diff options
author | Denis Vlasenko | 2007-01-07 21:25:12 +0000 |
---|---|---|
committer | Denis Vlasenko | 2007-01-07 21:25:12 +0000 |
commit | 6998142998a0986f82c81b3bdca64566bc4844b1 (patch) | |
tree | 34cbf373fb8c35eeed41bfc7eb5bdbfb04a50aa2 | |
parent | db6a5c3f9e9ea4a40004aed038e99d5d5ed699b4 (diff) | |
download | busybox-6998142998a0986f82c81b3bdca64566bc4844b1.zip busybox-6998142998a0986f82c81b3bdca64566bc4844b1.tar.gz |
httpd: stop adding our own "Content-type:" to CGI output
-rw-r--r-- | networking/httpd.c | 137 |
1 files changed, 76 insertions, 61 deletions
diff --git a/networking/httpd.c b/networking/httpd.c index bf3da36..da33146 100644 --- a/networking/httpd.c +++ b/networking/httpd.c @@ -93,6 +93,11 @@ #include "busybox.h" +/* amount of buffering in a pipe */ +#ifndef PIPE_BUF +# define PIPE_BUF 4096 +#endif + static const char httpdVersion[] = "busybox httpd/1.35 6-Oct-2004"; static const char default_path_httpd_conf[] = "/etc"; static const char httpd_conf[] = "httpd.conf"; @@ -106,10 +111,7 @@ static const char home[] = "./"; // is checked rigorously //#define DEBUG 1 - -#ifndef DEBUG -# define DEBUG 0 -#endif +#define DEBUG 0 #define MAX_MEMORY_BUFF 8192 /* IO buffer */ @@ -885,8 +887,8 @@ static int sendHeaders(HttpResponseNum responseNum) /* emit the current date */ strftime(timeStr, sizeof(timeStr), RFC1123FMT, gmtime(&timer)); len = sprintf(buf, - "HTTP/1.0 %d %s\r\nContent-type: %s\r\n" - "Date: %s\r\nConnection: close\r\n", + "HTTP/1.0 %d %s\r\nContent-type: %s\r\n" + "Date: %s\r\nConnection: close\r\n", responseNum, responseString, mime_type, timeStr); #if ENABLE_FEATURE_HTTPD_BASIC_AUTH @@ -986,7 +988,7 @@ static int sendCgi(const char *url, int outFd; int firstLine = 1; int status; - size_t post_readed_size, post_readed_idx; + size_t post_read_size, post_read_idx; if (pipe(fromCgi) != 0) return 0; @@ -1000,7 +1002,7 @@ static int sendCgi(const char *url, if (!pid) { /* child process */ char *script; - char *purl = strdup(url); + char *purl = xstrdup(url); char realpath_buff[MAXPATHLEN]; if (purl == NULL) @@ -1129,8 +1131,8 @@ static int sendCgi(const char *url, /* parent process */ - post_readed_size = 0; - post_readed_idx = 0; + post_read_size = 0; + post_read_idx = 0; /* for gcc */ inFd = fromCgi[0]; outFd = toCgi[1]; close(fromCgi[1]); @@ -1147,95 +1149,108 @@ static int sendCgi(const char *url, FD_ZERO(&readSet); FD_ZERO(&writeSet); FD_SET(inFd, &readSet); - if (bodyLen > 0 || post_readed_size > 0) { + if (bodyLen > 0 || post_read_size > 0) { FD_SET(outFd, &writeSet); nfound = outFd > inFd ? outFd : inFd; - if (post_readed_size == 0) { + if (post_read_size == 0) { FD_SET(config->accepted_socket, &readSet); if (nfound < config->accepted_socket) nfound = config->accepted_socket; } /* Now wait on the set of sockets! */ - nfound = select(nfound + 1, &readSet, &writeSet, 0, NULL); + nfound = select(nfound + 1, &readSet, &writeSet, NULL, NULL); } else { if (!bodyLen) { - close(outFd); + close(outFd); /* no more POST data to CGI */ bodyLen = -1; } - nfound = select(inFd + 1, &readSet, 0, 0, NULL); + nfound = select(inFd + 1, &readSet, NULL, NULL, NULL); } if (nfound <= 0) { - if (waitpid(pid, &status, WNOHANG) > 0) { - close(inFd); - if (DEBUG && WIFEXITED(status)) - bb_error_msg("piped has exited with status=%d", WEXITSTATUS(status)); - if (DEBUG && WIFSIGNALED(status)) - bb_error_msg("piped has exited with signal=%d", WTERMSIG(status)); - break; - } - } else if (post_readed_size > 0 && FD_ISSET(outFd, &writeSet)) { - count = full_write(outFd, wbuf + post_readed_idx, post_readed_size); + if (waitpid(pid, &status, WNOHANG) <= 0) + /* Weird. CGI didn't exit