Mercurial > hg > orthanc
annotate Core/HttpServer/MongooseServer.cpp @ 901:7d88f3f4a3b3 plugins
refactoring IsServedUri, answer PNG images, regular expression groups
author | Sebastien Jodogne <s.jodogne@gmail.com> |
---|---|
date | Wed, 18 Jun 2014 15:22:13 +0200 |
parents | bb0a51561016 |
children | e078ea944089 |
rev | line source |
---|---|
0 | 1 /** |
59 | 2 * Orthanc - A Lightweight, RESTful DICOM Store |
689 | 3 * Copyright (C) 2012-2014 Medical Physics Department, CHU of Liege, |
0 | 4 * Belgium |
5 * | |
6 * This program is free software: you can redistribute it and/or | |
7 * modify it under the terms of the GNU General Public License as | |
8 * published by the Free Software Foundation, either version 3 of the | |
9 * License, or (at your option) any later version. | |
136 | 10 * |
11 * In addition, as a special exception, the copyright holders of this | |
12 * program give permission to link the code of its release with the | |
13 * OpenSSL project's "OpenSSL" library (or with modified versions of it | |
14 * that use the same license as the "OpenSSL" library), and distribute | |
15 * the linked executables. You must obey the GNU General Public License | |
16 * in all respects for all of the code used other than "OpenSSL". If you | |
17 * modify file(s) with this exception, you may extend this exception to | |
18 * your version of the file(s), but you are not obligated to do so. If | |
19 * you do not wish to do so, delete this exception statement from your | |
20 * version. If you delete this exception statement from all source files | |
21 * in the program, then also delete it here. | |
0 | 22 * |
23 * This program is distributed in the hope that it will be useful, but | |
24 * WITHOUT ANY WARRANTY; without even the implied warranty of | |
25 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
26 * General Public License for more details. | |
27 * | |
28 * You should have received a copy of the GNU General Public License | |
29 * along with this program. If not, see <http://www.gnu.org/licenses/>. | |
30 **/ | |
31 | |
32 | |
33 // http://en.highscore.de/cpp/boost/stringhandling.html | |
34 | |
824
a811bdf8b8eb
precompiled headers
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
809
diff
changeset
|
35 #include "../PrecompiledHeaders.h" |
0 | 36 #include "MongooseServer.h" |
37 | |
38 #include <algorithm> | |
39 #include <string.h> | |
40 #include <boost/lexical_cast.hpp> | |
41 #include <boost/algorithm/string.hpp> | |
42 #include <iostream> | |
43 #include <string.h> | |
44 #include <stdio.h> | |
45 #include <boost/thread.hpp> | |
108 | 46 #include <glog/logging.h> |
0 | 47 |
59 | 48 #include "../OrthancException.h" |
0 | 49 #include "../ChunkedBuffer.h" |
324 | 50 #include "HttpOutput.h" |
0 | 51 #include "mongoose.h" |
52 | |
748
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
53 #if ORTHANC_SSL_ENABLED == 1 |
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
54 #include <openssl/opensslv.h> |
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
55 #endif |
0 | 56 |
59 | 57 #define ORTHANC_REALM "Orthanc Secure Area" |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
58 |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
59 static const long LOCALHOST = (127ll << 24) + 1ll; |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
60 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
61 |
59 | 62 namespace Orthanc |
0 | 63 { |
64 static const char multipart[] = "multipart/form-data; boundary="; | |
65 static unsigned int multipartLength = sizeof(multipart) / sizeof(char) - 1; | |
66 | |
67 | |
68 namespace | |
69 { | |
70 // Anonymous namespace to avoid clashes between compilation modules | |
71 class MongooseOutput : public HttpOutput | |
72 { | |
73 private: | |
74 struct mg_connection* connection_; | |
75 | |
76 public: | |
77 MongooseOutput(struct mg_connection* connection) : connection_(connection) | |
78 { | |
79 } | |
80 | |
81 virtual void Send(const void* buffer, size_t length) | |
82 { | |
217 | 83 if (length > 0) |
84 { | |
85 mg_write(connection_, buffer, length); | |
86 } | |
0 | 87 } |
88 }; | |
89 | |
90 | |
91 enum PostDataStatus | |
92 { | |
93 PostDataStatus_Success, | |
94 PostDataStatus_NoLength, | |
95 PostDataStatus_Pending, | |
96 PostDataStatus_Failure | |
97 }; | |
98 } | |
99 | |
100 | |
101 // TODO Move this to external file | |
102 | |
103 | |
104 class ChunkedFile : public ChunkedBuffer | |
105 { | |
106 private: | |
