2 This file is part of GNUnet
3 (C) 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file transport/plugin_transport_http.c
23 * @brief http transport service plugin
24 * @author Matthias Wachs
27 #include "plugin_transport_http.h"
29 #define HTTP_ERROR_RESPONSE "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\"><HTML><HEAD><TITLE>404 Not Found</TITLE></HEAD><BODY><H1>Not Found</H1>The requested URL was not found on this server.<P><HR><ADDRESS></ADDRESS></BODY></HTML>"
34 server_log (void *arg, const char *fmt, va_list ap)
38 vsnprintf (text, sizeof (text), fmt, ap);
40 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "server: %s\n", text);
43 struct ServerConnection
48 /* should this connection get disconnected? GNUNET_YES/NO */
51 struct Session *session;
52 struct MHD_Connection * mhd_conn;
56 * Check if incoming connection is accepted.
57 * NOTE: Here every connection is accepted
58 * @param cls plugin as closure
59 * @param addr address of incoming connection
60 * @param addr_len address length of incoming connection
61 * @return MHD_YES if connection is accepted, MHD_NO if connection is rejected
65 server_accept_cb (void *cls, const struct sockaddr *addr, socklen_t addr_len)
67 struct Plugin * plugin = cls;
69 if (plugin->cur_connections <= plugin->max_connections)
73 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "server: Cannot accept new connections\n");
80 * Callback called by MHD when it needs data to send
81 * @param cls current session
82 * @param pos position in buffer
83 * @param buf the buffer to write data to
84 * @param max max number of bytes available in buffer
85 * @return bytes written to buffer
89 server_send_cb (void *cls, uint64_t pos, char *buf, size_t max)
99 server_load_file (const char *file)
101 struct GNUNET_DISK_FileHandle *gn_file;
105 if (0 != STAT (file, &fstat))
107 text = GNUNET_malloc (fstat.st_size + 1);
109 GNUNET_DISK_file_open (file, GNUNET_DISK_OPEN_READ,
110 GNUNET_DISK_PERM_USER_READ);
116 if (GNUNET_SYSERR == GNUNET_DISK_file_read (gn_file, text, fstat.st_size))
119 GNUNET_DISK_file_close (gn_file);
122 text[fstat.st_size] = '\0';
123 GNUNET_DISK_file_close (gn_file);
132 server_load_certificate (struct Plugin *plugin)
139 /* Get crypto init string from config
140 * If not present just use default values */
141 GNUNET_CONFIGURATION_get_value_string (plugin->env->cfg, plugin->name,
142 "CRYPTO_INIT", &plugin->crypto_init);
145 GNUNET_CONFIGURATION_get_value_filename (plugin->env->cfg, plugin->name,
146 "KEY_FILE", &key_file))
148 key_file = "https_key.key";
152 GNUNET_CONFIGURATION_get_value_filename (plugin->env->cfg, plugin->name,
153 "CERT_FILE", &cert_file))
155 cert_file = "https_cert.crt";
158 /* read key & certificates from file */
160 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
161 "Loading TLS certificate from key-file `%s' cert-file`%s'\n",
162 key_file, cert_file);
165 plugin->key = server_load_file (key_file);
166 plugin->cert = server_load_file (cert_file);
168 if ((plugin->key == NULL) || (plugin->cert == NULL))
170 struct GNUNET_OS_Process *cert_creation;
172 GNUNET_free_non_null (plugin->key);
174 GNUNET_free_non_null (plugin->cert);
178 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
179 "No usable TLS certificate found, creating certificate\n");
183 GNUNET_OS_start_process (NULL, NULL,
184 "gnunet-transport-certificate-creation",
185 "gnunet-transport-certificate-creation",
186 key_file, cert_file, NULL);
187 if (cert_creation == NULL)
189 GNUNET_log_from (GNUNET_ERROR_TYPE_ERROR, plugin->name,
191 ("Could not create a new TLS certificate, program `gnunet-transport-certificate-creation' could not be started!\n"));
192 GNUNET_free (key_file);
193 GNUNET_free (cert_file);
195 GNUNET_free_non_null (plugin->key);
196 GNUNET_free_non_null (plugin->cert);
197 GNUNET_free_non_null (plugin->crypto_init);
199 return GNUNET_SYSERR;
201 GNUNET_assert (GNUNET_OK == GNUNET_OS_process_wait (cert_creation));
202 GNUNET_OS_process_close (cert_creation);
204 plugin->key = server_load_file (key_file);
205 plugin->cert = server_load_file (cert_file);
208 if ((plugin->key == NULL) || (plugin->cert == NULL))
210 GNUNET_log_from (GNUNET_ERROR_TYPE_ERROR, plugin->name,
212 ("No usable TLS certificate found and creating one failed!\n"),
214 GNUNET_free (key_file);
215 GNUNET_free (cert_file);
217 GNUNET_free_non_null (plugin->key);
218 GNUNET_free_non_null (plugin->cert);
219 GNUNET_free_non_null (plugin->crypto_init);
221 return GNUNET_SYSERR;
223 GNUNET_free (key_file);
224 GNUNET_free (cert_file);
226 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "TLS certificate loaded\n");
235 * Process GET or PUT request received via MHD. For
236 * GET, queue response that will send back our pending
237 * messages. For PUT, process incoming data and send
238 * to GNUnet core. In either case, check if a session
239 * already exists and create a new one if not.
