|
|
@@ -1,7 +1,7 @@
|
|
|
/*
|
|
|
* uhttpd - Tiny single-threaded httpd - CGI handler
|
|
|
*
|
|
|
- * Copyright (C) 2010-2011 Jo-Philipp Wich <[email protected]>
|
|
|
+ * Copyright (C) 2010-2012 Jo-Philipp Wich <[email protected]>
|
|
|
*
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
@@ -20,25 +20,24 @@
|
|
|
#include "uhttpd-utils.h"
|
|
|
#include "uhttpd-cgi.h"
|
|
|
|
|
|
-static struct http_response * uh_cgi_header_parse(char *buf, int len, int *off)
|
|
|
+
|
|
|
+static bool
|
|
|
+uh_cgi_header_parse(struct http_response *res, char *buf, int len, int *off)
|
|
|
{
|
|
|
char *bufptr = NULL;
|
|
|
char *hdrname = NULL;
|
|
|
int hdrcount = 0;
|
|
|
int pos = 0;
|
|
|
|
|
|
- static struct http_response res;
|
|
|
-
|
|
|
-
|
|
|
if (((bufptr = strfind(buf, len, "\r\n\r\n", 4)) != NULL) ||
|
|
|
((bufptr = strfind(buf, len, "\n\n", 2)) != NULL))
|
|
|
{
|
|
|
*off = (int)(bufptr - buf) + ((bufptr[0] == '\r') ? 4 : 2);
|
|
|
|
|
|
- memset(&res, 0, sizeof(res));
|
|
|
+ memset(res, 0, sizeof(*res));
|
|
|
|
|
|
- res.statuscode = 200;
|
|
|
- res.statusmsg = "OK";
|
|
|
+ res->statuscode = 200;
|
|
|
+ res->statusmsg = "OK";
|
|
|
|
|
|
bufptr = &buf[0];
|
|
|
|
|
|
@@ -70,25 +69,30 @@ static struct http_response * uh_cgi_header_parse(char *buf, int len, int *off)
|
|
|
|
|
|
if (pos <= len)
|
|
|
{
|
|
|
- if ((hdrcount + 1) < array_size(res.headers))
|
|
|
+ if ((hdrcount+1) < array_size(res->headers))
|
|
|
{
|
|
|
if (!strcasecmp(hdrname, "Status"))
|
|
|
{
|
|
|
- res.statuscode = atoi(bufptr);
|
|
|
+ res->statuscode = atoi(bufptr);
|
|
|
|
|
|
- if (res.statuscode < 100)
|
|
|
- res.statuscode = 200;
|
|
|
+ if (res->statuscode < 100)
|
|
|
+ res->statuscode = 200;
|
|
|
|
|
|
if (((bufptr = strchr(bufptr, ' ')) != NULL) &&
|
|
|
(&bufptr[1] != 0))
|
|
|
{
|
|
|
- res.statusmsg = &bufptr[1];
|
|
|
+ res->statusmsg = &bufptr[1];
|
|
|
}
|
|
|
+
|
|
|
+ D("CGI: HTTP/1.x %03d %s\n",
|
|
|
+ res->statuscode, res->statusmsg);
|
|
|
}
|
|
|
else
|
|
|
{
|
|
|
- res.headers[hdrcount++] = hdrname;
|
|
|
- res.headers[hdrcount++] = bufptr;
|
|
|
+ D("CGI: HTTP: %s: %s\n", hdrname, bufptr);
|
|
|
+
|
|
|
+ res->headers[hdrcount++] = hdrname;
|
|
|
+ res->headers[hdrcount++] = bufptr;
|
|
|
}
|
|
|
|
|
|
bufptr = &buf[pos];
|
|
|
@@ -96,16 +100,16 @@ static struct http_response * uh_cgi_header_parse(char *buf, int len, int *off)
|
|
|
}
|
|
|
else
|
|
|
{
|
|
|
- return NULL;
|
|
|
+ return false;
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
|
|
|
- return &res;
|
|
|
+ return true;
|
|
|
}
|
|
|
|
|
|
- return NULL;
|
|
|
+ return false;
|
|
|
}
|
|
|
|
|
|
static char * uh_cgi_header_lookup(struct http_response *res,
|
|
|
@@ -122,485 +126,443 @@ static char * uh_cgi_header_lookup(struct http_response *res,
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
|
-static int uh_cgi_error_500(struct client *cl, struct http_request *req,
|
|
|
- const char *message)
|
|
|
+static void uh_cgi_shutdown(struct uh_cgi_state *state)
|
|
|
{
|
|
|
- if (uh_http_sendf(cl, NULL,
|
|
|
- "HTTP/%.1f 500 Internal Server Error\r\n"
|
|
|
- "Content-Type: text/plain\r\n%s\r\n",
|
|
|
- req->version,
|
|
|
- (req->version > 1.0)
|
|
|
- ? "Transfer-Encoding: chunked\r\n" : "") >= 0)
|
|
|
- {
|
|
|
- return uh_http_send(cl, req, message, -1);
|
|
|
- }
|
|
|
-
|
|
|
- return -1;
|
|
|
+ close(state->rfd);
|
|
|
+ close(state->wfd);
|
|
|
+ free(state);
|
|
|
}
|
|
|
|
|
|
-
|
|
|
-void uh_cgi_request(struct client *cl, struct http_request *req,
|
|
|
- struct path_info *pi, struct interpreter *ip)
|
