source: Main/trunk/Server/config.c@ 249

Last change on this file since 249 was 240, checked in by Nishi, on Oct 3, 2024 at 2:54:55 PM

winsock1 support

  • Property svn:keywords set to Id
File size: 13.5 KB
Line 
1/* $Id: config.c 240 2024-10-03 05:54:55Z nishi $ */
2
3#define SOURCE
4
5#include "tw_config.h"
6#include "tw_module.h"
7
8#include <stdio.h>
9#include <stdint.h>
10#include <stdlib.h>
11#include <string.h>
12
13#if !defined(_MSC_VER) && !defined(__BORLANDC__)
14#include <unistd.h>
15#endif
16
17#if defined(__MINGW32__) || defined(_MSC_VER) || defined(__BORLANDC__)
18#ifdef USE_WINSOCK1
19#include <winsock.h>
20#else
21#include <winsock2.h>
22#endif
23#endif
24
25#include <cm_string.h>
26#include <cm_log.h>
27
28struct tw_config config;
29
30struct tw_config_entry* tw_vhost_match(const char* name, int port) {
31 int i;
32 for(i = 0; i < config.vhost_count; i++) {
33 if(strcmp(config.vhosts[i].name, name) == 0 && (config.vhosts[i].port == -1 ? 1 : config.vhosts[i].port == port)) {
34 return &config.vhosts[i];
35 }
36 }
37 return &config.root;
38}
39
40bool tw_permission_allowed(const char* path, SOCKADDR addr, struct tw_http_request req, struct tw_config_entry* vhost) {
41 int i;
42 bool found = false;
43 bool pathstart = false;
44 bool perm = false;
45again:
46 for(i = 0; i < vhost->dir_count; i++) {
47 char* noslash;
48 struct tw_dir_entry* e = &vhost->dirs[i];
49 pathstart = false;
50 if(strlen(path) >= strlen(e->dir)) {
51 int j;
52 pathstart = true;
53 for(j = 0; path[j] != 0 && e->dir[j] != 0; j++) {
54 if(path[j] != e->dir[j]) {
55 pathstart = false;
56 break;
57 }
58 }
59 }
60 noslash = cm_strdup(e->dir);
61 noslash[strlen(noslash) - 1] = 0;
62 if(strcmp(e->dir, path) == 0 || strcmp(noslash, path) == 0 || pathstart) {
63 found = true;
64 if(strcmp(e->name, "all") == 0) {
65 perm = e->type == TW_DIR_ALLOW;
66 }
67 }
68 free(noslash);
69 }
70 if(!found && vhost != &config.root) {
71 vhost = &config.root;
72 goto again;
73 }
74 return perm;
75}
76
77void tw_config_init(void) {
78 int i;
79 for(i = 0; i < MAX_PORTS + 1; i++) {
80 config.ports[i] = -1;
81 }
82 for(i = 0; i < MAX_VHOSTS; i++) {
83#ifndef NO_SSL
84 config.vhosts[i].sslkey = NULL;
85 config.vhosts[i].sslcert = NULL;
86#endif
87 config.vhosts[i].root = NULL;
88#ifdef HAS_CHROOT
89 config.vhosts[i].chroot_path = NULL;
90#endif
91 }
92#ifndef NO_SSL
93 config.root.sslkey = NULL;
94 config.root.sslcert = NULL;
95#endif
96 config.root.root = NULL;
97 config.root.mime_count = 0;
98 config.root.dir_count = 0;
99 config.root.icon_count = 0;
100 config.root.index_count = 0;
101 config.root.readme_count = 0;
102 config.root.hideport = 0;
103#ifdef HAS_CHROOT
104 config.root.chroot_path = NULL;
105#endif
106 config.vhost_count = 0;
107 config.module_count = 0;
108 config.extension = NULL;
109 config.server_root = cm_strdup(PREFIX);
110 config.server_admin = cm_strdup(SERVER_ADMIN);
111 config.defined[0] = NULL;
112#if defined(_PSP)
113 strcpy(config.hostname, "psp");
114#elif defined(__PPU__)
115 strcpy(config.hostname, "ps3");
116#elif defined(__ps2sdk__)
117 strcpy(config.hostname, "ps2");
118#else
119 gethostname(config.hostname, 1024);
120#endif
121#ifdef HAS_CHROOT
122 tw_add_define("HAS_CHROOT");
123#endif
124#ifndef NO_SSL
125 tw_add_define("HAS_SSL");
126#endif
127}
128
129int tw_config_read(const char* path) {
130 char cbuf[2];
131 int ln = 0;
132 int ifbr = 0;
