hammerspoon/extensions/httpserver/httpserver_hsminweb.lua

1669 lines
83 KiB
Lua

--- === hs.httpserver.hsminweb ===
---
--- Minimalist Web Server for Hammerspoon
---
--- This module aims to be a minimal, but (mostly) standards-compliant web server for use within Hammerspoon. Expanding upon the Hammerspoon module, `hs.httpserver`, this module adds support for serving static pages stored at a specified document root as well as serving dynamic content from Lua Template Files interpreted within the Hammerspoon environment and external executables which support the CGI/1.1 framework.
---
--- This module aims to provide a fully functional, and somewhat extendable, web server foundation, but will never replace a true dedicated web server application. Some limitations include:
--- * It is single threaded within the Hammerspoon environment and can only serve one resource at a time
--- * As with all Hammerspoon modules, while dynamic content is being generated, Hammerspoon cannot respond to other callback functions -- a complex or time consuming script may block other Hammerspoon activity in a noticeable manner.
--- * All document requests and responses are handled in memory only -- because of this, maximum resource size is limited to what you are willing to allow Hammerspoon to consume and memory limitations of your computer.
---
--- While some of these limitations may be mitigated to an extent in the future with additional modules and additions to `hs.httpserver`, Hammerspoon's web serving capabilities will never replace a dedicated web server when volume or speed is required.
---
--- An example web site is provided in the `hsdocs` folder of the `hs.doc` module. This web site can serve documentation for Hammerspoon dynamically generated from the json file included with the Hammerspoon application for internal documentation. It serves as a basic example of what is possible with this module.
---
--- You can start this web server by typing the following into your Hammerspoon console:
--- `require("hs.doc.hsdocs").start()` and then visiting `http://localhost:12345/` with your web browser.
-- [ ] Wiki docs
-- [ ] Add way to render template (and cgi?) to file
--
-- [ ] document headers._ support table for error functions
-- [ ] document _allowRenderTranslations, _logBadTranslations, and _logPageErrorTranslations
--
-- May see how hard these would be... maybe only for Hammerspoon/Lua Template pages
-- [ ] basic/digest auth via lua only?
-- [ ] minimal WebDAV support?
-- [ ] For WebDav support, some other methods may also require a body... (i.e. additions to hs.httpserver)
--
-- Not until requested/needed
-- [ ] cookie support? other than passing to/from dynamic pages, do we need to do anything?
-- [ ] SSI? will need a way to verify text content or specific header check
-- [ ] support per-dir, in addition to per-server settings?
-- [ ] should things like directory index code be a function so it can be overridden?
-- [ ] custom headers/footers? (auto include head/tail files if exist?)
local USERDATA_TAG = "hs.httpserver.hsminweb"
local VERSION = "0.0.5"
local DEFAULT_ScriptTimeout = 30
local scriptWrapper = hs.processInfo["resourcePath"].."/timeout3"
local cgiluaCompat = require("hs.cgilua_compatibility_functions")
local module = {}
local http = require("hs.http")
local fs = require("hs.fs")
local nethost = require("hs.network.host")
local hshost = require("hs.host")
local serverAdmin = os.getenv("USER") .. "@" .. hshost.localizedName()
local serverSoftware = USERDATA_TAG:gsub("^hs%.httpserver%.", "") .. "/" .. VERSION .. " (OSX)"
local log = require("hs.logger").new(USERDATA_TAG:gsub("^hs%.httpserver%.", ""), "debug")
local HTTPdateFormatString = "!%a, %d %b %Y %T GMT"
local HTTPformattedDate = function(x) return os.date(HTTPdateFormatString, x or os.time()) end
local shallowCopy = function(t1)
local t2 = {}
for k, v in pairs(t1) do t2[k] = v end
return t2
end
local modifyHeaders = function(headerTbl, modifiersTbl)
local tmpTable = shallowCopy(headerTbl)
for k, v in pairs(modifiersTbl) do
if v then
tmpTable[k] = v
else
tmpTable[k] = nil
end
end
return tmpTable
end
local directoryIndex = {
"index.html", "index.htm"
}
local cgiExtensions = {
"cgi", "pl"
}
-- This table is from various sources, including (but probably not limited to):
-- "Official" list at https://en.wikipedia.org/wiki/List_of_HTTP_status_codes
-- KeplerProject's wsapi at https://github.com/keplerproject/wsapi
-- IIS additions from https://support.microsoft.com/en-us/kb/943891
--
-- Actually, only 400+ are error conditions, but this is the complete list for reference
local statusCodes = {
["100"] = "Continue",
["101"] = "Switching Protocols",
["200"] = "OK",
["201"] = "Created",
["202"] = "Accepted",
["203"] = "Non-Authoritative Information",
["204"] = "No Content",
["205"] = "Reset Content",
["206"] = "Partial Content",
["300"] = "Multiple Choices",
["301"] = "Moved Permanently",
["302"] = "Found",
["303"] = "See Other",
["304"] = "Not Modified",
["305"] = "Use Proxy",
["307"] = "Temporary Redirect",
["400"] = "Bad Request",
["400.1"] = "Invalid Destination Header",
["400.2"] = "Invalid Depth Header",
["400.3"] = "Invalid If Header",
["400.4"] = "Invalid Overwrite Header",
["400.5"] = "Invalid Translate Header",
["400.6"] = "Invalid Request Body",
["400.7"] = "Invalid Content Length",
["400.8"] = "Invalid Timeout",
["400.9"] = "Invalid Lock Token",
["400.10"] = "Invalid XFF header",
["400.11"] = "Invalid WebSocket request",
["400.601"] = "Bad client request (ARR)",
["400.602"] = "Invalid time format (ARR)",
["400.603"] = "Parse range error (ARR)",
["400.604"] = "Client gone (ARR)",
["400.605"] = "Maximum number of forwards (ARR)",
["400.606"] = "Asynchronous competition error (ARR)",
["401"] = "Unauthorized",
["401.1"] = "Logon failed",
["401.2"] = "Logon failed due to server configuration",
["401.3"] = "Unauthorized due to ACL on resource",
["401.4"] = "Authorization failed by filter",
["401.5"] = "Authorization failed by ISAPI/CGI application",
["402"] = "Payment Required",
["403"] = "Forbidden",
["403.1"] = "Execute access forbidden",
["403.2"] = "Read access forbidden",
["403.3"] = "Write access forbidden",
["403.4"] = "SSL required",
["403.5"] = "SSL 128 required",
["403.6"] = "IP address rejected",
["403.7"] = "Client certificate required",
["403.8"] = "Site access denied",
["403.9"] = "Forbidden: Too many clients are trying to connect to the web server",
["403.10"] = "Forbidden: web server is configured to deny Execute access",
["403.11"] = "Forbidden: Password has been changed",
["403.12"] = "Mapper denied access",
["403.13"] = "Client certificate revoked",
["403.14"] = "Directory listing denied",
["403.15"] = "Forbidden: Client access licenses have exceeded limits on the web server",
["403.16"] = "Client certificate is untrusted or invalid",
["403.17"] = "Client certificate has expired or is not yet valid",
["403.18"] = "Cannot execute requested URL in the current application pool",
["403.19"] = "Cannot execute CGI applications for the client in this application pool",
["403.20"] = "Forbidden: Passport logon failed",
["403.21"] = "Forbidden: Source access denied",
["403.22"] = "Forbidden: Infinite depth is denied",
["403.502"] = "Forbidden: Too many requests from the same client IP; Dynamic IP Restriction limit reached",
["404"] = "Not Found",
["404.0"] = "Not Found",
["404.1"] = "Site Not Found",
["404.2"] = "ISAPI or CGI restriction",
["404.3"] = "MIME type restriction",
["404.4"] = "No handler configured",
["404.5"] = "Denied by request filtering configuration",
["404.6"] = "Verb denied",
["404.7"] = "File extension denied",
["404.8"] = "Hidden namespace",
["404.9"] = "File attribute hidden",
["404.10"] = "Request header too long",
["404.11"] = "Request contains double escape sequence",
["404.12"] = "Request contains high-bit characters",
["404.13"] = "Content length too large",
["404.14"] = "Request URL too long",
["404.15"] = "Query string too long",
["404.16"] = "DAV request sent to the static file handler",
["404.17"] = "Dynamic content mapped to the static file handler via a wildcard MIME mapping",
["404.18"] = "Querystring sequence denied",
