4 * This is the actual program called by the webserver. It maintains a
5 * persistent session to the Citadel server, handling HTTP WebCit requests as
6 * they arrive and presenting a user interface.
17 #include <sys/types.h>
19 #include <sys/socket.h>
23 #include <netinet/in.h>
32 #include "mime_parser.h"
35 * String to unset the cookie.
36 * Any date "in the past" will work, so I chose my birthday, right down to
37 * the exact minute. :)
39 static char *unset = "; expires=28-May-1971 18:10:00 GMT";
41 void unescape_input(char *buf)
46 while ((isspace(buf[strlen(buf) - 1])) && (strlen(buf) > 0))
47 buf[strlen(buf) - 1] = 0;
49 for (a = 0; a < strlen(buf); ++a) {
56 sscanf(hex, "%02x", &b);
58 strcpy(&buf[a + 1], &buf[a + 3]);
65 void addurls(char *url)
73 while (strlen(up) > 0) {
75 /* locate the = sign */
76 strncpy(buf, up, 255);
78 for (a = 255; a >= 0; --a)
85 u = (struct urlcontent *) malloc(sizeof(struct urlcontent));
86 u->next = WC->urlstrings;
88 strcpy(u->url_key, buf);
90 /* now chop that part off */
91 for (a = 0; a <= b; ++a)
94 /* locate the & sign */
97 for (a = 0; a < strlen(up); ++a) {
98 if (!strncmp(ptr, "&", 1)) {
105 for (a = 0; a < b; ++a)
109 u->url_data = malloc(strlen(up) + 1);
110 strcpy(u->url_data, up);
112 unescape_input(u->url_data);
120 struct urlcontent *u;
122 while (WC->urlstrings != NULL) {
123 free(WC->urlstrings->url_data);
124 u = WC->urlstrings->next;
125 free(WC->urlstrings);
131 * Diagnostic function to display the contents of all variables
135 struct urlcontent *u;
137 for (u = WC->urlstrings; u != NULL; u = u->next) {
138 wprintf("%38s = %s\n", u->url_key, u->url_data);
142 char *bstr(char *key)
144 struct urlcontent *u;
146 for (u = WC->urlstrings; u != NULL; u = u->next) {
147 if (!strcasecmp(u->url_key, key))
148 return (u->url_data);
154 void wprintf(const char *format,...)
159 va_start(arg_ptr, format);
160 vsprintf(wbuf, format, arg_ptr);
163 write(WC->http_sock, wbuf, strlen(wbuf));
168 * wDumpContent() wraps up an HTTP session, closes tags, etc.
170 * print_standard_html_footer should be set to 0 to transmit only, 1 to
171 * append the main menu and closing tags, or 2 to
172 * append the closing tags only.
174 void wDumpContent(int print_standard_html_footer)
176 if (WC->fake_frames) {
177 wprintf("</TABLE>\n");
181 if (print_standard_html_footer) {
182 if (print_standard_html_footer != 2) {
185 wprintf("</BODY></HTML>\n");
193 * Copy a string, escaping characters which have meaning in HTML. If
194 * nbsp is nonzero, spaces are converted to non-breaking spaces.
196 void stresc(char *target, char *strbuf, int nbsp)
201 for (a = 0; a < strlen(strbuf); ++a) {
202 if (strbuf[a] == '<')
203 strcat(target, "<");
204 else if (strbuf[a] == '>')
205 strcat(target, ">");
206 else if (strbuf[a] == '&')
207 strcat(target, "&");
208 else if (strbuf[a] == '\"')
209 strcat(target, """);
210 else if (strbuf[a] == '\'')
211 strcat(target, "'");
212 else if (strbuf[a] == LB)
214 else if (strbuf[a] == RB)
216 else if (strbuf[a] == QU)
217 strcat(target, "\"");
218 else if ((strbuf[a] == 32) && (nbsp == 1)) {
219 strcat(target, " ");
221 strncat(target, &strbuf[a], 1);
226 void escputs1(char *strbuf, int nbsp)
229 stresc(buf, strbuf, nbsp);
233 void escputs(char *strbuf)
239 * Escape a string for feeding out as a URL.
240 * FIXME this is not threadsafe!
