summaryrefslogtreecommitdiffhomepage
path: root/libs/http/luasrc/http/protocol.lua
blob: a9a6d8dc80867c0927411b87ba9d62090fa5c2d9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
--[[

HTTP protocol implementation for LuCI
(c) 2008 Freifunk Leipzig / Jo-Philipp Wich <xm@leipzig.freifunk.net>

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

        http://www.apache.org/licenses/LICENSE-2.0

$Id$

]]--

module("luci.http.protocol", package.seeall)

local ltn12 = require("luci.ltn12")

HTTP_MAX_CONTENT      = 1024*4		-- 4 kB maximum content size
HTTP_URLENC_MAXKEYLEN = 1024		-- maximum allowd size of urlencoded parameter names


-- Decode an urlencoded string.
-- Returns the decoded value.
function urldecode( str, no_plus )

	local function __chrdec( hex )
		return string.char( tonumber( hex, 16 ) )
	end

	if type(str) == "string" then
		if not no_plus then
			str = str:gsub( "+", " " )
		end

		str = str:gsub( "%%([a-fA-F0-9][a-fA-F0-9])", __chrdec )
	end

	return str
end


-- Extract and split urlencoded data pairs, separated bei either "&" or ";" from given url.
-- Returns a table value with urldecoded values.
function urldecode_params( url, tbl )

	local params = tbl or { }

	if url:find("?") then
		url = url:gsub( "^.+%?([^?]+)", "%1" )
	end

	for pair in url:gmatch( "[^&;]+" ) do

		-- find key and value
		local key = urldecode( pair:match("^([^=]+)")     )
		local val = urldecode( pair:match("^[^=]+=(.+)$") )

		-- store
		if type(key) == "string" and key:len() > 0 then
			if type(val) ~= "string" then val = "" end

			if not params[key] then
				params[key] = val
			elseif type(params[key]) ~= "table" then
				params[key] = { params[key], val }
			else
				table.insert( params[key], val )
			end
		end
	end

	return params
end


-- Encode given string in urlencoded format.
-- Returns the encoded string.
function urlencode( str )

	local function __chrenc( chr )
		return string.format(
			"%%%02x", string.byte( chr )
		)
	end

	if type(str) == "string" then
		str = str:gsub(
			"([^a-zA-Z0-9$_%-%.%+!*'(),])",
			__chrenc
		)
	end

	return str
end


-- Encode given table to urlencoded string.
-- Returns the encoded string.
function urlencode_params( tbl )
	local enc = ""

	for k, v in pairs(tbl) do
		enc = enc .. ( enc and "&" or "" ) ..
			urlencode(k) .. "="  ..
			urlencode(v)
	end

	return enc
end


-- Parameter helper
local function __initval( tbl, key )
	local multival = ( key:sub( #key - 1, #key ) == "[]" )

	if multival then
		if type(tbl[key]) == "table" then
			table.insert( tbl[key], "" )
		else
			tbl[key] = { "" }
		end
	else
		tbl[key] = ""
	end

	return multival
end

local function __appendval( tbl, key, multival, chunk )
	if multival then
		tbl[key][#tbl[key]] = tbl[key][#tbl[key]] .. chunk
	else
		tbl[key] = tbl[key] .. chunk
	end
end

local function __finishval( tbl, key, multival, handler )
	if handler then
		if multival then
			tbl[key][#tbl[key]] = handler( tbl[key][#tbl[key]] )
		else
			tbl[key] = handler( tbl[key] )
		end
	end
end


-- Table of our process states
local process_states = { }

-- Extract "magic", the first line of a http message.
-- Extracts the message type ("get", "post" or "response"), the requested uri
-- or the status code if the line descripes a http response.
process_states['magic'] = function( msg, chunk, err )

	if chunk ~= nil then
		-- ignore empty lines before request
		if #chunk == 0 then
			return true, nil
		end

		-- Is it a request?
		local method, uri, http_ver = chunk:match("^([A-Z]+) ([^ ]+) HTTP/([01]%.[019])$")

		-- Yup, it is
		if method then

			msg.type           = "request"
			msg.request_method = method:lower()
			msg.request_uri    = uri
			msg.http_version   = tonumber( http_ver )
			msg.headers        = { }

