#include "qtv.h" #define MINPLUGVER "4239" //main reason to use connection close is because we're lazy and don't want to give sizes in advance (yes, we could use chunks..) size_t SHA1(unsigned char *digest, size_t maxdigestsize, const unsigned char *string, size_t stringlen); void tobase64(unsigned char *out, int outlen, unsigned char *in, int inlen) { static unsigned char tab[64] = { 'A','B','C','D','E','F','G','H','I','J','K','L','M','N','O','P', 'Q','R','S','T','U','V','W','X','Y','Z','a','b','c','d','e','f', 'g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v', 'w','x','y','z','0','1','2','3','4','5','6','7','8','9','+','/' }; unsigned int usedbits = 0; unsigned int val = 0; outlen--; while(inlen) { while(usedbits < 24 && inlen) { val <<= 8; val |= (*in++); inlen--; usedbits += 8; } if (outlen < 4) return; val <<= 24 - usedbits; *out++ = (usedbits > 0)?tab[(val>>18)&0x3f]:'='; *out++ = (usedbits > 6)?tab[(val>>12)&0x3f]:'='; *out++ = (usedbits > 12)?tab[(val>>6)&0x3f]:'='; *out++ = (usedbits > 18)?tab[(val>>0)&0x3f]:'='; val=0; usedbits = 0; } *out = 0; } static const char qfont_table[256] = { '\0', '#', '#', '#', '#', '.', '#', '#', '#', 9, 10, '#', ' ', 13, '.', '.', '[', ']', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '.', '<', '=', '>', ' ', '!', '"', '#', '$', '%', '&', '\'', '(', ')', '*', '+', ',', '-', '.', '/', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', ':', ';', '<', '=', '>', '?', '@', 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', '[', '\\', ']', '^', '_', '`', 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z', '{', '|', '}', '~', '<', '<', '=', '>', '#', '#', '.', '#', '#', '#', '#', ' ', '#', ' ', '>', '.', '.', '[', ']', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '.', '<', '=', '>', ' ', '!', '"', '#', '$', '%', '&', '\'', '(', ')', '*', '+', ',', '-', '.', '/', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', ':', ';', '<', '=', '>', '?', '@', 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', '[', '\\', ']', '^', '_', '`', 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z', '{', '|', '}', '~', '<' }; static void HTMLprintf(char *outb, int outl, char *fmt, ...) { va_list val; char qfmt[8192*4]; char *inb = qfmt; unsigned char inchar; va_start(val, fmt); vsnprintf(qfmt, sizeof(qfmt), fmt, val); va_end(val); qfmt[sizeof(qfmt)-1] = 0; outl--; outl -= 5; while (outl > 0 && *inb) { inchar = qfont_table[*(unsigned char*)inb]; if (inchar == '<') { *outb++ = '&'; *outb++ = 'l'; *outb++ = 't'; *outb++ = ';'; outl -= 4; } else if (inchar == '>') { *outb++ = '&'; *outb++ = 