242 char *urlesc(char *strbuf)
245 char *ec = " #&;`'|*?-~<>^()[]{}$\\";
246 static char outbuf[1024];
250 for (a = 0; a < strlen(strbuf); ++a) {
252 for (b = 0; b < strlen(ec); ++b) {
253 if (strbuf[a] == ec[b])
258 sprintf(&outbuf[b], "%%%02x", strbuf[a]);
260 sprintf(&outbuf[b], "%c", strbuf[a]);
265 void urlescputs(char *strbuf)
267 wprintf("%s", urlesc(strbuf));
274 * Output all that important stuff that the browser will want to see
279 * 0 = Nothing. Do not display any leading HTTP or HTML.
280 * 1 = HTTP headers plus the room banner
281 * 2 = HTTP headers required to terminate the session (unset cookies)
282 * 3 = HTTP and HTML headers, but no room banner
284 * Bit 2: Set to 1 to auto-refresh page every 30 seconds
286 * Bit 3: suppress check for express messages
288 void output_headers(int controlcode)
291 int print_standard_html_head = 0;
293 int suppress_check = 0;
295 static int pageseq = 0;
297 print_standard_html_head = controlcode & 0x03;
298 refresh30 = ((controlcode & 0x04) >> 2);
299 suppress_check = ((controlcode & 0x08) >> 3);
301 wprintf("HTTP/1.0 200 OK\n");
303 httpdate(httpnow, time(NULL));
305 if (print_standard_html_head > 0) {
306 wprintf("Content-type: text/html\n");
307 wprintf("Server: %s\n", SERVER);
308 wprintf("Connection: close\n");
309 wprintf("Pragma: no-cache\n");
310 wprintf("Cache-Control: no-store\n");
312 stuff_to_cookie(cookie, WC->wc_session, WC->wc_username,
313 WC->wc_password, WC->wc_roomname);
314 if (print_standard_html_head == 2) {
315 wprintf("Set-cookie: webcit=%s\n", unset);
317 wprintf("Set-cookie: webcit=%s\n", cookie);
320 if (print_standard_html_head > 0) {
322 wprintf("<HTML><HEAD><TITLE>");
323 escputs(serv_info.serv_humannode);
325 "<META HTTP-EQUIV=\"Expires\" CONTENT=\"0\">\n"
326 "<META HTTP-EQUIV=\"Pragma\" CONTENT=\"no-cache\">\n"
327 "<meta name=\"MSSmartTagsPreventParsing\" content=\"TRUE\">\n");
328 if (refresh30) wprintf(
329 "<META HTTP-EQUIV=\"refresh\" CONTENT=\"30\">\n");
330 wprintf("</HEAD>\n");
332 /* script for checking for pages (not always launched) */
333 wprintf("<SCRIPT LANGUAGE=\"JavaScript\">\n");
334 wprintf("function launch_page_popup() {\n");
335 wprintf("pwin = window.open('/page_popup', 'CitaPage%d', "
336 "'toolbar=no,location=no,copyhistory=no,status=no,"
337 "scrollbars=yes,resizable=no,height=150,width=400');\n",
340 wprintf("</SCRIPT>\n");
343 /* (JavaScript keyboard-based navigation would go here) */
345 if (!suppress_check) if (WC->HaveExpressMessages) {
346 svprintf("extrabodyparms", WCS_STRING, "%s",
347 "onload=\"launch_page_popup()\" ");
348 WC->HaveExpressMessages = 0;
350 do_template("background.html");
351 clear_local_substs();
353 if (print_standard_html_head == 1) {
354 wprintf("<A NAME=\"TheTop\"></A>");
356 wprintf("<TABLE border=0 width=100%%><TR VALIGN=TOP>"
359 embed_room_banner(NULL);
361 wprintf("</TD></TR><TR VALIGN=TOP><TD>\n");
372 void http_redirect(char *whichpage) {
373 wprintf("HTTP/1.0 302 Moved Temporarily\n");
374 wprintf("Location: %s\n", whichpage);
375 wprintf("URI: %s\n", whichpage);
376 wprintf("Content-type: text/html\n\n");
377 wprintf("<html><body>\n");
378 wprintf("you really want to be <A HREF=\"%s\">here</A> now\n",
380 wprintf("</body></html>\n");
385 void check_for_express_messages()
391 if (buf[3] == '*') WC->HaveExpressMessages = 1;
