http_core.h revision 641a873d29928927230edb2c6d1a09e6ad5a1af8
* Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * @package CORE HTTP Daemon /* **************************************************************** * The most basic server code is encapsulated in a single module * known as the core, which is just *barely* functional enough to * serve documents, though not terribly well. * Largely for NCSA back-compatibility reasons, the core needs to * make pieces of its config structures available to other modules. * The accessors are declared here, along with the interpretation * of one of them (allow_options). /* options for get_remote_host() */ /* REMOTE_HOST returns the hostname, or NULL if the hostname * lookup fails. It will force a DNS lookup according to the * HostnameLookups setting. /* REMOTE_NAME returns the hostname, or the dotted quad if the * hostname lookup fails. It will force a DNS lookup according * to the HostnameLookups setting. /* REMOTE_NOLOOKUP is like REMOTE_NAME except that a DNS lookup is /* REMOTE_DOUBLE_REV will always force a DNS lookup, and also force * a double reverse lookup, regardless of the HostnameLookups * setting. The result is the (double reverse checked) hostname, * or NULL if any of the lookups fail. /* Make sure we don't write less than 8000 bytes at any one time. /* default maximum of internal redirects */ /* default maximum subrequest nesting level */ * Retrieve the value of Options for this request * @param r The current request * @return the Options bitmask * @deffunc int ap_allow_options(request_rec *r) * Retrieve the value of the AllowOverride for this request * @param r The current request * @return the overrides bitmask * @deffunc int ap_allow_overrides(request_rec *r) * Retrieve the value of the DefaultType directive, or text/plain if not set * @param r The current request * @return The default type * @deffunc const char *ap_default_type(request_rec *r) * Retrieve the document root for this server * @param r The current request * @warning Don't use this! If your request went through a Userdir, or * something like that, it'll screw you. But it's back-compatible... * @return The document root * @deffunc const char *ap_document_root(request_rec *r) * Lookup the remote client's DNS name or IP address * @param conn The current connection * @param dir_config The directory config vector from the request * @param type The type of lookup to perform. One of: * REMOTE_HOST returns the hostname, or NULL if the hostname * lookup fails. It will force a DNS lookup according to the * HostnameLookups setting. * REMOTE_NAME returns the hostname, or the dotted quad if the * hostname lookup fails. It will force a DNS lookup according * to the HostnameLookups setting. * REMOTE_NOLOOKUP is like REMOTE_NAME except that a DNS lookup is * REMOTE_DOUBLE_REV will always force a DNS lookup, and also force * a double reverse lookup, regardless of the HostnameLookups * setting. The result is the (double reverse checked) * hostname, or NULL if any of the lookups fail. * @param str_is_ip unless NULL is passed, this will be set to non-zero on output when an IP address * @return The remote hostname * @deffunc const char *ap_get_remote_host(conn_rec *conn, void *dir_config, int type, int *str_is_ip) * Retrieve the login name of the remote user. Undef if it could not be * @param r The current request * @return The user logged in to the client machine * @deffunc const char *ap_get_remote_logname(request_rec *r) /* Used for constructing self-referencing URLs, and things like SERVER_PORT, * build a fully qualified URL from the uri and information in the request rec * @param p The pool to allocate the URL from * @param uri The path to the requested file * @param r The current request * @return A fully qualified URL * @deffunc char *ap_construct_url(apr_pool_t *p, const char *uri, request_rec *r) * Get the current server name from the request * @param r The current request * @return the server name * @deffunc const char *ap_get_server_name(request_rec *r) * Get the current server port * @param The current request * @return The server's port * @deffunc apr_port_t ap_get_server_port(const request_rec *r) * Return the limit on bytes in request msg body * @param r The current request * @return the maximum number of bytes in the request msg body * @deffunc apr_off_t ap_get_limit_req_body(const request_rec *r) * Return the limit on bytes in XML request msg body * @param r The current request * @return the maximum number of bytes in XML request msg body * @deffunc size_t ap_get_limit_xml_body(const request_rec *r) * Install a custom response handler for a given status * @param r The current request * @param status The status for which the custom response should be used * @param string The custom response. This can be a static string, a file * Check if the current request is beyond the configured max. number of redirects or subrequests * @param r The current request * @return true (is exceeded) or false * @deffunc int ap_is_recursion_limit_exceeded(const request_rec *r) * Check for a definition from the server command line * @param name The define to check for * @return 1 if defined, 0 otherwise * @deffunc int ap_exists_config_define(const char *name) /* FIXME! See STATUS about how */ /* Authentication stuff. This is one of the places where compatibility * with the old config files *really* hurts; they don't discriminate at * all between different authentication schemes, meaning that we need * to maintain common state for all of them in the core, and make it * available to the other modules through interfaces. /** A structure to keep track of authorization requirements */ /** Where the require line is in the config file. */ /** The complete string from the command line */ * Return the type of authorization required for this request * @param r The current request * @return The authorization required * @deffunc const char *ap_auth_type(request_rec *r) * Return the current Authorization realm * @param r The current request * @return The current authorization realm * @deffunc const char *ap_auth_name(request_rec *r) * How the requires lines must be met. * @param r The current request * @return How the requirements must be met. One of: * SATISFY_ANY -- any of the requirements must be met. * SATISFY_ALL -- all of the requirements must be met. * SATISFY_NOSPEC -- There are no applicable satisfy lines * @deffunc int ap_satisfies(request_rec *r) * Retrieve information about all of the requires directives for this request * @param r The current request * @return An array of all requires directives for this request * @deffunc const apr_array_header_t *ap_requires(request_rec *r) * Core is also unlike other modules in being implemented in more than * one file... so, data structures are declared here, even though most of * the code that cares really is in http_core.c. Also, another accessor. /* Per-request configuration */ /* bucket brigade used by getline for look-ahead and * ap_get_client_block for holding left-over request body */ /* an array of per-request working data elements, accessed * by ID using ap_get_request_note() * (Use ap_register_request_note() during initialization /* There is a script processor installed on the output filter chain, * so it needs the default_handler to deliver a (script) file into * the chain so it can process it. Normally, default_handler only * serves files on a GET request (assuming the file is actual content), * since other methods are not content-retrieval. This flag overrides * that behavior, stating that the "content" is actually a script and * won't actually be delivered as the response for the non-GET method. /* Custom response strings registered via ap_custom_response(), * or NULL; check per-dir config if nothing found here /* Should addition of charset= be suppressed for this request? /* Standard entries that are guaranteed to be accessible via * ap_get_request_note() for each request (additional entries * can be added with ap_register_request_note()) * Reserve an element in the core_request_config->notes array * for some application-specific data * @return An integer key that can be passed to ap_get_request_note() * during request processing to access this element for the * Retrieve a pointer to an element in the core_request_config->notes array * @param note_num A key for the element: either a value obtained from * ap_register_request_note() or one of the predefined AP_NOTE_* * @return NULL if the note_num is invalid, otherwise a pointer to the * requested note element. * @remark At the start of a request, each note element is NULL. The * handle provided by ap_get_request_note() is a pointer-to-pointer * so that the caller can point the element to some app-specific * data structure. The caller should guarantee that any such * structure will last as long as the request itself. /* Per-directory configuration */ * Bits of info that go into making an ETag for a file * document. Why a long? Because char historically * proved too short for Options, and int can be different * sizes on different platforms. /* the number of slashes in d */ /* If (opts & OPT_UNSET) then no absolute assignment to options has * invariant: (opts_add & opts_remove) == 0 * Which said another way means that the last relative (options + or -) * assignment made to each bit is recorded in exactly one of opts_add /* MIME typing --- the core doesn't do anything at all with this, * but it does know what to slap on a request for a document which * goes untyped by other mechanisms before it slips out the door... /* Authentication stuff. Groan... */ int *
satisfy;
/* for every method one */ /* Custom response config. These can contain text or a URL to redirect to. * if response_code_strings is NULL then there are none in the config, * if it's not null then it's allocated to sizeof(char*)*RESPONSE_CODES. * This lets us do quick merges in merge_core_dir_configs(). * ap_custom_response() */ /* Hostname resolution etc */ signed int content_md5 :
2;
/* calculate Content-MD5? */ /* since is_fnmatch(conf->d) was being called so frequently in * directory_walk() and its relatives, this field was created and * is set to the result of that call. /* should we force a charset on any outgoing parameterless content-type? /* System Resource Control */ const char *
mime_type;
/* forced with ForceType */ const char *
handler;
/* forced with SetHandler */ * Run-time performance tuning unsigned int enable_mmap :
2;
/* whether files in this dir can be mmap'ed */ * pitched indiscriminately */ /* Per-server core configuration */ /* Name translations --- we want the core to be able to do *something* * so it's at least a minimally functional web server on its own (and * can be tested that way). But let's keep it to the bare minimum: /* recursion backstopper */ int subreq_limit;
/* maximum nesting level of subrequests */ /* for AddOutputFiltersByType in core.c */ /* Core filters; not exported. */ #
endif /* CORE_PRIVATE *//* ---------------------------------------------------------------------- /* Handles for core filters */ * their operational status. * @param p A pool to use to create entries in the hash table * @param val The name of the parameter(s) that is wanted. This is * tree-structured would be in the form ('*' is all the tree, * 'module.*' all of the module , 'module.foo.*', or * @param ht The hash table to store the results. Keys are item names, and * the values point to ap_mgmt_item_t structures. /* ---------------------------------------------------------------------- */ /* ---------------------------------------------------------------------- * I/O logging with mod_logio /* ---------------------------------------------------------------------- * ident lookups with mod_ident /* ---------------------------------------------------------------------- */ #
endif /* !APACHE_HTTP_CORE_H */