107 std::string filename_; | |
108 | |
109 public: | |
110 ChunkedFile(const std::string& filename) : | |
111 filename_(filename) | |
112 { | |
113 } | |
114 | |
115 const std::string& GetFilename() const | |
116 { | |
117 return filename_; | |
118 } | |
119 }; | |
120 | |
121 | |
122 | |
123 class ChunkStore | |
124 { | |
125 private: | |
126 typedef std::list<ChunkedFile*> Content; | |
127 Content content_; | |
128 unsigned int numPlaces_; | |
129 | |
130 boost::mutex mutex_; | |
131 std::set<std::string> discardedFiles_; | |
132 | |
133 void Clear() | |
134 { | |
135 for (Content::iterator it = content_.begin(); | |
656 | 136 it != content_.end(); ++it) |
0 | 137 { |
138 delete *it; | |
139 } | |
140 } | |
141 | |
142 Content::iterator Find(const std::string& filename) | |
143 { | |
144 for (Content::iterator it = content_.begin(); | |
656 | 145 it != content_.end(); ++it) |
0 | 146 { |
147 if ((*it)->GetFilename() == filename) | |
148 { | |
149 return it; | |
150 } | |
151 } | |
152 | |
153 return content_.end(); | |
154 } | |
155 | |
156 void Remove(const std::string& filename) | |
157 { | |
158 Content::iterator it = Find(filename); | |
159 if (it != content_.end()) | |
160 { | |
161 delete *it; | |
162 content_.erase(it); | |
163 } | |
164 } | |
165 | |
166 public: | |
167 ChunkStore() | |
168 { | |
169 numPlaces_ = 10; | |
170 } | |
171 | |
172 ~ChunkStore() | |
173 { | |
174 Clear(); | |
175 } | |
176 | |
177 PostDataStatus Store(std::string& completed, | |
178 const char* chunkData, | |
179 size_t chunkSize, | |
180 const std::string& filename, | |
181 size_t filesize) | |
182 { | |
183 boost::mutex::scoped_lock lock(mutex_); | |
184 | |
185 std::set<std::string>::iterator wasDiscarded = discardedFiles_.find(filename); | |
186 if (wasDiscarded != discardedFiles_.end()) | |
187 { | |
188 discardedFiles_.erase(wasDiscarded); | |
189 return PostDataStatus_Failure; | |
190 } | |
191 | |
192 ChunkedFile* f; | |
193 Content::iterator it = Find(filename); | |
194 if (it == content_.end()) | |
195 { | |
196 f = new ChunkedFile(filename); | |
197 | |
198 // Make some room | |
199 if (content_.size() >= numPlaces_) | |
200 { | |
201 discardedFiles_.insert(content_.front()->GetFilename()); | |
202 delete content_.front(); | |
203 content_.pop_front(); | |
204 } | |
205 | |
206 content_.push_back(f); | |
207 } | |
208 else | |
209 { | |
210 f = *it; | |
211 } | |
212 | |
213 f->AddChunk(chunkData, chunkSize); | |
214 | |
215 if (f->GetNumBytes() > filesize) | |
216 { | |
217 Remove(filename); | |
218 } | |
219 else if (f->GetNumBytes() == filesize) | |
220 { | |
221 f->Flatten(completed); | |
222 Remove(filename); | |
223 return PostDataStatus_Success; | |
224 } | |
225 | |
226 return PostDataStatus_Pending; | |
227 } | |
228 | |
229 /*void Print() | |
230 { | |
231 boost::mutex::scoped_lock lock(mutex_); | |
232 | |
233 printf("ChunkStore status:\n"); | |
234 for (Content::const_iterator i = content_.begin(); | |
235 i != content_.end(); i++) | |
236 { | |
237 printf(" [%s]: %d\n", (*i)->GetFilename().c_str(), (*i)->GetNumBytes()); | |
238 } | |
239 printf("-----\n"); | |
240 }*/ | |
241 }; | |
242 | |
243 | |
244 struct MongooseServer::PImpl | |
245 { | |
246 struct mg_context *context_; | |
247 ChunkStore chunkStore_; | |
248 }; | |
249 | |
250 | |
251 ChunkStore& MongooseServer::GetChunkStore() | |
252 { | |
253 return pimpl_->chunkStore_; | |
254 } | |
255 | |
256 | |
257 | |
416 | 258 static PostDataStatus ReadBody(std::string& postData, |
259 struct mg_connection *connection, | |
260 const HttpHandler::Arguments& headers) | |
0 | 261 { |
262 HttpHandler::Arguments::const_iterator cs = headers.find("content-length"); | |
263 if (cs == headers.end()) | |
264 { | |
265 return PostDataStatus_NoLength; | |
266 } | |
267 | |
268 int length; | |
269 try | |
270 { | |
271 length = boost::lexical_cast<int>(cs->second); | |
272 } | |
273 catch (boost::bad_lexical_cast) | |
274 { | |
275 return PostDataStatus_NoLength; | |
276 } | |
277 | |
278 if (length < 0) | |
279 { | |
280 length = 0; | |
281 } | |
282 | |
283 postData.resize(length); | |
284 | |
285 size_t pos = 0; | |
286 while (length > 0) | |
287 { | |
288 int r = mg_read(connection, &postData[pos], length); | |
289 if (r <= 0) | |
290 { | |
291 return PostDataStatus_Failure; | |
292 } | |
418
b79bf2f4ab2e
execution of lua through REST
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
417
diff
changeset
|
293 |
8 | 294 assert(r <= length); |