397 void output_static(char *what)
405 sprintf(buf, "static/%s", what);
406 fp = fopen(buf, "rb");
408 wprintf("HTTP/1.0 404 %s\n", strerror(errno));
409 wprintf("Content-Type: text/plain\n");
411 wprintf("Cannot open %s: %s\n", what, strerror(errno));
415 if (!strncasecmp(&what[strlen(what) - 4], ".gif", 4))
416 wprintf("Content-type: image/gif\n");
417 else if (!strncasecmp(&what[strlen(what) - 4], ".txt", 4))
418 wprintf("Content-type: text/plain\n");
419 else if (!strncasecmp(&what[strlen(what) - 4], ".jpg", 4))
420 wprintf("Content-type: image/jpeg\n");
421 else if (!strncasecmp(&what[strlen(what) - 5], ".html", 5))
422 wprintf("Content-type: text/html\n");
424 wprintf("Content-type: application/octet-stream\n");
426 fstat(fileno(fp), &statbuf);
427 bytes = statbuf.st_size;
428 fprintf(stderr, "Static: %s, %ld bytes\n", what, bytes);
429 wprintf("Content-length: %ld\n", (long) bytes);
431 bigbuffer = malloc(bytes);
432 fread(bigbuffer, bytes, 1, fp);
434 write(WC->http_sock, bigbuffer, bytes);
437 if (!strcasecmp(bstr("force_close_session"), "yes")) {
438 end_webcit_session();
444 * When the browser requests an image file from the Citadel server,
445 * this function is called to transmit it.
453 off_t accomplished = 0L;
456 serv_printf("OIMG %s|%s", bstr("name"), bstr("parm"));
459 bytes = extract_long(&buf[4], 0);
461 wprintf("Content-type: image/gif\n");
462 wprintf("Content-length: %ld\n", (long) bytes);
465 while (bytes > (off_t) 0) {
466 thisblock = (off_t) sizeof(xferbuf);
467 if (thisblock > bytes) {
470 serv_printf("READ %ld|%ld", accomplished, thisblock);
473 thisblock = extract_long(&buf[4], 0);
474 serv_read(xferbuf, (int) thisblock);
477 memset(xferbuf, 0, thisblock);
479 write(WC->http_sock, xferbuf, thisblock);
480 bytes = bytes - thisblock;
481 accomplished = accomplished + thisblock;
486 wprintf("HTTP/1.0 404 %s\n", &buf[4]);
488 wprintf("Content-Type: text/plain\n");
490 wprintf("Error retrieving image: %s\n", &buf[4]);
497 void output_mimepart()
503 off_t accomplished = 0L;
504 char content_type[256];
506 serv_printf("OPNA %s|%s", bstr("msgnum"), bstr("partnum"));
509 bytes = extract_long(&buf[4], 0);
510 extract(content_type, &buf[4], 3);
512 wprintf("Content-type: %s\n", content_type);
513 wprintf("Content-length: %ld\n", (long) bytes);
516 while (bytes > (off_t) 0) {
517 thisblock = (off_t) sizeof(xferbuf);
518 if (thisblock > bytes) {
521 serv_printf("READ %ld|%ld", accomplished, thisblock);
524 thisblock = extract_long(&buf[4], 0);
525 serv_read(xferbuf, (int) thisblock);
528 memset(xferbuf, 0, thisblock);
530 write(WC->http_sock, xferbuf, thisblock);
531 bytes = bytes - thisblock;
532 accomplished = accomplished + thisblock;
537 wprintf("HTTP/1.0 404 %s\n", &buf[4]);
539 wprintf("Content-Type: text/plain\n");
541 wprintf("Error retrieving part: %s\n", &buf[4]);
548 * Convenience functions to display a page containing only a string
550 void convenience_page(char *titlebarcolor, char *titlebarmsg, char *messagetext)
552 wprintf("HTTP/1.0 200 OK\n");
554 wprintf("<TABLE WIDTH=100%% BORDER=0 BGCOLOR=%s><TR><TD>", titlebarcolor);
555 wprintf("<FONT SIZE=+1 COLOR=\"FFFFFF\"");
556 wprintf("<B>%s</B>\n", titlebarmsg);
557 wprintf("</FONT></TD></TR></TABLE><BR>\n");
558 escputs(messagetext);
566 * Display a blank page.
