# include "first.h"
# include "server.h"
# include "log.h"
# include "stream.h"
# include "plugin.h"
# include "configparser.h"
# include "configfile.h"
# include "proc_open.h"
[config] opts for http header parsing strictness (fixes #551, fixes #1086, fixes #1184, fixes #2143, #2258, #2281, fixes #946, fixes #1330, fixes #602, #1016)
server.http-parseopt-header-strict = "enable"
server.http-parseopt-host-strict = "enable" (implies host-normalize)
server.http-parseopt-host-normalize = "disable"
defaults retain current behavior, which is strict header parsing
and strict host parsing, with enhancement to normalize IPv4 address
and port number strings.
For lighttpd tests, these need to be enabled (and are by default)
For marginally faster HTTP header parsing for benchmarks, disable these.
To allow
- underscores in hostname
- hypen ('-') at beginning of hostname
- all-numeric TLDs
server.http-parseopt-host-strict = "disable"
x-ref:
"lighttpd doesn't allow underscores in host names"
https://redmine.lighttpd.net/issues/551
"hyphen in hostname"
https://redmine.lighttpd.net/issues/1086
"a numeric tld"
https://redmine.lighttpd.net/issues/1184
"Numeric tld's"
https://redmine.lighttpd.net/issues/2143
"Bad Request"
https://redmine.lighttpd.net/issues/2258
"400 Bad Request when using Numeric TLDs"
https://redmine.lighttpd.net/issues/2281
To allow a variety of numerical formats to be converted to IP addresses
server.http-parseopt-host-strict = "disable"
server.http-parseopt-host-normalize = "enable"
x-ref:
"URL encoding leads to "400 - Bad Request""
https://redmine.lighttpd.net/issues/946
"400 Bad Request when using IP's numeric value ("ip2long()")"
https://redmine.lighttpd.net/issues/1330
To allow most 8-bit and 7-bit chars in headers
server.http-parseopt-header-strict = "disable" (not recommended)
x-ref:
"Russian letters not alowed?"
https://redmine.lighttpd.net/issues/602
"header Content-Disposition with russian '?' (CP1251, ascii code 255) causes error"
https://redmine.lighttpd.net/issues/1016
6 years ago
# include "request.h"
# include "version.h"
# include <sys/stat.h>
# include <stdlib.h>
# include <fcntl.h>
# include <unistd.h>
# include <errno.h>
# include <string.h>
# include <stdio.h>
# include <ctype.h>
# include <limits.h>
# include <assert.h>
# include <glob.h>
# if defined(HAVE_MYSQL) || (defined(HAVE_LDAP_H) && defined(HAVE_LBER_H) && defined(HAVE_LIBLDAP) && defined(HAVE_LIBLBER))
static void config_warn_authn_module ( server * srv , const char * module ) {
size_t len = strlen ( module ) ;
for ( size_t i = 0 ; i < srv - > config_context - > used ; + + i ) {
const data_config * config = ( data_config const * ) srv - > config_context - > data [ i ] ;
const data_unset * du = array_get_element ( config - > value , " auth.backend " ) ;
if ( NULL ! = du & & du - > type = = TYPE_STRING ) {
data_string * ds = ( data_string * ) du ;
if ( buffer_is_equal_string ( ds - > value , module , len ) ) {
ds = data_string_init ( ) ;
buffer_copy_string_len ( ds - > value , CONST_STR_LEN ( " mod_authn_ " ) ) ;
buffer_append_string ( ds - > value , module ) ;
array_insert_unique ( srv - > srvconf . modules , ( data_unset * ) ds ) ;
log_error_write ( srv , __FILE__ , __LINE__ , " SSSsSSS " , " Warning: please add \" mod_authn_ " , module , " \" to server.modules list in lighttpd.conf. A future release of lighttpd 1.4.x will not automatically load mod_authn_ " , module , " and lighttpd will fail to start up since your lighttpd.conf uses auth.backend = \" " , module , " \" . " ) ;
return ;
}
}
}
}
# endif
# if defined HAVE_LIBSSL && defined HAVE_OPENSSL_SSL_H
static void config_warn_openssl_module ( server * srv ) {
for ( size_t i = 0 ; i < srv - > config_context - > used ; + + i ) {
const data_config * config = ( data_config const * ) srv - > config_context - > data [ i ] ;
for ( size_t j = 0 ; j < config - > value - > used ; + + j ) {
data_unset * du = config - > value - > data [ j ] ;
if ( 0 = = strncmp ( du - > key - > ptr , " ssl. " , sizeof ( " ssl. " ) - 1 ) ) {
/* mod_openssl should be loaded after mod_extforward */
data_string * ds = data_string_init ( ) ;
buffer_copy_string_len ( ds - > value , CONST_STR_LEN ( " mod_openssl " ) ) ;
array_insert_unique ( srv - > srvconf . modules , ( data_unset * ) ds ) ;
log_error_write ( srv , __FILE__ , __LINE__ , " S " , " Warning: please add \" mod_openssl \" to server.modules list in lighttpd.conf. A future release of lighttpd 1.4.x *will not* automatically load mod_openssl and lighttpd *will not* use SSL/TLS where your lighttpd.conf contains ssl.* directives " ) ;
return ;
}
}
}
}
# endif
static int config_insert ( server * srv ) {
size_t i ;
int ret = 0 ;
buffer * stat_cache_string ;
config_values_t cv [ ] = {
{ " server.bind " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 0 */
{ " server.errorlog " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 1 */
{ " server.errorfile-prefix " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 2 */
{ " server.chroot " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 3 */
{ " server.username " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 4 */
{ " server.groupname " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 5 */
{ " server.port " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_SERVER } , /* 6 */
{ " server.tag " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 7 */
{ " server.use-ipv6 " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 8 */
{ " server.modules " , NULL , T_CONFIG_ARRAY , T_CONFIG_SCOPE_SERVER } , /* 9 */
{ " server.event-handler " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 10 */
{ " server.pid-file " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 11 */
{ " server.max-request-size " , NULL , T_CONFIG_INT , T_CONFIG_SCOPE_CONNECTION } , /* 12 */
{ " server.max-worker " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_SERVER } , /* 13 */
{ " server.document-root " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 14 */
{ " server.force-lowercase-filenames " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 15 */
{ " debug.log-condition-handling " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 16 */
{ " server.max-keep-alive-requests " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 17 */
{ " server.name " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 18 */
{ " server.max-keep-alive-idle " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 19 */
{ " server.max-read-idle " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 20 */
{ " server.max-write-idle " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 21 */
[core] server.error-handler new directive for error pages (fixes #2702)
server.error-handler preserves HTTP status error code when error page
is static, and allows dynamic handlers to change HTTP status code
when error page is provided by dynamic handler. server.error-handler
intercepts all HTTP status codes >= 400 except when the content is
generated by a dynamic handler (cgi, ssi, fastcgi, scgi, proxy, lua).
