X-Git-Url: https://git.netwichtig.de/gitweb/?a=blobdiff_plain;f=src%2Fmodules%2Fm_httpd.cpp;h=2e67b1551d9cd8545c403cc28eb490c30675867a;hb=42c7f479b2aebdec4fd190ba06097b7c5bca42a9;hp=053f4b924b3d30b2ecd784fa6d1ec122be8e0ade;hpb=f71e6bf9cb41811f18864f5d4eecb26e29d03f25;p=user%2Fhenk%2Fcode%2Finspircd.git diff --git a/src/modules/m_httpd.cpp b/src/modules/m_httpd.cpp index 053f4b924..2e67b1551 100644 --- a/src/modules/m_httpd.cpp +++ b/src/modules/m_httpd.cpp @@ -21,177 +21,227 @@ * along with this program. If not, see . */ +/// $CompilerFlags: -Ivendor_directory("http_parser") + #include "inspircd.h" #include "iohook.h" #include "modules/httpd.h" +// Fix warnings about the use of commas at end of enumerator lists on C++03. +#if defined __clang__ +# pragma clang diagnostic ignored "-Wc++11-extensions" +#elif defined __GNUC__ +# if (__GNUC__ > 4) || ((__GNUC__ == 4) && (__GNUC_MINOR__ >= 8)) +# pragma GCC diagnostic ignored "-Wpedantic" +# else +# pragma GCC diagnostic ignored "-pedantic" +# endif +#endif + +// Fix warnings about shadowing in http_parser. +#ifdef __GNUC__ +# pragma GCC diagnostic ignored "-Wshadow" +#endif + +#include + class ModuleHttpServer; static ModuleHttpServer* HttpModule; -static bool claimed; -static std::set sockets; - -/** HTTP socket states - */ -enum HttpState -{ - HTTP_SERVE_WAIT_REQUEST = 0, /* Waiting for a full request */ - HTTP_SERVE_RECV_POSTDATA = 1, /* Waiting to finish recieving POST data */ - HTTP_SERVE_SEND_DATA = 2 /* Sending response */ -}; +static insp::intrusive_list sockets; +static Events::ModuleEventProvider* aclevprov; +static Events::ModuleEventProvider* reqevprov; +static http_parser_settings parser_settings; /** A socket used for HTTP transport */ -class HttpServerSocket : public BufferedSocket +class HttpServerSocket : public BufferedSocket, public Timer, public insp::intrusive_list_node { - HttpState InternalState; - std::string ip; + friend ModuleHttpServer; - HTTPHeaders headers; - std::string reqbuffer; - std::string postdata; - unsigned int postsize; - std::string request_type; + http_parser parser; + http_parser_url url; + std::string ip; std::string uri; - std::string http_version; + HTTPHeaders headers; + std::string body; + size_t total_buffers; + int status_code; - public: - const time_t createtime; + /** True if this object is in the cull list + */ + bool waitingcull; - HttpServerSocket(int newfd, const std::string& IP, ListenSocket* via, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* server) - : BufferedSocket(newfd), ip(IP), postsize(0) - , createtime(ServerInstance->Time()) + bool Tick(time_t currtime) CXX11_OVERRIDE { - InternalState = HTTP_SERVE_WAIT_REQUEST; + AddToCull(); + return false; + } - if (via->iohookprov) - via->iohookprov->OnAccept(this, client, server); + template + static int Callback(http_parser* p) + { + HttpServerSocket* sock = static_cast(p->data); + return (sock->*f)(); } - ~HttpServerSocket() + template + static int DataCallback(http_parser* p, const char* buf, size_t len) { - sockets.erase(this); + HttpServerSocket* sock = static_cast(p->data); + return (sock->*f)(buf, len); } - void OnError(BufferedSocketError) CXX11_OVERRIDE + static void ConfigureParser() { - ServerInstance->GlobalCulls.AddItem(this); + http_parser_settings_init(&parser_settings); + parser_settings.on_message_begin = Callback<&HttpServerSocket::OnMessageBegin>; + parser_settings.on_url = DataCallback<&HttpServerSocket::OnUrl>; + parser_settings.on_header_field = DataCallback<&HttpServerSocket::OnHeaderField>; + parser_settings.on_body = DataCallback<&HttpServerSocket::OnBody>; + parser_settings.on_message_complete = Callback<&HttpServerSocket::OnMessageComplete>; + } + + int OnMessageBegin() + { + uri.clear(); + header_state = HEADER_NONE; + body.clear(); + total_buffers = 0; + return 0; + } + + bool AcceptData(size_t len) + { + total_buffers += len; + return total_buffers < 8192; + } + + int OnUrl(const char* buf, size_t len) + { + if (!AcceptData(len)) + { + status_code = HTTP_STATUS_URI_TOO_LONG; + return -1; + } + uri.append(buf, len); + return 0; + } + + enum { HEADER_NONE, HEADER_FIELD, HEADER_VALUE } header_state; + std::string header_field; + std::string header_value; + + void OnHeaderComplete() + { + headers.SetHeader(header_field, header_value); + header_field.clear(); + header_value.clear(); + } + + int OnHeaderField(const char* buf, size_t len) + { + if (header_state == HEADER_VALUE) + OnHeaderComplete(); + header_state = HEADER_FIELD; + if (!AcceptData(len)) + { + status_code = HTTP_STATUS_REQUEST_HEADER_FIELDS_TOO_LARGE; + return -1; + } + header_field.append(buf, len); + return 0; + } + + int OnHeaderValue(const char* buf, size_t len) + { + header_state = HEADER_VALUE; + if (!AcceptData(len)) + { + status_code = HTTP_STATUS_REQUEST_HEADER_FIELDS_TOO_LARGE; + return -1; + } + header_value.append(buf, len); + return 0; } - std::string Response(int response) + int OnHeadersComplete() { - switch (response) + if (header_state != HEADER_NONE) + OnHeaderComplete(); + return 0; + } + + int OnBody(const char* buf, size_t len) + { + if (!AcceptData(len)) { - case 100: - return "CONTINUE"; - case 101: - return "SWITCHING PROTOCOLS"; - case 200: - return "OK"; - case 201: - return "CREATED"; - case 202: - return "ACCEPTED"; - case 203: - return "NON-AUTHORITATIVE INFORMATION"; - case 204: - return "NO CONTENT"; - case 205: - return "RESET CONTENT"; - case 206: - return "PARTIAL CONTENT"; - case 300: - return "MULTIPLE CHOICES"; - case 301: - return "MOVED PERMANENTLY"; - case 302: - return "FOUND"; - case 303: - return "SEE OTHER"; - case 304: - return "NOT MODIFIED"; - case 305: - return "USE PROXY"; - case 307: - return "TEMPORARY REDIRECT"; - case 400: - return "BAD REQUEST"; - case 401: - return "UNAUTHORIZED"; - case 402: - return "PAYMENT REQUIRED"; - case 403: - return "FORBIDDEN"; - case 404: - return "NOT FOUND"; - case 405: - return "METHOD NOT ALLOWED"; - case 406: - return "NOT ACCEPTABLE"; - case 407: - return "PROXY AUTHENTICATION REQUIRED"; - case 408: - return "REQUEST TIMEOUT"; - case 409: - return "CONFLICT"; - case 410: - return "GONE"; - case 411: - return "LENGTH REQUIRED"; - case 412: - return "PRECONDITION FAILED"; - case 413: - return "REQUEST ENTITY TOO LARGE"; - case 414: - return "REQUEST-URI TOO LONG"; - case 415: - return "UNSUPPORTED MEDIA TYPE"; - case 416: - return "REQUESTED RANGE NOT SATISFIABLE"; - case 417: - return "EXPECTATION FAILED"; - case 500: - return "INTERNAL SERVER ERROR"; - case 501: - return "NOT IMPLEMENTED"; - case 502: - return "BAD