2 Unix SMB/CIFS implementation.
6 Copyright (C) Andrew Tridgell 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 #include "smbd/service_task.h"
25 #include "web_server/web_server.h"
26 #include "smbd/service_stream.h"
27 #include "lib/events/events.h"
28 #include "system/time.h"
29 #include "lib/appweb/esp/esp.h"
30 #include "lib/appweb/ejs/ejsInternal.h"
31 #include "dlinklist.h"
32 #include "lib/tls/tls.h"
34 #define SWAT_SESSION_KEY "SwatSessionId"
35 #define HTTP_PREAUTH_URI "/scripting/preauth.esp"
37 /* state of the esp subsystem for a specific request */
39 struct websrv_context *web;
40 struct EspRequest *req;
41 struct MprVar variables[ESP_OBJ_MAX];
42 struct session_data *session;
46 output the http headers
48 static void http_output_headers(struct websrv_context *web)
53 uint32_t content_length = 0;
54 const char *response_string = "Unknown Code";
57 const char *response_string;
63 { 304, "Not Modified" },
64 { 400, "Bad request" },
65 { 401, "Unauthorized" },
68 { 500, "Internal Server Error" },
69 { 501, "Not implemented" }
71 for (i=0;i<ARRAY_SIZE(codes);i++) {
72 if (codes[i].code == web->output.response_code) {
73 response_string = codes[i].response_string;
77 if (web->output.headers == NULL) return;
78 s = talloc_asprintf(web, "HTTP/1.0 %u %s\r\n",
79 web->output.response_code, response_string);
80 if (s == NULL) return;
81 for (i=0;web->output.headers[i];i++) {
82 s = talloc_asprintf_append(s, "%s\r\n", web->output.headers[i]);
85 /* work out the content length */
86 content_length = web->output.content.length;
87 if (web->output.fd != -1) {
89 fstat(web->output.fd, &st);
90 content_length += st.st_size;
92 s = talloc_asprintf_append(s, "Content-Length: %u\r\n\r\n", content_length);
93 if (s == NULL) return;
95 b = web->output.content;
96 web->output.content = data_blob_string_const(s);
97 data_blob_append(web, &web->output.content, b.data, b.length);
102 return the local path for a URL
104 static const char *http_local_path(struct websrv_context *web, const char *url)
109 /* check that the url is OK */
110 if (url[0] != '/') return NULL;
112 for (i=0;url[i];i++) {
113 if ((!isalnum((unsigned char)url[i]) && !strchr("./_", url[i])) ||
114 (url[i] == '.' && strchr("/.", url[i+1]))) {
119 path = talloc_asprintf(web, "%s/%s", lp_swat_directory(), url+1);
120 if (path == NULL) return NULL;
122 if (directory_exist(path)) {
123 path = talloc_asprintf_append(path, "/index.esp");
129 called when esp wants to read a file to support include() calls
131 static int http_readFile(EspHandle handle, char **buf, int *len, const char *path)
133 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
138 path = http_local_path(web, path);
139 if (path == NULL) goto failed;
141 fd = open(path, O_RDONLY);
142 if (fd == -1 || fstat(fd, &st) != 0 || !S_ISREG(st.st_mode)) goto failed;
144 *buf = talloc_size(handle, st.st_size+1);
145 if (*buf == NULL) goto failed;
147 if (read(fd, *buf, st.st_size) != st.st_size) goto failed;
149 (*buf)[st.st_size] = 0;
156 DEBUG(0,("Failed to read file %s - %s\n", path, strerror(errno)));
157 if (fd != -1) close(fd);
164 called when esp wants to find the real path of a file
166 static int http_mapToStorage(EspHandle handle, char *path, int len, const char *uri, int flags)
