3 #include <apt-pkg/strutl.h>
4 #include <apt-pkg/fileutl.h>
5 #include <apt-pkg/error.h>
6 #include <apt-pkg/cmndline.h>
7 #include <apt-pkg/configuration.h>
8 #include <apt-pkg/init.h>
15 #include <sys/socket.h>
16 #include <sys/types.h>
18 #include <netinet/in.h>
25 char const * const httpcodeToStr(int const httpcode
) { /*{{{*/
28 case 100: return "100 Continue";
29 case 101: return "101 Switching Protocols";
31 case 200: return "200 OK";
32 case 201: return "201 Created";
33 case 202: return "202 Accepted";
34 case 203: return "203 Non-Authoritative Information";
35 case 204: return "204 No Content";
36 case 205: return "205 Reset Content";
37 case 206: return "206 Partial Conent";
39 case 300: return "300 Multiple Choices";
40 case 301: return "301 Moved Permanently";
41 case 302: return "302 Found";
42 case 303: return "303 See Other";
43 case 304: return "304 Not Modified";
44 case 305: return "304 Use Proxy";
45 case 307: return "307 Temporary Redirect";
47 case 400: return "400 Bad Request";
48 case 401: return "401 Unauthorized";
49 case 402: return "402 Payment Required";
50 case 403: return "403 Forbidden";
51 case 404: return "404 Not Found";
52 case 405: return "405 Method Not Allowed";
53 case 406: return "406 Not Acceptable";
54 case 407: return "407 Proxy Authentication Required";
55 case 408: return "408 Request Time-out";
56 case 409: return "409 Conflict";
57 case 410: return "410 Gone";
58 case 411: return "411 Length Required";
59 case 412: return "412 Precondition Failed";
60 case 413: return "413 Request Entity Too Large";
61 case 414: return "414 Request-URI Too Large";
62 case 415: return "415 Unsupported Media Type";
63 case 416: return "416 Requested range not satisfiable";
64 case 417: return "417 Expectation Failed";
66 case 500: return "500 Internal Server Error";
67 case 501: return "501 Not Implemented";
68 case 502: return "502 Bad Gateway";
69 case 503: return "503 Service Unavailable";
70 case 504: return "504 Gateway Time-out";
71 case 505: return "505 HTTP Version not supported";
76 void addFileHeaders(std::list
<std::string
> &headers
, FileFd
&data
) { /*{{{*/
77 std::ostringstream contentlength
;
78 contentlength
<< "Content-Length: " << data
.FileSize();
79 headers
.push_back(contentlength
.str());
81 std::string
lastmodified("Last-Modified: ");
82 lastmodified
.append(TimeRFC1123(data
.ModificationTime()));
83 headers
.push_back(lastmodified
);
86 void addDataHeaders(std::list
<std::string
> &headers
, std::string
&data
) {/*{{{*/
87 std::ostringstream contentlength
;
88 contentlength
<< "Content-Length: " << data
.size();
89 headers
.push_back(contentlength
.str());
92 bool sendHead(int const client
, int const httpcode
, std::list
<std::string
> &headers
) { /*{{{*/
93 std::string
response("HTTP/1.1 ");
94 response
.append(httpcodeToStr(httpcode
));
95 headers
.push_front(response
);
97 headers
.push_back("Server: APT webserver");
99 std::string
date("Date: ");
100 date
.append(TimeRFC1123(time(NULL
)));
101 headers
.push_back(date
);
103 std::clog
<< ">>> RESPONSE >>>" << std::endl
;
105 for (std::list
<std::string
>::const_iterator h
= headers
.begin();
106 Success
== true && h
!= headers
.end(); ++h
) {
107 Success
&= FileFd::Write(client
, h
->c_str(), h
->size());
108 Success
&= FileFd::Write(client
, "\r\n", 2);
109 std::clog
<< *h
<< std::endl
;
111 Success
&= FileFd::Write(client
, "\r\n", 2);
112 std::clog
<< "<<<<<<<<<<<<<<<<" << std::endl
;
116 bool sendFile(int const client
, FileFd
&data
) { /*{{{*/
119 unsigned long long actual
