diff --git a/be/CMakeLists.txt b/be/CMakeLists.txt index 251ed8f846c087..9597102b9a1748 100644 --- a/be/CMakeLists.txt +++ b/be/CMakeLists.txt @@ -51,7 +51,7 @@ set(OUTPUT_DIR "${BASE_DIR}/output") if (DEFINED ENV{PALO_LLVM_HOME}) set(LLVM_HOME "$ENV{PALO_LLVM_HOME}") else() - set(LLVM_HOME "${THIRDPARTY_DIR}") + set(LLVM_HOME "${THIRDPARTY_DIR}/llvm") endif() set(LLVM_BIN "${LLVM_HOME}/bin") @@ -102,7 +102,7 @@ find_package(Boost 1.55.0 REQUIRED COMPONENTS thread regex filesystem system dat include_directories(${Boost_INCLUDE_DIRS}) message(STATUS ${Boost_LIBRARIES}) -set(GPERFTOOLS_HOME "${THIRDPARTY_DIR}") +set(GPERFTOOLS_HOME "${THIRDPARTY_DIR}/gperftools") # Set all libraries add_library(gflags STATIC IMPORTED) @@ -256,7 +256,7 @@ set(CXX_COMMON_FLAGS "${CXX_COMMON_FLAGS} -std=gnu++11") set(CXX_COMMON_FLAGS "${CXX_COMMON_FLAGS} -Wno-deprecated -Wno-vla") set(CXX_COMMON_FLAGS "${CXX_COMMON_FLAGS} -DBOOST_DATE_TIME_POSIX_TIME_STD_CONFIG") set(CXX_COMMON_FLAGS "${CXX_COMMON_FLAGS} -DBOOST_SYSTEM_NO_DEPRECATED") -set(CXX_COMMON_FLAGS "${CXX_COMMON_FLAGS} -msse4.2 -D_GLIBCXX_USE_CXX11_ABI=0") +set(CXX_COMMON_FLAGS "${CXX_COMMON_FLAGS} -msse4.2") set(CXX_COMMON_FLAGS "${CXX_COMMON_FLAGS} -DLLVM_ON_UNIX") # for bprc @@ -443,7 +443,6 @@ set(PALO_LINK_LIBS Gutil Olap Runtime - RPC Service Udf Util @@ -539,7 +538,6 @@ add_subdirectory(${SRC_DIR}/exprs) add_subdirectory(${SRC_DIR}/udf) add_subdirectory(${SRC_DIR}/runtime) add_subdirectory(${SRC_DIR}/testutil) -add_subdirectory(${SRC_DIR}/rpc) # Utility CMake function to make specifying tests and benchmarks less verbose FUNCTION(ADD_BE_TEST TEST_NAME) diff --git a/be/src/agent/heartbeat_server.cpp b/be/src/agent/heartbeat_server.cpp index 3ccab0bc8b6c4e..5a862a098875c8 100644 --- a/be/src/agent/heartbeat_server.cpp +++ b/be/src/agent/heartbeat_server.cpp @@ -118,7 +118,7 @@ void HeartbeatServer::heartbeat( if (status == PALO_SUCCESS) { backend_info.__set_be_port(config::be_port); backend_info.__set_http_port(config::webserver_port); - backend_info.__set_be_rpc_port(config::be_rpc_port); + backend_info.__set_be_rpc_port(-1); backend_info.__set_brpc_port(config::brpc_port); } else { status_code = TStatusCode::RUNTIME_ERROR; diff --git a/be/src/agent/task_worker_pool.cpp b/be/src/agent/task_worker_pool.cpp index fec026a3682e88..8ec8ad850138e5 100644 --- a/be/src/agent/task_worker_pool.cpp +++ b/be/src/agent/task_worker_pool.cpp @@ -39,6 +39,7 @@ #include "common/resource_tls.h" #include "agent/cgroups_mgr.h" #include "service/backend_options.h" +#include "util/palo_metrics.h" using std::deque; using std::list; @@ -60,7 +61,7 @@ const uint32_t REPORT_DISK_STATE_WORKER_COUNT = 1; const uint32_t REPORT_OLAP_TABLE_WORKER_COUNT = 1; const uint32_t LIST_REMOTE_FILE_TIMEOUT = 15; const std::string HTTP_REQUEST_PREFIX = "/api/_tablet/_download?"; -const std::string HTTP_REQUEST_TOKEN_PARAM = "&token="; +const std::string HTTP_REQUEST_TOKEN_PARAM = "token="; const std::string HTTP_REQUEST_FILE_PARAM = "&file="; std::atomic_ulong TaskWorkerPool::_s_report_version(time(NULL) * 10000); @@ -284,12 +285,14 @@ void TaskWorkerPool::_finish_task(const TFinishTaskRequest& finish_task_request) int32_t try_time = 0; while (try_time < TASK_FINISH_MAX_RETRY) { + PaloMetrics::finish_task_requests_total.increment(1); AgentStatus client_status = _master_client->finish_task(finish_task_request, &result); if (client_status == PALO_SUCCESS) { OLAP_LOG_INFO("finish task success.result: %d", result.status.status_code); break; } else { + PaloMetrics::finish_task_requests_failed.increment(1); OLAP_LOG_WARNING("finish task failed.result: %d", result.status.status_code); try_time += 1; } @@ -818,6 +821,8 @@ void* TaskWorkerPool::_clone_worker_thread_callback(void* arg_this) { clone_req = agent_task_req.clone_req; worker_pool_this->_tasks.pop_front(); } + + PaloMetrics::clone_requests_total.increment(1); // Try to register to cgroups_mgr CgroupsMgr::apply_system_cgroup(); OLAP_LOG_INFO("get clone task. signature: %ld", agent_task_req.signature); @@ -971,6 +976,7 @@ void* TaskWorkerPool::_clone_worker_thread_callback(void* arg_this) { TStatusCode::type status_code = TStatusCode::OK; if (status != PALO_SUCCESS && status != PALO_CREATE_TABLE_EXIST) { + PaloMetrics::clone_requests_failed.increment(1); status_code = TStatusCode::RUNTIME_ERROR; OLAP_LOG_WARNING("clone failed. signature: %ld", agent_task_req.signature); @@ -1506,6 +1512,8 @@ void* TaskWorkerPool::_report_task_worker_thread_callback(void* arg_this) { OLAP_LOG_INFO("master host: %s, port: %d", worker_pool_this->_master_info.network_address.hostname.c_str(), worker_pool_this->_master_info.network_address.port); + + PaloMetrics::report_task_requests_total.increment(1); TMasterResult result; AgentStatus status = worker_pool_this->_master_client->report(request, &result); @@ -1513,6 +1521,7 @@ void* TaskWorkerPool::_report_task_worker_thread_callback(void* arg_this) { OLAP_LOG_INFO("finish report task success. return code: %d", result.status.status_code); } else { + PaloMetrics::report_task_requests_failed.increment(1); OLAP_LOG_WARNING("finish report task failed. status: %d", status); } @@ -1557,6 +1566,7 @@ void* TaskWorkerPool::_report_disk_state_worker_thread_callback(void* arg_this) } request.__set_disks(disks); + PaloMetrics::report_disk_requests_total.increment(1); TMasterResult result; AgentStatus status = worker_pool_this->_master_client->report(request, &result); @@ -1564,6 +1574,7 @@ void* TaskWorkerPool::_report_disk_state_worker_thread_callback(void* arg_this) OLAP_LOG_INFO("finish report disk state success. return code: %d", result.status.status_code); } else { + PaloMetrics::report_disk_requests_failed.increment(1); OLAP_LOG_WARNING("finish report disk state failed. status: %d", status); } @@ -1631,6 +1642,7 @@ void* TaskWorkerPool::_report_olap_table_worker_thread_callback(void* arg_this) OLAP_LOG_INFO("finish report olap table success. return code: %d", result.status.status_code); } else { + PaloMetrics::report_all_tablets_requests_failed.increment(1); OLAP_LOG_WARNING("finish report olap table failed. status: %d", status); } diff --git a/be/src/common/config.h b/be/src/common/config.h index f382c18aa17d27..71a6a4137afb53 100644 --- a/be/src/common/config.h +++ b/be/src/common/config.h @@ -29,7 +29,6 @@ namespace config { CONF_Int32(cluster_id, "-1"); // port on which ImpalaInternalService is exported CONF_Int32(be_port, "9060"); - CONF_Int32(be_rpc_port, "10060"); // port for brpc CONF_Int32(brpc_port, "8060"); @@ -197,8 +196,8 @@ namespace config { CONF_Bool(dump_ir, "false"); // if set, saves the generated IR to the output file. CONF_String(module_output, ""); - // memory_limiation_per_thread_for_schema_change unit GB - CONF_Int32(memory_limiation_per_thread_for_schema_change, "2"); + // memory_limitation_per_thread_for_schema_change unit GB + CONF_Int32(memory_limitation_per_thread_for_schema_change, "2"); CONF_Int64(max_unpacked_row_block_size, "104857600"); @@ -247,15 +246,9 @@ namespace config { // Interface to start debug webserver on. If blank, webserver binds to 0.0.0.0 CONF_String(webserver_interface, ""); CONF_String(webserver_doc_root, "${PALO_HOME}"); + CONF_Int32(webserver_num_workers, "5"); // If true, webserver may serve static files from the webserver_doc_root CONF_Bool(enable_webserver_doc_root, "true"); - // The number of times to retry connecting to an RPC server. If zero or less, - // connections will be retried until successful - CONF_Int32(rpc_retry_times, "10"); - // The interval, in ms, between retrying connections to an RPC server - CONF_Int32(rpc_retry_interval_ms, "30000"); - //reactor number - CONF_Int32(rpc_reactor_threads, "10") // Period to update rate counters and sampling counters in ms. CONF_Int32(periodic_counter_update_period_ms, "500"); diff --git a/be/src/common/status.cpp b/be/src/common/status.cpp index 9e5bf3bc9aa2fc..e7b8361bb704c3 100644 --- a/be/src/common/status.cpp +++ b/be/src/common/status.cpp @@ -44,6 +44,14 @@ Status::ErrorDetail::ErrorDetail(const TStatus& status) : DCHECK_NE(error_code, TStatusCode::OK); } +Status::ErrorDetail::ErrorDetail(const PStatus& pstatus) + : error_code((TStatusCode::type)pstatus.status_code()) { + DCHECK_NE(error_code, TStatusCode::OK); + for (auto& msg : pstatus.error_msgs()) { + error_msgs.push_back(msg); + } +} + Status::Status(const std::string& error_msg) : _error_detail(new ErrorDetail(TStatusCode::INTERNAL_ERROR, error_msg)) { LOG(INFO) << error_msg << std::endl << get_stack_trace(); @@ -76,6 +84,21 @@ Status& Status::operator=(const TStatus& status) { return *this; } +Status::Status(const PStatus& pstatus) : + _error_detail((TStatusCode::type)pstatus.status_code() == TStatusCode::OK + ? nullptr : new ErrorDetail(pstatus)) { +} + +Status& Status::operator=(const PStatus& status) { + delete _error_detail; + if (status.status_code() == (TStatusCode::type)TStatusCode::OK) { + _error_detail = nullptr; + } else { + _error_detail = new ErrorDetail(status); + } + return *this; +} + void Status::add_error_msg(TStatusCode::type code, const std::string& msg) { if (_error_detail == NULL) { _error_detail = new ErrorDetail(code, msg); @@ -136,6 +159,19 @@ void Status::to_thrift(TStatus* status) const { } } +void Status::to_protobuf(PStatus* pstatus) const { + pstatus->clear_error_msgs(); + if (_error_detail == nullptr) { + pstatus->set_status_code((int)TStatusCode::OK); + } else { + pstatus->set_status_code(_error_detail->error_code); + pstatus->mutable_error_msgs()->Reserve(_error_detail->error_msgs.size()); + for (auto& err_msg : _error_detail->error_msgs) { + pstatus->add_error_msgs(err_msg); + } + } +} + void Status::MergeStatus(const Status& status) { if (status.ok()) return; if (_error_detail == NULL) { diff --git a/be/src/common/status.h b/be/src/common/status.h index f10a8be969326d..3f16e480929039 100644 --- a/be/src/common/status.h +++ b/be/src/common/status.h @@ -27,6 +27,7 @@ #include "common/logging.h" #include "common/compiler_util.h" #include "gen_cpp/Status_types.h" // for TStatus +#include "gen_cpp/status.pb.h" // for PStatus namespace palo { @@ -107,6 +108,9 @@ class Status { // same as previous c'tor Status& operator=(const TStatus& status); + Status(const PStatus& pstatus); + Status& operator=(const PStatus& pstatus); + // assign from stringstream Status& operator=(const std::stringstream& stream); @@ -154,6 +158,7 @@ class Status { // Convert into TStatus. void to_thrift(TStatus* status) const; + void to_protobuf(PStatus* status) const; // Return all accumulated error msgs in a single string. void get_error_msg(std::string* msg) const; @@ -175,6 +180,7 @@ class Status { std::vector error_msgs; ErrorDetail(const TStatus& status); + ErrorDetail(const PStatus& status); ErrorDetail(TStatusCode::type code) : error_code(code) {} ErrorDetail(TStatusCode::type code, const std::string& msg) @@ -193,6 +199,14 @@ class Status { } \ } while (false) +#define RETURN_IF_STATUS_ERROR(status, stmt) \ + do { \ + status = (stmt); \ + if (UNLIKELY(!status.ok())) { \ + return; \ + } \ + } while (false) + #define EXIT_IF_ERROR(stmt) \ do { \ Status _status_ = (stmt); \ diff --git a/be/src/exec/broker_reader.cpp b/be/src/exec/broker_reader.cpp index f3003c11a3e922..66d58abeac8966 100644 --- a/be/src/exec/broker_reader.cpp +++ b/be/src/exec/broker_reader.cpp @@ -83,8 +83,7 @@ Status BrokerReader::open() { TBrokerOpenReaderResponse response; try { Status status; - // 500ms is enough - BrokerServiceConnection client(client_cache(_state), broker_addr, 500, &status); + BrokerServiceConnection client(client_cache(_state), broker_addr, 10000, &status); if (!status.ok()) { LOG(WARNING) << "Create broker client failed. broker=" << broker_addr << ", status=" << status.get_error_msg(); @@ -133,8 +132,7 @@ Status BrokerReader::read(uint8_t* buf, size_t* buf_len, bool* eof) { TBrokerReadResponse response; try { Status status; - // 500ms is enough - BrokerServiceConnection client(client_cache(_state), broker_addr, 500, &status); + BrokerServiceConnection client(client_cache(_state), broker_addr, 10000, &status); if (!status.ok()) { LOG(WARNING) << "Create broker client failed. broker=" << broker_addr << ", status=" << status.get_error_msg(); @@ -189,7 +187,7 @@ void BrokerReader::close() { try { Status status; // 500ms is enough - BrokerServiceConnection client(client_cache(_state), broker_addr, 500, &status); + BrokerServiceConnection client(client_cache(_state), broker_addr, 10000, &status); if (!status.ok()) { LOG(WARNING) << "Create broker client failed. broker=" << broker_addr << ", status=" << status.get_error_msg(); diff --git a/be/src/exec/broker_writer.cpp b/be/src/exec/broker_writer.cpp index 9af818aa35a673..4742269165b345 100644 --- a/be/src/exec/broker_writer.cpp +++ b/be/src/exec/broker_writer.cpp @@ -138,8 +138,8 @@ Status BrokerWriter::write(const uint8_t* buf, size_t buf_len, size_t* written_l TBrokerOperationStatus response; try { Status status; - // we make timeout to be 5s, to avoid error in Network jitter scenarios. - BrokerServiceConnection client(client_cache(_state), broker_addr, 5000, &status); + // we make timeout to be 10s, to avoid error in Network jitter scenarios. + BrokerServiceConnection client(client_cache(_state), broker_addr, 10000, &status); if (!status.ok()) { LOG(WARNING) << "Create broker write client failed. " << "broker=" << broker_addr diff --git a/be/src/exec/new_partitioned_aggregation_node.cc b/be/src/exec/new_partitioned_aggregation_node.cc index 3f65732f1cd7ca..2a57282c8b00ab 100644 --- a/be/src/exec/new_partitioned_aggregation_node.cc +++ b/be/src/exec/new_partitioned_aggregation_node.cc @@ -229,13 +229,14 @@ Status NewPartitionedAggregationNode::prepare(RuntimeState* state) { const RowDescriptor& row_desc = child(0)->row_desc(); RETURN_IF_ERROR(NewAggFnEvaluator::Create(agg_fns_, state, _pool, agg_fn_pool_.get(), &agg_fn_evals_, expr_mem_tracker(), row_desc)); - + + expr_results_pool_.reset(new MemPool(_expr_mem_tracker.get())); if (!grouping_exprs_.empty()) { RowDescriptor build_row_desc(intermediate_tuple_desc_, false); RETURN_IF_ERROR(NewPartitionedHashTableCtx::Create(_pool, state, build_exprs_, grouping_exprs_, true, vector(build_exprs_.size(), true), state->fragment_hash_seed(), MAX_PARTITION_DEPTH, 1, expr_mem_pool(), - expr_mem_tracker(), build_row_desc, row_desc, &ht_ctx_)); + expr_results_pool_.get(), expr_mem_tracker(), build_row_desc, row_desc, &ht_ctx_)); } // AddCodegenDisabledMessage(state); return Status::OK; @@ -413,6 +414,8 @@ Status NewPartitionedAggregationNode::GetNextInternal(RuntimeState* state, RETURN_IF_ERROR(exec_debug_action(TExecNodePhase::GETNEXT)); RETURN_IF_CANCELLED(state); RETURN_IF_ERROR(state->check_query_state()); + // clear tmp expr result alocations + expr_results_pool_->clear(); if (reached_limit()) { *eos = true; @@ -688,12 +691,14 @@ Status NewPartitionedAggregationNode::close(RuntimeState* state) { } ClosePartitions(); - child_batch_.reset(); // Close all the agg-fn-evaluators NewAggFnEvaluator::Close(agg_fn_evals_, state); - + + if (expr_results_pool_.get() != nullptr) { + expr_results_pool_->free_all(); + } if (agg_fn_pool_.get() != nullptr) agg_fn_pool_->free_all(); if (mem_pool_.get() != nullptr) mem_pool_->free_all(); if (ht_ctx_.get() != nullptr) ht_ctx_->Close(state); diff --git a/be/src/exec/new_partitioned_aggregation_node.h b/be/src/exec/new_partitioned_aggregation_node.h index b0c699f3eeefc2..528fb561f2b577 100644 --- a/be/src/exec/new_partitioned_aggregation_node.h +++ b/be/src/exec/new_partitioned_aggregation_node.h @@ -250,6 +250,9 @@ class NewPartitionedAggregationNode : public ExecNode { /// memory allocation over a series of Reset()/Open()/GetNext()* calls. boost::scoped_ptr mem_pool_; + // MemPool for allocations made by copying expr results + boost::scoped_ptr expr_results_pool_; + /// The current partition and iterator to the next row in its hash table that we need /// to return in GetNext() Partition* output_partition_; diff --git a/be/src/exec/new_partitioned_hash_table.cc b/be/src/exec/new_partitioned_hash_table.cc index 170507eb157e37..4fb1e4e29e5d0e 100644 --- a/be/src/exec/new_partitioned_hash_table.cc +++ b/be/src/exec/new_partitioned_hash_table.cc @@ -88,7 +88,7 @@ static int64_t NULL_VALUE[] = { NewPartitionedHashTableCtx::NewPartitionedHashTableCtx(const std::vector& build_exprs, const std::vector& probe_exprs, bool stores_nulls, const std::vector& finds_nulls, int32_t initial_seed, - int max_levels, MemPool* mem_pool) + int max_levels, MemPool* mem_pool, MemPool* expr_results_pool) : build_exprs_(build_exprs), probe_exprs_(probe_exprs), stores_nulls_(stores_nulls), @@ -97,7 +97,8 @@ NewPartitionedHashTableCtx::NewPartitionedHashTableCtx(const std::vector& finds_nulls_.begin(), finds_nulls_.end(), false, std::logical_or())), level_(0), scratch_row_(NULL), - mem_pool_(mem_pool) { + mem_pool_(mem_pool), + expr_results_pool_(expr_results_pool) { DCHECK(!finds_some_nulls_ || stores_nulls_); // Compute the layout and buffer size to store the evaluated expr results DCHECK_EQ(build_exprs_.size(), probe_exprs_.size()); @@ -152,12 +153,12 @@ Status NewPartitionedHashTableCtx::Create(ObjectPool* pool, RuntimeState* state, const std::vector& build_exprs, const std::vector& probe_exprs, bool stores_nulls, const std::vector& finds_nulls, int32_t initial_seed, int max_levels, - int num_build_tuples, MemPool* mem_pool, + int num_build_tuples, MemPool* mem_pool, MemPool* expr_results_pool, MemTracker* tracker, const RowDescriptor& row_desc, const RowDescriptor& row_desc_probe, scoped_ptr* ht_ctx) { ht_ctx->reset(new NewPartitionedHashTableCtx(build_exprs, probe_exprs, stores_nulls, - finds_nulls, initial_seed, max_levels, mem_pool)); + finds_nulls, initial_seed, max_levels, mem_pool, expr_results_pool)); return (*ht_ctx)->Init(pool, state, num_build_tuples, tracker, row_desc, row_desc_probe); } @@ -235,12 +236,15 @@ bool NewPartitionedHashTableCtx::EvalRow(TupleRow* row, const vector(&NULL_VALUE); has_null = true; + DCHECK_LE(build_exprs_[i]->type().get_slot_size(), + sizeof(NULL_VALUE)); + RawValue::write(val, loc, build_exprs_[i]->type(), NULL); } else { expr_values_null[i] = false; + DCHECK_LE(build_exprs_[i]->type().get_slot_size(), + sizeof(NULL_VALUE)); + RawValue::write(val, loc, build_exprs_[i]->type(), expr_results_pool_); } - DCHECK_LE(build_exprs_[i]->type().get_slot_size(), - sizeof(NULL_VALUE)); - RawValue::write(val, loc, build_exprs_[i]->type(), NULL); } return has_null; } diff --git a/be/src/exec/new_partitioned_hash_table.h b/be/src/exec/new_partitioned_hash_table.h index 3b868803baf86d..3bd2972d06c99c 100644 --- a/be/src/exec/new_partitioned_hash_table.h +++ b/be/src/exec/new_partitioned_hash_table.h @@ -122,7 +122,7 @@ class NewPartitionedHashTableCtx { const std::vector& build_exprs, const std::vector& probe_exprs, bool stores_nulls, const std::vector& finds_nulls, int32_t initial_seed, int max_levels, - int num_build_tuples, MemPool* mem_pool, + int num_build_tuples, MemPool* mem_pool, MemPool* expr_results_pool, MemTracker* tracker, const RowDescriptor& row_desc, const RowDescriptor& row_desc_probe, boost::scoped_ptr* ht_ctx); @@ -416,7 +416,7 @@ class NewPartitionedHashTableCtx { NewPartitionedHashTableCtx(const std::vector& build_exprs, const std::vector& probe_exprs, bool stores_nulls, const std::vector& finds_nulls, int32_t initial_seed, - int max_levels, MemPool* mem_pool); + int max_levels, MemPool* mem_pool, MemPool* expr_results_pool); /// Allocate various buffers for storing expression evaluation results, hash values, /// null bits etc. Also allocate evaluators for the build and probe expressions and @@ -522,6 +522,9 @@ class NewPartitionedHashTableCtx { /// MemPool for 'build_expr_evals_' and 'probe_expr_evals_' to allocate expr-managed /// memory from. Not owned. MemPool* mem_pool_; + + // MemPool for allocations by made EvalRow to copy expr's StringVal result. Not owned + MemPool* expr_results_pool_; }; /// The hash table consists of a contiguous array of buckets that contain a pointer to the diff --git a/be/src/http/CMakeLists.txt b/be/src/http/CMakeLists.txt index f97072b5d3b7dc..1b3dd617f01b83 100644 --- a/be/src/http/CMakeLists.txt +++ b/be/src/http/CMakeLists.txt @@ -24,19 +24,17 @@ set(LIBRARY_OUTPUT_PATH "${BUILD_DIR}/src/http") set(EXECUTABLE_OUTPUT_PATH "${BUILD_DIR}/src/http") add_library(Webserver STATIC - mongoose.cpp - webserver.cpp download_action.cpp http_headers.cpp http_method.cpp http_request.cpp - http_response.cpp http_channel.cpp http_status.cpp http_parser.cpp web_page_handler.cpp monitor_action.cpp default_path_handlers.cpp + ev_http_server.cpp action/mini_load.cpp action/health_action.cpp action/checksum_action.cpp diff --git a/be/src/http/action/checksum_action.cpp b/be/src/http/action/checksum_action.cpp index 38a4948468871c..f921f86ff73144 100644 --- a/be/src/http/action/checksum_action.cpp +++ b/be/src/http/action/checksum_action.cpp @@ -41,7 +41,7 @@ ChecksumAction::ChecksumAction(ExecEnv* exec_env) : _command_executor = new CommandExecutor(); } -void ChecksumAction::handle(HttpRequest *req, HttpChannel *channel) { +void ChecksumAction::handle(HttpRequest *req) { LOG(INFO) << "accept one request " << req->debug_string(); // add tid to cgroup in order to limit read bandwidth @@ -51,8 +51,8 @@ void ChecksumAction::handle(HttpRequest *req, HttpChannel *channel) { if (tablet_id_str.empty()) { std::string error_msg = std::string( "parameter " + TABLET_ID + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } @@ -61,8 +61,7 @@ void ChecksumAction::handle(HttpRequest *req, HttpChannel *channel) { if (version_str.empty()) { std::string error_msg = std::string( "parameter " + TABLET_VERSION + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } @@ -71,8 +70,7 @@ void ChecksumAction::handle(HttpRequest *req, HttpChannel *channel) { if (version_hash_str.empty()) { std::string error_msg = std::string( "parameter " + VERSION_HASH + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } @@ -81,8 +79,7 @@ void ChecksumAction::handle(HttpRequest *req, HttpChannel *channel) { if (schema_hash_str.empty()) { std::string error_msg = std::string( "parameter " + SCHEMA_HASH + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } @@ -98,33 +95,30 @@ void ChecksumAction::handle(HttpRequest *req, HttpChannel *channel) { schema_hash = boost::lexical_cast(schema_hash_str); } catch (boost::bad_lexical_cast& e) { std::string error_msg = std::string("param format is invalid: ") + std::string(e.what()); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } VLOG_ROW << "get checksum tablet info: " << tablet_id << "-" << version << "-" << version_hash << "-" << schema_hash; - int64_t checksum = do_checksum(tablet_id, version, version_hash, schema_hash, req, channel); + int64_t checksum = do_checksum(tablet_id, version, version_hash, schema_hash, req); if (checksum == -1L) { std::string error_msg = std::string("checksum failed"); - HttpResponse response(HttpStatus::INTERNAL_SERVER_ERROR, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::INTERNAL_SERVER_ERROR, error_msg); return; } else { std::stringstream result; result << checksum; std::string result_str = result.str(); - HttpResponse response(HttpStatus::OK, &result_str); - channel->send_response(response); + HttpChannel::send_reply(req, result_str); } LOG(INFO) << "deal with checksum request finished! tablet id: " << tablet_id; } int64_t ChecksumAction::do_checksum(int64_t tablet_id, int64_t version, int64_t version_hash, - int32_t schema_hash, HttpRequest *req, HttpChannel *channel) { + int32_t schema_hash, HttpRequest *req) { OLAPStatus res = OLAPStatus::OLAP_SUCCESS; uint32_t checksum; diff --git a/be/src/http/action/checksum_action.h b/be/src/http/action/checksum_action.h index 52793c6fc944df..ed74b418d28c03 100644 --- a/be/src/http/action/checksum_action.h +++ b/be/src/http/action/checksum_action.h @@ -31,10 +31,10 @@ class ChecksumAction : public HttpHandler { virtual ~ChecksumAction(); - virtual void handle(HttpRequest *req, HttpChannel *channel); + void handle(HttpRequest *req) override; private: int64_t do_checksum(int64_t tablet_id, int64_t version, int64_t version_hash, - int32_t schema_hash, HttpRequest *req, HttpChannel *channel); + int32_t schema_hash, HttpRequest *req); ExecEnv* _exec_env; CommandExecutor* _command_executor; diff --git a/be/src/http/action/health_action.cpp b/be/src/http/action/health_action.cpp index 7888339c502802..b7f42155758746 100644 --- a/be/src/http/action/health_action.cpp +++ b/be/src/http/action/health_action.cpp @@ -21,6 +21,7 @@ #include "http/http_channel.h" #include "http/http_request.h" #include "http/http_response.h" +#include "http/http_headers.h" #include "http/http_status.h" namespace palo { @@ -31,7 +32,7 @@ HealthAction::HealthAction(ExecEnv* exec_env) : _exec_env(exec_env) { } -void HealthAction::handle(HttpRequest *req, HttpChannel *channel) { +void HealthAction::handle(HttpRequest *req) { std::stringstream ss; ss << "{"; ss << "\"status\": \"OK\","; @@ -39,8 +40,12 @@ void HealthAction::handle(HttpRequest *req, HttpChannel *channel) { ss << "}"; std::string result = ss.str(); + req->add_output_header(HttpHeaders::CONTENT_TYPE, HEADER_JSON.c_str()); + HttpChannel::send_reply(req, HttpStatus::OK, result); +#if 0 HttpResponse response(HttpStatus::OK, HEADER_JSON, &result); channel->send_response(response); +#endif } } // end namespace palo diff --git a/be/src/http/action/health_action.h b/be/src/http/action/health_action.h index 04e133f49f17d5..bb5da2f1add8bd 100644 --- a/be/src/http/action/health_action.h +++ b/be/src/http/action/health_action.h @@ -29,7 +29,7 @@ class HealthAction : public HttpHandler { virtual ~HealthAction() {}; - virtual void handle(HttpRequest *req, HttpChannel *channel); + void handle(HttpRequest *req) override; private: ExecEnv* _exec_env; diff --git a/be/src/http/action/metrics_action.cpp b/be/src/http/action/metrics_action.cpp index 5e295baefa3f5e..cf4fcd19e1b0bd 100644 --- a/be/src/http/action/metrics_action.cpp +++ b/be/src/http/action/metrics_action.cpp @@ -21,7 +21,6 @@ #include "http/http_response.h" #include "http/http_channel.h" #include "http/http_headers.h" -#include "http/webserver.h" #include "runtime/exec_env.h" #include "util/metrics.h" @@ -84,12 +83,13 @@ void PrometheusMetricsVisitor::_visit_simple_metric( _ss << " " << metric->to_string() << "\n"; } -void MetricsAction::handle(HttpRequest* req, HttpChannel* channel) { +void MetricsAction::handle(HttpRequest* req) { PrometheusMetricsVisitor visitor; _metrics->collect(&visitor); std::string str = visitor.to_string(); - HttpResponse response(HttpStatus::OK, "text/plain; version=0.0.4", &str); - channel->send_response(response); + + req->add_output_header(HttpHeaders::CONTENT_TYPE, "text/plain; version=0.0.4"); + HttpChannel::send_reply(req, str); } } diff --git a/be/src/http/action/metrics_action.h b/be/src/http/action/metrics_action.h index 8667ec9ae0c8a5..a39a59b19dc38c 100644 --- a/be/src/http/action/metrics_action.h +++ b/be/src/http/action/metrics_action.h @@ -22,7 +22,6 @@ namespace palo { class Webserver; class ExecEnv; class HttpRequest; -class HttpChannel; class MetricRegistry; class MetricsAction : public HttpHandler { @@ -30,7 +29,7 @@ class MetricsAction : public HttpHandler { MetricsAction(MetricRegistry* metrics) :_metrics(metrics) { } virtual ~MetricsAction() { } - void handle(HttpRequest *req, HttpChannel *channel) override; + void handle(HttpRequest *req) override; private: MetricRegistry* _metrics; }; diff --git a/be/src/http/action/mini_load.cpp b/be/src/http/action/mini_load.cpp index b867812411e987..e5a16f6cba2f5c 100644 --- a/be/src/http/action/mini_load.cpp +++ b/be/src/http/action/mini_load.cpp @@ -30,6 +30,10 @@ #include +#include +#include +#include + #include "agent/cgroups_mgr.h" #include "common/status.h" #include "http/http_request.h" @@ -51,6 +55,34 @@ namespace palo { +// context used to handle mini-load in asynchronous mode +struct MiniLoadCtx { + MiniLoadCtx(MiniLoadAction* handler_) : handler(handler_) { } + ~MiniLoadCtx() { + if (need_remove_handle) { + handler->erase_handle(load_handle); + } + if (fd >= 0) { + ::close(fd); + } + } + + MiniLoadAction* handler; + + // used to check duplicate + LoadHandle load_handle; + bool need_remove_handle = false; + + // file to save + std::string file_path; + int fd = -1; + + size_t body_bytes = 0; + size_t bytes_written = 0; + + TLoadCheckRequest load_check_req; +}; + const std::string CLUSTER_KEY = "cluster"; const std::string DB_KEY = "db"; const std::string TABLE_KEY = "table"; @@ -67,32 +99,6 @@ static bool is_name_valid(const std::string& name) { return !name.empty(); } -// send response -static void send_response(const Status& status, HttpChannel *channel) { - std::stringstream ss; - ss << "{\n"; - if (status.ok()) { - ss << "\t\"status\": \"Success\",\n"; - ss << "\t\"msg\": \"OK\"\n"; - } else { - ss << "\t\"status\": \"Fail\",\n"; - ss << "\t\"msg\": \"" << status.get_error_msg() << "\"\n"; - } - ss << "}\n"; - - std::string str = ss.str(); - HttpResponse response(HttpStatus::OK, &str); - - channel->send_response(response); -} - -// send error -static void send_100_continue(HttpChannel *channel) { - static HttpResponse response(HttpStatus::CONTINUE); - - channel->send_response(response); -} - static Status check_request(HttpRequest* req) { std::map& params = *req->params(); @@ -110,115 +116,6 @@ static Status check_request(HttpRequest* req) { return Status::OK; } -// Receive 'Transfer-Encoding: chunked' data from client -// Params: -// file_handler file descriptor and operation for output file -// channel used to receive client data -static Status save_chunked_data(FileHandler* file_handler, HttpChannel *channel) { - const int64_t BUF_SIZE = 4096; - char *buf = new char[BUF_SIZE]; - DeferOp free_buf(std::bind(std::default_delete(), buf)); - HttpChunkParseCtx ctx; - const uint8_t* pos = (const uint8_t*)buf; - const uint8_t* end = pos; - int64_t total_bytes = 0; - int64_t max_bytes = config::mini_load_max_mb * 1024 * 1024; - // To get length of first read - HttpParser::ParseState state = HttpParser::http_parse_chunked(&pos, end - pos, &ctx); - while (state != HttpParser::PARSE_DONE && state != HttpParser::PARSE_ERROR) { - if (pos == end) { - int64_t need_length = std::min(BUF_SIZE, ctx.length); - int64_t read_len = channel->read(buf, need_length); - if (read_len != need_length) { - char errmsg[64]; - LOG(INFO) << "read chunked data failed, need=" << need_length - << " and read=" << read_len << " and ctx=" << ctx - << ",syserr=" << strerror_r(errno, errmsg, 64); - return Status("Failed when receiving http packet."); - } - pos = (const uint8_t*)buf; - end = pos + read_len; - total_bytes += read_len; - } - if (total_bytes > max_bytes) { - return Status("File size exceed max size we can support."); - } - state = HttpParser::http_parse_chunked(&pos, end - pos, &ctx); - switch (state) { - case HttpParser::PARSE_AGAIN: - // Do nothing - break; - case HttpParser::PARSE_OK: { - // data received - int64_t size = std::min(ctx.size, end - pos); - OLAPStatus wr_status = file_handler->write(pos, size); - if (wr_status != OLAP_SUCCESS) { - char errmsg[64]; - LOG(WARNING) << "Write to file(" - << FileUtils::path_of_fd(file_handler->fd()) << ") failed. " - << "need=" << size - << ",syserr=" << strerror_r(errno, errmsg, 64); - return Status("Failed when saving uploaded data"); - } - ctx.size -= size; - ctx.length -= size; - pos += size; - break; - } - case HttpParser::PARSE_DONE: - break; - case HttpParser::PARSE_ERROR: - break; - default: - // Impossible state, must be a bug, output all information - LOG(WARNING) << "Unknown http parse state(" << state << "), pos=" << pos - << ",end=" << end << ",ctx=" << ctx; - state = HttpParser::PARSE_ERROR; - break; - } - } - - if (state == HttpParser::PARSE_DONE) { - LOG(INFO) << "Save file to path " - << FileUtils::path_of_fd(file_handler->fd()) << " success."; - return Status::OK; - } else { - return Status("Error happend when palo parse your http packet."); - } -} - -static Status save_to_file(FileHandler* file_handler, int64_t len, HttpChannel* channel) { - const int64_t BUF_SIZE = 4096; - char *buf = new char[BUF_SIZE]; - DeferOp free_buf(std::bind(std::default_delete(), buf)); - int64_t to_read = len; - while (to_read > 0) { - int64_t to_read_this_time = std::min(to_read, BUF_SIZE); - int64_t read_this_time = channel->read(buf, to_read_this_time); - if (to_read_this_time != read_this_time) { - // what can i do?? - char errmsg[64]; - LOG(INFO) << "read chunked data failed, need=" << to_read_this_time - << " and read=" << read_this_time - << ",syserr=" << strerror_r(errno, errmsg, 64); - return Status("Failed when receiving http packet."); - } - OLAPStatus wr_status = file_handler->write(buf, read_this_time); - if (wr_status != OLAP_SUCCESS) { - char errmsg[64]; - LOG(WARNING) << "Write to file(" - << FileUtils::path_of_fd(file_handler->fd()) << ") failed. " - << "need=" << read_this_time - << ",syserr=" << strerror_r(errno, errmsg, 64); - return Status("Failed when saving uploaded data"); - } - // write will write all buf into file, so that write_len == read_this_time - to_read -= read_this_time; - } - LOG(INFO) << "Save file to path " << FileUtils::path_of_fd(file_handler->fd()) << " success."; - return Status::OK; -} - Status MiniLoadAction::data_saved_dir(const LoadHandle& desc, const std::string& table, std::string* file_path) { @@ -239,61 +136,11 @@ Status MiniLoadAction::data_saved_dir(const LoadHandle& desc, return Status::OK; } -// Receive data from client -// TODO(zc): support range in HTTP -Status MiniLoadAction::receive_data(const LoadHandle& desc, HttpRequest* req, - HttpChannel *channel, std::string* file_path) { - - // add tid to cgroup - CgroupsMgr::apply_system_cgroup(); - RETURN_IF_ERROR(data_saved_dir(desc, req->param(TABLE_KEY), file_path)); - // download - - // destructor will close the file handle, not depend on DeferOp any more - FileHandler file_handler; - OLAPStatus open_status = file_handler.open_with_mode(file_path->c_str(), - O_WRONLY | O_CREAT | O_TRUNC, - 0660); - if (open_status != OLAP_SUCCESS) { - // open failed - char buf[64]; - LOG(ERROR) << "open file failed." << *file_path << strerror_r(errno, buf, 64); - return Status("Internal Error"); - } - - // After all thing prepare thing, then send '100-continue' to client - if (strcasecmp(req->header(HttpHeaders::EXPECT).c_str(), k_100_continue) == 0) { - // send 100 continue; - send_100_continue(channel); - } - - // Check if chunk first according rfc2616 - if (!req->header(HttpHeaders::TRANSFER_ENCODING).empty()) { - if (req->header(HttpHeaders::TRANSFER_ENCODING) != "chunked") { - std::stringstream ss; - ss << "Unknown " << HttpHeaders::TRANSFER_ENCODING << ": " - << req->header(HttpHeaders::TRANSFER_ENCODING); - return Status(ss.str()); - } - return save_chunked_data(&file_handler, channel); - } else if (!req->header(HttpHeaders::CONTENT_LENGTH).empty()) { - int64_t len = std::stol(req->header(HttpHeaders::CONTENT_LENGTH)); - if (len > config::mini_load_max_mb * 1024 * 1024) { - return Status("File size exceed max size we can support."); - } - return save_to_file(&file_handler, len, channel); - } else { - std::stringstream ss; - ss << "There is no " << HttpHeaders::TRANSFER_ENCODING << " nor " - << HttpHeaders::CONTENT_LENGTH << " in request headers, you need pass me one"; - return Status(ss.str()); - } - - return Status::OK; -} - -Status MiniLoadAction::load( - HttpRequest* http_req, const std::string& file_path) { +Status MiniLoadAction::_load( + HttpRequest* http_req, + const std::string& file_path, + const std::string& user, + const std::string& cluster) { // Prepare request parameters. std::map params( http_req->query_params().begin(), http_req->query_params().end()); @@ -317,12 +164,12 @@ Status MiniLoadAction::load( TMiniLoadRequest req; req.protocolVersion = FrontendServiceVersion::V1; req.__set_db(http_req->param(DB_KEY)); - if (!_cluster.empty()) { - req.__set_cluster(_cluster); + if (!cluster.empty()) { + req.__set_cluster(cluster); } req.__set_tbl(http_req->param(TABLE_KEY)); req.__set_label(http_req->param(LABEL_KEY)); - req.__set_user(_user); + req.__set_user(user); // Belong to a multi-load transaction if (!http_req->param(SUB_LABEL_KEY).empty()) { req.__set_subLabel(http_req->param(SUB_LABEL_KEY)); @@ -384,12 +231,9 @@ static bool parse_auth(const std::string& auth, std::string* user, return true; } -Status MiniLoadAction::check_auth(HttpRequest* http_req) { - const char k_basic[] = "Basic "; - const std::string& auth = http_req->header(HttpHeaders::AUTHORIZATION); - if (auth.compare(0, sizeof(k_basic) - 1, k_basic, sizeof(k_basic) - 1) != 0) { - return Status("Not support Basic authorization."); - } +Status MiniLoadAction::check_auth( + const HttpRequest* http_req, + const TLoadCheckRequest& check_load_req) { // put here to log master information const TNetworkAddress& master_address = _exec_env->master_info()->network_address; Status status; @@ -405,32 +249,8 @@ Status MiniLoadAction::check_auth(HttpRequest* http_req) { TFeResult res; try { - TLoadCheckRequest req; - - req.protocolVersion = FrontendServiceVersion::V1; - // Skip "Basic " - std::string str = auth.substr(sizeof(k_basic) - 1); - std::string cluster; - if (!parse_auth(str, &req.user, &req.passwd, &cluster)) { - LOG(WARNING) << "parse auth string failed." << auth << " and str " << str; - return Status("Parse authorization failed."); - } - if (!cluster.empty()) { - req.__set_cluster(cluster); - } - req.db = http_req->param(DB_KEY); - if (http_req->param(SUB_LABEL_KEY).empty()) { - req.__set_label(http_req->param(LABEL_KEY)); - - struct timeval tv; - gettimeofday(&tv, NULL); - req.__set_timestamp(tv.tv_sec * 1000 + tv.tv_usec / 1000); - } - try { - client->loadCheck(res, req); - _user.assign(req.user); - _cluster.assign(cluster); + client->loadCheck(res, check_load_req); } catch (apache::thrift::transport::TTransportException& e) { LOG(WARNING) << "Retrying mini load from master(" << master_address.hostname << ":" << master_address.port @@ -441,9 +261,7 @@ Status MiniLoadAction::check_auth(HttpRequest* http_req) { << master_address.hostname << ":" << master_address.port << ")"; return status; } - client->loadCheck(res, req); - _user.assign(req.user); - _cluster.assign(cluster); + client->loadCheck(res, check_load_req); } } catch (apache::thrift::TException& e) { // failed when retry. @@ -464,61 +282,177 @@ void MiniLoadAction::erase_handle(const LoadHandle& desc) { _current_load.erase(desc); } -void MiniLoadAction::handle(HttpRequest *req, HttpChannel *channel) { - LOG(INFO) << "accept one request " << req->debug_string(); - +int MiniLoadAction::on_header(HttpRequest* req) { // check authorization first, make client know what happend if (req->header(HttpHeaders::AUTHORIZATION).empty()) { - channel->send_basic_challenge("mini_load"); - return; + HttpChannel::send_basic_challenge(req, "mini_load"); + return -1; } - Status status = check_request(req); - if (!status.ok()) { - send_response(status, channel); - return; + auto st = _on_header(req); + if (!st.ok()) { + HttpChannel::send_reply(req, HttpStatus::INTERNAL_SERVER_ERROR, st.get_error_msg()); + return -1; } - LoadHandle desc; - desc.db = req->param(DB_KEY); - desc.label = req->param(LABEL_KEY); - desc.sub_label = req->param(SUB_LABEL_KEY); + return 0; +} + +Status MiniLoadAction::_on_header(HttpRequest* req) { + size_t body_bytes = 0; + size_t max_body_bytes = config::mini_load_max_mb * 1024 * 1024; + if (!req->header(HttpHeaders::CONTENT_LENGTH).empty()) { + body_bytes = std::stol(req->header(HttpHeaders::CONTENT_LENGTH)); + if (body_bytes > max_body_bytes) { + std::stringstream ss; + ss << "file size exceed max body size, max_body_bytes=" << max_body_bytes; + return Status(ss.str()); + } + } else { + evhttp_connection_set_max_body_size( + evhttp_request_get_connection(req->get_evhttp_request()), + max_body_bytes); + } + + RETURN_IF_ERROR(check_request(req)); + + std::unique_ptr ctx(new MiniLoadCtx(this)); + ctx->body_bytes = body_bytes; + ctx->load_handle.db = req->param(DB_KEY); + ctx->load_handle.label = req->param(LABEL_KEY); + ctx->load_handle.sub_label = req->param(SUB_LABEL_KEY); // check if duplicate // Use this to prevent that two callback function write to one file // that file may be writen bad { std::lock_guard l(_lock); - if (_current_load.find(desc) != _current_load.end()) { - // Already exists. - status = Status("Duplicate mini load request."); - } else { - _current_load.insert(desc); + if (_current_load.find(ctx->load_handle) != _current_load.end()) { + return Status("Duplicate mini load request."); } + _current_load.insert(ctx->load_handle); + ctx->need_remove_handle = true; } - // Send response without lock - if (!status.ok()) { - send_response(status, channel); - return; + // generate load check request + RETURN_IF_ERROR(generate_check_load_req(req, &ctx->load_check_req)); + + // Check auth + RETURN_IF_ERROR(check_auth(req, ctx->load_check_req)); + + // Receive data first, keep things easy. + RETURN_IF_ERROR(data_saved_dir(ctx->load_handle, req->param(TABLE_KEY), + &ctx->file_path)); + // destructor will close the file handle, not depend on DeferOp any more + ctx->fd = open(ctx->file_path.c_str(), O_WRONLY | O_CREAT | O_TRUNC, 0660); + if (ctx->fd < 0) { + char buf[64]; + LOG(WARNING) << "open file failed, path=" << ctx->file_path + << ", errno=" << errno << ", errmsg=" << strerror_r(errno, buf, sizeof(buf)); + return Status("open file failed"); } - // Used to erase desc from map - DeferOp erase(std::bind(&MiniLoadAction::erase_handle, this, desc)); + req->set_handler_ctx(ctx.release()); + return Status::OK; +} - // Check auth - status = check_auth(req); - if (!status.ok()) { - send_response(status, channel); +void MiniLoadAction::on_chunk_data(HttpRequest* http_req) { + MiniLoadCtx* ctx = (MiniLoadCtx*)http_req->handler_ctx(); + if (ctx == nullptr) { return; } - // Receive data first, keep things easy. - std::string file_path; - status = receive_data(desc, req, channel, &file_path); - if (!status.ok()) { - send_response(status, channel); + struct evhttp_request* ev_req = http_req->get_evhttp_request(); + auto evbuf = evhttp_request_get_input_buffer(ev_req); + + char buf[4096]; + while (evbuffer_get_length(evbuf) > 0) { + auto n = evbuffer_remove(evbuf, buf, sizeof(buf)); + while (n > 0) { + auto res = write(ctx->fd, buf, n); + if (res < 0) { + char errbuf[64]; + LOG(WARNING) << "write file failed, path=" << ctx->file_path + << ", errno=" << errno + << ", errmsg=" << strerror_r(errno, errbuf, sizeof(errbuf)); + HttpChannel::send_reply( + http_req, HttpStatus::INTERNAL_SERVER_ERROR, "write file failed"); + delete ctx; + http_req->set_handler_ctx(nullptr); + return; + } + n -= res; + ctx->bytes_written += res; + } + } +} + +void MiniLoadAction::free_handler_ctx(void* param) { + MiniLoadCtx* ctx = (MiniLoadCtx*)param; + delete ctx; +} + +void MiniLoadAction::handle(HttpRequest *http_req) { + MiniLoadCtx* ctx = (MiniLoadCtx*)http_req->handler_ctx(); + if (ctx == nullptr) { + // when ctx is nullptr, there must be error happend when on_chunk_data + // and reply is sent, we just return with no operation + LOG(WARNING) << "handler context is nullptr when MiniLoad callback execute, uri=" + << http_req->uri(); return; } - status = load(req, file_path); - send_response(status, channel); + if (ctx->body_bytes > 0 && ctx->bytes_written != ctx->body_bytes) { + LOG(WARNING) << "bytes written is not equal with body size, uri=" + << http_req->uri() + << ", body_bytes=" << ctx->body_bytes + << ", bytes_written=" << ctx->bytes_written; + HttpChannel::send_reply(http_req, HttpStatus::INTERNAL_SERVER_ERROR, + "rececpt size not equal with body size"); + return; + } + auto st = _load( + http_req, ctx->file_path, ctx->load_check_req.user, ctx->load_check_req.cluster); + if (!st.ok()) { + HttpChannel::send_reply(http_req, HttpStatus::INTERNAL_SERVER_ERROR, st.get_error_msg()); + return; + } + + std::stringstream ss; + ss << "{\n"; + ss << "\t\"status\": \"Success\",\n"; + ss << "\t\"msg\": \"OK\"\n"; + ss << "}\n"; + std::string str = ss.str(); + HttpChannel::send_reply(http_req, str); +} + +Status MiniLoadAction::generate_check_load_req( + const HttpRequest* http_req, + TLoadCheckRequest* check_load_req) { + + const char k_basic[] = "Basic "; + const std::string& auth = http_req->header(HttpHeaders::AUTHORIZATION); + if (auth.compare(0, sizeof(k_basic) - 1, k_basic, sizeof(k_basic) - 1) != 0) { + return Status("Not support Basic authorization."); + } + + check_load_req->protocolVersion = FrontendServiceVersion::V1; + // Skip "Basic " + std::string str = auth.substr(sizeof(k_basic) - 1); + std::string cluster; + if (!parse_auth(str, &(check_load_req->user), &(check_load_req->passwd), &cluster)) { + LOG(WARNING) << "parse auth string failed." << auth << " and str " << str; + return Status("Parse authorization failed."); + } + if (!cluster.empty()) { + check_load_req->__set_cluster(cluster); + } + check_load_req->db = http_req->param(DB_KEY); + if (http_req->param(SUB_LABEL_KEY).empty()) { + check_load_req->__set_label(http_req->param(LABEL_KEY)); + + struct timeval tv; + gettimeofday(&tv, NULL); + check_load_req->__set_timestamp(tv.tv_sec * 1000 + tv.tv_usec / 1000); + } + return Status::OK; } bool LoadHandleCmp::operator() (const LoadHandle& lhs, const LoadHandle& rhs) const { diff --git a/be/src/http/action/mini_load.h b/be/src/http/action/mini_load.h index 751eb1c3f961c1..39d17bb39b7f8c 100644 --- a/be/src/http/action/mini_load.h +++ b/be/src/http/action/mini_load.h @@ -24,6 +24,7 @@ #include "common/status.h" #include "http/http_handler.h" #include "util/defer_op.h" +#include "gen_cpp/FrontendService.h" namespace palo { @@ -50,32 +51,42 @@ class MiniLoadAction : public HttpHandler { virtual ~MiniLoadAction() { } - virtual void handle(HttpRequest *req, HttpChannel *channel); + void handle(HttpRequest *req) override; + bool request_will_be_read_progressively() override { return true; } + + int on_header(HttpRequest* req) override; + + void on_chunk_data(HttpRequest* req) override; + void free_handler_ctx(void* ctx) override; + + void erase_handle(const LoadHandle& handle); private: - Status load( + Status _load( HttpRequest* req, - const std::string& file_path); + const std::string& file_path, + const std::string& user, + const std::string& cluster); Status data_saved_dir(const LoadHandle& desc, const std::string& table, std::string* file_path); - Status receive_data(const LoadHandle& desc, HttpRequest* req, - HttpChannel *channel, std::string* file_path); + Status _on_header(HttpRequest* http_req); - Status check_auth(HttpRequest* http_req); + Status generate_check_load_req( + const HttpRequest* http_req, + TLoadCheckRequest* load_check_req); - void erase_handle(const LoadHandle& handle); + Status check_auth( + const HttpRequest* http_req, + const TLoadCheckRequest& load_check_req); ExecEnv* _exec_env; std::mutex _lock; // Used to check if load is duplicated in this instance. std::set _current_load; - - std::string _user; - std::string _cluster; }; } diff --git a/be/src/http/action/pprof_actions.cpp b/be/src/http/action/pprof_actions.cpp index 5598606913ea7d..138939b8de1046 100644 --- a/be/src/http/action/pprof_actions.cpp +++ b/be/src/http/action/pprof_actions.cpp @@ -30,7 +30,7 @@ #include "http/http_response.h" #include "http/http_channel.h" #include "http/http_headers.h" -#include "http/webserver.h" +#include "http/ev_http_server.h" #include "runtime/exec_env.h" #include "util/bfd_parser.h" @@ -48,16 +48,16 @@ class HeapAction : public HttpHandler { HeapAction() { } virtual ~HeapAction() { } - virtual void handle(HttpRequest *req, HttpChannel *channel) override; + virtual void handle(HttpRequest *req) override; }; -void HeapAction::handle(HttpRequest* req, HttpChannel* channel) { +void HeapAction::handle(HttpRequest* req) { #if defined(ADDRESS_SANITIZER) || defined(LEAK_SANITIZER) || defined(THREAD_SANITIZER) (void)kPprofDefaultSampleSecs; // Avoid unused variable warning. std::string str = "Heap profiling is not available with address sanitizer builds."; - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + + HttpChannel::send_reply(req, str); #else std::lock_guard lock(kPprofActionMutex); @@ -79,8 +79,8 @@ void HeapAction::handle(HttpRequest* req, HttpChannel* channel) { HeapProfilerStop(); std::string str = profile; delete profile; - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + + HttpChannel::send_reply(req, str); #endif } @@ -89,21 +89,20 @@ class GrowthAction : public HttpHandler { GrowthAction() { } virtual ~GrowthAction() { } - virtual void handle(HttpRequest *req, HttpChannel *channel) override; + virtual void handle(HttpRequest *req) override; }; -void GrowthAction::handle(HttpRequest* req, HttpChannel* channel) { +void GrowthAction::handle(HttpRequest* req) { #if defined(ADDRESS_SANITIZER) || defined(LEAK_SANITIZER) || defined(THREAD_SANITIZER) std::string str = "Growth profiling is not available with address sanitizer builds."; - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + HttpChannel::send_reply(req, str); #else std::lock_guard lock(kPprofActionMutex); std::string heap_growth_stack; MallocExtension::instance()->GetHeapGrowthStacks(&heap_growth_stack); - HttpResponse response(HttpStatus::OK, &heap_growth_stack); - channel->send_response(response); + + HttpChannel::send_reply(req, heap_growth_stack); #endif } @@ -112,14 +111,13 @@ class ProfileAction : public HttpHandler { ProfileAction() { } virtual ~ProfileAction() { } - virtual void handle(HttpRequest *req, HttpChannel *channel) override; + virtual void handle(HttpRequest *req) override; }; -void ProfileAction::handle(HttpRequest *req, HttpChannel *channel) { +void ProfileAction::handle(HttpRequest *req) { #if defined(ADDRESS_SANITIZER) || defined(LEAK_SANITIZER) || defined(THREAD_SANITIZER) std::string str = "CPU profiling is not available with address sanitizer