2014-07-24 06:55:44 -04:00
|
|
|
from http.server import HTTPServer, BaseHTTPRequestHandler
|
2014-08-08 01:54:08 -04:00
|
|
|
from exc.server_error import ServerError
|
2014-07-24 07:11:25 -04:00
|
|
|
from socketserver import BaseServer
|
2014-07-24 06:55:44 -04:00
|
|
|
from posixpath import basename, splitext
|
|
|
|
from base64 import b64encode
|
|
|
|
from random import random
|
|
|
|
from hashlib import md5
|
|
|
|
import threading
|
2014-07-24 07:11:25 -04:00
|
|
|
import socket
|
2014-07-24 06:55:44 -04:00
|
|
|
import re
|
2014-07-24 07:11:25 -04:00
|
|
|
import ssl
|
|
|
|
import os
|
2014-07-24 06:55:44 -04:00
|
|
|
|
|
|
|
class StoppableHTTPServer (HTTPServer):
|
2014-08-08 01:54:08 -04:00
|
|
|
""" This class extends the HTTPServer class from default http.server library
|
|
|
|
in Python 3. The StoppableHTTPServer class is capable of starting an HTTP
|
|
|
|
server that serves a virtual set of files made by the WgetFile class and
|
|
|
|
has most of its properties configurable through the server_conf()
|
|
|
|
method. """
|
2014-07-24 06:55:44 -04:00
|
|
|
|
|
|
|
request_headers = list ()
|
|
|
|
|
|
|
|
""" Define methods for configuring the Server. """
|
|
|
|
|
|
|
|
def server_conf (self, filelist, conf_dict):
|
|
|
|
""" Set Server Rules and File System for this instance. """
|
|
|
|
self.server_configs = conf_dict
|
|
|
|
self.fileSys = filelist
|
|
|
|
|
|
|
|
def get_req_headers (self):
|
|
|
|
return self.request_headers
|
|
|
|
|
2014-07-24 07:11:25 -04:00
|
|
|
|
2014-08-08 01:54:08 -04:00
|
|
|
class HTTPSServer (StoppableHTTPServer):
|
|
|
|
""" The HTTPSServer class extends the StoppableHTTPServer class with
|
|
|
|
additional support for secure connections through SSL. """
|
|
|
|
|
|
|
|
def __init__ (self, address, handler):
|
|
|
|
BaseServer.__init__ (self, address, handler)
|
2014-10-08 07:17:21 -04:00
|
|
|
# step one up because test suite change directory away from $srcdir (don't do that !!!)
|
|
|
|
CERTFILE = os.path.abspath(os.path.join('..', os.getenv('srcdir', '.'), 'certs', 'wget-cert.pem'))
|
2014-08-08 01:54:08 -04:00
|
|
|
fop = open (CERTFILE)
|
|
|
|
print (fop.readline())
|
|
|
|
self.socket = ssl.wrap_socket (
|
|
|
|
sock = socket.socket (self.address_family, self.socket_type),
|
|
|
|
ssl_version = ssl.PROTOCOL_TLSv1,
|
|
|
|
certfile = CERTFILE,
|
|
|
|
server_side = True
|
|
|
|
)
|
|
|
|
self.server_bind()
|
|
|
|
self.server_activate()
|
|
|
|
|
|
|
|
|
|
|
|
class _Handler (BaseHTTPRequestHandler):
|
|
|
|
""" This is a private class which tells the server *HOW* to handle each
|
|
|
|
request. For each HTTP Request Command that the server should be capable of
|
|
|
|
responding to, there must exist a do_REQUESTNAME() method which details the
|
|
|
|
steps in which such requests should be processed. The rest of the methods
|
|
|
|
in this class are auxilliary methods created to help in processing certain
|
|
|
|
requests. """
|
2014-07-24 06:55:44 -04:00
|
|
|
|
|
|
|
def get_rule_list (self, name):