["404.19"] = "Denied by filtering rule",
["404.20"] = "Too Many URL Segments",
["405"] = "Method Not Allowed",
["406"] = "Not Acceptable",
["407"] = "Proxy Authentication Required",
["408"] = "Request Time-out",
["409"] = "Conflict",
["410"] = "Gone",
["411"] = "Length Required",
["412"] = "Precondition Failed",
["413"] = "Request Entity Too Large",
["414"] = "Request-URI Too Large",
["415"] = "Unsupported Media Type",
["416"] = "Requested range not satisfiable",
["417"] = "Expectation Failed",
["500"] = "Internal Server Error",
["500.0"] = "Module or ISAPI error occurred",
["500.11"] = "Application is shutting down on the web server",
["500.12"] = "Application is busy restarting on the web server",
["500.13"] = "Web server is too busy",
["500.15"] = "Direct requests for Global.asax are not allowed",
["500.19"] = "Configuration data is invalid",
["500.21"] = "Module not recognized",
["500.22"] = "An ASP.NET httpModules configuration does not apply in Managed Pipeline mode",
["500.23"] = "An ASP.NET httpHandlers configuration does not apply in Managed Pipeline mode",
["500.24"] = "An ASP.NET impersonation configuration does not apply in Managed Pipeline mode",
["500.50"] = "A rewrite error occurred during RQ_BEGIN_REQUEST notification handling",
["500.51"] = "A rewrite error occurred during GL_PRE_BEGIN_REQUEST notification handling",
["500.52"] = "A rewrite error occurred during RQ_SEND_RESPONSE notification handling",
["500.53"] = "A rewrite error occurred during RQ_RELEASE_REQUEST_STATE notification handling",
["500.100"] = "Internal ASP error",
["501"] = "Not Implemented",
["502"] = "Bad Gateway",
["502.1"] = "CGI application timeout",
["502.2"] = "Bad gateway: Premature Exit",
["502.3"] = "Bad Gateway: Forwarder Connection Error (ARR)",
["502.4"] = "Bad Gateway: No Server (ARR)",
["502.5"] = "WebSocket failure (ARR)",
["502.6"] = "Forwarded request failure (ARR)",
["502.7"] = "Execute request failure (ARR)",
["503"] = "Service Unavailable",
["503.0"] = "Application pool unavailable",
["503.2"] = "Concurrent request limit exceeded",
["503.3"] = "ASP.NET queue full",
["504"] = "Gateway Time-out",
["505"] = "HTTP Version not supported",
}
local errorHandlers = {
__index = function(_, key)
local override = rawget(_, tostring(key))
if override then
return override
elseif rawget(_, "default") then
return function(...) return rawget(_, "default")(key, ...) end
else
return function(_, _, h)
local code = key
if type(code) == "number" then code = tostring(code) end
local intendedCode = code
local codeLabel = statusCodes[code]
if tonumber(code) < 400 or not codeLabel then code, codeLabel = "500", statusCodes["500"] end
local output = "<html><head><title>" .. codeLabel .. "</title></head><body><body><H1>HTTP/1.1 " .. code .. " " .. codeLabel .. "</H1><br/><br/>"
if code ~= intendedCode then
if tonumber(intendedCode) > 399 then
output = output .. "Error code " .. intendedCode .. " is unrecognized and has no handler<br/>"
else
local statusLabel = statusCodes[intendedCode] or "** Unrecognized Status Code **"
output = output .. "Status code ".. intendedCode .. ", " .. statusLabel .. ", does not specify an error condition<br/>"
end
end
output = output .. "<hr/><div align=\"right\"><i>" .. tostring(h and h._ and h._.serverSoftware) .. " at " .. tostring(h and h._ and h._.queryDate) .. "</i></div></body></html>"
return output, math.floor(code), (h and h._ and h._.minimalHTMLResponseHeaders or {})
end
end
end
}
local supportedMethods = {
-- https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol
GET = true,
HEAD = true,
POST = true,
PUT = false,
DELETE = false,
TRACE = false,
OPTIONS = false,
CONNECT = false,
PATCH = false,
-- https://en.wikipedia.org/wiki/WebDAV
PROPFIND = false,
PROPPATCH = false,
MKCOL = false,
COPY = false,
MOVE = false,
LOCK = false,
UNLOCK = false,
}
local textWithLineNumbers = function(theText, lineNum, lineSep)
lineNum = lineNum or 1
lineSep = lineSep or ": "
local max = lineNum
theText:gsub("\n", function(_) max = max + 1 ; return _ end)
return string.format("%" .. #tostring(max) .. "d%s%s", lineNum, lineSep, (theText:gsub("\n", function(_) lineNum = lineNum + 1 ; return string.format("%s%" .. #tostring(max) .. "d%s", _, lineNum, lineSep) end)))
end
local objectMethods = {}
local mt_table = {
__passwords = {},
__luaCaches = {},
__tostrings = {},
__index = objectMethods,
__metatable = objectMethods, -- getmetatable should only list the available methods
__type = USERDATA_TAG,
}
mt_table.__tostring = function(_)
return mt_table.__type .. ": " .. tostring(_:name()) .. ":" .. tostring(_:port()) .. ", " .. (mt_table.__tostrings[_] or "* unbound -- this is unsupported *")
end
local RFC3986getURLParts = function(resourceLocator)
local parts = {}
parts["URL"] = resourceLocator
-- we need to parse the URL to make sure we handle the path part correctly (the OS X internals follow RFC1808, but modern web browsers follow the newer RFC3986, which obsoletes 1808, plus we need the / character on path components to more easily detect when to throw 301; however for resolving .. and ., this is easier than doing it ourselves
parts["standardizedURL"] = http.urlParts(resourceLocator).standardizedURL
local stillNeedsParsing = resourceLocator
local scheme
if stillNeedsParsing:sub(1,1):match("%w") then
scheme = stillNeedsParsing:match("^(%w[%w%d%+%-%.]*):"):lower()
if scheme then stillNeedsParsing = stillNeedsParsing:sub(#scheme + 2) end
elseif stillNeedsParsing:sub(1,1) == "/" then
scheme = ""
end
if scheme then
parts["scheme"] = scheme
else
error("invalid scheme specified", 3)
end
parts["resourceSpecifier"] = stillNeedsParsing
local authority
if stillNeedsParsing:sub(1,2) == "//" then
authority = stillNeedsParsing:match("^//([^/%?#]*)")
if authority then stillNeedsParsing = stillNeedsParsing:sub(#authority + 3) end
elseif stillNeedsParsing:sub(1,1):match("[%w/%d_]") then
authority = ""
end
if authority then
if authority ~= "" then
local userInfo, hostInfo = authority:match("^(.*)@([^@]*)$") -- last @ separates user:pass@host:port
if not userInfo then
userInfo = ""
hostInfo = authority
end
if userInfo ~= "" then
local user, pass = userInfo:match("^([^:]*):(.*)$") -- first : separates user:pass
if not user then
user = userInfo
pass = nil
end
parts["user"] = user
parts["password"] = pass
end
if hostInfo ~= "" then
local host, port = hostInfo:match("^(.*):([^:]*)$") -- last : separates host:port
if host then
port = tonumber(port)
else
host = hostInfo
port = nil
end
parts["host"] = host
parts["port"] = port
end
end
else
error("invalid authority specified", 3)
end
local lastPathComponent, path, pathComponents, pathExtension = "", "", {}, ""
local pathPartOnly, theRest = stillNeedsParsing:match("^([^#%?]*)([#%?]?.*)$")
if pathPartOnly ~= "" then
-- unlike internal version used by hs.http.urlParts, keep "/" attached to path components... keeps us from missing lone "/", especially when figuring out PATH_INFO
for k in pathPartOnly:gmatch("([^/]*/?)") do
local component = k:gsub("%%[0-9a-fA-F][0-9a-fA-F]", function(val) return string.char(tonumber(val:sub(2,3), 16)) end)
table.insert(pathComponents, component)
end
while (pathComponents[#pathComponents] == "") do table.remove(pathComponents) end
lastPathComponent = pathComponents[#pathComponents]
local possibleExtension = lastPathComponent:match("^.*%.([^/]+)/?$")
if possibleExtension then pathExtension = possibleExtension end
path = pathPartOnly:gsub("%%[0-9a-fA-F][0-9a-fA-F]", function(val) return string.char(tonumber(val:sub(2,3), 16)) end)
stillNeedsParsing = theRest
end
parts["lastPathComponent"] = lastPathComponent
parts["path"] = path
parts["pathComponents"] = pathComponents
parts["pathExtension"] = pathExtension
local query, fragment = stillNeedsParsing:match("^%??([^#]*)(.*)$")
if query ~= "" then parts["query"] = query end
if #fragment > 0 then parts["fragment"] = fragment:sub(2) end
return parts
end
local verifyAccess = function(aclTable, headers)
local accessGranted = false
local headerMap = {}
-- the dash and the underline get changed so friggen often depending upon context... just make
-- the access-list comparisons agnostic about them as well as case.
