mod_include.c revision 5ae78608d6554d6cb7a93a34e10a6b90374beee0
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* ====================================================================
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * The Apache Software License, Version 1.1
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * Copyright (c) 2000 The Apache Software Foundation. All rights
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * reserved.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * Redistribution and use in source and binary forms, with or without
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * modification, are permitted provided that the following conditions
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * 1. Redistributions of source code must retain the above copyright
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * notice, this list of conditions and the following disclaimer.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * 2. Redistributions in binary form must reproduce the above copyright
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * notice, this list of conditions and the following disclaimer in
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * the documentation and/or other materials provided with the
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * distribution.
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * 3. The end-user documentation included with the redistribution,
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * if any, must include the following acknowledgment:
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * "This product includes software developed by the
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * Apache Software Foundation (http://www.apache.org/)."
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * Alternately, this acknowledgment may appear in the software itself,
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * if and wherever such third-party acknowledgments normally appear.
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * 4. The names "Apache" and "Apache Software Foundation" must
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * not be used to endorse or promote products derived from this
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * software without prior written permission. For written
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * permission, please contact apache@apache.org.
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * 5. Products derived from this software may not be called "Apache",
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * nor may "Apache" appear in their name, without prior written
64185f9824e42f21ca7b9ae6c004484215c031a7rbb * permission of the Apache Software Foundation.
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * SUCH DAMAGE.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * ====================================================================
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * This software consists of voluntary contributions made by many
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * individuals on behalf of the Apache Software Foundation. For more
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * information on the Apache Software Foundation, please see
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * Portions of this software are based upon public domain software
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * originally written at the National Center for Supercomputing Applications,
ab2c1c1c83ec91415565da5a71fbc15d9685caa6fielding * University of Illinois, Urbana-Champaign.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * http_include.c: Handles the server-parsed HTML documents
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * Original by Rob McCool; substantial fixups by David Robinson;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * incorporated into the Apache module framework by rst.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* ------------------------ Environment function -------------------------- */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* XXX: could use ap_table_overlap here */
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingstatic void add_include_vars(request_rec *r, char *timefmt)
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_table_setn(e, "DATE_LOCAL", ap_ht_time(r->pool, date, timefmt, 0));
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_table_setn(e, "DATE_GMT", ap_ht_time(r->pool, date, timefmt, 1));
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_table_setn(e, "DOCUMENT_PATH_INFO", r->path_info);
c9dafaafc2650994e47f88f5239f643c97ec4cb3wrowe if (apr_get_username(&pwname, r->finfo.user, r->pool) == APR_SUCCESS) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* --------------------------- Parser functions --------------------------- */
18343797fadabacf01280b38ea7688690d12aec0rbb/* This function returns either a pointer to the split bucket containing the
18343797fadabacf01280b38ea7688690d12aec0rbb * first byte of the BEGINNING_SEQUENCE (after finding a complete match) or it
18343797fadabacf01280b38ea7688690d12aec0rbb * returns NULL if no match found.
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic apr_bucket *find_start_sequence(apr_bucket *dptr, include_ctx_t *ctx,
47d7b9019e57fbf3eaa4d2b19bbbcce087dd8389rbb const char *c;
47d7b9019e57fbf3eaa4d2b19bbbcce087dd8389rbb const char *buf;
fcc991411813d0ceaca4a76675f771e1f06617cdtrawick /* XXX handle retcodes */
18343797fadabacf01280b38ea7688690d12aec0rbb /* We want to split the bucket at the '<'. */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe apr_bucket_split(ctx->head_start_bucket, ctx->head_start_index);
18343797fadabacf01280b38ea7688690d12aec0rbb /* The reason for this, is that we need to make sure
18343797fadabacf01280b38ea7688690d12aec0rbb * that we catch cases like <<!--#. This makes the
18343797fadabacf01280b38ea7688690d12aec0rbb * second check after the original check fails.
18343797fadabacf01280b38ea7688690d12aec0rbb * If parse_pos was already 0 then we already checked this.
18343797fadabacf01280b38ea7688690d12aec0rbb if (*c == str[0]) {
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic apr_bucket *find_end_sequence(apr_bucket *dptr, include_ctx_t *ctx, apr_bucket_brigade *bb)
18343797fadabacf01280b38ea7688690d12aec0rbb const char *c;
18343797fadabacf01280b38ea7688690d12aec0rbb const char *buf;
18343797fadabacf01280b38ea7688690d12aec0rbb /* XXX handle retcodes */
18343797fadabacf01280b38ea7688690d12aec0rbb /* We want to split the bucket at the '>'. The
18343797fadabacf01280b38ea7688690d12aec0rbb * end of the END_SEQUENCE is in the current bucket.
18343797fadabacf01280b38ea7688690d12aec0rbb * The beginning might be in a previous bucket.
18343797fadabacf01280b38ea7688690d12aec0rbb if ((c - buf) > 0) {
18343797fadabacf01280b38ea7688690d12aec0rbb /* The reason for this, is that we need to make sure
18343797fadabacf01280b38ea7688690d12aec0rbb * that we catch cases like --->. This makes the
18343797fadabacf01280b38ea7688690d12aec0rbb * second check after the original check fails.
18343797fadabacf01280b38ea7688690d12aec0rbb * If parse_pos was already 0 then we already checked this.
18343797fadabacf01280b38ea7688690d12aec0rbb if (*c == str[0]) {
18343797fadabacf01280b38ea7688690d12aec0rbb/* This function culls through the buckets that have been set aside in the
18343797fadabacf01280b38ea7688690d12aec0rbb * ssi_tag_brigade and copies just the directive part of the SSI tag (none
18343797fadabacf01280b38ea7688690d12aec0rbb * of the start and end delimiter bytes are copied).
18343797fadabacf01280b38ea7688690d12aec0rbbstatic apr_status_t get_combined_directive (include_ctx_t *ctx,
18343797fadabacf01280b38ea7688690d12aec0rbb const char *tmp_from;
18343797fadabacf01280b38ea7688690d12aec0rbb /* If the tag length is longer than the tmp buffer, allocate space. */
18343797fadabacf01280b38ea7688690d12aec0rbb if ((ctx->combined_tag = apr_pcalloc(r->pool, ctx->tag_length + 1)) == NULL) {
18343797fadabacf01280b38ea7688690d12aec0rbb } /* Else, just use the temp buffer. */
18343797fadabacf01280b38ea7688690d12aec0rbb /* Prime the pump. Start at the beginning of the tag... */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe apr_bucket_read (dptr, &tmp_from, &tmp_from_len, 0); /* Read the bucket... */
18343797fadabacf01280b38ea7688690d12aec0rbb /* Adjust the pointer to start at the tag within the bucket... */
18343797fadabacf01280b38ea7688690d12aec0rbb /* Loop through the buckets from the tag_start_bucket until before
18343797fadabacf01280b38ea7688690d12aec0rbb * the tail_start_bucket copying the contents into the buffer.
