X-Git-Url: https://code.citadel.org/?a=blobdiff_plain;f=webcit%2Ftcp_sockets.c;h=b4fc2a84a5d8b6b99bbca15234b9c261758d3110;hb=acb4c4d32ed0d53e205f5f7e60993e1f6dcc5c91;hp=4b0e51c1f38a2303a60c82217c5ba41bb5380f58;hpb=e4ed70bbd6026468c6fc2c7167998fa44eea3216;p=citadel.git diff --git a/webcit/tcp_sockets.c b/webcit/tcp_sockets.c index 4b0e51c1f..b4fc2a84a 100644 --- a/webcit/tcp_sockets.c +++ b/webcit/tcp_sockets.c @@ -1,35 +1,31 @@ /* * $Id$ */ -/** - * \defgroup TcpSockets TCP client socket module for WebCit - * \ingroup CitadelCommunitacion - */ -/*@{*/ /* * Uncomment this to log all communications with the Citadel server #define SERV_TRACE 1 */ + #include "webcit.h" #include "webserver.h" -/** - * \brief register the timeout - * \param signum signalhandler number - * \return signals +extern int DisableGzip; + +/* + * register the timeout */ RETSIGTYPE timeout(int signum) { - lprintf(1, "Connection timed out.\n"); - exit(3); + lprintf(1, "Connection timed out; unable to reach citserver\n"); + /* no exit here, since we need to server the connection unreachable thing. exit(3); */ } -/** - * \brief Connect a unix domain socket - * \param sockpath where to open a unix domain socket +/* + * Connect a unix domain socket + * sockpath where to open a unix domain socket */ int uds_connectsock(char *sockpath) { @@ -42,13 +38,15 @@ int uds_connectsock(char *sockpath) s = socket(AF_UNIX, SOCK_STREAM, 0); if (s < 0) { - lprintf(1, "Can't create socket: %s\n", + lprintf(1, "Can't create socket[%s]: %s\n", + sockpath, strerror(errno)); return(-1); } if (connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) { - lprintf(1, "Can't connect: %s\n", + lprintf(1, "Can't connect [%s]: %s\n", + sockpath, strerror(errno)); close(s); return(-1); @@ -58,13 +56,14 @@ int uds_connectsock(char *sockpath) } -/** - * \brief Connect a TCP/IP socket - * \param host the host to connect to - * \param service the service on the host to call +/* + * Connect a TCP/IP socket + * host the host to connect to + * service the service on the host to call */ int tcp_connectsock(char *host, char *service) { + int fdflags; struct hostent *phe; struct servent *pse; struct protoent *ppe; @@ -100,6 +99,16 @@ int tcp_connectsock(char *host, char *service) lprintf(1, "Can't create socket: %s\n", strerror(errno)); return (-1); } + + fdflags = fcntl(s, F_GETFL); + if (fdflags < 0) + lprintf(1, "unable to get socket flags! %s.%s: %s \n", + host, service, strerror(errno)); + fdflags = fdflags | O_NONBLOCK; + if (fcntl(s, F_SETFD, fdflags) < 0) + lprintf(1, "unable to set socket nonblocking flags! %s.%s: %s \n", + host, service, strerror(errno)); + signal(SIGALRM, timeout); alarm(30); @@ -112,91 +121,135 @@ int tcp_connectsock(char *host, char *service) alarm(0); signal(SIGALRM, SIG_IGN); + fdflags = fcntl(s, F_GETFL); + if (fdflags < 0) + lprintf(1, "unable to get socket flags! %s.%s: %s \n", + host, service, strerror(errno)); + fdflags = fdflags | O_NONBLOCK; + if (fcntl(s, F_SETFD, fdflags) < 0) + lprintf(1, "unable to set socket nonblocking flags! %s.