Resolve KASM-2238 "Feature/ freeze session"
This commit is contained in:
@@ -216,10 +216,10 @@ ws_ctx_t *ws_socket(ws_ctx_t *ctx, int socket) {
|
||||
return ctx;
|
||||
}
|
||||
|
||||
ws_ctx_t *ws_socket_ssl(ws_ctx_t *ctx, int socket, char * certfile, char * keyfile) {
|
||||
ws_ctx_t *ws_socket_ssl(ws_ctx_t *ctx, int socket, const char * certfile, const char * keyfile) {
|
||||
int ret;
|
||||
char msg[1024];
|
||||
char * use_keyfile;
|
||||
const char * use_keyfile;
|
||||
ws_socket(ctx, socket);
|
||||
|
||||
if (keyfile && (keyfile[0] != '\0')) {
|
||||
@@ -292,7 +292,7 @@ void ws_socket_free(ws_ctx_t *ctx) {
|
||||
}
|
||||
}
|
||||
|
||||
int ws_b64_ntop(const unsigned char const * src, size_t srclen, char * dst, size_t dstlen) {
|
||||
int ws_b64_ntop(const unsigned char * const src, size_t srclen, char * dst, size_t dstlen) {
|
||||
int len = 0;
|
||||
int total_len = 0;
|
||||
|
||||
@@ -327,7 +327,7 @@ int ws_b64_ntop(const unsigned char const * src, size_t srclen, char * dst, size
|
||||
return len;
|
||||
}
|
||||
|
||||
int ws_b64_pton(const char const * src, unsigned char * dst, size_t dstlen) {
|
||||
int ws_b64_pton(const char * const src, unsigned char * dst, size_t dstlen) {
|
||||
int len = 0;
|
||||
int total_len = 0;
|
||||
int pending = 0;
|
||||
@@ -724,14 +724,14 @@ int gen_md5(headers_t *headers, char *target) {
|
||||
static void gen_sha1(headers_t *headers, char *target) {
|
||||
SHA_CTX c;
|
||||
unsigned char hash[SHA_DIGEST_LENGTH];
|
||||
int r;
|
||||
//int r;
|
||||
|
||||
SHA1_Init(&c);
|
||||
SHA1_Update(&c, headers->key1, strlen(headers->key1));
|
||||
SHA1_Update(&c, HYBI_GUID, 36);
|
||||
SHA1_Final(hash, &c);
|
||||
|
||||
r = ws_b64_ntop(hash, sizeof hash, target, HYBI10_ACCEPTHDRLEN);
|
||||
/*r =*/ ws_b64_ntop(hash, sizeof hash, target, HYBI10_ACCEPTHDRLEN);
|
||||
//assert(r == HYBI10_ACCEPTHDRLEN - 1);
|
||||
}
|
||||
|
||||
@@ -1021,7 +1021,8 @@ static uint8_t ownerapi_post(ws_ctx_t *ws_ctx, const char *in) {
|
||||
goto nope;
|
||||
}
|
||||
|
||||
uint64_t mask = USER_UPDATE_WRITE_MASK | USER_UPDATE_OWNER_MASK;
|
||||
uint64_t mask = USER_UPDATE_READ_MASK | USER_UPDATE_WRITE_MASK |
|
||||
USER_UPDATE_OWNER_MASK;
|
||||
|
||||
if (set->entries[s].password[0]) {
|
||||
struct crypt_data cdata;
|
||||
@@ -1035,6 +1036,7 @@ static uint8_t ownerapi_post(ws_ctx_t *ws_ctx, const char *in) {
|
||||
|
||||
if (!settings.updateUserCb(settings.messager, set->entries[s].user, mask,
|
||||
set->entries[s].password,
|
||||
set->entries[s].read,
|
||||
set->entries[s].write, set->entries[s].owner)) {
|
||||
wserr("Invalid params to update_user\n");
|
||||
goto nope;
|
||||
@@ -1173,7 +1175,7 @@ static uint8_t ownerapi(ws_ctx_t *ws_ctx, const char *in) {
|
||||
}
|
||||
} else entry("/api/create_user") {
|
||||
char decname[1024] = "", decpw[1024] = "";
|
||||
uint8_t write = 0, owner = 0;
|
||||
uint8_t read = 0, write = 0, owner = 0;
|
||||
|
||||
param = parse_get(args, "name", &len);
|
||||
if (len) {
|
||||
@@ -1195,6 +1197,12 @@ static uint8_t ownerapi(ws_ctx_t *ws_ctx, const char *in) {
|
||||
strcpy(decpw, encrypted);
|
||||
}
|
||||
|
||||
param = parse_get(args, "read", &len);
|
||||
if (len && isalpha(param[0])) {
|
||||
if (!strncmp(param, "true", len))
|
||||
read = 1;
|
||||
}
|
||||
|
||||
param = parse_get(args, "write", &len);
|
||||
if (len && isalpha(param[0])) {
|
||||
if (!strncmp(param, "true", len))
