) != NULL) {
243 n = p - req->url;
244 if(((n == 4) && !strncasecmp(req->url, "http", 4)) ||
245 ((n == 5) && !strncasecmp(req->url, "https", 5))) {
246 if(getheader(req, "host"))
247 return(0);
248 p += 3;
249 if((p2 = strchr(p, '/')) == NULL) {
250 headappheader(req, "Host", p);
251 free(req->url);
252 req->url = sstrdup("/");
253 } else {
254 r = sstrdup(p2);
255 *(p2++) = 0;
256 headappheader(req, "Host", p);
257 free(req->url);
258 req->url = r;
259 }
260 replrest(req, req->url + 1);
261 if((p = strchr(req->rest, '?')) != NULL)
262 *p = 0;
263 return(1);
264 }
265 }
266 return(0);
267}
268
75bb20c8
FT
269static int http10keep(struct hthead *req, struct hthead *resp)
270{
271 int fc;
272
273 fc = hasheader(resp, "connection", "close");
274 headrmheader(resp, "connection");
275 if(!fc && hasheader(req, "connection", "keep-alive")) {
276 headappheader(resp, "Connection", "Keep-Alive");
277 return(1);
278 } else {
279 return(0);
280 }
281}
282
8774c31b 283void serve(FILE *in, struct conn *conn)
66987955 284{
af34331c 285 int pfds[2];
8774c31b 286 FILE *out;
9d87a119 287 struct hthead *req, *resp;
64a9096a 288 char *hd;
5fc1bf9f 289 off_t dlen;
75bb20c8 290 int keep;
66987955 291
5fc1bf9f 292 out = NULL;
3c296bd4 293 req = resp = NULL;
cac13158 294 while(plex >= 0) {
5fc1bf9f
FT
295 if((req = parsereq(in)) == NULL)
296 break;
64a9096a
FT
297 if(!canonreq(req))
298 break;
9d87a119 299
8774c31b
FT
300 if((conn->initreq != NULL) && conn->initreq(conn, req))
301 break;
302
cac13158 303 if((plex < 0) || block(plex, EV_WRITE, 60) <= 0)
5fc1bf9f 304 break;
af34331c 305 if(socketpair(PF_UNIX, SOCK_STREAM, 0, pfds))
5fc1bf9f 306 break;
af34331c 307 if(sendreq(plex, req, pfds[0]))
5fc1bf9f 308 break;
af34331c 309 close(pfds[0]);
5fc1bf9f 310 out = mtstdopen(pfds[1], 1, 600, "r+");
a0327573 311
8d19a9ec
FT
312 if(getheader(req, "content-type") != NULL) {
313 if((hd = getheader(req, "content-length")) != NULL) {
314 dlen = atoo(hd);
315 if(dlen > 0) {
316 if(passdata(in, out, dlen) != dlen)
317 break;
318 }
319 } else if(((hd = getheader(req, "transfer-encoding")) != NULL) && !strcasecmp(hd, "chunked")) {
320 if(recvchunks(in, out))
5fc1bf9f 321 break;
8d19a9ec 322 } else {
2dbb9937
FT
323 /* Ignore rather than abort, to be kinder to broken clients. */
324 headrmheader(req, "content-type");
a06a2fbd 325 }
a0327573 326 }
5fc1bf9f
FT
327 if(fflush(out))
328 break;
d93d9a05 329 /* Make sure to send EOF */
5fc1bf9f 330 shutdown(pfds[1], SHUT_WR);
9d87a119 331
3ef78895 332 if((resp = parseresponse(out)) == NULL)
f9255ddd 333 break;
5fc1bf9f 334 replstr(&resp->ver, req->ver);
1c3e0167
FT
335
336 if(!getheader(resp, "server"))
337 headappheader(resp, "Server", sprintf3("ashd/%s", VERSION));
5fc1bf9f 338
cefb0f7a 339 if(!strcasecmp(req->ver, "HTTP/1.0")) {
18fb436d 340 if(!strcasecmp(req->method, "head")) {
75bb20c8
FT
341 keep = http10keep(req, resp);
342 writeresp(in, resp);
343 fprintf(in, "\r\n");
18fb436d 344 } else if((hd = getheader(resp, "content-length")) != NULL) {
75bb20c8 345 keep = http10keep(req, resp);
5226f7c5 346 dlen = atoo(hd);
75bb20c8
FT
347 writeresp(in, resp);
348 fprintf(in, "\r\n");
5226f7c5 349 if(passdata(out, in, dlen) != dlen)
5fc1bf9f 350 break;
5fc1bf9f 351 } else {
75bb20c8
FT
352 headrmheader(resp, "connection");
353 writeresp(in, resp);
354 fprintf(in, "\r\n");
5fc1bf9f
FT
355 passdata(out, in, -1);