|
|
|
|
r_list = self.rules.get (name) if name in self.rules else None
|
|
|
|
return r_list
|
|
|
|
|
2014-08-08 01:54:08 -04:00
|
|
|
# The defailt protocol version of the server we run is HTTP/1.1 not
|
|
|
|
# HTTP/1.0 which is the default with the http.server module.
|
2014-07-24 06:55:44 -04:00
|
|
|
protocol_version = 'HTTP/1.1'
|
|
|
|
|
|
|
|
""" Define functions for various HTTP Requests. """
|
|
|
|
|
|
|
|
def do_HEAD (self):
|
|
|
|
self.send_head ("HEAD")
|
|
|
|
|
|
|
|
def do_GET (self):
|
2014-08-08 01:54:08 -04:00
|
|
|
""" Process HTTP GET requests. This is the same as processing HEAD
|
|
|
|
requests and then actually transmitting the data to the client. If
|
|
|
|
send_head() does not specify any "start" offset, we send the complete
|
|
|
|
data, else transmit only partial data. """
|
|
|
|
|
2014-07-24 06:55:44 -04:00
|
|
|
content, start = self.send_head ("GET")
|
|
|
|
if content:
|
|
|
|
if start is None:
|
|
|
|
self.wfile.write (content.encode ('utf-8'))
|
|
|
|
else:
|
|
|
|
self.wfile.write (content.encode ('utf-8')[start:])
|
|
|
|
|
|
|
|
def do_POST (self):
|
2014-08-08 01:54:08 -04:00
|
|
|
""" According to RFC 7231 sec 4.3.3, if the resource requested in a POST
|
|
|
|
request does not exist on the server, the first POST request should
|
|
|
|
create that resource. PUT requests are otherwise used to create a
|
|
|
|
resource. Hence, we call the handle for processing PUT requests if the
|
|
|
|
resource requested does not already exist.
|
|
|
|
|
|
|
|
Currently, when the server recieves a POST request for a resource, we
|
|
|
|
simply append the body data to the existing file and return the new
|
|
|
|
file to the client. If the file does not exist, a new file is created
|
|
|
|
using the contents of the request body. """
|
|
|
|
|
2014-07-24 06:55:44 -04:00
|
|
|
path = self.path[1:]
|
|
|
|
if path in self.server.fileSys:
|
2014-08-08 01:54:08 -04:00
|
|
|
self.rules = self.server.server_configs.get (path)
|
|
|
|
if not self.rules:
|
|
|
|
self.rules = dict ()
|
|
|
|
|
|
|
|
if not self.custom_response ():
|
|
|
|
return (None, None)
|
|
|
|
|
2014-07-24 06:55:44 -04:00
|
|
|
body_data = self.get_body_data ()
|
|
|
|
self.send_response (200)
|
|
|
|
self.send_header ("Content-type", "text/plain")
|
|
|
|
content = self.server.fileSys.pop (path) + "\n" + body_data
|
|
|
|
total_length = len (content)
|
|
|
|
self.server.fileSys[path] = content
|
|
|
|
self.send_header ("Content-Length", total_length)
|
2014-08-08 01:54:08 -04:00
|
|
|
self.send_header ("Location", self.path)
|
2014-07-24 06:55:44 -04:00
|
|
|
self.finish_headers ()
|
|
|
|
try:
|
|
|
|
self.wfile.write (content.encode ('utf-8'))
|
|
|
|
except Exception:
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
self.send_put (path)
|
|
|
|
|
|
|
|
def do_PUT (self):
|
|
|
|
path = self.path[1:]
|
|
|
|
self.rules = self.server.server_configs.get (path)
|
|
|
|
if not self.custom_response ():
|
|
|
|
return (None, None)
|
|
|
|
self.send_put (path)
|
|
|
|
|
|
|
|
""" End of HTTP Request Method Handlers. """
|
|
|
|
|
|
|
|
""" Helper functions for the Handlers. """
|
|
|
|
|
|
|
|
def parse_range_header (self, header_line, length):
|
|
|
|
if header_line is None:
|
|
|
|
return None
|
|
|
|
if not header_line.startswith ("bytes="):
|
2014-08-08 01:54:08 -04:00
|
|
|
raise ServerError ("Cannot parse header Range: %s" %
