2016-03-19 15:14:35 +00:00
|
|
|
#include "first.h"
|
|
|
|
|
2009-10-11 14:31:42 +00:00
|
|
|
#include "base.h"
|
2017-03-28 04:04:31 +00:00
|
|
|
#include "fdevent.h"
|
2009-10-11 14:31:42 +00:00
|
|
|
#include "log.h"
|
|
|
|
#include "buffer.h"
|
2018-09-09 05:50:33 +00:00
|
|
|
#include "http_header.h"
|
2017-11-18 03:09:51 +00:00
|
|
|
#include "sock_addr.h"
|
2009-10-11 14:31:42 +00:00
|
|
|
|
|
|
|
#include "plugin.h"
|
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <time.h>
|
|
|
|
|
|
|
|
#ifdef HAVE_SYSLOG_H
|
|
|
|
# include <syslog.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
char key;
|
2006-10-04 13:26:23 +00:00
|
|
|
enum {
|
2005-02-20 14:27:00 +00:00
|
|
|
FORMAT_UNSET,
|
|
|
|
FORMAT_UNSUPPORTED,
|
|
|
|
FORMAT_PERCENT,
|
|
|
|
FORMAT_REMOTE_HOST,
|
|
|
|
FORMAT_REMOTE_IDENT,
|
|
|
|
FORMAT_REMOTE_USER,
|
|
|
|
FORMAT_TIMESTAMP,
|
|
|
|
FORMAT_REQUEST_LINE,
|
|
|
|
FORMAT_STATUS,
|
|
|
|
FORMAT_BYTES_OUT_NO_HEADER,
|
|
|
|
FORMAT_HEADER,
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
FORMAT_REMOTE_ADDR,
|
|
|
|
FORMAT_LOCAL_ADDR,
|
|
|
|
FORMAT_COOKIE,
|
2016-07-13 00:41:53 +00:00
|
|
|
FORMAT_TIME_USED_US,
|
2005-02-20 14:27:00 +00:00
|
|
|
FORMAT_ENV,
|
|
|
|
FORMAT_FILENAME,
|
|
|
|
FORMAT_REQUEST_PROTOCOL,
|
|
|
|
FORMAT_REQUEST_METHOD,
|
|
|
|
FORMAT_SERVER_PORT,
|
|
|
|
FORMAT_QUERY_STRING,
|
|
|
|
FORMAT_TIME_USED,
|
|
|
|
FORMAT_URL,
|
|
|
|
FORMAT_SERVER_NAME,
|
2005-09-02 16:09:42 +00:00
|
|
|
FORMAT_HTTP_HOST,
|
2005-02-20 14:27:00 +00:00
|
|
|
FORMAT_CONNECTION_STATUS,
|
|
|
|
FORMAT_BYTES_IN,
|
|
|
|
FORMAT_BYTES_OUT,
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2016-07-13 00:41:53 +00:00
|
|
|
FORMAT_KEEPALIVE_COUNT,
|
2016-10-19 10:01:10 +00:00
|
|
|
FORMAT_RESPONSE_HEADER,
|
|
|
|
FORMAT_NOTE
|
2005-02-20 14:27:00 +00:00
|
|
|
} type;
|
|
|
|
} format_mapping;
|
|
|
|
|
|
|
|
/**
|
2006-10-04 13:26:23 +00:00
|
|
|
*
|
|
|
|
*
|
2005-02-20 14:27:00 +00:00
|
|
|
* "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\""
|
2006-10-04 13:26:23 +00:00
|
|
|
*
|
2005-02-20 14:27:00 +00:00
|
|
|
*/
|
|
|
|
|
2012-08-31 14:11:39 +00:00
|
|
|
static const format_mapping fmap[] =
|
2006-10-04 13:26:23 +00:00
|
|
|
{
|
2005-02-20 14:27:00 +00:00
|
|
|
{ '%', FORMAT_PERCENT },
|
|
|
|
{ 'h', FORMAT_REMOTE_HOST },
|
|
|
|
{ 'l', FORMAT_REMOTE_IDENT },
|
|
|
|
{ 'u', FORMAT_REMOTE_USER },
|
|
|
|
{ 't', FORMAT_TIMESTAMP },
|
|
|
|
{ 'r', FORMAT_REQUEST_LINE },
|
|
|
|
{ 's', FORMAT_STATUS },
|
|
|
|
{ 'b', FORMAT_BYTES_OUT_NO_HEADER },
|
|
|
|
{ 'i', FORMAT_HEADER },
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
{ 'a', FORMAT_REMOTE_ADDR },
|
|
|
|
{ 'A', FORMAT_LOCAL_ADDR },
|
|
|
|
{ 'B', FORMAT_BYTES_OUT_NO_HEADER },
|
|
|
|
{ 'C', FORMAT_COOKIE },
|
2016-07-13 00:41:53 +00:00
|
|
|
{ 'D', FORMAT_TIME_USED_US },
|
2005-02-20 14:27:00 +00:00
|
|
|
{ 'e', FORMAT_ENV },
|
|
|
|
{ 'f', FORMAT_FILENAME },
|
|
|
|
{ 'H', FORMAT_REQUEST_PROTOCOL },
|
2016-07-13 00:41:53 +00:00
|
|
|
{ 'k', FORMAT_KEEPALIVE_COUNT },
|
2005-02-20 14:27:00 +00:00
|
|
|
{ 'm', FORMAT_REQUEST_METHOD },
|
2016-10-19 10:01:10 +00:00
|
|
|
{ 'n', FORMAT_NOTE },
|
2005-02-20 14:27:00 +00:00
|
|
|
{ 'p', FORMAT_SERVER_PORT },
|
|
|
|
{ 'P', FORMAT_UNSUPPORTED }, /* we are only one process */
|
|
|
|
{ 'q', FORMAT_QUERY_STRING },
|
|
|
|
{ 'T', FORMAT_TIME_USED },
|
|
|
|
{ 'U', FORMAT_URL }, /* w/o querystring */
|
|
|
|
{ 'v', FORMAT_SERVER_NAME },
|
2005-09-02 16:09:42 +00:00
|
|
|
{ 'V', FORMAT_HTTP_HOST },
|
2005-02-20 14:27:00 +00:00
|
|
|
{ 'X', FORMAT_CONNECTION_STATUS },
|
|
|
|
{ 'I', FORMAT_BYTES_IN },
|
|
|
|
{ 'O', FORMAT_BYTES_OUT },
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
{ 'o', FORMAT_RESPONSE_HEADER },
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
{ '\0', FORMAT_UNSET }