The request method is unconditionally changed to GET for the request
to service the error handler, and the original request method is
later restored (for logging purposes). request body from the
original request, if present, is discarded.
server.error-handler is somewhat similar to server.error-handler-404,
but server.error-handler-404 is now deprecated, intercepts only 404
and 403 HTTP status codes, and returns 200 OK for static error pages,
a source of confusion for some admins. On the other hand, the new
server.error-handler, when set, will intercept all HTTP status error
codes >= 400. server.error-handler takes precedence over
server.error-handler-404 when both are set.
NOTE: a major difference between server.error-handler and the
now-deprecated server.error-handler-404 is that the values of the
non-standard CGI environment variables REQUEST_URI and REDIRECT_URI
have been swapped. Since REDIRECT_STATUS is the original HTTP
status code, REDIRECT_URI is now the original request, and REQUEST_URI
is the current request (e.g. the URI/URL to the error handler).
The prior behavior -- which reversed REQUEST_URI and REDIRECT_URI values
from those described above -- is preserved for server.error-handler-404.
Additionally, REDIRECT_STATUS is now available to mod_magnet, which
continues to have access to request.uri and request.orig_uri.
See further discussion at https://redmine.lighttpd.net/issues/2702
and https://redmine.lighttpd.net/issues/1828
github: closes #36
6 years ago
{ " server.error-handler " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 22 */
{ " server.max-fds " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_SERVER } , /* 23 */
# ifdef HAVE_LSTAT
{ " server.follow-symlink " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 24 */
# else
{ " server.follow-symlink " ,
" Your system lacks lstat(). We can not differ symlinks from files. "
" Please remove server.follow-symlinks from your config. " ,
T_CONFIG_UNSUPPORTED , T_CONFIG_SCOPE_UNSET } ,
# endif
{ " server.kbytes-per-second " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 25 */
{ " connection.kbytes-per-second " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 26 */
{ " mimetype.use-xattr " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 27 */
{ " mimetype.assign " , NULL , T_CONFIG_ARRAY , T_CONFIG_SCOPE_CONNECTION } , /* 28 */
{ " ssl.pemfile " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 29 */
{ " ssl.engine " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 30 */
{ " debug.log-file-not-found " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 31 */
{ " debug.log-request-handling " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 32 */
{ " debug.log-response-header " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 33 */
{ " debug.log-request-header " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 34 */
{ " debug.log-ssl-noise " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 35 */
{ " server.protocol-http11 " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 36 */
{ " debug.log-request-header-on-error " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_SERVER } , /* 37 */
{ " debug.log-state-handling " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_SERVER } , /* 38 */
{ " ssl.ca-file " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 39 */
{ " server.errorlog-use-syslog " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_SERVER } , /* 40 */
{ " server.range-requests " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 41 */
{ " server.stat-cache-engine " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 42 */
{ " server.max-connections " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_SERVER } , /* 43 */
{ " server.network-backend " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 44 */
{ " server.upload-dirs " , NULL , T_CONFIG_ARRAY , T_CONFIG_SCOPE_SERVER } , /* 45 */
{ " server.core-files " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_SERVER } , /* 46 */
{ " ssl.cipher-list " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 47 */
{ " ssl.use-sslv2 " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 48 */
{ " etag.use-inode " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 49 */
{ " etag.use-mtime " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 50 */
{ " etag.use-size " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 51 */
{ " server.reject-expect-100-with-417 " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_SERVER } , /* 52 */
{ " debug.log-timeouts " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 53 */
{ " server.defer-accept " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 54 */
{ " server.breakagelog " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 55 */
{ " ssl.verifyclient.activate " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 56 */
{ " ssl.verifyclient.enforce " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 57 */
{ " ssl.verifyclient.depth " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 58 */
{ " ssl.verifyclient.username " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 59 */
{ " ssl.verifyclient.exportcert " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 60 */
{ " server.set-v6only " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 61 */
{ " ssl.use-sslv3 " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 62 */
{ " ssl.dh-file " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 63 */
{ " ssl.ec-curve " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 64 */
{ " ssl.disable-client-renegotiation " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 65 */
{ " ssl.honor-cipher-order " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 66 */
{ " ssl.empty-fragments " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 67 */
{ " server.upload-temp-file-size " , NULL , T_CONFIG_INT , T_CONFIG_SCOPE_SERVER } , /* 68 */
{ " mimetype.xattr-name " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_SERVER } , /* 69 */
{ " server.listen-backlog " , NULL , T_CONFIG_INT , T_CONFIG_SCOPE_CONNECTION } , /* 70 */
[core] server.error-handler new directive for error pages (fixes #2702)
server.error-handler preserves HTTP status error code when error page
is static, and allows dynamic handlers to change HTTP status code
when error page is provided by dynamic handler. server.error-handler
intercepts all HTTP status codes >= 400 except when the content is
generated by a dynamic handler (cgi, ssi, fastcgi, scgi, proxy, lua).