0 | 295 length -= r; |
296 pos += r; | |
297 } | |
298 | |
299 return PostDataStatus_Success; | |
300 } | |
301 | |
302 | |
303 | |
304 static PostDataStatus ParseMultipartPost(std::string &completedFile, | |
305 struct mg_connection *connection, | |
306 const HttpHandler::Arguments& headers, | |
307 const std::string& contentType, | |
308 ChunkStore& chunkStore) | |
309 { | |
310 std::string boundary = "--" + contentType.substr(multipartLength); | |
311 | |
312 std::string postData; | |
416 | 313 PostDataStatus status = ReadBody(postData, connection, headers); |
0 | 314 |
315 if (status != PostDataStatus_Success) | |
316 { | |
317 return status; | |
318 } | |
319 | |
320 /*for (HttpHandler::Arguments::const_iterator i = headers.begin(); i != headers.end(); i++) | |
321 { | |
322 std::cout << "Header [" << i->first << "] = " << i->second << "\n"; | |
323 } | |
324 printf("CHUNK\n");*/ | |
325 | |
326 typedef HttpHandler::Arguments::const_iterator ArgumentIterator; | |
327 | |
328 ArgumentIterator requestedWith = headers.find("x-requested-with"); | |
329 ArgumentIterator fileName = headers.find("x-file-name"); | |
330 ArgumentIterator fileSizeStr = headers.find("x-file-size"); | |
331 | |
338
3a3b3ba8c1e0
fix for uploads through internet explorer 7
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
333
diff
changeset
|
332 if (requestedWith != headers.end() && |
0 | 333 requestedWith->second != "XMLHttpRequest") |
334 { | |
335 return PostDataStatus_Failure; | |
336 } | |
337 | |
338 size_t fileSize = 0; | |
339 if (fileSizeStr != headers.end()) | |
340 { | |
341 try | |
342 { | |
343 fileSize = boost::lexical_cast<size_t>(fileSizeStr->second); | |
344 } | |
345 catch (boost::bad_lexical_cast) | |
346 { | |
347 return PostDataStatus_Failure; | |
348 } | |
349 } | |
350 | |
351 typedef boost::find_iterator<std::string::iterator> FindIterator; | |
10 | 352 typedef boost::iterator_range<char*> Range; |
0 | 353 |
354 //chunkStore.Print(); | |
355 | |
356 try | |
357 { | |
358 FindIterator last; | |
359 for (FindIterator it = | |
360 make_find_iterator(postData, boost::first_finder(boundary)); | |
361 it!=FindIterator(); | |
362 ++it) | |
363 { | |
364 if (last != FindIterator()) | |
365 { | |
10 | 366 Range part(&last->back(), &it->front()); |
0 | 367 Range content = boost::find_first(part, "\r\n\r\n"); |
345 | 368 if (/*content != Range()*/!content.empty()) |
0 | 369 { |
370 Range c(&content.back() + 1, &it->front() - 2); | |
371 size_t chunkSize = c.size(); | |
372 | |
373 if (chunkSize > 0) | |
374 { | |
375 const char* chunkData = &c.front(); | |
376 | |
377 if (fileName == headers.end()) | |
378 { | |
379 // This file is stored in a single chunk | |
380 completedFile.resize(chunkSize); | |
381 if (chunkSize > 0) | |
382 { | |
383 memcpy(&completedFile[0], chunkData, chunkSize); | |
384 } | |
385 return PostDataStatus_Success; | |
386 } | |
387 else | |
388 { | |
389 return chunkStore.Store(completedFile, chunkData, chunkSize, fileName->second, fileSize); | |
390 } | |
391 } | |
10 | 392 } |
0 | 393 } |
394 | |
395 last = it; | |
396 } | |
397 } | |
398 catch (std::length_error) | |
399 { | |
400 return PostDataStatus_Failure; | |
401 } | |
402 | |
403 return PostDataStatus_Pending; | |
404 } | |
405 | |
406 | |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
407 static void SendUnauthorized(HttpOutput& output) |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
408 { |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
409 std::string s = "HTTP/1.1 401 Unauthorized\r\n" |
59 | 410 "WWW-Authenticate: Basic realm=\"" ORTHANC_REALM "\"" |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
411 "\r\n\r\n"; |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
412 output.Send(&s[0], s.size()); |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
413 } |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
414 |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
415 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
416 static bool Authorize(const MongooseServer& that, |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
417 const HttpHandler::Arguments& headers, |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
418 HttpOutput& output) |
23 | 419 { |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
420 bool granted = false; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
421 |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
