X-Git-Url: http://sjero.net/git/?p=wget;a=blobdiff_plain;f=tests%2FHTTPServer.pm;h=58b1a363b4fc0570ad45858f5fde20c80cb6d747;hp=c7de835fd22e7ba972427b993427141b0ac0de3a;hb=d763f8bf6d6e13ce006ffab616cc8a77e747a633;hpb=d12bf532d553235c21b5a8472335032a3ff82bf2 diff --git a/tests/HTTPServer.pm b/tests/HTTPServer.pm old mode 100755 new mode 100644 index c7de835f..58b1a363 --- a/tests/HTTPServer.pm +++ b/tests/HTTPServer.pm @@ -1,63 +1,239 @@ -#!/usr/bin/perl -w +package HTTPServer; + +use strict; +use warnings; use HTTP::Daemon; use HTTP::Status; use HTTP::Headers; use HTTP::Response; -use strict; +our @ISA=qw(HTTP::Daemon); +my $VERSION = 0.01; -package HTTPServer; +my $CRLF = "\015\012"; # "\r\n" is not portable +my $log = undef; -sub run_daemon { - my %urls = @_; - my $server = HTTP::Daemon->new (LocalAddr => 'localhost', - LocalPort => '8080', - ReuseAddr => 1) or die "Cannot create server!!!"; - - while (my $con = $server->accept) { +sub run { + my ($self, $urls, $synch_callback) = @_; + my $initialized = 0; + + while (1) { + if (!$initialized) { + $synch_callback->(); + $initialized = 1; + } + my $con = $self->accept(); + print STDERR "Accepted a new connection\n" if $log; while (my $req = $con->get_request) { - # print STDERR "method: ", $req->method, "\n"; - if ($req->method eq "GET" and $urls{$req->url->path}) { - # print STDERR "requested URL: ", $req->url->path, "\n"; - - # create response - my $tmp = $urls{$req->url->path}; - my $resp = HTTP::Response->new ($tmp->{'code'}, - $tmp->{'msg'}); - # print STDERR "HTTP::Response: \n", $resp->as_string; - - # fill in headers - while (my ($name, $value) = each %{$tmp->{headers}}) { - # print STDERR "setting header: $name = $value\n"; - $resp->header($name => $value); + #my $url_path = $req->url->path; + my $url_path = $req->url->as_string; + if ($url_path =~ m{/$}) { # append 'index.html' + $url_path .= 'index.html'; + } + #if ($url_path =~ m{^/}) { # remove trailing '/' + # $url_path = substr ($url_path, 1); + #} + if ($log) { + print STDERR "Method: ", $req->method, "\n"; + print STDERR "Path: ", $url_path, "\n"; + print STDERR "Available URLs: ", "\n"; + foreach my $key (keys %$urls) { + print STDERR $key, "\n"; } - # print STDERR "HTTP::Response with headers: \n", $resp->as_string; - - # fill in content - $resp->content($tmp->{content}); - # print STDERR "HTTP::Response with content: \n", $resp->as_string; - - $con->send_response($resp); - # print STDERR "HTTP::Response sent: \n", $resp->as_string; + } + if (exists($urls->{$url_path})) { + print STDERR "Serving requested URL: ", $url_path, "\n" if $log; + next unless ($req->method eq "HEAD" || $req->method eq "GET"); + + my $url_rec = $urls->{$url_path}; + $self->send_response($req, $url_rec, $con); } else { - print STDERR "requested wrong URL: ", $req->url->path, "\n"; + print STDERR "Requested wrong URL: ", $url_path, "\n" if $log; $con->send_error($HTTP::Status::RC_FORBIDDEN); + last; } } + print STDERR "Closing connection\n" if $log; $con->close; - undef($con); } } -sub run { - my $pid = fork(); +sub send_response { + my ($self, $req, $url_rec, $con) = @_; + + # create response + my ($code, $msg, $headers); + my $send_content = ($req->method eq "GET"); + if (exists $url_rec->{'auth_method'}) { + ($send_content, $code, $msg, $headers) = + $self->handle_auth($req, $url_rec); + } elsif (!$self->verify_request_headers ($req, $url_rec)) { + ($send_content, $code, $msg, $headers) = + ('', 400, 'Mismatch on expected headers', {}); + } else { + ($code, $msg) = @{$url_rec}{'code', 'msg'}; + $headers = $url_rec->{headers}; + } + my $resp = HTTP::Response->new ($code, $msg); + print STDERR "HTTP::Response: \n", $resp->as_string if $log; + + while (my ($name, $value) = each %{$headers}) { + # print STDERR "setting header: $name = $value\n"; + $resp->header($name => $value); + } + print STDERR "HTTP::Response with headers: \n", $resp->as_string if $log; - if($pid == 0) { - run_daemon(@_); + if ($send_content) { + my $content = $url_rec->{content}; + if (exists($url_rec->{headers}{"Content-Length"})) { + # Content-Length and length($content) don't match + # manually prepare the HTTP response + $con->send_basic_header($url_rec->{code}, $resp->message, $resp->protocol); + print $con $resp->headers_as_string($CRLF); + print $con $CRLF; + print $con $content; + next; + } + if ($req->header("Range") && !