1 # -*- coding: utf-8 -*-
3 # Copyright P. Christeas <p_christ@hol.gr> 2008,2009
6 # WARNING: This program as such is intended to be used by professional
7 # programmers who take the whole responsability of assessing all potential
8 # consequences resulting from its eventual inadequacies and bugs
9 # End users who are looking for a ready-to-use solution with commercial
10 # garantees and support are strongly adviced to contract a Free Software
13 # This program is Free Software; you can redistribute it and/or
14 # modify it under the terms of the GNU General Public License
15 # as published by the Free Software Foundation; either version 2
16 # of the License, or (at your option) any later version.
18 # This program is distributed in the hope that it will be useful,
19 # but WITHOUT ANY WARRANTY; without even the implied warranty of
20 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 # GNU General Public License for more details.
23 # You should have received a copy of the GNU General Public License
24 # along with this program; if not, write to the Free Software
25 # Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
26 ###############################################################################
28 """ Framework for generic http servers
35 from BaseHTTPServer import *
36 from SimpleHTTPServer import SimpleHTTPRequestHandler
38 class AuthRequiredExc(Exception):
39 def __init__(self,atype,realm):
40 Exception.__init__(self)
44 class AuthRejectedExc(Exception):
48 def __init__(self,realm):
51 def setupAuth(self, multi,handler):
52 """ Attach an AuthProxy object to handler
56 def authenticate(self, user, passwd, client_address):
62 class BasicAuthProvider(AuthProvider):
63 def setupAuth(self, multi, handler):
64 if not multi.sec_realms.has_key(self.realm):
65 multi.sec_realms[self.realm] = BasicAuthProxy(self)
69 """ This class will hold authentication information for a handler,
72 def __init__(self, provider):
73 self.provider = provider
75 def checkRequest(self,handler,path = '/'):
76 """ Check if we are allowed to process that request
80 class BasicAuthProxy(AuthProxy):
81 """ Require basic authentication..
83 def __init__(self,provider):
84 AuthProxy.__init__(self,provider)
85 self.auth_creds = None
88 def checkRequest(self,handler,path = '/'):
91 auth_str = handler.headers.get('Authorization',False)
92 if auth_str and auth_str.startswith('Basic '):
93 auth_str=auth_str[len('Basic '):]
94 (user,passwd) = base64.decodestring(auth_str).split(':')
95 self.provider.log("Found user=\"%s\", passwd=\"%s\"" %(user,passwd))
96 self.auth_creds = self.provider.authenticate(user,passwd,handler.client_address)
99 if self.auth_tries > 5:
100 self.provider.log("Failing authorization after 5 requests w/o password")
101 raise AuthRejectedExc("Authorization failed.")
103 raise AuthRequiredExc(atype = 'Basic', realm=self.provider.realm)
106 class HTTPHandler(SimpleHTTPRequestHandler):
107 def __init__(self,request, client_address, server):
108 SimpleHTTPRequestHandler.__init__(self,request,client_address,server)
109 # print "Handler for %s inited" % str(client_address)
110 self.protocol_version = 'HTTP/1.1'
111 self.connection = dummyconn()
114 """ Classes here should NOT handle inside their constructor
125 """ A dispatcher class, like a virtual folder in httpd
127 def __init__(self,path,handler, auth_provider = None):
129 self.handler = handler
130 self.auth_provider = auth_provider
132 def matches(self, request):
133 """ Test if some request matches us. If so, return
134 the matched path. """
135 if request.startswith(self.path):
140 """ a class to use instead of the real connection
142 def makefile(self, mode, bufsize):
146 def shutdown(self, tru):
149 def _quote_html(html):
150 return html.replace("&", "&").replace("<", "<").replace(">", ">")
153 #error_message_format = """ """
154 def send_error(self, code, message=None):
155 #overriden from BaseHTTPRequestHandler, we also send the content-length
157 short, long = self.responses[code]
159 short, long = '???', '???'
