annotate src/c/request.c @ 1093:8d3aa6c7cee0

Make summary unification more conservative; infer implicit arguments after applications
author Adam Chlipala <adamc@hcoop.net>
date Sat, 26 Dec 2009 11:56:40 -0500
parents 740b85ef4352
children db52c32dbe42
rev   line source
adamc@853 1 #define _GNU_SOURCE
adamc@853 2
adamc@853 3 #include <stdio.h>
adamc@853 4 #include <string.h>
adamc@853 5 #include <stdlib.h>
adamc@853 6 #include <sys/types.h>
adamc@853 7 #include <sys/socket.h>
adamc@853 8 #include <netinet/in.h>
adamc@853 9 #include <unistd.h>
adamc@853 10 #include <signal.h>
adamc@853 11
adamc@853 12 #include <pthread.h>
adamc@853 13
adamc@853 14 #include <mhash.h>
adamc@853 15
adamc@853 16 #include "urweb.h"
adamc@853 17
adamc@853 18 #define MAX_RETRIES 5
adamc@853 19
adamc@856 20 static int try_rollback(uw_context ctx, void *logger_data, uw_logger log_error) {
adamc@853 21 int r = uw_rollback(ctx);
adamc@853 22
adamc@853 23 if (r) {
adamc@856 24 log_error(logger_data, "Error running SQL ROLLBACK\n");
adamc@853 25 uw_reset(ctx);
adamc@853 26 uw_write(ctx, "HTTP/1.1 500 Internal Server Error\n\r");
adamc@853 27 uw_write(ctx, "Content-type: text/plain\r\n\r\n");
adamc@853 28 uw_write(ctx, "Error running SQL ROLLBACK\n");
adamc@853 29 }
adamc@853 30
adamc@853 31 return r;
adamc@853 32 }
adamc@853 33
adamc@856 34 uw_context uw_request_new_context(void *logger_data, uw_logger log_error, uw_logger log_debug) {
adamc@853 35 uw_context ctx = uw_init();
adamc@853 36 int retries_left = MAX_RETRIES;
adamc@853 37
adamc@853 38 while (1) {
adamc@853 39 failure_kind fk = uw_begin_init(ctx);
adamc@853 40
adamc@853 41 if (fk == SUCCESS) {
adamc@856 42 log_debug(logger_data, "Database connection initialized.\n");
adamc@853 43 break;
adamc@853 44 } else if (fk == BOUNDED_RETRY) {
adamc@853 45 if (retries_left) {
adamc@856 46 log_debug(logger_data, "Initialization error triggers bounded retry: %s\n", uw_error_message(ctx));
adamc@853 47 --retries_left;
adamc@853 48 } else {
adamc@856 49 log_error(logger_data, "Fatal initialization error (out of retries): %s\n", uw_error_message(ctx));
adamc@853 50 uw_free(ctx);
adamc@853 51 return NULL;
adamc@853 52 }
adamc@853 53 } else if (fk == UNLIMITED_RETRY)
adamc@856 54 log_debug(logger_data, "Initialization error triggers unlimited retry: %s\n", uw_error_message(ctx));
adamc@853 55 else if (fk == FATAL) {
adamc@856 56 log_error(logger_data, "Fatal initialization error: %s\n", uw_error_message(ctx));
adamc@853 57 uw_free(ctx);
adamc@853 58 return NULL;
adamc@853 59 } else {
adamc@856 60 log_error(logger_data, "Unknown uw_begin_init return code!\n");
adamc@853 61 uw_free(ctx);
adamc@853 62 return NULL;
adamc@853 63 }
adamc@853 64 }
adamc@853 65
adamc@853 66 return ctx;
adamc@853 67 }
adamc@853 68
adamc@853 69 #define KEYSIZE 16
adamc@853 70 #define PASSSIZE 4
adamc@853 71
adamc@853 72 #define HASH_ALGORITHM MHASH_SHA256
adamc@853 73 #define HASH_BLOCKSIZE 32
adamc@853 74 #define KEYGEN_ALGORITHM KEYGEN_MCRYPT
adamc@853 75
adamc@853 76 int uw_hash_blocksize = HASH_BLOCKSIZE;
adamc@853 77
adamc@853 78 static int password[PASSSIZE];
adamc@853 79 static unsigned char private_key[KEYSIZE];
adamc@853 80
adamc@856 81 static void init_crypto(void *logger_data, uw_logger log_error) {
adamc@853 82 KEYGEN kg = {{HASH_ALGORITHM, HASH_ALGORITHM}};
adamc@853 83 int i;
adamc@853 84
adamc@853 85 assert(mhash_get_block_size(HASH_ALGORITHM) == HASH_BLOCKSIZE);
adamc@853 86
adamc@853 87 for (i = 0; i < PASSSIZE; ++i)