168 if (uri == NULL || strlen(uri) >= len) return -1;
169 strncpy(path, uri, len);
174 called when esp wants to output something
176 static int http_writeBlock(EspHandle handle, const char *buf, int size)
178 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
180 status = data_blob_append(web, &web->output.content, buf, size);
181 if (!NT_STATUS_IS_OK(status)) return -1;
189 static void http_setHeader(EspHandle handle, const char *value, bool allowMultiple)
191 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
192 char *p = strchr(value, ':');
194 if (p && !allowMultiple && web->output.headers) {
196 for (i=0;web->output.headers[i];i++) {
197 if (strncmp(web->output.headers[i], value, (p+1)-value) == 0) {
198 web->output.headers[i] = talloc_strdup(web, value);
204 web->output.headers = str_list_add(web->output.headers, value);
205 talloc_steal(web, web->output.headers);
209 set a http response code
211 static void http_setResponseCode(EspHandle handle, int code)
213 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
214 web->output.response_code = code;
218 redirect to another web page
220 static void http_redirect(EspHandle handle, int code, char *url)
222 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
223 const char *host = web->input.host;
225 /* form the full url, unless it already looks like a url */
226 if (strchr(url, ':') == NULL) {
228 struct socket_address *socket_address = socket_get_my_addr(web->conn->socket, web);
229 if (socket_address == NULL) goto internal_error;
230 host = talloc_asprintf(web, "%s:%u",
231 socket_address->addr, socket_address->port);
233 if (host == NULL) goto internal_error;
235 char *p = strrchr(web->input.url, '/');
236 if (p == web->input.url) {
237 url = talloc_asprintf(web, "http%s://%s/%s",
238 tls_enabled(web->tls)?"s":"",
241 int dirlen = p - web->input.url;
242 url = talloc_asprintf(web, "http%s://%s%*.*s/%s",
243 tls_enabled(web->tls)?"s":"",
245 dirlen, dirlen, web->input.url,
248 if (url == NULL) goto internal_error;
252 http_setHeader(handle, talloc_asprintf(web, "Location: %s", url), 0);
254 /* make sure we give a valid redirect code */
255 if (code >= 300 && code < 400) {
256 http_setResponseCode(handle, code);
258 http_setResponseCode(handle, 302);
263 http_error(web, 500, "Internal server error");
270 static void http_setCookie(EspHandle handle, const char *name, const char *value,
271 int lifetime, const char *path, bool secure)
273 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
277 buf = talloc_asprintf(web, "Set-Cookie: %s=%s; path=%s; Expires=%s; %s",
278 name, value, path?path:"/",
279 http_timestring(web, time(NULL)+lifetime),
282 buf = talloc_asprintf(web, "Set-Cookie: %s=%s; path=%s; %s",
283 name, value, path?path:"/",
286 http_setHeader(handle, "Cache-control: no-cache=\"set-cookie\"", 0);
287 http_setHeader(handle, buf, 0);
292 return the session id
294 static const char *http_getSessionId(EspHandle handle)
296 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
297 return web->session->id;
303 static void http_createSession(EspHandle handle, int timeout)
305 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
307 web->session->lifetime = timeout;
308 http_setCookie(web, SWAT_SESSION_KEY, web->session->id,
309 web->session->lifetime, "/", 0);