'g'; *outb++ = 't'; *outb++ = ';'; outl -= 4; } else if (inchar == '\n') { *outb++ = '<'; *outb++ = 'b'; *outb++ = 'r'; *outb++ = '/'; *outb++ = '>'; outl -= 5; } else if (inchar == '&') { *outb++ = '&'; *outb++ = 'a'; *outb++ = 'm'; *outb++ = 'p'; *outb++ = ';'; outl -= 5; } else { *outb++ = inchar; outl -= 1; } inb++; } *outb++ = 0; } static void HTTPSV_SendHTTPHeader(cluster_t *cluster, oproxy_t *dest, char *error_code, char *content_type, qboolean nocache) { char *s; char buffer[2048]; if (nocache) { s = "HTTP/1.1 %s OK\r\n" "Content-Type: %s\r\n" "Cache-Control: no-cache, must-revalidate\r\n" "Expires: Mon, 26 Jul 1997 05:00:00 GMT\r\n" "Connection: close\r\n" "\r\n"; } else { s = "HTTP/1.1 %s OK\r\n" "Cache-Control: public, max-age=3600\r\n" "Content-Type: %s\r\n" "Connection: close\r\n" "\r\n"; } snprintf(buffer, sizeof(buffer), s, error_code, content_type); Net_ProxySend(cluster, dest, buffer, strlen(buffer)); } static void HTTPSV_SendHTMLHeader(cluster_t *cluster, oproxy_t *dest, char *title, char *args) { char *s; char buffer[2048]; qboolean plugin = false; while (*args && *args != ' ') { if (*args == 'p') plugin = true; args++; } s = "\n" "\n" "\n" " \n" " %s\n" " \n" "\n" "
"; snprintf(buffer, sizeof(buffer), s, title, plugin?"?p":"", plugin?"?p":"", (!*cluster->adminpassword)?"":(plugin?"
  • Admin
  • ":"
  • Admin
  • "), plugin?"
  • Basic
  • ":"
  • Plugin
  • " ); Net_ProxySend(cluster, dest, buffer, strlen(buffer)); #if 0 if (plugin) { s = ""; Net_ProxySend(cluster, dest, s, strlen(s)); } #endif } static void HTTPSV_SendHTMLFooter(cluster_t *cluster, oproxy_t *dest) { char *s; char buffer[2048]; /*Proxy version*/ snprintf(buffer, sizeof(buffer), "
    Server Version: "QTV_VERSION_STRING" "PROXYWEBSITE""); Net_ProxySend(cluster, dest, buffer, strlen(buffer)); #if 0 /*Plugin version*/ s = ""; Net_ProxySend(cluster, dest, s, strlen(s)); #endif /*terminate html page*/ s = "\n" "\n"; Net_ProxySend(cluster, dest, s, strlen(s)); } #define HTMLPRINT(str) Net_ProxySend(cluster, dest, str "\n", strlen(str "\n")) static void HTTPSV_GenerateNowPlaying(cluster_t *cluster, oproxy_t *dest, char *args) { int player; char *s; char buffer[1024]; char plname[64]; sv_t *streams; qboolean plugin = false; qboolean activeonly = false; HTTPSV_SendHTTPHeader(cluster, dest, "200", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "QuakeTV: Now Playing", args); while (*args && *args != ' ') { if (*args == 'p') plugin = true; else if (*args == 'a') activeonly = true; args++; } if (!strcmp(cluster->hostname, DEFAULT_HOSTNAME)) snprintf(buffer, sizeof(buffer), "

