moonbridge

annotate moonbridge_http.lua @ 159:bd7225b30391

Further work on new HTTP layer (not finished)
author jbe
date Fri Jun 05 19:53:41 2015 +0200 (2015-06-05)
parents 99a70d18e47c
children 573995950b0b
rev   line source
jbe@0 1 #!/usr/bin/env lua
jbe@0 2
jbe@0 3 -- module preamble
jbe@0 4 local _G, _M = _ENV, {}
jbe@0 5 _ENV = setmetatable({}, {
jbe@0 6 __index = function(self, key)
jbe@0 7 local value = _M[key]; if value ~= nil then return value end
jbe@0 8 return _G[key]
jbe@0 9 end,
jbe@63 10 __newindex = _M
jbe@0 11 })
jbe@0 12
jbe@0 13 -- function that encodes certain HTML entities:
jbe@0 14 -- (not used by the library itself)
jbe@0 15 function encode_html(text)
jbe@0 16 return (
jbe@0 17 string.gsub(
jbe@0 18 text, '[<>&"]',
jbe@0 19 function(char)
jbe@0 20 if char == '<' then
jbe@0 21 return "&lt;"
jbe@0 22 elseif char == '>' then
jbe@0 23 return "&gt;"
jbe@0 24 elseif char == '&' then
jbe@0 25 return "&amp;"
jbe@0 26 elseif char == '"' then
jbe@0 27 return "&quot;"
jbe@0 28 end
jbe@0 29 end
jbe@0 30 )
jbe@0 31 )
jbe@0 32
jbe@0 33 end
jbe@0 34
jbe@0 35 -- function that encodes special characters for URIs:
jbe@0 36 -- (not used by the library itself)
jbe@0 37 function encode_uri(text)
jbe@0 38 return (
jbe@0 39 string.gsub(text, "[^0-9A-Za-z_%.~-]",
jbe@0 40 function (char)
jbe@0 41 return string.format("%%%02x", string.byte(char))
jbe@0 42 end
jbe@0 43 )
jbe@0 44 )
jbe@0 45 end
jbe@0 46
jbe@0 47 -- function undoing URL encoding:
jbe@0 48 do
jbe@0 49 local b0 = string.byte("0")
jbe@0 50 local b9 = string.byte("9")
jbe@0 51 local bA = string.byte("A")
jbe@0 52 local bF = string.byte("F")
jbe@0 53 local ba = string.byte("a")
jbe@0 54 local bf = string.byte("f")
jbe@0 55 function decode_uri(str)
jbe@0 56 return (
jbe@0 57 string.gsub(
jbe@0 58 string.gsub(str, "%+", " "),
jbe@0 59 "%%([0-9A-Fa-f][0-9A-Fa-f])",
jbe@0 60 function(hex)
jbe@0 61 local n1, n2 = string.byte(hex, 1, 2)
jbe@0 62 if n1 >= b0 and n1 <= b9 then n1 = n1 - b0
jbe@0 63 elseif n1 >= bA and n1 <= bF then n1 = n1 - bA + 10
jbe@0 64 elseif n1 >= ba and n1 <= bf then n1 = n1 - ba + 10
jbe@0 65 else error("Assertion failed") end
jbe@0 66 if n2 >= b0 and n2 <= b9 then n2 = n2 - b0
jbe@0 67 elseif n2 >= bA and n2 <= bF then n2 = n2 - bA + 10
jbe@0 68 elseif n2 >= ba and n2 <= bf then n2 = n2 - ba + 10
jbe@0 69 else error("Assertion failed") end
jbe@0 70 return string.char(n1 * 16 + n2)
jbe@0 71 end
jbe@0 72 )
jbe@0 73 )
jbe@0 74 end
jbe@0 75 end
jbe@0 76
jbe@0 77 -- status codes that carry no response body (in addition to 1xx):
jbe@0 78 -- (set to "zero_content_length" if Content-Length header is required)
jbe@0 79 status_without_response_body = {
jbe@5 80 ["101"] = true, -- list 101 to allow protocol switch
jbe@0 81 ["204"] = true,
jbe@0 82 ["205"] = "zero_content_length",
jbe@0 83 ["304"] = true
jbe@0 84 }
jbe@0 85
jbe@154 86 -- parses URL encoded form data:
jbe@154 87 local function read_urlencoded_form(data)
jbe@154 88 local tbl = {}
jbe@154 89 for rawkey, rawvalue in string.gmatch(data, "([^?=&]*)=([^?=&]*)") do
jbe@154 90 local key = decode_uri(rawkey)
jbe@154 91 local value = decode_uri(rawvalue)
jbe@154 92 local subtbl = tbl[key]
jbe@154 93 if subtbl then
jbe@154 94 subtbl[#subtbl+1] = value
jbe@154 95 else
jbe@154 96 tbl[key] = {value}
jbe@35 97 end
jbe@35 98 end
jbe@154 99 return tbl
jbe@0 100 end
jbe@0 101
jbe@154 102 -- extracts first value from each subtable:
jbe@154 103 local function get_first_values(tbl)
jbe@154 104 local newtbl = {}
jbe@154 105 for key, subtbl in pairs(tbl) do
jbe@154 106 newtbl[key] = subtbl[1]
jbe@0 107 end
jbe@154 108 return newtbl
jbe@154 109 end