316 static void http_destroySession(EspHandle handle)
318 struct websrv_context *web = talloc_get_type(handle, struct websrv_context);
319 talloc_free(web->session);
325 setup for a raw http level error
327 void http_error(struct websrv_context *web, int code, const char *info)
330 s = talloc_asprintf(web,"<HTML><HEAD><TITLE>Error %u</TITLE></HEAD><BODY><H1>Error %u</H1><pre>%s</pre><p></BODY></HTML>\r\n\r\n",
333 stream_terminate_connection(web->conn, "http_error: out of memory");
336 http_writeBlock(web, s, strlen(s));
337 http_setResponseCode(web, code);
338 http_output_headers(web);
339 EVENT_FD_NOT_READABLE(web->conn->event.fde);
340 EVENT_FD_WRITEABLE(web->conn->event.fde);
341 web->output.output_pending = True;
345 map a unix error code to a http error
347 void http_error_unix(struct websrv_context *web, const char *info)
359 info = talloc_asprintf(web, "%s<p>%s<p>\n", info, strerror(errno));
360 http_error(web, code, info);
365 a simple file request
367 static void http_simple_request(struct websrv_context *web)
369 const char *url = web->input.url;
373 path = http_local_path(web, url);
374 if (path == NULL) goto invalid;
377 web->output.fd = open(path, O_RDONLY);
378 if (web->output.fd == -1) {
379 DEBUG(0,("Failed to read file %s - %s\n", path, strerror(errno)));
380 http_error_unix(web, path);
384 if (fstat(web->output.fd, &st) != 0 || !S_ISREG(st.st_mode)) {
385 close(web->output.fd);
392 http_error(web, 400, "Malformed URL");
396 setup the standard ESP arrays
398 static void http_setup_arrays(struct esp_state *esp)
400 struct websrv_context *web = esp->web;
401 struct esp_data *edata = talloc_get_type(web->task->private, struct esp_data);
402 struct EspRequest *req = esp->req;
403 struct socket_address *socket_address = socket_get_my_addr(web->conn->socket, esp);
404 struct socket_address *peer_address = socket_get_peer_addr(web->conn->socket, esp);
407 #define SETVAR(type, name, value) do { \
408 const char *v = value; \
409 if (v) espSetStringVar(req, type, name, v); \
412 SETVAR(ESP_REQUEST_OBJ, "CONTENT_LENGTH",
413 talloc_asprintf(esp, "%u", web->input.content_length));
414 SETVAR(ESP_REQUEST_OBJ, "QUERY_STRING", web->input.query_string);
415 SETVAR(ESP_REQUEST_OBJ, "REQUEST_METHOD", web->input.post_request?"POST":"GET");
416 SETVAR(ESP_REQUEST_OBJ, "REQUEST_URI", web->input.url);
417 p = strrchr(web->input.url, '/');
418 SETVAR(ESP_REQUEST_OBJ, "SCRIPT_NAME", p+1);
419 SETVAR(ESP_REQUEST_OBJ, "SCRIPT_FILENAME", web->input.url);
421 struct MprVar mpv = mprObject("socket_address");
422 mprSetPtrChild(&mpv, "socket_address", peer_address);
423 espSetVar(req, ESP_REQUEST_OBJ, "REMOTE_SOCKET_ADDRESS", mpv);
425 SETVAR(ESP_REQUEST_OBJ, "REMOTE_ADDR", peer_address->addr);
427 p = socket_get_peer_name(web->conn->socket, esp);
428 SETVAR(ESP_REQUEST_OBJ, "REMOTE_HOST", p);
429 SETVAR(ESP_REQUEST_OBJ, "REMOTE_USER", "");
430 SETVAR(ESP_REQUEST_OBJ, "CONTENT_TYPE", web->input.content_type);
432 SETVAR(ESP_REQUEST_OBJ, "SESSION_ID", web->session->id);
434 SETVAR(ESP_REQUEST_OBJ, "COOKIE_SUPPORT", web->input.cookie?"True":"False");
436 SETVAR(ESP_HEADERS_OBJ, "HTT_REFERER", web->input.referer);
437 SETVAR(ESP_HEADERS_OBJ, "HOST", web->input.host);
438 SETVAR(ESP_HEADERS_OBJ, "ACCEPT_ENCODING", web->input.accept_encoding);