568 void blank_page(void) {
574 void display_error(char *errormessage)
576 convenience_page("770000", "Error", errormessage);
579 void display_success(char *successmessage)
581 convenience_page("007700", "OK", successmessage);
586 void extract_action(char *actbuf, char *cmdbuf)
590 strcpy(actbuf, cmdbuf);
591 if (!strncasecmp(actbuf, "GET /", 5))
592 strcpy(actbuf, &actbuf[5]);
593 if (!strncasecmp(actbuf, "PUT /", 5))
594 strcpy(actbuf, &actbuf[5]);
595 if (!strncasecmp(actbuf, "POST /", 6))
596 strcpy(actbuf, &actbuf[6]);
598 for (i = 0; i < strlen(actbuf); ++i) {
599 if (actbuf[i] == ' ') {
603 if (actbuf[i] == '/') {
607 if (actbuf[i] == '?') {
611 if (actbuf[i] == '&') {
619 void upload_handler(char *name, char *filename, char *partnum, char *disp,
620 void *content, char *cbtype, size_t length,
621 char *encoding, void *userdata)
624 fprintf(stderr, "UPLOAD HANDLER CALLED\n");
625 fprintf(stderr, " name = %s\n", name);
626 fprintf(stderr, "filename = %s\n", filename);
627 fprintf(stderr, "encoding = %s\n", encoding);
628 fprintf(stderr, " type = %s\n", cbtype);
629 fprintf(stderr, " length = %ld\n", (long)length);
631 if ( (strlen(name) > 0) || (strlen(filename) > 0) ) {
632 WC->upload = malloc(length);
633 if (WC->upload != NULL) {
634 WC->upload_length = length;
635 memcpy(WC->upload, content, length);
642 * Entry point for WebCit transaction
644 void session_loop(struct httprequest *req)
650 int ContentLength = 0;
652 char ContentType[512];
655 struct httprequest *hptr;
656 char browser_host[256];
657 char user_agent[256];
659 /* We stuff these with the values coming from the client cookies,
660 * so we can use them to reconnect a timed out session if we have to.
664 char c_username[256];
665 char c_password[256];
666 char c_roomname[256];
669 strcpy(c_host, defaulthost);
670 strcpy(c_port, defaultport);
671 strcpy(c_username, "");
672 strcpy(c_password, "");
673 strcpy(c_roomname, "");
675 WC->upload_length = 0;
679 if (hptr == NULL) return;
681 strcpy(cmd, hptr->line);
683 extract_action(action, cmd);
685 while (hptr != NULL) {
686 strcpy(buf, hptr->line);
689 if (!strncasecmp(buf, "Cookie: webcit=", 15)) {
690 strcpy(cookie, &buf[15]);
691 cookie_to_stuff(cookie, NULL,
692 c_username, c_password, c_roomname);
694 else if (!strncasecmp(buf, "Content-length: ", 16)) {
695 ContentLength = atoi(&buf[16]);
697 else if (!strncasecmp(buf, "Content-type: ", 14)) {
698 strcpy(ContentType, &buf[14]);
700 else if (!strncasecmp(buf, "User-agent: ", 12)) {
701 strcpy(user_agent, &buf[12]);
705 if (ContentLength > 0) {
706 fprintf(stderr, "Content length: %d\n", ContentLength);
707 content = malloc(ContentLength + 1);
708 memset(content, 0, ContentLength+1);
711 while (BytesRead < ContentLength) {
712 a=read(WC->http_sock, &content[BytesRead],
713 ContentLength - BytesRead);
714 if (a <= 0) BytesRead = ContentLength;
718 if (!strncasecmp(ContentType,
719 "application/x-www-form-urlencoded", 33)) {
721 } else if (!strncasecmp(ContentType, "multipart", 9)) {
722 content_end = content + ContentLength;
723 mime_parser(content, content_end, *upload_handler,
724 NULL, NULL, NULL, 0);
730 /* If there are variables in the URL, we must grab them now */
731 for (a = 0; a < strlen(cmd); ++a)
732 if ((cmd[a] == '?') || (cmd[a] == '&')) {
733 for (b = a; b < strlen(cmd); ++b)
736 addurls(&cmd[a + 1]);
740 * If we're not connected to a Citadel server, try to hook up the
741 * connection now. Preference is given to the host and port specified
742 * by browser cookies, if cookies have been supplied.