adamc@853 88 password[i] = rand();
adamc@853 89
adamc@853 90 if (mhash_keygen_ext(KEYGEN_ALGORITHM, kg,
adamc@853 91 private_key, sizeof(private_key),
adamc@853 92 (unsigned char*)password, sizeof(password)) < 0) {
adamc@856 93 log_error(logger_data, "Key generation failed\n");
adamc@853 94 exit(1);
adamc@853 95 }
adamc@853 96 }
adamc@853 97
adamc@856 98 void uw_request_init(void *logger_data, uw_logger log_error, uw_logger log_debug) {
adamc@853 99 uw_context ctx;
adamc@853 100 failure_kind fk;
adamc@853 101
adamc@853 102 uw_global_init();
adamc@853 103
adamc@856 104 ctx = uw_request_new_context(logger_data, log_error, log_debug);
adamc@853 105
adamc@853 106 if (!ctx)
adamc@853 107 exit(1);
adamc@853 108
adamc@853 109 for (fk = uw_initialize(ctx); fk == UNLIMITED_RETRY; fk = uw_initialize(ctx)) {
adamc@856 110 log_debug(logger_data, "Unlimited retry during init: %s\n", uw_error_message(ctx));
adamc@853 111 uw_db_rollback(ctx);
adamc@853 112 uw_reset(ctx);
adamc@853 113 }
adamc@853 114
adamc@853 115 if (fk != SUCCESS) {
adamc@856 116 log_error(logger_data, "Failed to initialize database! %s\n", uw_error_message(ctx));
adamc@853 117 uw_db_rollback(ctx);
adamc@853 118 exit(1);
adamc@853 119 }
adamc@853 120
adamc@853 121 uw_free(ctx);
adamc@853 122
adamc@856 123 init_crypto(logger_data, log_error);
adamc@853 124 }
adamc@853 125
adamc@853 126 void uw_sign(const char *in, char *out) {
adamc@853 127 MHASH td;
adamc@853 128
adamc@853 129 td = mhash_hmac_init(HASH_ALGORITHM, private_key, sizeof(private_key),
adamc@853 130 mhash_get_hash_pblock(HASH_ALGORITHM));
adamc@853 131
adamc@853 132 mhash(td, in, strlen(in));
adamc@853 133 if (mhash_hmac_deinit(td, out) < 0)
adamc@856 134 fprintf(stderr, "Signing failed\n");
adamc@853 135 }
adamc@853 136
adamc@853 137 typedef struct uw_rc {
adamc@853 138 size_t path_copy_size;
adamc@853 139 char *path_copy;
adamc@853 140 } *uw_request_context;
adamc@853 141
adamc@853 142 uw_request_context uw_new_request_context(void) {
adamc@853 143 uw_request_context r = malloc(sizeof(struct uw_rc));
adamc@853 144 r->path_copy_size = 0;
adamc@853 145 r->path_copy = malloc(0);
adamc@853 146 return r;
adamc@853 147 }
adamc@853 148
adamc@853 149 void uw_free_request_context(uw_request_context r) {
adamc@853 150 free(r->path_copy);
adamc@853 151 free(r);
adamc@853 152 }
adamc@853 153
adamc@863 154 extern char *uw_url_prefix;
adamc@863 155
adamc@854 156 request_result uw_request(uw_request_context rc, uw_context ctx,
adamc@854 157 char *method, char *path, char *query_string,
adamc@854 158 char *body, size_t body_len,
adamc@856 159 void (*on_success)(uw_context), void (*on_failure)(uw_context),
adamc@856 160 void *logger_data, uw_logger log_error, uw_logger log_debug,
adamc@863 161 int sock,
adamc@863 162 int (*send)(int sockfd, const void *buf, size_t len),
adamc@863 163 int (*close)(int fd)) {
adamc@853 164 int retries_left = MAX_RETRIES;
adamc@853 165 char *s;
adamc@853 166 failure_kind fk;
adamc@853 167 int is_post = 0, do_normal_send = 1;
adamc@853 168 char *boundary = NULL;
adamc@853 169 size_t boundary_len;
adamc@854 170 char *inputs;
adamc@853 171
adamc@1066 172 uw_set_currentUrl(ctx, path);
adamc@1066 173
adamc@854 174 if (!strcmp(method, "POST")) {
adamc@853 175 char *clen_s = uw_Basis_requestHeader(ctx, "Content-length");
adamc@853 176 if (!clen_s) {
adamc@1037 177 clen_s = "0";
adamc@1037 178 /*log_error(logger_data, "No Content-length with POST\n");