The request method is unconditionally changed to GET for the request
to service the error handler, and the original request method is
later restored (for logging purposes). request body from the
original request, if present, is discarded.
server.error-handler is somewhat similar to server.error-handler-404,
but server.error-handler-404 is now deprecated, intercepts only 404
and 403 HTTP status codes, and returns 200 OK for static error pages,
a source of confusion for some admins. On the other hand, the new
server.error-handler, when set, will intercept all HTTP status error
codes >= 400. server.error-handler takes precedence over
server.error-handler-404 when both are set.
NOTE: a major difference between server.error-handler and the
now-deprecated server.error-handler-404 is that the values of the
non-standard CGI environment variables REQUEST_URI and REDIRECT_URI
have been swapped. Since REDIRECT_STATUS is the original HTTP
status code, REDIRECT_URI is now the original request, and REQUEST_URI
is the current request (e.g. the URI/URL to the error handler).
The prior behavior -- which reversed REQUEST_URI and REDIRECT_URI values
from those described above -- is preserved for server.error-handler-404.
Additionally, REDIRECT_STATUS is now available to mod_magnet, which
continues to have access to request.uri and request.orig_uri.
See further discussion at https://redmine.lighttpd.net/issues/2702
and https://redmine.lighttpd.net/issues/1828
github: closes #36
6 years ago
{ " server.error-handler-404 " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 71 */
[config] opts for http header parsing strictness (fixes #551, fixes #1086, fixes #1184, fixes #2143, #2258, #2281, fixes #946, fixes #1330, fixes #602, #1016)
server.http-parseopt-header-strict = "enable"
server.http-parseopt-host-strict = "enable" (implies host-normalize)
server.http-parseopt-host-normalize = "disable"
defaults retain current behavior, which is strict header parsing
and strict host parsing, with enhancement to normalize IPv4 address
and port number strings.
For lighttpd tests, these need to be enabled (and are by default)
For marginally faster HTTP header parsing for benchmarks, disable these.
To allow
- underscores in hostname
- hypen ('-') at beginning of hostname
- all-numeric TLDs
server.http-parseopt-host-strict = "disable"
x-ref:
"lighttpd doesn't allow underscores in host names"
https://redmine.lighttpd.net/issues/551
"hyphen in hostname"
https://redmine.lighttpd.net/issues/1086
"a numeric tld"
https://redmine.lighttpd.net/issues/1184
"Numeric tld's"
https://redmine.lighttpd.net/issues/2143
"Bad Request"
https://redmine.lighttpd.net/issues/2258
"400 Bad Request when using Numeric TLDs"
https://redmine.lighttpd.net/issues/2281
To allow a variety of numerical formats to be converted to IP addresses
server.http-parseopt-host-strict = "disable"
server.http-parseopt-host-normalize = "enable"
x-ref:
"URL encoding leads to "400 - Bad Request""
https://redmine.lighttpd.net/issues/946
"400 Bad Request when using IP's numeric value ("ip2long()")"
https://redmine.lighttpd.net/issues/1330
To allow most 8-bit and 7-bit chars in headers
server.http-parseopt-header-strict = "disable" (not recommended)
x-ref:
"Russian letters not alowed?"
https://redmine.lighttpd.net/issues/602
"header Content-Disposition with russian '?' (CP1251, ascii code 255) causes error"
https://redmine.lighttpd.net/issues/1016
6 years ago
{ " server.http-parseopt-header-strict " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_SERVER } , /* 72 */
{ " server.http-parseopt-host-strict " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_SERVER } , /* 73 */
{ " server.http-parseopt-host-normalize " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_SERVER } , /* 74 */
{ " server.bsd-accept-filter " , NULL , T_CONFIG_STRING , T_CONFIG_SCOPE_CONNECTION } , /* 75 */
{ " server.stream-request-body " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 76 */
{ " server.stream-response-body " , NULL , T_CONFIG_SHORT , T_CONFIG_SCOPE_CONNECTION } , /* 77 */
{ " server.max-request-field-size " , NULL , T_CONFIG_INT , T_CONFIG_SCOPE_SERVER } , /* 78 */
{ " ssl.read-ahead " , NULL , T_CONFIG_BOOLEAN , T_CONFIG_SCOPE_CONNECTION } , /* 79 */
{ NULL , NULL , T_CONFIG_UNSET , T_CONFIG_SCOPE_UNSET }
} ;
/* all T_CONFIG_SCOPE_SERVER options */
cv [ 0 ] . destination = srv - > srvconf . bindhost ;
cv [ 1 ] . destination = srv - > srvconf . errorlog_file ;
cv [ 3 ] . destination = srv - > srvconf . changeroot ;
cv [ 4 ] . destination = srv - > srvconf . username ;
cv [ 5 ] . destination = srv - > srvconf . groupname ;
cv [ 6 ] . destination = & ( srv - > srvconf . port ) ;
cv [ 9 ] . destination = srv - > srvconf . modules ;
cv [ 10 ] . destination = srv - > srvconf . event_handler ;
cv [ 11 ] . destination = srv - > srvconf . pid_file ;
cv [ 13 ] . destination = & ( srv - > srvconf . max_worker ) ;
cv [ 23 ] . destination = & ( srv - > srvconf . max_fds ) ;
cv [ 37 ] . destination = & ( srv - > srvconf . log_request_header_on_error ) ;
cv [ 38 ] . destination = & ( srv - > srvconf . log_state_handling ) ;
cv [ 40 ] . destination = & ( srv - > srvconf . errorlog_use_syslog ) ;
stat_cache_string = buffer_init ( ) ;
cv [ 42 ] . destination = stat_cache_string ;
cv [ 43 ] . destination = & ( srv - > srvconf . max_conns ) ;
cv [ 44 ] . destination = srv - > srvconf . network_backend ;
cv [ 45 ] . destination = srv - > srvconf . upload_tempdirs ;
cv [ 46 ] . destination = & ( srv - > srvconf . enable_cores ) ;
cv [ 52 ] . destination = & ( srv - > srvconf . reject_expect_100_with_417 ) ;
cv [ 55 ] . destination = srv - > srvconf . breakagelog_file ;
cv [ 68 ] . destination = & ( srv - > srvconf . upload_temp_file_size ) ;
cv [ 69 ] . destination = srv - > srvconf . xattr_name ;
[config] opts for http header parsing strictness (fixes #551, fixes #1086, fixes #1184, fixes #2143, #2258, #2281, fixes #946, fixes #1330, fixes #602, #1016)
server.http-parseopt-header-strict = "enable"
server.http-parseopt-host-strict = "enable" (implies host-normalize)
server.http-parseopt-host-normalize = "disable"
defaults retain current behavior, which is strict header parsing
and strict host parsing, with enhancement to normalize IPv4 address
and port number strings.
