/* +----------------------------------------------------------------------- *\ | */ static const char pkgname[] = "darkhttpd/0.1"; /* | */ static const char copyright[] = "copyright (c) 2003 Emil Mikulic"; /* +----------------------------------------------------------------------- */ /* * $Id$ */ /* * TODO: * . Ignore SIGPIPE. * x Actually serve files. * . Generate directory entries. * x Log to file. * . Partial content. * . If-Modified-Since. * . Keep-alive connections. * . Chroot, set{uid|gid}. * . Port to Win32. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include /* for easy defusal */ #define debugf printf #ifndef min #define min(a,b) ( ((a)<(b)) ? (a) : (b) ) #endif LIST_HEAD(conn_list_head, connection) connlist = LIST_HEAD_INITIALIZER(conn_list_head); struct connection { LIST_ENTRY(connection) entries; int socket; in_addr_t client; time_t last_active; enum { RECV_REQUEST, /* receiving request */ SEND_HEADER, /* sending generated header */ SEND_REPLY, /* sending reply */ DONE /* connection closed, need to remove from queue */ } state; /* char request[request_length+1] is null-terminated */ char *request; unsigned int request_length; char *method, *uri; char *header; unsigned int header_sent, header_length; int header_dont_free, header_only, http_code; enum { REPLY_GENERATED, REPLY_FROMFILE } reply_type; char *reply; int reply_dont_free; FILE *reply_file; unsigned int reply_sent, reply_length; unsigned int total_sent; }; /* If a connection is idle for IDLETIME seconds or more, it gets closed and * removed from the connlist. */ #define IDLETIME 60 /* To prevent a malformed request from eating up too much memory, die once the * request exceeds this many bytes: */ #define MAX_REQUEST_LENGTH 4000 /* Defaults can be overridden on the command-line */ static in_addr_t bindaddr = INADDR_ANY; static u_int16_t bindport = 80; static int max_connections = -1; /* kern.ipc.somaxconn */ static const char *index_name = "index.html"; static int sockin = -1; /* socket to accept connections from */ static char *wwwroot = NULL; /* a path name */ static char *logfile_name = NULL; /* NULL = no logging */ static FILE *logfile = NULL; static int want_chroot = 0; /* --------------------------------------------------------------------------- * Initialize the sockin global. This is the socket that we accept * connections from. */ static void init_sockin(void) { struct sockaddr_in addrin; int sockopt; /* create incoming socket */ sockin = socket(PF_INET, SOCK_STREAM, 0); if (sockin == -1) err(1, "socket()"); /* reuse address */ sockopt = 1; if (setsockopt(sockin, SOL_SOCKET, SO_REUSEADDR, &sockopt, sizeof(sockopt)) == -1) err(1, "setsockopt(SO_REUSEADDR)"); /* bind socket */ addrin.sin_family = (u_char)PF_INET; addrin.sin_port = htons(bindport); addrin.sin_addr.s_addr = bindaddr; memset(&(addrin.sin_zero), 0, 8); if (bind(sockin, (struct sockaddr *)&addrin, sizeof(struct sockaddr)) == -1) err(1, "bind(port %u)", bindport); debugf("listening on %s:%u\n", inet_ntoa(addrin.sin_addr), bindport); /* listen on socket */ if (listen(sockin, max_connections) == -1) err(1, "listen()"); } /* --------------------------------------------------------------------------- * Prints a usage statement. */ static void usage(void) { printf("\n usage: darkhttpd /path/to/wwwroot [options]\n\n" "options:\n\n" "\t--port number (default: %u)\n" /* bindport */ "\t\tSpecifies which port to listen on for connections.\n" "\n" "\t--addr ip (default: all)\n" "\t\tIf multiple interfaces are present, specifies\n" "\t\twhich one to bind the listening port to.\n" "\n" "\t--maxconn number (default: system maximum)\n" "\t\tSpecifies how many concurrent connections to accept.\n" "\n" "\t--log filename (default: no logging)\n" "\t\tSpecifies which file to log requests to.\n" "\n" "\t--chroot (default: don't chroot)\n" "\t\tLocks server into wwwroot directory for added security.\n" "\n" "\t--index filename (default: %s)\n" /* index_name */ "\t\tDefault file to serve when a directory is requested.