http_core.c revision 70a2c0407879c11b29adc782d1665a0131f30b3f
/* ====================================================================
* Copyright (c) 1995-1999 The Apache Group. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the Apache Group
* for use in the Apache HTTP server project (http://www.apache.org/)."
*
* 4. The names "Apache Server" and "Apache Group" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* apache@apache.org.
*
* 5. Products derived from this software may not be called "Apache"
* nor may "Apache" appear in their names without prior written
* permission of the Apache Group.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the Apache Group
* for use in the Apache HTTP server project (http://www.apache.org/)."
*
* THIS SOFTWARE IS PROVIDED BY THE APACHE GROUP ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE GROUP OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This software consists of voluntary contributions made by many
* individuals on behalf of the Apache Group and was originally based
* on public domain software written at the National Center for
* Supercomputing Applications, University of Illinois, Urbana-Champaign.
* For more information on the Apache Group and the Apache HTTP server
* project, please see <http://www.apache.org/>.
*
*/
#define CORE_PRIVATE
#include "apr_lib.h"
#include "httpd.h"
#include "http_config.h"
#include "http_core.h"
#include "http_protocol.h" /* For index_of_response(). Grump. */
#include "http_request.h"
#include "http_vhost.h"
#include "http_main.h" /* For the default_handler below... */
#include "http_log.h"
#include "rfc1413.h"
#include "util_md5.h"
#include "fnmatch.h"
#include "http_connection.h"
#ifdef USE_MMAP_FILES
/* mmap support for static files based on ideas from John Heidemann's
* patch against 1.0.5. See
*/
/* Files have to be at least this big before they're mmap()d. This is to deal
* with systems where the expense of doing an mmap() and an munmap() outweighs
* the benefit for small files. It shouldn't be set lower than 1.
*/
#ifndef MMAP_THRESHOLD
#ifdef SUNOS4
#else
#define MMAP_THRESHOLD 1
#endif
#endif
#endif
#ifndef MMAP_LIMIT
#endif
/* Server core module... This module provides support for really basic
* server operations, including options and commands which control the
* operation of other modules. Consider this the bureaucracy module.
*
* The core module also defines handlers, etc., do handle just enough
* to allow a server with the core module ONLY to actually serve documents
* (though it slaps DefaultType on all of 'em); this was useful in testing,
* but may not be worth preserving.
*
* This file could almost be mod_core.c, except for the stuff which affects
* the http_conf_globals.
*/
{
}
}
else {
}
conf->limit_req_body = 0;
#ifdef WIN32
#endif
return (void *)conf;
}
{
int i;
if (base->response_code_strings) {
* RESPONSE_CODES);
}
/* there was no explicit setting of new->opts, so we merge
* preserve the invariant (opts_add & opts_remove) == 0
*/
| new->opts_remove;
}
}
else {
/* otherwise we just copy, because an explicit opts setting
* overrides all earlier +/- modifiers
*/
}
}
if (new->ap_default_type) {
}
if (new->ap_auth_type) {
}
if (new->ap_auth_name) {
}
if (new->ap_requires) {
}
if (new->response_code_strings) {
}
else {
for (i = 0; i < RESPONSE_CODES; ++i) {
= new->response_code_strings[i];
}
}
}
}
}
}
}
}
if (new->limit_req_body) {
}
}
#ifdef WIN32
}
#endif
}
return (void*)conf;
}
{
int is_virtual = s->is_virtual;
#ifdef GPROF
#endif
return (void *)conf;
}
{
if (!conf->access_name) {
}
if (!conf->ap_document_root) {
}
return conf;
}
/* Add per-directory configuration entry (for <directory> section);
* these are part of the core server config.
*/
{
&core_module);
*new_space = dir_config;
}
{
&core_module);
*new_space = url_config;
}
{
*new_space = url_config;
}
/* core_reorder_directories reorders the directory sections such that the
* 1-component sections come first, then the 2-component, and so on, finally
* followed by the "special" sections. A section is "special" if it's a regex,
* or if it doesn't start with / -- consider proxy: matching. All movements
* are in-order to preserve the ordering of the sections from the config files.