|
|
|
|
(header_line))
|
2014-07-24 06:55:44 -04:00
|
|
|
regex = re.match (r"^bytes=(\d*)\-$", header_line)
|
|
|
|
range_start = int (regex.group (1))
|
|
|
|
if range_start >= length:
|
2014-08-08 01:54:08 -04:00
|
|
|
raise ServerError ("Range Overflow")
|
2014-07-24 06:55:44 -04:00
|
|
|
return range_start
|
|
|
|
|
|
|
|
def get_body_data (self):
|
|
|
|
cLength_header = self.headers.get ("Content-Length")
|
|
|
|
cLength = int (cLength_header) if cLength_header is not None else 0
|
|
|
|
body_data = self.rfile.read (cLength).decode ('utf-8')
|
|
|
|
return body_data
|
|
|
|
|
|
|
|
def send_put (self, path):
|
2014-08-08 01:54:08 -04:00
|
|
|
if path in self.server.fileSys:
|
|
|
|
self.server.fileSys.pop (path, None)
|
|
|
|
self.send_response (204)
|
|
|
|
else:
|
|
|
|
self.rules = dict ()
|
|
|
|
self.send_response (201)
|
2014-07-24 06:55:44 -04:00
|
|
|
body_data = self.get_body_data ()
|
|
|
|
self.server.fileSys[path] = body_data
|
2014-08-08 01:54:08 -04:00
|
|
|
self.send_header ("Location", self.path)
|
2014-07-24 06:55:44 -04:00
|
|
|
self.finish_headers ()
|
|
|
|
|
2014-08-08 01:54:08 -04:00
|
|
|
""" This empty method is called automatically when all the rules are
|
|
|
|
processed for a given request. However, send_header() should only be called
|
|
|
|
AFTER a response has been sent. But, at the moment of processing the rules,
|
|
|
|
the appropriate response has not yet been identified. As a result, we defer
|
|
|
|
the processing of this rule till later. Each do_* request handler MUST call
|
|
|
|
finish_headers() instead of end_headers(). The finish_headers() method
|
|
|
|
takes care of sending the appropriate headers before completing the
|
|
|
|
response. """
|
2014-07-24 06:55:44 -04:00
|
|
|
def SendHeader (self, header_obj):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def send_cust_headers (self):
|
|
|
|
header_obj = self.get_rule_list ('SendHeader')
|
|
|
|
if header_obj:
|
|
|
|
for header in header_obj.headers:
|
|
|
|
self.send_header (header, header_obj.headers[header])
|
|
|
|
|
|
|
|
def finish_headers (self):
|
|
|
|
self.send_cust_headers ()
|
|
|
|
self.end_headers ()
|
|
|
|
|
|
|
|
def Response (self, resp_obj):
|
|
|
|
self.send_response (resp_obj.response_code)
|
|
|
|
self.finish_headers ()
|
|
|
|
raise ServerError ("Custom Response code sent.")
|
|
|
|
|
|
|
|
def custom_response (self):
|
|
|
|
codes = self.get_rule_list ('Response')
|
|
|
|
if codes:
|
|
|
|
self.send_response (codes.response_code)
|
|
|
|
self.finish_headers ()
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
return True
|
|
|
|
|
|
|
|
def base64 (self, data):
|
|
|
|
string = b64encode (data.encode ('utf-8'))
|
|
|
|
return string.decode ('utf-8')
|
|
|
|
|
|
|
|
def send_challenge (self, auth_type):
|
|
|
|
if auth_type == "Both":
|
|
|
|
self.send_challenge ("Digest")
|
|
|
|
self.send_challenge ("Basic")
|
|
|
|
return
|
|
|
|
if auth_type == "Basic":
|
|
|
|
challenge_str = 'Basic realm="Wget-Test"'
|
|
|
|
elif auth_type == "Digest" or auth_type == "Both_inline":
|
2014-08-08 01:54:08 -04:00
|
|
|
self.nonce = md5 (str (random ()).encode ('utf-8')).hexdigest()
|
|
|
|
self.opaque = md5 (str (random ()).encode ('utf-8')).hexdigest()
|
|
|
|
challenge_str = 'Digest realm="Test", nonce="%s", opaque="%s"' % (
|
|
|
|
self.nonce,
|
|
|
|
self.opaque)