\n" "\n" /* "\t--uid blah, --gid blah\n" FIXME */ , bindport, index_name); exit(EXIT_FAILURE); } /* --------------------------------------------------------------------------- * Parses commandline options. */ static void parse_commandline(const int argc, char *argv[]) { int i; if (argc < 2) usage(); /* no wwwroot given */ wwwroot = argv[1]; /* walk through the remainder of the arguments (if any) */ for (i=2; i= argc) errx(1, "missing number after --port"); bindport = (u_int16_t)atoi(argv[i]); } else if (strcmp(argv[i], "--addr") == 0) { if (++i >= argc) errx(1, "missing ip after --addr"); bindaddr = inet_addr(argv[i]); if (bindaddr == (in_addr_t)INADDR_NONE) errx(1, "malformed --addr argument"); } else if (strcmp(argv[i], "--maxconn") == 0) { if (++i >= argc) errx(1, "missing number after --maxconn"); max_connections = atoi(argv[i]); } else if (strcmp(argv[i], "--log") == 0) { if (++i >= argc) errx(1, "missing filename after --log"); logfile_name = argv[i]; } else if (strcmp(argv[i], "--chroot") == 0) { want_chroot = 1; } else if (strcmp(argv[i], "--index") == 0) { if (++i >= argc) errx(1, "missing filename after --index"); index_name = argv[i]; } else errx(1, "unknown argument `%s'", argv[i]); } } /* --------------------------------------------------------------------------- * malloc that errx()s if it can't allocate. */ static void *xmalloc(const size_t size) { void *ptr = malloc(size); if (ptr == NULL) errx(1, "can't allocate %u bytes", size); return ptr; } /* --------------------------------------------------------------------------- * Allocate and initialize an empty connection. */ static struct connection *new_connection(void) { struct connection *conn = (struct connection *) xmalloc(sizeof(struct connection)); conn->socket = -1; conn->client = INADDR_ANY; conn->last_active = time(NULL); conn->request = NULL; conn->method = conn->uri = NULL; conn->request_length = 0; conn->header = NULL; conn->header_sent = conn->header_length = 0; conn->header_dont_free = conn->header_only = 0; conn->http_code = 0; conn->reply = NULL; conn->reply_dont_free = 0; conn->reply_file = NULL; conn->reply_sent = conn->reply_length = 0; conn->total_sent = 0; /* Make it harmless so it gets garbage-collected if it should, for some * reason, fail to be correctly filled out. */ conn->state = DONE; return conn; } /* --------------------------------------------------------------------------- * Accept a connection from sockin and add it to the connection queue. */ static void accept_connection(void) { struct sockaddr_in addrin; socklen_t sin_size; struct connection *conn; /* allocate and initialise struct connection */ conn = new_connection(); sin_size = (socklen_t)sizeof(struct sockaddr); conn->socket = accept(sockin, (struct sockaddr *)&addrin, &sin_size); if (conn->socket == -1) err(1, "accept()"); conn->state = RECV_REQUEST; conn->client = addrin.sin_addr.s_addr; LIST_INSERT_HEAD(&connlist, conn, entries); debugf("accepted connection from %s:%u\n", inet_ntoa(addrin.sin_addr), ntohs(addrin.sin_port) ); } /* --------------------------------------------------------------------------- * Cleanly deallocate the internals of a struct connection */ static void free_connection(struct connection *conn) { if (conn->socket != -1) close(conn->socket); if (conn->request != NULL) free(conn->request); if (conn->method != NULL) free(conn->method); if (conn->uri != NULL) free(conn->uri); if (conn->header != NULL && !conn->header_dont_free) free(conn->header); if (conn->reply != NULL && !conn->reply_dont_free) free(conn->reply); if (conn->reply_file != NULL) fclose(conn->reply_file); } /* --------------------------------------------------------------------------- * realloc that errx()s if it can't allocate. */ static void *xrealloc(void *original, const size_t size) { void *ptr = realloc(original, size); if (ptr == NULL) errx(1, "can't reallocate %u bytes", size); return ptr; } /* --------------------------------------------------------------------------- * Uppercasify all characters in a string of given length. */ static void strntoupper(char *str, const