/* This file is part of libmicrohttpd Copyright (C) 2007-2017 Daniel Pittman and Christian Grothoff This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ /** * @file connection.c * @brief Methods for managing connections * @author Daniel Pittman * @author Christian Grothoff * @author Karlson2k (Evgeny Grin) */ #include "internal.h" #include "mhd_limits.h" #include "connection.h" #include "memorypool.h" #include "response.h" #include "mhd_mono_clock.h" #include "mhd_str.h" #include "mhd_locks.h" #include "mhd_sockets.h" #include "mhd_compat.h" #include "mhd_itc.h" #ifdef MHD_LINUX_SOLARIS_SENDFILE #include #endif /* MHD_LINUX_SOLARIS_SENDFILE */ #if defined(HAVE_FREEBSD_SENDFILE) || defined(HAVE_DARWIN_SENDFILE) #include #include #include #endif /* HAVE_FREEBSD_SENDFILE || HAVE_DARWIN_SENDFILE */ #ifdef HTTPS_SUPPORT #include "connection_https.h" #endif /* HTTPS_SUPPORT */ /** * Message to transmit when http 1.1 request is received */ #define HTTP_100_CONTINUE "HTTP/1.1 100 Continue\r\n\r\n" /** * Response text used when the request (http header) is too big to * be processed. * * Intentionally empty here to keep our memory footprint * minimal. */ #ifdef HAVE_MESSAGES #define REQUEST_TOO_BIG "Request too bigYour HTTP header was too big for the memory constraints of this webserver." #else #define REQUEST_TOO_BIG "" #endif /** * Response text used when the request (http header) does not * contain a "Host:" header and still claims to be HTTP 1.1. * * Intentionally empty here to keep our memory footprint * minimal. */ #ifdef HAVE_MESSAGES #define REQUEST_LACKS_HOST ""Host:" header requiredIn HTTP 1.1, requests must include a "Host:" header, and your HTTP 1.1 request lacked such a header." #else #define REQUEST_LACKS_HOST "" #endif /** * Response text used when the request (http header) is * malformed. * * Intentionally empty here to keep our memory footprint * minimal. */ #ifdef HAVE_MESSAGES #define REQUEST_MALFORMED "Request malformedYour HTTP request was syntactically incorrect." #else #define REQUEST_MALFORMED "" #endif /** * Response text used when there is an internal server error. * * Intentionally empty here to keep our memory footprint * minimal. */ #ifdef HAVE_MESSAGES #define INTERNAL_ERROR "Internal server errorPlease ask the developer of this Web server to carefully read the GNU libmicrohttpd documentation about connection management and blocking." #else #define INTERNAL_ERROR "" #endif /** * Add extra debug messages with reasons for closing connections * (non-error reasons). */ #define DEBUG_CLOSE MHD_NO /** * Should all data send be printed to stderr? */ #define DEBUG_SEND_DATA MHD_NO /** * sendfile() chuck size */ #define MHD_SENFILE_CHUNK_ (0x20000) /** * sendfile() chuck size for thread-per-connection */ #define MHD_SENFILE_CHUNK_THR_P_C_ (0x200000) #ifdef HAVE_FREEBSD_SENDFILE #ifdef SF_FLAGS /** * FreeBSD sendfile() flags */ static int freebsd_sendfile_flags_; /** * FreeBSD sendfile() flags for thread-per-connection */ static int freebsd_sendfile_flags_thd_p_c_; #endif /* SF_FLAGS */ /** * Initialises static variables */ void MHD_conn_init_static_ (void) { /* FreeBSD 11 and later allow to specify read-ahead size * and handles SF_NODISKIO differently. * SF_FLAGS defined only on FreeBSD 11 and later. */ #ifdef SF_FLAGS long sys_page_size = sysconf (_SC_PAGESIZE); if (0 > sys_page_size) { /* Failed to get page size. */ freebsd_sendfile_flags_ = SF_NODISKIO; freebsd_sendfile_flags_thd_p_c_ = SF_NODISKIO; } else { freebsd_sendfile_flags_ = SF_FLAGS((uint16_t)(MHD_SENFILE_CHUNK_ / sys_page_size), SF_NODISKIO); freebsd_sendfile_flags_thd_p_c_ = SF_FLAGS((uint16_t)(MHD_SENFILE_CHUNK_THR_P_C_ / sys_page_size), SF_NODISKIO); } #endif /* SF_FLAGS */ } #endif /* HAVE_FREEBSD_SENDFILE */ /** * Callback for receiving data from the socket. * * @param connection the MHD connection structure * @param other where to write received data to * @param i maximum size of other (in bytes) * @return positive value for number of bytes actually received or * negative value for error number MHD_ERR_xxx_ */ static ssize_t recv_param_adapter (struct MHD_Connection *connection, void *other, size_t i) { ssize_t ret; if ( (MHD_INVALID_SOCKET == connection->socket_fd) || (MHD_CONNECTION_CLOSED == connection->state) ) { return MHD_ERR_NOTCONN_; } if (i > MHD_SCKT_SEND_MAX_SIZE_) i = MHD_SCKT_SEND_MAX_SIZE_; /* return value limit */ ret = MHD_recv_ (connection->socket_fd, other, i); if (0 > ret) { const int err = MHD_socket_get_error_ (); if (MHD_SCKT_ERR_IS_EAGAIN_ (err)) { #ifdef EPOLL_SUPPORT /* Got EAGAIN --- no longer read-ready */ connection->epoll_state &= ~MHD_EPOLL_STATE_READ_READY; #endif /* EPOLL_SUPPORT */ return MHD_ERR_AGAIN_; } if (MHD_SCKT_ERR_IS_EINTR_ (err)) return MHD_ERR_AGAIN_; if (MHD_SCKT_ERR_IS_ (err, MHD_SCKT_ECONNRESET_)) return MHD_ERR_CONNRESET_; /* Treat any other error as hard error. */ return MHD_ERR_NOTCONN_; } #ifdef EPOLL_SUPPORT else if (i > (size_t)ret) connection->epoll_state &= ~MHD_EPOLL_STATE_READ_READY; #endif /* EPOLL_SUPPORT */ return ret; } /** * Callback for writing data to the socket. * * @param connection the MHD connection structure * @param other data to write * @param i number of bytes to write * @return positive value for number of bytes actually sent or * negative value for error number MHD_ERR_xxx_ */ static ssize_t send_param_adapter (struct MHD_Connection *connection, const void *other, size_t i) { ssize_t ret; if ( (MHD_INVALID_SOCKET == connection->socket_fd) || (MHD_CONNECTION_CLOSED == connection->state) ) { return MHD_ERR_NOTCONN_; } if (i > MHD_SCKT_SEND_MAX_SIZE_) i = MHD_SCKT_SEND_MAX_SIZE_; /* return value limit */ ret = MHD_send_ (connection->socket_fd, other, i); if (0 > ret) { const int err = MHD_socket_get_error_(); if (MHD_SCKT_ERR_IS_EAGAIN_(err)) { #ifdef EPOLL_SUPPORT /* EAGAIN --- no longer write-ready */ connection->epoll_state &= ~MHD_EPOLL_STATE_WRITE_READY; #endif /* EPOLL_SUPPORT */ return MHD_ERR_AGAIN_; } if (MHD_SCKT_ERR_IS_EINTR_ (err)) return MHD_ERR_AGAIN_; if (MHD_SCKT_ERR_IS_ (err, MHD_SCKT_ECONNRESET_)) return MHD_ERR_CONNRESET_; /* Treat any other error as hard error. */ return MHD_ERR_NOTCONN_; } #ifdef EPOLL_SUPPORT else if (i > (size_t)ret) connection->epoll_state &= ~MHD_EPOLL_STATE_WRITE_READY; #endif /* EPOLL_SUPPORT */ return ret; } #if defined(_MHD_HAVE_SENDFILE) /** * Function for sending responses backed by file FD. * * @param connection the MHD connection structure * @return actual number of bytes sent */ static ssize_t sendfile_adapter (struct MHD_Connection *connection) { ssize_t ret; const int file_fd = connection->response->fd; uint64_t left; uint64_t offsetu64; #ifndef HAVE_SENDFILE64 const uint64_t max_off_t = (uint64_t)OFF_T_MAX; #else /* HAVE_SENDFILE64 */ const uint64_t max_off_t = (uint64_t)OFF64_T_MAX; #endif /* HAVE_SENDFILE64 */ #ifdef MHD_LINUX_SOLARIS_SENDFILE #ifndef HAVE_SENDFILE64 off_t offset; #else /* HAVE_SENDFILE64 */ off64_t offset; #endif /* HAVE_SENDFILE64 */ #endif /* MHD_LINUX_SOLARIS_SENDFILE */ #ifdef HAVE_FREEBSD_SENDFILE off_t sent_bytes; int flags = 0; #endif #ifdef HAVE_DARWIN_SENDFILE off_t len; #endif /* HAVE_DARWIN_SENDFILE */ const bool used_thr_p_c = (0 != (connection->daemon->options & MHD_USE_THREAD_PER_CONNECTION)); const size_t chunk_size = used_thr_p_c ? MHD_SENFILE_CHUNK_THR_P_C_ : MHD_SENFILE_CHUNK_; size_t send_size = 0; mhd_assert (MHD_resp_sender_sendfile == connection->resp_sender); offsetu64 = connection->response_write_position + connection->response->fd_off; left = connection->response->total_size - connection->response_write_position; /* Do not allow system to stick sending on single fast connection: * use 128KiB chunks (2MiB for thread-per-connection). */ send_size = (left > chunk_size) ? chunk_size : (size_t) left; if (max_off_t < offsetu64) { /* Retry to send with standard 'send()'. */ connection->resp_sender = MHD_resp_sender_std; return MHD_ERR_AGAIN_; } #ifdef MHD_LINUX_SOLARIS_SENDFILE #ifndef HAVE_SENDFILE64 offset = (off_t) offsetu64; ret = sendfile (connection->socket_fd, file_fd, &offset, send_size); #else /* HAVE_SENDFILE64 */ offset = (off64_t) offsetu64; ret = sendfile64 (connection->socket_fd, file_fd, &offset, send_size); #endif /* HAVE_SENDFILE64 */ if (0 > ret) { const int err = MHD_socket_get_error_(); if (MHD_SCKT_ERR_IS_EAGAIN_(err)) { #ifdef EPOLL_SUPPORT /* EAGAIN --- no longer write-ready */ connection->epoll_state &= ~MHD_EPOLL_STATE_WRITE_READY; #endif /* EPOLL_SUPPORT */ return MHD_ERR_AGAIN_; } if (MHD_SCKT_ERR_IS_EINTR_ (err)) return MHD_ERR_AGAIN_; #ifdef HAVE_LINUX_SENDFILE if (MHD_SCKT_ERR_IS_(err, MHD_SCKT_EBADF_)) return MHD_ERR_BADF_; /* sendfile() failed with EINVAL if mmap()-like operations are not supported for FD or other 'unusual' errors occurred, so we should try to fall back to 'SEND'; see also this thread for info on odd libc/Linux behavior with sendfile: http://lists.gnu.org/archive/html/libmicrohttpd/2011-02/msg00015.html */ connection->resp_sender = MHD_resp_sender_std; return MHD_ERR_AGAIN_; #else /* HAVE_SOLARIS_SENDFILE */ if ( (EAFNOSUPPORT == err) || (EINVAL == err) || (EOPNOTSUPP == err) ) { /* Retry with standard file reader. */ connection->resp_sender = MHD_resp_sender_std; return MHD_ERR_AGAIN_; } if ( (ENOTCONN == err) || (EPIPE == err) ) { return MHD_ERR_CONNRESET_; } return MHD_ERR_BADF_; /* Fail hard */ #endif /* HAVE_SOLARIS_SENDFILE */ } #ifdef EPOLL_SUPPORT else if (send_size > (size_t)ret) connection->epoll_state &= ~MHD_EPOLL_STATE_WRITE_READY; #endif /* EPOLL_SUPPORT */ #elif defined(HAVE_FREEBSD_SENDFILE) #ifdef SF_FLAGS flags = used_thr_p_c ? freebsd_sendfile_flags_thd_p_c_ : freebsd_sendfile_flags_; #endif /* SF_FLAGS */ if (0 != sendfile (file_fd, connection->socket_fd, (off_t) offsetu64, send_size, NULL, &sent_bytes, flags)) { const int err = MHD_socket_get_error_(); if (MHD_SCKT_ERR_IS_EAGAIN_(err) || MHD_SCKT_ERR_IS_EINTR_(err) || EBUSY == err) { mhd_assert (SSIZE_MAX >= sent_bytes); if (0 != sent_bytes) return (ssize_t)sent_bytes; return MHD_ERR_AGAIN_; } /* Some unrecoverable error. Possibly file FD is not suitable * for sendfile(). Retry with standard send(). */ connection->resp_sender = MHD_resp_sender_std; return MHD_ERR_AGAIN_; } mhd_assert (0 < sent_bytes); mhd_assert (SSIZE_MAX >= sent_bytes); ret = (ssize_t)sent_bytes; #elif defined(HAVE_DARWIN_SENDFILE) len = (off_t)send_size; /* chunk always fit */ if (0 != sendfile (file_fd, connection->socket_fd, (off_t) offsetu64, &len, NULL, 0)) { const int err = MHD_socket_get_error_(); if (MHD_SCKT_ERR_IS_EAGAIN_(err) || MHD_SCKT_ERR_IS_EINTR_(err)) { mhd_assert (0 <= len); mhd_assert (SSIZE_MAX >= len); mhd_assert (send_size >= (size_t)len); if (0 != len) return (ssize_t)len; return MHD_ERR_AGAIN_; } if (ENOTCONN == err || EPIPE == err) return MHD_ERR_CONNRESET_; if (ENOTSUP == err || EOPNOTSUPP == err) { /* This file FD is not suitable for sendfile(). * Retry with standard send(). */ connection->resp_sender = MHD_resp_sender_std; return MHD_ERR_AGAIN_; } return MHD_ERR_BADF_; /* Return hard error. */ } mhd_assert (0 <= len); mhd_assert (SSIZE_MAX >= len); mhd_assert (send_size >= (size_t)len); ret = (ssize_t)len; #endif /* HAVE_FREEBSD_SENDFILE */ return ret; } #endif /* _MHD_HAVE_SENDFILE */ /** * Check whether is possible to force push socket buffer content as * partial packet. * MHD use different buffering logic depending on whether flushing of * socket buffer is possible or not. * If flushing IS possible than MHD activates extra buffering before * sending data to prevent sending partial packets and flush pending * data in socket buffer to push last partial packet to client after * sending logical completed part of data (for example: after sending * full response header or full response message). * If flushing IS NOT possible than MHD activates no buffering (no * delay sending) when it going to send formed fully completed logical * part of data and activate normal buffering after sending. * For idled keep-alive connection MHD always activate normal * buffering. * * @param connection connection to check * @return #MHD_YES if force push is possible, #MHD_NO otherwise */ static int socket_flush_possible(struct MHD_Connection *connection) { (void)connection; /* Mute compiler warning. */ #if defined(TCP_CORK) || defined(TCP_PUSH) return MHD_YES; #else /* !TCP_CORK && !TCP_PUSH */ return MHD_NO; #endif /* !TCP_CORK && !TCP_PUSH */ } /** * Activate extra buffering mode on connection socket to prevent * sending of partial packets. * * @param connection connection to be processed * @return #MHD_YES on success, #MHD_NO otherwise */ static int socket_start_extra_buffering (struct MHD_Connection *connection) { int res = MHD_NO; (void)connection; /* Mute compiler warning. */ #if defined(TCP_CORK) || defined(TCP_NOPUSH) const MHD_SCKT_OPT_BOOL_ on_val = 1; #if defined(TCP_NODELAY) const MHD_SCKT_OPT_BOOL_ off_val = 0; #endif /* TCP_NODELAY */ mhd_assert(NULL != connection); #if defined(TCP_NOPUSH) && !defined(TCP_CORK) /* Buffer data before sending */ res = (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_NOPUSH, (const void *) &on_val, sizeof (on_val))) ? MHD_YES : MHD_NO; #if defined(TCP_NODELAY) /* Enable Nagle's