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2016-07-13 00:41:53 +00:00
|
|
|
enum e_optflags_time {
|
|
|
|
/* format string is passed to strftime unless other format optflags set
|
|
|
|
* (besides FORMAT_FLAG_TIME_BEGIN or FORMAT_FLAG_TIME_END) */
|
|
|
|
FORMAT_FLAG_TIME_END = 0x00,/* use request end time (default) */
|
|
|
|
FORMAT_FLAG_TIME_BEGIN = 0x01,/* use request start time */
|
|
|
|
FORMAT_FLAG_TIME_SEC = 0x02,/* request time as num sec since epoch */
|
|
|
|
FORMAT_FLAG_TIME_MSEC = 0x04,/* request time as num msec since epoch */
|
|
|
|
FORMAT_FLAG_TIME_USEC = 0x08,/* request time as num usec since epoch */
|
|
|
|
FORMAT_FLAG_TIME_NSEC = 0x10,/* request time as num nsec since epoch */
|
|
|
|
FORMAT_FLAG_TIME_MSEC_FRAC = 0x20,/* request time msec fraction */
|
|
|
|
FORMAT_FLAG_TIME_USEC_FRAC = 0x40,/* request time usec fraction */
|
|
|
|
FORMAT_FLAG_TIME_NSEC_FRAC = 0x80 /* request time nsec fraction */
|
|
|
|
};
|
|
|
|
|
2017-11-18 03:09:51 +00:00
|
|
|
enum e_optflags_port {
|
|
|
|
FORMAT_FLAG_PORT_LOCAL = 0x01,/* (default) */
|
|
|
|
FORMAT_FLAG_PORT_REMOTE = 0x02
|
|
|
|
};
|
|
|
|
|
2016-07-13 00:41:53 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
typedef struct {
|
2019-11-01 04:26:08 +00:00
|
|
|
enum { FIELD_UNSET, FIELD_STRING, FIELD_FORMAT } type;
|
|
|
|
int field;
|
|
|
|
int opt;
|
|
|
|
buffer string;
|
2005-02-20 14:27:00 +00:00
|
|
|
} format_field;
|
|
|
|
|
|
|
|
typedef struct {
|
2019-11-01 04:26:08 +00:00
|
|
|
time_t last_generated_accesslog_ts;
|
|
|
|
buffer ts_accesslog_str;
|
|
|
|
#if defined(__STDC_VERSION__) && __STDC_VERSION__-0 >= 199901L /* C99 */
|
|
|
|
format_field ptr[]; /* C99 VLA */
|
|
|
|
#else
|
|
|
|
format_field ptr[1];
|
|
|
|
#endif
|
2005-02-20 14:27:00 +00:00
|
|
|
} format_fields;
|
|
|
|
|
|
|
|
typedef struct {
|
2013-07-31 20:23:18 +00:00
|
|
|
int log_access_fd;
|
2019-11-01 04:26:08 +00:00
|
|
|
char use_syslog; /* syslog has global buffer */
|
|
|
|
char piped_logger;
|
2013-08-30 14:13:43 +00:00
|
|
|
unsigned short syslog_level;
|
2019-11-01 04:26:08 +00:00
|
|
|
buffer *access_logbuffer; /* each logfile has a separate buffer */
|
|
|
|
const buffer *access_logfile;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
format_fields *parsed_format;
|
|
|
|
} plugin_config;
|
|
|
|
|
|
|
|
typedef struct {
|
2019-11-01 04:26:08 +00:00
|
|
|
int log_access_fd;
|
|
|
|
char piped_logger;
|
|
|
|
const buffer *access_logfile;
|
|
|
|
buffer access_logbuffer; /* each logfile has a separate buffer */
|
|
|
|
} accesslog_st;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
typedef struct {
|
|
|
|
PLUGIN_DATA;
|
|
|
|
plugin_config defaults;
|
|
|
|
plugin_config conf;
|
2013-07-31 20:23:18 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
buffer syslog_logbuffer; /* syslog has global buffer. no caching, always written directly */
|
|
|
|
log_error_st *errh; /* copy of srv->errh */
|
|
|
|
format_fields *default_format;/* allocated if default format */
|
2005-02-20 14:27:00 +00:00
|
|
|
} plugin_data;
|
|
|
|
|
|
|
|
INIT_FUNC(mod_accesslog_init) {
|
2019-11-01 04:26:08 +00:00
|
|
|
return calloc(1, sizeof(plugin_data));
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static int accesslog_write_all(const int fd, buffer * const b) {
|
|
|
|
const ssize_t wr = (fd >= 0) ? write_all(fd, CONST_BUF_LEN(b)) : 0;
|
|
|
|
buffer_clear(b); /*(clear buffer, even if fd < 0)*/
|
|
|
|
return (-1 != wr);
|
2015-08-22 16:01:08 +00:00
|
|
|
}
|
|
|
|
|
2019-10-17 04:01:32 +00:00
|
|
|
static void accesslog_append_escaped_str(buffer *dest, char *str, size_t len) {
|
2010-08-05 19:53:49 +00:00
|
|
|
char *ptr, *start, *end;
|
2010-07-11 17:18:54 +00:00
|
|
|
|
2009-10-16 16:43:28 +00:00
|
|
|
/* replaces non-printable chars with \xHH where HH is the hex representation of the byte */
|
|
|
|
/* exceptions: " => \", \ => \\, whitespace chars => \n \t etc. */
