mod_proxy.c revision 48939aa0cd38f4f4f88e74ff696c77b52176ba1d
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff/* Licensed to the Apache Software Foundation (ASF) under one or more
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * contributor license agreements. See the NOTICE file distributed with
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * this work for additional information regarding copyright ownership.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * The ASF licenses this file to You under the Apache License, Version 2.0
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * (the "License"); you may not use this file except in compliance with
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * the License. You may obtain a copy of the License at
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * Unless required by applicable law or agreed to in writing, software
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * distributed under the License is distributed on an "AS IS" BASIS,
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * See the License for the specific language governing permissions and
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * limitations under the License.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael GraffAPR_DECLARE_OPTIONAL_FN(int, ssl_proxy_enable, (conn_rec *));
599c6d44f4d41aab5d3da98214492eb26e674b65Michael GraffAPR_DECLARE_OPTIONAL_FN(int, ssl_engine_disable, (conn_rec *));
599c6d44f4d41aab5d3da98214492eb26e674b65Michael GraffAPR_DECLARE_OPTIONAL_FN(int, ssl_is_https, (conn_rec *));
599c6d44f4d41aab5d3da98214492eb26e674b65Michael GraffAPR_DECLARE_OPTIONAL_FN(char *, ssl_var_lookup,
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff#define MAX(x,y) ((x) >= (y) ? (x) : (y))
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * A Web proxy module. Stages:
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * translate_name: set filename to proxy:<URL>
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * map_to_storage: run proxy_walk (rather than directory_walk/file_walk)
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * can't trust directory_walk/file_walk since these are
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * not in our filesystem. Prevents mod_http from serving
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * the TRACE request we will set aside to handle later.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * type_checker: set type to PROXY_MAGIC_TYPE if filename begins proxy:
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * fix_ups: convert the URL stored in the filename to the
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * canonical form.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * handler: handle proxy requests
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff/* -------------------------------------------------------------- */
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff/* Translate the URL into a 'filename' */
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff (w)->s->recv_buffer_size = (c)->recv_buffer_size; \
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff (w)->s->recv_buffer_size_set = (c)->recv_buffer_size_set; \
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff (w)->s->io_buffer_size = (c)->io_buffer_size; \
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff (w)->s->io_buffer_size_set = (c)->io_buffer_size_set; \
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graffstatic const char *set_worker_param(apr_pool_t *p,
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff const char *key,
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff const char *val)
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* Normalized load factor. Used with BalancerMamber,
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * it is a number between 1 and 100.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff if (worker->s->lbfactor < 1 || worker->s->lbfactor > 100)
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "LoadFactor must be number between 1..100";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* If set it will give the retry timeout for the worker
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * The default value is 60 seconds, meaning that if
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * in error state, it will be retried after that timeout.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "Retry must be a positive value";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* Time in seconds that will destroy all the connections
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * that exceed the smax
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "TTL must be at least one second";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* Initial number of connections to remote
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "Min must be a positive number";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* Maximum number of connections to remote
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "Max must be a positive number";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* XXX: More inteligent naming needed */
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* Maximum number of connections to remote that
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * will not be destroyed
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "Smax must be a positive number";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* Acquire timeout in given unit (default is milliseconds).
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * If set this will be the maximum time to
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * wait for a free connection.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff if (ap_timeout_parameter_parse(val, &timeout, "ms") != APR_SUCCESS)
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "Acquire timeout has wrong format";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "Acquire must be at least one millisecond";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff /* Connection timeout in seconds.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff * Defaults to server timeout.