242 server_access_cb (void *cls, struct MHD_Connection *mhd_connection,
243 const char *url, const char *method, const char *version,
244 const char *upload_data, size_t * upload_data_size,
245 void **httpSessionCache)
247 struct Plugin *plugin = cls;
248 struct ServerConnection *sc = *httpSessionCache;
249 struct Session *s = NULL;
252 struct MHD_Response *response;
254 GNUNET_assert (cls != NULL);
259 const union MHD_ConnectionInfo *conn_info;
261 struct GNUNET_PeerIdentity target;
262 int check = GNUNET_NO;
266 conn_info = MHD_get_connection_info (mhd_connection, MHD_CONNECTION_INFO_CLIENT_ADDRESS);
267 if (conn_info->client_addr->sa_family == AF_INET)
268 addrlen = sizeof (struct sockaddr_in);
269 else if (conn_info->client_addr->sa_family == AF_INET6)
270 addrlen = sizeof (struct sockaddr_in6);
274 if ((strlen(&url[1]) >= 105) && (url[104] == ';'))
277 char * tagc = (char *) &url[105];
278 memcpy(&hash, &url[1], 103);
280 if (GNUNET_OK == GNUNET_CRYPTO_hash_from_string ((const char *) &hash, &(target.hashPubKey)))
282 tag = strtoul (tagc, NULL, 10);
288 if (0 == strcmp (MHD_HTTP_METHOD_PUT, method))
289 direction = _RECEIVE;
290 if (0 == strcmp (MHD_HTTP_METHOD_GET, method))
293 if (check == GNUNET_NO)
296 plugin->cur_connections++;
299 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: New inbound connection from %s with tag %u\n", GNUNET_h2s_full(&(target.hashPubKey)), tag);
301 /* find duplicate session */
307 if ((t->inbound) && (0 == memcmp (&t->target, &target, sizeof (struct GNUNET_PeerIdentity))) &&
308 /* FIXME add source address comparison */
316 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Duplicate session, dismissing new connection from peer `%s'\n", GNUNET_i2s (&target));
321 /* find semi-session */
322 t = plugin->server_semi_head;
326 /* FIXME add source address comparison */
327 if ((0 == memcmp (&t->target, &target, sizeof (struct GNUNET_PeerIdentity))) &&
339 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Found existing semi-session for `%s'\n", GNUNET_i2s (&target));
342 if ((direction == _SEND) && (t->server_send != NULL))
345 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Duplicate GET session, dismissing new connection from peer `%s'\n", GNUNET_i2s (&target));
352 GNUNET_CONTAINER_DLL_remove(plugin->server_semi_head, plugin->server_semi_tail, s);
353 GNUNET_CONTAINER_DLL_insert(plugin->head, plugin->tail, s);
355 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Found matching semi-session, merging session for peer `%s'\n", GNUNET_i2s (&target));
360 if ((direction == _RECEIVE) && (t->server_recv != NULL))
363 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Duplicate PUT session, dismissing new connection from peer `%s'\n", GNUNET_i2s (&target));
370 GNUNET_CONTAINER_DLL_remove(plugin->server_semi_head, plugin->server_semi_tail, s);
371 GNUNET_CONTAINER_DLL_insert(plugin->head, plugin->tail, s);
373 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Found matching semi-session, merging session for peer `%s'\n", GNUNET_i2s (&target));
379 /* create new session */
381 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Creating new session for peer `%s' \n", GNUNET_i2s (&target));
384 s = create_session(plugin,