    QuakeTV: Now Playing

    "); //don't show the hostname if its set to the default else snprintf(buffer, sizeof(buffer), "

    %s: Now Playing

    ", cluster->hostname); Net_ProxySend(cluster, dest, buffer, strlen(buffer)); HTMLPRINT("
    "); for (streams = cluster->servers; streams; streams = streams->next) { if (activeonly) { for (player = 0; player < MAX_CLIENTS; player++) { if (streams->isconnected && streams->map.thisplayer == player) continue; if (*streams->map.players[player].userinfo) { break; } } if (player == MAX_CLIENTS) continue; } HTMLPRINT("
    "); HTMLprintf(buffer, sizeof(buffer), "%s (%s: %s)", streams->server, streams->map.gamedir, streams->map.mapname); Net_ProxySend(cluster, dest, buffer, strlen(buffer)); if (plugin && !strncmp(streams->server, "udp:", 4)) snprintf(buffer, sizeof(buffer), " [ Join ]", streams->server+4); else snprintf(buffer, sizeof(buffer), " [ Watch Now ]", streams->streamid); Net_ProxySend(cluster, dest, buffer, strlen(buffer)); HTMLPRINT("
    "); } HTMLPRINT("
    "); if (!cluster->servers) { s = "No streams are currently being played
    "; Net_ProxySend(cluster, dest, s, strlen(s)); } HTTPSV_SendHTMLFooter(cluster, dest); } static void HTTPSV_GenerateCSSFile(cluster_t *cluster, oproxy_t *dest) { HTTPSV_SendHTTPHeader(cluster, dest, "200", "text/css", false); HTMLPRINT("* { font-family: Verdana, Helvetica, sans-serif; }"); HTMLPRINT("body { color: #000; background-color: #fff; padding: 0 40px; }"); HTMLPRINT("a { color: #00f; }"); HTMLPRINT("a.qtvfile { font-weight: bold; }"); HTMLPRINT("a:visited { color: #00f; }"); HTMLPRINT("a:hover { background-color: black; color: yellow; }"); HTMLPRINT("li.spectator { color: #666; font-size: 0.9ex; }"); HTMLPRINT("dl.nowplaying dd { margin: 0 0 2em 0; }"); HTMLPRINT("dl.nowplaying dt { margin: 1em 0 0 0; font-size: 1.1em; font-weight: bold; }"); HTMLPRINT("dl.nowplaying li { list-style: none; margin: 0 0 0 1em; padding: 0; }"); HTMLPRINT("dl.nowplaying ul { margin: 0 0 0 1em; padding: 0; }"); HTMLPRINT("#navigation { background-color: #eef; }"); HTMLPRINT("#navigation li { display: inline; list-style: none; margin: 0 3em; }"); } static qboolean HTTPSV_GetHeaderField(char *s, char *field, char *buffer, int buffersize) { char *e; char *colon; int fieldnamelen = strlen(field); buffer[0] = 0; e = s; while(*e) { if (*e == '\n') { *e = '\0'; colon = strchr(s, ':'); *e = '\n'; if (!colon) { if (!strncmp(field, s, fieldnamelen)) { if (s[fieldnamelen] <= ' ') { return true; } } } else { if (fieldnamelen == colon - s) { if (!strncmp(field, s, colon-s)) { colon++; while (*colon == ' ') colon++; while (buffersize > 2) { if (!*colon || *colon == '\r' || *colon == '\n') break; *buffer++ = *colon++; buffersize--; } *buffer = 0; return true; } } } s = e+1; } e++; } return false; } static void HTTPSV_GenerateQTVStub(cluster_t *cluster, oproxy_t *dest, char *streamtype, char *streamid) { char *s; char hostname[128]; char buffer[1024]; char fname[256]; s = fname; while (*streamid > ' ') { if (s > fname + sizeof(fname)-4) //4 cos I'm too lazy to work out what the actual number should be break; if (*streamid == '%') { *s = 0; streamid++; if (*streamid >= 'a' && *streamid <= 'f') *s += 10 + *streamid-'a'; else if (*streamid >= 'A' && *streamid <= 'F') *s += 10 + *streamid-'A'; else if (*streamid >= '0' && *streamid <= '9') *s += *streamid-'0'; else break; *s <<= 4; streamid++; if (*streamid >= 'a' && *streamid <= 'f') *s += 10 + *streamid-'a'; else if (*streamid >= 'A' && *streamid <= 'F') *s += 10 + *streamid-'A'; else if (*streamid >= '0' && *streamid <= '9') *s += *streamid-'0'; else break; //don't let hackers try adding extra commands to it. if (*s == '$' || *s == ';' || *s == '\r' || *s == '\n') continue; streamid++; s++; } else if (*streamid == '$' || *streamid == ';' || *streamid == '\r' || *streamid == '\n') { //don't let hackers try adding extra commands to it. streamid++; } else *s++ = *streamid++; } *s = 0; streamid = fname; if (!HTTPSV_GetHeaderField((char*)dest->inbuffer, "Host", hostname, sizeof(hostname))) { HTTPSV_SendHTTPHeader(cluster, dest, "400", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "QuakeTV: Error", ""); s = "Your client did not send a Host field, which is required in HTTP/1.1\n
