4 * This is the actual program called by the webserver. It maintains a
5 * persistent session to the Citadel server, handling HTTP WebCit requests as
6 * they arrive and presenting a user interface.
17 #include <sys/types.h>
19 #include <sys/socket.h>
23 #include <netinet/in.h>
32 #include "mime_parser.h"
35 * String to unset the cookie.
36 * Any date "in the past" will work, so I chose my birthday, right down to
37 * the exact minute. :)
39 static char *unset = "; expires=28-May-1971 18:10:00 GMT";
41 void unescape_input(char *buf)
46 while ((isspace(buf[strlen(buf) - 1])) && (strlen(buf) > 0))
47 buf[strlen(buf) - 1] = 0;
49 for (a = 0; a < strlen(buf); ++a) {
56 sscanf(hex, "%02x", &b);
58 strcpy(&buf[a + 1], &buf[a + 3]);
65 void addurls(char *url)
73 while (strlen(up) > 0) {
75 /* locate the = sign */
76 strncpy(buf, up, 255);
78 for (a = 255; a >= 0; --a)
85 u = (struct urlcontent *) malloc(sizeof(struct urlcontent));
86 u->next = WC->urlstrings;
88 strcpy(u->url_key, buf);
90 /* now chop that part off */
91 for (a = 0; a <= b; ++a)
94 /* locate the & sign */
97 for (a = 0; a < strlen(up); ++a) {
98 if (!strncmp(ptr, "&", 1)) {
105 for (a = 0; a < b; ++a)
109 u->url_data = malloc(strlen(up) + 1);
110 strcpy(u->url_data, up);
112 unescape_input(u->url_data);
120 struct urlcontent *u;
122 while (WC->urlstrings != NULL) {
123 free(WC->urlstrings->url_data);
124 u = WC->urlstrings->next;
125 free(WC->urlstrings);
131 * Diagnostic function to display the contents of all variables
135 struct urlcontent *u;
137 for (u = WC->urlstrings; u != NULL; u = u->next) {
138 wprintf("%38s = %s\n", u->url_key, u->url_data);
142 char *bstr(char *key)
144 struct urlcontent *u;
146 for (u = WC->urlstrings; u != NULL; u = u->next) {
147 if (!strcasecmp(u->url_key, key))
148 return (u->url_data);
154 void wprintf(const char *format,...)
159 va_start(arg_ptr, format);
160 vsprintf(wbuf, format, arg_ptr);
163 write(WC->http_sock, wbuf, strlen(wbuf));
168 * wDumpContent() wraps up an HTTP session, closes tags, etc.
170 * print_standard_html_footer should be set to 0 to transmit only, 1 to
171 * append the main menu and closing tags, or 2 to
172 * append the closing tags only.
174 void wDumpContent(int print_standard_html_footer)
176 if (WC->fake_frames) {
177 wprintf("</TABLE>\n");
181 if (print_standard_html_footer) {
182 if (print_standard_html_footer != 2) {
185 wprintf("</BODY></HTML>\n");
193 * Copy a string, escaping characters which have meaning in HTML. If
194 * nbsp is nonzero, spaces are converted to non-breaking spaces.
196 void stresc(char *target, char *strbuf, int nbsp)
201 for (a = 0; a < strlen(strbuf); ++a) {
202 if (strbuf[a] == '<')
203 strcat(target, "<");
204 else if (strbuf[a] == '>')
205 strcat(target, ">");
206 else if (strbuf[a] == '&')
207 strcat(target, "&");
208 else if (strbuf[a] == '\"')
209 strcat(target, """);
210 else if (strbuf[a] == '\'')
211 strcat(target, "'");
212 else if (strbuf[a] == LB)
214 else if (strbuf[a] == RB)
216 else if (strbuf[a] == QU)
217 strcat(target, "\"");
218 else if ((strbuf[a] == 32) && (nbsp == 1)) {
219 strcat(target, " ");
221 strncat(target, &strbuf[a], 1);
226 void escputs1(char *strbuf, int nbsp)
229 stresc(buf, strbuf, nbsp);
233 void escputs(char *strbuf)
239 * Escape a string for feeding out as a URL.
240 * FIXME this is not threadsafe!