18343797fadabacf01280b38ea7688690d12aec0rbb /* Adjust the count to stop at the beginning of the tail. */
18343797fadabacf01280b38ea7688690d12aec0rbb } while ((!done) &&
18343797fadabacf01280b38ea7688690d12aec0rbb ((ctx->curr_tag_pos - ctx->combined_tag) < ctx->tag_length));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * decodes a string containing html entities or numeric character references.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * 's' is overwritten with the decoded string.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * If 's' is syntatically incorrect, then the followed fixups will be made:
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * unknown entities will be left undecoded;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * references to unused numeric characters will be deleted.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * In particular, � will not be decoded, but will be deleted.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* maximum length of any ISO-LATIN-1 HTML entity name. */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* The following is a shrinking transformation, therefore safe. */
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingstatic void decodehtml(char *s)
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding char *p = s;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding const char *ents;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "quot\042Auml\304Euml\313Iuml\317Ouml\326Uuml\334auml\344euml\353\
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Acirc\302Aring\305AElig\306Ecirc\312Icirc\316Ocirc\324Ucirc\333\
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingTHORN\336szlig\337acirc\342aring\345aelig\346ecirc\352icirc\356ocirc\364\
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Agrave\300Aacute\301Atilde\303Ccedil\307Egrave\310Eacute\311\
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingIgrave\314Iacute\315Ntilde\321Ograve\322Oacute\323Otilde\325Oslash\330\
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingUgrave\331Uacute\332Yacute\335agrave\340aacute\341atilde\343ccedil\347\
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingegrave\350eacute\351igrave\354iacute\355ntilde\361ograve\362oacute\363\
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingotilde\365oslash\370ugrave\371uacute\372yacute\375" /* 6 */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding for (; *s != '\0'; s++, p++) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if (*s != '&') {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* find end of entity */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* is it numeric ? */
10a4cdd68ef1ca0e54af296fe1d08ac00150c90bwrowe for (j = 2, val = 0; j < i && apr_isdigit(s[j]); j++) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if (j < i || val <= 8 || (val >= 11 && val <= 31) ||
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding p--; /* no data to output */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* wrong length */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding continue; /* skip it */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding for (ents = entlist[j]; *ents != '\0'; ents += i) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding *p = RAW_ASCII_CHAR(((const unsigned char *) ents)[j]);
18343797fadabacf01280b38ea7688690d12aec0rbb * Extract the next tag name and value.
18343797fadabacf01280b38ea7688690d12aec0rbb * If there are no more tags, set the tag name to NULL.
18343797fadabacf01280b38ea7688690d12aec0rbb * The tag value is html decoded if dodecode is non-zero.
18343797fadabacf01280b38ea7688690d12aec0rbb * The tag value may be NULL if there is no tag value..
18343797fadabacf01280b38ea7688690d12aec0rbb * [WS]<Tag>[WS]=[WS]['|"]<Value>['|"|WS]
18343797fadabacf01280b38ea7688690d12aec0rbb#define SKIP_TAG_WHITESPACE(ptr) while ((*ptr != '\0') && (apr_isspace (*ptr))) ptr++
18343797fadabacf01280b38ea7688690d12aec0rbbstatic void get_tag_and_value(include_ctx_t *ctx, char **tag,
18343797fadabacf01280b38ea7688690d12aec0rbb *tag = c; /* First non-whitespace character (could be NULL). */
18343797fadabacf01280b38ea7688690d12aec0rbb while ((*c != '\0') && (*c != '=') && (!apr_isspace(*c))) {
18343797fadabacf01280b38ea7688690d12aec0rbb *c = apr_tolower(*c); /* find end of tag, lowercasing as we go... */
18343797fadabacf01280b38ea7688690d12aec0rbb return; /* We have found the end of the buffer. */
18343797fadabacf01280b38ea7688690d12aec0rbb } /* We might have a tag, but definitely no value. */
18343797fadabacf01280b38ea7688690d12aec0rbb if (*c == '=') {
18343797fadabacf01280b38ea7688690d12aec0rbb *c++ = '\0'; /* Overwrite the '=' with a terminating byte after tag. */
18343797fadabacf01280b38ea7688690d12aec0rbb else { /* Try skipping WS to find the '='. */
18343797fadabacf01280b38ea7688690d12aec0rbb if (*c != '=') { /* There needs to be an equal sign if there's a value. */
18343797fadabacf01280b38ea7688690d12aec0rbb return; /* There apparently was no value. */
18343797fadabacf01280b38ea7688690d12aec0rbb c++; /* Skip the equals sign. */
18343797fadabacf01280b38ea7688690d12aec0rbb if (*c == '"' || *c == '\'') { /* Allow quoted values for space inclusion. */
18343797fadabacf01280b38ea7688690d12aec0rbb term = *c++; /* NOTE: This does not pass the quotes on return. */
18343797fadabacf01280b38ea7688690d12aec0rbb while ((*c != '\0') &&
18343797fadabacf01280b38ea7688690d12aec0rbb if (*c == '\\') { /* Accept \" and \' as valid char in string. */
18343797fadabacf01280b38ea7688690d12aec0rbb if (*c == term) { /* Overwrite the "\" during the embedded */
18343797fadabacf01280b38ea7688690d12aec0rbb shift_val++; /* escape sequence of '\"' or "\'". Shift */
18343797fadabacf01280b38ea7688690d12aec0rbb } /* bytes from here to next delimiter. */
18343797fadabacf01280b38ea7688690d12aec0rbb *c++ = '\0'; /* Overwrites delimiter (term or WS) with NULL. */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * Do variable substitution on strings
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingstatic void parse_string(request_rec *r, const char *in, char *out,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* leave room for nul terminator */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* truncated */
18343797fadabacf01280b38ea7688690d12aec0rbb/* pjr hack char var[MAX_STRING_LEN]; */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* guess that the expansion won't happen */
b79b743d4cff02d6a830bb7118826a2fd608742amartin 0, r, "Missing '}' on variable \"%s\"",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* what a pain, too bad there's no table_getn where you can
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * pass a non-nul terminated string */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if (l != 0) {
18343797fadabacf01280b38ea7688690d12aec0rbb/* pjr - this is a test hack to avoid a memcpy. Make sure that this works...