* See directory_walk().
*/
#ifdef HAVE_DRIVE_LETTERS
#define IS_SPECIAL(entry_core) \
((entry_core)->r != NULL \
#else
#define IS_SPECIAL(entry_core) \
#endif
/* We need to do a stable sort, qsort isn't stable. So to make it stable
* we'll be maintaining the original index into the list, and using it
* as the minor key during sorting. The major key is the number of
* components (where a "special" section has infinite components).
*/
struct reorder_sort_rec {
void *elt;
int orig_index;
};
{
const struct reorder_sort_rec *a = va;
const struct reorder_sort_rec *b = vb;
if (IS_SPECIAL(core_a)) {
if (!IS_SPECIAL(core_b)) {
return 1;
}
}
else if (IS_SPECIAL(core_b)) {
return -1;
}
else {
/* we know they're both not special */
return -1;
}
return 1;
}
}
/* Either they're both special, or they're both not special and have the
* same number of components. In any event, we now have to compare
* the minor key. */
return a->orig_index - b->orig_index;
}
{
struct reorder_sort_rec *sortbin;
int nelts;
void **elts;
int i;
/* we have to allocate tmp space to do a stable sort */
ap_create_context(&tmp, p);
for (i = 0; i < nelts; ++i) {
sortbin[i].orig_index = i;
}
/* and now copy back to the original array */
for (i = 0; i < nelts; ++i) {
}
}
/*****************************************************************
*
* There are some elements of the core config structures in which
* other modules have a legitimate interest (this is ugly, but necessary
* to preserve NCSA back-compatibility). So, we have a bunch of accessors
* here...
*/
{
}
{
&core_module);
}
{
&core_module);
return conf->ap_auth_type;
}
{
&core_module);
return conf->ap_auth_name;
}
{
&core_module);
return conf->ap_default_type
}
{
&core_module);
return conf->ap_document_root;
}
{
&core_module);
return conf->ap_requires;
}
{
&core_module);
}
/* Should probably just get rid of this... the only code that cares is
* part of the core anyway (and in fact, it isn't publicised to other
* modules).
*/
{
&core_module);
return NULL;
}
}
/* Code from Harald Hanche-Olsen <hanche@imf.unit.no> */
/* ZZZ let's pass the buffer and the host entry so we don't have to allocate
another stack frame. */
{
if (conn->double_reverse) {
/* already done */
return;
}
/* single reverse failed, so don't bother */
return;
}
if (hptr) { /*ZZZ enumerate through host entries */
char **haddr;
return;
}
}
}
}
int type)
{
int hostname_lookups;
/* If we haven't checked the host name, and we want to */
if (dir_config) {
if (hostname_lookups == HOSTNAME_LOOKUP_UNSET) {
}
}
else {
/* the default */
}
if (type != REMOTE_NOLOOKUP
&& (type == REMOTE_DOUBLE_REV
|| hostname_lookups != HOSTNAME_LOOKUP_OFF)) {
/* ZZZ change to AP functions. */
if (hostname_lookups == HOSTNAME_LOOKUP_DOUBLE) {
}
}
}
/* if failed, set it to the NULL string to indicate error */
}
}
if (type == REMOTE_DOUBLE_REV) {
return NULL;
}
}
/*
* Return the desired information; either the remote DNS name, if found,
* or either NULL (if the hostname was requested) or the IP address
* (if any identifier was requested).
*/
return conn->remote_host;
}
else {
return NULL;
}
else {
}
}
}
{
return r->connection->remote_logname;
}
/* If we haven't checked the identity, and we want to */
&core_module);
}
else {
return NULL;
}
}
/* There are two options regarding what the "name" of a server is. The
* "canonical" name as defined by ServerName and Port, or the "client's
* name" as supplied by a possible Host: header or full URI. We never
* trust the port passed in the client's headers, we always use the
* port of the actual socket.
*
* The DNS option to UseCanonicalName causes this routine to do a
* reverse lookup on the local IP address of the connectiona and use
* that for the ServerName. This makes its value more reliable while
* at the same time allowing Demon's magic virtual hosting to work.
