miniupnp/miniupnpd/upnphttp.c

977 lines
25 KiB
C
Raw Normal View History

/* $Id: upnphttp.c,v 1.86 2013/02/07 10:26:07 nanard Exp $ */
2011-09-28 19:13:20 +00:00
/* Project : miniupnp
* Website : http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
* Author : Thomas Bernard
* Copyright (c) 2005-2012 Thomas Bernard
2011-09-28 19:13:20 +00:00
* This software is subject to the conditions detailed in the
* LICENCE file included in this distribution.
* */
#include <stdlib.h>
#include <unistd.h>
#include <stdio.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/param.h>
#include <netinet/in.h>
2011-09-28 19:13:20 +00:00
#include <arpa/inet.h>
#include <syslog.h>
#include <ctype.h>
#include <errno.h>
2011-09-28 19:13:20 +00:00
#include "config.h"
#ifdef ENABLE_HTTP_DATE
#include <time.h>
#endif
2011-09-28 19:13:20 +00:00
#include "upnphttp.h"
#include "upnpdescgen.h"
#include "miniupnpdpath.h"
#include "upnpsoap.h"
#include "upnpevents.h"
2012-02-07 00:26:15 +00:00
#include "upnputils.h"
2011-09-28 19:13:20 +00:00
struct upnphttp *
2011-09-28 19:13:20 +00:00
New_upnphttp(int s)
{
struct upnphttp * ret;
if(s<0)
return NULL;
ret = (struct upnphttp *)malloc(sizeof(struct upnphttp));
if(ret == NULL)
return NULL;
memset(ret, 0, sizeof(struct upnphttp));
ret->socket = s;
2012-02-07 00:26:15 +00:00
if(!set_non_blocking(s))
syslog(LOG_WARNING, "New_upnphttp::set_non_blocking(): %m");
2011-09-28 19:13:20 +00:00
return ret;
}
void
CloseSocket_upnphttp(struct upnphttp * h)
{
if(close(h->socket) < 0)
{
syslog(LOG_ERR, "CloseSocket_upnphttp: close(%d): %m", h->socket);
}
h->socket = -1;
2012-02-07 00:26:15 +00:00
h->state = EToDelete;
2011-09-28 19:13:20 +00:00
}
void
Delete_upnphttp(struct upnphttp * h)
{
if(h)
{
if(h->socket >= 0)
CloseSocket_upnphttp(h);
if(h->req_buf)
free(h->req_buf);
if(h->res_buf)
free(h->res_buf);
free(h);
}
}
/* parse HttpHeaders of the REQUEST
* This function is called after the \r\n\r\n character
* sequence has been found in h->req_buf */
2011-09-28 19:13:20 +00:00
static void
ParseHttpHeaders(struct upnphttp * h)
{
char * line;
char * colon;
char * p;
int n;
if((h->req_buf == NULL) || (h->req_contentoff <= 0))
return;
2011-09-28 19:13:20 +00:00
line = h->req_buf;
while(line < (h->req_buf + h->req_contentoff))
{
colon = line;
while(*colon != ':')
{
if(*colon == '\r' || *colon == '\n')
{
colon = NULL; /* no ':' character found on the line */
break;
}
colon++;
}
2011-09-28 19:13:20 +00:00
if(colon)
{
if(strncasecmp(line, "Content-Length", 14)==0)
{
p = colon;
while(*p < '0' || *p > '9')
p++;
h->req_contentlen = atoi(p);
if(h->req_contentlen < 0) {
syslog(LOG_WARNING, "ParseHttpHeaders() invalid Content-Length %d", h->req_contentlen);
h->req_contentlen = 0;
}
2011-09-28 19:13:20 +00:00
/*printf("*** Content-Lenght = %d ***\n", h->req_contentlen);
printf(" readbufflen=%d contentoff = %d\n",
h->req_buflen, h->req_contentoff);*/
}
else if(strncasecmp(line, "SOAPAction", 10)==0)
{
p = colon;
n = 0;
while(*p == ':' || *p == ' ' || *p == '\t')
p++;
while(p[n]>=' ')
n++;
if((p[0] == '"' && p[n-1] == '"')
|| (p[0] == '\'' && p[n-1] == '\''))
{
p++; n -= 2;
}
h->req_soapActionOff = p - h->req_buf;
2011-09-28 19:13:20 +00:00
h->req_soapActionLen = n;
}
else if(strncasecmp(line, "accept-language", 15) == 0)
{
p = colon;
n = 0;
while(*p == ':' || *p == ' ' || *p == '\t')
p++;
while(p[n]>=' ')
n++;
syslog(LOG_DEBUG, "accept-language HTTP header : '%.*s'", n, p);
