2004-03-02 22:16:55 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
%%% File : ejabberd_http.erl
|
2007-12-24 14:57:53 +01:00
|
|
|
%%% Author : Alexey Shchepin <alexey@process-one.net>
|
2007-05-07 17:47:33 +02:00
|
|
|
%%% Purpose :
|
2007-12-24 14:57:53 +01:00
|
|
|
%%% Created : 27 Feb 2004 by Alexey Shchepin <alexey@process-one.net>
|
|
|
|
%%%
|
|
|
|
%%%
|
2016-01-13 12:29:14 +01:00
|
|
|
%%% ejabberd, Copyright (C) 2002-2016 ProcessOne
|
2007-12-24 14:57:53 +01:00
|
|
|
%%%
|
|
|
|
%%% This program is free software; you can redistribute it and/or
|
|
|
|
%%% modify it under the terms of the GNU General Public License as
|
|
|
|
%%% published by the Free Software Foundation; either version 2 of the
|
|
|
|
%%% License, or (at your option) any later version.
|
|
|
|
%%%
|
|
|
|
%%% This program is distributed in the hope that it will be useful,
|
|
|
|
%%% but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
%%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
%%% General Public License for more details.
|
2009-01-12 15:44:42 +01:00
|
|
|
%%%
|
2014-02-22 11:27:40 +01:00
|
|
|
%%% You should have received a copy of the GNU General Public License along
|
|
|
|
%%% with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
%%% 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
2007-12-24 14:57:53 +01:00
|
|
|
%%%
|
2004-03-02 22:16:55 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
|
|
|
|
-module(ejabberd_http).
|
2013-03-14 10:33:02 +01:00
|
|
|
|
2015-06-01 14:38:27 +02:00
|
|
|
-behaviour(ejabberd_config).
|
|
|
|
|
2007-12-24 14:57:53 +01:00
|
|
|
-author('alexey@process-one.net').
|
2004-03-02 22:16:55 +01:00
|
|
|
|
|
|
|
%% External exports
|
2013-03-14 10:33:02 +01:00
|
|
|
-export([start/2, start_link/2, become_controller/1,
|
2013-08-12 14:25:05 +02:00
|
|
|
socket_type/0, receive_headers/1, url_encode/1,
|
|
|
|
transform_listen_option/2]).
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2015-06-03 15:05:17 +02:00
|
|
|
-export([init/2, opt_type/1]).
|
2009-12-07 18:33:02 +01:00
|
|
|
|
2004-03-02 22:16:55 +01:00
|
|
|
-include("ejabberd.hrl").
|
2013-04-08 11:12:54 +02:00
|
|
|
-include("logger.hrl").
|
2013-03-14 10:33:02 +01:00
|
|
|
|
2016-07-30 17:37:57 +02:00
|
|
|
-include("xmpp.hrl").
|
2013-03-14 10:33:02 +01:00
|
|
|
|
2004-03-04 21:56:32 +01:00
|
|
|
-include("ejabberd_http.hrl").
|
2004-03-02 22:16:55 +01:00
|
|
|
|
|
|
|
-record(state, {sockmod,
|
|
|
|
socket,
|
|
|
|
request_method,
|
2004-07-06 23:34:50 +02:00
|
|
|
request_version,
|
2004-03-02 22:16:55 +01:00
|
|
|
request_path,
|
|
|
|
request_auth,
|
2004-09-30 23:54:39 +02:00
|
|
|
request_keepalive,
|
2004-05-01 22:10:25 +02:00
|
|
|
request_content_length,
|
2014-04-06 00:39:51 +02:00
|
|
|
request_lang = <<"en">>,
|
2007-01-25 06:53:58 +01:00
|
|
|
%% XXX bard: request handlers are configured in
|
|
|
|
%% ejabberd.cfg under the HTTP service. For example,
|
|
|
|
%% to have the module test_web handle requests with
|
|
|
|
%% paths starting with "/test/module":
|
|
|
|
%%
|
2015-04-15 10:47:10 +02:00
|
|
|
%% {5280, ejabberd_http, [http_bind, web_admin,
|
2007-01-25 06:53:58 +01:00
|
|
|
%% {request_handlers, [{["test", "module"], mod_test_web}]}]}
|
|
|
|
%%
|
|
|
|
request_handlers = [],
|
2008-09-12 13:45:16 +02:00
|
|
|
request_host,
|
|
|
|
request_port,
|
|
|
|
request_tp,
|
|
|
|
request_headers = [],
|
2004-09-25 22:52:20 +02:00
|
|
|
end_of_request = false,
|
2014-10-03 16:53:55 +02:00
|
|
|
options = [],
|
2012-02-14 11:35:17 +01:00
|
|
|
default_host,
|
2012-04-06 16:22:08 +02:00
|
|
|
trail = <<>>
|
2004-03-02 22:16:55 +01:00
|
|
|
}).
|
|
|
|
|
|
|
|
-define(XHTML_DOCTYPE,
|
2013-03-14 10:33:02 +01:00
|
|
|
<<"<?xml version='1.0'?>\n<!DOCTYPE html "
|
|
|
|
"PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//"
|
|
|
|
"EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1"
|
|
|
|
"-transitional.dtd\">\n">>).
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2004-04-26 17:38:07 +02:00
|
|
|
-define(HTML_DOCTYPE,
|
2013-03-14 10:33:02 +01:00
|
|
|
<<"<!DOCTYPE html PUBLIC \"-//W3C//DTD "
|
|
|
|
"XHTML 1.0 Transitional//EN\" \"http://www.w3."
|
|
|
|
"org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\n"
|
|
|
|
"">>).
|
2004-03-02 22:16:55 +01:00
|
|
|
|
|
|
|
start(SockData, Opts) ->
|
2015-12-09 15:40:20 +01:00
|
|
|
{ok,
|
|
|
|
proc_lib:spawn(ejabberd_http, init,
|
|
|
|
[SockData, Opts])}.
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2009-12-07 18:33:02 +01:00
|
|
|
start_link(SockData, Opts) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
{ok,
|
|
|
|
proc_lib:spawn_link(ejabberd_http, init,
|
|
|
|
[SockData, Opts])}.