18343797fadabacf01280b38ea7688690d12aec0rbb* l = (l > sizeof(var) - 1) ? (sizeof(var) - 1) : l;
18343797fadabacf01280b38ea7688690d12aec0rbb* memcpy(var, start_of_var_name, l);
18343797fadabacf01280b38ea7688690d12aec0rbb* var[l] = '\0';
18343797fadabacf01280b38ea7688690d12aec0rbb* val = apr_table_get(r->subprocess_env, var);
18343797fadabacf01280b38ea7688690d12aec0rbb/* pjr hack */ val = apr_table_get(r->subprocess_env, start_of_var_name);
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding break; /* no expansion to be done */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* zero-length variable name causes just the $ to be copied */
44d275fe4ce94e3b2d73614b1930a2e43e6fba8fstoddard l = ((int)l > end_out - next) ? (end_out - next) : l;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* truncated */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* --------------------------- Action handlers ---------------------------- */
18343797fadabacf01280b38ea7688690d12aec0rbbstatic int include_cgi(char *s, request_rec *r, ap_filter_t *next,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* No hardwired path info or query allowed */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if ((rr->path_info && rr->path_info[0]) || rr->args) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Script gets parameters of the *document*, for back compatibility */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding rr->path_info = r->path_info; /* hard to get right; see mod_cgi.c */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Force sub_req to be treated as a CGI request, even if ordinary
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * typing rules would have called it something else.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Run it. */
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm const char *location = apr_table_get(rr->headers_out, "Location");
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_immortal("<A HREF=\"", sizeof("<A HREF=\""));
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp2_buck = apr_bucket_create_heap(location, len_loc, 1, &h_wrt);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp2_buck = apr_bucket_create_immortal("\">", sizeof("\">"));
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp2_buck = apr_bucket_create_heap(location, len_loc, 1, &h_wrt);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp2_buck = apr_bucket_create_immortal("</A>", sizeof("</A>"));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* ensure that path is relative, and does not contain ".." elements
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * ensentially ensure that it does not match the regex:
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * (^/|(^|/)\.\.(/|$))
50e59a535cafd083838a173aedf9cfa6917d016dwrowe * XXX: Needs to become apr_is_path_relative() test
50e59a535cafd083838a173aedf9cfa6917d016dwrowe#if defined(WIN32)
50e59a535cafd083838a173aedf9cfa6917d016dwrowe /* If the name is canonical this is redundant
50e59a535cafd083838a173aedf9cfa6917d016dwrowe * but in security, redundancy is worthwhile.
50e59a535cafd083838a173aedf9cfa6917d016dwrowe * Does OS2 belong here (accepts ... for ..)?
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_include(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb return (0);
18343797fadabacf01280b38ea7688690d12aec0rbb return (1);
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 0);
18343797fadabacf01280b38ea7688690d12aec0rbb /* be safe; only files in this directory or below allowed */
18343797fadabacf01280b38ea7688690d12aec0rbb "in parsed file %s";
18343797fadabacf01280b38ea7688690d12aec0rbb error_fmt = "unable to include \"%s\" in parsed file %s";
18343797fadabacf01280b38ea7688690d12aec0rbb if (!error_fmt && (ctx->flags & FLAG_NO_EXEC) && rr->content_type
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "in parsed file %s";
18343797fadabacf01280b38ea7688690d12aec0rbb /* try to avoid recursive includes. We do this by walking
18343797fadabacf01280b38ea7688690d12aec0rbb * up the r->main list of subrequests, and at each level
18343797fadabacf01280b38ea7688690d12aec0rbb * walking back through any internal redirects. At each
18343797fadabacf01280b38ea7688690d12aec0rbb * step, we compare the filenames and the URIs.
18343797fadabacf01280b38ea7688690d12aec0rbb * The filename comparison catches a recursive include
18343797fadabacf01280b38ea7688690d12aec0rbb * with an ever-changing URL, eg.
18343797fadabacf01280b38ea7688690d12aec0rbb * <!--#include virtual=
18343797fadabacf01280b38ea7688690d12aec0rbb * "$REQUEST_URI/$QUERY_STRING?$QUERY_STRING/x"-->
18343797fadabacf01280b38ea7688690d12aec0rbb * which, although they would eventually be caught because
18343797fadabacf01280b38ea7688690d12aec0rbb * we have a limit on the length of files, etc., can
18343797fadabacf01280b38ea7688690d12aec0rbb * recurse for a while.
18343797fadabacf01280b38ea7688690d12aec0rbb * The URI comparison catches the case where the filename
18343797fadabacf01280b38ea7688690d12aec0rbb * is changed while processing the request, so the
18343797fadabacf01280b38ea7688690d12aec0rbb * current name is never the same as any previous one.
18343797fadabacf01280b38ea7688690d12aec0rbb * This can happen with "DocumentRoot /foo" when you
18343797fadabacf01280b38ea7688690d12aec0rbb * request "/" on the server and it includes "/".
18343797fadabacf01280b38ea7688690d12aec0rbb * This only applies to modules such as mod_dir that
18343797fadabacf01280b38ea7688690d12aec0rbb * (somewhat improperly) mess with r->filename outside
18343797fadabacf01280b38ea7688690d12aec0rbb * of a filename translation phase.
18343797fadabacf01280b38ea7688690d12aec0rbb if (p != NULL) {
18343797fadabacf01280b38ea7688690d12aec0rbb "in parsed file %s";
18343797fadabacf01280b38ea7688690d12aec0rbb /* See the Kludge in send_parsed_file for why */
18343797fadabacf01280b38ea7688690d12aec0rbb /* Basically, it puts a bread crumb in here, then looks */
18343797fadabacf01280b38ea7688690d12aec0rbb /* for the crumb later to see if its been here. */
18343797fadabacf01280b38ea7688690d12aec0rbb ap_set_module_config(rr->request_config, &includes_module, r);
18343797fadabacf01280b38ea7688690d12aec0rbb rr->output_filters = f->next;
18343797fadabacf01280b38ea7688690d12aec0rbb error_fmt = "unable to include \"%s\" in parsed file %s";
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb /* destroy the sub request if it's not a nested include (crumb) */
18343797fadabacf01280b38ea7688690d12aec0rbb && ap_get_module_config(rr->request_config, &includes_module)
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "unknown parameter \"%s\" to tag include in %s",
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingtypedef struct {
1ccd992d37d62c8cb2056126f2234f64ec189bfddougmstatic apr_status_t build_argv_list(char ***argv, request_rec *r, apr_pool_t *p)
e8d9dd6a2f39d9c1a647b0b513de84e39e2235ebbjh /* count the number of keywords */
23cfa61aaed581f103070c8733a493b31f990f9brbb /* Everything is - 1 to account for the first parameter which is the
23cfa61aaed581f103070c8733a493b31f990f9brbb * program name. We didn't used to have to do this, but APR wants it.
