1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
|
/*
* InspIRCd -- Internet Relay Chat Daemon
*
* Copyright (C) 2019 linuxdaemon <linuxdaemon.irc@gmail.com>
* Copyright (C) 2018 edef <edef@edef.eu>
* Copyright (C) 2013-2014, 2017-2020 Sadie Powell <sadie@witchery.services>
* Copyright (C) 2012-2016 Attila Molnar <attilamolnar@hush.com>
* Copyright (C) 2012 Robby <robby@chatbelgie.be>
* Copyright (C) 2009 Uli Schlachter <psychon@inspircd.org>
* Copyright (C) 2009 Daniel De Graaf <danieldg@inspircd.org>
* Copyright (C) 2008 Robin Burchell <robin+git@viroteck.net>
* Copyright (C) 2007 John Brooks <special@inspircd.org>
* Copyright (C) 2007 Dennis Friis <peavey@inspircd.org>
* Copyright (C) 2006, 2008, 2010 Craig Edwards <brain@inspircd.org>
*
* This file is part of InspIRCd. InspIRCd is free software: you can
* redistribute it and/or modify it under the terms of the GNU General Public
* License as published by the Free Software Foundation, version 2.
*
* This program is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
* FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
* details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
/// $CompilerFlags: -Ivendor_directory("http_parser")
#include "inspircd.h"
#include "iohook.h"
#include "modules/httpd.h"
#ifdef __GNUC__
# pragma GCC diagnostic push
#endif
// Fix warnings about the use of commas at end of enumerator lists and long long
// on C++03.
#if defined __clang__
# pragma clang diagnostic ignored "-Wc++11-extensions"
# pragma clang diagnostic ignored "-Wc++11-long-long"
#elif defined __GNUC__
# pragma GCC diagnostic ignored "-Wlong-long"
# if (__GNUC__ > 4) || ((__GNUC__ == 4) && (__GNUC_MINOR__ >= 8))
# pragma GCC diagnostic ignored "-Wpedantic"
# else
# pragma GCC diagnostic ignored "-pedantic"
# endif
#endif
// Fix warnings about shadowing in http_parser.
#ifdef __GNUC__
# pragma GCC diagnostic ignored "-Wshadow"
#endif
#include <http_parser.c>
#ifdef __GNUC__
# pragma GCC diagnostic pop
#endif
class ModuleHttpServer;
static ModuleHttpServer* HttpModule;
static insp::intrusive_list<HttpServerSocket> sockets;
static Events::ModuleEventProvider* aclevprov;
static Events::ModuleEventProvider* reqevprov;
static http_parser_settings parser_settings;
/** A socket used for HTTP transport
*/
class HttpServerSocket : public BufferedSocket, public Timer, public insp::intrusive_list_node<HttpServerSocket>
{
private:
friend class ModuleHttpServer;
http_parser parser;
http_parser_url url;
std::string ip;
std::string uri;
HTTPHeaders headers;
std::string body;
size_t total_buffers;
int status_code;
/** True if this object is in the cull list
*/
bool waitingcull;
bool messagecomplete;
bool Tick(time_t currtime) CXX11_OVERRIDE
{
if (!messagecomplete)
{
ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP socket %d timed out", GetFd());
Close();
return false;
}
return true;
}
template<int (HttpServerSocket::*f)()>
static int Callback(http_parser* p)
{
HttpServerSocket* sock = static_cast<HttpServerSocket*>(p->data);
return (sock->*f)();
}
template<int (HttpServerSocket::*f)(const char*, size_t)>
static int DataCallback(http_parser* p, const char* buf, size_t len)
{
HttpServerSocket* sock = static_cast<HttpServerSocket*>(p->data);
return (sock->*f)(buf, len);
}
static void ConfigureParser()
{
http_parser_settings_init(&parser_settings);
parser_settings.on_message_begin = Callback<&HttpServerSocket::OnMessageBegin>;
parser_settings.on_url = DataCallback<&HttpServerSocket::OnUrl>;
parser_settings.on_header_field = DataCallback<&HttpServerSocket::OnHeaderField>;
parser_settings.on_body = DataCallback<&HttpServerSocket::OnBody>;
parser_settings.on_message_complete = Callback<&HttpServerSocket::OnMessageComplete>;
}
int OnMessageBegin()
{
uri.clear();
header_state = HEADER_NONE;
