rev |
line source |
jbe@0
|
1 #!/usr/bin/env lua
|
jbe@0
|
2
|
jbe@0
|
3 -- module preamble
|
jbe@0
|
4 local _G, _M = _ENV, {}
|
jbe@0
|
5 _ENV = setmetatable({}, {
|
jbe@0
|
6 __index = function(self, key)
|
jbe@0
|
7 local value = _M[key]; if value ~= nil then return value end
|
jbe@0
|
8 return _G[key]
|
jbe@0
|
9 end,
|
jbe@63
|
10 __newindex = _M
|
jbe@0
|
11 })
|
jbe@0
|
12
|
jbe@0
|
13 -- function that encodes certain HTML entities:
|
jbe@0
|
14 -- (not used by the library itself)
|
jbe@0
|
15 function encode_html(text)
|
jbe@0
|
16 return (
|
jbe@0
|
17 string.gsub(
|
jbe@0
|
18 text, '[<>&"]',
|
jbe@0
|
19 function(char)
|
jbe@0
|
20 if char == '<' then
|
jbe@0
|
21 return "<"
|
jbe@0
|
22 elseif char == '>' then
|
jbe@0
|
23 return ">"
|
jbe@0
|
24 elseif char == '&' then
|
jbe@0
|
25 return "&"
|
jbe@0
|
26 elseif char == '"' then
|
jbe@0
|
27 return """
|
jbe@0
|
28 end
|
jbe@0
|
29 end
|
jbe@0
|
30 )
|
jbe@0
|
31 )
|
jbe@0
|
32
|
jbe@0
|
33 end
|
jbe@0
|
34
|
jbe@0
|
35 -- function that encodes special characters for URIs:
|
jbe@0
|
36 -- (not used by the library itself)
|
jbe@0
|
37 function encode_uri(text)
|
jbe@0
|
38 return (
|
jbe@0
|
39 string.gsub(text, "[^0-9A-Za-z_%.~-]",
|
jbe@0
|
40 function (char)
|
jbe@0
|
41 return string.format("%%%02x", string.byte(char))
|
jbe@0
|
42 end
|
jbe@0
|
43 )
|
jbe@0
|
44 )
|
jbe@0
|
45 end
|
jbe@0
|
46
|
jbe@0
|
47 -- function undoing URL encoding:
|
jbe@0
|
48 do
|
jbe@0
|
49 local b0 = string.byte("0")
|
jbe@0
|
50 local b9 = string.byte("9")
|
jbe@0
|
51 local bA = string.byte("A")
|
jbe@0
|
52 local bF = string.byte("F")
|
jbe@0
|
53 local ba = string.byte("a")
|
jbe@0
|
54 local bf = string.byte("f")
|
jbe@0
|
55 function decode_uri(str)
|
jbe@0
|
56 return (
|
jbe@0
|
57 string.gsub(
|
jbe@0
|
58 string.gsub(str, "%+", " "),
|
jbe@0
|
59 "%%([0-9A-Fa-f][0-9A-Fa-f])",
|
jbe@0
|
60 function(hex)
|
jbe@0
|
61 local n1, n2 = string.byte(hex, 1, 2)
|
jbe@0
|
62 if n1 >= b0 and n1 <= b9 then n1 = n1 - b0
|
jbe@0
|
63 elseif n1 >= bA and n1 <= bF then n1 = n1 - bA + 10
|
jbe@0
|
64 elseif n1 >= ba and n1 <= bf then n1 = n1 - ba + 10
|
jbe@0
|
65 else error("Assertion failed") end
|
jbe@0
|
66 if n2 >= b0 and n2 <= b9 then n2 = n2 - b0
|
jbe@0
|
67 elseif n2 >= bA and n2 <= bF then n2 = n2 - bA + 10
|
jbe@0
|
68 elseif n2 >= ba and n2 <= bf then n2 = n2 - ba + 10
|
jbe@0
|
69 else error("Assertion failed") end
|
jbe@0
|
70 return string.char(n1 * 16 + n2)
|
jbe@0
|
71 end
|
jbe@0
|
72 )
|
jbe@0
|
73 )
|
jbe@0
|
74 end
|
jbe@0
|
75 end
|
jbe@0
|
76
|
jbe@0
|
77 -- status codes that carry no response body (in addition to 1xx):
|
jbe@0
|
78 -- (set to "zero_content_length" if Content-Length header is required)
|
jbe@0
|
79 status_without_response_body = {
|
jbe@5
|
80 ["101"] = true, -- list 101 to allow protocol switch
|
jbe@0
|
81 ["204"] = true,
|
jbe@0
|
82 ["205"] = "zero_content_length",
|
jbe@0
|
83 ["304"] = true
|
jbe@0
|
84 }
|
jbe@0
|
85
|
jbe@154
|
86 -- parses URL encoded form data:
|
jbe@154
|
87 local function read_urlencoded_form(data)
|
jbe@154
|
88 local tbl = {}
|
jbe@154
|
89 for rawkey, rawvalue in string.gmatch(data, "([^?=&]*)=([^?=&]*)") do
|
jbe@154
|
90 local key = decode_uri(rawkey)
|
jbe@154
|
91 local value = decode_uri(rawvalue)
|
jbe@154
|
92 local subtbl = tbl[key]
|
jbe@154
|
93 if subtbl then
|
jbe@154
|
94 subtbl[#subtbl+1] = value
|
jbe@154
|
95 else
|
jbe@154
|
96 tbl[key] = {value}
|
jbe@35
|
97 end
|
jbe@35
|
98 end
|
jbe@154
|
99 return tbl
|
jbe@0
|
100 end
|
jbe@0
|
101
|
jbe@154
|
102 -- extracts first value from each subtable:
|
jbe@154
|
103 local function get_first_values(tbl)
|
jbe@154
|
104 local newtbl = {}
|
jbe@154
|
105 for key, subtbl in pairs(tbl) do
|
jbe@154
|
106 newtbl[key] = subtbl[1]
|
jbe@0
|
107 end
|
jbe@154
|
108 return newtbl
|
jbe@154
|
109 end
|
jbe@154
|
110
|
jbe@159
|
111 local headers_mt_self = setmetatable({}, {__mode="k"})
|
jbe@159
|
112
|
jbe@159
|
