1 # -*- coding: utf-8 -*-
3 # Copyright P. Christeas <p_christ@hol.gr> 2008,2009
4 # A part of the code comes from the ganeti project: http://www.mail-archive.com/ganeti-devel@googlegroups.com/msg00713.html#
6 # WARNING: This program as such is intended to be used by professional
7 # programmers who take the whole responsability of assessing all potential
8 # consequences resulting from its eventual inadequacies and bugs
9 # End users who are looking for a ready-to-use solution with commercial
10 # garantees and support are strongly adviced to contract a Free Software
13 # This program is Free Software; you can redistribute it and/or
14 # modify it under the terms of the GNU General Public License
15 # as published by the Free Software Foundation; either version 2
16 # of the License, or (at your option) any later version.
18 # This program is distributed in the hope that it will be useful,
19 # but WITHOUT ANY WARRANTY; without even the implied warranty of
20 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 # GNU General Public License for more details.
23 # You should have received a copy of the GNU General Public License
24 # along with this program; if not, write to the Free Software
25 # Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
26 ###############################################################################
28 """ Framework for generic http servers
35 from BaseHTTPServer import *
36 from SimpleHTTPServer import SimpleHTTPRequestHandler
38 class AuthRequiredExc(Exception):
39 def __init__(self,atype,realm):
40 Exception.__init__(self)
44 class AuthRejectedExc(Exception):
48 def __init__(self,realm):
51 def setupAuth(self, multi,handler):
52 """ Attach an AuthProxy object to handler
56 def authenticate(self, user, passwd, client_address):
62 class BasicAuthProvider(AuthProvider):
63 def setupAuth(self, multi, handler):
64 if not multi.sec_realms.has_key(self.realm):
65 multi.sec_realms[self.realm] = BasicAuthProxy(self)
69 """ This class will hold authentication information for a handler,
72 def __init__(self, provider):
73 self.provider = provider
75 def checkRequest(self,handler,path = '/'):
76 """ Check if we are allowed to process that request
80 class BasicAuthProxy(AuthProxy):
81 """ Require basic authentication..
83 def __init__(self,provider):
84 AuthProxy.__init__(self,provider)
85 self.auth_creds = None
88 def checkRequest(self,handler,path = '/'):
91 auth_str = handler.headers.get('Authorization',False)
92 if auth_str and auth_str.startswith('Basic '):
93 auth_str=auth_str[len('Basic '):]
94 (user,passwd) = base64.decodestring(auth_str).split(':')
95 self.provider.log("Found user=\"%s\", passwd=\"%s\"" %(user,passwd))
96 self.auth_creds = self.provider.authenticate(user,passwd,handler.client_address)
99 if self.auth_tries > 5:
100 self.provider.log("Failing authorization after 5 requests w/o password")
101 raise AuthRejectedExc("Authorization failed.")
103 raise AuthRequiredExc(atype = 'Basic', realm=self.provider.realm)
106 class HTTPHandler(SimpleHTTPRequestHandler):
107 def __init__(self,request, client_address, server):
108 SimpleHTTPRequestHandler.__init__(self,request,client_address,server)
109 # print "Handler for %s inited" % str(client_address)
110 self.protocol_version = 'HTTP/1.1'
111 self.connection = dummyconn()
114 """ Classes here should NOT handle inside their constructor
125 """ A dispatcher class, like a virtual folder in httpd
127 def __init__(self,path,handler, auth_provider = None):
129 self.handler = handler
130 self.auth_provider = auth_provider
132 def matches(self, request):
133 """ Test if some request matches us. If so, return
134 the matched path. """
135 if request.startswith(self.path):
139 class noconnection(object):
140 """ a class to use instead of the real connection
142 def __init__(self, realsocket=None):
143 self.__hidden_socket = realsocket
145 def makefile(self, mode, bufsize):
151 def getsockname(self):
152 """ We need to return info about the real socket that is used for the request
154 if not self.__hidden_socket:
155 raise AttributeError("No-connection class cannot tell real socket")
156 return self.__hidden_socket.getsockname()
159 def shutdown(self, tru):
162 def _quote_html(html):
163 return html.replace("&", "&").replace("<", "<").replace(">", ">")
166 #error_message_format = """ """
167 def send_error(self, code, message=None):
168 #overriden from BaseHTTPRequestHandler, we also send the content-length
170 short, long = self.responses[code]
172 short, long = '???', '???'
