rename config_plugin_value_tobool to config_plugin_value_to_bool add macro for redirection
2794 lines
99 KiB
C
2794 lines
99 KiB
C
#include "first.h"
|
|
|
|
#include "sys-stat.h"
|
|
#include "sys-unistd.h" /* <unistd.h> */
|
|
#include "sys-wait.h"
|
|
|
|
#include "base.h"
|
|
#include "burl.h"
|
|
#include "chunk.h"
|
|
#include "ck.h"
|
|
#include "fdevent.h"
|
|
#include "fdlog.h"
|
|
#include "http_etag.h"
|
|
#include "keyvalue.h"
|
|
#include "log.h"
|
|
|
|
#include "configparser.h"
|
|
#include "configfile.h"
|
|
#include "plugin.h"
|
|
#include "reqpool.h"
|
|
#include "sock_addr.h"
|
|
#include "stat_cache.h"
|
|
#include "sys-crypto.h"
|
|
|
|
#include <stdlib.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <limits.h>
|
|
#ifndef _WIN32
|
|
#include <glob.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_SYSLOG_H
|
|
# include <syslog.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_PCRE2_H
|
|
#define PCRE2_CODE_UNIT_WIDTH 8
|
|
#include <pcre2.h>
|
|
#endif
|
|
|
|
#ifndef PATH_MAX
|
|
#define PATH_MAX 4096
|
|
#endif
|
|
|
|
typedef struct {
|
|
PLUGIN_DATA;
|
|
request_config defaults;
|
|
} config_data_base;
|
|
|
|
static void config_free_config(void * const p_d) {
|
|
plugin_data_base * const p = p_d;
|
|
if (NULL == p) return;
|
|
if (NULL == p->cvlist) { free(p); return; }
|
|
/* (init i to 0 if global context; to 1 to skip empty global context) */
|
|
for (int i = !p->cvlist[0].v.u2[1], used = p->nconfig; i < used; ++i) {
|
|
config_plugin_value_t *cpv = p->cvlist + p->cvlist[i].v.u2[0];
|
|
for (; -1 != cpv->k_id; ++cpv) {
|
|
switch (cpv->k_id) {
|
|
case 18:/* server.kbytes-per-second */
|
|
if (cpv->vtype == T_CONFIG_LOCAL) free(cpv->v.v);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
free(p->cvlist);
|
|
free(p);
|
|
}
|
|
|
|
void config_reset_config_bytes_sec(void * const p_d) {
|
|
plugin_data_base * const p = p_d;
|
|
if (NULL == p->cvlist) return;
|
|
/* (init i to 0 if global context; to 1 to skip empty global context) */
|
|
for (int i = !p->cvlist[0].v.u2[1], used = p->nconfig; i < used; ++i) {
|
|
config_plugin_value_t *cpv = p->cvlist + p->cvlist[i].v.u2[0];
|
|
for (; -1 != cpv->k_id; ++cpv) {
|
|
switch (cpv->k_id) {
|
|
case 18:/* server.kbytes-per-second */
|
|
if (cpv->vtype == T_CONFIG_LOCAL) ((off_t *)cpv->v.v)[0] = 0;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static void config_merge_config_cpv(request_config * const pconf, const config_plugin_value_t * const cpv) {
|
|
switch (cpv->k_id) { /* index into static config_plugin_keys_t cpk[] */
|
|
case 0: /* server.document-root */
|
|
pconf->document_root = cpv->v.b;
|
|
break;
|
|
case 1: /* server.name */
|
|
pconf->server_name = cpv->v.b;
|
|
break;
|
|
case 2: /* server.tag */
|
|
pconf->server_tag = cpv->v.b;
|
|
break;
|
|
case 3: /* server.max-request-size */
|
|
pconf->max_request_size = cpv->v.u;
|
|
break;
|
|
case 4: /* server.max-keep-alive-requests */
|
|
pconf->max_keep_alive_requests = cpv->v.shrt;
|
|
break;
|
|
case 5: /* server.max-keep-alive-idle */
|
|
pconf->max_keep_alive_idle = cpv->v.shrt;
|
|
break;
|
|
case 6: /* server.max-read-idle */
|
|
pconf->max_read_idle = cpv->v.shrt;
|
|
break;
|
|
case 7: /* server.max-write-idle */
|
|
pconf->max_write_idle = cpv->v.shrt;
|
|
break;
|
|
case 8: /* server.errorfile-prefix */
|
|
pconf->errorfile_prefix = cpv->v.b;
|
|
break;
|
|
case 9: /* server.error-handler */
|
|
pconf->error_handler = cpv->v.b;
|
|
break;
|
|
case 10:/* server.error-handler-404 */
|
|
pconf->error_handler_404 = cpv->v.b;
|
|
break;
|
|
case 11:/* server.error-intercept */
|
|
pconf->error_intercept = (0 != cpv->v.u);
|
|
break;
|
|
case 12:/* server.force-lowercase-filenames */
|
|
pconf->force_lowercase_filenames = (0 != cpv->v.u);
|
|
break;
|
|
case 13:/* server.follow-symlink */
|
|
pconf->follow_symlink = (0 != cpv->v.u);
|
|
break;
|
|
case 14:/* server.protocol-http11 */
|
|
pconf->allow_http11 = (0 != cpv->v.u);
|
|
break;
|
|
case 15:/* server.range-requests */
|
|
pconf->range_requests = (0 != cpv->v.u);
|
|
break;
|
|
case 16:/* server.stream-request-body */
|
|
pconf->stream_request_body = cpv->v.shrt;
|
|
break;
|
|
case 17:/* server.stream-response-body */
|
|
pconf->stream_response_body = cpv->v.shrt;
|
|
break;
|
|
case 18:/* server.kbytes-per-second */
|
|
pconf->global_bytes_per_second = (unsigned int)((off_t *)cpv->v.v)[1];
|
|
pconf->global_bytes_per_second_cnt_ptr = cpv->v.v;
|
|
break;
|
|
case 19:/* connection.kbytes-per-second */
|
|
pconf->bytes_per_second = (unsigned int)cpv->v.shrt << 10;/* (*=1024) */
|
|
break;
|
|
case 20:/* mimetype.assign */
|
|
pconf->mimetypes = cpv->v.a;
|
|
break;
|
|
case 21:/* mimetype.use-xattr */
|
|
pconf->use_xattr = (0 != cpv->v.u);
|
|
break;
|
|
case 22:/* etag.use-inode */
|
|
cpv->v.u
|
|
? (pconf->etag_flags |= ETAG_USE_INODE)
|
|
: (pconf->etag_flags &= ~ETAG_USE_INODE);
|
|
break;
|
|
case 23:/* etag.use-mtime */
|
|
cpv->v.u
|
|
? (pconf->etag_flags |= ETAG_USE_MTIME)
|
|
: (pconf->etag_flags &= ~ETAG_USE_MTIME);
|
|
break;
|
|
case 24:/* etag.use-size */
|
|
cpv->v.u
|
|
? (pconf->etag_flags |= ETAG_USE_SIZE)
|
|
: (pconf->etag_flags &= ~ETAG_USE_SIZE);
|
|
break;
|
|
case 25:/* debug.log-condition-handling */
|
|
pconf->log_condition_handling = (0 != cpv->v.u);
|
|
break;
|
|
case 26:/* debug.log-file-not-found */
|
|
pconf->log_file_not_found = (0 != cpv->v.u);
|
|
break;
|
|
case 27:/* debug.log-request-handling */
|
|
pconf->log_request_handling = (0 != cpv->v.u);
|
|
break;
|
|
case 28:/* debug.log-request-header */
|
|
pconf->log_request_header = (0 != cpv->v.u);
|
|
break;
|
|
case 29:/* debug.log-response-header */
|
|
pconf->log_response_header = (0 != cpv->v.u);
|
|
break;
|
|
case 30:/* debug.log-timeouts */
|
|
pconf->log_timeouts = (0 != cpv->v.u);
|
|
break;
|
|
case 31:/* debug.log-state-handling */
|
|
pconf->log_state_handling = (0 != cpv->v.u);
|
|
break;
|
|
case 32:/* server.errorlog */
|
|
if (cpv->vtype == T_CONFIG_LOCAL) pconf->errh = cpv->v.v;
|
|
break;
|
|
case 33:/* server.breakagelog */
|
|
if (cpv->vtype == T_CONFIG_LOCAL) pconf->serrh = cpv->v.v;
|
|
break;
|
|
default:/* should not happen */
|
|
return;
|
|
}
|
|
}
|
|
|
|
static void config_merge_config(request_config * const pconf, const config_plugin_value_t *cpv) {
|
|
do {
|
|
config_merge_config_cpv(pconf, cpv);
|
|
} while ((++cpv)->k_id != -1);
|
|
}
|
|
|
|
void config_patch_config(request_st * const r) {
|
|
config_data_base * const p = r->con->config_data_base;
|
|
|
|
/* performed by request_config_reset() */
|
|
/*memcpy(&r->conf, &p->defaults, sizeof(request_config));*/
|
|
|
|
for (int i = 1, used = p->nconfig; i < used; ++i) {
|
|
if (config_check_cond(r, (uint32_t)p->cvlist[i].k_id))
|
|
config_merge_config(&r->conf, p->cvlist + p->cvlist[i].v.u2[0]);
|
|
}
|
|
}
|
|
|
|
#if 0 /*(moved to reqpool.c:request_config_reset())*/
|
|
void config_reset_config(request_st * const r) {
|
|
/* initialize request_config (r->conf) from top-level request_config */
|
|
config_data_base * const p = r->con->config_data_base;
|
|
memcpy(&r->conf, &p->defaults, sizeof(request_config));
|
|
}
|
|
#endif
|
|
|
|
static void config_burl_normalize_cond (server * const srv) {
|
|
buffer * const tb = srv->tmp_buf;
|
|
for (uint32_t i = 0; i < srv->config_context->used; ++i) {
|
|
data_config * const config =(data_config *)srv->config_context->data[i];
|
|
if (COMP_HTTP_QUERY_STRING != config->comp) continue;
|
|
switch(config->cond) {
|
|
case CONFIG_COND_NE:
|
|
case CONFIG_COND_EQ:
|
|
case CONFIG_COND_PREFIX:
|
|
case CONFIG_COND_SUFFIX:
|
|
/* (can use this routine as long as it does not perform
|
|
* any regex-specific normalization of first arg) */
|
|
pcre_keyvalue_burl_normalize_key(&config->string, tb);
|
|
break;
|
|
case CONFIG_COND_NOMATCH:
|
|
case CONFIG_COND_MATCH:
|
|
pcre_keyvalue_burl_normalize_key(&config->string, tb);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int config_pcre_keyvalue (server * const srv) {
|
|
const int pcre_jit = config_feature_bool(srv, "server.pcre_jit", 1);
|
|
for (uint32_t i = 0; i < srv->config_context->used; ++i) {
|
|
data_config * const dc = (data_config *)srv->config_context->data[i];
|
|
if (dc->cond != CONFIG_COND_NOMATCH && dc->cond != CONFIG_COND_MATCH)
|
|
continue;
|
|
if (!data_config_pcre_compile(dc, pcre_jit, srv->errh))
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
#ifdef USE_OPENSSL_CRYPTO
|
|
static void config_warn_openssl_module (server *srv) {
|
|
for (uint32_t i = 0; i < srv->config_context->used; ++i) {
|
|
const data_config *config = (data_config const*)srv->config_context->data[i];
|
|
for (uint32_t j = 0; j < config->value->used; ++j) {
|
|
data_unset *du = config->value->data[j];
|
|
if (0 == strncmp(du->key.ptr, "ssl.", sizeof("ssl.")-1)) {
|
|
/* mod_openssl should be loaded after mod_extforward */
|
|
array_insert_value(srv->srvconf.modules, CONST_STR_LEN("mod_openssl"));
|
|
log_warn(srv->errh, __FILE__, __LINE__,
|
|
"Warning: please add \"mod_openssl\" to server.modules list "
|
|
"in lighttpd.conf. A future release of lighttpd 1.4.x "
|
|
"*will not* automatically load mod_openssl and lighttpd "
|
|
"*will not* use SSL/TLS where your lighttpd.conf contains "
|
|
"ssl.* directives");
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
static void config_check_module_duplicates (server *srv) {
|
|
int dups = 0;
|
|
data_string ** const data = (data_string **)srv->srvconf.modules->data;
|
|
const uint32_t used = srv->srvconf.modules->used;
|
|
for (uint32_t i = 0; i < used; ++i) {
|
|
const buffer * const m = &data[i]->value;
|
|
for (uint32_t j = i+1; j < used; ++j) {
|
|
if (buffer_is_equal(m, &data[j]->value)) {
|
|
++dups;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if (!dups) return;
|
|
|
|
array * const modules = array_init(used - dups);
|
|
for (uint32_t i = 0; i < used; ++i) {
|
|
const buffer * const m = &data[i]->value;
|
|
uint32_t j;
|
|
for (j = 0; j < modules->used; ++j) {
|
|
buffer *n = &((data_string *)modules->data[j])->value;
|
|
if (buffer_is_equal(m, n)) break; /* duplicate */
|
|
}
|
|
if (j == modules->used)
|
|
array_insert_value(modules, BUF_PTR_LEN(m));
|
|
}
|
|
array_free(srv->srvconf.modules);
|
|
srv->srvconf.modules = modules;
|
|
}
|
|
|
|
__attribute_pure__
|
|
__attribute_noinline__
|
|
static int config_has_opt_enabled (const server * const srv, const char * const opt, const uint32_t olen) {
|
|
for (uint32_t i = 0; i < srv->config_context->used; ++i) {
|
|
const data_config * const config =
|
|
(const data_config *)srv->config_context->data[i];
|
|
const data_unset * const du =
|
|
array_get_data_unset(config->value, opt, olen);
|
|
if (NULL == du) continue;
|
|
if (du->type == TYPE_ARRAY
|
|
? ((data_array *)du)->value.used != 0
|
|
: config_plugin_value_to_bool(du, 0))
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
__attribute_pure__
|
|
__attribute_noinline__
|
|
static const char * config_has_opt_and_value (const server * const srv, const char * const opt, const uint32_t olen, const char * const v, const uint32_t vlen) {
|
|
for (uint32_t i = 0; i < srv->config_context->used; ++i) {
|
|
const data_config * const config =
|
|
(data_config const *)srv->config_context->data[i];
|
|
const data_string * const ds =
|
|
(data_string *)array_get_element_klen(config->value, opt, olen);
|
|
if (NULL != ds && ds->type == TYPE_STRING
|
|
&& buffer_eq_slen(&ds->value, v, vlen))
|
|
return v;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
__attribute_noinline__
|
|
static void config_compat_module_remove (server *srv, const char *module, uint32_t len) {
|
|