|
2014-07-24 06:55:44 -04:00
|
|
|
challenge_str += ', qop="auth"'
|
|
|
|
if auth_type == "Both_inline":
|
|
|
|
challenge_str = 'Basic realm="Wget-Test", ' + challenge_str
|
|
|
|
self.send_header ("WWW-Authenticate", challenge_str)
|
|
|
|
|
|
|
|
def authorize_Basic (self, auth_header, auth_rule):
|
|
|
|
if auth_header is None or auth_header.split(' ')[0] != 'Basic':
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
self.user = auth_rule.auth_user
|
|
|
|
self.passw = auth_rule.auth_pass
|
|
|
|
auth_str = "Basic " + self.base64 (self.user + ":" + self.passw)
|
|
|
|
return True if auth_str == auth_header else False
|
|
|
|
|
|
|
|
def parse_auth_header (self, auth_header):
|
|
|
|
n = len("Digest ")
|
|
|
|
auth_header = auth_header[n:].strip()
|
|
|
|
items = auth_header.split(", ")
|
2014-08-08 01:54:08 -04:00
|
|
|
keyvals = [i.split("=", 1) for i in items]
|
|
|
|
keyvals = [(k.strip(), v.strip().replace('"', '')) for k, v in keyvals]
|
|
|
|
return dict(keyvals)
|
2014-07-24 06:55:44 -04:00
|
|
|
|
|
|
|
def KD (self, secret, data):
|
|
|
|
return self.H (secret + ":" + data)
|
|
|
|
|
|
|
|
def H (self, data):
|
|
|
|
return md5 (data.encode ('utf-8')).hexdigest ()
|
|
|
|
|
|
|
|
def A1 (self):
|
|
|
|
return "%s:%s:%s" % (self.user, "Test", self.passw)
|
|
|
|
|
|
|
|
def A2 (self, params):
|
|
|
|
return "%s:%s" % (self.command, params["uri"])
|
|
|
|
|
|
|
|
def check_response (self, params):
|
|
|
|
if "qop" in params:
|
|
|
|
data_str = params['nonce'] \
|
2014-08-08 01:54:08 -04:00
|
|
|
+ ":" + params['nc'] \
|
|
|
|
+ ":" + params['cnonce'] \
|
|
|
|
+ ":" + params['qop'] \
|
|
|
|
+ ":" + self.H (self.A2 (params))
|
2014-07-24 06:55:44 -04:00
|
|
|
else:
|
|
|
|
data_str = params['nonce'] + ":" + self.H (self.A2 (params))
|
|
|
|
resp = self.KD (self.H (self.A1 ()), data_str)
|
|
|
|
|
|
|
|
return True if resp == params['response'] else False
|
|
|
|
|
|
|
|
def authorize_Digest (self, auth_header, auth_rule):
|
|
|
|
if auth_header is None or auth_header.split(' ')[0] != 'Digest':
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
self.user = auth_rule.auth_user
|
|
|
|
self.passw = auth_rule.auth_pass
|
|
|
|
params = self.parse_auth_header (auth_header)
|
|
|
|
pass_auth = True
|
|
|
|
if self.user != params['username'] or \
|
2014-08-08 01:54:08 -04:00
|
|
|
self.nonce != params['nonce'] or \
|
|
|
|
self.opaque != params['opaque']:
|
2014-07-24 06:55:44 -04:00
|
|
|
pass_auth = False
|
|
|
|
req_attribs = ['username', 'realm', 'nonce', 'uri', 'response']
|
|
|
|
for attrib in req_attribs:
|
2014-08-08 01:54:08 -04:00
|
|
|
if attrib not in params:
|
2014-07-24 06:55:44 -04:00
|
|
|
pass_auth = False
|
|
|
|
if not self.check_response (params):
|
|
|
|
pass_auth = False
|
|
|
|
return pass_auth
|
|
|
|
|
|
|
|
def authorize_Both (self, auth_header, auth_rule):
|
|
|
|
return False
|
|
|
|
|
|
|
|
def authorize_Both_inline (self, auth_header, auth_rule):
|
|
|
|
return False
|
|
|
|
|
|
|
|
def Authentication (self, auth_rule):
|
|
|
|
try:
|
|
|
|
self.handle_auth (auth_rule)
|
|
|
|
except ServerError as se:
|
|
|
|
self.send_response (401, "Authorization Required")
|
|
|
|
self.send_challenge (auth_rule.auth_type)
|
|
|
|
self.finish_headers ()
|
|
|
|
raise ServerError (se.__str__())
|
|
|
|
|
|
|
|
def handle_auth (self, auth_rule):
|
|
|
|
is_auth = True
|
|
|
|