= 0;
120 while ((Success
&= data
.Read(buffer
, sizeof(buffer
), &actual
)) == true) {
123 Success
&= FileFd::Write(client
, buffer
, actual
);
125 Success
&= FileFd::Write(client
, "\r\n", 2);
129 bool sendData(int const client
, std::string
const &data
) { /*{{{*/
131 Success
&= FileFd::Write(client
, data
.c_str(), data
.size());
132 Success
&= FileFd::Write(client
, "\r\n", 2);
136 void sendError(int const client
, int const httpcode
, std::string
const &request
, bool content
, std::string
const &error
= "") { /*{{{*/
137 std::list
<std::string
> headers
;
138 std::string
response("<html><head><title>");
139 response
.append(httpcodeToStr(httpcode
)).append("</title></head>");
140 response
.append("<body><h1>").append(httpcodeToStr(httpcode
)).append("</h1>");
141 if (error
.empty() == false)
142 response
.append("<p><em>Error</em>: ").append(error
).append("</p>");
143 response
.append("This error is a result of the request: <pre>");
144 response
.append(request
).append("</pre></body></html>");
145 addDataHeaders(headers
, response
);
146 sendHead(client
, httpcode
, headers
);
148 sendData(client
, response
);
151 void sendRedirect(int const client
, int const httpcode
, std::string
const &uri
, std::string
const &request
, bool content
) { /*{{{*/
152 std::list
<std::string
> headers
;
153 std::string
response("<html><head><title>");
154 response
.append(httpcodeToStr(httpcode
)).append("</title></head>");
155 response
.append("<body><h1>").append(httpcodeToStr(httpcode
)).append("</h1");
156 response
.append("<p>You should be redirected to <em>").append(uri
).append("</em></p>");
157 response
.append("This page is a result of the request: <pre>");
158 response
.append(request
).append("</pre></body></html>");
159 addDataHeaders(headers
, response
);
160 std::string
location("Location: ");
161 if (strncmp(uri
.c_str(), "http://", 7) != 0)
162 location
.append("http://").append(LookupTag(request
, "Host")).append("/").append(uri
);
164 location
.append(uri
);
165 headers
.push_back(location
);
166 sendHead(client
, httpcode
, headers
);
168 sendData(client
, response
);
171 // sendDirectoryLisiting /*{{{*/
172 int filter_hidden_files(const struct dirent
*a
) {
173 if (a
->d_name
[0] == '.')
175 #ifdef _DIRENT_HAVE_D_TYPE
176 // if we have the d_type check that only files and dirs will be included
177 if (a
->d_type
!= DT_UNKNOWN
&&
178 a
->d_type
!= DT_REG
&&
179 a
->d_type
!= DT_LNK
&& // this includes links to regular files
185 int grouped_alpha_case_sort(const struct dirent
**a
, const struct dirent
**b
) {
186 #ifdef _DIRENT_HAVE_D_TYPE
187 if ((*a
)->d_type
== DT_DIR
&& (*b
)->d_type
== DT_DIR
);
188 else if ((*a
)->d_type
== DT_DIR
&& (*b
)->d_type
== DT_REG
)
190 else if ((*b
)->d_type
== DT_DIR
&& (*a
)->d_type
== DT_REG
)
195 struct stat f_prop
; //File's property
196 stat((*a
)->d_name
, &f_prop
);
197 int const amode
= f_prop
.st_mode
;
198 stat((*b
)->d_name
, &f_prop
);
199 int const bmode
= f_prop
.st_mode
;
200 if (S_ISDIR(amode
) && S_ISDIR(bmode
));
201 else if (S_ISDIR(amode
))
203 else if (S_ISDIR(bmode
))
206 return strcasecmp((*a
)->d_name
, (*b
)->d_name
);
208 void sendDirectoryListing(int const client
, std::string
const &dir
, std::string
const &request
, bool content
) {
209 std::list
<std::string
> headers
;
210 std::ostringstream listing
;
212 struct dirent
**namelist
;
213 int const counter
= scandir(dir
.c_str(), &namelist
, filter_hidden_files
, grouped_alpha_case_sort
);
215 sendError(client
, 500, request
, content
);
219 listing