algorithm */ /* TCP_NODELAY may interfere with TCP_NOPUSH */ res &= (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_NODELAY, (const void *) &off_val, sizeof (off_val))) ? MHD_YES : MHD_NO; #endif /* TCP_NODELAY */ #else /* TCP_CORK */ #if defined(TCP_NODELAY) /* Enable Nagle's algorithm */ /* TCP_NODELAY may prevent enabling TCP_CORK. Resulting buffering mode depends solely on TCP_CORK result, so ignoring return code here. */ (void) setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_NODELAY, (const void *) &off_val, sizeof (off_val)); #endif /* TCP_NODELAY */ /* Send only full packets */ res = (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_CORK, (const void *) &on_val, sizeof (on_val))) ? MHD_YES : MHD_NO; #endif /* TCP_CORK */ #endif /* TCP_CORK || TCP_NOPUSH */ return res; } /** * Activate no buffering mode (no delay sending) on connection socket. * * @param connection connection to be processed * @return #MHD_YES on success, #MHD_NO otherwise */ static int socket_start_no_buffering (struct MHD_Connection *connection) { #if defined(TCP_NODELAY) int res = MHD_YES; const MHD_SCKT_OPT_BOOL_ on_val = 1; #if defined(TCP_CORK) || defined(TCP_NOPUSH) const MHD_SCKT_OPT_BOOL_ off_val = 0; #endif /* TCP_CORK || TCP_NOPUSH */ (void)connection; /* Mute compiler warning. */ mhd_assert(NULL != connection); #if defined(TCP_CORK) /* Allow partial packets */ res &= (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_CORK, (const void *) &off_val, sizeof (off_val))) ? MHD_YES : MHD_NO; #endif /* TCP_CORK */ #if defined(TCP_NODELAY) /* Disable Nagle's algorithm for sending packets without delay */ res &= (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_NODELAY, (const void *) &on_val, sizeof (on_val))) ? MHD_YES : MHD_NO; #endif /* TCP_NODELAY */ #if defined(TCP_NOPUSH) && !defined(TCP_CORK) /* Disable extra buffering */ res &= (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_NOPUSH, (const void *) &off_val, sizeof (off_val))) ? MHD_YES : MHD_NO; #endif /* TCP_NOPUSH && !TCP_CORK */ return res; #else /* !TCP_NODELAY */ return MHD_NO; #endif /* !TCP_NODELAY */ } /** * Activate no buffering mode (no delay sending) on connection socket * and push to client data pending in socket buffer. * * @param connection connection to be processed * @return #MHD_YES on success, #MHD_NO otherwise */ static int socket_start_no_buffering_flush (struct MHD_Connection *connection) { int res = MHD_YES; #if defined(TCP_NOPUSH) && !defined(TCP_CORK) const int dummy = 0; #endif /* !TCP_CORK */ if (NULL == connection) return MHD_NO; res = socket_start_no_buffering (connection); #if defined(TCP_NOPUSH) && !defined(TCP_CORK) /* Force flush data with zero send otherwise Darwin and some BSD systems will add 5 seconds delay. Not required with TCP_CORK as switching off TCP_CORK always flushes socket buffer. */ res &= (0 <= MHD_send_ (connection->socket_fd, &dummy, 0)) ? MHD_YES : MHD_NO; #endif /* TCP_NOPUSH && !TCP_CORK*/ return res; } /** * Activate normal buffering mode on connection socket. * * @param connection connection to be processed * @return #MHD_YES on success, #MHD_NO otherwise */ static int socket_start_normal_buffering (struct MHD_Connection *connection) { #if defined(TCP_NODELAY) int res = MHD_YES; const MHD_SCKT_OPT_BOOL_ off_val = 0; #if defined(TCP_CORK) MHD_SCKT_OPT_BOOL_ cork_val = 0; socklen_t param_size = sizeof (cork_val); #endif /* TCP_CORK */ mhd_assert(NULL != connection); #if defined(TCP_CORK) /* Allow partial packets */ /* Disabling TCP_CORK will flush partial packet even if TCP_CORK wasn't enabled before so try to check current value of TCP_CORK to prevent unrequested flushing */ if ( (0 != getsockopt (connection->socket_fd, IPPROTO_TCP, TCP_CORK, (void*)&cork_val, ¶m_size)) || (0 != cork_val)) res &= (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_CORK, (const void *) &off_val, sizeof (off_val))) ? MHD_YES : MHD_NO; #elif defined(TCP_NOPUSH) /* Disable extra buffering */ /* No need to check current value as disabling TCP_NOPUSH will not flush partial packet if TCP_NOPUSH wasn't enabled before */ res &= (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_NOPUSH, (const void *) &off_val, sizeof (off_val))) ? MHD_YES : MHD_NO; #endif /* TCP_NOPUSH && !TCP_CORK */ /* Enable Nagle's algorithm for normal buffering */ res &= (0 == setsockopt (connection->socket_fd, IPPROTO_TCP, TCP_NODELAY, (const void *) &off_val, sizeof (off_val))) ? MHD_YES : MHD_NO; return res; #else /* !TCP_NODELAY */ return MHD_NO; #endif /* !TCP_NODELAY */ } /** * Get all of the headers from the request. * * @param connection connection to get values from * @param kind types of values to iterate over, can be a bitmask * @param iterator callback to call on each header; * maybe NULL (then just count headers) * @param iterator_cls extra argument to @a iterator * @return number of entries iterated over * @ingroup request */ int MHD_get_connection_values (struct MHD_Connection *connection, enum MHD_ValueKind kind, MHD_KeyValueIterator iterator, void *iterator_cls) { int ret; struct MHD_HTTP_Header *pos; if (NULL == connection) return -1; ret = 0; for (pos = connection->headers_received; NULL != pos; pos = pos->next) if (0 != (pos->kind & kind)) { ret++; if ( (NULL != iterator) && (MHD_YES != iterator (iterator_cls, pos->kind, pos->header, pos->value)) ) return ret; } return ret; } /** * This function can be used to add an entry to the HTTP headers of a * connection (so that the #MHD_get_connection_values function will * return them -- and the `struct MHD_PostProcessor` will also see * them). This maybe required in certain situations (see Mantis * #1399) where (broken) HTTP implementations fail to supply values * needed by the post processor (or other parts of the application). * * This function MUST only be called from within the * #MHD_AccessHandlerCallback (otherwise, access maybe improperly * synchronized). Furthermore, the client must guarantee that the key * and value arguments are 0-terminated strings that are NOT freed * until the connection is closed. (The easiest way to do this is by * passing only arguments to permanently allocated strings.). * * @param connection the connection for which a * value should be set * @param kind kind of the value * @param key key for the value * @param value the value itself * @return #MHD_NO if the operation could not be * performed due to insufficient memory; * #MHD_YES on success * @ingroup request */ int MHD_set_connection_value (struct MHD_Connection *connection, enum MHD_ValueKind kind, const char *key, const char *value) { struct MHD_HTTP_Header *pos; pos = MHD_pool_allocate (connection->pool, sizeof (struct MHD_HTTP_Header), MHD_YES); if (NULL == pos) return MHD_NO; pos->header = (char *) key; pos->value = (char *) value; pos->kind = kind; pos->next = NULL; /* append 'pos' to the linked list of headers */ if (NULL == connection->headers_received_tail) { connection->headers_received = pos; connection->headers_received_tail = pos; } else { connection->headers_received_tail->next = pos; connection->headers_received_tail = pos; } return MHD_YES; } /** * Get a particular header value. If multiple * values match the kind, return any one of them. * * @param connection connection to get values from * @param kind what kind of value are we looking for * @param key the header to look for, NULL to lookup 'trailing' value without a key * @return NULL if no such item was found * @ingroup request */ const char * MHD_lookup_connection_value (struct MHD_Connection *connection, enum MHD_ValueKind kind, const char *key) { struct MHD_HTTP_Header *pos; if (NULL == connection) return NULL; for (pos = connection->headers_received; NULL != pos; pos = pos->next) if ((0 != (pos->kind & kind)) && ( (key == pos->header) || ( (NULL != pos->header) && (NULL != key) && (MHD_str_equal_caseless_(key, pos->header))))) return pos->value; return NULL; } /** * Check whether request header contains particular token. * * Token could be surrounded by spaces and tabs and delimited by comma. * Case-insensitive match used for header names and tokens. * @param connection the connection to get values from * @param header the header name * @param token the token to find * @param token_len the length of token, not including optional * terminating null-character. * @return true if token is found in specified header, * false otherwise */ static bool MHD_lookup_header_token_ci (const struct MHD_Connection *connection, const char *header, const char *token, size_t token_len) { struct MHD_HTTP_Header *pos; if (NULL == connection || NULL == header || 0 == header[0] || NULL == token || 0 == token[0]) return false; for (pos = connection->headers_received; NULL != pos; pos = pos->next) { if ((0 != (pos->kind & MHD_HEADER_KIND)) && ( (header == pos->header) || (MHD_str_equal_caseless_(header, pos->header)) ) && (MHD_str_has_token_caseless_ (pos->value, token, token_len))) return true; } return false; } /** * Check whether request header contains particular static @a tkn. * * Token could be surrounded by spaces and tabs and delimited by comma. * Case-insensitive match used for header names and tokens. * @param c the connection to get values from * @param h the header name * @param tkn the static string of token to find * @return true if token is found in specified header, * false otherwise */ #define MHD_lookup_header_s_token_ci(c,h,tkn) \ MHD_lookup_header_token_ci((c),(h),(tkn),MHD_STATICSTR_LEN_(tkn)) /** * Do we (still) need to send a 100 continue * message for this connection? * * @param connection connection to test * @return 0 if we don't need 100 CONTINUE, 1 if we do */ static int need_100_continue (struct MHD_Connection *connection) { const char *expect; return ( (NULL == connection->response) && (NULL != connection->version) && (MHD_str_equal_caseless_(connection->version, MHD_HTTP_VERSION_1_1)) && (NULL != (expect = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, MHD_HTTP_HEADER_EXPECT))) && (MHD_str_equal_caseless_(expect, "100-continue")) && (connection->continue_message_write_offset < MHD_STATICSTR_LEN_ (HTTP_100_CONTINUE)) ); } /** * Mark connection as "closed". * @remark To be called from any thread. * * @param connection connection to close */ void MHD_connection_mark_closed_ (struct MHD_Connection *connection) { const struct MHD_Daemon *daemon = connection->daemon; connection->state = MHD_CONNECTION_CLOSED; connection->event_loop_info = MHD_EVENT_LOOP_INFO_CLEANUP; if (0 == (daemon->options & MHD_USE_TURBO)) { #ifdef HTTPS_SUPPORT /* For TLS connection use shutdown of TLS layer * and do not shutdown TCP socket. This give more * chances to send TLS closure data to remote side. * Closure of TLS layer will be interpreted by * remote side as end of transmission. */ if (0 != (daemon->options & MHD_USE_TLS)) { if (! MHD_tls_connection_shutdown(connection)) shutdown (connection->socket_fd, SHUT_WR); } else /* Combined with next 'shutdown()'. */ #endif /* HTTPS_SUPPORT */ shutdown (connection->socket_fd, SHUT_WR); } } /** * Close the given connection and give the * specified termination code to the user. * @remark To be called only from thread that * process connection's recv(), send() and response. * * @param connection connection to close * @param termination_code termination reason to give */ void MHD_connection_close_ (struct MHD_Connection *connection, enum MHD_RequestTerminationCode termination_code) { struct MHD_Daemon *daemon = connection->daemon; struct MHD_Response *resp = connection->response; MHD_connection_mark_closed_ (connection); if (NULL != resp) { connection->response = NULL; MHD_destroy_response (resp); } if ( (NULL != daemon->notify_completed) && (connection->client_aware) ) daemon->notify_completed (daemon->notify_completed_cls, connection, &connection->client_context, termination_code); connection->client_aware = false; } #if defined(HTTPS_SUPPORT) && defined(UPGRADE_SUPPORT) /** * Stop TLS forwarding on upgraded connection and * reflect remote disconnect state to socketpair. * @remark In thread-per-connection mode this function * can be called from any thread, in other modes this * function must be called only from thread that process * daemon's select()/poll()/etc. * * @param connection the upgraded connection */ void MHD_connection_finish_forward_ (struct MHD_Connection *connection) { struct MHD_Daemon *daemon = connection->daemon; struct MHD_UpgradeResponseHandle *urh = connection->urh; if (0 == (daemon->options & MHD_USE_TLS)) return; /* Nothing to do with non-TLS connection. */ if (0 == (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) DLL_remove (daemon->urh_head, daemon->urh_tail, urh); #if EPOLL_SUPPORT if ( (0 != (daemon->options & MHD_USE_EPOLL)) && (0 != epoll_ctl (daemon->epoll_upgrade_fd, EPOLL_CTL_DEL, connection->socket_fd, NULL)) ) { MHD_PANIC (_("Failed to remove FD from epoll set\n")); } if (urh->in_eready_list) { EDLL_remove (daemon->eready_urh_head, daemon->eready_urh_tail, urh); urh->in_eready_list = false; } #endif /* EPOLL_SUPPORT */ if (MHD_INVALID_SOCKET != urh->mhd.socket) { #if EPOLL_SUPPORT if ( (0 != (daemon->options & MHD_USE_EPOLL)) && (0 != epoll_ctl (daemon->epoll_upgrade_fd, EPOLL_CTL_DEL, urh->mhd.socket, NULL)) ) { MHD_PANIC (_("Failed to remove FD from epoll set\n")); } #endif /* EPOLL_SUPPORT */ /* Reflect remote disconnect to application by breaking * socketpair connection. */ shutdown (urh->mhd.socket, SHUT_RDWR); } /* Socketpair sockets will remain open as they will be * used with MHD_UPGRADE_ACTION_CLOSE. They will be * closed by MHD_cleanup_upgraded_connection_() during * connection's final cleanup. */ } #endif /* HTTPS_SUPPORT && UPGRADE_SUPPORT*/ /** * A serious error occured, close the * connection (and notify the application). * * @param connection connection to close with error * @param emsg error message (can be NULL) */ static void connection_close_error (struct MHD_Connection *connection, const char *emsg) { #ifdef HAVE_MESSAGES if (NULL != emsg) MHD_DLOG (connection->daemon, emsg); #else /* ! HAVE_MESSAGES */ (void)emsg; /* Mute compiler warning. */ #endif /* ! HAVE_MESSAGES */ MHD_connection_close_ (connection, MHD_REQUEST_TERMINATED_WITH_ERROR); } /** * Macro to only include error message in call to * #connection_close_error() if we have HAVE_MESSAGES. */ #ifdef HAVE_MESSAGES #define CONNECTION_CLOSE_ERROR(c, emsg) connection_close_error (c, emsg) #else #define CONNECTION_CLOSE_ERROR(c, emsg) connection_close_error (c, NULL) #endif /** * Prepare the response buffer of this connection for * sending. Assumes that the response mutex is * already held. If the transmission is complete, * this function may close the socket (and return * #MHD_NO). * * @param connection the connection * @return #MHD_NO if readying the response failed (the * lock on the response will have been released already * in this case). */ static int try_ready_normal_body (struct MHD_Connection *connection) { ssize_t ret; struct MHD_Response *response; response = connection->response; if (NULL == response->crc) return MHD_YES; if ( (0 == response->total_size) || (connection->response_write_position == response->total_size) ) return MHD_YES; /* 0-byte response is always ready */ if ( (response->data_start <= connection->response_write_position) && (response->data_size + response->data_start > connection->response_write_position) ) return MHD_YES; /* response already ready */ #if defined(_MHD_HAVE_SENDFILE) if (MHD_resp_sender_sendfile == connection->resp_sender) { /* will use sendfile, no need to bother response crc */ return MHD_YES; } #endif /* _MHD_HAVE_SENDFILE */ ret = response->crc (response->crc_cls, connection->response_write_position, response->data, (size_t) MHD_MIN ((uint64_t)response->data_buffer_size, response->total_size - connection->response_write_position)); if ( (((ssize_t) MHD_CONTENT_READER_END_OF_STREAM) == ret) || (((ssize_t) MHD_CONTENT_READER_END_WITH_ERROR) == ret) ) { /* either error or http 1.0 transfer, close socket! */ response->total_size = connection->response_write_position; MHD_mutex_unlock_chk_ (&response->mutex); if ( ((ssize_t)MHD_CONTENT_READER_END_OF_STREAM) == ret) MHD_connection_close_ (connection, MHD_REQUEST_TERMINATED_COMPLETED_OK); else CONNECTION_CLOSE_ERROR (connection, _("Closing connection (application reported error generating data)\n")); return MHD_NO; } response->data_start = connection->response_write_position; response->data_size = ret; if (0 == ret) { connection->state = MHD_CONNECTION_NORMAL_BODY_UNREADY; MHD_mutex_unlock_chk_ (&response->mutex); return MHD_NO; } return MHD_YES; } /** * Prepare the response buffer of this connection for sending. * Assumes that the response mutex is already held. If the * transmission is complete, this function may close the socket (and * return #MHD_NO). * * @param connection the connection * @return #MHD_NO if readying the response failed */ static int try_ready_chunked_body (struct MHD_Connection *connection) { ssize_t ret; char *buf; struct MHD_Response *response; size_t size; char cbuf[10]; /* 10: max strlen of "%x\r\n" */ int cblen; response = connection->response; if (NULL == response->crc) return MHD_YES; if (0 == connection->write_buffer_size) { size = MHD_MIN (connection->daemon->pool_size, 2 * (0xFFFFFF + sizeof(cbuf) + 2)); do { size /= 2; if (size < 128) { MHD_mutex_unlock_chk_ (&response->mutex); /* not enough memory */ CONNECTION_CLOSE_ERROR (connection, _("Closing connection (out of memory)\n")); return MHD_NO; } buf = MHD_pool_allocate (connection->pool, size, MHD_NO); } while (NULL == buf); connection->write_buffer_size = size; connection->write_buffer = buf; } if (0 == response->total_size) ret = 0; /* response must be empty, don't bother calling crc */ else if ( (response->data_start <= connection->response_write_position) && (response->data_start + response->data_size > connection->response_write_position) ) { /* difference between response_write_position and data_start is less than data_size which is size_t type, no need to check for overflow */ const size_t data_write_offset = (size_t)(connection->response_write_position - response->data_start); /* buffer already ready, use what is there for the chunk */ ret = response->data_size - data_write_offset; if ( ((size_t) ret) > connection->write_buffer_size - sizeof (cbuf) - 2 ) ret = connection->write_buffer_size - sizeof (cbuf) - 2; memcpy (&connection->write_buffer[sizeof (cbuf)], &response->data[data_write_offset], ret); } else { /* buffer not in range, try to fill it */ ret = response->crc (response->crc_cls, connection->response_write_position, &connection->write_buffer[sizeof (cbuf)], connection->write_buffer_size - sizeof (cbuf) - 2); } if ( ((ssize_t) MHD_CONTENT_READER_END_WITH_ERROR) == ret) { /* error, close socket! */ response->total_size = connection->response_write_position; MHD_mutex_unlock_chk_ (&response->mutex); CONNECTION_CLOSE_ERROR (connection, _("Closing connection (application error generating response)\n")); return MHD_NO; } if ( (((ssize_t) MHD_CONTENT_READER_END_OF_STREAM) == ret) || (0 == response->total_size) ) { /* end of message, signal other side! */ strcpy (connection->write_buffer, "0\r\n"); connection->write_buffer_append_offset = 3; connection->write_buffer_send_offset = 0; response->total_size = connection->response_write_position; return MHD_YES; } if (0 == ret) { connection->state = MHD_CONNECTION_CHUNKED_BODY_UNREADY; MHD_mutex_unlock_chk_ (&response->mutex); return MHD_NO; } if (ret > 0xFFFFFF) ret = 0xFFFFFF; cblen = MHD_snprintf_(cbuf, sizeof (cbuf), "%X\r\n", (unsigned int) ret); mhd_assert(cblen > 0); mhd_assert((size_t)cblen < sizeof(cbuf)); memcpy (&connection->write_buffer[sizeof (cbuf) - cblen], cbuf, cblen); memcpy (&connection->write_buffer[sizeof (cbuf) + ret], "\r\n", 2); connection->response_write_position += ret; connection->write_buffer_send_offset = sizeof (cbuf) - cblen; connection->write_buffer_append_offset = sizeof (cbuf) + ret + 2; return MHD_YES; } /** * Are we allowed to keep the given connection alive? We can use the * TCP stream for a second request if the connection is HTTP 1.1 and * the "Connection" header either does not exist or is not set to * "close", or if the connection is HTTP 1.0 and the "Connection" * header is explicitly set to "keep-alive". If no HTTP version is * specified (or if it is not 1.0 or 1.1), we definitively close the * connection. If the "Connection" header is not exactly "close" or * "keep-alive", we proceed to use the default for the respective HTTP * version (which is conservative for HTTP 1.0, but might be a bit * optimistic for HTTP 1.1). * * @param connection the connection to check for keepalive * @return #MHD_YES if (based on the request), a keepalive is * legal */ static int keepalive_possible (struct MHD_Connection *connection) { if (MHD_CONN_MUST_CLOSE == connection->keepalive) return MHD_NO; if (NULL == connection->version) return MHD_NO; if ( (NULL != connection->response) && (0 != (connection->response->flags & MHD_RF_HTTP_VERSION_1_0_ONLY) ) ) return MHD_NO; if (MHD_str_equal_caseless_(connection->version, MHD_HTTP_VERSION_1_1)) { if (MHD_lookup_header_s_token_ci (connection, MHD_HTTP_HEADER_CONNECTION, "upgrade")) return MHD_NO; if (MHD_lookup_header_s_token_ci (connection, MHD_HTTP_HEADER_CONNECTION, "close")) return MHD_NO; return MHD_YES; } if (MHD_str_equal_caseless_(connection->version, MHD_HTTP_VERSION_1_0)) { if (MHD_lookup_header_s_token_ci (connection, MHD_HTTP_HEADER_CONNECTION, "Keep-Alive")) return MHD_YES; return MHD_NO; } return MHD_NO; } /** * Produce HTTP time stamp. * * @param date where to write the header, with * at least 128 bytes available space. * @param date_len number of bytes in @a date */ static void get_date_string (char *date, size_t date_len) { static const char *const days[] = { "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat" }; static const char *const mons[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec" }; struct tm now; time_t t; #if !defined(HAVE_C11_GMTIME_S) && !defined(HAVE_W32_GMTIME_S) && !defined(HAVE_GMTIME_R) struct tm* pNow; #endif date[0] = 0; time (&t); #if defined(HAVE_C11_GMTIME_S) if (NULL == gmtime_s (&t, &now)) return; #elif defined(HAVE_W32_GMTIME_S) if (0 != gmtime_s (&now, &t)) return; #elif defined(HAVE_GMTIME_R) if (NULL == gmtime_r(&t, &now)) return; #else pNow = gmtime(&t); if (NULL == pNow) return; now = *pNow; #endif MHD_snprintf_ (date, date_len, "Date: %3s, %02u %3s %04u %02u:%02u:%02u GMT\r\n", days[now.tm_wday % 7], (unsigned int) now.tm_mday, mons[now.tm_mon % 12], (unsigned int) (1900 + now.tm_year), (unsigned int) now.tm_hour, (unsigned int) now.tm_min, (unsigned int) now.tm_sec); } /** * Try growing the read buffer. We initially claim half the available * buffer space for the read buffer (the other half being left for * management data structures; the write buffer can in the end take * virtually everything as the read buffer can be reduced to the * minimum necessary at that point. * * @param connection the connection * @return #MHD_YES on success, #MHD_NO on failure */ static int try_grow_read_buffer (struct MHD_Connection *connection) { void *buf; size_t new_size; if (0 == connection->read_buffer_size) new_size = connection->daemon->pool_size / 2; else new_size = connection->read_buffer_size + MHD_BUF_INC_SIZE; buf = MHD_pool_reallocate (connection->pool, connection->read_buffer, connection->read_buffer_size, new_size); if (NULL == buf) return MHD_NO; /* we can actually grow the buffer, do it! */ connection->read_buffer = buf; connection->read_buffer_size = new_size; return MHD_YES; } /** * Allocate the connection's write buffer and fill it with all of the * headers (or footers, if we have already sent the body) from the * HTTPd's response. If headers are missing in the response supplied * by the application, additional headers may be added here. * * @param connection the connection * @return #MHD_YES on success, #MHD_NO on failure (out of memory) */ static int build_header_response (struct MHD_Connection *connection) { size_t size; size_t off; struct MHD_HTTP_Header *pos; char code[256]; char date[128]; char content_length_buf[128]; size_t content_length_len; char *data; enum MHD_ValueKind kind; const char *reason_phrase; uint32_t rc; bool client_requested_close; bool response_has_close; bool response_has_keepalive; const char *have_encoding; const char *have_content_length; int must_add_close; int must_add_chunked_encoding; int must_add_keep_alive; int must_add_content_length; mhd_assert (NULL != connection->version); if (0 == connection->version[0]) { data = MHD_pool_allocate (connection->pool, 0, MHD_YES); connection->write_buffer = data; connection->write_buffer_append_offset = 0; connection->write_buffer_send_offset = 0; connection->write_buffer_size = 0; return MHD_YES; } rc = connection->responseCode & (~MHD_ICY_FLAG); if (MHD_CONNECTION_FOOTERS_RECEIVED == connection->state) { reason_phrase = MHD_get_reason_phrase_for (rc); MHD_snprintf_ (code, sizeof (code), "%s %u %s\r\n", (0 != (connection->responseCode & MHD_ICY_FLAG)) ? "ICY" : ( (MHD_str_equal_caseless_ (MHD_HTTP_VERSION_1_0, connection->version)) ? MHD_HTTP_VERSION_1_0 : MHD_HTTP_VERSION_1_1), rc, reason_phrase); off = strlen (code); /* estimate size */ size = off + 2; /* +2 for extra "\r\n" at the end */ kind = MHD_HEADER_KIND; if ( (0 == (connection->daemon->options & MHD_USE_SUPPRESS_DATE_NO_CLOCK)) && (NULL == MHD_get_response_header (connection->response, MHD_HTTP_HEADER_DATE)) ) get_date_string (date, sizeof (date)); else date[0] = '\0'; size += strlen (date); } else { /* 2 bytes for final CRLF of a Chunked-Body */ size = 2; kind = MHD_FOOTER_KIND; off = 0; } /* calculate extra headers we need to add, such as 'Connection: close', first see what was explicitly requested by the application */ must_add_close = MHD_NO; must_add_chunked_encoding = MHD_NO; must_add_keep_alive = MHD_NO; must_add_content_length = MHD_NO; response_has_close = false; response_has_keepalive = false; switch (connection->state) { case MHD_CONNECTION_FOOTERS_RECEIVED: response_has_close = MHD_check_response_header_s_token_ci (connection->response, MHD_HTTP_HEADER_CONNECTION, "close"); response_has_keepalive = MHD_check_response_header_s_token_ci (connection->response, MHD_HTTP_HEADER_CONNECTION, "Keep-Alive"); client_requested_close = MHD_lookup_header_s_token_ci (connection, MHD_HTTP_HEADER_CONNECTION, "close"); if (0 != (connection->response->flags & MHD_RF_HTTP_VERSION_1_0_ONLY)) connection->keepalive = MHD_CONN_MUST_CLOSE; #ifdef UPGRADE_SUPPORT else if (NULL != connection->response->upgrade_handler) /* If this connection will not be "upgraded", it must be closed. */ connection->keepalive = MHD_CONN_MUST_CLOSE; #endif /* UPGRADE_SUPPORT */ /* now analyze chunked encoding situation */ connection->have_chunked_upload = false; if ( (MHD_SIZE_UNKNOWN == connection->response->total_size) && #ifdef UPGRADE_SUPPORT (NULL == connection->response->upgrade_handler) && #endif /* UPGRADE_SUPPORT */ (! response_has_close) && (! client_requested_close) ) { /* size is unknown, and close was not explicitly requested; need to either to HTTP 1.1 chunked encoding or close the connection */ /* 'close' header doesn't exist yet, see if we need to add one; if the client asked for a close, no need to start chunk'ing */ if ( (MHD_YES == keepalive_possible (connection)) && (MHD_str_equal_caseless_ (MHD_HTTP_VERSION_1_1, connection->version) ) ) { have_encoding = MHD_get_response_header (connection->response, MHD_HTTP_HEADER_TRANSFER_ENCODING); if (NULL == have_encoding) { must_add_chunked_encoding = MHD_YES; connection->have_chunked_upload = true; } else if (MHD_str_equal_caseless_ (have_encoding, "identity")) { /* application forced identity encoding, can't do 'chunked' */ must_add_close = MHD_YES; } else { connection->have_chunked_upload = true; } } else { /* Keep alive or chunking not possible => set close header if not present */ if (! response_has_close) must_add_close = MHD_YES; } } /* check for other reasons to add 'close' header */ if ( ( (client_requested_close) || (connection->read_closed) || (MHD_CONN_MUST_CLOSE == connection->keepalive)) && (! response_has_close) && #ifdef UPGRADE_SUPPORT (NULL == connection->response->upgrade_handler) && #endif /* UPGRADE_SUPPORT */ (0 == (connection->response->flags & MHD_RF_HTTP_VERSION_1_0_ONLY) ) ) must_add_close = MHD_YES; /* check if we should add a 'content length' header */ have_content_length = MHD_get_response_header (connection->response, MHD_HTTP_HEADER_CONTENT_LENGTH); /* MHD_HTTP_NO_CONTENT, MHD_HTTP_NOT_MODIFIED and 1xx-status codes SHOULD NOT have a Content-Length according to spec; also chunked encoding / unknown length or CONNECT... */ if ( (MHD_SIZE_UNKNOWN != connection->response->total_size) && (MHD_HTTP_NO_CONTENT != rc) && (MHD_HTTP_NOT_MODIFIED != rc) && (MHD_HTTP_OK <= rc) && (NULL == have_content_length) && ( (NULL == connection->method) || (! MHD_str_equal_caseless_ (connection->method, MHD_HTTP_METHOD_CONNECT)) ) ) { /* Here we add a content-length if one is missing; however, for 'connect' methods, the responses MUST NOT include a content-length header *if* the response code is 2xx (in which case we expect there to be no body). Still, as we don't know the response code here in some cases, we simply only force adding a content-length header if this is not a 'connect' or if the response is not empty (which is kind of more sane, because if some crazy application did return content with a 2xx status code, then having a content-length might again be a good idea). Note that the change from 'SHOULD NOT' to 'MUST NOT' is a recent development of the HTTP 1.1 specification. */ content_length_len = MHD_snprintf_ (content_length_buf, sizeof (content_length_buf), MHD_HTTP_HEADER_CONTENT_LENGTH ": " MHD_UNSIGNED_LONG_LONG_PRINTF "\r\n", (MHD_UNSIGNED_LONG_LONG) connection->response->total_size); must_add_content_length = MHD_YES; } /* check for adding keep alive */ if ( (! response_has_keepalive) && (! response_has_close) && (MHD_NO == must_add_close) && (MHD_CONN_MUST_CLOSE != connection->keepalive) && #ifdef UPGRADE_SUPPORT (NULL == connection->response->upgrade_handler) && #endif /* UPGRADE_SUPPORT */ (MHD_YES == keepalive_possible (connection)) ) must_add_keep_alive = MHD_YES; break; case MHD_CONNECTION_BODY_SENT: response_has_keepalive = false; break; default: mhd_assert (0); } if (MHD_CONN_MUST_CLOSE != connection->keepalive) { if ( (must_add_close) || (response_has_close) ) connection->keepalive = MHD_CONN_MUST_CLOSE; else if ( (must_add_keep_alive) || (response_has_keepalive) ) connection->keepalive = MHD_CONN_USE_KEEPALIVE; } if (must_add_close) size += MHD_STATICSTR_LEN_ ("Connection: close\r\n"); if (must_add_keep_alive) size += MHD_STATICSTR_LEN_ ("Connection: Keep-Alive\r\n"); if (must_add_chunked_encoding) size += MHD_STATICSTR_LEN_ ("Transfer-Encoding: chunked\r\n"); if (must_add_content_length) size += content_length_len; mhd_assert (! (must_add_close && must_add_keep_alive) ); mhd_assert (! (must_add_chunked_encoding && must_add_content_length) ); for (pos = connection->response->first_header; NULL != pos; pos = pos->next) { /* TODO: add proper support for excluding "Keep-Alive" token. */ if ( (pos->kind == kind) && (! ( (MHD_YES == must_add_close) && (response_has_keepalive) && (MHD_str_equal_caseless_(pos->header, MHD_HTTP_HEADER_CONNECTION)) && (MHD_str_equal_caseless_(pos->value, "Keep-Alive")) ) ) ) size += strlen (pos->header) + strlen (pos->value) + 4; /* colon, space, linefeeds */ } /* produce data */ data = MHD_pool_allocate (connection->pool, size + 1, MHD_NO); if (NULL == data) { #ifdef HAVE_MESSAGES MHD_DLOG (connection->daemon, "Not enough memory for write!\n"); #endif return MHD_NO; } if (MHD_CONNECTION_FOOTERS_RECEIVED == connection->state) { memcpy (data, code, off); } if (must_add_close) { /* we must add the 'Connection: close' header */ memcpy (&data[off], "Connection: close\r\n", MHD_STATICSTR_LEN_ ("Connection: close\r\n")); off += MHD_STATICSTR_LEN_ ("Connection: close\r\n"); } if (must_add_keep_alive) { /* we must add the 'Connection: Keep-Alive' header */ memcpy (&data[off], "Connection: Keep-Alive\r\n", MHD_STATICSTR_LEN_ ("Connection: Keep-Alive\r\n")); off += MHD_STATICSTR_LEN_ ("Connection: Keep-Alive\r\n"); } if (must_add_chunked_encoding) { /* we must add the 'Transfer-Encoding: chunked' header */ memcpy (&data[off], "Transfer-Encoding: chunked\r\n", MHD_STATICSTR_LEN_ ("Transfer-Encoding: chunked\r\n")); off += MHD_STATICSTR_LEN_ ("Transfer-Encoding: chunked\r\n"); } if (must_add_content_length) { /* we must add the 'Content-Length' header */ memcpy (&data[off], content_length_buf, content_length_len); off += content_length_len; } for (pos = connection->response->first_header; NULL != pos; pos = pos->next) { /* TODO: add proper support for excluding "Keep-Alive" token. */ if ( (pos->kind == kind) && (! ( (MHD_YES == must_add_close) && (response_has_keepalive) && (MHD_str_equal_caseless_(pos->header, MHD_HTTP_HEADER_CONNECTION)) && (MHD_str_equal_caseless_(pos->value, "Keep-Alive")) ) ) ) off += MHD_snprintf_ (&data[off], size - off, "%s: %s\r\n", pos->header, pos->value); } if (MHD_CONNECTION_FOOTERS_RECEIVED == connection->state) { strcpy (&data[off], date); off += strlen (date); } memcpy (&data[off], "\r\n", 2); off += 2; if (off != size) mhd_panic (mhd_panic_cls, __FILE__, __LINE__, NULL); connection->write_buffer = data; connection->write_buffer_append_offset = size; connection->write_buffer_send_offset = 0; connection->write_buffer_size = size + 1; return MHD_YES; } /** * We encountered an error processing the request. * Handle it properly by stopping to read data * and sending the indicated response code and message. * * @param connection the connection * @param status_code the response code to send (400, 413 or 414) * @param message the error message to send */ static void transmit_error_response (struct MHD_Connection *connection, unsigned int status_code, const char *message) { struct MHD_Response *response; if (NULL == connection->version) { /* we were unable to process the full header line, so we don't really know what version the client speaks; assume 1.0 */ connection->version = MHD_HTTP_VERSION_1_0; } connection->state = MHD_CONNECTION_FOOTERS_RECEIVED; connection->read_closed = true; #ifdef HAVE_MESSAGES MHD_DLOG (connection->daemon, _("Error processing request (HTTP response code is %u (`%s')). Closing connection.\n"), status_code, message); #endif if (NULL != connection->response) { MHD_destroy_response (connection->response); connection->response = NULL; } response = MHD_create_response_from_buffer (strlen (message), (void *) message, MHD_RESPMEM_PERSISTENT); MHD_queue_response (connection, status_code, response); mhd_assert (NULL != connection->response); MHD_destroy_response (response); /* Do not reuse this connection. */ connection->keepalive = MHD_CONN_MUST_CLOSE; if (MHD_NO == build_header_response (connection)) { /* oops - close! */ CONNECTION_CLOSE_ERROR (connection, _("Closing connection (failed to create response header)\n")); } else { connection->state = MHD_CONNECTION_HEADERS_SENDING; } } /** * Update the 'event_loop_info' field of this connection based on the state * that the connection is now in. May also close the connection or * perform other updates to the connection if needed to prepare for * the next round of the event loop. * * @param connection connection to get poll set for */ static void MHD_connection_update_event_loop_info (struct MHD_Connection *connection) { /* Do not update states of suspended connection */ if (connection->suspended) return; /* States will be updated after resume. */ #ifdef HTTPS_SUPPORT if (MHD_TLS_CONN_NO_TLS != connection->tls_state) { /* HTTPS connection. */ switch (connection->tls_state) { case MHD_TLS_CONN_INIT: connection->event_loop_info = MHD_EVENT_LOOP_INFO_READ; return; case MHD_TLS_CONN_HANDSHAKING: if (0 == gnutls_record_get_direction (connection->tls_session)) connection->event_loop_info = MHD_EVENT_LOOP_INFO_READ; else connection->event_loop_info = MHD_EVENT_LOOP_INFO_WRITE; return; default: break; } } #endif /* HTTPS_SUPPORT */ while (1) { #if DEBUG_STATES MHD_DLOG (connection->daemon, _("In function %s handling connection at state: %s\n"), __FUNCTION__, MHD_state_to_string (connection->state)); #endif switch (connection->state) { case MHD_CONNECTION_INIT: case MHD_CONNECTION_URL_RECEIVED: case MHD_CONNECTION_HEADER_PART_RECEIVED: /* while reading headers, we always grow the read buffer if needed, no size-check required */ if ( (connection->read_buffer_offset == connection->read_buffer_size) && (MHD_NO == try_grow_read_buffer (connection)) ) { transmit_error_response (connection, (connection->url != NULL) ? MHD_HTTP_REQUEST_HEADER_FIELDS_TOO_LARGE : MHD_HTTP_URI_TOO_LONG, REQUEST_TOO_BIG); continue; } if (! connection->read_closed) connection->event_loop_info = MHD_EVENT_LOOP_INFO_READ; else connection->event_loop_info = MHD_EVENT_LOOP_INFO_BLOCK; break; case MHD_CONNECTION_HEADERS_RECEIVED: mhd_assert (0); break; case MHD_CONNECTION_HEADERS_PROCESSED: mhd_assert (0); break; case MHD_CONNECTION_CONTINUE_SENDING: connection->event_loop_info = MHD_EVENT_LOOP_INFO_WRITE; break; case MHD_CONNECTION_CONTINUE_SENT: if (connection->read_buffer_offset == connection->read_buffer_size) { if ((MHD_YES != try_grow_read_buffer (connection)) && (0 != (connection->daemon->options & MHD_USE_INTERNAL_POLLING_THREAD))) { /* failed to grow the read buffer, and the client which is supposed to handle the received data in a *blocking* fashion (in this mode) did not handle the data as it was supposed to! => we would either have to do busy-waiting (on the client, which would likely fail), or if we do nothing, we would just timeout on the connection (if a timeout is even set!). Solution: we kill the connection with an error */ transmit_error_response (connection, MHD_HTTP_INTERNAL_SERVER_ERROR, INTERNAL_ERROR); continue; } } if ( (connection->read_buffer_offset < connection->read_buffer_size) && (! connection->read_closed) ) connection->event_loop_info = MHD_EVENT_LOOP_INFO_READ; else connection->event_loop_info = MHD_EVENT_LOOP_INFO_BLOCK; break; case MHD_CONNECTION_BODY_RECEIVED: case MHD_CONNECTION_FOOTER_PART_RECEIVED: /* while reading footers, we always grow the read buffer if needed, no size-check required */ if (connection->read_closed) { CONNECTION_CLOSE_ERROR (connection, NULL); continue; } connection->event_loop_info = MHD_EVENT_LOOP_INFO_READ; /* transition to FOOTERS_RECEIVED happens in read handler */ break; case MHD_CONNECTION_FOOTERS_RECEIVED: connection->event_loop_info = MHD_EVENT_LOOP_INFO_BLOCK; break; case MHD_CONNECTION_HEADERS_SENDING: /* headers in buffer, keep writing */ connection->event_loop_info = MHD_EVENT_LOOP_INFO_WRITE; break; case MHD_CONNECTION_HEADERS_SENT: mhd_assert (0); break; case MHD_CONNECTION_NORMAL_BODY_READY: connection->event_loop_info = MHD_EVENT_LOOP_INFO_WRITE; break; case MHD_CONNECTION_NORMAL_BODY_UNREADY: connection->event_loop_info = MHD_EVENT_LOOP_INFO_BLOCK; break; case MHD_CONNECTION_CHUNKED_BODY_READY: connection->event_loop_info = MHD_EVENT_LOOP_INFO_WRITE; break; case MHD_CONNECTION_CHUNKED_BODY_UNREADY: connection->event_loop_info = MHD_EVENT_LOOP_INFO_BLOCK; break; case MHD_CONNECTION_BODY_SENT: mhd_assert (0); break; case MHD_CONNECTION_FOOTERS_SENDING: connection->event_loop_info = MHD_EVENT_LOOP_INFO_WRITE; break; case MHD_CONNECTION_FOOTERS_SENT: mhd_assert (0); break; case MHD_CONNECTION_CLOSED: connection->event_loop_info = MHD_EVENT_LOOP_INFO_CLEANUP; return; /* do