422 HttpHandler::Arguments::const_iterator auth = headers.find("authorization"); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
423 if (auth != headers.end()) |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
424 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
425 std::string s = auth->second; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
426 if (s.substr(0, 6) == "Basic ") |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
427 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
428 std::string b64 = s.substr(6); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
429 granted = that.IsValidBasicHttpAuthentication(b64); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
430 } |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
431 } |
23 | 432 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
433 if (!granted) |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
434 { |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
435 SendUnauthorized(output); |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
436 return false; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
437 } |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
438 else |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
439 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
440 return true; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
441 } |
23 | 442 } |
443 | |
444 | |
409
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
445 static std::string GetAuthenticatedUsername(const HttpHandler::Arguments& headers) |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
446 { |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
447 HttpHandler::Arguments::const_iterator auth = headers.find("authorization"); |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
448 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
449 if (auth == headers.end()) |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
450 { |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
451 return ""; |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
452 } |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
453 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
454 std::string s = auth->second; |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
455 if (s.substr(0, 6) != "Basic ") |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
456 { |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
457 return ""; |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
458 } |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
459 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
460 std::string b64 = s.substr(6); |
809
8ce2f69436ca
do not return strings with base64
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
749
diff
changeset
|
461 std::string decoded; |
8ce2f69436ca
do not return strings with base64
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
749
diff
changeset
|
462 Toolbox::DecodeBase64(decoded, b64); |
409
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
463 size_t semicolons = decoded.find(':'); |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
464 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
465 if (semicolons == std::string::npos) |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
466 { |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
467 // Bad-formatted request |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
468 return ""; |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
469 } |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
470 else |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
471 { |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
472 return decoded.substr(0, semicolons); |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
473 } |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
474 } |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
475 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
476 |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
477 static bool ExtractMethod(HttpMethod& method, |
414 | 478 const struct mg_request_info *request, |
479 const HttpHandler::Arguments& headers, | |
480 const HttpHandler::Arguments& argumentsGET) | |
481 { | |
482 std::string overriden; | |
483 | |
484 // Check whether some PUT/DELETE faking is done | |
485 | |
486 // 1. Faking with Google's approach | |
487 HttpHandler::Arguments::const_iterator methodOverride = | |
488 headers.find("x-http-method-override"); | |