133 int ignore = -1;
134 FILE* f;
135 cm_log("Config", "Reading %s", path);
136 f = fopen(path, "r");
137 cbuf[1] = 0;
138 if(f != NULL) {
139 char* line = malloc(1);
140 int stop = 0;
141 struct tw_config_entry* current = &config.root;
142 char* vhost = NULL;
143 char* dir = NULL;
144 line[0] = 0;
145 while(stop == 0) {
146 int c = fread(cbuf, 1, 1, f);
147 if(cbuf[0] == '\n' || c <= 0) {
148 char* l = cm_trim(line);
149 ln++;
150 if(strlen(l) > 0 && l[0] != '#') {
151 char** r = cm_split(l, " \t");
152 int i;
153 if(ignore != -1 && ifbr >= ignore) {
154 if(cm_strcaseequ(r[0], "EndIf")) ifbr--;
155 if(ifbr == 0) {
156 ignore = -1;
157 }
158 } else if(cm_strcaseequ(r[0], "Include") || cm_strcaseequ(r[0], "IncludeOptional")) {
159 for(i = 1; r[i] != NULL; i++) {
160 if(tw_config_read(r[i]) != 0 && cm_strcaseequ(r[0], "Include")) {
161 stop = 1;
162 break;
163 }
164 }
165 } else if(cm_strcaseequ(r[0], "Define")) {
166 if(r[1] == NULL) {
167 cm_log("Config", "Missing name at line %d", ln);
168 stop = 1;
169 } else {
170 tw_add_define(r[1]);
171 }
172 } else if(cm_strcaseequ(r[0], "Undefine")) {
173 if(r[1] == NULL) {
174 cm_log("Config", "Missing name at line %d", ln);
175 stop = 1;
176 } else {
177 tw_delete_define(r[1]);
178 }
179 } else if(cm_strcaseequ(r[0], "BeginDirectory")) {
180 if(dir != NULL) {
181 cm_log("Config", "Already in directory section at line %d", ln);
182 stop = 1;
183 } else {
184 if(r[1] == NULL) {
185 cm_log("Config", "Missing directory at line %d", ln);
186 stop = 1;
187 } else {
188 dir = cm_strcat(r[1], r[1][strlen(r[1]) - 1] == '/' ? "" : "/");
189 }
190 }
191 } else if(cm_strcaseequ(r[0], "EndDirectory")) {
192 if(dir == NULL) {
193 cm_log("Config", "Not in directory section at line %d", ln);
194 stop = 1;
195 } else {
196 free(dir);
197 dir = NULL;
198 }
199 } else if(cm_strcaseequ(r[0], "Allow")) {
200 if(dir == NULL) {
201 cm_log("Config", "Not in directory section at line %d", ln);
202 stop = 1;
203 } else {
204 if(r[1] == NULL) {
205 cm_log("Config", "Missing argument at line %d", ln);
206 stop = 1;
207 } else {
208 struct tw_dir_entry* e = &current->dirs[current->dir_count++];
209 e->name = cm_strdup(r[1]);
210 e->dir = cm_strdup(dir);
211 e->type = TW_DIR_ALLOW;
212 }
213 }
214 } else if(cm_strcaseequ(r[0], "Deny")) {
215 if(dir == NULL) {
216 cm_log("Config", "Not in directory section at line %d", ln);
217 stop = 1;
218 } else {
219 if(r[1] == NULL) {
220 cm_log("Config", "Missing argument at line %d", ln);
221 stop = 1;
222 } else {
223 struct tw_dir_entry* e = &current->dirs[current->dir_count++];
224 e->name = cm_strdup(r[1]);
225 e->dir = cm_strdup(dir);
226 e->type = TW_DIR_DENY;
227 }
228 }
229 } else if(cm_strcaseequ(r[0], "BeginVirtualHost")) {
230 if(vhost != NULL) {
231 cm_log("Config", "Already in virtual host section at line %d", ln);
232 stop = 1;
233 } else {
234 if(r[1] == NULL) {
235 cm_log("Config", "Missing virtual host at line %d", ln);
236 stop = 1;
237 } else {
238 int i;
239 vhost = cm_strdup(r[1]);
240 current = &config.vhosts[config.vhost_count++];
241 current->dir_count = 0;
242 current->mime_count = 0;
243 current->icon_count = 0;
244 current->index_count = 0;
245 current->readme_count = 0;
246 current->hideport = -1;
247 current->name = cm_strdup(vhost);
248 current->port = -1;
249 for(i = 0; vhost[i] != 0; i++) {
250 if(vhost[i] == ':') {
251 current->name[i] = 0;