* The assumption is that DNS lookups are sufficiently quick...
* -- fanf 1998-10-03
*/
{
core_dir_config *d;
&core_module);
if (d->use_canonical_name == USE_CANONICAL_NAME_OFF) {
}
if (d->use_canonical_name == USE_CANONICAL_NAME_DNS) {
AF_INET);
}
else {
r->server->server_hostname);
}
}
return conn->local_host;
}
/* default */
return r->server->server_hostname;
}
{
unsigned port;
core_dir_config *d =
if (d->use_canonical_name == USE_CANONICAL_NAME_OFF
|| d->use_canonical_name == USE_CANONICAL_NAME_DNS) {
: port;
}
/* default */
return port;
}
request_rec *r)
{
unsigned port = ap_get_server_port(r);
const char *host = ap_get_server_name(r);
if (ap_is_default_port(port, r)) {
}
}
{
core_dir_config *d =
return d->limit_req_body;
}
#ifdef WIN32
{
char extension_path[] = "SOFTWARE\\Classes\\";
char executable_path[] = "\\SHELL\\OPEN\\COMMAND";
int size;
int result;
char *keyName;
char *buffer;
char *s;
if (!ext)
return NULL;
/*
* Future optimization:
* When the registry is successfully searched, store the interpreter
* string in a ap_table_t to make subsequent look-ups faster
*/
/* Open the key associated with the script extension */
&hkeyOpen);
if (result != ERROR_SUCCESS)
return NULL;
/* Read to NULL buffer to find value size */
size = 0;
if (result == ERROR_SUCCESS) {
}
if (result != ERROR_SUCCESS)
return NULL;
/* Open the key associated with the interpreter path */
&hkeyOpen);
if (result != ERROR_SUCCESS)
return NULL;
/* Read to NULL buffer to find value size */
size = 0;
if (result == ERROR_SUCCESS) {
}
if (result != ERROR_SUCCESS)
return NULL;
/*
* The canonical way shell command entries are entered in the Win32
* registry is as follows:
* shell [options] "%1"
* where
* shell - full path name to interpreter or shell to run.
* E.g., c:\usr\local\ntreskit\perl\bin\perl.exe
* options - optional switches
* E.g., \C
* "%1" - Place holder for file to run the shell against.
* Typically quoted.
*
* If we find a %1 or a quoted %1, lop it off.
*/
*s = '\0';
*s = '\0';
}
return buffer;
}
char** interpreter )
{
char buffer[1024];
core_dir_config *d;
int i;
&core_module);
/* Find the file extension */
if (!exename) {
}
if (!exename) {
}
else {
exename++;
}
return eFileTypeEXE32;
}
/* If the file has an extension and it is not .com and not .exe and
* we've been instructed to search the registry, then do it!
*/
/* Check the registry */
if (*interpreter)
return eFileTypeSCRIPT;
else {
"ScriptInterpreterSource config directive set to \"registry\".\n\t"
"Registry was searched but interpreter not found. Trying the shebang line.");
}
}
/* Need to peek into the file figure out what it really is... */
if (hFile == INVALID_HANDLE_VALUE) {
return eFileTypeUNKNOWN;
}
&nBytesRead, NULL);
if (!bResult || (nBytesRead == 0)) {
"ReadFile(%s) failed", r->filename);
return eFileTypeUNKNOWN;
}
/* Script or executable, that is the question... */
/* Assuming file is a script since it starts with a shebang */
for (i = 2; i < sizeof(buffer); i++) {
if ((buffer[i] == '\r')
|| (buffer[i] == '\n')) {
break;
}
}
buffer[i] = '\0';
;
}
else {
/* Not a script, is it an executable? */
else
}
else
}
return fileType;
}
#endif
/*****************************************************************
*
* Commands... this module handles almost all of the NCSA httpd.conf
* commands, but most of the old srm.conf is in the the modules.