|
2009-12-07 18:33:02 +01:00
|
|
|
|
|
|
|
init({SockMod, Socket}, Opts) ->
|
2013-08-12 14:25:05 +02:00
|
|
|
TLSEnabled = proplists:get_bool(tls, Opts),
|
2013-03-14 10:33:02 +01:00
|
|
|
TLSOpts1 = lists:filter(fun ({certfile, _}) -> true;
|
2015-03-24 16:13:55 +01:00
|
|
|
({ciphers, _}) -> true;
|
2015-05-26 21:06:04 +02:00
|
|
|
({dhfile, _}) -> true;
|
2013-03-14 10:33:02 +01:00
|
|
|
(_) -> false
|
|
|
|
end,
|
|
|
|
Opts),
|
2015-03-24 16:13:55 +01:00
|
|
|
TLSOpts2 = case lists:keysearch(protocol_options, 1, Opts) of
|
|
|
|
{value, {_, O}} ->
|
|
|
|
[_|ProtocolOptions] = lists:foldl(
|
|
|
|
fun(X, Acc) -> X ++ Acc end, [],
|
|
|
|
[["|" | binary_to_list(Opt)] || Opt <- O, is_binary(Opt)]
|
|
|
|
),
|
|
|
|
[{protocol_options, iolist_to_binary(ProtocolOptions)} | TLSOpts1];
|
|
|
|
_ -> TLSOpts1
|
2013-07-17 14:28:23 +02:00
|
|
|
end,
|
2015-03-24 16:13:55 +01:00
|
|
|
TLSOpts3 = case proplists:get_bool(tls_compression, Opts) of
|
|
|
|
false -> [compression_none | TLSOpts2];
|
|
|
|
true -> TLSOpts2
|
|
|
|
end,
|
|
|
|
TLSOpts = [verify_none | TLSOpts3],
|
2013-03-14 10:33:02 +01:00
|
|
|
{SockMod1, Socket1} = if TLSEnabled ->
|
|
|
|
inet:setopts(Socket, [{recbuf, 8192}]),
|
2016-02-03 16:13:16 +01:00
|
|
|
{ok, TLSSocket} = fast_tls:tcp_to_tls(Socket,
|
2013-03-14 10:33:02 +01:00
|
|
|
TLSOpts),
|
2016-02-03 16:13:16 +01:00
|
|
|
{fast_tls, TLSSocket};
|
2013-03-14 10:33:02 +01:00
|
|
|
true -> {SockMod, Socket}
|
|
|
|
end,
|
2013-09-22 12:18:56 +02:00
|
|
|
Captcha = case proplists:get_bool(captcha, Opts) of
|
2013-03-14 10:33:02 +01:00
|
|
|
true -> [{[<<"captcha">>], ejabberd_captcha}];
|
|
|
|
false -> []
|
|
|
|
end,
|
2013-09-22 12:18:56 +02:00
|
|
|
Register = case proplists:get_bool(register, Opts) of
|
2013-03-14 10:33:02 +01:00
|
|
|
true -> [{[<<"register">>], mod_register_web}];
|
|
|
|
false -> []
|
|
|
|
end,
|
2013-09-22 12:18:56 +02:00
|
|
|
Admin = case proplists:get_bool(web_admin, Opts) of
|
2013-03-14 10:33:02 +01:00
|
|
|
true -> [{[<<"admin">>], ejabberd_web_admin}];
|
|
|
|
false -> []
|
|
|
|
end,
|
2013-09-22 12:18:56 +02:00
|
|
|
Bind = case proplists:get_bool(http_bind, Opts) of
|
2013-03-14 10:33:02 +01:00
|
|
|
true -> [{[<<"http-bind">>], mod_http_bind}];
|
|
|
|
false -> []
|
|
|
|
end,
|
2014-10-03 16:53:55 +02:00
|
|
|
XMLRPC = case proplists:get_bool(xmlrpc, Opts) of
|
|
|
|
true -> [{[], ejabberd_xmlrpc}];
|
|
|
|
false -> []
|
|
|
|
end,
|
2013-08-12 14:25:05 +02:00
|
|
|
DefinedHandlers = gen_mod:get_opt(
|
|
|
|
request_handlers, Opts,
|
|
|
|
fun(Hs) ->
|
2016-09-08 11:34:42 +02:00
|
|
|
Hs1 = lists:map(fun
|
|
|
|
({Mod, Path}) when is_atom(Mod) -> {Path, Mod};
|
|
|
|
({Path, Mod}) -> {Path, Mod}
|
|
|
|
end, Hs),
|
|
|
|
|
2013-08-12 14:25:05 +02:00
|
|
|
[{str:tokens(
|
|
|
|
iolist_to_binary(Path), <<"/">>),
|
2016-09-08 11:34:42 +02:00
|
|
|
Mod} || {Path, Mod} <- Hs1]
|
2013-08-12 14:25:05 +02:00
|
|
|
end, []),
|
2013-03-14 10:33:02 +01:00
|
|
|
RequestHandlers = DefinedHandlers ++ Captcha ++ Register ++
|
2015-04-15 10:47:10 +02:00
|
|
|
Admin ++ Bind ++ XMLRPC,
|
2007-01-25 06:53:58 +01:00
|
|
|
?DEBUG("S: ~p~n", [RequestHandlers]),
|
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
DefaultHost = gen_mod:get_opt(default_host, Opts, fun(A) -> A end, undefined),
|
2012-02-14 11:35:17 +01:00
|
|
|
|
2004-09-25 22:52:20 +02:00
|
|
|
?INFO_MSG("started: ~p", [{SockMod1, Socket1}]),
|
2009-12-08 18:32:46 +01:00
|
|
|
State = #state{sockmod = SockMod1,
|
|
|
|
socket = Socket1,
|
2012-02-14 11:35:17 +01:00
|
|
|
default_host = DefaultHost,
|
2014-10-03 16:53:55 +02:00
|
|
|
options = Opts,
|
2009-12-08 18:32:46 +01:00
|
|
|
request_handlers = RequestHandlers},
|
2015-08-17 15:50:02 +02:00
|
|
|
try receive_headers(State) of
|
|
|
|
V -> V
|
|
|
|
catch
|
|
|
|
{error, _} -> State
|
|
|
|
end.
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2015-10-07 00:06:58 +02:00
|
|
|
become_controller(_Pid) ->
|
|
|
|
ok.
|
2006-01-13 02:55:20 +01:00
|
|
|
|
2006-09-25 05:51:11 +02:00
|
|
|
socket_type() ->
|
|
|
|
raw.
|
|
|
|
|
2004-03-02 22:16:55 +01:00
|
|
|
send_text(State, Text) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
case catch
|
|
|
|
(State#state.sockmod):send(State#state.socket, Text)
|
|
|
|
of
|
|
|
|
ok -> ok;
|
|
|
|
{error, timeout} ->
|
|
|
|
?INFO_MSG("Timeout on ~p:send", [State#state.sockmod]),
|
|
|
|
exit(normal);
|
|
|
|
Error ->
|
|
|
|
?DEBUG("Error in ~p:send: ~p",
|
|
|
|
[State#state.sockmod, Error]),
|
|
|
|
exit(normal)
|
2009-10-19 11:36:23 +02:00
|
|
|
end.
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
receive_headers(#state{trail = Trail} = State) ->
|
2004-04-26 17:38:07 +02:00
|
|
|
SockMod = State#state.sockmod,
|
|
|
|
Socket = State#state.socket,
|
|
|
|
Data = SockMod:recv(Socket, 0, 300000),
|
2015-02-25 14:36:48 +01:00
|
|
|
case Data of
|
|
|
|
{error, _} -> ok;
|
|
|
|
{ok, D} ->
|
|
|
|
parse_headers(State#state{trail = <<Trail/binary, D/binary>>})
|
2012-04-06 16:22:08 +02:00
|
|
|
end.
|
|
|
|
|
|
|
|
parse_headers(#state{trail = <<>>} = State) ->
|
|
|
|
receive_headers(State);
|
2013-03-14 10:33:02 +01:00
|
|
|
parse_headers(#state{request_method = Method,
|
|
|
|
trail = Data} =
|
|
|
|
State) ->
|
2012-04-06 16:22:08 +02:00
|
|
|
PktType = case Method of
|
2015-10-07 00:06:58 +02:00
|
|
|
undefined -> http_bin;
|
|
|
|
_ -> httph_bin
|
|
|
|
end,
|
2013-06-24 12:04:56 +02:00
|
|
|
case erlang:decode_packet(PktType, Data, []) of
|
2015-10-07 00:06:58 +02:00
|
|
|
{ok, Pkt, Rest} ->
|
|
|
|
NewState = process_header(State#state{trail = Rest}, {ok, Pkt}),
|
2012-04-06 16:22:08 +02:00
|
|
|
case NewState#state.end_of_request of
|
2015-10-07 00:06:58 +02:00
|
|
|
true -> ok;
|
|
|
|
_ -> parse_headers(NewState)
|
2012-04-06 16:22:08 +02:00
|
|
|
end;
|
2015-10-07 00:06:58 +02:00
|
|
|
{more, _} ->
|
|
|
|
receive_headers(State#state{trail = Data});
|
|
|
|
_ ->
|
|
|
|
ok
|
2004-09-25 22:52:20 +02:00
|
|
|
end.