%s: %s \n", + host, service, strerror(errno)); return (s); } - -/** - * \brief Input binary data from socket - * \param buf the buffer to get the input to - * \param bytes the maximal number of bytes to read +/* + * input string from pipe */ -inline void _serv_read(char *buf, int bytes, struct wcsession *WCC) +int serv_getln(char *strbuf, int bufsize) { - int len, rlen; + wcsession *WCC = WC; + int len; + + *strbuf = '\0'; + StrBuf_ServGetln(WCC->MigrateReadLineBuf); + len = StrLength(WCC->MigrateReadLineBuf); + if (len > bufsize) + len = bufsize - 1; + memcpy(strbuf, ChrPtr(WCC->MigrateReadLineBuf), len); + FlushStrBuf(WCC->MigrateReadLineBuf); + strbuf[len] = '\0'; +#ifdef SERV_TRACE + lprintf(9, "%3d>%s\n", WC->serv_sock, strbuf); +#endif + return len; +} - len = 0; - while (len < bytes) { - rlen = read(WCC->serv_sock, &buf[len], bytes - len); - if (rlen < 1) { - lprintf(1, "Server connection broken: %s\n", - strerror(errno)); - wc_backtrace(); - close(WCC->serv_sock); - WCC->serv_sock = (-1); - WCC->connected = 0; - WCC->logged_in = 0; - memset(buf, 0, bytes); - return; - } - len = len + rlen; + +int StrBuf_ServGetln(StrBuf *buf) +{ + wcsession *WCC = WC; + const char *ErrStr = NULL; + int rc; + + rc = StrBufTCP_read_buffered_line_fast(buf, + WCC->ReadBuf, + &WCC->ReadPos, + &WCC->serv_sock, + 5, 1, + &ErrStr); + if (rc < 0) + { + lprintf(1, "Server connection broken: %s\n", + ErrStr); + wc_backtrace(); + WCC->serv_sock = (-1); + WCC->connected = 0; + WCC->logged_in = 0; } + return rc; } -void serv_read(char *buf, int bytes) +int StrBuf_ServGetBLOBBuffered(StrBuf *buf, long BlobSize) { - struct wcsession *WCC = WC; - _serv_read(buf, bytes, WCC); + wcsession *WCC = WC; + const char *Err; + int rc; + + rc = StrBufReadBLOBBuffered(buf, + WCC->ReadBuf, + &WCC->ReadPos, + &WCC->serv_sock, + 1, + BlobSize, + NNN_TERM, + &Err); + if (rc < 0) + { + lprintf(1, "Server connection broken: %s\n", + Err); + wc_backtrace(); + WCC->serv_sock = (-1); + WCC->connected = 0; + WCC->logged_in = 0; + } + return rc; } -/** - * \brief input string from pipe - */ -int serv_getln(char *strbuf, int bufsize) +int StrBuf_ServGetBLOB(StrBuf *buf, long BlobSize) { - struct wcsession *WCC = WC; - int ch, len; - char buf[2]; - - len = 0; - strbuf[0] = 0; - do { - _serv_read(&buf[0], 1, WCC); - ch = buf[0]; - if ((ch != 13) && (ch != 10)) { - strbuf[len++] = ch; - } - } while ((ch != 10) && (ch != 0) && (len < (bufsize-1))); - strbuf[len] = 0; -#ifdef SERV_TRACE - lprintf(9, "%3d>%s\n", WC->serv_sock, strbuf); -#endif - return len; + wcsession *WCC = WC; + const char *Err; + int rc; + + WCC->ReadPos = NULL; + rc = StrBufReadBLOB(buf, &WCC->serv_sock, 1, BlobSize, &Err); + if (rc < 0) + { + lprintf(1, "Server connection broken: %s\n", + Err); + wc_backtrace(); + WCC->serv_sock = (-1); + WCC->connected = 0; + WCC->logged_in = 0; + } + return rc; } - - -/** - * \brief send binary to server - * \param buf