744 if (!WC->connected) {
745 if (strlen(bstr("host")) > 0)
746 strcpy(c_host, bstr("host"));
747 if (strlen(bstr("port")) > 0)
748 strcpy(c_port, bstr("port"));
750 if (!strcasecmp(c_host, "uds")) {
751 /* unix domain socket */
752 sprintf(buf, "%s/citadel.socket", c_port);
753 WC->serv_sock = uds_connectsock(buf);
757 WC->serv_sock = tcp_connectsock(c_host, c_port);
760 if (WC->serv_sock < 0) {
762 goto SKIP_ALL_THIS_CRAP;
766 serv_gets(buf); /* get the server welcome message */
767 locate_host(browser_host, WC->http_sock);
768 get_serv_info(browser_host, user_agent);
772 check_for_express_messages();
775 * If we're not logged in, but we have username and password cookies
776 * supplied by the browser, try using them to log in.
778 if ((!WC->logged_in) && (strlen(c_username) > 0) && (strlen(c_password) > 0)) {
779 serv_printf("USER %s", c_username);
782 serv_printf("PASS %s", c_password);
785 become_logged_in(c_username, c_password, buf);
790 * If we don't have a current room, but a cookie specifying the
791 * current room is supplied, make an effort to go there.
793 if ((strlen(WC->wc_roomname) == 0) && (strlen(c_roomname) > 0)) {
794 serv_printf("GOTO %s", c_roomname);
797 strcpy(WC->wc_roomname, c_roomname);
800 if (!strcasecmp(action, "static")) {
801 strcpy(buf, &cmd[12]);
802 for (a = 0; a < strlen(buf); ++a)
806 } else if (!strcasecmp(action, "image")) {
808 } else if ((!WC->logged_in) && (!strcasecmp(action, "login"))) {
810 } else if (!WC->logged_in) {
813 /* Various commands... */
815 else if (!strcasecmp(action, "do_welcome")) {
817 } else if (!strcasecmp(action, "blank")) {
819 } else if (!strcasecmp(action, "display_main_menu")) {
821 } else if (!strcasecmp(action, "whobbs")) {
823 } else if (!strcasecmp(action, "knrooms")) {
824 list_all_rooms_by_floor();
825 } else if (!strcasecmp(action, "gotonext")) {
828 } else if (!strcasecmp(action, "skip")) {
830 } else if (!strcasecmp(action, "ungoto")) {
832 } else if (!strcasecmp(action, "dotgoto")) {
834 smart_goto(bstr("room"));
835 } else if (!strcasecmp(action, "dotskip")) {
836 smart_goto(bstr("room"));
837 } else if (!strcasecmp(action, "termquit")) {
839 } else if (!strcasecmp(action, "readnew")) {
841 } else if (!strcasecmp(action, "readold")) {
843 } else if (!strcasecmp(action, "readfwd")) {
845 } else if (!strcasecmp(action, "headers")) {
847 } else if (!strcasecmp(action, "display_enter")) {
849 } else if (!strcasecmp(action, "post")) {
851 } else if (!strcasecmp(action, "delete_msg")) {
853 } else if (!strcasecmp(action, "confirm_move_msg")) {
855 } else if (!strcasecmp(action, "move_msg")) {
857 } else if (!strcasecmp(action, "userlist")) {
859 } else if (!strcasecmp(action, "showuser")) {
861 } else if (!strcasecmp(action, "display_page")) {
863 } else if (!strcasecmp(action, "page_user")) {
865 } else if (!strcasecmp(action, "chat")) {
867 } else if (!strcasecmp(action, "display_private")) {
868 display_private("", 0);
869 } else if (!strcasecmp(action, "goto_private")) {
871 } else if (!strcasecmp(action, "zapped_list")) {
873 } else if (!strcasecmp(action, "display_zap")) {
875 } else if (!strcasecmp(action, "zap")) {
877 } else if (!strcasecmp(action, "display_entroom")) {
879 } else if (!strcasecmp(action, "entroom")) {
881 } else if (!strcasecmp(action, "display_editroom")) {
