Mercurial > hg > orthanc
annotate Core/HttpServer/MongooseServer.cpp @ 115:97d92e25c961
improvements
author | Sebastien Jodogne <s.jodogne@gmail.com> |
---|---|
date | Thu, 04 Oct 2012 14:48:23 +0200 |
parents | a6e41de88a53 |
children | 2a24f43d9dca |
rev | line source |
---|---|
0 | 1 /** |
59 | 2 * Orthanc - A Lightweight, RESTful DICOM Store |
0 | 3 * Copyright (C) 2012 Medical Physics Department, CHU of Liege, |
4 * Belgium | |
5 * | |
6 * This program is free software: you can redistribute it and/or | |
7 * modify it under the terms of the GNU General Public License as | |
8 * published by the Free Software Foundation, either version 3 of the | |
9 * License, or (at your option) any later version. | |
10 * | |
11 * This program is distributed in the hope that it will be useful, but | |
12 * WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
14 * General Public License for more details. | |
15 * | |
16 * You should have received a copy of the GNU General Public License | |
17 * along with this program. If not, see <http://www.gnu.org/licenses/>. | |
18 **/ | |
19 | |
20 | |
21 // http://en.highscore.de/cpp/boost/stringhandling.html | |
22 | |
23 #include "MongooseServer.h" | |
24 | |
25 #include <algorithm> | |
26 #include <string.h> | |
27 #include <boost/lexical_cast.hpp> | |
28 #include <boost/algorithm/string.hpp> | |
29 #include <iostream> | |
30 #include <string.h> | |
31 #include <stdio.h> | |
32 #include <boost/thread.hpp> | |
108 | 33 #include <glog/logging.h> |
0 | 34 |
59 | 35 #include "../OrthancException.h" |
0 | 36 #include "../ChunkedBuffer.h" |
37 #include "mongoose.h" | |
38 | |
39 | |
59 | 40 #define ORTHANC_REALM "Orthanc Secure Area" |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
41 |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
42 static const long LOCALHOST = (127ll << 24) + 1ll; |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
43 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
44 |
59 | 45 namespace Orthanc |
0 | 46 { |
47 static const char multipart[] = "multipart/form-data; boundary="; | |
48 static unsigned int multipartLength = sizeof(multipart) / sizeof(char) - 1; | |
49 | |
50 | |
51 namespace | |
52 { | |
53 // Anonymous namespace to avoid clashes between compilation modules | |
54 class MongooseOutput : public HttpOutput | |
55 { | |
56 private: | |
57 struct mg_connection* connection_; | |
58 | |
59 public: | |
60 MongooseOutput(struct mg_connection* connection) : connection_(connection) | |
61 { | |
62 } | |
63 | |
64 virtual void Send(const void* buffer, size_t length) | |
65 { | |
66 mg_write(connection_, buffer, length); | |
67 } | |
68 }; | |
69 | |
70 | |
71 enum PostDataStatus | |
72 { | |
73 PostDataStatus_Success, | |
74 PostDataStatus_NoLength, | |
75 PostDataStatus_Pending, | |
76 PostDataStatus_Failure | |
77 }; | |
78 } | |
79 | |
80 | |
81 // TODO Move this to external file | |
82 | |
83 | |
84 class ChunkedFile : public ChunkedBuffer | |
85 { | |
86 private: | |
87 std::string filename_; | |
88 | |
89 public: | |
90 ChunkedFile(const std::string& filename) : | |
91 filename_(filename) | |
92 { | |
93 } | |
94 | |
95 const std::string& GetFilename() const | |
96 { | |
97 return filename_; | |
98 } | |
99 }; | |
100 | |
101 | |
102 | |
103 class ChunkStore | |
104 { | |
105 private: | |
106 typedef std::list<ChunkedFile*> Content; | |
107 Content content_; | |
108 unsigned int numPlaces_; | |
109 | |
110 boost::mutex mutex_; | |
111 std::set<std::string> discardedFiles_; | |
112 | |
113 void Clear() | |
114 { | |
115 for (Content::iterator it = content_.begin(); | |
116 it != content_.end(); it++) | |
117 { | |
118 delete *it; | |
119 } | |
120 } | |
121 | |
122 Content::iterator Find(const std::string& filename) | |
123 { | |
124 for (Content::iterator it = content_.begin(); | |
125 it != content_.end(); it++) | |
126 { | |
127 if ((*it)->GetFilename() == filename) | |
128 { | |
129 return it; | |
130 } | |
131 } | |
132 | |
133 return content_.end(); | |
134 } | |
135 | |
136 void Remove(const std::string& filename) | |
137 { | |
138 Content::iterator it = Find(filename); | |
139 if (it != content_.end()) | |
140 { | |
141 delete *it; | |
142 content_.erase(it); | |
143 } | |
144 } | |
145 | |
146 public: | |
147 ChunkStore() | |
148 { | |
149 numPlaces_ = 10; | |
150 } | |
151 | |
152 ~ChunkStore() | |
153 { | |
154 Clear(); | |
155 } | |