|
|
|
|
|
|
|
|
process_header(State, Data) ->
|
|
|
|
SockMod = State#state.sockmod,
|
|
|
|
Socket = State#state.socket,
|
2004-03-02 22:16:55 +01:00
|
|
|
case Data of
|
2013-03-14 10:33:02 +01:00
|
|
|
{ok, {http_request, Method, Uri, Version}} ->
|
|
|
|
KeepAlive = case Version of
|
|
|
|
{1, 1} -> true;
|
|
|
|
_ -> false
|
|
|
|
end,
|
|
|
|
Path = case Uri of
|
|
|
|
{absoluteURI, _Scheme, _Host, _Port, P} ->
|
|
|
|
{abs_path, P};
|
|
|
|
{abs_path, P} ->
|
|
|
|
{abs_path, P};
|
|
|
|
_ -> Uri
|
|
|
|
end,
|
|
|
|
State#state{request_method = Method,
|
|
|
|
request_version = Version, request_path = Path,
|
|
|
|
request_keepalive = KeepAlive};
|
|
|
|
{ok, {http_header, _, 'Connection' = Name, _, Conn}} ->
|
|
|
|
KeepAlive1 = case jlib:tolower(Conn) of
|
|
|
|
<<"keep-alive">> -> true;
|
|
|
|
<<"close">> -> false;
|
|
|
|
_ -> State#state.request_keepalive
|
|
|
|
end,
|
|
|
|
State#state{request_keepalive = KeepAlive1,
|
|
|
|
request_headers = add_header(Name, Conn, State)};
|
|
|
|
{ok,
|
|
|
|
{http_header, _, 'Authorization' = Name, _, Auth}} ->
|
|
|
|
State#state{request_auth = parse_auth(Auth),
|
|
|
|
request_headers = add_header(Name, Auth, State)};
|
|
|
|
{ok,
|
|
|
|
{http_header, _, 'Content-Length' = Name, _, SLen}} ->
|
2016-09-24 22:34:28 +02:00
|
|
|
case catch binary_to_integer(SLen) of
|
2013-03-14 10:33:02 +01:00
|
|
|
Len when is_integer(Len) ->
|
|
|
|
State#state{request_content_length = Len,
|
|
|
|
request_headers = add_header(Name, SLen, State)};
|
|
|
|
_ -> State
|
|
|
|
end;
|
|
|
|
{ok,
|
|
|
|
{http_header, _, 'Accept-Language' = Name, _, Langs}} ->
|
|
|
|
State#state{request_lang = parse_lang(Langs),
|
|
|
|
request_headers = add_header(Name, Langs, State)};
|
|
|
|
{ok, {http_header, _, 'Host' = Name, _, Host}} ->
|
|
|
|
State#state{request_host = Host,
|
|
|
|
request_headers = add_header(Name, Host, State)};
|
2015-02-25 14:36:48 +01:00
|
|
|
{ok, {http_header, _, Name, _, Value}} when is_binary(Name) ->
|
2015-10-07 00:06:58 +02:00
|
|
|
State#state{request_headers =
|
|
|
|
add_header(normalize_header_name(Name), Value, State)};
|
2013-03-14 10:33:02 +01:00
|
|
|
{ok, {http_header, _, Name, _, Value}} ->
|
|
|
|
State#state{request_headers =
|
|
|
|
add_header(Name, Value, State)};
|
|
|
|
{ok, http_eoh}
|
|
|
|
when State#state.request_host == undefined ->
|
|
|
|
?WARNING_MSG("An HTTP request without 'Host' HTTP "
|
|
|
|
"header was received.",
|
|
|
|
[]),
|
|
|
|
throw(http_request_no_host_header);
|
|
|
|
{ok, http_eoh} ->
|
2015-02-11 15:38:55 +01:00
|
|
|
?DEBUG("(~w) http query: ~w ~p~n",
|
2013-03-14 10:33:02 +01:00
|
|
|
[State#state.socket, State#state.request_method,
|
|
|
|
element(2, State#state.request_path)]),
|
|
|
|
{HostProvided, Port, TP} =
|
|
|
|
get_transfer_protocol(SockMod,
|
|
|
|
State#state.request_host),
|
|
|
|
Host = get_host_really_served(State#state.default_host,
|
|
|
|
HostProvided),
|
|
|
|
State2 = State#state{request_host = Host,
|
|
|
|
request_port = Port, request_tp = TP},
|
2015-11-12 17:23:39 +01:00
|
|
|
{State3, Out} = process_request(State2),
|
|
|
|
send_text(State3, Out),
|
|
|
|
case State3#state.request_keepalive of
|
2013-03-14 10:33:02 +01:00
|
|
|
true ->
|
|
|
|
#state{sockmod = SockMod, socket = Socket,
|
2015-11-12 17:23:39 +01:00
|
|
|
trail = State3#state.trail,
|
2015-01-15 17:39:12 +01:00
|
|
|
options = State#state.options,
|
2015-03-06 12:40:48 +01:00
|
|
|
default_host = State#state.default_host,
|
2013-03-14 10:33:02 +01:00
|
|
|
request_handlers = State#state.request_handlers};
|
|
|
|
_ ->
|
|
|
|
#state{end_of_request = true,
|
2015-11-12 17:23:39 +01:00
|
|
|
trail = State3#state.trail,
|
2015-01-15 17:39:12 +01:00
|
|
|
options = State#state.options,
|
2015-03-06 12:40:48 +01:00
|
|
|
default_host = State#state.default_host,
|
2013-03-14 10:33:02 +01:00
|
|
|
request_handlers = State#state.request_handlers}
|
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
#state{end_of_request = true,
|
2015-01-15 17:39:12 +01:00
|
|
|
options = State#state.options,
|
2015-03-06 12:40:48 +01:00
|
|
|
default_host = State#state.default_host,
|
2013-03-14 10:33:02 +01:00
|
|
|
request_handlers = State#state.request_handlers}
|
2007-01-25 06:53:58 +01:00
|
|
|
end.
|
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
add_header(Name, Value, State)->
|
2008-11-12 10:58:28 +01:00
|
|
|
[{Name, Value} | State#state.request_headers].
|
|
|
|
|
2012-02-14 11:35:17 +01:00
|
|
|
get_host_really_served(undefined, Provided) ->
|
|
|
|
Provided;
|
|
|
|
get_host_really_served(Default, Provided) ->
|
|
|
|
case lists:member(Provided, ?MYHOSTS) of
|
2013-03-14 10:33:02 +01:00
|
|
|
true -> Provided;
|
|
|
|
false -> Default
|
2012-02-14 11:35:17 +01:00
|
|
|
end.
|
|
|
|
|
2008-09-12 13:45:16 +02:00
|
|
|
get_transfer_protocol(SockMod, HostPort) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
[Host | PortList] = str:tokens(HostPort, <<":">>),
|
2008-09-12 13:45:16 +02:00
|
|
|
case {SockMod, PortList} of
|
2013-03-14 10:33:02 +01:00
|
|
|
{gen_tcp, []} -> {Host, 80, http};
|
|
|
|
{gen_tcp, [Port]} ->
|
2016-09-24 22:34:28 +02:00
|
|
|
{Host, binary_to_integer(Port), http};
|
2016-02-03 16:13:16 +01:00
|
|
|
{fast_tls, []} -> {Host, 443, https};
|
|
|
|
{fast_tls, [Port]} ->
|
2016-09-24 22:34:28 +02:00
|
|
|
{Host, binary_to_integer(Port), https}
|
2008-09-12 13:45:16 +02:00
|
|
|
end.