386 conn_info->client_addr,
391 s->inbound = GNUNET_YES;
393 if (0 == strcmp (MHD_HTTP_METHOD_PUT, method))
395 if (0 == strcmp (MHD_HTTP_METHOD_GET, method))
397 GNUNET_CONTAINER_DLL_insert (plugin->server_semi_head, plugin->server_semi_tail, s);
401 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "server: Invalid connection request\n");
402 response = MHD_create_response_from_data (strlen (HTTP_ERROR_RESPONSE),HTTP_ERROR_RESPONSE, MHD_NO, MHD_NO);
403 res = MHD_queue_response (mhd_connection, MHD_HTTP_NOT_FOUND, response);
404 MHD_destroy_response (response);
411 sc = GNUNET_malloc (sizeof (struct ServerConnection));
412 sc->mhd_conn = mhd_connection;
413 sc->direction = direction;
415 if (direction == _SEND)
417 if (direction == _RECEIVE)
420 (*httpSessionCache) = sc;
423 /* existing connection */
424 sc = (*httpSessionCache);
427 /* connection is to be disconnected*/
428 if (sc->disconnect == GNUNET_YES)
430 response = MHD_create_response_from_data (strlen ("Thank you!"), "Thank you!", MHD_NO, MHD_NO);
431 res = MHD_queue_response (mhd_connection, MHD_HTTP_OK, response);
433 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
434 "Sent HTTP/1.1: 200 OK as PUT Response\n");
436 MHD_destroy_response (response);
444 server_disconnect_cb (void *cls, struct MHD_Connection *connection,
445 void **httpSessionCache)
447 struct ServerConnection *sc = *httpSessionCache;
448 struct ServerConnection *tc = *httpSessionCache;
449 struct Session * s = NULL;
450 struct Session * t = NULL;
451 struct Plugin * plugin = NULL;
458 if (sc->direction == _SEND)
461 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
462 "Server: peer `%s' PUT on address `%s' disconnected\n",
463 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen));
465 s->server_send = NULL;
466 /* FIXME miminimize timeout here */
467 if (s->server_recv != NULL)
470 tc->disconnect = GNUNET_YES;
473 if (sc->direction == _RECEIVE)
476 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
477 "Server: peer `%s' GET on address `%s' disconnected\n",
478 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen));
480 s->server_recv = NULL;
482 if (s->server_send != NULL)
485 tc->disconnect = GNUNET_YES;
490 t = plugin->server_semi_head;
495 GNUNET_CONTAINER_DLL_remove(plugin->server_semi_head, plugin->server_semi_tail, s);
496 GNUNET_CONTAINER_DLL_insert(plugin->head, plugin->tail, s);
501 plugin->cur_connections--;
503 if ((s->server_send == NULL) && (s->server_recv == NULL))
506 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
507 "Server: peer `%s' on address `%s' disconnected\n",
508 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen));
510 notify_session_end(s->plugin, &s->target, s);
515 server_disconnect (struct Session *s)
517 struct Plugin *plugin = s->plugin;
518 struct Session *t = plugin->head;
522 if (t->inbound == GNUNET_YES)
524 if (t->server_send != NULL)
526 ((struct ServerConnection *) t->server_send)->disconnect = GNUNET_YES;
528 if (t->server_send != NULL)
530 ((struct ServerConnection *) t->server_send)->disconnect = GNUNET_YES;
541 server_send (struct Session *s, const char *msgbuf, size_t msgbuf_size)
547 * Function that queries MHD's select sets and
548 * starts the task waiting for them.
