lighttpd 1.4.x
https://www.lighttpd.net/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
391 lines
8.3 KiB
391 lines
8.3 KiB
#include "server.h" |
|
#include "keyvalue.h" |
|
#include "log.h" |
|
|
|
#include <stdlib.h> |
|
#include <string.h> |
|
#include <stdio.h> |
|
|
|
static keyvalue http_versions[] = { |
|
{ HTTP_VERSION_1_1, "HTTP/1.1" }, |
|
{ HTTP_VERSION_1_0, "HTTP/1.0" }, |
|
{ HTTP_VERSION_UNSET, NULL } |
|
}; |
|
|
|
static keyvalue http_methods[] = { |
|
{ HTTP_METHOD_GET, "GET" }, |
|
{ HTTP_METHOD_POST, "POST" }, |
|
{ HTTP_METHOD_HEAD, "HEAD" }, |
|
{ HTTP_METHOD_PROPFIND, "PROPFIND" }, |
|
{ HTTP_METHOD_PROPPATCH, "PROPPATCH" }, |
|
{ HTTP_METHOD_REPORT, "REPORT" }, |
|
{ HTTP_METHOD_OPTIONS, "OPTIONS" }, |
|
{ HTTP_METHOD_MKCOL, "MKCOL" }, |
|
{ HTTP_METHOD_PUT, "PUT" }, |
|
{ HTTP_METHOD_PATCH, "PATCH" }, |
|
{ HTTP_METHOD_DELETE, "DELETE" }, |
|
{ HTTP_METHOD_COPY, "COPY" }, |
|
{ HTTP_METHOD_MOVE, "MOVE" }, |
|
{ HTTP_METHOD_LABEL, "LABEL" }, |
|
{ HTTP_METHOD_CHECKOUT, "CHECKOUT" }, |
|
{ HTTP_METHOD_CHECKIN, "CHECKIN" }, |
|
{ HTTP_METHOD_MERGE, "MERGE" }, |
|
{ HTTP_METHOD_LOCK, "LOCK" }, |
|
{ HTTP_METHOD_UNLOCK, "UNLOCK" }, |
|
{ HTTP_METHOD_MKACTIVITY, "MKACTIVITY" }, |
|
{ HTTP_METHOD_UNCHECKOUT, "UNCHECKOUT" }, |
|
{ HTTP_METHOD_VERSION_CONTROL, "VERSION-CONTROL" }, |
|
{ HTTP_METHOD_CONNECT, "CONNECT" }, |
|
|
|
{ HTTP_METHOD_UNSET, NULL } |
|
}; |
|
|
|
static keyvalue http_status[] = { |
|
{ 100, "Continue" }, |
|
{ 101, "Switching Protocols" }, |
|
{ 102, "Processing" }, /* WebDAV */ |
|
{ 200, "OK" }, |
|
{ 201, "Created" }, |
|
{ 202, "Accepted" }, |
|
{ 203, "Non-Authoritative Information" }, |
|
{ 204, "No Content" }, |
|
{ 205, "Reset Content" }, |
|
{ 206, "Partial Content" }, |
|
{ 207, "Multi-status" }, /* WebDAV */ |
|
{ 300, "Multiple Choices" }, |
|
{ 301, "Moved Permanently" }, |
|
{ 302, "Found" }, |
|
{ 303, "See Other" }, |
|
{ 304, "Not Modified" }, |
|
{ 305, "Use Proxy" }, |
|
{ 306, "(Unused)" }, |
|
{ 307, "Temporary Redirect" }, |
|
{ 400, "Bad Request" }, |
|
{ 401, "Unauthorized" }, |
|
{ 402, "Payment Required" }, |
|
{ 403, "Forbidden" }, |
|
{ 404, "Not Found" }, |
|
{ 405, "Method Not Allowed" }, |
|
{ 406, "Not Acceptable" }, |
|
{ 407, "Proxy Authentication Required" }, |
|
{ 408, "Request Timeout" }, |
|
{ 409, "Conflict" }, |
|
{ 410, "Gone" }, |
|
{ 411, "Length Required" }, |
|
{ 412, "Precondition Failed" }, |
|