23cfa61aaed581f103070c8733a493b31f990f9brbb numwords = APACHE_ARG_MAX - 1; /* Truncate args to prevent overrun */
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm *argv = (char **) apr_palloc(p, (numwords + 2) * sizeof(char *));
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int include_cmd(include_ctx_t *ctx, apr_bucket_brigade **bb, char *s,
b1476ba063e6d9577cd86db3db5dd98ff6bc78b9rbb defined(RLIMIT_DATA) || defined(RLIMIT_VMEM) || defined (RLIMIT_AS)
b1476ba063e6d9577cd86db3db5dd98ff6bc78b9rbb conf = (core_dir_config *) ap_get_module_config(r->per_dir_config,
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_table_setn(env, "PATH_INFO", ap_escape_shell_cmd(r->pool, r->path_info));
18343797fadabacf01280b38ea7688690d12aec0rbb pa_req = ap_sub_req_lookup_uri(ap_escape_uri(r->pool, r->path_info), r, f->next);
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_pstrcat(r->pool, pa_req->filename, pa_req->path_info,
f88d837d91fe0e15703c926c6a866012025b7ceatrawick if (((rc = apr_createprocattr_init(&procattr, r->pool)) != APR_SUCCESS) ||
f88d837d91fe0e15703c926c6a866012025b7ceatrawick ((rc = apr_setprocattr_dir(procattr, ap_make_dirstr_parent(r->pool, r->filename))) != APR_SUCCESS) ||
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm ((rc = apr_setprocattr_limit(procattr, APR_LIMIT_CPU, conf->limit_cpu)) != APR_SUCCESS) ||
b1476ba063e6d9577cd86db3db5dd98ff6bc78b9rbb#if defined(RLIMIT_DATA) || defined(RLIMIT_VMEM) || defined(RLIMIT_AS)
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm ((rc = apr_setprocattr_limit(procattr, APR_LIMIT_MEM, conf->limit_mem)) != APR_SUCCESS) ||
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm ((rc = apr_setprocattr_limit(procattr, APR_LIMIT_NPROC, conf->limit_nproc)) != APR_SUCCESS) ||
f88d837d91fe0e15703c926c6a866012025b7ceatrawick ((rc = apr_setprocattr_cmdtype(procattr, APR_SHELLCMD)) != APR_SUCCESS)) {
e8d9dd6a2f39d9c1a647b0b513de84e39e2235ebbjh /* Something bad happened, tell the world. */
14552184cfa95bd49b274b434390cc5195e8375crbb "couldn't initialize proc attributes: %s %s", r->filename, s);
cccd31fa4a72fe23cc3249c06db181b274a55a69gstein rc = apr_create_process(procnew, s, (const char * const *) argv,
cccd31fa4a72fe23cc3249c06db181b274a55a69gstein (const char * const *)ap_create_environment(r->pool, env),
e8d9dd6a2f39d9c1a647b0b513de84e39e2235ebbjh /* Bad things happened. Everyone should have cleaned up. */
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_note_subprocess(r->pool, procnew, kill_after_timeout);
e8d9dd6a2f39d9c1a647b0b513de84e39e2235ebbjh /* Fill in BUFF structure for parents pipe to child's stdout */
47d7b9019e57fbf3eaa4d2b19bbbcce087dd8389rbb /* We can't close the pipe here, because we may return before the
47d7b9019e57fbf3eaa4d2b19bbbcce087dd8389rbb * full CGI has been sent to the network. That's okay though,
47d7b9019e57fbf3eaa4d2b19bbbcce087dd8389rbb * because we can rely on the pool to close the pipe for us.
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_exec(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb return (0);
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 1);
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "execution failure for parameter \"%s\" "
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb /* just in case some stooge changed directories */
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 0);
18343797fadabacf01280b38ea7688690d12aec0rbb if (include_cgi(parsed_string, r, f->next, head_ptr, inserted_head) == -1) {
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "unknown parameter \"%s\" to tag exec in %s", tag, file);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_echo(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb const char *val = apr_table_get(r->subprocess_env, tag_val);
18343797fadabacf01280b38ea7688690d12aec0rbb case E_URL: echo_text = ap_escape_uri(r->pool, val); break;
18343797fadabacf01280b38ea7688690d12aec0rbb case E_ENTITY: echo_text = ap_escape_html(r->pool, val); break;
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_heap(echo_text, e_len, 1, &e_wrt);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_immortal("(none)", sizeof("none"));
18343797fadabacf01280b38ea7688690d12aec0rbb else if (!strcasecmp(tag_val, "entity")) encode = E_ENTITY;
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "unknown value \"%s\" to parameter \"encoding\" of "
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "unknown parameter \"%s\" in tag echo of %s",
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* error and tf must point to a string with room for at
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * least MAX_STRING_LEN characters
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_config(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb return 0; /* Reached the end of the string. */
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, ctx->error_str, MAX_STRING_LEN, 0);
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, ctx->time_str, MAX_STRING_LEN, 0);
18343797fadabacf01280b38ea7688690d12aec0rbb apr_table_setn(env, "DATE_LOCAL", ap_ht_time(r->pool, date, ctx->time_str, 0));
18343797fadabacf01280b38ea7688690d12aec0rbb apr_table_setn(env, "DATE_GMT", ap_ht_time(r->pool, date, ctx->time_str, 1));
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 0);
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "unknown parameter \"%s\" to tag config in %s",
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingstatic int find_file(request_rec *r, const char *directive, const char *tag,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* be safe; only files in this directory or below allowed */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "in parsed file %s";
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding ap_getparents(tag_val); /* get rid of any nasties */
85bea52867bd1a8c81080ba415b5cd5b771ce5f7gstein /* note: it is okay to pass NULL for the "next filter" since
85bea52867bd1a8c81080ba415b5cd5b771ce5f7gstein we never attempt to "run" this sub request. */
d96aa158770d3f83cb59cf0f2f7402e175f7dfccrbb if (rr->status == HTTP_OK && rr->finfo.protection != 0) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding error_fmt = "unable to get information about \"%s\" "
9274c5e05fbb6b9890099c0c20aa35d747d42be1stoddard "in parsed file %s";
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding error_fmt = "unable to lookup information about \"%s\" "
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "in parsed file %s";
6f984345bbfa9342dde1f2b7b8c35b7987d078afwrowe ap_log_rerror(APLOG_MARK, APLOG_ERR | (rv ? 0 : APLOG_NOERRNO),
85bea52867bd1a8c81080ba415b5cd5b771ce5f7gstein /* note: it is okay to pass NULL for the "next filter" since
85bea52867bd1a8c81080ba415b5cd5b771ce5f7gstein we never attempt to "run" this sub request. */
d96aa158770d3f83cb59cf0f2f7402e175f7dfccrbb if (rr->status == HTTP_OK && rr->finfo.protection != 0) {
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "unable to get information about \"%s\" "
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "in parsed file %s",
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "unknown parameter \"%s\" to tag %s in %s",
23801cf373ddaff5a5ba7692d2637d75bdffdc4btrawickstatic void generate_size(apr_ssize_t size, char *buff, apr_size_t buff_size)
18343797fadabacf01280b38ea7688690d12aec0rbb /* XXX: this -1 thing is a gross hack */
18343797fadabacf01280b38ea7688690d12aec0rbb else if (!size) {
18343797fadabacf01280b38ea7688690d12aec0rbb apr_snprintf(buff, buff_size, "%4" APR_SSIZE_T_FMT "k", (size + 512) / 1024);
18343797fadabacf01280b38ea7688690d12aec0rbb apr_snprintf(buff, buff_size, "%4.1fM", size / 1048576.0);