array *modules = array_init(srv->srvconf.modules->used);
|
|
|
|
for (uint32_t i = 0; i < srv->srvconf.modules->used; ++i) {
|
|
const data_string *ds = (data_string *)srv->srvconf.modules->data[i];
|
|
if (!buffer_eq_slen(&ds->value, module, len))
|
|
array_insert_value(modules, BUF_PTR_LEN(&ds->value));
|
|
}
|
|
|
|
array_free(srv->srvconf.modules);
|
|
srv->srvconf.modules = modules;
|
|
}
|
|
|
|
__attribute_noinline__
|
|
static void config_compat_module_prepend (server *srv, const char *module, uint32_t len) {
|
|
array *modules = array_init(srv->srvconf.modules->used+4);
|
|
array_insert_value(modules, module, len);
|
|
|
|
for (uint32_t i = 0; i < srv->srvconf.modules->used; ++i) {
|
|
data_string *ds = (data_string *)srv->srvconf.modules->data[i];
|
|
array_insert_value(modules, BUF_PTR_LEN(&ds->value));
|
|
}
|
|
|
|
array_free(srv->srvconf.modules);
|
|
srv->srvconf.modules = modules;
|
|
}
|
|
|
|
static void config_warn_authn_module (server *srv, const char *module, uint32_t len, const char *v) {
|
|
buffer * const tb = srv->tmp_buf;
|
|
buffer_copy_string_len(tb, CONST_STR_LEN("mod_authn_"));
|
|
buffer_append_string_len(tb, module, len);
|
|
array_insert_value(srv->srvconf.modules, BUF_PTR_LEN(tb));
|
|
log_warn(srv->errh, __FILE__, __LINE__,
|
|
"Warning: please add \"mod_authn_%s\" to server.modules list "
|
|
"in lighttpd.conf. A future release of lighttpd 1.4.x will "
|
|
"not automatically load mod_authn_%s and lighttpd will fail "
|
|
"to start up since your lighttpd.conf uses auth.backend = \"%s\".",
|
|
module, module, v);
|
|
}
|
|
|
|
static void config_compat_module_load (server *srv) {
|
|
int prepend_mod_indexfile = 1;
|
|
int append_mod_dirlisting = 1;
|
|
int append_mod_staticfile = 1;
|
|
int append_mod_authn_file = 1;
|
|
int append_mod_authn_ldap = 1;
|
|
int append_mod_openssl = 1;
|
|
int contains_mod_auth = 0;
|
|
int prepend_mod_auth = 0;
|
|
int prepend_mod_vhostdb = 0;
|
|
const char *dyn_name = NULL;
|
|
|
|
for (uint32_t i = 0; i < srv->srvconf.modules->used; ++i) {
|
|
buffer *m = &((data_string *)srv->srvconf.modules->data[i])->value;
|
|
|
|
if (buffer_eq_slen(m, CONST_STR_LEN("mod_indexfile")))
|
|
prepend_mod_indexfile = 0;
|
|
else if (buffer_eq_slen(m, CONST_STR_LEN("mod_staticfile")))
|
|
append_mod_staticfile = 0;
|
|
else if (buffer_eq_slen(m, CONST_STR_LEN("mod_dirlisting")))
|
|
append_mod_dirlisting = 0;
|
|
else if (buffer_eq_slen(m, CONST_STR_LEN("mod_gnutls")))
|
|
append_mod_openssl = 0;
|
|
else if (buffer_eq_slen(m, CONST_STR_LEN("mod_mbedtls")))
|
|
append_mod_openssl = 0;
|
|
else if (buffer_eq_slen(m, CONST_STR_LEN("mod_nss")))
|
|
append_mod_openssl = 0;
|
|
else if (buffer_eq_slen(m, CONST_STR_LEN("mod_openssl")))
|
|
append_mod_openssl = 0;
|
|
else if (buffer_eq_slen(m, CONST_STR_LEN("mod_wolfssl")))
|
|
append_mod_openssl = 0;
|
|
else if (0 == strncmp(m->ptr, "mod_auth", sizeof("mod_auth")-1)) {
|
|
if (buffer_eq_slen(m, CONST_STR_LEN("mod_auth"))) {
|
|
if (!contains_mod_auth) {
|
|
contains_mod_auth = 1;
|
|
if (dyn_name)
|
|
log_warn(srv->errh, __FILE__, __LINE__,
|
|
"Warning: mod_auth should be listed in server.modules"
|
|
" before dynamic backends such as %s", dyn_name);
|
|
}
|
|
}
|
|
else if (!contains_mod_auth)
|
|
prepend_mod_auth = 1;
|
|
|
|
if (buffer_eq_slen(m, CONST_STR_LEN("mod_authn_file")))
|
|
append_mod_authn_file = 0;
|
|
else if (buffer_eq_slen(m, CONST_STR_LEN("mod_authn_ldap")))
|
|
append_mod_authn_ldap = 0;
|
|
}
|
|
else if (0 == strncmp(m->ptr, "mod_vhostdb", sizeof("mod_vhostdb")-1)) {
|
|
if (buffer_eq_slen(m, CONST_STR_LEN("mod_vhostdb")))
|
|
prepend_mod_vhostdb |= 2;
|
|
else if (!(prepend_mod_vhostdb & 2))
|
|
prepend_mod_vhostdb |= 1;
|
|
}
|
|
else if ( 0 == strncmp(m->ptr, "mod_ajp13",
|
|
sizeof("mod_ajp13")-1)
|
|
|| 0 == strncmp(m->ptr, "mod_cgi",
|
|
sizeof("mod_cgi")-1)
|
|
|| 0 == strncmp(m->ptr, "mod_fastcgi",
|
|
sizeof("mod_fastcgi")-1)
|
|
|| 0 == strncmp(m->ptr, "mod_proxy",
|
|
sizeof("mod_proxy")-1)
|
|
|| 0 == strncmp(m->ptr, "mod_scgi",
|
|
sizeof("mod_scgi")-1)
|
|
|| 0 == strncmp(m->ptr, "mod_sockproxy",
|
|
sizeof("mod_sockproxy")-1)
|
|
|| 0 == strncmp(m->ptr, "mod_wstunnel",
|
|
sizeof("mod_wstunnel")-1)) {
|
|
if (NULL == dyn_name)
|
|
dyn_name = m->ptr;
|
|
if (!append_mod_staticfile)
|
|
log_warn(srv->errh, __FILE__, __LINE__,
|
|
"Warning: %s should be listed in server.modules"
|
|
" before mod_staticfile", m->ptr);
|
|
}
|
|
}
|
|
|
|
/* check if some default modules are used and enabled
|
|
* (Each dynamically loaded modules takes at least 20k memory,
|
|
* so avoid loading some default modules unless used and enabled) */
|
|
|
|
if (!config_has_opt_enabled(srv, CONST_STR_LEN("index-file.names"))
|
|
&& !config_has_opt_enabled(srv, CONST_STR_LEN("server.indexfiles"))) {
|
|
if (!prepend_mod_indexfile)
|
|
config_compat_module_remove(srv, CONST_STR_LEN("mod_indexfile"));
|
|
prepend_mod_indexfile = 0;
|
|
}
|
|
|
|
if (!config_has_opt_enabled(srv, CONST_STR_LEN("dir-listing.activate"))
|
|
&& !config_has_opt_enabled(srv, CONST_STR_LEN("server.dir-listing"))) {
|
|
if (!append_mod_dirlisting)
|
|
config_compat_module_remove(srv, CONST_STR_LEN("mod_dirlisting"));
|
|
append_mod_dirlisting = 0;
|
|
}
|
|
|
|
/* prepend default modules */
|
|
|
|
if (prepend_mod_indexfile) {
|
|
/* mod_indexfile has to be loaded before mod_fastcgi and friends */
|
|
config_compat_module_prepend(srv, CONST_STR_LEN("mod_indexfile"));
|
|
}
|
|
|
|
/* append default modules */
|
|
|
|
if (append_mod_dirlisting) {
|
|
array_insert_value(srv->srvconf.modules, CONST_STR_LEN("mod_dirlisting"));
|
|
}
|
|
|
|
if (append_mod_staticfile) {
|
|
array_insert_value(srv->srvconf.modules, CONST_STR_LEN("mod_staticfile"));
|
|
}
|
|
|
|
if (append_mod_openssl) {
|
|
#ifdef USE_OPENSSL_CRYPTO
|
|
config_warn_openssl_module(srv);
|
|
#endif
|
|
}
|
|
|
|
/* mod_auth.c,mod_auth_api.c auth backends were split into separate modules
|
|
* Automatically load auth backend modules for compatibility with
|
|
* existing lighttpd 1.4.x configs */
|
|
if (contains_mod_auth) {
|
|
if (append_mod_authn_file) {
|
|
const char *v;
|
|
if ( (v=config_has_opt_and_value(srv,CONST_STR_LEN("auth.backend"),
|
|
CONST_STR_LEN("htdigest")))
|
|
||(v=config_has_opt_and_value(srv,CONST_STR_LEN("auth.backend"),
|
|
CONST_STR_LEN("htpasswd")))
|
|
||(v=config_has_opt_and_value(srv,CONST_STR_LEN("auth.backend"),
|
|
CONST_STR_LEN("plain"))))
|
|
config_warn_authn_module(srv, CONST_STR_LEN("file"), v);
|
|
}
|
|
if (append_mod_authn_ldap) {
|
|
#if defined(HAVE_LDAP_H) && defined(HAVE_LBER_H) && defined(HAVE_LIBLDAP) && defined(HAVE_LIBLBER)
|
|
if (config_has_opt_and_value(srv, CONST_STR_LEN("auth.backend"),
|
|
CONST_STR_LEN("ldap")))
|
|
config_warn_authn_module(srv, CONST_STR_LEN("ldap"), "ldap");
|
|
#endif
|
|
}
|
|
}
|
|
|
|
if (prepend_mod_auth) {
|
|
config_compat_module_prepend(srv, CONST_STR_LEN("mod_auth"));
|
|
}
|
|
|
|
if (prepend_mod_vhostdb & 1) {
|
|
config_compat_module_prepend(srv, CONST_STR_LEN("mod_vhostdb"));
|
|
}
|
|
}
|
|
|
|
static void config_deprecate_module_compress (server *srv) {
|
|
/* replace "mod_compress" value with "mod_deflate" value */
|
|
for (uint32_t i = 0; i < srv->srvconf.modules->used; ++i) {
|
|
buffer *m = &((data_string *)srv->srvconf.modules->data[i])->value;
|
|
if (buffer_eq_slen(m, CONST_STR_LEN("mod_compress")))
|
|
buffer_copy_string_len(m, CONST_STR_LEN("mod_deflate"));
|
|
}
|
|
}
|
|
|
|
static int config_http_parseopts (server *srv, const array *a) {
|
|
unsigned short int opts = srv->srvconf.http_url_normalize;
|
|
uint8_t decode_2f = 1;
|
|
uint8_t url_normalize = 1;
|
|
int rc = 1;
|
|
for (size_t i = 0; i < a->used; ++i) {
|
|
const data_string * const ds = (const data_string *)a->data[i];
|
|
const buffer *k = &ds->key;
|
|
unsigned short int opt;
|
|
int val = config_plugin_value_to_bool((data_unset *)ds, 2);
|
|
if (2 == val) {
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"unrecognized value for server.http-parseopts: "
|
|
"%s => %s (expect \"[enable|disable]\")", k->ptr, ds->value.ptr);
|
|
rc = 0;
|
|
}
|
|
if (buffer_eq_slen(k, CONST_STR_LEN("url-normalize")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-normalize-unreserved")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_UNRESERVED;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-normalize-required")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_REQUIRED;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-ctrls-reject")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_CTRLS_REJECT;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-path-backslash-trans")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_BACKSLASH_TRANS;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-path-2f-decode")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-path-2f-reject")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_REJECT;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-path-dotseg-remove")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REMOVE;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-path-dotseg-reject")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REJECT;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-query-20-plus")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_QUERY_20_PLUS;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("url-invalid-utf8-reject")))
|
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_INVALID_UTF8_REJECT;
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("header-strict"))) {
|
|
srv->srvconf.http_header_strict = val;
|
|
continue;
|
|
}
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("host-strict"))) {
|
|
srv->srvconf.http_host_strict = val;
|
|
continue;
|
|
}
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("host-normalize"))) {
|
|
srv->srvconf.http_host_normalize = val;
|
|
continue;
|
|
}
|
|
else if (buffer_eq_slen(k, CONST_STR_LEN("method-get-body"))) {
|
|
srv->srvconf.http_method_get_body = val;
|
|
continue;
|
|
}
|
|
else {
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"unrecognized key for server.http-parseopts: %s", k->ptr);
|
|
rc = 0;
|
|
continue;
|
|
}
|
|
if (val)
|
|
opts |= opt;
|
|
else {
|
|
opts &= ~opt;
|
|
if (opt == HTTP_PARSEOPT_URL_NORMALIZE) {
|
|
url_normalize = 0;
|
|
}
|
|
if (opt == HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE) {
|
|
decode_2f = 0;
|
|
}
|
|
}
|
|
}
|
|
if (!url_normalize)
|
|
opts = 0;
|
|
if (opts != 0) {
|
|
opts |= HTTP_PARSEOPT_URL_NORMALIZE;
|
|
if ((opts & (HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE
|
|
|HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_REJECT))
|
|
== (HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE
|
|
|HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_REJECT)) {
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"conflicting options in server.http-parseopts:"
|
|
"url-path-2f-decode, url-path-2f-reject");
|
|
rc = 0;
|
|
}
|
|
if ((opts & (HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REMOVE
|
|
|HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REJECT))
|
|
== (HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REMOVE
|
|
|HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REJECT)) {
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"conflicting options in server.http-parseopts:"
|
|
"url-path-dotseg-remove, url-path-dotseg-reject");
|
|
rc = 0;
|
|
}
|
|
if (!(opts & (HTTP_PARSEOPT_URL_NORMALIZE_UNRESERVED
|
|
|HTTP_PARSEOPT_URL_NORMALIZE_REQUIRED))) {
|
|
opts |= HTTP_PARSEOPT_URL_NORMALIZE_UNRESERVED
|
|
| HTTP_PARSEOPT_URL_NORMALIZE_INVALID_UTF8_REJECT;
|