113 local headers_mts = {
|
jbe@159
|
114 headers_mt = {
|
jbe@159
|
115 __index = function(tbl, key)
|
jbe@159
|
116 local self = headers_mt_self[tbl]
|
jbe@159
|
117 local lowerkey = string.lower(key)
|
jbe@159
|
118 local result = self._headers[lowerkey]
|
jbe@159
|
119 if result == nil then
|
jbe@159
|
120 result = {}
|
jbe@159
|
121 end
|
jbe@159
|
122 tbl[lowerkey] = result
|
jbe@159
|
123 tbl[key] = result
|
jbe@159
|
124 return result
|
jbe@159
|
125 end
|
jbe@159
|
126 },
|
jbe@159
|
127 -- table mapping header field names to value-lists
|
jbe@159
|
128 -- (for headers with comma separated values):
|
jbe@159
|
129 headers_csv_table = {
|
jbe@159
|
130 __index = function(tbl, key)
|
jbe@159
|
131 local self = headers_mt_self[tbl]
|
jbe@159
|
132 local result = {}
|
jbe@159
|
133 for i, line in ipairs(self.headers[key]) do
|
jbe@159
|
134 for entry in string.gmatch(line, "[^,]+") do
|
jbe@159
|
135 local value = string.match(entry, "^[ \t]*(..-)[ \t]*$")
|
jbe@159
|
136 if value then
|
jbe@159
|
137 result[#result+1] = value
|
jbe@159
|
138 end
|
jbe@159
|
139 end
|
jbe@159
|
140 end
|
jbe@159
|
141 tbl[key] = result
|
jbe@159
|
142 return result
|
jbe@159
|
143 end
|
jbe@159
|
144 },
|
jbe@159
|
145 -- table mapping header field names to a comma separated string
|
jbe@159
|
146 -- (for headers with comma separated values):
|
jbe@159
|
147 headers_csv_string = {
|
jbe@159
|
148 __index = function(tbl, key)
|
jbe@159
|
149 local self = headers_mt_self[tbl]
|
jbe@159
|
150 local result = {}
|
jbe@159
|
151 for i, line in ipairs(self.headers[key]) do
|
jbe@159
|
152 result[#result+1] = line
|
jbe@159
|
153 end
|
jbe@159
|
154 result = string.concat(result, ", ")
|
jbe@159
|
155 tbl[key] = result
|
jbe@159
|
156 return result
|
jbe@159
|
157 end
|
jbe@159
|
158 },
|
jbe@159
|
159 -- table mapping header field names to a single string value
|
jbe@159
|
160 -- (or false if header has been sent multiple times):
|
jbe@159
|
161 headers_value = {
|
jbe@159
|
162 __index = function(tbl, key)
|
jbe@159
|
163 local self = headers_mt_self[tbl]
|
jbe@159
|
164 if self._headers_value_nil[key] then
|
jbe@159
|
165 return nil
|
jbe@159
|
166 end
|
jbe@159
|
167 local result = nil
|
jbe@159
|
168 local values = self.headers_csv_table[key]
|
jbe@159
|
169 if #values == 0 then
|
jbe@159
|
170 self._headers_value_nil[key] = true
|
jbe@159
|
171 elseif #values == 1 then
|
jbe@159
|
172 result = values[1]
|
jbe@159
|
173 else
|
jbe@159
|
174 result = false
|
jbe@159
|
175 end
|
jbe@159
|
176 tbl[key] = result
|
jbe@159
|
177 return result
|
jbe@159
|
178 end
|
jbe@159
|
179 },
|
jbe@159
|
180 -- table mapping header field names to a flag table,
|
jbe@159
|
181 -- indicating if the comma separated value contains certain entries:
|
jbe@159
|
182 headers_flags = {
|
jbe@159
|
183 __index = function(tbl, key)
|
jbe@159
|
184 local self = headers_mt_self[tbl]
|
jbe@159
|
185 local result = setmetatable({}, {
|
jbe@159
|
186 __index = function(tbl, key)
|
jbe@159
|
187 local lowerkey = string.lower(key)
|
jbe@159
|
188 local result = rawget(tbl, lowerkey) or false
|
jbe@159
|
189 tbl[lowerkey] = result
|
jbe@159
|
190 tbl[key] = result
|
jbe@159
|
191 return result
|
jbe@159
|
192 end
|
jbe@159
|
193 })
|
jbe@159
|
194 for i, value in ipairs(self.headers_csv_table[key]) do
|
jbe@159
|
195 result[string.lower(value)] = true
|
jbe@159
|
196 end
|
jbe@159
|
197 tbl[key] = result
|
jbe@159
|
198 return result
|
jbe@159
|
199 end
|
jbe@159
|
200 }
|
jbe@159
|
201 }
|
jbe@159
|
202
|
jbe@154
|
203 request_pt = {}
|
jbe@154
|
204 request_mt = { __index = request_pt }
|
jbe@154
|
205
|
jbe@154
|
206 function request_pt:_init(handler, options)
|
jbe@155
|
207 self._application_handler = handler
|
jbe@0
|
208 -- process options:
|
jbe@0
|
209 options = options or {}
|
jbe@0
|
210 do
|
jbe@0
|
211 -- named arg "static_headers" is used to create the preamble:
|
jbe@0
|
212 local s = options.static_headers
|
jbe@0
|
213 local t = {}