jbe@154 110
jbe@159 111 local headers_mt_self = setmetatable({}, {__mode="k"})
jbe@159 112
jbe@159 113 local headers_mts = {
jbe@159 114 headers_mt = {
jbe@159 115 __index = function(tbl, key)
jbe@159 116 local self = headers_mt_self[tbl]
jbe@159 117 local lowerkey = string.lower(key)
jbe@159 118 local result = self._headers[lowerkey]
jbe@159 119 if result == nil then
jbe@159 120 result = {}
jbe@159 121 end
jbe@159 122 tbl[lowerkey] = result
jbe@159 123 tbl[key] = result
jbe@159 124 return result
jbe@159 125 end
jbe@159 126 },
jbe@159 127 -- table mapping header field names to value-lists
jbe@159 128 -- (for headers with comma separated values):
jbe@159 129 headers_csv_table = {
jbe@159 130 __index = function(tbl, key)
jbe@159 131 local self = headers_mt_self[tbl]
jbe@159 132 local result = {}
jbe@159 133 for i, line in ipairs(self.headers[key]) do
jbe@159 134 for entry in string.gmatch(line, "[^,]+") do
jbe@159 135 local value = string.match(entry, "^[ \t]*(..-)[ \t]*$")
jbe@159 136 if value then
jbe@159 137 result[#result+1] = value
jbe@159 138 end
jbe@159 139 end
jbe@159 140 end
jbe@159 141 tbl[key] = result
jbe@159 142 return result
jbe@159 143 end
jbe@159 144 },
jbe@159 145 -- table mapping header field names to a comma separated string
jbe@159 146 -- (for headers with comma separated values):
jbe@159 147 headers_csv_string = {
jbe@159 148 __index = function(tbl, key)
jbe@159 149 local self = headers_mt_self[tbl]
jbe@159 150 local result = {}
jbe@159 151 for i, line in ipairs(self.headers[key]) do
jbe@159 152 result[#result+1] = line
jbe@159 153 end
jbe@159 154 result = string.concat(result, ", ")
jbe@159 155 tbl[key] = result
jbe@159 156 return result
jbe@159 157 end
jbe@159 158 },
jbe@159 159 -- table mapping header field names to a single string value
jbe@159 160 -- (or false if header has been sent multiple times):
jbe@159 161 headers_value = {
jbe@159 162 __index = function(tbl, key)
jbe@159 163 local self = headers_mt_self[tbl]
jbe@159 164 if self._headers_value_nil[key] then
jbe@159 165 return nil
jbe@159 166 end
jbe@159 167 local result = nil
jbe@159 168 local values = self.headers_csv_table[key]
jbe@159 169 if #values == 0 then
jbe@159 170 self._headers_value_nil[key] = true
jbe@159 171 elseif #values == 1 then
jbe@159 172 result = values[1]
jbe@159 173 else
jbe@159 174 result = false
jbe@159 175 end
jbe@159 176 tbl[key] = result
jbe@159 177 return result
jbe@159 178 end
jbe@159 179 },
jbe@159 180 -- table mapping header field names to a flag table,
jbe@159 181 -- indicating if the comma separated value contains certain entries:
jbe@159 182 headers_flags = {
jbe@159 183 __index = function(tbl, key)
jbe@159 184 local self = headers_mt_self[tbl]
jbe@159 185 local result = setmetatable({}, {
jbe@159 186 __index = function(tbl, key)
jbe@159 187 local lowerkey = string.lower(key)
jbe@159 188 local result = rawget(tbl, lowerkey) or false
jbe@159 189 tbl[lowerkey] = result
jbe@159 190 tbl[key] = result
jbe@159 191 return result
jbe@159 192 end
jbe@159 193 })
jbe@159 194 for i, value in ipairs(self.headers_csv_table[key]) do
jbe@159 195 result[string.lower(value)] = true
jbe@159 196 end
jbe@159 197 tbl[key] = result
jbe@159 198 return result
jbe@159 199 end
jbe@159 200 }
jbe@159 201 }
jbe@159 202
jbe@154 203 request_pt = {}
jbe@154 204 request_mt = { __index = request_pt }
jbe@154 205
jbe@154 206 function request_pt:_init(handler, options)
jbe@155 207 self._application_handler = handler
jbe@0 208 -- process options:
jbe@0 209 options = options or {}
jbe@0 210 do
jbe@0 211 -- named arg "static_headers" is used to create the preamble:
jbe@0 212 local s = options.static_headers