|
|
+static bool uh_cgi_socket_cb(struct client *cl)
|
|
|
{
|
|
|
- int i, hdroff, bufoff, rv;
|
|
|
- int hdrlen = 0;
|
|
|
- int buflen = 0;
|
|
|
- int fd_max = 0;
|
|
|
- int content_length = 0;
|
|
|
- int header_sent = 0;
|
|
|
+ int i, len, hdroff;
|
|
|
+ char buf[UH_LIMIT_MSGHEAD];
|
|
|
|
|
|
- int rfd[2] = { 0, 0 };
|
|
|
- int wfd[2] = { 0, 0 };
|
|
|
+ struct uh_cgi_state *state = (struct uh_cgi_state *)cl->priv;
|
|
|
+ struct http_response *res = &state->cl->response;
|
|
|
+ struct http_request *req = &state->cl->request;
|
|
|
|
|
|
- char buf[UH_LIMIT_MSGHEAD];
|
|
|
- char hdr[UH_LIMIT_MSGHEAD];
|
|
|
+ /* there is unread post data waiting */
|
|
|
+ while (state->content_length > 0)
|
|
|
+ {
|
|
|
+ /* remaining data in http head buffer ... */
|
|
|
+ if (state->cl->httpbuf.len > 0)
|
|
|
+ {
|
|
|
+ len = min(state->content_length, state->cl->httpbuf.len);
|
|
|
|
|
|
- pid_t child;
|
|
|
+ D("CGI: Child(%d) feed %d HTTP buffer bytes\n",
|
|
|
+ state->cl->proc.pid, len);
|
|
|
|
|
|
- fd_set reader;
|
|
|
- fd_set writer;
|
|
|
+ memcpy(buf, state->cl->httpbuf.ptr, len);
|
|
|
|
|
|
- sigset_t ss;
|
|
|
+ state->cl->httpbuf.len -= len;
|
|
|
+ state->cl->httpbuf.ptr +=len;
|
|
|
+ }
|
|
|
|
|
|
- struct sigaction sa;
|
|
|
- struct timeval timeout;
|
|
|
- struct http_response *res;
|
|
|
+ /* read it from socket ... */
|
|
|
+ else
|
|
|
+ {
|
|
|
+ len = uh_tcp_recv(state->cl, buf,
|
|
|
+ min(state->content_length, sizeof(buf)));
|
|
|
|
|
|
+ if ((len < 0) && ((errno == EAGAIN) || (errno == EWOULDBLOCK)))
|
|
|
+ break;
|
|
|
|
|
|
- /* spawn pipes for me->child, child->me */
|
|
|
- if ((pipe(rfd) < 0) || (pipe(wfd) < 0))
|
|
|
- {
|
|
|
- uh_http_sendhf(cl, 500, "Internal Server Error",
|
|
|
- "Failed to create pipe: %s", strerror(errno));
|
|
|
+ D("CGI: Child(%d) feed %d/%d TCP socket bytes\n",
|
|
|
+ state->cl->proc.pid, len,
|
|
|
+ min(state->content_length, sizeof(buf)));
|
|
|
+ }
|
|
|
|
|
|
- if (rfd[0] > 0) close(rfd[0]);
|
|
|
- if (rfd[1] > 0) close(rfd[1]);
|
|
|
- if (wfd[0] > 0) close(wfd[0]);
|
|
|
- if (wfd[1] > 0) close(wfd[1]);
|
|
|
+ if (len)
|
|
|
+ state->content_length -= len;
|
|
|
+ else
|
|
|
+ state->content_length = 0;
|
|
|
|
|
|
- return;
|
|
|
+ /* ... write to CGI process */
|
|
|
+ len = uh_raw_send(state->wfd, buf, len,
|
|
|
+ cl->server->conf->script_timeout);
|
|
|
}
|
|
|
|
|
|
- /* fork off child process */
|
|
|
- switch ((child = fork()))
|
|
|
+ /* try to read data from child */
|
|
|
+ while ((len = uh_raw_recv(state->rfd, buf, sizeof(buf), -1)) > 0)
|
|
|
{
|
|
|
- /* oops */
|
|
|
- case -1:
|
|
|
- uh_http_sendhf(cl, 500, "Internal Server Error",
|
|
|
- "Failed to fork child: %s", strerror(errno));
|
|
|
- return;
|
|
|
-
|
|
|
- /* exec child */
|
|
|
- case 0:
|
|
|
- /* unblock signals */
|
|
|
- sigemptyset(&ss);
|
|
|
- sigprocmask(SIG_SETMASK, &ss, NULL);
|
|
|
-
|
|
|
- /* restore SIGTERM */
|
|
|
- sa.sa_flags = 0;
|
|
|
- sa.sa_handler = SIG_DFL;
|
|
|
- sigemptyset(&sa.sa_mask);
|
|
|
- sigaction(SIGTERM, &sa, NULL);
|
|
|
-
|
|
|
- /* close loose pipe ends */
|
|
|
- close(rfd[0]);
|
|
|
- close(wfd[1]);
|
|
|
-
|
|
|
- /* patch stdout and stdin to pipes */
|
|
|
- dup2(rfd[1], 1);
|
|
|
- dup2(wfd[0], 0);
|
|
|
-
|
|
|
- /* avoid leaking our pipe into child-child processes */
|
|
|
- fd_cloexec(rfd[1]);
|
|
|
- fd_cloexec(wfd[0]);
|
|
|
-
|
|
|
- /* check for regular, world-executable file _or_ interpreter */
|
|
|
- if (((pi->stat.st_mode & S_IFREG) &&
|
|
|
- (pi->stat.st_mode & S_IXOTH)) || (ip != NULL))
|
|
|