439 SETVAR(ESP_HEADERS_OBJ, "ACCEPT_LANGUAGE", web->input.accept_language);
440 SETVAR(ESP_HEADERS_OBJ, "ACCEPT_CHARSET", web->input.accept_charset);
441 SETVAR(ESP_HEADERS_OBJ, "COOKIE", web->input.cookie);
442 SETVAR(ESP_HEADERS_OBJ, "USER_AGENT", web->input.user_agent);
444 if (socket_address) {
445 SETVAR(ESP_SERVER_OBJ, "SERVER_ADDR", socket_address->addr);
446 SETVAR(ESP_SERVER_OBJ, "SERVER_NAME", socket_address->addr);
447 SETVAR(ESP_SERVER_OBJ, "SERVER_HOST", socket_address->addr);
448 SETVAR(ESP_SERVER_OBJ, "SERVER_PORT",
449 talloc_asprintf(esp, "%u", socket_address->port));
452 SETVAR(ESP_SERVER_OBJ, "DOCUMENT_ROOT", lp_swat_directory());
453 SETVAR(ESP_SERVER_OBJ, "SERVER_PROTOCOL", tls_enabled(web->tls)?"https":"http");
454 SETVAR(ESP_SERVER_OBJ, "SERVER_SOFTWARE", "SWAT");
455 SETVAR(ESP_SERVER_OBJ, "GATEWAY_INTERFACE", "CGI/1.1");
456 SETVAR(ESP_SERVER_OBJ, "TLS_SUPPORT", tls_support(edata->tls_params)?"True":"False");
460 /* the esp scripting lirary generates exceptions when
461 it hits a major error. We need to catch these and
462 report a internal server error via http
465 static jmp_buf ejs_exception_buf;
466 static const char *exception_reason;
468 void ejs_exception(const char *reason)
472 ejsSetErrorMsg(0, "%s", reason);
473 exception_reason = ep->error;
475 exception_reason = reason;
477 DEBUG(0,("%s", exception_reason));
478 longjmp(ejs_exception_buf, -1);
481 void ejs_exception(const char *reason)
483 DEBUG(0,("%s", reason));
489 process a esp request
491 static void esp_request(struct esp_state *esp, const char *url)
493 struct websrv_context *web = esp->web;
496 char *emsg = NULL, *buf;
498 if (http_readFile(web, &buf, &size, url) != 0) {
499 http_error_unix(web, url);
504 if (setjmp(ejs_exception_buf) != 0) {
505 http_error(web, 500, exception_reason);
510 res = espProcessRequest(esp->req, url, buf, &emsg);
511 if (res != 0 && emsg) {
512 http_writeBlock(web, "<pre>", 5);
513 http_writeBlock(web, emsg, strlen(emsg));
514 http_writeBlock(web, "</pre>", 6);
521 perform pre-authentication on every page is /scripting/preauth.esp
522 exists. If this script generates any non-whitepace output at all,
523 then we don't run the requested URL.
525 note that the preauth is run even for static pages such as images.
527 static BOOL http_preauth(struct esp_state *esp)
529 const char *path = http_local_path(esp->web, HTTP_PREAUTH_URI);
532 http_error(esp->web, 500, "Internal server error");
535 if (!file_exist(path)) {
536 /* if the preath script is not installed then allow access */
539 esp_request(esp, HTTP_PREAUTH_URI);
540 for (i=0;i<esp->web->output.content.length;i++) {
541 if (!isspace(esp->web->output.content.data[i])) {
542 /* if the preauth has generated content, then force it to be
543 html, so that we can show the login page for failed
545 http_setHeader(esp->web, "Content-Type: text/html", 0);
549 data_blob_free(&esp->web->output.content);
555 handling of + and % escapes in http variables
557 static const char *http_unescape(TALLOC_CTX *mem_ctx, const char *p)
559 char *s0 = talloc_strdup(mem_ctx, p);
561 if (s == NULL) return NULL;
565 if (*s == '+') *s = ' ';
566 if (*s == '%' && sscanf(s+1, "%02x", &v) == 1) {
568 memmove(s+1, s+3, strlen(s+3)+1);
577 set a form or GET variable