|
if (decode_2f
|
|
&& !(opts & HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_REJECT))
|
|
opts |= HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE;
|
|
}
|
|
}
|
|
srv->srvconf.http_url_normalize = opts;
|
|
return rc;
|
|
}
|
|
|
|
static int config_insert_srvconf(server *srv) {
|
|
static const config_plugin_keys_t cpk[] = {
|
|
{ CONST_STR_LEN("server.modules"),
|
|
T_CONFIG_ARRAY_VLIST,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.compat-module-load"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.systemd-socket-activation"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.port"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.bind"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.network-backend"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.chroot"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.username"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.groupname"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.errorlog-placeholder-moved-to-config-insert"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.breakagelog-placeholder-moved-to-config-insert"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.errorlog-use-syslog"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.syslog-facility"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.core-files"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.event-handler"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.pid-file"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.max-worker"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.max-fds"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.max-connections"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.max-request-field-size"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.chunkqueue-chunk-sz"),
|
|
T_CONFIG_INT,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.upload-temp-file-size"),
|
|
T_CONFIG_INT,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.upload-dirs"),
|
|
T_CONFIG_ARRAY_VLIST,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.http-parseopts"),
|
|
T_CONFIG_ARRAY_KVSTRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.http-parseopt-header-strict"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.http-parseopt-host-strict"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.http-parseopt-host-normalize"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.reject-expect-100-with-417"), /*(ignored)*/
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.stat-cache-engine"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("mimetype.xattr-name"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("ssl.engine"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SOCKET }
|
|
,{ CONST_STR_LEN("debug.log-request-header-on-error"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ CONST_STR_LEN("server.feature-flags"),
|
|
T_CONFIG_ARRAY_KVANY,
|
|
T_CONFIG_SCOPE_SERVER }
|
|
,{ NULL, 0,
|
|
T_CONFIG_UNSET,
|
|
T_CONFIG_SCOPE_UNSET }
|
|
};
|
|
|
|
srv->srvconf.h2proto = 2; /* enable HTTP/2 and h2c by default */
|
|
|
|
int rc = 0;
|
|
plugin_data_base srvplug;
|
|
memset(&srvplug, 0, sizeof(srvplug));
|
|
plugin_data_base * const p = &srvplug;
|
|
if (!config_plugin_values_init(srv, p, cpk, "global"))
|
|
return HANDLER_ERROR;
|
|
|
|
int ssl_enabled = 0; /*(directive checked here only to set default port)*/
|
|
|
|
/* process and validate T_CONFIG_SCOPE_SERVER config directives */
|
|
if (p->cvlist[0].v.u2[1]) {
|
|
config_plugin_value_t *cpv = p->cvlist + p->cvlist[0].v.u2[0];
|
|
for (; -1 != cpv->k_id; ++cpv) {
|
|
switch (cpv->k_id) {
|
|
case 0: /* server.modules */
|
|
array_copy_array(srv->srvconf.modules, cpv->v.a);
|
|
break;
|
|
case 1: /* server.compat-module-load */
|
|
srv->srvconf.compat_module_load = (unsigned short)cpv->v.u;
|
|
break;
|
|
case 2: /* server.systemd-socket-activation */
|
|
srv->srvconf.systemd_socket_activation=(unsigned short)cpv->v.u;
|
|
break;
|
|
case 3: /* server.port */
|
|
srv->srvconf.port = cpv->v.shrt;
|
|
break;
|
|
case 4: /* server.bind */
|
|
if (!buffer_is_blank(cpv->v.b))
|
|
srv->srvconf.bindhost = cpv->v.b;
|
|
break;
|
|
case 5: /* server.network-backend */
|
|
if (!buffer_is_blank(cpv->v.b))
|
|
srv->srvconf.network_backend = cpv->v.b;
|
|
break;
|
|
case 6: /* server.chroot */
|
|
#ifdef HAVE_CHROOT
|
|
if (!buffer_is_blank(cpv->v.b))
|
|
srv->srvconf.changeroot = cpv->v.b;
|
|
#endif
|
|
break;
|
|
case 7: /* server.username */
|
|
if (!buffer_is_blank(cpv->v.b))
|
|
srv->srvconf.username = cpv->v.b;
|
|
break;
|
|
case 8: /* server.groupname */
|
|
if (!buffer_is_blank(cpv->v.b))
|
|
srv->srvconf.groupname = cpv->v.b;
|
|
break;
|
|
case 9: /* server.errorlog */ /* moved to config_insert() */
|
|
/*srv->srvconf.errorlog_file = cpv->v.b;*/
|
|
break;
|
|
case 10:/* server.breakagelog */ /* moved to config_insert() */
|
|
/*srv->srvconf.breakagelog_file = cpv->v.b;*/
|
|
break;
|
|
case 11:/* server.errorlog-use-syslog */
|
|
srv->srvconf.errorlog_use_syslog = (unsigned short)cpv->v.u;
|
|
break;
|
|
case 12:/* server.syslog-facility */
|
|
if (!buffer_is_blank(cpv->v.b))
|
|
srv->srvconf.syslog_facility = cpv->v.b;
|
|
break;
|
|
case 13:/* server.core-files */
|
|
srv->srvconf.enable_cores = (unsigned short)cpv->v.u;
|
|
break;
|
|
case 14:/* server.event-handler */
|
|
srv->srvconf.event_handler = cpv->v.b->ptr;
|
|
break;
|
|
case 15:/* server.pid-file */
|
|
if (!buffer_is_blank(cpv->v.b))
|
|
*(const buffer **)&srv->srvconf.pid_file = cpv->v.b;
|
|
break;
|
|
case 16:/* server.max-worker */
|
|
srv->srvconf.max_worker = (unsigned short)cpv->v.u;
|
|
break;
|
|
case 17:/* server.max-fds */
|
|
srv->srvconf.max_fds = (unsigned short)cpv->v.u;
|
|
break;
|
|
case 18:/* server.max-connections */
|
|
srv->srvconf.max_conns = (unsigned short)cpv->v.u;
|
|
break;
|
|
case 19:/* server.max-request-field-size */
|
|
srv->srvconf.max_request_field_size = cpv->v.shrt;
|
|
break;
|
|
case 20:/* server.chunkqueue-chunk-sz */
|
|
chunkqueue_set_chunk_size(cpv->v.u);
|
|
break;
|
|
case 21:/* server.upload-temp-file-size */
|
|
srv->srvconf.upload_temp_file_size = cpv->v.u;
|
|
break;
|
|
case 22:/* server.upload-dirs */
|
|
array_copy_array(srv->srvconf.upload_tempdirs, cpv->v.a);
|
|
break;
|
|
case 23:/* server.http-parseopts */
|
|
if (!config_http_parseopts(srv, cpv->v.a))
|
|
rc = HANDLER_ERROR;
|
|
break;
|
|
case 24:/* server.http-parseopt-header-strict */
|
|
srv->srvconf.http_header_strict = (0 != cpv->v.u);
|
|
break;
|
|
case 25:/* server.http-parseopt-host-strict */
|
|
srv->srvconf.http_host_strict = (0 != cpv->v.u);
|
|
break;
|
|
case 26:/* server.http-parseopt-host-normalize */
|
|
srv->srvconf.http_host_normalize = (0 != cpv->v.u);
|
|
break;
|
|
case 27:/* server.reject-expect-100-with-417 *//*(ignored)*/
|
|
break;
|
|
case 28:/* server.stat-cache-engine */
|
|
if (0 != stat_cache_choose_engine(cpv->v.b, srv->errh))
|
|
rc = HANDLER_ERROR;
|
|
break;
|
|
case 29:/* mimetype.xattr-name */
|
|
stat_cache_xattrname(cpv->v.b->ptr);
|
|
break;
|
|
case 30:/* ssl.engine */
|
|
ssl_enabled = (0 != cpv->v.u);
|
|
#if !defined(USE_OPENSSL_CRYPTO) \
|
|
&& !defined(USE_MBEDTLS_CRYPTO) \
|
|
&& !defined(USE_NSS_CRYPTO) \
|
|
&& !defined(USE_GNUTLS_CRYPTO) \
|
|
&& !defined(USE_WOLFSSL_CRYPTO)
|
|
if (ssl_enabled) {
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"ssl support is missing; "
|
|
"recompile with e.g. --with-openssl");
|
|
rc = HANDLER_ERROR;
|
|
break;
|
|
}
|
|
#endif
|
|
break;
|
|
case 31:/* debug.log-request-header-on-error */
|
|
srv->srvconf.log_request_header_on_error = (0 != cpv->v.u);
|
|
break;
|
|
case 32:/* server.feature-flags */
|
|
srv->srvconf.feature_flags = cpv->v.a;
|
|
srv->srvconf.h2proto =
|
|
config_plugin_value_to_bool(
|
|
array_get_element_klen(cpv->v.a,
|
|
CONST_STR_LEN("server.h2proto")), 1);
|
|
if (srv->srvconf.h2proto)
|
|
srv->srvconf.h2proto +=
|
|
config_plugin_value_to_bool(
|
|
array_get_element_klen(cpv->v.a,
|
|
CONST_STR_LEN("server.h2c")), 1);
|
|
srv->srvconf.absolute_dir_redirect =
|
|
config_plugin_value_to_bool(
|
|
array_get_element_klen(cpv->v.a,
|
|
CONST_STR_LEN("server.absolute-dir-redirect")), 0);
|
|
break;
|
|
default:/* should not happen */
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (0 == srv->srvconf.port)
|
|
srv->srvconf.port = ssl_enabled ? 443 : 80;
|
|
|
|
if (config_feature_bool(srv, "server.h2proto", 1))
|
|
array_insert_value(srv->srvconf.modules, CONST_STR_LEN("mod_h2"));
|
|
|
|
config_deprecate_module_compress(srv);
|
|
config_check_module_duplicates(srv);
|
|
|
|
if (srv->srvconf.compat_module_load)
|
|
config_compat_module_load(srv);
|
|
|
|
if (srv->srvconf.http_url_normalize)
|
|
config_burl_normalize_cond(srv);
|
|
|
|
if (!config_pcre_keyvalue(srv))
|
|
rc = HANDLER_ERROR;
|
|
|
|
free(srvplug.cvlist);
|
|
return rc;
|
|
}
|
|
|
|
/* common media types for the web
|
|
*
|
|
* references:
|
|
*
|
|
* lighttpd doc/scripts/create-mime.pl
|
|
* https://developer.mozilla.org/en-US/docs/Web/HTTP/Basics_of_HTTP/MIME_types
|
|
* https://developer.mozilla.org/en-US/docs/Web/Media/Formats/Image_types
|
|
* https://docs.w3cub.com/http/basics_of_http/mime_types
|
|
* http://www.iana.org/assignments/media-types/media-types.xhtml
|
|
* https://salsa.debian.org/debian/media-types/-/blob/master/mime.types
|
|
* https://src.fedoraproject.org/rpms/mailcap/tree/rawhide
|
|
* https://pagure.io/mailcap/blob/master/f/mime.types
|
|
*
|
|
*/
|
|
__attribute_cold__
|
|
static void config_mimetypes_default(array * const a) {
|
|
static const char * const mimetypes_default[] = {
|
|
/*(order not important)*/
|
|
|
|
".html", "text/html"
|
|
,".htm", "text/html"
|
|
,".txt", "text/plain;charset=utf-8"
|
|
,".text", "text/plain;charset=utf-8"
|
|
,".css", "text/css;charset=utf-8"
|
|
,".js", "text/javascript"
|
|
,".mjs", "text/javascript"
|
|
,".xml", "text/xml"
|
|
|
|
,".aac", "audio/aac"
|
|
,".flac", "audio/flac" /* alt: "audio/x-flac" */
|
|
,".m4a", "audio/mp4"
|
|
,".mp3", "audio/mpeg"
|
|
,".oga", "audio/ogg"
|
|
,".ogg", "audio/ogg"
|
|
,".opus", "audio/opus"
|
|
,".wav", "audio/x-wav"
|
|
,".weba", "audio/webm"
|
|
,".ogx", "application/ogg"
|
|
|
|
,".apng", "image/apng" /* alt: "image/vnd.mozilla.apng" */
|
|
,".avif", "image/avif"
|
|
,".bmp", "image/bmp"
|
|
,".gif", "image/gif"
|
|
,".jpeg", "image/jpeg"
|
|
,".jpg", "image/jpeg"
|
|
,".png", "image/png"
|
|
,".svg", "image/svg+xml"
|
|
,".svgz", "image/svg+xml"
|
|
,".tiff", "image/tiff"
|
|
,".webp", "image/webp"
|
|
|
|
,".avi", "video/x-msvideo"
|
|
,".mkv", "video/x-matroska"
|
|
,".m4v", "video/mp4"
|
|
,".mp4", "video/mp4"
|
|
,".mpeg", "video/mpeg"
|
|
,".mpg", "video/mpeg"
|
|
,".ogv", "video/ogg"
|
|
,".mov", "video/quicktime"
|
|
,".qt", "video/quicktime"
|
|
,".webm", "video/webm"
|
|
|
|
,".json", "application/json"
|
|
,".dtd", "application/xml-dtd"
|
|
,".pdf", "application/pdf"
|
|
,".xhtml", "application/xhtml+xml"
|
|
|
|
,".eot", "application/vnd.ms-fontobject"
|
|
,".otf", "font/otf"
|
|
,".sfnt", "font/sfnt"
|
|
,".ttc", "font/collection"
|
|
,".ttf", "font/ttf"
|
|
,".woff", "font/woff"
|
|
,".woff2", "font/woff2"
|
|
|
|
,".conf", "text/plain"
|
|
,".log", "text/plain"
|
|
,".csv", "text/csv"
|
|
,".rtf", "text/rtf"
|
|
,".ics", "text/calendar"
|
|
,".md", "text/markdown;charset=utf-8"
|
|
,".ico", "image/vnd.microsoft.icon" /* alt: "image/x-icon" */
|
|
|
|
/* "application/octet-stream" okay to trigger download for archives,
|
|
* but providing type (even if explicit "application/octet-stream")
|
|
* allows http_response_send_file() to send ETag and Last-Modified.