|
|
|
|
|
2007-01-25 06:53:58 +01:00
|
|
|
%% XXX bard: search through request handlers looking for one that
|
|
|
|
%% matches the requested URL path, and pass control to it. If none is
|
|
|
|
%% found, answer with HTTP 404.
|
2015-02-25 10:42:59 +01:00
|
|
|
|
|
|
|
process([], _, _, _, _) -> ejabberd_web:error(not_found);
|
|
|
|
process(Handlers, Request, Socket, SockMod, Trail) ->
|
|
|
|
{HandlerPathPrefix, HandlerModule, HandlerOpts, HandlersLeft} =
|
|
|
|
case Handlers of
|
|
|
|
[{Pfx, Mod} | Tail] ->
|
|
|
|
{Pfx, Mod, [], Tail};
|
|
|
|
[{Pfx, Mod, Opts} | Tail] ->
|
|
|
|
{Pfx, Mod, Opts, Tail}
|
|
|
|
end,
|
|
|
|
|
|
|
|
case (lists:prefix(HandlerPathPrefix, Request#request.path) or
|
|
|
|
(HandlerPathPrefix==Request#request.path)) of
|
|
|
|
true ->
|
|
|
|
?DEBUG("~p matches ~p", [Request#request.path, HandlerPathPrefix]),
|
|
|
|
%% LocalPath is the path "local to the handler", i.e. if
|
|
|
|
%% the handler was registered to handle "/test/" and the
|
|
|
|
%% requested path is "/test/foo/bar", the local path is
|
|
|
|
%% ["foo", "bar"]
|
|
|
|
LocalPath = lists:nthtail(length(HandlerPathPrefix), Request#request.path),
|
|
|
|
R = try
|
|
|
|
HandlerModule:socket_handoff(
|
|
|
|
LocalPath, Request, Socket, SockMod, Trail, HandlerOpts)
|
|
|
|
catch error:undef ->
|
|
|
|
HandlerModule:process(LocalPath, Request)
|
|
|
|
end,
|
|
|
|
ejabberd_hooks:run(http_request_debug, [{LocalPath, Request}]),
|
|
|
|
R;
|
|
|
|
false ->
|
|
|
|
process(HandlersLeft, Request, Socket, SockMod, Trail)
|
2004-03-02 22:16:55 +01:00
|
|
|
end.
|
|
|
|
|
2015-02-25 10:42:59 +01:00
|
|
|
extract_path_query(#state{request_method = Method,
|
2015-11-12 17:23:39 +01:00
|
|
|
request_path = {abs_path, Path}} = State)
|
2015-02-25 10:42:59 +01:00
|
|
|
when Method =:= 'GET' orelse
|
|
|
|
Method =:= 'HEAD' orelse
|
|
|
|
Method =:= 'DELETE' orelse Method =:= 'OPTIONS' ->
|
|
|
|
case catch url_decode_q_split(Path) of
|
2015-11-12 17:23:39 +01:00
|
|
|
{'EXIT', _} -> {State, false};
|
|
|
|
{NPath, Query} ->
|
|
|
|
LPath = normalize_path([NPE
|
|
|
|
|| NPE <- str:tokens(path_decode(NPath), <<"/">>)]),
|
|
|
|
LQuery = case catch parse_urlencoded(Query) of
|
|
|
|
{'EXIT', _Reason} -> [];
|
|
|
|
LQ -> LQ
|
|
|
|
end,
|
|
|
|
{State, {LPath, LQuery, <<"">>}}
|
2015-02-25 10:42:59 +01:00
|
|
|
end;
|
|
|
|
extract_path_query(#state{request_method = Method,
|
|
|
|
request_path = {abs_path, Path},
|
|
|
|
request_content_length = Len,
|
|
|
|
sockmod = _SockMod,
|
|
|
|
socket = _Socket} = State)
|
|
|
|
when (Method =:= 'POST' orelse Method =:= 'PUT') andalso
|
|
|
|
is_integer(Len) ->
|
2016-09-27 23:22:30 +02:00
|
|
|
case recv_data(State, Len) of
|
|
|
|
error -> {State, false};
|
|
|
|
{NewState, Data} ->
|
2015-02-25 10:42:59 +01:00
|
|
|
?DEBUG("client data: ~p~n", [Data]),
|
|
|
|
case catch url_decode_q_split(Path) of
|
2015-11-12 17:23:39 +01:00
|
|
|
{'EXIT', _} -> {NewState, false};
|
|
|
|
{NPath, _Query} ->
|
|
|
|
LPath = normalize_path([NPE
|
|
|
|
|| NPE <- str:tokens(path_decode(NPath), <<"/">>)]),
|
|
|
|
LQuery = case catch parse_urlencoded(Data) of
|
|
|
|
{'EXIT', _Reason} -> [];
|
|
|
|
LQ -> LQ
|
|
|
|
end,
|
|
|
|
{NewState, {LPath, LQuery, Data}}
|
2016-09-27 23:22:30 +02:00
|
|
|
end
|
2015-02-25 10:42:59 +01:00
|
|
|
end;
|
2015-11-12 17:23:39 +01:00
|
|
|
extract_path_query(State) ->
|
|
|
|
{State, false}.
|
2015-02-25 10:42:59 +01:00
|
|
|
|
|
|
|
process_request(#state{request_method = Method,
|
2015-10-07 00:06:58 +02:00
|
|
|
request_auth = Auth,
|
|
|
|
request_lang = Lang,
|
|
|
|
sockmod = SockMod,
|
|
|
|
socket = Socket,
|
|
|
|
options = Options,
|
|
|
|
request_host = Host,
|
|
|
|
request_port = Port,
|
|
|
|
request_tp = TP,
|
|
|
|
request_headers = RequestHeaders,
|
|
|
|
request_handlers = RequestHandlers,
|
|
|
|
trail = Trail} = State) ->
|
2015-02-25 10:42:59 +01:00
|
|
|
case extract_path_query(State) of
|
2015-11-12 17:23:39 +01:00
|
|
|
{State2, false} ->
|
|
|
|
{State2, make_bad_request(State)};
|
|
|
|
{State2, {LPath, LQuery, Data}} ->
|
2015-08-17 15:50:02 +02:00
|
|
|
PeerName =
|
2007-05-07 17:47:33 +02:00
|
|
|
case SockMod of
|
|
|
|
gen_tcp ->
|
|
|
|
inet:peername(Socket);
|
|
|
|
_ ->
|
|
|
|
SockMod:peername(Socket)
|
|
|
|
end,
|
2015-08-17 15:50:02 +02:00
|
|
|
IPHere = case PeerName of
|
|
|
|
{ok, V} -> V;
|
|
|
|
{error, _} = E -> throw(E)
|
|
|
|
end,
|
2010-12-07 16:47:32 +01:00
|
|
|
XFF = proplists:get_value('X-Forwarded-For', RequestHeaders, []),
|
|
|
|
IP = analyze_ip_xff(IPHere, XFF, Host),
|
2015-02-25 10:42:59 +01:00
|
|
|
Request = #request{method = Method,
|
|
|
|
path = LPath,
|
|
|
|
q = LQuery,
|
|
|
|
auth = Auth,
|
|
|
|
data = Data,
|
|
|
|
lang = Lang,
|
|
|
|
host = Host,
|
|
|
|
port = Port,
|
|
|
|
tp = TP,
|
2014-10-03 16:53:55 +02:00
|
|
|
opts = Options,
|
2015-02-25 10:42:59 +01:00
|
|
|
headers = RequestHeaders,
|
|
|
|
ip = IP},
|
2015-11-12 17:23:39 +01:00
|
|
|
Res = case process(RequestHandlers, Request, Socket, SockMod, Trail) of
|
|
|
|
El when is_record(El, xmlel) ->
|
|
|
|
make_xhtml_output(State, 200, [], El);
|
|
|
|
{Status, Headers, El}
|
|
|
|
when is_record(El, xmlel) ->
|
|
|
|
make_xhtml_output(State, Status, Headers, El);
|
|
|
|
Output when is_binary(Output) or is_list(Output) ->
|
|
|
|
make_text_output(State, 200, [], Output);
|
|
|
|
{Status, Headers, Output}
|
|
|
|
when is_binary(Output) or is_list(Output) ->
|
|
|
|
make_text_output(State, Status, Headers, Output);
|
|
|
|
{Status, Reason, Headers, Output}
|
|
|
|
when is_binary(Output) or is_list(Output) ->
|
|
|
|
make_text_output(State, Status, Reason, Headers, Output);
|
|
|
|
_ ->
|
|
|
|
none
|
|
|
|
end,
|
|
|
|
{State2, Res}
|
2015-02-25 10:42:59 +01:00
|
|
|
end.