{ 413, "Request Entity Too Large" }, |
|
{ 414, "Request-URI Too Long" }, |
|
{ 415, "Unsupported Media Type" }, |
|
{ 416, "Requested Range Not Satisfiable" }, |
|
{ 417, "Expectation Failed" }, |
|
{ 422, "Unprocessable Entity" }, /* WebDAV */ |
|
{ 423, "Locked" }, /* WebDAV */ |
|
{ 424, "Failed Dependency" }, /* WebDAV */ |
|
{ 426, "Upgrade Required" }, /* TLS */ |
|
{ 500, "Internal Server Error" }, |
|
{ 501, "Not Implemented" }, |
|
{ 502, "Bad Gateway" }, |
|
{ 503, "Service Not Available" }, |
|
{ 504, "Gateway Timeout" }, |
|
{ 505, "HTTP Version Not Supported" }, |
|
{ 507, "Insufficient Storage" }, /* WebDAV */ |
|
|
|
{ -1, NULL } |
|
}; |
|
|
|
static keyvalue http_status_body[] = { |
|
{ 400, "400.html" }, |
|
{ 401, "401.html" }, |
|
{ 403, "403.html" }, |
|
{ 404, "404.html" }, |
|
{ 411, "411.html" }, |
|
{ 416, "416.html" }, |
|
{ 500, "500.html" }, |
|
{ 501, "501.html" }, |
|
{ 503, "503.html" }, |
|
{ 505, "505.html" }, |
|
|
|
{ -1, NULL } |
|
}; |
|
|
|
|
|
const char *keyvalue_get_value(keyvalue *kv, int k) { |
|
int i; |
|
for (i = 0; kv[i].value; i++) { |
|
if (kv[i].key == k) return kv[i].value; |
|
} |
|
return NULL; |
|
} |
|
|
|
int keyvalue_get_key(keyvalue *kv, const char *s) { |
|
int i; |
|
for (i = 0; kv[i].value; i++) { |
|
if (0 == strcmp(kv[i].value, s)) return kv[i].key; |
|
} |
|
return -1; |
|
} |
|
|
|
keyvalue_buffer *keyvalue_buffer_init(void) { |
|
keyvalue_buffer *kvb; |
|
|
|
kvb = calloc(1, sizeof(*kvb)); |
|
|
|
return kvb; |
|
} |
|
|
|
int keyvalue_buffer_append(keyvalue_buffer *kvb, int key, const char *value) { |
|
size_t i; |
|
if (kvb->size == 0) { |
|
kvb->size = 4; |
|
|
|
kvb->kv = malloc(kvb->size * sizeof(*kvb->kv)); |
|
|
|
for(i = 0; i < kvb->size; i++) { |
|
kvb->kv[i] = calloc(1, sizeof(**kvb->kv)); |
|
} |
|
} else if (kvb->used == kvb->size) { |
|
kvb->size += 4; |
|
|
|
kvb->kv = realloc(kvb->kv, kvb->size * sizeof(*kvb->kv)); |
|
|
|
for(i = kvb->used; i < kvb->size; i++) { |
|
kvb->kv[i] = calloc(1, sizeof(**kvb->kv)); |
|
} |
|
} |
|
|
|
kvb->kv[kvb->used]->key = key; |
|
kvb->kv[kvb->used]->value = strdup(value); |
|
|
|
kvb->used++; |
|
|
|
return 0; |
|
} |
|
|
|
void keyvalue_buffer_free(keyvalue_buffer *kvb) { |
|
size_t i; |
|
|
|
for (i = 0; i < kvb->size; i++) { |
|
if (kvb->kv[i]->value) free(kvb->kv[i]->value); |
|
free(kvb->kv[i]); |
|
} |
|
|
|
if (kvb->kv) free(kvb->kv); |
|
|
|
free(kvb); |
|
} |
|
|
|
|
|
s_keyvalue_buffer *s_keyvalue_buffer_init(void) { |