builds."; - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + HttpChannel::send_reply(req, str); #else std::lock_guard lock(kPprofActionMutex); @@ -141,15 +139,14 @@ void ProfileAction::handle(HttpRequest *req, HttpChannel *channel) { if (!prof_file.is_open()) { ss << "Unable to open cpu profile: " << tmp_prof_file_name.str(); std::string str = ss.str(); - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + HttpChannel::send_reply(req, str); return; } ss << prof_file.rdbuf(); prof_file.close(); std::string str = ss.str(); - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + + HttpChannel::send_reply(req, str); #endif } @@ -157,7 +154,7 @@ class PmuProfileAction : public HttpHandler { public: PmuProfileAction() { } virtual ~PmuProfileAction() { } - virtual void handle(HttpRequest *req, HttpChannel *channel) override { + virtual void handle(HttpRequest *req) override { } }; @@ -166,7 +163,7 @@ class ContentionAction : public HttpHandler { ContentionAction() { } virtual ~ContentionAction() { } - virtual void handle(HttpRequest *req, HttpChannel *channel) override { + virtual void handle(HttpRequest *req) override { } }; @@ -174,23 +171,23 @@ class CmdlineAction : public HttpHandler { public: CmdlineAction() { } virtual ~CmdlineAction() { } - virtual void handle(HttpRequest *req, HttpChannel *channel) override; + virtual void handle(HttpRequest *req) override; }; -void CmdlineAction::handle(HttpRequest* req, HttpChannel* channel) { +void CmdlineAction::handle(HttpRequest* req) { FILE* fp = fopen("/proc/self/cmdline", "r"); if (fp == nullptr) { std::string str = "Unable to open file: /proc/self/cmdline"; - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + + HttpChannel::send_reply(req, str); return; } char buf[1024]; fscanf(fp, "%s ", buf); fclose(fp); std::string str = buf; - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + + HttpChannel::send_reply(req, str); } class SymbolAction : public HttpHandler { @@ -198,81 +195,27 @@ class SymbolAction : public HttpHandler { SymbolAction(BfdParser* parser) : _parser(parser) { } virtual ~SymbolAction() { } - virtual void handle(HttpRequest *req, HttpChannel *channel) override; + virtual void handle(HttpRequest *req) override; private: BfdParser* _parser; }; -static Status save_to_string(std::string* str, int64_t len, HttpChannel* channel) { - const int64_t BUF_SIZE = 4096; - char buf[BUF_SIZE]; - int64_t to_read = len; - while (to_read > 0) { - int64_t to_read_this_time = std::min(to_read, BUF_SIZE); - int64_t read_this_time = channel->read(buf, to_read_this_time); - if (to_read_this_time != read_this_time) { - // what can i do?? - char errmsg[64]; - LOG(INFO) << "read chunked data failed, need=" << to_read_this_time - << " and read=" << read_this_time - << ",syserr=" << strerror_r(errno, errmsg, 64); - return Status("Failed when receiving http packet."); - } - str->append(buf, read_this_time); - // write will write all buf into file, so that write_len == read_this_time - to_read -= read_this_time; - } - return Status::OK; -} - -void SymbolAction::handle(HttpRequest* req, HttpChannel* channel) { +void SymbolAction::handle(HttpRequest* req) { // TODO: Implement symbol resolution. Without this, the binary needs to be passed // to pprof to resolve all symbols. if (req->method() == HttpMethod::GET) { std::stringstream ss; ss << "num_symbols: " << _parser->num_symbols(); std::string str = ss.str(); - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); + + HttpChannel::send_reply(req, str); return; } else if (req->method() == HttpMethod::HEAD) { - HttpResponse response(HttpStatus::OK); -#if 0 - response.add_header( - std::string(HttpHeaders::CONTENT_LENGTH), std::to_string(file_size)); - response.add_header( - std::string(HttpHeaders::CONTENT_TYPE), - get_content_type(file_path)); -#endif - - channel->send_response_header(response); + HttpChannel::send_reply(req); return; } else if (req->method() == HttpMethod::POST) { - // read buf - std::string request; - if (!req->header(HttpHeaders::CONTENT_LENGTH).empty()) { - Status st; - int64_t len = std::stol(req->header(HttpHeaders::CONTENT_LENGTH)); - if (len > 32 * 1024 * 1024) { - st = Status("File size exceed max size(32MB) we can support."); - } else { - st = save_to_string(&request, len, channel); - } - if (!st.ok()) { - std::string str = st.get_error_msg(); - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); - return; - } - } else { - std::stringstream ss; - ss << "There is no " << HttpHeaders::CONTENT_LENGTH << " in request headers"; - std::string str = ss.str(); - HttpResponse response(HttpStatus::OK, &str); - channel->send_response(response); - return; - } + std::string request = req->get_request_body(); // parse address std::string result; const char* ptr = request.c_str(); @@ -292,12 +235,12 @@ void SymbolAction::handle(HttpRequest* req, HttpChannel* channel) { ptr++; } } - HttpResponse response(HttpStatus::OK, &result); - channel->send_response(response); + + HttpChannel::send_reply(req, result); } } -Status PprofActions::setup(ExecEnv* exec_env, Webserver* http_server) { +Status PprofActions::setup(ExecEnv* exec_env, EvHttpServer* http_server) { http_server->register_handler(HttpMethod::GET, "/pprof/heap", new HeapAction()); http_server->register_handler(HttpMethod::GET, "/pprof/growth", diff --git a/be/src/http/action/pprof_actions.h b/be/src/http/action/pprof_actions.h index 84ebc37bee026a..33fcce2a390483 100644 --- a/be/src/http/action/pprof_actions.h +++ b/be/src/http/action/pprof_actions.h @@ -20,12 +20,12 @@ namespace palo { -class Webserver; +class EvHttpServer; class ExecEnv; class PprofActions { public: - static Status setup(ExecEnv* exec_env, Webserver* http_server); + static Status setup(ExecEnv* exec_env, EvHttpServer* http_server); }; } diff --git a/be/src/http/action/reload_tablet_action.cpp b/be/src/http/action/reload_tablet_action.cpp index 9177178347f804..54d9bb07b9ece0 100644 --- a/be/src/http/action/reload_tablet_action.cpp +++ b/be/src/http/action/reload_tablet_action.cpp @@ -38,7 +38,7 @@ ReloadTabletAction::ReloadTabletAction(ExecEnv* exec_env) : _command_executor = new CommandExecutor(); } -void ReloadTabletAction::handle(HttpRequest *req, HttpChannel *channel) { +void ReloadTabletAction::handle(HttpRequest *req) { LOG(INFO) << "accept one request " << req->debug_string(); // add tid to cgroup in order to limit read bandwidth @@ -49,8 +49,7 @@ void ReloadTabletAction::handle(HttpRequest *req, HttpChannel *channel) { if (path.empty()) { std::string error_msg = std::string( "parameter " + PATH + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } @@ -59,8 +58,7 @@ void ReloadTabletAction::handle(HttpRequest *req, HttpChannel *channel) { if (tablet_id_str.empty()) { std::string error_msg = std::string( "parameter " + TABLET_ID + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } @@ -69,8 +67,7 @@ void ReloadTabletAction::handle(HttpRequest *req, HttpChannel *channel) { if (schema_hash_str.empty()) { std::string error_msg = std::string( "parameter " + SCHEMA_HASH + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } @@ -82,20 +79,19 @@ void ReloadTabletAction::handle(HttpRequest *req, HttpChannel *channel) { schema_hash = boost::lexical_cast(schema_hash_str); } catch (boost::bad_lexical_cast& e) { std::string error_msg = std::string("param format is invalid: ") + std::string(e.what()); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); return; } VLOG_ROW << "get reload tablet request: " << tablet_id << "-" << schema_hash; - reload(path, tablet_id, schema_hash, req, channel); + reload(path, tablet_id, schema_hash, req); LOG(INFO) << "deal with reload tablet request finished! tablet id: " << tablet_id; } -void ReloadTabletAction::reload(const std::string& path, int64_t tablet_id, int32_t schema_hash, - HttpRequest *req, HttpChannel *channel) { +void ReloadTabletAction::reload( + const std::string& path, int64_t tablet_id, int32_t schema_hash, HttpRequest *req) { TCloneReq clone_req; clone_req.__set_tablet_id(tablet_id); @@ -107,15 +103,13 @@ void ReloadTabletAction::reload(const std::string& path, int64_t tablet_id, int3 LOG(WARNING) << "load header failed. status: " << res << ", signature: " << tablet_id; std::string error_msg = std::string("load header failed"); - HttpResponse response(HttpStatus::INTERNAL_SERVER_ERROR, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, HttpStatus::INTERNAL_SERVER_ERROR, error_msg); return; } else { LOG(INFO) << "load header success. status: " << res << ", signature: " << tablet_id; std::string result_msg = std::string("load header succeed"); - HttpResponse response(HttpStatus::OK, &result_msg); - channel->send_response(response); + HttpChannel::send_reply(req, result_msg); return; } } diff --git a/be/src/http/action/reload_tablet_action.h b/be/src/http/action/reload_tablet_action.h index 0ba8df2cda3a12..b5bb1f156bb647 100644 --- a/be/src/http/action/reload_tablet_action.h +++ b/be/src/http/action/reload_tablet_action.h @@ -36,10 +36,10 @@ class ReloadTabletAction : public HttpHandler { } } - virtual void handle(HttpRequest *req, HttpChannel *channel); + void handle(HttpRequest *req) override; private: void reload(const std::string& path, int64_t tablet_id, int32_t schema_hash, - HttpRequest *req, HttpChannel *channel); + HttpRequest *req); ExecEnv* _exec_env; CommandExecutor* _command_executor; diff --git a/be/src/http/action/snapshot_action.cpp b/be/src/http/action/snapshot_action.cpp index df5f330c900447..e842f7e1d26601 100644 --- a/be/src/http/action/snapshot_action.cpp +++ b/be/src/http/action/snapshot_action.cpp @@ -13,109 +13,105 @@ // specific language governing permissions and limitations // under the License. -#include "http/action/snapshot_action.h" - -#include -#include - -#include "boost/lexical_cast.hpp" - -#include "agent/cgroups_mgr.h" -#include "http/http_channel.h" -#include "http/http_headers.h" -#include "http/http_request.h" -#include "http/http_response.h" -#include "http/http_status.h" - -namespace palo { - -const std::string TABLET_ID = "tablet_id"; -const std::string SCHEMA_HASH = "schema_hash"; - -SnapshotAction::SnapshotAction(ExecEnv* exec_env) : - _exec_env(exec_env) { - _command_executor = new CommandExecutor(); -} - -void SnapshotAction::handle(HttpRequest *req, HttpChannel *channel) { - LOG(INFO) << "accept one request " << req->debug_string(); - - // add tid to cgroup in order to limit read bandwidth - CgroupsMgr::apply_system_cgroup(); - // Get tablet id - const std::string& tablet_id_str = req->param(TABLET_ID); - if (tablet_id_str.empty()) { - std::string error_msg = std::string( - "parameter " + TABLET_ID + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); - return; - } - - // Get schema hash - const std::string& schema_hash_str = req->param(SCHEMA_HASH); - if (schema_hash_str.empty()) { - std::string error_msg = std::string( - "parameter " + SCHEMA_HASH + " not specified in url."); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); - return; - } - - // valid str format - int64_t tablet_id; - int32_t schema_hash; - try { - tablet_id = boost::lexical_cast(tablet_id_str); - schema_hash = boost::lexical_cast(schema_hash_str); - } catch (boost::bad_lexical_cast& e) { - std::string error_msg = std::string("param format is invalid: ") + std::string(e.what()); - HttpResponse response(HttpStatus::BAD_REQUEST, &error_msg); - channel->send_response(response); - return; - } - - VLOG_ROW << "get make snapshot tablet info: " << tablet_id << "-" << schema_hash; - - std::string snapshot_path; - int64_t ret = make_snapshot(tablet_id, schema_hash, &snapshot_path); - if (ret != 0L) { - std::string error_msg = std::string("make snapshot failed"); - HttpResponse response(HttpStatus::INTERNAL_SERVER_ERROR, &error_msg); - channel->send_response(response); - return; - } else { - std::stringstream result; - result << snapshot_path; - std::string result_str = result.str(); - HttpResponse response(HttpStatus::OK, &result_str); - channel->send_response(response); - } - - LOG(INFO) << "deal with snapshot request finished! tablet id: " << tablet_id; -} - -int64_t SnapshotAction::make_snapshot(int64_t tablet_id, int32_t schema_hash, - std::string* snapshot_path) { - - OLAPStatus res = OLAPStatus::OLAP_SUCCESS; - res = _command_executor->make_snapshot(tablet_id, schema_hash, snapshot_path); - if (res != OLAPStatus::OLAP_SUCCESS) { - LOG(WARNING) << "make snapshot failed. status: " << res - << ", signature: " << tablet_id; - return -1L; - } else { - LOG(INFO) << "make snapshot success. status: " << res - << ", signature: " << tablet_id << ". path: " << *snapshot_path; - } - - return 0L; -} - -SnapshotAction::~SnapshotAction() { - if (_command_executor != NULL) { - delete _command_executor; - } -} - -} // end namespace palo +#include "http/action/snapshot_action.h" + +#include +#include + +#include "boost/lexical_cast.hpp" + +#include "agent/cgroups_mgr.h" +#include "http/http_channel.h" +#include "http/http_headers.h" +#include "http/http_request.h" +#include "http/http_response.h" +#include "http/http_status.h" + +namespace palo { + +const std::string TABLET_ID = "tablet_id"; +const std::string SCHEMA_HASH = "schema_hash"; + +SnapshotAction::SnapshotAction(ExecEnv* exec_env) : + _exec_env(exec_env) { + _command_executor = new CommandExecutor(); +} + +void SnapshotAction::handle(HttpRequest *req) { + LOG(INFO) << "accept one request " << req->debug_string(); + + // add tid to cgroup in order to limit read bandwidth + CgroupsMgr::apply_system_cgroup(); + // Get tablet id + const std::string& tablet_id_str = req->param(TABLET_ID); + if (tablet_id_str.empty()) { + std::string error_msg = std::string( + "parameter " + TABLET_ID + " not specified in url."); + + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); + return; + } + + // Get schema hash + const std::string& schema_hash_str = req->param(SCHEMA_HASH); + if (schema_hash_str.empty()) { + std::string error_msg = std::string( + "parameter " + SCHEMA_HASH + " not specified in url."); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); + return; + } + + // valid str format + int64_t tablet_id; + int32_t schema_hash; + try { + tablet_id = boost::lexical_cast(tablet_id_str); + schema_hash = boost::lexical_cast(schema_hash_str); + } catch (boost::bad_lexical_cast& e) { + std::string error_msg = std::string("param format is invalid: ") + std::string(e.what()); + HttpChannel::send_reply(req, HttpStatus::BAD_REQUEST, error_msg); + return; + } + + VLOG_ROW << "get make snapshot tablet info: " << tablet_id << "-" << schema_hash; + + std::string snapshot_path; + int64_t ret = make_snapshot(tablet_id, schema_hash, &snapshot_path); + if (ret != 0L) { + std::string error_msg = std::string("make snapshot failed"); + HttpChannel::send_reply(req, HttpStatus::INTERNAL_SERVER_ERROR, error_msg); + return; + } else { + std::stringstream result; + result << snapshot_path; + std::string result_str = result.str(); + HttpChannel::send_reply(req, result_str); + } + + LOG(INFO) << "deal with snapshot request finished! tablet id: " << tablet_id; +} + +int64_t SnapshotAction::make_snapshot(int64_t tablet_id, int32_t schema_hash, + std::string* snapshot_path) { + + OLAPStatus res = OLAPStatus::OLAP_SUCCESS; + res = _command_executor->make_snapshot(tablet_id, schema_hash, snapshot_path); + if (res != OLAPStatus::OLAP_SUCCESS) { + LOG(WARNING) << "make snapshot failed. status: " << res + << ", signature: " << tablet_id; + return -1L; + } else { + LOG(INFO) << "make snapshot success. status: " << res + << ", signature: " << tablet_id << ". path: " << *snapshot_path; + } + + return 0L; +} + +SnapshotAction::~SnapshotAction() { + if (_command_executor != NULL) { + delete _command_executor; + } +} + +} // end namespace palo diff --git a/be/src/http/action/snapshot_action.h b/be/src/http/action/snapshot_action.h index 3cd5c8f99c32cf..915276ff55bdb5 100644 --- a/be/src/http/action/snapshot_action.h +++ b/be/src/http/action/snapshot_action.h @@ -13,34 +13,34 @@ // specific language governing permissions and limitations // under the License. -#ifndef BDG_PALO_BE_SRC_HTTP_SNAPSHOT_ACTION_H -#define BDG_PALO_BE_SRC_HTTP_SNAPSHOT_ACTION_H - -#include - -#include "http/http_handler.h" -#include "olap/command_executor.h" - -namespace palo { - -class ExecEnv; - -// make snapshot -// be_host:be_http_port/api/snapshot?tablet_id=123&schema_hash=456 -class SnapshotAction : public HttpHandler { -public: - explicit SnapshotAction(ExecEnv* exec_env); - - virtual ~SnapshotAction(); - - virtual void handle(HttpRequest *req, HttpChannel *channel); -private: - int64_t make_snapshot(int64_t tablet_id, int schema_hash, std::string* snapshot_path); - - ExecEnv* _exec_env; - CommandExecutor* _command_executor; - -}; // end class SnapshotAction - -} // end namespace palo -#endif // BDG_PALO_BE_SRC_HTTP_SNAPSHOT_ACTION_H +#ifndef BDG_PALO_BE_SRC_HTTP_SNAPSHOT_ACTION_H +#define BDG_PALO_BE_SRC_HTTP_SNAPSHOT_ACTION_H + +#include + +#include "http/http_handler.h" +#include "olap/command_executor.h" + +namespace palo { + +class ExecEnv; + +// make snapshot +// be_host:be_http_port/api/snapshot?tablet_id=123&schema_hash=456 +class SnapshotAction : public HttpHandler { +public: + explicit SnapshotAction(ExecEnv* exec_env); + + virtual ~SnapshotAction(); + + void handle(HttpRequest *req) override; +private: + int64_t make_snapshot(int64_t tablet_id, int schema_hash, std::string* snapshot_path); + + ExecEnv* _exec_env; + CommandExecutor* _command_executor; + +}; // end class SnapshotAction + +} // end namespace palo +#endif // BDG_PALO_BE_SRC_HTTP_SNAPSHOT_ACTION_H diff --git a/be/src/http/download_action.cpp b/be/src/http/download_action.cpp index 0edbdb3bcdbb7f..41ecb589040717 100644 --- a/be/src/http/download_action.cpp +++ b/be/src/http/download_action.cpp @@ -15,6 +15,11 @@ #include "http/download_action.h" +#include +#include +#include +#include + #include #include @@ -54,7 +59,6 @@ DownloadAction::DownloadAction(ExecEnv* exec_env, const std::string& error_log_r void DownloadAction::handle_normal( HttpRequest *req, - HttpChannel *channel, const std::string& file_param) { // check token Status status; @@ -62,8 +66,7 @@ void DownloadAction::handle_normal( status = check_token(req); if (!status.ok()) { std::string error_msg = status.get_error_msg(); - HttpResponse response(HttpStatus::OK, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, error_msg); return; } } @@ -71,43 +74,39 @@ void DownloadAction::handle_normal( status = check_path_is_allowed(file_param); if (!status.ok()) { std::string error_msg = status.get_error_msg(); - HttpResponse response(HttpStatus::OK, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, error_msg); return; } if (FileUtils::is_dir(file_param)) { - do_dir_response(file_param, req, channel); + do_dir_response(file_param, req); } else { - do_file_response(file_param, req, channel); + do_file_response(file_param, req); } } void DownloadAction::handle_error_log( HttpRequest *req, - HttpChannel *channel, const std::string& file_param) { const std::string absolute_path = _error_log_root_dir + "/" + file_param; Status status = check_log_path_is_allowed(absolute_path); if (!status.ok()) { std::string error_msg = status.get_error_msg(); - HttpResponse response(HttpStatus::OK, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, error_msg); return; } if (FileUtils::is_dir(absolute_path)) { std::string error_msg = "error log can only be file."; - HttpResponse response(HttpStatus::OK, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, error_msg); return; } - do_file_response(absolute_path, req, channel); + do_file_response(absolute_path, req); } -void DownloadAction::handle(HttpRequest *req, HttpChannel *channel) { +void DownloadAction::handle(HttpRequest *req) { LOG(INFO) << "accept one download request " << req->debug_string(); // add tid to cgroup in order to limit read bandwidth @@ -118,28 +117,26 @@ void DownloadAction::handle(HttpRequest *req, HttpChannel *channel) { if (file_path.empty()) { std::string error_msg = std::string( "parameter " + FILE_PARAMETER + " not specified in url."); - HttpResponse response(HttpStatus::OK, &error_msg); - channel->send_response(response); + HttpChannel::send_reply(req, error_msg); return; } if (_download_type == ERROR_LOG) { - handle_error_log(req, channel, file_path); + handle_error_log(req, file_path); } else if (_download_type == NORMAL) { - handle_normal(req, channel, file_path); + handle_normal(req, file_path); } LOG(INFO) << "deal with download requesst finished! "; } void DownloadAction::do_dir_response( - const std::string& dir_path, HttpRequest *req, HttpChannel *channel) { + const std::string& dir_path, HttpRequest *req) { std::vector files; Status status = FileUtils::scan_dir(dir_path, &files); if (!status.ok()) { LOG(WARNING) << "Failed to scan dir. dir=" << dir_path; - HttpResponse response(HttpStatus::INTERNAL_SERVER_ERROR); - channel->send_response(response); + HttpChannel::send_error(req, HttpStatus::INTERNAL_SERVER_ERROR); } const std::string FILE_DELIMETER_IN_DIR_RESPONSE = "\n"; @@ -150,23 +147,28 @@ void DownloadAction::do_dir_response( } std::string result_str = result.str(); - HttpResponse response(HttpStatus::OK, &result_str); - channel->send_response(response); + HttpChannel::send_reply(req, result_str); return; } -void DownloadAction::do_file_response( - const std::string& file_path, HttpRequest *req, HttpChannel *channel) { +void DownloadAction::do_file_response(const std::string& file_path, HttpRequest *req) { // read file content and send response - FILE* fp = fopen(file_path.c_str(), "rb"); - if (fp == nullptr) { + int fd = open(file_path.c_str(), O_RDONLY); + if (fd < 0) { LOG(WARNING) << "Failed to open file: " << file_path; - HttpResponse response(HttpStatus::NOT_FOUND); - channel->send_response(response); + HttpChannel::send_error(req, HttpStatus::NOT_FOUND); return; } - DeferOp close_file(std::bind(&fclose, fp)); - int64_t file_size = get_file_size(fp); + struct stat st; + auto res = fstat(fd, &st); + if (res < 0) { + close(fd); + LOG(WARNING) << "Failed to open file: " << file_path; + HttpChannel::send_error(req, HttpStatus::NOT_FOUND); + return; + } + + int64_t file_size = st.st_size; // TODO(lingbin): process "IF_MODIFIED_SINCE" header // TODO(lingbin): process "RANGE" header @@ -175,58 +177,17 @@ void DownloadAction::do_file_response( // analyse range header } - HttpResponse response(HttpStatus::OK); - response.add_header( - std::string(HttpHeaders::CONTENT_LENGTH), - boost::lexical_cast(file_size)); - response.add_header( - std::string(HttpHeaders::CONTENT_TYPE), - get_content_type(file_path)); + req->add_output_header(HttpHeaders::CONTENT_TYPE, get_content_type(file_path).c_str()); if (req->method() == HttpMethod::HEAD) { - channel->send_response_header(response); + close(fd); + req->add_output_header(HttpHeaders::CONTENT_LENGTH, + boost::lexical_cast(file_size).c_str()); + HttpChannel::send_reply(req); return; } - channel->send_response_header(response); - const int BUFFER_SIZE = 4096; - char *buffer = new char[BUFFER_SIZE]; - int32_t readed_size = 0; - bool eos = false; - do { - Status status = get_file_content(fp, buffer, BUFFER_SIZE, &readed_size, &eos); - if (!status.ok()) { - LOG(ERROR) << "Something is wrong when read file: " << file_path; - break; - } - channel->append_response_content(response, buffer, readed_size); - } while (!eos); - - delete[] buffer; -} - -Status DownloadAction::get_file_content( - FILE* fp, char* buffer, int32_t buffer_size, - int32_t* readed_size, bool* eos) { - *readed_size = fread(buffer, sizeof(char), buffer_size, fp); - if (*readed_size != buffer_size) { - if (::ferror(fp)) { - return Status("something wrong when read file"); - } else if (::feof(fp)) { - *eos = true; - return Status::OK; - } - } - *eos = false; - return Status::OK; -} - -int64_t DownloadAction::get_file_size(FILE* fp) { - int64_t current_pos = ::ftell(fp); - ::fseek(fp, 0, SEEK_END); - int64_t file_size = ftell(fp); - ::fseek(fp, current_pos, SEEK_SET); - return file_size; + HttpChannel::send_file(req, fd, 0, file_size); } // If 'file_name' contains a dot but does not consist solely of one or to two dots, diff --git a/be/src/http/download_action.h b/be/src/http/download_action.h index bb8d35dc5a3d8c..528ec18a66ad66 100644 --- a/be/src/http/download_action.h +++ b/be/src/http/download_action.h @@ -39,7 +39,7 @@ class DownloadAction : public HttpHandler { virtual ~DownloadAction() {} - virtual void handle(HttpRequest *req, HttpChannel *channel); + void handle(HttpRequest *req) override; private: enum DOWNLOAD_TYPE { @@ -51,14 +51,13 @@ class DownloadAction : public HttpHandler { Status check_path_is_allowed(const std::string& path); Status check_log_path_is_allowed(const std::string& file_path); - void handle_normal(HttpRequest *req, HttpChannel *channel, const std::string& file_param); + void handle_normal(HttpRequest *req, const std::string& file_param); void handle_error_log( HttpRequest *req, - HttpChannel *channel, const