adamc@1037 179 return FAILED;*/
adamc@853 180 }
adamc@853 181 int clen = atoi(clen_s);
adamc@853 182 if (clen < 0) {
adamc@856 183 log_error(logger_data, "Negative Content-length with POST\n");
adamc@853 184 return FAILED;
adamc@853 185 }
adamc@853 186
adamc@854 187 if (body_len < clen) {
adamc@856 188 log_error(logger_data, "Request doesn't contain all POST data (according to Content-Length)\n");
adamc@853 189 return FAILED;
adamc@853 190 }
adamc@853 191
adamc@853 192 is_post = 1;
adamc@853 193
adamc@853 194 clen_s = uw_Basis_requestHeader(ctx, "Content-type");
adamc@853 195 if (clen_s && !strncasecmp(clen_s, "multipart/form-data", 19)) {
adamc@853 196 if (strncasecmp(clen_s + 19, "; boundary=", 11)) {
adamc@856 197 log_error(logger_data, "Bad multipart boundary spec");
adamc@853 198 return FAILED;
adamc@853 199 }
adamc@853 200
adamc@853 201 boundary = clen_s + 28;
adamc@853 202 boundary[0] = '-';
adamc@853 203 boundary[1] = '-';
adamc@853 204 boundary_len = strlen(boundary);
adamc@853 205 }
adamc@854 206 } else if (strcmp(method, "GET")) {
adamc@856 207 log_error(logger_data, "Not ready for non-GET/POST command: %s\n", method);
adamc@853 208 return FAILED;
adamc@853 209 }
adamc@853 210
adamc@863 211 if (!strncmp(path, uw_url_prefix, strlen(uw_url_prefix))
adamc@863 212 && !strcmp(path + strlen(uw_url_prefix), ".msgs")) {
adamc@853 213 char *id = uw_Basis_requestHeader(ctx, "UrWeb-Client");
adamc@853 214 char *pass = uw_Basis_requestHeader(ctx, "UrWeb-Pass");
adamc@853 215
adamc@853 216 if (sock < 0) {
adamc@856 217 log_error(logger_data, ".msgs requested, but not socket supplied\n");
adamc@853 218 return FAILED;
adamc@853 219 }
adamc@853 220
adamc@853 221 if (id && pass) {
adamc@853 222 unsigned idn = atoi(id);
adamc@864 223 uw_client_connect(idn, atoi(pass), sock, send, close, logger_data, log_error);
adamc@856 224 log_error(logger_data, "Processed request for messages by client %u\n\n", idn);
adamc@853 225 return KEEP_OPEN;
adamc@853 226 }
adamc@853 227 else {
adamc@856 228 log_error(logger_data, "Missing fields in .msgs request: %s, %s\n\n", id, pass);
adamc@853 229 return FAILED;
adamc@853 230 }
adamc@853 231 }
adamc@853 232
adamc@853 233 if (boundary) {
adamc@854 234 char *part = body, *after_sub_headers, *header, *after_header;
adamc@853 235 size_t part_len;
adamc@853 236
adamc@853 237 part = strstr(part, boundary);
adamc@853 238 if (!part) {
adamc@856 239 log_error(logger_data, "Missing first multipart boundary\n");
adamc@853 240 return FAILED;
adamc@853 241 }
adamc@853 242 part += boundary_len;
adamc@853 243
adamc@853 244 while (1) {
adamc@853 245 char *name = NULL, *filename = NULL, *type = NULL;
adamc@853 246
adamc@853 247 if (part[0] == '-' && part[1] == '-')
adamc@853 248 break;
adamc@853 249
adamc@853 250 if (*part != '\r') {
adamc@856 251 log_error(logger_data, "No \\r after multipart boundary\n");
adamc@853 252 return FAILED;
adamc@853 253 }
adamc@853 254 ++part;
adamc@853 255 if (*part != '\n') {
adamc@856 256 log_error(logger_data, "No \\n after multipart boundary\n");
adamc@853 257 return FAILED;
adamc@853 258 }
adamc@853 259 ++part;
adamc@853 260
adamc@853 261 if (!(after_sub_headers = strstr(part, "\r\n\r\n"))) {
adamc@856 262 log_error(logger_data, "Missing end of headers after multipart boundary\n");
adamc@853 263 return FAILED;
adamc@853 264 }
adamc@853 265 after_sub_headers[2] = 0;
adamc@853 266 after_sub_headers += 4;
adamc@853 267
adamc@853 268 for (header = part; after_header = strstr(header, "\r\n"); header = after_header + 2) {