/* keep only the 1st accepted language */
n = 0;
while(p[n]>' ' && p[n] != ',')
n++;
if(n >= (int)sizeof(h->accept_language))
n = (int)sizeof(h->accept_language) - 1;
memcpy(h->accept_language, p, n);
h->accept_language[n] = '\0';
}
else if(strncasecmp(line, "expect", 6) == 0)
{
p = colon;
n = 0;
while(*p == ':' || *p == ' ' || *p == '\t')
p++;
while(p[n]>=' ')
n++;
if(strncasecmp(p, "100-continue", 12) == 0) {
h->respflags |= FLAG_CONTINUE;
syslog(LOG_DEBUG, "\"Expect: 100-Continue\" header detected");
}
}
2011-09-28 19:13:20 +00:00
#ifdef ENABLE_EVENTS
else if(strncasecmp(line, "Callback", 8)==0)
{
p = colon;
while(*p != '<' && *p != '\r' )
p++;
n = 0;
while(p[n] != '>' && p[n] != '\r' )
n++;
h->req_CallbackOff = p + 1 - h->req_buf;
2011-09-28 19:13:20 +00:00
h->req_CallbackLen = MAX(0, n - 1);
}
else if(strncasecmp(line, "SID", 3)==0)
{
p = colon + 1;
while(isspace(*p))
p++;
n = 0;
while(!isspace(p[n]))
n++;
h->req_SIDOff = p - h->req_buf;
2011-09-28 19:13:20 +00:00
h->req_SIDLen = n;
}
/* Timeout: Seconds-nnnn */
/* TIMEOUT
Recommended. Requested duration until subscription expires,
either number of seconds or infinite. Recommendation
by a UPnP Forum working committee. Defined by UPnP vendor.
Consists of the keyword "Second-" followed (without an
intervening space) by either an integer or the keyword "infinite". */
else if(strncasecmp(line, "Timeout", 7)==0)
{
p = colon + 1;
while(isspace(*p))
p++;
if(strncasecmp(p, "Second-", 7)==0) {
h->req_Timeout = atoi(p+7);
}
}
#ifdef UPNP_STRICT
else if(strncasecmp(line, "nt", 2)==0)
{
p = colon + 1;
while(isspace(*p))
p++;
n = 0;
while(!isspace(p[n]))
n++;
h->req_NTOff = p - h->req_buf;
h->req_NTLen = n;
}
#endif
2011-09-28 19:13:20 +00:00
#endif
}
/* the loop below won't run off the end of the buffer
* because the buffer is guaranteed to contain the \r\n\r\n
* character sequence */
2011-09-28 19:13:20 +00:00
while(!(line[0] == '\r' && line[1] == '\n'))
line++;
line += 2;
}
}
/* very minimalistic 404 error message */
static void
Send404(struct upnphttp * h)
{
static const char body404[] =
"<HTML><HEAD><TITLE>404 Not Found</TITLE></HEAD>"
"<BODY><H1>Not Found</H1>The requested URL was not found"
" on this server.</BODY></HTML>\r\n";
2012-02-07 00:26:15 +00:00
2011-09-28 19:13:20 +00:00
h->respflags = FLAG_HTML;
BuildResp2_upnphttp(h, 404, "Not Found",
body404, sizeof(body404) - 1);
SendRespAndClose_upnphttp(h);
2011-09-28 19:13:20 +00:00
}
static void
Send405(struct upnphttp * h)
{
static const char body405[] =
"<HTML><HEAD><TITLE>405 Method Not Allowed</TITLE></HEAD>"
"<BODY><H1>Method Not Allowed</H1>The HTTP Method "
"is not allowed on this resource.</BODY></HTML>\r\n";
h->respflags |= FLAG_HTML;
BuildResp2_upnphttp(h, 405, "Method Not Allowed",
body405, sizeof(body405) - 1);
SendRespAndClose_upnphttp(h);
}
2011-09-28 19:13:20 +00:00
/* very minimalistic 501 error message */
static void
Send501(struct upnphttp * h)
{
static const char body501[] =
2011-09-28 19:13:20 +00:00
"<HTML><HEAD><TITLE>501 Not Implemented</TITLE></HEAD>"
"<BODY><H1>Not Implemented</H1>The HTTP Method "
"is not implemented by this server.</BODY></HTML>\r\n";
2012-02-07 00:26:15 +00:00
2011-09-28 19:13:20 +00:00
h->respflags = FLAG_HTML;
BuildResp2_upnphttp(h, 501, "Not Implemented",
body501, sizeof(body501) - 1);
SendRespAndClose_upnphttp(h);
2011-09-28 19:13:20 +00:00
}
/* findendheaders() find the \r\n\r\n character sequence and
* return a pointer to it.