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "Timeout must be at least one second";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff if (s < 512 && s) {
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "IOBufferSize must be >= 512 bytes, or 0 for system default.";
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff worker->s->io_buffer_size = (s ? s : AP_IOBUFSIZE);
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff else if (!strcasecmp(key, "receivebuffersize")) {
599c6d44f4d41aab5d3da98214492eb26e674b65Michael Graff return "ReceiveBufferSize must be >= 512 bytes, or 0 for system default.";
for (v = val; *v; v++) {
mode = 0;
if (ival == 0)
return NULL;
apr_pool_t *p,
const char *key,
const char *val)
int ival;
char *path;
if (ival < 0)
if (provider) {
return NULL;
char *val_split;
char *status;
char *tok_state;
return NULL;
++aliasp;
++urip;
* GET http://othervhost/cgi-bin/printenv HTTP/1.0
: ap_default_port(r))))) {
return DECLINED;
const char *start;
const char *end;
const char *var;
const char *val;
const char *firstpart;
return str;
return str;
sizeof (struct proxy_alias));
return ret;
int len;
const char *fake;
const char *real;
int mismatch = 0;
return DECLINED;
if (len != 0) {
return DECLINED;
if (mismatch) {
if (found) {
return OK;
return DONE;
if (r->proxyreq) {
return OK;
return rv;
return rv;
return DECLINED;
&proxy_module);
for (j = 0; j < num_sec; ++j)
if (entry_proxy->r
return OK;
int access_status;
return DECLINED;
return access_status;
return OK;
char *url, *p;
int access_status;
&proxy_module);
return DECLINED;
return access_status;
return HTTP_BAD_REQUEST;
char *nuri;
const char *ref;
return DECLINED;
&r->parsed_uri,
return HTTP_MOVED_PERMANENTLY;
const char *p2;
int direct_connect = 0;
const char *str;
long maxfwd;
return DECLINED;
switch (r->method_number) {
case M_TRACE: {
int access_status;
return OK;
case M_OPTIONS: {
int access_status;
return OK;
if (maxfwd >= 0) {
return HTTP_METHOD_NOT_ALLOWED;
return HTTP_REQUEST_ENTITY_TOO_LARGE;
if (p == NULL) {
return HTTP_BAD_REQUEST;
return HTTP_MOVED_PERMANENTLY;
!direct_connect; i++) {
#if DEBUGGING
r->uri);
return access_status;
if (!worker)
goto cleanup;
if (balancer) {
if (!direct_connect) {
const char *cl_a;
char *end;
goto cleanup;
if (cl_a) {
if (cl > 0) {
goto cleanup;
goto cleanup;
if (balancer) {
if (balancer) {
goto cleanup;
return access_status;
unsigned int id;
id = ap_proxy_hashfunc(apr_psprintf(p, "%pp-%" APR_TIME_T_FMT, ps, apr_time_now()), PROXY_HASHFUNC_DEFAULT);
return ps;
ps->recv_buffer_size = (overrides->recv_buffer_size_set == 0) ? base->recv_buffer_size : overrides->recv_buffer_size;
ps->io_buffer_size = (overrides->io_buffer_size_set == 0) ? base->io_buffer_size : overrides->io_buffer_size;
ps->proxy_status = (overrides->proxy_status_set == 0) ? base->proxy_status : overrides->proxy_status;
ps->source_address = (overrides->source_address_set == 0) ? base->source_address : overrides->source_address;
return ps;
const char *arg)
return NULL;
return (void *) new;
return new;
char *r, *f, *scheme;
int port;
if (regex)
scheme[p-r] = 0;
if (q != NULL) {
if (regex)
if (regex) {
if (!reg)
return NULL;
char *r = NULL;
char *word;
unsigned int flags = 0;
const char *err;
if (err) {
return err;
while (*arg) {
if (is_regex) {
f = word;
r = word;
if (!val) {
if (r == NULL) {
if (apr_fnmatch_test(f)) {
if (use_regex) {
return NULL;
if (!balancer) {
if (err)
if (err)
int reuse = 0;
if (!worker) {
if (err)
if (reuse) {
if (err)
return NULL;
const char *fake;
const char *real;
const char *interp;
const char *err;
if (err) {
return err;
fake = f;
real = r;
interp = i;
real = f;
interp = r;
return NULL;
const char *r, const char *interp)
return NULL;
const char *r, const char *interp)
return NULL;
int found = 0;
if (!found) {
return NULL;
int found = 0;
if (!found) {
#if DEBUGGING
#if DEBUGGING
#if DEBUGGING
#if DEBUGGING
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
int timeout;
return NULL;
return NULL;
return NULL;
return NULL;
char *word;
int reuse = 0;
const char *err;
while (*arg) {
char *val;
if (!val) {
if (!path)
else if (!name)
if (!path)
if (!name)
if (!balancer) {
if (err)
if (!worker) {
if (reuse) {
if (err)
return NULL;
const char *err;
int in_proxy_section = 0;
if (!balancer) {
if (in_proxy_section) {
if (err)
if (!worker) {
if (in_proxy_section) {
if (err)
while (*arg) {
if (!val) {
if (worker)
if (err)
return NULL;
&proxy_module);
const char *errmsg;
return err;
if (!arg) {
return errmsg;
conf->r = r;
NULL);
NULL);
if (!balancer) {
if (err)
conf->p);
if (!worker) {
if (err)
NULL);
while (*arg) {
if (!val) {
if (worker)
if (err)
return NULL;
{NULL}
if (proxy_ssl_enable) {
if (proxy_ssl_disable) {
return proxy_ssl_disable(c);
if (proxy_is_https) {
return proxy_is_https(c);
const char *var)
if (proxy_ssl_val) {
return NULL;
return OK;
return OK;
++worker;
++balancer;
return OK;
if (!reverse) {
s = s->next;
proxy_lb_workers = 0;
return OK;
request_rec *r,
request_rec *r,
(request_rec *r), (r),
(status, r),