|
2019-10-17 04:01:32 +00:00
|
|
|
if (0 == len) return;
|
|
|
|
buffer_string_prepare_append(dest, len);
|
2009-10-16 16:43:28 +00:00
|
|
|
|
2019-10-17 04:01:32 +00:00
|
|
|
for (ptr = start = str, end = str+len; ptr < end; ++ptr) {
|
2015-07-05 16:01:16 +00:00
|
|
|
unsigned char const c = (unsigned char) *ptr;
|
2012-04-19 13:02:08 +00:00
|
|
|
if (c >= ' ' && c <= '~' && c != '"' && c != '\\') {
|
2010-08-05 19:53:49 +00:00
|
|
|
/* nothing to change, add later as one block */
|
|
|
|
} else {
|
|
|
|
/* copy previous part */
|
|
|
|
if (start < ptr) {
|
|
|
|
buffer_append_string_len(dest, start, ptr - start);
|
|
|
|
}
|
|
|
|
start = ptr + 1;
|
|
|
|
|
2012-04-19 13:02:08 +00:00
|
|
|
switch (c) {
|
2010-08-05 19:53:49 +00:00
|
|
|
case '"':
|
|
|
|
BUFFER_APPEND_STRING_CONST(dest, "\\\"");
|
|
|
|
break;
|
|
|
|
case '\\':
|
|
|
|
BUFFER_APPEND_STRING_CONST(dest, "\\\\");
|
|
|
|
break;
|
|
|
|
case '\b':
|
|
|
|
BUFFER_APPEND_STRING_CONST(dest, "\\b");
|
|
|
|
break;
|
|
|
|
case '\n':
|
|
|
|
BUFFER_APPEND_STRING_CONST(dest, "\\n");
|
|
|
|
break;
|
|
|
|
case '\r':
|
|
|
|
BUFFER_APPEND_STRING_CONST(dest, "\\r");
|
|
|
|
break;
|
|
|
|
case '\t':
|
|
|
|
BUFFER_APPEND_STRING_CONST(dest, "\\t");
|
|
|
|
break;
|
|
|
|
case '\v':
|
|
|
|
BUFFER_APPEND_STRING_CONST(dest, "\\v");
|
|
|
|
break;
|
|
|
|
default: {
|
|
|
|
/* non printable char => \xHH */
|
|
|
|
char hh[5] = {'\\','x',0,0,0};
|
2012-04-19 13:02:08 +00:00
|
|
|
char h = c / 16;
|
2010-08-05 19:53:49 +00:00
|
|
|
hh[2] = (h > 9) ? (h - 10 + 'A') : (h + '0');
|
2012-04-19 13:02:08 +00:00
|
|
|
h = c % 16;
|
2010-08-05 19:53:49 +00:00
|
|
|
hh[3] = (h > 9) ? (h - 10 + 'A') : (h + '0');
|
|
|
|
buffer_append_string_len(dest, &hh[0], 4);
|
|
|
|
}
|
|
|
|
break;
|
2009-10-16 16:43:28 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2010-08-05 19:53:49 +00:00
|
|
|
|
|
|
|
if (start < end) {
|
|
|
|
buffer_append_string_len(dest, start, end - start);
|
|
|
|
}
|
2009-10-16 16:43:28 +00:00
|
|
|
}
|
|
|
|
|
2019-10-17 04:01:32 +00:00
|
|
|
static void accesslog_append_escaped(buffer *dest, const buffer *str) {
|
|
|
|
accesslog_append_escaped_str(dest, CONST_BUF_LEN(str));
|
|
|
|
}
|
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
__attribute_cold__
|
|
|
|
static format_fields * accesslog_parse_format_err(server *srv, const char *file, unsigned int line, format_field *f, const char *msg) {
|
|
|
|
log_error(srv->errh, file, line, "%s", msg);
|
|
|
|
for (; f->type != FIELD_UNSET; ++f) free(f->string.ptr);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static format_fields * accesslog_parse_format(server *srv, const char *format, const size_t flen) {
|
|
|
|
/* common log format (the default) results in 18 elements,
|
|
|
|
* so 127 should be enough except for obscene custom usage */
|
2005-02-20 14:27:00 +00:00
|
|
|
size_t i, j, k = 0, start = 0;
|
2019-11-01 04:26:08 +00:00
|
|
|
uint32_t used = 0;
|
|
|
|
const uint32_t sz = 127;
|
|
|
|
format_field *f;
|
|
|
|
format_field fptr[sz+1]; /* (128 elements takes 4k on stack in 64-bit) */
|
|
|
|
memset(fptr, 0, sizeof(fptr));
|
|
|
|
if (0 != FIELD_UNSET) return NULL;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
if (0 == flen) return NULL;
|
|
|
|
|
|
|
|
for (i = 0; i < flen; ++i) {
|
|
|
|
if (format[i] != '%') continue;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2007-04-09 19:58:57 +00:00
|
|
|
if (i > 0 && start != i) {
|
|
|
|
/* copy the string before this % */
|
2019-11-01 04:26:08 +00:00
|
|
|
if (used == sz)
|
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"too many fields (>= 127) in accesslog.format");
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
f = fptr+used;
|
|
|
|
f->type = FIELD_STRING;
|
|
|
|
memset(&f->string, 0, sizeof(buffer));
|
|
|
|