<< "<html><head><title>Index of " << dir
<< "</title>"
220 << "<style type=\"text/css\"><!-- td {padding: 0.02em 0.5em 0.02em 0.5em;}"
221 << "tr:nth-child(even){background-color:#dfdfdf;}"
222 << "h1, td:nth-child(3){text-align:center;}"
223 << "table {margin-left:auto;margin-right:auto;} --></style>"
224 << "</head>" << std::endl
225 << "<body><h1>Index of " << dir
<< "</h1>" << std::endl
226 << "<table><tr><th>#</th><th>Name</th><th>Size</th><th>Last-Modified</th></tr>" << std::endl
;
228 listing
<< "<tr><td>d</td><td><a href=\"..\">Parent Directory</a></td><td>-</td><td>-</td></tr>";
229 for (int i
= 0; i
< counter
; ++i
) {
231 std::string
filename(dir
);
232 filename
.append("/").append(namelist
[i
]->d_name
);
233 stat(filename
.c_str(), &fs
);
234 if (S_ISDIR(fs
.st_mode
)) {
235 listing
<< "<tr><td>d</td>"
236 << "<td><a href=\"" << namelist
[i
]->d_name
<< "/\">" << namelist
[i
]->d_name
<< "</a></td>"
239 listing
<< "<tr><td>f</td>"
240 << "<td><a href=\"" << namelist
[i
]->d_name
<< "\">" << namelist
[i
]->d_name
<< "</a></td>"
241 << "<td>" << SizeToStr(fs
.st_size
) << "B</td>";
243 listing
<< "<td>" << TimeRFC1123(fs
.st_mtime
) << "</td></tr>" << std::endl
;
245 listing
<< "</table></body></html>" << std::endl
;
247 std::string
response(listing
.str());
248 addDataHeaders(headers
, response
);
249 sendHead(client
, 200, headers
);
251 sendData(client
, response
);
254 bool parseFirstLine(int const client
, std::string
const &request
, std::string
&filename
, bool &sendContent
) { /*{{{*/
255 if (strncmp(request
.c_str(), "HEAD ", 5) == 0)
257 if (strncmp(request
.c_str(), "GET ", 4) != 0)
259 sendError(client
, 501, request
, true);
263 size_t const lineend
= request
.find('\n');
264 size_t filestart
= request
.find(' ');
265 for (; request
[filestart
] == ' '; ++filestart
);
266 size_t fileend
= request
.rfind(' ', lineend
);
267 if (lineend
== std::string::npos
|| filestart
== std::string::npos
||
268 fileend
== std::string::npos
|| filestart
== fileend
) {
269 sendError(client
, 500, request
, sendContent
, "Filename can't be extracted");
273 size_t httpstart
= fileend
;
274 for (; request
[httpstart
] == ' '; ++httpstart
);
275 if (strncmp(request
.c_str() + httpstart
, "HTTP/1.1\r", 9) != 0) {
276 sendError(client
, 500, request
, sendContent
, "Not an HTTP/1.1 request");
280 filename
= request
.substr(filestart
, fileend
- filestart
);
281 if (filename
.find(' ') != std::string::npos
) {
282 sendError(client
, 500, request
, sendContent
, "Filename contains an unencoded space");
285 filename
= DeQuoteString(filename
);
287 // this is not a secure server, but at least prevent the obvious …
288 if (filename
.empty() == true || filename
[0] != '/' ||
289 strncmp(filename
.c_str(), "//", 2) == 0 ||
290 filename
.find_first_of("\r\n\t\f\v") != std::string::npos
||
291 filename
.find("/../") != std::string::npos
) {
292 sendError(client
, 400, request
, sendContent
, "Filename contains illegal character (sequence)");
296 // nuke the first character which is a / as we assured above
297 filename
.erase(0, 1);
298 if (filename
.empty() == true)
303 int main(int const argc
, const char * argv
[])
305 CommandLine::Args Args
[] = {
306 {0, "simulate-paywall", "aptwebserver::Simulate-Paywall",
307 CommandLine::Boolean
},
308 {0, "port", "aptwebserver::port", CommandLine::HasArg
},
309 {'c',"config-file",0,CommandLine::ConfigFile
},
310 {'o',"option",0,CommandLine::ArbItem
},
314 CommandLine
CmdL(Args
, _config
);
315 if(CmdL
.Parse(argc
,argv
) == false) {
316 _error
->DumpErrors();