|
|
* (implicit "application/octet-stream" would omit caching headers
|
|
* when type is not found in mimetype.assign (or xattr, if enabled)) */
|
|
|
|
,".7z", "application/x-7z-compressed"
|
|
,".bz2", "application/x-bzip2"
|
|
,".gz", "application/gzip" /* alt: "application/x-gzip" */
|
|
,".rar", "application/vnd.rar"
|
|
,".tar", "application/x-tar"
|
|
,".tar.gz","application/x-gtar-compressed"
|
|
,".tgz", "application/x-gtar-compressed"
|
|
,".xz", "application/x-xz"
|
|
,".zip", "application/zip"
|
|
,".zst", "application/zstd"
|
|
|
|
,".bin", "application/octet-stream"
|
|
,".class", "application/java-vm"
|
|
,".dll", "application/x-msdos-program"
|
|
,".exe", "application/x-msdos-program"
|
|
,".img", "application/octet-stream"
|
|
,".iso", "application/x-iso9660-image"
|
|
,".jar", "application/java-archive"
|
|
,".lha", "application/x-lha"
|
|
,".lhz", "application/x-lzh"
|
|
,".so", "application/octet-stream"
|
|
,".torrent","application/x-bittorrent"
|
|
|
|
,".deb", "application/vnd.debian.binary-package"
|
|
,".dmg", "application/x-apple-diskimage"
|
|
,".rpm","application/x-redhat-package-manager"/*alt:"application/x-rpm"*/
|
|
,".sig", "application/pgp-signature"
|
|
|
|
,"README", "text/plain;charset=utf-8"
|
|
|
|
,"", "application/octet-stream"
|
|
};
|
|
|
|
uint32_t i = 0;
|
|
do {
|
|
array_set_key_value(a, mimetypes_default[i],
|
|
strlen(mimetypes_default[i]),
|
|
mimetypes_default[i+1],
|
|
strlen(mimetypes_default[i+1]));
|
|
} while ((i+=2) < sizeof(mimetypes_default)/sizeof(*mimetypes_default));
|
|
}
|
|
|
|
static int config_insert(server *srv) {
|
|
static const config_plugin_keys_t cpk[] = {
|
|
{ CONST_STR_LEN("server.document-root"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.name"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.tag"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.max-request-size"),
|
|
T_CONFIG_INT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.max-keep-alive-requests"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.max-keep-alive-idle"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.max-read-idle"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.max-write-idle"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.errorfile-prefix"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.error-handler"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.error-handler-404"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.error-intercept"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.force-lowercase-filenames"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.follow-symlink"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.protocol-http11"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.range-requests"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.stream-request-body"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.stream-response-body"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.kbytes-per-second"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("connection.kbytes-per-second"),
|
|
T_CONFIG_SHORT,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("mimetype.assign"),
|
|
T_CONFIG_ARRAY_KVSTRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("mimetype.use-xattr"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("etag.use-inode"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("etag.use-mtime"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("etag.use-size"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("debug.log-condition-handling"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("debug.log-file-not-found"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("debug.log-request-handling"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("debug.log-request-header"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("debug.log-response-header"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("debug.log-timeouts"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("debug.log-state-handling"),
|
|
T_CONFIG_BOOL,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.errorlog"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ CONST_STR_LEN("server.breakagelog"),
|
|
T_CONFIG_STRING,
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
,{ NULL, 0,
|
|
T_CONFIG_UNSET,
|
|
T_CONFIG_SCOPE_UNSET }
|
|
};
|
|
|
|
int rc = 0;
|
|
config_data_base * const p = ck_calloc(1, sizeof(config_data_base));
|
|
srv->config_data_base = p;
|
|
|
|
if (!config_plugin_values_init(srv, p, cpk, "base"))
|
|
return HANDLER_ERROR;
|
|
|
|
/* process and validate T_CONFIG_SCOPE_CONNECTION config directives
|
|
* (init i to 0 if global context; to 1 to skip empty global context) */
|
|
for (int i = !p->cvlist[0].v.u2[1]; i < p->nconfig; ++i) {
|
|
config_plugin_value_t *cpv = p->cvlist + p->cvlist[i].v.u2[0];
|
|
for (; -1 != cpv->k_id; ++cpv) {
|
|
switch (cpv->k_id) {
|
|
case 0: /* server.document-root */
|
|
break;
|
|
case 1: /* server.name */
|
|
if (buffer_is_blank(cpv->v.b))
|
|
cpv->v.b = NULL;
|
|
break;
|
|
case 2: /* server.tag */
|
|
if (!buffer_is_blank(cpv->v.b)) {
|
|
buffer *b;
|
|
*(const buffer **)&b = cpv->v.b;
|
|
for (char *t=strchr(b->ptr,'\n'); t; t=strchr(t+2,'\n')) {
|
|
/* not expecting admin to define multi-line server.tag,
|
|
* but ensure server_tag has proper header continuation,
|
|
* if needed */
|
|
if (t[1] == ' ' || t[1] == '\t') continue;
|
|
off_t off = t - b->ptr;
|
|
size_t len = buffer_clen(b);
|
|
buffer_string_prepare_append(b, 1);
|
|
t = b->ptr+off;
|
|
memmove(t+2, t+1, len - off - 1);
|
|
t[1] = ' ';
|
|
buffer_commit(b, 1);
|
|
}
|
|
char *t = b->ptr; /*(make empty if tag is whitespace-only)*/
|
|
while (*t==' ' || *t=='\t' || *t=='\r' || *t=='\n') ++t;
|
|
if (*t == '\0') buffer_truncate(b, 0);
|
|
if (buffer_is_blank(b) && 0 != i)
|
|
cpv->v.b = NULL;
|
|
else { /* prep for use by h2.c:h2_send_headers() */
|
|
buffer_string_prepare_append(b, 6);
|
|
memcpy(b->ptr+buffer_clen(b)+1, "server", 6);
|
|
}
|
|
}
|
|
else if (0 != i)
|
|
cpv->v.b = NULL;
|
|
break;
|
|
case 3: /* server.max-request-size */
|
|
case 4: /* server.max-keep-alive-requests */
|
|
case 5: /* server.max-keep-alive-idle */
|
|
case 6: /* server.max-read-idle */
|
|
case 7: /* server.max-write-idle */
|
|
break;
|
|
case 8: /* server.errorfile-prefix */
|
|
case 9: /* server.error-handler */
|
|
case 10:/* server.error-handler-404 */
|
|
if (buffer_is_blank(cpv->v.b))
|
|
cpv->v.b = NULL;
|
|
break;
|
|
case 11:/* server.error-intercept */
|
|
case 12:/* server.force-lowercase-filenames */
|
|
break;
|
|
case 13:/* server.follow-symlink */
|
|
#ifndef HAVE_LSTAT
|
|
#ifndef _WIN32
|
|
if (0 == cpv->v.u)
|
|
log_warn(srv->errh, __FILE__, __LINE__,
|
|
"Your system lacks lstat(). "
|
|
"We can not differentiate symlinks from files. "
|
|
"Please remove server.follow-symlink from your config.");
|
|
#endif
|
|
#endif
|
|
break;
|
|
case 14:/* server.protocol-http11 */
|
|
case 15:/* server.range-requests */
|
|
break;
|
|
case 16:/* server.stream-request-body */
|
|
if (cpv->v.shrt & FDEVENT_STREAM_REQUEST_BUFMIN)
|
|
cpv->v.shrt |=FDEVENT_STREAM_REQUEST;
|
|
break;
|
|
case 17:/* server.stream-response-body */
|
|
if (cpv->v.shrt & FDEVENT_STREAM_RESPONSE_BUFMIN)
|
|
cpv->v.shrt |=FDEVENT_STREAM_RESPONSE;
|
|
break;
|
|
case 18:{/*server.kbytes-per-second */
|
|
off_t * const cnt = ck_malloc(2*sizeof(off_t));
|
|
cnt[0] = 0;
|
|
cnt[1] = (off_t)cpv->v.shrt << 10;
|
|
cpv->v.v = cnt;
|
|
cpv->vtype = T_CONFIG_LOCAL;
|
|
break;
|
|
}
|
|
case 19:/* connection.kbytes-per-second */
|
|
break;
|
|
case 20:{/* mimetype.assign */
|
|
/* translate "application/javascript" to "text/javascript" */
|
|
data_string * const ds = (data_string *)
|
|
array_get_data_unset(cpv->v.a, CONST_STR_LEN(".js"));
|
|
if (NULL != ds /*(note: this does not catch w/ ";charset=...")*/
|
|
&& buffer_eq_slen(&ds->value,
|
|
CONST_STR_LEN("application/javascript")))
|
|
buffer_copy_string_len(&ds->value,
|
|
CONST_STR_LEN("text/javascript"));
|
|
break;
|
|
}
|
|
case 21:/* mimetype.use-xattr */
|
|
case 22:/* etag.use-inode */
|
|
case 23:/* etag.use-mtime */
|
|
case 24:/* etag.use-size */
|
|
case 25:/* debug.log-condition-handling */
|
|
case 26:/* debug.log-file-not-found */
|
|
case 27:/* debug.log-request-handling */
|
|
case 28:/* debug.log-request-header */
|
|
case 29:/* debug.log-response-header */
|
|
case 30:/* debug.log-timeouts */
|
|
case 31:/* debug.log-state-handling */
|
|
case 32:/* server.errorlog *//*must match config_log_error_open*/
|
|
case 33:/* server.breakagelog */ /* match config_log_error_open*/
|
|
break;
|
|
default:/* should not happen */
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
p->defaults.errh = srv->errh;
|
|
p->defaults.max_keep_alive_requests = 1000;
|
|
p->defaults.max_keep_alive_idle = 5;
|
|
p->defaults.max_read_idle = 60;
|
|
p->defaults.max_write_idle = 360;
|
|
p->defaults.follow_symlink = 1;
|
|
p->defaults.allow_http11 = 1;
|
|
p->defaults.etag_flags = ETAG_USE_INODE | ETAG_USE_MTIME | ETAG_USE_SIZE;
|
|
p->defaults.range_requests = 1;
|
|
/* use 2 to detect later if value is set by user config in global section */
|
|
p->defaults.force_lowercase_filenames = 2;
|
|
|
|
/*(global, but store in r->conf.http_parseopts)*/
|
|
p->defaults.http_parseopts =
|
|
(srv->srvconf.http_header_strict ? HTTP_PARSEOPT_HEADER_STRICT :0)
|
|
| (srv->srvconf.http_host_strict ? (HTTP_PARSEOPT_HOST_STRICT
|
|
|HTTP_PARSEOPT_HOST_NORMALIZE) :0)
|
|
| (srv->srvconf.http_host_normalize ? HTTP_PARSEOPT_HOST_NORMALIZE :0)
|
|
| (srv->srvconf.http_method_get_body ? HTTP_PARSEOPT_METHOD_GET_BODY :0);
|
|
p->defaults.http_parseopts |= srv->srvconf.http_url_normalize;
|
|
p->defaults.mimetypes = &srv->srvconf.mimetypes_default;/*must not be NULL*/
|
|
p->defaults.h2proto = srv->srvconf.h2proto;
|
|
p->defaults.http_pathinfo =
|
|
config_feature_bool(srv, "server.http-pathinfo", 1);
|
|
|
|
/* initialize p->defaults from global config context */
|
|
if (p->nconfig > 0 && p->cvlist->v.u2[1]) {
|
|
const config_plugin_value_t *cpv = p->cvlist + p->cvlist->v.u2[0];
|
|
if (-1 != cpv->k_id)
|
|
config_merge_config(&p->defaults, cpv);
|
|
}
|
|
|
|
if (p->defaults.mimetypes == &srv->srvconf.mimetypes_default)
|
|
config_mimetypes_default(&srv->srvconf.mimetypes_default);
|
|
|
|
/* (after processing config defaults) */
|
|
p->defaults.max_request_field_size = srv->srvconf.max_request_field_size;
|
|
p->defaults.log_request_header_on_error =
|
|
srv->srvconf.log_request_header_on_error;
|
|
if (p->defaults.log_request_handling || p->defaults.log_request_header)
|
|
p->defaults.log_request_header_on_error = 1;
|
|
|
|
request_config_set_defaults(&p->defaults);
|
|
|
|
return rc;
|
|
}
|
|
|
|
int config_finalize(server *srv, const buffer *default_server_tag) {
|
|
/* (call after plugins_call_set_defaults()) */
|
|
|
|
config_data_base * const p = srv->config_data_base;
|
|
|
|
/* settings might be enabled during plugins_call_set_defaults() */
|
|
p->defaults.high_precision_timestamps =
|
|
srv->srvconf.high_precision_timestamps =
|
|
config_feature_bool(srv, "server.metrics-high-precision",
|
|
srv->srvconf.high_precision_timestamps);
|
|
|
|
/* disable h2proto if mod_h2 was not found during plugin load */
|
|
p->defaults.h2proto = srv->srvconf.h2proto;
|
|
|
|
/* configure default server_tag if not set
|
|
* (if configured to blank, unset server_tag)*/
|
|
if (!p->defaults.server_tag)