489 | |
490 if (methodOverride != headers.end()) | |
491 { | |
492 overriden = methodOverride->second; | |
493 } | |
494 else if (!strcmp(request->request_method, "GET")) | |
495 { | |
496 // 2. Faking with Ruby on Rail's approach | |
497 // GET /my/resource?_method=delete <=> DELETE /my/resource | |
498 methodOverride = argumentsGET.find("_method"); | |
499 if (methodOverride != argumentsGET.end()) | |
500 { | |
501 overriden = methodOverride->second; | |
502 } | |
503 } | |
504 | |
505 if (overriden.size() > 0) | |
506 { | |
507 // A faking has been done within this request | |
508 Toolbox::ToUpperCase(overriden); | |
509 | |
416 | 510 LOG(INFO) << "HTTP method faking has been detected for " << overriden; |
511 | |
414 | 512 if (overriden == "PUT") |
513 { | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
514 method = HttpMethod_Put; |
416 | 515 return true; |
414 | 516 } |
517 else if (overriden == "DELETE") | |
518 { | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
519 method = HttpMethod_Delete; |
416 | 520 return true; |
414 | 521 } |
522 else | |
523 { | |
524 return false; | |
525 } | |
526 } | |
527 | |
528 // No PUT/DELETE faking was present | |
529 if (!strcmp(request->request_method, "GET")) | |
530 { | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
531 method = HttpMethod_Get; |
414 | 532 } |
533 else if (!strcmp(request->request_method, "POST")) | |
534 { | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
535 method = HttpMethod_Post; |
414 | 536 } |
537 else if (!strcmp(request->request_method, "DELETE")) | |
538 { | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
539 method = HttpMethod_Delete; |
414 | 540 } |
541 else if (!strcmp(request->request_method, "PUT")) | |
542 { | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
543 method = HttpMethod_Put; |
414 | 544 } |
545 else | |
546 { | |
547 return false; | |
548 } | |
549 | |
550 return true; | |
551 } | |
552 | |
553 | |
0 | 554 |
555 static void* Callback(enum mg_event event, | |
556 struct mg_connection *connection, | |
557 const struct mg_request_info *request) | |
558 { | |
559 if (event == MG_NEW_REQUEST) | |
560 { | |
656 | 561 MongooseServer* that = reinterpret_cast<MongooseServer*>(request->user_data); |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
562 MongooseOutput output(connection); |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
563 |
414 | 564 // Check remote calls |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
565 if (!that->IsRemoteAccessAllowed() && |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
566 request->remote_ip != LOCALHOST) |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
567 { |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
568 SendUnauthorized(output); |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
569 return (void*) ""; |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
570 } |
0 | 571 |
572 | |
414 | 573 // Extract the HTTP headers |
574 HttpHandler::Arguments headers; | |
0 | 575 for (int i = 0; i < request->num_headers; i++) |
576 { | |
577 std::string name = request->http_headers[i].name; | |
578 std::transform(name.begin(), name.end(), name.begin(), ::tolower); | |
579 headers.insert(std::make_pair(name, request->http_headers[i].value)); | |
580 } | |
581 | |
414 | 582 |
583 // Extract the GET arguments | |
584 HttpHandler::Arguments argumentsGET; | |
585 if (!strcmp(request->request_method, "GET")) | |
586 { | |
587 HttpHandler::ParseGetQuery(argumentsGET, request->query_string); | |
588 } | |
589 | |
590 | |
591 // Compute the HTTP method, taking method faking into consideration | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
592 HttpMethod method; |
414 | 593 if (!ExtractMethod(method, request, headers, argumentsGET)) |
594 { | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
595 output.SendHeader(HttpStatus_400_BadRequest); |
414 | 596 return (void*) ""; |
597 } | |
598 | |
599 | |
23 | 600 // Authenticate this connection |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
601 if (that->IsAuthenticationEnabled() && |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
602 !Authorize(*that, headers, output)) |
23 | 603 { |
604 return (void*) ""; | |
605 } | |
606 | |
409
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
607 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
608 // Apply the filter, if it is installed |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
