/* */ #include "HttpServerCommand.h" #include "SocketCore.h" #include "DownloadEngine.h" #include "HttpServer.h" #include "HttpHeader.h" #include "Logger.h" #include "LogFactory.h" #include "RequestGroup.h" #include "RequestGroupMan.h" #include "HttpServerBodyCommand.h" #include "HttpServerResponseCommand.h" #include "RecoverableException.h" #include "prefs.h" #include "Option.h" #include "util.h" #include "wallclock.h" #include "fmt.h" #include "SocketRecvBuffer.h" #include "base64.h" #ifdef ENABLE_MESSAGE_DIGEST # include "MessageDigest.h" # include "message_digest_helper.h" #endif // ENABLE_MESSAGE_DIGEST #ifdef ENABLE_WEBSOCKET # include "WebSocketResponseCommand.h" #endif // ENABLE_WEBSOCKET namespace aria2 { HttpServerCommand::HttpServerCommand (cuid_t cuid, DownloadEngine* e, const SharedHandle& socket, bool secure) : Command(cuid), e_(e), socket_(socket), httpServer_(new HttpServer(socket, e)), writeCheck_(false) { setStatus(Command::STATUS_ONESHOT_REALTIME); e_->addSocketForReadCheck(socket_, this); httpServer_->setSecure(secure); httpServer_->setUsernamePassword(e_->getOption()->get(PREF_RPC_USER), e_->getOption()->get(PREF_RPC_PASSWD)); if(e_->getOption()->getAsBool(PREF_RPC_ALLOW_ORIGIN_ALL)) { httpServer_->setAllowOrigin("*"); } #ifdef HAVE_ZLIB httpServer_->enableGZip(); #else // !HAVE_ZLIB httpServer_->disableGZip(); #endif // !HAVE_ZLIB checkSocketRecvBuffer(); } HttpServerCommand::HttpServerCommand (cuid_t cuid, const SharedHandle& httpServer, DownloadEngine* e, const SharedHandle& socket) : Command(cuid), e_(e), socket_(socket), httpServer_(httpServer), writeCheck_(false) { e_->addSocketForReadCheck(socket_, this); checkSocketRecvBuffer(); } HttpServerCommand::~HttpServerCommand() { e_->deleteSocketForReadCheck(socket_, this); if(writeCheck_) { e_->deleteSocketForWriteCheck(socket_, this); } } void HttpServerCommand::checkSocketRecvBuffer() { if(!httpServer_->getSocketRecvBuffer()->bufferEmpty()) { setStatus(Command::STATUS_ONESHOT_REALTIME); e_->setNoWait(true); } } #ifdef ENABLE_WEBSOCKET namespace { // Creates server's WebSocket accept key which will be sent in // Sec-WebSocket-Accept header field. The |clientKey| is the value // found in Sec-WebSocket-Key header field in the request. std::string createWebSocketServerKey(const std::string& clientKey) { std::string src = clientKey; src += "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; unsigned char digest[20]; message_digest::digest(digest, sizeof(digest), MessageDigest::sha1(), src.c_str(), src.size()); return base64::encode(&digest[0], &digest[sizeof(digest)]); } } // namespace namespace { int websocketHandshake(const SharedHandle& header) { if(header->getMethod() != "GET" || header->find(HttpHeader::SEC_WEBSOCKET_KEY).empty()) { return 400; } else if(header->find(HttpHeader::SEC_WEBSOCKET_VERSION) != "13") { return 426; } else if(header->getRequestPath() != "/jsonrpc") { return 404; } else { return 101; } } } // namespace #endif // ENABLE_WEBSOCKET void HttpServerCommand::updateWriteCheck() { if(httpServer_->wantWrite()) { if(!writeCheck_) { writeCheck_ = true; e_->addSocketForWriteCheck(socket_, this); } } else if(writeCheck_) { writeCheck_ = false; e_->deleteSocketForWriteCheck(socket_, this); } } bool HttpServerCommand::execute() { if(e_->getRequestGroupMan()->downloadFinished() || e_->isHaltRequested()) { return true; } try { if(socket_->isReadable(0) || (writeCheck_ && socket_->isWritable(0)) || !httpServer_->getSocketRecvBuffer()->bufferEmpty()) { timeoutTimer_ = global::wallclock(); if(httpServer_->getSecure()) { // tlsAccept() just returns true if handshake has already // finished. if(!socket_->tlsAccept()) { updateWriteCheck(); e_->addCommand(this); return false; } } SharedHandle header; header = httpServer_->receiveRequest(); if(!header) { updateWriteCheck(); e_->addCommand(this); return false; } // CORS preflight request uses OPTIONS method. It is not // restricted by authentication. if(!httpServer_->authenticate() && httpServer_->getMethod() != "OPTIONS") { httpServer_->disableKeepAlive(); httpServer_->feedResponse (401, "WWW-Authenticate: Basic realm=\"aria2\"\r\n"); Command* command = new HttpServerResponseCommand(getCuid(), httpServer_, e_, socket_); e_->addCommand(command); e_->setNoWait(true); return true; } if(header->fieldContains(HttpHeader::UPGRADE, "websocket") && header->fieldContains(HttpHeader::CONNECTION, "upgrade")) { #ifdef ENABLE_WEBSOCKET int status = websocketHandshake(header); Command* command; if(status == 101) { std::string serverKey = createWebSocketServerKey (header->find(HttpHeader::SEC_WEBSOCKET_KEY)); httpServer_->feedUpgradeResponse("websocket", fmt("Sec-WebSocket-Accept: %s\r\n", serverKey.c_str())); command = new rpc::WebSocketResponseCommand(getCuid(), httpServer_, e_, socket_); } else { if(status == 426) { httpServer_->feedResponse(426, "Sec-WebSocket-Version: 13\r\n"); } else { httpServer_->feedResponse(status); } command = new HttpServerResponseCommand(getCuid(), httpServer_, e_, socket_); } e_->addCommand(command); e_->setNoWait(true); return true; #else // !ENABLE_WEBSOCKET httpServer_->feedResponse(400); Command* command = new HttpServerResponseCommand(getCuid(), httpServer_, e_, socket_); e_->addCommand(command); e_->setNoWait(true); return true; #endif // !ENABLE_WEBSOCKET } else { if(e_->getOption()->getAsInt(PREF_RPC_MAX_REQUEST_SIZE) < httpServer_->getContentLength()) { A2_LOG_INFO (fmt("Request too long. ContentLength=%" PRId64 "." " See --rpc-max-request-size option to loose" " this limitation.", httpServer_->getContentLength())); return true; } Command* command = new HttpServerBodyCommand(getCuid(), httpServer_, e_, socket_); e_->addCommand(command); e_->setNoWait(true); return true; } } else { if(timeoutTimer_.difference(global::wallclock()) >= 30) { A2_LOG_INFO("HTTP request timeout."); return true; } else { e_->addCommand(this); return false; } } } catch(RecoverableException& e) { A2_LOG_INFO_EX(fmt("CUID#%" PRId64 " - Error occurred while reading HTTP request", getCuid()), e); return true; } } } // namespace aria2