annotate src/c/request.c @ 1101:b9abd6cded7b

Treat getCookie as effectful
author Adam Chlipala <adamc@hcoop.net>
date Tue, 29 Dec 2009 16:48:27 -0500
parents db52c32dbe42
children 72670131dace
rev   line source
adamc@853 1 #define _GNU_SOURCE
adamc@853 2
adamc@853 3 #include <stdio.h>
adamc@853 4 #include <string.h>
adamc@853 5 #include <stdlib.h>
adamc@853 6 #include <sys/types.h>
adamc@853 7 #include <sys/socket.h>
adamc@853 8 #include <netinet/in.h>
adamc@853 9 #include <unistd.h>
adamc@853 10 #include <signal.h>
adamc@853 11
adamc@853 12 #include <pthread.h>
adamc@853 13
adamc@853 14 #include <mhash.h>
adamc@853 15
adamc@853 16 #include "urweb.h"
adamc@853 17
adamc@853 18 #define MAX_RETRIES 5
adamc@853 19
adamc@856 20 static int try_rollback(uw_context ctx, void *logger_data, uw_logger log_error) {
adamc@853 21 int r = uw_rollback(ctx);
adamc@853 22
adamc@853 23 if (r) {
adamc@856 24 log_error(logger_data, "Error running SQL ROLLBACK\n");
adamc@853 25 uw_reset(ctx);
adamc@853 26 uw_write(ctx, "HTTP/1.1 500 Internal Server Error\n\r");
adamc@853 27 uw_write(ctx, "Content-type: text/plain\r\n\r\n");
adamc@853 28 uw_write(ctx, "Error running SQL ROLLBACK\n");
adamc@853 29 }
adamc@853 30
adamc@853 31 return r;
adamc@853 32 }
adamc@853 33
adamc@1094 34 uw_context uw_request_new_context(uw_app *app, void *logger_data, uw_logger log_error, uw_logger log_debug) {
adamc@853 35 uw_context ctx = uw_init();
adamc@853 36 int retries_left = MAX_RETRIES;
adamc@1094 37 uw_set_app(ctx, app);
adamc@853 38
adamc@853 39 while (1) {
adamc@853 40 failure_kind fk = uw_begin_init(ctx);
adamc@853 41
adamc@853 42 if (fk == SUCCESS) {
adamc@856 43 log_debug(logger_data, "Database connection initialized.\n");
adamc@853 44 break;
adamc@853 45 } else if (fk == BOUNDED_RETRY) {
adamc@853 46 if (retries_left) {
adamc@856 47 log_debug(logger_data, "Initialization error triggers bounded retry: %s\n", uw_error_message(ctx));
adamc@853 48 --retries_left;
adamc@853 49 } else {
adamc@856 50 log_error(logger_data, "Fatal initialization error (out of retries): %s\n", uw_error_message(ctx));
adamc@853 51 uw_free(ctx);
adamc@853 52 return NULL;
adamc@853 53 }
adamc@853 54 } else if (fk == UNLIMITED_RETRY)
adamc@856 55 log_debug(logger_data, "Initialization error triggers unlimited retry: %s\n", uw_error_message(ctx));
adamc@853 56 else if (fk == FATAL) {
adamc@856 57 log_error(logger_data, "Fatal initialization error: %s\n", uw_error_message(ctx));
adamc@853 58 uw_free(ctx);
adamc@853 59 return NULL;
adamc@853 60 } else {
adamc@856 61 log_error(logger_data, "Unknown uw_begin_init return code!\n");
adamc@853 62 uw_free(ctx);
adamc@853 63 return NULL;
adamc@853 64 }
adamc@853 65 }
adamc@853 66
adamc@853 67 return ctx;
adamc@853 68 }
adamc@853 69
adamc@853 70 #define KEYSIZE 16
adamc@853 71 #define PASSSIZE 4
adamc@853 72
adamc@853 73 #define HASH_ALGORITHM MHASH_SHA256
adamc@853 74 #define HASH_BLOCKSIZE 32
adamc@853 75 #define KEYGEN_ALGORITHM KEYGEN_MCRYPT
adamc@853 76
adamc@853 77 int uw_hash_blocksize = HASH_BLOCKSIZE;
adamc@853 78
adamc@853 79 static int password[PASSSIZE];
adamc@853 80 static unsigned char private_key[KEYSIZE];
adamc@853 81
adamc@856 82 static void init_crypto(void *logger_data, uw_logger log_error) {
adamc@853 83 KEYGEN kg = {{HASH_ALGORITHM, HASH_ALGORITHM}};
adamc@853 84 int i;
adamc@853 85
adamc@853 86 assert(mhash_get_block_size(HASH_ALGORITHM) == HASH_BLOCKSIZE);
adamc@853 87
adamc@853 88 for (i = 0; i < PASSSIZE; ++i)