nothing, not even reading */ case MHD_CONNECTION_IN_CLEANUP: mhd_assert (0); break; #ifdef UPGRADE_SUPPORT case MHD_CONNECTION_UPGRADE: mhd_assert (0); break; #endif /* UPGRADE_SUPPORT */ default: mhd_assert (0); } break; } } /** * Parse a single line of the HTTP header. Advance read_buffer (!) * appropriately. If the current line does not fit, consider growing * the buffer. If the line is far too long, close the connection. If * no line is found (incomplete, buffer too small, line too long), * return NULL. Otherwise return a pointer to the line. * * @param connection connection we're processing * @param[out] line_len pointer to variable that receive * length of line or NULL * @return NULL if no full line is available; note that the returned * string will not be 0-termianted */ static char * get_next_header_line (struct MHD_Connection *connection, size_t *line_len) { char *rbuf; size_t pos; if (0 == connection->read_buffer_offset) return NULL; pos = 0; rbuf = connection->read_buffer; while ( (pos < connection->read_buffer_offset - 1) && ('\r' != rbuf[pos]) && ('\n' != rbuf[pos]) ) pos++; if ( (pos == connection->read_buffer_offset - 1) && ('\n' != rbuf[pos]) ) { /* not found, consider growing... */ if ( (connection->read_buffer_offset == connection->read_buffer_size) && (MHD_NO == try_grow_read_buffer (connection)) ) { transmit_error_response (connection, (NULL != connection->url) ? MHD_HTTP_REQUEST_HEADER_FIELDS_TOO_LARGE : MHD_HTTP_URI_TOO_LONG, REQUEST_TOO_BIG); } if (line_len) *line_len = 0; return NULL; } if (line_len) *line_len = pos; /* found, check if we have proper LFCR */ if ( ('\r' == rbuf[pos]) && ('\n' == rbuf[pos + 1]) ) rbuf[pos++] = '\0'; /* skip both r and n */ rbuf[pos++] = '\0'; connection->read_buffer += pos; connection->read_buffer_size -= pos; connection->read_buffer_offset -= pos; return rbuf; } /** * Add an entry to the HTTP headers of a connection. If this fails, * transmit an error response (request too big). * * @param connection the connection for which a * value should be set * @param kind kind of the value * @param key key for the value * @param value the value itself * @return #MHD_NO on failure (out of memory), #MHD_YES for success */ static int connection_add_header (struct MHD_Connection *connection, const char *key, const char *value, enum MHD_ValueKind kind) { if (MHD_NO == MHD_set_connection_value (connection, kind, key, value)) { #ifdef HAVE_MESSAGES MHD_DLOG (connection->daemon, _("Not enough memory in pool to allocate header record!\n")); #endif transmit_error_response (connection, MHD_HTTP_REQUEST_HEADER_FIELDS_TOO_LARGE, REQUEST_TOO_BIG); return MHD_NO; } return MHD_YES; } /** * Parse the cookie header (see RFC 2109). * * @param connection connection to parse header of * @return #MHD_YES for success, #MHD_NO for failure (malformed, out of memory) */ static int parse_cookie_header (struct MHD_Connection *connection) { const char *hdr; char *cpy; char *pos; char *sce; char *semicolon; char *equals; char *ekill; char old; int quotes; hdr = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, MHD_HTTP_HEADER_COOKIE); if (NULL == hdr) return MHD_YES; cpy = MHD_pool_allocate (connection->pool, strlen (hdr) + 1, MHD_YES); if (NULL == cpy) { #ifdef HAVE_MESSAGES MHD_DLOG (connection->daemon, _("Not enough memory in pool to parse cookies!\n")); #endif transmit_error_response (connection, MHD_HTTP_REQUEST_HEADER_FIELDS_TOO_LARGE, REQUEST_TOO_BIG); return MHD_NO; } memcpy (cpy, hdr, strlen (hdr) + 1); pos = cpy; while (NULL != pos) { while (' ' == *pos) pos++; /* skip spaces */ sce = pos; while ( ((*sce) != '\0') && ((*sce) != ',') && ((*sce) != ';') && ((*sce) != '=') ) sce++; /* remove tailing whitespace (if any) from key */ ekill = sce - 1; while ( (*ekill == ' ') && (ekill >= pos) ) *(ekill--) = '\0'; old = *sce; *sce = '\0'; if (old != '=') { /* value part omitted, use empty string... */ if (MHD_NO == connection_add_header (connection, pos, "", MHD_COOKIE_KIND)) return MHD_NO; if (old == '\0') break; pos = sce + 1; continue; } equals = sce + 1; quotes = 0; semicolon = equals; while ( ('\0' != semicolon[0]) && ( (0 != quotes) || ( (';' != semicolon[0]) && (',' != semicolon[0]) ) ) ) { if ('"' == semicolon[0]) quotes = (quotes + 1) & 1; semicolon++; } if ('\0' == semicolon[0]) semicolon = NULL; if (NULL != semicolon) { semicolon[0] = '\0'; semicolon++; } /* remove quotes */ if ( ('"' == equals[0]) && ('"' == equals[strlen (equals) - 1]) ) { equals[strlen (equals) - 1] = '\0'; equals++; } if (MHD_NO == connection_add_header (connection, pos, equals, MHD_COOKIE_KIND)) return MHD_NO; pos = semicolon; } return MHD_YES; } /** * Parse the first line of the HTTP HEADER. * * @param connection the connection (updated) * @param line the first line, not 0-terminated * @param line_len length of the first @a line * @return #MHD_YES if the line is ok, #MHD_NO if it is malformed */ static int parse_initial_message_line (struct MHD_Connection *connection, char *line, size_t line_len) { struct MHD_Daemon *daemon = connection->daemon; const char *curi; char *uri; char *http_version; char *args; unsigned int unused_num_headers; if (NULL == (uri = memchr (line, ' ', line_len))) return MHD_NO; /* serious error */ uri[0] = '\0'; connection->method = line; uri++; /* Skip any spaces. Not required by standard but allow to be more tolerant. */ while ( (' ' == uri[0]) && ( (size_t)(uri - line) < line_len) ) uri++; if ((size_t)(uri - line) == line_len) { curi = ""; uri = NULL; connection->version = ""; args = NULL; } else { curi = uri; /* Search from back to accept misformed URI with space */ http_version = line + line_len - 1; /* Skip any trailing spaces */ while ( (' ' == http_version[0]) && (http_version > uri) ) http_version--; /* Find first space in reverse direction */ while ( (' ' != http_version[0]) && (http_version > uri) ) http_version--; if (http_version > uri) { http_version[0] = '\0'; connection->version = http_version + 1; args = memchr (uri, '?', http_version - uri); } else { connection->version = ""; args = memchr (uri, '?', line_len - (uri - line)); } } if (NULL != daemon->uri_log_callback) { connection->client_aware = true; connection->client_context = daemon->uri_log_callback (daemon->uri_log_callback_cls, curi, connection); } if (NULL != args) { args[0] = '\0'; args++; /* note that this call clobbers 'args' */ MHD_parse_arguments_ (connection, MHD_GET_ARGUMENT_KIND, args, &connection_add_header, &unused_num_headers); } if (NULL != uri) daemon->unescape_callback (daemon->unescape_callback_cls, connection, uri); connection->url = curi; return MHD_YES; } /** * Call the handler of the application for this * connection. Handles chunking of the upload * as well as normal uploads. * * @param connection connection we're processing */ static void call_connection_handler (struct MHD_Connection *connection) { size_t processed; if (NULL != connection->response) return; /* already queued a response */ processed = 0; connection->client_aware = true; if (MHD_NO == connection->daemon->default_handler (connection->daemon->default_handler_cls, connection, connection->url, connection->method, connection->version, NULL, &processed, &connection->client_context)) { /* serious internal error, close connection */ CONNECTION_CLOSE_ERROR (connection, _("Application reported internal error, closing connection.\n")); return; } } /** * Call the handler of the application for this * connection. Handles chunking of the upload * as well as normal uploads. * * @param connection connection we're processing */ static void process_request_body (struct MHD_Connection *connection) { size_t available; int instant_retry; char *buffer_head; if (NULL != connection->response) return; /* already queued a response */ buffer_head = connection->read_buffer; available = connection->read_buffer_offset; do { size_t to_be_processed; size_t left_unprocessed; size_t processed_size; instant_retry = MHD_NO; if ( (connection->have_chunked_upload) && (MHD_SIZE_UNKNOWN == connection->remaining_upload_size) ) { if ( (connection->current_chunk_offset == connection->current_chunk_size) && (0LLU != connection->current_chunk_offset) && (available >= 2) ) { size_t i; /* skip new line at the *end* of a chunk */ i = 0; if ( ('\r' == buffer_head[i]) || ('\n' == buffer_head[i]) ) i++; /* skip 1st part of line feed */ if ( ('\r' == buffer_head[i]) || ('\n' == buffer_head[i]) ) i++; /* skip 2nd part of line feed */ if (0 == i) { /* malformed encoding */ CONNECTION_CLOSE_ERROR (connection, _("Received malformed HTTP request (bad chunked encoding). Closing connection.\n")); return; } available -= i; buffer_head += i; connection->current_chunk_offset = 0; connection->current_chunk_size = 0; } if (connection->current_chunk_offset < connection->current_chunk_size) { uint64_t cur_chunk_left; /* we are in the middle of a chunk, give as much as possible to the client (without crossing chunk boundaries) */ cur_chunk_left = connection->current_chunk_size - connection->current_chunk_offset; if (cur_chunk_left > available) to_be_processed = available; else { /* cur_chunk_left <= (size_t)available */ to_be_processed = (size_t)cur_chunk_left; if (available > to_be_processed) instant_retry = MHD_YES; } } else { size_t i; size_t end_size; bool malformed; /* we need to read chunk boundaries */ i = 0; while (i < available) { if ( ('\r' == buffer_head[i]) || ('\n' == buffer_head[i]) || (';' == buffer_head[i]) ) break; i++; if (i >= 16) break; } end_size = i; /* find beginning of CRLF (skip over chunk extensions) */ if (';' == buffer_head[i]) { while (i < available) { if ( ('\r' == buffer_head[i]) || ('\n' == buffer_head[i]) ) break; i++; } } /* take '\n' into account; if '\n' is the unavailable character, we will need to wait until we have it before going further */ if ( (i + 1 >= available) && ! ( (1 == i) && (2 == available) && ('0' == buffer_head[0]) ) ) break; /* need more data... */ i++; malformed = (end_size >= 16); if (! malformed) { size_t num_dig = MHD_strx_to_uint64_n_ (buffer_head, end_size, &connection->current_chunk_size); malformed = (end_size != num_dig); } if (malformed) { /* malformed encoding */ CONNECTION_CLOSE_ERROR (connection, _("Received malformed HTTP request (bad chunked encoding). Closing connection.\n")); return; } /* skip 2nd part of line feed */ if ( (i < available) && ( ('\r' == buffer_head[i]) || ('\n' == buffer_head[i]) ) ) i++; buffer_head += i; available -= i; connection->current_chunk_offset = 0; if (available > 0) instant_retry = MHD_YES; if (0LLU == connection->current_chunk_size) { connection->remaining_upload_size = 0; break; } continue; } } else { /* no chunked encoding, give all to the client */ if ( (0 != connection->remaining_upload_size) && (MHD_SIZE_UNKNOWN != connection->remaining_upload_size) && (connection->remaining_upload_size < available) ) { to_be_processed = (size_t)connection->remaining_upload_size; } else { /** * 1. no chunked encoding, give all to the client * 2. client may send large chunked data, but only a smaller part is available at one time. */ to_be_processed = available; } } left_unprocessed = to_be_processed; connection->client_aware = true; if (MHD_NO == connection->daemon->default_handler (connection->daemon->default_handler_cls, connection, connection->url, connection->method, connection->version, buffer_head, &left_unprocessed, &connection->client_context)) { /* serious internal error, close connection */ CONNECTION_CLOSE_ERROR (connection, _("Application reported internal error, closing connection.\n")); return; } if (left_unprocessed > to_be_processed) mhd_panic (mhd_panic_cls, __FILE__, __LINE__ #ifdef HAVE_MESSAGES , _("libmicrohttpd API violation") #else , NULL #endif ); if (0 != left_unprocessed) { instant_retry = MHD_NO; /* client did not process everything */ #ifdef HAVE_MESSAGES /* client did not process all upload data, complain if the setup was incorrect, which may prevent us from handling the rest of the request */ if ( (0 != (connection->daemon->options & MHD_USE_INTERNAL_POLLING_THREAD)) && (! connection->suspended) ) MHD_DLOG (connection->daemon, _("WARNING: incomplete upload processing and connection not suspended may result in hung connection.\n")); #endif } processed_size = to_be_processed - left_unprocessed; if (connection->have_chunked_upload) connection->current_chunk_offset += processed_size; /* dh left "processed" bytes in buffer for next time... */ buffer_head += processed_size; available -= processed_size; if (MHD_SIZE_UNKNOWN != connection->remaining_upload_size) connection->remaining_upload_size -= processed_size; } while (MHD_YES == instant_retry); if (available > 0) memmove (connection->read_buffer, buffer_head, available); connection->read_buffer_offset = available; } /** * Check if we are done sending the write-buffer. * If so, transition into "next_state". * * @param connection connection to check write status for * @param next_state the next state to transition to * @return #MHD_NO if we are not done, #MHD_YES if we are */ static int check_write_done (struct MHD_Connection *connection, enum MHD_CONNECTION_STATE next_state) { if (connection->write_buffer_append_offset != connection->write_buffer_send_offset) return MHD_NO; connection->write_buffer_append_offset = 0; connection->write_buffer_send_offset = 0; connection->state = next_state; MHD_pool_reallocate (connection->pool, connection->write_buffer, connection->write_buffer_size, 0); connection->write_buffer = NULL; connection->write_buffer_size = 0; return MHD_YES; } /** * We have received (possibly the beginning of) a line in the * header (or footer). Validate (check for ":") and prepare * to process. * * @param connection connection we're processing * @param line line from the header to process * @return #MHD_YES on success, #MHD_NO on error (malformed @a line) */ static int process_header_line (struct MHD_Connection *connection, char *line) { char *colon; /* line should be normal header line, find colon */ colon = strchr (line, ':'); if (NULL == colon) { /* error in header line, die hard */ CONNECTION_CLOSE_ERROR (connection, _("Received malformed line (no colon). Closing connection.