			-- We're done, next state is header parsing
			return true, function( chunk )
				return process_states['headers']( msg, chunk )
			end

		-- Is it a response?
		else

			local http_ver, code, message = chunk:match("^HTTP/([01]%.[019]) ([0-9]+) ([^\r\n]+)$")

			-- Is a response
			if code then

				msg.type           = "response"
				msg.status_code    = code
				msg.status_message = message
				msg.http_version   = tonumber( http_ver )
				msg.headers        = { }

				-- We're done, next state is header parsing
				return true, function( chunk )
					return process_states['headers']( msg, chunk )
				end
			end
		end
	end

	-- Can't handle it
	return nil, "Invalid HTTP message magic"
end


-- Extract headers from given string.
process_states['headers'] = function( msg, chunk )

	if chunk ~= nil then

		-- Look for a valid header format
		local hdr, val = chunk:match( "^([A-Z][A-Za-z0-9%-_]+): +(.+)$" )

		if type(hdr) == "string" and hdr:len() > 0 and
		   type(val) == "string" and val:len() > 0
		then
			msg.headers[hdr] = val

			-- Valid header line, proceed
			return true, nil

		elseif #chunk == 0 then
			-- Empty line, we won't accept data anymore
			return false, nil
		else
			-- Junk data
			return nil, "Invalid HTTP header received"
		end
	else
		return nil, "Unexpected EOF"
	end
end


-- Find first MIME boundary
process_states['mime-init'] = function( msg, chunk, filecb )

	if chunk ~= nil then
		if #chunk >= #msg.mime_boundary + 2 then
			local boundary = chunk:sub( 1, #msg.mime_boundary + 4 )

			if boundary == "--" .. msg.mime_boundary .. "\r\n" then

				-- Store remaining data in buffer
				msg._mimebuffer = chunk:sub( #msg.mime_boundary + 5, #chunk )

				-- Switch to header processing state
				return true, function( chunk )
					return process_states['mime-headers']( msg, chunk, filecb )
				end
			else
				return nil, "Invalid MIME boundary"
			end
		else
			return true
		end
	else
		return nil, "Unexpected EOF"
	end
end


-- Read MIME part headers
process_states['mime-headers'] = function( msg, chunk, filecb )

	if chunk ~= nil then

		-- Combine look-behind buffer with current chunk
		chunk = msg._mimebuffer .. chunk

		if not msg._mimeheaders then
			msg._mimeheaders = { }
		end

		local function __storehdr( k, v )
			msg._mimeheaders[k] = v
			return ""
		end

		-- Read all header lines
		local ok, count = 1, 0
		while ok > 0 do
			chunk, ok = chunk:gsub( "^([A-Z][A-Za-z0-9%-_]+): +([^\r\n]+)\r\n", __storehdr )
			count = count + ok
		end

		-- Headers processed, check for empty line
		chunk, ok = chunk:gsub( "^\r\n", "" )

		-- Store remaining buffer contents
		msg._mimebuffer = chunk

		-- End of headers
		if ok > 0 then

			-- When no Content-Type header is given assume text/plain
			if not msg._mimeheaders['Content-Type'] then
				msg._mimeheaders['Content-Type'] = 'text/plain'
			end

			-- Check Content-Disposition
			if msg._mimeheaders['Content-Disposition'] then
				-- Check for "form-data" token
				if msg._mimeheaders['Content-Disposition']:match("^form%-data; ") then
					-- Check for field name, filename
					local field = msg._mimeheaders['Content-Disposition']:match('name="(.-)"')
					local file  = msg._mimeheaders['Content-Disposition']:match('filename="(.+)"$')

					-- Is a file field and we have a callback
					if file and filecb then
						msg.params[field] = file
						msg._mimecallback = function(chunk,eof)
							filecb( {
								name    = field;
								file    = file;
								headers = msg._mimeheaders
							}, chunk, eof )
						end

					-- Treat as form field
					else
						local mv = __initval( msg.params, field )
						msg._mimecallback = function(chunk,eof)
							__appendval( msg.params, field, mv, chunk )
						end
					end

					-- Header was valid, continue with mime-data
					return true, function( chunk )
						return process_states['mime-data']( msg, chunk, filecb )
					end
				else
					-- Unknown Content-Disposition, abort
					return nil, "Unexpected Content-Disposition MIME section header"
				end
			else
				-- Content-Disposition is required, abort without
				return nil, "Missing Content-Disposition MIME section header"
			end