adamc@853 89 password[i] = rand();
adamc@853 90
adamc@853 91 if (mhash_keygen_ext(KEYGEN_ALGORITHM, kg,
adamc@853 92 private_key, sizeof(private_key),
adamc@853 93 (unsigned char*)password, sizeof(password)) < 0) {
adamc@856 94 log_error(logger_data, "Key generation failed\n");
adamc@853 95 exit(1);
adamc@853 96 }
adamc@853 97 }
adamc@853 98
adamc@1094 99 void uw_request_init(uw_app *app, void *logger_data, uw_logger log_error, uw_logger log_debug) {
adamc@853 100 uw_context ctx;
adamc@853 101 failure_kind fk;
adamc@853 102
adamc@853 103 uw_global_init();
adamc@1094 104 uw_app_init(app);
adamc@853 105
adamc@1094 106 ctx = uw_request_new_context(app, logger_data, log_error, log_debug);
adamc@853 107
adamc@853 108 if (!ctx)
adamc@853 109 exit(1);
adamc@853 110
adamc@853 111 for (fk = uw_initialize(ctx); fk == UNLIMITED_RETRY; fk = uw_initialize(ctx)) {
adamc@856 112 log_debug(logger_data, "Unlimited retry during init: %s\n", uw_error_message(ctx));
adamc@1094 113 uw_rollback(ctx);
adamc@853 114 uw_reset(ctx);
adamc@853 115 }
adamc@853 116
adamc@853 117 if (fk != SUCCESS) {
adamc@856 118 log_error(logger_data, "Failed to initialize database! %s\n", uw_error_message(ctx));
adamc@1094 119 uw_rollback(ctx);
adamc@853 120 exit(1);
adamc@853 121 }
adamc@853 122
adamc@853 123 uw_free(ctx);
adamc@853 124
adamc@856 125 init_crypto(logger_data, log_error);
adamc@853 126 }
adamc@853 127
adamc@853 128 void uw_sign(const char *in, char *out) {
adamc@853 129 MHASH td;
adamc@853 130
adamc@853 131 td = mhash_hmac_init(HASH_ALGORITHM, private_key, sizeof(private_key),
adamc@853 132 mhash_get_hash_pblock(HASH_ALGORITHM));
adamc@853 133
adamc@853 134 mhash(td, in, strlen(in));
adamc@853 135 if (mhash_hmac_deinit(td, out) < 0)
adamc@856 136 fprintf(stderr, "Signing failed\n");
adamc@853 137 }
adamc@853 138
adamc@853 139 typedef struct uw_rc {
adamc@853 140 size_t path_copy_size;
adamc@853 141 char *path_copy;
adamc@853 142 } *uw_request_context;
adamc@853 143
adamc@853 144 uw_request_context uw_new_request_context(void) {
adamc@853 145 uw_request_context r = malloc(sizeof(struct uw_rc));
adamc@853 146 r->path_copy_size = 0;
adamc@853 147 r->path_copy = malloc(0);
adamc@853 148 return r;
adamc@853 149 }
adamc@853 150
adamc@853 151 void uw_free_request_context(uw_request_context r) {
adamc@853 152 free(r->path_copy);
adamc@853 153 free(r);
adamc@853 154 }
adamc@853 155
adamc@854 156 request_result uw_request(uw_request_context rc, uw_context ctx,
adamc@854 157 char *method, char *path, char *query_string,
adamc@854 158 char *body, size_t body_len,
adamc@856 159 void (*on_success)(uw_context), void (*on_failure)(uw_context),
adamc@856 160 void *logger_data, uw_logger log_error, uw_logger log_debug,
adamc@863 161 int sock,
adamc@863 162 int (*send)(int sockfd, const void *buf, size_t len),
adamc@863 163 int (*close)(int fd)) {
adamc@853 164 int retries_left = MAX_RETRIES;
adamc@853 165 char *s;
adamc@853 166 failure_kind fk;
adamc@853 167 int is_post = 0, do_normal_send = 1;
adamc@853 168 char *boundary = NULL;
adamc@853 169 size_t boundary_len;
adamc@854 170 char *inputs;
adamc@1094 171 const char *prefix = uw_get_url_prefix(ctx);
adamc@853 172
adamc@1066 173 uw_set_currentUrl(ctx, path);
adamc@1066 174
adamc@854 175 if (!strcmp(method, "POST")) {
adamc@853 176 char *clen_s = uw_Basis_requestHeader(ctx, "Content-length");
adamc@853 177 if (!clen_s) {
adamc@1037 178 clen_s = "0";
adamc@1037 179 /*log_error(logger_data, "No Content-length with POST\n");
