2 * uhttpd - Tiny single-threaded httpd
4 * Copyright (C) 2010-2012 Jo-Philipp Wich <xm@subsignal.org>
5 * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
7 * Licensed under the Apache License, Version 2.0 (the "License");
8 * you may not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
11 * http://www.apache.org/licenses/LICENSE-2.0
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS,
15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
22 #define _XOPEN_SOURCE 700
23 #include <sys/types.h>
24 #include <sys/socket.h>
25 #include <netinet/in.h>
32 #include <libubox/usock.h>
39 static int run_server(void)
43 uh_plugin_post_init();
49 static void uh_config_parse(void)
51 const char *path = conf.file;
59 path = "/etc/httpd.conf";
65 memset(line, 0, sizeof(line));
67 while (fgets(line, sizeof(line) - 1, c)) {
68 if ((line[0] == '/') && (strchr(line, ':') != NULL)) {
69 if (!(col1 = strchr(line, ':')) || (*col1++ = 0) ||
70 !(col2 = strchr(col1, ':')) || (*col2++ = 0) ||
71 !(eol = strchr(col2, '\n')) || (*eol++ = 0))
74 uh_auth_add(line, col1, col2);
75 } else if (!strncmp(line, "I:", 2)) {
76 if (!(col1 = strchr(line, ':')) || (*col1++ = 0) ||
77 !(eol = strchr(col1, '\n')) || (*eol++ = 0))
80 uh_index_add(strdup(col1));
81 } else if (!strncmp(line, "E404:", 5)) {
82 if (!(col1 = strchr(line, ':')) || (*col1++ = 0) ||
83 !(eol = strchr(col1, '\n')) || (*eol++ = 0))
86 conf.error_handler = strdup(col1);
88 else if ((line[0] == '*') && (strchr(line, ':') != NULL)) {
89 if (!(col1 = strchr(line, '*')) || (*col1++ = 0) ||
90 !(col2 = strchr(col1, ':')) || (*col2++ = 0) ||
91 !(eol = strchr(col2, '\n')) || (*eol++ = 0))
94 uh_interpreter_add(col1, col2);
101 static int add_listener_arg(char *arg, bool tls)
107 s = strrchr(arg, ':');
114 return uh_socket_bind(host, port, tls);
117 static int usage(const char *name)
120 "Usage: %s -p [addr:]port -h docroot\n"
121 " -f Do not fork to background\n"
122 " -c file Configuration file, default is '/etc/httpd.conf'\n"
123 " -p [addr:]port Bind to specified address and port, multiple allowed\n"
125 " -s [addr:]port Like -p but provide HTTPS on this port\n"
126 " -C file ASN.1 server certificate file\n"
127 " -K file ASN.1 server private key file\n"
129 " -h directory Specify the document root, default is '.'\n"
130 " -E string Use given virtual URL as 404 error handler\n"
131 " -I string Use given filename as index for directories, multiple allowed\n"
132 " -S Do not follow symbolic links outside of the docroot\n"
133 " -D Do not allow directory listings, send 403 instead\n"
134 " -R Enable RFC1918 filter\n"
135 " -n count Maximum allowed number of concurrent requests\n"
137 " -l string URL prefix for Lua handler, default is '/lua'\n"
138 " -L file Lua handler script, omit to disable Lua\n"
141 " -u string URL prefix for HTTP/JSON handler\n"
142 " -U file Override ubus socket path\n"
144 " -x string URL prefix for CGI handler, default is '/cgi-bin'\n"
145 " -i .ext=path Use interpreter at path for files with the given extension\n"
146 " -t seconds CGI, Lua and UBUS script timeout in seconds, default is 60\n"
147 " -T seconds Network timeout in seconds, default is 30\n"
148 " -d string URL decode given string\n"
149 " -r string Specify basic auth realm\n"
150 " -m string MD5 crypt given string\n"
156 static void init_defaults(void)
158 conf.script_timeout = 60;
159 conf.network_timeout = 30;
160 conf.http_keepalive = 20;
161 conf.max_requests = 3;
162 conf.realm = "Protected Area";
163 conf.cgi_prefix = "/cgi-bin";
164 conf.cgi_path = "/sbin:/usr/sbin:/bin:/usr/bin";
166 uh_index_add("index.html");
167 uh_index_add("index.htm");
168 uh_index_add("default.html");
169 uh_index_add("default.htm");
172 static void fixup_prefix(char *str)
179 len = strlen(str) - 1;
181 while (len > 0 && str[len] == '/')
187 int main(int argc, char **argv)
189 const char *tls_key = NULL, *tls_crt = NULL;
197 BUILD_BUG_ON(sizeof(uh_buf) < PATH_MAX);
199 uh_dispatch_add(&cgi_dispatch);
201 signal(SIGPIPE, SIG_IGN);
203 while ((ch = getopt(argc, argv, "fSDRC:K:E:I:p:s:h:c:l:L:d:r:m:n:x:i:t:T:A:u:U:")) != -1) {
212 bound += add_listener_arg(optarg, tls);
216 if (!realpath(optarg, uh_buf)) {
217 fprintf(stderr, "Error: Invalid directory %s: %s\n",
218 optarg, strerror(errno));
221 conf.docroot = strdup(uh_buf);
225 if (optarg[0] != '/') {
226 fprintf(stderr, "Error: Invalid error handler: %s\n",
230 conf.error_handler = optarg;
234 if (optarg[0] == '/') {
235 fprintf(stderr, "Error: Invalid index page: %s\n",
239 uh_index_add(optarg);
243 conf.no_symlinks = 1;
247 conf.no_dirlists = 1;
251 conf.rfc1918_filter = 1;
255 conf.max_requests = atoi(optarg);
259 fixup_prefix(optarg);
260 conf.cgi_prefix = optarg;
264 port = strchr(optarg, '=');
265 if (optarg[0] != '.' || !port) {
266 fprintf(stderr, "Error: Invalid interpreter: %s\n",
272 uh_interpreter_add(optarg, port);
276 conf.script_timeout = atoi(optarg);
280 conf.network_timeout = atoi(optarg);
284 conf.tcp_keepalive = atoi(optarg);
292 port = alloca(strlen(optarg) + 1);
296 /* "decode" plus to space to retain compat */
297 for (opt = 0; optarg[opt]; opt++)
298 if (optarg[opt] == '+')
301 /* opt now contains strlen(optarg) -- no need to re-scan */
302 if (uh_urldecode(port, opt, optarg, opt) < 0) {
303 fprintf(stderr, "uhttpd: invalid encoding\n");
310 /* basic auth realm */
317 printf("%s\n", crypt(optarg, "$1$"));
335 conf.lua_prefix = optarg;
339 conf.lua_handler = optarg;
344 conf.ubus_prefix = optarg;
348 conf.ubus_socket = optarg;
352 return usage(argv[0]);
359 fprintf(stderr, "Error: No sockets bound, unable to continue\n");
364 if (!tls_crt || !tls_key) {
365 fprintf(stderr, "Please specify a certificate and "
366 "a key file to enable SSL support\n");
371 if (uh_tls_init(tls_key, tls_crt))
374 fprintf(stderr, "Error: TLS support not compiled in.\n");
380 if (conf.lua_handler || conf.lua_prefix) {
381 if (!conf.lua_handler || !conf.lua_prefix) {
382 fprintf(stderr, "Need handler and prefix to enable Lua support\n");
385 if (uh_plugin_init("uhttpd_lua.so"))
390 if (conf.ubus_prefix && uh_plugin_init("uhttpd_ubus.so"))
394 /* fork (if not disabled) */
406 cur_fd = open("/dev/null", O_WRONLY);