    " "Please try a different browser.\n" "" ""; Net_ProxySend(cluster, dest, s, strlen(s)); return; } /*if there's a port number on there, strip it*/ if (strchr(hostname, ':')) *strchr(hostname, ':') = 0; HTTPSV_SendHTTPHeader(cluster, dest, "200", "text/x-quaketvident", false); snprintf(buffer, sizeof(buffer), "[QTV]\r\n" "Stream: %s%s@%s:%i\r\n" "", //5, 256, 64. snprintf is not required, but paranoia is a wonderful thing. streamtype, streamid, hostname, cluster->tcplistenportnum); Net_ProxySend(cluster, dest, buffer, strlen(buffer)); } static void HTTPSV_GenerateQWSVStub(cluster_t *cluster, oproxy_t *dest, char *method, char *streamid) { char *s; char buffer[1024]; char fname[256]; s = fname; while (*streamid > ' ') { if (s > fname + sizeof(fname)-4) //4 cos I'm too lazy to work out what the actual number should be break; if (*streamid == '%') { *s = 0; streamid++; if (*streamid >= 'a' && *streamid <= 'f') *s += 10 + *streamid-'a'; else if (*streamid >= 'A' && *streamid <= 'F') *s += 10 + *streamid-'A'; else if (*streamid >= '0' && *streamid <= '9') *s += *streamid-'0'; else break; *s <<= 4; streamid++; if (*streamid <= ' ') break; else if (*streamid >= 'a' && *streamid <= 'f') *s += 10 + *streamid-'a'; else if (*streamid >= 'A' && *streamid <= 'F') *s += 10 + *streamid-'A'; else if (*streamid >= '0' && *streamid <= '9') *s += *streamid-'0'; else break; streamid++; s++; } else *s++ = *streamid++; } *s = 0; streamid = fname; HTTPSV_SendHTTPHeader(cluster, dest, "200", "text/x-quaketvident", false); snprintf(buffer, sizeof(buffer), "[QTV]\r\n" "%s: %s\r\n" "", method, streamid); Net_ProxySend(cluster, dest, buffer, strlen(buffer)); } static char *HTTPSV_ParsePOST(char *post, char *buffer, int buffersize) { while(*post && *post != '&') { if (--buffersize>0) { if (*post == '+') *buffer++ = ' '; else if (*post == '%') { *buffer = 0; post++; if (*post == '\0' || *post == '&') break; else if (*post >= 'a' && *post <= 'f') *buffer += 10 + *post-'a'; else if (*post >= 'A' && *post <= 'F') *buffer += 10 + *post-'A'; else if (*post >= '0' && *post <= '9') *buffer += *post-'0'; *buffer <<= 4; post++; if (*post == '\0' || *post == '&') break; else if (*post >= 'a' && *post <= 'f') *buffer += 10 + *post-'a'; else if (*post >= 'A' && *post <= 'F') *buffer += 10 + *post-'A'; else if (*post >= '0' && *post <= '9') *buffer += *post-'0'; buffer++; } else *buffer++ = *post; } post++; } *buffer = 0; return post; } static void HTTPSV_GenerateAdmin(cluster_t *cluster, oproxy_t *dest, int streamid, char *postbody, char *args) { char pwd[64]; char cmd[256]; char result[8192]; char *s; char *o; int passwordokay = false; if (!*cluster->adminpassword) { HTTPSV_SendHTTPHeader(cluster, dest, "403", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "QuakeTV: Admin Error", args); s = "The admin password is disabled. You may not log in remotely.\n"; Net_ProxySend(cluster, dest, s, strlen(s)); return; } pwd[0] = 0; cmd[0] = 0; if (postbody) while (*postbody) { if (!strncmp(postbody, "pwd=", 4)) { postbody = HTTPSV_ParsePOST(postbody+4, pwd, sizeof(pwd)); } else if (!strncmp(postbody, "cmd=", 4)) { postbody = HTTPSV_ParsePOST(postbody+4, cmd, sizeof(cmd)); } else { while(*postbody && *postbody != '&') { postbody++; } if (*postbody == '&') postbody++; } } if (!*pwd) { if (postbody) o = "No Password"; else o = ""; } else if (!strcmp(pwd, cluster->adminpassword)) { passwordokay = true; //small hack (as http connections are considered non-connected proxies) cluster->numproxies--; if (*cmd) o = Rcon_Command(cluster, NULL, cmd, result, sizeof(result), false); else o = ""; cluster->numproxies++; } else { o = "Bad Password"; } if (o != result) { strlcpy(result, o, sizeof(result)); o = result; } HTTPSV_SendHTTPHeader(cluster, dest, "200", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "QuakeTV: Admin", args); s = "

