mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
4a663be97e
* lib/webrick/cgi.rb (CGI::Socket): add check for existence of OpenSSL module in all HTTPS related methods. * lib/webrick/cgi.rb (CGI::Socket#cipher): should create similar value to OpenSSL::SSLSocket#cipher. * lib/webrick/httpresponse.rb (HTTPResponse#setup_header): should set "connection: close" if @keep_alive is false. * lib/webrick/https.rb (HTTPrequest#meta_vars): add supprt for SSL_PROTOCOL, SSL_CIPHER_USEKEYSIZE and SSL_CIPHER_ALGKEYSIZE. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@5254 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
247 lines
6.5 KiB
Ruby
247 lines
6.5 KiB
Ruby
#
|
|
# cgi.rb -- Yet another CGI library
|
|
#
|
|
# Author: IPR -- Internet Programming with Ruby -- writers
|
|
# Copyright (c) 2003 Internet Programming with Ruby writers. All rights
|
|
# reserved.
|
|
#
|
|
# $Id$
|
|
|
|
require "webrick/httprequest"
|
|
require "webrick/httpresponse"
|
|
require "webrick/config"
|
|
require "stringio"
|
|
|
|
module WEBrick
|
|
class CGI
|
|
CGIError = Class.new(StandardError)
|
|
|
|
def initialize(*args)
|
|
if defined?(MOD_RUBY)
|
|
unless ENV.has_key?("GATEWAY_INTERFACE")
|
|
Apache.request.setup_cgi_env
|
|
end
|
|
end
|
|
if %r{HTTP/(\d+\.\d+)} =~ ENV["SERVER_PROTOCOL"]
|
|
httpv = $1
|
|
end
|
|
@config = WEBrick::Config::HTTP.dup.update(
|
|
:ServerSoftware => ENV["SERVER_SOFTWARE"],
|
|
:HTTPVersion => HTTPVersion.new(httpv || "1.0"),
|
|
:RunOnCGI => true, # to detect if it runs on CGI.
|
|
:NPH => false # set true to run as NPH script.
|
|
)
|
|
if config = args.shift
|
|
@config.update(config)
|
|
end
|
|
@logger = @config[:Logger]
|
|
@options = args
|
|
end
|
|
|
|
def start(env=ENV, stdin=$stdin, stdout=$stdout)
|
|
sock = WEBrick::CGI::Socket.new(@config, env, stdin, stdout)
|
|
req = HTTPRequest.new(@config)
|
|
res = HTTPResponse.new(@config)
|
|
unless @config[:NPH] or defined?(MOD_RUBY)
|
|
def res.setup_header
|
|
@header["status"] ||= @status
|
|
super
|
|
end
|
|
def res.status_line
|
|
""
|
|
end
|
|
end
|
|
|
|
begin
|
|
req.parse(sock)
|
|
req.script_name = (env["SCRIPT_NAME"] || "").dup
|
|
if env["PATH_INFO"].nil? || env["PATH_INFO"].empty?
|
|
req.path_info = nil
|
|
else
|
|
req.path_info = env["PATH_INFO"].dup
|
|
end
|
|
res.request_method = req.request_method
|
|
res.request_uri = req.request_uri
|
|
res.request_http_version = req.http_version
|
|
res.keep_alive = req.keep_alive?
|
|
self.service(req, res)
|
|
rescue HTTPStatus::Error => ex
|
|
res.set_error(ex)
|
|
rescue HTTPStatus::Status => ex
|
|
res.status = ex.code
|
|
rescue Exception => ex
|
|
@logger.error(ex)
|
|
res.set_error(ex, true)
|
|
ensure
|
|
req.fixup
|
|
if defined?(MOD_RUBY)
|
|
res.setup_header
|
|
Apache.request.status_line = "#{res.status} #{res.reason_phrase}"
|
|
Apache.request.status = res.status
|
|
table = Apache.request.headers_out
|
|
res.header.each{|key, val|
|
|
case key
|
|
when /^content-encoding$/i
|
|
Apache::request.content_encoding = val
|
|
when /^content-type$/i
|
|
Apache::request.content_type = val
|
|
else
|
|
table[key] = val.to_s
|
|
end
|
|
}
|
|
res.cookies.each{|cookie|
|
|
table.add("Set-Cookie", cookie.to_s)
|
|
}
|
|
Apache.request.send_http_header
|
|
res.send_body(sock)
|
|
else
|
|
res.send_response(sock)
|
|
end
|
|
end
|
|
end
|
|
|
|
def service(req, res)
|
|
method_name = "do_" + req.request_method.gsub(/-/, "_")
|
|
if respond_to?(method_name)
|
|
__send__(method_name, req, res)
|
|
else
|
|
raise HTTPStatus::MethodNotAllowed,
|
|
"unsupported method `#{req.request_method}'."