242 char *urlesc(char *strbuf)
245 char *ec = " #&;`'|*?-~<>^()[]{}$\\";
246 static char outbuf[1024];
250 for (a = 0; a < strlen(strbuf); ++a) {
252 for (b = 0; b < strlen(ec); ++b) {
253 if (strbuf[a] == ec[b])
258 sprintf(&outbuf[b], "%%%02x", strbuf[a]);
260 sprintf(&outbuf[b], "%c", strbuf[a]);
265 void urlescputs(char *strbuf)
267 wprintf("%s", urlesc(strbuf));
274 * Output all that important stuff that the browser will want to see
279 * 0 = Nothing. Do not display any leading HTTP or HTML.
280 * 1 = HTTP headers plus the room banner
281 * 2 = HTTP headers required to terminate the session (unset cookies)
282 * 3 = HTTP and HTML headers, but no room banner
284 * Bit 2: Set to 1 to auto-refresh page every 30 seconds
286 * Bit 3: suppress check for express messages
288 void output_headers(int controlcode)
291 int print_standard_html_head = 0;
293 int suppress_check = 0;
295 static int pageseq = 0;
297 print_standard_html_head = controlcode & 0x03;
298 refresh30 = ((controlcode & 0x04) >> 2);
299 suppress_check = ((controlcode & 0x08) >> 3);
301 wprintf("HTTP/1.0 200 OK\n");
303 httpdate(httpnow, time(NULL));
305 if (print_standard_html_head > 0) {
306 wprintf("Content-type: text/html\n");
307 wprintf("Server: %s\n", SERVER);
308 wprintf("Connection: close\n");
309 wprintf("Pragma: no-cache\n");
310 wprintf("Cache-Control: no-store\n");
312 stuff_to_cookie(cookie, WC->wc_session, WC->wc_username,
313 WC->wc_password, WC->wc_roomname);
314 if (print_standard_html_head == 2) {
315 wprintf("Set-cookie: webcit=%s\n", unset);
317 wprintf("Set-cookie: webcit=%s\n", cookie);
320 if (print_standard_html_head > 0) {
322 wprintf("<HTML><HEAD><TITLE>");
323 escputs(serv_info.serv_humannode);
325 "<META HTTP-EQUIV=\"Pragma\" CONTENT=\"no-cache\">\n"
326 "<META HTTP-EQUIV=\"expired\" CONTENT=\"28-May-1971 18:10:00 GMT\">\n"
327 "<meta name=\"MSSmartTagsPreventParsing\" content=\"TRUE\">\n");
328 if (refresh30) wprintf(
329 "<META HTTP-EQUIV=\"refresh\" CONTENT=\"30\">\n");
331 "<META HTTP-EQUIV=\"refresh\" CONTENT=\"500363689;\">\n");
332 wprintf("</HEAD>\n");
334 /* script for checking for pages (not always launched) */
335 wprintf("<SCRIPT LANGUAGE=\"JavaScript\">\n");
336 wprintf("function launch_page_popup() {\n");
337 wprintf("pwin = window.open('/page_popup', 'CitaPage%d', "
338 "'toolbar=no,location=no,copyhistory=no,status=no,"
339 "scrollbars=yes,resizable=no,height=150,width=400');\n",
342 wprintf("</SCRIPT>\n");
345 /* (JavaScript keyboard-based navigation would go here) */
347 if (!suppress_check) if (WC->HaveExpressMessages) {
348 svprintf("extrabodyparms", WCS_STRING, "%s",
349 "onload=\"launch_page_popup()\" ");
350 WC->HaveExpressMessages = 0;
352 do_template("background.html");
353 clear_local_substs();
355 if (print_standard_html_head == 1) {
356 wprintf("<A NAME=\"TheTop\"></A>");
358 wprintf("<TABLE border=0 width=100%%><TR VALIGN=TOP>"
361 embed_room_banner(NULL);
363 wprintf("</TD></TR><TR VALIGN=TOP><TD>\n");
374 void http_redirect(char *whichpage) {
375 wprintf("HTTP/1.0 302 Moved Temporarily\n");
376 wprintf("Location: %s\n", whichpage);
377 wprintf("URI: %s\n", whichpage);
378 wprintf("Content-type: text/html\n\n");
379 wprintf("<html><body>\n");
380 wprintf("you really want to be <A HREF=\"%s\">here</A> now\n",
382 wprintf("</body></html>\n");
387 void check_for_express_messages()