std::string& file_param); - void do_file_response(const std::string& dir_path, HttpRequest *req, HttpChannel *channel); - void do_dir_response(const std::string& dir_path, HttpRequest *req, HttpChannel *channel); + void do_file_response(const std::string& dir_path, HttpRequest *req); + void do_dir_response(const std::string& dir_path, HttpRequest *req); Status get_file_content( FILE* fp, char* buffer, int32_t buffer_size, diff --git a/be/src/http/ev_http_server.cpp b/be/src/http/ev_http_server.cpp new file mode 100644 index 00000000000000..0c4bc3368fbafc --- /dev/null +++ b/be/src/http/ev_http_server.cpp @@ -0,0 +1,262 @@ +// Copyright (c) 2017, Baidu.com, Inc. All Rights Reserved + +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, +// software distributed under the License is distributed on an +// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +// KIND, either express or implied. See the License for the +// specific language governing permissions and limitations +// under the License. + +#include "http/ev_http_server.h" + +#include +#include + +#include +#include +#include +#include +#include +#include + +#include "common/logging.h" +#include "service/brpc.h" +#include "http/http_request.h" +#include "http/http_handler.h" +#include "http/http_headers.h" +#include "http/http_channel.h" +#include "util/debug_util.h" + +namespace palo { + +static void on_chunked(struct evhttp_request* ev_req, void* param) { + HttpRequest* request = (HttpRequest*)ev_req->on_free_cb_arg; + request->handler()->on_chunk_data(request); +} + +static void on_free(struct evhttp_request* ev_req, void* arg) { + HttpRequest* request = (HttpRequest*)arg; + delete request; +} + +static void on_request(struct evhttp_request *ev_req, void *arg) { + auto request = (HttpRequest*)ev_req->on_free_cb_arg; + if (request == nullptr) { + // In this case, request's on_header return -1 + return; + } + request->handler()->handle(request); +} + +static int on_header(struct evhttp_request* ev_req, void* param) { + EvHttpServer* server = (EvHttpServer*)ev_req->on_complete_cb_arg; + return server->on_header(ev_req); +} + +// param is pointer of EvHttpServer +static int on_connection(struct evhttp_request* req, void* param) { + evhttp_request_set_header_cb(req, on_header); + // only used on_complete_cb's argument + evhttp_request_set_on_complete_cb(req, nullptr, param); + return 0; +} + +EvHttpServer::EvHttpServer(int port, int num_workers) + : _host("0.0.0.0"), _port(port), _num_workers(num_workers) { + DCHECK_GT(_num_workers, 0); + auto res = pthread_rwlock_init(&_rw_lock, nullptr); + DCHECK_EQ(res, 0); +} + +EvHttpServer::EvHttpServer(const std::string& host, int port, int num_workers) + : _host(host), _port(port), _num_workers(num_workers) { + DCHECK_GT(_num_workers, 0); + auto res = pthread_rwlock_init(&_rw_lock, nullptr); + DCHECK_EQ(res, 0); +} + +EvHttpServer::~EvHttpServer() { + pthread_rwlock_destroy(&_rw_lock); +} + +Status EvHttpServer::start() { + // bind to + RETURN_IF_ERROR(_bind()); + for (int i = 0; i < _num_workers; ++i) { + auto worker = [this, i] () { + LOG(INFO) << "EvHttpSerer worker start, id=" << i; + std::shared_ptr base( + event_base_new(), [] (event_base* base) { event_base_free(base); }); + if (base == nullptr) { + LOG(WARNING) << "Couldn't create an event_base."; + return; + } + /* Create a new evhttp object to handle requests. */ + std::shared_ptr http( + evhttp_new(base.get()), [] (evhttp* http) { evhttp_free(http); }); + if (http == nullptr) { + LOG(WARNING) << "Couldn't create an evhttp."; + return; + } + auto res = evhttp_accept_socket(http.get(), _server_fd); + if (res < 0) { + LOG(WARNING) << "evhttp accept socket failed"; + return; + } + + evhttp_set_newreqcb(http.get(), on_connection, this); + evhttp_set_gencb(http.get(), on_request, this); + + event_base_dispatch(base.get()); + }; + _workers.emplace_back(worker); + } + return Status::OK; +} + +void EvHttpServer::stop() { +} + +void EvHttpServer::join() { +} + +Status EvHttpServer::_bind() { + butil::EndPoint point; + auto res = butil::hostname2endpoint(_host.c_str(), _port, &point); + if (res < 0) { + std::stringstream ss; + ss << "convert address failed, host=" << _host << ", port=" << _port; + return Status(ss.str()); + } + _server_fd = butil::tcp_listen(point, true); + if (_server_fd < 0) { + char buf[64]; + std::stringstream ss; + ss << "tcp listen failed, errno=" << errno + << ", errmsg=" << strerror_r(errno, buf, sizeof(buf)); + return Status(ss.str()); + } + res = butil::make_non_blocking(_server_fd); + if (res < 0) { + char buf[64]; + std::stringstream ss; + ss << "make socket to non_blocking failed, errno=" << errno + << ", errmsg=" << strerror_r(errno, buf, sizeof(buf)); + return Status(ss.str()); + } + return Status::OK; +} + +bool EvHttpServer::register_handler( + const HttpMethod& method, const std::string& path, HttpHandler* handler) { + if (handler == nullptr) { + LOG(WARNING) << "dummy handler for http method " << method << " with path " << path; + return false; + } + + bool result = true; + pthread_rwlock_wrlock(&_rw_lock); + PathTrie* root = nullptr; + switch (method) { + case GET: + root = &_get_handlers; + break; + case PUT: + root = &_put_handlers; + break; + case POST: + root = &_post_handlers; + break; + case DELETE: + root = &_delete_handlers; + break; + case HEAD: + root = &_head_handlers; + break; + case OPTIONS: + root = &_options_handlers; + break; + default: + LOG(WARNING) << "unknown HTTP method, method=" << method; + result = false; + } + if (result) { + result = root->insert(path, handler); + } + pthread_rwlock_unlock(&_rw_lock); + + return result; +} + +int EvHttpServer::on_header(struct evhttp_request* ev_req) { + std::unique_ptr request(new HttpRequest(ev_req)); + auto res = request->init_from_evhttp(); + if (res < 0) { + return -1; + } + auto handler = _find_handler(request.get()); + if (handler == nullptr) { + evhttp_remove_header(evhttp_request_get_input_headers(ev_req), HttpHeaders::EXPECT); + HttpChannel::send_reply(request.get(), HttpStatus::NOT_FOUND, "Not Found"); + return 0; + } + // set handler before call on_header, because handler_ctx will set in on_header + request->set_handler(handler); + res = handler->on_header(request.get()); + if (res < 0) { + // reply has already sent by handler's on_header + evhttp_remove_header(evhttp_request_get_input_headers(ev_req), HttpHeaders::EXPECT); + return 0; + } + + // If request body would be big(greater than 1GB), + // it is better that request_will_be_read_progressively is set true, + // this can make body read in chunk, not in total + if (handler->request_will_be_read_progressively()) { + evhttp_request_set_chunked_cb(ev_req, on_chunked); + } + + evhttp_request_set_on_free_cb(ev_req, on_free, request.release()); + return 0; +} + +HttpHandler* EvHttpServer::_find_handler(HttpRequest* req) { + auto& path = req->raw_path(); + + HttpHandler* handler = nullptr; + + pthread_rwlock_rdlock(&_rw_lock); + switch (req->method()) { + case GET: + _get_handlers.retrieve(path, &handler, req->params()); + break; + case PUT: + _put_handlers.retrieve(path, &handler, req->params()); + break; + case POST: + _post_handlers.retrieve(path, &handler, req->params()); + break; + case DELETE: + _delete_handlers.retrieve(path, &handler, req->params()); + break; + case HEAD: + _head_handlers.retrieve(path, &handler, req->params()); + break; + case OPTIONS: + _options_handlers.retrieve(path, &handler, req->params()); + break; + default: + LOG(WARNING) << "unknown HTTP method, method=" << req->method(); + break; + } + pthread_rwlock_unlock(&_rw_lock); + return handler; +} + +} diff --git a/be/src/http/ev_http_server.h b/be/src/http/ev_http_server.h new file mode 100644 index 00000000000000..0e7cad64fc3149 --- /dev/null +++ b/be/src/http/ev_http_server.h @@ -0,0 +1,70 @@ +// Copyright (c) 2017, Baidu.com, Inc. All Rights Reserved + +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, +// software distributed under the License is distributed on an +// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +// KIND, either express or implied. See the License for the +// specific language governing permissions and limitations +// under the License. + +#pragma once + +#include +#include +#include + +#include "common/status.h" +#include "util/path_trie.hpp" +#include "http/http_method.h" + +namespace palo { + +class HttpHandler; +class HttpRequest; + +class EvHttpServer { +public: + EvHttpServer(int port, int num_workers = 1); + EvHttpServer(const std::string& host, int port, int num_workers = 1); + ~EvHttpServer(); + + // register handler for an a path-method pair + bool register_handler( + const HttpMethod& method, const std::string& path, HttpHandler* handler); + Status start(); + void stop(); + void join(); + + // callback + int on_header(struct evhttp_request* ev_req); + +private: + Status _bind(); + HttpHandler* _find_handler(HttpRequest* req); + +private: + // input param + std::string _host; + int _port; + int _num_workers; + + int _server_fd = -1; + std::vector _workers; + + pthread_rwlock_t _rw_lock; + + PathTrie _get_handlers; + PathTrie _put_handlers; + PathTrie _post_handlers; + PathTrie _delete_handlers; + PathTrie _head_handlers; + PathTrie _options_handlers; +}; + +} diff --git a/be/src/http/http_channel.cpp b/be/src/http/http_channel.cpp index 7949dbaf64bb4f..88b7931e930657 100644 --- a/be/src/http/http_channel.cpp +++ b/be/src/http/http_channel.cpp @@ -18,110 +18,50 @@ #include #include +#include +#include + #include "http/http_request.h" #include "http/http_response.h" #include "http/http_headers.h" #include "http/http_status.h" -#include "http/mongoose.h" #include "common/logging.h" namespace palo { -HttpChannel::HttpChannel(const HttpRequest& request, mg_connection* mg_conn) : - _request(request), - _mg_conn(mg_conn) { -} - -void HttpChannel::send_response(const HttpResponse& response) { - // Send status line - mg_printf(_mg_conn, "HTTP/1.1 %s %s\r\n", - to_code(response.status()).c_str(), - defalut_reason(response.status()).c_str()); - // send all headers - for (auto& it : response.headers()) { - mg_printf(_mg_conn, "%s: ", it.first.c_str()); - for (int i = 0; i < it.second.size(); ++i) { - if (i != 0) { - mg_printf(_mg_conn, ","); - } - mg_printf(_mg_conn, "%s", it.second[i].c_str()); - } - mg_printf(_mg_conn, "\r\n"); - } - // Content type - const std::string* content = response.content(); - bool contain_content = content != nullptr && !content->empty(); - if (contain_content) { - mg_printf(_mg_conn, "%s: %s\r\n", - HttpHeaders::CONTENT_TYPE, - response.content_type().c_str()); - mg_printf(_mg_conn, "%s: %zu\r\n", - HttpHeaders::CONTENT_LENGTH, content->length()); - } - // customer headers - // End of header - mg_printf(_mg_conn, "\r\n"); - if (contain_content) { - mg_write(_mg_conn, content->c_str(), content->length()); - _send_bytes += content->length(); - } -} - // Send Unauthorized status with basic challenge -void HttpChannel::send_basic_challenge(const std::string& realm) { +void HttpChannel::send_basic_challenge(HttpRequest* req, const std::string& realm) { static std::string s_prompt_str = "Please provide your userid and password\n"; - HttpResponse response(HttpStatus::UNAUTHORIZED, &s_prompt_str); std::stringstream ss; ss << "Basic realm=\"" << realm << "\""; - response.add_header(HttpHeaders::WWW_AUTHENTICATE, ss.str()); - - send_response(response); + req->add_output_header(HttpHeaders::WWW_AUTHENTICATE, ss.str().c_str()); + send_reply(req, HttpStatus::UNAUTHORIZED, s_prompt_str); } -void HttpChannel::send_response_header(const HttpResponse& response) { - // Send status line - mg_printf(_mg_conn, "HTTP/1.1 %s %s\r\n", - to_code(response.status()).c_str(), - defalut_reason(response.status()).c_str()); - - // Headers - auto headers = response.headers(); - auto iter = headers.begin(); - for (; iter != headers.end(); ++iter) { - auto& header_values = iter->second; - auto value_iter = header_values.begin(); - for (; value_iter != header_values.end(); ++value_iter) { - mg_printf(_mg_conn, "%s: %s\r\n", - iter->first.c_str(), - value_iter->c_str()); - } - } - - // End of header - mg_printf(_mg_conn, "\r\n"); +void HttpChannel::send_error(HttpRequest* request, HttpStatus status) { + evhttp_send_error(request->get_evhttp_request(), status, defalut_reason(status).c_str()); } -void HttpChannel::send_response_content(const HttpResponse& response) { - const std::string* content = response.content(); - bool contain_content = content != nullptr && !content->empty(); - if (contain_content) { - mg_write(_mg_conn, content->c_str(), content->length()); - _send_bytes += content->length(); - } +void HttpChannel::send_reply(HttpRequest* request, HttpStatus status) { + evhttp_send_reply(request->get_evhttp_request(), status, + defalut_reason(status).c_str(), nullptr); } -void HttpChannel::append_response_content( - const HttpResponse& response, - const char* content, - int32_t content_size) { - mg_write(_mg_conn, content, content_size); - _send_bytes += content_size; +void HttpChannel::send_reply( + HttpRequest* request, HttpStatus status, const std::string& content) { + auto evb = evbuffer_new(); + evbuffer_add(evb, content.c_str(), content.size()); + evhttp_send_reply(request->get_evhttp_request(), status, defalut_reason(status).c_str(), evb); + evbuffer_free(evb); } -int HttpChannel::read(char* buf, int len) { - return mg_read(_mg_conn, buf, len); -} -void HttpChannel::update_content_length(int64_t len) { +void HttpChannel::send_file(HttpRequest* request, int fd, size_t off, size_t size) { + auto evb = evbuffer_new(); + evbuffer_add_file(evb, fd, off, size); + evhttp_send_reply(request->get_evhttp_request(), + HttpStatus::OK, + defalut_reason(HttpStatus::OK).c_str(), evb); + evbuffer_free(evb); } } diff --git a/be/src/http/http_channel.h b/be/src/http/http_channel.h index 81d083ef8c419a..ae2587ba540d0b 100644 --- a/be/src/http/http_channel.h +++ b/be/src/http/http_channel.h @@ -19,6 +19,8 @@ #include #include +#include "http/http_status.h" + struct mg_connection; namespace palo { @@ -28,36 +30,21 @@ class HttpResponse; class HttpChannel { public: - // Wrapper for mongoose - HttpChannel(const HttpRequest& request, mg_connection* mg_conn); - - void send_response(const HttpResponse& response); + // Helper maybe used everywhere + static void send_basic_challenge(HttpRequest* req, const std::string& realm); - void send_response_header(const HttpResponse& response); - void send_response_content(const HttpResponse& response); - void append_response_content( - const HttpResponse& response, - const char* content, - int32_t content_size); - void send_status_line(); + static void send_error(HttpRequest* request, HttpStatus status); - const HttpRequest& request() const { - return _request; + // send 200(OK) reply with content + static inline void send_reply(HttpRequest* request, const std::string& content) { + send_reply(request, HttpStatus::OK, content); } - void update_content_length(int64_t len); + static void send_reply(HttpRequest* request, HttpStatus status = HttpStatus::OK); - int read(char* buf, int len); - - // Helper maybe used everywhere - void send_basic_challenge(const std::string& realm); + static void send_reply(HttpRequest* request, HttpStatus status, const std::string& content); - int64_t send_bytes() const { return _send_bytes; } -private: - const HttpRequest& _request; - // save mongoose connection here - mg_connection* _mg_conn; - int64_t _send_bytes = 0; + static void send_file(HttpRequest* request, int fd, size_t off, size_t size); }; } diff --git a/be/src/http/http_handler.h b/be/src/http/http_handler.h index 967d0da505dc97..6e8bb2a75247b1 100644 --- a/be/src/http/http_handler.h +++ b/be/src/http/http_handler.h @@ -24,8 +24,19 @@ class HttpChannel; // Handler for on http request class HttpHandler { public: - virtual ~HttpHandler() {} - virtual void handle(HttpRequest *req, HttpChannel *channel) = 0; + virtual ~HttpHandler() { } + virtual void handle(HttpRequest *req) = 0; + + virtual bool request_will_be_read_progressively() { return false; } + + // This funciton will called when all headers are recept. + // return 0 if process successfully. otherwise return -1; + // If return -1, on_header function should send_reply to HTTP client + // and function wont send any reply any more. + virtual int on_header(HttpRequest* req) { return 0; } + + virtual void on_chunk_data(HttpRequest* req) { } + virtual void free_handler_ctx(void* handler_ctx) { } }; } diff --git a/be/src/http/http_method.h b/be/src/http/http_method.h index bd112438fb5ff2..7dc1a991cb73bb 100644 --- a/be/src/http/http_method.h +++ b/be/src/http/http_method.h @@ -18,6 +18,8 @@ #include +#include + namespace palo { // Http method enumerate @@ -34,6 +36,26 @@ enum HttpMethod { // Convert string to HttpMethod HttpMethod to_http_method(const char* method); +inline HttpMethod to_http_method(evhttp_cmd_type type) { + switch (type) { + case EVHTTP_REQ_GET: + return HttpMethod::GET; + case EVHTTP_REQ_POST: + return HttpMethod::POST; + case EVHTTP_REQ_HEAD: + return HttpMethod::HEAD; + case EVHTTP_REQ_PUT: + return HttpMethod::PUT; + case EVHTTP_REQ_DELETE: + return HttpMethod::DELETE; + case EVHTTP_REQ_OPTIONS: + return HttpMethod::OPTIONS; + default: + return HttpMethod::UNKNOWN; + } + return HttpMethod::UNKNOWN; +} + std::string to_method_desc(const HttpMethod& method); } diff --git a/be/src/http/http_request.cpp b/be/src/http/http_request.cpp index d319b7a94ca247..feb6c69267ad16 100644 --- a/be/src/http/http_request.cpp +++ b/be/src/http/http_request.cpp @@ -21,7 +21,12 @@ #include #include -#include "http/mongoose.h" +#include +#include +#include +#include + +#include "http/http_handler.h" #include "common/logging.h" #include "util/url_coding.h" @@ -30,66 +35,52 @@ namespace palo { static std::string s_empty = ""; -HttpRequest::HttpRequest(mg_connection* conn) : - _conn(conn) { - init(); +HttpRequest::HttpRequest(evhttp_request* evhttp_request) + : _ev_req(evhttp_request) { } -bool HttpRequest::init() { - const mg_request_info* mg_req = mg_get_request_info(_conn); - _method = to_http_method(mg_req->request_method); +HttpRequest::~HttpRequest() { + if (_handler != nullptr && _handler_ctx != nullptr) { + _handler->free_handler_ctx(_handler_ctx); + } +} - // Method +int HttpRequest::init_from_evhttp() { + _method = to_http_method(evhttp_request_get_command(_ev_req)); if (_method == HttpMethod::UNKNOWN) { - LOG(WARNING) << "Unknown method of http requeset " << mg_req; - return false; + LOG(WARNING) << "unknown method of HTTP request, method=" + << evhttp_request_get_command(_ev_req); + return -1; } - _uri = mg_req->uri; - _raw_path = mg_req->uri; - - // convert header - for (int i = 0; i < mg_req->num_headers; ++i) { - _headers.insert(std::make_pair(mg_req->http_headers[i].name, - mg_req->http_headers[i].value)); + _uri = evhttp_request_get_uri(_ev_req); + // conver header + auto headers = evhttp_request_get_input_headers(_ev_req); + for (auto header = headers->tqh_first; + header != nullptr; + header = header->next.tqe_next) { + _headers.emplace(header->key, header->value); } - - // parse parameters in query string - if (mg_req->query_string != nullptr) { - parse_params(mg_req->query_string); + // parse + auto ev_uri = evhttp_request_get_evhttp_uri(_ev_req); + _raw_path = evhttp_uri_get_path(ev_uri); + auto query = evhttp_uri_get_query(ev_uri); + if (query == nullptr || *query == '\0') { + return 0; } - - return true; -} - -void HttpRequest::parse_params(const char* query) { - std::vector arg_pairs; - // TODO(zc): remove boost - boost::split(arg_pairs, query, boost::is_any_of("&")); - - BOOST_FOREACH(const std::string & arg_pair, arg_pairs) { - std::vector key_value; - boost::split(key_value, arg_pair, boost::is_any_of("=")); - - if (key_value.empty()) { - continue; - } - - std::string key; - - if (!url_decode(key_value[0], &key)) { - continue; - } - - std::string value; - - if (!url_decode((key_value.size() >= 2 ? key_value[1] : ""), &value)) { - continue; - } - - boost::algorithm::to_lower(key); - _query_params[key] = value; + struct evkeyvalq params; + auto res = evhttp_parse_query_str(query, ¶ms); + if (res < 0) { + LOG(WARNING) << "parse query str failed, query=" << query; + return res; + } + for (auto param = params.tqh_first; + param != nullptr; + param = param->next.tqe_next) { + _query_params.emplace(param->key, param->value); } _params.insert(_query_params.begin(), _query_params.end()); + evhttp_clear_headers(¶ms); + return 0; } std::string HttpRequest::debug_string() const { @@ -126,4 +117,25 @@ const std::string& HttpRequest::param(const std::string& key) const { return iter->second; } +void HttpRequest::add_output_header(const char* key, const char* value) { +#ifndef BE_TEST + evhttp_add_header(evhttp_request_get_output_headers(_ev_req), key, value); +#endif +} + +std::string HttpRequest::get_request_body() { + if (!_request_body.empty()) { + return _request_body; + } + // read buf + auto evbuf = evhttp_request_get_input_buffer(_ev_req); + if (evbuf == nullptr) { + return _request_body; + } + auto length = evbuffer_get_length(evbuf); + _request_body.resize(length); + evbuffer_remove(evbuf, (char*)_request_body.data(), length); + return _request_body; +} + } diff --git a/be/src/http/http_request.h b/be/src/http/http_request.h index e412482988cf17..6832bd1caf444f 100644 --- a/be/src/http/http_request.h +++ b/be/src/http/http_request.h @@ -22,16 +22,19 @@ #include "http/http_method.h" struct mg_connection; +struct evhttp_request; namespace palo { +class HttpHandler; + class HttpRequest { public: - // Now we only construct http request from mongoose - HttpRequest(mg_connection* conn); + HttpRequest(evhttp_request* ev_req); - ~HttpRequest() { - } + ~HttpRequest(); + + int init_from_evhttp(); HttpMethod method() const { return _method; @@ -65,14 +68,21 @@ class HttpRequest { return _query_params; } + std::string get_request_body(); + + void add_output_header(const char* key, const char* value); + std::string debug_string() const; -private: - // construct from mg_connection - bool init(); + void set_handler(HttpHandler* handler) { _handler = handler; } + HttpHandler* handler() const { return _handler; } + + struct evhttp_request* get_evhttp_request() const { return _ev_req; } - void parse_params(const char* query); + void* handler_ctx() const { return _handler_ctx; } + void set_handler_ctx(void* ctx) { _handler_ctx = ctx; } +private: HttpMethod _method; std::string _uri; std::string _raw_path; @@ -80,8 +90,11 @@ class HttpRequest { std::map _params; std::map _query_params; - // save mongoose connection here - mg_connection* _conn; + struct evhttp_request* _ev_req = nullptr; + HttpHandler* _handler = nullptr; + + void* _handler_ctx = nullptr; + std::string _request_body; }; } diff --git a/be/src/http/mongoose.cpp b/be/src/http/mongoose.cpp deleted file mode 100644 index f6e0c2aaef618e..00000000000000 --- a/be/src/http/mongoose.cpp +++ /dev/null @@ -1,4873 +0,0 @@ -// Copyright (c) 2004-2013 Sergey Lyubka -// Copyright (c) 2013-2018 Cesanta Software Limited -// All rights reserved - -// This software is dual-licensed: you can redistribute it and/or modify -// it under the terms of the GNU General Public License version 2 as -// published by the Free Software Foundation. For the terms of this -// license, see . - -// You are free to use this software under the terms of the GNU General -// Public License, but WITHOUT ANY WARRANTY; without even the implied -// warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. -// See the GNU General Public License for more details. - -// Alternatively, you can license this software under a commercial -// license, as set out in . - -#if defined(_WIN32) -#define _CRT_SECURE_NO_WARNINGS // Disable deprecation warning in VS2005 -#else -#ifdef __linux__ -#define _XOPEN_SOURCE 600 // For flockfile() on Linux -#endif -#define _LARGEFILE_SOURCE // Enable 64-bit file offsets -#ifndef __STDC_FORMAT_MACROS -#define __STDC_FORMAT_MACROS // wants this for C++ -#endif -#define __STDC_LIMIT_MACROS // C++ wants that for INT64_MAX -#endif - -#ifdef WIN32_LEAN_AND_MEAN -#undef WIN32_LEAN_AND_MEAN // Disable WIN32_LEAN_AND_MEAN, if necessary -#endif - -#if defined(__SYMBIAN32__) -#define NO_SSL // SSL is not supported -#define NO_CGI // CGI is not supported -#define PATH_MAX FILENAME_MAX -#endif // __SYMBIAN32__ - -#include - -#ifndef _WIN32_WCE // Some ANSI #includes are not available on Windows CE -#include -#include -#include -#include -#include -#endif // !