annotate src/c/request.c @ 1037:83d8ddd09d95

Send RPCs with POST, to avoid caching
author Adam Chlipala <adamc@hcoop.net>
date Sat, 21 Nov 2009 14:29:35 -0500
parents 6304f5e8fbb4
children 217eb87dde31
rev   line source
adamc@853 1 #define _GNU_SOURCE
adamc@853 2
adamc@853 3 #include <stdio.h>
adamc@853 4 #include <string.h>
adamc@853 5 #include <stdlib.h>
adamc@853 6 #include <sys/types.h>
adamc@853 7 #include <sys/socket.h>
adamc@853 8 #include <netinet/in.h>
adamc@853 9 #include <unistd.h>
adamc@853 10 #include <signal.h>
adamc@853 11
adamc@853 12 #include <pthread.h>
adamc@853 13
adamc@853 14 #include <mhash.h>
adamc@853 15
adamc@853 16 #include "urweb.h"
adamc@853 17
adamc@853 18 #define MAX_RETRIES 5
adamc@853 19
adamc@856 20 static int try_rollback(uw_context ctx, void *logger_data, uw_logger log_error) {
adamc@853 21 int r = uw_rollback(ctx);
adamc@853 22
adamc@853 23 if (r) {
adamc@856 24 log_error(logger_data, "Error running SQL ROLLBACK\n");
adamc@853 25 uw_reset(ctx);
adamc@853 26 uw_write(ctx, "HTTP/1.1 500 Internal Server Error\n\r");
adamc@853 27 uw_write(ctx, "Content-type: text/plain\r\n\r\n");
adamc@853 28 uw_write(ctx, "Error running SQL ROLLBACK\n");
adamc@853 29 }
adamc@853 30
adamc@853 31 return r;
adamc@853 32 }
adamc@853 33
adamc@856 34 uw_context uw_request_new_context(void *logger_data, uw_logger log_error, uw_logger log_debug) {
adamc@853 35 uw_context ctx = uw_init();
adamc@853 36 int retries_left = MAX_RETRIES;
adamc@853 37
adamc@853 38 while (1) {
adamc@853 39 failure_kind fk = uw_begin_init(ctx);
adamc@853 40
adamc@853 41 if (fk == SUCCESS) {
adamc@856 42 log_debug(logger_data, "Database connection initialized.\n");
adamc@853 43 break;
adamc@853 44 } else if (fk == BOUNDED_RETRY) {
adamc@853 45 if (retries_left) {
adamc@856 46 log_debug(logger_data, "Initialization error triggers bounded retry: %s\n", uw_error_message(ctx));
adamc@853 47 --retries_left;
adamc@853 48 } else {
adamc@856 49 log_error(logger_data, "Fatal initialization error (out of retries): %s\n", uw_error_message(ctx));
adamc@853 50 uw_free(ctx);
adamc@853 51 return NULL;
adamc@853 52 }
adamc@853 53 } else if (fk == UNLIMITED_RETRY)
adamc@856 54 log_debug(logger_data, "Initialization error triggers unlimited retry: %s\n", uw_error_message(ctx));
adamc@853 55 else if (fk == FATAL) {
adamc@856 56 log_error(logger_data, "Fatal initialization error: %s\n", uw_error_message(ctx));
adamc@853 57 uw_free(ctx);
adamc@853 58 return NULL;
adamc@853 59 } else {
adamc@856 60 log_error(logger_data, "Unknown uw_begin_init return code!\n");
adamc@853 61 uw_free(ctx);
adamc@853 62 return NULL;
adamc@853 63 }
adamc@853 64 }
adamc@853 65
adamc@853 66 return ctx;
adamc@853 67 }
adamc@853 68
adamc@853 69 #define KEYSIZE 16
adamc@853 70 #define PASSSIZE 4
adamc@853 71
adamc@853 72 #define HASH_ALGORITHM MHASH_SHA256
adamc@853 73 #define HASH_BLOCKSIZE 32
adamc@853 74 #define KEYGEN_ALGORITHM KEYGEN_MCRYPT
adamc@853 75
adamc@853 76 int uw_hash_blocksize = HASH_BLOCKSIZE;
adamc@853 77
adamc@853 78 static int password[PASSSIZE];
adamc@853 79 static unsigned char private_key[KEYSIZE];
adamc@853 80
adamc@856 81 static void init_crypto(void *logger_data, uw_logger log_error) {
adamc@853 82 KEYGEN kg = {{HASH_ALGORITHM, HASH_ALGORITHM}};
adamc@853 83 int i;
adamc@853 84
adamc@853 85 assert(mhash_get_block_size(HASH_ALGORITHM) == HASH_BLOCKSIZE);
adamc@853 86
adamc@853 87 for (i = 0; i < PASSSIZE; ++i)