*/
static const char end_directory_section[] = "</Directory>";
static const char end_directorymatch_section[] = "</DirectoryMatch>";
static const char end_location_section[] = "</Location>";
static const char end_locationmatch_section[] = "</LocationMatch>";
static const char end_files_section[] = "</Files>";
static const char end_filesmatch_section[] = "</FilesMatch>";
static const char end_virtualhost_section[] = "</VirtualHost>";
static const char end_ifmodule_section[] = "</IfModule>";
static const char end_ifdefine_section[] = "</IfDefine>";
unsigned forbidden)
{
? ">" : "";
" cannot occur within <VirtualHost> section", NULL);
}
" cannot occur within <Limit> section", NULL);
}
"section", NULL);
}
if (((forbidden & NOT_IN_DIRECTORY)
|| ((forbidden & NOT_IN_LOCATION)
|| ((forbidden & NOT_IN_FILES)
" section", NULL);
}
return NULL;
}
{
return err;
}
return NULL;
}
#ifdef GPROF
{
return err;
}
return NULL;
}
#endif /*GPROF*/
{
return err;
}
arg);
}
else {
return "DocumentRoot must be a directory";
}
}
return NULL;
}
{
int idx;
ap_pcalloc(r->pool,
sizeof(*conf->response_code_strings) *
}
}
char *line)
{
char *w;
return err;
}
/* 1st parameter should be a 3 digit number, which we recognize;
* convert it into an array index
*/
error_number = atoi(w);
if (error_number == HTTP_INTERNAL_SERVER_ERROR) {
}
w, NULL);
}
/* The entry should be ignored if it is a full URL for a 401 error */
if (error_number == 401 &&
"cannot use a full URL in a 401 ErrorDocument "
"directive --- ignoring!");
}
else { /* Store it... */
}
}
return NULL;
}
/* access.conf commands...
*
* The *only* thing that can appear in access.conf at top level is a
* <Directory> section. NB we need to have a way to cut the srm_command_loop
* invoked by dirsection (i.e., <Directory>) short when </Directory> is seen.
* We do that by returning an error, which dirsection itself recognizes and
* discards as harmless. Cheesy, but it works.
*/
const char *l)
{
char *w;
return err;
}
while (l[0]) {
if (!strcasecmp(w, "Limit")) {
}
else if (!strcasecmp(w, "Options")) {
d->override |= OR_OPTIONS;
}
else if (!strcasecmp(w, "FileInfo")) {
d->override |= OR_FILEINFO;
}
else if (!strcasecmp(w, "AuthConfig")) {
d->override |= OR_AUTHCFG;
}
else if (!strcasecmp(w, "Indexes")) {
d->override |= OR_INDEXES;
}
else if (!strcasecmp(w, "None")) {
}
else if (!strcasecmp(w, "All")) {
}
else {
}
}
return NULL;
}
const char *l)
{
int first = 1;
char action;
while (l[0]) {
action = '\0';
if (*w == '+' || *w == '-') {
action = *(w++);
}
else if (first) {
first = 0;
}
if (!strcasecmp(w, "Indexes")) {
opt = OPT_INDEXES;
}
else if (!strcasecmp(w, "Includes")) {
opt = OPT_INCLUDES;
}
else if (!strcasecmp(w, "IncludesNOEXEC")) {
}
else if (!strcasecmp(w, "FollowSymLinks")) {
opt = OPT_SYM_LINKS;
}
else if (!strcasecmp(w, "SymLinksIfOwnerMatch")) {
opt = OPT_SYM_OWNER;
}
else if (!strcasecmp(w, "execCGI")) {
opt = OPT_EXECCGI;
}
else if (!strcasecmp(w, "MultiViews")) {
}
}
else if (!strcasecmp(w, "None")) {
}
else if (!strcasecmp(w, "All")) {
}
else {
}
/* we ensure the invariant (d->opts_add & d->opts_remove) == 0 */
if (action == '-') {
d->opts_remove |= opt;
}
else if (action == '+') {
d->opts_remove &= ~opt;
}
else {
}
}
return NULL;
}
{
c->satisfy = SATISFY_ALL;
}
c->satisfy = SATISFY_ANY;
}
else {
return "Satisfy either 'any' or 'all'.";
}
return NULL;
}
{
require_line *r;
if (!c->ap_requires) {
}
return NULL;
}
const char *arg)
{
int limited = 0;
return err;
}
/* XXX: NB: Currently, we have no way of checking
* whether <Limit> or <LimitExcept> sections are closed properly.