579 static void esp_putvar(struct esp_state *esp, const char *var, const char *value)
581 if (strcasecmp(var, SWAT_SESSION_KEY) == 0) {
582 /* special case support for browsers without cookie
584 esp->web->input.session_key = talloc_strdup(esp, value);
586 mprSetPropertyValue(&esp->variables[ESP_FORM_OBJ],
587 http_unescape(esp, var),
588 mprCreateStringVar(http_unescape(esp, value), 0));
594 parse the variables in a POST style request
596 static NTSTATUS http_parse_post(struct esp_state *esp)
598 DATA_BLOB b = esp->web->input.partial;
604 p = memchr(b.data, '&', b.length);
608 len = p - (char *)b.data;
610 line = talloc_strndup(esp, (char *)b.data, len);
611 NT_STATUS_HAVE_NO_MEMORY(line);
613 p = strchr(line,'=');
616 esp_putvar(esp, line, p+1);
631 parse the variables in a GET style request
633 static NTSTATUS http_parse_get(struct esp_state *esp)
635 struct websrv_context *web = esp->web;
639 p = strchr(web->input.url, '?');
640 web->input.query_string = p+1;
643 s = talloc_strdup(esp, esp->web->input.query_string);
644 NT_STATUS_HAVE_NO_MEMORY(s);
646 for (tok=strtok_r(s,"&;", &pp);tok;tok=strtok_r(NULL,"&;", &pp)) {
650 esp_putvar(esp, tok, p+1);
657 called when a session times out
659 static void session_timeout(struct event_context *ev, struct timed_event *te,
660 struct timeval t, void *private)
662 struct session_data *s = talloc_get_type(private, struct session_data);
669 static int session_destructor(void *ptr)
671 struct session_data *s = talloc_get_type(ptr, struct session_data);
672 DLIST_REMOVE(s->edata->sessions, s);
677 setup the session for this request
679 static void http_setup_session(struct esp_state *esp)
681 const char *session_key = SWAT_SESSION_KEY;
683 const char *cookie = esp->web->input.cookie;
684 const char *key = NULL;
685 struct esp_data *edata = talloc_get_type(esp->web->task->private, struct esp_data);
686 struct session_data *s;
687 BOOL generated_key = False;
689 /* look for our session key */
690 if (cookie && (p = strstr(cookie, session_key)) &&
691 p[strlen(session_key)] == '=') {
692 p += strlen(session_key)+1;
693 key = talloc_strndup(esp, p, strcspn(p, ";"));
696 if (key == NULL && esp->web->input.session_key) {
697 key = esp->web->input.session_key;
698 } else if (key == NULL) {
699 key = generate_random_str_list(esp, 16, "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ");
700 generated_key = True;
703 /* try to find this session in the existing session list */
704 for (s=edata->sessions;s;s=s->next) {
705 if (strcmp(key, s->id) == 0) {
711 /* create a new session */
712 s = talloc_zero(edata, struct session_data);
713 s->id = talloc_steal(s, key);
717 s->lifetime = lp_parm_int(-1, "web", "sessiontimeout", 900);
718 DLIST_ADD(edata->sessions, s);
719 talloc_set_destructor(s, session_destructor);
720 if (!generated_key) {
721 mprSetPropertyValue(&esp->variables[ESP_REQUEST_OBJ],
722 "SESSION_EXPIRED", mprCreateStringVar("True", 0));
726 http_setCookie(esp->web, session_key, key, s->lifetime, "/", 0);
729 mprCopyVar(&esp->variables[ESP_SESSION_OBJ], s->data, MPR_DEEP_COPY);
732 esp->web->session = s;
736 /* callbacks for esp processing */
737 static const struct Esp esp_control = {
738 .maxScriptSize = 60000,
739 .writeBlock = http_writeBlock,
740 .setHeader = http_setHeader,