|
jbe@0
|
214 if s then
|
jbe@0
|
215 if type(s) == "string" then
|
jbe@0
|
216 for line in string.gmatch(s, "[^\r\n]+") do
|
jbe@0
|
217 t[#t+1] = line
|
jbe@0
|
218 end
|
jbe@0
|
219 else
|
jbe@0
|
220 for i, kv in ipairs(options.static_headers) do
|
jbe@0
|
221 if type(kv) == "string" then
|
jbe@0
|
222 t[#t+1] = kv
|
jbe@0
|
223 else
|
jbe@0
|
224 t[#t+1] = kv[1] .. ": " .. kv[2]
|
jbe@0
|
225 end
|
jbe@0
|
226 end
|
jbe@0
|
227 end
|
jbe@0
|
228 end
|
jbe@0
|
229 t[#t+1] = ""
|
jbe@154
|
230 self._preamble = table.concat(t, "\r\n") -- preamble sent with every(!) HTTP response
|
jbe@115
|
231 end
|
jbe@154
|
232 self._input_chunk_size = options.maximum_input_chunk_size or options.chunk_size or 16384
|
jbe@154
|
233 self._output_chunk_size = options.minimum_output_chunk_size or options.chunk_size or 1024
|
jbe@154
|
234 self._header_size_limit = options.header_size_limit or 1024*1024
|
jbe@156
|
235 self._body_size_limit = options.body_size_limit or 64*1024*1024
|
jbe@154
|
236 local function init_timeout(name, default)
|
jbe@154
|
237 local value = options[name]
|
jbe@154
|
238 if value == nil then
|
jbe@154
|
239 self["_"..name] = default
|
jbe@154
|
240 else
|
jbe@155
|
241 self["_"..name] = value
|
jbe@154
|
242 end
|
jbe@53
|
243 end
|
jbe@154
|
244 init_timeout("request_idle_timeout", 330)
|
jbe@154
|
245 init_timeout("request_header_timeout", 30)
|
jbe@154
|
246 init_timeout("request_body_timeout", 1800)
|
jbe@154
|
247 init_timeout("response_timeout", 1830)
|
jbe@154
|
248 self._poll = options.poll_function or moonbridge_io.poll
|
jbe@154
|
249 self:_create_closure("_write_yield")
|
jbe@154
|
250 self:_create_closure("_handler")
|
jbe@155
|
251 self:_create_header_metatables()
|
jbe@155
|
252 end
|
jbe@155
|
253
|
jbe@155
|
254 function request_pt:_create_closure(name)
|
jbe@155
|
255 self[name.."_closure"] = function(...)
|
jbe@155
|
256 return self[name](self, ...)
|
jbe@155
|
257 end
|
jbe@155
|
258 end
|
jbe@155
|
259
|
jbe@154
|
260 function request_pt:_handler(socket)
|
jbe@154
|
261 self._socket = socket
|
jbe@154
|
262 self._survive = true
|
jbe@154
|
263 self._socket_set = {[socket] = true}
|
jbe@154
|
264 self._faulty = false
|
jbe@159
|
265 self._state = "config"
|
jbe@155
|
266 self._connection_close_requested = false
|
jbe@155
|
267 self._connection_close_responded = false
|
jbe@159
|
268 for name, mt in pairs(headers_mts) do
|
jbe@159
|
269 local tbl = setmetatable({}, mt)
|
jbe@159
|
270 headers_mt_self[tbl] = self
|
jbe@159
|
271 self[name] = tbl
|
jbe@159
|
272 end
|
jbe@154
|
273 repeat
|
jbe@154
|
274 -- wait for input:
|
jbe@159
|
275 if not self._poll(self._socket_set, nil, self._request_idle_timeout) then
|
jbe@154
|
276 self:_error("408 Request Timeout", "Idle connection timed out")
|
jbe@154
|
277 return self._survive
|
jbe@154
|
278 end
|
jbe@154
|
279 -- read headers (with timeout):
|
jbe@154
|
280 do
|
jbe@154
|
281 local coro = coroutine.wrap(self._read_headers)
|
jbe@154
|
282 local timeout = self._request_header_timeout
|
jbe@154
|
283 local starttime = timeout and moonbridge_io.timeref()
|
jbe@154
|
284 while true do
|
jbe@154
|
285 local status = coro(self)
|
jbe@154
|
286 if status == nil then
|
jbe@154
|
287 local remaining
|
jbe@154
|
288 if timeout then
|
jbe@154
|
289 remaining = timeout - moonbridge_io.timeref(starttime)
|
jbe@0
|
290 end
|
jbe@154
|
291 if not self._poll(self._socket_set, nil, remaining) then
|
jbe@154
|
292 self:_error("408 Request Timeout", "Timeout while receiving headers")
|
jbe@154
|
293 return self._survive
|
jbe@0
|
294 end
|
jbe@154
|
295 elseif status == false then
|
jbe@154
|
296 return self._survive
|
jbe@154
|
297 elseif status == true then
|
jbe@154
|
298 break
|
jbe@154
|
299 else
|
jbe@154
|
300 error("Unexpected yield value")
|
jbe@0
|
301 end
|
jbe@0
|
302 end
|
jbe@154
|
303 end
|
jbe@157
|
304 -- prepare reading of body:
|
jbe@159
|
305 self._read_body_coro = coroutine.wrap(self._read_body) --TODO?