|
2011-09-05 08:31:58 +02:00
|
|
|
|
|
|
|
make_bad_request(State) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
make_xhtml_output(State, 400, [],
|
|
|
|
ejabberd_web:make_xhtml([#xmlel{name = <<"h1">>,
|
|
|
|
attrs = [],
|
|
|
|
children =
|
|
|
|
[{xmlcdata,
|
|
|
|
<<"400 Bad Request">>}]}])).
|
|
|
|
|
|
|
|
analyze_ip_xff(IP, [], _Host) -> IP;
|
2010-12-07 16:47:32 +01:00
|
|
|
analyze_ip_xff({IPLast, Port}, XFF, Host) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
[ClientIP | ProxiesIPs] = str:tokens(XFF, <<", ">>) ++
|
|
|
|
[jlib:ip_to_list(IPLast)],
|
2013-08-12 14:25:05 +02:00
|
|
|
TrustedProxies = ejabberd_config:get_option(
|
2013-03-14 10:33:02 +01:00
|
|
|
{trusted_proxies, Host},
|
2015-12-04 13:14:39 +01:00
|
|
|
fun(all) -> all;
|
|
|
|
(TPs) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
[iolist_to_binary(TP) || TP <- TPs]
|
|
|
|
end, []),
|
|
|
|
IPClient = case is_ipchain_trusted(ProxiesIPs,
|
|
|
|
TrustedProxies)
|
|
|
|
of
|
|
|
|
true ->
|
|
|
|
{ok, IPFirst} = inet_parse:address(
|
|
|
|
binary_to_list(ClientIP)),
|
|
|
|
?DEBUG("The IP ~w was replaced with ~w due to "
|
|
|
|
"header X-Forwarded-For: ~s",
|
|
|
|
[IPLast, IPFirst, XFF]),
|
|
|
|
IPFirst;
|
|
|
|
false -> IPLast
|
2010-12-07 16:47:32 +01:00
|
|
|
end,
|
|
|
|
{IPClient, Port}.
|
2013-03-14 10:33:02 +01:00
|
|
|
|
|
|
|
is_ipchain_trusted(_UserIPs, all) -> true;
|
2010-12-07 16:47:32 +01:00
|
|
|
is_ipchain_trusted(UserIPs, TrustedIPs) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
[] == UserIPs -- [<<"127.0.0.1">> | TrustedIPs].
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
recv_data(State, Len) -> recv_data(State, Len, <<>>).
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2015-11-12 17:23:39 +01:00
|
|
|
recv_data(State, 0, Acc) -> {State, Acc};
|
|
|
|
recv_data(#state{trail = Trail} = State, Len, <<>>) when byte_size(Trail) > Len ->
|
|
|
|
<<Data:Len/binary, Rest/binary>> = Trail,
|
|
|
|
{State#state{trail = Rest}, Data};
|
2004-03-02 22:16:55 +01:00
|
|
|
recv_data(State, Len, Acc) ->
|
2004-09-25 22:52:20 +02:00
|
|
|
case State#state.trail of
|
2015-11-12 17:23:39 +01:00
|
|
|
<<>> ->
|
2015-12-20 23:30:11 +01:00
|
|
|
case (State#state.sockmod):recv(State#state.socket,
|
|
|
|
min(Len, 16#4000000), 300000)
|
2015-11-12 17:23:39 +01:00
|
|
|
of
|
|
|
|
{ok, Data} ->
|
|
|
|
recv_data(State, Len - byte_size(Data), <<Acc/binary, Data/binary>>);
|
2015-12-20 23:26:57 +01:00
|
|
|
Err ->
|
|
|
|
?DEBUG("Cannot receive HTTP data: ~p", [Err]),
|
2016-09-27 23:22:30 +02:00
|
|
|
error
|
2015-11-12 17:23:39 +01:00
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
Trail = (State#state.trail),
|
|
|
|
recv_data(State#state{trail = <<>>},
|
|
|
|
Len - byte_size(Trail), <<Acc/binary, Trail/binary>>)
|
2004-03-02 22:16:55 +01:00
|
|
|
end.
|
|
|
|
|
2005-05-23 01:29:54 +02:00
|
|
|
make_xhtml_output(State, Status, Headers, XHTML) ->
|
2004-04-26 17:38:07 +02:00
|
|
|
Data = case lists:member(html, Headers) of
|
2015-10-07 00:06:58 +02:00
|
|
|
true ->
|
|
|
|
iolist_to_binary([?HTML_DOCTYPE,
|
2016-02-03 19:03:17 +01:00
|
|
|
fxml:element_to_binary(XHTML)]);
|
2015-10-07 00:06:58 +02:00
|
|
|
_ ->
|
|
|
|
iolist_to_binary([?XHTML_DOCTYPE,
|
2016-02-03 19:03:17 +01:00
|
|
|
fxml:element_to_binary(XHTML)])
|
2015-10-07 00:06:58 +02:00
|
|
|
end,
|
2013-03-14 10:33:02 +01:00
|
|
|
Headers1 = case lists:keysearch(<<"Content-Type">>, 1,
|
|
|
|
Headers)
|
|
|
|
of
|
|
|
|
{value, _} ->
|
|
|
|
[{<<"Content-Length">>,
|
2016-11-24 13:06:06 +01:00
|
|
|
integer_to_binary(byte_size(Data))}
|
2013-03-14 10:33:02 +01:00
|
|
|
| Headers];
|
|
|
|
_ ->
|
|
|
|
[{<<"Content-Type">>, <<"text/html; charset=utf-8">>},
|
|
|
|
{<<"Content-Length">>,
|
2016-11-24 13:06:06 +01:00
|
|
|
integer_to_binary(byte_size(Data))}
|
2013-03-14 10:33:02 +01:00
|
|
|
| Headers]
|
2004-03-13 21:01:37 +01:00
|
|
|
end,
|
2005-05-23 01:29:54 +02:00
|
|
|
HeadersOut = case {State#state.request_version,
|
2013-03-14 10:33:02 +01:00
|
|
|
State#state.request_keepalive}
|
|
|
|
of
|
|
|
|
{{1, 1}, true} -> Headers1;
|
|
|
|
{_, true} ->
|
|
|
|
[{<<"Connection">>, <<"keep-alive">>} | Headers1];
|
|
|
|
{_, false} ->
|
|
|
|
[{<<"Connection">>, <<"close">>} | Headers1]
|
2005-05-23 01:29:54 +02:00
|
|
|
end,
|
|
|
|
Version = case State#state.request_version of
|
2013-03-14 10:33:02 +01:00
|
|
|
{1, 1} -> <<"HTTP/1.1 ">>;
|
|
|
|
_ -> <<"HTTP/1.0 ">>
|
2005-05-23 01:29:54 +02:00
|
|
|
end,
|
2013-03-14 10:33:02 +01:00
|
|
|
H = lists:map(fun ({Attr, Val}) ->
|
|
|
|
[Attr, <<": ">>, Val, <<"\r\n">>];
|
|
|
|
(_) -> []
|
|
|
|
end,
|
|
|
|
HeadersOut),
|
|
|
|
SL = [Version,
|
2016-11-24 13:06:06 +01:00
|
|
|
integer_to_binary(Status), <<" ">>,
|
2013-03-14 10:33:02 +01:00
|
|
|
code_to_phrase(Status), <<"\r\n">>],
|
2011-04-12 23:31:08 +02:00
|
|
|
Data2 = case State#state.request_method of
|
2013-03-14 10:33:02 +01:00
|
|
|
'HEAD' -> <<"">>;
|
|
|
|
_ -> Data
|
|
|
|
end,
|
|
|
|
[SL, H, <<"\r\n">>, Data2].