For lighttpd tests, these need to be enabled (and are by default)
For marginally faster HTTP header parsing for benchmarks, disable these.
To allow
- underscores in hostname
- hypen ('-') at beginning of hostname
- all-numeric TLDs
server.http-parseopt-host-strict = "disable"
x-ref:
"lighttpd doesn't allow underscores in host names"
https://redmine.lighttpd.net/issues/551
"hyphen in hostname"
https://redmine.lighttpd.net/issues/1086
"a numeric tld"
https://redmine.lighttpd.net/issues/1184
"Numeric tld's"
https://redmine.lighttpd.net/issues/2143
"Bad Request"
https://redmine.lighttpd.net/issues/2258
"400 Bad Request when using Numeric TLDs"
https://redmine.lighttpd.net/issues/2281
To allow a variety of numerical formats to be converted to IP addresses
server.http-parseopt-host-strict = "disable"
server.http-parseopt-host-normalize = "enable"
x-ref:
"URL encoding leads to "400 - Bad Request""
https://redmine.lighttpd.net/issues/946
"400 Bad Request when using IP's numeric value ("ip2long()")"
https://redmine.lighttpd.net/issues/1330
To allow most 8-bit and 7-bit chars in headers
server.http-parseopt-header-strict = "disable" (not recommended)
x-ref:
"Russian letters not alowed?"
https://redmine.lighttpd.net/issues/602
"header Content-Disposition with russian '?' (CP1251, ascii code 255) causes error"
https://redmine.lighttpd.net/issues/1016
6 years ago
cv [ 72 ] . destination = & ( srv - > srvconf . http_header_strict ) ;
cv [ 73 ] . destination = & ( srv - > srvconf . http_host_strict ) ;
cv [ 74 ] . destination = & ( srv - > srvconf . http_host_normalize ) ;
cv [ 78 ] . destination = & ( srv - > srvconf . max_request_field_size ) ;
srv - > config_storage = calloc ( 1 , srv - > config_context - > used * sizeof ( specific_config * ) ) ;
force_assert ( srv - > config_storage ) ;
force_assert ( srv - > config_context - > used ) ; /* static analysis hint for ccc
- analyzer */
for ( i = 0 ; i < srv - > config_context - > used ; i + + ) {
data_config const * config = ( data_config const * ) srv - > config_context - > data [ i ] ;
specific_config * s ;
s = calloc ( 1 , sizeof ( specific_config ) ) ;
force_assert ( s ) ;
s - > document_root = buffer_init ( ) ;
s - > mimetypes = array_init ( ) ;
s - > server_name = buffer_init ( ) ;
s - > ssl_pemfile = buffer_init ( ) ;
s - > ssl_ca_file = buffer_init ( ) ;
s - > error_handler = buffer_init ( ) ;
[core] server.error-handler new directive for error pages (fixes #2702)
server.error-handler preserves HTTP status error code when error page
is static, and allows dynamic handlers to change HTTP status code
when error page is provided by dynamic handler. server.error-handler
intercepts all HTTP status codes >= 400 except when the content is
generated by a dynamic handler (cgi, ssi, fastcgi, scgi, proxy, lua).
The request method is unconditionally changed to GET for the request
to service the error handler, and the original request method is
later restored (for logging purposes). request body from the
original request, if present, is discarded.
server.error-handler is somewhat similar to server.error-handler-404,
but server.error-handler-404 is now deprecated, intercepts only 404
and 403 HTTP status codes, and returns 200 OK for static error pages,
a source of confusion for some admins. On the other hand, the new
server.error-handler, when set, will intercept all HTTP status error
codes >= 400. server.error-handler takes precedence over
server.error-handler-404 when both are set.
NOTE: a major difference between server.error-handler and the
now-deprecated server.error-handler-404 is that the values of the
non-standard CGI environment variables REQUEST_URI and REDIRECT_URI
have been swapped. Since REDIRECT_STATUS is the original HTTP
status code, REDIRECT_URI is now the original request, and REQUEST_URI
is the current request (e.g. the URI/URL to the error handler).
The prior behavior -- which reversed REQUEST_URI and REDIRECT_URI values
from those described above -- is preserved for server.error-handler-404.
Additionally, REDIRECT_STATUS is now available to mod_magnet, which
continues to have access to request.uri and request.orig_uri.