|
s_keyvalue_buffer *kvb; |
|
|
|
kvb = calloc(1, sizeof(*kvb)); |
|
|
|
return kvb; |
|
} |
|
|
|
int s_keyvalue_buffer_append(s_keyvalue_buffer *kvb, const char *key, const char *value) { |
|
size_t i; |
|
if (kvb->size == 0) { |
|
kvb->size = 4; |
|
kvb->used = 0; |
|
|
|
kvb->kv = malloc(kvb->size * sizeof(*kvb->kv)); |
|
|
|
for(i = 0; i < kvb->size; i++) { |
|
kvb->kv[i] = calloc(1, sizeof(**kvb->kv)); |
|
} |
|
} else if (kvb->used == kvb->size) { |
|
kvb->size += 4; |
|
|
|
kvb->kv = realloc(kvb->kv, kvb->size * sizeof(*kvb->kv)); |
|
|
|
for(i = kvb->used; i < kvb->size; i++) { |
|
kvb->kv[i] = calloc(1, sizeof(**kvb->kv)); |
|
} |
|
} |
|
|
|
kvb->kv[kvb->used]->key = key ? strdup(key) : NULL; |
|
kvb->kv[kvb->used]->value = strdup(value); |
|
|
|
kvb->used++; |
|
|
|
return 0; |
|
} |
|
|
|
void s_keyvalue_buffer_free(s_keyvalue_buffer *kvb) { |
|
size_t i; |
|
|
|
for (i = 0; i < kvb->size; i++) { |
|
if (kvb->kv[i]->key) free(kvb->kv[i]->key); |
|
if (kvb->kv[i]->value) free(kvb->kv[i]->value); |
|
free(kvb->kv[i]); |
|
} |
|
|
|
if (kvb->kv) free(kvb->kv); |
|
|
|
free(kvb); |
|
} |
|
|
|
|
|
httpauth_keyvalue_buffer *httpauth_keyvalue_buffer_init(void) { |
|
httpauth_keyvalue_buffer *kvb; |
|
|
|
kvb = calloc(1, sizeof(*kvb)); |
|
|
|
return kvb; |
|
} |
|
|
|
int httpauth_keyvalue_buffer_append(httpauth_keyvalue_buffer *kvb, const char *key, const char *realm, httpauth_type type) { |
|
size_t i; |
|
if (kvb->size == 0) { |
|
kvb->size = 4; |
|
|
|
kvb->kv = malloc(kvb->size * sizeof(*kvb->kv)); |
|
|
|
for(i = 0; i < kvb->size; i++) { |
|
kvb->kv[i] = calloc(1, sizeof(**kvb->kv)); |
|
} |
|
} else if (kvb->used == kvb->size) { |
|
kvb->size += 4; |
|
|
|
kvb->kv = realloc(kvb->kv, kvb->size * sizeof(*kvb->kv)); |
|
|
|
for(i = kvb->used; i < kvb->size; i++) { |
|
kvb->kv[i] = calloc(1, sizeof(**kvb->kv)); |
|
} |
|
} |
|
|
|
kvb->kv[kvb->used]->key = strdup(key); |
|
kvb->kv[kvb->used]->realm = strdup(realm); |
|
kvb->kv[kvb->used]->type = type; |
|
|
|
kvb->used++; |
|
|
|
return 0; |
|
} |
|
|
|
void httpauth_keyvalue_buffer_free(httpauth_keyvalue_buffer *kvb) { |
|
size_t i; |
|
|
|
for (i = 0; i < kvb->size; i++) { |
|
if (kvb->kv[i]->key) free(kvb->kv[i]->key); |
|
if (kvb->kv[i]->realm) free(kvb->kv[i]->realm); |
|
free(kvb->kv[i]); |
|
} |
|
|
|
if (kvb->kv) free(kvb->kv); |
|
|
|
free(kvb); |
|
} |
|
|
|
|
|
const char *get_http_version_name(int i) { |
|