GATEWAY"; - case 503: - return "SERVICE UNAVAILABLE"; - case 504: - return "GATEWAY TIMEOUT"; - case 505: - return "HTTP VERSION NOT SUPPORTED"; - default: - return "WTF"; - break; + status_code = HTTP_STATUS_PAYLOAD_TOO_LARGE; + return -1; + } + body.append(buf, len); + return 0; + } + + int OnMessageComplete() + { + ServeData(); + return 0; + } + public: + HttpServerSocket(int newfd, const std::string& IP, ListenSocket* via, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* server, unsigned int timeoutsec) + : BufferedSocket(newfd) + , Timer(timeoutsec) + , ip(IP) + , status_code(0) + , waitingcull(false) + { + if ((!via->iohookprovs.empty()) && (via->iohookprovs.back())) + { + via->iohookprovs.back()->OnAccept(this, client, server); + // IOHook may have errored + if (!getError().empty()) + { + AddToCull(); + return; + } } + + parser.data = this; + http_parser_init(&parser, HTTP_REQUEST); + ServerInstance->Timers.AddTimer(this); + } + + ~HttpServerSocket() + { + sockets.erase(this); + } + + void OnError(BufferedSocketError) CXX11_OVERRIDE + { + AddToCull(); } - void SendHTTPError(int response) + void SendHTTPError(unsigned int response) { HTTPHeaders empty; - std::string data = "Server error "+ConvToStr(response)+": "+Response(response)+"
"+ - "Powered by InspIRCd"; + std::string data = InspIRCd::Format( + "Server error %u: %s
" + "Powered by InspIRCd", response, http_status_str((http_status)response)); SendHeaders(data.length(), response, empty); WriteData(data); + Close(); } - void SendHeaders(unsigned long size, int response, HTTPHeaders &rheaders) + void SendHeaders(unsigned long size, unsigned int response, HTTPHeaders &rheaders) { + WriteData(InspIRCd::Format("HTTP/%u.%u %u %s\r\n", parser.http_major ? parser.http_major : 1, parser.http_major ? parser.http_minor : 1, response, http_status_str((http_status)response))); - WriteData(http_version + " "+ConvToStr(response)+" "+Response(response)+"\r\n"); - - time_t local = ServerInstance->Time(); - struct tm *timeinfo = gmtime(&local); - char *date = asctime(timeinfo); - date[strlen(date) - 1] = '\0'; - rheaders.CreateHeader("Date", date); - - rheaders.CreateHeader("Server", BRANCH); + rheaders.CreateHeader("Date", InspIRCd::TimeString(ServerInstance->Time(), "%a, %d %b %Y %H:%M:%S GMT", true)); + rheaders.CreateHeader("Server", INSPIRCD_BRANCH); rheaders.SetHeader("Content-Length", ConvToStr(size)); if (size) @@ -208,131 +258,83 @@ class HttpServerSocket : public BufferedSocket WriteData("\r\n"); } - void OnDataReady() + void OnDataReady() CXX11_OVERRIDE { - if (InternalState == HTTP_SERVE_RECV_POSTDATA) - { - postdata.append(recvq); - if (postdata.length() >= postsize) - ServeData(); - } - else - { - reqbuffer.append(recvq); - - if (reqbuffer.length() >= 8192) - { - ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "m_httpd dropped connection due to an oversized request buffer"); - reqbuffer.clear(); - SetError("Buffer"); - } - - if (InternalState == HTTP_SERVE_WAIT_REQUEST) - CheckRequestBuffer(); - } + if (parser.upgrade || HTTP_PARSER_ERRNO(&parser)) + return; + http_parser_execute(&parser, &parser_settings, recvq.data(), recvq.size()); + if (parser.upgrade || HTTP_PARSER_ERRNO(&parser)) + SendHTTPError(status_code ? status_code : 400); } - void CheckRequestBuffer() + void