    QuakeTV Admin: "; Net_ProxySend(cluster, dest, s, strlen(s)); s = cluster->hostname; Net_ProxySend(cluster, dest, s, strlen(s)); s = "

    "; Net_ProxySend(cluster, dest, s, strlen(s)); s = "
    " "
    " "Password " "
    " "Command " "" "
    " "
    "; Net_ProxySend(cluster, dest, s, strlen(s)); if (passwordokay) HTMLPRINT(""); else HTMLPRINT(""); while(*o) { s = strchr(o, '\n'); if (s) *s = 0; HTMLprintf(cmd, sizeof(cmd), "%s", o); Net_ProxySend(cluster, dest, cmd, strlen(cmd)); Net_ProxySend(cluster, dest, "
    ", 6); if (!s) break; o = s+1; } HTTPSV_SendHTMLFooter(cluster, dest); } static void HTTPSV_GenerateDemoListing(cluster_t *cluster, oproxy_t *dest, char *args) { int i; char link[512]; char *s; qboolean plugframe = false; for (s=args; *s && *s != ' ';) { if (*s == 'p') plugframe = true; s++; } HTTPSV_SendHTTPHeader(cluster, dest, "200", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "QuakeTV: Demos", args); s = "

    QuakeTV: Demo Listing

    "; Net_ProxySend(cluster, dest, s, strlen(s)); Cluster_BuildAvailableDemoList(cluster); for (i = 0; i < cluster->availdemoscount; i++) { if (plugframe) { snprintf(link, sizeof(link), "%s (%ikb)
    ", cluster->availdemos[i].name, cluster->availdemos[i].name, cluster->availdemos[i].size/1024); } else { snprintf(link, sizeof(link), "%s (%ikb)
    ", cluster->availdemos[i].name, cluster->availdemos[i].name, cluster->availdemos[i].size/1024); } Net_ProxySend(cluster, dest, link, strlen(link)); } snprintf(link, sizeof(link), "

    Total: %i demos

    ", cluster->availdemoscount); Net_ProxySend(cluster, dest, link, strlen(link)); HTTPSV_SendHTMLFooter(cluster, dest); } static void HTTPSV_GeneratePlugin(cluster_t *cluster, oproxy_t *dest) { char hostname[1024]; char *html; if (!HTTPSV_GetHeaderField((char*)dest->inbuffer, "Host", hostname, sizeof(hostname))) { HTTPSV_SendHTTPHeader(cluster, dest, "400", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "QuakeTV: Error", "p"); html = "Your client did not send a Host field, which is required in HTTP/1.1\n
    " "Please try a different browser.\n" "" ""; Net_ProxySend(cluster, dest, html, strlen(html)); return; } HTTPSV_SendHTTPHeader(cluster, dest, "200", "text/html", true); html = "\n" "QuakeTV With Plugin" " \n" "" "
    " "" "
    " "
    " #if 1 #define EMBEDDEDWEBGLORIGIN "http://86.191.129.12:80"//127.0.0.1:80" #define EMBEDDEDWEBGLURL EMBEDDEDWEBGLORIGIN"/ftewebgl.html" #else #define EMBEDDEDWEBGLORIGIN "http://triptohell.info" #define EMBEDDEDWEBGLURL EMBEDDEDWEBGLORIGIN"/moodles/web/ftewebgl.html" #endif #if 1 "" #else /*once for IE*/ "" "" "" "" "" /*once again for firefox and similar friends*/ "" "" "" "" "" "Plugin failed to load" "" "" #endif "
    " "" ""; Net_ProxySend(cluster, dest, html, strlen(html)); } static void HTTPSV_GenerateDownload(cluster_t *cluster, oproxy_t *dest, char *filename, char *svroot) { char fname[256]; char link[512]; char *s, *suppliedname; int len; if (!svroot || !*svroot) { HTTPSV_SendHTTPHeader(cluster, dest, "403", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "Permission denied", ""); HTMLPRINT("

