4 * This is the actual program called by the webserver. It maintains a
5 * persistent session to the Citadel server, handling HTTP WebCit requests as
6 * they arrive and presenting a user interface.
17 #include <sys/types.h>
19 #include <sys/socket.h>
23 #include <netinet/in.h>
32 #include "mime_parser.h"
35 * String to unset the cookie.
36 * Any date "in the past" will work, so I chose my birthday, right down to
37 * the exact minute. :)
39 static char *unset = "; expires=28-May-1971 18:10:00 GMT";
41 void unescape_input(char *buf)
46 while ((isspace(buf[strlen(buf) - 1])) && (strlen(buf) > 0))
47 buf[strlen(buf) - 1] = 0;
49 for (a = 0; a < strlen(buf); ++a) {
56 sscanf(hex, "%02x", &b);
58 strcpy(&buf[a + 1], &buf[a + 3]);
65 void addurls(char *url)
73 while (strlen(up) > 0) {
75 /* locate the = sign */
76 strncpy(buf, up, 255);
78 for (a = 255; a >= 0; --a)
85 u = (struct urlcontent *) malloc(sizeof(struct urlcontent));
86 u->next = WC->urlstrings;
88 strcpy(u->url_key, buf);
90 /* now chop that part off */
91 for (a = 0; a <= b; ++a)
94 /* locate the & sign */
97 for (a = 0; a < strlen(up); ++a) {
98 if (!strncmp(ptr, "&", 1)) {
105 for (a = 0; a < b; ++a)
109 u->url_data = malloc(strlen(up) + 1);
110 strcpy(u->url_data, up);
112 unescape_input(u->url_data);
120 struct urlcontent *u;
122 while (WC->urlstrings != NULL) {
123 free(WC->urlstrings->url_data);
124 u = WC->urlstrings->next;
125 free(WC->urlstrings);
131 * Diagnostic function to display the contents of all variables
135 struct urlcontent *u;
137 for (u = WC->urlstrings; u != NULL; u = u->next) {
138 wprintf("%38s = %s\n", u->url_key, u->url_data);
142 char *bstr(char *key)
144 struct urlcontent *u;
146 for (u = WC->urlstrings; u != NULL; u = u->next) {
147 if (!strcasecmp(u->url_key, key))
148 return (u->url_data);
154 void wprintf(const char *format,...)
159 va_start(arg_ptr, format);
160 vsprintf(wbuf, format, arg_ptr);
163 write(WC->http_sock, wbuf, strlen(wbuf));
168 * wDumpContent() wraps up an HTTP session, closes tags, etc.
170 * print_standard_html_footer should be set to 0 to transmit only, 1 to
171 * append the main menu and closing tags, or 2 to
172 * append the closing tags only.
174 void wDumpContent(int print_standard_html_footer)
176 if (WC->fake_frames) {
177 wprintf("</TABLE>\n");
181 if (print_standard_html_footer) {
182 if (print_standard_html_footer != 2) {
185 wprintf("</BODY></HTML>\n");
193 * Copy a string, escaping characters which have meaning in HTML. If
194 * nbsp is nonzero, spaces are converted to non-breaking spaces.
196 void stresc(char *target, char *strbuf, int nbsp)
201 for (a = 0; a < strlen(strbuf); ++a) {
202 if (strbuf[a] == '<')
203 strcat(target, "<");
204 else if (strbuf[a] == '>')
205 strcat(target, ">");
206 else if (strbuf[a] == '&')
207 strcat(target, "&");
208 else if (strbuf[a] == '\"')
209 strcat(target, """);
210 else if (strbuf[a] == '\'')
211 strcat(target, "'");
212 else if (strbuf[a] == LB)
214 else if (strbuf[a] == RB)
216 else if (strbuf[a] == QU)
217 strcat(target, "\"");
218 else if ((strbuf[a] == 32) && (nbsp == 1)) {
219 strcat(target, " ");
221 strncat(target, &strbuf[a], 1);
226 void escputs1(char *strbuf, int nbsp)
229 stresc(buf, strbuf, nbsp);
233 void escputs(char *strbuf)
239 * Escape a string for feeding out as a URL.
240 * FIXME this is not threadsafe!