883 } else if (!strcasecmp(action, "editroom")) {
885 } else if (!strcasecmp(action, "display_whok")) {
887 } else if (!strcasecmp(action, "display_editinfo")) {
888 display_edit("Room info", "EINF 0", "RINF", "/editinfo");
889 } else if (!strcasecmp(action, "editinfo")) {
890 save_edit("Room info", "EINF 1", 1);
891 } else if (!strcasecmp(action, "display_editbio")) {
892 sprintf(buf, "RBIO %s", WC->wc_username);
893 display_edit("Your bio", "NOOP", buf, "editbio");
894 } else if (!strcasecmp(action, "editbio")) {
895 save_edit("Your bio", "EBIO", 0);
896 } else if (!strcasecmp(action, "confirm_delete_room")) {
897 confirm_delete_room();
898 } else if (!strcasecmp(action, "delete_room")) {
900 } else if (!strcasecmp(action, "validate")) {
902 } else if (!strcasecmp(action, "display_editpic")) {
903 display_graphics_upload("your photo",
906 } else if (!strcasecmp(action, "editpic")) {
907 do_graphics_upload("UIMG 1|_userpic_");
908 } else if (!strcasecmp(action, "display_editroompic")) {
909 display_graphics_upload("the graphic for this room",
912 } else if (!strcasecmp(action, "editroompic")) {
913 do_graphics_upload("UIMG 1|_roompic_");
914 } else if (!strcasecmp(action, "select_floor_to_edit_pic")) {
915 select_floor_to_edit_pic();
916 } else if (!strcasecmp(action, "display_editfloorpic")) {
917 sprintf(buf, "UIMG 0|_floorpic_|%s",
918 bstr("which_floor"));
919 display_graphics_upload("the graphic for this floor",
922 } else if (!strcasecmp(action, "editfloorpic")) {
923 sprintf(buf, "UIMG 1|_floorpic_|%s",
924 bstr("which_floor"));
925 do_graphics_upload(buf);
926 } else if (!strcasecmp(action, "display_reg")) {
928 } else if (!strcasecmp(action, "register")) {
930 } else if (!strcasecmp(action, "display_changepw")) {
932 } else if (!strcasecmp(action, "changepw")) {
934 } else if (!strcasecmp(action, "display_edit_node")) {
936 } else if (!strcasecmp(action, "display_netconf")) {
938 } else if (!strcasecmp(action, "display_confirm_unshare")) {
939 display_confirm_unshare();
940 } else if (!strcasecmp(action, "display_confirm_delete_node")) {
941 display_confirm_delete_node();
942 } else if (!strcasecmp(action, "delete_node")) {
944 } else if (!strcasecmp(action, "unshare")) {
946 } else if (!strcasecmp(action, "display_add_node")) {
948 } else if (!strcasecmp(action, "add_node")) {
950 } else if (!strcasecmp(action, "display_share")) {
952 } else if (!strcasecmp(action, "share")) {
954 } else if (!strcasecmp(action, "terminate_session")) {
957 } else if (!strcasecmp(action, "edit_me")) {
959 } else if (!strcasecmp(action, "display_siteconfig")) {
960 display_siteconfig();
961 } else if (!strcasecmp(action, "page_popup")) {
963 } else if (!strcasecmp(action, "siteconfig")) {
965 } else if (!strcasecmp(action, "display_generic")) {
967 } else if (!strcasecmp(action, "do_generic")) {
969 } else if (!strcasecmp(action, "display_menubar")) {
971 } else if (!strcasecmp(action, "output_mimepart")) {
973 } else if (!strcasecmp(action, "diagnostics")) {
976 wprintf("You're in session %d<HR>\n", WC->wc_session);
977 wprintf("Command: <BR><PRE>\n");
979 wprintf("</PRE><HR>\n");
980 wprintf("Variables: <BR><PRE>\n");
982 wprintf("</PRE><HR>\n");
985 /* When all else fais, display the main menu. */
992 if (content != NULL) {
997 if (WC->upload_length > 0) {
999 WC->upload_length = 0;