You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
325 lines
9.7 KiB
C
325 lines
9.7 KiB
C
#include "first.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <errno.h>
|
|
#include <limits.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "gw_backend.h"
|
|
typedef gw_plugin_config plugin_config;
|
|
typedef gw_plugin_data plugin_data;
|
|
typedef gw_handler_ctx handler_ctx;
|
|
|
|
#include "base.h"
|
|
#include "buffer.h"
|
|
#include "log.h"
|
|
#include "status_counter.h"
|
|
|
|
#include "sys-endian.h"
|
|
|
|
enum { LI_PROTOCOL_SCGI, LI_PROTOCOL_UWSGI };
|
|
|
|
SETDEFAULTS_FUNC(mod_scgi_set_defaults) {
|
|
plugin_data *p = p_d;
|
|
const data_unset *du;
|
|
size_t i = 0;
|
|
|
|
config_values_t cv[] = {
|
|
{ "scgi.server", NULL, T_CONFIG_LOCAL, T_CONFIG_SCOPE_CONNECTION }, /* 0 */
|
|
{ "scgi.debug", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 1 */
|
|
{ "scgi.protocol", NULL, T_CONFIG_LOCAL, T_CONFIG_SCOPE_CONNECTION }, /* 2 */
|
|
{ "scgi.map-extensions", NULL, T_CONFIG_ARRAY, T_CONFIG_SCOPE_CONNECTION }, /* 3 */
|
|
{ "scgi.balance", NULL, T_CONFIG_LOCAL, T_CONFIG_SCOPE_CONNECTION }, /* 4 */
|
|
{ NULL, NULL, T_CONFIG_UNSET, T_CONFIG_SCOPE_UNSET }
|
|
};
|
|
|
|
p->config_storage = calloc(srv->config_context->used, sizeof(plugin_config *));
|
|
force_assert(p->config_storage);
|
|
|
|
for (i = 0; i < srv->config_context->used; i++) {
|
|
data_config const* config = (data_config const*)srv->config_context->data[i];
|
|
plugin_config *s;
|
|
|
|
s = calloc(1, sizeof(plugin_config));
|
|
force_assert(s);
|
|
s->exts = NULL;
|
|
s->exts_auth = NULL;
|
|
s->exts_resp = NULL;
|
|
s->debug = 0;
|
|
s->proto = LI_PROTOCOL_SCGI;
|
|
s->ext_mapping = array_init();
|
|
|
|
cv[0].destination = s->exts; /* not used; T_CONFIG_LOCAL */
|
|
cv[1].destination = &(s->debug);
|
|
cv[2].destination = NULL; /* not used; T_CONFIG_LOCAL */
|
|
cv[3].destination = s->ext_mapping;
|
|
cv[4].destination = NULL; /* not used; T_CONFIG_LOCAL */
|
|
|
|
p->config_storage[i] = s;
|
|
|
|
if (0 != config_insert_values_global(srv, config->value, cv, i == 0 ? T_CONFIG_SCOPE_SERVER : T_CONFIG_SCOPE_CONNECTION)) {
|
|
return HANDLER_ERROR;
|
|
}
|
|
|
|
du = array_get_element_klen(config->value, CONST_STR_LEN("scgi.server"));
|
|
if (!gw_set_defaults_backend(srv, p, du, i, 1)) {
|
|
return HANDLER_ERROR;
|
|
}
|
|
|
|
du = array_get_element_klen(config->value, CONST_STR_LEN("scgi.balance"));
|
|
if (!gw_set_defaults_balance(srv, s, du)) {
|
|
return HANDLER_ERROR;
|
|
}
|
|
|
|
if (NULL != (du = array_get_element_klen(config->value, CONST_STR_LEN("scgi.protocol")))) {
|
|
const data_string *ds = (const data_string *)du;
|
|
if (du->type == TYPE_STRING
|
|
&& buffer_is_equal_string(&ds->value, CONST_STR_LEN("scgi"))) {
|
|
s->proto = LI_PROTOCOL_SCGI;
|
|
} else if (du->type == TYPE_STRING
|
|
&& buffer_is_equal_string(&ds->value, CONST_STR_LEN("uwsgi"))) {
|
|
s->proto = LI_PROTOCOL_UWSGI;
|
|
} else {
|
|
log_error_write(srv, __FILE__, __LINE__, "sss",
|
|
"unexpected type for key: ", "scgi.protocol", "expected \"scgi\" or \"uwsgi\"");
|
|
|
|
return HANDLER_ERROR;
|
|
}
|
|
}
|
|
}
|
|
|
|
return HANDLER_GO_ON;
|
|
}
|
|
|
|
static int scgi_env_add_scgi(void *venv, const char *key, size_t key_len, const char *val, size_t val_len) {
|
|
buffer *env = venv;
|
|
char *dst;
|
|
size_t len;
|
|
|
|
if (!key || !val) return -1;
|
|
|
|
len = key_len + val_len + 2;
|
|
|
|
if (buffer_string_space(env) < len) {
|
|
size_t extend = env->size * 2 - buffer_string_length(env);
|
|