_WIN32_WCE - -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include - -#if defined(_WIN32) && !defined(__SYMBIAN32__) // Windows specific -#define _WIN32_WINNT 0x0400 // To make it link in VS2005 -#include -#include -#include - -#ifndef PATH_MAX -#define PATH_MAX MAX_PATH -#endif - -#ifndef _WIN32_WCE -#include -#include -#include -#else // _WIN32_WCE -#define NO_CGI // WinCE has no pipes - -typedef long off_t; - -#define errno GetLastError() -#define strerror(x) _ultoa(x, (char *) _alloca(sizeof(x) *3 ), 10) -#endif // _WIN32_WCE - -#define MAKEUQUAD(lo, hi) ((uint64_t)(((uint32_t)(lo)) | \ - ((uint64_t)((uint32_t)(hi))) << 32)) -#define RATE_DIFF 10000000 // 100 nsecs -#define EPOCH_DIFF MAKEUQUAD(0xd53e8000, 0x019db1de) -#define SYS2UNIX_TIME(lo, hi) \ - (time_t) ((MAKEUQUAD((lo), (hi)) - EPOCH_DIFF) / RATE_DIFF) - -// Visual Studio 6 does not know __func__ or __FUNCTION__ -// The rest of MS compilers use __FUNCTION__, not C99 __func__ -// Also use _strtoui64 on modern M$ compilers -#if defined(_MSC_VER) && _MSC_VER < 1300 -#define STRX(x) #x -#define STR(x) STRX(x) -#define __func__ "line " STR(__LINE__) -#define strtoull(x, y, z) strtoul(x, y, z) -#define strtoll(x, y, z) strtol(x, y, z) -#else -#define __func__ __FUNCTION__ -#define strtoull(x, y, z) _strtoui64(x, y, z) -#define strtoll(x, y, z) _strtoi64(x, y, z) -#endif // _MSC_VER - -#define ERRNO GetLastError() -#define NO_SOCKLEN_T -#define SSL_LIB "ssleay32.dll" -#define CRYPTO_LIB "libeay32.dll" -#define O_NONBLOCK 0 -#if !defined(EWOULDBLOCK) -#define EWOULDBLOCK WSAEWOULDBLOCK -#endif // !EWOULDBLOCK -#define _POSIX_ -#define INT64_FMT "I64d" - -#define WINCDECL __cdecl -#define SHUT_WR 1 -#define snprintf _snprintf -#define vsnprintf _vsnprintf -#define mg_sleep(x) Sleep(x) - -#define pipe(x) _pipe(x, MG_BUF_LEN, _O_BINARY) -#define popen(x, y) _popen(x, y) -#define pclose(x) _pclose(x) -#define close(x) _close(x) -#define dlsym(x,y) GetProcAddress((HINSTANCE) (x), (y)) -#define RTLD_LAZY 0 -#define fseeko(x, y, z) _lseeki64(_fileno(x), (y), (z)) -#define fdopen(x, y) _fdopen((x), (y)) -#define write(x, y, z) _write((x), (y), (unsigned) z) -#define read(x, y, z) _read((x), (y), (unsigned) z) -#define flockfile(x) EnterCriticalSection(&global_log_file_lock) -#define funlockfile(x) LeaveCriticalSection(&global_log_file_lock) -#define sleep(x) Sleep((x) * 1000) - -#if !defined(fileno) -#define fileno(x) _fileno(x) -#endif // !fileno MINGW #defines fileno - -typedef HANDLE pthread_mutex_t; -typedef struct {HANDLE signal, broadcast;} pthread_cond_t; -typedef DWORD pthread_t; -#define pid_t HANDLE // MINGW typedefs pid_t to int. Using #define here. - -static int pthread_mutex_lock(pthread_mutex_t *); -static int pthread_mutex_unlock(pthread_mutex_t *); -static FILE *mg_fopen(const char *path, const char *mode); - -#if defined(HAVE_STDINT) -#include -#else -typedef unsigned int uint32_t; -typedef unsigned short uint16_t; -typedef unsigned __int64 uint64_t; -typedef __int64 int64_t; -#define INT64_MAX 9223372036854775807 -#endif // HAVE_STDINT - -// POSIX dirent interface -struct dirent { - char d_name[PATH_MAX]; -}; - -typedef struct DIR { - HANDLE handle; - WIN32_FIND_DATAW info; - struct dirent result; -} DIR; - -// Mark required libraries -#pragma comment(lib, "Ws2_32.lib") - -#else // UNIX specific -#include -#include -#include -#include -#include -#include -#include -#include -#include - -#include -#include -#include -#if !defined(NO_SSL_DL) && !defined(NO_SSL) -#include -#endif -#include -#if defined(__MACH__) -#define SSL_LIB "libssl.dylib" -#define CRYPTO_LIB "libcrypto.dylib" -#else -#if !defined(SSL_LIB) -#define SSL_LIB "libssl.so" -#endif -#if !defined(CRYPTO_LIB) -#define CRYPTO_LIB "libcrypto.so" -#endif -#endif -#ifndef O_BINARY -#define O_BINARY 0 -#endif // O_BINARY -#define closesocket(a) close(a) -#define mg_fopen(x, y) fopen(x, y) -#define mg_mkdir(x, y) mkdir(x, y) -#define mg_remove(x) remove(x) -#define mg_rename(x, y) rename(x, y) -#define mg_sleep(x) usleep((x) * 1000) -#define ERRNO errno -#define INVALID_SOCKET (-1) -#define INT64_FMT PRId64 -typedef int SOCKET; -#define WINCDECL - -#endif // End of Windows and UNIX specific includes - -#include "mongoose.h" - -#define MONGOOSE_VERSION "3.3" -#define PASSWORDS_FILE_NAME ".htpasswd" -#define CGI_ENVIRONMENT_SIZE 4096 -#define MAX_CGI_ENVIR_VARS 64 -#define MG_BUF_LEN 8192 -#define MAX_REQUEST_SIZE 16384 -#define ARRAY_SIZE(array) (sizeof(array) / sizeof(array[0])) - -#ifdef _WIN32 -static CRITICAL_SECTION global_log_file_lock; -static pthread_t pthread_self(void) { - return GetCurrentThreadId(); -} -#endif // _WIN32 - -#ifdef DEBUG_TRACE -#undef DEBUG_TRACE -#define DEBUG_TRACE(x) -#else -#if defined(DEBUG) -#define DEBUG_TRACE(x) do { \ - flockfile(stdout); \ - printf("*** %lu.%p.%s.%d: ", \ - (unsigned long) time(NULL), (void *) pthread_self(), \ - __func__, __LINE__); \ - printf x; \ - putchar('\n'); \ - fflush(stdout); \ - funlockfile(stdout); \ -} while (0) -#else -#define DEBUG_TRACE(x) -#endif // DEBUG -#endif // DEBUG_TRACE - -// Darwin prior to 7.0 and Win32 do not have socklen_t -#ifdef NO_SOCKLEN_T -typedef int socklen_t; -#endif // NO_SOCKLEN_T -#define _DARWIN_UNLIMITED_SELECT - -#if !defined(MSG_NOSIGNAL) -#define MSG_NOSIGNAL 0 -#endif - -#if !defined(SOMAXCONN) -#define SOMAXCONN 100 -#endif - -#if !defined(PATH_MAX) -#define PATH_MAX 4096 -#endif - -static const char *http_500_error = "Internal Server Error"; - -// Snatched from OpenSSL includes. I put the prototypes here to be independent -// from the OpenSSL source installation. Having this, mongoose + SSL can be -// built on any system with binary SSL libraries installed. -typedef struct ssl_st SSL; -typedef struct ssl_method_st SSL_METHOD; -typedef struct ssl_ctx_st SSL_CTX; - -#define SSL_ERROR_WANT_READ 2 -#define SSL_ERROR_WANT_WRITE 3 -#define SSL_FILETYPE_PEM 1 -#define CRYPTO_LOCK 1 - -#if defined(NO_SSL_DL) -extern void SSL_free(SSL *); -extern int SSL_accept(SSL *); -extern int SSL_connect(SSL *); -extern int SSL_read(SSL *, void *, int); -extern int SSL_write(SSL *, const void *, int); -extern int SSL_get_error(const SSL *, int); -extern int SSL_set_fd(SSL *, int); -extern SSL *SSL_new(SSL_CTX *); -extern SSL_CTX *SSL_CTX_new(SSL_METHOD *); -extern SSL_METHOD *SSLv23_server_method(void); -extern SSL_METHOD *SSLv23_client_method(void); -extern int SSL_library_init(void); -extern void SSL_load_error_strings(void); -extern int SSL_CTX_use_PrivateKey_file(SSL_CTX *, const char *, int); -extern int SSL_CTX_use_certificate_file(SSL_CTX *, const char *, int); -extern int SSL_CTX_use_certificate_chain_file(SSL_CTX *, const char *); -extern void SSL_CTX_set_default_passwd_cb(SSL_CTX *, mg_callback_t); -extern void SSL_CTX_free(SSL_CTX *); -extern unsigned long ERR_get_error(void); -extern char *ERR_error_string(unsigned long, char *); -extern int CRYPTO_num_locks(void); -extern void CRYPTO_set_locking_callback(void (*)(int, int, const char *, int)); -extern void CRYPTO_set_id_callback(unsigned long (*)(void)); -#else -// Dynamically loaded SSL functionality -struct ssl_func { - const char *name; // SSL function name - void (*ptr)(void); // Function pointer -}; - -#define SSL_free (* (void (*)(SSL *)) ssl_sw[0].ptr) -#define SSL_accept (* (int (*)(SSL *)) ssl_sw[1].ptr) -#define SSL_connect (* (int (*)(SSL *)) ssl_sw[2].ptr) -#define SSL_read (* (int (*)(SSL *, void *, int)) ssl_sw[3].ptr) -#define SSL_write (* (int (*)(SSL *, const void *,int)) ssl_sw[4].ptr) -#define SSL_get_error (* (int (*)(SSL *, int)) ssl_sw[5].ptr) -#define SSL_set_fd (* (int (*)(SSL *, SOCKET)) ssl_sw[6].ptr) -#define SSL_new (* (SSL * (*)(SSL_CTX *)) ssl_sw[7].ptr) -#define SSL_CTX_new (* (SSL_CTX * (*)(SSL_METHOD *)) ssl_sw[8].ptr) -#define SSLv23_server_method (* (SSL_METHOD * (*)(void)) ssl_sw[9].ptr) -#define SSL_library_init (* (int (*)(void)) ssl_sw[10].ptr) -#define SSL_CTX_use_PrivateKey_file (* (int (*)(SSL_CTX *, \ - const char *, int)) ssl_sw[11].ptr) -#define SSL_CTX_use_certificate_file (* (int (*)(SSL_CTX *, \ - const char *, int)) ssl_sw[12].ptr) -#define SSL_CTX_set_default_passwd_cb \ - (* (void (*)(SSL_CTX *, mg_callback_t)) ssl_sw[13].ptr) -#define SSL_CTX_free (* (void (*)(SSL_CTX *)) ssl_sw[14].ptr) -#define SSL_load_error_strings (* (void (*)(void)) ssl_sw[15].ptr) -#define SSL_CTX_use_certificate_chain_file \ - (* (int (*)(SSL_CTX *, const char *)) ssl_sw[16].ptr) -#define SSLv23_client_method (* (SSL_METHOD * (*)(void)) ssl_sw[17].ptr) - -#define CRYPTO_num_locks (* (int (*)(void)) crypto_sw[0].ptr) -#define CRYPTO_set_locking_callback \ - (* (void (*)(void (*)(int, int, const char *, int))) crypto_sw[1].ptr) -#define CRYPTO_set_id_callback \ - (* (void (*)(unsigned long (*)(void))) crypto_sw[2].ptr) -#define ERR_get_error (* (unsigned long (*)(void)) crypto_sw[3].ptr) -#define ERR_error_string (* (char * (*)(unsigned long,char *)) crypto_sw[4].ptr) - -// set_ssl_option() function updates this array. -// It loads SSL library dynamically and changes NULLs to the actual addresses -// of respective functions. The macros above (like SSL_connect()) are really -// just calling these functions indirectly via the pointer. -static struct ssl_func ssl_sw[] = { - {"SSL_free", NULL}, - {"SSL_accept", NULL}, - {"SSL_connect", NULL}, - {"SSL_read", NULL}, - {"SSL_write", NULL}, - {"SSL_get_error", NULL}, - {"SSL_set_fd", NULL}, - {"SSL_new", NULL}, - {"SSL_CTX_new", NULL}, - {"SSLv23_server_method", NULL}, - {"SSL_library_init", NULL}, - {"SSL_CTX_use_PrivateKey_file", NULL}, - {"SSL_CTX_use_certificate_file",NULL}, - {"SSL_CTX_set_default_passwd_cb",NULL}, - {"SSL_CTX_free", NULL}, - {"SSL_load_error_strings", NULL}, - {"SSL_CTX_use_certificate_chain_file", NULL}, - {"SSLv23_client_method", NULL}, - {NULL, NULL} -}; - -// Similar array as ssl_sw. These functions could be located in different lib. -#if !defined(NO_SSL) -static struct ssl_func crypto_sw[] = { - {"CRYPTO_num_locks", NULL}, - {"CRYPTO_set_locking_callback", NULL}, - {"CRYPTO_set_id_callback", NULL}, - {"ERR_get_error", NULL}, - {"ERR_error_string", NULL}, - {NULL, NULL} -}; -#endif // NO_SSL -#endif // NO_SSL_DL - -static const char *month_names[] = { - "Jan", "Feb", "Mar", "Apr", "May", "Jun", - "Jul", "Aug", "Sep", "Oct", "Nov", "Dec" -}; - -// Unified socket address. For IPv6 support, add IPv6 address structure -// in the union u. -union usa { - struct sockaddr sa; - struct sockaddr_in sin; -#if defined(USE_IPV6) - struct sockaddr_in6 sin6; -#endif -}; - -// Describes a string (chunk of memory). -struct vec { - const char *ptr; - size_t len; -}; - -// Structure used by mg_stat() function. Uses 64 bit file length. -struct mgstat { - int is_directory; // Directory marker - int64_t size; // File size - time_t mtime; // Modification time -}; - -// Describes listening socket, or socket which was accept()-ed by the master -// thread and queued for future handling by the worker thread. -struct socket { - struct socket *next; // Linkage - SOCKET sock; // Listening socket - union usa lsa; // Local socket address - union usa rsa; // Remote socket address - int is_ssl; // Is socket SSL-ed -}; - -// NOTE(lsm): this enum shoulds be in sync with the config_options below. -enum { - CGI_EXTENSIONS, CGI_ENVIRONMENT, PUT_DELETE_PASSWORDS_FILE, CGI_INTERPRETER, - PROTECT_URI, AUTHENTICATION_DOMAIN, SSI_EXTENSIONS, THROTTLE, - ACCESS_LOG_FILE, ENABLE_DIRECTORY_LISTING, ERROR_LOG_FILE, - GLOBAL_PASSWORDS_FILE, INDEX_FILES, ENABLE_KEEP_ALIVE, ACCESS_CONTROL_LIST, - EXTRA_MIME_TYPES, LISTENING_PORTS, DOCUMENT_ROOT, SSL_CERTIFICATE, - NUM_THREADS, RUN_AS_USER, REWRITE, HIDE_FILES, - NUM_OPTIONS -}; - -static const char *config_options[] = { - "C", "cgi_pattern", "**.cgi$|**.pl$|**.php$", - "E", "cgi_environment", NULL, - "G", "put_delete_passwords_file", NULL, - "I", "cgi_interpreter", NULL, - "P", "protect_uri", NULL, - "R", "authentication_domain", "mydomain.com", - "S", "ssi_pattern", "**.shtml$|**.shtm$", - "T", "throttle", NULL, - "a", "access_log_file", NULL, - "d", "enable_directory_listing", "yes", - "e", "error_log_file", NULL, - "g", "global_passwords_file", NULL, - "i", "index_files", "index.html,index.htm,index.cgi,index.shtml,index.php", - "k", "enable_keep_alive", "no", - "l", "access_control_list", NULL, - "m", "extra_mime_types", NULL, - "p", "listening_ports", "8080", - "r", "document_root", ".", - "s", "ssl_certificate", NULL, - "t", "num_threads", "20", - "u", "run_as_user", NULL, - "w", "url_rewrite_patterns", NULL, - "x", "hide_files_patterns", NULL, - NULL -}; -#define ENTRIES_PER_CONFIG_OPTION 3 - -struct mg_context { - volatile int stop_flag; // Should we stop event loop - SSL_CTX *ssl_ctx; // SSL context - SSL_CTX *client_ssl_ctx; // Client SSL context - char *config[NUM_OPTIONS]; // Mongoose configuration parameters - mg_callback_t user_callback; // User-defined callback function - void *user_data; // User-defined data - - struct socket *listening_sockets; - - volatile int num_threads; // Number of threads - pthread_mutex_t mutex; // Protects (max|num)_threads - pthread_cond_t cond; // Condvar for tracking workers terminations - - struct socket queue[20]; // Accepted sockets - volatile int sq_head; // Head of the socket queue - volatile int sq_tail; // Tail of the socket queue - pthread_cond_t sq_full; // Signaled when socket is produced - pthread_cond_t sq_empty; // Signaled when socket is consumed -}; - -struct mg_connection { - struct mg_request_info request_info; - struct mg_context *ctx; - SSL *ssl; // SSL descriptor - struct socket client; // Connected client - time_t birth_time; // Time when request was received - int64_t num_bytes_sent; // Total bytes sent to client - int64_t content_len; // Content-Length header value - int64_t consumed_content; // How many bytes of content have been read - char *buf; // Buffer for received data - char *path_info; // PATH_INFO part of the URL - char *log_message; // Placeholder for the mongoose error log message - int must_close; // 1 if connection must be closed - int buf_size; // Buffer size - int request_len; // Size of the request + headers in a buffer - int data_len; // Total size of data in a buffer - int status_code; // HTTP reply status code, e.g. 200 - int throttle; // Throttling, bytes/sec. <= 0 means no throttle - time_t last_throttle_time; // Last time throttled data was sent - int64_t last_throttle_bytes;// Bytes sent this second - - int ep_fd; // fd for epoll -}; - -const char **mg_get_valid_option_names(void) { - return config_options; -} - -static void *call_user(struct mg_connection *conn, enum mg_event event) { - return conn == NULL || conn->ctx == NULL || conn->ctx->user_callback == NULL ? - NULL : conn->ctx->user_callback(event, conn); -} - -void *mg_get_user_data(struct mg_connection *conn) { - return conn != NULL && conn->ctx != NULL ? conn->ctx->user_data : NULL; -} - -const char *mg_get_log_message(const struct mg_connection *conn) { - return conn == NULL ? NULL : conn->log_message; -} - -int mg_get_reply_status_code(const struct mg_connection *conn) { - return conn == NULL ? -1 : conn->status_code; -} - -void *mg_get_ssl_context(const struct mg_connection *conn) { - return conn == NULL || conn->ctx == NULL ? NULL : conn->ctx->ssl_ctx; -} - -static int get_option_index(const char *name) { - int i; - - for (i = 0; config_options[i] != NULL; i += ENTRIES_PER_CONFIG_OPTION) { - if (strcmp(config_options[i], name) == 0 || - strcmp(config_options[i + 1], name) == 0) { - return i / ENTRIES_PER_CONFIG_OPTION; - } - } - return -1; -} - -const char *mg_get_option(const struct mg_context *ctx, const char *name) { - int i; - if ((i = get_option_index(name)) == -1) { - return NULL; - } else if (ctx->config[i] == NULL) { - return ""; - } else { - return ctx->config[i]; - } -} - -static void sockaddr_to_string(char *buf, size_t len, - const union usa *usa) { - buf[0] = '\0'; -#if defined(USE_IPV6) - inet_ntop(usa->sa.sa_family, usa->sa.sa_family == AF_INET ? - (void *) &usa->sin.sin_addr : - (void *) &usa->sin6.sin6_addr, buf, len); -#elif defined(_WIN32) - // Only Windoze Vista (and newer) have inet_ntop() - strncpy(buf, inet_ntoa(usa->sin.sin_addr), len); -#else - inet_ntop(usa->sa.sa_family, (void *) &usa->sin.sin_addr, buf, len); -#endif -} - -static void cry(struct mg_connection *conn, - PRINTF_FORMAT_STRING(const char *fmt), ...) PRINTF_ARGS(2, 3); - -// Print error message to the opened error log stream. -static void cry(struct mg_connection *conn, const char *fmt, ...) { - char buf[MG_BUF_LEN], src_addr[20]; - va_list ap; - FILE *fp; - time_t timestamp; - - va_start(ap, fmt); - (void) vsnprintf(buf, sizeof(buf), fmt, ap); - va_end(ap); - - // Do not lock when getting the callback value, here and below. - // I suppose this is fine, since function cannot disappear in the - // same way string option can. - conn->log_message = buf; - if (call_user(conn, MG_EVENT_LOG) == NULL) { - fp = conn->ctx == NULL || conn->ctx->config[ERROR_LOG_FILE] == NULL ? NULL : - mg_fopen(conn->ctx->config[ERROR_LOG_FILE], "a+"); - - if (fp != NULL) { - flockfile(fp); - timestamp = time(NULL); - - sockaddr_to_string(src_addr, sizeof(src_addr), &conn->client.rsa); - fprintf(fp, "[%010lu] [error] [client %s] ", (unsigned long) timestamp, - src_addr); - - if (conn->request_info.request_method != NULL) { - fprintf(fp, "%s %s: ", conn->request_info.request_method, - conn->request_info.uri); - } - - (void) fprintf(fp, "%s", buf); - fputc('\n', fp); - funlockfile(fp); - if (fp != stderr) { - fclose(fp); - } - } - } - conn->log_message = NULL; -} - -// Return fake connection structure. Used for logging, if connection -// is not applicable at the moment of logging. -static struct mg_connection *fc(struct mg_context *ctx) { - static struct mg_connection fake_connection; - fake_connection.ctx = ctx; - return &fake_connection; -} - -const char *mg_version(void) { - return MONGOOSE_VERSION; -} - -const struct mg_request_info * -mg_get_request_info(const struct mg_connection *conn) { - return &conn->request_info; -} - -static void mg_strlcpy(register char *dst, register const char *src, size_t n) { - for (; *src != '\0' && n > 1; n--) { - *dst++ = *src++; - } - *dst = '\0'; -} - -static int lowercase(const char *s) { - return tolower(* (const unsigned char *) s); -} - -static int mg_strncasecmp(const char *s1, const char *s2, size_t len) { - int diff = 0; - - if (len > 0) - do { - diff = lowercase(s1++) - lowercase(s2++); - } while (diff == 0 && s1[-1] != '\0' && --len > 0); - - return diff; -} - -static int mg_strcasecmp(const char *s1, const char *s2) { - int diff; - - do { - diff = lowercase(s1++) - lowercase(s2++); - } while (diff == 0 && s1[-1] != '\0'); - - return diff; -} - -static char * mg_strndup(const char *ptr, size_t len) { - char *p; - - if ((p = (char *) malloc(len + 1)) != NULL) { - mg_strlcpy(p, ptr, len + 1); - } - - return p; -} - -static char * mg_strdup(const char *str) { - return mg_strndup(str, strlen(str)); -} - -// Like snprintf(), but never returns negative value, or a value -// that is larger than a supplied buffer. -// Thanks to Adam Zeldis to pointing snprintf()-caused vulnerability -// in his audit report. -static int mg_vsnprintf(struct mg_connection *conn, char *buf, size_t buflen, - const char *fmt, va_list ap) { - int n; - - if (buflen == 0) - return 0; - - n = vsnprintf(buf, buflen, fmt, ap); - - if (n < 0) { - cry(conn, "vsnprintf error"); - n = 0; - } else if (n >= (int) buflen) { - cry(conn, "truncating vsnprintf buffer: [%.*s]", - n > 200 ? 200 : n, buf); - n = (int) buflen - 1; - } - buf[n] = '\0'; - - return n; -} - -static int mg_snprintf(struct mg_connection *conn, char *buf, size_t buflen, - PRINTF_FORMAT_STRING(const char *fmt), ...) - PRINTF_ARGS(4, 5); - -static int mg_snprintf(struct mg_connection *conn, char *buf, size_t buflen, - const char *fmt, ...) { - va_list ap; - int n; - - va_start(ap, fmt); - n = mg_vsnprintf(conn, buf, buflen, fmt, ap); - va_end(ap); - - return n; -} - -// Skip the characters until one of the delimiters characters found. -// 0-terminate resulting word. Skip the delimiter and following whitespaces if any. -// Advance pointer to buffer to the next word. Return found 0-terminated word. -// Delimiters can be quoted with quotechar. -static char *skip_quoted(char **buf, const char *delimiters, - const char *whitespace, char quotechar) { - char *p, *begin_word, *end_word, *end_whitespace; - - begin_word = *buf; - end_word = begin_word + strcspn(begin_word, delimiters); - - // Check for quotechar - if (end_word > begin_word) { - p = end_word - 1; - while (*p == quotechar) { - // If there is anything beyond end_word, copy it - if (*end_word == '\0') { - *p = '\0'; - break; - } else { - size_t end_off = strcspn(end_word + 1, delimiters); - memmove (p, end_word, end_off + 1); - p += end_off; // p must correspond to end_word - 1 - end_word += end_off + 1; - } - } - for (p++; p < end_word; p++) { - *p = '\0'; - } - } - - if (*end_word == '\0') { - *buf = end_word; - } else { - end_whitespace = end_word + 1 + strspn(end_word + 1, whitespace); - - for (p = end_word; p < end_whitespace; p++) { - *p = '\0'; - } - - *buf = end_whitespace; - } - - return begin_word; -} - -// Simplified version of skip_quoted without quote char -// and whitespace == delimiters -static char *skip(char **buf, const char *delimiters) { - return skip_quoted(buf, delimiters, delimiters, 0); -} - - -// Return HTTP header value, or NULL if not found. -static const char *get_header(const struct mg_request_info *ri, - const char *name) { - int i; - - for (i = 0; i < ri->num_headers; i++) - if (!mg_strcasecmp(name, ri->http_headers[i].name)) - return ri->http_headers[i].value; - - return NULL; -} - -const char *mg_get_header(const struct mg_connection *conn, const char *name) { - return get_header(&conn->request_info, name); -} - -// A helper function for traversing a comma separated list of values. -// It returns a list pointer shifted to the next value, or NULL if the end -// of the list found. -// Value is stored in val vector. If value has form "x=y", then eq_val -// vector is initialized to point to the "y" part, and val vector length -// is adjusted to point only to "x". -static const char *next_option(const char *list, struct vec *val, - struct vec *eq_val) { - if (list == NULL || *list == '\0') { - // End of the list - list = NULL; - } else { - val->ptr = list; - if ((list = strchr(val->ptr, ',')) != NULL) { - // Comma found. Store length and shift the list ptr - val->len = list - val->ptr; - list++; - } else { - // This value is the last one - list = val->ptr + strlen(val->ptr); - val->len = list - val->ptr; - } - - if (eq_val != NULL) { - // Value has form "x=y", adjust pointers and lengths - // so that val points to "x", and eq_val points to "y". - eq_val->len = 0; - eq_val->ptr = (const char *) memchr(val->ptr, '=', val->len); - if (eq_val->ptr != NULL) { - eq_val->ptr++; // Skip over '=' character - eq_val->len = val->ptr + val->len - eq_val->ptr; - val->len = (eq_val->ptr - val->ptr) - 1; - } - } - } - - return list; -} - -static int match_prefix(const char *pattern, int pattern_len, const char *str) { - const char *or_str; - int i, j, len, res; - - if ((or_str = (const char *) memchr(pattern, '|', pattern_len)) != NULL) { - res = match_prefix(pattern, or_str - pattern, str); - return res > 0 ? res : - match_prefix(or_str + 1, (pattern + pattern_len) - (or_str + 1), str); - } - - i = j = 0; - res = -1; - for (; i < pattern_len; i++, j++) { - if (pattern[i] == '?' && str[j] != '\0') { - continue; - } else if (pattern[i] == '$') { - return str[j] == '\0' ? j : -1; - } else if (pattern[i] == '*') { - i++; - if (pattern[i] == '*') { - i++; - len = (int) strlen(str + j); - } else { - len = (int) strcspn(str + j, "/"); - } - if (i == pattern_len) { - return j + len; - } - do { - res = match_prefix(pattern + i, pattern_len - i, str + j + len); - } while (res == -1 && len-- > 0); - return res == -1 ? -1 : j + res + len; - } else if (pattern[i] != str[j]) { - return -1; - } - } - return j; -} - -// HTTP 1.1 assumes keep alive if "Connection:" header is not set -// This function must tolerate situations when connection info is not -// set up, for example if request parsing failed. -static int should_keep_alive(const struct mg_connection *conn) { - const char *http_version = conn->request_info.http_version; - const char *header = mg_get_header(conn, "Connection"); - if (conn->must_close || - conn->status_code == 401 || - mg_strcasecmp(conn->ctx->config[ENABLE_KEEP_ALIVE], "yes") != 0 || - (header != NULL && mg_strcasecmp(header, "keep-alive") != 0) || - (header == NULL && http_version && strcmp(http_version, "1.1"))) { - return 0; - } - return 1; -} - -static const char *suggest_connection_header(const struct mg_connection *conn) { - return should_keep_alive(conn) ? "keep-alive" : "close"; -} - -static void send_http_error(struct mg_connection *, int, const char *, - PRINTF_FORMAT_STRING(const char *fmt), ...) - PRINTF_ARGS(4, 5); - - -static void send_http_error(struct mg_connection *conn, int status, - const char *reason, const char *fmt, ...) { - char buf[MG_BUF_LEN]; - va_list ap; - int len; - - conn->status_code = status; - if (call_user(conn, MG_HTTP_ERROR) == NULL) { - buf[0] = '\0'; - len = 0; - - // Errors 1xx, 204 and 304 MUST NOT send a body - if (status > 199 && status != 204 && status != 304) { - len = mg_snprintf(conn, buf, sizeof(buf), "Error %d: %s", status, reason); - buf[len++] = '\n'; - - va_start(ap, fmt); - len += mg_vsnprintf(conn, buf + len, sizeof(buf) - len, fmt, ap); - va_end(ap); - } - DEBUG_TRACE(("[%s]", buf)); - - mg_printf(conn, "HTTP/1.1 %d %s\r\n" - "Content-Length: %d\r\n" - "Connection: %s\r\n\r\n", status, reason, len, - suggest_connection_header(conn)); - conn->num_bytes_sent += mg_printf(conn, "%s", buf); - } -} - -#if defined(_WIN32) && !defined(__SYMBIAN32__) -static int pthread_mutex_init(pthread_mutex_t *mutex, void *unused) { - unused = NULL; - *mutex = CreateMutex(NULL, FALSE, NULL); - return *mutex == NULL ? -1 : 0; -} - -static int pthread_mutex_destroy(pthread_mutex_t *mutex) { - return CloseHandle(*mutex) == 0 ? -1 : 0; -} - -static int pthread_mutex_lock(pthread_mutex_t *mutex) { - return WaitForSingleObject(*mutex, INFINITE) == WAIT_OBJECT_0? 