buffer_copy_string_len(&f->string, format + start, i - start);
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
++used;
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
/* we need a new field */
|
2019-11-01 04:26:08 +00:00
|
|
|
if (used == sz)
|
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"too many fields (>= 127) in accesslog.format");
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
/* search for the terminating command */
|
2019-11-01 04:26:08 +00:00
|
|
|
switch (format[i+1]) {
|
2005-02-20 14:27:00 +00:00
|
|
|
case '>':
|
|
|
|
case '<':
|
2007-04-09 19:58:57 +00:00
|
|
|
/* after the } has to be a character */
|
2019-11-01 04:26:08 +00:00
|
|
|
if (format[i+2] == '\0') {
|
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"%< and %> have to be followed by a format-specifier");
|
2007-04-09 19:58:57 +00:00
|
|
|
}
|
|
|
|
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
for (j = 0; fmap[j].key != '\0'; j++) {
|
2019-11-01 04:26:08 +00:00
|
|
|
if (fmap[j].key != format[i+2]) continue;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
/* found key */
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
f = fptr+used;
|
|
|
|
f->type = FIELD_FORMAT;
|
|
|
|
f->field = fmap[j].type;
|
|
|
|
f->opt = 0;
|
|
|
|
f->string.ptr = NULL;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
++used;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
break;
|
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
if (fmap[j].key == '\0') {
|
2019-11-01 04:26:08 +00:00
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"%< and %> have to be followed by a valid format-specifier");
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
start = i + 3;
|
2007-04-09 19:58:57 +00:00
|
|
|
i = start - 1; /* skip the string */
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
break;
|
|
|
|
case '{':
|
|
|
|
/* go forward to } */
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
for (k = i+2; k < flen; ++k) {
|
|
|
|
if (format[k] == '}') break;
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
if (k == flen) {
|
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"%{ has to be terminated by a }");
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2007-04-09 19:58:57 +00:00
|
|
|
|
|
|
|
/* after the } has to be a character */
|
2019-11-01 04:26:08 +00:00
|
|
|
if (format[k+1] == '\0') {
|
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"%{...} has to be followed by a format-specifier");
|
2007-04-09 19:58:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (k == i + 2) {
|
2019-11-01 04:26:08 +00:00
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"%{...} has to contain a string");
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
for (j = 0; fmap[j].key != '\0'; j++) {
|
2019-11-01 04:26:08 +00:00
|
|
|
if (fmap[j].key != format[k+1]) continue;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
/* found key */
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
f = fptr+used;
|
|
|
|
f->type = FIELD_FORMAT;
|
|
|
|
f->field = fmap[j].type;
|
|
|
|
f->opt = 0;
|
|
|
|
memset(&f->string, 0, sizeof(buffer));
|
|
|
|
buffer_copy_string_len(&f->string, format + i + 2, k - (i + 2));
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
++used;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
break;
|
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
if (fmap[j].key == '\0') {
|
2019-11-01 04:26:08 +00:00
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"%{...} has to be followed by a valid format-specifier");
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
start = k + 2;
|
2007-04-09 19:58:57 +00:00
|
|
|
i = start - 1; /* skip the string */
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
break;
|
|
|
|
default:
|
2007-04-09 19:58:57 +00:00
|
|
|
/* after the % has to be a character */
|
2019-11-01 04:26:08 +00:00
|
|
|