\n")); return MHD_NO; } if (-1 >= connection->daemon->strict_for_client) { /* check for whitespace before colon, which is not allowed by RFC 7230 section 3.2.4; we count space ' ' and tab '\t', but not '\r\n' as those would have ended the line. */ const char *white; white = strchr (line, ' '); if ( (NULL != white) && (white < colon) ) return MHD_NO; white = strchr (line, '\t'); if ( (NULL != white) && (white < colon) ) return MHD_NO; } /* zero-terminate header */ colon[0] = '\0'; colon++; /* advance to value */ while ( ('\0' != colon[0]) && ( (' ' == colon[0]) || ('\t' == colon[0]) ) ) colon++; /* we do the actual adding of the connection header at the beginning of the while loop since we need to be able to inspect the *next* header line (in case it starts with a space...) */ connection->last = line; connection->colon = colon; return MHD_YES; } /** * Process a header value that spans multiple lines. * The previous line(s) are in connection->last. * * @param connection connection we're processing * @param line the current input line * @param kind if the line is complete, add a header * of the given kind * @return #MHD_YES if the line was processed successfully */ static int process_broken_line (struct MHD_Connection *connection, char *line, enum MHD_ValueKind kind) { char *last; char *tmp; size_t last_len; size_t tmp_len; last = connection->last; if ( (' ' == line[0]) || ('\t' == line[0]) ) { /* value was continued on the next line, see http://www.jmarshall.com/easy/http/ */ last_len = strlen (last); /* skip whitespace at start of 2nd line */ tmp = line; while ( (' ' == tmp[0]) || ('\t' == tmp[0]) ) tmp++; tmp_len = strlen (tmp); /* FIXME: we might be able to do this better (faster!), as most likely 'last' and 'line' should already be adjacent in memory; however, doing this right gets tricky if we have a value continued over multiple lines (in which case we need to record how often we have done this so we can check for adjacency); also, in the case where these are not adjacent (not sure how it can happen!), we would want to allocate from the end of the pool, so as to not destroy the read-buffer's ability to grow nicely. */ last = MHD_pool_reallocate (connection->pool, last, last_len + 1, last_len + tmp_len + 1); if (NULL == last) { transmit_error_response (connection, MHD_HTTP_REQUEST_HEADER_FIELDS_TOO_LARGE, REQUEST_TOO_BIG); return MHD_NO; } memcpy (&last[last_len], tmp, tmp_len + 1); connection->last = last; return MHD_YES; /* possibly more than 2 lines... */ } mhd_assert ( (NULL != last) && (NULL != connection->colon) ); if ((MHD_NO == connection_add_header (connection, last, connection->colon, kind))) { transmit_error_response (connection, MHD_HTTP_REQUEST_HEADER_FIELDS_TOO_LARGE, REQUEST_TOO_BIG); return MHD_NO; } /* we still have the current line to deal with... */ if (0 != line[0]) { if (MHD_NO == process_header_line (connection, line)) { transmit_error_response (connection, MHD_HTTP_BAD_REQUEST, REQUEST_MALFORMED); return MHD_NO; } } return MHD_YES; } /** * Parse the various headers; figure out the size * of the upload and make sure the headers follow * the protocol. Advance to the appropriate state. * * @param connection connection we're processing */ static void parse_connection_headers (struct MHD_Connection *connection) { const char *clen; struct MHD_Response *response; const char *enc; const char *end; parse_cookie_header (connection); if ( (1 <= connection->daemon->strict_for_client) && (NULL != connection->version) && (MHD_str_equal_caseless_(MHD_HTTP_VERSION_1_1, connection->version)) && (NULL == MHD_lookup_connection_value (connection, MHD_HEADER_KIND, MHD_HTTP_HEADER_HOST)) ) { /* die, http 1.1 request without host and we are pedantic */ connection->state = MHD_CONNECTION_FOOTERS_RECEIVED; connection->read_closed = true; #ifdef HAVE_MESSAGES MHD_DLOG (connection->daemon, _("Received HTTP 1.1 request without `Host' header.\n")); #endif mhd_assert (NULL == connection->response); response = MHD_create_response_from_buffer (MHD_STATICSTR_LEN_ (REQUEST_LACKS_HOST), REQUEST_LACKS_HOST, MHD_RESPMEM_PERSISTENT); MHD_queue_response (connection, MHD_HTTP_BAD_REQUEST, response); MHD_destroy_response (response); return; } connection->remaining_upload_size = 0; enc = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, MHD_HTTP_HEADER_TRANSFER_ENCODING); if (NULL != enc) { connection->remaining_upload_size = MHD_SIZE_UNKNOWN; if (MHD_str_equal_caseless_(enc, "chunked")) connection->have_chunked_upload = true; } else { clen = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, MHD_HTTP_HEADER_CONTENT_LENGTH); if (NULL != clen) { end = clen + MHD_str_to_uint64_ (clen, &connection->remaining_upload_size); if ( (clen == end) || ('\0' != *end) ) { connection->remaining_upload_size = 0; #ifdef HAVE_MESSAGES MHD_DLOG (connection->daemon, "Failed to parse `Content-Length' header. Closing connection.\n"); #endif CONNECTION_CLOSE_ERROR (connection, NULL); return; } } } } /** * Update the 'last_activity' field of the connection to the current time * and move the connection to the head of the 'normal_timeout' list if * the timeout for the connection uses the default value. * * @param connection the connection that saw some activity */ void MHD_update_last_activity_ (struct MHD_Connection *connection) { struct MHD_Daemon *daemon = connection->daemon; if (0 == connection->connection_timeout) return; /* Skip update of activity for connections without timeout timer. */ if (connection->suspended) return; /* no activity on suspended connections */ connection->last_activity = MHD_monotonic_sec_counter(); if (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) return; /* each connection has personal timeout */ if (connection->connection_timeout != daemon->connection_timeout) return; /* custom timeout, no need to move it in "normal" DLL */ MHD_mutex_lock_chk_ (&daemon->cleanup_connection_mutex); /* move connection to head of timeout list (by remove + add operation) */ XDLL_remove (daemon->normal_timeout_head, daemon->normal_timeout_tail, connection); XDLL_insert (daemon->normal_timeout_head, daemon->normal_timeout_tail, connection); MHD_mutex_unlock_chk_ (&daemon->cleanup_connection_mutex); } /** * This function handles a particular connection when it has been * determined that there is data to be read off a socket. * * @param connection connection to handle */ void MHD_connection_handle_read (struct MHD_Connection *connection) { ssize_t bytes_read; if ( (MHD_CONNECTION_CLOSED == connection->state) || (connection->suspended) ) return; #ifdef HTTPS_SUPPORT if (MHD_TLS_CONN_NO_TLS != connection->tls_state) { /* HTTPS connection. */ if (MHD_TLS_CONN_CONNECTED > connection->tls_state) { if (!MHD_run_tls_handshake_ (connection)) return; } } #endif /* HTTPS_SUPPORT */ /* make sure "read" has a reasonable number of bytes in buffer to use per system call (if possible) */ if (connection->read_buffer_offset + connection->daemon->pool_increment > connection->read_buffer_size) try_grow_read_buffer (connection); if (connection->read_buffer_size == connection->read_buffer_offset) return; /* No space for receiving data. */ bytes_read = connection->recv_cls (connection, &connection->read_buffer [connection->read_buffer_offset], connection->read_buffer_size - connection->read_buffer_offset); if (bytes_read < 0) { if (MHD_ERR_AGAIN_ == bytes_read) return; /* No new data to process. */ if (MHD_ERR_CONNRESET_ == bytes_read) { CONNECTION_CLOSE_ERROR (connection, (MHD_CONNECTION_INIT == connection->state) ? NULL : _("Socket disconnected while reading request.\n")); return; } CONNECTION_CLOSE_ERROR (connection, (MHD_CONNECTION_INIT == connection->state) ? NULL : _("Connection socket is closed due to error when reading request.\n")); return; } if (0 == bytes_read) { /* Remote side closed connection. */ connection->read_closed = true; MHD_connection_close_ (connection, MHD_REQUEST_TERMINATED_CLIENT_ABORT); return; } connection->read_buffer_offset += bytes_read; MHD_update_last_activity_ (connection); #if DEBUG_STATES MHD_DLOG (connection->daemon, _("In function %s handling connection at state: %s\n"), __FUNCTION__, MHD_state_to_string (connection->state)); #endif switch (connection->state) { case MHD_CONNECTION_INIT: case MHD_CONNECTION_URL_RECEIVED: case MHD_CONNECTION_HEADER_PART_RECEIVED: case MHD_CONNECTION_HEADERS_RECEIVED: case MHD_CONNECTION_HEADERS_PROCESSED: case MHD_CONNECTION_CONTINUE_SENDING: case MHD_CONNECTION_CONTINUE_SENT: case MHD_CONNECTION_BODY_RECEIVED: case MHD_CONNECTION_FOOTER_PART_RECEIVED: /* nothing to do but default action */ if (connection->read_closed) { MHD_connection_close_ (connection, MHD_REQUEST_TERMINATED_READ_ERROR); } return; case MHD_CONNECTION_CLOSED: return; #ifdef UPGRADE_SUPPORT case MHD_CONNECTION_UPGRADE: mhd_assert (0); return; #endif /* UPGRADE_SUPPORT */ default: /* shrink read buffer to how much is actually used */ MHD_pool_reallocate (connection->pool, connection->read_buffer, connection->read_buffer_size + 1, connection->read_buffer_offset); break; } return; } /** * This function was created to handle writes to sockets when it has * been determined that the socket can be written to. * * @param connection connection to handle */ void MHD_connection_handle_write (struct MHD_Connection *connection) { struct MHD_Response *response; ssize_t ret; if (connection->suspended) return; #ifdef HTTPS_SUPPORT if (MHD_TLS_CONN_NO_TLS != connection->tls_state) { /* HTTPS connection. */ if (MHD_TLS_CONN_CONNECTED > connection->tls_state) { if (!MHD_run_tls_handshake_ (connection)) return; } } #endif /* HTTPS_SUPPORT */ #if DEBUG_STATES MHD_DLOG (connection->daemon, _("In function %s handling connection at state: %s\n"), __FUNCTION__, MHD_state_to_string (connection->state)); #endif switch (connection->state) { case MHD_CONNECTION_INIT: case MHD_CONNECTION_URL_RECEIVED: case MHD_CONNECTION_HEADER_PART_RECEIVED: case MHD_CONNECTION_HEADERS_RECEIVED: mhd_assert (0); return; case MHD_CONNECTION_HEADERS_PROCESSED: return; case MHD_CONNECTION_CONTINUE_SENDING: ret = connection->send_cls (connection, &HTTP_100_CONTINUE [connection->continue_message_write_offset], MHD_STATICSTR_LEN_ (HTTP_100_CONTINUE) - connection->continue_message_write_offset); if (ret < 0) { if (MHD_ERR_AGAIN_ == ret) return; #ifdef HAVE_MESSAGES MHD_DLOG (connection->daemon, _("Failed to send data in request for %s.\n"), connection->url); #endif CONNECTION_CLOSE_ERROR (connection, NULL); return; } #if DEBUG_SEND_DATA fprintf (stderr, _("Sent 100 continue response: `%.*s'\n"), (int) ret, &HTTP_100_CONTINUE[connection->continue_message_write_offset]); #endif connection->continue_message_write_offset += ret; MHD_update_last_activity_ (connection); return; case MHD_CONNECTION_CONTINUE_SENT: case MHD_CONNECTION_BODY_RECEIVED: case MHD_CONNECTION_FOOTER_PART_RECEIVED: case MHD_CONNECTION_FOOTERS_RECEIVED: mhd_assert (0); return; case MHD_CONNECTION_HEADERS_SENDING: ret = connection->send_cls (connection, &connection->write_buffer [connection->write_buffer_send_offset], connection->write_buffer_append_offset - connection->write_buffer_send_offset); if (ret < 0) { if (MHD_ERR_AGAIN_ == ret) return; CONNECTION_CLOSE_ERROR (connection, _("Connection was closed while sending response headers.\n")); return; } connection->write_buffer_send_offset += ret; MHD_update_last_activity_ (connection); if (MHD_CONNECTION_HEADERS_SENDING != connection->state) return; check_write_done (connection, MHD_CONNECTION_HEADERS_SENT); return; case MHD_CONNECTION_HEADERS_SENT: return; case MHD_CONNECTION_NORMAL_BODY_READY: response = connection->response; if (connection->response_write_position < connection->response->total_size) { uint64_t data_write_offset; if (NULL != response->crc) MHD_mutex_lock_chk_ (&response->mutex); if (MHD_YES != try_ready_normal_body (connection)) { /* mutex was already unlocked by try_ready_normal_body */ return; } #if defined(_MHD_HAVE_SENDFILE) if (MHD_resp_sender_sendfile == connection->resp_sender) { ret = sendfile_adapter (connection); } else #else /* ! _MHD_HAVE_SENDFILE */ if (1) #endif /* ! _MHD_HAVE_SENDFILE */ { data_write_offset = connection->response_write_position - response->data_start; if (data_write_offset > (uint64_t)SIZE_MAX) MHD_PANIC (_("Data offset exceeds limit")); ret = connection->send_cls (connection, &response->data [(size_t)data_write_offset], response->data_size - (size_t)data_write_offset); #if DEBUG_SEND_DATA if (ret > 0) fprintf (stderr, _("Sent %d-byte DATA response: `%.