for k, _ in pairs(headers) do headerMap[k:upper():gsub("-","_")] = k end
for i, v in ipairs(aclTable) do
local headerToCheck = v[1]:upper():gsub("-","_")
local valueToCheck = v[2]
local isPattern = v[3]
local desiredResult = v[4]
if type(v[1]) == "string" and
type(v[2]) == "string" and
(type(v[3]) == "boolean" or type(v[3]) == "nil") and
(type(v[4]) == "boolean" or type(v[4]) == "nil") then
if headerToCheck == '*' and valueToCheck == '*' then
accessGranted = desiredResult
break
else
local matched = false
local value = headers[headerMap[headerToCheck]]
if value then
if isPattern then
matched = value:match(valueToCheck)
else
matched = (value == valueToCheck)
end
end
if matched then
accessGranted = desiredResult
break
end
end
else
log.wf("access-list entry %d malformed, found { %s, %s, %s, %s }: skipping", i, type(v[1]), type(v[2]), type(v[3]), type(v[4]))
end
end
return accessGranted
end
local webServerHandler = function(self, method, path, headers, body)
method = method:upper()
-- Allow some internally determined stuff to be passed around to various support functions
headers._ = {
server = self,
SSL = self._ssl and true or false,
serverAdmin = self._serverAdmin,
serverSoftware = serverSoftware,
pathParts = RFC3986getURLParts((self._ssl and "https" or "http") .. "://" .. headers.Host .. path),
modifyHeaders = modifyHeaders,
queryDate = HTTPformattedDate(),
}
headers._.minimalResponseHeaders = {
["Server"] = serverSoftware,
["Last-Modified"] = headers._.queryDate,
}
headers._.minimalHTMLResponseHeaders = modifyHeaders(headers._.minimalResponseHeaders, {
["Content-Type"] = "text/html",
})
if self._accessList and not verifyAccess(self._accessList, headers) then
return self._errorHandlers[403](method, path, headers)
end
-- Check if the method is supported
local action = self._supportedMethods[method]
if not action then return self._errorHandlers[405](method, path, headers) end
-- Figure out what specific file/directory is being requested
local pathParts = headers._.pathParts
local testingPath = self._documentRoot
-- 301 if no path and no initial "/"... not sure this is necessary since testing with curl has curl fixing this before sending the request, but not sure if all browsers/web-getter-thingies do that or not, so we take care of it jic
if #pathParts.pathComponents == 0 then
local newLoc = pathParts.scheme .. "://" .. headers.Host .. "/"
if pathParts.query then newLoc = newLoc .. "?" .. pathParts.query end
if pathParts.fragment then newLoc = newLoc .. "#" .. pathParts.fragment end
return "", 301, modifyHeaders(headers._.minimalHTMLResponseHeaders, { ["Location"] = newLoc })
end
for i = 1, #pathParts.pathComponents, 1 do
testingPath = testingPath .. pathParts.pathComponents[i]
local testAttr = fs.attributes(testingPath)
if not testAttr then testAttr = fs.attributes(testingPath:sub(1, #testingPath - 1)) end
if testAttr then
if i ~= #pathParts.pathComponents or (i == #pathParts.pathComponents and testingPath:sub(#testingPath) == "/") then
if testAttr.mode == "file" then
if self._cgiEnabled or self._luaTemplateExtension then
local testExtension = pathParts.pathComponents[i]:match("^.*%.([^%.]+)/$") or ""
local testIsCGI = false
if self._cgiEnabled then
for _, v in ipairs(self._cgiExtensions) do
if v == testExtension then
testIsCGI = true
break
end
end
end
if not testIsCGI and self._luaTemplateExtension then
testIsCGI = (self._luaTemplateExtension == testExtension)
end
if testIsCGI then -- we got a PATH_INFO situation
local realPathPart = table.concat(pathParts.pathComponents, "", 1, i)
realPathPart = realPathPart:sub(1, #realPathPart - 1)
local pathInfoPart = "/" .. table.concat(pathParts.pathComponents, "", i + 1)
local newURL = pathParts.scheme .. "://" .. headers.Host .. realPathPart
if pathParts.query then newURL = newURL .. "?" .. pathParts.query end
if pathParts.fragment then newURL = newURL .. "#" .. pathParts.fragment end
headers._.pathParts = RFC3986getURLParts(newURL)
pathParts = headers._.pathParts
pathParts.pathInfo = pathInfoPart
break
else -- returning 404 because it's not a cgi file, and thus it's file where a directory should be
return self._errorHandlers[404](method, path, headers)
end
else -- returning 404 because it's a file where a directory should be and cgi is disabled
return self._errorHandlers[404](method, path, headers)
end
end -- dir at this point is ok
else
if testAttr.mode == "directory" then
if pathParts.pathComponents[i]:sub(#pathParts.pathComponents[i]) ~= "/" then
-- 301 because last directory component doesn't end with a "/"
local newLoc = pathParts.scheme .. "://" .. headers.Host .. pathParts.path .. "/"
if pathParts.query then newLoc = newLoc .. "?" .. pathParts.query end
if pathParts.fragment then newLoc = newLoc .. "#" .. pathParts.fragment end
return "", 301, modifyHeaders(headers._.minimalHTMLResponseHeaders, { ["Location"] = newLoc })
end
end -- file at this point is ok
end
else -- 404 because some component of path doesn't really exist
return self._errorHandlers[404](method, path, headers)
end
end
local targetFile = self._documentRoot .. pathParts.path
local attributes = fs.attributes(targetFile)
-- check if an index file for the directory exists
if attributes.mode == "directory" and self._directoryIndex then
for _, v in ipairs(self._directoryIndex) do
local attr = fs.attributes(targetFile .. v)
if attr and attr.mode == "file" then
targetFile = targetFile .. v
attributes = attr
local newURL = pathParts.scheme .. "://" .. headers.Host .. pathParts.path .. v
if pathParts.query then newURL = newURL .. "?" .. pathParts.query end
if pathParts.fragment then newURL = newURL .. "#" .. pathParts.fragment end
headers._.pathParts = RFC3986getURLParts(newURL)
pathParts = headers._.pathParts
break
elseif attr then
log.wf("default directoryIndex %s for %s is not a file; skipping", v, pathParts.standardizedURL)
end
end
end
-- check extension and see if it's an executable CGI
local itBeCGI = false
if pathParts.pathExtension and self._cgiEnabled then
for _, v in ipairs(self._cgiExtensions) do
if v == pathParts.pathExtension then
itBeCGI = true
break
end
end
end
local itBeDynamic = itBeCGI or (self._luaTemplateExtension and pathParts.pathExtension and self._luaTemplateExtension == pathParts.pathExtension)
local responseBody, responseCode, responseHeaders = "", 200, {}
responseHeaders["Last-Modified"] = HTTPformattedDate(attributes.modified)
responseHeaders["Server"] = serverSoftware
if itBeDynamic then
-- target is dynamically generated
responseHeaders["Last-Modified"] = headers._.queryDate
-- per https://tools.ietf.org/html/rfc3875
local CGIVariables = {
AUTH_TYPE = self:password() and "Basic" or nil,
CONTENT_TYPE = headers["Content-Type"],
CONTENT_LENGTH = headers["Content-Length"],
GATEWAY_INTERFACE = "CGI/1.1",
PATH_INFO = pathParts.pathInfo,
-- PATH_TRANSLATED = , -- see below
QUERY_STRING = pathParts.query,
REQUEST_METHOD = method,
REQUEST_SCHEME = pathParts.scheme,
REMOTE_ADDR = headers["X-Remote-Addr"],
REMOTE_PORT = headers["X-Remote-Port"],
-- REMOTE_HOST = , -- see below
-- REMOTE_IDENT = , -- we don't support IDENT protocol
REMOTE_USER = self:password() and "" or nil,
SCRIPT_NAME = pathParts.path,
SERVER_ADMIN = serverAdmin,
SERVER_NAME = pathParts.host,
SERVER_ADDR = headers["X-Server-Addr"],
SERVER_PORT = headers["X-Server-Port"],
SERVER_PROTOCOL = "HTTP/1.1",
SERVER_SOFTWARE = serverSoftware,
}
if CGIVariables.PATH_INFO then
CGIVariables.PATH_TRANSLATED = self._documentRoot .. CGIVariables.PATH_INFO
end
if self._dnsLookup then
local good, val = pcall(nethost.hostnamesForAddress, CGIVariables.REMOTE_ADDR)
if good then
CGIVariables.REMOTE_HOST = val[1]
else
log.f("unable to resolve %s", CGIVariables.REMOTE_ADDR)
end
end
-- if not CGIVariables.REMOTE_HOST then
-- CGIVariables.REMOTE_HOST = CGIVariables.REMOTE_ADDR
-- end
-- Request headers per rfc2875
for k, v in pairs(headers) do
local k2 = k:upper():gsub("-", "_")
-- skip Authorization related headers (per rfc2875) and _ internally used table
if not ({ ["AUTHORIZATION"] = 1, ["PROXY-AUTHORIZATION"] = 1, ["_"] = 1 })[k2] then
CGIVariables["HTTP_" .. k2] = v
end
end
-- commonly added
CGIVariables.DOCUMENT_URI = CGIVariables.SCRIPT_NAME .. (CGIVariables.PATH_INFO or "")
CGIVariables.REQUEST_URI = CGIVariables.DOCUMENT_URI .. (CGIVariables.QUERY_STRING and ("?" .. CGIVariables.QUERY_STRING) or "")
CGIVariables.DOCUMENT_ROOT = self._documentRoot
CGIVariables.SCRIPT_FILENAME = targetFile
CGIVariables.REQUEST_TIME = os.time()
if itBeCGI then
-- do external script thing
-- this is a horrible horrible hack...