if (format[i+1] == '\0') {
|
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"% has to be followed by a format-specifier");
|
2007-04-09 19:58:57 +00:00
|
|
|
}
|
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
for (j = 0; fmap[j].key != '\0'; j++) {
|
2019-11-01 04:26:08 +00:00
|
|
|
if (fmap[j].key != format[i+1]) continue;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
/* found key */
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
f = fptr+used;
|
|
|
|
f->type = FIELD_FORMAT;
|
|
|
|
f->field = fmap[j].type;
|
|
|
|
f->string.ptr = NULL;
|
|
|
|
f->opt = 0;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
++used;
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
break;
|
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
if (fmap[j].key == '\0') {
|
2019-11-01 04:26:08 +00:00
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"% has to be followed by a valid format-specifier");
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
start = i + 2;
|
2007-04-09 19:58:57 +00:00
|
|
|
i = start - 1; /* skip the string */
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2005-02-20 14:27:00 +00:00
|
|
|
if (start < i) {
|
|
|
|
/* copy the string */
|
2019-11-01 04:26:08 +00:00
|
|
|
if (used == sz)
|
|
|
|
return accesslog_parse_format_err(srv, __FILE__, __LINE__, fptr,
|
|
|
|
"too many fields (>= 127) in accesslog.format");
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
f = fptr+used;
|
|
|
|
f->type = FIELD_STRING;
|
|
|
|
memset(&f->string, 0, sizeof(buffer));
|
|
|
|
buffer_copy_string_len(&f->string, format + start, i - start);
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
++used;
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
format_fields * const fields =
|
|
|
|
malloc(sizeof(format_fields) + ((used+1) * sizeof(format_field)));
|
|
|
|
force_assert(fields);
|
|
|
|
memset(fields, 0, sizeof(format_fields));
|
|
|
|
memcpy(fields->ptr, fptr, (used+1) * sizeof(format_field));
|
|
|
|
return fields;
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static void mod_accesslog_free_accesslog(accesslog_st * const x, plugin_data *p) {
|
|
|
|
/*(piped loggers are closed in fdevent_close_logger_pipes())*/
|
|
|
|
if (!x->piped_logger && -1 != x->log_access_fd) {
|
|
|
|
if (!accesslog_write_all(x->log_access_fd, &x->access_logbuffer)) {
|
|
|
|
log_perror(p->errh, __FILE__, __LINE__,
|
|
|
|
"writing access log entry failed: %s", x->access_logfile->ptr);
|
|
|
|
}
|
|
|
|
close(x->log_access_fd);
|
|
|
|
}
|
|
|
|
free(x->access_logbuffer.ptr);
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static void mod_accesslog_free_format_fields(format_fields * const ff) {
|
|
|
|
for (format_field *f = ff->ptr; f->type != FIELD_UNSET; ++f)
|
|
|
|
free(f->string.ptr);
|
|
|
|
free(ff->ts_accesslog_str.ptr);
|
|
|
|
free(ff);
|
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static void mod_accesslog_free_config(plugin_data * const p) {
|
|
|
|
if (NULL == p->cvlist) return;
|
|
|
|
/* (init i to 0 if global context; to 1 to skip empty global context) */
|
|
|
|
for (int i = !p->cvlist[0].v.u2[1], used = p->nconfig; i < used; ++i) {
|
|
|
|
config_plugin_value_t *cpv = p->cvlist + p->cvlist[i].v.u2[0];
|
|
|
|
for (; -1 != cpv->k_id; ++cpv) {
|
|
|
|
if (cpv->vtype != T_CONFIG_LOCAL || NULL == cpv->v.v) continue;
|
|
|
|
switch (cpv->k_id) {
|
|
|
|
case 0: /* accesslog.filename */
|
|
|
|
mod_accesslog_free_accesslog(cpv->v.v, p);
|
|
|
|
break;
|
|
|
|
case 1: /* accesslog.format */
|
|
|
|
mod_accesslog_free_format_fields(cpv->v.v);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NULL != p->default_format) {
|
|
|
|
mod_accesslog_free_format_fields(p->default_format);
|
|
|
|
}
|
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
FREE_FUNC(mod_accesslog_free) {
|
|
|
|
plugin_data *p = p_d;
|
|
|
|
