mod_proxy.c revision b635005244526aa1031cbb2f374ef536aebcbbab
7db058a7846888b8823fca9e8135f395265ef1d8nilgun/* Licensed to the Apache Software Foundation (ASF) under one or more
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * contributor license agreements. See the NOTICE file distributed with
fd9abdda70912b99b24e3bf1a38f26fde908a74cnd * this work for additional information regarding copyright ownership.
fd9abdda70912b99b24e3bf1a38f26fde908a74cnd * The ASF licenses this file to You under the Apache License, Version 2.0
fd9abdda70912b99b24e3bf1a38f26fde908a74cnd * (the "License"); you may not use this file except in compliance with
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * the License. You may obtain a copy of the License at
96ad5d81ee4a2cc66a4ae19893efc8aa6d06fae7jailletc * Unless required by applicable law or agreed to in writing, software
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * distributed under the License is distributed on an "AS IS" BASIS,
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
d29d9ab4614ff992b0e8de6e2b88d52b6f1f153erbowen * See the License for the specific language governing permissions and
2e545ce2450a9953665f701bb05350f0d3f26275nd * limitations under the License.
7db058a7846888b8823fca9e8135f395265ef1d8nilgunAPR_DECLARE_OPTIONAL_FN(int, ssl_proxy_enable, (conn_rec *));
d3bd91523e4565551991605fb157fea59c3610e2gryzorAPR_DECLARE_OPTIONAL_FN(int, ssl_engine_disable, (conn_rec *));
f086b4b402fa9a2fefc7dda85de2a3cc1cd0a654rjungAPR_DECLARE_OPTIONAL_FN(int, ssl_is_https, (conn_rec *));
7db058a7846888b8823fca9e8135f395265ef1d8nilgun#define MAX(x,y) ((x) >= (y) ? (x) : (y))
50cb7e2b30597f481fee57bac945190f06ebcc58jorton * A Web proxy module. Stages:
50cb7e2b30597f481fee57bac945190f06ebcc58jorton * translate_name: set filename to proxy:<URL>
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * map_to_storage: run proxy_walk (rather than directory_walk/file_walk)
c9f4eb2763c1d6ba9a3d26828e1729e476d0bb1epctony * can't trust directory_walk/file_walk since these are
50cb7e2b30597f481fee57bac945190f06ebcc58jorton * not in our filesystem. Prevents mod_http from serving
c9f4eb2763c1d6ba9a3d26828e1729e476d0bb1epctony * the TRACE request we will set aside to handle later.
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * type_checker: set type to PROXY_MAGIC_TYPE if filename begins proxy:
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * fix_ups: convert the URL stored in the filename to the
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * canonical form.
50cb7e2b30597f481fee57bac945190f06ebcc58jorton * handler: handle proxy requests
7db058a7846888b8823fca9e8135f395265ef1d8nilgun/* -------------------------------------------------------------- */
50cb7e2b30597f481fee57bac945190f06ebcc58jorton/* Translate the URL into a 'filename' */
50cb7e2b30597f481fee57bac945190f06ebcc58jorton (w)->recv_buffer_size_set = (c)->recv_buffer_size_set; \
7db058a7846888b8823fca9e8135f395265ef1d8nilgun } while (0)
c44eeebd065e2c8cd028016b45c58afb480aaf8fdruggeri const char *key,
c44eeebd065e2c8cd028016b45c58afb480aaf8fdruggeri const char *val)
7db058a7846888b8823fca9e8135f395265ef1d8nilgun /* Normalized load factor. Used with BalancerMamber,
c44eeebd065e2c8cd028016b45c58afb480aaf8fdruggeri * it is a number between 1 and 100.
4aa603e6448b99f9371397d439795c91a93637eand return "LoadFactor must be number between 1..100";
a99c5d4cc3cab6a62b04d52000dbc22ce1fa2d94coar /* If set it will give the retry timeout for the worker
a99c5d4cc3cab6a62b04d52000dbc22ce1fa2d94coar * The default value is 60 seconds, meaning that if
a99c5d4cc3cab6a62b04d52000dbc22ce1fa2d94coar * in error state, it will be retried after that timeout.
17ade6df5ec233536985eb1c130a906c725dd614humbedooh return "Retry must be a positive value";
a99c5d4cc3cab6a62b04d52000dbc22ce1fa2d94coar /* Time in seconds that will destroy all the connections
a99c5d4cc3cab6a62b04d52000dbc22ce1fa2d94coar * that exced the smax
7db058a7846888b8823fca9e8135f395265ef1d8nilgun return "TTL must be at least one second";
50cb7e2b30597f481fee57bac945190f06ebcc58jorton /* Initial number of connections to remote
7db058a7846888b8823fca9e8135f395265ef1d8nilgun return "Min must be a positive number";
c9f4eb2763c1d6ba9a3d26828e1729e476d0bb1epctony /* Maximum number of connections to remote
50cb7e2b30597f481fee57bac945190f06ebcc58jorton return "Max must be a positive number";
7db058a7846888b8823fca9e8135f395265ef1d8nilgun /* XXX: More inteligent naming needed */
7db058a7846888b8823fca9e8135f395265ef1d8nilgun /* Maximum number of connections to remote that
7db058a7846888b8823fca9e8135f395265ef1d8nilgun * will not be destroyed
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar return "Smax must be a positive number";
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar /* Acquire timeout in milliseconds.
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar * If set this will be the maximum time to
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar * wait for a free connection.
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar return "Acquire must be at least one mili second";
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar /* Connection timeout in seconds.
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar * Defaults to server timeout.