|
|
p->defaults.server_tag = default_server_tag;
|
|
else if (buffer_is_blank(p->defaults.server_tag))
|
|
p->defaults.server_tag = NULL;
|
|
|
|
/* dump unused config keys */
|
|
for (uint32_t i = 0; i < srv->config_context->used; ++i) {
|
|
array *config = ((data_config *)srv->config_context->data[i])->value;
|
|
for (uint32_t j = 0; config && j < config->used; ++j) {
|
|
const buffer * const k = &config->data[j]->key;
|
|
|
|
/* all var.* is known as user defined variable */
|
|
if (strncmp(k->ptr, "var.", sizeof("var.") - 1) == 0)
|
|
continue;
|
|
/* mod_dirlisting not loaded if dir-listing.activate not enabled */
|
|
if (strncmp(k->ptr, "dir-listing.", sizeof("dir-listing.") - 1) == 0
|
|
&& strcmp(k->ptr, "dir-listing.activate") != 0)
|
|
continue;
|
|
|
|
if (!array_get_element_klen(srv->srvconf.config_touched,
|
|
BUF_PTR_LEN(k)))
|
|
log_warn(srv->errh, __FILE__, __LINE__,
|
|
"WARNING: unknown config-key: %s (ignored)", k->ptr);
|
|
}
|
|
}
|
|
|
|
array_free(srv->srvconf.config_touched);
|
|
srv->srvconf.config_touched = NULL;
|
|
|
|
if (srv->srvconf.config_unsupported || srv->srvconf.config_deprecated) {
|
|
if (srv->srvconf.config_unsupported)
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"Configuration contains unsupported keys. Going down.");
|
|
if (srv->srvconf.config_deprecated)
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"Configuration contains deprecated keys. Going down.");
|
|
return 0;
|
|
}
|
|
|
|
/* check if condition regex captures are used by modules (redirect,rewrite)
|
|
* and convert back to regex if condition was simplified to non-regex by
|
|
* configparser_simplify_regex() */
|
|
if (__builtin_expect( (srv->config_captures != 0), 0)) {
|
|
for (uint32_t i = 1; i < srv->config_context->used; ++i) {
|
|
data_config * const dc =
|
|
(data_config *)srv->config_context->data[i];
|
|
if (__builtin_expect( (0 == dc->capture_idx), 1))
|
|
continue;
|
|
switch (dc->cond) {
|
|
case CONFIG_COND_EQ:
|
|
case CONFIG_COND_PREFIX:
|
|
case CONFIG_COND_SUFFIX:
|
|
break;
|
|
/*case CONFIG_COND_NE:*/
|
|
/*case CONFIG_COND_MATCH:*/
|
|
/*case CONFIG_COND_NOMATCH:*/
|
|
/*case CONFIG_COND_ELSE:*/
|
|
default:
|
|
continue;
|
|
}
|
|
buffer * const b = &dc->string;
|
|
if (dc->cond != CONFIG_COND_SUFFIX || b->ptr[0] == '.') {
|
|
buffer_extend(b, 1);
|
|
memmove(b->ptr+1, b->ptr, buffer_clen(b)-1);
|
|
b->ptr[0] = (dc->cond == CONFIG_COND_SUFFIX) ? '\\' : '^';
|
|
}
|
|
if (dc->cond != CONFIG_COND_PREFIX)
|
|
buffer_append_char(b, '$');
|
|
dc->cond = CONFIG_COND_MATCH;
|
|
/*(config_pcre_keyvalue())*/
|
|
const int pcre_jit = config_feature_bool(srv, "server.pcre_jit", 1);
|
|
if (!data_config_pcre_compile(dc, pcre_jit, srv->errh))
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
#ifdef HAVE_PCRE2_H
|
|
for (uint32_t i = 1; i < srv->config_context->used; ++i) {
|
|
data_config * const dc =
|
|
(data_config *)srv->config_context->data[i];
|
|
if ((dc->cond == CONFIG_COND_MATCH || dc->cond == CONFIG_COND_NOMATCH)
|
|
&& 0 == dc->capture_idx) {
|
|
if (__builtin_expect( (NULL == srv->match_data), 0)) {
|
|
#if 0
|
|
/* calculate max output vector size to save a few bytes;
|
|
* currently using hard-coded ovec_max = 10 below
|
|
* (increase in code size is probably more than bytes saved) */
|
|
uint32_t ovec_max = 0;
|
|
for (uint32_t j = i; j < srv->config_context->used; ++j) {
|
|
const data_config * const dc =
|
|
(data_config *)srv->config_context->data[j];
|
|
if ((dc->cond == CONFIG_COND_MATCH
|
|
|| dc->cond == CONFIG_COND_NOMATCH)
|
|
&& 0 == dc->capture_idx) {
|
|
uint32_t v;
|
|
if (0==pcre2_pattern_info(dc->code,
|
|
PCRE2_INFO_CAPTURECOUNT,&v)) {
|
|
if (ovec_max < v)
|
|
ovec_max = v;
|
|
}
|
|
}
|
|
}
|
|
#else
|
|
uint32_t ovec_max = 10;
|
|
#endif
|
|
srv->match_data = pcre2_match_data_create(ovec_max, NULL);
|
|
force_assert(srv->match_data);
|
|
}
|
|
dc->match_data = srv->match_data;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
/* Save some bytes using buffer_append_string() in cold funcs to print config
|
|
* (instead of buffer_append_string_len() w/ CONST_STR_LEN() on constant strs)*/
|
|
|
|
static void config_print_by_type(const data_unset *du, buffer *b, int depth);
|
|
|
|
static void config_print_indent(buffer *b, int depth) {
|
|
depth <<= 2;
|
|
memset(buffer_extend(b, depth), ' ', depth);
|
|
}
|
|
|
|
__attribute_pure__
|
|
static uint32_t config_print_array_max_klen(const array * const a) {
|
|
uint32_t maxlen = 0;
|
|
for (uint32_t i = 0; i < a->used; ++i) {
|
|
uint32_t len = buffer_clen(&a->data[i]->key);
|
|
if (maxlen < len)
|
|
maxlen = len;
|
|
}
|
|
return maxlen;
|
|
}
|
|
|
|
static void config_print_array(const array * const a, buffer * const b, int depth) {
|
|
if (a->used <= 5 && (!a->used || buffer_is_unset(&a->data[0]->key))) {
|
|
int oneline = 1;
|
|
for (uint32_t i = 0; i < a->used; ++i) {
|
|
data_unset *du = a->data[i];
|
|
if (du->type != TYPE_STRING && du->type != TYPE_INTEGER) {
|
|
oneline = 0;
|
|
break;
|
|
}
|
|
}
|
|
if (oneline) {
|
|
buffer_append_string(b, "(");
|
|
for (uint32_t i = 0; i < a->used; ++i) {
|
|
if (i != 0)
|
|
buffer_append_string(b, ", ");
|
|
config_print_by_type(a->data[i], b, depth + 1);
|
|
}
|
|
buffer_append_string(b, ")");
|
|
return;
|
|
}
|
|
}
|
|
|
|
const uint32_t maxlen = config_print_array_max_klen(a);
|
|
buffer_append_string(b, "(\n");
|
|
for (uint32_t i = 0; i < a->used; ++i) {
|
|
config_print_indent(b, depth + 1);
|
|
data_unset *du = a->data[i];
|
|
if (!buffer_is_unset(&du->key)) {
|
|
buffer_append_str3(b, CONST_STR_LEN("\""),
|
|
BUF_PTR_LEN(&du->key),
|
|
CONST_STR_LEN("\""));
|
|
int indent = (int)(maxlen - buffer_clen(&du->key));
|
|
if (indent > 0)
|
|
memset(buffer_extend(b, indent), ' ', indent);
|
|
buffer_append_string(b, " => ");
|
|
}
|
|
config_print_by_type(du, b, depth + 1);
|
|
buffer_append_string(b, ",\n");
|
|
}
|
|
config_print_indent(b, depth);
|
|
buffer_append_string(b, ")");
|
|
}
|
|
|
|
static void config_print_config(const data_unset *d, buffer * const b, int depth) {
|
|
data_config *dc = (data_config *)d;
|
|
array *a = (array *)dc->value;
|
|
|
|
if (0 == dc->context_ndx) {
|
|
buffer_append_string(b, "config {\n");
|
|
}
|
|
else {
|
|
if (dc->cond != CONFIG_COND_ELSE) {
|
|
buffer_append_string(b, "if ");
|
|
buffer_append_string(b, dc->comp_key);
|
|
buffer_append_string(b, " ");
|
|
}
|
|
buffer_append_string(b, "{\n");
|
|
config_print_indent(b, depth + 1);
|
|
buffer_append_string(b, "# block ");
|
|
buffer_append_int(b, dc->context_ndx);
|
|
buffer_append_string(b, "\n");
|
|
}
|
|
++depth;
|
|
|
|
const uint32_t maxlen = config_print_array_max_klen(a);
|
|
for (uint32_t i = 0; i < a->used; ++i) {
|
|
config_print_indent(b, depth);
|
|
data_unset *du = a->data[i];
|
|
buffer_append_string_buffer(b, &du->key);
|
|
int indent = (int)(maxlen - buffer_clen(&du->key));
|
|
if (indent > 0)
|
|
memset(buffer_extend(b, indent), ' ', indent);
|
|
buffer_append_string(b, " = ");
|
|
config_print_by_type(du, b, depth);
|
|
buffer_append_string(b, "\n");
|
|
}
|
|
|
|
buffer_append_string(b, "\n");
|
|
for (uint32_t i = 0; i < dc->children.used; ++i) {
|
|
data_config *dcc = dc->children.data[i];
|
|
|
|
/* only the 1st block of chaining */
|
|
if (NULL == dcc->prev) {
|
|
buffer_append_string(b, "\n");
|
|
config_print_indent(b, depth);
|
|
config_print_by_type((data_unset *) dcc, b, depth);
|
|
buffer_append_string(b, "\n");
|
|
}
|
|
}
|
|
|
|
--depth;
|
|
config_print_indent(b, depth);
|
|
buffer_append_string(b, "}");
|
|
if (0 != dc->context_ndx) {
|
|
buffer_append_string(b, " # end of ");
|
|
buffer_append_string(b, (dc->cond != CONFIG_COND_ELSE)
|
|
? dc->comp_key
|
|
: "else");
|
|
}
|
|
|
|
if (dc->next) {
|
|
buffer_append_string(b, "\n");
|
|
config_print_indent(b, depth);
|
|
buffer_append_string(b, "else ");
|
|
config_print_by_type((data_unset *)dc->next, b, depth);
|
|
}
|
|
}
|
|
|
|
static void config_print_string(const data_unset *du, buffer * const b) {
|
|
/* print out the string as is, except prepend '"' with backslash */
|
|
const buffer * const vb = &((data_string *)du)->value;
|
|
char *dst = buffer_string_prepare_append(b, buffer_clen(vb)*2);
|
|
uint32_t n = 0;
|
|
dst[n++] = '"';
|
|
if (vb->ptr) {
|
|
for (const char *p = vb->ptr; *p; ++p) {
|
|
if (*p == '"')
|
|
dst[n++] = '\\';
|
|
dst[n++] = *p;
|
|
}
|
|
}
|
|
dst[n++] = '"';
|
|
buffer_commit(b, n);
|
|
}
|
|
|
|
__attribute_cold__
|
|
static void config_print_by_type(const data_unset * const du, buffer * const b, int depth) {
|
|
switch (du->type) {
|
|
case TYPE_STRING:
|
|
config_print_string(du, b);
|
|
break;
|
|
case TYPE_INTEGER:
|
|
buffer_append_int(b, ((data_integer *)du)->value);
|
|
break;
|
|
case TYPE_ARRAY:
|
|
config_print_array(&((data_array *)du)->value, b, depth);
|
|
break;
|
|
case TYPE_CONFIG:
|
|
config_print_config(du, b, depth);
|
|
break;
|
|
default:
|
|
/*if (du->fn->print) du->fn->print(du, b, depth);*/
|
|
break;
|
|
}
|
|
}
|
|
|
|
void config_print(server *srv) {
|
|
buffer_clear(srv->tmp_buf);
|
|
data_unset *dc = srv->config_context->data[0];
|
|
config_print_by_type(dc, srv->tmp_buf, 0);
|
|
}
|
|
|
|
void config_free(server *srv) {
|
|
/*request_config_set_defaults(NULL);*//*(not necessary)*/
|
|
config_free_config(srv->config_data_base);
|
|
|
|
array_free(srv->config_context);
|
|
array_free(srv->srvconf.config_touched);
|
|
array_free(srv->srvconf.modules);
|
|
array_free(srv->srvconf.upload_tempdirs);
|
|
array_free_data(&srv->srvconf.mimetypes_default);
|
|
#ifdef HAVE_PCRE2_H
|
|
if (NULL == srv->match_data) pcre2_match_data_free(srv->match_data);
|
|
#endif
|
|
}
|
|
|
|
void config_init(server *srv) {
|
|
srv->config_context = array_init(16);
|
|
srv->srvconf.config_touched = array_init(128);
|
|
|
|
srv->srvconf.port = 0;
|
|
srv->srvconf.dont_daemonize = 0;
|
|
srv->srvconf.preflight_check = 0;
|
|
srv->srvconf.compat_module_load = 1;
|
|
srv->srvconf.systemd_socket_activation = 0;
|
|
|
|
srv->srvconf.high_precision_timestamps = 0;
|
|
srv->srvconf.max_request_field_size = 8192;
|
|
|
|
srv->srvconf.http_header_strict = 1;
|
|
srv->srvconf.http_host_strict = 1; /*(implies http_host_normalize)*/
|
|
srv->srvconf.http_host_normalize = 0;
|
|
srv->srvconf.http_url_normalize =
|
|
HTTP_PARSEOPT_URL_NORMALIZE
|
|
| HTTP_PARSEOPT_URL_NORMALIZE_UNRESERVED
|
|
| HTTP_PARSEOPT_URL_NORMALIZE_CTRLS_REJECT
|
|
| HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE
|
|
| HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REMOVE
|
|
| HTTP_PARSEOPT_URL_NORMALIZE_INVALID_UTF8_REJECT;
|
|
|
|
srv->srvconf.modules = array_init(16);
|
|
srv->srvconf.modules_dir = LIBRARY_DIR;
|
|
srv->srvconf.upload_tempdirs = array_init(2);
|
|
}
|
|
|
|
/**
|
|
* open the errorlog
|
|
*
|
|
* we have 4 possibilities:
|
|
* - stderr (default)
|
|
* - syslog
|
|
* - logfile
|
|
* - pipe
|
|
*
|
|
*/
|
|
|
|
static void config_log_error_open_syslog(server *srv, log_error_st *errh, const buffer *syslog_facility) {
|
|
#ifdef HAVE_SYSLOG_H
|
|
/*assert(errh->mode == FDLOG_FD);*/
|
|
/*assert(errh->fd == STDERR_FILENO);*/
|
|
errh->mode = FDLOG_SYSLOG;
|
|
errh->fd = -1;
|
|
fdlog_openlog(srv->errh, syslog_facility);
|
|
#else
|
|
UNUSED(srv);
|
|
UNUSED(errh);
|
|
UNUSED(syslog_facility);
|
|
#endif
|
|
}
|
|
|
|
int config_log_error_open(server *srv) {
|
|
/* logs are opened after preflight check (srv->srvconf.preflight_check)
|
|