163 self.log_error("code %d, message %s", code, message)
164 # using _quote_html to prevent Cross Site Scripting attacks (see bug #1100201)
165 content = (self.error_message_format %
166 {'code': code, 'message': _quote_html(message), 'explain': explain})
167 self.send_response(code, message)
168 self.send_header("Content-Type", self.error_content_type)
169 self.send_header('Connection', 'close')
170 self.send_header('Content-Length', len(content) or 0)
172 if self.command != 'HEAD' and code >= 200 and code not in (204, 304):
173 self.wfile.write(content)
175 class MultiHTTPHandler(FixSendError,BaseHTTPRequestHandler):
176 """ this is a multiple handler, that will dispatch each request
177 to a nested handler, iff it matches
179 The handler will also have *one* dict of authentication proxies,
180 groupped by their realm.
183 protocol_version = "HTTP/1.1"
184 default_request_version = "HTTP/0.9" # compatibility with py2.5
186 auth_required_msg = """ <html><head><title>Authorization required</title></head>
187 <body>You must authenticate to use this service</body><html>\r\r"""
189 def __init__(self, request, client_address, server):
190 self.in_handlers = {}
192 SocketServer.StreamRequestHandler.__init__(self,request,client_address,server)
193 self.log_message("MultiHttpHandler init for %s" %(str(client_address)))
195 def _handle_one_foreign(self,fore, path, auth_provider):
196 """ This method overrides the handle_one_request for *children*
197 handlers. It is required, since the first line should not be
201 fore.raw_requestline = "%s %s %s\n" % (self.command, path, self.version)
202 if not fore.parse_request(): # An error code has been sent, just exit
204 self.request_version = fore.request_version
205 if auth_provider and auth_provider.realm:
207 self.sec_realms[auth_provider.realm].checkRequest(fore,path)
208 except AuthRequiredExc,ae:
209 if self.request_version != 'HTTP/1.1':
210 self.log_error("Cannot require auth at %s",self.request_version)
213 self._get_ignore_body(fore) # consume any body that came, not loose sync with input
214 self.send_response(401,'Authorization required')
215 self.send_header('WWW-Authenticate','%s realm="%s"' % (ae.atype,ae.realm))
216 self.send_header('Connection', 'keep-alive')
217 self.send_header('Content-Type','text/html')
218 self.send_header('Content-Length',len(self.auth_required_msg))
220 self.wfile.write(self.auth_required_msg)
222 except AuthRejectedExc,e:
223 self.log_error("Rejected auth: %s" % e.args[0])
224 self.send_error(401,e.args[0])
225 self.close_connection = 1
227 mname = 'do_' + fore.command
228 if not hasattr(fore, mname):
229 fore.send_error(501, "Unsupported method (%r)" % fore.command)
231 fore.close_connection = 0
232 method = getattr(fore, mname)
234 if fore.close_connection:
235 # print "Closing connection because of handler"
236 self.close_connection = fore.close_connection
238 def parse_rawline(self):
239 """Parse a request (internal).
241 The request should be stored in self.raw_requestline; the results
242 are in self.command, self.path, self.request_version and
245 Return True for success, False for failure; on failure, an
249 self.command = None # set in case of error on the first line
250 self.request_version = version = self.default_request_version
251 self.close_connection = 1
252 requestline = self.raw_requestline
253 if requestline[-2:] == '\r\n':
254 requestline = requestline[:-2]
255 elif requestline[-1:] == '\n':
256 requestline = requestline[:-1]
257 self.requestline = requestline
258 words = requestline.split()
260 [command, path, version] = words
261 if version[:5] != 'HTTP/':
262 self.send_error(400, "Bad request version (%r)" % version)
265 base_version_number = version.split('/', 1)[1]
266 version_number = base_version_number.split(".")
267 # RFC 2145 section 3.1 says there can be only one "." and
268 # - major and minor numbers MUST be treated as
270 # - HTTP/2.4 is a lower version than HTTP/2.13, which in
271 # turn is lower than HTTP/12.3;
272 # - Leading zeros MUST be ignored by recipients.