+ /* we have not pushed out headers yet, parse input */
|
|
|
+ if (!state->header_sent)
|
|
|
+ {
|
|
|
+ /* try to parse header ... */
|
|
|
+ memcpy(state->httpbuf, buf, len);
|
|
|
+
|
|
|
+ if (uh_cgi_header_parse(res, state->httpbuf, len, &hdroff))
|
|
|
{
|
|
|
- /* build environment */
|
|
|
- clearenv();
|
|
|
+ /* write status */
|
|
|
+ ensure_out(uh_http_sendf(state->cl, NULL,
|
|
|
+ "HTTP/%.1f %03d %s\r\n"
|
|
|
+ "Connection: close\r\n",
|
|
|
+ req->version, res->statuscode, res->statusmsg));
|
|
|
+
|
|
|
+ /* add Content-Type if no Location or Content-Type */
|
|
|
+ if (!uh_cgi_header_lookup(res, "Location") &&
|
|
|
+ !uh_cgi_header_lookup(res, "Content-Type"))
|
|
|
+ {
|
|
|
+ ensure_out(uh_http_send(state->cl, NULL,
|
|
|
+ "Content-Type: text/plain\r\n", -1));
|
|
|
+ }
|
|
|
|
|
|
- /* common information */
|
|
|
- setenv("GATEWAY_INTERFACE", "CGI/1.1", 1);
|
|
|
- setenv("SERVER_SOFTWARE", "uHTTPd", 1);
|
|
|
- setenv("PATH", "/sbin:/usr/sbin:/bin:/usr/bin", 1);
|
|
|
+ /* if request was HTTP 1.1 we'll respond chunked */
|
|
|
+ if ((req->version > 1.0) &&
|
|
|
+ !uh_cgi_header_lookup(res, "Transfer-Encoding"))
|
|
|
+ {
|
|
|
+ ensure_out(uh_http_send(state->cl, NULL,
|
|
|
+ "Transfer-Encoding: chunked\r\n", -1));
|
|
|
+ }
|
|
|
|
|
|
-#ifdef HAVE_TLS
|
|
|
- /* https? */
|
|
|
- if (cl->tls)
|
|
|
- setenv("HTTPS", "on", 1);
|
|
|
-#endif
|
|
|
+ /* write headers from CGI program */
|
|
|
+ foreach_header(i, res->headers)
|
|
|
+ {
|
|
|
+ ensure_out(uh_http_sendf(state->cl, NULL, "%s: %s\r\n",
|
|
|
+ res->headers[i], res->headers[i+1]));
|
|
|
+ }
|
|
|
+
|
|
|
+ /* terminate header */
|
|
|
+ ensure_out(uh_http_send(state->cl, NULL, "\r\n", -1));
|
|
|
|
|
|
- /* addresses */
|
|
|
- setenv("SERVER_NAME", sa_straddr(&cl->servaddr), 1);
|
|
|
- setenv("SERVER_ADDR", sa_straddr(&cl->servaddr), 1);
|
|
|
- setenv("SERVER_PORT", sa_strport(&cl->servaddr), 1);
|
|
|
- setenv("REMOTE_HOST", sa_straddr(&cl->peeraddr), 1);
|
|
|
- setenv("REMOTE_ADDR", sa_straddr(&cl->peeraddr), 1);
|
|
|
- setenv("REMOTE_PORT", sa_strport(&cl->peeraddr), 1);
|
|
|
-
|
|
|
- /* path information */
|
|
|
- setenv("SCRIPT_NAME", pi->name, 1);
|
|
|
- setenv("SCRIPT_FILENAME", pi->phys, 1);
|
|
|
- setenv("DOCUMENT_ROOT", pi->root, 1);
|
|
|
- setenv("QUERY_STRING", pi->query ? pi->query : "", 1);
|
|
|
-
|
|
|
- if (pi->info)
|
|
|
- setenv("PATH_INFO", pi->info, 1);
|
|
|
-
|
|
|
- /* REDIRECT_STATUS, php-cgi wants it */
|
|
|
- switch (req->redirect_status)
|
|
|
+ state->header_sent = true;
|
|
|
+
|
|
|
+ /* push out remaining head buffer */
|
|
|
+ if (hdroff < len)
|
|
|
{
|
|
|
- case 404:
|
|
|
- setenv("REDIRECT_STATUS", "404", 1);
|
|
|
- break;
|
|
|
+ D("CGI: Child(%d) relaying %d rest bytes\n",
|
|
|
+ state->cl->proc.pid, len - hdroff);
|
|
|
|
|
|
- default:
|
|
|
- setenv("REDIRECT_STATUS", "200", 1);
|
|
|
- break;
|
|
|
+ ensure_out(uh_http_send(state->cl, req,
|
|
|
+ &buf[hdroff], len - hdroff));
|
|
|
}
|
|
|
+ }
|
|
|
|
|
|
- /* http version */
|
|
|
- if (req->version > 1.0)
|
|
|
- setenv("SERVER_PROTOCOL", "HTTP/1.1", 1);
|
|
|
- else
|
|
|
- setenv("SERVER_PROTOCOL", "HTTP/1.0", 1);
|
|
|
+ /* ... failed and head buffer exceeded */
|
|
|
+ else
|
|
|
+ {
|
|
|
+ /* I would do this ...
|
|
|
+ *
|
|
|
+ * uh_cgi_error_500(cl, req,
|
|
|
+ * "The CGI program generated an "
|
|
|
+ * "invalid response:\n\n");
|
|
|
+ *
|
|
|
+ * ... but in order to stay as compatible as possible,
|
|
|
+ * treat whatever we got as text/plain response and
|
|
|
+ * build the required headers here.