int length) { int i; for (i=0; ilast_active >= IDLETIME) conn->state = DONE; } /* --------------------------------------------------------------------------- * Build an RFC1123 date in the static buffer _date[] and return it. */ #define MAX_DATE_LENGTH 29 /* strlen("Fri, 28 Feb 2003 00:02:08 GMT") */ static char _date[MAX_DATE_LENGTH + 1]; static char *rfc1123_date(const time_t when) { time_t now = when; strftime(_date, MAX_DATE_LENGTH, "%a, %d %b %Y %H:%M:%S %Z", gmtime(&now) ); return _date; } /* --------------------------------------------------------------------------- * Decode URL by converting %XX (where XX are hexadecimal digits) to the * character it represents. Don't forget to free the return value. */ static char *urldecode(const char *url) { int len = strlen(url); char *out = (char*)xmalloc(len+1); int i, pos; for (i=0, pos=0; i= 'A' && (hex) <= 'F') ? ((hex)-'A'+10): \ ((hex) >= 'a' && (hex) <= 'f') ? ((hex)-'a'+10): \ ((hex)-'0') ) out[pos++] = HEX_TO_DIGIT(url[i+1]) * 16 + HEX_TO_DIGIT(url[i+2]); i += 2; #undef HEX_TO_DIGIT } else { /* straight copy */ out[pos++] = url[i]; } } out[pos] = 0; out = xrealloc(out, strlen(out)+1); /* dealloc what we don't need */ return out; } /* --------------------------------------------------------------------------- * A default reply for any (erroneous) occasion. */ static void default_reply(struct connection *conn, const int errcode, const char *errname, const char *format, ...) { char *reason; va_list va; va_start(va, format); vasprintf(&reason, format, va); va_end(va); if (reason == NULL) errx(1, "out of memory in vasprintf()"); conn->reply_length = asprintf(&(conn->reply), "%d %s\n" "

%s

\n" /* errname */ "%s\n" /* reason */ "
\n" "Generated by %s on %s\n" "\n", errcode, errname, errname, reason, pkgname, rfc1123_date(time(NULL))); free(reason); if (conn->reply == NULL) errx(1, "out of memory in asprintf()"); conn->header_length = asprintf(&(conn->header), "HTTP/1.1 %d %s\r\n" "Date: %s\r\n" "Server: %s\r\n" "Connection: close\r\n" "Content-Length: %d\r\n" "Content-Type: text/html\r\n" "\r\n", errcode, errname, rfc1123_date(time(NULL)), pkgname, conn->reply_length); if (conn->header == NULL) errx(1, "out of memory in asprintf()"); conn->reply_type = REPLY_GENERATED; conn->http_code = errcode; } /* --------------------------------------------------------------------------- * Parse an HTTP request like "GET / HTTP/1.1" to get the method (GET) and the * url (/). Remember to deallocate the method and url buffers. */ static void parse_request(struct connection *conn) { unsigned int bound1, bound2; assert(conn->request_length == strlen(conn->request)); for (bound1 = 0; bound1 < conn->request_length && conn->request[bound1] != ' '; bound1++); conn->method = (char*)xmalloc(bound1 + 1); memcpy(conn->method, conn->request, bound1); conn->method[bound1] = 0; strntoupper(conn->method, bound1); for (bound2=bound1+1; bound2 < conn->request_length && conn->request[bound2] != ' ' && conn->request[bound2] != '\r'; bound2++); conn->uri = (char*)xmalloc(bound2 - bound1); memcpy(conn->uri, conn->request + bound1 + 1, bound2 - bound1 - 1); conn->uri[bound2 - bound1 - 1] = 0; } /* --------------------------------------------------------------------------- * Process a GET/HEAD request */ static void process_get(struct connection *conn) { char *decoded_url, *target, *tmp; struct stat filestat; /* work out path of file being requested */ decoded_url = urldecode(conn->uri); /* FIXME: ensure this is a safe URL, i.e. no '../' */ if (decoded_url[strlen(decoded_url)-1] == '/') { asprintf(&target, "%s%s%s", wwwroot, decoded_url, index_name); } else { asprintf(&target, "%s%s", wwwroot, decoded_url); } free(decoded_url); debugf(">>>%s<<<\n", target); conn->reply_file = fopen(target, "rb"); free(target); if (conn->reply_file == NULL) { /* fopen() failed */ if (errno == ENOENT) default_reply(conn, 404, "Not Found", "The URI you requested (%s) was not found.", conn->uri); else default_reply(conn, 403, "Forbidden", "The URI you requested (%s) cannot be returned.