356 break;
9d87a119 357 }
75bb20c8 358 if(!keep)
5fc1bf9f 359 break;
cefb0f7a 360 } else if(!strcasecmp(req->ver, "HTTP/1.1")) {
18fb436d
FT
361 if(!strcasecmp(req->method, "head")) {
362 writeresp(in, resp);
363 fprintf(in, "\r\n");
364 } else if((hd = getheader(resp, "content-length")) != NULL) {
5fc1bf9f
FT
365 writeresp(in, resp);
366 fprintf(in, "\r\n");
5226f7c5
FT
367 dlen = atoo(hd);
368 if(passdata(out, in, dlen) != dlen)
5fc1bf9f
FT
369 break;
370 } else if(!getheader(resp, "transfer-encoding")) {
371 headappheader(resp, "Transfer-Encoding", "chunked");
372 writeresp(in, resp);
373 fprintf(in, "\r\n");
374 if(passchunks(out, in))
375 break;
376 } else {
377 writeresp(in, resp);
378 fprintf(in, "\r\n");
379 passdata(out, in, -1);
9d87a119 380 break;
5fc1bf9f
FT
381 }
382 if(hasheader(req, "connection", "close") || hasheader(resp, "connection", "close"))
9d87a119 383 break;
5fc1bf9f
FT
384 } else {
385 break;
9d87a119 386 }
5fc1bf9f
FT
387
388 fclose(out);
389 out = NULL;
9d87a119 390 freehthead(req);
9d87a119 391 freehthead(resp);
5fc1bf9f 392 req = resp = NULL;
66987955
FT
393 }
394
5fc1bf9f
FT
395 if(out != NULL)
396 fclose(out);
9d87a119
FT
397 if(req != NULL)
398 freehthead(req);
399 if(resp != NULL)
400 freehthead(resp);
5fc1bf9f 401 fclose(in);
66987955
FT
402}
403
32e24c19
FT
404static void plexwatch(struct muth *muth, va_list args)
405{
406 vavar(int, fd);
407 char *buf;
8e9ec020 408 int i, ret;
32e24c19
FT
409
410 while(1) {
cac13158
FT
411 if(block(fd, EV_READ, 0) == 0)
412 break;
32e24c19
FT
413 buf = smalloc(65536);
414 ret = recv(fd, buf, 65536, 0);
415 if(ret < 0) {
416 flog(LOG_WARNING, "received error on rootplex read channel: %s", strerror(errno));
417 exit(1);
418 } else if(ret == 0) {
8e9ec020
FT
419 free(buf);
420 break;
32e24c19
FT
421 }
422 /* Maybe I'd like to implement some protocol in this direction
423 * some day... */
424 free(buf);
425 }
ecd4208b 426 shutdown(plex, SHUT_RDWR);
8e9ec020
FT
427 for(i = 0; i < listeners.d; i++) {
428 if(listeners.b[i] == muth)
429 bufdel(listeners, i);
430 }
431 flog(LOG_INFO, "root handler exited, so shutting down listening...");
432 while(listeners.d > 0)
433 resume(listeners.b[0], 0);
32e24c19
FT
434}
435
d341283f
FT
436static void initroot(void *uu)
437{
438 int fd;
439
cf91aa53 440 setsid();
d341283f 441 if(daemonize) {
d341283f
FT
442 chdir("/");
443 if((fd = open("/dev/null", O_RDWR)) >= 0) {
444 dup2(fd, 0);
445 dup2(fd, 1);
446 dup2(fd, 2);
447 close(fd);
448 }
449 }
450 if(usesyslog)
451 putenv("ASHD_USESYSLOG=1");
452 else
453 unsetenv("ASHD_USESYSLOG");
454}
455
8774c31b
FT
456static void usage(FILE *out)
457{
43c58ba2 458 fprintf(out, "usage: htparser [-hSf] [-u USER] [-r ROOT] [-p PIDFILE] PORTSPEC... -- ROOT [ARGS...]\n");
8774c31b 459 fprintf(out, "\twhere PORTSPEC is HANDLER[:PAR[=VAL][(,PAR[=VAL])...]] (try HANDLER:help)\n");
6ca53b2e 460 fprintf(out, "\tavailable handlers are `plain' and `ssl'.\n");
8774c31b
FT
461}
462
463static void addport(char *spec)
464{
465 char *nm, *p, *p2, *n;
466 struct charvbuf pars, vals;
467
468 bufinit(pars);
469 bufinit(vals);
470 if((p = strchr(spec, ':')) == NULL) {
471 nm = spec;
472 } else {
473 nm = spec;
474 *(p++) = 0;
475 do {
476 if((n = strchr(p, ',')) != NULL)
477 *(n++) = 0;
478 if((p2 = strchr(p, '=')) != NULL)
479 *(p2++) = 0;
480 if(!*p) {
481 usage(stderr);
482 exit(1);
483 }
484 bufadd(pars, p);