* and after dropping privileges instead of being opened during config
|
|
* processing */
|
|
#ifdef __clang_analyzer__
|
|
force_assert(srv->errh);
|
|
#endif
|
|
|
|
config_data_base * const p = srv->config_data_base;
|
|
log_error_st *serrh = NULL;
|
|
|
|
/* future: might be slightly faster to have allocated array of open files
|
|
* rather than walking config, but only might matter with many directives */
|
|
/* (init i to 0 if global context; to 1 to skip empty global context) */
|
|
for (int i = !p->cvlist[0].v.u2[1]; i < p->nconfig; ++i) {
|
|
config_plugin_value_t *cpv = p->cvlist + p->cvlist[i].v.u2[0];
|
|
for (; -1 != cpv->k_id; ++cpv) {
|
|
const char *fn = NULL;
|
|
log_error_st *errh = NULL;
|
|
switch (cpv->k_id) {
|
|
/* NB: these indexes are repeated below switch() block
|
|
* and all must stay in sync with configfile.c */
|
|
case 32:/* server.errorlog */
|
|
if (0 == i) {
|
|
if (srv->srvconf.errorlog_use_syslog) continue;
|
|
errh = srv->errh;
|
|
}
|
|
__attribute_fallthrough__
|
|
case 33:/* server.breakagelog */
|
|
if (!buffer_is_blank(cpv->v.b)) fn = cpv->v.b->ptr;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if (NULL == fn) continue;
|
|
|
|
fdlog_st * const fdlog = fdlog_open(fn);
|
|
if (NULL == fdlog) {
|
|
log_perror(srv->errh, __FILE__, __LINE__,
|
|
"opening errorlog '%s' failed", fn);
|
|
return -1;
|
|
}
|
|
|
|
if (errh) {
|
|
/*(logfiles are opened early in setup; this function is called
|
|
* prior to set_defaults hook, and modules should not save a
|
|
* pointer to srv->errh until set_defaults hook or later)*/
|
|
p->defaults.errh = srv->errh = fdlog;
|
|
log_set_global_errh(srv->errh, 0);
|
|
}
|
|
cpv->v.v = errh = fdlog;
|
|
cpv->vtype = T_CONFIG_LOCAL;
|
|
|
|
if (0 == i && errh != srv->errh) /*(top-level server.breakagelog)*/
|
|
serrh = errh;
|
|
}
|
|
}
|
|
|
|
if (config_feature_bool(srv, "server.errorlog-high-precision", 0))
|
|
log_set_global_errh(srv->errh, 1);
|
|
|
|
if (srv->srvconf.errorlog_use_syslog) /*(restricted to global scope)*/
|
|
config_log_error_open_syslog(srv, srv->errh,
|
|
srv->srvconf.syslog_facility);
|
|
else if (srv->errh->mode == FDLOG_FD && !srv->srvconf.dont_daemonize)
|
|
srv->errh->fd = -1;
|
|
/* We can only log to stderr in dont-daemonize mode;
|
|
* if we do daemonize and no errorlog file is specified,
|
|
* we log into /dev/null
|
|
*/
|
|
|
|
/* Note: serrh should not be stored in p->defaults.serrh
|
|
* If left as NULL, scripts (e.g. mod_cgi and mod_ssi exec) will inherit
|
|
* the current STDERR_FILENO, which already is the top-level breakagelog. */
|
|
/*p->defaults.serrh = serrh;*/
|
|
|
|
int errfd;
|
|
if (NULL != serrh) {
|
|
if (srv->errh->mode == FDLOG_FD) {
|
|
srv->errh->fd = dup(STDERR_FILENO);
|
|
fdevent_setfd_cloexec(srv->errh->fd);
|
|
}
|
|
|
|
errfd = serrh->fd;
|
|
if (*serrh->fn == '|') fdlog_pipe_serrh(errfd); /* breakagelog */
|
|
}
|
|
else if (!srv->srvconf.dont_daemonize) {
|
|
/* move STDERR_FILENO to /dev/null */
|
|
if (-1 == (errfd = fdevent_open_devnull())) {
|
|
log_perror(srv->errh,__FILE__,__LINE__,"opening /dev/null failed");
|
|
return -1;
|
|
}
|
|
}
|
|
else {
|
|
/*(leave STDERR_FILENO as-is)*/
|
|
errfd = -1;
|
|
}
|
|
|
|
#ifdef _WIN32
|
|
if (-1 == errfd) {
|
|
}
|
|
else if (-1 != _dup2(errfd, STDERR_FILENO)
|
|
&& SetStdHandle(STD_ERROR_HANDLE,
|
|
(HANDLE)_get_osfhandle(STDERR_FILENO))) {
|
|
fdevent_setfd_cloexec(STDERR_FILENO);
|
|
}
|
|
else
|
|
#else
|
|
if (0 != fdevent_set_stdin_stdout_stderr(-1, -1, errfd))
|
|
#endif
|
|
{
|
|
log_perror(srv->errh, __FILE__, __LINE__, "setting stderr failed");
|
|
#ifdef FD_CLOEXEC
|
|
if (-1 != errfd && NULL == serrh) close(errfd);
|
|
#endif
|
|
return -1;
|
|
}
|
|
#ifdef FD_CLOEXEC
|
|
if (-1 != errfd && NULL == serrh) close(errfd);
|
|
#endif
|
|
|
|
if (NULL != serrh) {
|
|
close(errfd); /* serrh->fd */
|
|
serrh->fd = STDERR_FILENO;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
void config_log_error_close(server *srv) {
|
|
config_data_base * const p = srv->config_data_base;
|
|
if (NULL == p) return;
|
|
|
|
/*(reset serrh just in case; should not be used after this func returns)*/
|
|
p->defaults.serrh = NULL;
|
|
|
|
fdlog_closeall(srv->errh); /*(close all except srv->errh)*/
|
|
|
|
if (srv->errh->mode == FDLOG_SYSLOG) {
|
|
srv->errh->mode = FDLOG_FD;
|
|
srv->errh->fd = STDERR_FILENO;
|
|
}
|
|
#ifdef HAVE_SYSLOG_H
|
|
fdlog_closelog();
|
|
#endif
|
|
}
|
|
|
|
|
|
|
|
typedef struct {
|
|
int offset;
|
|
int size;
|
|
const char *input;
|
|
buffer *token;
|
|
|
|
char in_key;
|
|
char parens;
|
|
char in_cond;
|
|
char simulate_eol;
|
|
|
|
int tid;
|
|
int line_pos;
|
|
int line;
|
|
const char *source;
|
|
log_error_st *errh;
|
|
} tokenizer_t;
|
|
|
|
__attribute_pure__
|
|
static int config_skip_newline(const tokenizer_t * const t) {
|
|
const char * const s = t->input + t->offset;
|
|
/*force_assert(s[0] == '\r' || s[0] == '\n');*/
|
|
return 1 + (s[0] == '\r' && s[1] == '\n');
|
|
}
|
|
|
|
__attribute_pure__
|
|
static int config_skip_comment(const tokenizer_t * const t) {
|
|
/*assert(t->input[t->offset] == '#');*/
|
|
const char *s = t->input + t->offset;
|
|
do { ++s; } while (*s && *s != '\r' && *s != '\n');
|
|
return (int)(s - t->input);
|
|
}
|
|
|
|
__attribute_cold__
|
|
static int config_tokenizer_err(tokenizer_t *t, const char *file, unsigned int line, const char *msg) {
|
|
log_error(t->errh, file, line, "source: %s line: %d pos: %d %s",
|
|
t->source, t->line, t->offset - t->line_pos, msg);
|
|
return -1;
|
|
}
|
|
|
|
__attribute_noinline__
|
|
static int config_tokenizer(tokenizer_t *t) {
|
|
buffer * const token = t->token;
|
|
if (t->simulate_eol) {
|
|
t->simulate_eol = 0;
|
|
t->in_key = 1;
|
|
buffer_copy_string_len(token, CONST_STR_LEN("(EOL)"));
|
|
return TK_EOL;
|
|
}
|
|
|
|
while (t->offset < t->size) {
|
|
const char * const s = t->input + t->offset;
|
|
switch (s[0]) {
|
|
case '\t':
|
|
case ' ':
|
|
t->offset++;
|
|
break;
|
|
case '=':
|
|
if (t->parens) {
|
|
if (s[1] != '>')
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"use => for assignments in arrays");
|
|
t->offset += 2;
|
|
buffer_copy_string_len(token, s, 2); /* "=>" */
|
|
return TK_ARRAY_ASSIGN;
|
|
}
|
|
else if (t->in_cond) {
|
|
int tid;
|
|
switch (s[1]) {
|
|
case '=': tid = TK_EQ; break;
|
|
case '~': tid = TK_MATCH; break;
|
|
case '^': tid = TK_PREFIX; break;
|
|
case '$': tid = TK_SUFFIX; break;
|
|
default:
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"only == =~ =^ =$ are allowed in the condition");
|
|
}
|
|
t->offset += 2;
|
|
t->in_key = 1;
|
|
t->in_cond = 0;
|
|
buffer_copy_string_len(token, s, 2); /* "==" "=~" "=^" "=$" */
|
|
return tid;
|
|
}
|
|
else if (t->in_key) {
|
|
t->offset++;
|
|
buffer_copy_string_len(token, s, 1); /* "=" */
|
|
return TK_ASSIGN;
|
|
}
|
|
else
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"unexpected equal-sign: =");
|
|
case '!':
|
|
if (t->in_cond) {
|
|
int tid;
|
|
switch (s[1]) {
|
|
case '=': tid = TK_NE; break;
|
|
case '~': tid = TK_NOMATCH; break;
|
|
default:
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"only !~ and != are allowed in the condition");
|
|
}
|
|
t->offset += 2;
|
|
t->in_key = 1;
|
|
t->in_cond = 0;
|
|
buffer_copy_string_len(token, s, 2); /* "!=" "!~" */
|
|
return tid;
|
|
}
|
|
else
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"unexpected exclamation-marks: !");
|
|
case '\n':
|
|
case '\r':
|
|
do {
|
|
switch (t->input[t->offset]) {
|
|
case '\r':
|
|
case '\n':
|
|
t->offset += config_skip_newline(t);
|
|
t->line_pos = t->offset;
|
|
t->line++;
|
|
continue;
|
|
case '#':
|
|
t->offset = config_skip_comment(t);
|
|
continue;
|
|
case '\t':
|
|
case ' ':
|
|
t->offset++;
|
|
continue;
|
|
default:
|
|
break;
|
|
}
|
|
break;
|
|
} while (t->offset < t->size);
|
|
if (!t->parens) {
|
|
t->in_key = 1;
|
|
buffer_copy_string_len(token, CONST_STR_LEN("(EOL)"));
|
|
return TK_EOL;
|
|
}
|
|
break;
|
|
case ',':
|
|
t->offset++;
|
|
if (t->parens) {
|
|
buffer_copy_string_len(token, CONST_STR_LEN("(COMMA)"));
|
|
return TK_COMMA;
|
|
}
|
|
break;
|
|
case '"':
|
|
{
|
|
/* sanity check that previous token was not also TK_STRING */
|
|
if (t->tid == TK_STRING)
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"strings may be combined with '+' "
|
|
"or separated with ',' or '=>' in lists");
|
|
|
|
/* search for the terminating " */
|
|
const char *start = s + 1; /*buffer_blank(token);*/
|
|
buffer_copy_string_len(token, CONST_STR_LEN(""));
|
|
|
|
int i;
|
|
for (i = 1; s[i] && s[i] != '"'; ++i) {
|
|
if (s[i] == '\\' && s[i+1] == '"') {
|
|
buffer_append_string_len(token, start, s + i - start);
|
|
start = s + ++i; /* step over '\\'; include literal '"' */
|
|
}
|
|
}
|
|
|
|
if (s[i] == '\0') {
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"missing closing quote");
|
|
}
|
|
|
|
t->offset += i + 1;
|
|
buffer_append_string_len(token, start, s + i - start);
|
|
return TK_STRING;
|
|
}
|
|
case '(':
|
|
t->offset++;
|
|
t->parens++;
|
|
buffer_copy_string_len(token, s, 1); /* "(" */
|
|
return TK_LPARAN;
|
|
case ')':
|
|
if (!t->parens)
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"close-parens without open-parens");
|
|
t->offset++;
|
|
t->parens--;
|
|
buffer_copy_string_len(token, s, 1); /* ")" */
|
|
return TK_RPARAN;
|
|
case '$':
|
|
t->offset++;
|
|
t->in_cond = 1;
|
|
t->in_key = 0;
|
|
buffer_copy_string_len(token, s, 1); /* "$" */
|
|
return TK_DOLLAR;
|
|
case '+':
|
|
if (s[1] == '=') {
|
|
t->offset += 2;
|
|
buffer_copy_string_len(token, s, 2); /* "+=" */
|
|
return TK_APPEND;
|
|
}
|
|
else {
|
|
t->offset++;
|
|
buffer_copy_string_len(token, s, 1); /* "+" */
|
|
return TK_PLUS;
|
|
}
|
|
case ':':
|
|
if (s[1] != '=')
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"unexpected character ':'");
|
|
t->offset += 2;
|
|
buffer_copy_string_len(token, s, 2); /* ":=" */
|
|
return TK_FORCE_ASSIGN;
|
|
case '{':
|
|
t->offset++;
|
|
buffer_copy_string_len(token, s, 1); /* "{" */
|
|
return TK_LCURLY;
|
|
case '}':
|
|
while (++t->offset < t->size) {
|
|
int c = t->input[t->offset];
|
|
if (c == '\r' || c == '\n') {
|
|
break;
|
|
}
|
|
else if (c == '#') {
|
|
t->offset = config_skip_comment(t);
|
|
break;
|
|
}
|
|
else if (c != ' ' && c != '\t') {
|
|
t->simulate_eol = 1;
|
|
break;
|
|
} /* else (c == ' ' || c == '\t') */
|
|
}
|
|
buffer_copy_string_len(token, s, 1); /* "}" */
|
|
return TK_RCURLY;
|
|
case '[':
|
|
t->offset++;
|
|
buffer_copy_string_len(token, s, 1); /* "[" */
|
|
return TK_LBRACKET;
|
|
case ']':
|
|
t->offset++;
|
|
buffer_copy_string_len(token, s, 1); /* "]" */
|
|
return TK_RBRACKET;
|
|
case '#':
|
|
t->offset = config_skip_comment(t);
|
|
break;
|
|
case '\0':
|
|
config_tokenizer_err(t, __FILE__, __LINE__, "stray NUL");
|
|
return 0;
|
|
default:
|
|
if (t->in_cond) {
|
|
int i = 0;
|
|
while (light_isalpha(s[i]) || s[i] == '_') ++i;
|
|
if (i && s[i]) {
|
|
t->offset += i;
|
|
buffer_copy_string_len(token, s, i);
|
|
return TK_SRVVARNAME;
|
|
}
|
|
else
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"invalid character in condition");
|
|
}
|
|
else if (light_isdigit(s[0])) {
|
|
/* take all digits */
|
|
int i = 1;
|
|
while (light_isdigit(s[i])) ++i;
|
|
t->offset += i;
|
|
buffer_copy_string_len(token, s, i);
|
|
return TK_INTEGER;
|
|
}
|
|
else {
|
|
/* the key might consist of [-.0-9a-z] */
|
|
int i = 0;
|
|
while (light_isalnum(s[i])
|
|
|| s[i] == '.'