-- look for an update to hs.httpserver because I really really really want to use hs.task for this, but we need chunked or delayed response support for that to work...
local scriptTimeout = self._scriptTimeout or DEFAULT_ScriptTimeout
local tempFileName = fs.temporaryDirectory() .. "/" .. USERDATA_TAG:gsub("^hs%.httpserver%.", "") .. hshost.globallyUniqueString()
local tmpCGIFile = io.open(tempFileName, "w")
tmpCGIFile:write("#! /bin/bash\n\n")
for k, v in pairs(CGIVariables) do
tmpCGIFile:write(string.format("export %s=%q\n", k, v))
end
tmpCGIFile:write("exec " .. targetFile .. "\n")
tmpCGIFile:close()
os.execute("chmod +x " .. tempFileName)
local tmpInputFile = io.open(tempFileName .. "input", "w")
tmpInputFile:write(body)
tmpInputFile:close()
local targetWD = self._documentRoot .. "/" .. table.concat(pathParts.pathComponents, "", 2, #pathParts.pathComponents - 1)
local oldWD = fs.currentDir()
fs.chdir(targetWD)
local out, stat, typ, rc = hs.execute("/bin/cat " .. tempFileName .. "input | /usr/bin/env -i PATH=\"/usr/bin:/bin:/usr/sbin:/sbin\" " .. scriptWrapper .. " -t " .. tostring(scriptTimeout) .. " " .. tempFileName .. " 2> " .. tempFileName .. "err")
fs.chdir(oldWD)
if stat then
responseCode = 200
local headerText, bodyText = out:match("^(.-)\r?\n\r?\n(.*)$")
if headerText then
for line in (headerText .. "\n"):gmatch("(.-)\r?\n") do
local newKey, newValue = line:match("^(.-):(.*)$")
if not newKey then -- malformed header, break out and show everything
log.i("malformed header in CGI output")
bodyText = out
break
end
if newKey:upper() == "STATUS" then
responseCode = newValue:match("(%d+)[^%d]")
else
responseHeaders[newKey] = newValue
end
end
responseBody = bodyText
else
responseBody = out
responseHeaders["Content-Type"] = "text/plain"
end
else
local errOut = "** no stderr **"
local errf = io.open(tempFileName .. "err", "rb")
if errf then
errOut = errf:read("a")
errf:close()
end
log.ef("CGI error: output:%s, stderr:%s, %s code:%d", out, errOut, typ, rc)
log.ef("CGI support files %s* not removed", tempFileName)
return self._errorHandlers[500](method, path, headers)
end
if log.level ~= 5 then -- if we're at verbose, it means we're tracking something down...
os.execute("rm " .. tempFileName)
os.execute("rm " .. tempFileName .. "input")
os.execute("rm " .. tempFileName .. "err")
else
log.vf("CGI support files %s* not removed", tempFileName)
end
else
local finput = io.open(targetFile, "rb")
if not finput then return self._errorHandlers[403.2](method, path, headers) end
local workingBody = finput:read("a")
finput:close()
-- some UTF8 encoded files include the UTF8 BOM (byte order mark) at the beginning of the file, even though this is recommended against for UTF8; lua doesn't like these characters, so remove them if necessary
if workingBody:sub(1,3) == "\xEF\xBB\xBF" then workingBody = workingBody:sub(4) end
-- decode query and/or body
-- setup the library of CGILua compatibility functions for the function environment
local _parent = {
id = hshost.globallyUniqueString(),
log = log,
request = {
method = method,
path = path,
headers = headers,
body = body,
},
response = {
body = responseBody,
code = responseCode,
headers = modifyHeaders(responseHeaders, {
["Content-Type"] = "text/html",
}),
},
CGIVariables = CGIVariables,
_tmpfiles = {},
}
local M = setmetatable({}, {
__index = function(_, k)
log.wf("CGILua compatibility function %s not implemented, returning nil", k)
return nil
end
})
for k, v in pairs(cgiluaCompat) do
if type(v) == "function" then
M[k] = function(...) return v(_parent, ...) end
elseif type(v) == "table" then
M[k] = {}
for k2, v2 in pairs(v) do
if type(v2) == "function" then
M[k][k2] = function(...) return v2(_parent, ...) end
else
M[k][k2] = v2
end
end
else
M[k] = v
end
end
-- can't assign in cgilua_compatibility_functions because debug.traceback is a function but it's one we don't want to wrap with a preceding _parent argument
M._errorhandler = debug.traceback
-- documentation for these is in the cgilua_compatibility_functions.lua file to keep them logically organized
M.script_path = CGIVariables["SCRIPT_FILENAME"]
M.script_pdir, M.script_file = M.script_path:match("^(.-)([^:/\\]*)$")
M.script_vpath = CGIVariables["PATH_INFO"] or "/"
M.script_vdir = M.script_vpath:match("^(.-)[^:/\\]*$")
M.urlpath = CGIVariables["SCRIPT_NAME"]
M.QUERY = {}
cgiluaCompat.urlcode.parsequery(_parent, CGIVariables["QUERY_STRING"], M.QUERY)
M.POST = {}
if method == "POST" then
local contentType = CGIVariables["CONTENT_TYPE"]:match("^([^; ]+)")
if not contentType then
log.ef("Missing or malformed CONTENT_TYPE for POST: %s", tostring(CGIVariables["CONTENT_TYPE"]))
return self._errorHandlers[400](method, path, headers)
end
if contentType == "x-www-form-urlencoded" or contentType == "application/x-www-form-urlencoded" then
cgiluaCompat.urlcode.parsequery(_parent, body, M.POST)
elseif contentType == "multipart/form-data" then
local _,_,boundary = CGIVariables["CONTENT_TYPE"]:find("boundary%=(.-)$")
boundary = "--" .. boundary
-- lua doesn't have a "continue" or "next" operation in for, so we're reduced to this
for chunk in body:gmatch("(.-)"..boundary) do repeat
if #chunk == 0 then break end -- "continue"
local _, ePos, headerdata = chunk:find("^(.-)\r\n\r\n")
local chunkHeaders = {}
headerdata:gsub('([^%c%s:]+):%s+([^\n]+)', function(label, value)
label = label:lower()
chunkHeaders[label] = value
end)
local attrs = {}
if chunkHeaders["content-disposition"] then
chunkHeaders["content-disposition"]:gsub(';%s*([^%s=]+)="(.-)"', function(attr, val)
attrs[attr] = val
end)
else
log.e("Error processing multipart/form-data: Missing content-disposition header")
return self._errorHandlers[400.6](method, path, headers)
end
local value
local data = chunk:sub(ePos + 1):match("^(.*)\r\n$")
if attrs["filename"] then
local tmpFile, tmpFileName = cgiluaCompat.tmpfile(_parent)
if not tmpFile then
log.ef("Unable to create temporary file:%s", tmpFileName)
return self._errorHandlers[500](method, path, headers)
end
tmpFile:write(data)
tmpFile:flush()
tmpFile:seek("set", 0)
value = {
file = tmpFile,
filename = attrs["filename"],
filesize = #data,
localFilename = tmpFileName,
}
for hdr, hdrval in pairs(chunkHeaders) do
if hdr ~= "content-disposition" then
value[hdr] = hdrval
end
end
else
value = data
end
cgiluaCompat.urlcode.insertfield(_parent, M.POST, attrs["name"], value)
until true end
elseif contentType == "application/json" then
for k, v in pairs(require"hs.json".decode(body)) do
cgiluaCompat.urlcode.insertfield(_parent, M.POST, k, v)
end
elseif contentType == "application/xml" or contentType == "text/xml" or contentType == "text/plain" then
table.insert(M.POST, body)
else
log.wf("Unsupported media type %s", contentType)
return self._errorHandlers[415](method, path, headers)
end
end
local env = { cgilua = M, print = M.print, write = M.put, hsminweb = _parent }
setmetatable(_parent, {
__index = function(_, k)
-- this is done to minimize the chances of a lua template file accidentally breaking things...