adamc@853 269 char *colon, *after_colon;
adamc@853 270
adamc@853 271 *after_header = 0;
adamc@853 272 if (!(colon = strchr(header, ':'))) {
adamc@856 273 log_error(logger_data, "Missing colon in multipart sub-header\n");
adamc@853 274 return FAILED;
adamc@853 275 }
adamc@853 276 *colon++ = 0;
adamc@853 277 if (*colon++ != ' ') {
adamc@856 278 log_error(logger_data, "No space after colon in multipart sub-header\n");
adamc@853 279 return FAILED;
adamc@853 280 }
adamc@853 281
adamc@853 282 if (!strcasecmp(header, "Content-Disposition")) {
adamc@853 283 if (strncmp(colon, "form-data; ", 11)) {
adamc@856 284 log_error(logger_data, "Multipart data is not \"form-data\"\n");
adamc@853 285 return FAILED;
adamc@853 286 }
adamc@853 287
adamc@853 288 for (colon += 11; after_colon = strchr(colon, '='); colon = after_colon) {
adamc@853 289 char *data;
adamc@853 290 after_colon[0] = 0;
adamc@853 291 if (after_colon[1] != '"') {
adamc@856 292 log_error(logger_data, "Disposition setting is missing initial quote\n");
adamc@853 293 return FAILED;
adamc@853 294 }
adamc@853 295 data = after_colon+2;
adamc@853 296 if (!(after_colon = strchr(data, '"'))) {
adamc@856 297 log_error(logger_data, "Disposition setting is missing final quote\n");
adamc@853 298 return FAILED;
adamc@853 299 }
adamc@853 300 after_colon[0] = 0;
adamc@853 301 ++after_colon;
adamc@853 302 if (after_colon[0] == ';' && after_colon[1] == ' ')
adamc@853 303 after_colon += 2;
adamc@853 304
adamc@853 305 if (!strcasecmp(colon, "name"))
adamc@853 306 name = data;
adamc@853 307 else if (!strcasecmp(colon, "filename"))
adamc@853 308 filename = data;
adamc@853 309 }
adamc@853 310 } else if (!strcasecmp(header, "Content-Type")) {
adamc@853 311 type = colon;
adamc@853 312 }
adamc@853 313 }
adamc@853 314
adamc@854 315 part = memmem(after_sub_headers, body + body_len - after_sub_headers, boundary, boundary_len);
adamc@853 316 if (!part) {
adamc@856 317 log_error(logger_data, "Missing boundary after multipart payload\n");
adamc@853 318 return FAILED;
adamc@853 319 }
adamc@853 320 part[-2] = 0;
adamc@853 321 part_len = part - after_sub_headers - 2;
adamc@853 322 part[0] = 0;
adamc@853 323 part += boundary_len;
adamc@853 324
adamc@853 325 if (filename) {
adamc@853 326 uw_Basis_file f = {filename, type, {part_len, after_sub_headers}};
adamc@853 327
adamc@853 328 if (uw_set_file_input(ctx, name, f)) {
adamc@856 329 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 330 return FAILED;
adamc@853 331 }
adamc@853 332 } else if (uw_set_input(ctx, name, after_sub_headers)) {
adamc@856 333 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 334 return FAILED;
adamc@853 335 }
adamc@853 336 }
adamc@853 337 }
adamc@853 338 else {
adamc@854 339 inputs = is_post ? body : query_string;
adamc@853 340
adamc@853 341 if (inputs) {
adamc@853 342 char *name, *value;
adamc@853 343
adamc@853 344 while (*inputs) {
adamc@853 345 name = inputs;
adamc@853 346 if (inputs = strchr(inputs, '&'))
adamc@853 347 *inputs++ = 0;
adamc@853 348 else
adamc@853 349 inputs = strchr(name, 0);
adamc@853 350
adamc@853 351 if (value = strchr(name, '=')) {
adamc@853 352 *value++ = 0;
adamc@853 353 if (uw_set_input(ctx, name, value)) {
adamc@856 354 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 355 return FAILED;
adamc@853 356 }
adamc@853 357 }
adamc@853 358 else if (uw_set_input(ctx, name, "")) {
adamc@856 359 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 360 return FAILED;