252 current->port = atoi(current->name + i + 1);
253 break;
254 }
255 }
256 }
257 }
258 } else if(cm_strcaseequ(r[0], "EndVirtualHost")) {
259 if(vhost == NULL) {
260 cm_log("Config", "Not in virtual host section at line %d", ln);
261 stop = 1;
262 } else {
263 free(vhost);
264 vhost = NULL;
265 current = &config.root;
266 }
267 } else if(cm_strcaseequ(r[0], "Listen")
268#ifndef NO_SSL
269 || cm_strcaseequ(r[0], "ListenSSL")
270#endif
271 ) {
272 for(i = 1; r[i] != NULL; i++) {
273#if defined(_MSC_VER) || defined(__BORLANDC__)
274 uint32_t port = atoi(r[i]);
275#else
276 uint64_t port = atoi(r[i]);
277#endif
278 int j;
279 cm_log("Config", "Going to listen at port %d%s", (int)port, cm_strcaseequ(r[0], "ListenSSL") ? " with SSL" : "");
280#if defined(_MSC_VER) || defined(__BORLANDC__)
281 if(cm_strcaseequ(r[0], "ListenSSL")) port |= (1UL << 31);
282#else
283 if(cm_strcaseequ(r[0], "ListenSSL")) port |= (1ULL << 31);
284#endif
285 for(j = 0; config.ports[j] != -1; j++)
286 ;
287 config.ports[j] = port;
288 }
289 } else if(cm_strcaseequ(r[0], "HidePort")) {
290 current->hideport = 1;
291 } else if(cm_strcaseequ(r[0], "ShowPort")) {
292 current->hideport = 0;
293#ifndef NO_SSL
294 } else if(cm_strcaseequ(r[0], "SSLKey")) {
295 if(r[1] == NULL) {
296 cm_log("Config", "Missing path at line %d", ln);
297 stop = 1;
298 } else {
299 if(current->sslkey != NULL) free(current->sslkey);
300 current->sslkey = cm_strdup(r[1]);
301 }
302 } else if(cm_strcaseequ(r[0], "SSLCertificate")) {
303 if(r[1] == NULL) {
304 cm_log("Config", "Missing path at line %d", ln);
305 stop = 1;
306 } else {
307 if(current->sslcert != NULL) free(current->sslcert);
308 current->sslcert = cm_strdup(r[1]);
309 }
310#endif
311#ifdef HAS_CHROOT
312 } else if(cm_strcaseequ(r[0], "ChrootDirectory")) {
313 if(r[1] == NULL) {
314 cm_log("Config", "Missing path at line %d", ln);
315 stop = 1;
316 } else {
317 if(current->chroot_path != NULL) free(current->chroot_path);
318 current->chroot_path = cm_strdup(r[1]);
319 }
320#endif
321 } else if(cm_strcaseequ(r[0], "ForceLog")) {
322 if(r[1] == NULL) {
323 cm_log("Config", "Missing log at line %d", ln);
324 stop = 1;
325 } else {
326 cm_force_log(r[1]);
327 }
328 } else if(cm_strcaseequ(r[0], "EndIf")) {
329 if(ifbr == 0) {
330 cm_log("Config", "Missing BeginIf at line %d", ln);
331 stop = 1;
332 }
333 ifbr--;
334 } else if(cm_strcaseequ(r[0], "BeginIf") || cm_strcaseequ(r[0], "BeginIfNot")) {
335 if(r[1] == NULL) {
336 cm_log("Config", "Missing condition type at line %d", ln);
337 } else {
338 bool ign = false;
339 ifbr++;
340 if(cm_strcaseequ(r[1], "False")) {
341 ign = true;
342 } else if(cm_strcaseequ(r[1], "True")) {
343 } else if(cm_strcaseequ(r[1], "Defined")) {
344 if(r[2] == NULL) {
345 cm_log("Config", "Missing name at line %d", ln);
346 stop = 1;
347 } else {
348 int i;
349 bool fndit = false;
350 for(i = 0; config.defined[i] != NULL; i++) {
351 if(strcmp(config.defined[i], r[2]) == 0) {
352 fndit = true;
353 break;
354 }
355 }
356 if(!fndit) {
357 ign = true;
358 }
359 }
360 } else {
361 cm_log("Config", "Unknown condition type at line %d", ln);
362 stop = 1;
363 }
364 if(cm_strcaseequ(r[0], "BeginIfNot")) ign = !ign;
365 if(ign) {
366 ignore = ifbr - 1;
367 }
368 }
369 } else if(cm_strcaseequ(r[0], "ServerRoot")) {
370 if(r[1] == NULL) {
371 cm_log("Config", "Missing path at line %d", ln);
372 stop = 1;
373 } else {