auth_header = self.headers.get ("Authorization")
|
|
|
|
required_auth = auth_rule.auth_type
|
|
|
|
if required_auth == "Both" or required_auth == "Both_inline":
|
|
|
|
auth_type = auth_header.split(' ')[0] if auth_header else required_auth
|
|
|
|
else:
|
|
|
|
auth_type = required_auth
|
2014-07-24 07:11:25 -04:00
|
|
|
try:
|
|
|
|
assert hasattr (self, "authorize_" + auth_type)
|
|
|
|
is_auth = getattr (self, "authorize_" + auth_type) (auth_header, auth_rule)
|
|
|
|
except AssertionError:
|
|
|
|
raise ServerError ("Authentication Mechanism " + auth_rule + " not supported")
|
|
|
|
except AttributeError as ae:
|
|
|
|
raise ServerError (ae.__str__())
|
2014-07-24 06:55:44 -04:00
|
|
|
if is_auth is False:
|
|
|
|
raise ServerError ("Unable to Authenticate")
|
|
|
|
|
|
|
|
def is_authorized (self):
|
|
|
|
is_auth = True
|
|
|
|
auth_rule = self.get_rule_list ('Authentication')
|
|
|
|
if auth_rule:
|
|
|
|
auth_header = self.headers.get ("Authorization")
|
|
|
|
req_auth = auth_rule.auth_type
|
|
|
|
if req_auth == "Both" or req_auth == "Both_inline":
|
|
|
|
auth_type = auth_header.split(' ')[0] if auth_header else req_auth
|
|
|
|
else:
|
|
|
|
auth_type = req_auth
|
|
|
|
assert hasattr (self, "authorize_" + auth_type)
|
|
|
|
is_auth = getattr (self, "authorize_" + auth_type) (auth_header, auth_rule)
|
|
|
|
if is_auth is False:
|
|
|
|
self.send_response (401)
|
|
|
|
self.send_challenge (auth_type)
|
|
|
|
self.finish_headers ()
|
|
|
|
return is_auth
|
|
|
|
|
|
|
|
def ExpectHeader (self, header_obj):
|
|
|
|
exp_headers = header_obj.headers
|
|
|
|
for header_line in exp_headers:
|
|
|
|
header_recd = self.headers.get (header_line)
|
|
|
|
if header_recd is None or header_recd != exp_headers[header_line]:
|
|
|
|
self.send_error (400, "Expected Header " + header_line + " not found")
|
|
|
|
self.finish_headers ()
|
|
|
|
raise ServerError ("Header " + header_line + " not found")
|
|
|
|
|
|
|
|
def RejectHeader (self, header_obj):
|
|
|
|
rej_headers = header_obj.headers
|
|
|
|
for header_line in rej_headers:
|
|
|
|
header_recd = self.headers.get (header_line)
|
|
|
|
if header_recd is not None and header_recd == rej_headers[header_line]:
|
|
|
|
self.send_error (400, 'Blackisted Header ' + header_line + ' received')
|
|
|
|
self.finish_headers ()
|
|
|
|
raise ServerError ("Header " + header_line + ' received')
|
|
|
|
|
|
|
|
def reject_headers (self):
|
|
|
|
rej_headers = self.get_rule_list ("RejectHeader")
|
|
|
|
if rej_headers:
|
|
|
|
rej_headers = rej_headers.headers
|
|
|
|
for header_line in rej_headers:
|
|
|
|
header_re = self.headers.get (header_line)
|
|
|
|
if header_re is not None and header_re == rej_headers[header_line]:
|
|
|
|
self.send_error (400, 'Blacklisted Header was Sent')
|
|
|
|
self.end_headers ()
|
|
|
|
return False
|
|
|
|
return True
|
|
|
|
|
|
|
|
def __log_request (self, method):
|
|
|
|
req = method + " " + self.path
|
|
|
|
self.server.request_headers.append (req)
|
|
|
|
|
|
|
|
def send_head (self, method):
|
|
|
|
""" Common code for GET and HEAD Commands.
|
|
|
|
This method is overriden to use the fileSys dict.
|
|
|
|
|
|
|
|
The method variable contains whether this was a HEAD or a GET Request.
|
|
|
|
According to RFC 2616, the server should not differentiate between
|
|
|
|
the two requests, however, we use it here for a specific test.