609 const IIncomingHttpRequestFilter *filter = that->GetIncomingHttpRequestFilter(); |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
610 if (filter != NULL) |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
611 { |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
612 std::string username = GetAuthenticatedUsername(headers); |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
613 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
614 char remoteIp[24]; |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
615 sprintf(remoteIp, "%d.%d.%d.%d", |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
616 reinterpret_cast<const uint8_t*>(&request->remote_ip) [3], |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
617 reinterpret_cast<const uint8_t*>(&request->remote_ip) [2], |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
618 reinterpret_cast<const uint8_t*>(&request->remote_ip) [1], |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
619 reinterpret_cast<const uint8_t*>(&request->remote_ip) [0]); |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
620 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
621 if (!filter->IsAllowed(method, request->uri, remoteIp, username.c_str())) |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
622 { |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
623 SendUnauthorized(output); |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
624 return (void*) ""; |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
625 } |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
626 } |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
627 |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
628 |
414 | 629 // Extract the body of the request for PUT and POST |
630 std::string body; | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
631 if (method == HttpMethod_Post || |
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
632 method == HttpMethod_Put) |
0 | 633 { |
416 | 634 PostDataStatus status; |
635 | |
0 | 636 HttpHandler::Arguments::const_iterator ct = headers.find("content-type"); |
637 if (ct == headers.end()) | |
638 { | |
416 | 639 // No content-type specified. Assume no multi-part content occurs at this point. |
640 status = ReadBody(body, connection, headers); | |
0 | 641 } |
642 else | |
643 { | |
416 | 644 std::string contentType = ct->second; |
645 if (contentType.size() >= multipartLength && | |
646 !memcmp(contentType.c_str(), multipart, multipartLength)) | |
647 { | |
648 status = ParseMultipartPost(body, connection, headers, contentType, that->GetChunkStore()); | |
649 } | |
650 else | |
651 { | |
652 status = ReadBody(body, connection, headers); | |
653 } | |
0 | 654 } |
655 | |
656 switch (status) | |
657 { | |
416 | 658 case PostDataStatus_NoLength: |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
659 output.SendHeader(HttpStatus_411_LengthRequired); |
416 | 660 return (void*) ""; |
0 | 661 |
416 | 662 case PostDataStatus_Failure: |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
663 output.SendHeader(HttpStatus_400_BadRequest); |
416 | 664 return (void*) ""; |
0 | 665 |
416 | 666 case PostDataStatus_Pending: |
667 output.AnswerBufferWithContentType(NULL, 0, ""); | |
668 return (void*) ""; | |
0 | 669 |
416 | 670 default: |
671 break; | |
0 | 672 } |
673 } | |
674 | |
414 | 675 |
896 | 676 // Decompose the URI into its components |
0 | 677 UriComponents uri; |
415 | 678 try |
679 { | |
680 Toolbox::SplitUriComponents(uri, request->uri); | |
681 } | |
682 catch (OrthancException) | |
683 { | |
473
c9a5d72f8481
changing the namespace of HTTP enumerations
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
418
diff
changeset
|
684 output.SendHeader(HttpStatus_400_BadRequest); |
415 | 685 return (void*) ""; |
686 } | |
687 | |
0 | 688 |
901
7d88f3f4a3b3
refactoring IsServedUri, answer PNG images, regular expression groups
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
899
diff
changeset
|
689 // Loop over the candidate handlers for this URI |
896 | 690 LOG(INFO) << EnumerationToString(method) << " " << Toolbox::FlattenUri(uri); |
895
7e8cde5905fd
allow superposition of REST handlers
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
824
diff
changeset
|
691 bool found = false; |
896 | 692 bool isError = false; |
693 HttpStatus errorStatus; | |
694 std::string errorDescription; | |
895
7e8cde5905fd
allow superposition of REST handlers
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