* (If we would add a srm_command_loop() here we might...)
*/
while (limited_methods[0]) {
return "TRACE cannot be controlled by <Limit>";
}
}
else {
}
}
/* Killing two features with one function,
* if (tog == NULL) <Limit>, else <LimitExcept>
*/
return NULL;
}
{
}
return NULL;
}
/*
* When a section is not closed properly when end-of-file is reached,
* then an error message should be printed:
*/
{
if (nest < 2) {
}
}
/* We use this in <DirectoryMatch> and <FilesMatch>, to ensure that
* people don't get bitten by wrong-cased regex matches
*/
#ifdef WIN32
#else
#define USE_ICASE 0
#endif
{
" section", NULL);
}
/*
* This '!=' may look weird on a string comparison, but it's correct --
* it's been set up so that checking for two pointers to the same datum
* is valid here. And faster.
*/
}
}
/*
* Report a missing-'>' syntax error.
*/
{
"> directive missing closing '>'", NULL);
}
{
const char *errmsg;
const char *old_end_token;
return err;
}
return unclosed_directive(cmd);
}
*endp = '\0';
}
}
else {
/* Ensure that the pathname is canonical */
}
}
: end_directory_section)) {
return errmsg;
}
conf->r = r;
if (*arg != '\0') {
"> arguments not (yet) supported.", NULL);
}
return NULL;
}
{
const char *errmsg;
const char *old_end_token;
return err;
}
return unclosed_directive(cmd);
}
*endp = '\0';
}
}
}
: end_location_section)) {
return errmsg;
}
conf->r = r;
if (*arg != '\0') {
"> arguments not (yet) supported.", NULL);
}
return NULL;
}
const char *arg)
{
const char *errmsg;
const char *old_end_token;
return err;
}
return unclosed_directive(cmd);
}
*endp = '\0';
/* Only if not an .htaccess file */
if (!old_path) {
}
}
}
else {
/* Ensure that the pathname is canonical */
}
}
: end_files_section)) {
return errmsg;
}
&core_module);
conf->r = r;
if (*arg != '\0') {
"> arguments not (yet) supported.", NULL);
}
return NULL;
}
/* XXX: NB: Currently, we have no way of checking
* whether <IfModule> sections are closed properly.
* Extra (redundant, unpaired) </IfModule> directives are
* simply silently ignored.
*/
{
return NULL;
}
{
char l[MAX_STRING_LEN];
int nest = 1;
return unclosed_directive(cmd);
}
*endp = '\0';
if (not) {
arg++;
}
return NULL;
}
nest++;
}
if (!strcasecmp(l, "</IfModule>")) {
nest--;
}
}
if (nest) {
}
return NULL;
}
{
char **defines;
int i;
for (i = 0; i < ap_server_config_defines->nelts; i++) {
return 1;
}
}
return 0;
}
{
return NULL;
}
{
char *endp;
char l[MAX_STRING_LEN];
int defined;
int not = 0;
int nest = 1;
return unclosed_directive(cmd);
}
*endp = '\0';
if (arg[0] == '!') {
not = 1;
arg++;
}
defined = ap_exists_config_define(arg);
return NULL;
}
nest++;
}
if (!strcasecmp(l, "</IfDefine>")) {
nest--;
}
}
if (nest) {
}
return NULL;
}
/* httpd.conf commands... beginning with the <VirtualHost> business */
{
const char *errmsg;
const char *old_end_token;
return err;
}
return unclosed_directive(cmd);
}
*endp = '\0';
/* FIXME: There's another feature waiting to happen here -- since you
you might want to use it to group common definitions and then
define other "subhosts" with their individual differences. But
personally I'd rather just do it with a macro preprocessor. -djg */
if (main_server->is_virtual) {
return "<VirtualHost> doesn't nest!";
}
if (errmsg) {
return errmsg;
}
main_server->next = s;
}