0 : -1; -} - -static int pthread_mutex_unlock(pthread_mutex_t *mutex) { - return ReleaseMutex(*mutex) == 0 ? -1 : 0; -} - -static int pthread_cond_init(pthread_cond_t *cv, const void *unused) { - unused = NULL; - cv->signal = CreateEvent(NULL, FALSE, FALSE, NULL); - cv->broadcast = CreateEvent(NULL, TRUE, FALSE, NULL); - return cv->signal != NULL && cv->broadcast != NULL ? 0 : -1; -} - -static int pthread_cond_wait(pthread_cond_t *cv, pthread_mutex_t *mutex) { - HANDLE handles[] = {cv->signal, cv->broadcast}; - ReleaseMutex(*mutex); - WaitForMultipleObjects(2, handles, FALSE, INFINITE); - return WaitForSingleObject(*mutex, INFINITE) == WAIT_OBJECT_0? 0 : -1; -} - -static int pthread_cond_signal(pthread_cond_t *cv) { - return SetEvent(cv->signal) == 0 ? -1 : 0; -} - -static int pthread_cond_broadcast(pthread_cond_t *cv) { - // Implementation with PulseEvent() has race condition, see - // http://www.cs.wustl.edu/~schmidt/win32-cv-1.html - return PulseEvent(cv->broadcast) == 0 ? -1 : 0; -} - -static int pthread_cond_destroy(pthread_cond_t *cv) { - return CloseHandle(cv->signal) && CloseHandle(cv->broadcast) ? 0 : -1; -} - -// For Windows, change all slashes to backslashes in path names. -static void change_slashes_to_backslashes(char *path) { - int i; - - for (i = 0; path[i] != '\0'; i++) { - if (path[i] == '/') - path[i] = '\\'; - // i > 0 check is to preserve UNC paths, like \\server\file.txt - if (path[i] == '\\' && i > 0) - while (path[i + 1] == '\\' || path[i + 1] == '/') - (void) memmove(path + i + 1, - path + i + 2, strlen(path + i + 1)); - } -} - -// Encode 'path' which is assumed UTF-8 string, into UNICODE string. -// wbuf and wbuf_len is a target buffer and its length. -static void to_unicode(const char *path, wchar_t *wbuf, size_t wbuf_len) { - char buf[PATH_MAX], buf2[PATH_MAX], *p; - - mg_strlcpy(buf, path, sizeof(buf)); - change_slashes_to_backslashes(buf); - - // Point p to the end of the file name - p = buf + strlen(buf) - 1; - - // Trim trailing backslash character - while (p > buf && *p == '\\' && p[-1] != ':') { - *p-- = '\0'; - } - - // Protect from CGI code disclosure. - // This is very nasty hole. Windows happily opens files with - // some garbage in the end of file name. So fopen("a.cgi ", "r") - // actually opens "a.cgi", and does not return an error! - if (*p == 0x20 || // No space at the end - (*p == 0x2e && p > buf) || // No '.' but allow '.' as full path - *p == 0x2b || // No '+' - (*p & ~0x7f)) { // And generally no non-ASCII chars - (void) fprintf(stderr, "Rejecting suspicious path: [%s]", buf); - wbuf[0] = L'\0'; - } else { - // Convert to Unicode and back. If doubly-converted string does not - // match the original, something is fishy, reject. - memset(wbuf, 0, wbuf_len * sizeof(wchar_t)); - MultiByteToWideChar(CP_UTF8, 0, buf, -1, wbuf, (int) wbuf_len); - WideCharToMultiByte(CP_UTF8, 0, wbuf, (int) wbuf_len, buf2, sizeof(buf2), - NULL, NULL); - if (strcmp(buf, buf2) != 0) { - wbuf[0] = L'\0'; - } - } -} - -#if defined(_WIN32_WCE) -static time_t time(time_t *ptime) { - time_t t; - SYSTEMTIME st; - FILETIME ft; - - GetSystemTime(&st); - SystemTimeToFileTime(&st, &ft); - t = SYS2UNIX_TIME(ft.dwLowDateTime, ft.dwHighDateTime); - - if (ptime != NULL) { - *ptime = t; - } - - return t; -} - -static struct tm *localtime(const time_t *ptime, struct tm *ptm) { - int64_t t = ((int64_t) *ptime) * RATE_DIFF + EPOCH_DIFF; - FILETIME ft, lft; - SYSTEMTIME st; - TIME_ZONE_INFORMATION tzinfo; - - if (ptm == NULL) { - return NULL; - } - - * (int64_t *) &ft = t; - FileTimeToLocalFileTime(&ft, &lft); - FileTimeToSystemTime(&lft, &st); - ptm->tm_year = st.wYear - 1900; - ptm->tm_mon = st.wMonth - 1; - ptm->tm_wday = st.wDayOfWeek; - ptm->tm_mday = st.wDay; - ptm->tm_hour = st.wHour; - ptm->tm_min = st.wMinute; - ptm->tm_sec = st.wSecond; - ptm->tm_yday = 0; // hope nobody uses this - ptm->tm_isdst = - GetTimeZoneInformation(&tzinfo) == TIME_ZONE_ID_DAYLIGHT ? 1 : 0; - - return ptm; -} - -static struct tm *gmtime(const time_t *ptime, struct tm *ptm) { - // FIXME(lsm): fix this. - return localtime(ptime, ptm); -} - -static size_t strftime(char *dst, size_t dst_size, const char *fmt, - const struct tm *tm) { - (void) snprintf(dst, dst_size, "implement strftime() for WinCE"); - return 0; -} -#endif - -static int mg_rename(const char* oldname, const char* newname) { - wchar_t woldbuf[PATH_MAX]; - wchar_t wnewbuf[PATH_MAX]; - - to_unicode(oldname, woldbuf, ARRAY_SIZE(woldbuf)); - to_unicode(newname, wnewbuf, ARRAY_SIZE(wnewbuf)); - - return MoveFileW(woldbuf, wnewbuf) ? 0 : -1; -} - - -static FILE *mg_fopen(const char *path, const char *mode) { - wchar_t wbuf[PATH_MAX], wmode[20]; - - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); - MultiByteToWideChar(CP_UTF8, 0, mode, -1, wmode, ARRAY_SIZE(wmode)); - - return _wfopen(wbuf, wmode); -} - -static int mg_stat(const char *path, struct mgstat *stp) { - int ok = -1; // Error - wchar_t wbuf[PATH_MAX]; - WIN32_FILE_ATTRIBUTE_DATA info; - - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); - - if (GetFileAttributesExW(wbuf, GetFileExInfoStandard, &info) != 0) { - stp->size = MAKEUQUAD(info.nFileSizeLow, info.nFileSizeHigh); - stp->mtime = SYS2UNIX_TIME(info.ftLastWriteTime.dwLowDateTime, - info.ftLastWriteTime.dwHighDateTime); - stp->is_directory = - info.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY; - ok = 0; // Success - } - - return ok; -} - -static int mg_remove(const char *path) { - wchar_t wbuf[PATH_MAX]; - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); - return DeleteFileW(wbuf) ? 0 : -1; -} - -static int mg_mkdir(const char *path, int mode) { - char buf[PATH_MAX]; - wchar_t wbuf[PATH_MAX]; - - mode = 0; // Unused - mg_strlcpy(buf, path, sizeof(buf)); - change_slashes_to_backslashes(buf); - - (void) MultiByteToWideChar(CP_UTF8, 0, buf, -1, wbuf, sizeof(wbuf)); - - return CreateDirectoryW(wbuf, NULL) ? 0 : -1; -} - -// Implementation of POSIX opendir/closedir/readdir for Windows. -static DIR * opendir(const char *name) { - DIR *dir = NULL; - wchar_t wpath[PATH_MAX]; - DWORD attrs; - - if (name == NULL) { - SetLastError(ERROR_BAD_ARGUMENTS); - } else if ((dir = (DIR *) malloc(sizeof(*dir))) == NULL) { - SetLastError(ERROR_NOT_ENOUGH_MEMORY); - } else { - to_unicode(name, wpath, ARRAY_SIZE(wpath)); - attrs = GetFileAttributesW(wpath); - if (attrs != 0xFFFFFFFF && - ((attrs & FILE_ATTRIBUTE_DIRECTORY) == FILE_ATTRIBUTE_DIRECTORY)) { - (void) wcscat(wpath, L"\\*"); - dir->handle = FindFirstFileW(wpath, &dir->info); - dir->result.d_name[0] = '\0'; - } else { - free(dir); - dir = NULL; - } - } - - return dir; -} - -static int closedir(DIR *dir) { - int result = 0; - - if (dir != NULL) { - if (dir->handle != INVALID_HANDLE_VALUE) - result = FindClose(dir->handle) ? 0 : -1; - - free(dir); - } else { - result = -1; - SetLastError(ERROR_BAD_ARGUMENTS); - } - - return result; -} - -static struct dirent *readdir(DIR *dir) { - struct dirent *result = 0; - - if (dir) { - if (dir->handle != INVALID_HANDLE_VALUE) { - result = &dir->result; - (void) WideCharToMultiByte(CP_UTF8, 0, - dir->info.cFileName, -1, result->d_name, - sizeof(result->d_name), NULL, NULL); - - if (!FindNextFileW(dir->handle, &dir->info)) { - (void) FindClose(dir->handle); - dir->handle = INVALID_HANDLE_VALUE; - } - - } else { - SetLastError(ERROR_FILE_NOT_FOUND); - } - } else { - SetLastError(ERROR_BAD_ARGUMENTS); - } - - return result; -} - -#define set_close_on_exec(fd) // No FD_CLOEXEC on Windows - -int mg_start_thread(mg_thread_func_t f, void *p) { - return _beginthread((void (__cdecl *)(void *)) f, 0, p) == -1L ? -1 : 0; -} - -static HANDLE dlopen(const char *dll_name, int flags) { - wchar_t wbuf[PATH_MAX]; - flags = 0; // Unused - to_unicode(dll_name, wbuf, ARRAY_SIZE(wbuf)); - return LoadLibraryW(wbuf); -} - -#if !defined(NO_CGI) -#define SIGKILL 0 -static int kill(pid_t pid, int sig_num) { - (void) TerminateProcess(pid, sig_num); - (void) CloseHandle(pid); - return 0; -} - -static pid_t spawn_process(struct mg_connection *conn, const char *prog, - char *envblk, char *envp[], int fd_stdin, - int fd_stdout, const char *dir) { - HANDLE me; - char *p, *interp, full_interp[PATH_MAX], cmdline[PATH_MAX], buf[PATH_MAX]; - FILE *fp; - STARTUPINFOA si = { sizeof(si) }; - PROCESS_INFORMATION pi = { 0 }; - - envp = NULL; // Unused - - // TODO(lsm): redirect CGI errors to the error log file - si.dwFlags = STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW; - si.wShowWindow = SW_HIDE; - - me = GetCurrentProcess(); - DuplicateHandle(me, (HANDLE) _get_osfhandle(fd_stdin), me, - &si.hStdInput, 0, TRUE, DUPLICATE_SAME_ACCESS); - DuplicateHandle(me, (HANDLE) _get_osfhandle(fd_stdout), me, - &si.hStdOutput, 0, TRUE, DUPLICATE_SAME_ACCESS); - - // If CGI file is a script, try to read the interpreter line - interp = conn->ctx->config[CGI_INTERPRETER]; - if (interp == NULL) { - buf[0] = buf[2] = '\0'; - - // Read the first line of the script into the buffer - snprintf(cmdline, sizeof(cmdline), "%s%c%s", dir, '/', prog); - if ((fp = mg_fopen(cmdline, "r")) != NULL) { - fgets(buf, sizeof(buf), fp); - fclose(fp); - buf[sizeof(buf) - 1] = '\0'; - } - - if (buf[0] == '#' && buf[1] == '!') { - // Trim whitespace in interpreter name - for (p = buf + 2; *p != '\0' && isspace(* (unsigned char *) p); ) - p++; - *p = '\0'; - } - interp = buf + 2; - } - - if (interp[0] != '\0') { - GetFullPathName(interp, sizeof(full_interp), full_interp, NULL); - interp = full_interp; - } - - mg_snprintf(conn, cmdline, sizeof(cmdline), "%s%s%s", - interp, interp[0] == '\0' ? "" : " ", prog); - - DEBUG_TRACE(("Running [%s]", cmdline)); - if (CreateProcessA(NULL, cmdline, NULL, NULL, TRUE, - CREATE_NEW_PROCESS_GROUP, envblk, dir, &si, &pi) == 0) { - cry(conn, "%s: CreateProcess(%s): %d", - __func__, cmdline, ERRNO); - pi.hProcess = (pid_t) -1; - } - - // Always close these to prevent handle leakage. - (void) close(fd_stdin); - (void) close(fd_stdout); - - (void) CloseHandle(si.hStdOutput); - (void) CloseHandle(si.hStdInput); - (void) CloseHandle(pi.hThread); - - return (pid_t) pi.hProcess; -} -#endif // !NO_CGI - -static int set_non_blocking_mode(SOCKET sock) { - unsigned long on = 1; - return ioctlsocket(sock, FIONBIO, &on); -} - -#else -static int mg_stat(const char *path, struct mgstat *stp) { - struct stat st; - int ok; - - if (stat(path, &st) == 0) { - ok = 0; - stp->size = st.st_size; - stp->mtime = st.st_mtime; - stp->is_directory = S_ISDIR(st.st_mode); - } else { - ok = -1; - } - - return ok; -} - -static void set_close_on_exec(int fd) { - (void) fcntl(fd, F_SETFD, FD_CLOEXEC); -} - -int mg_start_thread(mg_thread_func_t func, void *param) { - pthread_t thread_id; - pthread_attr_t attr; - - (void) pthread_attr_init(&attr); - (void) pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); - // TODO(lsm): figure out why mongoose dies on Linux if next line is enabled - // (void) pthread_attr_setstacksize(&attr, sizeof(struct mg_connection) * 5); - - return pthread_create(&thread_id, &attr, func, param); -} - -#ifndef NO_CGI -static pid_t spawn_process(struct mg_connection *conn, const char *prog, - char *envblk, char *envp[], int fd_stdin, - int fd_stdout, const char *dir) { - pid_t pid; - const char *interp; - - envblk = NULL; // Unused - - if ((pid = fork()) == -1) { - // Parent - send_http_error(conn, 500, http_500_error, "fork(): %s", strerror(ERRNO)); - } else if (pid == 0) { - // Child - if (chdir(dir) != 0) { - cry(conn, "%s: chdir(%s): %s", __func__, dir, strerror(ERRNO)); - } else if (dup2(fd_stdin, 0) == -1) { - cry(conn, "%s: dup2(%d, 0): %s", __func__, fd_stdin, strerror(ERRNO)); - } else if (dup2(fd_stdout, 1) == -1) { - cry(conn, "%s: dup2(%d, 1): %s", __func__, fd_stdout, strerror(ERRNO)); - } else { - (void) dup2(fd_stdout, 2); - (void) close(fd_stdin); - (void) close(fd_stdout); - - interp = conn->ctx->config[CGI_INTERPRETER]; - if (interp == NULL) { - (void) execle(prog, prog, NULL, envp); - cry(conn, "%s: execle(%s): %s", __func__, prog, strerror(ERRNO)); - } else { - (void) execle(interp, interp, prog, NULL, envp); - cry(conn, "%s: execle(%s %s): %s", __func__, interp, prog, - strerror(ERRNO)); - } - } - exit(EXIT_FAILURE); - } - - // Parent. Close stdio descriptors - (void) close(fd_stdin); - (void) close(fd_stdout); - - return pid; -} -#endif // !NO_CGI - -#endif // _WIN32 - -// Write data to the IO channel - opened file descriptor, socket or SSL -// descriptor. Return number of bytes written. -static int64_t push(FILE *fp, SOCKET sock, SSL *ssl, const char *buf, - int64_t len) { - int64_t sent; - int n, k; - - sent = 0; - while (sent < len) { - - // How many bytes we send in this iteration - k = len - sent > INT_MAX ? INT_MAX : (int) (len - sent); - - if (ssl != NULL) { - n = SSL_write(ssl, buf + sent, k); - } else if (fp != NULL) { - n = (int) fwrite(buf + sent, 1, (size_t) k, fp); - if (ferror(fp)) - n = -1; - } else { - n = send(sock, buf + sent, (size_t) k, MSG_NOSIGNAL); - } - - if (n < 0) - break; - - sent += n; - } - - return sent; -} - -// This function is needed to prevent Mongoose to be stuck in a blocking -// socket read when user requested exit. To do that, we sleep in select -// with a timeout, and when returned, check the context for the stop flag. -// If it is set, we return 0, and this means that we must not continue -// reading, must give up and close the connection and exit serving thread. - -#if 0 -static int wait_until_socket_is_readable(struct mg_connection *conn) { - int result; - struct timeval tv; - fd_set set; - - do { - tv.tv_sec = 0; - tv.tv_usec = 300 * 1000; - FD_ZERO(&set); - FD_SET(conn->client.sock, &set); - result = select(conn->client.sock + 1, &set, NULL, NULL, &tv); - } while ((result == 0 || (result < 0 && ERRNO == EINTR)) && - conn->ctx->stop_flag == 0); - - return conn->ctx->stop_flag || result < 0 ? 0 : 1; -} -#else -static int wait_until_socket_is_readable(struct mg_connection* conn) { - if (conn->ep_fd < 0) { - // create ep_fd if not opened before - conn->ep_fd = epoll_create(1024); - if (conn->ep_fd < 0) { - // epoll create failed, return - - return 0; - } - struct epoll_event event; - event.events = EPOLLIN | EPOLLERR | EPOLLHUP; - event.data.ptr = conn; - int ret = epoll_ctl(conn->ep_fd, EPOLL_CTL_ADD, conn->client.sock, &event); - if (ret < 0) { - // epoll_ctl failed. - return 0; - } - } - while (conn->ctx->stop_flag == 0) { - struct epoll_event events[5]; - int num_event = epoll_wait(conn->ep_fd, events, 5, 300); - if (num_event > 0) { - assert(num_event == 1); - switch(events[0].events) { - case EPOLLIN: - // now, we can read - return 1; - case EPOLLERR: - case EPOLLHUP: - default: - return 0; - } - } else if (num_event == 0) { - // timedout, just continue; - } else { - // num_event < 0 and errno != EINTR means error happened. - if (ERRNO != EINTR) { - return 0; - } - } - } - // Only stop, we get here - return 0; -} -#endif - -// Read from IO channel - opened file descriptor, socket, or SSL descriptor. -// Return negative value on error, or number of bytes read on success. -static int pull(FILE *fp, struct mg_connection *conn, char *buf, int len) { - int nread; - - if (fp != NULL) { - // Use read() instead of fread(), because if we're reading from the CGI - // pipe, fread() may block until IO buffer is filled up. We cannot afford - // to block and must pass all read bytes immediately to the client. - nread = read(fileno(fp), buf, (size_t) len); - } else if (!wait_until_socket_is_readable(conn)) { - nread = -1; - } else if (conn->ssl != NULL) { - nread = SSL_read(conn->ssl, buf, len); - } else { - nread = recv(conn->client.sock, buf, (size_t) len, 0); - } - - return conn->ctx->stop_flag ? -1 : nread; -} - -int mg_read(struct mg_connection *conn, void *buf, size_t len) { - // int n, buffered_len, nread; - // Modified by lingbin, make buffered_len to be int64_t to avoid overflow. - // see jira: PALO-1442 - int n, nread; - int64_t buffered_len; - const char *body; - - nread = 0; - if (conn->consumed_content < conn->content_len) { - // Adjust number of bytes to read. - int64_t to_read = conn->content_len - conn->consumed_content; - if (to_read < (int64_t) len) { - len = (size_t) to_read; - } - - // Return buffered data - body = conn->buf + conn->request_len + conn->consumed_content; - buffered_len = &conn->buf[conn->data_len] - body; - if (buffered_len > 0) { - if (len < (size_t) buffered_len) { - buffered_len = (int) len; - } - memcpy(buf, body, (size_t) buffered_len); - len -= buffered_len; - conn->consumed_content += buffered_len; - nread += buffered_len; - buf = (char *) buf + buffered_len; - } - - // We have returned all buffered data. Read new data from the remote socket. - while (len > 0) { - n = pull(NULL, conn, (char *) buf, (int) len); - if (n < 0) { - nread = n; // Propagate the error - break; - } else if (n == 0) { - break; // No more data to read - } else { - buf = (char *) buf + n; - conn->consumed_content += n; - nread += n; - len -= n; - } - } - } - return nread; -} - -int mg_write(struct mg_connection *conn, const void *buf, size_t len) { - time_t now; - int64_t n, total, allowed; - - if (conn->throttle > 0) { - if ((now = time(NULL)) != conn->last_throttle_time) { - conn->last_throttle_time = now; - conn->last_throttle_bytes = 0; - } - allowed = conn->throttle - conn->last_throttle_bytes; - if (allowed > (int64_t) len) { - allowed = len; - } - if ((total = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, - (int64_t) allowed)) == allowed) { - buf = (char *) buf + total; - conn->last_throttle_bytes += total; - while (total < (int64_t) len && conn->ctx->stop_flag == 0) { - allowed = conn->throttle > (int64_t) len - total ? - len - total : conn->throttle; - if ((n = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, - (int64_t) allowed)) != allowed) { - break; - } - sleep(1); - conn->last_throttle_bytes = allowed; - conn->last_throttle_time = time(NULL); - buf = (char *) buf + n; - total += n; - } - } - } else { - total = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, - (int64_t) len); - } - return (int) total; -} - -int mg_printf(struct mg_connection *conn, const char *fmt, ...) { - char mem[MG_BUF_LEN], *buf = mem; - int len; - va_list ap; - - // Print in a local buffer first, hoping that it is large enough to - // hold the whole message - va_start(ap, fmt); - len = vsnprintf(mem, sizeof(mem), fmt, ap); - va_end(ap); - - if (len == 0) { - // Do nothing. mg_printf(conn, "%s", "") was called. - } else if (len < 0) { - // vsnprintf() error, give up - len = -1; - cry(conn, "%s(%s, ...): vsnprintf() error", __func__, fmt); - } else if (len > (int) sizeof(mem) && (buf = (char *) malloc(len + 1)) != NULL) { - // Local buffer is not large enough, allocate big buffer on heap - va_start(ap, fmt); - vsnprintf(buf, len + 1, fmt, ap); - va_end(ap); - len = mg_write(conn, buf, (size_t) len); - free(buf); - } else if (len > (int) sizeof(mem)) { - // Failed to allocate large enough buffer, give up - cry(conn, "%s(%s, ...): Can't allocate %d bytes, not printing anything", - __func__, fmt, len); - len = -1; - } else { - // Copy to the local buffer succeeded - len = mg_write(conn, buf, (size_t) len); - } - - return len; -} - -// URL-decode input buffer into destination buffer. -// 0-terminate the destination buffer. Return the length of decoded data. -// form-url-encoded data differs from URI encoding in a way that it -// uses '+' as character for space, see RFC 1866 section 8.2.1 -// http://ftp.ics.uci.edu/pub/ietf/html/rfc1866.txt -static size_t url_decode(const char *src, size_t src_len, char *dst, - size_t dst_len, int is_form_url_encoded) { - size_t i, j; - int a, b; -#define HEXTOI(x) (isdigit(x) ? x - '0' : x - 'W') - - for (i = j = 0; i < src_len && j < dst_len - 1; i++, j++) { - if (src[i] == '%' && - isxdigit(* (const unsigned char *) (src + i + 1)) && - isxdigit(* (const unsigned char *) (src + i + 2))) { - a = tolower(* (const unsigned char *) (src + i + 1)); - b = tolower(* (const unsigned char *) (src + i + 2)); - dst[j] = (char) ((HEXTOI(a) << 4) | HEXTOI(b)); - i += 2; - } else if (is_form_url_encoded && src[i] == '+') { - dst[j] = ' '; - } else { - dst[j] = src[i]; - } - } - - dst[j] = '\0'; // Null-terminate the destination - - return j; -} - -// Scan given buffer and fetch the value of the given variable. -// It can be specified in query string, or in the POST data. -// Return -1 if the variable not found, or length of the URL-decoded value -// stored in dst. The dst buffer is guaranteed to be NUL-terminated if it -// is not NULL or zero-length. If dst is NULL or zero-length, then -// -2 is returned. -int mg_get_var(const char *buf, size_t buf_len, const char *name, - char *dst, size_t dst_len) { - const char *p, *e, *s; - size_t name_len; - int len; - - if (dst == NULL || dst_len == 0) { - len = -2; - } else if (buf == NULL || name == NULL || buf_len == 0) { - len = -1; - dst[0] = '\0'; - } else { - name_len = strlen(name); - e = buf + buf_len; - len = -1; - dst[0] = '\0'; - - // buf is "var1=val1&var2=val2...". Find variable first - for (p = buf; p + name_len < e; p++) { - if ((p == buf || p[-1] == '&') && p[name_len] == '=' && - !mg_strncasecmp(name, p, name_len)) { - - // Point p to variable value - p += name_len + 1; - - // Point s to the end of the value - s = (const char *) memchr(p, '&', (size_t)(e - p)); - if (s == NULL) { - s = e; - } - assert(s >= p); - - // Decode variable into destination buffer - if ((size_t) (s - p) < dst_len) { - len = (int) url_decode(p, (size_t)(s - p), dst, dst_len, 1); - } - break; - } - } - } - - return len; -} - -int mg_get_cookie(const struct mg_connection *conn, const char *cookie_name, - char *dst, size_t dst_size) { - const char *s, *p, *end; - int name_len, len = -1; - - dst[0] = '\0'; - if ((s = mg_get_header(conn, "Cookie")) == NULL) { - return -1; - } - - name_len = (int) strlen(cookie_name); - end = s + strlen(s); - - for (; (s = strstr(s, cookie_name)) != NULL; s += name_len) - if (s[name_len] == '=') { - s += name_len + 1; - if ((p = strchr(s, ' ')) == NULL) - p = end; - if (p[-1] == ';') - p--; - if (*s == '"' && p[-1] == '"' && p > s + 1) { - s++; - p--; - } - if ((size_t) (p - s) < dst_size) { - len = p - s; - mg_strlcpy(dst, s, (size_t) len + 1); - } - break; - } - - return len; -} - -static int convert_uri_to_file_name(struct mg_connection *conn, char *buf, - size_t buf_len, struct mgstat *st) { - struct vec a, b; - const char *rewrite, *uri = conn->request_info.uri; - char *p; - int match_len, stat_result; - - buf_len--; // This is because memmove() for PATH_INFO may shift part - // of the path one byte on the right. - mg_snprintf(conn, buf, buf_len, "%s%s", conn->ctx->config[DOCUMENT_ROOT], - uri); - - rewrite = conn->ctx->config[REWRITE]; - while ((rewrite = next_option(rewrite, &a, &b)) != NULL) { - if ((match_len = match_prefix(a.ptr, a.len, uri)) > 0) { - mg_snprintf(conn, buf, buf_len, "%.