adamc@853 88 password[i] = rand();
adamc@853 89
adamc@853 90 if (mhash_keygen_ext(KEYGEN_ALGORITHM, kg,
adamc@853 91 private_key, sizeof(private_key),
adamc@853 92 (unsigned char*)password, sizeof(password)) < 0) {
adamc@856 93 log_error(logger_data, "Key generation failed\n");
adamc@853 94 exit(1);
adamc@853 95 }
adamc@853 96 }
adamc@853 97
adamc@856 98 void uw_request_init(void *logger_data, uw_logger log_error, uw_logger log_debug) {
adamc@853 99 uw_context ctx;
adamc@853 100 failure_kind fk;
adamc@853 101
adamc@853 102 uw_global_init();
adamc@853 103
adamc@856 104 ctx = uw_request_new_context(logger_data, log_error, log_debug);
adamc@853 105
adamc@853 106 if (!ctx)
adamc@853 107 exit(1);
adamc@853 108
adamc@853 109 for (fk = uw_initialize(ctx); fk == UNLIMITED_RETRY; fk = uw_initialize(ctx)) {
adamc@856 110 log_debug(logger_data, "Unlimited retry during init: %s\n", uw_error_message(ctx));
adamc@853 111 uw_db_rollback(ctx);
adamc@853 112 uw_reset(ctx);
adamc@853 113 }
adamc@853 114
adamc@853 115 if (fk != SUCCESS) {
adamc@856 116 log_error(logger_data, "Failed to initialize database! %s\n", uw_error_message(ctx));
adamc@853 117 uw_db_rollback(ctx);
adamc@853 118 exit(1);
adamc@853 119 }
adamc@853 120
adamc@853 121 uw_free(ctx);
adamc@853 122
adamc@856 123 init_crypto(logger_data, log_error);
adamc@853 124 }
adamc@853 125
adamc@853 126 void uw_sign(const char *in, char *out) {
adamc@853 127 MHASH td;
adamc@853 128
adamc@853 129 td = mhash_hmac_init(HASH_ALGORITHM, private_key, sizeof(private_key),
adamc@853 130 mhash_get_hash_pblock(HASH_ALGORITHM));
adamc@853 131
adamc@853 132 mhash(td, in, strlen(in));
adamc@853 133 if (mhash_hmac_deinit(td, out) < 0)
adamc@856 134 fprintf(stderr, "Signing failed\n");
adamc@853 135 }
adamc@853 136
adamc@853 137 typedef struct uw_rc {
adamc@853 138 size_t path_copy_size;
adamc@853 139 char *path_copy;
adamc@853 140 } *uw_request_context;
adamc@853 141
adamc@853 142 uw_request_context uw_new_request_context(void) {
adamc@853 143 uw_request_context r = malloc(sizeof(struct uw_rc));
adamc@853 144 r->path_copy_size = 0;
adamc@853 145 r->path_copy = malloc(0);
adamc@853 146 return r;
adamc@853 147 }
adamc@853 148
adamc@853 149 void uw_free_request_context(uw_request_context r) {
adamc@853 150 free(r->path_copy);
adamc@853 151 free(r);
adamc@853 152 }
adamc@853 153
adamc@863 154 extern char *uw_url_prefix;
adamc@863 155
adamc@854 156 request_result uw_request(uw_request_context rc, uw_context ctx,
adamc@854 157 char *method, char *path, char *query_string,
adamc@854 158 char *body, size_t body_len,
adamc@856 159 void (*on_success)(uw_context), void (*on_failure)(uw_context),
adamc@856 160 void *logger_data, uw_logger log_error, uw_logger log_debug,
adamc@863 161 int sock,
adamc@863 162 int (*send)(int sockfd, const void *buf, size_t len),
adamc@863 163 int (*close)(int fd)) {
adamc@853 164 int retries_left = MAX_RETRIES;
adamc@853 165 char *s;
adamc@853 166 failure_kind fk;
adamc@853 167 int is_post = 0, do_normal_send = 1;
adamc@853 168 char *boundary = NULL;
adamc@853 169 size_t boundary_len;
adamc@854 170 char *inputs;
adamc@853 171
adamc@854 172 if (!strcmp(method, "POST")) {
adamc@853 173 char *clen_s = uw_Basis_requestHeader(ctx, "Content-length");
adamc@853 174 if (!clen_s) {
adamc@1037 175 clen_s = "0";
adamc@1037 176 /*log_error(logger_data, "No Content-length with POST\n");
adamc@1037 177 return FAILED;*/
adamc@853 178 }
adamc@853 179 int clen = atoi(clen_s);