body.clear();
total_buffers = 0;
return 0;
}
bool AcceptData(size_t len)
{
total_buffers += len;
return total_buffers < 8192;
}
int OnUrl(const char* buf, size_t len)
{
if (!AcceptData(len))
{
status_code = HTTP_STATUS_URI_TOO_LONG;
return -1;
}
uri.append(buf, len);
return 0;
}
enum { HEADER_NONE, HEADER_FIELD, HEADER_VALUE } header_state;
std::string header_field;
std::string header_value;
void OnHeaderComplete()
{
headers.SetHeader(header_field, header_value);
header_field.clear();
header_value.clear();
}
int OnHeaderField(const char* buf, size_t len)
{
if (header_state == HEADER_VALUE)
OnHeaderComplete();
header_state = HEADER_FIELD;
if (!AcceptData(len))
{
status_code = HTTP_STATUS_REQUEST_HEADER_FIELDS_TOO_LARGE;
return -1;
}
header_field.append(buf, len);
return 0;
}
int OnHeaderValue(const char* buf, size_t len)
{
header_state = HEADER_VALUE;
if (!AcceptData(len))
{
status_code = HTTP_STATUS_REQUEST_HEADER_FIELDS_TOO_LARGE;
return -1;
}
header_value.append(buf, len);
return 0;
}
int OnHeadersComplete()
{
if (header_state != HEADER_NONE)
OnHeaderComplete();
return 0;
}
int OnBody(const char* buf, size_t len)
{
if (!AcceptData(len))
{
status_code = HTTP_STATUS_PAYLOAD_TOO_LARGE;
return -1;
}
body.append(buf, len);
return 0;
}
int OnMessageComplete()
{
messagecomplete = true;
ServeData();
return 0;
}
public:
HttpServerSocket(int newfd, const std::string& IP, ListenSocket* via, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* server, unsigned int timeoutsec)
: BufferedSocket(newfd)
, Timer(timeoutsec)
, ip(IP)
, status_code(0)
, waitingcull(false)
, messagecomplete(false)
{
if ((!via->iohookprovs.empty()) && (via->iohookprovs.back()))
{
via->iohookprovs.back()->OnAccept(this, client, server);
// IOHook may have errored
if (!getError().empty())
{
ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP socket %d encountered a hook error: %s",
GetFd(), getError().c_str());
Close();
return;
}
}
parser.data = this;
http_parser_init(&parser, HTTP_REQUEST);
ServerInstance->Timers.AddTimer(this);
}
~HttpServerSocket()
{
sockets.erase(this);
}
void Close() CXX11_OVERRIDE
{
if (waitingcull || !HasFd())
return;
waitingcull = true;
BufferedSocket::Close();
ServerInstance->GlobalCulls.AddItem(this);
}
void OnError(BufferedSocketError err) CXX11_OVERRIDE
{
ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP socket %d encountered an error: %d - %s",
GetFd(), err, getError().c_str());
Close();
}
void SendHTTPError(unsigned int response, const char* errstr = NULL)
{
if (!errstr)
errstr = http_status_str((http_status)response);
ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Sending HTTP error %u: %s", response, errstr);
static HTTPHeaders empty;
std::string data = InspIRCd::Format(
"<html><head></head><body style='font-family: sans-serif; text-align: center'>"
"<h1 style='font-size: 48pt'>Error %u</h1><h2 style='font-size: 24pt'>%s</h2><hr>"
"<small>Powered by <a href='https://www.inspircd.org'>InspIRCd</a></small></body></html>",
response, errstr);
Page(data, response, &empty);
}
void SendHeaders(unsigned long size, unsigned int response, HTTPHeaders &rheaders)
{
WriteData(InspIRCd::Format("HTTP/%u.%u %u %s\r\n", parser.http_major ? parser.http_major : 1, parser.http_major ? parser.http_minor : 1, response, http_status_str((http_status)response)));
rheaders.CreateHeader("Date", InspIRCd::TimeString(ServerInstance->Time(), "%a, %d %b %Y %H:%M:%S GMT", true));
rheaders.CreateHeader("Server", INSPIRCD_BRANCH);
rheaders.SetHeader("Content-Length", ConvToStr(size));
if (size)
rheaders.CreateHeader("Content-Type", "text/html");
else
rheaders.RemoveHeader("Content-Type");
/* Supporting Connection: keep-alive causes a whole world of hurt synchronizing timeouts,
* so remove it, its not essential for what we need.