if k == "__luaCached_translations" then return mt_table.__luaCaches[self] end
if k == "__luaInternal_cgiluaENV" then return env end
end,
__gc = function(_)
for i, v in ipairs(_._tmpfiles) do
_._tmpfiles[i] = nil
if io.type(v.file) == "file" then -- as opposed to "closed file"
v.file:close()
end
local __, err = os.remove(v.name)
if not __ then log.e(err) end
end
end,
})
setmetatable(env, {
-- this allows "global" vars to be created for sharing between included files without polluting the real global space, while falling through to the real global space for built in functions, hs stuff, etc.
__index = _G,
__newindex = function(_, k, v) rawset(_, k, v) end,
})
if not (self._allowRenderTranslations and CGIVariables["PATH_INFO"] == "/_translation") then
local f, err = xpcall(cgiluaCompat.lp.compile, debug.traceback, _parent, workingBody, '@' .. targetFile, env)
if not f then
log.ef("HTML-Templated-Lua translation error: %s", err)
if self._logBadTranslations then
log.vf("\n%s", textWithLineNumbers(_parent.__luaCached_translations[workingBody]))
end
return self._errorHandlers[500](method, path, headers)
else
f = err -- the actual function returned when we use the xpcall
end
local oldWD = fs.currentDir()
fs.chdir(M.script_pdir)
local ok, errorMessage = xpcall(f, debug.traceback)
fs.chdir(oldWD)
if not ok then
log.ef("HTML-Templated-Lua execution error: %s", errorMessage)
if self._logPageErrorTranslations then
log.vf("\n%s", textWithLineNumbers(_parent.__luaCached_translations[workingBody]))
end
return self._errorHandlers[500](method, path, headers)
end
responseBody = _parent.response.body
responseCode = _parent.response.code
responseHeaders = _parent.response.headers
else
responseBody = textWithLineNumbers(_parent.__luaCached_translations[workingBody] or cgiluaCompat.lp.translate(_parent, workingBody))
responseCode = 200
responseHeaders["Content-Type"] = "text/plain"
end
end
elseif ({ ["HEAD"] = 1, ["GET"] = 1, ["POST"] = 1 })[method] then
-- otherwise, we can't truly POST, so treat POST as GET; it will ignore the content body which a static page can't get to anyways; POST should be handled by a function or dynamic support above -- this is a fallback for an improper form action, etc.
if method == "POST" then method = "GET" end
if method == "GET" or method == "HEAD" then
if attributes.mode == "file" then
local finput = io.open(targetFile, "rb")
if finput then
if method == "GET" then -- don't actually do work for HEAD
responseBody = finput:read("a")
end
finput:close()
local contentType = fs.fileUTI(targetFile)
if contentType then contentType = fs.fileUTIalternate(contentType, "mime") end
responseHeaders["Content-Type"] = contentType
else
return self._errorHandlers[403.2](method, path, headers)
end
elseif attributes.mode == "directory" and self._allowDirectory then
if fs.dir(targetFile) then
if method == "GET" then -- don't actually do work for HEAD
local targetPath = pathParts.path
if not targetPath:match("/$") then targetPath = targetPath .. "/" end
responseBody = [[
<html>
<head>
<title>Directory listing for ]] .. targetPath .. [[</title>
</head>
<body>
<h1>Directory listing for ]] .. targetPath .. [[</h1>
<hr>
<pre>]]
for k in fs.dir(targetFile) do
local fattr = fs.attributes(targetFile.."/"..k)
if k:sub(1,1) ~= "." then
if fattr then
responseBody = responseBody .. string.format(" %-12s %s %7.2fK <a href=\"http%s://%s%s%s\">%s%s</a>\n", fattr.mode, fattr.permissions, fattr.size / 1024, (self._ssl and "s" or ""), headers.Host, targetPath, k, k, (fattr.mode == "directory" and "/" or ""))
else
responseBody = responseBody .. " <i>unknown" .. string.rep(" ", 6) .. string.rep("-", 9) .. string.rep(" ", 10) .. "?? " .. k .. " ??</i>\n"
end
end
end
responseBody = responseBody .. [[</pre>
<hr>
<div align="right"><i>]] .. serverSoftware .. [[ at ]] .. headers._.queryDate .. [[</i></div>
</body>
</html>]]
end
responseHeaders["Content-Type"] = "text/html"
else
return self._errorHandlers[403.2](method, path, headers)
end
elseif attributes.mode == "directory" then
return self._errorHandlers[403.2](method, path, headers)
end
end
else
-- even though it's an allowed method, there is no built in support for it...
return self._errorHandlers[405](method, path, headers)
end
if method == "HEAD" then responseBody = "" end -- in case it was dynamic and code gave us a body
return responseBody, responseCode, responseHeaders
end
local webServerHandlerWrapper = function(self, method, path, headers, body)
local queryDate = os.date("[%d/%b/%Y:%T %z]", os.time())
local responseBody, responseCode, responseHeaders
local answers = { xpcall(webServerHandler, debug.traceback, self, method, path, headers, body) }
local ok = table.remove(answers, 1)
if not ok then
log.ef("Server Handler Error: %s", table.unpack(answers))
responseBody, responseCode, responseHeaders = self._errorHandlers[500](method, path, headers)
else
responseBody, responseCode, responseHeaders = table.unpack(answers)
end
if self._queryLogging then
-- more or less match Apache common format ( "%h %l %u %t \"%r\" %>s %b" ), in case anyone wants to parse it out... should we allow customizations?
self._accessLog = self._accessLog .. string.format("%s - - %s \"%s %s HTTP/1.1\" %d %s\n", headers["X-Remote-Addr"], queryDate, method:upper(), path:gsub("%?.*$", ""), responseCode, ((#responseBody == 0) and "-" or tostring(#responseBody)))
end
return responseBody, responseCode, responseHeaders
end
--- hs.httpserver.hsminweb:port([port]) -> hsminwebTable | current-value
--- Method
--- Get or set the name the port the web server listens on
---
--- Parameters:
--- * port - an optional integer specifying the TCP port the server listens for requests on when it is running. Defaults to `nil`, which causes the server to randomly choose a port when it is started.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * due to security restrictions enforced by OS X, the port must be a number greater than 1023
objectMethods.port = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or (type(args[1]) == "number" and math.tointeger(args[1])), "argument must be an integer")
if args.n > 0 then
if self._server then
self._server:setPort(args[1])
self._port = self._server:getPort()
else
self._port = args[1]
end
return self
else
return self._server and self._server:getPort() or self._port
end
end
--- hs.httpserver.hsminweb:name([name]) -> hsminwebTable | current-value
--- Method
--- Get or set the name the web server uses in Bonjour advertisement when the web server is running.
---
--- Parameters:
--- * name - an optional string specifying the name the server advertises itself as when Bonjour is enabled and the web server is running. Defaults to `nil`, which causes the server to be advertised with the computer's name as defined in the Sharing preferences panel for the computer.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
objectMethods.name = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "string", "argument must be string")
if args.n > 0 then
if self._server then
self._server:setName(args[1])
self._name = self._server:getName()
else
self._name = args[1]
end
return self
else
return self._server and self._server:getName() or self._name
end
end
--- hs.httpserver.hsminweb:password([password]) -> hsminwebTable | boolean
--- Method
--- Set a password for the hsminweb web server, or return a boolean indicating whether or not a password is currently set for the web server.
---
--- Parameters:
--- * password - An optional string that contains the server password, or an explicit `nil` to remove an existing password.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or a boolean indicathing whether or not a password has been set if no parameter is specified.
---
--- Notes:
--- * the password, if set, is server wide and causes the server to use the Basic authentication scheme with an empty string for the username.