*s%s", (int) b.len, b.ptr, - uri + match_len); - break; - } - } - - if ((stat_result = mg_stat(buf, st)) != 0) { - // Support PATH_INFO for CGI scripts. - for (p = buf + strlen(buf); p > buf + 1; p--) { - if (*p == '/') { - *p = '\0'; - if (match_prefix(conn->ctx->config[CGI_EXTENSIONS], - strlen(conn->ctx->config[CGI_EXTENSIONS]), buf) > 0 && - (stat_result = mg_stat(buf, st)) == 0) { - // Shift PATH_INFO block one character right, e.g. - // "/x.cgi/foo/bar\x00" => "/x.cgi\x00/foo/bar\x00" - // conn->path_info is pointing to the local variable "path" declared - // in handle_request(), so PATH_INFO is not valid after - // handle_request returns. - conn->path_info = p + 1; - memmove(p + 2, p + 1, strlen(p + 1) + 1); // +1 is for trailing \0 - p[1] = '/'; - break; - } else { - *p = '/'; - stat_result = -1; - } - } - } - } - - return stat_result; -} - -static int sslize(struct mg_connection *conn, SSL_CTX *s, int (*func)(SSL *)) { - return (conn->ssl = SSL_new(s)) != NULL && - SSL_set_fd(conn->ssl, conn->client.sock) == 1 && - func(conn->ssl) == 1; -} - -// Check whether full request is buffered. Return: -// -1 if request is malformed -// 0 if request is not yet fully buffered -// >0 actual request length, including last \r\n\r\n -static int get_request_len(const char *buf, int buflen) { - const char *s, *e; - int len = 0; - - for (s = buf, e = s + buflen - 1; len <= 0 && s < e; s++) - // Control characters are not allowed but >=128 is. - if (!isprint(* (const unsigned char *) s) && *s != '\r' && - *s != '\n' && * (const unsigned char *) s < 128) { - len = -1; - break; // [i_a] abort scan as soon as one malformed character is found; don't let subsequent \r\n\r\n win us over anyhow - } else if (s[0] == '\n' && s[1] == '\n') { - len = (int) (s - buf) + 2; - } else if (s[0] == '\n' && &s[1] < e && - s[1] == '\r' && s[2] == '\n') { - len = (int) (s - buf) + 3; - } - - return len; -} - -// Convert month to the month number. Return -1 on error, or month number -static int get_month_index(const char *s) { - size_t i; - - for (i = 0; i < ARRAY_SIZE(month_names); i++) - if (!strcmp(s, month_names[i])) - return (int) i; - - return -1; -} - -static int num_leap_years(int year) { - return year / 4 - year / 100 + year / 400; -} - -// Parse UTC date-time string, and return the corresponding time_t value. -static time_t parse_date_string(const char *datetime) { - static const unsigned short days_before_month[] = { - 0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334 - }; - char month_str[32]; - int second, minute, hour, day, month, year, leap_days, days; - time_t result = (time_t) 0; - - if (((sscanf(datetime, "%d/%3s/%d %d:%d:%d", - &day, month_str, &year, &hour, &minute, &second) == 6) || - (sscanf(datetime, "%d %3s %d %d:%d:%d", - &day, month_str, &year, &hour, &minute, &second) == 6) || - (sscanf(datetime, "%*3s, %d %3s %d %d:%d:%d", - &day, month_str, &year, &hour, &minute, &second) == 6) || - (sscanf(datetime, "%d-%3s-%d %d:%d:%d", - &day, month_str, &year, &hour, &minute, &second) == 6)) && - year > 1970 && - (month = get_month_index(month_str)) != -1) { - leap_days = num_leap_years(year) - num_leap_years(1970); - year -= 1970; - days = year * 365 + days_before_month[month] + (day - 1) + leap_days; - result = days * 24 * 3600 + hour * 3600 + minute * 60 + second; - } - - return result; -} - -// Protect against directory disclosure attack by removing '..', -// excessive '/' and '\' characters -static void remove_double_dots_and_double_slashes(char *s) { - char *p = s; - - while (*s != '\0') { - *p++ = *s++; - if (s[-1] == '/' || s[-1] == '\\') { - // Skip all following slashes, backslashes and double-dots - while (s[0] != '\0') { - if (s[0] == '/' || s[0] == '\\') { - s++; - } else if (s[0] == '.' && s[1] == '.') { - s += 2; - } else { - break; - } - } - } - } - *p = '\0'; -} - -static const struct { - const char *extension; - size_t ext_len; - const char *mime_type; -} builtin_mime_types[] = { - {".html", 5, "text/html"}, - {".htm", 4, "text/html"}, - {".shtm", 5, "text/html"}, - {".shtml", 6, "text/html"}, - {".css", 4, "text/css"}, - {".js", 3, "application/x-javascript"}, - {".ico", 4, "image/x-icon"}, - {".gif", 4, "image/gif"}, - {".jpg", 4, "image/jpeg"}, - {".jpeg", 5, "image/jpeg"}, - {".png", 4, "image/png"}, - {".svg", 4, "image/svg+xml"}, - {".txt", 4, "text/plain"}, - {".torrent", 8, "application/x-bittorrent"}, - {".wav", 4, "audio/x-wav"}, - {".mp3", 4, "audio/x-mp3"}, - {".mid", 4, "audio/mid"}, - {".m3u", 4, "audio/x-mpegurl"}, - {".ram", 4, "audio/x-pn-realaudio"}, - {".xml", 4, "text/xml"}, - {".json", 5, "text/json"}, - {".xslt", 5, "application/xml"}, - {".ra", 3, "audio/x-pn-realaudio"}, - {".doc", 4, "application/msword"}, - {".exe", 4, "application/octet-stream"}, - {".zip", 4, "application/x-zip-compressed"}, - {".xls", 4, "application/excel"}, - {".tgz", 4, "application/x-tar-gz"}, - {".tar", 4, "application/x-tar"}, - {".gz", 3, "application/x-gunzip"}, - {".arj", 4, "application/x-arj-compressed"}, - {".rar", 4, "application/x-arj-compressed"}, - {".rtf", 4, "application/rtf"}, - {".pdf", 4, "application/pdf"}, - {".swf", 4, "application/x-shockwave-flash"}, - {".mpg", 4, "video/mpeg"}, - {".webm", 5, "video/webm"}, - {".mpeg", 5, "video/mpeg"}, - {".mp4", 4, "video/mp4"}, - {".m4v", 4, "video/x-m4v"}, - {".asf", 4, "video/x-ms-asf"}, - {".avi", 4, "video/x-msvideo"}, - {".bmp", 4, "image/bmp"}, - {NULL, 0, NULL} -}; - -const char *mg_get_builtin_mime_type(const char *path) { - const char *ext; - size_t i, path_len; - - path_len = strlen(path); - - for (i = 0; builtin_mime_types[i].extension != NULL; i++) { - ext = path + (path_len - builtin_mime_types[i].ext_len); - if (path_len > builtin_mime_types[i].ext_len && - mg_strcasecmp(ext, builtin_mime_types[i].extension) == 0) { - return builtin_mime_types[i].mime_type; - } - } - - return "text/plain"; -} - -// Look at the "path" extension and figure what mime type it has. -// Store mime type in the vector. -static void get_mime_type(struct mg_context *ctx, const char *path, - struct vec *vec) { - struct vec ext_vec, mime_vec; - const char *list, *ext; - size_t path_len; - - path_len = strlen(path); - - // Scan user-defined mime types first, in case user wants to - // override default mime types. - list = ctx->config[EXTRA_MIME_TYPES]; - while ((list = next_option(list, &ext_vec, &mime_vec)) != NULL) { - // ext now points to the path suffix - ext = path + path_len - ext_vec.len; - if (mg_strncasecmp(ext, ext_vec.ptr, ext_vec.len) == 0) { - *vec = mime_vec; - return; - } - } - - vec->ptr = mg_get_builtin_mime_type(path); - vec->len = strlen(vec->ptr); -} - -#ifndef HAVE_MD5 -typedef struct MD5Context { - uint32_t buf[4]; - uint32_t bits[2]; - unsigned char in[64]; -} MD5_CTX; - -#if defined(__BYTE_ORDER) && (__BYTE_ORDER == 1234) -#define byteReverse(buf, len) // Do nothing -#else -static void byteReverse(unsigned char *buf, unsigned longs) { - uint32_t t; - do { - t = (uint32_t) ((unsigned) buf[3] << 8 | buf[2]) << 16 | - ((unsigned) buf[1] << 8 | buf[0]); - *(uint32_t *) buf = t; - buf += 4; - } while (--longs); -} -#endif - -#define F1(x, y, z) (z ^ (x & (y ^ z))) -#define F2(x, y, z) F1(z, x, y) -#define F3(x, y, z) (x ^ y ^ z) -#define F4(x, y, z) (y ^ (x | ~z)) - -#define MD5STEP(f, w, x, y, z, data, s) \ - ( w += f(x, y, z) + data, w = w<>(32-s), w += x ) - -// Start MD5 accumulation. Set bit count to 0 and buffer to mysterious -// initialization constants. -static void MD5Init(MD5_CTX *ctx) { - ctx->buf[0] = 0x67452301; - ctx->buf[1] = 0xefcdab89; - ctx->buf[2] = 0x98badcfe; - ctx->buf[3] = 0x10325476; - - ctx->bits[0] = 0; - ctx->bits[1] = 0; -} - -static void MD5Transform(uint32_t buf[4], uint32_t const in[16]) { - register uint32_t a, b, c, d; - - a = buf[0]; - b = buf[1]; - c = buf[2]; - d = buf[3]; - - MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); - MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); - MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); - MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); - MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); - MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); - MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); - MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); - MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); - MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12); - MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17); - MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22); - MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7); - MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12); - MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17); - MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22); - - MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); - MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); - MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); - MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); - MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); - MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); - MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); - MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); - MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); - MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9); - MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14); - MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20); - MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5); - MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); - MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14); - MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20); - - MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4); - MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11); - MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16); - MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23); - MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4); - MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11); - MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16); - MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23); - MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4); - MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11); - MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16); - MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23); - MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4); - MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11); - MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16); - MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23); - - MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6); - MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10); - MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15); - MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21); - MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6); - MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10); - MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15); - MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21); - MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6); - MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10); - MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15); - MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21); - MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6); - MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10); - MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15); - MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21); - - buf[0] += a; - buf[1] += b; - buf[2] += c; - buf[3] += d; -} - -static void MD5Update(MD5_CTX *ctx, unsigned char const *buf, unsigned len) { - uint32_t t; - - t = ctx->bits[0]; - if ((ctx->bits[0] = t + ((uint32_t) len << 3)) < t) - ctx->bits[1]++; - ctx->bits[1] += len >> 29; - - t = (t >> 3) & 0x3f; - - if (t) { - unsigned char *p = (unsigned char *) ctx->in + t; - - t = 64 - t; - if (len < t) { - memcpy(p, buf, len); - return; - } - memcpy(p, buf, t); - byteReverse(ctx->in, 16); - MD5Transform(ctx->buf, (uint32_t *) ctx->in); - buf += t; - len -= t; - } - - while (len >= 64) { - memcpy(ctx->in, buf, 64); - byteReverse(ctx->in, 16); - MD5Transform(ctx->buf, (uint32_t *) ctx->in); - buf += 64; - len -= 64; - } - - memcpy(ctx->in, buf, len); -} - -static void MD5Final(unsigned char digest[16], MD5_CTX *ctx) { - unsigned count; - unsigned char *p; - - count = (ctx->bits[0] >> 3) & 0x3F; - - p = ctx->in + count; - *p++ = 0x80; - count = 64 - 1 - count; - if (count < 8) { - memset(p, 0, count); - byteReverse(ctx->in, 16); - MD5Transform(ctx->buf, (uint32_t *) ctx->in); - memset(ctx->in, 0, 56); - } else { - memset(p, 0, count - 8); - } - byteReverse(ctx->in, 14); - - ((uint32_t *) ctx->in)[14] = ctx->bits[0]; - ((uint32_t *) ctx->in)[15] = ctx->bits[1]; - - MD5Transform(ctx->buf, (uint32_t *) ctx->in); - byteReverse((unsigned char *) ctx->buf, 4); - memcpy(digest, ctx->buf, 16); - memset((char *) ctx, 0, sizeof(*ctx)); -} -#endif // !HAVE_MD5 - -// Stringify binary data. Output buffer must be twice as big as input, -// because each byte takes 2 bytes in string representation -static void bin2str(char *to, const unsigned char *p, size_t len) { - static const char *hex = "0123456789abcdef"; - - for (; len--; p++) { - *to++ = hex[p[0] >> 4]; - *to++ = hex[p[0] & 0x0f]; - } - *to = '\0'; -} - -// Return stringified MD5 hash for list of strings. Buffer must be 33 bytes. -void mg_md5(char buf[33], ...) { - unsigned char hash[16]; - const char *p; - va_list ap; - MD5_CTX ctx; - - MD5Init(&ctx); - - va_start(ap, buf); - while ((p = va_arg(ap, const char *)) != NULL) { - MD5Update(&ctx, (const unsigned char *) p, (unsigned) strlen(p)); - } - va_end(ap); - - MD5Final(hash, &ctx); - bin2str(buf, hash, sizeof(hash)); -} - -// Check the user's password, return 1 if OK -static int check_password(const char *method, const char *ha1, const char *uri, - const char *nonce, const char *nc, const char *cnonce, - const char *qop, const char *response) { - char ha2[32 + 1], expected_response[32 + 1]; - - // Some of the parameters may be NULL - if (method == NULL || nonce == NULL || nc == NULL || cnonce == NULL || - qop == NULL || response == NULL) { - return 0; - } - - // NOTE(lsm): due to a bug in MSIE, we do not compare the URI - // TODO(lsm): check for authentication timeout - if (// strcmp(dig->uri, c->ouri) != 0 || - strlen(response) != 32 - // || now - strtoul(dig->nonce, NULL, 10) > 3600 - ) { - return 0; - } - - mg_md5(ha2, method, ":", uri, NULL); - mg_md5(expected_response, ha1, ":", nonce, ":", nc, - ":", cnonce, ":", qop, ":", ha2, NULL); - - return mg_strcasecmp(response, expected_response) == 0; -} - -// Use the global passwords file, if specified by auth_gpass option, -// or search for .htpasswd in the requested directory. -static FILE *open_auth_file(struct mg_connection *conn, const char *path) { - struct mg_context *ctx = conn->ctx; - char name[PATH_MAX]; - const char *p, *e; - struct mgstat st; - FILE *fp; - - if (ctx->config[GLOBAL_PASSWORDS_FILE] != NULL) { - // Use global passwords file - fp = mg_fopen(ctx->config[GLOBAL_PASSWORDS_FILE], "r"); - if (fp == NULL) - cry(fc(ctx), "fopen(%s): %s", - ctx->config[GLOBAL_PASSWORDS_FILE], strerror(ERRNO)); - } else if (!mg_stat(path, &st) && st.is_directory) { - (void) mg_snprintf(conn, name, sizeof(name), "%s%c%s", - path, '/', PASSWORDS_FILE_NAME); - fp = mg_fopen(name, "r"); - } else { - // Try to find .htpasswd in requested directory. - for (p = path, e = p + strlen(p) - 1; e > p; e--) - if (e[0] == '/') - break; - (void) mg_snprintf(conn, name, sizeof(name), "%.*s%c%s", - (int) (e - p), p, '/', PASSWORDS_FILE_NAME); - fp = mg_fopen(name, "r"); - } - - return fp; -} - -// Parsed Authorization header -struct ah { - char *user, *uri, *cnonce, *response, *qop, *nc, *nonce; -}; - -// Return 1 on success. Always initializes the ah structure. -static int parse_auth_header(struct mg_connection *conn, char *buf, - size_t buf_size, struct ah *ah) { - char *name, *value, *s; - const char *auth_header; - - (void) memset(ah, 0, sizeof(*ah)); - if ((auth_header = mg_get_header(conn, "Authorization")) == NULL || - mg_strncasecmp(auth_header, "Digest ", 7) != 0) { - return 0; - } - - // Make modifiable copy of the auth header - (void) mg_strlcpy(buf, auth_header + 7, buf_size); - s = buf; - - // Parse authorization header - for (;;) { - // Gobble initial spaces - while (isspace(* (unsigned char *) s)) { - s++; - } - name = skip_quoted(&s, "=", " ", 0); - // Value is either quote-delimited, or ends at first comma or space. - if (s[0] == '\"') { - s++; - value = skip_quoted(&s, "\"", " ", '\\'); - if (s[0] == ',') { - s++; - } - } else { - value = skip_quoted(&s, ", ", " ", 0); // IE uses commas, FF uses spaces - } - if (*name == '\0') { - break; - } - - if (!strcmp(name, "username")) { - ah->user = value; - } else if (!strcmp(name, "cnonce")) { - ah->cnonce = value; - } else if (!strcmp(name, "response")) { - ah->response = value; - } else if (!strcmp(name, "uri")) { - ah->uri = value; - } else if (!strcmp(name, "qop")) { - ah->qop = value; - } else if (!strcmp(name, "nc")) { - ah->nc = value; - } else if (!strcmp(name, "nonce")) { - ah->nonce = value; - } - } - - // CGI needs it as REMOTE_USER - if (ah->user != NULL) { - conn->request_info.remote_user = mg_strdup(ah->user); - } else { - return 0; - } - - return 1; -} - -// Authorize against the opened passwords file. Return 1 if authorized. -static int authorize(struct mg_connection *conn, FILE *fp) { - struct ah ah; - char line[256], f_user[256], ha1[256], f_domain[256], buf[MG_BUF_LEN]; - - if (!parse_auth_header(conn, buf, sizeof(buf), &ah)) { - return 0; - } - - // Loop over passwords file - while (fgets(line, sizeof(line), fp) != NULL) { - if (sscanf(line, "%[^:]:%[^:]:%s", f_user, f_domain, ha1) != 3) { - continue; - } - - if (!strcmp(ah.user, f_user) && - !strcmp(conn->ctx->config[AUTHENTICATION_DOMAIN], f_domain)) - return check_password( - conn->request_info.request_method, - ha1, ah.uri, ah.nonce, ah.nc, ah.cnonce, ah.qop, - ah.response); - } - - return 0; -} - -// Return 1 if request is authorised, 0 otherwise. -static int check_authorization(struct mg_connection *conn, const char *path) { - FILE *fp; - char fname[PATH_MAX]; - struct vec uri_vec, filename_vec; - const char *list; - int authorized; - - fp = NULL; - authorized = 1; - - list = conn->ctx->config[PROTECT_URI]; - while ((list = next_option(list, &uri_vec, &filename_vec)) != NULL) { - if (!memcmp(conn->request_info.uri, uri_vec.ptr, uri_vec.len)) { - mg_snprintf(conn, fname, sizeof(fname), "%.*s", - (int) filename_vec.len, filename_vec.ptr); - if ((fp = mg_fopen(fname, "r")) == NULL) { - cry(conn, "%s: cannot open %s: %s", __func__, fname, strerror(errno)); - } - break; - } - } - - if (fp == NULL) { - fp = open_auth_file(conn, path); - } - - if (fp != NULL) { - authorized = authorize(conn, fp); - (void) fclose(fp); - } - - return authorized; -} - -static void send_authorization_request(struct mg_connection *conn) { - conn->status_code = 401; - (void) mg_printf(conn, - "HTTP/1.1 401 Unauthorized\r\n" - "Content-Length: 0\r\n" - "WWW-Authenticate: Digest qop=\"auth\", " - "realm=\"%s\", nonce=\"%lu\"\r\n\r\n", - conn->ctx->config[AUTHENTICATION_DOMAIN], - (unsigned long) time(NULL)); -} - -static int is_authorized_for_put(struct mg_connection *conn) { - FILE *fp; - int ret = 0; - - fp = conn->ctx->config[PUT_DELETE_PASSWORDS_FILE] == NULL ? NULL : - mg_fopen(conn->ctx->config[PUT_DELETE_PASSWORDS_FILE], "r"); - - if (fp != NULL) { - ret = authorize(conn, fp); - (void) fclose(fp); - } - - return ret; -} - -int mg_modify_passwords_file(const char *fname, const char *domain, - const char *user, const char *pass) { - int found; - char line[512], u[512], d[512], ha1[33], tmp[PATH_MAX]; - FILE *fp, *fp2; - - found = 0; - fp = fp2 = NULL; - - // Regard empty password as no password - remove user record. - if (pass != NULL && pass[0] == '\0') { - pass = NULL; - } - - (void) snprintf(tmp, sizeof(tmp), "%s.tmp", fname); - - // Create the file if does not exist - if ((fp = mg_fopen(fname, "a+")) != NULL) { - (void) fclose(fp); - } - - // Open the given file and temporary file - if ((fp = mg_fopen(fname, "r")) == NULL) { - return 0; - } else if ((fp2 = mg_fopen(tmp, "w+")) == NULL) { - fclose(fp); - return 0; - } - - // Copy the stuff to temporary file - while (fgets(line, sizeof(line), fp) != NULL) { - if (sscanf(line, "%[^:]:%[^:]:%*s", u, d) != 2) { - continue; - } - - if (!strcmp(u, user) && !strcmp(d, domain)) { - found++; - if (pass != NULL) { - mg_md5(ha1, user, ":", domain, ":", pass, NULL); - fprintf(fp2, "%s:%s:%s\n", user, domain, ha1); - } - } else { - (void) fprintf(fp2, "%s", line); - } - } - - // If new user, just add it - if (!found && pass != NULL) { - mg_md5(ha1, user, ":", domain, ":", pass, NULL); - (void) fprintf(fp2, "%s:%s:%s\n", user, domain, ha1); - } - - // Close files - (void) fclose(fp); - (void) fclose(fp2); - - // Put the temp file in place of real file - (void) mg_remove(fname); - (void) mg_rename(tmp, fname); - - return 1; -} - -struct de { - struct mg_connection *conn; - char *file_name; - struct mgstat st; -}; - -static void url_encode(const char *src, char *dst, size_t dst_len) { - static const char *dont_escape = "._-$,;~()"; - static const char *hex = "0123456789abcdef"; - const char *end = dst + dst_len - 1; - - for (; *src != '\0' && dst < end; src++, dst++) { - if (isalnum(*(const unsigned char *) src) || - strchr(dont_escape, * (const unsigned char *) src) != NULL) { - *dst = *src; - } else if (dst + 2 < end) { - dst[0] = '%'; - dst[1] = hex[(* (const unsigned char *) src) >> 4]; - dst[2] = hex[(* (const unsigned char *) src) & 0xf]; - dst += 2; - } - } - - *dst = '\0'; -} - -static void print_dir_entry(struct de *de) { - char size[64], mod[64], href[PATH_MAX]; - - if (de->st.is_directory) { - (void) mg_snprintf(de->conn, size, sizeof(size), "%s", "[DIRECTORY]"); - } else { - // We use (signed) cast below because MSVC 6 compiler cannot - // convert unsigned __int64 to double. Sigh. - if (de->st.size < 1024) { - (void) mg_snprintf(de->conn, size, sizeof(size), - "%lu", (unsigned long) de->st.size); - } else if (de->st.size < 0x100000) { - (void) mg_snprintf(de->conn, size, sizeof(size), - "%.1fk", (double) de->st.size / 1024.0); - } else if (de->st.size < 0x40000000) { - (void) mg_snprintf(de->conn, size, sizeof(size), - "%.1fM", (double) de->st.size / 1048576); - } else { - (void) mg_snprintf(de->conn, size, sizeof(size), - "%.1fG", (double) de->st.size / 1073741824); - } - } - (void) strftime(mod, sizeof(mod), "%d-%b-%Y %H:%M", localtime(&de->st.mtime)); - url_encode(de->file_name, href, sizeof(href)); - de->conn->num_bytes_sent += mg_printf(de->conn, - "%s%s" - " %s  %s\n", - de->conn->request_info.uri, href, de->st.is_directory ? "/" : "", - de->file_name, de->st.is_directory ? "/" : "", mod, size); -} - -// This function is called from send_directory() and used for -// sorting directory entries by size, or name, or modification time. -// On windows, __cdecl specification is needed in case if project is built -// with __stdcall convention. qsort always requires __cdels callback. -static int WINCDECL compare_dir_entries(const void *p1, const void *p2) { - const struct de *a = (const struct de *) p1, *b = (const struct de *) p2; - const char *query_string = a->conn->request_info.query_string; - int cmp_result = 0; - - if (query_string == NULL) { - query_string = "na"; - } - - if (a->st.is_directory && !b->st.is_directory) { - return -1; // Always put directories on top - } else if (!a->st.is_directory && b->st.is_directory) { - return 1; // Always put directories on top - } else if (*query_string == 'n') { - cmp_result = strcmp(a->file_name, b->file_name); - } else if (*query_string == 's') { - cmp_result = a->st.size == b->st.size ? 0 : - a->st.size > b->st.size ? 1 : -1; - } else if (*query_string == 'd') { - cmp_result = a->st.mtime == b->st.mtime ? 0 : - a->st.mtime > b->st.mtime ? 1 : -1; - } - - return query_string[1] == 'd' ? -cmp_result : cmp_result; -} - -static int must_hide_file(struct mg_connection *conn, const char *path) { - const char *pw_pattern = "**" PASSWORDS_FILE_NAME "$"; - const char *pattern = conn->ctx->config[HIDE_FILES]; - return match_prefix(pw_pattern, strlen(pw_pattern), path) > 0 || - (pattern != NULL && match_prefix(pattern, strlen(pattern), path) > 0); -} - -static int scan_directory(struct mg_connection *conn, const char *dir, - void *data, void (*cb)(struct de *, void *)) { - char path[PATH_MAX]; - struct dirent *dp; - DIR *dirp; - struct de de; - - if ((dirp = opendir(dir)) == NULL) { - return 0; - } else { - de.conn = conn; - - while ((dp = readdir(dirp)) != NULL) { - // Do not show current dir and hidden files - if (!strcmp(dp->d_name, ".") || - !strcmp(dp->d_name, "..") || - must_hide_file(conn, dp->d_name)) { - continue; - } - - mg_snprintf(conn, path, sizeof(path), "%s%c%s", dir, '/', dp->d_name); - - // If we don't memset stat structure to zero, mtime will have - // garbage and strftime() will segfault later on in - // print_dir_entry(). memset is required only if mg_stat() - // fails. For more details, see - // http://code.google.com/p/mongoose/issues/detail?id=79 - if (mg_stat(path, &de.st) != 0) { - memset(&de.st, 0, sizeof(de.st)); - } - de.file_name = dp->d_name; - - cb(&de, data); - } - (void) closedir(dirp); - } - return 1; -} - -struct dir_scan_data { - struct de *entries; - int num_entries; - int arr_size; -}; - -static void dir_scan_callback(struct de *de, void *data) { - struct dir_scan_data *dsd = (struct dir_scan_data *) data; - - if (dsd->entries == NULL || dsd->num_entries >= dsd->arr_size) { - dsd->arr_size *= 2; - dsd->entries = (struct de *) realloc(dsd->entries, dsd->arr_size * - sizeof(dsd->entries[0])); - } - if (dsd->entries == NULL) { - // TODO(lsm): propagate an error to the caller - dsd->num_entries = 0; - } else { - dsd->entries[dsd->num_entries].file_name = mg_strdup(de->file_name); - dsd->entries[dsd->num_entries].st = de->st; - dsd->entries[dsd->num_entries].conn = de->conn; - dsd->num_entries++; - } -} - -static void handle_directory_request(struct mg_connection *conn, - const char *dir) { - int i, sort_direction; - struct dir_scan_data data = { NULL, 0, 128 }; - - if (!scan_directory(conn, dir, &data, dir_scan_callback)) { - send_http_error(conn, 500, "Cannot open directory", - "Error: opendir(%s): %s", dir, strerror(ERRNO)); - return; - } - - sort_direction = conn->request_info.query_string != NULL && - conn->request_info.query_string[1] == 'd' ? 'a' : 'd'; - - conn->must_close = 1; - mg_printf(conn, "%s", - "HTTP/1.1 200 OK\r\n" - "Connection: close\r\n" - "Content-Type: text/html; charset=utf-8\r\n\r\n"); - - conn->num_bytes_sent += mg_printf(conn, - "Index of %s" - "" - "