176 self.log_error("code %d, message %s", code, message)
177 # using _quote_html to prevent Cross Site Scripting attacks (see bug #1100201)
178 content = (self.error_message_format %
179 {'code': code, 'message': _quote_html(message), 'explain': explain})
180 self.send_response(code, message)
181 self.send_header("Content-Type", self.error_content_type)
182 self.send_header('Connection', 'close')
183 self.send_header('Content-Length', len(content) or 0)
185 if hasattr(self, '_flush'):
188 if self.command != 'HEAD' and code >= 200 and code not in (204, 304):
189 self.wfile.write(content)
192 _HTTP_OPTIONS = {'Allow': ['OPTIONS' ] }
194 def do_OPTIONS(self):
195 """return the list of capabilities """
197 opts = self._HTTP_OPTIONS
198 nopts = self._prep_OPTIONS(opts)
202 self.send_response(200)
203 self.send_header("Content-Length", 0)
204 if 'Microsoft' in self.headers.get('User-Agent', ''):
205 self.send_header('MS-Author-Via', 'DAV')
206 # Microsoft's webdav lib ass-umes that the server would
207 # be a FrontPage(tm) one, unless we send a non-standard
208 # header that we are not an elephant.
209 # http://www.ibm.com/developerworks/rational/library/2089.html
211 for key, value in opts.items():
212 if isinstance(value, basestring):
213 self.send_header(key, value)
214 elif isinstance(value, (tuple, list)):
215 self.send_header(key, ', '.join(value))
218 def _prep_OPTIONS(self, opts):
219 """Prepare the OPTIONS response, if needed
221 Sometimes, like in special DAV folders, the OPTIONS may contain
222 extra keywords, perhaps also dependant on the request url.
223 @param the options already. MUST be copied before being altered
224 @return the updated options.
229 class MultiHTTPHandler(FixSendError, HttpOptions, BaseHTTPRequestHandler):
230 """ this is a multiple handler, that will dispatch each request
231 to a nested handler, iff it matches
233 The handler will also have *one* dict of authentication proxies,
234 groupped by their realm.
237 protocol_version = "HTTP/1.1"
238 default_request_version = "HTTP/0.9" # compatibility with py2.5
240 auth_required_msg = """ <html><head><title>Authorization required</title></head>
241 <body>You must authenticate to use this service</body><html>\r\r"""
243 def __init__(self, request, client_address, server):
244 self.in_handlers = {}
246 SocketServer.StreamRequestHandler.__init__(self,request,client_address,server)
247 self.log_message("MultiHttpHandler init for %s" %(str(client_address)))
249 def _handle_one_foreign(self,fore, path, auth_provider):
250 """ This method overrides the handle_one_request for *children*
251 handlers. It is required, since the first line should not be
255 fore.raw_requestline = "%s %s %s\n" % (self.command, path, self.version)
256 if not fore.parse_request(): # An error code has been sent, just exit
258 self.request_version = fore.request_version
259 if auth_provider and auth_provider.realm:
261 self.sec_realms[auth_provider.realm].checkRequest(fore,path)
262 except AuthRequiredExc,ae:
263 if self.request_version != 'HTTP/1.1':
264 self.log_error("Cannot require auth at %s",self.request_version)
267 self._get_ignore_body(fore) # consume any body that came, not loose sync with input
268 self.send_response(401,'Authorization required')
269 self.send_header('WWW-Authenticate','%s realm="%s"' % (ae.atype,ae.realm))
270 self.send_header('Connection', 'keep-alive')
271 self.send_header('Content-Type','text/html')
272 self.send_header('Content-Length',len(self.auth_required_msg))
274 self.wfile.write(self.auth_required_msg)
276 except AuthRejectedExc,e:
277 self.log_error("Rejected auth: %s" % e.args[0])
278 self.send_error(403,e.args[0])
279 self.close_connection = 1
281 mname = 'do_' + fore.command
282 if not hasattr(fore, mname):
283 if fore.command == 'OPTIONS':
286 self.send_error(501, "Unsupported method (%r)" % fore.command)
288 fore.close_connection = 0
289 method = getattr(fore, mname)
292 except (AuthRejectedExc, AuthRequiredExc):
295 if hasattr(self, 'log_exception'):
296 self.log_exception("Could not run %s", mname)
298 self.log_error("Could not run %s: %s", mname, e)
299 self.send_error(500, "Internal error")
300 # may not work if method has already sent data
301 fore.close_connection = 1
302 self.close_connection = 1
303 if hasattr(fore, '_flush'):
307 if fore.close_connection:
308 # print "Closing connection because of handler"
309 self.close_connection = fore.close_connection
310 if hasattr(fore, '_flush'):
314 def parse_rawline(self):
315 """Parse a request (internal).
317 The request should be stored in self.raw_requestline; the results
318 are in self.command, self.path, self.request_version and
321 Return True for success, False for failure; on failure, an
325 self.command = None # set in case of error on the first line
326 self.request_version = version = self.default_request_version
327 self.close_connection = 1
328 requestline = self.raw_requestline
329 if requestline[-2:] == '\r\n':
330 requestline = requestline[:-2]
331 elif requestline[-1:] == '\n':
332 requestline = requestline[:-1]
333 self.requestline = requestline
334 words = requestline.split()
336 [command, path, version] = words
337 if version[:5] != 'HTTP/':
338 self.send_error(400, "Bad request version (%r)" % version)
341 base_version_number = version.split('/', 1)[1]
342 version_number = base_version_number.split(".")