jbe@0 213 local t = {}
jbe@0 214 if s then
jbe@0 215 if type(s) == "string" then
jbe@0 216 for line in string.gmatch(s, "[^\r\n]+") do
jbe@0 217 t[#t+1] = line
jbe@0 218 end
jbe@0 219 else
jbe@0 220 for i, kv in ipairs(options.static_headers) do
jbe@0 221 if type(kv) == "string" then
jbe@0 222 t[#t+1] = kv
jbe@0 223 else
jbe@0 224 t[#t+1] = kv[1] .. ": " .. kv[2]
jbe@0 225 end
jbe@0 226 end
jbe@0 227 end
jbe@0 228 end
jbe@0 229 t[#t+1] = ""
jbe@154 230 self._preamble = table.concat(t, "\r\n") -- preamble sent with every(!) HTTP response
jbe@115 231 end
jbe@154 232 self._input_chunk_size = options.maximum_input_chunk_size or options.chunk_size or 16384
jbe@154 233 self._output_chunk_size = options.minimum_output_chunk_size or options.chunk_size or 1024
jbe@154 234 self._header_size_limit = options.header_size_limit or 1024*1024
jbe@156 235 self._body_size_limit = options.body_size_limit or 64*1024*1024
jbe@154 236 local function init_timeout(name, default)
jbe@154 237 local value = options[name]
jbe@154 238 if value == nil then
jbe@154 239 self["_"..name] = default
jbe@154 240 else
jbe@155 241 self["_"..name] = value
jbe@154 242 end
jbe@53 243 end
jbe@154 244 init_timeout("request_idle_timeout", 330)
jbe@154 245 init_timeout("request_header_timeout", 30)
jbe@154 246 init_timeout("request_body_timeout", 1800)
jbe@154 247 init_timeout("response_timeout", 1830)
jbe@154 248 self._poll = options.poll_function or moonbridge_io.poll
jbe@154 249 self:_create_closure("_write_yield")
jbe@154 250 self:_create_closure("_handler")
jbe@155 251 self:_create_header_metatables()
jbe@155 252 end
jbe@155 253
jbe@155 254 function request_pt:_create_closure(name)
jbe@155 255 self[name.."_closure"] = function(...)
jbe@155 256 return self[name](self, ...)
jbe@155 257 end
jbe@155 258 end
jbe@155 259
jbe@154 260 function request_pt:_handler(socket)
jbe@154 261 self._socket = socket
jbe@154 262 self._survive = true
jbe@154 263 self._socket_set = {[socket] = true}
jbe@154 264 self._faulty = false
jbe@159 265 self._state = "config"
jbe@155 266 self._connection_close_requested = false
jbe@155 267 self._connection_close_responded = false
jbe@159 268 for name, mt in pairs(headers_mts) do
jbe@159 269 local tbl = setmetatable({}, mt)
jbe@159 270 headers_mt_self[tbl] = self
jbe@159 271 self[name] = tbl
jbe@159 272 end
jbe@154 273 repeat
jbe@154 274 -- wait for input:
jbe@159 275 if not self._poll(self._socket_set, nil, self._request_idle_timeout) then
jbe@154 276 self:_error("408 Request Timeout", "Idle connection timed out")
jbe@154 277 return self._survive
jbe@154 278 end
jbe@154 279 -- read headers (with timeout):
jbe@154 280 do
jbe@154 281 local coro = coroutine.wrap(self._read_headers)
jbe@154 282 local timeout = self._request_header_timeout
jbe@154 283 local starttime = timeout and moonbridge_io.timeref()
jbe@154 284 while true do
jbe@154 285 local status = coro(self)
jbe@154 286 if status == nil then
jbe@154 287 local remaining
jbe@154 288 if timeout then
jbe@154 289 remaining = timeout - moonbridge_io.timeref(starttime)
jbe@0 290 end
jbe@154 291 if not self._poll(self._socket_set, nil, remaining) then
jbe@154 292 self:_error("408 Request Timeout", "Timeout while receiving headers")
jbe@154 293 return self._survive
jbe@0 294 end
jbe@154 295 elseif status == false then
jbe@154 296 return self._survive
jbe@154 297 elseif status == true then
jbe@154 298 break
jbe@154 299 else
jbe@154 300 error("Unexpected yield value")
jbe@0 301 end
jbe@0 302 end
jbe@154 303 end
jbe@157 304 -- prepare reading of body:
jbe@159 305 self._read_body_coro = coroutine.wrap(self._read_body) --TODO?