* It returns NULL if not found */
2011-09-28 19:13:20 +00:00
static const char *
findendheaders(const char * s, int len)
{
while(len-->3)
2011-09-28 19:13:20 +00:00
{
if(s[0]=='\r' && s[1]=='\n' && s[2]=='\r' && s[3]=='\n')
return s;
s++;
}
return NULL;
}
#ifdef HAS_DUMMY_SERVICE
static void
sendDummyDesc(struct upnphttp * h)
{
static const char xml_desc[] = "<?xml version=\"1.0\"?>\r\n"
"<scpd xmlns=\"urn:schemas-upnp-org:service-1-0\">"
" <specVersion>"
" <major>1</major>"
" <minor>0</minor>"
" </specVersion>"
" <actionList />"
" <serviceStateTable />"
"</scpd>\r\n";
BuildResp_upnphttp(h, xml_desc, sizeof(xml_desc)-1);
SendRespAndClose_upnphttp(h);
2011-09-28 19:13:20 +00:00
}
#endif
/* Sends the description generated by the parameter */
static void
sendXMLdesc(struct upnphttp * h, char * (f)(int *))
{
char * desc;
int len;
desc = f(&len);
if(!desc)
{
static const char error500[] = "<HTML><HEAD><TITLE>Error 500</TITLE>"
"</HEAD><BODY>Internal Server Error</BODY></HTML>\r\n";
syslog(LOG_ERR, "Failed to generate XML description");
h->respflags = FLAG_HTML;
BuildResp2_upnphttp(h, 500, "Internal Server Error",
error500, sizeof(error500)-1);
}
else
{
BuildResp_upnphttp(h, desc, len);
}
SendRespAndClose_upnphttp(h);
2011-09-28 19:13:20 +00:00
free(desc);
}
/* ProcessHTTPPOST_upnphttp()
* executes the SOAP query if it is possible */
static void
ProcessHTTPPOST_upnphttp(struct upnphttp * h)
{
if((h->req_buflen - h->req_contentoff) >= h->req_contentlen)
{
/* the request body is received */
if(h->req_soapActionOff > 0)
2011-09-28 19:13:20 +00:00
{
/* we can process the request */
syslog(LOG_INFO, "SOAPAction: %.*s",
h->req_soapActionLen, h->req_buf + h->req_soapActionOff);
ExecuteSoapAction(h,
h->req_buf + h->req_soapActionOff,
2011-09-28 19:13:20 +00:00
h->req_soapActionLen);
}
else
{
static const char err400str[] =
"<html><body>Bad request</body></html>";
syslog(LOG_INFO, "No SOAPAction in HTTP headers");
h->respflags = FLAG_HTML;
BuildResp2_upnphttp(h, 400, "Bad Request",
err400str, sizeof(err400str) - 1);
SendRespAndClose_upnphttp(h);
2011-09-28 19:13:20 +00:00
}
}
else if(h->respflags & FLAG_CONTINUE)
{
/* Sending the 100 Continue response */
if(!h->res_buf) {
h->res_buf = malloc(256);
h->res_buf_alloclen = 256;
}
h->res_buflen = snprintf(h->res_buf, h->res_buf_alloclen,
"%s 100 Continue\r\n\r\n", h->HttpVer);
h->res_sent = 0;
h->state = ESendingContinue;
if(SendResp_upnphttp(h))
h->state = EWaitingForHttpContent;
}
2011-09-28 19:13:20 +00:00
else
{
/* waiting for remaining data */
2012-02-07 00:26:15 +00:00
h->state = EWaitingForHttpContent;
2011-09-28 19:13:20 +00:00
}
}
#ifdef ENABLE_EVENTS
/**
* returns 0 if the callback header value is not valid
* 1 if it is valid.