if (s->srm_confname) {
}
if (s->access_confname) {
}
if (errmsg == end_virtualhost_section) {
return NULL;
}
return errmsg;
}
const char *arg)
{
return "ServerAlias only used in <VirtualHost>";
}
while (*arg) {
if (ap_is_matchexp(name)) {
}
else {
}
}
return NULL;
}
{
return err;
}
if (!ap_add_named_module(arg)) {
"': not in list of loaded modules", NULL);
}
return NULL;
}
{
return err;
}
return NULL;
}
char *arg)
{
/* This one's pretty generic... */
return err;
}
return NULL;
}
{
int port;
return err;
}
"\" is outside the appropriate range "
"(i.e., 1..65535).", NULL);
}
return NULL;
}
char *arg)
{
return err;
}
d->server_signature = srv_sig_on;
}
d->server_signature = srv_sig_off;
}
}
else {
return "ServerSignature: use one of: off | on | email";
}
return NULL;
}
{
return err;
}
if (!ap_is_directory(arg)) {
return "ServerRoot must be a valid directory";
}
return NULL;
}
{
return err;
}
return NULL;
}
char *arg)
{
return err;
}
return NULL;
}
{
return err;
}
* so we accept anything but "Off" or "0" as "On"
*/
}
else {
}
return NULL;
}
{
return err;
}
return NULL;
}
{
return err;
}
d->do_rfc1413 = arg != 0;
return NULL;
}
char *arg)
{
return err;
}
}
}
}
else {
return "parameter must be 'on', 'off', or 'double'";
}
return NULL;
}
{
return err;
}
return NULL;
}
{
return err;
}
d->content_md5 = arg != 0;
return NULL;
}
char *arg)
{
return err;
}
}
}
}
else {
return "parameter must be 'on', 'off', or 'dns'";
}
return NULL;
}
{
return NULL;
}
{
char *str;
return err;
}
}
}
}
}
}
}
}
}
else {
return "LogLevel requires level keyword: one of "
}
}
else {
return "LogLevel requires level keyword";
}
return NULL;
}
{
char sport[20];
&core_module);
return "";
}
" Server at <A HREF=\"mailto:",
"</ADDRESS>\n", NULL);
}
"</ADDRESS>\n", NULL);
}
/*
* Load an authorisation realm into our location configuration, applying the
* usual rules that apply to realms.
*/
{
return NULL;
}
#ifdef _OSD_POSIX /* BS2000 Logon Passwd file */
{
return err;
}
}
#endif /*_OSD_POSIX*/
/*
* Handle a request to include the server's OS platform in the Server
* response header field (the ServerTokens directive). Unfortunately
* this requires a new global in order to communicate the setting back to
* http_main so it can insert the information in the right place in the
* string.
*/
{
return err;
}
/* TODO: re ap_context_t mplement the server token stuff. */
#if 0
}
}
else {
}
#endif
return NULL;
}
{
int lim;
return err;
}
if (lim < 0) {
"\" must be a non-negative integer", NULL);
}
if (lim > DEFAULT_LIMIT_REQUEST_LINE) {
"must not exceed the precompiled maximum of %d",
}
return NULL;
}
char *arg)
{
int lim;
return err;
}
if (lim < 0) {
"\" must be a non-negative integer (0 = no limit)",
NULL);
}
if (lim > DEFAULT_LIMIT_REQUEST_FIELDSIZE) {
"must not exceed the precompiled maximum of %d",
}
return NULL;
}
{
int lim;
return err;
}
if (lim < 0) {
"\" must be a non-negative integer (0 = no limit)",
NULL);
}
return NULL;
}
char *arg)
{
return err;
}
/* WTF: If strtoul is not portable, then write a replacement.
* Instead we have an idiotic define in httpd.h that prevents
* it from being used even when it is available. Sheesh.
*/
return NULL;
}
#ifdef WIN32
char *arg)
{
} else {
}
return NULL;
}
#endif
/* Note --- ErrorDocument will now work from .htaccess files.
