do options unauthenticated first, fix testing localhost

This commit is contained in:
Neradoc 2022-07-24 10:07:41 +02:00
parent 40cb0aac7c
commit 9a6c3884a7

View File

@ -375,11 +375,10 @@ static bool _origin_ok(const char *origin) {
return true; return true;
} }
// Port or no port
const char *localhost = "127.0.0.1"; const char *localhost = "127.0.0.1";
const int locallen = 9; end = origin + strlen(http) + strlen(localhost);
if (memcmp(origin + strlen(http), localhost, locallen) == 0 if (memcmp(origin + strlen(http), localhost, strlen(localhost)) == 0
&& (localhost[locallen] == '\0' || localhost[locallen] == ':')) { && (end[0] == '\0' || end[0] == ':')) {
return true; return true;
} }
@ -913,8 +912,10 @@ static bool _reply(socketpool_socket_obj_t *socket, _request *request) {
ESP_LOGE(TAG, "bad origin %s", request->origin); ESP_LOGE(TAG, "bad origin %s", request->origin);
_reply_forbidden(socket, request); _reply_forbidden(socket, request);
} else if (memcmp(request->path, "/fs/", 4) == 0) { } else if (memcmp(request->path, "/fs/", 4) == 0) {
// OPTIONS is sent for CORS preflight, unauthenticated if (strcmp(request->method, "OPTIONS") == 0) {
if (!request->authenticated && strcmp(request->method, "OPTIONS") != 0) { // OPTIONS is sent for CORS preflight, unauthenticated
_reply_access_control(socket, request);
} else if (!request->authenticated) {
if (_api_password[0] != '\0') { if (_api_password[0] != '\0') {
_reply_unauthorized(socket, request); _reply_unauthorized(socket, request);
} else { } else {
@ -935,9 +936,7 @@ static bool _reply(socketpool_socket_obj_t *socket, _request *request) {
} }
// Delete is almost identical for files and directories so share the // Delete is almost identical for files and directories so share the
// implementation. // implementation.
if (strcmp(request->method, "OPTIONS") == 0) { if (strcmp(request->method, "DELETE") == 0) {
_reply_access_control(socket, request);
} else if (strcmp(request->method, "DELETE") == 0) {
if (_usb_active()) { if (_usb_active()) {
_reply_conflict(socket, request); _reply_conflict(socket, request);
return false; return false;