the buffer to write to citadel server - * \param nbytes how many bytes to send to citadel server +/* + * send binary to server + * buf the buffer to write to citadel server + * nbytes how many bytes to send to citadel server */ -void serv_write(char *buf, int nbytes) +void serv_write(const char *buf, int nbytes) { + wcsession *WCC = WC; int bytes_written = 0; int retval; + + FlushStrBuf(WCC->ReadBuf); + WCC->ReadPos = NULL; while (bytes_written < nbytes) { - retval = write(WC->serv_sock, &buf[bytes_written], + retval = write(WCC->serv_sock, &buf[bytes_written], nbytes - bytes_written); if (retval < 1) { lprintf(1, "Server connection broken: %s\n", strerror(errno)); - close(WC->serv_sock); - WC->serv_sock = (-1); - WC->connected = 0; - WC->logged_in = 0; + close(WCC->serv_sock); + WCC->serv_sock = (-1); + WCC->connected = 0; + WCC->logged_in = 0; return; } bytes_written = bytes_written + retval; @@ -204,31 +257,56 @@ void serv_write(char *buf, int nbytes) } -/** - * \brief send line to server - * \param string the line to send to the citadel server +/* + * send line to server + * string the line to send to the citadel server */ -void serv_puts(char *string) +void serv_puts(const char *string) { + wcsession *WCC = WC; #ifdef SERV_TRACE lprintf(9, "%3d<%s\n", WC->serv_sock, string); #endif + FlushStrBuf(WCC->ReadBuf); + WCC->ReadPos = NULL; + serv_write(string, strlen(string)); serv_write("\n", 1); } +/* + * send line to server + * string the line to send to the citadel server + */ +void serv_putbuf(const StrBuf *string) +{ + wcsession *WCC = WC; +#ifdef SERV_TRACE + lprintf(9, "%3d<%s\n", WC->serv_sock, ChrPtr(string)); +#endif + FlushStrBuf(WCC->ReadBuf); + WCC->ReadPos = NULL; + + serv_write(ChrPtr(string), StrLength(string)); + serv_write("\n", 1); +} + -/** - * \brief convenience function to send stuff to the server - * \param format the formatstring - * \param ... the entities to insert into format +/* + * convenience function to send stuff to the server + * format the formatstring + * ... the entities to insert into format */ void serv_printf(const char *format,...) { + wcsession *WCC = WC; va_list arg_ptr; char buf[SIZ]; size_t len; + FlushStrBuf(WCC->ReadBuf); + WCC->ReadPos = NULL; + va_start(arg_ptr, format); vsnprintf(buf, sizeof buf, format, arg_ptr); va_end(arg_ptr); @@ -243,4 +321,451 @@ void serv_printf(const char *format,...) } -/*@}*/ + + +int ClientGetLine(ParsedHttpHdrs *Hdr, StrBuf *Target) +{ + const char *Error, *pch, *pchs; + int rlen, len, retval = 0; + +#ifdef HAVE_OPENSSL + if (is_https) { + int ntries = 0; + if (StrLength(Hdr->ReadBuf) > 0) { + pchs = ChrPtr(Hdr->ReadBuf); + pch = strchr(pchs, '\n'); + if (pch != NULL) { + rlen = 0; + len = pch - pchs; + if (len > 0 && (*(pch - 1) == '\r') ) + rlen ++; + StrBufSub(Target, Hdr->ReadBuf, 0, len - rlen); + StrBufCutLeft(Hdr->ReadBuf, len + 1); + return len - rlen; + } + } + + while (retval == 0) { + pch = NULL; + pchs = ChrPtr(Hdr->ReadBuf); + if (*pchs != '\0') + pch = strchr(pchs, '\n'); + if (pch == NULL) { + retval = client_read_sslbuffer(Hdr->ReadBuf, SLEEPING); + pchs = ChrPtr(Hdr->ReadBuf); + pch = strchr(pchs, '\n'); + } + if (retval == 0) { + sleeeeeeeeeep(1); + ntries ++; + } + if (ntries > 10) + return 0; + } + if ((retval > 0) && (pch != NULL)) { + rlen = 0; + len = pch - pchs; + if (len > 0 && (*(pch - 1) == '\r') ) + rlen ++; + StrBufSub(Target, Hdr->ReadBuf, 0, len - rlen); + StrBufCutLeft(Hdr->ReadBuf, len + 1); + return len - rlen; + + } + else + return -1; + } + else +#endif + return StrBufTCP_read_buffered_line_fast(Target, + Hdr->ReadBuf, + &Hdr->Pos, + &Hdr->http_sock, + 5, + 1, + &Error); +} + +/* + * This is a generic function to set up a master socket for listening on + * a TCP port. The server shuts down if the bind fails. + * + * ip_addr IP address to bind + * port_number port number to bind + * queue_len number of incoming connections to allow in the queue + */ +int ig_tcp_server(char *ip_addr, int port_number, int queue_len) +{ + struct protoent *p; + struct sockaddr_in sin; + int s, i; + + memset(&sin, 0, sizeof(sin)); + sin.sin_family = AF_INET; + if (ip_addr == NULL) { + sin.sin_addr.s_addr = INADDR_ANY; + } else { + sin.sin_addr.s_addr = inet_addr(ip_addr); + } + + if (sin.sin_addr.s_addr == INADDR_NONE) { + sin.sin_addr.s_addr = INADDR_ANY; + } + + if (port_number == 0) { + lprintf(1, "Cannot start: no port number specified.\n"); + exit(WC_EXIT_BIND); + } + sin.sin_port = htons((u_short) port_number); + + p = getprotobyname("tcp"); + + s = socket(PF_INET, SOCK_STREAM, (p->p_proto)); + if (s < 0) { + lprintf(1, "Can't create a socket: %s\n", strerror(errno)); + exit(WC_EXIT_BIND); + } + /* Set some socket options that make sense. */ + i = 1; + setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &i, sizeof(i)); + + #ifndef __APPLE__ + fcntl(s, F_SETFL, O_NONBLOCK); /* maide: this statement is incorrect + there should be a preceding F_GETFL + and a bitwise OR with the previous + fd flags */ + #endif + + if (bind(s, (struct sockaddr *) &sin, sizeof(sin)) < 0) { + lprintf(1, "Can't bind: %s\n", strerror(errno)); + exit(WC_EXIT_BIND); + } + if (listen(s, queue_len) < 0) { + lprintf(1, "Can't listen: %s\n", strerror(errno)); + exit(WC_EXIT_BIND); + } + return (s); +} + + + +/* + * Create a Unix domain socket and listen on it + * sockpath - file name of the unix domain socket + * queue_len - Number of incoming connections to allow in the queue + */ +int ig_uds_server(char *sockpath, int queue_len) +{ + struct sockaddr_un addr; + int s; + int i; + int actual_queue_len; + + actual_queue_len = queue_len; + if (actual_queue_len < 5) actual_queue_len = 5; + + i = unlink(sockpath); + if ((i != 0) && (errno != ENOENT)) { + lprintf(1, "webcit: can't unlink %s: %s\n", + sockpath, strerror(errno)); + exit(WC_EXIT_BIND); + } + + memset(&addr, 0, sizeof(addr)); + addr.sun_family = AF_UNIX; + safestrncpy(addr.sun_path, sockpath, sizeof addr.sun_path); + + s = socket(AF_UNIX, SOCK_STREAM, 