485 if(p2)
486 bufadd(vals, p2);
487 else
488 bufadd(vals, "");
489 } while((p = n) != NULL);
490 }
491
492 /* XXX: It would be nice to decentralize this, but, meh... */
493 if(!strcmp(nm, "plain")) {
494 handleplain(pars.d, pars.b, vals.b);
6ca53b2e
FT
495#ifdef HAVE_GNUTLS
496 } else if(!strcmp(nm, "ssl")) {
497 handlegnussl(pars.d, pars.b, vals.b);
498#endif
8774c31b
FT
499 } else {
500 flog(LOG_ERR, "htparser: unknown port handler `%s'", nm);
501 exit(1);
502 }
503
504 buffree(pars);
505 buffree(vals);
506}
507
cac13158
FT
508static void sighandler(int sig)
509{
510 exitioloop(1);
511}
512
f0bbedf7
FT
513int main(int argc, char **argv)
514{
cac13158 515 int c, d;
8774c31b 516 int i, s1;
f0cbd8d7 517 char *root;
43c58ba2 518 FILE *pidout;
f0cbd8d7 519 struct passwd *pwent;
f4cdf919 520
d341283f 521 daemonize = usesyslog = 0;
f0cbd8d7
FT
522 root = NULL;
523 pwent = NULL;
43c58ba2 524 while((c = getopt(argc, argv, "+hSfu:r:p:")) >= 0) {
8774c31b
FT
525 switch(c) {
526 case 'h':
527 usage(stdout);
528 exit(0);
f0cbd8d7
FT
529 case 'f':
530 daemonize = 1;
531 break;
532 case 'S':
d341283f 533 usesyslog = 1;
f0cbd8d7
FT
534 break;
535 case 'u':
536 if((pwent = getpwnam(optarg)) == NULL) {
537 flog(LOG_ERR, "could not find user %s", optarg);
538 exit(1);
539 }
540 break;
541 case 'r':
542 root = optarg;
543 break;
43c58ba2
FT
544 case 'p':
545 pidfile = optarg;
546 break;
8774c31b
FT
547 default:
548 usage(stderr);
549 exit(1);
550 }
551 }
8774c31b
FT
552 s1 = 0;
553 for(i = optind; i < argc; i++) {
554 if(!strcmp(argv[i], "--"))
555 break;
556 s1 = 1;
557 addport(argv[i]);
9d87a119 558 }
8774c31b
FT
559 if(!s1 || (i == argc)) {
560 usage(stderr);
561 exit(1);
f4cdf919 562 }
d341283f 563 if((plex = stdmkchild(argv + ++i, initroot, NULL)) < 0) {
8774c31b
FT
564 flog(LOG_ERR, "could not spawn root multiplexer: %s", strerror(errno));
565 return(1);
f4cdf919 566 }
cac13158 567 bufadd(listeners, mustart(plexwatch, plex));
43c58ba2
FT
568 pidout = NULL;
569 if(pidfile != NULL) {
570 if((pidout = fopen(pidfile, "w")) == NULL) {
571 flog(LOG_ERR, "could not open %s for writing: %s", pidfile, strerror(errno));
572 return(1);
573 }
574 }
d341283f 575 if(usesyslog)
f0cbd8d7
FT
576 opensyslog();
577 if(root) {
0370bd82 578 if(chdir(root) || chroot(root)) {
f0cbd8d7
FT
579 flog(LOG_ERR, "could not chroot to %s: %s", root, strerror(errno));
580 exit(1);
581 }
582 }
583 if(pwent) {
584 if(setgid(pwent->pw_gid)) {
585 flog(LOG_ERR, "could not switch group to %i: %s", (int)pwent->pw_gid, strerror(errno));
586 exit(1);
587 }
588 if(setuid(pwent->pw_uid)) {
589 flog(LOG_ERR, "could not switch user to %i: %s", (int)pwent->pw_uid, strerror(errno));
590 exit(1);
591 }
592 }
15fa3fe8 593 signal(SIGPIPE, SIG_IGN);
cac13158
FT
594 signal(SIGCHLD, SIG_IGN);
595 signal(SIGINT, sighandler);
596 signal(SIGTERM, sighandler);
f0cbd8d7
FT
597 if(daemonize) {
598 daemon(0, 0);
599 }
ee036f74 600 if(pidout != NULL) {
43c58ba2 601 fprintf(pidout, "%i\n", getpid());
ee036f74
FT
602 fclose(pidout);
603 }
cac13158
FT
604 d = 0;
605 while(!d) {
606 switch(ioloop()) {
607 case 0:
608 d = 1;
609 break;
610 case 1:
611 if(listeners.d > 0) {
8e9ec020
FT
612 while(listeners.d > 0)
613 resume(listeners.b[0], 0);
cac13158
FT
614 flog(LOG_INFO, "no longer listening");
615 } else {
616 d = 1;
617 }
618 break;
619 }
620 }
f4cdf919 621 return(0);
f0bbedf7 622}