jbe@157 306 -- set timeout for application handler:
jbe@155 307 timeout(self._response_timeout or 0)
jbe@157 308 -- call application handler:
jbe@155 309 if self._application_handler(self) ~= true then
jbe@155 310 self._survive = false
jbe@155 311 end
jbe@157 312 -- enforce request:finish()
jbe@155 313 request:finish()
jbe@157 314 -- reset timeout of application handler
jbe@155 315 timeout(0)
jbe@155 316 until self._connection_close_responded
jbe@155 317 return self._survive
jbe@154 318 end
jbe@154 319
jbe@159 320 function request_pt:_prepare_body()
jbe@159 321 self:_assert_not_faulty()
jbe@159 322 if self._state == "prepare" then
jbe@159 323 error("Unexpected state in HTTP module")
jbe@159 324 elseif self._state ~= "config" then
jbe@159 325 return
jbe@159 326 end
jbe@159 327 self._state = "prepare"
jbe@159 328 local content_type = self.headers_value["Content-Type"]
jbe@159 329 if content_type then
jbe@159 330 if
jbe@159 331 content_type == "application/x-www-form-urlencoded" or
jbe@159 332 string.match(content_type, "^application/x%-www%-form%-urlencoded *;")
jbe@159 333 then
jbe@159 334 self._consume_all_input()
jbe@159 335 self.post_params_list = read_urlencoded_form(self.body)
jbe@159 336 else
jbe@159 337 local boundary = string.match(
jbe@159 338 content_type,
jbe@159 339 '^multipart/form%-data[ \t]*[;,][ \t]*boundary="([^"]+)"$'
jbe@159 340 ) or string.match(
jbe@159 341 content_type,
jbe@159 342 '^multipart/form%-data[ \t]*[;,][ \t]*boundary=([^"; \t]+)$'
jbe@159 343 )
jbe@159 344 if boundary then
jbe@159 345 self.post_metadata_list = {}
jbe@159 346 boundary = "--" .. boundary
jbe@159 347 local headerdata = ""
jbe@159 348 local streamer
jbe@159 349 local field_name
jbe@159 350 local metadata = {}
jbe@159 351 local value_parts
jbe@159 352 local function default_streamer(chunk)
jbe@159 353 value_parts[#value_parts+1] = chunk
jbe@159 354 end
jbe@159 355 local function stream_part_finish()
jbe@159 356 if streamer == default_streamer then
jbe@159 357 local value = table.concat(value_parts)
jbe@159 358 value_parts = nil
jbe@159 359 if field_name then
jbe@159 360 local values = self.post_params_list[field_name]
jbe@159 361 values[#values+1] = value
jbe@159 362 local metadata_entries = post_metadata_list[field_name]
jbe@159 363 metadata_entries[#metadata_entries+1] = metadata
jbe@159 364 end
jbe@159 365 else
jbe@159 366 streamer()
jbe@159 367 end
jbe@159 368 headerdata = ""
jbe@159 369 streamer = nil
jbe@159 370 field_name = nil
jbe@159 371 metadata = {}
jbe@159 372 end
jbe@159 373 local function stream_part_chunk(chunk)
jbe@159 374 if streamer then
jbe@159 375 streamer(chunk)
jbe@159 376 else
jbe@159 377 headerdata = headerdata .. chunk
jbe@159 378 while true do
jbe@159 379 local line, remaining = string.match(headerdata, "^(.-)\r?\n(.*)$")
jbe@159 380 if not line then
jbe@159 381 break
jbe@159 382 end
jbe@159 383 if line == "" then
jbe@159 384 streamer = streamed_post_params[field_name]
jbe@159 385 if not streamer then
jbe@159 386 for i, rule in ipairs(streamed_post_param_patterns) do
jbe@159 387 if string.match(field_name, rule[1]) then
jbe@159 388 streamer = rule[2]
jbe@159 389 break
jbe@159 390 end
jbe@159 391 end
jbe@159 392 end
jbe@159 393 if not streamer then
jbe@159 394 value_parts = {}
jbe@159 395 streamer = default_streamer
jbe@159 396 end
jbe@159 397 streamer(remaining, field_name, metadata)
jbe@159 398 return
jbe@159 399 end
jbe@159 400 headerdata = remaining
jbe@159 401 local header_key, header_value = string.match(line, "^([^:]*):[ \t]*(.-)[ \t]*$")
jbe@159 402 if not header_key then
jbe@159 403 request_error(true, "400 Bad Request", "Invalid header in multipart/form-data part")
jbe@159 404 end
jbe@159 405 header_key = string.lower(header_key)
jbe@159 406 if header_key == "content-disposition" then
jbe@159 407 local escaped_header_value = string.gsub(header_value, '"[^"]*"', function(str)
jbe@159 408 return string.gsub(str, "=", "==")
jbe@159 409 end)
jbe@159 410 field_name = string.match(escaped_header_value, ';[ \t]*name="([^"]*)"')
jbe@159 411 if field_name then
jbe@159 412 field_name = string.gsub(field_name, "==", "=")