return keyvalue_get_value(http_versions, i); |
|
} |
|
|
|
const char *get_http_status_name(int i) { |
|
return keyvalue_get_value(http_status, i); |
|
} |
|
|
|
const char *get_http_method_name(http_method_t i) { |
|
return keyvalue_get_value(http_methods, i); |
|
} |
|
|
|
const char *get_http_status_body_name(int i) { |
|
return keyvalue_get_value(http_status_body, i); |
|
} |
|
|
|
int get_http_version_key(const char *s) { |
|
return keyvalue_get_key(http_versions, s); |
|
} |
|
|
|
http_method_t get_http_method_key(const char *s) { |
|
return (http_method_t)keyvalue_get_key(http_methods, s); |
|
} |
|
|
|
|
|
|
|
|
|
pcre_keyvalue_buffer *pcre_keyvalue_buffer_init(void) { |
|
pcre_keyvalue_buffer *kvb; |
|
|
|
kvb = calloc(1, sizeof(*kvb)); |
|
|
|
return kvb; |
|
} |
|
|
|
int pcre_keyvalue_buffer_append(server *srv, pcre_keyvalue_buffer *kvb, const char *key, const char *value) { |
|
#ifdef HAVE_PCRE_H |
|
size_t i; |
|
const char *errptr; |
|
int erroff; |
|
pcre_keyvalue *kv; |
|
#endif |
|
|
|
if (!key) return -1; |
|
|
|
#ifdef HAVE_PCRE_H |
|
if (kvb->size == 0) { |
|
kvb->size = 4; |
|
kvb->used = 0; |
|
|
|
kvb->kv = malloc(kvb->size * sizeof(*kvb->kv)); |
|
|
|
for(i = 0; i < kvb->size; i++) { |
|
kvb->kv[i] = calloc(1, sizeof(**kvb->kv)); |
|
} |
|
} else if (kvb->used == kvb->size) { |
|
kvb->size += 4; |
|
|
|
kvb->kv = realloc(kvb->kv, kvb->size * sizeof(*kvb->kv)); |
|
|
|
for(i = kvb->used; i < kvb->size; i++) { |
|
kvb->kv[i] = calloc(1, sizeof(**kvb->kv)); |
|
} |
|
} |
|
|
|
kv = kvb->kv[kvb->used]; |
|
if (NULL == (kv->key = pcre_compile(key, |
|
0, &errptr, &erroff, NULL))) { |
|
|
|
log_error_write(srv, __FILE__, __LINE__, "SS", |
|
"rexexp compilation error at ", errptr); |
|
return -1; |
|
} |
|
|
|
if (NULL == (kv->key_extra = pcre_study(kv->key, 0, &errptr)) && |
|
errptr != NULL) { |
|
return -1; |
|
} |
|
|
|
kv->value = buffer_init_string(value); |
|
|
|
kvb->used++; |
|
|
|
return 0; |
|
#else |
|
UNUSED(kvb); |
|
UNUSED(value); |
|
|
|
return -1; |
|
#endif |
|
} |
|
|
|
void pcre_keyvalue_buffer_free(pcre_keyvalue_buffer *kvb) { |
|
#ifdef HAVE_PCRE_H |
|
size_t i; |
|
pcre_keyvalue *kv; |
|
|
|
for (i = 0; i < kvb->size; i++) { |
|
kv = kvb->kv[i]; |
|
if (kv->key) pcre_free(kv->key); |
|
if (kv->key_extra) pcre_free(kv->key_extra); |
|
if (kv->value) buffer_free(kv->value); |
|
free(kv); |
|
} |
|
|
|
if (kvb->kv) free(kvb->kv); |
|
#endif |
|
|
|
free(kvb); |
|
}
|
|
|