|
||||
@@ -1210,7 +1218,7 @@ static uint8_t ownerapi(ws_ctx_t *ws_ctx, const char *in) {
|
||||
if (!decname[0] || !decpw[0])
|
||||
goto nope;
|
||||
|
||||
if (!settings.adduserCb(settings.messager, decname, decpw, write, owner)) {
|
||||
if (!settings.adduserCb(settings.messager, decname, decpw, read, write, owner)) {
|
||||
wserr("Invalid params to create_user\n");
|
||||
goto nope;
|
||||
}
|
||||
@@ -1267,6 +1275,14 @@ static uint8_t ownerapi(ws_ctx_t *ws_ctx, const char *in) {
|
||||
goto nope;
|
||||
|
||||
uint64_t mask = 0;
|
||||
uint8_t myread = 0;
|
||||
param = parse_get(args, "read", &len);
|
||||
if (len && isalpha(param[0])) {
|
||||
mask |= USER_UPDATE_READ_MASK;
|
||||
if (!strncmp(param, "true", len))
|
||||
myread = 1;
|
||||
}
|
||||
|
||||
uint8_t mywrite = 0;
|
||||
param = parse_get(args, "write", &len);
|
||||
if (len && isalpha(param[0])) {
|
||||
@@ -1283,7 +1299,8 @@ static uint8_t ownerapi(ws_ctx_t *ws_ctx, const char *in) {
|
||||
myowner = 1;
|
||||
}
|
||||
|
||||
if (!settings.updateUserCb(settings.messager, decname, mask, "", mywrite, myowner)) {
|
||||
if (!settings.updateUserCb(settings.messager, decname, mask, "",
|
||||
myread, mywrite, myowner)) {
|
||||
wserr("Invalid params to update_user\n");
|
||||
goto nope;
|
||||
}
|
||||
@@ -1370,14 +1387,25 @@ static uint8_t ownerapi(ws_ctx_t *ws_ctx, const char *in) {
|
||||
goto nope;
|
||||
}
|
||||
|
||||
while (1) {
|
||||
usleep(10 * 1000);
|
||||
if (settings.serverFrameStatsReadyCb(settings.messager))
|
||||
break;
|
||||
unsigned waits;
|
||||
{
|
||||
uint8_t failed = 1;
|
||||
for (waits = 0; waits < 500; waits++) { // wait up to 10s
|
||||
usleep(20 * 1000);
|
||||
if (settings.serverFrameStatsReadyCb(settings.messager)) {
|
||||
failed = 0;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (failed) {
|
||||
wserr("Main thread didn't respond, aborting (bug!)\n");
|
||||
settings.resetFrameStatsCb(settings.messager);
|
||||
goto timeout;
|
||||
}
|
||||
}
|
||||
|
||||
if (waitfor) {
|
||||
unsigned waits;
|
||||
for (waits = 0; waits < 20; waits++) { // wait up to 2s
|
||||
if (settings.getClientFrameStatsNumCb(settings.messager) >= waitfor)
|
||||
break;
|
||||
@@ -1403,6 +1431,7 @@ static uint8_t ownerapi(ws_ctx_t *ws_ctx, const char *in) {
|
||||
#undef entry
|
||||
|
||||
return ret;
|
||||
|
||||
nope:
|
||||
sprintf(buf, "HTTP/1.1 400 Bad Request\r\n"
|
||||
"Server: KasmVNC/4.0\r\n"
|
||||
@@ -1412,6 +1441,16 @@ nope:
|
||||
"400 Bad Request");
|
||||
ws_send(ws_ctx, buf, strlen(buf));
|
||||
return 1;
|
||||
|
||||
timeout:
|
||||
sprintf(buf, "HTTP/1.1 503 Service Unavailable\r\n"
|
||||
"Server: KasmVNC/4.0\r\n"
|
||||
"Connection: close\r\n"
|
||||
"Content-type: text/plain\r\n"
|
||||
"\r\n"
|
||||
"503 Service Unavailable");
|
||||
ws_send(ws_ctx, buf, strlen(buf));
|
||||
return 1;
|
||||
}
|
||||
|
||||
ws_ctx_t *do_handshake(int sock, const char *ip) {
|
||||
@@ -1696,7 +1735,7 @@ out:
|
||||
}
|
||||
|
||||
void *start_server(void *unused) {
|
||||
int csock, pid;
|
||||
int csock;
|
||||
struct sockaddr_in cli_addr;
|
||||
socklen_t clilen;
|
||||
|
||||
@@ -1706,7 +1745,6 @@ void *start_server(void *unused) {
|
||||
while (1) {
|
||||
clilen = sizeof(cli_addr);
|
||||
pipe_error = 0;
|
||||
pid = 0;
|
||||
do {
|
||||
csock = accept(settings.listen_sock,
|
||||
(struct sockaddr *) &cli_addr,
|
||||
|
||||
Reference in New Issue
Block a user