See further discussion at https://redmine.lighttpd.net/issues/2702
and https://redmine.lighttpd.net/issues/1828
github: closes #36
6 years ago
s - > error_handler_404 = buffer_init ( ) ;
s - > server_tag = buffer_init_string ( PACKAGE_DESC ) ;
s - > ssl_cipher_list = buffer_init ( ) ;
s - > ssl_dh_file = buffer_init ( ) ;
s - > ssl_ec_curve = buffer_init ( ) ;
s - > errorfile_prefix = buffer_init ( ) ;
# if defined(__FreeBSD__) || defined(__NetBSD__) \
| | defined ( __OpenBSD__ ) | | defined ( __DragonFly__ )
s - > bsd_accept_filter = ( i = = 0 )
? buffer_init ( )
: buffer_init_buffer ( srv - > config_storage [ 0 ] - > bsd_accept_filter ) ;
# endif
s - > max_keep_alive_requests = 16 ;
s - > max_keep_alive_idle = 5 ;
s - > max_read_idle = 60 ;
s - > max_write_idle = 360 ;
s - > max_request_size = 0 ;
s - > use_xattr = 0 ;
s - > ssl_enabled = 0 ;
s - > ssl_honor_cipher_order = 1 ;
s - > ssl_empty_fragments = 0 ;
s - > ssl_use_sslv2 = 0 ;
s - > ssl_use_sslv3 = 0 ;
s - > use_ipv6 = ( i = = 0 ) ? 0 : srv - > config_storage [ 0 ] - > use_ipv6 ;
s - > set_v6only = ( i = = 0 ) ? 1 : srv - > config_storage [ 0 ] - > set_v6only ;
s - > defer_accept = ( i = = 0 ) ? 0 : srv - > config_storage [ 0 ] - > defer_accept ;
# ifdef HAVE_LSTAT
s - > follow_symlink = 1 ;
# endif
s - > kbytes_per_second = 0 ;
s - > allow_http11 = 1 ;
s - > etag_use_inode = 1 ;
s - > etag_use_mtime = 1 ;
s - > etag_use_size = 1 ;
s - > range_requests = 1 ;
s - > force_lowercase_filenames = ( i = = 0 ) ? 2 : 0 ; /* we wan't to detect later if user changed this for global section */
s - > global_kbytes_per_second = 0 ;
s - > global_bytes_per_second_cnt = 0 ;
s - > global_bytes_per_second_cnt_ptr = & s - > global_bytes_per_second_cnt ;
s - > ssl_verifyclient = 0 ;
s - > ssl_verifyclient_enforce = 1 ;
s - > ssl_verifyclient_username = buffer_init ( ) ;
s - > ssl_verifyclient_depth = 9 ;
s - > ssl_verifyclient_export_cert = 0 ;
s - > ssl_disable_client_renegotiation = 1 ;
s - > ssl_read_ahead = ( 0 = = i ? 1 : srv - > config_storage [ 0 ] - > ssl_read_ahead ) ;
s - > listen_backlog = ( 0 = = i ? 1024 : srv - > config_storage [ 0 ] - > listen_backlog ) ;
s - > stream_request_body = 0 ;
s - > stream_response_body = 0 ;
/* all T_CONFIG_SCOPE_CONNECTION options */
cv [ 2 ] . destination = s - > errorfile_prefix ;
cv [ 7 ] . destination = s - > server_tag ;
cv [ 8 ] . destination = & ( s - > use_ipv6 ) ;
cv [ 12 ] . destination = & ( s - > max_request_size ) ;
cv [ 14 ] . destination = s - > document_root ;
cv [ 15 ] . destination = & ( s - > force_lowercase_filenames ) ;
cv [ 16 ] . destination = & ( s - > log_condition_handling ) ;
cv [ 17 ] . destination = & ( s - > max_keep_alive_requests ) ;
cv [ 18 ] . destination = s - > server_name ;
cv [ 19 ] . destination = & ( s - > max_keep_alive_idle ) ;
cv [ 20 ] . destination = & ( s - > max_read_idle ) ;
cv [ 21 ] . destination = & ( s - > max_write_idle ) ;
cv [ 22 ] . destination = s - > error_handler ;
# ifdef HAVE_LSTAT
cv [ 24 ] . destination = & ( s - > follow_symlink ) ;
# endif
cv [ 25 ] . destination = & ( s - > global_kbytes_per_second ) ;
cv [ 26 ] . destination = & ( s - > kbytes_per_second ) ;
cv [ 27 ] . destination = & ( s - > use_xattr ) ;
cv [ 28 ] . destination = s - > mimetypes ;
cv [ 29 ] . destination = s - > ssl_pemfile ;
cv [ 30 ] . destination = & ( s - > ssl_enabled ) ;
cv [ 31 ] . destination = & ( s - > log_file_not_found ) ;
cv [ 32 ] . destination = & ( s - > log_request_handling ) ;
cv [ 33 ] . destination = & ( s - > log_response_header ) ;
cv [ 34 ] . destination = & ( s - > log_request_header ) ;
cv [ 35 ] . destination = & ( s - > log_ssl_noise ) ;
cv [ 36 ] . destination = & ( s - > allow_http11 ) ;
cv [ 39 ] . destination = s - > ssl_ca_file ;
cv [ 41 ] . destination = & ( s - > range_requests ) ;
cv [ 47 ] . destination = s - > ssl_cipher_list ;
cv [ 48 ] . destination = & ( s - > ssl_use_sslv2 ) ;
cv [ 49 ] . destination = & ( s - > etag_use_inode ) ;
cv [ 50 ] . destination = & ( s - > etag_use_mtime ) ;
cv [ 51 ] . destination = & ( s - > etag_use_size ) ;
cv [ 53 ] . destination = & ( s - > log_timeouts ) ;
cv [ 54 ] . destination = & ( s - > defer_accept ) ;
cv [ 56 ] . destination = & ( s - > ssl_verifyclient ) ;
cv [ 57 ] . destination = & ( s - > ssl_verifyclient_enforce ) ;
cv [ 58 ] . destination = & ( s - > ssl_verifyclient_depth ) ;
cv [ 59 ] . destination = s - > ssl_verifyclient_username ;
cv [ 60 ] . destination = & ( s - > ssl_verifyclient_export_cert ) ;
cv [ 61 ] . destination = & ( s - > set_v6only ) ;
cv [ 62 ] . destination = & ( s - > ssl_use_sslv3 ) ;
cv [ 63 ] . destination = s - > ssl_dh_file ;
cv [ 64 ] . destination = s - > ssl_ec_curve ;
cv [ 65 ] . destination = & ( s - > ssl_disable_client_renegotiation ) ;
cv [ 66 ] . destination = & ( s - > ssl_honor_cipher_order ) ;
cv [ 67 ] . destination = & ( s - > ssl_empty_fragments ) ;
cv [ 70 ] . destination = & ( s - > listen_backlog ) ;
[core] server.error-handler new directive for error pages (fixes #2702)
server.error-handler preserves HTTP status error code when error page
is static, and allows dynamic handlers to change HTTP status code
when error page is provided by dynamic handler. server.error-handler
intercepts all HTTP status codes >= 400 except when the content is
generated by a dynamic handler (cgi, ssi, fastcgi, scgi, proxy, lua).