|
|
|
+ */
|
|
|
+
|
|
|
+ ensure_out(uh_http_sendf(state->cl, NULL,
|
|
|
+ "HTTP/%.1f 200 OK\r\n"
|
|
|
+ "Content-Type: text/plain\r\n"
|
|
|
+ "%s\r\n",
|
|
|
+ req->version, (req->version > 1.0)
|
|
|
+ ? "Transfer-Encoding: chunked\r\n" : ""
|
|
|
+ ));
|
|
|
+
|
|
|
+ state->header_sent = true;
|
|
|
+
|
|
|
+ D("CGI: Child(%d) relaying %d invalid bytes\n",
|
|
|
+ state->cl->proc.pid, len);
|
|
|
+
|
|
|
+ ensure_out(uh_http_send(state->cl, req, buf, len));
|
|
|
+ }
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ /* headers complete, pass through buffer to socket */
|
|
|
+ D("CGI: Child(%d) relaying %d normal bytes\n",
|
|
|
+ state->cl->proc.pid, len);
|
|
|
|
|
|
- /* request method */
|
|
|
- switch (req->method)
|
|
|
- {
|
|
|
- case UH_HTTP_MSG_GET:
|
|
|
- setenv("REQUEST_METHOD", "GET", 1);
|
|
|
- break;
|
|
|
+ ensure_out(uh_http_send(state->cl, req, buf, len));
|
|
|
+ }
|
|
|
+ }
|
|
|
|
|
|
- case UH_HTTP_MSG_HEAD:
|
|
|
- setenv("REQUEST_METHOD", "HEAD", 1);
|
|
|
- break;
|
|
|
+ /* child has been marked dead by timeout or child handler, bail out */
|
|
|
+ if (false && cl->dead)
|
|
|
+ {
|
|
|
+ D("CGI: Child(%d) is marked dead, returning\n", state->cl->proc.pid);
|
|
|
+ goto out;
|
|
|
+ }
|
|
|
|
|
|
- case UH_HTTP_MSG_POST:
|
|
|
- setenv("REQUEST_METHOD", "POST", 1);
|
|
|
- break;
|
|
|
- }
|
|
|
+ if ((len == 0) ||
|
|
|
+ ((errno != EAGAIN) && (errno != EWOULDBLOCK) && (len == -1)))
|
|
|
+ {
|
|
|
+ D("CGI: Child(%d) presumed dead [%s]\n",
|
|
|
+ state->cl->proc.pid, strerror(errno));
|
|
|
|
|
|
- /* request url */
|
|
|
- setenv("REQUEST_URI", req->url, 1);
|
|
|
+ goto out;
|
|
|
+ }
|
|
|
|
|
|
- /* remote user */
|
|
|
- if (req->realm)
|
|
|
- setenv("REMOTE_USER", req->realm->user, 1);
|
|
|
+ return true;
|
|
|
|
|
|
- /* request message headers */
|
|
|
- foreach_header(i, req->headers)
|
|
|
- {
|
|
|
- if (!strcasecmp(req->headers[i], "Accept"))
|
|
|
- setenv("HTTP_ACCEPT", req->headers[i+1], 1);
|
|
|
+out:
|
|
|
+ if (!state->header_sent)
|
|
|
+ {
|
|
|
+ if (state->cl->timeout.pending)
|
|
|
+ uh_http_sendhf(state->cl, 502, "Bad Gateway",
|
|
|
+ "The CGI process did not produce any response\n");
|
|
|
+ else
|
|
|
+ uh_http_sendhf(state->cl, 504, "Gateway Timeout",
|
|
|
+ "The CGI process took too long to produce a "
|
|
|
+ "response\n");
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ uh_http_send(state->cl, req, "", 0);
|
|
|
+ }
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Accept-Charset"))
|
|
|
- setenv("HTTP_ACCEPT_CHARSET", req->headers[i+1], 1);
|
|
|
+ uh_cgi_shutdown(state);
|
|
|
+ return false;
|
|
|
+}
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Accept-Encoding"))
|
|
|
- setenv("HTTP_ACCEPT_ENCODING", req->headers[i+1], 1);
|
|
|
+bool uh_cgi_request(struct client *cl, struct path_info *pi,
|
|
|
+ struct interpreter *ip)
|
|
|
+{
|
|
|
+ int i;
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Accept-Language"))
|
|
|
- setenv("HTTP_ACCEPT_LANGUAGE", req->headers[i+1], 1);
|
|
|
+ int rfd[2] = { 0, 0 };
|
|
|
+ int wfd[2] = { 0, 0 };
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Authorization"))
|
|
|
- setenv("HTTP_AUTHORIZATION", req->headers[i+1], 1);
|
|
|
+ pid_t child;
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Connection"))
|
|
|
- setenv("HTTP_CONNECTION", req->headers[i+1], 1);
|
|
|
+ struct uh_cgi_state *state;
|
|
|
+ struct http_request *req = &cl->request;
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Cookie"))
|
|
|
- setenv("HTTP_COOKIE", req->headers[i+1], 1);
|
|
|
+ /* allocate state */
|
|
|
+ if (!(state = malloc(sizeof(*state))))
|
|
|
+ {
|
|
|
+ uh_http_sendhf(cl, 500, "Internal Server Error", "Out of memory");
|
|
|
+ return false;
|
|
|
+ }
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Host"))
|
|
|
- setenv("HTTP_HOST", req->headers[i+1], 1);
|
|
|
+ /* spawn pipes for me->child, child->me */