adamc@853 180 if (clen < 0) {
adamc@856 181 log_error(logger_data, "Negative Content-length with POST\n");
adamc@853 182 return FAILED;
adamc@853 183 }
adamc@853 184
adamc@854 185 if (body_len < clen) {
adamc@856 186 log_error(logger_data, "Request doesn't contain all POST data (according to Content-Length)\n");
adamc@853 187 return FAILED;
adamc@853 188 }
adamc@853 189
adamc@853 190 is_post = 1;
adamc@853 191
adamc@853 192 clen_s = uw_Basis_requestHeader(ctx, "Content-type");
adamc@853 193 if (clen_s && !strncasecmp(clen_s, "multipart/form-data", 19)) {
adamc@853 194 if (strncasecmp(clen_s + 19, "; boundary=", 11)) {
adamc@856 195 log_error(logger_data, "Bad multipart boundary spec");
adamc@853 196 return FAILED;
adamc@853 197 }
adamc@853 198
adamc@853 199 boundary = clen_s + 28;
adamc@853 200 boundary[0] = '-';
adamc@853 201 boundary[1] = '-';
adamc@853 202 boundary_len = strlen(boundary);
adamc@853 203 }
adamc@854 204 } else if (strcmp(method, "GET")) {
adamc@856 205 log_error(logger_data, "Not ready for non-GET/POST command: %s\n", method);
adamc@853 206 return FAILED;
adamc@853 207 }
adamc@853 208
adamc@863 209 if (!strncmp(path, uw_url_prefix, strlen(uw_url_prefix))
adamc@863 210 && !strcmp(path + strlen(uw_url_prefix), ".msgs")) {
adamc@853 211 char *id = uw_Basis_requestHeader(ctx, "UrWeb-Client");
adamc@853 212 char *pass = uw_Basis_requestHeader(ctx, "UrWeb-Pass");
adamc@853 213
adamc@853 214 if (sock < 0) {
adamc@856 215 log_error(logger_data, ".msgs requested, but not socket supplied\n");
adamc@853 216 return FAILED;
adamc@853 217 }
adamc@853 218
adamc@853 219 if (id && pass) {
adamc@853 220 unsigned idn = atoi(id);
adamc@864 221 uw_client_connect(idn, atoi(pass), sock, send, close, logger_data, log_error);
adamc@856 222 log_error(logger_data, "Processed request for messages by client %u\n\n", idn);
adamc@853 223 return KEEP_OPEN;
adamc@853 224 }
adamc@853 225 else {
adamc@856 226 log_error(logger_data, "Missing fields in .msgs request: %s, %s\n\n", id, pass);
adamc@853 227 return FAILED;
adamc@853 228 }
adamc@853 229 }
adamc@853 230
adamc@853 231 if (boundary) {
adamc@854 232 char *part = body, *after_sub_headers, *header, *after_header;
adamc@853 233 size_t part_len;
adamc@853 234
adamc@853 235 part = strstr(part, boundary);
adamc@853 236 if (!part) {
adamc@856 237 log_error(logger_data, "Missing first multipart boundary\n");
adamc@853 238 return FAILED;
adamc@853 239 }
adamc@853 240 part += boundary_len;
adamc@853 241
adamc@853 242 while (1) {
adamc@853 243 char *name = NULL, *filename = NULL, *type = NULL;
adamc@853 244
adamc@853 245 if (part[0] == '-' && part[1] == '-')
adamc@853 246 break;
adamc@853 247
adamc@853 248 if (*part != '\r') {
adamc@856 249 log_error(logger_data, "No \\r after multipart boundary\n");
adamc@853 250 return FAILED;
adamc@853 251 }
adamc@853 252 ++part;
adamc@853 253 if (*part != '\n') {
adamc@856 254 log_error(logger_data, "No \\n after multipart boundary\n");
adamc@853 255 return FAILED;
adamc@853 256 }
adamc@853 257 ++part;
adamc@853 258
adamc@853 259 if (!(after_sub_headers = strstr(part, "\r\n\r\n"))) {
adamc@856 260 log_error(logger_data, "Missing end of headers after multipart boundary\n");
adamc@853 261 return FAILED;
adamc@853 262 }
adamc@853 263 after_sub_headers[2] = 0;
adamc@853 264 after_sub_headers += 4;
adamc@853 265
adamc@853 266 for (header = part; after_header = strstr(header, "\r\n"); header = after_header + 2) {