adamc@1037 180 return FAILED;*/
adamc@853 181 }
adamc@853 182 int clen = atoi(clen_s);
adamc@853 183 if (clen < 0) {
adamc@856 184 log_error(logger_data, "Negative Content-length with POST\n");
adamc@853 185 return FAILED;
adamc@853 186 }
adamc@853 187
adamc@854 188 if (body_len < clen) {
adamc@856 189 log_error(logger_data, "Request doesn't contain all POST data (according to Content-Length)\n");
adamc@853 190 return FAILED;
adamc@853 191 }
adamc@853 192
adamc@853 193 is_post = 1;
adamc@853 194
adamc@853 195 clen_s = uw_Basis_requestHeader(ctx, "Content-type");
adamc@853 196 if (clen_s && !strncasecmp(clen_s, "multipart/form-data", 19)) {
adamc@853 197 if (strncasecmp(clen_s + 19, "; boundary=", 11)) {
adamc@856 198 log_error(logger_data, "Bad multipart boundary spec");
adamc@853 199 return FAILED;
adamc@853 200 }
adamc@853 201
adamc@853 202 boundary = clen_s + 28;
adamc@853 203 boundary[0] = '-';
adamc@853 204 boundary[1] = '-';
adamc@853 205 boundary_len = strlen(boundary);
adamc@853 206 }
adamc@854 207 } else if (strcmp(method, "GET")) {
adamc@856 208 log_error(logger_data, "Not ready for non-GET/POST command: %s\n", method);
adamc@853 209 return FAILED;
adamc@853 210 }
adamc@853 211
adamc@1094 212 if (!strncmp(path, prefix, strlen(prefix))
adamc@1094 213 && !strcmp(path + strlen(prefix), ".msgs")) {
adamc@853 214 char *id = uw_Basis_requestHeader(ctx, "UrWeb-Client");
adamc@853 215 char *pass = uw_Basis_requestHeader(ctx, "UrWeb-Pass");
adamc@853 216
adamc@853 217 if (sock < 0) {
adamc@856 218 log_error(logger_data, ".msgs requested, but not socket supplied\n");
adamc@853 219 return FAILED;
adamc@853 220 }
adamc@853 221
adamc@853 222 if (id && pass) {
adamc@853 223 unsigned idn = atoi(id);
adamc@864 224 uw_client_connect(idn, atoi(pass), sock, send, close, logger_data, log_error);
adamc@856 225 log_error(logger_data, "Processed request for messages by client %u\n\n", idn);
adamc@853 226 return KEEP_OPEN;
adamc@853 227 }
adamc@853 228 else {
adamc@856 229 log_error(logger_data, "Missing fields in .msgs request: %s, %s\n\n", id, pass);
adamc@853 230 return FAILED;
adamc@853 231 }
adamc@853 232 }
adamc@853 233
adamc@853 234 if (boundary) {
adamc@854 235 char *part = body, *after_sub_headers, *header, *after_header;
adamc@853 236 size_t part_len;
adamc@853 237
adamc@853 238 part = strstr(part, boundary);
adamc@853 239 if (!part) {
adamc@856 240 log_error(logger_data, "Missing first multipart boundary\n");
adamc@853 241 return FAILED;
adamc@853 242 }
adamc@853 243 part += boundary_len;
adamc@853 244
adamc@853 245 while (1) {
adamc@853 246 char *name = NULL, *filename = NULL, *type = NULL;
adamc@853 247
adamc@853 248 if (part[0] == '-' && part[1] == '-')
adamc@853 249 break;
adamc@853 250
adamc@853 251 if (*part != '\r') {
adamc@856 252 log_error(logger_data, "No \\r after multipart boundary\n");
adamc@853 253 return FAILED;
adamc@853 254 }
adamc@853 255 ++part;
adamc@853 256 if (*part != '\n') {
adamc@856 257 log_error(logger_data, "No \\n after multipart boundary\n");
adamc@853 258 return FAILED;
adamc@853 259 }
adamc@853 260 ++part;
adamc@853 261
adamc@853 262 if (!(after_sub_headers = strstr(part, "\r\n\r\n"))) {
adamc@856 263 log_error(logger_data, "Missing end of headers after multipart boundary\n");
adamc@853 264 return FAILED;
adamc@853 265 }
adamc@853 266 after_sub_headers[2] = 0;
adamc@853 267 after_sub_headers += 4;
adamc@853 268
adamc@853 269 for (header = part; after_header = strstr(header, "\r\n"); header = after_header + 2) {