jbe@159 413 else
jbe@159 414 field_name = string.match(header_value, ';[ \t]*name=([^"; \t]+)')
jbe@159 415 end
jbe@159 416 metadata.file_name = string.match(escaped_header_value, ';[ \t]*filename="([^"]*)"')
jbe@159 417 if metadata.file_name then
jbe@159 418 metadata.file_name = string.gsub(metadata.file_name, "==", "=")
jbe@159 419 else
jbe@159 420 string.match(header_value, ';[ \t]*filename=([^"; \t]+)')
jbe@159 421 end
jbe@159 422 elseif header_key == "content-type" then
jbe@159 423 metadata.content_type = header_value
jbe@159 424 elseif header_key == "content-transfer-encoding" then
jbe@159 425 request_error(true, "400 Bad Request", "Content-transfer-encoding not supported by multipart/form-data parser")
jbe@159 426 end
jbe@159 427 end
jbe@159 428 end
jbe@159 429 end
jbe@159 430 local skippart = true -- ignore data until first boundary
jbe@159 431 local afterbound = false -- interpret 2 bytes after boundary ("\r\n" or "--")
jbe@159 432 local terminated = false -- final boundary read
jbe@159 433 local bigchunk = ""
jbe@159 434 request:stream_request_body(function(chunk)
jbe@159 435 if terminated then
jbe@159 436 return
jbe@159 437 end
jbe@159 438 bigchunk = bigchunk .. chunk
jbe@159 439 while true do
jbe@159 440 if afterbound then
jbe@159 441 if #bigchunk <= 2 then
jbe@159 442 return
jbe@159 443 end
jbe@159 444 local terminator = string.sub(bigchunk, 1, 2)
jbe@159 445 if terminator == "\r\n" then
jbe@159 446 afterbound = false
jbe@159 447 bigchunk = string.sub(bigchunk, 3)
jbe@159 448 elseif terminator == "--" then
jbe@159 449 terminated = true
jbe@159 450 bigchunk = nil
jbe@159 451 return
jbe@159 452 else
jbe@159 453 request_error(true, "400 Bad Request", "Error while parsing multipart body (expected CRLF or double minus)")
jbe@159 454 end
jbe@159 455 end
jbe@159 456 local pos1, pos2 = string.find(bigchunk, boundary, 1, true)
jbe@159 457 if not pos1 then
jbe@159 458 if not skippart then
jbe@159 459 local safe = #bigchunk-#boundary
jbe@159 460 if safe > 0 then
jbe@159 461 stream_part_chunk(string.sub(bigchunk, 1, safe))
jbe@159 462 bigchunk = string.sub(bigchunk, safe+1)
jbe@159 463 end
jbe@159 464 end
jbe@159 465 return
jbe@159 466 end
jbe@159 467 if not skippart then
jbe@159 468 stream_part_chunk(string.sub(bigchunk, 1, pos1 - 1))
jbe@159 469 stream_part_finish()
jbe@159 470 else
jbe@159 471 boundary = "\r\n" .. boundary
jbe@159 472 skippart = false
jbe@159 473 end
jbe@159 474 bigchunk = string.sub(bigchunk, pos2 + 1)
jbe@159 475 afterbound = true
jbe@159 476 end
jbe@159 477 end)
jbe@159 478 if not terminated then
jbe@159 479 request_error(true, "400 Bad Request", "Premature end of multipart/form-data request body")
jbe@159 480 end
jbe@159 481 request.post_metadata_list, request.post_metadata = post_metadata_list, post_metadata
jbe@159 482 else
jbe@159 483 request_error(true, "415 Unsupported Media Type", "Unknown Content-Type of request body")
jbe@159 484 end
jbe@159 485 end
jbe@159 486 end
jbe@159 487 self.post_params = get_first_values(self.post_params_list)
jbe@159 488 self._state = "no_status_sent"
jbe@159 489 end
jbe@159 490
jbe@157 491 function request_pt:_drain_input()
jbe@157 492 self._read_body_coro = "drain"
jbe@157 493 end
jbe@157 494
jbe@157 495 function request_pt:_consume_some_input()
jbe@157 496 local coro = self._read_body_coro
jbe@157 497 if coro == "drain" then
jbe@157 498 local bytes, status = self._socket:drain_nb(self._input_chunk_size)
jbe@157 499 if status == "eof" then
jbe@157 500 coro = nil
jbe@157 501 end
jbe@157 502 elseif coro then
jbe@157 503 local retval = coro(self)
jbe@157 504 if retval ~= nil then
jbe@157 505 coro = nil -- can't consume more data
jbe@157 506 end
jbe@157 507 end
jbe@157 508 end
jbe@157 509
jbe@157 510 function request_pt:_consume_all_input()
jbe@157 511 while self._read_body_coro do
jbe@157 512 self._poll(socket_set)
jbe@157 513 self:_consume_some_input()
jbe@157 514 end
jbe@157 515 end
jbe@157 516
jbe@154 517 function request_pt:_error(status, explanation)
jbe@154 518 end
jbe@154 519
jbe@154 520 function request_pt:_read(...)