824
diff
changeset
|
695 |
901
7d88f3f4a3b3
refactoring IsServedUri, answer PNG images, regular expression groups
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
899
diff
changeset
|
696 for (MongooseServer::Handlers::const_iterator it = |
7d88f3f4a3b3
refactoring IsServedUri, answer PNG images, regular expression groups
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
899
diff
changeset
|
697 that->GetHandlers().begin(); it != that->GetHandlers().end(); ++it) |
0 | 698 { |
699 try | |
700 { | |
895
7e8cde5905fd
allow superposition of REST handlers
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
824
diff
changeset
|
701 found = (*it)->Handle(output, method, uri, headers, argumentsGET, body); |
0 | 702 } |
59 | 703 catch (OrthancException& e) |
0 | 704 { |
896 | 705 // Using this candidate handler results in an exception, try |
706 // another handler before failing | |
707 isError = true; | |
708 errorStatus = HttpStatus_500_InternalServerError; | |
709 errorDescription = e.What(); | |
0 | 710 } |
327
4564e908bba9
handling of bad lexical casts in http server
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
324
diff
changeset
|
711 catch (boost::bad_lexical_cast&) |
4564e908bba9
handling of bad lexical casts in http server
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
324
diff
changeset
|
712 { |
896 | 713 isError = true; |
714 errorStatus = HttpStatus_400_BadRequest; | |
715 errorDescription = "Bad lexical cast"; | |
333 | 716 } |
717 catch (std::runtime_error&) | |
718 { | |
896 | 719 isError = true; |
720 errorStatus = HttpStatus_400_BadRequest; | |
721 errorDescription = "Presumably a bad JSON request"; | |
327
4564e908bba9
handling of bad lexical casts in http server
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
324
diff
changeset
|
722 } |
0 | 723 } |
895
7e8cde5905fd
allow superposition of REST handlers
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
824
diff
changeset
|
724 |
7e8cde5905fd
allow superposition of REST handlers
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
824
diff
changeset
|
725 if (!found) |
0 | 726 { |
896 | 727 if (isError) |
728 { | |
729 LOG(ERROR) << "Exception in the HTTP handler: " << errorDescription; | |
730 output.SendHeader(errorStatus); | |
731 } | |
732 else | |
733 { | |
734 output.SendHeader(HttpStatus_404_NotFound); | |
735 } | |
0 | 736 } |
737 | |
896 | 738 |
0 | 739 // Mark as processed |
740 return (void*) ""; | |
741 } | |
742 else | |
743 { | |
744 return NULL; | |
745 } | |
746 } | |
747 | |
748 | |
749 bool MongooseServer::IsRunning() const | |
750 { | |
751 return (pimpl_->context_ != NULL); | |
752 } | |
753 | |
754 | |
755 MongooseServer::MongooseServer() : pimpl_(new PImpl) | |
756 { | |
757 pimpl_->context_ = NULL; | |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
758 remoteAllowed_ = false; |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
759 authentication_ = false; |
23 | 760 ssl_ = false; |
0 | 761 port_ = 8000; |
417 | 762 filter_ = NULL; |
748
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
763 |
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
764 #if ORTHANC_SSL_ENABLED == 1 |
749 | 765 // Check for the Heartbleed exploit |
748
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
766 // https://en.wikipedia.org/wiki/OpenSSL#Heartbleed_bug |
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
767 if (OPENSSL_VERSION_NUMBER < 0x1000107fL /* openssl-1.0.1g */ && |
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
768 OPENSSL_VERSION_NUMBER >= 0x1000100fL /* openssl-1.0.1 */) |
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
769 { |
749 | 770 LOG(WARNING) << "This version of OpenSSL is vulnerable to the Heartbleed exploit"; |
748
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
771 } |
de9763f63510
upgrade to openssl-1.0.1g because of heartbeat exploit
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
689
diff
changeset
|
772 #endif |
0 | 773 } |
774 | |
775 | |
776 MongooseServer::~MongooseServer() | |
777 { | |
778 Stop(); | |
779 ClearHandlers(); | |
780 } | |
781 | |
782 | |
128 | 783 void MongooseServer::SetPortNumber(uint16_t port) |
0 | 784 { |
785 Stop(); | |
786 port_ = port; | |
787 } | |
788 | |
789 void MongooseServer::Start() | |
790 { | |
791 if (!IsRunning()) | |
792 { | |
793 std::string port = boost::lexical_cast<std::string>(port_); | |
794 | |
23 | 795 if (ssl_) |
796 { | |
797 port += "s"; | |
798 } | |