extend = extend > len ? extend : len + 4095;
|
|
buffer_string_prepare_append(env, extend);
|
|
}
|
|
|
|
dst = buffer_string_prepare_append(env, len);
|
|
memcpy(dst, key, key_len);
|
|
dst[key_len] = '\0';
|
|
memcpy(dst + key_len + 1, val, val_len);
|
|
dst[key_len + 1 + val_len] = '\0';
|
|
buffer_commit(env, len);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#ifdef __LITTLE_ENDIAN__
|
|
#define uwsgi_htole16(x) (x)
|
|
#else /* __BIG_ENDIAN__ */
|
|
#define uwsgi_htole16(x) ((uint16_t) (((x) & 0xff) << 8 | ((x) & 0xff00) >> 8))
|
|
#endif
|
|
|
|
|
|
static int scgi_env_add_uwsgi(void *venv, const char *key, size_t key_len, const char *val, size_t val_len) {
|
|
buffer *env = venv;
|
|
char *dst;
|
|
size_t len;
|
|
uint16_t uwlen;
|
|
|
|
if (!key || !val) return -1;
|
|
if (key_len > USHRT_MAX || val_len > USHRT_MAX) return -1;
|
|
|
|
len = 2 + key_len + 2 + val_len;
|
|
|
|
if (buffer_string_space(env) < len) {
|
|
size_t extend = env->size * 2 - buffer_string_length(env);
|
|
extend = extend > len ? extend : len + 4095;
|
|
buffer_string_prepare_append(env, extend);
|
|
}
|
|
|
|
dst = buffer_string_prepare_append(env, len);
|
|
uwlen = uwsgi_htole16((uint16_t)key_len);
|
|
memcpy(dst, (char *)&uwlen, 2);
|
|
memcpy(dst + 2, key, key_len);
|
|
uwlen = uwsgi_htole16((uint16_t)val_len);
|
|
memcpy(dst + 2 + key_len, (char *)&uwlen, 2);
|
|
memcpy(dst + 2 + key_len + 2, val, val_len);
|
|
buffer_commit(env, len);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static handler_t scgi_create_env(server *srv, handler_ctx *hctx) {
|
|
gw_host *host = hctx->host;
|
|
connection *con = hctx->remote_conn;
|
|
http_cgi_opts opts = { 0, 0, host->docroot, NULL };
|
|
http_cgi_header_append_cb scgi_env_add = hctx->conf.proto == LI_PROTOCOL_SCGI
|
|
? scgi_env_add_scgi
|
|
: scgi_env_add_uwsgi;
|
|
size_t offset;
|
|
size_t rsz = (size_t)(con->read_queue->bytes_out - hctx->wb->bytes_in);
|
|
buffer * const b = chunkqueue_prepend_buffer_open_sz(hctx->wb, rsz < 65536 ? rsz : con->header_len);
|
|
|
|
/* save space for 9 digits (plus ':'), though incoming HTTP request
|
|
* currently limited to 64k (65535, so 5 chars) */
|
|
buffer_copy_string_len(b, CONST_STR_LEN(" "));
|
|
|
|
if (0 != http_cgi_headers(srv, con, &opts, scgi_env_add, b)) {
|
|
con->http_status = 400;
|
|
con->mode = DIRECT;
|
|
buffer_clear(b);
|
|
chunkqueue_remove_finished_chunks(hctx->wb);
|
|
return HANDLER_FINISHED;
|
|
}
|
|
|
|
if (hctx->conf.proto == LI_PROTOCOL_SCGI) {
|
|
size_t len;
|
|
scgi_env_add(b, CONST_STR_LEN("SCGI"), CONST_STR_LEN("1"));
|
|
buffer_clear(srv->tmp_buf);
|
|
buffer_append_int(srv->tmp_buf, buffer_string_length(b)-10);
|
|
buffer_append_string_len(srv->tmp_buf, CONST_STR_LEN(":"));
|
|
len = buffer_string_length(srv->tmp_buf);
|
|
offset = 10 - len;
|
|
memcpy(b->ptr+offset, srv->tmp_buf->ptr, len);
|
|
buffer_append_string_len(b, CONST_STR_LEN(","));
|
|
} else { /* LI_PROTOCOL_UWSGI */
|
|
/* http://uwsgi-docs.readthedocs.io/en/latest/Protocol.html */
|
|
size_t len = buffer_string_length(b)-10;
|
|
uint32_t uwsgi_header;
|
|
if (len > USHRT_MAX) {
|
|
con->http_status = 431; /* Request Header Fields Too Large */
|
|
con->mode = DIRECT;
|
|
buffer_clear(b);
|
|
chunkqueue_remove_finished_chunks(hctx->wb);
|
|
return HANDLER_FINISHED;
|
|
}
|
|
offset = 10 - 4;
|
|
uwsgi_header = ((uint32_t)uwsgi_htole16((uint16_t)len)) << 8;
|
|
memcpy(b->ptr+offset, (char *)&uwsgi_header, 4);
|
|
}
|
|
|
|
hctx->wb_reqlen = buffer_string_length(b) - offset;
|
|
chunkqueue_prepend_buffer_commit(hctx->wb);
|
|