ServeData() { - std::string::size_type reqend = reqbuffer.find("\r\n\r\n"); - if (reqend == std::string::npos) - return; - - // We have the headers; parse them all - std::string::size_type hbegin = 0, hend; - while ((hend = reqbuffer.find("\r\n", hbegin)) != std::string::npos) + ModResult MOD_RESULT; + std::string method = http_method_str(static_cast(parser.method)); + HTTPRequestURI parsed; + ParseURI(uri, parsed); + HTTPRequest acl(method, parsed, &headers, this, ip, body); + FIRST_MOD_RESULT_CUSTOM(*aclevprov, HTTPACLEventListener, OnHTTPACLCheck, MOD_RESULT, (acl)); + if (MOD_RESULT != MOD_RES_DENY) { - if (hbegin == hend) - break; - - if (request_type.empty()) - { - std::istringstream cheader(std::string(reqbuffer, hbegin, hend - hbegin)); - cheader >> request_type; - cheader >> uri; - cheader >> http_version; - - if (request_type.empty() || uri.empty() || http_version.empty()) - { - SendHTTPError(400); - return; - } - - hbegin = hend + 2; - continue; - } - - std::string cheader = reqbuffer.substr(hbegin, hend - hbegin); - - std::string::size_type fieldsep = cheader.find(':'); - if ((fieldsep == std::string::npos) || (fieldsep == 0) || (fieldsep == cheader.length() - 1)) + HTTPRequest url(method, parsed, &headers, this, ip, body); + FIRST_MOD_RESULT_CUSTOM(*reqevprov, HTTPRequestEventListener, OnHTTPRequest, MOD_RESULT, (url)); + if (MOD_RESULT == MOD_RES_PASSTHRU) { - SendHTTPError(400); - return; + SendHTTPError(404); } - - headers.SetHeader(cheader.substr(0, fieldsep), cheader.substr(fieldsep + 2)); - - hbegin = hend + 2; } + } - reqbuffer.erase(0, reqend + 4); - - std::transform(request_type.begin(), request_type.end(), request_type.begin(), ::toupper); - std::transform(http_version.begin(), http_version.end(), http_version.begin(), ::toupper); + void Page(std::stringstream* n, unsigned int response, HTTPHeaders* hheaders) + { + SendHeaders(n->str().length(), response, *hheaders); + WriteData(n->str()); + Close(); + } - if ((http_version != "HTTP/1.1") && (http_version != "HTTP/1.0")) - { - SendHTTPError(505); + void AddToCull() + { + if (waitingcull) return; - } - - if (headers.IsSet("Content-Length") && (postsize = ConvToInt(headers.GetHeader("Content-Length"))) > 0) - { - InternalState = HTTP_SERVE_RECV_POSTDATA; - if (reqbuffer.length() >= postsize) - { - postdata = reqbuffer.substr(0, postsize); - reqbuffer.erase(0, postsize); - } - else if (!reqbuffer.empty()) - { - postdata = reqbuffer; - reqbuffer.clear(); - } + waitingcull = true; + Close(); + ServerInstance->GlobalCulls.AddItem(this); + } - if (postdata.length() >= postsize) - ServeData(); + bool ParseURI(const std::string& uri, HTTPRequestURI& out) + { + http_parser_url_init(&url); + if (http_parser_parse_url(uri.c_str(), uri.size(), 0, &url) != 0) + return false; - return; - } + if (url.field_set & (1 << UF_PATH)) + out.path = uri.substr(url.field_data[UF_PATH].off, url.field_data[UF_PATH].len); - ServeData(); - } + if (url.field_set & (1 << UF_FRAGMENT)) + out.fragment = uri.substr(url.field_data[UF_FRAGMENT].off, url.field_data[UF_FRAGMENT].len); - void ServeData() - { - InternalState = HTTP_SERVE_SEND_DATA; + std::string param_str; + if (url.field_set & (1 << UF_QUERY)) + param_str = uri.substr(url.field_data[UF_QUERY].off, url.field_data[UF_QUERY].len); - claimed = false; - HTTPRequest acl((Module*)HttpModule, "httpd_acl", request_type, uri, &headers, this, ip, postdata); - acl.Send(); - if (!claimed) + irc::sepstream param_stream(param_str, '&'); + std::string token; + std::string::size_type eq_pos; + while (param_stream.GetToken(token)) { - HTTPRequest url((Module*)HttpModule, "httpd_url", request_type, uri, &headers, this, ip, postdata); - url.Send(); - if (!claimed) + eq_pos = token.find('='); + if (eq_pos == std::string::npos) { - SendHTTPError(404); + out.query_params.insert(std::make_pair(token, "")); + } + else + { + out.query_params.insert(std::make_pair(token.substr(0, eq_pos), token.substr(eq_pos + 1))); } } - } - - void Page(std::stringstream* n, int response, HTTPHeaders *hheaders) - { - SendHeaders(n->str().length(), response, *hheaders); - WriteData(n->str()); + return true; } }; @@ -346,21 +348,26 @@ class HTTPdAPIImpl : public HTTPdAPIBase void SendResponse(HTTPDocumentResponse& resp) CXX11_OVERRIDE { - claimed = true; resp.src.sock->Page(resp.document, resp.responsecode, &resp.headers); } }; class ModuleHttpServer : public Module { - std::vector httpsocks; HTTPdAPIImpl APIImpl; unsigned int timeoutsec; + Events::ModuleEventProvider acleventprov; + Events::ModuleEventProvider reqeventprov; public: ModuleHttpServer() : APIImpl(this) + , acleventprov(this, "event/http-acl") + , reqeventprov(this, "event/http-request") { + aclevprov = &acleventprov; + reqevprov = &reqeventprov; + HttpServerSocket::ConfigureParser(); } void init() CXX11_OVERRIDE @@ -371,31 +378,25 @@ class ModuleHttpServer : public Module void ReadConfig(ConfigStatus& status) CXX11_OVERRIDE { ConfigTag* tag = ServerInstance->Config->ConfValue("httpd"); - timeoutsec = tag->getInt("timeout"); + timeoutsec = tag->getDuration("timeout", 10, 1); } ModResult OnAcceptConnection(int nfd, ListenSocket* from, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* server) CXX11_OVERRIDE { - if (from->bind_tag->getString("type") != "httpd") + if (!stdalgo::string::equalsci(from->bind_tag->getString("type"), "httpd")) return MOD_RES_PASSTHRU; - int port; - std::string incomingip; - irc::sockets::satoap(*client, incomingip, port); - sockets.insert(new HttpServerSocket(nfd, incomingip, from, client, server)); + + sockets.push_front(new HttpServerSocket(nfd, client->addr(), from, client, server, timeoutsec)); return MOD_RES_ALLOW; } - void OnBackgroundTimer(time_t curtime) CXX11_OVERRIDE + void OnUnloadModule(Module* mod) CXX11_OVERRIDE { - if (!timeoutsec) - return; - - time_t oldest_allowed = curtime - timeoutsec; - for (std::set::const_iterator i = sockets.begin(); i != sockets.end(); ) + for (insp::intrusive_list::const_iterator i = sockets.begin(); i != sockets.end(); ) { HttpServerSocket* sock = *i; ++i; - if (sock->createtime < oldest_allowed) + if (sock->GetModHook(mod)) { sock->cull(); delete sock; @@ -405,13 +406,10 @@ class ModuleHttpServer : public Module CullResult cull() CXX11_OVERRIDE { - std::set local; - local.swap(sockets); - for (std::set::const_iterator i = local.begin(); i != local.end(); ++i) + for (insp::intrusive_list::const_iterator i = sockets.begin(); i != sockets.end(); ++i) { HttpServerSocket* sock = *i; - sock->cull(); - delete sock; + sock->AddToCull(); } return Module::cull(); }