156 | |
157 PostDataStatus Store(std::string& completed, | |
158 const char* chunkData, | |
159 size_t chunkSize, | |
160 const std::string& filename, | |
161 size_t filesize) | |
162 { | |
163 boost::mutex::scoped_lock lock(mutex_); | |
164 | |
165 std::set<std::string>::iterator wasDiscarded = discardedFiles_.find(filename); | |
166 if (wasDiscarded != discardedFiles_.end()) | |
167 { | |
168 discardedFiles_.erase(wasDiscarded); | |
169 return PostDataStatus_Failure; | |
170 } | |
171 | |
172 ChunkedFile* f; | |
173 Content::iterator it = Find(filename); | |
174 if (it == content_.end()) | |
175 { | |
176 f = new ChunkedFile(filename); | |
177 | |
178 // Make some room | |
179 if (content_.size() >= numPlaces_) | |
180 { | |
181 discardedFiles_.insert(content_.front()->GetFilename()); | |
182 delete content_.front(); | |
183 content_.pop_front(); | |
184 } | |
185 | |
186 content_.push_back(f); | |
187 } | |
188 else | |
189 { | |
190 f = *it; | |
191 } | |
192 | |
193 f->AddChunk(chunkData, chunkSize); | |
194 | |
195 if (f->GetNumBytes() > filesize) | |
196 { | |
197 Remove(filename); | |
198 } | |
199 else if (f->GetNumBytes() == filesize) | |
200 { | |
201 f->Flatten(completed); | |
202 Remove(filename); | |
203 return PostDataStatus_Success; | |
204 } | |
205 | |
206 return PostDataStatus_Pending; | |
207 } | |
208 | |
209 /*void Print() | |
210 { | |
211 boost::mutex::scoped_lock lock(mutex_); | |
212 | |
213 printf("ChunkStore status:\n"); | |
214 for (Content::const_iterator i = content_.begin(); | |
215 i != content_.end(); i++) | |
216 { | |
217 printf(" [%s]: %d\n", (*i)->GetFilename().c_str(), (*i)->GetNumBytes()); | |
218 } | |
219 printf("-----\n"); | |
220 }*/ | |
221 }; | |
222 | |
223 | |
224 struct MongooseServer::PImpl | |
225 { | |
226 struct mg_context *context_; | |
227 ChunkStore chunkStore_; | |
228 }; | |
229 | |
230 | |
231 ChunkStore& MongooseServer::GetChunkStore() | |
232 { | |
233 return pimpl_->chunkStore_; | |
234 } | |
235 | |
236 | |
237 | |
238 HttpHandler* MongooseServer::FindHandler(const UriComponents& forUri) const | |
239 { | |
240 for (Handlers::const_iterator it = | |
241 handlers_.begin(); it != handlers_.end(); it++) | |
242 { | |
243 if ((*it)->IsServedUri(forUri)) | |
244 { | |
245 return *it; | |
246 } | |
247 } | |
248 | |
249 return NULL; | |
250 } | |
251 | |
252 | |
253 | |
254 | |
255 static PostDataStatus ReadPostData(std::string& postData, | |
256 struct mg_connection *connection, | |
257 const HttpHandler::Arguments& headers) | |
258 { | |
259 HttpHandler::Arguments::const_iterator cs = headers.find("content-length"); | |
260 if (cs == headers.end()) | |
261 { | |
262 return PostDataStatus_NoLength; | |
263 } | |
264 | |
265 int length; | |
266 try | |
267 { | |
268 length = boost::lexical_cast<int>(cs->second); | |
269 } | |
270 catch (boost::bad_lexical_cast) | |
271 { | |
272 return PostDataStatus_NoLength; | |
273 } | |
274 | |
275 if (length < 0) | |
276 { | |
277 length = 0; | |
278 } | |
279 | |
280 postData.resize(length); | |
281 | |
282 size_t pos = 0; | |
283 while (length > 0) | |
284 { | |
285 int r = mg_read(connection, &postData[pos], length); | |
286 if (r <= 0) | |
287 { | |
288 return PostDataStatus_Failure; | |
289 } | |
8 | 290 assert(r <= length); |
0 | 291 length -= r; |
292 pos += r; | |
293 } | |
294 | |
295 return PostDataStatus_Success; | |
296 } | |
297 | |
298 | |
299 | |
300 static PostDataStatus ParseMultipartPost(std::string &completedFile, | |
301 struct mg_connection *connection, | |
302 const HttpHandler::Arguments& headers, | |
303 const std::string& contentType, | |
304 ChunkStore& chunkStore) | |
305 { | |
306 std::string boundary = "--" + contentType.substr(multipartLength); | |
307 | |
308 std::string postData; | |
309 PostDataStatus status = ReadPostData(postData, connection, headers); | |
310 | |
311 if (status != PostDataStatus_Success) | |
312 { | |
313 return status; | |
314 } | |
315 | |
316 /*for (HttpHandler::Arguments::const_iterator i = headers.begin(); i != headers.end(); i++) | |
317 { | |
318 std::cout << "Header [" << i->first << "] = " << i->second << "\n"; | |
319 } | |
320 printf("CHUNK\n");*/ | |
321 | |
322 typedef HttpHandler::Arguments::const_iterator ArgumentIterator; | |
323 | |
324 ArgumentIterator requestedWith = headers.find("x-requested-with"); | |
325 ArgumentIterator fileName = headers.find("x-file-name"); | |