--- * this module is an extension to the Hammerspoon core module `hs.httpserver`, so it has the same limitations regarding server passwords. See the documentation for `hs.httpserver.setPassword` (`help.hs.httpserver.setPassword` in the Hammerspoon console).
objectMethods.password = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "string", "argument must be string")
if args.n > 0 then
if self._server then
self._server:setPassword(args[1])
mt_table.__passwords[self] = args[1]
else
mt_table.__passwords[self] = args[1]
end
return self
else
return mt_table.__passwords[self] and true or false
end
end
--- hs.httpserver.hsminweb:maxBodySize([size]) -> hsminwebTable | current-value
--- Method
--- Get or set the maximum body size for an HTTP request
---
--- Parameters:
--- * size - An optional integer value specifying the maximum body size allowed for an incoming HTTP request in bytes. Defaults to 10485760 (10 MB).
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * Because the Hammerspoon http server processes incoming requests completely in memory, this method puts a limit on the maximum size for a POST or PUT request.
--- * If the request body excedes this size, `hs.httpserver` will respond with a status code of 405 for the method before this module ever receives the request.
objectMethods.maxBodySize = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or (type(args[1]) == "number" and math.tointeger(args[1])), "argument must be an integer")
if args.n > 0 then
if self._server then
self._server:maxBodySize(args[1])
self._maxBodySize = self._server:maxBodySize()
else
self._maxBodySize = args[1]
end
return self
else
return self._server and self._server:maxBodySize() or self._maxBodySize
end
end
--- hs.httpserver.hsminweb:documentRoot([path]) -> hsminwebTable | current-value
--- Method
--- Get or set the document root for the web server.
---
--- Parameters:
--- * path - an optional string, default `os.getenv("HOME") .. "/Sites"`, specifying where documents for the web server should be served from.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
objectMethods.documentRoot = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "string", "argument must be string")
if args.n > 0 then
local dr = args[1]
if dr ~= "/" and dr:match(".+/$") then
dr = dr:match("^(.+)/$")
end
self._documentRoot = dr
return self
else
return self._documentRoot
end
end
--- hs.httpserver.hsminweb:ssl([flag]) -> hsminwebTable | current-value
--- Method
--- Get or set the whether or not the web server utilizes SSL for HTTP request and response communications.
---
--- Parameters:
--- * flag - an optional boolean, defaults to false, indicating whether or not the server utilizes SSL for HTTP request and response traffic.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * this flag can only be changed when the server is not running (i.e. the [hs.httpserver.hsminweb:start](#start) method has not yet been called, or the [hs.httpserver.hsminweb:stop](#stop) method is called first.)
--- * this module is an extension to the Hammerspoon core module `hs.httpserver`, so it has the same considerations regarding SSL. See the documentation for `hs.httpserver.new` (`help.hs.httpserver.new` in the Hammerspoon console).
objectMethods.ssl = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "boolean", "argument must be boolean")
if args.n > 0 then
if not self._server then
self._ssl = args[1]
return self
else
error("ssl cannot be set for a running server", 2)
end
else
return self._ssl
end
end
--- hs.httpserver.hsminweb:bonjour([flag]) -> hsminwebTable | current-value
--- Method
--- Get or set the whether or not the web server should advertise itself via Bonjour when it is running.
---
--- Parameters:
--- * flag - an optional boolean, defaults to true, indicating whether or not the server should advertise itself via Bonjour when it is running.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * this flag can only be changed when the server is not running (i.e. the [hs.httpserver.hsminweb:start](#start) method has not yet been called, or the [hs.httpserver.hsminweb:stop](#stop) method is called first.)
objectMethods.bonjour = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "boolean", "argument must be boolean")
if args.n > 0 then
if not self._bonjour then
self._bonjour = args[1]
return self
else
error("bonjour cannot be set for a running server", 2)
end
else
return self._bonjour
end
end
--- hs.httpserver.hsminweb:allowDirectory([flag]) -> hsminwebTable | current-value
--- Method
--- Get or set the whether or not a directory index is returned when the requested URL specifies a directory and no file matching an entry in the directory indexes table is found.
---
--- Parameters:
--- * flag - an optional boolean, defaults to false, indicating whether or not a directory index can be returned when a default file cannot be located.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * if this value is false, then an attempt to retrieve a URL specifying a directory that does not contain a default file as identified by one of the entries in the [hs.httpserver.hsminweb:directoryIndex](#directoryIndex) list will result in a "403.2" error.
objectMethods.allowDirectory = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "boolean", "argument must be boolean")
if args.n > 0 then
self._allowDirectory = args[1]
return self
else
return self._allowDirectory
end
end
--- hs.httpserver.hsminweb:dnsLookup([flag]) -> hsminwebTable | current-value
--- Method
--- Get or set the whether or not DNS lookups are performed.
---
--- Parameters:
--- * flag - an optional boolean, defaults to false, indicating whether or not DNS lookups are performed.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * DNS lookups can be time consuming or even block Hammerspoon for a short time, so they are disabled by default.
--- * Currently DNS lookups are (optionally) performed for CGI scripts, but may be added for other purposes in the future (logging, etc.).
objectMethods.dnsLookup = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "boolean", "argument must be boolean")
if args.n > 0 then
self._dnsLookup = args[1]
return self
else
return self._dnsLookup
end
end
--- hs.httpserver.hsminweb:queryLogging([flag]) -> hsminwebTable | current-value
--- Method
--- Get or set the whether or not requests to this web server are logged.
---
--- Parameters:
--- * flag - an optional boolean, defaults to false, indicating whether or not query requests are logged.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * If logging is enabled, an Apache common style log entry is appended to [self._accesslog](#_accessLog) for each request made to the web server.
--- * Error messages during content generation are always logged to the Hammerspoon console via the `hs.logger` instance saved to [hs.httpserver.hsminweb.log](#log).
objectMethods.queryLogging = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "boolean", "argument must be boolean")
if args.n > 0 then
self._queryLogging = args[1]
return self
else
return self._queryLogging
end
end
--- hs.httpserver.hsminweb:directoryIndex([table]) -> hsminwebTable | current-value
--- Method
--- Get or set the file names to look for when the requested URL specifies a directory.
---
--- Parameters:
--- * table - an optional table or `nil`, defaults to `{ "index.html", "index.htm" }`, specifying a list of file names to look for when the requested URL specifies a directory. If a file with one of the names is found in the directory, this file is served instead of the directory.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * Files listed in this table are checked in order, so the first matched is served. If no file match occurs, then the server will return a generated list of the files in the directory, or a "403.2" error, depending upon the value controlled by [hs.httpserver.hsminweb:allowDirectory](#allowDirectory).
objectMethods.directoryIndex = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "table", "argument must be a table of index file names")
if args.n > 0 then
self._directoryIndex = args[1]
return self
else
return self._directoryIndex
end
end
--- hs.httpserver.hsminweb:cgiEnabled([flag]) -> hsminwebTable | current-value
--- Method
--- Get or set the whether or not CGI file execution is enabled.
---
--- Parameters:
--- * flag - an optional boolean, defaults to false, indicating whether or not CGI script execution is enabled for the web server.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
objectMethods.cgiEnabled = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "boolean", "argument must be boolean")
if args.n > 0 then
self._cgiEnabled = args[1]
return self
else
return self._cgiEnabled
end
end
--- hs.httpserver.hsminweb:cgiExtensions([table]) -> hsminwebTable | current-value
--- Method
--- Get or set the file extensions which identify files which should be executed as CGI scripts to provide the results to an HTTP request.
---
--- Parameters:
--- * table - an optional table or `nil`, defaults to `{ "cgi", "pl" }`, specifying a list of file extensions which indicate that a file should be executed as CGI scripts to provide the content for an HTTP request.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * this list is ignored if [hs.httpserver.hsminweb:cgiEnabled](#cgiEnabled) is not also set to true.
objectMethods.cgiExtensions = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "table", "argument must be table of file extensions")
if args.n > 0 then
self._cgiExtensions = args[1]
return self
else
return self._cgiExtensions
end
end
--- hs.httpserver.hsminweb:luaTemplateExtension([string]) -> hsminwebTable | current-value
--- Method
--- Get or set the extension of files which contain Lua code which should be executed within Hammerspoon to provide the results to an HTTP request.