242 char *urlesc(char *strbuf)
245 char *ec = " #&;`'|*?-~<>^()[]{}$\\";
246 static char outbuf[1024];
250 for (a = 0; a < strlen(strbuf); ++a) {
252 for (b = 0; b < strlen(ec); ++b) {
253 if (strbuf[a] == ec[b])
258 sprintf(&outbuf[b], "%%%02x", strbuf[a]);
260 sprintf(&outbuf[b], "%c", strbuf[a]);
265 void urlescputs(char *strbuf)
267 wprintf("%s", urlesc(strbuf));
274 * Output all that important stuff that the browser will want to see
279 * 0 = Nothing. Do not display any leading HTTP or HTML.
280 * 1 = HTTP headers plus the room banner
281 * 2 = HTTP headers required to terminate the session (unset cookies)
282 * 3 = HTTP and HTML headers, but no room banner
284 * Bit 2: Set to 1 to auto-refresh page every 30 seconds
286 * Bit 3: suppress check for express messages
288 void output_headers(int controlcode)
291 int print_standard_html_head = 0;
293 int suppress_check = 0;
295 static int pageseq = 0;
297 print_standard_html_head = controlcode & 0x03;
298 refresh30 = ((controlcode & 0x04) >> 2);
299 suppress_check = ((controlcode & 0x08) >> 3);
301 wprintf("HTTP/1.0 200 OK\n");
303 httpdate(httpnow, time(NULL));
305 if (print_standard_html_head > 0) {
306 wprintf("Content-type: text/html\n");
307 wprintf("Server: %s\n", SERVER);
308 wprintf("Connection: close\n");
309 wprintf("Pragma: no-cache\n");
310 wprintf("Cache-Control: no-store\n");
312 stuff_to_cookie(cookie, WC->wc_session, WC->wc_username,
313 WC->wc_password, WC->wc_roomname);
314 if (print_standard_html_head == 2) {
315 wprintf("Set-cookie: webcit=%s\n", unset);
317 wprintf("Set-cookie: webcit=%s\n", cookie);
318 if (server_cookie != NULL) {
319 wprintf("%s\n", server_cookie);
323 if (print_standard_html_head > 0) {
325 wprintf("<HTML><HEAD><TITLE>");
326 escputs(serv_info.serv_humannode);
328 "<META HTTP-EQUIV=\"Pragma\" CONTENT=\"no-cache\">\n"
329 "<META HTTP-EQUIV=\"expired\" CONTENT=\"28-May-1971 18:10:00 GMT\">\n"
330 "<META NAME=\"MSSmartTagsPreventParsing\" CONTENT=\"TRUE\">\n");
331 if (refresh30) wprintf(
332 "<META HTTP-EQUIV=\"refresh\" CONTENT=\"30\">\n");
334 "<META HTTP-EQUIV=\"refresh\" CONTENT=\"500363689;\">\n");
335 wprintf("</HEAD>\n");
337 /* script for checking for pages (not always launched) */
338 wprintf("<SCRIPT LANGUAGE=\"JavaScript\">\n");
339 wprintf("function launch_page_popup() {\n");
340 wprintf("pwin = window.open('/page_popup', 'CitaPage%d', "
341 "'toolbar=no,location=no,copyhistory=no,status=no,"
342 "scrollbars=yes,resizable=no,height=150,width=400');\n",
345 wprintf("</SCRIPT>\n");
348 /* (JavaScript keyboard-based navigation would go here) */
350 if (!suppress_check) if (WC->HaveExpressMessages) {
351 svprintf("extrabodyparms", WCS_STRING, "%s",
352 "onload=\"launch_page_popup()\" ");
353 WC->HaveExpressMessages = 0;
355 do_template("background.html");
356 clear_local_substs();
358 if (print_standard_html_head == 1) {
359 wprintf("<A NAME=\"TheTop\"></A>");
361 wprintf("<TABLE border=0 width=100%%><TR VALIGN=TOP>"
364 embed_room_banner(NULL);
366 wprintf("</TD></TR><TR VALIGN=TOP><TD>\n");
377 void http_redirect(char *whichpage) {
378 wprintf("HTTP/1.0 302 Moved Temporarily\n");
379 wprintf("Location: %s\n", whichpage);
380 wprintf("URI: %s\n", whichpage);
381 wprintf("Content-type: text/html\n\n");
382 wprintf("<html><body>\n");
383 wprintf("you really want to be <A HREF=\"%s\">here</A> now\n",
385 wprintf("</body></html>\n");