18343797fadabacf01280b38ea7688690d12aec0rbb apr_snprintf(buff, buff_size, "%4" APR_SSIZE_T_FMT "M", (size + 524288) / 1048576);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_fsize(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 0);
18343797fadabacf01280b38ea7688690d12aec0rbb if (!find_file(r, "fsize", tag, parsed_string, &finfo)) {
18343797fadabacf01280b38ea7688690d12aec0rbb int l, x, pos = 0;
18343797fadabacf01280b38ea7688690d12aec0rbb apr_snprintf(tmp_buff, sizeof(tmp_buff), "%" APR_OFF_T_FMT, finfo.size);
18343797fadabacf01280b38ea7688690d12aec0rbb for (x = 0; x < l; x++) {
18343797fadabacf01280b38ea7688690d12aec0rbb if (x && (!((l - x) % 3))) {
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_heap(buff, s_len, 1, &s_wrt);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_flastmod(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 0);
18343797fadabacf01280b38ea7688690d12aec0rbb if (!find_file(r, "flastmod", tag, parsed_string, &finfo)) {
18343797fadabacf01280b38ea7688690d12aec0rbb t_val = ap_ht_time(r->pool, finfo.mtime, ctx->time_str, 0);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_heap(t_val, t_len, 1, &t_wrt);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
0f081398cf0eef8cc7c66a535d450110a92dc8aefieldingstatic int re_check(request_rec *r, char *string, char *rexp)
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding compiled = ap_pregcomp(r->pool, rexp, REG_EXTENDED | REG_NOSUB);
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding regex_error = ap_regexec(compiled, string, 0, (regmatch_t *) NULL, 0);
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding token_and, token_or, token_not, token_eq, token_ne,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* there is an implicit assumption here that string is at most MAX_STRING_LEN-1
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * characters long...
18343797fadabacf01280b38ea7688690d12aec0rbbstatic const char *get_ptoken(request_rec *r, const char *string, struct token *token,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Skip leading white space */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding return (char *) NULL;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding return (char *) NULL;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* We should only be here if we are in a string */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * Yes I know that goto's are BAD. But, c doesn't allow me to
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * exit a loop from a switch statement. Yes, I could use a flag,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * but that is (IMHO) even less readable/maintainable than the goto.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * I used the ++string throughout this section so that string
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * ends up pointing to the next token and I can just return it
18343797fadabacf01280b38ea7688690d12aec0rbb for (ch = *string; ((ch != '\0') && (!tkn_fnd)); ch = *++string) {
18343797fadabacf01280b38ea7688690d12aec0rbb switch (ch) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* If qs is still set, I have an unmatched ' */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * Hey I still know that goto's are BAD. I don't think that I've ever
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * used two in the same project, let alone the same file before. But,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * I absolutely want to make sure that I clean up the memory in all
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * cases. And, without rewriting this completely, the easiest way
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * is to just branch to the return code which cleans it up.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* there is an implicit assumption here that expr is at most MAX_STRING_LEN-1
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * characters long...
18343797fadabacf01280b38ea7688690d12aec0rbbstatic int parse_expr(request_rec *r, const char *expr, int *was_error,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding const char *parse;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding return (0);
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm if (apr_create_pool(&expr_pool, r->pool) != APR_SUCCESS)
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Create Parse Tree */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding while (1) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding sizeof(struct parse_node));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding new->parent = new->left = new->right = (struct parse_node *) NULL;
18343797fadabacf01280b38ea7688690d12aec0rbb if ((parse = get_ptoken(r, parse, &new->token, was_unmatched)) == (char *) NULL) {
18343797fadabacf01280b38ea7688690d12aec0rbb debug_pos += sprintf (&debug[debug_pos], " Token: string (%s)\n",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding current->token.value[sizeof(current->token.value) - 1] = '\0';
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
18343797fadabacf01280b38ea7688690d12aec0rbb sizeof (" Token: and/or\n"));
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Percolate upwards */
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
18343797fadabacf01280b38ea7688690d12aec0rbb sizeof (" Token: not\n"));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Percolate upwards */
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
18343797fadabacf01280b38ea7688690d12aec0rbb memcpy (&debug[debug_pos], " Token: eq/ne/ge/gt/le/lt\n",
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Percolate upwards */
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
18343797fadabacf01280b38ea7688690d12aec0rbb sizeof (" Token: rbrace\n"));
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Unmatched ')' in \"%s\" in file %s",
18343797fadabacf01280b38ea7688690d12aec0rbb sizeof (" Token: lbrace\n"));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Percolate upwards */
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Evaluate Parse Tree */
18343797fadabacf01280b38ea7688690d12aec0rbb sizeof (" Evaluate string\n"));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding parse_string(r, current->token.value, buffer, sizeof(buffer), 0);
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_cpystrn(current->token.value, buffer, sizeof(current->token.value));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding current->value = (current->token.value[0] != '\0');
18343797fadabacf01280b38ea7688690d12aec0rbb sizeof (" Evaluate and/or\n"));
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding current->left->value = (current->left->token.value[0] != '\0');
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding current->right->value = (current->right->token.value[0] != '\0');
18343797fadabacf01280b38ea7688690d12aec0rbb debug_pos += sprintf (&debug[debug_pos], " Right: %c\n",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding current->value = current->left->value && current->right->value;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding current->value = current->left->value || current->right->value;
18343797fadabacf01280b38ea7688690d12aec0rbb debug_pos += sprintf (&debug[debug_pos], " Returning %c\n",
18343797fadabacf01280b38ea7688690d12aec0rbb sizeof (" Evaluate eq/ne\n"));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if ((current->left == (struct parse_node *) NULL) ||
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid rexp \"%s\" in file %s",
18343797fadabacf01280b38ea7688690d12aec0rbb " Re Compare (%s) with /%s/\n",
18343797fadabacf01280b38ea7688690d12aec0rbb " Compare (%s) with (%s)\n",
18343797fadabacf01280b38ea7688690d12aec0rbb debug_pos += sprintf (&debug[debug_pos], " Returning %c\n",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if ((current->left == (struct parse_node *) NULL) ||