320 // create socket, bind and listen to it {{{
321 int sock
= socket(AF_INET6
, SOCK_STREAM
, 0);
323 _error
->Errno("aptwerbserver", "Couldn't create socket");
324 _error
->DumpErrors(std::cerr
);
329 int const port
= _config
->FindI("aptwebserver::port", 8080);
330 bool const simulate_broken_server
= _config
->FindB("aptwebserver::Simulate-Paywall", false);
332 // ensure that we accept all connections: v4 or v6
333 int const iponly
= 0;
334 setsockopt(sock
, IPPROTO_IPV6
, IPV6_V6ONLY
, &iponly
, sizeof(iponly
));
335 // to not linger to an address
336 int const enable
= 1;
337 setsockopt(sock
, SOL_SOCKET
, SO_REUSEADDR
, &enable
, sizeof(enable
));
339 struct sockaddr_in6 locAddr
;
340 memset(&locAddr
, 0, sizeof(locAddr
));
341 locAddr
.sin6_family
= AF_INET6
;
342 locAddr
.sin6_port
= htons(port
);
343 locAddr
.sin6_addr
= in6addr_any
;
345 if (bind(sock
, (struct sockaddr
*) &locAddr
, sizeof(locAddr
)) < 0) {
346 _error
->Errno("aptwerbserver", "Couldn't bind");
347 _error
->DumpErrors(std::cerr
);
351 if (simulate_broken_server
) {
352 std::clog
<< "Simulating a broken web server that return nonsense "
353 "for all querries" << std::endl
;
355 std::clog
<< "Serving ANY file on port: " << port
<< std::endl
;
361 std::vector
<std::string
> messages
;
363 while ((client
= accept(sock
, NULL
, NULL
)) != -1) {
364 std::clog
<< "ACCEPT client " << client
365 << " on socket " << sock
<< std::endl
;
367 while (ReadMessages(client
, messages
)) {
368 for (std::vector
<std::string
>::const_iterator m
= messages
.begin();
369 m
!= messages
.end(); ++m
) {
370 std::clog
<< ">>> REQUEST >>>>" << std::endl
<< *m
371 << std::endl
<< "<<<<<<<<<<<<<<<<" << std::endl
;
373 std::list
<std::string
> headers
;
374 std::string filename
;
375 bool sendContent
= true;
376 if (parseFirstLine(client
, *m
, filename
, sendContent
) == false)
379 std::string host
= LookupTag(*m
, "Host", "");
380 if (host
.empty() == true) {
381 // RFC 2616 §14.23 requires Host
382 sendError(client
, 400, *m
, sendContent
, "Host header is required");
386 if (simulate_broken_server
== true) {
387 std::string
data("ni ni ni\n");
388 addDataHeaders(headers
, data
);
389 sendHead(client
, 200, headers
);
390 sendData(client
, data
);
392 else if (RealFileExists(filename
) == true) {
393 FileFd
data(filename
, FileFd::ReadOnly
);
394 std::string condition
= LookupTag(*m
, "If-Modified-Since", "");
395 if (condition
.empty() == false) {
397 if (RFC1123StrToTime(condition
.c_str(), cache
) == true &&
398 cache
>= data
.ModificationTime()) {
399 sendHead(client
, 304, headers
);
403 addFileHeaders(headers
, data
);
404 sendHead(client
, 200, headers
);
405 if (sendContent
== true)
406 sendFile(client
, data
);
408 else if (DirectoryExists(filename
) == true) {
409 if (filename
== "." || filename
[filename
.length()-1] == '/')
410 sendDirectoryListing(client
, filename
, *m
, sendContent
);
412 sendRedirect(client
, 301, filename
.append("/"), *m
, sendContent
);
416 ::Configuration::Item
const *Replaces
= _config
->Tree("aptwebserver::redirect::replace");
417 if (Replaces
!= NULL
) {
418 std::string redirect
= "/" + filename
;
419 for (::Configuration::Item
*I
= Replaces
->Child
; I
!= NULL
; I
= I
->Next
)
420 redirect
= SubstVar(redirect
, I
->Tag
, I
->Value
);
422 if (redirect
!= filename
) {
423 sendRedirect(client
, 301, redirect
, *m
, sendContent
);
427 sendError(client
, 404, *m
, sendContent
);
430 _error
->DumpErrors(std::cerr
);
434 std::clog
<< "CLOSE client " << client
435 << " on socket " << sock
<< std::endl
;