799 | |
0 | 800 const char *options[] = { |
801 "listening_ports", port.c_str(), | |
23 | 802 ssl_ ? "ssl_certificate" : NULL, |
803 certificate_.c_str(), | |
0 | 804 NULL |
805 }; | |
806 | |
807 pimpl_->context_ = mg_start(&Callback, this, options); | |
808 if (!pimpl_->context_) | |
809 { | |
59 | 810 throw OrthancException("Unable to launch the Mongoose server"); |
0 | 811 } |
812 } | |
813 } | |
814 | |
815 void MongooseServer::Stop() | |
816 { | |
817 if (IsRunning()) | |
818 { | |
819 mg_stop(pimpl_->context_); | |
820 pimpl_->context_ = NULL; | |
821 } | |
822 } | |
823 | |
824 | |
899 | 825 void MongooseServer::RegisterHandler(HttpHandler& handler) |
0 | 826 { |
827 Stop(); | |
828 | |
899 | 829 handlers_.push_back(&handler); |
0 | 830 } |
831 | |
832 | |
833 void MongooseServer::ClearHandlers() | |
834 { | |
835 Stop(); | |
836 } | |
837 | |
23 | 838 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
839 void MongooseServer::ClearUsers() |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
840 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
841 Stop(); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
842 registeredUsers_.clear(); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
843 } |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
844 |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
845 |
23 | 846 void MongooseServer::RegisterUser(const char* username, |
847 const char* password) | |
848 { | |
849 Stop(); | |
24 | 850 |
851 std::string tag = std::string(username) + ":" + std::string(password); | |
809
8ce2f69436ca
do not return strings with base64
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
749
diff
changeset
|
852 std::string encoded; |
8ce2f69436ca
do not return strings with base64
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
749
diff
changeset
|
853 Toolbox::EncodeBase64(encoded, tag); |
8ce2f69436ca
do not return strings with base64
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
749
diff
changeset
|
854 registeredUsers_.insert(encoded); |
23 | 855 } |
856 | |
857 void MongooseServer::SetSslEnabled(bool enabled) | |
858 { | |
859 Stop(); | |
860 | |
59 | 861 #if ORTHANC_SSL_ENABLED == 0 |
23 | 862 if (enabled) |
863 { | |
59 | 864 throw OrthancException("Orthanc has been built without SSL support"); |
23 | 865 } |
866 else | |
867 { | |
868 ssl_ = false; | |
869 } | |
870 #else | |
871 ssl_ = enabled; | |
872 #endif | |
873 } | |
874 | |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
875 void MongooseServer::SetAuthenticationEnabled(bool enabled) |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
876 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
877 Stop(); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
878 authentication_ = enabled; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
879 } |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
880 |
23 | 881 void MongooseServer::SetSslCertificate(const char* path) |
882 { | |
883 Stop(); | |
884 certificate_ = path; | |
885 } | |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
886 |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
887 void MongooseServer::SetRemoteAccessAllowed(bool allowed) |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
888 { |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
889 Stop(); |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
890 remoteAllowed_ = allowed; |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
891 } |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
892 |
409
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
893 void MongooseServer::SetIncomingHttpRequestFilter(IIncomingHttpRequestFilter& filter) |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
894 { |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
895 Stop(); |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
896 filter_ = &filter; |
63f707278fc8
lua filtering of incoming http requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
398
diff
changeset
|
897 } |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
898 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
899 bool MongooseServer::IsValidBasicHttpAuthentication(const std::string& basic) const |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
900 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
901 return registeredUsers_.find(basic) != registeredUsers_.end(); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
902 } |
0 | 903 } |