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Invalid expression \"%s\" in file %s",
18343797fadabacf01280b38ea7688690d12aec0rbb " Compare (%s) with (%s)\n",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding current->value = 0; /* Don't return -1 if unknown token */
18343797fadabacf01280b38ea7688690d12aec0rbb debug_pos += sprintf (&debug[debug_pos], " Returning %c\n",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if (current->right != (struct parse_node *) NULL) {
18343797fadabacf01280b38ea7688690d12aec0rbb debug_pos += sprintf (&debug[debug_pos], " Evaluate !: %c\n",
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if (current->right != (struct parse_node *) NULL) {
18343797fadabacf01280b38ea7688690d12aec0rbb debug_pos += sprintf (&debug[debug_pos], " Evaluate (): %c\n",
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Unmatched '(' in \"%s\" in file %s",
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding "Unmatched ')' in \"%s\" in file %s",
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "bad token type");
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding retval = (root == (struct parse_node *) NULL) ? 0 : root->value;
18343797fadabacf01280b38ea7688690d12aec0rbb/*-------------------------------------------------------------------------*/
23801cf373ddaff5a5ba7692d2637d75bdffdc4btrawick/* XXX overlaying the static string pointed to by cond_txt isn't cool */
18343797fadabacf01280b38ea7688690d12aec0rbb#define LOG_COND_STATUS(cntx, t_buck, h_ptr, ins_head, tag_text) \
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe t_buck = apr_bucket_create_heap(cond_txt, sizeof(cond_txt), 1, &c_wrt); \
18343797fadabacf01280b38ea7688690d12aec0rbb#define DUMP_PARSE_EXPR_DEBUG(t_buck, h_ptr, d_buf, ins_head) \
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe t_buck = apr_bucket_create_heap(d_buf, strlen(d_buf), 1, &b_wrt); \
18343797fadabacf01280b38ea7688690d12aec0rbb#define LOG_COND_STATUS(cntx, t_buck, h_ptr, ins_head, tag_text)
18343797fadabacf01280b38ea7688690d12aec0rbb#define DUMP_PARSE_EXPR_DEBUG(t_buck, h_ptr, d_buf, ins_head)
18343797fadabacf01280b38ea7688690d12aec0rbb/*-------------------------------------------------------------------------*/
18343797fadabacf01280b38ea7688690d12aec0rbb/* pjr - These seem to allow expr="fred" expr="joe" where joe overwrites fred. */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_if(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb expr_ret = parse_expr(r, expr, &was_error, &was_unmatched, debug_buf);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb DUMP_PARSE_EXPR_DEBUG(tmp_buck, head_ptr, "\nUnmatched '\n",
18343797fadabacf01280b38ea7688690d12aec0rbb DUMP_PARSE_EXPR_DEBUG(tmp_buck, head_ptr, debug_buf, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb LOG_COND_STATUS(ctx, tmp_buck, head_ptr, *inserted_head, " if");
18343797fadabacf01280b38ea7688690d12aec0rbb d_len = sprintf(debug_buf, "**** if expr=\"%s\"\n", expr);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_heap(debug_buf, d_len, 1, &d_wrt);
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "unknown parameter \"%s\" to tag if in %s", tag, r->filename);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_elif(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb LOG_COND_STATUS(ctx, tmp_buck, head_ptr, *inserted_head, " elif");
18343797fadabacf01280b38ea7688690d12aec0rbb return (0);
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb return (1);
18343797fadabacf01280b38ea7688690d12aec0rbb expr_ret = parse_expr(r, expr, &was_error, &was_unmatched, debug_buf);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb DUMP_PARSE_EXPR_DEBUG(tmp_buck, head_ptr, "\nUnmatched '\n",
18343797fadabacf01280b38ea7688690d12aec0rbb DUMP_PARSE_EXPR_DEBUG(tmp_buck, head_ptr, debug_buf, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb LOG_COND_STATUS(ctx, tmp_buck, head_ptr, *inserted_head, " elif");
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding return (0);
18343797fadabacf01280b38ea7688690d12aec0rbb d_len = sprintf(debug_buf, "**** elif expr=\"%s\"\n", expr);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_heap(debug_buf, d_len, 1, &d_wrt);
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "unknown parameter \"%s\" to tag if in %s", tag, r->filename);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_else(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "else directive does not take tags in %s", r->filename);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb return -1;
18343797fadabacf01280b38ea7688690d12aec0rbb LOG_COND_STATUS(ctx, tmp_buck, head_ptr, *inserted_head, " else");
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_endif(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "endif directive does not take tags in %s", r->filename);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb return -1;
18343797fadabacf01280b38ea7688690d12aec0rbb LOG_COND_STATUS(ctx, tmp_buck, head_ptr, *inserted_head, "endif");
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_set(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb while (1) {
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "variable must precede value in set directive in %s",
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb return (-1);
18343797fadabacf01280b38ea7688690d12aec0rbb parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 0);
18343797fadabacf01280b38ea7688690d12aec0rbb apr_table_setn(r->subprocess_env, apr_pstrdup(r->pool, var),
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int handle_printenv(include_ctx_t *ctx, apr_bucket_brigade **bb, request_rec *r,
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_filter_t *f, apr_bucket *head_ptr, apr_bucket **inserted_head)
18343797fadabacf01280b38ea7688690d12aec0rbb apr_array_header_t *arr = apr_table_elts(r->subprocess_env);
18343797fadabacf01280b38ea7688690d12aec0rbb apr_table_entry_t *elts = (apr_table_entry_t *)arr->elts;
18343797fadabacf01280b38ea7688690d12aec0rbb /* Key_text */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_heap(key_text, k_len, 1, &t_wrt);
18343797fadabacf01280b38ea7688690d12aec0rbb /* Value_text */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_buck = apr_bucket_create_heap(val_text, v_len, 1, &t_wrt);
18343797fadabacf01280b38ea7688690d12aec0rbb /* newline... */
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "printenv directive does not take tags in %s", r->filename);
18343797fadabacf01280b38ea7688690d12aec0rbb CREATE_ERROR_BUCKET(ctx, tmp_buck, head_ptr, *inserted_head);
18343797fadabacf01280b38ea7688690d12aec0rbb return -1;
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/* -------------------------- The main function --------------------------- */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic void send_parsed_content(apr_bucket_brigade **bb, request_rec *r,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if (r->args) { /* add QUERY stuff to env cause it ain't yet */
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_table_setn(r->subprocess_env, "QUERY_STRING", r->args);
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm apr_table_setn(r->subprocess_env, "QUERY_STRING_UNESCAPED",
18343797fadabacf01280b38ea7688690d12aec0rbb /* State to check for the STARTING_SEQUENCE. */
18343797fadabacf01280b38ea7688690d12aec0rbb if ((ctx->state == PRE_HEAD) || (ctx->state == PARSE_HEAD)) {
18343797fadabacf01280b38ea7688690d12aec0rbb tmp_dptr = find_start_sequence(dptr, ctx, *bb, &do_cleanup);
18343797fadabacf01280b38ea7688690d12aec0rbb /* The few bytes stored in the ssi_tag_brigade turned out not to
18343797fadabacf01280b38ea7688690d12aec0rbb * be a tag after all. This can only happen if the starting
18343797fadabacf01280b38ea7688690d12aec0rbb * tag actually spans brigades. This should be very rare.