393 if (buf[3] == '*') WC->HaveExpressMessages = 1;
399 void output_static(char *what)
407 sprintf(buf, "static/%s", what);
408 fp = fopen(buf, "rb");
410 wprintf("HTTP/1.0 404 %s\n", strerror(errno));
411 wprintf("Content-Type: text/plain\n");
413 wprintf("Cannot open %s: %s\n", what, strerror(errno));
417 if (!strncasecmp(&what[strlen(what) - 4], ".gif", 4))
418 wprintf("Content-type: image/gif\n");
419 else if (!strncasecmp(&what[strlen(what) - 4], ".txt", 4))
420 wprintf("Content-type: text/plain\n");
421 else if (!strncasecmp(&what[strlen(what) - 4], ".jpg", 4))
422 wprintf("Content-type: image/jpeg\n");
423 else if (!strncasecmp(&what[strlen(what) - 5], ".html", 5))
424 wprintf("Content-type: text/html\n");
426 wprintf("Content-type: application/octet-stream\n");
428 fstat(fileno(fp), &statbuf);
429 bytes = statbuf.st_size;
430 fprintf(stderr, "Static: %s, %ld bytes\n", what, bytes);
431 wprintf("Content-length: %ld\n", (long) bytes);
433 bigbuffer = malloc(bytes);
434 fread(bigbuffer, bytes, 1, fp);
436 write(WC->http_sock, bigbuffer, bytes);
439 if (!strcasecmp(bstr("force_close_session"), "yes")) {
440 end_webcit_session();
446 * When the browser requests an image file from the Citadel server,
447 * this function is called to transmit it.
455 off_t accomplished = 0L;
458 serv_printf("OIMG %s|%s", bstr("name"), bstr("parm"));
461 bytes = extract_long(&buf[4], 0);
463 wprintf("Content-type: image/gif\n");
464 wprintf("Content-length: %ld\n", (long) bytes);
467 while (bytes > (off_t) 0) {
468 thisblock = (off_t) sizeof(xferbuf);
469 if (thisblock > bytes) {
472 serv_printf("READ %ld|%ld", accomplished, thisblock);
475 thisblock = extract_long(&buf[4], 0);
476 serv_read(xferbuf, (int) thisblock);
479 memset(xferbuf, 0, thisblock);
481 write(WC->http_sock, xferbuf, thisblock);
482 bytes = bytes - thisblock;
483 accomplished = accomplished + thisblock;
488 wprintf("HTTP/1.0 404 %s\n", &buf[4]);
490 wprintf("Content-Type: text/plain\n");
492 wprintf("Error retrieving image: %s\n", &buf[4]);
499 void output_mimepart()
505 off_t accomplished = 0L;
506 char content_type[256];
508 serv_printf("OPNA %s|%s", bstr("msgnum"), bstr("partnum"));
511 bytes = extract_long(&buf[4], 0);
512 extract(content_type, &buf[4], 3);
514 wprintf("Content-type: %s\n", content_type);
515 wprintf("Content-length: %ld\n", (long) bytes);
518 while (bytes > (off_t) 0) {
519 thisblock = (off_t) sizeof(xferbuf);
520 if (thisblock > bytes) {
523 serv_printf("READ %ld|%ld", accomplished, thisblock);
526 thisblock = extract_long(&buf[4], 0);
527 serv_read(xferbuf, (int) thisblock);
530 memset(xferbuf, 0, thisblock);
532 write(WC->http_sock, xferbuf, thisblock);
533 bytes = bytes - thisblock;
534 accomplished = accomplished + thisblock;
539 wprintf("HTTP/1.0 404 %s\n", &buf[4]);
541 wprintf("Content-Type: text/plain\n");
543 wprintf("Error retrieving part: %s\n", &buf[4]);
550 * Convenience functions to display a page containing only a string
552 void convenience_page(char *titlebarcolor, char *titlebarmsg, char *messagetext)
554 wprintf("HTTP/1.0 200 OK\n");
556 wprintf("<TABLE WIDTH=100%% BORDER=0 BGCOLOR=%s><TR><TD>", titlebarcolor);
557 wprintf("<FONT SIZE=+1 COLOR=\"FFFFFF\"");
558 wprintf("<B>%s</B>\n", titlebarmsg);
559 wprintf("</FONT></TD></TR></TABLE><BR>\n");
560 escputs(messagetext);
568 * Display a blank page.