The request method is unconditionally changed to GET for the request
to service the error handler, and the original request method is
later restored (for logging purposes). request body from the
original request, if present, is discarded.
server.error-handler is somewhat similar to server.error-handler-404,
but server.error-handler-404 is now deprecated, intercepts only 404
and 403 HTTP status codes, and returns 200 OK for static error pages,
a source of confusion for some admins. On the other hand, the new
server.error-handler, when set, will intercept all HTTP status error
codes >= 400. server.error-handler takes precedence over
server.error-handler-404 when both are set.
NOTE: a major difference between server.error-handler and the
now-deprecated server.error-handler-404 is that the values of the
non-standard CGI environment variables REQUEST_URI and REDIRECT_URI
have been swapped. Since REDIRECT_STATUS is the original HTTP
status code, REDIRECT_URI is now the original request, and REQUEST_URI
is the current request (e.g. the URI/URL to the error handler).
The prior behavior -- which reversed REQUEST_URI and REDIRECT_URI values
from those described above -- is preserved for server.error-handler-404.
Additionally, REDIRECT_STATUS is now available to mod_magnet, which
continues to have access to request.uri and request.orig_uri.
See further discussion at https://redmine.lighttpd.net/issues/2702
and https://redmine.lighttpd.net/issues/1828
github: closes #36
6 years ago
cv [ 71 ] . destination = s - > error_handler_404 ;
# if defined(__FreeBSD__) || defined(__NetBSD__) \
| | defined ( __OpenBSD__ ) | | defined ( __DragonFly__ )
cv [ 75 ] . destination = s - > bsd_accept_filter ;
# endif
cv [ 76 ] . destination = & ( s - > stream_request_body ) ;
cv [ 77 ] . destination = & ( s - > stream_response_body ) ;
cv [ 79 ] . destination = & ( s - > ssl_read_ahead ) ;
srv - > config_storage [ i ] = s ;
if ( 0 ! = ( ret = config_insert_values_global ( srv , config - > value , cv , i = = 0 ? T_CONFIG_SCOPE_SERVER : T_CONFIG_SCOPE_CONNECTION ) ) ) {
break ;
}
if ( s - > stream_request_body & FDEVENT_STREAM_REQUEST_BUFMIN ) {
s - > stream_request_body | = FDEVENT_STREAM_REQUEST ;
}
if ( s - > stream_response_body & FDEVENT_STREAM_RESPONSE_BUFMIN ) {
s - > stream_response_body | = FDEVENT_STREAM_RESPONSE ;
}
}
[config] opts for http header parsing strictness (fixes #551, fixes #1086, fixes #1184, fixes #2143, #2258, #2281, fixes #946, fixes #1330, fixes #602, #1016)
server.http-parseopt-header-strict = "enable"
server.http-parseopt-host-strict = "enable" (implies host-normalize)
server.http-parseopt-host-normalize = "disable"
defaults retain current behavior, which is strict header parsing
and strict host parsing, with enhancement to normalize IPv4 address
and port number strings.
For lighttpd tests, these need to be enabled (and are by default)
For marginally faster HTTP header parsing for benchmarks, disable these.
To allow
- underscores in hostname
- hypen ('-') at beginning of hostname
- all-numeric TLDs
server.http-parseopt-host-strict = "disable"
x-ref:
"lighttpd doesn't allow underscores in host names"
https://redmine.lighttpd.net/issues/551
"hyphen in hostname"
https://redmine.lighttpd.net/issues/1086
"a numeric tld"
https://redmine.lighttpd.net/issues/1184
"Numeric tld's"
https://redmine.lighttpd.net/issues/2143
"Bad Request"
https://redmine.lighttpd.net/issues/2258
"400 Bad Request when using Numeric TLDs"
https://redmine.lighttpd.net/issues/2281
To allow a variety of numerical formats to be converted to IP addresses
server.http-parseopt-host-strict = "disable"
server.http-parseopt-host-normalize = "enable"
x-ref:
"URL encoding leads to "400 - Bad Request""
https://redmine.lighttpd.net/issues/946
"400 Bad Request when using IP's numeric value ("ip2long()")"
https://redmine.lighttpd.net/issues/1330
To allow most 8-bit and 7-bit chars in headers
server.http-parseopt-header-strict = "disable" (not recommended)
x-ref:
"Russian letters not alowed?"
