2 * uhttpd - Tiny single-threaded httpd
4 * Copyright (C) 2010-2013 Jo-Philipp Wich <xm@subsignal.org>
5 * Copyright (C) 2013 Felix Fietkau <nbd@openwrt.org>
7 * Permission to use, copy, modify, and/or distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
11 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 #ifndef _DEFAULT_SOURCE
21 # define _DEFAULT_SOURCE
26 #define _XOPEN_SOURCE 700
27 #include <sys/types.h>
28 #include <sys/socket.h>
29 #include <netinet/in.h>
36 #include <libubox/usock.h>
37 #include <libubox/utils.h>
44 static int run_server(void)
48 uh_plugin_post_init();
54 static void uh_config_parse(void)
56 const char *path = conf.file;
64 path = "/etc/httpd.conf";
70 memset(line, 0, sizeof(line));
72 while (fgets(line, sizeof(line) - 1, c)) {
73 if ((line[0] == '/') && (strchr(line, ':') != NULL)) {
74 if (!(col1 = strchr(line, ':')) || (*col1++ = 0) ||
75 !(col2 = strchr(col1, ':')) || (*col2++ = 0) ||
76 !(eol = strchr(col2, '\n')) || (*eol++ = 0))
79 uh_auth_add(line, col1, col2);
80 } else if (!strncmp(line, "I:", 2)) {
81 if (!(col1 = strchr(line, ':')) || (*col1++ = 0) ||
82 !(eol = strchr(col1, '\n')) || (*eol++ = 0))
85 uh_index_add(strdup(col1));
86 } else if (!strncmp(line, "E404:", 5)) {
87 if (!(col1 = strchr(line, ':')) || (*col1++ = 0) ||
88 !(eol = strchr(col1, '\n')) || (*eol++ = 0))
91 conf.error_handler = strdup(col1);
93 else if ((line[0] == '*') && (strchr(line, ':') != NULL)) {
94 if (!(col1 = strchr(line, '*')) || (*col1++ = 0) ||
95 !(col2 = strchr(col1, ':')) || (*col2++ = 0) ||
96 !(eol = strchr(col2, '\n')) || (*eol++ = 0))
99 uh_interpreter_add(col1, col2);
106 static int add_listener_arg(char *arg, bool tls)
113 s = strrchr(arg, ':');
120 if (host && *host == '[') {
128 return uh_socket_bind(host, port, tls);
131 static int usage(const char *name)
134 "Usage: %s -p [addr:]port -h docroot\n"
135 " -f Do not fork to background\n"
136 " -c file Configuration file, default is '/etc/httpd.conf'\n"
137 " -p [addr:]port Bind to specified address and port, multiple allowed\n"
139 " -s [addr:]port Like -p but provide HTTPS on this port\n"
140 " -C file ASN.1 server certificate file\n"
141 " -K file ASN.1 server private key file\n"
142 " -P ciphers Colon separated list of allowed TLS ciphers\n"
143 " -q Redirect all HTTP requests to HTTPS\n"
145 " -h directory Specify the document root, default is '.'\n"
146 " -E string Use given virtual URL as 404 error handler\n"
147 " -I string Use given filename as index for directories, multiple allowed\n"
148 " -S Do not follow symbolic links outside of the docroot\n"
149 " -D Do not allow directory listings, send 403 instead\n"
150 " -R Enable RFC1918 filter\n"
151 " -n count Maximum allowed number of concurrent script requests\n"
152 " -N count Maximum allowed number of concurrent connections\n"
154 " -l string URL prefix for Lua handler, default is '/lua'\n"
155 " -L file Lua handler script, omit to disable Lua\n"
158 " -u string URL prefix for UBUS via JSON-RPC handler\n"
159 " -U file Override ubus socket path\n"
160 " -a Do not authenticate JSON-RPC requests against UBUS session api\n"
161 " -X Enable CORS HTTP headers on JSON-RPC api\n"
163 " -x string URL prefix for CGI handler, default is '/cgi-bin'\n"
164 " -y alias[=path] URL alias handle\n"
165 " -i .ext=path Use interpreter at path for files with the given extension\n"
166 " -t seconds CGI, Lua and UBUS script timeout in seconds, default is 60\n"
167 " -T seconds Network timeout in seconds, default is 30\n"
168 " -k seconds HTTP keepalive timeout\n"
169 " -A seconds TCP keepalive timeout, default is unset\n"
170 " -d string URL decode given string\n"
171 " -r string Specify basic auth realm\n"
172 " -m string MD5 crypt given string\n"
178 static void init_defaults_pre(void)
180 conf.script_timeout = 60;
181 conf.network_timeout = 30;
182 conf.http_keepalive = 20;
183 conf.max_script_requests = 3;
184 conf.max_connections = 100;
185 conf.realm = "Protected Area";
186 conf.cgi_prefix = "/cgi-bin";
187 conf.cgi_path = "/sbin:/usr/sbin:/bin:/usr/bin";
188 INIT_LIST_HEAD(&conf.cgi_alias);
189 INIT_LIST_HEAD(&conf.lua_prefix);
192 static void init_defaults_post(void)
194 uh_index_add("index.html");
195 uh_index_add("index.htm");
196 uh_index_add("default.html");