741 .redirect = http_redirect,
742 .setResponseCode = http_setResponseCode,
743 .readFile = http_readFile,
744 .mapToStorage = http_mapToStorage,
745 .setCookie = http_setCookie,
746 .createSession = http_createSession,
747 .destroySession = http_destroySession,
748 .getSessionId = http_getSessionId
752 process a complete http request
754 void http_process_input(struct websrv_context *web)
757 struct esp_state *esp;
758 struct esp_data *edata = talloc_get_type(web->task->private, struct esp_data);
760 void *save_mpr_ctx = mprMemCtx();
761 void *ejs_save = ejs_save_state();
763 const char *file_type = NULL;
764 BOOL esp_enable = False;
766 const char *extension;
767 const char *mime_type;
770 {"gif", "image/gif"},
771 {"png", "image/png"},
772 {"jpg", "image/jpeg"},
773 {"txt", "text/plain"},
774 {"ico", "image/x-icon"},
776 {"esp", "text/html", True}
779 esp = talloc_zero(web, struct esp_state);
780 if (esp == NULL) goto internal_error;
786 if (espOpen(&esp_control) != 0) goto internal_error;
788 for (i=0;i<ARRAY_SIZE(esp->variables);i++) {
789 esp->variables[i] = mprCreateUndefinedVar();
791 esp->variables[ESP_HEADERS_OBJ] = mprCreateObjVar("headers", ESP_HASH_SIZE);
792 esp->variables[ESP_FORM_OBJ] = mprCreateObjVar("form", ESP_HASH_SIZE);
793 esp->variables[ESP_APPLICATION_OBJ] = mprCreateObjVar("application", ESP_HASH_SIZE);
794 esp->variables[ESP_COOKIES_OBJ] = mprCreateObjVar("cookies", ESP_HASH_SIZE);
795 esp->variables[ESP_FILES_OBJ] = mprCreateObjVar("files", ESP_HASH_SIZE);
796 esp->variables[ESP_REQUEST_OBJ] = mprCreateObjVar("request", ESP_HASH_SIZE);
797 esp->variables[ESP_SERVER_OBJ] = mprCreateObjVar("server", ESP_HASH_SIZE);
798 esp->variables[ESP_SESSION_OBJ] = mprCreateObjVar("session", ESP_HASH_SIZE);
800 if (edata->application_data) {
801 mprCopyVar(&esp->variables[ESP_APPLICATION_OBJ],
802 edata->application_data, MPR_DEEP_COPY);
805 smb_setup_ejs_functions();
807 if (web->input.url == NULL) {
808 http_error(web, 400, "You must specify a GET or POST request");
809 mprSetCtx(save_mpr_ctx);
810 ejs_restore_state(ejs_save);
814 /* parse any form or get variables */
815 if (web->input.post_request) {
816 status = http_parse_post(esp);
817 if (!NT_STATUS_IS_OK(status)) {
818 http_error(web, 400, "Malformed POST data");
819 mprSetCtx(save_mpr_ctx);
820 ejs_restore_state(ejs_save);
824 if (strchr(web->input.url, '?')) {
825 status = http_parse_get(esp);
826 if (!NT_STATUS_IS_OK(status)) {
827 http_error(web, 400, "Malformed GET data");
828 mprSetCtx(save_mpr_ctx);
829 ejs_restore_state(ejs_save);
834 http_setup_session(esp);
836 esp->req = espCreateRequest(web, web->input.url, esp->variables);
837 if (esp->req == NULL) goto internal_error;
839 /* work out the mime type */
840 p = strrchr(web->input.url, '.');
844 for (i=0;p && i<ARRAY_SIZE(mime_types);i++) {
845 if (strcmp(mime_types[i].extension, p+1) == 0) {
846 file_type = mime_types[i].mime_type;
847 esp_enable = mime_types[i].esp_enable;
850 if (file_type == NULL) {
851 file_type = "text/html";
854 /* setup basic headers */
855 http_setResponseCode(web, 200);
856 http_setHeader(web, talloc_asprintf(esp, "Date: %s",
857 http_timestring(esp, time(NULL))), 0);
858 http_setHeader(web, "Server: Samba", 0);
859 http_setHeader(web, "Connection: close", 0);