    403: Forbidden

    "); HTMLPRINT("File downloads from this proxy are currently not permitted."); HTTPSV_SendHTMLFooter(cluster, dest); return; } suppliedname = s = fname + strlcpy(fname, svroot, sizeof(fname)); while (*filename > ' ') { if (s > fname + sizeof(fname)-4) //4 cos I'm too lazy to work out what the actual number should be break; if (*filename == '%') { *s = 0; filename++; if (*filename <= ' ') break; else if (*filename >= 'a' && *filename <= 'f') *s += 10 + *filename-'a'; else if (*filename >= 'A' && *filename <= 'F') *s += 10 + *filename-'A'; else if (*filename >= '0' && *filename <= '9') *s += *filename-'0'; *s <<= 4; filename++; if (*filename <= ' ') break; else if (*filename >= 'a' && *filename <= 'f') *s += 10 + *filename-'a'; else if (*filename >= 'A' && *filename <= 'F') *s += 10 + *filename-'A'; else if (*filename >= '0' && *filename <= '9') *s += *filename-'0'; s++; } else *s++ = *filename++; } *s = 0; if (*suppliedname == '\\' || *suppliedname == '/' || strstr(suppliedname, "..") || strstr(suppliedname, "//") || strstr(suppliedname, "\\\\") || strchr(suppliedname, ':')) { HTTPSV_SendHTTPHeader(cluster, dest, "403", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "Permission denied", ""); HTMLPRINT("

    403: Forbidden

    "); HTMLPRINT("

    "); HTMLprintf(link, sizeof(link), "The filename '%s' names an absolute path.", suppliedname); Net_ProxySend(cluster, dest, link, strlen(link)); HTMLPRINT("

    "); return; } len = strlen(fname); if (len > 4) { /*protect id's content (prevent downloading of bsps from pak files - we don't do pak files so just prevent the entire pak)*/ if (!stricmp(link+len-4, ".pak")) { HTTPSV_SendHTTPHeader(cluster, dest, "403", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "Permission denied", ""); HTMLPRINT("

    403: Forbidden

    "); HTMLPRINT("

    "); HTMLprintf(link, sizeof(link), "Pak files may not be downloaded.", suppliedname); Net_ProxySend(cluster, dest, link, strlen(link)); HTMLPRINT("

    "); return; } } printf("Download request for %s\n", fname); dest->srcfile = fopen(fname, "rb"); if (dest->srcfile) { HTTPSV_SendHTTPHeader(cluster, dest, "200", "application/x-forcedownload", false); } else { HTTPSV_SendHTTPHeader(cluster, dest, "404", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "File not found", ""); HTMLPRINT("

    404: File not found

    "); HTMLPRINT("

    "); HTMLprintf(link, sizeof(link), "The file '%s' could not be found on this server", suppliedname); Net_ProxySend(cluster, dest, link, strlen(link)); HTMLPRINT("