*s'\n"), (int) ret, (int) ret, &response->data[connection->response_write_position - response->data_start]); #endif } if (NULL != response->crc) MHD_mutex_unlock_chk_ (&response->mutex); if (ret < 0) { if (MHD_ERR_AGAIN_ == ret) return; #ifdef HAVE_MESSAGES MHD_DLOG (connection->daemon, _("Failed to send data in request for `%s'.\n"), connection->url); #endif CONNECTION_CLOSE_ERROR (connection, NULL); return; } connection->response_write_position += ret; MHD_update_last_activity_ (connection); } if (connection->response_write_position == connection->response->total_size) connection->state = MHD_CONNECTION_FOOTERS_SENT; /* have no footers */ return; case MHD_CONNECTION_NORMAL_BODY_UNREADY: mhd_assert (0); return; case MHD_CONNECTION_CHUNKED_BODY_READY: ret = connection->send_cls (connection, &connection->write_buffer [connection->write_buffer_send_offset], connection->write_buffer_append_offset - connection->write_buffer_send_offset); if (ret < 0) { if (MHD_ERR_AGAIN_ == ret) return; CONNECTION_CLOSE_ERROR (connection, _("Connection was closed while sending response body.\n")); return; } connection->write_buffer_send_offset += ret; MHD_update_last_activity_ (connection); if (MHD_CONNECTION_CHUNKED_BODY_READY != connection->state) return; check_write_done (connection, (connection->response->total_size == connection->response_write_position) ? MHD_CONNECTION_BODY_SENT : MHD_CONNECTION_CHUNKED_BODY_UNREADY); return; case MHD_CONNECTION_CHUNKED_BODY_UNREADY: case MHD_CONNECTION_BODY_SENT: mhd_assert (0); return; case MHD_CONNECTION_FOOTERS_SENDING: ret = connection->send_cls (connection, &connection->write_buffer [connection->write_buffer_send_offset], connection->write_buffer_append_offset - connection->write_buffer_send_offset); if (ret < 0) { if (MHD_ERR_AGAIN_ == ret) return; CONNECTION_CLOSE_ERROR (connection, _("Connection was closed while sending response body.\n")); return; } connection->write_buffer_send_offset += ret; MHD_update_last_activity_ (connection); if (MHD_CONNECTION_FOOTERS_SENDING != connection->state) return; check_write_done (connection, MHD_CONNECTION_FOOTERS_SENT); return; case MHD_CONNECTION_FOOTERS_SENT: mhd_assert (0); return; case MHD_CONNECTION_CLOSED: return; case MHD_CONNECTION_IN_CLEANUP: mhd_assert (0); return; #ifdef UPGRADE_SUPPORT case MHD_CONNECTION_UPGRADE: mhd_assert (0); return; #endif /* UPGRADE_SUPPORT */ default: mhd_assert (0); CONNECTION_CLOSE_ERROR (connection, _("Internal error\n")); break; } return; } /** * Clean up the state of the given connection and move it into the * clean up queue for final disposal. * @remark To be called only from thread that process connection's * recv(), send() and response. * * @param connection handle for the connection to clean up */ static void cleanup_connection (struct MHD_Connection *connection) { struct MHD_Daemon *daemon = connection->daemon; if (connection->in_cleanup) return; /* Prevent double cleanup. */ connection->in_cleanup = true; if (NULL != connection->response) { MHD_destroy_response (connection->response); connection->response = NULL; } MHD_mutex_lock_chk_ (&daemon->cleanup_connection_mutex); if (connection->suspended) { DLL_remove (daemon->suspended_connections_head, daemon->suspended_connections_tail, connection); connection->suspended = false; } else { if (0 == (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) { if (connection->connection_timeout == daemon->connection_timeout) XDLL_remove (daemon->normal_timeout_head, daemon->normal_timeout_tail, connection); else XDLL_remove (daemon->manual_timeout_head, daemon->manual_timeout_tail, connection); } DLL_remove (daemon->connections_head, daemon->connections_tail, connection); } DLL_insert (daemon->cleanup_head, daemon->cleanup_tail, connection); connection->resuming = false; connection->in_idle = false; MHD_mutex_unlock_chk_(&daemon->cleanup_connection_mutex); if (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) { /* if we were at the connection limit before and are in thread-per-connection mode, signal the main thread to resume accepting connections */ if ( (MHD_ITC_IS_VALID_ (daemon->itc)) && (! MHD_itc_activate_ (daemon->itc, "c")) ) { #ifdef HAVE_MESSAGES MHD_DLOG (daemon, _("Failed to signal end of connection via inter-thread communication channel")); #endif } } } /** * This function was created to handle per-connection processing that * has to happen even if the socket cannot be read or written to. * @remark To be called only from thread that process connection's * recv(), send() and response. * * @param connection connection to handle * @return #MHD_YES if we should continue to process the * connection (not dead yet), #MHD_NO if it died */ int MHD_connection_handle_idle (struct MHD_Connection *connection) { struct MHD_Daemon *daemon = connection->daemon; char *line; size_t line_len; int ret; connection->in_idle = true; while (! connection->suspended) { #ifdef HTTPS_SUPPORT if (MHD_TLS_CONN_NO_TLS != connection->tls_state) { /* HTTPS connection. */ if ((MHD_TLS_CONN_INIT <= connection->tls_state) && (MHD_TLS_CONN_CONNECTED > connection->tls_state)) break; } #endif /* HTTPS_SUPPORT */ #if DEBUG_STATES MHD_DLOG (daemon, _("In function %s handling connection at state: %s\n"), __FUNCTION__, MHD_state_to_string (connection->state)); #endif switch (connection->state) { case MHD_CONNECTION_INIT: line = get_next_header_line (connection, &line_len); /* Check for empty string, as we might want to tolerate 'spurious' empty lines; also NULL means we didn't get a full line yet; line is not 0-terminated here. */ if ( (NULL == line) || (0 == line[0]) ) { if (MHD_CONNECTION_INIT != connection->state) continue; if (connection->read_closed) { CONNECTION_CLOSE_ERROR (connection, NULL); continue; } break; } if (MHD_NO == parse_initial_message_line (connection, line, line_len)) CONNECTION_CLOSE_ERROR (connection, NULL); else connection->state = MHD_CONNECTION_URL_RECEIVED; continue; case MHD_CONNECTION_URL_RECEIVED: line = get_next_header_line (connection, NULL); if (NULL == line) { if (MHD_CONNECTION_URL_RECEIVED != connection->state) continue; if (connection->read_closed) { CONNECTION_CLOSE_ERROR (connection, NULL); continue; } break; } if (0 == line[0]) { connection->state = MHD_CONNECTION_HEADERS_RECEIVED; connection->header_size = (size_t) (line - connection->read_buffer); continue; } if (MHD_NO == process_header_line (connection, line)) { transmit_error_response (connection, MHD_HTTP_BAD_REQUEST, REQUEST_MALFORMED); break; } connection->state = MHD_CONNECTION_HEADER_PART_RECEIVED; continue; case MHD_CONNECTION_HEADER_PART_RECEIVED: line = get_next_header_line (connection, NULL); if (NULL == line) { if (connection->state != MHD_CONNECTION_HEADER_PART_RECEIVED) continue; if (connection->read_closed) { CONNECTION_CLOSE_ERROR (connection, NULL); continue; } break; } if (MHD_NO == process_broken_line (connection, line, MHD_HEADER_KIND)) continue; if (0 == line[0]) { connection->state = MHD_CONNECTION_HEADERS_RECEIVED; connection->header_size = (size_t) (line - connection->read_buffer); continue; } continue; case MHD_CONNECTION_HEADERS_RECEIVED: parse_connection_headers (connection); if (MHD_CONNECTION_CLOSED == connection->state) continue; connection->state = MHD_CONNECTION_HEADERS_PROCESSED; if (connection->suspended) break; continue; case MHD_CONNECTION_HEADERS_PROCESSED: call_connection_handler (connection); /* first call */ if (MHD_CONNECTION_CLOSED == connection->state) continue; if (need_100_continue (connection)) { connection->state = MHD_CONNECTION_CONTINUE_SENDING; if (MHD_NO != socket_flush_possible (connection)) socket_start_extra_buffering (connection); else socket_start_no_buffering (connection); break; } if ( (NULL != connection->response) && ( (MHD_str_equal_caseless_ (connection->method, MHD_HTTP_METHOD_POST)) || (MHD_str_equal_caseless_ (connection->method, MHD_HTTP_METHOD_PUT))) ) { /* we refused (no upload allowed!) */ connection->remaining_upload_size = 0; /* force close, in case client still tries to upload... */ connection->read_closed = true; } connection->state = (0 == connection->remaining_upload_size) ? MHD_CONNECTION_FOOTERS_RECEIVED : MHD_CONNECTION_CONTINUE_SENT; if (connection->suspended) break; continue; case MHD_CONNECTION_CONTINUE_SENDING: if (connection->continue_message_write_offset == MHD_STATICSTR_LEN_ (HTTP_100_CONTINUE)) { connection->state = MHD_CONNECTION_CONTINUE_SENT; if (MHD_NO != socket_flush_possible (connection)) socket_start_no_buffering_flush (connection); else socket_start_normal_buffering (connection); continue; } break; case MHD_CONNECTION_CONTINUE_SENT: if (0 != connection->read_buffer_offset) { process_request_body (connection); /* loop call */ if (MHD_CONNECTION_CLOSED == connection->state) continue; } if ( (0 == connection->remaining_upload_size) || ( (MHD_SIZE_UNKNOWN == connection->remaining_upload_size) && (0 == connection->read_buffer_offset) && (connection->read_closed) ) ) { if ( (connection->have_chunked_upload) && (! connection->read_closed) ) connection->state = MHD_CONNECTION_BODY_RECEIVED; else connection->state = MHD_CONNECTION_FOOTERS_RECEIVED; if (connection->suspended) break; continue; } break; case MHD_CONNECTION_BODY_RECEIVED: line = get_next_header_line (connection, NULL); if (NULL == line) { if (connection->state != MHD_CONNECTION_BODY_RECEIVED) continue; if (connection->read_closed) { CONNECTION_CLOSE_ERROR (connection, NULL); continue; } break; } if (0 == line[0]) { connection->state = MHD_CONNECTION_FOOTERS_RECEIVED; if (connection->suspended) break; continue; } if (MHD_NO == process_header_line (connection, line)) { transmit_error_response (connection, MHD_HTTP_BAD_REQUEST, REQUEST_MALFORMED); break; } connection->state = MHD_CONNECTION_FOOTER_PART_RECEIVED; continue; case MHD_CONNECTION_FOOTER_PART_RECEIVED: line = get_next_header_line (connection, NULL); if (NULL == line) { if (connection->state != MHD_CONNECTION_FOOTER_PART_RECEIVED) continue; if (connection->read_closed) { CONNECTION_CLOSE_ERROR (connection, NULL); continue; } break; } if (MHD_NO == process_broken_line (connection, line, MHD_FOOTER_KIND)) continue; if (0 == line[0]) { connection->state = MHD_CONNECTION_FOOTERS_RECEIVED; if (connection->suspended) break; continue; } continue; case MHD_CONNECTION_FOOTERS_RECEIVED: call_connection_handler (connection); /* "final" call */ if (connection->state == MHD_CONNECTION_CLOSED) continue; if (NULL == connection->response) break; /* try again next time */ if (MHD_NO == build_header_response (connection)) { /* oops - close! */ CONNECTION_CLOSE_ERROR (connection, _("Closing connection (failed to create response header)\n")); continue; } connection->state = MHD_CONNECTION_HEADERS_SENDING; if (MHD_NO != socket_flush_possible (connection)) socket_start_extra_buffering (connection); else socket_start_no_buffering (connection); break; case MHD_CONNECTION_HEADERS_SENDING: /* no default action */ break; case MHD_CONNECTION_HEADERS_SENT: /* Some clients may take some actions right after header receive */ if (MHD_NO != socket_flush_possible (connection)) socket_start_no_buffering_flush (connection); #ifdef UPGRADE_SUPPORT if (NULL != connection->response->upgrade_handler) { socket_start_normal_buffering (connection); connection->state = MHD_CONNECTION_UPGRADE; /* This connection is "upgraded". Pass socket to application. */ if (MHD_YES != MHD_response_execute_upgrade_ (connection->response, connection)) { /* upgrade failed, fail hard */ CONNECTION_CLOSE_ERROR (connection, NULL); continue; } /* Response is not required anymore for this connection. */ if (NULL != connection->response) { struct MHD_Response * const resp = connection->response; connection->response = NULL; MHD_destroy_response (resp); } continue; } #endif /* UPGRADE_SUPPORT */ if (MHD_NO != socket_flush_possible (connection)) socket_start_extra_buffering (connection); else socket_start_normal_buffering (connection); if (connection->have_chunked_upload) connection->state = MHD_CONNECTION_CHUNKED_BODY_UNREADY; else connection->state = MHD_CONNECTION_NORMAL_BODY_UNREADY; continue; case MHD_CONNECTION_NORMAL_BODY_READY: /* nothing to do here */ break; case MHD_CONNECTION_NORMAL_BODY_UNREADY: if (NULL != connection->response->crc) MHD_mutex_lock_chk_ (&connection->response->mutex); if (0 == connection->response->total_size) { if (NULL != connection->response->crc) MHD_mutex_unlock_chk_ (&connection->response->mutex); connection->state = MHD_CONNECTION_BODY_SENT; continue; } if (MHD_YES == try_ready_normal_body (connection)) { if (NULL != connection->response->crc) MHD_mutex_unlock_chk_ (&connection->response->mutex); connection->state = MHD_CONNECTION_NORMAL_BODY_READY; /* Buffering for flushable socket was already enabled*/ if (MHD_NO == socket_flush_possible (connection)) socket_start_no_buffering (connection); break; } /* mutex was already unlocked by "try_ready_normal_body */ /* not ready, no socket action */ break; case MHD_CONNECTION_CHUNKED_BODY_READY: /* nothing to do here */ break; case