|
jbe@157
|
306 -- set timeout for application handler:
|
jbe@155
|
307 timeout(self._response_timeout or 0)
|
jbe@157
|
308 -- call application handler:
|
jbe@155
|
309 if self._application_handler(self) ~= true then
|
jbe@155
|
310 self._survive = false
|
jbe@155
|
311 end
|
jbe@157
|
312 -- enforce request:finish()
|
jbe@155
|
313 request:finish()
|
jbe@157
|
314 -- reset timeout of application handler
|
jbe@155
|
315 timeout(0)
|
jbe@155
|
316 until self._connection_close_responded
|
jbe@155
|
317 return self._survive
|
jbe@154
|
318 end
|
jbe@154
|
319
|
jbe@159
|
320 function request_pt:_prepare_body()
|
jbe@159
|
321 self:_assert_not_faulty()
|
jbe@159
|
322 if self._state == "prepare" then
|
jbe@159
|
323 error("Unexpected state in HTTP module")
|
jbe@159
|
324 elseif self._state ~= "config" then
|
jbe@159
|
325 return
|
jbe@159
|
326 end
|
jbe@159
|
327 self._state = "prepare"
|
jbe@159
|
328 local content_type = self.headers_value["Content-Type"]
|
jbe@159
|
329 if content_type then
|
jbe@159
|
330 if
|
jbe@159
|
331 content_type == "application/x-www-form-urlencoded" or
|
jbe@159
|
332 string.match(content_type, "^application/x%-www%-form%-urlencoded *;")
|
jbe@159
|
333 then
|
jbe@159
|
334 self._consume_all_input()
|
jbe@159
|
335 self.post_params_list = read_urlencoded_form(self.body)
|
jbe@159
|
336 else
|
jbe@159
|
337 local boundary = string.match(
|
jbe@159
|
338 content_type,
|
jbe@159
|
339 '^multipart/form%-data[ \t]*[;,][ \t]*boundary="([^"]+)"$'
|
jbe@159
|
340 ) or string.match(
|
jbe@159
|
341 content_type,
|
jbe@159
|
342 '^multipart/form%-data[ \t]*[;,][ \t]*boundary=([^"; \t]+)$'
|
jbe@159
|
343 )
|
jbe@159
|
344 if boundary then
|
jbe@159
|
345 self.post_metadata_list = {}
|
jbe@159
|
346 boundary = "--" .. boundary
|
jbe@159
|
347 local headerdata = ""
|
jbe@159
|
348 local streamer
|
jbe@159
|
349 local field_name
|
jbe@159
|
350 local metadata = {}
|
jbe@159
|
351 local value_parts
|
jbe@159
|
352 local function default_streamer(chunk)
|
jbe@159
|
353 value_parts[#value_parts+1] = chunk
|
jbe@159
|
354 end
|
jbe@159
|
355 local function stream_part_finish()
|
jbe@159
|
356 if streamer == default_streamer then
|
jbe@159
|
357 local value = table.concat(value_parts)
|
jbe@159
|
358 value_parts = nil
|
jbe@159
|
359 if field_name then
|
jbe@159
|
360 local values = self.post_params_list[field_name]
|
jbe@159
|
361 values[#values+1] = value
|
jbe@159
|
362 local metadata_entries = post_metadata_list[field_name]
|
jbe@159
|
363 metadata_entries[#metadata_entries+1] = metadata
|
jbe@159
|
364 end
|
jbe@159
|
365 else
|
jbe@159
|
366 streamer()
|
jbe@159
|
367 end
|
jbe@159
|
368 headerdata = ""
|
jbe@159
|
369 streamer = nil
|
jbe@159
|
370 field_name = nil
|
jbe@159
|
371 metadata = {}
|
jbe@159
|
372 end
|
jbe@159
|
373 local function stream_part_chunk(chunk)
|
jbe@159
|
374 if streamer then
|
jbe@159
|
375 streamer(chunk)
|
jbe@159
|
376 else
|
jbe@159
|
377 headerdata = headerdata .. chunk
|
jbe@159
|
378 while true do
|
jbe@159
|
379 local line, remaining = string.match(headerdata, "^(.-)\r?\n(.*)$")
|
jbe@159
|
380 if not line then
|
jbe@159
|
381 break
|
jbe@159
|
382 end
|
jbe@159
|
383 if line == "" then
|
jbe@159
|
384 streamer = streamed_post_params[field_name]
|
jbe@159
|
385 if not streamer then
|
jbe@159
|
386 for i, rule in ipairs(streamed_post_param_patterns) do
|
jbe@159
|
387 if string.match(field_name, rule[1]) then
|
jbe@159
|
388 streamer = rule[2]
|
jbe@159
|
389 break
|
jbe@159
|
390 end
|
jbe@159
|
391 end
|
jbe@159
|
392 end
|
jbe@159
|
393 if not streamer then
|
jbe@159
|
394 value_parts = {}
|
jbe@159
|
395 streamer = default_streamer
|
jbe@159
|
396 end
|
jbe@159
|
397 streamer(remaining, field_name, metadata)
|
jbe@159
|
398 return
|
jbe@159
|
399 end
|
jbe@159
|
400 headerdata = remaining
|
jbe@159
|
401 local header_key, header_value = string.match(line, "^([^:]*):[ \t]*(.-)[ \t]*$")
|
jbe@159
|
402 if not header_key then
|
jbe@159
|
403 request_error(true, "400 Bad Request", "Invalid header in multipart/form-data part")
|
jbe@159
|
404 end
|
jbe@159
|
405 header_key = string.lower(header_key)
|
jbe@159
|
406 if header_key == "content-disposition" then
|
jbe@159
|
407 local escaped_header_value = string.gsub(header_value, '"[^"]*"', function(str)
|
jbe@159
|
408 return string.gsub(str, "=", "==")
|
jbe@159
|
409 end)
|
jbe@159
|
410 field_name = string.match(escaped_header_value, ';[ \t]*name="([^"]*)"')
|
jbe@159
|
411 if field_name then
|
jbe@159
|