|
|
|
+ if ((pipe(rfd) < 0) || (pipe(wfd) < 0))
|
|
|
+ {
|
|
|
+ if (rfd[0] > 0) close(rfd[0]);
|
|
|
+ if (rfd[1] > 0) close(rfd[1]);
|
|
|
+ if (wfd[0] > 0) close(wfd[0]);
|
|
|
+ if (wfd[1] > 0) close(wfd[1]);
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Referer"))
|
|
|
- setenv("HTTP_REFERER", req->headers[i+1], 1);
|
|
|
+ uh_http_sendhf(cl, 500, "Internal Server Error",
|
|
|
+ "Failed to create pipe: %s\n", strerror(errno));
|
|
|
+
|
|
|
+ return false;
|
|
|
+ }
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "User-Agent"))
|
|
|
- setenv("HTTP_USER_AGENT", req->headers[i+1], 1);
|
|
|
+ /* fork off child process */
|
|
|
+ switch ((child = fork()))
|
|
|
+ {
|
|
|
+ /* oops */
|
|
|
+ case -1:
|
|
|
+ uh_http_sendhf(cl, 500, "Internal Server Error",
|
|
|
+ "Failed to fork child: %s\n", strerror(errno));
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Content-Type"))
|
|
|
- setenv("CONTENT_TYPE", req->headers[i+1], 1);
|
|
|
+ return false;
|
|
|
|
|
|
- else if (!strcasecmp(req->headers[i], "Content-Length"))
|
|
|
- setenv("CONTENT_LENGTH", req->headers[i+1], 1);
|
|
|
- }
|
|
|
+ /* exec child */
|
|
|
+ case 0:
|
|
|
+#ifdef DEBUG
|
|
|
+ sleep(atoi(getenv("UHTTPD_SLEEP_ON_FORK") ?: "0"));
|
|
|
+#endif
|
|
|
|
|
|
+ /* close loose pipe ends */
|
|
|
+ close(rfd[0]);
|
|
|
+ close(wfd[1]);
|
|
|
|
|
|
- /* execute child code ... */
|
|
|
- if (chdir(pi->root))
|
|
|
- perror("chdir()");
|
|
|
+ /* patch stdout and stdin to pipes */
|
|
|
+ dup2(rfd[1], 1);
|
|
|
+ dup2(wfd[0], 0);
|
|
|
|
|
|
- if (ip != NULL)
|
|
|
- execl(ip->path, ip->path, pi->phys, NULL);
|
|
|
- else
|
|
|
- execl(pi->phys, pi->phys, NULL);
|
|
|
+ /* avoid leaking our pipe into child-child processes */
|
|
|
+ fd_cloexec(rfd[1]);
|
|
|
+ fd_cloexec(wfd[0]);
|
|
|
|
|
|
- /* in case it fails ... */
|
|
|
- printf("Status: 500 Internal Server Error\r\n\r\n"
|
|
|
- "Unable to launch the requested CGI program:\n"
|
|
|
- " %s: %s\n",
|
|
|
- ip ? ip->path : pi->phys, strerror(errno));
|
|
|
+ /* check for regular, world-executable file _or_ interpreter */
|
|
|
+ if (((pi->stat.st_mode & S_IFREG) &&
|
|
|
+ (pi->stat.st_mode & S_IXOTH)) || (ip != NULL))
|
|
|
+ {
|
|
|
+ /* build environment */
|
|
|
+ clearenv();
|
|
|
+
|
|
|
+ /* common information */
|
|
|
+ setenv("GATEWAY_INTERFACE", "CGI/1.1", 1);
|
|
|
+ setenv("SERVER_SOFTWARE", "uHTTPd", 1);
|
|
|
+ setenv("PATH", "/sbin:/usr/sbin:/bin:/usr/bin", 1);
|
|
|
+
|
|
|
+#ifdef HAVE_TLS
|
|
|
+ /* https? */
|
|
|
+ if (cl->tls)
|
|
|
+ setenv("HTTPS", "on", 1);
|
|
|
+#endif
|
|
|
+
|
|
|
+ /* addresses */
|
|
|
+ setenv("SERVER_NAME", sa_straddr(&cl->servaddr), 1);
|
|
|
+ setenv("SERVER_ADDR", sa_straddr(&cl->servaddr), 1);
|
|
|
+ setenv("SERVER_PORT", sa_strport(&cl->servaddr), 1);
|
|
|
+ setenv("REMOTE_HOST", sa_straddr(&cl->peeraddr), 1);
|
|
|
+ setenv("REMOTE_ADDR", sa_straddr(&cl->peeraddr), 1);
|
|
|
+ setenv("REMOTE_PORT", sa_strport(&cl->peeraddr), 1);
|
|
|
+
|
|
|
+ /* path information */
|
|
|
+ setenv("SCRIPT_NAME", pi->name, 1);
|
|
|
+ setenv("SCRIPT_FILENAME", pi->phys, 1);
|
|
|
+ setenv("DOCUMENT_ROOT", pi->root, 1);
|
|
|
+ setenv("QUERY_STRING", pi->query ? pi->query : "", 1);
|
|
|
+
|
|
|
+ if (pi->info)
|
|
|
+ setenv("PATH_INFO", pi->info, 1);
|
|
|
+
|
|
|
+ /* REDIRECT_STATUS, php-cgi wants it */
|
|
|
+ switch (req->redirect_status)
|
|
|
+ {
|
|
|
+ case 404:
|
|
|
+ setenv("REDIRECT_STATUS", "404", 1);
|
|
|
+ break;
|
|
|
+
|
|
|
+ default:
|
|
|
+ setenv("REDIRECT_STATUS", "200", 1);
|
|
|
+ break;
|
|
|
}
|
|
|
|
|
|
- /* 403 */
|
|
|
+ /* http version */
|
|
|
+ if (req->version > 1.0)
|
|
|
+ setenv("SERVER_PROTOCOL", "HTTP/1.1", 1);
|
|
|
else
|
|
|
+ setenv("SERVER_PROTOCOL", "HTTP/1.0", 1);
|
|
|
+
|
|
|
+ /* request method */
|
|
|
+ switch (req->method)
|
|
|
{
|
|
|
- printf("Status: 403 Forbidden\r\n\r\n"