$url_rec->{'force_code'}) { + $req->header("Range") =~ m/bytes=(\d*)-(\d*)/; + my $content_len = length($content); + my $start = $1 ? $1 : 0; + my $end = $2 ? $2 : ($content_len - 1); + my $len = $2 ? ($2 - $start) : ($content_len - $start); + if ($len > 0) { + $resp->header("Accept-Ranges" => "bytes"); + $resp->header("Content-Length" => $len); + $resp->header("Content-Range" + => "bytes $start-$end/$content_len"); + $resp->header("Keep-Alive" => "timeout=15, max=100"); + $resp->header("Connection" => "Keep-Alive"); + $con->send_basic_header(206, + "Partial Content", $resp->protocol); + print $con $resp->headers_as_string($CRLF); + print $con $CRLF; + print $con substr($content, $start, $len); + } else { + $con->send_basic_header(416, "Range Not Satisfiable", + $resp->protocol); + $resp->header("Keep-Alive" => "timeout=15, max=100"); + $resp->header("Connection" => "Keep-Alive"); + print $con $CRLF; + } + next; + } + # fill in content + $content = $self->_substitute_port($content); + $resp->content($content); + print STDERR "HTTP::Response with content: \n", $resp->as_string if $log; } - return $pid; + $con->send_response($resp); + print STDERR "HTTP::Response sent: \n", $resp->as_string if $log; +} + +# Generates appropriate response content based on the authentication +# status of the URL. +sub handle_auth { + my ($self, $req, $url_rec) = @_; + my ($send_content, $code, $msg, $headers); + # Catch failure to set code, msg: + $code = 500; + $msg = "Didn't set response code in handle_auth"; + # Most cases, we don't want to send content. + $send_content = 0; + # Initialize headers + $headers = {}; + my $authhdr = $req->header('Authorization'); + + # Have we sent the challenge yet? + unless ($url_rec->{auth_challenged} || $url_rec->{auth_no_challenge}) { + # Since we haven't challenged yet, we'd better not + # have received authentication (for our testing purposes). + if ($authhdr) { + $code = 400; + $msg = "You sent auth before I sent challenge"; + } else { + # Send challenge + $code = 401; + $msg = "Authorization Required"; + $headers->{'WWW-Authenticate'} = $url_rec->{'auth_method'} + . " realm=\"wget-test\""; + $url_rec->{auth_challenged} = 1; + } + } elsif (!defined($authhdr)) { + # We've sent the challenge; we should have received valid + # authentication with this one. A normal server would just + # resend the challenge; but since this is a test, wget just + # failed it. + $code = 400; + $msg = "You didn't send auth after I sent challenge"; + if ($url_rec->{auth_no_challenge}) { + $msg = "--auth-no-challenge but no auth sent." + } + } else { + my ($sent_method) = ($authhdr =~ /^(\S+)/g); + unless ($sent_method eq $url_rec->{'auth_method'}) { + # Not the authorization type we were expecting. + $code = 400; + $msg = "Expected auth type $url_rec->{'auth_method'} but got " + . "$sent_method"; + } elsif (($sent_method eq 'Digest' + && &verify_auth_digest($authhdr, $url_rec, \$msg)) + || + ($sent_method eq 'Basic' + && &verify_auth_basic($authhdr, $url_rec, \$msg))) { + # SUCCESSFUL AUTH: send expected message, headers, content. + ($code, $msg) = @{$url_rec}{'code', 'msg'}; + $headers = $url_rec->{headers}; + $send_content = 1; + } else { + $code = 400; + } + } + + return ($send_content, $code, $msg, $headers); +} + +sub verify_auth_digest { + return undef; # Not yet implemented. +} + +sub verify_auth_basic { + require MIME::Base64; + my ($authhdr, $url_rec, $msgref) = @_; + my $expected = MIME::Base64::encode_base64($url_rec->{'user'} . ':' + . $url_rec->{'passwd'}, ''); + my ($got) = $authhdr =~ /^Basic (.*)$/; + if ($got eq $expected) { + return 1; + } else { + $$msgref = "Wanted ${expected} got ${got}"; + return undef; + } +} + +sub verify_request_headers { + my ($self, $req, $url_rec) = @_; + + return 1 unless exists $url_rec->{'request_headers'}; + for my $hdrname (keys %{$url_rec->{'request_headers'}}) { + my $rhdr = $req->header ($hdrname); + my $ehdr = $url_rec->{'request_headers'}{$hdrname}; + unless (defined $rhdr && $rhdr =~ $ehdr) { + print STDERR "\n*** Mismatch on $hdrname: $rhdr =~ $ehdr\n"; + return undef; + } + } + + return 1; +} + +sub _substitute_port { + my $self = shift; + my $ret = shift; + $ret =~ s/{{port}}/$self->sockport/eg; + return $ret; } 1;