570 void blank_page(void) {
576 void display_error(char *errormessage)
578 convenience_page("770000", "Error", errormessage);
581 void display_success(char *successmessage)
583 convenience_page("007700", "OK", successmessage);
588 void extract_action(char *actbuf, char *cmdbuf)
592 strcpy(actbuf, cmdbuf);
593 if (!strncasecmp(actbuf, "GET /", 5))
594 strcpy(actbuf, &actbuf[5]);
595 if (!strncasecmp(actbuf, "PUT /", 5))
596 strcpy(actbuf, &actbuf[5]);
597 if (!strncasecmp(actbuf, "POST /", 6))
598 strcpy(actbuf, &actbuf[6]);
600 for (i = 0; i < strlen(actbuf); ++i) {
601 if (actbuf[i] == ' ') {
605 if (actbuf[i] == '/') {
609 if (actbuf[i] == '?') {
613 if (actbuf[i] == '&') {
621 void upload_handler(char *name, char *filename, char *partnum, char *disp,
622 void *content, char *cbtype, size_t length,
623 char *encoding, void *userdata)
626 fprintf(stderr, "UPLOAD HANDLER CALLED\n");
627 fprintf(stderr, " name = %s\n", name);
628 fprintf(stderr, "filename = %s\n", filename);
629 fprintf(stderr, "encoding = %s\n", encoding);
630 fprintf(stderr, " type = %s\n", cbtype);
631 fprintf(stderr, " length = %ld\n", (long)length);
633 if ( (strlen(name) > 0) || (strlen(filename) > 0) ) {
634 WC->upload = malloc(length);
635 if (WC->upload != NULL) {
636 WC->upload_length = length;
637 memcpy(WC->upload, content, length);
644 * Entry point for WebCit transaction
646 void session_loop(struct httprequest *req)
652 int ContentLength = 0;
654 char ContentType[512];
657 struct httprequest *hptr;
658 char browser_host[256];
659 char user_agent[256];
661 /* We stuff these with the values coming from the client cookies,
662 * so we can use them to reconnect a timed out session if we have to.
666 char c_username[256];
667 char c_password[256];
668 char c_roomname[256];
671 strcpy(c_host, defaulthost);
672 strcpy(c_port, defaultport);
673 strcpy(c_username, "");
674 strcpy(c_password, "");
675 strcpy(c_roomname, "");
677 WC->upload_length = 0;
681 if (hptr == NULL) return;
683 strcpy(cmd, hptr->line);
685 extract_action(action, cmd);
687 while (hptr != NULL) {
688 strcpy(buf, hptr->line);
691 if (!strncasecmp(buf, "Cookie: webcit=", 15)) {
692 strcpy(cookie, &buf[15]);
693 cookie_to_stuff(cookie, NULL,
694 c_username, c_password, c_roomname);
696 else if (!strncasecmp(buf, "Content-length: ", 16)) {
697 ContentLength = atoi(&buf[16]);
699 else if (!strncasecmp(buf, "Content-type: ", 14)) {
700 strcpy(ContentType, &buf[14]);
702 else if (!strncasecmp(buf, "User-agent: ", 12)) {
703 strcpy(user_agent, &buf[12]);
707 if (ContentLength > 0) {
708 fprintf(stderr, "Content length: %d\n", ContentLength);
709 content = malloc(ContentLength + 1);
710 memset(content, 0, ContentLength+1);
713 while (BytesRead < ContentLength) {
714 a=read(WC->http_sock, &content[BytesRead],
715 ContentLength - BytesRead);
716 if (a <= 0) BytesRead = ContentLength;
720 if (!strncasecmp(ContentType,
721 "application/x-www-form-urlencoded", 33)) {
723 } else if (!strncasecmp(ContentType, "multipart", 9)) {
724 content_end = content + ContentLength;
725 mime_parser(content, content_end, *upload_handler,
726 NULL, NULL, NULL, 0);
732 /* If there are variables in the URL, we must grab them now */
733 for (a = 0; a < strlen(cmd); ++a)
734 if ((cmd[a] == '?') || (cmd[a] == '&')) {
735 for (b = a; b < strlen(cmd); ++b)
738 addurls(&cmd[a + 1]);
742 * If we're not connected to a Citadel server, try to hook up the
743 * connection now. Preference is given to the host and port specified
744 * by browser cookies, if cookies have been supplied.