|
|
end
|
|
end
|
|
|
|
class Socket
|
|
include Enumerable
|
|
|
|
private
|
|
|
|
def initialize(config, env, stdin, stdout)
|
|
@config = config
|
|
@env = env
|
|
@header_part = StringIO.new
|
|
@body_part = stdin
|
|
@out_port = stdout
|
|
|
|
@server_addr = @env["SERVER_ADDR"] || "0.0.0.0"
|
|
@server_name = @env["SERVER_NAME"]
|
|
@server_port = @env["SERVER_PORT"]
|
|
@remote_addr = @env["REMOTE_ADDR"]
|
|
@remote_host = @env["REMOTE_HOST"] || @remote_addr
|
|
@remote_port = @env["REMOTE_PORT"] || 0
|
|
|
|
begin
|
|
@header_part << request_line << CRLF
|
|
setup_header
|
|
@header_part << CRLF
|
|
@header_part.rewind
|
|
rescue Exception => ex
|
|
raise CGIError, "invalid CGI environment"
|
|
end
|
|
end
|
|
|
|
def request_line
|
|
meth = @env["REQUEST_METHOD"]
|
|
url = @env["SCRIPT_NAME"].dup
|
|
if path_info = @env["PATH_INFO"]
|
|
url << path_info
|
|
end
|
|
if query_string = @env["QUERY_STRING"]
|
|
unless query_string.empty?
|
|
url << "?" << query_string
|
|
end
|
|
end
|
|
# we cannot get real HTTP version of client ;)
|
|
httpv = @config[:HTTPVersion]
|
|
"#{meth} #{url} HTTP/#{httpv}"
|
|
end
|
|
|
|
def setup_header
|
|
add_header("CONTENT_TYPE", "Content-Type")
|
|
add_header("CONTENT_LENGTH", "Content-length")
|
|
@env.each_key{|name|
|
|
if /^HTTP_(.*)/ =~ name
|
|
add_header(name, $1.gsub(/_/, "-"))
|
|
end
|
|
}
|
|
end
|
|
|
|
def add_header(envname, hdrname)
|
|
if value = @env[envname]
|
|
unless value.empty?
|
|
@header_part << hdrname << ": " << value << CRLF
|
|
end
|
|
end
|
|
end
|
|
|
|
def input
|
|
@header_part.eof? ? @body_part : @header_part
|
|
end
|
|
|
|
public
|
|
|
|
def peeraddr
|
|
[nil, @remote_port, @remote_host, @remote_addr]
|
|
end
|
|
|
|
def addr
|
|
[nil, @server_port, @server_name, @server_addr]
|
|
end
|
|
|
|
def gets(eol=LF)
|
|
input.gets(eol)
|
|
end
|
|
|
|
def read(size=nil)
|
|
input.read(size)
|
|
end
|
|
|
|
def each
|
|
input.each{|line| yield(line) }
|
|
end
|
|
|
|
def <<(data)
|
|
@out_port << data
|
|
end
|
|
|
|
def cert
|
|
return nil unless defined?(OpenSSL)
|
|
if pem = @env["SSL_SERVER_CERT"]
|
|
OpenSSL::X509::Certificate.new(pem) unless pem.empty?
|
|
end
|
|
end
|
|
|
|
def peer_cert
|
|
return nil unless defined?(OpenSSL)
|
|
if pem = @env["SSL_CLIENT_CERT"]
|
|
OpenSSL::X509::Certificate.new(pem) unless pem.empty?
|
|
end
|
|
end
|
|
|
|
def peer_cert_chain
|
|
return nil unless defined?(OpenSSL)
|
|
if @env["SSL_CLIENT_CERT_CHAIN_0"]
|
|
keys = @env.keys
|
|
certs = keys.sort.collect{|k|
|
|
if /^SSL_CLIENT_CERT_CHAIN_\d+$/ =~ k
|
|
if pem = @env[k]
|
|
OpenSSL::X509::Certificate.new(pem) unless pem.empty?
|
|
end
|
|
end
|
|
}
|
|
certs.compact
|
|
end
|
|
end
|
|
|
|
def cipher
|
|
return nil unless defined?(OpenSSL)
|
|
if cipher = @env["SSL_CIPHER"]
|
|
ret = [ cipher ]
|
|
ret << @env["SSL_PROTOCOL"]
|
|
ret << @env["SSL_CIPHER_USEKEYSIZE"]
|
|
ret << @env["SSL_CIPHER_ALGKEYSIZE"]
|
|
ret
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|