		-- We parsed no headers yet and buffer is almost empty
		elseif count > 0 or #chunk < 128 then
			-- Keep feeding me with chunks
			return true, nil
		end

		-- Buffer looks like garbage
		return nil, "Malformed MIME section header"
	else
		return nil, "Unexpected EOF"
	end
end


-- Read MIME part data
process_states['mime-data'] = function( msg, chunk, filecb )

	if chunk ~= nil then

		-- Combine look-behind buffer with current chunk
		local buffer = msg._mimebuffer .. chunk

		-- Look for MIME boundary
		local spos, epos = buffer:find( "\r\n--" .. msg.mime_boundary .. "\r\n", 1, true )

		if spos then
			-- Content data
			msg._mimecallback( buffer:sub( 1, spos - 1 ), true )

			-- Store remainder
			msg._mimebuffer = buffer:sub( epos + 1, #buffer )

			-- Next state is mime-header processing
			return true, function( chunk )
				return process_states['mime-headers']( msg, chunk, filecb )
			end
		else
			-- Look for EOF?
			local spos, epos = buffer:find( "\r\n--" .. msg.mime_boundary .. "--\r\n", 1, true )

			if spos then
				-- Content data
				msg._mimecallback( buffer:sub( 1, spos - 1 ), true )

				-- We processed the final MIME boundary, cleanup
				msg._mimebuffer   = nil
				msg._mimeheaders  = nil
				msg._mimecallback = nil

				-- We won't accept data anymore
				return false
			else
				-- We're somewhere within a data section and our buffer is full
				if #buffer > #chunk then
					-- Flush buffered data
					msg._mimecallback( buffer:sub( 1, #buffer - #chunk ), false )

					-- Store new data
					msg._mimebuffer = buffer:sub( #buffer - #chunk + 1, #buffer )

				-- Buffer is not full yet, append new data
				else
					msg._mimebuffer = buffer
				end

				-- Keep feeding me
				return true
			end
		end
	else
		return nil, "Unexpected EOF"
	end
end


-- Init urldecoding stream
process_states['urldecode-init'] = function( msg, chunk, filecb )

	if chunk ~= nil then

		-- Check for Content-Length
		if msg.env.CONTENT_LENGTH then
			msg.content_length = tonumber(msg.env.CONTENT_LENGTH)

			if msg.content_length <= HTTP_MAX_CONTENT then
				-- Initialize buffer
				msg._urldecbuffer = chunk
				msg._urldeclength = 0

				-- Switch to urldecode-key state
				return true, function(chunk)
					return process_states['urldecode-key']( msg, chunk, filecb )
				end
			else
				return nil, "Request exceeds maximum allowed size"
			end
		else
			return nil, "Missing Content-Length header"
		end
	else
		return nil, "Unexpected EOF"
	end
end


-- Process urldecoding stream, read and validate parameter key
process_states['urldecode-key'] = function( msg, chunk, filecb )
	if chunk ~= nil then

		-- Prevent oversized requests
		if msg._urldeclength >= msg.content_length then
			return nil, "Request exceeds maximum allowed size"
		end

		-- Combine look-behind buffer with current chunk
		local buffer = msg._urldecbuffer .. chunk
		local spos, epos = buffer:find("=")

		-- Found param
		if spos then

			-- Check that key doesn't exceed maximum allowed key length
			if ( spos - 1 ) <= HTTP_URLENC_MAXKEYLEN then
				local key = urldecode( buffer:sub( 1, spos - 1 ) )

				-- Prepare buffers
				msg.params[key]		= ""
				msg._urldeclength   = msg._urldeclength + epos
				msg._urldecbuffer   = buffer:sub( epos + 1, #buffer )

				-- Use file callback or store values inside msg.params
				if filecb then
					msg._urldeccallback = function( chunk, eof )
						filecb( field, chunk, eof )
					end
				else
					local mv = __initval( msg.params, key )
					msg._urldeccallback = function( chunk, eof )
						__appendval( msg.params, key, mv, chunk )

						-- FIXME: Use a filter
						if eof then
							__finishval( msg.params, key, mv, urldecode )
						end
					end
				end