390 void check_for_express_messages()
396 if (buf[3] == '*') WC->HaveExpressMessages = 1;
402 void output_static(char *what)
410 sprintf(buf, "static/%s", what);
411 fp = fopen(buf, "rb");
413 wprintf("HTTP/1.0 404 %s\n", strerror(errno));
414 wprintf("Content-Type: text/plain\n");
416 wprintf("Cannot open %s: %s\n", what, strerror(errno));
420 if (!strncasecmp(&what[strlen(what) - 4], ".gif", 4))
421 wprintf("Content-type: image/gif\n");
422 else if (!strncasecmp(&what[strlen(what) - 4], ".txt", 4))
423 wprintf("Content-type: text/plain\n");
424 else if (!strncasecmp(&what[strlen(what) - 4], ".jpg", 4))
425 wprintf("Content-type: image/jpeg\n");
426 else if (!strncasecmp(&what[strlen(what) - 5], ".html", 5))
427 wprintf("Content-type: text/html\n");
429 wprintf("Content-type: application/octet-stream\n");
431 fstat(fileno(fp), &statbuf);
432 bytes = statbuf.st_size;
433 fprintf(stderr, "Static: %s, %ld bytes\n", what, bytes);
434 wprintf("Content-length: %ld\n", (long) bytes);
436 bigbuffer = malloc(bytes);
437 fread(bigbuffer, bytes, 1, fp);
439 write(WC->http_sock, bigbuffer, bytes);
442 if (!strcasecmp(bstr("force_close_session"), "yes")) {
443 end_webcit_session();
449 * When the browser requests an image file from the Citadel server,
450 * this function is called to transmit it.
458 off_t accomplished = 0L;
461 serv_printf("OIMG %s|%s", bstr("name"), bstr("parm"));
464 bytes = extract_long(&buf[4], 0);
466 wprintf("Content-type: image/gif\n");
467 wprintf("Content-length: %ld\n", (long) bytes);
470 while (bytes > (off_t) 0) {
471 thisblock = (off_t) sizeof(xferbuf);
472 if (thisblock > bytes) {
475 serv_printf("READ %ld|%ld", accomplished, thisblock);
478 thisblock = extract_long(&buf[4], 0);
479 serv_read(xferbuf, (int) thisblock);
482 memset(xferbuf, 0, thisblock);
484 write(WC->http_sock, xferbuf, thisblock);
485 bytes = bytes - thisblock;
486 accomplished = accomplished + thisblock;
491 wprintf("HTTP/1.0 404 %s\n", &buf[4]);
493 wprintf("Content-Type: text/plain\n");
495 wprintf("Error retrieving image: %s\n", &buf[4]);
502 void output_mimepart()
508 off_t accomplished = 0L;
509 char content_type[SIZ];
511 serv_printf("OPNA %s|%s", bstr("msgnum"), bstr("partnum"));
514 bytes = extract_long(&buf[4], 0);
515 extract(content_type, &buf[4], 3);
517 wprintf("Content-type: %s\n", content_type);
518 wprintf("Content-length: %ld\n", (long) bytes);
521 while (bytes > (off_t) 0) {
522 thisblock = (off_t) sizeof(xferbuf);
523 if (thisblock > bytes) {
526 serv_printf("READ %ld|%ld", accomplished, thisblock);
529 thisblock = extract_long(&buf[4], 0);
530 serv_read(xferbuf, (int) thisblock);
533 memset(xferbuf, 0, thisblock);
535 write(WC->http_sock, xferbuf, thisblock);
536 bytes = bytes - thisblock;
537 accomplished = accomplished + thisblock;
542 wprintf("HTTP/1.0 404 %s\n", &buf[4]);
544 wprintf("Content-Type: text/plain\n");
546 wprintf("Error retrieving part: %s\n", &buf[4]);
553 * Convenience functions to display a page containing only a string
555 void convenience_page(char *titlebarcolor, char *titlebarmsg, char *messagetext)
557 wprintf("HTTP/1.0 200 OK\n");
559 wprintf("<TABLE WIDTH=100%% BORDER=0 BGCOLOR=%s><TR><TD>", titlebarcolor);
560 wprintf("<FONT SIZE=+1 COLOR=\"FFFFFF\"");
561 wprintf("<B>%s</B>\n", titlebarmsg);
562 wprintf("</FONT></TD></TR></TABLE><BR>\n");
563 escputs(messagetext);
571 * Display a blank page.