549 * @param plugin plugin
550 * @param daemon_handle the MHD daemon handle
551 * @return gnunet task identifier
553 static GNUNET_SCHEDULER_TaskIdentifier
554 server_schedule (struct Plugin *plugin, struct MHD_Daemon *daemon_handle);
557 * Call MHD IPv4 to process pending requests and then go back
558 * and schedule the next run.
559 * @param cls plugin as closure
560 * @param tc task context
563 server_v4_run (void *cls,
564 const struct GNUNET_SCHEDULER_TaskContext *tc)
566 struct Plugin *plugin = cls;
567 GNUNET_assert (cls != NULL);
569 plugin->server_v4_task = GNUNET_SCHEDULER_NO_TASK;
571 if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
574 GNUNET_assert (MHD_YES == MHD_run (plugin->server_v4));
575 plugin->server_v4_task = server_schedule (plugin, plugin->server_v4);
580 * Call MHD IPv6 to process pending requests and then go back
581 * and schedule the next run.
582 * @param cls plugin as closure
583 * @param tc task context
586 server_v6_run (void *cls,
587 const struct GNUNET_SCHEDULER_TaskContext *tc)
589 struct Plugin *plugin = cls;
590 GNUNET_assert (cls != NULL);
592 plugin->server_v6_task = GNUNET_SCHEDULER_NO_TASK;
594 if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
597 GNUNET_assert (MHD_YES == MHD_run (plugin->server_v6));
598 plugin->server_v6_task = server_schedule (plugin, plugin->server_v6);
602 * Function that queries MHD's select sets and
603 * starts the task waiting for them.
604 * @param plugin plugin
605 * @param daemon_handle the MHD daemon handle
606 * @return gnunet task identifier
608 static GNUNET_SCHEDULER_TaskIdentifier
609 server_schedule (struct Plugin *plugin, struct MHD_Daemon *daemon_handle)
611 GNUNET_SCHEDULER_TaskIdentifier ret;
615 struct GNUNET_NETWORK_FDSet *wrs;
616 struct GNUNET_NETWORK_FDSet *wws;
617 struct GNUNET_NETWORK_FDSet *wes;
619 unsigned long long timeout;
621 struct GNUNET_TIME_Relative tv;
623 ret = GNUNET_SCHEDULER_NO_TASK;
627 wrs = GNUNET_NETWORK_fdset_create ();
628 wes = GNUNET_NETWORK_fdset_create ();
629 wws = GNUNET_NETWORK_fdset_create ();
631 GNUNET_assert (MHD_YES == MHD_get_fdset (daemon_handle, &rs, &ws, &es, &max));
632 haveto = MHD_get_timeout (daemon_handle, &timeout);
633 if (haveto == MHD_YES)
634 tv.rel_value = (uint64_t) timeout;
636 tv = GNUNET_TIME_UNIT_SECONDS;
637 GNUNET_NETWORK_fdset_copy_native (wrs, &rs, max + 1);
638 GNUNET_NETWORK_fdset_copy_native (wws, &ws, max + 1);
639 GNUNET_NETWORK_fdset_copy_native (wes, &es, max + 1);
640 if (daemon_handle == plugin->server_v4)
642 if (plugin->server_v4_task != GNUNET_SCHEDULER_NO_TASK)
644 GNUNET_SCHEDULER_cancel (plugin->server_v4_task);
645 plugin->server_v4_task = GNUNET_SCHEDULER_NO_TASK;
649 GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT,
650 GNUNET_SCHEDULER_NO_TASK, tv, wrs, wws,
651 &server_v4_run, plugin);
653 if (daemon_handle == plugin->server_v6)
655 if (plugin->server_v6_task != GNUNET_SCHEDULER_NO_TASK)
657 GNUNET_SCHEDULER_cancel (plugin->server_v6_task);
658 plugin->server_v6_task = GNUNET_SCHEDULER_NO_TASK;
662 GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT,