197 uh_index_add("default.htm");
199 if (conf.cgi_prefix) {
200 char *str = malloc(strlen(conf.docroot) + strlen(conf.cgi_prefix) + 1);
202 strcpy(str, conf.docroot);
203 strcat(str, conf.cgi_prefix);
204 conf.cgi_docroot_path = str;
205 conf.cgi_prefix_len = strlen(conf.cgi_prefix);
209 static void fixup_prefix(char *str)
216 len = strlen(str) - 1;
218 while (len >= 0 && str[len] == '/')
225 static void add_lua_prefix(const char *prefix, const char *handler) {
226 struct lua_prefix *p;
227 char *pprefix, *phandler;
229 p = calloc_a(sizeof(*p),
230 &pprefix, strlen(prefix) + 1,
231 &phandler, strlen(handler) + 1);
236 p->prefix = strcpy(pprefix, prefix);
237 p->handler = strcpy(phandler, handler);
239 list_add_tail(&p->list, &conf.lua_prefix);
243 int main(int argc, char **argv)
253 const char *tls_key = NULL, *tls_crt = NULL, *tls_ciphers = NULL;
256 const char *lua_prefix = NULL, *lua_handler = NULL;
259 BUILD_BUG_ON(sizeof(uh_buf) < PATH_MAX);
261 uh_dispatch_add(&cgi_dispatch);
263 signal(SIGPIPE, SIG_IGN);
265 while ((ch = getopt(argc, argv, "A:aC:c:Dd:E:fh:H:I:i:K:k:L:l:m:N:n:P:p:qRr:Ss:T:t:U:u:Xx:y:")) != -1) {
277 tls_ciphers = optarg;
281 conf.tls_redirect = 1;
293 fprintf(stderr, "uhttpd: TLS support not compiled, "
294 "ignoring -%c\n", ch);
298 optarg = strdup(optarg);
299 bound += add_listener_arg(optarg, (ch == 's'));
303 if (!realpath(optarg, uh_buf)) {
304 fprintf(stderr, "Error: Invalid directory %s: %s\n",
305 optarg, strerror(errno));
308 conf.docroot = strdup(uh_buf);
312 if (uh_handler_add(optarg)) {
313 fprintf(stderr, "Error: Failed to load handler script %s\n",
320 if (optarg[0] != '/') {
321 fprintf(stderr, "Error: Invalid error handler: %s\n",
325 conf.error_handler = optarg;
329 if (optarg[0] == '/') {
330 fprintf(stderr, "Error: Invalid index page: %s\n",
334 uh_index_add(optarg);
338 conf.no_symlinks = 1;
342 conf.no_dirlists = 1;
346 conf.rfc1918_filter = 1;
350 conf.max_script_requests = atoi(optarg);
354 conf.max_connections = atoi(optarg);
358 fixup_prefix(optarg);
359 conf.cgi_prefix = optarg;
363 alias = calloc(1, sizeof(*alias));
365 fprintf(stderr, "Error: failed to allocate alias\n");
368 alias->alias = strdup(optarg);
369 alias->path = strchr(alias->alias, '=');
372 list_add(&alias->list, &conf.cgi_alias);
376 optarg = strdup(optarg);
377 port = strchr(optarg, '=');
378 if (optarg[0] != '.' || !port) {
379 fprintf(stderr, "Error: Invalid interpreter: %s\n",
385 uh_interpreter_add(optarg, port);
389 conf.script_timeout = atoi(optarg);
393 conf.network_timeout = atoi(optarg);
397 conf.http_keepalive = atoi(optarg);
401 conf.tcp_keepalive = atoi(optarg);
409 optarg = strdup(optarg);
410 port = alloca(strlen(optarg) + 1);
414 /* "decode" plus to space to retain compat */
415 for (opt = 0; optarg[opt]; opt++)
416 if (optarg[opt] == '+')
419 /* opt now contains strlen(optarg) -- no need to re-scan */
420 if (uh_urldecode(port, opt, optarg, opt) < 0) {
421 fprintf(stderr, "uhttpd: invalid encoding\n");
429 /* basic auth realm */
436 printf("%s\n", crypt(optarg, "$1$"));
450 fprintf(stderr, "uhttpd: Ignoring previous -%c %s\n",
457 fprintf(stderr, "uhttpd: Ignoring previous -%c %s\n",
460 lua_handler = optarg;
463 if (lua_prefix && lua_handler) {
464 add_lua_prefix(lua_prefix, lua_handler);
473 fprintf(stderr, "uhttpd: Lua support not compiled, "
474 "ignoring -%c\n", ch);
479 conf.ubus_noauth = 1;
483 conf.ubus_prefix = optarg;
487 conf.ubus_socket = optarg;
498 fprintf(stderr, "uhttpd: UBUS support not compiled, "
499 "ignoring -%c\n", ch);
503 return usage(argv[0]);
510 if (!realpath(".", uh_buf)) {
511 fprintf(stderr, "Error: Unable to determine work dir\n");
514 conf.docroot = strdup(uh_buf);
517 init_defaults_post();
520 fprintf(stderr, "Error: No sockets bound, unable to continue\n");
526 if (!tls_crt || !tls_key) {
527 fprintf(stderr, "Please specify a certificate and "
528 "a key file to enable SSL support\n");
532 if (uh_tls_init(tls_key, tls_crt, tls_ciphers))
538 if (lua_handler || lua_prefix) {
539 fprintf(stderr, "Need handler and prefix to enable Lua support\n");
543 if (!list_empty(&conf.lua_prefix) && uh_plugin_init("uhttpd_lua.so"))
547 if (conf.ubus_prefix && uh_plugin_init("uhttpd_ubus.so"))
551 /* fork (if not disabled) */
563 cur_fd = open("/dev/null", O_WRONLY);