412 field_name = string.gsub(field_name, "==", "=")
|
jbe@159
|
413 else
|
jbe@159
|
414 field_name = string.match(header_value, ';[ \t]*name=([^"; \t]+)')
|
jbe@159
|
415 end
|
jbe@159
|
416 metadata.file_name = string.match(escaped_header_value, ';[ \t]*filename="([^"]*)"')
|
jbe@159
|
417 if metadata.file_name then
|
jbe@159
|
418 metadata.file_name = string.gsub(metadata.file_name, "==", "=")
|
jbe@159
|
419 else
|
jbe@159
|
420 string.match(header_value, ';[ \t]*filename=([^"; \t]+)')
|
jbe@159
|
421 end
|
jbe@159
|
422 elseif header_key == "content-type" then
|
jbe@159
|
423 metadata.content_type = header_value
|
jbe@159
|
424 elseif header_key == "content-transfer-encoding" then
|
jbe@159
|
425 request_error(true, "400 Bad Request", "Content-transfer-encoding not supported by multipart/form-data parser")
|
jbe@159
|
426 end
|
jbe@159
|
427 end
|
jbe@159
|
428 end
|
jbe@159
|
429 end
|
jbe@159
|
430 local skippart = true -- ignore data until first boundary
|
jbe@159
|
431 local afterbound = false -- interpret 2 bytes after boundary ("\r\n" or "--")
|
jbe@159
|
432 local terminated = false -- final boundary read
|
jbe@159
|
433 local bigchunk = ""
|
jbe@159
|
434 request:stream_request_body(function(chunk)
|
jbe@159
|
435 if terminated then
|
jbe@159
|
436 return
|
jbe@159
|
437 end
|
jbe@159
|
438 bigchunk = bigchunk .. chunk
|
jbe@159
|
439 while true do
|
jbe@159
|
440 if afterbound then
|
jbe@159
|
441 if #bigchunk <= 2 then
|
jbe@159
|
442 return
|
jbe@159
|
443 end
|
jbe@159
|
444 local terminator = string.sub(bigchunk, 1, 2)
|
jbe@159
|
445 if terminator == "\r\n" then
|
jbe@159
|
446 afterbound = false
|
jbe@159
|
447 bigchunk = string.sub(bigchunk, 3)
|
jbe@159
|
448 elseif terminator == "--" then
|
jbe@159
|
449 terminated = true
|
jbe@159
|
450 bigchunk = nil
|
jbe@159
|
451 return
|
jbe@159
|
452 else
|
jbe@159
|
453 request_error(true, "400 Bad Request", "Error while parsing multipart body (expected CRLF or double minus)")
|
jbe@159
|
454 end
|
jbe@159
|
455 end
|
jbe@159
|
456 local pos1, pos2 = string.find(bigchunk, boundary, 1, true)
|
jbe@159
|
457 if not pos1 then
|
jbe@159
|
458 if not skippart then
|
jbe@159
|
459 local safe = #bigchunk-#boundary
|
jbe@159
|
460 if safe > 0 then
|
jbe@159
|
461 stream_part_chunk(string.sub(bigchunk, 1, safe))
|
jbe@159
|
462 bigchunk = string.sub(bigchunk, safe+1)
|
jbe@159
|
463 end
|
jbe@159
|
464 end
|
jbe@159
|
465 return
|
jbe@159
|
466 end
|
jbe@159
|
467 if not skippart then
|
jbe@159
|
468 stream_part_chunk(string.sub(bigchunk, 1, pos1 - 1))
|
jbe@159
|
469 stream_part_finish()
|
jbe@159
|
470 else
|
jbe@159
|
471 boundary = "\r\n" .. boundary
|
jbe@159
|
472 skippart = false
|
jbe@159
|
473 end
|
jbe@159
|
474 bigchunk = string.sub(bigchunk, pos2 + 1)
|
jbe@159
|
475 afterbound = true
|
jbe@159
|
476 end
|
jbe@159
|
477 end)
|
jbe@159
|
478 if not terminated then
|
jbe@159
|
479 request_error(true, "400 Bad Request", "Premature end of multipart/form-data request body")
|
jbe@159
|
480 end
|
jbe@159
|
481 request.post_metadata_list, request.post_metadata = post_metadata_list, post_metadata
|
jbe@159
|
482 else
|
jbe@159
|
483 request_error(true, "415 Unsupported Media Type", "Unknown Content-Type of request body")
|
jbe@159
|
484 end
|
jbe@159
|
485 end
|
jbe@159
|
486 end
|
jbe@159
|
487 self.post_params = get_first_values(self.post_params_list)
|
jbe@159
|
488 self._state = "no_status_sent"
|
jbe@159
|
489 end
|
jbe@159
|
490
|
jbe@157
|
491 function request_pt:_drain_input()
|
jbe@157
|
492 self._read_body_coro = "drain"
|
jbe@157
|
493 end
|
jbe@157
|
494
|
jbe@157
|
495 function request_pt:_consume_some_input()
|
jbe@157
|
496 local coro = self._read_body_coro
|
jbe@157
|
497 if coro == "drain" then
|
jbe@157
|
498 local bytes, status = self._socket:drain_nb(self._input_chunk_size)
|
jbe@157
|
499 if status == "eof" then
|
jbe@157
|
500 coro = nil
|
jbe@157
|
501 end
|
jbe@157
|
502 elseif coro then
|
jbe@157
|
503 local retval = coro(self)
|
jbe@157
|
504 if retval ~= nil then
|
jbe@157
|
505 coro = nil -- can't consume more data
|
jbe@157
|
506 end
|
jbe@157
|
507 end
|
jbe@157
|
508 end
|
jbe@157
|
509
|
jbe@157
|
510 function request_pt:_consume_all_input()
|
jbe@157
|
511 while self._read_body_coro do
|
jbe@157
|
512 self._poll(socket_set)
|
jbe@157
|
513 self:_consume_some_input()
|
jbe@157
|
514 end
|
jbe@157
|
515 end
|
jbe@157
|
516
|
jbe@154
|
517 function request_pt:_error(status, explanation)
|
jbe@154
|
518 end
|
jbe@154
|
519
|
jbe@154
|
520 function request_pt:_read(...)