|
|
|
|
|
|
|
|
make_text_output(State, Status, Headers, Text) ->
|
|
|
|
make_text_output(State, Status, <<"">>, Headers, Text).
|
|
|
|
|
|
|
|
make_text_output(State, Status, Reason, Headers, Text) ->
|
|
|
|
Data = iolist_to_binary(Text),
|
|
|
|
Headers1 = case lists:keysearch(<<"Content-Type">>, 1,
|
|
|
|
Headers)
|
|
|
|
of
|
|
|
|
{value, _} ->
|
|
|
|
[{<<"Content-Length">>,
|
2016-09-24 22:34:28 +02:00
|
|
|
integer_to_binary(byte_size(Data))}
|
2013-03-14 10:33:02 +01:00
|
|
|
| Headers];
|
|
|
|
_ ->
|
|
|
|
[{<<"Content-Type">>, <<"text/html; charset=utf-8">>},
|
|
|
|
{<<"Content-Length">>,
|
2016-09-24 22:34:28 +02:00
|
|
|
integer_to_binary(byte_size(Data))}
|
2013-03-14 10:33:02 +01:00
|
|
|
| Headers]
|
2004-03-13 21:01:37 +01:00
|
|
|
end,
|
2005-05-23 01:29:54 +02:00
|
|
|
HeadersOut = case {State#state.request_version,
|
2013-03-14 10:33:02 +01:00
|
|
|
State#state.request_keepalive}
|
|
|
|
of
|
|
|
|
{{1, 1}, true} -> Headers1;
|
|
|
|
{_, true} ->
|
|
|
|
[{<<"Connection">>, <<"keep-alive">>} | Headers1];
|
|
|
|
{_, false} ->
|
|
|
|
[{<<"Connection">>, <<"close">>} | Headers1]
|
2005-05-23 01:29:54 +02:00
|
|
|
end,
|
|
|
|
Version = case State#state.request_version of
|
2013-03-14 10:33:02 +01:00
|
|
|
{1, 1} -> <<"HTTP/1.1 ">>;
|
|
|
|
_ -> <<"HTTP/1.0 ">>
|
2005-05-23 01:29:54 +02:00
|
|
|
end,
|
2013-03-14 10:33:02 +01:00
|
|
|
H = lists:map(fun ({Attr, Val}) ->
|
|
|
|
[Attr, <<": ">>, Val, <<"\r\n">>]
|
|
|
|
end,
|
|
|
|
HeadersOut),
|
|
|
|
NewReason = case Reason of
|
|
|
|
<<"">> -> code_to_phrase(Status);
|
|
|
|
_ -> Reason
|
|
|
|
end,
|
|
|
|
SL = [Version,
|
2016-09-24 22:34:28 +02:00
|
|
|
integer_to_binary(Status), <<" ">>,
|
2013-03-14 10:33:02 +01:00
|
|
|
NewReason, <<"\r\n">>],
|
2011-04-12 23:31:08 +02:00
|
|
|
Data2 = case State#state.request_method of
|
2013-03-14 10:33:02 +01:00
|
|
|
'HEAD' -> <<"">>;
|
|
|
|
_ -> Data
|
|
|
|
end,
|
|
|
|
[SL, H, <<"\r\n">>, Data2].
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2004-05-01 22:10:25 +02:00
|
|
|
parse_lang(Langs) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
case str:tokens(Langs, <<",; ">>) of
|
|
|
|
[First | _] -> First;
|
|
|
|
[] -> <<"en">>
|
2004-05-01 22:10:25 +02:00
|
|
|
end.
|
|
|
|
|
2004-03-02 22:16:55 +01:00
|
|
|
% Code below is taken (with some modifications) from the yaws webserver, which
|
|
|
|
% is distributed under the folowing license:
|
|
|
|
%
|
|
|
|
% This software (the yaws webserver) is free software.
|
|
|
|
% Parts of this software is Copyright (c) Claes Wikstrom <klacke@hyber.org>
|
|
|
|
% Any use or misuse of the source code is hereby freely allowed.
|
|
|
|
%
|
|
|
|
% 1. Redistributions of source code must retain the above copyright
|
|
|
|
% notice as well as this list of conditions.
|
|
|
|
%
|
|
|
|
% 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
% notice as well as this list of conditions.
|
|
|
|
|
2008-11-12 11:03:27 +01:00
|
|
|
%% @doc Split the URL and return {Path, QueryPart}
|
2004-03-02 22:16:55 +01:00
|
|
|
url_decode_q_split(Path) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
url_decode_q_split(Path, <<>>).
|
|
|
|
|
|
|
|
url_decode_q_split(<<$?, T/binary>>, Acc) ->
|
2004-03-02 22:16:55 +01:00
|
|
|
%% Don't decode the query string here, that is parsed separately.
|
2013-03-14 10:33:02 +01:00
|
|
|
{path_norm_reverse(Acc), T};
|
|
|
|
url_decode_q_split(<<H, T/binary>>, Acc) when H /= 0 ->
|
|
|
|
url_decode_q_split(T, <<H, Acc/binary>>);
|
|
|
|
url_decode_q_split(<<>>, Ack) ->
|
|
|
|
{path_norm_reverse(Ack), <<>>}.
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2008-11-12 11:03:27 +01:00
|
|
|
%% @doc Decode a part of the URL and return string()
|
2013-03-14 10:33:02 +01:00
|
|
|
path_decode(Path) -> path_decode(Path, <<>>).
|
|
|
|
|
|
|
|
path_decode(<<$%, Hi, Lo, Tail/binary>>, Acc) ->
|
2008-11-12 11:03:27 +01:00
|
|
|
Hex = hex_to_integer([Hi, Lo]),
|
2013-03-14 10:33:02 +01:00
|
|
|
if Hex == 0 -> exit(badurl);
|
2008-11-12 11:03:27 +01:00
|
|
|
true -> ok
|
|
|
|
end,
|
2013-03-14 10:33:02 +01:00
|
|
|
path_decode(Tail, <<Acc/binary, Hex>>);
|
|
|
|
path_decode(<<H, T/binary>>, Acc) when H /= 0 ->
|
|
|
|
path_decode(T, <<Acc/binary, H>>);
|
|
|
|
path_decode(<<>>, Acc) -> Acc.
|
|
|
|
|
|
|
|
path_norm_reverse(<<"/", T/binary>>) -> start_dir(0, <<"/">>, T);
|
|
|
|
path_norm_reverse(T) -> start_dir(0, <<"">>, T).