\n" "%s.", /* reason why */ conn->uri, strerror(errno)); return; } /* get information on the file */ if (fstat(fileno(conn->reply_file), &filestat) == -1) { default_reply(conn, 500, "Internal Server Error", "fstat() failed: %s.", strerror(errno)); return; } conn->reply_type = REPLY_FROMFILE; conn->reply_length = filestat.st_size; asprintf(&tmp, "HTTP/1.1 200 OK\r\n" "Date: %s\r\n" "Server: %s\r\n" "Connection: close\r\n" "Content-Length: %d\r\n" "Content-Type: text/plain\r\n" /* FIXME */ , rfc1123_date(time(NULL)), pkgname, conn->reply_length ); if (tmp == NULL) errx(1, "out of memory in asprintf()"); conn->header_length = asprintf(&(conn->header), "%s" "Last-Modified: %s\r\n" "\r\n" , tmp, rfc1123_date(filestat.st_mtime) ); free(tmp); if (conn->header == NULL) errx(1, "out of memory in asprintf()"); conn->http_code = 200; } /* --------------------------------------------------------------------------- * Process a request: build the header and reply, advance state. */ static void process_request(struct connection *conn) { parse_request(conn); debugf("method=``%s'', url=``%s''\n", conn->method, conn->uri); if (strcmp(conn->method, "GET") == 0) process_get(conn); else if (strcmp(conn->method, "HEAD") == 0) { process_get(conn); conn->header_only = 1; } else if (strcmp(conn->method, "OPTIONS") == 0 || strcmp(conn->method, "POST") == 0 || strcmp(conn->method, "PUT") == 0 || strcmp(conn->method, "DELETE") == 0 || strcmp(conn->method, "TRACE") == 0 || strcmp(conn->method, "CONNECT") == 0) default_reply(conn, 501, "Not Implemented", "The method you specified (%s) is not implemented.", conn->method); else default_reply(conn, 400, "Bad Request", "%s is not a valid HTTP/1.1 method.", conn->method); /* advance state */ conn->state = SEND_HEADER; /* request, method, url not needed anymore */ debugf("%s", conn->request); free(conn->request); conn->request = NULL; debugf("%s-=-\n", conn->header); } /* --------------------------------------------------------------------------- * Receiving request. */ static void poll_recv_request(struct connection *conn) { #define BUFSIZE 65536 char buf[BUFSIZE]; ssize_t recvd; recvd = recv(conn->socket, buf, BUFSIZE, 0); if (recvd == -1) err(1, "recv()"); if (recvd == 0) { /* socket closed on us */ conn->state = DONE; return; } conn->last_active = time(NULL); #undef BUFSIZE /* append to conn->request */ conn->request = xrealloc(conn->request, conn->request_length+recvd+1); memcpy(conn->request+conn->request_length, buf, recvd); conn->request_length += recvd; conn->request[conn->request_length] = 0; /* process request if we have all of it */ if (conn->request_length > 4 && memcmp(conn->request+conn->request_length-4, "\r\n\r\n", 4) == 0) process_request(conn); /* die if it's too long */ if (conn->request_length > MAX_REQUEST_LENGTH) { default_reply(conn, 413, "Request Entity Too Large", "Your request was dropped because it was too long."); conn->state = SEND_HEADER; } } /* --------------------------------------------------------------------------- * Sending header. Assumes conn->header is not NULL. */ static void poll_send_header(struct connection *conn) { ssize_t sent; assert(conn->header_length == strlen(conn->header)); sent = send(conn->socket, conn->header + conn->header_sent, conn->header_length - conn->header_sent, 0); if (sent == -1) err(1, "send()"); if (sent == 0) { conn->state = DONE; return; } conn->header_sent += (unsigned int)sent; conn->total_sent += (unsigned int)sent; /* check if we're done sending */ if (conn->header_sent == conn->header_length) { if (!conn->header_dont_free) free(conn->header); conn->header = NULL; if (conn->header_only) conn->state = DONE; else conn->state = SEND_REPLY; } } /* --------------------------------------------------------------------------- * Sending reply. */ static void poll_send_reply(struct connection *conn) { ssize_t sent; assert( (conn->reply_type == REPLY_GENERATED && conn->reply_length == strlen(conn->reply)) || conn->reply_type == REPLY_FROMFILE); if (conn->reply_type == REPLY_GENERATED) { sent = send(conn->socket, conn->reply + conn->reply_sent, conn->reply_length - conn->reply_sent, 0); } else { /* from file! */ #define BUFSIZE 65000 char buf[BUFSIZE]; int amount = min(BUFSIZE, conn->reply_length - conn->reply_sent); #undef BUFSIZE if (fseek(conn->reply_file, conn->reply_sent, SEEK_SET) == -1) err(1, "fseek(%d)", conn->reply_sent); if (fread(buf, amount, 1, conn->reply_file) != 1) err(1, "fread()"); sent = send(conn->socket, buf, amount, 0); } /* handle any errors in send() */ if (sent == -1) err(1, "send()"); if (sent == 0) { conn->state = DONE; return; } conn->reply_sent += (unsigned int)sent; conn->total_sent += (unsigned int)sent; /* check if we're done sending */ if (conn->reply_sent == conn->reply_length) { if (!conn->reply_dont_free && conn->reply != NULL) { free(conn->reply); conn->reply = NULL; } if (conn->reply_file != NULL) fclose(conn->reply_file); conn->state = DONE; } } /* --------------------------------------------------------------------------- * Add a connection's details to the logfile. */ static void log_connection(const struct connection *conn) { struct in_addr inaddr; assert(conn->http_code != 0); if (logfile == NULL) return; /* Separated by tabs: * time client method uri http_code bytes_sent */ /* FIXME: Referer, User-Agent */ inaddr.s_addr = conn->client; fprintf(logfile, "%lu\t%s\t%s\t%s\t%d\t%u\n", time(NULL), inet_ntoa(inaddr), conn->method, conn->uri, conn->http_code, conn->total_sent); fflush(logfile); } /* --------------------------------------------------------------------------- * Main loop of the httpd - a select() and then delegation to accept * connections, handle receiving of requests, and sending of replies. */ static void httpd_poll(void) { fd_set recv_set, send_set; int max_fd, select_ret; struct connection *conn; FD_ZERO(&recv_set); FD_ZERO(&send_set); max_fd = 0; /* set recv/send fd_sets */ #define MAX_FD_SET(sock, fdset) FD_SET(sock,fdset), \ max_fd = (max_fdstate) { case RECV_REQUEST: MAX_FD_SET(conn->socket, &recv_set); break; case SEND_HEADER: case SEND_REPLY: MAX_FD_SET(conn->socket, &send_set); break; case DONE: /* clean out stale connections while we're at it */ LIST_REMOVE(conn, entries); log_connection(conn); free_connection(conn); free(conn); break; default: errx(1, "invalid state"); } } #undef MAX_FD_SET debugf("select("), fflush(stdout); select_ret = select(max_fd + 1, &recv_set, &send_set, NULL, NULL); if (select_ret == 0) errx(1, "select() timed out"); if (select_ret == -1) err(1, "select()"); debugf(")\n"); /* poll connections that select() says need attention */ if (FD_ISSET(sockin, &recv_set)) accept_connection(); LIST_FOREACH(conn, &connlist, entries) switch (conn->state) { case RECV_REQUEST: if (FD_ISSET(conn->socket, &recv_set)) poll_recv_request(conn); break; case SEND_HEADER: if (FD_ISSET(conn->socket, &send_set)) poll_send_header(conn); break; case SEND_REPLY: if (FD_ISSET(conn->socket, &send_set)) poll_send_reply(conn); break; default: errx(1, "invalid state"); } } int main(int argc, char *argv[]) { printf("%s, %s.\n", pkgname, copyright); parse_commandline(argc, argv); init_sockin(); /* open logfile */ if (logfile_name != NULL) { logfile = fopen(logfile_name, "wb"); if (logfile == NULL) err(1, "fopen(\"%s\")", logfile_name); } for (;;) httpd_poll(); (void) close(sockin); /* unreachable =/ fix later */ return 0; } /* vim:set tabstop=4 shiftwidth=4 expandtab tw=78: */