if (!p) return HANDLER_GO_ON;
|
|
|
|
UNUSED(srv);
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
mod_accesslog_free_config(p);
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
free(p->syslog_logbuffer.ptr);
|
|
|
|
free(p->cvlist);
|
|
|
|
free(p);
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
return HANDLER_GO_ON;
|
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static void mod_accesslog_merge_config_cpv(plugin_config * const pconf, const config_plugin_value_t * const cpv) {
|
|
|
|
switch (cpv->k_id) { /* index into static config_plugin_keys_t cpk[] */
|
|
|
|
case 0:{/* accesslog.filename */
|
|
|
|
if (cpv->vtype != T_CONFIG_LOCAL) break;
|
|
|
|
accesslog_st * const x = cpv->v.v;
|
|
|
|
pconf->log_access_fd = x->log_access_fd;
|
|
|
|
pconf->piped_logger = x->piped_logger;
|
|
|
|
pconf->access_logfile = x->access_logfile;
|
|
|
|
pconf->access_logbuffer = &x->access_logbuffer;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 1:{/* accesslog.format */
|
|
|
|
if (cpv->vtype != T_CONFIG_LOCAL) break;
|
|
|
|
pconf->parsed_format = cpv->v.v;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 2: /* accesslog.use-syslog */
|
|
|
|
pconf->use_syslog = (int)cpv->v.u;
|
|
|
|
break;
|
|
|
|
case 3: /* accesslog.syslog-level */
|
|
|
|
pconf->syslog_level = cpv->v.shrt;
|
|
|
|
break;
|
|
|
|
default:/* should not happen */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2009-10-12 10:13:01 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static void mod_accesslog_merge_config(plugin_config * const pconf, const config_plugin_value_t *cpv) {
|
|
|
|
do {
|
|
|
|
mod_accesslog_merge_config_cpv(pconf, cpv);
|
|
|
|
} while ((++cpv)->k_id != -1);
|
|
|
|
}
|
2006-10-04 13:26:23 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static void mod_accesslog_patch_config(connection * const con, plugin_data * const p) {
|
|
|
|
memcpy(&p->conf, &p->defaults, sizeof(plugin_config));
|
|
|
|
for (int i = 1, used = p->nconfig; i < used; ++i) {
|
|
|
|
if (config_check_cond(con, (uint32_t)p->cvlist[i].k_id))
|
|
|
|
mod_accesslog_merge_config(&p->conf, p->cvlist + p->cvlist[i].v.u2[0]);
|
|
|
|
}
|
|
|
|
}
|
2005-06-27 19:25:55 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static format_fields * mod_accesslog_process_format(server * const srv, const char * const format, const size_t flen);
|
|
|
|
|
|
|
|
SETDEFAULTS_FUNC(mod_accesslog_set_defaults) {
|
|
|
|
static const config_plugin_keys_t cpk[] = {
|
|
|
|
{ CONST_STR_LEN("accesslog.filename"),
|
|
|
|
T_CONFIG_STRING,
|
|
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
|
|
,{ CONST_STR_LEN("accesslog.format"),
|
|
|
|
T_CONFIG_STRING,
|
|
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
|
|
,{ CONST_STR_LEN("accesslog.use-syslog"),
|
|
|
|
T_CONFIG_BOOL,
|
|
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
|
|
,{ CONST_STR_LEN("accesslog.syslog-level"),
|
|
|
|
T_CONFIG_SHORT,
|
|
|
|
T_CONFIG_SCOPE_CONNECTION }
|
|
|
|
,{ NULL, 0,
|
|
|
|
T_CONFIG_UNSET,
|
|
|
|
T_CONFIG_SCOPE_UNSET }
|
|
|
|
};
|
|
|
|
|
|
|
|
plugin_data * const p = p_d;
|
|
|
|
p->errh = srv->errh;
|
|
|
|
if (!config_plugin_values_init(srv, p, cpk, "mod_accesslog"))
|
|
|
|
return HANDLER_ERROR;
|
|
|
|
|
|
|
|
/* process and validate config directives
|
|
|
|
* (init i to 0 if global context; to 1 to skip empty global context) */
|
|
|
|
for (int i = !p->cvlist[0].v.u2[1]; i < p->nconfig; ++i) {
|
|
|
|
config_plugin_value_t *cpv = p->cvlist + p->cvlist[i].v.u2[0];
|
|
|
|
int use_syslog = 0;
|
|
|
|
accesslog_st *x = NULL;
|
|
|
|
for (; -1 != cpv->k_id; ++cpv) {
|
|
|
|
switch (cpv->k_id) {
|
|
|
|
case 0: /* accesslog.filename */
|
|
|
|
x = calloc(1, sizeof(accesslog_st));
|
|
|
|
force_assert(x);
|
|
|
|
x->log_access_fd = -1;
|
|
|
|
x->piped_logger = (cpv->v.b->ptr[0] == '|');
|
|
|
|