326 ArgumentIterator fileSizeStr = headers.find("x-file-size"); | |
327 | |
328 if (requestedWith == headers.end() || | |
329 requestedWith->second != "XMLHttpRequest") | |
330 { | |
331 return PostDataStatus_Failure; | |
332 } | |
333 | |
334 size_t fileSize = 0; | |
335 if (fileSizeStr != headers.end()) | |
336 { | |
337 try | |
338 { | |
339 fileSize = boost::lexical_cast<size_t>(fileSizeStr->second); | |
340 } | |
341 catch (boost::bad_lexical_cast) | |
342 { | |
343 return PostDataStatus_Failure; | |
344 } | |
345 } | |
346 | |
347 typedef boost::find_iterator<std::string::iterator> FindIterator; | |
10 | 348 typedef boost::iterator_range<char*> Range; |
0 | 349 |
350 //chunkStore.Print(); | |
351 | |
352 try | |
353 { | |
354 FindIterator last; | |
355 for (FindIterator it = | |
356 make_find_iterator(postData, boost::first_finder(boundary)); | |
357 it!=FindIterator(); | |
358 ++it) | |
359 { | |
360 if (last != FindIterator()) | |
361 { | |
10 | 362 Range part(&last->back(), &it->front()); |
0 | 363 Range content = boost::find_first(part, "\r\n\r\n"); |
364 if (content != Range()) | |
365 { | |
366 Range c(&content.back() + 1, &it->front() - 2); | |
367 size_t chunkSize = c.size(); | |
368 | |
369 if (chunkSize > 0) | |
370 { | |
371 const char* chunkData = &c.front(); | |
372 | |
373 if (fileName == headers.end()) | |
374 { | |
375 // This file is stored in a single chunk | |
376 completedFile.resize(chunkSize); | |
377 if (chunkSize > 0) | |
378 { | |
379 memcpy(&completedFile[0], chunkData, chunkSize); | |
380 } | |
381 return PostDataStatus_Success; | |
382 } | |
383 else | |
384 { | |
385 return chunkStore.Store(completedFile, chunkData, chunkSize, fileName->second, fileSize); | |
386 } | |
387 } | |
10 | 388 } |
0 | 389 } |
390 | |
391 last = it; | |
392 } | |
393 } | |
394 catch (std::length_error) | |
395 { | |
396 return PostDataStatus_Failure; | |
397 } | |
398 | |
399 return PostDataStatus_Pending; | |
400 } | |
401 | |
402 | |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
403 static void SendUnauthorized(HttpOutput& output) |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
404 { |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
405 std::string s = "HTTP/1.1 401 Unauthorized\r\n" |
59 | 406 "WWW-Authenticate: Basic realm=\"" ORTHANC_REALM "\"" |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
407 "\r\n\r\n"; |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
408 output.Send(&s[0], s.size()); |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
409 } |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
410 |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
411 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
412 static bool Authorize(const MongooseServer& that, |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
413 const HttpHandler::Arguments& headers, |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
414 HttpOutput& output) |
23 | 415 { |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
416 bool granted = false; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
417 |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
418 HttpHandler::Arguments::const_iterator auth = headers.find("authorization"); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
419 if (auth != headers.end()) |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
420 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
421 std::string s = auth->second; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
422 if (s.substr(0, 6) == "Basic ") |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
423 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
424 std::string b64 = s.substr(6); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
425 granted = that.IsValidBasicHttpAuthentication(b64); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
426 } |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
427 } |
23 | 428 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
429 if (!granted) |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
430 { |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
431 SendUnauthorized(output); |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
432 return false; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
433 } |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
434 else |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