273 if len(version_number) != 2:
275 version_number = int(version_number[0]), int(version_number[1])
276 except (ValueError, IndexError):
277 self.send_error(400, "Bad request version (%r)" % version)
279 if version_number >= (1, 1):
280 self.close_connection = 0
281 if version_number >= (2, 0):
283 "Invalid HTTP Version (%s)" % base_version_number)
285 elif len(words) == 2:
286 [command, path] = words
287 self.close_connection = 1
290 "Bad HTTP/0.9 request type (%r)" % command)
295 self.send_error(400, "Bad request syntax (%r)" % requestline)
297 self.request_version = version
298 self.command, self.path, self.version = command, path, version
301 def handle_one_request(self):
302 """Handle a single HTTP request.
303 Dispatch to the correct handler.
305 self.request.setblocking(True)
306 self.raw_requestline = self.rfile.readline()
307 if not self.raw_requestline:
308 self.close_connection = 1
309 # self.log_message("no requestline, connection closed?")
311 if not self.parse_rawline():
312 self.log_message("Could not parse rawline.")
314 # self.parse_request(): # Do NOT parse here. the first line should be the only
315 for vdir in self.server.vdirs:
316 p = vdir.matches(self.path)
319 npath = self.path[len(p):]
320 if not npath.startswith('/'):
323 if not self.in_handlers.has_key(p):
324 self.in_handlers[p] = vdir.handler(noconnection(),self.client_address,self.server)
325 if vdir.auth_provider:
326 vdir.auth_provider.setupAuth(self, self.in_handlers[p])
327 hnd = self.in_handlers[p]
328 hnd.rfile = self.rfile
329 hnd.wfile = self.wfile
330 self.rlpath = self.raw_requestline
331 self._handle_one_foreign(hnd,npath, vdir.auth_provider)
332 # print "Handled, closing = ", self.close_connection
335 self.send_error(404, "Path not found: %s" % self.path)
338 def _get_ignore_body(self,fore):
339 if not fore.headers.has_key("content-length"):
341 max_chunk_size = 10*1024*1024
342 size_remaining = int(fore.headers["content-length"])
344 while size_remaining:
345 chunk_size = min(size_remaining, max_chunk_size)
346 got = fore.rfile.read(chunk_size)
347 size_remaining -= len(got)
350 class SecureMultiHTTPHandler(MultiHTTPHandler):
351 def getcert_fnames(self):
352 """ Return a pair with the filenames of ssl cert,key
354 Override this to direct to other filenames
356 return ('server.cert','server.key')
360 certfile, keyfile = self.getcert_fnames()
362 self.connection = ssl.wrap_socket(self.request,
366 ssl_version=ssl.PROTOCOL_SSLv23)
367 self.rfile = self.connection.makefile('rb', self.rbufsize)
368 self.wfile = self.connection.makefile('wb', self.wbufsize)
369 self.log_message("Secure %s connection from %s",self.connection.cipher(),self.client_address)
371 self.request.shutdown(socket.SHUT_RDWR)
375 # With ssl connections, closing the filehandlers alone may not
376 # work because of ref counting. We explicitly tell the socket
378 MultiHTTPHandler.finish(self)
380 self.connection.shutdown(socket.SHUT_RDWR)
385 class ConnThreadingMixIn:
386 """Mix-in class to handle each _connection_ in a new thread.
388 This is necessary for persistent connections, where multiple
389 requests should be handled synchronously at each connection, but
390 multiple connections can run in parallel.
393 # Decides how threads will act upon termination of the
395 daemon_threads = False
397 def _handle_request_noblock(self):
398 """Start a new thread to process the request."""
399 t = threading.Thread(target = self._handle_request2)
400 if self.daemon_threads:
404 def _handle_request2(self):
405 """Handle one request, without blocking.
407 I assume that select.select has returned that the socket is
408 readable before this function was called, so there should be
409 no risk of blocking in get_request().
412 request, client_address = self.get_request()
415 if self.verify_request(request, client_address):
417 self.process_request(request, client_address)
419 self.handle_error(request, client_address)
420 self.close_request(request)