and no fd's + * are ready, yet select returned?! */ + continue; + close(inFd); + if (DEBUG && WIFEXITED(status)) + bb_error_msg("piped has exited with status=%d", WEXITSTATUS(status)); + if (DEBUG && WIFSIGNALED(status)) + bb_error_msg("piped has exited with signal=%d", WTERMSIG(status)); + break; + } + + if (post_read_size > 0 && FD_ISSET(outFd, &writeSet)) { + /* Have data from peer and can write to CGI */ + // huh? why full_write? what if we will block? + // (imagine that CGI does not read its stdin...) + count = full_write(outFd, wbuf + post_read_idx, post_read_size); if (count > 0) { - post_readed_size -= count; - post_readed_idx += count; - if (post_readed_size == 0) - post_readed_idx = 0; + post_read_idx += count; + post_read_size -= count; } else { - post_readed_size = post_readed_idx = bodyLen = 0; /* broken pipe to CGI */ + post_read_size = bodyLen = 0; /* broken pipe to CGI */ } - } else if (bodyLen > 0 && post_readed_size == 0 && FD_ISSET(config->accepted_socket, &readSet)) { + } else if (bodyLen > 0 && post_read_size == 0 + && FD_ISSET(config->accepted_socket, &readSet) + ) { + /* We expect data, prev data portion is eaten by CGI + * and there *is* data to read from the peer + * (POST data?) */ count = bodyLen > (int)sizeof(wbuf) ? (int)sizeof(wbuf) : bodyLen; count = safe_read(config->accepted_socket, wbuf, count); if (count > 0) { - post_readed_size += count; + post_read_size = count; + post_read_idx = 0; bodyLen -= count; } else { bodyLen = 0; /* closed */ } } + if (FD_ISSET(inFd, &readSet)) { + /* There is something to read from CGI */ int s = config->accepted_socket; char *rbuf = config->buf; - -#ifndef PIPE_BUF -# define PIPESIZE 4096 /* amount of buffering in a pipe */ -#else -# define PIPESIZE PIPE_BUF -#endif +#define PIPESIZE PIPE_BUF #if PIPESIZE >= MAX_MEMORY_BUFF # error "PIPESIZE >= MAX_MEMORY_BUFF" #endif - - /* There is something to read */ /* NB: was safe_read. If it *has to be* safe_read, */ /* please explain why in this comment... */ count = full_read(inFd, rbuf, PIPESIZE); if (count == 0) break; /* closed */ - if (count > 0) { - if (firstLine) { - /* full_read (above) avoids - * "chopped up into small chunks" syndrome here */ - rbuf[count] = 0; - /* check to see if the user script added headers */ - if (strncmp(rbuf, "HTTP/1.0 200 OK\r\n", 4) != 0) { - /* there is no "HTTP", do it ourself */ - full_write(s, "HTTP/1.0 200 OK\r\n", 17); - } /* hmm, maybe 'else if'? */ - if (!strstr(rbuf, "ontent-")) { - full_write(s, "Content-type: text/plain\r\n\r\n", 28); - } - firstLine = 0; + if (count < 0) + continue; /* huh, error, why continue?? */ + + if (firstLine) { + /* full_read (above) avoids + * "chopped up into small chunks" syndrome here */ + rbuf[count] = '\0'; + /* check to see if the user script added headers */ +#define HTTP_200 "HTTP/1.0 200 OK\r\n\r\n" + if (memcmp(rbuf, HTTP_200, 4) != 0) { + /* there is no "HTTP", do it ourself */ + full_write(s, HTTP_200, sizeof(HTTP_200)-1); } - if (full_write(s, rbuf, count) != count) - break; - - if (DEBUG) - fprintf(stderr, "cgi read %d bytes: '%.*s'\n", count, count, rbuf); +#undef HTTP_200 + /* Example of valid GCI without "Content-type:" + * echo -en "HTTP/1.0 302 Found\r\n" + * echo -en "Location: http://www.busybox.net\r\n" + * echo -en "\r\n" + */ + //if (!strstr(rbuf, "ontent-")) { + // full_write(s, "Content-type: text/plain\r\n\r\n", 28); + //} + firstLine = 0; } - } - } + if (full_write(s, rbuf, count) != count) + break; + if (DEBUG) + fprintf(stderr, "cgi read %d bytes: '%.*s'\n", count, count, rbuf); + } /* if (FD_ISSET(inFd)) */ + } /* while (1) */ return 0; } #endif /* FEATURE_HTTPD_CGI */ |