MHD_CONNECTION_CHUNKED_BODY_UNREADY: if (NULL != connection->response->crc) MHD_mutex_lock_chk_ (&connection->response->mutex); if ( (0 == connection->response->total_size) || (connection->response_write_position == connection->response->total_size) ) { if (NULL != connection->response->crc) MHD_mutex_unlock_chk_ (&connection->response->mutex); connection->state = MHD_CONNECTION_BODY_SENT; continue; } if (MHD_YES == try_ready_chunked_body (connection)) { if (NULL != connection->response->crc) MHD_mutex_unlock_chk_ (&connection->response->mutex); connection->state = MHD_CONNECTION_CHUNKED_BODY_READY; /* Buffering for flushable socket was already enabled */ if (MHD_NO == socket_flush_possible (connection)) socket_start_no_buffering (connection); continue; } /* mutex was already unlocked by try_ready_chunked_body */ break; case MHD_CONNECTION_BODY_SENT: if (MHD_NO == build_header_response (connection)) { /* oops - close! */ CONNECTION_CLOSE_ERROR (connection, _("Closing connection (failed to create response header)\n")); continue; } if ( (! connection->have_chunked_upload) || (connection->write_buffer_send_offset == connection->write_buffer_append_offset) ) connection->state = MHD_CONNECTION_FOOTERS_SENT; else connection->state = MHD_CONNECTION_FOOTERS_SENDING; continue; case MHD_CONNECTION_FOOTERS_SENDING: /* no default action */ break; case MHD_CONNECTION_FOOTERS_SENT: if (MHD_HTTP_PROCESSING == connection->responseCode) { /* After this type of response, we allow sending another! */ connection->state = MHD_CONNECTION_HEADERS_PROCESSED; MHD_destroy_response (connection->response); connection->response = NULL; /* FIXME: maybe partially reset memory pool? */ continue; } if (MHD_NO != socket_flush_possible (connection)) socket_start_no_buffering_flush (connection); else socket_start_normal_buffering (connection); MHD_destroy_response (connection->response); connection->response = NULL; if ( (NULL != daemon->notify_completed) && (connection->client_aware) ) { connection->client_aware = false; daemon->notify_completed (daemon->notify_completed_cls, connection, &connection->client_context, MHD_REQUEST_TERMINATED_COMPLETED_OK); } if ( (MHD_CONN_USE_KEEPALIVE != connection->keepalive) || (connection->read_closed) ) { /* have to close for some reason */ MHD_connection_close_ (connection, MHD_REQUEST_TERMINATED_COMPLETED_OK); MHD_pool_destroy (connection->pool); connection->pool = NULL; connection->read_buffer = NULL; connection->read_buffer_size = 0; connection->read_buffer_offset = 0; } else { /* can try to keep-alive */ if (MHD_NO != socket_flush_possible (connection)) socket_start_normal_buffering (connection); connection->version = NULL; connection->state = MHD_CONNECTION_INIT; connection->last = NULL; connection->colon = NULL; connection->header_size = 0; connection->keepalive = MHD_CONN_KEEPALIVE_UNKOWN; /* Reset the read buffer to the starting size, preserving the bytes we have already read. */ connection->read_buffer = MHD_pool_reset (connection->pool, connection->read_buffer, connection->read_buffer_offset, connection->daemon->pool_size / 2); connection->read_buffer_size = connection->daemon->pool_size / 2; } connection->client_aware = false; connection->client_context = NULL; connection->continue_message_write_offset = 0; connection->responseCode = 0; connection->headers_received = NULL; connection->headers_received_tail = NULL; connection->response_write_position = 0; connection->have_chunked_upload = false; connection->current_chunk_size = 0; connection->current_chunk_offset = 0; connection->method = NULL; connection->url = NULL; connection->write_buffer = NULL; connection->write_buffer_size = 0; connection->write_buffer_send_offset = 0; connection->write_buffer_append_offset = 0; continue; case MHD_CONNECTION_CLOSED: cleanup_connection (connection); connection->in_idle = false; return MHD_NO; #ifdef UPGRADE_SUPPORT case MHD_CONNECTION_UPGRADE: connection->in_idle = false; return MHD_YES; /* keep open */ #endif /* UPGRADE_SUPPORT */ default: mhd_assert (0); break; } break; } if (! connection->suspended) { time_t timeout; timeout = connection->connection_timeout; if ( (0 != timeout) && (timeout < (MHD_monotonic_sec_counter() - connection->last_activity)) ) { MHD_connection_close_ (connection, MHD_REQUEST_TERMINATED_TIMEOUT_REACHED); connection->in_idle = false; return MHD_YES; } } MHD_connection_update_event_loop_info (connection); ret = MHD_YES; #ifdef EPOLL_SUPPORT if ( (! connection->suspended) && (0 != (daemon->options & MHD_USE_EPOLL)) ) { ret = MHD_connection_epoll_update_ (connection); } #endif /* EPOLL_SUPPORT */ connection->in_idle = false; return ret; } #ifdef EPOLL_SUPPORT /** * Perform epoll() processing, possibly moving the connection back into * the epoll() set if needed. * * @param connection connection to process * @return #MHD_YES if we should continue to process the * connection (not dead yet), #MHD_NO if it died */ int MHD_connection_epoll_update_ (struct MHD_Connection *connection) { struct MHD_Daemon *daemon = connection->daemon; if ( (0 != (daemon->options & MHD_USE_EPOLL)) && (0 == (connection->epoll_state & MHD_EPOLL_STATE_IN_EPOLL_SET)) && (0 == (connection->epoll_state & MHD_EPOLL_STATE_SUSPENDED)) && ( ( (MHD_EVENT_LOOP_INFO_WRITE == connection->event_loop_info) && (0 == (connection->epoll_state & MHD_EPOLL_STATE_WRITE_READY))) || ( (MHD_EVENT_LOOP_INFO_READ == connection->event_loop_info) && (0 == (connection->epoll_state & MHD_EPOLL_STATE_READ_READY)) ) ) ) { /* add to epoll set */ struct epoll_event event; event.events = EPOLLIN | EPOLLOUT | EPOLLPRI | EPOLLET; event.data.ptr = connection; if (0 != epoll_ctl (daemon->epoll_fd, EPOLL_CTL_ADD, connection->socket_fd, &event)) { #ifdef HAVE_MESSAGES if (0 != (daemon->options & MHD_USE_ERROR_LOG)) MHD_DLOG (daemon, _("Call to epoll_ctl failed: %s\n"), MHD_socket_last_strerr_ ()); #endif connection->state = MHD_CONNECTION_CLOSED; cleanup_connection (connection); return MHD_NO; } connection->epoll_state |= MHD_EPOLL_STATE_IN_EPOLL_SET; } return MHD_YES; } #endif /** * Set callbacks for this connection to those for HTTP. * * @param connection connection to initialize */ void MHD_set_http_callbacks_ (struct MHD_Connection *connection) { connection->recv_cls = &recv_param_adapter; connection->send_cls = &send_param_adapter; } /** * Obtain information about the given connection. * * @param connection what connection to get information about * @param info_type what information is desired? * @param ... depends on @a info_type * @return NULL if this information is not available * (or if the @a info_type is unknown) * @ingroup specialized */ const union MHD_ConnectionInfo * MHD_get_connection_info (struct MHD_Connection *connection, enum MHD_ConnectionInfoType info_type, ...) { switch (info_type) { #ifdef HTTPS_SUPPORT case MHD_CONNECTION_INFO_CIPHER_ALGO: if (NULL == connection->tls_session) return NULL; connection->cipher = gnutls_cipher_get (connection->tls_session); return (const union MHD_ConnectionInfo *) &connection->cipher; case MHD_CONNECTION_INFO_PROTOCOL: if (NULL == connection->tls_session) return NULL; connection->protocol = gnutls_protocol_get_version (connection->tls_session); return (const union MHD_ConnectionInfo *) &connection->protocol; case MHD_CONNECTION_INFO_GNUTLS_SESSION: if (NULL == connection->tls_session) return NULL; return (const union MHD_ConnectionInfo *) &connection->tls_session; #endif /* HTTPS_SUPPORT */ case MHD_CONNECTION_INFO_CLIENT_ADDRESS: return (const union MHD_ConnectionInfo *) &connection->addr; case MHD_CONNECTION_INFO_DAEMON: return (const union MHD_ConnectionInfo *) &connection->daemon; case MHD_CONNECTION_INFO_CONNECTION_FD: return (const union MHD_ConnectionInfo *) &connection->socket_fd; case MHD_CONNECTION_INFO_SOCKET_CONTEXT: return (const union MHD_ConnectionInfo *) &connection->socket_context; case MHD_CONNECTION_INFO_CONNECTION_SUSPENDED: connection->suspended_dummy = connection->suspended ? MHD_YES : MHD_NO; return (const union MHD_ConnectionInfo *) &connection->suspended_dummy; case MHD_CONNECTION_INFO_CONNECTION_TIMEOUT: connection->connection_timeout_dummy = (unsigned int)connection->connection_timeout; return (const union MHD_ConnectionInfo *) &connection->connection_timeout_dummy; case MHD_CONNECTION_INFO_REQUEST_HEADER_SIZE: if ( (MHD_CONNECTION_HEADERS_RECEIVED > connection->state) || (MHD_CONNECTION_CLOSED == connection->state) || (MHD_CONNECTION_IN_CLEANUP == connection->state) ) return NULL; /* invalid, too early! */ return (const union MHD_ConnectionInfo *) &connection->header_size; default: return NULL; } } /** * Set a custom option for the given connection, overriding defaults. * * @param connection connection to modify * @param option option to set * @param ... arguments to the option, depending on the option type * @return #MHD_YES on success, #MHD_NO if setting the option failed * @ingroup specialized */ int MHD_set_connection_option (struct MHD_Connection *connection, enum MHD_CONNECTION_OPTION option, ...) { va_list ap; struct MHD_Daemon *daemon; daemon = connection->daemon; switch (option) { case MHD_CONNECTION_OPTION_TIMEOUT: if (0 == connection->connection_timeout) connection->last_activity = MHD_monotonic_sec_counter(); MHD_mutex_lock_chk_ (&daemon->cleanup_connection_mutex); if ( (0 == (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) && (! connection->suspended) ) { if (connection->connection_timeout == daemon->connection_timeout) XDLL_remove (daemon->normal_timeout_head, daemon->normal_timeout_tail, connection); else XDLL_remove (daemon->manual_timeout_head, daemon->manual_timeout_tail, connection); } va_start (ap, option); connection->connection_timeout = va_arg (ap, unsigned int); va_end (ap); if ( (0 == (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) && (! connection->suspended) ) { if (connection->connection_timeout == daemon->connection_timeout) XDLL_insert (daemon->normal_timeout_head, daemon->normal_timeout_tail, connection); else XDLL_insert (daemon->manual_timeout_head, daemon->manual_timeout_tail, connection); } MHD_mutex_unlock_chk_ (&daemon->cleanup_connection_mutex); return MHD_YES; default: return MHD_NO; } } /** * Queue a response to be transmitted to the client (as soon as * possible but after #MHD_AccessHandlerCallback returns). * * @param connection the connection identifying the client * @param status_code HTTP status code (i.e. #MHD_HTTP_OK) * @param response response to transmit * @return #MHD_NO on error (i.e. reply already sent), * #MHD_YES on success or if message has been queued * @ingroup response */ int MHD_queue_response (struct MHD_Connection *connection, unsigned int status_code, struct MHD_Response *response) { struct MHD_Daemon *daemon; if ( (NULL == connection) || (NULL == response) || (NULL != connection->response) || ( (MHD_CONNECTION_HEADERS_PROCESSED != connection->state) && (MHD_CONNECTION_FOOTERS_RECEIVED != connection->state) ) ) return MHD_NO; daemon = connection->daemon; if (daemon->shutdown) return MHD_YES; /* If daemon was shut down in parallel, * response will be aborted now or on later stage. */ if ( (!connection->suspended) && (0 != (daemon->options & MHD_USE_INTERNAL_POLLING_THREAD)) && (!MHD_thread_ID_match_current_(connection->pid.ID)) ) { #ifdef HAVE_MESSAGES MHD_DLOG (daemon, _("Attempted to queue response on wrong thread!\n")); #endif return MHD_NO; } #ifdef UPGRADE_SUPPORT if ( (NULL != response->upgrade_handler) && (0 == (daemon->options & MHD_ALLOW_UPGRADE)) ) { #ifdef HAVE_MESSAGES MHD_DLOG (daemon, _("Attempted 'upgrade' connection on daemon without MHD_ALLOW_UPGRADE option!\n")); #endif return MHD_NO; } if ( (MHD_HTTP_SWITCHING_PROTOCOLS != status_code) && (NULL != response->upgrade_handler) ) { #ifdef HAVE_MESSAGES MHD_DLOG (daemon, _("Application used invalid status code for 'upgrade' response!\n")); #endif return MHD_NO; } #endif /* UPGRADE_SUPPORT */ MHD_increment_response_rc (response); connection->response = response; connection->responseCode = status_code; #if defined(_MHD_HAVE_SENDFILE) if ( (response->fd == -1) || (0 != (connection->daemon->options & MHD_USE_TLS)) ) connection->resp_sender = MHD_resp_sender_std; else connection->resp_sender = MHD_resp_sender_sendfile; #endif /* _MHD_HAVE_SENDFILE */ if ( ( (NULL != connection->method) && (MHD_str_equal_caseless_ (connection->method, MHD_HTTP_METHOD_HEAD)) ) || (MHD_HTTP_OK > status_code) || (MHD_HTTP_NO_CONTENT == status_code) || (MHD_HTTP_NOT_MODIFIED == status_code) ) { /* if this is a "HEAD" request, or a status code for which a body is not allowed, pretend that we have already sent the full message body. */ connection->response_write_position = response->total_size; } if ( (MHD_CONNECTION_HEADERS_PROCESSED == connection->state) && (NULL != connection->method) && ( (MHD_str_equal_caseless_ (connection->method, MHD_HTTP_METHOD_POST)) || (MHD_str_equal_caseless_ (connection->method, MHD_HTTP_METHOD_PUT))) ) { /* response was queued "early", refuse to read body / footers or further requests! */ connection->read_closed = true; connection->state = MHD_CONNECTION_FOOTERS_RECEIVED; } if (! connection->in_idle) (void) MHD_connection_handle_idle (connection); return MHD_YES; } /* end of connection.c */