    "); HTTPSV_SendHTMLFooter(cluster, dest); } } static qboolean urimatch(char *uri, char *match, int urilen) { int mlen = strlen(match); if (urilen < mlen) return false; if (strncmp(uri, match, mlen)) return false; if (urilen == mlen) return true; if (uri[mlen] == '?') return true; return false; } static qboolean uriargmatch(char *uri, char *match, int urilen, char **args) { int mlen = strlen(match); if (urilen < mlen) return false; if (strncmp(uri, match, mlen)) return false; if (urilen == mlen) { *args = ""; return true; } if (uri[mlen] == '?') { *args = uri+mlen+1; return true; } return false; } void HTTPSV_PostMethod(cluster_t *cluster, oproxy_t *pend, char *postdata) { char tempbuf[512]; char *s; int len; char *uri, *uriend; char *args; int urilen; uri = pend->inbuffer+4; while (*uri == ' ') uri++; uriend = strchr(uri, '\n'); s = strchr(uri, ' '); if (s && s < uriend) uriend = s; urilen = uriend - uri; if (!HTTPSV_GetHeaderField((char*)pend->inbuffer, "Content-Length", tempbuf, sizeof(tempbuf))) { s = "HTTP/1.1 411 OK\n" "Content-Type: text/html\n" "Connection: close\n" "\n" "QuakeTVNo Content-Length was provided.\n"; Net_ProxySend(cluster, pend, s, strlen(s)); pend->flushing = true; return; } len = atoi(tempbuf); if (pend->inbuffersize + len >= sizeof(pend->inbuffer)-20) { //too much data pend->flushing = true; return; } len = postdata - (char*)pend->inbuffer + len; if (len > pend->inbuffersize) return; //still need the body // if (len <= pend->inbuffersize) { if (uriargmatch(uri, "/admin.html", urilen, &args)) { HTTPSV_GenerateAdmin(cluster, pend, 0, postdata, args); } else { s = "HTTP/1.1 404 OK\n" "Content-Type: text/html\n" "Connection: close\n" "\n" "QuakeTVThat HTTP method is not supported for that URL.\n"; Net_ProxySend(cluster, pend, s, strlen(s)); } pend->flushing = true; return; } } #define REDIRECTIF(uri_,url_) \ if (urimatch(uri, uri_, urilen)) \ { \ s = "HTTP/1.0 302 Found\n" \ "Location: " url_ "\n" \ "\n"; \ Net_ProxySend(cluster, pend, s, strlen(s)); \ } void HTTPSV_GetMethod(cluster_t *cluster, oproxy_t *pend) { char connection[64]; char upgrade[64]; char *s; char *uri, *uriend; char *args; int urilen; uri = pend->inbuffer+4; while (*uri == ' ') uri++; uriend = strchr(uri, '\n'); s = strchr(uri, ' '); if (s && s < uriend) uriend = s; urilen = uriend - uri; if (!pend->websocket.websocket && HTTPSV_GetHeaderField((char*)pend->inbuffer, "Connection", connection, sizeof(connection)) && !stricmp(connection, "Upgrade")) { if (HTTPSV_GetHeaderField((char*)pend->inbuffer, "Upgrade", upgrade, sizeof(upgrade)) && !stricmp(upgrade, "websocket")) { char ver[64]; char key[64]; HTTPSV_GetHeaderField((char*)pend->inbuffer, "Sec-WebSocket-Key", key, sizeof(key)); if (HTTPSV_GetHeaderField((char*)pend->inbuffer, "Sec-WebSocket-Version", ver, sizeof(ver)) && atoi(ver) != 13) { s = "HTTP/1.1 426 Upgrade Required\r\n" "Sec-WebSocket-Version: 13\r\n" "Access-Control-Allow-Origin: *\r\n" //allow cross-origin requests. this means you can use any domain to play on any public