746 if (!WC->connected) {
747 if (strlen(bstr("host")) > 0)
748 strcpy(c_host, bstr("host"));
749 if (strlen(bstr("port")) > 0)
750 strcpy(c_port, bstr("port"));
752 if (!strcasecmp(c_host, "uds")) {
753 /* unix domain socket */
754 sprintf(buf, "%s/citadel.socket", c_port);
755 WC->serv_sock = uds_connectsock(buf);
759 WC->serv_sock = tcp_connectsock(c_host, c_port);
762 if (WC->serv_sock < 0) {
764 goto SKIP_ALL_THIS_CRAP;
768 serv_gets(buf); /* get the server welcome message */
769 locate_host(browser_host, WC->http_sock);
770 get_serv_info(browser_host, user_agent);
774 check_for_express_messages();
777 * If we're not logged in, but we have username and password cookies
778 * supplied by the browser, try using them to log in.
780 if ((!WC->logged_in) && (strlen(c_username) > 0) && (strlen(c_password) > 0)) {
781 serv_printf("USER %s", c_username);
784 serv_printf("PASS %s", c_password);
787 become_logged_in(c_username, c_password, buf);
792 * If we don't have a current room, but a cookie specifying the
793 * current room is supplied, make an effort to go there.
795 if ((strlen(WC->wc_roomname) == 0) && (strlen(c_roomname) > 0)) {
796 serv_printf("GOTO %s", c_roomname);
799 strcpy(WC->wc_roomname, c_roomname);
802 if (!strcasecmp(action, "static")) {
803 strcpy(buf, &cmd[12]);
804 for (a = 0; a < strlen(buf); ++a)
808 } else if (!strcasecmp(action, "image")) {
810 } else if ((!WC->logged_in) && (!strcasecmp(action, "login"))) {
812 } else if (!WC->logged_in) {
815 /* Various commands... */
817 else if (!strcasecmp(action, "do_welcome")) {
819 } else if (!strcasecmp(action, "blank")) {
821 } else if (!strcasecmp(action, "display_main_menu")) {
823 } else if (!strcasecmp(action, "whobbs")) {
825 } else if (!strcasecmp(action, "knrooms")) {
826 list_all_rooms_by_floor();
827 } else if (!strcasecmp(action, "gotonext")) {
830 } else if (!strcasecmp(action, "skip")) {
832 } else if (!strcasecmp(action, "ungoto")) {
834 } else if (!strcasecmp(action, "dotgoto")) {
836 smart_goto(bstr("room"));
837 } else if (!strcasecmp(action, "dotskip")) {
838 smart_goto(bstr("room"));
839 } else if (!strcasecmp(action, "termquit")) {
841 } else if (!strcasecmp(action, "readnew")) {
843 } else if (!strcasecmp(action, "readold")) {
845 } else if (!strcasecmp(action, "readfwd")) {
847 } else if (!strcasecmp(action, "headers")) {
849 } else if (!strcasecmp(action, "display_enter")) {
851 } else if (!strcasecmp(action, "post")) {
853 } else if (!strcasecmp(action, "delete_msg")) {
855 } else if (!strcasecmp(action, "confirm_move_msg")) {
857 } else if (!strcasecmp(action, "move_msg")) {
859 } else if (!strcasecmp(action, "userlist")) {
861 } else if (!strcasecmp(action, "showuser")) {
863 } else if (!strcasecmp(action, "display_page")) {
865 } else if (!strcasecmp(action, "page_user")) {
867 } else if (!strcasecmp(action, "chat")) {
869 } else if (!strcasecmp(action, "display_private")) {
870 display_private("", 0);
871 } else if (!strcasecmp(action, "goto_private")) {
873 } else if (!strcasecmp(action, "zapped_list")) {
875 } else if (!strcasecmp(action, "display_zap")) {
877 } else if (!strcasecmp(action, "zap")) {
879 } else if (!strcasecmp(action, "display_entroom")) {
881 } else if (!strcasecmp(action, "entroom")) {
883 } else if (!strcasecmp(action, "display_editroom")) {