|
|
|
|
|
|
|
|
start_dir(N, Path, <<"..">>) -> rest_dir(N, Path, <<"">>);
|
|
|
|
start_dir(N, Path, <<"/", T/binary>>) -> start_dir(N, Path, T);
|
|
|
|
start_dir(N, Path, <<"./", T/binary>>) -> start_dir(N, Path, T);
|
|
|
|
start_dir(N, Path, <<"../", T/binary>>) ->
|
|
|
|
start_dir(N + 1, Path, T);
|
|
|
|
start_dir(N, Path, T) -> rest_dir(N, Path, T).
|
|
|
|
|
|
|
|
rest_dir(_N, Path, <<>>) ->
|
|
|
|
case Path of
|
|
|
|
<<>> -> <<"/">>;
|
|
|
|
_ -> Path
|
|
|
|
end;
|
|
|
|
rest_dir(0, Path, <<$/, T/binary>>) ->
|
|
|
|
start_dir(0, <<$/, Path/binary>>, T);
|
|
|
|
rest_dir(N, Path, <<$/, T/binary>>) ->
|
|
|
|
start_dir(N - 1, Path, T);
|
|
|
|
rest_dir(0, Path, <<H, T/binary>>) ->
|
|
|
|
rest_dir(0, <<H, Path/binary>>, T);
|
|
|
|
rest_dir(N, Path, <<_H, T/binary>>) -> rest_dir(N, Path, T).
|
2004-03-02 22:16:55 +01:00
|
|
|
|
|
|
|
%% hex_to_integer
|
|
|
|
|
|
|
|
hex_to_integer(Hex) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
case catch list_to_integer(Hex, 16) of
|
|
|
|
{'EXIT', _} -> old_hex_to_integer(Hex);
|
|
|
|
X -> X
|
2004-03-02 22:16:55 +01:00
|
|
|
end.
|
|
|
|
|
|
|
|
old_hex_to_integer(Hex) ->
|
|
|
|
DEHEX = fun (H) when H >= $a, H =< $f -> H - $a + 10;
|
|
|
|
(H) when H >= $A, H =< $F -> H - $A + 10;
|
|
|
|
(H) when H >= $0, H =< $9 -> H - $0
|
|
|
|
end,
|
2013-03-14 10:33:02 +01:00
|
|
|
lists:foldl(fun (E, Acc) -> Acc * 16 + DEHEX(E) end, 0,
|
|
|
|
Hex).
|
|
|
|
|
|
|
|
code_to_phrase(100) -> <<"Continue">>;
|
|
|
|
code_to_phrase(101) -> <<"Switching Protocols ">>;
|
|
|
|
code_to_phrase(200) -> <<"OK">>;
|
|
|
|
code_to_phrase(201) -> <<"Created">>;
|
|
|
|
code_to_phrase(202) -> <<"Accepted">>;
|
|
|
|
code_to_phrase(203) ->
|
|
|
|
<<"Non-Authoritative Information">>;
|
|
|
|
code_to_phrase(204) -> <<"No Content">>;
|
|
|
|
code_to_phrase(205) -> <<"Reset Content">>;
|
|
|
|
code_to_phrase(206) -> <<"Partial Content">>;
|
|
|
|
code_to_phrase(300) -> <<"Multiple Choices">>;
|
|
|
|
code_to_phrase(301) -> <<"Moved Permanently">>;
|
|
|
|
code_to_phrase(302) -> <<"Found">>;
|
|
|
|
code_to_phrase(303) -> <<"See Other">>;
|
|
|
|
code_to_phrase(304) -> <<"Not Modified">>;
|
|
|
|
code_to_phrase(305) -> <<"Use Proxy">>;
|
|
|
|
code_to_phrase(306) -> <<"(Unused)">>;
|
|
|
|
code_to_phrase(307) -> <<"Temporary Redirect">>;
|
|
|
|
code_to_phrase(400) -> <<"Bad Request">>;
|
|
|
|
code_to_phrase(401) -> <<"Unauthorized">>;
|
|
|
|
code_to_phrase(402) -> <<"Payment Required">>;
|
|
|
|
code_to_phrase(403) -> <<"Forbidden">>;
|
|
|
|
code_to_phrase(404) -> <<"Not Found">>;
|
|
|
|
code_to_phrase(405) -> <<"Method Not Allowed">>;
|
|
|
|
code_to_phrase(406) -> <<"Not Acceptable">>;
|
|
|
|
code_to_phrase(407) ->
|
|
|
|
<<"Proxy Authentication Required">>;
|
|
|
|
code_to_phrase(408) -> <<"Request Timeout">>;
|
|
|
|
code_to_phrase(409) -> <<"Conflict">>;
|
|
|
|
code_to_phrase(410) -> <<"Gone">>;
|
|
|
|
code_to_phrase(411) -> <<"Length Required">>;
|
|
|
|
code_to_phrase(412) -> <<"Precondition Failed">>;
|
|
|
|
code_to_phrase(413) -> <<"Request Entity Too Large">>;
|
|
|
|
code_to_phrase(414) -> <<"Request-URI Too Long">>;
|
|
|
|
code_to_phrase(415) -> <<"Unsupported Media Type">>;
|
|
|
|
code_to_phrase(416) ->
|
|
|
|
<<"Requested Range Not Satisfiable">>;
|
|
|
|
code_to_phrase(417) -> <<"Expectation Failed">>;
|
|
|
|
code_to_phrase(500) -> <<"Internal Server Error">>;
|
|
|
|
code_to_phrase(501) -> <<"Not Implemented">>;
|
|
|
|
code_to_phrase(502) -> <<"Bad Gateway">>;
|
|
|
|
code_to_phrase(503) -> <<"Service Unavailable">>;
|
|
|
|
code_to_phrase(504) -> <<"Gateway Timeout">>;
|
|
|
|
code_to_phrase(505) -> <<"HTTP Version Not Supported">>.
|
|
|
|
|
2016-03-30 16:47:40 +02:00
|
|
|
-spec parse_auth(binary()) -> {binary(), binary()} | {oauth, binary(), []} | undefined.
|
2013-03-14 10:33:02 +01:00
|
|
|
parse_auth(<<"Basic ", Auth64/binary>>) ->
|
|
|
|
Auth = jlib:decode_base64(Auth64),
|
|
|
|
%% Auth should be a string with the format: user@server:password
|
|
|
|
%% Note that password can contain additional characters '@' and ':'
|
|
|
|
case str:chr(Auth, $:) of
|
|
|
|
0 ->
|
|
|
|
undefined;
|
|
|
|
Pos ->
|
|
|
|
{User, <<$:, Pass/binary>>} = erlang:split_binary(Auth, Pos-1),
|
2016-07-22 16:51:48 +02:00
|
|
|
PassUtf8 = unicode:characters_to_binary(binary_to_list(Pass), utf8),
|
|
|
|
{User, PassUtf8}
|
2004-03-02 22:16:55 +01:00
|
|
|
end;
|
2015-09-25 14:53:25 +02:00
|
|
|
parse_auth(<<"Bearer ", SToken/binary>>) ->
|
|
|
|
Token = str:strip(SToken),
|
|
|
|
{oauth, Token, []};
|
2013-03-14 10:33:02 +01:00
|
|
|
parse_auth(<<_/binary>>) -> undefined.
|
2004-03-02 22:16:55 +01:00
|
|
|
|
|
|
|
parse_urlencoded(S) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
parse_urlencoded(S, nokey, <<>>, key).