|
jbe@154
|
521 local line, status = self._socket:read_yield(...)
|
jbe@154
|
522 if line == nil then
|
jbe@154
|
523 self._faulty = true
|
jbe@154
|
524 error(status)
|
jbe@154
|
525 else
|
jbe@154
|
526 return line, status
|
jbe@154
|
527 end
|
jbe@154
|
528 end
|
jbe@154
|
529
|
jbe@154
|
530 function request_pt:_read_headers()
|
jbe@154
|
531 local remaining = self._header_size_limit
|
jbe@154
|
532 -- read and parse request line:
|
jbe@154
|
533 local target, proto
|
jbe@154
|
534 do
|
jbe@154
|
535 local line, status = self:_read(remaining-2, "\n")
|
jbe@154
|
536 if status == "maxlen" then
|
jbe@154
|
537 self:_error("414 Request-URI Too Long")
|
jbe@154
|
538 return false
|
jbe@154
|
539 elseif status == "eof" then
|
jbe@154
|
540 if line ~= "" then
|
jbe@154
|
541 self:_error("400 Bad Request", "Unexpected EOF in request-URI line")
|
jbe@115
|
542 end
|
jbe@154
|
543 return false
|
jbe@154
|
544 end
|
jbe@154
|
545 remaining = remaining - #line
|
jbe@154
|
546 self.method, target, proto =
|
jbe@154
|
547 line:match("^([^ \t\r]+)[ \t]+([^ \t\r]+)[ \t]*([^ \t\r]*)[ \t]*\r?\n$")
|
jbe@154
|
548 if not request.method then
|
jbe@154
|
549 self:_error("400 Bad Request", "Invalid request-URI line")
|
jbe@154
|
550 return false
|
jbe@154
|
551 elseif proto ~= "HTTP/1.1" then
|
jbe@154
|
552 self:_error("505 HTTP Version Not Supported")
|
jbe@154
|
553 return false
|
jbe@154
|
554 end
|
jbe@154
|
555 end
|
jbe@154
|
556 -- read and parse headers:
|
jbe@157
|
557 self._headers = {}
|
jbe@157
|
558 self._headers_value_nil = {}
|
jbe@154
|
559 while true do
|
jbe@154
|
560 local line, status = self:_read(remaining, "\n");
|
jbe@154
|
561 if status == "maxlen" then
|
jbe@154
|
562 self:_error("431 Request Header Fields Too Large")
|
jbe@154
|
563 return false
|
jbe@154
|
564 elseif status == "eof" then
|
jbe@154
|
565 self:_error("400 Bad Request", "Unexpected EOF in request headers")
|
jbe@154
|
566 return false
|
jbe@154
|
567 end
|
jbe@154
|
568 remaining = remaining - #line
|
jbe@154
|
569 if line == "\r\n" or line == "\n" then
|
jbe@154
|
570 break
|
jbe@154
|
571 end
|
jbe@154
|
572 local key, value = string.match(line, "^([^ \t\r]+):[ \t]*(.-)[ \t]*\r?\n$")
|
jbe@154
|
573 if not key then
|
jbe@154
|
574 self:_error("400 Bad Request", "Invalid header line")
|
jbe@154
|
575 return false
|
jbe@154
|
576 end
|
jbe@154
|
577 local lowerkey = key:lower()
|
jbe@154
|
578 local values = self._headers[lowerkey]
|
jbe@154
|
579 if values then
|
jbe@154
|
580 values[#values+1] = value
|
jbe@154
|
581 else
|
jbe@154
|
582 self._headers[lowerkey] = {value}
|
jbe@154
|
583 end
|
jbe@154
|
584 end
|
jbe@154
|
585 -- process "Connection: close" header if existent:
|
jbe@154
|
586 self._connection_close_requested = self.headers_flags["Connection"]["close"]
|
jbe@154
|
587 -- process "Content-Length" header if existent:
|
jbe@154
|
588 do
|
jbe@154
|
589 local values = self.headers_csv_table["Content-Length"]
|
jbe@154
|
590 if #values > 0 then
|
jbe@154
|
591 self._request_body_content_length = tonumber(values[1])
|
jbe@154
|
592 local proper_value = tostring(request_body_content_length)
|
jbe@154
|
593 for i, value in ipairs(values) do
|
jbe@154
|
594 value = string.match(value, "^0*(.*)")
|
jbe@154
|
595 if value ~= proper_value then
|
jbe@154
|
596 self:_error("400 Bad Request", "Content-Length header(s) invalid")
|
jbe@154
|
597 return false
|
jbe@0
|
598 end
|
jbe@38
|
599 end
|
jbe@154
|
600 if request_body_content_length > self._body_size_limit then
|
jbe@154
|
601 self:_error("413 Request Entity Too Large", "Announced request body size is too big")
|
jbe@154
|
602 return false
|
jbe@38
|
603 end
|
jbe@154
|
604 end
|
jbe@154
|
605 end
|
jbe@154
|
606 -- process "Transfer-Encoding" header if existent:
|
jbe@154
|
607 do