adamc@853 267 char *colon, *after_colon;
adamc@853 268
adamc@853 269 *after_header = 0;
adamc@853 270 if (!(colon = strchr(header, ':'))) {
adamc@856 271 log_error(logger_data, "Missing colon in multipart sub-header\n");
adamc@853 272 return FAILED;
adamc@853 273 }
adamc@853 274 *colon++ = 0;
adamc@853 275 if (*colon++ != ' ') {
adamc@856 276 log_error(logger_data, "No space after colon in multipart sub-header\n");
adamc@853 277 return FAILED;
adamc@853 278 }
adamc@853 279
adamc@853 280 if (!strcasecmp(header, "Content-Disposition")) {
adamc@853 281 if (strncmp(colon, "form-data; ", 11)) {
adamc@856 282 log_error(logger_data, "Multipart data is not \"form-data\"\n");
adamc@853 283 return FAILED;
adamc@853 284 }
adamc@853 285
adamc@853 286 for (colon += 11; after_colon = strchr(colon, '='); colon = after_colon) {
adamc@853 287 char *data;
adamc@853 288 after_colon[0] = 0;
adamc@853 289 if (after_colon[1] != '"') {
adamc@856 290 log_error(logger_data, "Disposition setting is missing initial quote\n");
adamc@853 291 return FAILED;
adamc@853 292 }
adamc@853 293 data = after_colon+2;
adamc@853 294 if (!(after_colon = strchr(data, '"'))) {
adamc@856 295 log_error(logger_data, "Disposition setting is missing final quote\n");
adamc@853 296 return FAILED;
adamc@853 297 }
adamc@853 298 after_colon[0] = 0;
adamc@853 299 ++after_colon;
adamc@853 300 if (after_colon[0] == ';' && after_colon[1] == ' ')
adamc@853 301 after_colon += 2;
adamc@853 302
adamc@853 303 if (!strcasecmp(colon, "name"))
adamc@853 304 name = data;
adamc@853 305 else if (!strcasecmp(colon, "filename"))
adamc@853 306 filename = data;
adamc@853 307 }
adamc@853 308 } else if (!strcasecmp(header, "Content-Type")) {
adamc@853 309 type = colon;
adamc@853 310 }
adamc@853 311 }
adamc@853 312
adamc@854 313 part = memmem(after_sub_headers, body + body_len - after_sub_headers, boundary, boundary_len);
adamc@853 314 if (!part) {
adamc@856 315 log_error(logger_data, "Missing boundary after multipart payload\n");
adamc@853 316 return FAILED;
adamc@853 317 }
adamc@853 318 part[-2] = 0;
adamc@853 319 part_len = part - after_sub_headers - 2;
adamc@853 320 part[0] = 0;
adamc@853 321 part += boundary_len;
adamc@853 322
adamc@853 323 if (filename) {
adamc@853 324 uw_Basis_file f = {filename, type, {part_len, after_sub_headers}};
adamc@853 325
adamc@853 326 if (uw_set_file_input(ctx, name, f)) {
adamc@856 327 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 328 return FAILED;
adamc@853 329 }
adamc@853 330 } else if (uw_set_input(ctx, name, after_sub_headers)) {
adamc@856 331 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 332 return FAILED;
adamc@853 333 }
adamc@853 334 }
adamc@853 335 }
adamc@853 336 else {
adamc@854 337 inputs = is_post ? body : query_string;
adamc@853 338
adamc@853 339 if (inputs) {
adamc@853 340 char *name, *value;
adamc@853 341
adamc@853 342 while (*inputs) {
adamc@853 343 name = inputs;
adamc@853 344 if (inputs = strchr(inputs, '&'))
adamc@853 345 *inputs++ = 0;
adamc@853 346 else
adamc@853 347 inputs = strchr(name, 0);
adamc@853 348
adamc@853 349 if (value = strchr(name, '=')) {
adamc@853 350 *value++ = 0;
adamc@853 351 if (uw_set_input(ctx, name, value)) {
adamc@856 352 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 353 return FAILED;
adamc@853 354 }
adamc@853 355 }
adamc@853 356 else if (uw_set_input(ctx, name, "")) {
adamc@856 357 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 358 return FAILED;