server. "\r\n"; Net_ProxySend(cluster, pend, s, strlen(s)); return; } else { char acceptkey[20*2]; unsigned char sha1digest[20]; char padkey[512]; snprintf(padkey, sizeof(padkey), "%s258EAFA5-E914-47DA-95CA-C5AB0DC85B11", key); tobase64(acceptkey, sizeof(acceptkey), sha1digest, SHA1(sha1digest, sizeof(sha1digest), padkey, strlen(padkey))); snprintf(padkey, sizeof(padkey), "HTTP/1.1 101 Switching Protocols\r\n" "Upgrade: websocket\r\n" "Connection: Upgrade\r\n" "Access-Control-Allow-Origin: *\r\n" //allow cross-origin requests. this means you can use any domain to play on any public server. "Sec-WebSocket-Accept: %s\r\n" // "Sec-WebSocket-Protocol: FTEQTVWebSocket\r\n" "\r\n", acceptkey); //send the websocket handshake response. Net_ProxySend(cluster, pend, padkey, strlen(padkey)); pend->websocket.websocket = true; printf("websocket upgrade\n"); } pend->drop = false; return; } } if (urimatch(uri, "/plugin.html", urilen)) { HTTPSV_GeneratePlugin(cluster, pend); } else if (uriargmatch(uri, "/nowplaying.html", urilen, &args)) { HTTPSV_GenerateNowPlaying(cluster, pend, args); } else if (!strncmp(uri, "/watch.qtv?sid=", 15)) { HTTPSV_GenerateQTVStub(cluster, pend, "", (char*)pend->inbuffer+19); } else if (!strncmp(uri, "/watch.qtv?demo=", 16)) { HTTPSV_GenerateQTVStub(cluster, pend, "file:", (char*)pend->inbuffer+20); } else if (!strncmp(uri, "/watch.qtv?join=", 16)) { HTTPSV_GenerateQWSVStub(cluster, pend, "Join", (char*)pend->inbuffer+16); } else if (!strncmp(uri, "/watch.qtv?obsv=", 16)) { HTTPSV_GenerateQWSVStub(cluster, pend, "Observe", (char*)pend->inbuffer+16); } // else if (!strncmp((char*)pend->inbuffer+4, "/demo/", 6)) // { //fixme: make this send the demo as an http download // HTTPSV_GenerateQTVStub(cluster, pend, "file:", (char*)pend->inbuffer+10); // } else if (uriargmatch(uri, "/admin.html", urilen, &args)) { HTTPSV_GenerateAdmin(cluster, pend, 0, NULL, args); } #if defined(_DEBUG) || defined(DEBUG) else REDIRECTIF("/", "/plugin.html") #endif else REDIRECTIF("/", "/nowplaying.html") else REDIRECTIF("/about.html", PROXYWEBSITE) #if 0 else REDIRECTIF("/qtvsplash.jpg", "/file/qtvsplash.jpg") /*lame, very lame*/ #if defined(_DEBUG) || defined(DEBUG) else REDIRECTIF("/npfte.xpi", "/file/npfte_dbg.xpi") /*lame, very lame*/ #else else REDIRECTIF("/npfte.xpi", "/file/npfte.xpi") /*lame, very lame*/ #endif else REDIRECTIF("/npfte.exe", "/file/npfte.exe") /*lame, very lame*/ else REDIRECTIF("/iefte.exe", "/file/iefte.exe") /*lame, very lame*/ #endif else if (uriargmatch(uri, "/demos.html", urilen, &args)) { HTTPSV_GenerateDemoListing(cluster, pend, args); } else if (!strncmp((char*)pend->inbuffer+4, "/file/", 6)) { HTTPSV_GenerateDownload(cluster, pend, (char*)pend->inbuffer+10, cluster->downloaddir); } else if (urimatch(uri, "/style.css", urilen)) { HTTPSV_GenerateCSSFile(cluster, pend); } else { #define dest pend HTTPSV_SendHTTPHeader(cluster, dest, "404", "text/html", true); HTTPSV_SendHTMLHeader(cluster, dest, "Address not recognised", ""); HTMLPRINT("

    Address not recognised

    "); HTTPSV_SendHTMLFooter(cluster, dest); } }