|
|
|| s[i] == '_' /* for env.* */
|
|
|| s[i] == '-') ++i;
|
|
|
|
if (i && s[i]) {
|
|
t->offset += i;
|
|
buffer_copy_string_len(token, s, i);
|
|
if (0 == strcmp(token->ptr, "include"))
|
|
return TK_INCLUDE;
|
|
else if (0 == strcmp(token->ptr, "include_shell"))
|
|
return TK_INCLUDE_SHELL;
|
|
else if (0 == strcmp(token->ptr, "global"))
|
|
return TK_GLOBAL;
|
|
else if (0 == strcmp(token->ptr, "if")) {
|
|
/* ignore 'if' immediately prior to condition
|
|
* ('if <condition>' or 'else if <condition>') */
|
|
int j = i;
|
|
while (s[j] == ' ' || s[j] == '\t') ++j;
|
|
if (s[j] == '$')
|
|
continue;
|
|
}
|
|
else if (0 == strcmp(token->ptr, "elif")
|
|
|| 0 == strcmp(token->ptr, "elsif")
|
|
|| 0 == strcmp(token->ptr, "elseif"))
|
|
return TK_ELSE;
|
|
else if (0 == strcmp(token->ptr, "else"))
|
|
return TK_ELSE;
|
|
else
|
|
return TK_LKEY;
|
|
}
|
|
else if (0 == i
|
|
&& ((uint8_t *)s)[0] == 0xc2
|
|
&& ((uint8_t *)s)[1] == 0xa0) {
|
|
/* treat U+00A0 (c2 a0) "NO-BREAK SPACE" as whitespace */
|
|
/* http://www.fileformat.info/info/unicode/char/a0/index.htm */
|
|
t->offset+=2;
|
|
}
|
|
else
|
|
return config_tokenizer_err(t, __FILE__, __LINE__,
|
|
"invalid character in variable name");
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int config_parse(server *srv, config_t *context, const char *source, const char *input, int isize) {
|
|
tokenizer_t t;
|
|
t.source = source;
|
|
t.input = input;
|
|
t.size = isize;
|
|
t.offset = 0;
|
|
t.line = 1;
|
|
t.line_pos = 0;
|
|
|
|
t.in_key = 1;
|
|
t.parens = 0;
|
|
t.in_cond = 0;
|
|
t.simulate_eol = 0;
|
|
t.tid = -1;
|
|
t.errh = srv->errh;
|
|
|
|
t.token = buffer_init();
|
|
void * const pParser = configparserAlloc( malloc );
|
|
force_assert(pParser);
|
|
while (context->ok && (t.tid = config_tokenizer(&t)) > 0) {
|
|
buffer * const token = buffer_init();
|
|
buffer_copy_buffer(token, t.token);
|
|
configparser(pParser, t.tid, token, context);
|
|
/*token = NULL;*/
|
|
}
|
|
|
|
if (t.tid != -1 && context->ok) {
|
|
/* add an EOL at EOF, better than say sorry */
|
|
buffer * const token = buffer_init();
|
|
buffer_copy_string(token, "(EOL)");
|
|
configparser(pParser, TK_EOL, token, context);
|
|
/*token = NULL;*/
|
|
if (context->ok) {
|
|
configparser(pParser, 0, NULL, context);
|
|
}
|
|
}
|
|
configparserFree(pParser, free);
|
|
|
|
if (t.tid == -1) {
|
|
log_error(t.errh, __FILE__, __LINE__,
|
|
"configfile parser failed at: %s", t.token->ptr);
|
|
} else if (context->ok == 0) {
|
|
log_error(t.errh, __FILE__, __LINE__, "source: %s line: %d pos: %d "
|
|
"parser failed somehow near here: %s",
|
|
t.source, t.line, t.offset - t.line_pos, t.token->ptr);
|
|
t.tid = -1;
|
|
}
|
|
buffer_free(t.token);
|
|
|
|
return t.tid == -1 ? -1 : 0;
|
|
}
|
|
|
|
__attribute_cold__
|
|
static int config_parse_stdin(server *srv, config_t *context) {
|
|
/* config_mem is preserved across graceful restart
|
|
* and will leak mem at program exit (no big deal).
|
|
* Preserving config_mem allows graceful restart in order
|
|
* to trigger re-read of config files such as TLS certificates. */
|
|
static char *config_mem;
|
|
static off_t lim;
|
|
if (NULL == config_mem) {
|
|
lim = 32*1024*1024; /*(arbitrary limit: 32 MB file; expect < 1 MB)*/
|
|
config_mem = fdevent_load_file("/dev/stdin",&lim,srv->errh,malloc,free);
|
|
if (!config_mem) {
|
|
log_perror(srv->errh, __FILE__, __LINE__, "config read from stdin");
|
|
return -1;
|
|
}
|
|
int fd = fdevent_open_devnull();
|
|
#ifdef __COVERITY__/*(ignore leak; intentionally want open STDIN_FILENO)*/
|
|
if (fd >= 0)
|
|
#else
|
|
if (fd > STDIN_FILENO) /*(STDIN_FILENO closed by fdevent_load_file()*/
|
|
#endif
|
|
close(fd);
|
|
}
|
|
return lim ? config_parse(srv, context, "-", config_mem, (int)lim) : 0;
|
|
}
|
|
|
|
static int config_parse_file_stream(server *srv, config_t *context, const char *fn) {
|
|
off_t dlen = 32*1024*1024;/*(arbitrary limit: 32 MB file; expect < 1 MB)*/
|
|
char *data = fdevent_load_file(fn, &dlen, NULL, malloc, free);
|
|
if (NULL == data) {
|
|
log_perror(srv->errh, __FILE__, __LINE__,
|
|
"opening configfile %s failed", fn);
|
|
return -1;
|
|
}
|
|
|
|
int rc = 0;
|
|
if (dlen) {
|
|
rc = config_parse(srv, context, fn, data, (int)dlen);
|
|
ck_memzero(data, (size_t)dlen);
|
|
}
|
|
free(data);
|
|
return rc;
|
|
}
|
|
|
|
#ifdef _WIN32
|
|
/*(minimal glob implementation for lighttpd configfile.c)*/
|
|
#include <windows.h>
|
|
#include <stringapiset.h>
|
|
#include <stdio.h> /* FILENAME_MAX */
|
|
typedef struct {
|
|
size_t gl_pathc;
|
|
char **gl_pathv;
|
|
} glob_t;
|
|
#define GLOB_NOSPACE 1
|
|
#define GLOB_ABORTED 2
|
|
#define GLOB_NOMATCH 3
|
|
static void globfree (glob_t * const gl)
|
|
{
|
|
for (size_t i = 0; i < gl->gl_pathc; ++i)
|
|
free(gl->gl_pathv[i]);
|
|
free(gl->gl_pathv);
|
|
gl->gl_pathc = 0;
|
|
gl->gl_pathv = NULL;
|
|
}
|
|
static int glob_C_cmp(const void *arg1, const void *arg2)
|
|
{
|
|
return strcmp(*(char **)arg1, *(char **)arg2);
|
|
}
|
|
static int glob(const char *pattern, int flags,
|
|
int (*errfunc) (const char *epath, int eerrno),
|
|
glob_t * const gl)
|
|
{
|
|
UNUSED(flags); /*(not implemented; ignore GLOB_BRACE)*/
|
|
UNUSED(errfunc); /*(not implemented)*/
|
|
gl->gl_pathc = 0;
|
|
gl->gl_pathv = NULL;
|
|
size_t sz = 0;
|
|
|
|
WCHAR wbuf[4096];
|
|
int wlen = MultiByteToWideChar(CP_UTF8, MB_ERR_INVALID_CHARS, pattern, -1,
|
|
wbuf, (sizeof(wbuf)/sizeof(*wbuf)));
|
|
if (0 == wlen) return GLOB_NOSPACE;
|
|
WIN32_FIND_DATAW ffd;
|
|
HANDLE hFind = FindFirstFileExW(wbuf, FindExInfoBasic, &ffd,
|
|
FindExSearchNameMatch, NULL,
|
|
FIND_FIRST_EX_LARGE_FETCH);
|
|
if (hFind == INVALID_HANDLE_VALUE) {
|
|
DWORD rc = GetLastError();
|
|
return (rc == ERROR_FILE_NOT_FOUND || rc == ERROR_NO_MORE_FILES)
|
|
? GLOB_NOMATCH
|
|
: GLOB_ABORTED;
|
|
}
|
|
const char * const slash = strrchr(pattern, '/');
|
|
const char * const bslash = strrchr(pattern, '\\');
|
|
const size_t pathlen = (slash || bslash)
|
|
? (size_t)(((slash > bslash) ? slash : bslash) - pattern + 1)
|
|
: 0;
|
|
|
|
char fnUTF8[FILENAME_MAX*4+1];
|
|
do {
|
|
if (ffd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)
|
|
continue; /*(dir check is specific to lighttpd configfile.c use)*/
|
|
|
|
if (gl->gl_pathc == sz) {
|
|
if (0 == sz) sz = 4;
|
|
sz <<= 1;
|
|
char **gl_pathv = realloc(gl->gl_pathv, sz * sizeof(char *));
|
|
if (NULL == gl_pathv) {
|
|
globfree(gl);
|
|
return GLOB_NOSPACE;
|
|
}
|
|
gl->gl_pathv = gl_pathv;
|
|
}
|
|
|
|
/* construct result with path, if present */
|
|
/* WC_ERR_INVALID_CHARS not used in string conversion since
|
|
* expecting valid unicode from reading directory */
|
|
const size_t len = (size_t)
|
|
WideCharToMultiByte(CP_UTF8, 0, ffd.cFileName, -1,
|
|
fnUTF8, sizeof(fnUTF8), NULL, NULL);
|
|
if (0 == len) continue; /*(unexpected; skip)*/
|
|
char * const fn = malloc(pathlen + len); /*(includes '\0')*/
|
|
if (NULL == fn) {
|
|
globfree(gl);
|
|
return GLOB_NOSPACE;
|
|
}
|
|
if (pathlen) memcpy(fn, pattern, pathlen);
|
|
memcpy(fn+pathlen, fnUTF8, len);
|
|
|
|
gl->gl_pathv[gl->gl_pathc++] = fn;
|
|
} while (FindNextFileW(hFind, &ffd));
|
|
|
|
DWORD err = GetLastError();
|
|
FindClose(hFind);
|
|
|
|
if (err != ERROR_NO_MORE_FILES) {
|
|
globfree(gl);
|
|
return GLOB_ABORTED; /*(actual error in GetLastError())*/
|
|
}
|
|
else if (0 == gl->gl_pathc) /*(found only directories)*/
|
|
return GLOB_NOMATCH;
|
|
|
|
qsort(gl->gl_pathv, gl->gl_pathc, sizeof(char *), glob_C_cmp);
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
int config_parse_file(server *srv, config_t *context, const char *fn) {
|
|
buffer * const filename = buffer_init();
|
|
const size_t fnlen = strlen(fn);
|
|
int ret = -1;
|
|
#ifdef GLOB_BRACE
|
|
int flags = GLOB_BRACE;
|
|
#else
|
|
int flags = 0;
|
|
#endif
|
|
glob_t gl;
|
|
|
|
if (buffer_is_blank(context->basedir) ||
|
|
(fn[0] == '/' || fn[0] == '\\') ||
|
|
(fn[0] == '.' && (fn[1] == '/' || fn[1] == '\\')) ||
|
|
(fn[0] == '.' && fn[1] == '.' && (fn[2] == '/' || fn[2] == '\\')) ||
|
|
(light_isalpha(fn[0]) && fn[1] == ':' && (fn[2] == '/' || fn[2] == '\\'))) {
|
|
buffer_copy_string_len(filename, fn, fnlen);
|
|
} else {
|
|
buffer_copy_path_len2(filename, BUF_PTR_LEN(context->basedir),
|
|
fn, fnlen);
|
|
}
|
|
|
|
switch (glob(filename->ptr, flags, NULL, &gl)) {
|
|
case 0:
|
|
for (size_t i = 0; i < gl.gl_pathc; ++i) {
|
|
ret = config_parse_file_stream(srv, context, gl.gl_pathv[i]);
|
|
if (0 != ret) break;
|
|
}
|
|
globfree(&gl);
|
|
break;
|
|
case GLOB_NOMATCH:
|
|
if (filename->ptr[strcspn(filename->ptr, "*?[]{}")] != '\0') { /*(contains glob metachars)*/
|
|
ret = 0; /* not an error if no files match glob pattern */
|
|
}
|
|
else {
|
|
log_error(srv->errh, __FILE__, __LINE__, "include file not found: %s", filename->ptr);
|
|
}
|
|
break;
|
|
case GLOB_ABORTED:
|
|
case GLOB_NOSPACE:
|
|
log_perror(srv->errh, __FILE__, __LINE__, "glob() %s failed", filename->ptr);
|
|
break;
|
|
}
|
|
|
|
buffer_free(filename);
|
|
return ret;
|
|
}
|
|
|
|
#ifdef __CYGWIN__
|
|
|
|
static char* getCWD(char *buf, size_t sz) {
|
|
if (NULL == getcwd(buf, sz)) {
|
|
return NULL;
|
|
}
|
|
for (size_t i = 0; buf[i]; ++i) {
|
|
if (buf[i] == '\\') buf[i] = '/';
|
|
}
|
|
return buf;
|
|
}
|
|
|
|
#define getcwd(buf, sz) getCWD((buf),(sz))
|
|
|
|
#endif /* __CYGWIN__ */
|
|
|
|
int config_parse_cmd(server *srv, config_t *context, const char *cmd) {
|
|
int ret = 0;
|
|
int fds[2];
|
|
char oldpwd[PATH_MAX];
|
|
|
|
if (NULL == getcwd(oldpwd, sizeof(oldpwd))) {
|
|
log_perror(srv->errh, __FILE__, __LINE__, "getcwd()");
|
|
return -1;
|
|
}
|
|
|
|
if (!buffer_is_blank(context->basedir)) {
|
|
if (0 != chdir(context->basedir->ptr)) {
|
|
log_perror(srv->errh, __FILE__, __LINE__,
|
|
"cannot change directory to %s", context->basedir->ptr);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (fdevent_pipe_cloexec(fds, 65536)) {
|
|