860 http_setHeader(web, talloc_asprintf(esp, "Content-Type: %s", file_type), 0);
862 http_setup_arrays(esp);
864 /* possibly do pre-authentication */
865 if (http_preauth(esp)) {
867 esp_request(esp, web->input.url);
869 http_simple_request(web);
873 if (web->conn == NULL) {
874 /* the connection has been terminated above us, probably
879 if (!web->output.output_pending) {
880 http_output_headers(web);
881 EVENT_FD_WRITEABLE(web->conn->event.fde);
882 web->output.output_pending = True;
885 /* copy any application data to long term storage in edata */
886 talloc_free(edata->application_data);
887 edata->application_data = talloc_zero(edata, struct MprVar);
888 mprSetCtx(edata->application_data);
889 mprCopyVar(edata->application_data, &esp->variables[ESP_APPLICATION_OBJ],
893 /* copy any session data */
895 talloc_free(web->session->data);
896 web->session->data = talloc_zero(web->session, struct MprVar);
897 if (esp->variables[ESP_SESSION_OBJ].properties == NULL ||
898 esp->variables[ESP_SESSION_OBJ].properties[0].numItems == 0) {
899 talloc_free(web->session);
902 mprSetCtx(web->session->data);
903 mprCopyVar(web->session->data, &esp->variables[ESP_SESSION_OBJ],
905 /* setup the timeout for the session data */
907 talloc_free(web->session->te);
908 web->session->te = event_add_timed(web->conn->event.ctx, web->session,
909 timeval_current_ofs(web->session->lifetime, 0),
910 session_timeout, web->session);
915 mprSetCtx(save_mpr_ctx);
916 ejs_restore_state(ejs_save);
922 if (web->conn != NULL) {
923 http_error(web, 500, "Internal server error");
925 mprSetCtx(save_mpr_ctx);
926 ejs_restore_state(ejs_save);
931 parse one line of header input
933 NTSTATUS http_parse_header(struct websrv_context *web, const char *line)
936 web->input.end_of_headers = True;
937 } else if (strncasecmp(line,"GET ", 4)==0) {
938 web->input.url = talloc_strndup(web, &line[4], strcspn(&line[4], " \t"));
939 } else if (strncasecmp(line,"POST ", 5)==0) {
940 web->input.post_request = True;
941 web->input.url = talloc_strndup(web, &line[5], strcspn(&line[5], " \t"));
942 } else if (strchr(line, ':') == NULL) {
943 http_error(web, 400, "This server only accepts GET and POST requests");
944 return NT_STATUS_INVALID_PARAMETER;
945 } else if (strncasecmp(line,"Content-Length: ", 16)==0) {
946 web->input.content_length = strtoul(&line[16], NULL, 10);
948 #define PULL_HEADER(v, s) do { \
949 if (strncmp(line, s, strlen(s)) == 0) { \
950 web->input.v = talloc_strdup(web, &line[strlen(s)]); \
951 return NT_STATUS_OK; \
954 PULL_HEADER(content_type, "Content-Type: ");
955 PULL_HEADER(user_agent, "User-Agent: ");
956 PULL_HEADER(referer, "Referer: ");
957 PULL_HEADER(host, "Host: ");
958 PULL_HEADER(accept_encoding, "Accept-Encoding: ");
959 PULL_HEADER(accept_language, "Accept-Language: ");
960 PULL_HEADER(accept_charset, "Accept-Charset: ");
961 PULL_HEADER(cookie, "Cookie: ");
964 /* ignore all other headers for now */
970 setup the esp processor - called at task initialisation
972 NTSTATUS http_setup_esp(struct task_server *task)
974 struct esp_data *edata;
976 edata = talloc_zero(task, struct esp_data);
977 NT_STATUS_HAVE_NO_MEMORY(edata);
979 task->private = edata;
981 edata->tls_params = tls_initialise(edata);
982 NT_STATUS_HAVE_NO_MEMORY(edata->tls_params);