343 # RFC 2145 section 3.1 says there can be only one "." and
344 # - major and minor numbers MUST be treated as
346 # - HTTP/2.4 is a lower version than HTTP/2.13, which in
347 # turn is lower than HTTP/12.3;
348 # - Leading zeros MUST be ignored by recipients.
349 if len(version_number) != 2:
351 version_number = int(version_number[0]), int(version_number[1])
352 except (ValueError, IndexError):
353 self.send_error(400, "Bad request version (%r)" % version)
355 if version_number >= (1, 1):
356 self.close_connection = 0
357 if version_number >= (2, 0):
359 "Invalid HTTP Version (%s)" % base_version_number)
361 elif len(words) == 2:
362 [command, path] = words
363 self.close_connection = 1
365 self.log_error("Junk http request: %s", self.raw_requestline)
367 "Bad HTTP/0.9 request type (%r)" % command)
372 #self.send_error(400, "Bad request syntax (%r)" % requestline)
374 self.request_version = version
375 self.command, self.path, self.version = command, path, version
378 def handle_one_request(self):
379 """Handle a single HTTP request.
380 Dispatch to the correct handler.
382 self.request.setblocking(True)
383 self.raw_requestline = self.rfile.readline()
384 if not self.raw_requestline:
385 self.close_connection = 1
386 # self.log_message("no requestline, connection closed?")
388 if not self.parse_rawline():
389 self.log_message("Could not parse rawline.")
391 # self.parse_request(): # Do NOT parse here. the first line should be the only
393 if self.path == '*' and self.command == 'OPTIONS':
394 # special handling of path='*', must not use any vdir at all.
395 if not self.parse_request():
400 for vdir in self.server.vdirs:
401 p = vdir.matches(self.path)
404 npath = self.path[len(p):]
405 if not npath.startswith('/'):
408 if not self.in_handlers.has_key(p):
409 self.in_handlers[p] = vdir.handler(noconnection(self.request),self.client_address,self.server)
410 if vdir.auth_provider:
411 vdir.auth_provider.setupAuth(self, self.in_handlers[p])
412 hnd = self.in_handlers[p]
413 hnd.rfile = self.rfile
414 hnd.wfile = self.wfile
415 self.rlpath = self.raw_requestline
416 self._handle_one_foreign(hnd,npath, vdir.auth_provider)
417 # print "Handled, closing = ", self.close_connection
420 self.send_error(404, "Path not found: %s" % self.path)
423 def _get_ignore_body(self,fore):
424 if not fore.headers.has_key("content-length"):
426 max_chunk_size = 10*1024*1024
427 size_remaining = int(fore.headers["content-length"])
429 while size_remaining:
430 chunk_size = min(size_remaining, max_chunk_size)
431 got = fore.rfile.read(chunk_size)
432 size_remaining -= len(got)
435 class SecureMultiHTTPHandler(MultiHTTPHandler):
436 def getcert_fnames(self):
437 """ Return a pair with the filenames of ssl cert,key
439 Override this to direct to other filenames
441 return ('server.cert','server.key')
445 certfile, keyfile = self.getcert_fnames()
447 self.connection = ssl.wrap_socket(self.request,
451 ssl_version=ssl.PROTOCOL_SSLv23)
452 self.rfile = self.connection.makefile('rb', self.rbufsize)
453 self.wfile = self.connection.makefile('wb', self.wbufsize)
454 self.log_message("Secure %s connection from %s",self.connection.cipher(),self.client_address)
456 self.request.shutdown(socket.SHUT_RDWR)
460 # With ssl connections, closing the filehandlers alone may not
461 # work because of ref counting. We explicitly tell the socket
463 MultiHTTPHandler.finish(self)
465 self.connection.shutdown(socket.SHUT_RDWR)
470 class ConnThreadingMixIn:
471 """Mix-in class to handle each _connection_ in a new thread.
473 This is necessary for persistent connections, where multiple
474 requests should be handled synchronously at each connection, but
475 multiple connections can run in parallel.
478 # Decides how threads will act upon termination of the
480 daemon_threads = False
482 def _get_next_name(self):
485 def _handle_request_noblock(self):
486 """Start a new thread to process the request."""
487 if not threading: # happens while quitting python
489 t = threading.Thread(name=self._get_next_name(), target=self._handle_request2)
490 if self.daemon_threads:
494 def _mark_start(self, thread):
495 """ Mark the start of a request thread """
498 def _mark_end(self, thread):
499 """ Mark the end of a request thread """
502 def _handle_request2(self):
503 """Handle one request, without blocking.
505 I assume that select.select has returned that the socket is
506 readable before this function was called, so there should be
507 no risk of blocking in get_request().
510 self._mark_start(threading.currentThread())
511 request, client_address = self.get_request()
512 if self.verify_request(request, client_address):
514 self.process_request(request, client_address)
516 self.handle_error(request, client_address)
517 self.close_request(request)
521 self._mark_end(threading.currentThread())