573 void blank_page(void) {
579 void display_error(char *errormessage)
581 convenience_page("770000", "Error", errormessage);
584 void display_success(char *successmessage)
586 convenience_page("007700", "OK", successmessage);
591 void extract_action(char *actbuf, char *cmdbuf)
595 strcpy(actbuf, cmdbuf);
596 if (!strncasecmp(actbuf, "GET /", 5))
597 strcpy(actbuf, &actbuf[5]);
598 if (!strncasecmp(actbuf, "PUT /", 5))
599 strcpy(actbuf, &actbuf[5]);
600 if (!strncasecmp(actbuf, "POST /", 6))
601 strcpy(actbuf, &actbuf[6]);
603 for (i = 0; i < strlen(actbuf); ++i) {
604 if (actbuf[i] == ' ') {
608 if (actbuf[i] == '/') {
612 if (actbuf[i] == '?') {
616 if (actbuf[i] == '&') {
624 void upload_handler(char *name, char *filename, char *partnum, char *disp,
625 void *content, char *cbtype, size_t length,
626 char *encoding, void *userdata)
629 fprintf(stderr, "UPLOAD HANDLER CALLED\n");
630 fprintf(stderr, " name = %s\n", name);
631 fprintf(stderr, "filename = %s\n", filename);
632 fprintf(stderr, "encoding = %s\n", encoding);
633 fprintf(stderr, " type = %s\n", cbtype);
634 fprintf(stderr, " length = %ld\n", (long)length);
636 if ( (strlen(name) > 0) || (strlen(filename) > 0) ) {
637 WC->upload = malloc(length);
638 if (WC->upload != NULL) {
639 WC->upload_length = length;
640 memcpy(WC->upload, content, length);
647 * Entry point for WebCit transaction
649 void session_loop(struct httprequest *req)
655 int ContentLength = 0;
657 char ContentType[512];
660 struct httprequest *hptr;
661 char browser_host[SIZ];
662 char user_agent[SIZ];
664 /* We stuff these with the values coming from the client cookies,
665 * so we can use them to reconnect a timed out session if we have to.
669 char c_username[SIZ];
670 char c_password[SIZ];
671 char c_roomname[SIZ];
674 strcpy(c_host, defaulthost);
675 strcpy(c_port, defaultport);
676 strcpy(c_username, "");
677 strcpy(c_password, "");
678 strcpy(c_roomname, "");
680 WC->upload_length = 0;
684 if (hptr == NULL) return;
686 strcpy(cmd, hptr->line);
688 extract_action(action, cmd);
690 while (hptr != NULL) {
691 strcpy(buf, hptr->line);
694 if (!strncasecmp(buf, "Cookie: webcit=", 15)) {
695 strcpy(cookie, &buf[15]);
696 cookie_to_stuff(cookie, NULL,
697 c_username, c_password, c_roomname);
699 else if (!strncasecmp(buf, "Content-length: ", 16)) {
700 ContentLength = atoi(&buf[16]);
702 else if (!strncasecmp(buf, "Content-type: ", 14)) {
703 strcpy(ContentType, &buf[14]);
705 else if (!strncasecmp(buf, "User-agent: ", 12)) {
706 strcpy(user_agent, &buf[12]);
710 if (ContentLength > 0) {
711 fprintf(stderr, "Content length: %d\n", ContentLength);
712 content = malloc(ContentLength + 1);
713 memset(content, 0, ContentLength+1);
716 while (BytesRead < ContentLength) {
717 a=read(WC->http_sock, &content[BytesRead],
718 ContentLength - BytesRead);
719 if (a <= 0) BytesRead = ContentLength;
723 if (!strncasecmp(ContentType,
724 "application/x-www-form-urlencoded", 33)) {
726 } else if (!strncasecmp(ContentType, "multipart", 9)) {
727 content_end = content + ContentLength;
728 mime_parser(content, content_end, *upload_handler,
729 NULL, NULL, NULL, 0);
735 /* If there are variables in the URL, we must grab them now */
736 for (a = 0; a < strlen(cmd); ++a)
737 if ((cmd[a] == '?') || (cmd[a] == '&')) {
738 for (b = a; b < strlen(cmd); ++b)
741 addurls(&cmd[a + 1]);
745 * If we're not connected to a Citadel server, try to hook up the
746 * connection now. Preference is given to the host and port specified
747 * by browser cookies, if cookies have been supplied.