|
jbe@154
|
608 local flag = self.headers_flags["Transfer-Encoding"]["chunked"]
|
jbe@154
|
609 local list = self.headers_csv_table["Transfer-Encoding"]
|
jbe@154
|
610 if (flag and #list ~= 1) or (not flag and #list ~= 0) then
|
jbe@154
|
611 self:_error("400 Bad Request", "Unexpected Transfer-Encoding")
|
jbe@154
|
612 return false
|
jbe@154
|
613 end
|
jbe@154
|
614 end
|
jbe@154
|
615 -- process "Expect" header if existent:
|
jbe@154
|
616 for i, value in ipairs(self.headers_csv_table["Expect"]) do
|
jbe@154
|
617 if string.lower(value) ~= "100-continue" then
|
jbe@154
|
618 self:_error("417 Expectation Failed", "Unexpected Expect header")
|
jbe@154
|
619 return false
|
jbe@154
|
620 end
|
jbe@154
|
621 end
|
jbe@154
|
622 -- get mandatory Host header according to RFC 7230:
|
jbe@154
|
623 self.host = self.headers_value["Host"]
|
jbe@154
|
624 if not self.host then
|
jbe@154
|
625 self:_error("400 Bad Request", "No valid host header")
|
jbe@154
|
626 return false
|
jbe@154
|
627 end
|
jbe@154
|
628 -- parse request target:
|
jbe@154
|
629 self.path, self.query = string.match(target, "^/([^?]*)(.*)$")
|
jbe@154
|
630 if not self.path then
|
jbe@154
|
631 local host2
|
jbe@154
|
632 host2, self.path, self.query = string.match(target, "^[Hh][Tt][Tt][Pp]://([^/?]+)/?([^?]*)(.*)$")
|
jbe@154
|
633 if host2 then
|
jbe@154
|
634 if self.host ~= host2 then
|
jbe@154
|
635 self:_error("400 Bad Request", "No valid host header")
|
jbe@154
|
636 return false
|
jbe@38
|
637 end
|
jbe@154
|
638 elseif not (target == "*" and self.method == "OPTIONS") then
|
jbe@154
|
639 self:_error("400 Bad Request", "Invalid request target")
|
jbe@157
|
640 return false
|
jbe@154
|
641 end
|
jbe@154
|
642 end
|
jbe@154
|
643 -- parse GET params:
|
jbe@154
|
644 if self.query then
|
jbe@154
|
645 self.get_params_list = read_urlencoded_form(request.query)
|
jbe@154
|
646 self.get_params = get_first_values(self.get_params_list)
|
jbe@154
|
647 end
|
jbe@154
|
648 -- parse cookies:
|
jbe@157
|
649 self.cookies = {}
|
jbe@154
|
650 for i, line in ipairs(self.headers["Cookie"]) do
|
jbe@154
|
651 for rawkey, rawvalue in
|
jbe@154
|
652 string.gmatch(line, "([^=; ]*)=([^=; ]*)")
|
jbe@154
|
653 do
|
jbe@154
|
654 self.cookies[decode_uri(rawkey)] = decode_uri(rawvalue)
|
jbe@154
|
655 end
|
jbe@0
|
656 end
|
jbe@157
|
657 -- indicate success:
|
jbe@157
|
658 return true
|
jbe@0
|
659 end
|
jbe@0
|
660
|
jbe@156
|
661 function request_pt:_read_body()
|
jbe@156
|
662 local remaining = self._body_size_limit
|
jbe@156
|
663 if request.headers_flags["Transfer-Encoding"]["chunked"] then
|
jbe@156
|
664 while true do
|
jbe@156
|
665 local line, status = self:_read(32 + remaining, "\n")
|
jbe@156
|
666 if status == "maxlen" then
|
jbe@156
|
667 self:_error("400 Bad Request", "Request body size limit exceeded")
|
jbe@156
|
668 return false
|
jbe@156
|
669 elseif status == "eof" then
|
jbe@156
|
670 self:_error("400 Bad Request", "Encoding error or unexpected EOF while reading next chunk of request body")
|
jbe@156
|
671 return false
|
jbe@156
|
672 end
|
jbe@156
|
673 local zeros, lenstr = string.match(line, "^(0*)([1-9A-Fa-f]+[0-9A-Fa-f]*)\r?\n$")
|
jbe@156
|
674 local chunkext
|
jbe@156
|
675 if lenstr then
|
jbe@156
|
676 chunkext = ""
|
jbe@156
|
677 else
|
jbe@156
|
678 zeros, lenstr, chunkext = string.match(line, "^(0*)([1-9A-Fa-f]+[0-9A-Fa-f]*)([ \t;].-)\r?\n$")
|
jbe@156
|
679 end
|
jbe@156
|
680 if not lenstr or #lenstr > 13 then
|
jbe@156
|
681 self:_error("400 Bad Request", "Encoding error while reading chunk of request body")
|
jbe@156
|
682 return false
|
jbe@156
|
683 end
|
jbe@156
|
684 local len = tonumber("0x" .. lenstr)
|
jbe@156
|
685 remaining = remaining - (#zeros + #chunkext + len)
|
jbe@156
|
686 if remaining < 0 then
|
jbe@156
|