jbe@154 521 local line, status = self._socket:read_yield(...)
jbe@154 522 if line == nil then
jbe@154 523 self._faulty = true
jbe@154 524 error(status)
jbe@154 525 else
jbe@154 526 return line, status
jbe@154 527 end
jbe@154 528 end
jbe@154 529
jbe@154 530 function request_pt:_read_headers()
jbe@154 531 local remaining = self._header_size_limit
jbe@154 532 -- read and parse request line:
jbe@154 533 local target, proto
jbe@154 534 do
jbe@154 535 local line, status = self:_read(remaining-2, "\n")
jbe@154 536 if status == "maxlen" then
jbe@154 537 self:_error("414 Request-URI Too Long")
jbe@154 538 return false
jbe@154 539 elseif status == "eof" then
jbe@154 540 if line ~= "" then
jbe@154 541 self:_error("400 Bad Request", "Unexpected EOF in request-URI line")
jbe@115 542 end
jbe@154 543 return false
jbe@154 544 end
jbe@154 545 remaining = remaining - #line
jbe@154 546 self.method, target, proto =
jbe@154 547 line:match("^([^ \t\r]+)[ \t]+([^ \t\r]+)[ \t]*([^ \t\r]*)[ \t]*\r?\n$")
jbe@154 548 if not request.method then
jbe@154 549 self:_error("400 Bad Request", "Invalid request-URI line")
jbe@154 550 return false
jbe@154 551 elseif proto ~= "HTTP/1.1" then
jbe@154 552 self:_error("505 HTTP Version Not Supported")
jbe@154 553 return false
jbe@154 554 end
jbe@154 555 end
jbe@154 556 -- read and parse headers:
jbe@157 557 self._headers = {}
jbe@157 558 self._headers_value_nil = {}
jbe@154 559 while true do
jbe@154 560 local line, status = self:_read(remaining, "\n");
jbe@154 561 if status == "maxlen" then
jbe@154 562 self:_error("431 Request Header Fields Too Large")
jbe@154 563 return false
jbe@154 564 elseif status == "eof" then
jbe@154 565 self:_error("400 Bad Request", "Unexpected EOF in request headers")
jbe@154 566 return false
jbe@154 567 end
jbe@154 568 remaining = remaining - #line
jbe@154 569 if line == "\r\n" or line == "\n" then
jbe@154 570 break
jbe@154 571 end
jbe@154 572 local key, value = string.match(line, "^([^ \t\r]+):[ \t]*(.-)[ \t]*\r?\n$")
jbe@154 573 if not key then
jbe@154 574 self:_error("400 Bad Request", "Invalid header line")
jbe@154 575 return false
jbe@154 576 end
jbe@154 577 local lowerkey = key:lower()
jbe@154 578 local values = self._headers[lowerkey]
jbe@154 579 if values then
jbe@154 580 values[#values+1] = value
jbe@154 581 else
jbe@154 582 self._headers[lowerkey] = {value}
jbe@154 583 end
jbe@154 584 end
jbe@154 585 -- process "Connection: close" header if existent:
jbe@154 586 self._connection_close_requested = self.headers_flags["Connection"]["close"]
jbe@154 587 -- process "Content-Length" header if existent:
jbe@154 588 do
jbe@154 589 local values = self.headers_csv_table["Content-Length"]
jbe@154 590 if #values > 0 then
jbe@154 591 self._request_body_content_length = tonumber(values[1])
jbe@154 592 local proper_value = tostring(request_body_content_length)
jbe@154 593 for i, value in ipairs(values) do
jbe@154 594 value = string.match(value, "^0*(.*)")
jbe@154 595 if value ~= proper_value then
jbe@154 596 self:_error("400 Bad Request", "Content-Length header(s) invalid")
jbe@154 597 return false
jbe@0 598 end
jbe@38 599 end
jbe@154 600 if request_body_content_length > self._body_size_limit then
jbe@154 601 self:_error("413 Request Entity Too Large", "Announced request body size is too big")
jbe@154 602 return false
jbe@38 603 end
jbe@154 604 end
jbe@154 605 end
jbe@154 606 -- process "Transfer-Encoding" header if existent:
jbe@154 607 do