adamc@853 270 char *colon, *after_colon;
adamc@853 271
adamc@853 272 *after_header = 0;
adamc@853 273 if (!(colon = strchr(header, ':'))) {
adamc@856 274 log_error(logger_data, "Missing colon in multipart sub-header\n");
adamc@853 275 return FAILED;
adamc@853 276 }
adamc@853 277 *colon++ = 0;
adamc@853 278 if (*colon++ != ' ') {
adamc@856 279 log_error(logger_data, "No space after colon in multipart sub-header\n");
adamc@853 280 return FAILED;
adamc@853 281 }
adamc@853 282
adamc@853 283 if (!strcasecmp(header, "Content-Disposition")) {
adamc@853 284 if (strncmp(colon, "form-data; ", 11)) {
adamc@856 285 log_error(logger_data, "Multipart data is not \"form-data\"\n");
adamc@853 286 return FAILED;
adamc@853 287 }
adamc@853 288
adamc@853 289 for (colon += 11; after_colon = strchr(colon, '='); colon = after_colon) {
adamc@853 290 char *data;
adamc@853 291 after_colon[0] = 0;
adamc@853 292 if (after_colon[1] != '"') {
adamc@856 293 log_error(logger_data, "Disposition setting is missing initial quote\n");
adamc@853 294 return FAILED;
adamc@853 295 }
adamc@853 296 data = after_colon+2;
adamc@853 297 if (!(after_colon = strchr(data, '"'))) {
adamc@856 298 log_error(logger_data, "Disposition setting is missing final quote\n");
adamc@853 299 return FAILED;
adamc@853 300 }
adamc@853 301 after_colon[0] = 0;
adamc@853 302 ++after_colon;
adamc@853 303 if (after_colon[0] == ';' && after_colon[1] == ' ')
adamc@853 304 after_colon += 2;
adamc@853 305
adamc@853 306 if (!strcasecmp(colon, "name"))
adamc@853 307 name = data;
adamc@853 308 else if (!strcasecmp(colon, "filename"))
adamc@853 309 filename = data;
adamc@853 310 }
adamc@853 311 } else if (!strcasecmp(header, "Content-Type")) {
adamc@853 312 type = colon;
adamc@853 313 }
adamc@853 314 }
adamc@853 315
adamc@854 316 part = memmem(after_sub_headers, body + body_len - after_sub_headers, boundary, boundary_len);
adamc@853 317 if (!part) {
adamc@856 318 log_error(logger_data, "Missing boundary after multipart payload\n");
adamc@853 319 return FAILED;
adamc@853 320 }
adamc@853 321 part[-2] = 0;
adamc@853 322 part_len = part - after_sub_headers - 2;
adamc@853 323 part[0] = 0;
adamc@853 324 part += boundary_len;
adamc@853 325
adamc@853 326 if (filename) {
adamc@853 327 uw_Basis_file f = {filename, type, {part_len, after_sub_headers}};
adamc@853 328
adamc@853 329 if (uw_set_file_input(ctx, name, f)) {
adamc@856 330 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 331 return FAILED;
adamc@853 332 }
adamc@853 333 } else if (uw_set_input(ctx, name, after_sub_headers)) {
adamc@856 334 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 335 return FAILED;
adamc@853 336 }
adamc@853 337 }
adamc@853 338 }
adamc@853 339 else {
adamc@854 340 inputs = is_post ? body : query_string;
adamc@853 341
adamc@853 342 if (inputs) {
adamc@853 343 char *name, *value;
adamc@853 344
adamc@853 345 while (*inputs) {
adamc@853 346 name = inputs;
adamc@853 347 if (inputs = strchr(inputs, '&'))
adamc@853 348 *inputs++ = 0;
adamc@853 349 else
adamc@853 350 inputs = strchr(name, 0);
adamc@853 351
adamc@853 352 if (value = strchr(name, '=')) {
adamc@853 353 *value++ = 0;
adamc@853 354 if (uw_set_input(ctx, name, value)) {
adamc@856 355 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 356 return FAILED;
adamc@853 357 }
adamc@853 358 }
adamc@853 359 else if (uw_set_input(ctx, name, "")) {
adamc@856 360 log_error(logger_data, "%s\n", uw_error_message(ctx));
adamc@853 361 return FAILED;