749 if (!WC->connected) {
750 if (strlen(bstr("host")) > 0)
751 strcpy(c_host, bstr("host"));
752 if (strlen(bstr("port")) > 0)
753 strcpy(c_port, bstr("port"));
755 if (!strcasecmp(c_host, "uds")) {
756 /* unix domain socket */
757 sprintf(buf, "%s/citadel.socket", c_port);
758 WC->serv_sock = uds_connectsock(buf);
762 WC->serv_sock = tcp_connectsock(c_host, c_port);
765 if (WC->serv_sock < 0) {
767 goto SKIP_ALL_THIS_CRAP;
771 serv_gets(buf); /* get the server welcome message */
772 locate_host(browser_host, WC->http_sock);
773 get_serv_info(browser_host, user_agent);
777 check_for_express_messages();
780 * If we're not logged in, but we have username and password cookies
781 * supplied by the browser, try using them to log in.
783 if ((!WC->logged_in) && (strlen(c_username) > 0) && (strlen(c_password) > 0)) {
784 serv_printf("USER %s", c_username);
787 serv_printf("PASS %s", c_password);
790 become_logged_in(c_username, c_password, buf);
795 * If we don't have a current room, but a cookie specifying the
796 * current room is supplied, make an effort to go there.
798 if ((strlen(WC->wc_roomname) == 0) && (strlen(c_roomname) > 0)) {
799 serv_printf("GOTO %s", c_roomname);
802 strcpy(WC->wc_roomname, c_roomname);
805 if (!strcasecmp(action, "static")) {
806 strcpy(buf, &cmd[12]);
807 for (a = 0; a < strlen(buf); ++a)
811 } else if (!strcasecmp(action, "image")) {
813 } else if ((!WC->logged_in) && (!strcasecmp(action, "login"))) {
815 } else if (!WC->logged_in) {
818 /* Various commands... */
820 else if (!strcasecmp(action, "do_welcome")) {
822 } else if (!strcasecmp(action, "blank")) {
824 } else if (!strcasecmp(action, "display_main_menu")) {
826 } else if (!strcasecmp(action, "whobbs")) {
828 } else if (!strcasecmp(action, "knrooms")) {
829 list_all_rooms_by_floor();
830 } else if (!strcasecmp(action, "gotonext")) {
833 } else if (!strcasecmp(action, "skip")) {
835 } else if (!strcasecmp(action, "ungoto")) {
837 } else if (!strcasecmp(action, "dotgoto")) {
839 smart_goto(bstr("room"));
840 } else if (!strcasecmp(action, "dotskip")) {
841 smart_goto(bstr("room"));
842 } else if (!strcasecmp(action, "termquit")) {
844 } else if (!strcasecmp(action, "readnew")) {
846 } else if (!strcasecmp(action, "readold")) {
848 } else if (!strcasecmp(action, "readfwd")) {
850 } else if (!strcasecmp(action, "headers")) {
852 } else if (!strcasecmp(action, "display_enter")) {
854 } else if (!strcasecmp(action, "post")) {
856 } else if (!strcasecmp(action, "delete_msg")) {
858 } else if (!strcasecmp(action, "confirm_move_msg")) {
860 } else if (!strcasecmp(action, "move_msg")) {
862 } else if (!strcasecmp(action, "userlist")) {
864 } else if (!strcasecmp(action, "showuser")) {
866 } else if (!strcasecmp(action, "display_page")) {
868 } else if (!strcasecmp(action, "page_user")) {
870 } else if (!strcasecmp(action, "chat")) {
872 } else if (!strcasecmp(action, "display_private")) {
873 display_private("", 0);
874 } else if (!strcasecmp(action, "goto_private")) {
876 } else if (!strcasecmp(action, "zapped_list")) {
878 } else if (!strcasecmp(action, "display_zap")) {
880 } else if (!strcasecmp(action, "zap")) {
882 } else if (!strcasecmp(action, "display_entroom")) {