435 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
436 return true; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
437 } |
23 | 438 } |
439 | |
440 | |
0 | 441 |
442 static void* Callback(enum mg_event event, | |
443 struct mg_connection *connection, | |
444 const struct mg_request_info *request) | |
445 { | |
446 if (event == MG_NEW_REQUEST) | |
447 { | |
448 MongooseServer* that = (MongooseServer*) (request->user_data); | |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
449 MongooseOutput output(connection); |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
450 |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
451 if (!that->IsRemoteAccessAllowed() && |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
452 request->remote_ip != LOCALHOST) |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
453 { |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
454 SendUnauthorized(output); |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
455 return (void*) ""; |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
456 } |
0 | 457 |
458 HttpHandler::Arguments arguments, headers; | |
459 | |
460 for (int i = 0; i < request->num_headers; i++) | |
461 { | |
462 std::string name = request->http_headers[i].name; | |
463 std::transform(name.begin(), name.end(), name.begin(), ::tolower); | |
464 headers.insert(std::make_pair(name, request->http_headers[i].value)); | |
465 } | |
466 | |
23 | 467 // Authenticate this connection |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
468 if (that->IsAuthenticationEnabled() && |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
469 !Authorize(*that, headers, output)) |
23 | 470 { |
471 return (void*) ""; | |
472 } | |
473 | |
0 | 474 std::string postData; |
475 | |
476 if (!strcmp(request->request_method, "GET")) | |
477 { | |
478 HttpHandler::ParseGetQuery(arguments, request->query_string); | |
479 } | |
480 else if (!strcmp(request->request_method, "POST")) | |
481 { | |
482 HttpHandler::Arguments::const_iterator ct = headers.find("content-type"); | |
483 if (ct == headers.end()) | |
484 { | |
59 | 485 output.SendHeader(Orthanc_HttpStatus_400_BadRequest); |
0 | 486 return (void*) ""; |
487 } | |
488 | |
489 PostDataStatus status; | |
490 | |
491 std::string contentType = ct->second; | |
492 if (contentType.size() >= multipartLength && | |
493 !memcmp(contentType.c_str(), multipart, multipartLength)) | |
494 { | |
495 status = ParseMultipartPost(postData, connection, headers, contentType, that->GetChunkStore()); | |
496 } | |
497 else | |
498 { | |
499 status = ReadPostData(postData, connection, headers); | |
500 } | |
501 | |
502 switch (status) | |
503 { | |
504 case PostDataStatus_NoLength: | |
59 | 505 output.SendHeader(Orthanc_HttpStatus_411_LengthRequired); |
0 | 506 return (void*) ""; |
507 | |
508 case PostDataStatus_Failure: | |
59 | 509 output.SendHeader(Orthanc_HttpStatus_400_BadRequest); |
0 | 510 return (void*) ""; |
511 | |
512 case PostDataStatus_Pending: | |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
513 output.AnswerBuffer(""); |
0 | 514 return (void*) ""; |
515 | |
516 default: | |
517 break; | |
518 } | |
519 } | |
520 | |
521 UriComponents uri; | |
522 Toolbox::SplitUriComponents(uri, request->uri); | |
523 | |
524 HttpHandler* handler = that->FindHandler(uri); | |
525 if (handler) | |
526 { | |
527 try | |
528 { | |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
529 handler->Handle(output, std::string(request->request_method), |
0 | 530 uri, headers, arguments, postData); |
531 } | |
59 | 532 catch (OrthancException& e) |
0 | 533 { |
108 | 534 LOG(ERROR) << "MongooseServer Exception [" << e.What() << "]"; |
59 | 535 output.SendHeader(Orthanc_HttpStatus_500_InternalServerError); |
0 | 536 } |
537 } | |
538 else | |
539 { | |
59 | 540 output.SendHeader(Orthanc_HttpStatus_404_NotFound); |
0 | 541 } |
542 | |
543 // Mark as processed | |
544 return (void*) ""; | |
545 } | |
546 else | |
547 { | |
548 return NULL; | |
549 } | |
550 } | |
551 | |
552 | |
553 bool MongooseServer::IsRunning() const | |
554 { | |
555 return (pimpl_->context_ != NULL); | |
556 } | |
557 | |
558 | |
559 MongooseServer::MongooseServer() : pimpl_(new PImpl) | |
560 { | |
561 pimpl_->context_ = NULL; | |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
562 remoteAllowed_ = false; |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