x->access_logfile = cpv->v.b;
|
|
|
|
cpv->vtype = T_CONFIG_LOCAL;
|
|
|
|
cpv->v.v = x;
|
|
|
|
break;
|
|
|
|
case 1: /* accesslog.format */
|
|
|
|
cpv->v.v =
|
|
|
|
mod_accesslog_process_format(srv, CONST_BUF_LEN(cpv->v.b));
|
|
|
|
if (NULL == cpv->v.v) return HANDLER_ERROR;
|
|
|
|
cpv->vtype = T_CONFIG_LOCAL;
|
|
|
|
break;
|
|
|
|
case 2: /* accesslog.use-syslog */
|
|
|
|
use_syslog = (int)cpv->v.u;
|
|
|
|
break;
|
|
|
|
case 3: /* accesslog.syslog-level */
|
|
|
|
break;
|
|
|
|
default:/* should not happen */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (srv->srvconf.preflight_check) continue;
|
|
|
|
|
|
|
|
if (use_syslog) continue; /* ignore the next checks */
|
|
|
|
if (NULL == x || buffer_string_is_empty(x->access_logfile)) continue;
|
|
|
|
|
|
|
|
x->log_access_fd = fdevent_open_logger(x->access_logfile->ptr);
|
|
|
|
if (-1 == x->log_access_fd) {
|
|
|
|
log_perror(srv->errh, __FILE__, __LINE__,
|
|
|
|
"opening log '%s' failed", x->access_logfile->ptr);
|
|
|
|
return HANDLER_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
p->defaults.log_access_fd = -1;
|
|
|
|
p->defaults.syslog_level = LOG_INFO;
|
|
|
|
|
|
|
|
/* initialize p->defaults from global config context */
|
|
|
|
if (p->nconfig > 0 && p->cvlist->v.u2[1]) {
|
|
|
|
const config_plugin_value_t *cpv = p->cvlist + p->cvlist->v.u2[0];
|
|
|
|
if (-1 != cpv->k_id)
|
|
|
|
mod_accesslog_merge_config(&p->defaults, cpv);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NULL == p->defaults.parsed_format) {
|
|
|
|
/* (set default format even if p->use_syslog since
|
|
|
|
* some other condition might enable logfile) */
|
|
|
|
static const char fmt[] =
|
|
|
|
"%h %V %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"";
|
|
|
|
p->defaults.parsed_format = p->default_format =
|
|
|
|
mod_accesslog_process_format(srv, CONST_STR_LEN(fmt));
|
|
|
|
if (NULL == p->default_format) return HANDLER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return HANDLER_GO_ON;
|
|
|
|
}
|
2005-06-27 19:25:55 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
static format_fields * mod_accesslog_process_format(server * const srv, const char * const format, const size_t flen) {
|
|
|
|
format_fields * const parsed_format =
|
|
|
|
accesslog_parse_format(srv, format, flen);
|
|
|
|
if (NULL == parsed_format) {
|
|
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
|
|
"parsing accesslog-definition failed: %s", format);
|
|
|
|
return NULL;
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
2009-10-12 10:13:01 +00:00
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
uint32_t tcount = 0;
|
|
|
|
for (format_field *f = parsed_format->ptr; f->type != FIELD_UNSET; ++f) {
|
|
|
|
const buffer * const fstr = &f->string;
|
2016-07-13 00:41:53 +00:00
|
|
|
if (FIELD_FORMAT != f->type) continue;
|
|
|
|
if (FORMAT_TIMESTAMP == f->field) {
|
2019-11-01 04:26:08 +00:00
|
|
|
if (!buffer_string_is_empty(fstr)) {
|
|
|
|
const char *ptr = fstr->ptr;
|
2016-07-13 00:41:53 +00:00
|
|
|
if (0 == strncmp(ptr, "begin:", sizeof("begin:")-1)) {
|
|
|
|
f->opt |= FORMAT_FLAG_TIME_BEGIN;
|
|
|
|
ptr += sizeof("begin:")-1;
|
|
|
|
} else if (0 == strncmp(ptr, "end:", sizeof("end:")-1)) {
|
|
|
|
f->opt |= FORMAT_FLAG_TIME_END;
|
|
|
|
ptr += sizeof("end:")-1;
|
2009-10-12 10:13:01 +00:00
|
|
|
}
|
2016-07-13 00:41:53 +00:00
|
|
|
if (0 == strcmp(ptr, "sec")) f->opt |= FORMAT_FLAG_TIME_SEC;
|
|
|
|
else if (0 == strcmp(ptr, "msec")) f->opt |= FORMAT_FLAG_TIME_MSEC;
|
|
|
|
else if (0 == strcmp(ptr, "usec")) f->opt |= FORMAT_FLAG_TIME_USEC;
|
|
|
|
else if (0 == strcmp(ptr, "nsec")) f->opt |= FORMAT_FLAG_TIME_NSEC;
|
|
|
|
else if (0 == strcmp(ptr, "msec_frac")) f->opt |= FORMAT_FLAG_TIME_MSEC_FRAC;
|
|
|
|
else if (0 == strcmp(ptr, "usec_frac")) f->opt |= FORMAT_FLAG_TIME_USEC_FRAC;
|
|
|
|