884 } else if (!strcasecmp(action, "entroom")) {
886 } else if (!strcasecmp(action, "display_editroom")) {
888 } else if (!strcasecmp(action, "editroom")) {
890 } else if (!strcasecmp(action, "display_whok")) {
892 } else if (!strcasecmp(action, "display_editinfo")) {
893 display_edit("Room info", "EINF 0", "RINF", "/editinfo");
894 } else if (!strcasecmp(action, "editinfo")) {
895 save_edit("Room info", "EINF 1", 1);
896 } else if (!strcasecmp(action, "display_editbio")) {
897 sprintf(buf, "RBIO %s", WC->wc_username);
898 display_edit("Your bio", "NOOP", buf, "editbio");
899 } else if (!strcasecmp(action, "editbio")) {
900 save_edit("Your bio", "EBIO", 0);
901 } else if (!strcasecmp(action, "confirm_delete_room")) {
902 confirm_delete_room();
903 } else if (!strcasecmp(action, "delete_room")) {
905 } else if (!strcasecmp(action, "validate")) {
907 } else if (!strcasecmp(action, "display_editpic")) {
908 display_graphics_upload("your photo",
911 } else if (!strcasecmp(action, "editpic")) {
912 do_graphics_upload("UIMG 1|_userpic_");
913 } else if (!strcasecmp(action, "display_editroompic")) {
914 display_graphics_upload("the graphic for this room",
917 } else if (!strcasecmp(action, "editroompic")) {
918 do_graphics_upload("UIMG 1|_roompic_");
919 } else if (!strcasecmp(action, "select_floor_to_edit_pic")) {
920 select_floor_to_edit_pic();
921 } else if (!strcasecmp(action, "display_editfloorpic")) {
922 sprintf(buf, "UIMG 0|_floorpic_|%s",
923 bstr("which_floor"));
924 display_graphics_upload("the graphic for this floor",
927 } else if (!strcasecmp(action, "editfloorpic")) {
928 sprintf(buf, "UIMG 1|_floorpic_|%s",
929 bstr("which_floor"));
930 do_graphics_upload(buf);
931 } else if (!strcasecmp(action, "display_reg")) {
933 } else if (!strcasecmp(action, "register")) {
935 } else if (!strcasecmp(action, "display_changepw")) {
937 } else if (!strcasecmp(action, "changepw")) {
939 } else if (!strcasecmp(action, "display_edit_node")) {
941 } else if (!strcasecmp(action, "edit_node")) {
943 } else if (!strcasecmp(action, "display_netconf")) {
945 } else if (!strcasecmp(action, "display_confirm_delete_node")) {
946 display_confirm_delete_node();
947 } else if (!strcasecmp(action, "delete_node")) {
949 } else if (!strcasecmp(action, "display_add_node")) {
951 } else if (!strcasecmp(action, "add_node")) {
953 } else if (!strcasecmp(action, "terminate_session")) {
956 } else if (!strcasecmp(action, "edit_me")) {
958 } else if (!strcasecmp(action, "display_siteconfig")) {
959 display_siteconfig();
960 } else if (!strcasecmp(action, "page_popup")) {
962 } else if (!strcasecmp(action, "siteconfig")) {
964 } else if (!strcasecmp(action, "display_generic")) {
966 } else if (!strcasecmp(action, "do_generic")) {
968 } else if (!strcasecmp(action, "display_menubar")) {
970 } else if (!strcasecmp(action, "output_mimepart")) {
972 } else if (!strcasecmp(action, "diagnostics")) {
975 wprintf("You're in session %d<HR>\n", WC->wc_session);
976 wprintf("Command: <BR><PRE>\n");
978 wprintf("</PRE><HR>\n");
979 wprintf("Variables: <BR><PRE>\n");
981 wprintf("</PRE><HR>\n");
984 /* When all else fais, display the main menu. */
991 if (content != NULL) {
996 if (WC->upload_length > 0) {
998 WC->upload_length = 0;