563 authentication_ = false; |
23 | 564 ssl_ = false; |
0 | 565 port_ = 8000; |
566 } | |
567 | |
568 | |
569 MongooseServer::~MongooseServer() | |
570 { | |
571 Stop(); | |
572 ClearHandlers(); | |
573 } | |
574 | |
575 | |
576 void MongooseServer::SetPort(uint16_t port) | |
577 { | |
578 Stop(); | |
579 port_ = port; | |
580 } | |
581 | |
582 void MongooseServer::Start() | |
583 { | |
584 if (!IsRunning()) | |
585 { | |
586 std::string port = boost::lexical_cast<std::string>(port_); | |
587 | |
23 | 588 if (ssl_) |
589 { | |
590 port += "s"; | |
591 } | |
592 | |
0 | 593 const char *options[] = { |
594 "listening_ports", port.c_str(), | |
23 | 595 ssl_ ? "ssl_certificate" : NULL, |
596 certificate_.c_str(), | |
0 | 597 NULL |
598 }; | |
599 | |
600 pimpl_->context_ = mg_start(&Callback, this, options); | |
601 if (!pimpl_->context_) | |
602 { | |
59 | 603 throw OrthancException("Unable to launch the Mongoose server"); |
0 | 604 } |
605 } | |
606 } | |
607 | |
608 void MongooseServer::Stop() | |
609 { | |
610 if (IsRunning()) | |
611 { | |
612 mg_stop(pimpl_->context_); | |
613 pimpl_->context_ = NULL; | |
614 } | |
615 } | |
616 | |
617 | |
618 void MongooseServer::RegisterHandler(HttpHandler* handler) | |
619 { | |
620 Stop(); | |
621 | |
622 handlers_.push_back(handler); | |
623 } | |
624 | |
625 | |
626 void MongooseServer::ClearHandlers() | |
627 { | |
628 Stop(); | |
629 | |
630 for (Handlers::iterator it = | |
631 handlers_.begin(); it != handlers_.end(); it++) | |
632 { | |
633 delete *it; | |
634 } | |
635 } | |
636 | |
23 | 637 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
638 void MongooseServer::ClearUsers() |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
639 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
640 Stop(); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
641 registeredUsers_.clear(); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
642 } |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
643 |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
644 |
23 | 645 void MongooseServer::RegisterUser(const char* username, |
646 const char* password) | |
647 { | |
648 Stop(); | |
24 | 649 |
650 std::string tag = std::string(username) + ":" + std::string(password); | |
651 registeredUsers_.insert(Toolbox::EncodeBase64(tag)); | |
23 | 652 } |
653 | |
654 void MongooseServer::SetSslEnabled(bool enabled) | |
655 { | |
656 Stop(); | |
657 | |
59 | 658 #if ORTHANC_SSL_ENABLED == 0 |
23 | 659 if (enabled) |
660 { | |
59 | 661 throw OrthancException("Orthanc has been built without SSL support"); |
23 | 662 } |
663 else | |
664 { | |
665 ssl_ = false; | |
666 } | |
667 #else | |
668 ssl_ = enabled; | |
669 #endif | |
670 } | |
671 | |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
672 void MongooseServer::SetAuthenticationEnabled(bool enabled) |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
673 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
674 Stop(); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
675 authentication_ = enabled; |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
676 } |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
677 |
23 | 678 void MongooseServer::SetSslCertificate(const char* path) |
679 { | |
680 Stop(); | |
681 certificate_ = path; | |
682 } | |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
683 |
34
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
684 void MongooseServer::SetRemoteAccessAllowed(bool allowed) |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
685 { |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
686 Stop(); |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
687 remoteAllowed_ = allowed; |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
688 } |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
689 |
96e57b863dd9
option to disallow remote access
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
25
diff
changeset
|
690 |
25
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
691 bool MongooseServer::IsValidBasicHttpAuthentication(const std::string& basic) const |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
692 { |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
693 return registeredUsers_.find(basic) != registeredUsers_.end(); |
dd1489098265
basic http authentication
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
24
diff
changeset
|
694 } |
0 | 695 } |