687 self:_error("400 Bad Request", "Request body size limit exceeded")
|
jbe@156
|
688 return false
|
jbe@156
|
689 end
|
jbe@156
|
690 if len == 0 then break end
|
jbe@156
|
691 if self:_read_body_bytes(len) == false then
|
jbe@156
|
692 return false
|
jbe@156
|
693 end
|
jbe@156
|
694 local term, status = self:_read(2, "\n")
|
jbe@156
|
695 if status == "eof" then
|
jbe@156
|
696 self:_error("400 Bad Request", "Unexpected EOF while reading next chunk of request body")
|
jbe@156
|
697 return false
|
jbe@156
|
698 end
|
jbe@156
|
699 if term ~= "\r\n" and term ~= "\n" then
|
jbe@156
|
700 self:_error("400 Bad Request", "Encoding error while reading chunk of request body")
|
jbe@156
|
701 return false
|
jbe@156
|
702 end
|
jbe@156
|
703 end
|
jbe@156
|
704 while true do
|
jbe@156
|
705 local line, status = self:_read(2 + remaining, "\n")
|
jbe@156
|
706 if status == "eof" then
|
jbe@156
|
707 self:_error("400 Bad Request", "Unexpected EOF while reading chunk of request body")
|
jbe@156
|
708 return false
|
jbe@156
|
709 end
|
jbe@156
|
710 if line == "\r\n" or line == "\n" then break end
|
jbe@156
|
711 remaining = remaining - #line
|
jbe@156
|
712 if remaining < 0 then
|
jbe@157
|
713 self:_error("413 Request Entity Too Large", "Request body size limit exceeded while reading trailer section of chunked request body")
|
jbe@157
|
714 return false
|
jbe@156
|
715 end
|
jbe@156
|
716 end
|
jbe@156
|
717 elseif request_body_content_length then
|
jbe@156
|
718 if self._read_body_bytes(request_body_content_length) == false then
|
jbe@156
|
719 return false
|
jbe@156
|
720 end
|
jbe@156
|
721 end
|
jbe@157
|
722 -- indicate success:
|
jbe@157
|
723 return true
|
jbe@156
|
724 end
|
jbe@156
|
725
|
jbe@156
|
726 function request_pt:_read_body_bytes(remaining, callback)
|
jbe@156
|
727 while remaining > 0 do
|
jbe@156
|
728 local limit
|
jbe@156
|
729 if remaining > self._input_chunk_size then
|
jbe@156
|
730 limit = self._input_chunk_size
|
jbe@156
|
731 else
|
jbe@156
|
732 limit = remaining
|
jbe@156
|
733 end
|
jbe@156
|
734 local chunk, status = self:_read(limit)
|
jbe@156
|
735 if status == "eof" then
|
jbe@156
|
736 self:_error("400 Bad Request", "Unexpected EOF while reading chunk of request body")
|
jbe@156
|
737 return false
|
jbe@156
|
738 end
|
jbe@156
|
739 remaining = remaining - limit
|
jbe@156
|
740 if self._body_streamer then
|
jbe@156
|
741 self._body_streamer(chunk)
|
jbe@156
|
742 end
|
jbe@156
|
743 end
|
jbe@157
|
744 return true
|
jbe@156
|
745 end
|
jbe@156
|
746
|
jbe@154
|
747 function request_pt:_assert_not_faulty()
|
jbe@154
|
748 assert(not self._faulty, "Tried to use faulty request handle")
|
jbe@154
|
749 end
|
jbe@154
|
750
|
jbe@154
|
751 function request_pt:_write_yield()
|
jbe@157
|
752 self:_consume_some_input()
|
jbe@154
|
753 self._poll(self._socket_set, self._socket_set)
|
jbe@154
|
754 end
|
jbe@154
|
755
|
jbe@154
|
756 function request_pt:_write(...)
|
jbe@154
|
757 assert(self._socket:write_call(self._write_yield_closure, ...))
|
jbe@154
|
758 end
|
jbe@154
|
759
|
jbe@154
|
760 function request_pt:_flush(...)
|
jbe@154
|
761 assert(self._socket:write_call(self._write_yield_closure, ...))
|
jbe@154
|
762 end
|
jbe@154
|
763
|
jbe@154
|
764 -- function creating a HTTP handler:
|
jbe@154
|
765 function generate_handler(handler, options)
|
jbe@154
|
766 -- swap arguments if necessary (for convenience):
|
jbe@154
|
767 if type(handler) ~= "function" and type(options) == "function" then
|
jbe@154
|
768 handler, options = options, handler
|
jbe@154
|
769 end
|
jbe@154
|
770 local request = setmetatable({}, request_mt)
|
jbe@154
|
771 request:_init(handler, options)
|
jbe@154
|
772 return request._handler_closure
|
jbe@154
|
773 end
|
jbe@154
|
774
|
jbe@0
|
775 return _M
|
jbe@0
|
776
|