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe if ((do_cleanup) && (!APR_BRIGADE_EMPTY(ctx->ssi_tag_brigade))) {
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tmp_bkt = apr_bucket_create_immortal(STARTING_SEQUENCE, cleanup_bytes);
18343797fadabacf01280b38ea7688690d12aec0rbb /* If I am inside a conditional (if, elif, else) that is false
18343797fadabacf01280b38ea7688690d12aec0rbb * then I need to throw away anything contained in it.
18343797fadabacf01280b38ea7688690d12aec0rbb if ((!(ctx->flags & FLAG_PRINTING)) && (tmp_dptr != NULL) &&
18343797fadabacf01280b38ea7688690d12aec0rbb /* Adjust the current bucket position based on what was found... */
f6e9f5600e77b78fb013bb543d364135961639d1rbb if ((tmp_dptr != NULL) && (ctx->state == PARSE_DIRECTIVE)) {
18343797fadabacf01280b38ea7688690d12aec0rbb else if (tmp_dptr == NULL) { /* There was no possible SSI tag in the */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe dptr = APR_BRIGADE_SENTINEL(*bb); /* remainder of this brigade... */
18343797fadabacf01280b38ea7688690d12aec0rbb /* State to check for the ENDING_SEQUENCE. */
18343797fadabacf01280b38ea7688690d12aec0rbb /* If some of the tag has already been set aside then set
18343797fadabacf01280b38ea7688690d12aec0rbb * aside remainder of tag. Now the full tag is in ssi_tag_brigade.
18343797fadabacf01280b38ea7688690d12aec0rbb * If none has yet been set aside, then leave it all where it is.
18343797fadabacf01280b38ea7688690d12aec0rbb * In any event after this the entire set of tag buckets will be
18343797fadabacf01280b38ea7688690d12aec0rbb * in one place or another.
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe dptr = APR_BRIGADE_SENTINEL(*bb); /* remainder of this brigade... */
18343797fadabacf01280b38ea7688690d12aec0rbb /* State to processed the directive... */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe int (*handle_func)(include_ctx_t *, apr_bucket_brigade **, request_rec *,
18343797fadabacf01280b38ea7688690d12aec0rbb /* By now the full tag (all buckets) should either be set aside into
18343797fadabacf01280b38ea7688690d12aec0rbb * ssi_tag_brigade or contained within the current bb. All tag
18343797fadabacf01280b38ea7688690d12aec0rbb * processing from here on can assume that.
18343797fadabacf01280b38ea7688690d12aec0rbb /* At this point, everything between ctx->head_start_bucket and
18343797fadabacf01280b38ea7688690d12aec0rbb * ctx->tail_start_bucket is an SSI
18343797fadabacf01280b38ea7688690d12aec0rbb * directive, we just have to deal with it now.
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "mod_include: error copying directive in %s",
18343797fadabacf01280b38ea7688690d12aec0rbb /* DO CLEANUP HERE!!!!! */
18343797fadabacf01280b38ea7688690d12aec0rbb /* Even if I don't generate any content, I know at this point that
18343797fadabacf01280b38ea7688690d12aec0rbb * I will at least remove the discovered SSI tag, thereby making
18343797fadabacf01280b38ea7688690d12aec0rbb * the content shorter than it was. This is the safest point I can
18343797fadabacf01280b38ea7688690d12aec0rbb * find to unset this field.
18343797fadabacf01280b38ea7688690d12aec0rbb /* Can't destroy the tag buckets until I'm done processing
18343797fadabacf01280b38ea7688690d12aec0rbb * because the combined_tag might just be pointing to
18343797fadabacf01280b38ea7688690d12aec0rbb * the contents of a single bucket!
f6e9f5600e77b78fb013bb543d364135961639d1rbb /* Retrieve the handler function to be called for this directive from the
f6e9f5600e77b78fb013bb543d364135961639d1rbb * functions registered in the hash table.
f6e9f5600e77b78fb013bb543d364135961639d1rbb * Need to lower case the directive for proper matching. Also need to have
f6e9f5600e77b78fb013bb543d364135961639d1rbb * it NULL terminated (and include the NULL in the length) for proper
f6e9f5600e77b78fb013bb543d364135961639d1rbb * hash matching.
f6e9f5600e77b78fb013bb543d364135961639d1rbb for (tmp_i = 0; tmp_i < ctx->directive_length; tmp_i++) {
f6e9f5600e77b78fb013bb543d364135961639d1rbb ctx->combined_tag[tmp_i] = apr_tolower(ctx->combined_tag[tmp_i]);
f6e9f5600e77b78fb013bb543d364135961639d1rbb ctx->curr_tag_pos = &ctx->combined_tag[ctx->directive_length+1];
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe (int (*)(include_ctx_t *, apr_bucket_brigade **, request_rec *,
b34e9b99cf7293b8b50c5b08313f9bc894af9c16trawick apr_hash_get(include_hash, ctx->combined_tag, ctx->directive_length+1);
f6e9f5600e77b78fb013bb543d364135961639d1rbb ret = (*handle_func)(ctx, bb, r, f, dptr, &content_head);
b79b743d4cff02d6a830bb7118826a2fd608742amartin ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "unknown directive \"%s\" in parsed doc %s",
18343797fadabacf01280b38ea7688690d12aec0rbb /* This chunk of code starts at the first bucket in the chain
18343797fadabacf01280b38ea7688690d12aec0rbb * of tag buckets (assuming that by this point the bucket for
18343797fadabacf01280b38ea7688690d12aec0rbb * the STARTING_SEQUENCE has been split) and loops through to
18343797fadabacf01280b38ea7688690d12aec0rbb * the end of the tag buckets freeing them all.
18343797fadabacf01280b38ea7688690d12aec0rbb * Remember that some part of this may have been set aside
18343797fadabacf01280b38ea7688690d12aec0rbb * into the ssi_tag_brigade and the remainder (possibly as
18343797fadabacf01280b38ea7688690d12aec0rbb * little as one byte) will be in the current brigade.
18343797fadabacf01280b38ea7688690d12aec0rbb * The value of dptr should have been set during the
18343797fadabacf01280b38ea7688690d12aec0rbb * PARSE_TAIL state to the first bucket after the
18343797fadabacf01280b38ea7688690d12aec0rbb * ENDING_SEQUENCE.