374 chdir(r[1]);
375 free(config.server_root);
376 config.server_root = cm_strdup(r[1]);
377 }
378 } else if(cm_strcaseequ(r[0], "ServerAdmin")) {
379 if(r[1] == NULL) {
380 cm_log("Config", "Missing email at line %d", ln);
381 stop = 1;
382 } else {
383 free(config.server_admin);
384 config.server_admin = cm_strdup(r[1]);
385 }
386 } else if(cm_strcaseequ(r[0], "DocumentRoot")) {
387 if(r[1] == NULL) {
388 cm_log("Config", "Missing path at line %d", ln);
389 stop = 1;
390 } else {
391 if(current->root != NULL) free(current->root);
392 current->root = cm_strdup(strcmp(r[1], "/") == 0 ? "" : r[1]);
393 }
394 } else if(cm_strcaseequ(r[0], "MIMEType")) {
395 if(r[1] == NULL) {
396 cm_log("Config", "Missing extension at line %d", ln);
397 stop = 1;
398 } else if(r[2] == NULL) {
399 cm_log("Config", "Missing MIME at line %d", ln);
400 stop = 1;
401 } else {
402 struct tw_mime_entry* e = &current->mimes[current->mime_count++];
403 e->ext = cm_strdup(r[1]);
404 e->mime = cm_strdup(r[2]);
405 }
406 } else if(cm_strcaseequ(r[0], "Icon")) {
407 if(r[1] == NULL) {
408 cm_log("Config", "Missing MIME at line %d", ln);
409 stop = 1;
410 } else if(r[2] == NULL) {
411 cm_log("Config", "Missing path at line %d", ln);
412 stop = 1;
413 } else {
414 struct tw_icon_entry* e = &current->icons[current->icon_count++];
415 e->mime = cm_strdup(r[1]);
416 e->icon = cm_strdup(r[2]);
417 }
418 } else if(cm_strcaseequ(r[0], "LoadModule")) {
419 for(i = 1; r[i] != NULL; i++) {
420 void* mod = tw_module_load(r[i]);
421 if(mod != NULL) {
422 config.modules[config.module_count++] = mod;
423 if(tw_module_init(mod) != 0) {
424 stop = 1;
425 break;
426 }
427 } else {
428 cm_log("Config", "Could not load the module at line %d", ln);
429 stop = 1;
430 break;
431 }
432 }
433 } else if(cm_strcaseequ(r[0], "DirectoryIndex")) {
434 for(i = 1; r[i] != NULL; i++) {
435 current->indexes[current->index_count++] = cm_strdup(r[i]);
436 }
437 } else if(cm_strcaseequ(r[0], "ReadmeFile") || cm_strcaseequ(r[0], "Readme")) {
438 if(cm_strcaseequ(r[0], "Readme")) {
439 cm_force_log("NOTE: Readme directive is deprecated.");
440 }
441 for(i = 1; r[i] != NULL; i++) {
442 current->readmes[current->readme_count++] = cm_strdup(r[i]);
443 }
444 } else {
445 stop = 1;
446 if(r[0] != NULL) {
447 int argc;
448 int i;
449 bool called = false;
450 struct tw_tool tools;
451 for(argc = 0; r[argc] != NULL; argc++)
452 ;
453 stop = 0;
454 tw_init_tools(&tools);
455 for(i = 0; i < config.module_count; i++) {
456 tw_mod_config_t mod_config = (tw_mod_config_t)tw_module_symbol(config.modules[i], "mod_config");
457 int resp;
458 if(mod_config != NULL && (resp = mod_config(&tools, r, argc)) == TW_CONFIG_PARSED) {
459 called = true;
460 break;
461 }
462 if(resp == TW_CONFIG_ERROR) {
463 stop = 1;
464 called = true;
465 break;
466 }
467 }
468 if(!called) {
469 cm_log("Config", "Unknown directive `%s' at line %d", r[0], ln);
470 stop = 1;
471 }
472 }
473 }
474 for(i = 0; r[i] != NULL; i++) free(r[i]);
475 free(r);
476 }
477 free(l);
478 free(line);
479 line = malloc(1);
480 line[0] = 0;
481 if(c <= 0) break;
482 } else if(cbuf[0] != '\r') {
483 char* tmp = line;
484 line = cm_strcat(tmp, cbuf);
485 free(tmp);
486 }
487 }
488 free(line);
489 fclose(f);
490 return stop;
491 } else {
492 cm_log("Config", "Could not open the file");
493 return 1;
494 }
495}
Note: See TracBrowser for help on using the repository browser.