*/
static int
checkCallbackURL(struct upnphttp * h)
{
char addrstr[48];
int ipv6;
const char * p;
unsigned int i;
2011-09-28 19:13:20 +00:00
if(h->req_CallbackOff <= 0 || h->req_CallbackLen < 8)
2011-09-28 19:13:20 +00:00
return 0;
if(memcmp(h->req_buf + h->req_CallbackOff, "http://", 7) != 0)
2011-09-28 19:13:20 +00:00
return 0;
ipv6 = 0;
i = 0;
p = h->req_buf + h->req_CallbackOff + 7;
2011-09-28 19:13:20 +00:00
if(*p == '[') {
p++;
ipv6 = 1;
while(*p != ']' && i < (sizeof(addrstr)-1)
&& p < (h->req_buf + h->req_CallbackOff + h->req_CallbackLen))
2011-09-28 19:13:20 +00:00
addrstr[i++] = *(p++);
} else {
while(*p != '/' && *p != ':' && i < (sizeof(addrstr)-1)
&& p < (h->req_buf + h->req_CallbackOff + h->req_CallbackLen))
2011-09-28 19:13:20 +00:00
addrstr[i++] = *(p++);
}
addrstr[i] = '\0';
if(ipv6) {
struct in6_addr addr;
if(inet_pton(AF_INET6, addrstr, &addr) <= 0)
return 0;
#ifdef ENABLE_IPV6
if(!h->ipv6
|| (0!=memcmp(&addr, &(h->clientaddr_v6), sizeof(struct in6_addr))))
return 0;
#else
return 0;
#endif
} else {
struct in_addr addr;
if(inet_pton(AF_INET, addrstr, &addr) <= 0)
return 0;
#ifdef ENABLE_IPV6
if(h->ipv6) {
if(!IN6_IS_ADDR_V4MAPPED(&(h->clientaddr_v6)))
return 0;
if(0!=memcmp(&addr, ((const char *)&(h->clientaddr_v6) + 12), 4))
return 0;
} else {
if(0!=memcmp(&addr, &(h->clientaddr), sizeof(struct in_addr)))
return 0;
}
#else
if(0!=memcmp(&addr, &(h->clientaddr), sizeof(struct in_addr)))
return 0;
#endif
}
return 1;
}
static void
ProcessHTTPSubscribe_upnphttp(struct upnphttp * h, const char * path)
{
const char * sid;
syslog(LOG_DEBUG, "ProcessHTTPSubscribe %s", path);
syslog(LOG_DEBUG, "Callback '%.*s' Timeout=%d",
h->req_CallbackLen, h->req_buf + h->req_CallbackOff,
h->req_Timeout);
syslog(LOG_DEBUG, "SID '%.*s'", h->req_SIDLen, h->req_buf + h->req_SIDOff);
if((h->req_CallbackOff <= 0) && (h->req_SIDOff <= 0)) {
2011-09-28 19:13:20 +00:00
/* Missing or invalid CALLBACK : 412 Precondition Failed.
* If CALLBACK header is missing or does not contain a valid HTTP URL,
* the publisher must respond with HTTP error 412 Precondition Failed*/
BuildResp2_upnphttp(h, 412, "Precondition Failed", 0, 0);
SendRespAndClose_upnphttp(h);
2011-09-28 19:13:20 +00:00
} else {
/* - add to the subscriber list
* - respond HTTP/x.x 200 OK
2011-09-28 19:13:20 +00:00
* - Send the initial event message */
/* Server:, SID:; Timeout: Second-(xx|infinite) */
/* Check that the callback URL is on the same IP as
* the request, and not on the internet, nor on ourself (DOS attack ?) */
if(h->req_CallbackOff > 0) {
#ifdef UPNP_STRICT
/* SID: and Callback: are incompatible */
if(h->req_SIDOff > 0) {
syslog(LOG_WARNING, "Both Callback: and SID: in SUBSCRIBE");
BuildResp2_upnphttp(h, 400, "Incompatible header fields", 0, 0);
/* "NT: upnp:event" header is mandatory */
} else if(h->req_NTOff <= 0 || h->req_NTLen != 10 ||
0 != memcmp("upnp:event", h->req_buf + h->req_NTOff, 10)) {
syslog(LOG_WARNING, "Invalid NT in SUBSCRIBE %.*s",
h->req_NTLen, h->req_buf + h->req_NTOff);
BuildResp2_upnphttp(h, 412, "Precondition Failed", 0, 0);
} else
#endif
2011-09-28 19:13:20 +00:00
if(checkCallbackURL(h)) {
sid = upnpevents_addSubscriber(path, h->req_buf + h->req_CallbackOff,
2011-09-28 19:13:20 +00:00
h->req_CallbackLen, h->req_Timeout);