else if (0 == strcmp(ptr, "nsec_frac")) f->opt |= FORMAT_FLAG_TIME_NSEC_FRAC;
|
|
|
|
else if (NULL == strchr(ptr, '%')) {
|
2019-11-01 04:26:08 +00:00
|
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
|
|
"constant string for time format (misspelled token? or missing '%%'): %s", format);
|
|
|
|
mod_accesslog_free_format_fields(parsed_format);
|
|
|
|
return NULL;
|
2009-10-12 10:13:01 +00:00
|
|
|
}
|
|
|
|
}
|
2016-07-13 00:41:53 +00:00
|
|
|
|
|
|
|
/* make sure they didn't try to send the timestamp in twice
|
2019-11-01 04:26:08 +00:00
|
|
|
* (would invalidate pconf->parsed_format.ts_accesslog_str cache of timestamp str) */
|
2016-07-13 00:41:53 +00:00
|
|
|
if (!(f->opt & ~(FORMAT_FLAG_TIME_BEGIN|FORMAT_FLAG_TIME_END|FORMAT_FLAG_TIME_SEC)) && ++tcount > 1) {
|
2019-11-01 04:26:08 +00:00
|
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
|
|
"you may not use strftime timestamp format %%{}t twice in the same access log: %s", format);
|
|
|
|
mod_accesslog_free_format_fields(parsed_format);
|
|
|
|
return NULL;
|
2016-07-13 00:41:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (f->opt & FORMAT_FLAG_TIME_BEGIN) srv->srvconf.high_precision_timestamps = 1;
|
|
|
|
} else if (FORMAT_TIME_USED_US == f->field) {
|
|
|
|
f->opt |= FORMAT_FLAG_TIME_USEC;
|
|
|
|
srv->srvconf.high_precision_timestamps = 1;
|
|
|
|
} else if (FORMAT_TIME_USED == f->field) {
|
2019-11-01 04:26:08 +00:00
|
|
|
if (buffer_string_is_empty(fstr)
|
|
|
|
|| buffer_is_equal_string(fstr, CONST_STR_LEN("s"))
|
|
|
|
|| buffer_is_equal_string(fstr, CONST_STR_LEN("sec"))) f->opt |= FORMAT_FLAG_TIME_SEC;
|
|
|
|
else if (buffer_is_equal_string(fstr, CONST_STR_LEN("ms"))
|
|
|
|
|| buffer_is_equal_string(fstr, CONST_STR_LEN("msec"))) f->opt |= FORMAT_FLAG_TIME_MSEC;
|
|
|
|
else if (buffer_is_equal_string(fstr, CONST_STR_LEN("us"))
|
|
|
|
|| buffer_is_equal_string(fstr, CONST_STR_LEN("usec"))) f->opt |= FORMAT_FLAG_TIME_USEC;
|
|
|
|
else if (buffer_is_equal_string(fstr, CONST_STR_LEN("ns"))
|
|
|
|
|| buffer_is_equal_string(fstr, CONST_STR_LEN("nsec"))) f->opt |= FORMAT_FLAG_TIME_NSEC;
|
2016-07-13 00:41:53 +00:00
|
|
|
else {
|
2019-11-01 04:26:08 +00:00
|
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
|
|
"invalid time unit in %%{UNIT}T: %s", format);
|
|
|
|
mod_accesslog_free_format_fields(parsed_format);
|
|
|
|
return NULL;
|
2016-07-13 00:41:53 +00:00
|
|
|
}
|
2017-04-26 17:00:52 +00:00
|
|
|
|
|
|
|
if (f->opt & ~(FORMAT_FLAG_TIME_SEC)) srv->srvconf.high_precision_timestamps = 1;
|
2016-07-13 00:41:53 +00:00
|
|
|
} else if (FORMAT_COOKIE == f->field) {
|
2019-11-01 04:26:08 +00:00
|
|
|
if (buffer_string_is_empty(fstr)) f->type = FIELD_STRING; /*(blank)*/
|
2017-11-18 03:09:51 +00:00
|
|
|
} else if (FORMAT_SERVER_PORT == f->field) {
|
2019-11-01 04:26:08 +00:00
|
|
|
if (buffer_string_is_empty(fstr))
|
2017-11-18 03:09:51 +00:00
|
|
|
f->opt |= FORMAT_FLAG_PORT_LOCAL;
|
2019-11-01 04:26:08 +00:00
|
|
|
else if (buffer_is_equal_string(fstr, CONST_STR_LEN("canonical")))
|
2017-11-18 03:09:51 +00:00
|
|
|
f->opt |= FORMAT_FLAG_PORT_LOCAL;
|
2019-11-01 04:26:08 +00:00
|
|
|
else if (buffer_is_equal_string(fstr, CONST_STR_LEN("local")))
|
2017-11-18 03:09:51 +00:00
|
|
|
f->opt |= FORMAT_FLAG_PORT_LOCAL;
|
2019-11-01 04:26:08 +00:00
|
|
|
else if (buffer_is_equal_string(fstr, CONST_STR_LEN("remote")))
|
2017-11-18 03:09:51 +00:00
|
|
|
f->opt |= FORMAT_FLAG_PORT_REMOTE;
|
|
|
|
else {
|
2019-11-01 04:26:08 +00:00
|
|
|
log_error(srv->errh, __FILE__, __LINE__,
|
|
|
|
"invalid format %%{canonical,local,remote}p: %s", format);
|
|
|
|
mod_accesslog_free_format_fields(parsed_format);
|
|
|
|
return NULL;
|
2017-11-18 03:09:51 +00:00
|
|
|
}
|
2009-10-12 10:13:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|
|
return parsed_format;
|
2005-02-20 14:27:00 +00:00
|
|
|
}
|
|
|
|
|
2019-11-01 04:26:08 +00:00
|
|