---
--- Parameters:
--- * string - an optional string or `nil`, defaults to `nil`, specifying the file extension which indicates that a file should be executed as Lua code within the Hammerspoon environment to provide the content for an HTTP request.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * This extension is checked after the extensions given to [hs.httpserver.hsminweb:cgiExtensions](#cgiExtensions); this means that if the same extension set by this method is also in the CGI extensions list, then the file will be interpreted as a CGI script and ignore this setting.
objectMethods.luaTemplateExtension = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "string", "argument must be a file extension")
if args.n > 0 then
self._luaTemplateExtension = args[1]
return self
else
return self._luaTemplateExtension
end
end
--- hs.httpserver.hsminweb:scriptTimeout([integer]) -> hsminwebTable | current-value
--- Method
--- Get or set the timeout for a CGI script
---
--- Parameters:
--- * integer - an optional integer, defaults to 30, specifying the length of time in seconds a CGI script should be allowed to run before being forcibly terminated if it has not yet completed its task.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * With the current functionality available in `hs.httpserver`, any script which is expected to return content for an HTTP request must run in a blocking manner -- this means that no other Hammerspoon activity can be occurring while the script is executing. This parameter lets you set the maximum amount of time such a script can hold things up before being terminated.
--- * An alternative implementation of at least some of the methods available in `hs.httpserver` is being considered which may make it possible to use `hs.task` for these scripts, which would alleviate this blocking behavior. However, even if this is addressed, a timeout for scripts is still desirable so that a client making a request doesn't sit around waiting forever if a script is malformed.
objectMethods.scriptTimeout = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or (type(args[1]) == "number" and math.tointeger(args[1])), "argument must be an integer")
if args.n > 0 then
self._scriptTimeout = args[1]
return self
else
return self._scriptTimeout
end
end
--- hs.httpserver.hsminweb:accessList([table]) -> hsminwebTable | current-value
--- Method
--- Get or set the access-list table for the hsminweb web server
---
--- Parameters:
--- * table - an optional table or `nil` containing the access list for the web server, default `nil`.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * The access-list feature works by comparing the request headers against a list of tests which either accept or reject the request. If no access list is set (i.e. it is assigned a value of `nil`), then all requests are served. If a table is passed into this method, then any request which is not explicitly accepted by one of the tests provided is rejected (i.e. there is an implicit "reject" at the end of the list).
--- * The access-list table is a list of tests which are evaluated in order. The first test which matches a given request determines whether or not the request is accepted or rejected.
--- * Each entry in the access-list table is also a table with the following format:
--- * { 'header', 'value', isPattern, isAccepted }
--- * header - a string value matching the name of a header. While the header name must match exactly, the comparison is case-insensitive (i.e. "X-Remote-addr" and "x-remote-addr" will both match the actual header name used, which is "X-Remote-Addr").
--- * value - a string value specifying the value to compare the header key's value to.
--- * isPattern - a boolean indicating whether or not the header key's value should be compared to `value` as a pattern match (true) -- see Lua documentation 6.4.1, `help.lua._man._6_4_1` in the console, or as an exact match (false)
--- * isAccepted - a boolean indicating whether or not a match should be accepted (true) or rejected (false)
--- * A special entry of the form { '\*', '\*', '\*', true } accepts all further requests and can be used as the final entry if you wish for the access list to function as a list of requests to reject, but to accept any requests which do not match a previous test.
--- * A special entry of the form { '\*', '\*', '\*', false } rejects all further requests and can be used as the final entry if you wish for the access list to function as a list of requests to accept, but to reject any requests which do not match a previous test. This is the implicit "default" final test if a table is assigned with the access-list method and does not actually need to be specified, but is included for completeness.
--- * Note that any entry after an entry in which the first two parameters are equal to '\*' will never actually be used.
---
--- * The tests are performed in order; if you wich to allow one IP address in a range, but reject all others, you should list the accepted IP addresses first. For example:
--- ~~~
--- {
--- { 'X-Remote-Addr', '192.168.1.100', false, true }, -- accept requests from 192.168.1.100
--- { 'X-Remote-Addr', '^192%.168%.1%.', true, false }, -- reject all others from the 192.168.1 subnet
--- { '*', '*', '*', true } -- accept all other requests
--- }
--- ~~~
---
--- * Most of the headers available are provided by the requesting web browser, so the exact headers available will vary. You can find some information about common HTTP request headers at: https://en.wikipedia.org/wiki/List_of_HTTP_header_fields.
---
--- * The following headers are inserted automatically by `hs.httpserver` and are probably the most useful for use in an access list:
--- * X-Remote-Addr - the remote IPv4 or IPv6 address of the machine making the request,
--- * X-Remote-Port - the TCP port of the remote machine where the request originated.
--- * X-Server-Addr - the server IPv4 or IPv6 address that the web server received the request from. For machines with multiple interfaces, this will allow you to determine which interface the request was received on.
--- * X-Server-Port - the TCP port of the web server that received the request.
objectMethods.accessList = function(self, ...)
local args = table.pack(...)
assert(type(args[1]) == "nil" or type(args[1]) == "table", "argument must be table of access requirements")
if args.n > 0 then
self._accessList = args[1]
return self
else
return self._accessList
end
end
--- hs.httpserver.hsminweb:interface([interface]) -> hsminwebTable | current-value
--- Method
--- Get or set the network interface that the hsminweb web server will listen on
---
--- Parameters:
--- * interface - an optional string, or nil, specifying the network interface the web server will listen on. An explicit nil specifies that the web server should listen on all active interfaces for the machine. Defaults to nil.
---
--- Returns:
--- * the hsminwebTable object if a parameter is provided, or the current value if no parameter is specified.
---
--- Notes:
--- * See `hs.httpserver.setInterface` for a description of valid values that can be specified as the `interface` argument to this method.
--- * the interface can only be specified before the hsminweb web server has been started. If you wish to change the listening interface for a running web server, you must stop it with [hs.httpserver.hsminweb:stop](#stop) before invoking this method and then restart it with [hs.httpserver.hsminweb:start](#start).
objectMethods.interface = function(self, ...)
local args = table.pack(...)
if args.n == 0 then
return self._interface
else
if not self._server then
if args[1] == nil or type(args[1]) == "string" then
self._interface = args[1]
else
error("interface must be nil or a string", 2)
end
else
error("cannot set the interface on a running hsminweb web server", 2)
end
return self
end
end
--- hs.httpserver.hsminweb:start() -> hsminwebTable
--- Method
--- Start serving pages for the hsminweb web server.
---
--- Parameters:
--- * None
---
--- Returns:
--- * the hsminWebTable object
objectMethods.start = function(self)
if not self._server then
self._ssl = self._ssl or false
self._bonjour = (type(self._bonjour) == "nil") and true or self._bonjour
self._server = require"hs.httpserver".new(self._ssl, self._bonjour):setCallback(function(...)
return webServerHandlerWrapper(self, ...)
end)
if self._port then self._server:setPort(self._port) end
if self._name then self._server:setName(self._name) end
if self._maxBodySize then self._server:maxBodySize(self._maxBodySize) end
if self._interface then self._server:setInterface(self._interface) end
if mt_table.__passwords[self] then self._server:setPassword(mt_table.__passwords[self]) end
self._server:start()
return self
else
error("server already started", 2)
end
end
--- hs.httpserver.hsminweb:stop() -> hsminwebTable
--- Method
--- Stop serving pages for the hsminweb web server.
---
--- Parameters:
--- * None
---
--- Returns:
--- * the hsminWebTable object
---
--- Notes:
--- * this method is called automatically during garbage collection.
objectMethods.stop = function(self)
if self._server then
self._server:stop()
self._server = nil
return self
else
error("server not currently running", 2)
end
end
objectMethods.__gc = function(self)
if self._server then self:stop() end
end
--- hs.httpserver.hsminweb.new([documentRoot]) -> hsminwebTable
--- Constructor
--- Create a new hsminweb table object representing a Hammerspoon Web Server.
---
--- Parameters:
--- * documentRoot - an optional string specifying the document root for the new web server. Defaults to the Hammerspoon users `Sites` sub-directory (i.e. `os.getenv("HOME").."/Sites"`).
---
--- Returns:
--- * a table representing the hsminweb object.
---
--- Notes:
--- * a web server's document root is the directory which contains the documents or files to be served by the web server.