h->respflags = FLAG_TIMEOUT;
if(sid) {
syslog(LOG_DEBUG, "generated sid=%s", sid);
h->respflags |= FLAG_SID;
h->res_SID = sid;
2011-09-28 19:13:20 +00:00
}
BuildResp_upnphttp(h, 0, 0);
} else {
syslog(LOG_WARNING, "Invalid Callback in SUBSCRIBE %.*s",
h->req_CallbackLen, h->req_buf + h->req_CallbackOff);
2011-09-28 19:13:20 +00:00
BuildResp2_upnphttp(h, 412, "Precondition Failed", 0, 0);
}
} else {
/* subscription renew */
/* Invalid SID
412 Precondition Failed. If a SID does not correspond to a known,
un-expired subscription, the publisher must respond
with HTTP error 412 Precondition Failed. */
#ifdef UPNP_STRICT
/* SID: and NT: headers are incompatibles */
if(h->req_NTOff > 0) {
syslog(LOG_WARNING, "Both NT: and SID: in SUBSCRIBE");
BuildResp2_upnphttp(h, 400, "Incompatible header fields", 0, 0);
} else
#endif
if(renewSubscription(h->req_buf + h->req_SIDOff, h->req_SIDLen,
h->req_Timeout) < 0) {
2011-09-28 19:13:20 +00:00
BuildResp2_upnphttp(h, 412, "Precondition Failed", 0, 0);
} else {
h->respflags = FLAG_TIMEOUT;
BuildResp_upnphttp(h, 0, 0);
}
}
SendRespAndClose_upnphttp(h);
2011-09-28 19:13:20 +00:00
}
}
static void
ProcessHTTPUnSubscribe_upnphttp(struct upnphttp * h, const char * path)
{
syslog(LOG_DEBUG, "ProcessHTTPUnSubscribe %s", path);
syslog(LOG_DEBUG, "SID '%.*s'", h->req_SIDLen, h->req_buf + h->req_SIDOff);
2011-09-28 19:13:20 +00:00
/* Remove from the list */
#ifdef UPNP_STRICT
if(h->req_SIDOff <= 0 || h->req_SIDLen == 0) {
/* SID: header missing or empty */
BuildResp2_upnphttp(h, 412, "Precondition Failed", 0, 0);
} else if(h->req_CallbackOff > 0 || h->req_NTOff > 0) {
/* no NT: or Callback: header must be present */
BuildResp2_upnphttp(h, 400, "Incompatible header fields", 0, 0);
} else
#endif
if(upnpevents_removeSubscriber(h->req_buf + h->req_SIDOff, h->req_SIDLen) < 0) {
2011-09-28 19:13:20 +00:00
BuildResp2_upnphttp(h, 412, "Precondition Failed", 0, 0);
} else {
BuildResp_upnphttp(h, 0, 0);
}
SendRespAndClose_upnphttp(h);
2011-09-28 19:13:20 +00:00
}
#endif
/* Parse and process Http Query
* called once all the HTTP headers have been received,
* so it is guaranteed that h->req_buf contains the \r\n\r\n
* character sequence */
2011-09-28 19:13:20 +00:00
static void
ProcessHttpQuery_upnphttp(struct upnphttp * h)
{
static const struct {
const char * path;
char * (* f)(int *);
} path_desc[] = {
{ ROOTDESC_PATH, genRootDesc},
{ WANIPC_PATH, genWANIPCn},
{ WANCFG_PATH, genWANCfg},
#ifdef HAS_DUMMY_SERVICE
{ DUMMY_PATH, NULL},
#endif
#ifdef ENABLE_L3F_SERVICE
{ L3F_PATH, genL3F},
#endif
#ifdef ENABLE_6FC_SERVICE
{ WANIP6FC_PATH, gen6FC},
#endif
#ifdef ENABLE_DP_SERVICE
{ DP_PATH, genDP},
#endif
{ NULL, NULL}
};
2011-09-28 19:13:20 +00:00
char HttpCommand[16];
char HttpUrl[128];
char * HttpVer;
char * p;
int i;
p = h->req_buf;
if(!p)
return;
/* note : checking (*p != '\r') is enough to avoid runing off the
* end of the buffer, because h->req_buf is guaranteed to contain
* the \r\n\r\n character sequence */
2011-09-28 19:13:20 +00:00
for(i = 0; i<15 && *p != ' ' && *p != '\r'; i++)
HttpCommand[i] = *(p++);
HttpCommand[i] = '\0';
while(*p==' ')
p++;
for(i = 0; i<127 && *p != ' ' && *p != '\r'; i++)
HttpUrl[i] = *(p++);
HttpUrl[i] = '\0';
while(*p==' ')
p++;
HttpVer = h->HttpVer;