				-- Proceed with urldecode-value state
				return true, function( chunk )
					return process_states['urldecode-value']( msg, chunk, filecb )
				end
			else
				return nil, "POST parameter exceeds maximum allowed length"
			end
		else
			return nil, "POST data exceeds maximum allowed length"
		end
	else
		return nil, "Unexpected EOF"
	end
end


-- Process urldecoding stream, read parameter value
process_states['urldecode-value'] = function( msg, chunk, filecb )

	if chunk ~= nil then

		-- Combine look-behind buffer with current chunk
		local buffer = msg._urldecbuffer .. chunk

		-- Check for EOF
		if #buffer == 0 then
			-- Compare processed length
			if msg._urldeclength == msg.content_length then
				-- Cleanup
				msg._urldeclength   = nil
				msg._urldecbuffer   = nil
				msg._urldeccallback = nil

				-- We won't accept data anymore
				return false
			else
				return nil, "Content-Length mismatch"
			end
		end

		-- Check for end of value
		local spos, epos = buffer:find("[&;]")
		if spos then

			-- Flush buffer, send eof
			msg._urldeccallback( buffer:sub( 1, spos - 1 ), true )
			msg._urldecbuffer = buffer:sub( epos + 1, #buffer )
			msg._urldeclength = msg._urldeclength + epos

			-- Back to urldecode-key state
			return true, function( chunk )
				return process_states['urldecode-key']( msg, chunk, filecb )
			end
		else
			-- We're somewhere within a data section and our buffer is full
			if #buffer > #chunk then
				-- Flush buffered data
				msg._urldeccallback( buffer:sub( 1, #buffer - #chunk ), false )

				-- Store new data
				msg._urldeclength = msg._urldeclength + #buffer - #chunk
				msg._urldecbuffer = buffer:sub( #buffer - #chunk + 1, #buffer )

			-- Buffer is not full yet, append new data
			else
				msg._urldecbuffer = buffer
			end

			-- Keep feeding me
			return true
		end
	else
		-- Send EOF
		msg._urldeccallback( "", true )
		return false
	end
end


-- Creates a header source from a given socket
function header_source( sock )
	return ltn12.source.simplify( function()

		local chunk, err, part = sock:receive("*l")

		-- Line too long
		if chunk == nil then
			if err ~= "timeout" then
				return nil, part
					and "Line exceeds maximum allowed length"
					or  "Unexpected EOF"
			else
				return nil, err
			end

		-- Line ok
		elseif chunk ~= nil then

			-- Strip trailing CR
			chunk = chunk:gsub("\r$","")

			return chunk, nil
		end
	end )
end


-- Decode MIME encoded data.
function mimedecode_message_body( source, msg, filecb )

	-- Find mime boundary
	if msg and msg.env.CONTENT_TYPE then

		local bound = msg.env.CONTENT_TYPE:match("^multipart/form%-data; boundary=(.+)")

		if bound then
			msg.mime_boundary = bound
		else
			return nil, "No MIME boundary found or invalid content type given"
		end
	end

	-- Create an initial LTN12 sink
	-- The whole MIME parsing process is implemented as fancy sink, sinks replace themself
	-- depending on current processing state (init, header, data). Return the initial state.
	local sink = ltn12.sink.simplify(
		function( chunk )
			return process_states['mime-init']( msg, chunk, filecb )
		end
	)

	-- Create a throttling LTN12 source
	-- Frequent state switching in the mime parsing process leads to unwanted buffer aggregation.
	-- This source checks wheather there's still data in our internal read buffer and returns an
	-- empty string if there's already enough data in the processing queue. If the internal buffer
	-- runs empty we're calling the original source to get the next chunk of data.
	local tsrc = function()

		-- XXX: we schould propably keep the maximum buffer size in sync with
		--      the blocksize of our original source... but doesn't really matter
		if msg._mimebuffer ~= null and #msg._mimebuffer > 256 then
			return ""
		else
			return source()
		end
	end

	-- Pump input data...
	while true do
		-- get data
		local ok, err = ltn12.pump.step( tsrc, sink )

		-- error
		if not ok and err then
			return nil, err

		-- eof
		elseif not ok then
			return true
		end
	end
end


-- Decode urlencoded data.
function urldecode_message_body( source, msg )