https://redmine.lighttpd.net/issues/602
"header Content-Disposition with russian '?' (CP1251, ascii code 255) causes error"
https://redmine.lighttpd.net/issues/1016
6 years ago
{
specific_config * s = srv - > config_storage [ 0 ] ;
s - > http_parseopts = /*(global, but stored in con->conf.http_parseopts)*/
( srv - > srvconf . http_header_strict ? ( HTTP_PARSEOPT_HEADER_STRICT ) : 0 )
| ( srv - > srvconf . http_host_strict ? ( HTTP_PARSEOPT_HOST_STRICT
| HTTP_PARSEOPT_HOST_NORMALIZE ) : 0 )
| ( srv - > srvconf . http_host_normalize ? ( HTTP_PARSEOPT_HOST_NORMALIZE ) : 0 ) ;
}
if ( buffer_string_is_empty ( stat_cache_string ) ) {
srv - > srvconf . stat_cache_engine = STAT_CACHE_ENGINE_SIMPLE ;
} else if ( buffer_is_equal_string ( stat_cache_string , CONST_STR_LEN ( " simple " ) ) ) {
srv - > srvconf . stat_cache_engine = STAT_CACHE_ENGINE_SIMPLE ;
# ifdef HAVE_FAM_H
} else if ( buffer_is_equal_string ( stat_cache_string , CONST_STR_LEN ( " fam " ) ) ) {
srv - > srvconf . stat_cache_engine = STAT_CACHE_ENGINE_FAM ;
# endif
} else if ( buffer_is_equal_string ( stat_cache_string , CONST_STR_LEN ( " disable " ) ) ) {
srv - > srvconf . stat_cache_engine = STAT_CACHE_ENGINE_NONE ;
} else {
log_error_write ( srv , __FILE__ , __LINE__ , " sb " ,
" server.stat-cache-engine can be one of \" disable \" , \" simple \" , "
# ifdef HAVE_FAM_H
" \" fam \" , "
# endif
" but not: " , stat_cache_string ) ;
ret = HANDLER_ERROR ;
}
buffer_free ( stat_cache_string ) ;
{
data_string * ds ;
int prepend_mod_indexfile = 1 ;
int append_mod_dirlisting = 1 ;
int append_mod_staticfile = 1 ;
int append_mod_authn_file = 1 ;
int append_mod_authn_ldap = 1 ;
int append_mod_authn_mysql = 1 ;
int append_mod_openssl = 1 ;
int contains_mod_auth = 0 ;
/* prepend default modules */
for ( i = 0 ; i < srv - > srvconf . modules - > used ; i + + ) {
ds = ( data_string * ) srv - > srvconf . modules - > data [ i ] ;
if ( buffer_is_equal_string ( ds - > value , CONST_STR_LEN ( " mod_indexfile " ) ) ) {
prepend_mod_indexfile = 0 ;
}
if ( buffer_is_equal_string ( ds - > value , CONST_STR_LEN ( " mod_staticfile " ) ) ) {
append_mod_staticfile = 0 ;
}
if ( buffer_is_equal_string ( ds - > value , CONST_STR_LEN ( " mod_dirlisting " ) ) ) {
append_mod_dirlisting = 0 ;
}
if ( buffer_is_equal_string ( ds - > value , CONST_STR_LEN ( " mod_openssl " ) ) ) {
append_mod_openssl = 0 ;
}
if ( buffer_is_equal_string ( ds - > value , CONST_STR_LEN ( " mod_authn_file " ) ) ) {
append_mod_authn_file = 0 ;
}
if ( buffer_is_equal_string ( ds - > value , CONST_STR_LEN ( " mod_authn_ldap " ) ) ) {
append_mod_authn_ldap = 0 ;
}
if ( buffer_is_equal_string ( ds - > value , CONST_STR_LEN ( " mod_authn_mysql " ) ) ) {
append_mod_authn_mysql = 0 ;
}
if ( buffer_is_equal_string ( ds - > value , CONST_STR_LEN ( " mod_auth " ) ) ) {
contains_mod_auth = 1 ;
}
if ( 0 = = prepend_mod_indexfile & &
0 = = append_mod_dirlisting & &
0 = = append_mod_staticfile & &
0 = = append_mod_openssl & &
0 = = append_mod_authn_file & &
0 = = append_mod_authn_ldap & &
0 = = append_mod_authn_mysql & &
1 = = contains_mod_auth ) {
break ;
}
}
if ( prepend_mod_indexfile ) {
/* mod_indexfile has to be loaded before mod_fastcgi and friends */
array * modules = array_init ( ) ;
ds = data_string_init ( ) ;
buffer_copy_string_len ( ds - > value , CONST_STR_LEN ( " mod_indexfile " ) ) ;
array_insert_unique ( modules , ( data_unset * ) ds ) ;
for ( i = 0 ; i < srv - > srvconf . modules - > used ; i + + ) {
data_unset * du = srv - > srvconf . modules - > data [ i ] ;
array_insert_unique ( modules , du - > copy ( du ) ) ;
}
array_free ( srv - > srvconf . modules ) ;
srv - > srvconf . modules = modules ;
}
/* append default modules */
if ( append_mod_dirlisting ) {
ds = data_string_init ( ) ;
buffer_copy_string_len ( ds - > value , CONST_STR_LEN ( " mod_dirlisting " ) ) ;
array_insert_unique ( srv - > srvconf . modules , ( data_unset * ) ds ) ;
}
if ( append_mod_staticfile ) {
ds = data_string_init ( ) ;
buffer_copy_string_len ( ds - > value , CONST_STR_LEN ( " mod_staticfile " ) ) ;
array_insert_unique ( srv - > srvconf . modules , ( data_unset * ) ds ) ;
}
if ( append_mod_openssl ) {
# if defined HAVE_LIBSSL && defined HAVE_OPENSSL_SSL_H
config_warn_openssl_module ( srv ) ;
# endif
}
/* mod_auth.c,http_auth.c auth backends were split into separate modules
* Automatically load auth backend modules for compatibility with
* existing lighttpd 1.4 . x configs */
if ( contains_mod_auth ) {
if ( append_mod_authn_file ) {
ds = data_string_init ( ) ;
buffer_copy_string_len ( ds - > value , CONST_STR_LEN ( " mod_authn_file " ) ) ;
array_insert_unique ( srv - > srvconf . modules , ( data_unset * ) ds ) ;
}
if ( append_mod_authn_ldap ) {
# if defined(HAVE_LDAP_H) && defined(HAVE_LBER_H) && defined(HAVE_LIBLDAP) && defined(HAVE_LIBLBER)
config_warn_authn_module ( srv , " ldap " ) ;
# endif
}
if ( append_mod_authn_mysql ) {
# if defined(HAVE_MYSQL)
config_warn_authn_module ( srv , " mysql " ) ;
# endif
}
}
}
return ret ;
}
# define PATCH(x) con->conf.x = s->x
int config_setup_connection ( server * srv , connection * con ) {
specific_config * s = srv - > config_storage [ 0 ] ;
[config] opts for http header parsing strictness (fixes #551, fixes #1086, fixes #1184, fixes #2143, #2258, #2281, fixes #946, fixes #1330, fixes #602, #1016)
server.http-parseopt-header-strict = "enable"
server.http-parseopt-host-strict = "enable" (implies host-normalize)
server.http-parseopt-host-normalize = "disable"
defaults retain current behavior, which is strict header parsing
and strict host parsing, with enhancement to normalize IPv4 address
and port number strings.