for(i = 0; i<15 && *p != '\r'; i++)
HttpVer[i] = *(p++);
HttpVer[i] = '\0';
syslog(LOG_INFO, "HTTP REQUEST : %s %s (%s)",
HttpCommand, HttpUrl, HttpVer);
ParseHttpHeaders(h);
if(strcmp("POST", HttpCommand) == 0)
{
h->req_command = EPost;
ProcessHTTPPOST_upnphttp(h);
}
else if(strcmp("GET", HttpCommand) == 0)
{
h->req_command = EGet;
for(i=0; path_desc[i].path; i++) {
if(strcasecmp(path_desc[i].path, HttpUrl) == 0) {
if(path_desc[i].f)
sendXMLdesc(h, path_desc[i].f);
else
2011-09-28 19:13:20 +00:00
#ifdef HAS_DUMMY_SERVICE
sendDummyDesc(h);
#else
continue;
2011-09-28 19:13:20 +00:00
#endif
return;
}
2011-09-28 19:13:20 +00:00
}
if(0 == memcmp(HttpUrl, "/ctl/", 5)) {
/* 405 Method Not Allowed
* Allow: POST */
h->respflags = FLAG_ALLOW_POST;
Send405(h);
return;
2011-09-28 19:13:20 +00:00
}
#ifdef ENABLE_EVENTS
if(0 == memcmp(HttpUrl, "/evt/", 5)) {
/* 405 Method Not Allowed
* Allow: SUBSCRIBE, UNSUBSCRIBE */
h->respflags = FLAG_ALLOW_SUB_UNSUB;
Send405(h);
return;
2011-09-28 19:13:20 +00:00
}
#endif
syslog(LOG_NOTICE, "%s not found, responding ERROR 404", HttpUrl);
Send404(h);
2011-09-28 19:13:20 +00:00
}
#ifdef ENABLE_EVENTS
else if(strcmp("SUBSCRIBE", HttpCommand) == 0)
{
h->req_command = ESubscribe;
ProcessHTTPSubscribe_upnphttp(h, HttpUrl);
}
else if(strcmp("UNSUBSCRIBE", HttpCommand) == 0)
{
h->req_command = EUnSubscribe;
ProcessHTTPUnSubscribe_upnphttp(h, HttpUrl);
}
#else
else if(strcmp("SUBSCRIBE", HttpCommand) == 0)
{
syslog(LOG_NOTICE, "SUBSCRIBE not implemented. ENABLE_EVENTS compile option disabled");
Send501(h);
}
#endif
else
{
syslog(LOG_NOTICE, "Unsupported HTTP Command %s", HttpCommand);
Send501(h);
}
}
void
Process_upnphttp(struct upnphttp * h)
{
char * h_tmp;
2011-09-28 19:13:20 +00:00
char buf[2048];
int n;
2012-02-07 00:26:15 +00:00
2011-09-28 19:13:20 +00:00
if(!h)
return;
switch(h->state)
{
2012-02-07 00:26:15 +00:00
case EWaitingForHttpRequest:
n = recv(h->socket, buf, sizeof(buf), 0);
2011-09-28 19:13:20 +00:00
if(n<0)
{
if(errno != EAGAIN &&
errno != EWOULDBLOCK &&
errno != EINTR)
{
syslog(LOG_ERR, "recv (state0): %m");
2012-02-07 00:26:15 +00:00
h->state = EToDelete;
}
/* if errno is EAGAIN, EWOULDBLOCK or EINTR, try again later */
2011-09-28 19:13:20 +00:00
}
else if(n==0)
{
syslog(LOG_WARNING, "HTTP Connection closed unexpectedly");
2012-02-07 00:26:15 +00:00
h->state = EToDelete;
2011-09-28 19:13:20 +00:00
}
else
{
const char * endheaders;
/* if 1st arg of realloc() is null,
* realloc behaves the same as malloc() */
h_tmp = (char *)realloc(h->req_buf, n + h->req_buflen + 1);
if (h_tmp == NULL)
{
syslog(LOG_WARNING, "Unable to allocate new memory for h->req_buf)");
h->state = EToDelete;
}
else
{
h->req_buf = h_tmp;
memcpy(h->req_buf + h->req_buflen, buf, n);
h->req_buflen += n;
h->req_buf[h->req_buflen] = '\0';
}
2011-09-28 19:13:20 +00:00
/* search for the string "\r\n\r\n" */
endheaders = findendheaders(h->req_buf, h->req_buflen);
if(endheaders)
{
/* at this point, the request buffer (h->req_buf)
* is guaranteed to contain the \r\n\r\n character sequence */
2011-09-28 19:13:20 +00:00
h->req_contentoff = endheaders - h->req_buf + 4;
ProcessHttpQuery_upnphttp(h);
}
}
break;
2012-02-07 00:26:15 +00:00
case EWaitingForHttpContent:
n = recv(h->socket, buf, sizeof(buf), 0);