* The AllowOverride of Fileinfo allows webmasters to turn it off
*/
static const command_rec core_cmds[] = {
/* Old access config file commands */
"Container for directives affecting resources located in the specified "
"directories" },
"Marks end of <Directory>" },
"Container for directives affecting resources accessed through the "
"specified URL paths" },
"Marks end of <Location>" },
"Container to map directives to a particular virtual host, takes one or "
"more host addresses" },
"Marks end of <VirtualHost>" },
"affecting files matching specified patterns" },
"Marks end of <Files>" },
"authentication directives when accessed using specified HTTP methods" },
"Marks end of <Limit>" },
"Container for authentication directives to be applied when any HTTP "
"method other than those specified is used to access the resource" },
"Marks end of <LimitExcept>" },
"Container for directives based on existance of specified modules" },
"Marks end of <IfModule>" },
"Container for directives based on existance of command line defines" },
"Marks end of <IfDefine>" },
"Container for directives affecting resources located in the "
"specified directories" },
"Marks end of <DirectoryMatch>" },
"Container for directives affecting resources accessed through the "
"specified URL paths" },
"Marks end of <LocationMatch>" },
"Container for directives affecting files matching specified patterns" },
"Marks end of <FilesMatch>" },
{ "AuthType", ap_set_string_slot,
"An HTTP authorization type (e.g., \"Basic\")" },
"The authentication realm (e.g. \"Members Only\")" },
"Selects which authenticated users or groups may access a protected space" },
"access policy if both allow and require used ('all' or 'any')" },
#ifdef GPROF
"Directory to plop gmon.out files" },
#endif
/* Old resource config file commands */
"Name(s) of per-directory config files (default: .htaccess)" },
"Root directory of the document tree" },
"Change responses for HTTP errors" },
"Controls what groups of directives can be configured by per-directory "
"config files" },
"Set a number of attributes for a given directory" },
{ "DefaultType", ap_set_string_slot,
/* Old server config file commands */
"\"on\" to enable, \"off\" to disable reverse DNS lookups, or \"double\" to "
"enable double-reverse DNS lookups" },
{ "ServerAdmin", set_server_string_slot,
"The email address of the server administrator" },
{ "ServerName", set_server_string_slot,
"The hostname of the server" },
"Common directory of server-related files (logs, confs, etc.)" },
{ "ErrorLog", set_server_string_slot,
"The filename of the error log" },
{ "AccessConfig", set_server_string_slot,
"The filename of the access config file" },
{ "ResourceConfig", set_server_string_slot,
"The filename of the resource config file" },
"A name or names alternately used to access the server" },
"The pathname the server can be reached at" },
"Keep-Alive timeout duration (sec)"},
"Maximum number of Keep-Alive requests per connection, or 0 for infinite" },
"Whether persistent connections should be On or Off" },
"Enable identd (RFC 1413) user lookups - SLOW" },
FLAG, "whether or not to send a Content-MD5 header with each request" },
"How to work out the ServerName : Port when constructing URLs" },
/* TODOC: MaxServers is deprecated */
/* TODOC: ServersSafetyLimit is deprecated */
/* TODO: RlimitFoo should all be part of mod_cgi, not in the core */
/* TODOC: BindAddress deprecated */
"The name of a module" },
NULL },
/* TODO: ListenBacklog in MPM */
"Name of the config file to be included" },
"Level of verbosity in error logging" },
"A numeric IP address:port, or the name of a host" },
#ifdef _OSD_POSIX
"Name of server User's bs2000 logon account name" },
#endif
#ifdef WIN32
"Where to find interpreter to run Win32 scripts (Registry or script shebang line)" },
#endif
"Determine tokens displayed in the Server: header - Min(imal), OS or Full" },
"Limit on maximum size of an HTTP request line"},
"Limit on maximum size of an HTTP request header field"},
"Limit (0 = unlimited) on max number of header fields in a request message"},
{ "LimitRequestBody", set_limit_req_body,
"Limit (in bytes) on maximum size of request message body" },
{ NULL }
};
/*****************************************************************
*
* Core handlers for various phases of server operation...