#if 0
|
|
hctx->wb->first->offset += (off_t)offset;
|
|
hctx->wb->bytes_in -= (off_t)offset;
|
|
#else
|
|
chunkqueue_mark_written(hctx->wb, offset);
|
|
#endif
|
|
|
|
if (con->request.content_length) {
|
|
chunkqueue_append_chunkqueue(hctx->wb, con->request_content_queue);
|
|
if (con->request.content_length > 0)
|
|
hctx->wb_reqlen += con->request.content_length; /* total req size */
|
|
else /* as-yet-unknown total request size (Transfer-Encoding: chunked)*/
|
|
hctx->wb_reqlen = -hctx->wb_reqlen;
|
|
}
|
|
|
|
status_counter_inc(srv, CONST_STR_LEN("scgi.requests"));
|
|
return HANDLER_GO_ON;
|
|
}
|
|
|
|
#define PATCH(x) \
|
|
p->conf.x = s->x;
|
|
static int scgi_patch_connection(server *srv, connection *con, plugin_data *p) {
|
|
size_t i, j;
|
|
plugin_config *s = p->config_storage[0];
|
|
|
|
PATCH(exts);
|
|
PATCH(exts_auth);
|
|
PATCH(exts_resp);
|
|
PATCH(proto);
|
|
PATCH(debug);
|
|
PATCH(balance);
|
|
PATCH(ext_mapping);
|
|
|
|
/* skip the first, the global context */
|
|
for (i = 1; i < srv->config_context->used; i++) {
|
|
if (!config_check_cond(con, i)) continue; /* condition not matched */
|
|
|
|
data_config *dc = (data_config *)srv->config_context->data[i];
|
|
s = p->config_storage[i];
|
|
|
|
/* merge config */
|
|
for (j = 0; j < dc->value->used; j++) {
|
|
data_unset *du = dc->value->data[j];
|
|
|
|
if (buffer_is_equal_string(&du->key, CONST_STR_LEN("scgi.server"))) {
|
|
PATCH(exts);
|
|
PATCH(exts_auth);
|
|
PATCH(exts_resp);
|
|
} else if (buffer_is_equal_string(&du->key, CONST_STR_LEN("scgi.protocol"))) {
|
|
PATCH(proto);
|
|
} else if (buffer_is_equal_string(&du->key, CONST_STR_LEN("scgi.balance"))) {
|
|
PATCH(balance);
|
|
} else if (buffer_is_equal_string(&du->key, CONST_STR_LEN("scgi.debug"))) {
|
|
PATCH(debug);
|
|
} else if (buffer_is_equal_string(&du->key, CONST_STR_LEN("scgi.map-extensions"))) {
|
|
PATCH(ext_mapping);
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#undef PATCH
|
|
|
|
|
|
static handler_t scgi_check_extension(server *srv, connection *con, void *p_d, int uri_path_handler) {
|
|
plugin_data *p = p_d;
|
|
handler_t rc;
|
|
|
|
if (con->mode != DIRECT) return HANDLER_GO_ON;
|
|
|
|
scgi_patch_connection(srv, con, p);
|
|
if (NULL == p->conf.exts) return HANDLER_GO_ON;
|
|
|
|
rc = gw_check_extension(srv, con, p, uri_path_handler, 0);
|
|
if (HANDLER_GO_ON != rc) return rc;
|
|
|
|
if (con->mode == p->id) {
|
|
handler_ctx *hctx = con->plugin_ctx[p->id];
|
|
hctx->opts.backend = BACKEND_SCGI;
|
|
hctx->create_env = scgi_create_env;
|
|
hctx->response = chunk_buffer_acquire();
|
|
}
|
|
|
|
return HANDLER_GO_ON;
|
|
}
|
|
|
|
/* uri-path handler */
|
|
static handler_t scgi_check_extension_1(server *srv, connection *con, void *p_d) {
|
|
return scgi_check_extension(srv, con, p_d, 1);
|
|
}
|
|
|
|
/* start request handler */
|
|
static handler_t scgi_check_extension_2(server *srv, connection *con, void *p_d) {
|
|
return scgi_check_extension(srv, con, p_d, 0);
|
|
}
|
|
|
|
|
|
|
|
int mod_scgi_plugin_init(plugin *p);
|
|
int mod_scgi_plugin_init(plugin *p) {
|
|
p->version = LIGHTTPD_VERSION_ID;
|
|
p->name = "scgi";
|
|
|
|
p->init = gw_init;
|
|
p->cleanup = gw_free;
|
|
p->set_defaults = mod_scgi_set_defaults;
|
|
p->connection_reset = gw_connection_reset;
|
|
p->handle_uri_clean = scgi_check_extension_1;
|
|
p->handle_subrequest_start = scgi_check_extension_2;
|
|
p->handle_subrequest = gw_handle_subrequest;
|
|
p->handle_trigger = gw_handle_trigger;
|
|
p->handle_waitpid = gw_handle_waitpid_cb;
|
|
|
|
return 0;
|
|
}
|