For lighttpd tests, these need to be enabled (and are by default)
For marginally faster HTTP header parsing for benchmarks, disable these.
To allow
- underscores in hostname
- hypen ('-') at beginning of hostname
- all-numeric TLDs
server.http-parseopt-host-strict = "disable"
x-ref:
"lighttpd doesn't allow underscores in host names"
https://redmine.lighttpd.net/issues/551
"hyphen in hostname"
https://redmine.lighttpd.net/issues/1086
"a numeric tld"
https://redmine.lighttpd.net/issues/1184
"Numeric tld's"
https://redmine.lighttpd.net/issues/2143
"Bad Request"
https://redmine.lighttpd.net/issues/2258
"400 Bad Request when using Numeric TLDs"
https://redmine.lighttpd.net/issues/2281
To allow a variety of numerical formats to be converted to IP addresses
server.http-parseopt-host-strict = "disable"
server.http-parseopt-host-normalize = "enable"
x-ref:
"URL encoding leads to "400 - Bad Request""
https://redmine.lighttpd.net/issues/946
"400 Bad Request when using IP's numeric value ("ip2long()")"
https://redmine.lighttpd.net/issues/1330
To allow most 8-bit and 7-bit chars in headers
server.http-parseopt-header-strict = "disable" (not recommended)
x-ref:
"Russian letters not alowed?"
https://redmine.lighttpd.net/issues/602
"header Content-Disposition with russian '?' (CP1251, ascii code 255) causes error"
https://redmine.lighttpd.net/issues/1016
6 years ago
PATCH ( http_parseopts ) ;
PATCH ( allow_http11 ) ;
PATCH ( mimetypes ) ;
PATCH ( document_root ) ;
PATCH ( high_precision_timestamps ) ;
PATCH ( max_keep_alive_requests ) ;
PATCH ( max_keep_alive_idle ) ;
PATCH ( max_read_idle ) ;
PATCH ( max_write_idle ) ;
PATCH ( max_request_size ) ;
PATCH ( use_xattr ) ;
PATCH ( error_handler ) ;
[core] server.error-handler new directive for error pages (fixes #2702)
server.error-handler preserves HTTP status error code when error page
is static, and allows dynamic handlers to change HTTP status code
when error page is provided by dynamic handler. server.error-handler
intercepts all HTTP status codes >= 400 except when the content is
generated by a dynamic handler (cgi, ssi, fastcgi, scgi, proxy, lua).
The request method is unconditionally changed to GET for the request
to service the error handler, and the original request method is
later restored (for logging purposes). request body from the
original request, if present, is discarded.
server.error-handler is somewhat similar to server.error-handler-404,
but server.error-handler-404 is now deprecated, intercepts only 404
and 403 HTTP status codes, and returns 200 OK for static error pages,
a source of confusion for some admins. On the other hand, the new
server.error-handler, when set, will intercept all HTTP status error
codes >= 400. server.error-handler takes precedence over
server.error-handler-404 when both are set.
NOTE: a major difference between server.error-handler and the
now-deprecated server.error-handler-404 is that the values of the
non-standard CGI environment variables REQUEST_URI and REDIRECT_URI
have been swapped. Since REDIRECT_STATUS is the original HTTP
status code, REDIRECT_URI is now the original request, and REQUEST_URI
is the current request (e.g. the URI/URL to the error handler).
The prior behavior -- which reversed REQUEST_URI and REDIRECT_URI values
from those described above -- is preserved for server.error-handler-404.
Additionally, REDIRECT_STATUS is now available to mod_magnet, which
continues to have access to request.uri and request.orig_uri.
See further discussion at https://redmine.lighttpd.net/issues/2702
and https://redmine.lighttpd.net/issues/1828
github: closes #36
6 years ago
PATCH ( error_handler_404 ) ;
PATCH ( errorfile_prefix ) ;
# ifdef HAVE_LSTAT
PATCH ( follow_symlink ) ;
# endif
PATCH ( server_tag ) ;
PATCH ( kbytes_per_second ) ;
PATCH ( global_kbytes_per_second ) ;
PATCH ( global_bytes_per_second_cnt ) ;
con - > conf . global_bytes_per_second_cnt_ptr = & s - > global_bytes_per_second_cnt ;
buffer_copy_buffer ( con - > server_name , s - > server_name ) ;
PATCH ( log_request_header ) ;
PATCH ( log_response_header ) ;
PATCH ( log_request_handling ) ;
PATCH ( log_condition_handling ) ;
PATCH ( log_file_not_found ) ;
PATCH ( log_ssl_noise ) ;
PATCH ( log_timeouts ) ;
PATCH ( range_requests ) ;
PATCH ( force_lowercase_filenames ) ;
/*PATCH(listen_backlog);*/ /*(not necessary; used only at startup)*/
PATCH ( stream_request_body ) ;
PATCH ( stream_response_body ) ;
PATCH ( ssl_enabled ) ;
PATCH ( ssl_pemfile ) ;
# ifdef USE_OPENSSL
PATCH ( ssl_pemfile_x509 ) ;
PATCH ( ssl_pemfile_pkey ) ;
# endif
PATCH ( ssl_ca_file ) ;
# ifdef USE_OPENSSL
PATCH ( ssl_ca_file_cert_names ) ;
# endif
PATCH ( ssl_cipher_list ) ;
PATCH ( ssl_dh_file ) ;
PATCH ( ssl_ec_curve ) ;
PATCH ( ssl_honor_cipher_order ) ;
PATCH ( ssl_empty_fragments ) ;
PATCH ( ssl_use_sslv2 ) ;
PATCH ( ssl_use_sslv3 ) ;
PATCH ( etag_use_inode ) ;
PATCH ( etag_use_mtime ) ;
PATCH ( etag_use_size ) ;
PATCH ( ssl_verifyclient ) ;
PATCH ( ssl_verifyclient_enforce ) ;
PATCH ( ssl_verifyclient_depth ) ;
PATCH ( ssl_verifyclient_username ) ;
PATCH ( ssl_verifyclient_export_cert ) ;