adamc@853 359 }
adamc@853 360 }
adamc@853 361 }
adamc@853 362 }
adamc@853 363
adamc@856 364 log_debug(logger_data, "Serving URI %s....\n", path);
adamc@853 365
adamc@853 366 while (1) {
adamc@853 367 size_t path_len = strlen(path);
adamc@853 368
adamc@856 369 on_success(ctx);
adamc@853 370
adamc@853 371 if (path_len + 1 > rc->path_copy_size) {
adamc@853 372 rc->path_copy_size = path_len + 1;
adamc@853 373 rc->path_copy = realloc(rc->path_copy, rc->path_copy_size);
adamc@853 374 }
adamc@853 375 strcpy(rc->path_copy, path);
adamc@853 376 fk = uw_begin(ctx, rc->path_copy);
adamc@853 377 if (fk == SUCCESS || fk == RETURN_BLOB) {
adamc@853 378 uw_commit(ctx);
adamc@853 379 return SERVED;
adamc@853 380 } else if (fk == BOUNDED_RETRY) {
adamc@853 381 if (retries_left) {
adamc@856 382 log_debug(logger_data, "Error triggers bounded retry: %s\n", uw_error_message(ctx));
adamc@853 383 --retries_left;
adamc@853 384 }
adamc@853 385 else {
adamc@856 386 log_error(logger_data, "Fatal error (out of retries): %s\n", uw_error_message(ctx));
adamc@853 387
adamc@856 388 try_rollback(ctx, logger_data, log_error);
adamc@853 389
adamc@853 390 uw_reset_keep_error_message(ctx);
adamc@856 391 on_failure(ctx);
adamc@853 392 uw_write_header(ctx, "Content-type: text/plain\r\n");
adamc@853 393 uw_write(ctx, "Fatal error (out of retries): ");
adamc@853 394 uw_write(ctx, uw_error_message(ctx));
adamc@853 395 uw_write(ctx, "\n");
adamc@853 396
adamc@853 397 return FAILED;
adamc@853 398 }
adamc@853 399 } else if (fk == UNLIMITED_RETRY)
adamc@856 400 log_debug(logger_data, "Error triggers unlimited retry: %s\n", uw_error_message(ctx));
adamc@853 401 else if (fk == FATAL) {
adamc@856 402 log_error(logger_data, "Fatal error: %s\n", uw_error_message(ctx));
adamc@853 403
adamc@856 404 try_rollback(ctx, logger_data, log_error);
adamc@853 405
adamc@853 406 uw_reset_keep_error_message(ctx);
adamc@856 407 on_failure(ctx);
adamc@853 408 uw_write_header(ctx, "Content-type: text/html\r\n");
adamc@853 409 uw_write(ctx, "<html><head><title>Fatal Error</title></head><body>");
adamc@853 410 uw_write(ctx, "Fatal error: ");
adamc@853 411 uw_write(ctx, uw_error_message(ctx));
adamc@853 412 uw_write(ctx, "\n</body></html>");
adamc@853 413
adamc@853 414 return FAILED;
adamc@853 415 } else {
adamc@856 416 log_error(logger_data, "Unknown uw_handle return code!\n");
adamc@853 417
adamc@856 418 try_rollback(ctx, logger_data, log_error);
adamc@853 419
adamc@853 420 uw_reset_keep_request(ctx);
adamc@856 421 on_failure(ctx);
adamc@853 422 uw_write_header(ctx, "Content-type: text/plain\r\n");
adamc@853 423 uw_write(ctx, "Unknown uw_handle return code!\n");
adamc@853 424
adamc@853 425 return FAILED;
adamc@853 426 }
adamc@853 427
adamc@856 428 if (try_rollback(ctx, logger_data, log_error))
adamc@853 429 return FAILED;
adamc@853 430
adamc@853 431 uw_reset_keep_request(ctx);
adamc@853 432 }
adamc@853 433 }
adamc@853 434
adamc@856 435 typedef struct {
adamc@856 436 void *logger_data;
adamc@856 437 uw_logger log_error, log_debug;
adamc@856 438 } loggers;
adamc@856 439
adamc@853 440 void *client_pruner(void *data) {
adamc@856 441 loggers *ls = (loggers *)data;
adamc@856 442 uw_context ctx = uw_request_new_context(ls->logger_data, ls->log_error, ls->log_debug);
adamc@853 443
adamc@853 444 if (!ctx)
adamc@853 445 exit(1);
adamc@853 446
adamc@853 447 while (1) {
adamc@853 448 uw_prune_clients(ctx);
adamc@853 449 sleep(5);
adamc@853 450 }
adamc@853 451 }