--- * while an hs.minweb object is actually represented by a Lua table, it has been assigned a meta-table which allows methods to be called directly on it like a user-data object. For most purposes, you should think of this table as the module's userdata.
module.new = function(documentRoot)
documentRoot = documentRoot or os.getenv("HOME").."/Sites"
if documentRoot ~= "/" and documentRoot:match(".+/$") then
documentRoot = documentRoot:match("^(.+)/$")
end
local instance = {
_documentRoot = documentRoot,
_directoryIndex = shallowCopy(directoryIndex),
_cgiExtensions = shallowCopy(cgiExtensions),
_serverAdmin = serverAdmin,
_errorHandlers = setmetatable({}, errorHandlers),
_supportedMethods = setmetatable({}, { __index = supportedMethods }),
_accessLog = "",
}
-- make it easy to see which methods are supported
for k, v in pairs(supportedMethods) do if v then instance._supportedMethods[k] = v end end
-- save tostring(instance) since we override it, but I like the address so it looks more "formal" in the console...
mt_table.__tostrings[instance] = tostring(instance)
mt_table.__luaCaches[instance] = {}
return setmetatable(instance, mt_table)
end
--- hs.httpserver.hsminweb._serverAdmin
--- Variable
--- Accessed as `self._serverAdmin`. A string containing the administrator for the web server. Defaults to the currently logged in user's short form username and the computer's localized name as returned by `hs.host.localizedName()` (e.g. "user@computer").
---
--- This value is often used in error messages or on error pages indicating a point of contact for administrative help. It can be accessed from within an error helper functions as `headers._.serverAdmin`.
--- hs.httpserver.hsminweb._accessLog
--- Variable
--- Accessed as `self._accessLog`. If query logging is enabled for the web server, an Apache style common log entry will be appended to this string for each request. See [hs.httpserver.hsminweb:queryLogging](#queryLogging).
--- hs.httpserver.hsminweb._errorHandlers
--- Variable
--- Accessed as `self._errorHandlers[errorCode]`. A table whose keyed entries specify the function to generate the error response page for an HTTP error.
---
--- HTTP uses a three digit numeric code for error conditions. Some servers have introduced subcodes, which are appended as a decimal added to the error condition.
---
--- You can assign your own handler to customize the response for a specific error code by specifying a function for the desired error condition as the value keyed to the error code as a string key in this table. The function should expect three arguments:
--- * method - the method for the HTTP request
--- * path - the full path, including any GET query items
--- * headers - a table containing key-value pairs for the HTTP request headers
---
--- If you override the default handler, "default", the function should expect four arguments instead: the error code as a string, followed by the same three arguments defined above.
---
--- In either case, the function should return three values:
--- * body - the content to be returned, usually HTML for a basic error description page
--- * code - a 3 digit integer specifying the HTTP Response status (see https://en.wikipedia.org/wiki/List_of_HTTP_status_codes)
--- * headers - a table containing any headers which should be included in the HTTP response.
--- hs.httpserver.hsminweb._supportMethods
--- Variable
--- Accessed as `self._supportMethods[method]`. A table whose keyed entries specify whether or not a specified HTTP method is supported by this server.
---
--- The default methods supported internally are:
--- * HEAD - an HTTP method which verifies whether or not a resource is available and it's last modified date
--- * GET - an HTTP method requesting content; the default method used by web browsers for bookmarks or URLs typed in by the user
--- * POST - an HTTP method requesting content that includes content in the request body, most often used by forms to include user input or file data which may affect the content being returned.
---
--- If you assign `true` to another method key, then it will be supported if the target URL refers to a CGI script or Lua Template file, and their support has been enabled for the server.
---
--- If you assign `false` to a method key, then *any* request utilizing that method will return a status of 405 (Method Not Supported). E.g. `self._supportMethods["POST"] = false` will prevent the POST method from being supported.
---
--- Common HTTP request methods can be found at https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Request_methods and https://en.wikipedia.org/wiki/WebDAV. Currently, only HEAD, GET, and POST have built in support for static pages; even if you set other methods to `true`, they will return a status code of 405 (Method Not Supported) if the request does not invoke a CGI file or Lua Template file for dynamic content.
---
--- A companion module supporting the methods required for WebDAV is being considered.
--- hs.httpserver.hsminweb.dateFormatString
--- Constant
--- A format string, usable with `os.date`, which will display a date in the format expected for HTTP communications as described in RFC 822, updated by RFC 1123.
module.dateFormatString = HTTPdateFormatString
--- hs.httpserver.hsminweb.formattedDate([date]) -> string
--- Function
--- Returns the current or specified time in the format expected for HTTP communications as described in RFC 822, updated by RFC 1123.
---
--- Parameters:
--- * date - an optional integer specifying the date as the number of seconds since 00:00:00 UTC on 1 January 1970. Defaults to the current time as returned by `os.time()`
---
--- Returns:
--- * the time indicated as a string in the format expected for HTTP communications as described in RFC 822, updated by RFC 1123.
module.formattedDate = HTTPformattedDate
--- hs.httpserver.hsminweb.urlParts(url) -> table
--- Function
--- Parse the specified URL into it's constituant parts.
---
--- Parameters:
--- * url - the url to parse
---
--- Returns:
--- * a table containing the constituant parts of the provided url. The table will contain one or more of the following key-value pairs:
--- * fragment - the anchor name a URL refers to within an HTML document. Appears after '#' at the end of a URL. Note that not all web clients include this in an HTTP request since its normal purpose is to indicate where to scroll to within a page after the content has been retrieved.
--- * host - the host name portion of the URL, if any
--- * lastPathComponent - the last component of the path portion of the URL
--- * password - the password specified in the URL. Note that this is not the password that would be entered when using Basic or Digest authentication; rather it is a password included in the URL itself -- for security reasons, use of this field has been deprecated in most situations and modern browsers will often prompt for confirmation before allowing URL's which contain a password to be transmitted.
--- * path - the full path specified in the URL
--- * pathComponents - an array containing the path components as individual strings. Components which specify a sub-directory of the path will end with a "/" character.
--- * pathExtension - if the final component of the path refers to a file, the file's extension, if any.
--- * port - the port specified in the URL, if any
--- * query - the portion of the URL after a '?' character, if any; used to contain query information often from a form submitting it's input with the GET method.
--- * resourceSpecifier - the portion of the URL after the scheme
--- * scheme - the URL scheme; for web traffic, this will be "http" or "https"
--- * standardizedURL - the URL with any path components of ".." or "." normalized. The use of ".." that would cause the URL to refer to something preceding its root is simply removed.
--- * URL - the URL as it was provided to this function (no changes)
--- * user - the user name specified in the URL. Note that this is not the user name that would be entered when using Basic or Digest authentication; rather it is a user name included in the URL itself -- for security reasons, use of this field has been deprecated in most situations and modern browsers will often prompt for confirmation before allowing URL's which contain a user name to be transmitted.
---
--- Notes:
--- * This function differs from the similar function `hs.http.urlParts` in a few ways:
--- * To simplify the logic used by this module to determine if a request for a directory is properly terminated with a "/", the path components returned by this function do not remove this character from the component, if present.
--- * Some extraneous or duplicate keys have been removed.
--- * This function is patterned after RFC 3986 while `hs.http.urlParts` uses OS X API functions which are patterned after RFC 1808. RFC 3986 obsoletes 1808. The primary distinction that affects this module is in regards to `parameters` for path components in the URI -- RFC 3986 disallows them in schema based URI's (like the URL's that are used for web based traffic).
module.urlParts = RFC3986getURLParts
--- hs.httpserver.hsminweb.log
--- Variable
--- The `hs.logger` instance for the `hs.httpserver.hsminweb` module. See the documentation for `hs.logger` for more information.
module.log = log
--- hs.httpserver.hsminweb.statusCodes
--- Constant
--- HTTP Response Status Codes
---
--- This table contains a list of common HTTP status codes identified from various sources (see Notes below). Because some web servers append a subcode after the official HTTP status codes, the keys in this table are the string representation of the numeric code so a distinction can be made between numerically "identical" keys (for example, "404.1" and "404.10"). You can reference this table with a numeric key, however, and it will be converted to its string representation internally.
---
--- Notes:
--- * The keys and labels in this table have been combined from a variety of sources including, but not limited to:
--- * "Official" list at https://en.wikipedia.org/wiki/List_of_HTTP_status_codes
--- * KeplerProject's wsapi at https://github.com/keplerproject/wsapi
--- * IIS additions from https://support.microsoft.com/en-us/kb/943891
--- * This table has metatable additions which allow you to review its contents from the Hammerspoon console by typing `hs.httpserver.hsminweb.statusCodes`
module.statusCodes = setmetatable(statusCodes, {
__tostring = function(_)
local outputList = {}
for k, v in pairs(_) do table.insert(outputList, string.format("%-7s %s", k, v)) end
table.sort(outputList, function(a, b) return a:sub(1,7) < b:sub(1,7) end)
return table.concat(outputList, "\n")
end,
__index = function(_, k)
return rawget(_, tostring(k)) or nil
end,
})
return module