*/
static int core_translate(request_rec *r)
{
if (r->proxyreq) {
return HTTP_FORBIDDEN;
}
"Invalid URI in request %s", r->the_request);
return BAD_REQUEST;
}
}
else {
/*
* Make sure that we do not mess up the translation by adding two
* /'s in a row. This happens under windows when the document
* root ends with a /
*/
&& (*(r->uri) == '/')) {
NULL);
}
else {
NULL);
}
}
return OK;
}
#ifdef USE_MMAP_FILES
struct mmap_rec {
void *mm;
};
{
"Failed to munmap memory of length %ld at 0x%lx",
}
return APR_SUCCESS;
}
#endif
/*
* Default handler for MIME types without other handlers. Only GET
* and OPTIONS at this point... anyone who wants to write a generic
* handler for PUT or POST is free to do so, but it seems unwise to provide
* any defaults yet... So, for now, we assume that this will always be
* the last handler called and return 405 or 501.
*/
static int default_handler(request_rec *r)
{
core_dir_config *d =
int rangestatus, errstatus;
int fd_os;
#ifdef USE_MMAP_FILES
#endif
#ifdef CHARSET_EBCDIC
int convert_flag;
#endif
/* This handler has no use for a request body (yet), but we still
* need to read and discard it if the client sent one.
*/
return errstatus;
}
if (r->method_number == M_INVALID) {
"Invalid method in request %s", r->the_request);
return NOT_IMPLEMENTED;
}
if (r->method_number == M_OPTIONS) {
return ap_send_http_options(r);
}
if (r->method_number == M_PUT) {
return METHOD_NOT_ALLOWED;
}
/* ZZZ can we store if the file exists or not? */
"File does not exist: %s",r->path_info ?
: r->filename);
return HTTP_NOT_FOUND;
}
if (r->method_number != M_GET) {
return METHOD_NOT_ALLOWED;
}
"file permissions deny server access: %s", r->filename);
return FORBIDDEN;
}
else
ap_set_etag(r);
return errstatus;
}
#ifdef USE_MMAP_FILES
/* we need to protect ourselves in case we die while we've got the
* file mmapped */
fd_os, 0);
"default_handler: mmap failed: %s", r->filename);
}
}
else {
}
#endif
#ifdef CHARSET_EBCDIC
/* To make serving of "raw ASCII text" files easy (they serve faster
* since they don't have to be converted from EBCDIC), a new
* If we detect one of these content types here, we simply correct
* the type to the real text/{plain,html,...} type. Otherwise, we
* set a flag that translation is required later on.
*/
convert_flag = ap_checkconv(r);
if (d->content_md5 & 1) {
}
#else
if (d->content_md5 & 1) {
}
#endif /* CHARSET_EBCDIC */
rangestatus = ap_set_byterange(r);
if (!r->header_only) {
if (!rangestatus) {
ap_send_fd(fd, r);
}
else {
long length;
"error byteserving file: %s", r->filename);
return HTTP_INTERNAL_SERVER_ERROR;
}
}
}
}
#ifdef USE_MMAP_FILES
}
else {
if (d->content_md5 & 1) {
}
rangestatus = ap_set_byterange(r);
if (!r->header_only) {
if (!rangestatus) {
}
else {
long length;
}
}
}
}
#endif
return OK;
}
static const handler_rec core_handlers[] = {
{ "*/*", default_handler },
{ "default-handler", default_handler },
};
static void core_open_logs(ap_context_t *pconf, ap_context_t *plog, ap_context_t *ptemp, server_rec *s)
{
ap_open_logs(s, pconf);
}
static const char *core_method(const request_rec *r)
{ return "http"; }
static unsigned short core_port(const request_rec *r)
{ return DEFAULT_HTTP_PORT; }
static void register_hooks(void)
{
/* FIXME: I suspect we can eliminate the need for these - Ben */
}
create_core_dir_config, /* create per-directory config structure */
merge_core_dir_configs, /* merge per-directory config structures */
create_core_server_config, /* create per-server config structure */
merge_core_server_configs, /* merge per-server config structures */
core_cmds, /* command ap_table_t */
core_handlers, /* handlers */
register_hooks /* register hooks */
};