jbe@154 608 local flag = self.headers_flags["Transfer-Encoding"]["chunked"]
jbe@154 609 local list = self.headers_csv_table["Transfer-Encoding"]
jbe@154 610 if (flag and #list ~= 1) or (not flag and #list ~= 0) then
jbe@154 611 self:_error("400 Bad Request", "Unexpected Transfer-Encoding")
jbe@154 612 return false
jbe@154 613 end
jbe@154 614 end
jbe@154 615 -- process "Expect" header if existent:
jbe@154 616 for i, value in ipairs(self.headers_csv_table["Expect"]) do
jbe@154 617 if string.lower(value) ~= "100-continue" then
jbe@154 618 self:_error("417 Expectation Failed", "Unexpected Expect header")
jbe@154 619 return false
jbe@154 620 end
jbe@154 621 end
jbe@154 622 -- get mandatory Host header according to RFC 7230:
jbe@154 623 self.host = self.headers_value["Host"]
jbe@154 624 if not self.host then
jbe@154 625 self:_error("400 Bad Request", "No valid host header")
jbe@154 626 return false
jbe@154 627 end
jbe@154 628 -- parse request target:
jbe@154 629 self.path, self.query = string.match(target, "^/([^?]*)(.*)$")
jbe@154 630 if not self.path then
jbe@154 631 local host2
jbe@154 632 host2, self.path, self.query = string.match(target, "^[Hh][Tt][Tt][Pp]://([^/?]+)/?([^?]*)(.*)$")
jbe@154 633 if host2 then
jbe@154 634 if self.host ~= host2 then
jbe@154 635 self:_error("400 Bad Request", "No valid host header")
jbe@154 636 return false
jbe@38 637 end
jbe@154 638 elseif not (target == "*" and self.method == "OPTIONS") then
jbe@154 639 self:_error("400 Bad Request", "Invalid request target")
jbe@157 640 return false
jbe@154 641 end
jbe@154 642 end
jbe@154 643 -- parse GET params:
jbe@154 644 if self.query then
jbe@154 645 self.get_params_list = read_urlencoded_form(request.query)
jbe@154 646 self.get_params = get_first_values(self.get_params_list)
jbe@154 647 end
jbe@154 648 -- parse cookies:
jbe@157 649 self.cookies = {}
jbe@154 650 for i, line in ipairs(self.headers["Cookie"]) do
jbe@154 651 for rawkey, rawvalue in
jbe@154 652 string.gmatch(line, "([^=; ]*)=([^=; ]*)")
jbe@154 653 do
jbe@154 654 self.cookies[decode_uri(rawkey)] = decode_uri(rawvalue)
jbe@154 655 end
jbe@0 656 end
jbe@157 657 -- indicate success:
jbe@157 658 return true
jbe@0 659 end
jbe@0 660
jbe@156 661 function request_pt:_read_body()
jbe@156 662 local remaining = self._body_size_limit
jbe@156 663 if request.headers_flags["Transfer-Encoding"]["chunked"] then
jbe@156 664 while true do
jbe@156 665 local line, status = self:_read(32 + remaining, "\n")
jbe@156 666 if status == "maxlen" then
jbe@156 667 self:_error("400 Bad Request", "Request body size limit exceeded")
jbe@156 668 return false
jbe@156 669 elseif status == "eof" then
jbe@156 670 self:_error("400 Bad Request", "Encoding error or unexpected EOF while reading next chunk of request body")
jbe@156 671 return false
jbe@156 672 end
jbe@156 673 local zeros, lenstr = string.match(line, "^(0*)([1-9A-Fa-f]+[0-9A-Fa-f]*)\r?\n$")
jbe@156 674 local chunkext
jbe@156 675 if lenstr then
jbe@156 676 chunkext = ""
jbe@156 677 else
jbe@156 678 zeros, lenstr, chunkext = string.match(line, "^(0*)([1-9A-Fa-f]+[0-9A-Fa-f]*)([ \t;].-)\r?\n$")
jbe@156 679 end
jbe@156 680 if not lenstr or #lenstr > 13 then
jbe@156 681 self:_error("400 Bad Request", "Encoding error while reading chunk of request body")
jbe@156 682 return false
jbe@156 683 end
jbe@156 684 local len = tonumber("0x" .. lenstr)
jbe@156 685 remaining = remaining - (#zeros + #chunkext + len)
jbe@156 686 if remaining < 0 then