885 } else if (!strcasecmp(action, "editroom")) {
887 } else if (!strcasecmp(action, "display_whok")) {
889 } else if (!strcasecmp(action, "display_editinfo")) {
890 display_edit("Room info", "EINF 0", "RINF", "/editinfo");
891 } else if (!strcasecmp(action, "editinfo")) {
892 save_edit("Room info", "EINF 1", 1);
893 } else if (!strcasecmp(action, "display_editbio")) {
894 sprintf(buf, "RBIO %s", WC->wc_username);
895 display_edit("Your bio", "NOOP", buf, "editbio");
896 } else if (!strcasecmp(action, "editbio")) {
897 save_edit("Your bio", "EBIO", 0);
898 } else if (!strcasecmp(action, "confirm_delete_room")) {
899 confirm_delete_room();
900 } else if (!strcasecmp(action, "delete_room")) {
902 } else if (!strcasecmp(action, "validate")) {
904 } else if (!strcasecmp(action, "display_editpic")) {
905 display_graphics_upload("your photo",
908 } else if (!strcasecmp(action, "editpic")) {
909 do_graphics_upload("UIMG 1|_userpic_");
910 } else if (!strcasecmp(action, "display_editroompic")) {
911 display_graphics_upload("the graphic for this room",
914 } else if (!strcasecmp(action, "editroompic")) {
915 do_graphics_upload("UIMG 1|_roompic_");
916 } else if (!strcasecmp(action, "select_floor_to_edit_pic")) {
917 select_floor_to_edit_pic();
918 } else if (!strcasecmp(action, "display_editfloorpic")) {
919 sprintf(buf, "UIMG 0|_floorpic_|%s",
920 bstr("which_floor"));
921 display_graphics_upload("the graphic for this floor",
924 } else if (!strcasecmp(action, "editfloorpic")) {
925 sprintf(buf, "UIMG 1|_floorpic_|%s",
926 bstr("which_floor"));
927 do_graphics_upload(buf);
928 } else if (!strcasecmp(action, "display_reg")) {
930 } else if (!strcasecmp(action, "register")) {
932 } else if (!strcasecmp(action, "display_changepw")) {
934 } else if (!strcasecmp(action, "changepw")) {
936 } else if (!strcasecmp(action, "display_edit_node")) {
938 } else if (!strcasecmp(action, "display_netconf")) {
940 } else if (!strcasecmp(action, "display_confirm_unshare")) {
941 display_confirm_unshare();
942 } else if (!strcasecmp(action, "display_confirm_delete_node")) {
943 display_confirm_delete_node();
944 } else if (!strcasecmp(action, "delete_node")) {
946 } else if (!strcasecmp(action, "unshare")) {
948 } else if (!strcasecmp(action, "display_add_node")) {
950 } else if (!strcasecmp(action, "add_node")) {
952 } else if (!strcasecmp(action, "display_share")) {
954 } else if (!strcasecmp(action, "share")) {
956 } else if (!strcasecmp(action, "terminate_session")) {
959 } else if (!strcasecmp(action, "edit_me")) {
961 } else if (!strcasecmp(action, "display_siteconfig")) {
962 display_siteconfig();
963 } else if (!strcasecmp(action, "page_popup")) {
965 } else if (!strcasecmp(action, "siteconfig")) {
967 } else if (!strcasecmp(action, "display_generic")) {
969 } else if (!strcasecmp(action, "do_generic")) {
971 } else if (!strcasecmp(action, "display_menubar")) {
973 } else if (!strcasecmp(action, "output_mimepart")) {
975 } else if (!strcasecmp(action, "diagnostics")) {
978 wprintf("You're in session %d<HR>\n", WC->wc_session);
979 wprintf("Command: <BR><PRE>\n");
981 wprintf("</PRE><HR>\n");
982 wprintf("Variables: <BR><PRE>\n");
984 wprintf("</PRE><HR>\n");
987 /* When all else fais, display the main menu. */
994 if (content != NULL) {
999 if (WC->upload_length > 0) {
1001 WC->upload_length = 0;