|
2004-03-02 22:16:55 +01:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
parse_urlencoded(<<$%, Hi, Lo, Tail/binary>>, Last, Cur,
|
|
|
|
State) ->
|
2004-03-02 22:16:55 +01:00
|
|
|
Hex = hex_to_integer([Hi, Lo]),
|
2013-03-14 10:33:02 +01:00
|
|
|
parse_urlencoded(Tail, Last, <<Cur/binary, Hex>>, State);
|
|
|
|
parse_urlencoded(<<$&, Tail/binary>>, _Last, Cur, key) ->
|
|
|
|
[{Cur, <<"">>} | parse_urlencoded(Tail,
|
|
|
|
nokey, <<>>,
|
|
|
|
key)]; %% cont keymode
|
|
|
|
parse_urlencoded(<<$&, Tail/binary>>, Last, Cur, value) ->
|
|
|
|
V = {Last, Cur},
|
|
|
|
[V | parse_urlencoded(Tail, nokey, <<>>, key)];
|
|
|
|
parse_urlencoded(<<$+, Tail/binary>>, Last, Cur, State) ->
|
|
|
|
parse_urlencoded(Tail, Last, <<Cur/binary, $\s>>, State);
|
|
|
|
parse_urlencoded(<<$=, Tail/binary>>, _Last, Cur, key) ->
|
|
|
|
parse_urlencoded(Tail, Cur, <<>>,
|
|
|
|
value); %% change mode
|
|
|
|
parse_urlencoded(<<H, Tail/binary>>, Last, Cur, State) ->
|
|
|
|
parse_urlencoded(Tail, Last, <<Cur/binary, H>>, State);
|
|
|
|
parse_urlencoded(<<>>, Last, Cur, _State) ->
|
|
|
|
[{Last, Cur}];
|
|
|
|
parse_urlencoded(undefined, _, _, _) -> [].
|
|
|
|
|
|
|
|
|
|
|
|
url_encode(A) ->
|
|
|
|
url_encode(A, <<>>).
|
|
|
|
|
|
|
|
url_encode(<<H:8, T/binary>>, Acc) when
|
|
|
|
(H >= $a andalso H =< $z) orelse
|
|
|
|
(H >= $A andalso H =< $Z) orelse
|
|
|
|
(H >= $0 andalso H =< $9) orelse
|
|
|
|
H == $_ orelse
|
|
|
|
H == $. orelse
|
|
|
|
H == $- orelse
|
|
|
|
H == $/ orelse
|
|
|
|
H == $: ->
|
|
|
|
url_encode(T, <<Acc/binary, H>>);
|
|
|
|
url_encode(<<H:8, T/binary>>, Acc) ->
|
|
|
|
case integer_to_hex(H) of
|
|
|
|
[X, Y] -> url_encode(T, <<Acc/binary, $%, X, Y>>);
|
|
|
|
[X] -> url_encode(T, <<Acc/binary, $%, $0, X>>)
|
2005-11-22 19:25:02 +01:00
|
|
|
end;
|
2013-03-14 10:33:02 +01:00
|
|
|
url_encode(<<>>, Acc) ->
|
|
|
|
Acc.
|
2005-11-22 19:25:02 +01:00
|
|
|
|
|
|
|
|
|
|
|
integer_to_hex(I) ->
|
|
|
|
case catch erlang:integer_to_list(I, 16) of
|
2013-03-14 10:33:02 +01:00
|
|
|
{'EXIT', _} -> old_integer_to_hex(I);
|
|
|
|
Int -> Int
|
2005-11-22 19:25:02 +01:00
|
|
|
end.
|
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
old_integer_to_hex(I) when I < 10 -> integer_to_list(I);
|
|
|
|
old_integer_to_hex(I) when I < 16 -> [I - 10 + $A];
|
|
|
|
old_integer_to_hex(I) when I >= 16 ->
|
|
|
|
N = trunc(I / 16),
|
2005-11-22 19:25:02 +01:00
|
|
|
old_integer_to_hex(N) ++ old_integer_to_hex(I rem 16).
|
|
|
|
|
2015-02-25 14:36:48 +01:00
|
|
|
% The following code is mostly taken from yaws_ssl.erl
|
|
|
|
|
|
|
|
toupper(C) when C >= $a andalso C =< $z -> C - 32;
|
|
|
|
toupper(C) -> C.
|
|
|
|
|
|
|
|
tolower(C) when C >= $A andalso C =< $Z -> C + 32;
|
|
|
|
tolower(C) -> C.
|
|
|
|
|
|
|
|
normalize_header_name(Name) ->
|
|
|
|
normalize_header_name(Name, [], true).
|
|
|
|
|
|
|
|
normalize_header_name(<<"">>, Acc, _) ->
|
|
|
|
iolist_to_binary(Acc);
|
|
|
|
normalize_header_name(<<"-", Rest/binary>>, Acc, _) ->
|
|
|
|
normalize_header_name(Rest, [Acc, "-"], true);
|
|
|
|
normalize_header_name(<<C:8, Rest/binary>>, Acc, true) ->
|
|
|
|
normalize_header_name(Rest, [Acc, toupper(C)], false);
|
|
|
|
normalize_header_name(<<C:8, Rest/binary>>, Acc, false) ->
|
|
|
|
normalize_header_name(Rest, [Acc, tolower(C)], false).
|
|
|
|
|
2013-06-25 11:26:44 +02:00
|
|
|
normalize_path(Path) ->
|
|
|
|
normalize_path(Path, []).
|
|
|
|
|
|
|
|
normalize_path([], Norm) -> lists:reverse(Norm);
|
2013-06-25 13:46:21 +02:00
|
|
|
normalize_path([<<"..">>|Path], Norm) ->
|
2013-06-25 11:26:44 +02:00
|
|
|
normalize_path(Path, Norm);
|
2013-06-25 13:46:21 +02:00
|
|
|
normalize_path([_Parent, <<"..">>|Path], Norm) ->
|
2013-06-25 11:26:44 +02:00
|
|
|
normalize_path(Path, Norm);
|
|
|
|
normalize_path([Part | Path], Norm) ->
|
|
|
|
normalize_path(Path, [Part|Norm]).
|
2013-08-12 14:25:05 +02:00
|
|
|
|
|
|
|
transform_listen_option(captcha, Opts) ->
|
|
|
|
[{captcha, true}|Opts];
|
|
|
|
transform_listen_option(register, Opts) ->
|
|
|
|
[{register, true}|Opts];
|
|
|
|
transform_listen_option(web_admin, Opts) ->
|
|
|
|
[{web_admin, true}|Opts];
|
|
|
|
transform_listen_option(http_bind, Opts) ->
|
|
|
|
[{http_bind, true}|Opts];
|
|
|
|
transform_listen_option(http_poll, Opts) ->
|
2015-04-15 10:47:10 +02:00
|
|
|
Opts;
|
2013-08-12 14:25:05 +02:00
|
|
|
transform_listen_option({request_handlers, Hs}, Opts) ->
|
|
|
|
Hs1 = lists:map(
|
|
|
|
fun({PList, Mod}) when is_list(PList) ->
|
|
|
|
Path = iolist_to_binary([[$/, P] || P <- PList]),
|
|
|
|
{Path, Mod};
|
|
|
|
(Opt) ->
|
|
|
|
Opt
|
|
|
|
end, Hs),
|
|
|
|
[{request_handlers, Hs1} | Opts];
|
|
|
|
transform_listen_option(Opt, Opts) ->
|
|
|
|
[Opt|Opts].
|
2015-06-01 14:38:27 +02:00
|
|
|
|
|
|
|
opt_type(trusted_proxies) ->
|
2015-12-04 13:14:39 +01:00
|
|
|
fun (all) -> all;
|
|
|
|
(TPs) -> [iolist_to_binary(TP) || TP <- TPs] end;
|
2015-06-01 14:38:27 +02:00
|
|
|
opt_type(_) -> [trusted_proxies].
|