2011-09-28 19:13:20 +00:00
if(n<0)
{
if(errno != EAGAIN &&
errno != EWOULDBLOCK &&
errno != EINTR)
{
syslog(LOG_ERR, "recv (state1): %m");
2012-02-07 00:26:15 +00:00
h->state = EToDelete;
}
/* if errno is EAGAIN, EWOULDBLOCK or EINTR, try again later */
2011-09-28 19:13:20 +00:00
}
else if(n==0)
{
syslog(LOG_WARNING, "HTTP Connection closed inexpectedly");
2012-02-07 00:26:15 +00:00
h->state = EToDelete;
2011-09-28 19:13:20 +00:00
}
else
{
2012-02-07 00:26:15 +00:00
void * tmp = realloc(h->req_buf, n + h->req_buflen);
if(!tmp)
2011-09-28 19:13:20 +00:00
{
2012-02-07 00:26:15 +00:00
syslog(LOG_ERR, "memory allocation error %m");
h->state = EToDelete;
}
else
{
h->req_buf = tmp;
memcpy(h->req_buf + h->req_buflen, buf, n);
h->req_buflen += n;
if((h->req_buflen - h->req_contentoff) >= h->req_contentlen)
{
ProcessHTTPPOST_upnphttp(h);
}
2011-09-28 19:13:20 +00:00
}
}
break;
case ESendingContinue:
if(SendResp_upnphttp(h))
h->state = EWaitingForHttpContent;
break;
2012-02-07 00:26:15 +00:00
case ESendingAndClosing:
SendRespAndClose_upnphttp(h);
break;
2011-09-28 19:13:20 +00:00
default:
syslog(LOG_WARNING, "Unexpected state: %d", h->state);
}
}
static const char httpresphead[] =
"%s %d %s\r\n"
"Content-Type: %s\r\n"
"Connection: close\r\n"
"Content-Length: %d\r\n"
"Server: " MINIUPNPD_SERVER_STRING "\r\n"
"Ext:\r\n"
2011-09-28 19:13:20 +00:00
; /*"\r\n";*/
/*
"<?xml version=\"1.0\"?>\n"
"<s:Envelope xmlns:s=\"http://schemas.xmlsoap.org/soap/envelope/\" "
"s:encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\">"
"<s:Body>"
"</s:Body>"
"</s:Envelope>";
*/
/* with response code and response message
* also allocate enough memory */
void
BuildHeader_upnphttp(struct upnphttp * h, int respcode,
const char * respmsg,
int bodylen)
{
int templen;
if(!h->res_buf ||
h->res_buf_alloclen < ((int)sizeof(httpresphead) + 256 + bodylen)) {
if(h->res_buf)
free(h->res_buf);
templen = sizeof(httpresphead) + 256 + bodylen;
2011-09-28 19:13:20 +00:00
h->res_buf = (char *)malloc(templen);
if(!h->res_buf) {
2011-09-28 19:13:20 +00:00
syslog(LOG_ERR, "malloc error in BuildHeader_upnphttp()");
return;
}
h->res_buf_alloclen = templen;
}
h->res_sent = 0;
2011-09-28 19:13:20 +00:00
h->res_buflen = snprintf(h->res_buf, h->res_buf_alloclen,
httpresphead, h->HttpVer,
respcode, respmsg,
(h->respflags&FLAG_HTML)?"text/html":"text/xml; charset=\"utf-8\"",
2011-09-28 19:13:20 +00:00
bodylen);
/* Content-Type MUST be 'text/xml; charset="utf-8"' according to UDA v1.1 */
/* Content-Type MUST be 'text/xml' according to UDA v1.0 */
2011-09-28 19:13:20 +00:00
/* Additional headers */
#ifdef ENABLE_HTTP_DATE
{
char http_date[64];
time_t t;
struct tm tm;
time(&t);
gmtime_r(&t, &tm);
/* %a and %b depend on locale */
strftime(http_date, sizeof(http_date),
"%a, %d %b %Y %H:%M:%S GMT", &tm);
h->res_buflen += snprintf(h->res_buf + h->res_buflen,
h->res_buf_alloclen - h->res_buflen,
"Date: %s\r\n", http_date);
}
#endif
2011-09-28 19:13:20 +00:00
#ifdef ENABLE_EVENTS
if(h->respflags & FLAG_TIMEOUT) {
h->res_buflen += snprintf(h->res_buf + h->res_buflen,
h->res_buf_alloclen - h->res_buflen,
"Timeout: Second-");
if(h->req_Timeout) {
h->res_buflen += snprintf(h->res_buf + h->res_buflen,
h->res_buf_alloclen - h->res_buflen,
"%d\r\n", h->req_Timeout);