|
|
|
|
"""
|
|
|
|
|
|
|
|
if self.path == "/":
|
|
|
|
path = "index.html"
|
|
|
|
else:
|
|
|
|
path = self.path[1:]
|
|
|
|
|
|
|
|
self.__log_request (method)
|
|
|
|
|
|
|
|
if path in self.server.fileSys:
|
|
|
|
self.rules = self.server.server_configs.get (path)
|
|
|
|
|
|
|
|
for rule_name in self.rules:
|
|
|
|
try:
|
|
|
|
assert hasattr (self, rule_name)
|
|
|
|
getattr (self, rule_name) (self.rules [rule_name])
|
|
|
|
except AssertionError as ae:
|
|
|
|
msg = "Method " + rule_name + " not defined"
|
|
|
|
self.send_error (500, msg)
|
|
|
|
return (None, None)
|
|
|
|
except ServerError as se:
|
|
|
|
print (se.__str__())
|
|
|
|
return (None, None)
|
|
|
|
|
|
|
|
content = self.server.fileSys.get (path)
|
|
|
|
content_length = len (content)
|
|
|
|
try:
|
|
|
|
self.range_begin = self.parse_range_header (
|
|
|
|
self.headers.get ("Range"), content_length)
|
2014-08-08 01:54:08 -04:00
|
|
|
except ServerError as ae:
|
2014-07-24 06:55:44 -04:00
|
|
|
# self.log_error("%s", ae.err_message)
|
|
|
|
if ae.err_message == "Range Overflow":
|
|
|
|
self.send_response (416)
|
|
|
|
self.finish_headers ()
|
|
|
|
return (None, None)
|
|
|
|
else:
|
|
|
|
self.range_begin = None
|
|
|
|
if self.range_begin is None:
|
|
|
|
self.send_response (200)
|
|
|
|
else:
|
|
|
|
self.send_response (206)
|
|
|
|
self.send_header ("Accept-Ranges", "bytes")
|
|
|
|
self.send_header ("Content-Range",
|
|
|
|
"bytes %d-%d/%d" % (self.range_begin,
|
|
|
|
content_length - 1,
|
|
|
|
content_length))
|
|
|
|
content_length -= self.range_begin
|
|
|
|
cont_type = self.guess_type (path)
|
|
|
|
self.send_header ("Content-type", cont_type)
|
|
|
|
self.send_header ("Content-Length", content_length)
|
|
|
|
self.finish_headers ()
|
|
|
|
return (content, self.range_begin)
|
|
|
|
else:
|
|
|
|
self.send_error (404, "Not Found")
|
|
|
|
return (None, None)
|
|
|
|
|
|
|
|
def guess_type (self, path):
|
|
|
|
base_name = basename ("/" + path)
|
|
|
|
name, ext = splitext (base_name)
|
|
|
|
extension_map = {
|
2014-08-08 01:54:08 -04:00
|
|
|
".txt" : "text/plain",
|
|
|
|
".css" : "text/css",
|
|
|
|
".html" : "text/html"
|
2014-07-24 06:55:44 -04:00
|
|
|
}
|
|
|
|
if ext in extension_map:
|
|
|
|
return extension_map[ext]
|
|
|
|
else:
|
|
|
|
return "text/plain"
|
|
|
|
|
|
|
|
|
|
|
|
class HTTPd (threading.Thread):
|
|
|
|
server_class = StoppableHTTPServer
|
|
|
|
handler = _Handler
|
2014-08-08 01:54:08 -04:00
|
|
|
|
2014-07-24 06:55:44 -04:00
|
|
|
def __init__ (self, addr=None):
|
|
|
|
threading.Thread.__init__ (self)
|
|
|
|
if addr is None:
|
|
|
|
addr = ('localhost', 0)
|
|
|
|
self.server_inst = self.server_class (addr, self.handler)
|
|
|
|
self.server_address = self.server_inst.socket.getsockname()[:2]
|
|
|
|
|
|
|
|
def run (self):
|
2014-08-08 01:54:08 -04:00
|
|
|
self.server_inst.serve_forever ()
|
2014-07-24 06:55:44 -04:00
|
|
|
|
|
|
|
def server_conf (self, file_list, server_rules):
|
|
|
|
self.server_inst.server_conf (file_list, server_rules)
|
|
|
|
|
2014-07-24 07:11:25 -04:00
|
|
|
|
|
|
|
class HTTPSd (HTTPd):
|
|
|
|
|
2014-08-08 01:54:08 -04:00
|
|
|
server_class = HTTPSServer
|
2014-07-24 07:11:25 -04:00
|
|
|
|
|
|
|
# vim: set ts=4 sts=4 sw=4 tw=80 et :
|