	-- Create an initial LTN12 sink
	-- Return the initial state.
	local sink = ltn12.sink.simplify(
		function( chunk )
			return process_states['urldecode-init']( msg, chunk )
		end
	)

	-- Create a throttling LTN12 source
	-- See explaination in mimedecode_message_body().
	local tsrc = function()
		if msg._urldecbuffer ~= null and #msg._urldecbuffer > 0 then
			return ""
		else
			return source()
		end
	end

	-- Pump input data...
	while true do
		-- get data
		local ok, err = ltn12.pump.step( tsrc, sink )

		-- step
		if not ok and err then
			return nil, err

		-- eof
		elseif not ok then
			return true
		end
	end
end


-- Parse a http message header
function parse_message_header( source )

	local ok   = true
	local msg  = { }

	local sink = ltn12.sink.simplify(
		function( chunk )
			return process_states['magic']( msg, chunk )
		end
	)

	-- Pump input data...
	while ok do

		-- get data
		ok, err = ltn12.pump.step( source, sink )

		-- error
		if not ok and err then
			return nil, err

		-- eof
		elseif not ok then

			-- Process get parameters
			if ( msg.request_method == "get" or msg.request_method == "post" ) and
			   msg.request_uri:match("?")
			then
				msg.params = urldecode_params( msg.request_uri )
			else
				msg.params = { }
			end

			-- Populate common environment variables
			msg.env = {
				CONTENT_LENGTH    = msg.headers['Content-Length'];
				CONTENT_TYPE      = msg.headers['Content-Type'];
				REQUEST_METHOD    = msg.request_method:upper();
				REQUEST_URI       = msg.request_uri;
				SCRIPT_NAME       = msg.request_uri:gsub("?.+$","");
				SCRIPT_FILENAME   = "";		-- XXX implement me
				SERVER_PROTOCOL   = "HTTP/" .. string.format("%.1f", msg.http_version)
			}

			-- Populate HTTP_* environment variables
			for i, hdr in ipairs( {
				'Accept',
				'Accept-Charset',
				'Accept-Encoding',
				'Accept-Language',
				'Connection',
				'Cookie',
				'Host',
				'Referer',
				'User-Agent',
			} ) do
				local var = 'HTTP_' .. hdr:upper():gsub("%-","_")
				local val = msg.headers[hdr]

				msg.env[var] = val
			end
		end
	end

	return msg
end


-- Parse a http message body
function parse_message_body( source, msg, filecb )
	-- Is it multipart/mime ?
	if msg.env.REQUEST_METHOD == "POST" and msg.env.CONTENT_TYPE and
	   msg.env.CONTENT_TYPE:match("^multipart/form%-data")
	then

		return mimedecode_message_body( source, msg, filecb )

	-- Is it application/x-www-form-urlencoded ?
	elseif msg.env.REQUEST_METHOD == "POST" and msg.env.CONTENT_TYPE and
	       msg.env.CONTENT_TYPE == "application/x-www-form-urlencoded"
	then
		return urldecode_message_body( source, msg, filecb )


	-- Unhandled encoding
	-- If a file callback is given then feed it chunk by chunk, else
	-- store whole buffer in message.content
	else

		local sink

		-- If we have a file callback then feed it
		if type(filecb) == "function" then
			sink = filecb

		-- ... else append to .content
		else
			msg.content = ""
			msg.content_length = 0

			sink = function( chunk )
				if ( msg.content_length + #chunk ) <= HTTP_MAX_CONTENT then

					msg.content        = msg.content        .. chunk
					msg.content_length = msg.content_length + #chunk

					return true
				else
					return nil, "POST data exceeds maximum allowed length"
				end
			end
		end

		-- Pump data...
		while true do
			local ok, err = ltn12.pump.step( source, sink )

			if not ok and err then
				return nil, err
			elseif not err then
				return true
			end
		end
	end
end

-- Status codes
statusmsg = {
	[200] = "OK",
	[301] = "Moved Permanently",
	[304] = "Not Modified",
	[400] = "Bad Request",
	[403] = "Forbidden",
	[404] = "Not Found",
	[405] = "Method Not Allowed",
	[411] = "Length Required",
	[412] = "Precondition Failed",
	[500] = "Internal Server Error",
	[503] = "Server Unavailable",
}