Index of %s

"
-      ""
-      ""
-      ""
-      "",
-      conn->request_info.uri, conn->request_info.uri,
-      sort_direction, sort_direction, sort_direction);
-
-  // Print first entry - link to a parent directory
-  conn->num_bytes_sent += mg_printf(conn,
-      ""
-      "\n",
-      conn->request_info.uri, "..", "Parent directory", "-", "-");
-
-  // Sort and print directory entries
-  qsort(data.entries, (size_t) data.num_entries, sizeof(data.entries[0]),
-        compare_dir_entries);
-  for (i = 0; i < data.num_entries; i++) {
-    print_dir_entry(&data.entries[i]);
-    free(data.entries[i].file_name);
-  }
-  free(data.entries);
-
-  conn->num_bytes_sent += mg_printf(conn, "%s", "
NameModifiedSize

%s %s  %s
"); - conn->status_code = 200; -} - -// Send len bytes from the opened file to the client. -static void send_file_data(struct mg_connection *conn, FILE *fp, int64_t len) { - char buf[MG_BUF_LEN]; - int to_read, num_read, num_written; - - while (len > 0) { - // Calculate how much to read from the file in the buffer - to_read = sizeof(buf); - if ((int64_t) to_read > len) { - to_read = (int) len; - } - - // Read from file, exit the loop on error - if ((num_read = fread(buf, 1, (size_t)to_read, fp)) <= 0) { - break; - } - - // Send read bytes to the client, exit the loop on error - if ((num_written = mg_write(conn, buf, (size_t)num_read)) != num_read) { - break; - } - - // Both read and were successful, adjust counters - conn->num_bytes_sent += num_written; - len -= num_written; - } -} - -static int parse_range_header(const char *header, int64_t *a, int64_t *b) { - return sscanf(header, "bytes=%" INT64_FMT "-%" INT64_FMT, a, b); -} - -static void gmt_time_string(char *buf, size_t buf_len, time_t *t) { - strftime(buf, buf_len, "%a, %d %b %Y %H:%M:%S GMT", gmtime(t)); -} - -static void construct_etag(char *buf, size_t buf_len, - const struct mgstat *stp) { - snprintf(buf, buf_len, "\"%lx.%" INT64_FMT "\"", - (unsigned long) stp->mtime, stp->size); -} - -static void handle_file_request(struct mg_connection *conn, const char *path, - struct mgstat *stp) { - char date[64], lm[64], etag[64], range[64]; - const char *msg = "OK", *hdr; - time_t curtime = time(NULL); - int64_t cl, r1, r2; - struct vec mime_vec; - FILE *fp; - int n; - - get_mime_type(conn->ctx, path, &mime_vec); - cl = stp->size; - conn->status_code = 200; - range[0] = '\0'; - - if ((fp = mg_fopen(path, "rb")) == NULL) { - send_http_error(conn, 500, http_500_error, - "fopen(%s): %s", path, strerror(ERRNO)); - return; - } - set_close_on_exec(fileno(fp)); - - // If Range: header specified, act accordingly - r1 = r2 = 0; - hdr = mg_get_header(conn, "Range"); - if (hdr != NULL && (n = parse_range_header(hdr, &r1, &r2)) > 0) { - conn->status_code = 206; - (void) fseeko(fp, r1, SEEK_SET); - cl = n == 2 ? r2 - r1 + 1: cl - r1; - (void) mg_snprintf(conn, range, sizeof(range), - "Content-Range: bytes " - "%" INT64_FMT "-%" - INT64_FMT "/%" INT64_FMT "\r\n", - r1, r1 + cl - 1, stp->size); - msg = "Partial Content"; - } - - // Prepare Etag, Date, Last-Modified headers. Must be in UTC, according to - // http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.3 - gmt_time_string(date, sizeof(date), &curtime); - gmt_time_string(lm, sizeof(lm), &stp->mtime); - construct_etag(etag, sizeof(etag), stp); - - (void) mg_printf(conn, - "HTTP/1.1 %d %s\r\n" - "Date: %s\r\n" - "Last-Modified: %s\r\n" - "Etag: %s\r\n" - "Content-Type: %.*s\r\n" - "Content-Length: %" INT64_FMT "\r\n" - "Connection: %s\r\n" - "Accept-Ranges: bytes\r\n" - "%s\r\n", - conn->status_code, msg, date, lm, etag, (int) mime_vec.len, - mime_vec.ptr, cl, suggest_connection_header(conn), range); - - if (strcmp(conn->request_info.request_method, "HEAD") != 0) { - send_file_data(conn, fp, cl); - } - (void) fclose(fp); -} - -void mg_send_file(struct mg_connection *conn, const char *path) { - struct mgstat st; - if (mg_stat(path, &st) == 0) { - handle_file_request(conn, path, &st); - } else { - send_http_error(conn, 404, "Not Found", "%s", "File not found"); - } -} - - -// Parse HTTP headers from the given buffer, advance buffer to the point -// where parsing stopped. -static void parse_http_headers(char **buf, struct mg_request_info *ri) { - int i; - - for (i = 0; i < (int) ARRAY_SIZE(ri->http_headers); i++) { - ri->http_headers[i].name = skip_quoted(buf, ":", " ", 0); - ri->http_headers[i].value = skip(buf, "\r\n"); - if (ri->http_headers[i].name[0] == '\0') - break; - ri->num_headers = i + 1; - } -} - -static int is_valid_http_method(const char *method) { - return !strcmp(method, "GET") || !strcmp(method, "POST") || - !strcmp(method, "HEAD") || !strcmp(method, "CONNECT") || - !strcmp(method, "PUT") || !strcmp(method, "DELETE") || - !strcmp(method, "OPTIONS") || !strcmp(method, "PROPFIND"); -} - -// Parse HTTP request, fill in mg_request_info structure. -// This function modifies the buffer by NUL-terminating -// HTTP request components, header names and header values. -static int parse_http_message(char *buf, int len, struct mg_request_info *ri) { - int request_length = get_request_len(buf, len); - if (request_length > 0) { - // Reset attributes. DO NOT TOUCH is_ssl, remote_ip, remote_port - ri->remote_user = ri->request_method = ri->uri = ri->http_version = NULL; - ri->num_headers = 0; - - buf[request_length - 1] = '\0'; - - // RFC says that all initial whitespaces should be ingored - while (*buf != '\0' && isspace(* (unsigned char *) buf)) { - buf++; - } - ri->request_method = skip(&buf, " "); - ri->uri = skip(&buf, " "); - ri->http_version = skip(&buf, "\r\n"); - parse_http_headers(&buf, ri); - } - return request_length; -} - -static int parse_http_request(char *buf, int len, struct mg_request_info *ri) { - int result = parse_http_message(buf, len, ri); - if (result > 0 && - is_valid_http_method(ri->request_method) && - !strncmp(ri->http_version, "HTTP/", 5)) { - ri->http_version += 5; // Skip "HTTP/" - } else { - result = -1; - } - return result; -} - -static int parse_http_response(char *buf, int len, struct mg_request_info *ri) { - int result = parse_http_message(buf, len, ri); - return result > 0 && !strncmp(ri->request_method, "HTTP/", 5) ? result : -1; -} - -// Keep reading the input (either opened file descriptor fd, or socket sock, -// or SSL descriptor ssl) into buffer buf, until \r\n\r\n appears in the -// buffer (which marks the end of HTTP request). Buffer buf may already -// have some data. The length of the data is stored in nread. -// Upon every read operation, increase nread by the number of bytes read. -static int read_request(FILE *fp, struct mg_connection *conn, - char *buf, int bufsiz, int *nread) { - int request_len, n = 1; - - request_len = get_request_len(buf, *nread); - while (*nread < bufsiz && request_len == 0 && n > 0) { - n = pull(fp, conn, buf + *nread, bufsiz - *nread); - if (n > 0) { - *nread += n; - request_len = get_request_len(buf, *nread); - } - } - - if (n < 0) { - // recv() error -> propagate error; do not process a b0rked-with-very-high-probability request - return -1; - } - return request_len; -} - -// For given directory path, substitute it to valid index file. -// Return 0 if index file has been found, -1 if not found. -// If the file is found, it's stats is returned in stp. -static int substitute_index_file(struct mg_connection *conn, char *path, - size_t path_len, struct mgstat *stp) { - const char *list = conn->ctx->config[INDEX_FILES]; - struct mgstat st; - struct vec filename_vec; - size_t n = strlen(path); - int found = 0; - - // The 'path' given to us points to the directory. Remove all trailing - // directory separator characters from the end of the path, and - // then append single directory separator character. - while (n > 0 && path[n - 1] == '/') { - n--; - } - path[n] = '/'; - - // Traverse index files list. For each entry, append it to the given - // path and see if the file exists. If it exists, break the loop - while ((list = next_option(list, &filename_vec, NULL)) != NULL) { - - // Ignore too long entries that may overflow path buffer - if (filename_vec.len > path_len - (n + 2)) - continue; - - // Prepare full path to the index file - (void) mg_strlcpy(path + n + 1, filename_vec.ptr, filename_vec.len + 1); - - // Does it exist? - if (mg_stat(path, &st) == 0) { - // Yes it does, break the loop - *stp = st; - found = 1; - break; - } - } - - // If no index file exists, restore directory path - if (!found) { - path[n] = '\0'; - } - - return found; -} - -// Return True if we should reply 304 Not Modified. -static int is_not_modified(const struct mg_connection *conn, - const struct mgstat *stp) { - char etag[64]; - const char *ims = mg_get_header(conn, "If-Modified-Since"); - const char *inm = mg_get_header(conn, "If-None-Match"); - construct_etag(etag, sizeof(etag), stp); - return (inm != NULL && !mg_strcasecmp(etag, inm)) || - (ims != NULL && stp->mtime <= parse_date_string(ims)); -} - -static int forward_body_data(struct mg_connection *conn, FILE *fp, - SOCKET sock, SSL *ssl) { - const char *expect, *body; - char buf[MG_BUF_LEN]; - int to_read, nread, buffered_len, success = 0; - - expect = mg_get_header(conn, "Expect"); - assert(fp != NULL); - - if (conn->content_len == -1) { - send_http_error(conn, 411, "Length Required", "%s", ""); - } else if (expect != NULL && mg_strcasecmp(expect, "100-continue")) { - send_http_error(conn, 417, "Expectation Failed", "%s", ""); - } else { - if (expect != NULL) { - (void) mg_printf(conn, "%s", "HTTP/1.1 100 Continue\r\n\r\n"); - } - - body = conn->buf + conn->request_len + conn->consumed_content; - buffered_len = &conn->buf[conn->data_len] - body; - assert(buffered_len >= 0); - assert(conn->consumed_content == 0); - - if (buffered_len > 0) { - if ((int64_t) buffered_len > conn->content_len) { - buffered_len = (int) conn->content_len; - } - push(fp, sock, ssl, body, (int64_t) buffered_len); - conn->consumed_content += buffered_len; - } - - nread = 0; - while (conn->consumed_content < conn->content_len) { - to_read = sizeof(buf); - if ((int64_t) to_read > conn->content_len - conn->consumed_content) { - to_read = (int) (conn->content_len - conn->consumed_content); - } - nread = pull(NULL, conn, buf, to_read); - if (nread <= 0 || push(fp, sock, ssl, buf, nread) != nread) { - break; - } - conn->consumed_content += nread; - } - - if (conn->consumed_content == conn->content_len) { - success = nread >= 0; - } - - // Each error code path in this function must send an error - if (!success) { - send_http_error(conn, 577, http_500_error, "%s", ""); - } - } - - return success; -} - -#if !defined(NO_CGI) -// This structure helps to create an environment for the spawned CGI program. -// Environment is an array of "VARIABLE=VALUE\0" ASCIIZ strings, -// last element must be NULL. -// However, on Windows there is a requirement that all these VARIABLE=VALUE\0 -// strings must reside in a contiguous buffer. The end of the buffer is -// marked by two '\0' characters. -// We satisfy both worlds: we create an envp array (which is vars), all -// entries are actually pointers inside buf. -struct cgi_env_block { - struct mg_connection *conn; - char buf[CGI_ENVIRONMENT_SIZE]; // Environment buffer - int len; // Space taken - char *vars[MAX_CGI_ENVIR_VARS]; // char **envp - int nvars; // Number of variables -}; - -static char *addenv(struct cgi_env_block *block, - PRINTF_FORMAT_STRING(const char *fmt), ...) - PRINTF_ARGS(2, 3); - -// Append VARIABLE=VALUE\0 string to the buffer, and add a respective -// pointer into the vars array. -static char *addenv(struct cgi_env_block *block, const char *fmt, ...) { - int n, space; - char *added; - va_list ap; - - // Calculate how much space is left in the buffer - space = sizeof(block->buf) - block->len - 2; - assert(space >= 0); - - // Make a pointer to the free space int the buffer - added = block->buf + block->len; - - // Copy VARIABLE=VALUE\0 string into the free space - va_start(ap, fmt); - n = mg_vsnprintf(block->conn, added, (size_t) space, fmt, ap); - va_end(ap); - - // Make sure we do not overflow buffer and the envp array - if (n > 0 && n + 1 < space && - block->nvars < (int) ARRAY_SIZE(block->vars) - 2) { - // Append a pointer to the added string into the envp array - block->vars[block->nvars++] = added; - // Bump up used length counter. Include \0 terminator - block->len += n + 1; - } else { - cry(block->conn, "%s: CGI env buffer truncated for [%s]", __func__, fmt); - } - - return added; -} - -static void prepare_cgi_environment(struct mg_connection *conn, - const char *prog, - struct cgi_env_block *blk) { - const char *s, *slash; - struct vec var_vec; - char *p, src_addr[20]; - int i; - - blk->len = blk->nvars = 0; - blk->conn = conn; - sockaddr_to_string(src_addr, sizeof(src_addr), &conn->client.rsa); - - addenv(blk, "SERVER_NAME=%s", conn->ctx->config[AUTHENTICATION_DOMAIN]); - addenv(blk, "SERVER_ROOT=%s", conn->ctx->config[DOCUMENT_ROOT]); - addenv(blk, "DOCUMENT_ROOT=%s", conn->ctx->config[DOCUMENT_ROOT]); - - // Prepare the environment block - addenv(blk, "%s", "GATEWAY_INTERFACE=CGI/1.1"); - addenv(blk, "%s", "SERVER_PROTOCOL=HTTP/1.1"); - addenv(blk, "%s", "REDIRECT_STATUS=200"); // For PHP - - // TODO(lsm): fix this for IPv6 case - addenv(blk, "SERVER_PORT=%d", ntohs(conn->client.lsa.sin.sin_port)); - - addenv(blk, "REQUEST_METHOD=%s", conn->request_info.request_method); - addenv(blk, "REMOTE_ADDR=%s", src_addr); - addenv(blk, "REMOTE_PORT=%d", conn->request_info.remote_port); - addenv(blk, "REQUEST_URI=%s", conn->request_info.uri); - - // SCRIPT_NAME - assert(conn->request_info.uri[0] == '/'); - slash = strrchr(conn->request_info.uri, '/'); - if ((s = strrchr(prog, '/')) == NULL) - s = prog; - addenv(blk, "SCRIPT_NAME=%.*s%s", (int) (slash - conn->request_info.uri), - conn->request_info.uri, s); - - addenv(blk, "SCRIPT_FILENAME=%s", prog); - addenv(blk, "PATH_TRANSLATED=%s", prog); - addenv(blk, "HTTPS=%s", conn->ssl == NULL ? "off" : "on"); - - if ((s = mg_get_header(conn, "Content-Type")) != NULL) - addenv(blk, "CONTENT_TYPE=%s", s); - - if (conn->request_info.query_string != NULL) - addenv(blk, "QUERY_STRING=%s", conn->request_info.query_string); - - if ((s = mg_get_header(conn, "Content-Length")) != NULL) - addenv(blk, "CONTENT_LENGTH=%s", s); - - if ((s = getenv("PATH")) != NULL) - addenv(blk, "PATH=%s", s); - - if (conn->path_info != NULL) { - addenv(blk, "PATH_INFO=%s", conn->path_info); - } - -#if defined(_WIN32) - if ((s = getenv("COMSPEC")) != NULL) { - addenv(blk, "COMSPEC=%s", s); - } - if ((s = getenv("SYSTEMROOT")) != NULL) { - addenv(blk, "SYSTEMROOT=%s", s); - } - if ((s = getenv("SystemDrive")) != NULL) { - addenv(blk, "SystemDrive=%s", s); - } -#else - if ((s = getenv("LD_LIBRARY_PATH")) != NULL) - addenv(blk, "LD_LIBRARY_PATH=%s", s); -#endif // _WIN32 - - if ((s = getenv("PERLLIB")) != NULL) - addenv(blk, "PERLLIB=%s", s); - - if (conn->request_info.remote_user != NULL) { - addenv(blk, "REMOTE_USER=%s", conn->request_info.remote_user); - addenv(blk, "%s", "AUTH_TYPE=Digest"); - } - - // Add all headers as HTTP_* variables - for (i = 0; i < conn->request_info.num_headers; i++) { - p = addenv(blk, "HTTP_%s=%s", - conn->request_info.http_headers[i].name, - conn->request_info.http_headers[i].value); - - // Convert variable name into uppercase, and change - to _ - for (; *p != '=' && *p != '\0'; p++) { - if (*p == '-') - *p = '_'; - *p = (char) toupper(* (unsigned char *) p); - } - } - - // Add user-specified variables - s = conn->ctx->config[CGI_ENVIRONMENT]; - while ((s = next_option(s, &var_vec, NULL)) != NULL) { - addenv(blk, "%.*s", (int) var_vec.len, var_vec.ptr); - } - - blk->vars[blk->nvars++] = NULL; - blk->buf[blk->len++] = '\0'; - - assert(blk->nvars < (int) ARRAY_SIZE(blk->vars)); - assert(blk->len > 0); - assert(blk->len < (int) sizeof(blk->buf)); -} - -static void handle_cgi_request(struct mg_connection *conn, const char *prog) { - int headers_len, data_len, i, fd_stdin[2], fd_stdout[2]; - const char *status, *status_text; - char buf[16384], *pbuf, dir[PATH_MAX], *p; - struct mg_request_info ri; - ri.num_headers = 0; - struct cgi_env_block blk; - FILE *in, *out; - pid_t pid; - - prepare_cgi_environment(conn, prog, &blk); - - // CGI must be executed in its own directory. 'dir' must point to the - // directory containing executable program, 'p' must point to the - // executable program name relative to 'dir'. - (void) mg_snprintf(conn, dir, sizeof(dir), "%s", prog); - if ((p = strrchr(dir, '/')) != NULL) { - *p++ = '\0'; - } else { - dir[0] = '.', dir[1] = '\0'; - p = (char *) prog; - } - - pid = (pid_t) -1; - fd_stdin[0] = fd_stdin[1] = fd_stdout[0] = fd_stdout[1] = -1; - in = out = NULL; - - if (pipe(fd_stdin) != 0 || pipe(fd_stdout) != 0) { - send_http_error(conn, 500, http_500_error, - "Cannot create CGI pipe: %s", strerror(ERRNO)); - goto done; - } else if ((pid = spawn_process(conn, p, blk.buf, blk.vars, - fd_stdin[0], fd_stdout[1], dir)) == (pid_t) -1) { - send_http_error(conn, 500, http_500_error, - "Cannot spawn CGI process [%s]: %s", prog, strerror(ERRNO)); - goto done; - } - - // spawn_process() must close those! - // If we don't mark them as closed, close() attempt before - // return from this function throws an exception on Windows. - // Windows does not like when closed descriptor is closed again. - fd_stdin[0] = fd_stdout[1] = -1; - - if ((in = fdopen(fd_stdin[1], "wb")) == NULL || - (out = fdopen(fd_stdout[0], "rb")) == NULL) { - send_http_error(conn, 500, http_500_error, - "fopen: %s", strerror(ERRNO)); - goto done; - } - - setbuf(in, NULL); - setbuf(out, NULL); - - // Send POST data to the CGI process if needed - if (!strcmp(conn->request_info.request_method, "POST") && - !forward_body_data(conn, in, INVALID_SOCKET, NULL)) { - goto done; - } - - // Close so child gets an EOF. - fclose(in); - in = NULL; - fd_stdin[1] = -1; - - // Now read CGI reply into a buffer. We need to set correct - // status code, thus we need to see all HTTP headers first. - // Do not send anything back to client, until we buffer in all - // HTTP headers. - data_len = 0; - headers_len = read_request(out, conn, buf, sizeof(buf), &data_len); - if (headers_len <= 0) { - send_http_error(conn, 500, http_500_error, - "CGI program sent malformed or too big (>%u bytes) " - "HTTP headers: [%.*s]", - (unsigned) sizeof(buf), data_len, buf); - goto done; - } - pbuf = buf; - buf[headers_len - 1] = '\0'; - parse_http_headers(&pbuf, &ri); - - // Make up and send the status line - status_text = "OK"; - if ((status = get_header(&ri, "Status")) != NULL) { - conn->status_code = atoi(status); - status_text = status; - while (isdigit(* (unsigned char *) status_text) || *status_text == ' ') { - status_text++; - } - } else if (get_header(&ri, "Location") != NULL) { - conn->status_code = 302; - } else { - conn->status_code = 200; - } - if (get_header(&ri, "Connection") != NULL && - !mg_strcasecmp(get_header(&ri, "Connection"), "keep-alive")) { - conn->must_close = 1; - } - (void) mg_printf(conn, "HTTP/1.1 %d %s\r\n", conn->status_code, - status_text); - - // Send headers - for (i = 0; i < ri.num_headers; i++) { - mg_printf(conn, "%s: %s\r\n", - ri.http_headers[i].name, ri.http_headers[i].value); - } - (void) mg_write(conn, "\r\n", 2); - - // Send chunk of data that may have been read after the headers - conn->num_bytes_sent += mg_write(conn, buf + headers_len, - (size_t)(data_len - headers_len)); - - // Read the rest of CGI output and send to the client - send_file_data(conn, out, INT64_MAX); - -done: - if (pid != (pid_t) -1) { - kill(pid, SIGKILL); - } - if (fd_stdin[0] != -1) { - (void) close(fd_stdin[0]); - } - if (fd_stdout[1] != -1) { - (void) close(fd_stdout[1]); - } - - if (in != NULL) { - (void) fclose(in); - } else if (fd_stdin[1] != -1) { - (void) close(fd_stdin[1]); - } - - if (out != NULL) { - (void) fclose(out); - } else if (fd_stdout[0] != -1) { - (void) close(fd_stdout[0]); - } -} -#endif // !NO_CGI - -// For a given PUT path, create all intermediate subdirectories -// for given path. Return 0 if the path itself is a directory, -// or -1 on error, 1 if OK. -static int put_dir(const char *path) { - char buf[PATH_MAX]; - const char *s, *p; - struct mgstat st; - int len, res = 1; - - for (s = p = path + 2; (p = strchr(s, '/')) != NULL; s = ++p) { - len = p - path; - if (len >= (int) sizeof(buf)) { - res = -1; - break; - } - memcpy(buf, path, len); - buf[len] = '\0'; - - // Try to create intermediate directory - DEBUG_TRACE(("mkdir(%s)", buf)); - if (mg_stat(buf, &st) == -1 && mg_mkdir(buf, 0755) != 0) { - res = -1; - break; - } - - // Is path itself a directory? - if (p[1] == '\0') { - res = 0; - } - } - - return res; -} - -static void put_file(struct mg_connection *conn, const char *path) { - struct mgstat st; - const char *range; - int64_t r1, r2; - FILE *fp; - int rc; - - conn->status_code = mg_stat(path, &st) == 0 ? 200 : 201; - - if ((rc = put_dir(path)) == 0) { - mg_printf(conn, "HTTP/1.1 %d OK\r\n\r\n", conn->status_code); - } else if (rc == -1) { - send_http_error(conn, 500, http_500_error, - "put_dir(%s): %s", path, strerror(ERRNO)); - } else if ((fp = mg_fopen(path, "wb+")) == NULL) { - send_http_error(conn, 500, http_500_error, - "fopen(%s): %s", path, strerror(ERRNO)); - } else { - set_close_on_exec(fileno(fp)); - range = mg_get_header(conn, "Content-Range"); - r1 = r2 = 0; - if (range != NULL && parse_range_header(range, &r1, &r2) > 0) { - conn->status_code = 206; - // TODO(lsm): handle seek error - (void) fseeko(fp, r1, SEEK_SET); - } - if (forward_body_data(conn, fp, INVALID_SOCKET, NULL)) { - (void) mg_printf(conn, "HTTP/1.1 %d OK\r\n\r\n", conn->status_code); - } - (void) fclose(fp); - } -} - -static void send_ssi_file(struct mg_connection *, const char *, FILE *, int); - -static void do_ssi_include(struct mg_connection *conn, const char *ssi, - char *tag, int include_level) { - char file_name[MG_BUF_LEN], path[PATH_MAX], *p; - FILE *fp; - - // sscanf() is safe here, since send_ssi_file() also uses buffer - // of size MG_BUF_LEN to get the tag. So strlen(tag) is always < MG_BUF_LEN. - if (sscanf(tag, " virtual=\"%[^\"]\"", file_name) == 1) { - // File name is relative to the webserver root - (void) mg_snprintf(conn, path, sizeof(path), "%s%c%s", - conn->ctx->config[DOCUMENT_ROOT], '/', file_name); - } else if (sscanf(tag, " file=\"%[^\"]\"", file_name) == 1) { - // File name is relative to the webserver working directory - // or it is absolute system path - (void) mg_snprintf(conn, path, sizeof(path), "%s", file_name); - } else if (sscanf(tag, " \"%[^\"]\"", file_name) == 1) { - // File name is relative to the currect document - (void) mg_snprintf(conn, path, sizeof(path), "%s", ssi); - if ((p = strrchr(path, '/')) != NULL) { - p[1] = '\0'; - } - (void) mg_snprintf(conn, path + strlen(path), - sizeof(path) - strlen(path), "%s", file_name); - } else { - cry(conn, "Bad SSI #include: [%s]", tag); - return; - } - - if ((fp = mg_fopen(path, "rb")) == NULL) { - cry(conn, "Cannot open SSI #include: [%s]: fopen(%s): %s", - tag, path, strerror(ERRNO)); - } else { - set_close_on_exec(fileno(fp)); - if (match_prefix(conn->ctx->config[SSI_EXTENSIONS], - strlen(conn->ctx->config[SSI_EXTENSIONS]), path) > 0) { - send_ssi_file(conn, path, fp, include_level + 1); - } else { - send_file_data(conn, fp, INT64_MAX); - } - (void) fclose(fp); - } -} - -#if !defined(NO_POPEN) -static void do_ssi_exec(struct mg_connection *conn, char *tag) { - char cmd[MG_BUF_LEN]; - FILE *fp; - - if (sscanf(tag, " \"%[^\"]\"", cmd) != 1) { - cry(conn, "Bad SSI #exec: [%s]", tag); - } else if ((fp = popen(cmd, "r")) == NULL) { - cry(conn, "Cannot SSI #exec: [%s]: %s", cmd, strerror(ERRNO)); - } else { - send_file_data(conn, fp, INT64_MAX); - (void) pclose(fp); - } -} -#endif // !NO_POPEN - -static void send_ssi_file(struct mg_connection *conn, const char *path, - FILE *fp, int include_level) { - char buf[MG_BUF_LEN]; - int ch, len, in_ssi_tag; - - if (include_level > 10) { - cry(conn, "SSI #include level is too deep (%s)", path); - return; - } - - in_ssi_tag = 0; - len = 0; - - while ((ch = fgetc(fp)) != EOF) { - if (in_ssi_tag && ch == '>') { - in_ssi_tag = 0; - buf[len++] = (char) ch; - buf[len] = '\0'; - assert(len <= (int) sizeof(buf)); - if (len < 6 || memcmp(buf, "