|
|
|
- "Access to this resource is forbidden\n");
|
|
|
- }
|
|
|
+ case UH_HTTP_MSG_GET:
|
|
|
+ setenv("REQUEST_METHOD", "GET", 1);
|
|
|
+ break;
|
|
|
|
|
|
- close(wfd[0]);
|
|
|
- close(rfd[1]);
|
|
|
- exit(0);
|
|
|
+ case UH_HTTP_MSG_HEAD:
|
|
|
+ setenv("REQUEST_METHOD", "HEAD", 1);
|
|
|
+ break;
|
|
|
|
|
|
- break;
|
|
|
+ case UH_HTTP_MSG_POST:
|
|
|
+ setenv("REQUEST_METHOD", "POST", 1);
|
|
|
+ break;
|
|
|
+ }
|
|
|
|
|
|
- /* parent; handle I/O relaying */
|
|
|
- default:
|
|
|
- /* close unneeded pipe ends */
|
|
|
- close(rfd[1]);
|
|
|
- close(wfd[0]);
|
|
|
+ /* request url */
|
|
|
+ setenv("REQUEST_URI", req->url, 1);
|
|
|
|
|
|
- /* max watch fd */
|
|
|
- fd_max = max(rfd[0], wfd[1]) + 1;
|
|
|
+ /* remote user */
|
|
|
+ if (req->realm)
|
|
|
+ setenv("REMOTE_USER", req->realm->user, 1);
|
|
|
|
|
|
- /* find content length */
|
|
|
- if (req->method == UH_HTTP_MSG_POST)
|
|
|
+ /* request message headers */
|
|
|
+ foreach_header(i, req->headers)
|
|
|
{
|
|
|
- foreach_header(i, req->headers)
|
|
|
- {
|
|
|
- if (!strcasecmp(req->headers[i], "Content-Length"))
|
|
|
- {
|
|
|
- content_length = atoi(req->headers[i+1]);
|
|
|
- break;
|
|
|
- }
|
|
|
- }
|
|
|
- }
|
|
|
+ if (!strcasecmp(req->headers[i], "Accept"))
|
|
|
+ setenv("HTTP_ACCEPT", req->headers[i+1], 1);
|
|
|
|
|
|
+ else if (!strcasecmp(req->headers[i], "Accept-Charset"))
|
|
|
+ setenv("HTTP_ACCEPT_CHARSET", req->headers[i+1], 1);
|
|
|
|
|
|
- memset(hdr, 0, sizeof(hdr));
|
|
|
+ else if (!strcasecmp(req->headers[i], "Accept-Encoding"))
|
|
|
+ setenv("HTTP_ACCEPT_ENCODING", req->headers[i+1], 1);
|
|
|
|
|
|
- /* I/O loop, watch our pipe ends and dispatch child reads/writes from/to socket */
|
|
|
- while (1)
|
|
|
- {
|
|
|
- FD_ZERO(&reader);
|
|
|
- FD_ZERO(&writer);
|
|
|
+ else if (!strcasecmp(req->headers[i], "Accept-Language"))
|
|
|
+ setenv("HTTP_ACCEPT_LANGUAGE", req->headers[i+1], 1);
|
|
|
|
|
|
- FD_SET(rfd[0], &reader);
|
|
|
- FD_SET(wfd[1], &writer);
|
|
|
+ else if (!strcasecmp(req->headers[i], "Authorization"))
|
|
|
+ setenv("HTTP_AUTHORIZATION", req->headers[i+1], 1);
|
|
|
|
|
|
- timeout.tv_sec = (header_sent < 1) ? cl->server->conf->script_timeout : 3;
|
|
|
- timeout.tv_usec = 0;
|
|
|
+ else if (!strcasecmp(req->headers[i], "Connection"))
|
|
|
+ setenv("HTTP_CONNECTION", req->headers[i+1], 1);
|
|
|
|
|
|
- ensure_out(rv = select_intr(fd_max, &reader,
|
|
|
- (content_length > -1)
|
|
|
- ? &writer : NULL,
|
|
|
- NULL, &timeout));
|
|
|
+ else if (!strcasecmp(req->headers[i], "Cookie"))
|
|
|
+ setenv("HTTP_COOKIE", req->headers[i+1], 1);
|
|
|
|
|
|
- /* timeout */
|
|
|
- if (rv == 0)
|
|
|
- {
|
|
|
- ensure_out(kill(child, 0));
|
|
|
- }
|
|
|
+ else if (!strcasecmp(req->headers[i], "Host"))
|
|
|
+ setenv("HTTP_HOST", req->headers[i+1], 1);
|
|
|
|
|
|
- /* wait until we can read or write or both */
|
|
|
- else if (rv > 0)
|
|
|
- {
|
|
|
- /* ready to write to cgi program */
|
|
|
- if (FD_ISSET(wfd[1], &writer))
|
|
|
- {
|
|
|
- /* there is unread post data waiting */
|
|
|
- if (content_length > 0)
|
|
|
- {
|
|
|
- /* read it from socket ... */
|
|
|
- ensure_out(buflen = uh_tcp_recv(cl, buf,
|
|
|
- min(content_length, sizeof(buf))));
|
|
|
+ else if (!strcasecmp(req->headers[i], "Referer"))
|
|
|
+ setenv("HTTP_REFERER", req->headers[i+1], 1);
|
|
|
|
|
|
- if (buflen > 0)
|
|
|
- {
|
|
|
- /* ... and write it to child's stdin */
|
|
|
- if (write(wfd[1], buf, buflen) < 0)
|
|
|
- perror("write()");
|
|
|
+ else if (!strcasecmp(req->headers[i], "User-Agent"))
|
|
|
+ setenv("HTTP_USER_AGENT", req->headers[i+1], 1);
|
|
|
|
|
|
- content_length -= buflen;
|
|
|
- }
|
|
|
+ else if (!strcasecmp(req->headers[i], "Content-Type"))
|
|
|
+ setenv("CONTENT_TYPE", req->headers[i+1], 1);
|
|
|
|
|
|
- /* unexpected eof! */
|
|
|
- else
|
|
|
- {
|
|
|
- if (write(wfd[1], "", 0) < 0)
|
|
|
- perror("write()");