0); + if (s < 0) { + lprintf(1, "webcit: Can't create a socket: %s\n", + strerror(errno)); + exit(WC_EXIT_BIND); + } + + if (bind(s, (struct sockaddr *)&addr, sizeof(addr)) < 0) { + lprintf(1, "webcit: Can't bind: %s\n", + strerror(errno)); + exit(WC_EXIT_BIND); + } + + if (listen(s, actual_queue_len) < 0) { + lprintf(1, "webcit: Can't listen: %s\n", + strerror(errno)); + exit(WC_EXIT_BIND); + } + + chmod(sockpath, 0777); + return(s); +} + + + + +/* + * Read data from the client socket. + * + * sock socket fd to read from + * buf buffer to read into + * bytes number of bytes to read + * timeout Number of seconds to wait before timing out + * + * Possible return values: + * 1 Requested number of bytes has been read. + * 0 Request timed out. + * -1 Connection is broken, or other error. + */ +int client_read_to(ParsedHttpHdrs *Hdr, StrBuf *Target, int bytes, int timeout) +{ + const char *Error; + int retval = 0; + +#ifdef HAVE_OPENSSL + if (is_https) { + long bufremain; + + if (Hdr->Pos == NULL) + Hdr->Pos = ChrPtr(Hdr->ReadBuf); + bufremain = StrLength(Hdr->ReadBuf) - (Hdr->Pos - ChrPtr(Hdr->ReadBuf)); + + if (bytes < bufremain) + bufremain = bytes; + StrBufAppendBufPlain(Target, Hdr->Pos, bufremain, 0); + StrBufCutLeft(Hdr->ReadBuf, bufremain); + + if (bytes > bufremain) + { + while ((StrLength(Hdr->ReadBuf) + StrLength(Target) < bytes) && + (retval >= 0)) + retval = client_read_sslbuffer(Hdr->ReadBuf, timeout); + if (retval >= 0) { + StrBufAppendBuf(Target, Hdr->ReadBuf, 0); /* todo: Buf > bytes? */ +#ifdef HTTP_TRACING + write(2, "\033[32m", 5); + write(2, buf, bytes); + write(2, "\033[30m", 5); +#endif + return 1; + } + else { + lprintf(2, "client_read_ssl() failed\n"); + return -1; + } + } + else + return 1; + } +#endif + + retval = StrBufReadBLOBBuffered(Target, + Hdr->ReadBuf, + &Hdr->Pos, + &Hdr->http_sock, + 1, + bytes, + O_TERM, + &Error); + if (retval < 0) { + lprintf(2, "client_read() failed: %s\n", + Error); + return retval; + } + +#ifdef HTTP_TRACING + write(2, "\033[32m", 5); + write(2, buf, bytes); + write(2, "\033[30m", 5); +#endif + return 1; +} + + +/* + * Begin buffering HTTP output so we can transmit it all in one write operation later. + */ +void begin_burst(void) +{ + if (WC->WBuf == NULL) { + WC->WBuf = NewStrBufPlain(NULL, 32768); + } +} + + +/* + * Finish buffering HTTP output. [Compress using zlib and] output with a Content-Length: header. + */ +long end_burst(void) +{ + wcsession *WCC = WC; + const char *ptr, *eptr; + long count; + ssize_t res; + fd_set wset; + int fdflags; + + if (!DisableGzip && (WCC->Hdr->HR.gzip_ok) && CompressBuffer(WCC->WBuf)) + { + hprintf("Content-encoding: gzip\r\n"); + } + + if (WCC->Hdr->HR.prohibit_caching) + hprintf("Pragma: no-cache\r\nCache-Control: no-store\r\nExpires:-1\r\n"); + hprintf("Content-length: %d\r\n\r\n", StrLength(WCC->WBuf)); + + ptr = ChrPtr(WCC->HBuf); + count = StrLength(WCC->HBuf); + eptr = ptr + count; + +#ifdef HAVE_OPENSSL + if (is_https) { + client_write_ssl(WCC->HBuf); + client_write_ssl(WCC->WBuf); + return (count); + } +#endif + + +#ifdef HTTP_TRACING + + write(2, "\033[34m", 5); + write(2, ptr, StrLength(WCC->WBuf)); + write(2, "\033[30m", 5); +#endif + fdflags = fcntl(WC->Hdr->http_sock, F_GETFL); + + while (ptr < eptr) { + if ((fdflags & O_NONBLOCK) == O_NONBLOCK) { + FD_ZERO(&wset); + FD_SET(WCC->Hdr->http_sock, &wset); + if (select(WCC->Hdr->http_sock + 1, NULL, &wset, NULL, NULL) == -1) { + lprintf(2, "client_write: Socket select failed (%s)\n", strerror(errno)); + return -1; + } + } + + if ((res = write(WCC->Hdr->http_sock, + ptr, + count)) == -1) { + lprintf(2, "client_write: Socket write failed (%s)\n", strerror(errno)); + wc_backtrace(); + return res; + } + count -= res; + ptr += res; + } + + ptr = ChrPtr(WCC->WBuf); + count = StrLength(WCC->WBuf); + eptr = ptr + count; + +#ifdef HTTP_TRACING + + write(2, "\033[34m", 5); + write(2, ptr, StrLength(WCC->WBuf)); + write(2, "\033[30m", 5); +#endif + + while (ptr < eptr) { + if ((fdflags & O_NONBLOCK) == O_NONBLOCK) { + FD_ZERO(&wset); + FD_SET(WCC->Hdr->http_sock, &wset); + if (select(WCC->Hdr->http_sock + 1, NULL, &wset, NULL, NULL) == -1) { + lprintf(2, "client_write: Socket select failed (%s)\n", strerror(errno)); + return -1; + } + } + + if ((res = write(WCC->Hdr->http_sock, + ptr, + count)) == -1) { + lprintf(2, "client_write: Socket write failed (%s)\n", strerror(errno)); + wc_backtrace(); + return res; + } + count -= res; + ptr += res; + } + + return StrLength(WCC->WBuf); +} + + +/* + * lingering_close() a`la Apache. see + * http://www.apache.org/docs/misc/fin_wait_2.html for rationale + */ +int lingering_close(int fd) +{ + char buf[SIZ]; + int i; + fd_set set; + struct timeval tv, start; + + gettimeofday(&start, NULL); + shutdown(fd, 1); + do { + do { + gettimeofday(&tv, NULL); + tv.tv_sec = SLEEPING - (tv.tv_sec - start.tv_sec); + tv.tv_usec = start.tv_usec - tv.tv_usec; + if (tv.tv_usec < 0) { + tv.tv_sec--; + tv.tv_usec += 1000000; + } + FD_ZERO(&set); + FD_SET(fd, &set); + i = select(fd + 1, &set, NULL, NULL, &tv); + } while (i == -1 && errno == EINTR); + + if (i <= 0) + break; + + i = read(fd, buf, sizeof buf); + } while (i != 0 && (i != -1 || errno == EINTR)); + + return close(fd); +} + +void +HttpNewModule_TCPSOCKETS +(ParsedHttpHdrs *httpreq) +{ + + httpreq->ReadBuf = NewStrBufPlain(NULL, SIZ * 4); +} + +void +HttpDetachModule_TCPSOCKETS +(ParsedHttpHdrs *httpreq) +{ + + FlushStrBuf(httpreq->ReadBuf); + ReAdjustEmptyBuf(httpreq->ReadBuf, 4 * SIZ, SIZ); +} + +void +HttpDestroyModule_TCPSOCKETS +(ParsedHttpHdrs *httpreq) +{ + + FreeStrBuf(&httpreq->ReadBuf); +} + + +void +SessionNewModule_TCPSOCKETS +(wcsession *sess) +{ + sess->CLineBuf = NewStrBuf(); + sess->MigrateReadLineBuf = NewStrBuf(); +} + +void +SessionDestroyModule_TCPSOCKETS +(wcsession *sess) +{ + FreeStrBuf(&sess->CLineBuf); + FreeStrBuf(&sess->ReadBuf); + FreeStrBuf(&sess->MigrateReadLineBuf); + if (sess->serv_sock > 0) + close(sess->serv_sock); +}