*/
rheaders.SetHeader("Connection", "Close");
WriteData(rheaders.GetFormattedHeaders());
WriteData("\r\n");
}
void OnDataReady() CXX11_OVERRIDE
{
if (parser.upgrade || HTTP_PARSER_ERRNO(&parser))
return;
http_parser_execute(&parser, &parser_settings, recvq.data(), recvq.size());
if (parser.upgrade)
SendHTTPError(status_code ? status_code : 400);
else if (HTTP_PARSER_ERRNO(&parser))
SendHTTPError(status_code ? status_code : 400, http_errno_description((http_errno)parser.http_errno));
}
void ServeData()
{
ModResult MOD_RESULT;
std::string method = http_method_str(static_cast<http_method>(parser.method));
HTTPRequestURI parsed;
ParseURI(uri, parsed);
HTTPRequest acl(method, parsed, &headers, this, ip, body);
FIRST_MOD_RESULT_CUSTOM(*aclevprov, HTTPACLEventListener, OnHTTPACLCheck, MOD_RESULT, (acl));
if (MOD_RESULT != MOD_RES_DENY)
{
HTTPRequest request(method, parsed, &headers, this, ip, body);
FIRST_MOD_RESULT_CUSTOM(*reqevprov, HTTPRequestEventListener, OnHTTPRequest, MOD_RESULT, (request));
if (MOD_RESULT == MOD_RES_PASSTHRU)
{
SendHTTPError(404);
}
}
}
void Page(const std::string& s, unsigned int response, HTTPHeaders* hheaders)
{
SendHeaders(s.length(), response, *hheaders);
WriteData(s);
BufferedSocket::Close(true);
}
void Page(std::stringstream* n, unsigned int response, HTTPHeaders* hheaders)
{
Page(n->str(), response, hheaders);
}
bool ParseURI(const std::string& uristr, HTTPRequestURI& out)
{
http_parser_url_init(&url);
if (http_parser_parse_url(uristr.c_str(), uristr.size(), 0, &url) != 0)
return false;
if (url.field_set & (1 << UF_PATH))
{
// Normalise the path.
std::vector<std::string> pathsegments;
irc::sepstream pathstream(uri.substr(url.field_data[UF_PATH].off, url.field_data[UF_PATH].len), '/');
for (std::string pathsegment; pathstream.GetToken(pathsegment); )
{
if (pathsegment == ".")
{
// Stay at the current level.
continue;
}
if (pathsegment == "..")
{
// Traverse up to the previous level.
if (!pathsegments.empty())
pathsegment.pop_back();
continue;
}
pathsegments.push_back(pathsegment);
}
out.path.reserve(url.field_data[UF_PATH].len);
out.path.append("/").append(stdalgo::string::join(pathsegments, '/'));
}
if (url.field_set & (1 << UF_FRAGMENT))
out.fragment = uri.substr(url.field_data[UF_FRAGMENT].off, url.field_data[UF_FRAGMENT].len);
std::string param_str;
if (url.field_set & (1 << UF_QUERY))
param_str = uri.substr(url.field_data[UF_QUERY].off, url.field_data[UF_QUERY].len);
irc::sepstream param_stream(param_str, '&');
std::string token;
std::string::size_type eq_pos;
while (param_stream.GetToken(token))
{
eq_pos = token.find('=');
if (eq_pos == std::string::npos)
{
out.query_params.insert(std::make_pair(token, ""));
}
else
{
out.query_params.insert(std::make_pair(token.substr(0, eq_pos), token.substr(eq_pos + 1)));
}
}
return true;
}
};
class HTTPdAPIImpl : public HTTPdAPIBase
{
public:
HTTPdAPIImpl(Module* parent)
: HTTPdAPIBase(parent)
{
}
void SendResponse(HTTPDocumentResponse& resp) CXX11_OVERRIDE
{
resp.src.sock->Page(resp.document, resp.responsecode, &resp.headers);
}
};
class ModuleHttpServer : public Module
{
HTTPdAPIImpl APIImpl;
unsigned int timeoutsec;
Events::ModuleEventProvider acleventprov;
Events::ModuleEventProvider reqeventprov;
public:
ModuleHttpServer()
: APIImpl(this)
, acleventprov(this, "event/http-acl")
, reqeventprov(this, "event/http-request")
{
aclevprov = &acleventprov;
reqevprov = &reqeventprov;
HttpServerSocket::ConfigureParser();
}
void init() CXX11_OVERRIDE
{
HttpModule = this;
}
void ReadConfig(ConfigStatus& status) CXX11_OVERRIDE
{
ConfigTag* tag = ServerInstance->Config->ConfValue("httpd");
timeoutsec = tag->getDuration("timeout", 10, 1);
}
ModResult OnAcceptConnection(int nfd, ListenSocket* from, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* server) CXX11_OVERRIDE
{
if (!stdalgo::string::equalsci(from->bind_tag->getString("type"), "httpd"))
return MOD_RES_PASSTHRU;
sockets.push_front(new HttpServerSocket(nfd, client->addr(), from, client, server, timeoutsec));
return MOD_RES_ALLOW;
}
void OnUnloadModule(Module* mod) CXX11_OVERRIDE
{
for (insp::intrusive_list<HttpServerSocket>::const_iterator i = sockets.begin(); i != sockets.end(); )
{
HttpServerSocket* sock = *i;
++i;
if (sock->GetModHook(mod))
{
sock->cull();
delete sock;
}
}
}
CullResult cull() CXX11_OVERRIDE
{
for (insp::intrusive_list<HttpServerSocket>::const_iterator i = sockets.begin(); i != sockets.end(); ++i)
{
HttpServerSocket* sock = *i;
sock->Close();
}
return Module::cull();
}
Version GetVersion() CXX11_OVERRIDE
{
return Version("Allows the server administrator to serve various useful resources over HTTP.", VF_VENDOR);
}
};
MODULE_INIT(ModuleHttpServer)
|