|
|
|
+ else if (!strcasecmp(req->headers[i], "Content-Length"))
|
|
|
+ setenv("CONTENT_LENGTH", req->headers[i+1], 1);
|
|
|
+ }
|
|
|
|
|
|
- content_length = 0;
|
|
|
- }
|
|
|
- }
|
|
|
|
|
|
- /* there is no more post data, close pipe to child's stdin */
|
|
|
- else if (content_length > -1)
|
|
|
- {
|
|
|
- close(wfd[1]);
|
|
|
- content_length = -1;
|
|
|
- }
|
|
|
- }
|
|
|
+ /* execute child code ... */
|
|
|
+ if (chdir(pi->root))
|
|
|
+ perror("chdir()");
|
|
|
|
|
|
- /* ready to read from cgi program */
|
|
|
- if (FD_ISSET(rfd[0], &reader))
|
|
|
- {
|
|
|
- /* read data from child ... */
|
|
|
- if ((buflen = read(rfd[0], buf, sizeof(buf))) > 0)
|
|
|
- {
|
|
|
- /* we have not pushed out headers yet, parse input */
|
|
|
- if (!header_sent)
|
|
|
- {
|
|
|
- /* head buffer not full and no end yet */
|
|
|
- if (hdrlen < sizeof(hdr))
|
|
|
- {
|
|
|
- bufoff = min(buflen, sizeof(hdr) - hdrlen);
|
|
|
- memcpy(&hdr[hdrlen], buf, bufoff);
|
|
|
- hdrlen += bufoff;
|
|
|
- }
|
|
|
- else
|
|
|
- {
|
|
|
- bufoff = 0;
|
|
|
- }
|
|
|
-
|
|
|
-
|
|
|
- /* try to parse header ... */
|
|
|
- if ((res = uh_cgi_header_parse(hdr, hdrlen, &hdroff)) != NULL)
|
|
|
- {
|
|
|
- /* write status */
|
|
|
- ensure_out(uh_http_sendf(cl, NULL,
|
|
|
- "HTTP/%.1f %03d %s\r\n"
|
|
|
- "Connection: close\r\n",
|
|
|
- req->version, res->statuscode,
|
|
|
- res->statusmsg));
|
|
|
-
|
|
|
- /* add Content-Type if no Location or Content-Type */
|
|
|
- if( !uh_cgi_header_lookup(res, "Location") &&
|
|
|
- !uh_cgi_header_lookup(res, "Content-Type")
|
|
|
- ) {
|
|
|
- ensure_out(uh_http_send(cl, NULL,
|
|
|
- "Content-Type: text/plain\r\n", -1));
|
|
|
- }
|
|
|
-
|
|
|
- /* if request was HTTP 1.1 we'll respond chunked */
|
|
|
- if( (req->version > 1.0) &&
|
|
|
- !uh_cgi_header_lookup(res, "Transfer-Encoding")
|
|
|
- ) {
|
|
|
- ensure_out(uh_http_send(cl, NULL,
|
|
|
- "Transfer-Encoding: chunked\r\n", -1));
|
|
|
- }
|
|
|
-
|
|
|
- /* write headers from CGI program */
|
|
|
- foreach_header(i, res->headers)
|
|
|
- {
|
|
|
- ensure_out(uh_http_sendf(cl, NULL, "%s: %s\r\n",
|
|
|
- res->headers[i], res->headers[i+1]));
|
|
|
- }
|
|
|
-
|
|
|
- /* terminate header */
|
|
|
- ensure_out(uh_http_send(cl, NULL, "\r\n", -1));
|
|
|
-
|
|
|
- /* push out remaining head buffer */
|
|
|
- if (hdroff < hdrlen)
|
|
|
- ensure_out(uh_http_send(cl, req, &hdr[hdroff], hdrlen - hdroff));
|
|
|
- }
|
|
|
-
|
|
|
- /* ... failed and head buffer exceeded */
|
|
|
- else if (hdrlen >= sizeof(hdr))
|
|
|
- {
|
|
|
- ensure_out(uh_cgi_error_500(cl, req,
|
|
|
- "The CGI program generated an invalid response:\n\n"));
|
|
|
-
|
|
|
- ensure_out(uh_http_send(cl, req, hdr, hdrlen));
|
|
|
- }
|
|
|
-
|
|
|
- /* ... failed but free buffer space, try again */
|
|
|
- else
|
|
|
- {
|
|
|
- continue;
|
|
|
- }
|
|
|
-
|
|
|
- /* push out remaining read buffer */
|
|
|
- if (bufoff < buflen)
|
|
|
- ensure_out(uh_http_send(cl, req, &buf[bufoff], buflen - bufoff));
|
|
|
-
|
|
|
- header_sent = 1;
|
|
|
- continue;
|
|
|
- }
|
|
|
+ if (ip != NULL)
|
|
|
+ execl(ip->path, ip->path, pi->phys, NULL);
|
|
|
+ else
|
|
|
+ execl(pi->phys, pi->phys, NULL);
|
|
|
|
|
|
+ /* in case it fails ... */
|
|
|
+ printf("Status: 500 Internal Server Error\r\n\r\n"
|
|
|
+ "Unable to launch the requested CGI program:\n"
|
|
|
+ " %s: %s\n", ip ? ip->path : pi->phys, strerror(errno));
|
|
|
+ }
|
|
|
|
|
|
- /* headers complete, pass through buffer to socket */
|
|
|
- ensure_out(uh_http_send(cl, req, buf, buflen));
|
|
|
- }
|
|
|
+ /* 403 */
|
|
|
+ else
|
|
|
+ {
|
|
|
+ printf("Status: 403 Forbidden\r\n\r\n"
|
|
|
+ "Access to this resource is forbidden\n");
|
|
|
+ }
|
|
|
|
|
|
- /* looks like eof from child */
|
|
|
- else
|
|
|
- {
|
|
|
- /* cgi script did not output useful stuff at all */
|
|
|
- if (!header_sent)
|
|
|
- {
|
|
|
- /* I would do this ...