18343797fadabacf01280b38ea7688690d12aec0rbb * The value of content_head may have been set during processing
18343797fadabacf01280b38ea7688690d12aec0rbb * of the directive. If so, the content was inserted in front
18343797fadabacf01280b38ea7688690d12aec0rbb * of the dptr bucket. The inserted buckets should not be thrown
18343797fadabacf01280b38ea7688690d12aec0rbb * away here, but they should also not be parsed later.
18343797fadabacf01280b38ea7688690d12aec0rbb /* Don't reset the flags or the nesting level!!! */
18343797fadabacf01280b38ea7688690d12aec0rbb /* If I am in the middle of parsing an SSI tag then I need to set aside
18343797fadabacf01280b38ea7688690d12aec0rbb * the pertinent trailing buckets and pass on the initial part of the
18343797fadabacf01280b38ea7688690d12aec0rbb * brigade. The pertinent parts of the next brigades will be added to
18343797fadabacf01280b38ea7688690d12aec0rbb * these set aside buckets to form the whole tag and will be processed
18343797fadabacf01280b38ea7688690d12aec0rbb * once the whole tag has been found.
18343797fadabacf01280b38ea7688690d12aec0rbb /* Inside a false conditional (if, elif, else), so toss it all... */
18343797fadabacf01280b38ea7688690d12aec0rbb else { /* Otherwise pass it along... */
18343797fadabacf01280b38ea7688690d12aec0rbb ap_pass_brigade(f->next, *bb); /* No SSI tags in this brigade... */
18343797fadabacf01280b38ea7688690d12aec0rbb else if (ctx->state == PARSED) { /* Invalid internal condition... */
18343797fadabacf01280b38ea7688690d12aec0rbb ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r,
18343797fadabacf01280b38ea7688690d12aec0rbb "Invalid mod_include state during file %s", r->filename);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe CREATE_ERROR_BUCKET(ctx, tmp_bkt, APR_BRIGADE_FIRST(*bb), content_head);
18343797fadabacf01280b38ea7688690d12aec0rbb else { /* Entire brigade is middle chunk of SSI tag... */
18343797fadabacf01280b38ea7688690d12aec0rbb else { /* End of brigade contains part of SSI tag... */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe apr_bucket_split(ctx->head_start_bucket, ctx->head_start_index);
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ctx->head_start_bucket = APR_BUCKET_NEXT(ctx->head_start_bucket);
18343797fadabacf01280b38ea7688690d12aec0rbb /* Set aside tag, pass pre-tag... */
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe tag_and_after = apr_brigade_split(*bb, ctx->head_start_bucket);
18343797fadabacf01280b38ea7688690d12aec0rbb ap_save_brigade(f, &ctx->ssi_tag_brigade, &tag_and_after);
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding/*****************************************************************
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * XBITHACK. Sigh... NB it's configurable per-directory; the compile-time
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * option only changes the default.
1ccd992d37d62c8cb2056126f2234f64ec189bfddougmstatic void *create_includes_dir_config(apr_pool_t *p, char *dummy)
1ccd992d37d62c8cb2056126f2234f64ec189bfddougm enum xbithack *result = (enum xbithack *) apr_palloc(p, sizeof(enum xbithack));
ebe70c2684539a5fb2d899241d1601710dfa38a4trawickstatic const char *set_xbithack(cmd_parms *cmd, void *xbp, const char *arg)
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding return "XBitHack must be set to Off, On, or Full";
b980ad7fdc218b4855cde9f75a747527f50c554dwrowestatic int includes_filter(ap_filter_t *f, apr_bucket_brigade *b)
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding (enum xbithack *) ap_get_module_config(r->per_dir_config, &includes_module);
18343797fadabacf01280b38ea7688690d12aec0rbb if (!f->ctx) {
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ctx->ssi_tag_brigade = apr_brigade_create(f->c->pool);
18343797fadabacf01280b38ea7688690d12aec0rbb apr_cpystrn(ctx->error_str, DEFAULT_ERROR_MSG, sizeof(ctx->error_str));
18343797fadabacf01280b38ea7688690d12aec0rbb apr_cpystrn(ctx->time_str, DEFAULT_TIME_FORMAT, sizeof(ctx->time_str));
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* OS/2 dosen't support Groups. */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding if ((parent = ap_get_module_config(r->request_config, &includes_module))) {
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* Kludge --- for nested includes, we want to keep the subprocess
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * environment of the base document (for compatibility); that means
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * torquing our own last_modified date as well so that the
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * LAST_MODIFIED variable gets reset to the proper value if the
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * nested document resets <!--#config timefmt-->.
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * We also insist that the memory for this subrequest not be
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * destroyed, that's dealt with in handle_include().
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* we're not a nested include, so we create an initial
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * environment */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* XXX: this is bogus, at some point we're going to do a subrequest,
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * and when we do it we're going to be subjecting code that doesn't
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * expect to be signal-ready to SIGALRM. There is no clean way to
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding * fix this, except to put alarm support into BUFF. -djg
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding /* signify that the sub request should not be killed */
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding ap_set_module_config(r->request_config, &includes_module,
f6e9f5600e77b78fb013bb543d364135961639d1rbbvoid ap_register_include_handler(char *tag, handler func)
b34e9b99cf7293b8b50c5b08313f9bc894af9c16trawick apr_hash_set(include_hash, tag, strlen(tag) + 1, (const void *)func);
f6e9f5600e77b78fb013bb543d364135961639d1rbbstatic void include_post_config(apr_pool_t *p, apr_pool_t *plog,
f6e9f5600e77b78fb013bb543d364135961639d1rbb ap_register_include_handler("flastmod", handle_flastmod);
f6e9f5600e77b78fb013bb543d364135961639d1rbb ap_register_include_handler("printenv", handle_printenv);
f6e9f5600e77b78fb013bb543d364135961639d1rbb * Module definition and configuration data structs...
ebe70c2684539a5fb2d899241d1601710dfa38a4trawick AP_INIT_TAKE1("XBitHack", set_xbithack, NULL, OR_OPTIONS,
ebe70c2684539a5fb2d899241d1601710dfa38a4trawick "Off, On, or Full"),
b980ad7fdc218b4855cde9f75a747527f50c554dwrowe ap_hook_post_config(include_post_config, NULL, NULL, APR_HOOK_REALLY_FIRST);
1296b2d30150ccb4ae9f6d690846b4e8f8571fd2rbb ap_register_output_filter("INCLUDES", includes_filter, AP_FTYPE_CONTENT);
0f081398cf0eef8cc7c66a535d450110a92dc8aefielding create_includes_dir_config, /* dir config creater */