log_perror(srv->errh, __FILE__, __LINE__, "pipe()");
|
|
ret = -1;
|
|
}
|
|
else {
|
|
pid_t pid = fdevent_sh_exec(cmd, NULL, -1, fds[1], -1);
|
|
if (-1 == pid) {
|
|
log_perror(srv->errh, __FILE__, __LINE__, "fork/exec(%s)", cmd);
|
|
ret = -1;
|
|
}
|
|
else {
|
|
ssize_t rd;
|
|
int wstatus = 0;
|
|
buffer *out = buffer_init();
|
|
close(fds[1]);
|
|
fds[1] = -1;
|
|
do {
|
|
rd = read(fds[0], buffer_string_prepare_append(out, 1023), 1023);
|
|
if (rd >= 0) buffer_commit(out, (size_t)rd);
|
|
} while (rd > 0 || (-1 == rd && errno == EINTR));
|
|
if (0 != rd) {
|
|
log_perror(srv->errh, __FILE__, __LINE__, "read \"%s\"", cmd);
|
|
ret = -1;
|
|
}
|
|
close(fds[0]);
|
|
fds[0] = -1;
|
|
if (pid != fdevent_waitpid(pid, &wstatus, 0)) {
|
|
log_perror(srv->errh, __FILE__, __LINE__, "waitpid \"%s\"",cmd);
|
|
ret = -1;
|
|
}
|
|
if (0 != wstatus) {
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"command \"%s\" exited non-zero: %d",
|
|
cmd, WEXITSTATUS(wstatus));
|
|
ret = -1;
|
|
}
|
|
|
|
if (-1 != ret) {
|
|
ret = config_parse(srv, context, cmd, BUF_PTR_LEN(out));
|
|
}
|
|
buffer_free(out);
|
|
}
|
|
if (-1 != fds[0]) close(fds[0]);
|
|
if (-1 != fds[1]) close(fds[1]);
|
|
}
|
|
|
|
if (0 != chdir(oldpwd)) {
|
|
log_perror(srv->errh, __FILE__, __LINE__,
|
|
"cannot change directory to %s", oldpwd);
|
|
ret = -1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int config_remoteip_normalize_ipv6(buffer * const b, buffer * const tb) {
|
|
/* $HTTP["remote-ip"] IPv6 accepted with or without '[]' for config compat
|
|
* http_request_host_normalize() expects IPv6 with '[]',
|
|
* and config processing at runtime expects COMP_HTTP_REMOTE_IP
|
|
* compared without '[]', so strip '[]' after normalization */
|
|
buffer_clear(tb);
|
|
if (b->ptr[0] != '[')
|
|
buffer_append_str3(tb,
|
|
CONST_STR_LEN("["),
|
|
BUF_PTR_LEN(b),
|
|
CONST_STR_LEN("]"));
|
|
else
|
|
buffer_append_string_buffer(tb, b);
|
|
|
|
int rc = http_request_host_normalize(tb, 0);
|
|
if (0 == rc) {
|
|
/* remove surrounding '[]' */
|
|
size_t blen = buffer_clen(tb);
|
|
if (blen > 1) buffer_copy_string_len(b, tb->ptr+1, blen-2);
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
int config_remoteip_normalize(buffer * const b, buffer * const tb) {
|
|
if (b->ptr[0] == '/') return 1; /*(skip AF_UNIX /path/file)*/
|
|
|
|
const char * const slash = strchr(b->ptr, '/'); /* CIDR mask */
|
|
const char * const colon = strchr(b->ptr, ':'); /* IPv6 */
|
|
unsigned long nm_bits = 0;
|
|
|
|
if (NULL != slash) {
|
|
char *nptr;
|
|
nm_bits = strtoul(slash + 1, &nptr, 10);
|
|
if (*nptr || 0 == nm_bits || nm_bits > (NULL != colon ? 128u : 32u)) {
|
|
/*(also rejects (slash+1 == nptr) which results in nm_bits = 0)*/
|
|
return -1;
|
|
}
|
|
buffer_truncate(b, (size_t)(slash - b->ptr));
|
|
}
|
|
|
|
int family = colon ? AF_INET6 : AF_INET;
|
|
int rc = (family == AF_INET)
|
|
? http_request_host_normalize(b, 0)
|
|
: config_remoteip_normalize_ipv6(b, tb);
|
|
|
|
uint32_t len = buffer_clen(b); /*(save len before adding CIDR mask)*/
|
|
if (nm_bits) {
|
|
buffer_append_char(b, '/');
|
|
buffer_append_int(b, (int)nm_bits);
|
|
}
|
|
|
|
if (0 != rc) {
|
|
return -1;
|
|
}
|
|
|
|
/* extend b to hold structured data after end of string:
|
|
* nm_bits and memory-aligned sock_addr for AF_INET or AF_INET6 (28 bytes)*/
|
|
char *after = buffer_string_prepare_append(b, 1 + 7 + 28);
|
|
++after; /*(increment to pos after string end '\0')*/
|
|
*(unsigned char *)after = (unsigned char)nm_bits;
|
|
sock_addr * const addr = (sock_addr *)(((uintptr_t)after+1+7) & ~7);
|
|
if (nm_bits) b->ptr[len] = '\0'; /*(sock_addr_inet_pton() w/o CIDR mask)*/
|
|
rc = sock_addr_inet_pton(addr, b->ptr, family, 0);
|
|
if (nm_bits) b->ptr[len] = '/';
|
|
return (1 == rc);
|
|
}
|
|
|
|
|
|
static void context_init(server *srv, config_t *context) {
|
|
context->srv = srv;
|
|
context->ok = 1;
|
|
context->configs_stack.data = NULL;
|
|
context->configs_stack.used = 0;
|
|
context->configs_stack.size = 0;
|
|
context->basedir = buffer_init();
|
|
}
|
|
|
|
static void context_free(config_t *context) {
|
|
free(context->configs_stack.data);
|
|
buffer_free(context->basedir);
|
|
}
|
|
|
|
__attribute_noinline__
|
|
static void config_vars_init (array *a) {
|
|
char dcwd[PATH_MAX];
|
|
if (NULL != getcwd(dcwd, sizeof(dcwd)))
|
|
array_set_key_value(a, CONST_STR_LEN("var.CWD"), dcwd, strlen(dcwd));
|
|
|
|
*array_get_int_ptr(a, CONST_STR_LEN("var.PID")) = getpid();
|
|
}
|
|
|
|
int config_read(server *srv, const char *fn) {
|
|
config_t context;
|
|
data_config *dc;
|
|
int ret;
|
|
char *pos;
|
|
|
|
context_init(srv, &context);
|
|
context.all_configs = srv->config_context;
|
|
|
|
pos = strrchr(fn, '/');
|
|
#ifdef _WIN32
|
|
char * const spos = strrchr(fn, '\\');
|
|
if (spos > pos) pos = spos;
|
|
#endif
|
|
if (pos) {
|
|
buffer_copy_string_len(context.basedir, fn, pos - fn + 1);
|
|
}
|
|
|
|
dc = data_config_init();
|
|
buffer_copy_string_len(&dc->key, CONST_STR_LEN("global"));
|
|
config_vars_init(dc->value); /* default context */
|
|
|
|
force_assert(context.all_configs->used == 0);
|
|
dc->context_ndx = context.all_configs->used;
|
|
array_insert_unique(context.all_configs, (data_unset *)dc);
|
|
context.current = dc;
|
|
|
|
ret = (0 != strcmp(fn, "-")) /*(incompatible with one-shot mode)*/
|
|
? config_parse_file_stream(srv, &context, fn)
|
|
: config_parse_stdin(srv, &context);
|
|
|
|
/* remains nothing if parser is ok */
|
|
force_assert(!(0 == ret && context.ok && 0 != context.configs_stack.used));
|
|
context_free(&context);
|
|
|
|
if (0 != ret) {
|
|
return ret;
|
|
}
|
|
|
|
/* reorder dc->context_ndx to match srv->config_context->data[] index.
|
|
* srv->config_context->data[] may have been re-ordered in configparser.y.
|
|
* Since the dc->context_ndx (id) is reused by config_insert*() and by
|
|
* plugins to index into srv->config_context->data[], reorder into the
|
|
* order encountered during config file parsing for least surprise to
|
|
* end-users writing config files. Note: this manipulation *breaks* the
|
|
* srv->config_context->sorted[] structure, so searching the array by key
|
|
* is no longer valid. */
|
|
for (uint32_t i = 0; i < srv->config_context->used; ++i) {
|
|
dc = (data_config *)srv->config_context->data[i];
|
|
if (dc->context_ndx == (int)i) continue;
|
|
for (uint32_t j = i; j < srv->config_context->used; ++j) {
|
|
dc = (data_config *)srv->config_context->data[j];
|
|
if (dc->context_ndx == (int)i) {
|
|
srv->config_context->data[j] = srv->config_context->data[i];
|
|
srv->config_context->data[i] = (data_unset *)dc;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (0 != config_insert_srvconf(srv)) {
|
|
return -1;
|
|
}
|
|
|
|
if (0 != config_insert(srv)) {
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* stat_cache_path_isdir() not used since if srv->srvconf.changeroot is set,
|
|
* then the stat cache entries would be invalid after the chroot occurs */
|
|
__attribute_noinline__
|
|
static int
|
|
config_stat_isdir (const char * const path, struct stat * const st)
|
|
{
|
|
return
|
|
!(-1 == stat(path, st) || (S_ISDIR(st->st_mode) ? 0 : (errno = ENOTDIR)));
|
|
}
|
|
|
|
int
|
|
config_set_defaults (server * const srv)
|
|
{
|
|
struct stat st;
|
|
|
|
if (fdevent_config(&srv->srvconf.event_handler, srv->errh) <= 0)
|
|
return -1;
|
|
|
|
chunkqueue_set_tempdirs_default(
|
|
srv->srvconf.upload_tempdirs,
|
|
srv->srvconf.upload_temp_file_size);
|
|
|
|
if (!srv->srvconf.upload_tempdirs->used) {
|
|
const char *tmpdir = chunkqueue_env_tmpdir();
|
|
array_insert_value(srv->srvconf.upload_tempdirs,tmpdir,strlen(tmpdir));
|
|
}
|
|
|
|
{
|
|
buffer * const tb = srv->tmp_buf;
|
|
buffer_clear(tb);
|
|
if (srv->srvconf.changeroot) {
|
|
buffer_copy_buffer(tb, srv->srvconf.changeroot);
|
|
if (!config_stat_isdir(tb->ptr, &st)) {
|
|
log_perror(srv->errh, __FILE__, __LINE__,
|
|
"server.chroot %s", tb->ptr);
|
|
return -1;
|
|
}
|
|
}
|
|
const uint_fast32_t len = buffer_clen(tb);
|
|
|
|
for (uint_fast32_t i = 0; i < srv->srvconf.upload_tempdirs->used; ++i) {
|
|
const buffer *value =
|
|
&((data_string *)srv->srvconf.upload_tempdirs->data[i])->value;
|
|
if (len) { /* (srv->srvconf.changeroot) */
|
|
buffer_truncate(tb, len);
|
|
buffer_append_path_len(tb, BUF_PTR_LEN(value));
|
|
value = tb;
|
|
}
|
|
if (!config_stat_isdir(value->ptr, &st))
|
|
log_perror(srv->errh, __FILE__, __LINE__,
|
|
"server.upload-dirs %s", value->ptr);
|
|
}
|
|
}
|
|
|
|
request_config * const s =
|
|
&((config_data_base *)srv->config_data_base)->defaults;
|
|
|
|
if (!s->document_root || buffer_is_blank(s->document_root)) {
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
"server.document-root is not set");
|
|
return -1;
|
|
}
|
|
|
|
if (2 == s->force_lowercase_filenames) { /*(not configured in global conf)*/
|
|
s->force_lowercase_filenames = 0; /* default to case-sensitive */
|
|
|
|
/* simplistic test on global s->document_root
|
|
* (stat() uppercase/lowercase of *entire* path)
|
|
* (ignores srv->srvconf.changeroot; no chroot on _WIN32)*/
|
|
buffer * const tb = srv->tmp_buf;
|
|
buffer_copy_buffer(tb, s->document_root);
|
|
buffer_to_upper(tb);
|
|
if (0 == stat(tb->ptr, &st)) {
|
|
/* uppercase exists; check lowercase */
|
|
const ino_t st_ino = st.st_ino;
|
|
const int is_upper_eq = buffer_is_equal(tb, s->document_root);
|
|
buffer_to_lower(tb);
|
|
if (is_upper_eq && buffer_is_equal(tb, s->document_root)) {
|
|
/* uppercasing and lowercasing did not result in different
|
|
* filenames (e.g. "/" or "/12345/"), so unable to determine
|
|
* case sensitivity here; assume case-sensitive filesystem. */
|
|
s->force_lowercase_filenames = 0;
|
|
}
|
|
else if (0 == stat(tb->ptr, &st)) {
|
|
/* uppercase exists, too;
|
|
* case-insensitive if upper and lower stat have same inode */
|
|
s->force_lowercase_filenames = (st_ino == st.st_ino);
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|