|
|
|
- *
|
|
|
- * uh_cgi_error_500(cl, req,
|
|
|
- * "The CGI program generated an "
|
|
|
- * "invalid response:\n\n");
|
|
|
- *
|
|
|
- * ... but in order to stay as compatible as possible,
|
|
|
- * treat whatever we got as text/plain response and
|
|
|
- * build the required headers here.
|
|
|
- */
|
|
|
-
|
|
|
- ensure_out(uh_http_sendf(cl, NULL,
|
|
|
- "HTTP/%.1f 200 OK\r\n"
|
|
|
- "Content-Type: text/plain\r\n"
|
|
|
- "%s\r\n",
|
|
|
- req->version, (req->version > 1.0)
|
|
|
- ? "Transfer-Encoding: chunked\r\n" : ""
|
|
|
- ));
|
|
|
-
|
|
|
- ensure_out(uh_http_send(cl, req, hdr, hdrlen));
|
|
|
- }
|
|
|
+ close(wfd[0]);
|
|
|
+ close(rfd[1]);
|
|
|
+ exit(0);
|
|
|
|
|
|
- /* send final chunk if we're in chunked transfer mode */
|
|
|
- ensure_out(uh_http_send(cl, req, "", 0));
|
|
|
- break;
|
|
|
- }
|
|
|
- }
|
|
|
- }
|
|
|
+ break;
|
|
|
|
|
|
- /* timeout exceeded or interrupted by SIGCHLD */
|
|
|
- else
|
|
|
- {
|
|
|
- if ((errno != EINTR) && ! header_sent)
|
|
|
- {
|
|
|
- ensure_out(uh_http_sendhf(cl, 504, "Gateway Timeout",
|
|
|
- "The CGI script took too long to produce "
|
|
|
- "a response"));
|
|
|
- }
|
|
|
+ /* parent; handle I/O relaying */
|
|
|
+ default:
|
|
|
+ memset(state, 0, sizeof(*state));
|
|
|
+
|
|
|
+ state->cl = cl;
|
|
|
+ state->cl->proc.pid = child;
|
|
|
+
|
|
|
+ /* close unneeded pipe ends */
|
|
|
+ close(rfd[1]);
|
|
|
+ close(wfd[0]);
|
|
|
|
|
|
- /* send final chunk if we're in chunked transfer mode */
|
|
|
- ensure_out(uh_http_send(cl, req, "", 0));
|
|
|
+ D("CGI: Child(%d) created: rfd(%d) wfd(%d)\n", child, rfd[0], wfd[1]);
|
|
|
|
|
|
+ state->content_length = cl->httpbuf.len;
|
|
|
+
|
|
|
+ /* find content length */
|
|
|
+ if (req->method == UH_HTTP_MSG_POST)
|
|
|
+ {
|
|
|
+ foreach_header(i, req->headers)
|
|
|
+ {
|
|
|
+ if (!strcasecmp(req->headers[i], "Content-Length"))
|
|
|
+ {
|
|
|
+ state->content_length = atoi(req->headers[i+1]);
|
|
|
break;
|
|
|
}
|
|
|
}
|
|
|
+ }
|
|
|
|
|
|
- out:
|
|
|
- close(rfd[0]);
|
|
|
- close(wfd[1]);
|
|
|
+ state->rfd = rfd[0];
|
|
|
+ fd_nonblock(state->rfd);
|
|
|
|
|
|
- if (!kill(child, 0))
|
|
|
- {
|
|
|
- kill(child, SIGTERM);
|
|
|
- waitpid(child, NULL, 0);
|
|
|
- }
|
|
|
+ state->wfd = wfd[1];
|
|
|
+ fd_nonblock(state->wfd);
|
|
|
|
|
|
- break;
|
|
|
+ cl->cb = uh_cgi_socket_cb;
|
|
|
+ cl->priv = state;
|
|
|
+
|
|
|
+ break;
|
|
|
}
|
|
|
+
|
|
|
+ return true;
|
|
|
}
|