} else {
h->res_buflen += snprintf(h->res_buf + h->res_buflen,
h->res_buf_alloclen - h->res_buflen,
"infinite\r\n");
}
}
if(h->respflags & FLAG_SID) {
h->res_buflen += snprintf(h->res_buf + h->res_buflen,
h->res_buf_alloclen - h->res_buflen,
"SID: %s\r\n", h->res_SID);
2011-09-28 19:13:20 +00:00
}
#endif
if(h->respflags & FLAG_ALLOW_POST) {
h->res_buflen += snprintf(h->res_buf + h->res_buflen,
h->res_buf_alloclen - h->res_buflen,
"Allow: %s\r\n", "POST");
} else if(h->respflags & FLAG_ALLOW_SUB_UNSUB) {
h->res_buflen += snprintf(h->res_buf + h->res_buflen,
h->res_buf_alloclen - h->res_buflen,
"Allow: %s\r\n", "SUBSCRIBE, UNSUBSCRIBE");
}
if(h->accept_language[0] != '\0') {
/* defaulting to "en" */
h->res_buflen += snprintf(h->res_buf + h->res_buflen,
h->res_buf_alloclen - h->res_buflen,
"Content-Language: %s\r\n",
h->accept_language[0] == '*' ? "en" : h->accept_language);
}
2011-09-28 19:13:20 +00:00
h->res_buf[h->res_buflen++] = '\r';
h->res_buf[h->res_buflen++] = '\n';
if(h->res_buf_alloclen < (h->res_buflen + bodylen))
{
char * tmp;
tmp = (char *)realloc(h->res_buf, (h->res_buflen + bodylen));
if(tmp)
{
h->res_buf = tmp;
h->res_buf_alloclen = h->res_buflen + bodylen;
}
else
{
syslog(LOG_ERR, "realloc error in BuildHeader_upnphttp()");
}
}
}
void
BuildResp2_upnphttp(struct upnphttp * h, int respcode,
const char * respmsg,
const char * body, int bodylen)
{
BuildHeader_upnphttp(h, respcode, respmsg, bodylen);
if(body)
memcpy(h->res_buf + h->res_buflen, body, bodylen);
h->res_buflen += bodylen;
}
/* responding 200 OK ! */
void
BuildResp_upnphttp(struct upnphttp * h,
const char * body, int bodylen)
{
BuildResp2_upnphttp(h, 200, "OK", body, bodylen);
}
int
SendResp_upnphttp(struct upnphttp * h)
{
ssize_t n;
while (h->res_sent < h->res_buflen)
{
n = send(h->socket, h->res_buf + h->res_sent,
h->res_buflen - h->res_sent, 0);
if(n<0)
{
if(errno == EINTR)
continue; /* try again immediatly */
if(errno == EAGAIN || errno == EWOULDBLOCK)
{
/* try again later */
return 0;
}
syslog(LOG_ERR, "send(res_buf): %m");
break; /* avoid infinite loop */
}
else if(n == 0)
{
syslog(LOG_ERR, "send(res_buf): %d bytes sent (out of %d)",
h->res_sent, h->res_buflen);
break;
}
else
{
h->res_sent += n;
}
}
return 1; /* finished */
}
2011-09-28 19:13:20 +00:00
void
SendRespAndClose_upnphttp(struct upnphttp * h)
2011-09-28 19:13:20 +00:00
{
ssize_t n;
2012-02-07 00:26:15 +00:00
while (h->res_sent < h->res_buflen)
2011-09-28 19:13:20 +00:00
{
2012-02-07 00:26:15 +00:00
n = send(h->socket, h->res_buf + h->res_sent,
h->res_buflen - h->res_sent, 0);
2011-09-28 19:13:20 +00:00
if(n<0)
{
2012-02-07 00:26:15 +00:00
if(errno == EINTR)
continue; /* try again immediatly */
if(errno == EAGAIN || errno == EWOULDBLOCK)
{
/* try again later */
h->state = ESendingAndClosing;
return;
}
2011-09-28 19:13:20 +00:00
syslog(LOG_ERR, "send(res_buf): %m");
2012-02-07 00:26:15 +00:00
break; /* avoid infinite loop */
2011-09-28 19:13:20 +00:00
}
else if(n == 0)
{
2012-02-07 00:26:15 +00:00
syslog(LOG_ERR, "send(res_buf): %d bytes sent (out of %d)",
h->res_sent, h->res_buflen);
2011-09-28 19:13:20 +00:00
break;
}
else
{
2012-02-07 00:26:15 +00:00
h->res_sent += n;
2011-09-28 19:13:20 +00:00
}
}
CloseSocket_upnphttp(h);
2011-09-28 19:13:20 +00:00
}