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar return "Timeout must be at least one second";
7db058a7846888b8823fca9e8135f395265ef1d8nilgun worker->io_buffer_size = ((s > AP_IOBUFSIZE) ? s : AP_IOBUFSIZE);
cc7e1025de9ac63bd4db6fe7f71c158b2cf09fe4humbedooh return "ReceiveBufferSize must be >= 512 bytes, or 0 for system default.";
727872d18412fc021f03969b8641810d8896820bhumbedooh return "KeepAlive must be On|Off";
205f749042ed530040a4f0080dbcb47ceae8a374rjung /* Worker route.
7fec19672a491661b2fe4b29f685bc7f4efa64d4nd return "Route length must be < 64 characters";
for (v = val; *v; v++) {
mode = 0;
if (mode)
if (mode)
if (mode)
if (mode)
if (mode)
if (ival == 0)
return NULL;
apr_pool_t *p,
const char *key,
const char *val)
int ival;
char *path;
if (ival < 0)
if (provider) {
return NULL;
return NULL;
++aliasp;
++urip;
* GET http://othervhost/cgi-bin/printenv HTTP/1.0
: ap_default_port(r))))) {
return DECLINED;
const char *start;
const char *end;
const char *var;
const char *val;
const char *firstpart;
return str;
return str;
sizeof (struct proxy_alias));
return ret;
int i, len;
&proxy_module);
const char *fake;
const char *real;
if (r->proxyreq) {
return OK;
return DECLINED;
regm);
NULL);
if (len != 0) {
return DECLINED;
if (found) {
return OK;
return DECLINED;
&proxy_module);
for (j = 0; j < num_sec; ++j)
if (entry_proxy->r
return OK;
int access_status;
return DECLINED;
return access_status;
return OK;
char *url, *p;
int access_status;
&proxy_module);
return DECLINED;
return access_status;
return HTTP_BAD_REQUEST;
char *nuri;
const char *ref;
return DECLINED;
&r->parsed_uri,
return HTTP_MOVED_PERMANENTLY;
const char *p2;
int direct_connect = 0;
const char *str;
long maxfwd;
return DECLINED;
switch (r->method_number) {
case M_TRACE: {
int access_status;
return OK;
case M_OPTIONS: {
int access_status;
return OK;
return HTTP_METHOD_NOT_ALLOWED;
return HTTP_REQUEST_ENTITY_TOO_LARGE;
if (p == NULL) {
return HTTP_BAD_REQUEST;
return HTTP_MOVED_PERMANENTLY;
!direct_connect; i++) {
#if DEBUGGING
r->uri);
return access_status;
if (!worker)
goto cleanup;
if (!direct_connect) {
goto cleanup;
if (balancer)
if (balancer) {
goto cleanup;
if (balancer) {
return access_status;
return ps;
ps->allowed_connect_ports = apr_array_append(p, base->allowed_connect_ports, overrides->allowed_connect_ports);
ps->recv_buffer_size = (overrides->recv_buffer_size_set == 0) ? base->recv_buffer_size : overrides->recv_buffer_size;
ps->io_buffer_size = (overrides->io_buffer_size_set == 0) ? base->io_buffer_size : overrides->io_buffer_size;
ps->error_override = (overrides->error_override_set == 0) ? base->error_override : overrides->error_override;
ps->preserve_host = (overrides->preserve_host_set == 0) ? base->preserve_host : overrides->preserve_host;
ps->proxy_status = (overrides->proxy_status_set == 0) ? base->proxy_status : overrides->proxy_status;
return ps;
return (void *) new;
return new;
char *r, *f, *scheme;
int port;
if (regex)
scheme[p-r] = 0;
if (q != NULL) {
if (regex)
if (regex) {
if (!reg)
return NULL;
char *r = NULL;
char *word;
while (*arg) {
if (is_regex) {
f = word;
r = word;
if (!val) {
if (r == NULL)
if (use_regex) {
return NULL;
if (!balancer) {
conf, r);
if (err)
if (err)
if (!worker) {
if (err)
if (err)
return NULL;
if ( r == NULL)
return NULL;
return NULL;
return NULL;
int found = 0;
if (!found) {
return NULL;
int *New;
return NULL;
int found = 0;
if (!found) {
#if DEBUGGING
#if DEBUGGING
#if DEBUGGING
#if DEBUGGING
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
return NULL;
int timeout;
return NULL;
return NULL;
return NULL;
return NULL;
char *word;
while (*arg) {
if (!path)
else if (!name)
if (!val)
if (!path)
if (!name)
if (!worker) {
const char *err;
if (err)
if (!balancer) {
if (err)
return NULL;
const char *err;
int in_proxy_section = 0;
if (!balancer) {
if (in_proxy_section) {
if (err)
if (!worker) {
if (in_proxy_section) {
if (err)
while (*arg) {
if (!val) {
if (worker)
if (err)
return NULL;
&proxy_module);
const char *errmsg;
return err;
if (!arg) {
return errmsg;
conf->r = r;
NULL);
NULL);
if (!balancer) {
if (err)
conf->p);
if (!worker) {
if (err)
NULL);
while (*arg) {
if (!val) {
if (worker)
if (err)
return NULL;
{NULL}
if (proxy_ssl_enable) {
if (proxy_ssl_disable) {
return proxy_ssl_disable(c);
if (proxy_is_https) {
return proxy_is_https(c);
const char *var)
if (proxy_ssl_val) {
return NULL;
return OK;
return OK;
++worker;
++balancer;
return OK;
worker++;
if (!reverse) {
s = s->next;
proxy_lb_workers = 0;
return OK;
request_rec *r,
request_rec *r,
(request_rec *r), (r),
(status, r),