jbe@156 687 self:_error("400 Bad Request", "Request body size limit exceeded")
jbe@156 688 return false
jbe@156 689 end
jbe@156 690 if len == 0 then break end
jbe@156 691 if self:_read_body_bytes(len) == false then
jbe@156 692 return false
jbe@156 693 end
jbe@156 694 local term, status = self:_read(2, "\n")
jbe@156 695 if status == "eof" then
jbe@156 696 self:_error("400 Bad Request", "Unexpected EOF while reading next chunk of request body")
jbe@156 697 return false
jbe@156 698 end
jbe@156 699 if term ~= "\r\n" and term ~= "\n" then
jbe@156 700 self:_error("400 Bad Request", "Encoding error while reading chunk of request body")
jbe@156 701 return false
jbe@156 702 end
jbe@156 703 end
jbe@156 704 while true do
jbe@156 705 local line, status = self:_read(2 + remaining, "\n")
jbe@156 706 if status == "eof" then
jbe@156 707 self:_error("400 Bad Request", "Unexpected EOF while reading chunk of request body")
jbe@156 708 return false
jbe@156 709 end
jbe@156 710 if line == "\r\n" or line == "\n" then break end
jbe@156 711 remaining = remaining - #line
jbe@156 712 if remaining < 0 then
jbe@157 713 self:_error("413 Request Entity Too Large", "Request body size limit exceeded while reading trailer section of chunked request body")
jbe@157 714 return false
jbe@156 715 end
jbe@156 716 end
jbe@156 717 elseif request_body_content_length then
jbe@156 718 if self._read_body_bytes(request_body_content_length) == false then
jbe@156 719 return false
jbe@156 720 end
jbe@156 721 end
jbe@157 722 -- indicate success:
jbe@157 723 return true
jbe@156 724 end
jbe@156 725
jbe@156 726 function request_pt:_read_body_bytes(remaining, callback)
jbe@156 727 while remaining > 0 do
jbe@156 728 local limit
jbe@156 729 if remaining > self._input_chunk_size then
jbe@156 730 limit = self._input_chunk_size
jbe@156 731 else
jbe@156 732 limit = remaining
jbe@156 733 end
jbe@156 734 local chunk, status = self:_read(limit)
jbe@156 735 if status == "eof" then
jbe@156 736 self:_error("400 Bad Request", "Unexpected EOF while reading chunk of request body")
jbe@156 737 return false
jbe@156 738 end
jbe@156 739 remaining = remaining - limit
jbe@156 740 if self._body_streamer then
jbe@156 741 self._body_streamer(chunk)
jbe@156 742 end
jbe@156 743 end
jbe@157 744 return true
jbe@156 745 end
jbe@156 746
jbe@154 747 function request_pt:_assert_not_faulty()
jbe@154 748 assert(not self._faulty, "Tried to use faulty request handle")
jbe@154 749 end
jbe@154 750
jbe@154 751 function request_pt:_write_yield()
jbe@157 752 self:_consume_some_input()
jbe@154 753 self._poll(self._socket_set, self._socket_set)
jbe@154 754 end
jbe@154 755
jbe@154 756 function request_pt:_write(...)
jbe@154 757 assert(self._socket:write_call(self._write_yield_closure, ...))
jbe@154 758 end
jbe@154 759
jbe@154 760 function request_pt:_flush(...)
jbe@154 761 assert(self._socket:write_call(self._write_yield_closure, ...))
jbe@154 762 end
jbe@154 763
jbe@154 764 -- function creating a HTTP handler:
jbe@154 765 function generate_handler(handler, options)
jbe@154 766 -- swap arguments if necessary (for convenience):
jbe@154 767 if type(handler) ~= "function" and type(options) == "function" then
jbe@154 768 handler, options = options, handler
jbe@154 769 end
jbe@154 770 local request = setmetatable({}, request_mt)
jbe@154 771 request:_init(handler, options)
jbe@154 772 return request._handler_closure
jbe@154 773 end
jbe@154 774
jbe@0 775 return _M
jbe@0 776

Impressum / About Us