adamc@853 362 }
adamc@853 363 }
adamc@853 364 }
adamc@853 365 }
adamc@853 366
adamc@856 367 log_debug(logger_data, "Serving URI %s....\n", path);
adamc@853 368
adamc@853 369 while (1) {
adamc@853 370 size_t path_len = strlen(path);
adamc@853 371
adamc@856 372 on_success(ctx);
adamc@853 373
adamc@853 374 if (path_len + 1 > rc->path_copy_size) {
adamc@853 375 rc->path_copy_size = path_len + 1;
adamc@853 376 rc->path_copy = realloc(rc->path_copy, rc->path_copy_size);
adamc@853 377 }
adamc@853 378 strcpy(rc->path_copy, path);
adamc@853 379 fk = uw_begin(ctx, rc->path_copy);
adamc@1065 380 if (fk == SUCCESS || fk == RETURN_INDIRECTLY) {
adamc@853 381 uw_commit(ctx);
adamc@853 382 return SERVED;
adamc@853 383 } else if (fk == BOUNDED_RETRY) {
adamc@853 384 if (retries_left) {
adamc@856 385 log_debug(logger_data, "Error triggers bounded retry: %s\n", uw_error_message(ctx));
adamc@853 386 --retries_left;
adamc@853 387 }
adamc@853 388 else {
adamc@856 389 log_error(logger_data, "Fatal error (out of retries): %s\n", uw_error_message(ctx));
adamc@853 390
adamc@856 391 try_rollback(ctx, logger_data, log_error);
adamc@853 392
adamc@853 393 uw_reset_keep_error_message(ctx);
adamc@856 394 on_failure(ctx);
adamc@853 395 uw_write_header(ctx, "Content-type: text/plain\r\n");
adamc@853 396 uw_write(ctx, "Fatal error (out of retries): ");
adamc@853 397 uw_write(ctx, uw_error_message(ctx));
adamc@853 398 uw_write(ctx, "\n");
adamc@853 399
adamc@853 400 return FAILED;
adamc@853 401 }
adamc@853 402 } else if (fk == UNLIMITED_RETRY)
adamc@856 403 log_debug(logger_data, "Error triggers unlimited retry: %s\n", uw_error_message(ctx));
adamc@853 404 else if (fk == FATAL) {
adamc@856 405 log_error(logger_data, "Fatal error: %s\n", uw_error_message(ctx));
adamc@853 406
adamc@856 407 try_rollback(ctx, logger_data, log_error);
adamc@853 408
adamc@853 409 uw_reset_keep_error_message(ctx);
adamc@856 410 on_failure(ctx);
adamc@853 411 uw_write_header(ctx, "Content-type: text/html\r\n");
adamc@853 412 uw_write(ctx, "<html><head><title>Fatal Error</title></head><body>");
adamc@853 413 uw_write(ctx, "Fatal error: ");
adamc@853 414 uw_write(ctx, uw_error_message(ctx));
adamc@853 415 uw_write(ctx, "\n</body></html>");
adamc@853 416
adamc@853 417 return FAILED;
adamc@853 418 } else {
adamc@856 419 log_error(logger_data, "Unknown uw_handle return code!\n");
adamc@853 420
adamc@856 421 try_rollback(ctx, logger_data, log_error);
adamc@853 422
adamc@853 423 uw_reset_keep_request(ctx);
adamc@856 424 on_failure(ctx);
adamc@853 425 uw_write_header(ctx, "Content-type: text/plain\r\n");
adamc@853 426 uw_write(ctx, "Unknown uw_handle return code!\n");
adamc@853 427
adamc@853 428 return FAILED;
adamc@853 429 }
adamc@853 430
adamc@856 431 if (try_rollback(ctx, logger_data, log_error))
adamc@853 432 return FAILED;
adamc@853 433
adamc@853 434 uw_reset_keep_request(ctx);
adamc@853 435 }
adamc@853 436 }
adamc@853 437
adamc@856 438 typedef struct {
adamc@1094 439 uw_app *app;
adamc@856 440 void *logger_data;
adamc@856 441 uw_logger log_error, log_debug;
adamc@856 442 } loggers;
adamc@856 443
adamc@853 444 void *client_pruner(void *data) {
adamc@856 445 loggers *ls = (loggers *)data;
adamc@1094 446 uw_context ctx = uw_request_new_context(ls->app, ls->logger_data, ls->log_error, ls->log_debug);
adamc@853 447
adamc@853 448 if (!ctx)
adamc@853 449 exit(1);
adamc@853 450
adamc@853 451 while (1) {
adamc@853 452 uw_prune_clients(ctx);
adamc@853 453 sleep(5);
adamc@853 454 }
adamc@853 455 }