663 GNUNET_SCHEDULER_NO_TASK, tv, wrs, wws,
664 &server_v6_run, plugin);
666 GNUNET_NETWORK_fdset_destroy (wrs);
667 GNUNET_NETWORK_fdset_destroy (wws);
668 GNUNET_NETWORK_fdset_destroy (wes);
673 server_start (struct Plugin *plugin)
678 res = server_load_certificate (plugin);
679 if (res == GNUNET_SYSERR)
681 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "TABORT\n");
686 plugin->server_v4 = NULL;
687 if (plugin->ipv4 == GNUNET_YES)
689 plugin->server_v4 = MHD_start_daemon (
696 MHD_NO_FLAG, plugin->port,
697 &server_accept_cb, plugin,
698 &server_access_cb, plugin,
699 //MHD_OPTION_SOCK_ADDR,
700 //(struct sockaddr_in *)
701 //plugin->bind4_address,
702 MHD_OPTION_CONNECTION_LIMIT,
704 plugin->max_connections,
706 MHD_OPTION_HTTPS_PRIORITIES,
708 MHD_OPTION_HTTPS_MEM_KEY,
710 MHD_OPTION_HTTPS_MEM_CERT,
713 MHD_OPTION_CONNECTION_TIMEOUT,
715 MHD_OPTION_CONNECTION_MEMORY_LIMIT,
717 GNUNET_SERVER_MAX_MESSAGE_SIZE),
718 MHD_OPTION_NOTIFY_COMPLETED,
719 &server_disconnect_cb, plugin,
720 MHD_OPTION_EXTERNAL_LOGGER,
721 server_log, NULL, MHD_OPTION_END);
722 if (plugin->server_v4 == NULL)
725 plugin->server_v6 = NULL;
726 if (plugin->ipv6 == GNUNET_YES)
728 plugin->server_v6 = MHD_start_daemon (
735 MHD_USE_IPv6, plugin->port,
736 &server_accept_cb, plugin,
737 &server_access_cb, plugin,
738 //MHD_OPTION_SOCK_ADDR,
740 MHD_OPTION_CONNECTION_LIMIT,
742 plugin->max_connections,
744 MHD_OPTION_HTTPS_PRIORITIES,
746 MHD_OPTION_HTTPS_MEM_KEY,
748 MHD_OPTION_HTTPS_MEM_CERT,
751 MHD_OPTION_CONNECTION_TIMEOUT,
753 MHD_OPTION_CONNECTION_MEMORY_LIMIT,
755 GNUNET_SERVER_MAX_MESSAGE_SIZE),
756 MHD_OPTION_NOTIFY_COMPLETED,
757 &server_disconnect_cb, plugin,
758 MHD_OPTION_EXTERNAL_LOGGER,
759 server_log, NULL, MHD_OPTION_END);
761 if (plugin->server_v6 == NULL)
765 if (plugin->server_v4 != NULL)
766 plugin->server_v4_task = server_schedule (plugin, plugin->server_v4);
767 if (plugin->server_v6 != NULL)
768 plugin->server_v6_task = server_schedule (plugin, plugin->server_v6);
771 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
772 "%s server component started on port %u\n", plugin->name,
779 server_stop (struct Plugin *plugin)
781 struct Session *s = NULL;
782 struct Session *t = NULL;
784 if (plugin->server_v4_task != GNUNET_SCHEDULER_NO_TASK)
786 GNUNET_SCHEDULER_cancel (plugin->server_v4_task);
787 plugin->server_v4_task = GNUNET_SCHEDULER_NO_TASK;
790 if (plugin->server_v6_task != GNUNET_SCHEDULER_NO_TASK)
792 GNUNET_SCHEDULER_cancel (plugin->server_v6_task);
793 plugin->server_v6_task = GNUNET_SCHEDULER_NO_TASK;
796 if (plugin->server_v4 != NULL)
798 MHD_stop_daemon (plugin->server_v4);
799 plugin->server_v4 = NULL;
801 if (plugin->server_v6 != NULL)
803 MHD_stop_daemon (plugin->server_v6);
804 plugin->server_v6 = NULL;
807 /* cleaning up semi-sessions never propagated */
808 s = plugin->server_semi_head;
817 GNUNET_free_non_null (plugin->crypto_init);
818 GNUNET_free_non_null (plugin->cert);
819 GNUNET_free_non_null (plugin->key);
823 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
824 "%s server component stopped\n", plugin->name);
830 /* end of plugin_transport_http.c */