adamc@853 361 }
adamc@853 362 }
adamc@853 363 }
adamc@853 364 }
adamc@853 365
adamc@856 366 log_debug(logger_data, "Serving URI %s....\n", path);
adamc@853 367
adamc@853 368 while (1) {
adamc@853 369 size_t path_len = strlen(path);
adamc@853 370
adamc@856 371 on_success(ctx);
adamc@853 372
adamc@853 373 if (path_len + 1 > rc->path_copy_size) {
adamc@853 374 rc->path_copy_size = path_len + 1;
adamc@853 375 rc->path_copy = realloc(rc->path_copy, rc->path_copy_size);
adamc@853 376 }
adamc@853 377 strcpy(rc->path_copy, path);
adamc@853 378 fk = uw_begin(ctx, rc->path_copy);
adamc@1065 379 if (fk == SUCCESS || fk == RETURN_INDIRECTLY) {
adamc@853 380 uw_commit(ctx);
adamc@853 381 return SERVED;
adamc@853 382 } else if (fk == BOUNDED_RETRY) {
adamc@853 383 if (retries_left) {
adamc@856 384 log_debug(logger_data, "Error triggers bounded retry: %s\n", uw_error_message(ctx));
adamc@853 385 --retries_left;
adamc@853 386 }
adamc@853 387 else {
adamc@856 388 log_error(logger_data, "Fatal error (out of retries): %s\n", uw_error_message(ctx));
adamc@853 389
adamc@856 390 try_rollback(ctx, logger_data, log_error);
adamc@853 391
adamc@853 392 uw_reset_keep_error_message(ctx);
adamc@856 393 on_failure(ctx);
adamc@853 394 uw_write_header(ctx, "Content-type: text/plain\r\n");
adamc@853 395 uw_write(ctx, "Fatal error (out of retries): ");
adamc@853 396 uw_write(ctx, uw_error_message(ctx));
adamc@853 397 uw_write(ctx, "\n");
adamc@853 398
adamc@853 399 return FAILED;
adamc@853 400 }
adamc@853 401 } else if (fk == UNLIMITED_RETRY)
adamc@856 402 log_debug(logger_data, "Error triggers unlimited retry: %s\n", uw_error_message(ctx));
adamc@853 403 else if (fk == FATAL) {
adamc@856 404 log_error(logger_data, "Fatal error: %s\n", uw_error_message(ctx));
adamc@853 405
adamc@856 406 try_rollback(ctx, logger_data, log_error);
adamc@853 407
adamc@853 408 uw_reset_keep_error_message(ctx);
adamc@856 409 on_failure(ctx);
adamc@853 410 uw_write_header(ctx, "Content-type: text/html\r\n");
adamc@853 411 uw_write(ctx, "<html><head><title>Fatal Error</title></head><body>");
adamc@853 412 uw_write(ctx, "Fatal error: ");
adamc@853 413 uw_write(ctx, uw_error_message(ctx));
adamc@853 414 uw_write(ctx, "\n</body></html>");
adamc@853 415
adamc@853 416 return FAILED;
adamc@853 417 } else {
adamc@856 418 log_error(logger_data, "Unknown uw_handle return code!\n");
adamc@853 419
adamc@856 420 try_rollback(ctx, logger_data, log_error);
adamc@853 421
adamc@853 422 uw_reset_keep_request(ctx);
adamc@856 423 on_failure(ctx);
adamc@853 424 uw_write_header(ctx, "Content-type: text/plain\r\n");
adamc@853 425 uw_write(ctx, "Unknown uw_handle return code!\n");
adamc@853 426
adamc@853 427 return FAILED;
adamc@853 428 }
adamc@853 429
adamc@856 430 if (try_rollback(ctx, logger_data, log_error))
adamc@853 431 return FAILED;
adamc@853 432
adamc@853 433 uw_reset_keep_request(ctx);
adamc@853 434 }
adamc@853 435 }
adamc@853 436
adamc@856 437 typedef struct {
adamc@856 438 void *logger_data;
adamc@856 439 uw_logger log_error, log_debug;
adamc@856 440 } loggers;
adamc@856 441
adamc@853 442 void *client_pruner(void *data) {
adamc@856 443 loggers *ls = (loggers *)data;
adamc@856 444 uw_context ctx = uw_request_new_context(ls->logger_data, ls->log_error, ls->log_debug);
adamc@853 445
adamc@853 446 if (!ctx)
adamc@853 447 exit(1);
adamc@853 448
adamc@853 449 while (1) {
adamc@853 450 uw_prune_clients(ctx);
adamc@853 451 sleep(5);
adamc@853 452 }
adamc@853 453 }